Received: by 2002:a05:6358:c692:b0:131:369:b2a3 with SMTP id fe18csp4185176rwb; Mon, 31 Jul 2023 02:59:07 -0700 (PDT) X-Google-Smtp-Source: APBJJlEfClOa8vL2TDpyEhvIYmuQPH8H9GJuo1Q6+wEHIPaPwDOlYy9Wa4Asp7z+CgK9ZBDClyqX X-Received: by 2002:a05:6a00:138f:b0:686:9385:4644 with SMTP id t15-20020a056a00138f00b0068693854644mr10816808pfg.2.1690797546635; Mon, 31 Jul 2023 02:59:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1690797546; cv=none; d=google.com; s=arc-20160816; b=bJvyB52mfF3HFPf4i65IcErAyGpRQXQ67JC0VA4FiOIvIM8tyC+5Wp/M/GToFbfP5e vtwuRPZEbVKntT5Ncvbf94juB/YFEFogOJH6ib/JtoOtU18wDdRvczuavTmjTKA/fu3w ot/Tl901/cSDSb3IAIeHc2i1M2fPKxadhOr2raTivNWRt91TlZaPo83+SugRXyiFUaXc fvSTaLgcqOtrepp+wd8YbKzBF5HAJnuieo/ZpNDcfsL6ZNTnJUkHOsomIqjAIPJ4m1j1 aqWPso41Z+4qaONruifYxJI7PSpo4EkL4PfVvJ+99UcAequbAFFKNVR9KkgQH4/HvI69 eUug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :content-language:references:cc:to:subject:user-agent:mime-version :date:message-id; bh=ujtaplw62YeRtkMIC4FYsxBGET8IROpSdDdEy3pKjN0=; fh=zgZBe6NuIgtyyrJHWvVyeYolqY7cRGsBIiJBr2F4J4Q=; b=AXa7A++GTDqf1sSGvL1UyJnX63T4rN1Ei6lCEzyxIzcrzVegsle2NNINQCILhWPES7 p+msfl2nLwm1mNzrzSiglRVZc4vVbfSzDwdG9ByGCsJs6MQQ1V83IQ9ahI3Wo2nFnJ+F QCEl45h+ehD6pTwTTsAkM7HcvFbWGGkTehVaWjVttr4YWyPIjOX79N/ICKnPD0s2hv/2 xohXq7x1ZG2Lg9nP/6RLPl/xRs3c+P65EIsRM7TUIyJNzYr8faCumxw1yz4wZvtJjKzi 9B9AKYS5r/t0lqVH+bD7l8zeGcKnj/068E2EkHSIPFZQmIqHxN7NXbM6+169R88xzZyv k4dg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z4-20020aa78884000000b00686ec2f0473si99964pfe.101.2023.07.31.02.58.54; Mon, 31 Jul 2023 02:59:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229998AbjGaJnL (ORCPT + 99 others); Mon, 31 Jul 2023 05:43:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58894 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230061AbjGaJnK (ORCPT ); Mon, 31 Jul 2023 05:43:10 -0400 Received: from relay7-d.mail.gandi.net (relay7-d.mail.gandi.net [IPv6:2001:4b98:dc4:8::227]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1B36EEB; Mon, 31 Jul 2023 02:43:07 -0700 (PDT) Received: by mail.gandi.net (Postfix) with ESMTPSA id 5145220015; Mon, 31 Jul 2023 09:43:03 +0000 (UTC) Message-ID: <177e6ac4-bee1-b99b-8d3c-ad022f396b48@ghiti.fr> Date: Mon, 31 Jul 2023 11:43:02 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.13.0 Subject: Re: [PATCH] riscv: mm: Fixup spurious fault of kernel vaddr To: Guo Ren Cc: palmer@rivosinc.com, paul.walmsley@sifive.com, falcon@tinylab.org, bjorn@kernel.org, conor.dooley@microchip.com, linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org, linux-riscv@lists.infradead.org, Guo Ren References: <20230721145121.1854104-1-guoren@kernel.org> <5e5be2d4-c563-6beb-b5f5-df47edeebc83@ghiti.fr> <87bfcd33-9741-4d6c-8b7a-1d1ee2dce61b@ghiti.fr> <292abea1-59b7-13d4-0b27-ac00f7e7f20e@ghiti.fr> Content-Language: en-US From: Alexandre Ghiti In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-GND-Sasl: alex@ghiti.fr X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_PASS,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 29/07/2023 08:40, Guo Ren wrote: > Sorry for the late reply, Alexandre. I'm busy with other suffs. > > On Mon, Jul 24, 2023 at 5:05 PM Alexandre Ghiti wrote: >> >> On 22/07/2023 01:59, Guo Ren wrote: >>> On Fri, Jul 21, 2023 at 4:01 PM Alexandre Ghiti wrote: >>>> On 21/07/2023 18:08, Guo Ren wrote: >>>>> On Fri, Jul 21, 2023 at 11:19 PM Alexandre Ghiti wrote: >>>>>> On 21/07/2023 16:51, guoren@kernel.org wrote: >>>>>>> From: Guo Ren >>>>>>> >>>>>>> RISC-V specification permits the caching of PTEs whose V (Valid) >>>>>>> bit is clear. Operating systems must be written to cope with this >>>>>>> possibility, but implementers are reminded that eagerly caching >>>>>>> invalid PTEs will reduce performance by causing additional page >>>>>>> faults. >>>>>>> >>>>>>> So we must keep vmalloc_fault for the spurious page faults of kernel >>>>>>> virtual address from an OoO machine. >>>>>>> >>>>>>> Signed-off-by: Guo Ren >>>>>>> Signed-off-by: Guo Ren >>>>>>> --- >>>>>>> arch/riscv/mm/fault.c | 3 +-- >>>>>>> 1 file changed, 1 insertion(+), 2 deletions(-) >>>>>>> >>>>>>> diff --git a/arch/riscv/mm/fault.c b/arch/riscv/mm/fault.c >>>>>>> index 85165fe438d8..f662c9eae7d4 100644 >>>>>>> --- a/arch/riscv/mm/fault.c >>>>>>> +++ b/arch/riscv/mm/fault.c >>>>>>> @@ -258,8 +258,7 @@ void handle_page_fault(struct pt_regs *regs) >>>>>>> * only copy the information from the master page table, >>>>>>> * nothing more. >>>>>>> */ >>>>>>> - if ((!IS_ENABLED(CONFIG_MMU) || !IS_ENABLED(CONFIG_64BIT)) && >>>>>>> - unlikely(addr >= VMALLOC_START && addr < VMALLOC_END)) { >>>>>>> + if (unlikely(addr >= TASK_SIZE)) { >>>>>>> vmalloc_fault(regs, code, addr); >>>>>>> return; >>>>>>> } >>>>>> Can you share what you are trying to fix here? >>>>> We met a spurious page fault panic on an OoO machine. >>>>> >>>>> 1. The processor speculative execution brings the V=0 entries into the >>>>> TLB in the kernel virtual address. >>>>> 2. Linux kernel installs the kernel virtual address with the page, and V=1 >>>>> 3. When kernel code access the kernel virtual address, it would raise >>>>> a page fault as the V=0 entry in the tlb. >>>>> 4. No vmalloc_fault, then panic. >>>>> >>>>>> I have a fix (that's currently running our CI) for commit 7d3332be011e >>>>>> ("riscv: mm: Pre-allocate PGD entries for vmalloc/modules area") that >>>>>> implements flush_cache_vmap() since we lost the vmalloc_fault. >>>>> Could you share that patch? >>>> Here we go: >>>> >>>> >>>> Author: Alexandre Ghiti >>>> Date: Fri Jul 21 08:43:44 2023 +0000 >>>> >>>> riscv: Implement flush_cache_vmap() >>>> >>>> The RISC-V kernel needs a sfence.vma after a page table >>>> modification: we >>>> used to rely on the vmalloc fault handling to emit an sfence.vma, but >>>> commit 7d3332be011e ("riscv: mm: Pre-allocate PGD entries for >>>> vmalloc/modules area") got rid of this path for 64-bit kernels, so >>>> now we >>>> need to explicitly emit a sfence.vma in flush_cache_vmap(). >>>> >>>> Note that we don't need to implement flush_cache_vunmap() as the >>>> generic >>>> code should emit a flush tlb after unmapping a vmalloc region. >>>> >>>> Fixes: 7d3332be011e ("riscv: mm: Pre-allocate PGD entries for >>>> vmalloc/modules area") >>>> Signed-off-by: Alexandre Ghiti >>>> >>>> diff --git a/arch/riscv/include/asm/cacheflush.h >>>> b/arch/riscv/include/asm/cacheflush.h >>>> index 8091b8bf4883..b93ffddf8a61 100644 >>>> --- a/arch/riscv/include/asm/cacheflush.h >>>> +++ b/arch/riscv/include/asm/cacheflush.h >>>> @@ -37,6 +37,10 @@ static inline void flush_dcache_page(struct page *page) >>>> #define flush_icache_user_page(vma, pg, addr, len) \ >>>> flush_icache_mm(vma->vm_mm, 0) >>>> >>>> +#ifdef CONFIG_64BIT >>>> +#define flush_cache_vmap(start, end) flush_tlb_kernel_range(start, end) >>>> +#endif >>> I don't want that, and flush_tlb_kernel_range is flush_tlb_all. In >>> addition, it would call IPI, which is a performance killer. >> >> At the moment, flush_tlb_kernel_range() indeed calls flush_tlb_all() but >> that needs to be fixed, see my last patchset >> https://lore.kernel.org/linux-riscv/20230711075434.10936-1-alexghiti@rivosinc.com/. >> >> But can you at least check that this fixes your issue? It would be >> interesting to see if the problem comes from vmalloc or something else. > It could solve my issue. > >> >>> What's the problem of spurious fault replay? It only costs a >>> local_tlb_flush with vaddr. >> >> We had this exact discussion internally this week, and the fault replay >> seems like a solution. But that needs to be thought carefully: the >> vmalloc fault was removed for a reason (see Bjorn commit log), tracing >> functions can use vmalloc() in the path of the vmalloc fault, causing an >> infinite trap loop. And here you are simply re-enabling this problem. > Thx for mentioning it, and I will solve it in the next version of the patch: > > -static inline void vmalloc_fault(struct pt_regs *regs, int code, > unsigned long addr) > +static void notrace vmalloc_fault(struct pt_regs *regs, int code, > unsigned long addr) That does not solve the problem, since it should be any function called from the trap entry to vmalloc_fault() that needs to be marked a notrace. But it's not only tracing, it's all code that could vmalloc() something in the page fault path before reaching vmalloc_fault(). I have been rethinking about that,  it is very unlikely but the problem could happen, even if the microarchitecture does not cache invalid entries (but it's way more likely to happen when invalid entries are cached in the TLB)...And the only way I can think of to get rid of it is a preventive sfence.vma. > >> In >> addition, this patch makes vmalloc_fault() catch *all* kernel faults in >> the kernel address space, so any genuine kernel fault would loop forever >> in vmalloc_fault(). > We check whether kernel vaddr is valid by the page_table, not range. > I'm sure "the any genuine kernel fault would loop forever in > vmalloc_fault()" is about what? Could you give an example? In the patch you propose, vmalloc_fault() would intercept all faults triggered on kernel addresses, even protection traps. vmalloc_fault() only checks the presence of the faulting entry in the kernel page table, not its permissions. So any protection trap on kernel addresses would loop forever in vmalloc_fault(). > >> >> For now, the simplest solution is to implement flush_cache_vmap() >> because riscv needs a sfence.vma when adding a new mapping, and if > It's not a local_tlb_flush, and it would ipi broadcast all harts. > on_each_cpu(__ipi_flush_tlb_all, NULL, 1); > > That's too horrible. > > Some custom drivers or test codes may care about it. Yes, and there is vmap stack too... > >> that's a "performance killer", let's measure that and implement >> something like this patch is trying to do. I may be wrong, but there >> aren't many new kernel mappings that would require a call to >> flush_cache_vmap() so I disagree with the performance killer argument, >> but happy to be proven otherwise! > 1. I agree to pre-allocate pgd entries. It's good for performance, but > don't do that when Sv32. Nothing changes for sv32, vmalloc_fault() is still there (but to me, there is still the problem with vmalloc() done before reaching vmalloc_fault()). > 2. We still need vmalloc_fault to match ISA spec requirements. (Some > vendors' microarchitectures (e.g., T-HEAD c910) could prevent V=0 into > TLB when PTW, then they don't need it.) I disagree, even if invalid entries are not cached in the TLB, there still exists a small window where we could take a trap on a newly created vmalloc mapping which would require vmalloc_fault(). Or to prevent that, we need flush_cache_vmap(). > 3. Only when vmalloc_fault can't solve the problem, then let's think > about the flush_cache_vmap() solution. To me, vmalloc_fault() can't solve the problem, even when invalid entries are not cached in the TLB. So I agree with you that flush_cache_vmap() is not that great, but I don't see any other straightforward solution here. Maybe a very early sfence.vma in the page fault path, before anything gets called, but we need a solution for 6.5. > >> Thanks, >> >> Alex >> >> >>>> + >>>> #ifndef CONFIG_SMP >>>> >>>> #define flush_icache_all() local_flush_icache_all() >>>> >>>> >>>> Let me know if that works for you! >>>> >>>> >>> -- >>> Best Regards >>> Guo Ren > > > -- > Best Regards > Guo Ren