Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp3057941rwd; Sat, 10 Jun 2023 00:18:09 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ6soVsutcmvERjIZ+ULdSS1LlGX6w+J189TlknC3dlRbIUyV9sBCSUzZzPfjx46oWTTI1Yr X-Received: by 2002:a17:907:728c:b0:96a:2acf:61e1 with SMTP id dt12-20020a170907728c00b0096a2acf61e1mr3752708ejc.64.1686381489230; Sat, 10 Jun 2023 00:18:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1686381489; cv=none; d=google.com; s=arc-20160816; b=PzhRZ+Cpz1cN5b3ICOsoF7gDoETqmtAc2OjnkgSFpeOPZqAlCr6z0RgX0W9gBB2W5J hnZKun3k1u7BIcjEtiH3w6naTqtOdvxp75liVXL6jPtHkYeqM4ZUK/49GufjNSyIyXcq IMXvU/ubhPcDc1ZTkg7OqtWPYRNFjDAKbyH0l52sMjcwTntJbnEU1NSOafXTqmEq1+li +UH6+pMmVNTt8tyTTinvPhLoHN90CDi/YgmtjGls4y+AWLFOg9c8+S4Pl4lfcPy7dQqT ehjO0s/ACEMHql7/7Ds7e/v8QZtZclIIKUfYqj1BZjm4b/kGSjfRnfKfal4Vw+VF2lBe yR6g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=Jzpp4ZiyZwzNvE4a5WSKnVkb62OYezIbe2zPDss4xsc=; b=RuwrbbRoh/snEvGcQS9JXZHjeq7Vqf+JlBKtnBMRXwTmwqd01UqpqWMJ7761bB8JzZ IMCAr00o96Y+RrYQdVRBI/wkiT5D5q0IkSVBDFm6DQO1FfDJ+dwaBdsNUev6o0Y2clZO 8tI7/OhER79V/4Mhyzs0qXBe8glz/AxEuHFKGvlaZ4j+wiGkF6Gluscpszx1xBRc0C81 fJsZ20cBU5qGoV1P4ROL6EHsBppGA9MShVWEXUXpAB8JHsPkGYOVyyg1aSGd2kKpCDd0 oPqKUQe3RWDPFB5V48R6kLlccgpoqV4wclZfMMfoGZKoXiuS0y7lktZxcInqnjCQJfHA SE/Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20221208 header.b=MaMcYow4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id p5-20020a170906838500b0094f791be3c0si2273081ejx.268.2023.06.10.00.17.44; Sat, 10 Jun 2023 00:18:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20221208 header.b=MaMcYow4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232688AbjFJG77 (ORCPT + 99 others); Sat, 10 Jun 2023 02:59:59 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60838 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232846AbjFJG7x (ORCPT ); Sat, 10 Jun 2023 02:59:53 -0400 Received: from mail-yw1-x1141.google.com (mail-yw1-x1141.google.com [IPv6:2607:f8b0:4864:20::1141]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C181F3A9B; Fri, 9 Jun 2023 23:59:51 -0700 (PDT) Received: by mail-yw1-x1141.google.com with SMTP id 00721157ae682-5689335d2b6so22661787b3.3; Fri, 09 Jun 2023 23:59:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1686380391; x=1688972391; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=Jzpp4ZiyZwzNvE4a5WSKnVkb62OYezIbe2zPDss4xsc=; b=MaMcYow4Eh1yNcWLCeusxVUvedanIOrNQWcaSuZUPZVe05mZqwgsRPeTW1l4MmX3uC FjWWtQWWercm17318nYmlZPLgPshyJC2gQJCGsgjTw71Z6Xm1WfmyM9y2xjatfMkGVAi sXqoUNUbaocMxvCLm8vkktiOqXU8p48y9feTgXEUZ7J0/mapvaUxxYdxVFtlRnjhiuwD UgSiDzCgDxgGMsMuhWoSToX/SCwU/RIk82IOW7T7HIvq1Uh8UGar0lyDVmsMt7qdmUH1 swCsoPMWa0hHpQCOTPxd49+mlznUl1VaVD0Yv5WYIHru+xP31RSWzmVv5O6PXFWsVb0u 1EGA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1686380391; x=1688972391; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=Jzpp4ZiyZwzNvE4a5WSKnVkb62OYezIbe2zPDss4xsc=; b=P25wN1WlgcCGvxv6OHPE+5lvTreXg+1JprejqJkNGIT1Qd+Bw2Z37kcdwj4qbwvprV SuBmOPpJ0QBs8eZ+ZN444ysc0AGfOoYAzvQBVbO7gEdRmiVTErEcypkoovQANkUB/a4W DMvweNQoLLbz0kpLfx70F+a4p7SZfO8Nwdo4y/32UjI214cTEydL28wYMUQIqU+yO0Tj A+1fG30mpNZVyG2jxJUPjn/UqkKzW2fyiMm0ze5wYiR4QXla+Twe1cDqLF9YwdbigIgP 3SOM9Fj2B3+nKzTxpzG8Hg9SCUuyxFQj8z81Bd8+D4TutkgehgFnu2OblEE0Vi8lSkyt 5AXw== X-Gm-Message-State: AC+VfDzyoFZCw3dkdmxGHfHjS1HghMGR91n9FY5xYMyrZpwljOYmCXxi wN2j5wx5Rw88n8aPKYHtxRzR0XF708QordXJxSY= X-Received: by 2002:a81:4896:0:b0:565:efe8:70fc with SMTP id v144-20020a814896000000b00565efe870fcmr3574240ywa.35.1686380390950; Fri, 09 Jun 2023 23:59:50 -0700 (PDT) MIME-Version: 1.0 References: <20230609095653.1406173-1-imagedong@tencent.com> <68003017-5111-176a-de34-5d576b6e3488@meta.com> In-Reply-To: <68003017-5111-176a-de34-5d576b6e3488@meta.com> From: Menglong Dong Date: Sat, 10 Jun 2023 14:59:39 +0800 Message-ID: Subject: Re: [PATCH bpf-next v4 0/3] bpf, x86: allow function arguments up to 12 for TRACING To: Yonghong Song Cc: andrii.nakryiko@gmail.com, alan.maguire@oracle.com, ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, martin.lau@linux.dev, song@kernel.org, yhs@fb.com, john.fastabend@gmail.com, kpsingh@kernel.org, sdf@google.com, haoluo@google.com, jolsa@kernel.org, bpf@vger.kernel.org, linux-kernel@vger.kernel.org, Menglong Dong Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Jun 10, 2023 at 11:51=E2=80=AFAM Yonghong Song wrote= : > > > > On 6/9/23 2:56 AM, menglong8.dong@gmail.com wrote: > > From: Menglong Dong > > > > For now, the BPF program of type BPF_PROG_TYPE_TRACING can only be used > > on the kernel functions whose arguments count less than 6. This is not > > friendly at all, as too many functions have arguments count more than 6= . > > According to the current kernel version, below is a statistics of the > > function arguments count: > > > > argument count | function count > > 7 | 704 > > 8 | 270 > > 9 | 84 > > 10 | 47 > > 11 | 47 > > 12 | 27 > > 13 | 22 > > 14 | 5 > > 15 | 0 > > 16 | 1 > > > > Therefore, let's enhance it by increasing the function arguments count > > allowed in arch_prepare_bpf_trampoline(), for now, only x86_64. > > > > In the 1st patch, we make arch_prepare_bpf_trampoline() support to copy > > function arguments in stack for x86 arch. Therefore, the maximum > > arguments can be up to MAX_BPF_FUNC_ARGS for FENTRY and FEXIT. > > > > In the 2nd patch, we clean garbage value in upper bytes of the trampoli= ne > > when we store the arguments from regs or on-stack into stack. > > > > And the 3rd patches are for the testcases of the 1st patch. > > > > Changes since v3: > > - try make the stack pointer 16-byte aligned. Not sure if I'm right :) > > - introduce clean_garbage() to clean the grabage when argument count is= 7 > > - use different data type in bpf_testmod_fentry_test{7,12} > > - add testcase for grabage values in ctx > > > > Changes since v2: > > - keep MAX_BPF_FUNC_ARGS still > > - clean garbage value in upper bytes in the 2nd patch > > - move bpf_fentry_test{7,12} to bpf_testmod.c and rename them to > > bpf_testmod_fentry_test{7,12} meanwhile in the 3rd patch > > > > Changes since v1: > > - change the maximun function arguments to 14 from 12 > > - add testcases (Jiri Olsa) > > - instead EMIT4 with EMIT3_off32 for "lea" to prevent overflow > > > > Menglong Dong (3): > > bpf, x86: allow function arguments up to 12 for TRACING > > bpf, x86: clean garbage value in the stack of trampoline > > selftests/bpf: add testcase for FENTRY/FEXIT with 6+ arguments > > > > arch/x86/net/bpf_jit_comp.c | 145 ++++++++++++++++-= - > > .../selftests/bpf/bpf_testmod/bpf_testmod.c | 19 ++- > > .../selftests/bpf/prog_tests/fentry_fexit.c | 4 +- > > .../selftests/bpf/prog_tests/fentry_test.c | 2 + > > .../selftests/bpf/prog_tests/fexit_test.c | 2 + > > .../testing/selftests/bpf/progs/fentry_test.c | 33 ++++ > > .../testing/selftests/bpf/progs/fexit_test.c | 57 +++++++ > > 7 files changed, 245 insertions(+), 17 deletions(-) > > Also replace rebase on top of bpf-next. Patch 3 cannot be applied. Okay!