From: Richard Henderson <richard.henderson@linaro.org>
To: Thomas Huth <thuth@redhat.com>, qemu-devel@nongnu.org
Cc: david@redhat.com
Subject: Re: [PATCH 1/7] target/s390x: Fix s390_probe_access for user-only
Date: Thu, 16 Mar 2023 07:29:21 -0700 [thread overview]
Message-ID: <827834f4-f87c-b0a7-6e61-68cd3c48c8e1@linaro.org> (raw)
In-Reply-To: <646d6c84-4004-6fce-20de-6f327b3975db@redhat.com>
On 3/15/23 08:30, Thomas Huth wrote:
> On 09/01/2023 21.18, Richard Henderson wrote:
>> In db9aab5783a2 we broke the contract of s390_probe_access, in that it
>> no longer returned an exception code, nor set __excp_addr. Fix both.
>>
>> Reported-by: David Hildenbrand <david@redhat.com>
>> Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
>> ---
>> target/s390x/tcg/mem_helper.c | 31 ++++++++++++++++++-------------
>> 1 file changed, 18 insertions(+), 13 deletions(-)
>>
>> diff --git a/target/s390x/tcg/mem_helper.c b/target/s390x/tcg/mem_helper.c
>> index cb82cd1c1d..5c0a7b1961 100644
>> --- a/target/s390x/tcg/mem_helper.c
>> +++ b/target/s390x/tcg/mem_helper.c
>> @@ -138,23 +138,27 @@ typedef struct S390Access {
>> * For !CONFIG_USER_ONLY, the TEC is stored stored to env->tlb_fill_tec.
>> * For CONFIG_USER_ONLY, the faulting address is stored to env->__excp_addr.
>> */
>> -static int s390_probe_access(CPUArchState *env, target_ulong addr, int size,
>> - MMUAccessType access_type, int mmu_idx,
>> - bool nonfault, void **phost, uintptr_t ra)
>> +static inline int s390_probe_access(CPUArchState *env, target_ulong addr,
>> + int size, MMUAccessType access_type,
>> + int mmu_idx, bool nonfault,
>> + void **phost, uintptr_t ra)
>> {
>> -#if defined(CONFIG_USER_ONLY)
>> - return probe_access_flags(env, addr, access_type, mmu_idx,
>> - nonfault, phost, ra);
>> -#else
>> - int flags;
>> + int flags = probe_access_flags(env, addr, access_type, mmu_idx,
>> + nonfault, phost, ra);
>> - env->tlb_fill_exc = 0;
>> - flags = probe_access_flags(env, addr, access_type, mmu_idx, nonfault, phost,
>> - ra);
>> - if (env->tlb_fill_exc) {
>> + if (unlikely(flags & TLB_INVALID_MASK)) {
>> + assert(!nonfault);
>
> Hi Richard,
>
> qemu-system-s390x now triggers on this assert() if running the
> kvm-unit-tests in TCG mode:
>
> $ qemu-system-s390x -nographic -kernel s390x/mvpg.elf
> ...
> PASS: mvpg: exceptions: specification: Key Function Control value 27
> PASS: mvpg: exceptions: specification: Key Function Control value 28
> PASS: mvpg: exceptions: specification: Key Function Control value 29
> PASS: mvpg: exceptions: specification: Key Function Control value 30
> PASS: mvpg: exceptions: specification: Key Function Control value 31
> qemu-system-s390x: ../../devel/qemu/target/s390x/tcg/mem_helper.c:152: s390_probe_access:
> Assertion `!nonfault' failed.
> Aborted (core dumped)
>
> If I've got the test right, it tries to do a "mvpg" with an illegal
> address and expects to see an addressing exception.
>
> It seems to work when I remove the assert() statement. Could we maybe
> replace it with a qemu_log_mask(LOG_GUEST_ERROR, ...) instead?
This is a pre-coffee guess, but the assert looks backward.
We should only arrive there if nonfault was true for the probe (otherwise the probe would
have raised the exception directly). I would think we could just remove the assert.
r~
next prev parent reply other threads:[~2023-03-16 14:30 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-01-09 20:18 [PATCH 0/7] target/s390x: mem_helper.c cleanups Richard Henderson
2023-01-09 20:18 ` [PATCH 1/7] target/s390x: Fix s390_probe_access for user-only Richard Henderson
2023-01-11 10:12 ` David Hildenbrand
2023-03-15 15:30 ` Thomas Huth
2023-03-16 14:29 ` Richard Henderson [this message]
2023-01-09 20:18 ` [PATCH 2/7] target/s390x: Pass S390Access pointer into access_prepare Richard Henderson
2023-01-11 10:13 ` David Hildenbrand
2023-01-09 20:18 ` [PATCH 3/7] target/s390x: Use void* for haddr in S390Access Richard Henderson
2023-01-11 10:15 ` David Hildenbrand
2023-01-09 20:18 ` [PATCH 4/7] target/s390x: Tidy access_prepare_nf Richard Henderson
2023-01-11 10:15 ` David Hildenbrand
2023-01-09 20:18 ` [PATCH 5/7] target/s390x: Remove TLB_NOTDIRTY workarounds Richard Henderson
2023-01-11 10:19 ` David Hildenbrand
2023-01-09 20:18 ` [PATCH 6/7] target/s390x: Inline do_access_{get,set}_byte Richard Henderson
2023-01-11 10:20 ` David Hildenbrand
2023-01-09 20:18 ` [PATCH 7/7] target/s390x: Hoist some computation in access_memmove Richard Henderson
2023-01-11 10:22 ` David Hildenbrand
2023-02-20 17:53 ` [PATCH 0/7] target/s390x: mem_helper.c cleanups Thomas Huth
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=827834f4-f87c-b0a7-6e61-68cd3c48c8e1@linaro.org \
--to=richard.henderson@linaro.org \
--cc=david@redhat.com \
--cc=qemu-devel@nongnu.org \
--cc=thuth@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).