diff options
Diffstat (limited to 'results/classifier/118/graphic/1748434')
| -rw-r--r-- | results/classifier/118/graphic/1748434 | 102 |
1 files changed, 102 insertions, 0 deletions
diff --git a/results/classifier/118/graphic/1748434 b/results/classifier/118/graphic/1748434 new file mode 100644 index 000000000..5dbb46c8f --- /dev/null +++ b/results/classifier/118/graphic/1748434 @@ -0,0 +1,102 @@ +graphic: 0.933 +performance: 0.917 +semantic: 0.914 +virtual: 0.908 +debug: 0.906 +peripherals: 0.889 +KVM: 0.885 +assembly: 0.885 +permissions: 0.884 +architecture: 0.872 +hypervisor: 0.871 +risc-v: 0.863 +TCG: 0.861 +arm: 0.856 +vnc: 0.855 +device: 0.850 +ppc: 0.839 +PID: 0.831 +kernel: 0.821 +VMM: 0.808 +boot: 0.807 +register: 0.799 +user-level: 0.792 +mistranslation: 0.789 +files: 0.784 +network: 0.770 +socket: 0.766 +x86: 0.746 +i386: 0.662 + +Possibly wrong GICv3 behavior when secure enabled + +I an tried arm-aarch64 interrupt routing to EL3, by SCR_EL3.FIQ=1. First I am started QEMU with secure=on and GICv3 support. +I programmed secure and non-secure timers and set-up appropriate interrupts.Secure timer to be GRP1_Secure and non-secure timer to be GRP1_NonSecure. ICC_PMR = 0xff. Then I switched CPU to EL1. +With that setup no interrupt was delivered to PE. GIC interface showed that non secure IRQ is pending. ICC_PMR read at EL1 returns 0 (shall return value ((PMR_(el3) << 1) & 0xff) according to GIC specification. +Than I tried to increase interrupt priority mask - so I set ICC_PMR = 0x7f (at EL3). Then I read at EL1 ICC_PMR=0xfe - (is shall be 0). With this setup IRQ of secure timer was taken at EL3, non secure timer didn't rise IRQ (as it is masked by PMR). +I dig to qemu code and see wrong condition in file arm_gicv3_cpuif.c in function icc_pmr_read(). This behavior is opposite of ARM specification. + +see possible solution, in #if 0 is original code in #else see possible fix + +static uint64_t icc_pmr_read(CPUARMState *env, const ARMCPRegInfo *ri) +.... +#if 0 // KIURCHER: bug - shall be opposite; see ARM specification + if (value & 0x80) { + /* Secure priorities not visible to NS */ + value = 0; + } else if (value != 0xff) { + value = (value << 1) & 0xff; + } +#else + + if (value & 0x80) { + value = (value << 1) & 0xff; + } else { + value = 0; + } +#endif +.... + + +static void icc_pmr_write(CPUARMState *env, const ARMCPRegInfo *ri, + uint64_t value) +.... +#if 0 //KIURCHER: bug + if (arm_feature(env, ARM_FEATURE_EL3) && !arm_is_secure(env) && + (env->cp15.scr_el3 & SCR_FIQ)) { + /* NS access and Group 0 is inaccessible to NS: return the + * NS view of the current priority + */ + if (!(cs->icc_pmr_el1 & 0x80)) { + /* Current PMR in the secure range, don't allow NS to change it */ + return; + } + value = (value >> 1) & 0x80; + } +#else + if (arm_feature(env, ARM_FEATURE_EL3) && !arm_is_secure(env) && + (env->cp15.scr_el3 & SCR_FIQ)) { + /* NS access and Group 0 is inaccessible to NS: return the + * NS view of the current priority + */ + if (!(cs->icc_pmr_el1 & 0x80)) { + /* Current PMR in the secure range, don't allow NS to change it */ + return; + } + value = (value >> 1) | 0x80; + } +#endif + + + + +Whoops, yes, we have the wrong condition for ICC_PMR non-secure reads and writes. We also have the same bug in ICC_RPR reads. I'll put together a patch and send it to the mailing list. + + +Patch which should fix this: +https://lists.gnu.org/archive/html/qemu-devel/2018-03/msg04537.html + + +Now fixed in master in commit a2e2d7fc46fd8be, so will be in 2.12.0. + + |