[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Qemu-arm] [PATCH] don't hardcode EL1 in extended_addresses_enabled
From: |
Stefano Stabellini |
Subject: |
Re: [Qemu-arm] [PATCH] don't hardcode EL1 in extended_addresses_enabled |
Date: |
Thu, 19 Oct 2017 14:08:24 -0700 (PDT) |
User-agent: |
Alpine 2.10 (DEB 1266 2009-07-14) |
On Thu, 19 Oct 2017, Peter Maydell wrote:
> On 18 October 2017 at 23:41, Stefano Stabellini <address@hidden> wrote:
> > extended_addresses_enabled calls arm_el_is_aa64, hardcoding exception
> > level 1. Instead, retrieve the current el calling arm_current_el.
> >
> > Signed-off-by: Stefano Stabellini <address@hidden>
> >
> > diff --git a/target/arm/internals.h b/target/arm/internals.h
> > index 1f6efef..63507d9 100644
> > --- a/target/arm/internals.h
> > +++ b/target/arm/internals.h
> > @@ -187,7 +187,7 @@ static inline unsigned int arm_pamax(ARMCPU *cpu)
> > static inline bool extended_addresses_enabled(CPUARMState *env)
> > {
> > TCR *tcr = &env->cp15.tcr_el[arm_is_secure(env) ? 3 : 1];
> > - return arm_el_is_aa64(env, 1) ||
> > + return arm_el_is_aa64(env, arm_current_el(env)) ||
> > (arm_feature(env, ARM_FEATURE_LPAE) && (tcr->raw_tcr &
> > TTBCR_EAE));
> > }
>
> Hmm. The current code was definitely written under a "aarch64
> only supports EL0 and EL1" assumption, but I'm not sure
> this change is entirely correct.
>
> We use this function in 3 places:
>
> * identifying whether to flush TLBs on CONTEXTIDR writes
> -- using current EL seems like the right thing (but I'm not
> sure -- perhaps we should pass in the S/NS from which
> version of the 32-bit banked register is being updated
> rather than using arm_is_secure(env) ???)
> * choosing a PAR format for ATS operations
> -- using the current EL is closer to correct that what we
> have now. There are cases for a 32-bit CPU in Hyp mode that
> this code mishandles, but we don't support that yet.
> * choosing an FSR value when taking a breakpoint or watchpoint trap
> -- here what we want the function to mean is "what is the
> FSR format for the EL we're about to take this debug
> exception to", which isn't necessarily the answer for the
> current EL (consider 32 bit EL0 under a 64-bit EL1)
>
> So this change will fix the PAR format for ATS operations
> made at AArch64 EL2 when EL1 is AArch32, but it will break
> the FSR format for breakpoints/watchpoints hit at AArch32 EL0
> and taken to AArch64 EL1, I think.
>
> We probably need to separate out these uses to not all try
> to use the same function, and clarify what they're checking.
What if we do use a single extended_addresses_enabled function, but we
pass the EL to check? I think it makes sense, but please check the
changes below, especially the ones to arm_debug_excp_handler.
What do you think?
diff --git a/target/arm/helper.c b/target/arm/helper.c
index 96113fe..2298428 100644
--- a/target/arm/helper.c
+++ b/target/arm/helper.c
@@ -500,7 +500,7 @@ static void contextidr_write(CPUARMState *env, const
ARMCPRegInfo *ri,
ARMCPU *cpu = arm_env_get_cpu(env);
if (raw_read(env, ri) != value && !arm_feature(env, ARM_FEATURE_PMSA)
- && !extended_addresses_enabled(env)) {
+ && !extended_addresses_enabled(env, arm_current_el(env))) {
/* For VMSA (when not using the LPAE long descriptor page table
* format) this register includes the ASID, so do a TLB flush.
* For PMSA it is purely a process ID and no action is needed.
@@ -2162,7 +2162,7 @@ static uint64_t do_ats_write(CPUARMState *env, uint64_t
value,
ret = get_phys_addr(env, value, access_type, mmu_idx,
&phys_addr, &attrs, &prot, &page_size, &fsr, &fi);
- if (extended_addresses_enabled(env)) {
+ if (extended_addresses_enabled(env, arm_current_el(env))) {
/* fsr is a DFSR/IFSR value for the long descriptor
* translation table format, but with WnR always clear.
* Convert it to a 64-bit PAR.
diff --git a/target/arm/internals.h b/target/arm/internals.h
index 43106a2..6792df2 100644
--- a/target/arm/internals.h
+++ b/target/arm/internals.h
@@ -217,10 +217,10 @@ static inline unsigned int arm_pamax(ARMCPU *cpu)
* This is always the case if our translation regime is 64 bit,
* but depends on TTBCR.EAE for 32 bit.
*/
-static inline bool extended_addresses_enabled(CPUARMState *env)
+static inline bool extended_addresses_enabled(CPUARMState *env, unsigned int
el)
{
- TCR *tcr = &env->cp15.tcr_el[arm_is_secure(env) ? 3 : 1];
- return arm_el_is_aa64(env, 1) ||
+ TCR *tcr = &env->cp15.tcr_el[el];
+ return arm_el_is_aa64(env, el) ||
(arm_feature(env, ARM_FEATURE_LPAE) && (tcr->raw_tcr & TTBCR_EAE));
}
diff --git a/target/arm/op_helper.c b/target/arm/op_helper.c
index 3914145..4f46eb8 100644
--- a/target/arm/op_helper.c
+++ b/target/arm/op_helper.c
@@ -1378,7 +1378,7 @@ void arm_debug_excp_handler(CPUState *cs)
cs->watchpoint_hit = NULL;
- if (extended_addresses_enabled(env)) {
+ if (extended_addresses_enabled(env, arm_debug_target_el(env))) {
env->exception.fsr = (1 << 9) | 0x22;
} else {
env->exception.fsr = 0x2;
@@ -1402,7 +1402,7 @@ void arm_debug_excp_handler(CPUState *cs)
return;
}
- if (extended_addresses_enabled(env)) {
+ if (extended_addresses_enabled(env, arm_debug_target_el(env))) {
env->exception.fsr = (1 << 9) | 0x22;
} else {
env->exception.fsr = 0x2;