From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 237FDC433EF for ; Thu, 14 Apr 2022 20:04:55 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 88DAD6B0071; Thu, 14 Apr 2022 16:04:54 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 83CF86B0073; Thu, 14 Apr 2022 16:04:54 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 7051F6B0074; Thu, 14 Apr 2022 16:04:54 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (relay.hostedemail.com [64.99.140.25]) by kanga.kvack.org (Postfix) with ESMTP id 5D1926B0071 for ; Thu, 14 Apr 2022 16:04:54 -0400 (EDT) Received: from smtpin09.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id 0FBF427A9A for ; Thu, 14 Apr 2022 20:04:54 +0000 (UTC) X-FDA: 79356562908.09.2BBA8A9 Received: from mx0b-00082601.pphosted.com (mx0b-00082601.pphosted.com [67.231.153.30]) by imf04.hostedemail.com (Postfix) with ESMTP id 6BB0640007 for ; Thu, 14 Apr 2022 20:04:53 +0000 (UTC) Received: from pps.filterd (m0109332.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.16.1.2/8.16.1.2) with ESMTP id 23EHnLw1009191 for ; Thu, 14 Apr 2022 13:04:52 -0700 Received: from mail.thefacebook.com ([163.114.132.120]) by mx0a-00082601.pphosted.com (PPS) with ESMTPS id 3fece9vy2t-5 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT) for ; Thu, 14 Apr 2022 13:04:52 -0700 Received: from twshared29473.14.frc2.facebook.com (2620:10d:c085:108::4) by mail.thefacebook.com (2620:10d:c085:21d::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.21; Thu, 14 Apr 2022 13:04:51 -0700 Received: by devbig932.frc1.facebook.com (Postfix, from userid 4523) id D640959738C3; Thu, 14 Apr 2022 12:59:23 -0700 (PDT) From: Song Liu To: , , CC: , , , , , , , , Song Liu Subject: [PATCH v3 bpf RESEND 4/4] bpf: use module_alloc_huge for bpf_prog_pack Date: Thu, 14 Apr 2022 12:59:14 -0700 Message-ID: <20220414195914.1648345-5-song@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20220414195914.1648345-1-song@kernel.org> References: <20220414195914.1648345-1-song@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-FB-Internal: Safe Content-Type: text/plain X-Proofpoint-ORIG-GUID: oGOX4vUE4aniuW2QnnG3Tt5XHcE7njYs X-Proofpoint-GUID: oGOX4vUE4aniuW2QnnG3Tt5XHcE7njYs X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.858,Hydra:6.0.486,FMLib:17.11.64.514 definitions=2022-04-14_05,2022-04-14_02,2022-02-23_01 X-Rspamd-Server: rspam10 X-Rspamd-Queue-Id: 6BB0640007 X-Stat-Signature: w5bm3oydznfrpwchgf1cy6z7ar1ttf4g Authentication-Results: imf04.hostedemail.com; dkim=none; dmarc=fail reason="No valid SPF, No valid DKIM" header.from=kernel.org (policy=none); spf=none (imf04.hostedemail.com: domain of "prvs=51035a5414=songliubraving@fb.com" has no SPF policy when checking 67.231.153.30) smtp.mailfrom="prvs=51035a5414=songliubraving@fb.com" X-Rspam-User: X-HE-Tag: 1649966693-316242 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Use module_alloc_huge for bpf_prog_pack so that BPF programs sit on PMD_SIZE pages. This benefits system performance by reducing iTLB miss rate. Also, remove set_vm_flush_reset_perms() from alloc_new_pack() and use set_memory_[nx|rw] in bpf_prog_pack_free(). This is because VM_FLUSH_RESET_PERMS does not work with huge pages yet. Signed-off-by: Song Liu --- kernel/bpf/core.c | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/kernel/bpf/core.c b/kernel/bpf/core.c index 13e9dbeeedf3..b2a634d0f842 100644 --- a/kernel/bpf/core.c +++ b/kernel/bpf/core.c @@ -857,7 +857,7 @@ static size_t select_bpf_prog_pack_size(void) void *ptr; =20 size =3D BPF_HPAGE_SIZE * num_online_nodes(); - ptr =3D module_alloc(size); + ptr =3D module_alloc_huge(size); =20 /* Test whether we can get huge pages. If not just use PAGE_SIZE * packs. @@ -881,7 +881,7 @@ static struct bpf_prog_pack *alloc_new_pack(void) GFP_KERNEL); if (!pack) return NULL; - pack->ptr =3D module_alloc(bpf_prog_pack_size); + pack->ptr =3D module_alloc_huge(bpf_prog_pack_size); if (!pack->ptr) { kfree(pack); return NULL; @@ -889,7 +889,6 @@ static struct bpf_prog_pack *alloc_new_pack(void) bitmap_zero(pack->bitmap, bpf_prog_pack_size / BPF_PROG_CHUNK_SIZE); list_add_tail(&pack->list, &pack_list); =20 - set_vm_flush_reset_perms(pack->ptr); set_memory_ro((unsigned long)pack->ptr, bpf_prog_pack_size / PAGE_SIZE)= ; set_memory_x((unsigned long)pack->ptr, bpf_prog_pack_size / PAGE_SIZE); return pack; @@ -970,6 +969,8 @@ static void bpf_prog_pack_free(struct bpf_binary_head= er *hdr) if (bitmap_find_next_zero_area(pack->bitmap, bpf_prog_chunk_count(), 0, bpf_prog_chunk_count(), 0) =3D=3D 0) { list_del(&pack->list); + set_memory_nx((unsigned long)pack->ptr, bpf_prog_pack_size / PAGE_SIZE= ); + set_memory_rw((unsigned long)pack->ptr, bpf_prog_pack_size / PAGE_SIZE= ); module_memfree(pack->ptr); kfree(pack); } --=20 2.30.2