From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 82B00EE0210 for ; Wed, 13 Sep 2023 22:16:52 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232902AbjIMWQz (ORCPT ); Wed, 13 Sep 2023 18:16:55 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58492 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229743AbjIMWQy (ORCPT ); Wed, 13 Sep 2023 18:16:54 -0400 Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.120]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D87D8198B; Wed, 13 Sep 2023 15:16:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1694643410; x=1726179410; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=gV5m7FnIi0psr4k+6ytGpr38jWqH/wH1K3hvo+SLTQI=; b=VTTn7IkNsxi3+fbqOrJehY488pQ1mTaFxljC4Kaazp07bsCOcf9qxgDx qkX3hYgvQvBqP+Bb/2n679NjbJfAzbDaEYPjgH8A9HuQxi02F6JmazjnK P3ZRt9NrkmPa6nyOjXVZycGeE7uihjNsI+D2WUf7Abt2tUT9nQXS+JP1s xXNeCxmTIXUMSS2Y6xnUmP6enmT5ZF5RarDVlm5bJAOqYSSy6iz/idmH8 iKOaP7sHpfDJGQgGIghCQcl0y09yTH0bD9XYN5mg1GtykLyOb/fnOdHwY 6WaganNWMtMD++kfjlhFDgM0/cROQeS6QUEtzRiFjxWVbcEkT9wZKHkjD g==; X-IronPort-AV: E=McAfee;i="6600,9927,10832"; a="377706281" X-IronPort-AV: E=Sophos;i="6.02,144,1688454000"; d="scan'208";a="377706281" Received: from orsmga003.jf.intel.com ([10.7.209.27]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Sep 2023 15:16:50 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10832"; a="694001202" X-IronPort-AV: E=Sophos;i="6.02,144,1688454000"; d="scan'208";a="694001202" Received: from lkp-server02.sh.intel.com (HELO 9ef86b2655e5) ([10.239.97.151]) by orsmga003.jf.intel.com with ESMTP; 13 Sep 2023 15:16:47 -0700 Received: from kbuild by 9ef86b2655e5 with local (Exim 4.96) (envelope-from ) id 1qgYA3-0000iz-1N; Wed, 13 Sep 2023 22:16:42 +0000 Date: Thu, 14 Sep 2023 06:15:14 +0800 From: kernel test robot To: Andrii Nakryiko , bpf@vger.kernel.org Cc: oe-kbuild-all@lists.linux.dev, linux-fsdevel@vger.kernel.org, linux-security-module@vger.kernel.org, keescook@chromium.org, brauner@kernel.org, lennart@poettering.net, kernel-team@meta.com, sargun@sargun.me Subject: Re: [PATCH v4 bpf-next 07/12] bpf: consistenly use BPF token throughout BPF verifier logic Message-ID: <202309140537.jHmBqMd6-lkp@intel.com> References: <20230912212906.3975866-8-andrii@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230912212906.3975866-8-andrii@kernel.org> Precedence: bulk List-ID: X-Mailing-List: linux-fsdevel@vger.kernel.org Hi Andrii, kernel test robot noticed the following build errors: [auto build test ERROR on bpf-next/master] url: https://github.com/intel-lab-lkp/linux/commits/Andrii-Nakryiko/bpf-add-BPF-token-delegation-mount-options-to-BPF-FS/20230913-053240 base: https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git master patch link: https://lore.kernel.org/r/20230912212906.3975866-8-andrii%40kernel.org patch subject: [PATCH v4 bpf-next 07/12] bpf: consistenly use BPF token throughout BPF verifier logic config: x86_64-randconfig-074-20230914 (https://download.01.org/0day-ci/archive/20230914/202309140537.jHmBqMd6-lkp@intel.com/config) compiler: gcc-12 (Debian 12.2.0-14) 12.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20230914/202309140537.jHmBqMd6-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202309140537.jHmBqMd6-lkp@intel.com/ All errors (new ones prefixed by >>): In file included from include/net/sock_reuseport.h:5, from include/net/tcp.h:35, from include/linux/netfilter_ipv6.h:11, from include/uapi/linux/netfilter_ipv6/ip6_tables.h:22, from include/linux/netfilter_ipv6/ip6_tables.h:23, from net/ipv6/netfilter/ip6table_filter.c:11: include/linux/filter.h: In function 'bpf_jit_blinding_enabled': >> include/linux/filter.h:1104:36: error: implicit declaration of function 'bpf_token_capable'; did you mean 'bpf_token_put'? [-Werror=implicit-function-declaration] 1104 | if (bpf_jit_harden == 1 && bpf_token_capable(prog->aux->token, CAP_BPF)) | ^~~~~~~~~~~~~~~~~ | bpf_token_put cc1: some warnings being treated as errors -- In file included from include/net/sock_reuseport.h:5, from include/net/tcp.h:35, from include/linux/netfilter_ipv6.h:11, from net/ipv6/netfilter/nf_reject_ipv6.c:12: include/linux/filter.h: In function 'bpf_jit_blinding_enabled': >> include/linux/filter.h:1104:36: error: implicit declaration of function 'bpf_token_capable'; did you mean 'bpf_token_put'? [-Werror=implicit-function-declaration] 1104 | if (bpf_jit_harden == 1 && bpf_token_capable(prog->aux->token, CAP_BPF)) | ^~~~~~~~~~~~~~~~~ | bpf_token_put net/ipv6/netfilter/nf_reject_ipv6.c: In function 'nf_send_reset6': net/ipv6/netfilter/nf_reject_ipv6.c:287:25: warning: variable 'ip6h' set but not used [-Wunused-but-set-variable] 287 | struct ipv6hdr *ip6h; | ^~~~ cc1: some warnings being treated as errors vim +1104 include/linux/filter.h 1091 1092 static inline bool bpf_jit_blinding_enabled(struct bpf_prog *prog) 1093 { 1094 /* These are the prerequisites, should someone ever have the 1095 * idea to call blinding outside of them, we make sure to 1096 * bail out. 1097 */ 1098 if (!bpf_jit_is_ebpf()) 1099 return false; 1100 if (!prog->jit_requested) 1101 return false; 1102 if (!bpf_jit_harden) 1103 return false; > 1104 if (bpf_jit_harden == 1 && bpf_token_capable(prog->aux->token, CAP_BPF)) 1105 return false; 1106 1107 return true; 1108 } 1109 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki