From patchwork Tue Jun 2 11:26:50 2015 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Aurelien Jarno X-Patchwork-Id: 479420 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from lists.gnu.org (lists.gnu.org [IPv6:2001:4830:134:3::11]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 511AD1412E2 for ; Tue, 2 Jun 2015 21:34:03 +1000 (AEST) Received: from localhost ([::1]:57674 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1YzkSG-0002Sj-TC for incoming@patchwork.ozlabs.org; Tue, 02 Jun 2015 07:34:00 -0400 Received: from eggs.gnu.org ([2001:4830:134:3::10]:39027) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1YzkLb-0006Va-0l for qemu-devel@nongnu.org; Tue, 02 Jun 2015 07:27:07 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1YzkLY-0003OL-MI for qemu-devel@nongnu.org; Tue, 02 Jun 2015 07:27:06 -0400 Received: from hall.aurel32.net ([2001:bc8:30d7:101::1]:59987) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1YzkLY-0003NZ-Gg for qemu-devel@nongnu.org; Tue, 02 Jun 2015 07:27:04 -0400 Received: from weber.rr44.fr ([2001:470:d4ed:0:7e05:7ff:fe0d:f152]) by hall.aurel32.net with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.84) (envelope-from ) id 1YzkLV-0006Go-5Y; Tue, 02 Jun 2015 13:27:01 +0200 Received: from aurel32 by weber.rr44.fr with local (Exim 4.85) (envelope-from ) id 1YzkLT-0002YF-VH; Tue, 02 Jun 2015 13:26:59 +0200 From: Aurelien Jarno To: qemu-devel@nongnu.org Date: Tue, 2 Jun 2015 13:26:50 +0200 Message-Id: <1433244411-9693-5-git-send-email-aurelien@aurel32.net> X-Mailer: git-send-email 2.1.4 In-Reply-To: <1433244411-9693-1-git-send-email-aurelien@aurel32.net> References: <1433244411-9693-1-git-send-email-aurelien@aurel32.net> X-detected-operating-system: by eggs.gnu.org: Error: Malformed IPv6 address (bad octet value). X-Received-From: 2001:bc8:30d7:101::1 Cc: Peter Maydell , Alexander Graf , Yongbok Kim , Paolo Bonzini , Leon Alrae , =?UTF-8?q?Andreas=20F=C3=A4rber?= , Aurelien Jarno , Richard Henderson Subject: [Qemu-devel] [PATCH RFC 4/5] target-s390x: function to adjust the length wrt page boundary X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org Sender: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org This patch adds a function to adjust the length of a transfer so that it doesn't cross a page boundary. Cc: Alexander Graf Cc: Richard Henderson Signed-off-by: Aurelien Jarno --- target-s390x/mem_helper.c | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/target-s390x/mem_helper.c b/target-s390x/mem_helper.c index 9fe9ed7..f34f2e1 100644 --- a/target-s390x/mem_helper.c +++ b/target-s390x/mem_helper.c @@ -55,6 +55,17 @@ void tlb_fill(CPUState *cs, target_ulong addr, int is_write, int mmu_idx, #endif #ifndef CONFIG_USER_ONLY + +/* Reduce the length so that addr + len doesn't cross a page boundary. */ +static inline uint64_t adj_len_to_page(uint64_t len, uint64_t addr) +{ + if ((addr & TARGET_PAGE_MASK) != ((addr + len - 1) & TARGET_PAGE_MASK)) { + return -addr & ~TARGET_PAGE_MASK; + } else { + return len; + } +} + static void mvc_fast_memset(CPUS390XState *env, uint32_t l, uint64_t dest, uint8_t byte) {