Received: by 2002:ac0:de83:0:0:0:0:0 with SMTP id b3csp715768imk; Sun, 3 Jul 2022 07:10:19 -0700 (PDT) X-Google-Smtp-Source: AGRyM1u7CEt6KyRPT6alPQj20eZZ4I9fSp9bpLydVXoQ4HEVT3gEVn+bVghCRRsEo9qpBBEkyRKK X-Received: by 2002:a05:6a00:1808:b0:528:3ec:543a with SMTP id y8-20020a056a00180800b0052803ec543amr22780641pfa.70.1656857419523; Sun, 03 Jul 2022 07:10:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1656857419; cv=none; d=google.com; s=arc-20160816; b=DOfkfJwlwjlq/zUief8xLx3rk8PAmPWrndmnvqbshMQP0ExFcgQovnImd/XRRZPWm7 UG2MHWqxwkttwafmDC9JT2tkiPQRY4MInlxFf+zZK/SDoah7WjJEc0yGADnEbkmzg4CL AwNMhAmK0YqTYNz3rn2ZHpVco2x3l2JSWG++lSkgOsFu1tSFRoe3k7FIaaEEozR1zhyz yTb5UPS+ZnZdwrOqQH7a0cTxE++9bGahMwq4G5HtPKQBnWeuv1TtPZLrfneyVSBMb8qq I/plNq21PERjG/y6UrFUniKe7AmL9NjqtmWtkQXX+5N+w/wLft7y2XSiv0Z3f7dnrLtS KmWA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=4NUMlYdvVeKs3yxTHzjHZvUlADEEHumGbvp2dUc7ZKo=; b=el2y3y2DVOHZOi74qv2g/lbkrkjsiPzgLb1TsI1iIc8e47rHT/HkdIelz81E1ZDAkw usxFcAJf/XGAEaoEqjl1IuiCJUX1/TVh6kYdPp0XwlSnJPTZSwRFBMlWiLCa+w2HBxWQ mRwqjar2oQV5j56mgtG+SpITZ9epH1m26y1Sz26R+C0yvnD8/LfiNEVOSJax1NIGlaJc 9lLFQLNc2A53P1KD7BHJmqeI7LfkynFFZHBwtB3wIgTEUwqbRSr6JdzwcBtpjhA0zJvq vlc5+kK0qteU4dNGCd2AZ7nuk1Wrz42M1NUdN8S0FH8+B2U6JCN8xidHWJH09o6ZMBTV 4yVQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=gentoo.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m27-20020a634c5b000000b003c6709779a9si4332422pgl.295.2022.07.03.07.10.06; Sun, 03 Jul 2022 07:10:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=gentoo.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231739AbiGCNJt (ORCPT + 99 others); Sun, 3 Jul 2022 09:09:49 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57822 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229550AbiGCNJs (ORCPT ); Sun, 3 Jul 2022 09:09:48 -0400 Received: from smtp.gentoo.org (smtp.gentoo.org [IPv6:2001:470:ea4a:1:5054:ff:fec7:86e4]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 85CDC6350; Sun, 3 Jul 2022 06:09:44 -0700 (PDT) From: Yixun Lan To: Palmer Dabbelt , linux-riscv@lists.infradead.org Cc: Paul Walmsley , Albert Ou , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, bpf@vger.kernel.org, Yixun Lan Subject: [PATCH] RISC-V/bpf: Enable bpf_probe_read{, str}() Date: Sun, 3 Jul 2022 21:09:24 +0800 Message-Id: <20220703130924.57240-1-dlan@gentoo.org> X-Mailer: git-send-email 2.35.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_PASS,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Enable this option to fix a bcc error in RISC-V platform And, the error shows as follows: ~ # runqlen WARNING: This target JIT is not designed for the host you are running. \ If bad things happen, please choose a different -march switch. bpf: Failed to load program: Invalid argument 0: R1=ctx(off=0,imm=0) R10=fp0 0: (85) call bpf_get_current_task#35 ; R0_w=scalar() 1: (b7) r6 = 0 ; R6_w=0 2: (7b) *(u64 *)(r10 -8) = r6 ; R6_w=P0 R10=fp0 fp-8_w=00000000 3: (07) r0 += 312 ; R0_w=scalar() 4: (bf) r1 = r10 ; R1_w=fp0 R10=fp0 5: (07) r1 += -8 ; R1_w=fp-8 6: (b7) r2 = 8 ; R2_w=8 7: (bf) r3 = r0 ; R0_w=scalar(id=1) R3_w=scalar(id=1) 8: (85) call bpf_probe_read#4 unknown func bpf_probe_read#4 processed 9 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0 Traceback (most recent call last): File "/usr/lib/python-exec/python3.9/runqlen", line 187, in b.attach_perf_event(ev_type=PerfType.SOFTWARE, File "/usr/lib/python3.9/site-packages/bcc/__init__.py", line 1228, in attach_perf_event fn = self.load_func(fn_name, BPF.PERF_EVENT) File "/usr/lib/python3.9/site-packages/bcc/__init__.py", line 522, in load_func raise Exception("Failed to load BPF program %s: %s" % Exception: Failed to load BPF program b'do_perf_event': Invalid argument Signed-off-by: Yixun Lan --- arch/riscv/Kconfig | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/riscv/Kconfig b/arch/riscv/Kconfig index 32ffef9f6e5b4..da0016f1be6ce 100644 --- a/arch/riscv/Kconfig +++ b/arch/riscv/Kconfig @@ -25,6 +25,7 @@ config RISCV select ARCH_HAS_GIGANTIC_PAGE select ARCH_HAS_KCOV select ARCH_HAS_MMIOWB + select ARCH_HAS_NON_OVERLAPPING_ADDRESS_SPACE select ARCH_HAS_PTE_SPECIAL select ARCH_HAS_SET_DIRECT_MAP if MMU select ARCH_HAS_SET_MEMORY if MMU -- 2.35.1