Received: by 2002:a25:23cc:0:0:0:0:0 with SMTP id j195csp1733040ybj; Wed, 6 May 2020 04:24:35 -0700 (PDT) X-Google-Smtp-Source: APiQypJWGbvsu62/ElqhYRZAmOqIZ+N9+QNKzV1dPKh7iA0Hezris8jlNB8/MAnqcvCkoxhPTC45 X-Received: by 2002:a50:e70a:: with SMTP id a10mr6777469edn.124.1588764275227; Wed, 06 May 2020 04:24:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588764275; cv=none; d=google.com; s=arc-20160816; b=iuo/tDTZBQKXQorQx9l+WUfwNHUba7mwOIWe0IodevLsePnOqsSyAYvUCs02MYmqjU lHLm2XcigkAA3XsIYVWgPYf6wTyVqdNIOO7MwM0fosuCcuxi/u8zd+5vJqbpA6+zyGwW O5cXMHkXN+m2WXcutAgcrFIDhw6q57yZnmqyIbZ5K+P2KRKo1y4fxltAu32pQ6n+bM3N 7gsUcUcof63zDn//FUP4kacgvqJvNiiDLWu0EGFxkj0+dnaE+03hSSboU7R1ewCGwSsD kj0DHaa09/tyb2hz0WlG2juz0ZJGW+ydpuiH1vvuoa5Mik/0T3ChaEXE23RoGVpCyy+R f1xQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=NXVaKDz+JVYwyoIHnSRq5UCQ9tuNORjprV4LJpsQmBQ=; b=YgtwKrJCeibjVM3sdqOC36h6LpEKbqPW5yTeoas3nEiVJhVxTky9tEmEEDjirPBBB+ To5e2xhi20BndiK3FsNqG4YGESRZjZHQ5NvIBBuCraVwXOILArC6Fcm6Xa9zJhhj3VZh EsS2nhuU2WKcSKAdXjbY3Qs2l4B+INgxHmq+z2u0ZGqDaB/ff84ccyf9W7TurJEpOscs +QFf6KVF/1u9aOobWLih+EjYg0W1+pVkUpjnBh1FZ1ehABNhfaLntbgTXlZwk0TUoPIn WeAb0NFBzlP1H0DYK7ld+0+khP4rXc2aYFsf1MDebfXXkX+mX9o5QX9M+8RrhL6H3RGO dbuA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bi20si897124edb.233.2020.05.06.04.24.12; Wed, 06 May 2020 04:24:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728590AbgEFIId (ORCPT + 99 others); Wed, 6 May 2020 04:08:33 -0400 Received: from www62.your-server.de ([213.133.104.62]:35208 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728345AbgEFIIc (ORCPT ); Wed, 6 May 2020 04:08:32 -0400 Received: from sslproxy05.your-server.de ([78.46.172.2]) by www62.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89_1) (envelope-from ) id 1jWF6Q-0001an-HW; Wed, 06 May 2020 10:08:26 +0200 Received: from [178.195.186.98] (helo=pc-9.home) by sslproxy05.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1jWF6P-0005kQ-Vt; Wed, 06 May 2020 10:08:26 +0200 Subject: Re: [PATCH bpf-next 0/4] RV64 BPF JIT Optimizations To: =?UTF-8?B?QmrDtnJuIFTDtnBlbA==?= , Luke Nelson Cc: bpf , Luke Nelson , Xi Wang , Paul Walmsley , Palmer Dabbelt , Albert Ou , Alexei Starovoitov , Martin KaFai Lau , Song Liu , Yonghong Song , Andrii Nakryiko , John Fastabend , KP Singh , Netdev , linux-riscv@lists.infradead.org, LKML References: <20200506000320.28965-1-luke.r.nels@gmail.com> From: Daniel Borkmann Message-ID: <76105702-4f84-ead9-6568-48f718cf85c2@iogearbox.net> Date: Wed, 6 May 2020 10:08:24 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.102.2/25803/Tue May 5 14:19:25 2020) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 5/6/20 9:08 AM, Björn Töpel wrote: > On Wed, 6 May 2020 at 02:03, Luke Nelson wrote: >> >> This patch series introduces a set of optimizations to the BPF JIT >> on RV64. The optimizations are related to the verifier zero-extension >> optimization and BPF_JMP BPF_K. >> >> We tested the optimizations on a QEMU riscv64 virt machine, using >> lib/test_bpf and test_verifier, and formally verified their correctness >> using Serval. >> > > Luke and Xi, > > Thanks a lot for working on this! Very nice series! > > For the series: > Reviewed-by: Björn Töpel > Acked-by: Björn Töpel > >> Luke Nelson (4): >> bpf, riscv: Enable missing verifier_zext optimizations on RV64 >> bpf, riscv: Optimize FROM_LE using verifier_zext on RV64 >> bpf, riscv: Optimize BPF_JMP BPF_K when imm == 0 on RV64 >> bpf, riscv: Optimize BPF_JSET BPF_K using andi on RV64 >> >> arch/riscv/net/bpf_jit_comp64.c | 64 ++++++++++++++++++++++----------- >> 1 file changed, 44 insertions(+), 20 deletions(-) >> >> Cc: Xi Wang Applied, thanks everyone!