From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9C2EDC3ABBC for ; Mon, 12 May 2025 11:07:46 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id B313F6B00EB; Mon, 12 May 2025 07:07:44 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id AE1646B00EC; Mon, 12 May 2025 07:07:44 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 932376B00ED; Mon, 12 May 2025 07:07:44 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id 718F46B00EB for ; Mon, 12 May 2025 07:07:44 -0400 (EDT) Received: from smtpin08.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay02.hostedemail.com (Postfix) with ESMTP id 641B0120E31 for ; Mon, 12 May 2025 11:07:45 +0000 (UTC) X-FDA: 83433980490.08.FA716B0 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by imf25.hostedemail.com (Postfix) with ESMTP id EAD22A0002 for ; Mon, 12 May 2025 11:07:42 +0000 (UTC) Authentication-Results: imf25.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=G3GNj5Ev; spf=pass (imf25.hostedemail.com: domain of david@redhat.com designates 170.10.133.124 as permitted sender) smtp.mailfrom=david@redhat.com; dmarc=pass (policy=quarantine) header.from=redhat.com ARC-Authentication-Results: i=1; imf25.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=G3GNj5Ev; spf=pass (imf25.hostedemail.com: domain of david@redhat.com designates 170.10.133.124 as permitted sender) smtp.mailfrom=david@redhat.com; dmarc=pass (policy=quarantine) header.from=redhat.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1747048063; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=xDlN6ZmHeE38wM5rEw8R3pNs+sPGXzidrKmPhaUd09A=; b=GCSY7qu+XSVynKLJLp/8PDK4gI4sPVbIRWCzRXat1o0aNklku/nd314PE6msGDsykODP1a mzKKOfHEBywZjMM0M6fYuzcPzbS4pMMis4+Y0h54BkgsUmWljA34QR4fP63k9XnbjgsLrP ipQoMXDAkhu8zk/aylyQZi3yq7wu8Ks= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1747048063; a=rsa-sha256; cv=none; b=g6Kw6TTGPFJFCnmYnUg+uABJlfXSohzcj6CM+1qFQwuBtibfLroDCUN8FEBaOzpXIG1MhB vWwanOJXF1WwyEk4j8Yc63sAncmyEvg1zLtqyu5DyOAVJQSymBgkF5I+1Jevh2M9kvDvXM hD86OOxO1zOTyPLtZsI8WOn5KlsZ3Lw= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1747048062; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:autocrypt:autocrypt; bh=xDlN6ZmHeE38wM5rEw8R3pNs+sPGXzidrKmPhaUd09A=; b=G3GNj5Ev2fvfOKe+xopOQKBjdXvaWim6IR9faXhqLMje2FbvAbGSg2QL5XFP1hu1ZVGT86 Dy1N1jbmUj6L8HYnRDGg1Whi+ewyYHCp2mXGoDjVZfdjzptrm624WnLxY2RblNd1BbdAgc cVa3FlNIhWg4qKdR6HMbPptwVAfxk18= Received: from mail-wm1-f70.google.com (mail-wm1-f70.google.com [209.85.128.70]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-686-oY3EfLnBNOytaBcruYEfgQ-1; Mon, 12 May 2025 07:07:40 -0400 X-MC-Unique: oY3EfLnBNOytaBcruYEfgQ-1 X-Mimecast-MFC-AGG-ID: oY3EfLnBNOytaBcruYEfgQ_1747048059 Received: by mail-wm1-f70.google.com with SMTP id 5b1f17b1804b1-43e9b0fd00cso21085685e9.0 for ; Mon, 12 May 2025 04:07:40 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1747048059; x=1747652859; h=content-transfer-encoding:in-reply-to:organization:autocrypt :content-language:from:references:cc:to:subject:user-agent :mime-version:date:message-id:x-gm-message-state:from:to:cc:subject :date:message-id:reply-to; bh=xDlN6ZmHeE38wM5rEw8R3pNs+sPGXzidrKmPhaUd09A=; b=KXiSCrGDxMEKw/8//OwYBA7+IAOMC+46keX47Itdfae5GRa4UDANRIo+Dpf3qCJkOz 04umCa1Em3ERQLZQET/UUgUtjGb2fpBfm/RHQfzSLCD6OK3AUKqre9ZDlBdadyV0BecS a8IpqHVwz06cP5HZ22Pk2XaREf6xy9th1dFqBLQrbCfsRUDr1Dgiz2iOZhX/N5QYNDaB npymIBzc9mGj/tMJs7yDzqYpuoYMvgLAi8261hXMWDnTQQbZtGL2ixR0gQWq58vEV8Oi Xy0lX1bAJlpysiErrsyEBGfpWb1k4/3/ZIuiJz69YiEpn/c8YF+XIxGR8yIkBvfEMFFX 8mUQ== X-Forwarded-Encrypted: i=1; AJvYcCW3eYDIDjoEpMUFYO3p4I1iwK/GlufT5kBoEtN3VVh2jokC+OAKs8LP5MgN4YUe3cKAUiKiX3BaJA==@kvack.org X-Gm-Message-State: AOJu0YxebKG3jd6FAE/Z0McN4dzICpCsaaRzPL7xCtasH97dyjhDywQx 43jxfmjThoE+6B5rCQ53vrlh4xsSUmit2KR4wNcSaAxvAPsyxeZPER7C1mGii3AlcdVNFu+lSDj mmqUAGLbpPPQWlp8jbPWZe+6PTRMjt9uuv43lOhA7YMZ0L1GN X-Gm-Gg: ASbGnct8F1zRBajbNJtPsZYUJYzdXWom/biIqjr4yj8r45jNwxg54yWR52vRab71DrI H4xBrwbKY5g2vPKtrcQ6BABVScc5czRyvaTq9jterCb3nGsAbVrq503yvOgkc737Wqmwy07pNW1 X66kex6KrIJ+GIu7R+7OujID8t5rVIdJt7WWXe/cJcdMIcONOz5iMpdld7vc7yZ4lfDaLc+Pb7v giHb3+TReR5yn+BtHVxy95Vlih40VXnFSg/haZXiKBbbdOINcUwFFZgnIUw95z1Yy2HmS/6fm64 uWCFRtny+muxAV4LuM/fm5jLXwX9mCYS7LCFlTIDuV3rMR9KknTROesSFVkkI45DKn9aHIkQgFx VQan9sRrrfS1hF1z/vMzSW2YECwBW2sYfxCieqLo= X-Received: by 2002:a7b:c4d5:0:b0:439:8490:d1e5 with SMTP id 5b1f17b1804b1-442d02c9a5amr100535325e9.4.1747048059559; Mon, 12 May 2025 04:07:39 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHE4oaKoxPHh6f8ScLGzX7lbN9OG659i54zYiWg/nRmD6o59W4m9TYPnhguyqPdJHuZJ3Dd/g== X-Received: by 2002:a7b:c4d5:0:b0:439:8490:d1e5 with SMTP id 5b1f17b1804b1-442d02c9a5amr100535065e9.4.1747048059043; Mon, 12 May 2025 04:07:39 -0700 (PDT) Received: from ?IPV6:2003:d8:2f4a:5800:f1ae:8e20:d7f4:51b0? (p200300d82f4a5800f1ae8e20d7f451b0.dip0.t-ipconnect.de. [2003:d8:2f4a:5800:f1ae:8e20:d7f4:51b0]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-442d67d5c2asm122443655e9.1.2025.05.12.04.07.38 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 12 May 2025 04:07:38 -0700 (PDT) Message-ID: <001dfd4f-27f2-407f-bd1c-21928a754342@redhat.com> Date: Mon, 12 May 2025 13:07:37 +0200 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH] arm64/mm: Disable barrier batching in interrupt contexts To: Ryan Roberts , Catalin Marinas , Will Deacon , Pasha Tatashin , Andrew Morton , Uladzislau Rezki , Christoph Hellwig , "Matthew Wilcox (Oracle)" , Mark Rutland , Anshuman Khandual , Alexandre Ghiti , Kevin Brodsky Cc: linux-arm-kernel@lists.infradead.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, syzbot+5c0d9392e042f41d45c5@syzkaller.appspotmail.com References: <20250512102242.4156463-1-ryan.roberts@arm.com> From: David Hildenbrand Autocrypt: addr=david@redhat.com; keydata= xsFNBFXLn5EBEAC+zYvAFJxCBY9Tr1xZgcESmxVNI/0ffzE/ZQOiHJl6mGkmA1R7/uUpiCjJ dBrn+lhhOYjjNefFQou6478faXE6o2AhmebqT4KiQoUQFV4R7y1KMEKoSyy8hQaK1umALTdL QZLQMzNE74ap+GDK0wnacPQFpcG1AE9RMq3aeErY5tujekBS32jfC/7AnH7I0v1v1TbbK3Gp XNeiN4QroO+5qaSr0ID2sz5jtBLRb15RMre27E1ImpaIv2Jw8NJgW0k/D1RyKCwaTsgRdwuK Kx/Y91XuSBdz0uOyU/S8kM1+ag0wvsGlpBVxRR/xw/E8M7TEwuCZQArqqTCmkG6HGcXFT0V9 PXFNNgV5jXMQRwU0O/ztJIQqsE5LsUomE//bLwzj9IVsaQpKDqW6TAPjcdBDPLHvriq7kGjt WhVhdl0qEYB8lkBEU7V2Yb+SYhmhpDrti9Fq1EsmhiHSkxJcGREoMK/63r9WLZYI3+4W2rAc UucZa4OT27U5ZISjNg3Ev0rxU5UH2/pT4wJCfxwocmqaRr6UYmrtZmND89X0KigoFD/XSeVv jwBRNjPAubK9/k5NoRrYqztM9W6sJqrH8+UWZ1Idd/DdmogJh0gNC0+N42Za9yBRURfIdKSb B3JfpUqcWwE7vUaYrHG1nw54pLUoPG6sAA7Mehl3nd4pZUALHwARAQABzSREYXZpZCBIaWxk ZW5icmFuZCA8ZGF2aWRAcmVkaGF0LmNvbT7CwZgEEwEIAEICGwMGCwkIBwMCBhUIAgkKCwQW AgMBAh4BAheAAhkBFiEEG9nKrXNcTDpGDfzKTd4Q9wD/g1oFAl8Ox4kFCRKpKXgACgkQTd4Q 9wD/g1oHcA//a6Tj7SBNjFNM1iNhWUo1lxAja0lpSodSnB2g4FCZ4R61SBR4l/psBL73xktp rDHrx4aSpwkRP6Epu6mLvhlfjmkRG4OynJ5HG1gfv7RJJfnUdUM1z5kdS8JBrOhMJS2c/gPf wv1TGRq2XdMPnfY2o0CxRqpcLkx4vBODvJGl2mQyJF/gPepdDfcT8/PY9BJ7FL6Hrq1gnAo4 3Iv9qV0JiT2wmZciNyYQhmA1V6dyTRiQ4YAc31zOo2IM+xisPzeSHgw3ONY/XhYvfZ9r7W1l pNQdc2G+o4Di9NPFHQQhDw3YTRR1opJaTlRDzxYxzU6ZnUUBghxt9cwUWTpfCktkMZiPSDGd KgQBjnweV2jw9UOTxjb4LXqDjmSNkjDdQUOU69jGMUXgihvo4zhYcMX8F5gWdRtMR7DzW/YE BgVcyxNkMIXoY1aYj6npHYiNQesQlqjU6azjbH70/SXKM5tNRplgW8TNprMDuntdvV9wNkFs 9TyM02V5aWxFfI42+aivc4KEw69SE9KXwC7FSf5wXzuTot97N9Phj/Z3+jx443jo2NR34XgF 89cct7wJMjOF7bBefo0fPPZQuIma0Zym71cP61OP/i11ahNye6HGKfxGCOcs5wW9kRQEk8P9 M/k2wt3mt/fCQnuP/mWutNPt95w9wSsUyATLmtNrwccz63XOwU0EVcufkQEQAOfX3n0g0fZz Bgm/S2zF/kxQKCEKP8ID+Vz8sy2GpDvveBq4H2Y34XWsT1zLJdvqPI4af4ZSMxuerWjXbVWb T6d4odQIG0fKx4F8NccDqbgHeZRNajXeeJ3R7gAzvWvQNLz4piHrO/B4tf8svmRBL0ZB5P5A 2uhdwLU3NZuK22zpNn4is87BPWF8HhY0L5fafgDMOqnf4guJVJPYNPhUFzXUbPqOKOkL8ojk CXxkOFHAbjstSK5Ca3fKquY3rdX3DNo+EL7FvAiw1mUtS+5GeYE+RMnDCsVFm/C7kY8c2d0G NWkB9pJM5+mnIoFNxy7YBcldYATVeOHoY4LyaUWNnAvFYWp08dHWfZo9WCiJMuTfgtH9tc75 7QanMVdPt6fDK8UUXIBLQ2TWr/sQKE9xtFuEmoQGlE1l6bGaDnnMLcYu+Asp3kDT0w4zYGsx 5r6XQVRH4+5N6eHZiaeYtFOujp5n+pjBaQK7wUUjDilPQ5QMzIuCL4YjVoylWiBNknvQWBXS lQCWmavOT9sttGQXdPCC5ynI+1ymZC1ORZKANLnRAb0NH/UCzcsstw2TAkFnMEbo9Zu9w7Kv AxBQXWeXhJI9XQssfrf4Gusdqx8nPEpfOqCtbbwJMATbHyqLt7/oz/5deGuwxgb65pWIzufa N7eop7uh+6bezi+rugUI+w6DABEBAAHCwXwEGAEIACYCGwwWIQQb2cqtc1xMOkYN/MpN3hD3 AP+DWgUCXw7HsgUJEqkpoQAKCRBN3hD3AP+DWrrpD/4qS3dyVRxDcDHIlmguXjC1Q5tZTwNB boaBTPHSy/Nksu0eY7x6HfQJ3xajVH32Ms6t1trDQmPx2iP5+7iDsb7OKAb5eOS8h+BEBDeq 3ecsQDv0fFJOA9ag5O3LLNk+3x3q7e0uo06XMaY7UHS341ozXUUI7wC7iKfoUTv03iO9El5f XpNMx/YrIMduZ2+nd9Di7o5+KIwlb2mAB9sTNHdMrXesX8eBL6T9b+MZJk+mZuPxKNVfEQMQ a5SxUEADIPQTPNvBewdeI80yeOCrN+Zzwy/Mrx9EPeu59Y5vSJOx/z6OUImD/GhX7Xvkt3kq Er5KTrJz3++B6SH9pum9PuoE/k+nntJkNMmQpR4MCBaV/J9gIOPGodDKnjdng+mXliF3Ptu6 3oxc2RCyGzTlxyMwuc2U5Q7KtUNTdDe8T0uE+9b8BLMVQDDfJjqY0VVqSUwImzTDLX9S4g/8 kC4HRcclk8hpyhY2jKGluZO0awwTIMgVEzmTyBphDg/Gx7dZU1Xf8HFuE+UZ5UDHDTnwgv7E th6RC9+WrhDNspZ9fJjKWRbveQgUFCpe1sa77LAw+XFrKmBHXp9ZVIe90RMe2tRL06BGiRZr jPrnvUsUUsjRoRNJjKKA/REq+sAnhkNPPZ/NNMjaZ5b8Tovi8C0tmxiCHaQYqj7G2rgnT0kt WNyWQQ== Organization: Red Hat In-Reply-To: <20250512102242.4156463-1-ryan.roberts@arm.com> X-Mimecast-Spam-Score: 0 X-Mimecast-MFC-PROC-ID: bVBH-Jl2LrT2KCg_LkYUSCkl58TEwuM2y6Z2DUP0fDw_1747048059 X-Mimecast-Originator: redhat.com Content-Language: en-US Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: EAD22A0002 X-Stat-Signature: 8a8dt1dgyeqi6tfkinf86dbkzr38t7ow X-Rspam-User: X-HE-Tag: 1747048062-405475 X-HE-Meta: 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 G3OfFYnf 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On 12.05.25 12:22, Ryan Roberts wrote: > Commit 5fdd05efa1cd ("arm64/mm: Batch barriers when updating kernel > mappings") enabled arm64 kernels to track "lazy mmu mode" using TIF > flags in order to defer barriers until exiting the mode. At the same > time, it added warnings to check that pte manipulations were never > performed in interrupt context, because the tracking implementation > could not deal with nesting. > > But it turns out that some debug features (e.g. KFENCE, DEBUG_PAGEALLOC) > do manipulate ptes in softirq context, which triggered the warnings. > > So let's take the simplest and safest route and disable the batching > optimization in interrupt contexts. This makes these users no worse off > than prior to the optimization. Additionally the known offenders are > debug features that only manipulate a single PTE, so there is no > performance gain anyway. > > There may be some obscure case of encrypted/decrypted DMA with the > dma_free_coherent called from an interrupt context, but again, this is > no worse off than prior to the commit. > > Some options for supporting nesting were considered, but there is a > difficult to solve problem if any code manipulates ptes within interrupt > context but *outside of* a lazy mmu region. If this case exists, the > code would expect the updates to be immediate, but because the task > context may have already been in lazy mmu mode, the updates would be > deferred, which could cause incorrect behaviour. This problem is avoided > by always ensuring updates within interrupt context are immediate. > > Fixes: 5fdd05efa1cd ("arm64/mm: Batch barriers when updating kernel mappings") > Reported-by: syzbot+5c0d9392e042f41d45c5@syzkaller.appspotmail.com > Closes: https://lore.kernel.org/linux-arm-kernel/681f2a09.050a0220.f2294.0006.GAE@google.com/ > Signed-off-by: Ryan Roberts > --- > > Hi Will, > > I've tested before and after with KFENCE enabled and it solves the issue. I've > also run all the mm-selftests which all continue to pass. > > Catalin suggested a Fixes patch targetting the SHA as it is in for-next/mm was > the preferred approach, but shout if you want something different. I'm hoping > that with this fix we can still make it for this cycle, subject to not finding > any more issues. > > Thanks, > Ryan > > > arch/arm64/include/asm/pgtable.h | 16 ++++++++++++++-- > 1 file changed, 14 insertions(+), 2 deletions(-) > > diff --git a/arch/arm64/include/asm/pgtable.h b/arch/arm64/include/asm/pgtable.h > index ab4a1b19e596..e65083ec35cb 100644 > --- a/arch/arm64/include/asm/pgtable.h > +++ b/arch/arm64/include/asm/pgtable.h > @@ -64,7 +64,11 @@ static inline void queue_pte_barriers(void) > { > unsigned long flags; > > - VM_WARN_ON(in_interrupt()); > + if (in_interrupt()) { > + emit_pte_barriers(); > + return; > + } > + > flags = read_thread_flags(); > > if (flags & BIT(TIF_LAZY_MMU)) { > @@ -79,7 +83,9 @@ static inline void queue_pte_barriers(void) > #define __HAVE_ARCH_ENTER_LAZY_MMU_MODE > static inline void arch_enter_lazy_mmu_mode(void) > { > - VM_WARN_ON(in_interrupt()); > + if (in_interrupt()) > + return; > + > VM_WARN_ON(test_thread_flag(TIF_LAZY_MMU)); > > set_thread_flag(TIF_LAZY_MMU); > @@ -87,12 +93,18 @@ static inline void arch_enter_lazy_mmu_mode(void) > > static inline void arch_flush_lazy_mmu_mode(void) > { > + if (in_interrupt()) > + return; > + > if (test_and_clear_thread_flag(TIF_LAZY_MMU_PENDING)) > emit_pte_barriers(); > } > > static inline void arch_leave_lazy_mmu_mode(void) > { > + if (in_interrupt()) > + return; > + > arch_flush_lazy_mmu_mode(); > clear_thread_flag(TIF_LAZY_MMU); > } I guess in all cases we could optimize out the in_interrupt() check on !debug configs. Hm, maybe there is an elegant way to catch all of these "problematic" users? -- Cheers, David / dhildenb