Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp401877rwd; Wed, 17 May 2023 21:06:57 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ46bsCDBqEseQzTGMyXMKPnMefswTGHDJc28VF8vlrfUfKhCe9fyhUCc/Z4skvyy2l/4YuM X-Received: by 2002:a17:90a:6641:b0:24e:3a0a:9b48 with SMTP id f1-20020a17090a664100b0024e3a0a9b48mr1219478pjm.21.1684382816837; Wed, 17 May 2023 21:06:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1684382816; cv=none; d=google.com; s=arc-20160816; b=C5EZARt8xvylwL6y9Vt9H//Lv+XJyQOV5gAovUzqLn/QKfkrxSsy8xbRQOlPbNLqvt 3f9fBC8EDyGVIW2u4meBlYiRuyaoKt2blze9YIzPKezVeYlowypH298lSi2Q0BXZtX3S vf2C1QXON0dA1tQ+r5ZVnKK73ROWvPpwUYTnAYg191hCkzvl7MNHQSZQhFuMlZdKwJOV 4qqyz6qjn68cnDx1lDC/5i15YRIQZFKAIuHhTIG4/ISgM/F851mcDj4O2uDl4O53ijrb hw0upv00Pw6RnZ1a8I8JnDIdlr9dwX7scVlx6txIbTA6EA31Y70ne8GiyHXwOGmI14W2 WWsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=TcjpGUglMcAK5noEuv1H8C5d8wkM7rmUBBQyTlxZSYU=; b=XaQoUImISqLX3kWMe9zKaXhb+Fkrb0G1F5DuCdD7zogrcJvzpBlqbPIdVHriFP5wCo CHOTEuJws50v3rOQ8JrBdPm4r8EuEnPVSKGdPg6oHn7t4dqPHUL8EOSUve7ffTd6d+U9 I5oQ69j5bPecIGyvapcaSOwyQxmu6Zj5Z+e0u1WJw3kE0EU6rJ7Wi01tn1aSsgJqIlxR 7uDW1xz08LtIUXX+lajUvaC7kIxugc2jUsnja+Y1yDfUU/Eu9gtvH0ECFX9nL/dlBMCZ zu4vMjoEe490qU+4qyEIP8Y0mjdCFbLGGHPrX7j5psFwsmUaIRe781r+v7PkX7YYAiWI T68Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20221208 header.b="WM/hhNeh"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id gl13-20020a17090b120d00b00251e16303f2si746765pjb.86.2023.05.17.21.06.45; Wed, 17 May 2023 21:06:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20221208 header.b="WM/hhNeh"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229828AbjERDaS (ORCPT + 99 others); Wed, 17 May 2023 23:30:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48810 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229814AbjERDaN (ORCPT ); Wed, 17 May 2023 23:30:13 -0400 Received: from mail-pg1-x52a.google.com (mail-pg1-x52a.google.com [IPv6:2607:f8b0:4864:20::52a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1F7A719B2 for ; Wed, 17 May 2023 20:30:11 -0700 (PDT) Received: by mail-pg1-x52a.google.com with SMTP id 41be03b00d2f7-53063897412so1368151a12.0 for ; Wed, 17 May 2023 20:30:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1684380610; x=1686972610; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=TcjpGUglMcAK5noEuv1H8C5d8wkM7rmUBBQyTlxZSYU=; b=WM/hhNeh00EaRDOK8NcZHXkLUi0Ocisa1yoxDu+MCI4GLSXN9OC/d1JyWI+3vY2b2L +ovydJDZ7OhouaiTVpTWfbY9+nphR5FuwbIchR0KpSRbpDP4wxhBEmxxgZYKJl2FXAos h/JJHZz7douFtJ6W2wX079nPVjGneHsspNxFk7Llw//TPfBreeGqFnRrK5SGfSJ5ORE4 KAUcTQSqqwlY/9wzwRANPeHZwJlRPxGtPQX6aRR30vZ0/MZfL4uGFABHr49K7Lg4IFuK RlkmcXw2PUGJ5vjJf5zKmDUPk4p5V4LxmJq2+/fCrMRSA459z/k5GcMPFCeFUsbW0qVb WAxw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1684380610; x=1686972610; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=TcjpGUglMcAK5noEuv1H8C5d8wkM7rmUBBQyTlxZSYU=; b=jF66CV3ius25q7U46JQ0OSvxokI91n9K2fHXgEELkfIWTPW9FOElkTc1YpAUJIifjK MtDWelBMM1BqZ549eF4AjRKINsuScOyWtBmlYxEU3ar7PAZD9XGlRD8/QbPrA1rLuAm4 Dk7gy0+lD5AtGRU7VXXcyoIf2undO7Eo14gI2FQXxmSTmRmETFmPIFnai+WasiXpBV1b aRiaD7P5yCZulCumfhybhz0eNMw4+WVm2h0EbJZRnRgmAyoJb9LelSaliwjaBoQQbL6M ihVdtzKn4QpkcweW8Gp3X+R1aHYqFExGADf0AHBtJAVv8aRBfbEH/qClsNF3hjJfpt7n lhqg== X-Gm-Message-State: AC+VfDxvtNXLhGGfj78dMJXt/Htu9okKZo6GAv9iTc3cvz76REmPHlE7 VNYarAB7jG8FCL6xvva/m9b7cDRbsoa313MHMs4= X-Received: by 2002:a17:90b:fc8:b0:253:2dc5:4e12 with SMTP id gd8-20020a17090b0fc800b002532dc54e12mr1100134pjb.46.1684380610333; Wed, 17 May 2023 20:30:10 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Song Shuai Date: Thu, 18 May 2023 03:29:58 +0000 Message-ID: Subject: Re: Bug report: kernel paniced when system hibernates To: Alexandre Ghiti Cc: Rob Herring , Andrew Jones , Anup Patel , Palmer Dabbelt , Sia Jee Heng , Leyfoon Tan , Mason Huo , Paul Walmsley , Guo Ren , linux-riscv , Linux Kernel Mailing List , Conor Dooley Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Alexandre Ghiti =E4=BA=8E2023=E5=B9=B45=E6=9C=8817= =E6=97=A5=E5=91=A8=E4=B8=89 14:42=E5=86=99=E9=81=93=EF=BC=9A > > Sorry, pressed "reply" instead of "reply all"... > > ---------- Forwarded message --------- > From: Alexandre Ghiti > Date: Wed, May 17, 2023 at 4:40=E2=80=AFPM > Subject: Re: Bug report: kernel paniced when system hibernates > To: Song Shuai , Anup Patel > , Atish Kumar Patra > > > On Wed, May 17, 2023 at 1:05=E2=80=AFPM Song Shuai wrote: > > > > Alexandre Ghiti =E4=BA=8E2023=E5=B9=B45=E6=9C= =8817=E6=97=A5=E5=91=A8=E4=B8=89 08:58=E5=86=99=E9=81=93=EF=BC=9A > > > > > > On Tue, May 16, 2023 at 1:12=E2=80=AFPM Alexandre Ghiti wrote: > > > > > > > > Hi Song, > > > > > > > > On Tue, May 16, 2023 at 11:24=E2=80=AFAM Song Shuai wrote: > > > > > > > > > > Description of problem: > > > > > > > > > > The latest hibernation support[1] of RISC-V Linux produced a kern= el panic. > > > > > The entire log has been posted at this link: https://termbin.com/= sphl . > > > > > > > > > > How reproducible: > > > > > > > > > > You can reproduce it with the following step : > > > > > > > > > > 1. prepare the environment with > > > > > - Qemu-virt v8.0.0 (with OpenSbi v1.2) > > > > > - Linux v6.4-rc1 > > > > > > > > > > 2. start the Qemu virt > > > > > ```sh > > > > > $ cat ~/8_riscv/start_latest.sh > > > > > #!/bin/bash > > > > > /home/song/8_riscv/3_acpi/qemu/ooo/usr/local/bin/qemu-system-risc= v64 \ > > > > > -smp 2 -m 4G -nographic -machine virt \ > > > > > -kernel /home/song/9_linux/linux/00_rv_test/arch/riscv/boot/Image= \ > > > > > -append "root=3D/dev/vda ro eaylycon=3Duart8250,mmio,0x10000000 > > > > > early_ioremap_debug console=3DttyS0 loglevel=3D8 memblock=3Ddebug > > > > > no_console_suspend audit=3D0 3" \ > > > > > -drive file=3D/home/song/8_riscv/fedora/stage4-disk.img,format=3D= raw,id=3Dhd0 \ > > > > > -device virtio-blk-device,drive=3Dhd0 \ > > > > > -drive file=3D/home/song/8_riscv/fedora/adisk.qcow2,format=3Dqcow= 2,id=3Dhd1 \ > > > > > -device virtio-blk-device,drive=3Dhd1 \ > > > > > -gdb tcp::1236 #-S > > > > > ``` > > > > > 3. execute hibernation > > > > > > > > > > ```sh > > > > > swapon /dev/vdb2 # this is my swap disk > > > > > > > > > > echo disk > /sys/power/state > > > > > ``` > > > > > > > > > > 4. Then you will encounter the kernel panic logged in the above l= ink > > > > > > > > > > > > > > > Other Information: > > > > > > > > > > After my initial and incomplete dig-up, the commit (3335068f8721 > > > > > "riscv: Use PUD/P4D/PGD pages for the linear mapping")[2] > > > > > is closely related to this panic. This commit uses re-defined > > > > > `MIN_MEMBLOCK_ADDR` to discover the entire system memory > > > > > and extends the `va_pa_offset` from `kernel_map.phys_addr` to > > > > > `phys_ram_base` for linear memory mapping. > > > > > > > > > > If the firmware delivered the firmware memory region (like: a PMP > > > > > protected region in OpenSbi) without "no-map" propriety, > > > > > this commit will result in firmware memory being directly mapped = by > > > > > `create_linear_mapping_page_table()`. > > > > > > > > > > We can see the mapping via ptdump : > > > > > ```c > > > > > ---[ Linear mapping ]--- > > > > > 0xff60000000000000-0xff60000000200000 0x0000000080000000 2M PMD D= A G > > > > > . . W R V ------------- the firmware memory > > > > > 0xff60000000200000-0xff60000000c00000 0x0000000080200000 10M PMD = D A G . . . R V > > > > > 0xff60000000c00000-0xff60000001000000 0x0000000080c00000 4M PMD D= A G . . W R V > > > > > 0xff60000001000000-0xff60000001600000 0x0000000081000000 6M PMD D= A G . . . R V > > > > > 0xff60000001600000-0xff60000040000000 0x0000000081600000 1002M PM= D D A > > > > > G . . W R V > > > > > 0xff60000040000000-0xff60000100000000 0x00000000c0000000 3G PUD D= A G . . W R V > > > > > ---[ Modules/BPF mapping ]--- > > > > > ---[ Kernel mapping ]--- > > > > > 0xffffffff80000000-0xffffffff80a00000 0x0000000080200000 10M PMD = D A G . X . R V > > > > > 0xffffffff80a00000-0xffffffff80c00000 0x0000000080c00000 2M PMD D= A G . . . R V > > > > > 0xffffffff80c00000-0xffffffff80e00000 0x0000000080e00000 2M PMD D= A G . . W R V > > > > > 0xffffffff80e00000-0xffffffff81400000 0x0000000081000000 6M PMD D= A G . . . R V > > > > > 0xffffffff81400000-0xffffffff81800000 0x0000000081600000 4M PMD > > > > > ``` > > > > > > > > > > In the hibernation process, `swsusp_save()` calls > > > > > `copy_data_pages(©_bm, &orig_bm)` to copy these two memory > > > > > bitmaps, > > > > > the Oops(load access fault) occurred while copying the page of > > > > > PAGE_OFFSET (which maps the firmware memory). > > > > > > > > I'm not saying that the hibernation process is in fault here, but > > > > that's weird that it is trying to access pages that are not availab= le > > > > to the kernel: this region is mapped in the page table so that we c= an > > > > use a 1GB page, but it is reserved so that it is not added to the > > > > kernel memory pool. > > Yes, my fault, the Test2 is not a correct testcase. > > > > > > > > > > > > > > I also did two other tests: > > > > > Test1: > > > > > > > > > > The hibernation works well in the kernel with the commit 3335068f= 8721 > > > > > reverted at least in the current environment. > > > > > > > > > > Test2: > > > > > > > > > > I built a simple kernel module to simulate the access of the valu= e of > > > > > `PAGE_OFFSET` address, and the same panic occurred with the load > > > > > access fault. > > > > > So hibernation seems not the only case to trigger this panic. > > > > > > > > > > Finally, should we always leave the firmware memory with > > > > > `MEMBLOCK_NOMAP` flag by some efforts from Linux or OpenSbi (at l= east > > > > > in the current environment) or any other suggestions? > > > > > > > > > > > > > I actually removed this flag a few years ago, and I have to admit t= hat > > > > I need to check if that's necessary: the goal of commit 3335068f872= 1 > > > > ("riscv: Use PUD/P4D/PGD pages for the linear mapping") is to expos= e > > > > the "right" start of DRAM so that we can align virtual and physical > > > > addresses on a 1GB boundary. > > > > > > > > So I have to check if a nomap region is actually added as a > > > > memblock.memory.regions[] or not: if yes, that's perfect, let's add > > > > the nomap attributes to the PMP regions, otherwise, I don't think t= hat > > > > is a good solution. > > > > > > So here is the current linear mapping without nomap in openSBI: > > > > > > ---[ Linear mapping ]--- > > > 0xff60000000000000-0xff60000000200000 0x0000000080000000 2= M > > > PMD D A G . . W R V > > > 0xff60000000200000-0xff60000000e00000 0x0000000080200000 12= M > > > PMD D A G . . . R V > > > > > > And below the linear mapping with nomap in openSBI: > > > > > > ---[ Linear mapping ]--- > > > 0xff60000000080000-0xff60000000200000 0x0000000080080000 1536= K > > > PTE D A G . . W R V > > > 0xff60000000200000-0xff60000000e00000 0x0000000080200000 12= M > > > PMD D A G . . . R V > > > > > > So adding nomap does not misalign virtual and physical addresses, it > > > prevents the usage of 1GB page for this area though, so that's a > > > solution, we just lose this 1GB page here. > > > > > > But even though that may be the fix, I think we also need to fix that > > > in the kernel as it would break compatibility with certain versions o= f > > > openSBI *if* we fix openSBI...So here are a few solutions: > > > > > > 1. we can mark all "mmode_resv" nodes in the device tree as nomap, > > > before the linear mapping is established (IIUC, those nodes are added > > > by openSBI to advertise PMP regions) > > > -> This amounts to the same fix as opensbi and we lose the 1GB hu= gepage. > > > 2. we can tweak pfn_is_nosave function to *not* save pfn correspondin= g > > > to PMP regions > > > -> We don't lose the 1GB hugepage \o/ > > > 3. we can use register_nosave_region() to not save the "mmode_resv" > > > regions (x86 does that > > > https://elixir.bootlin.com/linux/v6.4-rc1/source/arch/x86/kernel/e820= .c#L753) > > > -> We don't lose the 1GB hugepage \o/ > > > 4. Given JeeHeng pointer to > > > https://elixir.bootlin.com/linux/v6.4-rc1/source/kernel/power/snapsho= t.c#L1340, > > > we can mark those pages as non-readable and make the hibernation > > > process not save those pages > > > -> Very late-in-the-day idea, not sure what it's worth, we also > > > lose the 1GB hugepage... > > > > > > To me, the best solution is 3 as it would prepare for other similar > > > issues later, it is similar to x86 and it allows us to keep 1GB > > > hugepages. > > > > I agree, > > register_nosave_region() is a good way in the early initialization to > > set page frames (like the PMP regions) in forbidden_pages_map and mark > > them as no-savable for hibernation. > > > > Look forward to your fixing. > > Please find below the patch in question, which worked for me, if you > can give it a try. As mentioned by Conor, I'd like to make sure the > mmode_resv "interface" is really what we need to use before > upstreaming this fix @Anup Patel @Atish Kumar Patra > > diff --git a/arch/riscv/kernel/hibernate.c b/arch/riscv/kernel/hibernate.= c > index 264b2dcdd67e..9ad8bf5c956b 100644 > --- a/arch/riscv/kernel/hibernate.c > +++ b/arch/riscv/kernel/hibernate.c > @@ -24,6 +24,8 @@ > #include > #include > #include > +#include > +#include > > /* The logical cpu number we should resume on, initialised to a > non-cpu number. */ > static int sleep_cpu =3D -EINVAL; > @@ -67,6 +69,45 @@ static void arch_hdr_invariants(struct > arch_hibernate_hdr_invariants *i) > memcpy(i->uts_version, init_utsname()->version, sizeof(i->uts_ver= sion)); > } > > +void __init register_nosave_regions(void) > +{ > +#define MMODE_RESV "mmode_resv" > + int node, child; > + const void *fdt =3D initial_boot_params; > + > + node =3D fdt_path_offset(fdt, "/reserved-memory"); > + if (node < 0) > + return; > + > + fdt_for_each_subnode(child, fdt, node) { > + phys_addr_t base, size; > + const __be32 *prop; > + const char *uname; > + int len; > + int t_len =3D (dt_root_addr_cells + dt_root_size_cells) > * sizeof(__be32); > + > + uname =3D fdt_get_name(fdt, child, NULL); > + > + if (!uname || strncmp(uname, MMODE_RESV, > sizeof(MMODE_RESV) - 1)) > + continue; > + > + prop =3D of_get_flat_dt_prop(child, "reg", &len); > + if (!prop) > + continue; > + > + while (len >=3D t_len) { > + base =3D dt_mem_next_cell(dt_root_addr_cells, &pr= op); > + size =3D dt_mem_next_cell(dt_root_size_cells, &pr= op); > + > + if (size) > + register_nosave_region(phys_to_pfn(base), > + > phys_to_pfn(base + size)); > + > + len -=3D t_len; > + } > + } > +} > + > /* > * Check if the given pfn is in the 'nosave' section. > */ > @@ -421,6 +462,8 @@ static int __init riscv_hibernate_init(void) > if (WARN_ON(!hibernate_cpu_context)) > return -ENOMEM; > > + register_nosave_regions(); > + > return 0; > } > I encountered 2 (possible) problems in my test with the patch above. The full log has been posted here : https://termbin.com/qp3x . First, a `WARN_ON_ONCE()` was triggered in `memblock_alloc_internal()` when calling `register_nosave_regions()` although the `nosave_region` was allocated successfully. ``` [ 0.112658] memblock_alloc_try_nid: 32 bytes align=3D0x40 nid=3D-1 from=3D0x0000000000000000 max_addr=3D0x0000000000000000 register_nosave_region+0x54/0xd4 [ 0.113698] ------------[ cut here ]------------ [ 0.114185] WARNING: CPU: 0 PID: 1 at mm/memblock.c:1517 memblock_alloc_internal+0x34/0xb0\ ... ``` The WARNING shows that slab is available at this time and `memblock_alloc()` shouldn't be used here. I think we should move the calling of `register_nosave_regions()` to somewhere eariler at least before `memblock_free_all()` Second, the resume process failed with a Memory map mismatch. I didn't dig into it further and not sure it's this patch caused it (we couldn't hibernate successfully before this patch, right?) Just report it in this thread. ``` [ 2.991958] PM: Loading image data pages (88091 pages)... [ 2.995308] PM: Image loading progress: 0% [ 3.005533] PM: hibernation: [Firmware Bug]: Memory map mismatch at 0x0 after hibernation [ 3.006343] PM: hibernation: Read 352364 kbytes in 0.01 seconds (35236.40 M= B/s) [ 3.007270] PM: hibernation: Failed to load image, recovering. ``` > > > > > > I have been thinking, and to me nomap does not provide anything since > > > the kernel should not address this memory range, so if it does, we > > > must fix the kernel. > > > > > > Let me know what you all think, I'll be preparing a PoC of 3 in the m= eantime! > > > > > > Alex > > > > > > > > > > > > > > > > > And a last word: Mike Rapoport recently gave a speech [1] where he > > > > states that mapping the linear mapping with hugepages does not give > > > > rise to better performance so *maybe* reverting this commit may be = a > > > > solution too as it may not provide the expected benefits (even thou= gh > > > > I'd rather have it and another benefit of mapping the linear mappin= g > > > > with 1GB hugepages is that it is faster to boot, but that needs to = be > > > > measured). > > > > > > > > [1] https://lwn.net/Articles/931406/ > > > > > > > > > Please correct me if I'm wrong. > > > > > > > > > > [1]: https://lore.kernel.org/r/20230330064321.1008373-5-jeeheng.s= ia@starfivetech.com > > > > > [2]: https://lore.kernel.org/r/20230324155421.271544-4-alexghiti@= rivosinc.com > > > > > > > > > > -- > > > > > Thanks, > > > > > Song > > > > > > > > Thanks for the thorough report! > > > > > > > > Alex > > > > > > > > -- > > Thanks, > > Song --=20 Thanks, Song