Received: by 2002:ab2:1c04:0:b0:1f7:53ba:1ebe with SMTP id f4csp112819lqg; Fri, 26 Apr 2024 10:07:19 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCVgku2oj7AGR8HFrYYE8SbdVjJ/iYP3e/z/H+hK2gubjIzzxHIA0acPiucTsd+MVadHHpUkGzpQNu5WHvKIVS28U9WxFYwSdIUEvNKyHA== X-Google-Smtp-Source: AGHT+IGOxQu7Ib6YY4dNcIQ1DH8ehqmCETb15lM41QUfY+GZ20p7U3TNrBm7JvJs93obXtjN6B/r X-Received: by 2002:a50:d61b:0:b0:56c:3b7a:632b with SMTP id x27-20020a50d61b000000b0056c3b7a632bmr131500edi.29.1714151239791; Fri, 26 Apr 2024 10:07:19 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1714151239; cv=pass; d=google.com; s=arc-20160816; b=jMJ3LPijnhScY1Kgq+m+cGhtkS3xQ3prYvJgyfHYFjug/XGma+1aDD03v3Yr9bPMS4 8JPfQDitWgnn3kiZaKQyJCZ8D9wHoUOsIjgijTqYqr6kYCqQ31Jz2GrjUjdsQ4Cs4cHO AfXNnCsnTjD8HvPkAu1YVqp2pgX5hD3n0BOm8fmR/oAt3KdPW7ecsdEywoWgLZWcAemD R3vLFMx+YmUYPT/Fxf93ezuXf0CHz473aczeYLaq60dMCC/N62biGnTzGbPBXV2u9d7E 2A8yhVTAw5DEAV66GKuy2NX3bQIDBH6N/DFWDtVvBX/SuYP8l4EsZ17hIavMqsHRkfEl Tcaw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:references :in-reply-to:subject:cc:to:from:dkim-signature; bh=usBtxWdQpTgGTsCrg1YhLvh4fvYP9qhxt1FcFLjpQuA=; fh=6gRi3YCjG1e+PQBiSQ6kvZ1evqcR5arGVAojuYC63dk=; b=f0BRtAUQopzk4Tcj5tws0l3hMhfC466nQbDNyJ/cPnEdXR2Fzet3hUVXBROX9kJigc mJV13pva6u2deGjcmQcj13KQsM/U/O7+VuhTvmpZpg9ouN2kH1Q8mwRPr7fmeGCywpQy N/HcktdMXVFDfkia7s0aw7F4borHzf4mZrMr1preCcMq+/wynvYoCIjYZ2f7dJMWHeD5 y7tcALZLFcaX+lkvaSKU33oB6J2LCc2soBAXY0zcFK8UirAXvNOp97cNQQsKbjirLSQo VzAAVGXh5DJuls/XNuRzjLvPCqo/PXSjErlwGjDUpJiGdBRdW0rl3uN+W5jP+QyMSAEk ONEg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=XcUaN9qs; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-160446-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-160446-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id v23-20020a50d597000000b00572242f02casi4731776edi.122.2024.04.26.10.07.19 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 26 Apr 2024 10:07:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-160446-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=XcUaN9qs; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-160446-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-160446-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 9CD411F23F49 for ; Fri, 26 Apr 2024 17:07:04 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id E77A915CD58; Fri, 26 Apr 2024 17:06:55 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="XcUaN9qs" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CDE4615A4BE; Fri, 26 Apr 2024 17:06:54 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714151214; cv=none; b=G6EqKaWlLDX/az60WElUzdFuBVDWpt4yc1Wu3oFQFLE3YK+UHgjnRH33y+ymahleR5a9KVvIoOeW5tQio6yjOMt3CHgrBCeMhRpPuSD64yclDgpL5GExrvMKw/MmPFojCu0+MZxotELw85WY1ekhucVKtbcL3llqjxLXRgcVJZg= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714151214; c=relaxed/simple; bh=09NdAbWR/BLtK6lbUCey7vstmTIMgsOSSq3Yz9q528c=; h=From:To:Cc:Subject:In-Reply-To:References:Date:Message-ID: MIME-Version:Content-Type; b=TsRWJB6ox4Ve0doRImsPR8x38QUgRTm2Mj+jejywju1LV7SJAViMEYndi3WtO1u/80xkFlL9t9wfR/rYFU3BHAifLXXNNKHeo8PbE5x+XEjSxlM8NOpumZ9Q5ETknNY+NX04wfiyrOV/xvVWfxvkX9Xgh14Hwcj1z1FbNmR0/q4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=XcUaN9qs; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0D857C116B1; Fri, 26 Apr 2024 17:06:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1714151214; bh=09NdAbWR/BLtK6lbUCey7vstmTIMgsOSSq3Yz9q528c=; h=From:To:Cc:Subject:In-Reply-To:References:Date:From; b=XcUaN9qshZw1p9fPgu+96aFUN619FikB2yN0B0sbB6zqz5ientRrM+j2M6bfYAxDz jDQmc8jTsMe51HVJH7QrZPSo1yNawnWcnQsmLr1/Rzenjb1669QGNKl7gY5PV+WXIs X1XlKQoD6jK5OANOk42v3gDLQOGtqlwa7LlAsl029gzhMiFWtS165mtrlyUjwwSB+n ByJvXQO2YlTq1/xUn63kqrNk42eBPmC+nbgQQx6iBdFV6JPF6rjr6F0g8GZcrFaKmB XWpDP8neWaOA/cqvabzHOF6WB+6hzBYTZxZ2PS7kMujUFpm52XuSyD0RFl1m7mqAE1 8jZ/nQOnfLPYw== From: Puranjay Mohan To: Andrii Nakryiko Cc: Catalin Marinas , Will Deacon , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Eduard Zingerman , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Zi Shen Lim , Xu Kuohai , Florent Revest , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org Subject: Re: [PATCH bpf-next v3 2/2] bpf, arm64: inline bpf_get_smp_processor_id() helper In-Reply-To: References: <20240426121349.97651-1-puranjay@kernel.org> <20240426121349.97651-3-puranjay@kernel.org> Date: Fri, 26 Apr 2024 17:06:51 +0000 Message-ID: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Andrii Nakryiko writes: > On Fri, Apr 26, 2024 at 5:14=E2=80=AFAM Puranjay Mohan wrote: >> >> As ARM64 JIT now implements BPF_MOV64_PERCPU_REG instruction, inline >> bpf_get_smp_processor_id(). >> >> ARM64 uses the per-cpu variable cpu_number to store the cpu id. >> >> Here is how the BPF and ARM64 JITed assembly changes after this commit: >> >> BPF >> =3D=3D=3D=3D=3D >> BEFORE AFTER >> -------- ------- >> >> int cpu =3D bpf_get_smp_processor_id(); int cpu =3D bpf_get_sm= p_processor_id(); >> (85) call bpf_get_smp_processor_id#229032 (18) r0 =3D 0xffff800082= 072008 >> (bf) r0 =3D &(void __per= cpu *)(r0) >> (61) r0 =3D *(u32 *)(r0 = +0) >> >> ARM64 JIT >> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D >> >> BEFORE AFTER >> -------- ------- >> >> int cpu =3D bpf_get_smp_processor_id(); int cpu =3D bpf_get_sm= p_processor_id(); >> mov x10, #0xfffffffffffff4d0 mov x7, #0xffff8000f= fffffff >> movk x10, #0x802b, lsl #16 movk x7, #0x8207, lsl= #16 >> movk x10, #0x8000, lsl #32 movk x7, #0x2008 >> blr x10 mrs x10, tpidr_el1 >> add x7, x0, #0x0 add x7, x7, x10 >> ldr w7, [x7] >> >> Performance improvement using benchmark[1] >> >> BEFORE AFTER >> -------- ------- >> >> glob-arr-inc : 23.817 =C2=B1 0.019M/s glob-arr-inc : 24.631= =C2=B1 0.027M/s >> arr-inc : 23.253 =C2=B1 0.019M/s arr-inc : 23.742= =C2=B1 0.023M/s >> hash-inc : 12.258 =C2=B1 0.010M/s hash-inc : 12.625= =C2=B1 0.004M/s >> >> [1] https://github.com/anakryiko/linux/commit/8dec900975ef >> >> Signed-off-by: Puranjay Mohan >> Acked-by: Andrii Nakryiko >> --- >> kernel/bpf/verifier.c | 24 +++++++++++++++++------- >> 1 file changed, 17 insertions(+), 7 deletions(-) >> >> diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c >> index 4e474ef44e9c..6ff4e63b2ef2 100644 >> --- a/kernel/bpf/verifier.c >> +++ b/kernel/bpf/verifier.c >> @@ -20273,20 +20273,31 @@ static int do_misc_fixups(struct bpf_verifier_= env *env) >> goto next_insn; >> } >> >> -#ifdef CONFIG_X86_64 >> /* Implement bpf_get_smp_processor_id() inline. */ >> if (insn->imm =3D=3D BPF_FUNC_get_smp_processor_id && >> prog->jit_requested && bpf_jit_supports_percpu_insn(= )) { >> /* BPF_FUNC_get_smp_processor_id inlining is an >> - * optimization, so if pcpu_hot.cpu_number is ev= er >> + * optimization, so if cpu_number_addr is ever >> * changed in some incompatible and hard to supp= ort >> * way, it's fine to back out this inlining logic >> */ >> - insn_buf[0] =3D BPF_MOV32_IMM(BPF_REG_0, (u32)(u= nsigned long)&pcpu_hot.cpu_number); >> - insn_buf[1] =3D BPF_MOV64_PERCPU_REG(BPF_REG_0, = BPF_REG_0); >> - insn_buf[2] =3D BPF_LDX_MEM(BPF_W, BPF_REG_0, BP= F_REG_0, 0); >> - cnt =3D 3; >> + u64 cpu_number_addr; >> >> +#if defined(CONFIG_X86_64) >> + cpu_number_addr =3D (u64)&pcpu_hot.cpu_number; >> +#elif defined(CONFIG_ARM64) >> + cpu_number_addr =3D (u64)&cpu_number; >> +#else >> + goto next_insn; >> +#endif >> + struct bpf_insn ld_cpu_number_addr[2] =3D { >> + BPF_LD_IMM64(BPF_REG_0, cpu_number_addr) >> + }; > > here we are violating C89 requirement to have a single block of > variable declarations by mixing variables and statements. I'm > surprised this is not triggering any build errors on !arm64 && > !x86_64. > > I think we can declare this BPF_LD_IMM64 instruction with zero "addr". > And then update > > ld_cpu_number_addr[0].imm =3D (u32)cpu_number_addr; > ld_cpu_number_addr[1].imm =3D (u32)(cpu_number_addr >> 32); > > WDYT? > > nit: I'd rename ld_cpu_number_addr to ld_insn or something short like that I agree with you, What do you think about the following diff: --- 8< --- -#ifdef CONFIG_X86_64 /* Implement bpf_get_smp_processor_id() inline. */ if (insn->imm =3D=3D BPF_FUNC_get_smp_processor_id && prog->jit_requested && bpf_jit_supports_percpu_insn()) { /* BPF_FUNC_get_smp_processor_id inlining is an - * optimization, so if pcpu_hot.cpu_number is ever + * optimization, so if cpu_number_addr is ever * changed in some incompatible and hard to support * way, it's fine to back out this inlining logic */ - insn_buf[0] =3D BPF_MOV32_IMM(BPF_REG_0, (u32)(unsi= gned long)&pcpu_hot.cpu_number); - insn_buf[1] =3D BPF_MOV64_PERCPU_REG(BPF_REG_0, BPF= _REG_0); - insn_buf[2] =3D BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_R= EG_0, 0); - cnt =3D 3; + u64 cpu_number_addr; + struct bpf_insn ld_insn[2] =3D { + BPF_LD_IMM64(BPF_REG_0, 0) + }; + +#if defined(CONFIG_X86_64) + cpu_number_addr =3D (u64)&pcpu_hot.cpu_number; +#elif defined(CONFIG_ARM64) + cpu_number_addr =3D (u64)&cpu_number; +#else + goto next_insn; +#endif + ld_insn[0].imm =3D (u32)cpu_number_addr; + ld_insn[1].imm =3D (u32)(cpu_number_addr >> 32); + insn_buf[0] =3D ld_insn[0]; + insn_buf[1] =3D ld_insn[1]; + insn_buf[2] =3D BPF_MOV64_PERCPU_REG(BPF_REG_0, BPF= _REG_0); + insn_buf[3] =3D BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_R= EG_0, 0); + cnt =3D 4; new_prog =3D bpf_patch_insn_data(env, i + delta, in= sn_buf, cnt); if (!new_prog) @@ -20296,7 +20310,6 @@ static int do_misc_fixups(struct bpf_verifier_env *= env) insn =3D new_prog->insnsi + i + delta; goto next_insn; } -#endif /* Implement bpf_get_func_arg inline. */ --- >8--- Thanks, Puranjay