* [PATCH v2] xen: fix alignment for bitops
@ 2014-04-16 7:55 Vladimir Murzin
2014-04-17 7:42 ` Vladimir Murzin
2014-04-17 10:22 ` David Vrabel
0 siblings, 2 replies; 9+ messages in thread
From: Vladimir Murzin @ 2014-04-16 7:55 UTC (permalink / raw)
To: xen-devel
Cc: Ian.Campbell, Vladimir Murzin, david.vrabel, JBeulich, boris.ostrovsky
Bitops operations like set/clear/change mandate world aligned pointer, mainly
because architectures specific implementation.
Looks that DEFINE_PER_CPU does required alignment for cpu_control_block;
however, local copy used for bitops might not be world aligned.
For arm64 it ends up with unaligned access trap:
Unhandled fault: alignment fault (0x96000021) at 0xffffffc01cf07d64
Internal error: : 96000021 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 PID: 563 Comm: udevd Not tainted 3.14.0+ #1
task: ffffffc01de95c40 ti: ffffffc01cf04000 task.ti: ffffffc01cf04000
PC is at clear_bit+0x14/0x30
LR is at evtchn_fifo_handle_events+0x168/0x184
pc : [<ffffffc00027b6c4>] lr : [<ffffffc0002b17d8>] pstate: 600001c5
sp : ffffffc01cf07d00
x29: ffffffc01cf07d00 x28: ffffffc01dce5000
x27: 0000000000000008 x26: 0000000000000002
x25: 00000000dffe0000 x24: 0000000000000000
x23: 0000000000000007 x22: ffffffc000660000
x21: ffffffc00060d900 x20: ffffffc01efdd900
x19: ffffffc01dc26000 x18: 0000007ff1d5a570
x17: 0000007faf848824 x16: 000000000044bf10
x15: 0000007faf8ed598 x14: ffffffffffffffff
x13: 0000000000000028 x12: 0101010101010101
x11: 7f7f7f7f7f7f7f7f x10: 622e607360632e75
x9 : 7f7f7f7f7f7f7f7f x8 : 000000001e9d0000
x7 : ffffffc01d800120 x6 : 00000000a0000000
x5 : 00000000a0000000 x4 : 0000000000000000
x3 : 0000000000000080 x2 : 0000000000000001
x1 : ffffffc01cf07d64 x0 : 0000000000000000
Process udevd (pid: 563, stack limit = 0xffffffc01cf04058)
Stack: (0xffffffc01cf07d00 to 0xffffffc01cf08000)
7d00: 1cf07d80 ffffffc0 002aeb7c ffffffc0 0060d6ec ffffffc0 1efe1c90 ffffffc0
7d20: 0056e418 ffffffc0 0066c000 ffffffc0 00000000 00000000 005659a0 ffffffc0
7d40: 00565998 ffffffc0 004053b0 00000000 00423bb0 00000000 00423000 00000000
7d60: a0000000 00000080 002aeb1c ffffffc0 00000000 00000000 002aeb4c ffffffc0
7d80: 1cf07dd0 ffffffc0 002aec2c ffffffc0 1dc09f00 ffffffc0 00630360 ffffffc0
7da0: 1dc23400 ffffffc0 00567c08 ffffffc0 0000001f 00000000 1efdc400 ffffffc0
7dc0: 000001ed 00000000 004053b0 00000000 1cf07de0 ffffffc0 00092eec ffffffc0
7de0: 1cf07df0 ffffffc0 000d79bc ffffffc0 1cf07e30 ffffffc0 000d3cf0 ffffffc0
7e00: 0000001f 00000000 0060d000 ffffffc0 00565000 ffffffc0 00565000 ffffffc0
7e20: 0000001f 00000000 00000000 00000000 1cf07e50 ffffffc0 000848bc ffffffc0
7e40: 0060d5a0 ffffffc0 000848a4 ffffffc0 1cf07ea0 ffffffc0 0008128c ffffffc0
7e60: 00667000 ffffffc0 0000400c ffffff80 1cf07ed0 ffffffc0 00004010 ffffff80
7e80: 80000000 00000000 2dca8010 00000000 1cf07ed0 ffffffc0 00000012 00000000
7ea0: f1d5b710 0000007f 000841bc ffffffc0 2dca8170 00000000 f1d5b870 0000007f
7ec0: ffffffff ffffffff af848838 0000007f 00000000 00000000 f1d5b7a0 0000007f
7ee0: f1d5b720 0000007f 00000000 00000000 61642f76 632f6174 2e353a34 00706d74
7f00: f1d5b7ae 0000007f 00000000 00000000 0000004f 00000000 7f7f7f7f 7f7f7f7f
7f20: 60632e75 622e6073 7f7f7f7f 7f7f7f7f 01010101 01010101 00000028 00000000
7f40: ffffffff ffffffff af8ed598 0000007f 0044bf10 00000000 af848824 0000007f
7f60: f1d5a570 0000007f 2dca8170 00000000 f1d5b870 0000007f 2dcc6ca0 00000000
7f80: f1d5bc70 0000007f 00000000 00000000 2dca8010 00000000 000001ed 00000000
7fa0: 004053b0 00000000 00423bb0 00000000 00423000 00000000 f1d5b710 0000007f
7fc0: 0041f460 00000000 f1d5b710 0000007f af848838 0000007f 80000000 00000000
7fe0: ffffff9c ffffffff ffffffff ffffffff dfdfdfcf cfdfdfdf dfdfdfcf cfdfdfdf
Call trace:
[<ffffffc00027b6c4>] clear_bit+0x14/0x30
[<ffffffc0002aeb78>] __xen_evtchn_do_upcall+0x9c/0x144
[<ffffffc0002aec28>] xen_hvm_evtchn_do_upcall+0x8/0x14
[<ffffffc000092ee8>] xen_arm_callback+0x8/0x18
[<ffffffc0000d79b8>] handle_percpu_devid_irq+0x90/0xb8
[<ffffffc0000d3cec>] generic_handle_irq+0x24/0x40
[<ffffffc0000848b8>] handle_IRQ+0x68/0xe0
[<ffffffc000081288>] gic_handle_irq+0x38/0x80
Exception stack(0xffffffc01cf07eb0 to 0xffffffc01cf07fd0)
7ea0: 2dca8170 00000000 f1d5b870 0000007f
7ec0: ffffffff ffffffff af848838 0000007f 00000000 00000000 f1d5b7a0 0000007f
7ee0: f1d5b720 0000007f 00000000 00000000 61642f76 632f6174 2e353a34 00706d74
7f00: f1d5b7ae 0000007f 00000000 00000000 0000004f 00000000 7f7f7f7f 7f7f7f7f
7f20: 60632e75 622e6073 7f7f7f7f 7f7f7f7f 01010101 01010101 00000028 00000000
7f40: ffffffff ffffffff af8ed598 0000007f 0044bf10 00000000 af848824 0000007f
7f60: f1d5a570 0000007f 2dca8170 00000000 f1d5b870 0000007f 2dcc6ca0 00000000
7f80: f1d5bc70 0000007f 00000000 00000000 2dca8010 00000000 000001ed 00000000
7fa0: 004053b0 00000000 00423bb0 00000000 00423000 00000000 f1d5b710 0000007f
7fc0: 0041f460 00000000 f1d5b710 0000007f
Code: 4a030000 d2800022 8b400c21 9ac32043 (c85f7c22)
Use unsigned long for "ready" to make sure it is world aligned.
Signed-off-by: Vladimir Murzin <murzin.v@gmail.com>
---
Changes:
v1->v2
use unsigned long instead of align attribute
drivers/xen/events/events_fifo.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/xen/events/events_fifo.c b/drivers/xen/events/events_fifo.c
index 96109a9..291c4a8 100644
--- a/drivers/xen/events/events_fifo.c
+++ b/drivers/xen/events/events_fifo.c
@@ -285,7 +285,7 @@ static void consume_one_event(unsigned cpu,
static void evtchn_fifo_handle_events(unsigned cpu)
{
struct evtchn_fifo_control_block *control_block;
- uint32_t ready;
+ unsigned long ready;
unsigned q;
control_block = per_cpu(cpu_control_block, cpu);
--
1.8.3.2
^ permalink raw reply related [flat|nested] 9+ messages in thread
* Re: [PATCH v2] xen: fix alignment for bitops
2014-04-16 7:55 [PATCH v2] xen: fix alignment for bitops Vladimir Murzin
@ 2014-04-17 7:42 ` Vladimir Murzin
2014-04-17 10:22 ` David Vrabel
1 sibling, 0 replies; 9+ messages in thread
From: Vladimir Murzin @ 2014-04-17 7:42 UTC (permalink / raw)
To: xen-devel
On Wed, Apr 16, 2014 at 8:55 AM, Vladimir Murzin <murzin.v@gmail.com> wrote:
> Bitops operations like set/clear/change mandate world aligned pointer, mainly
> because architectures specific implementation.
>
> Looks that DEFINE_PER_CPU does required alignment for cpu_control_block;
> however, local copy used for bitops might not be world aligned.
>
> For arm64 it ends up with unaligned access trap:
>
> Unhandled fault: alignment fault (0x96000021) at 0xffffffc01cf07d64
> Internal error: : 96000021 [#1] PREEMPT SMP
> Modules linked in:
> CPU: 0 PID: 563 Comm: udevd Not tainted 3.14.0+ #1
> task: ffffffc01de95c40 ti: ffffffc01cf04000 task.ti: ffffffc01cf04000
> PC is at clear_bit+0x14/0x30
> LR is at evtchn_fifo_handle_events+0x168/0x184
> pc : [<ffffffc00027b6c4>] lr : [<ffffffc0002b17d8>] pstate: 600001c5
> sp : ffffffc01cf07d00
> x29: ffffffc01cf07d00 x28: ffffffc01dce5000
> x27: 0000000000000008 x26: 0000000000000002
> x25: 00000000dffe0000 x24: 0000000000000000
> x23: 0000000000000007 x22: ffffffc000660000
> x21: ffffffc00060d900 x20: ffffffc01efdd900
> x19: ffffffc01dc26000 x18: 0000007ff1d5a570
> x17: 0000007faf848824 x16: 000000000044bf10
> x15: 0000007faf8ed598 x14: ffffffffffffffff
> x13: 0000000000000028 x12: 0101010101010101
> x11: 7f7f7f7f7f7f7f7f x10: 622e607360632e75
> x9 : 7f7f7f7f7f7f7f7f x8 : 000000001e9d0000
> x7 : ffffffc01d800120 x6 : 00000000a0000000
> x5 : 00000000a0000000 x4 : 0000000000000000
> x3 : 0000000000000080 x2 : 0000000000000001
> x1 : ffffffc01cf07d64 x0 : 0000000000000000
>
> Process udevd (pid: 563, stack limit = 0xffffffc01cf04058)
> Stack: (0xffffffc01cf07d00 to 0xffffffc01cf08000)
> 7d00: 1cf07d80 ffffffc0 002aeb7c ffffffc0 0060d6ec ffffffc0 1efe1c90 ffffffc0
> 7d20: 0056e418 ffffffc0 0066c000 ffffffc0 00000000 00000000 005659a0 ffffffc0
> 7d40: 00565998 ffffffc0 004053b0 00000000 00423bb0 00000000 00423000 00000000
> 7d60: a0000000 00000080 002aeb1c ffffffc0 00000000 00000000 002aeb4c ffffffc0
> 7d80: 1cf07dd0 ffffffc0 002aec2c ffffffc0 1dc09f00 ffffffc0 00630360 ffffffc0
> 7da0: 1dc23400 ffffffc0 00567c08 ffffffc0 0000001f 00000000 1efdc400 ffffffc0
> 7dc0: 000001ed 00000000 004053b0 00000000 1cf07de0 ffffffc0 00092eec ffffffc0
> 7de0: 1cf07df0 ffffffc0 000d79bc ffffffc0 1cf07e30 ffffffc0 000d3cf0 ffffffc0
> 7e00: 0000001f 00000000 0060d000 ffffffc0 00565000 ffffffc0 00565000 ffffffc0
> 7e20: 0000001f 00000000 00000000 00000000 1cf07e50 ffffffc0 000848bc ffffffc0
> 7e40: 0060d5a0 ffffffc0 000848a4 ffffffc0 1cf07ea0 ffffffc0 0008128c ffffffc0
> 7e60: 00667000 ffffffc0 0000400c ffffff80 1cf07ed0 ffffffc0 00004010 ffffff80
> 7e80: 80000000 00000000 2dca8010 00000000 1cf07ed0 ffffffc0 00000012 00000000
> 7ea0: f1d5b710 0000007f 000841bc ffffffc0 2dca8170 00000000 f1d5b870 0000007f
> 7ec0: ffffffff ffffffff af848838 0000007f 00000000 00000000 f1d5b7a0 0000007f
> 7ee0: f1d5b720 0000007f 00000000 00000000 61642f76 632f6174 2e353a34 00706d74
> 7f00: f1d5b7ae 0000007f 00000000 00000000 0000004f 00000000 7f7f7f7f 7f7f7f7f
> 7f20: 60632e75 622e6073 7f7f7f7f 7f7f7f7f 01010101 01010101 00000028 00000000
> 7f40: ffffffff ffffffff af8ed598 0000007f 0044bf10 00000000 af848824 0000007f
> 7f60: f1d5a570 0000007f 2dca8170 00000000 f1d5b870 0000007f 2dcc6ca0 00000000
> 7f80: f1d5bc70 0000007f 00000000 00000000 2dca8010 00000000 000001ed 00000000
> 7fa0: 004053b0 00000000 00423bb0 00000000 00423000 00000000 f1d5b710 0000007f
> 7fc0: 0041f460 00000000 f1d5b710 0000007f af848838 0000007f 80000000 00000000
> 7fe0: ffffff9c ffffffff ffffffff ffffffff dfdfdfcf cfdfdfdf dfdfdfcf cfdfdfdf
> Call trace:
> [<ffffffc00027b6c4>] clear_bit+0x14/0x30
> [<ffffffc0002aeb78>] __xen_evtchn_do_upcall+0x9c/0x144
> [<ffffffc0002aec28>] xen_hvm_evtchn_do_upcall+0x8/0x14
> [<ffffffc000092ee8>] xen_arm_callback+0x8/0x18
> [<ffffffc0000d79b8>] handle_percpu_devid_irq+0x90/0xb8
> [<ffffffc0000d3cec>] generic_handle_irq+0x24/0x40
> [<ffffffc0000848b8>] handle_IRQ+0x68/0xe0
> [<ffffffc000081288>] gic_handle_irq+0x38/0x80
> Exception stack(0xffffffc01cf07eb0 to 0xffffffc01cf07fd0)
> 7ea0: 2dca8170 00000000 f1d5b870 0000007f
> 7ec0: ffffffff ffffffff af848838 0000007f 00000000 00000000 f1d5b7a0 0000007f
> 7ee0: f1d5b720 0000007f 00000000 00000000 61642f76 632f6174 2e353a34 00706d74
> 7f00: f1d5b7ae 0000007f 00000000 00000000 0000004f 00000000 7f7f7f7f 7f7f7f7f
> 7f20: 60632e75 622e6073 7f7f7f7f 7f7f7f7f 01010101 01010101 00000028 00000000
> 7f40: ffffffff ffffffff af8ed598 0000007f 0044bf10 00000000 af848824 0000007f
> 7f60: f1d5a570 0000007f 2dca8170 00000000 f1d5b870 0000007f 2dcc6ca0 00000000
> 7f80: f1d5bc70 0000007f 00000000 00000000 2dca8010 00000000 000001ed 00000000
> 7fa0: 004053b0 00000000 00423bb0 00000000 00423000 00000000 f1d5b710 0000007f
> 7fc0: 0041f460 00000000 f1d5b710 0000007f
> Code: 4a030000 d2800022 8b400c21 9ac32043 (c85f7c22)
>
> Use unsigned long for "ready" to make sure it is world aligned.
>
> Signed-off-by: Vladimir Murzin <murzin.v@gmail.com>
> ---
> Changes:
> v1->v2
> use unsigned long instead of align attribute
>
> drivers/xen/events/events_fifo.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/drivers/xen/events/events_fifo.c b/drivers/xen/events/events_fifo.c
> index 96109a9..291c4a8 100644
> --- a/drivers/xen/events/events_fifo.c
> +++ b/drivers/xen/events/events_fifo.c
> @@ -285,7 +285,7 @@ static void consume_one_event(unsigned cpu,
> static void evtchn_fifo_handle_events(unsigned cpu)
> {
> struct evtchn_fifo_control_block *control_block;
> - uint32_t ready;
> + unsigned long ready;
> unsigned q;
>
> control_block = per_cpu(cpu_control_block, cpu);
> --
> 1.8.3.2
>
My bad :( It triggers a warning...
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCH v2] xen: fix alignment for bitops
2014-04-16 7:55 [PATCH v2] xen: fix alignment for bitops Vladimir Murzin
2014-04-17 7:42 ` Vladimir Murzin
@ 2014-04-17 10:22 ` David Vrabel
2014-04-21 10:28 ` Pranavkumar Sawargaonkar
2014-04-21 16:00 ` Vladimir Murzin
1 sibling, 2 replies; 9+ messages in thread
From: David Vrabel @ 2014-04-17 10:22 UTC (permalink / raw)
To: Vladimir Murzin
Cc: xen-devel, boris.ostrovsky, Ian.Campbell, JBeulich, david.vrabel
On 16/04/14 08:55, Vladimir Murzin wrote:
> Bitops operations like set/clear/change mandate world aligned pointer, mainly
> because architectures specific implementation.
>
> Looks that DEFINE_PER_CPU does required alignment for cpu_control_block;
> however, local copy used for bitops might not be world aligned.
>
> For arm64 it ends up with unaligned access trap...
Thanks. Does this version work for you?
David
8<----------------------
xen/events/fifo: fix alignment for bitops on local ready word
Bitops operations like set_bit(), clear_bit(), and test_bit() require
word aligned pointers, because of architectures specific
implementations.
Looks that DEFINE_PER_CPU does required alignment for
cpu_control_block; however, local copy of the ready word might not be
word aligned.
For arm64 it ends up with unaligned access trap at:
if (head == 0)
clear_bit(priority, BM(ready));
Use unsigned long for "ready" to make sure it is word aligned.
Signed-off-by: Vladimir Murzin <murzin.v@gmail.com>
Signed-off-by: David Vrabel <david.vrabel@citrix.com
---
drivers/xen/events/events_fifo.c | 6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/drivers/xen/events/events_fifo.c b/drivers/xen/events/events_fifo.c
index 96109a9..475d967 100644
--- a/drivers/xen/events/events_fifo.c
+++ b/drivers/xen/events/events_fifo.c
@@ -243,7 +243,7 @@ static void handle_irq_for_port(unsigned port)
static void consume_one_event(unsigned cpu,
struct evtchn_fifo_control_block *control_block,
- unsigned priority, uint32_t *ready)
+ unsigned priority, unsigned long *ready)
{
struct evtchn_fifo_queue *q = &per_cpu(cpu_queue, cpu);
uint32_t head;
@@ -273,7 +273,7 @@ static void consume_one_event(unsigned cpu,
* copy of the ready word.
*/
if (head == 0)
- clear_bit(priority, BM(ready));
+ clear_bit(priority, ready);
if (sync_test_bit(EVTCHN_FIFO_PENDING, BM(word))
&& !sync_test_bit(EVTCHN_FIFO_MASKED, BM(word)))
@@ -285,7 +285,7 @@ static void consume_one_event(unsigned cpu,
static void evtchn_fifo_handle_events(unsigned cpu)
{
struct evtchn_fifo_control_block *control_block;
- uint32_t ready;
+ unsigned long ready;
unsigned q;
control_block = per_cpu(cpu_control_block, cpu);
^ permalink raw reply related [flat|nested] 9+ messages in thread
* Re: [PATCH v2] xen: fix alignment for bitops
2014-04-17 10:22 ` David Vrabel
@ 2014-04-21 10:28 ` Pranavkumar Sawargaonkar
2014-04-21 16:27 ` Vladimir Murzin
2014-04-21 16:00 ` Vladimir Murzin
1 sibling, 1 reply; 9+ messages in thread
From: Pranavkumar Sawargaonkar @ 2014-04-21 10:28 UTC (permalink / raw)
To: David Vrabel
Cc: xen-devel, Vladimir Murzin, boris.ostrovsky, Jan Beulich, Ian Campbell
Hi Vladimir/David,
On 17 April 2014 15:52, David Vrabel <david.vrabel@citrix.com> wrote:
> On 16/04/14 08:55, Vladimir Murzin wrote:
>> Bitops operations like set/clear/change mandate world aligned pointer, mainly
>> because architectures specific implementation.
>>
>> Looks that DEFINE_PER_CPU does required alignment for cpu_control_block;
>> however, local copy used for bitops might not be world aligned.
>>
>> For arm64 it ends up with unaligned access trap...
>
> Thanks. Does this version work for you?
>
> David
>
> 8<----------------------
> xen/events/fifo: fix alignment for bitops on local ready word
>
> Bitops operations like set_bit(), clear_bit(), and test_bit() require
> word aligned pointers, because of architectures specific
> implementations.
>
> Looks that DEFINE_PER_CPU does required alignment for
> cpu_control_block; however, local copy of the ready word might not be
> word aligned.
>
> For arm64 it ends up with unaligned access trap at:
>
> if (head == 0)
> clear_bit(priority, BM(ready));
>
> Use unsigned long for "ready" to make sure it is word aligned.
>
> Signed-off-by: Vladimir Murzin <murzin.v@gmail.com>
> Signed-off-by: David Vrabel <david.vrabel@citrix.com
> ---
> drivers/xen/events/events_fifo.c | 6 +++---
> 1 files changed, 3 insertions(+), 3 deletions(-)
>
> diff --git a/drivers/xen/events/events_fifo.c b/drivers/xen/events/events_fifo.c
> index 96109a9..475d967 100644
> --- a/drivers/xen/events/events_fifo.c
> +++ b/drivers/xen/events/events_fifo.c
> @@ -243,7 +243,7 @@ static void handle_irq_for_port(unsigned port)
>
> static void consume_one_event(unsigned cpu,
> struct evtchn_fifo_control_block *control_block,
> - unsigned priority, uint32_t *ready)
> + unsigned priority, unsigned long *ready)
> {
> struct evtchn_fifo_queue *q = &per_cpu(cpu_queue, cpu);
> uint32_t head;
> @@ -273,7 +273,7 @@ static void consume_one_event(unsigned cpu,
> * copy of the ready word.
> */
> if (head == 0)
> - clear_bit(priority, BM(ready));
> + clear_bit(priority, ready);
>
> if (sync_test_bit(EVTCHN_FIFO_PENDING, BM(word))
> && !sync_test_bit(EVTCHN_FIFO_MASKED, BM(word)))
> @@ -285,7 +285,7 @@ static void consume_one_event(unsigned cpu,
> static void evtchn_fifo_handle_events(unsigned cpu)
> {
> struct evtchn_fifo_control_block *control_block;
> - uint32_t ready;
> + unsigned long ready;
> unsigned q;
>
> control_block = per_cpu(cpu_control_block, cpu);
>
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@lists.xen.org
> http://lists.xen.org/xen-devel
I have tried this fix on APM X-Gene and it is solving a crash (you
have reported) during booting of DOM0.
But while trying out domU when I tried to execute
"/etc/init.d/xencommons start || true"
I am observing a similar "alignment fault" crash while performing
"clear_bit" in " evtchn_fifo_clear_pending"
Pasting a crash log:
root@arm64:~/xen-images# /etc/init.d/xencommons start || true
Starting C xenstored....
Unhandled fault: alignment fault (0x96000021) at 0xffffffc0fae7700c
Internal error: : 96000021 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 PID: 0 Comm: swapper/0 Not tainted 3.15.0-rc1-next-20140417+ #5
task: ffffffc0007188b0 ti: ffffffc00070c000 task.ti: ffffffc00070c000
PC is at clear_bit+0x14/0x30
LR is at evtchn_fifo_clear_pending+0x28/0x30
pc : [<ffffffc000289304>] lr : [<ffffffc0002d9f60>] pstate: 600001c5
sp : ffffffc00070fbb0
x29: ffffffc00070fbb0 x28: ffffffc0fae77000
x27: 000000000000000c x26: 0000000000000003
x25: 00000000dffe0000 x24: 0000000000000000
x23: 0000000000000007 x22: ffffffc000768000
x21: ffffffc0f94a0884 x20: ffffffc000645b80
x19: ffffffc0f94a0800 x18: 0000007f863063e0
x17: 0000007f875d0280 x16: ffffffc0000f93ec
x15: 001b92d7f76c3f7d x14: 0000000000000000
x13: 00000003e8000000 x12: 0000000000000018
x11: 0000000000000000 x10: 0000000000000400
x9 : ffffffc00070fd20 x8 : 00000000fe871000
x7 : ffffffc0fa800038 x6 : ffffffc0fa800000
x5 : 00000000fffffffa x4 : 0000000000000000
x3 : 0000000080000000 x2 : 0000000000000001
x1 : ffffffc0fae7700c x0 : 0000000000000000
Process swapper/0 (pid: 0, stack limit = 0xffffffc00070c058)
Stack: (0xffffffc00070fbb0 to 0xffffffc000710000)
fba0: 0070fbc0 ffffffc0 002d7f84 ffffffc0
fbc0: 0070fbd0 ffffffc0 000e44f0 ffffffc0 0070fc00 ffffffc0 000e13e8 ffffffc0
fbe0: 00000002 00000000 fef7a900 ffffffc0 00709900 ffffffc0 000e13d4 ffffffc0
fc00: 0070fc20 ffffffc0 002da0ec ffffffc0 fac39000 ffffffc0 000d1e80 ffffffc0
fc20: 0070fca0 ffffffc0 002d74c4 ffffffc0 007096ec ffffffc0 fef7ef10 ffffffc0
fc40: 0064d878 ffffffc0 00775000 ffffffc0 00000000 00000000 00642500 ffffffc0
fc60: 006424f8 ffffffc0 00648318 ffffffc0 0070c000 ffffffc0 00000000 00000081
fc80: 00000000 00000000 a0000000 ffffffc0 00000000 00000000 002d7494 ffffffc0
fca0: 0070fcf0 ffffffc0 002d7574 ffffffc0 fac0c800 ffffffc0 0072cae0 ffffffc0
fcc0: fac26500 ffffffc0 00645b80 ffffffc0 00000018 00000000 fef79410 ffffffc0
fce0: 00000001 00000000 00648318 ffffffc0 0070fd00 ffffffc0 000a06a8 ffffffc0
fd00: 0070fd10 ffffffc0 000e50b0 ffffffc0 0070fd50 ffffffc0 000e13e8 ffffffc0
fd20: 00000018 00000000 00709000 ffffffc0 00642000 ffffffc0 00642000 ffffffc0
fd40: 00000018 00000000 00000000 00000000 0070fd70 ffffffc0 000848bc ffffffc0
fd60: 007095b0 ffffffc0 000848a4 ffffffc0 0070fdc0 ffffffc0 0008128c ffffffc0
fd80: 0076f000 ffffffc0 0000400c ffffff80 0070fdf0 ffffffc0 00004010 ffffff80
fda0: 60000145 00000000 00759cac ffffffc0 0070fdf0 ffffffc0 0070fdf0 ffffffc0
fdc0: 0070ff10 ffffffc0 00083dac ffffffc0 0070c000 ffffffc0 0070c000 ffffffc0
fde0: 0070ff10 ffffffc0 00084ef0 ffffffc0 00000000 00000000 00653708 ffffffc0
fe00: 00653708 ffffffc0 00000001 00000000 00000018 00000000 00000000 00000000
fe20: 00000001 00000000 00000400 00000000 00718db0 ffffffc0 0070fd20 ffffffc0
fe40: 00000400 00000000 00000000 00000000 00000018 00000000 e8000000 00000003
fe60: 00000000 00000000 f76c3f7d 001b92d7 000f93ec ffffffc0 875d0280 0000007f
fe80: 863063e0 0000007f 0070c000 ffffffc0 0070c000 ffffffc0 00761200 ffffffc0
fea0: 0051e000 ffffffc0 006424f8 ffffffc0 00759cac ffffffc0 00000001 00000000
fec0: 00648318 ffffffc0 0070c000 ffffffc0 00000000 00000081 0070ff10 ffffffc0
fee0: 00084eec ffffffc0 0070ff10 ffffffc0 00084ef0 ffffffc0 60000145 00000000
ff00: 0070c000 ffffffc0 0070c000 ffffffc0 0070ff20 ffffffc0 000d944c ffffffc0
ff20: 0070ff80 ffffffc0 00508944 ffffffc0 00768000 ffffffc0 0075b000 ffffffc0
ff40: 006fb9a0 ffffffc0 0075b000 ffffffc0 feffde40 ffffffc0 00000000 00000041
ff60: 0007b000 00000041 0007d000 00000041 00080450 ffffffc0 0050893c ffffffc0
ff80: 0070ffa0 ffffffc0 006d68a0 ffffffc0 00000002 00000000 0075b000 ffffffc0
ffa0: 00000000 00000000 00080210 00000041 00000000 00000000 00000e11 00000000
ffc0: 08000000 00000041 500f0000 00000000 0071a000 00000041 00000000 00000000
ffe0: 006fb9a0 ffffffc0 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
[<ffffffc000289304>] clear_bit+0x14/0x30
[<ffffffc0002d7f80>] ack_dynirq+0x20/0x2c
[<ffffffc0000e44ec>] handle_edge_irq+0x94/0x18c
[<ffffffc0000e13e4>] generic_handle_irq+0x24/0x40
[<ffffffc0002da0e8>] evtchn_fifo_handle_events+0x180/0x188
[<ffffffc0002d74c0>] __xen_evtchn_do_upcall+0x9c/0x144
[<ffffffc0002d7570>] xen_hvm_evtchn_do_upcall+0x8/0x14
[<ffffffc0000a06a4>] xen_arm_callback+0x8/0x18
[<ffffffc0000e50ac>] handle_percpu_devid_irq+0x90/0xb8
[<ffffffc0000e13e4>] generic_handle_irq+0x24/0x40
[<ffffffc0000848b8>] handle_IRQ+0x68/0xe0
[<ffffffc000081288>] gic_handle_irq+0x38/0x80
Exception stack(0xffffffc00070fdd0 to 0xffffffc00070fef0)
fdc0: 0070c000 ffffffc0 0070c000 ffffffc0
fde0: 0070ff10 ffffffc0 00084ef0 ffffffc0 00000000 00000000 00653708 ffffffc0
fe00: 00653708 ffffffc0 00000001 00000000 00000018 00000000 00000000 00000000
fe20: 00000001 00000000 00000400 00000000 00718db0 ffffffc0 0070fd20 ffffffc0
fe40: 00000400 00000000 00000000 00000000 00000018 00000000 e8000000 00000003
fe60: 00000000 00000000 f76c3f7d 001b92d7 000f93ec ffffffc0 875d0280 0000007f
fe80: 863063e0 0000007f 0070c000 ffffffc0 0070c000 ffffffc0 00761200 ffffffc0
fea0: 0051e000 ffffffc0 006424f8 ffffffc0 00759cac ffffffc0 00000001 00000000
fec0: 00648318 ffffffc0 0070c000 ffffffc0 00000000 00000081 0070ff10 ffffffc0
fee0: 00084eec ffffffc0 0070ff10 ffffffc0
[<ffffffc000083da8>] el1_irq+0x68/0xd8
[<ffffffc0000d9448>] cpu_startup_entry+0x114/0x174
[<ffffffc000508940>] rest_init+0x7c/0x88
[<ffffffc0006d689c>] start_kernel+0x350/0x368
Code: 4a030000 d2800022 8b400c21 9ac32043 (c85f7c22)
Thanks,
Pranav
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCH v2] xen: fix alignment for bitops
2014-04-17 10:22 ` David Vrabel
2014-04-21 10:28 ` Pranavkumar Sawargaonkar
@ 2014-04-21 16:00 ` Vladimir Murzin
1 sibling, 0 replies; 9+ messages in thread
From: Vladimir Murzin @ 2014-04-21 16:00 UTC (permalink / raw)
To: David Vrabel; +Cc: xen-devel, boris.ostrovsky, Ian Campbell, Jan Beulich
On Thu, Apr 17, 2014 at 11:22 AM, David Vrabel <david.vrabel@citrix.com> wrote:
> On 16/04/14 08:55, Vladimir Murzin wrote:
>> Bitops operations like set/clear/change mandate world aligned pointer, mainly
>> because architectures specific implementation.
>>
>> Looks that DEFINE_PER_CPU does required alignment for cpu_control_block;
>> however, local copy used for bitops might not be world aligned.
>>
>> For arm64 it ends up with unaligned access trap...
>
> Thanks. Does this version work for you?
>
> David
>
> 8<----------------------
> xen/events/fifo: fix alignment for bitops on local ready word
>
> Bitops operations like set_bit(), clear_bit(), and test_bit() require
> word aligned pointers, because of architectures specific
> implementations.
>
> Looks that DEFINE_PER_CPU does required alignment for
> cpu_control_block; however, local copy of the ready word might not be
> word aligned.
>
> For arm64 it ends up with unaligned access trap at:
>
> if (head == 0)
> clear_bit(priority, BM(ready));
>
> Use unsigned long for "ready" to make sure it is word aligned.
>
> Signed-off-by: Vladimir Murzin <murzin.v@gmail.com>
> Signed-off-by: David Vrabel <david.vrabel@citrix.com
> ---
> drivers/xen/events/events_fifo.c | 6 +++---
> 1 files changed, 3 insertions(+), 3 deletions(-)
>
> diff --git a/drivers/xen/events/events_fifo.c b/drivers/xen/events/events_fifo.c
> index 96109a9..475d967 100644
> --- a/drivers/xen/events/events_fifo.c
> +++ b/drivers/xen/events/events_fifo.c
> @@ -243,7 +243,7 @@ static void handle_irq_for_port(unsigned port)
>
> static void consume_one_event(unsigned cpu,
> struct evtchn_fifo_control_block *control_block,
> - unsigned priority, uint32_t *ready)
> + unsigned priority, unsigned long *ready)
> {
> struct evtchn_fifo_queue *q = &per_cpu(cpu_queue, cpu);
> uint32_t head;
> @@ -273,7 +273,7 @@ static void consume_one_event(unsigned cpu,
> * copy of the ready word.
> */
> if (head == 0)
> - clear_bit(priority, BM(ready));
> + clear_bit(priority, ready);
>
> if (sync_test_bit(EVTCHN_FIFO_PENDING, BM(word))
> && !sync_test_bit(EVTCHN_FIFO_MASKED, BM(word)))
> @@ -285,7 +285,7 @@ static void consume_one_event(unsigned cpu,
> static void evtchn_fifo_handle_events(unsigned cpu)
> {
> struct evtchn_fifo_control_block *control_block;
> - uint32_t ready;
> + unsigned long ready;
> unsigned q;
>
> control_block = per_cpu(cpu_control_block, cpu);
Yes. It fixes warning and I'm able to boot Dom0.
Vladimir
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCH v2] xen: fix alignment for bitops
2014-04-21 10:28 ` Pranavkumar Sawargaonkar
@ 2014-04-21 16:27 ` Vladimir Murzin
2014-04-24 7:38 ` Vladimir Murzin
0 siblings, 1 reply; 9+ messages in thread
From: Vladimir Murzin @ 2014-04-21 16:27 UTC (permalink / raw)
To: Pranavkumar Sawargaonkar
Cc: xen-devel, boris.ostrovsky, David Vrabel, Jan Beulich, Ian Campbell
On Mon, Apr 21, 2014 at 11:28 AM, Pranavkumar Sawargaonkar
<pranavkumar@linaro.org> wrote:
> Hi Vladimir/David,
>
> On 17 April 2014 15:52, David Vrabel <david.vrabel@citrix.com> wrote:
>> On 16/04/14 08:55, Vladimir Murzin wrote:
>>> Bitops operations like set/clear/change mandate world aligned pointer, mainly
>>> because architectures specific implementation.
>>>
>>> Looks that DEFINE_PER_CPU does required alignment for cpu_control_block;
>>> however, local copy used for bitops might not be world aligned.
>>>
>>> For arm64 it ends up with unaligned access trap...
>>
>> Thanks. Does this version work for you?
>>
>> David
>>
>> 8<----------------------
>> xen/events/fifo: fix alignment for bitops on local ready word
>>
>> Bitops operations like set_bit(), clear_bit(), and test_bit() require
>> word aligned pointers, because of architectures specific
>> implementations.
>>
>> Looks that DEFINE_PER_CPU does required alignment for
>> cpu_control_block; however, local copy of the ready word might not be
>> word aligned.
>>
>> For arm64 it ends up with unaligned access trap at:
>>
>> if (head == 0)
>> clear_bit(priority, BM(ready));
>>
>> Use unsigned long for "ready" to make sure it is word aligned.
>>
>> Signed-off-by: Vladimir Murzin <murzin.v@gmail.com>
>> Signed-off-by: David Vrabel <david.vrabel@citrix.com
>> ---
>> drivers/xen/events/events_fifo.c | 6 +++---
>> 1 files changed, 3 insertions(+), 3 deletions(-)
>>
>> diff --git a/drivers/xen/events/events_fifo.c b/drivers/xen/events/events_fifo.c
>> index 96109a9..475d967 100644
>> --- a/drivers/xen/events/events_fifo.c
>> +++ b/drivers/xen/events/events_fifo.c
>> @@ -243,7 +243,7 @@ static void handle_irq_for_port(unsigned port)
>>
>> static void consume_one_event(unsigned cpu,
>> struct evtchn_fifo_control_block *control_block,
>> - unsigned priority, uint32_t *ready)
>> + unsigned priority, unsigned long *ready)
>> {
>> struct evtchn_fifo_queue *q = &per_cpu(cpu_queue, cpu);
>> uint32_t head;
>> @@ -273,7 +273,7 @@ static void consume_one_event(unsigned cpu,
>> * copy of the ready word.
>> */
>> if (head == 0)
>> - clear_bit(priority, BM(ready));
>> + clear_bit(priority, ready);
>>
>> if (sync_test_bit(EVTCHN_FIFO_PENDING, BM(word))
>> && !sync_test_bit(EVTCHN_FIFO_MASKED, BM(word)))
>> @@ -285,7 +285,7 @@ static void consume_one_event(unsigned cpu,
>> static void evtchn_fifo_handle_events(unsigned cpu)
>> {
>> struct evtchn_fifo_control_block *control_block;
>> - uint32_t ready;
>> + unsigned long ready;
>> unsigned q;
>>
>> control_block = per_cpu(cpu_control_block, cpu);
>>
>> _______________________________________________
>> Xen-devel mailing list
>> Xen-devel@lists.xen.org
>> http://lists.xen.org/xen-devel
>
> I have tried this fix on APM X-Gene and it is solving a crash (you
> have reported) during booting of DOM0.
>
> But while trying out domU when I tried to execute
> "/etc/init.d/xencommons start || true"
> I am observing a similar "alignment fault" crash while performing
> "clear_bit" in " evtchn_fifo_clear_pending"
> Pasting a crash log:
>
> root@arm64:~/xen-images# /etc/init.d/xencommons start || true
> Starting C xenstored....
> Unhandled fault: alignment fault (0x96000021) at 0xffffffc0fae7700c
> Internal error: : 96000021 [#1] PREEMPT SMP
> Modules linked in:
> CPU: 0 PID: 0 Comm: swapper/0 Not tainted 3.15.0-rc1-next-20140417+ #5
> task: ffffffc0007188b0 ti: ffffffc00070c000 task.ti: ffffffc00070c000
> PC is at clear_bit+0x14/0x30
> LR is at evtchn_fifo_clear_pending+0x28/0x30
> pc : [<ffffffc000289304>] lr : [<ffffffc0002d9f60>] pstate: 600001c5
> sp : ffffffc00070fbb0
> x29: ffffffc00070fbb0 x28: ffffffc0fae77000
> x27: 000000000000000c x26: 0000000000000003
> x25: 00000000dffe0000 x24: 0000000000000000
> x23: 0000000000000007 x22: ffffffc000768000
> x21: ffffffc0f94a0884 x20: ffffffc000645b80
> x19: ffffffc0f94a0800 x18: 0000007f863063e0
> x17: 0000007f875d0280 x16: ffffffc0000f93ec
> x15: 001b92d7f76c3f7d x14: 0000000000000000
> x13: 00000003e8000000 x12: 0000000000000018
> x11: 0000000000000000 x10: 0000000000000400
> x9 : ffffffc00070fd20 x8 : 00000000fe871000
> x7 : ffffffc0fa800038 x6 : ffffffc0fa800000
> x5 : 00000000fffffffa x4 : 0000000000000000
> x3 : 0000000080000000 x2 : 0000000000000001
> x1 : ffffffc0fae7700c x0 : 0000000000000000
>
> Process swapper/0 (pid: 0, stack limit = 0xffffffc00070c058)
> Stack: (0xffffffc00070fbb0 to 0xffffffc000710000)
> fba0: 0070fbc0 ffffffc0 002d7f84 ffffffc0
> fbc0: 0070fbd0 ffffffc0 000e44f0 ffffffc0 0070fc00 ffffffc0 000e13e8 ffffffc0
> fbe0: 00000002 00000000 fef7a900 ffffffc0 00709900 ffffffc0 000e13d4 ffffffc0
> fc00: 0070fc20 ffffffc0 002da0ec ffffffc0 fac39000 ffffffc0 000d1e80 ffffffc0
> fc20: 0070fca0 ffffffc0 002d74c4 ffffffc0 007096ec ffffffc0 fef7ef10 ffffffc0
> fc40: 0064d878 ffffffc0 00775000 ffffffc0 00000000 00000000 00642500 ffffffc0
> fc60: 006424f8 ffffffc0 00648318 ffffffc0 0070c000 ffffffc0 00000000 00000081
> fc80: 00000000 00000000 a0000000 ffffffc0 00000000 00000000 002d7494 ffffffc0
> fca0: 0070fcf0 ffffffc0 002d7574 ffffffc0 fac0c800 ffffffc0 0072cae0 ffffffc0
> fcc0: fac26500 ffffffc0 00645b80 ffffffc0 00000018 00000000 fef79410 ffffffc0
> fce0: 00000001 00000000 00648318 ffffffc0 0070fd00 ffffffc0 000a06a8 ffffffc0
> fd00: 0070fd10 ffffffc0 000e50b0 ffffffc0 0070fd50 ffffffc0 000e13e8 ffffffc0
> fd20: 00000018 00000000 00709000 ffffffc0 00642000 ffffffc0 00642000 ffffffc0
> fd40: 00000018 00000000 00000000 00000000 0070fd70 ffffffc0 000848bc ffffffc0
> fd60: 007095b0 ffffffc0 000848a4 ffffffc0 0070fdc0 ffffffc0 0008128c ffffffc0
> fd80: 0076f000 ffffffc0 0000400c ffffff80 0070fdf0 ffffffc0 00004010 ffffff80
> fda0: 60000145 00000000 00759cac ffffffc0 0070fdf0 ffffffc0 0070fdf0 ffffffc0
> fdc0: 0070ff10 ffffffc0 00083dac ffffffc0 0070c000 ffffffc0 0070c000 ffffffc0
> fde0: 0070ff10 ffffffc0 00084ef0 ffffffc0 00000000 00000000 00653708 ffffffc0
> fe00: 00653708 ffffffc0 00000001 00000000 00000018 00000000 00000000 00000000
> fe20: 00000001 00000000 00000400 00000000 00718db0 ffffffc0 0070fd20 ffffffc0
> fe40: 00000400 00000000 00000000 00000000 00000018 00000000 e8000000 00000003
> fe60: 00000000 00000000 f76c3f7d 001b92d7 000f93ec ffffffc0 875d0280 0000007f
> fe80: 863063e0 0000007f 0070c000 ffffffc0 0070c000 ffffffc0 00761200 ffffffc0
> fea0: 0051e000 ffffffc0 006424f8 ffffffc0 00759cac ffffffc0 00000001 00000000
> fec0: 00648318 ffffffc0 0070c000 ffffffc0 00000000 00000081 0070ff10 ffffffc0
> fee0: 00084eec ffffffc0 0070ff10 ffffffc0 00084ef0 ffffffc0 60000145 00000000
> ff00: 0070c000 ffffffc0 0070c000 ffffffc0 0070ff20 ffffffc0 000d944c ffffffc0
> ff20: 0070ff80 ffffffc0 00508944 ffffffc0 00768000 ffffffc0 0075b000 ffffffc0
> ff40: 006fb9a0 ffffffc0 0075b000 ffffffc0 feffde40 ffffffc0 00000000 00000041
> ff60: 0007b000 00000041 0007d000 00000041 00080450 ffffffc0 0050893c ffffffc0
> ff80: 0070ffa0 ffffffc0 006d68a0 ffffffc0 00000002 00000000 0075b000 ffffffc0
> ffa0: 00000000 00000000 00080210 00000041 00000000 00000000 00000e11 00000000
> ffc0: 08000000 00000041 500f0000 00000000 0071a000 00000041 00000000 00000000
> ffe0: 006fb9a0 ffffffc0 00000000 00000000 00000000 00000000 00000000 00000000
> Call trace:
> [<ffffffc000289304>] clear_bit+0x14/0x30
> [<ffffffc0002d7f80>] ack_dynirq+0x20/0x2c
> [<ffffffc0000e44ec>] handle_edge_irq+0x94/0x18c
> [<ffffffc0000e13e4>] generic_handle_irq+0x24/0x40
> [<ffffffc0002da0e8>] evtchn_fifo_handle_events+0x180/0x188
> [<ffffffc0002d74c0>] __xen_evtchn_do_upcall+0x9c/0x144
> [<ffffffc0002d7570>] xen_hvm_evtchn_do_upcall+0x8/0x14
> [<ffffffc0000a06a4>] xen_arm_callback+0x8/0x18
> [<ffffffc0000e50ac>] handle_percpu_devid_irq+0x90/0xb8
> [<ffffffc0000e13e4>] generic_handle_irq+0x24/0x40
> [<ffffffc0000848b8>] handle_IRQ+0x68/0xe0
> [<ffffffc000081288>] gic_handle_irq+0x38/0x80
> Exception stack(0xffffffc00070fdd0 to 0xffffffc00070fef0)
> fdc0: 0070c000 ffffffc0 0070c000 ffffffc0
> fde0: 0070ff10 ffffffc0 00084ef0 ffffffc0 00000000 00000000 00653708 ffffffc0
> fe00: 00653708 ffffffc0 00000001 00000000 00000018 00000000 00000000 00000000
> fe20: 00000001 00000000 00000400 00000000 00718db0 ffffffc0 0070fd20 ffffffc0
> fe40: 00000400 00000000 00000000 00000000 00000018 00000000 e8000000 00000003
> fe60: 00000000 00000000 f76c3f7d 001b92d7 000f93ec ffffffc0 875d0280 0000007f
> fe80: 863063e0 0000007f 0070c000 ffffffc0 0070c000 ffffffc0 00761200 ffffffc0
> fea0: 0051e000 ffffffc0 006424f8 ffffffc0 00759cac ffffffc0 00000001 00000000
> fec0: 00648318 ffffffc0 0070c000 ffffffc0 00000000 00000081 0070ff10 ffffffc0
> fee0: 00084eec ffffffc0 0070ff10 ffffffc0
> [<ffffffc000083da8>] el1_irq+0x68/0xd8
> [<ffffffc0000d9448>] cpu_startup_entry+0x114/0x174
> [<ffffffc000508940>] rest_init+0x7c/0x88
> [<ffffffc0006d689c>] start_kernel+0x350/0x368
> Code: 4a030000 d2800022 8b400c21 9ac32043 (c85f7c22)
>
>
> Thanks,
> Pranav
HI Pranav
I've just come back form holidays. The last time I tried run DomU
there was Xen crush with syndrome 0x21 - looks like alignment trap
again ;) Unfortunately, had no chance to play with it yet :(
Probably, I could post *untested* patch which makes arm64 bitops
"friendly" to 32-bit... still awaiting response form arm64 about the
best way to deal with it ;)
Vladimir
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCH v2] xen: fix alignment for bitops
2014-04-21 16:27 ` Vladimir Murzin
@ 2014-04-24 7:38 ` Vladimir Murzin
2014-04-25 5:46 ` Pranavkumar Sawargaonkar
0 siblings, 1 reply; 9+ messages in thread
From: Vladimir Murzin @ 2014-04-24 7:38 UTC (permalink / raw)
To: Pranavkumar Sawargaonkar
Cc: xen-devel, boris.ostrovsky, David Vrabel, Jan Beulich, Ian Campbell
On Mon, Apr 21, 2014 at 5:27 PM, Vladimir Murzin <murzin.v@gmail.com> wrote:
> On Mon, Apr 21, 2014 at 11:28 AM, Pranavkumar Sawargaonkar
> <pranavkumar@linaro.org> wrote:
>> Hi Vladimir/David,
>>
>> On 17 April 2014 15:52, David Vrabel <david.vrabel@citrix.com> wrote:
>>> On 16/04/14 08:55, Vladimir Murzin wrote:
>>>> Bitops operations like set/clear/change mandate world aligned pointer, mainly
>>>> because architectures specific implementation.
>>>>
>>>> Looks that DEFINE_PER_CPU does required alignment for cpu_control_block;
>>>> however, local copy used for bitops might not be world aligned.
>>>>
>>>> For arm64 it ends up with unaligned access trap...
>>>
>>> Thanks. Does this version work for you?
>>>
>>> David
>>>
>>> 8<----------------------
>>> xen/events/fifo: fix alignment for bitops on local ready word
>>>
>>> Bitops operations like set_bit(), clear_bit(), and test_bit() require
>>> word aligned pointers, because of architectures specific
>>> implementations.
>>>
>>> Looks that DEFINE_PER_CPU does required alignment for
>>> cpu_control_block; however, local copy of the ready word might not be
>>> word aligned.
>>>
>>> For arm64 it ends up with unaligned access trap at:
>>>
>>> if (head == 0)
>>> clear_bit(priority, BM(ready));
>>>
>>> Use unsigned long for "ready" to make sure it is word aligned.
>>>
>>> Signed-off-by: Vladimir Murzin <murzin.v@gmail.com>
>>> Signed-off-by: David Vrabel <david.vrabel@citrix.com
>>> ---
>>> drivers/xen/events/events_fifo.c | 6 +++---
>>> 1 files changed, 3 insertions(+), 3 deletions(-)
>>>
>>> diff --git a/drivers/xen/events/events_fifo.c b/drivers/xen/events/events_fifo.c
>>> index 96109a9..475d967 100644
>>> --- a/drivers/xen/events/events_fifo.c
>>> +++ b/drivers/xen/events/events_fifo.c
>>> @@ -243,7 +243,7 @@ static void handle_irq_for_port(unsigned port)
>>>
>>> static void consume_one_event(unsigned cpu,
>>> struct evtchn_fifo_control_block *control_block,
>>> - unsigned priority, uint32_t *ready)
>>> + unsigned priority, unsigned long *ready)
>>> {
>>> struct evtchn_fifo_queue *q = &per_cpu(cpu_queue, cpu);
>>> uint32_t head;
>>> @@ -273,7 +273,7 @@ static void consume_one_event(unsigned cpu,
>>> * copy of the ready word.
>>> */
>>> if (head == 0)
>>> - clear_bit(priority, BM(ready));
>>> + clear_bit(priority, ready);
>>>
>>> if (sync_test_bit(EVTCHN_FIFO_PENDING, BM(word))
>>> && !sync_test_bit(EVTCHN_FIFO_MASKED, BM(word)))
>>> @@ -285,7 +285,7 @@ static void consume_one_event(unsigned cpu,
>>> static void evtchn_fifo_handle_events(unsigned cpu)
>>> {
>>> struct evtchn_fifo_control_block *control_block;
>>> - uint32_t ready;
>>> + unsigned long ready;
>>> unsigned q;
>>>
>>> control_block = per_cpu(cpu_control_block, cpu);
>>>
>>> _______________________________________________
>>> Xen-devel mailing list
>>> Xen-devel@lists.xen.org
>>> http://lists.xen.org/xen-devel
>>
>> I have tried this fix on APM X-Gene and it is solving a crash (you
>> have reported) during booting of DOM0.
>>
>> But while trying out domU when I tried to execute
>> "/etc/init.d/xencommons start || true"
>> I am observing a similar "alignment fault" crash while performing
>> "clear_bit" in " evtchn_fifo_clear_pending"
>> Pasting a crash log:
>>
>> root@arm64:~/xen-images# /etc/init.d/xencommons start || true
>> Starting C xenstored....
>> Unhandled fault: alignment fault (0x96000021) at 0xffffffc0fae7700c
>> Internal error: : 96000021 [#1] PREEMPT SMP
>> Modules linked in:
>> CPU: 0 PID: 0 Comm: swapper/0 Not tainted 3.15.0-rc1-next-20140417+ #5
>> task: ffffffc0007188b0 ti: ffffffc00070c000 task.ti: ffffffc00070c000
>> PC is at clear_bit+0x14/0x30
>> LR is at evtchn_fifo_clear_pending+0x28/0x30
>> pc : [<ffffffc000289304>] lr : [<ffffffc0002d9f60>] pstate: 600001c5
>> sp : ffffffc00070fbb0
>> x29: ffffffc00070fbb0 x28: ffffffc0fae77000
>> x27: 000000000000000c x26: 0000000000000003
>> x25: 00000000dffe0000 x24: 0000000000000000
>> x23: 0000000000000007 x22: ffffffc000768000
>> x21: ffffffc0f94a0884 x20: ffffffc000645b80
>> x19: ffffffc0f94a0800 x18: 0000007f863063e0
>> x17: 0000007f875d0280 x16: ffffffc0000f93ec
>> x15: 001b92d7f76c3f7d x14: 0000000000000000
>> x13: 00000003e8000000 x12: 0000000000000018
>> x11: 0000000000000000 x10: 0000000000000400
>> x9 : ffffffc00070fd20 x8 : 00000000fe871000
>> x7 : ffffffc0fa800038 x6 : ffffffc0fa800000
>> x5 : 00000000fffffffa x4 : 0000000000000000
>> x3 : 0000000080000000 x2 : 0000000000000001
>> x1 : ffffffc0fae7700c x0 : 0000000000000000
>>
>> Process swapper/0 (pid: 0, stack limit = 0xffffffc00070c058)
>> Stack: (0xffffffc00070fbb0 to 0xffffffc000710000)
>> fba0: 0070fbc0 ffffffc0 002d7f84 ffffffc0
>> fbc0: 0070fbd0 ffffffc0 000e44f0 ffffffc0 0070fc00 ffffffc0 000e13e8 ffffffc0
>> fbe0: 00000002 00000000 fef7a900 ffffffc0 00709900 ffffffc0 000e13d4 ffffffc0
>> fc00: 0070fc20 ffffffc0 002da0ec ffffffc0 fac39000 ffffffc0 000d1e80 ffffffc0
>> fc20: 0070fca0 ffffffc0 002d74c4 ffffffc0 007096ec ffffffc0 fef7ef10 ffffffc0
>> fc40: 0064d878 ffffffc0 00775000 ffffffc0 00000000 00000000 00642500 ffffffc0
>> fc60: 006424f8 ffffffc0 00648318 ffffffc0 0070c000 ffffffc0 00000000 00000081
>> fc80: 00000000 00000000 a0000000 ffffffc0 00000000 00000000 002d7494 ffffffc0
>> fca0: 0070fcf0 ffffffc0 002d7574 ffffffc0 fac0c800 ffffffc0 0072cae0 ffffffc0
>> fcc0: fac26500 ffffffc0 00645b80 ffffffc0 00000018 00000000 fef79410 ffffffc0
>> fce0: 00000001 00000000 00648318 ffffffc0 0070fd00 ffffffc0 000a06a8 ffffffc0
>> fd00: 0070fd10 ffffffc0 000e50b0 ffffffc0 0070fd50 ffffffc0 000e13e8 ffffffc0
>> fd20: 00000018 00000000 00709000 ffffffc0 00642000 ffffffc0 00642000 ffffffc0
>> fd40: 00000018 00000000 00000000 00000000 0070fd70 ffffffc0 000848bc ffffffc0
>> fd60: 007095b0 ffffffc0 000848a4 ffffffc0 0070fdc0 ffffffc0 0008128c ffffffc0
>> fd80: 0076f000 ffffffc0 0000400c ffffff80 0070fdf0 ffffffc0 00004010 ffffff80
>> fda0: 60000145 00000000 00759cac ffffffc0 0070fdf0 ffffffc0 0070fdf0 ffffffc0
>> fdc0: 0070ff10 ffffffc0 00083dac ffffffc0 0070c000 ffffffc0 0070c000 ffffffc0
>> fde0: 0070ff10 ffffffc0 00084ef0 ffffffc0 00000000 00000000 00653708 ffffffc0
>> fe00: 00653708 ffffffc0 00000001 00000000 00000018 00000000 00000000 00000000
>> fe20: 00000001 00000000 00000400 00000000 00718db0 ffffffc0 0070fd20 ffffffc0
>> fe40: 00000400 00000000 00000000 00000000 00000018 00000000 e8000000 00000003
>> fe60: 00000000 00000000 f76c3f7d 001b92d7 000f93ec ffffffc0 875d0280 0000007f
>> fe80: 863063e0 0000007f 0070c000 ffffffc0 0070c000 ffffffc0 00761200 ffffffc0
>> fea0: 0051e000 ffffffc0 006424f8 ffffffc0 00759cac ffffffc0 00000001 00000000
>> fec0: 00648318 ffffffc0 0070c000 ffffffc0 00000000 00000081 0070ff10 ffffffc0
>> fee0: 00084eec ffffffc0 0070ff10 ffffffc0 00084ef0 ffffffc0 60000145 00000000
>> ff00: 0070c000 ffffffc0 0070c000 ffffffc0 0070ff20 ffffffc0 000d944c ffffffc0
>> ff20: 0070ff80 ffffffc0 00508944 ffffffc0 00768000 ffffffc0 0075b000 ffffffc0
>> ff40: 006fb9a0 ffffffc0 0075b000 ffffffc0 feffde40 ffffffc0 00000000 00000041
>> ff60: 0007b000 00000041 0007d000 00000041 00080450 ffffffc0 0050893c ffffffc0
>> ff80: 0070ffa0 ffffffc0 006d68a0 ffffffc0 00000002 00000000 0075b000 ffffffc0
>> ffa0: 00000000 00000000 00080210 00000041 00000000 00000000 00000e11 00000000
>> ffc0: 08000000 00000041 500f0000 00000000 0071a000 00000041 00000000 00000000
>> ffe0: 006fb9a0 ffffffc0 00000000 00000000 00000000 00000000 00000000 00000000
>> Call trace:
>> [<ffffffc000289304>] clear_bit+0x14/0x30
>> [<ffffffc0002d7f80>] ack_dynirq+0x20/0x2c
>> [<ffffffc0000e44ec>] handle_edge_irq+0x94/0x18c
>> [<ffffffc0000e13e4>] generic_handle_irq+0x24/0x40
>> [<ffffffc0002da0e8>] evtchn_fifo_handle_events+0x180/0x188
>> [<ffffffc0002d74c0>] __xen_evtchn_do_upcall+0x9c/0x144
>> [<ffffffc0002d7570>] xen_hvm_evtchn_do_upcall+0x8/0x14
>> [<ffffffc0000a06a4>] xen_arm_callback+0x8/0x18
>> [<ffffffc0000e50ac>] handle_percpu_devid_irq+0x90/0xb8
>> [<ffffffc0000e13e4>] generic_handle_irq+0x24/0x40
>> [<ffffffc0000848b8>] handle_IRQ+0x68/0xe0
>> [<ffffffc000081288>] gic_handle_irq+0x38/0x80
>> Exception stack(0xffffffc00070fdd0 to 0xffffffc00070fef0)
>> fdc0: 0070c000 ffffffc0 0070c000 ffffffc0
>> fde0: 0070ff10 ffffffc0 00084ef0 ffffffc0 00000000 00000000 00653708 ffffffc0
>> fe00: 00653708 ffffffc0 00000001 00000000 00000018 00000000 00000000 00000000
>> fe20: 00000001 00000000 00000400 00000000 00718db0 ffffffc0 0070fd20 ffffffc0
>> fe40: 00000400 00000000 00000000 00000000 00000018 00000000 e8000000 00000003
>> fe60: 00000000 00000000 f76c3f7d 001b92d7 000f93ec ffffffc0 875d0280 0000007f
>> fe80: 863063e0 0000007f 0070c000 ffffffc0 0070c000 ffffffc0 00761200 ffffffc0
>> fea0: 0051e000 ffffffc0 006424f8 ffffffc0 00759cac ffffffc0 00000001 00000000
>> fec0: 00648318 ffffffc0 0070c000 ffffffc0 00000000 00000081 0070ff10 ffffffc0
>> fee0: 00084eec ffffffc0 0070ff10 ffffffc0
>> [<ffffffc000083da8>] el1_irq+0x68/0xd8
>> [<ffffffc0000d9448>] cpu_startup_entry+0x114/0x174
>> [<ffffffc000508940>] rest_init+0x7c/0x88
>> [<ffffffc0006d689c>] start_kernel+0x350/0x368
>> Code: 4a030000 d2800022 8b400c21 9ac32043 (c85f7c22)
>>
>>
>> Thanks,
>> Pranav
>
> HI Pranav
>
> I've just come back form holidays. The last time I tried run DomU
> there was Xen crush with syndrome 0x21 - looks like alignment trap
> again ;) Unfortunately, had no chance to play with it yet :(
>
> Probably, I could post *untested* patch which makes arm64 bitops
> "friendly" to 32-bit... still awaiting response form arm64 about the
> best way to deal with it ;)
>
> Vladimir
Hi Pranav
Could you try [1]? Does it fix your case?
[1] http://www.spinics.net/lists/arm-kernel/msg325071.html
Thanks
Vladimir
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCH v2] xen: fix alignment for bitops
2014-04-24 7:38 ` Vladimir Murzin
@ 2014-04-25 5:46 ` Pranavkumar Sawargaonkar
2014-04-25 11:29 ` Pranavkumar Sawargaonkar
0 siblings, 1 reply; 9+ messages in thread
From: Pranavkumar Sawargaonkar @ 2014-04-25 5:46 UTC (permalink / raw)
To: Vladimir Murzin
Cc: xen-devel, boris.ostrovsky, David Vrabel, Jan Beulich, Ian Campbell
Hi Vladimir,
On 24 April 2014 13:08, Vladimir Murzin <murzin.v@gmail.com> wrote:
> On Mon, Apr 21, 2014 at 5:27 PM, Vladimir Murzin <murzin.v@gmail.com> wrote:
>> On Mon, Apr 21, 2014 at 11:28 AM, Pranavkumar Sawargaonkar
>> <pranavkumar@linaro.org> wrote:
>>> Hi Vladimir/David,
>>>
>>> On 17 April 2014 15:52, David Vrabel <david.vrabel@citrix.com> wrote:
>>>> On 16/04/14 08:55, Vladimir Murzin wrote:
>>>>> Bitops operations like set/clear/change mandate world aligned pointer, mainly
>>>>> because architectures specific implementation.
>>>>>
>>>>> Looks that DEFINE_PER_CPU does required alignment for cpu_control_block;
>>>>> however, local copy used for bitops might not be world aligned.
>>>>>
>>>>> For arm64 it ends up with unaligned access trap...
>>>>
>>>> Thanks. Does this version work for you?
>>>>
>>>> David
>>>>
>>>> 8<----------------------
>>>> xen/events/fifo: fix alignment for bitops on local ready word
>>>>
>>>> Bitops operations like set_bit(), clear_bit(), and test_bit() require
>>>> word aligned pointers, because of architectures specific
>>>> implementations.
>>>>
>>>> Looks that DEFINE_PER_CPU does required alignment for
>>>> cpu_control_block; however, local copy of the ready word might not be
>>>> word aligned.
>>>>
>>>> For arm64 it ends up with unaligned access trap at:
>>>>
>>>> if (head == 0)
>>>> clear_bit(priority, BM(ready));
>>>>
>>>> Use unsigned long for "ready" to make sure it is word aligned.
>>>>
>>>> Signed-off-by: Vladimir Murzin <murzin.v@gmail.com>
>>>> Signed-off-by: David Vrabel <david.vrabel@citrix.com
>>>> ---
>>>> drivers/xen/events/events_fifo.c | 6 +++---
>>>> 1 files changed, 3 insertions(+), 3 deletions(-)
>>>>
>>>> diff --git a/drivers/xen/events/events_fifo.c b/drivers/xen/events/events_fifo.c
>>>> index 96109a9..475d967 100644
>>>> --- a/drivers/xen/events/events_fifo.c
>>>> +++ b/drivers/xen/events/events_fifo.c
>>>> @@ -243,7 +243,7 @@ static void handle_irq_for_port(unsigned port)
>>>>
>>>> static void consume_one_event(unsigned cpu,
>>>> struct evtchn_fifo_control_block *control_block,
>>>> - unsigned priority, uint32_t *ready)
>>>> + unsigned priority, unsigned long *ready)
>>>> {
>>>> struct evtchn_fifo_queue *q = &per_cpu(cpu_queue, cpu);
>>>> uint32_t head;
>>>> @@ -273,7 +273,7 @@ static void consume_one_event(unsigned cpu,
>>>> * copy of the ready word.
>>>> */
>>>> if (head == 0)
>>>> - clear_bit(priority, BM(ready));
>>>> + clear_bit(priority, ready);
>>>>
>>>> if (sync_test_bit(EVTCHN_FIFO_PENDING, BM(word))
>>>> && !sync_test_bit(EVTCHN_FIFO_MASKED, BM(word)))
>>>> @@ -285,7 +285,7 @@ static void consume_one_event(unsigned cpu,
>>>> static void evtchn_fifo_handle_events(unsigned cpu)
>>>> {
>>>> struct evtchn_fifo_control_block *control_block;
>>>> - uint32_t ready;
>>>> + unsigned long ready;
>>>> unsigned q;
>>>>
>>>> control_block = per_cpu(cpu_control_block, cpu);
>>>>
>>>> _______________________________________________
>>>> Xen-devel mailing list
>>>> Xen-devel@lists.xen.org
>>>> http://lists.xen.org/xen-devel
>>>
>>> I have tried this fix on APM X-Gene and it is solving a crash (you
>>> have reported) during booting of DOM0.
>>>
>>> But while trying out domU when I tried to execute
>>> "/etc/init.d/xencommons start || true"
>>> I am observing a similar "alignment fault" crash while performing
>>> "clear_bit" in " evtchn_fifo_clear_pending"
>>> Pasting a crash log:
>>>
>>> root@arm64:~/xen-images# /etc/init.d/xencommons start || true
>>> Starting C xenstored....
>>> Unhandled fault: alignment fault (0x96000021) at 0xffffffc0fae7700c
>>> Internal error: : 96000021 [#1] PREEMPT SMP
>>> Modules linked in:
>>> CPU: 0 PID: 0 Comm: swapper/0 Not tainted 3.15.0-rc1-next-20140417+ #5
>>> task: ffffffc0007188b0 ti: ffffffc00070c000 task.ti: ffffffc00070c000
>>> PC is at clear_bit+0x14/0x30
>>> LR is at evtchn_fifo_clear_pending+0x28/0x30
>>> pc : [<ffffffc000289304>] lr : [<ffffffc0002d9f60>] pstate: 600001c5
>>> sp : ffffffc00070fbb0
>>> x29: ffffffc00070fbb0 x28: ffffffc0fae77000
>>> x27: 000000000000000c x26: 0000000000000003
>>> x25: 00000000dffe0000 x24: 0000000000000000
>>> x23: 0000000000000007 x22: ffffffc000768000
>>> x21: ffffffc0f94a0884 x20: ffffffc000645b80
>>> x19: ffffffc0f94a0800 x18: 0000007f863063e0
>>> x17: 0000007f875d0280 x16: ffffffc0000f93ec
>>> x15: 001b92d7f76c3f7d x14: 0000000000000000
>>> x13: 00000003e8000000 x12: 0000000000000018
>>> x11: 0000000000000000 x10: 0000000000000400
>>> x9 : ffffffc00070fd20 x8 : 00000000fe871000
>>> x7 : ffffffc0fa800038 x6 : ffffffc0fa800000
>>> x5 : 00000000fffffffa x4 : 0000000000000000
>>> x3 : 0000000080000000 x2 : 0000000000000001
>>> x1 : ffffffc0fae7700c x0 : 0000000000000000
>>>
>>> Process swapper/0 (pid: 0, stack limit = 0xffffffc00070c058)
>>> Stack: (0xffffffc00070fbb0 to 0xffffffc000710000)
>>> fba0: 0070fbc0 ffffffc0 002d7f84 ffffffc0
>>> fbc0: 0070fbd0 ffffffc0 000e44f0 ffffffc0 0070fc00 ffffffc0 000e13e8 ffffffc0
>>> fbe0: 00000002 00000000 fef7a900 ffffffc0 00709900 ffffffc0 000e13d4 ffffffc0
>>> fc00: 0070fc20 ffffffc0 002da0ec ffffffc0 fac39000 ffffffc0 000d1e80 ffffffc0
>>> fc20: 0070fca0 ffffffc0 002d74c4 ffffffc0 007096ec ffffffc0 fef7ef10 ffffffc0
>>> fc40: 0064d878 ffffffc0 00775000 ffffffc0 00000000 00000000 00642500 ffffffc0
>>> fc60: 006424f8 ffffffc0 00648318 ffffffc0 0070c000 ffffffc0 00000000 00000081
>>> fc80: 00000000 00000000 a0000000 ffffffc0 00000000 00000000 002d7494 ffffffc0
>>> fca0: 0070fcf0 ffffffc0 002d7574 ffffffc0 fac0c800 ffffffc0 0072cae0 ffffffc0
>>> fcc0: fac26500 ffffffc0 00645b80 ffffffc0 00000018 00000000 fef79410 ffffffc0
>>> fce0: 00000001 00000000 00648318 ffffffc0 0070fd00 ffffffc0 000a06a8 ffffffc0
>>> fd00: 0070fd10 ffffffc0 000e50b0 ffffffc0 0070fd50 ffffffc0 000e13e8 ffffffc0
>>> fd20: 00000018 00000000 00709000 ffffffc0 00642000 ffffffc0 00642000 ffffffc0
>>> fd40: 00000018 00000000 00000000 00000000 0070fd70 ffffffc0 000848bc ffffffc0
>>> fd60: 007095b0 ffffffc0 000848a4 ffffffc0 0070fdc0 ffffffc0 0008128c ffffffc0
>>> fd80: 0076f000 ffffffc0 0000400c ffffff80 0070fdf0 ffffffc0 00004010 ffffff80
>>> fda0: 60000145 00000000 00759cac ffffffc0 0070fdf0 ffffffc0 0070fdf0 ffffffc0
>>> fdc0: 0070ff10 ffffffc0 00083dac ffffffc0 0070c000 ffffffc0 0070c000 ffffffc0
>>> fde0: 0070ff10 ffffffc0 00084ef0 ffffffc0 00000000 00000000 00653708 ffffffc0
>>> fe00: 00653708 ffffffc0 00000001 00000000 00000018 00000000 00000000 00000000
>>> fe20: 00000001 00000000 00000400 00000000 00718db0 ffffffc0 0070fd20 ffffffc0
>>> fe40: 00000400 00000000 00000000 00000000 00000018 00000000 e8000000 00000003
>>> fe60: 00000000 00000000 f76c3f7d 001b92d7 000f93ec ffffffc0 875d0280 0000007f
>>> fe80: 863063e0 0000007f 0070c000 ffffffc0 0070c000 ffffffc0 00761200 ffffffc0
>>> fea0: 0051e000 ffffffc0 006424f8 ffffffc0 00759cac ffffffc0 00000001 00000000
>>> fec0: 00648318 ffffffc0 0070c000 ffffffc0 00000000 00000081 0070ff10 ffffffc0
>>> fee0: 00084eec ffffffc0 0070ff10 ffffffc0 00084ef0 ffffffc0 60000145 00000000
>>> ff00: 0070c000 ffffffc0 0070c000 ffffffc0 0070ff20 ffffffc0 000d944c ffffffc0
>>> ff20: 0070ff80 ffffffc0 00508944 ffffffc0 00768000 ffffffc0 0075b000 ffffffc0
>>> ff40: 006fb9a0 ffffffc0 0075b000 ffffffc0 feffde40 ffffffc0 00000000 00000041
>>> ff60: 0007b000 00000041 0007d000 00000041 00080450 ffffffc0 0050893c ffffffc0
>>> ff80: 0070ffa0 ffffffc0 006d68a0 ffffffc0 00000002 00000000 0075b000 ffffffc0
>>> ffa0: 00000000 00000000 00080210 00000041 00000000 00000000 00000e11 00000000
>>> ffc0: 08000000 00000041 500f0000 00000000 0071a000 00000041 00000000 00000000
>>> ffe0: 006fb9a0 ffffffc0 00000000 00000000 00000000 00000000 00000000 00000000
>>> Call trace:
>>> [<ffffffc000289304>] clear_bit+0x14/0x30
>>> [<ffffffc0002d7f80>] ack_dynirq+0x20/0x2c
>>> [<ffffffc0000e44ec>] handle_edge_irq+0x94/0x18c
>>> [<ffffffc0000e13e4>] generic_handle_irq+0x24/0x40
>>> [<ffffffc0002da0e8>] evtchn_fifo_handle_events+0x180/0x188
>>> [<ffffffc0002d74c0>] __xen_evtchn_do_upcall+0x9c/0x144
>>> [<ffffffc0002d7570>] xen_hvm_evtchn_do_upcall+0x8/0x14
>>> [<ffffffc0000a06a4>] xen_arm_callback+0x8/0x18
>>> [<ffffffc0000e50ac>] handle_percpu_devid_irq+0x90/0xb8
>>> [<ffffffc0000e13e4>] generic_handle_irq+0x24/0x40
>>> [<ffffffc0000848b8>] handle_IRQ+0x68/0xe0
>>> [<ffffffc000081288>] gic_handle_irq+0x38/0x80
>>> Exception stack(0xffffffc00070fdd0 to 0xffffffc00070fef0)
>>> fdc0: 0070c000 ffffffc0 0070c000 ffffffc0
>>> fde0: 0070ff10 ffffffc0 00084ef0 ffffffc0 00000000 00000000 00653708 ffffffc0
>>> fe00: 00653708 ffffffc0 00000001 00000000 00000018 00000000 00000000 00000000
>>> fe20: 00000001 00000000 00000400 00000000 00718db0 ffffffc0 0070fd20 ffffffc0
>>> fe40: 00000400 00000000 00000000 00000000 00000018 00000000 e8000000 00000003
>>> fe60: 00000000 00000000 f76c3f7d 001b92d7 000f93ec ffffffc0 875d0280 0000007f
>>> fe80: 863063e0 0000007f 0070c000 ffffffc0 0070c000 ffffffc0 00761200 ffffffc0
>>> fea0: 0051e000 ffffffc0 006424f8 ffffffc0 00759cac ffffffc0 00000001 00000000
>>> fec0: 00648318 ffffffc0 0070c000 ffffffc0 00000000 00000081 0070ff10 ffffffc0
>>> fee0: 00084eec ffffffc0 0070ff10 ffffffc0
>>> [<ffffffc000083da8>] el1_irq+0x68/0xd8
>>> [<ffffffc0000d9448>] cpu_startup_entry+0x114/0x174
>>> [<ffffffc000508940>] rest_init+0x7c/0x88
>>> [<ffffffc0006d689c>] start_kernel+0x350/0x368
>>> Code: 4a030000 d2800022 8b400c21 9ac32043 (c85f7c22)
>>>
>>>
>>> Thanks,
>>> Pranav
>>
>> HI Pranav
>>
>> I've just come back form holidays. The last time I tried run DomU
>> there was Xen crush with syndrome 0x21 - looks like alignment trap
>> again ;) Unfortunately, had no chance to play with it yet :(
>>
>> Probably, I could post *untested* patch which makes arm64 bitops
>> "friendly" to 32-bit... still awaiting response form arm64 about the
>> best way to deal with it ;)
>>
>> Vladimir
>
> Hi Pranav
>
> Could you try [1]? Does it fix your case?
>
> [1] http://www.spinics.net/lists/arm-kernel/msg325071.html
I will try it today in some time.
>
> Thanks
> Vladimir
Thanks,
Pranav
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCH v2] xen: fix alignment for bitops
2014-04-25 5:46 ` Pranavkumar Sawargaonkar
@ 2014-04-25 11:29 ` Pranavkumar Sawargaonkar
0 siblings, 0 replies; 9+ messages in thread
From: Pranavkumar Sawargaonkar @ 2014-04-25 11:29 UTC (permalink / raw)
To: Vladimir Murzin
Cc: Ian Campbell, Anup Patel, David Vrabel, Jan Beulich, xen-devel,
boris.ostrovsky
Hi Vladimir,
On 25 April 2014 11:16, Pranavkumar Sawargaonkar <pranavkumar@linaro.org> wrote:
> Hi Vladimir,
>
> On 24 April 2014 13:08, Vladimir Murzin <murzin.v@gmail.com> wrote:
>> On Mon, Apr 21, 2014 at 5:27 PM, Vladimir Murzin <murzin.v@gmail.com> wrote:
>>> On Mon, Apr 21, 2014 at 11:28 AM, Pranavkumar Sawargaonkar
>>> <pranavkumar@linaro.org> wrote:
>>>> Hi Vladimir/David,
>>>>
>>>> On 17 April 2014 15:52, David Vrabel <david.vrabel@citrix.com> wrote:
>>>>> On 16/04/14 08:55, Vladimir Murzin wrote:
>>>>>> Bitops operations like set/clear/change mandate world aligned pointer, mainly
>>>>>> because architectures specific implementation.
>>>>>>
>>>>>> Looks that DEFINE_PER_CPU does required alignment for cpu_control_block;
>>>>>> however, local copy used for bitops might not be world aligned.
>>>>>>
>>>>>> For arm64 it ends up with unaligned access trap...
>>>>>
>>>>> Thanks. Does this version work for you?
>>>>>
>>>>> David
>>>>>
>>>>> 8<----------------------
>>>>> xen/events/fifo: fix alignment for bitops on local ready word
>>>>>
>>>>> Bitops operations like set_bit(), clear_bit(), and test_bit() require
>>>>> word aligned pointers, because of architectures specific
>>>>> implementations.
>>>>>
>>>>> Looks that DEFINE_PER_CPU does required alignment for
>>>>> cpu_control_block; however, local copy of the ready word might not be
>>>>> word aligned.
>>>>>
>>>>> For arm64 it ends up with unaligned access trap at:
>>>>>
>>>>> if (head == 0)
>>>>> clear_bit(priority, BM(ready));
>>>>>
>>>>> Use unsigned long for "ready" to make sure it is word aligned.
>>>>>
>>>>> Signed-off-by: Vladimir Murzin <murzin.v@gmail.com>
>>>>> Signed-off-by: David Vrabel <david.vrabel@citrix.com
>>>>> ---
>>>>> drivers/xen/events/events_fifo.c | 6 +++---
>>>>> 1 files changed, 3 insertions(+), 3 deletions(-)
>>>>>
>>>>> diff --git a/drivers/xen/events/events_fifo.c b/drivers/xen/events/events_fifo.c
>>>>> index 96109a9..475d967 100644
>>>>> --- a/drivers/xen/events/events_fifo.c
>>>>> +++ b/drivers/xen/events/events_fifo.c
>>>>> @@ -243,7 +243,7 @@ static void handle_irq_for_port(unsigned port)
>>>>>
>>>>> static void consume_one_event(unsigned cpu,
>>>>> struct evtchn_fifo_control_block *control_block,
>>>>> - unsigned priority, uint32_t *ready)
>>>>> + unsigned priority, unsigned long *ready)
>>>>> {
>>>>> struct evtchn_fifo_queue *q = &per_cpu(cpu_queue, cpu);
>>>>> uint32_t head;
>>>>> @@ -273,7 +273,7 @@ static void consume_one_event(unsigned cpu,
>>>>> * copy of the ready word.
>>>>> */
>>>>> if (head == 0)
>>>>> - clear_bit(priority, BM(ready));
>>>>> + clear_bit(priority, ready);
>>>>>
>>>>> if (sync_test_bit(EVTCHN_FIFO_PENDING, BM(word))
>>>>> && !sync_test_bit(EVTCHN_FIFO_MASKED, BM(word)))
>>>>> @@ -285,7 +285,7 @@ static void consume_one_event(unsigned cpu,
>>>>> static void evtchn_fifo_handle_events(unsigned cpu)
>>>>> {
>>>>> struct evtchn_fifo_control_block *control_block;
>>>>> - uint32_t ready;
>>>>> + unsigned long ready;
>>>>> unsigned q;
>>>>>
>>>>> control_block = per_cpu(cpu_control_block, cpu);
>>>>>
>>>>> _______________________________________________
>>>>> Xen-devel mailing list
>>>>> Xen-devel@lists.xen.org
>>>>> http://lists.xen.org/xen-devel
>>>>
>>>> I have tried this fix on APM X-Gene and it is solving a crash (you
>>>> have reported) during booting of DOM0.
>>>>
>>>> But while trying out domU when I tried to execute
>>>> "/etc/init.d/xencommons start || true"
>>>> I am observing a similar "alignment fault" crash while performing
>>>> "clear_bit" in " evtchn_fifo_clear_pending"
>>>> Pasting a crash log:
>>>>
>>>> root@arm64:~/xen-images# /etc/init.d/xencommons start || true
>>>> Starting C xenstored....
>>>> Unhandled fault: alignment fault (0x96000021) at 0xffffffc0fae7700c
>>>> Internal error: : 96000021 [#1] PREEMPT SMP
>>>> Modules linked in:
>>>> CPU: 0 PID: 0 Comm: swapper/0 Not tainted 3.15.0-rc1-next-20140417+ #5
>>>> task: ffffffc0007188b0 ti: ffffffc00070c000 task.ti: ffffffc00070c000
>>>> PC is at clear_bit+0x14/0x30
>>>> LR is at evtchn_fifo_clear_pending+0x28/0x30
>>>> pc : [<ffffffc000289304>] lr : [<ffffffc0002d9f60>] pstate: 600001c5
>>>> sp : ffffffc00070fbb0
>>>> x29: ffffffc00070fbb0 x28: ffffffc0fae77000
>>>> x27: 000000000000000c x26: 0000000000000003
>>>> x25: 00000000dffe0000 x24: 0000000000000000
>>>> x23: 0000000000000007 x22: ffffffc000768000
>>>> x21: ffffffc0f94a0884 x20: ffffffc000645b80
>>>> x19: ffffffc0f94a0800 x18: 0000007f863063e0
>>>> x17: 0000007f875d0280 x16: ffffffc0000f93ec
>>>> x15: 001b92d7f76c3f7d x14: 0000000000000000
>>>> x13: 00000003e8000000 x12: 0000000000000018
>>>> x11: 0000000000000000 x10: 0000000000000400
>>>> x9 : ffffffc00070fd20 x8 : 00000000fe871000
>>>> x7 : ffffffc0fa800038 x6 : ffffffc0fa800000
>>>> x5 : 00000000fffffffa x4 : 0000000000000000
>>>> x3 : 0000000080000000 x2 : 0000000000000001
>>>> x1 : ffffffc0fae7700c x0 : 0000000000000000
>>>>
>>>> Process swapper/0 (pid: 0, stack limit = 0xffffffc00070c058)
>>>> Stack: (0xffffffc00070fbb0 to 0xffffffc000710000)
>>>> fba0: 0070fbc0 ffffffc0 002d7f84 ffffffc0
>>>> fbc0: 0070fbd0 ffffffc0 000e44f0 ffffffc0 0070fc00 ffffffc0 000e13e8 ffffffc0
>>>> fbe0: 00000002 00000000 fef7a900 ffffffc0 00709900 ffffffc0 000e13d4 ffffffc0
>>>> fc00: 0070fc20 ffffffc0 002da0ec ffffffc0 fac39000 ffffffc0 000d1e80 ffffffc0
>>>> fc20: 0070fca0 ffffffc0 002d74c4 ffffffc0 007096ec ffffffc0 fef7ef10 ffffffc0
>>>> fc40: 0064d878 ffffffc0 00775000 ffffffc0 00000000 00000000 00642500 ffffffc0
>>>> fc60: 006424f8 ffffffc0 00648318 ffffffc0 0070c000 ffffffc0 00000000 00000081
>>>> fc80: 00000000 00000000 a0000000 ffffffc0 00000000 00000000 002d7494 ffffffc0
>>>> fca0: 0070fcf0 ffffffc0 002d7574 ffffffc0 fac0c800 ffffffc0 0072cae0 ffffffc0
>>>> fcc0: fac26500 ffffffc0 00645b80 ffffffc0 00000018 00000000 fef79410 ffffffc0
>>>> fce0: 00000001 00000000 00648318 ffffffc0 0070fd00 ffffffc0 000a06a8 ffffffc0
>>>> fd00: 0070fd10 ffffffc0 000e50b0 ffffffc0 0070fd50 ffffffc0 000e13e8 ffffffc0
>>>> fd20: 00000018 00000000 00709000 ffffffc0 00642000 ffffffc0 00642000 ffffffc0
>>>> fd40: 00000018 00000000 00000000 00000000 0070fd70 ffffffc0 000848bc ffffffc0
>>>> fd60: 007095b0 ffffffc0 000848a4 ffffffc0 0070fdc0 ffffffc0 0008128c ffffffc0
>>>> fd80: 0076f000 ffffffc0 0000400c ffffff80 0070fdf0 ffffffc0 00004010 ffffff80
>>>> fda0: 60000145 00000000 00759cac ffffffc0 0070fdf0 ffffffc0 0070fdf0 ffffffc0
>>>> fdc0: 0070ff10 ffffffc0 00083dac ffffffc0 0070c000 ffffffc0 0070c000 ffffffc0
>>>> fde0: 0070ff10 ffffffc0 00084ef0 ffffffc0 00000000 00000000 00653708 ffffffc0
>>>> fe00: 00653708 ffffffc0 00000001 00000000 00000018 00000000 00000000 00000000
>>>> fe20: 00000001 00000000 00000400 00000000 00718db0 ffffffc0 0070fd20 ffffffc0
>>>> fe40: 00000400 00000000 00000000 00000000 00000018 00000000 e8000000 00000003
>>>> fe60: 00000000 00000000 f76c3f7d 001b92d7 000f93ec ffffffc0 875d0280 0000007f
>>>> fe80: 863063e0 0000007f 0070c000 ffffffc0 0070c000 ffffffc0 00761200 ffffffc0
>>>> fea0: 0051e000 ffffffc0 006424f8 ffffffc0 00759cac ffffffc0 00000001 00000000
>>>> fec0: 00648318 ffffffc0 0070c000 ffffffc0 00000000 00000081 0070ff10 ffffffc0
>>>> fee0: 00084eec ffffffc0 0070ff10 ffffffc0 00084ef0 ffffffc0 60000145 00000000
>>>> ff00: 0070c000 ffffffc0 0070c000 ffffffc0 0070ff20 ffffffc0 000d944c ffffffc0
>>>> ff20: 0070ff80 ffffffc0 00508944 ffffffc0 00768000 ffffffc0 0075b000 ffffffc0
>>>> ff40: 006fb9a0 ffffffc0 0075b000 ffffffc0 feffde40 ffffffc0 00000000 00000041
>>>> ff60: 0007b000 00000041 0007d000 00000041 00080450 ffffffc0 0050893c ffffffc0
>>>> ff80: 0070ffa0 ffffffc0 006d68a0 ffffffc0 00000002 00000000 0075b000 ffffffc0
>>>> ffa0: 00000000 00000000 00080210 00000041 00000000 00000000 00000e11 00000000
>>>> ffc0: 08000000 00000041 500f0000 00000000 0071a000 00000041 00000000 00000000
>>>> ffe0: 006fb9a0 ffffffc0 00000000 00000000 00000000 00000000 00000000 00000000
>>>> Call trace:
>>>> [<ffffffc000289304>] clear_bit+0x14/0x30
>>>> [<ffffffc0002d7f80>] ack_dynirq+0x20/0x2c
>>>> [<ffffffc0000e44ec>] handle_edge_irq+0x94/0x18c
>>>> [<ffffffc0000e13e4>] generic_handle_irq+0x24/0x40
>>>> [<ffffffc0002da0e8>] evtchn_fifo_handle_events+0x180/0x188
>>>> [<ffffffc0002d74c0>] __xen_evtchn_do_upcall+0x9c/0x144
>>>> [<ffffffc0002d7570>] xen_hvm_evtchn_do_upcall+0x8/0x14
>>>> [<ffffffc0000a06a4>] xen_arm_callback+0x8/0x18
>>>> [<ffffffc0000e50ac>] handle_percpu_devid_irq+0x90/0xb8
>>>> [<ffffffc0000e13e4>] generic_handle_irq+0x24/0x40
>>>> [<ffffffc0000848b8>] handle_IRQ+0x68/0xe0
>>>> [<ffffffc000081288>] gic_handle_irq+0x38/0x80
>>>> Exception stack(0xffffffc00070fdd0 to 0xffffffc00070fef0)
>>>> fdc0: 0070c000 ffffffc0 0070c000 ffffffc0
>>>> fde0: 0070ff10 ffffffc0 00084ef0 ffffffc0 00000000 00000000 00653708 ffffffc0
>>>> fe00: 00653708 ffffffc0 00000001 00000000 00000018 00000000 00000000 00000000
>>>> fe20: 00000001 00000000 00000400 00000000 00718db0 ffffffc0 0070fd20 ffffffc0
>>>> fe40: 00000400 00000000 00000000 00000000 00000018 00000000 e8000000 00000003
>>>> fe60: 00000000 00000000 f76c3f7d 001b92d7 000f93ec ffffffc0 875d0280 0000007f
>>>> fe80: 863063e0 0000007f 0070c000 ffffffc0 0070c000 ffffffc0 00761200 ffffffc0
>>>> fea0: 0051e000 ffffffc0 006424f8 ffffffc0 00759cac ffffffc0 00000001 00000000
>>>> fec0: 00648318 ffffffc0 0070c000 ffffffc0 00000000 00000081 0070ff10 ffffffc0
>>>> fee0: 00084eec ffffffc0 0070ff10 ffffffc0
>>>> [<ffffffc000083da8>] el1_irq+0x68/0xd8
>>>> [<ffffffc0000d9448>] cpu_startup_entry+0x114/0x174
>>>> [<ffffffc000508940>] rest_init+0x7c/0x88
>>>> [<ffffffc0006d689c>] start_kernel+0x350/0x368
>>>> Code: 4a030000 d2800022 8b400c21 9ac32043 (c85f7c22)
>>>>
>>>>
>>>> Thanks,
>>>> Pranav
>>>
>>> HI Pranav
>>>
>>> I've just come back form holidays. The last time I tried run DomU
>>> there was Xen crush with syndrome 0x21 - looks like alignment trap
>>> again ;) Unfortunately, had no chance to play with it yet :(
>>>
>>> Probably, I could post *untested* patch which makes arm64 bitops
>>> "friendly" to 32-bit... still awaiting response form arm64 about the
>>> best way to deal with it ;)
>>>
>>> Vladimir
>>
>> Hi Pranav
>>
>> Could you try [1]? Does it fix your case?
>>
>> [1] http://www.spinics.net/lists/arm-kernel/msg325071.html
>
> I will try it today in some time.
I have tried your patch along with the suggestion of changing
" add x1, x1, x0, lsr #2 // Get word offset"
to
" mov r0, r0, lsr #5
add r1, r1, r0, lsl #2 @ Get word offset "
This manages me to get DOM0 and DOMU working on XGENE with latest
Linux kernel ( 3.15.0-rc1) on XGENE.
Thanks,
Pranav
---------------------- Modified Patch -------
diff --git a/arch/arm64/lib/bitops.S b/arch/arm64/lib/bitops.S
index 7dac371..95550f4 100644
--- a/arch/arm64/lib/bitops.S
+++ b/arch/arm64/lib/bitops.S
@@ -26,14 +26,15 @@
*/
.macro bitop, name, instr
ENTRY( \name )
- and w3, w0, #63 // Get bit offset
+ and w3, w0, #31 // Get bit offset
eor w0, w0, w3 // Clear low bits
mov x2, #1
- add x1, x1, x0, lsr #3 // Get word offset
+ lsr x0, x0, #5
+ add x1, x1, x0, lsl #2 // Get word offset
lsl x3, x2, x3 // Create mask
-1: ldxr x2, [x1]
- \instr x2, x2, x3
- stxr w0, x2, [x1]
+1: ldxr w2, [x1]
+ \instr w2, w2, w3
+ stxr w0, w2, [x1]
cbnz w0, 1b
ret
ENDPROC(\name )
@@ -41,15 +42,16 @@ ENDPROC(\name )
.macro testop, name, instr
ENTRY( \name )
- and w3, w0, #63 // Get bit offset
+ and w3, w0, #31 // Get bit offset
eor w0, w0, w3 // Clear low bits
mov x2, #1
- add x1, x1, x0, lsr #3 // Get word offset
+ lsr x0, x0, #5
+ add x1, x1, x0, lsl #2 // Get word offset
lsl x4, x2, x3 // Create mask
-1: ldxr x2, [x1]
+1: ldxr w2, [x1]
lsr x0, x2, x3 // Save old value of bit
- \instr x2, x2, x4 // toggle bit
- stlxr w5, x2, [x1]
+ \instr w2, w2, w4 // toggle bit
+ stlxr w5, w2, [x1]
cbnz w5, 1b
dmb ish
and x0, x0, #1
^ permalink raw reply related [flat|nested] 9+ messages in thread
end of thread, other threads:[~2014-04-25 11:30 UTC | newest]
Thread overview: 9+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-04-16 7:55 [PATCH v2] xen: fix alignment for bitops Vladimir Murzin
2014-04-17 7:42 ` Vladimir Murzin
2014-04-17 10:22 ` David Vrabel
2014-04-21 10:28 ` Pranavkumar Sawargaonkar
2014-04-21 16:27 ` Vladimir Murzin
2014-04-24 7:38 ` Vladimir Murzin
2014-04-25 5:46 ` Pranavkumar Sawargaonkar
2014-04-25 11:29 ` Pranavkumar Sawargaonkar
2014-04-21 16:00 ` Vladimir Murzin
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.