From: Luke Nelson <lukenels@cs.washington.edu> To: Daniel Borkmann <daniel@iogearbox.net> Cc: "Björn Töpel" <bjorn.topel@gmail.com>, "Alexei Starovoitov" <ast@kernel.org>, Netdev <netdev@vger.kernel.org>, linux-riscv@lists.infradead.org, bpf <bpf@vger.kernel.org>, "Xi Wang" <xi.wang@gmail.com> Subject: Re: [PATCH bpf-next 2/8] riscv, bpf: add support for far branching Date: Mon, 9 Dec 2019 23:02:53 -0800 [thread overview] Message-ID: <CADasFoCZc7Lt=puc82x7PBSvuOG_dBwVgasYGJ4M3RFDG=qR3A@mail.gmail.com> (raw) In-Reply-To: <2d5d1f2d-d4ab-2449-37c6-e5b319a778d6@iogearbox.net> On Mon, Dec 9, 2019 at 1:27 PM Daniel Borkmann <daniel@iogearbox.net> wrote: > > This is awesome work! Did you also check for other architectures aside > from riscv and x86-32, e.g. x86-64 or arm64? We haven't tried on x86-64 or arm64 yet, but we plan to in the future and are looking at ways to minimize the effort required to port verification to new architectures. > It would be great if we could add such verification tool under tools/bpf/ > which would then take the in-tree JIT-code as-is for its analysis and > potentially even trigger a run out of BPF selftests. Any thoughts whether > such path would be feasible wrt serval? Right now the verification requires manual translation of the JIT implementation in C to Rosette for verification, which makes it difficult to integrate into existing tests. Were currently working on automating this process to be able to verify the C implementation directly. If this works out, it'd be awesome to integrate into the selftests in some way. Will keep you posted. Thanks, Luke
next prev parent reply other threads:[~2019-12-10 7:03 UTC|newest] Thread overview: 15+ messages / expand[flat|nested] mbox.gz Atom feed top 2019-12-09 17:31 [PATCH bpf-next 0/8] riscv: BPF JIT fix, optimizations and far jumps support Björn Töpel 2019-12-09 17:31 ` [PATCH bpf-next 1/8] riscv, bpf: fix broken BPF tail calls Björn Töpel 2019-12-09 17:31 ` [PATCH bpf-next 2/8] riscv, bpf: add support for far branching Björn Töpel 2019-12-09 21:08 ` Luke Nelson 2019-12-09 21:27 ` Daniel Borkmann 2019-12-10 7:02 ` Luke Nelson [this message] 2019-12-10 5:32 ` Björn Töpel 2019-12-10 5:31 ` Björn Töpel 2019-12-09 17:31 ` [PATCH bpf-next 3/8] riscv, bpf: add support for far jumps and exits Björn Töpel 2019-12-09 21:15 ` Luke Nelson 2019-12-09 17:31 ` [PATCH bpf-next 4/8] riscv, bpf: optimize BPF tail calls Björn Töpel 2019-12-09 17:31 ` [PATCH bpf-next 5/8] riscv, bpf: provide RISC-V specific JIT image alloc/free Björn Töpel 2019-12-09 17:31 ` [PATCH bpf-next 6/8] riscv, bpf: optimize calls Björn Töpel 2019-12-09 17:31 ` [PATCH bpf-next 7/8] riscv, bpf: add missing uapi header for BPF_PROG_TYPE_PERF_EVENT programs Björn Töpel 2019-12-09 17:31 ` [PATCH bpf-next 8/8] riscv, perf: add arch specific perf_arch_bpf_user_pt_regs Björn Töpel
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to='CADasFoCZc7Lt=puc82x7PBSvuOG_dBwVgasYGJ4M3RFDG=qR3A@mail.gmail.com' \ --to=lukenels@cs.washington.edu \ --cc=ast@kernel.org \ --cc=bjorn.topel@gmail.com \ --cc=bpf@vger.kernel.org \ --cc=daniel@iogearbox.net \ --cc=linux-riscv@lists.infradead.org \ --cc=netdev@vger.kernel.org \ --cc=xi.wang@gmail.com \ --subject='Re: [PATCH bpf-next 2/8] riscv, bpf: add support for far branching' \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).