From nobody Wed Sep 13 06:24:09 2023 X-Original-To: freebsd-arm@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Rlr560hmcz4tRPq for ; Wed, 13 Sep 2023 06:24:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Rlr555Z1vz4RT8 for ; Wed, 13 Sep 2023 06:24:09 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1694586249; a=rsa-sha256; cv=none; b=rbLxFBe4dMpbhGKRg+OeS4N7rntR5cF3dPqIyg3W5SE8IFyNn2fh76obHl7ZbtxTtJva3o Y9WlB3VUxAc1jkxdwUIeVXz9BhXRasgyE0BggWlJfI7AY+R1fAzOIeXqPWd1sBFrf6I6ya y8CoIvLQPx2e9Tz25NRzNt8OgBiqyu79aaPLi/C5j3pI12E8yeAu2GZQn/FsCdgMjzhSLj gAii/R5dozNM9tq9ZNWE0xiE9DKxyCCzfs8UMkPVQB3+A7qssBBJAT3tWtn74Wopwk7Y7+ PRe02FrWgWXFTCOs6n0X9V9L3cE3MoI4qiDNP4M/L1LnRzsoGq0gh2tzUimDzA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1694586249; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=tUXVUSy/3hUEOgSC/Eq0VS6j2hmubUWFAuplijKw7ps=; b=UqSgIEkDaXG5vYUNUK1ZDlTA5ZgeM5U6VrO/VR0G8LgKNEpxLClueOdtPf5yHBj6z9Undd F2c6mjkUf5pu78sIkHyQiSDrTmHJ+L01CojDE9qgAd9CUd1YEjn3PL8g09eIi97Y1+i/s4 K7PDgT+AsbVSLnxY2irMlUtv0GQzLLXBPfC5a3RY/GhlAclPraBwkqP1D6uCcoAAhEi5zI DNQvikvwqxax5ym5ekWk5XVxt2h7dDqVCeOFEJKDDkKPFymW5IzI3TM8p6SR+fDY7sC7ra 32G6xSuHQpe7zFUcqDMJqYd3btyUW8sqr3nUWJUwBxFoYb9lwNwSffKIZmfLHA== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4Rlr554ctzz13dK for ; Wed, 13 Sep 2023 06:24:09 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 38D6O9s5048800 for ; Wed, 13 Sep 2023 06:24:09 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 38D6O9BK048799 for freebsd-arm@FreeBSD.org; Wed, 13 Sep 2023 06:24:09 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: freebsd-arm@FreeBSD.org Subject: [Bug 273752] 6926e26: arm: Add support for using VFP in kernel broke my kernel Date: Wed, 13 Sep 2023 06:24:09 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: arm X-Bugzilla-Version: 14.0-CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: crb@ChrisBowman.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-arm@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Porting FreeBSD to ARM processors List-Archive: https://lists.freebsd.org/archives/freebsd-arm List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-arm@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D273752 Bug ID: 273752 Summary: 6926e26: arm: Add support for using VFP in kernel broke my kernel Product: Base System Version: 14.0-CURRENT Hardware: arm OS: Any Status: New Severity: Affects Some People Priority: --- Component: arm Assignee: freebsd-arm@FreeBSD.org Reporter: crb@ChrisBowman.com It looks to me like commit 6926e26 broke my kernel with the log at the bott= om. I am trying to migrate to 14.0 in perpetration for the release. I've been running a 13.0 kernel for a long time now that's been very stable for me. I'm running on a Diligent ARTYZ7 board which is a AMD/Xilinx Zynq based boa= rd (ARMv7) very similar to the zibo or zedboard. Happy to help debug this if someone can give some direction. =3D=3D=3D=3D=3D=3D=3D Using DTB provided by EFI at 0x7ef8000. Kernel entry at 0x17a00200... Kernel args: (null) WARNING: Cannot find freebsd,dts-version property, cannot check DTB complia= nce ---<>--- GDB: debug ports: uart GDB: current port: uart KDB: debugger backends: ddb gdb KDB: current backend: ddb Copyright (c) 1992-2023 The FreeBSD Project. Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994 The Regents of the University of California. All rights reserved. FreeBSD is a registered trademark of The FreeBSD Foundation. FreeBSD 14.0-CURRENT #28 n260570-6926e2699ae5-dirty: Tue Sep 12 23:04:05 PDT 2023 crb@eclipse.ChrisBowman.com:/usr/obj/tmp/src/arm.armv7/sys/ARTYZ7 arm FreeBSD clang version 14.0.5 (https://github.com/llvm/llvm-project.git llvmorg-14.0.5-0-gc12386ae247c) WARNING: WITNESS option enabled, expect reduced performance. CPU: ARM Cortex-A9 r3p0 (ECO: 0x00000000) CPU Features:=20 Multiprocessing, Thumb2, Security, VMSAv7, Coherent Walk Optional instructions:=20 UMULL, SMULL, SIMD(ext) LoUU:2 LoC:2 LoUIS:2=20 Cache level 1: 32KB/32B 4-way data cache WB Read-Alloc Write-Alloc 32KB/32B 4-way instruction cache Read-Alloc real memory =3D 536866816 (511 MB) avail memory =3D 511766528 (488 MB) FreeBSD/SMP: Multiprocessor System Detected: 2 CPUs arc4random: WARNING: initial seeding bypassed the cryptographic random devi= ce because it was not yet seeded and the knob 'bypass_before_seeding' was enab= led. random: entropy device external interface ofwbus0: regfix0: on ofwbus0 simplebus0: on ofwbus0 simple_mfd0: mem 0xf8000000-0xf8000ff= f on simplebus0 l2cache0: mem 0xf8f02000-0xf8f02fff irq 8 on simplebus0 l2cache0: cannot allocate IRQ, not using interrupt l2cache0: Part number: 0x3, release: 0x8 l2cache0: L2 Cache enabled: 512KB/32B 8 ways gic0: mem 0xf8f01000-0xf8f01fff,0xf8f00100-0xf8f001ff on simplebus0 gic0: pn 0x39, arch 0x1, rev 0x2, implementer 0x43b irqs 96 mp_tmr0: mem 0xf8f00200-0xf8f0021f irq 29 on simplebus0 Timecounter "MPCore" frequency 50000000 Hz quality 800 mp_tmr1: mem 0xf8f00600-0xf8f0061f irq 36 on simplebus0 Event timer "MPCore" frequency 50000000 Hz quality 1000 cpulist0: on ofwbus0 cpu0: on cpulist0 cpu1: on cpulist0 uart0: mem 0xe0000000-0xe0000fff irq 9 on simplebus0 uart0: console (-1,n,8,1) zy7_qspi0: mem 0xe000d000-0xe000dfff irq 1= 3 on simplebus0 zy7_qspi0: must have ref-clock property device_attach: zy7_qspi0 attach returned 6 cgem0: mem 0xe000b000-0xe000bfff = irq 14 on simplebus0 cgem0: could not retrieve reference clock. miibus0: on cgem0 rgephy0: PHY 0 on miibus0 rgephy0: none, 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseT-F= DX, 1000baseT-FDX-master, auto rgephy1: PHY 1 on miibus0 rgephy1: none, 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseT-F= DX, 1000baseT-FDX-master, auto cgem0: Ethernet address: 02:1d:18:e6:2c:2d sdhci_fdt0: mem 0xe0100000-0xe0100= fff irq 17 on simplebus0 sdhci_fdt0: 1 slot(s) allocated mmc0: on sdhci_fdt0 zy7_devcfg0: mem 0xf8007000-0xf80070ff irq 28 on simple= bus0 Timecounters tick every 1.000 msec [nl_generic] genl_register_family: Registered family nlctrl id 16 [nl_generic] genl_register_cmds: Adding cmd GETFAMILY(3) to family nlctrl panic: Storing an invalid VFP state cpuid =3D 0 time =3D 1 KDB: stack backtrace: db_trace_self() at db_trace_self pc =3D 0xc04f4a10 lr =3D 0xc00720b4 (db_trace_self_wrapper+0x30) sp =3D 0xc0a14af8 fp =3D 0xc0a14c10 db_trace_self_wrapper() at db_trace_self_wrapper+0x30 pc =3D 0xc00720b4 lr =3D 0xc0202080 (vpanic+0x140) sp =3D 0xc0a14c18 fp =3D 0xc0a14c38 r4 =3D 0x00000100 r5 =3D 0x00000000 r6 =3D 0xc054a726 r7 =3D 0xc07202a8 vpanic() at vpanic+0x140 pc =3D 0xc0202080 lr =3D 0xc0201e60 (dump_savectx) sp =3D 0xc0a14c40 fp =3D 0xc0a14c44 r4 =3D 0x2015f010 r5 =3D 0xc06e8639 r6 =3D 0xcfc1e000 r7 =3D 0xcf0b7e90 r8 =3D 0xc0793880 r9 =3D 0xc0a050c0 r10 =3D 0xc070fd00 dump_savectx() at dump_savectx pc =3D 0xc0201e60 lr =3D 0xc051890c (fpu_kern_enter) sp =3D 0xc0a14c4c fp =3D 0xc0a14c58 fpu_kern_enter() at fpu_kern_enter pc =3D 0xc051890c lr =3D 0xc0515cc8 (cpu_switch+0x5c) sp =3D 0xc0a14c60 fp =3D 0xcfc1e000 r4 =3D 0xc051890c r5 =3D 0xc0a14e90 r6 =3D 0x00000000 r10 =3D 0xc0793880 cpu_switch() at cpu_switch+0x5c pc =3D 0xc0515cc8 lr =3D 0xc0515cc8 (cpu_switch+0x5c) sp =3D 0xc0a14c60 fp =3D 0xcfc1e000 Unwind failure (no registers changed) KDB: enter: panic [ thread pid 0 tid 100000 ] Stopped at kdb_enter+0x54: ldrb r15, [r15, r15, ror r15]! db> --=20 You are receiving this mail because: You are the assignee for the bug.=