From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:60172) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1Yspiz-0004YO-A6 for qemu-devel@nongnu.org; Thu, 14 May 2015 05:46:42 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1Yspiw-0002O2-27 for qemu-devel@nongnu.org; Thu, 14 May 2015 05:46:41 -0400 Received: from mailapp01.imgtec.com ([195.59.15.196]:7892) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1Yspiv-0002MV-Lh for qemu-devel@nongnu.org; Thu, 14 May 2015 05:46:37 -0400 Message-ID: <55546EFB.7060702@imgtec.com> Date: Thu, 14 May 2015 10:46:35 +0100 From: Yongbok Kim MIME-Version: 1.0 References: <1431531457-17127-1-git-send-email-yongbok.kim@imgtec.com> <1431531457-17127-3-git-send-email-yongbok.kim@imgtec.com> <5553A5C4.6030902@twiddle.net> <5554641F.30308@imgtec.com> In-Reply-To: <5554641F.30308@imgtec.com> Content-Type: text/plain; charset="windows-1252" Content-Transfer-Encoding: 7bit Subject: Re: [Qemu-devel] [PATCH v3 2/2] target-mips: Misaligned memory accesses for MSA List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Richard Henderson , qemu-devel@nongnu.org Cc: peter.maydell@linaro.org, leon.alrae@imgtec.com, afaerber@suse.de On 14/05/2015 10:00, Yongbok Kim wrote: > On 13/05/2015 20:28, Richard Henderson wrote: >> On 05/13/2015 08:37 AM, Yongbok Kim wrote: >>> +static inline void ensure_atomic_msa_block_access(CPUMIPSState *env, >>> + target_ulong addr, >>> + int rw, >>> + int mmu_idx) >>> { >>> +#if !defined(CONFIG_USER_ONLY) >>> +#define MSA_PAGESPAN(x) (unlikely((((x) & ~TARGET_PAGE_MASK) \ >>> + + MSA_WRLEN/8 - 1) >= TARGET_PAGE_SIZE)) >>> + CPUState *cs = CPU(mips_env_get_cpu(env)); >>> + target_ulong page_addr; >>> >>> + if (MSA_PAGESPAN(addr)) { >>> + /* first page */ >>> + tlb_fill(cs, addr, rw, mmu_idx, 0); >>> + /* second page */ >>> + page_addr = (addr & TARGET_PAGE_MASK) + TARGET_PAGE_SIZE; >>> + tlb_fill(cs, page_addr, rw, mmu_idx, 0); >>> } >>> +#endif >>> } >> This doesn't do quite what you think it does. It does trap if the page isn't >> mapped at all, but it doesn't trap if e.g. rw is set and the page is read-only. >> That requires a subsequent check for what permissions were installed by >> tlb_set_page. > I must double check the behaviour but please note that here we are filling qemu's tlb entries > according to target's tlb entries. Therefore permission issue would be cleared. > I agree with your comment from later email that for the load this is too much as all load can > be issued and storing into the vector register can be followed. > I wasn't sure that because this tlb filling is happening only if an access is crossing the page boundary. > > In addition to that, if we issue all the loads let say only the first page is accessible, in the architectural point of view it would be fine as nothing will be stored in the vector register but accessing the first page is "visible" from the data bus. Do you think this wouldn't cause any problem? It might be just implementation dependent though. Regards, Yongbok