From patchwork Fri Mar 31 13:07:56 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Wei Chen X-Patchwork-Id: 9656389 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id A01AB60351 for ; Fri, 31 Mar 2017 13:11:29 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 8FBCE27F93 for ; Fri, 31 Mar 2017 13:11:29 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 82EDA28643; Fri, 31 Mar 2017 13:11:29 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.1 required=2.0 tests=BAD_ENC_HEADER,BAYES_00, DKIM_SIGNED, RCVD_IN_DNSWL_MED, T_DKIM_INVALID autolearn=ham version=3.3.1 Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id DC05E27F93 for ; Fri, 31 Mar 2017 13:11:28 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1ctwIa-0008Te-BH; Fri, 31 Mar 2017 13:09:04 +0000 Received: from mail6.bemta6.messagelabs.com ([193.109.254.103]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1ctwIY-0008Rq-PD for xen-devel@lists.xen.org; Fri, 31 Mar 2017 13:09:02 +0000 Received: from [85.158.143.35] by server-10.bemta-6.messagelabs.com id C1/F3-13192-EE45ED85; Fri, 31 Mar 2017 13:09:02 +0000 X-Brightmail-Tracker: H4sIAAAAAAAAA1VSa0gUYRT1m5l1R9mRcVW8Lio4YWS0myKZP8o 0KFJ6+CqkNBtzcjf2xcwaBoaKomgP9FdoRtJDQhczMTUsK9MySxN/ZOIj0UQzitQ2EyuacVaz 79c595x77v3gkrjaodCQXI6N482skXF1J/TbXXZrvySPp4ReX3CLvD1/i4hGB7rbV7B4dFxhM GdYck4p9DWTCdY+XU6dvQvlI/vmMuROEnQ+Dm+GWwmJqOlaDOy1Na4yeYnBwK9vSokgehBBe3 clLisdCApmepykAoP73e+d5AaCiqYZRRlyI13pILhcUUBI2JsOgPqyaqWEcboQQcPyfgl70XE wPbS46iHoYOiceIJLmKL3wOfpj6t1oANhuL90te4m1gf7bmISVtNRsJz/UCn7PeFVpezHaYBn s7O47AmAq6N9SM7xg3fDA6KfFPEm6C06LO0M9CgBBZXNSpk0K2Cxt0chNxyCscGfuCxcRHCnf dFJHhDw4XcVIZMOV+gZv7u6kwethtaJR5gstGDQVjLpHG6E4pWvztxYWHB0IdlUiMNI9WuiHG mrNnykasNHahBWh7YIHH+O47VhO3QZvCFLbzOxBqM2LDRCZ+IEgc3ijGyGoDttMTUh8RxcxNe GftTGdyI/EmN8qKWpsRS1R4Yl87yeFfTpfLaREzqRP0kyQF1JGk9Re/JcFpdzxmAUb2pNBlLF eFPTiaJMCVbWJBiyZKkXBWl8qVKpj5YEfbZ5vW3tGgdRgMaLQuIiapWV400G2//6HPIlEeNFB UspKoPZtp4+Jw7GxMGRjjFpsI39J2ny0aWZ+r2jHiUlLZQtnD07NPsptizmRMhETWFgY3iacm KnI+97ecu+x5O5dOCx3jieYSKPXNM4iqLuLXHBbrr6pLnkkQuK3PmDb4/yEU2tldEv8vrTGkJ 2+TwtVlmXB4aeq1QnA1JDGvmpmGzkb0ngEvG5dMMf+zamILOkLTU9mCEEPRu2FecF9i+lVeMn iAMAAA== X-Env-Sender: Wei.Chen@arm.com X-Msg-Ref: server-14.tower-21.messagelabs.com!1490965740!55645406!2 X-Originating-IP: [104.47.0.61] X-SpamReason: No, hits=0.5 required=7.0 tests=BODY_RANDOM_LONG X-StarScan-Received: X-StarScan-Version: 9.2.3; banners=-,-,- X-VirusChecked: Checked Received: (qmail 28805 invoked from network); 31 Mar 2017 13:09:01 -0000 Received: from mail-he1eur01on0061.outbound.protection.outlook.com (HELO EUR01-HE1-obe.outbound.protection.outlook.com) (104.47.0.61) by server-14.tower-21.messagelabs.com with AES256-SHA256 encrypted SMTP; 31 Mar 2017 13:09:01 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=Y3qWV7MmxQV5tASyawhMHRVadMb3bHJmnysOJxCICqM=; b=TIbNiWSe8N4XwVcCXwi65374VQAwCJVpqO48S9R186jq4tp7GvdOvyTbdTQ7wYS8pwsnPTJ3khXkGECoCt3pZtGS0IrehqN9NzRXc5xtw2SIHR5G/gnrp43HVF4d/e7CeErFz1RtyHeu+UpzwukyKINs/LfZvMar2zjLSGXfBMw= Received: from DB3PR08CA0027.eurprd08.prod.outlook.com (2a01:111:e400:503c::37) by DB3PR08MB0217.eurprd08.prod.outlook.com (2a01:111:e400:504d::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.991.14; Fri, 31 Mar 2017 13:08:57 +0000 Received: from DB5EUR03FT012.eop-EUR03.prod.protection.outlook.com (2a01:111:f400:7e0a::203) by DB3PR08CA0027.outlook.office365.com (2a01:111:e400:503c::37) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1005.10 via Frontend Transport; Fri, 31 Mar 2017 13:08:57 +0000 Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 217.140.96.140 as permitted sender) receiver=protection.outlook.com; client-ip=217.140.96.140; helo=nebula.arm.com; Received: from nebula.arm.com (217.140.96.140) by DB5EUR03FT012.mail.protection.outlook.com (10.152.20.161) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384) id 15.1.1005.5 via Frontend Transport; Fri, 31 Mar 2017 13:08:57 +0000 Received: from P300.p300.shanghai.arm.com (10.1.2.79) by mail.arm.com (10.1.106.66) with Microsoft SMTP Server id 14.3.294.0; Fri, 31 Mar 2017 14:08:43 +0100 From: Wei Chen To: Date: Fri, 31 Mar 2017 21:07:56 +0800 Message-ID: <1490965679-619-17-git-send-email-Wei.Chen@arm.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1490965679-619-1-git-send-email-Wei.Chen@arm.com> References: <1490965679-619-1-git-send-email-Wei.Chen@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-Office365-Filtering-HT: Tenant X-Forefront-Antispam-Report: CIP:217.140.96.140; IPV:CAL; SCL:-1; CTRY:GB; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(39410400002)(39400400002)(39850400002)(39860400002)(39840400002)(39450400003)(2980300002)(438002)(199003)(189002)(50986999)(48376002)(77096006)(76176999)(4326008)(110136004)(38730400002)(6916009)(2950100002)(305945005)(356003)(36756003)(6666003)(5660300001)(47776003)(5003940100001)(189998001)(106466001)(2906002)(2351001)(104016004)(8936002)(54906002)(50226002)(575784001)(86362001)(8676002); DIR:OUT; SFP:1101; SCL:1; SRVR:DB3PR08MB0217; H:nebula.arm.com; FPR:; SPF:Pass; MLV:sfv; A:1; MX:1; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; DB5EUR03FT012; 1:2jPqPmG1ELgPTF3/f3koKOMNWvo2cmE3UTJJZ3fgR5fs2r8H/zB2OXQInplumTNiaQLgxQIJwvEtFvJSSyqVVMpfyYQ+NBfEgNnK10sdfh2UffsbDK5QJg6SI0PsXv8yGlcZThwKF3pTLCs23bbAGrPJiJwmF7k5GOe6ks9FoHiW0d2ZixzUrHtBmfbX+D10nivCVIMbUmn3pl9zHesdN4cnZWx5/uOHoQPGsWTxepgrMrvGQWyk9i1K4QNP+UyzJfsW+7Isydxfk6tFNV41v4ZgB5JxiyDmfjqqfqK8VEiXecMjHPPWiuaEmq2NnN/iyIEUiMg9i8TS+TUABtyilSCM7eriRdjJmRAP9p2lWA7j7eG5AdOQ+B/mZkn2jTkj4VqJufobd/gz5/fjcg8sV3poU381ENjd5rLj0MJHPhjVMbRwFsCVhMY1njGKAu2z7aYhLAl33ihH5XghMte0YU3EQQ29VKMG/uR2j6fkaD7QNLhflywEFQcw4iQj0KMLbU82uX514hlvmLDLC236ZBRNfe6q8mDW3vMxlkLJo/B5SoKAn6cFn+Sw1mhxWP6oBmzJeGniZHRkr7mYf/iacQVSdv4BckHsAxEvwn11O+sGBoZj2bl+kz+2TuPkwfW5 X-MS-Office365-Filtering-Correlation-Id: c5079c96-638b-4051-cc0e-08d47837172b X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(8251501002)(2017030254075)(201703131423075)(201703031133081); SRVR:DB3PR08MB0217; X-Microsoft-Exchange-Diagnostics: 1; DB3PR08MB0217; 3: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 X-Microsoft-Exchange-Diagnostics: 1; DB3PR08MB0217; 25:bs4HRqr094x/sLRK+6MBMjaqdzr9Zb1zTzXzvgW4RSctH3PGSaHhu8vfu5FvYsLaeDbIuNaWl/MltthmJwmaOyFBjNp222fulwJJQeaoDT5I505cfzr18p74jBMvBzKnYJ+RAz3kJTWsXloHGXFS73rYXOMx8HAbg71uOJrix3nUxdSvmHdWfNdeFbwjFkVXMrVeiZhE8PZtTu+4/X8MDtWrhe1qlMuwRTzreozSuqqWalOu/1Q4Qt1cH0przavVsHsTm/zFEkgeZ/bwl/LIX420Ea0aNXUay/hf5ydI5AP9q76MqAVRm/chI7dqvmsFHWSvvCwLID7W/CbANK8T2pNuCLYsTL3xaQ3ND56R3Ztaqlg2/XZFXNl61T86yrGhxNFVcZWJG/YRT7q7SUblXik/GfQSbNVdychUnCTuBK9s4z5CnrQ8WqNf1LZP99+cq1aTgjQDhb390h+9IdeFeg==; 31:J6HgrvE60Sm753a2lKTXDmtbvCmryrnpT1FrLNY3Q8LgWqZM5p/fDozyNLyjEsVnPRZiWudVrwnbIPEi5lLCr7OXIdpckGrWRBQaZpcDQeO4j0QPN/sNmPzwHkmatLPxbj9gOsk3L5zjeK5ydaqz2iqpNJw6x128nsJlZKX4MgqWWJWUwG2GZkbmBU1xdFutHKJaisPnuaYZGURFEPFr0c58qTwZ3Y8VYx+a951d4kCiQjRB3VYw+WxeY3yhF9rB1pwBXCi3hLIZ2ByJObk1rOBX3fyb4Wa8NZeuDmxVgWM= NoDisclaimer: True X-Microsoft-Exchange-Diagnostics: 1; DB3PR08MB0217; 20:6MI+ICCS05VQLM+AATKgR6fMQixyjnv0OgI2uBsjRed0pBKsFRRNcInAhwvcaInLrsgvw8uEwwhRic574ietmlLbF7tC/rNz4RFqtYv/JCvgSrZrDEl14Te16ZHv2iFhgfR7J4PjgHEo2MAP4KW54fyn0wdItH0cKkLGlO2Tqq+qyRV8QGZyi1kzBn/4PiGdFrQEAcNtNh+xSkhzxS6WbROWHaMqq3WvmGT431Ejg+eNGRqjn01VNMOrTfsNbNgR X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(180628864354917)(788757137089); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6040450)(601004)(2401047)(13020025)(13023025)(13024025)(8121501046)(13013025)(5005006)(10201501046)(3002001)(93006095)(93004095)(6055026)(6041248)(20161123562025)(20161123560025)(20161123555025)(201703131423075)(201702281528075)(201703061421075)(20161123564025)(6072148); SRVR:DB3PR08MB0217; BCL:0; PCL:0; RULEID:; SRVR:DB3PR08MB0217; X-Microsoft-Exchange-Diagnostics: 1; DB3PR08MB0217; 4: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 X-Forefront-PRVS: 02638D901B X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; DB3PR08MB0217; 23:BXf2lI4u22CsvAGyEqy/GBYadhL6gM76NYEKsn88a?= =?us-ascii?Q?oV678Z/9o54AX1LDS9jaMir609Nkh5ntTbSCxruWmkcNsNHEJOCCQUhBa08X?= =?us-ascii?Q?HGR5KDIkvfPEz9jqlBTFKAbdd1erCALyHti+1otYU0VrEf2Vps3i5p7H1zen?= =?us-ascii?Q?JLqZuZGHPyXoVpXbsgEwKHr8U8UuAs+F6x2aNAAkfPRuS3N9Q0pnUR7viPSU?= =?us-ascii?Q?LQi8xfgATzUDIS8G+KXqjB0qsMv6dotW76KNsWlFL9LTLjh0yklnAa4RkRx3?= =?us-ascii?Q?kVlgcZd57BBZm0KaTyBUnNVbpDGvFG5UwuVJ6ktaSk66KoW9LnR+/RGfxnC2?= =?us-ascii?Q?bNps/AuwHCyItsJlNBIq9ux/Yy61f0axb2gRlPXDw/CtOUfbKksrZ72P7zgN?= =?us-ascii?Q?PeaQEqUODJPsp9Nwh5C+qQsWBIxWr6b0aN6//FxDpfyYZSupkg8r2KRNGO1W?= =?us-ascii?Q?4/a72moBhzIipATCCbtHm9NhyiSUMYoEuNL4zfPZNaKk98b850rPHzUs2ymD?= =?us-ascii?Q?MPAcvQNjOdN1rtdcFvKg0NhnNM9JCpGj5luXBLSAMZUUTQUlN6ybF6aohKmZ?= =?us-ascii?Q?9f3Ygyn9esXsNmoCmgXJuzwKFMtfd0VhYEvND5at8nAosrdbmmP8OoIwwZFq?= =?us-ascii?Q?mWB6zjS7rIpCrAddoLrATonw0TTojhKXlWUNY4jfkJqy9nDFUhj4FArJNYAY?= =?us-ascii?Q?QwMpUkxWDlZOI6ncIszMWpCa7tiiJ0sC/gHuiuFQ/8+rEHg+OH9V5/ybq6B3?= =?us-ascii?Q?e6DLskbsdyz8cStFFIGwD3c1hCvV2W0WM8uJwKd1pEnOfiLj5KGuvi4pnwA2?= =?us-ascii?Q?qGITQzRFt3qeXCCHsE5E31WWjsbZ4Lq97G7BCxU+O41psxIuaEtmm8kSKbJf?= =?us-ascii?Q?LbPUt9wrfpWBT/aUSinRkgc49qOP77bePnSkzT4vTzYBdbaYp2Mtrer1QKes?= =?us-ascii?Q?G8H9xLEMSc3kjGgjNlxxSKM3vKTMcn/9iICHTSn9Q=3D=3D?= X-Microsoft-Exchange-Diagnostics: 1; DB3PR08MB0217; 6:9vBArtJtczb705MQgcUlxSFPbUVGx+oz9/X5N2dJVWfhPDpJWQJoZ9rsY8FbOclcKqHnzNRrvJC7/nEp7uTYyUzvrmYSnjNkwxn+Ejy+XsH2cxEJo81uHAF69vUou4W8awR9vyHUAFq+NIO+PTS/EjxaYJZxIh4kNGEemZCPIgk99iMtDPCw4Q3KrH3/CGaU7Ri5oirgXfkjXTh70P7CJF+8ALkZd9BssKgYyDFkHwFa/w9d47l0jtmO3+jeKIP6A0pnIxyDC/bRpBY5Coh2yxokQBOavgD8tZvCxZRrtMsXE6sL+0xF8n5WRZSj8WFRNXkwVKZv2mQvVLL5Q9ZU7Ylx+oxQZF9U7yFPFO/zgSQwn4aS1ncGvcgLip36lNuGrO3FpuWmaKQdixaRKdP035eWiDTwtPuSfe0Vfe3Y9EE=; 5:fxnDwtCFuEYsnuXjhcYS3Ml/AuXpESnZSpA1i8j1T9S7UlIAIRVgcE2ta8tT0U/sNPdFgt7iRFgEPoUpkzIjTBfWHe/Ip0gbYMC68OTpXH2mhreb1m2mWK2PDjo/o5tNss5jfBfmXiay0VKBN+cB4kBLtE0T8S78Iz9XqG8ra/w=; 24:iDj8WMvukYZOv5cGS65EbV8bIcmJheHecdvSE5wX9MvJ5S+RPYZewO/hTQVzSYhX27AIP9V5teAOkih1I1F294gBI9w/NVgFrUq7vmKh+M4= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; DB3PR08MB0217; 7:jIgdWQpKIQDasMV2yl+uX8DXtV/jLUqrSB6ZB2xPqfjTe4P4+kIlw0H8IXu29xtv0ZMQ4+MlQUvf7vzkEVf6q/BUrhqw90kvNCNTjiN5aq/wo878uoitULQfL4Lcu42zyrEX6k3Ku1xhjIyWWbfCJ16wvID26VVZldG1jUa3bvswYx/KZ4IUl0naY7n19RVZKiJr4HfCh/njvm5UpHXQKvdt+2h+jUZIfGFAwSxJNosjbWlLosvZ+B59AkVOb9tpsdeWYhGS7RTLhE/ogkBt2I3MzExDPIbSfVs309f0UCr0Su/MIivwxW/CvGiNarTy9mJDjO+SM3GB/cy4p5WXiw== X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2017 13:08:57.1019 (UTC) X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[217.140.96.140]; Helo=[nebula.arm.com] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB3PR08MB0217 Cc: sstabellini@kernel.org, wei.chen@arm.com, steve.capper@arm.com, Kaly.Xin@arm.com, julien.grall@arm.com, nd@arm.com Subject: [Xen-devel] [PATCH v3 16/19] xen/arm: Introduce a macro to synchronize SError X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Virus-Scanned: ClamAV using ClamSMTP In previous patches, we have provided the ability to synchronize SErrors in exception entries. But we haven't synchronized SErrors while returning to guest and doing context switch. So we still have two risks: 1. Slipping hypervisor SErrors to guest. For example, hypervisor triggers a SError while returning to guest, but this SError may be delivered after entering guest. In "DIVERSE" option, this SError would be routed back to guest and panic the guest. But actually, we should crash the whole system due to this hypervisor SError. 2. Slipping previous guest SErrors to the next guest. In "FORWARD" option, if hypervisor triggers a SError while context switching. This SError may be delivered after switching to next vCPU. In this case, this SError will be forwarded to next vCPU and may panic an incorrect guest. So we have have to introduce this macro to synchronize SErrors while returning to guest and doing context switch. We also added a barrier to this macro to prevent compiler reorder our asm volatile code. Signed-off-by: Wei Chen Reviewed-by: Julien Grall Reviewed-by: Stefano Stabellini --- v2->v3: 1. Use a macro to replace function to synchronize SErrors. 2. Add barrier to avoid compiler reorder our code. Note: I had followed Julien's suggestion to add the Assert in to macro, But I found I always hit the Assert. Because when option == DIVERSE, the SKIP_CHECK_PENDING_VSERROR feature would not be set into cpu_hwcaps. And in the later patch, I will use this feature to skip synchronize SErrors before returning to guest. The cpus_has_cap(SKIP_CHECK_PENDING_VSERROR) will always false. And hit the ASSERT. And about the local_abort enable check, should we disable the abort before synchronizing SErrors while returning to guest or doing context switch? Just like in these two places we have disable the IRQ. For this testing, I have apply this series to latest staging tree. ... (XEN) Command line: console=dtuart dtuart=serial0 conswitch=x loglvl=all dom0_mem=8G dom0_max_vcpus=8 serrors=diverse (XEN) Placing Xen at 0x00000083fee00000-0x00000083ff000000 ... (XEN) ----SYNCHRONIZE_SERROR ASSERT 0 1 (XEN) Assertion 'cpus_have_cap(5) && local_abort_is_enabled()' failed at traps.c:2954 (XEN) ----[ Xen-4.9-unstable arm64 debug=y Not tainted ]---- (XEN) CPU: 0 (XEN) PC: 000000000025c09c leave_hypervisor_tail+0xa8/0x100 (XEN) LR: 000000000025c078 (XEN) SP: 00008003fac07e80 (XEN) CPSR: 800002c9 MODE:64-bit EL2h (Hypervisor, handler) (XEN) X0: 000000000000005a X1: 00000000ffffffff X2: 0000000000000000 (XEN) X3: 0000000000000000 X4: 0000000000000010 X5: 0000000000000000 (XEN) X6: 00008003ffe50000 X7: 0000000000000001 X8: 00000000fffffffd (XEN) X9: 000000000000000a X10: 0000000000000031 X11: 00008003fac07bf8 (XEN) X12: 0000000000000001 X13: 000000000026c370 X14: 0000000000000020 (XEN) X15: 0000000000000000 X16: 00000083fff42fc0 X17: 00000000fffffffe (XEN) X18: 0000000000000000 X19: 0000000000292c58 X20: 0000000000290028 (XEN) X21: 00000000002ea000 X22: 0000000000000000 X23: 0000000000000000 (XEN) X24: 0000000000000000 X25: 0000000000000000 X26: 0000000000000000 (XEN) X27: 0000000000000000 X28: 0000000000000000 FP: 00008003fac07e80 (XEN) (XEN) VTCR_EL2: 80043594 (XEN) VTTBR_EL2: 00010083fd036000 (XEN) (XEN) SCTLR_EL2: 30cd183d (XEN) HCR_EL2: 000000008038663f (XEN) TTBR0_EL2: 00000083fef0e000 (XEN) (XEN) ESR_EL2: f2000001 (XEN) HPFAR_EL2: 0000000000000000 (XEN) FAR_EL2: 0000000000000000 (XEN) (XEN) Xen stack trace from sp=00008003fac07e80: (XEN) 00008003fac07ea0 0000000000262934 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000249cac 0000008048000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000008040080000 00000000000001c5 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) Xen call trace: (XEN) [<000000000025c09c>] leave_hypervisor_tail+0xa8/0x100 (PC) (XEN) [<000000000025c078>] leave_hypervisor_tail+0x84/0x100 (LR) (XEN) [<0000000000262934>] return_to_new_vcpu64+0x4/0x30 (XEN) [<0000000000249cac>] domain.c#continue_new_vcpu+0/0xa4 (XEN) (XEN) (XEN) **************************************** (XEN) Panic on CPU 0: (XEN) Assertion 'cpus_have_cap(5) && local_abort_is_enabled()' failed at traps.c:2954 (XEN) **************************************** (XEN) (XEN) Reboot in five seconds... --- xen/include/asm-arm/processor.h | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/xen/include/asm-arm/processor.h b/xen/include/asm-arm/processor.h index bb24bee..a787d1b 100644 --- a/xen/include/asm-arm/processor.h +++ b/xen/include/asm-arm/processor.h @@ -723,6 +723,17 @@ void abort_guest_exit_end(void); ( (unsigned long)abort_guest_exit_end == (r)->pc ) \ ) +/* + * Synchronize SError unless the feature is selected. + * This is relying on the SErrors are currently unmasked. + */ +#define SYNCHRONIZE_SERROR(feat) \ + do { \ + asm volatile(ALTERNATIVE("dsb sy; isb", \ + "nop; nop", feat) \ + : : : "memory"); \ + } while (0) + #endif /* __ASSEMBLY__ */ #endif /* __ASM_ARM_PROCESSOR_H */ /*