Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp9830729rwl; Wed, 11 Jan 2023 10:31:49 -0800 (PST) X-Google-Smtp-Source: AMrXdXvsG0MpE3qZrEKYrGcoEhLZGpX3zRFe6/rKVdQgO/mMpibQMM+0lajy3ycev9X4xZMkMdln X-Received: by 2002:a05:6a20:c11f:b0:b5:f664:b4d0 with SMTP id bh31-20020a056a20c11f00b000b5f664b4d0mr10124718pzb.29.1673461909007; Wed, 11 Jan 2023 10:31:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673461908; cv=none; d=google.com; s=arc-20160816; b=QUJReNAIGo467m6OyYw/UOiYx39e0+KhanzQNjznuvYBpQwI4fVHCxoRJiciz4Xckt VxSycXss8FBTgv2t6fzOmc9/NwK/EGNHq0tqr20Cd8wjPrAAOm2VnEK0LOG0GWpEB9xJ MlShA89dYNjVQv3ylDFHaITKbl2PaU3MgY3diVAoKBTcGbcqfhW8V0OISBSWfVvVzpyA 1LsY38x4JQ0R6UgotRVaVkEX/o6uCc0S+SN/QPYmxE8Phwenyzpjo6f5DrN3wlxpWbOT FsJGsnp8BTipwAS/ex46eCoCTnR00RByFsSG6an39/qBv4oK4Po8h6bvG65qzkOY8oHd fBHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=w4Mq7pXpA1c3/QjzRQ8Oyqn8tP8k/8p0/fFIqKxxYIQ=; b=nEdR7COmjhUISCfQ37fJk3XcYMxyNaArquhHNR9O3Uy5430ir6qIiTwrMxnT5+m3d+ 3ijP6SBpQHE0Pi6WL76GNL4ZCR3fq2uKMp60TNSYInBOeHYkdIZ4dE9hy8Tw5fkwdrdo ow0tNSI1lXNqeJbisZ+01V8F1SDeMqI+B587Jq0cmhgWBnGACgw1QbsY5TEG/gYYKkKP or4a276yyOzVBRw21UcFBdqws8cfUUHFaHbYmDPEK8z074kZEOuR54WzvK/CzY4n/g5d uOcVSEhfPq+gz9LL2jK0iKV4iAVuRpGokCq69FdVoz/jENkICn1ysTg9fyUqnjcysOcw Q5Cw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=czU7dXOS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b7-20020a656687000000b00476c3ac7347si15804647pgw.443.2023.01.11.10.31.42; Wed, 11 Jan 2023 10:31:48 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=czU7dXOS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231831AbjAKRjm (ORCPT + 51 others); Wed, 11 Jan 2023 12:39:42 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37128 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239705AbjAKRjE (ORCPT ); Wed, 11 Jan 2023 12:39:04 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B2068283 for ; Wed, 11 Jan 2023 09:38:59 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 54D3E61D7F for ; Wed, 11 Jan 2023 17:38:59 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id B39FFC433F0; Wed, 11 Jan 2023 17:38:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1673458738; bh=K5LfG8dFO3rNexQDpl+a41K4B9mZRGfxQqhemPNCU04=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=czU7dXOSfcsOqIboHToPyV7iEPq1L8ToFvPId0uE2OjzhX4nK7iEJsfConH+6m6qH pkeMD6eFCM5trAYUOSMyedRVsSLx+obzAwFC1fn1PVni/YKJSWmP8LvPcCFpDwnIk/ ftu06kHqsX+g0mcVIDKNAr9oftb3UZAl+Gd2ro+7WyhugXnsWF461IeAF5B2uclHSx 0uUdG2DMu39AcfRpNiTkjT0nBzaenESljaGhg4x9KHTbDubYoa9Og18P9PBg2hszJV WIC2lVR9zZOg2Mtj/PnHzo3pNPmbBPdJAOSS2ERbTE4H9yNmpWC2Ca2JPiGTMRAttb 9Wu7+lkoOcgNQ== Date: Thu, 12 Jan 2023 01:28:40 +0800 From: Jisheng Zhang To: Palmer Dabbelt Cc: Paul Walmsley , aou@eecs.berkeley.edu, ryabinin.a.a@gmail.com, glider@google.com, andreyknvl@gmail.com, dvyukov@google.com, vincenzo.frascino@arm.com, alexandre.ghiti@canonical.com, linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com Subject: Re: [PATCH v6 RESEND 0/2] use static key to optimize pgtable_l4_enabled Message-ID: References: <20220821140918.3613-1-jszhang@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Dec 11, 2022 at 06:44:04PM +0800, Jisheng Zhang wrote: > On Sat, Oct 08, 2022 at 10:28:35PM +0800, Jisheng Zhang wrote: > > On Thu, Oct 06, 2022 at 04:37:57PM +0800, Jisheng Zhang wrote: > > > On Wed, Oct 05, 2022 at 06:05:28PM -0700, Palmer Dabbelt wrote: > > > > On Sun, 21 Aug 2022 07:09:16 PDT (-0700), jszhang@kernel.org wrote: > > > > > The pgtable_l4|[l5]_enabled check sits at hot code path, performance > > > > > is impacted a lot. Since pgtable_l4|[l5]_enabled isn't changed after > > > > > boot, so static key can be used to solve the performance issue[1]. > > > > > > > > > > An unified way static key was introduced in [2], but it only targets > > > > > riscv isa extension. We dunno whether SV48 and SV57 will be considered > > > > > as isa extension, so the unified solution isn't used for > > > > > pgtable_l4[l5]_enabled now. > > > > > > > > > > patch1 fixes a NULL pointer deference if static key is used a bit earlier. > > > > > patch2 uses the static key to optimize pgtable_l4|[l5]_enabled. > > > > > > > > > > [1] http://lists.infradead.org/pipermail/linux-riscv/2021-December/011164.html > > > > > [2] https://lore.kernel.org/linux-riscv/20220517184453.3558-1-jszhang@kernel.org/T/#t > > > > > > > > > > Since v5: > > > > > - Use DECLARE_STATIC_KEY_FALSE > > > > > > > > > > Since v4: > > > > > - rebased on v5.19-rcN > > > > > - collect Reviewed-by tags > > > > > - Fix kernel panic issue if SPARSEMEM is enabled by moving the > > > > > riscv_finalise_pgtable_lx() after sparse_init() > > > > > > > > > > Since v3: > > > > > - fix W=1 call to undeclared function 'static_branch_likely' error > > > > > > > > > > Since v2: > > > > > - move the W=1 warning fix to a separate patch > > > > > - move the unified way to use static key to a new patch series. > > > > > > > > > > Since v1: > > > > > - Add a W=1 warning fix > > > > > - Fix W=1 error > > > > > - Based on v5.18-rcN, since SV57 support is added, so convert > > > > > pgtable_l5_enabled as well. > > > > > > > > > > > > > > > Jisheng Zhang (2): > > > > > riscv: move sbi_init() earlier before jump_label_init() > > > > > riscv: turn pgtable_l4|[l5]_enabled to static key for RV64 > > > > > > > > > > arch/riscv/include/asm/pgalloc.h | 16 ++++---- > > > > > arch/riscv/include/asm/pgtable-32.h | 3 ++ > > > > > arch/riscv/include/asm/pgtable-64.h | 60 ++++++++++++++++++--------- > > > > > arch/riscv/include/asm/pgtable.h | 5 +-- > > > > > arch/riscv/kernel/cpu.c | 4 +- > > > > > arch/riscv/kernel/setup.c | 2 +- > > > > > arch/riscv/mm/init.c | 64 ++++++++++++++++++----------- > > > > > arch/riscv/mm/kasan_init.c | 16 ++++---- > > > > > 8 files changed, 104 insertions(+), 66 deletions(-) > > > > > > > > Sorry for being slow here, but it looks like this still causes some early > > > > boot hangs. Specifically kasan+sparsemem is failing. As you can probably > > > > see from the latency I'm still a bit buried right now so I'm not sure when > > > > I'll have a chance to take more of a look. > > > > > > Hi Palmer, > > > > > > Before V4, there is a bug which can cause kernel panic when SPARSEMEM > > > is enabled, V4 have fixed it by moving the riscv_finalise_pgtable_lx() > > > after sparse_init(). And I just tested the riscv-pgtable_static_key > > > branch in your tree, enabling KASAN and SPARSEMEM, system booted fine. > > > I'm not sure what happened. Could you please send me your kernel > > > config file? I want to fix any issue which can block this series being > > > merged in 6.1-rc1. > > > > Hi Palmer, > > > > I know you are busy ;) Do you have time to send me your test kernel > > config file so that I can reproduce the "early boot hang"? > > > > Thanks > > Hi Palmer, > > I think the early boot hangs maybe the same as the one which has been > fixed by commit 9f2ac64d6ca6 ("riscv: mm: add missing memcpy in > kasan_init"). Will you give this series another try for v6.2-rc1? If > the boot hang can still be reproduced, could you please send me your > .config file? > > Thanks in advance Hi all, Just request to comment what to do with this patch, I think there are two independent points to consult: 1. IIRC, Palmer gave this patch two chances to merge in early versions but he found boot hangs if enable KASAN and SPARSEMEM, while I can't reproduce the boot hang. And I also expect the hang should be fixed by commit 9f2ac64d6ca6 ("riscv: mm: add missing memcpy in kasan_init") 2. Now we know alternative is preferred than static branch for ISA extensions dynamic code patching. So we also need to switch static branch usage here to alternative mechanism, but the problem is SV48 and SV57 are not ISA extensions, so we can't directly make use of the recently introduced riscv_has_extension_likely|unlikely()[1] which is based on alternative mechanism. Any comments are appreciated. Thanks in advance [1] https://lore.kernel.org/linux-riscv/20230111171027.2392-1-jszhang@kernel.org/T/#t