target/arm: Move get_phys_addr_v6 to ptw.c
Signed-off-by: Richard Henderson <richard.henderson@linaro.org> Message-id: 20220604040607.269301-5-richard.henderson@linaro.org Reviewed-by: Peter Maydell <peter.maydell@linaro.org> Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
This commit is contained in:
parent
f2d2f5ceb8
commit
53c038efb7
@ -10631,7 +10631,7 @@ int ap_to_rw_prot(CPUARMState *env, ARMMMUIdx mmu_idx, int ap, int domain_prot)
|
||||
* @ap: The 2-bit simple AP (AP[2:1])
|
||||
* @is_user: TRUE if accessing from PL0
|
||||
*/
|
||||
static inline int simple_ap_to_rw_prot_is_user(int ap, bool is_user)
|
||||
int simple_ap_to_rw_prot_is_user(int ap, bool is_user)
|
||||
{
|
||||
switch (ap) {
|
||||
case 0:
|
||||
@ -10647,12 +10647,6 @@ static inline int simple_ap_to_rw_prot_is_user(int ap, bool is_user)
|
||||
}
|
||||
}
|
||||
|
||||
static inline int
|
||||
simple_ap_to_rw_prot(CPUARMState *env, ARMMMUIdx mmu_idx, int ap)
|
||||
{
|
||||
return simple_ap_to_rw_prot_is_user(ap, regime_is_user(env, mmu_idx));
|
||||
}
|
||||
|
||||
/* Translate S2 section/page access permissions to protection flags
|
||||
*
|
||||
* @env: CPUARMState
|
||||
@ -10939,159 +10933,6 @@ uint64_t arm_ldq_ptw(CPUState *cs, hwaddr addr, bool is_secure,
|
||||
return 0;
|
||||
}
|
||||
|
||||
bool get_phys_addr_v6(CPUARMState *env, uint32_t address,
|
||||
MMUAccessType access_type, ARMMMUIdx mmu_idx,
|
||||
hwaddr *phys_ptr, MemTxAttrs *attrs, int *prot,
|
||||
target_ulong *page_size, ARMMMUFaultInfo *fi)
|
||||
{
|
||||
CPUState *cs = env_cpu(env);
|
||||
ARMCPU *cpu = env_archcpu(env);
|
||||
int level = 1;
|
||||
uint32_t table;
|
||||
uint32_t desc;
|
||||
uint32_t xn;
|
||||
uint32_t pxn = 0;
|
||||
int type;
|
||||
int ap;
|
||||
int domain = 0;
|
||||
int domain_prot;
|
||||
hwaddr phys_addr;
|
||||
uint32_t dacr;
|
||||
bool ns;
|
||||
|
||||
/* Pagetable walk. */
|
||||
/* Lookup l1 descriptor. */
|
||||
if (!get_level1_table_address(env, mmu_idx, &table, address)) {
|
||||
/* Section translation fault if page walk is disabled by PD0 or PD1 */
|
||||
fi->type = ARMFault_Translation;
|
||||
goto do_fault;
|
||||
}
|
||||
desc = arm_ldl_ptw(cs, table, regime_is_secure(env, mmu_idx),
|
||||
mmu_idx, fi);
|
||||
if (fi->type != ARMFault_None) {
|
||||
goto do_fault;
|
||||
}
|
||||
type = (desc & 3);
|
||||
if (type == 0 || (type == 3 && !cpu_isar_feature(aa32_pxn, cpu))) {
|
||||
/* Section translation fault, or attempt to use the encoding
|
||||
* which is Reserved on implementations without PXN.
|
||||
*/
|
||||
fi->type = ARMFault_Translation;
|
||||
goto do_fault;
|
||||
}
|
||||
if ((type == 1) || !(desc & (1 << 18))) {
|
||||
/* Page or Section. */
|
||||
domain = (desc >> 5) & 0x0f;
|
||||
}
|
||||
if (regime_el(env, mmu_idx) == 1) {
|
||||
dacr = env->cp15.dacr_ns;
|
||||
} else {
|
||||
dacr = env->cp15.dacr_s;
|
||||
}
|
||||
if (type == 1) {
|
||||
level = 2;
|
||||
}
|
||||
domain_prot = (dacr >> (domain * 2)) & 3;
|
||||
if (domain_prot == 0 || domain_prot == 2) {
|
||||
/* Section or Page domain fault */
|
||||
fi->type = ARMFault_Domain;
|
||||
goto do_fault;
|
||||
}
|
||||
if (type != 1) {
|
||||
if (desc & (1 << 18)) {
|
||||
/* Supersection. */
|
||||
phys_addr = (desc & 0xff000000) | (address & 0x00ffffff);
|
||||
phys_addr |= (uint64_t)extract32(desc, 20, 4) << 32;
|
||||
phys_addr |= (uint64_t)extract32(desc, 5, 4) << 36;
|
||||
*page_size = 0x1000000;
|
||||
} else {
|
||||
/* Section. */
|
||||
phys_addr = (desc & 0xfff00000) | (address & 0x000fffff);
|
||||
*page_size = 0x100000;
|
||||
}
|
||||
ap = ((desc >> 10) & 3) | ((desc >> 13) & 4);
|
||||
xn = desc & (1 << 4);
|
||||
pxn = desc & 1;
|
||||
ns = extract32(desc, 19, 1);
|
||||
} else {
|
||||
if (cpu_isar_feature(aa32_pxn, cpu)) {
|
||||
pxn = (desc >> 2) & 1;
|
||||
}
|
||||
ns = extract32(desc, 3, 1);
|
||||
/* Lookup l2 entry. */
|
||||
table = (desc & 0xfffffc00) | ((address >> 10) & 0x3fc);
|
||||
desc = arm_ldl_ptw(cs, table, regime_is_secure(env, mmu_idx),
|
||||
mmu_idx, fi);
|
||||
if (fi->type != ARMFault_None) {
|
||||
goto do_fault;
|
||||
}
|
||||
ap = ((desc >> 4) & 3) | ((desc >> 7) & 4);
|
||||
switch (desc & 3) {
|
||||
case 0: /* Page translation fault. */
|
||||
fi->type = ARMFault_Translation;
|
||||
goto do_fault;
|
||||
case 1: /* 64k page. */
|
||||
phys_addr = (desc & 0xffff0000) | (address & 0xffff);
|
||||
xn = desc & (1 << 15);
|
||||
*page_size = 0x10000;
|
||||
break;
|
||||
case 2: case 3: /* 4k page. */
|
||||
phys_addr = (desc & 0xfffff000) | (address & 0xfff);
|
||||
xn = desc & 1;
|
||||
*page_size = 0x1000;
|
||||
break;
|
||||
default:
|
||||
/* Never happens, but compiler isn't smart enough to tell. */
|
||||
g_assert_not_reached();
|
||||
}
|
||||
}
|
||||
if (domain_prot == 3) {
|
||||
*prot = PAGE_READ | PAGE_WRITE | PAGE_EXEC;
|
||||
} else {
|
||||
if (pxn && !regime_is_user(env, mmu_idx)) {
|
||||
xn = 1;
|
||||
}
|
||||
if (xn && access_type == MMU_INST_FETCH) {
|
||||
fi->type = ARMFault_Permission;
|
||||
goto do_fault;
|
||||
}
|
||||
|
||||
if (arm_feature(env, ARM_FEATURE_V6K) &&
|
||||
(regime_sctlr(env, mmu_idx) & SCTLR_AFE)) {
|
||||
/* The simplified model uses AP[0] as an access control bit. */
|
||||
if ((ap & 1) == 0) {
|
||||
/* Access flag fault. */
|
||||
fi->type = ARMFault_AccessFlag;
|
||||
goto do_fault;
|
||||
}
|
||||
*prot = simple_ap_to_rw_prot(env, mmu_idx, ap >> 1);
|
||||
} else {
|
||||
*prot = ap_to_rw_prot(env, mmu_idx, ap, domain_prot);
|
||||
}
|
||||
if (*prot && !xn) {
|
||||
*prot |= PAGE_EXEC;
|
||||
}
|
||||
if (!(*prot & (1 << access_type))) {
|
||||
/* Access permission fault. */
|
||||
fi->type = ARMFault_Permission;
|
||||
goto do_fault;
|
||||
}
|
||||
}
|
||||
if (ns) {
|
||||
/* The NS bit will (as required by the architecture) have no effect if
|
||||
* the CPU doesn't support TZ or this is a non-secure translation
|
||||
* regime, because the attribute will already be non-secure.
|
||||
*/
|
||||
attrs->secure = false;
|
||||
}
|
||||
*phys_ptr = phys_addr;
|
||||
return false;
|
||||
do_fault:
|
||||
fi->domain = domain;
|
||||
fi->level = level;
|
||||
return true;
|
||||
}
|
||||
|
||||
/*
|
||||
* check_s2_mmu_setup
|
||||
* @cpu: ARMCPU
|
||||
|
153
target/arm/ptw.c
153
target/arm/ptw.c
@ -136,6 +136,159 @@ do_fault:
|
||||
return true;
|
||||
}
|
||||
|
||||
static bool get_phys_addr_v6(CPUARMState *env, uint32_t address,
|
||||
MMUAccessType access_type, ARMMMUIdx mmu_idx,
|
||||
hwaddr *phys_ptr, MemTxAttrs *attrs, int *prot,
|
||||
target_ulong *page_size, ARMMMUFaultInfo *fi)
|
||||
{
|
||||
CPUState *cs = env_cpu(env);
|
||||
ARMCPU *cpu = env_archcpu(env);
|
||||
int level = 1;
|
||||
uint32_t table;
|
||||
uint32_t desc;
|
||||
uint32_t xn;
|
||||
uint32_t pxn = 0;
|
||||
int type;
|
||||
int ap;
|
||||
int domain = 0;
|
||||
int domain_prot;
|
||||
hwaddr phys_addr;
|
||||
uint32_t dacr;
|
||||
bool ns;
|
||||
|
||||
/* Pagetable walk. */
|
||||
/* Lookup l1 descriptor. */
|
||||
if (!get_level1_table_address(env, mmu_idx, &table, address)) {
|
||||
/* Section translation fault if page walk is disabled by PD0 or PD1 */
|
||||
fi->type = ARMFault_Translation;
|
||||
goto do_fault;
|
||||
}
|
||||
desc = arm_ldl_ptw(cs, table, regime_is_secure(env, mmu_idx),
|
||||
mmu_idx, fi);
|
||||
if (fi->type != ARMFault_None) {
|
||||
goto do_fault;
|
||||
}
|
||||
type = (desc & 3);
|
||||
if (type == 0 || (type == 3 && !cpu_isar_feature(aa32_pxn, cpu))) {
|
||||
/* Section translation fault, or attempt to use the encoding
|
||||
* which is Reserved on implementations without PXN.
|
||||
*/
|
||||
fi->type = ARMFault_Translation;
|
||||
goto do_fault;
|
||||
}
|
||||
if ((type == 1) || !(desc & (1 << 18))) {
|
||||
/* Page or Section. */
|
||||
domain = (desc >> 5) & 0x0f;
|
||||
}
|
||||
if (regime_el(env, mmu_idx) == 1) {
|
||||
dacr = env->cp15.dacr_ns;
|
||||
} else {
|
||||
dacr = env->cp15.dacr_s;
|
||||
}
|
||||
if (type == 1) {
|
||||
level = 2;
|
||||
}
|
||||
domain_prot = (dacr >> (domain * 2)) & 3;
|
||||
if (domain_prot == 0 || domain_prot == 2) {
|
||||
/* Section or Page domain fault */
|
||||
fi->type = ARMFault_Domain;
|
||||
goto do_fault;
|
||||
}
|
||||
if (type != 1) {
|
||||
if (desc & (1 << 18)) {
|
||||
/* Supersection. */
|
||||
phys_addr = (desc & 0xff000000) | (address & 0x00ffffff);
|
||||
phys_addr |= (uint64_t)extract32(desc, 20, 4) << 32;
|
||||
phys_addr |= (uint64_t)extract32(desc, 5, 4) << 36;
|
||||
*page_size = 0x1000000;
|
||||
} else {
|
||||
/* Section. */
|
||||
phys_addr = (desc & 0xfff00000) | (address & 0x000fffff);
|
||||
*page_size = 0x100000;
|
||||
}
|
||||
ap = ((desc >> 10) & 3) | ((desc >> 13) & 4);
|
||||
xn = desc & (1 << 4);
|
||||
pxn = desc & 1;
|
||||
ns = extract32(desc, 19, 1);
|
||||
} else {
|
||||
if (cpu_isar_feature(aa32_pxn, cpu)) {
|
||||
pxn = (desc >> 2) & 1;
|
||||
}
|
||||
ns = extract32(desc, 3, 1);
|
||||
/* Lookup l2 entry. */
|
||||
table = (desc & 0xfffffc00) | ((address >> 10) & 0x3fc);
|
||||
desc = arm_ldl_ptw(cs, table, regime_is_secure(env, mmu_idx),
|
||||
mmu_idx, fi);
|
||||
if (fi->type != ARMFault_None) {
|
||||
goto do_fault;
|
||||
}
|
||||
ap = ((desc >> 4) & 3) | ((desc >> 7) & 4);
|
||||
switch (desc & 3) {
|
||||
case 0: /* Page translation fault. */
|
||||
fi->type = ARMFault_Translation;
|
||||
goto do_fault;
|
||||
case 1: /* 64k page. */
|
||||
phys_addr = (desc & 0xffff0000) | (address & 0xffff);
|
||||
xn = desc & (1 << 15);
|
||||
*page_size = 0x10000;
|
||||
break;
|
||||
case 2: case 3: /* 4k page. */
|
||||
phys_addr = (desc & 0xfffff000) | (address & 0xfff);
|
||||
xn = desc & 1;
|
||||
*page_size = 0x1000;
|
||||
break;
|
||||
default:
|
||||
/* Never happens, but compiler isn't smart enough to tell. */
|
||||
g_assert_not_reached();
|
||||
}
|
||||
}
|
||||
if (domain_prot == 3) {
|
||||
*prot = PAGE_READ | PAGE_WRITE | PAGE_EXEC;
|
||||
} else {
|
||||
if (pxn && !regime_is_user(env, mmu_idx)) {
|
||||
xn = 1;
|
||||
}
|
||||
if (xn && access_type == MMU_INST_FETCH) {
|
||||
fi->type = ARMFault_Permission;
|
||||
goto do_fault;
|
||||
}
|
||||
|
||||
if (arm_feature(env, ARM_FEATURE_V6K) &&
|
||||
(regime_sctlr(env, mmu_idx) & SCTLR_AFE)) {
|
||||
/* The simplified model uses AP[0] as an access control bit. */
|
||||
if ((ap & 1) == 0) {
|
||||
/* Access flag fault. */
|
||||
fi->type = ARMFault_AccessFlag;
|
||||
goto do_fault;
|
||||
}
|
||||
*prot = simple_ap_to_rw_prot(env, mmu_idx, ap >> 1);
|
||||
} else {
|
||||
*prot = ap_to_rw_prot(env, mmu_idx, ap, domain_prot);
|
||||
}
|
||||
if (*prot && !xn) {
|
||||
*prot |= PAGE_EXEC;
|
||||
}
|
||||
if (!(*prot & (1 << access_type))) {
|
||||
/* Access permission fault. */
|
||||
fi->type = ARMFault_Permission;
|
||||
goto do_fault;
|
||||
}
|
||||
}
|
||||
if (ns) {
|
||||
/* The NS bit will (as required by the architecture) have no effect if
|
||||
* the CPU doesn't support TZ or this is a non-secure translation
|
||||
* regime, because the attribute will already be non-secure.
|
||||
*/
|
||||
attrs->secure = false;
|
||||
}
|
||||
*phys_ptr = phys_addr;
|
||||
return false;
|
||||
do_fault:
|
||||
fi->domain = domain;
|
||||
fi->level = level;
|
||||
return true;
|
||||
}
|
||||
|
||||
/**
|
||||
* get_phys_addr - get the physical address for this virtual address
|
||||
*
|
||||
|
@ -25,15 +25,18 @@ bool get_level1_table_address(CPUARMState *env, ARMMMUIdx mmu_idx,
|
||||
uint32_t *table, uint32_t address);
|
||||
int ap_to_rw_prot(CPUARMState *env, ARMMMUIdx mmu_idx,
|
||||
int ap, int domain_prot);
|
||||
int simple_ap_to_rw_prot_is_user(int ap, bool is_user);
|
||||
|
||||
static inline int
|
||||
simple_ap_to_rw_prot(CPUARMState *env, ARMMMUIdx mmu_idx, int ap)
|
||||
{
|
||||
return simple_ap_to_rw_prot_is_user(ap, regime_is_user(env, mmu_idx));
|
||||
}
|
||||
|
||||
bool get_phys_addr_pmsav5(CPUARMState *env, uint32_t address,
|
||||
MMUAccessType access_type, ARMMMUIdx mmu_idx,
|
||||
hwaddr *phys_ptr, int *prot,
|
||||
ARMMMUFaultInfo *fi);
|
||||
bool get_phys_addr_v6(CPUARMState *env, uint32_t address,
|
||||
MMUAccessType access_type, ARMMMUIdx mmu_idx,
|
||||
hwaddr *phys_ptr, MemTxAttrs *attrs, int *prot,
|
||||
target_ulong *page_size, ARMMMUFaultInfo *fi);
|
||||
bool get_phys_addr_pmsav7(CPUARMState *env, uint32_t address,
|
||||
MMUAccessType access_type, ARMMMUIdx mmu_idx,
|
||||
hwaddr *phys_ptr, int *prot,
|
||||
|
Loading…
Reference in New Issue
Block a user