Received: by 10.192.165.148 with SMTP id m20csp1331340imm; Fri, 27 Apr 2018 17:49:08 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqeS5bj5D+evgS1PwY8q4e+p5RVs2gG4Dc8gSr6aXwu/iPcEz7DWHgvY7SDthtt5LvHdLFP X-Received: by 2002:a17:902:688c:: with SMTP id i12-v6mr4127454plk.166.1524876548626; Fri, 27 Apr 2018 17:49:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524876548; cv=none; d=google.com; s=arc-20160816; b=bQZ0lzq2uTOO6ITbJbiB8k1qTW7rVNYZKq5e9rvHWrR4bKirxz2RvjmkK4Cl0eC2Md 3qPcp5fIGvi4aeftK9dPCOoylLMsxjSSdgEQ1wZS/rqq48604h+6eKkeK2dagVakyvcv ukBLS96KrA/HkdywjjWrXxrR6YDci86HCOME+GmrnBXh13pcdNFFWW6SbVAPcBrDEe2+ CcadZoKZdoGNmIN1/Kvg47SyUAWdGbWjFqslHNCUiSg7ca4IyhcRXsIEwoSOWjcqLIWr WCJWH/gJA/qb9jkB4PHb9TMtf6+mvTmpWYvFw0xBelH1D9aZ19tcULnP3AgDb0zN7lZ2 rGoQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:arc-authentication-results; bh=+zM1FsthdffSjNXf6aTSWxa62KEAk/9sczWIW+xtQD4=; b=rYNgof1TjTVQc2pAUD4hPQkg0QhM/TBLVB1rUVzt4A2f9z1QmrgVUmhci+Z9BUqh+T XJe/pTJ4eWFpVU+ZM95AbTHqNTunN8MjEuAyub/26cBiyGN7CcKqT6oCWv19dYo7gB1t ezSfGWvQeiHJtdK5/zck3FXZkSNkWye1BmIJiOjJc8JxZ6JJu6s0qHSbGJKU0tiwwfD2 EMj3P6Ttv7uI8O8C4zdyDI45vZvhXr13ZDxRAspC83nGorrePSqF8NWz2mKzCs07XNh0 zRYEVARUAYPTexege9qpPYa2vbiKG+vXYhrNwLfCPsf6MCRPwJZT8usQpxmDFYpJuSM2 qK5A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 62-v6si2277380pld.133.2018.04.27.17.48.54; Fri, 27 Apr 2018 17:49:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1759427AbeD1Art (ORCPT + 99 others); Fri, 27 Apr 2018 20:47:49 -0400 Received: from www62.your-server.de ([213.133.104.62]:54017 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754447AbeD1Arr (ORCPT ); Fri, 27 Apr 2018 20:47:47 -0400 Received: from [62.202.221.10] (helo=linux.home) by www62.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-SHA:256) (Exim 4.85_2) (envelope-from ) id 1fCE1Y-0004bR-Li; Sat, 28 Apr 2018 02:47:36 +0200 Subject: Re: [PATCH v4] bpf, x86_32: add eBPF JIT compiler for ia32 To: Wang YanQing , ast@kernel.org, illusionist.neo@gmail.com, tglx@linutronix.de, mingo@redhat.com, hpa@zytor.com, davem@davemloft.net, x86@kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org References: <20180426101257.GA29387@udknight> From: Daniel Borkmann Message-ID: <780e9ae2-f002-20bd-c491-b3e78066a8b4@iogearbox.net> Date: Sat, 28 Apr 2018 02:47:36 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0 MIME-Version: 1.0 In-Reply-To: <20180426101257.GA29387@udknight> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.99.3/24519/Fri Apr 27 22:27:55 2018) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04/26/2018 12:12 PM, Wang YanQing wrote: [...] > +/* encode 'dst_reg' and 'src_reg' registers into x86_32 opcode 'byte' */ > +static u8 add_2reg(u8 byte, u32 dst_reg, u32 src_reg) > +{ > + return byte + dst_reg + (src_reg << 3); > +} > + > +static void jit_fill_hole(void *area, unsigned int size) > +{ > + /* fill whole space with int3 instructions */ > + memset(area, 0xcc, size); > +} > + > +/* Checks whether BPF register is on scratch stack space or not. */ > +static inline bool is_on_stack(u8 bpf_reg) > +{ > + static u8 stack_regs[] = {BPF_REG_AX}; Nit: you call this stack_regs here ... > + int i, reg_len = sizeof(stack_regs); > + > + for (i = 0 ; i < reg_len ; i++) { > + if (bpf_reg == stack_regs[i]) > + return false; ... but [BPF_REG_AX] = {IA32_ESI, IA32_EDI} is the only one that is not on stack? > + } > + return true; > +} > + > +static inline void emit_ia32_mov_i(const u8 dst, const u32 val, bool dstk, > + u8 **pprog) > +{ > + u8 *prog = *pprog; > + int cnt = 0; > + > + if (dstk) { > + if (val == 0) { > + /* xor eax,eax */ > + EMIT2(0x33, add_2reg(0xC0, IA32_EAX, IA32_EAX)); > + /* mov dword ptr [ebp+off],eax */ > + EMIT3(0x89, add_2reg(0x40, IA32_EBP, IA32_EAX), > + STACK_VAR(dst)); > + } else { > + EMIT3_off32(0xC7, add_1reg(0x40, IA32_EBP), > + STACK_VAR(dst), val); > + } > + } else { > + if (val == 0) > + EMIT2(0x33, add_2reg(0xC0, dst, dst)); > + else > + EMIT2_off32(0xC7, add_1reg(0xC0, dst), > + val); > + } > + *pprog = prog; > +} > + [...] > + if (is_imm8(jmp_offset)) { > + EMIT2(jmp_cond, jmp_offset); > + } else if (is_simm32(jmp_offset)) { > + EMIT2_off32(0x0F, jmp_cond + 0x10, jmp_offset); > + } else { > + pr_err("cond_jmp gen bug %llx\n", jmp_offset); > + return -EFAULT; > + } > + > + break; > + } > + case BPF_JMP | BPF_JA: > + jmp_offset = addrs[i + insn->off] - addrs[i]; > + if (!jmp_offset) > + /* optimize out nop jumps */ > + break; Needs same fix as in x86-64 JIT in 1612a981b766 ("bpf, x64: fix JIT emission for dead code"). > +emit_jmp: > + if (is_imm8(jmp_offset)) { > + EMIT2(0xEB, jmp_offset); > + } else if (is_simm32(jmp_offset)) { > + EMIT1_off32(0xE9, jmp_offset); > + } else { > + pr_err("jmp gen bug %llx\n", jmp_offset); > + return -EFAULT; > + } > + break;