Hi Youngin,

In older kernels (4.x), pointer authentication instructions were
incorrectly trapped for EL2. That is why there are `xpaclri` instructions.
I assume that you are using a linux kernel version 4.14.0 from
https://www.gem5.org/documentation/general_docs/fullsystem/building_arm_kernel.
The kernel was patched in version 4.14.95, which can correctly trap those
aforementioned instructions. Either you can use an updated kernel or
disable SECURITY and FEAT_PAuth extensions to solve this problem. You may
find this gerrit change helpful for building/reading about other arm64
kernels:
https://gem5-review.googlesource.com/c/public/gem5-resources/+/59293

Thanks,
Kaustav Goswami.

On Thu, Aug 11, 2022 at 12:05 AM Youngin Kim <yiw...@yonsei.ac.kr> wrote:

> Hi all,
>
> Linux kernel (build as described in
> https://www.gem5.org/documentation/general_docs/fullsystem/building_arm_kernel)
> cannot be booted on gem5 v22.0.0.2.
>
> I've read the question about the same issue here
> https://www.mail-archive.com/gem5-users@gem5.org/msg20813.html.
>
> As Giacomo Travaglini
> <https://www.mail-archive.com/search?l=gem5-users@gem5.org&q=from:%22Giacomo+Travaglini%22>
>  suggested,
> I used gdb to find the cause, and it was XPACLRI instruction.
> Linux kernel 4.18 provided as guest binaries is not calling this function
> and booted well on gem5 v22.0.0.2.
> XPACLRI instruction calls stripPAC function in
> src/arch/arm/pauth_helpers.cc:863, and hypervisor trap is caused there.
>
> Can you give me some advice to solve this issue?
>
> Best
> Youngin Kim
> _______________________________________________
> gem5-users mailing list -- gem5-users@gem5.org
> To unsubscribe send an email to gem5-users-le...@gem5.org
>
_______________________________________________
gem5-users mailing list -- gem5-users@gem5.org
To unsubscribe send an email to gem5-users-le...@gem5.org

Reply via email to