[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v2] xen/arm: do not read MVFR2 when is not defined

  • To: Julien Grall <julien@xxxxxxx>
  • From: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>
  • Date: Mon, 11 Jan 2021 18:21:54 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=IGpQK1eJfLKCk1OsdnT7f1HqRakzbIfZ3u3RmYxIJCE=; b=MHlPTOMzApfa7VRkoKqW0iwgwRxrSna8+JXqz1Ye0eIR6tgRziB0GOZaEbjXLpW8n72B4dyVQH6Ss7uxFftx7fRDcsih+iHTHJWV6vzRl+z/YYsLaNwIAY0EZFP4Abt1ItscPczZyS5qCzvOL9+VagTEgLQUKQ1XRVgQWPA5+XjPEc69Zt5oj0rn9lN476sMFeueLmj+GAqfCHr31iVZAyXVE5gLvzFx5FpyfiOm+lak439Jx4+p73NbCP39nDEUECWeqGzSPKy+aYowknMr0f+DCN9YK0n9YgZJnJKRFJgEVYPSQ56eCGrzvOPCr2lym4kkW0+FmG+Yn0zrWpm+Og==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=VS6wMcp+DDw1GAEWFUwkabPvGFseXoRiOiiLLFeT3a61KgxDSLt4C1gbTZiI5SnALJ26XmgxU3/58Ey7ZfuvYJFjrPMxfZD/L+alMZ0XvxH0CG4wl5qapogIRfPD39TQZqbex4Er51lr6leuihfQENsD1Oewnhm8OmEGI/dKAYD6j9jpHVPg1bS9acwxLCD6FRN4X+ZnCs22ku8Wy0f4OgEowbqCNzOtq1sIvGnAvSGOi5ZBixyBo8HYgl8UnNuTqnku/m7ZQ6wYzzcycI5i4x8lvdzGPAQMlxSwkxxQgN6iSQPipbiQBjJXSlllJbG9Q7DiWRk7NqGQqcqddDlMSA==
  • Authentication-results-original: xen.org; dkim=none (message not signed) header.d=none;xen.org; dmarc=none action=none header.from=arm.com;
  • Cc: Jan Beulich <jbeulich@xxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, "Volodymyr_Babchuk@xxxxxxxx" <Volodymyr_Babchuk@xxxxxxxx>, Stefano Stabellini <stefano.stabellini@xxxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Andre Przywara <Andre.Przywara@xxxxxxx>
  • Delivery-date: Mon, 11 Jan 2021 18:22:13 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: xen.org; dkim=none (message not signed) header.d=none;xen.org; dmarc=none action=none header.from=arm.com;
  • Thread-index: AQHW5fO/cBZB5l3jZkmpNH6hbDKrc6oiIY2AgAAasgCAAIUfgA==
  • Thread-topic: [PATCH v2] xen/arm: do not read MVFR2 when is not defined

Hi Julien,

Sorry for the delay but I was on holiday until today.

> On 11 Jan 2021, at 10:25, Julien Grall <julien@xxxxxxx> wrote:
> Hi Jan,
> On 11/01/2021 08:49, Jan Beulich wrote:
>> On 08.01.2021 20:22, Stefano Stabellini wrote:
>>> MVFR2 is not available on ARMv7. It is available on ARMv8 aarch32 and
>>> aarch64. If Xen reads MVFR2 on ARMv7 it could crash.
>>> Avoid the issue by doing the following:
>>> - define MVFR2_MAYBE_UNDEFINED on arm32
>>> - if MVFR2_MAYBE_UNDEFINED, do not attempt to read MVFR2 in Xen
>>> - keep the 3rd register_t in struct cpuinfo_arm.mvfr on arm32 so that a
>>>   guest read to the register returns '0' instead of crashing the guest.
>>> '0' is an appropriate value to return to the guest because it is defined
>>> as "no support for miscellaneous features".
>>> Aarch64 Xen is not affected by this patch.
>> But it looks to also be affected by ...
> AFAICT, the smoke test passed on Laxton0 (AMD Seattle) [1] over the week-end.
>>> Fixes: 9cfdb489af81 ("xen/arm: Add ID registers and complete cpuinfo")
>> ... this, faulting (according to osstest logs) early during boot on
> The xen-unstable flight [2] ran on Rochester0 (Cavium Thunder-X). So this has 
> something to do with the platform.
> The main difference is AMD Seattle supports AArch32 while Cavium Thunder-X 
> doesn't.
>> 000000000025D314     mrs     x1, id_pfr2_el1
> This register contains information for the AArch32 state.
> AFAICT, the Arm Arm back to at least ARM DDI 0487A.j (published in 2016) 
> described the encoding as Read-Only. So I am not sure why we receive an UNDEF 
> here, the more it looks like ID_PFR{0, 1}_EL1 were correctly accessed.
> Andre, Bertrand, do you have any clue?

I will double check this but my understanding when I checked this was that it 
would be possible to read with an unknown value but should not generate an 

> However, most of the AArch32 ID registers are UNKNOWN on platform not 
> implementing AArch32. So we may want to conditionally skip the access to 
> AArch32 state.

We could skip aarch32 registers on platforms not supporting aarch32 but we will 
still have to provide values to a guest trying to access them so might be 
better to return what is returned by the hardware.
Now if some platforms are generating an UNDEF we need to understand in what 
cases and behave the same way for the guest.

Do i understand it right that on Cavium which has no aarch32 support the access 
is generating an UNDEF ?


> Cheers,
> [1] 
> http://logs.test-lab.xenproject.org/osstest/logs/158293/test-arm64-arm64-xl-xsm/info.html
>> Jan
> [1]
> -- 
> Julien Grall



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.