From: Josh Poimboeuf <jpoimboe@redhat.com>
To: x86@kernel.org
Cc: linux-kernel@vger.kernel.org,
Ard Biesheuvel <ard.biesheuvel@linaro.org>,
Andy Lutomirski <luto@kernel.org>,
Steven Rostedt <rostedt@goodmis.org>,
Peter Zijlstra <peterz@infradead.org>,
Ingo Molnar <mingo@kernel.org>,
Thomas Gleixner <tglx@linutronix.de>,
Linus Torvalds <torvalds@linux-foundation.org>,
Masami Hiramatsu <mhiramat@kernel.org>,
Jason Baron <jbaron@akamai.com>, Jiri Kosina <jkosina@suse.cz>,
David Laight <David.Laight@ACULAB.COM>,
Borislav Petkov <bp@alien8.de>, Julia Cartwright <julia@ni.com>,
Jessica Yu <jeyu@kernel.org>, "H. Peter Anvin" <hpa@zytor.com>,
Nadav Amit <namit@vmware.com>,
Rasmus Villemoes <linux@rasmusvillemoes.dk>,
Edward Cree <ecree@solarflare.com>,
Daniel Bristot de Oliveira <bristot@redhat.com>
Subject: [PATCH v3 3/6] x86/static_call: Add out-of-line static call implementation
Date: Wed, 9 Jan 2019 16:59:38 -0600 [thread overview]
Message-ID: <30f0713894a415f13e0f0ea3d40595416db2f6d7.1547073843.git.jpoimboe@redhat.com> (raw)
In-Reply-To: <cover.1547073843.git.jpoimboe@redhat.com>
Add the x86 out-of-line static call implementation. For each key, a
permanent trampoline is created which is the destination for all static
calls for the given key. The trampoline has a direct jump which gets
patched by static_call_update() when the destination function changes.
This relies on the fact that call destinations can be atomically updated
as long as they don't cross cache line boundaries.
Signed-off-by: Josh Poimboeuf <jpoimboe@redhat.com>
---
arch/x86/Kconfig | 1 +
arch/x86/include/asm/static_call.h | 27 +++++++++++++++++++++
arch/x86/kernel/Makefile | 1 +
arch/x86/kernel/static_call.c | 38 ++++++++++++++++++++++++++++++
arch/x86/kernel/vmlinux.lds.S | 1 +
include/asm-generic/vmlinux.lds.h | 15 ++++++++++++
6 files changed, 83 insertions(+)
create mode 100644 arch/x86/include/asm/static_call.h
create mode 100644 arch/x86/kernel/static_call.c
diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
index 6185d4f33296..421097322f1b 100644
--- a/arch/x86/Kconfig
+++ b/arch/x86/Kconfig
@@ -190,6 +190,7 @@ config X86
select HAVE_FUNCTION_ARG_ACCESS_API
select HAVE_STACKPROTECTOR if CC_HAS_SANE_STACKPROTECTOR
select HAVE_STACK_VALIDATION if X86_64
+ select HAVE_STATIC_CALL
select HAVE_RSEQ
select HAVE_SYSCALL_TRACEPOINTS
select HAVE_UNSTABLE_SCHED_CLOCK
diff --git a/arch/x86/include/asm/static_call.h b/arch/x86/include/asm/static_call.h
new file mode 100644
index 000000000000..fab5facade03
--- /dev/null
+++ b/arch/x86/include/asm/static_call.h
@@ -0,0 +1,27 @@
+/* SPDX-License-Identifier: GPL-2.0 */
+#ifndef _ASM_STATIC_CALL_H
+#define _ASM_STATIC_CALL_H
+
+#include <asm/asm-offsets.h>
+
+/*
+ * This trampoline is used for out-of-line static calls. It has a direct jump
+ * which gets patched by static_call_update().
+ *
+ * Trampolines are placed in the .static_call.text section to prevent two-byte
+ * tail calls to the trampoline and two-byte jumps from the trampoline.
+ *
+ * IMPORTANT: The JMP instruction's 4-byte destination must never cross
+ * cacheline boundaries! The patching code relies on that to ensure
+ * atomic updates.
+ */
+#define ARCH_DEFINE_STATIC_CALL_TRAMP(key, func) \
+ asm(".pushsection .static_call.text, \"ax\" \n" \
+ ".align 8 \n" \
+ ".globl " STATIC_CALL_TRAMP_STR(key) " \n" \
+ ".type " STATIC_CALL_TRAMP_STR(key) ", @function \n" \
+ STATIC_CALL_TRAMP_STR(key) ": \n" \
+ "jmp " #func " \n" \
+ ".popsection \n")
+
+#endif /* _ASM_STATIC_CALL_H */
diff --git a/arch/x86/kernel/Makefile b/arch/x86/kernel/Makefile
index 00b7e27bc2b7..f1329a79fd3b 100644
--- a/arch/x86/kernel/Makefile
+++ b/arch/x86/kernel/Makefile
@@ -63,6 +63,7 @@ obj-y += tsc.o tsc_msr.o io_delay.o rtc.o
obj-y += pci-iommu_table.o
obj-y += resource.o
obj-y += irqflags.o
+obj-y += static_call.o
obj-y += process.o
obj-y += fpu/
diff --git a/arch/x86/kernel/static_call.c b/arch/x86/kernel/static_call.c
new file mode 100644
index 000000000000..e6ef53fbce20
--- /dev/null
+++ b/arch/x86/kernel/static_call.c
@@ -0,0 +1,38 @@
+// SPDX-License-Identifier: GPL-2.0
+#include <linux/static_call.h>
+#include <linux/memory.h>
+#include <linux/bug.h>
+#include <asm/text-patching.h>
+#include <asm/nospec-branch.h>
+
+#define CALL_INSN_SIZE 5
+
+void __ref arch_static_call_transform(void *site, void *tramp, void *func)
+{
+ s32 dest_relative;
+ unsigned char opcode;
+ void *(*poker)(void *, const void *, size_t);
+ void *insn = tramp;
+
+ mutex_lock(&text_mutex);
+
+ /*
+ * For x86-64, a 32-bit cross-modifying write to a call destination is
+ * safe as long as it's within a cache line.
+ */
+ opcode = *(unsigned char *)insn;
+ if (opcode != 0xe8 && opcode != 0xe9) {
+ WARN_ONCE(1, "unexpected static call insn opcode 0x%x at %pS",
+ opcode, insn);
+ goto done;
+ }
+
+ dest_relative = (long)(func) - (long)(insn + CALL_INSN_SIZE);
+
+ poker = early_boot_irqs_disabled ? text_poke_early : text_poke;
+ poker(insn + 1, &dest_relative, sizeof(dest_relative));
+
+done:
+ mutex_unlock(&text_mutex);
+}
+EXPORT_SYMBOL_GPL(arch_static_call_transform);
diff --git a/arch/x86/kernel/vmlinux.lds.S b/arch/x86/kernel/vmlinux.lds.S
index 0d618ee634ac..17470e88ac40 100644
--- a/arch/x86/kernel/vmlinux.lds.S
+++ b/arch/x86/kernel/vmlinux.lds.S
@@ -128,6 +128,7 @@ SECTIONS
CPUIDLE_TEXT
LOCK_TEXT
KPROBES_TEXT
+ STATIC_CALL_TEXT
ALIGN_ENTRY_TEXT_BEGIN
ENTRY_TEXT
IRQENTRY_TEXT
diff --git a/include/asm-generic/vmlinux.lds.h b/include/asm-generic/vmlinux.lds.h
index 3d7a6a9c2370..f2981a0161f2 100644
--- a/include/asm-generic/vmlinux.lds.h
+++ b/include/asm-generic/vmlinux.lds.h
@@ -320,6 +320,7 @@
__start_ro_after_init = .; \
*(.data..ro_after_init) \
JUMP_TABLE_DATA \
+ STATIC_CALL_SITES \
__end_ro_after_init = .;
#endif
@@ -530,6 +531,10 @@
*(.kprobes.text) \
__kprobes_text_end = .;
+#define STATIC_CALL_TEXT \
+ ALIGN_FUNCTION(); \
+ *(.static_call.text)
+
#define ENTRY_TEXT \
ALIGN_FUNCTION(); \
__entry_text_start = .; \
@@ -725,6 +730,16 @@
#define BUG_TABLE
#endif
+#ifdef CONFIG_HAVE_STATIC_CALL_INLINE
+#define STATIC_CALL_SITES \
+ . = ALIGN(8); \
+ __start_static_call_sites = .; \
+ KEEP(*(.static_call_sites)) \
+ __stop_static_call_sites = .;
+#else
+#define STATIC_CALL_SITES
+#endif
+
#ifdef CONFIG_UNWINDER_ORC
#define ORC_UNWIND_TABLE \
. = ALIGN(4); \
--
2.17.2
next prev parent reply other threads:[~2019-01-09 23:00 UTC|newest]
Thread overview: 90+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-01-09 22:59 [PATCH v3 0/6] Static calls Josh Poimboeuf
2019-01-09 22:59 ` [PATCH v3 1/6] compiler.h: Make __ADDRESSABLE() symbol truly unique Josh Poimboeuf
2019-01-09 22:59 ` [PATCH v3 2/6] static_call: Add basic static call infrastructure Josh Poimboeuf
2019-01-10 14:03 ` Edward Cree
2019-01-10 18:37 ` Josh Poimboeuf
2019-01-09 22:59 ` Josh Poimboeuf [this message]
2019-01-10 0:16 ` [PATCH v3 3/6] x86/static_call: Add out-of-line static call implementation Nadav Amit
2019-01-10 16:28 ` Josh Poimboeuf
2019-01-09 22:59 ` [PATCH v3 4/6] static_call: Add inline static call infrastructure Josh Poimboeuf
2019-01-09 22:59 ` [PATCH v3 5/6] x86/alternative: Use a single access in text_poke() where possible Josh Poimboeuf
2019-01-10 9:32 ` Nadav Amit
2019-01-10 17:20 ` Josh Poimboeuf
2019-01-10 17:29 ` Nadav Amit
2019-01-10 17:32 ` Steven Rostedt
2019-01-10 17:42 ` Sean Christopherson
2019-01-10 17:57 ` Steven Rostedt
2019-01-10 18:04 ` Sean Christopherson
2019-01-10 18:21 ` Josh Poimboeuf
2019-01-10 18:24 ` Steven Rostedt
2019-01-11 12:10 ` Alexandre Chartre
2019-01-11 15:28 ` Josh Poimboeuf
2019-01-11 16:46 ` Alexandre Chartre
2019-01-11 16:57 ` Josh Poimboeuf
2019-01-11 17:41 ` Jason Baron
2019-01-11 17:54 ` Nadav Amit
2019-01-15 11:10 ` Alexandre Chartre
2019-01-15 16:19 ` Steven Rostedt
2019-01-15 16:45 ` Alexandre Chartre
2019-01-11 0:59 ` hpa
2019-01-11 1:34 ` Sean Christopherson
2019-01-11 8:13 ` hpa
2019-01-09 22:59 ` [PATCH v3 6/6] x86/static_call: Add inline static call implementation for x86-64 Josh Poimboeuf
2019-01-10 1:21 ` [PATCH v3 0/6] Static calls Nadav Amit
2019-01-10 16:44 ` Josh Poimboeuf
2019-01-10 17:32 ` Nadav Amit
2019-01-10 18:18 ` Josh Poimboeuf
2019-01-10 19:45 ` Nadav Amit
2019-01-10 20:32 ` Josh Poimboeuf
2019-01-10 20:48 ` Nadav Amit
2019-01-10 20:57 ` Josh Poimboeuf
2019-01-10 21:47 ` Nadav Amit
2019-01-10 17:31 ` Linus Torvalds
2019-01-10 20:51 ` H. Peter Anvin
2019-01-10 20:30 ` Peter Zijlstra
2019-01-10 20:52 ` Josh Poimboeuf
2019-01-10 23:02 ` Linus Torvalds
2019-01-11 0:56 ` Andy Lutomirski
2019-01-11 1:47 ` Nadav Amit
2019-01-11 15:15 ` Josh Poimboeuf
2019-01-11 15:48 ` Nadav Amit
2019-01-11 16:07 ` Josh Poimboeuf
2019-01-11 17:23 ` Nadav Amit
2019-01-11 19:03 ` Linus Torvalds
2019-01-11 19:17 ` Nadav Amit
2019-01-11 19:23 ` hpa
2019-01-11 19:33 ` Nadav Amit
2019-01-11 19:34 ` Linus Torvalds
2019-01-13 0:34 ` hpa
2019-01-13 0:36 ` hpa
2019-01-11 19:39 ` Jiri Kosina
2019-01-14 2:31 ` H. Peter Anvin
2019-01-14 2:40 ` H. Peter Anvin
2019-01-14 20:11 ` Andy Lutomirski
2019-01-14 22:00 ` H. Peter Anvin
2019-01-14 22:54 ` H. Peter Anvin
2019-01-15 3:05 ` Andy Lutomirski
2019-01-15 5:01 ` H. Peter Anvin
2019-01-15 5:37 ` H. Peter Anvin
2019-01-14 23:27 ` Andy Lutomirski
2019-01-14 23:51 ` Nadav Amit
2019-01-15 2:28 ` hpa
2019-01-11 20:04 ` Josh Poimboeuf
2019-01-11 20:12 ` Linus Torvalds
2019-01-11 20:31 ` Josh Poimboeuf
2019-01-11 20:46 ` Linus Torvalds
2019-01-11 21:05 ` Andy Lutomirski
2019-01-11 21:10 ` Linus Torvalds
2019-01-11 21:32 ` Josh Poimboeuf
2019-01-14 12:28 ` Peter Zijlstra
2019-01-11 21:22 ` Josh Poimboeuf
2019-01-11 21:23 ` Josh Poimboeuf
2019-01-11 21:25 ` Josh Poimboeuf
2019-01-11 21:36 ` Nadav Amit
2019-01-11 21:41 ` Josh Poimboeuf
2019-01-11 21:55 ` Steven Rostedt
2019-01-11 21:59 ` Nadav Amit
2019-01-11 21:56 ` Nadav Amit
2019-01-12 23:54 ` Andy Lutomirski
2020-02-17 21:10 ` Jann Horn
2020-02-17 21:57 ` Steven Rostedt
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=30f0713894a415f13e0f0ea3d40595416db2f6d7.1547073843.git.jpoimboe@redhat.com \
--to=jpoimboe@redhat.com \
--cc=David.Laight@ACULAB.COM \
--cc=ard.biesheuvel@linaro.org \
--cc=bp@alien8.de \
--cc=bristot@redhat.com \
--cc=ecree@solarflare.com \
--cc=hpa@zytor.com \
--cc=jbaron@akamai.com \
--cc=jeyu@kernel.org \
--cc=jkosina@suse.cz \
--cc=julia@ni.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux@rasmusvillemoes.dk \
--cc=luto@kernel.org \
--cc=mhiramat@kernel.org \
--cc=mingo@kernel.org \
--cc=namit@vmware.com \
--cc=peterz@infradead.org \
--cc=rostedt@goodmis.org \
--cc=tglx@linutronix.de \
--cc=torvalds@linux-foundation.org \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).