Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp4315072pxb; Tue, 2 Nov 2021 07:45:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwzaVh7RQFCktP6NtX7aAlZf76lMzOYBr8TR5YgE6S12Ev3Li5Dxqha/i+SbOtfZGXl/ER+ X-Received: by 2002:a17:907:6e1c:: with SMTP id sd28mr12714346ejc.28.1635864321844; Tue, 02 Nov 2021 07:45:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1635864321; cv=none; d=google.com; s=arc-20160816; b=UKY78AJT+R3T2WS8VqcGyBi7os4Q+wTGLxYe3/2VRaQyKpwT05etUJA/Su/NCHhlxV osIaYGuUHQAIJxkxzDbwov/3QcNYZTKJKMHyFJHxHWgoTocuu8EIZrpJp3X7XfHbm40x cWAjvtnIQQp4u50HFFRuRFAH5SLIlnFzIjwhpWd8nbvIgGabDGLFC09Rl16+ALRcLFY9 BOqzeNxIvnVS7iyo43QzXz9UFdOMv4L3QeKXYkm/PLi5y+p3L9RXcgIV9YMB8NbJDuDa YfYRlPxpJtQm7exAGyKiJtJz8dyLuoTITZq+7N64SrVAzWWHTjrTBecesDkHZFHzqbbV MPtQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=Zkqen+0GlA2SGwoZ2L6d6p+REsKITrEKn1L3E4Ei4vk=; b=oiX6yZ+tHRC7Yk0bRf055OdJTGbs+8V3HkOdr1J33bwWyiGA/NiOKwgzJvbgomAwaS WzQoZWHV+iYtQI7J5MalCiTqBQ7VP/bB9tzHnNNaiEZhV3789YVH5AKSd8vyH0O9RooP UVhqzIh4U4/aj6PWOAa0OtS4cE5+XYtLfgFSpzoAoSCl4HfywMXXy4wza/jeOZQsTwD3 FY4+VWdusTNxl9zrzujtSFzScSXBW28Ul3MFtIbmPvw3m/294ERmHoI8N1hA7P4VgC26 O5mE9Vaexewk/uHJBI/RlezdYOLZXuNA+lffUS/KlfTF7Lx4VkcSeb7z74FtEbGevcjb aHgg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f29si16529078edc.273.2021.11.02.07.44.58; Tue, 02 Nov 2021 07:45:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230483AbhKBOng (ORCPT + 99 others); Tue, 2 Nov 2021 10:43:36 -0400 Received: from szxga02-in.huawei.com ([45.249.212.188]:15347 "EHLO szxga02-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229557AbhKBOnf (ORCPT ); Tue, 2 Nov 2021 10:43:35 -0400 Received: from dggemv711-chm.china.huawei.com (unknown [172.30.72.55]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4HkCHx5rkPz900w; Tue, 2 Nov 2021 22:40:45 +0800 (CST) Received: from kwepemm600017.china.huawei.com (7.193.23.234) by dggemv711-chm.china.huawei.com (10.1.198.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.15; Tue, 2 Nov 2021 22:40:54 +0800 Received: from localhost.localdomain (10.175.112.125) by kwepemm600017.china.huawei.com (7.193.23.234) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.15; Tue, 2 Nov 2021 22:40:52 +0800 From: Tong Tiangen To: Paul Walmsley , Palmer Dabbelt , Palmer Dabbelt , Albert Ou , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , CC: , , , , Tong Tiangen Subject: [PATCH bpf-next] riscv, bpf: fix some compiler error Date: Tue, 2 Nov 2021 14:56:42 +0000 Message-ID: <20211102145642.724820-1-tongtiangen@huawei.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.175.112.125] X-ClientProxiedBy: dggems702-chm.china.huawei.com (10.3.19.179) To kwepemm600017.china.huawei.com (7.193.23.234) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch fix two compile errors: 1. when CONFIG_BPF_JIT and CONFIG_ARCH_32I is open, There is the following compiler error: error: undefined symbol: rv_bpf_fixup_exception 2. when CONFIG_BPF_JIT and CONFIG_ARCH_64I is open, There is the following compiler error (W=1): error: no previous prototype for 'rv_bpf_fixup_exception' In this patch, asm/extable.h is introduced, the rv_bpf_fixup_exception function declaration is added to this file. in addition, the definition of exception_table_entry is moved from asm-generic/extable.h to this file. Fixes: 252c765bd764 ("riscv, bpf: Add BPF exception tables") Signed-off-by: Tong Tiangen --- arch/riscv/include/asm/Kbuild | 1 - arch/riscv/include/asm/extable.h | 49 ++++++++++++++++++++++++++++++++ arch/riscv/include/asm/uaccess.h | 13 --------- arch/riscv/mm/extable.c | 8 +----- 4 files changed, 50 insertions(+), 21 deletions(-) create mode 100644 arch/riscv/include/asm/extable.h diff --git a/arch/riscv/include/asm/Kbuild b/arch/riscv/include/asm/Kbuild index 445ccc97305a..57b86fd9916c 100644 --- a/arch/riscv/include/asm/Kbuild +++ b/arch/riscv/include/asm/Kbuild @@ -1,6 +1,5 @@ # SPDX-License-Identifier: GPL-2.0 generic-y += early_ioremap.h -generic-y += extable.h generic-y += flat.h generic-y += kvm_para.h generic-y += user.h diff --git a/arch/riscv/include/asm/extable.h b/arch/riscv/include/asm/extable.h new file mode 100644 index 000000000000..aa0332b053fb --- /dev/null +++ b/arch/riscv/include/asm/extable.h @@ -0,0 +1,49 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +#ifndef __ASM_EXTABLE_H +#define __ASM_EXTABLE_H + +/* + * The exception table consists of pairs of addresses: the first is the + * address of an instruction that is allowed to fault, and the second is + * the address at which the program should continue. No registers are + * modified, so it is entirely up to the continuation code to figure out + * what to do. + * + * All the routines below use bits of fixup code that are out of line + * with the main instruction path. This means when everything is well, + * we don't even have to jump over them. Further, they do not intrude + * on our cache or tlb entries. + */ +struct exception_table_entry { + unsigned long insn, fixup; +}; + +struct pt_regs; +int fixup_exception(struct pt_regs *regs); + +#if defined(CONFIG_MMU) +static inline bool rv_in_bpf_jit(struct pt_regs *regs) +{ + if (!IS_ENABLED(CONFIG_BPF_JIT) || !IS_ENABLED(CONFIG_64BIT)) + return false; + + return regs->epc >= BPF_JIT_REGION_START && regs->epc < BPF_JIT_REGION_END; +} +#else +static inline bool rv_in_bpf_jit(struct pt_regs *regs) +{ + return false; +} +#endif + +#if defined(CONFIG_BPF_JIT) && defined(CONFIG_64BIT) +int rv_bpf_fixup_exception(const struct exception_table_entry *ex, struct pt_regs *regs); +#else +static inline int rv_bpf_fixup_exception(const struct exception_table_entry *ex, + struct pt_regs *regs) +{ + return 0; +} +#endif + +#endif diff --git a/arch/riscv/include/asm/uaccess.h b/arch/riscv/include/asm/uaccess.h index f314ff44c48d..96ea91dc0e9c 100644 --- a/arch/riscv/include/asm/uaccess.h +++ b/arch/riscv/include/asm/uaccess.h @@ -56,19 +56,6 @@ static inline int __access_ok(unsigned long addr, unsigned long size) return size <= TASK_SIZE && addr <= TASK_SIZE - size; } -/* - * The exception table consists of pairs of addresses: the first is the - * address of an instruction that is allowed to fault, and the second is - * the address at which the program should continue. No registers are - * modified, so it is entirely up to the continuation code to figure out - * what to do. - * - * All the routines below use bits of fixup code that are out of line - * with the main instruction path. This means when everything is well, - * we don't even have to jump over them. Further, they do not intrude - * on our cache or tlb entries. - */ - #define __LSW 0 #define __MSW 1 diff --git a/arch/riscv/mm/extable.c b/arch/riscv/mm/extable.c index 18bf338303b6..264f465db5bb 100644 --- a/arch/riscv/mm/extable.c +++ b/arch/riscv/mm/extable.c @@ -11,10 +11,6 @@ #include #include -#ifdef CONFIG_BPF_JIT -int rv_bpf_fixup_exception(const struct exception_table_entry *ex, struct pt_regs *regs); -#endif - int fixup_exception(struct pt_regs *regs) { const struct exception_table_entry *fixup; @@ -23,10 +19,8 @@ int fixup_exception(struct pt_regs *regs) if (!fixup) return 0; -#ifdef CONFIG_BPF_JIT - if (regs->epc >= BPF_JIT_REGION_START && regs->epc < BPF_JIT_REGION_END) + if (rv_in_bpf_jit(regs)) return rv_bpf_fixup_exception(fixup, regs); -#endif regs->epc = fixup->fixup; return 1; -- 2.25.1