public inbox for netdev@vger.kernel.org
 help / color / mirror / Atom feed
From: Menglong Dong <menglong.dong@linux.dev>
To: Menglong Dong <menglong8.dong@gmail.com>,
	Andrii Nakryiko <andrii.nakryiko@gmail.com>
Cc: ast@kernel.org, andrii@kernel.org, daniel@iogearbox.net,
	martin.lau@linux.dev, eddyz87@gmail.com, song@kernel.org,
	yonghong.song@linux.dev, john.fastabend@gmail.com,
	kpsingh@kernel.org, sdf@fomichev.me, haoluo@google.com,
	jolsa@kernel.org, davem@davemloft.net, dsahern@kernel.org,
	tglx@linutronix.de, mingo@redhat.com, jiang.biao@linux.dev,
	bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org,
	hpa@zytor.com, bpf@vger.kernel.org, netdev@vger.kernel.org,
	linux-kernel@vger.kernel.org
Subject: Re: [PATCH bpf-next v9 07/11] bpf,x86: add fsession support for x86_64
Date: Wed, 14 Jan 2026 11:27:20 +0800	[thread overview]
Message-ID: <2187165.bB369e8A3T@7940hx> (raw)
In-Reply-To: <CAEf4BzYE0ZTrCaruJSr8MXAbZSsKz8H_BqHoZX5kS63yRBa-2g@mail.gmail.com>

On 2026/1/14 09:25 Andrii Nakryiko <andrii.nakryiko@gmail.com> write:
> On Sat, Jan 10, 2026 at 6:12 AM Menglong Dong <menglong8.dong@gmail.com> wrote:
> >
> > Add BPF_TRACE_FSESSION supporting to x86_64, including:
[...]
> >
> > diff --git a/arch/x86/net/bpf_jit_comp.c b/arch/x86/net/bpf_jit_comp.c
> > index d94f7038c441..0671a434c00d 100644
> > --- a/arch/x86/net/bpf_jit_comp.c
> > +++ b/arch/x86/net/bpf_jit_comp.c
> > @@ -3094,12 +3094,17 @@ static int emit_cond_near_jump(u8 **pprog, void *func, void *ip, u8 jmp_cond)
> >  static int invoke_bpf(const struct btf_func_model *m, u8 **pprog,
> >                       struct bpf_tramp_links *tl, int stack_size,
> >                       int run_ctx_off, bool save_ret,
> > -                     void *image, void *rw_image)
> > +                     void *image, void *rw_image, u64 func_meta)
> >  {
> >         int i;
> >         u8 *prog = *pprog;
> >
> >         for (i = 0; i < tl->nr_links; i++) {
> > +               if (tl->links[i]->link.prog->call_session_cookie) {
> > +                       /* 'stack_size + 8' is the offset of func_md in stack */
> 
> not func_md, don't invent new names, "func_meta" (but it's also so


Ah, it should be func_meta here, it's a typo.


> backwards that you have stack offsets as positive... and it's not even
> in verifier's stack slots, just bytes... very confusing to me)


Do you mean the offset to emit_store_stack_imm64()? I'll convert it
to negative after modify the emit_store_stack_imm64() as you suggested.


> 
> > +                       emit_store_stack_imm64(&prog, stack_size + 8, func_meta);
> > +                       func_meta -= (1 << BPF_TRAMP_M_COOKIE);
> 
> was this supposed to be BPF_TRAMP_M_IS_RETURN?... and why didn't AI catch this?


It should be BPF_TRAMP_M_COOKIE here. I'm decreasing and
compute the offset of the session cookie for the next bpf
program.


This part correspond to the 5th patch. It will be more clear if you
combine it to the 5th patch. Seems that it's a little confusing
here :/


Maybe some comment is needed here.


> 
> > +               }
> >                 if (invoke_bpf_prog(m, &prog, tl->links[i], stack_size,
> >                                     run_ctx_off, save_ret, image, rw_image))
> >                         return -EINVAL;
> > @@ -3222,7 +3227,9 @@ static int __arch_prepare_bpf_trampoline(struct bpf_tramp_image *im, void *rw_im
> >         struct bpf_tramp_links *fexit = &tlinks[BPF_TRAMP_FEXIT];
> >         struct bpf_tramp_links *fmod_ret = &tlinks[BPF_TRAMP_MODIFY_RETURN];
> >         void *orig_call = func_addr;
> > +       int cookie_off, cookie_cnt;
> >         u8 **branches = NULL;
> > +       u64 func_meta;
> >         u8 *prog;
> >         bool save_ret;
> >
> > @@ -3290,6 +3297,11 @@ static int __arch_prepare_bpf_trampoline(struct bpf_tramp_image *im, void *rw_im
> >
> >         ip_off = stack_size;
> >
> > +       cookie_cnt = bpf_fsession_cookie_cnt(tlinks);
> > +       /* room for session cookies */
> > +       stack_size += cookie_cnt * 8;
> > +       cookie_off = stack_size;
> > +
> >         stack_size += 8;
> >         rbx_off = stack_size;
> >
> > @@ -3383,9 +3395,19 @@ static int __arch_prepare_bpf_trampoline(struct bpf_tramp_image *im, void *rw_im
> >                 }
> >         }
> >
> > +       if (bpf_fsession_cnt(tlinks)) {
> > +               /* clear all the session cookies' value */
> > +               for (int i = 0; i < cookie_cnt; i++)
> > +                       emit_store_stack_imm64(&prog, cookie_off - 8 * i, 0);
> > +               /* clear the return value to make sure fentry always get 0 */
> > +               emit_store_stack_imm64(&prog, 8, 0);
> > +       }
> > +       func_meta = nr_regs + (((cookie_off - regs_off) / 8) << BPF_TRAMP_M_COOKIE);
> 
> func_meta conceptually is a collection of bit fields, so using +/-
> feels weird, use | and &, more in line with working with bits?


It's not only for bit fields. For nr_args and cookie offset, they are
byte fields. Especially for cookie offset, arithmetic operation is performed
too. So I think it make sense here, right?


> 
> (also you defined that BPF_TRAMP_M_NR_ARGS but you are not using it
> consistently...)


I'm not sure if we should define it. As we use the least significant byte for
the nr_args, the shift for it is always 0. If we use it in the inline, unnecessary
instruction will be generated, which is the bit shift instruction.


I defined it here for better code reading. Maybe we can do some comment
in the inline of bpf_get_func_arg(), instead of defining such a unused
macro?


Thanks!
Menglong Dong


> 
> 
> 
> 
> > +
> >         if (fentry->nr_links) {
> >                 if (invoke_bpf(m, &prog, fentry, regs_off, run_ctx_off,
> > -                              flags & BPF_TRAMP_F_RET_FENTRY_RET, image, rw_image))
> > +                              flags & BPF_TRAMP_F_RET_FENTRY_RET, image, rw_image,
> > +                              func_meta))
> >                         return -EINVAL;
> >         }
> >
> > @@ -3445,9 +3467,14 @@ static int __arch_prepare_bpf_trampoline(struct bpf_tramp_image *im, void *rw_im
> >                 }
> >         }
> >
> > +       /* set the "is_return" flag for fsession */
> > +       func_meta += (1 << BPF_TRAMP_M_IS_RETURN);
> > +       if (bpf_fsession_cnt(tlinks))
> > +               emit_store_stack_imm64(&prog, nregs_off, func_meta);
> > +
> >         if (fexit->nr_links) {
> >                 if (invoke_bpf(m, &prog, fexit, regs_off, run_ctx_off,
> > -                              false, image, rw_image)) {
> > +                              false, image, rw_image, func_meta)) {
> >                         ret = -EINVAL;
> >                         goto cleanup;
> >                 }
> > --
> > 2.52.0
> >
> 






  reply	other threads:[~2026-01-14  3:27 UTC|newest]

Thread overview: 41+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-01-10 14:11 [PATCH bpf-next v9 00/11] bpf: fsession support Menglong Dong
2026-01-10 14:11 ` [PATCH bpf-next v9 01/11] bpf: add " Menglong Dong
2026-01-14  1:22   ` Andrii Nakryiko
2026-01-14  2:10     ` Menglong Dong
2026-01-14 18:56       ` Andrii Nakryiko
2026-01-15  2:05         ` Menglong Dong
2026-01-15  8:33         ` Menglong Dong
2026-01-10 14:11 ` [PATCH bpf-next v9 02/11] bpf: use last 8-bits for the nr_args in trampoline Menglong Dong
2026-01-14  1:22   ` Andrii Nakryiko
2026-01-14  2:19     ` Menglong Dong
2026-01-14  9:52       ` David Laight
2026-01-10 14:11 ` [PATCH bpf-next v9 03/11] bpf: change prototype of bpf_session_{cookie,is_return} Menglong Dong
2026-01-14  1:22   ` Andrii Nakryiko
2026-01-14  2:19     ` Menglong Dong
2026-01-10 14:11 ` [PATCH bpf-next v9 04/11] bpf: support fsession for bpf_session_is_return Menglong Dong
2026-01-14  1:22   ` Andrii Nakryiko
2026-01-14  2:25     ` Menglong Dong
2026-01-10 14:11 ` [PATCH bpf-next v9 05/11] bpf: support fsession for bpf_session_cookie Menglong Dong
2026-01-10 14:42   ` bot+bpf-ci
2026-01-11  1:54     ` Menglong Dong
2026-01-14  1:22   ` Andrii Nakryiko
2026-01-14  2:33     ` Alexei Starovoitov
2026-01-14  2:38       ` Menglong Dong
2026-01-14  2:48     ` Menglong Dong
2026-01-10 14:11 ` [PATCH bpf-next v9 06/11] bpf,x86: introduce emit_store_stack_imm64() for trampoline Menglong Dong
2026-01-14  1:22   ` Andrii Nakryiko
2026-01-14  2:31     ` Menglong Dong
2026-01-10 14:11 ` [PATCH bpf-next v9 07/11] bpf,x86: add fsession support for x86_64 Menglong Dong
2026-01-14  1:25   ` Andrii Nakryiko
2026-01-14  3:27     ` Menglong Dong [this message]
2026-01-14  3:35       ` Menglong Dong
2026-01-14 19:05       ` Andrii Nakryiko
2026-01-15  2:12         ` Menglong Dong
2026-01-10 14:11 ` [PATCH bpf-next v9 08/11] libbpf: add fsession support Menglong Dong
2026-01-14  1:24   ` Andrii Nakryiko
2026-01-14  3:27     ` Menglong Dong
2026-01-10 14:11 ` [PATCH bpf-next v9 09/11] selftests/bpf: add testcases for fsession Menglong Dong
2026-01-10 14:11 ` [PATCH bpf-next v9 10/11] selftests/bpf: add testcases for fsession cookie Menglong Dong
2026-01-10 14:11 ` [PATCH bpf-next v9 11/11] selftests/bpf: test fsession mixed with fentry and fexit Menglong Dong
2026-01-14  2:28 ` [PATCH bpf-next v9 00/11] bpf: fsession support Alexei Starovoitov
2026-01-14  2:52   ` Menglong Dong

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=2187165.bB369e8A3T@7940hx \
    --to=menglong.dong@linux.dev \
    --cc=andrii.nakryiko@gmail.com \
    --cc=andrii@kernel.org \
    --cc=ast@kernel.org \
    --cc=bp@alien8.de \
    --cc=bpf@vger.kernel.org \
    --cc=daniel@iogearbox.net \
    --cc=dave.hansen@linux.intel.com \
    --cc=davem@davemloft.net \
    --cc=dsahern@kernel.org \
    --cc=eddyz87@gmail.com \
    --cc=haoluo@google.com \
    --cc=hpa@zytor.com \
    --cc=jiang.biao@linux.dev \
    --cc=john.fastabend@gmail.com \
    --cc=jolsa@kernel.org \
    --cc=kpsingh@kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=martin.lau@linux.dev \
    --cc=menglong8.dong@gmail.com \
    --cc=mingo@redhat.com \
    --cc=netdev@vger.kernel.org \
    --cc=sdf@fomichev.me \
    --cc=song@kernel.org \
    --cc=tglx@linutronix.de \
    --cc=x86@kernel.org \
    --cc=yonghong.song@linux.dev \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox