Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp996653iob; Wed, 18 May 2022 18:45:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwgQjwnKJHHsR+pr5+JKQYOSP0M6jQILvtceImM4qbrZvWU4I04YZwGhnrJ0FPN/+NRmDYz X-Received: by 2002:aa7:8dd8:0:b0:518:11:18db with SMTP id j24-20020aa78dd8000000b00518001118dbmr2420528pfr.29.1652924740468; Wed, 18 May 2022 18:45:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652924740; cv=none; d=google.com; s=arc-20160816; b=Z8sw13cJi8CZ5igAziSJyOFcUeHS0BmyCixChjo4aaJA80rAo01MwvfVuG5rrb/FDq wcS+xeSkOoHO25AWoH+DmDICF/a2J2iLy6wVdHdx9bJoN2/ORn9l42q6vx/R2sRI6HND Bkx9AYfWK8xcV00HI5ikuFftLDjKU2zbzwbwE3cDB5080aTTGLUkclfr69Tzpd633V5F ODGui6YbFbYMquWN/WzXPVLMVM4SlBPa53TRYdQzOfz++rx5NfOG5OLKLfkzmftxnGpF BRtf/+FqRG70a7XgEGK7Cqf4UH/OklZLVlzutjuHL+G6FpBZgDPNFA6L3cSmDvrLsGI4 neTQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=eZMy8FDicN73C5tBewEMmRPhbsoqs/BvzITBNIcg4lI=; b=zV5P8Fp9ioH7YrVfO5nxD+u51ya4RomnkXLOJVz478gt07CEDS+yuHBwwjnTdOCley T0KjZabJmo1HApeU0BCFSsgjaSGT0hzIWa2ctS6zGh9XeDZZK+P97U79UdOoldb+tT7T ED708QJSf9nsLH2CduYo8zTHkPvcoxxntUpgI7IY9qfK4xjuUdYwrPH1EwLHonUFZ9Iq +rB2Pu5p0uypnVZq1TP6p4jvNYCmu127lM7sF7nSAf17u4CDf7y7F0PxK2mGZV2t7/jj wq8KP9Lyrvr5JKic1F6GMSAo9MHjp9jas2Gu3vWRCFpJ1l44GtXUxlOiQRCLYxx45GKT 2sQA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=bV2eHwNL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id mr21-20020a17090b239500b001df44a98e9dsi4251895pjb.21.2022.05.18.18.45.28; Wed, 18 May 2022 18:45:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=bV2eHwNL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231519AbiERXvN (ORCPT + 99 others); Wed, 18 May 2022 19:51:13 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44350 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231521AbiERXvK (ORCPT ); Wed, 18 May 2022 19:51:10 -0400 Received: from mail-io1-xd2e.google.com (mail-io1-xd2e.google.com [IPv6:2607:f8b0:4864:20::d2e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0A1C4443C3; Wed, 18 May 2022 16:51:10 -0700 (PDT) Received: by mail-io1-xd2e.google.com with SMTP id h85so4085910iof.12; Wed, 18 May 2022 16:51:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=eZMy8FDicN73C5tBewEMmRPhbsoqs/BvzITBNIcg4lI=; b=bV2eHwNLaIIZcJFPpOhwoDKvUVHSKNvsV3qUcXiyyqVoT8vgw1YA11pOl7Bef67Id9 8IO6ageKx63UxY6rCNMgWsGjAznrDkga9bVN/S8kwLW996syy6yrDkcE0kQeacQxi/kO 4cGJ92W2Rj5SiytU3ldGj84lom/BNkwQNvAjR2WoFYz43iD+icaNfwoFdBwNjEuw+fBA zRsz9UN0GGB0Ha4Mve0m1k6fyEZBA9G1L4TH3XZkQVcMaYEpTapirL4uHeBj2EnESxAM Rjpj1dX0ucmssHN5zAkytrdqtkN6GYmfjZHvfYJmbjtG1iDlkjZI764iUeEYarO5a9Mf lTTQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=eZMy8FDicN73C5tBewEMmRPhbsoqs/BvzITBNIcg4lI=; b=nyudBD4Q+FeYV30HNveB0aVwDOdUPZN0EckwfwNA7C5+XQsfNeBzXI38QaghFxozVh lyNKlfGyTu6NI79jqkSj9zV+kEVjAfq0+IseYSM6uE+oVrtfitS1eryA2Ydvx3H+XqJd PcOYAUXzzOwFrB7GbScGWvFTrdiJi+6AsMX4a3O9KhxUEDg1nliK8MnETuMfvFimVql8 zWCqp9qsg6BXILfrSQvRCZzlX+dJ9FQ6IGkifEcS/PhP2ndojw5wyn3PfNvjeRaSCcnT KlxmBP/Wer1QUMuoYwco63qczWPfO7V4UadErkY/NEUPQf7DGs+Pdp3SOYeHaBUp9smv KSHg== X-Gm-Message-State: AOAM532shANTwKZuFAlng0h7F76i/PMpNUKcOmqjKz3bUjKy7hlvx3OB QkQnSt8IlInP2XO0spAD0k8EBZ94JyNJ/zIksbTKUvUE X-Received: by 2002:a05:6638:450a:b0:32e:1bd1:735f with SMTP id bs10-20020a056638450a00b0032e1bd1735fmr1129586jab.145.1652917869480; Wed, 18 May 2022 16:51:09 -0700 (PDT) MIME-Version: 1.0 References: <6ef675aeeea442fa8fc168cd1cb4e4e474f65a3f.1652772731.git.esyr@redhat.com> In-Reply-To: <6ef675aeeea442fa8fc168cd1cb4e4e474f65a3f.1652772731.git.esyr@redhat.com> From: Andrii Nakryiko Date: Wed, 18 May 2022 16:50:58 -0700 Message-ID: Subject: Re: [PATCH bpf-next v3 4/4] bpf_trace: pass array of u64 values in kprobe_multi.addrs To: Eugene Syromiatnikov Cc: Jiri Olsa , Masami Hiramatsu , Steven Rostedt , Ingo Molnar , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , Networking , bpf , open list , Shuah Khan , "open list:KERNEL SELFTEST FRAMEWORK" Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 17, 2022 at 12:37 AM Eugene Syromiatnikov wrote: > > With the interface as defined, it is impossible to pass 64-bit kernel > addresses from a 32-bit userspace process in BPF_LINK_TYPE_KPROBE_MULTI, > which severly limits the useability of the interface, change the ABI > to accept an array of u64 values instead of (kernel? user?) longs. > Interestingly, the rest of the libbpf infrastructure uses 64-bit values > for kallsyms addresses already, so this patch also eliminates > the sym_addr cast in tools/lib/bpf/libbpf.c:resolve_kprobe_multi_cb(). > > Fixes: 0dcac272540613d4 ("bpf: Add multi kprobe link") > Fixes: 5117c26e877352bc ("libbpf: Add bpf_link_create support for multi kprobes") > Fixes: ddc6b04989eb0993 ("libbpf: Add bpf_program__attach_kprobe_multi_opts function") > Fixes: f7a11eeccb111854 ("selftests/bpf: Add kprobe_multi attach test") > Fixes: 9271a0c7ae7a9147 ("selftests/bpf: Add attach test for bpf_program__attach_kprobe_multi_opts") > Fixes: 2c6401c966ae1fbe ("selftests/bpf: Add kprobe_multi bpf_cookie test") > Signed-off-by: Eugene Syromiatnikov > --- > kernel/trace/bpf_trace.c | 25 ++++++++++++++++++---- kernel changes should go into a separate patch (and seems like they logically fit together with patch #3, no?) > tools/lib/bpf/bpf.h | 2 +- > tools/lib/bpf/libbpf.c | 8 +++---- > tools/lib/bpf/libbpf.h | 2 +- > .../testing/selftests/bpf/prog_tests/bpf_cookie.c | 2 +- > .../selftests/bpf/prog_tests/kprobe_multi_test.c | 8 +++---- > 6 files changed, 32 insertions(+), 15 deletions(-) > [...]