linux-arm-kernel.lists.infradead.org archive mirror
 help / color / mirror / Atom feed
From: rick.p.edgecombe@intel.com (Edgecombe, Rick P)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v2 0/2] bpf: permit JIT allocations to be served outside the module region
Date: Wed, 21 Nov 2018 19:48:07 +0000	[thread overview]
Message-ID: <9d7f77959e1be0a9a3ff511a8fc45518068c85a6.camel@intel.com> (raw)
In-Reply-To: <20181121131733.14910-1-ard.biesheuvel@linaro.org>

On Wed, 2018-11-21 at 14:17 +0100, Ard Biesheuvel wrote:
> On arm64, modules are allocated from a 128 MB window which is close to
> the core kernel, so that relative direct branches are guaranteed to be
> in range (except in some KASLR configurations). Also, module_alloc()
> is in charge of allocating KASAN shadow memory when running with KASAN
> enabled.
> 
> This means that the way BPF reuses module_alloc()/module_memfree() is
> undesirable on arm64 (and potentially other architectures as well),
> and so this series refactors BPF's use of those functions to permit
> architectures to change this behavior.
> 
Hi Ard,

I am looking at adding optional BPF JIT in vmalloc functionality for x86 that
would use this refactor. In fact I have done the same thing with just different
names.

My implementation intends to use the module space until a usage limit is reached
and then overflow into vmalloc, so it would be an additional knob like
"bpf_jit_limit". Wondering if that should be a cross-arch concept that connects
to this. Does it fit in with what you are trying to do for arm64 here?

Thanks,

Rick

  parent reply	other threads:[~2018-11-21 19:48 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-11-21 13:17 [PATCH v2 0/2] bpf: permit JIT allocations to be served outside the module region Ard Biesheuvel
2018-11-21 13:17 ` [PATCH v2 1/2] bpf: add __weak hook for allocating executable memory Ard Biesheuvel
2018-11-22 20:01   ` kbuild test robot
2018-11-22 21:08     ` Ard Biesheuvel
2018-11-22 21:40   ` kbuild test robot
2018-11-21 13:17 ` [PATCH v2 2/2] arm64/bpf: don't allocate BPF JIT programs in module memory Ard Biesheuvel
2018-11-21 23:20   ` Daniel Borkmann
2018-11-22  8:02     ` Ard Biesheuvel
2018-11-22 22:49       ` Daniel Borkmann
2018-11-24  2:57   ` kbuild test robot
2018-11-21 19:48 ` Edgecombe, Rick P [this message]
2018-11-21 20:36   ` [PATCH v2 0/2] bpf: permit JIT allocations to be served outside the module region Ard Biesheuvel

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=9d7f77959e1be0a9a3ff511a8fc45518068c85a6.camel@intel.com \
    --to=rick.p.edgecombe@intel.com \
    --cc=linux-arm-kernel@lists.infradead.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).