From patchwork Tue May 30 14:04:01 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Russell King (Oracle)" X-Patchwork-Id: 13260158 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 06F1DC77B73 for ; Tue, 30 May 2023 14:07:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-ID:Subject:Cc:To: From:Date:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=fNTFHQBrgbpjPEw6omNcNRb3j0pztOhYY1MUy3pMm1A=; b=h/5lbnuvmot/fW 2NFGnYNmcq0fkOhG1ebPQikOOpSenav2qmq21fOtWqwQX+hwZIgl3vu9D+13ulProBennIRiP43tJ zjsSPeydKR8e5hXePOZ2vWmi04vdpaMOmhssQp1lax5qeBod/XgFWOC40pGwddK2zIeISTUwoOeQt N+9wXRetVM41hZt6u5pIKazIG6wl2tP7C58n7KGML/0HD0Fy48Px1Q52ygGuvh45+xUufxXJFo5vh nX9uKL02Q+ez9A9Q3SgENWcrUHiEri6zFWzuRvjKPTrn0JeriMVuy68REQbusH4Q6JceF6srkrjyh Ttne2TSqt/dQdeiCQiqQ==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.96 #2 (Red Hat Linux)) id 1q400D-00EAKV-12; Tue, 30 May 2023 14:07:09 +0000 Received: from pandora.armlinux.org.uk ([2001:4d48:ad52:32c8:5054:ff:fe00:142]) by bombadil.infradead.org with esmtps (Exim 4.96 #2 (Red Hat Linux)) id 1q3zzM-00E8zX-2M for linux-arm-kernel@lists.infradead.org; Tue, 30 May 2023 14:06:18 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=armlinux.org.uk; s=pandora-2019; h=Sender:Content-Type:MIME-Version: Message-ID:Subject:Cc:To:From:Date:Reply-To:Content-Transfer-Encoding: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=DefNWfGPPtjXEyFLYdRAxeV7Icph8nveGqgPAWO7xRk=; b=njRcdEuZrHUNH8EBTjeNlN9sRq rsbQkPSSWyhcw4wCFreHsbuJN7m+oOLoBHmcTGso4U4eEc0fnu6t/FijQmrZL3UjwTQFenIoxZvQC AG7XOY1YyCE38BbthsT38yK1ubZSCTJZBpBPW2ZGcTFFqsbg8RwSTgGT0q/zYVcgYXM5pT2vMng07 zHANqdAs0dTxWWJcKW1/6Qp72SRmHCLaCzALoNu44aFTd6tD9/Ogr8smszvo36Pd0AREFz6x1EsMw C9C3eIRw1QYCQj3eTZiuHqhN6717yc5ygEjg4HJX02BoodjUVwbojMVO9oV4KaYvnQ9NC5dIXISkb YvwBrKTg==; Received: from shell.armlinux.org.uk ([fd8f:7570:feb6:1:5054:ff:fe00:4ec]:51960) by pandora.armlinux.org.uk with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1q3zxF-0002pY-K8; Tue, 30 May 2023 15:04:05 +0100 Received: from linux by shell.armlinux.org.uk with local (Exim 4.94.2) (envelope-from ) id 1q3zxB-00085V-Ob; Tue, 30 May 2023 15:04:01 +0100 Date: Tue, 30 May 2023 15:04:01 +0100 From: "Russell King (Oracle)" To: Catalin Marinas , Jonathan Corbet , Will Deacon Cc: linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org Subject: [PATCH RFC 00/17] arm64 kernel text replication Message-ID: MIME-Version: 1.0 Content-Disposition: inline X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20230530_070616_914622_33AABC32 X-CRM114-Status: GOOD ( 39.44 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Problem ------- NUMA systems have greater latency when accessing data and instructions across nodes, which can lead to a reduction in performance on CPU cores that mainly perform accesses beyond their local node. Normally when an ARM64 system boots, the kernel will end up placed in memory, and each CPU core will have to fetch instructions and data from which ever NUMA node the kernel has been placed. This means that while executing kernel code, CPUs local to that node will run faster than CPUs in remote nodes. The higher the latency to access remote NUMA node memory, the more the kernel performance suffers on those nodes. If there is a local copy of the kernel text in each node's RAM, and each node runs the kernel using its local copy of the kernel text, then it stands to reason that the kernel will run faster due to fewer stalls while instructions are fetched from remote memory. The question then arises how to achieve this. Background ---------- An important issue to contend with is what happens when a thread migrates between nodes. Essentially, the thread's state (including instruction pointer) is saved to memory, and the scheduler on that CPU loads some other thread's state and that CPU resumes executing that new thread. The CPU gaining the migrating thread loads the saved state, again including the instruction pointer, and the gaining CPU resumes fetching instructions at the virtual address where the original CPU left off. The key point is that the virtual address is what matters here, and this gives us a way to implement kernel text replication fairly easily. At a practical level, all we need to do is to ensure that the virtual addresses which contain the kernel text point to a local copy of the that text. This is exactly how this proposal of kernel text replication achieves the replication. We can go a little bit further and include most of the read-only data in this replication, as that will never be written to by the kernel (and thus remains constant.) Solution -------- So, what we need to achieve is: 1. multiple identical copies of the kernel text (and read-only data) 2. point the virtual mappings to the appropriate copy of kernel text for the NUMA node. (1) is fairly easy to achieve - we just need to allocate some memory in the appropriate node and copy the parts of the kernel we want to replicate. However, we also need to deal with ARM64's kernel patching. There are two functions that patch the kernel text, __apply_alternatives() and aarch64_insn_patch_text_nosync(). Both of these need to to be modified to update all copies of the kernel text. (2) is slightly harder. Firstly, the aarch64 architecture has a very useful feature here - the kernel page tables are entirely separate from the user page tables. The hardware contains two page table pointers, one is used for user mappings, the other is used for kernel mappings. Therefore, we only have one page table to be concerned with: the table which maps kernel space. We do not need to be concerned with each user processes page table. The approach taken here is to ensure that the kernel is located in an area of kernel virtual address space covered by a level-0 page table entry which is not shared with any other user. We can then maintain separate per-node level-0 page tables for kernel space where the only difference between them is this level-0 page table entry. This gives a couple of benefits. Firstly, when updates to the level-0 page table happen (e.g. when establishing new mappings) these updates can simply be copied to the other level-0 page tables provided it isn't for the kernel image. Secondly, we don't need complexity at lower levels of the page table code to figure out whether a level-1 or lower update needs to be propagated to other nodes. The level-0 page table entry for the kernel can then be used to point at a node-unique set of level 1..N page tables to make the appropriate copy of the kernel text (and read-only data) into kernel space, while keeping the kernel read-write data shared between nodes. Performance Analysis -------------------- Needless to say, the performance results from kernel text replication are workload specific, but appear to show a gain of between 6% and 17% for database-centric like workloads. When combined with userspace awareness of NUMA, this can result in a gain of over 50%. Problems -------- There are a few areas that are a problem for kernel text replication: 1) As this series changes the kernel space virtual address space layout, it breaks KASAN - and I've zero knowledge of KASAN so I have no idea how to fix it. I would be grateful for input from KASAN folk for suggestions how to fix this. 2) KASLR can not be used with kernel text replication, since we need to place the kernel in its own L0 page table entry, not in vmalloc space. KASLR is disabled when support for kernel text replication is enabled. 3) Changing the kernel virtual address space layout also means that kaslr_offset() and kaslr_enabled() need to become macros rather than inline functions due to the use of PGDIR_SIZE in the calculation of KIMAGE_VADDR. Since asm/pgtable.h defines this constant, but asm/memory.h is included by asm/pgtable.h, having this symbol available would produce a circular include dependency, so I don't think there is any choice here. 4) read-only protection for replicated kernel images is not yet implemented. Patch overview: Patch 1 cleans up the rox page protection logic. Patch 2 reoganises the kernel virtual address space layout (causing problems (1 and 3). Patch 3 provides a version of cpu_replace_ttbr1 that takes physical addresses. Patch 4 makes a needed cache flushing function visible. Patch 5 through 16 are the guts of kernel text replication. Patch 17 adds the Kconfig entry for it. Further patches not included in this set add a Kconfig for the default state, a test module, and add code to verify the replicated kernel text matches the node 0 text after the kernel has completed most of its boot. Documentation/admin-guide/kernel-parameters.txt | 5 + arch/arm64/Kconfig | 10 +- arch/arm64/include/asm/cacheflush.h | 2 + arch/arm64/include/asm/ktext.h | 45 ++++++ arch/arm64/include/asm/memory.h | 26 ++-- arch/arm64/include/asm/mmu_context.h | 12 +- arch/arm64/include/asm/pgtable.h | 35 ++++- arch/arm64/include/asm/smp.h | 1 + arch/arm64/kernel/alternative.c | 4 +- arch/arm64/kernel/asm-offsets.c | 1 + arch/arm64/kernel/cpufeature.c | 2 +- arch/arm64/kernel/head.S | 3 +- arch/arm64/kernel/hibernate.c | 2 +- arch/arm64/kernel/patching.c | 7 +- arch/arm64/kernel/smp.c | 3 + arch/arm64/kernel/suspend.c | 3 +- arch/arm64/kernel/vmlinux.lds.S | 3 + arch/arm64/mm/Makefile | 2 + arch/arm64/mm/init.c | 3 + arch/arm64/mm/ktext.c | 198 ++++++++++++++++++++++++ arch/arm64/mm/mmu.c | 85 ++++++++-- 21 files changed, 413 insertions(+), 39 deletions(-) create mode 100644 arch/arm64/include/asm/ktext.h create mode 100644 arch/arm64/mm/ktext.c