diff mbox series

[bpf-next,2/2] bpf: Add BPF_CALL_FUNC* to simplify code

Message ID 20240920153706.919154-1-chen.dylane@gmail.com (mailing list archive)
State Superseded
Delegated to: BPF
Headers show
Series [bpf-next,1/2] bpf: Simplify code with BPF_CALL_IMM | expand

Checks

Context Check Description
netdev/series_format success Single patches do not need cover letters
netdev/tree_selection success Clearly marked for bpf-next
netdev/ynl success Generated files up to date; no warnings/errors; no diff in generated;
netdev/fixes_present success Fixes tag not required for -next series
netdev/header_inline success No static functions without inline keyword in header files
netdev/build_32bit success Errors and warnings before: 26 this patch: 26
netdev/build_tools success Errors and warnings before: 0 this patch: 0
netdev/cc_maintainers warning 8 maintainers not CCed: netdev@vger.kernel.org sdf@fomichev.me haoluo@google.com andreas@gaisler.com tglx@linutronix.de udknight@gmail.com dsahern@kernel.org kpsingh@kernel.org
netdev/build_clang success Errors and warnings before: 34 this patch: 34
netdev/verify_signedoff success Signed-off-by tag matches author and committer
netdev/deprecated_api success None detected
netdev/check_selftest success No net selftest shell script
netdev/verify_fixes success No Fixes tag
netdev/build_allmodconfig_warn success Errors and warnings before: 1383 this patch: 1383
netdev/checkpatch warning CHECK: Alignment should match open parenthesis CHECK: Unnecessary parentheses around function pointer (insn->imm)
netdev/build_clang_rust success No Rust files in patch. Skipping build
netdev/kdoc success Errors and warnings before: 0 this patch: 0
netdev/source_inline success Was 0 now: 0
bpf/vmtest-bpf-next-VM_Test-2 success Logs for Unittests
bpf/vmtest-bpf-next-VM_Test-3 success Logs for Validate matrix.py
bpf/vmtest-bpf-next-VM_Test-0 success Logs for Lint
bpf/vmtest-bpf-next-VM_Test-1 success Logs for ShellCheck
bpf/vmtest-bpf-next-VM_Test-5 success Logs for aarch64-gcc / build-release
bpf/vmtest-bpf-next-VM_Test-10 success Logs for aarch64-gcc / veristat
bpf/vmtest-bpf-next-VM_Test-4 success Logs for aarch64-gcc / build / build for aarch64 with gcc
bpf/vmtest-bpf-next-VM_Test-12 success Logs for s390x-gcc / build-release
bpf/vmtest-bpf-next-VM_Test-6 fail Logs for aarch64-gcc / test (test_maps, false, 360) / test_maps on aarch64 with gcc
bpf/vmtest-bpf-next-VM_Test-7 fail Logs for aarch64-gcc / test (test_progs, false, 360) / test_progs on aarch64 with gcc
bpf/vmtest-bpf-next-VM_Test-8 fail Logs for aarch64-gcc / test (test_progs_no_alu32, false, 360) / test_progs_no_alu32 on aarch64 with gcc
bpf/vmtest-bpf-next-VM_Test-9 fail Logs for aarch64-gcc / test (test_verifier, false, 360) / test_verifier on aarch64 with gcc
bpf/vmtest-bpf-next-VM_Test-11 success Logs for s390x-gcc / build / build for s390x with gcc
bpf/vmtest-bpf-next-VM_Test-16 success Logs for s390x-gcc / veristat
bpf/vmtest-bpf-next-VM_Test-17 success Logs for set-matrix
bpf/vmtest-bpf-next-VM_Test-19 success Logs for x86_64-gcc / build-release
bpf/vmtest-bpf-next-VM_Test-18 success Logs for x86_64-gcc / build / build for x86_64 with gcc
bpf/vmtest-bpf-next-VM_Test-28 success Logs for x86_64-llvm-17 / build-release / build for x86_64 with llvm-17-O2
bpf/vmtest-bpf-next-VM_Test-27 success Logs for x86_64-llvm-17 / build / build for x86_64 with llvm-17
bpf/vmtest-bpf-next-VM_Test-34 success Logs for x86_64-llvm-18 / build / build for x86_64 with llvm-18
bpf/vmtest-bpf-next-VM_Test-41 success Logs for x86_64-llvm-18 / veristat
bpf/vmtest-bpf-next-VM_Test-35 success Logs for x86_64-llvm-18 / build-release / build for x86_64 with llvm-18-O2
bpf/vmtest-bpf-next-VM_Test-33 success Logs for x86_64-llvm-17 / veristat
bpf/vmtest-bpf-next-VM_Test-14 fail Logs for s390x-gcc / test (test_progs_no_alu32, false, 360) / test_progs_no_alu32 on s390x with gcc
bpf/vmtest-bpf-next-VM_Test-13 fail Logs for s390x-gcc / test (test_progs, false, 360) / test_progs on s390x with gcc
bpf/vmtest-bpf-next-VM_Test-15 fail Logs for s390x-gcc / test (test_verifier, false, 360) / test_verifier on s390x with gcc
bpf/vmtest-bpf-next-PR fail PR summary
bpf/vmtest-bpf-next-VM_Test-20 fail Logs for x86_64-gcc / test (test_maps, false, 360) / test_maps on x86_64 with gcc
bpf/vmtest-bpf-next-VM_Test-25 fail Logs for x86_64-gcc / test (test_verifier, false, 360) / test_verifier on x86_64 with gcc
bpf/vmtest-bpf-next-VM_Test-21 fail Logs for x86_64-gcc / test (test_progs, false, 360) / test_progs on x86_64 with gcc
bpf/vmtest-bpf-next-VM_Test-24 success Logs for x86_64-gcc / test (test_progs_parallel, true, 30) / test_progs_parallel on x86_64 with gcc
bpf/vmtest-bpf-next-VM_Test-23 success Logs for x86_64-gcc / test (test_progs_no_alu32_parallel, true, 30) / test_progs_no_alu32_parallel on x86_64 with gcc
bpf/vmtest-bpf-next-VM_Test-29 fail Logs for x86_64-llvm-17 / test (test_maps, false, 360) / test_maps on x86_64 with llvm-17
bpf/vmtest-bpf-next-VM_Test-26 fail Logs for x86_64-gcc / veristat / veristat on x86_64 with gcc
bpf/vmtest-bpf-next-VM_Test-22 fail Logs for x86_64-gcc / test (test_progs_no_alu32, false, 360) / test_progs_no_alu32 on x86_64 with gcc
bpf/vmtest-bpf-next-VM_Test-30 fail Logs for x86_64-llvm-17 / test (test_progs, false, 360) / test_progs on x86_64 with llvm-17
bpf/vmtest-bpf-next-VM_Test-31 fail Logs for x86_64-llvm-17 / test (test_progs_no_alu32, false, 360) / test_progs_no_alu32 on x86_64 with llvm-17
bpf/vmtest-bpf-next-VM_Test-32 fail Logs for x86_64-llvm-17 / test (test_verifier, false, 360) / test_verifier on x86_64 with llvm-17
bpf/vmtest-bpf-next-VM_Test-36 fail Logs for x86_64-llvm-18 / test (test_maps, false, 360) / test_maps on x86_64 with llvm-18
bpf/vmtest-bpf-next-VM_Test-39 fail Logs for x86_64-llvm-18 / test (test_progs_no_alu32, false, 360) / test_progs_no_alu32 on x86_64 with llvm-18
bpf/vmtest-bpf-next-VM_Test-37 fail Logs for x86_64-llvm-18 / test (test_progs, false, 360) / test_progs on x86_64 with llvm-18
bpf/vmtest-bpf-next-VM_Test-38 fail Logs for x86_64-llvm-18 / test (test_progs_cpuv4, false, 360) / test_progs_cpuv4 on x86_64 with llvm-18
bpf/vmtest-bpf-next-VM_Test-40 fail Logs for x86_64-llvm-18 / test (test_verifier, false, 360) / test_verifier on x86_64 with llvm-18

Commit Message

Tao Chen Sept. 20, 2024, 3:37 p.m. UTC
No logic changed, like macro BPF_CALL_IMM, add BPF_CALL_FUNC/_FUNC_ARGS
to simplify code.

Signed-off-by: Tao Chen <chen.dylane@gmail.com>
---
 arch/sparc/net/bpf_jit_comp_64.c | 2 +-
 arch/x86/net/bpf_jit_comp.c      | 2 +-
 arch/x86/net/bpf_jit_comp32.c    | 5 ++---
 include/linux/filter.h           | 4 ++++
 kernel/bpf/core.c                | 6 +++---
 5 files changed, 11 insertions(+), 8 deletions(-)

Comments

kernel test robot Sept. 21, 2024, 1:21 a.m. UTC | #1
Hi Tao,

kernel test robot noticed the following build errors:

[auto build test ERROR on bpf-next/master]

url:    https://github.com/intel-lab-lkp/linux/commits/Tao-Chen/bpf-Add-BPF_CALL_FUNC-to-simplify-code/20240920-233936
base:   https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git master
patch link:    https://lore.kernel.org/r/20240920153706.919154-1-chen.dylane%40gmail.com
patch subject: [PATCH bpf-next 2/2] bpf: Add BPF_CALL_FUNC* to simplify code
config: openrisc-defconfig (https://download.01.org/0day-ci/archive/20240921/202409210926.ErxhBmi5-lkp@intel.com/config)
compiler: or1k-linux-gcc (GCC) 14.1.0
reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20240921/202409210926.ErxhBmi5-lkp@intel.com/reproduce)

If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@intel.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202409210926.ErxhBmi5-lkp@intel.com/

All errors (new ones prefixed by >>):

   In file included from kernel/bpf/core.c:21:
   kernel/bpf/core.c: In function '___bpf_prog_run':
>> include/linux/filter.h:464:38: error: called object is not a function or function pointer
     464 | #define BPF_CALL_FUNC(x)        ((x) + (u8 *)__bpf_call_base)
         |                                 ~~~~~^~~~~~~~~~~~~~~~~~~~~~~~
   kernel/bpf/core.c:2010:26: note: in expansion of macro 'BPF_CALL_FUNC'
    2010 |                 BPF_R0 = BPF_CALL_FUNC(insn->imm)(BPF_R1, BPF_R2, BPF_R3,
         |                          ^~~~~~~~~~~~~
   include/linux/filter.h:466:38: error: called object is not a function or function pointer
     466 | #define BPF_CALL_FUNC_ARGS(x)   ((x) + (u8 *)__bpf_call_base_args)
         |                                 ~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   kernel/bpf/core.c:2015:26: note: in expansion of macro 'BPF_CALL_FUNC_ARGS'
    2015 |                 BPF_R0 = BPF_CALL_FUNC_ARGS(insn->imm)(BPF_R1, BPF_R2,
         |                          ^~~~~~~~~~~~~~~~~~


vim +464 include/linux/filter.h

   463	
 > 464	#define BPF_CALL_FUNC(x)	((x) + (u8 *)__bpf_call_base)
   465
kernel test robot Sept. 21, 2024, 1:52 a.m. UTC | #2
Hi Tao,

kernel test robot noticed the following build errors:

[auto build test ERROR on bpf-next/master]

url:    https://github.com/intel-lab-lkp/linux/commits/Tao-Chen/bpf-Add-BPF_CALL_FUNC-to-simplify-code/20240920-233936
base:   https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git master
patch link:    https://lore.kernel.org/r/20240920153706.919154-1-chen.dylane%40gmail.com
patch subject: [PATCH bpf-next 2/2] bpf: Add BPF_CALL_FUNC* to simplify code
config: arm-randconfig-001-20240921 (https://download.01.org/0day-ci/archive/20240921/202409210927.QzQakLAf-lkp@intel.com/config)
compiler: clang version 20.0.0git (https://github.com/llvm/llvm-project 8663a75fa2f31299ab8d1d90288d9df92aadee88)
reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20240921/202409210927.QzQakLAf-lkp@intel.com/reproduce)

If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@intel.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202409210927.QzQakLAf-lkp@intel.com/

All errors (new ones prefixed by >>):

   In file included from kernel/bpf/core.c:21:
   In file included from include/linux/filter.h:9:
   In file included from include/linux/bpf.h:21:
   In file included from include/linux/kallsyms.h:13:
   In file included from include/linux/mm.h:2228:
   include/linux/vmstat.h:517:36: warning: arithmetic between different enumeration types ('enum node_stat_item' and 'enum lru_list') [-Wenum-enum-conversion]
     517 |         return node_stat_name(NR_LRU_BASE + lru) + 3; // skip "nr_"
         |                               ~~~~~~~~~~~ ^ ~~~
>> kernel/bpf/core.c:2010:36: error: called object type 'u8 *' (aka 'unsigned char *') is not a function or function pointer
    2010 |                 BPF_R0 = BPF_CALL_FUNC(insn->imm)(BPF_R1, BPF_R2, BPF_R3,
         |                          ~~~~~~~~~~~~~~~~~~~~~~~~^
   kernel/bpf/core.c:2015:41: error: called object type 'u8 *' (aka 'unsigned char *') is not a function or function pointer
    2015 |                 BPF_R0 = BPF_CALL_FUNC_ARGS(insn->imm)(BPF_R1, BPF_R2,
         |                          ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^
   1 warning and 2 errors generated.


vim +2010 kernel/bpf/core.c

  1744	
  1745	select_insn:
  1746		goto *jumptable[insn->code];
  1747	
  1748		/* Explicitly mask the register-based shift amounts with 63 or 31
  1749		 * to avoid undefined behavior. Normally this won't affect the
  1750		 * generated code, for example, in case of native 64 bit archs such
  1751		 * as x86-64 or arm64, the compiler is optimizing the AND away for
  1752		 * the interpreter. In case of JITs, each of the JIT backends compiles
  1753		 * the BPF shift operations to machine instructions which produce
  1754		 * implementation-defined results in such a case; the resulting
  1755		 * contents of the register may be arbitrary, but program behaviour
  1756		 * as a whole remains defined. In other words, in case of JIT backends,
  1757		 * the AND must /not/ be added to the emitted LSH/RSH/ARSH translation.
  1758		 */
  1759		/* ALU (shifts) */
  1760	#define SHT(OPCODE, OP)					\
  1761		ALU64_##OPCODE##_X:				\
  1762			DST = DST OP (SRC & 63);		\
  1763			CONT;					\
  1764		ALU_##OPCODE##_X:				\
  1765			DST = (u32) DST OP ((u32) SRC & 31);	\
  1766			CONT;					\
  1767		ALU64_##OPCODE##_K:				\
  1768			DST = DST OP IMM;			\
  1769			CONT;					\
  1770		ALU_##OPCODE##_K:				\
  1771			DST = (u32) DST OP (u32) IMM;		\
  1772			CONT;
  1773		/* ALU (rest) */
  1774	#define ALU(OPCODE, OP)					\
  1775		ALU64_##OPCODE##_X:				\
  1776			DST = DST OP SRC;			\
  1777			CONT;					\
  1778		ALU_##OPCODE##_X:				\
  1779			DST = (u32) DST OP (u32) SRC;		\
  1780			CONT;					\
  1781		ALU64_##OPCODE##_K:				\
  1782			DST = DST OP IMM;			\
  1783			CONT;					\
  1784		ALU_##OPCODE##_K:				\
  1785			DST = (u32) DST OP (u32) IMM;		\
  1786			CONT;
  1787		ALU(ADD,  +)
  1788		ALU(SUB,  -)
  1789		ALU(AND,  &)
  1790		ALU(OR,   |)
  1791		ALU(XOR,  ^)
  1792		ALU(MUL,  *)
  1793		SHT(LSH, <<)
  1794		SHT(RSH, >>)
  1795	#undef SHT
  1796	#undef ALU
  1797		ALU_NEG:
  1798			DST = (u32) -DST;
  1799			CONT;
  1800		ALU64_NEG:
  1801			DST = -DST;
  1802			CONT;
  1803		ALU_MOV_X:
  1804			switch (OFF) {
  1805			case 0:
  1806				DST = (u32) SRC;
  1807				break;
  1808			case 8:
  1809				DST = (u32)(s8) SRC;
  1810				break;
  1811			case 16:
  1812				DST = (u32)(s16) SRC;
  1813				break;
  1814			}
  1815			CONT;
  1816		ALU_MOV_K:
  1817			DST = (u32) IMM;
  1818			CONT;
  1819		ALU64_MOV_X:
  1820			switch (OFF) {
  1821			case 0:
  1822				DST = SRC;
  1823				break;
  1824			case 8:
  1825				DST = (s8) SRC;
  1826				break;
  1827			case 16:
  1828				DST = (s16) SRC;
  1829				break;
  1830			case 32:
  1831				DST = (s32) SRC;
  1832				break;
  1833			}
  1834			CONT;
  1835		ALU64_MOV_K:
  1836			DST = IMM;
  1837			CONT;
  1838		LD_IMM_DW:
  1839			DST = (u64) (u32) insn[0].imm | ((u64) (u32) insn[1].imm) << 32;
  1840			insn++;
  1841			CONT;
  1842		ALU_ARSH_X:
  1843			DST = (u64) (u32) (((s32) DST) >> (SRC & 31));
  1844			CONT;
  1845		ALU_ARSH_K:
  1846			DST = (u64) (u32) (((s32) DST) >> IMM);
  1847			CONT;
  1848		ALU64_ARSH_X:
  1849			(*(s64 *) &DST) >>= (SRC & 63);
  1850			CONT;
  1851		ALU64_ARSH_K:
  1852			(*(s64 *) &DST) >>= IMM;
  1853			CONT;
  1854		ALU64_MOD_X:
  1855			switch (OFF) {
  1856			case 0:
  1857				div64_u64_rem(DST, SRC, &AX);
  1858				DST = AX;
  1859				break;
  1860			case 1:
  1861				AX = div64_s64(DST, SRC);
  1862				DST = DST - AX * SRC;
  1863				break;
  1864			}
  1865			CONT;
  1866		ALU_MOD_X:
  1867			switch (OFF) {
  1868			case 0:
  1869				AX = (u32) DST;
  1870				DST = do_div(AX, (u32) SRC);
  1871				break;
  1872			case 1:
  1873				AX = abs((s32)DST);
  1874				AX = do_div(AX, abs((s32)SRC));
  1875				if ((s32)DST < 0)
  1876					DST = (u32)-AX;
  1877				else
  1878					DST = (u32)AX;
  1879				break;
  1880			}
  1881			CONT;
  1882		ALU64_MOD_K:
  1883			switch (OFF) {
  1884			case 0:
  1885				div64_u64_rem(DST, IMM, &AX);
  1886				DST = AX;
  1887				break;
  1888			case 1:
  1889				AX = div64_s64(DST, IMM);
  1890				DST = DST - AX * IMM;
  1891				break;
  1892			}
  1893			CONT;
  1894		ALU_MOD_K:
  1895			switch (OFF) {
  1896			case 0:
  1897				AX = (u32) DST;
  1898				DST = do_div(AX, (u32) IMM);
  1899				break;
  1900			case 1:
  1901				AX = abs((s32)DST);
  1902				AX = do_div(AX, abs((s32)IMM));
  1903				if ((s32)DST < 0)
  1904					DST = (u32)-AX;
  1905				else
  1906					DST = (u32)AX;
  1907				break;
  1908			}
  1909			CONT;
  1910		ALU64_DIV_X:
  1911			switch (OFF) {
  1912			case 0:
  1913				DST = div64_u64(DST, SRC);
  1914				break;
  1915			case 1:
  1916				DST = div64_s64(DST, SRC);
  1917				break;
  1918			}
  1919			CONT;
  1920		ALU_DIV_X:
  1921			switch (OFF) {
  1922			case 0:
  1923				AX = (u32) DST;
  1924				do_div(AX, (u32) SRC);
  1925				DST = (u32) AX;
  1926				break;
  1927			case 1:
  1928				AX = abs((s32)DST);
  1929				do_div(AX, abs((s32)SRC));
  1930				if (((s32)DST < 0) == ((s32)SRC < 0))
  1931					DST = (u32)AX;
  1932				else
  1933					DST = (u32)-AX;
  1934				break;
  1935			}
  1936			CONT;
  1937		ALU64_DIV_K:
  1938			switch (OFF) {
  1939			case 0:
  1940				DST = div64_u64(DST, IMM);
  1941				break;
  1942			case 1:
  1943				DST = div64_s64(DST, IMM);
  1944				break;
  1945			}
  1946			CONT;
  1947		ALU_DIV_K:
  1948			switch (OFF) {
  1949			case 0:
  1950				AX = (u32) DST;
  1951				do_div(AX, (u32) IMM);
  1952				DST = (u32) AX;
  1953				break;
  1954			case 1:
  1955				AX = abs((s32)DST);
  1956				do_div(AX, abs((s32)IMM));
  1957				if (((s32)DST < 0) == ((s32)IMM < 0))
  1958					DST = (u32)AX;
  1959				else
  1960					DST = (u32)-AX;
  1961				break;
  1962			}
  1963			CONT;
  1964		ALU_END_TO_BE:
  1965			switch (IMM) {
  1966			case 16:
  1967				DST = (__force u16) cpu_to_be16(DST);
  1968				break;
  1969			case 32:
  1970				DST = (__force u32) cpu_to_be32(DST);
  1971				break;
  1972			case 64:
  1973				DST = (__force u64) cpu_to_be64(DST);
  1974				break;
  1975			}
  1976			CONT;
  1977		ALU_END_TO_LE:
  1978			switch (IMM) {
  1979			case 16:
  1980				DST = (__force u16) cpu_to_le16(DST);
  1981				break;
  1982			case 32:
  1983				DST = (__force u32) cpu_to_le32(DST);
  1984				break;
  1985			case 64:
  1986				DST = (__force u64) cpu_to_le64(DST);
  1987				break;
  1988			}
  1989			CONT;
  1990		ALU64_END_TO_LE:
  1991			switch (IMM) {
  1992			case 16:
  1993				DST = (__force u16) __swab16(DST);
  1994				break;
  1995			case 32:
  1996				DST = (__force u32) __swab32(DST);
  1997				break;
  1998			case 64:
  1999				DST = (__force u64) __swab64(DST);
  2000				break;
  2001			}
  2002			CONT;
  2003	
  2004		/* CALL */
  2005		JMP_CALL:
  2006			/* Function call scratches BPF_R1-BPF_R5 registers,
  2007			 * preserves BPF_R6-BPF_R9, and stores return value
  2008			 * into BPF_R0.
  2009			 */
> 2010			BPF_R0 = BPF_CALL_FUNC(insn->imm)(BPF_R1, BPF_R2, BPF_R3,
  2011							       BPF_R4, BPF_R5);
  2012			CONT;
  2013	
  2014		JMP_CALL_ARGS:
  2015			BPF_R0 = BPF_CALL_FUNC_ARGS(insn->imm)(BPF_R1, BPF_R2,
  2016								    BPF_R3, BPF_R4,
  2017								    BPF_R5,
  2018								    insn + insn->off + 1);
  2019			CONT;
  2020	
  2021		JMP_TAIL_CALL: {
  2022			struct bpf_map *map = (struct bpf_map *) (unsigned long) BPF_R2;
  2023			struct bpf_array *array = container_of(map, struct bpf_array, map);
  2024			struct bpf_prog *prog;
  2025			u32 index = BPF_R3;
  2026	
  2027			if (unlikely(index >= array->map.max_entries))
  2028				goto out;
  2029	
  2030			if (unlikely(tail_call_cnt >= MAX_TAIL_CALL_CNT))
  2031				goto out;
  2032	
  2033			tail_call_cnt++;
  2034	
  2035			prog = READ_ONCE(array->ptrs[index]);
  2036			if (!prog)
  2037				goto out;
  2038	
  2039			/* ARG1 at this point is guaranteed to point to CTX from
  2040			 * the verifier side due to the fact that the tail call is
  2041			 * handled like a helper, that is, bpf_tail_call_proto,
  2042			 * where arg1_type is ARG_PTR_TO_CTX.
  2043			 */
  2044			insn = prog->insnsi;
  2045			goto select_insn;
  2046	out:
  2047			CONT;
  2048		}
  2049		JMP_JA:
  2050			insn += insn->off;
  2051			CONT;
  2052		JMP32_JA:
  2053			insn += insn->imm;
  2054			CONT;
  2055		JMP_EXIT:
  2056			return BPF_R0;
  2057		/* JMP */
  2058	#define COND_JMP(SIGN, OPCODE, CMP_OP)				\
  2059		JMP_##OPCODE##_X:					\
  2060			if ((SIGN##64) DST CMP_OP (SIGN##64) SRC) {	\
  2061				insn += insn->off;			\
  2062				CONT_JMP;				\
  2063			}						\
  2064			CONT;						\
  2065		JMP32_##OPCODE##_X:					\
  2066			if ((SIGN##32) DST CMP_OP (SIGN##32) SRC) {	\
  2067				insn += insn->off;			\
  2068				CONT_JMP;				\
  2069			}						\
  2070			CONT;						\
  2071		JMP_##OPCODE##_K:					\
  2072			if ((SIGN##64) DST CMP_OP (SIGN##64) IMM) {	\
  2073				insn += insn->off;			\
  2074				CONT_JMP;				\
  2075			}						\
  2076			CONT;						\
  2077		JMP32_##OPCODE##_K:					\
  2078			if ((SIGN##32) DST CMP_OP (SIGN##32) IMM) {	\
  2079				insn += insn->off;			\
  2080				CONT_JMP;				\
  2081			}						\
  2082			CONT;
  2083		COND_JMP(u, JEQ, ==)
  2084		COND_JMP(u, JNE, !=)
  2085		COND_JMP(u, JGT, >)
  2086		COND_JMP(u, JLT, <)
  2087		COND_JMP(u, JGE, >=)
  2088		COND_JMP(u, JLE, <=)
  2089		COND_JMP(u, JSET, &)
  2090		COND_JMP(s, JSGT, >)
  2091		COND_JMP(s, JSLT, <)
  2092		COND_JMP(s, JSGE, >=)
  2093		COND_JMP(s, JSLE, <=)
  2094	#undef COND_JMP
  2095		/* ST, STX and LDX*/
  2096		ST_NOSPEC:
  2097			/* Speculation barrier for mitigating Speculative Store Bypass.
  2098			 * In case of arm64, we rely on the firmware mitigation as
  2099			 * controlled via the ssbd kernel parameter. Whenever the
  2100			 * mitigation is enabled, it works for all of the kernel code
  2101			 * with no need to provide any additional instructions here.
  2102			 * In case of x86, we use 'lfence' insn for mitigation. We
  2103			 * reuse preexisting logic from Spectre v1 mitigation that
  2104			 * happens to produce the required code on x86 for v4 as well.
  2105			 */
  2106			barrier_nospec();
  2107			CONT;
  2108	#define LDST(SIZEOP, SIZE)						\
  2109		STX_MEM_##SIZEOP:						\
  2110			*(SIZE *)(unsigned long) (DST + insn->off) = SRC;	\
  2111			CONT;							\
  2112		ST_MEM_##SIZEOP:						\
  2113			*(SIZE *)(unsigned long) (DST + insn->off) = IMM;	\
  2114			CONT;							\
  2115		LDX_MEM_##SIZEOP:						\
  2116			DST = *(SIZE *)(unsigned long) (SRC + insn->off);	\
  2117			CONT;							\
  2118		LDX_PROBE_MEM_##SIZEOP:						\
  2119			bpf_probe_read_kernel_common(&DST, sizeof(SIZE),	\
  2120				      (const void *)(long) (SRC + insn->off));	\
  2121			DST = *((SIZE *)&DST);					\
  2122			CONT;
  2123	
  2124		LDST(B,   u8)
  2125		LDST(H,  u16)
  2126		LDST(W,  u32)
  2127		LDST(DW, u64)
  2128	#undef LDST
  2129
Tao Chen Sept. 21, 2024, 3:19 a.m. UTC | #3
在 2024/9/21 09:52, kernel test robot 写道:
> Hi Tao,
> 
> kernel test robot noticed the following build errors:
> 
> [auto build test ERROR on bpf-next/master]
> 
> url:    https://github.com/intel-lab-lkp/linux/commits/Tao-Chen/bpf-Add-BPF_CALL_FUNC-to-simplify-code/20240920-233936
> base:   https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git master
> patch link:    https://lore.kernel.org/r/20240920153706.919154-1-chen.dylane%40gmail.com
> patch subject: [PATCH bpf-next 2/2] bpf: Add BPF_CALL_FUNC* to simplify code
> config: arm-randconfig-001-20240921 (https://download.01.org/0day-ci/archive/20240921/202409210927.QzQakLAf-lkp@intel.com/config)
> compiler: clang version 20.0.0git (https://github.com/llvm/llvm-project 8663a75fa2f31299ab8d1d90288d9df92aadee88)
> reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20240921/202409210927.QzQakLAf-lkp@intel.com/reproduce)
> 
> If you fix the issue in a separate patch/commit (i.e. not just a new version of
> the same patch/commit), kindly add following tags
> | Reported-by: kernel test robot <lkp@intel.com>
> | Closes: https://lore.kernel.org/oe-kbuild-all/202409210927.QzQakLAf-lkp@intel.com/
> 
> All errors (new ones prefixed by >>):
> 
>     In file included from kernel/bpf/core.c:21:
>     In file included from include/linux/filter.h:9:
>     In file included from include/linux/bpf.h:21:
>     In file included from include/linux/kallsyms.h:13:
>     In file included from include/linux/mm.h:2228:
>     include/linux/vmstat.h:517:36: warning: arithmetic between different enumeration types ('enum node_stat_item' and 'enum lru_list') [-Wenum-enum-conversion]
>       517 |         return node_stat_name(NR_LRU_BASE + lru) + 3; // skip "nr_"
>           |                               ~~~~~~~~~~~ ^ ~~~
>>> kernel/bpf/core.c:2010:36: error: called object type 'u8 *' (aka 'unsigned char *') is not a function or function pointer
>      2010 |                 BPF_R0 = BPF_CALL_FUNC(insn->imm)(BPF_R1, BPF_R2, BPF_R3,
>           |                          ~~~~~~~~~~~~~~~~~~~~~~~~^
>     kernel/bpf/core.c:2015:41: error: called object type 'u8 *' (aka 'unsigned char *') is not a function or function pointer
>      2015 |                 BPF_R0 = BPF_CALL_FUNC_ARGS(insn->imm)(BPF_R1, BPF_R2,
>           |                          ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^
>     1 warning and 2 errors generated.
> 
> 

My bad, the bot+bpf-ci seems no problem, i will check this issue, thank 
you for your reminder.

> vim +2010 kernel/bpf/core.c
> 
>    1744	
>    1745	select_insn:
>    1746		goto *jumptable[insn->code];
>    1747	
>    1748		/* Explicitly mask the register-based shift amounts with 63 or 31
>    1749		 * to avoid undefined behavior. Normally this won't affect the
>    1750		 * generated code, for example, in case of native 64 bit archs such
>    1751		 * as x86-64 or arm64, the compiler is optimizing the AND away for
>    1752		 * the interpreter. In case of JITs, each of the JIT backends compiles
>    1753		 * the BPF shift operations to machine instructions which produce
>    1754		 * implementation-defined results in such a case; the resulting
>    1755		 * contents of the register may be arbitrary, but program behaviour
>    1756		 * as a whole remains defined. In other words, in case of JIT backends,
>    1757		 * the AND must /not/ be added to the emitted LSH/RSH/ARSH translation.
>    1758		 */
>    1759		/* ALU (shifts) */
>    1760	#define SHT(OPCODE, OP)					\
>    1761		ALU64_##OPCODE##_X:				\
>    1762			DST = DST OP (SRC & 63);		\
>    1763			CONT;					\
>    1764		ALU_##OPCODE##_X:				\
>    1765			DST = (u32) DST OP ((u32) SRC & 31);	\
>    1766			CONT;					\
>    1767		ALU64_##OPCODE##_K:				\
>    1768			DST = DST OP IMM;			\
>    1769			CONT;					\
>    1770		ALU_##OPCODE##_K:				\
>    1771			DST = (u32) DST OP (u32) IMM;		\
>    1772			CONT;
>    1773		/* ALU (rest) */
>    1774	#define ALU(OPCODE, OP)					\
>    1775		ALU64_##OPCODE##_X:				\
>    1776			DST = DST OP SRC;			\
>    1777			CONT;					\
>    1778		ALU_##OPCODE##_X:				\
>    1779			DST = (u32) DST OP (u32) SRC;		\
>    1780			CONT;					\
>    1781		ALU64_##OPCODE##_K:				\
>    1782			DST = DST OP IMM;			\
>    1783			CONT;					\
>    1784		ALU_##OPCODE##_K:				\
>    1785			DST = (u32) DST OP (u32) IMM;		\
>    1786			CONT;
>    1787		ALU(ADD,  +)
>    1788		ALU(SUB,  -)
>    1789		ALU(AND,  &)
>    1790		ALU(OR,   |)
>    1791		ALU(XOR,  ^)
>    1792		ALU(MUL,  *)
>    1793		SHT(LSH, <<)
>    1794		SHT(RSH, >>)
>    1795	#undef SHT
>    1796	#undef ALU
>    1797		ALU_NEG:
>    1798			DST = (u32) -DST;
>    1799			CONT;
>    1800		ALU64_NEG:
>    1801			DST = -DST;
>    1802			CONT;
>    1803		ALU_MOV_X:
>    1804			switch (OFF) {
>    1805			case 0:
>    1806				DST = (u32) SRC;
>    1807				break;
>    1808			case 8:
>    1809				DST = (u32)(s8) SRC;
>    1810				break;
>    1811			case 16:
>    1812				DST = (u32)(s16) SRC;
>    1813				break;
>    1814			}
>    1815			CONT;
>    1816		ALU_MOV_K:
>    1817			DST = (u32) IMM;
>    1818			CONT;
>    1819		ALU64_MOV_X:
>    1820			switch (OFF) {
>    1821			case 0:
>    1822				DST = SRC;
>    1823				break;
>    1824			case 8:
>    1825				DST = (s8) SRC;
>    1826				break;
>    1827			case 16:
>    1828				DST = (s16) SRC;
>    1829				break;
>    1830			case 32:
>    1831				DST = (s32) SRC;
>    1832				break;
>    1833			}
>    1834			CONT;
>    1835		ALU64_MOV_K:
>    1836			DST = IMM;
>    1837			CONT;
>    1838		LD_IMM_DW:
>    1839			DST = (u64) (u32) insn[0].imm | ((u64) (u32) insn[1].imm) << 32;
>    1840			insn++;
>    1841			CONT;
>    1842		ALU_ARSH_X:
>    1843			DST = (u64) (u32) (((s32) DST) >> (SRC & 31));
>    1844			CONT;
>    1845		ALU_ARSH_K:
>    1846			DST = (u64) (u32) (((s32) DST) >> IMM);
>    1847			CONT;
>    1848		ALU64_ARSH_X:
>    1849			(*(s64 *) &DST) >>= (SRC & 63);
>    1850			CONT;
>    1851		ALU64_ARSH_K:
>    1852			(*(s64 *) &DST) >>= IMM;
>    1853			CONT;
>    1854		ALU64_MOD_X:
>    1855			switch (OFF) {
>    1856			case 0:
>    1857				div64_u64_rem(DST, SRC, &AX);
>    1858				DST = AX;
>    1859				break;
>    1860			case 1:
>    1861				AX = div64_s64(DST, SRC);
>    1862				DST = DST - AX * SRC;
>    1863				break;
>    1864			}
>    1865			CONT;
>    1866		ALU_MOD_X:
>    1867			switch (OFF) {
>    1868			case 0:
>    1869				AX = (u32) DST;
>    1870				DST = do_div(AX, (u32) SRC);
>    1871				break;
>    1872			case 1:
>    1873				AX = abs((s32)DST);
>    1874				AX = do_div(AX, abs((s32)SRC));
>    1875				if ((s32)DST < 0)
>    1876					DST = (u32)-AX;
>    1877				else
>    1878					DST = (u32)AX;
>    1879				break;
>    1880			}
>    1881			CONT;
>    1882		ALU64_MOD_K:
>    1883			switch (OFF) {
>    1884			case 0:
>    1885				div64_u64_rem(DST, IMM, &AX);
>    1886				DST = AX;
>    1887				break;
>    1888			case 1:
>    1889				AX = div64_s64(DST, IMM);
>    1890				DST = DST - AX * IMM;
>    1891				break;
>    1892			}
>    1893			CONT;
>    1894		ALU_MOD_K:
>    1895			switch (OFF) {
>    1896			case 0:
>    1897				AX = (u32) DST;
>    1898				DST = do_div(AX, (u32) IMM);
>    1899				break;
>    1900			case 1:
>    1901				AX = abs((s32)DST);
>    1902				AX = do_div(AX, abs((s32)IMM));
>    1903				if ((s32)DST < 0)
>    1904					DST = (u32)-AX;
>    1905				else
>    1906					DST = (u32)AX;
>    1907				break;
>    1908			}
>    1909			CONT;
>    1910		ALU64_DIV_X:
>    1911			switch (OFF) {
>    1912			case 0:
>    1913				DST = div64_u64(DST, SRC);
>    1914				break;
>    1915			case 1:
>    1916				DST = div64_s64(DST, SRC);
>    1917				break;
>    1918			}
>    1919			CONT;
>    1920		ALU_DIV_X:
>    1921			switch (OFF) {
>    1922			case 0:
>    1923				AX = (u32) DST;
>    1924				do_div(AX, (u32) SRC);
>    1925				DST = (u32) AX;
>    1926				break;
>    1927			case 1:
>    1928				AX = abs((s32)DST);
>    1929				do_div(AX, abs((s32)SRC));
>    1930				if (((s32)DST < 0) == ((s32)SRC < 0))
>    1931					DST = (u32)AX;
>    1932				else
>    1933					DST = (u32)-AX;
>    1934				break;
>    1935			}
>    1936			CONT;
>    1937		ALU64_DIV_K:
>    1938			switch (OFF) {
>    1939			case 0:
>    1940				DST = div64_u64(DST, IMM);
>    1941				break;
>    1942			case 1:
>    1943				DST = div64_s64(DST, IMM);
>    1944				break;
>    1945			}
>    1946			CONT;
>    1947		ALU_DIV_K:
>    1948			switch (OFF) {
>    1949			case 0:
>    1950				AX = (u32) DST;
>    1951				do_div(AX, (u32) IMM);
>    1952				DST = (u32) AX;
>    1953				break;
>    1954			case 1:
>    1955				AX = abs((s32)DST);
>    1956				do_div(AX, abs((s32)IMM));
>    1957				if (((s32)DST < 0) == ((s32)IMM < 0))
>    1958					DST = (u32)AX;
>    1959				else
>    1960					DST = (u32)-AX;
>    1961				break;
>    1962			}
>    1963			CONT;
>    1964		ALU_END_TO_BE:
>    1965			switch (IMM) {
>    1966			case 16:
>    1967				DST = (__force u16) cpu_to_be16(DST);
>    1968				break;
>    1969			case 32:
>    1970				DST = (__force u32) cpu_to_be32(DST);
>    1971				break;
>    1972			case 64:
>    1973				DST = (__force u64) cpu_to_be64(DST);
>    1974				break;
>    1975			}
>    1976			CONT;
>    1977		ALU_END_TO_LE:
>    1978			switch (IMM) {
>    1979			case 16:
>    1980				DST = (__force u16) cpu_to_le16(DST);
>    1981				break;
>    1982			case 32:
>    1983				DST = (__force u32) cpu_to_le32(DST);
>    1984				break;
>    1985			case 64:
>    1986				DST = (__force u64) cpu_to_le64(DST);
>    1987				break;
>    1988			}
>    1989			CONT;
>    1990		ALU64_END_TO_LE:
>    1991			switch (IMM) {
>    1992			case 16:
>    1993				DST = (__force u16) __swab16(DST);
>    1994				break;
>    1995			case 32:
>    1996				DST = (__force u32) __swab32(DST);
>    1997				break;
>    1998			case 64:
>    1999				DST = (__force u64) __swab64(DST);
>    2000				break;
>    2001			}
>    2002			CONT;
>    2003	
>    2004		/* CALL */
>    2005		JMP_CALL:
>    2006			/* Function call scratches BPF_R1-BPF_R5 registers,
>    2007			 * preserves BPF_R6-BPF_R9, and stores return value
>    2008			 * into BPF_R0.
>    2009			 */
>> 2010			BPF_R0 = BPF_CALL_FUNC(insn->imm)(BPF_R1, BPF_R2, BPF_R3,
>    2011							       BPF_R4, BPF_R5);
>    2012			CONT;
>    2013	
>    2014		JMP_CALL_ARGS:
>    2015			BPF_R0 = BPF_CALL_FUNC_ARGS(insn->imm)(BPF_R1, BPF_R2,
>    2016								    BPF_R3, BPF_R4,
>    2017								    BPF_R5,
>    2018								    insn + insn->off + 1);
>    2019			CONT;
>    2020	
>    2021		JMP_TAIL_CALL: {
>    2022			struct bpf_map *map = (struct bpf_map *) (unsigned long) BPF_R2;
>    2023			struct bpf_array *array = container_of(map, struct bpf_array, map);
>    2024			struct bpf_prog *prog;
>    2025			u32 index = BPF_R3;
>    2026	
>    2027			if (unlikely(index >= array->map.max_entries))
>    2028				goto out;
>    2029	
>    2030			if (unlikely(tail_call_cnt >= MAX_TAIL_CALL_CNT))
>    2031				goto out;
>    2032	
>    2033			tail_call_cnt++;
>    2034	
>    2035			prog = READ_ONCE(array->ptrs[index]);
>    2036			if (!prog)
>    2037				goto out;
>    2038	
>    2039			/* ARG1 at this point is guaranteed to point to CTX from
>    2040			 * the verifier side due to the fact that the tail call is
>    2041			 * handled like a helper, that is, bpf_tail_call_proto,
>    2042			 * where arg1_type is ARG_PTR_TO_CTX.
>    2043			 */
>    2044			insn = prog->insnsi;
>    2045			goto select_insn;
>    2046	out:
>    2047			CONT;
>    2048		}
>    2049		JMP_JA:
>    2050			insn += insn->off;
>    2051			CONT;
>    2052		JMP32_JA:
>    2053			insn += insn->imm;
>    2054			CONT;
>    2055		JMP_EXIT:
>    2056			return BPF_R0;
>    2057		/* JMP */
>    2058	#define COND_JMP(SIGN, OPCODE, CMP_OP)				\
>    2059		JMP_##OPCODE##_X:					\
>    2060			if ((SIGN##64) DST CMP_OP (SIGN##64) SRC) {	\
>    2061				insn += insn->off;			\
>    2062				CONT_JMP;				\
>    2063			}						\
>    2064			CONT;						\
>    2065		JMP32_##OPCODE##_X:					\
>    2066			if ((SIGN##32) DST CMP_OP (SIGN##32) SRC) {	\
>    2067				insn += insn->off;			\
>    2068				CONT_JMP;				\
>    2069			}						\
>    2070			CONT;						\
>    2071		JMP_##OPCODE##_K:					\
>    2072			if ((SIGN##64) DST CMP_OP (SIGN##64) IMM) {	\
>    2073				insn += insn->off;			\
>    2074				CONT_JMP;				\
>    2075			}						\
>    2076			CONT;						\
>    2077		JMP32_##OPCODE##_K:					\
>    2078			if ((SIGN##32) DST CMP_OP (SIGN##32) IMM) {	\
>    2079				insn += insn->off;			\
>    2080				CONT_JMP;				\
>    2081			}						\
>    2082			CONT;
>    2083		COND_JMP(u, JEQ, ==)
>    2084		COND_JMP(u, JNE, !=)
>    2085		COND_JMP(u, JGT, >)
>    2086		COND_JMP(u, JLT, <)
>    2087		COND_JMP(u, JGE, >=)
>    2088		COND_JMP(u, JLE, <=)
>    2089		COND_JMP(u, JSET, &)
>    2090		COND_JMP(s, JSGT, >)
>    2091		COND_JMP(s, JSLT, <)
>    2092		COND_JMP(s, JSGE, >=)
>    2093		COND_JMP(s, JSLE, <=)
>    2094	#undef COND_JMP
>    2095		/* ST, STX and LDX*/
>    2096		ST_NOSPEC:
>    2097			/* Speculation barrier for mitigating Speculative Store Bypass.
>    2098			 * In case of arm64, we rely on the firmware mitigation as
>    2099			 * controlled via the ssbd kernel parameter. Whenever the
>    2100			 * mitigation is enabled, it works for all of the kernel code
>    2101			 * with no need to provide any additional instructions here.
>    2102			 * In case of x86, we use 'lfence' insn for mitigation. We
>    2103			 * reuse preexisting logic from Spectre v1 mitigation that
>    2104			 * happens to produce the required code on x86 for v4 as well.
>    2105			 */
>    2106			barrier_nospec();
>    2107			CONT;
>    2108	#define LDST(SIZEOP, SIZE)						\
>    2109		STX_MEM_##SIZEOP:						\
>    2110			*(SIZE *)(unsigned long) (DST + insn->off) = SRC;	\
>    2111			CONT;							\
>    2112		ST_MEM_##SIZEOP:						\
>    2113			*(SIZE *)(unsigned long) (DST + insn->off) = IMM;	\
>    2114			CONT;							\
>    2115		LDX_MEM_##SIZEOP:						\
>    2116			DST = *(SIZE *)(unsigned long) (SRC + insn->off);	\
>    2117			CONT;							\
>    2118		LDX_PROBE_MEM_##SIZEOP:						\
>    2119			bpf_probe_read_kernel_common(&DST, sizeof(SIZE),	\
>    2120				      (const void *)(long) (SRC + insn->off));	\
>    2121			DST = *((SIZE *)&DST);					\
>    2122			CONT;
>    2123	
>    2124		LDST(B,   u8)
>    2125		LDST(H,  u16)
>    2126		LDST(W,  u32)
>    2127		LDST(DW, u64)
>    2128	#undef LDST
>    2129	
>
kernel test robot Sept. 22, 2024, 7:36 p.m. UTC | #4
Hi Tao,

kernel test robot noticed the following build warnings:

[auto build test WARNING on bpf-next/master]

url:    https://github.com/intel-lab-lkp/linux/commits/Tao-Chen/bpf-Add-BPF_CALL_FUNC-to-simplify-code/20240920-233936
base:   https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git master
patch link:    https://lore.kernel.org/r/20240920153706.919154-1-chen.dylane%40gmail.com
patch subject: [PATCH bpf-next 2/2] bpf: Add BPF_CALL_FUNC* to simplify code
config: mips-mtx1_defconfig (https://download.01.org/0day-ci/archive/20240923/202409230306.7OGURpiH-lkp@intel.com/config)
compiler: clang version 16.0.6 (https://github.com/llvm/llvm-project 7cbf1a2591520c2491aa35339f227775f4d3adf6)
reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20240923/202409230306.7OGURpiH-lkp@intel.com/reproduce)

If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@intel.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202409230306.7OGURpiH-lkp@intel.com/

All warnings (new ones prefixed by >>):

   kernel/bpf/core.c:2010:36: error: called object type 'u8 *' (aka 'unsigned char *') is not a function or function pointer
                   BPF_R0 = BPF_CALL_FUNC(insn->imm)(BPF_R1, BPF_R2, BPF_R3,
                            ~~~~~~~~~~~~~~~~~~~~~~~~^
   kernel/bpf/core.c:2015:41: error: called object type 'u8 *' (aka 'unsigned char *') is not a function or function pointer
                   BPF_R0 = BPF_CALL_FUNC_ARGS(insn->imm)(BPF_R1, BPF_R2,
                            ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^
   In file included from kernel/bpf/core.c:3079:
   In file included from include/linux/bpf_trace.h:5:
   In file included from include/trace/events/xdp.h:427:
   In file included from include/trace/define_trace.h:102:
   In file included from include/trace/trace_events.h:21:
   In file included from include/linux/trace_events.h:6:
   In file included from include/linux/ring_buffer.h:7:
>> include/linux/poll.h:136:27: warning: division by zero is undefined [-Wdivision-by-zero]
                   M(RDNORM) | M(RDBAND) | M(WRNORM) | M(WRBAND) |
                                           ^~~~~~~~~
   include/linux/poll.h:134:32: note: expanded from macro 'M'
   #define M(X) (__force __poll_t)__MAP(val, POLL##X, (__force __u16)EPOLL##X)
                                  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/poll.h:120:51: note: expanded from macro '__MAP'
           (from < to ? (v & from) * (to/from) : (v & from) / (from/to))
                                                            ^ ~~~~~~~~~
   include/linux/poll.h:136:39: warning: division by zero is undefined [-Wdivision-by-zero]
                   M(RDNORM) | M(RDBAND) | M(WRNORM) | M(WRBAND) |
                                                       ^~~~~~~~~
   include/linux/poll.h:134:32: note: expanded from macro 'M'
   #define M(X) (__force __poll_t)__MAP(val, POLL##X, (__force __u16)EPOLL##X)
                                  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/poll.h:120:51: note: expanded from macro '__MAP'
           (from < to ? (v & from) * (to/from) : (v & from) / (from/to))
                                                            ^ ~~~~~~~~~
   2 warnings and 2 errors generated.


vim +136 include/linux/poll.h

7a163b2195cda0 Al Viro 2018-02-01  131  
7a163b2195cda0 Al Viro 2018-02-01  132  static inline __poll_t demangle_poll(u16 val)
7a163b2195cda0 Al Viro 2018-02-01  133  {
7a163b2195cda0 Al Viro 2018-02-01  134  #define M(X) (__force __poll_t)__MAP(val, POLL##X, (__force __u16)EPOLL##X)
7a163b2195cda0 Al Viro 2018-02-01  135  	return M(IN) | M(OUT) | M(PRI) | M(ERR) | M(NVAL) |
7a163b2195cda0 Al Viro 2018-02-01 @136  		M(RDNORM) | M(RDBAND) | M(WRNORM) | M(WRBAND) |
7a163b2195cda0 Al Viro 2018-02-01  137  		M(HUP) | M(RDHUP) | M(MSG);
7a163b2195cda0 Al Viro 2018-02-01  138  #undef M
7a163b2195cda0 Al Viro 2018-02-01  139  }
7a163b2195cda0 Al Viro 2018-02-01  140  #undef __MAP
7a163b2195cda0 Al Viro 2018-02-01  141  
7a163b2195cda0 Al Viro 2018-02-01  142
diff mbox series

Patch

diff --git a/arch/sparc/net/bpf_jit_comp_64.c b/arch/sparc/net/bpf_jit_comp_64.c
index 73bf0aea8baf..076b1f216360 100644
--- a/arch/sparc/net/bpf_jit_comp_64.c
+++ b/arch/sparc/net/bpf_jit_comp_64.c
@@ -1213,7 +1213,7 @@  static int build_insn(const struct bpf_insn *insn, struct jit_ctx *ctx)
 	/* function call */
 	case BPF_JMP | BPF_CALL:
 	{
-		u8 *func = ((u8 *)__bpf_call_base) + imm;
+		u8 *func = BPF_CALL_FUNC(imm);
 
 		ctx->saw_call = true;
 
diff --git a/arch/x86/net/bpf_jit_comp.c b/arch/x86/net/bpf_jit_comp.c
index 06b080b61aa5..052e5cc65fc0 100644
--- a/arch/x86/net/bpf_jit_comp.c
+++ b/arch/x86/net/bpf_jit_comp.c
@@ -2126,7 +2126,7 @@  st:			if (is_imm8(insn->off))
 		case BPF_JMP | BPF_CALL: {
 			u8 *ip = image + addrs[i - 1];
 
-			func = (u8 *) __bpf_call_base + imm32;
+			func = BPF_CALL_FUNC(imm32);
 			if (tail_call_reachable) {
 				LOAD_TAIL_CALL_CNT_PTR(bpf_prog->aux->stack_depth);
 				ip += 7;
diff --git a/arch/x86/net/bpf_jit_comp32.c b/arch/x86/net/bpf_jit_comp32.c
index de0f9e5f9f73..f7277639bd2c 100644
--- a/arch/x86/net/bpf_jit_comp32.c
+++ b/arch/x86/net/bpf_jit_comp32.c
@@ -1627,8 +1627,7 @@  static int emit_kfunc_call(const struct bpf_prog *bpf_prog, u8 *end_addr,
 	/* mov dword ptr [ebp+off],eax */
 	if (fm->ret_size)
 		end_addr -= 3;
-
-	jmp_offset = (u8 *)__bpf_call_base + insn->imm - end_addr;
+	jmp_offset = BPF_CALL_FUNC(insn->imm) - end_addr;
 	if (!is_simm32(jmp_offset)) {
 		pr_err("unsupported BPF kernel function jmp_offset:%lld\n",
 		       jmp_offset);
@@ -2103,7 +2102,7 @@  static int do_jit(struct bpf_prog *bpf_prog, int *addrs, u8 *image,
 				break;
 			}
 
-			func = (u8 *) __bpf_call_base + imm32;
+			func = BPF_CALL_FUNC(imm32);
 			jmp_offset = func - (image + addrs[i]);
 
 			if (!imm32 || !is_simm32(jmp_offset)) {
diff --git a/include/linux/filter.h b/include/linux/filter.h
index 99b6fc83825b..d06526decc6d 100644
--- a/include/linux/filter.h
+++ b/include/linux/filter.h
@@ -461,6 +461,10 @@  static inline bool insn_is_cast_user(const struct bpf_insn *insn)
 
 #define BPF_CALL_IMM(x)	((void *)(x) - (void *)__bpf_call_base)
 
+#define BPF_CALL_FUNC(x)	((x) + (u8 *)__bpf_call_base)
+
+#define BPF_CALL_FUNC_ARGS(x)	((x) + (u8 *)__bpf_call_base_args)
+
 #define BPF_EMIT_CALL(FUNC)					\
 	((struct bpf_insn) {					\
 		.code  = BPF_JMP | BPF_CALL,			\
diff --git a/kernel/bpf/core.c b/kernel/bpf/core.c
index 4e07cc057d6f..f965f0d586f3 100644
--- a/kernel/bpf/core.c
+++ b/kernel/bpf/core.c
@@ -1278,7 +1278,7 @@  int bpf_jit_get_func_addr(const struct bpf_prog *prog,
 		 * and the helper with imm relative to it are both in core
 		 * kernel.
 		 */
-		addr = (u8 *)__bpf_call_base + imm;
+		addr = BPF_CALL_FUNC(imm);
 	}
 
 	*func_addr = (unsigned long)addr;
@@ -2007,12 +2007,12 @@  static u64 ___bpf_prog_run(u64 *regs, const struct bpf_insn *insn)
 		 * preserves BPF_R6-BPF_R9, and stores return value
 		 * into BPF_R0.
 		 */
-		BPF_R0 = (__bpf_call_base + insn->imm)(BPF_R1, BPF_R2, BPF_R3,
+		BPF_R0 = BPF_CALL_FUNC(insn->imm)(BPF_R1, BPF_R2, BPF_R3,
 						       BPF_R4, BPF_R5);
 		CONT;
 
 	JMP_CALL_ARGS:
-		BPF_R0 = (__bpf_call_base_args + insn->imm)(BPF_R1, BPF_R2,
+		BPF_R0 = BPF_CALL_FUNC_ARGS(insn->imm)(BPF_R1, BPF_R2,
 							    BPF_R3, BPF_R4,
 							    BPF_R5,
 							    insn + insn->off + 1);