From nobody Tue Oct 7 16:35:42 2025 Received: from mailgw.kylinos.cn (mailgw.kylinos.cn [124.126.103.232]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7280826C3AC; Wed, 9 Jul 2025 05:50:53 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=124.126.103.232 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1752040256; cv=none; b=UDu95c1PUQ65jyZdGBdVRPJT9Lhf3M3h5wVMnR2ES5sicZmkzHFQsnHEGcyHsrnuYsYIYj5jxgLTdRukZ5vJiHOHv2D4JAIRBTMVbITzHRZnIShK5RWGYHb6aPYJF1vSaEDjwfQrFnnS1OvsN1tDajVficTVdBHmTuTM2IU6qbI= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1752040256; c=relaxed/simple; bh=JDwvyRXA1pMKMQPPPvZsJkubYob77DLQltP+szHJIYs=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=BZcunrzdlAwgeqKdu8I18dTh7Ki+/cPw0wTOL0coFGGjQD9Fe7n3vpYDYENF8cvGmWXu3IZvxeMEPYmc8iGuaCHQQWH8Z26kNPsVI/ki48wyfM/32mhY5fR5a3w8i+2TXPNpcwfNqB8bkh0KgmcWcBq/bjveUYvY/7KqJkMx4Dc= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=kylinos.cn; spf=pass smtp.mailfrom=kylinos.cn; arc=none smtp.client-ip=124.126.103.232 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=kylinos.cn Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=kylinos.cn X-UUID: a93f9b405c8811f0b29709d653e92f7d-20250709 X-CTIC-Tags: HR_CC_COUNT, HR_CC_DOMAIN_COUNT, HR_CC_NO_NAME, HR_CTE_8B, HR_CTT_MISS HR_DATE_H, HR_DATE_WKD, HR_DATE_ZONE, HR_FROM_NAME, HR_SJ_DIGIT_LEN HR_SJ_LANG, HR_SJ_LEN, HR_SJ_LETTER, HR_SJ_NOR_SYM, HR_SJ_PHRASE HR_SJ_PHRASE_LEN, HR_SJ_WS, HR_TO_COUNT, HR_TO_DOMAIN_COUNT, HR_TO_NO_NAME IP_TRUSTED, SRC_TRUSTED, DN_TRUSTED, SA_EXISTED, SN_EXISTED SPF_NOPASS, DKIM_NOPASS, DMARC_NOPASS, CIE_BAD, CIE_GOOD CIE_GOOD_SPF, GTI_FG_BS, GTI_RG_INFO, GTI_C_BU, AMN_T1 AMN_GOOD, AMN_C_TI, AMN_C_BU, ABX_MISS_RDNS X-CID-P-RULE: Release_Ham X-CID-O-INFO: VERSION:1.1.45,REQID:d1139b6c-85a2-4eb3-864f-324bc9cf8e8f,IP:10, URL:0,TC:0,Content:0,EDM:0,RT:0,SF:-15,FILE:0,BULK:0,RULE:Release_Ham,ACTI ON:release,TS:-5 X-CID-INFO: VERSION:1.1.45,REQID:d1139b6c-85a2-4eb3-864f-324bc9cf8e8f,IP:10,UR L:0,TC:0,Content:0,EDM:0,RT:0,SF:-15,FILE:0,BULK:0,RULE:Release_Ham,ACTION :release,TS:-5 X-CID-META: VersionHash:6493067,CLOUDID:ca8c70a8a70f33c6a9c7da1caf9886b7,BulkI D:250709133928MMIGHBVG,BulkQuantity:1,Recheck:0,SF:17|19|24|38|44|66|78|81 |82|102,TC:nil,Content:0|50,EDM:-3,IP:-2,URL:0,File:nil,RT:nil,Bulk:40,QS: nil,BEC:nil,COL:0,OSI:0,OSA:0,AV:0,LES:1,SPR:NO,DKR:0,DKP:0,BRR:0,BRE:0,AR C:0 X-CID-BVR: 0 X-CID-BAS: 0,_,0,_ X-CID-FACTOR: TF_CID_SPAM_SNR,TF_CID_SPAM_FAS,TF_CID_SPAM_FSD,TF_CID_SPAM_FSI X-UUID: a93f9b405c8811f0b29709d653e92f7d-20250709 X-User: duanchenghao@kylinos.cn Received: from localhost.localdomain [(223.70.159.239)] by mailgw.kylinos.cn (envelope-from ) (Generic MTA) with ESMTP id 530607172; Wed, 09 Jul 2025 13:50:47 +0800 From: Chenghao Duan To: ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, yangtiezhu@loongson.cn, hengqi.chen@gmail.com, chenhuacai@kernel.org Cc: martin.lau@linux.dev, eddyz87@gmail.com, song@kernel.org, yonghong.song@linux.dev, john.fastabend@gmail.com, kpsingh@kernel.org, sdf@fomichev.me, haoluo@google.com, jolsa@kernel.org, kernel@xen0n.name, linux-kernel@vger.kernel.org, loongarch@lists.linux.dev, bpf@vger.kernel.org, guodongtai@kylinos.cn, duanchenghao@kylinos.cn, youling.tang@linux.dev, jianghaoran@kylinos.cn Subject: [PATCH v3 3/5] LoongArch: BPF: Add EXECMEM_BPF memory to execmem subsystem Date: Wed, 9 Jul 2025 13:50:27 +0800 Message-Id: <20250709055029.723243-4-duanchenghao@kylinos.cn> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20250709055029.723243-1-duanchenghao@kylinos.cn> References: <20250709055029.723243-1-duanchenghao@kylinos.cn> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The bpf_jit_alloc_exec function serves as the core mechanism for BPF memory allocation, invoking execmem_alloc(EXECMEM_BPF, size) to allocate memory. This change explicitly designates the allocation space for EXECMEM_BPF. Signed-off-by: Chenghao Duan --- arch/loongarch/mm/init.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/arch/loongarch/mm/init.c b/arch/loongarch/mm/init.c index c3e4586a7..07cedd9ee 100644 --- a/arch/loongarch/mm/init.c +++ b/arch/loongarch/mm/init.c @@ -239,6 +239,12 @@ struct execmem_info __init *execmem_arch_setup(void) .pgprot =3D PAGE_KERNEL, .alignment =3D 1, }, + [EXECMEM_BPF] =3D { + .start =3D VMALLOC_START, + .end =3D VMALLOC_END, + .pgprot =3D PAGE_KERNEL, + .alignment =3D PAGE_SIZE, + }, }, }; =20 --=20 2.43.0