From: kernel test robot <lkp@intel.com>
To: Ihor Solodrai <ihor.solodrai@linux.dev>,
bpf@vger.kernel.org, andrii@kernel.org, ast@kernel.org
Cc: llvm@lists.linux.dev, oe-kbuild-all@lists.linux.dev,
dwarves@vger.kernel.org, alan.maguire@oracle.com,
acme@kernel.org, eddyz87@gmail.com, tj@kernel.org,
kernel-team@meta.com
Subject: Re: [PATCH bpf-next v1 3/8] bpf: Support for kfuncs with KF_MAGIC_ARGS
Date: Thu, 30 Oct 2025 21:54:58 +0800 [thread overview]
Message-ID: <202510302139.fAmMKkDb-lkp@intel.com> (raw)
In-Reply-To: <20251029190113.3323406-4-ihor.solodrai@linux.dev>
Hi Ihor,
kernel test robot noticed the following build errors:
[auto build test ERROR on bpf-next/master]
url: https://github.com/intel-lab-lkp/linux/commits/Ihor-Solodrai/bpf-Add-BTF_ID_LIST_END-and-BTF_ID_LIST_SIZE-macros/20251030-030608
base: https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git master
patch link: https://lore.kernel.org/r/20251029190113.3323406-4-ihor.solodrai%40linux.dev
patch subject: [PATCH bpf-next v1 3/8] bpf: Support for kfuncs with KF_MAGIC_ARGS
config: s390-randconfig-001-20251030 (https://download.01.org/0day-ci/archive/20251030/202510302139.fAmMKkDb-lkp@intel.com/config)
compiler: clang version 17.0.6 (https://github.com/llvm/llvm-project 6009708b4367171ccdbf4b5905cb6a803753fe18)
reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20251030/202510302139.fAmMKkDb-lkp@intel.com/reproduce)
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@intel.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202510302139.fAmMKkDb-lkp@intel.com/
All errors (new ones prefixed by >>):
kernel/bpf/verifier.c:3273:1: error: invalid storage class specifier in function declarator
3273 | static s32 magic_kfunc_by_impl(s32 impl_func_id)
| ^
kernel/bpf/verifier.c:3273:12: error: parameter named 'magic_kfunc_by_impl' is missing
3273 | static s32 magic_kfunc_by_impl(s32 impl_func_id)
| ^
kernel/bpf/verifier.c:3273:49: error: expected ';' at end of declaration
3273 | static s32 magic_kfunc_by_impl(s32 impl_func_id)
| ^
| ;
kernel/bpf/verifier.c:3271:17: error: parameter 'magic_kfuncs' was not declared, defaults to 'int'; ISO C99 and later do not support implicit int [-Wimplicit-int]
3271 | BTF_ID_LIST_END(magic_kfuncs)
| ^
3272 |
3273 | static s32 magic_kfunc_by_impl(s32 impl_func_id)
3274 | {
kernel/bpf/verifier.c:3271:1: error: type specifier missing, defaults to 'int'; ISO C99 and later do not support implicit int [-Wimplicit-int]
3271 | BTF_ID_LIST_END(magic_kfuncs)
| ^
| int
kernel/bpf/verifier.c:3277:18: error: call to undeclared function 'BTF_ID_LIST_SIZE'; ISO C99 and later do not support implicit function declarations [-Wimplicit-function-declaration]
3277 | for (i = 1; i < BTF_ID_LIST_SIZE(magic_kfuncs); i += 2) {
| ^
kernel/bpf/verifier.c:3277:18: note: did you mean 'BTF_ID_LIST_END'?
kernel/bpf/verifier.c:3271:1: note: 'BTF_ID_LIST_END' declared here
3271 | BTF_ID_LIST_END(magic_kfuncs)
| ^
3272 |
3273 | static s32 magic_kfunc_by_impl(s32 impl_func_id)
3274 | {
3275 | int i;
3276 |
3277 | for (i = 1; i < BTF_ID_LIST_SIZE(magic_kfuncs); i += 2) {
| ~~~~~~~~~~~~~~~~
| BTF_ID_LIST_END
kernel/bpf/verifier.c:3278:19: error: subscripted value is not an array, pointer, or vector
3278 | if (magic_kfuncs[i] == impl_func_id)
| ~~~~~~~~~~~~^~
kernel/bpf/verifier.c:3278:26: error: use of undeclared identifier 'impl_func_id'
3278 | if (magic_kfuncs[i] == impl_func_id)
| ^
kernel/bpf/verifier.c:3279:23: error: subscripted value is not an array, pointer, or vector
3279 | return magic_kfuncs[i - 1];
| ~~~~~~~~~~~~^~~~~~
kernel/bpf/verifier.c:3271:1: warning: no previous prototype for function 'BTF_ID_LIST_END' [-Wmissing-prototypes]
3271 | BTF_ID_LIST_END(magic_kfuncs)
| ^
kernel/bpf/verifier.c:3271:16: note: declare 'static' if the function is not intended to be used outside of this translation unit
3271 | BTF_ID_LIST_END(magic_kfuncs)
| ^
| static
>> kernel/bpf/verifier.c:3271:1: error: a function definition without a prototype is deprecated in all versions of C and is not supported in C2x [-Werror,-Wdeprecated-non-prototype]
3271 | BTF_ID_LIST_END(magic_kfuncs)
| ^
kernel/bpf/verifier.c:3288:18: error: call to undeclared function 'BTF_ID_LIST_SIZE'; ISO C99 and later do not support implicit function declarations [-Wimplicit-function-declaration]
3288 | for (i = 0; i < BTF_ID_LIST_SIZE(magic_kfuncs); i += 2) {
| ^
>> kernel/bpf/verifier.c:3409:17: error: call to undeclared function 'magic_kfunc_by_impl'; ISO C99 and later do not support implicit function declarations [-Wimplicit-function-declaration]
3409 | tmp_func_id = magic_kfunc_by_impl(func_id);
| ^
kernel/bpf/verifier.c:13726:17: error: call to undeclared function 'magic_kfunc_by_impl'; ISO C99 and later do not support implicit function declarations [-Wimplicit-function-declaration]
13726 | tmp_func_id = magic_kfunc_by_impl(func_id);
| ^
1 warning and 13 errors generated.
vim +3271 kernel/bpf/verifier.c
3265
3266 /*
3267 * magic_kfuncs is used as a list of (foo, foo_impl) pairs
3268 */
3269 BTF_ID_LIST(magic_kfuncs)
3270 BTF_ID_UNUSED
> 3271 BTF_ID_LIST_END(magic_kfuncs)
3272
3273 static s32 magic_kfunc_by_impl(s32 impl_func_id)
3274 {
3275 int i;
3276
3277 for (i = 1; i < BTF_ID_LIST_SIZE(magic_kfuncs); i += 2) {
3278 if (magic_kfuncs[i] == impl_func_id)
3279 return magic_kfuncs[i - 1];
3280 }
3281 return -ENOENT;
3282 }
3283
3284 static s32 impl_by_magic_kfunc(s32 func_id)
3285 {
3286 int i;
3287
3288 for (i = 0; i < BTF_ID_LIST_SIZE(magic_kfuncs); i += 2) {
3289 if (magic_kfuncs[i] == func_id)
3290 return magic_kfuncs[i + 1];
3291 }
3292 return -ENOENT;
3293 }
3294
3295 static const struct btf_type *find_magic_kfunc_proto(struct btf *desc_btf, s32 func_id)
3296 {
3297 const struct btf_type *impl_func, *func_proto;
3298 u32 impl_func_id;
3299
3300 impl_func_id = impl_by_magic_kfunc(func_id);
3301 if (impl_func_id < 0)
3302 return NULL;
3303
3304 impl_func = btf_type_by_id(desc_btf, impl_func_id);
3305 if (!impl_func || !btf_type_is_func(impl_func))
3306 return NULL;
3307
3308 func_proto = btf_type_by_id(desc_btf, impl_func->type);
3309 if (!func_proto || !btf_type_is_func_proto(func_proto))
3310 return NULL;
3311
3312 return func_proto;
3313 }
3314
3315 static int add_kfunc_call(struct bpf_verifier_env *env, u32 func_id, s16 offset)
3316 {
3317 const struct btf_type *func, *func_proto, *tmp_func;
3318 struct bpf_kfunc_btf_tab *btf_tab;
3319 const char *func_name, *tmp_name;
3320 struct btf_func_model func_model;
3321 struct bpf_kfunc_desc_tab *tab;
3322 struct bpf_prog_aux *prog_aux;
3323 struct bpf_kfunc_desc *desc;
3324 struct btf *desc_btf;
3325 unsigned long addr;
3326 u32 *kfunc_flags;
3327 s32 tmp_func_id;
3328 int err;
3329
3330 prog_aux = env->prog->aux;
3331 tab = prog_aux->kfunc_tab;
3332 btf_tab = prog_aux->kfunc_btf_tab;
3333 if (!tab) {
3334 if (!btf_vmlinux) {
3335 verbose(env, "calling kernel function is not supported without CONFIG_DEBUG_INFO_BTF\n");
3336 return -ENOTSUPP;
3337 }
3338
3339 if (!env->prog->jit_requested) {
3340 verbose(env, "JIT is required for calling kernel function\n");
3341 return -ENOTSUPP;
3342 }
3343
3344 if (!bpf_jit_supports_kfunc_call()) {
3345 verbose(env, "JIT does not support calling kernel function\n");
3346 return -ENOTSUPP;
3347 }
3348
3349 if (!env->prog->gpl_compatible) {
3350 verbose(env, "cannot call kernel function from non-GPL compatible program\n");
3351 return -EINVAL;
3352 }
3353
3354 tab = kzalloc(sizeof(*tab), GFP_KERNEL_ACCOUNT);
3355 if (!tab)
3356 return -ENOMEM;
3357 prog_aux->kfunc_tab = tab;
3358 }
3359
3360 /* func_id == 0 is always invalid, but instead of returning an error, be
3361 * conservative and wait until the code elimination pass before returning
3362 * error, so that invalid calls that get pruned out can be in BPF programs
3363 * loaded from userspace. It is also required that offset be untouched
3364 * for such calls.
3365 */
3366 if (!func_id && !offset)
3367 return 0;
3368
3369 if (!btf_tab && offset) {
3370 btf_tab = kzalloc(sizeof(*btf_tab), GFP_KERNEL_ACCOUNT);
3371 if (!btf_tab)
3372 return -ENOMEM;
3373 prog_aux->kfunc_btf_tab = btf_tab;
3374 }
3375
3376 desc_btf = find_kfunc_desc_btf(env, offset);
3377 if (IS_ERR(desc_btf)) {
3378 verbose(env, "failed to find BTF for kernel function\n");
3379 return PTR_ERR(desc_btf);
3380 }
3381
3382 if (find_kfunc_desc(env->prog, func_id, offset))
3383 return 0;
3384
3385 if (tab->nr_descs == MAX_KFUNC_DESCS) {
3386 verbose(env, "too many different kernel function calls\n");
3387 return -E2BIG;
3388 }
3389
3390 func = btf_type_by_id(desc_btf, func_id);
3391 if (!func || !btf_type_is_func(func)) {
3392 verbose(env, "kernel btf_id %u is not a function\n",
3393 func_id);
3394 return -EINVAL;
3395 }
3396 func_proto = btf_type_by_id(desc_btf, func->type);
3397 if (!func_proto || !btf_type_is_func_proto(func_proto)) {
3398 verbose(env, "kernel function btf_id %u does not have a valid func_proto\n",
3399 func_id);
3400 return -EINVAL;
3401 }
3402
3403 kfunc_flags = btf_kfunc_flags(desc_btf, func_id, env->prog);
3404 func_name = btf_name_by_offset(desc_btf, func->name_off);
3405 addr = kallsyms_lookup_name(func_name);
3406
3407 /* This may be an _impl kfunc with KF_MAGIC_ARGS counterpart */
3408 if (unlikely(!addr && !kfunc_flags)) {
> 3409 tmp_func_id = magic_kfunc_by_impl(func_id);
3410 if (tmp_func_id < 0)
3411 return -EACCES;
3412 tmp_func = btf_type_by_id(desc_btf, tmp_func_id);
3413 if (!tmp_func || !btf_type_is_func(tmp_func))
3414 return -EACCES;
3415 tmp_name = btf_name_by_offset(desc_btf, tmp_func->name_off);
3416 addr = kallsyms_lookup_name(tmp_name);
3417 }
3418
3419 /*
3420 * Note that kfunc_flags may be NULL at this point, which means that we couldn't find
3421 * func_id in any relevant kfunc_id_set. This most likely indicates an invalid kfunc call.
3422 * However we don't want to fail the verification here, because invalid calls may be
3423 * eliminated as dead code later.
3424 */
3425 if (unlikely(kfunc_flags && KF_MAGIC_ARGS & *kfunc_flags)) {
3426 func_proto = find_magic_kfunc_proto(desc_btf, func_id);
3427 if (!func_proto) {
3428 verbose(env, "cannot find _impl proto for kernel function %s\n",
3429 func_name);
3430 return -EINVAL;
3431 }
3432 }
3433
3434 if (!addr) {
3435 verbose(env, "cannot find address for kernel function %s\n",
3436 func_name);
3437 return -EINVAL;
3438 }
3439
3440 if (bpf_dev_bound_kfunc_id(func_id)) {
3441 err = bpf_dev_bound_kfunc_check(&env->log, prog_aux);
3442 if (err)
3443 return err;
3444 }
3445
3446 err = btf_distill_func_proto(&env->log, desc_btf,
3447 func_proto, func_name,
3448 &func_model);
3449 if (err)
3450 return err;
3451
3452 desc = &tab->descs[tab->nr_descs++];
3453 desc->func_id = func_id;
3454 desc->offset = offset;
3455 desc->addr = addr;
3456 desc->func_model = func_model;
3457 sort(tab->descs, tab->nr_descs, sizeof(tab->descs[0]),
3458 kfunc_desc_cmp_by_id_off, NULL);
3459 return 0;
3460 }
3461
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
next prev parent reply other threads:[~2025-10-30 13:56 UTC|newest]
Thread overview: 36+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-10-29 19:01 [PATCH bpf-next v1 0/8] bpf: magic kernel functions Ihor Solodrai
2025-10-29 19:01 ` [PATCH bpf-next v1 1/8] bpf: Add BTF_ID_LIST_END and BTF_ID_LIST_SIZE macros Ihor Solodrai
2025-10-29 19:41 ` bot+bpf-ci
2025-10-29 20:44 ` Ihor Solodrai
2025-10-29 23:54 ` Eduard Zingerman
2025-10-29 19:01 ` [PATCH bpf-next v1 2/8] bpf: Refactor btf_kfunc_id_set_contains Ihor Solodrai
2025-10-29 23:55 ` Eduard Zingerman
2025-10-29 19:01 ` [PATCH bpf-next v1 3/8] bpf: Support for kfuncs with KF_MAGIC_ARGS Ihor Solodrai
2025-10-29 19:41 ` bot+bpf-ci
2025-10-29 20:49 ` Ihor Solodrai
2025-10-29 23:59 ` Eduard Zingerman
2025-10-29 23:54 ` Eduard Zingerman
2025-10-30 0:03 ` Alexei Starovoitov
2025-10-30 16:31 ` Ihor Solodrai
2025-10-30 17:26 ` Eduard Zingerman
2025-10-30 10:24 ` kernel test robot
2025-10-30 11:58 ` kernel test robot
2025-10-30 13:54 ` kernel test robot [this message]
2025-10-29 19:01 ` [PATCH bpf-next v1 4/8] bpf: Support __magic prog_aux arguments for kfuncs Ihor Solodrai
2025-10-29 19:01 ` [PATCH bpf-next v1 5/8] bpf: Re-define bpf_wq_set_callback as magic kfunc Ihor Solodrai
2025-10-30 0:16 ` Eduard Zingerman
2025-10-29 19:01 ` [PATCH bpf-next v1 6/8] bpf,docs: Document KF_MAGIC_ARGS flag and __magic annotation Ihor Solodrai
2025-10-30 0:21 ` Eduard Zingerman
2025-10-29 19:01 ` [PATCH bpf-next v1 7/8] bpf: Re-define bpf_task_work_schedule_* kfuncs as magic Ihor Solodrai
2025-10-29 19:01 ` [PATCH bpf-next v1 8/8] bpf: Re-define bpf_stream_vprintk as a magic kfunc Ihor Solodrai
2025-10-30 0:44 ` [PATCH bpf-next v1 0/8] bpf: magic kernel functions Eduard Zingerman
2025-10-30 6:11 ` Eduard Zingerman
2025-10-30 18:14 ` Eduard Zingerman
2025-10-30 18:24 ` Ihor Solodrai
2025-10-30 18:37 ` Eduard Zingerman
2025-10-30 18:26 ` Alan Maguire
2025-10-30 18:42 ` Eduard Zingerman
2025-10-30 18:46 ` Ihor Solodrai
2025-10-30 19:47 ` Andrii Nakryiko
2025-10-30 20:02 ` Ihor Solodrai
2025-10-30 20:38 ` Andrii Nakryiko
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=202510302139.fAmMKkDb-lkp@intel.com \
--to=lkp@intel.com \
--cc=acme@kernel.org \
--cc=alan.maguire@oracle.com \
--cc=andrii@kernel.org \
--cc=ast@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=dwarves@vger.kernel.org \
--cc=eddyz87@gmail.com \
--cc=ihor.solodrai@linux.dev \
--cc=kernel-team@meta.com \
--cc=llvm@lists.linux.dev \
--cc=oe-kbuild-all@lists.linux.dev \
--cc=tj@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox