From: Alexei Starovoitov Date: Mon, 20 Jan 2025 17:43:29 +0000 (-0800) Subject: Merge branch 'bpf-allow-may_goto-0-instruction' X-Git-Tag: v6.14-rc1~133^2 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=3f3c2f0cf669ff28b995b3d6b820ab870c2aa9d9;p=thirdparty%2Fkernel%2Fstable.git Merge branch 'bpf-allow-may_goto-0-instruction' Yonghong Song says: ==================== Emil Tsalapatis from Meta reported such a case where 'may_goto 0' insn is generated by clang-19 compiler and this caused verification failure since 'may_goto 0' is rejected by verifier. In fact, 'may_goto 0' insn is actually a no-op and it won't hurt verification. The only side effect is that the verifier will convert the insn to a sequence of codes like /* r10 - 8 stores the implicit loop count */ r11 = *(u64 *)(r10 -8) if r11 == 0x0 goto pc+2 r11 -= 1 *(u64 *)(r10 -8) = r11 With this patch set 'may_goto 0' insns are allowed in verification which also removes those insns. Changelogs: v1 -> v2: - Instead of a separate function, removing 'may_goto 0' in existing func opt_remove_nops(). ==================== Link: https://patch.msgid.link/20250118192019.2123689-1-yonghong.song@linux.dev Signed-off-by: Alexei Starovoitov --- 3f3c2f0cf669ff28b995b3d6b820ab870c2aa9d9