From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1E854C4332F for ; Tue, 16 Nov 2021 01:43:42 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 0A76761C14 for ; Tue, 16 Nov 2021 01:43:42 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237936AbhKPBqc (ORCPT ); Mon, 15 Nov 2021 20:46:32 -0500 Received: from mail.kernel.org ([198.145.29.99]:33184 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241586AbhKOSX1 (ORCPT ); Mon, 15 Nov 2021 13:23:27 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id BC94461872; Mon, 15 Nov 2021 17:53:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1636998830; bh=+s8F88nDM2UowUkjFoe3zZcWOyOKiLXrxKbXMQW1IlY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=tU8vfPJ42kNXqbQJt3NE0TNRB4C8qcseU+U2Ruzpiy0z128frAxi8v304OINTAGD9 5llAmR3P3/H76TVrBHLLsqi++BaUR+b8AwSWbq71/0BzcOX4tF4JVZud62vVCQFC8g qHKq8zylpsMw2cKWlRdNx8nh8X1SGo7MYjj65u68= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Lorenz Bauer , Alexei Starovoitov , Luke Nelson , =?UTF-8?q?Bj=C3=B6rn=20T=C3=B6pel?= , Sasha Levin Subject: [PATCH 5.14 078/849] bpf: Define bpf_jit_alloc_exec_limit for riscv JIT Date: Mon, 15 Nov 2021 17:52:41 +0100 Message-Id: <20211115165422.689126449@linuxfoundation.org> X-Mailer: git-send-email 2.33.1 In-Reply-To: <20211115165419.961798833@linuxfoundation.org> References: <20211115165419.961798833@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org From: Lorenz Bauer [ Upstream commit 8f04db78e4e36a5d4858ce841a3e9cc3d69bde36 ] Expose the maximum amount of useable memory from the riscv JIT. Signed-off-by: Lorenz Bauer Signed-off-by: Alexei Starovoitov Acked-by: Luke Nelson Acked-by: Björn Töpel Link: https://lore.kernel.org/bpf/20211014142554.53120-2-lmb@cloudflare.com Signed-off-by: Sasha Levin --- arch/riscv/net/bpf_jit_core.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/arch/riscv/net/bpf_jit_core.c b/arch/riscv/net/bpf_jit_core.c index 5d247198c30d3..753d85bdfad07 100644 --- a/arch/riscv/net/bpf_jit_core.c +++ b/arch/riscv/net/bpf_jit_core.c @@ -167,6 +167,11 @@ out: return prog; } +u64 bpf_jit_alloc_exec_limit(void) +{ + return BPF_JIT_REGION_SIZE; +} + void *bpf_jit_alloc_exec(unsigned long size) { return __vmalloc_node_range(size, PAGE_SIZE, BPF_JIT_REGION_START, -- 2.33.0