qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
* [Qemu-devel] ARM memory barrier patch
@ 2018-04-17 21:32 Henry Wertz
  2018-04-17 21:51 ` [Qemu-devel] [Qemu-arm] " Peter Maydell
  0 siblings, 1 reply; 3+ messages in thread
From: Henry Wertz @ 2018-04-17 21:32 UTC (permalink / raw)
  To: qemu-arm, QEMU Developers

[-- Attachment #1: Type: text/plain, Size: 973 bytes --]

Please find submitted a patch for ARM memory barriers.  This patch is
against qemu-2.12-rc2 but I do believe it should apply for anything from
2.11.x to current. (the code being patched was added in for 2.11 series.)


I found with qemu 2.11.x or newer that I would get an illegal instruction
error running some Intel binaries on my ARM chromebook.  On investigation,
I found it was quitting on memory barriers.
qemu instruction:
mb $0x31
was translating as:
0x604050cc:  5bf07ff5  blpl     #0x600250a8

After patch it gives:
0x604050cc:  f57ff05b  dmb      ish

In short, I found INSN_DMB_ISH (memory barrier for ARMv7) appeared to be
correct based on online docs, but due to some endian-related shenanigans it
had to be byte-swapped to suit qemu; it appears INSN_DMB_MCR (memory
barrier for ARMv6) also should be byte swapped  (and this patch does so).
I have not checked for correctness of aarch64's barrier instruction.

Signed-off-by: Henry Wertz <hwertz10@gmail.com>

[-- Attachment #2: arm-mb.patch --]
[-- Type: text/x-patch, Size: 911 bytes --]

*** tcg/arm/tcg-target.inc.c.orig	2018-04-04 15:28:50.000000000 -0500
--- tcg/arm/tcg-target.inc.c	2018-04-16 12:55:04.917518898 -0500
***************
*** 158,167 ****
      INSN_LDRD_REG  = 0x000000d0,
      INSN_STRD_IMM  = 0x004000f0,
      INSN_STRD_REG  = 0x000000f0,
  
!     INSN_DMB_ISH   = 0x5bf07ff5,
!     INSN_DMB_MCR   = 0xba0f07ee,
  
      /* Architected nop introduced in v6k.  */
      /* ??? This is an MSR (imm) 0,0,0 insn.  Anyone know if this
         also Just So Happened to do nothing on pre-v6k so that we
--- 158,167 ----
      INSN_LDRD_REG  = 0x000000d0,
      INSN_STRD_IMM  = 0x004000f0,
      INSN_STRD_REG  = 0x000000f0,
  
!     INSN_DMB_ISH   = 0xf57ff05b,
!     INSN_DMB_MCR   = 0xee070fba,
  
      /* Architected nop introduced in v6k.  */
      /* ??? This is an MSR (imm) 0,0,0 insn.  Anyone know if this
         also Just So Happened to do nothing on pre-v6k so that we

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [Qemu-devel] [Qemu-arm] ARM memory barrier patch
  2018-04-17 21:32 [Qemu-devel] ARM memory barrier patch Henry Wertz
@ 2018-04-17 21:51 ` Peter Maydell
  2018-04-17 21:58   ` Richard Henderson
  0 siblings, 1 reply; 3+ messages in thread
From: Peter Maydell @ 2018-04-17 21:51 UTC (permalink / raw)
  To: Henry Wertz; +Cc: qemu-arm, QEMU Developers, Richard Henderson

On 17 April 2018 at 22:32, Henry Wertz <hwertz10@gmail.com> wrote:
> Please find submitted a patch for ARM memory barriers.  This patch is
> against qemu-2.12-rc2 but I do believe it should apply for anything from
> 2.11.x to current. (the code being patched was added in for 2.11 series.)
>
>
> I found with qemu 2.11.x or newer that I would get an illegal instruction
> error running some Intel binaries on my ARM chromebook.  On investigation,
> I found it was quitting on memory barriers.
> qemu instruction:
> mb $0x31
> was translating as:
> 0x604050cc:  5bf07ff5  blpl     #0x600250a8
>
> After patch it gives:
> 0x604050cc:  f57ff05b  dmb      ish
>
> In short, I found INSN_DMB_ISH (memory barrier for ARMv7) appeared to be
> correct based on online docs, but due to some endian-related shenanigans it
> had to be byte-swapped to suit qemu; it appears INSN_DMB_MCR (memory barrier
> for ARMv6) also should be byte swapped  (and this patch does so).
> I have not checked for correctness of aarch64's barrier instruction.
>
> Signed-off-by: Henry Wertz <hwertz10@gmail.com>

Reviewed-by: Peter Maydell <peter.maydell@linaro.org>

Richard, did you want to take this via the tcg tree?

thanks
-- PMM

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [Qemu-devel] [Qemu-arm] ARM memory barrier patch
  2018-04-17 21:51 ` [Qemu-devel] [Qemu-arm] " Peter Maydell
@ 2018-04-17 21:58   ` Richard Henderson
  0 siblings, 0 replies; 3+ messages in thread
From: Richard Henderson @ 2018-04-17 21:58 UTC (permalink / raw)
  To: Peter Maydell, Henry Wertz; +Cc: qemu-arm, QEMU Developers, Richard Henderson

On 04/17/2018 11:51 AM, Peter Maydell wrote:
> On 17 April 2018 at 22:32, Henry Wertz <hwertz10@gmail.com> wrote:
>> Please find submitted a patch for ARM memory barriers.  This patch is
>> against qemu-2.12-rc2 but I do believe it should apply for anything from
>> 2.11.x to current. (the code being patched was added in for 2.11 series.)
>>
>>
>> I found with qemu 2.11.x or newer that I would get an illegal instruction
>> error running some Intel binaries on my ARM chromebook.  On investigation,
>> I found it was quitting on memory barriers.
>> qemu instruction:
>> mb $0x31
>> was translating as:
>> 0x604050cc:  5bf07ff5  blpl     #0x600250a8
>>
>> After patch it gives:
>> 0x604050cc:  f57ff05b  dmb      ish
>>
>> In short, I found INSN_DMB_ISH (memory barrier for ARMv7) appeared to be
>> correct based on online docs, but due to some endian-related shenanigans it
>> had to be byte-swapped to suit qemu; it appears INSN_DMB_MCR (memory barrier
>> for ARMv6) also should be byte swapped  (and this patch does so).
>> I have not checked for correctness of aarch64's barrier instruction.
>>
>> Signed-off-by: Henry Wertz <hwertz10@gmail.com>
> 
> Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
> 
> Richard, did you want to take this via the tcg tree?

Yes, I can do that.


r~

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2018-04-17 21:58 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2018-04-17 21:32 [Qemu-devel] ARM memory barrier patch Henry Wertz
2018-04-17 21:51 ` [Qemu-devel] [Qemu-arm] " Peter Maydell
2018-04-17 21:58   ` Richard Henderson

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).