Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp270177imm; Tue, 16 Oct 2018 23:04:11 -0700 (PDT) X-Google-Smtp-Source: ACcGV61WPTYbHxOvLt5ydONVQQKOfYhzDZexoQ1bZvSfmQH1F+PIr7e6iWLJPLofT54R34AtWCE+ X-Received: by 2002:a17:902:7246:: with SMTP id c6-v6mr13128520pll.45.1539756251925; Tue, 16 Oct 2018 23:04:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539756251; cv=none; d=google.com; s=arc-20160816; b=aSAScAKbobHX8n9UrN2I65OAc+aRUdzqOUSYC/coE7mOPvA8mA6qiaHdbciviiBZK6 ibxFxIQE9a+GcraxsdsaEdlPtieiHQm53o1nb8lsBo10upyvCXlvW9dyy5w8SCOpi/bh ye+bklDUo+2jn7dwQ756c3fFvRoewf7o1Q0evrbaS1Y2OSZFbItStL82WHs0IVWVypAm 9sVcq8WLGpXPei33HN5FoXbEYNBlFn/YDRftZppJ8zKQSzUquBl4KubW6b8MAydxhxea 7Hzl0JKQVxsvF+CVau+izp1dMkHyPHQOy1kQT0erOe/e2pASWxMIwRVfqpO2i4hC8cMn rkFg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=0GNeI619Y/uKCqJ549xb1O31pkrSC7P3Sbwedo5w5hs=; b=093MBgT8O8injICqzk+8cPu+5nhVTNYYE962aVTBwWXC75D1/mrhUr9VpXhsVmvSoS Xfv/YMQCwVNLE2YLYUnVCmanPTPX5UIwbADxW7dhfs4DncLMuJf3xjt3ZAqeWpVKoTuV 32tAph8yfNZfLqTCAK1J6rcqYg0mLQs/PSjR5ngJ3Cd3GXyz740L36XTvKI23Sg5VFXp 7/jZ6XsDntkOobogCU9nWZNKeFnoEn1KdrwHWGBKfa2c/A4Ilff9eoZ5gssj5IOelJ09 8nrvZ7CkMMS7r5bpq48XaB0tWLenGmOLNWrgUTi4JsA7JCYExLqKjNe2iCEQ6+GzYcIB 99dQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n77-v6si17607569pfi.67.2018.10.16.23.03.55; Tue, 16 Oct 2018 23:04:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727348AbeJQNyp (ORCPT + 99 others); Wed, 17 Oct 2018 09:54:45 -0400 Received: from pegase1.c-s.fr ([93.17.236.30]:49650 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726957AbeJQNyp (ORCPT ); Wed, 17 Oct 2018 09:54:45 -0400 Received: from localhost (mailhub1-int [192.168.12.234]) by localhost (Postfix) with ESMTP id 42ZhNw2L0Jz9ttBc; Wed, 17 Oct 2018 08:00:32 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [192.168.12.234]) (amavisd-new, port 10024) with ESMTP id f7F0ekkE_V2B; Wed, 17 Oct 2018 08:00:32 +0200 (CEST) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 42ZhNw1dxsz9ttBY; Wed, 17 Oct 2018 08:00:32 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 7107E8B7E8; Wed, 17 Oct 2018 08:00:44 +0200 (CEST) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id wm9FhLnt1yX0; Wed, 17 Oct 2018 08:00:44 +0200 (CEST) Received: from pc13168vm.idsi0.si.c-s.fr (po15451.idsi0.si.c-s.fr [172.25.231.2]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 1DEA78B75F; Wed, 17 Oct 2018 08:00:44 +0200 (CEST) Subject: Re: Crash on FSL Book3E due to pte_pgprot()? (was Re: [PATCH v3 12/24] powerpc/mm: use pte helpers in generic code) To: Michael Ellerman , Bartlomiej Zolnierkiewicz , Benjamin Herrenschmidt , Dominik Brodowski , Geoff Levand , Jens Axboe , Kumar Gala , Li Yang , Nicholas Piggin , Paul Mackerras , Scott Wood , aneesh.kumar@linux.vnet.ibm.com Cc: linux-arm-kernel@lists.infradead.org, linux-block@vger.kernel.org, linux-fbdev@vger.kernel.org, linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, dri-devel@lists.freedesktop.org References: <343c844bbc5081d13ee4c9aa27ff3118f607e1cc.1539092112.git.christophe.leroy@c-s.fr> <87va61jsma.fsf@concordia.ellerman.id.au> From: Christophe Leroy Message-ID: <236d72cd-e6d7-61e5-2c80-e4311e41b4f6@c-s.fr> Date: Wed, 17 Oct 2018 06:00:10 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <87va61jsma.fsf@concordia.ellerman.id.au> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/17/2018 12:59 AM, Michael Ellerman wrote: > Christophe Leroy writes: > >> Get rid of platform specific _PAGE_XXXX in powerpc common code and >> use helpers instead. >> >> mm/dump_linuxpagetables.c will be handled separately >> >> Reviewed-by: Aneesh Kumar K.V >> Signed-off-by: Christophe Leroy >> --- >> arch/powerpc/include/asm/book3s/32/pgtable.h | 9 +++------ >> arch/powerpc/include/asm/nohash/32/pgtable.h | 12 ++++++++---- >> arch/powerpc/include/asm/nohash/pgtable.h | 3 +-- >> arch/powerpc/mm/pgtable.c | 21 +++++++-------------- >> arch/powerpc/mm/pgtable_32.c | 15 ++++++++------- >> arch/powerpc/mm/pgtable_64.c | 14 +++++++------- >> arch/powerpc/xmon/xmon.c | 12 +++++++----- >> 7 files changed, 41 insertions(+), 45 deletions(-) > > So turns out this patch *also* breaks my p5020ds :) > > Even with patch 4 merged, see next. > > It's the same crash: > > pcieport 2000:00:00.0: AER enabled with IRQ 480 > Unable to handle kernel paging request for data at address 0x8000080080080000 > Faulting instruction address: 0xc0000000000192cc > Oops: Kernel access of bad area, sig: 11 [#1] > BE SMP NR_CPUS=24 CoreNet Generic > Modules linked in: > CPU: 0 PID: 1 Comm: swapper/0 Not tainted 4.19.0-rc3-gcc7x-g98c847323b3a #1 > NIP: c0000000000192cc LR: c0000000005d0f9c CTR: 0000000000100000 > REGS: c0000000f31bb400 TRAP: 0300 Not tainted (4.19.0-rc3-gcc7x-g98c847323b3a) > MSR: 0000000080029000 CR: 24000224 XER: 00000000 > DEAR: 8000080080080000 ESR: 0000000000800000 IRQMASK: 0 > GPR00: c0000000005d0f84 c0000000f31bb688 c00000000117dc00 8000080080080000 > GPR04: 0000000000000000 0000000000400000 00000ffbff241010 c0000000f31b8000 > GPR08: 0000000000000000 0000000000100000 0000000000000000 c0000000012d4710 > GPR12: 0000000084000422 c0000000012ff000 c000000000002774 0000000000000000 > GPR16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 > GPR20: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 > GPR24: 0000000000000000 0000000000000000 8000080080080000 c0000000ffff89a8 > GPR28: c0000000f3576400 c0000000f3576410 0000000000400000 c0000000012ecc98 > NIP [c0000000000192cc] ._memset_io+0x6c/0x9c > LR [c0000000005d0f9c] .fsl_qman_probe+0x198/0x928 > Call Trace: > [c0000000f31bb688] [c0000000005d0f84] .fsl_qman_probe+0x180/0x928 (unreliable) > [c0000000f31bb728] [c0000000006432ec] .platform_drv_probe+0x60/0xb4 > [c0000000f31bb7a8] [c00000000064083c] .really_probe+0x294/0x35c > [c0000000f31bb848] [c000000000640d2c] .__driver_attach+0x148/0x14c > [c0000000f31bb8d8] [c00000000063d7dc] .bus_for_each_dev+0xb0/0x118 > [c0000000f31bb988] [c00000000063ff28] .driver_attach+0x34/0x4c > [c0000000f31bba08] [c00000000063f648] .bus_add_driver+0x174/0x2bc > [c0000000f31bbaa8] [c0000000006418bc] .driver_register+0x90/0x180 > [c0000000f31bbb28] [c000000000643270] .__platform_driver_register+0x60/0x7c > [c0000000f31bbba8] [c000000000ee2a70] .fsl_qman_driver_init+0x24/0x38 > [c0000000f31bbc18] [c0000000000023fc] .do_one_initcall+0x64/0x2b8 > [c0000000f31bbcf8] [c000000000e9f480] .kernel_init_freeable+0x3a8/0x494 > [c0000000f31bbda8] [c000000000002798] .kernel_init+0x24/0x148 > [c0000000f31bbe28] [c0000000000009e8] .ret_from_kernel_thread+0x58/0x70 > Instruction dump: > 4e800020 2ba50003 40dd003c 3925fffc 5488402e 7929f082 7d082378 39290001 > 550a801e 7d2903a6 7d4a4378 794a0020 <91430000> 38630004 4200fff8 70a50003 > > > Comparing a working vs broken kernel, it seems to boil down to the fact > that we're filtering out more PTE bits now that we use pte_pgprot() in > ioremap_prot(). > > With the old code we get: > ioremap_prot: addr 0xff800000 flags 0x241215 > ioremap_prot: addr 0xff800000 flags 0x241215 > map_kernel_page: ea 0x8000080080080000 pa 0xff800000 pte 0xff800241215 > > > And now we get: > ioremap_prot: addr 0xff800000 flags 0x241215 pte 0x241215 > ioremap_prot: addr 0xff800000 pte 0x241215 > ioremap_prot: addr 0xff800000 prot 0x241014 > map_kernel_page: ea 0x8000080080080000 pa 0xff800000 pte 0xff800241014 > > So we're losing 0x201, which for nohash book3e is: > > #define _PAGE_PRESENT 0x000001 /* software: pte contains a translation */ > #define _PAGE_PSIZE_4K 0x000200 > > > I haven't worked out if it's one or both of those that matter. At least missing _PAGE_PRESENT is an issue I believe. > > The question is what's the right way to fix it? Should pte_pgprot() not > be filtering those bits out on book3e? I think we should not use pte_pggrot() for that then. What about the below fix ? Christophe From: Christophe Leroy Date: Wed, 17 Oct 2018 05:56:25 +0000 Subject: [PATCH] powerpc/mm: don't use pte_pgprot() in ioremap_prot() pte_pgprot() filters out some required flags like _PAGE_PRESENT. This patch replaces pte_pgprot() by __pgprot(pte_val()) in ioremap_prot() Fixes: 26973fa5ac0e ("powerpc/mm: use pte helpers in generic code") Signed-off-by: Christophe Leroy --- arch/powerpc/mm/pgtable_32.c | 3 ++- arch/powerpc/mm/pgtable_64.c | 4 ++-- 2 files changed, 4 insertions(+), 3 deletions(-) diff --git a/arch/powerpc/mm/pgtable_32.c b/arch/powerpc/mm/pgtable_32.c index 5877f5aa8f5d..a606e2f4937b 100644 --- a/arch/powerpc/mm/pgtable_32.c +++ b/arch/powerpc/mm/pgtable_32.c @@ -122,7 +122,8 @@ ioremap_prot(phys_addr_t addr, unsigned long size, unsigned long flags) pte = pte_exprotect(pte); pte = pte_mkprivileged(pte); - return __ioremap_caller(addr, size, pte_pgprot(pte), __builtin_return_address(0)); + return __ioremap_caller(addr, size, __pgprot(pte_val(pte)), + __builtin_return_address(0)); } EXPORT_SYMBOL(ioremap_prot); diff --git a/arch/powerpc/mm/pgtable_64.c b/arch/powerpc/mm/pgtable_64.c index fb1375c07e8c..836bf436cabb 100644 --- a/arch/powerpc/mm/pgtable_64.c +++ b/arch/powerpc/mm/pgtable_64.c @@ -245,8 +245,8 @@ void __iomem * ioremap_prot(phys_addr_t addr, unsigned long size, pte = pte_mkprivileged(pte); if (ppc_md.ioremap) - return ppc_md.ioremap(addr, size, pte_pgprot(pte), caller); - return __ioremap_caller(addr, size, pte_pgprot(pte), caller); + return ppc_md.ioremap(addr, size, __pgprot(pte_val(pte)), caller); + return __ioremap_caller(addr, size, __pgprot(pte_val(pte)), caller); } -- 2.13.3