Re: [PATCH v2 0/8] sparc64: MM/IRQ patch queue.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



From: Bob Picco <bpicco@xxxxxxxxxx>
Date: Tue, 30 Sep 2014 18:28:41 -0400

> Okay, I lied partially. Let me examine this in the morning. You can
> go first :)

Thanks :)  The boot mostly looks successful no?

There are a couple blips, let's take a look:

> Performance events: No support for PMU type 'niagara5'

Hmmm, this was patched into an older tree I guess, as supported_pmu()
accepts 'niagara5' as far as I can tell.  Oh I see, you patched
against vanilla 3.17-rc7 instead of my 'sparc' GIT tree.

> SELinux:  Registering netfilter hooks
> Kernel unaligned access at TPC[675f74] sha256_transform+0x14/0x2840
> Kernel unaligned access at TPC[675f88] sha256_transform+0x28/0x2840
> Kernel unaligned access at TPC[675f88] sha256_transform+0x28/0x2840
> Kernel unaligned access at TPC[675f88] sha256_transform+0x28/0x2840
> Kernel unaligned access at TPC[675f88] sha256_transform+0x28/0x2840
> alg: No test for stdrng (krng)

Interesting.  sha256_transform() depends upon the input data being
at least 32-bit aligned.  Let's get a stack backtrace to see how
this happens:

====================
diff --git a/arch/sparc/kernel/unaligned_64.c b/arch/sparc/kernel/unaligned_64.c
index 62098a8..59ea98a 100644
--- a/arch/sparc/kernel/unaligned_64.c
+++ b/arch/sparc/kernel/unaligned_64.c
@@ -299,6 +299,7 @@ static void log_unaligned(struct pt_regs *regs)
 	if (__ratelimit(&ratelimit)) {
 		printk("Kernel unaligned access at TPC[%lx] %pS\n",
 		       regs->tpc, (void *) regs->tpc);
+		dump_stack();
 	}
 }
 
====================

> f0290d30: ttyS0 at I/O 0x0 (irq = 1, base_baud = 115200) is a SUN4V HCONS
> NMI watchdog: BUG: soft lockup - CPU#527 stuck for 22s! [swapper/0:1]
> Modules linked in:

I think this is triggered because in console_unlock() all buffered console
output is emitted all at once.  And with all of those vmemmap log messages
it gets huge.

I guess this is another reason to trim down those messages, so I'll work
on that now. :)

> aes_sparc64: Using sparc64 aes opcodes optimized AES implementation
> alg: skcipher-ddst: Test 5 failed on encryption for ctr-aes-sparc64
> 00000000: da 4e 3f bc e8 b6 3a a2 d5 4d 84 4a a9 0c e1 a5

Hmmm, interesting.  I just noticed that I haven't enabled the
sparc64 crypto drivers in my current test .config, but I
turned them on and I don't get this test failure.

I'll try to reproduce with the 'tcrypt' module or similar.

> sd 5:0:2:0: attempting task abort! scmd(fff8183f401d97a0)
> sd 5:0:2:0: [sde] CDB: 
> Read(10): 28 20 0a 20 2b 23 00 00 08 00
> scsi target5:0:2: handle(0x000b), sas_address(0x5000cca016322f71), phy(2)
> scsi target5:0:2: enclosure_logical_id(0x508002000159c0d1), slot(2)
> sd 5:0:2:0: task abort: SUCCESS scmd(fff8183f401d97a0)

I get these every once in a while, the block I/O always recovers.

I assume this booted all the way to a login prompt or similar?

Thanks!

--
To unsubscribe from this list: send the line "unsubscribe sparclinux" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Kernel Development]     [DCCP]     [Linux ARM Development]     [Linux]     [Photo]     [Yosemite Help]     [Linux ARM Kernel]     [Linux SCSI]     [Linux x86_64]     [Linux Hams]

  Powered by Linux