[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v4 1/2] xen/arm: vpl011: emulate non-SBSA registers as WI/RAZ


  • To: Jiamei Xie <jiamei.xie@xxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Michal Orzel <michal.orzel@xxxxxxx>
  • Date: Thu, 1 Dec 2022 09:42:09 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=arm.com smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=yT8flKgaG3QhFPoIxIxLtRnyqdlpVvtAFPjoOsbnYAk=; b=N1Dza4v7bgSyP9XCSkEqwxJnQfHrppCgQ5LAavGjqCxIDYaU2cRQb2VrkZSUitQGTfYvlS0juM0Wp5jErcp2Z+KGpL+7JQxgJzReKEyeNpDJ6QecJnchg8OyPnTZVOAOivLo28ylODM1fU/hMw+ejEFdwwho4+BZJ7Izw3D6PXF48EUIikLkKK/1FRb+x8ZKQygkBLa/yQOYsuGkwkLkcYMTdlFYxkcvZKxrmiaUTCQlg69znSiOrnyDVzXrhINVLYeZo87VoH+GN3f+3b8Ha6MTBEz0OPxzyMsRFWoonOwvHtuSAtwRI2Lz+k1SivP8YrwI1+LwwesKIrLvzQtanQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GLpixjMYYcekPVi/pB91IHUpAho1LAXCHqJlh0Wa5EonVjMpyENeDS625CKUFywcxJYJwLIsjP2RIXiCYwTKa4QRJpEV37sJBtYkgmUAah6GV9ENoO9IMrZhYRLKSbEsyfp63E1stZ0YfcrcBDjZv0J1TGhgiZwLqsSVHQpw+/q5P4OmIp+cGY3f9NG87orPhdN6XeVB0QhQq1MJyhFFa8sNnvL7BZ/+cr4vfCpFjqyCkoHTJ7SHV+v59NPVmce7VVcWxAWhac4w0v4DwQBR/G7xczgMKJAlUwO13yQ3xU14llzp1SX/FoNiq9xk/dgfkn+8ELnucAaAN4LNmNNqNA==
  • Cc: <wei.chen@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, "Julien Grall" <julien@xxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Delivery-date: Thu, 01 Dec 2022 08:42:18 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

Hi Jiamei,

On 01/12/2022 09:03, Jiamei Xie wrote:
> 
> 
> When the guest kernel enables DMA engine with "CONFIG_DMA_ENGINE=y",
> Linux SBSA PL011 driver will access PL011 DMACR register in some
> functions. As chapter "B Generic UART" in "ARM Server Base System
> Architecture"[1] documentation describes, SBSA UART doesn't support
> DMA. In current code, when the kernel tries to access DMACR register,
> Xen will inject a data abort:
> Unhandled fault at 0xffffffc00944d048
> Mem abort info:
>   ESR = 0x96000000
>   EC = 0x25: DABT (current EL), IL = 32 bits
>   SET = 0, FnV = 0
>   EA = 0, S1PTW = 0
>   FSC = 0x00: ttbr address size fault
> Data abort info:
>   ISV = 0, ISS = 0x00000000
>   CM = 0, WnR = 0
> swapper pgtable: 4k pages, 39-bit VAs, pgdp=0000000020e2e000
> [ffffffc00944d048] pgd=100000003ffff803, p4d=100000003ffff803, 
> pud=100000003ffff803, pmd=100000003fffa803, pte=006800009c090f13
> Internal error: ttbr address size fault: 96000000 [#1] PREEMPT SMP
> ...
> Call trace:
>  pl011_stop_rx+0x70/0x80
>  tty_port_shutdown+0x7c/0xb4
>  tty_port_close+0x60/0xcc
>  uart_close+0x34/0x8c
>  tty_release+0x144/0x4c0
>  __fput+0x78/0x220
>  ____fput+0x1c/0x30
>  task_work_run+0x88/0xc0
>  do_notify_resume+0x8d0/0x123c
>  el0_svc+0xa8/0xc0
>  el0t_64_sync_handler+0xa4/0x130
>  el0t_64_sync+0x1a0/0x1a4
> Code: b9000083 b901f001 794038a0 8b000042 (b9000041)
> ---[ end trace 83dd93df15c3216f ]---
> note: bootlogd[132] exited with preempt_count 1
> /etc/rcS.d/S07bootlogd: line 47: 132 Segmentation fault start-stop-daemon
> 
> As discussed in [2], this commit makes the access to non-SBSA registers
> RAZ/WI as an improvement.
> 
> [1] https://developer.arm.com/documentation/den0094/c/?lang=en
> [2] 
> https://lore.kernel.org/xen-devel/alpine.DEB.2.22.394.2211161552420.4020@ubuntu-linux-20-04-desktop/
> 
> Signed-off-by: Jiamei Xie <jiamei.xie@xxxxxxx>
The patch looks good, so:
Reviewed-by: Michal Orzel <michal.orzel@xxxxxxx>

However, because your series is about vpl011 refinement, I spotted two things
(this does not necessarily needs to be done by you).

> ---
> v3 -> v4
> - remove the size check for unknown registers in the SBSA UART
> - remove lock in read_as_zero
> v2 -> v3
> - emulate non-SBSA registers as WI/RAZ in default case
> - update commit message
> v1 -> v2
> - print a message using XENLOG_G_DEBUG when it's write-ignore
> ---
>  xen/arch/arm/vpl011.c | 8 ++++++--
>  1 file changed, 6 insertions(+), 2 deletions(-)
> 
> diff --git a/xen/arch/arm/vpl011.c b/xen/arch/arm/vpl011.c
> index 43522d48fd..f4a5621fab 100644
> --- a/xen/arch/arm/vpl011.c
> +++ b/xen/arch/arm/vpl011.c
> @@ -414,11 +414,15 @@ static int vpl011_mmio_read(struct vcpu *v,
>      default:
>          gprintk(XENLOG_ERR, "vpl011: unhandled read r%d offset %#08x\n",
This is an emulated UART MMIO handler, so instead XENLOG_ERR, we should use 
XENLOG_G_ERR
to indicate gust error and not Xen error.

>                  dabt.reg, vpl011_reg);
> -        return 0;
> +        goto read_as_zero;
>      }
> 
>      return 1;
This return statement is unreachable.

> 
> +read_as_zero:
> +    *r = 0;
> +    return 1;
> +
>  bad_width:
>      gprintk(XENLOG_ERR, "vpl011: bad read width %d r%d offset %#08x\n",
>              dabt.size, dabt.reg, vpl011_reg);
> @@ -486,7 +490,7 @@ static int vpl011_mmio_write(struct vcpu *v,
>      default:
>          gprintk(XENLOG_ERR, "vpl011: unhandled write r%d offset %#08x\n",
>                  dabt.reg, vpl011_reg);
> -        return 0;
> +        goto write_ignore;
>      }
> 
>  write_ignore:
> --
> 2.25.1
> 
> 
~Michal




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.