Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp1357339pxb; Wed, 2 Feb 2022 03:10:36 -0800 (PST) X-Google-Smtp-Source: ABdhPJxhs8qbuGBUuGVKm7Mi22mjieUkmSY++TG69M++Ix3qoS8RaceaSRTvVGLluUYqVKkRuVe6 X-Received: by 2002:a17:902:c409:: with SMTP id k9mr30122718plk.132.1643800235757; Wed, 02 Feb 2022 03:10:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643800235; cv=none; d=google.com; s=arc-20160816; b=0w2z4g2bpoIFUjy+f3nEo/MHfbdrs4G9WYgTz+I2t4xaKLFg+v4AtwOBlpFcATNDcG 4Lr+HdadoGl4z7FDx27o8WTQb0MyUi5zPv6p8O+t7ygtizX0BeZ3qRCJTfWMBWnpFuse P2JU0tdxyNW31X35frVblXo9R+j9ClrqBRRch8Sg06lCqdwVhoS5uf21WEGjMYq088tj Ai82df4sIdppGfk5N3I/cRH3KUOGhvRcXLueSTqbcIU11omz6P7ArTecWWxNMO+ss0x5 T2duThxSdP6xJGczvkpECmefLH5+KOo06Llqnuq9pzaex/PNIo0LoEIXK2Qa+VfW2UuY p+Xw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=TItZwPQxVM6jgoSCLvNkzbrmH4y10h35cCNBzBDwga8=; b=EVe7YnVyEoSYRHnyZik5k2ATdI/qB3yDjG3lJiSNfcrB6NzGNRq3WMgSb4rrfGt8FU /OGO1vjcuCUQI55hGeVMa8O+dH3zs9m61sNHJ+976A35qtpz1GUAkksyV5alfLMOTeOP /3bKPJcYKKIA95rjSuS+6QndfFu5ozMe2r/0/LUVuR5qfnwCGjnaV8on6ULsFbm2QNqe B6B5QgUK3Ej/pHGgiuvE/EwSr3BVFfEndD+ydg6ZVgCANubHUWj/8BVaaikk2mKMe2eh zWFyDLeh0KfyFd613Jr+PdZmMv8d3OYRj1rWpmhBiUsmzemEipMQYpYxIVK1XrWKztl6 v51w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id r8si18432717pff.43.2022.02.02.03.10.23; Wed, 02 Feb 2022 03:10:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234139AbiBAGbJ convert rfc822-to-8bit (ORCPT + 99 others); Tue, 1 Feb 2022 01:31:09 -0500 Received: from mx0a-00082601.pphosted.com ([67.231.145.42]:57370 "EHLO mx0a-00082601.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234101AbiBAGbF (ORCPT ); Tue, 1 Feb 2022 01:31:05 -0500 Received: from pps.filterd (m0044010.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.16.1.2/8.16.1.2) with ESMTP id 21134Nc3018890 for ; Mon, 31 Jan 2022 22:31:05 -0800 Received: from mail.thefacebook.com ([163.114.132.120]) by mx0a-00082601.pphosted.com (PPS) with ESMTPS id 3dxvmp8kfx-4 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT) for ; Mon, 31 Jan 2022 22:31:05 -0800 Received: from twshared7500.02.ash7.facebook.com (2620:10d:c085:208::11) by mail.thefacebook.com (2620:10d:c085:21d::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.21; Mon, 31 Jan 2022 22:31:04 -0800 Received: by devbig006.ftw2.facebook.com (Postfix, from userid 4523) id 1072D290EC8D9; Mon, 31 Jan 2022 22:28:10 -0800 (PST) From: Song Liu To: , , CC: , , , , , , , Song Liu Subject: [PATCH v8 bpf-next 0/9] bpf_prog_pack allocator Date: Mon, 31 Jan 2022 22:27:54 -0800 Message-ID: <20220201062803.2675204-1-song@kernel.org> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8BIT X-FB-Internal: Safe Content-Type: text/plain X-Proofpoint-ORIG-GUID: mUE8qFpRLx_YQVEw49eRFpgG1-MTgHAC X-Proofpoint-GUID: mUE8qFpRLx_YQVEw49eRFpgG1-MTgHAC X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.816,Hydra:6.0.425,FMLib:17.11.62.513 definitions=2022-02-01_02,2022-01-31_01,2021-12-02_01 X-Proofpoint-Spam-Details: rule=fb_outbound_notspam policy=fb_outbound score=0 spamscore=0 bulkscore=0 impostorscore=0 adultscore=0 priorityscore=1501 mlxscore=0 lowpriorityscore=0 malwarescore=0 clxscore=1034 phishscore=0 suspectscore=0 mlxlogscore=730 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000 definitions=main-2202010033 X-FB-Internal: deliver Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Changes v7 => v8: 1. Rebase and fix conflicts. 2. Lock text_mutex for text_poke_copy. (Daniel) Changes v6 => v7: 1. Redesign the interface between generic and arch logic, based on feedback from Alexei and Ilya. 2. Split 6/7 of v6 to 7/9 and 8/9 in v7, for cleaner logic. 3. Add bpf_arch_text_copy in 6/9. Changes v5 => v6: 1. Make jit_hole_buffer 128 byte long. Only fill the first and last 128 bytes of header with INT3. (Alexei) 2. Use kvmalloc for temporary buffer. (Alexei) 3. Rename tmp_header/tmp_image => rw_header/rw_image. Remove tmp_image from x64_jit_data. (Alexei) 4. Change fall back round_up_to in bpf_jit_binary_alloc_pack() from BPF_PROG_MAX_PACK_PROG_SIZE to PAGE_SIZE. Changes v4 => v5: 1. Do not use atomic64 for bpf_jit_current. (Alexei) Changes v3 => v4: 1. Rename text_poke_jit() => text_poke_copy(). (Peter) 2. Change comment style. (Peter) Changes v2 => v3: 1. Fix tailcall. Changes v1 => v2: 1. Use text_poke instead of writing through linear mapping. (Peter) 2. Avoid making changes to non-x86_64 code. Most BPF programs are small, but they consume a page each. For systems with busy traffic and many BPF programs, this could also add significant pressure to instruction TLB. This set tries to solve this problem with customized allocator that pack multiple programs into a huge page. Patches 1-6 prepare the work. Patch 7 contains key logic of bpf_prog_pack allocator. Patch 8 contains bpf_jit_binary_pack_alloc logic on top of bpf_prog_pack allocator. Patch 9 uses this allocator in x86_64 jit. Song Liu (9): x86/Kconfig: select HAVE_ARCH_HUGE_VMALLOC with HAVE_ARCH_HUGE_VMAP bpf: use bytes instead of pages for bpf_jit_[charge|uncharge]_modmem bpf: use size instead of pages in bpf_binary_header bpf: use prog->jited_len in bpf_prog_ksym_set_addr() x86/alternative: introduce text_poke_copy bpf: introduce bpf_arch_text_copy bpf: introduce bpf_prog_pack allocator bpf: introduce bpf_jit_binary_pack_[alloc|finalize|free] bpf, x86_64: use bpf_jit_binary_pack_alloc arch/x86/Kconfig | 1 + arch/x86/include/asm/text-patching.h | 1 + arch/x86/kernel/alternative.c | 34 ++++ arch/x86/net/bpf_jit_comp.c | 65 ++++--- include/linux/bpf.h | 7 +- include/linux/filter.h | 27 +-- kernel/bpf/core.c | 269 +++++++++++++++++++++++++-- kernel/bpf/trampoline.c | 6 +- 8 files changed, 348 insertions(+), 62 deletions(-) -- 2.30.2