From: Palmer Dabbelt <palmer@sifive.com> To: Peter Maydell <peter.maydell@linaro.org> Cc: Alistair Francis <alistair.francis@wdc.com>, Palmer Dabbelt <palmer@sifive.com>, qemu-riscv@nongnu.org, qemu-devel@nongnu.org, Hesham Almatary <Hesham.Almatary@cl.cam.ac.uk> Subject: [Qemu-devel] [PULL 06/32] RISC-V: Raise access fault exceptions on PMP violations Date: Wed, 3 Jul 2019 01:40:22 -0700 [thread overview] Message-ID: <20190703084048.6980-7-palmer@sifive.com> (raw) In-Reply-To: <20190703084048.6980-1-palmer@sifive.com> From: Hesham Almatary <Hesham.Almatary@cl.cam.ac.uk> Section 3.6 in RISC-V v1.10 privilege specification states that PMP violations report "access exceptions." The current PMP implementation has a bug which wrongly reports "page exceptions" on PMP violations. This patch fixes this bug by reporting the correct PMP access exceptions trap values. Signed-off-by: Hesham Almatary <Hesham.Almatary@cl.cam.ac.uk> Reviewed-by: Alistair Francis <alistair.francis@wdc.com> Signed-off-by: Palmer Dabbelt <palmer@sifive.com> --- target/riscv/cpu_helper.c | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/target/riscv/cpu_helper.c b/target/riscv/cpu_helper.c index a45b05ef8395..ffbfaf433268 100644 --- a/target/riscv/cpu_helper.c +++ b/target/riscv/cpu_helper.c @@ -337,12 +337,13 @@ restart: } static void raise_mmu_exception(CPURISCVState *env, target_ulong address, - MMUAccessType access_type) + MMUAccessType access_type, bool pmp_violation) { CPUState *cs = env_cpu(env); int page_fault_exceptions = (env->priv_ver >= PRIV_VERSION_1_10_0) && - get_field(env->satp, SATP_MODE) != VM_1_10_MBARE; + get_field(env->satp, SATP_MODE) != VM_1_10_MBARE && + !pmp_violation; switch (access_type) { case MMU_INST_FETCH: cs->exception_index = page_fault_exceptions ? @@ -424,6 +425,7 @@ bool riscv_cpu_tlb_fill(CPUState *cs, vaddr address, int size, CPURISCVState *env = &cpu->env; hwaddr pa = 0; int prot; + bool pmp_violation = false; int ret = TRANSLATE_FAIL; qemu_log_mask(CPU_LOG_MMU, "%s ad %" VADDR_PRIx " rw %d mmu_idx %d\n", @@ -438,6 +440,7 @@ bool riscv_cpu_tlb_fill(CPUState *cs, vaddr address, int size, if (riscv_feature(env, RISCV_FEATURE_PMP) && (ret == TRANSLATE_SUCCESS) && !pmp_hart_has_privs(env, pa, TARGET_PAGE_SIZE, 1 << access_type)) { + pmp_violation = true; ret = TRANSLATE_FAIL; } if (ret == TRANSLATE_SUCCESS) { @@ -447,7 +450,7 @@ bool riscv_cpu_tlb_fill(CPUState *cs, vaddr address, int size, } else if (probe) { return false; } else { - raise_mmu_exception(env, address, access_type); + raise_mmu_exception(env, address, access_type, pmp_violation); riscv_raise_exception(env, cs->exception_index, retaddr); } #else -- 2.21.0
WARNING: multiple messages have this Message-ID (diff)
From: Palmer Dabbelt <palmer@sifive.com> To: Peter Maydell <peter.maydell@linaro.org> Cc: qemu-devel@nongnu.org, qemu-riscv@nongnu.org, Hesham Almatary <Hesham.Almatary@cl.cam.ac.uk>, Alistair Francis <alistair.francis@wdc.com>, Palmer Dabbelt <palmer@sifive.com> Subject: [Qemu-riscv] [PULL 06/32] RISC-V: Raise access fault exceptions on PMP violations Date: Wed, 3 Jul 2019 01:40:22 -0700 [thread overview] Message-ID: <20190703084048.6980-7-palmer@sifive.com> (raw) In-Reply-To: <20190703084048.6980-1-palmer@sifive.com> From: Hesham Almatary <Hesham.Almatary@cl.cam.ac.uk> Section 3.6 in RISC-V v1.10 privilege specification states that PMP violations report "access exceptions." The current PMP implementation has a bug which wrongly reports "page exceptions" on PMP violations. This patch fixes this bug by reporting the correct PMP access exceptions trap values. Signed-off-by: Hesham Almatary <Hesham.Almatary@cl.cam.ac.uk> Reviewed-by: Alistair Francis <alistair.francis@wdc.com> Signed-off-by: Palmer Dabbelt <palmer@sifive.com> --- target/riscv/cpu_helper.c | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/target/riscv/cpu_helper.c b/target/riscv/cpu_helper.c index a45b05ef8395..ffbfaf433268 100644 --- a/target/riscv/cpu_helper.c +++ b/target/riscv/cpu_helper.c @@ -337,12 +337,13 @@ restart: } static void raise_mmu_exception(CPURISCVState *env, target_ulong address, - MMUAccessType access_type) + MMUAccessType access_type, bool pmp_violation) { CPUState *cs = env_cpu(env); int page_fault_exceptions = (env->priv_ver >= PRIV_VERSION_1_10_0) && - get_field(env->satp, SATP_MODE) != VM_1_10_MBARE; + get_field(env->satp, SATP_MODE) != VM_1_10_MBARE && + !pmp_violation; switch (access_type) { case MMU_INST_FETCH: cs->exception_index = page_fault_exceptions ? @@ -424,6 +425,7 @@ bool riscv_cpu_tlb_fill(CPUState *cs, vaddr address, int size, CPURISCVState *env = &cpu->env; hwaddr pa = 0; int prot; + bool pmp_violation = false; int ret = TRANSLATE_FAIL; qemu_log_mask(CPU_LOG_MMU, "%s ad %" VADDR_PRIx " rw %d mmu_idx %d\n", @@ -438,6 +440,7 @@ bool riscv_cpu_tlb_fill(CPUState *cs, vaddr address, int size, if (riscv_feature(env, RISCV_FEATURE_PMP) && (ret == TRANSLATE_SUCCESS) && !pmp_hart_has_privs(env, pa, TARGET_PAGE_SIZE, 1 << access_type)) { + pmp_violation = true; ret = TRANSLATE_FAIL; } if (ret == TRANSLATE_SUCCESS) { @@ -447,7 +450,7 @@ bool riscv_cpu_tlb_fill(CPUState *cs, vaddr address, int size, } else if (probe) { return false; } else { - raise_mmu_exception(env, address, access_type); + raise_mmu_exception(env, address, access_type, pmp_violation); riscv_raise_exception(env, cs->exception_index, retaddr); } #else -- 2.21.0
next prev parent reply other threads:[~2019-07-03 8:52 UTC|newest] Thread overview: 83+ messages / expand[flat|nested] mbox.gz Atom feed top 2019-07-03 8:40 [Qemu-devel] [PULL] RISC-V Patches for the 4.1 Soft Freeze, Part 2 v3 Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 01/32] target/riscv: Allow setting ISA extensions via CPU props Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 02/32] sifive_prci: Read and write PRCI registers Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 03/32] target/riscv: Fix PMP range boundary address bug Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 04/32] target/riscv: Implement riscv_cpu_unassigned_access Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-08-01 15:39 ` [Qemu-devel] " Peter Maydell 2019-08-01 15:39 ` [Qemu-riscv] " Peter Maydell 2019-08-13 22:44 ` [Qemu-devel] " Palmer Dabbelt 2019-08-13 22:44 ` [Qemu-riscv] " Palmer Dabbelt 2019-08-15 21:39 ` [Qemu-devel] " Alistair Francis 2019-08-15 21:39 ` [Qemu-riscv] " Alistair Francis 2019-08-15 22:17 ` Palmer Dabbelt 2019-08-15 22:17 ` [Qemu-riscv] " Palmer Dabbelt 2019-08-16 8:57 ` Peter Maydell 2019-08-16 8:57 ` [Qemu-riscv] " Peter Maydell 2019-09-17 13:56 ` Peter Maydell 2019-09-17 13:56 ` [Qemu-riscv] " Peter Maydell 2019-09-17 16:37 ` Alistair Francis 2019-09-17 16:37 ` [Qemu-riscv] " Alistair Francis 2019-09-20 22:40 ` Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 05/32] RISC-V: Only Check PMP if MMU translation succeeds Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` Palmer Dabbelt [this message] 2019-07-03 8:40 ` [Qemu-riscv] [PULL 06/32] RISC-V: Raise access fault exceptions on PMP violations Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 07/32] RISC-V: Check for the effective memory privilege mode during PMP checks Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 08/32] RISC-V: Check PMP during Page Table Walks Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 09/32] RISC-V: Fix a PMP bug where it succeeds even if PMP entry is off Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 10/32] RISC-V: Fix a PMP check with the correct access size Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 11/32] riscv: virt: Correct pci "bus-range" encoding Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 12/32] RISC-V: Fix a memory leak when realizing a sifive_e Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 13/32] target/riscv: Restructure deprecatd CPUs Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 14/32] target/riscv: Add the privledge spec version 1.11.0 Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 15/32] target/riscv: Add the mcountinhibit CSR Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 16/32] target/riscv: Set privledge spec 1.11.0 as default Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 17/32] qemu-deprecated.texi: Deprecate the RISC-V privledge spec 1.09.1 Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 18/32] target/riscv: Require either I or E base extension Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 19/32] target/riscv: Remove user version information Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 20/32] target/riscv: Add support for disabling/enabling Counters Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 21/32] RISC-V: Add support for the Zifencei extension Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 22/32] RISC-V: Add support for the Zicsr extension Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 23/32] RISC-V: Clear load reservations on context switch and SC Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 24/32] RISC-V: Update syscall list for 32-bit support Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 25/32] riscv: virt: Add cpu-topology DT node Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 26/32] disas/riscv: Disassemble reserved compressed encodings as illegal Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 27/32] disas/riscv: Fix `rdinstreth` constraint Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 28/32] riscv: sifive_u: Do not create hard-coded phandles in DT Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 29/32] riscv: sifive_u: Update the plic hart config to support multicore Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 30/32] hw/riscv: Split out the boot functions Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 31/32] hw/riscv: Add support for loading a firmware Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-devel] [PULL 32/32] hw/riscv: Extend the kernel loading support Palmer Dabbelt 2019-07-03 8:40 ` [Qemu-riscv] " Palmer Dabbelt 2019-07-04 10:40 ` [Qemu-devel] [PULL] RISC-V Patches for the 4.1 Soft Freeze, Part 2 v3 Peter Maydell 2019-07-04 10:40 ` [Qemu-riscv] " Peter Maydell
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20190703084048.6980-7-palmer@sifive.com \ --to=palmer@sifive.com \ --cc=Hesham.Almatary@cl.cam.ac.uk \ --cc=alistair.francis@wdc.com \ --cc=peter.maydell@linaro.org \ --cc=qemu-devel@nongnu.org \ --cc=qemu-riscv@nongnu.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.