From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-15.3 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED, USER_AGENT_SANE_1 autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 19CDBC28E82 for ; Wed, 3 Mar 2021 19:28:11 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id DA78164ED0 for ; Wed, 3 Mar 2021 19:28:10 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1579736AbhCCSb5 (ORCPT ); Wed, 3 Mar 2021 13:31:57 -0500 Received: from foss.arm.com ([217.140.110.172]:48782 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1379183AbhCCOUB (ORCPT ); Wed, 3 Mar 2021 09:20:01 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 99E90D6E; Wed, 3 Mar 2021 06:19:15 -0800 (PST) Received: from [10.57.12.223] (unknown [10.57.12.223]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 4FD333F766; Wed, 3 Mar 2021 06:19:13 -0800 (PST) Subject: Re: [PATCH 1/8] ARM: ARMv7-M: Fix register restore corrupt after svc call To: dillon min Cc: Rob Herring , Maxime Coquelin , Alexandre Torgue , "open list:OPEN FIRMWARE AND FLATTENED DEVICE TREE BINDINGS" , linux-stm32@st-md-mailman.stormreply.com, Linux ARM , Linux Kernel Mailing List , linux@armlinux.org.uk, afzal.mohd.ma@gmail.com References: <1614758717-18223-1-git-send-email-dillon.minfei@gmail.com> <1614758717-18223-2-git-send-email-dillon.minfei@gmail.com> <5284d390-c03a-4035-df5a-10d6cd60e47b@arm.com> From: Vladimir Murzin Message-ID: <5efe3d44-8045-e376-003e-3ccbff54fb23@arm.com> Date: Wed, 3 Mar 2021 14:19:19 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: devicetree@vger.kernel.org On 3/3/21 1:35 PM, dillon min wrote: > Hi Vladimir, > > Thanks for the review. > > On Wed, Mar 3, 2021 at 5:52 PM Vladimir Murzin wrote: >> >> On 3/3/21 8:05 AM, dillon.minfei@gmail.com wrote: >>> From: dillon min >>> >>> For some case, kernel not boot by u-boot(single thread), >>> but by rtos , as most rtos use pendsv to do context switch. >> >> >> Hmm, does it mean that it starts kernel from process context? > Yes, kernel might be started from process context, since u-boot not > switch context, so kernel always startup under msp. >> >> I'd assume that it is not only kernel who expects MSP. So, what >> if RTOS you mentioned want to boot other RTOS (even itself)? What >> if you have no access to the source code for those RTOS(es) to >> patch MSP/PSP switch? > > My case is a little complicated. > stm32h7 only have 128Kbytes internal flash, can't store u-boot.bin (>200K), > so, set a bootloader (rt-thread rtos) to internal flash, load > linux/u-boot from serial port via ymodem > store to qspi flash(8Mbytes), then jump to u-boot. > > qspi flash layout: > 0 - 512K: u-boot > 512K- 8M : kernel(xip) > > load process : rt-thread -> u-boot -> linux > > before add psp/msp check after svc call, register restore corrupt. > add a printhex8 around svc call, found the sp stack is 0x24040000c0ffcff8 > it should be 0xc0ffcdf8c0ffcff8. 0x24040000 is the sp stack address > assigned by u-boot > i've no idea how it's become to u-boot's sp. > > I have the rtos code, and will try to fix it on the rtos side. That would be great! > > Can you give more explanation about why linux relies on MSP ? thanks MSP is what set from boot, thus it is natural assumption that boot code would preserve that illusion. I'd guess that kernel is in line in such assumption across different (RT)OS capable to run on M-class cores (please, note that some variants might not have two stack pointers) Cheers Vladimir > >> >> I'd very much prefer to keep stack switching logic outside kernel, >> say, in some shim which RTOS/bootloader can maintain. >> >> Cheers >> Vladimir >> >>> >>> So, we need add an lr check after svc call, to find out should >>> use psp or msp. else register restore after svc call might be >>> corrupted. >>> >>> Fixes: b70cd406d7fe ("ARM: 8671/1: V7M: Preserve registers across switch from Thread to Handler mode") >>> Signed-off-by: dillon min >>> --- >>> arch/arm/mm/proc-v7m.S | 5 ++++- >>> 1 file changed, 4 insertions(+), 1 deletion(-) >>> >>> diff --git a/arch/arm/mm/proc-v7m.S b/arch/arm/mm/proc-v7m.S >>> index 84459c1d31b8..c93d2757312d 100644 >>> --- a/arch/arm/mm/proc-v7m.S >>> +++ b/arch/arm/mm/proc-v7m.S >>> @@ -137,7 +137,10 @@ __v7m_setup_cont: >>> 1: cpsid i >>> /* Calculate exc_ret */ >>> orr r10, lr, #EXC_RET_THREADMODE_PROCESSSTACK >>> - ldmia sp, {r0-r3, r12} >>> + tst lr, #EXC_RET_STACK_MASK >>> + mrsne r4, psp >>> + moveq r4, sp >>> + ldmia r4!, {r0-r3, r12} >>> str r5, [r12, #11 * 4] @ restore the original SVC vector entry >>> mov lr, r6 @ restore LR >>> >>> >> >