Port-xen archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: strange SIGILL (under Xen)



Greg Troxel <gdt%lexort.com@localhost> writes:

> gdb points at
>
> 431     extern __inline int
> 432     __attribute__ ((__gnu_inline__, __always_inline__, __artificial__))
> 433     _mm256_movemask_epi8 (__m256i __A)
> 434     {
> 435       return __builtin_ia32_pmovmskb256 ((__v32qi)__A);
> 436     }

This is, as far as I can tell AVX2.  ccache seems to intend to check cpu
features, and my CPU indeed has AVX2.  (Alder Lake also originally had
AVX-512 on P cores only, not E cores, but now it just doesn't.)

Booting into GENERIC on bare metal, ccache works fine.

So it seems that in a PV dom0 and in a PV domU, AVX2 instructions fault.


I found at
https://xenbits.xen.org/docs/unstable/misc/xen-command-line.html

  1.2.179 spec-ctrl (x86)

  [snip]
  
  On all hardware, the gds-mit= option can be used to force or prevent
  Xen from mitigating the GDS (Gather Data Sampling) vulnerability. By
  default, Xen will mitigate GDS on hardware believed to be
  vulnerable. On hardware supporting GDS_CTRL (requires the August 2023
  microcode), and where firmware has elected not to lock the
  configuration, Xen will use GDS_CTRL to mitigate GDS with. Otherwise,
  Xen will mitigate by disabling AVX, which blocks the use of the AVX2
  Gather instructions.

but booting with that did not seem to help.


Home | Main Index | Thread Index | Old Index