diff options
author | Kyle McMartin <kmcmarti@redhat.com> | 2015-03-13 12:38:27 -0400 |
---|---|---|
committer | Kyle McMartin <kmcmarti@redhat.com> | 2015-03-13 12:38:27 -0400 |
commit | 088b1f27a9ac1b6df3180ed4d132d4fd280862fe (patch) | |
tree | 849cec877fd09b8f11c4e797eed765bf9cab8fd9 | |
parent | 62a6befde2f0d1860dbd17931c83ef0d1be44a1f (diff) | |
download | kernel-088b1f27a9ac1b6df3180ed4d132d4fd280862fe.tar.gz kernel-088b1f27a9ac1b6df3180ed4d132d4fd280862fe.tar.xz kernel-088b1f27a9ac1b6df3180ed4d132d4fd280862fe.zip |
arm64-revert-tlb-rcu_table_free.patch: revert 5e5f6dc1
which causes lockups on arm64 machines.
-rw-r--r-- | arm64-revert-tlb-rcu_table_free.patch | 436 | ||||
-rw-r--r-- | kernel.spec | 7 |
2 files changed, 443 insertions, 0 deletions
diff --git a/arm64-revert-tlb-rcu_table_free.patch b/arm64-revert-tlb-rcu_table_free.patch new file mode 100644 index 000000000..5291fa5e9 --- /dev/null +++ b/arm64-revert-tlb-rcu_table_free.patch @@ -0,0 +1,436 @@ +diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig +index 1b8e973..31042fe 100644 +--- a/arch/arm64/Kconfig ++++ b/arch/arm64/Kconfig +@@ -65,7 +65,6 @@ config ARM64 + select HAVE_PERF_EVENTS + select HAVE_PERF_REGS + select HAVE_PERF_USER_STACK_DUMP +- select HAVE_RCU_TABLE_FREE + select HAVE_SYSCALL_TRACEPOINTS + select IRQ_DOMAIN + select MODULES_USE_ELF_RELA +@@ -119,9 +118,6 @@ config GENERIC_CALIBRATE_DELAY + config ZONE_DMA + def_bool y + +-config HAVE_GENERIC_RCU_GUP +- def_bool y +- + config ARCH_DMA_ADDR_T_64BIT + def_bool y + +diff --git a/arch/arm64/include/asm/pgtable.h b/arch/arm64/include/asm/pgtable.h +index 800ec0e..e2e79ac 100644 +--- a/arch/arm64/include/asm/pgtable.h ++++ b/arch/arm64/include/asm/pgtable.h +@@ -243,16 +243,6 @@ static inline void set_pte_at(struct mm_struct *mm, unsigned long addr, + + #define __HAVE_ARCH_PTE_SPECIAL + +-static inline pte_t pud_pte(pud_t pud) +-{ +- return __pte(pud_val(pud)); +-} +- +-static inline pmd_t pud_pmd(pud_t pud) +-{ +- return __pmd(pud_val(pud)); +-} +- + static inline pte_t pmd_pte(pmd_t pmd) + { + return __pte(pmd_val(pmd)); +@@ -275,13 +265,7 @@ static inline pgprot_t mk_sect_prot(pgprot_t prot) + #ifdef CONFIG_TRANSPARENT_HUGEPAGE + #define pmd_trans_huge(pmd) (pmd_val(pmd) && !(pmd_val(pmd) & PMD_TABLE_BIT)) + #define pmd_trans_splitting(pmd) pte_special(pmd_pte(pmd)) +-#ifdef CONFIG_HAVE_RCU_TABLE_FREE +-#define __HAVE_ARCH_PMDP_SPLITTING_FLUSH +-struct vm_area_struct; +-void pmdp_splitting_flush(struct vm_area_struct *vma, unsigned long address, +- pmd_t *pmdp); +-#endif /* CONFIG_HAVE_RCU_TABLE_FREE */ +-#endif /* CONFIG_TRANSPARENT_HUGEPAGE */ ++#endif + + #define pmd_dirty(pmd) pte_dirty(pmd_pte(pmd)) + #define pmd_young(pmd) pte_young(pmd_pte(pmd)) +@@ -302,7 +286,7 @@ void pmdp_splitting_flush(struct vm_area_struct *vma, unsigned long address, + #define pfn_pmd(pfn,prot) (__pmd(((phys_addr_t)(pfn) << PAGE_SHIFT) | pgprot_val(prot))) + #define mk_pmd(page,prot) pfn_pmd(page_to_pfn(page),prot) + +-#define pud_write(pud) pte_write(pud_pte(pud)) ++#define pmd_page(pmd) pfn_to_page(__phys_to_pfn(pmd_val(pmd) & PHYS_MASK)) + #define pud_pfn(pud) (((pud_val(pud) & PUD_MASK) & PHYS_MASK) >> PAGE_SHIFT) + + #define set_pmd_at(mm, addr, pmdp, pmd) set_pte_at(mm, addr, (pte_t *)pmdp, pmd_pte(pmd)) +@@ -407,8 +391,6 @@ static inline pmd_t *pmd_offset(pud_t *pud, unsigned long addr) + return (pmd_t *)pud_page_vaddr(*pud) + pmd_index(addr); + } + +-#define pud_page(pud) pfn_to_page(__phys_to_pfn(pud_val(pud) & PHYS_MASK)) +- + #endif /* CONFIG_ARM64_PGTABLE_LEVELS > 2 */ + + #if CONFIG_ARM64_PGTABLE_LEVELS > 3 +@@ -443,8 +425,6 @@ static inline pud_t *pud_offset(pgd_t *pgd, unsigned long addr) + return (pud_t *)pgd_page_vaddr(*pgd) + pud_index(addr); + } + +-#define pgd_page(pgd) pfn_to_page(__phys_to_pfn(pgd_val(pgd) & PHYS_MASK)) +- + #endif /* CONFIG_ARM64_PGTABLE_LEVELS > 3 */ + + #define pgd_ERROR(pgd) __pgd_error(__FILE__, __LINE__, pgd_val(pgd)) +diff --git a/arch/arm64/include/asm/tlb.h b/arch/arm64/include/asm/tlb.h +index c028fe3..62731ef 100644 +--- a/arch/arm64/include/asm/tlb.h ++++ b/arch/arm64/include/asm/tlb.h +@@ -19,44 +19,84 @@ + #ifndef __ASM_TLB_H + #define __ASM_TLB_H + +-#include <linux/pagemap.h> +-#include <linux/swap.h> +- +-#ifdef CONFIG_HAVE_RCU_TABLE_FREE +- +-#define tlb_remove_entry(tlb, entry) tlb_remove_table(tlb, entry) +-static inline void __tlb_remove_table(void *_table) +-{ +- free_page_and_swap_cache((struct page *)_table); +-} +-#else +-#define tlb_remove_entry(tlb, entry) tlb_remove_page(tlb, entry) +-#endif /* CONFIG_HAVE_RCU_TABLE_FREE */ ++#define __tlb_remove_pmd_tlb_entry __tlb_remove_pmd_tlb_entry + + #include <asm-generic/tlb.h> + ++/* ++ * There's three ways the TLB shootdown code is used: ++ * 1. Unmapping a range of vmas. See zap_page_range(), unmap_region(). ++ * tlb->fullmm = 0, and tlb_start_vma/tlb_end_vma will be called. ++ * 2. Unmapping all vmas. See exit_mmap(). ++ * tlb->fullmm = 1, and tlb_start_vma/tlb_end_vma will be called. ++ * Page tables will be freed. ++ * 3. Unmapping argument pages. See shift_arg_pages(). ++ * tlb->fullmm = 0, but tlb_start_vma/tlb_end_vma will not be called. ++ */ + static inline void tlb_flush(struct mmu_gather *tlb) + { + if (tlb->fullmm) { + flush_tlb_mm(tlb->mm); +- } else { ++ } else if (tlb->end > 0) { + struct vm_area_struct vma = { .vm_mm = tlb->mm, }; + flush_tlb_range(&vma, tlb->start, tlb->end); ++ tlb->start = TASK_SIZE; ++ tlb->end = 0; ++ } ++} ++ ++static inline void tlb_add_flush(struct mmu_gather *tlb, unsigned long addr) ++{ ++ if (!tlb->fullmm) { ++ tlb->start = min(tlb->start, addr); ++ tlb->end = max(tlb->end, addr + PAGE_SIZE); + } + } + ++/* ++ * Memorize the range for the TLB flush. ++ */ ++static inline void __tlb_remove_tlb_entry(struct mmu_gather *tlb, pte_t *ptep, ++ unsigned long addr) ++{ ++ tlb_add_flush(tlb, addr); ++} ++ ++/* ++ * In the case of tlb vma handling, we can optimise these away in the ++ * case where we're doing a full MM flush. When we're doing a munmap, ++ * the vmas are adjusted to only cover the region to be torn down. ++ */ ++static inline void tlb_start_vma(struct mmu_gather *tlb, ++ struct vm_area_struct *vma) ++{ ++ if (!tlb->fullmm) { ++ tlb->start = TASK_SIZE; ++ tlb->end = 0; ++ } ++} ++ ++static inline void tlb_end_vma(struct mmu_gather *tlb, ++ struct vm_area_struct *vma) ++{ ++ if (!tlb->fullmm) ++ tlb_flush(tlb); ++} ++ + static inline void __pte_free_tlb(struct mmu_gather *tlb, pgtable_t pte, + unsigned long addr) + { + pgtable_page_dtor(pte); +- tlb_remove_entry(tlb, pte); ++ tlb_add_flush(tlb, addr); ++ tlb_remove_page(tlb, pte); + } + + #if CONFIG_ARM64_PGTABLE_LEVELS > 2 + static inline void __pmd_free_tlb(struct mmu_gather *tlb, pmd_t *pmdp, + unsigned long addr) + { +- tlb_remove_entry(tlb, virt_to_page(pmdp)); ++ tlb_add_flush(tlb, addr); ++ tlb_remove_page(tlb, virt_to_page(pmdp)); + } + #endif + +@@ -64,8 +104,15 @@ static inline void __pmd_free_tlb(struct mmu_gather *tlb, pmd_t *pmdp, + static inline void __pud_free_tlb(struct mmu_gather *tlb, pud_t *pudp, + unsigned long addr) + { +- tlb_remove_entry(tlb, virt_to_page(pudp)); ++ tlb_add_flush(tlb, addr); ++ tlb_remove_page(tlb, virt_to_page(pudp)); + } + #endif + ++static inline void __tlb_remove_pmd_tlb_entry(struct mmu_gather *tlb, pmd_t *pmdp, ++ unsigned long address) ++{ ++ tlb_add_flush(tlb, address); ++} ++ + #endif +diff --git a/arch/arm64/mm/flush.c b/arch/arm64/mm/flush.c +index b6f14e8..0d64089 100644 +--- a/arch/arm64/mm/flush.c ++++ b/arch/arm64/mm/flush.c +@@ -104,19 +104,3 @@ EXPORT_SYMBOL(flush_dcache_page); + */ + EXPORT_SYMBOL(flush_cache_all); + EXPORT_SYMBOL(flush_icache_range); +- +-#ifdef CONFIG_TRANSPARENT_HUGEPAGE +-#ifdef CONFIG_HAVE_RCU_TABLE_FREE +-void pmdp_splitting_flush(struct vm_area_struct *vma, unsigned long address, +- pmd_t *pmdp) +-{ +- pmd_t pmd = pmd_mksplitting(*pmdp); +- +- VM_BUG_ON(address & ~PMD_MASK); +- set_pmd_at(vma->vm_mm, address, pmdp, pmd); +- +- /* dummy IPI to serialise against fast_gup */ +- kick_all_cpus_sync(); +-} +-#endif /* CONFIG_HAVE_RCU_TABLE_FREE */ +-#endif /* CONFIG_TRANSPARENT_HUGEPAGE */ +diff --git a/include/asm-generic/tlb.h b/include/asm-generic/tlb.h +index db284bf..5672d7e 100644 +--- a/include/asm-generic/tlb.h ++++ b/include/asm-generic/tlb.h +@@ -96,9 +96,10 @@ struct mmu_gather { + #endif + unsigned long start; + unsigned long end; ++ unsigned int need_flush : 1, /* Did free PTEs */ + /* we are in the middle of an operation to clear + * a full mm and can make some optimizations */ +- unsigned int fullmm : 1, ++ fullmm : 1, + /* we have performed an operation which + * requires a complete flush of the tlb */ + need_flush_all : 1; +@@ -127,58 +128,16 @@ static inline void tlb_remove_page(struct mmu_gather *tlb, struct page *page) + tlb_flush_mmu(tlb); + } + +-static inline void __tlb_adjust_range(struct mmu_gather *tlb, +- unsigned long address) +-{ +- tlb->start = min(tlb->start, address); +- tlb->end = max(tlb->end, address + PAGE_SIZE); +-} +- +-static inline void __tlb_reset_range(struct mmu_gather *tlb) +-{ +- if (tlb->fullmm) { +- tlb->start = tlb->end = ~0; +- } else { +- tlb->start = TASK_SIZE; +- tlb->end = 0; +- } +-} +- +-/* +- * In the case of tlb vma handling, we can optimise these away in the +- * case where we're doing a full MM flush. When we're doing a munmap, +- * the vmas are adjusted to only cover the region to be torn down. +- */ +-#ifndef tlb_start_vma +-#define tlb_start_vma(tlb, vma) do { } while (0) +-#endif +- +-#define __tlb_end_vma(tlb, vma) \ +- do { \ +- if (!tlb->fullmm && tlb->end) { \ +- tlb_flush(tlb); \ +- __tlb_reset_range(tlb); \ +- } \ +- } while (0) +- +-#ifndef tlb_end_vma +-#define tlb_end_vma __tlb_end_vma +-#endif +- +-#ifndef __tlb_remove_tlb_entry +-#define __tlb_remove_tlb_entry(tlb, ptep, address) do { } while (0) +-#endif +- + /** + * tlb_remove_tlb_entry - remember a pte unmapping for later tlb invalidation. + * +- * Record the fact that pte's were really unmapped by updating the range, +- * so we can later optimise away the tlb invalidate. This helps when +- * userspace is unmapping already-unmapped pages, which happens quite a lot. ++ * Record the fact that pte's were really umapped in ->need_flush, so we can ++ * later optimise away the tlb invalidate. This helps when userspace is ++ * unmapping already-unmapped pages, which happens quite a lot. + */ + #define tlb_remove_tlb_entry(tlb, ptep, address) \ + do { \ +- __tlb_adjust_range(tlb, address); \ ++ tlb->need_flush = 1; \ + __tlb_remove_tlb_entry(tlb, ptep, address); \ + } while (0) + +@@ -192,27 +151,27 @@ static inline void __tlb_reset_range(struct mmu_gather *tlb) + + #define tlb_remove_pmd_tlb_entry(tlb, pmdp, address) \ + do { \ +- __tlb_adjust_range(tlb, address); \ ++ tlb->need_flush = 1; \ + __tlb_remove_pmd_tlb_entry(tlb, pmdp, address); \ + } while (0) + + #define pte_free_tlb(tlb, ptep, address) \ + do { \ +- __tlb_adjust_range(tlb, address); \ ++ tlb->need_flush = 1; \ + __pte_free_tlb(tlb, ptep, address); \ + } while (0) + + #ifndef __ARCH_HAS_4LEVEL_HACK + #define pud_free_tlb(tlb, pudp, address) \ + do { \ +- __tlb_adjust_range(tlb, address); \ ++ tlb->need_flush = 1; \ + __pud_free_tlb(tlb, pudp, address); \ + } while (0) + #endif + + #define pmd_free_tlb(tlb, pmdp, address) \ + do { \ +- __tlb_adjust_range(tlb, address); \ ++ tlb->need_flush = 1; \ + __pmd_free_tlb(tlb, pmdp, address); \ + } while (0) + +diff --git a/mm/memory.c b/mm/memory.c +index 411144f..2772d7a 100644 +--- a/mm/memory.c ++++ b/mm/memory.c +@@ -220,6 +220,9 @@ void tlb_gather_mmu(struct mmu_gather *tlb, struct mm_struct *mm, unsigned long + /* Is it from 0 to ~0? */ + tlb->fullmm = !(start | (end+1)); + tlb->need_flush_all = 0; ++ tlb->start = start; ++ tlb->end = end; ++ tlb->need_flush = 0; + tlb->local.next = NULL; + tlb->local.nr = 0; + tlb->local.max = ARRAY_SIZE(tlb->__pages); +@@ -229,28 +232,23 @@ void tlb_gather_mmu(struct mmu_gather *tlb, struct mm_struct *mm, unsigned long + #ifdef CONFIG_HAVE_RCU_TABLE_FREE + tlb->batch = NULL; + #endif +- +- __tlb_reset_range(tlb); + } + + static void tlb_flush_mmu_tlbonly(struct mmu_gather *tlb) + { +- if (!tlb->end) +- return; +- ++ tlb->need_flush = 0; + tlb_flush(tlb); + mmu_notifier_invalidate_range(tlb->mm, tlb->start, tlb->end); + #ifdef CONFIG_HAVE_RCU_TABLE_FREE + tlb_table_flush(tlb); + #endif +- __tlb_reset_range(tlb); + } + + static void tlb_flush_mmu_free(struct mmu_gather *tlb) + { + struct mmu_gather_batch *batch; + +- for (batch = &tlb->local; batch && batch->nr; batch = batch->next) { ++ for (batch = &tlb->local; batch; batch = batch->next) { + free_pages_and_swap_cache(batch->pages, batch->nr); + batch->nr = 0; + } +@@ -259,6 +257,8 @@ static void tlb_flush_mmu_free(struct mmu_gather *tlb) + + void tlb_flush_mmu(struct mmu_gather *tlb) + { ++ if (!tlb->need_flush) ++ return; + tlb_flush_mmu_tlbonly(tlb); + tlb_flush_mmu_free(tlb); + } +@@ -293,7 +293,7 @@ int __tlb_remove_page(struct mmu_gather *tlb, struct page *page) + { + struct mmu_gather_batch *batch; + +- VM_BUG_ON(!tlb->end); ++ VM_BUG_ON(!tlb->need_flush); + + batch = tlb->active; + batch->pages[batch->nr++] = page; +@@ -360,6 +360,8 @@ void tlb_remove_table(struct mmu_gather *tlb, void *table) + { + struct mmu_table_batch **batch = &tlb->batch; + ++ tlb->need_flush = 1; ++ + /* + * When there's less then two users of this mm there cannot be a + * concurrent page-table walk. +@@ -1161,8 +1163,20 @@ again: + arch_leave_lazy_mmu_mode(); + + /* Do the actual TLB flush before dropping ptl */ +- if (force_flush) ++ if (force_flush) { ++ unsigned long old_end; ++ ++ /* ++ * Flush the TLB just for the previous segment, ++ * then update the range to be the remaining ++ * TLB range. ++ */ ++ old_end = tlb->end; ++ tlb->end = addr; + tlb_flush_mmu_tlbonly(tlb); ++ tlb->start = addr; ++ tlb->end = old_end; ++ } + pte_unmap_unlock(start_pte, ptl); + + /* diff --git a/kernel.spec b/kernel.spec index 3a1891e8e..66b28f766 100644 --- a/kernel.spec +++ b/kernel.spec @@ -660,6 +660,7 @@ Patch26168: HID-multitouch-add-support-of-clickpads.patch # git clone ssh://git.fedorahosted.org/git/kernel-arm64.git, git diff master...devel Patch30000: kernel-arm64.patch +Patch30001: arm64-revert-tlb-rcu_table_free.patch # END OF PATCH DEFINITIONS @@ -1422,8 +1423,10 @@ ApplyPatch HID-multitouch-add-support-of-clickpads.patch %if 0%{?aarch64patches} ApplyPatch kernel-arm64.patch +ApplyPatch arm64-revert-tlb-rcu_table_free.patch %ifnarch aarch64 # this is stupid, but i want to notice before secondary koji does. ApplyPatch kernel-arm64.patch -R +ApplyPatch arm64-revert-tlb-rcu_table_free.patch -R %endif %endif @@ -2277,6 +2280,10 @@ fi # # %changelog +* Fri Mar 13 2015 Kyle McMartin <kyle@fedoraproject.org> +- arm64-revert-tlb-rcu_table_free.patch: revert 5e5f6dc1 which + causes lockups on arm64 machines. + * Fri Mar 13 2015 Josh Boyer <jwboyer@fedoraproject.org> - 4.0.0-0.rc3.git2.1 - Linux v4.0-rc3-148-gc202baf017ae - Add patch to support clickpads (rhbz 1201532) |