On Thu, Mar 02, 2023 at 03:19:24PM -0800, Dave Marchevsky wrote: > Per C99 standard [0], Section 6.7.8, Paragraph 10: > > If an object that has automatic storage duration is not initialized > explicitly, its value is indeterminate. > > And in the same document, in appendix "J.2 Undefined behavior": > > The behavior is undefined in the following circumstances: > [...] > The value of an object with automatic storage duration is used while > it is indeterminate (6.2.4, 6.7.8, 6.8). > > This means that use of an uninitialized stack variable is undefined > behavior, and therefore that clang can choose to do a variety of scary > things, such as not generating bytecode for "bunch of useful code" in > the below example: > > void some_func() > { > int i; > if (!i) > return; > // bunch of useful code > } > > To add insult to injury, if some_func above is a helper function for > some BPF program, clang can choose to not generate an "exit" insn, > causing verifier to fail with "last insn is not an exit or jmp". Going > from that verification failure to the root cause of uninitialized use > is certain to be frustrating. > > This patch adds -Wuninitialized to the cflags for selftest BPF progs and > fixes up existing instances of uninitialized use. > > [0]: https://www.open-std.org/jtc1/sc22/WG14/www/docs/n1256.pdf > > Signed-off-by: Dave Marchevsky <davemarchevsky@xxxxxx> > Cc: David Vernet <void@xxxxxxxxxxxxx> > Cc: Tejun Heo <tj@xxxxxxxxxx> Acked-by: David Vernet <void@xxxxxxxxxxxxx> > --- > tools/testing/selftests/bpf/Makefile | 2 +- > tools/testing/selftests/bpf/progs/rbtree.c | 2 +- > tools/testing/selftests/bpf/progs/rbtree_fail.c | 5 +++-- > .../selftests/bpf/progs/test_kfunc_dynptr_param.c | 2 +- > .../testing/selftests/bpf/progs/test_sk_lookup_kern.c | 2 +- > tools/testing/selftests/bpf/progs/test_tunnel_kern.c | 10 +++++----- > 6 files changed, 12 insertions(+), 11 deletions(-) > > diff --git a/tools/testing/selftests/bpf/Makefile b/tools/testing/selftests/bpf/Makefile > index f40606a85a0f..eab3cf5399f5 100644 > --- a/tools/testing/selftests/bpf/Makefile > +++ b/tools/testing/selftests/bpf/Makefile > @@ -357,7 +357,7 @@ BPF_CFLAGS = -g -Werror -D__TARGET_ARCH_$(SRCARCH) $(MENDIAN) \ > -I$(abspath $(OUTPUT)/../usr/include) > > CLANG_CFLAGS = $(CLANG_SYS_INCLUDES) \ > - -Wno-compare-distinct-pointer-types > + -Wno-compare-distinct-pointer-types -Wuninitialized > > $(OUTPUT)/test_l4lb_noinline.o: BPF_CFLAGS += -fno-inline > $(OUTPUT)/test_xdp_noinline.o: BPF_CFLAGS += -fno-inline > diff --git a/tools/testing/selftests/bpf/progs/rbtree.c b/tools/testing/selftests/bpf/progs/rbtree.c > index e5db1a4287e5..4c90aa6abddd 100644 > --- a/tools/testing/selftests/bpf/progs/rbtree.c > +++ b/tools/testing/selftests/bpf/progs/rbtree.c > @@ -75,7 +75,7 @@ SEC("tc") > long rbtree_add_and_remove(void *ctx) > { > struct bpf_rb_node *res = NULL; > - struct node_data *n, *m; > + struct node_data *n, *m = NULL; > > n = bpf_obj_new(typeof(*n)); > if (!n) > diff --git a/tools/testing/selftests/bpf/progs/rbtree_fail.c b/tools/testing/selftests/bpf/progs/rbtree_fail.c > index bf3cba115897..3368f4b05ca0 100644 > --- a/tools/testing/selftests/bpf/progs/rbtree_fail.c > +++ b/tools/testing/selftests/bpf/progs/rbtree_fail.c > @@ -232,8 +232,9 @@ long rbtree_api_first_release_unlock_escape(void *ctx) > > bpf_spin_lock(&glock); > res = bpf_rbtree_first(&groot); > - if (res) > - n = container_of(res, struct node_data, node); > + if (!res) > + return -1; > + n = container_of(res, struct node_data, node); > bpf_spin_unlock(&glock); > > bpf_spin_lock(&glock); > diff --git a/tools/testing/selftests/bpf/progs/test_kfunc_dynptr_param.c b/tools/testing/selftests/bpf/progs/test_kfunc_dynptr_param.c > index 2fbef3cc7ad8..2dde8e3fe4c9 100644 > --- a/tools/testing/selftests/bpf/progs/test_kfunc_dynptr_param.c > +++ b/tools/testing/selftests/bpf/progs/test_kfunc_dynptr_param.c > @@ -48,7 +48,7 @@ SEC("?lsm.s/bpf") > __failure __msg("arg#0 expected pointer to stack or dynptr_ptr") > int BPF_PROG(not_ptr_to_stack, int cmd, union bpf_attr *attr, unsigned int size) > { > - unsigned long val; > + unsigned long val = 0; > > return bpf_verify_pkcs7_signature((struct bpf_dynptr *)val, > (struct bpf_dynptr *)val, NULL); > diff --git a/tools/testing/selftests/bpf/progs/test_sk_lookup_kern.c b/tools/testing/selftests/bpf/progs/test_sk_lookup_kern.c > index b502e5c92e33..6ccf6d546074 100644 > --- a/tools/testing/selftests/bpf/progs/test_sk_lookup_kern.c > +++ b/tools/testing/selftests/bpf/progs/test_sk_lookup_kern.c > @@ -23,8 +23,8 @@ static struct bpf_sock_tuple *get_tuple(void *data, __u64 nh_off, > bool *ipv4) > { > struct bpf_sock_tuple *result; > + __u64 ihl_len = 0; > __u8 proto = 0; > - __u64 ihl_len; > > if (eth_proto == bpf_htons(ETH_P_IP)) { > struct iphdr *iph = (struct iphdr *)(data + nh_off); > diff --git a/tools/testing/selftests/bpf/progs/test_tunnel_kern.c b/tools/testing/selftests/bpf/progs/test_tunnel_kern.c > index 508da4a23c4f..95b4aa0928ba 100644 > --- a/tools/testing/selftests/bpf/progs/test_tunnel_kern.c > +++ b/tools/testing/selftests/bpf/progs/test_tunnel_kern.c Coincidentally, this seems to also be failing on master. > @@ -324,11 +324,11 @@ int ip4ip6erspan_get_tunnel(struct __sk_buff *skb) > SEC("tc") > int vxlan_set_tunnel_dst(struct __sk_buff *skb) > { > - int ret; > struct bpf_tunnel_key key; > struct vxlan_metadata md; > __u32 index = 0; > __u32 *local_ip = NULL; > + int ret = 0; > > local_ip = bpf_map_lookup_elem(&local_ip_map, &index); > if (!local_ip) { > @@ -363,11 +363,11 @@ int vxlan_set_tunnel_dst(struct __sk_buff *skb) > SEC("tc") > int vxlan_set_tunnel_src(struct __sk_buff *skb) > { > - int ret; > struct bpf_tunnel_key key; > struct vxlan_metadata md; > __u32 index = 0; > __u32 *local_ip = NULL; > + int ret = 0; > > local_ip = bpf_map_lookup_elem(&local_ip_map, &index); > if (!local_ip) { > @@ -494,9 +494,9 @@ SEC("tc") > int ip6vxlan_set_tunnel_dst(struct __sk_buff *skb) > { > struct bpf_tunnel_key key; > - int ret; > __u32 index = 0; > __u32 *local_ip; > + int ret = 0; > > local_ip = bpf_map_lookup_elem(&local_ip_map, &index); > if (!local_ip) { > @@ -525,9 +525,9 @@ SEC("tc") > int ip6vxlan_set_tunnel_src(struct __sk_buff *skb) > { > struct bpf_tunnel_key key; > - int ret; > __u32 index = 0; > __u32 *local_ip; > + int ret = 0; > > local_ip = bpf_map_lookup_elem(&local_ip_map, &index); > if (!local_ip) { > @@ -556,9 +556,9 @@ SEC("tc") > int ip6vxlan_get_tunnel_src(struct __sk_buff *skb) > { > struct bpf_tunnel_key key; > - int ret; > __u32 index = 0; > __u32 *local_ip; > + int ret = 0; > > local_ip = bpf_map_lookup_elem(&local_ip_map, &index); > if (!local_ip) { > -- > 2.30.2 >