diff options
author | Stafford Horne <shorne@gmail.com> | 2022-05-11 20:47:50 +0900 |
---|---|---|
committer | Stafford Horne <shorne@gmail.com> | 2022-05-15 10:33:01 +0900 |
commit | e8f0ab0cd674241cbab7231ce05ac1bfa0b4f5ed (patch) | |
tree | 65fb9cf7c8ca8eef430b1904ab8e9e76ca5ced89 /target/openrisc/cpu-param.h | |
parent | a92162f4f1dfc2daf1bc8f2bbc3cad3c9d1ea729 (diff) | |
download | qemu-e8f0ab0cd674241cbab7231ce05ac1bfa0b4f5ed.zip qemu-e8f0ab0cd674241cbab7231ce05ac1bfa0b4f5ed.tar.gz qemu-e8f0ab0cd674241cbab7231ce05ac1bfa0b4f5ed.tar.bz2 |
target/openrisc: Do not reset delay slot flag on early tb exit
This was found when running linux crypto algorithm selftests used by
wireguard. We found that randomly the tests would fail. We found
through investigation that a combination of a tick timer interrupt,
raised when executing a delay slot instruction at a page boundary caused
the issue.
This was caused when handling the TB_EXIT_REQUESTED case in cpu_tb_exec.
On OpenRISC, which doesn't implement synchronize_from_tb, set_pc was
being used as a fallback. The OpenRISC set_pc implementation clears
dflag, which caused the exception handling logic to not account for the
delay slot. This was the bug, because it meant when execution resumed
after the interrupt was handling it resumed in the wrong place.
Fix this by implementing synchronize_from_tb which simply updates pc,
and not clear the delay slot flag.
Reported-by: Jason A. Donenfeld <Jason@zx2c4.com>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Signed-off-by: Stafford Horne <shorne@gmail.com>
Diffstat (limited to 'target/openrisc/cpu-param.h')
0 files changed, 0 insertions, 0 deletions