From patchwork Wed Feb 15 13:52:01 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Pu Lehui X-Patchwork-Id: 5457 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:adf:eb09:0:0:0:0:0 with SMTP id s9csp202748wrn; Wed, 15 Feb 2023 05:55:35 -0800 (PST) X-Google-Smtp-Source: AK7set+izPUyIutz87S6GYknEtFFr61eUOyfInalIpODUBW2vIs1ArCY2wGe3ERz/eTLeEi2tfeO X-Received: by 2002:a17:906:aeda:b0:886:4ca1:39f1 with SMTP id me26-20020a170906aeda00b008864ca139f1mr2221477ejb.73.1676469335223; Wed, 15 Feb 2023 05:55:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1676469335; cv=none; d=google.com; s=arc-20160816; b=YvoEhfiZ/oF3fUWm0iUstDpVRv5BjWqlDptiDquFuhfwFEiLZBuPoe+wm/uvlix10R hSrtfk9wJFKbMD4oFxHnu2HAJlHO7wSWI+kfek4vFemsVSp/O1rj7+IgeiR8tZHn1fiZ aiYcstw2WodlCk9TNq5+uwFVMEmj4rpc6cJn22Rvxrok4jBzVJCus5skVTP8YqE5Amk4 7qIZVU/GioiGJgS0T3wG/NffE52j2tqnor9UqN6AWnGBKlrbWDUtn3/SwG7sOumc7epr JVEFke7w5q8dqYG2mN+13zurIHqskQQM5C8hTn1agZcnd1wXTPwWZ+OHGo7IY0oGPXsD GHsA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=mLAK0BjkbxqsV+vN8GKbouAQHC7fZqqt9ffRUIE7mFo=; b=Ce5h7Fp8QRRBiQd70x3fBZQW6wXSttx7ihrgdXYHDutOBtYK6CvRUynNwAzYl41v0s R4lE7wca72keMZfz9ka0qK9hSvAn2T++BCWMcpVJNbVGThyceiym4D9iZUbQWC+JsD/p 03QPGxEdSCzR/fTre/XI5vIc9fwPAC7YtXTA8z8MAoY44IN2BkvLDkqIZ0x5EkRKQ1hF yyDGt4OwodnMwVmu7kYWOFVZ9szCPmD1tfDugLlpP7cQZEs5bNmaMWRS1uJCtY8gyAAx Eynk9QpNTodTPywA6WnQr9a8l0cNhGALFgeIH4NW21RpS2Lip/Mw5yTdBS1SH3atb6Dg eXew== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id mt17-20020a170907619100b00877da25cb31si21024572ejc.869.2023.02.15.05.55.11; Wed, 15 Feb 2023 05:55:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229635AbjBONt6 (ORCPT + 99 others); Wed, 15 Feb 2023 08:49:58 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37882 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229763AbjBONty (ORCPT ); Wed, 15 Feb 2023 08:49:54 -0500 Received: from dggsgout12.his.huawei.com (dggsgout12.his.huawei.com [45.249.212.56]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3F2C74C38; Wed, 15 Feb 2023 05:49:53 -0800 (PST) Received: from mail02.huawei.com (unknown [172.30.67.153]) by dggsgout12.his.huawei.com (SkyGuard) with ESMTP id 4PGzwB6rC2z4f3l6s; Wed, 15 Feb 2023 21:49:46 +0800 (CST) Received: from localhost.localdomain (unknown [10.67.175.61]) by APP1 (Coremail) with SMTP id cCh0CgDnUSz64uxjC3LEDQ--.36740S2; Wed, 15 Feb 2023 21:49:47 +0800 (CST) From: Pu Lehui To: bpf@vger.kernel.org, linux-riscv@lists.infradead.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Cc: =?utf-8?b?QmrDtnJuIFTDtnBlbA==?= , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Palmer Dabbelt , Conor Dooley , Guo Ren , Luke Nelson , Xi Wang , Pu Lehui , Pu Lehui Subject: [PATCH bpf-next v1 0/4] Support bpf trampoline for RV64 Date: Wed, 15 Feb 2023 21:52:01 +0800 Message-Id: <20230215135205.1411105-1-pulehui@huaweicloud.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 X-CM-TRANSID: cCh0CgDnUSz64uxjC3LEDQ--.36740S2 X-Coremail-Antispam: 1UD129KBjvJXoW7tw17GrWfJw4xAr4fGF13twb_yoW8Wryfpa yjkry3AryDu3W3JwnIya18ZryrKayvgw13Gw13t3yfJa1Yqry7ZrnYgayYyw15AF9xur1j yrn0qryj9FyDAa7anT9S1TB71UUUUUUqnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDU0xBIdaVrnRJUUUvY14x267AKxVW5JVWrJwAFc2x0x2IEx4CE42xK8VAvwI8IcIk0 rVWrJVCq3wAFIxvE14AKwVWUJVWUGwA2ocxC64kIII0Yj41l84x0c7CEw4AK67xGY2AK02 1l84ACjcxK6xIIjxv20xvE14v26w1j6s0DM28EF7xvwVC0I7IYx2IY6xkF7I0E14v26r4U JVWxJr1l84ACjcxK6I8E87Iv67AKxVW0oVCq3wA2z4x0Y4vEx4A2jsIEc7CjxVAFwI0_Gc CE3s1le2I262IYc4CY6c8Ij28IcVAaY2xG8wAqx4xG64xvF2IEw4CE5I8CrVC2j2WlYx0E 2Ix0cI8IcVAFwI0_Jr0_Jr4lYx0Ex4A2jsIE14v26r1j6r4UMcvjeVCFs4IE7xkEbVWUJV W8JwACjcxG0xvY0x0EwIxGrwACjI8F5VA0II8E6IAqYI8I648v4I1lFIxGxcIEc7CjxVA2 Y2ka0xkIwI1l42xK82IYc2Ij64vIr41l4I8I3I0E4IkC6x0Yz7v_Jr0_Gr1lx2IqxVAqx4 xG67AKxVWUJVWUGwC20s026x8GjcxK67AKxVWUGVWUWwC2zVAF1VAY17CE14v26r4a6rW5 MIIYrxkI7VAKI48JMIIF0xvE2Ix0cI8IcVAFwI0_Jr0_JF4lIxAIcVC0I7IYx2IY6xkF7I 0E14v26r4j6F4UMIIF0xvE42xK8VAvwI8IcIk0rVWrZr1j6s0DMIIF0xvEx4A2jsIE14v2 6r1j6r4UMIIF0xvEx4A2jsIEc7CjxVAFwI0_Gr0_Gr1UYxBIdaVFxhVjvjDU0xZFpf9x0J UQvtAUUUUU= X-CM-SenderInfo: psxovxtxl6x35dzhxuhorxvhhfrp/ X-CFilter-Loop: Reflected X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1757905509955233899?= X-GMAIL-MSGID: =?utf-8?q?1757905509955233899?= BPF trampoline is the critical infrastructure of the bpf subsystem, acting as a mediator between kernel functions and BPF programs. Numerous important features, such as using ebpf program for zero overhead kernel introspection, rely on this key component. We can't wait to support bpf trampoline on RV64. Since RV64 does not support ftrace direct call yet, the current RV64 bpf trampoline is only used in bpf context. As most of riscv cpu support unaligned memory accesses, we temporarily use patch [1] to facilitate testing. The test results are as follow, and test_verifier with no new failure ceses. - fexit_bpf2bpf:OK - dummy_st_ops:OK - xdp_bpf2bpf:OK [1] https://lore.kernel.org/linux-riscv/20210916130855.4054926-2-chenhuang5@huawei.com/ v1: - Remove the logic of bpf_arch_text_poke supported for kernel functions. (Kuohai and Björn) - Extend patch_text for multiple instructions. (Björn) - Fix OOB issue when image too big. (Björn) RFC: https://lore.kernel.org/bpf/20230103090756.1993820-1-pulehui@huaweicloud.com/ Pu Lehui (4): riscv: Extend patch_text for multiple instructions riscv, bpf: Factor out emit_call for kernel and bpf context riscv, bpf: Add bpf_arch_text_poke support for RV64 riscv, bpf: Add bpf trampoline support for RV64 arch/riscv/include/asm/patch.h | 2 +- arch/riscv/kernel/patch.c | 19 +- arch/riscv/kernel/probes/kprobes.c | 15 +- arch/riscv/net/bpf_jit.h | 5 + arch/riscv/net/bpf_jit_comp64.c | 437 +++++++++++++++++++++++++++-- 5 files changed, 444 insertions(+), 34 deletions(-) Tested-by: Björn Töpel Acked-by: Björn Töpel