From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from buffalo.tulip.relay.mailchannels.net (buffalo.tulip.relay.mailchannels.net [23.83.218.24]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D45B818639 for ; Tue, 5 Mar 2024 19:47:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=pass smtp.client-ip=23.83.218.24 ARC-Seal:i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709668055; cv=pass; b=BqknZXrWDGOn8F93AJlFMvk1UwgrqM9vPhrXBxLRGfcmujsjUiRIeklzXOzssEaD714z+cAGA+Q5Jxphf2h4JkQAAuum4ngypXOQ/rgiCs0rDqfDoYou4nagnWzBG9dlH/ImlXwBMivV7mfxidJUcVbZ3l/nCDx/dDage0+5Qhg= ARC-Message-Signature:i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709668055; c=relaxed/simple; bh=giaEKfckGjS3IKGGoymltghhXFc22afEJBfjWIyAyuU=; h=Date:From:To:Cc:Subject:Message-ID:MIME-Version:Content-Type: Content-Disposition; b=lCT/j0VkubZQpVQ7gJn/OlrvVQcq0S7bE504UfhMLzbQjaWBm5gmrS9N81fvrLgmr+/2gqlnfyi/P+vYheF3lfsRmjN99iUlfuHB/0ItoGFFIp6duDRfTJkJCMoYiy6LI0xqU1ncefUXt5sasKG+oKZPDCytsMhbnkCFin/Klpc= ARC-Authentication-Results:i=2; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=templeofstupid.com; spf=pass smtp.mailfrom=templeofstupid.com; dkim=pass (2048-bit key) header.d=templeofstupid.com header.i=@templeofstupid.com header.b=knva6nXZ; arc=pass smtp.client-ip=23.83.218.24 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=templeofstupid.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=templeofstupid.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=templeofstupid.com header.i=@templeofstupid.com header.b="knva6nXZ" X-Sender-Id: dreamhost|x-authsender|kjlx@templeofstupid.com Received: from relay.mailchannels.net (localhost [127.0.0.1]) by relay.mailchannels.net (Postfix) with ESMTP id 306D67A3613 for ; Tue, 5 Mar 2024 19:41:48 +0000 (UTC) Received: from pdx1-sub0-mail-a293.dreamhost.com (unknown [127.0.0.6]) (Authenticated sender: dreamhost) by relay.mailchannels.net (Postfix) with ESMTPA id AE11B7A1F34 for ; Tue, 5 Mar 2024 19:41:47 +0000 (UTC) ARC-Seal: i=1; s=arc-2022; d=mailchannels.net; t=1709667707; a=rsa-sha256; cv=none; b=CvdzGfb4e9a/3rGFfW2pvS++ET2EdQCYfp8cI/eBpMk3/YmBFXkRd/hAGzqvk7rY+Vxy6J UWPUAUifEPB37AGSHVpK/hiXaeEzO+ocJhI+K355dgtEfxksawtQZmaSouF45kMHHPQegC NIslmTby7J059pv+Ta5J9wntaQfNC1eRhXZckJOZR8XnkeeEq+y+gmajPj/mze2vH5vtjM cVDLgwJfms76wQdKowiiWLbRYuAS+azkyhPxeX8RJuOneOWFx+AIlLQQnCcf+/clIt9r8P E/pcmW4FgAVQ7pvkrH/5MrQ04tYoCDFdx4vwBq35IBs2GnecciQG8bWq2x0DDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=mailchannels.net; s=arc-2022; t=1709667707; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: dkim-signature; bh=LpYhkwRacccxYX97IU6DnVg+TCfnBanFzugoowp1BSc=; b=g3EtBrDdXUyF4RD0DR4mmU2xVJhEqYeLWFNLhsFq9Z0978hdMufiJZTBe0PqH0rldNE34I z+uSJAL/wUtJrqMIWToBwJAMBtfG3LnNR3t4qZ5aP2Xh0/mZubyzJEuk5lJLEfe0BDhYJb H/f8jAtHrGWitGG2ll/ZqX2NjBIGqxg2j2he/ok9Fhu6+M+zaL0nAdvz9Ps75JzMj+eYk9 0KiCVUAwneqHU9IBrxnd69Ut7LgbNTHZVqhQoe4xXMr0r6WGZK8y3m8undDUd2Yz10S5yA 5AxGyV/NwZDwXtZDoICI7L+urvtxvl3b0EGgpDbVde7CvzDUDRjjvF5XfmGoBA== ARC-Authentication-Results: i=1; rspamd-55b4bfd7cb-t6svs; auth=pass smtp.auth=dreamhost smtp.mailfrom=kjlx@templeofstupid.com X-Sender-Id: dreamhost|x-authsender|kjlx@templeofstupid.com X-MC-Relay: Neutral X-MailChannels-SenderId: dreamhost|x-authsender|kjlx@templeofstupid.com X-MailChannels-Auth-Id: dreamhost X-Cure-Cooperative: 5d6229dd07153e94_1709667707937_4001639644 X-MC-Loop-Signature: 1709667707937:2183295438 X-MC-Ingress-Time: 1709667707937 Received: from pdx1-sub0-mail-a293.dreamhost.com (pop.dreamhost.com [64.90.62.162]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384) by 100.111.52.242 (trex/6.9.2); Tue, 05 Mar 2024 19:41:47 +0000 Received: from kmjvbox.templeofstupid.com (c-73-222-159-162.hsd1.ca.comcast.net [73.222.159.162]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: kjlx@templeofstupid.com) by pdx1-sub0-mail-a293.dreamhost.com (Postfix) with ESMTPSA id 4Tq5Y73Z64z5y for ; Tue, 5 Mar 2024 11:41:47 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=templeofstupid.com; s=dreamhost; t=1709667707; bh=LpYhkwRacccxYX97IU6DnVg+TCfnBanFzugoowp1BSc=; h=Date:From:To:Cc:Subject:Content-Type; b=knva6nXZzUfXzecR0T2AUebiWkgg6Jw6UPmg56LI9hT1XxhGv/5HbgCZbKqd6F24B dr4jhyKbiIM6tc2+af4mFXDJLp5t6HG36+/rNhsqwlq6l1+OvtZrtteyt5uHJ9rxE7 rqCgWTg1uDdpD1RMQN6omFZ0GnE1yjXC8i78p/7GYG2Mjc89V9y/lMEsLDyVUu5To/ yYYoXYd/OhcNZZtHjdQFeJO8EzHQIbyl1GemNSzte39thRTeCGtTDf0tagQqSIjd+g 7Z3xDMzKOyWbMwxNsM3tGuKMTg5WumyMhhEQW0J1eGqNNs6Gn5lgf0S/J+BcNMIi3m xOH6jCG4rcbOQ== Received: from johansen (uid 1000) (envelope-from kjlx@templeofstupid.com) id e00eb by kmjvbox.templeofstupid.com (DragonFly Mail Agent v0.12); Tue, 05 Mar 2024 11:41:38 -0800 Date: Tue, 5 Mar 2024 11:41:38 -0800 From: Krister Johansen To: stable@vger.kernel.org Cc: Oliver Upton , Marc Zyngier , James Morse , Alexandru Elisei , David Matlack , kvm@vger.kernel.org Subject: [PATCH 5.15.y 0/2] fix softlockups in stage2_apply_range() Message-ID: Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Hi Stable Team, In 5.15, unmapping large kvm vms on arm64 can generate softlockups. My team has been hitting this when tearing down VMs > 100Gb in size. Oliver fixed this with the attached patches. They've been in mainline since 6.1. I tested on 5.15.150 with these patches applied. When they're present, both the dirty_log_perf_test detailed in the second patch, and kvm_page_table_test no longer generate softlockups when unmapping VMs with large memory configurations. Would you please consider these patches for inclusion in an upcoming 5.15 release? Thanks, -K Oliver Upton (2): KVM: arm64: Work out supported block level at compile time KVM: arm64: Limit stage2_apply_range() batch size to largest block arch/arm64/include/asm/kvm_pgtable.h | 18 +++++++++++++----- arch/arm64/include/asm/stage2_pgtable.h | 20 -------------------- arch/arm64/kvm/mmu.c | 9 ++++++++- 3 files changed, 21 insertions(+), 26 deletions(-) -- 2.25.1