[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v12 1/3] xen/riscv: enable GENERIC_BUG_FRAME
On 06.08.2024 12:11, oleksii.kurochko@xxxxxxxxx wrote: > On Mon, 2024-08-05 at 17:41 +0200, Jan Beulich wrote: >> On 02.08.2024 15:54, Oleksii Kurochko wrote: >>> Enable GENERIC_BUG_FRAME to support BUG(), WARN(), ASSERT, >>> and run_in_exception_handler(). >>> >>> The 0x0000 opcode is used for BUG_INSTR, which, when macros from >>> <xen/bug.h> are used, triggers an exception with the >>> ILLEGAL_INSTRUCTION cause. >>> This opcode is encoded as a 2-byte instruction and is invalid if >>> CONFIG_RISCV_ISA_C is enabled or not. >> >> Yes, but there's a caveat: Without the C extension instructions have >> to be aligned on 32-bit boundaries. You can't just go and insert a >> 16-bit item there. When RISCV_ISA_C is not set, I think you want to >> insert two such 16-bit zeroes. Beware of an alignment handling bug >> in the assembler - don't think of using an alignment directive here. > Then probably it will be better to define BUG_INSTR as: > #define BUG_INSTR "UNIMP" > and let compiler to provide proper opcode. > > Or define BUG_INSTRT always as 0x00000000 will be better? I don't know. >>> --- a/xen/arch/riscv/include/asm/bug.h >>> +++ b/xen/arch/riscv/include/asm/bug.h >>> @@ -9,7 +9,11 @@ >>> >>> #ifndef __ASSEMBLY__ >>> >>> -#define BUG_INSTR "ebreak" >>> +#include <xen/stringify.h> >>> + >>> +#define BUG_OPCODE 0x0000 >> >> You don't really use this other than ... >> >>> +#define BUG_INSTR ".hword " __stringify(BUG_OPCODE) >> >> ... here - does this really warrant a separate #define _and_ >> inclusion of >> stringify.h? >> >> Furthermore you want to avoid using .hword (or any data generating >> directive), to avoid disturbing disassembly. Please use .insn if at >> all >> possible. I understand though that in certain cases you won't be able >> to >> use .insn. Yet for the common case (more recent binutils) you'd still >> better avoid .hword or alike, imo. >> >>> @@ -103,7 +104,29 @@ static void do_unexpected_trap(const struct >>> cpu_user_regs *regs) >>> >>> void do_trap(struct cpu_user_regs *cpu_regs) >>> { >>> - do_unexpected_trap(cpu_regs); >>> + register_t pc = cpu_regs->sepc; >>> + unsigned long cause = csr_read(CSR_SCAUSE); >>> + >>> + switch ( cause ) >>> + { >>> + case CAUSE_ILLEGAL_INSTRUCTION: >>> + if ( do_bug_frame(cpu_regs, pc) >= 0 ) >>> + { >>> + if ( !(is_kernel_text(pc) || is_kernel_inittext(pc)) ) >>> + { >>> + printk("Something wrong with PC: %#lx\n", pc); >>> + die(); >>> + } >>> + >>> + cpu_regs->sepc += GET_INSN_LENGTH(*(uint16_t *)pc); >>> + >>> + break; >>> + } >>> + >>> + default: >> >> The falling-through here wants annotating, preferably with the >> pseudo- >> keyword. > What kind of pseudo-keyword? I though about /* goto default */ to > underline that CAUSE_ILLEGAL_INSTRUCTION should be close to "default:". In compiler.h we define "fallthrough" specifically for purposes like this. Jan
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |