From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 5A544C4332F for ; Tue, 31 Oct 2023 16:28:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:In-Reply-To:MIME-Version:References: Message-ID:Subject:Cc:To:From:Date:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=NiUNUZ77wJbQJFP4Taundr0C8lNVdijmNGbHaCsfL0U=; b=GQT+8tDzhBZH8W 18RcD1jgIlzfaDc8vXwq1qE0/n6j5mnzNE0IIRPHaHwV8VJjGMcU9PvO/9Me2nYcEEoQKJRRKiRWG a44+LxicWrLg6KvyCj55Ipq6T2LY4mB92G727x01GaUGU2C+DbrYmEptvzDTwQcsssv1Hq62jPOIk b7ZyE9y75rwJuIcGDC5toRaZpsg521M3P97uqhwL4KSNBD7oz9ZegZODv0wwOgA72SHZIujJHfEvP fmfpwPcT6QZ519SwcQYAXPhRtd3/R91+e9tS1gBbZYjB7YWUq2+C3QcntB1/4PFW4/jR0f4652Mvj AP4MhDbzP4XgEpQrUzkg==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.96 #2 (Red Hat Linux)) id 1qxrao-005bP2-0Z; Tue, 31 Oct 2023 16:27:50 +0000 Received: from foss.arm.com ([217.140.110.172]) by bombadil.infradead.org with esmtp (Exim 4.96 #2 (Red Hat Linux)) id 1qxrak-005bOE-1x for linux-arm-kernel@lists.infradead.org; Tue, 31 Oct 2023 16:27:48 +0000 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 371A92F4; Tue, 31 Oct 2023 09:28:25 -0700 (PDT) Received: from FVFF77S0Q05N (unknown [10.57.36.213]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 155193F67D; Tue, 31 Oct 2023 09:27:40 -0700 (PDT) Date: Tue, 31 Oct 2023 16:27:35 +0000 From: Mark Rutland To: Ard Biesheuvel Cc: Naresh Kamboju , Catalin Marinas , Will Deacon , Oliver Upton , Linux-Next Mailing List , open list , Linux ARM , lkft-triage@lists.linaro.org, Arnd Bergmann , Thomas Gleixner , Ingo Molnar , Anders Roxell , Dan Carpenter , LTP List , Petr Vorel Subject: Re: qemu-arm64: handle_futex_death - kernel/futex/core.c:661 - Unable to handle kernel unknown 43 at virtual address Message-ID: References: MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20231031_092746_781798_E21A3411 X-CRM114-Status: GOOD ( 18.13 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On Mon, Oct 30, 2023 at 09:14:56AM +0100, Ard Biesheuvel wrote: > From 97dea432bceadfcece84484609374c277afc2c81 Mon Sep 17 00:00:00 2001 > From: Ard Biesheuvel > Date: Sat, 28 Oct 2023 09:40:29 +0200 > Subject: [PATCH v2] Add missing ESR decoding for level -1 translation faults > > Signed-off-by: Ard Biesheuvel As a heads-up, looking at this some more we'll also need to rework the usage of of ESR_ELx_FSC_TYPE and ESR_ELx_FSC_LEVEL, since those no longer work correctly Level -1 xFSC value. ESR_ELx_FSC_TYPE is 0x3c and ESR_ELx_FSC_LEVEL is 0x3, and work on the basis that the xFSC fault types are encoded as xxxxyy, where the xxxx is the type and the yy is the level (0 to 3). That didn't expand naturally to level -1. For example, Level {0,1,2,3} translation faults get reported as 0b0001xx, where the xx encodes the level, while Level -1 translation faults get reported as 0b101011. That ends up affecting: * All the is_${FOO}_fault() predicat functions, e.g. is_translation_fault(), is_el1_permission_fault() and is_spurious_el1_translation_fault(). * Places where we synthesize an xFSC value, e.g. set_thread_esr() * A bunch of KVM due to the use of kvm_vcpu_trap_get_fault_type() ... and we probably need to remove ESR_ELx_FSC_TYPE and ESR_ELx_FSC_LEVEL entirely to avoid the possiblity of misuse. Mark. > --- > arch/arm64/mm/fault.c | 12 ++++++------ > 1 file changed, 6 insertions(+), 6 deletions(-) > > diff --git a/arch/arm64/mm/fault.c b/arch/arm64/mm/fault.c > index 2e5d1e238af9..13f192691060 100644 > --- a/arch/arm64/mm/fault.c > +++ b/arch/arm64/mm/fault.c > @@ -780,18 +780,18 @@ static const struct fault_info fault_info[] = { > { do_translation_fault, SIGSEGV, SEGV_MAPERR, "level 1 translation fault" }, > { do_translation_fault, SIGSEGV, SEGV_MAPERR, "level 2 translation fault" }, > { do_translation_fault, SIGSEGV, SEGV_MAPERR, "level 3 translation fault" }, > - { do_bad, SIGKILL, SI_KERNEL, "unknown 8" }, > + { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 0 access flag fault" }, > { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 1 access flag fault" }, > { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 2 access flag fault" }, > { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 3 access flag fault" }, > - { do_bad, SIGKILL, SI_KERNEL, "unknown 12" }, > + { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 0 permission fault" }, > { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 1 permission fault" }, > { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 2 permission fault" }, > { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 3 permission fault" }, > { do_sea, SIGBUS, BUS_OBJERR, "synchronous external abort" }, > { do_tag_check_fault, SIGSEGV, SEGV_MTESERR, "synchronous tag check fault" }, > { do_bad, SIGKILL, SI_KERNEL, "unknown 18" }, > - { do_bad, SIGKILL, SI_KERNEL, "unknown 19" }, > + { do_sea, SIGKILL, SI_KERNEL, "level -1 (translation table walk)" }, > { do_sea, SIGKILL, SI_KERNEL, "level 0 (translation table walk)" }, > { do_sea, SIGKILL, SI_KERNEL, "level 1 (translation table walk)" }, > { do_sea, SIGKILL, SI_KERNEL, "level 2 (translation table walk)" }, > @@ -799,7 +799,7 @@ static const struct fault_info fault_info[] = { > { do_sea, SIGBUS, BUS_OBJERR, "synchronous parity or ECC error" }, // Reserved when RAS is implemented > { do_bad, SIGKILL, SI_KERNEL, "unknown 25" }, > { do_bad, SIGKILL, SI_KERNEL, "unknown 26" }, > - { do_bad, SIGKILL, SI_KERNEL, "unknown 27" }, > + { do_sea, SIGKILL, SI_KERNEL, "level -1 synchronous parity error (translation table walk)" }, // Reserved when RAS is implemented > { do_sea, SIGKILL, SI_KERNEL, "level 0 synchronous parity error (translation table walk)" }, // Reserved when RAS is implemented > { do_sea, SIGKILL, SI_KERNEL, "level 1 synchronous parity error (translation table walk)" }, // Reserved when RAS is implemented > { do_sea, SIGKILL, SI_KERNEL, "level 2 synchronous parity error (translation table walk)" }, // Reserved when RAS is implemented > @@ -813,9 +813,9 @@ static const struct fault_info fault_info[] = { > { do_bad, SIGKILL, SI_KERNEL, "unknown 38" }, > { do_bad, SIGKILL, SI_KERNEL, "unknown 39" }, > { do_bad, SIGKILL, SI_KERNEL, "unknown 40" }, > - { do_bad, SIGKILL, SI_KERNEL, "unknown 41" }, > + { do_bad, SIGKILL, SI_KERNEL, "level -1 address size fault" }, > { do_bad, SIGKILL, SI_KERNEL, "unknown 42" }, > - { do_bad, SIGKILL, SI_KERNEL, "unknown 43" }, > + { do_translation_fault, SIGSEGV, SEGV_MAPERR, "level -1 translation fault" }, > { do_bad, SIGKILL, SI_KERNEL, "unknown 44" }, > { do_bad, SIGKILL, SI_KERNEL, "unknown 45" }, > { do_bad, SIGKILL, SI_KERNEL, "unknown 46" }, > -- > 2.42.0.820.g83a721a137-goog > _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel