Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4750889pxj; Wed, 12 May 2021 12:23:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzo4BEL8AjwUsoh8JMbSxZKrs2B1WneVV9sOSb3qWqODXcOjAghLSeZQH82Vu+kYoVa4Tkx X-Received: by 2002:a17:906:5855:: with SMTP id h21mr39771970ejs.522.1620847384081; Wed, 12 May 2021 12:23:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620847384; cv=none; d=google.com; s=arc-20160816; b=fWbSoUVvrVVTvULrHWRxPaeW9lWxlUYOCQN/Anbq9fZpNX7oKZFuJi7b9A1bpid90u J0iuWr3T5iF+xAJNyym3nUMpTztyN7NWqEPP7KXsVxVGSxCrJSqKMhR1m6Cn/YxEKkdt FI1XMceh5E7NjHTUFwQ21ozeNWq45WB8PMbvnCTHjeOPTjaXZQmXwUjCk6u7YPW44jO7 ZVHkrP0AydCSPgAlk2llx22e1gQBrOowCfZBLjXThtkCq8fw5mVp7W8W9gFNuu7r+LKO 7XB4hSLhP4VUp5DPCE85G22ThWFMl0xxJdizmpf0FkiFRg6hgitfGdCYRqiwrCcKI4rI 3oAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=+SKrukh5YoqRkXFBcQCFPuywNYga5tHssZJnf2aOd08=; b=EhcP9tIJbu2i5Anr/xpV1nAIHQb+0jzsQMdPYp+LXGpCZLEaf/VMbfgXFizycX72Rx FeusZmR+0bzWRjPwFHoShst8CkBPS6ImzF6l/9xTP91VbgKenB7l6bZ6GeFGSAC0xDsT w0d1i7QQ5fsa4GNNZma5DgA8JiBCSLdGeYqNLt+tPWeKQOxotMOSsVefgOswvuWJCbjf 5C0kI7/qzGq28SB1i4TRolHX0pYw12+4TjGCdsilxhi1NIFwdDCkAMD4RAk4qyhYhss/ B/GwoiQhG5nGDcO/wvd7TJRKFPv+SvNp9VU+5rvKgULgbz+WrCSoUuiT7vnDFSnDO6Zh curg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=j4FicRaJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v7si663846edj.328.2021.05.12.12.22.40; Wed, 12 May 2021 12:23:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=j4FicRaJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1377869AbhELTJT (ORCPT + 99 others); Wed, 12 May 2021 15:09:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:34162 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237790AbhELQnN (ORCPT ); Wed, 12 May 2021 12:43:13 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 840C161E5F; Wed, 12 May 2021 16:13:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1620836010; bh=o50pUVnQNqR312fhWezKRUL/tysuHfGppY6YgH24jvM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=j4FicRaJnH/BXlZT19/BrD+19Evsqx4FaTV64YN9kua2UpCh/jQACjxax0HoeV8// BbEszeJoGca1D6Ex2vF/nhQFxb1uM77VriMamPcrH43TEPPesonf02FxILTPUXe1vx Q/CFLaAW62R+dr3C+c6/6GElI0pmTZaG6bOszTT0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, kernel test robot , Dan Carpenter , =?UTF-8?q?C=C3=A9dric=20Le=20Goater?= , Greg Kurz , Michael Ellerman , Sasha Levin Subject: [PATCH 5.12 574/677] powerpc/xive: Fix xmon command "dxi" Date: Wed, 12 May 2021 16:50:20 +0200 Message-Id: <20210512144856.462649876@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210512144837.204217980@linuxfoundation.org> References: <20210512144837.204217980@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Cédric Le Goater [ Upstream commit 33e4bc5946432a4ac173fd08e8e30a13ab94d06d ] When under xmon, the "dxi" command dumps the state of the XIVE interrupts. If an interrupt number is specified, only the state of the associated XIVE interrupt is dumped. This form of the command lacks an irq_data parameter which is nevertheless used by xmon_xive_get_irq_config(), leading to an xmon crash. Fix that by doing a lookup in the system IRQ mapping to query the IRQ descriptor data. Invalid interrupt numbers, or not belonging to the XIVE IRQ domain, OPAL event interrupt number for instance, should be caught by the previous query done at the firmware level. Fixes: 97ef27507793 ("powerpc/xive: Fix xmon support on the PowerNV platform") Reported-by: kernel test robot Reported-by: Dan Carpenter Signed-off-by: Cédric Le Goater Tested-by: Greg Kurz Reviewed-by: Greg Kurz Signed-off-by: Michael Ellerman Link: https://lore.kernel.org/r/20210331144514.892250-8-clg@kaod.org Signed-off-by: Sasha Levin --- arch/powerpc/sysdev/xive/common.c | 14 ++++++++++---- 1 file changed, 10 insertions(+), 4 deletions(-) diff --git a/arch/powerpc/sysdev/xive/common.c b/arch/powerpc/sysdev/xive/common.c index 6e43bba80707..5cacb632eb37 100644 --- a/arch/powerpc/sysdev/xive/common.c +++ b/arch/powerpc/sysdev/xive/common.c @@ -253,17 +253,20 @@ notrace void xmon_xive_do_dump(int cpu) xmon_printf("\n"); } +static struct irq_data *xive_get_irq_data(u32 hw_irq) +{ + unsigned int irq = irq_find_mapping(xive_irq_domain, hw_irq); + + return irq ? irq_get_irq_data(irq) : NULL; +} + int xmon_xive_get_irq_config(u32 hw_irq, struct irq_data *d) { - struct irq_chip *chip = irq_data_get_irq_chip(d); int rc; u32 target; u8 prio; u32 lirq; - if (!is_xive_irq(chip)) - return -EINVAL; - rc = xive_ops->get_irq_config(hw_irq, &target, &prio, &lirq); if (rc) { xmon_printf("IRQ 0x%08x : no config rc=%d\n", hw_irq, rc); @@ -273,6 +276,9 @@ int xmon_xive_get_irq_config(u32 hw_irq, struct irq_data *d) xmon_printf("IRQ 0x%08x : target=0x%x prio=%02x lirq=0x%x ", hw_irq, target, prio, lirq); + if (!d) + d = xive_get_irq_data(hw_irq); + if (d) { struct xive_irq_data *xd = irq_data_get_irq_handler_data(d); u64 val = xive_esb_read(xd, XIVE_ESB_GET); -- 2.30.2