qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
From: Alistair Francis <alistair23@gmail.com>
To: MingZhu Yan <trdthg47@gmail.com>
Cc: qemu-riscv@nongnu.org, qemu-devel@nongnu.org,
	 MingZhu Yan <yanmingzhu@iscas.ac.cn>
Subject: Re: [PATCH] hw/char/riscv_htif: Fix htif_mm_write that causes infinite loop in ACT.
Date: Tue, 1 Oct 2024 16:12:14 +1000	[thread overview]
Message-ID: <CAKmqyKMobSzu-q8jdPhAU9PMG2GsGG1eOsemSS-Ny2vrX+wSbQ@mail.gmail.com> (raw)
In-Reply-To: <20240927083508.59483-1-yanmingzhu@iscas.ac.cn>

On Fri, Sep 27, 2024 at 11:26 PM MingZhu Yan <trdthg47@gmail.com> wrote:
>
> Applications sometimes only write the lower 32-bit payload bytes, this is used
> in ACT tests. As a workaround, this refers to the solution of sail-riscv.

I'm not sure what ACT is, but this feels like a guest bug, not a QEMU issue.

Alistair

> if the payload is written a few times with the same value, we process the whole
> htif command anyway.
>
> Signed-off-by: MingZhu Yan <yanmingzhu@iscas.ac.cn>
> ---
>  hw/char/riscv_htif.c | 35 +++++++++++++++++++----------------
>  1 file changed, 19 insertions(+), 16 deletions(-)
>
> diff --git a/hw/char/riscv_htif.c b/hw/char/riscv_htif.c
> index 9bef60def1..d74cce3bef 100644
> --- a/hw/char/riscv_htif.c
> +++ b/hw/char/riscv_htif.c
> @@ -65,16 +65,8 @@ void htif_symbol_callback(const char *st_name, int st_info, uint64_t st_value,
>  {
>      if (strcmp("fromhost", st_name) == 0) {
>          fromhost_addr = st_value;
> -        if (st_size != 8) {
> -            error_report("HTIF fromhost must be 8 bytes");
> -            exit(1);
> -        }
>      } else if (strcmp("tohost", st_name) == 0) {
>          tohost_addr = st_value;
> -        if (st_size != 8) {
> -            error_report("HTIF tohost must be 8 bytes");
> -            exit(1);
> -        }
>      } else if (strcmp("begin_signature", st_name) == 0) {
>          begin_sig_addr = st_value;
>      } else if (strcmp("end_signature", st_name) == 0) {
> @@ -290,18 +282,26 @@ static void htif_mm_write(void *opaque, hwaddr addr,
>                            uint64_t value, unsigned size)
>  {
>      HTIFState *s = opaque;
> -    if (addr == TOHOST_OFFSET1) {
> -        if (s->tohost == 0x0) {
> -            s->allow_tohost = 1;
> -            s->tohost = value & 0xFFFFFFFF;
> +    int htif_cmd_write = 0;
> +    if (size == 8 && addr == TOHOST_OFFSET1) {
> +        htif_cmd_write = 1;
> +        s->tohost = value;
> +        htif_handle_tohost_write(s, s->tohost);
> +    } else if (size == 4 && addr == TOHOST_OFFSET1) {
> +        if ((value) == (s->tohost & 0xFFFF)) {
> +            s->allow_tohost = s->allow_tohost + 1;
>          } else {
>              s->allow_tohost = 0;
>          }
> -    } else if (addr == TOHOST_OFFSET2) {
> -        if (s->allow_tohost) {
> -            s->tohost |= value << 32;
> -            htif_handle_tohost_write(s, s->tohost);
> +        s->tohost = deposit64(s->tohost, 0, 32, value);
> +    } else if (size == 4 && addr == TOHOST_OFFSET2) {
> +        if ((value & 0xFF) == (s->tohost & 0xFF00)) {
> +            s->allow_tohost = s->allow_tohost + 1;
> +        } else {
> +            s->allow_tohost = 1;
>          }
> +        htif_cmd_write = 1;
> +        s->tohost = deposit64(s->tohost, 32, 32, value);
>      } else if (addr == FROMHOST_OFFSET1) {
>          s->fromhost_inprogress = 1;
>          s->fromhost = value & 0xFFFFFFFF;
> @@ -312,6 +312,9 @@ static void htif_mm_write(void *opaque, hwaddr addr,
>          qemu_log("Invalid htif write: address %016" PRIx64 "\n",
>              (uint64_t)addr);
>      }
> +    if ((s->tohost == 1 && htif_cmd_write) || s->allow_tohost > 2) {
> +        htif_handle_tohost_write(s, s->tohost);
> +    }
>  }
>
>  static const MemoryRegionOps htif_mm_ops = {
> --
> 2.34.1
>
>


  reply	other threads:[~2024-10-01 16:13 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-09-27  8:35 [PATCH] hw/char/riscv_htif: Fix htif_mm_write that causes infinite loop in ACT MingZhu Yan
2024-10-01  6:12 ` Alistair Francis [this message]
2024-10-14 10:08   ` 阎明铸
2024-10-16  5:27     ` Alistair Francis
     [not found]       ` <CAPVrrNLf449o57ZsC-T5qZeWJcQvvfOBVd+U+m60dwzvf3RBxg@mail.gmail.com>
2024-10-16 10:32         ` Fwd: " Trd thg
2024-10-17  4:22           ` Alistair Francis
  -- strict thread matches above, loose matches on Subject: below --
2024-09-27  7:00 MingZhu Yan

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CAKmqyKMobSzu-q8jdPhAU9PMG2GsGG1eOsemSS-Ny2vrX+wSbQ@mail.gmail.com \
    --to=alistair23@gmail.com \
    --cc=qemu-devel@nongnu.org \
    --cc=qemu-riscv@nongnu.org \
    --cc=trdthg47@gmail.com \
    --cc=yanmingzhu@iscas.ac.cn \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).