Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp9884246rwl; Wed, 11 Jan 2023 11:18:18 -0800 (PST) X-Google-Smtp-Source: AMrXdXtFpMXfqBqftMdk8yxh69rdAnOF1sf4yUoCM5MVDAlOcwBBY7F4hSSJcj6CNQJ4b8+1ZHy5 X-Received: by 2002:a50:fe94:0:b0:48e:a9a1:c584 with SMTP id d20-20020a50fe94000000b0048ea9a1c584mr27477184edt.35.1673464698150; Wed, 11 Jan 2023 11:18:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673464698; cv=none; d=google.com; s=arc-20160816; b=Mr+7oj+jspfFiL0UmwZC49/ht7xM2YfZi1YMWdHhox/9mB0xU82prKxBMNGE53yFY9 n7m0g95Ar7b27ZXisSZ9IKsUfowztDl59aAL38wDCS5dfLE78WsmOtqw84jJmVVJqj8H Ie3gbtzd0owaS57wp+bKmoIGQTZN8CvKiy4jTgr68wsD8Hok+KqzLvb1k5DTyczJGadS lmmFWNbq0LT8rWH0xcy8MjGH7xU2xKHiLZv3h8HnlUJOSXuPVbuhKEG46MQ6pfbccIMj i7Bla6ti4SpIMrykXkUqufhNP9v0YKtPCrcZAXK5wH3w9alTuI0+yL2bWGkSK3sokSXI pNZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=AxzGT4R96/nRowldYLVDQHHEyiV31tMmTSZl+oggOxc=; b=IR6Fu7DePzdTkD/LyaViOV/Q23zuCFKO3WCWm74iBlQvm3VOXRiF8AskJpfH8QbVrw ZZIOfRi/HHUH5fnwyAYjFfEGTWNxBxMNuLTMQX9DD9dOIQJ2JPN5TYoGrrdxWwibq50n kEj3DzDDgbjEm26neriT8wxAa8cFkHDOp+RCEwKJw90ohAG3VroIwo7mBH6GMXWdGSmJ T5LbK+4uALJEzUM/PoPshRAMdARocsH6VcdWeH3rIxuDqpxhQS3keg6qBt+Knmbe2FZ7 bza/ojQkM1sYxLiGOQbQiyMPrmA9F/D7Jy84ASupHjcZpnEhmeZ6oKR2YAHn8C/PV7no i2fQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ventanamicro.com header.s=google header.b=Xy8x8icI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t23-20020a056402241700b004993bc3d7bdsi11042488eda.84.2023.01.11.11.18.05; Wed, 11 Jan 2023 11:18:18 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@ventanamicro.com header.s=google header.b=Xy8x8icI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234959AbjAKTAg (ORCPT + 51 others); Wed, 11 Jan 2023 14:00:36 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53796 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231527AbjAKTAe (ORCPT ); Wed, 11 Jan 2023 14:00:34 -0500 Received: from mail-wm1-x330.google.com (mail-wm1-x330.google.com [IPv6:2a00:1450:4864:20::330]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C4958637A for ; Wed, 11 Jan 2023 11:00:32 -0800 (PST) Received: by mail-wm1-x330.google.com with SMTP id p1-20020a05600c1d8100b003d8c9b191e0so13441792wms.4 for ; Wed, 11 Jan 2023 11:00:32 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ventanamicro.com; s=google; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=AxzGT4R96/nRowldYLVDQHHEyiV31tMmTSZl+oggOxc=; b=Xy8x8icInMETm4u+h3XJ9qIbsF8j4m2qaOL7GOVWXb3l/xPDjNIO3AQcf6iju5y2v+ WDdPkPw3ZznjJYhNrHfyf9y2jw4sfxfvq7qVIBGX1Lsg2JotYHOrMrgX6WAtwrgERhLa AdX1on1tOt3j46QepgXUZy8YpE69L5kkSYacWBIbh8ym9OqMoOqCZ8Z7EFA7hRJ81dl2 4j1LGKWKMXobVx629QD9nf312blasABrKfKrNP4x75GDddFj7IedI5FupiY1umCdEofm 4PRBc7Xvw0wfrDkXcmSlP718EUFFLYh9PQFp900/gWf6XdQLWLF5B/kRGjqzX3shIjUZ LJIA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=AxzGT4R96/nRowldYLVDQHHEyiV31tMmTSZl+oggOxc=; b=Xr1eXyzcNG/Us2tgTOye0dxMMRzWDR4vS6U/KS8MiM9xoyGkhDDiC7GBzTudbTGJcC gHAxPgeSmN+VsrTUtPQRRNO+nhj01VjMispX1/ALiUNzs2uXLPU35AwMBASUX1tE4BZS I8j7FK0ANxQobm8Xs5uRAWTnSZsFoW1qq4S4annDX0sBXBFiiaGMl7jGZpwESKsPx0YC Z6/Y+ZaEmvbEJqiGaCVlP3MTU5XnXV0XBL8J5YSrLJShTyHaPlL7BAU5G2d33VndsA4e P0Oi+QgYVnczwIkehZTuEbDxb/UzML3J3g1n4+FOd81tjDlyJwRxGQMeiN562UKHNAyv +iYw== X-Gm-Message-State: AFqh2kqy+xlBZ8re4RsB50/ZT1fwbhpUCOzWLZ2rBu1kgIC5OC4hyZHS WWuCBObvHlMiiIVRj+cB4qkWLw== X-Received: by 2002:a1c:6a16:0:b0:3c6:f732:bf6f with SMTP id f22-20020a1c6a16000000b003c6f732bf6fmr52927572wmc.13.1673463631368; Wed, 11 Jan 2023 11:00:31 -0800 (PST) Received: from localhost (cst2-173-16.cust.vodafone.cz. [31.30.173.16]) by smtp.gmail.com with ESMTPSA id 2-20020a05600c020200b003d9ef8ad6b2sm11136454wmi.13.2023.01.11.11.00.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Jan 2023 11:00:31 -0800 (PST) Date: Wed, 11 Jan 2023 20:00:29 +0100 From: Andrew Jones To: Jisheng Zhang Cc: Palmer Dabbelt , Paul Walmsley , aou@eecs.berkeley.edu, ryabinin.a.a@gmail.com, glider@google.com, andreyknvl@gmail.com, dvyukov@google.com, vincenzo.frascino@arm.com, alexandre.ghiti@canonical.com, linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com Subject: Re: [PATCH v6 RESEND 0/2] use static key to optimize pgtable_l4_enabled Message-ID: <20230111190029.ltynngqnqs42gatd@orel> References: <20220821140918.3613-1-jszhang@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jan 12, 2023 at 01:28:40AM +0800, Jisheng Zhang wrote: > On Sun, Dec 11, 2022 at 06:44:04PM +0800, Jisheng Zhang wrote: > > On Sat, Oct 08, 2022 at 10:28:35PM +0800, Jisheng Zhang wrote: > > > On Thu, Oct 06, 2022 at 04:37:57PM +0800, Jisheng Zhang wrote: > > > > On Wed, Oct 05, 2022 at 06:05:28PM -0700, Palmer Dabbelt wrote: > > > > > On Sun, 21 Aug 2022 07:09:16 PDT (-0700), jszhang@kernel.org wrote: > > > > > > The pgtable_l4|[l5]_enabled check sits at hot code path, performance > > > > > > is impacted a lot. Since pgtable_l4|[l5]_enabled isn't changed after > > > > > > boot, so static key can be used to solve the performance issue[1]. > > > > > > > > > > > > An unified way static key was introduced in [2], but it only targets > > > > > > riscv isa extension. We dunno whether SV48 and SV57 will be considered > > > > > > as isa extension, so the unified solution isn't used for > > > > > > pgtable_l4[l5]_enabled now. > > > > > > > > > > > > patch1 fixes a NULL pointer deference if static key is used a bit earlier. > > > > > > patch2 uses the static key to optimize pgtable_l4|[l5]_enabled. > > > > > > > > > > > > [1] http://lists.infradead.org/pipermail/linux-riscv/2021-December/011164.html > > > > > > [2] https://lore.kernel.org/linux-riscv/20220517184453.3558-1-jszhang@kernel.org/T/#t > > > > > > > > > > > > Since v5: > > > > > > - Use DECLARE_STATIC_KEY_FALSE > > > > > > > > > > > > Since v4: > > > > > > - rebased on v5.19-rcN > > > > > > - collect Reviewed-by tags > > > > > > - Fix kernel panic issue if SPARSEMEM is enabled by moving the > > > > > > riscv_finalise_pgtable_lx() after sparse_init() > > > > > > > > > > > > Since v3: > > > > > > - fix W=1 call to undeclared function 'static_branch_likely' error > > > > > > > > > > > > Since v2: > > > > > > - move the W=1 warning fix to a separate patch > > > > > > - move the unified way to use static key to a new patch series. > > > > > > > > > > > > Since v1: > > > > > > - Add a W=1 warning fix > > > > > > - Fix W=1 error > > > > > > - Based on v5.18-rcN, since SV57 support is added, so convert > > > > > > pgtable_l5_enabled as well. > > > > > > > > > > > > > > > > > > Jisheng Zhang (2): > > > > > > riscv: move sbi_init() earlier before jump_label_init() > > > > > > riscv: turn pgtable_l4|[l5]_enabled to static key for RV64 > > > > > > > > > > > > arch/riscv/include/asm/pgalloc.h | 16 ++++---- > > > > > > arch/riscv/include/asm/pgtable-32.h | 3 ++ > > > > > > arch/riscv/include/asm/pgtable-64.h | 60 ++++++++++++++++++--------- > > > > > > arch/riscv/include/asm/pgtable.h | 5 +-- > > > > > > arch/riscv/kernel/cpu.c | 4 +- > > > > > > arch/riscv/kernel/setup.c | 2 +- > > > > > > arch/riscv/mm/init.c | 64 ++++++++++++++++++----------- > > > > > > arch/riscv/mm/kasan_init.c | 16 ++++---- > > > > > > 8 files changed, 104 insertions(+), 66 deletions(-) > > > > > > > > > > Sorry for being slow here, but it looks like this still causes some early > > > > > boot hangs. Specifically kasan+sparsemem is failing. As you can probably > > > > > see from the latency I'm still a bit buried right now so I'm not sure when > > > > > I'll have a chance to take more of a look. > > > > > > > > Hi Palmer, > > > > > > > > Before V4, there is a bug which can cause kernel panic when SPARSEMEM > > > > is enabled, V4 have fixed it by moving the riscv_finalise_pgtable_lx() > > > > after sparse_init(). And I just tested the riscv-pgtable_static_key > > > > branch in your tree, enabling KASAN and SPARSEMEM, system booted fine. > > > > I'm not sure what happened. Could you please send me your kernel > > > > config file? I want to fix any issue which can block this series being > > > > merged in 6.1-rc1. > > > > > > Hi Palmer, > > > > > > I know you are busy ;) Do you have time to send me your test kernel > > > config file so that I can reproduce the "early boot hang"? > > > > > > Thanks > > > > Hi Palmer, > > > > I think the early boot hangs maybe the same as the one which has been > > fixed by commit 9f2ac64d6ca6 ("riscv: mm: add missing memcpy in > > kasan_init"). Will you give this series another try for v6.2-rc1? If > > the boot hang can still be reproduced, could you please send me your > > .config file? > > > > Thanks in advance > Hi all, > > Just request to comment what to do with this patch, I think there > are two independent points to consult: > > 1. IIRC, Palmer gave this patch two chances to merge in early versions > but he found boot hangs if enable KASAN and SPARSEMEM, while I can't > reproduce the boot hang. And I also expect the hang should be fixed by > commit 9f2ac64d6ca6 ("riscv: mm: add missing memcpy in kasan_init") > > 2. Now we know alternative is preferred than static branch for ISA > extensions dynamic code patching. So we also need to switch static > branch usage here to alternative mechanism, but the problem is > SV48 and SV57 are not ISA extensions, so we can't directly make use > of the recently introduced riscv_has_extension_likely|unlikely()[1] > which is based on alternative mechanism. We could rename the "has_extension" framework to "has_cpufeature" and then lump extensions and features such as sv48 and sv57 together. Or, if it's best to keep extensions separate, then duplicate the framework to create a "has_non_extension_feature" version where features like sv48 and sv57 live. Thanks, drew > > Any comments are appreciated. > > Thanks in advance > > [1] https://lore.kernel.org/linux-riscv/20230111171027.2392-1-jszhang@kernel.org/T/#t > > _______________________________________________ > linux-riscv mailing list > linux-riscv@lists.infradead.org > http://lists.infradead.org/mailman/listinfo/linux-riscv