lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <b9d38c43-a2a7-ae6d-79e1-51507103ef88@huawei.com> Date: Fri, 15 Apr 2022 10:37:18 +0800 From: Hou Tao <houtao1@...wei.com> To: Xu Kuohai <xukuohai@...wei.com>, <bpf@...r.kernel.org>, <linux-arm-kernel@...ts.infradead.org>, <linux-kernel@...r.kernel.org>, <netdev@...r.kernel.org>, <linux-kselftest@...r.kernel.org> CC: Catalin Marinas <catalin.marinas@....com>, Will Deacon <will@...nel.org>, Steven Rostedt <rostedt@...dmis.org>, Ingo Molnar <mingo@...hat.com>, Daniel Borkmann <daniel@...earbox.net>, Alexei Starovoitov <ast@...nel.org>, Zi Shen Lim <zlim.lnx@...il.com>, Andrii Nakryiko <andrii@...nel.org>, Martin KaFai Lau <kafai@...com>, Song Liu <songliubraving@...com>, Yonghong Song <yhs@...com>, John Fastabend <john.fastabend@...il.com>, KP Singh <kpsingh@...nel.org>, "David S . Miller" <davem@...emloft.net>, Hideaki YOSHIFUJI <yoshfuji@...ux-ipv6.org>, David Ahern <dsahern@...nel.org>, Thomas Gleixner <tglx@...utronix.de>, Borislav Petkov <bp@...en8.de>, Dave Hansen <dave.hansen@...ux.intel.com>, <x86@...nel.org>, <hpa@...or.com>, Shuah Khan <shuah@...nel.org>, Mark Rutland <mark.rutland@....com>, Ard Biesheuvel <ardb@...nel.org>, Pasha Tatashin <pasha.tatashin@...een.com>, Peter Collingbourne <pcc@...gle.com>, Daniel Kiss <daniel.kiss@....com>, Sudeep Holla <sudeep.holla@....com>, Steven Price <steven.price@....com>, Marc Zyngier <maz@...nel.org>, Mark Brown <broonie@...nel.org>, Kumar Kartikeya Dwivedi <memxor@...il.com>, Delyan Kratunov <delyank@...com> Subject: Re: [PATCH bpf-next v2 0/6] bpf trampoline for arm64 Hi, On 4/15/2022 12:22 AM, Xu Kuohai wrote: > Add bpf trampoline support for arm64. Most of the logic is the same as > x86. > > Tested on qemu, result: > #55 fentry_fexit:OK > #56 fentry_test:OK > #58 fexit_sleep:OK > #59 fexit_stress:OK > #60 fexit_test:OK > #67 get_func_args_test:OK > #68 get_func_ip_test:OK > #101 modify_return:OK bpf_struct_ops also depends on bpf trampoline, could you please also add the test results for bpf_struct_ops related tests case ? > > v2: > - Add Song's ACK > - Change the multi-line comment in is_valid_bpf_tramp_flags() into net > style (patch 3) > - Fix a deadloop issue in ftrace selftest (patch 2) > - Replace pt_regs->x0 with pt_regs->orig_x0 in patch 1 commit message > - Replace "bpf trampoline" with "custom trampoline" in patch 1, as > ftrace direct call is not only used by bpf trampoline. > > v1: https://lore.kernel.org/bpf/20220413054959.1053668-1-xukuohai@huawei.com/ > > Xu Kuohai (6): > arm64: ftrace: Add ftrace direct call support > ftrace: Fix deadloop caused by direct call in ftrace selftest > bpf: Move is_valid_bpf_tramp_flags() to the public trampoline code > bpf, arm64: Impelment bpf_arch_text_poke() for arm64 > bpf, arm64: bpf trampoline for arm64 > selftests/bpf: Fix trivial typo in fentry_fexit.c > > arch/arm64/Kconfig | 2 + > arch/arm64/include/asm/ftrace.h | 10 + > arch/arm64/kernel/asm-offsets.c | 1 + > arch/arm64/kernel/entry-ftrace.S | 28 +- > arch/arm64/net/bpf_jit.h | 14 +- > arch/arm64/net/bpf_jit_comp.c | 390 +++++++++++++++++- > arch/x86/net/bpf_jit_comp.c | 20 - > include/linux/bpf.h | 5 + > kernel/bpf/bpf_struct_ops.c | 4 +- > kernel/bpf/trampoline.c | 35 +- > kernel/trace/trace_selftest.c | 4 +- > .../selftests/bpf/prog_tests/fentry_fexit.c | 4 +- > 12 files changed, 482 insertions(+), 35 deletions(-) >
Powered by blists - more mailing lists