Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/sys/arch/sparc64/doc sun4v: update TODO with analysis of sun...
details: https://anonhg.NetBSD.org/src/rev/010596452513
branches: trunk
changeset: 950811:010596452513
user: palle <palle%NetBSD.org@localhost>
date: Sun Jan 31 19:08:05 2021 +0000
description:
sun4v: update TODO with analysis of sun4v crashes
diffstat:
sys/arch/sparc64/doc/TODO | 21 +++++++++++++++++----
1 files changed, 17 insertions(+), 4 deletions(-)
diffs (35 lines):
diff -r abab6b8c0276 -r 010596452513 sys/arch/sparc64/doc/TODO
--- a/sys/arch/sparc64/doc/TODO Sun Jan 31 18:31:59 2021 +0000
+++ b/sys/arch/sparc64/doc/TODO Sun Jan 31 19:08:05 2021 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: TODO,v 1.31 2021/01/04 15:13:50 skrll Exp $ */
+/* $NetBSD: TODO,v 1.32 2021/01/31 19:08:05 palle Exp $ */
Things to be done:
@@ -11,9 +11,22 @@
- GENERIC.UP kernel hangs on v445 (missing interrupt?)
sun4v:
- - current status: The kernel boots and starts the init process.
- The following processes seem to crash on and on so more debugging to be done...
-
+ - current status:
+ The kernel boots and starts userland.
+ During the execution of the sysinst process, a sub-process crashes.
+ The crash happens when a call to sysctl from /bin/sh causes a mmu trap.
+ Part of the TRAP_SETUP() call in sun4v_datatrap issues a 'save' instruction.
+ Since %cansave is 0 (%canrestore is 6 and %otherwin is 0) a SPILL trap is generated.
+ The current code ends up in the pcbspill codepath (which is based on code from openbsd).
+ This code assumes that it is the register window in the OTHERWIN window that must be spilled
+ to the pcb.
+ Since %otherwin in this scenario actually is zero, we end up putting incorrect register
+ window values to the pcb.
+ So - this code should not save data to the pcb when %otherwin is 0 - it should spill the
+ values to the stack of the user process. Special care should be taken here, since we
+ may end up with a mmu fault again if the stack address is not present in the mmu, so
+ perhaps spilling to the physical address of the stack will work.
+ Time will show if this is correct...
- 64-bit kernel support
- 32-bit kernel support
- libkvm
Home |
Main Index |
Thread Index |
Old Index