Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp489157ybi; Thu, 30 May 2019 01:47:08 -0700 (PDT) X-Google-Smtp-Source: APXvYqxIYhzafL+QYuSxpZFn1SaxbpdSPJ7MnXXq7iNgiyXjMEPs8ElHI/Es0vOa85erb8B4m4Qk X-Received: by 2002:a17:90a:ac18:: with SMTP id o24mr2757073pjq.116.1559206027937; Thu, 30 May 2019 01:47:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559206027; cv=none; d=google.com; s=arc-20160816; b=gDqvE4+oVzEMSn5tLUgXjXxRPOrwMTpKzk3sqIXnpgScnL/lx4IZ1oq8j240si92o5 ixXQYJdr1uxyiGpI1p2sLZ46XyL7Y6qtb/JKVqtxe0HocO4qGYNVQ6AYOSPqULk2xjuo f/w1wMKApZ0/Fvz1A6npmsptaCNJ89qEYi+kr9zls1/32oHPKn7aeAZ91MBUoJu6CBSZ HNuREJmrK7ogOvABP6RqeFTemyf9QSb9a/D5sUUcpiQCnTRk5juFSwWTiQLPsqZeRcZx eCaoPSTPODG/XL2Rye5oHcmYMInCHnSrzPLEVX5gsZ6RGhWwTSwtJ+JVQNNKMK7MNBB2 zWJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=PbbopYt5RnxPcJyw1xdNAh/npM0KuRWp8lUq22MpNds=; b=MMFFyoyKuFq3PIJYeFokUkXN2Ec+L0pP3OQ0fjNEp9MKSwCLp2EPCUIYhFE15OJHrZ 19ADpKvpfTmOQiXYaoiV2YqiZJj+wX4pY00h2KAJ2TPtCW2xY1diYPWA4bcsUdaMDlvy fDTjcazANCi/x85FUOOGIbQXQnzK9QNVqjCPRCnuAtp1o/RQx3YvjTJuUKBwZd+E1oN+ jR1DdO6GdUMAGscb3Xwr8ORt6j4LjvbZ+OX3IfwHBrUG1ZVDEKcbx5Wc0tqUCu4Q+k0F 3dDa+6ylcLm0Ko0Wck6hM6C8TwzcnYNWJKQE7K9uJyFSa1jWqHHtcTLTJMyRj8ju35aZ O+ww== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g191si2889866pgc.197.2019.05.30.01.46.51; Thu, 30 May 2019 01:47:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727377AbfE3Hou (ORCPT + 99 others); Thu, 30 May 2019 03:44:50 -0400 Received: from mx2.cyber.ee ([193.40.6.72]:37104 "EHLO mx2.cyber.ee" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726027AbfE3Hou (ORCPT ); Thu, 30 May 2019 03:44:50 -0400 Subject: Re: [PATCH] vmalloc: Don't use flush flag when no exec perm To: "Edgecombe, Rick P" , "linux-kernel@vger.kernel.org" , "peterz@infradead.org" , "davem@davemloft.net" , "sparclinux@vger.kernel.org" , "netdev@vger.kernel.org" Cc: "daniel@iogearbox.net" , "jeyu@kernel.org" , "ast@kernel.org" , "ard.biesheuvel@arm.com" , "will.deacon@arm.com" , "namit@vmware.com" , "luto@kernel.org" , "Hansen, Dave" References: <20190529055104.6822-1-rick.p.edgecombe@intel.com> <89d6dee949e4418f0cca4cc6c4c9b526c1a5c497.camel@intel.com> From: Meelis Roos Message-ID: <67241836-621c-6933-1278-f04aedcefcb3@linux.ee> Date: Thu, 30 May 2019 10:44:47 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: <89d6dee949e4418f0cca4cc6c4c9b526c1a5c497.camel@intel.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: et-EE Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org >> The addition of VM_FLUSH_RESET_PERMS for BPF JIT allocations was >> bisected to prevent boot on an UltraSparc III machine. It was found >> that >> sometime shortly after the TLB flush this flag does on vfree of the >> BPF >> program, the machine hung. Further investigation showed that before >> any of >> the changes for this flag were introduced, with >> CONFIG_DEBUG_PAGEALLOC >> configured (which does a similar TLB flush of the vmalloc range on >> every vfree), this machine also hung shortly after the first vmalloc >> unmap/free. >> >> So the evidence points to there being some existing issue with the >> vmalloc TLB flushes, but it's still unknown exactly why these hangs >> are >> happening on sparc. It is also unknown when someone with this >> hardware >> could resolve this, and in the meantime using this flag on it turns a >> lurking behavior into something that prevents boot. > > The sparc TLB flush issue has been bisected and is being worked on now, > so hopefully we won't need this patch: > https://marc.info/?l=linux-sparc&m=155915694304118&w=2 And the sparc64 patch that fixes CONFIG_DEBUG_PAGEALLOC also fixes booting of the latest git kernel on Sun V445 where my problem initially happened. -- Meelis Roos