From: "Alex Bennée" <alex.bennee@linaro.org>
To: Peter Maydell <peter.maydell@linaro.org>
Cc: qemu-arm@nongnu.org, qemu-devel@nongnu.org, patches@linaro.org
Subject: Re: [Qemu-devel] [Qemu-arm] [PATCH 6/7] target-arm: Implement NSACR trapping behaviour
Date: Fri, 05 Feb 2016 16:07:57 +0000 [thread overview]
Message-ID: <87h9hnnns2.fsf@linaro.org> (raw)
In-Reply-To: <1454506721-11843-7-git-send-email-peter.maydell@linaro.org>
Peter Maydell <peter.maydell@linaro.org> writes:
> Implement some corner cases of the behaviour of the NSACR
> register on ARMv8:
> * if EL3 is AArch64 then accessing the NSACR from Secure EL1
> with AArch32 should trap to EL3
> * if EL3 is not present or is AArch64 then reads from NS EL1 and
> NS EL2 return constant 0xc00
>
> It would in theory be possible to implement all these with
> a single reginfo definition, but for clarity we use three
> separate definitions for the three cases and install the
> right one based on the CPU feature flags.
>
> Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
> ---
> target-arm/helper.c | 62 +++++++++++++++++++++++++++++++++++++++++++++++++----
> 1 file changed, 58 insertions(+), 4 deletions(-)
>
> diff --git a/target-arm/helper.c b/target-arm/helper.c
> index 8bc3ea3..34dc144 100644
> --- a/target-arm/helper.c
> +++ b/target-arm/helper.c
> @@ -3562,6 +3562,25 @@ static const ARMCPRegInfo el2_cp_reginfo[] = {
> REGINFO_SENTINEL
> };
>
> +static CPAccessResult nsacr_access(CPUARMState *env, const ARMCPRegInfo *ri,
> + bool isread)
> +{
> + /* The NSACR is RW at EL3, and RO for NS EL1 and NS EL2.
> + * At Secure EL1 it traps to EL3.
> + */
> + if (arm_current_el(env) == 3) {
> + return CP_ACCESS_OK;
> + }
> + if (arm_is_secure_below_el3(env)) {
> + return CP_ACCESS_TRAP_EL3;
> + }
> + /* Accesses from EL1 NS and EL2 NS are UNDEF for write but allow reads. */
> + if (isread) {
> + return CP_ACCESS_OK;
> + }
> + return CP_ACCESS_TRAP_UNCATEGORIZED;
> +}
> +
> static const ARMCPRegInfo el3_cp_reginfo[] = {
> { .name = "SCR_EL3", .state = ARM_CP_STATE_AA64,
> .opc0 = 3, .opc1 = 6, .crn = 1, .crm = 1, .opc2 = 0,
> @@ -3587,10 +3606,6 @@ static const ARMCPRegInfo el3_cp_reginfo[] = {
> .cp = 15, .opc1 = 0, .crn = 1, .crm = 1, .opc2 = 1,
> .access = PL3_RW, .resetvalue = 0,
> .fieldoffset = offsetoflow32(CPUARMState, cp15.sder) },
> - /* TODO: Implement NSACR trapping of secure EL1 accesses to EL3 */
> - { .name = "NSACR", .cp = 15, .opc1 = 0, .crn = 1, .crm = 1, .opc2 = 2,
> - .access = PL3_W | PL1_R, .resetvalue = 0,
> - .fieldoffset = offsetof(CPUARMState, cp15.nsacr) },
> { .name = "MVBAR", .cp = 15, .opc1 = 0, .crn = 12, .crm = 0, .opc2 = 1,
> .access = PL1_RW, .accessfn = access_trap_aa32s_el1,
> .writefn = vbar_write, .resetvalue = 0,
> @@ -4361,6 +4376,45 @@ void register_cp_regs_for_features(ARMCPU *cpu)
> };
> define_one_arm_cp_reg(cpu, &rvbar);
> }
> + /* The behaviour of NSACR is sufficiently various that we don't
> + * try to describe it in a single reginfo:
> + * if EL3 is 64 bit, then trap to EL3 from S EL1,
> + * reads as constant 0xc00 from NS EL1 and NS EL2
> + * if EL3 is 32 bit, then RW at EL3, RO at NS EL1 and NS EL2
> + * if v7 without EL3, register doesn't exist
> + * if v8 without EL3, reads as constant 0xc00 from NS EL1 and NS EL2
> + */
> + if (arm_feature(env, ARM_FEATURE_EL3)) {
> + if (arm_feature(env, ARM_FEATURE_AARCH64)) {
> + ARMCPRegInfo nsacr = {
> + .name = "NSACR", .type = ARM_CP_CONST,
I was thrown by the ARM_CP_CONST here as there is EL dependency. If
nsacr_access says CP_ACCESS_OK where does the write go? The ARM ARM says
RO and the code in translate-a64 says:
if (ri->type & ARM_CP_CONST) {
/* If not forbidden by access permissions, treat as WI */
return;
}
So we might want to make that clear in the comment.
> + .cp = 15, .opc1 = 0, .crn = 1, .crm = 1, .opc2 = 2,
> + .access = PL1_RW, .accessfn = nsacr_access,
PL1_R?
> + .resetvalue = 0xc00
> + };
> + define_one_arm_cp_reg(cpu, &nsacr);
> + } else {
> + ARMCPRegInfo nsacr = {
> + .name = "NSACR",
> + .cp = 15, .opc1 = 0, .crn = 1, .crm = 1, .opc2 = 2,
> + .access = PL3_RW | PL1_R,
> + .resetvalue = 0,
> + .fieldoffset = offsetof(CPUARMState, cp15.nsacr)
> + };
> + define_one_arm_cp_reg(cpu, &nsacr);
> + }
> + } else {
> + if (arm_feature(env, ARM_FEATURE_V8)) {
> + ARMCPRegInfo nsacr = {
> + .name = "NSACR", .type = ARM_CP_CONST,
> + .cp = 15, .opc1 = 0, .crn = 1, .crm = 1, .opc2 = 2,
> + .access = PL1_R,
> + .resetvalue = 0xc00
> + };
> + define_one_arm_cp_reg(cpu, &nsacr);
> + }
> + }
> +
> if (arm_feature(env, ARM_FEATURE_MPU)) {
> if (arm_feature(env, ARM_FEATURE_V6)) {
> /* PMSAv6 not implemented */
I don't know if a more compact definition would make this easier to
follow?
/* The behaviour of NSACR is sufficiently various we tweak the reginfo:
* if EL3 is 64 bit, then trap to EL3 from S EL1,
* reads as constant 0xc00 from NS EL1 and NS EL2
* if EL3 is 32 bit, then RW at EL3, RO at NS EL1 and NS EL2
* if v7 without EL3, register doesn't exist
* if v8 without EL3, reads as constant 0xc00 from NS EL1 and NS EL2
*/
if (arm_feature(env, ARM_FEATURE_V8) || arm_feature(env, ARM_FEATURE_EL3)) {
ARMCPRegInfo nsacr = {
.name = "NSACR",
.cp = 15, .opc1 = 0, .crn = 1, .crm = 1, .opc2 = 2,
.access = PL1_R,
.resetvalue = 0xc00
};
if (arm_feature(env, ARM_FEATURE_EL3)) {
if (arm_feature(env, ARM_FEATURE_AARCH64)) {
nsacr.type = ARM_CP_CONST; /* if no trap RO */
nsacr.accessfn = nsacr_access;
} else {
nsacr.access = PL3_RW | PL1_R;
nsacr.resetvalue = 0;
nsacr.fieldoffset = offsetof(CPUARMState, cp15.nsacr);
};
} else {
nsacr.type = ARM_CP_CONST;
}
define_one_arm_cp_reg(cpu, &nsacr);
}
--
Alex Bennée
next prev parent reply other threads:[~2016-02-05 16:08 UTC|newest]
Thread overview: 38+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-02-03 13:38 [Qemu-devel] [PATCH 0/7] Fix some more EL3 things and enable EL3 for AArch64 Peter Maydell
2016-02-03 13:38 ` [Qemu-devel] [PATCH 1/7] target-arm: Fix typo in comment in arm_is_secure_below_el3() Peter Maydell
2016-02-05 9:52 ` [Qemu-devel] [Qemu-arm] " Alex Bennée
2016-02-06 11:49 ` [Qemu-devel] " Edgar E. Iglesias
2016-02-06 18:24 ` [Qemu-devel] [Qemu-arm] " Sergey Fedorov
2016-02-03 13:38 ` [Qemu-devel] [PATCH 2/7] target-arm: Implement MDCR_EL3 and SDCR Peter Maydell
2016-02-05 11:13 ` Alex Bennée
2016-02-05 11:28 ` Peter Maydell
2016-02-06 12:04 ` Edgar E. Iglesias
2016-02-06 18:42 ` Sergey Fedorov
2016-02-08 13:11 ` Peter Maydell
2016-02-03 13:38 ` [Qemu-devel] [PATCH 3/7] target-arm: Use access_trap_aa32s_el1() for SCR and MVBAR Peter Maydell
2016-02-05 13:43 ` [Qemu-devel] [Qemu-arm] " Alex Bennée
2016-02-06 12:17 ` [Qemu-devel] " Edgar E. Iglesias
2016-02-06 13:48 ` Peter Maydell
2016-02-06 16:03 ` Edgar E. Iglesias
2016-02-06 16:10 ` Edgar E. Iglesias
2016-02-03 13:38 ` [Qemu-devel] [PATCH 4/7] target-arm: Update arm_generate_debug_exceptions() to handle EL2/EL3 Peter Maydell
2016-02-05 14:09 ` Alex Bennée
2016-02-05 15:55 ` Peter Maydell
2016-02-06 18:43 ` Sergey Fedorov
2016-02-03 13:38 ` [Qemu-devel] [PATCH 5/7] target-arm: Add isread parameter to CPAccessFns Peter Maydell
2016-02-05 14:20 ` Alex Bennée
2016-02-05 14:29 ` Peter Maydell
2016-02-05 16:17 ` Alex Bennée
2016-02-05 16:27 ` Peter Maydell
2016-02-05 16:43 ` Alex Bennée
2016-02-06 16:16 ` Edgar E. Iglesias
2016-02-06 18:52 ` Sergey Fedorov
2016-02-03 13:38 ` [Qemu-devel] [PATCH 6/7] target-arm: Implement NSACR trapping behaviour Peter Maydell
2016-02-05 16:07 ` Alex Bennée [this message]
2016-02-05 16:22 ` [Qemu-devel] [Qemu-arm] " Peter Maydell
2016-02-06 16:42 ` [Qemu-devel] " Edgar E. Iglesias
2016-02-03 13:38 ` [Qemu-devel] [PATCH 7/7] target-arm: Enable EL3 for Cortex-A53 and Cortex-A57 Peter Maydell
2016-02-05 16:08 ` Alex Bennée
2016-02-06 16:43 ` Edgar E. Iglesias
2016-02-06 18:55 ` Sergey Fedorov
2016-02-08 13:18 ` [Qemu-devel] [Qemu-arm] [PATCH 0/7] Fix some more EL3 things and enable EL3 for AArch64 Peter Maydell
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=87h9hnnns2.fsf@linaro.org \
--to=alex.bennee@linaro.org \
--cc=patches@linaro.org \
--cc=peter.maydell@linaro.org \
--cc=qemu-arm@nongnu.org \
--cc=qemu-devel@nongnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).