Received: by 2002:a25:ca44:0:0:0:0:0 with SMTP id a65csp120589ybg; Tue, 28 Jul 2020 01:19:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw0JIrP3UnO2aHWdDgJ+bYW2qBK7fmeOtKE8chdCATFcvnchk7hqUfeM/G0UFh7MiQIWH9U X-Received: by 2002:a17:906:430b:: with SMTP id j11mr15515828ejm.270.1595924393140; Tue, 28 Jul 2020 01:19:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595924393; cv=none; d=google.com; s=arc-20160816; b=czLODWWQLBP7X0cYBbLrCVMwDw3cG1U73erksKtfOIyuk0vXUtNURYUtjElY5Xpnzu xLdi9Ts60Y/9kfFkQ06xQA74h3qFyHR9MG7RyrjePHXPX2ikEOsAJA2pXc/AYBgpMWc6 7dHPmD3ouQWYeIQARrX1l/jNjfET+wSOO4NeKB7pCcsA8ffrqnUpQUrFx3pB+T0MShWA c9Hwgcw7d9o2bdBYIQz0nGqzL5Xbqr5qv9C9jxc1Mp/BPZm6QC8oWYE22Q3YrENbIO9J 8tZKi2P+ykpKWaspgwouMJ7j0oglIw+iwclUV267cDU2FgDTFTrJ4RYPmJVrqKGqfIKH tKZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=xlVYVMJA/spvd14qwcTH/14nDixPnUcACZM41Lebje8=; b=Vdg38mZNtKZfWzHUbHrXKuE/bOvJD2TIB1wyESwJBx44aA7az9+3PcllnSoFeghl71 EOtOTGkA+cp/ToRu9bXLwMCDdw6zgm2njSlWzqdUmJNsEoIZp/oqgXg6TYMcyYeD3Zgx ht9j29jrtfeh6itNPKazzN31KngZu86fUXNX4JtBXm7I61CwTBrGhmGbf7YSqcjA/pcI RZtGOMTkLWuzUF8NdK4eDv3TGZsg9Uef0Mp/bESFRjLSZVO+9GZ8FAEdEwfvV8VbJI7n Gmot8FEMj51pDLC442Q0ChzrrgFGOuVF09ySI2nL6r84EHy7fnKM680nHL1l+rNXUEO3 4xvA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="cP/1mWVh"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dp16si3273701ejc.328.2020.07.28.01.19.30; Tue, 28 Jul 2020 01:19:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="cP/1mWVh"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728044AbgG1IRW (ORCPT + 99 others); Tue, 28 Jul 2020 04:17:22 -0400 Received: from mail.kernel.org ([198.145.29.99]:47592 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727878AbgG1IRV (ORCPT ); Tue, 28 Jul 2020 04:17:21 -0400 Received: from devnote2 (NE2965lan1.rev.em-net.ne.jp [210.141.244.193]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id CDF532177B; Tue, 28 Jul 2020 08:17:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1595924240; bh=3fxjXoDgSBiwnSHqXnV1f6LzXR3qMTb2G2BKx/anIjU=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=cP/1mWVhwzYFHuE/o20/ObrPDNBusuSlukT/jhE9M6CttC1iJo8RejcopDujlYEaX KjN5FmG9MSsoE/RMN1/treziZsdRTrxwbFKigPD7cgkc2nLa1Q7CQA/SlfTe5byDM7 83BQW/0C09K+ESYWg9I8N1wgw/6HjGWp5eawq+ek= Date: Tue, 28 Jul 2020 17:17:15 +0900 From: Masami Hiramatsu To: Ard Biesheuvel Cc: Mike Rapoport , Jarkko Sakkinen , Ingo Molnar , Linux Kernel Mailing List , linux-mm@kvack.org, Andi Kleen , Masami Hiramatsu , Peter Zijlstra , "Naveen N. Rao" , Anil S Keshavamurthy , "David S. Miller" , Jessica Yu Subject: Re: [PATCH v5 5/6] kprobes: Use text_alloc() and text_free() Message-Id: <20200728171715.0800093e2226e3d72b04a3ae@kernel.org> In-Reply-To: References: <20200724050553.1724168-1-jarkko.sakkinen@linux.intel.com> <20200724050553.1724168-6-jarkko.sakkinen@linux.intel.com> <20200724092746.GD517988@gmail.com> <20200725031648.GG17052@linux.intel.com> <20200726081408.GB2927915@kernel.org> X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.32; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 26 Jul 2020 19:06:20 +0300 Ard Biesheuvel wrote: > On Sun, 26 Jul 2020 at 11:14, Mike Rapoport wrote: > > > > On Sat, Jul 25, 2020 at 06:16:48AM +0300, Jarkko Sakkinen wrote: > > > On Fri, Jul 24, 2020 at 11:27:46AM +0200, Ingo Molnar wrote: > > > > > > > > * Jarkko Sakkinen wrote: > > > > > > > > > Use text_alloc() and text_free() instead of module_alloc() and > > > > > module_memfree() when an arch provides them. > > > > > > > > > > Cc: linux-mm@kvack.org > > > > > Cc: Andi Kleen > > > > > Cc: Masami Hiramatsu > > > > > Cc: Peter Zijlstra > > > > > Signed-off-by: Jarkko Sakkinen > > > > > --- > > > > > kernel/kprobes.c | 9 +++++++++ > > > > > 1 file changed, 9 insertions(+) > > > > > > > > > > diff --git a/kernel/kprobes.c b/kernel/kprobes.c > > > > > index 4e46d96d4e16..611fcda9f6bf 100644 > > > > > --- a/kernel/kprobes.c > > > > > +++ b/kernel/kprobes.c > > > > > @@ -40,6 +40,7 @@ > > > > > #include > > > > > #include > > > > > #include > > > > > +#include > > > > > > > > > > #define KPROBE_HASH_BITS 6 > > > > > #define KPROBE_TABLE_SIZE (1 << KPROBE_HASH_BITS) > > > > > @@ -111,12 +112,20 @@ enum kprobe_slot_state { > > > > > > > > > > void __weak *alloc_insn_page(void) > > > > > { > > > > > +#ifdef CONFIG_ARCH_HAS_TEXT_ALLOC > > > > > + return text_alloc(PAGE_SIZE); > > > > > +#else > > > > > return module_alloc(PAGE_SIZE); > > > > > +#endif > > > > > } > > > > > > > > > > void __weak free_insn_page(void *page) > > > > > { > > > > > +#ifdef CONFIG_ARCH_HAS_TEXT_ALLOC > > > > > + text_free(page); > > > > > +#else > > > > > module_memfree(page); > > > > > +#endif > > > > > } > > > > > > > > I've read the observations in the other threads, but this #ifdef > > > > jungle is silly, it's a de-facto open coded text_alloc() with a > > > > module_alloc() fallback... > > > > > > In the previous version I had: > > > > > > https://lore.kernel.org/lkml/20200717030422.679972-4-jarkko.sakkinen@linux.intel.com/ > > > > > > and I had just calls to text_alloc() and text_free() in corresponding > > > snippet to the above. > > > > > > I got this feedback from Mike: > > > > > > https://lore.kernel.org/lkml/20200718162359.GA2919062@kernel.org/ > > > > > > I'm not still sure that I fully understand this feedback as I don't see > > > any inherent and obvious difference to the v4. In that version fallbacks > > > are to module_alloc() and module_memfree() and text_alloc() and > > > text_memfree() can be overridden by arch. > > > > Let me try to elaborate. > > > > There are several subsystems that need to allocate memory for executable > > text. As it happens, they use module_alloc() with some abilities for > > architectures to override this behaviour. > > > > For many architectures, it would be enough to rename modules_alloc() to > > text_alloc(), make it built-in and this way allow removing dependency on > > MODULES. > > > > Yet, some architectures have different restrictions for code allocation > > for different subsystems so it would make sense to have more than one > > variant of text_alloc() and a single config option ARCH_HAS_TEXT_ALLOC > > won't be sufficient. > > > > I liked Mark's suggestion to have text_alloc_() and proposed > > a way to introduce text_alloc_kprobes() along with > > HAVE_KPROBES_TEXT_ALLOC to enable arch overrides of this function. > > > > The major difference between your v4 and my suggestion is that I'm not > > trying to impose a single ARCH_HAS_TEXT_ALLOC as an alternative to > > MODULES but rather to use per subsystem config option, e.g. > > HAVE_KPROBES_TEXT_ALLOC. > > > > Another thing, which might be worth doing regardless of the outcome of > > this discussion is to rename alloc_insn_pages() to text_alloc_kprobes() > > because the former is way too generic and does not emphasize that the > > instruction page is actually used by kprobes only. The name of the insn_pages came from the struct kprobe_insn_page, so if there is a text_alloc_kprobe(), I'm OK to rename it. (anyway, that is an allocation operator, we don't call it directly.) > Masami or Peter should correct me if I am wrong, but it seems to me > that the way kprobes uses these pages does not require them to be in > relative branching range of the core kernel on any architecture, given > that they are populated with individual instruction opcodes that are > executed in single step mode, and relative branches are emulated (when > needed) Actually, x86 and arm has the "relative branching range" requirements for the jump optimized kprobes. For the other architectures, I think we don't need it. Only executable text buffer is needed. Thank you, > So for kprobes in particular, we should be able to come up with a > generic sequence that does not involve module_alloc(), and therefore > removes the kprobes dependency on module support entirely (with the > exception of power which maps the vmalloc space nx when module support > is disabled). Renaming alloc_insn_page() to something more descriptive > makes sense imo, but is a separate issue. -- Masami Hiramatsu