Message ID | 20240926234526.1770736-1-yonghong.song@linux.dev (mailing list archive) |
---|---|
State | Superseded |
Delegated to: | BPF |
Headers | show |
Series | bpf: Support private stack for bpf progs | expand |
Hi Yonghong, A brief review about the usage of this_cpu_off on non-SMP systems. On 27/9/24 07:45, Yonghong Song wrote: > Add jit support for private stack. For a particular subtree, e.g., > subtree_root <== stack depth 120 > subprog1 <== stack depth 80 > subprog2 <== stack depth 40 > subprog3 <== stack depth 160 > > Let us say that private_stack_ptr is the memory address allocated for > private stack. The frame pointer for each above is calculated like below: > subtree_root <== subtree_root_fp = private_stack_ptr + 120 > subprog1 <== subtree_subprog1_fp = subtree_root_fp + 80 > subprog2 <== subtree_subprog2_fp = subtree_subprog1_fp + 40 > subprog3 <== subtree_subprog1_fp = subtree_root_fp + 160 > > For any function call to helper/kfunc, push/pop prog frame pointer > is needed in order to preserve frame pointer value. > > To deal with exception handling, push/pop frame pointer is also used > surrounding call to subsequent subprog. For example, > subtree_root > subprog1 > ... > insn: call bpf_throw > ... > > After jit, we will have > subtree_root > insn: push r9 > subprog1 > ... > insn: push r9 > insn: call bpf_throw > insn: pop r9 > ... > insn: pop r9 > > exception_handler > pop r9 > ... > where r9 represents the fp for each subprog. > > Signed-off-by: Yonghong Song <yonghong.song@linux.dev> > --- > arch/x86/net/bpf_jit_comp.c | 87 ++++++++++++++++++++++++++++++++++--- > 1 file changed, 81 insertions(+), 6 deletions(-) > > diff --git a/arch/x86/net/bpf_jit_comp.c b/arch/x86/net/bpf_jit_comp.c > index 06b080b61aa5..c264822c926b 100644 > --- a/arch/x86/net/bpf_jit_comp.c > +++ b/arch/x86/net/bpf_jit_comp.c > @@ -325,6 +325,22 @@ struct jit_context { > /* Number of bytes that will be skipped on tailcall */ > #define X86_TAIL_CALL_OFFSET (12 + ENDBR_INSN_SIZE) > > +static void push_r9(u8 **pprog) > +{ > + u8 *prog = *pprog; > + > + EMIT2(0x41, 0x51); /* push r9 */ > + *pprog = prog; > +} > + > +static void pop_r9(u8 **pprog) > +{ > + u8 *prog = *pprog; > + > + EMIT2(0x41, 0x59); /* pop r9 */ > + *pprog = prog; > +} > + > static void push_r12(u8 **pprog) > { > u8 *prog = *pprog; > @@ -491,7 +507,7 @@ static void emit_prologue_tail_call(u8 **pprog, bool is_subprog) > */ > static void emit_prologue(u8 **pprog, u32 stack_depth, bool ebpf_from_cbpf, > bool tail_call_reachable, bool is_subprog, > - bool is_exception_cb) > + bool is_exception_cb, enum bpf_pstack_state pstack) > { > u8 *prog = *pprog; > > @@ -518,6 +534,8 @@ static void emit_prologue(u8 **pprog, u32 stack_depth, bool ebpf_from_cbpf, > * first restore those callee-saved regs from stack, before > * reusing the stack frame. > */ > + if (pstack) > + pop_r9(&prog); > pop_callee_regs(&prog, all_callee_regs_used); > pop_r12(&prog); > /* Reset the stack frame. */ > @@ -1404,6 +1422,22 @@ static void emit_shiftx(u8 **pprog, u32 dst_reg, u8 src_reg, bool is64, u8 op) > *pprog = prog; > } > > +static void emit_private_frame_ptr(u8 **pprog, void *private_frame_ptr) > +{ > + u8 *prog = *pprog; > + > + /* movabs r9, private_frame_ptr */ > + emit_mov_imm64(&prog, X86_REG_R9, (long) private_frame_ptr >> 32, > + (u32) (long) private_frame_ptr); > + > + /* add <r9>, gs:[<off>] */ > + EMIT2(0x65, 0x4c); > + EMIT3(0x03, 0x0c, 0x25); > + EMIT((u32)(unsigned long)&this_cpu_off, 4); It should check CONFIG_SMP here like this commit: 1e9e0b85255e ("bpf: handle CONFIG_SMP=n configuration in x86 BPF JIT"). So, it seems better to reuse the code snippet of the commit. Thanks, Leon
On 9/26/24 9:58 PM, Leon Hwang wrote: > Hi Yonghong, > > A brief review about the usage of this_cpu_off on non-SMP systems. > > On 27/9/24 07:45, Yonghong Song wrote: >> Add jit support for private stack. For a particular subtree, e.g., >> subtree_root <== stack depth 120 >> subprog1 <== stack depth 80 >> subprog2 <== stack depth 40 >> subprog3 <== stack depth 160 >> >> Let us say that private_stack_ptr is the memory address allocated for >> private stack. The frame pointer for each above is calculated like below: >> subtree_root <== subtree_root_fp = private_stack_ptr + 120 >> subprog1 <== subtree_subprog1_fp = subtree_root_fp + 80 >> subprog2 <== subtree_subprog2_fp = subtree_subprog1_fp + 40 >> subprog3 <== subtree_subprog1_fp = subtree_root_fp + 160 >> >> For any function call to helper/kfunc, push/pop prog frame pointer >> is needed in order to preserve frame pointer value. >> >> To deal with exception handling, push/pop frame pointer is also used >> surrounding call to subsequent subprog. For example, >> subtree_root >> subprog1 >> ... >> insn: call bpf_throw >> ... >> >> After jit, we will have >> subtree_root >> insn: push r9 >> subprog1 >> ... >> insn: push r9 >> insn: call bpf_throw >> insn: pop r9 >> ... >> insn: pop r9 >> >> exception_handler >> pop r9 >> ... >> where r9 represents the fp for each subprog. >> >> Signed-off-by: Yonghong Song <yonghong.song@linux.dev> >> --- >> arch/x86/net/bpf_jit_comp.c | 87 ++++++++++++++++++++++++++++++++++--- >> 1 file changed, 81 insertions(+), 6 deletions(-) >> >> diff --git a/arch/x86/net/bpf_jit_comp.c b/arch/x86/net/bpf_jit_comp.c >> index 06b080b61aa5..c264822c926b 100644 >> --- a/arch/x86/net/bpf_jit_comp.c >> +++ b/arch/x86/net/bpf_jit_comp.c >> @@ -325,6 +325,22 @@ struct jit_context { >> /* Number of bytes that will be skipped on tailcall */ >> #define X86_TAIL_CALL_OFFSET (12 + ENDBR_INSN_SIZE) >> >> +static void push_r9(u8 **pprog) >> +{ >> + u8 *prog = *pprog; >> + >> + EMIT2(0x41, 0x51); /* push r9 */ >> + *pprog = prog; >> +} >> + >> +static void pop_r9(u8 **pprog) >> +{ >> + u8 *prog = *pprog; >> + >> + EMIT2(0x41, 0x59); /* pop r9 */ >> + *pprog = prog; >> +} >> + >> static void push_r12(u8 **pprog) >> { >> u8 *prog = *pprog; >> @@ -491,7 +507,7 @@ static void emit_prologue_tail_call(u8 **pprog, bool is_subprog) >> */ >> static void emit_prologue(u8 **pprog, u32 stack_depth, bool ebpf_from_cbpf, >> bool tail_call_reachable, bool is_subprog, >> - bool is_exception_cb) >> + bool is_exception_cb, enum bpf_pstack_state pstack) >> { >> u8 *prog = *pprog; >> >> @@ -518,6 +534,8 @@ static void emit_prologue(u8 **pprog, u32 stack_depth, bool ebpf_from_cbpf, >> * first restore those callee-saved regs from stack, before >> * reusing the stack frame. >> */ >> + if (pstack) >> + pop_r9(&prog); >> pop_callee_regs(&prog, all_callee_regs_used); >> pop_r12(&prog); >> /* Reset the stack frame. */ >> @@ -1404,6 +1422,22 @@ static void emit_shiftx(u8 **pprog, u32 dst_reg, u8 src_reg, bool is64, u8 op) >> *pprog = prog; >> } >> >> +static void emit_private_frame_ptr(u8 **pprog, void *private_frame_ptr) >> +{ >> + u8 *prog = *pprog; >> + >> + /* movabs r9, private_frame_ptr */ >> + emit_mov_imm64(&prog, X86_REG_R9, (long) private_frame_ptr >> 32, >> + (u32) (long) private_frame_ptr); >> + >> + /* add <r9>, gs:[<off>] */ >> + EMIT2(0x65, 0x4c); >> + EMIT3(0x03, 0x0c, 0x25); >> + EMIT((u32)(unsigned long)&this_cpu_off, 4); > It should check CONFIG_SMP here like this commit: > 1e9e0b85255e ("bpf: handle CONFIG_SMP=n configuration in x86 BPF JIT"). > > So, it seems better to reuse the code snippet of the commit. Thanks for pointing this out. I will make the change after waiting some other reviews. > > Thanks, > Leon >
Hi Yonghong, kernel test robot noticed the following build warnings: [auto build test WARNING on bpf-next/master] url: https://github.com/intel-lab-lkp/linux/commits/Yonghong-Song/bpf-Allow-each-subprog-having-stack-size-of-512-bytes/20240927-074744 base: https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git master patch link: https://lore.kernel.org/r/20240926234526.1770736-1-yonghong.song%40linux.dev patch subject: [PATCH bpf-next v3 4/5] bpf, x86: Add jit support for private stack config: x86_64-randconfig-122-20240929 (https://download.01.org/0day-ci/archive/20240929/202409291637.cuQ0jRdD-lkp@intel.com/config) compiler: gcc-12 (Debian 12.2.0-14) 12.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20240929/202409291637.cuQ0jRdD-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp@intel.com> | Closes: https://lore.kernel.org/oe-kbuild-all/202409291637.cuQ0jRdD-lkp@intel.com/ sparse warnings: (new ones prefixed by >>) >> arch/x86/net/bpf_jit_comp.c:1503:47: sparse: sparse: incorrect type in argument 2 (different address spaces) @@ expected void *private_frame_ptr @@ got void [noderef] __percpu *[assigned] private_frame_ptr @@ arch/x86/net/bpf_jit_comp.c:1503:47: sparse: expected void *private_frame_ptr arch/x86/net/bpf_jit_comp.c:1503:47: sparse: got void [noderef] __percpu *[assigned] private_frame_ptr vim +1503 arch/x86/net/bpf_jit_comp.c 1442 1443 #define __LOAD_TCC_PTR(off) \ 1444 EMIT3_off32(0x48, 0x8B, 0x85, off) 1445 /* mov rax, qword ptr [rbp - rounded_stack_depth - 16] */ 1446 #define LOAD_TAIL_CALL_CNT_PTR(stack) \ 1447 __LOAD_TCC_PTR(BPF_TAIL_CALL_CNT_PTR_STACK_OFF(stack)) 1448 1449 static int do_jit(struct bpf_prog *bpf_prog, int *addrs, u8 *image, u8 *rw_image, 1450 int oldproglen, struct jit_context *ctx, bool jmp_padding) 1451 { 1452 bool tail_call_reachable = bpf_prog->aux->tail_call_reachable; 1453 struct bpf_insn *insn = bpf_prog->insnsi; 1454 bool callee_regs_used[4] = {}; 1455 int insn_cnt = bpf_prog->len; 1456 bool seen_exit = false; 1457 u8 temp[BPF_MAX_INSN_SIZE + BPF_INSN_SAFETY]; 1458 void __percpu *private_frame_ptr = NULL; 1459 u64 arena_vm_start, user_vm_start; 1460 u32 orig_stack_depth, stack_depth; 1461 int i, excnt = 0; 1462 int ilen, proglen = 0; 1463 u8 *prog = temp; 1464 int err; 1465 1466 stack_depth = bpf_prog->aux->stack_depth; 1467 orig_stack_depth = round_up(stack_depth, 8); 1468 if (bpf_prog->pstack) { 1469 stack_depth = 0; 1470 if (bpf_prog->pstack == PSTACK_TREE_ROOT) 1471 private_frame_ptr = bpf_prog->private_stack_ptr + orig_stack_depth; 1472 } 1473 1474 arena_vm_start = bpf_arena_get_kern_vm_start(bpf_prog->aux->arena); 1475 user_vm_start = bpf_arena_get_user_vm_start(bpf_prog->aux->arena); 1476 1477 detect_reg_usage(insn, insn_cnt, callee_regs_used); 1478 1479 emit_prologue(&prog, stack_depth, 1480 bpf_prog_was_classic(bpf_prog), tail_call_reachable, 1481 bpf_is_subprog(bpf_prog), bpf_prog->aux->exception_cb, 1482 bpf_prog->pstack); 1483 /* Exception callback will clobber callee regs for its own use, and 1484 * restore the original callee regs from main prog's stack frame. 1485 */ 1486 if (bpf_prog->aux->exception_boundary) { 1487 /* We also need to save r12, which is not mapped to any BPF 1488 * register, as we throw after entry into the kernel, which may 1489 * overwrite r12. 1490 */ 1491 push_r12(&prog); 1492 push_callee_regs(&prog, all_callee_regs_used); 1493 } else { 1494 if (arena_vm_start) 1495 push_r12(&prog); 1496 push_callee_regs(&prog, callee_regs_used); 1497 } 1498 if (arena_vm_start) 1499 emit_mov_imm64(&prog, X86_REG_R12, 1500 arena_vm_start >> 32, (u32) arena_vm_start); 1501 1502 if (bpf_prog->pstack == PSTACK_TREE_ROOT) { > 1503 emit_private_frame_ptr(&prog, private_frame_ptr); 1504 } else if (bpf_prog->pstack == PSTACK_TREE_INTERNAL && orig_stack_depth) { 1505 /* r9 += orig_stack_depth */ 1506 maybe_emit_1mod(&prog, X86_REG_R9, true); 1507 if (is_imm8(orig_stack_depth)) 1508 EMIT3(0x83, add_1reg(0xC0, X86_REG_R9), orig_stack_depth); 1509 else 1510 EMIT2_off32(0x81, add_1reg(0xC0, X86_REG_R9), orig_stack_depth); 1511 } 1512 1513 ilen = prog - temp; 1514 if (rw_image) 1515 memcpy(rw_image + proglen, temp, ilen); 1516 proglen += ilen; 1517 addrs[0] = proglen; 1518 prog = temp; 1519 1520 for (i = 1; i <= insn_cnt; i++, insn++) { 1521 const s32 imm32 = insn->imm; 1522 u32 dst_reg = insn->dst_reg; 1523 u32 src_reg = insn->src_reg; 1524 u8 b2 = 0, b3 = 0; 1525 u8 *start_of_ldx; 1526 s64 jmp_offset; 1527 s16 insn_off; 1528 u8 jmp_cond; 1529 u8 *func; 1530 int nops; 1531 1532 if (bpf_prog->pstack) { 1533 if (src_reg == BPF_REG_FP) 1534 src_reg = X86_REG_R9; 1535 1536 if (dst_reg == BPF_REG_FP) 1537 dst_reg = X86_REG_R9; 1538 } 1539 1540 switch (insn->code) { 1541 /* ALU */ 1542 case BPF_ALU | BPF_ADD | BPF_X: 1543 case BPF_ALU | BPF_SUB | BPF_X: 1544 case BPF_ALU | BPF_AND | BPF_X: 1545 case BPF_ALU | BPF_OR | BPF_X: 1546 case BPF_ALU | BPF_XOR | BPF_X: 1547 case BPF_ALU64 | BPF_ADD | BPF_X: 1548 case BPF_ALU64 | BPF_SUB | BPF_X: 1549 case BPF_ALU64 | BPF_AND | BPF_X: 1550 case BPF_ALU64 | BPF_OR | BPF_X: 1551 case BPF_ALU64 | BPF_XOR | BPF_X: 1552 maybe_emit_mod(&prog, dst_reg, src_reg, 1553 BPF_CLASS(insn->code) == BPF_ALU64); 1554 b2 = simple_alu_opcodes[BPF_OP(insn->code)]; 1555 EMIT2(b2, add_2reg(0xC0, dst_reg, src_reg)); 1556 break; 1557 1558 case BPF_ALU64 | BPF_MOV | BPF_X: 1559 if (insn_is_cast_user(insn)) { 1560 if (dst_reg != src_reg) 1561 /* 32-bit mov */ 1562 emit_mov_reg(&prog, false, dst_reg, src_reg); 1563 /* shl dst_reg, 32 */ 1564 maybe_emit_1mod(&prog, dst_reg, true); 1565 EMIT3(0xC1, add_1reg(0xE0, dst_reg), 32); 1566 1567 /* or dst_reg, user_vm_start */ 1568 maybe_emit_1mod(&prog, dst_reg, true); 1569 if (is_axreg(dst_reg)) 1570 EMIT1_off32(0x0D, user_vm_start >> 32); 1571 else 1572 EMIT2_off32(0x81, add_1reg(0xC8, dst_reg), user_vm_start >> 32); 1573 1574 /* rol dst_reg, 32 */ 1575 maybe_emit_1mod(&prog, dst_reg, true); 1576 EMIT3(0xC1, add_1reg(0xC0, dst_reg), 32); 1577 1578 /* xor r11, r11 */ 1579 EMIT3(0x4D, 0x31, 0xDB); 1580 1581 /* test dst_reg32, dst_reg32; check if lower 32-bit are zero */ 1582 maybe_emit_mod(&prog, dst_reg, dst_reg, false); 1583 EMIT2(0x85, add_2reg(0xC0, dst_reg, dst_reg)); 1584 1585 /* cmove r11, dst_reg; if so, set dst_reg to zero */ 1586 /* WARNING: Intel swapped src/dst register encoding in CMOVcc !!! */ 1587 maybe_emit_mod(&prog, AUX_REG, dst_reg, true); 1588 EMIT3(0x0F, 0x44, add_2reg(0xC0, AUX_REG, dst_reg)); 1589 break; 1590 } else if (insn_is_mov_percpu_addr(insn)) { 1591 /* mov <dst>, <src> (if necessary) */ 1592 EMIT_mov(dst_reg, src_reg); 1593 #ifdef CONFIG_SMP 1594 /* add <dst>, gs:[<off>] */ 1595 EMIT2(0x65, add_1mod(0x48, dst_reg)); 1596 EMIT3(0x03, add_2reg(0x04, 0, dst_reg), 0x25); 1597 EMIT((u32)(unsigned long)&this_cpu_off, 4); 1598 #endif 1599 break; 1600 } 1601 fallthrough; 1602 case BPF_ALU | BPF_MOV | BPF_X: 1603 if (insn->off == 0) 1604 emit_mov_reg(&prog, 1605 BPF_CLASS(insn->code) == BPF_ALU64, 1606 dst_reg, src_reg); 1607 else 1608 emit_movsx_reg(&prog, insn->off, 1609 BPF_CLASS(insn->code) == BPF_ALU64, 1610 dst_reg, src_reg); 1611 break; 1612 1613 /* neg dst */ 1614 case BPF_ALU | BPF_NEG: 1615 case BPF_ALU64 | BPF_NEG: 1616 maybe_emit_1mod(&prog, dst_reg, 1617 BPF_CLASS(insn->code) == BPF_ALU64); 1618 EMIT2(0xF7, add_1reg(0xD8, dst_reg)); 1619 break; 1620 1621 case BPF_ALU | BPF_ADD | BPF_K: 1622 case BPF_ALU | BPF_SUB | BPF_K: 1623 case BPF_ALU | BPF_AND | BPF_K: 1624 case BPF_ALU | BPF_OR | BPF_K: 1625 case BPF_ALU | BPF_XOR | BPF_K: 1626 case BPF_ALU64 | BPF_ADD | BPF_K: 1627 case BPF_ALU64 | BPF_SUB | BPF_K: 1628 case BPF_ALU64 | BPF_AND | BPF_K: 1629 case BPF_ALU64 | BPF_OR | BPF_K: 1630 case BPF_ALU64 | BPF_XOR | BPF_K: 1631 maybe_emit_1mod(&prog, dst_reg, 1632 BPF_CLASS(insn->code) == BPF_ALU64); 1633 1634 /* 1635 * b3 holds 'normal' opcode, b2 short form only valid 1636 * in case dst is eax/rax. 1637 */ 1638 switch (BPF_OP(insn->code)) { 1639 case BPF_ADD: 1640 b3 = 0xC0; 1641 b2 = 0x05; 1642 break; 1643 case BPF_SUB: 1644 b3 = 0xE8; 1645 b2 = 0x2D; 1646 break; 1647 case BPF_AND: 1648 b3 = 0xE0; 1649 b2 = 0x25; 1650 break; 1651 case BPF_OR: 1652 b3 = 0xC8; 1653 b2 = 0x0D; 1654 break; 1655 case BPF_XOR: 1656 b3 = 0xF0; 1657 b2 = 0x35; 1658 break; 1659 } 1660 1661 if (is_imm8(imm32)) 1662 EMIT3(0x83, add_1reg(b3, dst_reg), imm32); 1663 else if (is_axreg(dst_reg)) 1664 EMIT1_off32(b2, imm32); 1665 else 1666 EMIT2_off32(0x81, add_1reg(b3, dst_reg), imm32); 1667 break; 1668 1669 case BPF_ALU64 | BPF_MOV | BPF_K: 1670 case BPF_ALU | BPF_MOV | BPF_K: 1671 emit_mov_imm32(&prog, BPF_CLASS(insn->code) == BPF_ALU64, 1672 dst_reg, imm32); 1673 break; 1674 1675 case BPF_LD | BPF_IMM | BPF_DW: 1676 emit_mov_imm64(&prog, dst_reg, insn[1].imm, insn[0].imm); 1677 insn++; 1678 i++; 1679 break; 1680 1681 /* dst %= src, dst /= src, dst %= imm32, dst /= imm32 */ 1682 case BPF_ALU | BPF_MOD | BPF_X: 1683 case BPF_ALU | BPF_DIV | BPF_X: 1684 case BPF_ALU | BPF_MOD | BPF_K: 1685 case BPF_ALU | BPF_DIV | BPF_K: 1686 case BPF_ALU64 | BPF_MOD | BPF_X: 1687 case BPF_ALU64 | BPF_DIV | BPF_X: 1688 case BPF_ALU64 | BPF_MOD | BPF_K: 1689 case BPF_ALU64 | BPF_DIV | BPF_K: { 1690 bool is64 = BPF_CLASS(insn->code) == BPF_ALU64; 1691 1692 if (dst_reg != BPF_REG_0) 1693 EMIT1(0x50); /* push rax */ 1694 if (dst_reg != BPF_REG_3) 1695 EMIT1(0x52); /* push rdx */ 1696 1697 if (BPF_SRC(insn->code) == BPF_X) { 1698 if (src_reg == BPF_REG_0 || 1699 src_reg == BPF_REG_3) { 1700 /* mov r11, src_reg */ 1701 EMIT_mov(AUX_REG, src_reg); 1702 src_reg = AUX_REG; 1703 } 1704 } else { 1705 /* mov r11, imm32 */ 1706 EMIT3_off32(0x49, 0xC7, 0xC3, imm32); 1707 src_reg = AUX_REG; 1708 } 1709 1710 if (dst_reg != BPF_REG_0) 1711 /* mov rax, dst_reg */ 1712 emit_mov_reg(&prog, is64, BPF_REG_0, dst_reg); 1713 1714 if (insn->off == 0) { 1715 /* 1716 * xor edx, edx 1717 * equivalent to 'xor rdx, rdx', but one byte less 1718 */ 1719 EMIT2(0x31, 0xd2); 1720 1721 /* div src_reg */ 1722 maybe_emit_1mod(&prog, src_reg, is64); 1723 EMIT2(0xF7, add_1reg(0xF0, src_reg)); 1724 } else { 1725 if (BPF_CLASS(insn->code) == BPF_ALU) 1726 EMIT1(0x99); /* cdq */ 1727 else 1728 EMIT2(0x48, 0x99); /* cqo */ 1729 1730 /* idiv src_reg */ 1731 maybe_emit_1mod(&prog, src_reg, is64); 1732 EMIT2(0xF7, add_1reg(0xF8, src_reg)); 1733 } 1734 1735 if (BPF_OP(insn->code) == BPF_MOD && 1736 dst_reg != BPF_REG_3) 1737 /* mov dst_reg, rdx */ 1738 emit_mov_reg(&prog, is64, dst_reg, BPF_REG_3); 1739 else if (BPF_OP(insn->code) == BPF_DIV && 1740 dst_reg != BPF_REG_0) 1741 /* mov dst_reg, rax */ 1742 emit_mov_reg(&prog, is64, dst_reg, BPF_REG_0); 1743 1744 if (dst_reg != BPF_REG_3) 1745 EMIT1(0x5A); /* pop rdx */ 1746 if (dst_reg != BPF_REG_0) 1747 EMIT1(0x58); /* pop rax */ 1748 break; 1749 } 1750 1751 case BPF_ALU | BPF_MUL | BPF_K: 1752 case BPF_ALU64 | BPF_MUL | BPF_K: 1753 maybe_emit_mod(&prog, dst_reg, dst_reg, 1754 BPF_CLASS(insn->code) == BPF_ALU64); 1755 1756 if (is_imm8(imm32)) 1757 /* imul dst_reg, dst_reg, imm8 */ 1758 EMIT3(0x6B, add_2reg(0xC0, dst_reg, dst_reg), 1759 imm32); 1760 else 1761 /* imul dst_reg, dst_reg, imm32 */ 1762 EMIT2_off32(0x69, 1763 add_2reg(0xC0, dst_reg, dst_reg), 1764 imm32); 1765 break; 1766 1767 case BPF_ALU | BPF_MUL | BPF_X: 1768 case BPF_ALU64 | BPF_MUL | BPF_X: 1769 maybe_emit_mod(&prog, src_reg, dst_reg, 1770 BPF_CLASS(insn->code) == BPF_ALU64); 1771 1772 /* imul dst_reg, src_reg */ 1773 EMIT3(0x0F, 0xAF, add_2reg(0xC0, src_reg, dst_reg)); 1774 break; 1775 1776 /* Shifts */ 1777 case BPF_ALU | BPF_LSH | BPF_K: 1778 case BPF_ALU | BPF_RSH | BPF_K: 1779 case BPF_ALU | BPF_ARSH | BPF_K: 1780 case BPF_ALU64 | BPF_LSH | BPF_K: 1781 case BPF_ALU64 | BPF_RSH | BPF_K: 1782 case BPF_ALU64 | BPF_ARSH | BPF_K: 1783 maybe_emit_1mod(&prog, dst_reg, 1784 BPF_CLASS(insn->code) == BPF_ALU64); 1785 1786 b3 = simple_alu_opcodes[BPF_OP(insn->code)]; 1787 if (imm32 == 1) 1788 EMIT2(0xD1, add_1reg(b3, dst_reg)); 1789 else 1790 EMIT3(0xC1, add_1reg(b3, dst_reg), imm32); 1791 break; 1792 1793 case BPF_ALU | BPF_LSH | BPF_X: 1794 case BPF_ALU | BPF_RSH | BPF_X: 1795 case BPF_ALU | BPF_ARSH | BPF_X: 1796 case BPF_ALU64 | BPF_LSH | BPF_X: 1797 case BPF_ALU64 | BPF_RSH | BPF_X: 1798 case BPF_ALU64 | BPF_ARSH | BPF_X: 1799 /* BMI2 shifts aren't better when shift count is already in rcx */ 1800 if (boot_cpu_has(X86_FEATURE_BMI2) && src_reg != BPF_REG_4) { 1801 /* shrx/sarx/shlx dst_reg, dst_reg, src_reg */ 1802 bool w = (BPF_CLASS(insn->code) == BPF_ALU64); 1803 u8 op; 1804 1805 switch (BPF_OP(insn->code)) { 1806 case BPF_LSH: 1807 op = 1; /* prefix 0x66 */ 1808 break; 1809 case BPF_RSH: 1810 op = 3; /* prefix 0xf2 */ 1811 break; 1812 case BPF_ARSH: 1813 op = 2; /* prefix 0xf3 */ 1814 break; 1815 } 1816 1817 emit_shiftx(&prog, dst_reg, src_reg, w, op); 1818 1819 break; 1820 } 1821 1822 if (src_reg != BPF_REG_4) { /* common case */ 1823 /* Check for bad case when dst_reg == rcx */ 1824 if (dst_reg == BPF_REG_4) { 1825 /* mov r11, dst_reg */ 1826 EMIT_mov(AUX_REG, dst_reg); 1827 dst_reg = AUX_REG; 1828 } else { 1829 EMIT1(0x51); /* push rcx */ 1830 } 1831 /* mov rcx, src_reg */ 1832 EMIT_mov(BPF_REG_4, src_reg); 1833 } 1834 1835 /* shl %rax, %cl | shr %rax, %cl | sar %rax, %cl */ 1836 maybe_emit_1mod(&prog, dst_reg, 1837 BPF_CLASS(insn->code) == BPF_ALU64); 1838 1839 b3 = simple_alu_opcodes[BPF_OP(insn->code)]; 1840 EMIT2(0xD3, add_1reg(b3, dst_reg)); 1841 1842 if (src_reg != BPF_REG_4) { 1843 if (insn->dst_reg == BPF_REG_4) 1844 /* mov dst_reg, r11 */ 1845 EMIT_mov(insn->dst_reg, AUX_REG); 1846 else 1847 EMIT1(0x59); /* pop rcx */ 1848 } 1849 1850 break; 1851 1852 case BPF_ALU | BPF_END | BPF_FROM_BE: 1853 case BPF_ALU64 | BPF_END | BPF_FROM_LE: 1854 switch (imm32) { 1855 case 16: 1856 /* Emit 'ror %ax, 8' to swap lower 2 bytes */ 1857 EMIT1(0x66); 1858 if (is_ereg(dst_reg)) 1859 EMIT1(0x41); 1860 EMIT3(0xC1, add_1reg(0xC8, dst_reg), 8); 1861 1862 /* Emit 'movzwl eax, ax' */ 1863 if (is_ereg(dst_reg)) 1864 EMIT3(0x45, 0x0F, 0xB7); 1865 else 1866 EMIT2(0x0F, 0xB7); 1867 EMIT1(add_2reg(0xC0, dst_reg, dst_reg)); 1868 break; 1869 case 32: 1870 /* Emit 'bswap eax' to swap lower 4 bytes */ 1871 if (is_ereg(dst_reg)) 1872 EMIT2(0x41, 0x0F); 1873 else 1874 EMIT1(0x0F); 1875 EMIT1(add_1reg(0xC8, dst_reg)); 1876 break; 1877 case 64: 1878 /* Emit 'bswap rax' to swap 8 bytes */ 1879 EMIT3(add_1mod(0x48, dst_reg), 0x0F, 1880 add_1reg(0xC8, dst_reg)); 1881 break; 1882 } 1883 break; 1884 1885 case BPF_ALU | BPF_END | BPF_FROM_LE: 1886 switch (imm32) { 1887 case 16: 1888 /* 1889 * Emit 'movzwl eax, ax' to zero extend 16-bit 1890 * into 64 bit 1891 */ 1892 if (is_ereg(dst_reg)) 1893 EMIT3(0x45, 0x0F, 0xB7); 1894 else 1895 EMIT2(0x0F, 0xB7); 1896 EMIT1(add_2reg(0xC0, dst_reg, dst_reg)); 1897 break; 1898 case 32: 1899 /* Emit 'mov eax, eax' to clear upper 32-bits */ 1900 if (is_ereg(dst_reg)) 1901 EMIT1(0x45); 1902 EMIT2(0x89, add_2reg(0xC0, dst_reg, dst_reg)); 1903 break; 1904 case 64: 1905 /* nop */ 1906 break; 1907 } 1908 break; 1909 1910 /* speculation barrier */ 1911 case BPF_ST | BPF_NOSPEC: 1912 EMIT_LFENCE(); 1913 break; 1914 1915 /* ST: *(u8*)(dst_reg + off) = imm */ 1916 case BPF_ST | BPF_MEM | BPF_B: 1917 if (is_ereg(dst_reg)) 1918 EMIT2(0x41, 0xC6); 1919 else 1920 EMIT1(0xC6); 1921 goto st; 1922 case BPF_ST | BPF_MEM | BPF_H: 1923 if (is_ereg(dst_reg)) 1924 EMIT3(0x66, 0x41, 0xC7); 1925 else 1926 EMIT2(0x66, 0xC7); 1927 goto st; 1928 case BPF_ST | BPF_MEM | BPF_W: 1929 if (is_ereg(dst_reg)) 1930 EMIT2(0x41, 0xC7); 1931 else 1932 EMIT1(0xC7); 1933 goto st; 1934 case BPF_ST | BPF_MEM | BPF_DW: 1935 EMIT2(add_1mod(0x48, dst_reg), 0xC7); 1936
Hi Yonghong, kernel test robot noticed the following build errors: [auto build test ERROR on bpf-next/master] url: https://github.com/intel-lab-lkp/linux/commits/Yonghong-Song/bpf-Allow-each-subprog-having-stack-size-of-512-bytes/20240927-074744 base: https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git master patch link: https://lore.kernel.org/r/20240926234526.1770736-1-yonghong.song%40linux.dev patch subject: [PATCH bpf-next v3 4/5] bpf, x86: Add jit support for private stack config: x86_64-buildonly-randconfig-004-20240929 (https://download.01.org/0day-ci/archive/20240929/202409292026.oUij9Xvr-lkp@intel.com/config) compiler: clang version 18.1.8 (https://github.com/llvm/llvm-project 3b5b5c1ec4a3095ab096dd780e84d7ab81f3d7ff) reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20240929/202409292026.oUij9Xvr-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp@intel.com> | Closes: https://lore.kernel.org/oe-kbuild-all/202409292026.oUij9Xvr-lkp@intel.com/ All errors (new ones prefixed by >>): >> ld.lld: error: undefined symbol: this_cpu_off >>> referenced by bpf_jit_comp.c:31 (arch/x86/net/bpf_jit_comp.c:31) >>> arch/x86/net/bpf_jit_comp.o:(bpf_int_jit_compile) in archive vmlinux.a
Hi Yonghong,
kernel test robot noticed the following build errors:
[auto build test ERROR on bpf-next/master]
url: https://github.com/intel-lab-lkp/linux/commits/Yonghong-Song/bpf-Allow-each-subprog-having-stack-size-of-512-bytes/20240927-074744
base: https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git master
patch link: https://lore.kernel.org/r/20240926234526.1770736-1-yonghong.song%40linux.dev
patch subject: [PATCH bpf-next v3 4/5] bpf, x86: Add jit support for private stack
config: x86_64-buildonly-randconfig-006-20240929 (https://download.01.org/0day-ci/archive/20240929/202409292155.eLJJACtR-lkp@intel.com/config)
compiler: gcc-12 (Debian 12.2.0-14) 12.2.0
reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20240929/202409292155.eLJJACtR-lkp@intel.com/reproduce)
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@intel.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202409292155.eLJJACtR-lkp@intel.com/
All errors (new ones prefixed by >>):
ld: vmlinux.o: in function `do_jit':
>> bpf_jit_comp.c:(.text+0xde78a): undefined reference to `this_cpu_off'
On Thu, Sep 26, 2024 at 4:45 PM Yonghong Song <yonghong.song@linux.dev> wrote: > > Add jit support for private stack. For a particular subtree, e.g., > subtree_root <== stack depth 120 > subprog1 <== stack depth 80 > subprog2 <== stack depth 40 > subprog3 <== stack depth 160 > > Let us say that private_stack_ptr is the memory address allocated for > private stack. The frame pointer for each above is calculated like below: > subtree_root <== subtree_root_fp = private_stack_ptr + 120 > subprog1 <== subtree_subprog1_fp = subtree_root_fp + 80 > subprog2 <== subtree_subprog2_fp = subtree_subprog1_fp + 40 > subprog3 <== subtree_subprog1_fp = subtree_root_fp + 160 > > For any function call to helper/kfunc, push/pop prog frame pointer > is needed in order to preserve frame pointer value. > > To deal with exception handling, push/pop frame pointer is also used > surrounding call to subsequent subprog. For example, > subtree_root > subprog1 > ... > insn: call bpf_throw > ... > > After jit, we will have > subtree_root > insn: push r9 > subprog1 > ... > insn: push r9 > insn: call bpf_throw > insn: pop r9 > ... > insn: pop r9 > > exception_handler > pop r9 > ... > where r9 represents the fp for each subprog. Kumar, please review the interaction of priv_stack with exceptions. > > Signed-off-by: Yonghong Song <yonghong.song@linux.dev> > --- > arch/x86/net/bpf_jit_comp.c | 87 ++++++++++++++++++++++++++++++++++--- > 1 file changed, 81 insertions(+), 6 deletions(-) > > diff --git a/arch/x86/net/bpf_jit_comp.c b/arch/x86/net/bpf_jit_comp.c > index 06b080b61aa5..c264822c926b 100644 > --- a/arch/x86/net/bpf_jit_comp.c > +++ b/arch/x86/net/bpf_jit_comp.c > @@ -325,6 +325,22 @@ struct jit_context { > /* Number of bytes that will be skipped on tailcall */ > #define X86_TAIL_CALL_OFFSET (12 + ENDBR_INSN_SIZE) > > +static void push_r9(u8 **pprog) > +{ > + u8 *prog = *pprog; > + > + EMIT2(0x41, 0x51); /* push r9 */ > + *pprog = prog; > +} > + > +static void pop_r9(u8 **pprog) > +{ > + u8 *prog = *pprog; > + > + EMIT2(0x41, 0x59); /* pop r9 */ > + *pprog = prog; > +} > + > static void push_r12(u8 **pprog) > { > u8 *prog = *pprog; > @@ -491,7 +507,7 @@ static void emit_prologue_tail_call(u8 **pprog, bool is_subprog) > */ > static void emit_prologue(u8 **pprog, u32 stack_depth, bool ebpf_from_cbpf, > bool tail_call_reachable, bool is_subprog, > - bool is_exception_cb) > + bool is_exception_cb, enum bpf_pstack_state pstack) enum bpf_priv_stack_mode priv_stack_mode > { > u8 *prog = *pprog; > > @@ -518,6 +534,8 @@ static void emit_prologue(u8 **pprog, u32 stack_depth, bool ebpf_from_cbpf, > * first restore those callee-saved regs from stack, before > * reusing the stack frame. > */ > + if (pstack) > + pop_r9(&prog); This is an unnecessary cognitive load, since readers need to remember absolute values of enum. Just use if (priv_stack_mode != NO_PRIV_STACK) > pop_callee_regs(&prog, all_callee_regs_used); > pop_r12(&prog); > /* Reset the stack frame. */ > @@ -1404,6 +1422,22 @@ static void emit_shiftx(u8 **pprog, u32 dst_reg, u8 src_reg, bool is64, u8 op) > *pprog = prog; > } > > +static void emit_private_frame_ptr(u8 **pprog, void *private_frame_ptr) > +{ > + u8 *prog = *pprog; > + > + /* movabs r9, private_frame_ptr */ > + emit_mov_imm64(&prog, X86_REG_R9, (long) private_frame_ptr >> 32, > + (u32) (long) private_frame_ptr); > + > + /* add <r9>, gs:[<off>] */ > + EMIT2(0x65, 0x4c); > + EMIT3(0x03, 0x0c, 0x25); > + EMIT((u32)(unsigned long)&this_cpu_off, 4); > + > + *pprog = prog; > +} > + > #define INSN_SZ_DIFF (((addrs[i] - addrs[i - 1]) - (prog - temp))) > > #define __LOAD_TCC_PTR(off) \ > @@ -1421,20 +1455,31 @@ static int do_jit(struct bpf_prog *bpf_prog, int *addrs, u8 *image, u8 *rw_image > int insn_cnt = bpf_prog->len; > bool seen_exit = false; > u8 temp[BPF_MAX_INSN_SIZE + BPF_INSN_SAFETY]; > + void __percpu *private_frame_ptr = NULL; > u64 arena_vm_start, user_vm_start; > + u32 orig_stack_depth, stack_depth; > int i, excnt = 0; > int ilen, proglen = 0; > u8 *prog = temp; > int err; > > + stack_depth = bpf_prog->aux->stack_depth; > + orig_stack_depth = round_up(stack_depth, 8); > + if (bpf_prog->pstack) { > + stack_depth = 0; > + if (bpf_prog->pstack == PSTACK_TREE_ROOT) > + private_frame_ptr = bpf_prog->private_stack_ptr + orig_stack_depth; > + } Same issue. switch (priv_stack_mode) { case PRIV_STACK_MAIN_PROG: priv_frame_ptr = bpf_prog->priv_stack_ptr + orig_stack_depth; fallthrough; case PRIV_STACK_SUB_PROG: stack_depth = 0; break; } would be easier to read. > + > arena_vm_start = bpf_arena_get_kern_vm_start(bpf_prog->aux->arena); > user_vm_start = bpf_arena_get_user_vm_start(bpf_prog->aux->arena); > > detect_reg_usage(insn, insn_cnt, callee_regs_used); > > - emit_prologue(&prog, bpf_prog->aux->stack_depth, > + emit_prologue(&prog, stack_depth, > bpf_prog_was_classic(bpf_prog), tail_call_reachable, > - bpf_is_subprog(bpf_prog), bpf_prog->aux->exception_cb); > + bpf_is_subprog(bpf_prog), bpf_prog->aux->exception_cb, > + bpf_prog->pstack); > /* Exception callback will clobber callee regs for its own use, and > * restore the original callee regs from main prog's stack frame. > */ > @@ -1454,6 +1499,17 @@ static int do_jit(struct bpf_prog *bpf_prog, int *addrs, u8 *image, u8 *rw_image > emit_mov_imm64(&prog, X86_REG_R12, > arena_vm_start >> 32, (u32) arena_vm_start); > > + if (bpf_prog->pstack == PSTACK_TREE_ROOT) { > + emit_private_frame_ptr(&prog, private_frame_ptr); > + } else if (bpf_prog->pstack == PSTACK_TREE_INTERNAL && orig_stack_depth) { > + /* r9 += orig_stack_depth */ > + maybe_emit_1mod(&prog, X86_REG_R9, true); > + if (is_imm8(orig_stack_depth)) > + EMIT3(0x83, add_1reg(0xC0, X86_REG_R9), orig_stack_depth); > + else > + EMIT2_off32(0x81, add_1reg(0xC0, X86_REG_R9), orig_stack_depth); > + } We've been open coding 'add' insn like this for way too long. Let's address this technical debt now. Please move case BPF_ALU | BPF_ADD | BPF_K: case BPF_ALU | BPF_SUB | BPF_K: case BPF_ALU | BPF_AND | BPF_K: case BPF_ALU | BPF_OR | BPF_K: case BPF_ALU | BPF_XOR | BPF_K: case BPF_ALU64 | BPF_ADD | BPF_K: case BPF_ALU64 | BPF_SUB | BPF_K: case BPF_ALU64 | BPF_AND | BPF_K: case BPF_ALU64 | BPF_OR | BPF_K: case BPF_ALU64 | BPF_XOR | BPF_K: into helpers and use it here.
On 9/29/24 1:31 AM, kernel test robot wrote: > Hi Yonghong, > > kernel test robot noticed the following build warnings: > > [auto build test WARNING on bpf-next/master] > > url: https://github.com/intel-lab-lkp/linux/commits/Yonghong-Song/bpf-Allow-each-subprog-having-stack-size-of-512-bytes/20240927-074744 > base: https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git master > patch link: https://lore.kernel.org/r/20240926234526.1770736-1-yonghong.song%40linux.dev > patch subject: [PATCH bpf-next v3 4/5] bpf, x86: Add jit support for private stack > config: x86_64-randconfig-122-20240929 (https://download.01.org/0day-ci/archive/20240929/202409291637.cuQ0jRdD-lkp@intel.com/config) > compiler: gcc-12 (Debian 12.2.0-14) 12.2.0 > reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20240929/202409291637.cuQ0jRdD-lkp@intel.com/reproduce) > > If you fix the issue in a separate patch/commit (i.e. not just a new version of > the same patch/commit), kindly add following tags > | Reported-by: kernel test robot <lkp@intel.com> > | Closes: https://lore.kernel.org/oe-kbuild-all/202409291637.cuQ0jRdD-lkp@intel.com/ > > sparse warnings: (new ones prefixed by >>) >>> arch/x86/net/bpf_jit_comp.c:1503:47: sparse: sparse: incorrect type in argument 2 (different address spaces) @@ expected void *private_frame_ptr @@ got void [noderef] __percpu *[assigned] private_frame_ptr @@ > arch/x86/net/bpf_jit_comp.c:1503:47: sparse: expected void *private_frame_ptr > arch/x86/net/bpf_jit_comp.c:1503:47: sparse: got void [noderef] __percpu *[assigned] private_frame_ptr Okay, will make the change by adding __percpu to furnction parameter type. > > vim +1503 arch/x86/net/bpf_jit_comp.c > > 1442 > 1443 #define __LOAD_TCC_PTR(off) \ > 1444 EMIT3_off32(0x48, 0x8B, 0x85, off) > 1445 /* mov rax, qword ptr [rbp - rounded_stack_depth - 16] */ > 1446 #define LOAD_TAIL_CALL_CNT_PTR(stack) \ > 1447 __LOAD_TCC_PTR(BPF_TAIL_CALL_CNT_PTR_STACK_OFF(stack)) > 1448 [...]
On 9/29/24 6:02 AM, kernel test robot wrote: > Hi Yonghong, > > kernel test robot noticed the following build errors: > > [auto build test ERROR on bpf-next/master] > > url: https://github.com/intel-lab-lkp/linux/commits/Yonghong-Song/bpf-Allow-each-subprog-having-stack-size-of-512-bytes/20240927-074744 > base: https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git master > patch link: https://lore.kernel.org/r/20240926234526.1770736-1-yonghong.song%40linux.dev > patch subject: [PATCH bpf-next v3 4/5] bpf, x86: Add jit support for private stack > config: x86_64-buildonly-randconfig-004-20240929 (https://download.01.org/0day-ci/archive/20240929/202409292026.oUij9Xvr-lkp@intel.com/config) > compiler: clang version 18.1.8 (https://github.com/llvm/llvm-project 3b5b5c1ec4a3095ab096dd780e84d7ab81f3d7ff) > reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20240929/202409292026.oUij9Xvr-lkp@intel.com/reproduce) > > If you fix the issue in a separate patch/commit (i.e. not just a new version of > the same patch/commit), kindly add following tags > | Reported-by: kernel test robot <lkp@intel.com> > | Closes: https://lore.kernel.org/oe-kbuild-all/202409292026.oUij9Xvr-lkp@intel.com/ > > All errors (new ones prefixed by >>): > >>> ld.lld: error: undefined symbol: this_cpu_off Leon Hwang has reported this error. Will fix in the next revision. > >>> referenced by bpf_jit_comp.c:31 (arch/x86/net/bpf_jit_comp.c:31) > >>> arch/x86/net/bpf_jit_comp.o:(bpf_int_jit_compile) in archive vmlinux.a >
On 9/30/24 8:03 AM, Alexei Starovoitov wrote: > On Thu, Sep 26, 2024 at 4:45 PM Yonghong Song <yonghong.song@linux.dev> wrote: >> Add jit support for private stack. For a particular subtree, e.g., >> subtree_root <== stack depth 120 >> subprog1 <== stack depth 80 >> subprog2 <== stack depth 40 >> subprog3 <== stack depth 160 >> >> Let us say that private_stack_ptr is the memory address allocated for >> private stack. The frame pointer for each above is calculated like below: >> subtree_root <== subtree_root_fp = private_stack_ptr + 120 >> subprog1 <== subtree_subprog1_fp = subtree_root_fp + 80 >> subprog2 <== subtree_subprog2_fp = subtree_subprog1_fp + 40 >> subprog3 <== subtree_subprog1_fp = subtree_root_fp + 160 >> >> For any function call to helper/kfunc, push/pop prog frame pointer >> is needed in order to preserve frame pointer value. >> >> To deal with exception handling, push/pop frame pointer is also used >> surrounding call to subsequent subprog. For example, >> subtree_root >> subprog1 >> ... >> insn: call bpf_throw >> ... >> >> After jit, we will have >> subtree_root >> insn: push r9 >> subprog1 >> ... >> insn: push r9 >> insn: call bpf_throw >> insn: pop r9 >> ... >> insn: pop r9 >> >> exception_handler >> pop r9 >> ... >> where r9 represents the fp for each subprog. > Kumar, > please review the interaction of priv_stack with exceptions. > >> Signed-off-by: Yonghong Song <yonghong.song@linux.dev> >> --- >> arch/x86/net/bpf_jit_comp.c | 87 ++++++++++++++++++++++++++++++++++--- >> 1 file changed, 81 insertions(+), 6 deletions(-) >> >> diff --git a/arch/x86/net/bpf_jit_comp.c b/arch/x86/net/bpf_jit_comp.c >> index 06b080b61aa5..c264822c926b 100644 >> --- a/arch/x86/net/bpf_jit_comp.c >> +++ b/arch/x86/net/bpf_jit_comp.c >> @@ -325,6 +325,22 @@ struct jit_context { >> /* Number of bytes that will be skipped on tailcall */ >> #define X86_TAIL_CALL_OFFSET (12 + ENDBR_INSN_SIZE) >> >> +static void push_r9(u8 **pprog) >> +{ >> + u8 *prog = *pprog; >> + >> + EMIT2(0x41, 0x51); /* push r9 */ >> + *pprog = prog; >> +} >> + >> +static void pop_r9(u8 **pprog) >> +{ >> + u8 *prog = *pprog; >> + >> + EMIT2(0x41, 0x59); /* pop r9 */ >> + *pprog = prog; >> +} >> + >> static void push_r12(u8 **pprog) >> { >> u8 *prog = *pprog; >> @@ -491,7 +507,7 @@ static void emit_prologue_tail_call(u8 **pprog, bool is_subprog) >> */ >> static void emit_prologue(u8 **pprog, u32 stack_depth, bool ebpf_from_cbpf, >> bool tail_call_reachable, bool is_subprog, >> - bool is_exception_cb) >> + bool is_exception_cb, enum bpf_pstack_state pstack) > enum bpf_priv_stack_mode priv_stack_mode Okay. > >> { >> u8 *prog = *pprog; >> >> @@ -518,6 +534,8 @@ static void emit_prologue(u8 **pprog, u32 stack_depth, bool ebpf_from_cbpf, >> * first restore those callee-saved regs from stack, before >> * reusing the stack frame. >> */ >> + if (pstack) >> + pop_r9(&prog); > This is an unnecessary cognitive load, since readers > need to remember absolute values of enum. > Just use > if (priv_stack_mode != NO_PRIV_STACK) Will do. > >> pop_callee_regs(&prog, all_callee_regs_used); >> pop_r12(&prog); >> /* Reset the stack frame. */ >> @@ -1404,6 +1422,22 @@ static void emit_shiftx(u8 **pprog, u32 dst_reg, u8 src_reg, bool is64, u8 op) >> *pprog = prog; >> } >> >> +static void emit_private_frame_ptr(u8 **pprog, void *private_frame_ptr) >> +{ >> + u8 *prog = *pprog; >> + >> + /* movabs r9, private_frame_ptr */ >> + emit_mov_imm64(&prog, X86_REG_R9, (long) private_frame_ptr >> 32, >> + (u32) (long) private_frame_ptr); >> + >> + /* add <r9>, gs:[<off>] */ >> + EMIT2(0x65, 0x4c); >> + EMIT3(0x03, 0x0c, 0x25); >> + EMIT((u32)(unsigned long)&this_cpu_off, 4); >> + >> + *pprog = prog; >> +} >> + >> #define INSN_SZ_DIFF (((addrs[i] - addrs[i - 1]) - (prog - temp))) >> >> #define __LOAD_TCC_PTR(off) \ >> @@ -1421,20 +1455,31 @@ static int do_jit(struct bpf_prog *bpf_prog, int *addrs, u8 *image, u8 *rw_image >> int insn_cnt = bpf_prog->len; >> bool seen_exit = false; >> u8 temp[BPF_MAX_INSN_SIZE + BPF_INSN_SAFETY]; >> + void __percpu *private_frame_ptr = NULL; >> u64 arena_vm_start, user_vm_start; >> + u32 orig_stack_depth, stack_depth; >> int i, excnt = 0; >> int ilen, proglen = 0; >> u8 *prog = temp; >> int err; >> >> + stack_depth = bpf_prog->aux->stack_depth; >> + orig_stack_depth = round_up(stack_depth, 8); >> + if (bpf_prog->pstack) { >> + stack_depth = 0; >> + if (bpf_prog->pstack == PSTACK_TREE_ROOT) >> + private_frame_ptr = bpf_prog->private_stack_ptr + orig_stack_depth; >> + } > Same issue. > switch (priv_stack_mode) { > case PRIV_STACK_MAIN_PROG: > priv_frame_ptr = bpf_prog->priv_stack_ptr + orig_stack_depth; > fallthrough; > case PRIV_STACK_SUB_PROG: > stack_depth = 0; > break; > } > > would be easier to read. Will do. > >> + >> arena_vm_start = bpf_arena_get_kern_vm_start(bpf_prog->aux->arena); >> user_vm_start = bpf_arena_get_user_vm_start(bpf_prog->aux->arena); >> >> detect_reg_usage(insn, insn_cnt, callee_regs_used); >> >> - emit_prologue(&prog, bpf_prog->aux->stack_depth, >> + emit_prologue(&prog, stack_depth, >> bpf_prog_was_classic(bpf_prog), tail_call_reachable, >> - bpf_is_subprog(bpf_prog), bpf_prog->aux->exception_cb); >> + bpf_is_subprog(bpf_prog), bpf_prog->aux->exception_cb, >> + bpf_prog->pstack); >> /* Exception callback will clobber callee regs for its own use, and >> * restore the original callee regs from main prog's stack frame. >> */ >> @@ -1454,6 +1499,17 @@ static int do_jit(struct bpf_prog *bpf_prog, int *addrs, u8 *image, u8 *rw_image >> emit_mov_imm64(&prog, X86_REG_R12, >> arena_vm_start >> 32, (u32) arena_vm_start); >> >> + if (bpf_prog->pstack == PSTACK_TREE_ROOT) { >> + emit_private_frame_ptr(&prog, private_frame_ptr); >> + } else if (bpf_prog->pstack == PSTACK_TREE_INTERNAL && orig_stack_depth) { >> + /* r9 += orig_stack_depth */ >> + maybe_emit_1mod(&prog, X86_REG_R9, true); >> + if (is_imm8(orig_stack_depth)) >> + EMIT3(0x83, add_1reg(0xC0, X86_REG_R9), orig_stack_depth); >> + else >> + EMIT2_off32(0x81, add_1reg(0xC0, X86_REG_R9), orig_stack_depth); >> + } > We've been open coding 'add' insn like this for way too long. > Let's address this technical debt now. > Please move > case BPF_ALU | BPF_ADD | BPF_K: > case BPF_ALU | BPF_SUB | BPF_K: > case BPF_ALU | BPF_AND | BPF_K: > case BPF_ALU | BPF_OR | BPF_K: > case BPF_ALU | BPF_XOR | BPF_K: > case BPF_ALU64 | BPF_ADD | BPF_K: > case BPF_ALU64 | BPF_SUB | BPF_K: > case BPF_ALU64 | BPF_AND | BPF_K: > case BPF_ALU64 | BPF_OR | BPF_K: > case BPF_ALU64 | BPF_XOR | BPF_K: > into helpers and use it here. Will do.
On Mon, 30 Sept 2024 at 17:03, Alexei Starovoitov <alexei.starovoitov@gmail.com> wrote: > > On Thu, Sep 26, 2024 at 4:45 PM Yonghong Song <yonghong.song@linux.dev> wrote: > > > > Add jit support for private stack. For a particular subtree, e.g., > > subtree_root <== stack depth 120 > > subprog1 <== stack depth 80 > > subprog2 <== stack depth 40 > > subprog3 <== stack depth 160 > > > > Let us say that private_stack_ptr is the memory address allocated for > > private stack. The frame pointer for each above is calculated like below: > > subtree_root <== subtree_root_fp = private_stack_ptr + 120 > > subprog1 <== subtree_subprog1_fp = subtree_root_fp + 80 > > subprog2 <== subtree_subprog2_fp = subtree_subprog1_fp + 40 > > subprog3 <== subtree_subprog1_fp = subtree_root_fp + 160 > > > > For any function call to helper/kfunc, push/pop prog frame pointer > > is needed in order to preserve frame pointer value. > > > > To deal with exception handling, push/pop frame pointer is also used > > surrounding call to subsequent subprog. For example, > > subtree_root > > subprog1 > > ... > > insn: call bpf_throw > > ... > > > > After jit, we will have > > subtree_root > > insn: push r9 > > subprog1 > > ... > > insn: push r9 > > insn: call bpf_throw > > insn: pop r9 > > ... > > insn: pop r9 > > > > exception_handler > > pop r9 > > ... > > where r9 represents the fp for each subprog. > > Kumar, > please review the interaction of priv_stack with exceptions. > Hm, I think it works fine (because of push_r9 around subprog calls), but I think it's not needed (unless I missed something). The kernel won't care about r9's value, so the only reason pop_r9 is being done in ex_handler is to restore the private stack value? In that case you can just push_r9 once for prog->aux->exception_boundary after emit_private_frame_ptr, since only this main subprog's stack will be reused to run the exception callback. Then keep the pop_r9 as is. And then you don't need to push_r9 and pop_r9 around subprog calls. But do you need to do it? It seems later on it will just be overwritten. Since exception_cb is a PSTACK_TREE_ROOT, you will set its r9 using mov. So it seems all of this may be unnecessary. Let me know if I misunderstood something. ... Another issue that I came across when reading through patches is how this interacts with extension progs. Say right now I have this call chain: main_subprog global_subprog (overriden by ext prog) subprog1 call helper subprog2 global_subprog (which is a separate ext prog attached there using freplace) is not using private stack, but main prog is. So when main_subprog calls into it, it is possible r9 gets overwritten since JIT didn't preserve it for helper calls from the ext prog. When subprog2 is called, this will mean r9 equals garbage? There was a vaguely similar decision to make for exceptions: if we keep unwinding beyond an extension prog frame, we might end up in the main subprog frame that did not push the necessary registers to restore kernel state from exception_cb (because it did not have bpf_throw during verification). So I ended up making the ext prog itself an exception boundary, so unwinding stops there and it would return a result to its caller prog which may or may not use exceptions. In my case, I cannot go and re-JIT old progs to make them exception aware (short of always pushing r12 and all callee regs). But in your case the changes would be contained to ext_prog, so you could just figure that out from the tgt_prog seen in bpf_check_attach_target (i.e. whether it is using priv_stack or not, and if so, extra JIT instrumentation to reuse and push/pop r9 around helper calls is necessary for this ext_prog). > > > > [...]
On Tue, 1 Oct 2024 at 06:31, Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: > > On Mon, 30 Sept 2024 at 17:03, Alexei Starovoitov > <alexei.starovoitov@gmail.com> wrote: > > > > On Thu, Sep 26, 2024 at 4:45 PM Yonghong Song <yonghong.song@linux.dev> wrote: > > > > > > Add jit support for private stack. For a particular subtree, e.g., > > > subtree_root <== stack depth 120 > > > subprog1 <== stack depth 80 > > > subprog2 <== stack depth 40 > > > subprog3 <== stack depth 160 > > > > > > Let us say that private_stack_ptr is the memory address allocated for > > > private stack. The frame pointer for each above is calculated like below: > > > subtree_root <== subtree_root_fp = private_stack_ptr + 120 > > > subprog1 <== subtree_subprog1_fp = subtree_root_fp + 80 > > > subprog2 <== subtree_subprog2_fp = subtree_subprog1_fp + 40 > > > subprog3 <== subtree_subprog1_fp = subtree_root_fp + 160 > > > > > > For any function call to helper/kfunc, push/pop prog frame pointer > > > is needed in order to preserve frame pointer value. > > > > > > To deal with exception handling, push/pop frame pointer is also used > > > surrounding call to subsequent subprog. For example, > > > subtree_root > > > subprog1 > > > ... > > > insn: call bpf_throw > > > ... > > > > > > After jit, we will have > > > subtree_root > > > insn: push r9 > > > subprog1 > > > ... > > > insn: push r9 > > > insn: call bpf_throw > > > insn: pop r9 > > > ... > > > insn: pop r9 > > > > > > exception_handler > > > pop r9 > > > ... > > > where r9 represents the fp for each subprog. > > > > Kumar, > > please review the interaction of priv_stack with exceptions. > > > > Hm, I think it works fine (because of push_r9 around subprog calls), > but I think it's not needed (unless I missed something). > > The kernel won't care about r9's value, so the only reason pop_r9 is > being done in ex_handler is to restore the private stack value? > In that case you can just push_r9 once for > prog->aux->exception_boundary after emit_private_frame_ptr, since only > this main subprog's stack will be reused to run the exception > callback. Then keep the pop_r9 as is. And then you don't need to > push_r9 and pop_r9 around subprog calls. > > But do you need to do it? It seems later on it will just be overwritten. > Since exception_cb is a PSTACK_TREE_ROOT, you will set its r9 using mov. > > So it seems all of this may be unnecessary. > > Let me know if I misunderstood something. > > ... > > Another issue that I came across when reading through patches is how > this interacts with extension progs. > Say right now I have this call chain: > > main_subprog > global_subprog (overriden by ext prog) > subprog1 > call helper > subprog2 > > global_subprog (which is a separate ext prog attached there using > freplace) is not using private stack, but main prog is. > So when main_subprog calls into it, it is possible r9 gets overwritten > since JIT didn't preserve it for helper calls from the ext prog. > > When subprog2 is called, this will mean r9 equals garbage? > > There was a vaguely similar decision to make for exceptions: if we > keep unwinding beyond an extension prog frame, we might end up in the > main subprog frame that did not push the necessary registers to > restore kernel state from exception_cb (because it did not have > bpf_throw during verification). So I ended up making the ext prog > itself an exception boundary, so unwinding stops there and it would > return a result to its caller prog which may or may not use > exceptions. > > In my case, I cannot go and re-JIT old progs to make them exception > aware (short of always pushing r12 and all callee regs). > But in your case the changes would be contained to ext_prog, so you > could just figure that out from the tgt_prog seen in > bpf_check_attach_target (i.e. whether it is using priv_stack or not, > and if so, extra JIT instrumentation to reuse and push/pop r9 around > helper calls is necessary for this ext_prog). > Oh, on second thought: I guess the second issue is not a problem (yet) because you always push and pop r9 around subprog calls. But say you dropped that (if the earlier comment is correct about it being unnecessary for exceptions), then such a case would surface. > > > > > > [...]
On Mon, Sep 30, 2024 at 9:38 PM Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: > > On Tue, 1 Oct 2024 at 06:31, Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: > > > > On Mon, 30 Sept 2024 at 17:03, Alexei Starovoitov > > <alexei.starovoitov@gmail.com> wrote: > > > > > > On Thu, Sep 26, 2024 at 4:45 PM Yonghong Song <yonghong.song@linux.dev> wrote: > > > > > > > > Add jit support for private stack. For a particular subtree, e.g., > > > > subtree_root <== stack depth 120 > > > > subprog1 <== stack depth 80 > > > > subprog2 <== stack depth 40 > > > > subprog3 <== stack depth 160 > > > > > > > > Let us say that private_stack_ptr is the memory address allocated for > > > > private stack. The frame pointer for each above is calculated like below: > > > > subtree_root <== subtree_root_fp = private_stack_ptr + 120 > > > > subprog1 <== subtree_subprog1_fp = subtree_root_fp + 80 > > > > subprog2 <== subtree_subprog2_fp = subtree_subprog1_fp + 40 > > > > subprog3 <== subtree_subprog1_fp = subtree_root_fp + 160 > > > > > > > > For any function call to helper/kfunc, push/pop prog frame pointer > > > > is needed in order to preserve frame pointer value. > > > > > > > > To deal with exception handling, push/pop frame pointer is also used > > > > surrounding call to subsequent subprog. For example, > > > > subtree_root > > > > subprog1 > > > > ... > > > > insn: call bpf_throw > > > > ... > > > > > > > > After jit, we will have > > > > subtree_root > > > > insn: push r9 > > > > subprog1 > > > > ... > > > > insn: push r9 > > > > insn: call bpf_throw > > > > insn: pop r9 > > > > ... > > > > insn: pop r9 > > > > > > > > exception_handler > > > > pop r9 > > > > ... > > > > where r9 represents the fp for each subprog. > > > > > > Kumar, > > > please review the interaction of priv_stack with exceptions. > > > > > > > Hm, I think it works fine (because of push_r9 around subprog calls), > > but I think it's not needed (unless I missed something). > > > > The kernel won't care about r9's value, so the only reason pop_r9 is > > being done in ex_handler is to restore the private stack value? > > In that case you can just push_r9 once for > > prog->aux->exception_boundary after emit_private_frame_ptr, since only > > this main subprog's stack will be reused to run the exception > > callback. Then keep the pop_r9 as is. And then you don't need to > > push_r9 and pop_r9 around subprog calls. > > > > But do you need to do it? It seems later on it will just be overwritten. > > Since exception_cb is a PSTACK_TREE_ROOT, you will set its r9 using mov. > > > > So it seems all of this may be unnecessary. > > > > Let me know if I misunderstood something. > > > > ... > > > > Another issue that I came across when reading through patches is how > > this interacts with extension progs. > > Say right now I have this call chain: > > > > main_subprog > > global_subprog (overriden by ext prog) > > subprog1 > > call helper > > subprog2 > > > > global_subprog (which is a separate ext prog attached there using > > freplace) is not using private stack, but main prog is. > > So when main_subprog calls into it, it is possible r9 gets overwritten > > since JIT didn't preserve it for helper calls from the ext prog. > > > > When subprog2 is called, this will mean r9 equals garbage? > > > > There was a vaguely similar decision to make for exceptions: if we > > keep unwinding beyond an extension prog frame, we might end up in the > > main subprog frame that did not push the necessary registers to > > restore kernel state from exception_cb (because it did not have > > bpf_throw during verification). So I ended up making the ext prog > > itself an exception boundary, so unwinding stops there and it would > > return a result to its caller prog which may or may not use > > exceptions. > > > > In my case, I cannot go and re-JIT old progs to make them exception > > aware (short of always pushing r12 and all callee regs). > > But in your case the changes would be contained to ext_prog, so you > > could just figure that out from the tgt_prog seen in > > bpf_check_attach_target (i.e. whether it is using priv_stack or not, > > and if so, extra JIT instrumentation to reuse and push/pop r9 around > > helper calls is necessary for this ext_prog). > > > > Oh, on second thought: > I guess the second issue is not a problem (yet) because you always push > and pop r9 around subprog calls. > But say you dropped that (if the earlier comment is correct about it > being unnecessary for exceptions), then such a case would surface. ... > push_r9 and pop_r9 around subprog calls. I don't see how you can avoid that. subprog will adjust r9, so the main prog needs to go back to its r9 value after subprog finishes. So it's either push/pop around subprogs or subprog has to r9 += sz in the prologue and r9 -= sz in the epilogue. while keeping r9 intact for the duration. It would still need to push/pop around kfuncs/helpers, since the kernel might use it. imo push/pop around every call is easier to reason about.
Another idea... Currently the prologue looks like: push rbp mov rbp, rsp sub rsp, stack_depth how about in the main prog we keep the first two insns, but then set rsp with a single insn to point to the top of our private stack that should have enough room for stack_of_main_prog + stacks_of_all_subprogs + extra 8k for kfuncs/helpers. The prologue of all subprogs will stay as-is with above 3 insns. The epilogue is the same in main prog and subprogs: leave + ret. Such stack will look like a typical split stack used in compilers. The obvious advantage is we don't need to touch r9, do push/pop, and stack unwind will work just fine. In the past we discussed something like this, but then we did all 3 insns in the private stack and it was problematic due to IRQs. In this approach the main prog will use up to 512 bytes of kernel stack, but everything that it calls will be in the private stack, and since it doesn't migrate there is no per-cpu memory reuse issue. Thoughts?
On Tue, 1 Oct 2024 at 21:53, Alexei Starovoitov <alexei.starovoitov@gmail.com> wrote: > > Another idea... > Thanks for explaining why push/pop is still necessary. I agree then it seems it cannot be avoided. > Currently the prologue looks like: > push rbp > mov rbp, rsp > sub rsp, stack_depth > > how about in the main prog we keep the first two insns, > but then set rsp with a single insn to point to the top > of our private stack that should have enough room > for stack_of_main_prog + stacks_of_all_subprogs + extra 8k for kfuncs/helpers. > > The prologue of all subprogs will stay as-is with above 3 insns. > The epilogue is the same in main prog and subprogs: leave + ret. > > Such stack will look like a typical split stack used in compilers. > > The obvious advantage is we don't need to touch r9, do push/pop, > and stack unwind will work just fine. > In the past we discussed something like this, but > then we did all 3 insns in the private stack > and it was problematic due to IRQs. > In this approach the main prog will use up to 512 bytes of > kernel stack, but everything that it calls will be in the private stack, > and since it doesn't migrate there is no per-cpu memory reuse issue. > I think this is much better, but I'm wondering how the hierarchical scheduling case will occur in reality. Will it be the main prog invoking a kfunc, that in turn invokes another prog, which can do the same thing again? If so, the lack of using a private stack for main prog would be a problem, right? Because effectively if we don't call into subprogs we don't use the private stack at all, and all invocations share the same kernel stack, which brings us back to the current state. Instead can we set rbp to point to the top of the private stack in the main prog itself? > Thoughts?
On Tue, Oct 1, 2024 at 1:51 PM Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: > > On Tue, 1 Oct 2024 at 21:53, Alexei Starovoitov > <alexei.starovoitov@gmail.com> wrote: > > > > Another idea... > > > > Thanks for explaining why push/pop is still necessary. I agree then it > seems it cannot be avoided. > > > Currently the prologue looks like: > > push rbp > > mov rbp, rsp > > sub rsp, stack_depth > > > > how about in the main prog we keep the first two insns, > > but then set rsp with a single insn to point to the top > > of our private stack that should have enough room > > for stack_of_main_prog + stacks_of_all_subprogs + extra 8k for kfuncs/helpers. > > > > The prologue of all subprogs will stay as-is with above 3 insns. > > The epilogue is the same in main prog and subprogs: leave + ret. > > > > Such stack will look like a typical split stack used in compilers. > > > > The obvious advantage is we don't need to touch r9, do push/pop, > > and stack unwind will work just fine. > > In the past we discussed something like this, but > > then we did all 3 insns in the private stack > > and it was problematic due to IRQs. > > In this approach the main prog will use up to 512 bytes of > > kernel stack, but everything that it calls will be in the private stack, > > and since it doesn't migrate there is no per-cpu memory reuse issue. > > > > I think this is much better, but I'm wondering how the hierarchical > scheduling case will occur in reality. > > Will it be the main prog invoking a kfunc, that in turn invokes > another prog, which can do the same thing again? I believe that's the plan. > If so, the lack of using a private stack for main prog would be a > problem, right? Because effectively if we don't call into subprogs we > don't use the private stack at all, and all invocations share the same > kernel stack, which brings us back to the current state. Not quite. With the above proposal anything that the main prog calls (kfuncs, helpers, subprogs) will be using private stack prepared by that main prog. Then another 'struct bpf_prog' called from kfunc will use the stack prepared by the main prog and that 2nd main prog will prepare another priv stack for everything that 2nd main prog calls. So we can allow arbitrary depth. The only problem if the same 'struct bpf_prog' is called recursively (since it will use the same priv stack), but that issue we avoid with per prog recursion counter. So I think this proposal should work for all prog types except those where bpf_prog_check_recur() returns false. I think we can make it work with a special __bpf_prog_enter_limited_recur() that does this_cpu_inc_return(*(prog->active) and allows limited recursion (up to 4 ?) and then sets %rsp on entry to a different slot in preallocated private stack based on prog->active value. > Instead can we set rbp to point to the top of the private stack in the > main prog itself? we cannot change both %rsp and %rbp atomically, so setting rsp and then adjusting rbp will break stack unwind. After 'mov %rsp, priv_stack_addr' we can do 2nd pair of push rbp mov rbp, rsp sub rsp, stack_size so that even the main prog will use the priv stack, but I'm not sure how unwinder will deal with that. So I would let the main prog use the kernel stack.
On Tue, 1 Oct 2024 at 23:28, Alexei Starovoitov <alexei.starovoitov@gmail.com> wrote: > > On Tue, Oct 1, 2024 at 1:51 PM Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: > > > > On Tue, 1 Oct 2024 at 21:53, Alexei Starovoitov > > <alexei.starovoitov@gmail.com> wrote: > > > > > > Another idea... > > > > > > > Thanks for explaining why push/pop is still necessary. I agree then it > > seems it cannot be avoided. > > > > > Currently the prologue looks like: > > > push rbp > > > mov rbp, rsp > > > sub rsp, stack_depth > > > > > > how about in the main prog we keep the first two insns, > > > but then set rsp with a single insn to point to the top > > > of our private stack that should have enough room > > > for stack_of_main_prog + stacks_of_all_subprogs + extra 8k for kfuncs/helpers. > > > > > > The prologue of all subprogs will stay as-is with above 3 insns. > > > The epilogue is the same in main prog and subprogs: leave + ret. > > > > > > Such stack will look like a typical split stack used in compilers. > > > > > > The obvious advantage is we don't need to touch r9, do push/pop, > > > and stack unwind will work just fine. > > > In the past we discussed something like this, but > > > then we did all 3 insns in the private stack > > > and it was problematic due to IRQs. > > > In this approach the main prog will use up to 512 bytes of > > > kernel stack, but everything that it calls will be in the private stack, > > > and since it doesn't migrate there is no per-cpu memory reuse issue. > > > > > > > I think this is much better, but I'm wondering how the hierarchical > > scheduling case will occur in reality. > > > > Will it be the main prog invoking a kfunc, that in turn invokes > > another prog, which can do the same thing again? > > I believe that's the plan. > > > If so, the lack of using a private stack for main prog would be a > > problem, right? Because effectively if we don't call into subprogs we > > don't use the private stack at all, and all invocations share the same > > kernel stack, which brings us back to the current state. > > Not quite. With the above proposal anything that the main prog > calls (kfuncs, helpers, subprogs) will be using private stack > prepared by that main prog. > Then another 'struct bpf_prog' called from kfunc will use > the stack prepared by the main prog and that 2nd main prog > will prepare another priv stack for everything that 2nd main prog calls. > So we can allow arbitrary depth. > The only problem if the same 'struct bpf_prog' is called > recursively (since it will use the same priv stack), > but that issue we avoid with per prog recursion counter. > So I think this proposal should work for all prog types > except those where bpf_prog_check_recur() returns false. > > I think we can make it work with a special > __bpf_prog_enter_limited_recur() > that does this_cpu_inc_return(*(prog->active) and allows > limited recursion (up to 4 ?) and then sets %rsp on entry > to a different slot in preallocated private stack > based on prog->active value. Makes sense, though will we have cases where hierarchical scheduling attaches the same prog at different points of the hierarchy? Then the limit of 4 may not be enough (e.g. say with cgroup nested levels > 4). It might be that all non-leaf progs simply call into the successor prog until the leaf is hit and the actual logic kicks in. Then it could all be the same progs while walking down the hierarchy until a different prog is called for the leaf. > > > Instead can we set rbp to point to the top of the private stack in the > > main prog itself? > > we cannot change both %rsp and %rbp atomically, > so setting rsp and then adjusting rbp will break stack unwind. > After 'mov %rsp, priv_stack_addr' we can do 2nd pair of > push rbp > mov rbp, rsp > sub rsp, stack_size > so that even the main prog will use the priv stack, but > I'm not sure how unwinder will deal with that. > So I would let the main prog use the kernel stack. Ack. I think letting the main subprog use the kernel stack as you propose is fine.
On Tue, Oct 1, 2024 at 5:23 PM Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: > > Makes sense, though will we have cases where hierarchical scheduling > attaches the same prog at different points of the hierarchy? I'm not sure anyone was asking for such a use case. > Then the > limit of 4 may not be enough (e.g. say with cgroup nested levels > 4). Well, 4 was the number from TJ. Anyway the proposed pseudo code: __bpf_prog_enter_recur_limited() { cnt = this_cpu_inc_return(*(prog->active)); if (cnt > 4) { inc_miss return 0; } // pass cnt into bpf prog somehow, like %rdx ? // or re-read prog->active from prog } then in the prologue emit: push rbp mov rbp, rsp if %rdx == 1 // main prog is called for the first time mov rsp, pcpu_priv_stack_top else // 2+nd time main prog is called or 1+ time subprog sub rsp, stack_size if rsp < pcpu_priv_stack_bottom goto exit // stack is too small, exit fi Since stack bottom/top are known at JIT time we can generate reliable stack overflow checks. Much better than guard pages and -fstack-protector. The prog can alloc percpu (stack size of main prog + subprogs + extra) * 4 and it likely will be enough. If not, the stack protection will gently exit the prog when the stack is too deep. kfunc won't have such a check, so we need a buffer zone. Can have a guard page too, but feels like overkill.
On Wed, 2 Oct 2024 at 03:26, Alexei Starovoitov <alexei.starovoitov@gmail.com> wrote: > > On Tue, Oct 1, 2024 at 5:23 PM Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: > > > > Makes sense, though will we have cases where hierarchical scheduling > > attaches the same prog at different points of the hierarchy? > > I'm not sure anyone was asking for such a use case. I wondered because why would you then need a limit of 4 (say instead of disallowing it)? > > > Then the > > limit of 4 may not be enough (e.g. say with cgroup nested levels > 4). > > Well, 4 was the number from TJ. > Ok, then let's assume 4 would be enough. > Anyway the proposed pseudo code: > > __bpf_prog_enter_recur_limited() > { > cnt = this_cpu_inc_return(*(prog->active)); > if (cnt > 4) { > inc_miss > return 0; > } > // pass cnt into bpf prog somehow, like %rdx ? > // or re-read prog->active from prog > } > > > then in the prologue emit: > > push rbp > mov rbp, rsp > if %rdx == 1 > // main prog is called for the first time > mov rsp, pcpu_priv_stack_top > else > // 2+nd time main prog is called or 1+ time subprog > sub rsp, stack_size > if rsp < pcpu_priv_stack_bottom > goto exit // stack is too small, exit > fi I think we need just the second part for subprogs, right? Since rdx is R3 (arg into subprog). I guess that's what you meant in the pseudocode. But otherwise sounds good. The benefit with stack probing is we don't exactly limit to 4 cases. Another option instead of the branch in main prog is to divide in 4 slots (as you said before) and choose the slot based on cnt. But then we're stuck with a max limit of 4. Since we're allocating stack size of bpf + extra (which I guess is 8K?). rdx can be used to pass in the priv_stack address of the right slot. So I think the probing version seems better. We can probably pass in rdx = priv_stack and then test and cmov instead for main prog. > > Since stack bottom/top are known at JIT time we can > generate reliable stack overflow checks. > Much better than guard pages and -fstack-protector. > The prog can alloc percpu > (stack size of main prog + subprogs + extra) * 4 extra will be 8K, I guess (same as kernel stack size)? Just confirming. > and it likely will be enough. > If not, the stack protection will gently exit the prog > when the stack is too deep. I like this stack probing version, since there's no hard limit on the number of recursions, and it's safe against stack overflow as well. > kfunc won't have such a check, so we need a buffer zone. > Can have a guard page too, but feels like overkill. I was leaning toward saying yes for a guard page, since we'll atleast have a hard error instead of random corruption if the kfunc goes beyond the bottom after probing succeeds. But the better way might be doing if rsp < pcpu_priv_stack_bottom + 8K, so we leave max headroom we reserve for kernel stuff (or say add 4K instead, which should be good enough), and then skip execution.
On 10/1/24 7:16 PM, Kumar Kartikeya Dwivedi wrote: > On Wed, 2 Oct 2024 at 03:26, Alexei Starovoitov > <alexei.starovoitov@gmail.com> wrote: >> On Tue, Oct 1, 2024 at 5:23 PM Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: >>> Makes sense, though will we have cases where hierarchical scheduling >>> attaches the same prog at different points of the hierarchy? >> I'm not sure anyone was asking for such a use case. > I wondered because why would you then need a limit of 4 (say instead > of disallowing it)? > >>> Then the >>> limit of 4 may not be enough (e.g. say with cgroup nested levels > 4). >> Well, 4 was the number from TJ. >> > Ok, then let's assume 4 would be enough. > >> Anyway the proposed pseudo code: >> >> __bpf_prog_enter_recur_limited() >> { >> cnt = this_cpu_inc_return(*(prog->active)); >> if (cnt > 4) { >> inc_miss >> return 0; >> } >> // pass cnt into bpf prog somehow, like %rdx ? >> // or re-read prog->active from prog >> } >> >> >> then in the prologue emit: >> >> push rbp >> mov rbp, rsp >> if %rdx == 1 >> // main prog is called for the first time >> mov rsp, pcpu_priv_stack_top This sounds good in high level. I still need to figure out 'if %rdx == 1' part and how to implement this. >> else >> // 2+nd time main prog is called or 1+ time subprog >> sub rsp, stack_size >> if rsp < pcpu_priv_stack_bottom >> goto exit // stack is too small, exit >> fi > I think we need just the second part for subprogs, right? > Since rdx is R3 (arg into subprog). > I guess that's what you meant in the pseudocode. > But otherwise sounds good. > The benefit with stack probing is we don't exactly limit to 4 cases. > > Another option instead of the branch in main prog is to divide in 4 > slots (as you said before) and choose the slot based on cnt. > But then we're stuck with a max limit of 4. Since we're allocating > stack size of bpf + extra (which I guess is 8K?). rdx can be used to > pass in the priv_stack address of the right slot. > > So I think the probing version seems better. We can probably pass in > rdx = priv_stack and then test and cmov instead for main prog. Yes, we do not need to limit to 4, checking rsp < pcpu_priv_stack_bottom should be okay. > >> Since stack bottom/top are known at JIT time we can >> generate reliable stack overflow checks. >> Much better than guard pages and -fstack-protector. >> The prog can alloc percpu >> (stack size of main prog + subprogs + extra) * 4 > extra will be 8K, I guess (same as kernel stack size)? > Just confirming. > >> and it likely will be enough. >> If not, the stack protection will gently exit the prog >> when the stack is too deep. > I like this stack probing version, since there's no hard limit on the > number of recursions, and it's safe against stack overflow as well. > >> kfunc won't have such a check, so we need a buffer zone. >> Can have a guard page too, but feels like overkill. > I was leaning toward saying yes for a guard page, since we'll atleast > have a hard error instead of random corruption if the kfunc goes > beyond the bottom after probing succeeds. > > But the better way might be doing if rsp < pcpu_priv_stack_bottom + > 8K, so we leave max headroom we reserve for kernel stuff (or say add > 4K instead, which should be good enough), and then skip execution.
On 10/1/24 11:28 PM, Yonghong Song wrote: > > On 10/1/24 7:16 PM, Kumar Kartikeya Dwivedi wrote: >> On Wed, 2 Oct 2024 at 03:26, Alexei Starovoitov >> <alexei.starovoitov@gmail.com> wrote: >>> On Tue, Oct 1, 2024 at 5:23 PM Kumar Kartikeya Dwivedi >>> <memxor@gmail.com> wrote: >>>> Makes sense, though will we have cases where hierarchical scheduling >>>> attaches the same prog at different points of the hierarchy? >>> I'm not sure anyone was asking for such a use case. >> I wondered because why would you then need a limit of 4 (say instead >> of disallowing it)? >> >>>> Then the >>>> limit of 4 may not be enough (e.g. say with cgroup nested levels > 4). >>> Well, 4 was the number from TJ. >>> >> Ok, then let's assume 4 would be enough. >> >>> Anyway the proposed pseudo code: >>> >>> __bpf_prog_enter_recur_limited() >>> { >>> cnt = this_cpu_inc_return(*(prog->active)); >>> if (cnt > 4) { >>> inc_miss >>> return 0; >>> } >>> // pass cnt into bpf prog somehow, like %rdx ? >>> // or re-read prog->active from prog >>> } >>> >>> >>> then in the prologue emit: >>> >>> push rbp >>> mov rbp, rsp >>> if %rdx == 1 >>> // main prog is called for the first time >>> mov rsp, pcpu_priv_stack_top > > This sounds good in high level. I still need to figure out > 'if %rdx == 1' part and how to implement this. Okay, looks like trampoline could supply rdx == 1. > >>> else >>> // 2+nd time main prog is called or 1+ time subprog >>> sub rsp, stack_size >>> if rsp < pcpu_priv_stack_bottom >>> goto exit // stack is too small, exit >>> fi >> I think we need just the second part for subprogs, right? >> Since rdx is R3 (arg into subprog). >> I guess that's what you meant in the pseudocode. >> But otherwise sounds good. >> The benefit with stack probing is we don't exactly limit to 4 cases. >> >> Another option instead of the branch in main prog is to divide in 4 >> slots (as you said before) and choose the slot based on cnt. >> But then we're stuck with a max limit of 4. Since we're allocating >> stack size of bpf + extra (which I guess is 8K?). rdx can be used to >> pass in the priv_stack address of the right slot. >> >> So I think the probing version seems better. We can probably pass in >> rdx = priv_stack and then test and cmov instead for main prog. > > Yes, we do not need to limit to 4, checking rsp < pcpu_priv_stack_bottom > should be okay. > >> >>> Since stack bottom/top are known at JIT time we can >>> generate reliable stack overflow checks. >>> Much better than guard pages and -fstack-protector. >>> The prog can alloc percpu >>> (stack size of main prog + subprogs + extra) * 4 >> extra will be 8K, I guess (same as kernel stack size)? >> Just confirming. >> >>> and it likely will be enough. >>> If not, the stack protection will gently exit the prog >>> when the stack is too deep. >> I like this stack probing version, since there's no hard limit on the >> number of recursions, and it's safe against stack overflow as well. >> >>> kfunc won't have such a check, so we need a buffer zone. >>> Can have a guard page too, but feels like overkill. >> I was leaning toward saying yes for a guard page, since we'll atleast >> have a hard error instead of random corruption if the kfunc goes >> beyond the bottom after probing succeeds. >> >> But the better way might be doing if rsp < pcpu_priv_stack_bottom + >> 8K, so we leave max headroom we reserve for kernel stuff (or say add >> 4K instead, which should be good enough), and then skip execution. >
On 10/1/24 6:26 PM, Alexei Starovoitov wrote: > On Tue, Oct 1, 2024 at 5:23 PM Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: >> Makes sense, though will we have cases where hierarchical scheduling >> attaches the same prog at different points of the hierarchy? > I'm not sure anyone was asking for such a use case. > >> Then the >> limit of 4 may not be enough (e.g. say with cgroup nested levels > 4). > Well, 4 was the number from TJ. > > Anyway the proposed pseudo code: > > __bpf_prog_enter_recur_limited() > { > cnt = this_cpu_inc_return(*(prog->active)); > if (cnt > 4) { > inc_miss > return 0; > } > // pass cnt into bpf prog somehow, like %rdx ? > // or re-read prog->active from prog > } > > > then in the prologue emit: > > push rbp > mov rbp, rsp > if %rdx == 1 > // main prog is called for the first time > mov rsp, pcpu_priv_stack_top > else > // 2+nd time main prog is called or 1+ time subprog > sub rsp, stack_size > if rsp < pcpu_priv_stack_bottom > goto exit // stack is too small, exit > fi I have tried to implement this approach (not handling recursion yet) based on the above approach. It works okay with nested bpf subprogs like main prog // set rsp = pcpu_priv_stack_top subprog1 // some stack subprog2 // some stack The pcpu_priv_stack is allocated like priv_stack_ptr = __alloc_percpu_gfp(1024 * 16, 8, GFP_KERNEL); But whenever the prog called an external function, e.g. a helper in this case, I will get a double fault. An example could be main prog // set rsp = pcpu_priv_stack_top subprog1 // some stack subprog2 // some stack call bpf_seq_printf (I modified bpf_iter_ipv6_route.c bpf prog for the above purpose.) I added some printk statements from the beginning of bpf_seq_printf and nothing printed out either and of course traps still happens. I tried another example without subprog and the mainprog calls a helper and the same double traps happens below too. The error log looks like [ 54.024955] traps: PANIC: double fault, error_code: 0x0 [ 54.024969] Oops: double fault: 0000 [#1] PREEMPT SMP KASAN PTI [ 54.024977] CPU: 3 UID: 0 PID: 1946 Comm: test_progs Tainted: G OE 6.11.0-10577-gf25c172fd840-dirty #968 [ 54.024982] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE [ 54.024983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 54.024986] RIP: 0010:error_entry+0x1e/0x140 [ 54.024996] Code: ff ff 90 90 90 90 90 90 90 90 90 90 56 48 8b 74 24 08 48 89 7c 24 08 52 51 50 41 50 41 51 41 52 41 53 53 55 41 54 41 55 41 56 <41> 57 56 31 f6 31 d1 [ 54.024999] RSP: 0018:ffffe8ffff580000 EFLAGS: 00010806 [ 54.025002] RAX: f3f3f300f1f1f1f1 RBX: fffff91fffeb0044 RCX: ffffffff84201701 [ 54.025005] RDX: fffff91fffeb0044 RSI: ffffffff8420128d RDI: ffffe8ffff580178 [ 54.025007] RBP: ffffe8ffff580140 R08: 0000000000000000 R09: 0000000000000000 [ 54.025009] R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 [ 54.025010] R13: 1ffffd1fffeb0014 R14: 0000000000000003 R15: ffffe8ffff580178 [ 54.025012] FS: 00007fd076525d00(0000) GS:ffff8881f7180000(0000) knlGS:0000000000000000 [ 54.025015] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 54.025017] CR2: ffffe8ffff57fff8 CR3: 000000010cd80002 CR4: 0000000000370ef0 [ 54.025021] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 54.025022] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 54.025024] Call Trace: [ 54.025026] <#DF> [ 54.025028] ? __die_body+0xaf/0xc0 [ 54.025032] ? die+0x2f/0x50 [ 54.025036] ? exc_double_fault+0x73/0x80 [ 54.025040] ? asm_exc_double_fault+0x23/0x30 [ 54.025044] ? common_interrupt_return+0xb1/0xcc [ 54.025048] ? asm_exc_page_fault+0xd/0x30 [ 54.025051] ? error_entry+0x1e/0x140 [ 54.025055] </#DF> [ 54.025056] Modules linked in: bpf_testmod(OE) [ 54.025061] ---[ end trace 0000000000000000 ]--- Maybe somebody could give a hint why I got a double fault when calling external functions (outside of bpf programs) with allocated stack? > > Since stack bottom/top are known at JIT time we can > generate reliable stack overflow checks. > Much better than guard pages and -fstack-protector. > The prog can alloc percpu > (stack size of main prog + subprogs + extra) * 4 > and it likely will be enough. > If not, the stack protection will gently exit the prog > when the stack is too deep. > kfunc won't have such a check, so we need a buffer zone. > Can have a guard page too, but feels like overkill.
On Thu, 3 Oct 2024 at 08:17, Yonghong Song <yonghong.song@linux.dev> wrote: > > > On 10/1/24 6:26 PM, Alexei Starovoitov wrote: > > On Tue, Oct 1, 2024 at 5:23 PM Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: > >> Makes sense, though will we have cases where hierarchical scheduling > >> attaches the same prog at different points of the hierarchy? > > I'm not sure anyone was asking for such a use case. > > > >> Then the > >> limit of 4 may not be enough (e.g. say with cgroup nested levels > 4). > > Well, 4 was the number from TJ. > > > > Anyway the proposed pseudo code: > > > > __bpf_prog_enter_recur_limited() > > { > > cnt = this_cpu_inc_return(*(prog->active)); > > if (cnt > 4) { > > inc_miss > > return 0; > > } > > // pass cnt into bpf prog somehow, like %rdx ? > > // or re-read prog->active from prog > > } > > > > > > then in the prologue emit: > > > > push rbp > > mov rbp, rsp > > if %rdx == 1 > > // main prog is called for the first time > > mov rsp, pcpu_priv_stack_top > > else > > // 2+nd time main prog is called or 1+ time subprog > > sub rsp, stack_size > > if rsp < pcpu_priv_stack_bottom > > goto exit // stack is too small, exit > > fi > > I have tried to implement this approach (not handling > recursion yet) based on the above approach. It works > okay with nested bpf subprogs like > main prog // set rsp = pcpu_priv_stack_top > subprog1 // some stack > subprog2 // some stack > > The pcpu_priv_stack is allocated like > priv_stack_ptr = __alloc_percpu_gfp(1024 * 16, 8, GFP_KERNEL); > > But whenever the prog called an external function, > e.g. a helper in this case, I will get a double fault. > An example could be > main prog // set rsp = pcpu_priv_stack_top > subprog1 // some stack > subprog2 // some stack > call bpf_seq_printf > (I modified bpf_iter_ipv6_route.c bpf prog for the above > purpose.) > I added some printk statements from the beginning of bpf_seq_printf and > nothing printed out either and of course traps still happens. > > I tried another example without subprog and the mainprog calls > a helper and the same double traps happens below too. > > The error log looks like > > [ 54.024955] traps: PANIC: double fault, error_code: 0x0 > [ 54.024969] Oops: double fault: 0000 [#1] PREEMPT SMP KASAN PTI > [ 54.024977] CPU: 3 UID: 0 PID: 1946 Comm: test_progs Tainted: G OE 6.11.0-10577-gf25c172fd840-dirty #968 > [ 54.024982] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE > [ 54.024983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 > [ 54.024986] RIP: 0010:error_entry+0x1e/0x140 > [ 54.024996] Code: ff ff 90 90 90 90 90 90 90 90 90 90 56 48 8b 74 24 08 48 89 7c 24 08 52 51 50 41 50 41 51 41 52 41 53 53 55 41 54 41 55 41 56 <41> 57 56 31 f6 31 d1 > [ 54.024999] RSP: 0018:ffffe8ffff580000 EFLAGS: 00010806 > [ 54.025002] RAX: f3f3f300f1f1f1f1 RBX: fffff91fffeb0044 RCX: ffffffff84201701 > [ 54.025005] RDX: fffff91fffeb0044 RSI: ffffffff8420128d RDI: ffffe8ffff580178 > [ 54.025007] RBP: ffffe8ffff580140 R08: 0000000000000000 R09: 0000000000000000 > [ 54.025009] R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 > [ 54.025010] R13: 1ffffd1fffeb0014 R14: 0000000000000003 R15: ffffe8ffff580178 > [ 54.025012] FS: 00007fd076525d00(0000) GS:ffff8881f7180000(0000) knlGS:0000000000000000 > [ 54.025015] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > [ 54.025017] CR2: ffffe8ffff57fff8 CR3: 000000010cd80002 CR4: 0000000000370ef0 > [ 54.025021] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > [ 54.025022] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > [ 54.025024] Call Trace: > [ 54.025026] <#DF> > [ 54.025028] ? __die_body+0xaf/0xc0 > [ 54.025032] ? die+0x2f/0x50 > [ 54.025036] ? exc_double_fault+0x73/0x80 > [ 54.025040] ? asm_exc_double_fault+0x23/0x30 > [ 54.025044] ? common_interrupt_return+0xb1/0xcc > [ 54.025048] ? asm_exc_page_fault+0xd/0x30 > [ 54.025051] ? error_entry+0x1e/0x140 > [ 54.025055] </#DF> > [ 54.025056] Modules linked in: bpf_testmod(OE) > [ 54.025061] ---[ end trace 0000000000000000 ]--- > > Maybe somebody could give a hint why I got a double fault > when calling external functions (outside of bpf programs) > with allocated stack? > I will help in debugging. Can you share the patch you applied locally so I can reproduce? > > > > Since stack bottom/top are known at JIT time we can > > generate reliable stack overflow checks. > > Much better than guard pages and -fstack-protector. > > The prog can alloc percpu > > (stack size of main prog + subprogs + extra) * 4 > > and it likely will be enough. > > If not, the stack protection will gently exit the prog > > when the stack is too deep. > > kfunc won't have such a check, so we need a buffer zone. > > Can have a guard page too, but feels like overkill.
On Thu, Oct 3, 2024 at 6:40 AM Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: > > On Thu, 3 Oct 2024 at 08:17, Yonghong Song <yonghong.song@linux.dev> wrote: > > > > > > On 10/1/24 6:26 PM, Alexei Starovoitov wrote: > > > On Tue, Oct 1, 2024 at 5:23 PM Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: > > >> Makes sense, though will we have cases where hierarchical scheduling > > >> attaches the same prog at different points of the hierarchy? > > > I'm not sure anyone was asking for such a use case. > > > > > >> Then the > > >> limit of 4 may not be enough (e.g. say with cgroup nested levels > 4). > > > Well, 4 was the number from TJ. > > > > > > Anyway the proposed pseudo code: > > > > > > __bpf_prog_enter_recur_limited() > > > { > > > cnt = this_cpu_inc_return(*(prog->active)); > > > if (cnt > 4) { > > > inc_miss > > > return 0; > > > } > > > // pass cnt into bpf prog somehow, like %rdx ? > > > // or re-read prog->active from prog > > > } > > > > > > > > > then in the prologue emit: > > > > > > push rbp > > > mov rbp, rsp > > > if %rdx == 1 > > > // main prog is called for the first time > > > mov rsp, pcpu_priv_stack_top > > > else > > > // 2+nd time main prog is called or 1+ time subprog > > > sub rsp, stack_size > > > if rsp < pcpu_priv_stack_bottom > > > goto exit // stack is too small, exit > > > fi > > > > I have tried to implement this approach (not handling > > recursion yet) based on the above approach. It works > > okay with nested bpf subprogs like > > main prog // set rsp = pcpu_priv_stack_top > > subprog1 // some stack > > subprog2 // some stack > > > > The pcpu_priv_stack is allocated like > > priv_stack_ptr = __alloc_percpu_gfp(1024 * 16, 8, GFP_KERNEL); > > > > But whenever the prog called an external function, > > e.g. a helper in this case, I will get a double fault. > > An example could be > > main prog // set rsp = pcpu_priv_stack_top > > subprog1 // some stack > > subprog2 // some stack > > call bpf_seq_printf > > (I modified bpf_iter_ipv6_route.c bpf prog for the above > > purpose.) > > I added some printk statements from the beginning of bpf_seq_printf and > > nothing printed out either and of course traps still happens. > > > > I tried another example without subprog and the mainprog calls > > a helper and the same double traps happens below too. > > > > The error log looks like > > > > [ 54.024955] traps: PANIC: double fault, error_code: 0x0 > > [ 54.024969] Oops: double fault: 0000 [#1] PREEMPT SMP KASAN PTI > > [ 54.024977] CPU: 3 UID: 0 PID: 1946 Comm: test_progs Tainted: G OE 6.11.0-10577-gf25c172fd840-dirty #968 > > [ 54.024982] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE > > [ 54.024983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 > > [ 54.024986] RIP: 0010:error_entry+0x1e/0x140 > > [ 54.024996] Code: ff ff 90 90 90 90 90 90 90 90 90 90 56 48 8b 74 24 08 48 89 7c 24 08 52 51 50 41 50 41 51 41 52 41 53 53 55 41 54 41 55 41 56 <41> 57 56 31 f6 31 d1 > > [ 54.024999] RSP: 0018:ffffe8ffff580000 EFLAGS: 00010806 > > [ 54.025002] RAX: f3f3f300f1f1f1f1 RBX: fffff91fffeb0044 RCX: ffffffff84201701 > > [ 54.025005] RDX: fffff91fffeb0044 RSI: ffffffff8420128d RDI: ffffe8ffff580178 > > [ 54.025007] RBP: ffffe8ffff580140 R08: 0000000000000000 R09: 0000000000000000 > > [ 54.025009] R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 > > [ 54.025010] R13: 1ffffd1fffeb0014 R14: 0000000000000003 R15: ffffe8ffff580178 > > [ 54.025012] FS: 00007fd076525d00(0000) GS:ffff8881f7180000(0000) knlGS:0000000000000000 > > [ 54.025015] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > > [ 54.025017] CR2: ffffe8ffff57fff8 CR3: 000000010cd80002 CR4: 0000000000370ef0 > > [ 54.025021] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > > [ 54.025022] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > > [ 54.025024] Call Trace: > > [ 54.025026] <#DF> > > [ 54.025028] ? __die_body+0xaf/0xc0 > > [ 54.025032] ? die+0x2f/0x50 > > [ 54.025036] ? exc_double_fault+0x73/0x80 > > [ 54.025040] ? asm_exc_double_fault+0x23/0x30 > > [ 54.025044] ? common_interrupt_return+0xb1/0xcc > > [ 54.025048] ? asm_exc_page_fault+0xd/0x30 > > [ 54.025051] ? error_entry+0x1e/0x140 > > [ 54.025055] </#DF> > > [ 54.025056] Modules linked in: bpf_testmod(OE) > > [ 54.025061] ---[ end trace 0000000000000000 ]--- > > > > Maybe somebody could give a hint why I got a double fault > > when calling external functions (outside of bpf programs) > > with allocated stack? > > > > I will help in debugging. Can you share the patch you applied locally > so I can reproduce? Looks like the idea needs more thought. in_task_stack() won't recognize the private stack, so it will look like stack overflow and double fault. do you have CONFIG_VMAP_STACK ?
On 10/3/24 10:35 AM, Alexei Starovoitov wrote: > On Thu, Oct 3, 2024 at 6:40 AM Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: >> On Thu, 3 Oct 2024 at 08:17, Yonghong Song <yonghong.song@linux.dev> wrote: >>> >>> On 10/1/24 6:26 PM, Alexei Starovoitov wrote: >>>> On Tue, Oct 1, 2024 at 5:23 PM Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: >>>>> Makes sense, though will we have cases where hierarchical scheduling >>>>> attaches the same prog at different points of the hierarchy? >>>> I'm not sure anyone was asking for such a use case. >>>> >>>>> Then the >>>>> limit of 4 may not be enough (e.g. say with cgroup nested levels > 4). >>>> Well, 4 was the number from TJ. >>>> >>>> Anyway the proposed pseudo code: >>>> >>>> __bpf_prog_enter_recur_limited() >>>> { >>>> cnt = this_cpu_inc_return(*(prog->active)); >>>> if (cnt > 4) { >>>> inc_miss >>>> return 0; >>>> } >>>> // pass cnt into bpf prog somehow, like %rdx ? >>>> // or re-read prog->active from prog >>>> } >>>> >>>> >>>> then in the prologue emit: >>>> >>>> push rbp >>>> mov rbp, rsp >>>> if %rdx == 1 >>>> // main prog is called for the first time >>>> mov rsp, pcpu_priv_stack_top >>>> else >>>> // 2+nd time main prog is called or 1+ time subprog >>>> sub rsp, stack_size >>>> if rsp < pcpu_priv_stack_bottom >>>> goto exit // stack is too small, exit >>>> fi >>> I have tried to implement this approach (not handling >>> recursion yet) based on the above approach. It works >>> okay with nested bpf subprogs like >>> main prog // set rsp = pcpu_priv_stack_top >>> subprog1 // some stack >>> subprog2 // some stack >>> >>> The pcpu_priv_stack is allocated like >>> priv_stack_ptr = __alloc_percpu_gfp(1024 * 16, 8, GFP_KERNEL); >>> >>> But whenever the prog called an external function, >>> e.g. a helper in this case, I will get a double fault. >>> An example could be >>> main prog // set rsp = pcpu_priv_stack_top >>> subprog1 // some stack >>> subprog2 // some stack >>> call bpf_seq_printf >>> (I modified bpf_iter_ipv6_route.c bpf prog for the above >>> purpose.) >>> I added some printk statements from the beginning of bpf_seq_printf and >>> nothing printed out either and of course traps still happens. >>> >>> I tried another example without subprog and the mainprog calls >>> a helper and the same double traps happens below too. >>> >>> The error log looks like >>> >>> [ 54.024955] traps: PANIC: double fault, error_code: 0x0 >>> [ 54.024969] Oops: double fault: 0000 [#1] PREEMPT SMP KASAN PTI >>> [ 54.024977] CPU: 3 UID: 0 PID: 1946 Comm: test_progs Tainted: G OE 6.11.0-10577-gf25c172fd840-dirty #968 >>> [ 54.024982] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE >>> [ 54.024983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 >>> [ 54.024986] RIP: 0010:error_entry+0x1e/0x140 >>> [ 54.024996] Code: ff ff 90 90 90 90 90 90 90 90 90 90 56 48 8b 74 24 08 48 89 7c 24 08 52 51 50 41 50 41 51 41 52 41 53 53 55 41 54 41 55 41 56 <41> 57 56 31 f6 31 d1 >>> [ 54.024999] RSP: 0018:ffffe8ffff580000 EFLAGS: 00010806 >>> [ 54.025002] RAX: f3f3f300f1f1f1f1 RBX: fffff91fffeb0044 RCX: ffffffff84201701 >>> [ 54.025005] RDX: fffff91fffeb0044 RSI: ffffffff8420128d RDI: ffffe8ffff580178 >>> [ 54.025007] RBP: ffffe8ffff580140 R08: 0000000000000000 R09: 0000000000000000 >>> [ 54.025009] R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 >>> [ 54.025010] R13: 1ffffd1fffeb0014 R14: 0000000000000003 R15: ffffe8ffff580178 >>> [ 54.025012] FS: 00007fd076525d00(0000) GS:ffff8881f7180000(0000) knlGS:0000000000000000 >>> [ 54.025015] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >>> [ 54.025017] CR2: ffffe8ffff57fff8 CR3: 000000010cd80002 CR4: 0000000000370ef0 >>> [ 54.025021] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 >>> [ 54.025022] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 >>> [ 54.025024] Call Trace: >>> [ 54.025026] <#DF> >>> [ 54.025028] ? __die_body+0xaf/0xc0 >>> [ 54.025032] ? die+0x2f/0x50 >>> [ 54.025036] ? exc_double_fault+0x73/0x80 >>> [ 54.025040] ? asm_exc_double_fault+0x23/0x30 >>> [ 54.025044] ? common_interrupt_return+0xb1/0xcc >>> [ 54.025048] ? asm_exc_page_fault+0xd/0x30 >>> [ 54.025051] ? error_entry+0x1e/0x140 >>> [ 54.025055] </#DF> >>> [ 54.025056] Modules linked in: bpf_testmod(OE) >>> [ 54.025061] ---[ end trace 0000000000000000 ]--- >>> >>> Maybe somebody could give a hint why I got a double fault >>> when calling external functions (outside of bpf programs) >>> with allocated stack? >>> >> I will help in debugging. Can you share the patch you applied locally >> so I can reproduce? > Looks like the idea needs more thought. > > in_task_stack() won't recognize the private stack, > so it will look like stack overflow and double fault. Thanks. Good point. For a particular helper, if the helper is doing nothing, it works fine. As soon as I add a printk, it will have double fault. Maybe some case kernel functions also do check in_task_stack() as well. > > do you have CONFIG_VMAP_STACK ? No. But I can try.
On 10/3/24 10:35 AM, Alexei Starovoitov wrote: > On Thu, Oct 3, 2024 at 6:40 AM Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: >> On Thu, 3 Oct 2024 at 08:17, Yonghong Song <yonghong.song@linux.dev> wrote: >>> >>> On 10/1/24 6:26 PM, Alexei Starovoitov wrote: >>>> On Tue, Oct 1, 2024 at 5:23 PM Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: >>>>> Makes sense, though will we have cases where hierarchical scheduling >>>>> attaches the same prog at different points of the hierarchy? >>>> I'm not sure anyone was asking for such a use case. >>>> >>>>> Then the >>>>> limit of 4 may not be enough (e.g. say with cgroup nested levels > 4). >>>> Well, 4 was the number from TJ. >>>> >>>> Anyway the proposed pseudo code: >>>> >>>> __bpf_prog_enter_recur_limited() >>>> { >>>> cnt = this_cpu_inc_return(*(prog->active)); >>>> if (cnt > 4) { >>>> inc_miss >>>> return 0; >>>> } >>>> // pass cnt into bpf prog somehow, like %rdx ? >>>> // or re-read prog->active from prog >>>> } >>>> >>>> >>>> then in the prologue emit: >>>> >>>> push rbp >>>> mov rbp, rsp >>>> if %rdx == 1 >>>> // main prog is called for the first time >>>> mov rsp, pcpu_priv_stack_top >>>> else >>>> // 2+nd time main prog is called or 1+ time subprog >>>> sub rsp, stack_size >>>> if rsp < pcpu_priv_stack_bottom >>>> goto exit // stack is too small, exit >>>> fi >>> I have tried to implement this approach (not handling >>> recursion yet) based on the above approach. It works >>> okay with nested bpf subprogs like >>> main prog // set rsp = pcpu_priv_stack_top >>> subprog1 // some stack >>> subprog2 // some stack >>> >>> The pcpu_priv_stack is allocated like >>> priv_stack_ptr = __alloc_percpu_gfp(1024 * 16, 8, GFP_KERNEL); >>> >>> But whenever the prog called an external function, >>> e.g. a helper in this case, I will get a double fault. >>> An example could be >>> main prog // set rsp = pcpu_priv_stack_top >>> subprog1 // some stack >>> subprog2 // some stack >>> call bpf_seq_printf >>> (I modified bpf_iter_ipv6_route.c bpf prog for the above >>> purpose.) >>> I added some printk statements from the beginning of bpf_seq_printf and >>> nothing printed out either and of course traps still happens. >>> >>> I tried another example without subprog and the mainprog calls >>> a helper and the same double traps happens below too. >>> >>> The error log looks like >>> >>> [ 54.024955] traps: PANIC: double fault, error_code: 0x0 >>> [ 54.024969] Oops: double fault: 0000 [#1] PREEMPT SMP KASAN PTI >>> [ 54.024977] CPU: 3 UID: 0 PID: 1946 Comm: test_progs Tainted: G OE 6.11.0-10577-gf25c172fd840-dirty #968 >>> [ 54.024982] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE >>> [ 54.024983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 >>> [ 54.024986] RIP: 0010:error_entry+0x1e/0x140 >>> [ 54.024996] Code: ff ff 90 90 90 90 90 90 90 90 90 90 56 48 8b 74 24 08 48 89 7c 24 08 52 51 50 41 50 41 51 41 52 41 53 53 55 41 54 41 55 41 56 <41> 57 56 31 f6 31 d1 >>> [ 54.024999] RSP: 0018:ffffe8ffff580000 EFLAGS: 00010806 >>> [ 54.025002] RAX: f3f3f300f1f1f1f1 RBX: fffff91fffeb0044 RCX: ffffffff84201701 >>> [ 54.025005] RDX: fffff91fffeb0044 RSI: ffffffff8420128d RDI: ffffe8ffff580178 >>> [ 54.025007] RBP: ffffe8ffff580140 R08: 0000000000000000 R09: 0000000000000000 >>> [ 54.025009] R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 >>> [ 54.025010] R13: 1ffffd1fffeb0014 R14: 0000000000000003 R15: ffffe8ffff580178 >>> [ 54.025012] FS: 00007fd076525d00(0000) GS:ffff8881f7180000(0000) knlGS:0000000000000000 >>> [ 54.025015] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >>> [ 54.025017] CR2: ffffe8ffff57fff8 CR3: 000000010cd80002 CR4: 0000000000370ef0 >>> [ 54.025021] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 >>> [ 54.025022] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 >>> [ 54.025024] Call Trace: >>> [ 54.025026] <#DF> >>> [ 54.025028] ? __die_body+0xaf/0xc0 >>> [ 54.025032] ? die+0x2f/0x50 >>> [ 54.025036] ? exc_double_fault+0x73/0x80 >>> [ 54.025040] ? asm_exc_double_fault+0x23/0x30 >>> [ 54.025044] ? common_interrupt_return+0xb1/0xcc >>> [ 54.025048] ? asm_exc_page_fault+0xd/0x30 >>> [ 54.025051] ? error_entry+0x1e/0x140 >>> [ 54.025055] </#DF> >>> [ 54.025056] Modules linked in: bpf_testmod(OE) >>> [ 54.025061] ---[ end trace 0000000000000000 ]--- >>> >>> Maybe somebody could give a hint why I got a double fault >>> when calling external functions (outside of bpf programs) >>> with allocated stack? >>> >> I will help in debugging. Can you share the patch you applied locally >> so I can reproduce? > Looks like the idea needs more thought. > > in_task_stack() won't recognize the private stack, > so it will look like stack overflow and double fault. > > do you have CONFIG_VMAP_STACK ? Yes, my above test runs fine withCONFIG_VMAP_STACK. Let me guard private stack support with CONFIG_VMAP_STACK for now. Not sure whether distributions enable CONFIG_VMAP_STACK or not.
On Thu, 3 Oct 2024 at 22:44, Yonghong Song <yonghong.song@linux.dev> wrote: > > > On 10/3/24 10:35 AM, Alexei Starovoitov wrote: > > On Thu, Oct 3, 2024 at 6:40 AM Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: > >> On Thu, 3 Oct 2024 at 08:17, Yonghong Song <yonghong.song@linux.dev> wrote: > >>> > >>> On 10/1/24 6:26 PM, Alexei Starovoitov wrote: > >>>> On Tue, Oct 1, 2024 at 5:23 PM Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: > >>>>> Makes sense, though will we have cases where hierarchical scheduling > >>>>> attaches the same prog at different points of the hierarchy? > >>>> I'm not sure anyone was asking for such a use case. > >>>> > >>>>> Then the > >>>>> limit of 4 may not be enough (e.g. say with cgroup nested levels > 4). > >>>> Well, 4 was the number from TJ. > >>>> > >>>> Anyway the proposed pseudo code: > >>>> > >>>> __bpf_prog_enter_recur_limited() > >>>> { > >>>> cnt = this_cpu_inc_return(*(prog->active)); > >>>> if (cnt > 4) { > >>>> inc_miss > >>>> return 0; > >>>> } > >>>> // pass cnt into bpf prog somehow, like %rdx ? > >>>> // or re-read prog->active from prog > >>>> } > >>>> > >>>> > >>>> then in the prologue emit: > >>>> > >>>> push rbp > >>>> mov rbp, rsp > >>>> if %rdx == 1 > >>>> // main prog is called for the first time > >>>> mov rsp, pcpu_priv_stack_top > >>>> else > >>>> // 2+nd time main prog is called or 1+ time subprog > >>>> sub rsp, stack_size > >>>> if rsp < pcpu_priv_stack_bottom > >>>> goto exit // stack is too small, exit > >>>> fi > >>> I have tried to implement this approach (not handling > >>> recursion yet) based on the above approach. It works > >>> okay with nested bpf subprogs like > >>> main prog // set rsp = pcpu_priv_stack_top > >>> subprog1 // some stack > >>> subprog2 // some stack > >>> > >>> The pcpu_priv_stack is allocated like > >>> priv_stack_ptr = __alloc_percpu_gfp(1024 * 16, 8, GFP_KERNEL); > >>> > >>> But whenever the prog called an external function, > >>> e.g. a helper in this case, I will get a double fault. > >>> An example could be > >>> main prog // set rsp = pcpu_priv_stack_top > >>> subprog1 // some stack > >>> subprog2 // some stack > >>> call bpf_seq_printf > >>> (I modified bpf_iter_ipv6_route.c bpf prog for the above > >>> purpose.) > >>> I added some printk statements from the beginning of bpf_seq_printf and > >>> nothing printed out either and of course traps still happens. > >>> > >>> I tried another example without subprog and the mainprog calls > >>> a helper and the same double traps happens below too. > >>> > >>> The error log looks like > >>> > >>> [ 54.024955] traps: PANIC: double fault, error_code: 0x0 > >>> [ 54.024969] Oops: double fault: 0000 [#1] PREEMPT SMP KASAN PTI > >>> [ 54.024977] CPU: 3 UID: 0 PID: 1946 Comm: test_progs Tainted: G OE 6.11.0-10577-gf25c172fd840-dirty #968 > >>> [ 54.024982] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE > >>> [ 54.024983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 > >>> [ 54.024986] RIP: 0010:error_entry+0x1e/0x140 > >>> [ 54.024996] Code: ff ff 90 90 90 90 90 90 90 90 90 90 56 48 8b 74 24 08 48 89 7c 24 08 52 51 50 41 50 41 51 41 52 41 53 53 55 41 54 41 55 41 56 <41> 57 56 31 f6 31 d1 > >>> [ 54.024999] RSP: 0018:ffffe8ffff580000 EFLAGS: 00010806 > >>> [ 54.025002] RAX: f3f3f300f1f1f1f1 RBX: fffff91fffeb0044 RCX: ffffffff84201701 > >>> [ 54.025005] RDX: fffff91fffeb0044 RSI: ffffffff8420128d RDI: ffffe8ffff580178 > >>> [ 54.025007] RBP: ffffe8ffff580140 R08: 0000000000000000 R09: 0000000000000000 > >>> [ 54.025009] R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 > >>> [ 54.025010] R13: 1ffffd1fffeb0014 R14: 0000000000000003 R15: ffffe8ffff580178 > >>> [ 54.025012] FS: 00007fd076525d00(0000) GS:ffff8881f7180000(0000) knlGS:0000000000000000 > >>> [ 54.025015] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > >>> [ 54.025017] CR2: ffffe8ffff57fff8 CR3: 000000010cd80002 CR4: 0000000000370ef0 > >>> [ 54.025021] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > >>> [ 54.025022] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > >>> [ 54.025024] Call Trace: > >>> [ 54.025026] <#DF> > >>> [ 54.025028] ? __die_body+0xaf/0xc0 > >>> [ 54.025032] ? die+0x2f/0x50 > >>> [ 54.025036] ? exc_double_fault+0x73/0x80 > >>> [ 54.025040] ? asm_exc_double_fault+0x23/0x30 > >>> [ 54.025044] ? common_interrupt_return+0xb1/0xcc > >>> [ 54.025048] ? asm_exc_page_fault+0xd/0x30 > >>> [ 54.025051] ? error_entry+0x1e/0x140 > >>> [ 54.025055] </#DF> > >>> [ 54.025056] Modules linked in: bpf_testmod(OE) > >>> [ 54.025061] ---[ end trace 0000000000000000 ]--- > >>> > >>> Maybe somebody could give a hint why I got a double fault > >>> when calling external functions (outside of bpf programs) > >>> with allocated stack? > >>> > >> I will help in debugging. Can you share the patch you applied locally > >> so I can reproduce? > > Looks like the idea needs more thought. > > > > in_task_stack() won't recognize the private stack, > > so it will look like stack overflow and double fault. > > > > do you have CONFIG_VMAP_STACK ? > > Yes, my above test runs fine withCONFIG_VMAP_STACK. Let me guard private stack support with > CONFIG_VMAP_STACK for now. Not sure whether distributions enable > CONFIG_VMAP_STACK or not. > I think it is the default on most distributions (Debian, Ubuntu, Fedora, etc.).
On 10/3/24 1:47 PM, Kumar Kartikeya Dwivedi wrote: > On Thu, 3 Oct 2024 at 22:44, Yonghong Song <yonghong.song@linux.dev> wrote: >> >> On 10/3/24 10:35 AM, Alexei Starovoitov wrote: >>> On Thu, Oct 3, 2024 at 6:40 AM Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: >>>> On Thu, 3 Oct 2024 at 08:17, Yonghong Song <yonghong.song@linux.dev> wrote: >>>>> On 10/1/24 6:26 PM, Alexei Starovoitov wrote: >>>>>> On Tue, Oct 1, 2024 at 5:23 PM Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: >>>>>>> Makes sense, though will we have cases where hierarchical scheduling >>>>>>> attaches the same prog at different points of the hierarchy? >>>>>> I'm not sure anyone was asking for such a use case. >>>>>> >>>>>>> Then the >>>>>>> limit of 4 may not be enough (e.g. say with cgroup nested levels > 4). >>>>>> Well, 4 was the number from TJ. >>>>>> >>>>>> Anyway the proposed pseudo code: >>>>>> >>>>>> __bpf_prog_enter_recur_limited() >>>>>> { >>>>>> cnt = this_cpu_inc_return(*(prog->active)); >>>>>> if (cnt > 4) { >>>>>> inc_miss >>>>>> return 0; >>>>>> } >>>>>> // pass cnt into bpf prog somehow, like %rdx ? >>>>>> // or re-read prog->active from prog >>>>>> } >>>>>> >>>>>> >>>>>> then in the prologue emit: >>>>>> >>>>>> push rbp >>>>>> mov rbp, rsp >>>>>> if %rdx == 1 >>>>>> // main prog is called for the first time >>>>>> mov rsp, pcpu_priv_stack_top >>>>>> else >>>>>> // 2+nd time main prog is called or 1+ time subprog >>>>>> sub rsp, stack_size >>>>>> if rsp < pcpu_priv_stack_bottom >>>>>> goto exit // stack is too small, exit >>>>>> fi >>>>> I have tried to implement this approach (not handling >>>>> recursion yet) based on the above approach. It works >>>>> okay with nested bpf subprogs like >>>>> main prog // set rsp = pcpu_priv_stack_top >>>>> subprog1 // some stack >>>>> subprog2 // some stack >>>>> >>>>> The pcpu_priv_stack is allocated like >>>>> priv_stack_ptr = __alloc_percpu_gfp(1024 * 16, 8, GFP_KERNEL); >>>>> >>>>> But whenever the prog called an external function, >>>>> e.g. a helper in this case, I will get a double fault. >>>>> An example could be >>>>> main prog // set rsp = pcpu_priv_stack_top >>>>> subprog1 // some stack >>>>> subprog2 // some stack >>>>> call bpf_seq_printf >>>>> (I modified bpf_iter_ipv6_route.c bpf prog for the above >>>>> purpose.) >>>>> I added some printk statements from the beginning of bpf_seq_printf and >>>>> nothing printed out either and of course traps still happens. >>>>> >>>>> I tried another example without subprog and the mainprog calls >>>>> a helper and the same double traps happens below too. >>>>> >>>>> The error log looks like >>>>> >>>>> [ 54.024955] traps: PANIC: double fault, error_code: 0x0 >>>>> [ 54.024969] Oops: double fault: 0000 [#1] PREEMPT SMP KASAN PTI >>>>> [ 54.024977] CPU: 3 UID: 0 PID: 1946 Comm: test_progs Tainted: G OE 6.11.0-10577-gf25c172fd840-dirty #968 >>>>> [ 54.024982] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE >>>>> [ 54.024983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 >>>>> [ 54.024986] RIP: 0010:error_entry+0x1e/0x140 >>>>> [ 54.024996] Code: ff ff 90 90 90 90 90 90 90 90 90 90 56 48 8b 74 24 08 48 89 7c 24 08 52 51 50 41 50 41 51 41 52 41 53 53 55 41 54 41 55 41 56 <41> 57 56 31 f6 31 d1 >>>>> [ 54.024999] RSP: 0018:ffffe8ffff580000 EFLAGS: 00010806 >>>>> [ 54.025002] RAX: f3f3f300f1f1f1f1 RBX: fffff91fffeb0044 RCX: ffffffff84201701 >>>>> [ 54.025005] RDX: fffff91fffeb0044 RSI: ffffffff8420128d RDI: ffffe8ffff580178 >>>>> [ 54.025007] RBP: ffffe8ffff580140 R08: 0000000000000000 R09: 0000000000000000 >>>>> [ 54.025009] R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 >>>>> [ 54.025010] R13: 1ffffd1fffeb0014 R14: 0000000000000003 R15: ffffe8ffff580178 >>>>> [ 54.025012] FS: 00007fd076525d00(0000) GS:ffff8881f7180000(0000) knlGS:0000000000000000 >>>>> [ 54.025015] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >>>>> [ 54.025017] CR2: ffffe8ffff57fff8 CR3: 000000010cd80002 CR4: 0000000000370ef0 >>>>> [ 54.025021] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 >>>>> [ 54.025022] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 >>>>> [ 54.025024] Call Trace: >>>>> [ 54.025026] <#DF> >>>>> [ 54.025028] ? __die_body+0xaf/0xc0 >>>>> [ 54.025032] ? die+0x2f/0x50 >>>>> [ 54.025036] ? exc_double_fault+0x73/0x80 >>>>> [ 54.025040] ? asm_exc_double_fault+0x23/0x30 >>>>> [ 54.025044] ? common_interrupt_return+0xb1/0xcc >>>>> [ 54.025048] ? asm_exc_page_fault+0xd/0x30 >>>>> [ 54.025051] ? error_entry+0x1e/0x140 >>>>> [ 54.025055] </#DF> >>>>> [ 54.025056] Modules linked in: bpf_testmod(OE) >>>>> [ 54.025061] ---[ end trace 0000000000000000 ]--- >>>>> >>>>> Maybe somebody could give a hint why I got a double fault >>>>> when calling external functions (outside of bpf programs) >>>>> with allocated stack? >>>>> >>>> I will help in debugging. Can you share the patch you applied locally >>>> so I can reproduce? >>> Looks like the idea needs more thought. >>> >>> in_task_stack() won't recognize the private stack, >>> so it will look like stack overflow and double fault. >>> >>> do you have CONFIG_VMAP_STACK ? >> Yes, my above test runs fine withCONFIG_VMAP_STACK. Let me guard private stack support with >> CONFIG_VMAP_STACK for now. Not sure whether distributions enable >> CONFIG_VMAP_STACK or not. >> > I think it is the default on most distributions (Debian, Ubuntu, Fedora, etc.). Thanks for confirmation! Great CONFIG_VMAP_STACK is on by default for most distro's.
On Thu, Oct 3, 2024 at 1:44 PM Yonghong Song <yonghong.song@linux.dev> wrote: > > > Looks like the idea needs more thought. > > > > in_task_stack() won't recognize the private stack, > > so it will look like stack overflow and double fault. > > > > do you have CONFIG_VMAP_STACK ? > > Yes, my above test runs fine withCONFIG_VMAP_STACK. Let me guard private stack support with > CONFIG_VMAP_STACK for now. Not sure whether distributions enable > CONFIG_VMAP_STACK or not. Good! but I'm surprised it makes a difference. Please still root cause the crash without VMAP_STACK. We need to do a lot more homework here before proceeding. Look at arch/x86/kernel/dumpstack_64.c At least we need new stack_type for priv stack. stack_type_unknown doesn't inspire confidence. Need to make sure stack trace is still reliable with priv stack. Though it may look appealing from performance pov. We may need to go back to r9 approach with push/pop around calls, since that is surely keeping unwinder happy while this approach will have to teach unwinder.
On 10/3/24 3:32 PM, Alexei Starovoitov wrote: > On Thu, Oct 3, 2024 at 1:44 PM Yonghong Song <yonghong.song@linux.dev> wrote: >>> Looks like the idea needs more thought. >>> >>> in_task_stack() won't recognize the private stack, >>> so it will look like stack overflow and double fault. >>> >>> do you have CONFIG_VMAP_STACK ? >> Yes, my above test runs fine withCONFIG_VMAP_STACK. Let me guard private stack support with >> CONFIG_VMAP_STACK for now. Not sure whether distributions enable >> CONFIG_VMAP_STACK or not. > Good! but I'm surprised it makes a difference. That only for the test case I tried. Now I tried the whole bpf selftests with CONFIG_VMAP_STACK on. There are still some failures. Some of them due to stack protector. I disabled stack protector and then those stack protector error gone. But some other errors show up like below: [ 27.186581] kernel tried to execute NX-protected page - exploit attempt? (uid: 0) [ 27.187480] BUG: unable to handle page fault for address: ffff888109572800 [ 27.188299] #PF: supervisor instruction fetch in kernel mode [ 27.189085] #PF: error_code(0x0011) - permissions violation or [ 27.736844] BUG: unable to handle page fault for address: 0000000080000000 [ 27.737759] #PF: supervisor instruction fetch in kernel mode [ 27.738631] #PF: error_code(0x0010) - not-present page [ 27.739455] PGD 0 P4D 0 [ 27.739818] Oops: Oops: 0010 [#1] PREEMPT SMP PTI ... Some further investigations are needed. > Please still root cause the crash without VMAP_STACK. Sure. Let me investigate cases with VMAP_STACK first and then will try to look at it without VMAP_STACK. > > We need to do a lot more homework here before proceeding. > Look at arch/x86/kernel/dumpstack_64.c > At least we need new stack_type for priv stack. > stack_type_unknown doesn't inspire confidence. > Need to make sure stack trace is still reliable with priv stack. > Though it may look appealing from performance pov. > We may need to go back to r9 approach with push/pop around calls, > since that is surely keeping unwinder happy > while this approach will have to teach unwinder. Good point.
On 10/3/24 10:22 PM, Yonghong Song wrote: > > On 10/3/24 3:32 PM, Alexei Starovoitov wrote: >> On Thu, Oct 3, 2024 at 1:44 PM Yonghong Song >> <yonghong.song@linux.dev> wrote: >>>> Looks like the idea needs more thought. >>>> >>>> in_task_stack() won't recognize the private stack, >>>> so it will look like stack overflow and double fault. >>>> >>>> do you have CONFIG_VMAP_STACK ? >>> Yes, my above test runs fine withCONFIG_VMAP_STACK. Let me guard >>> private stack support with >>> CONFIG_VMAP_STACK for now. Not sure whether distributions enable >>> CONFIG_VMAP_STACK or not. >> Good! but I'm surprised it makes a difference. > > That only for the test case I tried. Now I tried the whole bpf selftests > with CONFIG_VMAP_STACK on. There are still some failures. Some of them > due to stack protector. I disabled stack protector and then those stack > protector error gone. But some other errors show up like below: > > [ 27.186581] kernel tried to execute NX-protected page - exploit > attempt? (uid: 0) > [ 27.187480] BUG: unable to handle page fault for address: > ffff888109572800 > [ 27.188299] #PF: supervisor instruction fetch in kernel mode > [ 27.189085] #PF: error_code(0x0011) - permissions violation > > or > > [ 27.736844] BUG: unable to handle page fault for address: > 0000000080000000 > [ 27.737759] #PF: supervisor instruction fetch in kernel mode > [ 27.738631] #PF: error_code(0x0010) - not-present page > [ 27.739455] PGD 0 P4D 0 > [ 27.739818] Oops: Oops: 0010 [#1] PREEMPT SMP PTI > > ... > > Some further investigations are needed. I found one failure case (with stackprotector disabled): [ 20.032611] traps: PANIC: double fault, error_code: 0x0 [ 20.032615] Oops: double fault: 0000 [#1] PREEMPT SMP PTI [ 20.032619] CPU: 0 UID: 0 PID: 1959 Comm: test_progs Tainted: G OE 6.11.0-10576-g17baa0096769-dirty #1006 [ 20.032623] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE [ 20.032624] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 20.032626] RIP: 0010:error_entry+0x17/0x140 [ 20.032633] Code: ff 0f 01 f8 e9 56 fe ff ff 90 90 90 90 90 90 90 90 90 90 56 48 8b 74 24 08 48 89 7c 24 08 52 51 50 41 50 41 51 41 52 49 [ 20.032635] RSP: 0018:ffffe8ffff400000 EFLAGS: 00010093 [ 20.032637] RAX: ffffe8ffff4000a8 RBX: ffffe8ffff4000a8 RCX: ffffffff82201737 [ 20.032639] RDX: 0000000000000000 RSI: ffffffff8220128d RDI: ffffe8ffff4000a8 [ 20.032640] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 20.032641] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 20.032642] R13: 0000000000000000 R14: 000000000002ed80 R15: 0000000000000000 [ 20.032643] FS: 00007f8a3a2006c0(0000) GS:ffff888237c00000(0000) knlGS:ffff888237c00000 [ 20.032645] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 20.032646] CR2: ffffe8ffff3ffff8 CR3: 0000000103580002 CR4: 0000000000370ef0 [ 20.032649] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 20.032650] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 20.032651] Call Trace: [ 20.032660] <#DF> [ 20.032664] ? __die_body+0xaf/0xc0 [ 20.032667] ? die+0x2f/0x50 [ 20.032670] ? exc_double_fault+0xbf/0xd0 [ 20.032674] ? asm_exc_double_fault+0x23/0x30 [ 20.032678] ? restore_regs_and_return_to_kernel+0x1b/0x1b [ 20.032681] ? asm_exc_page_fault+0xd/0x30 [ 20.032684] ? error_entry+0x17/0x140 [ 20.032687] </#DF> The private stack for cpu 0: priv_stack_ptr cpu 0 = [ffffe8ffff434000, ffffe8ffff438000] (total 16KB) That is, the top stack is ffffe8ffff438000 and the bottom stack is ffffe8ffff434000. During bpf execution, a softirq may happen, at that point, stack pointer becomes: RSP: 0018:ffffe8ffff400000 (see above) and there is a read/write (mostly write) to address CR2: ffffe8ffff3ffff8 And this may cause a fault. After this fault, there are some further access and probably because of invalid stack, double fault happens. So the quesiton is why RSP is reset to ffffe8ffff400000? I have not figured out which code changed this? Maybe somebody can help? > >> Please still root cause the crash without VMAP_STACK. > > Sure. Let me investigate cases with VMAP_STACK first and > then will try to look at it without VMAP_STACK. > >> >> We need to do a lot more homework here before proceeding. >> Look at arch/x86/kernel/dumpstack_64.c >> At least we need new stack_type for priv stack. >> stack_type_unknown doesn't inspire confidence. >> Need to make sure stack trace is still reliable with priv stack. >> Though it may look appealing from performance pov. >> We may need to go back to r9 approach with push/pop around calls, >> since that is surely keeping unwinder happy >> while this approach will have to teach unwinder. > > Good point. > >
On Fri, Oct 4, 2024 at 12:28 PM Yonghong Song <yonghong.song@linux.dev> wrote: > > > On 10/3/24 10:22 PM, Yonghong Song wrote: > > > > On 10/3/24 3:32 PM, Alexei Starovoitov wrote: > >> On Thu, Oct 3, 2024 at 1:44 PM Yonghong Song > >> <yonghong.song@linux.dev> wrote: > >>>> Looks like the idea needs more thought. > >>>> > >>>> in_task_stack() won't recognize the private stack, > >>>> so it will look like stack overflow and double fault. > >>>> > >>>> do you have CONFIG_VMAP_STACK ? > >>> Yes, my above test runs fine withCONFIG_VMAP_STACK. Let me guard > >>> private stack support with > >>> CONFIG_VMAP_STACK for now. Not sure whether distributions enable > >>> CONFIG_VMAP_STACK or not. > >> Good! but I'm surprised it makes a difference. > > > > That only for the test case I tried. Now I tried the whole bpf selftests > > with CONFIG_VMAP_STACK on. There are still some failures. Some of them > > due to stack protector. I disabled stack protector and then those stack > > protector error gone. But some other errors show up like below: > > > > [ 27.186581] kernel tried to execute NX-protected page - exploit > > attempt? (uid: 0) > > [ 27.187480] BUG: unable to handle page fault for address: > > ffff888109572800 > > [ 27.188299] #PF: supervisor instruction fetch in kernel mode > > [ 27.189085] #PF: error_code(0x0011) - permissions violation > > > > or > > > > [ 27.736844] BUG: unable to handle page fault for address: > > 0000000080000000 > > [ 27.737759] #PF: supervisor instruction fetch in kernel mode > > [ 27.738631] #PF: error_code(0x0010) - not-present page > > [ 27.739455] PGD 0 P4D 0 > > [ 27.739818] Oops: Oops: 0010 [#1] PREEMPT SMP PTI > > > > ... > > > > Some further investigations are needed. > > > I found one failure case (with stackprotector disabled): > > [ 20.032611] traps: PANIC: double fault, error_code: 0x0 > [ 20.032615] Oops: double fault: 0000 [#1] PREEMPT SMP PTI > [ 20.032619] CPU: 0 UID: 0 PID: 1959 Comm: test_progs Tainted: G OE 6.11.0-10576-g17baa0096769-dirty #1006 > [ 20.032623] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE > [ 20.032624] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 > [ 20.032626] RIP: 0010:error_entry+0x17/0x140 > [ 20.032633] Code: ff 0f 01 f8 e9 56 fe ff ff 90 90 90 90 90 90 90 90 90 90 56 48 8b 74 24 08 48 89 7c 24 08 52 51 50 41 50 41 51 41 52 49 > [ 20.032635] RSP: 0018:ffffe8ffff400000 EFLAGS: 00010093 > [ 20.032637] RAX: ffffe8ffff4000a8 RBX: ffffe8ffff4000a8 RCX: ffffffff82201737 > [ 20.032639] RDX: 0000000000000000 RSI: ffffffff8220128d RDI: ffffe8ffff4000a8 > [ 20.032640] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 > [ 20.032641] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 > [ 20.032642] R13: 0000000000000000 R14: 000000000002ed80 R15: 0000000000000000 > [ 20.032643] FS: 00007f8a3a2006c0(0000) GS:ffff888237c00000(0000) knlGS:ffff888237c00000 > [ 20.032645] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > [ 20.032646] CR2: ffffe8ffff3ffff8 CR3: 0000000103580002 CR4: 0000000000370ef0 > [ 20.032649] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > [ 20.032650] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > [ 20.032651] Call Trace: > [ 20.032660] <#DF> > [ 20.032664] ? __die_body+0xaf/0xc0 > [ 20.032667] ? die+0x2f/0x50 > [ 20.032670] ? exc_double_fault+0xbf/0xd0 > [ 20.032674] ? asm_exc_double_fault+0x23/0x30 > [ 20.032678] ? restore_regs_and_return_to_kernel+0x1b/0x1b > [ 20.032681] ? asm_exc_page_fault+0xd/0x30 > [ 20.032684] ? error_entry+0x17/0x140 > [ 20.032687] </#DF> > > The private stack for cpu 0: > priv_stack_ptr cpu 0 = [ffffe8ffff434000, ffffe8ffff438000] (total 16KB) > That is, the top stack is ffffe8ffff438000 and the bottom stack is ffffe8ffff434000. > > During bpf execution, a softirq may happen, at that point, > stack pointer becomes: > RSP: 0018:ffffe8ffff400000 (see above) > and there is a read/write (mostly write) to address > CR2: ffffe8ffff3ffff8 > And this may cause a fault. > After this fault, there are some further access and probably because > of invalid stack, double fault happens. > > So the quesiton is why RSP is reset to ffffe8ffff400000? 0x38000 bytes consumed by stack or rounded down? That's unlikely. > I have not figured out which code changed this? Maybe somebody can help? As Kumar said earlier pls share the patch. Link to github? or whichever. Double check that any kind of tail-call logic is not mixed with priv stack.
On 10/4/24 12:52 PM, Alexei Starovoitov wrote: > On Fri, Oct 4, 2024 at 12:28 PM Yonghong Song <yonghong.song@linux.dev> wrote: >> >> On 10/3/24 10:22 PM, Yonghong Song wrote: >>> On 10/3/24 3:32 PM, Alexei Starovoitov wrote: >>>> On Thu, Oct 3, 2024 at 1:44 PM Yonghong Song >>>> <yonghong.song@linux.dev> wrote: >>>>>> Looks like the idea needs more thought. >>>>>> >>>>>> in_task_stack() won't recognize the private stack, >>>>>> so it will look like stack overflow and double fault. >>>>>> >>>>>> do you have CONFIG_VMAP_STACK ? >>>>> Yes, my above test runs fine withCONFIG_VMAP_STACK. Let me guard >>>>> private stack support with >>>>> CONFIG_VMAP_STACK for now. Not sure whether distributions enable >>>>> CONFIG_VMAP_STACK or not. >>>> Good! but I'm surprised it makes a difference. >>> That only for the test case I tried. Now I tried the whole bpf selftests >>> with CONFIG_VMAP_STACK on. There are still some failures. Some of them >>> due to stack protector. I disabled stack protector and then those stack >>> protector error gone. But some other errors show up like below: >>> >>> [ 27.186581] kernel tried to execute NX-protected page - exploit >>> attempt? (uid: 0) >>> [ 27.187480] BUG: unable to handle page fault for address: >>> ffff888109572800 >>> [ 27.188299] #PF: supervisor instruction fetch in kernel mode >>> [ 27.189085] #PF: error_code(0x0011) - permissions violation >>> >>> or >>> >>> [ 27.736844] BUG: unable to handle page fault for address: >>> 0000000080000000 >>> [ 27.737759] #PF: supervisor instruction fetch in kernel mode >>> [ 27.738631] #PF: error_code(0x0010) - not-present page >>> [ 27.739455] PGD 0 P4D 0 >>> [ 27.739818] Oops: Oops: 0010 [#1] PREEMPT SMP PTI >>> >>> ... >>> >>> Some further investigations are needed. >> >> I found one failure case (with stackprotector disabled): >> >> [ 20.032611] traps: PANIC: double fault, error_code: 0x0 >> [ 20.032615] Oops: double fault: 0000 [#1] PREEMPT SMP PTI >> [ 20.032619] CPU: 0 UID: 0 PID: 1959 Comm: test_progs Tainted: G OE 6.11.0-10576-g17baa0096769-dirty #1006 >> [ 20.032623] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE >> [ 20.032624] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 >> [ 20.032626] RIP: 0010:error_entry+0x17/0x140 >> [ 20.032633] Code: ff 0f 01 f8 e9 56 fe ff ff 90 90 90 90 90 90 90 90 90 90 56 48 8b 74 24 08 48 89 7c 24 08 52 51 50 41 50 41 51 41 52 49 >> [ 20.032635] RSP: 0018:ffffe8ffff400000 EFLAGS: 00010093 >> [ 20.032637] RAX: ffffe8ffff4000a8 RBX: ffffe8ffff4000a8 RCX: ffffffff82201737 >> [ 20.032639] RDX: 0000000000000000 RSI: ffffffff8220128d RDI: ffffe8ffff4000a8 >> [ 20.032640] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 >> [ 20.032641] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 >> [ 20.032642] R13: 0000000000000000 R14: 000000000002ed80 R15: 0000000000000000 >> [ 20.032643] FS: 00007f8a3a2006c0(0000) GS:ffff888237c00000(0000) knlGS:ffff888237c00000 >> [ 20.032645] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >> [ 20.032646] CR2: ffffe8ffff3ffff8 CR3: 0000000103580002 CR4: 0000000000370ef0 >> [ 20.032649] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 >> [ 20.032650] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 >> [ 20.032651] Call Trace: >> [ 20.032660] <#DF> >> [ 20.032664] ? __die_body+0xaf/0xc0 >> [ 20.032667] ? die+0x2f/0x50 >> [ 20.032670] ? exc_double_fault+0xbf/0xd0 >> [ 20.032674] ? asm_exc_double_fault+0x23/0x30 >> [ 20.032678] ? restore_regs_and_return_to_kernel+0x1b/0x1b >> [ 20.032681] ? asm_exc_page_fault+0xd/0x30 >> [ 20.032684] ? error_entry+0x17/0x140 >> [ 20.032687] </#DF> >> >> The private stack for cpu 0: >> priv_stack_ptr cpu 0 = [ffffe8ffff434000, ffffe8ffff438000] (total 16KB) >> That is, the top stack is ffffe8ffff438000 and the bottom stack is ffffe8ffff434000. >> >> During bpf execution, a softirq may happen, at that point, >> stack pointer becomes: >> RSP: 0018:ffffe8ffff400000 (see above) >> and there is a read/write (mostly write) to address >> CR2: ffffe8ffff3ffff8 >> And this may cause a fault. >> After this fault, there are some further access and probably because >> of invalid stack, double fault happens. >> >> So the quesiton is why RSP is reset to ffffe8ffff400000? > 0x38000 bytes consumed by stack or rounded down? > That's unlikely. > >> I have not figured out which code changed this? Maybe somebody can help? > As Kumar said earlier pls share the patch. Link to github? or whichever. > > Double check that any kind of tail-call logic is not mixed with priv stack. Here is the reproducer. Two attached files: priv_stack.config: the config file to build the kernel 0001-bpf-implement-private-stack.patch: the patch to apply to the top of bpf-next. The top bpf-next commit in my test: commit 9502a7de5a61bec3bda841a830560c5d6d40ecac (origin/master, origin/HEAD, master) Author: Mykyta Yatsenko <yatsenko@meta.com> Date: Tue Oct 1 00:15:22 2024 +0100 selftests/bpf: Emit top frequent code lines in veristat I am using clang18 to build the kernel and selftests. The build command line: make LLVM=1 -j make -C tools/testing/selftests/bpf LLVM=1 -j In qemu vm, tools/testing/selftests/bpf directory, run the following script: $ cat run.sh cat /proc/sys/net/core/bpf_jit_limit echo 796917760 > /proc/sys/net/core/bpf_jit_limit # ./test_progs -n 339/4 ./test_progs -t task_local_storage/nodeadlock With private stack on by default, in my environment, booting will failure. So by default, private stack is off. In the above echo 796917760 > /proc/sys/net/core/bpf_jit_limit intends to enable private stack. The following is the run result: [root@arch-fb-vm1 bpf]# ./run.sh 796917760 [ 55.570032] bpf_testmod: loading out-of-tree module taints kernel. [ 55.570841] bpf_testmod: module verification failed: signature and/or required key missing - tainting kernel [ 55.822604] kernel tried to execute NX-protected page - exploit attempt? (uid: 0) [ 55.823588] BUG: unable to handle page fault for address: ffff888107094a40 [ 55.824444] #PF: supervisor instruction fetch in kernel mode [ 55.825120] #PF: error_code(0x0011) - permissions violation [ 55.825800] PGD 4801067 P4D 4801067 PUD 100c99063 PMD 80000001070000e3 [ 55.826578] Oops: Oops: 0011 [#1] PREEMPT SMP PTI [ 55.827162] CPU: 0 UID: 0 PID: 1958 Comm: test_progs Tainted: G OE 6.11.0-10576-g8eba407b1d56 #1008 [ 55.828387] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE [ 55.829027] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 55.830353] RIP: 0010:0xffff888107094a40 [ 55.830836] Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.833033] RSP: 0018:ffffe8ffff4376d0 EFLAGS: 00010096 [ 55.833649] RAX: ffff8881070918c0 RBX: ffff888103928540 RCX: 0000000000000000 [ 55.834517] RDX: 0000000000000000 RSI: ffffffff82a35174 RDI: 0000000000000000 [ 55.835369] RBP: ffff888107084a40 R08: 0000000000000014 R09: 0000000000000002 [ 55.836213] R10: ffff888107094a00 R11: 0000000002bed400 R12: ffff888237c2fc00 [ 55.837090] R13: 0000000000000000 R14: ffffffff810e35e6 R15: ffffe8ffff4376d0 [ 55.837968] FS: 00007f255b2006c0(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 55.838966] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 55.839731] CR2: ffff888107094a40 CR3: 0000000109766003 CR4: 0000000000370ef0 [ 55.840763] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 55.841764] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 55.842764] Call Trace: [ 55.843139] Modules linked in: bpf_testmod(OE) [ 55.843796] CR2: ffff888107094a40 [ 55.844280] ---[ end trace 0000000000000000 ]--- [ 55.844859] RIP: 0010:0xffff888107094a40 [ 55.845358] Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.847706] RSP: 0018:ffffe8ffff4376d0 EFLAGS: 00010096 [ 55.848415] RAX: ffff8881070918c0 RBX: ffff888103928540 RCX: 0000000000000000 [ 55.849345] RDX: 0000000000000000 RSI: ffffffff82a35174 RDI: 0000000000000000 [ 55.850245] RBP: ffff888107084a40 R08: 0000000000000014 R09: 0000000000000002 [ 55.851228] R10: ffff888107094a00 R11: 0000000002bed400 R12: ffff888237c2fc00 [ 55.852196] R13: 0000000000000000 R14: ffffffff810e35e6 R15: ffffe8ffff4376d0 [ 55.853147] FS: 00007f255b2006c0(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 55.854220] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 55.854935] CR2: ffff888107094a40 CR3: 0000000109766003 CR4: 0000000000370ef0 [ 55.855825] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 55.856705] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 55.857613] Kernel panic - not syncing: Fatal exception [ 55.858599] Kernel Offset: disabled [ 55.859110] ---[ end Kernel panic - not syncing: Fatal exception ]--- There are a few other test failure as well. But I think resolving this issue might help other failures too. # # Automatically generated file; DO NOT EDIT. # Linux/x86 6.11.0 Kernel Configuration # CONFIG_CC_VERSION_TEXT="clang version 20.0.0git (https://github.com/llvm/llvm-project.git bfb340ec205a6fd967036aaabaf170f0c18a0f39)" CONFIG_GCC_VERSION=0 CONFIG_CC_IS_CLANG=y CONFIG_CLANG_VERSION=200000 CONFIG_AS_IS_LLVM=y CONFIG_AS_VERSION=200000 CONFIG_LD_VERSION=0 CONFIG_LD_IS_LLD=y CONFIG_LLD_VERSION=200000 CONFIG_CC_CAN_LINK=y CONFIG_CC_HAS_ASM_GOTO_OUTPUT=y CONFIG_CC_HAS_ASM_GOTO_TIED_OUTPUT=y CONFIG_TOOLS_SUPPORT_RELR=y CONFIG_CC_HAS_ASM_INLINE=y CONFIG_CC_HAS_NO_PROFILE_FN_ATTR=y CONFIG_PAHOLE_VERSION=127 CONFIG_IRQ_WORK=y CONFIG_BUILDTIME_TABLE_SORT=y CONFIG_THREAD_INFO_IN_TASK=y # # General setup # CONFIG_INIT_ENV_ARG_LIMIT=32 # CONFIG_COMPILE_TEST is not set CONFIG_WERROR=y CONFIG_LOCALVERSION="" CONFIG_LOCALVERSION_AUTO=y CONFIG_BUILD_SALT="" CONFIG_HAVE_KERNEL_GZIP=y CONFIG_HAVE_KERNEL_BZIP2=y CONFIG_HAVE_KERNEL_LZMA=y CONFIG_HAVE_KERNEL_XZ=y CONFIG_HAVE_KERNEL_LZO=y CONFIG_HAVE_KERNEL_LZ4=y CONFIG_HAVE_KERNEL_ZSTD=y CONFIG_KERNEL_GZIP=y # CONFIG_KERNEL_BZIP2 is not set # CONFIG_KERNEL_LZMA is not set # CONFIG_KERNEL_XZ is not set # CONFIG_KERNEL_LZO is not set # CONFIG_KERNEL_LZ4 is not set # CONFIG_KERNEL_ZSTD is not set CONFIG_DEFAULT_INIT="" CONFIG_DEFAULT_HOSTNAME="(none)" CONFIG_SYSVIPC=y CONFIG_SYSVIPC_SYSCTL=y CONFIG_SYSVIPC_COMPAT=y CONFIG_POSIX_MQUEUE=y CONFIG_POSIX_MQUEUE_SYSCTL=y # CONFIG_WATCH_QUEUE is not set CONFIG_CROSS_MEMORY_ATTACH=y # CONFIG_USELIB is not set CONFIG_AUDIT=y CONFIG_HAVE_ARCH_AUDITSYSCALL=y CONFIG_AUDITSYSCALL=y # # IRQ subsystem # CONFIG_GENERIC_IRQ_PROBE=y CONFIG_GENERIC_IRQ_SHOW=y CONFIG_GENERIC_IRQ_EFFECTIVE_AFF_MASK=y CONFIG_GENERIC_PENDING_IRQ=y CONFIG_GENERIC_IRQ_MIGRATION=y CONFIG_HARDIRQS_SW_RESEND=y CONFIG_IRQ_DOMAIN=y CONFIG_IRQ_DOMAIN_HIERARCHY=y CONFIG_GENERIC_MSI_IRQ=y CONFIG_IRQ_MSI_IOMMU=y CONFIG_GENERIC_IRQ_MATRIX_ALLOCATOR=y CONFIG_GENERIC_IRQ_RESERVATION_MODE=y CONFIG_IRQ_FORCED_THREADING=y CONFIG_SPARSE_IRQ=y # CONFIG_GENERIC_IRQ_DEBUGFS is not set # end of IRQ subsystem CONFIG_CLOCKSOURCE_WATCHDOG=y CONFIG_ARCH_CLOCKSOURCE_INIT=y CONFIG_CLOCKSOURCE_VALIDATE_LAST_CYCLE=y CONFIG_GENERIC_TIME_VSYSCALL=y CONFIG_GENERIC_CLOCKEVENTS=y CONFIG_GENERIC_CLOCKEVENTS_BROADCAST=y CONFIG_GENERIC_CLOCKEVENTS_BROADCAST_IDLE=y CONFIG_GENERIC_CLOCKEVENTS_MIN_ADJUST=y CONFIG_GENERIC_CMOS_UPDATE=y CONFIG_HAVE_POSIX_CPU_TIMERS_TASK_WORK=y CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y CONFIG_CONTEXT_TRACKING=y CONFIG_CONTEXT_TRACKING_IDLE=y # # Timers subsystem # CONFIG_TICK_ONESHOT=y CONFIG_NO_HZ_COMMON=y # CONFIG_HZ_PERIODIC is not set CONFIG_NO_HZ_IDLE=y # CONFIG_NO_HZ_FULL is not set CONFIG_NO_HZ=y CONFIG_HIGH_RES_TIMERS=y CONFIG_CLOCKSOURCE_WATCHDOG_MAX_SKEW_US=100 # end of Timers subsystem CONFIG_BPF=y CONFIG_HAVE_EBPF_JIT=y CONFIG_ARCH_WANT_DEFAULT_BPF_JIT=y # # BPF subsystem # CONFIG_BPF_SYSCALL=y CONFIG_BPF_JIT=y # CONFIG_BPF_JIT_ALWAYS_ON is not set CONFIG_BPF_JIT_DEFAULT_ON=y # CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set CONFIG_USERMODE_DRIVER=y CONFIG_BPF_PRELOAD=y CONFIG_BPF_PRELOAD_UMD=y CONFIG_BPF_LSM=y # end of BPF subsystem CONFIG_PREEMPT_BUILD=y # CONFIG_PREEMPT_NONE is not set # CONFIG_PREEMPT_VOLUNTARY is not set CONFIG_PREEMPT=y # CONFIG_PREEMPT_RT is not set CONFIG_PREEMPT_COUNT=y CONFIG_PREEMPTION=y CONFIG_PREEMPT_DYNAMIC=y # CONFIG_SCHED_CORE is not set CONFIG_SCHED_CLASS_EXT=y # # CPU/Task time and stats accounting # CONFIG_TICK_CPU_ACCOUNTING=y # CONFIG_VIRT_CPU_ACCOUNTING_GEN is not set # CONFIG_IRQ_TIME_ACCOUNTING is not set CONFIG_BSD_PROCESS_ACCT=y # CONFIG_BSD_PROCESS_ACCT_V3 is not set CONFIG_TASKSTATS=y CONFIG_TASK_DELAY_ACCT=y CONFIG_TASK_XACCT=y CONFIG_TASK_IO_ACCOUNTING=y CONFIG_PSI=y # CONFIG_PSI_DEFAULT_DISABLED is not set # end of CPU/Task time and stats accounting # CONFIG_CPU_ISOLATION is not set # # RCU Subsystem # CONFIG_TREE_RCU=y CONFIG_PREEMPT_RCU=y # CONFIG_RCU_EXPERT is not set CONFIG_TREE_SRCU=y CONFIG_TASKS_RCU_GENERIC=y CONFIG_NEED_TASKS_RCU=y CONFIG_TASKS_RCU=y CONFIG_TASKS_RUDE_RCU=y CONFIG_TASKS_TRACE_RCU=y CONFIG_RCU_STALL_COMMON=y CONFIG_RCU_NEED_SEGCBLIST=y # end of RCU Subsystem CONFIG_IKCONFIG=y CONFIG_IKCONFIG_PROC=y # CONFIG_IKHEADERS is not set CONFIG_LOG_BUF_SHIFT=21 CONFIG_LOG_CPU_MAX_BUF_SHIFT=0 CONFIG_PRINTK_INDEX=y CONFIG_HAVE_UNSTABLE_SCHED_CLOCK=y # # Scheduler features # # CONFIG_UCLAMP_TASK is not set # end of Scheduler features CONFIG_ARCH_SUPPORTS_NUMA_BALANCING=y CONFIG_ARCH_WANT_BATCHED_UNMAP_TLB_FLUSH=y CONFIG_CC_HAS_INT128=y CONFIG_CC_IMPLICIT_FALLTHROUGH="-Wimplicit-fallthrough" CONFIG_GCC10_NO_ARRAY_BOUNDS=y CONFIG_GCC_NO_STRINGOP_OVERFLOW=y CONFIG_ARCH_SUPPORTS_INT128=y CONFIG_NUMA_BALANCING=y # CONFIG_NUMA_BALANCING_DEFAULT_ENABLED is not set CONFIG_SLAB_OBJ_EXT=y CONFIG_CGROUPS=y CONFIG_PAGE_COUNTER=y # CONFIG_CGROUP_FAVOR_DYNMODS is not set CONFIG_MEMCG=y # CONFIG_MEMCG_V1 is not set CONFIG_BLK_CGROUP=y CONFIG_CGROUP_WRITEBACK=y CONFIG_CGROUP_SCHED=y CONFIG_GROUP_SCHED_WEIGHT=y CONFIG_FAIR_GROUP_SCHED=y CONFIG_CFS_BANDWIDTH=y # CONFIG_RT_GROUP_SCHED is not set CONFIG_EXT_GROUP_SCHED=y CONFIG_SCHED_MM_CID=y # CONFIG_CGROUP_PIDS is not set # CONFIG_CGROUP_RDMA is not set CONFIG_CGROUP_FREEZER=y CONFIG_CGROUP_HUGETLB=y CONFIG_CPUSETS=y # CONFIG_CPUSETS_V1 is not set CONFIG_PROC_PID_CPUSET=y CONFIG_CGROUP_DEVICE=y CONFIG_CGROUP_CPUACCT=y CONFIG_CGROUP_PERF=y CONFIG_CGROUP_BPF=y # CONFIG_CGROUP_MISC is not set # CONFIG_CGROUP_DEBUG is not set CONFIG_SOCK_CGROUP_DATA=y CONFIG_NAMESPACES=y CONFIG_UTS_NS=y # CONFIG_TIME_NS is not set CONFIG_IPC_NS=y CONFIG_USER_NS=y CONFIG_PID_NS=y CONFIG_NET_NS=y # CONFIG_CHECKPOINT_RESTORE is not set # CONFIG_SCHED_AUTOGROUP is not set CONFIG_RELAY=y CONFIG_BLK_DEV_INITRD=y CONFIG_INITRAMFS_SOURCE="" CONFIG_RD_GZIP=y CONFIG_RD_BZIP2=y CONFIG_RD_LZMA=y CONFIG_RD_XZ=y CONFIG_RD_LZO=y CONFIG_RD_LZ4=y CONFIG_RD_ZSTD=y # CONFIG_BOOT_CONFIG is not set CONFIG_INITRAMFS_PRESERVE_MTIME=y CONFIG_CC_OPTIMIZE_FOR_PERFORMANCE=y # CONFIG_CC_OPTIMIZE_FOR_SIZE is not set CONFIG_LD_ORPHAN_WARN=y CONFIG_LD_ORPHAN_WARN_LEVEL="error" CONFIG_SYSCTL=y CONFIG_HAVE_UID16=y CONFIG_SYSCTL_EXCEPTION_TRACE=y CONFIG_HAVE_PCSPKR_PLATFORM=y CONFIG_EXPERT=y CONFIG_UID16=y CONFIG_MULTIUSER=y CONFIG_SGETMASK_SYSCALL=y # CONFIG_SYSFS_SYSCALL is not set CONFIG_FHANDLE=y CONFIG_POSIX_TIMERS=y CONFIG_PRINTK=y CONFIG_BUG=y CONFIG_ELF_CORE=y CONFIG_PCSPKR_PLATFORM=y # CONFIG_BASE_SMALL is not set CONFIG_FUTEX=y CONFIG_FUTEX_PI=y CONFIG_EPOLL=y CONFIG_SIGNALFD=y CONFIG_TIMERFD=y CONFIG_EVENTFD=y CONFIG_SHMEM=y CONFIG_AIO=y CONFIG_IO_URING=y CONFIG_ADVISE_SYSCALLS=y CONFIG_MEMBARRIER=y CONFIG_KCMP=y CONFIG_RSEQ=y # CONFIG_DEBUG_RSEQ is not set CONFIG_CACHESTAT_SYSCALL=y # CONFIG_PC104 is not set CONFIG_KALLSYMS=y # CONFIG_KALLSYMS_SELFTEST is not set CONFIG_KALLSYMS_ALL=y CONFIG_KALLSYMS_ABSOLUTE_PERCPU=y CONFIG_ARCH_HAS_MEMBARRIER_SYNC_CORE=y CONFIG_HAVE_PERF_EVENTS=y CONFIG_GUEST_PERF_EVENTS=y # # Kernel Performance Events And Counters # CONFIG_PERF_EVENTS=y # CONFIG_DEBUG_PERF_USE_VMALLOC is not set # end of Kernel Performance Events And Counters CONFIG_SYSTEM_DATA_VERIFICATION=y CONFIG_PROFILING=y CONFIG_TRACEPOINTS=y # # Kexec and crash features # CONFIG_VMCORE_INFO=y CONFIG_KEXEC_CORE=y CONFIG_KEXEC=y # CONFIG_KEXEC_FILE is not set # CONFIG_CRASH_DUMP is not set # end of Kexec and crash features # end of General setup CONFIG_64BIT=y CONFIG_X86_64=y CONFIG_X86=y CONFIG_INSTRUCTION_DECODER=y CONFIG_OUTPUT_FORMAT="elf64-x86-64" CONFIG_LOCKDEP_SUPPORT=y CONFIG_STACKTRACE_SUPPORT=y CONFIG_MMU=y CONFIG_ARCH_MMAP_RND_BITS_MIN=28 CONFIG_ARCH_MMAP_RND_BITS_MAX=32 CONFIG_ARCH_MMAP_RND_COMPAT_BITS_MIN=8 CONFIG_ARCH_MMAP_RND_COMPAT_BITS_MAX=16 CONFIG_GENERIC_ISA_DMA=y CONFIG_GENERIC_BUG=y CONFIG_GENERIC_BUG_RELATIVE_POINTERS=y CONFIG_ARCH_MAY_HAVE_PC_FDC=y CONFIG_GENERIC_CALIBRATE_DELAY=y CONFIG_ARCH_HAS_CPU_RELAX=y CONFIG_ARCH_HIBERNATION_POSSIBLE=y CONFIG_ARCH_SUSPEND_POSSIBLE=y CONFIG_AUDIT_ARCH=y CONFIG_HAVE_INTEL_TXT=y CONFIG_X86_64_SMP=y CONFIG_ARCH_SUPPORTS_UPROBES=y CONFIG_FIX_EARLYCON_MEM=y CONFIG_PGTABLE_LEVELS=4 CONFIG_CC_HAS_SANE_STACKPROTECTOR=y # # Processor type and features # CONFIG_SMP=y CONFIG_X86_X2APIC=y # CONFIG_X86_POSTED_MSI is not set CONFIG_X86_MPPARSE=y # CONFIG_X86_CPU_RESCTRL is not set # CONFIG_X86_FRED is not set CONFIG_X86_EXTENDED_PLATFORM=y # CONFIG_X86_NUMACHIP is not set # CONFIG_X86_VSMP is not set # CONFIG_X86_UV is not set # CONFIG_X86_GOLDFISH is not set # CONFIG_X86_INTEL_MID is not set # CONFIG_X86_INTEL_LPSS is not set # CONFIG_X86_AMD_PLATFORM_DEVICE is not set CONFIG_IOSF_MBI=m # CONFIG_IOSF_MBI_DEBUG is not set CONFIG_X86_SUPPORTS_MEMORY_FAILURE=y # CONFIG_SCHED_OMIT_FRAME_POINTER is not set # CONFIG_HYPERVISOR_GUEST is not set # CONFIG_MK8 is not set # CONFIG_MPSC is not set CONFIG_MCORE2=y # CONFIG_MATOM is not set # CONFIG_GENERIC_CPU is not set CONFIG_X86_INTERNODE_CACHE_SHIFT=6 CONFIG_X86_L1_CACHE_SHIFT=6 CONFIG_X86_INTEL_USERCOPY=y CONFIG_X86_USE_PPRO_CHECKSUM=y CONFIG_X86_P6_NOP=y CONFIG_X86_TSC=y CONFIG_X86_HAVE_PAE=y CONFIG_X86_CMPXCHG64=y CONFIG_X86_CMOV=y CONFIG_X86_MINIMUM_CPU_FAMILY=64 CONFIG_X86_DEBUGCTLMSR=y CONFIG_IA32_FEAT_CTL=y CONFIG_X86_VMX_FEATURE_NAMES=y # CONFIG_PROCESSOR_SELECT is not set CONFIG_CPU_SUP_INTEL=y CONFIG_CPU_SUP_AMD=y CONFIG_CPU_SUP_HYGON=y CONFIG_CPU_SUP_CENTAUR=y CONFIG_CPU_SUP_ZHAOXIN=y CONFIG_HPET_TIMER=y CONFIG_HPET_EMULATE_RTC=y CONFIG_DMI=y CONFIG_GART_IOMMU=y CONFIG_BOOT_VESA_SUPPORT=y # CONFIG_MAXSMP is not set CONFIG_NR_CPUS_RANGE_BEGIN=2 CONFIG_NR_CPUS_RANGE_END=512 CONFIG_NR_CPUS_DEFAULT=64 CONFIG_NR_CPUS=128 CONFIG_SCHED_CLUSTER=y CONFIG_SCHED_SMT=y CONFIG_SCHED_MC=y CONFIG_SCHED_MC_PRIO=y CONFIG_X86_LOCAL_APIC=y CONFIG_ACPI_MADT_WAKEUP=y CONFIG_X86_IO_APIC=y # CONFIG_X86_REROUTE_FOR_BROKEN_BOOT_IRQS is not set CONFIG_X86_MCE=y # CONFIG_X86_MCELOG_LEGACY is not set CONFIG_X86_MCE_INTEL=y CONFIG_X86_MCE_AMD=y CONFIG_X86_MCE_THRESHOLD=y # CONFIG_X86_MCE_INJECT is not set # # Performance monitoring # CONFIG_PERF_EVENTS_INTEL_UNCORE=y # CONFIG_PERF_EVENTS_INTEL_RAPL is not set # CONFIG_PERF_EVENTS_INTEL_CSTATE is not set # CONFIG_PERF_EVENTS_AMD_POWER is not set # CONFIG_PERF_EVENTS_AMD_UNCORE is not set # CONFIG_PERF_EVENTS_AMD_BRS is not set # end of Performance monitoring # CONFIG_X86_16BIT is not set CONFIG_X86_VSYSCALL_EMULATION=y CONFIG_X86_IOPL_IOPERM=y CONFIG_MICROCODE=y # CONFIG_MICROCODE_LATE_LOADING is not set CONFIG_X86_MSR=y CONFIG_X86_CPUID=y # CONFIG_X86_5LEVEL is not set CONFIG_X86_DIRECT_GBPAGES=y # CONFIG_X86_CPA_STATISTICS is not set # CONFIG_AMD_MEM_ENCRYPT is not set CONFIG_NUMA=y CONFIG_AMD_NUMA=y CONFIG_X86_64_ACPI_NUMA=y CONFIG_NODES_SHIFT=6 CONFIG_ARCH_SPARSEMEM_ENABLE=y CONFIG_ARCH_SPARSEMEM_DEFAULT=y CONFIG_ARCH_PROC_KCORE_TEXT=y CONFIG_ILLEGAL_POINTER_VALUE=0xdead000000000000 # CONFIG_X86_PMEM_LEGACY is not set # CONFIG_X86_CHECK_BIOS_CORRUPTION is not set CONFIG_MTRR=y # CONFIG_MTRR_SANITIZER is not set CONFIG_X86_PAT=y CONFIG_X86_UMIP=y CONFIG_CC_HAS_IBT=y CONFIG_X86_CET=y CONFIG_X86_KERNEL_IBT=y # CONFIG_X86_INTEL_MEMORY_PROTECTION_KEYS is not set CONFIG_ARCH_PKEY_BITS=4 CONFIG_X86_INTEL_TSX_MODE_OFF=y # CONFIG_X86_INTEL_TSX_MODE_ON is not set # CONFIG_X86_INTEL_TSX_MODE_AUTO is not set CONFIG_X86_SGX=y # CONFIG_X86_USER_SHADOW_STACK is not set CONFIG_EFI=y CONFIG_EFI_STUB=y CONFIG_EFI_HANDOVER_PROTOCOL=y # CONFIG_EFI_MIXED is not set CONFIG_EFI_RUNTIME_MAP=y # CONFIG_HZ_100 is not set # CONFIG_HZ_250 is not set # CONFIG_HZ_300 is not set CONFIG_HZ_1000=y CONFIG_HZ=1000 CONFIG_SCHED_HRTICK=y CONFIG_ARCH_SUPPORTS_KEXEC=y CONFIG_ARCH_SUPPORTS_KEXEC_FILE=y CONFIG_ARCH_SUPPORTS_KEXEC_PURGATORY=y CONFIG_ARCH_SUPPORTS_KEXEC_SIG=y CONFIG_ARCH_SUPPORTS_KEXEC_SIG_FORCE=y CONFIG_ARCH_SUPPORTS_KEXEC_BZIMAGE_VERIFY_SIG=y CONFIG_ARCH_SUPPORTS_KEXEC_JUMP=y CONFIG_ARCH_SUPPORTS_CRASH_DUMP=y CONFIG_ARCH_SUPPORTS_CRASH_HOTPLUG=y CONFIG_PHYSICAL_START=0x1000000 CONFIG_RELOCATABLE=y # CONFIG_RANDOMIZE_BASE is not set CONFIG_PHYSICAL_ALIGN=0x1000000 # CONFIG_ADDRESS_MASKING is not set CONFIG_HOTPLUG_CPU=y CONFIG_COMPAT_VDSO=y # CONFIG_LEGACY_VSYSCALL_XONLY is not set CONFIG_LEGACY_VSYSCALL_NONE=y # CONFIG_CMDLINE_BOOL is not set CONFIG_MODIFY_LDT_SYSCALL=y # CONFIG_STRICT_SIGALTSTACK_SIZE is not set CONFIG_HAVE_LIVEPATCH=y # CONFIG_LIVEPATCH is not set # end of Processor type and features CONFIG_CC_HAS_SLS=y CONFIG_CC_HAS_RETURN_THUNK=y CONFIG_CC_HAS_ENTRY_PADDING=y CONFIG_FUNCTION_PADDING_CFI=11 CONFIG_FUNCTION_PADDING_BYTES=16 CONFIG_CALL_PADDING=y CONFIG_HAVE_CALL_THUNKS=y CONFIG_CALL_THUNKS=y CONFIG_PREFIX_SYMBOLS=y CONFIG_CPU_MITIGATIONS=y CONFIG_MITIGATION_PAGE_TABLE_ISOLATION=y CONFIG_MITIGATION_RETPOLINE=y CONFIG_MITIGATION_RETHUNK=y CONFIG_MITIGATION_UNRET_ENTRY=y CONFIG_MITIGATION_CALL_DEPTH_TRACKING=y # CONFIG_CALL_THUNKS_DEBUG is not set CONFIG_MITIGATION_IBPB_ENTRY=y CONFIG_MITIGATION_IBRS_ENTRY=y CONFIG_MITIGATION_SRSO=y # CONFIG_MITIGATION_SLS is not set # CONFIG_MITIGATION_GDS is not set CONFIG_MITIGATION_RFDS=y CONFIG_MITIGATION_SPECTRE_BHI=y # CONFIG_MITIGATION_MDS is not set # CONFIG_MITIGATION_TAA is not set # CONFIG_MITIGATION_MMIO_STALE_DATA is not set CONFIG_MITIGATION_L1TF=y CONFIG_MITIGATION_RETBLEED=y CONFIG_MITIGATION_SPECTRE_V1=y CONFIG_MITIGATION_SPECTRE_V2=y CONFIG_MITIGATION_SRBDS=y CONFIG_MITIGATION_SSB=y CONFIG_ARCH_HAS_ADD_PAGES=y # # Power management and ACPI options # CONFIG_SUSPEND=y CONFIG_SUSPEND_FREEZER=y # CONFIG_SUSPEND_SKIP_SYNC is not set # CONFIG_HIBERNATION is not set CONFIG_PM_SLEEP=y CONFIG_PM_SLEEP_SMP=y # CONFIG_PM_AUTOSLEEP is not set # CONFIG_PM_USERSPACE_AUTOSLEEP is not set # CONFIG_PM_WAKELOCKS is not set CONFIG_PM=y # CONFIG_PM_DEBUG is not set CONFIG_PM_CLK=y # CONFIG_WQ_POWER_EFFICIENT_DEFAULT is not set # CONFIG_ENERGY_MODEL is not set CONFIG_ARCH_SUPPORTS_ACPI=y CONFIG_ACPI=y CONFIG_ACPI_LEGACY_TABLES_LOOKUP=y CONFIG_ARCH_MIGHT_HAVE_ACPI_PDC=y CONFIG_ACPI_SYSTEM_POWER_STATES_SUPPORT=y CONFIG_ACPI_THERMAL_LIB=y # CONFIG_ACPI_DEBUGGER is not set CONFIG_ACPI_SPCR_TABLE=y # CONFIG_ACPI_FPDT is not set CONFIG_ACPI_LPIT=y CONFIG_ACPI_SLEEP=y CONFIG_ACPI_REV_OVERRIDE_POSSIBLE=y # CONFIG_ACPI_EC_DEBUGFS is not set CONFIG_ACPI_AC=m CONFIG_ACPI_BATTERY=m CONFIG_ACPI_BUTTON=m # CONFIG_ACPI_TINY_POWER_BUTTON is not set CONFIG_ACPI_VIDEO=m CONFIG_ACPI_FAN=y # CONFIG_ACPI_TAD is not set CONFIG_ACPI_DOCK=y CONFIG_ACPI_CPU_FREQ_PSS=y CONFIG_ACPI_PROCESSOR_CSTATE=y CONFIG_ACPI_PROCESSOR_IDLE=y CONFIG_ACPI_CPPC_LIB=y CONFIG_ACPI_PROCESSOR=y # CONFIG_ACPI_IPMI is not set CONFIG_ACPI_HOTPLUG_CPU=y # CONFIG_ACPI_PROCESSOR_AGGREGATOR is not set CONFIG_ACPI_THERMAL=y CONFIG_ARCH_HAS_ACPI_TABLE_UPGRADE=y # CONFIG_ACPI_TABLE_UPGRADE is not set # CONFIG_ACPI_DEBUG is not set # CONFIG_ACPI_PCI_SLOT is not set CONFIG_ACPI_CONTAINER=y CONFIG_ACPI_HOTPLUG_IOAPIC=y CONFIG_ACPI_SBS=m # CONFIG_ACPI_HED is not set # CONFIG_ACPI_BGRT is not set # CONFIG_ACPI_REDUCED_HARDWARE_ONLY is not set # CONFIG_ACPI_NFIT is not set CONFIG_ACPI_NUMA=y # CONFIG_ACPI_HMAT is not set CONFIG_HAVE_ACPI_APEI=y CONFIG_HAVE_ACPI_APEI_NMI=y # CONFIG_ACPI_APEI is not set # CONFIG_ACPI_DPTF is not set # CONFIG_ACPI_CONFIGFS is not set # CONFIG_ACPI_PFRUT is not set CONFIG_ACPI_PCC=y # CONFIG_ACPI_FFH is not set # CONFIG_PMIC_OPREGION is not set CONFIG_ACPI_PRMT=y CONFIG_X86_PM_TIMER=y # # CPU Frequency scaling # CONFIG_CPU_FREQ=y CONFIG_CPU_FREQ_GOV_ATTR_SET=y CONFIG_CPU_FREQ_GOV_COMMON=y CONFIG_CPU_FREQ_STAT=y CONFIG_CPU_FREQ_DEFAULT_GOV_PERFORMANCE=y # CONFIG_CPU_FREQ_DEFAULT_GOV_POWERSAVE is not set # CONFIG_CPU_FREQ_DEFAULT_GOV_USERSPACE is not set # CONFIG_CPU_FREQ_DEFAULT_GOV_SCHEDUTIL is not set CONFIG_CPU_FREQ_GOV_PERFORMANCE=y CONFIG_CPU_FREQ_GOV_POWERSAVE=m CONFIG_CPU_FREQ_GOV_USERSPACE=y CONFIG_CPU_FREQ_GOV_ONDEMAND=y CONFIG_CPU_FREQ_GOV_CONSERVATIVE=y CONFIG_CPU_FREQ_GOV_SCHEDUTIL=y # # CPU frequency scaling drivers # CONFIG_X86_INTEL_PSTATE=y # CONFIG_X86_PCC_CPUFREQ is not set CONFIG_X86_AMD_PSTATE=y CONFIG_X86_AMD_PSTATE_DEFAULT_MODE=3 # CONFIG_X86_AMD_PSTATE_UT is not set CONFIG_X86_ACPI_CPUFREQ=y CONFIG_X86_ACPI_CPUFREQ_CPB=y CONFIG_X86_POWERNOW_K8=y # CONFIG_X86_AMD_FREQ_SENSITIVITY is not set # CONFIG_X86_SPEEDSTEP_CENTRINO is not set # CONFIG_X86_P4_CLOCKMOD is not set # # shared options # # end of CPU Frequency scaling # # CPU Idle # CONFIG_CPU_IDLE=y CONFIG_CPU_IDLE_GOV_LADDER=y CONFIG_CPU_IDLE_GOV_MENU=y # CONFIG_CPU_IDLE_GOV_TEO is not set # end of CPU Idle CONFIG_INTEL_IDLE=y # end of Power management and ACPI options # # Bus options (PCI etc.) # CONFIG_PCI_DIRECT=y CONFIG_PCI_MMCONFIG=y CONFIG_MMCONF_FAM10H=y # CONFIG_PCI_CNB20LE_QUIRK is not set # CONFIG_ISA_BUS is not set CONFIG_ISA_DMA_API=y CONFIG_AMD_NB=y # end of Bus options (PCI etc.) # # Binary Emulations # CONFIG_IA32_EMULATION=y # CONFIG_IA32_EMULATION_DEFAULT_DISABLED is not set CONFIG_COMPAT_32=y CONFIG_COMPAT=y CONFIG_COMPAT_FOR_U64_ALIGNMENT=y # end of Binary Emulations CONFIG_KVM_COMMON=y CONFIG_HAVE_KVM_PFNCACHE=y CONFIG_HAVE_KVM_IRQCHIP=y CONFIG_HAVE_KVM_IRQ_ROUTING=y CONFIG_HAVE_KVM_DIRTY_RING=y CONFIG_HAVE_KVM_DIRTY_RING_TSO=y CONFIG_HAVE_KVM_DIRTY_RING_ACQ_REL=y CONFIG_KVM_MMIO=y CONFIG_KVM_ASYNC_PF=y CONFIG_HAVE_KVM_MSI=y CONFIG_HAVE_KVM_READONLY_MEM=y CONFIG_HAVE_KVM_CPU_RELAX_INTERCEPT=y CONFIG_KVM_VFIO=y CONFIG_KVM_GENERIC_DIRTYLOG_READ_PROTECT=y CONFIG_KVM_GENERIC_PRE_FAULT_MEMORY=y CONFIG_KVM_COMPAT=y CONFIG_HAVE_KVM_IRQ_BYPASS=y CONFIG_HAVE_KVM_NO_POLL=y CONFIG_KVM_XFER_TO_GUEST_WORK=y CONFIG_HAVE_KVM_PM_NOTIFIER=y CONFIG_KVM_GENERIC_HARDWARE_ENABLING=y CONFIG_KVM_GENERIC_MMU_NOTIFIER=y CONFIG_VIRTUALIZATION=y CONFIG_KVM=m CONFIG_KVM_WERROR=y # CONFIG_KVM_SW_PROTECTED_VM is not set CONFIG_KVM_INTEL=m CONFIG_KVM_INTEL_PROVE_VE=y # CONFIG_X86_SGX_KVM is not set CONFIG_KVM_AMD=m CONFIG_KVM_SMM=y CONFIG_KVM_HYPERV=y # CONFIG_KVM_XEN is not set # CONFIG_KVM_PROVE_MMU is not set CONFIG_KVM_MAX_NR_VCPUS=1024 CONFIG_AS_AVX512=y CONFIG_AS_SHA1_NI=y CONFIG_AS_SHA256_NI=y CONFIG_AS_TPAUSE=y CONFIG_AS_GFNI=y CONFIG_AS_VAES=y CONFIG_AS_VPCLMULQDQ=y CONFIG_AS_WRUSS=y CONFIG_ARCH_CONFIGURES_CPU_MITIGATIONS=y CONFIG_ARCH_HAS_DMA_OPS=y # # General architecture-dependent options # CONFIG_HOTPLUG_SMT=y CONFIG_HOTPLUG_CORE_SYNC=y CONFIG_HOTPLUG_CORE_SYNC_DEAD=y CONFIG_HOTPLUG_CORE_SYNC_FULL=y CONFIG_HOTPLUG_SPLIT_STARTUP=y CONFIG_HOTPLUG_PARALLEL=y CONFIG_GENERIC_ENTRY=y CONFIG_KPROBES=y CONFIG_JUMP_LABEL=y # CONFIG_STATIC_KEYS_SELFTEST is not set # CONFIG_STATIC_CALL_SELFTEST is not set CONFIG_OPTPROBES=y CONFIG_KPROBES_ON_FTRACE=y CONFIG_UPROBES=y CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS=y CONFIG_ARCH_USE_BUILTIN_BSWAP=y CONFIG_KRETPROBES=y CONFIG_KRETPROBE_ON_RETHOOK=y CONFIG_USER_RETURN_NOTIFIER=y CONFIG_HAVE_IOREMAP_PROT=y CONFIG_HAVE_KPROBES=y CONFIG_HAVE_KRETPROBES=y CONFIG_HAVE_OPTPROBES=y CONFIG_HAVE_KPROBES_ON_FTRACE=y CONFIG_ARCH_CORRECT_STACKTRACE_ON_KRETPROBE=y CONFIG_HAVE_FUNCTION_ERROR_INJECTION=y CONFIG_HAVE_NMI=y CONFIG_TRACE_IRQFLAGS_SUPPORT=y CONFIG_TRACE_IRQFLAGS_NMI_SUPPORT=y CONFIG_HAVE_ARCH_TRACEHOOK=y CONFIG_HAVE_DMA_CONTIGUOUS=y CONFIG_GENERIC_SMP_IDLE_THREAD=y CONFIG_ARCH_HAS_FORTIFY_SOURCE=y CONFIG_ARCH_HAS_SET_MEMORY=y CONFIG_ARCH_HAS_SET_DIRECT_MAP=y CONFIG_ARCH_HAS_CPU_FINALIZE_INIT=y CONFIG_HAVE_ARCH_THREAD_STRUCT_WHITELIST=y CONFIG_ARCH_WANTS_DYNAMIC_TASK_STRUCT=y CONFIG_ARCH_WANTS_NO_INSTR=y CONFIG_HAVE_ASM_MODVERSIONS=y CONFIG_HAVE_REGS_AND_STACK_ACCESS_API=y CONFIG_HAVE_RSEQ=y CONFIG_HAVE_RUST=y CONFIG_HAVE_FUNCTION_ARG_ACCESS_API=y CONFIG_HAVE_HW_BREAKPOINT=y CONFIG_HAVE_MIXED_BREAKPOINTS_REGS=y CONFIG_HAVE_USER_RETURN_NOTIFIER=y CONFIG_HAVE_PERF_EVENTS_NMI=y CONFIG_HAVE_HARDLOCKUP_DETECTOR_PERF=y CONFIG_HAVE_PERF_REGS=y CONFIG_HAVE_PERF_USER_STACK_DUMP=y CONFIG_HAVE_ARCH_JUMP_LABEL=y CONFIG_HAVE_ARCH_JUMP_LABEL_RELATIVE=y CONFIG_MMU_GATHER_MERGE_VMAS=y CONFIG_MMU_LAZY_TLB_REFCOUNT=y CONFIG_ARCH_HAVE_NMI_SAFE_CMPXCHG=y CONFIG_ARCH_HAVE_EXTRA_ELF_NOTES=y CONFIG_ARCH_HAS_NMI_SAFE_THIS_CPU_OPS=y CONFIG_HAVE_ALIGNED_STRUCT_PAGE=y CONFIG_HAVE_CMPXCHG_LOCAL=y CONFIG_HAVE_CMPXCHG_DOUBLE=y CONFIG_ARCH_WANT_COMPAT_IPC_PARSE_VERSION=y CONFIG_ARCH_WANT_OLD_COMPAT_IPC=y CONFIG_HAVE_ARCH_SECCOMP=y CONFIG_HAVE_ARCH_SECCOMP_FILTER=y CONFIG_SECCOMP=y CONFIG_SECCOMP_FILTER=y # CONFIG_SECCOMP_CACHE_DEBUG is not set CONFIG_HAVE_ARCH_STACKLEAK=y CONFIG_HAVE_STACKPROTECTOR=y # CONFIG_STACKPROTECTOR is not set CONFIG_ARCH_SUPPORTS_LTO_CLANG=y CONFIG_ARCH_SUPPORTS_LTO_CLANG_THIN=y CONFIG_HAS_LTO_CLANG=y CONFIG_LTO_NONE=y # CONFIG_LTO_CLANG_FULL is not set # CONFIG_LTO_CLANG_THIN is not set CONFIG_ARCH_SUPPORTS_CFI_CLANG=y # CONFIG_CFI_CLANG is not set CONFIG_HAVE_ARCH_WITHIN_STACK_FRAMES=y CONFIG_HAVE_CONTEXT_TRACKING_USER=y CONFIG_HAVE_CONTEXT_TRACKING_USER_OFFSTACK=y CONFIG_HAVE_VIRT_CPU_ACCOUNTING_GEN=y CONFIG_HAVE_IRQ_TIME_ACCOUNTING=y CONFIG_HAVE_MOVE_PUD=y CONFIG_HAVE_MOVE_PMD=y CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE=y CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD=y CONFIG_HAVE_ARCH_HUGE_VMAP=y CONFIG_HAVE_ARCH_HUGE_VMALLOC=y CONFIG_ARCH_WANT_HUGE_PMD_SHARE=y CONFIG_ARCH_WANT_PMD_MKWRITE=y CONFIG_HAVE_ARCH_SOFT_DIRTY=y CONFIG_HAVE_MOD_ARCH_SPECIFIC=y CONFIG_MODULES_USE_ELF_RELA=y CONFIG_HAVE_IRQ_EXIT_ON_IRQ_STACK=y CONFIG_HAVE_SOFTIRQ_ON_OWN_STACK=y CONFIG_SOFTIRQ_ON_OWN_STACK=y CONFIG_ARCH_HAS_ELF_RANDOMIZE=y CONFIG_HAVE_ARCH_MMAP_RND_BITS=y CONFIG_HAVE_EXIT_THREAD=y CONFIG_ARCH_MMAP_RND_BITS=28 CONFIG_HAVE_ARCH_MMAP_RND_COMPAT_BITS=y CONFIG_ARCH_MMAP_RND_COMPAT_BITS=8 CONFIG_HAVE_ARCH_COMPAT_MMAP_BASES=y CONFIG_HAVE_PAGE_SIZE_4KB=y CONFIG_PAGE_SIZE_4KB=y CONFIG_PAGE_SIZE_LESS_THAN_64KB=y CONFIG_PAGE_SIZE_LESS_THAN_256KB=y CONFIG_PAGE_SHIFT=12 CONFIG_HAVE_OBJTOOL=y CONFIG_HAVE_JUMP_LABEL_HACK=y CONFIG_HAVE_NOINSTR_HACK=y CONFIG_HAVE_NOINSTR_VALIDATION=y CONFIG_HAVE_UACCESS_VALIDATION=y CONFIG_HAVE_STACK_VALIDATION=y CONFIG_HAVE_RELIABLE_STACKTRACE=y CONFIG_OLD_SIGSUSPEND3=y CONFIG_COMPAT_OLD_SIGACTION=y CONFIG_COMPAT_32BIT_TIME=y CONFIG_ARCH_SUPPORTS_RT=y CONFIG_HAVE_ARCH_VMAP_STACK=y CONFIG_VMAP_STACK=y CONFIG_HAVE_ARCH_RANDOMIZE_KSTACK_OFFSET=y CONFIG_RANDOMIZE_KSTACK_OFFSET=y # CONFIG_RANDOMIZE_KSTACK_OFFSET_DEFAULT is not set CONFIG_ARCH_HAS_STRICT_KERNEL_RWX=y CONFIG_STRICT_KERNEL_RWX=y CONFIG_ARCH_HAS_STRICT_MODULE_RWX=y CONFIG_STRICT_MODULE_RWX=y CONFIG_HAVE_ARCH_PREL32_RELOCATIONS=y CONFIG_ARCH_USE_MEMREMAP_PROT=y # CONFIG_LOCK_EVENT_COUNTS is not set CONFIG_ARCH_HAS_MEM_ENCRYPT=y CONFIG_HAVE_STATIC_CALL=y CONFIG_HAVE_STATIC_CALL_INLINE=y CONFIG_HAVE_PREEMPT_DYNAMIC=y CONFIG_HAVE_PREEMPT_DYNAMIC_CALL=y CONFIG_ARCH_WANT_LD_ORPHAN_WARN=y CONFIG_ARCH_SUPPORTS_DEBUG_PAGEALLOC=y CONFIG_ARCH_SUPPORTS_PAGE_TABLE_CHECK=y CONFIG_ARCH_HAS_ELFCORE_COMPAT=y CONFIG_ARCH_HAS_PARANOID_L1D_FLUSH=y CONFIG_DYNAMIC_SIGFRAME=y CONFIG_HAVE_ARCH_NODE_DEV_GROUP=y CONFIG_ARCH_HAS_HW_PTE_YOUNG=y CONFIG_ARCH_HAS_NONLEAF_PMD_YOUNG=y CONFIG_ARCH_HAS_KERNEL_FPU_SUPPORT=y # # GCOV-based kernel profiling # # CONFIG_GCOV_KERNEL is not set CONFIG_ARCH_HAS_GCOV_PROFILE_ALL=y # end of GCOV-based kernel profiling CONFIG_HAVE_GCC_PLUGINS=y CONFIG_FUNCTION_ALIGNMENT_4B=y CONFIG_FUNCTION_ALIGNMENT_16B=y CONFIG_FUNCTION_ALIGNMENT=16 CONFIG_CC_HAS_SANE_FUNCTION_ALIGNMENT=y # end of General architecture-dependent options CONFIG_RT_MUTEXES=y CONFIG_MODULE_SIG_FORMAT=y CONFIG_MODULES=y # CONFIG_MODULE_DEBUG is not set # CONFIG_MODULE_FORCE_LOAD is not set CONFIG_MODULE_UNLOAD=y # CONFIG_MODULE_FORCE_UNLOAD is not set # CONFIG_MODULE_UNLOAD_TAINT_TRACKING is not set CONFIG_MODVERSIONS=y CONFIG_ASM_MODVERSIONS=y CONFIG_MODULE_SRCVERSION_ALL=y CONFIG_MODULE_SIG=y # CONFIG_MODULE_SIG_FORCE is not set CONFIG_MODULE_SIG_ALL=y # CONFIG_MODULE_SIG_SHA1 is not set CONFIG_MODULE_SIG_SHA256=y # CONFIG_MODULE_SIG_SHA384 is not set # CONFIG_MODULE_SIG_SHA512 is not set # CONFIG_MODULE_SIG_SHA3_256 is not set # CONFIG_MODULE_SIG_SHA3_384 is not set # CONFIG_MODULE_SIG_SHA3_512 is not set CONFIG_MODULE_SIG_HASH="sha256" CONFIG_MODULE_COMPRESS_NONE=y # CONFIG_MODULE_COMPRESS_GZIP is not set # CONFIG_MODULE_COMPRESS_XZ is not set # CONFIG_MODULE_COMPRESS_ZSTD is not set # CONFIG_MODULE_ALLOW_MISSING_NAMESPACE_IMPORTS is not set CONFIG_MODPROBE_PATH="/sbin/modprobe" # CONFIG_TRIM_UNUSED_KSYMS is not set CONFIG_MODULES_TREE_LOOKUP=y CONFIG_BLOCK=y CONFIG_BLOCK_LEGACY_AUTOLOAD=y CONFIG_BLK_CGROUP_RWSTAT=y CONFIG_BLK_CGROUP_PUNT_BIO=y CONFIG_BLK_DEV_BSG_COMMON=y CONFIG_BLK_DEV_BSGLIB=y # CONFIG_BLK_DEV_INTEGRITY is not set CONFIG_BLK_DEV_WRITE_MOUNTED=y # CONFIG_BLK_DEV_ZONED is not set CONFIG_BLK_DEV_THROTTLING=y # CONFIG_BLK_WBT is not set # CONFIG_BLK_CGROUP_IOLATENCY is not set # CONFIG_BLK_CGROUP_IOCOST is not set # CONFIG_BLK_CGROUP_IOPRIO is not set CONFIG_BLK_DEBUG_FS=y # CONFIG_BLK_SED_OPAL is not set # CONFIG_BLK_INLINE_ENCRYPTION is not set # # Partition Types # CONFIG_PARTITION_ADVANCED=y # CONFIG_ACORN_PARTITION is not set # CONFIG_AIX_PARTITION is not set CONFIG_OSF_PARTITION=y CONFIG_AMIGA_PARTITION=y # CONFIG_ATARI_PARTITION is not set CONFIG_MAC_PARTITION=y CONFIG_MSDOS_PARTITION=y CONFIG_BSD_DISKLABEL=y CONFIG_MINIX_SUBPARTITION=y CONFIG_SOLARIS_X86_PARTITION=y CONFIG_UNIXWARE_DISKLABEL=y # CONFIG_LDM_PARTITION is not set CONFIG_SGI_PARTITION=y # CONFIG_ULTRIX_PARTITION is not set CONFIG_SUN_PARTITION=y CONFIG_KARMA_PARTITION=y CONFIG_EFI_PARTITION=y # CONFIG_SYSV68_PARTITION is not set # CONFIG_CMDLINE_PARTITION is not set # end of Partition Types CONFIG_BLK_MQ_PCI=y CONFIG_BLK_MQ_VIRTIO=y CONFIG_BLK_PM=y CONFIG_BLOCK_HOLDER_DEPRECATED=y CONFIG_BLK_MQ_STACKING=y # # IO Schedulers # CONFIG_MQ_IOSCHED_DEADLINE=y CONFIG_MQ_IOSCHED_KYBER=y # CONFIG_IOSCHED_BFQ is not set # end of IO Schedulers CONFIG_PREEMPT_NOTIFIERS=y CONFIG_PADATA=y CONFIG_ASN1=y CONFIG_UNINLINE_SPIN_UNLOCK=y CONFIG_ARCH_SUPPORTS_ATOMIC_RMW=y CONFIG_MUTEX_SPIN_ON_OWNER=y CONFIG_RWSEM_SPIN_ON_OWNER=y CONFIG_LOCK_SPIN_ON_OWNER=y CONFIG_ARCH_USE_QUEUED_SPINLOCKS=y CONFIG_QUEUED_SPINLOCKS=y CONFIG_ARCH_USE_QUEUED_RWLOCKS=y CONFIG_QUEUED_RWLOCKS=y CONFIG_ARCH_HAS_NON_OVERLAPPING_ADDRESS_SPACE=y CONFIG_ARCH_HAS_SYNC_CORE_BEFORE_USERMODE=y CONFIG_ARCH_HAS_SYSCALL_WRAPPER=y CONFIG_FREEZER=y # # Executable file formats # CONFIG_BINFMT_ELF=y CONFIG_COMPAT_BINFMT_ELF=y CONFIG_ELFCORE=y # CONFIG_CORE_DUMP_DEFAULT_ELF_HEADERS is not set CONFIG_BINFMT_SCRIPT=y CONFIG_BINFMT_MISC=y CONFIG_COREDUMP=y # end of Executable file formats # # Memory Management options # CONFIG_SWAP=y # CONFIG_ZSWAP is not set # # Slab allocator options # CONFIG_SLUB=y # CONFIG_SLUB_TINY is not set CONFIG_SLAB_MERGE_DEFAULT=y # CONFIG_SLAB_FREELIST_RANDOM is not set # CONFIG_SLAB_FREELIST_HARDENED is not set # CONFIG_SLAB_BUCKETS is not set # CONFIG_SLUB_STATS is not set CONFIG_SLUB_CPU_PARTIAL=y # CONFIG_RANDOM_KMALLOC_CACHES is not set # end of Slab allocator options # CONFIG_SHUFFLE_PAGE_ALLOCATOR is not set CONFIG_COMPAT_BRK=y CONFIG_SPARSEMEM=y CONFIG_SPARSEMEM_EXTREME=y CONFIG_SPARSEMEM_VMEMMAP_ENABLE=y CONFIG_SPARSEMEM_VMEMMAP=y CONFIG_ARCH_WANT_OPTIMIZE_DAX_VMEMMAP=y CONFIG_ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP=y CONFIG_HAVE_GUP_FAST=y CONFIG_NUMA_KEEP_MEMINFO=y CONFIG_MEMORY_ISOLATION=y CONFIG_ARCH_ENABLE_MEMORY_HOTPLUG=y # CONFIG_MEMORY_HOTPLUG is not set CONFIG_ARCH_MHP_MEMMAP_ON_MEMORY_ENABLE=y CONFIG_SPLIT_PTE_PTLOCKS=y CONFIG_ARCH_ENABLE_SPLIT_PMD_PTLOCK=y CONFIG_SPLIT_PMD_PTLOCKS=y CONFIG_MEMORY_BALLOON=y CONFIG_BALLOON_COMPACTION=y CONFIG_COMPACTION=y CONFIG_COMPACT_UNEVICTABLE_DEFAULT=1 CONFIG_PAGE_REPORTING=y CONFIG_MIGRATION=y CONFIG_ARCH_ENABLE_HUGEPAGE_MIGRATION=y CONFIG_ARCH_ENABLE_THP_MIGRATION=y CONFIG_CONTIG_ALLOC=y CONFIG_PCP_BATCH_SCALE_MAX=5 CONFIG_PHYS_ADDR_T_64BIT=y CONFIG_MMU_NOTIFIER=y CONFIG_KSM=y CONFIG_DEFAULT_MMAP_MIN_ADDR=4096 CONFIG_ARCH_SUPPORTS_MEMORY_FAILURE=y CONFIG_MEMORY_FAILURE=y CONFIG_HWPOISON_INJECT=y CONFIG_ARCH_WANT_GENERAL_HUGETLB=y CONFIG_ARCH_WANTS_THP_SWAP=y CONFIG_TRANSPARENT_HUGEPAGE=y # CONFIG_TRANSPARENT_HUGEPAGE_ALWAYS is not set CONFIG_TRANSPARENT_HUGEPAGE_MADVISE=y # CONFIG_TRANSPARENT_HUGEPAGE_NEVER is not set CONFIG_THP_SWAP=y # CONFIG_READ_ONLY_THP_FOR_FS is not set CONFIG_PGTABLE_HAS_HUGE_LEAVES=y CONFIG_ARCH_SUPPORTS_HUGE_PFNMAP=y CONFIG_ARCH_SUPPORTS_PMD_PFNMAP=y CONFIG_ARCH_SUPPORTS_PUD_PFNMAP=y CONFIG_NEED_PER_CPU_EMBED_FIRST_CHUNK=y CONFIG_NEED_PER_CPU_PAGE_FIRST_CHUNK=y CONFIG_USE_PERCPU_NUMA_NODE_ID=y CONFIG_HAVE_SETUP_PER_CPU_AREA=y CONFIG_CMA=y # CONFIG_CMA_DEBUGFS is not set # CONFIG_CMA_SYSFS is not set CONFIG_CMA_AREAS=7 CONFIG_GENERIC_EARLY_IOREMAP=y # CONFIG_DEFERRED_STRUCT_PAGE_INIT is not set # CONFIG_IDLE_PAGE_TRACKING is not set CONFIG_ARCH_HAS_CACHE_LINE_SIZE=y CONFIG_ARCH_HAS_CURRENT_STACK_POINTER=y CONFIG_ARCH_HAS_PTE_DEVMAP=y CONFIG_ARCH_HAS_ZONE_DMA_SET=y CONFIG_ZONE_DMA=y CONFIG_ZONE_DMA32=y CONFIG_HMM_MIRROR=y CONFIG_ARCH_USES_PG_ARCH_2=y CONFIG_VM_EVENT_COUNTERS=y # CONFIG_PERCPU_STATS is not set # CONFIG_GUP_TEST is not set # CONFIG_DMAPOOL_TEST is not set CONFIG_ARCH_HAS_PTE_SPECIAL=y CONFIG_MEMFD_CREATE=y CONFIG_SECRETMEM=y # CONFIG_ANON_VMA_NAME is not set CONFIG_HAVE_ARCH_USERFAULTFD_WP=y CONFIG_HAVE_ARCH_USERFAULTFD_MINOR=y CONFIG_USERFAULTFD=y CONFIG_PTE_MARKER_UFFD_WP=y # CONFIG_LRU_GEN is not set CONFIG_ARCH_SUPPORTS_PER_VMA_LOCK=y CONFIG_PER_VMA_LOCK=y CONFIG_LOCK_MM_AND_FIND_VMA=y CONFIG_EXECMEM=y CONFIG_NUMA_MEMBLKS=y # CONFIG_NUMA_EMU is not set # # Data Access Monitoring # # CONFIG_DAMON is not set # end of Data Access Monitoring # end of Memory Management options CONFIG_NET=y CONFIG_NET_INGRESS=y CONFIG_NET_EGRESS=y CONFIG_NET_XGRESS=y CONFIG_NET_REDIRECT=y CONFIG_SKB_EXTENSIONS=y CONFIG_NET_DEVMEM=y # # Networking options # CONFIG_PACKET=y # CONFIG_PACKET_DIAG is not set CONFIG_UNIX=y CONFIG_AF_UNIX_OOB=y # CONFIG_UNIX_DIAG is not set CONFIG_TLS=y # CONFIG_TLS_DEVICE is not set # CONFIG_TLS_TOE is not set CONFIG_XFRM=y CONFIG_XFRM_ALGO=y CONFIG_XFRM_USER=y # CONFIG_XFRM_USER_COMPAT is not set CONFIG_XFRM_INTERFACE=y CONFIG_XFRM_SUB_POLICY=y # CONFIG_XFRM_MIGRATE is not set # CONFIG_XFRM_STATISTICS is not set CONFIG_XFRM_AH=m CONFIG_XFRM_ESP=y CONFIG_XFRM_IPCOMP=m CONFIG_NET_KEY=m # CONFIG_NET_KEY_MIGRATE is not set # CONFIG_SMC is not set CONFIG_XDP_SOCKETS=y CONFIG_XDP_SOCKETS_DIAG=y CONFIG_NET_HANDSHAKE=y CONFIG_INET=y CONFIG_IP_MULTICAST=y CONFIG_IP_ADVANCED_ROUTER=y # CONFIG_IP_FIB_TRIE_STATS is not set CONFIG_IP_MULTIPLE_TABLES=y CONFIG_IP_ROUTE_MULTIPATH=y CONFIG_IP_ROUTE_VERBOSE=y CONFIG_IP_ROUTE_CLASSID=y # CONFIG_IP_PNP is not set CONFIG_NET_IPIP=y CONFIG_NET_IPGRE_DEMUX=y CONFIG_NET_IP_TUNNEL=y CONFIG_NET_IPGRE=y CONFIG_NET_IPGRE_BROADCAST=y CONFIG_IP_MROUTE_COMMON=y CONFIG_IP_MROUTE=y # CONFIG_IP_MROUTE_MULTIPLE_TABLES is not set CONFIG_IP_PIMSM_V1=y CONFIG_IP_PIMSM_V2=y CONFIG_SYN_COOKIES=y CONFIG_NET_IPVTI=m CONFIG_NET_UDP_TUNNEL=y CONFIG_NET_FOU=y CONFIG_NET_FOU_IP_TUNNELS=y CONFIG_INET_AH=m CONFIG_INET_ESP=y # CONFIG_INET_ESP_OFFLOAD is not set # CONFIG_INET_ESPINTCP is not set CONFIG_INET_IPCOMP=m CONFIG_INET_TABLE_PERTURB_ORDER=16 CONFIG_INET_XFRM_TUNNEL=m CONFIG_INET_TUNNEL=y CONFIG_INET_DIAG=m CONFIG_INET_TCP_DIAG=m # CONFIG_INET_UDP_DIAG is not set # CONFIG_INET_RAW_DIAG is not set # CONFIG_INET_DIAG_DESTROY is not set CONFIG_TCP_CONG_ADVANCED=y CONFIG_TCP_CONG_BIC=m CONFIG_TCP_CONG_CUBIC=y CONFIG_TCP_CONG_WESTWOOD=m CONFIG_TCP_CONG_HTCP=m CONFIG_TCP_CONG_HSTCP=m CONFIG_TCP_CONG_HYBLA=m CONFIG_TCP_CONG_VEGAS=m # CONFIG_TCP_CONG_NV is not set CONFIG_TCP_CONG_SCALABLE=m CONFIG_TCP_CONG_LP=m CONFIG_TCP_CONG_VENO=m # CONFIG_TCP_CONG_YEAH is not set # CONFIG_TCP_CONG_ILLINOIS is not set CONFIG_TCP_CONG_DCTCP=y # CONFIG_TCP_CONG_CDG is not set CONFIG_TCP_CONG_BBR=y # CONFIG_DEFAULT_CUBIC is not set # CONFIG_DEFAULT_DCTCP is not set # CONFIG_DEFAULT_BBR is not set CONFIG_DEFAULT_RENO=y CONFIG_DEFAULT_TCP_CONG="reno" CONFIG_TCP_SIGPOOL=y # CONFIG_TCP_AO is not set CONFIG_TCP_MD5SIG=y CONFIG_IPV6=y CONFIG_IPV6_ROUTER_PREF=y CONFIG_IPV6_ROUTE_INFO=y # CONFIG_IPV6_OPTIMISTIC_DAD is not set CONFIG_INET6_AH=m CONFIG_INET6_ESP=m # CONFIG_INET6_ESP_OFFLOAD is not set # CONFIG_INET6_ESPINTCP is not set CONFIG_INET6_IPCOMP=m CONFIG_IPV6_MIP6=m CONFIG_IPV6_ILA=m CONFIG_INET6_XFRM_TUNNEL=m CONFIG_INET6_TUNNEL=y CONFIG_IPV6_VTI=m CONFIG_IPV6_SIT=m # CONFIG_IPV6_SIT_6RD is not set CONFIG_IPV6_NDISC_NODETYPE=y CONFIG_IPV6_TUNNEL=y CONFIG_IPV6_GRE=y CONFIG_IPV6_FOU=y CONFIG_IPV6_FOU_TUNNEL=y CONFIG_IPV6_MULTIPLE_TABLES=y CONFIG_IPV6_SUBTREES=y # CONFIG_IPV6_MROUTE is not set CONFIG_IPV6_SEG6_LWTUNNEL=y # CONFIG_IPV6_SEG6_HMAC is not set CONFIG_IPV6_SEG6_BPF=y # CONFIG_IPV6_RPL_LWTUNNEL is not set # CONFIG_IPV6_IOAM6_LWTUNNEL is not set CONFIG_NETLABEL=y CONFIG_MPTCP=y CONFIG_INET_MPTCP_DIAG=m CONFIG_MPTCP_IPV6=y CONFIG_NETWORK_SECMARK=y CONFIG_NET_PTP_CLASSIFY=y # CONFIG_NETWORK_PHY_TIMESTAMPING is not set CONFIG_NETFILTER=y CONFIG_NETFILTER_ADVANCED=y CONFIG_BRIDGE_NETFILTER=m # # Core Netfilter Configuration # CONFIG_NETFILTER_INGRESS=y CONFIG_NETFILTER_EGRESS=y CONFIG_NETFILTER_SKIP_EGRESS=y CONFIG_NETFILTER_NETLINK=y CONFIG_NETFILTER_FAMILY_BRIDGE=y CONFIG_NETFILTER_FAMILY_ARP=y CONFIG_NETFILTER_BPF_LINK=y # CONFIG_NETFILTER_NETLINK_HOOK is not set # CONFIG_NETFILTER_NETLINK_ACCT is not set CONFIG_NETFILTER_NETLINK_QUEUE=y CONFIG_NETFILTER_NETLINK_LOG=y # CONFIG_NETFILTER_NETLINK_OSF is not set CONFIG_NF_CONNTRACK=y CONFIG_NF_LOG_SYSLOG=m CONFIG_NF_CONNTRACK_MARK=y # CONFIG_NF_CONNTRACK_SECMARK is not set CONFIG_NF_CONNTRACK_ZONES=y CONFIG_NF_CONNTRACK_PROCFS=y # CONFIG_NF_CONNTRACK_EVENTS is not set # CONFIG_NF_CONNTRACK_TIMEOUT is not set # CONFIG_NF_CONNTRACK_TIMESTAMP is not set # CONFIG_NF_CONNTRACK_LABELS is not set CONFIG_NF_CONNTRACK_OVS=y CONFIG_NF_CT_PROTO_DCCP=y CONFIG_NF_CT_PROTO_SCTP=y CONFIG_NF_CT_PROTO_UDPLITE=y # CONFIG_NF_CONNTRACK_AMANDA is not set # CONFIG_NF_CONNTRACK_FTP is not set # CONFIG_NF_CONNTRACK_H323 is not set # CONFIG_NF_CONNTRACK_IRC is not set # CONFIG_NF_CONNTRACK_NETBIOS_NS is not set # CONFIG_NF_CONNTRACK_SNMP is not set # CONFIG_NF_CONNTRACK_PPTP is not set # CONFIG_NF_CONNTRACK_SANE is not set # CONFIG_NF_CONNTRACK_SIP is not set # CONFIG_NF_CONNTRACK_TFTP is not set # CONFIG_NF_CT_NETLINK is not set CONFIG_NF_NAT=y CONFIG_NF_NAT_OVS=y CONFIG_NETFILTER_SYNPROXY=y CONFIG_NF_TABLES=y CONFIG_NF_TABLES_INET=y CONFIG_NF_TABLES_NETDEV=y # CONFIG_NFT_NUMGEN is not set # CONFIG_NFT_CT is not set CONFIG_NFT_FLOW_OFFLOAD=y # CONFIG_NFT_CONNLIMIT is not set # CONFIG_NFT_LOG is not set # CONFIG_NFT_LIMIT is not set # CONFIG_NFT_MASQ is not set # CONFIG_NFT_REDIR is not set # CONFIG_NFT_NAT is not set # CONFIG_NFT_TUNNEL is not set # CONFIG_NFT_QUEUE is not set # CONFIG_NFT_QUOTA is not set # CONFIG_NFT_REJECT is not set # CONFIG_NFT_COMPAT is not set # CONFIG_NFT_HASH is not set # CONFIG_NFT_XFRM is not set # CONFIG_NFT_SOCKET is not set # CONFIG_NFT_OSF is not set # CONFIG_NFT_TPROXY is not set # CONFIG_NFT_SYNPROXY is not set # CONFIG_NF_DUP_NETDEV is not set # CONFIG_NFT_DUP_NETDEV is not set # CONFIG_NFT_FWD_NETDEV is not set CONFIG_NF_FLOW_TABLE_INET=y CONFIG_NF_FLOW_TABLE=y # CONFIG_NF_FLOW_TABLE_PROCFS is not set CONFIG_NETFILTER_XTABLES=y CONFIG_NETFILTER_XTABLES_COMPAT=y # # Xtables combined modules # CONFIG_NETFILTER_XT_MARK=m CONFIG_NETFILTER_XT_CONNMARK=y CONFIG_NETFILTER_XT_SET=m # # Xtables targets # # CONFIG_NETFILTER_XT_TARGET_AUDIT is not set # CONFIG_NETFILTER_XT_TARGET_CHECKSUM is not set CONFIG_NETFILTER_XT_TARGET_CLASSIFY=m # CONFIG_NETFILTER_XT_TARGET_CONNMARK is not set CONFIG_NETFILTER_XT_TARGET_CT=y CONFIG_NETFILTER_XT_TARGET_DSCP=m CONFIG_NETFILTER_XT_TARGET_HL=m # CONFIG_NETFILTER_XT_TARGET_HMARK is not set # CONFIG_NETFILTER_XT_TARGET_IDLETIMER is not set # CONFIG_NETFILTER_XT_TARGET_LED is not set CONFIG_NETFILTER_XT_TARGET_LOG=m CONFIG_NETFILTER_XT_TARGET_MARK=m # CONFIG_NETFILTER_XT_NAT is not set # CONFIG_NETFILTER_XT_TARGET_NETMAP is not set CONFIG_NETFILTER_XT_TARGET_NFLOG=m CONFIG_NETFILTER_XT_TARGET_NFQUEUE=m # CONFIG_NETFILTER_XT_TARGET_NOTRACK is not set # CONFIG_NETFILTER_XT_TARGET_RATEEST is not set # CONFIG_NETFILTER_XT_TARGET_REDIRECT is not set # CONFIG_NETFILTER_XT_TARGET_MASQUERADE is not set # CONFIG_NETFILTER_XT_TARGET_TEE is not set # CONFIG_NETFILTER_XT_TARGET_TPROXY is not set # CONFIG_NETFILTER_XT_TARGET_TRACE is not set CONFIG_NETFILTER_XT_TARGET_SECMARK=m # CONFIG_NETFILTER_XT_TARGET_TCPMSS is not set # CONFIG_NETFILTER_XT_TARGET_TCPOPTSTRIP is not set # # Xtables matches # # CONFIG_NETFILTER_XT_MATCH_ADDRTYPE is not set CONFIG_NETFILTER_XT_MATCH_BPF=y # CONFIG_NETFILTER_XT_MATCH_CGROUP is not set # CONFIG_NETFILTER_XT_MATCH_CLUSTER is not set CONFIG_NETFILTER_XT_MATCH_COMMENT=m # CONFIG_NETFILTER_XT_MATCH_CONNBYTES is not set # CONFIG_NETFILTER_XT_MATCH_CONNLABEL is not set # CONFIG_NETFILTER_XT_MATCH_CONNLIMIT is not set # CONFIG_NETFILTER_XT_MATCH_CONNMARK is not set # CONFIG_NETFILTER_XT_MATCH_CONNTRACK is not set CONFIG_NETFILTER_XT_MATCH_CPU=m CONFIG_NETFILTER_XT_MATCH_DCCP=m # CONFIG_NETFILTER_XT_MATCH_DEVGROUP is not set CONFIG_NETFILTER_XT_MATCH_DSCP=m CONFIG_NETFILTER_XT_MATCH_ECN=m CONFIG_NETFILTER_XT_MATCH_ESP=m CONFIG_NETFILTER_XT_MATCH_HASHLIMIT=m # CONFIG_NETFILTER_XT_MATCH_HELPER is not set CONFIG_NETFILTER_XT_MATCH_HL=m # CONFIG_NETFILTER_XT_MATCH_IPCOMP is not set # CONFIG_NETFILTER_XT_MATCH_IPRANGE is not set # CONFIG_NETFILTER_XT_MATCH_IPVS is not set # CONFIG_NETFILTER_XT_MATCH_L2TP is not set CONFIG_NETFILTER_XT_MATCH_LENGTH=m CONFIG_NETFILTER_XT_MATCH_LIMIT=m CONFIG_NETFILTER_XT_MATCH_MAC=m CONFIG_NETFILTER_XT_MATCH_MARK=m CONFIG_NETFILTER_XT_MATCH_MULTIPORT=m # CONFIG_NETFILTER_XT_MATCH_NFACCT is not set # CONFIG_NETFILTER_XT_MATCH_OSF is not set CONFIG_NETFILTER_XT_MATCH_OWNER=m CONFIG_NETFILTER_XT_MATCH_POLICY=m CONFIG_NETFILTER_XT_MATCH_PHYSDEV=m CONFIG_NETFILTER_XT_MATCH_PKTTYPE=m CONFIG_NETFILTER_XT_MATCH_QUOTA=m # CONFIG_NETFILTER_XT_MATCH_RATEEST is not set CONFIG_NETFILTER_XT_MATCH_REALM=m # CONFIG_NETFILTER_XT_MATCH_RECENT is not set CONFIG_NETFILTER_XT_MATCH_SCTP=m # CONFIG_NETFILTER_XT_MATCH_SOCKET is not set CONFIG_NETFILTER_XT_MATCH_STATE=y CONFIG_NETFILTER_XT_MATCH_STATISTIC=y CONFIG_NETFILTER_XT_MATCH_STRING=m CONFIG_NETFILTER_XT_MATCH_TCPMSS=m # CONFIG_NETFILTER_XT_MATCH_TIME is not set # CONFIG_NETFILTER_XT_MATCH_U32 is not set # end of Core Netfilter Configuration CONFIG_IP_SET=m CONFIG_IP_SET_MAX=256 CONFIG_IP_SET_BITMAP_IP=m CONFIG_IP_SET_BITMAP_IPMAC=m CONFIG_IP_SET_BITMAP_PORT=m CONFIG_IP_SET_HASH_IP=m # CONFIG_IP_SET_HASH_IPMARK is not set CONFIG_IP_SET_HASH_IPPORT=m CONFIG_IP_SET_HASH_IPPORTIP=m CONFIG_IP_SET_HASH_IPPORTNET=m # CONFIG_IP_SET_HASH_IPMAC is not set # CONFIG_IP_SET_HASH_MAC is not set # CONFIG_IP_SET_HASH_NETPORTNET is not set CONFIG_IP_SET_HASH_NET=m # CONFIG_IP_SET_HASH_NETNET is not set CONFIG_IP_SET_HASH_NETPORT=m CONFIG_IP_SET_HASH_NETIFACE=m CONFIG_IP_SET_LIST_SET=m CONFIG_IP_VS=m CONFIG_IP_VS_IPV6=y # CONFIG_IP_VS_DEBUG is not set CONFIG_IP_VS_TAB_BITS=20 # # IPVS transport protocol load balancing support # CONFIG_IP_VS_PROTO_TCP=y CONFIG_IP_VS_PROTO_UDP=y CONFIG_IP_VS_PROTO_AH_ESP=y CONFIG_IP_VS_PROTO_ESP=y CONFIG_IP_VS_PROTO_AH=y # CONFIG_IP_VS_PROTO_SCTP is not set # # IPVS scheduler # CONFIG_IP_VS_RR=m CONFIG_IP_VS_WRR=m CONFIG_IP_VS_LC=m CONFIG_IP_VS_WLC=m # CONFIG_IP_VS_FO is not set # CONFIG_IP_VS_OVF is not set CONFIG_IP_VS_LBLC=m CONFIG_IP_VS_LBLCR=m CONFIG_IP_VS_DH=m CONFIG_IP_VS_SH=m # CONFIG_IP_VS_MH is not set CONFIG_IP_VS_SED=m CONFIG_IP_VS_NQ=m # CONFIG_IP_VS_TWOS is not set # # IPVS SH scheduler # CONFIG_IP_VS_SH_TAB_BITS=8 # # IPVS MH scheduler # CONFIG_IP_VS_MH_TAB_INDEX=12 # # IPVS application helper # # CONFIG_IP_VS_NFCT is not set # # IP: Netfilter Configuration # CONFIG_NF_DEFRAG_IPV4=y CONFIG_IP_NF_IPTABLES_LEGACY=y # CONFIG_NF_SOCKET_IPV4 is not set # CONFIG_NF_TPROXY_IPV4 is not set CONFIG_NF_TABLES_IPV4=y # CONFIG_NFT_DUP_IPV4 is not set # CONFIG_NFT_FIB_IPV4 is not set # CONFIG_NF_TABLES_ARP is not set # CONFIG_NF_DUP_IPV4 is not set # CONFIG_NF_LOG_ARP is not set CONFIG_NF_LOG_IPV4=m CONFIG_NF_REJECT_IPV4=m CONFIG_IP_NF_IPTABLES=y CONFIG_IP_NF_MATCH_AH=m CONFIG_IP_NF_MATCH_ECN=m # CONFIG_IP_NF_MATCH_RPFILTER is not set CONFIG_IP_NF_MATCH_TTL=m CONFIG_IP_NF_FILTER=y CONFIG_IP_NF_TARGET_REJECT=m CONFIG_IP_NF_TARGET_SYNPROXY=y # CONFIG_IP_NF_NAT is not set CONFIG_IP_NF_MANGLE=m CONFIG_IP_NF_TARGET_ECN=m CONFIG_IP_NF_TARGET_TTL=m CONFIG_IP_NF_RAW=y # CONFIG_IP_NF_SECURITY is not set CONFIG_IP_NF_ARPTABLES=m CONFIG_IP_NF_ARPFILTER=m CONFIG_IP_NF_ARP_MANGLE=m # end of IP: Netfilter Configuration # # IPv6: Netfilter Configuration # CONFIG_IP6_NF_IPTABLES_LEGACY=y # CONFIG_NF_SOCKET_IPV6 is not set # CONFIG_NF_TPROXY_IPV6 is not set CONFIG_NF_TABLES_IPV6=y # CONFIG_NFT_DUP_IPV6 is not set # CONFIG_NFT_FIB_IPV6 is not set # CONFIG_NF_DUP_IPV6 is not set CONFIG_NF_REJECT_IPV6=m CONFIG_NF_LOG_IPV6=m CONFIG_IP6_NF_IPTABLES=y CONFIG_IP6_NF_MATCH_AH=m CONFIG_IP6_NF_MATCH_EUI64=m CONFIG_IP6_NF_MATCH_FRAG=m CONFIG_IP6_NF_MATCH_OPTS=m CONFIG_IP6_NF_MATCH_HL=m CONFIG_IP6_NF_MATCH_IPV6HEADER=m # CONFIG_IP6_NF_MATCH_MH is not set # CONFIG_IP6_NF_MATCH_RPFILTER is not set CONFIG_IP6_NF_MATCH_RT=m # CONFIG_IP6_NF_MATCH_SRH is not set CONFIG_IP6_NF_TARGET_HL=m CONFIG_IP6_NF_FILTER=y CONFIG_IP6_NF_TARGET_REJECT=m # CONFIG_IP6_NF_TARGET_SYNPROXY is not set CONFIG_IP6_NF_MANGLE=m CONFIG_IP6_NF_RAW=m # CONFIG_IP6_NF_SECURITY is not set # CONFIG_IP6_NF_NAT is not set # end of IPv6: Netfilter Configuration CONFIG_NF_DEFRAG_IPV6=y # CONFIG_NF_TABLES_BRIDGE is not set # CONFIG_NF_CONNTRACK_BRIDGE is not set CONFIG_BRIDGE_NF_EBTABLES_LEGACY=m CONFIG_BRIDGE_NF_EBTABLES=m CONFIG_BRIDGE_EBT_BROUTE=m CONFIG_BRIDGE_EBT_T_FILTER=m CONFIG_BRIDGE_EBT_T_NAT=m CONFIG_BRIDGE_EBT_802_3=m CONFIG_BRIDGE_EBT_AMONG=m CONFIG_BRIDGE_EBT_ARP=m CONFIG_BRIDGE_EBT_IP=m # CONFIG_BRIDGE_EBT_IP6 is not set CONFIG_BRIDGE_EBT_LIMIT=m CONFIG_BRIDGE_EBT_MARK=m CONFIG_BRIDGE_EBT_PKTTYPE=m CONFIG_BRIDGE_EBT_STP=m CONFIG_BRIDGE_EBT_VLAN=m CONFIG_BRIDGE_EBT_ARPREPLY=m CONFIG_BRIDGE_EBT_DNAT=m CONFIG_BRIDGE_EBT_MARK_T=m CONFIG_BRIDGE_EBT_REDIRECT=m CONFIG_BRIDGE_EBT_SNAT=m CONFIG_BRIDGE_EBT_LOG=m # CONFIG_BRIDGE_EBT_NFLOG is not set CONFIG_IP_DCCP=m CONFIG_INET_DCCP_DIAG=m # # DCCP CCIDs Configuration # # CONFIG_IP_DCCP_CCID2_DEBUG is not set CONFIG_IP_DCCP_CCID3=y # CONFIG_IP_DCCP_CCID3_DEBUG is not set CONFIG_IP_DCCP_TFRC_LIB=y # end of DCCP CCIDs Configuration # # DCCP Kernel Hacking # # CONFIG_IP_DCCP_DEBUG is not set # end of DCCP Kernel Hacking CONFIG_IP_SCTP=m # CONFIG_SCTP_DBG_OBJCNT is not set CONFIG_SCTP_DEFAULT_COOKIE_HMAC_MD5=y # CONFIG_SCTP_DEFAULT_COOKIE_HMAC_SHA1 is not set # CONFIG_SCTP_DEFAULT_COOKIE_HMAC_NONE is not set CONFIG_SCTP_COOKIE_HMAC_MD5=y # CONFIG_SCTP_COOKIE_HMAC_SHA1 is not set CONFIG_INET_SCTP_DIAG=m # CONFIG_RDS is not set CONFIG_TIPC=m # CONFIG_TIPC_MEDIA_IB is not set # CONFIG_TIPC_MEDIA_UDP is not set CONFIG_TIPC_CRYPTO=y # CONFIG_TIPC_DIAG is not set CONFIG_ATM=m CONFIG_ATM_CLIP=m # CONFIG_ATM_CLIP_NO_ICMP is not set CONFIG_ATM_LANE=m # CONFIG_ATM_MPOA is not set CONFIG_ATM_BR2684=m # CONFIG_ATM_BR2684_IPFILTER is not set # CONFIG_L2TP is not set CONFIG_STP=y CONFIG_BRIDGE=y CONFIG_BRIDGE_IGMP_SNOOPING=y CONFIG_BRIDGE_VLAN_FILTERING=y # CONFIG_BRIDGE_MRP is not set # CONFIG_BRIDGE_CFM is not set # CONFIG_NET_DSA is not set CONFIG_VLAN_8021Q=y # CONFIG_VLAN_8021Q_GVRP is not set # CONFIG_VLAN_8021Q_MVRP is not set CONFIG_LLC=y # CONFIG_LLC2 is not set CONFIG_ATALK=m # CONFIG_X25 is not set # CONFIG_LAPB is not set # CONFIG_PHONET is not set # CONFIG_6LOWPAN is not set # CONFIG_IEEE802154 is not set CONFIG_NET_SCHED=y # # Queueing/Scheduling # CONFIG_NET_SCH_HTB=m CONFIG_NET_SCH_HFSC=m CONFIG_NET_SCH_PRIO=m # CONFIG_NET_SCH_MULTIQ is not set CONFIG_NET_SCH_RED=m # CONFIG_NET_SCH_SFB is not set CONFIG_NET_SCH_SFQ=m CONFIG_NET_SCH_TEQL=m CONFIG_NET_SCH_TBF=m # CONFIG_NET_SCH_CBS is not set # CONFIG_NET_SCH_ETF is not set # CONFIG_NET_SCH_TAPRIO is not set CONFIG_NET_SCH_GRED=m CONFIG_NET_SCH_NETEM=m # CONFIG_NET_SCH_DRR is not set # CONFIG_NET_SCH_MQPRIO is not set # CONFIG_NET_SCH_SKBPRIO is not set # CONFIG_NET_SCH_CHOKE is not set # CONFIG_NET_SCH_QFQ is not set CONFIG_NET_SCH_CODEL=m CONFIG_NET_SCH_FQ_CODEL=y # CONFIG_NET_SCH_CAKE is not set CONFIG_NET_SCH_FQ=y # CONFIG_NET_SCH_HHF is not set # CONFIG_NET_SCH_PIE is not set CONFIG_NET_SCH_INGRESS=y # CONFIG_NET_SCH_PLUG is not set # CONFIG_NET_SCH_ETS is not set # CONFIG_NET_SCH_DEFAULT is not set # # Classification # CONFIG_NET_CLS=y CONFIG_NET_CLS_BASIC=m CONFIG_NET_CLS_ROUTE4=m CONFIG_NET_CLS_FW=m CONFIG_NET_CLS_U32=m CONFIG_CLS_U32_PERF=y CONFIG_CLS_U32_MARK=y # CONFIG_NET_CLS_FLOW is not set CONFIG_NET_CLS_CGROUP=y CONFIG_NET_CLS_BPF=y CONFIG_NET_CLS_FLOWER=m # CONFIG_NET_CLS_MATCHALL is not set CONFIG_NET_EMATCH=y CONFIG_NET_EMATCH_STACK=32 CONFIG_NET_EMATCH_CMP=m CONFIG_NET_EMATCH_NBYTE=m CONFIG_NET_EMATCH_U32=m CONFIG_NET_EMATCH_META=m CONFIG_NET_EMATCH_TEXT=m # CONFIG_NET_EMATCH_IPSET is not set # CONFIG_NET_EMATCH_IPT is not set CONFIG_NET_CLS_ACT=y CONFIG_NET_ACT_POLICE=m CONFIG_NET_ACT_GACT=m CONFIG_GACT_PROB=y CONFIG_NET_ACT_MIRRED=m # CONFIG_NET_ACT_SAMPLE is not set # CONFIG_NET_ACT_NAT is not set CONFIG_NET_ACT_PEDIT=m CONFIG_NET_ACT_SIMP=m # CONFIG_NET_ACT_SKBEDIT is not set # CONFIG_NET_ACT_CSUM is not set # CONFIG_NET_ACT_MPLS is not set # CONFIG_NET_ACT_VLAN is not set CONFIG_NET_ACT_BPF=y # CONFIG_NET_ACT_CONNMARK is not set # CONFIG_NET_ACT_CTINFO is not set # CONFIG_NET_ACT_SKBMOD is not set # CONFIG_NET_ACT_IFE is not set # CONFIG_NET_ACT_TUNNEL_KEY is not set # CONFIG_NET_ACT_CT is not set # CONFIG_NET_ACT_GATE is not set # CONFIG_NET_TC_SKB_EXT is not set CONFIG_NET_SCH_FIFO=y CONFIG_DCB=y CONFIG_DNS_RESOLVER=y # CONFIG_BATMAN_ADV is not set CONFIG_OPENVSWITCH=m CONFIG_OPENVSWITCH_GRE=m CONFIG_OPENVSWITCH_VXLAN=m CONFIG_OPENVSWITCH_GENEVE=m CONFIG_VSOCKETS=y CONFIG_VSOCKETS_DIAG=y CONFIG_VSOCKETS_LOOPBACK=y # CONFIG_VIRTIO_VSOCKETS is not set CONFIG_VIRTIO_VSOCKETS_COMMON=y # CONFIG_NETLINK_DIAG is not set CONFIG_MPLS=y CONFIG_NET_MPLS_GSO=m CONFIG_MPLS_ROUTING=m CONFIG_MPLS_IPTUNNEL=m CONFIG_NET_NSH=m # CONFIG_HSR is not set # CONFIG_NET_SWITCHDEV is not set CONFIG_NET_L3_MASTER_DEV=y # CONFIG_QRTR is not set # CONFIG_NET_NCSI is not set CONFIG_PCPU_DEV_REFCNT=y CONFIG_MAX_SKB_FRAGS=17 CONFIG_RPS=y CONFIG_RFS_ACCEL=y CONFIG_SOCK_RX_QUEUE_MAPPING=y CONFIG_XPS=y # CONFIG_CGROUP_NET_PRIO is not set CONFIG_CGROUP_NET_CLASSID=y CONFIG_NET_RX_BUSY_POLL=y CONFIG_BQL=y CONFIG_BPF_STREAM_PARSER=y CONFIG_NET_FLOW_LIMIT=y # # Network testing # CONFIG_NET_PKTGEN=m # CONFIG_NET_DROP_MONITOR is not set # end of Network testing # end of Networking options # CONFIG_HAMRADIO is not set # CONFIG_CAN is not set # CONFIG_BT is not set # CONFIG_AF_RXRPC is not set # CONFIG_AF_KCM is not set CONFIG_STREAM_PARSER=y # CONFIG_MCTP is not set CONFIG_FIB_RULES=y CONFIG_WIRELESS=y CONFIG_CFG80211=y # CONFIG_NL80211_TESTMODE is not set # CONFIG_CFG80211_DEVELOPER_WARNINGS is not set # CONFIG_CFG80211_CERTIFICATION_ONUS is not set CONFIG_CFG80211_REQUIRE_SIGNED_REGDB=y CONFIG_CFG80211_USE_KERNEL_REGDB_KEYS=y # CONFIG_CFG80211_DEFAULT_PS is not set # CONFIG_CFG80211_DEBUGFS is not set # CONFIG_CFG80211_CRDA_SUPPORT is not set # CONFIG_CFG80211_WEXT is not set CONFIG_MAC80211=y # CONFIG_MAC80211_RC_MINSTREL is not set CONFIG_MAC80211_RC_DEFAULT="" # # Some wireless drivers require a rate control algorithm # # CONFIG_MAC80211_MESH is not set # CONFIG_MAC80211_LEDS is not set # CONFIG_MAC80211_MESSAGE_TRACING is not set # CONFIG_MAC80211_DEBUG_MENU is not set CONFIG_MAC80211_STA_HASH_MAX_SIZE=0 # CONFIG_RFKILL is not set CONFIG_NET_9P=y CONFIG_NET_9P_FD=y CONFIG_NET_9P_VIRTIO=y # CONFIG_NET_9P_RDMA is not set # CONFIG_NET_9P_DEBUG is not set CONFIG_CAIF=m # CONFIG_CAIF_DEBUG is not set # CONFIG_CAIF_NETDEV is not set # CONFIG_CAIF_USB is not set # CONFIG_CEPH_LIB is not set # CONFIG_NFC is not set # CONFIG_PSAMPLE is not set # CONFIG_NET_IFE is not set CONFIG_LWTUNNEL=y CONFIG_LWTUNNEL_BPF=y CONFIG_DST_CACHE=y CONFIG_GRO_CELLS=y CONFIG_NET_SELFTESTS=y CONFIG_NET_SOCK_MSG=y CONFIG_NET_DEVLINK=y CONFIG_PAGE_POOL=y CONFIG_PAGE_POOL_STATS=y CONFIG_FAILOVER=y CONFIG_ETHTOOL_NETLINK=y # # Device Drivers # CONFIG_HAVE_EISA=y # CONFIG_EISA is not set CONFIG_HAVE_PCI=y CONFIG_GENERIC_PCI_IOMAP=y CONFIG_PCI=y CONFIG_PCI_DOMAINS=y CONFIG_PCIEPORTBUS=y # CONFIG_PCIEAER is not set CONFIG_PCIEASPM=y CONFIG_PCIEASPM_DEFAULT=y # CONFIG_PCIEASPM_POWERSAVE is not set # CONFIG_PCIEASPM_POWER_SUPERSAVE is not set # CONFIG_PCIEASPM_PERFORMANCE is not set CONFIG_PCIE_PME=y # CONFIG_PCIE_PTM is not set CONFIG_PCI_MSI=y CONFIG_PCI_QUIRKS=y # CONFIG_PCI_DEBUG is not set # CONFIG_PCI_REALLOC_ENABLE_AUTO is not set # CONFIG_PCI_STUB is not set # CONFIG_PCI_PF_STUB is not set CONFIG_PCI_ATS=y CONFIG_PCI_LOCKLESS_CONFIG=y CONFIG_PCI_IOV=y # CONFIG_PCI_NPEM is not set CONFIG_PCI_PRI=y CONFIG_PCI_PASID=y CONFIG_PCI_LABEL=y # CONFIG_PCIE_BUS_TUNE_OFF is not set CONFIG_PCIE_BUS_DEFAULT=y # CONFIG_PCIE_BUS_SAFE is not set # CONFIG_PCIE_BUS_PERFORMANCE is not set # CONFIG_PCIE_BUS_PEER2PEER is not set CONFIG_VGA_ARB=y CONFIG_VGA_ARB_MAX_GPUS=16 # CONFIG_HOTPLUG_PCI is not set # # PCI controller drivers # # CONFIG_VMD is not set # # Cadence-based PCIe controllers # # end of Cadence-based PCIe controllers # # DesignWare-based PCIe controllers # # CONFIG_PCI_MESON is not set # CONFIG_PCIE_DW_PLAT_HOST is not set # end of DesignWare-based PCIe controllers # # Mobiveil-based PCIe controllers # # end of Mobiveil-based PCIe controllers # # PLDA-based PCIe controllers # # end of PLDA-based PCIe controllers # end of PCI controller drivers # # PCI Endpoint # # CONFIG_PCI_ENDPOINT is not set # end of PCI Endpoint # # PCI switch controller drivers # # CONFIG_PCI_SW_SWITCHTEC is not set # end of PCI switch controller drivers # CONFIG_CXL_BUS is not set CONFIG_PCCARD=y CONFIG_PCMCIA=y CONFIG_PCMCIA_LOAD_CIS=y CONFIG_CARDBUS=y # # PC-card bridges # CONFIG_YENTA=y CONFIG_YENTA_O2=y CONFIG_YENTA_RICOH=y CONFIG_YENTA_TI=y CONFIG_YENTA_ENE_TUNE=y CONFIG_YENTA_TOSHIBA=y # CONFIG_PD6729 is not set # CONFIG_I82092 is not set CONFIG_PCCARD_NONSTATIC=y # CONFIG_RAPIDIO is not set # # Generic Driver Options # CONFIG_AUXILIARY_BUS=y CONFIG_UEVENT_HELPER=y CONFIG_UEVENT_HELPER_PATH="/sbin/hotplug" CONFIG_DEVTMPFS=y CONFIG_DEVTMPFS_MOUNT=y # CONFIG_DEVTMPFS_SAFE is not set CONFIG_STANDALONE=y # CONFIG_PREVENT_FIRMWARE_BUILD is not set # # Firmware loader # CONFIG_FW_LOADER=y CONFIG_FW_LOADER_PAGED_BUF=y CONFIG_FW_LOADER_SYSFS=y CONFIG_EXTRA_FIRMWARE="" CONFIG_FW_LOADER_USER_HELPER=y # CONFIG_FW_LOADER_USER_HELPER_FALLBACK is not set # CONFIG_FW_LOADER_COMPRESS is not set CONFIG_FW_CACHE=y # CONFIG_FW_UPLOAD is not set # end of Firmware loader CONFIG_ALLOW_DEV_COREDUMP=y # CONFIG_DEBUG_DRIVER is not set # CONFIG_DEBUG_DEVRES is not set # CONFIG_DEBUG_TEST_DRIVER_REMOVE is not set # CONFIG_TEST_ASYNC_DRIVER_PROBE is not set CONFIG_GENERIC_CPU_DEVICES=y CONFIG_GENERIC_CPU_AUTOPROBE=y CONFIG_GENERIC_CPU_VULNERABILITIES=y CONFIG_REGMAP=y CONFIG_REGMAP_I2C=m CONFIG_DMA_SHARED_BUFFER=y # CONFIG_DMA_FENCE_TRACE is not set # CONFIG_FW_DEVLINK_SYNC_STATE_TIMEOUT is not set # end of Generic Driver Options # # Bus devices # # CONFIG_MHI_BUS is not set # CONFIG_MHI_BUS_EP is not set # end of Bus devices # # Cache Drivers # # end of Cache Drivers CONFIG_CONNECTOR=y CONFIG_PROC_EVENTS=y # # Firmware Drivers # # # ARM System Control and Management Interface Protocol # # end of ARM System Control and Management Interface Protocol CONFIG_EDD=m # CONFIG_EDD_OFF is not set CONFIG_FIRMWARE_MEMMAP=y CONFIG_DMIID=y # CONFIG_DMI_SYSFS is not set CONFIG_DMI_SCAN_MACHINE_NON_EFI_FALLBACK=y # CONFIG_ISCSI_IBFT is not set # CONFIG_FW_CFG_SYSFS is not set CONFIG_SYSFB=y # CONFIG_SYSFB_SIMPLEFB is not set # CONFIG_GOOGLE_FIRMWARE is not set # # EFI (Extensible Firmware Interface) Support # CONFIG_EFI_ESRT=y CONFIG_EFI_DXE_MEM_ATTRIBUTES=y CONFIG_EFI_RUNTIME_WRAPPERS=y # CONFIG_EFI_BOOTLOADER_CONTROL is not set # CONFIG_EFI_CAPSULE_LOADER is not set # CONFIG_EFI_TEST is not set # CONFIG_APPLE_PROPERTIES is not set # CONFIG_RESET_ATTACK_MITIGATION is not set # CONFIG_EFI_RCI2_TABLE is not set # CONFIG_EFI_DISABLE_PCI_DMA is not set CONFIG_EFI_EARLYCON=y # CONFIG_EFI_CUSTOM_SSDT_OVERLAYS is not set # CONFIG_EFI_DISABLE_RUNTIME is not set # CONFIG_EFI_COCO_SECRET is not set # end of EFI (Extensible Firmware Interface) Support # # Qualcomm firmware drivers # # end of Qualcomm firmware drivers # # Tegra firmware driver # # end of Tegra firmware driver # end of Firmware Drivers # CONFIG_GNSS is not set # CONFIG_MTD is not set # CONFIG_OF is not set CONFIG_ARCH_MIGHT_HAVE_PC_PARPORT=y # CONFIG_PARPORT is not set CONFIG_PNP=y CONFIG_PNP_DEBUG_MESSAGES=y # # Protocols # CONFIG_PNPACPI=y CONFIG_BLK_DEV=y CONFIG_BLK_DEV_NULL_BLK=m CONFIG_BLK_DEV_FD=m # CONFIG_BLK_DEV_FD_RAWCMD is not set CONFIG_CDROM=m # CONFIG_BLK_DEV_PCIESSD_MTIP32XX is not set # CONFIG_ZRAM is not set CONFIG_ZRAM_DEF_COMP="unset-value" CONFIG_BLK_DEV_LOOP=y CONFIG_BLK_DEV_LOOP_MIN_COUNT=64 # CONFIG_BLK_DEV_DRBD is not set CONFIG_BLK_DEV_NBD=m CONFIG_BLK_DEV_RAM=y CONFIG_BLK_DEV_RAM_COUNT=16 CONFIG_BLK_DEV_RAM_SIZE=16384 # CONFIG_CDROM_PKTCDVD is not set CONFIG_ATA_OVER_ETH=m CONFIG_VIRTIO_BLK=y # CONFIG_BLK_DEV_RBD is not set # CONFIG_BLK_DEV_UBLK is not set # # NVME Support # CONFIG_NVME_CORE=m CONFIG_BLK_DEV_NVME=m # CONFIG_NVME_MULTIPATH is not set # CONFIG_NVME_VERBOSE_ERRORS is not set # CONFIG_NVME_HWMON is not set # CONFIG_NVME_RDMA is not set # CONFIG_NVME_FC is not set # CONFIG_NVME_TCP is not set # CONFIG_NVME_HOST_AUTH is not set # CONFIG_NVME_TARGET is not set # end of NVME Support # # Misc devices # # CONFIG_AD525X_DPOT is not set # CONFIG_DUMMY_IRQ is not set # CONFIG_IBM_ASM is not set # CONFIG_PHANTOM is not set # CONFIG_RPMB is not set CONFIG_TIFM_CORE=m CONFIG_TIFM_7XX1=m # CONFIG_ICS932S401 is not set CONFIG_ENCLOSURE_SERVICES=m CONFIG_HP_ILO=m # CONFIG_APDS9802ALS is not set # CONFIG_ISL29003 is not set # CONFIG_ISL29020 is not set # CONFIG_SENSORS_TSL2550 is not set # CONFIG_SENSORS_BH1770 is not set # CONFIG_SENSORS_APDS990X is not set # CONFIG_HMC6352 is not set # CONFIG_DS1682 is not set # CONFIG_SRAM is not set # CONFIG_DW_XDATA_PCIE is not set # CONFIG_PCI_ENDPOINT_TEST is not set # CONFIG_XILINX_SDFEC is not set # CONFIG_NSM is not set # CONFIG_C2PORT is not set # # EEPROM support # # CONFIG_EEPROM_AT24 is not set # CONFIG_EEPROM_MAX6875 is not set # CONFIG_EEPROM_93CX6 is not set # CONFIG_EEPROM_IDT_89HPESX is not set # CONFIG_EEPROM_EE1004 is not set # end of EEPROM support # CONFIG_CB710_CORE is not set # # Texas Instruments shared transport line discipline # # CONFIG_TI_ST is not set # end of Texas Instruments shared transport line discipline # CONFIG_SENSORS_LIS3_I2C is not set # # Altera FPGA firmware download module (requires I2C) # # CONFIG_ALTERA_STAPL is not set CONFIG_INTEL_MEI=m # CONFIG_INTEL_MEI_ME is not set CONFIG_INTEL_MEI_TXE=m # CONFIG_VMWARE_VMCI is not set # CONFIG_GENWQE is not set # CONFIG_ECHO is not set # CONFIG_BCM_VK is not set # CONFIG_MISC_ALCOR_PCI is not set # CONFIG_MISC_RTSX_PCI is not set # CONFIG_MISC_RTSX_USB is not set # CONFIG_UACCE is not set # CONFIG_PVPANIC is not set # CONFIG_KEBA_CP500 is not set # end of Misc devices # # SCSI device support # CONFIG_SCSI_MOD=y # CONFIG_RAID_ATTRS is not set CONFIG_SCSI_COMMON=y CONFIG_SCSI=y CONFIG_SCSI_DMA=y CONFIG_SCSI_PROC_FS=y # # SCSI support type (disk, tape, CD-ROM) # CONFIG_BLK_DEV_SD=y CONFIG_CHR_DEV_ST=m CONFIG_BLK_DEV_SR=m CONFIG_CHR_DEV_SG=m CONFIG_BLK_DEV_BSG=y CONFIG_CHR_DEV_SCH=m # CONFIG_SCSI_ENCLOSURE is not set # CONFIG_SCSI_CONSTANTS is not set # CONFIG_SCSI_LOGGING is not set # CONFIG_SCSI_SCAN_ASYNC is not set # # SCSI Transports # CONFIG_SCSI_SPI_ATTRS=y # CONFIG_SCSI_FC_ATTRS is not set CONFIG_SCSI_ISCSI_ATTRS=m CONFIG_SCSI_SAS_ATTRS=y # CONFIG_SCSI_SAS_LIBSAS is not set CONFIG_SCSI_SRP_ATTRS=m # end of SCSI Transports CONFIG_SCSI_LOWLEVEL=y # CONFIG_ISCSI_TCP is not set # CONFIG_ISCSI_BOOT_SYSFS is not set # CONFIG_SCSI_CXGB3_ISCSI is not set # CONFIG_SCSI_CXGB4_ISCSI is not set # CONFIG_SCSI_BNX2_ISCSI is not set # CONFIG_BE2ISCSI is not set # CONFIG_BLK_DEV_3W_XXXX_RAID is not set # CONFIG_SCSI_HPSA is not set # CONFIG_SCSI_3W_9XXX is not set # CONFIG_SCSI_3W_SAS is not set # CONFIG_SCSI_ACARD is not set # CONFIG_SCSI_AACRAID is not set # CONFIG_SCSI_AIC7XXX is not set # CONFIG_SCSI_AIC79XX is not set # CONFIG_SCSI_AIC94XX is not set # CONFIG_SCSI_MVSAS is not set # CONFIG_SCSI_MVUMI is not set # CONFIG_SCSI_ADVANSYS is not set # CONFIG_SCSI_ARCMSR is not set # CONFIG_SCSI_ESAS2R is not set # CONFIG_MEGARAID_NEWGEN is not set # CONFIG_MEGARAID_LEGACY is not set # CONFIG_MEGARAID_SAS is not set # CONFIG_SCSI_MPT3SAS is not set # CONFIG_SCSI_MPT2SAS is not set # CONFIG_SCSI_MPI3MR is not set # CONFIG_SCSI_SMARTPQI is not set # CONFIG_SCSI_HPTIOP is not set # CONFIG_SCSI_BUSLOGIC is not set # CONFIG_SCSI_MYRB is not set # CONFIG_SCSI_MYRS is not set # CONFIG_VMWARE_PVSCSI is not set # CONFIG_SCSI_SNIC is not set # CONFIG_SCSI_DMX3191D is not set # CONFIG_SCSI_FDOMAIN_PCI is not set # CONFIG_SCSI_ISCI is not set # CONFIG_SCSI_IPS is not set # CONFIG_SCSI_INITIO is not set # CONFIG_SCSI_INIA100 is not set # CONFIG_SCSI_STEX is not set # CONFIG_SCSI_SYM53C8XX_2 is not set # CONFIG_SCSI_IPR is not set # CONFIG_SCSI_QLOGIC_1280 is not set # CONFIG_SCSI_QLA_ISCSI is not set # CONFIG_SCSI_DC395x is not set # CONFIG_SCSI_AM53C974 is not set # CONFIG_SCSI_WD719X is not set # CONFIG_SCSI_DEBUG is not set # CONFIG_SCSI_PMCRAID is not set # CONFIG_SCSI_PM8001 is not set # CONFIG_SCSI_VIRTIO is not set # CONFIG_SCSI_LOWLEVEL_PCMCIA is not set # CONFIG_SCSI_DH is not set # end of SCSI device support CONFIG_ATA=y CONFIG_SATA_HOST=y CONFIG_PATA_TIMINGS=y CONFIG_ATA_VERBOSE_ERROR=y CONFIG_ATA_FORCE=y CONFIG_ATA_ACPI=y # CONFIG_SATA_ZPODD is not set CONFIG_SATA_PMP=y # # Controllers with non-SFF native interface # CONFIG_SATA_AHCI=y CONFIG_SATA_MOBILE_LPM_POLICY=0 # CONFIG_SATA_AHCI_PLATFORM is not set # CONFIG_AHCI_DWC is not set # CONFIG_SATA_INIC162X is not set # CONFIG_SATA_ACARD_AHCI is not set CONFIG_SATA_SIL24=m CONFIG_ATA_SFF=y # # SFF controllers with custom DMA interface # CONFIG_PDC_ADMA=m CONFIG_SATA_QSTOR=m CONFIG_SATA_SX4=m CONFIG_ATA_BMDMA=y # # SATA SFF controllers with BMDMA # CONFIG_ATA_PIIX=y # CONFIG_SATA_DWC is not set CONFIG_SATA_MV=m CONFIG_SATA_NV=y CONFIG_SATA_PROMISE=m CONFIG_SATA_SIL=y CONFIG_SATA_SIS=m CONFIG_SATA_SVW=m CONFIG_SATA_ULI=m CONFIG_SATA_VIA=m CONFIG_SATA_VITESSE=m # # PATA SFF controllers with BMDMA # # CONFIG_PATA_ALI is not set # CONFIG_PATA_AMD is not set # CONFIG_PATA_ARTOP is not set # CONFIG_PATA_ATIIXP is not set # CONFIG_PATA_ATP867X is not set # CONFIG_PATA_CMD64X is not set # CONFIG_PATA_CYPRESS is not set # CONFIG_PATA_EFAR is not set # CONFIG_PATA_HPT366 is not set # CONFIG_PATA_HPT37X is not set # CONFIG_PATA_HPT3X2N is not set # CONFIG_PATA_HPT3X3 is not set # CONFIG_PATA_IT8213 is not set # CONFIG_PATA_IT821X is not set # CONFIG_PATA_JMICRON is not set CONFIG_PATA_MARVELL=y # CONFIG_PATA_NETCELL is not set # CONFIG_PATA_NINJA32 is not set # CONFIG_PATA_NS87415 is not set # CONFIG_PATA_OLDPIIX is not set # CONFIG_PATA_OPTIDMA is not set # CONFIG_PATA_PDC2027X is not set # CONFIG_PATA_PDC_OLD is not set # CONFIG_PATA_RADISYS is not set # CONFIG_PATA_RDC is not set # CONFIG_PATA_SCH is not set # CONFIG_PATA_SERVERWORKS is not set # CONFIG_PATA_SIL680 is not set CONFIG_PATA_SIS=m # CONFIG_PATA_TOSHIBA is not set # CONFIG_PATA_TRIFLEX is not set # CONFIG_PATA_VIA is not set # CONFIG_PATA_WINBOND is not set # # PIO-only SFF controllers # # CONFIG_PATA_CMD640_PCI is not set # CONFIG_PATA_MPIIX is not set # CONFIG_PATA_NS87410 is not set # CONFIG_PATA_OPTI is not set # CONFIG_PATA_PCMCIA is not set # CONFIG_PATA_RZ1000 is not set # # Generic fallback / legacy drivers # # CONFIG_PATA_ACPI is not set # CONFIG_ATA_GENERIC is not set # CONFIG_PATA_LEGACY is not set CONFIG_MD=y CONFIG_BLK_DEV_MD=y CONFIG_MD_AUTODETECT=y CONFIG_MD_BITMAP_FILE=y CONFIG_MD_RAID0=m CONFIG_MD_RAID1=m CONFIG_MD_RAID10=m CONFIG_MD_RAID456=m # CONFIG_MD_CLUSTER is not set CONFIG_BCACHE=m # CONFIG_BCACHE_DEBUG is not set # CONFIG_BCACHE_ASYNC_REGISTRATION is not set CONFIG_BLK_DEV_DM_BUILTIN=y CONFIG_BLK_DEV_DM=m CONFIG_DM_DEBUG=y CONFIG_DM_BUFIO=m # CONFIG_DM_DEBUG_BLOCK_MANAGER_LOCKING is not set CONFIG_DM_BIO_PRISON=m CONFIG_DM_PERSISTENT_DATA=m # CONFIG_DM_UNSTRIPED is not set CONFIG_DM_CRYPT=m CONFIG_DM_SNAPSHOT=m CONFIG_DM_THIN_PROVISIONING=m CONFIG_DM_CACHE=m CONFIG_DM_CACHE_SMQ=m # CONFIG_DM_WRITECACHE is not set # CONFIG_DM_EBS is not set # CONFIG_DM_ERA is not set # CONFIG_DM_CLONE is not set CONFIG_DM_MIRROR=m # CONFIG_DM_LOG_USERSPACE is not set # CONFIG_DM_RAID is not set CONFIG_DM_ZERO=m CONFIG_DM_MULTIPATH=m # CONFIG_DM_MULTIPATH_QL is not set # CONFIG_DM_MULTIPATH_ST is not set # CONFIG_DM_MULTIPATH_HST is not set # CONFIG_DM_MULTIPATH_IOA is not set # CONFIG_DM_DELAY is not set # CONFIG_DM_DUST is not set # CONFIG_DM_UEVENT is not set # CONFIG_DM_FLAKEY is not set # CONFIG_DM_VERITY is not set # CONFIG_DM_SWITCH is not set # CONFIG_DM_LOG_WRITES is not set # CONFIG_DM_INTEGRITY is not set # CONFIG_DM_AUDIT is not set # CONFIG_DM_VDO is not set # CONFIG_TARGET_CORE is not set CONFIG_FUSION=y CONFIG_FUSION_SPI=y CONFIG_FUSION_SAS=y CONFIG_FUSION_MAX_SGE=40 CONFIG_FUSION_CTL=m # CONFIG_FUSION_LOGGING is not set # # IEEE 1394 (FireWire) support # # CONFIG_FIREWIRE is not set # CONFIG_FIREWIRE_NOSY is not set # end of IEEE 1394 (FireWire) support # CONFIG_MACINTOSH_DRIVERS is not set CONFIG_NETDEVICES=y CONFIG_MII=m CONFIG_NET_CORE=y CONFIG_BONDING=y CONFIG_DUMMY=y # CONFIG_WIREGUARD is not set CONFIG_EQUALIZER=m CONFIG_NET_FC=y CONFIG_IFB=m CONFIG_NET_TEAM=m CONFIG_NET_TEAM_MODE_BROADCAST=m CONFIG_NET_TEAM_MODE_ROUNDROBIN=m CONFIG_NET_TEAM_MODE_RANDOM=m CONFIG_NET_TEAM_MODE_ACTIVEBACKUP=m CONFIG_NET_TEAM_MODE_LOADBALANCE=m CONFIG_MACVLAN=m CONFIG_MACVTAP=m # CONFIG_IPVLAN is not set CONFIG_VXLAN=y CONFIG_GENEVE=y # CONFIG_BAREUDP is not set # CONFIG_GTP is not set # CONFIG_PFCP is not set # CONFIG_AMT is not set # CONFIG_MACSEC is not set CONFIG_NETCONSOLE=m # CONFIG_NETCONSOLE_DYNAMIC is not set # CONFIG_NETCONSOLE_EXTENDED_LOG is not set CONFIG_NETPOLL=y CONFIG_NET_POLL_CONTROLLER=y CONFIG_TUN=y CONFIG_TAP=m # CONFIG_TUN_VNET_CROSS_LE is not set CONFIG_VETH=y CONFIG_VIRTIO_NET=y # CONFIG_NLMON is not set CONFIG_NETKIT=y CONFIG_NET_VRF=y # CONFIG_ARCNET is not set CONFIG_ATM_DRIVERS=y # CONFIG_ATM_DUMMY is not set CONFIG_ATM_TCP=m CONFIG_ATM_LANAI=m CONFIG_ATM_ENI=m # CONFIG_ATM_ENI_DEBUG is not set # CONFIG_ATM_ENI_TUNE_BURST is not set # CONFIG_ATM_NICSTAR is not set CONFIG_ATM_IDT77252=m # CONFIG_ATM_IDT77252_DEBUG is not set # CONFIG_ATM_IDT77252_RCV_ALL is not set CONFIG_ATM_IDT77252_USE_SUNI=y # CONFIG_ATM_IA is not set # CONFIG_ATM_FORE200E is not set CONFIG_ATM_HE=m # CONFIG_ATM_HE_USE_SUNI is not set # CONFIG_ATM_SOLOS is not set # CONFIG_CAIF_DRIVERS is not set CONFIG_ETHERNET=y CONFIG_MDIO=y # CONFIG_NET_VENDOR_3COM is not set CONFIG_NET_VENDOR_ADAPTEC=y # CONFIG_ADAPTEC_STARFIRE is not set CONFIG_NET_VENDOR_AGERE=y # CONFIG_ET131X is not set CONFIG_NET_VENDOR_ALACRITECH=y # CONFIG_SLICOSS is not set CONFIG_NET_VENDOR_ALTEON=y # CONFIG_ACENIC is not set # CONFIG_ALTERA_TSE is not set # CONFIG_NET_VENDOR_AMAZON is not set CONFIG_NET_VENDOR_AMD=y CONFIG_AMD8111_ETH=m CONFIG_PCNET32=m # CONFIG_PCMCIA_NMCLAN is not set # CONFIG_AMD_XGBE is not set # CONFIG_PDS_CORE is not set CONFIG_NET_VENDOR_AQUANTIA=y # CONFIG_AQTION is not set CONFIG_NET_VENDOR_ARC=y CONFIG_NET_VENDOR_ASIX=y CONFIG_NET_VENDOR_ATHEROS=y # CONFIG_ATL2 is not set # CONFIG_ATL1 is not set # CONFIG_ATL1E is not set # CONFIG_ATL1C is not set # CONFIG_ALX is not set # CONFIG_CX_ECAT is not set CONFIG_NET_VENDOR_BROADCOM=y # CONFIG_B44 is not set # CONFIG_BCMGENET is not set CONFIG_BNX2=m # CONFIG_CNIC is not set CONFIG_TIGON3=m # CONFIG_TIGON3_HWMON is not set CONFIG_BNX2X=m CONFIG_BNX2X_SRIOV=y # CONFIG_SYSTEMPORT is not set # CONFIG_BNXT is not set CONFIG_NET_VENDOR_CADENCE=y # CONFIG_MACB is not set # CONFIG_NET_VENDOR_CAVIUM is not set CONFIG_NET_VENDOR_CHELSIO=y # CONFIG_CHELSIO_T1 is not set # CONFIG_CHELSIO_T3 is not set # CONFIG_CHELSIO_T4 is not set # CONFIG_CHELSIO_T4VF is not set CONFIG_NET_VENDOR_CISCO=y CONFIG_ENIC=m # CONFIG_NET_VENDOR_CORTINA is not set CONFIG_NET_VENDOR_DAVICOM=y # CONFIG_DNET is not set CONFIG_NET_VENDOR_DEC=y # CONFIG_NET_TULIP is not set CONFIG_NET_VENDOR_DLINK=y # CONFIG_DL2K is not set # CONFIG_SUNDANCE is not set CONFIG_NET_VENDOR_EMULEX=y CONFIG_BE2NET=m # CONFIG_BE2NET_HWMON is not set # CONFIG_BE2NET_BE2 is not set # CONFIG_BE2NET_BE3 is not set # CONFIG_BE2NET_LANCER is not set # CONFIG_BE2NET_SKYHAWK is not set # # WARNING: be2net is useless without any enabled chip # CONFIG_NET_VENDOR_ENGLEDER=y # CONFIG_TSNEP is not set # CONFIG_NET_VENDOR_EZCHIP is not set CONFIG_NET_VENDOR_FUJITSU=y # CONFIG_PCMCIA_FMVJ18X is not set CONFIG_NET_VENDOR_FUNGIBLE=y # CONFIG_FUN_ETH is not set # CONFIG_NET_VENDOR_GOOGLE is not set # CONFIG_NET_VENDOR_HUAWEI is not set CONFIG_NET_VENDOR_I825XX=y CONFIG_NET_VENDOR_INTEL=y CONFIG_LIBETH=m CONFIG_LIBIE=m CONFIG_E100=m CONFIG_E1000=m CONFIG_E1000E=m CONFIG_E1000E_HWTS=y CONFIG_IGB=m CONFIG_IGB_HWMON=y CONFIG_IGB_DCA=y # CONFIG_IGBVF is not set CONFIG_IXGBE=y CONFIG_IXGBE_HWMON=y CONFIG_IXGBE_DCA=y CONFIG_IXGBE_DCB=y CONFIG_IXGBEVF=m CONFIG_I40E=m # CONFIG_I40E_DCB is not set # CONFIG_I40EVF is not set # CONFIG_ICE is not set # CONFIG_FM10K is not set # CONFIG_IGC is not set # CONFIG_IDPF is not set # CONFIG_JME is not set CONFIG_NET_VENDOR_LITEX=y CONFIG_NET_VENDOR_MARVELL=y # CONFIG_MVMDIO is not set # CONFIG_SKGE is not set # CONFIG_SKY2 is not set # CONFIG_OCTEON_EP is not set # CONFIG_OCTEON_EP_VF is not set CONFIG_NET_VENDOR_MELLANOX=y CONFIG_MLX4_EN=y CONFIG_MLX4_EN_DCB=y CONFIG_MLX4_CORE=y CONFIG_MLX4_DEBUG=y # CONFIG_MLX4_CORE_GEN2 is not set CONFIG_MLX5_CORE=m # CONFIG_MLX5_FPGA is not set # CONFIG_MLX5_CORE_EN is not set # CONFIG_MLX5_DPLL is not set # CONFIG_MLXSW_CORE is not set # CONFIG_MLXFW is not set CONFIG_NET_VENDOR_META=y # CONFIG_FBNIC is not set CONFIG_NET_VENDOR_MICREL=y # CONFIG_KS8842 is not set # CONFIG_KS8851_MLL is not set # CONFIG_KSZ884X_PCI is not set # CONFIG_NET_VENDOR_MICROCHIP is not set # CONFIG_NET_VENDOR_MICROSEMI is not set CONFIG_NET_VENDOR_MICROSOFT=y CONFIG_NET_VENDOR_MYRI=y # CONFIG_MYRI10GE is not set # CONFIG_FEALNX is not set # CONFIG_NET_VENDOR_NI is not set CONFIG_NET_VENDOR_NATSEMI=y # CONFIG_NATSEMI is not set # CONFIG_NS83820 is not set # CONFIG_NET_VENDOR_NETERION is not set CONFIG_NET_VENDOR_NETRONOME=y CONFIG_NFP=y # CONFIG_NFP_DEBUG is not set CONFIG_NET_VENDOR_8390=y # CONFIG_PCMCIA_AXNET is not set # CONFIG_NE2K_PCI is not set # CONFIG_PCMCIA_PCNET is not set CONFIG_NET_VENDOR_NVIDIA=y CONFIG_FORCEDETH=m CONFIG_NET_VENDOR_OKI=y # CONFIG_ETHOC is not set CONFIG_NET_VENDOR_PACKET_ENGINES=y # CONFIG_HAMACHI is not set # CONFIG_YELLOWFIN is not set # CONFIG_NET_VENDOR_PENSANDO is not set CONFIG_NET_VENDOR_QLOGIC=y # CONFIG_QLA3XXX is not set CONFIG_QLCNIC=m CONFIG_QLCNIC_SRIOV=y CONFIG_QLCNIC_DCB=y CONFIG_QLCNIC_HWMON=y # CONFIG_NETXEN_NIC is not set # CONFIG_QED is not set CONFIG_NET_VENDOR_BROCADE=y CONFIG_BNA=m CONFIG_NET_VENDOR_QUALCOMM=y # CONFIG_QCOM_EMAC is not set # CONFIG_RMNET is not set CONFIG_NET_VENDOR_RDC=y # CONFIG_R6040 is not set CONFIG_NET_VENDOR_REALTEK=y # CONFIG_8139CP is not set # CONFIG_8139TOO is not set # CONFIG_R8169 is not set # CONFIG_RTASE is not set # CONFIG_NET_VENDOR_RENESAS is not set CONFIG_NET_VENDOR_ROCKER=y CONFIG_NET_VENDOR_SAMSUNG=y # CONFIG_SXGBE_ETH is not set CONFIG_NET_VENDOR_SEEQ=y CONFIG_NET_VENDOR_SILAN=y # CONFIG_SC92031 is not set CONFIG_NET_VENDOR_SIS=y # CONFIG_SIS900 is not set # CONFIG_SIS190 is not set CONFIG_NET_VENDOR_SOLARFLARE=y # CONFIG_SFC is not set # CONFIG_SFC_FALCON is not set # CONFIG_SFC_SIENA is not set CONFIG_NET_VENDOR_SMSC=y # CONFIG_PCMCIA_SMC91C92 is not set # CONFIG_EPIC100 is not set # CONFIG_SMSC911X is not set # CONFIG_SMSC9420 is not set # CONFIG_NET_VENDOR_SOCIONEXT is not set CONFIG_NET_VENDOR_STMICRO=y # CONFIG_STMMAC_ETH is not set CONFIG_NET_VENDOR_SUN=y # CONFIG_HAPPYMEAL is not set # CONFIG_SUNGEM is not set # CONFIG_CASSINI is not set # CONFIG_NIU is not set # CONFIG_NET_VENDOR_SYNOPSYS is not set CONFIG_NET_VENDOR_TEHUTI=y # CONFIG_TEHUTI is not set # CONFIG_TEHUTI_TN40 is not set CONFIG_NET_VENDOR_TI=y # CONFIG_TI_CPSW_PHY_SEL is not set # CONFIG_TLAN is not set CONFIG_NET_VENDOR_VERTEXCOM=y CONFIG_NET_VENDOR_VIA=y # CONFIG_VIA_RHINE is not set # CONFIG_VIA_VELOCITY is not set CONFIG_NET_VENDOR_WANGXUN=y # CONFIG_NGBE is not set CONFIG_NET_VENDOR_WIZNET=y # CONFIG_WIZNET_W5100 is not set # CONFIG_WIZNET_W5300 is not set # CONFIG_NET_VENDOR_XILINX is not set CONFIG_NET_VENDOR_XIRCOM=y # CONFIG_PCMCIA_XIRC2PS is not set # CONFIG_FDDI is not set # CONFIG_HIPPI is not set CONFIG_PHYLINK=m CONFIG_PHYLIB=y CONFIG_SWPHY=y # CONFIG_LED_TRIGGER_PHY is not set CONFIG_FIXED_PHY=y # CONFIG_SFP is not set # # MII PHY device drivers # # CONFIG_AIR_EN8811H_PHY is not set # CONFIG_AMD_PHY is not set # CONFIG_ADIN_PHY is not set # CONFIG_ADIN1100_PHY is not set # CONFIG_AQUANTIA_PHY is not set CONFIG_AX88796B_PHY=m CONFIG_BROADCOM_PHY=m # CONFIG_BCM54140_PHY is not set # CONFIG_BCM7XXX_PHY is not set # CONFIG_BCM84881_PHY is not set # CONFIG_BCM87XX_PHY is not set CONFIG_BCM_NET_PHYLIB=m CONFIG_CICADA_PHY=m # CONFIG_CORTINA_PHY is not set CONFIG_DAVICOM_PHY=m # CONFIG_ICPLUS_PHY is not set CONFIG_LXT_PHY=m # CONFIG_INTEL_XWAY_PHY is not set # CONFIG_LSI_ET1011C_PHY is not set CONFIG_MARVELL_PHY=m # CONFIG_MARVELL_10G_PHY is not set # CONFIG_MARVELL_88Q2XXX_PHY is not set # CONFIG_MARVELL_88X2222_PHY is not set # CONFIG_MAXLINEAR_GPHY is not set # CONFIG_MEDIATEK_GE_PHY is not set # CONFIG_MICREL_PHY is not set # CONFIG_MICROCHIP_T1S_PHY is not set # CONFIG_MICROCHIP_PHY is not set # CONFIG_MICROCHIP_T1_PHY is not set # CONFIG_MICROSEMI_PHY is not set # CONFIG_MOTORCOMM_PHY is not set # CONFIG_NATIONAL_PHY is not set # CONFIG_NXP_CBTX_PHY is not set # CONFIG_NXP_C45_TJA11XX_PHY is not set # CONFIG_NXP_TJA11XX_PHY is not set # CONFIG_NCN26000_PHY is not set # CONFIG_QCA83XX_PHY is not set # CONFIG_QCA808X_PHY is not set CONFIG_QSEMI_PHY=m # CONFIG_REALTEK_PHY is not set # CONFIG_RENESAS_PHY is not set # CONFIG_ROCKCHIP_PHY is not set CONFIG_SMSC_PHY=m # CONFIG_STE10XP is not set # CONFIG_TERANETICS_PHY is not set # CONFIG_DP83822_PHY is not set # CONFIG_DP83TC811_PHY is not set # CONFIG_DP83848_PHY is not set # CONFIG_DP83867_PHY is not set # CONFIG_DP83869_PHY is not set # CONFIG_DP83TD510_PHY is not set # CONFIG_DP83TG720_PHY is not set CONFIG_VITESSE_PHY=m # CONFIG_XILINX_GMII2RGMII is not set CONFIG_MDIO_DEVICE=y CONFIG_MDIO_BUS=y CONFIG_FWNODE_MDIO=y CONFIG_ACPI_MDIO=y CONFIG_MDIO_DEVRES=y # CONFIG_MDIO_BITBANG is not set # CONFIG_MDIO_BCM_UNIMAC is not set # CONFIG_MDIO_MVUSB is not set # CONFIG_MDIO_THUNDER is not set # # MDIO Multiplexers # # # PCS device drivers # # CONFIG_PCS_XPCS is not set # end of PCS device drivers CONFIG_PPP=m # CONFIG_PPP_BSDCOMP is not set CONFIG_PPP_DEFLATE=m CONFIG_PPP_FILTER=y CONFIG_PPP_MPPE=m CONFIG_PPP_MULTILINK=y CONFIG_PPPOATM=m CONFIG_PPPOE=m # CONFIG_PPPOE_HASH_BITS_1 is not set # CONFIG_PPPOE_HASH_BITS_2 is not set CONFIG_PPPOE_HASH_BITS_4=y # CONFIG_PPPOE_HASH_BITS_8 is not set CONFIG_PPPOE_HASH_BITS=4 # CONFIG_PPTP is not set CONFIG_PPP_ASYNC=m CONFIG_PPP_SYNC_TTY=m CONFIG_SLIP=m CONFIG_SLHC=m CONFIG_SLIP_COMPRESSED=y CONFIG_SLIP_SMART=y # CONFIG_SLIP_MODE_SLIP6 is not set CONFIG_USB_NET_DRIVERS=m # CONFIG_USB_CATC is not set # CONFIG_USB_KAWETH is not set # CONFIG_USB_PEGASUS is not set # CONFIG_USB_RTL8150 is not set # CONFIG_USB_RTL8152 is not set # CONFIG_USB_LAN78XX is not set CONFIG_USB_USBNET=m CONFIG_USB_NET_AX8817X=m CONFIG_USB_NET_AX88179_178A=m CONFIG_USB_NET_CDCETHER=m # CONFIG_USB_NET_CDC_EEM is not set CONFIG_USB_NET_CDC_NCM=m # CONFIG_USB_NET_HUAWEI_CDC_NCM is not set # CONFIG_USB_NET_CDC_MBIM is not set # CONFIG_USB_NET_DM9601 is not set # CONFIG_USB_NET_SR9700 is not set # CONFIG_USB_NET_SR9800 is not set # CONFIG_USB_NET_SMSC75XX is not set # CONFIG_USB_NET_SMSC95XX is not set # CONFIG_USB_NET_GL620A is not set CONFIG_USB_NET_NET1080=m # CONFIG_USB_NET_PLUSB is not set # CONFIG_USB_NET_MCS7830 is not set # CONFIG_USB_NET_RNDIS_HOST is not set CONFIG_USB_NET_CDC_SUBSET_ENABLE=m CONFIG_USB_NET_CDC_SUBSET=m # CONFIG_USB_ALI_M5632 is not set # CONFIG_USB_AN2720 is not set CONFIG_USB_BELKIN=y CONFIG_USB_ARMLINUX=y # CONFIG_USB_EPSON2888 is not set # CONFIG_USB_KC2190 is not set CONFIG_USB_NET_ZAURUS=m # CONFIG_USB_NET_CX82310_ETH is not set # CONFIG_USB_NET_KALMIA is not set # CONFIG_USB_NET_QMI_WWAN is not set # CONFIG_USB_NET_INT51X1 is not set # CONFIG_USB_IPHETH is not set # CONFIG_USB_SIERRA_NET is not set # CONFIG_USB_VL600 is not set # CONFIG_USB_NET_CH9200 is not set # CONFIG_USB_NET_AQC111 is not set CONFIG_USB_RTL8153_ECM=m CONFIG_WLAN=y # CONFIG_WLAN_VENDOR_ADMTEK is not set # CONFIG_WLAN_VENDOR_ATH is not set # CONFIG_WLAN_VENDOR_ATMEL is not set # CONFIG_WLAN_VENDOR_BROADCOM is not set # CONFIG_WLAN_VENDOR_INTEL is not set # CONFIG_WLAN_VENDOR_INTERSIL is not set # CONFIG_WLAN_VENDOR_MARVELL is not set # CONFIG_WLAN_VENDOR_MEDIATEK is not set CONFIG_WLAN_VENDOR_MICROCHIP=y # CONFIG_WILC1000_SDIO is not set CONFIG_WLAN_VENDOR_PURELIFI=y # CONFIG_PLFXLC is not set # CONFIG_WLAN_VENDOR_RALINK is not set # CONFIG_WLAN_VENDOR_REALTEK is not set # CONFIG_WLAN_VENDOR_RSI is not set CONFIG_WLAN_VENDOR_SILABS=y # CONFIG_WFX is not set # CONFIG_WLAN_VENDOR_ST is not set # CONFIG_WLAN_VENDOR_TI is not set # CONFIG_WLAN_VENDOR_ZYDAS is not set # CONFIG_WLAN_VENDOR_QUANTENNA is not set # CONFIG_MAC80211_HWSIM is not set # CONFIG_VIRT_WIFI is not set # CONFIG_WAN is not set # # Wireless WAN # # CONFIG_WWAN is not set # end of Wireless WAN # CONFIG_VMXNET3 is not set # CONFIG_FUJITSU_ES is not set CONFIG_NETDEVSIM=m CONFIG_NET_FAILOVER=y # CONFIG_ISDN is not set # # Input device support # CONFIG_INPUT=y # CONFIG_INPUT_LEDS is not set CONFIG_INPUT_FF_MEMLESS=y # CONFIG_INPUT_SPARSEKMAP is not set # CONFIG_INPUT_MATRIXKMAP is not set CONFIG_INPUT_VIVALDIFMAP=y # # Userland interfaces # CONFIG_INPUT_MOUSEDEV=y # CONFIG_INPUT_MOUSEDEV_PSAUX is not set CONFIG_INPUT_MOUSEDEV_SCREEN_X=1024 CONFIG_INPUT_MOUSEDEV_SCREEN_Y=768 # CONFIG_INPUT_JOYDEV is not set CONFIG_INPUT_EVDEV=y # CONFIG_INPUT_EVBUG is not set # # Input Device Drivers # CONFIG_INPUT_KEYBOARD=y # CONFIG_KEYBOARD_ADP5588 is not set # CONFIG_KEYBOARD_ADP5589 is not set CONFIG_KEYBOARD_ATKBD=y # CONFIG_KEYBOARD_QT1050 is not set # CONFIG_KEYBOARD_QT1070 is not set # CONFIG_KEYBOARD_QT2160 is not set # CONFIG_KEYBOARD_DLINK_DIR685 is not set # CONFIG_KEYBOARD_LKKBD is not set # CONFIG_KEYBOARD_GPIO is not set # CONFIG_KEYBOARD_GPIO_POLLED is not set # CONFIG_KEYBOARD_TCA6416 is not set # CONFIG_KEYBOARD_TCA8418 is not set # CONFIG_KEYBOARD_MATRIX is not set # CONFIG_KEYBOARD_LM8323 is not set # CONFIG_KEYBOARD_LM8333 is not set # CONFIG_KEYBOARD_MAX7359 is not set # CONFIG_KEYBOARD_MPR121 is not set # CONFIG_KEYBOARD_NEWTON is not set # CONFIG_KEYBOARD_OPENCORES is not set # CONFIG_KEYBOARD_SAMSUNG is not set # CONFIG_KEYBOARD_STOWAWAY is not set # CONFIG_KEYBOARD_SUNKBD is not set # CONFIG_KEYBOARD_TM2_TOUCHKEY is not set # CONFIG_KEYBOARD_XTKBD is not set # CONFIG_KEYBOARD_CYPRESS_SF is not set CONFIG_INPUT_MOUSE=y CONFIG_MOUSE_PS2=y CONFIG_MOUSE_PS2_ALPS=y CONFIG_MOUSE_PS2_BYD=y CONFIG_MOUSE_PS2_LOGIPS2PP=y CONFIG_MOUSE_PS2_PIXART=y CONFIG_MOUSE_PS2_SYNAPTICS=y CONFIG_MOUSE_PS2_CYPRESS=y CONFIG_MOUSE_PS2_LIFEBOOK=y CONFIG_MOUSE_PS2_TRACKPOINT=y # CONFIG_MOUSE_PS2_ELANTECH is not set # CONFIG_MOUSE_PS2_SENTELIC is not set # CONFIG_MOUSE_PS2_TOUCHKIT is not set # CONFIG_MOUSE_PS2_FOCALTECH is not set CONFIG_MOUSE_SERIAL=m # CONFIG_MOUSE_APPLETOUCH is not set # CONFIG_MOUSE_BCM5974 is not set # CONFIG_MOUSE_CYAPA is not set # CONFIG_MOUSE_ELAN_I2C is not set CONFIG_MOUSE_VSXXXAA=m # CONFIG_MOUSE_GPIO is not set # CONFIG_MOUSE_SYNAPTICS_I2C is not set # CONFIG_MOUSE_SYNAPTICS_USB is not set # CONFIG_INPUT_JOYSTICK is not set # CONFIG_INPUT_TABLET is not set # CONFIG_INPUT_TOUCHSCREEN is not set CONFIG_INPUT_MISC=y # CONFIG_INPUT_AD714X is not set # CONFIG_INPUT_BMA150 is not set # CONFIG_INPUT_E3X0_BUTTON is not set CONFIG_INPUT_PCSPKR=m # CONFIG_INPUT_MMA8450 is not set # CONFIG_INPUT_APANEL is not set # CONFIG_INPUT_GPIO_BEEPER is not set # CONFIG_INPUT_GPIO_DECODER is not set # CONFIG_INPUT_GPIO_VIBRA is not set # CONFIG_INPUT_ATLAS_BTNS is not set # CONFIG_INPUT_ATI_REMOTE2 is not set # CONFIG_INPUT_KEYSPAN_REMOTE is not set # CONFIG_INPUT_KXTJ9 is not set # CONFIG_INPUT_POWERMATE is not set # CONFIG_INPUT_YEALINK is not set # CONFIG_INPUT_CM109 is not set CONFIG_INPUT_UINPUT=m # CONFIG_INPUT_PCF8574 is not set # CONFIG_INPUT_GPIO_ROTARY_ENCODER is not set # CONFIG_INPUT_DA7280_HAPTICS is not set # CONFIG_INPUT_ADXL34X is not set # CONFIG_INPUT_IMS_PCU is not set # CONFIG_INPUT_IQS269A is not set # CONFIG_INPUT_IQS626A is not set # CONFIG_INPUT_IQS7222 is not set # CONFIG_INPUT_CMA3000 is not set # CONFIG_INPUT_IDEAPAD_SLIDEBAR is not set # CONFIG_INPUT_DRV260X_HAPTICS is not set # CONFIG_INPUT_DRV2665_HAPTICS is not set # CONFIG_INPUT_DRV2667_HAPTICS is not set # CONFIG_RMI4_CORE is not set # # Hardware I/O ports # CONFIG_SERIO=y CONFIG_ARCH_MIGHT_HAVE_PC_SERIO=y CONFIG_SERIO_I8042=y CONFIG_SERIO_SERPORT=y # CONFIG_SERIO_CT82C710 is not set # CONFIG_SERIO_PCIPS2 is not set CONFIG_SERIO_LIBPS2=y CONFIG_SERIO_RAW=m # CONFIG_SERIO_ALTERA_PS2 is not set # CONFIG_SERIO_PS2MULT is not set # CONFIG_SERIO_ARC_PS2 is not set # CONFIG_SERIO_GPIO_PS2 is not set # CONFIG_USERIO is not set # CONFIG_GAMEPORT is not set # end of Hardware I/O ports # end of Input device support # # Character devices # CONFIG_TTY=y CONFIG_VT=y CONFIG_CONSOLE_TRANSLATIONS=y CONFIG_VT_CONSOLE=y CONFIG_VT_CONSOLE_SLEEP=y CONFIG_VT_HW_CONSOLE_BINDING=y CONFIG_UNIX98_PTYS=y # CONFIG_LEGACY_PTYS is not set CONFIG_LEGACY_TIOCSTI=y CONFIG_LDISC_AUTOLOAD=y # # Serial drivers # CONFIG_SERIAL_EARLYCON=y CONFIG_SERIAL_8250=y CONFIG_SERIAL_8250_DEPRECATED_OPTIONS=y CONFIG_SERIAL_8250_PNP=y # CONFIG_SERIAL_8250_16550A_VARIANTS is not set # CONFIG_SERIAL_8250_FINTEK is not set CONFIG_SERIAL_8250_CONSOLE=y CONFIG_SERIAL_8250_DMA=y CONFIG_SERIAL_8250_PCILIB=y CONFIG_SERIAL_8250_PCI=y CONFIG_SERIAL_8250_EXAR=y CONFIG_SERIAL_8250_CS=m CONFIG_SERIAL_8250_NR_UARTS=32 CONFIG_SERIAL_8250_RUNTIME_UARTS=4 CONFIG_SERIAL_8250_EXTENDED=y CONFIG_SERIAL_8250_MANY_PORTS=y CONFIG_SERIAL_8250_PCI1XXXX=y CONFIG_SERIAL_8250_SHARE_IRQ=y CONFIG_SERIAL_8250_DETECT_IRQ=y CONFIG_SERIAL_8250_RSA=y # CONFIG_SERIAL_8250_DW is not set # CONFIG_SERIAL_8250_RT288X is not set # CONFIG_SERIAL_8250_LPSS is not set # CONFIG_SERIAL_8250_MID is not set CONFIG_SERIAL_8250_PERICOM=y # # Non-8250 serial port support # # CONFIG_SERIAL_UARTLITE is not set CONFIG_SERIAL_CORE=y CONFIG_SERIAL_CORE_CONSOLE=y CONFIG_SERIAL_JSM=m # CONFIG_SERIAL_LANTIQ is not set # CONFIG_SERIAL_SCCNXP is not set # CONFIG_SERIAL_SC16IS7XX is not set # CONFIG_SERIAL_ALTERA_JTAGUART is not set # CONFIG_SERIAL_ALTERA_UART is not set # CONFIG_SERIAL_ARC is not set # CONFIG_SERIAL_RP2 is not set # CONFIG_SERIAL_FSL_LPUART is not set # CONFIG_SERIAL_FSL_LINFLEXUART is not set # CONFIG_SERIAL_SPRD is not set # end of Serial drivers CONFIG_SERIAL_MCTRL_GPIO=y CONFIG_SERIAL_NONSTANDARD=y # CONFIG_MOXA_INTELLIO is not set # CONFIG_MOXA_SMARTIO is not set CONFIG_N_HDLC=m # CONFIG_IPWIRELESS is not set # CONFIG_N_GSM is not set # CONFIG_NOZOMI is not set # CONFIG_NULL_TTY is not set CONFIG_HVC_DRIVER=y # CONFIG_SERIAL_DEV_BUS is not set # CONFIG_TTY_PRINTK is not set CONFIG_VIRTIO_CONSOLE=y CONFIG_IPMI_HANDLER=m CONFIG_IPMI_DMI_DECODE=y CONFIG_IPMI_PLAT_DATA=y # CONFIG_IPMI_PANIC_EVENT is not set CONFIG_IPMI_DEVICE_INTERFACE=m CONFIG_IPMI_SI=m # CONFIG_IPMI_SSIF is not set CONFIG_IPMI_WATCHDOG=m CONFIG_IPMI_POWEROFF=m CONFIG_HW_RANDOM=y # CONFIG_HW_RANDOM_TIMERIOMEM is not set CONFIG_HW_RANDOM_INTEL=y CONFIG_HW_RANDOM_AMD=m # CONFIG_HW_RANDOM_BA431 is not set CONFIG_HW_RANDOM_VIA=y CONFIG_HW_RANDOM_VIRTIO=m # CONFIG_HW_RANDOM_XIPHERA is not set # CONFIG_APPLICOM is not set CONFIG_MWAVE=m CONFIG_DEVMEM=y CONFIG_NVRAM=y CONFIG_DEVPORT=y CONFIG_HPET=y # CONFIG_HPET_MMAP is not set CONFIG_HANGCHECK_TIMER=m CONFIG_TCG_TPM=y CONFIG_TCG_TPM2_HMAC=y # CONFIG_HW_RANDOM_TPM is not set CONFIG_TCG_TIS_CORE=y CONFIG_TCG_TIS=y # CONFIG_TCG_TIS_I2C is not set # CONFIG_TCG_TIS_I2C_CR50 is not set # CONFIG_TCG_TIS_I2C_ATMEL is not set # CONFIG_TCG_TIS_I2C_INFINEON is not set # CONFIG_TCG_TIS_I2C_NUVOTON is not set CONFIG_TCG_NSC=m CONFIG_TCG_ATMEL=m CONFIG_TCG_INFINEON=m CONFIG_TCG_CRB=y # CONFIG_TCG_VTPM_PROXY is not set # CONFIG_TCG_TIS_ST33ZP24_I2C is not set # CONFIG_TELCLOCK is not set # CONFIG_XILLYBUS is not set # CONFIG_XILLYUSB is not set # end of Character devices # # I2C support # CONFIG_I2C=m CONFIG_I2C_BOARDINFO=y CONFIG_I2C_CHARDEV=m # CONFIG_I2C_MUX is not set CONFIG_I2C_HELPER_AUTO=y CONFIG_I2C_SMBUS=m CONFIG_I2C_ALGOBIT=m # # I2C Hardware Bus support # # # PC SMBus host controller drivers # # CONFIG_I2C_ALI1535 is not set # CONFIG_I2C_ALI1563 is not set # CONFIG_I2C_ALI15X3 is not set CONFIG_I2C_AMD756=m CONFIG_I2C_AMD756_S4882=m CONFIG_I2C_AMD8111=m # CONFIG_I2C_AMD_MP2 is not set CONFIG_I2C_I801=m # CONFIG_I2C_ISCH is not set # CONFIG_I2C_ISMT is not set CONFIG_I2C_PIIX4=m CONFIG_I2C_NFORCE2=m # CONFIG_I2C_NFORCE2_S4985 is not set # CONFIG_I2C_NVIDIA_GPU is not set # CONFIG_I2C_SIS5595 is not set # CONFIG_I2C_SIS630 is not set CONFIG_I2C_SIS96X=m CONFIG_I2C_VIA=m CONFIG_I2C_VIAPRO=m # CONFIG_I2C_ZHAOXIN is not set # # ACPI drivers # # CONFIG_I2C_SCMI is not set # # I2C system bus drivers (mostly embedded / system-on-chip) # # CONFIG_I2C_CBUS_GPIO is not set # CONFIG_I2C_DESIGNWARE_CORE is not set # CONFIG_I2C_EMEV2 is not set # CONFIG_I2C_GPIO is not set # CONFIG_I2C_KEBA is not set # CONFIG_I2C_OCORES is not set # CONFIG_I2C_PCA_PLATFORM is not set # CONFIG_I2C_SIMTEC is not set # CONFIG_I2C_XILINX is not set # # External I2C/SMBus adapter drivers # # CONFIG_I2C_DIOLAN_U2C is not set # CONFIG_I2C_CP2615 is not set # CONFIG_I2C_PCI1XXXX is not set # CONFIG_I2C_ROBOTFUZZ_OSIF is not set # CONFIG_I2C_TAOS_EVM is not set # CONFIG_I2C_TINY_USB is not set # # Other I2C/SMBus bus drivers # # CONFIG_I2C_MLXCPLD is not set # CONFIG_I2C_VIRTIO is not set # end of I2C Hardware Bus support CONFIG_I2C_STUB=m # CONFIG_I2C_SLAVE is not set # CONFIG_I2C_DEBUG_CORE is not set # CONFIG_I2C_DEBUG_ALGO is not set # CONFIG_I2C_DEBUG_BUS is not set # end of I2C support # CONFIG_I3C is not set # CONFIG_SPI is not set # CONFIG_SPMI is not set # CONFIG_HSI is not set CONFIG_PPS=y # CONFIG_PPS_DEBUG is not set # # PPS clients support # # CONFIG_PPS_CLIENT_KTIMER is not set # CONFIG_PPS_CLIENT_LDISC is not set # CONFIG_PPS_CLIENT_GPIO is not set # # PPS generators support # # # PTP clock support # CONFIG_PTP_1588_CLOCK=y CONFIG_PTP_1588_CLOCK_OPTIONAL=y # # Enable PHYLIB and NETWORK_PHY_TIMESTAMPING to see the additional clocks. # # CONFIG_PTP_1588_CLOCK_IDT82P33 is not set # CONFIG_PTP_1588_CLOCK_IDTCM is not set # CONFIG_PTP_1588_CLOCK_FC3W is not set # CONFIG_PTP_1588_CLOCK_MOCK is not set # end of PTP clock support # CONFIG_PINCTRL is not set CONFIG_GPIOLIB=y CONFIG_GPIOLIB_FASTPATH_LIMIT=512 CONFIG_GPIO_ACPI=y # CONFIG_DEBUG_GPIO is not set CONFIG_GPIO_SYSFS=y CONFIG_GPIO_CDEV=y CONFIG_GPIO_CDEV_V1=y # # Memory mapped GPIO drivers # # CONFIG_GPIO_AMDPT is not set # CONFIG_GPIO_DWAPB is not set # CONFIG_GPIO_EXAR is not set # CONFIG_GPIO_GENERIC_PLATFORM is not set # CONFIG_GPIO_GRANITERAPIDS is not set # CONFIG_GPIO_ICH is not set # CONFIG_GPIO_MB86S7X is not set # CONFIG_GPIO_AMD_FCH is not set # end of Memory mapped GPIO drivers # # Port-mapped I/O GPIO drivers # # CONFIG_GPIO_VX855 is not set # CONFIG_GPIO_F7188X is not set # CONFIG_GPIO_IT87 is not set # CONFIG_GPIO_SCH311X is not set # CONFIG_GPIO_WINBOND is not set # CONFIG_GPIO_WS16C48 is not set # end of Port-mapped I/O GPIO drivers # # I2C GPIO expanders # # CONFIG_GPIO_FXL6408 is not set # CONFIG_GPIO_DS4520 is not set # CONFIG_GPIO_MAX7300 is not set # CONFIG_GPIO_MAX732X is not set # CONFIG_GPIO_PCA953X is not set # CONFIG_GPIO_PCA9570 is not set # CONFIG_GPIO_PCF857X is not set # CONFIG_GPIO_TPIC2810 is not set # end of I2C GPIO expanders # # MFD GPIO expanders # # CONFIG_GPIO_ELKHARTLAKE is not set # end of MFD GPIO expanders # # PCI GPIO expanders # # CONFIG_GPIO_AMD8111 is not set # CONFIG_GPIO_BT8XX is not set # CONFIG_GPIO_ML_IOH is not set # CONFIG_GPIO_PCI_IDIO_16 is not set # CONFIG_GPIO_PCIE_IDIO_24 is not set # CONFIG_GPIO_RDC321X is not set # end of PCI GPIO expanders # # USB GPIO expanders # # end of USB GPIO expanders # # Virtual GPIO drivers # # CONFIG_GPIO_AGGREGATOR is not set # CONFIG_GPIO_LATCH is not set # CONFIG_GPIO_MOCKUP is not set # CONFIG_GPIO_VIRTIO is not set # CONFIG_GPIO_SIM is not set # end of Virtual GPIO drivers # # GPIO Debugging utilities # # CONFIG_GPIO_SLOPPY_LOGIC_ANALYZER is not set # CONFIG_GPIO_VIRTUSER is not set # end of GPIO Debugging utilities # CONFIG_W1 is not set # CONFIG_POWER_RESET is not set # CONFIG_POWER_SEQUENCING is not set CONFIG_POWER_SUPPLY=y # CONFIG_POWER_SUPPLY_DEBUG is not set # CONFIG_POWER_SUPPLY_HWMON is not set # CONFIG_IP5XXX_POWER is not set # CONFIG_TEST_POWER is not set # CONFIG_CHARGER_ADP5061 is not set # CONFIG_BATTERY_CW2015 is not set # CONFIG_BATTERY_DS2780 is not set # CONFIG_BATTERY_DS2781 is not set # CONFIG_BATTERY_DS2782 is not set # CONFIG_BATTERY_SAMSUNG_SDI is not set # CONFIG_BATTERY_SBS is not set # CONFIG_CHARGER_SBS is not set # CONFIG_BATTERY_BQ27XXX is not set # CONFIG_BATTERY_MAX17042 is not set # CONFIG_BATTERY_MAX1720X is not set # CONFIG_CHARGER_MAX8903 is not set # CONFIG_CHARGER_LP8727 is not set # CONFIG_CHARGER_GPIO is not set # CONFIG_CHARGER_LT3651 is not set # CONFIG_CHARGER_LTC4162L is not set # CONFIG_CHARGER_MAX77976 is not set # CONFIG_CHARGER_BQ2415X is not set # CONFIG_CHARGER_BQ24257 is not set # CONFIG_CHARGER_BQ24735 is not set # CONFIG_CHARGER_BQ2515X is not set # CONFIG_CHARGER_BQ25890 is not set # CONFIG_CHARGER_BQ25980 is not set # CONFIG_CHARGER_BQ256XX is not set # CONFIG_BATTERY_GAUGE_LTC2941 is not set # CONFIG_BATTERY_GOLDFISH is not set # CONFIG_BATTERY_RT5033 is not set # CONFIG_CHARGER_RT9455 is not set # CONFIG_CHARGER_BD99954 is not set # CONFIG_BATTERY_UG3105 is not set # CONFIG_FUEL_GAUGE_MM8013 is not set CONFIG_HWMON=y CONFIG_HWMON_VID=m # CONFIG_HWMON_DEBUG_CHIP is not set # # Native drivers # CONFIG_SENSORS_ABITUGURU=m # CONFIG_SENSORS_ABITUGURU3 is not set # CONFIG_SENSORS_AD7414 is not set # CONFIG_SENSORS_AD7418 is not set CONFIG_SENSORS_ADM1025=m CONFIG_SENSORS_ADM1026=m # CONFIG_SENSORS_ADM1029 is not set CONFIG_SENSORS_ADM1031=m # CONFIG_SENSORS_ADM1177 is not set CONFIG_SENSORS_ADM9240=m # CONFIG_SENSORS_ADT7410 is not set # CONFIG_SENSORS_ADT7411 is not set # CONFIG_SENSORS_ADT7462 is not set # CONFIG_SENSORS_ADT7470 is not set # CONFIG_SENSORS_ADT7475 is not set # CONFIG_SENSORS_AHT10 is not set # CONFIG_SENSORS_AQUACOMPUTER_D5NEXT is not set # CONFIG_SENSORS_AS370 is not set # CONFIG_SENSORS_ASC7621 is not set # CONFIG_SENSORS_ASUS_ROG_RYUJIN is not set # CONFIG_SENSORS_AXI_FAN_CONTROL is not set CONFIG_SENSORS_K8TEMP=m CONFIG_SENSORS_K10TEMP=m # CONFIG_SENSORS_FAM15H_POWER is not set # CONFIG_SENSORS_APPLESMC is not set CONFIG_SENSORS_ASB100=m CONFIG_SENSORS_ATXP1=m # CONFIG_SENSORS_CHIPCAP2 is not set # CONFIG_SENSORS_CORSAIR_CPRO is not set # CONFIG_SENSORS_CORSAIR_PSU is not set # CONFIG_SENSORS_DRIVETEMP is not set # CONFIG_SENSORS_DS620 is not set CONFIG_SENSORS_DS1621=m # CONFIG_SENSORS_DELL_SMM is not set # CONFIG_SENSORS_I5K_AMB is not set CONFIG_SENSORS_F71805F=m # CONFIG_SENSORS_F71882FG is not set # CONFIG_SENSORS_F75375S is not set # CONFIG_SENSORS_FSCHMD is not set # CONFIG_SENSORS_FTSTEUTATES is not set # CONFIG_SENSORS_GIGABYTE_WATERFORCE is not set CONFIG_SENSORS_GL518SM=m CONFIG_SENSORS_GL520SM=m # CONFIG_SENSORS_G760A is not set # CONFIG_SENSORS_G762 is not set # CONFIG_SENSORS_HIH6130 is not set # CONFIG_SENSORS_HS3001 is not set # CONFIG_SENSORS_IBMAEM is not set # CONFIG_SENSORS_IBMPEX is not set # CONFIG_SENSORS_I5500 is not set CONFIG_SENSORS_CORETEMP=m CONFIG_SENSORS_IT87=m # CONFIG_SENSORS_JC42 is not set # CONFIG_SENSORS_POWERZ is not set # CONFIG_SENSORS_POWR1220 is not set # CONFIG_SENSORS_LENOVO_EC is not set # CONFIG_SENSORS_LINEAGE is not set # CONFIG_SENSORS_LTC2945 is not set # CONFIG_SENSORS_LTC2947_I2C is not set # CONFIG_SENSORS_LTC2990 is not set # CONFIG_SENSORS_LTC2991 is not set # CONFIG_SENSORS_LTC2992 is not set # CONFIG_SENSORS_LTC4151 is not set # CONFIG_SENSORS_LTC4215 is not set # CONFIG_SENSORS_LTC4222 is not set # CONFIG_SENSORS_LTC4245 is not set # CONFIG_SENSORS_LTC4260 is not set # CONFIG_SENSORS_LTC4261 is not set # CONFIG_SENSORS_LTC4282 is not set # CONFIG_SENSORS_MAX127 is not set # CONFIG_SENSORS_MAX16065 is not set CONFIG_SENSORS_MAX1619=m # CONFIG_SENSORS_MAX1668 is not set # CONFIG_SENSORS_MAX197 is not set # CONFIG_SENSORS_MAX31730 is not set # CONFIG_SENSORS_MAX31760 is not set # CONFIG_MAX31827 is not set # CONFIG_SENSORS_MAX6620 is not set # CONFIG_SENSORS_MAX6621 is not set # CONFIG_SENSORS_MAX6639 is not set # CONFIG_SENSORS_MAX6650 is not set # CONFIG_SENSORS_MAX6697 is not set # CONFIG_SENSORS_MAX31790 is not set # CONFIG_SENSORS_MC34VR500 is not set # CONFIG_SENSORS_MCP3021 is not set # CONFIG_SENSORS_TC654 is not set # CONFIG_SENSORS_TPS23861 is not set # CONFIG_SENSORS_MR75203 is not set CONFIG_SENSORS_LM63=m # CONFIG_SENSORS_LM73 is not set CONFIG_SENSORS_LM75=m CONFIG_SENSORS_LM77=m CONFIG_SENSORS_LM78=m CONFIG_SENSORS_LM80=m CONFIG_SENSORS_LM83=m CONFIG_SENSORS_LM85=m CONFIG_SENSORS_LM87=m CONFIG_SENSORS_LM90=m CONFIG_SENSORS_LM92=m # CONFIG_SENSORS_LM93 is not set # CONFIG_SENSORS_LM95234 is not set # CONFIG_SENSORS_LM95241 is not set # CONFIG_SENSORS_LM95245 is not set CONFIG_SENSORS_PC87360=m CONFIG_SENSORS_PC87427=m # CONFIG_SENSORS_NCT6683 is not set # CONFIG_SENSORS_NCT6775 is not set # CONFIG_SENSORS_NCT6775_I2C is not set # CONFIG_SENSORS_NCT7802 is not set # CONFIG_SENSORS_NCT7904 is not set # CONFIG_SENSORS_NPCM7XX is not set # CONFIG_SENSORS_NZXT_KRAKEN2 is not set # CONFIG_SENSORS_NZXT_KRAKEN3 is not set # CONFIG_SENSORS_NZXT_SMART2 is not set # CONFIG_SENSORS_OCC_P8_I2C is not set # CONFIG_SENSORS_OXP is not set CONFIG_SENSORS_PCF8591=m # CONFIG_PMBUS is not set # CONFIG_SENSORS_PT5161L is not set # CONFIG_SENSORS_SBTSI is not set # CONFIG_SENSORS_SBRMI is not set # CONFIG_SENSORS_SHT15 is not set # CONFIG_SENSORS_SHT21 is not set # CONFIG_SENSORS_SHT3x is not set # CONFIG_SENSORS_SHT4x is not set # CONFIG_SENSORS_SHTC1 is not set CONFIG_SENSORS_SIS5595=m # CONFIG_SENSORS_DME1737 is not set # CONFIG_SENSORS_EMC1403 is not set # CONFIG_SENSORS_EMC2103 is not set # CONFIG_SENSORS_EMC2305 is not set # CONFIG_SENSORS_EMC6W201 is not set CONFIG_SENSORS_SMSC47M1=m CONFIG_SENSORS_SMSC47M192=m CONFIG_SENSORS_SMSC47B397=m # CONFIG_SENSORS_SCH5627 is not set # CONFIG_SENSORS_SCH5636 is not set # CONFIG_SENSORS_STTS751 is not set # CONFIG_SENSORS_ADC128D818 is not set # CONFIG_SENSORS_ADS7828 is not set # CONFIG_SENSORS_AMC6821 is not set # CONFIG_SENSORS_INA209 is not set # CONFIG_SENSORS_INA2XX is not set # CONFIG_SENSORS_INA238 is not set # CONFIG_SENSORS_INA3221 is not set # CONFIG_SENSORS_SPD5118 is not set # CONFIG_SENSORS_TC74 is not set # CONFIG_SENSORS_THMC50 is not set # CONFIG_SENSORS_TMP102 is not set # CONFIG_SENSORS_TMP103 is not set # CONFIG_SENSORS_TMP108 is not set # CONFIG_SENSORS_TMP401 is not set # CONFIG_SENSORS_TMP421 is not set # CONFIG_SENSORS_TMP464 is not set # CONFIG_SENSORS_TMP513 is not set # CONFIG_SENSORS_VIA_CPUTEMP is not set CONFIG_SENSORS_VIA686A=m CONFIG_SENSORS_VT1211=m CONFIG_SENSORS_VT8231=m # CONFIG_SENSORS_W83773G is not set CONFIG_SENSORS_W83781D=m CONFIG_SENSORS_W83791D=m CONFIG_SENSORS_W83792D=m CONFIG_SENSORS_W83793=m CONFIG_SENSORS_W83795=m # CONFIG_SENSORS_W83795_FANCTRL is not set CONFIG_SENSORS_W83L785TS=m # CONFIG_SENSORS_W83L786NG is not set CONFIG_SENSORS_W83627HF=m CONFIG_SENSORS_W83627EHF=m # CONFIG_SENSORS_XGENE is not set # # ACPI drivers # # CONFIG_SENSORS_ACPI_POWER is not set # CONFIG_SENSORS_ATK0110 is not set # CONFIG_SENSORS_ASUS_WMI is not set # CONFIG_SENSORS_ASUS_EC is not set # CONFIG_SENSORS_HP_WMI is not set CONFIG_THERMAL=y # CONFIG_THERMAL_NETLINK is not set # CONFIG_THERMAL_STATISTICS is not set # CONFIG_THERMAL_DEBUGFS is not set # CONFIG_THERMAL_CORE_TESTING is not set CONFIG_THERMAL_EMERGENCY_POWEROFF_DELAY_MS=0 CONFIG_THERMAL_HWMON=y CONFIG_THERMAL_DEFAULT_GOV_STEP_WISE=y # CONFIG_THERMAL_DEFAULT_GOV_FAIR_SHARE is not set # CONFIG_THERMAL_DEFAULT_GOV_USER_SPACE is not set # CONFIG_THERMAL_GOV_FAIR_SHARE is not set CONFIG_THERMAL_GOV_STEP_WISE=y # CONFIG_THERMAL_GOV_BANG_BANG is not set CONFIG_THERMAL_GOV_USER_SPACE=y # CONFIG_THERMAL_EMULATION is not set # # Intel thermal drivers # CONFIG_INTEL_POWERCLAMP=y CONFIG_X86_THERMAL_VECTOR=y CONFIG_INTEL_TCC=y CONFIG_X86_PKG_TEMP_THERMAL=m # CONFIG_INTEL_SOC_DTS_THERMAL is not set # # ACPI INT340X thermal drivers # # CONFIG_INT340X_THERMAL is not set # end of ACPI INT340X thermal drivers # CONFIG_INTEL_PCH_THERMAL is not set # CONFIG_INTEL_TCC_COOLING is not set # CONFIG_INTEL_HFI_THERMAL is not set # end of Intel thermal drivers CONFIG_WATCHDOG=y CONFIG_WATCHDOG_CORE=y # CONFIG_WATCHDOG_NOWAYOUT is not set CONFIG_WATCHDOG_HANDLE_BOOT_ENABLED=y CONFIG_WATCHDOG_OPEN_TIMEOUT=0 # CONFIG_WATCHDOG_SYSFS is not set # CONFIG_WATCHDOG_HRTIMER_PRETIMEOUT is not set # # Watchdog Pretimeout Governors # # CONFIG_WATCHDOG_PRETIMEOUT_GOV is not set # # Watchdog Device Drivers # CONFIG_SOFT_WATCHDOG=m # CONFIG_LENOVO_SE10_WDT is not set # CONFIG_WDAT_WDT is not set # CONFIG_XILINX_WATCHDOG is not set # CONFIG_ZIIRAVE_WATCHDOG is not set # CONFIG_CADENCE_WATCHDOG is not set # CONFIG_DW_WATCHDOG is not set # CONFIG_MAX63XX_WATCHDOG is not set # CONFIG_ACQUIRE_WDT is not set # CONFIG_ADVANTECH_WDT is not set # CONFIG_ADVANTECH_EC_WDT is not set CONFIG_ALIM1535_WDT=m CONFIG_ALIM7101_WDT=m # CONFIG_EBC_C384_WDT is not set # CONFIG_EXAR_WDT is not set # CONFIG_F71808E_WDT is not set # CONFIG_SP5100_TCO is not set # CONFIG_SBC_FITPC2_WATCHDOG is not set # CONFIG_EUROTECH_WDT is not set # CONFIG_IB700_WDT is not set CONFIG_IBMASR=m # CONFIG_WAFER_WDT is not set CONFIG_I6300ESB_WDT=m # CONFIG_IE6XX_WDT is not set CONFIG_ITCO_WDT=m CONFIG_ITCO_VENDOR_SUPPORT=y # CONFIG_IT8712F_WDT is not set # CONFIG_IT87_WDT is not set # CONFIG_HP_WATCHDOG is not set # CONFIG_SC1200_WDT is not set # CONFIG_PC87413_WDT is not set # CONFIG_NV_TCO is not set # CONFIG_60XX_WDT is not set # CONFIG_CPU5_WDT is not set # CONFIG_SMSC_SCH311X_WDT is not set # CONFIG_SMSC37B787_WDT is not set # CONFIG_TQMX86_WDT is not set # CONFIG_VIA_WDT is not set CONFIG_W83627HF_WDT=m CONFIG_W83877F_WDT=m CONFIG_W83977F_WDT=m CONFIG_MACHZ_WDT=m # CONFIG_SBC_EPX_C3_WATCHDOG is not set # CONFIG_INTEL_MEI_WDT is not set # CONFIG_NI903X_WDT is not set # CONFIG_NIC7018_WDT is not set # CONFIG_MEN_A21_WDT is not set # # PCI-based Watchdog Cards # CONFIG_PCIPCWATCHDOG=m CONFIG_WDTPCI=m # # USB-based Watchdog Cards # CONFIG_USBPCWATCHDOG=m CONFIG_SSB_POSSIBLE=y # CONFIG_SSB is not set CONFIG_BCMA_POSSIBLE=y # CONFIG_BCMA is not set # # Multifunction device drivers # CONFIG_MFD_CORE=m # CONFIG_MFD_SMPRO is not set # CONFIG_MFD_BCM590XX is not set # CONFIG_MFD_BD9571MWV is not set # CONFIG_MFD_AXP20X_I2C is not set # CONFIG_MFD_CS42L43_I2C is not set # CONFIG_MFD_MADERA is not set # CONFIG_MFD_DA9062 is not set # CONFIG_MFD_DA9063 is not set # CONFIG_MFD_DA9150 is not set # CONFIG_MFD_DLN2 is not set # CONFIG_MFD_MC13XXX_I2C is not set # CONFIG_MFD_MP2629 is not set # CONFIG_MFD_INTEL_QUARK_I2C_GPIO is not set CONFIG_LPC_ICH=m # CONFIG_LPC_SCH is not set # CONFIG_MFD_INTEL_LPSS_ACPI is not set # CONFIG_MFD_INTEL_LPSS_PCI is not set # CONFIG_MFD_INTEL_PMC_BXT is not set # CONFIG_MFD_IQS62X is not set # CONFIG_MFD_JANZ_CMODIO is not set # CONFIG_MFD_KEMPLD is not set # CONFIG_MFD_88PM800 is not set # CONFIG_MFD_88PM805 is not set # CONFIG_MFD_MAX14577 is not set # CONFIG_MFD_MAX77693 is not set # CONFIG_MFD_MAX8907 is not set # CONFIG_MFD_MT6360 is not set # CONFIG_MFD_MT6370 is not set # CONFIG_MFD_MT6397 is not set # CONFIG_MFD_MENF21BMC is not set # CONFIG_MFD_VIPERBOARD is not set # CONFIG_MFD_RETU is not set # CONFIG_MFD_PCF50633 is not set # CONFIG_MFD_SY7636A is not set # CONFIG_MFD_RDC321X is not set # CONFIG_MFD_RT4831 is not set # CONFIG_MFD_RT5033 is not set # CONFIG_MFD_RT5120 is not set # CONFIG_MFD_SI476X_CORE is not set # CONFIG_MFD_SM501 is not set # CONFIG_MFD_SKY81452 is not set # CONFIG_MFD_SYSCON is not set # CONFIG_MFD_LP3943 is not set # CONFIG_MFD_TI_LMU is not set # CONFIG_TPS6105X is not set # CONFIG_TPS65010 is not set # CONFIG_TPS6507X is not set # CONFIG_MFD_TPS65086 is not set # CONFIG_MFD_TI_LP873X is not set # CONFIG_MFD_TPS65912_I2C is not set # CONFIG_MFD_TPS6594_I2C is not set # CONFIG_MFD_WL1273_CORE is not set # CONFIG_MFD_LM3533 is not set # CONFIG_MFD_TQMX86 is not set # CONFIG_MFD_VX855 is not set # CONFIG_MFD_ARIZONA_I2C is not set # CONFIG_MFD_WM8994 is not set # CONFIG_MFD_ATC260X_I2C is not set # CONFIG_MFD_CS40L50_I2C is not set # end of Multifunction device drivers # CONFIG_REGULATOR is not set CONFIG_RC_CORE=y CONFIG_BPF_LIRC_MODE2=y CONFIG_LIRC=y CONFIG_RC_MAP=y # CONFIG_RC_DECODERS is not set # CONFIG_RC_DEVICES is not set # # CEC support # # CONFIG_MEDIA_CEC_SUPPORT is not set # end of CEC support # CONFIG_MEDIA_SUPPORT is not set # # Graphics support # CONFIG_APERTURE_HELPERS=y CONFIG_SCREEN_INFO=y CONFIG_VIDEO=y # CONFIG_AUXDISPLAY is not set CONFIG_AGP=y CONFIG_AGP_AMD64=y CONFIG_AGP_INTEL=y CONFIG_AGP_SIS=y CONFIG_AGP_VIA=y CONFIG_INTEL_GTT=y # CONFIG_VGA_SWITCHEROO is not set # CONFIG_DRM is not set # # Frame buffer Devices # CONFIG_FB=y CONFIG_FB_CIRRUS=m # CONFIG_FB_PM2 is not set # CONFIG_FB_CYBER2000 is not set # CONFIG_FB_ARC is not set # CONFIG_FB_ASILIANT is not set # CONFIG_FB_IMSTT is not set CONFIG_FB_VGA16=m # CONFIG_FB_UVESA is not set CONFIG_FB_VESA=y # CONFIG_FB_EFI is not set # CONFIG_FB_N411 is not set # CONFIG_FB_HGA is not set # CONFIG_FB_OPENCORES is not set # CONFIG_FB_S1D13XXX is not set CONFIG_FB_NVIDIA=m CONFIG_FB_NVIDIA_I2C=y # CONFIG_FB_NVIDIA_DEBUG is not set CONFIG_FB_NVIDIA_BACKLIGHT=y CONFIG_FB_RIVA=m # CONFIG_FB_RIVA_I2C is not set # CONFIG_FB_RIVA_DEBUG is not set CONFIG_FB_RIVA_BACKLIGHT=y # CONFIG_FB_I740 is not set CONFIG_FB_MATROX=m CONFIG_FB_MATROX_MILLENIUM=y CONFIG_FB_MATROX_MYSTIQUE=y CONFIG_FB_MATROX_G=y CONFIG_FB_MATROX_I2C=m CONFIG_FB_MATROX_MAVEN=m CONFIG_FB_RADEON=m CONFIG_FB_RADEON_I2C=y CONFIG_FB_RADEON_BACKLIGHT=y # CONFIG_FB_RADEON_DEBUG is not set CONFIG_FB_ATY128=m CONFIG_FB_ATY128_BACKLIGHT=y CONFIG_FB_ATY=m CONFIG_FB_ATY_CT=y CONFIG_FB_ATY_GENERIC_LCD=y CONFIG_FB_ATY_GX=y CONFIG_FB_ATY_BACKLIGHT=y # CONFIG_FB_S3 is not set CONFIG_FB_SAVAGE=m CONFIG_FB_SAVAGE_I2C=y CONFIG_FB_SAVAGE_ACCEL=y # CONFIG_FB_SIS is not set # CONFIG_FB_VIA is not set CONFIG_FB_NEOMAGIC=m CONFIG_FB_KYRO=m CONFIG_FB_3DFX=m CONFIG_FB_3DFX_ACCEL=y CONFIG_FB_3DFX_I2C=y CONFIG_FB_VOODOO1=m # CONFIG_FB_VT8623 is not set CONFIG_FB_TRIDENT=m # CONFIG_FB_ARK is not set # CONFIG_FB_PM3 is not set # CONFIG_FB_CARMINE is not set # CONFIG_FB_SMSCUFX is not set # CONFIG_FB_UDL is not set # CONFIG_FB_IBM_GXT4500 is not set # CONFIG_FB_VIRTUAL is not set # CONFIG_FB_METRONOME is not set # CONFIG_FB_MB862XX is not set # CONFIG_FB_SIMPLE is not set # CONFIG_FB_SSD1307 is not set # CONFIG_FB_SM712 is not set CONFIG_FB_CORE=y CONFIG_FB_NOTIFY=y # CONFIG_FIRMWARE_EDID is not set CONFIG_FB_DEVICE=y CONFIG_FB_DDC=m CONFIG_FB_CFB_FILLRECT=y CONFIG_FB_CFB_COPYAREA=y CONFIG_FB_CFB_IMAGEBLIT=y # CONFIG_FB_FOREIGN_ENDIAN is not set CONFIG_FB_IOMEM_FOPS=y CONFIG_FB_IOMEM_HELPERS=y CONFIG_FB_BACKLIGHT=m CONFIG_FB_MODE_HELPERS=y CONFIG_FB_TILEBLITTING=y # end of Frame buffer Devices # # Backlight & LCD device support # CONFIG_LCD_CLASS_DEVICE=m # CONFIG_LCD_PLATFORM is not set CONFIG_BACKLIGHT_CLASS_DEVICE=y # CONFIG_BACKLIGHT_KTD253 is not set # CONFIG_BACKLIGHT_KTD2801 is not set # CONFIG_BACKLIGHT_KTZ8866 is not set # CONFIG_BACKLIGHT_APPLE is not set # CONFIG_BACKLIGHT_QCOM_WLED is not set # CONFIG_BACKLIGHT_SAHARA is not set # CONFIG_BACKLIGHT_ADP8860 is not set # CONFIG_BACKLIGHT_ADP8870 is not set # CONFIG_BACKLIGHT_LM3509 is not set # CONFIG_BACKLIGHT_LM3639 is not set # CONFIG_BACKLIGHT_GPIO is not set # CONFIG_BACKLIGHT_LV5207LP is not set # CONFIG_BACKLIGHT_BD6107 is not set # CONFIG_BACKLIGHT_ARCXCNN is not set # end of Backlight & LCD device support CONFIG_VGASTATE=m # # Console display driver support # CONFIG_VGA_CONSOLE=y CONFIG_DUMMY_CONSOLE=y CONFIG_DUMMY_CONSOLE_COLUMNS=80 CONFIG_DUMMY_CONSOLE_ROWS=25 CONFIG_FRAMEBUFFER_CONSOLE=y # CONFIG_FRAMEBUFFER_CONSOLE_LEGACY_ACCELERATION is not set CONFIG_FRAMEBUFFER_CONSOLE_DETECT_PRIMARY=y CONFIG_FRAMEBUFFER_CONSOLE_ROTATION=y # CONFIG_FRAMEBUFFER_CONSOLE_DEFERRED_TAKEOVER is not set # end of Console display driver support CONFIG_LOGO=y # CONFIG_LOGO_LINUX_MONO is not set # CONFIG_LOGO_LINUX_VGA16 is not set CONFIG_LOGO_LINUX_CLUT224=y # end of Graphics support CONFIG_SOUND=m CONFIG_SND=m CONFIG_SND_PCM=m CONFIG_SND_HWDEP=m CONFIG_SND_RAWMIDI=m # CONFIG_SND_OSSEMUL is not set # CONFIG_SND_PCM_TIMER is not set # CONFIG_SND_HRTIMER is not set # CONFIG_SND_DYNAMIC_MINORS is not set # CONFIG_SND_SUPPORT_OLD_API is not set # CONFIG_SND_PROC_FS is not set CONFIG_SND_CTL_FAST_LOOKUP=y # CONFIG_SND_DEBUG is not set # CONFIG_SND_CTL_INPUT_VALIDATION is not set CONFIG_SND_DMA_SGBUF=y # CONFIG_SND_SEQUENCER is not set # CONFIG_SND_DRIVERS is not set # CONFIG_SND_PCI is not set # # HD-Audio # # end of HD-Audio CONFIG_SND_HDA_PREALLOC_SIZE=0 CONFIG_SND_USB=y CONFIG_SND_USB_AUDIO=m # CONFIG_SND_USB_AUDIO_MIDI_V2 is not set # CONFIG_SND_USB_UA101 is not set # CONFIG_SND_USB_USX2Y is not set # CONFIG_SND_USB_CAIAQ is not set # CONFIG_SND_USB_US122L is not set # CONFIG_SND_USB_6FIRE is not set # CONFIG_SND_USB_HIFACE is not set # CONFIG_SND_BCD2000 is not set # CONFIG_SND_USB_POD is not set # CONFIG_SND_USB_PODHD is not set # CONFIG_SND_USB_TONEPORT is not set # CONFIG_SND_USB_VARIAX is not set # CONFIG_SND_PCMCIA is not set # CONFIG_SND_SOC is not set # CONFIG_SND_X86 is not set # CONFIG_SND_VIRTIO is not set CONFIG_HID_SUPPORT=y CONFIG_HID=y # CONFIG_HID_BATTERY_STRENGTH is not set # CONFIG_HIDRAW is not set # CONFIG_UHID is not set CONFIG_HID_GENERIC=y # # Special HID drivers # CONFIG_HID_A4TECH=y # CONFIG_HID_ACCUTOUCH is not set # CONFIG_HID_ACRUX is not set CONFIG_HID_APPLE=y # CONFIG_HID_APPLEIR is not set # CONFIG_HID_ASUS is not set # CONFIG_HID_AUREAL is not set CONFIG_HID_BELKIN=y # CONFIG_HID_BETOP_FF is not set # CONFIG_HID_BIGBEN_FF is not set CONFIG_HID_CHERRY=y CONFIG_HID_CHICONY=y # CONFIG_HID_CORSAIR is not set # CONFIG_HID_COUGAR is not set # CONFIG_HID_MACALLY is not set # CONFIG_HID_PRODIKEYS is not set # CONFIG_HID_CMEDIA is not set # CONFIG_HID_CREATIVE_SB0540 is not set CONFIG_HID_CYPRESS=y CONFIG_HID_DRAGONRISE=y # CONFIG_DRAGONRISE_FF is not set # CONFIG_HID_EMS_FF is not set # CONFIG_HID_ELAN is not set # CONFIG_HID_ELECOM is not set # CONFIG_HID_ELO is not set # CONFIG_HID_EVISION is not set CONFIG_HID_EZKEY=y # CONFIG_HID_GEMBIRD is not set # CONFIG_HID_GFRM is not set # CONFIG_HID_GLORIOUS is not set # CONFIG_HID_HOLTEK is not set # CONFIG_HID_GOOGLE_STADIA_FF is not set # CONFIG_HID_VIVALDI is not set # CONFIG_HID_GT683R is not set # CONFIG_HID_KEYTOUCH is not set CONFIG_HID_KYE=y # CONFIG_HID_UCLOGIC is not set # CONFIG_HID_WALTOP is not set # CONFIG_HID_VIEWSONIC is not set # CONFIG_HID_VRC2 is not set # CONFIG_HID_XIAOMI is not set CONFIG_HID_GYRATION=y # CONFIG_HID_ICADE is not set # CONFIG_HID_ITE is not set # CONFIG_HID_JABRA is not set CONFIG_HID_TWINHAN=y CONFIG_HID_KENSINGTON=y # CONFIG_HID_LCPOWER is not set # CONFIG_HID_LED is not set # CONFIG_HID_LENOVO is not set # CONFIG_HID_LETSKETCH is not set CONFIG_HID_LOGITECH=y # CONFIG_HID_LOGITECH_HIDPP is not set CONFIG_LOGITECH_FF=y # CONFIG_LOGIRUMBLEPAD2_FF is not set # CONFIG_LOGIG940_FF is not set CONFIG_LOGIWHEELS_FF=y # CONFIG_HID_MAGICMOUSE is not set # CONFIG_HID_MALTRON is not set # CONFIG_HID_MAYFLASH is not set # CONFIG_HID_MEGAWORLD_FF is not set # CONFIG_HID_REDRAGON is not set CONFIG_HID_MICROSOFT=y CONFIG_HID_MONTEREY=y # CONFIG_HID_MULTITOUCH is not set # CONFIG_HID_NINTENDO is not set # CONFIG_HID_NTI is not set CONFIG_HID_NTRIG=y # CONFIG_HID_ORTEK is not set CONFIG_HID_PANTHERLORD=y # CONFIG_PANTHERLORD_FF is not set # CONFIG_HID_PENMOUNT is not set CONFIG_HID_PETALYNX=y # CONFIG_HID_PICOLCD is not set # CONFIG_HID_PLANTRONICS is not set # CONFIG_HID_PXRC is not set # CONFIG_HID_RAZER is not set # CONFIG_HID_PRIMAX is not set # CONFIG_HID_RETRODE is not set # CONFIG_HID_ROCCAT is not set # CONFIG_HID_SAITEK is not set CONFIG_HID_SAMSUNG=y # CONFIG_HID_SEMITEK is not set # CONFIG_HID_SIGMAMICRO is not set CONFIG_HID_SONY=y # CONFIG_SONY_FF is not set # CONFIG_HID_SPEEDLINK is not set # CONFIG_HID_STEAM is not set # CONFIG_HID_STEELSERIES is not set CONFIG_HID_SUNPLUS=y # CONFIG_HID_RMI is not set CONFIG_HID_GREENASIA=y # CONFIG_GREENASIA_FF is not set CONFIG_HID_SMARTJOYPLUS=y # CONFIG_SMARTJOYPLUS_FF is not set # CONFIG_HID_TIVO is not set CONFIG_HID_TOPSEED=y # CONFIG_HID_TOPRE is not set # CONFIG_HID_THINGM is not set CONFIG_HID_THRUSTMASTER=y CONFIG_THRUSTMASTER_FF=y # CONFIG_HID_UDRAW_PS3 is not set # CONFIG_HID_U2FZERO is not set # CONFIG_HID_WACOM is not set # CONFIG_HID_WIIMOTE is not set # CONFIG_HID_WINWING is not set # CONFIG_HID_XINMO is not set CONFIG_HID_ZEROPLUS=y CONFIG_ZEROPLUS_FF=y # CONFIG_HID_ZYDACRON is not set # CONFIG_HID_SENSOR_HUB is not set # CONFIG_HID_ALPS is not set # CONFIG_HID_MCP2200 is not set # CONFIG_HID_MCP2221 is not set # end of Special HID drivers # # HID-BPF support # # CONFIG_HID_BPF is not set # end of HID-BPF support # # USB HID support # CONFIG_USB_HID=y CONFIG_HID_PID=y CONFIG_USB_HIDDEV=y # end of USB HID support CONFIG_I2C_HID=m # CONFIG_I2C_HID_ACPI is not set # CONFIG_I2C_HID_OF is not set # # Intel ISH HID support # # CONFIG_INTEL_ISH_HID is not set # end of Intel ISH HID support # # AMD SFH HID Support # # CONFIG_AMD_SFH_HID is not set # end of AMD SFH HID Support CONFIG_USB_OHCI_LITTLE_ENDIAN=y CONFIG_USB_SUPPORT=y CONFIG_USB_COMMON=y # CONFIG_USB_LED_TRIG is not set # CONFIG_USB_ULPI_BUS is not set # CONFIG_USB_CONN_GPIO is not set CONFIG_USB_ARCH_HAS_HCD=y CONFIG_USB=y CONFIG_USB_PCI=y CONFIG_USB_PCI_AMD=y # CONFIG_USB_ANNOUNCE_NEW_DEVICES is not set # # Miscellaneous USB options # CONFIG_USB_DEFAULT_PERSIST=y # CONFIG_USB_FEW_INIT_RETRIES is not set # CONFIG_USB_DYNAMIC_MINORS is not set # CONFIG_USB_OTG is not set # CONFIG_USB_OTG_PRODUCTLIST is not set # CONFIG_USB_OTG_DISABLE_EXTERNAL_HUB is not set # CONFIG_USB_LEDS_TRIGGER_USBPORT is not set CONFIG_USB_AUTOSUSPEND_DELAY=2 CONFIG_USB_DEFAULT_AUTHORIZATION_MODE=1 CONFIG_USB_MON=y # # USB Host Controller Drivers # # CONFIG_USB_C67X00_HCD is not set # CONFIG_USB_XHCI_HCD is not set CONFIG_USB_EHCI_HCD=m CONFIG_USB_EHCI_ROOT_HUB_TT=y CONFIG_USB_EHCI_TT_NEWSCHED=y CONFIG_USB_EHCI_PCI=m # CONFIG_USB_EHCI_FSL is not set # CONFIG_USB_EHCI_HCD_PLATFORM is not set # CONFIG_USB_OXU210HP_HCD is not set CONFIG_USB_ISP116X_HCD=m CONFIG_USB_OHCI_HCD=m CONFIG_USB_OHCI_HCD_PCI=m # CONFIG_USB_OHCI_HCD_PLATFORM is not set CONFIG_USB_UHCI_HCD=m CONFIG_USB_SL811_HCD=m # CONFIG_USB_SL811_HCD_ISO is not set CONFIG_USB_SL811_CS=m # CONFIG_USB_R8A66597_HCD is not set # CONFIG_USB_HCD_TEST_MODE is not set # # USB Device Class drivers # CONFIG_USB_ACM=m CONFIG_USB_PRINTER=m # CONFIG_USB_WDM is not set # CONFIG_USB_TMC is not set # # NOTE: USB_STORAGE depends on SCSI but BLK_DEV_SD may # # # also be needed; see USB_STORAGE Help for more info # CONFIG_USB_STORAGE=m # CONFIG_USB_STORAGE_DEBUG is not set # CONFIG_USB_STORAGE_REALTEK is not set CONFIG_USB_STORAGE_DATAFAB=m CONFIG_USB_STORAGE_FREECOM=m CONFIG_USB_STORAGE_ISD200=m CONFIG_USB_STORAGE_USBAT=m CONFIG_USB_STORAGE_SDDR09=m CONFIG_USB_STORAGE_SDDR55=m CONFIG_USB_STORAGE_JUMPSHOT=m CONFIG_USB_STORAGE_ALAUDA=m # CONFIG_USB_STORAGE_ONETOUCH is not set CONFIG_USB_STORAGE_KARMA=m # CONFIG_USB_STORAGE_CYPRESS_ATACB is not set # CONFIG_USB_STORAGE_ENE_UB6250 is not set # CONFIG_USB_UAS is not set # # USB Imaging devices # CONFIG_USB_MDC800=m CONFIG_USB_MICROTEK=m # CONFIG_USBIP_CORE is not set # # USB dual-mode controller drivers # # CONFIG_USB_CDNS_SUPPORT is not set # CONFIG_USB_MUSB_HDRC is not set # CONFIG_USB_DWC3 is not set # CONFIG_USB_DWC2 is not set # CONFIG_USB_CHIPIDEA is not set # CONFIG_USB_ISP1760 is not set # # USB port drivers # CONFIG_USB_SERIAL=m CONFIG_USB_SERIAL_GENERIC=y # CONFIG_USB_SERIAL_SIMPLE is not set CONFIG_USB_SERIAL_AIRCABLE=m CONFIG_USB_SERIAL_ARK3116=m CONFIG_USB_SERIAL_BELKIN=m # CONFIG_USB_SERIAL_CH341 is not set CONFIG_USB_SERIAL_WHITEHEAT=m CONFIG_USB_SERIAL_DIGI_ACCELEPORT=m # CONFIG_USB_SERIAL_CP210X is not set CONFIG_USB_SERIAL_CYPRESS_M8=m CONFIG_USB_SERIAL_EMPEG=m CONFIG_USB_SERIAL_FTDI_SIO=m CONFIG_USB_SERIAL_VISOR=m CONFIG_USB_SERIAL_IPAQ=m CONFIG_USB_SERIAL_IR=m CONFIG_USB_SERIAL_EDGEPORT=m CONFIG_USB_SERIAL_EDGEPORT_TI=m # CONFIG_USB_SERIAL_F81232 is not set # CONFIG_USB_SERIAL_F8153X is not set CONFIG_USB_SERIAL_GARMIN=m CONFIG_USB_SERIAL_IPW=m # CONFIG_USB_SERIAL_IUU is not set CONFIG_USB_SERIAL_KEYSPAN_PDA=m CONFIG_USB_SERIAL_KEYSPAN=m CONFIG_USB_SERIAL_KLSI=m CONFIG_USB_SERIAL_KOBIL_SCT=m CONFIG_USB_SERIAL_MCT_U232=m # CONFIG_USB_SERIAL_METRO is not set CONFIG_USB_SERIAL_MOS7720=m CONFIG_USB_SERIAL_MOS7840=m # CONFIG_USB_SERIAL_MXUPORT is not set CONFIG_USB_SERIAL_NAVMAN=m CONFIG_USB_SERIAL_PL2303=m # CONFIG_USB_SERIAL_OTI6858 is not set # CONFIG_USB_SERIAL_QCAUX is not set # CONFIG_USB_SERIAL_QUALCOMM is not set # CONFIG_USB_SERIAL_SPCP8X5 is not set CONFIG_USB_SERIAL_SAFE=m CONFIG_USB_SERIAL_SAFE_PADDED=y CONFIG_USB_SERIAL_SIERRAWIRELESS=m # CONFIG_USB_SERIAL_SYMBOL is not set CONFIG_USB_SERIAL_TI=m CONFIG_USB_SERIAL_CYBERJACK=m CONFIG_USB_SERIAL_WWAN=m CONFIG_USB_SERIAL_OPTION=m CONFIG_USB_SERIAL_OMNINET=m # CONFIG_USB_SERIAL_OPTICON is not set # CONFIG_USB_SERIAL_XSENS_MT is not set # CONFIG_USB_SERIAL_WISHBONE is not set # CONFIG_USB_SERIAL_SSU100 is not set # CONFIG_USB_SERIAL_QT2 is not set # CONFIG_USB_SERIAL_UPD78F0730 is not set # CONFIG_USB_SERIAL_XR is not set CONFIG_USB_SERIAL_DEBUG=m # # USB Miscellaneous drivers # # CONFIG_USB_EMI62 is not set # CONFIG_USB_EMI26 is not set # CONFIG_USB_ADUTUX is not set # CONFIG_USB_SEVSEG is not set # CONFIG_USB_LEGOTOWER is not set CONFIG_USB_LCD=m # CONFIG_USB_CYPRESS_CY7C63 is not set # CONFIG_USB_CYTHERM is not set # CONFIG_USB_IDMOUSE is not set CONFIG_USB_APPLEDISPLAY=m # CONFIG_APPLE_MFI_FASTCHARGE is not set # CONFIG_USB_LJCA is not set CONFIG_USB_SISUSBVGA=m CONFIG_USB_LD=m # CONFIG_USB_TRANCEVIBRATOR is not set # CONFIG_USB_IOWARRIOR is not set CONFIG_USB_TEST=m # CONFIG_USB_EHSET_TEST_FIXTURE is not set # CONFIG_USB_ISIGHTFW is not set # CONFIG_USB_YUREX is not set CONFIG_USB_EZUSB_FX2=m # CONFIG_USB_HUB_USB251XB is not set # CONFIG_USB_HSIC_USB3503 is not set # CONFIG_USB_HSIC_USB4604 is not set # CONFIG_USB_LINK_LAYER_TEST is not set # CONFIG_USB_CHAOSKEY is not set # CONFIG_USB_ATM is not set # # USB Physical Layer drivers # # CONFIG_NOP_USB_XCEIV is not set # CONFIG_USB_GPIO_VBUS is not set # CONFIG_USB_ISP1301 is not set # end of USB Physical Layer drivers # CONFIG_USB_GADGET is not set # CONFIG_TYPEC is not set # CONFIG_USB_ROLE_SWITCH is not set CONFIG_MMC=m CONFIG_MMC_BLOCK=m CONFIG_MMC_BLOCK_MINORS=8 # CONFIG_SDIO_UART is not set # CONFIG_MMC_TEST is not set # # MMC/SD/SDIO Host Controller Drivers # # CONFIG_MMC_DEBUG is not set CONFIG_MMC_SDHCI=m # CONFIG_MMC_SDHCI_PCI is not set # CONFIG_MMC_SDHCI_ACPI is not set # CONFIG_MMC_SDHCI_PLTFM is not set CONFIG_MMC_WBSD=m CONFIG_MMC_TIFM_SD=m # CONFIG_MMC_SDRICOH_CS is not set # CONFIG_MMC_CB710 is not set # CONFIG_MMC_VIA_SDMMC is not set # CONFIG_MMC_VUB300 is not set # CONFIG_MMC_USHC is not set # CONFIG_MMC_USDHI6ROL0 is not set # CONFIG_MMC_CQHCI is not set # CONFIG_MMC_HSQ is not set # CONFIG_MMC_TOSHIBA_PCI is not set # CONFIG_MMC_MTK is not set # CONFIG_SCSI_UFSHCD is not set # CONFIG_MEMSTICK is not set CONFIG_NEW_LEDS=y CONFIG_LEDS_CLASS=y # CONFIG_LEDS_CLASS_FLASH is not set # CONFIG_LEDS_CLASS_MULTICOLOR is not set # CONFIG_LEDS_BRIGHTNESS_HW_CHANGED is not set # # LED drivers # # CONFIG_LEDS_APU is not set # CONFIG_LEDS_AW200XX is not set # CONFIG_LEDS_LM3530 is not set # CONFIG_LEDS_LM3532 is not set # CONFIG_LEDS_LM3642 is not set # CONFIG_LEDS_PCA9532 is not set # CONFIG_LEDS_GPIO is not set # CONFIG_LEDS_LP3944 is not set # CONFIG_LEDS_LP3952 is not set # CONFIG_LEDS_PCA955X is not set # CONFIG_LEDS_PCA963X is not set # CONFIG_LEDS_PCA995X is not set # CONFIG_LEDS_BD2606MVV is not set # CONFIG_LEDS_BD2802 is not set # CONFIG_LEDS_INTEL_SS4200 is not set # CONFIG_LEDS_LT3593 is not set # CONFIG_LEDS_TCA6507 is not set # CONFIG_LEDS_TLC591XX is not set # CONFIG_LEDS_LM355x is not set # CONFIG_LEDS_IS31FL319X is not set # # LED driver for blink(1) USB RGB LED is under Special HID drivers (HID_THINGM) # # CONFIG_LEDS_BLINKM is not set # CONFIG_LEDS_MLXCPLD is not set # CONFIG_LEDS_MLXREG is not set # CONFIG_LEDS_USER is not set # CONFIG_LEDS_NIC78BX is not set # # Flash and Torch LED drivers # # # RGB LED drivers # # # LED Triggers # CONFIG_LEDS_TRIGGERS=y CONFIG_LEDS_TRIGGER_TIMER=m # CONFIG_LEDS_TRIGGER_ONESHOT is not set # CONFIG_LEDS_TRIGGER_DISK is not set CONFIG_LEDS_TRIGGER_HEARTBEAT=m # CONFIG_LEDS_TRIGGER_BACKLIGHT is not set # CONFIG_LEDS_TRIGGER_CPU is not set # CONFIG_LEDS_TRIGGER_ACTIVITY is not set # CONFIG_LEDS_TRIGGER_GPIO is not set # CONFIG_LEDS_TRIGGER_DEFAULT_ON is not set # # iptables trigger is under Netfilter config (LED target) # # CONFIG_LEDS_TRIGGER_TRANSIENT is not set # CONFIG_LEDS_TRIGGER_CAMERA is not set # CONFIG_LEDS_TRIGGER_PANIC is not set # CONFIG_LEDS_TRIGGER_NETDEV is not set # CONFIG_LEDS_TRIGGER_PATTERN is not set # CONFIG_LEDS_TRIGGER_TTY is not set # CONFIG_LEDS_TRIGGER_INPUT_EVENTS is not set # # Simple LED drivers # # CONFIG_ACCESSIBILITY is not set CONFIG_INFINIBAND=m CONFIG_INFINIBAND_USER_MAD=m CONFIG_INFINIBAND_USER_ACCESS=m CONFIG_INFINIBAND_USER_MEM=y CONFIG_INFINIBAND_ON_DEMAND_PAGING=y CONFIG_INFINIBAND_ADDR_TRANS=y CONFIG_INFINIBAND_ADDR_TRANS_CONFIGFS=y CONFIG_INFINIBAND_VIRT_DMA=y # CONFIG_INFINIBAND_EFA is not set # CONFIG_INFINIBAND_ERDMA is not set # CONFIG_MLX4_INFINIBAND is not set CONFIG_MLX5_INFINIBAND=m CONFIG_INFINIBAND_MTHCA=m CONFIG_INFINIBAND_MTHCA_DEBUG=y # CONFIG_INFINIBAND_OCRDMA is not set CONFIG_INFINIBAND_USNIC=m # CONFIG_INFINIBAND_RDMAVT is not set # CONFIG_RDMA_RXE is not set # CONFIG_RDMA_SIW is not set CONFIG_INFINIBAND_IPOIB=m # CONFIG_INFINIBAND_IPOIB_CM is not set CONFIG_INFINIBAND_IPOIB_DEBUG=y CONFIG_INFINIBAND_IPOIB_DEBUG_DATA=y CONFIG_INFINIBAND_SRP=m CONFIG_INFINIBAND_ISER=m # CONFIG_INFINIBAND_RTRS_CLIENT is not set # CONFIG_INFINIBAND_RTRS_SERVER is not set # CONFIG_INFINIBAND_OPA_VNIC is not set CONFIG_EDAC_ATOMIC_SCRUB=y CONFIG_EDAC_SUPPORT=y # CONFIG_EDAC is not set CONFIG_RTC_LIB=y CONFIG_RTC_MC146818_LIB=y CONFIG_RTC_CLASS=y CONFIG_RTC_HCTOSYS=y CONFIG_RTC_HCTOSYS_DEVICE="rtc0" CONFIG_RTC_SYSTOHC=y CONFIG_RTC_SYSTOHC_DEVICE="rtc0" # CONFIG_RTC_DEBUG is not set CONFIG_RTC_NVMEM=y # # RTC interfaces # CONFIG_RTC_INTF_SYSFS=y CONFIG_RTC_INTF_PROC=y CONFIG_RTC_INTF_DEV=y # CONFIG_RTC_INTF_DEV_UIE_EMUL is not set # CONFIG_RTC_DRV_TEST is not set # # I2C RTC drivers # # CONFIG_RTC_DRV_ABB5ZES3 is not set # CONFIG_RTC_DRV_ABEOZ9 is not set # CONFIG_RTC_DRV_ABX80X is not set # CONFIG_RTC_DRV_DS1307 is not set # CONFIG_RTC_DRV_DS1374 is not set # CONFIG_RTC_DRV_DS1672 is not set # CONFIG_RTC_DRV_MAX6900 is not set # CONFIG_RTC_DRV_MAX31335 is not set # CONFIG_RTC_DRV_RS5C372 is not set # CONFIG_RTC_DRV_ISL1208 is not set # CONFIG_RTC_DRV_ISL12022 is not set # CONFIG_RTC_DRV_X1205 is not set # CONFIG_RTC_DRV_PCF8523 is not set # CONFIG_RTC_DRV_PCF85063 is not set # CONFIG_RTC_DRV_PCF85363 is not set # CONFIG_RTC_DRV_PCF8563 is not set # CONFIG_RTC_DRV_PCF8583 is not set # CONFIG_RTC_DRV_M41T80 is not set # CONFIG_RTC_DRV_BQ32K is not set # CONFIG_RTC_DRV_S35390A is not set # CONFIG_RTC_DRV_FM3130 is not set # CONFIG_RTC_DRV_RX8010 is not set # CONFIG_RTC_DRV_RX8111 is not set # CONFIG_RTC_DRV_RX8581 is not set # CONFIG_RTC_DRV_RX8025 is not set # CONFIG_RTC_DRV_EM3027 is not set # CONFIG_RTC_DRV_RV3028 is not set # CONFIG_RTC_DRV_RV3032 is not set # CONFIG_RTC_DRV_RV8803 is not set # CONFIG_RTC_DRV_SD3078 is not set # # SPI RTC drivers # CONFIG_RTC_I2C_AND_SPI=m # # SPI and I2C RTC drivers # # CONFIG_RTC_DRV_DS3232 is not set # CONFIG_RTC_DRV_PCF2127 is not set # CONFIG_RTC_DRV_RV3029C2 is not set # CONFIG_RTC_DRV_RX6110 is not set # # Platform RTC drivers # CONFIG_RTC_DRV_CMOS=y # CONFIG_RTC_DRV_DS1286 is not set # CONFIG_RTC_DRV_DS1511 is not set # CONFIG_RTC_DRV_DS1553 is not set # CONFIG_RTC_DRV_DS1685_FAMILY is not set # CONFIG_RTC_DRV_DS1742 is not set # CONFIG_RTC_DRV_DS2404 is not set # CONFIG_RTC_DRV_STK17TA8 is not set # CONFIG_RTC_DRV_M48T86 is not set # CONFIG_RTC_DRV_M48T35 is not set # CONFIG_RTC_DRV_M48T59 is not set # CONFIG_RTC_DRV_MSM6242 is not set # CONFIG_RTC_DRV_RP5C01 is not set # # on-CPU RTC drivers # # CONFIG_RTC_DRV_FTRTC010 is not set # # HID Sensor RTC drivers # # CONFIG_RTC_DRV_GOLDFISH is not set CONFIG_DMADEVICES=y # CONFIG_DMADEVICES_DEBUG is not set # # DMA Devices # CONFIG_DMA_ENGINE=y CONFIG_DMA_ACPI=y # CONFIG_ALTERA_MSGDMA is not set # CONFIG_INTEL_IDMA64 is not set # CONFIG_INTEL_IDXD is not set # CONFIG_INTEL_IDXD_COMPAT is not set CONFIG_INTEL_IOATDMA=y # CONFIG_PLX_DMA is not set # CONFIG_XILINX_DMA is not set # CONFIG_XILINX_XDMA is not set # CONFIG_AMD_QDMA is not set # CONFIG_AMD_PTDMA is not set # CONFIG_QCOM_HIDMA_MGMT is not set # CONFIG_QCOM_HIDMA is not set # CONFIG_DW_DMAC is not set # CONFIG_DW_DMAC_PCI is not set # CONFIG_DW_EDMA is not set # CONFIG_SF_PDMA is not set # CONFIG_INTEL_LDMA is not set # # DMA Clients # # CONFIG_ASYNC_TX_DMA is not set # CONFIG_DMATEST is not set CONFIG_DMA_ENGINE_RAID=y # # DMABUF options # CONFIG_SYNC_FILE=y # CONFIG_SW_SYNC is not set # CONFIG_UDMABUF is not set # CONFIG_DMABUF_MOVE_NOTIFY is not set # CONFIG_DMABUF_DEBUG is not set # CONFIG_DMABUF_SELFTESTS is not set # CONFIG_DMABUF_HEAPS is not set # CONFIG_DMABUF_SYSFS_STATS is not set # end of DMABUF options CONFIG_DCA=y # CONFIG_UIO is not set # CONFIG_VFIO is not set CONFIG_IRQ_BYPASS_MANAGER=y CONFIG_VIRT_DRIVERS=y CONFIG_VMGENID=y # CONFIG_VBOXGUEST is not set # CONFIG_NITRO_ENCLAVES is not set # CONFIG_EFI_SECRET is not set CONFIG_VIRTIO_ANCHOR=y CONFIG_VIRTIO=y CONFIG_VIRTIO_PCI_LIB=y CONFIG_VIRTIO_PCI_LIB_LEGACY=y CONFIG_VIRTIO_MENU=y CONFIG_VIRTIO_PCI=y CONFIG_VIRTIO_PCI_ADMIN_LEGACY=y CONFIG_VIRTIO_PCI_LEGACY=y CONFIG_VIRTIO_BALLOON=y # CONFIG_VIRTIO_INPUT is not set CONFIG_VIRTIO_MMIO=m # CONFIG_VIRTIO_MMIO_CMDLINE_DEVICES is not set # CONFIG_VIRTIO_DEBUG is not set # CONFIG_VDPA is not set CONFIG_VHOST_IOTLB=m CONFIG_VHOST_TASK=y CONFIG_VHOST=m CONFIG_VHOST_MENU=y CONFIG_VHOST_NET=m # CONFIG_VHOST_VSOCK is not set # CONFIG_VHOST_CROSS_ENDIAN_LEGACY is not set # # Microsoft Hyper-V guest support # # end of Microsoft Hyper-V guest support # CONFIG_GREYBUS is not set # CONFIG_COMEDI is not set # CONFIG_STAGING is not set # CONFIG_GOLDFISH is not set # CONFIG_CHROME_PLATFORMS is not set # CONFIG_CZNIC_PLATFORMS is not set # CONFIG_MELLANOX_PLATFORM is not set CONFIG_SURFACE_PLATFORMS=y # CONFIG_SURFACE_3_POWER_OPREGION is not set # CONFIG_SURFACE_GPE is not set # CONFIG_SURFACE_HOTPLUG is not set # CONFIG_SURFACE_PRO3_BUTTON is not set CONFIG_X86_PLATFORM_DEVICES=y CONFIG_ACPI_WMI=m CONFIG_WMI_BMOF=m # CONFIG_HUAWEI_WMI is not set # CONFIG_MXM_WMI is not set # CONFIG_NVIDIA_WMI_EC_BACKLIGHT is not set # CONFIG_XIAOMI_WMI is not set # CONFIG_GIGABYTE_WMI is not set # CONFIG_YOGABOOK is not set # CONFIG_ACERHDF is not set # CONFIG_ACER_WIRELESS is not set # CONFIG_ACER_WMI is not set # CONFIG_AMD_PMC is not set # CONFIG_AMD_HSMP is not set # CONFIG_AMD_WBRF is not set # CONFIG_ADV_SWBUTTON is not set # CONFIG_APPLE_GMUX is not set # CONFIG_ASUS_LAPTOP is not set # CONFIG_ASUS_WIRELESS is not set # CONFIG_ASUS_TF103C_DOCK is not set # CONFIG_X86_PLATFORM_DRIVERS_DELL is not set # CONFIG_FUJITSU_LAPTOP is not set # CONFIG_FUJITSU_TABLET is not set # CONFIG_GPD_POCKET_FAN is not set # CONFIG_X86_PLATFORM_DRIVERS_HP is not set # CONFIG_WIRELESS_HOTKEY is not set # CONFIG_IBM_RTL is not set CONFIG_SENSORS_HDAPS=m # CONFIG_THINKPAD_LMI is not set # CONFIG_INTEL_ATOMISP2_PM is not set # CONFIG_INTEL_IFS is not set # CONFIG_INTEL_SAR_INT1092 is not set # # Intel Speed Select Technology interface support # # CONFIG_INTEL_SPEED_SELECT_INTERFACE is not set # end of Intel Speed Select Technology interface support # CONFIG_INTEL_WMI_SBL_FW_UPDATE is not set # CONFIG_INTEL_WMI_THUNDERBOLT is not set # # Intel Uncore Frequency Control # # CONFIG_INTEL_UNCORE_FREQ_CONTROL is not set # end of Intel Uncore Frequency Control # CONFIG_INTEL_HID_EVENT is not set # CONFIG_INTEL_VBTN is not set # CONFIG_INTEL_INT0002_VGPIO is not set # CONFIG_INTEL_PUNIT_IPC is not set # CONFIG_INTEL_RST is not set # CONFIG_INTEL_SMARTCONNECT is not set # CONFIG_INTEL_TURBO_MAX_3 is not set # CONFIG_INTEL_VSEC is not set # CONFIG_ACPI_QUICKSTART is not set # CONFIG_MEEGOPAD_ANX7428 is not set # CONFIG_MSI_EC is not set # CONFIG_MSI_WMI is not set # CONFIG_MSI_WMI_PLATFORM is not set # CONFIG_PCENGINES_APU2 is not set # CONFIG_BARCO_P50_GPIO is not set # CONFIG_SAMSUNG_LAPTOP is not set # CONFIG_SAMSUNG_Q10 is not set # CONFIG_TOSHIBA_BT_RFKILL is not set # CONFIG_TOSHIBA_HAPS is not set # CONFIG_TOSHIBA_WMI is not set # CONFIG_ACPI_CMPC is not set # CONFIG_LG_LAPTOP is not set # CONFIG_PANASONIC_LAPTOP is not set # CONFIG_SYSTEM76_ACPI is not set # CONFIG_TOPSTAR_LAPTOP is not set # CONFIG_SERIAL_MULTI_INSTANTIATE is not set # CONFIG_MLX_PLATFORM is not set # CONFIG_INSPUR_PLATFORM_PROFILE is not set # CONFIG_LENOVO_WMI_CAMERA is not set # CONFIG_INTEL_IPS is not set # CONFIG_INTEL_SCU_PCI is not set # CONFIG_INTEL_SCU_PLATFORM is not set # CONFIG_SIEMENS_SIMATIC_IPC is not set # CONFIG_WINMATE_FM07_KEYS is not set CONFIG_P2SB=y CONFIG_HAVE_CLK=y CONFIG_HAVE_CLK_PREPARE=y CONFIG_COMMON_CLK=y # CONFIG_COMMON_CLK_MAX9485 is not set # CONFIG_COMMON_CLK_SI5341 is not set # CONFIG_COMMON_CLK_SI5351 is not set # CONFIG_COMMON_CLK_SI544 is not set # CONFIG_COMMON_CLK_CDCE706 is not set # CONFIG_COMMON_CLK_CS2000_CP is not set # CONFIG_XILINX_VCU is not set # CONFIG_HWSPINLOCK is not set # # Clock Source drivers # CONFIG_CLKEVT_I8253=y CONFIG_I8253_LOCK=y CONFIG_CLKBLD_I8253=y # end of Clock Source drivers CONFIG_MAILBOX=y CONFIG_PCC=y # CONFIG_ALTERA_MBOX is not set CONFIG_IOMMU_IOVA=y CONFIG_IOMMU_API=y CONFIG_IOMMU_SUPPORT=y # # Generic IOMMU Pagetable Support # # end of Generic IOMMU Pagetable Support # CONFIG_IOMMU_DEBUGFS is not set # CONFIG_IOMMU_DEFAULT_DMA_STRICT is not set CONFIG_IOMMU_DEFAULT_DMA_LAZY=y # CONFIG_IOMMU_DEFAULT_PASSTHROUGH is not set CONFIG_IOMMU_DMA=y # CONFIG_AMD_IOMMU is not set CONFIG_DMAR_TABLE=y CONFIG_INTEL_IOMMU=y # CONFIG_INTEL_IOMMU_SVM is not set # CONFIG_INTEL_IOMMU_DEFAULT_ON is not set CONFIG_INTEL_IOMMU_FLOPPY_WA=y # CONFIG_INTEL_IOMMU_SCALABLE_MODE_DEFAULT_ON is not set CONFIG_INTEL_IOMMU_PERF_EVENTS=y # CONFIG_IOMMUFD is not set CONFIG_IRQ_REMAP=y # CONFIG_VIRTIO_IOMMU is not set # # Remoteproc drivers # # CONFIG_REMOTEPROC is not set # end of Remoteproc drivers # # Rpmsg drivers # # CONFIG_RPMSG_QCOM_GLINK_RPM is not set # CONFIG_RPMSG_VIRTIO is not set # end of Rpmsg drivers # CONFIG_SOUNDWIRE is not set # # SOC (System On Chip) specific Drivers # # # Amlogic SoC drivers # # end of Amlogic SoC drivers # # Broadcom SoC drivers # # end of Broadcom SoC drivers # # NXP/Freescale QorIQ SoC drivers # # end of NXP/Freescale QorIQ SoC drivers # # fujitsu SoC drivers # # end of fujitsu SoC drivers # # i.MX SoC drivers # # end of i.MX SoC drivers # # Enable LiteX SoC Builder specific drivers # # end of Enable LiteX SoC Builder specific drivers # CONFIG_WPCM450_SOC is not set # # Qualcomm SoC drivers # # end of Qualcomm SoC drivers # CONFIG_SOC_TI is not set # # Xilinx SoC drivers # # end of Xilinx SoC drivers # end of SOC (System On Chip) specific Drivers # # PM Domains # # # Amlogic PM Domains # # end of Amlogic PM Domains # # Broadcom PM Domains # # end of Broadcom PM Domains # # i.MX PM Domains # # end of i.MX PM Domains # # Qualcomm PM Domains # # end of Qualcomm PM Domains # end of PM Domains # CONFIG_PM_DEVFREQ is not set # CONFIG_EXTCON is not set # CONFIG_MEMORY is not set # CONFIG_IIO is not set # CONFIG_NTB is not set # CONFIG_PWM is not set # # IRQ chip support # # CONFIG_LAN966X_OIC is not set # end of IRQ chip support # CONFIG_IPACK_BUS is not set # CONFIG_RESET_CONTROLLER is not set # # PHY Subsystem # CONFIG_GENERIC_PHY=y # CONFIG_USB_LGM_PHY is not set # CONFIG_PHY_CAN_TRANSCEIVER is not set # # PHY drivers for Broadcom platforms # # CONFIG_BCM_KONA_USB2_PHY is not set # end of PHY drivers for Broadcom platforms # CONFIG_PHY_PXA_28NM_HSIC is not set # CONFIG_PHY_PXA_28NM_USB2 is not set # CONFIG_PHY_INTEL_LGM_EMMC is not set # end of PHY Subsystem CONFIG_POWERCAP=y # CONFIG_INTEL_RAPL is not set CONFIG_IDLE_INJECT=y # CONFIG_MCB is not set # # Performance monitor support # # CONFIG_DWC_PCIE_PMU is not set # end of Performance monitor support CONFIG_RAS=y # CONFIG_RAS_CEC is not set # CONFIG_AMD_ATL is not set # CONFIG_USB4 is not set # # Android # # CONFIG_ANDROID_BINDER_IPC is not set # end of Android # CONFIG_LIBNVDIMM is not set CONFIG_DAX=m # CONFIG_DEV_DAX is not set CONFIG_NVMEM=y # CONFIG_NVMEM_SYSFS is not set # CONFIG_NVMEM_LAYOUTS is not set # CONFIG_NVMEM_RMEM is not set # # HW tracing support # # CONFIG_STM is not set # CONFIG_INTEL_TH is not set # end of HW tracing support # CONFIG_FPGA is not set # CONFIG_TEE is not set # CONFIG_SIOX is not set # CONFIG_SLIMBUS is not set # CONFIG_INTERCONNECT is not set # CONFIG_COUNTER is not set # CONFIG_MOST is not set # CONFIG_PECI is not set # CONFIG_HTE is not set # end of Device Drivers # # File systems # CONFIG_DCACHE_WORD_ACCESS=y CONFIG_VALIDATE_FS_PARSER=y CONFIG_FS_IOMAP=y CONFIG_FS_STACK=y CONFIG_BUFFER_HEAD=y CONFIG_LEGACY_DIRECT_IO=y # CONFIG_EXT2_FS is not set # CONFIG_EXT3_FS is not set CONFIG_EXT4_FS=y CONFIG_EXT4_USE_FOR_EXT2=y CONFIG_EXT4_FS_POSIX_ACL=y CONFIG_EXT4_FS_SECURITY=y # CONFIG_EXT4_DEBUG is not set CONFIG_JBD2=y # CONFIG_JBD2_DEBUG is not set CONFIG_FS_MBCACHE=y # CONFIG_REISERFS_FS is not set # CONFIG_JFS_FS is not set CONFIG_XFS_FS=m CONFIG_XFS_SUPPORT_V4=y CONFIG_XFS_SUPPORT_ASCII_CI=y CONFIG_XFS_QUOTA=y CONFIG_XFS_POSIX_ACL=y # CONFIG_XFS_RT is not set # CONFIG_XFS_ONLINE_SCRUB is not set # CONFIG_XFS_WARN is not set # CONFIG_XFS_DEBUG is not set CONFIG_GFS2_FS=m # CONFIG_GFS2_FS_LOCKING_DLM is not set # CONFIG_OCFS2_FS is not set CONFIG_BTRFS_FS=y CONFIG_BTRFS_FS_POSIX_ACL=y # CONFIG_BTRFS_FS_RUN_SANITY_TESTS is not set # CONFIG_BTRFS_DEBUG is not set # CONFIG_BTRFS_ASSERT is not set # CONFIG_BTRFS_FS_REF_VERIFY is not set # CONFIG_NILFS2_FS is not set CONFIG_F2FS_FS=m CONFIG_F2FS_STAT_FS=y CONFIG_F2FS_FS_XATTR=y CONFIG_F2FS_FS_POSIX_ACL=y # CONFIG_F2FS_FS_SECURITY is not set # CONFIG_F2FS_CHECK_FS is not set # CONFIG_F2FS_FAULT_INJECTION is not set # CONFIG_F2FS_FS_COMPRESSION is not set CONFIG_F2FS_IOSTAT=y # CONFIG_F2FS_UNFAIR_RWSEM is not set # CONFIG_BCACHEFS_FS is not set CONFIG_FS_POSIX_ACL=y CONFIG_EXPORTFS=y # CONFIG_EXPORTFS_BLOCK_OPS is not set CONFIG_FILE_LOCKING=y # CONFIG_FS_ENCRYPTION is not set # CONFIG_FS_VERITY is not set CONFIG_FSNOTIFY=y CONFIG_DNOTIFY=y CONFIG_INOTIFY_USER=y # CONFIG_FANOTIFY is not set CONFIG_QUOTA=y # CONFIG_QUOTA_NETLINK_INTERFACE is not set # CONFIG_QUOTA_DEBUG is not set CONFIG_QUOTA_TREE=y # CONFIG_QFMT_V1 is not set CONFIG_QFMT_V2=y CONFIG_QUOTACTL=y CONFIG_AUTOFS_FS=y CONFIG_FUSE_FS=m # CONFIG_CUSE is not set # CONFIG_VIRTIO_FS is not set CONFIG_FUSE_PASSTHROUGH=y # CONFIG_OVERLAY_FS is not set # # Caches # CONFIG_NETFS_SUPPORT=y CONFIG_NETFS_STATS=y # CONFIG_NETFS_DEBUG is not set # CONFIG_FSCACHE is not set # end of Caches # # CD-ROM/DVD Filesystems # CONFIG_ISO9660_FS=y CONFIG_JOLIET=y CONFIG_ZISOFS=y CONFIG_UDF_FS=m # end of CD-ROM/DVD Filesystems # # DOS/FAT/EXFAT/NT Filesystems # CONFIG_FAT_FS=m CONFIG_MSDOS_FS=m CONFIG_VFAT_FS=m CONFIG_FAT_DEFAULT_CODEPAGE=437 CONFIG_FAT_DEFAULT_IOCHARSET="ascii" # CONFIG_FAT_DEFAULT_UTF8 is not set # CONFIG_EXFAT_FS is not set # CONFIG_NTFS3_FS is not set # CONFIG_NTFS_FS is not set # end of DOS/FAT/EXFAT/NT Filesystems # # Pseudo filesystems # CONFIG_PROC_FS=y CONFIG_PROC_KCORE=y CONFIG_PROC_SYSCTL=y CONFIG_PROC_PAGE_MONITOR=y # CONFIG_PROC_CHILDREN is not set CONFIG_PROC_PID_ARCH_STATUS=y CONFIG_KERNFS=y CONFIG_SYSFS=y CONFIG_TMPFS=y CONFIG_TMPFS_POSIX_ACL=y CONFIG_TMPFS_XATTR=y # CONFIG_TMPFS_INODE64 is not set # CONFIG_TMPFS_QUOTA is not set CONFIG_HUGETLBFS=y # CONFIG_HUGETLB_PAGE_OPTIMIZE_VMEMMAP_DEFAULT_ON is not set CONFIG_HUGETLB_PAGE=y CONFIG_HUGETLB_PAGE_OPTIMIZE_VMEMMAP=y CONFIG_HUGETLB_PMD_PAGE_TABLE_SHARING=y CONFIG_ARCH_HAS_GIGANTIC_PAGE=y CONFIG_CONFIGFS_FS=m CONFIG_EFIVAR_FS=m # end of Pseudo filesystems CONFIG_MISC_FILESYSTEMS=y # CONFIG_ORANGEFS_FS is not set # CONFIG_ADFS_FS is not set CONFIG_AFFS_FS=m CONFIG_ECRYPT_FS=m # CONFIG_ECRYPT_FS_MESSAGING is not set CONFIG_HFS_FS=m CONFIG_HFSPLUS_FS=m CONFIG_BEFS_FS=m # CONFIG_BEFS_DEBUG is not set CONFIG_BFS_FS=m CONFIG_EFS_FS=m CONFIG_CRAMFS=m # CONFIG_CRAMFS_BLOCKDEV is not set CONFIG_SQUASHFS=m # CONFIG_SQUASHFS_FILE_CACHE is not set CONFIG_SQUASHFS_FILE_DIRECT=y CONFIG_SQUASHFS_DECOMP_SINGLE=y # CONFIG_SQUASHFS_CHOICE_DECOMP_BY_MOUNT is not set CONFIG_SQUASHFS_COMPILE_DECOMP_SINGLE=y # CONFIG_SQUASHFS_COMPILE_DECOMP_MULTI is not set # CONFIG_SQUASHFS_COMPILE_DECOMP_MULTI_PERCPU is not set CONFIG_SQUASHFS_XATTR=y CONFIG_SQUASHFS_ZLIB=y # CONFIG_SQUASHFS_LZ4 is not set CONFIG_SQUASHFS_LZO=y CONFIG_SQUASHFS_XZ=y # CONFIG_SQUASHFS_ZSTD is not set # CONFIG_SQUASHFS_4K_DEVBLK_SIZE is not set # CONFIG_SQUASHFS_EMBEDDED is not set CONFIG_SQUASHFS_FRAGMENT_CACHE_SIZE=3 CONFIG_VXFS_FS=m CONFIG_MINIX_FS=m # CONFIG_OMFS_FS is not set # CONFIG_HPFS_FS is not set CONFIG_QNX4FS_FS=m # CONFIG_QNX6FS_FS is not set CONFIG_ROMFS_FS=m CONFIG_ROMFS_BACKED_BY_BLOCK=y CONFIG_ROMFS_ON_BLOCK=y # CONFIG_PSTORE is not set CONFIG_SYSV_FS=m CONFIG_UFS_FS=m CONFIG_UFS_FS_WRITE=y # CONFIG_UFS_DEBUG is not set # CONFIG_EROFS_FS is not set CONFIG_NETWORK_FILESYSTEMS=y CONFIG_NFS_FS=y CONFIG_NFS_V2=m CONFIG_NFS_V3=y CONFIG_NFS_V3_ACL=y CONFIG_NFS_V4=m # CONFIG_NFS_SWAP is not set # CONFIG_NFS_V4_1 is not set # CONFIG_NFS_FSCACHE is not set # CONFIG_NFS_USE_LEGACY_DNS is not set CONFIG_NFS_USE_KERNEL_DNS=y CONFIG_NFS_DISABLE_UDP_SUPPORT=y CONFIG_NFSD=m # CONFIG_NFSD_V2 is not set CONFIG_NFSD_V3_ACL=y CONFIG_NFSD_V4=y # CONFIG_NFSD_BLOCKLAYOUT is not set # CONFIG_NFSD_SCSILAYOUT is not set # CONFIG_NFSD_FLEXFILELAYOUT is not set # CONFIG_NFSD_V4_SECURITY_LABEL is not set # CONFIG_NFSD_LEGACY_CLIENT_TRACKING is not set CONFIG_GRACE_PERIOD=y CONFIG_LOCKD=y CONFIG_LOCKD_V4=y CONFIG_NFS_ACL_SUPPORT=y CONFIG_NFS_COMMON=y # CONFIG_NFS_LOCALIO is not set CONFIG_SUNRPC=y CONFIG_SUNRPC_GSS=m CONFIG_RPCSEC_GSS_KRB5=m CONFIG_RPCSEC_GSS_KRB5_ENCTYPES_AES_SHA1=y # CONFIG_RPCSEC_GSS_KRB5_ENCTYPES_AES_SHA2 is not set # CONFIG_SUNRPC_DEBUG is not set CONFIG_SUNRPC_XPRT_RDMA=m # CONFIG_CEPH_FS is not set CONFIG_CIFS=m # CONFIG_CIFS_STATS2 is not set CONFIG_CIFS_ALLOW_INSECURE_LEGACY=y # CONFIG_CIFS_UPCALL is not set CONFIG_CIFS_XATTR=y CONFIG_CIFS_POSIX=y CONFIG_CIFS_DEBUG=y # CONFIG_CIFS_DEBUG2 is not set # CONFIG_CIFS_DEBUG_DUMP_KEYS is not set # CONFIG_CIFS_DFS_UPCALL is not set # CONFIG_CIFS_SWN_UPCALL is not set # CONFIG_CIFS_SMB_DIRECT is not set # CONFIG_CIFS_COMPRESSION is not set # CONFIG_SMB_SERVER is not set CONFIG_SMBFS=m CONFIG_CODA_FS=m # CONFIG_AFS_FS is not set CONFIG_9P_FS=y CONFIG_9P_FS_POSIX_ACL=y # CONFIG_9P_FS_SECURITY is not set CONFIG_NLS=y CONFIG_NLS_DEFAULT="utf8" CONFIG_NLS_CODEPAGE_437=y CONFIG_NLS_CODEPAGE_737=m CONFIG_NLS_CODEPAGE_775=m CONFIG_NLS_CODEPAGE_850=m CONFIG_NLS_CODEPAGE_852=m CONFIG_NLS_CODEPAGE_855=m CONFIG_NLS_CODEPAGE_857=m CONFIG_NLS_CODEPAGE_860=m CONFIG_NLS_CODEPAGE_861=m CONFIG_NLS_CODEPAGE_862=m CONFIG_NLS_CODEPAGE_863=m CONFIG_NLS_CODEPAGE_864=m CONFIG_NLS_CODEPAGE_865=m CONFIG_NLS_CODEPAGE_866=m CONFIG_NLS_CODEPAGE_869=m CONFIG_NLS_CODEPAGE_936=m CONFIG_NLS_CODEPAGE_950=m CONFIG_NLS_CODEPAGE_932=m CONFIG_NLS_CODEPAGE_949=m CONFIG_NLS_CODEPAGE_874=m CONFIG_NLS_ISO8859_8=m CONFIG_NLS_CODEPAGE_1250=m CONFIG_NLS_CODEPAGE_1251=m CONFIG_NLS_ASCII=y CONFIG_NLS_ISO8859_1=m CONFIG_NLS_ISO8859_2=m CONFIG_NLS_ISO8859_3=m CONFIG_NLS_ISO8859_4=m CONFIG_NLS_ISO8859_5=m CONFIG_NLS_ISO8859_6=m CONFIG_NLS_ISO8859_7=m CONFIG_NLS_ISO8859_9=m CONFIG_NLS_ISO8859_13=m CONFIG_NLS_ISO8859_14=m CONFIG_NLS_ISO8859_15=m CONFIG_NLS_KOI8_R=m CONFIG_NLS_KOI8_U=m # CONFIG_NLS_MAC_ROMAN is not set # CONFIG_NLS_MAC_CELTIC is not set # CONFIG_NLS_MAC_CENTEURO is not set # CONFIG_NLS_MAC_CROATIAN is not set # CONFIG_NLS_MAC_CYRILLIC is not set # CONFIG_NLS_MAC_GAELIC is not set # CONFIG_NLS_MAC_GREEK is not set # CONFIG_NLS_MAC_ICELAND is not set # CONFIG_NLS_MAC_INUIT is not set # CONFIG_NLS_MAC_ROMANIAN is not set # CONFIG_NLS_MAC_TURKISH is not set CONFIG_NLS_UTF8=m CONFIG_NLS_UCS2_UTILS=m CONFIG_DLM=m CONFIG_DLM_DEBUG=y # CONFIG_UNICODE is not set CONFIG_IO_WQ=y # end of File systems # # Security options # CONFIG_KEYS=y # CONFIG_KEYS_REQUEST_CACHE is not set # CONFIG_PERSISTENT_KEYRINGS is not set # CONFIG_TRUSTED_KEYS is not set # CONFIG_ENCRYPTED_KEYS is not set # CONFIG_KEY_DH_OPERATIONS is not set # CONFIG_SECURITY_DMESG_RESTRICT is not set CONFIG_PROC_MEM_ALWAYS_FORCE=y # CONFIG_PROC_MEM_FORCE_PTRACE is not set # CONFIG_PROC_MEM_NO_FORCE is not set CONFIG_SECURITY=y CONFIG_SECURITYFS=y CONFIG_SECURITY_NETWORK=y # CONFIG_SECURITY_INFINIBAND is not set # CONFIG_SECURITY_NETWORK_XFRM is not set CONFIG_SECURITY_PATH=y CONFIG_INTEL_TXT=y CONFIG_LSM_MMAP_MIN_ADDR=65536 # CONFIG_HARDENED_USERCOPY is not set # CONFIG_FORTIFY_SOURCE is not set # CONFIG_STATIC_USERMODEHELPER is not set CONFIG_SECURITY_SELINUX=y CONFIG_SECURITY_SELINUX_BOOTPARAM=y CONFIG_SECURITY_SELINUX_DEVELOP=y CONFIG_SECURITY_SELINUX_AVC_STATS=y CONFIG_SECURITY_SELINUX_SIDTAB_HASH_BITS=9 CONFIG_SECURITY_SELINUX_SID2STR_CACHE_SIZE=256 # CONFIG_SECURITY_SELINUX_DEBUG is not set # CONFIG_SECURITY_SMACK is not set # CONFIG_SECURITY_TOMOYO is not set # CONFIG_SECURITY_APPARMOR is not set # CONFIG_SECURITY_LOADPIN is not set # CONFIG_SECURITY_YAMA is not set # CONFIG_SECURITY_SAFESETID is not set # CONFIG_SECURITY_LOCKDOWN_LSM is not set # CONFIG_SECURITY_LANDLOCK is not set # CONFIG_SECURITY_IPE is not set CONFIG_INTEGRITY=y # CONFIG_INTEGRITY_SIGNATURE is not set CONFIG_INTEGRITY_AUDIT=y CONFIG_IMA=y CONFIG_IMA_MEASURE_PCR_IDX=10 CONFIG_IMA_LSM_RULES=y CONFIG_IMA_NG_TEMPLATE=y # CONFIG_IMA_SIG_TEMPLATE is not set CONFIG_IMA_DEFAULT_TEMPLATE="ima-ng" CONFIG_IMA_DEFAULT_HASH_SHA1=y # CONFIG_IMA_DEFAULT_HASH_SHA256 is not set # CONFIG_IMA_DEFAULT_HASH_SHA512 is not set CONFIG_IMA_DEFAULT_HASH="sha1" CONFIG_IMA_WRITE_POLICY=y CONFIG_IMA_READ_POLICY=y # CONFIG_IMA_APPRAISE is not set CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS=y CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS=y # CONFIG_IMA_SECURE_AND_OR_TRUSTED_BOOT is not set # CONFIG_IMA_DISABLE_HTABLE is not set # CONFIG_EVM is not set CONFIG_DEFAULT_SECURITY_SELINUX=y # CONFIG_DEFAULT_SECURITY_DAC is not set CONFIG_LSM="yama,loadpin,safesetid,integrity,selinux,smack,tomoyo,apparmor,bpf" # # Kernel hardening options # # # Memory initialization # CONFIG_CC_HAS_AUTO_VAR_INIT_PATTERN=y CONFIG_CC_HAS_AUTO_VAR_INIT_ZERO_BARE=y CONFIG_CC_HAS_AUTO_VAR_INIT_ZERO=y CONFIG_INIT_STACK_NONE=y # CONFIG_INIT_STACK_ALL_PATTERN is not set # CONFIG_INIT_STACK_ALL_ZERO is not set # CONFIG_INIT_ON_ALLOC_DEFAULT_ON is not set # CONFIG_INIT_ON_FREE_DEFAULT_ON is not set CONFIG_CC_HAS_ZERO_CALL_USED_REGS=y # CONFIG_ZERO_CALL_USED_REGS is not set # end of Memory initialization # # Hardening of kernel data structures # # CONFIG_LIST_HARDENED is not set # CONFIG_BUG_ON_DATA_CORRUPTION is not set # end of Hardening of kernel data structures CONFIG_CC_HAS_RANDSTRUCT=y CONFIG_RANDSTRUCT_NONE=y # CONFIG_RANDSTRUCT_FULL is not set # end of Kernel hardening options # end of Security options CONFIG_XOR_BLOCKS=y CONFIG_ASYNC_CORE=m CONFIG_ASYNC_MEMCPY=m CONFIG_ASYNC_XOR=m CONFIG_ASYNC_PQ=m CONFIG_ASYNC_RAID6_RECOV=m CONFIG_CRYPTO=y # # Crypto core or helper # CONFIG_CRYPTO_ALGAPI=y CONFIG_CRYPTO_ALGAPI2=y CONFIG_CRYPTO_AEAD=y CONFIG_CRYPTO_AEAD2=y CONFIG_CRYPTO_SIG=y CONFIG_CRYPTO_SIG2=y CONFIG_CRYPTO_SKCIPHER=y CONFIG_CRYPTO_SKCIPHER2=y CONFIG_CRYPTO_HASH=y CONFIG_CRYPTO_HASH2=y CONFIG_CRYPTO_RNG=y CONFIG_CRYPTO_RNG2=y CONFIG_CRYPTO_RNG_DEFAULT=y CONFIG_CRYPTO_AKCIPHER2=y CONFIG_CRYPTO_AKCIPHER=y CONFIG_CRYPTO_KPP2=y CONFIG_CRYPTO_KPP=y CONFIG_CRYPTO_ACOMP2=y CONFIG_CRYPTO_MANAGER=y CONFIG_CRYPTO_MANAGER2=y CONFIG_CRYPTO_USER=y CONFIG_CRYPTO_MANAGER_DISABLE_TESTS=y CONFIG_CRYPTO_NULL=y CONFIG_CRYPTO_NULL2=y # CONFIG_CRYPTO_PCRYPT is not set CONFIG_CRYPTO_CRYPTD=m CONFIG_CRYPTO_AUTHENC=y # CONFIG_CRYPTO_TEST is not set CONFIG_CRYPTO_ENGINE=m # end of Crypto core or helper # # Public-key cryptography # CONFIG_CRYPTO_RSA=y # CONFIG_CRYPTO_DH is not set CONFIG_CRYPTO_ECC=y CONFIG_CRYPTO_ECDH=y # CONFIG_CRYPTO_ECDSA is not set # CONFIG_CRYPTO_ECRDSA is not set # CONFIG_CRYPTO_CURVE25519 is not set # end of Public-key cryptography # # Block ciphers # CONFIG_CRYPTO_AES=y # CONFIG_CRYPTO_AES_TI is not set CONFIG_CRYPTO_ANUBIS=m # CONFIG_CRYPTO_ARIA is not set CONFIG_CRYPTO_BLOWFISH=m CONFIG_CRYPTO_BLOWFISH_COMMON=m # CONFIG_CRYPTO_CAMELLIA is not set CONFIG_CRYPTO_CAST_COMMON=m CONFIG_CRYPTO_CAST5=m CONFIG_CRYPTO_CAST6=m CONFIG_CRYPTO_DES=m # CONFIG_CRYPTO_FCRYPT is not set CONFIG_CRYPTO_KHAZAD=m # CONFIG_CRYPTO_SEED is not set CONFIG_CRYPTO_SERPENT=m # CONFIG_CRYPTO_SM4_GENERIC is not set CONFIG_CRYPTO_TEA=m CONFIG_CRYPTO_TWOFISH=m CONFIG_CRYPTO_TWOFISH_COMMON=m # end of Block ciphers # # Length-preserving ciphers and modes # # CONFIG_CRYPTO_ADIANTUM is not set CONFIG_CRYPTO_ARC4=m # CONFIG_CRYPTO_CHACHA20 is not set CONFIG_CRYPTO_CBC=y CONFIG_CRYPTO_CTR=y CONFIG_CRYPTO_CTS=m CONFIG_CRYPTO_ECB=y # CONFIG_CRYPTO_HCTR2 is not set # CONFIG_CRYPTO_KEYWRAP is not set CONFIG_CRYPTO_LRW=m # CONFIG_CRYPTO_PCBC is not set CONFIG_CRYPTO_XTS=m # end of Length-preserving ciphers and modes # # AEAD (authenticated encryption with associated data) ciphers # # CONFIG_CRYPTO_AEGIS128 is not set # CONFIG_CRYPTO_CHACHA20POLY1305 is not set CONFIG_CRYPTO_CCM=y CONFIG_CRYPTO_GCM=y CONFIG_CRYPTO_GENIV=y CONFIG_CRYPTO_SEQIV=y CONFIG_CRYPTO_ECHAINIV=y CONFIG_CRYPTO_ESSIV=m # end of AEAD (authenticated encryption with associated data) ciphers # # Hashes, digests, and MACs # CONFIG_CRYPTO_BLAKE2B=y CONFIG_CRYPTO_CMAC=y CONFIG_CRYPTO_GHASH=y CONFIG_CRYPTO_HMAC=y CONFIG_CRYPTO_MD4=m CONFIG_CRYPTO_MD5=y CONFIG_CRYPTO_MICHAEL_MIC=m # CONFIG_CRYPTO_POLY1305 is not set # CONFIG_CRYPTO_RMD160 is not set CONFIG_CRYPTO_SHA1=y CONFIG_CRYPTO_SHA256=y CONFIG_CRYPTO_SHA512=y CONFIG_CRYPTO_SHA3=y # CONFIG_CRYPTO_SM3_GENERIC is not set # CONFIG_CRYPTO_STREEBOG is not set # CONFIG_CRYPTO_VMAC is not set CONFIG_CRYPTO_WP512=m CONFIG_CRYPTO_XCBC=m CONFIG_CRYPTO_XXHASH=y # end of Hashes, digests, and MACs # # CRCs (cyclic redundancy checks) # CONFIG_CRYPTO_CRC32C=y CONFIG_CRYPTO_CRC32=m CONFIG_CRYPTO_CRCT10DIF=y # CONFIG_CRYPTO_CRC64_ROCKSOFT is not set # end of CRCs (cyclic redundancy checks) # # Compression # CONFIG_CRYPTO_DEFLATE=m # CONFIG_CRYPTO_LZO is not set # CONFIG_CRYPTO_842 is not set # CONFIG_CRYPTO_LZ4 is not set # CONFIG_CRYPTO_LZ4HC is not set # CONFIG_CRYPTO_ZSTD is not set # end of Compression # # Random number generation # # CONFIG_CRYPTO_ANSI_CPRNG is not set CONFIG_CRYPTO_DRBG_MENU=y CONFIG_CRYPTO_DRBG_HMAC=y # CONFIG_CRYPTO_DRBG_HASH is not set # CONFIG_CRYPTO_DRBG_CTR is not set CONFIG_CRYPTO_DRBG=y CONFIG_CRYPTO_JITTERENTROPY=y CONFIG_CRYPTO_JITTERENTROPY_MEMORY_BLOCKS=64 CONFIG_CRYPTO_JITTERENTROPY_MEMORY_BLOCKSIZE=32 CONFIG_CRYPTO_JITTERENTROPY_OSR=1 # end of Random number generation # # Userspace interface # CONFIG_CRYPTO_USER_API=y CONFIG_CRYPTO_USER_API_HASH=y CONFIG_CRYPTO_USER_API_SKCIPHER=y # CONFIG_CRYPTO_USER_API_RNG is not set # CONFIG_CRYPTO_USER_API_AEAD is not set CONFIG_CRYPTO_USER_API_ENABLE_OBSOLETE=y # end of Userspace interface CONFIG_CRYPTO_HASH_INFO=y # # Accelerated Cryptographic Algorithms for CPU (x86) # # CONFIG_CRYPTO_CURVE25519_X86 is not set # CONFIG_CRYPTO_AES_NI_INTEL is not set # CONFIG_CRYPTO_BLOWFISH_X86_64 is not set # CONFIG_CRYPTO_CAMELLIA_X86_64 is not set # CONFIG_CRYPTO_CAMELLIA_AESNI_AVX_X86_64 is not set # CONFIG_CRYPTO_CAMELLIA_AESNI_AVX2_X86_64 is not set # CONFIG_CRYPTO_CAST5_AVX_X86_64 is not set # CONFIG_CRYPTO_CAST6_AVX_X86_64 is not set # CONFIG_CRYPTO_DES3_EDE_X86_64 is not set # CONFIG_CRYPTO_SERPENT_SSE2_X86_64 is not set # CONFIG_CRYPTO_SERPENT_AVX_X86_64 is not set # CONFIG_CRYPTO_SERPENT_AVX2_X86_64 is not set # CONFIG_CRYPTO_SM4_AESNI_AVX_X86_64 is not set # CONFIG_CRYPTO_SM4_AESNI_AVX2_X86_64 is not set # CONFIG_CRYPTO_TWOFISH_X86_64 is not set # CONFIG_CRYPTO_TWOFISH_X86_64_3WAY is not set # CONFIG_CRYPTO_TWOFISH_AVX_X86_64 is not set # CONFIG_CRYPTO_ARIA_AESNI_AVX_X86_64 is not set # CONFIG_CRYPTO_ARIA_AESNI_AVX2_X86_64 is not set # CONFIG_CRYPTO_ARIA_GFNI_AVX512_X86_64 is not set # CONFIG_CRYPTO_CHACHA20_X86_64 is not set # CONFIG_CRYPTO_AEGIS128_AESNI_SSE2 is not set # CONFIG_CRYPTO_NHPOLY1305_SSE2 is not set # CONFIG_CRYPTO_NHPOLY1305_AVX2 is not set # CONFIG_CRYPTO_BLAKE2S_X86 is not set # CONFIG_CRYPTO_POLYVAL_CLMUL_NI is not set # CONFIG_CRYPTO_POLY1305_X86_64 is not set # CONFIG_CRYPTO_SHA1_SSSE3 is not set # CONFIG_CRYPTO_SHA256_SSSE3 is not set # CONFIG_CRYPTO_SHA512_SSSE3 is not set # CONFIG_CRYPTO_SM3_AVX_X86_64 is not set # CONFIG_CRYPTO_GHASH_CLMUL_NI_INTEL is not set # CONFIG_CRYPTO_CRC32C_INTEL is not set # CONFIG_CRYPTO_CRC32_PCLMUL is not set # CONFIG_CRYPTO_CRCT10DIF_PCLMUL is not set # end of Accelerated Cryptographic Algorithms for CPU (x86) CONFIG_CRYPTO_HW=y # CONFIG_CRYPTO_DEV_PADLOCK is not set # CONFIG_CRYPTO_DEV_ATMEL_ECC is not set # CONFIG_CRYPTO_DEV_ATMEL_SHA204A is not set # CONFIG_CRYPTO_DEV_CCP is not set # CONFIG_CRYPTO_DEV_NITROX_CNN55XX is not set # CONFIG_CRYPTO_DEV_QAT_DH895xCC is not set # CONFIG_CRYPTO_DEV_QAT_C3XXX is not set # CONFIG_CRYPTO_DEV_QAT_C62X is not set # CONFIG_CRYPTO_DEV_QAT_4XXX is not set # CONFIG_CRYPTO_DEV_QAT_420XX is not set # CONFIG_CRYPTO_DEV_QAT_DH895xCCVF is not set # CONFIG_CRYPTO_DEV_QAT_C3XXXVF is not set # CONFIG_CRYPTO_DEV_QAT_C62XVF is not set CONFIG_CRYPTO_DEV_VIRTIO=m # CONFIG_CRYPTO_DEV_SAFEXCEL is not set # CONFIG_CRYPTO_DEV_AMLOGIC_GXL is not set CONFIG_ASYMMETRIC_KEY_TYPE=y CONFIG_ASYMMETRIC_PUBLIC_KEY_SUBTYPE=y CONFIG_X509_CERTIFICATE_PARSER=y # CONFIG_PKCS8_PRIVATE_KEY_PARSER is not set CONFIG_PKCS7_MESSAGE_PARSER=y # CONFIG_PKCS7_TEST_KEY is not set # CONFIG_SIGNED_PE_FILE_VERIFICATION is not set # CONFIG_FIPS_SIGNATURE_SELFTEST is not set # # Certificates for signature checking # CONFIG_MODULE_SIG_KEY="certs/signing_key.pem" CONFIG_MODULE_SIG_KEY_TYPE_RSA=y CONFIG_SYSTEM_TRUSTED_KEYRING=y CONFIG_SYSTEM_TRUSTED_KEYS="" # CONFIG_SYSTEM_EXTRA_CERTIFICATE is not set # CONFIG_SECONDARY_TRUSTED_KEYRING is not set # CONFIG_SYSTEM_BLACKLIST_KEYRING is not set # end of Certificates for signature checking CONFIG_BINARY_PRINTF=y # # Library routines # CONFIG_RAID6_PQ=y # CONFIG_RAID6_PQ_BENCHMARK is not set # CONFIG_PACKING is not set CONFIG_BITREVERSE=y CONFIG_GENERIC_STRNCPY_FROM_USER=y CONFIG_GENERIC_STRNLEN_USER=y CONFIG_GENERIC_NET_UTILS=y # CONFIG_CORDIC is not set # CONFIG_PRIME_NUMBERS is not set CONFIG_RATIONAL=y CONFIG_GENERIC_IOMAP=y CONFIG_ARCH_USE_CMPXCHG_LOCKREF=y CONFIG_ARCH_HAS_FAST_MULTIPLIER=y CONFIG_ARCH_USE_SYM_ANNOTATIONS=y # # Crypto library routines # CONFIG_CRYPTO_LIB_UTILS=y CONFIG_CRYPTO_LIB_AES=y CONFIG_CRYPTO_LIB_AESCFB=y CONFIG_CRYPTO_LIB_ARC4=y CONFIG_CRYPTO_LIB_GF128MUL=y CONFIG_CRYPTO_LIB_BLAKE2S_GENERIC=y # CONFIG_CRYPTO_LIB_CHACHA is not set # CONFIG_CRYPTO_LIB_CURVE25519 is not set CONFIG_CRYPTO_LIB_DES=m CONFIG_CRYPTO_LIB_POLY1305_RSIZE=11 # CONFIG_CRYPTO_LIB_POLY1305 is not set # CONFIG_CRYPTO_LIB_CHACHA20POLY1305 is not set CONFIG_CRYPTO_LIB_SHA1=y CONFIG_CRYPTO_LIB_SHA256=y # end of Crypto library routines CONFIG_CRC_CCITT=y CONFIG_CRC16=y CONFIG_CRC_T10DIF=y # CONFIG_CRC64_ROCKSOFT is not set CONFIG_CRC_ITU_T=m CONFIG_CRC32=y # CONFIG_CRC32_SELFTEST is not set CONFIG_CRC32_SLICEBY8=y # CONFIG_CRC32_SLICEBY4 is not set # CONFIG_CRC32_SARWATE is not set # CONFIG_CRC32_BIT is not set CONFIG_CRC64=m # CONFIG_CRC4 is not set # CONFIG_CRC7 is not set CONFIG_LIBCRC32C=y # CONFIG_CRC8 is not set CONFIG_XXHASH=y # CONFIG_RANDOM32_SELFTEST is not set CONFIG_ZLIB_INFLATE=y CONFIG_ZLIB_DEFLATE=y CONFIG_LZO_COMPRESS=y CONFIG_LZO_DECOMPRESS=y CONFIG_LZ4_DECOMPRESS=y CONFIG_ZSTD_COMMON=y CONFIG_ZSTD_COMPRESS=y CONFIG_ZSTD_DECOMPRESS=y CONFIG_XZ_DEC=y CONFIG_XZ_DEC_X86=y CONFIG_XZ_DEC_POWERPC=y CONFIG_XZ_DEC_ARM=y CONFIG_XZ_DEC_ARMTHUMB=y CONFIG_XZ_DEC_ARM64=y CONFIG_XZ_DEC_SPARC=y CONFIG_XZ_DEC_RISCV=y # CONFIG_XZ_DEC_MICROLZMA is not set CONFIG_XZ_DEC_BCJ=y # CONFIG_XZ_DEC_TEST is not set CONFIG_DECOMPRESS_GZIP=y CONFIG_DECOMPRESS_BZIP2=y CONFIG_DECOMPRESS_LZMA=y CONFIG_DECOMPRESS_XZ=y CONFIG_DECOMPRESS_LZO=y CONFIG_DECOMPRESS_LZ4=y CONFIG_DECOMPRESS_ZSTD=y CONFIG_GENERIC_ALLOCATOR=y CONFIG_TEXTSEARCH=y CONFIG_TEXTSEARCH_KMP=m CONFIG_TEXTSEARCH_BM=m CONFIG_TEXTSEARCH_FSM=m CONFIG_INTERVAL_TREE=y CONFIG_XARRAY_MULTI=y CONFIG_ASSOCIATIVE_ARRAY=y CONFIG_CLOSURES=y CONFIG_HAS_IOMEM=y CONFIG_HAS_IOPORT=y CONFIG_HAS_IOPORT_MAP=y CONFIG_HAS_DMA=y CONFIG_DMA_OPS_HELPERS=y CONFIG_NEED_SG_DMA_FLAGS=y CONFIG_NEED_SG_DMA_LENGTH=y CONFIG_NEED_DMA_MAP_STATE=y CONFIG_ARCH_DMA_ADDR_T_64BIT=y CONFIG_SWIOTLB=y # CONFIG_SWIOTLB_DYNAMIC is not set CONFIG_DMA_NEED_SYNC=y CONFIG_DMA_CMA=y # CONFIG_DMA_NUMA_CMA is not set # # Default contiguous memory area size: # CONFIG_CMA_SIZE_MBYTES=0 CONFIG_CMA_SIZE_SEL_MBYTES=y # CONFIG_CMA_SIZE_SEL_PERCENTAGE is not set # CONFIG_CMA_SIZE_SEL_MIN is not set # CONFIG_CMA_SIZE_SEL_MAX is not set CONFIG_CMA_ALIGNMENT=8 # CONFIG_DMA_API_DEBUG is not set # CONFIG_DMA_MAP_BENCHMARK is not set CONFIG_SGL_ALLOC=y CONFIG_IOMMU_HELPER=y CONFIG_CHECK_SIGNATURE=y CONFIG_CPU_RMAP=y CONFIG_DQL=y CONFIG_GLOB=y # CONFIG_GLOB_SELFTEST is not set CONFIG_NLATTR=y CONFIG_CLZ_TAB=y CONFIG_IRQ_POLL=y CONFIG_MPILIB=y CONFIG_DIMLIB=y CONFIG_OID_REGISTRY=y CONFIG_UCS2_STRING=y CONFIG_HAVE_GENERIC_VDSO=y CONFIG_GENERIC_GETTIMEOFDAY=y CONFIG_GENERIC_VDSO_TIME_NS=y CONFIG_GENERIC_VDSO_OVERFLOW_PROTECT=y CONFIG_VDSO_GETRANDOM=y CONFIG_FONT_SUPPORT=y CONFIG_FONTS=y # CONFIG_FONT_8x8 is not set CONFIG_FONT_8x16=y # CONFIG_FONT_6x11 is not set # CONFIG_FONT_7x14 is not set # CONFIG_FONT_PEARL_8x8 is not set # CONFIG_FONT_ACORN_8x8 is not set CONFIG_FONT_MINI_4x6=y # CONFIG_FONT_6x10 is not set # CONFIG_FONT_10x18 is not set # CONFIG_FONT_SUN8x16 is not set # CONFIG_FONT_SUN12x22 is not set # CONFIG_FONT_TER16x32 is not set # CONFIG_FONT_6x8 is not set CONFIG_SG_POOL=y CONFIG_ARCH_HAS_PMEM_API=y CONFIG_ARCH_HAS_CPU_CACHE_INVALIDATE_MEMREGION=y CONFIG_ARCH_HAS_UACCESS_FLUSHCACHE=y CONFIG_ARCH_HAS_COPY_MC=y CONFIG_ARCH_STACKWALK=y CONFIG_STACKDEPOT=y CONFIG_STACKDEPOT_MAX_FRAMES=64 CONFIG_SBITMAP=y # CONFIG_LWQ_TEST is not set # end of Library routines CONFIG_FIRMWARE_TABLE=y # # Kernel hacking # # # printk and dmesg options # CONFIG_PRINTK_TIME=y # CONFIG_PRINTK_CALLER is not set # CONFIG_STACKTRACE_BUILD_ID is not set CONFIG_CONSOLE_LOGLEVEL_DEFAULT=7 CONFIG_CONSOLE_LOGLEVEL_QUIET=4 CONFIG_MESSAGE_LOGLEVEL_DEFAULT=4 # CONFIG_BOOT_PRINTK_DELAY is not set # CONFIG_DYNAMIC_DEBUG is not set # CONFIG_DYNAMIC_DEBUG_CORE is not set CONFIG_SYMBOLIC_ERRNAME=y CONFIG_DEBUG_BUGVERBOSE=y # end of printk and dmesg options CONFIG_DEBUG_KERNEL=y CONFIG_DEBUG_MISC=y # # Compile-time checks and compiler options # CONFIG_DEBUG_INFO=y CONFIG_AS_HAS_NON_CONST_ULEB128=y # CONFIG_DEBUG_INFO_NONE is not set CONFIG_DEBUG_INFO_DWARF_TOOLCHAIN_DEFAULT=y # CONFIG_DEBUG_INFO_DWARF4 is not set # CONFIG_DEBUG_INFO_DWARF5 is not set # CONFIG_DEBUG_INFO_REDUCED is not set CONFIG_DEBUG_INFO_COMPRESSED_NONE=y # CONFIG_DEBUG_INFO_COMPRESSED_ZLIB is not set # CONFIG_DEBUG_INFO_COMPRESSED_ZSTD is not set # CONFIG_DEBUG_INFO_SPLIT is not set CONFIG_DEBUG_INFO_BTF=y CONFIG_PAHOLE_HAS_SPLIT_BTF=y CONFIG_PAHOLE_HAS_BTF_TAG=y CONFIG_PAHOLE_HAS_LANG_EXCLUDE=y CONFIG_DEBUG_INFO_BTF_MODULES=y # CONFIG_MODULE_ALLOW_BTF_MISMATCH is not set CONFIG_GDB_SCRIPTS=y CONFIG_FRAME_WARN=8192 # CONFIG_STRIP_ASM_SYMS is not set # CONFIG_HEADERS_INSTALL is not set CONFIG_SECTION_MISMATCH_WARN_ONLY=y # CONFIG_DEBUG_FORCE_FUNCTION_ALIGN_64B is not set CONFIG_OBJTOOL=y # CONFIG_VMLINUX_MAP is not set # CONFIG_DEBUG_FORCE_WEAK_PER_CPU is not set # end of Compile-time checks and compiler options # # Generic Kernel Debugging Instruments # CONFIG_MAGIC_SYSRQ=y CONFIG_MAGIC_SYSRQ_DEFAULT_ENABLE=0x1 CONFIG_MAGIC_SYSRQ_SERIAL=y CONFIG_MAGIC_SYSRQ_SERIAL_SEQUENCE="" CONFIG_DEBUG_FS=y CONFIG_DEBUG_FS_ALLOW_ALL=y # CONFIG_DEBUG_FS_DISALLOW_MOUNT is not set # CONFIG_DEBUG_FS_ALLOW_NONE is not set CONFIG_HAVE_ARCH_KGDB=y # CONFIG_KGDB is not set CONFIG_ARCH_HAS_UBSAN=y # CONFIG_UBSAN is not set CONFIG_HAVE_ARCH_KCSAN=y CONFIG_HAVE_KCSAN_COMPILER=y # CONFIG_KCSAN is not set # end of Generic Kernel Debugging Instruments # # Networking Debugging # # CONFIG_NET_DEV_REFCNT_TRACKER is not set # CONFIG_NET_NS_REFCNT_TRACKER is not set # CONFIG_DEBUG_NET is not set # end of Networking Debugging # # Memory Debugging # # CONFIG_PAGE_EXTENSION is not set # CONFIG_DEBUG_PAGEALLOC is not set CONFIG_SLUB_DEBUG=y # CONFIG_SLUB_DEBUG_ON is not set # CONFIG_PAGE_OWNER is not set # CONFIG_PAGE_POISONING is not set # CONFIG_DEBUG_PAGE_REF is not set # CONFIG_DEBUG_RODATA_TEST is not set CONFIG_ARCH_HAS_DEBUG_WX=y # CONFIG_DEBUG_WX is not set CONFIG_GENERIC_PTDUMP=y # CONFIG_PTDUMP_DEBUGFS is not set CONFIG_HAVE_DEBUG_KMEMLEAK=y # CONFIG_DEBUG_KMEMLEAK is not set # CONFIG_PER_VMA_LOCK_STATS is not set # CONFIG_DEBUG_OBJECTS is not set # CONFIG_SHRINKER_DEBUG is not set # CONFIG_DEBUG_STACK_USAGE is not set CONFIG_SCHED_STACK_END_CHECK=y CONFIG_ARCH_HAS_DEBUG_VM_PGTABLE=y # CONFIG_DEBUG_VM is not set # CONFIG_DEBUG_VM_PGTABLE is not set CONFIG_ARCH_HAS_DEBUG_VIRTUAL=y # CONFIG_DEBUG_VIRTUAL is not set CONFIG_DEBUG_MEMORY_INIT=y # CONFIG_DEBUG_PER_CPU_MAPS is not set CONFIG_ARCH_SUPPORTS_KMAP_LOCAL_FORCE_MAP=y # CONFIG_DEBUG_KMAP_LOCAL_FORCE_MAP is not set # CONFIG_MEM_ALLOC_PROFILING is not set CONFIG_HAVE_ARCH_KASAN=y CONFIG_HAVE_ARCH_KASAN_VMALLOC=y CONFIG_CC_HAS_KASAN_GENERIC=y CONFIG_CC_HAS_KASAN_SW_TAGS=y CONFIG_CC_HAS_WORKING_NOSANITIZE_ADDRESS=y # CONFIG_KASAN is not set CONFIG_HAVE_ARCH_KFENCE=y # CONFIG_KFENCE is not set CONFIG_HAVE_ARCH_KMSAN=y CONFIG_HAVE_KMSAN_COMPILER=y # CONFIG_KMSAN is not set # end of Memory Debugging # CONFIG_DEBUG_SHIRQ is not set # # Debug Oops, Lockups and Hangs # CONFIG_PANIC_ON_OOPS=y CONFIG_PANIC_ON_OOPS_VALUE=1 CONFIG_PANIC_TIMEOUT=0 CONFIG_LOCKUP_DETECTOR=y CONFIG_SOFTLOCKUP_DETECTOR=y # CONFIG_BOOTPARAM_SOFTLOCKUP_PANIC is not set CONFIG_HAVE_HARDLOCKUP_DETECTOR_BUDDY=y CONFIG_HARDLOCKUP_DETECTOR=y # CONFIG_HARDLOCKUP_DETECTOR_PREFER_BUDDY is not set CONFIG_HARDLOCKUP_DETECTOR_PERF=y # CONFIG_HARDLOCKUP_DETECTOR_BUDDY is not set # CONFIG_HARDLOCKUP_DETECTOR_ARCH is not set CONFIG_HARDLOCKUP_DETECTOR_COUNTS_HRTIMER=y CONFIG_HARDLOCKUP_CHECK_TIMESTAMP=y CONFIG_BOOTPARAM_HARDLOCKUP_PANIC=y CONFIG_DETECT_HUNG_TASK=y CONFIG_DEFAULT_HUNG_TASK_TIMEOUT=120 # CONFIG_BOOTPARAM_HUNG_TASK_PANIC is not set # CONFIG_WQ_WATCHDOG is not set # CONFIG_WQ_CPU_INTENSIVE_REPORT is not set # CONFIG_TEST_LOCKUP is not set # end of Debug Oops, Lockups and Hangs # # Scheduler Debugging # CONFIG_SCHED_DEBUG=y CONFIG_SCHED_INFO=y CONFIG_SCHEDSTATS=y # end of Scheduler Debugging # CONFIG_DEBUG_TIMEKEEPING is not set CONFIG_DEBUG_PREEMPT=y # # Lock Debugging (spinlocks, mutexes, etc...) # CONFIG_LOCK_DEBUGGING_SUPPORT=y # CONFIG_PROVE_LOCKING is not set # CONFIG_LOCK_STAT is not set # CONFIG_DEBUG_RT_MUTEXES is not set # CONFIG_DEBUG_SPINLOCK is not set # CONFIG_DEBUG_MUTEXES is not set # CONFIG_DEBUG_WW_MUTEX_SLOWPATH is not set # CONFIG_DEBUG_RWSEMS is not set # CONFIG_DEBUG_LOCK_ALLOC is not set CONFIG_DEBUG_ATOMIC_SLEEP=y # CONFIG_DEBUG_LOCKING_API_SELFTESTS is not set # CONFIG_LOCK_TORTURE_TEST is not set # CONFIG_WW_MUTEX_SELFTEST is not set # CONFIG_SCF_TORTURE_TEST is not set # CONFIG_CSD_LOCK_WAIT_DEBUG is not set # end of Lock Debugging (spinlocks, mutexes, etc...) # CONFIG_NMI_CHECK_CPU is not set # CONFIG_DEBUG_IRQFLAGS is not set CONFIG_STACKTRACE=y # CONFIG_WARN_ALL_UNSEEDED_RANDOM is not set # CONFIG_DEBUG_KOBJECT is not set # # Debug kernel data structures # # CONFIG_DEBUG_LIST is not set # CONFIG_DEBUG_PLIST is not set # CONFIG_DEBUG_SG is not set # CONFIG_DEBUG_NOTIFIERS is not set # CONFIG_DEBUG_CLOSURES is not set # CONFIG_DEBUG_MAPLE_TREE is not set # end of Debug kernel data structures # # RCU Debugging # # CONFIG_RCU_SCALE_TEST is not set # CONFIG_RCU_TORTURE_TEST is not set # CONFIG_RCU_REF_SCALE_TEST is not set CONFIG_RCU_CPU_STALL_TIMEOUT=60 CONFIG_RCU_EXP_CPU_STALL_TIMEOUT=0 # CONFIG_RCU_CPU_STALL_CPUTIME is not set # CONFIG_RCU_TRACE is not set # CONFIG_RCU_EQS_DEBUG is not set # end of RCU Debugging # CONFIG_DEBUG_WQ_FORCE_RR_CPU is not set # CONFIG_CPU_HOTPLUG_STATE_CONTROL is not set # CONFIG_LATENCYTOP is not set # CONFIG_DEBUG_CGROUP_REF is not set CONFIG_USER_STACKTRACE_SUPPORT=y CONFIG_NOP_TRACER=y CONFIG_HAVE_RETHOOK=y CONFIG_RETHOOK=y CONFIG_HAVE_FUNCTION_TRACER=y CONFIG_HAVE_FUNCTION_GRAPH_TRACER=y CONFIG_HAVE_FUNCTION_GRAPH_RETVAL=y CONFIG_HAVE_DYNAMIC_FTRACE=y CONFIG_HAVE_DYNAMIC_FTRACE_WITH_REGS=y CONFIG_HAVE_DYNAMIC_FTRACE_WITH_DIRECT_CALLS=y CONFIG_HAVE_DYNAMIC_FTRACE_WITH_ARGS=y CONFIG_HAVE_DYNAMIC_FTRACE_NO_PATCHABLE=y CONFIG_HAVE_FTRACE_MCOUNT_RECORD=y CONFIG_HAVE_SYSCALL_TRACEPOINTS=y CONFIG_HAVE_FENTRY=y CONFIG_HAVE_OBJTOOL_MCOUNT=y CONFIG_HAVE_OBJTOOL_NOP_MCOUNT=y CONFIG_HAVE_C_RECORDMCOUNT=y CONFIG_HAVE_BUILDTIME_MCOUNT_SORT=y CONFIG_BUILDTIME_MCOUNT_SORT=y CONFIG_TRACE_CLOCK=y CONFIG_RING_BUFFER=y CONFIG_EVENT_TRACING=y CONFIG_CONTEXT_SWITCH_TRACER=y CONFIG_TRACING=y CONFIG_GENERIC_TRACER=y CONFIG_TRACING_SUPPORT=y CONFIG_FTRACE=y # CONFIG_BOOTTIME_TRACING is not set CONFIG_FUNCTION_TRACER=y CONFIG_FUNCTION_GRAPH_TRACER=y # CONFIG_FUNCTION_GRAPH_RETVAL is not set CONFIG_DYNAMIC_FTRACE=y CONFIG_DYNAMIC_FTRACE_WITH_REGS=y CONFIG_DYNAMIC_FTRACE_WITH_DIRECT_CALLS=y CONFIG_DYNAMIC_FTRACE_WITH_ARGS=y CONFIG_FPROBE=y # CONFIG_FUNCTION_PROFILER is not set # CONFIG_STACK_TRACER is not set # CONFIG_IRQSOFF_TRACER is not set # CONFIG_PREEMPT_TRACER is not set # CONFIG_SCHED_TRACER is not set # CONFIG_HWLAT_TRACER is not set # CONFIG_OSNOISE_TRACER is not set # CONFIG_TIMERLAT_TRACER is not set # CONFIG_MMIOTRACE is not set CONFIG_FTRACE_SYSCALLS=y # CONFIG_TRACER_SNAPSHOT is not set CONFIG_BRANCH_PROFILE_NONE=y # CONFIG_PROFILE_ANNOTATED_BRANCHES is not set # CONFIG_PROFILE_ALL_BRANCHES is not set CONFIG_BLK_DEV_IO_TRACE=y CONFIG_FPROBE_EVENTS=y CONFIG_PROBE_EVENTS_BTF_ARGS=y CONFIG_KPROBE_EVENTS=y # CONFIG_KPROBE_EVENTS_ON_NOTRACE is not set CONFIG_UPROBE_EVENTS=y CONFIG_BPF_EVENTS=y CONFIG_DYNAMIC_EVENTS=y CONFIG_PROBE_EVENTS=y CONFIG_BPF_KPROBE_OVERRIDE=y CONFIG_FTRACE_MCOUNT_RECORD=y CONFIG_FTRACE_MCOUNT_USE_OBJTOOL=y # CONFIG_SYNTH_EVENTS is not set # CONFIG_USER_EVENTS is not set # CONFIG_HIST_TRIGGERS is not set # CONFIG_TRACE_EVENT_INJECT is not set # CONFIG_TRACEPOINT_BENCHMARK is not set # CONFIG_RING_BUFFER_BENCHMARK is not set # CONFIG_TRACE_EVAL_MAP_FILE is not set # CONFIG_FTRACE_RECORD_RECURSION is not set # CONFIG_FTRACE_VALIDATE_RCU_IS_WATCHING is not set # CONFIG_FTRACE_STARTUP_TEST is not set # CONFIG_FTRACE_SORT_STARTUP_TEST is not set # CONFIG_RING_BUFFER_STARTUP_TEST is not set # CONFIG_RING_BUFFER_VALIDATE_TIME_DELTAS is not set # CONFIG_PREEMPTIRQ_DELAY_TEST is not set # CONFIG_KPROBE_EVENT_GEN_TEST is not set # CONFIG_RV is not set # CONFIG_PROVIDE_OHCI1394_DMA_INIT is not set # CONFIG_SAMPLES is not set CONFIG_HAVE_SAMPLE_FTRACE_DIRECT=y CONFIG_HAVE_SAMPLE_FTRACE_DIRECT_MULTI=y CONFIG_ARCH_HAS_DEVMEM_IS_ALLOWED=y # CONFIG_STRICT_DEVMEM is not set # # x86 Debugging # CONFIG_X86_VERBOSE_BOOTUP=y CONFIG_EARLY_PRINTK=y # CONFIG_EARLY_PRINTK_DBGP is not set # CONFIG_EARLY_PRINTK_USB_XDBC is not set # CONFIG_EFI_PGT_DUMP is not set # CONFIG_DEBUG_TLBFLUSH is not set # CONFIG_IOMMU_DEBUG is not set CONFIG_HAVE_MMIOTRACE_SUPPORT=y # CONFIG_X86_DECODER_SELFTEST is not set CONFIG_IO_DELAY_0X80=y # CONFIG_IO_DELAY_0XED is not set # CONFIG_IO_DELAY_UDELAY is not set # CONFIG_IO_DELAY_NONE is not set # CONFIG_DEBUG_BOOT_PARAMS is not set # CONFIG_CPA_DEBUG is not set # CONFIG_DEBUG_ENTRY is not set # CONFIG_DEBUG_NMI_SELFTEST is not set CONFIG_X86_DEBUG_FPU=y # CONFIG_PUNIT_ATOM_DEBUG is not set CONFIG_UNWINDER_ORC=y # CONFIG_UNWINDER_FRAME_POINTER is not set # end of x86 Debugging # # Kernel Testing and Coverage # # CONFIG_KUNIT is not set # CONFIG_NOTIFIER_ERROR_INJECTION is not set CONFIG_FUNCTION_ERROR_INJECTION=y CONFIG_FAULT_INJECTION=y CONFIG_FAILSLAB=y CONFIG_FAIL_PAGE_ALLOC=y # CONFIG_FAULT_INJECTION_USERCOPY is not set # CONFIG_FAIL_MAKE_REQUEST is not set # CONFIG_FAIL_IO_TIMEOUT is not set # CONFIG_FAIL_FUTEX is not set CONFIG_FAULT_INJECTION_DEBUG_FS=y CONFIG_FAIL_FUNCTION=y # CONFIG_FAIL_MMC_REQUEST is not set # CONFIG_FAULT_INJECTION_CONFIGFS is not set # CONFIG_FAULT_INJECTION_STACKTRACE_FILTER is not set CONFIG_ARCH_HAS_KCOV=y CONFIG_CC_HAS_SANCOV_TRACE_PC=y # CONFIG_KCOV is not set CONFIG_RUNTIME_TESTING_MENU=y # CONFIG_TEST_DHRY is not set # CONFIG_LKDTM is not set # CONFIG_TEST_MIN_HEAP is not set # CONFIG_TEST_DIV64 is not set # CONFIG_TEST_MULDIV64 is not set # CONFIG_BACKTRACE_SELF_TEST is not set # CONFIG_TEST_REF_TRACKER is not set # CONFIG_RBTREE_TEST is not set # CONFIG_REED_SOLOMON_TEST is not set # CONFIG_INTERVAL_TREE_TEST is not set # CONFIG_PERCPU_TEST is not set # CONFIG_ATOMIC64_SELFTEST is not set # CONFIG_ASYNC_RAID6_TEST is not set # CONFIG_TEST_HEXDUMP is not set # CONFIG_TEST_KSTRTOX is not set # CONFIG_TEST_PRINTF is not set # CONFIG_TEST_SCANF is not set # CONFIG_TEST_BITMAP is not set # CONFIG_TEST_UUID is not set # CONFIG_TEST_XARRAY is not set # CONFIG_TEST_MAPLE_TREE is not set # CONFIG_TEST_RHASHTABLE is not set # CONFIG_TEST_IDA is not set # CONFIG_TEST_LKM is not set # CONFIG_TEST_BITOPS is not set # CONFIG_TEST_VMALLOC is not set CONFIG_TEST_BPF=m # CONFIG_TEST_BLACKHOLE_DEV is not set # CONFIG_FIND_BIT_BENCHMARK is not set # CONFIG_TEST_FIRMWARE is not set # CONFIG_TEST_SYSCTL is not set # CONFIG_TEST_UDELAY is not set # CONFIG_TEST_STATIC_KEYS is not set # CONFIG_TEST_KMOD is not set # CONFIG_TEST_MEMCAT_P is not set # CONFIG_TEST_MEMINIT is not set # CONFIG_TEST_FREE_PAGES is not set # CONFIG_TEST_FPU is not set # CONFIG_TEST_CLOCKSOURCE_WATCHDOG is not set # CONFIG_TEST_OBJPOOL is not set CONFIG_ARCH_USE_MEMTEST=y # CONFIG_MEMTEST is not set # end of Kernel Testing and Coverage # # Rust hacking # # end of Rust hacking # end of Kernel hacking From 8eba407b1d5663bd767a4470bfb0e52ad1623475 Mon Sep 17 00:00:00 2001 From: Yonghong Song <yonghong.song@linux.dev> Date: Wed, 2 Oct 2024 09:54:40 -0700 Subject: [PATCH] bpf: Implement private stack --- arch/x86/net/bpf_jit_comp.c | 29 +++++++++++++++++-- include/linux/bpf.h | 1 + kernel/bpf/core.c | 9 ++++++ kernel/bpf/verifier.c | 12 ++++++++ net/core/sysctl_net_core.c | 3 +- .../bpf/progs/task_storage_nodeadlock.c | 8 ++++- 6 files changed, 57 insertions(+), 5 deletions(-) diff --git a/arch/x86/net/bpf_jit_comp.c b/arch/x86/net/bpf_jit_comp.c index 06b080b61aa5..3f0cf410199a 100644 --- a/arch/x86/net/bpf_jit_comp.c +++ b/arch/x86/net/bpf_jit_comp.c @@ -164,6 +164,7 @@ static int bpf_size_to_x86_bytes(int bpf_size) #define AUX_REG (MAX_BPF_JIT_REG + 1) #define X86_REG_R9 (MAX_BPF_JIT_REG + 2) #define X86_REG_R12 (MAX_BPF_JIT_REG + 3) +#define X86_REG_SP (MAX_BPF_JIT_REG + 4) /* * The following table maps BPF registers to x86-64 registers. @@ -191,6 +192,7 @@ static const int reg2hex[] = { [AUX_REG] = 3, /* R11 temp register */ [X86_REG_R9] = 1, /* R9 register, 6th function argument */ [X86_REG_R12] = 4, /* R12 callee saved */ + [X86_REG_SP] = 4, /* RSP */ }; static const int reg2pt_regs[] = { @@ -484,12 +486,15 @@ static void emit_prologue_tail_call(u8 **pprog, bool is_subprog) *pprog = prog; } +static void emit_mov_imm64(u8 **pprog, u32 dst_reg, const u32 imm32_hi, const u32 imm32_lo); + +extern int yhs; /* * Emit x86-64 prologue code for BPF program. * bpf_tail_call helper will skip the first X86_TAIL_CALL_OFFSET bytes * while jumping to another program */ -static void emit_prologue(u8 **pprog, u32 stack_depth, bool ebpf_from_cbpf, +static void emit_prologue(struct bpf_prog *bpf_prog, u8 **pprog, u32 stack_depth, bool ebpf_from_cbpf, bool tail_call_reachable, bool is_subprog, bool is_exception_cb) { @@ -526,13 +531,31 @@ static void emit_prologue(u8 **pprog, u32 stack_depth, bool ebpf_from_cbpf, EMIT1(0x55); /* push rbp */ EMIT3(0x48, 0x89, 0xE5); /* mov rbp, rsp */ } + if (yhs && !is_subprog && !tail_call_reachable && bpf_prog->aux->priv_stack_ptr) { + /* mov rsp, pcpu_priv_stack_top */ + void __percpu *priv_frame_ptr = bpf_prog->aux->priv_stack_ptr + 16 * 1024; + + /* movabs sp, priv_frame_ptr */ + emit_mov_imm64(&prog, AUX_REG, (long) priv_frame_ptr >> 32, + (u32) (long) priv_frame_ptr); + + /* add <aux_reg>, gs:[<off>] */ + EMIT2(0x65, 0x4c); + EMIT3(0x03, 0x1c, 0x25); + EMIT((u32)(unsigned long)&this_cpu_off, 4); + /* mov rsp, aux_reg */ + EMIT3(0x4c, 0x89, 0xdc); + } /* X86_TAIL_CALL_OFFSET is here */ EMIT_ENDBR(); /* sub rsp, rounded_stack_depth */ - if (stack_depth) + if (yhs && !is_subprog && !tail_call_reachable && bpf_prog->aux->priv_stack_ptr) { + EMIT3_off32(0x48, 0x81, 0xEC, round_up(stack_depth, 8) + 16); + } else if (stack_depth) { EMIT3_off32(0x48, 0x81, 0xEC, round_up(stack_depth, 8)); + } if (tail_call_reachable) emit_prologue_tail_call(&prog, is_subprog); *pprog = prog; @@ -1432,7 +1455,7 @@ static int do_jit(struct bpf_prog *bpf_prog, int *addrs, u8 *image, u8 *rw_image detect_reg_usage(insn, insn_cnt, callee_regs_used); - emit_prologue(&prog, bpf_prog->aux->stack_depth, + emit_prologue(bpf_prog, &prog, bpf_prog->aux->stack_depth, bpf_prog_was_classic(bpf_prog), tail_call_reachable, bpf_is_subprog(bpf_prog), bpf_prog->aux->exception_cb); /* Exception callback will clobber callee regs for its own use, and diff --git a/include/linux/bpf.h b/include/linux/bpf.h index 19d8ca8ac960..32f309e01d57 100644 --- a/include/linux/bpf.h +++ b/include/linux/bpf.h @@ -1493,6 +1493,7 @@ struct bpf_prog_aux { struct bpf_jit_poke_descriptor *poke_tab; struct bpf_kfunc_desc_tab *kfunc_tab; struct bpf_kfunc_btf_tab *kfunc_btf_tab; + void __percpu *priv_stack_ptr; u32 size_poke_tab; #ifdef CONFIG_FINEIBT struct bpf_ksym ksym_prefix; diff --git a/kernel/bpf/core.c b/kernel/bpf/core.c index 4e07cc057d6f..0c56124f66c2 100644 --- a/kernel/bpf/core.c +++ b/kernel/bpf/core.c @@ -2395,6 +2395,7 @@ static void bpf_prog_select_func(struct bpf_prog *fp) */ struct bpf_prog *bpf_prog_select_runtime(struct bpf_prog *fp, int *err) { + void __percpu *priv_stack_ptr; /* In case of BPF to BPF calls, verifier did all the prep * work with regards to JITing, etc. */ @@ -2420,6 +2421,13 @@ struct bpf_prog *bpf_prog_select_runtime(struct bpf_prog *fp, int *err) if (*err) return fp; + priv_stack_ptr = __alloc_percpu_gfp(1024 * 16, 8, GFP_KERNEL); + if (!priv_stack_ptr) { + *err = -ENOMEM; + return fp; + } + fp->aux->priv_stack_ptr = priv_stack_ptr; + fp = bpf_int_jit_compile(fp); bpf_prog_jit_attempt_done(fp); if (!fp->jited && jit_needed) { @@ -2800,6 +2808,7 @@ static void bpf_prog_free_deferred(struct work_struct *work) #endif if (aux->dst_trampoline) bpf_trampoline_put(aux->dst_trampoline); + free_percpu(aux->priv_stack_ptr); for (i = 0; i < aux->real_func_cnt; i++) { /* We can just unlink the subprog poke descriptor table as * it was originally linked to the main program and is also diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c index 7d9b38ffd220..81a750910489 100644 --- a/kernel/bpf/verifier.c +++ b/kernel/bpf/verifier.c @@ -19940,6 +19940,7 @@ static int jit_subprogs(struct bpf_verifier_env *env) { struct bpf_prog *prog = env->prog, **func, *tmp; int i, j, subprog_start, subprog_end = 0, len, subprog; + void __percpu *priv_stack_ptr = NULL; struct bpf_map *map_ptr; struct bpf_insn *insn; void *old_bpf_func; @@ -20066,6 +20067,16 @@ static int jit_subprogs(struct bpf_verifier_env *env) func[i]->aux->exception_cb = env->subprog_info[i].is_exception_cb; if (!i) func[i]->aux->exception_boundary = env->seen_exception; + + if (!i) { + priv_stack_ptr = __alloc_percpu_gfp(1024 * 16, 8, GFP_KERNEL); + if (!priv_stack_ptr) { + err = -ENOMEM; + goto out_free; + } + func[0]->aux->priv_stack_ptr = priv_stack_ptr; + } + func[i] = bpf_int_jit_compile(func[i]); if (!func[i]->jited) { err = -ENOTSUPP; @@ -20154,6 +20165,7 @@ static int jit_subprogs(struct bpf_verifier_env *env) prog->bpf_func = func[0]->bpf_func; prog->jited_len = func[0]->jited_len; prog->aux->extable = func[0]->aux->extable; + prog->aux->priv_stack_ptr = priv_stack_ptr; prog->aux->num_exentries = func[0]->aux->num_exentries; prog->aux->func = func; prog->aux->func_cnt = env->subprog_cnt - env->hidden_subprog_cnt; diff --git a/net/core/sysctl_net_core.c b/net/core/sysctl_net_core.c index 86a2476678c4..2903ae849a5e 100644 --- a/net/core/sysctl_net_core.c +++ b/net/core/sysctl_net_core.c @@ -370,13 +370,14 @@ proc_dointvec_minmax_bpf_restricted(const struct ctl_table *table, int write, } # endif /* CONFIG_HAVE_EBPF_JIT */ +int yhs; static int proc_dolongvec_minmax_bpf_restricted(const struct ctl_table *table, int write, void *buffer, size_t *lenp, loff_t *ppos) { if (!capable(CAP_SYS_ADMIN)) return -EPERM; - + yhs = 1; return proc_doulongvec_minmax(table, write, buffer, lenp, ppos); } #endif diff --git a/tools/testing/selftests/bpf/progs/task_storage_nodeadlock.c b/tools/testing/selftests/bpf/progs/task_storage_nodeadlock.c index ea2dbb80f7b3..a9f66a24f14a 100644 --- a/tools/testing/selftests/bpf/progs/task_storage_nodeadlock.c +++ b/tools/testing/selftests/bpf/progs/task_storage_nodeadlock.c @@ -33,8 +33,14 @@ int BPF_PROG(socket_post_create, struct socket *sock, int family, int type, return 0; task = bpf_get_current_task_btf(); +if (0) { value = bpf_task_storage_get(&task_storage, task, &zero, BPF_LOCAL_STORAGE_GET_F_CREATE); +} else { + value = bpf_task_storage_get(&task_storage, task, NULL, + 0); +} +if (0) { if (!value) __sync_fetch_and_add(&nr_get_errs, 1); @@ -42,6 +48,6 @@ int BPF_PROG(socket_post_create, struct socket *sock, int family, int type, bpf_get_current_task_btf()); if (ret == -EBUSY) __sync_fetch_and_add(&nr_del_errs, 1); - +} return 0; }
On Fri, Oct 4, 2024 at 7:03 PM Yonghong Song <yonghong.song@linux.dev> wrote: > > > On 10/4/24 12:52 PM, Alexei Starovoitov wrote: > > On Fri, Oct 4, 2024 at 12:28 PM Yonghong Song <yonghong.song@linux.dev> wrote: > >> > >> On 10/3/24 10:22 PM, Yonghong Song wrote: > >>> On 10/3/24 3:32 PM, Alexei Starovoitov wrote: > >>>> On Thu, Oct 3, 2024 at 1:44 PM Yonghong Song > >>>> <yonghong.song@linux.dev> wrote: > >>>>>> Looks like the idea needs more thought. > >>>>>> > >>>>>> in_task_stack() won't recognize the private stack, > >>>>>> so it will look like stack overflow and double fault. > >>>>>> > >>>>>> do you have CONFIG_VMAP_STACK ? > >>>>> Yes, my above test runs fine withCONFIG_VMAP_STACK. Let me guard > >>>>> private stack support with > >>>>> CONFIG_VMAP_STACK for now. Not sure whether distributions enable > >>>>> CONFIG_VMAP_STACK or not. > >>>> Good! but I'm surprised it makes a difference. > >>> That only for the test case I tried. Now I tried the whole bpf selftests > >>> with CONFIG_VMAP_STACK on. There are still some failures. Some of them > >>> due to stack protector. I disabled stack protector and then those stack > >>> protector error gone. But some other errors show up like below: > >>> > >>> [ 27.186581] kernel tried to execute NX-protected page - exploit > >>> attempt? (uid: 0) > >>> [ 27.187480] BUG: unable to handle page fault for address: > >>> ffff888109572800 > >>> [ 27.188299] #PF: supervisor instruction fetch in kernel mode > >>> [ 27.189085] #PF: error_code(0x0011) - permissions violation > >>> > >>> or > >>> > >>> [ 27.736844] BUG: unable to handle page fault for address: > >>> 0000000080000000 > >>> [ 27.737759] #PF: supervisor instruction fetch in kernel mode > >>> [ 27.738631] #PF: error_code(0x0010) - not-present page > >>> [ 27.739455] PGD 0 P4D 0 > >>> [ 27.739818] Oops: Oops: 0010 [#1] PREEMPT SMP PTI > >>> > >>> ... > >>> > >>> Some further investigations are needed. > >> > >> I found one failure case (with stackprotector disabled): > >> > >> [ 20.032611] traps: PANIC: double fault, error_code: 0x0 > >> [ 20.032615] Oops: double fault: 0000 [#1] PREEMPT SMP PTI > >> [ 20.032619] CPU: 0 UID: 0 PID: 1959 Comm: test_progs Tainted: G OE 6.11.0-10576-g17baa0096769-dirty #1006 > >> [ 20.032623] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE > >> [ 20.032624] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 > >> [ 20.032626] RIP: 0010:error_entry+0x17/0x140 > >> [ 20.032633] Code: ff 0f 01 f8 e9 56 fe ff ff 90 90 90 90 90 90 90 90 90 90 56 48 8b 74 24 08 48 89 7c 24 08 52 51 50 41 50 41 51 41 52 49 > >> [ 20.032635] RSP: 0018:ffffe8ffff400000 EFLAGS: 00010093 > >> [ 20.032637] RAX: ffffe8ffff4000a8 RBX: ffffe8ffff4000a8 RCX: ffffffff82201737 > >> [ 20.032639] RDX: 0000000000000000 RSI: ffffffff8220128d RDI: ffffe8ffff4000a8 > >> [ 20.032640] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 > >> [ 20.032641] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 > >> [ 20.032642] R13: 0000000000000000 R14: 000000000002ed80 R15: 0000000000000000 > >> [ 20.032643] FS: 00007f8a3a2006c0(0000) GS:ffff888237c00000(0000) knlGS:ffff888237c00000 > >> [ 20.032645] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > >> [ 20.032646] CR2: ffffe8ffff3ffff8 CR3: 0000000103580002 CR4: 0000000000370ef0 > >> [ 20.032649] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > >> [ 20.032650] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > >> [ 20.032651] Call Trace: > >> [ 20.032660] <#DF> > >> [ 20.032664] ? __die_body+0xaf/0xc0 > >> [ 20.032667] ? die+0x2f/0x50 > >> [ 20.032670] ? exc_double_fault+0xbf/0xd0 > >> [ 20.032674] ? asm_exc_double_fault+0x23/0x30 > >> [ 20.032678] ? restore_regs_and_return_to_kernel+0x1b/0x1b > >> [ 20.032681] ? asm_exc_page_fault+0xd/0x30 > >> [ 20.032684] ? error_entry+0x17/0x140 > >> [ 20.032687] </#DF> > >> > >> The private stack for cpu 0: > >> priv_stack_ptr cpu 0 = [ffffe8ffff434000, ffffe8ffff438000] (total 16KB) > >> That is, the top stack is ffffe8ffff438000 and the bottom stack is ffffe8ffff434000. > >> > >> During bpf execution, a softirq may happen, at that point, > >> stack pointer becomes: > >> RSP: 0018:ffffe8ffff400000 (see above) > >> and there is a read/write (mostly write) to address > >> CR2: ffffe8ffff3ffff8 > >> And this may cause a fault. > >> After this fault, there are some further access and probably because > >> of invalid stack, double fault happens. > >> > >> So the quesiton is why RSP is reset to ffffe8ffff400000? > > 0x38000 bytes consumed by stack or rounded down? > > That's unlikely. > > > >> I have not figured out which code changed this? Maybe somebody can help? > > As Kumar said earlier pls share the patch. Link to github? or whichever. > > > > Double check that any kind of tail-call logic is not mixed with priv stack. > > Here is the reproducer. Two attached files: > priv_stack.config: the config file to build the kernel > 0001-bpf-implement-private-stack.patch: the patch to apply to the top of bpf-next. > > The top bpf-next commit in my test: > commit 9502a7de5a61bec3bda841a830560c5d6d40ecac (origin/master, origin/HEAD, master) > Author: Mykyta Yatsenko <yatsenko@meta.com> > Date: Tue Oct 1 00:15:22 2024 +0100 > > selftests/bpf: Emit top frequent code lines in veristat > > > I am using clang18 to build the kernel and selftests. > The build command line: > make LLVM=1 -j > make -C tools/testing/selftests/bpf LLVM=1 -j > > In qemu vm, tools/testing/selftests/bpf directory, run the following script: > > $ cat run.sh > cat /proc/sys/net/core/bpf_jit_limit > echo 796917760 > /proc/sys/net/core/bpf_jit_limit > # ./test_progs -n 339/4 > ./test_progs -t task_local_storage/nodeadlock > > With private stack on by default, in my environment, booting will failure. > So by default, private stack is off. > In the above > echo 796917760 > /proc/sys/net/core/bpf_jit_limit > intends to enable private stack. well, the patch is written in a way that cat /proc/sys/net/core/bpf_jit_limit is enough to enable priv stack. > + if (yhs && !is_subprog && !tail_call_reachable && bpf_prog->aux->priv_stack_ptr) { > + EMIT3_off32(0x48, 0x81, 0xEC, round_up(stack_depth, 8) + 16); this part is unnecessary. Just setting rsp to the top is enough to start doing things in a new stack, but I'm afraid this is a dead end. I've played with orc and frame pointer unwders. Both are not happy with our hack. get_stack_info() returns unknown, so any logic that needs to collect the stack gets into the loop that exhausts our broken stack and it eventually dies with NULL deref or double fault. The simplest way to repro the brokeness is with: @@ -255,6 +255,8 @@ BPF_CALL_5(bpf_task_storage_get, struct bpf_map *, map, struct task_struct *, if (flags & ~BPF_LOCAL_STORAGE_GET_F_CREATE || !task) return (unsigned long)NULL; + dump_stack(); + return 0; (in addition to your patch that calls it from task_local_storage/nodeadlock test). It will loop like: [ 17.708612] bad stack ffffe8fffd620000 [ 17.714759] CPU: 0 UID: 0 PID: 2186 Comm: test_progs Not tainted 6.12.0-rc1-00162-g3fe52dc7912d-dirty #6365 [ 17.715692] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 17.715692] Call Trace: [ 17.715692] bad stack ffffe8fffd620000 [ 17.721814] CPU: 0 UID: 0 PID: 2182 Comm: test_progs Not tainted 6.12.0-rc1-00162-g3fe52dc7912d-dirty #6365 [ 17.722763] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 17.722763] Call Trace: [ 17.722763] bad stack ffffe8fffd620000 [ 17.728865] CPU: 0 UID: 0 PID: 2156 Comm: test_progs Not tainted 6.12.0-rc1-00162-g3fe52dc7912d-dirty #6365 [ 17.729826] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 To make it less broken it requires a bunch of work in arch/x86/kernel/dumpstack.c I tried to hack things up, but wasn't successful. Even if we do succeed eventually this is too risky. We don't have a strong reason to introduce another stack type along with all the delicate logic to recognize it based on rsp value alone. If our percpu stack is per prog the get_stack_info() logic gets complicated and that's not acceptable. We need to scrap this idea. Let's go back to push/pop r11 around calls :(
On Tue, Oct 8, 2024 at 3:10 PM Alexei Starovoitov <alexei.starovoitov@gmail.com> wrote: > > We need to scrap this idea. > Let's go back to push/pop r11 around calls :( I didn't give up :) Here is a new idea that seems to work: [ 131.472066] dump_stack_lvl+0x53/0x70 [ 131.472066] bpf_task_storage_get+0x3e/0x2f0 [ 131.472066] ? bpf_task_storage_get+0x231/0x2f0 [ 131.472066] bpf_prog_ed7a5f33cc9fefab_foo+0x30/0x32 [ 131.472066] bpf_prog_8c4f9bc79da6c27e_socket_post_create+0x68/0x6d ... [ 131.417145] dump_stack_lvl+0x53/0x70 [ 131.417145] bpf_task_storage_get+0x3e/0x2f0 [ 131.417145] ? selinux_netlbl_socket_post_create+0xab/0x150 [ 131.417145] bpf_prog_8c4f9bc79da6c27e_socket_post_create+0x60/0x6d The stack dump works fine out of main prog and out of subprog. The key difference it to pretend to have stack_depth=0, so there is no adjustment to %rsp, but point %rbp to per-cpu private stack and grow it _up_. For the main prog %rbp points to the bottom of priv stack plus stack_depth it needs, so all bpf insns that do r10-off access the bottom of that priv stack. When subprog is called it does 'add %rbp, its_stack_depth' and in turn it's using memory above the bottom of the priv stack. That seems to work, but exceptions and tailcalls are broken. I ran out of time today to debug. Pls see the attached patch.
On 10/8/24 3:10 PM, Alexei Starovoitov wrote: > On Fri, Oct 4, 2024 at 7:03 PM Yonghong Song <yonghong.song@linux.dev> wrote: >> >> On 10/4/24 12:52 PM, Alexei Starovoitov wrote: >>> On Fri, Oct 4, 2024 at 12:28 PM Yonghong Song <yonghong.song@linux.dev> wrote: >>>> On 10/3/24 10:22 PM, Yonghong Song wrote: >>>>> On 10/3/24 3:32 PM, Alexei Starovoitov wrote: >>>>>> On Thu, Oct 3, 2024 at 1:44 PM Yonghong Song >>>>>> <yonghong.song@linux.dev> wrote: >>>>>>>> Looks like the idea needs more thought. >>>>>>>> >>>>>>>> in_task_stack() won't recognize the private stack, >>>>>>>> so it will look like stack overflow and double fault. >>>>>>>> >>>>>>>> do you have CONFIG_VMAP_STACK ? >>>>>>> Yes, my above test runs fine withCONFIG_VMAP_STACK. Let me guard >>>>>>> private stack support with >>>>>>> CONFIG_VMAP_STACK for now. Not sure whether distributions enable >>>>>>> CONFIG_VMAP_STACK or not. >>>>>> Good! but I'm surprised it makes a difference. >>>>> That only for the test case I tried. Now I tried the whole bpf selftests >>>>> with CONFIG_VMAP_STACK on. There are still some failures. Some of them >>>>> due to stack protector. I disabled stack protector and then those stack >>>>> protector error gone. But some other errors show up like below: >>>>> >>>>> [ 27.186581] kernel tried to execute NX-protected page - exploit >>>>> attempt? (uid: 0) >>>>> [ 27.187480] BUG: unable to handle page fault for address: >>>>> ffff888109572800 >>>>> [ 27.188299] #PF: supervisor instruction fetch in kernel mode >>>>> [ 27.189085] #PF: error_code(0x0011) - permissions violation >>>>> >>>>> or >>>>> >>>>> [ 27.736844] BUG: unable to handle page fault for address: >>>>> 0000000080000000 >>>>> [ 27.737759] #PF: supervisor instruction fetch in kernel mode >>>>> [ 27.738631] #PF: error_code(0x0010) - not-present page >>>>> [ 27.739455] PGD 0 P4D 0 >>>>> [ 27.739818] Oops: Oops: 0010 [#1] PREEMPT SMP PTI >>>>> >>>>> ... >>>>> >>>>> Some further investigations are needed. >>>> I found one failure case (with stackprotector disabled): >>>> >>>> [ 20.032611] traps: PANIC: double fault, error_code: 0x0 >>>> [ 20.032615] Oops: double fault: 0000 [#1] PREEMPT SMP PTI >>>> [ 20.032619] CPU: 0 UID: 0 PID: 1959 Comm: test_progs Tainted: G OE 6.11.0-10576-g17baa0096769-dirty #1006 >>>> [ 20.032623] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE >>>> [ 20.032624] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 >>>> [ 20.032626] RIP: 0010:error_entry+0x17/0x140 >>>> [ 20.032633] Code: ff 0f 01 f8 e9 56 fe ff ff 90 90 90 90 90 90 90 90 90 90 56 48 8b 74 24 08 48 89 7c 24 08 52 51 50 41 50 41 51 41 52 49 >>>> [ 20.032635] RSP: 0018:ffffe8ffff400000 EFLAGS: 00010093 >>>> [ 20.032637] RAX: ffffe8ffff4000a8 RBX: ffffe8ffff4000a8 RCX: ffffffff82201737 >>>> [ 20.032639] RDX: 0000000000000000 RSI: ffffffff8220128d RDI: ffffe8ffff4000a8 >>>> [ 20.032640] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 >>>> [ 20.032641] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 >>>> [ 20.032642] R13: 0000000000000000 R14: 000000000002ed80 R15: 0000000000000000 >>>> [ 20.032643] FS: 00007f8a3a2006c0(0000) GS:ffff888237c00000(0000) knlGS:ffff888237c00000 >>>> [ 20.032645] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >>>> [ 20.032646] CR2: ffffe8ffff3ffff8 CR3: 0000000103580002 CR4: 0000000000370ef0 >>>> [ 20.032649] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 >>>> [ 20.032650] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 >>>> [ 20.032651] Call Trace: >>>> [ 20.032660] <#DF> >>>> [ 20.032664] ? __die_body+0xaf/0xc0 >>>> [ 20.032667] ? die+0x2f/0x50 >>>> [ 20.032670] ? exc_double_fault+0xbf/0xd0 >>>> [ 20.032674] ? asm_exc_double_fault+0x23/0x30 >>>> [ 20.032678] ? restore_regs_and_return_to_kernel+0x1b/0x1b >>>> [ 20.032681] ? asm_exc_page_fault+0xd/0x30 >>>> [ 20.032684] ? error_entry+0x17/0x140 >>>> [ 20.032687] </#DF> >>>> >>>> The private stack for cpu 0: >>>> priv_stack_ptr cpu 0 = [ffffe8ffff434000, ffffe8ffff438000] (total 16KB) >>>> That is, the top stack is ffffe8ffff438000 and the bottom stack is ffffe8ffff434000. >>>> >>>> During bpf execution, a softirq may happen, at that point, >>>> stack pointer becomes: >>>> RSP: 0018:ffffe8ffff400000 (see above) >>>> and there is a read/write (mostly write) to address >>>> CR2: ffffe8ffff3ffff8 >>>> And this may cause a fault. >>>> After this fault, there are some further access and probably because >>>> of invalid stack, double fault happens. >>>> >>>> So the quesiton is why RSP is reset to ffffe8ffff400000? >>> 0x38000 bytes consumed by stack or rounded down? >>> That's unlikely. >>> >>>> I have not figured out which code changed this? Maybe somebody can help? >>> As Kumar said earlier pls share the patch. Link to github? or whichever. >>> >>> Double check that any kind of tail-call logic is not mixed with priv stack. >> Here is the reproducer. Two attached files: >> priv_stack.config: the config file to build the kernel >> 0001-bpf-implement-private-stack.patch: the patch to apply to the top of bpf-next. >> >> The top bpf-next commit in my test: >> commit 9502a7de5a61bec3bda841a830560c5d6d40ecac (origin/master, origin/HEAD, master) >> Author: Mykyta Yatsenko <yatsenko@meta.com> >> Date: Tue Oct 1 00:15:22 2024 +0100 >> >> selftests/bpf: Emit top frequent code lines in veristat >> >> >> I am using clang18 to build the kernel and selftests. >> The build command line: >> make LLVM=1 -j >> make -C tools/testing/selftests/bpf LLVM=1 -j >> >> In qemu vm, tools/testing/selftests/bpf directory, run the following script: >> >> $ cat run.sh >> cat /proc/sys/net/core/bpf_jit_limit >> echo 796917760 > /proc/sys/net/core/bpf_jit_limit >> # ./test_progs -n 339/4 >> ./test_progs -t task_local_storage/nodeadlock >> >> With private stack on by default, in my environment, booting will failure. >> So by default, private stack is off. >> In the above >> echo 796917760 > /proc/sys/net/core/bpf_jit_limit >> intends to enable private stack. > well, the patch is written in a way that > cat /proc/sys/net/core/bpf_jit_limit > is enough to enable priv stack. Ok. Good to know. > >> + if (yhs && !is_subprog && !tail_call_reachable && bpf_prog->aux->priv_stack_ptr) { >> + EMIT3_off32(0x48, 0x81, 0xEC, round_up(stack_depth, 8) + 16); > this part is unnecessary. > Just setting rsp to the top is enough to start doing things This is a hack. I run out of ideas so added some hack above for debugging purpose. > in a new stack, but I'm afraid this is a dead end. > I've played with orc and frame pointer unwders. > Both are not happy with our hack. > get_stack_info() returns unknown, so any logic that needs to collect > the stack gets into the loop that exhausts our broken stack and > it eventually dies with NULL deref or double fault. > The simplest way to repro the brokeness is with: > > @@ -255,6 +255,8 @@ BPF_CALL_5(bpf_task_storage_get, struct bpf_map *, > map, struct task_struct *, > if (flags & ~BPF_LOCAL_STORAGE_GET_F_CREATE || !task) > return (unsigned long)NULL; > > + dump_stack(); Indeed this won't work and the stack trace cannot be properly presented due to private stack range is outside the default kernel range. Without dump_stack(), there are some other unknown errors. > + return 0; > > (in addition to your patch that calls it from > task_local_storage/nodeadlock test). > It will loop like: > [ 17.708612] bad stack ffffe8fffd620000 > [ 17.714759] CPU: 0 UID: 0 PID: 2186 Comm: test_progs Not tainted > 6.12.0-rc1-00162-g3fe52dc7912d-dirty #6365 > [ 17.715692] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), > BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 > [ 17.715692] Call Trace: > [ 17.715692] bad stack ffffe8fffd620000 > [ 17.721814] CPU: 0 UID: 0 PID: 2182 Comm: test_progs Not tainted > 6.12.0-rc1-00162-g3fe52dc7912d-dirty #6365 > [ 17.722763] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), > BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 > [ 17.722763] Call Trace: > [ 17.722763] bad stack ffffe8fffd620000 > [ 17.728865] CPU: 0 UID: 0 PID: 2156 Comm: test_progs Not tainted > 6.12.0-rc1-00162-g3fe52dc7912d-dirty #6365 > [ 17.729826] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), > BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 > > To make it less broken it requires a bunch of work in > arch/x86/kernel/dumpstack.c > I tried to hack things up, but wasn't successful. > Even if we do succeed eventually this is too risky. > We don't have a strong reason to introduce another stack type > along with all the delicate logic to recognize it based on rsp > value alone. If our percpu stack is per prog the get_stack_info() > logic gets complicated and that's not acceptable. > We need to scrap this idea. > Let's go back to push/pop r11 around calls :(
On 10/8/24 7:06 PM, Alexei Starovoitov wrote: > On Tue, Oct 8, 2024 at 3:10 PM Alexei Starovoitov > <alexei.starovoitov@gmail.com> wrote: >> We need to scrap this idea. >> Let's go back to push/pop r11 around calls :( > I didn't give up :) > > Here is a new idea that seems to work: > > [ 131.472066] dump_stack_lvl+0x53/0x70 > [ 131.472066] bpf_task_storage_get+0x3e/0x2f0 > [ 131.472066] ? bpf_task_storage_get+0x231/0x2f0 > [ 131.472066] bpf_prog_ed7a5f33cc9fefab_foo+0x30/0x32 > [ 131.472066] bpf_prog_8c4f9bc79da6c27e_socket_post_create+0x68/0x6d > ... > [ 131.417145] dump_stack_lvl+0x53/0x70 > [ 131.417145] bpf_task_storage_get+0x3e/0x2f0 > [ 131.417145] ? selinux_netlbl_socket_post_create+0xab/0x150 > [ 131.417145] bpf_prog_8c4f9bc79da6c27e_socket_post_create+0x60/0x6d > > > The stack dump works fine out of main prog and out of subprog. > > The key difference it to pretend to have stack_depth=0, > so there is no adjustment to %rsp, > but point %rbp to per-cpu private stack and grow it _up_. > > For the main prog %rbp points to the bottom of priv stack > plus stack_depth it needs, > so all bpf insns that do r10-off access the bottom of that priv stack. > When subprog is called it does 'add %rbp, its_stack_depth' and > in turn it's using memory above the bottom of the priv stack. > > That seems to work, but exceptions and tailcalls are broken. > I ran out of time today to debug. > Pls see the attached patch. The core part of the code is below: EMIT1(0x55); /* push rbp */ - EMIT3(0x48, 0x89, 0xE5); /* mov rbp, rsp */ + if (tail_call_reachable || !bpf_prog->aux->priv_stack_ptr) { + EMIT3(0x48, 0x89, 0xE5); /* mov rbp, rsp */ + } else { + if (!is_subprog) { + /* mov rsp, pcpu_priv_stack_bottom */ + void __percpu *priv_frame_ptr = + bpf_prog->aux->priv_stack_ptr + round_up(stack_depth, 8); + + /* movabs sp, priv_frame_ptr */ + emit_mov_imm64(&prog, AUX_REG, (long) priv_frame_ptr >> 32, + (u32) (long) priv_frame_ptr); + + /* add <aux_reg>, gs:[<off>] */ + EMIT2(0x65, 0x4c); + EMIT3(0x03, 0x1c, 0x25); + EMIT((u32)(unsigned long)&this_cpu_off, 4); + /* mov rbp, aux_reg */ + EMIT3(0x4c, 0x89, 0xdd); + } else { + /* add rbp, stack_depth */ + EMIT3_off32(0x48, 0x81, 0xC5, round_up(stack_depth, 8)); + } + } So for main program, we have push rbp rbp = per_cpu_ptr(priv_stack_ptr + stack_size) ... What will happen we have an interrupt like below? push rbp rbp = per_cpu_ptr(priv_stack_ptr + stack_size) <=== interrupt happens here ... If we need to dump the stack trace at interrupt point then unwinder may have difficulty to find the proper stack trace since *rbp is a arbitrary value and *(rbp + 8) will not have proper func return address. Does this make sense?
On Tue, Oct 8, 2024 at 11:31 PM Yonghong Song <yonghong.song@linux.dev> wrote: > > > On 10/8/24 7:06 PM, Alexei Starovoitov wrote: > > On Tue, Oct 8, 2024 at 3:10 PM Alexei Starovoitov > > <alexei.starovoitov@gmail.com> wrote: > >> We need to scrap this idea. > >> Let's go back to push/pop r11 around calls :( > > I didn't give up :) > > > > Here is a new idea that seems to work: > > > > [ 131.472066] dump_stack_lvl+0x53/0x70 > > [ 131.472066] bpf_task_storage_get+0x3e/0x2f0 > > [ 131.472066] ? bpf_task_storage_get+0x231/0x2f0 > > [ 131.472066] bpf_prog_ed7a5f33cc9fefab_foo+0x30/0x32 > > [ 131.472066] bpf_prog_8c4f9bc79da6c27e_socket_post_create+0x68/0x6d > > ... > > [ 131.417145] dump_stack_lvl+0x53/0x70 > > [ 131.417145] bpf_task_storage_get+0x3e/0x2f0 > > [ 131.417145] ? selinux_netlbl_socket_post_create+0xab/0x150 > > [ 131.417145] bpf_prog_8c4f9bc79da6c27e_socket_post_create+0x60/0x6d > > > > > > The stack dump works fine out of main prog and out of subprog. > > > > The key difference it to pretend to have stack_depth=0, > > so there is no adjustment to %rsp, > > but point %rbp to per-cpu private stack and grow it _up_. > > > > For the main prog %rbp points to the bottom of priv stack > > plus stack_depth it needs, > > so all bpf insns that do r10-off access the bottom of that priv stack. > > When subprog is called it does 'add %rbp, its_stack_depth' and > > in turn it's using memory above the bottom of the priv stack. > > > > That seems to work, but exceptions and tailcalls are broken. > > I ran out of time today to debug. > > Pls see the attached patch. > > The core part of the code is below: > > EMIT1(0x55); /* push rbp */ - EMIT3(0x48, 0x89, 0xE5); /* mov rbp, rsp > */ + if (tail_call_reachable || !bpf_prog->aux->priv_stack_ptr) { + > EMIT3(0x48, 0x89, 0xE5); /* mov rbp, rsp */ + } else { + if > (!is_subprog) { + /* mov rsp, pcpu_priv_stack_bottom */ + void __percpu > *priv_frame_ptr = + bpf_prog->aux->priv_stack_ptr + > round_up(stack_depth, 8); + + /* movabs sp, priv_frame_ptr */ + > emit_mov_imm64(&prog, AUX_REG, (long) priv_frame_ptr >> 32, + (u32) > (long) priv_frame_ptr); + + /* add <aux_reg>, gs:[<off>] */ + > EMIT2(0x65, 0x4c); + EMIT3(0x03, 0x1c, 0x25); + EMIT((u32)(unsigned > long)&this_cpu_off, 4); + /* mov rbp, aux_reg */ + EMIT3(0x4c, 0x89, > 0xdd); + } else { + /* add rbp, stack_depth */ + EMIT3_off32(0x48, 0x81, > 0xC5, round_up(stack_depth, 8)); + } + } your mailer garbled the diff. > So for main program, we have > > push rbp rbp = per_cpu_ptr(priv_stack_ptr + stack_size) ... What will > happen we have an interrupt like below? push rbp rbp = > per_cpu_ptr(priv_stack_ptr + stack_size) <=== interrupt happens here ... > If we need to dump the stack trace at interrupt point then unwinder may > have difficulty to find the proper stack trace since *rbp is a arbitrary > value and *(rbp + 8) will not have proper func return address. Does this > make sense? Hard to read above... but I think you're saying that rbp will point to priv stack, irq happens and unwinder cannot work ? Yes. I was also expecting it to break, but orc unwinder with fallback to fp somehow did it correctly. See above stack dumps. For the top frame the unwinder starts from SP, so it's fine, but for the subprog 'foo' above the 'push rbp' pushes the addr of priv stack, so the chain should be broken, but the printed stack is correct, so I'm puzzled why it worked :)
On 10/9/24 7:56 AM, Alexei Starovoitov wrote: > On Tue, Oct 8, 2024 at 11:31 PM Yonghong Song <yonghong.song@linux.dev> wrote: >> >> On 10/8/24 7:06 PM, Alexei Starovoitov wrote: >>> On Tue, Oct 8, 2024 at 3:10 PM Alexei Starovoitov >>> <alexei.starovoitov@gmail.com> wrote: >>>> We need to scrap this idea. >>>> Let's go back to push/pop r11 around calls :( >>> I didn't give up :) >>> >>> Here is a new idea that seems to work: >>> >>> [ 131.472066] dump_stack_lvl+0x53/0x70 >>> [ 131.472066] bpf_task_storage_get+0x3e/0x2f0 >>> [ 131.472066] ? bpf_task_storage_get+0x231/0x2f0 >>> [ 131.472066] bpf_prog_ed7a5f33cc9fefab_foo+0x30/0x32 >>> [ 131.472066] bpf_prog_8c4f9bc79da6c27e_socket_post_create+0x68/0x6d >>> ... >>> [ 131.417145] dump_stack_lvl+0x53/0x70 >>> [ 131.417145] bpf_task_storage_get+0x3e/0x2f0 >>> [ 131.417145] ? selinux_netlbl_socket_post_create+0xab/0x150 >>> [ 131.417145] bpf_prog_8c4f9bc79da6c27e_socket_post_create+0x60/0x6d >>> >>> >>> The stack dump works fine out of main prog and out of subprog. >>> >>> The key difference it to pretend to have stack_depth=0, >>> so there is no adjustment to %rsp, >>> but point %rbp to per-cpu private stack and grow it _up_. >>> >>> For the main prog %rbp points to the bottom of priv stack >>> plus stack_depth it needs, >>> so all bpf insns that do r10-off access the bottom of that priv stack. >>> When subprog is called it does 'add %rbp, its_stack_depth' and >>> in turn it's using memory above the bottom of the priv stack. >>> >>> That seems to work, but exceptions and tailcalls are broken. >>> I ran out of time today to debug. >>> Pls see the attached patch. >> The core part of the code is below: >> >> EMIT1(0x55); /* push rbp */ - EMIT3(0x48, 0x89, 0xE5); /* mov rbp, rsp >> */ + if (tail_call_reachable || !bpf_prog->aux->priv_stack_ptr) { + >> EMIT3(0x48, 0x89, 0xE5); /* mov rbp, rsp */ + } else { + if >> (!is_subprog) { + /* mov rsp, pcpu_priv_stack_bottom */ + void __percpu >> *priv_frame_ptr = + bpf_prog->aux->priv_stack_ptr + >> round_up(stack_depth, 8); + + /* movabs sp, priv_frame_ptr */ + >> emit_mov_imm64(&prog, AUX_REG, (long) priv_frame_ptr >> 32, + (u32) >> (long) priv_frame_ptr); + + /* add <aux_reg>, gs:[<off>] */ + >> EMIT2(0x65, 0x4c); + EMIT3(0x03, 0x1c, 0x25); + EMIT((u32)(unsigned >> long)&this_cpu_off, 4); + /* mov rbp, aux_reg */ + EMIT3(0x4c, 0x89, >> 0xdd); + } else { + /* add rbp, stack_depth */ + EMIT3_off32(0x48, 0x81, >> 0xC5, round_up(stack_depth, 8)); + } + } > your mailer garbled the diff. Sorry, I just copy-paste from your attached code. It shows properly when I send email. I guess, I need to ensure I use proper format in my editor. > >> So for main program, we have >> >> push rbp rbp = per_cpu_ptr(priv_stack_ptr + stack_size) ... What will >> happen we have an interrupt like below? push rbp rbp = >> per_cpu_ptr(priv_stack_ptr + stack_size) <=== interrupt happens here ... >> If we need to dump the stack trace at interrupt point then unwinder may >> have difficulty to find the proper stack trace since *rbp is a arbitrary >> value and *(rbp + 8) will not have proper func return address. Does this >> make sense? > Hard to read above... but I think you're saying that rbp will point Sorry again. Formating issue again. > to priv stack, irq happens and unwinder cannot work ? > Yes. I was also expecting it to break, but orc unwinder > with fallback to fp somehow did it correctly. See above stack dumps. > For the top frame the unwinder starts from SP, so it's fine, > but for the subprog 'foo' above the 'push rbp' pushes the > addr of priv stack, so the chain should be broken, > but the printed stack is correct, so I'm puzzled why it worked :) We still have issues here. With 'rbp = ...' approach, I got stack: [ 53.429814] Call Trace: [ 53.430177] <TASK> [ 53.430498] dump_stack_lvl+0x52/0x70 [ 53.431067] bpf_task_storage_get+0x41/0x120 [ 53.431680] bpf_prog_71392c3ef5437fd9_foo+0x30/0x32 [ 53.432404] bpf_prog_8c4f9bc79da6c27e_socket_post_create+0x68/0x6d [ 53.433241] ? bpf_trampoline_6442549714+0x68/0x10d [ 53.433879] ? bpf_lsm_socket_post_create+0x9/0x20 [ 53.434512] ? security_socket_post_create+0x6e/0xd0 [ 53.435166] ? __sock_create+0x19e/0x2d0 [ 53.435686] ? __sys_socket+0x56/0xd0 [ 53.436176] ? __x64_sys_socket+0x19/0x30 [ 53.436702] ? do_syscall_64+0x58/0xf0 [ 53.437201] ? clear_bhb_loop+0x45/0xa0 [ 53.437746] ? entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 53.438488] </TASK> With the original kernel plus the following hack: --- a/kernel/bpf/bpf_task_storage.c +++ b/kernel/bpf/bpf_task_storage.c @@ -255,6 +255,7 @@ BPF_CALL_5(bpf_task_storage_get, struct bpf_map *, map, struct task_struct *, if (flags & ~BPF_LOCAL_STORAGE_GET_F_CREATE || !task) return (unsigned long)NULL; + dump_stack(); bpf_task_storage_lock(); data = __bpf_task_storage_get(map, task, value, flags, gfp_flags, true); I got stack trace: [ 32.146519] Call Trace: [ 32.146979] <TASK> [ 32.147356] dump_stack_lvl+0x52/0x70 [ 32.147984] bpf_task_storage_get+0x41/0x120 [ 32.148741] bpf_prog_3c50a12b50fe949a_socket_post_create+0x5d/0xaa [ 32.149844] bpf_trampoline_6442512791+0x68/0x10d [ 32.150679] bpf_lsm_socket_post_create+0x9/0x20 [ 32.151451] security_socket_post_create+0x6e/0xd0 [ 32.152320] __sock_create+0x19e/0x2d0 [ 32.153059] __sys_socket+0x56/0xd0 [ 32.153779] __x64_sys_socket+0x19/0x30 [ 32.154561] do_syscall_64+0x58/0xf0 [ 32.155225] ? clear_bhb_loop+0x45/0xa0 [ 32.155970] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 32.156864] RIP: 0033:0x7f580d11385b [ 32.157554] Code: 8b 54 24 08 64 48 2b 14 25 28 00 00 00 75 05 48 83 c4 18 c3 67 e8 65 d0 00 00 0f 1f 44 00 00 f3 0f 1e fa b8 29 00 00 00 0f 05 <48> 3d 8 [ 32.160990] RSP: 002b:00007f58005ffea8 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 32.162500] RAX: ffffffffffffffda RBX: 00007f5800600cdc RCX: 00007f580d11385b [ 32.163907] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000002 [ 32.165292] RBP: 00007f58005ffed0 R08: 0000000000000000 R09: 00007f58006006c0 [ 32.166608] R10: 0000000000000008 R11: 0000000000000246 R12: ffffffffffffff80 [ 32.167898] R13: 0000000000000002 R14: 00007ffc461fba30 R15: 00007f57ffe00000 [ 32.169119] </TASK> The difference is after bpf prog, the kernel stack trace does not have '?' while with private stack and 'rbp = priv_stack_ptr' approach, we have '?'. The reason is that for private stack, when unwinder find the 'rbp', it is not able to find the previous frame return address and previous proper 'rbp'.
On Wed, 9 Oct 2024 at 04:06, Alexei Starovoitov <alexei.starovoitov@gmail.com> wrote: > > On Tue, Oct 8, 2024 at 3:10 PM Alexei Starovoitov > <alexei.starovoitov@gmail.com> wrote: > > > > We need to scrap this idea. > > Let's go back to push/pop r11 around calls :( > > I didn't give up :) > > Here is a new idea that seems to work: > > [ 131.472066] dump_stack_lvl+0x53/0x70 > [ 131.472066] bpf_task_storage_get+0x3e/0x2f0 > [ 131.472066] ? bpf_task_storage_get+0x231/0x2f0 > [ 131.472066] bpf_prog_ed7a5f33cc9fefab_foo+0x30/0x32 > [ 131.472066] bpf_prog_8c4f9bc79da6c27e_socket_post_create+0x68/0x6d > ... > [ 131.417145] dump_stack_lvl+0x53/0x70 > [ 131.417145] bpf_task_storage_get+0x3e/0x2f0 > [ 131.417145] ? selinux_netlbl_socket_post_create+0xab/0x150 > [ 131.417145] bpf_prog_8c4f9bc79da6c27e_socket_post_create+0x60/0x6d > > > The stack dump works fine out of main prog and out of subprog. > > The key difference it to pretend to have stack_depth=0, > so there is no adjustment to %rsp, > but point %rbp to per-cpu private stack and grow it _up_. > > For the main prog %rbp points to the bottom of priv stack > plus stack_depth it needs, > so all bpf insns that do r10-off access the bottom of that priv stack. > When subprog is called it does 'add %rbp, its_stack_depth' and > in turn it's using memory above the bottom of the priv stack. > > That seems to work, but exceptions and tailcalls are broken. I fixed exceptions, the reason it breaks is because we: We get rsp and rbp for the main frame from unwinding. rsp has undergone subtraction for: stack depth, push r12, push callee regs. When setting up the frame for exception cb, we need to pop saved registers from stack and then 'reset stack frame' using mov rsp, rbp. That effectively undoes the subtraction that happened for stack depth, and at this point rsp == rbp. Then the verifier will set up the frame for exception cb like it does normally for any prog: subtract stack depth, and push callee saved regs. Now all of this was ok before, but this patch makes two changes: stack_depth is not subtracted, and rbp is a per-cpu stack pointer. Therefore, at the top of the stack is just the callee saved regs and r12. After popping those, it will be equal to the original rbp which was overwritten with per-cpu stack pointer. Doing mov rsp, rbp for this patch will reset rsp to per-cpu stack pointer. Instead, we do mov rbp, rsp. This restores the rbp to kernel stack pointer, and then the subsequent leave etc. return control back into the kernel. At least this seems to make everything work fine, and things no longer crash, and it looks sane etc. I will dig into the tail call case a bit later, but most likely it's a variation of this problem. > I ran out of time today to debug. > Pls see the attached patch.
On Wed, 9 Oct 2024 at 18:36, Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: > > On Wed, 9 Oct 2024 at 04:06, Alexei Starovoitov > <alexei.starovoitov@gmail.com> wrote: > > > > On Tue, Oct 8, 2024 at 3:10 PM Alexei Starovoitov > > <alexei.starovoitov@gmail.com> wrote: > > > > > > We need to scrap this idea. > > > Let's go back to push/pop r11 around calls :( > > > > I didn't give up :) > > > > Here is a new idea that seems to work: > > > > [ 131.472066] dump_stack_lvl+0x53/0x70 > > [ 131.472066] bpf_task_storage_get+0x3e/0x2f0 > > [ 131.472066] ? bpf_task_storage_get+0x231/0x2f0 > > [ 131.472066] bpf_prog_ed7a5f33cc9fefab_foo+0x30/0x32 > > [ 131.472066] bpf_prog_8c4f9bc79da6c27e_socket_post_create+0x68/0x6d > > ... > > [ 131.417145] dump_stack_lvl+0x53/0x70 > > [ 131.417145] bpf_task_storage_get+0x3e/0x2f0 > > [ 131.417145] ? selinux_netlbl_socket_post_create+0xab/0x150 > > [ 131.417145] bpf_prog_8c4f9bc79da6c27e_socket_post_create+0x60/0x6d > > > > > > The stack dump works fine out of main prog and out of subprog. > > > > The key difference it to pretend to have stack_depth=0, > > so there is no adjustment to %rsp, > > but point %rbp to per-cpu private stack and grow it _up_. > > > > For the main prog %rbp points to the bottom of priv stack > > plus stack_depth it needs, > > so all bpf insns that do r10-off access the bottom of that priv stack. > > When subprog is called it does 'add %rbp, its_stack_depth' and > > in turn it's using memory above the bottom of the priv stack. > > > > That seems to work, but exceptions and tailcalls are broken. > > I fixed exceptions, the reason it breaks is because we: > We get rsp and rbp for the main frame from unwinding. > rsp has undergone subtraction for: stack depth, push r12, push callee regs. > > When setting up the frame for exception cb, we need to pop saved > registers from stack and then 'reset stack frame' using mov rsp, rbp. > That effectively undoes the subtraction that happened for stack depth, > and at this point rsp == rbp. Then the verifier will set up the frame > for exception cb like it does normally for any prog: subtract stack > depth, and push callee saved regs. > > Now all of this was ok before, but this patch makes two changes: > stack_depth is not subtracted, and rbp is a per-cpu stack pointer. > > Therefore, at the top of the stack is just the callee saved regs and r12. > After popping those, it will be equal to the original rbp which was > overwritten with per-cpu stack pointer. > > Doing mov rsp, rbp for this patch will reset rsp to per-cpu stack > pointer. Instead, we do mov rbp, rsp. This restores the rbp to kernel > stack pointer, and then the subsequent leave etc. return control back > into the kernel. > > At least this seems to make everything work fine, and things no longer > crash, and it looks sane etc. > > I will dig into the tail call case a bit later, but most likely it's a > variation of this problem. FYI, this is the fix. diff --git a/arch/x86/net/bpf_jit_comp.c b/arch/x86/net/bpf_jit_comp.c index 268f7d37466c..02267adee14b 100644 --- a/arch/x86/net/bpf_jit_comp.c +++ b/arch/x86/net/bpf_jit_comp.c @@ -523,7 +523,7 @@ static void emit_prologue(struct bpf_prog *bpf_prog, u8 **pprog, u32 stack_depth pop_callee_regs(&prog, all_callee_regs_used); pop_r12(&prog); /* Reset the stack frame. */ - EMIT3(0x48, 0x89, 0xEC); /* mov rsp, rbp */ + EMIT3(0x48, 0x89, 0xE5); /* mov rbp, rsp */ } else { EMIT1(0x55); /* push rbp */ if (tail_call_reachable || !bpf_prog->aux->priv_stack_ptr) { > > > I ran out of time today to debug. > > Pls see the attached patch.
On Wed, 9 Oct 2024 at 18:38, Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: > > On Wed, 9 Oct 2024 at 18:36, Kumar Kartikeya Dwivedi <memxor@gmail.com> wrote: > > > > On Wed, 9 Oct 2024 at 04:06, Alexei Starovoitov > > <alexei.starovoitov@gmail.com> wrote: > > > > > > On Tue, Oct 8, 2024 at 3:10 PM Alexei Starovoitov > > > <alexei.starovoitov@gmail.com> wrote: > > > > > > > > We need to scrap this idea. > > > > Let's go back to push/pop r11 around calls :( > > > > > > I didn't give up :) > > > > > > Here is a new idea that seems to work: > > > > > > [ 131.472066] dump_stack_lvl+0x53/0x70 > > > [ 131.472066] bpf_task_storage_get+0x3e/0x2f0 > > > [ 131.472066] ? bpf_task_storage_get+0x231/0x2f0 > > > [ 131.472066] bpf_prog_ed7a5f33cc9fefab_foo+0x30/0x32 > > > [ 131.472066] bpf_prog_8c4f9bc79da6c27e_socket_post_create+0x68/0x6d > > > ... > > > [ 131.417145] dump_stack_lvl+0x53/0x70 > > > [ 131.417145] bpf_task_storage_get+0x3e/0x2f0 > > > [ 131.417145] ? selinux_netlbl_socket_post_create+0xab/0x150 > > > [ 131.417145] bpf_prog_8c4f9bc79da6c27e_socket_post_create+0x60/0x6d > > > > > > > > > The stack dump works fine out of main prog and out of subprog. > > > > > > The key difference it to pretend to have stack_depth=0, > > > so there is no adjustment to %rsp, > > > but point %rbp to per-cpu private stack and grow it _up_. > > > > > > For the main prog %rbp points to the bottom of priv stack > > > plus stack_depth it needs, > > > so all bpf insns that do r10-off access the bottom of that priv stack. > > > When subprog is called it does 'add %rbp, its_stack_depth' and > > > in turn it's using memory above the bottom of the priv stack. > > > > > > That seems to work, but exceptions and tailcalls are broken. > > > > I fixed exceptions, the reason it breaks is because we: > > We get rsp and rbp for the main frame from unwinding. > > rsp has undergone subtraction for: stack depth, push r12, push callee regs. > > > > When setting up the frame for exception cb, we need to pop saved > > registers from stack and then 'reset stack frame' using mov rsp, rbp. > > That effectively undoes the subtraction that happened for stack depth, > > and at this point rsp == rbp. Then the verifier will set up the frame > > for exception cb like it does normally for any prog: subtract stack > > depth, and push callee saved regs. > > > > Now all of this was ok before, but this patch makes two changes: > > stack_depth is not subtracted, and rbp is a per-cpu stack pointer. > > > > Therefore, at the top of the stack is just the callee saved regs and r12. > > After popping those, it will be equal to the original rbp which was > > overwritten with per-cpu stack pointer. > > > > Doing mov rsp, rbp for this patch will reset rsp to per-cpu stack > > pointer. Instead, we do mov rbp, rsp. This restores the rbp to kernel > > stack pointer, and then the subsequent leave etc. return control back > > into the kernel. > > > > At least this seems to make everything work fine, and things no longer > > crash, and it looks sane etc. > > > > I will dig into the tail call case a bit later, but most likely it's a > > variation of this problem. > > FYI, this is the fix. > > diff --git a/arch/x86/net/bpf_jit_comp.c b/arch/x86/net/bpf_jit_comp.c > index 268f7d37466c..02267adee14b 100644 > --- a/arch/x86/net/bpf_jit_comp.c > +++ b/arch/x86/net/bpf_jit_comp.c > @@ -523,7 +523,7 @@ static void emit_prologue(struct bpf_prog > *bpf_prog, u8 **pprog, u32 stack_depth > pop_callee_regs(&prog, all_callee_regs_used); > pop_r12(&prog); > /* Reset the stack frame. */ > - EMIT3(0x48, 0x89, 0xEC); /* mov rsp, rbp */ > + EMIT3(0x48, 0x89, 0xE5); /* mov rbp, rsp */ > } else { > EMIT1(0x55); /* push rbp */ > if (tail_call_reachable || !bpf_prog->aux->priv_stack_ptr) { > > > Figured out the problem with tail calls as well. It was actually incorrect X86_TAIL_CALL_OFFSET, since a tail call target using private stack will emit different instructions (to set up private stack) now. When it is actually called it has to skip over all that stuff, but the offset to skip past the endbr is incorrect now. Figured out since the page fault was happening to access the address equal to per-cpu offset (say X) and the faulting instruction was in the middle of add r11, gs:X. Calculation is: 5 for emit_nops, 3 for emit_nops of 3 bytes (for alignment), 1 for push rbp, and 22 bytes for the sequence to set up the private stack. This, + ENDBR_INSN_SIZE. diff --git a/arch/x86/net/bpf_jit_comp.c b/arch/x86/net/bpf_jit_comp.c index 268f7d37466c..004e3ba1d338 100644 --- a/arch/x86/net/bpf_jit_comp.c +++ b/arch/x86/net/bpf_jit_comp.c @@ -323,7 +323,7 @@ struct jit_context { /* Number of bytes emit_patch() needs to generate instructions */ #define X86_PATCH_SIZE 5 /* Number of bytes that will be skipped on tailcall */ -#define X86_TAIL_CALL_OFFSET (12 + ENDBR_INSN_SIZE) +#define X86_TAIL_CALL_OFFSET (5 + 3 + 1 + 22 + ENDBR_INSN_SIZE) static void push_r12(u8 **pprog) { > > > I ran out of time today to debug. > > > Pls see the attached patch.
diff --git a/arch/x86/net/bpf_jit_comp.c b/arch/x86/net/bpf_jit_comp.c index 06b080b61aa5..c264822c926b 100644 --- a/arch/x86/net/bpf_jit_comp.c +++ b/arch/x86/net/bpf_jit_comp.c @@ -325,6 +325,22 @@ struct jit_context { /* Number of bytes that will be skipped on tailcall */ #define X86_TAIL_CALL_OFFSET (12 + ENDBR_INSN_SIZE) +static void push_r9(u8 **pprog) +{ + u8 *prog = *pprog; + + EMIT2(0x41, 0x51); /* push r9 */ + *pprog = prog; +} + +static void pop_r9(u8 **pprog) +{ + u8 *prog = *pprog; + + EMIT2(0x41, 0x59); /* pop r9 */ + *pprog = prog; +} + static void push_r12(u8 **pprog) { u8 *prog = *pprog; @@ -491,7 +507,7 @@ static void emit_prologue_tail_call(u8 **pprog, bool is_subprog) */ static void emit_prologue(u8 **pprog, u32 stack_depth, bool ebpf_from_cbpf, bool tail_call_reachable, bool is_subprog, - bool is_exception_cb) + bool is_exception_cb, enum bpf_pstack_state pstack) { u8 *prog = *pprog; @@ -518,6 +534,8 @@ static void emit_prologue(u8 **pprog, u32 stack_depth, bool ebpf_from_cbpf, * first restore those callee-saved regs from stack, before * reusing the stack frame. */ + if (pstack) + pop_r9(&prog); pop_callee_regs(&prog, all_callee_regs_used); pop_r12(&prog); /* Reset the stack frame. */ @@ -1404,6 +1422,22 @@ static void emit_shiftx(u8 **pprog, u32 dst_reg, u8 src_reg, bool is64, u8 op) *pprog = prog; } +static void emit_private_frame_ptr(u8 **pprog, void *private_frame_ptr) +{ + u8 *prog = *pprog; + + /* movabs r9, private_frame_ptr */ + emit_mov_imm64(&prog, X86_REG_R9, (long) private_frame_ptr >> 32, + (u32) (long) private_frame_ptr); + + /* add <r9>, gs:[<off>] */ + EMIT2(0x65, 0x4c); + EMIT3(0x03, 0x0c, 0x25); + EMIT((u32)(unsigned long)&this_cpu_off, 4); + + *pprog = prog; +} + #define INSN_SZ_DIFF (((addrs[i] - addrs[i - 1]) - (prog - temp))) #define __LOAD_TCC_PTR(off) \ @@ -1421,20 +1455,31 @@ static int do_jit(struct bpf_prog *bpf_prog, int *addrs, u8 *image, u8 *rw_image int insn_cnt = bpf_prog->len; bool seen_exit = false; u8 temp[BPF_MAX_INSN_SIZE + BPF_INSN_SAFETY]; + void __percpu *private_frame_ptr = NULL; u64 arena_vm_start, user_vm_start; + u32 orig_stack_depth, stack_depth; int i, excnt = 0; int ilen, proglen = 0; u8 *prog = temp; int err; + stack_depth = bpf_prog->aux->stack_depth; + orig_stack_depth = round_up(stack_depth, 8); + if (bpf_prog->pstack) { + stack_depth = 0; + if (bpf_prog->pstack == PSTACK_TREE_ROOT) + private_frame_ptr = bpf_prog->private_stack_ptr + orig_stack_depth; + } + arena_vm_start = bpf_arena_get_kern_vm_start(bpf_prog->aux->arena); user_vm_start = bpf_arena_get_user_vm_start(bpf_prog->aux->arena); detect_reg_usage(insn, insn_cnt, callee_regs_used); - emit_prologue(&prog, bpf_prog->aux->stack_depth, + emit_prologue(&prog, stack_depth, bpf_prog_was_classic(bpf_prog), tail_call_reachable, - bpf_is_subprog(bpf_prog), bpf_prog->aux->exception_cb); + bpf_is_subprog(bpf_prog), bpf_prog->aux->exception_cb, + bpf_prog->pstack); /* Exception callback will clobber callee regs for its own use, and * restore the original callee regs from main prog's stack frame. */ @@ -1454,6 +1499,17 @@ static int do_jit(struct bpf_prog *bpf_prog, int *addrs, u8 *image, u8 *rw_image emit_mov_imm64(&prog, X86_REG_R12, arena_vm_start >> 32, (u32) arena_vm_start); + if (bpf_prog->pstack == PSTACK_TREE_ROOT) { + emit_private_frame_ptr(&prog, private_frame_ptr); + } else if (bpf_prog->pstack == PSTACK_TREE_INTERNAL && orig_stack_depth) { + /* r9 += orig_stack_depth */ + maybe_emit_1mod(&prog, X86_REG_R9, true); + if (is_imm8(orig_stack_depth)) + EMIT3(0x83, add_1reg(0xC0, X86_REG_R9), orig_stack_depth); + else + EMIT2_off32(0x81, add_1reg(0xC0, X86_REG_R9), orig_stack_depth); + } + ilen = prog - temp; if (rw_image) memcpy(rw_image + proglen, temp, ilen); @@ -1473,6 +1529,14 @@ static int do_jit(struct bpf_prog *bpf_prog, int *addrs, u8 *image, u8 *rw_image u8 *func; int nops; + if (bpf_prog->pstack) { + if (src_reg == BPF_REG_FP) + src_reg = X86_REG_R9; + + if (dst_reg == BPF_REG_FP) + dst_reg = X86_REG_R9; + } + switch (insn->code) { /* ALU */ case BPF_ALU | BPF_ADD | BPF_X: @@ -2128,14 +2192,20 @@ st: if (is_imm8(insn->off)) func = (u8 *) __bpf_call_base + imm32; if (tail_call_reachable) { - LOAD_TAIL_CALL_CNT_PTR(bpf_prog->aux->stack_depth); + LOAD_TAIL_CALL_CNT_PTR(stack_depth); ip += 7; } if (!imm32) return -EINVAL; + if (bpf_prog->pstack) { + push_r9(&prog); + ip += 2; + } ip += x86_call_depth_emit_accounting(&prog, func, ip); if (emit_call(&prog, func, ip)) return -EINVAL; + if (bpf_prog->pstack) + pop_r9(&prog); break; } @@ -2145,13 +2215,13 @@ st: if (is_imm8(insn->off)) &bpf_prog->aux->poke_tab[imm32 - 1], &prog, image + addrs[i - 1], callee_regs_used, - bpf_prog->aux->stack_depth, + stack_depth, ctx); else emit_bpf_tail_call_indirect(bpf_prog, &prog, callee_regs_used, - bpf_prog->aux->stack_depth, + stack_depth, image + addrs[i - 1], ctx); break; @@ -3559,6 +3629,11 @@ bool bpf_jit_supports_exceptions(void) return IS_ENABLED(CONFIG_UNWINDER_ORC); } +bool bpf_jit_supports_private_stack(void) +{ + return true; +} + void arch_bpf_stack_walk(bool (*consume_fn)(void *cookie, u64 ip, u64 sp, u64 bp), void *cookie) { #if defined(CONFIG_UNWINDER_ORC)
Add jit support for private stack. For a particular subtree, e.g., subtree_root <== stack depth 120 subprog1 <== stack depth 80 subprog2 <== stack depth 40 subprog3 <== stack depth 160 Let us say that private_stack_ptr is the memory address allocated for private stack. The frame pointer for each above is calculated like below: subtree_root <== subtree_root_fp = private_stack_ptr + 120 subprog1 <== subtree_subprog1_fp = subtree_root_fp + 80 subprog2 <== subtree_subprog2_fp = subtree_subprog1_fp + 40 subprog3 <== subtree_subprog1_fp = subtree_root_fp + 160 For any function call to helper/kfunc, push/pop prog frame pointer is needed in order to preserve frame pointer value. To deal with exception handling, push/pop frame pointer is also used surrounding call to subsequent subprog. For example, subtree_root subprog1 ... insn: call bpf_throw ... After jit, we will have subtree_root insn: push r9 subprog1 ... insn: push r9 insn: call bpf_throw insn: pop r9 ... insn: pop r9 exception_handler pop r9 ... where r9 represents the fp for each subprog. Signed-off-by: Yonghong Song <yonghong.song@linux.dev> --- arch/x86/net/bpf_jit_comp.c | 87 ++++++++++++++++++++++++++++++++++--- 1 file changed, 81 insertions(+), 6 deletions(-)