Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp726175ybc; Sat, 16 Nov 2019 07:37:47 -0800 (PST) X-Google-Smtp-Source: APXvYqx/BZvcCuq70cesNY+wDmFOx4v2ckwAY614T/0XeWxDNxEmhDjkZ9nyOrB3rKSrjQ3tKLqP X-Received: by 2002:a17:906:6d05:: with SMTP id m5mr10612881ejr.102.1573918667141; Sat, 16 Nov 2019 07:37:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573918667; cv=none; d=google.com; s=arc-20160816; b=aacvjjeThLG8XHaPWwXHgisvCvo2cV5VnHncZD3y0BOWFYCtCjtpPuNrki2qUrn1+S 8D+u377fIZCMX2Orj+EosyHVmaC+Lp0hvH3UjQ1F2gQSwzs6gP2KyKtpfoeBdToktYKF uPEFQN0hw91xdRQ7KeHWoceapCYBf3eZVyb+Rtr+11YmrLLUvcV3uZXIcL9p1UI99dux rw/jG4xM3GD0/FbOOPa7lfroUEKY/hhnigoo6aROLDgI97IoCbZjsyMG7zgPXDOljSSG bnrSNRSg/r7rMw1uqTxxFALMh64CLNAgTbwugvWGfFDQOIiu++c3+gQXJ8YKdH8BkYnm G6eg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=+4M4UvCgtPgoFyUVLRuHwdJhHWp0OA8X9iVXKzPAkVw=; b=h0xH5b3TTXvmPiqu2XsO8h5IhJ4TWEIe1V3hNbmbn4vjpZ7C3xYlWFyqPepShTtoGS Efx5aPVp3oeTzT5DbtF3dU1ZX/HLN2RdpZVXMNjguHwzVei8Taes+0lDOh9OnL6nqNvn l9iy9DpGc4JKWJMqWik5y192ZIaRa1Ch8mhAAiW8TryUhCbxqVdcNBvxYSzptMH2jtKn BrSRWMeutoc9Qv2DQ3wsXnYOJMd5ypAL7OPWWsrdeBg02s2ufd3k1W07yBDjSnwOw7GD WtR7I0B5SsIacbrTtgqtqdNFK88t6iPj/cIH5HZXzTFD8bAJZyR+0tODfFjalXmmZgf0 bB3g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=H1e8cTfs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id os28si7925791ejb.53.2019.11.16.07.37.22; Sat, 16 Nov 2019 07:37:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=H1e8cTfs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727800AbfKPPfi (ORCPT + 99 others); Sat, 16 Nov 2019 10:35:38 -0500 Received: from mail-wm1-f66.google.com ([209.85.128.66]:52820 "EHLO mail-wm1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727737AbfKPPfh (ORCPT ); Sat, 16 Nov 2019 10:35:37 -0500 Received: by mail-wm1-f66.google.com with SMTP id l1so12619197wme.2 for ; Sat, 16 Nov 2019 07:35:35 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=+4M4UvCgtPgoFyUVLRuHwdJhHWp0OA8X9iVXKzPAkVw=; b=H1e8cTfsATzwnwWPQbmTRjVNZS2yEoelFwA+SwidadZ+kA1OigsRQX0lDzsmCljGdX B+xoWhxkm95RxjXu1Uuvhoa5OGe0oeL26SE+7Ay3fq5i3rEBLYxdqLsXV+wHsyUal75X /B1ZS1biYF65BDRVzRQv3fnKRRgsKdT1DDKBr6HRHjYFhnUTwCqavvDHCTDc+Uvzn9zX 9F+2ZCqsSEobR104rTKEeVUAgxTPlWQxkuKPq2AdWl8zSwsm3aV/6m9PbAV+tvopuA9s oNxh7wytS7Uw8NoxtxFtI+YtqVhYgAO2HzGlLmWMz6jfS6T+EtlNxpkfVrnzKqvpkpaR 39SA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=+4M4UvCgtPgoFyUVLRuHwdJhHWp0OA8X9iVXKzPAkVw=; b=UCGkSEcYm61Fv/n18MelgjnAXihMp10uVB4qs3wn8QqAX7RtceahaSIH54kMNzk/Uc H00garvB5rc0VP+XHVv/rsqZH7G03PlQnqwgu0CJUEabzspemeABgWh3sDBfT3ajbLqT UoMypopDuaPuv51aK3dcNrDadF0VCNxv8QCMbG1Gys2yJlWXKa+atclM0Gyvab0suJUI FIuU7Aq1edOSp40Oa/S9EZP+22DPPfQUuGfnWGbpfN+1WCn5wx8qFwgwko00c1qU2hH1 6vMeF4l9A7DWbktbOs0+cU0Hq/Nn6UcOmaXwiZn4uU7NrqCtdc8M4GOXXjYhcCrxQEzR s2iQ== X-Gm-Message-State: APjAAAVwHlnyPrD/7nUoiEIW6VUw01m2c3x+uwkjLxGPxqDRKo7CxtT5 +u4g9AMSrvD+oeGSQ0Hj0ejD4t/CF4TDnJfO/du+0w== X-Received: by 2002:a1c:3d08:: with SMTP id k8mr19453365wma.119.1573918534193; Sat, 16 Nov 2019 07:35:34 -0800 (PST) MIME-Version: 1.0 References: <5dcf8f19.1c69fb81.c02f3.91f2@mx.google.com> <20191116123244.7be79023@why> In-Reply-To: <20191116123244.7be79023@why> From: Ard Biesheuvel Date: Sat, 16 Nov 2019 16:35:21 +0100 Message-ID: Subject: Re: rmk/for-next bisection: boot on ox820-cloudengines-pogoplug-series-3 To: Marc Zyngier Cc: "kernelci.org bot" , Arnd Bergmann , Ard Biesheuvel , tomeu.vizoso@collabora.com, Guillaume Tucker , mgalka@collabora.com, Russell King , Mark Brown , Matt Hart , Kevin Hilman , Enric Balletbo i Serra , Linus Walleij , Linux Kernel Mailing List , Thomas Gleixner , Stefan Agner , Nicolas Pitre , Nick Desaulniers , Russell King , linux-arm-kernel Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 16 Nov 2019 at 13:32, Marc Zyngier wrote: > > On Sat, 16 Nov 2019 10:26:27 +0000 > Ard Biesheuvel wrote: > > > (+ Arnd) > > > > On Sat, 16 Nov 2019 at 05:54, kernelci.org bot wrote: > > > > > > * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * > > > * This automated bisection report was sent to you on the basis * > > > * that you may be involved with the breaking commit it has * > > > * found. No manual investigation has been done to verify it, * > > > * and the root cause of the problem may be somewhere else. * > > > * * > > > * If you do send a fix, please include this trailer: * > > > * Reported-by: "kernelci.org bot" * > > > * * > > > * Hope this helps! * > > > * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * > > > > > > rmk/for-next bisection: boot on ox820-cloudengines-pogoplug-series-3 > > > > > > Summary: > > > Start: b6c3c42cfda0 ARM: 8938/1: kernel: initialize broadcast hrtimer based clock event device > > > Details: https://kernelci.org/boot/id/5dcf3f0359b514dc84cf54c8 > > > Plain log: https://storage.kernelci.org//rmk/for-next/v5.4-rc5-26-gb6c3c42cfda0/arm/oxnas_v6_defconfig/gcc-8/lab-baylibre/boot-ox820-cloudengines-pogoplug-series-3.txt > > > HTML log: https://storage.kernelci.org//rmk/for-next/v5.4-rc5-26-gb6c3c42cfda0/arm/oxnas_v6_defconfig/gcc-8/lab-baylibre/boot-ox820-cloudengines-pogoplug-series-3.html > > > Result: ea70bf6e92c5 ARM: 8935/1: decompressor: avoid CP15 barrier instructions in v7 cache setup code > > > > > > > OK, so this regression is caused by the fact that the 'armv7' cache > > maintenance routines in the decompressor are also used for ARMv6 cores > > if they implement the CPUID extension, which I failed to realise when > > I sent this patch. > > Nobody expects the 11MPcore... :-(. > Yeah :-) > > There are roughly three ways to deal with this: > > 1) add a mask/val match pair for ARM11MPcore and ARM1176 that hardwire > > them to the ARMv6 routines, even though they implement the CPUID > > extension. This would be very easy, but assumes that those two cores > > are the only ones that are affected by this. > > 2) modify the v7 routines to check for the L1Hvd MMFR1 attribute (in > > the flush routine) and for the CP15BEN SCTLR bit (in the on/off > > routines), and jump to the respective v6 variants if the CPU turns out > > not to support the v7 one. > > 3) revert the patch, and just enable the CP15 barriers (and issue a v7 > > barrier) in the v7 on() and flush() routines. > > > > I am leaning towards the latter, since it is the most straightforward, > > even though it mixes v7 and cp15 barriers in the same function, but > > that was mostly a cosmetic concern anyway. > > A potential alternative is to check for the presence of architected > barriers in a macro (see the hack below). I've given it a go as a 32bit > guest on an A72 box, both as ARM and Thumb, and nothing caught fire. Of > course, it remains to be seen whether it works on a v6 machine (I don't > think I have any left in my zoo -- please don't send me any), and more > importantly whether we want to carry this kind of horror... > Thanks. But as I said, it might be better just to enable the CP15 barriers. They haven't been removed from the architecture yet, so they are always supported - we just have to enable them. > > diff --git a/arch/arm/boot/compressed/head.S b/arch/arm/boot/compressed/head.S > index ec14687aea3c..144de4b08547 100644 > --- a/arch/arm/boot/compressed/head.S > +++ b/arch/arm/boot/compressed/head.S > @@ -656,19 +656,40 @@ params: ldr r0, =0x10000100 @ params_phys for RPC > .align > #endif > > - .macro v7dsb > + @ Check for architected barrier instructions > + @ Branch to the tgt label if v7 barriers are > + @ not available. Corrupts the tmp register > + @ as well as the flags. > + .macro no_v7_barrier, tmp, tgt > + mrc p15, 0, \tmp, c0, c2, 4 @ ID_ISAR4 > + tst \tmp, #0xf << 16 > + beq \tgt > + .endm > + > + @ The following macros will use zreg as a temp > + @ register, and will zero it after use. > + .macro __dsb, zreg > + no_v7_barrier \zreg, .L__dsb\@ > ARM( .inst 0xf57ff04f @ v7+ dsb ) > THUMB( dsb ) > + mov \zreg, #0 > +.L__dsb\@: mcreq p15, 0, \zreg, c7, c10, 4 @ dsb > .endm > > - .macro v7dmb > + .macro __dmb, zreg > + no_v7_barrier \zreg, .L__dmb\@ > ARM( .inst 0xf57ff05f @ v7+ dmb ) > THUMB( dmb ) > + mov \zreg, #0 > +.L__dmb\@: mcreq p15, 0, \zreg, c7, c10, 5 @ dmb > .endm > > - .macro v7isb > + .macro __isb, zreg > + no_v7_barrier \zreg, .L__isb\@ > ARM( .inst 0xf57ff06f @ v7+ isb ) > THUMB( isb ) > + mov \zreg, #0 > +.L__isb\@: mcreq p15, 0, \zreg, c7, c5, 4 @ isb > .endm > > /* > @@ -841,8 +862,7 @@ __armv7_mmu_cache_on: > tst r11, #0xf @ VMSA > movne r6, #CB_BITS | 0x02 @ !XN > blne __setup_mmu > - mov r0, #0 > - v7dsb @ drain write buffer > + __dsb r0 @ drain write buffer > tst r11, #0xf @ VMSA > mcrne p15, 0, r0, c8, c7, 0 @ flush I,D TLBs > #endif > @@ -864,11 +884,10 @@ __armv7_mmu_cache_on: > mcrne p15, 0, r1, c3, c0, 0 @ load domain access control > mcrne p15, 0, r6, c2, c0, 2 @ load ttb control > #endif > - v7isb > + __isb lr > mcr p15, 0, r0, c1, c0, 0 @ load control register > mrc p15, 0, r0, c1, c0, 0 @ and read it back > - mov r0, #0 > - v7isb > + __isb r0 > mov pc, r12 > > __fa526_cache_on: > @@ -1169,8 +1188,8 @@ __armv7_mmu_cache_off: > mcr p15, 0, r0, c8, c7, 0 @ invalidate whole TLB > #endif > mcr p15, 0, r0, c7, c5, 6 @ invalidate BTC > - v7dsb > - v7isb > + __dsb r0 > + __isb r0 > mov pc, r12 > > /* > @@ -1233,7 +1252,7 @@ __armv7_mmu_cache_flush: > mcr p15, 0, r10, c7, c14, 0 @ clean+invalidate D > b iflush > hierarchical: > - v7dmb > + __dmb r10 > stmfd sp!, {r0-r7, r9-r11} > mrc p15, 1, r0, c0, c0, 1 @ read clidr > ands r3, r0, #0x7000000 @ extract loc from clidr > @@ -1247,7 +1266,7 @@ loop1: > cmp r1, #2 @ see what cache we have at this level > blt skip @ skip if no cache, or just i-cache > mcr p15, 2, r10, c0, c0, 0 @ select current cache level in cssr > - v7isb @ isb to sych the new cssr&csidr > + __isb r1 @ isb to sych the new cssr&csidr > mrc p15, 1, r1, c0, c0, 0 @ read the new csidr > and r2, r1, #7 @ extract the length of the cache lines > add r2, r2, #4 @ add 4 (line length offset) > @@ -1279,10 +1298,10 @@ finished: > mov r10, #0 @ switch back to cache level 0 > mcr p15, 2, r10, c0, c0, 0 @ select current cache level in cssr > iflush: > - v7dsb > + __dsb r10 > mcr p15, 0, r10, c7, c5, 0 @ invalidate I+BTB > - v7dsb > - v7isb > + __dsb r10 > + __isb r10 > mov pc, lr > > __armv5tej_mmu_cache_flush: > > -- > Jazz is not dead. It just smells funny...