[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20220130092917.14544-1-hotforest@gmail.com>
Date: Sun, 30 Jan 2022 17:29:14 +0800
From: Hou Tao <hotforest@...il.com>
To: Daniel Borkmann <daniel@...earbox.net>
Cc: Alexei Starovoitov <ast@...nel.org>,
Martin KaFai Lau <kafai@...com>, Yonghong Song <yhs@...com>,
Andrii Nakryiko <andrii@...nel.org>,
"David S . Miller" <davem@...emloft.net>,
Jakub Kicinski <kuba@...nel.org>,
John Fastabend <john.fastabend@...il.com>,
netdev@...r.kernel.org, bpf@...r.kernel.org, houtao1@...wei.com,
Zi Shen Lim <zlim.lnx@...il.com>,
Catalin Marinas <catalin.marinas@....com>,
Will Deacon <will@...nel.org>,
Ard Biesheuvel <ard.biesheuvel@....com>,
linux-arm-kernel@...ts.infradead.org, Hou Tao <hotforest@...il.com>
Subject: [PATCH bpf-next v3 0/3] bpf, arm64: enable kfunc call
Hi,
The simple patchset tries to enable kfunc call for arm64. Patch #1 just
overrides bpf_jit_supports_kfunc_call() to enable kfunc call, patch #2
unexports the subtests in ksyms_module.c to fix the confusion in test
output and patch #3 add a test in ksyms_module.c to ensure s32 is
sufficient for kfunc offset.
Change Log:
v3:
* patch #2: newly-addded to unexport unnecessary subtests
* patch #3: use kallsyms_find() instead of reimplementing it.
* patch #3: ensure kfunc call is supported before checking
whether s32 will be overflowed or not.
v2: https://lore.kernel.org/bpf/20220127071532.384888-1-houtao1@huawei.com/
* add a test to check whether imm will be overflowed for kfunc call
v1: https://lore.kernel.org/bpf/20220119144942.305568-1-houtao1@huawei.com
Hou Tao (3):
bpf, arm64: enable kfunc call
selftests/bpf: do not export subtest as standalone test
selftests/bpf: check whether s32 is sufficient for kfunc offset
arch/arm64/net/bpf_jit_comp.c | 5 ++
.../selftests/bpf/prog_tests/ksyms_module.c | 46 ++++++++++++++++++-
.../bpf/prog_tests/xdp_adjust_frags.c | 6 ---
.../bpf/prog_tests/xdp_adjust_tail.c | 4 +-
.../bpf/prog_tests/xdp_cpumap_attach.c | 4 +-
.../bpf/prog_tests/xdp_devmap_attach.c | 2 +-
6 files changed, 54 insertions(+), 13 deletions(-)
--
2.20.1
Powered by blists - more mailing lists