From: kernel test robot <[email protected]>
To: Kumar Kartikeya Dwivedi <[email protected]>, [email protected]
Cc: [email protected], Alexei Starovoitov <[email protected]>,
Daniel Borkmann <[email protected]>,
Andrii Nakryiko <[email protected]>,
Pavel Emelyanov <[email protected]>,
Alexander Mihalicyn <[email protected]>,
Andrei Vagin <[email protected]>,
[email protected], [email protected],
[email protected]
Subject: Re: [PATCH bpf-next v1 2/8] bpf: Add bpf_page_to_pfn helper
Date: Wed, 17 Nov 2021 21:39:24 +0800 [thread overview]
Message-ID: <[email protected]> (raw)
In-Reply-To: <[email protected]>
[-- Attachment #1: Type: text/plain, Size: 6825 bytes --]
Hi Kumar,
Thank you for the patch! Yet something to improve:
[auto build test ERROR on bpf-next/master]
url: https://github.com/0day-ci/linux/commits/Kumar-Kartikeya-Dwivedi/Introduce-BPF-iterators-for-io_uring-and-epoll/20211116-140234
base: https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git master
config: i386-randconfig-a014-20211116 (attached as .config)
compiler: gcc-9 (Debian 9.3.0-22) 9.3.0
reproduce (this is a W=1 build):
# https://github.com/0day-ci/linux/commit/567c9b678d5ade1a63c993cfa10394902d4671ca
git remote add linux-review https://github.com/0day-ci/linux
git fetch --no-tags linux-review Kumar-Kartikeya-Dwivedi/Introduce-BPF-iterators-for-io_uring-and-epoll/20211116-140234
git checkout 567c9b678d5ade1a63c993cfa10394902d4671ca
# save the attached .config to linux build tree
mkdir build_dir
make W=1 O=build_dir ARCH=i386 SHELL=/bin/bash
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <[email protected]>
All errors (new ones prefixed by >>):
ld: kernel/trace/bpf_trace.o: in function `bpf_tracing_func_proto':
>> kernel/trace/bpf_trace.c:1216: undefined reference to `bpf_page_to_pfn_proto'
vim +1216 kernel/trace/bpf_trace.c
1093
1094 static const struct bpf_func_proto *
1095 bpf_tracing_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog)
1096 {
1097 switch (func_id) {
1098 case BPF_FUNC_map_lookup_elem:
1099 return &bpf_map_lookup_elem_proto;
1100 case BPF_FUNC_map_update_elem:
1101 return &bpf_map_update_elem_proto;
1102 case BPF_FUNC_map_delete_elem:
1103 return &bpf_map_delete_elem_proto;
1104 case BPF_FUNC_map_push_elem:
1105 return &bpf_map_push_elem_proto;
1106 case BPF_FUNC_map_pop_elem:
1107 return &bpf_map_pop_elem_proto;
1108 case BPF_FUNC_map_peek_elem:
1109 return &bpf_map_peek_elem_proto;
1110 case BPF_FUNC_ktime_get_ns:
1111 return &bpf_ktime_get_ns_proto;
1112 case BPF_FUNC_ktime_get_boot_ns:
1113 return &bpf_ktime_get_boot_ns_proto;
1114 case BPF_FUNC_ktime_get_coarse_ns:
1115 return &bpf_ktime_get_coarse_ns_proto;
1116 case BPF_FUNC_tail_call:
1117 return &bpf_tail_call_proto;
1118 case BPF_FUNC_get_current_pid_tgid:
1119 return &bpf_get_current_pid_tgid_proto;
1120 case BPF_FUNC_get_current_task:
1121 return &bpf_get_current_task_proto;
1122 case BPF_FUNC_get_current_task_btf:
1123 return &bpf_get_current_task_btf_proto;
1124 case BPF_FUNC_task_pt_regs:
1125 return &bpf_task_pt_regs_proto;
1126 case BPF_FUNC_get_current_uid_gid:
1127 return &bpf_get_current_uid_gid_proto;
1128 case BPF_FUNC_get_current_comm:
1129 return &bpf_get_current_comm_proto;
1130 case BPF_FUNC_trace_printk:
1131 return bpf_get_trace_printk_proto();
1132 case BPF_FUNC_get_smp_processor_id:
1133 return &bpf_get_smp_processor_id_proto;
1134 case BPF_FUNC_get_numa_node_id:
1135 return &bpf_get_numa_node_id_proto;
1136 case BPF_FUNC_perf_event_read:
1137 return &bpf_perf_event_read_proto;
1138 case BPF_FUNC_current_task_under_cgroup:
1139 return &bpf_current_task_under_cgroup_proto;
1140 case BPF_FUNC_get_prandom_u32:
1141 return &bpf_get_prandom_u32_proto;
1142 case BPF_FUNC_probe_write_user:
1143 return security_locked_down(LOCKDOWN_BPF_WRITE_USER) < 0 ?
1144 NULL : bpf_get_probe_write_proto();
1145 case BPF_FUNC_probe_read_user:
1146 return &bpf_probe_read_user_proto;
1147 case BPF_FUNC_probe_read_kernel:
1148 return security_locked_down(LOCKDOWN_BPF_READ_KERNEL) < 0 ?
1149 NULL : &bpf_probe_read_kernel_proto;
1150 case BPF_FUNC_probe_read_user_str:
1151 return &bpf_probe_read_user_str_proto;
1152 case BPF_FUNC_probe_read_kernel_str:
1153 return security_locked_down(LOCKDOWN_BPF_READ_KERNEL) < 0 ?
1154 NULL : &bpf_probe_read_kernel_str_proto;
1155 #ifdef CONFIG_ARCH_HAS_NON_OVERLAPPING_ADDRESS_SPACE
1156 case BPF_FUNC_probe_read:
1157 return security_locked_down(LOCKDOWN_BPF_READ_KERNEL) < 0 ?
1158 NULL : &bpf_probe_read_compat_proto;
1159 case BPF_FUNC_probe_read_str:
1160 return security_locked_down(LOCKDOWN_BPF_READ_KERNEL) < 0 ?
1161 NULL : &bpf_probe_read_compat_str_proto;
1162 #endif
1163 #ifdef CONFIG_CGROUPS
1164 case BPF_FUNC_get_current_cgroup_id:
1165 return &bpf_get_current_cgroup_id_proto;
1166 case BPF_FUNC_get_current_ancestor_cgroup_id:
1167 return &bpf_get_current_ancestor_cgroup_id_proto;
1168 #endif
1169 case BPF_FUNC_send_signal:
1170 return &bpf_send_signal_proto;
1171 case BPF_FUNC_send_signal_thread:
1172 return &bpf_send_signal_thread_proto;
1173 case BPF_FUNC_perf_event_read_value:
1174 return &bpf_perf_event_read_value_proto;
1175 case BPF_FUNC_get_ns_current_pid_tgid:
1176 return &bpf_get_ns_current_pid_tgid_proto;
1177 case BPF_FUNC_ringbuf_output:
1178 return &bpf_ringbuf_output_proto;
1179 case BPF_FUNC_ringbuf_reserve:
1180 return &bpf_ringbuf_reserve_proto;
1181 case BPF_FUNC_ringbuf_submit:
1182 return &bpf_ringbuf_submit_proto;
1183 case BPF_FUNC_ringbuf_discard:
1184 return &bpf_ringbuf_discard_proto;
1185 case BPF_FUNC_ringbuf_query:
1186 return &bpf_ringbuf_query_proto;
1187 case BPF_FUNC_jiffies64:
1188 return &bpf_jiffies64_proto;
1189 case BPF_FUNC_get_task_stack:
1190 return &bpf_get_task_stack_proto;
1191 case BPF_FUNC_copy_from_user:
1192 return prog->aux->sleepable ? &bpf_copy_from_user_proto : NULL;
1193 case BPF_FUNC_snprintf_btf:
1194 return &bpf_snprintf_btf_proto;
1195 case BPF_FUNC_per_cpu_ptr:
1196 return &bpf_per_cpu_ptr_proto;
1197 case BPF_FUNC_this_cpu_ptr:
1198 return &bpf_this_cpu_ptr_proto;
1199 case BPF_FUNC_task_storage_get:
1200 return &bpf_task_storage_get_proto;
1201 case BPF_FUNC_task_storage_delete:
1202 return &bpf_task_storage_delete_proto;
1203 case BPF_FUNC_for_each_map_elem:
1204 return &bpf_for_each_map_elem_proto;
1205 case BPF_FUNC_snprintf:
1206 return &bpf_snprintf_proto;
1207 case BPF_FUNC_get_func_ip:
1208 return &bpf_get_func_ip_proto_tracing;
1209 case BPF_FUNC_get_branch_snapshot:
1210 return &bpf_get_branch_snapshot_proto;
1211 case BPF_FUNC_find_vma:
1212 return &bpf_find_vma_proto;
1213 case BPF_FUNC_trace_vprintk:
1214 return bpf_get_trace_vprintk_proto();
1215 case BPF_FUNC_page_to_pfn:
> 1216 return &bpf_page_to_pfn_proto;
1217 default:
1218 return bpf_base_func_proto(func_id);
1219 }
1220 }
1221
---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/[email protected]
[-- Attachment #2: .config.gz --]
[-- Type: application/gzip, Size: 46321 bytes --]
next prev parent reply other threads:[~2021-11-17 13:40 UTC|newest]
Thread overview: 32+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-11-16 5:42 [PATCH bpf-next v1 0/8] Introduce BPF iterators for io_uring and epoll Kumar Kartikeya Dwivedi
2021-11-16 5:42 ` [PATCH bpf-next v1 1/8] io_uring: Implement eBPF iterator for registered buffers Kumar Kartikeya Dwivedi
2021-11-18 17:21 ` Yonghong Song
2021-11-18 18:28 ` Kumar Kartikeya Dwivedi
2021-11-18 19:13 ` Yonghong Song
2021-11-18 22:02 ` Alexei Starovoitov
2021-11-19 4:15 ` Kumar Kartikeya Dwivedi
2021-11-19 4:44 ` Kumar Kartikeya Dwivedi
2021-11-19 4:56 ` Alexei Starovoitov
2021-11-19 5:16 ` Kumar Kartikeya Dwivedi
2021-11-19 5:24 ` Alexei Starovoitov
2021-11-19 6:12 ` Kumar Kartikeya Dwivedi
2021-12-03 15:52 ` Pavel Begunkov
2021-12-03 23:16 ` Kumar Kartikeya Dwivedi
2021-11-16 5:42 ` [PATCH bpf-next v1 2/8] bpf: Add bpf_page_to_pfn helper Kumar Kartikeya Dwivedi
2021-11-17 12:35 ` kernel test robot
2021-11-17 13:39 ` kernel test robot [this message]
2021-11-18 17:27 ` Yonghong Song
2021-11-18 18:30 ` Kumar Kartikeya Dwivedi
2021-11-18 19:18 ` Yonghong Song
2021-11-18 19:22 ` Kumar Kartikeya Dwivedi
2021-11-16 5:42 ` [PATCH bpf-next v1 3/8] io_uring: Implement eBPF iterator for registered files Kumar Kartikeya Dwivedi
2021-11-18 17:33 ` Yonghong Song
2021-11-16 5:42 ` [PATCH bpf-next v1 4/8] epoll: Implement eBPF iterator for registered items Kumar Kartikeya Dwivedi
2021-11-18 17:50 ` Yonghong Song
2021-11-16 5:42 ` [PATCH bpf-next v1 5/8] selftests/bpf: Add test for io_uring BPF iterators Kumar Kartikeya Dwivedi
2021-11-18 17:54 ` Yonghong Song
2021-11-18 18:33 ` Kumar Kartikeya Dwivedi
2021-11-18 19:21 ` Yonghong Song
2021-11-16 5:42 ` [PATCH bpf-next v1 6/8] selftests/bpf: Add test for epoll BPF iterator Kumar Kartikeya Dwivedi
2021-11-16 5:42 ` [PATCH bpf-next v1 7/8] selftests/bpf: Test partial reads for io_uring, epoll iterators Kumar Kartikeya Dwivedi
2021-11-16 5:42 ` [PATCH bpf-next v1 8/8] selftests/bpf: Fix btf_dump test for bpf_iter_link_info Kumar Kartikeya Dwivedi
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox