summaryrefslogtreecommitdiffstats
path: root/results/classifier/zero-shot/118/none/1768295
diff options
context:
space:
mode:
Diffstat (limited to 'results/classifier/zero-shot/118/none/1768295')
-rw-r--r--results/classifier/zero-shot/118/none/176829590
1 files changed, 90 insertions, 0 deletions
diff --git a/results/classifier/zero-shot/118/none/1768295 b/results/classifier/zero-shot/118/none/1768295
new file mode 100644
index 00000000..c3f4faf6
--- /dev/null
+++ b/results/classifier/zero-shot/118/none/1768295
@@ -0,0 +1,90 @@
+graphic: 0.681
+user-level: 0.679
+permissions: 0.620
+virtual: 0.604
+semantic: 0.517
+mistranslation: 0.508
+assembly: 0.506
+debug: 0.483
+device: 0.474
+hypervisor: 0.469
+vnc: 0.457
+risc-v: 0.455
+PID: 0.440
+peripherals: 0.437
+VMM: 0.434
+performance: 0.420
+architecture: 0.419
+register: 0.414
+TCG: 0.408
+arm: 0.398
+kernel: 0.383
+boot: 0.379
+network: 0.370
+KVM: 0.365
+i386: 0.334
+ppc: 0.318
+socket: 0.291
+files: 0.284
+x86: 0.231
+
+VLLDM/VLSTM trigger UsageFault in the Secure Mode
+
+The VLLDM/VLSTM instructions trigger UsageFault when they are supposed to behave as NOP.
+
+Version:
+$ qemu-system-arm --version QEMU emulator version 2.11.93
+
+VLLDM and VLSTM are instructions newly added to ARMv8-M Mainline Profile. Although they are FP instructions and the FP support of the M profile is not implemented by QEMU, the Armv8-M Architecture Reference Manual specifies that they should behave as NOP even in this case:
+
+C2.4.268 VLLDM:
+
+> If the Floating-point Extension is not implemented, this instruction is available in Secure state, but behaves as a NOP.
+
+C2.4.269 VLSTM:
+
+> If the Floating-point Extension is not implemented, this instruction is available in Secure state, but behaves as a NOP.
+
+VLLDM and VLSTM are generated automatically by the compiler to save and restore the floating point registers (in a lazy manner) during a Non-Secure function call. An example is shown below:
+
+10000064 <__gnu_cmse_nonsecure_call>:
+10000064: e92d 4fe0 stmdb sp!, {r5, r6, r7, r8, r9, sl, fp, lr}
+10000068: 4627 mov r7, r4
+1000006a: 46a0 mov r8, r4
+1000006c: 46a1 mov r9, r4
+1000006e: 46a2 mov sl, r4
+10000070: 46a3 mov fp, r4
+10000072: 46a4 mov ip, r4
+10000074: b0a2 sub sp, #136 ; 0x88
+10000076: ec2d 0a00 vlstm sp
+1000007a: f384 8800 msr CPSR_f, r4
+1000007e: 4625 mov r5, r4
+10000080: 4626 mov r6, r4
+10000082: 47a4 blxns r4
+10000084: ec3d 0a00 vlldm sp
+10000088: b022 add sp, #136 ; 0x88
+1000008a: e8bd 8fe0 ldmia.w sp!, {r5, r6, r7, r8, r9, sl, fp, pc}
+
+Yes, you're right -- I hadn't noticed this wrinkle of the architecture. I'll put this on my todo list -- it should be straightforward.
+
+Do you have a convenient test binary that I could use as a test case?
+
+
+I attached a ZIP file containing a set of binary images that reproduces the problem.
+
+Secure.elf and NonSecure.elf contain codes that run in the Secure/Non-Secure mode, respectively. They must be loaded simultaneously by using the generic loader:
+
+ $ qemu-system-arm -device loader,file=Secure.elf -kernel NonSecure.elf -machine mps2-an505 -nographic -s -cpu cortex-m33
+
+The problematic instructions are located in 0x10000064 <__gnu_cmse_nonsecure_call> of Secure.elf. The program runs successfully and outputs some message via UART0 if they are replaced with NOPs, as shown below:
+
+ $ qemu-system-arm -device loader,file=Secure-patched.elf -kernel NonSecure.elf -machine mps2-an505 -nographic -s -cpu cortex-m33
+ I'm running in the Non-Secure mode.
+
+
+Submitted this patch for review which should fix this bug:
+https://patchwork.ozlabs.org/patch/907959/
+
+
+Fix now in master as commit b1e5336a9899016c53d59 (and cc stable), so should be in 3.0 and 2.12.1.
+