[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1628068469.gv4bl1fw7w.astroid@bobo.none>
Date: Wed, 04 Aug 2021 21:36:27 +1000
From: Nicholas Piggin <npiggin@...il.com>
To: Christophe Leroy <christophe.leroy@...roup.eu>
Cc: Benjamin Herrenschmidt <benh@...nel.crashing.org>,
Finn Thain <fthain@...ux-m68k.org>,
linux-kernel@...r.kernel.org, linuxppc-dev@...ts.ozlabs.org,
Michael Ellerman <mpe@...erman.id.au>,
Paul Mackerras <paulus@...ba.org>, userm57@...oo.com
Subject: Re: [PATCH] powerpc/32s: Fix napping restore in data storage
interrupt (DSI)
Excerpts from Christophe Leroy's message of August 4, 2021 4:21 pm:
> Hi Nic,
>
> I think I'll need your help on that one.
>
> Le 04/08/2021 à 08:07, Christophe Leroy a écrit :
>>
>>
>> Le 04/08/2021 à 06:04, Finn Thain a écrit :
Hi Finn!
>>> On Tue, 3 Aug 2021, Christophe Leroy wrote:
>>>
> ...
>>>
>>> ------------[ cut here ]------------
>>> kernel BUG at arch/powerpc/kernel/interrupt.c:49!
>>> Oops: Exception in kernel mode, sig: 5 [#1]
>>> BE PAGE_SIZE=4K MMU=Hash SMP NR_CPUS=2 PowerMac
>>> Modules linked in:
>>> CPU: 0 PID: 1859 Comm: xfce4-session Not tainted 5.13.0-pmac-VMAP #10
>>> NIP: c0011474 LR: c0011464 CTR: 00000000
>>> REGS: e2f75e40 TRAP: 0700 Not tainted (5.13.0-pmac-VMAP)
>>> MSR: 00021032 <ME,IR,DR,RI> CR: 2400446c XER: 20000000
>>>
>>> GPR00: c001604c e2f75f00 ca284a60 00000000 00000000 a5205eb0 00000008 00000020
>>> GPR08: ffffffc0 00000001 501200d9 ce030005 ca285010 00c1f778 00000000 00000000
>>> GPR16: 00945b20 009402f8 00000001 a6b87550 a51fd000 afb73220 a6b22c78 a6a6aecc
>>> GPR24: 00000000 ffffffc0 00000020 00000008 a5205eb0 00000000 e2f75f40 000000ae
>>> NIP [c0011474] system_call_exception+0x60/0x164
>>> LR [c0011464] system_call_exception+0x50/0x164
>>> Call Trace:
>>> [e2f75f00] [00009000] 0x9000 (unreliable)
>>> [e2f75f30] [c001604c] ret_from_syscall+0x0/0x28
>>> --- interrupt: c00 at 0xa69d6cb0
>>> NIP: a69d6cb0 LR: a69d6c3c CTR: 00000000
>>> REGS: e2f75f40 TRAP: 0c00 Not tainted (5.13.0-pmac-VMAP)
>>> MSR: 0000d032 <EE,PR,ME,IR,DR,RI> CR: 2400446c XER: 20000000
>>>
>>> GPR00: 000000ae a5205de0 a5687ca0 00000000 00000000 a5205eb0 00000008 00000020
>>> GPR08: ffffffc0 401201ea 401200d9 ffffffff c158f230 00c1f778 00000000 00000000
>>> GPR16: 00945b20 009402f8 00000001 a6b87550 a51fd000 afb73220 a6b22c78 a6a6aecc
>>> GPR24: afb72fc8 00000000 00000001 a5205f30 afb733dc 00000000 a6b85ff4 a5205eb0
>>> NIP [a69d6cb0] 0xa69d6cb0
>>> LR [a69d6c3c] 0xa69d6c3c
>>> --- interrupt: c00
>>> Instruction dump:
>>> 7cdb3378 93810020 7cbc2b78 93a10024 7c9d2378 93e1002c 7d3f4b78 4800d629
>>> 817e0084 931e0088 69690002 5529fffe <0f090000> 69694000 552997fe 0f090000
>>> ---[ end trace c66c6c3c44806276 ]---
>>>
>
> Getting a BUG at arch/powerpc/kernel/interrupt.c:49 meaning MSR_RI is not set, but the c00 interrupt
> frame shows MSR_RI properly set, so what ?
Could the stack be correct but regs pointer incorrect?
Instruction dump is
0: 78 33 db 7c mr r27,r6
4: 20 00 81 93 stw r28,32(r1)
8: 78 2b bc 7c mr r28,r5
c: 24 00 a1 93 stw r29,36(r1)
10: 78 23 9d 7c mr r29,r4
14: 2c 00 e1 93 stw r31,44(r1)
18: 78 4b 3f 7d mr r31,r9
1c: 29 d6 00 48 bl 0xd644
20: 84 00 7e 81 lwz r11,132(r30)
24: 88 00 1e 93 stw r24,136(r30)
28: 02 00 69 69 xori r9,r11,2
2c: fe ff 29 55 rlwinm r9,r9,31,31,31
30: 00 00 09 0f twnei r9,0
34: 00 40 69 69 xori r9,r11,16384
38: fe 97 29 55 rlwinm r9,r9,18,31,31
3c: 00 00 09 0f twnei r9,0
regs->msr is in r11 == 0xce030005 so some kernel address?
r1 == 0xe2f75f00
r30 == 0xe2f75f40
I think that matches if the function allocates 48 bytes of stack.
STACK_FRAME_OVERHEAD is 16, so the difference would be 0x40 in that
case. Seems okay.
I'm not sure then. Can you get a hash fault interrupt come in here
because of the vmap stack access and clobber r11? Hmm...
fast_hash_page_return:
andis. r10, r9, SRR1_ISI_NOPT@h /* Set on ISI, cleared on DSI */
Is that really right? DSI can set this bit for NOHPTE as well no?
That'd do it.
Thanks,
Nick
Powered by blists - more mailing lists