Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp4322715rwb; Mon, 21 Nov 2022 06:23:54 -0800 (PST) X-Google-Smtp-Source: AA0mqf49Qt3YInmaQQWJo4w+2oLn2fkKb7czQswmVLWwNWiohnvbkLvrYufGjQqybjziXPRwrlFF X-Received: by 2002:a17:906:1811:b0:7ae:5a4:5356 with SMTP id v17-20020a170906181100b007ae05a45356mr5904233eje.748.1669040634771; Mon, 21 Nov 2022 06:23:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669040634; cv=none; d=google.com; s=arc-20160816; b=PnAkc9v8vSggR0zydQtSJ/8yaWxarscjZHjZ9bvYu7t4WARYcHhARHJNuUUqaX5MEI sLcTl32Vl0ocP2PLokoNKyIWZvK65wHc2cnTADc3t68F59ARJl8YWdB3+e9Gw3AS1hK2 pru6JiP8KjyshVSynN8c5nlLwaiXdME3tHga/xgaUwYqMxZPGY4fcksUAhiIjmqzkssR cbV8vgD2WlTCwqpAhAg8/7XDwSdSQf00xwF/pqEO/AqGz3PDlSDv2Nj1RzOcD7T1+jr9 Qie5v9/FVbCk5hZCcaj3Fzn4Q52l2I5W4ai0pnDIkY0B9pO2cmqviHetlvpYl5SASy4j Dy6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=+xHEEUh913WLTZsJSaqAH0IdYKg8L6nRiI6Nwm1yfyE=; b=LevwLN+UuzppMmwkLf25JOyegkuaY1lYX+8t0wQk5nYa2+ngZrK/juivDkwgw5jGsy 6Y8+Ke5OKori959Mfplhb7AL3GJ/1sIgxM9U7hLcp6rOwqMINbUvK61oCGdwugbUEHsS NJsgYr+Vh9f+aTac614dvLLLQPgkBRZ3HQVPKOD7/zfnkhpL0krrHgu31/P/CEjEXaJD m7vULfL6ANhmU8h88ug7TI7sDQ/q0L3s9BGu3ev2lI6wFjJzRTLQF25bKKd4HLE4BwLK MGbvshyV5Kzl9+uYLG+sIxXDYqcqIoHLsarmT0ArTjWulstlFOKWn2KPyCbJeR6dvvxM bkzg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id dr9-20020a170907720900b0078db6f56d51si9366939ejc.808.2022.11.21.06.23.20; Mon, 21 Nov 2022 06:23:54 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231437AbiKUN6u (ORCPT + 92 others); Mon, 21 Nov 2022 08:58:50 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34376 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231496AbiKUN4j (ORCPT ); Mon, 21 Nov 2022 08:56:39 -0500 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 83A13C6222 for ; Mon, 21 Nov 2022 05:56:30 -0800 (PST) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 007C21FB; Mon, 21 Nov 2022 05:56:36 -0800 (PST) Received: from [10.57.71.118] (unknown [10.57.71.118]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 239AE3F73B; Mon, 21 Nov 2022 05:56:28 -0800 (PST) Message-ID: <5b69ff03-1694-bae6-3312-a63273be4073@arm.com> Date: Mon, 21 Nov 2022 13:56:22 +0000 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:102.0) Gecko/20100101 Thunderbird/102.5.0 Subject: Re: [PATCH] arm64/mm: Drop redundant BUG_ON(!pgtable_alloc) Content-Language: en-GB To: Mark Rutland , Anshuman Khandual Cc: Nathan Chancellor , linux-arm-kernel@lists.infradead.org, Catalin Marinas , Will Deacon , Andrew Morton , linux-kernel@vger.kernel.org, llvm@lists.linux.dev References: <20221118053102.500216-1-anshuman.khandual@arm.com> From: Robin Murphy In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022-11-21 12:27, Mark Rutland wrote: > On Mon, Nov 21, 2022 at 11:00:42AM +0530, Anshuman Khandual wrote: >> Hello Nathan, >> >> Thanks for the report. >> >> On 11/20/22 21:46, Nathan Chancellor wrote: >>> Hi Anshuman, > >>> I just bisected a boot failure in our QEMU-based continuous integration >>> setup to this change as commit 9ed2b4616d4e ("arm64/mm: Drop redundant >>> BUG_ON(!pgtable_alloc)") in the arm64 tree. There is no output so the >>> panic clearly happens early at boot. If I move back to the previous >>> commit and add a WARN_ON() like so: >>> >>> diff --git a/arch/arm64/mm/mmu.c b/arch/arm64/mm/mmu.c >>> index d386033a074c..9280a92ff920 100644 >>> --- a/arch/arm64/mm/mmu.c >>> +++ b/arch/arm64/mm/mmu.c >>> @@ -383,6 +383,7 @@ static void __create_pgd_mapping_locked(pgd_t *pgdir, phys_addr_t phys, >>> phys &= PAGE_MASK; >>> addr = virt & PAGE_MASK; >>> end = PAGE_ALIGN(virt + size); >>> + WARN_ON(!pgtable_alloc); >>> >>> do { >>> next = pgd_addr_end(addr, end); >>> >>> I do see some stacktraces. I have attached the boot log from QEMU. >>> >>> If there is any additional information I can provide or patches I can >>> test, I am more than happy to do so. >> >> There are couple of instances, where __create_pgd_mapping() function gets called >> without a valid pgtable alloc function (NULL is passed on instead), as it is not >> expected to allocate page table pages, during the mapping process. The following >> change after this patch should solve the reported problem. >> >> diff --git a/arch/arm64/mm/mmu.c b/arch/arm64/mm/mmu.c >> index 9ea8e9039992..a00563122fcb 100644 >> --- a/arch/arm64/mm/mmu.c >> +++ b/arch/arm64/mm/mmu.c >> @@ -42,6 +42,7 @@ >> #define NO_BLOCK_MAPPINGS BIT(0) >> #define NO_CONT_MAPPINGS BIT(1) >> #define NO_EXEC_MAPPINGS BIT(2) /* assumes FEAT_HPDS is not used */ >> +#define NO_ALLOC_MAPPINGS BIT(3) /* does not allocate page table pages */ >> >> int idmap_t0sz __ro_after_init; >> >> @@ -380,7 +381,7 @@ static void __create_pgd_mapping_locked(pgd_t *pgdir, phys_addr_t phys, >> phys &= PAGE_MASK; >> addr = virt & PAGE_MASK; >> end = PAGE_ALIGN(virt + size); >> - BUG_ON(!pgtable_alloc); >> + BUG_ON(!(flags & NO_ALLOC_MAPPINGS) && !pgtable_alloc); >> >> do { >> next = pgd_addr_end(addr, end); >> @@ -453,7 +454,7 @@ static void __init create_mapping_noalloc(phys_addr_t phys, unsigned long virt, >> return; >> } >> __create_pgd_mapping(init_mm.pgd, phys, virt, size, prot, NULL, >> - NO_CONT_MAPPINGS); >> + NO_CONT_MAPPINGS | NO_ALLOC_MAPPINGS); >> } >> >> void __init create_pgd_mapping(struct mm_struct *mm, phys_addr_t phys, >> @@ -481,7 +482,7 @@ static void update_mapping_prot(phys_addr_t phys, unsigned long virt, >> } >> >> __create_pgd_mapping(init_mm.pgd, phys, virt, size, prot, NULL, >> - NO_CONT_MAPPINGS); >> + NO_CONT_MAPPINGS | NO_ALLOC_MAPPINGS); >> >> /* flush the TLBs after updating live kernel mappings */ >> flush_tlb_kernel_range(virt, virt + size); > > This is now more complicated than what we had originally, and it doesn't catch > the case where the caller sets NO_ALLOC_MAPPINGS but the callee ends up needing > to perform an allocation, which the old code would have caught. Well, it's still "caught" as such - all that BUG_ON(!pgtable_alloc) does in these cases is encode the source location in the backtrace, vs. having to decode it (if necessary) from the LR in a backtrace from immediately dereferencing pgtable_alloc(). If that happens before the user has a console up then the difference is moot anyway. Cheers, Robin.