[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <207de995-6d48-41ea-8373-2f9caad9b9c3@arm.com>
Date: Tue, 28 Nov 2023 11:49:37 +0000
From: Ryan Roberts <ryan.roberts@....com>
To: Barry Song <21cnbao@...il.com>
Cc: akpm@...ux-foundation.org, andreyknvl@...il.com,
anshuman.khandual@....com, ardb@...nel.org,
catalin.marinas@....com, david@...hat.com, dvyukov@...gle.com,
glider@...gle.com, james.morse@....com, jhubbard@...dia.com,
linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org,
linux-mm@...ck.org, mark.rutland@....com, maz@...nel.org,
oliver.upton@...ux.dev, ryabinin.a.a@...il.com,
suzuki.poulose@....com, vincenzo.frascino@....com,
wangkefeng.wang@...wei.com, will@...nel.org, willy@...radead.org,
yuzenghui@...wei.com, yuzhao@...gle.com, ziy@...dia.com
Subject: Re: [PATCH v2 14/14] arm64/mm: Add ptep_get_and_clear_full() to
optimize process teardown
On 28/11/2023 08:17, Barry Song wrote:
>> +pte_t contpte_ptep_get_and_clear_full(struct mm_struct *mm,
>> + unsigned long addr, pte_t *ptep)
>> +{
>> + /*
>> + * When doing a full address space teardown, we can avoid unfolding the
>> + * contiguous range, and therefore avoid the associated tlbi. Instead,
>> + * just get and clear the pte. The caller is promising to call us for
>> + * every pte, so every pte in the range will be cleared by the time the
>> + * tlbi is issued.
>> + *
>> + * This approach is not perfect though, as for the duration between
>> + * returning from the first call to ptep_get_and_clear_full() and making
>> + * the final call, the contpte block in an intermediate state, where
>> + * some ptes are cleared and others are still set with the PTE_CONT bit.
>> + * If any other APIs are called for the ptes in the contpte block during
>> + * that time, we have to be very careful. The core code currently
>> + * interleaves calls to ptep_get_and_clear_full() with ptep_get() and so
>> + * ptep_get() must be careful to ignore the cleared entries when
>> + * accumulating the access and dirty bits - the same goes for
>> + * ptep_get_lockless(). The only other calls we might resonably expect
>> + * are to set markers in the previously cleared ptes. (We shouldn't see
>> + * valid entries being set until after the tlbi, at which point we are
>> + * no longer in the intermediate state). Since markers are not valid,
>> + * this is safe; set_ptes() will see the old, invalid entry and will not
>> + * attempt to unfold. And the new pte is also invalid so it won't
>> + * attempt to fold. We shouldn't see this for the 'full' case anyway.
>> + *
>> + * The last remaining issue is returning the access/dirty bits. That
>> + * info could be present in any of the ptes in the contpte block.
>> + * ptep_get() will gather those bits from across the contpte block. We
>> + * don't bother doing that here, because we know that the information is
>> + * used by the core-mm to mark the underlying folio as accessed/dirty.
>> + * And since the same folio must be underpinning the whole block (that
>> + * was a requirement for folding in the first place), that information
>> + * will make it to the folio eventually once all the ptes have been
>> + * cleared. This approach means we don't have to play games with
>> + * accumulating and storing the bits. It does mean that any interleaved
>> + * calls to ptep_get() may lack correct access/dirty information if we
>> + * have already cleared the pte that happened to store it. The core code
>> + * does not rely on this though.
>
> even without any other threads running and touching those PTEs, this won't survive
> on some hardware. we expose inconsistent CONTPTEs to hardware, this might result
No that's not the case; if you read the Arm ARM, the page table is only
considered "misgrogrammed" when *valid* entries within the same contpte block
have different values for the contiguous bit. We are clearing the ptes to zero
here, which is an *invalid* entry. So if the TLB entry somehow gets invalidated
(either due to explicit tlbi as you point out below, or due to a concurrent TLB
miss which selects our entry for removal to make space for the new incomming
entry), then it gets an access request for an address in our partially cleared
contpte block the address will either be:
A) an address for a pte entry we have already cleared, so its invalid and it
will fault (and get serialized behind the PTL).
or
B) an address for a pte entry we haven't yet cleared, so it will reform a TLB
entry for the contpte block. But that's ok because the memory still exists
because we haven't yet finished clearing the page table and have not yet issued
the final tlbi.
> in crashed firmware even in trustzone, strange&unknown faults to trustzone we have
> seen on Qualcomm, but for MTK, it seems fine. when you do tlbi on a part of PTEs
> with dropped CONT but still some other PTEs have CONT, we make hardware totally
> confused.
I suspect this is because in your case you are "misprogramming" the contpte
block; there are *valid* pte entries within the block that disagree about the
contiguous bit or about various other fields. In this case some HW TLB designs
can do weird things. I suspect in your case, that's resulting in accessing bad
memory space and causing an SError, which is trapped by EL3, and the FW is
probably just panicking at that point.
>
> zap_pte_range() has a force_flush when tlbbatch is full:
>
> if (unlikely(__tlb_remove_page(tlb, page, delay_rmap))) {
> force_flush = 1;
> addr += PAGE_SIZE;
> break;
> }
>
> this means you can expose partial tlbi/flush directly to hardware while some
> other PTEs are still CONT.
Yes, but that's also possible even if we have a tight loop that clears down the
contpte block; there could still be another core that issues a tlbi while you're
halfway through that loop, or the HW could happen to evict due to TLB pressure
at any time. The point is, it's safe if you are clearing the pte to an *invalid*
entry.
>
> on the other hand, contpte_ptep_get_and_clear_full() doesn't need to depend
> on fullmm, as long as zap range covers a large folio, we can flush tlbi for
> those CONTPTEs all together in your contpte_ptep_get_and_clear_full() rather
> than clearing one PTE.
>
> Our approach in [1] is we do a flush for all CONTPTEs and go directly to the end
> of the large folio:
>
> #ifdef CONFIG_CONT_PTE_HUGEPAGE
> if (pte_cont(ptent)) {
> unsigned long next = pte_cont_addr_end(addr, end);
>
> if (next - addr != HPAGE_CONT_PTE_SIZE) {
> __split_huge_cont_pte(vma, pte, addr, false, NULL, ptl);
> /*
> * After splitting cont-pte
> * we need to process pte again.
> */
> goto again_pte;
> } else {
> cont_pte_huge_ptep_get_and_clear(mm, addr, pte);
>
> tlb_remove_cont_pte_tlb_entry(tlb, pte, addr);
> if (unlikely(!page))
> continue;
>
> if (is_huge_zero_page(page)) {
> tlb_remove_page_size(tlb, page, HPAGE_CONT_PTE_SIZE);
> goto cont_next;
> }
>
> rss[mm_counter(page)] -= HPAGE_CONT_PTE_NR;
> page_remove_rmap(page, true);
> if (unlikely(page_mapcount(page) < 0))
> print_bad_pte(vma, addr, ptent, page);
>
> tlb_remove_page_size(tlb, page, HPAGE_CONT_PTE_SIZE);
> }
> cont_next:
> /* "do while()" will do "pte++" and "addr + PAGE_SIZE" */
> pte += (next - PAGE_SIZE - (addr & PAGE_MASK))/PAGE_SIZE;
> addr = next - PAGE_SIZE;
> continue;
> }
> #endif
>
> this is our "full" counterpart, which clear_flush CONT_PTES pages directly, and
> it never requires tlb->fullmm at all.
Yes, but you are benefitting from the fact that contpte is exposed to core-mm
and it is special-casing them at this level. I'm trying to avoid that.
I don't think there is any correctness issue here. But there is a problem with
fragility, as raised by Alistair. I have some ideas on potentially how to solve
that. I'm going to try to work on it this afternoon and will post if I get some
confidence that it is a real solution.
Thanks,
Ryan
>
> static inline pte_t __cont_pte_huge_ptep_get_and_clear_flush(struct mm_struct *mm,
> unsigned long addr,
> pte_t *ptep,
> bool flush)
> {
> pte_t orig_pte = ptep_get(ptep);
>
> CHP_BUG_ON(!pte_cont(orig_pte));
> CHP_BUG_ON(!IS_ALIGNED(addr, HPAGE_CONT_PTE_SIZE));
> CHP_BUG_ON(!IS_ALIGNED(pte_pfn(orig_pte), HPAGE_CONT_PTE_NR));
>
> return get_clear_flush(mm, addr, ptep, PAGE_SIZE, CONT_PTES, flush);
> }
>
> [1] https://github.com/OnePlusOSS/android_kernel_oneplus_sm8550/blob/oneplus/sm8550_u_14.0.0_oneplus11/mm/memory.c#L1539
>
>> + */
>> +
>> + return __ptep_get_and_clear(mm, addr, ptep);
>> +}
>> +EXPORT_SYMBOL(contpte_ptep_get_and_clear_full);
>> +
>
> Thanks
> Barry
>
>
Powered by blists - more mailing lists