From patchwork Thu Jan 27 07:15:30 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Hou Tao X-Patchwork-Id: 12728131 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id E5E00C4332F for ; Fri, 28 Jan 2022 08:41:58 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243222AbiA1Il5 (ORCPT ); Fri, 28 Jan 2022 03:41:57 -0500 Received: from szxga02-in.huawei.com ([45.249.212.188]:17823 "EHLO szxga02-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243158AbiA1Ilz (ORCPT ); Fri, 28 Jan 2022 03:41:55 -0500 Received: from dggpeml500025.china.huawei.com (unknown [172.30.72.57]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4JlWB81Ww1z9sbd; Fri, 28 Jan 2022 16:40:32 +0800 (CST) Received: from huawei.com (10.175.124.27) by dggpeml500025.china.huawei.com (7.185.36.35) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.21; Fri, 28 Jan 2022 16:41:48 +0800 From: Hou Tao To: Daniel Borkmann CC: Alexei Starovoitov , Martin KaFai Lau , Yonghong Song , Andrii Nakryiko , "David S . Miller" , Jakub Kicinski , John Fastabend , , , , Zi Shen Lim , Catalin Marinas , Will Deacon , Ard Biesheuvel , Subject: [PATCH bpf-next v2 0/2] bpf, arm64: enable kfunc call Date: Thu, 27 Jan 2022 15:15:30 +0800 Message-ID: <20220127071532.384888-1-houtao1@huawei.com> X-Mailer: git-send-email 2.27.0 MIME-Version: 1.0 X-Originating-IP: [10.175.124.27] X-ClientProxiedBy: dggems703-chm.china.huawei.com (10.3.19.180) To dggpeml500025.china.huawei.com (7.185.36.35) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org X-Patchwork-Delegate: bpf@iogearbox.net Hi, The simple patchset tries to enable kfunc call for arm64. Patch #1 just overrides bpf_jit_supports_kfunc_call() to enable kfunc call and patch #2 add a test to ensure s32 is sufficient for kfunc offset. Change Log: v2: * add a test to check whether imm will be overflowed for kfunc call v1: https://lore.kernel.org/bpf/20220119144942.305568-1-houtao1@huawei.com Hou Tao (2): bpf, arm64: enable kfunc call selftests/bpf: check whether s32 is sufficient for kfunc offset arch/arm64/net/bpf_jit_comp.c | 5 ++ .../selftests/bpf/prog_tests/ksyms_module.c | 72 +++++++++++++++++++ 2 files changed, 77 insertions(+)