From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.ozlabs.org (lists.ozlabs.org [112.213.38.117]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 34E3CCD68E8 for ; Tue, 10 Oct 2023 09:09:47 +0000 (UTC) Authentication-Results: lists.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256 header.s=pp1 header.b=bV/YkBou; dkim-atps=neutral Received: from boromir.ozlabs.org (localhost [IPv6:::1]) by lists.ozlabs.org (Postfix) with ESMTP id 4S4VTj6350z3dDM for ; Tue, 10 Oct 2023 20:09:45 +1100 (AEDT) Authentication-Results: lists.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256 header.s=pp1 header.b=bV/YkBou; dkim-atps=neutral Authentication-Results: lists.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=linux.ibm.com (client-ip=148.163.156.1; helo=mx0a-001b2d01.pphosted.com; envelope-from=sourabhjain@linux.ibm.com; receiver=lists.ozlabs.org) Received: from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com [148.163.156.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 4S4VSl3wL1z3bZr for ; Tue, 10 Oct 2023 20:08:55 +1100 (AEDT) Received: from pps.filterd (m0353726.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 39A97QI6000764; Tue, 10 Oct 2023 09:08:47 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=message-id : date : mime-version : subject : from : to : cc : references : in-reply-to : content-type : content-transfer-encoding; s=pp1; bh=weexIVTz4ib4EpPbqayE3w36PpdVvPreORe2Y/h79TU=; b=bV/YkBouJNSzWyCSzpK/YZaARIznJYEsqBVooRcr48BgM001xWoq/aHn9YsFal1yxkfG DbOVHdtAiMuRT24QNOOqjDDkF9FlLt6NWJefOJAZDpzivvs5Ze0V54OwuJaTGLiQKLXb Q9Md1qhuZ0qJbg+FT/DNL2EoxwP/GRYlTETLPoR2NskhDyOF9eQO8/5nRcKhWbpPCtfW VqR9aGuKmo6NHmvkuVyyKR15u4rQEcYjWwQo6Ajc1G4UwOf1fcmnK18DlbRIqxDOyjtP WFtjV8VuZhh5aAQP/3MQm0W16AREpaMo79W1lZsQRpZ0B9tABQnTtRE8jKMCkpkEo1zr Ig== Received: from pps.reinject (localhost [127.0.0.1]) by mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 3tn3pw81f6-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 10 Oct 2023 09:08:47 +0000 Received: from m0353726.ppops.net (m0353726.ppops.net [127.0.0.1]) by pps.reinject (8.17.1.5/8.17.1.5) with ESMTP id 39A98kaR005481; Tue, 10 Oct 2023 09:08:46 GMT Received: from ppma12.dal12v.mail.ibm.com (dc.9e.1632.ip4.static.sl-reverse.com [50.22.158.220]) by mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 3tn3pw81ef-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 10 Oct 2023 09:08:46 +0000 Received: from pps.filterd (ppma12.dal12v.mail.ibm.com [127.0.0.1]) by ppma12.dal12v.mail.ibm.com (8.17.1.19/8.17.1.19) with ESMTP id 39A77SMl024461; Tue, 10 Oct 2023 09:08:45 GMT Received: from smtprelay05.fra02v.mail.ibm.com ([9.218.2.225]) by ppma12.dal12v.mail.ibm.com (PPS) with ESMTPS id 3tkhnsfjv8-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 10 Oct 2023 09:08:45 +0000 Received: from smtpav03.fra02v.mail.ibm.com (smtpav03.fra02v.mail.ibm.com [10.20.54.102]) by smtprelay05.fra02v.mail.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 39A98ipO23265900 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 10 Oct 2023 09:08:44 GMT Received: from smtpav03.fra02v.mail.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id EBDE720043; Tue, 10 Oct 2023 09:08:43 +0000 (GMT) Received: from smtpav03.fra02v.mail.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 0EBBF20040; Tue, 10 Oct 2023 09:08:42 +0000 (GMT) Received: from [9.43.8.81] (unknown [9.43.8.81]) by smtpav03.fra02v.mail.ibm.com (Postfix) with ESMTP; Tue, 10 Oct 2023 09:08:41 +0000 (GMT) Message-ID: <7da645c3-2899-fb01-bf11-392b9bd52e38@linux.ibm.com> Date: Tue, 10 Oct 2023 14:38:40 +0530 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.15.1 Subject: Re: [PATCHv8 1/5] powerpc/setup : Enable boot_cpu_hwid for PPC32 Content-Language: en-US From: Sourabh Jain To: Pingfan Liu , linuxppc-dev@lists.ozlabs.org References: <20231009113036.45988-1-piliu@redhat.com> <20231009113036.45988-2-piliu@redhat.com> <36b2aa11-dfd9-529d-0386-aa181caeb93f@linux.ibm.com> In-Reply-To: <36b2aa11-dfd9-529d-0386-aa181caeb93f@linux.ibm.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 X-Proofpoint-GUID: oaaMehdfA-TWhMaZFCiCmAFGmQLd3BcC X-Proofpoint-ORIG-GUID: SclhQyybXgczyQR4FvjheSM8GD-bESxV X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.267,Aquarius:18.0.980,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2023-10-10_04,2023-10-09_01,2023-05-22_02 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 clxscore=1015 mlxscore=0 spamscore=0 priorityscore=1501 suspectscore=0 adultscore=0 impostorscore=0 mlxlogscore=999 bulkscore=0 malwarescore=0 lowpriorityscore=0 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2309180000 definitions=main-2310100068 X-BeenThere: linuxppc-dev@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Linux on PowerPC Developers Mail List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Baoquan He , kexec@lists.infradead.org, Mahesh Salgaonkar , Nicholas Piggin , Ming Lei , Wen Xiong Errors-To: linuxppc-dev-bounces+linuxppc-dev=archiver.kernel.org@lists.ozlabs.org Sender: "Linuxppc-dev" Hello Pingfan, > > With this patch series applied, the kdump kernel fails to boot on > powerpc with nr_cpus=1. > > Console logs: > ------------------- > [root]# echo c > /proc/sysrq-trigger > [   74.783235] sysrq: Trigger a crash > [   74.783244] Kernel panic - not syncing: sysrq triggered crash > [   74.783252] CPU: 58 PID: 3838 Comm: bash Kdump: loaded Not tainted > 6.6.0-rc5pf-nr-cpus+ #3 > [   74.783259] Hardware name: POWER10 (raw) phyp pSeries > [   74.783275] Call Trace: > [   74.783280] [c00000020f4ebac0] [c000000000ed9f38] > dump_stack_lvl+0x6c/0x9c (unreliable) > [   74.783291] [c00000020f4ebaf0] [c000000000150300] panic+0x178/0x438 > [   74.783298] [c00000020f4ebb90] [c000000000936d48] > sysrq_handle_crash+0x28/0x30 > [   74.783304] [c00000020f4ebbf0] [c00000000093773c] > __handle_sysrq+0x10c/0x250 > [   74.783309] [c00000020f4ebc90] [c000000000937fa8] > write_sysrq_trigger+0xc8/0x168 > [   74.783314] [c00000020f4ebcd0] [c000000000665d8c] > proc_reg_write+0x10c/0x1b0 > [   74.783321] [c00000020f4ebd00] [c00000000058da54] > vfs_write+0x104/0x4b0 > [   74.783326] [c00000020f4ebdc0] [c00000000058dfdc] > ksys_write+0x7c/0x140 > [   74.783331] [c00000020f4ebe10] [c000000000033a64] > system_call_exception+0x144/0x3a0 > [   74.783337] [c00000020f4ebe50] [c00000000000c554] > system_call_common+0xf4/0x258 > [   74.783343] --- interrupt: c00 at 0x7fffa0721594 > [   74.783352] NIP:  00007fffa0721594 LR: 00007fffa0697bf4 CTR: > 0000000000000000 > [   74.783364] REGS: c00000020f4ebe80 TRAP: 0c00   Not tainted > (6.6.0-rc5pf-nr-cpus+) > [   74.783376] MSR:  800000000280f033 >   CR: 28222202  XER: 00000000 > [   74.783394] IRQMASK: 0 > [   74.783394] GPR00: 0000000000000004 00007ffffc4b6800 > 00007fffa0807300 0000000000000001 > [   74.783394] GPR04: 000000013549ea60 0000000000000002 > 0000000000000010 0000000000000000 > [   74.783394] GPR08: 0000000000000000 0000000000000000 > 0000000000000000 0000000000000000 > [   74.783394] GPR12: 0000000000000000 00007fffa0abaf70 > 0000000040000000 000000011a0f9798 > [   74.783394] GPR16: 000000011a0f9724 000000011a097688 > 000000011a02ff70 000000011a0fd568 > [   74.783394] GPR20: 0000000135554bf0 0000000000000001 > 000000011a0aa478 00007ffffc4b6a24 > [   74.783394] GPR24: 00007ffffc4b6a20 000000011a0faf94 > 0000000000000002 000000013549ea60 > [   74.783394] GPR28: 0000000000000002 00007fffa08017a0 > 000000013549ea60 0000000000000002 > [   74.783440] NIP [00007fffa0721594] 0x7fffa0721594 > [   74.783443] LR [00007fffa0697bf4] 0x7fffa0697bf4 > [   74.783447] --- interrupt: c00 > I'm in purgatory > [    0.000000] radix-mmu: Page sizes from device-tree: > [    0.000000] radix-mmu: Page size shift = 12 AP=0x0 > [    0.000000] radix-mmu: Page size shift = 16 AP=0x5 > [    0.000000] radix-mmu: Page size shift = 21 AP=0x1 > [    0.000000] radix-mmu: Page size shift = 30 AP=0x2 > [    0.000000] Activating Kernel Userspace Access Prevention > [    0.000000] Activating Kernel Userspace Execution Prevention > [    0.000000] radix-mmu: Mapped 0x0000000000000000-0x0000000000010000 > with 64.0 KiB pages (exec) > [    0.000000] radix-mmu: Mapped 0x0000000000010000-0x0000000000200000 > with 64.0 KiB pages > [    0.000000] radix-mmu: Mapped 0x0000000000200000-0x0000000020000000 > with 2.00 MiB pages > [    0.000000] radix-mmu: Mapped 0x0000000020000000-0x0000000022600000 > with 2.00 MiB pages (exec) > [    0.000000] radix-mmu: Mapped 0x0000000022600000-0x0000000040000000 > with 2.00 MiB pages > [    0.000000] radix-mmu: Mapped 0x0000000040000000-0x0000000180000000 > with 1.00 GiB pages > [    0.000000] radix-mmu: Mapped 0x0000000180000000-0x00000001a0000000 > with 2.00 MiB pages > [    0.000000] lpar: Using radix MMU under hypervisor > [    0.000000] Linux version 6.6.0-rc5pf-nr-cpus+ > (root@ltcever7x0-lp1.aus.stglabs.ibm.com) (gcc (GCC) 8.5.0 20210514 > (Red Hat 8.5.0-20), GNU ld version 2.30-123.el8) #3 SMP Mon Oct  9 11:07: > 41 CDT 2023 > [    0.000000] Found initrd at 0xc000000022e60000:0xc0000000248f08d8 > [    0.000000] Hardware name: IBM,9043-MRX POWER10 (raw) 0x800200 > 0xf000006 of:IBM,FW1060.00 (NM1060_016) hv:phyp pSeries > [    0.000000] printk: bootconsole [udbg0] enabled > [    0.000000] the round shift between dt seq and the cpu logic > number: 56 > [    0.000000] BUG: Unable to handle kernel data access on write at > 0xc0000001a0000000 > [    0.000000] Faulting instruction address: 0xc000000022009c64 > [    0.000000] Oops: Kernel access of bad area, sig: 11 [#1] > [    0.000000] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries > [    0.000000] Modules linked in: > [    0.000000] CPU: 2 PID: 0 Comm: swapper Not tainted > 6.6.0-rc5pf-nr-cpus+ #3 > [    0.000000] Hardware name:  POWER10 (raw)  hv:phyp pSeries > [    0.000000] NIP:  c000000022009c64 LR: c000000022009c54 CTR: > c0000000201ff348 > [    0.000000] REGS: c000000022aebb00 TRAP: 0300   Not tainted > (6.6.0-rc5pf-nr-cpus+) > [    0.000000] MSR:  8000000000001033 CR: > 28222824  XER: 00000001 > [    0.000000] CFAR: c000000020031574 DAR: c0000001a0000000 DSISR: > 42000000 IRQMASK: 1 > [    0.000000] GPR00: c000000022009ba0 c000000022aebda0 > c0000000213d1300 0000000000000004 > [    0.000000] GPR04: 0000000000000001 c000000022aebbc0 > c000000022aebbb8 0000000000000000 > [    0.000000] GPR08: 0000000000000001 c00000019ffffff8 > 000000000000003a c0000000229c8a78 > [    0.000000] GPR12: 0000000000002000 c000000022e4a800 > c0000000211d34b8 c0000000211d3aa8 > [    0.000000] GPR16: c0000000211d75a0 c0000000211d75b0 > c0000000225f3b98 0000000000000000 > [    0.000000] GPR20: 0000000000000001 0000000000000001 > 0000000000000001 0000000000000001 > [    0.000000] GPR24: 0000000000000008 0000000000000000 > 0000000000000001 c00000019ffffdc0 > [    0.000000] GPR28: 0000000000000002 c000000022b368e0 > c000000022aebe08 0000000000000008 > [    0.000000] NIP [c000000022009c64] smp_setup_cpu_maps+0x420/0x724 > [    0.000000] LR [c000000022009c54] smp_setup_cpu_maps+0x410/0x724 > [    0.000000] Call Trace: > [    0.000000] [c000000022aebda0] [c000000022009ba0] > smp_setup_cpu_maps+0x35c/0x724 (unreliable) > [    0.000000] [c000000022aebeb0] [c00000002200a19c] > setup_arch+0x1b8/0x54c > [    0.000000] [c000000022aebf30] [c000000022003f88] > start_kernel+0xb0/0x768 > [    0.000000] [c000000022aebfe0] [c00000002000d888] > start_here_common+0x1c/0x20 > [    0.000000] Code: 3929ffff 7f89e040 409c002c 7ec4b378 7f83e378 > 4a027939 7f83e378 4a0278e5 e95b0018 3d22017d e929f028 7d4ac42c > <7d49c12e> eb7b0000 7e99a378 4bffff3c The faulting instruction address, 0xc000000022009c6, corresponds to the code below: File: arch/powerpc/kernel/setup-common.c Function void __init smp_setup_cpu_maps(void) {             ...             cpu_to_phys_id[bt_thread] = be32_to_cpu(intserv_node->intserv[bt_thread]);             ... } Hope it helps. Thanks, Sourabh Jain