{"id":816335,"url":"http://patchwork.ozlabs.org/api/patches/816335/?format=json","web_url":"http://patchwork.ozlabs.org/project/netdev/patch/20170920161159.25747-3-joelaf@google.com/","project":{"id":7,"url":"http://patchwork.ozlabs.org/api/projects/7/?format=json","name":"Linux network development","link_name":"netdev","list_id":"netdev.vger.kernel.org","list_email":"netdev@vger.kernel.org","web_url":null,"scm_url":null,"webscm_url":null,"list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<20170920161159.25747-3-joelaf@google.com>","list_archive_url":null,"date":"2017-09-20T16:11:58","name":"[v4,3/4] samples/bpf: Fix pt_regs issues when cross-compiling","commit_ref":null,"pull_url":null,"state":"accepted","archived":true,"hash":"01d80cb72d56cbb083e16b2f89807c62fa6c4ffa","submitter":{"id":72107,"url":"http://patchwork.ozlabs.org/api/people/72107/?format=json","name":"Joel Fernandes","email":"joelaf@google.com"},"delegate":{"id":34,"url":"http://patchwork.ozlabs.org/api/users/34/?format=json","username":"davem","first_name":"David","last_name":"Miller","email":"davem@davemloft.net"},"mbox":"http://patchwork.ozlabs.org/project/netdev/patch/20170920161159.25747-3-joelaf@google.com/mbox/","series":[{"id":4158,"url":"http://patchwork.ozlabs.org/api/series/4158/?format=json","web_url":"http://patchwork.ozlabs.org/project/netdev/list/?series=4158","date":"2017-09-20T16:04:32","name":"Add cross-compilation support to eBPF samples","version":4,"mbox":"http://patchwork.ozlabs.org/series/4158/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/816335/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/816335/checks/","tags":{},"related":[],"headers":{"Return-Path":"<netdev-owner@vger.kernel.org>","X-Original-To":"patchwork-incoming@ozlabs.org","Delivered-To":"patchwork-incoming@ozlabs.org","Authentication-Results":["ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=vger.kernel.org\n\t(client-ip=209.132.180.67; helo=vger.kernel.org;\n\tenvelope-from=netdev-owner@vger.kernel.org;\n\treceiver=<UNKNOWN>)","ozlabs.org; dkim=pass (2048-bit key;\n\tunprotected) header.d=google.com header.i=@google.com\n\theader.b=\"qKtzRM34\"; dkim-atps=neutral"],"Received":["from vger.kernel.org (vger.kernel.org [209.132.180.67])\n\tby ozlabs.org (Postfix) with ESMTP id 3xy4XV6V7Mz9s7c\n\tfor <patchwork-incoming@ozlabs.org>;\n\tThu, 21 Sep 2017 02:12:58 +1000 (AEST)","(majordomo@vger.kernel.org) by vger.kernel.org via listexpand\n\tid S1751933AbdITQMQ (ORCPT <rfc822;patchwork-incoming@ozlabs.org>);\n\tWed, 20 Sep 2017 12:12:16 -0400","from mail-pg0-f42.google.com ([74.125.83.42]:56350 \"EHLO\n\tmail-pg0-f42.google.com\" rhost-flags-OK-OK-OK-OK) by vger.kernel.org\n\twith ESMTP id S1751859AbdITQMP (ORCPT\n\t<rfc822;netdev@vger.kernel.org>); Wed, 20 Sep 2017 12:12:15 -0400","by mail-pg0-f42.google.com with SMTP id 7so1925146pgd.13\n\tfor <netdev@vger.kernel.org>; Wed, 20 Sep 2017 09:12:15 -0700 (PDT)","from joelaf-glaptop0.roam.corp.google.com ([73.93.152.222])\n\tby smtp.gmail.com with ESMTPSA id\n\tx9sm8767200pfk.40.2017.09.20.09.12.12\n\t(version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128);\n\tWed, 20 Sep 2017 09:12:13 -0700 (PDT)"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=google.com; s=20161025;\n\th=from:to:cc:subject:date:message-id:in-reply-to:references;\n\tbh=f8Gb5NQJb2H0pK0s11avCvjQYDcuX4cvZFdAA6W4WLo=;\n\tb=qKtzRM34Arr2UNZOMg9k2kBVlix1GD5MwP1mbIVOB3i6ZN2qnRgUBnMIpCXScGfF56\n\tUmwSWfVDat6r6ctSSWfPPzJ+NwD6og9pi3AgH6v8/op7twYPp6e3At6vkV9N+Iy/P3Au\n\tvfvbXT99lHFKSKRm3e26OPG88jnumOoTJVRoYzkolgBtfQrAJBAi1yYMQQa0srRXwd8w\n\t8EIuR7jSnRYvxTYEt70/oN7Stw4Cfb1nwm8PXP3pzz1Y8wO5YyVrAACQ/HCLZxiRY1p7\n\ttUStEW2HSlGhGtIB/2j14Eso3AC9UOEVgq14OL8qU6X+F/4+882+S022pfFDoyi0KcFY\n\twnMQ==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=1e100.net; s=20161025;\n\th=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to\n\t:references;\n\tbh=f8Gb5NQJb2H0pK0s11avCvjQYDcuX4cvZFdAA6W4WLo=;\n\tb=QQe/eyP3egDbfyIwnqA0Z90k6p4gkbiW0SbJ+E3q5Tv1KAhlmezSgJ5gO7nHOU2QRN\n\tCIofza4ohbxAmkcddGPOjOxFpMQMpPEX1Jfuop65U09/z1T8hItub+EfJQ2i7BV1GTPy\n\tLsaWEZKyIZ4SgUGOtTrd7KF+S2+SkIPTSgcY/ONFplpp8x8A1zu6qq0A+PQGdBG7oOup\n\tM/1AcJxb31zeo7BtKTXqNISI6Dw8cWX1eQtDqr7GcECmKP5bAMNfEUpeh+KMVjJJiom5\n\tqz/cvjx/sQCwioDQfBehh0cOYef2CXKhKvd5cMndURInFJpG/rn2TvmAadM4c6kQyDZP\n\tR8Tw==","X-Gm-Message-State":"AHPjjUjB7dQ7m2nEiWebiSIRSrS/jcrEUX8XhCDir5Z68QmeVLyDhbXo\n\tZdkTaPwZn+vXlcOiT5Gwo73/Bw==","X-Google-Smtp-Source":"AOwi7QDsDU5MrrIk0THquQPu+COX5pBTE0XITqIC9chhF20/IaLQ4jpkpwADykeGTL6HQPnnVNXQFg==","X-Received":"by 10.99.142.196 with SMTP id k187mr2818906pge.14.1505923934388; \n\tWed, 20 Sep 2017 09:12:14 -0700 (PDT)","From":"Joel Fernandes <joelaf@google.com>","To":"linux-kernel@vger.kernel.org","Cc":"netdev@vger.kernel.org, alison@she-devel.com, juri.lelli@arm.com,\n\tfengc@google.com, daniel@iogearbox.net, davem@davemloft.net,\n\tast@kernel.org, kernel-team@android.com,\n\tJoel Fernandes <joelaf@google.com>","Subject":"[PATCH v4 3/4] samples/bpf: Fix pt_regs issues when cross-compiling","Date":"Wed, 20 Sep 2017 09:11:58 -0700","Message-Id":"<20170920161159.25747-3-joelaf@google.com>","X-Mailer":"git-send-email 2.14.1.821.g8fa685d3b7-goog","In-Reply-To":"<20170920161159.25747-1-joelaf@google.com>","References":"<20170920161159.25747-1-joelaf@google.com>","Sender":"netdev-owner@vger.kernel.org","Precedence":"bulk","List-ID":"<netdev.vger.kernel.org>","X-Mailing-List":"netdev@vger.kernel.org"},"content":"BPF samples fail to build when cross-compiling for ARM64 because of incorrect\npt_regs param selection. This is because clang defines __x86_64__ and\nbpf_headers thinks we're building for x86. Since clang is building for the BPF\ntarget, it shouldn't make assumptions about what target the BPF program is\ngoing to run on. To fix this, lets pass ARCH so the header knows which target\nthe BPF program is being compiled for and can use the correct pt_regs code.\n\nAcked-by: Alexei Starovoitov <ast@kernel.org>\nSigned-off-by: Joel Fernandes <joelaf@google.com>\n---\n samples/bpf/Makefile                      |  2 +-\n tools/testing/selftests/bpf/bpf_helpers.h | 56 +++++++++++++++++++++++++++----\n 2 files changed, 50 insertions(+), 8 deletions(-)","diff":"diff --git a/samples/bpf/Makefile b/samples/bpf/Makefile\nindex 13f74b67ca44..ebc2ad69b62c 100644\n--- a/samples/bpf/Makefile\n+++ b/samples/bpf/Makefile\n@@ -230,7 +230,7 @@ $(obj)/%.o: $(src)/%.c\n \t$(CLANG) $(NOSTDINC_FLAGS) $(LINUXINCLUDE) $(EXTRA_CFLAGS) -I$(obj) \\\n \t\t-I$(srctree)/tools/testing/selftests/bpf/ \\\n \t\t-D__KERNEL__ -D__ASM_SYSREG_H -Wno-unused-value -Wno-pointer-sign \\\n-\t\t-Wno-compare-distinct-pointer-types \\\n+\t\t-D__TARGET_ARCH_$(ARCH) -Wno-compare-distinct-pointer-types \\\n \t\t-Wno-gnu-variable-sized-type-not-at-end \\\n \t\t-Wno-address-of-packed-member -Wno-tautological-compare \\\n \t\t-Wno-unknown-warning-option \\\ndiff --git a/tools/testing/selftests/bpf/bpf_helpers.h b/tools/testing/selftests/bpf/bpf_helpers.h\nindex 36fb9161b34a..4875395b0b52 100644\n--- a/tools/testing/selftests/bpf/bpf_helpers.h\n+++ b/tools/testing/selftests/bpf/bpf_helpers.h\n@@ -109,7 +109,47 @@ static int (*bpf_skb_under_cgroup)(void *ctx, void *map, int index) =\n static int (*bpf_skb_change_head)(void *, int len, int flags) =\n \t(void *) BPF_FUNC_skb_change_head;\n \n+/* Scan the ARCH passed in from ARCH env variable (see Makefile) */\n+#if defined(__TARGET_ARCH_x86)\n+\t#define bpf_target_x86\n+\t#define bpf_target_defined\n+#elif defined(__TARGET_ARCH_s930x)\n+\t#define bpf_target_s930x\n+\t#define bpf_target_defined\n+#elif defined(__TARGET_ARCH_arm64)\n+\t#define bpf_target_arm64\n+\t#define bpf_target_defined\n+#elif defined(__TARGET_ARCH_mips)\n+\t#define bpf_target_mips\n+\t#define bpf_target_defined\n+#elif defined(__TARGET_ARCH_powerpc)\n+\t#define bpf_target_powerpc\n+\t#define bpf_target_defined\n+#elif defined(__TARGET_ARCH_sparc)\n+\t#define bpf_target_sparc\n+\t#define bpf_target_defined\n+#else\n+\t#undef bpf_target_defined\n+#endif\n+\n+/* Fall back to what the compiler says */\n+#ifndef bpf_target_defined\n #if defined(__x86_64__)\n+\t#define bpf_target_x86\n+#elif defined(__s390x__)\n+\t#define bpf_target_s930x\n+#elif defined(__aarch64__)\n+\t#define bpf_target_arm64\n+#elif defined(__mips__)\n+\t#define bpf_target_mips\n+#elif defined(__powerpc__)\n+\t#define bpf_target_powerpc\n+#elif defined(__sparc__)\n+\t#define bpf_target_sparc\n+#endif\n+#endif\n+\n+#if defined(bpf_target_x86)\n \n #define PT_REGS_PARM1(x) ((x)->di)\n #define PT_REGS_PARM2(x) ((x)->si)\n@@ -122,7 +162,7 @@ static int (*bpf_skb_change_head)(void *, int len, int flags) =\n #define PT_REGS_SP(x) ((x)->sp)\n #define PT_REGS_IP(x) ((x)->ip)\n \n-#elif defined(__s390x__)\n+#elif defined(bpf_target_s390x)\n \n #define PT_REGS_PARM1(x) ((x)->gprs[2])\n #define PT_REGS_PARM2(x) ((x)->gprs[3])\n@@ -135,7 +175,7 @@ static int (*bpf_skb_change_head)(void *, int len, int flags) =\n #define PT_REGS_SP(x) ((x)->gprs[15])\n #define PT_REGS_IP(x) ((x)->psw.addr)\n \n-#elif defined(__aarch64__)\n+#elif defined(bpf_target_arm64)\n \n #define PT_REGS_PARM1(x) ((x)->regs[0])\n #define PT_REGS_PARM2(x) ((x)->regs[1])\n@@ -148,7 +188,7 @@ static int (*bpf_skb_change_head)(void *, int len, int flags) =\n #define PT_REGS_SP(x) ((x)->sp)\n #define PT_REGS_IP(x) ((x)->pc)\n \n-#elif defined(__mips__)\n+#elif defined(bpf_target_mips)\n \n #define PT_REGS_PARM1(x) ((x)->regs[4])\n #define PT_REGS_PARM2(x) ((x)->regs[5])\n@@ -161,7 +201,7 @@ static int (*bpf_skb_change_head)(void *, int len, int flags) =\n #define PT_REGS_SP(x) ((x)->regs[29])\n #define PT_REGS_IP(x) ((x)->cp0_epc)\n \n-#elif defined(__powerpc__)\n+#elif defined(bpf_target_powerpc)\n \n #define PT_REGS_PARM1(x) ((x)->gpr[3])\n #define PT_REGS_PARM2(x) ((x)->gpr[4])\n@@ -172,7 +212,7 @@ static int (*bpf_skb_change_head)(void *, int len, int flags) =\n #define PT_REGS_SP(x) ((x)->sp)\n #define PT_REGS_IP(x) ((x)->nip)\n \n-#elif defined(__sparc__)\n+#elif defined(bpf_target_sparc)\n \n #define PT_REGS_PARM1(x) ((x)->u_regs[UREG_I0])\n #define PT_REGS_PARM2(x) ((x)->u_regs[UREG_I1])\n@@ -182,6 +222,8 @@ static int (*bpf_skb_change_head)(void *, int len, int flags) =\n #define PT_REGS_RET(x) ((x)->u_regs[UREG_I7])\n #define PT_REGS_RC(x) ((x)->u_regs[UREG_I0])\n #define PT_REGS_SP(x) ((x)->u_regs[UREG_FP])\n+\n+/* Should this also be a bpf_target check for the sparc case? */\n #if defined(__arch64__)\n #define PT_REGS_IP(x) ((x)->tpc)\n #else\n@@ -190,10 +232,10 @@ static int (*bpf_skb_change_head)(void *, int len, int flags) =\n \n #endif\n \n-#ifdef __powerpc__\n+#ifdef bpf_target_powerpc\n #define BPF_KPROBE_READ_RET_IP(ip, ctx)\t\t({ (ip) = (ctx)->link; })\n #define BPF_KRETPROBE_READ_RET_IP\t\tBPF_KPROBE_READ_RET_IP\n-#elif defined(__sparc__)\n+#elif bpf_target_sparc\n #define BPF_KPROBE_READ_RET_IP(ip, ctx)\t\t({ (ip) = PT_REGS_RET(ctx); })\n #define BPF_KRETPROBE_READ_RET_IP\t\tBPF_KPROBE_READ_RET_IP\n #else\n","prefixes":["v4","3/4"]}