Message ID | fe3a79e078c644d9c1379ef5f8c431d787b6d0c8.camel@kernel.crashing.org (mailing list archive) |
---|---|
State | Superseded |
Headers | show |
Series | [RFC/WIP] powerpc: Fix 32-bit handling of MSR_EE on exceptions | expand |
Context | Check | Description |
---|---|---|
snowpatch_ozlabs/apply_patch | warning | next/apply_patch Patch failed to apply |
snowpatch_ozlabs/apply_patch | fail | Failed to apply to any branch |
On 12/20/2018 05:40 AM, Benjamin Herrenschmidt wrote: > Hi folks ! > > Why trying to figure out why we had occasionally lockdep barf about > interrupt state on ppc32 (440 in my case but I could reproduce on e500 > as well using qemu), I realized that we are still doing something > rather gothic and wrong on 32-bit which we stopped doing on 64-bit > a while ago. > > We have that thing where some handlers "copy" the EE value from the > original stack frame into the new MSR before transferring to the > handler. > > Thus for a number of exceptions, we enter the handlers with interrupts > enabled. > > This is rather fishy, some of the stuff that handlers might do early > on such as irq_enter/exit or user_exit, context tracking, etc... should > be run with interrupts off afaik. > > Generally our handlers know when to re-enable interrupts if needed > (though some of the FSL specific SPE ones don't). > > The problem we were having is that we assumed these interrupts would > return with interrupts enabled. However that isn't the case. > > Instead, this changes things so that we always enter exception handlers > with interrupts *off* with the notable exception of syscalls which are > special (and get a fast path). > > Currently, the patch only changes BookE (440 and E5xx tested in qemu), > the same recipe needs to be applied to 6xx, 8xx and 40x. > > Also I'm not sure whether we need to create a stack frame around some > of the calls to trace_hardirqs_* in asm. ppc64 does it, due to problems > with the irqsoff tracer, but I haven't managed to reproduce those > issues. We need to look into it a bit more. > > I'll work more on this in the next few days, comments appreciated. > > Not-signed-off-by: Benjamin Herrenschmidt <benh@kernel.crashing.org> > > --- > arch/powerpc/kernel/entry_32.S | 113 ++++++++++++++++++++++------------- > arch/powerpc/kernel/head_44x.S | 9 +-- > arch/powerpc/kernel/head_booke.h | 34 ++++------- > arch/powerpc/kernel/head_fsl_booke.S | 28 ++++----- > arch/powerpc/kernel/traps.c | 8 +++ > 5 files changed, 111 insertions(+), 81 deletions(-) > > diff --git a/arch/powerpc/kernel/entry_32.S b/arch/powerpc/kernel/entry_32.S > index 3841d74..39b4cb5 100644 > --- a/arch/powerpc/kernel/entry_32.S > +++ b/arch/powerpc/kernel/entry_32.S > @@ -34,6 +34,9 @@ > #include <asm/ftrace.h> > #include <asm/ptrace.h> > #include <asm/export.h> > +#include <asm/feature-fixups.h> > +#include <asm/barrier.h> > +#include <asm/bug.h> > > /* > * MSR_KERNEL is > 0x10000 on 4xx/Book-E since it include MSR_CE. > @@ -205,20 +208,46 @@ transfer_to_handler_cont: > mflr r9 > lwz r11,0(r9) /* virtual address of handler */ > lwz r9,4(r9) /* where to go when done */ > +#if defined(CONFIG_PPC_8xx) && defined(CONFIG_PERF_EVENTS) > + mtspr SPRN_NRI, r0 > +#endif That's not part of your patch, it's already in the tree. > + > #ifdef CONFIG_TRACE_IRQFLAGS > + /* > + * When tracing IRQ state (lockdep) we enable the MMU before we call > + * the IRQ tracing functions as they might access vmalloc space or > + * perform IOs for console output. > + * > + * To speed up the syscall path where interrupts stay on, let's check > + * first if we are changing the MSR value at all. > + */ > + lwz r12,_MSR(r1) > + xor r0,r10,r12 > + andi. r0,r0,MSR_EE > + bne 1f > + > + /* MSR isn't changing, just transition directly */ > + lwz r0,GPR0(r1) > + mtspr SPRN_SRR0,r11 > + mtspr SPRN_SRR1,r10 > + mtlr r9 > + SYNC > + RFI > + > +1: /* MSR is changing, re-enable MMU so we can notify lockdep. We need to > + * keep interrupts disabled at this point otherwise we might risk > + * taking an interrupt before we tell lockdep they are enabled. > + */ > lis r12,reenable_mmu@h > ori r12,r12,reenable_mmu@l > + lis r0,MSR_KERNEL@h > + ori r0,r0,MSR_KERNEL@l > mtspr SPRN_SRR0,r12 > - mtspr SPRN_SRR1,r10 > + mtspr SPRN_SRR1,r0 > SYNC > RFI > -reenable_mmu: /* re-enable mmu so we can */ > - mfmsr r10 > - lwz r12,_MSR(r1) > - xor r10,r10,r12 > - andi. r10,r10,MSR_EE /* Did EE change? */ > - beq 1f > > +reenable_mmu: > /* > * The trace_hardirqs_off will use CALLER_ADDR0 and CALLER_ADDR1. > * If from user mode there is only one stack frame on the stack, and > @@ -239,8 +268,29 @@ reenable_mmu: /* re-enable mmu so we can */ > stw r3,16(r1) > stw r4,20(r1) > stw r5,24(r1) > - bl trace_hardirqs_off > - lwz r5,24(r1) > + > + /* Are we enabling or disabling interrupts ? */ > + andi. r0,r10,MSR_EE > + beq 1f > + > + /* If we are enabling interrupt, this is a syscall. They shouldn't > + * happen while interrupts are disabled, so let's do a warning here. > + */ > +0: trap > + EMIT_BUG_ENTRY 0b,__FILE__,__LINE__, BUGFLAG_WARNING > + bl trace_hardirqs_on > + > + /* Now enable for real */ > + mfmsr r10 > + ori r10,r10,MSR_EE > + mtmsr r10 > + b 2f > + > + /* If we are disabling interrupts (normal case), simply log it with > + * lockdep > + */ > +1: bl trace_hardirqs_off > +2: lwz r5,24(r1) > lwz r4,20(r1) > lwz r3,16(r1) > lwz r11,12(r1) > @@ -250,7 +300,7 @@ reenable_mmu: /* re-enable mmu so we can */ > lwz r6,GPR6(r1) > lwz r7,GPR7(r1) > lwz r8,GPR8(r1) > -1: mtctr r11 > + mtctr r11 > mtlr r9 > bctr /* jump to handler */ > #else /* CONFIG_TRACE_IRQFLAGS */ > @@ -312,31 +362,19 @@ _GLOBAL(DoSyscall) > lwz r11,_CCR(r1) /* Clear SO bit in CR */ > rlwinm r11,r11,0,4,2 > stw r11,_CCR(r1) > + > #ifdef CONFIG_TRACE_IRQFLAGS > - /* Return from syscalls can (and generally will) hard enable > - * interrupts. You aren't supposed to call a syscall with > - * interrupts disabled in the first place. However, to ensure > - * that we get it right vs. lockdep if it happens, we force > - * that hard enable here with appropriate tracing if we see > - * that we have been called with interrupts off > - */ > + /* Make sure interrupts are enabled */ > mfmsr r11 > andi. r12,r11,MSR_EE > bne+ 1f > - /* We came in with interrupts disabled, we enable them now */ > - bl trace_hardirqs_on > - mfmsr r11 > - lwz r0,GPR0(r1) > - lwz r3,GPR3(r1) > - lwz r4,GPR4(r1) > - ori r11,r11,MSR_EE > - lwz r5,GPR5(r1) > - lwz r6,GPR6(r1) > - lwz r7,GPR7(r1) > - lwz r8,GPR8(r1) > - mtmsr r11 > + /* We came in with interrupts disabled, we WARN and mark them enabled > + * for lockdep now */ > +0: trap > + EMIT_BUG_ENTRY 0b,__FILE__,__LINE__, BUGFLAG_WARNING > 1: > #endif /* CONFIG_TRACE_IRQFLAGS */ > + > CURRENT_THREAD_INFO(r10, r1) > lwz r11,TI_FLAGS(r10) > andi. r11,r11,_TIF_SYSCALL_DOTRACE > @@ -375,8 +413,7 @@ syscall_exit_cont: > lwz r8,_MSR(r1) > #ifdef CONFIG_TRACE_IRQFLAGS > /* If we are going to return from the syscall with interrupts > - * off, we trace that here. It shouldn't happen though but we > - * want to catch the bugger if it does right ? > + * off, we trace that here. It shouldn't normally happen. > */ > andi. r10,r8,MSR_EE > bne+ 1f > @@ -881,13 +918,6 @@ END_MMU_FTR_SECTION_IFSET(MMU_FTR_TYPE_47x) > * off in this assembly code while peeking at TI_FLAGS() and such. However > * we need to inform it if the exception turned interrupts off, and we > * are about to trun them back on. > - * > - * The problem here sadly is that we don't know whether the exceptions was > - * one that turned interrupts off or not. So we always tell lockdep about > - * turning them on here when we go back to wherever we came from with EE > - * on, even if that may meen some redudant calls being tracked. Maybe later > - * we could encode what the exception did somewhere or test the exception > - * type in the pt_regs but that sounds overkill > */ > andi. r10,r9,MSR_EE > beq 1f > @@ -1175,9 +1205,10 @@ do_work: /* r10 contains MSR_KERNEL here */ > beq do_user_signal > > do_resched: /* r10 contains MSR_KERNEL here */ > - /* Note: We don't need to inform lockdep that we are enabling > - * interrupts here. As far as it knows, they are already enabled > - */ > +#ifdef CONFIG_TRACE_IRQFLAGS > + bl trace_hardirqs_on > + mfmsr r10 > +#endif > ori r10,r10,MSR_EE > SYNC > MTMSRD(r10) /* hard-enable interrupts */ > diff --git a/arch/powerpc/kernel/head_44x.S b/arch/powerpc/kernel/head_44x.S > index 37e4a7c..891a048 100644 > --- a/arch/powerpc/kernel/head_44x.S > +++ b/arch/powerpc/kernel/head_44x.S > @@ -40,6 +40,7 @@ > #include <asm/ptrace.h> > #include <asm/synch.h> > #include <asm/export.h> > + > #include "head_booke.h" > > > @@ -277,16 +278,16 @@ interrupt_base: > FP_UNAVAILABLE_EXCEPTION > #else > EXCEPTION(0x2010, BOOKE_INTERRUPT_FP_UNAVAIL, \ > - FloatingPointUnavailable, unknown_exception, EXC_XFER_EE) > + FloatingPointUnavailable, unknown_exception, EXC_XFER_STD) > #endif > /* System Call Interrupt */ > START_EXCEPTION(SystemCall) > NORMAL_EXCEPTION_PROLOG(BOOKE_INTERRUPT_SYSCALL) > - EXC_XFER_EE_LITE(0x0c00, DoSyscall) > + EXC_XFER_SYS(0x0c00, DoSyscall) > > /* Auxiliary Processor Unavailable Interrupt */ > EXCEPTION(0x2020, BOOKE_INTERRUPT_AP_UNAVAIL, \ > - AuxillaryProcessorUnavailable, unknown_exception, EXC_XFER_EE) > + AuxillaryProcessorUnavailable, unknown_exception, EXC_XFER_STD) > > /* Decrementer Interrupt */ > DECREMENTER_EXCEPTION > @@ -294,7 +295,7 @@ interrupt_base: > /* Fixed Internal Timer Interrupt */ > /* TODO: Add FIT support */ > EXCEPTION(0x1010, BOOKE_INTERRUPT_FIT, FixedIntervalTimer, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > > /* Watchdog Timer Interrupt */ > /* TODO: Add watchdog support */ > diff --git a/arch/powerpc/kernel/head_booke.h b/arch/powerpc/kernel/head_booke.h > index a620203..46be533 100644 > --- a/arch/powerpc/kernel/head_booke.h > +++ b/arch/powerpc/kernel/head_booke.h > @@ -210,8 +210,7 @@ > CRITICAL_EXCEPTION_PROLOG(intno); \ > addi r3,r1,STACK_FRAME_OVERHEAD; \ > EXC_XFER_TEMPLATE(hdlr, n+2, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), \ > - NOCOPY, crit_transfer_to_handler, \ > - ret_from_crit_exc) > + crit_transfer_to_handler, ret_from_crit_exc) > > #define MCHECK_EXCEPTION(n, label, hdlr) \ > START_EXCEPTION(label); \ > @@ -220,36 +219,27 @@ > stw r5,_ESR(r11); \ > addi r3,r1,STACK_FRAME_OVERHEAD; \ > EXC_XFER_TEMPLATE(hdlr, n+4, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), \ > - NOCOPY, mcheck_transfer_to_handler, \ > - ret_from_mcheck_exc) > + mcheck_transfer_to_handler, ret_from_mcheck_exc) > > -#define EXC_XFER_TEMPLATE(hdlr, trap, msr, copyee, tfer, ret) \ > +#define EXC_XFER_TEMPLATE(hdlr, trap, msr, tfer, ret) \ > li r10,trap; \ > stw r10,_TRAP(r11); \ > lis r10,msr@h; \ > ori r10,r10,msr@l; \ > - copyee(r10, r9); \ > bl tfer; \ > .long hdlr; \ > .long ret > > -#define COPY_EE(d, s) rlwimi d,s,0,16,16 > -#define NOCOPY(d, s) > - > #define EXC_XFER_STD(n, hdlr) \ > - EXC_XFER_TEMPLATE(hdlr, n, MSR_KERNEL, NOCOPY, transfer_to_handler_full, \ > + EXC_XFER_TEMPLATE(hdlr, n, MSR_KERNEL, transfer_to_handler_full, \ > ret_from_except_full) > > -#define EXC_XFER_LITE(n, hdlr) \ > - EXC_XFER_TEMPLATE(hdlr, n+1, MSR_KERNEL, NOCOPY, transfer_to_handler, \ > +#define EXC_XFER_SYS(n, hdlr) \ > + EXC_XFER_TEMPLATE(hdlr, n+1, MSR_KERNEL | MSR_EE, transfer_to_handler, \ > ret_from_except) > > -#define EXC_XFER_EE(n, hdlr) \ > - EXC_XFER_TEMPLATE(hdlr, n, MSR_KERNEL, COPY_EE, transfer_to_handler_full, \ > - ret_from_except_full) > - > -#define EXC_XFER_EE_LITE(n, hdlr) \ > - EXC_XFER_TEMPLATE(hdlr, n+1, MSR_KERNEL, COPY_EE, transfer_to_handler, \ > +#define EXC_XFER_LITE(n, hdlr) \ > + EXC_XFER_TEMPLATE(hdlr, n+1, MSR_KERNEL, transfer_to_handler, \ > ret_from_except) > > /* Check for a single step debug exception while in an exception > @@ -316,7 +306,7 @@ > /* continue normal handling for a debug exception... */ \ > 2: mfspr r4,SPRN_DBSR; \ > addi r3,r1,STACK_FRAME_OVERHEAD; \ > - EXC_XFER_TEMPLATE(DebugException, 0x2008, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), NOCOPY, debug_transfer_to_handler, ret_from_debug_exc) > + EXC_XFER_TEMPLATE(DebugException, 0x2008, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), debug_transfer_to_handler, ret_from_debug_exc) > > #define DEBUG_CRIT_EXCEPTION \ > START_EXCEPTION(DebugCrit); \ > @@ -369,7 +359,7 @@ > /* continue normal handling for a critical exception... */ \ > 2: mfspr r4,SPRN_DBSR; \ > addi r3,r1,STACK_FRAME_OVERHEAD; \ > - EXC_XFER_TEMPLATE(DebugException, 0x2002, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), NOCOPY, crit_transfer_to_handler, ret_from_crit_exc) > + EXC_XFER_TEMPLATE(DebugException, 0x2002, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), crit_transfer_to_handler, ret_from_crit_exc) > > #define DATA_STORAGE_EXCEPTION \ > START_EXCEPTION(DataStorage) \ > @@ -394,7 +384,7 @@ > mfspr r4,SPRN_DEAR; /* Grab the DEAR and save it */ \ > stw r4,_DEAR(r11); \ > addi r3,r1,STACK_FRAME_OVERHEAD; \ > - EXC_XFER_EE(0x0600, alignment_exception) > + EXC_XFER_STD(0x0600, alignment_exception) > > #define PROGRAM_EXCEPTION \ > START_EXCEPTION(Program) \ > @@ -419,7 +409,7 @@ > bl load_up_fpu; /* if from user, just load it up */ \ > b fast_exception_return; \ > 1: addi r3,r1,STACK_FRAME_OVERHEAD; \ > - EXC_XFER_EE_LITE(0x800, kernel_fp_unavailable_exception) > + EXC_XFER_STD(0x800, kernel_fp_unavailable_exception) > > #ifndef __ASSEMBLY__ > struct exception_regs { > diff --git a/arch/powerpc/kernel/head_fsl_booke.S b/arch/powerpc/kernel/head_fsl_booke.S > index bf4c602..556cffb 100644 > --- a/arch/powerpc/kernel/head_fsl_booke.S > +++ b/arch/powerpc/kernel/head_fsl_booke.S > @@ -385,7 +385,7 @@ interrupt_base: > EXC_XFER_LITE(0x0300, handle_page_fault) > 1: > addi r3,r1,STACK_FRAME_OVERHEAD > - EXC_XFER_EE_LITE(0x0300, CacheLockingException) > + EXC_XFER_LITE(0x0300, CacheLockingException) > > /* Instruction Storage Interrupt */ > INSTRUCTION_STORAGE_EXCEPTION > @@ -406,21 +406,21 @@ interrupt_base: > #ifdef CONFIG_E200 > /* E200 treats 'normal' floating point instructions as FP Unavail exception */ > EXCEPTION(0x0800, FP_UNAVAIL, FloatingPointUnavailable, \ > - program_check_exception, EXC_XFER_EE) > + program_check_exception, EXC_XFER_STD) > #else > EXCEPTION(0x0800, FP_UNAVAIL, FloatingPointUnavailable, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > #endif > #endif > > /* System Call Interrupt */ > START_EXCEPTION(SystemCall) > NORMAL_EXCEPTION_PROLOG(SYSCALL) > - EXC_XFER_EE_LITE(0x0c00, DoSyscall) > + EXC_XFER_SYS(0x0c00, DoSyscall) > > /* Auxiliary Processor Unavailable Interrupt */ > EXCEPTION(0x2900, AP_UNAVAIL, AuxillaryProcessorUnavailable, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > > /* Decrementer Interrupt */ > DECREMENTER_EXCEPTION > @@ -428,7 +428,7 @@ interrupt_base: > /* Fixed Internal Timer Interrupt */ > /* TODO: Add FIT support */ > EXCEPTION(0x3100, FIT, FixedIntervalTimer, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > > /* Watchdog Timer Interrupt */ > #ifdef CONFIG_BOOKE_WDT > @@ -623,25 +623,25 @@ END_FTR_SECTION_IFSET(CPU_FTR_EMB_HV) > bl load_up_spe > b fast_exception_return > 1: addi r3,r1,STACK_FRAME_OVERHEAD > - EXC_XFER_EE_LITE(0x2010, KernelSPE) > + EXC_XFER_LITE(0x2010, KernelSPE) > #elif defined(CONFIG_SPE_POSSIBLE) > EXCEPTION(0x2020, SPE_UNAVAIL, SPEUnavailable, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > #endif /* CONFIG_SPE_POSSIBLE */ > > /* SPE Floating Point Data */ > #ifdef CONFIG_SPE > EXCEPTION(0x2030, SPE_FP_DATA, SPEFloatingPointData, > - SPEFloatingPointException, EXC_XFER_EE) > + SPEFloatingPointException, EXC_XFER_STD) > > /* SPE Floating Point Round */ > EXCEPTION(0x2050, SPE_FP_ROUND, SPEFloatingPointRound, \ > - SPEFloatingPointRoundException, EXC_XFER_EE) > + SPEFloatingPointRoundException, EXC_XFER_STD) > #elif defined(CONFIG_SPE_POSSIBLE) > EXCEPTION(0x2040, SPE_FP_DATA, SPEFloatingPointData, > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > EXCEPTION(0x2050, SPE_FP_ROUND, SPEFloatingPointRound, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > #endif /* CONFIG_SPE_POSSIBLE */ > > > @@ -664,10 +664,10 @@ END_FTR_SECTION_IFSET(CPU_FTR_EMB_HV) > unknown_exception) > > /* Hypercall */ > - EXCEPTION(0, HV_SYSCALL, Hypercall, unknown_exception, EXC_XFER_EE) > + EXCEPTION(0, HV_SYSCALL, Hypercall, unknown_exception, EXC_XFER_STD) > > /* Embedded Hypervisor Privilege */ > - EXCEPTION(0, HV_PRIV, Ehvpriv, unknown_exception, EXC_XFER_EE) > + EXCEPTION(0, HV_PRIV, Ehvpriv, unknown_exception, EXC_XFER_STD) > > interrupt_end: > > diff --git a/arch/powerpc/kernel/traps.c b/arch/powerpc/kernel/traps.c > index 023a462..5ee0b90 100644 > --- a/arch/powerpc/kernel/traps.c > +++ b/arch/powerpc/kernel/traps.c > @@ -1858,6 +1858,10 @@ void SPEFloatingPointException(struct pt_regs *regs) > int code = 0; > int err; > > + /* We restore the interrupt state now */ > + if (!arch_irq_disabled_regs(regs)) > + local_irq_enable(); > + > flush_spe_to_thread(current); > > spefscr = current->thread.spefscr; > @@ -1903,6 +1907,10 @@ void SPEFloatingPointRoundException(struct pt_regs *regs) > extern int speround_handler(struct pt_regs *regs); > int err; > > + /* We restore the interrupt state now */ > + if (!arch_irq_disabled_regs(regs)) > + local_irq_enable(); > + > preempt_disable(); > if (regs->msr & MSR_SPE) > giveup_spe(current); > I tested it on the 8xx with the below changes in addition. No issue seen so far. diff --git a/arch/powerpc/kernel/head_8xx.S b/arch/powerpc/kernel/head_8xx.S index b171b7c0a0e7..6944b0969125 100644 --- a/arch/powerpc/kernel/head_8xx.S +++ b/arch/powerpc/kernel/head_8xx.S @@ -187,33 +187,29 @@ label: \ addi r3,r1,STACK_FRAME_OVERHEAD; \ xfer(n, hdlr) -#define EXC_XFER_TEMPLATE(n, hdlr, trap, copyee, tfer, ret) \ +#define EXC_XFER_TEMPLATE(n, hdlr, trap, setee, tfer, ret) \ li r10,trap; \ stw r10,_TRAP(r11); \ li r10,MSR_KERNEL; \ - copyee(r10, r9); \ + setee(r10); \ bl tfer; \ i##n: \ .long hdlr; \ .long ret -#define COPY_EE(d, s) rlwimi d,s,0,16,16 -#define NOCOPY(d, s) +#define SET_EE(d) oris d, d, MSR_EE +#define NO_EE(d) #define EXC_XFER_STD(n, hdlr) \ - EXC_XFER_TEMPLATE(n, hdlr, n, NOCOPY, transfer_to_handler_full, \ + EXC_XFER_TEMPLATE(n, hdlr, n, NO_EE, transfer_to_handler_full, \ ret_from_except_full) #define EXC_XFER_LITE(n, hdlr) \ - EXC_XFER_TEMPLATE(n, hdlr, n+1, NOCOPY, transfer_to_handler, \ + EXC_XFER_TEMPLATE(n, hdlr, n+1, NO_EE, transfer_to_handler, \ ret_from_except) -#define EXC_XFER_EE(n, hdlr) \ - EXC_XFER_TEMPLATE(n, hdlr, n, COPY_EE, transfer_to_handler_full, \ - ret_from_except_full) - -#define EXC_XFER_EE_LITE(n, hdlr) \ - EXC_XFER_TEMPLATE(n, hdlr, n+1, COPY_EE, transfer_to_handler, \ +#define EXC_XFER_SYS(n, hdlr) \ + EXC_XFER_TEMPLATE(n, hdlr, n+1, SET_EE, transfer_to_handler, \ ret_from_except) /* System reset */ @@ -258,7 +254,7 @@ Alignment: mfspr r5,SPRN_DSISR stw r5,_DSISR(r11) addi r3,r1,STACK_FRAME_OVERHEAD - EXC_XFER_EE(0x600, alignment_exception) + EXC_XFER_STD(0x600, alignment_exception) /* Program check exception */ EXCEPTION(0x700, ProgramCheck, program_check_exception, EXC_XFER_STD) @@ -270,19 +266,19 @@ Alignment: /* Decrementer */ EXCEPTION(0x900, Decrementer, timer_interrupt, EXC_XFER_LITE) - EXCEPTION(0xa00, Trap_0a, unknown_exception, EXC_XFER_EE) - EXCEPTION(0xb00, Trap_0b, unknown_exception, EXC_XFER_EE) + EXCEPTION(0xa00, Trap_0a, unknown_exception, EXC_XFER_STD) + EXCEPTION(0xb00, Trap_0b, unknown_exception, EXC_XFER_STD) /* System call */ . = 0xc00 SystemCall: EXCEPTION_PROLOG - EXC_XFER_EE_LITE(0xc00, DoSyscall) + EXC_XFER_SYS(0xc00, DoSyscall) /* Single step - not used on 601 */ EXCEPTION(0xd00, SingleStep, single_step_exception, EXC_XFER_STD) - EXCEPTION(0xe00, Trap_0e, unknown_exception, EXC_XFER_EE) - EXCEPTION(0xf00, Trap_0f, unknown_exception, EXC_XFER_EE) + EXCEPTION(0xe00, Trap_0e, unknown_exception, EXC_XFER_STD) + EXCEPTION(0xf00, Trap_0f, unknown_exception, EXC_XFER_STD) /* On the MPC8xx, this is a software emulation interrupt. It occurs * for all unimplemented and illegal instructions. @@ -582,13 +578,13 @@ dtlbie: /* 0x300 is DataAccess exception, needed by bad_page_fault() */ EXC_XFER_LITE(0x300, handle_page_fault) - EXCEPTION(0x1500, Trap_15, unknown_exception, EXC_XFER_EE) - EXCEPTION(0x1600, Trap_16, unknown_exception, EXC_XFER_EE) - EXCEPTION(0x1700, Trap_17, unknown_exception, EXC_XFER_EE) - EXCEPTION(0x1800, Trap_18, unknown_exception, EXC_XFER_EE) - EXCEPTION(0x1900, Trap_19, unknown_exception, EXC_XFER_EE) - EXCEPTION(0x1a00, Trap_1a, unknown_exception, EXC_XFER_EE) - EXCEPTION(0x1b00, Trap_1b, unknown_exception, EXC_XFER_EE) + EXCEPTION(0x1500, Trap_15, unknown_exception, EXC_XFER_STD) + EXCEPTION(0x1600, Trap_16, unknown_exception, EXC_XFER_STD) + EXCEPTION(0x1700, Trap_17, unknown_exception, EXC_XFER_STD) + EXCEPTION(0x1800, Trap_18, unknown_exception, EXC_XFER_STD) + EXCEPTION(0x1900, Trap_19, unknown_exception, EXC_XFER_STD) + EXCEPTION(0x1a00, Trap_1a, unknown_exception, EXC_XFER_STD) + EXCEPTION(0x1b00, Trap_1b, unknown_exception, EXC_XFER_STD) /* On the MPC8xx, these next four traps are used for development * support of breakpoints and such. Someday I will get around to @@ -610,7 +606,7 @@ DataBreakpoint: mfspr r4,SPRN_BAR stw r4,_DAR(r11) mfspr r5,SPRN_DSISR - EXC_XFER_EE(0x1c00, do_break) + EXC_XFER_STD(0x1c00, do_break) 11: mtcr r10 mfspr r10, SPRN_SPRG_SCRATCH0 @@ -630,10 +626,10 @@ InstructionBreakpoint: mfspr r10, SPRN_SPRG_SCRATCH0 rfi #else - EXCEPTION(0x1d00, Trap_1d, unknown_exception, EXC_XFER_EE) + EXCEPTION(0x1d00, Trap_1d, unknown_exception, EXC_XFER_STD) #endif - EXCEPTION(0x1e00, Trap_1e, unknown_exception, EXC_XFER_EE) - EXCEPTION(0x1f00, Trap_1f, unknown_exception, EXC_XFER_EE) + EXCEPTION(0x1e00, Trap_1e, unknown_exception, EXC_XFER_STD) + EXCEPTION(0x1f00, Trap_1f, unknown_exception, EXC_XFER_STD) . = 0x2000 Christophe
> > /* > > * MSR_KERNEL is > 0x10000 on 4xx/Book-E since it include MSR_CE. > > @@ -205,20 +208,46 @@ transfer_to_handler_cont: > > mflr r9 > > lwz r11,0(r9) /* virtual address of handler */ > > lwz r9,4(r9) /* where to go when done */ > > +#if defined(CONFIG_PPC_8xx) && defined(CONFIG_PERF_EVENTS) > > + mtspr SPRN_NRI, r0 > > +#endif > > That's not part of your patch, it's already in the tree. Yup rebase glitch. .../... > I tested it on the 8xx with the below changes in addition. No issue seen > so far. Thanks ! I'll merge that in. The main obscure area is that business with the irqsoff tracer and thus the need to create stack frames around calls to trace_hardirqs_* ... we do it in some places and not others, but I've not managed to make it crash either. I need to get to the bottom of that, and possibly provide proper macro helpers like ppc64 has to do it. Cheers, Ben.
Le 20/12/2018 à 06:40, Benjamin Herrenschmidt a écrit : > Hi folks ! > > Why trying to figure out why we had occasionally lockdep barf about > interrupt state on ppc32 (440 in my case but I could reproduce on e500 > as well using qemu), I realized that we are still doing something > rather gothic and wrong on 32-bit which we stopped doing on 64-bit > a while ago. > > We have that thing where some handlers "copy" the EE value from the > original stack frame into the new MSR before transferring to the > handler. > > Thus for a number of exceptions, we enter the handlers with interrupts > enabled. > > This is rather fishy, some of the stuff that handlers might do early > on such as irq_enter/exit or user_exit, context tracking, etc... should > be run with interrupts off afaik. > > Generally our handlers know when to re-enable interrupts if needed > (though some of the FSL specific SPE ones don't). > > The problem we were having is that we assumed these interrupts would > return with interrupts enabled. However that isn't the case. > > Instead, this changes things so that we always enter exception handlers > with interrupts *off* with the notable exception of syscalls which are > special (and get a fast path). > > Currently, the patch only changes BookE (440 and E5xx tested in qemu), > the same recipe needs to be applied to 6xx, 8xx and 40x. > > Also I'm not sure whether we need to create a stack frame around some > of the calls to trace_hardirqs_* in asm. ppc64 does it, due to problems > with the irqsoff tracer, but I haven't managed to reproduce those > issues. We need to look into it a bit more. > > I'll work more on this in the next few days, comments appreciated. > > Not-signed-off-by: Benjamin Herrenschmidt <benh@kernel.crashing.org> > > --- > arch/powerpc/kernel/entry_32.S | 113 ++++++++++++++++++++++------------- > arch/powerpc/kernel/head_44x.S | 9 +-- > arch/powerpc/kernel/head_booke.h | 34 ++++------- > arch/powerpc/kernel/head_fsl_booke.S | 28 ++++----- > arch/powerpc/kernel/traps.c | 8 +++ > 5 files changed, 111 insertions(+), 81 deletions(-) > > diff --git a/arch/powerpc/kernel/entry_32.S b/arch/powerpc/kernel/entry_32.S > index 3841d74..39b4cb5 100644 > --- a/arch/powerpc/kernel/entry_32.S > +++ b/arch/powerpc/kernel/entry_32.S > @@ -34,6 +34,9 @@ > #include <asm/ftrace.h> > #include <asm/ptrace.h> > #include <asm/export.h> > +#include <asm/feature-fixups.h> > +#include <asm/barrier.h> > +#include <asm/bug.h> > > /* > * MSR_KERNEL is > 0x10000 on 4xx/Book-E since it include MSR_CE. > @@ -205,20 +208,46 @@ transfer_to_handler_cont: > mflr r9 > lwz r11,0(r9) /* virtual address of handler */ > lwz r9,4(r9) /* where to go when done */ > +#if defined(CONFIG_PPC_8xx) && defined(CONFIG_PERF_EVENTS) > + mtspr SPRN_NRI, r0 > +#endif Was already there before your patch. > + > #ifdef CONFIG_TRACE_IRQFLAGS > + /* > + * When tracing IRQ state (lockdep) we enable the MMU before we call > + * the IRQ tracing functions as they might access vmalloc space or > + * perform IOs for console output. > + * > + * To speed up the syscall path where interrupts stay on, let's check > + * first if we are changing the MSR value at all. > + */ > + lwz r12,_MSR(r1) > + xor r0,r10,r12 > + andi. r0,r0,MSR_EE > + bne 1f > + > + /* MSR isn't changing, just transition directly */ > + lwz r0,GPR0(r1) > + mtspr SPRN_SRR0,r11 > + mtspr SPRN_SRR1,r10 > + mtlr r9 > + SYNC > + RFI > + > +1: /* MSR is changing, re-enable MMU so we can notify lockdep. We need to > + * keep interrupts disabled at this point otherwise we might risk > + * taking an interrupt before we tell lockdep they are enabled. > + */ > lis r12,reenable_mmu@h > ori r12,r12,reenable_mmu@l > + lis r0,MSR_KERNEL@h > + ori r0,r0,MSR_KERNEL@l You should use LOAD_MSR_KERNEL(), not all targets need an upper part. > mtspr SPRN_SRR0,r12 > - mtspr SPRN_SRR1,r10 > + mtspr SPRN_SRR1,r0 > SYNC > RFI > -reenable_mmu: /* re-enable mmu so we can */ > - mfmsr r10 > - lwz r12,_MSR(r1) > - xor r10,r10,r12 > - andi. r10,r10,MSR_EE /* Did EE change? */ > - beq 1f > > +reenable_mmu: > /* > * The trace_hardirqs_off will use CALLER_ADDR0 and CALLER_ADDR1. > * If from user mode there is only one stack frame on the stack, and > @@ -239,8 +268,29 @@ reenable_mmu: /* re-enable mmu so we can */ > stw r3,16(r1) > stw r4,20(r1) > stw r5,24(r1) > - bl trace_hardirqs_off > - lwz r5,24(r1) > + > + /* Are we enabling or disabling interrupts ? */ > + andi. r0,r10,MSR_EE > + beq 1f This branch is likely, could we avoid it ? For instance by moving the below part after the bctr and branching to it with a bne- ? > + > + /* If we are enabling interrupt, this is a syscall. They shouldn't > + * happen while interrupts are disabled, so let's do a warning here. > + */ > +0: trap > + EMIT_BUG_ENTRY 0b,__FILE__,__LINE__, BUGFLAG_WARNING > + bl trace_hardirqs_on > + > + /* Now enable for real */ > + mfmsr r10 > + ori r10,r10,MSR_EE > + mtmsr r10 > + b 2f > + > + /* If we are disabling interrupts (normal case), simply log it with > + * lockdep > + */ > +1: bl trace_hardirqs_off > +2: lwz r5,24(r1) > lwz r4,20(r1) > lwz r3,16(r1) > lwz r11,12(r1) > @@ -250,7 +300,7 @@ reenable_mmu: /* re-enable mmu so we can */ > lwz r6,GPR6(r1) > lwz r7,GPR7(r1) > lwz r8,GPR8(r1) > -1: mtctr r11 > + mtctr r11 > mtlr r9 > bctr /* jump to handler */ > #else /* CONFIG_TRACE_IRQFLAGS */ > @@ -312,31 +362,19 @@ _GLOBAL(DoSyscall) > lwz r11,_CCR(r1) /* Clear SO bit in CR */ > rlwinm r11,r11,0,4,2 > stw r11,_CCR(r1) > + > #ifdef CONFIG_TRACE_IRQFLAGS > - /* Return from syscalls can (and generally will) hard enable > - * interrupts. You aren't supposed to call a syscall with > - * interrupts disabled in the first place. However, to ensure > - * that we get it right vs. lockdep if it happens, we force > - * that hard enable here with appropriate tracing if we see > - * that we have been called with interrupts off > - */ > + /* Make sure interrupts are enabled */ > mfmsr r11 > andi. r12,r11,MSR_EE > bne+ 1f Same here, can we avoid the branch on the general case ? For instance by moving the below part after the blrl and doing a beq- to it ? > - /* We came in with interrupts disabled, we enable them now */ > - bl trace_hardirqs_on > - mfmsr r11 > - lwz r0,GPR0(r1) > - lwz r3,GPR3(r1) > - lwz r4,GPR4(r1) > - ori r11,r11,MSR_EE > - lwz r5,GPR5(r1) > - lwz r6,GPR6(r1) > - lwz r7,GPR7(r1) > - lwz r8,GPR8(r1) > - mtmsr r11 > + /* We came in with interrupts disabled, we WARN and mark them enabled > + * for lockdep now */ > +0: trap > + EMIT_BUG_ENTRY 0b,__FILE__,__LINE__, BUGFLAG_WARNING > 1: > #endif /* CONFIG_TRACE_IRQFLAGS */ > + > CURRENT_THREAD_INFO(r10, r1) > lwz r11,TI_FLAGS(r10) > andi. r11,r11,_TIF_SYSCALL_DOTRACE > @@ -375,8 +413,7 @@ syscall_exit_cont: > lwz r8,_MSR(r1) > #ifdef CONFIG_TRACE_IRQFLAGS > /* If we are going to return from the syscall with interrupts > - * off, we trace that here. It shouldn't happen though but we > - * want to catch the bugger if it does right ? > + * off, we trace that here. It shouldn't normally happen. > */ > andi. r10,r8,MSR_EE > bne+ 1f > @@ -881,13 +918,6 @@ END_MMU_FTR_SECTION_IFSET(MMU_FTR_TYPE_47x) > * off in this assembly code while peeking at TI_FLAGS() and such. However > * we need to inform it if the exception turned interrupts off, and we > * are about to trun them back on. > - * > - * The problem here sadly is that we don't know whether the exceptions was > - * one that turned interrupts off or not. So we always tell lockdep about > - * turning them on here when we go back to wherever we came from with EE > - * on, even if that may meen some redudant calls being tracked. Maybe later > - * we could encode what the exception did somewhere or test the exception > - * type in the pt_regs but that sounds overkill > */ > andi. r10,r9,MSR_EE > beq 1f > @@ -1175,9 +1205,10 @@ do_work: /* r10 contains MSR_KERNEL here */ > beq do_user_signal > > do_resched: /* r10 contains MSR_KERNEL here */ > - /* Note: We don't need to inform lockdep that we are enabling > - * interrupts here. As far as it knows, they are already enabled > - */ > +#ifdef CONFIG_TRACE_IRQFLAGS > + bl trace_hardirqs_on > + mfmsr r10 > +#endif > ori r10,r10,MSR_EE > SYNC > MTMSRD(r10) /* hard-enable interrupts */ On the 8xx, the above can be done by writing any value to SPRN_EID in a single mtspr instead of the sequence mfmsr/ori/mtmsr. Should we use a macro for that ? Christophe > diff --git a/arch/powerpc/kernel/head_44x.S b/arch/powerpc/kernel/head_44x.S > index 37e4a7c..891a048 100644 > --- a/arch/powerpc/kernel/head_44x.S > +++ b/arch/powerpc/kernel/head_44x.S > @@ -40,6 +40,7 @@ > #include <asm/ptrace.h> > #include <asm/synch.h> > #include <asm/export.h> > + > #include "head_booke.h" > > > @@ -277,16 +278,16 @@ interrupt_base: > FP_UNAVAILABLE_EXCEPTION > #else > EXCEPTION(0x2010, BOOKE_INTERRUPT_FP_UNAVAIL, \ > - FloatingPointUnavailable, unknown_exception, EXC_XFER_EE) > + FloatingPointUnavailable, unknown_exception, EXC_XFER_STD) > #endif > /* System Call Interrupt */ > START_EXCEPTION(SystemCall) > NORMAL_EXCEPTION_PROLOG(BOOKE_INTERRUPT_SYSCALL) > - EXC_XFER_EE_LITE(0x0c00, DoSyscall) > + EXC_XFER_SYS(0x0c00, DoSyscall) > > /* Auxiliary Processor Unavailable Interrupt */ > EXCEPTION(0x2020, BOOKE_INTERRUPT_AP_UNAVAIL, \ > - AuxillaryProcessorUnavailable, unknown_exception, EXC_XFER_EE) > + AuxillaryProcessorUnavailable, unknown_exception, EXC_XFER_STD) > > /* Decrementer Interrupt */ > DECREMENTER_EXCEPTION > @@ -294,7 +295,7 @@ interrupt_base: > /* Fixed Internal Timer Interrupt */ > /* TODO: Add FIT support */ > EXCEPTION(0x1010, BOOKE_INTERRUPT_FIT, FixedIntervalTimer, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > > /* Watchdog Timer Interrupt */ > /* TODO: Add watchdog support */ > diff --git a/arch/powerpc/kernel/head_booke.h b/arch/powerpc/kernel/head_booke.h > index a620203..46be533 100644 > --- a/arch/powerpc/kernel/head_booke.h > +++ b/arch/powerpc/kernel/head_booke.h > @@ -210,8 +210,7 @@ > CRITICAL_EXCEPTION_PROLOG(intno); \ > addi r3,r1,STACK_FRAME_OVERHEAD; \ > EXC_XFER_TEMPLATE(hdlr, n+2, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), \ > - NOCOPY, crit_transfer_to_handler, \ > - ret_from_crit_exc) > + crit_transfer_to_handler, ret_from_crit_exc) > > #define MCHECK_EXCEPTION(n, label, hdlr) \ > START_EXCEPTION(label); \ > @@ -220,36 +219,27 @@ > stw r5,_ESR(r11); \ > addi r3,r1,STACK_FRAME_OVERHEAD; \ > EXC_XFER_TEMPLATE(hdlr, n+4, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), \ > - NOCOPY, mcheck_transfer_to_handler, \ > - ret_from_mcheck_exc) > + mcheck_transfer_to_handler, ret_from_mcheck_exc) > > -#define EXC_XFER_TEMPLATE(hdlr, trap, msr, copyee, tfer, ret) \ > +#define EXC_XFER_TEMPLATE(hdlr, trap, msr, tfer, ret) \ > li r10,trap; \ > stw r10,_TRAP(r11); \ > lis r10,msr@h; \ > ori r10,r10,msr@l; \ > - copyee(r10, r9); \ > bl tfer; \ > .long hdlr; \ > .long ret > > -#define COPY_EE(d, s) rlwimi d,s,0,16,16 > -#define NOCOPY(d, s) > - > #define EXC_XFER_STD(n, hdlr) \ > - EXC_XFER_TEMPLATE(hdlr, n, MSR_KERNEL, NOCOPY, transfer_to_handler_full, \ > + EXC_XFER_TEMPLATE(hdlr, n, MSR_KERNEL, transfer_to_handler_full, \ > ret_from_except_full) > > -#define EXC_XFER_LITE(n, hdlr) \ > - EXC_XFER_TEMPLATE(hdlr, n+1, MSR_KERNEL, NOCOPY, transfer_to_handler, \ > +#define EXC_XFER_SYS(n, hdlr) \ > + EXC_XFER_TEMPLATE(hdlr, n+1, MSR_KERNEL | MSR_EE, transfer_to_handler, \ > ret_from_except) > > -#define EXC_XFER_EE(n, hdlr) \ > - EXC_XFER_TEMPLATE(hdlr, n, MSR_KERNEL, COPY_EE, transfer_to_handler_full, \ > - ret_from_except_full) > - > -#define EXC_XFER_EE_LITE(n, hdlr) \ > - EXC_XFER_TEMPLATE(hdlr, n+1, MSR_KERNEL, COPY_EE, transfer_to_handler, \ > +#define EXC_XFER_LITE(n, hdlr) \ > + EXC_XFER_TEMPLATE(hdlr, n+1, MSR_KERNEL, transfer_to_handler, \ > ret_from_except) > > /* Check for a single step debug exception while in an exception > @@ -316,7 +306,7 @@ > /* continue normal handling for a debug exception... */ \ > 2: mfspr r4,SPRN_DBSR; \ > addi r3,r1,STACK_FRAME_OVERHEAD; \ > - EXC_XFER_TEMPLATE(DebugException, 0x2008, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), NOCOPY, debug_transfer_to_handler, ret_from_debug_exc) > + EXC_XFER_TEMPLATE(DebugException, 0x2008, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), debug_transfer_to_handler, ret_from_debug_exc) > > #define DEBUG_CRIT_EXCEPTION \ > START_EXCEPTION(DebugCrit); \ > @@ -369,7 +359,7 @@ > /* continue normal handling for a critical exception... */ \ > 2: mfspr r4,SPRN_DBSR; \ > addi r3,r1,STACK_FRAME_OVERHEAD; \ > - EXC_XFER_TEMPLATE(DebugException, 0x2002, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), NOCOPY, crit_transfer_to_handler, ret_from_crit_exc) > + EXC_XFER_TEMPLATE(DebugException, 0x2002, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), crit_transfer_to_handler, ret_from_crit_exc) > > #define DATA_STORAGE_EXCEPTION \ > START_EXCEPTION(DataStorage) \ > @@ -394,7 +384,7 @@ > mfspr r4,SPRN_DEAR; /* Grab the DEAR and save it */ \ > stw r4,_DEAR(r11); \ > addi r3,r1,STACK_FRAME_OVERHEAD; \ > - EXC_XFER_EE(0x0600, alignment_exception) > + EXC_XFER_STD(0x0600, alignment_exception) > > #define PROGRAM_EXCEPTION \ > START_EXCEPTION(Program) \ > @@ -419,7 +409,7 @@ > bl load_up_fpu; /* if from user, just load it up */ \ > b fast_exception_return; \ > 1: addi r3,r1,STACK_FRAME_OVERHEAD; \ > - EXC_XFER_EE_LITE(0x800, kernel_fp_unavailable_exception) > + EXC_XFER_STD(0x800, kernel_fp_unavailable_exception) > > #ifndef __ASSEMBLY__ > struct exception_regs { > diff --git a/arch/powerpc/kernel/head_fsl_booke.S b/arch/powerpc/kernel/head_fsl_booke.S > index bf4c602..556cffb 100644 > --- a/arch/powerpc/kernel/head_fsl_booke.S > +++ b/arch/powerpc/kernel/head_fsl_booke.S > @@ -385,7 +385,7 @@ interrupt_base: > EXC_XFER_LITE(0x0300, handle_page_fault) > 1: > addi r3,r1,STACK_FRAME_OVERHEAD > - EXC_XFER_EE_LITE(0x0300, CacheLockingException) > + EXC_XFER_LITE(0x0300, CacheLockingException) > > /* Instruction Storage Interrupt */ > INSTRUCTION_STORAGE_EXCEPTION > @@ -406,21 +406,21 @@ interrupt_base: > #ifdef CONFIG_E200 > /* E200 treats 'normal' floating point instructions as FP Unavail exception */ > EXCEPTION(0x0800, FP_UNAVAIL, FloatingPointUnavailable, \ > - program_check_exception, EXC_XFER_EE) > + program_check_exception, EXC_XFER_STD) > #else > EXCEPTION(0x0800, FP_UNAVAIL, FloatingPointUnavailable, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > #endif > #endif > > /* System Call Interrupt */ > START_EXCEPTION(SystemCall) > NORMAL_EXCEPTION_PROLOG(SYSCALL) > - EXC_XFER_EE_LITE(0x0c00, DoSyscall) > + EXC_XFER_SYS(0x0c00, DoSyscall) > > /* Auxiliary Processor Unavailable Interrupt */ > EXCEPTION(0x2900, AP_UNAVAIL, AuxillaryProcessorUnavailable, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > > /* Decrementer Interrupt */ > DECREMENTER_EXCEPTION > @@ -428,7 +428,7 @@ interrupt_base: > /* Fixed Internal Timer Interrupt */ > /* TODO: Add FIT support */ > EXCEPTION(0x3100, FIT, FixedIntervalTimer, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > > /* Watchdog Timer Interrupt */ > #ifdef CONFIG_BOOKE_WDT > @@ -623,25 +623,25 @@ END_FTR_SECTION_IFSET(CPU_FTR_EMB_HV) > bl load_up_spe > b fast_exception_return > 1: addi r3,r1,STACK_FRAME_OVERHEAD > - EXC_XFER_EE_LITE(0x2010, KernelSPE) > + EXC_XFER_LITE(0x2010, KernelSPE) > #elif defined(CONFIG_SPE_POSSIBLE) > EXCEPTION(0x2020, SPE_UNAVAIL, SPEUnavailable, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > #endif /* CONFIG_SPE_POSSIBLE */ > > /* SPE Floating Point Data */ > #ifdef CONFIG_SPE > EXCEPTION(0x2030, SPE_FP_DATA, SPEFloatingPointData, > - SPEFloatingPointException, EXC_XFER_EE) > + SPEFloatingPointException, EXC_XFER_STD) > > /* SPE Floating Point Round */ > EXCEPTION(0x2050, SPE_FP_ROUND, SPEFloatingPointRound, \ > - SPEFloatingPointRoundException, EXC_XFER_EE) > + SPEFloatingPointRoundException, EXC_XFER_STD) > #elif defined(CONFIG_SPE_POSSIBLE) > EXCEPTION(0x2040, SPE_FP_DATA, SPEFloatingPointData, > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > EXCEPTION(0x2050, SPE_FP_ROUND, SPEFloatingPointRound, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > #endif /* CONFIG_SPE_POSSIBLE */ > > > @@ -664,10 +664,10 @@ END_FTR_SECTION_IFSET(CPU_FTR_EMB_HV) > unknown_exception) > > /* Hypercall */ > - EXCEPTION(0, HV_SYSCALL, Hypercall, unknown_exception, EXC_XFER_EE) > + EXCEPTION(0, HV_SYSCALL, Hypercall, unknown_exception, EXC_XFER_STD) > > /* Embedded Hypervisor Privilege */ > - EXCEPTION(0, HV_PRIV, Ehvpriv, unknown_exception, EXC_XFER_EE) > + EXCEPTION(0, HV_PRIV, Ehvpriv, unknown_exception, EXC_XFER_STD) > > interrupt_end: > > diff --git a/arch/powerpc/kernel/traps.c b/arch/powerpc/kernel/traps.c > index 023a462..5ee0b90 100644 > --- a/arch/powerpc/kernel/traps.c > +++ b/arch/powerpc/kernel/traps.c > @@ -1858,6 +1858,10 @@ void SPEFloatingPointException(struct pt_regs *regs) > int code = 0; > int err; > > + /* We restore the interrupt state now */ > + if (!arch_irq_disabled_regs(regs)) > + local_irq_enable(); > + > flush_spe_to_thread(current); > > spefscr = current->thread.spefscr; > @@ -1903,6 +1907,10 @@ void SPEFloatingPointRoundException(struct pt_regs *regs) > extern int speround_handler(struct pt_regs *regs); > int err; > > + /* We restore the interrupt state now */ > + if (!arch_irq_disabled_regs(regs)) > + local_irq_enable(); > + > preempt_disable(); > if (regs->msr & MSR_SPE) > giveup_spe(current); > --- L'absence de virus dans ce courrier électronique a été vérifiée par le logiciel antivirus Avast. https://www.avast.com/antivirus
Le 20/12/2018 à 06:40, Benjamin Herrenschmidt a écrit : > Hi folks ! > > Why trying to figure out why we had occasionally lockdep barf about > interrupt state on ppc32 (440 in my case but I could reproduce on e500 > as well using qemu), I realized that we are still doing something > rather gothic and wrong on 32-bit which we stopped doing on 64-bit > a while ago. > > We have that thing where some handlers "copy" the EE value from the > original stack frame into the new MSR before transferring to the > handler. > > Thus for a number of exceptions, we enter the handlers with interrupts > enabled. > > This is rather fishy, some of the stuff that handlers might do early > on such as irq_enter/exit or user_exit, context tracking, etc... should > be run with interrupts off afaik. > > Generally our handlers know when to re-enable interrupts if needed > (though some of the FSL specific SPE ones don't). > > The problem we were having is that we assumed these interrupts would > return with interrupts enabled. However that isn't the case. > > Instead, this changes things so that we always enter exception handlers > with interrupts *off* with the notable exception of syscalls which are > special (and get a fast path). > > Currently, the patch only changes BookE (440 and E5xx tested in qemu), > the same recipe needs to be applied to 6xx, 8xx and 40x. In the scope of the implementation of vmapped stacks, I'm preparing serie to refactor the EXCEPTION_PROLOG on the 40x/8xx/6xx. I plan to send it out this week. Christophe > > Also I'm not sure whether we need to create a stack frame around some > of the calls to trace_hardirqs_* in asm. ppc64 does it, due to problems > with the irqsoff tracer, but I haven't managed to reproduce those > issues. We need to look into it a bit more. > > I'll work more on this in the next few days, comments appreciated. > > Not-signed-off-by: Benjamin Herrenschmidt <benh@kernel.crashing.org> > > --- > arch/powerpc/kernel/entry_32.S | 113 ++++++++++++++++++++++------------- > arch/powerpc/kernel/head_44x.S | 9 +-- > arch/powerpc/kernel/head_booke.h | 34 ++++------- > arch/powerpc/kernel/head_fsl_booke.S | 28 ++++----- > arch/powerpc/kernel/traps.c | 8 +++ > 5 files changed, 111 insertions(+), 81 deletions(-) > > diff --git a/arch/powerpc/kernel/entry_32.S b/arch/powerpc/kernel/entry_32.S > index 3841d74..39b4cb5 100644 > --- a/arch/powerpc/kernel/entry_32.S > +++ b/arch/powerpc/kernel/entry_32.S > @@ -34,6 +34,9 @@ > #include <asm/ftrace.h> > #include <asm/ptrace.h> > #include <asm/export.h> > +#include <asm/feature-fixups.h> > +#include <asm/barrier.h> > +#include <asm/bug.h> > > /* > * MSR_KERNEL is > 0x10000 on 4xx/Book-E since it include MSR_CE. > @@ -205,20 +208,46 @@ transfer_to_handler_cont: > mflr r9 > lwz r11,0(r9) /* virtual address of handler */ > lwz r9,4(r9) /* where to go when done */ > +#if defined(CONFIG_PPC_8xx) && defined(CONFIG_PERF_EVENTS) > + mtspr SPRN_NRI, r0 > +#endif > + > #ifdef CONFIG_TRACE_IRQFLAGS > + /* > + * When tracing IRQ state (lockdep) we enable the MMU before we call > + * the IRQ tracing functions as they might access vmalloc space or > + * perform IOs for console output. > + * > + * To speed up the syscall path where interrupts stay on, let's check > + * first if we are changing the MSR value at all. > + */ > + lwz r12,_MSR(r1) > + xor r0,r10,r12 > + andi. r0,r0,MSR_EE > + bne 1f > + > + /* MSR isn't changing, just transition directly */ > + lwz r0,GPR0(r1) > + mtspr SPRN_SRR0,r11 > + mtspr SPRN_SRR1,r10 > + mtlr r9 > + SYNC > + RFI > + > +1: /* MSR is changing, re-enable MMU so we can notify lockdep. We need to > + * keep interrupts disabled at this point otherwise we might risk > + * taking an interrupt before we tell lockdep they are enabled. > + */ > lis r12,reenable_mmu@h > ori r12,r12,reenable_mmu@l > + lis r0,MSR_KERNEL@h > + ori r0,r0,MSR_KERNEL@l > mtspr SPRN_SRR0,r12 > - mtspr SPRN_SRR1,r10 > + mtspr SPRN_SRR1,r0 > SYNC > RFI > -reenable_mmu: /* re-enable mmu so we can */ > - mfmsr r10 > - lwz r12,_MSR(r1) > - xor r10,r10,r12 > - andi. r10,r10,MSR_EE /* Did EE change? */ > - beq 1f > > +reenable_mmu: > /* > * The trace_hardirqs_off will use CALLER_ADDR0 and CALLER_ADDR1. > * If from user mode there is only one stack frame on the stack, and > @@ -239,8 +268,29 @@ reenable_mmu: /* re-enable mmu so we can */ > stw r3,16(r1) > stw r4,20(r1) > stw r5,24(r1) > - bl trace_hardirqs_off > - lwz r5,24(r1) > + > + /* Are we enabling or disabling interrupts ? */ > + andi. r0,r10,MSR_EE > + beq 1f > + > + /* If we are enabling interrupt, this is a syscall. They shouldn't > + * happen while interrupts are disabled, so let's do a warning here. > + */ > +0: trap > + EMIT_BUG_ENTRY 0b,__FILE__,__LINE__, BUGFLAG_WARNING > + bl trace_hardirqs_on > + > + /* Now enable for real */ > + mfmsr r10 > + ori r10,r10,MSR_EE > + mtmsr r10 > + b 2f > + > + /* If we are disabling interrupts (normal case), simply log it with > + * lockdep > + */ > +1: bl trace_hardirqs_off > +2: lwz r5,24(r1) > lwz r4,20(r1) > lwz r3,16(r1) > lwz r11,12(r1) > @@ -250,7 +300,7 @@ reenable_mmu: /* re-enable mmu so we can */ > lwz r6,GPR6(r1) > lwz r7,GPR7(r1) > lwz r8,GPR8(r1) > -1: mtctr r11 > + mtctr r11 > mtlr r9 > bctr /* jump to handler */ > #else /* CONFIG_TRACE_IRQFLAGS */ > @@ -312,31 +362,19 @@ _GLOBAL(DoSyscall) > lwz r11,_CCR(r1) /* Clear SO bit in CR */ > rlwinm r11,r11,0,4,2 > stw r11,_CCR(r1) > + > #ifdef CONFIG_TRACE_IRQFLAGS > - /* Return from syscalls can (and generally will) hard enable > - * interrupts. You aren't supposed to call a syscall with > - * interrupts disabled in the first place. However, to ensure > - * that we get it right vs. lockdep if it happens, we force > - * that hard enable here with appropriate tracing if we see > - * that we have been called with interrupts off > - */ > + /* Make sure interrupts are enabled */ > mfmsr r11 > andi. r12,r11,MSR_EE > bne+ 1f > - /* We came in with interrupts disabled, we enable them now */ > - bl trace_hardirqs_on > - mfmsr r11 > - lwz r0,GPR0(r1) > - lwz r3,GPR3(r1) > - lwz r4,GPR4(r1) > - ori r11,r11,MSR_EE > - lwz r5,GPR5(r1) > - lwz r6,GPR6(r1) > - lwz r7,GPR7(r1) > - lwz r8,GPR8(r1) > - mtmsr r11 > + /* We came in with interrupts disabled, we WARN and mark them enabled > + * for lockdep now */ > +0: trap > + EMIT_BUG_ENTRY 0b,__FILE__,__LINE__, BUGFLAG_WARNING > 1: > #endif /* CONFIG_TRACE_IRQFLAGS */ > + > CURRENT_THREAD_INFO(r10, r1) > lwz r11,TI_FLAGS(r10) > andi. r11,r11,_TIF_SYSCALL_DOTRACE > @@ -375,8 +413,7 @@ syscall_exit_cont: > lwz r8,_MSR(r1) > #ifdef CONFIG_TRACE_IRQFLAGS > /* If we are going to return from the syscall with interrupts > - * off, we trace that here. It shouldn't happen though but we > - * want to catch the bugger if it does right ? > + * off, we trace that here. It shouldn't normally happen. > */ > andi. r10,r8,MSR_EE > bne+ 1f > @@ -881,13 +918,6 @@ END_MMU_FTR_SECTION_IFSET(MMU_FTR_TYPE_47x) > * off in this assembly code while peeking at TI_FLAGS() and such. However > * we need to inform it if the exception turned interrupts off, and we > * are about to trun them back on. > - * > - * The problem here sadly is that we don't know whether the exceptions was > - * one that turned interrupts off or not. So we always tell lockdep about > - * turning them on here when we go back to wherever we came from with EE > - * on, even if that may meen some redudant calls being tracked. Maybe later > - * we could encode what the exception did somewhere or test the exception > - * type in the pt_regs but that sounds overkill > */ > andi. r10,r9,MSR_EE > beq 1f > @@ -1175,9 +1205,10 @@ do_work: /* r10 contains MSR_KERNEL here */ > beq do_user_signal > > do_resched: /* r10 contains MSR_KERNEL here */ > - /* Note: We don't need to inform lockdep that we are enabling > - * interrupts here. As far as it knows, they are already enabled > - */ > +#ifdef CONFIG_TRACE_IRQFLAGS > + bl trace_hardirqs_on > + mfmsr r10 > +#endif > ori r10,r10,MSR_EE > SYNC > MTMSRD(r10) /* hard-enable interrupts */ > diff --git a/arch/powerpc/kernel/head_44x.S b/arch/powerpc/kernel/head_44x.S > index 37e4a7c..891a048 100644 > --- a/arch/powerpc/kernel/head_44x.S > +++ b/arch/powerpc/kernel/head_44x.S > @@ -40,6 +40,7 @@ > #include <asm/ptrace.h> > #include <asm/synch.h> > #include <asm/export.h> > + > #include "head_booke.h" > > > @@ -277,16 +278,16 @@ interrupt_base: > FP_UNAVAILABLE_EXCEPTION > #else > EXCEPTION(0x2010, BOOKE_INTERRUPT_FP_UNAVAIL, \ > - FloatingPointUnavailable, unknown_exception, EXC_XFER_EE) > + FloatingPointUnavailable, unknown_exception, EXC_XFER_STD) > #endif > /* System Call Interrupt */ > START_EXCEPTION(SystemCall) > NORMAL_EXCEPTION_PROLOG(BOOKE_INTERRUPT_SYSCALL) > - EXC_XFER_EE_LITE(0x0c00, DoSyscall) > + EXC_XFER_SYS(0x0c00, DoSyscall) > > /* Auxiliary Processor Unavailable Interrupt */ > EXCEPTION(0x2020, BOOKE_INTERRUPT_AP_UNAVAIL, \ > - AuxillaryProcessorUnavailable, unknown_exception, EXC_XFER_EE) > + AuxillaryProcessorUnavailable, unknown_exception, EXC_XFER_STD) > > /* Decrementer Interrupt */ > DECREMENTER_EXCEPTION > @@ -294,7 +295,7 @@ interrupt_base: > /* Fixed Internal Timer Interrupt */ > /* TODO: Add FIT support */ > EXCEPTION(0x1010, BOOKE_INTERRUPT_FIT, FixedIntervalTimer, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > > /* Watchdog Timer Interrupt */ > /* TODO: Add watchdog support */ > diff --git a/arch/powerpc/kernel/head_booke.h b/arch/powerpc/kernel/head_booke.h > index a620203..46be533 100644 > --- a/arch/powerpc/kernel/head_booke.h > +++ b/arch/powerpc/kernel/head_booke.h > @@ -210,8 +210,7 @@ > CRITICAL_EXCEPTION_PROLOG(intno); \ > addi r3,r1,STACK_FRAME_OVERHEAD; \ > EXC_XFER_TEMPLATE(hdlr, n+2, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), \ > - NOCOPY, crit_transfer_to_handler, \ > - ret_from_crit_exc) > + crit_transfer_to_handler, ret_from_crit_exc) > > #define MCHECK_EXCEPTION(n, label, hdlr) \ > START_EXCEPTION(label); \ > @@ -220,36 +219,27 @@ > stw r5,_ESR(r11); \ > addi r3,r1,STACK_FRAME_OVERHEAD; \ > EXC_XFER_TEMPLATE(hdlr, n+4, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), \ > - NOCOPY, mcheck_transfer_to_handler, \ > - ret_from_mcheck_exc) > + mcheck_transfer_to_handler, ret_from_mcheck_exc) > > -#define EXC_XFER_TEMPLATE(hdlr, trap, msr, copyee, tfer, ret) \ > +#define EXC_XFER_TEMPLATE(hdlr, trap, msr, tfer, ret) \ > li r10,trap; \ > stw r10,_TRAP(r11); \ > lis r10,msr@h; \ > ori r10,r10,msr@l; \ > - copyee(r10, r9); \ > bl tfer; \ > .long hdlr; \ > .long ret > > -#define COPY_EE(d, s) rlwimi d,s,0,16,16 > -#define NOCOPY(d, s) > - > #define EXC_XFER_STD(n, hdlr) \ > - EXC_XFER_TEMPLATE(hdlr, n, MSR_KERNEL, NOCOPY, transfer_to_handler_full, \ > + EXC_XFER_TEMPLATE(hdlr, n, MSR_KERNEL, transfer_to_handler_full, \ > ret_from_except_full) > > -#define EXC_XFER_LITE(n, hdlr) \ > - EXC_XFER_TEMPLATE(hdlr, n+1, MSR_KERNEL, NOCOPY, transfer_to_handler, \ > +#define EXC_XFER_SYS(n, hdlr) \ > + EXC_XFER_TEMPLATE(hdlr, n+1, MSR_KERNEL | MSR_EE, transfer_to_handler, \ > ret_from_except) > > -#define EXC_XFER_EE(n, hdlr) \ > - EXC_XFER_TEMPLATE(hdlr, n, MSR_KERNEL, COPY_EE, transfer_to_handler_full, \ > - ret_from_except_full) > - > -#define EXC_XFER_EE_LITE(n, hdlr) \ > - EXC_XFER_TEMPLATE(hdlr, n+1, MSR_KERNEL, COPY_EE, transfer_to_handler, \ > +#define EXC_XFER_LITE(n, hdlr) \ > + EXC_XFER_TEMPLATE(hdlr, n+1, MSR_KERNEL, transfer_to_handler, \ > ret_from_except) > > /* Check for a single step debug exception while in an exception > @@ -316,7 +306,7 @@ > /* continue normal handling for a debug exception... */ \ > 2: mfspr r4,SPRN_DBSR; \ > addi r3,r1,STACK_FRAME_OVERHEAD; \ > - EXC_XFER_TEMPLATE(DebugException, 0x2008, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), NOCOPY, debug_transfer_to_handler, ret_from_debug_exc) > + EXC_XFER_TEMPLATE(DebugException, 0x2008, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), debug_transfer_to_handler, ret_from_debug_exc) > > #define DEBUG_CRIT_EXCEPTION \ > START_EXCEPTION(DebugCrit); \ > @@ -369,7 +359,7 @@ > /* continue normal handling for a critical exception... */ \ > 2: mfspr r4,SPRN_DBSR; \ > addi r3,r1,STACK_FRAME_OVERHEAD; \ > - EXC_XFER_TEMPLATE(DebugException, 0x2002, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), NOCOPY, crit_transfer_to_handler, ret_from_crit_exc) > + EXC_XFER_TEMPLATE(DebugException, 0x2002, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), crit_transfer_to_handler, ret_from_crit_exc) > > #define DATA_STORAGE_EXCEPTION \ > START_EXCEPTION(DataStorage) \ > @@ -394,7 +384,7 @@ > mfspr r4,SPRN_DEAR; /* Grab the DEAR and save it */ \ > stw r4,_DEAR(r11); \ > addi r3,r1,STACK_FRAME_OVERHEAD; \ > - EXC_XFER_EE(0x0600, alignment_exception) > + EXC_XFER_STD(0x0600, alignment_exception) > > #define PROGRAM_EXCEPTION \ > START_EXCEPTION(Program) \ > @@ -419,7 +409,7 @@ > bl load_up_fpu; /* if from user, just load it up */ \ > b fast_exception_return; \ > 1: addi r3,r1,STACK_FRAME_OVERHEAD; \ > - EXC_XFER_EE_LITE(0x800, kernel_fp_unavailable_exception) > + EXC_XFER_STD(0x800, kernel_fp_unavailable_exception) > > #ifndef __ASSEMBLY__ > struct exception_regs { > diff --git a/arch/powerpc/kernel/head_fsl_booke.S b/arch/powerpc/kernel/head_fsl_booke.S > index bf4c602..556cffb 100644 > --- a/arch/powerpc/kernel/head_fsl_booke.S > +++ b/arch/powerpc/kernel/head_fsl_booke.S > @@ -385,7 +385,7 @@ interrupt_base: > EXC_XFER_LITE(0x0300, handle_page_fault) > 1: > addi r3,r1,STACK_FRAME_OVERHEAD > - EXC_XFER_EE_LITE(0x0300, CacheLockingException) > + EXC_XFER_LITE(0x0300, CacheLockingException) > > /* Instruction Storage Interrupt */ > INSTRUCTION_STORAGE_EXCEPTION > @@ -406,21 +406,21 @@ interrupt_base: > #ifdef CONFIG_E200 > /* E200 treats 'normal' floating point instructions as FP Unavail exception */ > EXCEPTION(0x0800, FP_UNAVAIL, FloatingPointUnavailable, \ > - program_check_exception, EXC_XFER_EE) > + program_check_exception, EXC_XFER_STD) > #else > EXCEPTION(0x0800, FP_UNAVAIL, FloatingPointUnavailable, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > #endif > #endif > > /* System Call Interrupt */ > START_EXCEPTION(SystemCall) > NORMAL_EXCEPTION_PROLOG(SYSCALL) > - EXC_XFER_EE_LITE(0x0c00, DoSyscall) > + EXC_XFER_SYS(0x0c00, DoSyscall) > > /* Auxiliary Processor Unavailable Interrupt */ > EXCEPTION(0x2900, AP_UNAVAIL, AuxillaryProcessorUnavailable, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > > /* Decrementer Interrupt */ > DECREMENTER_EXCEPTION > @@ -428,7 +428,7 @@ interrupt_base: > /* Fixed Internal Timer Interrupt */ > /* TODO: Add FIT support */ > EXCEPTION(0x3100, FIT, FixedIntervalTimer, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > > /* Watchdog Timer Interrupt */ > #ifdef CONFIG_BOOKE_WDT > @@ -623,25 +623,25 @@ END_FTR_SECTION_IFSET(CPU_FTR_EMB_HV) > bl load_up_spe > b fast_exception_return > 1: addi r3,r1,STACK_FRAME_OVERHEAD > - EXC_XFER_EE_LITE(0x2010, KernelSPE) > + EXC_XFER_LITE(0x2010, KernelSPE) > #elif defined(CONFIG_SPE_POSSIBLE) > EXCEPTION(0x2020, SPE_UNAVAIL, SPEUnavailable, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > #endif /* CONFIG_SPE_POSSIBLE */ > > /* SPE Floating Point Data */ > #ifdef CONFIG_SPE > EXCEPTION(0x2030, SPE_FP_DATA, SPEFloatingPointData, > - SPEFloatingPointException, EXC_XFER_EE) > + SPEFloatingPointException, EXC_XFER_STD) > > /* SPE Floating Point Round */ > EXCEPTION(0x2050, SPE_FP_ROUND, SPEFloatingPointRound, \ > - SPEFloatingPointRoundException, EXC_XFER_EE) > + SPEFloatingPointRoundException, EXC_XFER_STD) > #elif defined(CONFIG_SPE_POSSIBLE) > EXCEPTION(0x2040, SPE_FP_DATA, SPEFloatingPointData, > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > EXCEPTION(0x2050, SPE_FP_ROUND, SPEFloatingPointRound, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > #endif /* CONFIG_SPE_POSSIBLE */ > > > @@ -664,10 +664,10 @@ END_FTR_SECTION_IFSET(CPU_FTR_EMB_HV) > unknown_exception) > > /* Hypercall */ > - EXCEPTION(0, HV_SYSCALL, Hypercall, unknown_exception, EXC_XFER_EE) > + EXCEPTION(0, HV_SYSCALL, Hypercall, unknown_exception, EXC_XFER_STD) > > /* Embedded Hypervisor Privilege */ > - EXCEPTION(0, HV_PRIV, Ehvpriv, unknown_exception, EXC_XFER_EE) > + EXCEPTION(0, HV_PRIV, Ehvpriv, unknown_exception, EXC_XFER_STD) > > interrupt_end: > > diff --git a/arch/powerpc/kernel/traps.c b/arch/powerpc/kernel/traps.c > index 023a462..5ee0b90 100644 > --- a/arch/powerpc/kernel/traps.c > +++ b/arch/powerpc/kernel/traps.c > @@ -1858,6 +1858,10 @@ void SPEFloatingPointException(struct pt_regs *regs) > int code = 0; > int err; > > + /* We restore the interrupt state now */ > + if (!arch_irq_disabled_regs(regs)) > + local_irq_enable(); > + > flush_spe_to_thread(current); > > spefscr = current->thread.spefscr; > @@ -1903,6 +1907,10 @@ void SPEFloatingPointRoundException(struct pt_regs *regs) > extern int speround_handler(struct pt_regs *regs); > int err; > > + /* We restore the interrupt state now */ > + if (!arch_irq_disabled_regs(regs)) > + local_irq_enable(); > + > preempt_disable(); > if (regs->msr & MSR_SPE) > giveup_spe(current); > --- L'absence de virus dans ce courrier électronique a été vérifiée par le logiciel antivirus Avast. https://www.avast.com/antivirus
Le 20/12/2018 à 23:35, Benjamin Herrenschmidt a écrit : > >>> /* >>> * MSR_KERNEL is > 0x10000 on 4xx/Book-E since it include MSR_CE. >>> @@ -205,20 +208,46 @@ transfer_to_handler_cont: >>> mflr r9 >>> lwz r11,0(r9) /* virtual address of handler */ >>> lwz r9,4(r9) /* where to go when done */ >>> +#if defined(CONFIG_PPC_8xx) && defined(CONFIG_PERF_EVENTS) >>> + mtspr SPRN_NRI, r0 >>> +#endif >> >> That's not part of your patch, it's already in the tree. > > Yup rebase glitch. > > .../... > >> I tested it on the 8xx with the below changes in addition. No issue seen >> so far. > > Thanks ! > > I'll merge that in. I'm currently working on a refactorisation and simplification of exception and syscall entry on ppc32. I plan to take your patch in my serie as it helps quite a bit. I hope you don't mind. I expect to come out with a series this week. > > The main obscure area is that business with the irqsoff tracer and thus > the need to create stack frames around calls to trace_hardirqs_* ... we > do it in some places and not others, but I've not managed to make it > crash either. I need to get to the bottom of that, and possibly provide > proper macro helpers like ppc64 has to do it. I can't see anything special around this in ppc32 code. As far as I understand, a stack frame is put in place when there is a need to save and restore some volatile registers. At the places where nothing needs to be saved, nothing is done. I think that's the normal way for any function call, isn't it ? Christophe
Christophe Leroy <christophe.leroy@c-s.fr> writes: > Le 20/12/2018 à 23:35, Benjamin Herrenschmidt a écrit : >> >>>> /* >>>> * MSR_KERNEL is > 0x10000 on 4xx/Book-E since it include MSR_CE. >>>> @@ -205,20 +208,46 @@ transfer_to_handler_cont: >>>> mflr r9 >>>> lwz r11,0(r9) /* virtual address of handler */ >>>> lwz r9,4(r9) /* where to go when done */ >>>> +#if defined(CONFIG_PPC_8xx) && defined(CONFIG_PERF_EVENTS) >>>> + mtspr SPRN_NRI, r0 >>>> +#endif >>> >>> That's not part of your patch, it's already in the tree. >> >> Yup rebase glitch. >> >> .../... >> >>> I tested it on the 8xx with the below changes in addition. No issue seen >>> so far. >> >> Thanks ! >> >> I'll merge that in. > > I'm currently working on a refactorisation and simplification of > exception and syscall entry on ppc32. > > I plan to take your patch in my serie as it helps quite a bit. I hope > you don't mind. I expect to come out with a series this week. Ben's AFK so go ahead and pull it in to your series if that helps you. >> The main obscure area is that business with the irqsoff tracer and thus >> the need to create stack frames around calls to trace_hardirqs_* ... we >> do it in some places and not others, but I've not managed to make it >> crash either. I need to get to the bottom of that, and possibly provide >> proper macro helpers like ppc64 has to do it. > > I can't see anything special around this in ppc32 code. As far as I > understand, a stack frame is put in place when there is a need to > save and restore some volatile registers. At the places where nothing > needs to be saved, nothing is done. I think that's the normal way for > any function call, isn't it ? The concern was that the irqsoff tracer was doing __builtin_return_address(1) (or some number > 0) and that crashes if there aren't sufficiently many stack frames available. See ftrace_return_address. Possibly the answer is that we don't have CONFIG_FRAME_POINTER and so we get the empty version of that. cheers
Le 20/12/2018 à 06:40, Benjamin Herrenschmidt a écrit : > Hi folks ! > > Why trying to figure out why we had occasionally lockdep barf about > interrupt state on ppc32 (440 in my case but I could reproduce on e500 > as well using qemu), I realized that we are still doing something > rather gothic and wrong on 32-bit which we stopped doing on 64-bit > a while ago. > > We have that thing where some handlers "copy" the EE value from the > original stack frame into the new MSR before transferring to the > handler. > > Thus for a number of exceptions, we enter the handlers with interrupts > enabled. > > This is rather fishy, some of the stuff that handlers might do early > on such as irq_enter/exit or user_exit, context tracking, etc... should > be run with interrupts off afaik. > > Generally our handlers know when to re-enable interrupts if needed > (though some of the FSL specific SPE ones don't). > > The problem we were having is that we assumed these interrupts would > return with interrupts enabled. However that isn't the case. > > Instead, this changes things so that we always enter exception handlers > with interrupts *off* with the notable exception of syscalls which are > special (and get a fast path). > > Currently, the patch only changes BookE (440 and E5xx tested in qemu), > the same recipe needs to be applied to 6xx, 8xx and 40x. > > Also I'm not sure whether we need to create a stack frame around some > of the calls to trace_hardirqs_* in asm. ppc64 does it, due to problems > with the irqsoff tracer, but I haven't managed to reproduce those > issues. We need to look into it a bit more. > > I'll work more on this in the next few days, comments appreciated. > > Not-signed-off-by: Benjamin Herrenschmidt <benh@kernel.crashing.org> > > --- > arch/powerpc/kernel/entry_32.S | 113 ++++++++++++++++++++++------------- > arch/powerpc/kernel/head_44x.S | 9 +-- > arch/powerpc/kernel/head_booke.h | 34 ++++------- > arch/powerpc/kernel/head_fsl_booke.S | 28 ++++----- > arch/powerpc/kernel/traps.c | 8 +++ > 5 files changed, 111 insertions(+), 81 deletions(-) > > diff --git a/arch/powerpc/kernel/entry_32.S b/arch/powerpc/kernel/entry_32.S > index 3841d74..39b4cb5 100644 > --- a/arch/powerpc/kernel/entry_32.S > +++ b/arch/powerpc/kernel/entry_32.S > @@ -34,6 +34,9 @@ > #include <asm/ftrace.h> > #include <asm/ptrace.h> > #include <asm/export.h> > +#include <asm/feature-fixups.h> > +#include <asm/barrier.h> > +#include <asm/bug.h> > > /* > * MSR_KERNEL is > 0x10000 on 4xx/Book-E since it include MSR_CE. > @@ -205,20 +208,46 @@ transfer_to_handler_cont: > mflr r9 > lwz r11,0(r9) /* virtual address of handler */ > lwz r9,4(r9) /* where to go when done */ > +#if defined(CONFIG_PPC_8xx) && defined(CONFIG_PERF_EVENTS) > + mtspr SPRN_NRI, r0 > +#endif > + > #ifdef CONFIG_TRACE_IRQFLAGS > + /* > + * When tracing IRQ state (lockdep) we enable the MMU before we call > + * the IRQ tracing functions as they might access vmalloc space or > + * perform IOs for console output. > + * > + * To speed up the syscall path where interrupts stay on, let's check > + * first if we are changing the MSR value at all. > + */ > + lwz r12,_MSR(r1) This one cannot work. MMU is not reenabled yet, so r1 cannot be used. And r11 now has the virt address of handler, so can't be used either. Christophe > + xor r0,r10,r12 > + andi. r0,r0,MSR_EE > + bne 1f > + > + /* MSR isn't changing, just transition directly */ > + lwz r0,GPR0(r1) > + mtspr SPRN_SRR0,r11 > + mtspr SPRN_SRR1,r10 > + mtlr r9 > + SYNC > + RFI > + > +1: /* MSR is changing, re-enable MMU so we can notify lockdep. We need to > + * keep interrupts disabled at this point otherwise we might risk > + * taking an interrupt before we tell lockdep they are enabled. > + */ > lis r12,reenable_mmu@h > ori r12,r12,reenable_mmu@l > + lis r0,MSR_KERNEL@h > + ori r0,r0,MSR_KERNEL@l > mtspr SPRN_SRR0,r12 > - mtspr SPRN_SRR1,r10 > + mtspr SPRN_SRR1,r0 > SYNC > RFI > -reenable_mmu: /* re-enable mmu so we can */ > - mfmsr r10 > - lwz r12,_MSR(r1) > - xor r10,r10,r12 > - andi. r10,r10,MSR_EE /* Did EE change? */ > - beq 1f > > +reenable_mmu: > /* > * The trace_hardirqs_off will use CALLER_ADDR0 and CALLER_ADDR1. > * If from user mode there is only one stack frame on the stack, and > @@ -239,8 +268,29 @@ reenable_mmu: /* re-enable mmu so we can */ > stw r3,16(r1) > stw r4,20(r1) > stw r5,24(r1) > - bl trace_hardirqs_off > - lwz r5,24(r1) > + > + /* Are we enabling or disabling interrupts ? */ > + andi. r0,r10,MSR_EE > + beq 1f > + > + /* If we are enabling interrupt, this is a syscall. They shouldn't > + * happen while interrupts are disabled, so let's do a warning here. > + */ > +0: trap > + EMIT_BUG_ENTRY 0b,__FILE__,__LINE__, BUGFLAG_WARNING > + bl trace_hardirqs_on > + > + /* Now enable for real */ > + mfmsr r10 > + ori r10,r10,MSR_EE > + mtmsr r10 > + b 2f > + > + /* If we are disabling interrupts (normal case), simply log it with > + * lockdep > + */ > +1: bl trace_hardirqs_off > +2: lwz r5,24(r1) > lwz r4,20(r1) > lwz r3,16(r1) > lwz r11,12(r1) > @@ -250,7 +300,7 @@ reenable_mmu: /* re-enable mmu so we can */ > lwz r6,GPR6(r1) > lwz r7,GPR7(r1) > lwz r8,GPR8(r1) > -1: mtctr r11 > + mtctr r11 > mtlr r9 > bctr /* jump to handler */ > #else /* CONFIG_TRACE_IRQFLAGS */ > @@ -312,31 +362,19 @@ _GLOBAL(DoSyscall) > lwz r11,_CCR(r1) /* Clear SO bit in CR */ > rlwinm r11,r11,0,4,2 > stw r11,_CCR(r1) > + > #ifdef CONFIG_TRACE_IRQFLAGS > - /* Return from syscalls can (and generally will) hard enable > - * interrupts. You aren't supposed to call a syscall with > - * interrupts disabled in the first place. However, to ensure > - * that we get it right vs. lockdep if it happens, we force > - * that hard enable here with appropriate tracing if we see > - * that we have been called with interrupts off > - */ > + /* Make sure interrupts are enabled */ > mfmsr r11 > andi. r12,r11,MSR_EE > bne+ 1f > - /* We came in with interrupts disabled, we enable them now */ > - bl trace_hardirqs_on > - mfmsr r11 > - lwz r0,GPR0(r1) > - lwz r3,GPR3(r1) > - lwz r4,GPR4(r1) > - ori r11,r11,MSR_EE > - lwz r5,GPR5(r1) > - lwz r6,GPR6(r1) > - lwz r7,GPR7(r1) > - lwz r8,GPR8(r1) > - mtmsr r11 > + /* We came in with interrupts disabled, we WARN and mark them enabled > + * for lockdep now */ > +0: trap > + EMIT_BUG_ENTRY 0b,__FILE__,__LINE__, BUGFLAG_WARNING > 1: > #endif /* CONFIG_TRACE_IRQFLAGS */ > + > CURRENT_THREAD_INFO(r10, r1) > lwz r11,TI_FLAGS(r10) > andi. r11,r11,_TIF_SYSCALL_DOTRACE > @@ -375,8 +413,7 @@ syscall_exit_cont: > lwz r8,_MSR(r1) > #ifdef CONFIG_TRACE_IRQFLAGS > /* If we are going to return from the syscall with interrupts > - * off, we trace that here. It shouldn't happen though but we > - * want to catch the bugger if it does right ? > + * off, we trace that here. It shouldn't normally happen. > */ > andi. r10,r8,MSR_EE > bne+ 1f > @@ -881,13 +918,6 @@ END_MMU_FTR_SECTION_IFSET(MMU_FTR_TYPE_47x) > * off in this assembly code while peeking at TI_FLAGS() and such. However > * we need to inform it if the exception turned interrupts off, and we > * are about to trun them back on. > - * > - * The problem here sadly is that we don't know whether the exceptions was > - * one that turned interrupts off or not. So we always tell lockdep about > - * turning them on here when we go back to wherever we came from with EE > - * on, even if that may meen some redudant calls being tracked. Maybe later > - * we could encode what the exception did somewhere or test the exception > - * type in the pt_regs but that sounds overkill > */ > andi. r10,r9,MSR_EE > beq 1f > @@ -1175,9 +1205,10 @@ do_work: /* r10 contains MSR_KERNEL here */ > beq do_user_signal > > do_resched: /* r10 contains MSR_KERNEL here */ > - /* Note: We don't need to inform lockdep that we are enabling > - * interrupts here. As far as it knows, they are already enabled > - */ > +#ifdef CONFIG_TRACE_IRQFLAGS > + bl trace_hardirqs_on > + mfmsr r10 > +#endif > ori r10,r10,MSR_EE > SYNC > MTMSRD(r10) /* hard-enable interrupts */ > diff --git a/arch/powerpc/kernel/head_44x.S b/arch/powerpc/kernel/head_44x.S > index 37e4a7c..891a048 100644 > --- a/arch/powerpc/kernel/head_44x.S > +++ b/arch/powerpc/kernel/head_44x.S > @@ -40,6 +40,7 @@ > #include <asm/ptrace.h> > #include <asm/synch.h> > #include <asm/export.h> > + > #include "head_booke.h" > > > @@ -277,16 +278,16 @@ interrupt_base: > FP_UNAVAILABLE_EXCEPTION > #else > EXCEPTION(0x2010, BOOKE_INTERRUPT_FP_UNAVAIL, \ > - FloatingPointUnavailable, unknown_exception, EXC_XFER_EE) > + FloatingPointUnavailable, unknown_exception, EXC_XFER_STD) > #endif > /* System Call Interrupt */ > START_EXCEPTION(SystemCall) > NORMAL_EXCEPTION_PROLOG(BOOKE_INTERRUPT_SYSCALL) > - EXC_XFER_EE_LITE(0x0c00, DoSyscall) > + EXC_XFER_SYS(0x0c00, DoSyscall) > > /* Auxiliary Processor Unavailable Interrupt */ > EXCEPTION(0x2020, BOOKE_INTERRUPT_AP_UNAVAIL, \ > - AuxillaryProcessorUnavailable, unknown_exception, EXC_XFER_EE) > + AuxillaryProcessorUnavailable, unknown_exception, EXC_XFER_STD) > > /* Decrementer Interrupt */ > DECREMENTER_EXCEPTION > @@ -294,7 +295,7 @@ interrupt_base: > /* Fixed Internal Timer Interrupt */ > /* TODO: Add FIT support */ > EXCEPTION(0x1010, BOOKE_INTERRUPT_FIT, FixedIntervalTimer, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > > /* Watchdog Timer Interrupt */ > /* TODO: Add watchdog support */ > diff --git a/arch/powerpc/kernel/head_booke.h b/arch/powerpc/kernel/head_booke.h > index a620203..46be533 100644 > --- a/arch/powerpc/kernel/head_booke.h > +++ b/arch/powerpc/kernel/head_booke.h > @@ -210,8 +210,7 @@ > CRITICAL_EXCEPTION_PROLOG(intno); \ > addi r3,r1,STACK_FRAME_OVERHEAD; \ > EXC_XFER_TEMPLATE(hdlr, n+2, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), \ > - NOCOPY, crit_transfer_to_handler, \ > - ret_from_crit_exc) > + crit_transfer_to_handler, ret_from_crit_exc) > > #define MCHECK_EXCEPTION(n, label, hdlr) \ > START_EXCEPTION(label); \ > @@ -220,36 +219,27 @@ > stw r5,_ESR(r11); \ > addi r3,r1,STACK_FRAME_OVERHEAD; \ > EXC_XFER_TEMPLATE(hdlr, n+4, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), \ > - NOCOPY, mcheck_transfer_to_handler, \ > - ret_from_mcheck_exc) > + mcheck_transfer_to_handler, ret_from_mcheck_exc) > > -#define EXC_XFER_TEMPLATE(hdlr, trap, msr, copyee, tfer, ret) \ > +#define EXC_XFER_TEMPLATE(hdlr, trap, msr, tfer, ret) \ > li r10,trap; \ > stw r10,_TRAP(r11); \ > lis r10,msr@h; \ > ori r10,r10,msr@l; \ > - copyee(r10, r9); \ > bl tfer; \ > .long hdlr; \ > .long ret > > -#define COPY_EE(d, s) rlwimi d,s,0,16,16 > -#define NOCOPY(d, s) > - > #define EXC_XFER_STD(n, hdlr) \ > - EXC_XFER_TEMPLATE(hdlr, n, MSR_KERNEL, NOCOPY, transfer_to_handler_full, \ > + EXC_XFER_TEMPLATE(hdlr, n, MSR_KERNEL, transfer_to_handler_full, \ > ret_from_except_full) > > -#define EXC_XFER_LITE(n, hdlr) \ > - EXC_XFER_TEMPLATE(hdlr, n+1, MSR_KERNEL, NOCOPY, transfer_to_handler, \ > +#define EXC_XFER_SYS(n, hdlr) \ > + EXC_XFER_TEMPLATE(hdlr, n+1, MSR_KERNEL | MSR_EE, transfer_to_handler, \ > ret_from_except) > > -#define EXC_XFER_EE(n, hdlr) \ > - EXC_XFER_TEMPLATE(hdlr, n, MSR_KERNEL, COPY_EE, transfer_to_handler_full, \ > - ret_from_except_full) > - > -#define EXC_XFER_EE_LITE(n, hdlr) \ > - EXC_XFER_TEMPLATE(hdlr, n+1, MSR_KERNEL, COPY_EE, transfer_to_handler, \ > +#define EXC_XFER_LITE(n, hdlr) \ > + EXC_XFER_TEMPLATE(hdlr, n+1, MSR_KERNEL, transfer_to_handler, \ > ret_from_except) > > /* Check for a single step debug exception while in an exception > @@ -316,7 +306,7 @@ > /* continue normal handling for a debug exception... */ \ > 2: mfspr r4,SPRN_DBSR; \ > addi r3,r1,STACK_FRAME_OVERHEAD; \ > - EXC_XFER_TEMPLATE(DebugException, 0x2008, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), NOCOPY, debug_transfer_to_handler, ret_from_debug_exc) > + EXC_XFER_TEMPLATE(DebugException, 0x2008, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), debug_transfer_to_handler, ret_from_debug_exc) > > #define DEBUG_CRIT_EXCEPTION \ > START_EXCEPTION(DebugCrit); \ > @@ -369,7 +359,7 @@ > /* continue normal handling for a critical exception... */ \ > 2: mfspr r4,SPRN_DBSR; \ > addi r3,r1,STACK_FRAME_OVERHEAD; \ > - EXC_XFER_TEMPLATE(DebugException, 0x2002, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), NOCOPY, crit_transfer_to_handler, ret_from_crit_exc) > + EXC_XFER_TEMPLATE(DebugException, 0x2002, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), crit_transfer_to_handler, ret_from_crit_exc) > > #define DATA_STORAGE_EXCEPTION \ > START_EXCEPTION(DataStorage) \ > @@ -394,7 +384,7 @@ > mfspr r4,SPRN_DEAR; /* Grab the DEAR and save it */ \ > stw r4,_DEAR(r11); \ > addi r3,r1,STACK_FRAME_OVERHEAD; \ > - EXC_XFER_EE(0x0600, alignment_exception) > + EXC_XFER_STD(0x0600, alignment_exception) > > #define PROGRAM_EXCEPTION \ > START_EXCEPTION(Program) \ > @@ -419,7 +409,7 @@ > bl load_up_fpu; /* if from user, just load it up */ \ > b fast_exception_return; \ > 1: addi r3,r1,STACK_FRAME_OVERHEAD; \ > - EXC_XFER_EE_LITE(0x800, kernel_fp_unavailable_exception) > + EXC_XFER_STD(0x800, kernel_fp_unavailable_exception) > > #ifndef __ASSEMBLY__ > struct exception_regs { > diff --git a/arch/powerpc/kernel/head_fsl_booke.S b/arch/powerpc/kernel/head_fsl_booke.S > index bf4c602..556cffb 100644 > --- a/arch/powerpc/kernel/head_fsl_booke.S > +++ b/arch/powerpc/kernel/head_fsl_booke.S > @@ -385,7 +385,7 @@ interrupt_base: > EXC_XFER_LITE(0x0300, handle_page_fault) > 1: > addi r3,r1,STACK_FRAME_OVERHEAD > - EXC_XFER_EE_LITE(0x0300, CacheLockingException) > + EXC_XFER_LITE(0x0300, CacheLockingException) > > /* Instruction Storage Interrupt */ > INSTRUCTION_STORAGE_EXCEPTION > @@ -406,21 +406,21 @@ interrupt_base: > #ifdef CONFIG_E200 > /* E200 treats 'normal' floating point instructions as FP Unavail exception */ > EXCEPTION(0x0800, FP_UNAVAIL, FloatingPointUnavailable, \ > - program_check_exception, EXC_XFER_EE) > + program_check_exception, EXC_XFER_STD) > #else > EXCEPTION(0x0800, FP_UNAVAIL, FloatingPointUnavailable, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > #endif > #endif > > /* System Call Interrupt */ > START_EXCEPTION(SystemCall) > NORMAL_EXCEPTION_PROLOG(SYSCALL) > - EXC_XFER_EE_LITE(0x0c00, DoSyscall) > + EXC_XFER_SYS(0x0c00, DoSyscall) > > /* Auxiliary Processor Unavailable Interrupt */ > EXCEPTION(0x2900, AP_UNAVAIL, AuxillaryProcessorUnavailable, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > > /* Decrementer Interrupt */ > DECREMENTER_EXCEPTION > @@ -428,7 +428,7 @@ interrupt_base: > /* Fixed Internal Timer Interrupt */ > /* TODO: Add FIT support */ > EXCEPTION(0x3100, FIT, FixedIntervalTimer, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > > /* Watchdog Timer Interrupt */ > #ifdef CONFIG_BOOKE_WDT > @@ -623,25 +623,25 @@ END_FTR_SECTION_IFSET(CPU_FTR_EMB_HV) > bl load_up_spe > b fast_exception_return > 1: addi r3,r1,STACK_FRAME_OVERHEAD > - EXC_XFER_EE_LITE(0x2010, KernelSPE) > + EXC_XFER_LITE(0x2010, KernelSPE) > #elif defined(CONFIG_SPE_POSSIBLE) > EXCEPTION(0x2020, SPE_UNAVAIL, SPEUnavailable, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > #endif /* CONFIG_SPE_POSSIBLE */ > > /* SPE Floating Point Data */ > #ifdef CONFIG_SPE > EXCEPTION(0x2030, SPE_FP_DATA, SPEFloatingPointData, > - SPEFloatingPointException, EXC_XFER_EE) > + SPEFloatingPointException, EXC_XFER_STD) > > /* SPE Floating Point Round */ > EXCEPTION(0x2050, SPE_FP_ROUND, SPEFloatingPointRound, \ > - SPEFloatingPointRoundException, EXC_XFER_EE) > + SPEFloatingPointRoundException, EXC_XFER_STD) > #elif defined(CONFIG_SPE_POSSIBLE) > EXCEPTION(0x2040, SPE_FP_DATA, SPEFloatingPointData, > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > EXCEPTION(0x2050, SPE_FP_ROUND, SPEFloatingPointRound, \ > - unknown_exception, EXC_XFER_EE) > + unknown_exception, EXC_XFER_STD) > #endif /* CONFIG_SPE_POSSIBLE */ > > > @@ -664,10 +664,10 @@ END_FTR_SECTION_IFSET(CPU_FTR_EMB_HV) > unknown_exception) > > /* Hypercall */ > - EXCEPTION(0, HV_SYSCALL, Hypercall, unknown_exception, EXC_XFER_EE) > + EXCEPTION(0, HV_SYSCALL, Hypercall, unknown_exception, EXC_XFER_STD) > > /* Embedded Hypervisor Privilege */ > - EXCEPTION(0, HV_PRIV, Ehvpriv, unknown_exception, EXC_XFER_EE) > + EXCEPTION(0, HV_PRIV, Ehvpriv, unknown_exception, EXC_XFER_STD) > > interrupt_end: > > diff --git a/arch/powerpc/kernel/traps.c b/arch/powerpc/kernel/traps.c > index 023a462..5ee0b90 100644 > --- a/arch/powerpc/kernel/traps.c > +++ b/arch/powerpc/kernel/traps.c > @@ -1858,6 +1858,10 @@ void SPEFloatingPointException(struct pt_regs *regs) > int code = 0; > int err; > > + /* We restore the interrupt state now */ > + if (!arch_irq_disabled_regs(regs)) > + local_irq_enable(); > + > flush_spe_to_thread(current); > > spefscr = current->thread.spefscr; > @@ -1903,6 +1907,10 @@ void SPEFloatingPointRoundException(struct pt_regs *regs) > extern int speround_handler(struct pt_regs *regs); > int err; > > + /* We restore the interrupt state now */ > + if (!arch_irq_disabled_regs(regs)) > + local_irq_enable(); > + > preempt_disable(); > if (regs->msr & MSR_SPE) > giveup_spe(current); >
On Tue, 2019-02-05 at 10:45 +0100, Christophe Leroy wrote: > > > I tested it on the 8xx with the below changes in addition. No issue seen > > > so far. > > > > Thanks ! > > > > I'll merge that in. > > I'm currently working on a refactorisation and simplification of > exception and syscall entry on ppc32. > > I plan to take your patch in my serie as it helps quite a bit. I hope > you don't mind. I expect to come out with a series this week. Ah ok, you want to take over the series then ? We still need to convert all the other CPU variants... to be honest I've been distracted, and taking some time off. I'll be leaving IBM by the end of next week, so I don't really see myself finishing this work properly. > > The main obscure area is that business with the irqsoff tracer and thus > > the need to create stack frames around calls to trace_hardirqs_* ... we > > do it in some places and not others, but I've not managed to make it > > crash either. I need to get to the bottom of that, and possibly provide > > proper macro helpers like ppc64 has to do it. > > I can't see anything special around this in ppc32 code. As far as I > understand, a stack frame is put in place when there is a need to > save and restore some volatile registers. At the places where nothing > needs to be saved, nothing is done. I think that's the normal way for > any function call, isn't it ? Not exactly. There's an issue with one of the tracers using __bultin_return_address(1) which can crash afaik if we don't have "enough" stack frames on the stack, so there are cases where we need to create one explicitly around the tracing calls bcs there's only one on the actual stack. I don't know the full details, I was planning on doing a bunch of tests in sim to figure out exactly what happens and what needs to be done (and whether our existing code is correct or not), but didn't get to it so far. Cheers, Ben.
On 02/05/2019 10:10 AM, Michael Ellerman wrote: > Christophe Leroy <christophe.leroy@c-s.fr> writes: >> Le 20/12/2018 à 23:35, Benjamin Herrenschmidt a écrit : >>> >>>>> /* >>>>> * MSR_KERNEL is > 0x10000 on 4xx/Book-E since it include MSR_CE. >>>>> @@ -205,20 +208,46 @@ transfer_to_handler_cont: >>>>> mflr r9 >>>>> lwz r11,0(r9) /* virtual address of handler */ >>>>> lwz r9,4(r9) /* where to go when done */ >>>>> +#if defined(CONFIG_PPC_8xx) && defined(CONFIG_PERF_EVENTS) >>>>> + mtspr SPRN_NRI, r0 >>>>> +#endif >>>> >>>> That's not part of your patch, it's already in the tree. >>> >>> Yup rebase glitch. >>> >>> .../... >>> >>>> I tested it on the 8xx with the below changes in addition. No issue seen >>>> so far. >>> >>> Thanks ! >>> >>> I'll merge that in. >> >> I'm currently working on a refactorisation and simplification of >> exception and syscall entry on ppc32. >> >> I plan to take your patch in my serie as it helps quite a bit. I hope >> you don't mind. I expect to come out with a series this week. > > Ben's AFK so go ahead and pull it in to your series if that helps you. > >>> The main obscure area is that business with the irqsoff tracer and thus >>> the need to create stack frames around calls to trace_hardirqs_* ... we >>> do it in some places and not others, but I've not managed to make it >>> crash either. I need to get to the bottom of that, and possibly provide >>> proper macro helpers like ppc64 has to do it. >> >> I can't see anything special around this in ppc32 code. As far as I >> understand, a stack frame is put in place when there is a need to >> save and restore some volatile registers. At the places where nothing >> needs to be saved, nothing is done. I think that's the normal way for >> any function call, isn't it ? > > The concern was that the irqsoff tracer was doing > __builtin_return_address(1) (or some number > 0) and that crashes if > there aren't sufficiently many stack frames available. > > See ftrace_return_address. > > Possibly the answer is that we don't have CONFIG_FRAME_POINTER and so we > get the empty version of that. > Yes indeed, ftrace_return_address(1) is not __builtin_return_address(1) but 0ul as CONFIG_FRAME_POINTER is not defined. So the crash can't be due to that as it would then crash regardless of whether we set a stack frame or not. And anyway, as far as I understand, if the stack is properly initialised, __builtin_return_address(X) returns NULL and don't crash when the top of backtrace is reached. Do you have more details about the said crash ? I think we should file an issue for it in our issue databse. For the time being, I'll get rid of that unneccessary stack frame in entry_32.S as part of my syscall prolog optimising series. Christophe
diff --git a/arch/powerpc/kernel/entry_32.S b/arch/powerpc/kernel/entry_32.S index 3841d74..39b4cb5 100644 --- a/arch/powerpc/kernel/entry_32.S +++ b/arch/powerpc/kernel/entry_32.S @@ -34,6 +34,9 @@ #include <asm/ftrace.h> #include <asm/ptrace.h> #include <asm/export.h> +#include <asm/feature-fixups.h> +#include <asm/barrier.h> +#include <asm/bug.h> /* * MSR_KERNEL is > 0x10000 on 4xx/Book-E since it include MSR_CE. @@ -205,20 +208,46 @@ transfer_to_handler_cont: mflr r9 lwz r11,0(r9) /* virtual address of handler */ lwz r9,4(r9) /* where to go when done */ +#if defined(CONFIG_PPC_8xx) && defined(CONFIG_PERF_EVENTS) + mtspr SPRN_NRI, r0 +#endif + #ifdef CONFIG_TRACE_IRQFLAGS + /* + * When tracing IRQ state (lockdep) we enable the MMU before we call + * the IRQ tracing functions as they might access vmalloc space or + * perform IOs for console output. + * + * To speed up the syscall path where interrupts stay on, let's check + * first if we are changing the MSR value at all. + */ + lwz r12,_MSR(r1) + xor r0,r10,r12 + andi. r0,r0,MSR_EE + bne 1f + + /* MSR isn't changing, just transition directly */ + lwz r0,GPR0(r1) + mtspr SPRN_SRR0,r11 + mtspr SPRN_SRR1,r10 + mtlr r9 + SYNC + RFI + +1: /* MSR is changing, re-enable MMU so we can notify lockdep. We need to + * keep interrupts disabled at this point otherwise we might risk + * taking an interrupt before we tell lockdep they are enabled. + */ lis r12,reenable_mmu@h ori r12,r12,reenable_mmu@l + lis r0,MSR_KERNEL@h + ori r0,r0,MSR_KERNEL@l mtspr SPRN_SRR0,r12 - mtspr SPRN_SRR1,r10 + mtspr SPRN_SRR1,r0 SYNC RFI -reenable_mmu: /* re-enable mmu so we can */ - mfmsr r10 - lwz r12,_MSR(r1) - xor r10,r10,r12 - andi. r10,r10,MSR_EE /* Did EE change? */ - beq 1f +reenable_mmu: /* * The trace_hardirqs_off will use CALLER_ADDR0 and CALLER_ADDR1. * If from user mode there is only one stack frame on the stack, and @@ -239,8 +268,29 @@ reenable_mmu: /* re-enable mmu so we can */ stw r3,16(r1) stw r4,20(r1) stw r5,24(r1) - bl trace_hardirqs_off - lwz r5,24(r1) + + /* Are we enabling or disabling interrupts ? */ + andi. r0,r10,MSR_EE + beq 1f + + /* If we are enabling interrupt, this is a syscall. They shouldn't + * happen while interrupts are disabled, so let's do a warning here. + */ +0: trap + EMIT_BUG_ENTRY 0b,__FILE__,__LINE__, BUGFLAG_WARNING + bl trace_hardirqs_on + + /* Now enable for real */ + mfmsr r10 + ori r10,r10,MSR_EE + mtmsr r10 + b 2f + + /* If we are disabling interrupts (normal case), simply log it with + * lockdep + */ +1: bl trace_hardirqs_off +2: lwz r5,24(r1) lwz r4,20(r1) lwz r3,16(r1) lwz r11,12(r1) @@ -250,7 +300,7 @@ reenable_mmu: /* re-enable mmu so we can */ lwz r6,GPR6(r1) lwz r7,GPR7(r1) lwz r8,GPR8(r1) -1: mtctr r11 + mtctr r11 mtlr r9 bctr /* jump to handler */ #else /* CONFIG_TRACE_IRQFLAGS */ @@ -312,31 +362,19 @@ _GLOBAL(DoSyscall) lwz r11,_CCR(r1) /* Clear SO bit in CR */ rlwinm r11,r11,0,4,2 stw r11,_CCR(r1) + #ifdef CONFIG_TRACE_IRQFLAGS - /* Return from syscalls can (and generally will) hard enable - * interrupts. You aren't supposed to call a syscall with - * interrupts disabled in the first place. However, to ensure - * that we get it right vs. lockdep if it happens, we force - * that hard enable here with appropriate tracing if we see - * that we have been called with interrupts off - */ + /* Make sure interrupts are enabled */ mfmsr r11 andi. r12,r11,MSR_EE bne+ 1f - /* We came in with interrupts disabled, we enable them now */ - bl trace_hardirqs_on - mfmsr r11 - lwz r0,GPR0(r1) - lwz r3,GPR3(r1) - lwz r4,GPR4(r1) - ori r11,r11,MSR_EE - lwz r5,GPR5(r1) - lwz r6,GPR6(r1) - lwz r7,GPR7(r1) - lwz r8,GPR8(r1) - mtmsr r11 + /* We came in with interrupts disabled, we WARN and mark them enabled + * for lockdep now */ +0: trap + EMIT_BUG_ENTRY 0b,__FILE__,__LINE__, BUGFLAG_WARNING 1: #endif /* CONFIG_TRACE_IRQFLAGS */ + CURRENT_THREAD_INFO(r10, r1) lwz r11,TI_FLAGS(r10) andi. r11,r11,_TIF_SYSCALL_DOTRACE @@ -375,8 +413,7 @@ syscall_exit_cont: lwz r8,_MSR(r1) #ifdef CONFIG_TRACE_IRQFLAGS /* If we are going to return from the syscall with interrupts - * off, we trace that here. It shouldn't happen though but we - * want to catch the bugger if it does right ? + * off, we trace that here. It shouldn't normally happen. */ andi. r10,r8,MSR_EE bne+ 1f @@ -881,13 +918,6 @@ END_MMU_FTR_SECTION_IFSET(MMU_FTR_TYPE_47x) * off in this assembly code while peeking at TI_FLAGS() and such. However * we need to inform it if the exception turned interrupts off, and we * are about to trun them back on. - * - * The problem here sadly is that we don't know whether the exceptions was - * one that turned interrupts off or not. So we always tell lockdep about - * turning them on here when we go back to wherever we came from with EE - * on, even if that may meen some redudant calls being tracked. Maybe later - * we could encode what the exception did somewhere or test the exception - * type in the pt_regs but that sounds overkill */ andi. r10,r9,MSR_EE beq 1f @@ -1175,9 +1205,10 @@ do_work: /* r10 contains MSR_KERNEL here */ beq do_user_signal do_resched: /* r10 contains MSR_KERNEL here */ - /* Note: We don't need to inform lockdep that we are enabling - * interrupts here. As far as it knows, they are already enabled - */ +#ifdef CONFIG_TRACE_IRQFLAGS + bl trace_hardirqs_on + mfmsr r10 +#endif ori r10,r10,MSR_EE SYNC MTMSRD(r10) /* hard-enable interrupts */ diff --git a/arch/powerpc/kernel/head_44x.S b/arch/powerpc/kernel/head_44x.S index 37e4a7c..891a048 100644 --- a/arch/powerpc/kernel/head_44x.S +++ b/arch/powerpc/kernel/head_44x.S @@ -40,6 +40,7 @@ #include <asm/ptrace.h> #include <asm/synch.h> #include <asm/export.h> + #include "head_booke.h" @@ -277,16 +278,16 @@ interrupt_base: FP_UNAVAILABLE_EXCEPTION #else EXCEPTION(0x2010, BOOKE_INTERRUPT_FP_UNAVAIL, \ - FloatingPointUnavailable, unknown_exception, EXC_XFER_EE) + FloatingPointUnavailable, unknown_exception, EXC_XFER_STD) #endif /* System Call Interrupt */ START_EXCEPTION(SystemCall) NORMAL_EXCEPTION_PROLOG(BOOKE_INTERRUPT_SYSCALL) - EXC_XFER_EE_LITE(0x0c00, DoSyscall) + EXC_XFER_SYS(0x0c00, DoSyscall) /* Auxiliary Processor Unavailable Interrupt */ EXCEPTION(0x2020, BOOKE_INTERRUPT_AP_UNAVAIL, \ - AuxillaryProcessorUnavailable, unknown_exception, EXC_XFER_EE) + AuxillaryProcessorUnavailable, unknown_exception, EXC_XFER_STD) /* Decrementer Interrupt */ DECREMENTER_EXCEPTION @@ -294,7 +295,7 @@ interrupt_base: /* Fixed Internal Timer Interrupt */ /* TODO: Add FIT support */ EXCEPTION(0x1010, BOOKE_INTERRUPT_FIT, FixedIntervalTimer, \ - unknown_exception, EXC_XFER_EE) + unknown_exception, EXC_XFER_STD) /* Watchdog Timer Interrupt */ /* TODO: Add watchdog support */ diff --git a/arch/powerpc/kernel/head_booke.h b/arch/powerpc/kernel/head_booke.h index a620203..46be533 100644 --- a/arch/powerpc/kernel/head_booke.h +++ b/arch/powerpc/kernel/head_booke.h @@ -210,8 +210,7 @@ CRITICAL_EXCEPTION_PROLOG(intno); \ addi r3,r1,STACK_FRAME_OVERHEAD; \ EXC_XFER_TEMPLATE(hdlr, n+2, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), \ - NOCOPY, crit_transfer_to_handler, \ - ret_from_crit_exc) + crit_transfer_to_handler, ret_from_crit_exc) #define MCHECK_EXCEPTION(n, label, hdlr) \ START_EXCEPTION(label); \ @@ -220,36 +219,27 @@ stw r5,_ESR(r11); \ addi r3,r1,STACK_FRAME_OVERHEAD; \ EXC_XFER_TEMPLATE(hdlr, n+4, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), \ - NOCOPY, mcheck_transfer_to_handler, \ - ret_from_mcheck_exc) + mcheck_transfer_to_handler, ret_from_mcheck_exc) -#define EXC_XFER_TEMPLATE(hdlr, trap, msr, copyee, tfer, ret) \ +#define EXC_XFER_TEMPLATE(hdlr, trap, msr, tfer, ret) \ li r10,trap; \ stw r10,_TRAP(r11); \ lis r10,msr@h; \ ori r10,r10,msr@l; \ - copyee(r10, r9); \ bl tfer; \ .long hdlr; \ .long ret -#define COPY_EE(d, s) rlwimi d,s,0,16,16 -#define NOCOPY(d, s) - #define EXC_XFER_STD(n, hdlr) \ - EXC_XFER_TEMPLATE(hdlr, n, MSR_KERNEL, NOCOPY, transfer_to_handler_full, \ + EXC_XFER_TEMPLATE(hdlr, n, MSR_KERNEL, transfer_to_handler_full, \ ret_from_except_full) -#define EXC_XFER_LITE(n, hdlr) \ - EXC_XFER_TEMPLATE(hdlr, n+1, MSR_KERNEL, NOCOPY, transfer_to_handler, \ +#define EXC_XFER_SYS(n, hdlr) \ + EXC_XFER_TEMPLATE(hdlr, n+1, MSR_KERNEL | MSR_EE, transfer_to_handler, \ ret_from_except) -#define EXC_XFER_EE(n, hdlr) \ - EXC_XFER_TEMPLATE(hdlr, n, MSR_KERNEL, COPY_EE, transfer_to_handler_full, \ - ret_from_except_full) - -#define EXC_XFER_EE_LITE(n, hdlr) \ - EXC_XFER_TEMPLATE(hdlr, n+1, MSR_KERNEL, COPY_EE, transfer_to_handler, \ +#define EXC_XFER_LITE(n, hdlr) \ + EXC_XFER_TEMPLATE(hdlr, n+1, MSR_KERNEL, transfer_to_handler, \ ret_from_except) /* Check for a single step debug exception while in an exception @@ -316,7 +306,7 @@ /* continue normal handling for a debug exception... */ \ 2: mfspr r4,SPRN_DBSR; \ addi r3,r1,STACK_FRAME_OVERHEAD; \ - EXC_XFER_TEMPLATE(DebugException, 0x2008, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), NOCOPY, debug_transfer_to_handler, ret_from_debug_exc) + EXC_XFER_TEMPLATE(DebugException, 0x2008, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), debug_transfer_to_handler, ret_from_debug_exc) #define DEBUG_CRIT_EXCEPTION \ START_EXCEPTION(DebugCrit); \ @@ -369,7 +359,7 @@ /* continue normal handling for a critical exception... */ \ 2: mfspr r4,SPRN_DBSR; \ addi r3,r1,STACK_FRAME_OVERHEAD; \ - EXC_XFER_TEMPLATE(DebugException, 0x2002, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), NOCOPY, crit_transfer_to_handler, ret_from_crit_exc) + EXC_XFER_TEMPLATE(DebugException, 0x2002, (MSR_KERNEL & ~(MSR_ME|MSR_DE|MSR_CE)), crit_transfer_to_handler, ret_from_crit_exc) #define DATA_STORAGE_EXCEPTION \ START_EXCEPTION(DataStorage) \ @@ -394,7 +384,7 @@ mfspr r4,SPRN_DEAR; /* Grab the DEAR and save it */ \ stw r4,_DEAR(r11); \ addi r3,r1,STACK_FRAME_OVERHEAD; \ - EXC_XFER_EE(0x0600, alignment_exception) + EXC_XFER_STD(0x0600, alignment_exception) #define PROGRAM_EXCEPTION \ START_EXCEPTION(Program) \ @@ -419,7 +409,7 @@ bl load_up_fpu; /* if from user, just load it up */ \ b fast_exception_return; \ 1: addi r3,r1,STACK_FRAME_OVERHEAD; \ - EXC_XFER_EE_LITE(0x800, kernel_fp_unavailable_exception) + EXC_XFER_STD(0x800, kernel_fp_unavailable_exception) #ifndef __ASSEMBLY__ struct exception_regs { diff --git a/arch/powerpc/kernel/head_fsl_booke.S b/arch/powerpc/kernel/head_fsl_booke.S index bf4c602..556cffb 100644 --- a/arch/powerpc/kernel/head_fsl_booke.S +++ b/arch/powerpc/kernel/head_fsl_booke.S @@ -385,7 +385,7 @@ interrupt_base: EXC_XFER_LITE(0x0300, handle_page_fault) 1: addi r3,r1,STACK_FRAME_OVERHEAD - EXC_XFER_EE_LITE(0x0300, CacheLockingException) + EXC_XFER_LITE(0x0300, CacheLockingException) /* Instruction Storage Interrupt */ INSTRUCTION_STORAGE_EXCEPTION @@ -406,21 +406,21 @@ interrupt_base: #ifdef CONFIG_E200 /* E200 treats 'normal' floating point instructions as FP Unavail exception */ EXCEPTION(0x0800, FP_UNAVAIL, FloatingPointUnavailable, \ - program_check_exception, EXC_XFER_EE) + program_check_exception, EXC_XFER_STD) #else EXCEPTION(0x0800, FP_UNAVAIL, FloatingPointUnavailable, \ - unknown_exception, EXC_XFER_EE) + unknown_exception, EXC_XFER_STD) #endif #endif /* System Call Interrupt */ START_EXCEPTION(SystemCall) NORMAL_EXCEPTION_PROLOG(SYSCALL) - EXC_XFER_EE_LITE(0x0c00, DoSyscall) + EXC_XFER_SYS(0x0c00, DoSyscall) /* Auxiliary Processor Unavailable Interrupt */ EXCEPTION(0x2900, AP_UNAVAIL, AuxillaryProcessorUnavailable, \ - unknown_exception, EXC_XFER_EE) + unknown_exception, EXC_XFER_STD) /* Decrementer Interrupt */ DECREMENTER_EXCEPTION @@ -428,7 +428,7 @@ interrupt_base: /* Fixed Internal Timer Interrupt */ /* TODO: Add FIT support */ EXCEPTION(0x3100, FIT, FixedIntervalTimer, \ - unknown_exception, EXC_XFER_EE) + unknown_exception, EXC_XFER_STD) /* Watchdog Timer Interrupt */ #ifdef CONFIG_BOOKE_WDT @@ -623,25 +623,25 @@ END_FTR_SECTION_IFSET(CPU_FTR_EMB_HV) bl load_up_spe b fast_exception_return 1: addi r3,r1,STACK_FRAME_OVERHEAD - EXC_XFER_EE_LITE(0x2010, KernelSPE) + EXC_XFER_LITE(0x2010, KernelSPE) #elif defined(CONFIG_SPE_POSSIBLE) EXCEPTION(0x2020, SPE_UNAVAIL, SPEUnavailable, \ - unknown_exception, EXC_XFER_EE) + unknown_exception, EXC_XFER_STD) #endif /* CONFIG_SPE_POSSIBLE */ /* SPE Floating Point Data */ #ifdef CONFIG_SPE EXCEPTION(0x2030, SPE_FP_DATA, SPEFloatingPointData, - SPEFloatingPointException, EXC_XFER_EE) + SPEFloatingPointException, EXC_XFER_STD) /* SPE Floating Point Round */ EXCEPTION(0x2050, SPE_FP_ROUND, SPEFloatingPointRound, \ - SPEFloatingPointRoundException, EXC_XFER_EE) + SPEFloatingPointRoundException, EXC_XFER_STD) #elif defined(CONFIG_SPE_POSSIBLE) EXCEPTION(0x2040, SPE_FP_DATA, SPEFloatingPointData, - unknown_exception, EXC_XFER_EE) + unknown_exception, EXC_XFER_STD) EXCEPTION(0x2050, SPE_FP_ROUND, SPEFloatingPointRound, \ - unknown_exception, EXC_XFER_EE) + unknown_exception, EXC_XFER_STD) #endif /* CONFIG_SPE_POSSIBLE */ @@ -664,10 +664,10 @@ END_FTR_SECTION_IFSET(CPU_FTR_EMB_HV) unknown_exception) /* Hypercall */ - EXCEPTION(0, HV_SYSCALL, Hypercall, unknown_exception, EXC_XFER_EE) + EXCEPTION(0, HV_SYSCALL, Hypercall, unknown_exception, EXC_XFER_STD) /* Embedded Hypervisor Privilege */ - EXCEPTION(0, HV_PRIV, Ehvpriv, unknown_exception, EXC_XFER_EE) + EXCEPTION(0, HV_PRIV, Ehvpriv, unknown_exception, EXC_XFER_STD) interrupt_end: diff --git a/arch/powerpc/kernel/traps.c b/arch/powerpc/kernel/traps.c index 023a462..5ee0b90 100644 --- a/arch/powerpc/kernel/traps.c +++ b/arch/powerpc/kernel/traps.c @@ -1858,6 +1858,10 @@ void SPEFloatingPointException(struct pt_regs *regs) int code = 0; int err; + /* We restore the interrupt state now */ + if (!arch_irq_disabled_regs(regs)) + local_irq_enable(); + flush_spe_to_thread(current); spefscr = current->thread.spefscr; @@ -1903,6 +1907,10 @@ void SPEFloatingPointRoundException(struct pt_regs *regs) extern int speround_handler(struct pt_regs *regs); int err; + /* We restore the interrupt state now */ + if (!arch_irq_disabled_regs(regs)) + local_irq_enable(); + preempt_disable(); if (regs->msr & MSR_SPE) giveup_spe(current);