From patchwork Sun May 5 16:06:12 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mike Rapoport X-Patchwork-Id: 13654462 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id BE083C4345F for ; Sun, 5 May 2024 16:06:53 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id EF7116B007B; Sun, 5 May 2024 12:06:52 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id EA7456B0082; Sun, 5 May 2024 12:06:52 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id D46C66B0083; Sun, 5 May 2024 12:06:52 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id B6FD56B007B for ; Sun, 5 May 2024 12:06:52 -0400 (EDT) Received: from smtpin09.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay03.hostedemail.com (Postfix) with ESMTP id 5F329A04CE for ; Sun, 5 May 2024 16:06:52 +0000 (UTC) X-FDA: 82084820664.09.39ED9B7 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf23.hostedemail.com (Postfix) with ESMTP id B02CD14000E for ; Sun, 5 May 2024 16:06:49 +0000 (UTC) Authentication-Results: imf23.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=Z2Fuzi2z; dmarc=pass (policy=none) header.from=kernel.org; spf=pass (imf23.hostedemail.com: domain of rppt@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=rppt@kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1714925209; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=WinMMJ57RVFFg5z90QZE9zFA19fr32T8Tcd45ACCkRg=; b=CFIo2lnnaT7t+U973blHguxIRaFZOYaLJdjQIAz+KxFusIm7DXQwIg4/Pro/6Zc6hzme+Q xK3s6S9W7TkmG//GFEPCx6ljnj0D+10mp4fH1xgNLMd2jKvHOGpQ4UuJU13CTQz6SVOFyF nEHDI76B9bgkU4JdxhgwkUwIlHuRRG0= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1714925209; a=rsa-sha256; cv=none; b=neV5VD8FiHskibhGItft48CaxhfYn0Bul9dKeAZ7ojRLW9azLtNwnDtoasI/as8Au3Y7zS hbWY6/ZK/Yi7fbs77eqA7pTFbQAoIDdZACPfvuXLgxI7zpOKIh/K4ixv+qwLJaIctn/592 AqOGFG7CjjBGXAIUJv6dRZiIcM0snMM= ARC-Authentication-Results: i=1; imf23.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=Z2Fuzi2z; dmarc=pass (policy=none) header.from=kernel.org; spf=pass (imf23.hostedemail.com: domain of rppt@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=rppt@kernel.org Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by dfw.source.kernel.org (Postfix) with ESMTP id 4CC4160CBB; Sun, 5 May 2024 16:06:48 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id A527DC113CC; Sun, 5 May 2024 16:06:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1714925208; bh=ma52+kOGR8BoTFt+jRPpzVRKHhnjtNWPCw/mk7qZ6UE=; h=From:To:Cc:Subject:Date:From; b=Z2Fuzi2zchHVXKt4aoKvmzAEbJNoXwo6q9Nn7mdMxgFBIQWdVlZYgEYAod7P46gMF OzBFhz6SdFlp1z6xUeS83OFy5jPbLCSu5T/s2t0c0PoQZzN+rRfQwMPV4M2zRiHkFm R98ifaZ5DWn/dZzCjt3+XT0++Ea48zsEF9nRKkT21IiyohDQT7uGks8NsuIXAxKtYl mrFQBQpEnnbzu1fhDmdTDql2MJJgXQJSMUjaMsV+oD65mPUqMDYfqPdFPaWFWHzrx/ NQPISh9+r6uwk6uQNkF+szqie5FSEtecDF12gTgS74gVY7w89/fkPMioRlivV+IDbW 2DJCzu0yZyq2Q== From: Mike Rapoport To: linux-kernel@vger.kernel.org Cc: Alexandre Ghiti , Andrew Morton , =?utf-8?b?QmrDtnJuIFTDtnBlbA==?= , Catalin Marinas , Christophe Leroy , "David S. Miller" , Dinh Nguyen , Donald Dutile , Eric Chanudet , Heiko Carstens , Helge Deller , Huacai Chen , Kent Overstreet , Liviu Dudau , Luis Chamberlain , Mark Rutland , Masami Hiramatsu , Michael Ellerman , Mike Rapoport , Nadav Amit , Palmer Dabbelt , Peter Zijlstra , =?utf-8?q?Philippe_Mathieu-Daud?= =?utf-8?q?=C3=A9?= , Rick Edgecombe , Russell King , Sam Ravnborg , Song Liu , Steven Rostedt , Thomas Bogendoerfer , Thomas Gleixner , Will Deacon , bpf@vger.kernel.org, linux-arch@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-mips@vger.kernel.org, linux-mm@kvack.org, linux-modules@vger.kernel.org, linux-parisc@vger.kernel.org, linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org, linux-trace-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, loongarch@lists.linux.dev, netdev@vger.kernel.org, sparclinux@vger.kernel.org, x86@kernel.org Subject: [PATCH RESEND v8 00/16] mm: jit/text allocator Date: Sun, 5 May 2024 19:06:12 +0300 Message-ID: <20240505160628.2323363-1-rppt@kernel.org> X-Mailer: git-send-email 2.43.0 MIME-Version: 1.0 X-Rspamd-Queue-Id: B02CD14000E X-Rspam-User: X-Rspamd-Server: rspam03 X-Stat-Signature: bkncejhqphz6i16r7934jnw3fh9jgncn X-HE-Tag: 1714925209-262728 X-HE-Meta: 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 v5GKSTUL /biGbjt8NJXJxcdRfbcj29VUafmSbZ6DfPGLn3h7Xu+xSWz3oFwom4ptwUsy5EUerTcjVoOpv/xLugUlJiUZeDPn6ZXcRVNJJ2scDGG9359okSseoZYahbzyWmibmlFf9JUu6GnudMBvqHfbXx0NVwWbgz8NT9GAWyxFuY1CiFUODUu5XAdex2mTGdJQGLo3elc0spqsy1190lu+v+tBTYGnpvClg7NeF8IloR4aZeAh6OKBmAEe7jYRK6WUiQ6AtSLQjM8JwSmDqQwQicoQMEPJ7L7S40+i8oLOdy0PI6Lvz06QmRkrwIefRE8JSVUPR8jOtslMRjrVmzcPKNVgdZbQXD0aEVkLB14lk/+I0p54gBXXgSncSvsLWzeKs+Lxa5vyz3yDIuhJh0zJtFVahPk8idOuM8v5PtzxAMwJCi6JvVytN1iB87Z3e5DT16I2RxhNl X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: From: "Mike Rapoport (IBM)" Hi, The patches are also available in git: https://git.kernel.org/pub/scm/linux/kernel/git/rppt/linux.git/log/?h=execmem/v8 v8: * fix intialization of default_execmem_info v7: https://lore.kernel.org/all/20240429121620.1186447-1-rppt@kernel.org * define MODULE_{VADDR,END} for riscv32 to fix the build and avoid #ifdefs in a function body * add Acks, thanks everybody v6: https://lore.kernel.org/all/20240426082854.7355-1-rppt@kernel.org * restore patch "arm64: extend execmem_info for generated code allocations" that disappeared in v5 rebase * update execmem initialization so that by default it will be initialized early while late initialization will be an opt-in v5: https://lore.kernel.org/all/20240422094436.3625171-1-rppt@kernel.org * rebase on v6.9-rc4 to avoid a conflict in kprobes * add copyrights to mm/execmem.c (Luis) * fix spelling (Ingo) * define MODULES_VADDDR for sparc (Sam) * consistently initialize struct execmem_info (Peter) * reduce #ifdefs in function bodies in kprobes (Masami) v4: https://lore.kernel.org/all/20240411160051.2093261-1-rppt@kernel.org * rebase on v6.9-rc2 * rename execmem_params to execmem_info and execmem_arch_params() to execmem_arch_setup() * use single execmem_alloc() API instead of execmem_{text,data}_alloc() (Song) * avoid extra copy of execmem parameters (Rick) * run execmem_init() as core_initcall() except for the architectures that may allocated text really early (currently only x86) (Will) * add acks for some of arm64 and riscv changes, thanks Will and Alexandre * new commits: - drop call to kasan_alloc_module_shadow() on arm64 because it's not needed anymore - rename MODULE_START to MODULES_VADDR on MIPS - use CONFIG_EXECMEM instead of CONFIG_MODULES on powerpc as per Christophe: https://lore.kernel.org/all/79062fa3-3402-47b3-8920-9231ad05e964@csgroup.eu/ v3: https://lore.kernel.org/all/20230918072955.2507221-1-rppt@kernel.org * add type parameter to execmem allocation APIs * remove BPF dependency on modules v2: https://lore.kernel.org/all/20230616085038.4121892-1-rppt@kernel.org * Separate "module" and "others" allocations with execmem_text_alloc() and jit_text_alloc() * Drop ROX entailment on x86 * Add ack for nios2 changes, thanks Dinh Nguyen v1: https://lore.kernel.org/all/20230601101257.530867-1-rppt@kernel.org = Cover letter from v1 (sligtly updated) = module_alloc() is used everywhere as a mean to allocate memory for code. Beside being semantically wrong, this unnecessarily ties all subsystmes that need to allocate code, such as ftrace, kprobes and BPF to modules and puts the burden of code allocation to the modules code. Several architectures override module_alloc() because of various constraints where the executable memory can be located and this causes additional obstacles for improvements of code allocation. A centralized infrastructure for code allocation allows allocations of executable memory as ROX, and future optimizations such as caching large pages for better iTLB performance and providing sub-page allocations for users that only need small jit code snippets. Rick Edgecombe proposed perm_alloc extension to vmalloc [1] and Song Liu proposed execmem_alloc [2], but both these approaches were targeting BPF allocations and lacked the ground work to abstract executable allocations and split them from the modules core. Thomas Gleixner suggested to express module allocation restrictions and requirements as struct mod_alloc_type_params [3] that would define ranges, protections and other parameters for different types of allocations used by modules and following that suggestion Song separated allocations of different types in modules (commit ac3b43283923 ("module: replace module_layout with module_memory")) and posted "Type aware module allocator" set [4]. I liked the idea of parametrising code allocation requirements as a structure, but I believe the original proposal and Song's module allocator was too module centric, so I came up with these patches. This set splits code allocation from modules by introducing execmem_alloc() and and execmem_free(), APIs, replaces call sites of module_alloc() and module_memfree() with the new APIs and implements core text and related allocations in a central place. Instead of architecture specific overrides for module_alloc(), the architectures that require non-default behaviour for text allocation must fill execmem_info structure and implement execmem_arch_setup() that returns a pointer to that structure. If an architecture does not implement execmem_arch_setup(), the defaults compatible with the current modules::module_alloc() are used. Since architectures define different restrictions on placement, permissions, alignment and other parameters for memory that can be used by different subsystems that allocate executable memory, execmem APIs take a type argument, that will be used to identify the calling subsystem and to allow architectures to define parameters for ranges suitable for that subsystem. The new infrastructure allows decoupling of BPF, kprobes and ftrace from modules, and most importantly it paves the way for ROX allocations for executable memory. [1] https://lore.kernel.org/lkml/20201120202426.18009-1-rick.p.edgecombe@intel.com/ [2] https://lore.kernel.org/all/20221107223921.3451913-1-song@kernel.org/ [3] https://lore.kernel.org/all/87v8mndy3y.ffs@tglx/ [4] https://lore.kernel.org/all/20230526051529.3387103-1-song@kernel.org Mike Rapoport (IBM) (16): arm64: module: remove unneeded call to kasan_alloc_module_shadow() mips: module: rename MODULE_START to MODULES_VADDR nios2: define virtual address space for modules sparc: simplify module_alloc() module: make module_memory_{alloc,free} more self-contained mm: introduce execmem_alloc() and execmem_free() mm/execmem, arch: convert simple overrides of module_alloc to execmem mm/execmem, arch: convert remaining overrides of module_alloc to execmem riscv: extend execmem_params for generated code allocations arm64: extend execmem_info for generated code allocations powerpc: extend execmem_params for kprobes allocations arch: make execmem setup available regardless of CONFIG_MODULES x86/ftrace: enable dynamic ftrace without CONFIG_MODULES powerpc: use CONFIG_EXECMEM instead of CONFIG_MODULES where appropriate kprobes: remove dependency on CONFIG_MODULES bpf: remove CONFIG_BPF_JIT dependency on CONFIG_MODULES of arch/Kconfig | 10 +- arch/arm/kernel/module.c | 34 ------- arch/arm/mm/init.c | 45 +++++++++ arch/arm64/Kconfig | 1 + arch/arm64/kernel/module.c | 126 ----------------------- arch/arm64/kernel/probes/kprobes.c | 7 -- arch/arm64/mm/init.c | 140 ++++++++++++++++++++++++++ arch/arm64/net/bpf_jit_comp.c | 11 --- arch/loongarch/kernel/module.c | 6 -- arch/loongarch/mm/init.c | 21 ++++ arch/mips/include/asm/pgtable-64.h | 4 +- arch/mips/kernel/module.c | 10 -- arch/mips/mm/fault.c | 4 +- arch/mips/mm/init.c | 23 +++++ arch/nios2/include/asm/pgtable.h | 5 +- arch/nios2/kernel/module.c | 20 ---- arch/nios2/mm/init.c | 21 ++++ arch/parisc/kernel/module.c | 12 --- arch/parisc/mm/init.c | 23 ++++- arch/powerpc/Kconfig | 2 +- arch/powerpc/include/asm/kasan.h | 2 +- arch/powerpc/kernel/head_8xx.S | 4 +- arch/powerpc/kernel/head_book3s_32.S | 6 +- arch/powerpc/kernel/kprobes.c | 22 +---- arch/powerpc/kernel/module.c | 38 ------- arch/powerpc/lib/code-patching.c | 2 +- arch/powerpc/mm/book3s32/mmu.c | 2 +- arch/powerpc/mm/mem.c | 64 ++++++++++++ arch/riscv/include/asm/pgtable.h | 3 + arch/riscv/kernel/module.c | 12 --- arch/riscv/kernel/probes/kprobes.c | 10 -- arch/riscv/mm/init.c | 35 +++++++ arch/riscv/net/bpf_jit_core.c | 13 --- arch/s390/kernel/ftrace.c | 4 +- arch/s390/kernel/kprobes.c | 4 +- arch/s390/kernel/module.c | 42 +------- arch/s390/mm/init.c | 30 ++++++ arch/sparc/include/asm/pgtable_32.h | 2 + arch/sparc/kernel/module.c | 30 ------ arch/sparc/mm/Makefile | 2 + arch/sparc/mm/execmem.c | 21 ++++ arch/sparc/net/bpf_jit_comp_32.c | 8 +- arch/x86/Kconfig | 1 + arch/x86/kernel/ftrace.c | 16 +-- arch/x86/kernel/kprobes/core.c | 4 +- arch/x86/kernel/module.c | 51 ---------- arch/x86/mm/init.c | 29 ++++++ include/linux/execmem.h | 132 +++++++++++++++++++++++++ include/linux/module.h | 9 ++ include/linux/moduleloader.h | 15 --- kernel/bpf/Kconfig | 2 +- kernel/bpf/core.c | 6 +- kernel/kprobes.c | 63 +++++++----- kernel/module/Kconfig | 1 + kernel/module/main.c | 105 +++++++++----------- kernel/trace/trace_kprobe.c | 20 +++- mm/Kconfig | 3 + mm/Makefile | 1 + mm/execmem.c | 143 +++++++++++++++++++++++++++ mm/mm_init.c | 2 + 60 files changed, 903 insertions(+), 581 deletions(-) create mode 100644 arch/sparc/mm/execmem.c create mode 100644 include/linux/execmem.h create mode 100644 mm/execmem.c base-commit: 0bbac3facb5d6cc0171c45c9873a2dc96bea9680