[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Qemu-arm] Kernel boot regression with PAuth and aarch64-softmmu -cpu ma
[Qemu-arm] Kernel boot regression with PAuth and aarch64-softmmu -cpu max and el2 enabled
Tue, 29 Jan 2019 11:08:19 +0000
mu4e 1.1.0; emacs 26.1.91
Following up on yesterday's discussion on IRC I thought I'd better
report on my findings in the permanent record so things don't get lost.
As I tend to periodically rebuild my test kernels from the current
state of linux.git I occasionally run into these things. My test
qemu-system-aarch64 -machine type=virt,virtualization=on \
-display none -m 4096 -serial mon:stdio \
-append 'console=ttyAMA0 panic=-1' -no-reboot -cpu max
The kernel is essentially a defconfig kernel with a bunch of the VIRTIO
device drivers built-in for when I actually boot a more complex setup
with disks and drives. However this is a boot test so doesn't really
The -machine type=virt,virtualization=on enables our virt machine model
with EL2 turned on. As there is no BIOS involved the kernel is invoked
directly at EL2.
The -cpu max enabled a cortex-a57 + whatever extra features we've
enabled in QEMU so far. It won't match any "real" CPU but it should be
architecturally correct in so far we implement prerequisite features for
any given feature. The cpuid feature bits should also be correct as we
test them internally in QEMU to enable features.
The breakage is the kernel never boots (no output on serial port) and on
attaching with gdb I found it stuck in:
#0 0xffffff8010a9e480 in overflow_stack ()
Backtrace stopped: not enough registers or memory available to unwind further
If I turn on exception tracing it looks like we go into an exception
On the QEMU side this breakage comes in at:
commit 1ce32e47db52e3511132c7104770eae65d412144 (HEAD, refs/bisect/bad)
Author: Richard Henderson <address@hidden>
Date: Mon Jan 21 10:23:13 2019 +0000
target/arm: Enable PAuth for -cpu max
Reviewed-by: Peter Maydell <address@hidden>
Signed-off-by: Richard Henderson <address@hidden>
Signed-off-by: Peter Maydell <address@hidden>
and as you would expect the system boots fine with -cpu cortex-a57
On the kernel side it breaks at:
Author: Mark Rutland <address@hidden>
Date: Fri Dec 7 18:39:30 2018 +0000
arm64: enable pointer authentication
Now that all the necessary bits are in place for userspace, add the
necessary Kconfig logic to allow this to be enabled.
Signed-off-by: Mark Rutland <address@hidden>
Signed-off-by: Kristina Martsenko <address@hidden>
Cc: Catalin Marinas <address@hidden>
Cc: Will Deacon <address@hidden>
Signed-off-by: Will Deacon <address@hidden>
So predictably we failed at enabling PAuth somewhere between the kernel
I'm guessing the kernel so far has been tested on the fast model with a
full chain of TF, UEFI and kernel?
I think Richard's tests were without EL2 enabled.
So in the case that the kernel boots in EL2 is it expecting anyone else
to deal with Pauth exceptions or should it be able to cope with an
enabled Pauth but no firmware underneath it?
Either we've got something wrong or we'll need to rethink what features
the user can have enabled by -cpu max on a direct kernel boot.
- [Qemu-arm] Kernel boot regression with PAuth and aarch64-softmmu -cpu max and el2 enabled,
Alex Bennée <=