From: kernel test robot <lkp@intel.com> To: Kumar Kartikeya Dwivedi <memxor@gmail.com> Cc: llvm@lists.linux.dev, kbuild-all@lists.01.org Subject: Re: [PATCH RFC bpf-next v1 4/6] bpf: Add reference tracking support to kfunc returned PTR_TO_BTF_ID Date: Sun, 31 Oct 2021 02:28:37 +0800 [thread overview] Message-ID: <202110310210.JhrtowVI-lkp@intel.com> (raw) In-Reply-To: <20211030144609.263572-5-memxor@gmail.com> [-- Attachment #1: Type: text/plain, Size: 5012 bytes --] Hi Kumar, [FYI, it's a private test report for your RFC patch.] [auto build test ERROR on bpf-next/master] url: https://github.com/0day-ci/linux/commits/Kumar-Kartikeya-Dwivedi/Introduce-unstable-CT-lookup-helpers/20211030-224748 base: https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git master config: arm-randconfig-r006-20211028 (attached as .config) compiler: clang version 14.0.0 (https://github.com/llvm/llvm-project d321548c3ce987f4f21350ba1c81fdb5d4354224) reproduce (this is a W=1 build): wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross chmod +x ~/bin/make.cross # install arm cross compiling tool for clang build # apt-get install binutils-arm-linux-gnueabi # https://github.com/0day-ci/linux/commit/b6df0d58a8ac487b5c4c3290b9599dac88888516 git remote add linux-review https://github.com/0day-ci/linux git fetch --no-tags linux-review Kumar-Kartikeya-Dwivedi/Introduce-unstable-CT-lookup-helpers/20211030-224748 git checkout b6df0d58a8ac487b5c4c3290b9599dac88888516 # save the attached .config to linux build tree mkdir build_dir COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross W=1 O=build_dir ARCH=arm SHELL=/bin/bash kernel/bpf/ If you fix the issue, kindly add following tag as appropriate Reported-by: kernel test robot <lkp@intel.com> All errors (new ones prefixed by >>): In file included from kernel/bpf/core.c:27: >> include/linux/btf.h:307:1: error: expected identifier or '(' { ^ kernel/bpf/core.c:1359:12: warning: no previous prototype for function 'bpf_probe_read_kernel' [-Wmissing-prototypes] u64 __weak bpf_probe_read_kernel(void *dst, u32 size, const void *unsafe_ptr) ^ kernel/bpf/core.c:1359:1: note: declare 'static' if the function is not intended to be used outside of this translation unit u64 __weak bpf_probe_read_kernel(void *dst, u32 size, const void *unsafe_ptr) ^ static 1 warning and 1 error generated. -- In file included from kernel/bpf/syscall.c:7: In file included from include/linux/bpf_verifier.h:8: >> include/linux/btf.h:307:1: error: expected identifier or '(' { ^ 1 error generated. vim +307 include/linux/btf.h 259 260 #ifdef CONFIG_DEBUG_INFO_BTF_MODULES 261 void register_kfunc_btf_id_set(struct kfunc_btf_id_list *l, 262 struct kfunc_btf_id_set *s); 263 void unregister_kfunc_btf_id_set(struct kfunc_btf_id_list *l, 264 struct kfunc_btf_id_set *s); 265 bool bpf_check_mod_kfunc_call(struct kfunc_btf_id_list *klist, u32 kfunc_id, 266 struct module *owner); 267 bool bpf_is_mod_acquire_kfunc(struct kfunc_btf_id_list *klist, u32 kfunc_id, 268 struct module *owner); 269 bool bpf_is_mod_release_kfunc(struct kfunc_btf_id_list *klist, u32 kfunc_id, 270 struct module *owner); 271 enum bpf_return_type bpf_get_mod_kfunc_return_type(struct kfunc_btf_id_list *klist, 272 u32 kfunc_btf_id, struct module *owner); 273 int bpf_btf_mod_struct_access(struct kfunc_btf_id_list *klist, 274 struct module *owner, 275 struct bpf_verifier_log *log, 276 const struct btf *btf, 277 const struct btf_type *t, int off, 278 int size, enum bpf_access_type atype, 279 u32 *next_btf_id); 280 #else 281 static inline void register_kfunc_btf_id_set(struct kfunc_btf_id_list *l, 282 struct kfunc_btf_id_set *s) 283 { 284 } 285 static inline void unregister_kfunc_btf_id_set(struct kfunc_btf_id_list *l, 286 struct kfunc_btf_id_set *s) 287 { 288 } 289 static inline bool bpf_check_mod_kfunc_call(struct kfunc_btf_id_list *klist, 290 u32 kfunc_id, struct module *owner) 291 { 292 return false; 293 } 294 static inline bool bpf_is_mod_acquire_kfunc(struct kfunc_btf_id_list *klist, 295 u32 kfunc_id, struct module *owner) 296 { 297 return false; 298 } 299 static inline bool bpf_is_mod_release_kfunc(struct kfunc_btf_id_list *klist, 300 u32 kfunc_id, struct module *owner) 301 { 302 return false; 303 } 304 static inline enum bpf_return_type 305 bpf_get_mod_kfunc_return_type(struct kfunc_btf_id_list *klist, u32 kfunc_btf_id, 306 struct module *owner); > 307 { 308 return __BPF_RET_TYPE_MAX; 309 } 310 static inline int bpf_btf_mod_struct_access(struct kfunc_btf_id_list *klist, 311 struct module *owner, 312 struct bpf_verifier_log *log, 313 const struct btf *btf, 314 const struct btf_type *t, int off, 315 int size, enum bpf_access_type atype, 316 u32 *next_btf_id) 317 { 318 return __BPF_REG_TYPE_MAX; 319 } 320 #endif 321 --- 0-DAY CI Kernel Test Service, Intel Corporation https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org [-- Attachment #2: .config.gz --] [-- Type: application/gzip, Size: 36328 bytes --]
WARNING: multiple messages have this Message-ID (diff)
From: kernel test robot <lkp@intel.com> To: kbuild-all@lists.01.org Subject: Re: [PATCH RFC bpf-next v1 4/6] bpf: Add reference tracking support to kfunc returned PTR_TO_BTF_ID Date: Sun, 31 Oct 2021 02:28:37 +0800 [thread overview] Message-ID: <202110310210.JhrtowVI-lkp@intel.com> (raw) In-Reply-To: <20211030144609.263572-5-memxor@gmail.com> [-- Attachment #1: Type: text/plain, Size: 5131 bytes --] Hi Kumar, [FYI, it's a private test report for your RFC patch.] [auto build test ERROR on bpf-next/master] url: https://github.com/0day-ci/linux/commits/Kumar-Kartikeya-Dwivedi/Introduce-unstable-CT-lookup-helpers/20211030-224748 base: https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git master config: arm-randconfig-r006-20211028 (attached as .config) compiler: clang version 14.0.0 (https://github.com/llvm/llvm-project d321548c3ce987f4f21350ba1c81fdb5d4354224) reproduce (this is a W=1 build): wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross chmod +x ~/bin/make.cross # install arm cross compiling tool for clang build # apt-get install binutils-arm-linux-gnueabi # https://github.com/0day-ci/linux/commit/b6df0d58a8ac487b5c4c3290b9599dac88888516 git remote add linux-review https://github.com/0day-ci/linux git fetch --no-tags linux-review Kumar-Kartikeya-Dwivedi/Introduce-unstable-CT-lookup-helpers/20211030-224748 git checkout b6df0d58a8ac487b5c4c3290b9599dac88888516 # save the attached .config to linux build tree mkdir build_dir COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross W=1 O=build_dir ARCH=arm SHELL=/bin/bash kernel/bpf/ If you fix the issue, kindly add following tag as appropriate Reported-by: kernel test robot <lkp@intel.com> All errors (new ones prefixed by >>): In file included from kernel/bpf/core.c:27: >> include/linux/btf.h:307:1: error: expected identifier or '(' { ^ kernel/bpf/core.c:1359:12: warning: no previous prototype for function 'bpf_probe_read_kernel' [-Wmissing-prototypes] u64 __weak bpf_probe_read_kernel(void *dst, u32 size, const void *unsafe_ptr) ^ kernel/bpf/core.c:1359:1: note: declare 'static' if the function is not intended to be used outside of this translation unit u64 __weak bpf_probe_read_kernel(void *dst, u32 size, const void *unsafe_ptr) ^ static 1 warning and 1 error generated. -- In file included from kernel/bpf/syscall.c:7: In file included from include/linux/bpf_verifier.h:8: >> include/linux/btf.h:307:1: error: expected identifier or '(' { ^ 1 error generated. vim +307 include/linux/btf.h 259 260 #ifdef CONFIG_DEBUG_INFO_BTF_MODULES 261 void register_kfunc_btf_id_set(struct kfunc_btf_id_list *l, 262 struct kfunc_btf_id_set *s); 263 void unregister_kfunc_btf_id_set(struct kfunc_btf_id_list *l, 264 struct kfunc_btf_id_set *s); 265 bool bpf_check_mod_kfunc_call(struct kfunc_btf_id_list *klist, u32 kfunc_id, 266 struct module *owner); 267 bool bpf_is_mod_acquire_kfunc(struct kfunc_btf_id_list *klist, u32 kfunc_id, 268 struct module *owner); 269 bool bpf_is_mod_release_kfunc(struct kfunc_btf_id_list *klist, u32 kfunc_id, 270 struct module *owner); 271 enum bpf_return_type bpf_get_mod_kfunc_return_type(struct kfunc_btf_id_list *klist, 272 u32 kfunc_btf_id, struct module *owner); 273 int bpf_btf_mod_struct_access(struct kfunc_btf_id_list *klist, 274 struct module *owner, 275 struct bpf_verifier_log *log, 276 const struct btf *btf, 277 const struct btf_type *t, int off, 278 int size, enum bpf_access_type atype, 279 u32 *next_btf_id); 280 #else 281 static inline void register_kfunc_btf_id_set(struct kfunc_btf_id_list *l, 282 struct kfunc_btf_id_set *s) 283 { 284 } 285 static inline void unregister_kfunc_btf_id_set(struct kfunc_btf_id_list *l, 286 struct kfunc_btf_id_set *s) 287 { 288 } 289 static inline bool bpf_check_mod_kfunc_call(struct kfunc_btf_id_list *klist, 290 u32 kfunc_id, struct module *owner) 291 { 292 return false; 293 } 294 static inline bool bpf_is_mod_acquire_kfunc(struct kfunc_btf_id_list *klist, 295 u32 kfunc_id, struct module *owner) 296 { 297 return false; 298 } 299 static inline bool bpf_is_mod_release_kfunc(struct kfunc_btf_id_list *klist, 300 u32 kfunc_id, struct module *owner) 301 { 302 return false; 303 } 304 static inline enum bpf_return_type 305 bpf_get_mod_kfunc_return_type(struct kfunc_btf_id_list *klist, u32 kfunc_btf_id, 306 struct module *owner); > 307 { 308 return __BPF_RET_TYPE_MAX; 309 } 310 static inline int bpf_btf_mod_struct_access(struct kfunc_btf_id_list *klist, 311 struct module *owner, 312 struct bpf_verifier_log *log, 313 const struct btf *btf, 314 const struct btf_type *t, int off, 315 int size, enum bpf_access_type atype, 316 u32 *next_btf_id) 317 { 318 return __BPF_REG_TYPE_MAX; 319 } 320 #endif 321 --- 0-DAY CI Kernel Test Service, Intel Corporation https://lists.01.org/hyperkitty/list/kbuild-all(a)lists.01.org [-- Attachment #2: config.gz --] [-- Type: application/gzip, Size: 36328 bytes --]
next prev parent reply other threads:[~2021-10-30 18:29 UTC|newest] Thread overview: 22+ messages / expand[flat|nested] mbox.gz Atom feed top 2021-10-30 14:46 [PATCH RFC bpf-next v1 0/6] Introduce unstable CT lookup helpers Kumar Kartikeya Dwivedi 2021-10-30 14:46 ` [PATCH RFC bpf-next v1 1/6] bpf: Refactor bpf_check_mod_kfunc_call Kumar Kartikeya Dwivedi 2021-10-30 14:46 ` [PATCH RFC bpf-next v1 2/6] bpf: Remove DEFINE_KFUNC_BTF_ID_SET Kumar Kartikeya Dwivedi 2021-10-30 14:46 ` [PATCH RFC bpf-next v1 3/6] bpf: Extend kfunc with PTR_TO_CTX and PTR_TO_MEM arguments Kumar Kartikeya Dwivedi 2021-10-30 14:46 ` [PATCH RFC bpf-next v1 4/6] bpf: Add reference tracking support to kfunc returned PTR_TO_BTF_ID Kumar Kartikeya Dwivedi 2021-10-30 18:28 ` kernel test robot [this message] 2021-10-30 18:28 ` kernel test robot 2021-10-30 14:46 ` [PATCH RFC bpf-next v1 5/6] net: netfilter: Add unstable CT lookup helper for XDP and TC-BPF Kumar Kartikeya Dwivedi 2021-10-30 16:44 ` kernel test robot 2021-10-30 17:27 ` kernel test robot 2021-10-31 19:10 ` Florian Westphal 2021-11-01 19:49 ` Toke Høiland-Jørgensen 2021-11-02 20:43 ` Florian Westphal 2021-11-05 20:48 ` Kumar Kartikeya Dwivedi 2021-11-02 23:19 ` Alexei Starovoitov 2021-10-30 14:46 ` [PATCH RFC bpf-next v1 6/6] selftests/bpf: Add referenced PTR_TO_BTF_ID selftest Kumar Kartikeya Dwivedi 2021-11-02 23:16 ` [PATCH RFC bpf-next v1 0/6] Introduce unstable CT lookup helpers Alexei Starovoitov 2021-11-04 12:55 ` Kumar Kartikeya Dwivedi 2021-11-05 20:49 ` Alexei Starovoitov 2021-11-05 21:13 ` Kumar Kartikeya Dwivedi 2021-11-06 18:13 ` Alexei Starovoitov 2021-11-07 15:44 ` Kumar Kartikeya Dwivedi
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=202110310210.JhrtowVI-lkp@intel.com \ --to=lkp@intel.com \ --cc=kbuild-all@lists.01.org \ --cc=llvm@lists.linux.dev \ --cc=memxor@gmail.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.