Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp2926496ybk; Mon, 18 May 2020 11:17:00 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw9ki3Lf4vO4QFvEuaS5gbsEFnb/7soERgXi3hB2cVUpP1T/BJf7V+QUwz/0QHMcJpnYIHl X-Received: by 2002:a50:9603:: with SMTP id y3mr15280288eda.80.1589825820388; Mon, 18 May 2020 11:17:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589825820; cv=none; d=google.com; s=arc-20160816; b=qHzAxRO0JAh/vjT2ybZDkOAAUENSSoJgYJyh6HgQQHzU/zskwlEeTv3ALyVbYOSSxZ updsM4EG6RpuY7gXZd3hQtzazgCn4K3IvYq2OZVYckj3a/UVoVRUdgWTVYT+CPf9GbLv sCtfEKjj/d/Gm5KHlzs19bMONVK7KrLC0qEzYz/wJo58lS6AXMRZMdF9p2AMRUZgN4VM 6L6vLr5qh9ZJzGVyr+d3MfzQK1dGkoMLXU+ZqiOroQC9+O37tFZsvIfMjfP3CI/xT/CY yvPrXfb+iJU9Drigy6e+14DYs4F2876XqdRcFNXMHgs1ymn25bDAOMLpzTtuw/95pFHo LGlQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:ironport-sdr:ironport-sdr; bh=0Fsem/tTijW495oIjfJMMKjCvTDfT8x4eWY5xQad5rY=; b=UT3DlmaH3Y13n8aIF0uKF8RW8xeF5MMkmQq/6I+1KoGRTmrCN8xgSAsDalfy0nknuC kw9MnaMrMS92AZuk3E2/CKubgz7lZ40HBXZZBQVU2wjqHoaVU0Jp6P8uI4JnxuiXizYq 6ovSO/YvTk6y1XSt8S0yxAAHr8VGLPrMOZavYSg2Nx/oULtXBdU+jjwsgBaMoZhweVww a3uKJ/ocS3pwKyiYjIHaum6dEAVdwcQUzNewuuESuPTlVmZoqse8WTG534EA7MJYtGxQ WyUB5cV00isF0e1DrVZ3PqfAxwmlNODaXxxkcRGkuFrlxarHsAkTXplof5OR9n8F9uMA s7Nw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p31si1685740edb.296.2020.05.18.11.16.37; Mon, 18 May 2020 11:17:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732955AbgERSMH (ORCPT + 99 others); Mon, 18 May 2020 14:12:07 -0400 Received: from mga04.intel.com ([192.55.52.120]:52605 "EHLO mga04.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1733191AbgERSL7 (ORCPT ); Mon, 18 May 2020 14:11:59 -0400 IronPort-SDR: J7lJHpi9Bn2FDwYipCbFVsWQctskGUN1RT5vtQ5XQXv11B6nf87aGpNXckkZB51/SLrwubZyKW qVSsxLYUdY1g== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 May 2020 11:11:59 -0700 IronPort-SDR: ZuNQWmTQ1nLBxtu+5TE/j+AXF8rFdc6kEiAmzXEFcKTfs6vyQ9ShsZPXaT/ddSnQv64auWHBNE rrbMWn7+V4eA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.73,407,1583222400"; d="scan'208";a="373470912" Received: from iweiny-desk2.sc.intel.com ([10.3.52.147]) by fmsmga001.fm.intel.com with ESMTP; 18 May 2020 11:11:59 -0700 Date: Mon, 18 May 2020 11:11:59 -0700 From: Ira Weiny To: Guenter Roeck Cc: Mike Rapoport , Will Deacon , linux-kernel@vger.kernel.org, elver@google.com, tglx@linutronix.de, paulmck@kernel.org, mingo@kernel.org, peterz@infradead.org, "David S. Miller" Subject: Re: [PATCH v5 04/18] sparc32: mm: Reduce allocation size for PMD and PTE tables Message-ID: <20200518181158.GA3028105@iweiny-DESK2.sc.intel.com> References: <20200511204150.27858-1-will@kernel.org> <20200511204150.27858-5-will@kernel.org> <20200517000050.GA87467@roeck-us.net> <20200517000750.GA157503@roeck-us.net> <20200518083715.GA31383@willie-the-truck> <418aa44b-6fb3-c3d8-a920-1a26e5edec62@roeck-us.net> <20200518142310.GC1118872@kernel.org> <20200518160811.GA66689@roeck-us.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200518160811.GA66689@roeck-us.net> User-Agent: Mutt/1.11.1 (2018-12-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, May 18, 2020 at 09:08:11AM -0700, Guenter Roeck wrote: > On Mon, May 18, 2020 at 05:23:10PM +0300, Mike Rapoport wrote: > > On Mon, May 18, 2020 at 02:48:18AM -0700, Guenter Roeck wrote: > > > On 5/18/20 1:37 AM, Will Deacon wrote: > > > > On Sat, May 16, 2020 at 05:07:50PM -0700, Guenter Roeck wrote: > > > >> On Sat, May 16, 2020 at 05:00:50PM -0700, Guenter Roeck wrote: > > > >>> On Mon, May 11, 2020 at 09:41:36PM +0100, Will Deacon wrote: > > > >>>> Now that the page table allocator can free page table allocations > > > >>>> smaller than PAGE_SIZE, reduce the size of the PMD and PTE allocations > > > >>>> to avoid needlessly wasting memory. > > > >>>> > > > >>>> Cc: "David S. Miller" > > > >>>> Cc: Peter Zijlstra > > > >>>> Signed-off-by: Will Deacon > > > >>> > > > >>> Something in the sparc32 patches in linux-next causes all my sparc32 emulations > > > >>> to crash. bisect points to this patch, but reverting it doesn't help, and neither > > > >>> does reverting the rest of the series. > > > >>> > > > >> Actually, turns out I see the same pattern (lots of scheduling while atomic > > > >> followed by 'killing interrupt handler' in cryptomgr_test) with several > > > >> powerpc boot tests. I am currently bisecting those crashes. I'll report > > > >> the results here as well as soon as I have it. > > > > > > > > FWIW, I retested my sparc32 patches with PREEMPT=y and I don't see any > > > > issues. However, linux-next is a different story, where I don't get very far > > > > at all: > > > > > > > > BUG: Bad page state in process swapper pfn:005b4 > > > > This one seems to be due to commit 24aab577764f ("mm: memmap_init: > > iterate over memblock regions rather that check each PFN") and reverting > > it and partially reverting the next cleanup commits makes those > > dissapear. sparc32 boot still fails on today's linux-next and mmotm for me with > > > > Run /sbin/init as init process > > with arguments: > > /sbin/init > > with environment: > > HOME=/ > > TERM=linux > > Starting init: /sbin/init exists but couldn't execute it (error -14) > > > > Interesting; that is also seen on microblazeel:petalogix-ml605. Bisect there > suggests 'arch/kmap_atomic: consolidate duplicate code' as the culprit, > which is part of Ira's series. > > Today's -next is even worse, unfortunately; now all microblaze boot tests > (both little and big endian) fail, plus everything that failed last > time, plus new compile failures. Another round of bisects ... I've found this bug in microblaze for sure still looking through the other archs... commit 82c284b2bb74ca195dfcd35b70a175f010b9fd46 (HEAD -> lm-kmap17) Author: Ira Weiny Date: Mon May 18 11:01:10 2020 -0700 microblaze/kmap: Don't enable pagefault/preempt twice The kunmap_atomic clean up failed to remove the pagefault/preempt enables on this path. Fixes: bee2128a09e6 ("arch/kunmap_atomic: consolidate duplicate code") Signed-off-by: Ira Weiny diff --git a/arch/microblaze/mm/highmem.c b/arch/microblaze/mm/highmem.c index ee8a422b2b76..92e0890416c9 100644 --- a/arch/microblaze/mm/highmem.c +++ b/arch/microblaze/mm/highmem.c @@ -57,11 +57,8 @@ void kunmap_atomic_high(void *kvaddr) int type; unsigned int idx; - if (vaddr < __fix_to_virt(FIX_KMAP_END)) { - pagefault_enable(); - preempt_enable(); + if (vaddr < __fix_to_virt(FIX_KMAP_END)) return; - } type = kmap_atomic_idx();