Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3416578pxf; Mon, 29 Mar 2021 01:24:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzqS4yc64H45YRs1gvOzyIMAB/8iP2YLn43XKYOZfktJHRDLz3jTKx7g1Wb5NaaTiDEAR4T X-Received: by 2002:aa7:da48:: with SMTP id w8mr26600312eds.81.1617006275169; Mon, 29 Mar 2021 01:24:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617006275; cv=none; d=google.com; s=arc-20160816; b=KGhfH6jZjzdBoAd65YXYHH+UZk5kZR1SBf1/T5XVdB2iTlOdEY8s3pOQknEBTVCHaT dzV0U137SFvJFf05OjeUB2cPJGTLsb9Cbu49jv8Qt6o1//jF4WFOqkxHM5LNW2dWzcPw BZ0wYEFDzM1f2nwMkdEShQKrA61eS5P99VzDWPgy+PNUruB75aej0oLQFH97nXhZMzMC eilUJC+4RWJbV2ukBEFLlBQXCofop1aOkb+0sPwFHGAA4OHkgzIf/JjHTjnLsRKoHs51 d2foCRkiNYx/llmS0+9me1ElbtdPrv4EaR/zaUOWC/WykqepTSPcDVXAdqApFva6Iw2r 2YWg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=bptFY9UZ0cKkqIMUTrA2sj91wBFOeGjsSUQCRVOC4ts=; b=wEq+bUC7dvHakDCslExp4fRUYH3dE4DzOUXecRf8JgBBpN/4ihIdADfCKnBxOidNp2 hYrQfXjJN6pSutewt/132IDJaz9UItO54lN20g7Xokruji4ilhud47jKTJ8h10EhkF8d cNfTBpz4JK8eicYGtS/Ek+JMLyFlqH7bAgWbOKRP2R51UJ25cpn1NRho6KLuKCUHsM8f jW+4lEv86z3MqJHGSwxMG7Fbi+ID77EXwnc9lqeZejKSAjGbRwP1xPgaLNXlaqrvevyO do9AiBTFoOuBKLDlCgUy2X9lih53YhqmdaAKcVuRbC3/VSeoNE/KtlrbK5XNYx/GWOq1 akTQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=IMLuaf71; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bx25si12929233edb.242.2021.03.29.01.24.12; Mon, 29 Mar 2021 01:24:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=IMLuaf71; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232829AbhC2IXV (ORCPT + 99 others); Mon, 29 Mar 2021 04:23:21 -0400 Received: from mail.kernel.org ([198.145.29.99]:57602 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232834AbhC2IPR (ORCPT ); Mon, 29 Mar 2021 04:15:17 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id BD0D961932; Mon, 29 Mar 2021 08:14:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1617005699; bh=I1nB1dUJTXBLHZnL1Z1EPAblbIjU8WdkGdF3tZuTcnM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=IMLuaf71cF1wcekgqiBUW2AHHxP5s81omLUkZYmLRJXok3OdIwuf9ws0iGPYWvHI3 m2/tnAdLGQVhxIVVDA+cxTMil3bblFEHbOuhwfbuNWRc8u5MdZQbaTUkFkC/dwsDvR U/W506+VLwD/NRMOf4Vkast0nvgp91x5I80QJtig= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jean-Philippe Brucker , Andrii Nakryiko , Sasha Levin Subject: [PATCH 5.4 086/111] libbpf: Fix BTF dump of pointer-to-array-of-struct Date: Mon, 29 Mar 2021 09:58:34 +0200 Message-Id: <20210329075618.077866706@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210329075615.186199980@linuxfoundation.org> References: <20210329075615.186199980@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jean-Philippe Brucker [ Upstream commit 901ee1d750f29a335423eeb9463c3ca461ca18c2 ] The vmlinux.h generated from BTF is invalid when building drivers/phy/ti/phy-gmii-sel.c with clang: vmlinux.h:61702:27: error: array type has incomplete element type ‘struct reg_field’ 61702 | const struct reg_field (*regfields)[3]; | ^~~~~~~~~ bpftool generates a forward declaration for this struct regfield, which compilers aren't happy about. Here's a simplified reproducer: struct inner { int val; }; struct outer { struct inner (*ptr_to_array)[2]; } A; After build with clang -> bpftool btf dump c -> clang/gcc: ./def-clang.h:11:23: error: array has incomplete element type 'struct inner' struct inner (*ptr_to_array)[2]; Member ptr_to_array of struct outer is a pointer to an array of struct inner. In the DWARF generated by clang, struct outer appears before struct inner, so when converting BTF of struct outer into C, bpftool issues a forward declaration to struct inner. With GCC the DWARF info is reversed so struct inner gets fully defined. That forward declaration is not sufficient when compilers handle an array of the struct, even when it's only used through a pointer. Note that we can trigger the same issue with an intermediate typedef: struct inner { int val; }; typedef struct inner inner2_t[2]; struct outer { inner2_t *ptr_to_array; } A; Becomes: struct inner; typedef struct inner inner2_t[2]; And causes: ./def-clang.h:10:30: error: array has incomplete element type 'struct inner' typedef struct inner inner2_t[2]; To fix this, clear through_ptr whenever we encounter an intermediate array, to make the inner struct part of a strong link and force full declaration. Fixes: 351131b51c7a ("libbpf: add btf_dump API for BTF-to-C conversion") Signed-off-by: Jean-Philippe Brucker Signed-off-by: Andrii Nakryiko Link: https://lore.kernel.org/bpf/20210319112554.794552-2-jean-philippe@linaro.org Signed-off-by: Sasha Levin --- tools/lib/bpf/btf_dump.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/lib/bpf/btf_dump.c b/tools/lib/bpf/btf_dump.c index d9e386b8f47e..b2fc45250450 100644 --- a/tools/lib/bpf/btf_dump.c +++ b/tools/lib/bpf/btf_dump.c @@ -443,7 +443,7 @@ static int btf_dump_order_type(struct btf_dump *d, __u32 id, bool through_ptr) return err; case BTF_KIND_ARRAY: - return btf_dump_order_type(d, btf_array(t)->type, through_ptr); + return btf_dump_order_type(d, btf_array(t)->type, false); case BTF_KIND_STRUCT: case BTF_KIND_UNION: { -- 2.30.1