Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp3332pxb; Mon, 31 Jan 2022 03:50:16 -0800 (PST) X-Google-Smtp-Source: ABdhPJz0IPi+5x9RYQIm6ys7IFFaVo6Slr/gm6OsKzggjM8cqhG+fntgy9R9rmhhmKDhQAZ3m+dY X-Received: by 2002:a05:6a00:a92:: with SMTP id b18mr19506875pfl.3.1643629816585; Mon, 31 Jan 2022 03:50:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643629816; cv=none; d=google.com; s=arc-20160816; b=JyzlTqFkrEoWwedwe/7UpRG4eTW+WGVTe4NpvFiLilToWO2ZhdZLDr8DQqsLpXmdFH 9O79Q/2lwBRGJ27L1ZJWrqSWIS2v86jFhIysNLvQqD0ejYarWRmQkXI9RYn1zA94gECI 9s+/nzOAkre4vt9QR5DepyFd2xy0uYzo9xQ9uKfAx283KsmF/WlrFM5VueLrTBHPfYVa 8WtN3VmriHcgO59yj2jVmkiY8g/LGp9x8gZsI5RpqibWR0kt6ImsnDTvoZDxA/dsH4G1 bs6VHFjrE1kKinZ6kH7CKMA12LTuJOo8Jv04GwypfCq8FiQpMs0SqaEtmrI9J8PIin2K 8pqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=/UgQrGtrT8qsdsE2LYGtvfdgm+lA0zHW+/Jt40Tj+Iw=; b=xzYYOymtVaj/l5WvaKHUZ316rQPKqarFm2PWZ3/ZOWhoZ6TRP2iJLpZClseONlSxdD B7C/QnSqwQne11wK5o3+W98vKPmTHY9dn0twQQpqPw/bdGzB7YebBtkhs10Ne811KKRE PFDNpPh0ujR/c8PZ+vhfhtujzK9OmL+f9v9brFiqtbjXjzLSMsi4TmnYvNBP2Eqt/Y7T UKfwuaEGxRCpwyufu5rvgwgvnzVlu1ANhWrDW3UbGdDHqFyr3soKXaMa4XtcuNurgH+H Ub6x9qhcNCyiyh2m8+ufDXj5ou+l3voxyjRd5eQPvj4Qp5ZRWFKO+oityqljiD3ZzycO yqAQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f4si13317750pgc.600.2022.01.31.03.50.05; Mon, 31 Jan 2022 03:50:16 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1351830AbiA1Xs1 convert rfc822-to-8bit (ORCPT + 99 others); Fri, 28 Jan 2022 18:48:27 -0500 Received: from mx0a-00082601.pphosted.com ([67.231.145.42]:46474 "EHLO mx0a-00082601.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1351826AbiA1XsZ (ORCPT ); Fri, 28 Jan 2022 18:48:25 -0500 Received: from pps.filterd (m0109334.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.16.1.2/8.16.1.2) with ESMTP id 20SKw1oM006582 for ; Fri, 28 Jan 2022 15:48:25 -0800 Received: from mail.thefacebook.com ([163.114.132.120]) by mx0a-00082601.pphosted.com (PPS) with ESMTPS id 3dv3m9r4d2-2 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT) for ; Fri, 28 Jan 2022 15:48:24 -0800 Received: from twshared22811.39.frc1.facebook.com (2620:10d:c085:108::4) by mail.thefacebook.com (2620:10d:c085:21d::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.21; Fri, 28 Jan 2022 15:48:23 -0800 Received: by devbig006.ftw2.facebook.com (Postfix, from userid 4523) id 2D2E928E02EFC; Fri, 28 Jan 2022 15:45:21 -0800 (PST) From: Song Liu To: , , CC: , , , , , , , Song Liu Subject: [PATCH v7 bpf-next 0/9] bpf_prog_pack allocator Date: Fri, 28 Jan 2022 15:45:08 -0800 Message-ID: <20220128234517.3503701-1-song@kernel.org> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8BIT X-FB-Internal: Safe Content-Type: text/plain X-Proofpoint-ORIG-GUID: VRd7rKfdbMUrqsm2ZXrd67D5-0aIgg8z X-Proofpoint-GUID: VRd7rKfdbMUrqsm2ZXrd67D5-0aIgg8z X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.816,Hydra:6.0.425,FMLib:17.11.62.513 definitions=2022-01-28_08,2022-01-28_01,2021-12-02_01 X-Proofpoint-Spam-Details: rule=fb_outbound_notspam policy=fb_outbound score=0 bulkscore=0 mlxscore=0 suspectscore=0 lowpriorityscore=0 mlxlogscore=640 phishscore=0 adultscore=0 spamscore=0 priorityscore=1501 impostorscore=0 clxscore=1034 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000 definitions=main-2201280129 X-FB-Internal: deliver Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Changes v6 => v7: 1. Redesign the interface between generic and arch logic, based on feedback from Alexei and Ilya. 2. Split 6/7 of v6 to 7/9 and 8/9 in v7, for cleaner logic. 3. Add bpf_arch_text_copy in 6/9. Changes v5 => v6: 1. Make jit_hole_buffer 128 byte long. Only fill the first and last 128 bytes of header with INT3. (Alexei) 2. Use kvmalloc for temporary buffer. (Alexei) 3. Rename tmp_header/tmp_image => rw_header/rw_image. Remove tmp_image from x64_jit_data. (Alexei) 4. Change fall back round_up_to in bpf_jit_binary_alloc_pack() from BPF_PROG_MAX_PACK_PROG_SIZE to PAGE_SIZE. Changes v4 => v5: 1. Do not use atomic64 for bpf_jit_current. (Alexei) Changes v3 => v4: 1. Rename text_poke_jit() => text_poke_copy(). (Peter) 2. Change comment style. (Peter) Changes v2 => v3: 1. Fix tailcall. Changes v1 => v2: 1. Use text_poke instead of writing through linear mapping. (Peter) 2. Avoid making changes to non-x86_64 code. Most BPF programs are small, but they consume a page each. For systems with busy traffic and many BPF programs, this could also add significant pressure to instruction TLB. This set tries to solve this problem with customized allocator that pack multiple programs into a huge page. Patches 1-6 prepare the work. Patch 7 contains key logic of bpf_prog_pack allocator. Patch 8 contains bpf_jit_binary_pack_alloc logic on top of bpf_prog_pack allocator. Patch 9 uses this allocator in x86_64 jit. Song Liu (9): x86/Kconfig: select HAVE_ARCH_HUGE_VMALLOC with HAVE_ARCH_HUGE_VMAP bpf: use bytes instead of pages for bpf_jit_[charge|uncharge]_modmem bpf: use size instead of pages in bpf_binary_header bpf: use prog->jited_len in bpf_prog_ksym_set_addr() x86/alternative: introduce text_poke_copy bpf: introduce bpf_arch_text_copy bpf: introduce bpf_prog_pack allocator bpf: introduce bpf_jit_binary_pack_[alloc|finalize|free] bpf, x86_64: use bpf_jit_binary_pack_alloc arch/x86/Kconfig | 1 + arch/x86/include/asm/text-patching.h | 1 + arch/x86/kernel/alternative.c | 32 ++++ arch/x86/net/bpf_jit_comp.c | 66 ++++--- include/linux/bpf.h | 7 +- include/linux/filter.h | 27 +-- kernel/bpf/core.c | 269 +++++++++++++++++++++++++-- kernel/bpf/trampoline.c | 6 +- 8 files changed, 346 insertions(+), 63 deletions(-) -- 2.30.2