Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 4 May 2019 01:35:46 -0700
From:      Mark Millard <marklmi@yahoo.com>
To:        Justin Hibbits <chmeeedalf@gmail.com>, FreeBSD PowerPC ML <freebsd-ppc@freebsd.org>
Subject:   Re: The first 2 handle_kernel_slb_spill calls on the 2-socket/2-cores-each G5 example context: as expected? (short)
Message-ID:  <9B5E32D1-1A91-432C-A9B5-1A2CF628A8B0@yahoo.com>
In-Reply-To: <47414D54-99F2-490C-AFFC-43503556FA4A@yahoo.com>
References:  <9D9A51A9-C8A6-475F-B241-0A3C3546D3D6.ref@yahoo.com> <9D9A51A9-C8A6-475F-B241-0A3C3546D3D6@yahoo.com> <2388C664-2D47-4851-95AF-A125CE48C282@yahoo.com> <47414D54-99F2-490C-AFFC-43503556FA4A@yahoo.com>

next in thread | previous in thread | raw e-mail | index | archive | help
[I'm just showing the code that got the handle_kernel_slb_spill
reports.]

On 2019-May-4, at 00:03, Mark Millard <marklmi at yahoo.com> wrote:

> [I forgot to show where I always stop the enable of the
> reporting.]
>=20
> On 2019-May-3, at 23:52, Mark Millard <marklmi at yahoo.com> wrote:
>=20
>> [A correction --and interesting information from a somewhat later
>> time frame.]
>>=20
>> On 2019-May-3, at 20:22, Mark Millard <marklmi at yahoo.com> wrote:
>>=20
>>> [This is from the -r347003 experiment context, not my
>>> normal environment.]
>>>=20
>>> I stuck a printf in handle_kernel_slb_spill, reporting the type,
>>> dar, and srr0 values. The resultant build does not get far
>>> booting but does report the first 2 calls. Typed from a screen
>>> picture:
>>>=20
>>> KDB: debugger backends: ddb
>>> KDB: current backend: ddb
>>> handle_kernel_slb_spill: type=3D0x380 dar=3D0x3d99348 srr0=3D0xa869bc
>>> handle_kernel_slb_spill: type=3D0x380 dar=3D0x10000000 srr0=3D0xa869bc=

>>>=20
>>> That is as far as it gets, as far as output goes, with that
>>> unconditional printf in place.
>>>=20
>>> (I was not sure I'd get anything from this experiment.)
>>>=20
>>> This suggests that the slb is partially(?) populated in the
>>> hardware before the (adjusted) loop that I've been testing with
>>> tries to establish coverage of part of the KVA space. The two
>>> examples reported are from neither the Direct-Map space nor the
>>> Kernel-Virtual-Address space.
>>>=20
>>> Are these expected? Is their presence handled?
>>>=20
>>=20
>> I made the printf in handle_kernel_slb_spill conditional
>> on a global so I could control when it would try to
>> print.
>>=20
>> I learned that I guessed the ordering wrong on the initial
>> report:
>>=20
>> QUOTE
>>       #ifdef __powerpc64__
>>       i =3D 0;
>>       for (va =3D virtual_avail; va < virtual_end && i<(n_slbs-1)/2; =
va +=3D SEGMENT_LENGTH, i++)
>>               moea64_bootstrap_slb_prefault(va, 0);
>>       #endif
>> enable_handle_kernel_slb_spill_reporting=3D 1;
>> END QUOTE
>>=20
>> gets the lines I originally showed:
>>=20
>> handle_kernel_slb_spill: type=3D0x380 dar=3D0x3d99348 srr0=3D0xa869bc
>> handle_kernel_slb_spill: type=3D0x380 dar=3D0x10000000 srr0=3D0xa869bc
>>=20
>> So these were after then loop, not before.
>>=20
>> Note: So far those messages always have displayed and
>> then things were hung-up for this enable placement.
>>=20
>>=20
>> I then commented that enable out and added a
>> printf:
>>=20
>>       pa =3D moea64_bootstrap_alloc(kstack_pages * PAGE_SIZE, =
PAGE_SIZE);
>>       va =3D virtual_avail + KSTACK_GUARD_PAGES * PAGE_SIZE;
>>       virtual_avail =3D va + kstack_pages * PAGE_SIZE;
>>       CTR2(KTR_PMAP, "moea64_bootstrap: kstack0 at %#x (%#x)", pa, =
va);
>> printf("moea64_bootstrap: kstack0 at %#x (%#x)\n", pa, va);
>>=20
>> and also set up an enable just before dpcpu_init's=20
>> all:
>>=20
>> enable_handle_kernel_slb_spill_reporting=3D 1;
>>       dpcpu_init(dpcpu, curcpu);
>>=20
>> The result, when it did not boot, was as below,
>> again showing a couple of handle_kernel_slb_spill
>> lines for a not very large addresses and no more
>> lines after that:
>>=20
>> KDB: debugger backends: ddb
>> KDB: current backend: ddb
>> moea64_bootstrap: kstack0 at 0x3000 (0x1000)
>> handle_kernel_slb_spill: type=3D0x380 dar=3D0x22ef8 srr0=3D0xa86690
>> handle_kernel_slb_spill: type=3D0x480 dar=3D0x22ef8 srr0=3D0xa86690
>>=20
>> It is the same addresses but two distinct types. It
>> also would seem to be the same segment as for:
>>=20
>> handle_kernel_slb_spill: type=3D0x380 dar=3D0x3d99348 srr0=3D0xa869bc
>> (from the earlier placement)
>>=20
>>=20
>> By contrast, interestingly, it did sometimes boot for
>> this later enable placement, and, when it did boot,
>> there were no handle_kernel_slb_spill lines output:
>>=20
>> KDB: debugger backends: ddb
>> KDB: current backend: ddb
>> moea64_bootstrap: kstack0 at 0x3000 (0x1000)
>> ---<<BOOT>>---
>>=20
>> (and so on.)
>>=20
>>=20
>> This means that the type=3D0x?80 dar=3D0x22ef8 srr0=3D0xa86690
>> slb-misses are intermittent for this testing context.
>>=20
>>=20
>> Of course, with more testing I might see more variability.
>=20
>=20
> I forgot to show that I used:
>=20
>        /* Bring up virtual memory */
>        moea64_late_bootstrap(mmup, kernelstart, kernelend);
> enable_handle_kernel_slb_spill_reporting=3D 0; // hangs without printf =
display first when this late
> }
>=20
> It did no good the enable it this late so I set
> it as a disable point instead. Trying to use the
> handle_kernel_slb_spill printf after this point
> seem to just result in silently hanging-up.
>=20
> So this disable was involved in the cases that
> booted for enabling just before dpcpu_init .
> (It is not clear just how far the non-booting
> cases got internally.)


For:
handle_kernel_slb_spill: type=3D0x380 dar=3D0x3d99348 srr0=3D0xa869bc
handle_kernel_slb_spill: type=3D0x380 dar=3D0x10000000 srr0=3D0xa869bc

both seem to involve the stbx instruction in:

0000000000a869bc <.memset+0x20> stbx    r4,r9,r3
0000000000a869c0 <.memset+0x24> addi    r9,r9,1
0000000000a869c4 <.memset+0x28> bdnz    0000000000a869bc <.memset+0x20>


For:

handle_kernel_slb_spill: type=3D0x380 dar=3D0x22ef8 srr0=3D0xa86690
handle_kernel_slb_spill: type=3D0x480 dar=3D0x22ef8 srr0=3D0xa86690

both seem to involve the stdu instruction in:

0000000000a8668c <.memcpy+0x140> ldu     r0,-8(r9)
0000000000a86690 <.memcpy+0x144> stdu    r0,-8(r11)
0000000000a86694 <.memcpy+0x148> bdnz    0000000000a8668c =
<.memcpy+0x140>

although the first is for a EXC_DSE (Data Segment Exception)
and the second for a EXC_ISE (Instruction Segment Exception).

The effective addresses reported for srr0 seem to match
what objdump shows for the kernel file.

=3D=3D=3D
Mark Millard
marklmi at yahoo.com
( dsl-only.net went
away in early 2018-Mar)




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9B5E32D1-1A91-432C-A9B5-1A2CF628A8B0>