From: Eduard Zingerman <eddyz87@gmail.com>
To: Anton Protopopov <a.s.protopopov@gmail.com>,
bpf@vger.kernel.org, Alexei Starovoitov <ast@kernel.org>,
Andrii Nakryiko <andrii@kernel.org>,
Anton Protopopov <aspsk@isovalent.com>,
Daniel Borkmann <daniel@iogearbox.net>,
Quentin Monnet <qmo@kernel.org>,
Yonghong Song <yonghong.song@linux.dev>
Subject: Re: [RFC bpf-next 2/9] bpf, x86: add new map type: instructions set
Date: Tue, 17 Jun 2025 17:57:15 -0700 [thread overview]
Message-ID: <7edb47e73baa46705119a23c6bf4af26517a640f.camel@gmail.com> (raw)
In-Reply-To: <20250615085943.3871208-3-a.s.protopopov@gmail.com>
On Sun, 2025-06-15 at 08:59 +0000, Anton Protopopov wrote:
Meta: "instruction set" is a super confusing name, at-least for me the
first thought is about actual set of instructions supported by
some h/w. instruction_info? instruction_offset? just
"iset"/"ioffset"?
[...]
> On map creation/initialization, before loading the program, each
> element of the map should be initialized to point to an instruction
> offset within the program. Before the program load such maps should
> be made frozen. After the program verification xlated and jitted
> offsets can be read via the bpf(2) syscall.
I think such maps would be a bit more ergonomic it original
instruction index would be saved as well, e.g:
(original_offset, xlated_offset, jitted_offset)
Otherwise user would have to recover original offset from some
external mapping. This information is stored in orig_xlated_off
anyway.
[...]
> diff --git a/arch/x86/net/bpf_jit_comp.c b/arch/x86/net/bpf_jit_comp.c
> index 15672cb926fc..923c38f212dc 100644
> --- a/arch/x86/net/bpf_jit_comp.c
> +++ b/arch/x86/net/bpf_jit_comp.c
> @@ -1615,6 +1615,8 @@ static int do_jit(struct bpf_prog *bpf_prog, int *addrs, u8 *image, u8 *rw_image
[...]
> @@ -2642,6 +2645,14 @@ st: if (is_imm8(insn->off))
> return -EFAULT;
> }
> memcpy(rw_image + proglen, temp, ilen);
> +
> + /*
> + * Instruction sets need to know how xlated code
> + * maps to jited code
> + */
> + abs_xlated_off = bpf_prog->aux->subprog_start + i - 1 - adjust_off;
Nit: `adjust_off` is a bit hard to follow, maybe move the following:
abs_xlated_off = bpf_prog->aux->subprog_start + i - 1;
to the beginning of the loop?
> + bpf_prog_update_insn_ptr(bpf_prog, abs_xlated_off, proglen, ilen,
> + jmp_offset, image + proglen);
Nit: initialize `jmp_offset` at each loop iteration to 0?
otherwise it would denote jump offset of the last processed
jump instruction for all following non-jump instructions.
> }
> proglen += ilen;
> addrs[i] = proglen;
> diff --git a/include/linux/bpf.h b/include/linux/bpf.h
> index 8189f49e43d6..008bcd44c60e 100644
> --- a/include/linux/bpf.h
> +++ b/include/linux/bpf.h
> @@ -3596,4 +3596,25 @@ static inline bool bpf_is_subprog(const struct bpf_prog *prog)
> return prog->aux->func_idx != 0;
> }
>
> +int bpf_insn_set_init(struct bpf_map *map, const struct bpf_prog *prog);
> +int bpf_insn_set_ready(struct bpf_map *map);
> +void bpf_insn_set_release(struct bpf_map *map);
> +void bpf_insn_set_adjust(struct bpf_map *map, u32 off, u32 len);
> +void bpf_insn_set_adjust_after_remove(struct bpf_map *map, u32 off, u32 len);
> +
> +struct bpf_insn_ptr {
Could you please add comments describing each field?
E.g.: "address of the instruction in the jitted image",
"for jump instructions, the relative offset of the jump target",
"index of the original instruction",
"original value of the corresponding bpf_insn_set_value.xlated_off".
> + void *jitted_ip;
> + u32 jitted_len;
> + int jitted_jump_offset;
> + struct bpf_insn_set_value user_value; /* userspace-visible value */
> + u32 orig_xlated_off;
> +};
[...]
> diff --git a/kernel/bpf/bpf_insn_set.c b/kernel/bpf/bpf_insn_set.c
> new file mode 100644
[...]
> +static int insn_set_check_btf(const struct bpf_map *map,
> + const struct btf *btf,
> + const struct btf_type *key_type,
> + const struct btf_type *value_type)
> +{
> + u32 int_data;
> +
> + if (BTF_INFO_KIND(key_type->info) != BTF_KIND_INT)
> + return -EINVAL;
> +
> + if (BTF_INFO_KIND(value_type->info) != BTF_KIND_INT)
> + return -EINVAL;
> +
> + int_data = *(u32 *)(key_type + 1);
Nit: use btf_type_int() accessor?
> + if (BTF_INT_BITS(int_data) != 32 || BTF_INT_OFFSET(int_data))
> + return -EINVAL;
> +
> + int_data = *(u32 *)(value_type + 1);
> + if (BTF_INT_BITS(int_data) != 32 || BTF_INT_OFFSET(int_data))
Should this check for `BTF_INT_BITS(int_data) != 64`?
> + return -EINVAL;
> +
> + return 0;
> +}
[...]
> +int bpf_insn_set_init(struct bpf_map *map, const struct bpf_prog *prog)
> +{
> + struct bpf_insn_set *insn_set = cast_insn_set(map);
> + int i;
> +
> + if (!is_frozen(map))
> + return -EINVAL;
> +
> + if (!valid_offsets(insn_set, prog))
> + return -EINVAL;
> +
> + /*
> + * There can be only one program using the map
> + */
> + mutex_lock(&insn_set->state_mutex);
> + if (insn_set->state != INSN_SET_STATE_FREE) {
> + mutex_unlock(&insn_set->state_mutex);
> + return -EBUSY;
> + }
> + insn_set->state = INSN_SET_STATE_INIT;
> + mutex_unlock(&insn_set->state_mutex);
> +
> + /*
> + * Reset all the map indexes to the original values. This is needed,
> + * e.g., when a replay of verification with different log level should
> + * be performed.
> + */
> + for (i = 0; i < map->max_entries; i++)
> + insn_set->ptrs[i].user_value.xlated_off = insn_set->ptrs[i].orig_xlated_off;
> +
> + return 0;
> +}
> +
> +int bpf_insn_set_ready(struct bpf_map *map)
What is the reasoning for not needing to take the mutex here and in
the bpf_insn_set_release?
> +{
> + struct bpf_insn_set *insn_set = cast_insn_set(map);
> + int i;
> +
> + for (i = 0; i < map->max_entries; i++) {
> + if (insn_set->ptrs[i].user_value.xlated_off == INSN_DELETED)
> + continue;
> + if (!insn_set->ips[i])
> + return -EFAULT;
> + }
> +
> + insn_set->state = INSN_SET_STATE_READY;
> + return 0;
> +}
> +
> +void bpf_insn_set_release(struct bpf_map *map)
> +{
> + struct bpf_insn_set *insn_set = cast_insn_set(map);
> +
> + insn_set->state = INSN_SET_STATE_FREE;
> +}
[...]
(... I'll continue reading through patch-set a bit later ...)
next prev parent reply other threads:[~2025-06-18 0:57 UTC|newest]
Thread overview: 63+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-06-15 8:59 [RFC bpf-next 0/9] BPF indirect jumps Anton Protopopov
2025-06-15 8:59 ` [RFC bpf-next 1/9] bpf: save the start of functions in bpf_prog_aux Anton Protopopov
2025-06-15 8:59 ` [RFC bpf-next 2/9] bpf, x86: add new map type: instructions set Anton Protopopov
2025-06-18 0:57 ` Eduard Zingerman [this message]
2025-06-18 2:16 ` Alexei Starovoitov
2025-06-19 18:57 ` Anton Protopopov
2025-06-19 18:55 ` Anton Protopopov
2025-06-19 18:55 ` Eduard Zingerman
2025-06-15 8:59 ` [RFC bpf-next 3/9] selftests/bpf: add selftests for new insn_set map Anton Protopopov
2025-06-18 11:04 ` Eduard Zingerman
2025-06-18 15:16 ` Anton Protopopov
2025-06-15 8:59 ` [RFC bpf-next 4/9] bpf, x86: allow indirect jumps to r8...r15 Anton Protopopov
2025-06-17 19:41 ` Alexei Starovoitov
2025-06-18 14:28 ` Anton Protopopov
2025-06-15 8:59 ` [RFC bpf-next 5/9] bpf, x86: add support for indirect jumps Anton Protopopov
2025-06-18 3:06 ` Alexei Starovoitov
2025-06-19 19:57 ` Anton Protopopov
2025-06-19 19:58 ` Anton Protopopov
2025-06-18 11:03 ` Eduard Zingerman
2025-06-19 20:13 ` Anton Protopopov
2025-06-15 8:59 ` [RFC bpf-next 6/9] bpf: workaround llvm behaviour with " Anton Protopopov
2025-06-18 11:04 ` Eduard Zingerman
2025-06-18 13:59 ` Alexei Starovoitov
2025-06-15 8:59 ` [RFC bpf-next 7/9] bpf: disasm: add support for BPF_JMP|BPF_JA|BPF_X Anton Protopopov
2025-06-15 8:59 ` [RFC bpf-next 8/9] libbpf: support llvm-generated indirect jumps Anton Protopopov
2025-06-18 3:22 ` Alexei Starovoitov
2025-06-18 15:08 ` Anton Protopopov
2025-07-07 23:45 ` Eduard Zingerman
2025-07-07 23:49 ` Alexei Starovoitov
2025-07-08 0:01 ` Eduard Zingerman
2025-07-08 0:12 ` Alexei Starovoitov
2025-07-08 0:18 ` Eduard Zingerman
2025-07-08 0:49 ` Alexei Starovoitov
2025-07-08 0:51 ` Eduard Zingerman
2025-07-08 20:59 ` Eduard Zingerman
2025-07-08 21:25 ` Alexei Starovoitov
2025-07-08 21:29 ` Eduard Zingerman
2025-07-09 5:33 ` Anton Protopopov
2025-07-09 5:58 ` Eduard Zingerman
2025-07-09 8:38 ` Eduard Zingerman
2025-07-10 5:11 ` Eduard Zingerman
2025-07-10 6:10 ` Anton Protopopov
2025-07-10 6:13 ` Eduard Zingerman
2025-06-18 19:49 ` Eduard Zingerman
2025-06-27 2:28 ` Eduard Zingerman
2025-06-27 10:18 ` Anton Protopopov
2025-07-03 18:21 ` Eduard Zingerman
2025-07-03 19:03 ` Anton Protopopov
2025-07-07 19:07 ` Eduard Zingerman
2025-07-07 19:34 ` Anton Protopopov
2025-07-07 21:44 ` Yonghong Song
2025-07-08 5:58 ` Yonghong Song
2025-07-08 8:30 ` Eduard Zingerman
2025-07-08 10:42 ` Eduard Zingerman
2025-06-15 8:59 ` [RFC bpf-next 9/9] selftests/bpf: add selftests for " Anton Protopopov
2025-06-18 3:24 ` Alexei Starovoitov
2025-06-18 14:49 ` Anton Protopopov
2025-06-18 16:01 ` Alexei Starovoitov
2025-06-18 16:36 ` Anton Protopopov
2025-06-18 16:43 ` Alexei Starovoitov
2025-06-18 20:25 ` Anton Protopopov
2025-06-18 21:59 ` Alexei Starovoitov
2025-06-19 5:05 ` Anton Protopopov
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=7edb47e73baa46705119a23c6bf4af26517a640f.camel@gmail.com \
--to=eddyz87@gmail.com \
--cc=a.s.protopopov@gmail.com \
--cc=andrii@kernel.org \
--cc=aspsk@isovalent.com \
--cc=ast@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=daniel@iogearbox.net \
--cc=qmo@kernel.org \
--cc=yonghong.song@linux.dev \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).