From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-16.8 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3D522C8300B for ; Fri, 20 Nov 2020 20:30:07 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 9706524181 for ; Fri, 20 Nov 2020 20:30:06 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 9706524181 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=intel.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 1D1BA6B005D; Fri, 20 Nov 2020 15:30:06 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 10BA96B006C; Fri, 20 Nov 2020 15:30:05 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id DDE216B006E; Fri, 20 Nov 2020 15:30:05 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0113.hostedemail.com [216.40.44.113]) by kanga.kvack.org (Postfix) with ESMTP id ADDDA6B005C for ; Fri, 20 Nov 2020 15:30:05 -0500 (EST) Received: from smtpin27.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay04.hostedemail.com (Postfix) with ESMTP id 5872C1F10 for ; Fri, 20 Nov 2020 20:30:05 +0000 (UTC) X-FDA: 77505938370.27.hot02_4e041c92734e Received: from filter.hostedemail.com (10.5.16.251.rfc1918.com [10.5.16.251]) by smtpin27.hostedemail.com (Postfix) with ESMTP id 3BE6F3D663 for ; Fri, 20 Nov 2020 20:30:05 +0000 (UTC) X-HE-Tag: hot02_4e041c92734e X-Filterd-Recvd-Size: 6229 Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by imf11.hostedemail.com (Postfix) with ESMTP for ; Fri, 20 Nov 2020 20:30:04 +0000 (UTC) IronPort-SDR: 7m3s3ozhydx2V1wsv7cifGkf/egW57sfoEfKG02uypAQzqw0NkkRW1H59FGKORy6og+iyQUjLi plmtltTYg0aw== X-IronPort-AV: E=McAfee;i="6000,8403,9811"; a="171702861" X-IronPort-AV: E=Sophos;i="5.78,357,1599548400"; d="scan'208";a="171702861" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Nov 2020 12:30:02 -0800 IronPort-SDR: Nejog16WYJC4xxerTZ+ibwwHr1kTjU4E3AjULdju3ILgQzs5Mm8WYSfWQjfJf8KUA0rzVfOlbJ 6FznREPW5cog== X-IronPort-AV: E=Sophos;i="5.78,357,1599548400"; d="scan'208";a="342163294" Received: from rpedgeco-mobl.amr.corp.intel.com (HELO localhost.intel.com) ([10.209.105.214]) by orsmga002-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Nov 2020 12:30:02 -0800 From: Rick Edgecombe To: akpm@linux-foundation.org, jeyu@kernel.org, bpf@vger.kernel.org, ast@kernel.org, daniel@iogearbox.net, luto@kernel.org, dave.hansen@linux.intel.com, peterz@infradead.org, x86@kernel.org, rppt@kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, dan.j.williams@intel.com Cc: elena.reshetova@intel.com, ira.weiny@intel.com, Rick Edgecombe Subject: [PATCH RFC 04/10] module: Support separate writable allocation Date: Fri, 20 Nov 2020 12:24:20 -0800 Message-Id: <20201120202426.18009-5-rick.p.edgecombe@intel.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20201120202426.18009-1-rick.p.edgecombe@intel.com> References: <20201120202426.18009-1-rick.p.edgecombe@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: The perm_alloc interface supports architectures to direct writes intended for an allocation to a separate writable staging area before a mapping is made live. In order to support this, change modules to write to the address provided by perm_writable_addr(). Currently this is the same address of the final allocation, so this patch should not create any functional change yet. To facilitate re-direction to separate writable staging areas, create a helper module_adjust_writable_addr(). This function will return an allocation's writable address if the parameter address is from a module that is in the process of being loaded. If the address does not meet that criteria, simply return the address passed in. This helper, while a little heavy weight, will allow callers in upcoming patches to simply retrieve the writable address without context of what module is being loaded. Signed-off-by: Rick Edgecombe --- include/linux/module.h | 22 ++++++++++++++++++++++ kernel/module.c | 14 +++++++++----- 2 files changed, 31 insertions(+), 5 deletions(-) diff --git a/include/linux/module.h b/include/linux/module.h index 9964f909d879..32dd22b2a38a 100644 --- a/include/linux/module.h +++ b/include/linux/module.h @@ -576,6 +576,23 @@ struct perm_allocation *module_get_allocation(struct= module *mod, unsigned long bool module_perm_alloc(struct module_layout *layout); void module_perm_free(struct module_layout *layout); =20 +static inline void *module_adjust_writable_addr(void *addr) +{ + unsigned long laddr =3D (unsigned long)addr; + struct module *mod; + + mutex_lock(&module_mutex); + mod =3D __module_address(laddr); + if (!mod) { + mutex_unlock(&module_mutex); + return addr; + } + mutex_unlock(&module_mutex); + /* The module shouldn't be going away if someone is trying to write to = it */ + + return (void *)perm_writable_addr(module_get_allocation(mod, laddr), la= ddr); +} + static inline bool within_module_core(unsigned long addr, const struct module *mod) { @@ -853,6 +870,11 @@ void *dereference_module_function_descriptor(struct = module *mod, void *ptr) return ptr; } =20 +static inline void *module_adjust_writable_addr(void *addr) +{ + return addr; +} + #endif /* CONFIG_MODULES */ =20 #ifdef CONFIG_SYSFS diff --git a/kernel/module.c b/kernel/module.c index 0b31c44798e2..d0afedd36cea 100644 --- a/kernel/module.c +++ b/kernel/module.c @@ -3457,7 +3457,7 @@ static int move_module(struct module *mod, struct l= oad_info *info) /* Transfer each section which specifies SHF_ALLOC */ pr_debug("final section addresses:\n"); for (i =3D 0; i < info->hdr->e_shnum; i++) { - void *dest; + void *dest, *wdest; struct perm_allocation *alloc; =20 Elf_Shdr *shdr =3D &info->sechdrs[i]; @@ -3470,9 +3470,10 @@ static int move_module(struct module *mod, struct = load_info *info) else alloc =3D get_alloc_from_layout(&mod->core_layout, shdr->sh_entsize); dest =3D (void *)perm_alloc_address(alloc) + (shdr->sh_entsize & ~ALL_= OFFSET_MASK); + wdest =3D (void *)perm_writable_addr(alloc, (unsigned long)dest); =20 if (shdr->sh_type !=3D SHT_NOBITS) - memcpy(dest, (void *)shdr->sh_addr, shdr->sh_size); + memcpy(wdest, (void *)shdr->sh_addr, shdr->sh_size); /* Update sh_addr to point to copy in image. */ shdr->sh_addr =3D (unsigned long)dest; pr_debug("\t0x%lx %s\n", @@ -3645,12 +3646,15 @@ int __weak module_finalize(const Elf_Ehdr *hdr, =20 static int post_relocation(struct module *mod, const struct load_info *i= nfo) { + struct exception_table_entry *extable_writ =3D module_adjust_writable_a= ddr(mod->extable); + void *pcpu =3D (void *)info->sechdrs[info->index.pcpu].sh_addr; + void *percpu_writ =3D module_adjust_writable_addr(pcpu); + /* Sort exception table now relocations are done. */ - sort_extable(mod->extable, mod->extable + mod->num_exentries); + sort_extable(extable_writ, mod->extable + mod->num_exentries); =20 /* Copy relocated percpu area over. */ - percpu_modcopy(mod, (void *)info->sechdrs[info->index.pcpu].sh_addr, - info->sechdrs[info->index.pcpu].sh_size); + percpu_modcopy(mod, percpu_writ, info->sechdrs[info->index.pcpu].sh_siz= e); =20 /* Setup kallsyms-specific fields. */ add_kallsyms(mod, info); --=20 2.20.1