Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp1524581imw; Tue, 5 Jul 2022 10:56:10 -0700 (PDT) X-Google-Smtp-Source: AGRyM1uLdRVhHlMhmt5RrUS69A4ttMLPYeiwIvAPXOcJzWG6G/ceXQ8vRgEGRJ6CkJHMgwZGCyFh X-Received: by 2002:a63:1f66:0:b0:412:2f72:ec19 with SMTP id q38-20020a631f66000000b004122f72ec19mr11715098pgm.282.1657043770063; Tue, 05 Jul 2022 10:56:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657043770; cv=none; d=google.com; s=arc-20160816; b=qz4P88jwjSHASEPFCKZIUyMxNnuWJBw5FMgGH7uH/H1mvKlLT8iPGr5WLxSDd5cc3b NqvgVBmPgeemGEzsbAYHwt7lRaSUlDSMKz22naivCoUZCiXA7bvtC/jeRQMeTv6081jb BAqEv03L3DK4eKrEoWSpXpZ9YfdiPngKgD9H4OJ8/brRQ7PcUeQnA2t791/MFVf8TWkQ nS/X/yJPRuDDiSqo1KR7la8gPxp3W3iVIS72WN0ktYMiKjEKieG1R2Uvq89DSXEkxP/q bqugyvDePS2vvGBi01zDfxyV5CYAtjBl3O+vNdj0Eh3UTN7gcbmLt/lNXWsVpTu/K/tL 99wA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=W5mVUUdQ0mqwtqa4d2/uM8e6Nk2/bp0XzXOEo1uNU8E=; b=oB2uFwg4WZ+bW8ljwDIiKM6t4R45+QZjNoxSvh5Z2J+QgqkCc7mlgq2C54374LRhPc BPdQfJjGvO6wBTBGzLvNIlpn23ujCiHqZWDGbJ5b4od3AiXVz0vOBvlCtssdnT1xhH9g nrxDUEZj8BHBKlXXMS0F4cDmwxhB4WSD+0eaTbr5vdud/raJmyif4cYtPYspzY5bT4LX F8SyegBeZSCBgz3BUfK8dMXWolmEDC+ox4IR04zz4yIDA4N6c6hCeN2gCBj5ziRd7Tj0 /+k7MYvKfuHDqw+tAgbqnQtg+E1VxqjAtV8HRJgNO+rawimxn1bMBgAnOq1W04TNIvWj /EuA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n30-20020aa7985e000000b005105cb7e94fsi45289949pfq.271.2022.07.05.10.55.58; Tue, 05 Jul 2022 10:56:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230198AbiGERFP (ORCPT + 99 others); Tue, 5 Jul 2022 13:05:15 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56588 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229537AbiGERFN (ORCPT ); Tue, 5 Jul 2022 13:05:13 -0400 Received: from sin.source.kernel.org (sin.source.kernel.org [145.40.73.55]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 775B71AD82 for ; Tue, 5 Jul 2022 10:05:12 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sin.source.kernel.org (Postfix) with ESMTPS id E3425CE1B95 for ; Tue, 5 Jul 2022 17:05:10 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5071BC341C7; Tue, 5 Jul 2022 17:05:05 +0000 (UTC) Date: Tue, 5 Jul 2022 18:05:01 +0100 From: Catalin Marinas To: Mike Rapoport Cc: Will Deacon , "guanghui.fgh" , Ard Biesheuvel , baolin.wang@linux.alibaba.com, akpm@linux-foundation.org, david@redhat.com, jianyong.wu@arm.com, james.morse@arm.com, quic_qiancai@quicinc.com, christophe.leroy@csgroup.eu, jonathan@marek.ca, mark.rutland@arm.com, thunder.leizhen@huawei.com, anshuman.khandual@arm.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, geert+renesas@glider.be, linux-mm@kvack.org, yaohongbo@linux.alibaba.com, alikernel-developer@linux.alibaba.com Subject: Re: [PATCH v4] arm64: mm: fix linear mem mapping access performance degradation Message-ID: References: <20220704142313.GE31684@willie-the-truck> <6977c692-78ca-5a67-773e-0389c85f2650@linux.alibaba.com> <20220704163815.GA32177@willie-the-truck> <20220705095231.GB552@willie-the-truck> <5d044fdd-a61a-d60f-d294-89e17de37712@linux.alibaba.com> <20220705121115.GB1012@willie-the-truck> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-6.7 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 05, 2022 at 06:57:53PM +0300, Mike Rapoport wrote: > On Tue, Jul 05, 2022 at 04:34:09PM +0100, Catalin Marinas wrote: > > On Tue, Jul 05, 2022 at 06:02:02PM +0300, Mike Rapoport wrote: > > > +void __init remap_crashkernel(void) > > > +{ > > > +#ifdef CONFIG_KEXEC_CORE > > > + phys_addr_t start, end, size; > > > + phys_addr_t aligned_start, aligned_end; > > > + > > > + if (can_set_direct_map() || IS_ENABLED(CONFIG_KFENCE)) > > > + return; > > > + > > > + if (!crashk_res.end) > > > + return; > > > + > > > + start = crashk_res.start & PAGE_MASK; > > > + end = PAGE_ALIGN(crashk_res.end); > > > + > > > + aligned_start = ALIGN_DOWN(crashk_res.start, PUD_SIZE); > > > + aligned_end = ALIGN(end, PUD_SIZE); > > > + > > > + /* Clear PUDs containing crash kernel memory */ > > > + unmap_hotplug_range(__phys_to_virt(aligned_start), > > > + __phys_to_virt(aligned_end), false, NULL); > > > > What I don't understand is what happens if there's valid kernel data > > between aligned_start and crashk_res.start (or the other end of the > > range). > > Data shouldn't go anywhere :) > > There is > > + /* map area from PUD start to start of crash kernel with large pages */ > + size = start - aligned_start; > + __create_pgd_mapping(swapper_pg_dir, aligned_start, > + __phys_to_virt(aligned_start), > + size, PAGE_KERNEL, early_pgtable_alloc, 0); > > and > > + /* map area from end of crash kernel to PUD end with large pages */ > + size = aligned_end - end; > + __create_pgd_mapping(swapper_pg_dir, end, __phys_to_virt(end), > + size, PAGE_KERNEL, early_pgtable_alloc, 0); > > after the unmap, so after we tear down a part of a linear map we > immediately recreate it, just with a different page size. > > This all happens before SMP, so there is no concurrency at that point. That brief period of unmap worries me. The kernel text, data and stack are all in the vmalloc space but any other (memblock) allocation to this point may be in the unmapped range before and after the crashkernel reservation. The interrupts are off, so I think the only allocation and potential access that may go in this range is the page table itself. But it looks fragile to me. -- Catalin