Context |
Check |
Description |
bpf/vmtest-bpf-next-VM_Test-30 |
success
|
Logs for x86_64-llvm-16 / test (test_progs, false, 360) / test_progs on x86_64 with llvm-16
|
bpf/vmtest-bpf-next-VM_Test-31 |
success
|
Logs for x86_64-llvm-16 / test (test_progs_no_alu32, false, 360) / test_progs_no_alu32 on x86_64 with llvm-16
|
bpf/vmtest-bpf-next-VM_Test-32 |
success
|
Logs for x86_64-llvm-16 / test (test_verifier, false, 360) / test_verifier on x86_64 with llvm-16
|
bpf/vmtest-bpf-next-VM_Test-33 |
success
|
Logs for x86_64-llvm-16 / veristat
|
bpf/vmtest-bpf-next-PR |
success
|
PR summary
|
bpf/vmtest-bpf-next-VM_Test-2 |
success
|
Logs for Validate matrix.py
|
bpf/vmtest-bpf-next-VM_Test-1 |
success
|
Logs for ShellCheck
|
bpf/vmtest-bpf-next-VM_Test-0 |
success
|
Logs for Lint
|
bpf/vmtest-bpf-next-VM_Test-3 |
success
|
Logs for aarch64-gcc / build / build for aarch64 with gcc
|
bpf/vmtest-bpf-next-VM_Test-8 |
success
|
Logs for aarch64-gcc / veristat
|
netdev/series_format |
fail
|
Series longer than 15 patches (and no cover letter)
|
netdev/tree_selection |
success
|
Clearly marked for bpf-next, async
|
netdev/fixes_present |
success
|
Fixes tag not required for -next series
|
netdev/header_inline |
success
|
No static functions without inline keyword in header files
|
netdev/build_32bit |
success
|
Errors and warnings before: 1356 this patch: 1356
|
netdev/cc_maintainers |
warning
|
8 maintainers not CCed: jolsa@kernel.org sdf@google.com john.fastabend@gmail.com kpsingh@kernel.org song@kernel.org yonghong.song@linux.dev haoluo@google.com martin.lau@linux.dev
|
netdev/build_clang |
success
|
Errors and warnings before: 1370 this patch: 1370
|
netdev/verify_signedoff |
success
|
Signed-off-by tag matches author and committer
|
netdev/deprecated_api |
success
|
None detected
|
netdev/check_selftest |
success
|
No net selftest shell script
|
netdev/verify_fixes |
success
|
No Fixes tag
|
netdev/build_allmodconfig_warn |
success
|
Errors and warnings before: 1381 this patch: 1381
|
netdev/checkpatch |
fail
|
ERROR: space prohibited before that close parenthesis ')'
WARNING: line length of 81 exceeds 80 columns
WARNING: line length of 82 exceeds 80 columns
WARNING: line length of 85 exceeds 80 columns
WARNING: line length of 89 exceeds 80 columns
WARNING: line length of 90 exceeds 80 columns
|
netdev/build_clang_rust |
success
|
No Rust files in patch. Skipping build
|
netdev/kdoc |
success
|
Errors and warnings before: 0 this patch: 0
|
netdev/source_inline |
success
|
Was 0 now: 0
|
bpf/vmtest-bpf-next-VM_Test-4 |
success
|
Logs for aarch64-gcc / test (test_maps, false, 360) / test_maps on aarch64 with gcc
|
bpf/vmtest-bpf-next-VM_Test-5 |
success
|
Logs for aarch64-gcc / test (test_progs, false, 360) / test_progs on aarch64 with gcc
|
bpf/vmtest-bpf-next-VM_Test-6 |
success
|
Logs for aarch64-gcc / test (test_progs_no_alu32, false, 360) / test_progs_no_alu32 on aarch64 with gcc
|
bpf/vmtest-bpf-next-VM_Test-7 |
success
|
Logs for aarch64-gcc / test (test_verifier, false, 360) / test_verifier on aarch64 with gcc
|
bpf/vmtest-bpf-next-VM_Test-9 |
success
|
Logs for s390x-gcc / build / build for s390x with gcc
|
bpf/vmtest-bpf-next-VM_Test-14 |
success
|
Logs for s390x-gcc / veristat
|
bpf/vmtest-bpf-next-VM_Test-16 |
success
|
Logs for x86_64-gcc / build / build for x86_64 with gcc
|
bpf/vmtest-bpf-next-VM_Test-15 |
success
|
Logs for set-matrix
|
bpf/vmtest-bpf-next-VM_Test-17 |
success
|
Logs for x86_64-gcc / test (test_maps, false, 360) / test_maps on x86_64 with gcc
|
bpf/vmtest-bpf-next-VM_Test-18 |
success
|
Logs for x86_64-gcc / test (test_progs, false, 360) / test_progs on x86_64 with gcc
|
bpf/vmtest-bpf-next-VM_Test-19 |
success
|
Logs for x86_64-gcc / test (test_progs_no_alu32, false, 360) / test_progs_no_alu32 on x86_64 with gcc
|
bpf/vmtest-bpf-next-VM_Test-20 |
success
|
Logs for x86_64-gcc / test (test_progs_no_alu32_parallel, true, 30) / test_progs_no_alu32_parallel on x86_64 with gcc
|
bpf/vmtest-bpf-next-VM_Test-21 |
success
|
Logs for x86_64-gcc / test (test_progs_parallel, true, 30) / test_progs_parallel on x86_64 with gcc
|
bpf/vmtest-bpf-next-VM_Test-22 |
success
|
Logs for x86_64-gcc / test (test_verifier, false, 360) / test_verifier on x86_64 with gcc
|
bpf/vmtest-bpf-next-VM_Test-23 |
success
|
Logs for x86_64-gcc / veristat / veristat on x86_64 with gcc
|
bpf/vmtest-bpf-next-VM_Test-24 |
success
|
Logs for x86_64-llvm-16 / build / build for x86_64 with llvm-16
|
bpf/vmtest-bpf-next-VM_Test-25 |
success
|
Logs for x86_64-llvm-16 / test (test_maps, false, 360) / test_maps on x86_64 with llvm-16
|
bpf/vmtest-bpf-next-VM_Test-28 |
success
|
Logs for x86_64-llvm-16 / test (test_verifier, false, 360) / test_verifier on x86_64 with llvm-16
|
bpf/vmtest-bpf-next-VM_Test-29 |
success
|
Logs for x86_64-llvm-16 / veristat
|
bpf/vmtest-bpf-next-VM_Test-26 |
success
|
Logs for x86_64-llvm-16 / test (test_progs, false, 360) / test_progs on x86_64 with llvm-16
|
bpf/vmtest-bpf-next-VM_Test-27 |
success
|
Logs for x86_64-llvm-16 / test (test_progs_no_alu32, false, 360) / test_progs_no_alu32 on x86_64 with llvm-16
|
bpf/vmtest-bpf-next-VM_Test-13 |
success
|
Logs for s390x-gcc / test (test_verifier, false, 360) / test_verifier on s390x with gcc
|
bpf/vmtest-bpf-next-VM_Test-11 |
success
|
Logs for s390x-gcc / test (test_progs, false, 360) / test_progs on s390x with gcc
|
bpf/vmtest-bpf-next-VM_Test-12 |
success
|
Logs for s390x-gcc / test (test_progs_no_alu32, false, 360) / test_progs_no_alu32 on s390x with gcc
|
bpf/vmtest-bpf-next-VM_Test-10 |
success
|
Logs for s390x-gcc / test (test_maps, false, 360) / test_maps on s390x with gcc
|
@@ -14183,166 +14183,86 @@ static u64 reg_const_value(struct bpf_reg_state *reg, bool subreg32)
/*
* <reg1> <op> <reg2>, currently assuming reg2 is a constant
*/
-static int is_branch32_taken(struct bpf_reg_state *reg1, struct bpf_reg_state *reg2, u8 opcode)
+static int is_scalar_branch_taken(struct bpf_reg_state *reg1, struct bpf_reg_state *reg2,
+ u8 opcode, bool is_jmp32)
{
- struct tnum subreg = tnum_subreg(reg1->var_off);
- u32 val = (u32)tnum_subreg(reg2->var_off).value;
- s32 sval = (s32)val;
+ struct tnum t1 = is_jmp32 ? tnum_subreg(reg1->var_off) : reg1->var_off;
+ u64 umin1 = is_jmp32 ? (u64)reg1->u32_min_value : reg1->umin_value;
+ u64 umax1 = is_jmp32 ? (u64)reg1->u32_max_value : reg1->umax_value;
+ s64 smin1 = is_jmp32 ? (s64)reg1->s32_min_value : reg1->smin_value;
+ s64 smax1 = is_jmp32 ? (s64)reg1->s32_max_value : reg1->smax_value;
+ u64 uval = is_jmp32 ? (u32)tnum_subreg(reg2->var_off).value : reg2->var_off.value;
+ s64 sval = is_jmp32 ? (s32)uval : (s64)uval;
switch (opcode) {
case BPF_JEQ:
- if (tnum_is_const(subreg))
- return !!tnum_equals_const(subreg, val);
- else if (val < reg1->u32_min_value || val > reg1->u32_max_value)
+ if (tnum_is_const(t1))
+ return !!tnum_equals_const(t1, uval);
+ else if (uval < umin1 || uval > umax1)
return 0;
- else if (sval < reg1->s32_min_value || sval > reg1->s32_max_value)
+ else if (sval < smin1 || sval > smax1)
return 0;
break;
case BPF_JNE:
- if (tnum_is_const(subreg))
- return !tnum_equals_const(subreg, val);
- else if (val < reg1->u32_min_value || val > reg1->u32_max_value)
+ if (tnum_is_const(t1))
+ return !tnum_equals_const(t1, uval);
+ else if (uval < umin1 || uval > umax1)
return 1;
- else if (sval < reg1->s32_min_value || sval > reg1->s32_max_value)
+ else if (sval < smin1 || sval > smax1)
return 1;
break;
case BPF_JSET:
- if ((~subreg.mask & subreg.value) & val)
+ if ((~t1.mask & t1.value) & uval)
return 1;
- if (!((subreg.mask | subreg.value) & val))
+ if (!((t1.mask | t1.value) & uval))
return 0;
break;
case BPF_JGT:
- if (reg1->u32_min_value > val)
+ if (umin1 > uval )
return 1;
- else if (reg1->u32_max_value <= val)
+ else if (umax1 <= uval)
return 0;
break;
case BPF_JSGT:
- if (reg1->s32_min_value > sval)
+ if (smin1 > sval)
return 1;
- else if (reg1->s32_max_value <= sval)
+ else if (smax1 <= sval)
return 0;
break;
case BPF_JLT:
- if (reg1->u32_max_value < val)
+ if (umax1 < uval)
return 1;
- else if (reg1->u32_min_value >= val)
+ else if (umin1 >= uval)
return 0;
break;
case BPF_JSLT:
- if (reg1->s32_max_value < sval)
+ if (smax1 < sval)
return 1;
- else if (reg1->s32_min_value >= sval)
+ else if (smin1 >= sval)
return 0;
break;
case BPF_JGE:
- if (reg1->u32_min_value >= val)
+ if (umin1 >= uval)
return 1;
- else if (reg1->u32_max_value < val)
+ else if (umax1 < uval)
return 0;
break;
case BPF_JSGE:
- if (reg1->s32_min_value >= sval)
+ if (smin1 >= sval)
return 1;
- else if (reg1->s32_max_value < sval)
+ else if (smax1 < sval)
return 0;
break;
case BPF_JLE:
- if (reg1->u32_max_value <= val)
+ if (umax1 <= uval)
return 1;
- else if (reg1->u32_min_value > val)
+ else if (umin1 > uval)
return 0;
break;
case BPF_JSLE:
- if (reg1->s32_max_value <= sval)
+ if (smax1 <= sval)
return 1;
- else if (reg1->s32_min_value > sval)
- return 0;
- break;
- }
-
- return -1;
-}
-
-
-/*
- * <reg1> <op> <reg2>, currently assuming reg2 is a constant
- */
-static int is_branch64_taken(struct bpf_reg_state *reg1, struct bpf_reg_state *reg2, u8 opcode)
-{
- u64 val = reg2->var_off.value;
- s64 sval = (s64)val;
-
- switch (opcode) {
- case BPF_JEQ:
- if (tnum_is_const(reg1->var_off))
- return !!tnum_equals_const(reg1->var_off, val);
- else if (val < reg1->umin_value || val > reg1->umax_value)
- return 0;
- else if (sval < reg1->smin_value || sval > reg1->smax_value)
- return 0;
- break;
- case BPF_JNE:
- if (tnum_is_const(reg1->var_off))
- return !tnum_equals_const(reg1->var_off, val);
- else if (val < reg1->umin_value || val > reg1->umax_value)
- return 1;
- else if (sval < reg1->smin_value || sval > reg1->smax_value)
- return 1;
- break;
- case BPF_JSET:
- if ((~reg1->var_off.mask & reg1->var_off.value) & val)
- return 1;
- if (!((reg1->var_off.mask | reg1->var_off.value) & val))
- return 0;
- break;
- case BPF_JGT:
- if (reg1->umin_value > val)
- return 1;
- else if (reg1->umax_value <= val)
- return 0;
- break;
- case BPF_JSGT:
- if (reg1->smin_value > sval)
- return 1;
- else if (reg1->smax_value <= sval)
- return 0;
- break;
- case BPF_JLT:
- if (reg1->umax_value < val)
- return 1;
- else if (reg1->umin_value >= val)
- return 0;
- break;
- case BPF_JSLT:
- if (reg1->smax_value < sval)
- return 1;
- else if (reg1->smin_value >= sval)
- return 0;
- break;
- case BPF_JGE:
- if (reg1->umin_value >= val)
- return 1;
- else if (reg1->umax_value < val)
- return 0;
- break;
- case BPF_JSGE:
- if (reg1->smin_value >= sval)
- return 1;
- else if (reg1->smax_value < sval)
- return 0;
- break;
- case BPF_JLE:
- if (reg1->umax_value <= val)
- return 1;
- else if (reg1->umin_value > val)
- return 0;
- break;
- case BPF_JSLE:
- if (reg1->smax_value <= sval)
- return 1;
- else if (reg1->smin_value > sval)
+ else if (smin1 > sval)
return 0;
break;
}
@@ -14456,9 +14376,7 @@ static int is_branch_taken(struct bpf_reg_state *reg1, struct bpf_reg_state *reg
}
}
- if (is_jmp32)
- return is_branch32_taken(reg1, reg2, opcode);
- return is_branch64_taken(reg1, reg2, opcode);
+ return is_scalar_branch_taken(reg1, reg2, opcode, is_jmp32);
}
/* Adjusts the register min/max values in the case that the dst_reg is the
@@ -14468,15 +14386,15 @@ static int is_branch_taken(struct bpf_reg_state *reg1, struct bpf_reg_state *reg
*/
static void reg_set_min_max(struct bpf_reg_state *true_reg,
struct bpf_reg_state *false_reg,
- u64 val, u32 val32,
+ u64 uval, u32 uval32,
u8 opcode, bool is_jmp32)
{
struct tnum false_32off = tnum_subreg(false_reg->var_off);
struct tnum false_64off = false_reg->var_off;
struct tnum true_32off = tnum_subreg(true_reg->var_off);
struct tnum true_64off = true_reg->var_off;
- s64 sval = (s64)val;
- s32 sval32 = (s32)val32;
+ s64 sval = (s64)uval;
+ s32 sval32 = (s32)uval32;
/* If the dst_reg is a pointer, we can't learn anything about its
* variable offset from the compare (unless src_reg were a pointer into
@@ -14499,49 +14417,49 @@ static void reg_set_min_max(struct bpf_reg_state *true_reg,
*/
case BPF_JEQ:
if (is_jmp32) {
- __mark_reg32_known(true_reg, val32);
+ __mark_reg32_known(true_reg, uval32);
true_32off = tnum_subreg(true_reg->var_off);
} else {
- ___mark_reg_known(true_reg, val);
+ ___mark_reg_known(true_reg, uval);
true_64off = true_reg->var_off;
}
break;
case BPF_JNE:
if (is_jmp32) {
- __mark_reg32_known(false_reg, val32);
+ __mark_reg32_known(false_reg, uval32);
false_32off = tnum_subreg(false_reg->var_off);
} else {
- ___mark_reg_known(false_reg, val);
+ ___mark_reg_known(false_reg, uval);
false_64off = false_reg->var_off;
}
break;
case BPF_JSET:
if (is_jmp32) {
- false_32off = tnum_and(false_32off, tnum_const(~val32));
- if (is_power_of_2(val32))
+ false_32off = tnum_and(false_32off, tnum_const(~uval32));
+ if (is_power_of_2(uval32))
true_32off = tnum_or(true_32off,
- tnum_const(val32));
+ tnum_const(uval32));
} else {
- false_64off = tnum_and(false_64off, tnum_const(~val));
- if (is_power_of_2(val))
+ false_64off = tnum_and(false_64off, tnum_const(~uval));
+ if (is_power_of_2(uval))
true_64off = tnum_or(true_64off,
- tnum_const(val));
+ tnum_const(uval));
}
break;
case BPF_JGE:
case BPF_JGT:
{
if (is_jmp32) {
- u32 false_umax = opcode == BPF_JGT ? val32 : val32 - 1;
- u32 true_umin = opcode == BPF_JGT ? val32 + 1 : val32;
+ u32 false_umax = opcode == BPF_JGT ? uval32 : uval32 - 1;
+ u32 true_umin = opcode == BPF_JGT ? uval32 + 1 : uval32;
false_reg->u32_max_value = min(false_reg->u32_max_value,
false_umax);
true_reg->u32_min_value = max(true_reg->u32_min_value,
true_umin);
} else {
- u64 false_umax = opcode == BPF_JGT ? val : val - 1;
- u64 true_umin = opcode == BPF_JGT ? val + 1 : val;
+ u64 false_umax = opcode == BPF_JGT ? uval : uval - 1;
+ u64 true_umin = opcode == BPF_JGT ? uval + 1 : uval;
false_reg->umax_value = min(false_reg->umax_value, false_umax);
true_reg->umin_value = max(true_reg->umin_value, true_umin);
@@ -14570,16 +14488,16 @@ static void reg_set_min_max(struct bpf_reg_state *true_reg,
case BPF_JLT:
{
if (is_jmp32) {
- u32 false_umin = opcode == BPF_JLT ? val32 : val32 + 1;
- u32 true_umax = opcode == BPF_JLT ? val32 - 1 : val32;
+ u32 false_umin = opcode == BPF_JLT ? uval32 : uval32 + 1;
+ u32 true_umax = opcode == BPF_JLT ? uval32 - 1 : uval32;
false_reg->u32_min_value = max(false_reg->u32_min_value,
false_umin);
true_reg->u32_max_value = min(true_reg->u32_max_value,
true_umax);
} else {
- u64 false_umin = opcode == BPF_JLT ? val : val + 1;
- u64 true_umax = opcode == BPF_JLT ? val - 1 : val;
+ u64 false_umin = opcode == BPF_JLT ? uval : uval + 1;
+ u64 true_umax = opcode == BPF_JLT ? uval - 1 : uval;
false_reg->umin_value = max(false_reg->umin_value, false_umin);
true_reg->umax_value = min(true_reg->umax_value, true_umax);
@@ -14628,7 +14546,7 @@ static void reg_set_min_max(struct bpf_reg_state *true_reg,
*/
static void reg_set_min_max_inv(struct bpf_reg_state *true_reg,
struct bpf_reg_state *false_reg,
- u64 val, u32 val32,
+ u64 uval, u32 uval32,
u8 opcode, bool is_jmp32)
{
opcode = flip_opcode(opcode);
@@ -14636,7 +14554,7 @@ static void reg_set_min_max_inv(struct bpf_reg_state *true_reg,
* BPF_JA, can't get here.
*/
if (opcode)
- reg_set_min_max(true_reg, false_reg, val, val32, opcode, is_jmp32);
+ reg_set_min_max(true_reg, false_reg, uval, uval32, opcode, is_jmp32);
}
/* Regs are known to be equal, so intersect their min/max/var_off */