From nobody Thu Apr 9 13:42:37 2026 Received: from mail-pl1-f181.google.com (mail-pl1-f181.google.com [209.85.214.181]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 73D9038F232 for ; Mon, 2 Mar 2026 15:51:03 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.181 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772466665; cv=none; b=heXIgITvJzf6+mSfX1vPBYQTvjE0XyK0vrqe0W5Ts/kUXmQj2fQw56kEVq1baRmvtGeKiwm/GSYW/sW+PLKmNxe5AyPfA3BUTCKT3SkUGF4YSlpJD+UOTPIiZ/bxE68Lr3eho1WaPrfOLBt71WeZlSx2o2WBu5XipRyuq0eWOHY= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772466665; c=relaxed/simple; bh=9btNLZk8U1UR9d6AEN3rPUFBMywkWOsT0Wm70l56Cms=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=WwvUCB+kmcW26bwjJB1T0LU4sgw3RiZFMS2nHZYDOnnofZiASXd7rCuy8NbTXHDeWxPjjkuRIB5Z00Nt1skBfmyLoPkP094dYKd6G4b26BUtJLxwKzhXFR8K3fvvkiQNkoSzt+X7ZpBnbXVp2eWN7/j73i2hCdMdWOo5IGkgJvM= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=hev.cc; spf=pass smtp.mailfrom=hev.cc; dkim=pass (2048-bit key) header.d=hev-cc.20230601.gappssmtp.com header.i=@hev-cc.20230601.gappssmtp.com header.b=AXDpSbGr; arc=none smtp.client-ip=209.85.214.181 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=hev.cc Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=hev.cc Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=hev-cc.20230601.gappssmtp.com header.i=@hev-cc.20230601.gappssmtp.com header.b="AXDpSbGr" Received: by mail-pl1-f181.google.com with SMTP id d9443c01a7336-2ae3a2f6007so14131105ad.2 for ; Mon, 02 Mar 2026 07:51:03 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hev-cc.20230601.gappssmtp.com; s=20230601; t=1772466662; x=1773071462; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=ZTP8GuicL4lDMlLNsmOlZZBi51EIqCGshrumwx1QleU=; b=AXDpSbGrQieDzXdRmV172mvN+mxXjTPn0NdEJtAS525EJs8fwCnx/d9pZkamn1ZECa hKUIYerBd/U/knnp0hXQTn5Vfv4GIbLprE7x3+IqiPRdX/vmk9dzUa9GoVj1V3jXSuiM rNE1Uk2+8I93Pq0++WV2dvaND6Z1EYYpHA5xjhNm+eZKqU2O6xjU/EhN2V5YPkVXlN0J /RW9sODsGoJGWL5JyKTdrbm2qTBji/LP/5AhrR4w4PqZoKtcOgtjrmdO5yfjdOXHyuVg qrLoV1lAx/wmDCdI9UMbhJIc3VPwScawQmlUGH3qQoyaK0IHlcL0NBGzcQql6EGxQkS/ jPjQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1772466662; x=1773071462; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=ZTP8GuicL4lDMlLNsmOlZZBi51EIqCGshrumwx1QleU=; b=kJ3VVp9yl2Sgz2J3/P/ZdJIqrN+TS3czkQpPf8rNtl6/AW67kYT0t0Q4Uzvc5WXGyE lH16lG75UjgA0ikYHe2MksfUyYLraTJHXCJqBpDTrHrmJ4lKVYLyahCYTm/p/CfgQ7A6 K7MxufWlXlHg/hGSw5MMdsABoI5qNP5Q9qQVkEkBxSWJhwctb1H7UOR4+DoGIxEn6Kyj xTJe0a7sF7UwSbK8VFPs+oy6dtUmy60Ljm2yLLldY5YugAwOFTQU/GGG94vkdwj55nZG rPvuTkScwo31/AedLjwO+svCvNgoAC8OewZkKxpKusuLbG1Zw6150XFI2bLM6s6Dg/M9 ayUw== X-Forwarded-Encrypted: i=1; AJvYcCXKtEuSDQU8b/FlL/DSvJEPUh2+gGBa9plMKS5LQaHhLLuIwXMYl0St2CZkCQUQY/svp1GW4rl9a3dquU8=@vger.kernel.org X-Gm-Message-State: AOJu0YzakadGWAjxVH+gzH1t2IJoH5R92blfHBnH8f/xtrwXo+SCvB7L h24fm021wNCqFGzk05UTf1Yk+YRu8dWqlb8TxteZnEb0d9usnf1DGhPt+QxT7ycaRKs= X-Gm-Gg: ATEYQzwfcryJfa8rXGyMlUfJLAirYVlVJtKBJ43VWdMde1Wdq/lQ75GxLgL/G1eJ0pV QDyQ61lbhYQPk3xXjU0gfVEIESAvaDKuowV5Nie1unyJdBQHfFT1cGaK/i8Ru/g9rSRK/NzX5+O a27yGQPjwb+fag7wAk0B3jXeBsb1qyJXxfhGpkOqjBKG+fO2vobtlyp0YtKdQuboWeSMniwV3CH 5I66+NyyytXAS+FrmZ4gAAgFJGMeB29uqCJD6ZjaqVClsT7JJjQ1FWg0Tf409XXX4jfKhT8dZ5C YWWS/rtxSP2JUI0nuhFILFhXykLg+/mg7Se7eMyy6PYSjTalXRDEj1EhBXH8z4BRRchnsX1bW+J cAowcGRVzAPdEWWb2BeIQuhVO2nx9nu3h1y6uLA3Tgmjrxa39ItY8CMGLpjGYqvsOBLBYs//MIs TpdLYZWjnf X-Received: by 2002:a17:903:3c6d:b0:2a9:47ff:1020 with SMTP id d9443c01a7336-2ae2e3e3c2emr111057265ad.8.1772466662493; Mon, 02 Mar 2026 07:51:02 -0800 (PST) Received: from localhost ([2400:8902:e002:de08:5754:7dac:85df:935a]) by smtp.gmail.com with ESMTPSA id d9443c01a7336-2adfb69f244sm153611115ad.59.2026.03.02.07.51.00 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 02 Mar 2026 07:51:02 -0800 (PST) From: WANG Rui To: Alexander Viro , Christian Brauner , Jan Kara , Kees Cook Cc: linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, WANG Rui Subject: [RFC PATCH] binfmt_elf: Align eligible read-only PT_LOAD segments to PMD_SIZE for THP Date: Mon, 2 Mar 2026 23:50:46 +0800 Message-ID: <20260302155046.286650-1-r@hev.cc> X-Mailer: git-send-email 2.53.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" When Transparent Huge Pages (THP) are enabled in "always" mode, file-backed read-only mappings can be backed by PMD-sized huge pages if they meet the alignment and size requirements. For ELF executables loaded by the kernel ELF binary loader, PT_LOAD segments are normally aligned according to p_align, which is often only page-sized. As a result, large read-only segments that are otherwise eligible may fail to be mapped using PMD-sized THP. Introduce a new Kconfig option, CONFIG_ELF_RO_LOAD_THP_ALIGNMENT, to allow bumping the maximum alignment of eligible read-only PT_LOAD segments to PMD_SIZE. A segment is considered eligible if: * THP is in "always" mode, * it is not writable, * both p_vaddr and p_offset are PMD-aligned, * its file size is at least PMD_SIZE, and * its existing p_align is smaller than PMD_SIZE. To avoid excessive address space padding on systems with very large PMD_SIZE values, this optimization is applied only when PMD_SIZE <=3D 32MB. This increases the likelihood that large text segments of ELF executables are backed by PMD-sized THP, reducing TLB pressure and improving performance for large binaries. This only affects ELF executables loaded directly by the kernel binary loader. Shared libraries loaded by user space (e.g. via the dynamic loader) are not affected. The behavior is guarded by CONFIG_ELF_RO_LOAD_THP_ALIGNMENT and depends on READ_ONLY_THP_FOR_FS, so existing systems remain unchanged unless explicitly enabled. Signed-off-by: WANG Rui --- fs/Kconfig.binfmt | 12 ++++++++++++ fs/binfmt_elf.c | 9 +++++++++ 2 files changed, 21 insertions(+) diff --git a/fs/Kconfig.binfmt b/fs/Kconfig.binfmt index 1949e25c7741..8d4271769e08 100644 --- a/fs/Kconfig.binfmt +++ b/fs/Kconfig.binfmt @@ -74,6 +74,18 @@ config ELFCORE help This option enables kernel/elfcore.o. =20 +config ELF_RO_LOAD_THP_ALIGNMENT + bool "Align read-only ELF load segments for THP (EXPERIMENTAL)" + depends on READ_ONLY_THP_FOR_FS + + help + Align eligible read-only ELF PT_LOAD segments to PMD_SIZE so + they can be mapped using PMD-sized Transparent Huge Pages + when THP is enabled in "always" mode. + + This only affects ELF executables loaded by the kernel ELF + binary loader. + config CORE_DUMP_DEFAULT_ELF_HEADERS bool "Write ELF core dumps with partial segments" default y diff --git a/fs/binfmt_elf.c b/fs/binfmt_elf.c index 8e89cc5b2820..2c2ccb041938 100644 --- a/fs/binfmt_elf.c +++ b/fs/binfmt_elf.c @@ -28,6 +28,7 @@ #include #include #include +#include #include #include #include @@ -500,6 +501,14 @@ static unsigned long maximum_alignment(struct elf_phdr= *cmds, int nr) /* skip non-power of two alignments as invalid */ if (!is_power_of_2(p_align)) continue; + +#if defined(CONFIG_ELF_RO_LOAD_THP_ALIGNMENT) && PMD_SIZE <=3D SZ_32M + if (hugepage_global_always() && !(cmds[i].p_flags & PF_W) + && IS_ALIGNED(cmds[i].p_vaddr | cmds[i].p_offset, PMD_SIZE) + && cmds[i].p_filesz >=3D PMD_SIZE && p_align < PMD_SIZE) + p_align =3D PMD_SIZE; +#endif + alignment =3D max(alignment, p_align); } } --=20 2.53.0