From: Cupertino Miranda <cmira...@synopsys.com> --- target/arc/irq.c | 11 + target/arc/irq.h | 7 + target/arc/mmu-v6.c | 640 ++++++++++++++++++++++++++++++++++++++++++++ target/arc/mmu-v6.h | 36 +++ 4 files changed, 694 insertions(+) create mode 100644 target/arc/mmu-v6.c create mode 100644 target/arc/mmu-v6.h
diff --git a/target/arc/irq.c b/target/arc/irq.c index 75111a87a8..7fe537d847 100644 --- a/target/arc/irq.c +++ b/target/arc/irq.c @@ -30,8 +30,15 @@ #include "qemu/host-utils.h" #define CACHE_ENTRY_SIZE (TARGET_LONG_BITS / 8) +#ifdef TARGET_ARCV2 #define TARGET_LONG_LOAD(ENV, ADDR) cpu_ldl_data(ENV, ADDR) #define TARGET_LONG_STORE(ENV, ADDR, VALUE) cpu_stl_data(ENV, ADDR, VALUE) +#elif TARGET_ARCV3 +#define TARGET_LONG_LOAD(ENV, ADDR) cpu_ldq_data(ENV, ADDR) +#define TARGET_LONG_STORE(ENV, ADDR, VALUE) cpu_stq_data(ENV, ADDR, VALUE) +#else +#error "This should never happen !!!!" +#endif /* Static functions and variables. */ @@ -181,12 +188,14 @@ static void arc_rtie_irq(CPUARCState *env) CPU_BLINK(env) = irq_pop(env, "blink"); } +#ifdef TARGET_ARCV2 /* Pop lp_end, lp_start, lp_count if aux_irq_ctrl.l bit is set. */ if (env->aux_irq_ctrl & (1 << 10)) { env->lpe = irq_pop(env, "LP_END"); env->lps = irq_pop(env, "LP_START"); CPU_LP(env) = irq_pop(env, "lp"); } +#endif /* * Pop EI_BASE, JLI_BASE, LDI_BASE if LP bit is set and Code @@ -313,12 +322,14 @@ static void arc_enter_irq(ARCCPU *cpu, uint32_t vector) irq_push(env, 0xdeadbeef, "dummy EI_BASE"); } +#ifdef TARGET_ARCV2 /* Push LP_COUNT, LP_START, LP_END registers if required. */ if (env->aux_irq_ctrl & (1 << 10)) { irq_push(env, CPU_LP(env), "lp"); irq_push(env, env->lps, "LP_START"); irq_push(env, env->lpe, "LP_END"); } +#endif /* Push BLINK register if required */ if (env->aux_irq_ctrl & (1 << 9) && ((env->aux_irq_ctrl & 0x1F) != 16)) { diff --git a/target/arc/irq.h b/target/arc/irq.h index d450126b76..770f2f3522 100644 --- a/target/arc/irq.h +++ b/target/arc/irq.h @@ -32,6 +32,13 @@ void arc_resetIRQ(ARCCPU *); uint32_t pack_status32(ARCStatus *); void unpack_status32(ARCStatus *, uint32_t); +#ifdef TARGET_ARCV2 #define OFFSET_FOR_VECTOR(VECNO) (VECNO << 2) +#elif TARGET_ARCV3 +#define OFFSET_FOR_VECTOR(VECNO) (VECNO << 3) +#else +#error Should never be reached +#endif + #endif diff --git a/target/arc/mmu-v6.c b/target/arc/mmu-v6.c new file mode 100644 index 0000000000..525ef640d6 --- /dev/null +++ b/target/arc/mmu-v6.c @@ -0,0 +1,640 @@ +/* + * QEMU ARC CPU + * + * Copyright (c) 2020 Cupertino Miranda (cmira...@synopsys.com) + * + * This library is free software; you can redistribute it and/or + * modify it under the terms of the GNU Lesser General Public + * License as published by the Free Software Foundation; either + * version 2.1 of the License, or (at your option) any later version. + * + * This library is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + * Lesser General Public License for more details. + * + * You should have received a copy of the GNU Lesser General Public + * License along with this library; if not, see + * http://www.gnu.org/licenses/lgpl-2.1.html + */ + +#include "qemu/osdep.h" +#include "mmu-v6.h" +#include "target/arc/regs.h" +#include "qemu/osdep.h" +#include "cpu.h" +#include "exec/exec-all.h" + +#define LOAD_DATA_IN(ADDR) (address_space_ldq(((CPUState *) cpu)->as, ADDR, MEMTXATTRS_UNSPECIFIED, NULL)) + +#define SET_MMU_EXCEPTION(ENV, N, C, P) { \ + ENV->mmu.exception.number = N; \ + ENV->mmu.exception.causecode = C; \ + ENV->mmu.exception.parameter = P; \ +} + +uint32_t mmu_ctrl; + +static void disable_mmuv6(void) +{ + mmu_ctrl &= 0xFFFFFFFE; +} + +#define MMU_ENABLED ((mmu_ctrl & 1) != 0) +#define MMU_IN_USER_KERNEL_MODE ((mmu_ctrl >> 1) & 1) + +int mmuv6_enabled(void) +{ + return MMU_ENABLED; +} + + +uint32_t mmu_ttbcr; + +#define MMU_TTBCR_TNSZ(I) ((mmu_ttbcr >> (I * 16)) & 0x1f) +#define MMU_TTBCR_TNSH(I) (((mmu_ttbcr >> 4) >> (I * 16)) & 0x3) + +#define MMU_TTBCR_A1 ((mmu_ttbcr >> 15) & 0x1) + +/* +static void init_mmu_ttbcr(void) +{ + // TODO BE DONE +} +*/ + +uint64_t mmu_rtp0; +uint64_t mmu_rtp1; + +uint64_t mmu_fault_status; + +#define MASK_FOR_ROOT_ADDRESS(X) \ + (0x0000ffffffffffff & (~((1 << X) - 1))) + +/* TODO: This is for MMU48 only. */ +#define X_FOR_BCR_ZR(I) \ + (12) + +// Grab Root Table Address for RTPN +#define MMU_RTPN_ROOT_ADDRESS(VADDR, N) \ + (mmu_rtp##N & MASK_FOR_ROOT_ADDRESS(X_FOR_BCR_ZR(1))) + +#define MMU_RTP0_ROOT_ADDRESS(VADDR) MMU_RTPN_ROOT_ADDRESS(VADDR, 0) +#define MMU_RTP1_ROOT_ADDRESS(VADDR) MMU_RTPN_ROOT_ADDRESS(VADDR, 1) + +/* TODO: This is for MMU48/52 only. */ +#define MMU_RTPN_ASID(VADDR, N) \ + ((mmu_rtp##N >> 48) & 0xffff) + +/* Table descriptors accessor macros */ + +#define PTE_TBL_NEXT_LEVEL_TABLE_ADDRESS(PTE) (PTE & 0x0000fffffffff000) +#define PTE_TBL_ATTRIBUTES(PTE) ((PTE & 0xf800000000000000) >> 59) + +#define PTE_TBL_KERNEL_EXECUTE_NEVER_NEXT(PTE) (PTE_TBL_ATTRIBUTES(PTE) & 0x1) +#define PTE_TBL_USER_EXECUTE_NEVER_NEXT(PTE) (PTE_TBL_ATTRIBUTES(PTE) & 0x2) + +#define PTE_TBL_ACCESS_PERMITIONS_NEXT(PTE) ((PTE_TBL_ATTRIBUTES(PTE) & 0xc) >> 2) +#define PTE_TBL_AP_NO_EFFECT(PTE) (PTE_TBL_ACCESS_PERMITIONS_NEXT(PTE) == 0) +#define PTE_TBL_AP_NO_USER_MODE(PTE) (PTE_TBL_ACCESS_PERMITIONS_NEXT(PTE) == 1) +#define PTE_TBL_AP_NO_WRITES(PTE) (PTE_TBL_ACCESS_PERMITIONS_NEXT(PTE) == 2) +#define PTE_TBL_AP_NO_USER_READS_OR_WRITES(PTE) (PTE_TBL_ACCESS_PERMITIONS_NEXT(PTE) == 3) + +/* Block descriptors accessor macros */ + +#define PTE_BLK_LOWER_ATTRS(PTE) ((PTE >> 2) & ((1 << 10) - 1)) +#define PTE_BLK_UPPER_ATTRS(PTE) ((PTE >> 51) & ((1 << 13) - 1)) + +#define PTE_BLK_IS_READ_ONLY(PTE) ((PTE_BLK_LOWER_ATTRS(PTE) & 0x20) != 0) // bit 7 in PTE, 5 in attrs +#define PTE_BLK_IS_KERNEL_ONLY(PTE) ((PTE_BLK_LOWER_ATTRS(PTE) & 0x10) == 0) // bit 6 in PTE, 4 in attrs +#define PTE_BLK_AF(PTE) ((PTE_BLK_LOWER_ATTRS(PTE) & 0x100) != 0) // AF flag +// We also need to verify MMU_CTRL.KU. Don't know what it means for now. :( + +#define PTE_BLK_KERNEL_EXECUTE_NEVER(PTE) ((PTE_BLK_UPPER_ATTRS(PTE) & 0x4) != 0) +#define PTE_BLK_USER_EXECUTE_NEVER(PTE) ((PTE_BLK_UPPER_ATTRS(PTE) & 0x8) != 0) + +#define PTE_IS_BLOCK_DESCRIPTOR(PTE, LEVEL) \ + (((PTE & 0x3) == 1) && (LEVEL < (max_levels() - 1))) +#define PTE_IS_PAGE_DESCRIPTOR(PTE, LEVEL) \ + ((PTE & 0x3) == 3 && (LEVEL == (max_levels() - 1))) +#define PTE_IS_TABLE_DESCRIPTOR(PTE, LEVEL) \ + (!PTE_IS_PAGE_DESCRIPTOR(PTE, LEVEL) && ((PTE & 0x3) == 3)) + +#define PTE_IS_INVALID(PTE, LEVEL) \ + (((PTE & 0x3) == 0) \ + || ((PTE & 0x3) != 3 && LEVEL == 0) \ + || ((PTE & 0x3) != 3 && LEVEL == 3)) + + +enum MMUv6_TLBCOMMAND { + TLBInvalidateAll = 0x1, + TLBRead, + TLBInvalidateASID, + TLBInvalidateAddr, + TLBInvalidateRegion, + TLBInvalidateRegionASID +}; + +static void +mmuv6_tlb_command(CPUARCState *env, enum MMUv6_TLBCOMMAND command) +{ + CPUState *cs = env_cpu(env); + + switch(command) { + case TLBInvalidateAll: + case TLBInvalidateASID: + case TLBInvalidateAddr: + case TLBInvalidateRegion: + case TLBInvalidateRegionASID: + /* For now we flush all entries all the time. */ + qemu_log_mask(CPU_LOG_MMU, "\n[MMUV3] TLB Flush cmd %d\n\n", command); + tlb_flush(cs); + break; + + case TLBRead: + qemu_log_mask(LOG_UNIMP, "TLBRead command is not implemented for MMUv6."); + break; + } +} + +target_ulong +arc_mmuv6_aux_get(const struct arc_aux_reg_detail *aux_reg_detail, void *data) +{ + target_ulong reg = 0; + switch(aux_reg_detail->id) + { + case AUX_ID_mmuv6_build: + /* + * DTLB: 2 (8 entries) + * ITLB: 1 (4 entries) + * L2TLB: 0 (256 entries) + * TC: 0 (no translation cache) + * Type: 1 (MMUv48) + * Version: 6 (MMUv6) + */ + reg = (6 << 24) | (1 << 21) | (0 << 9) | (0 << 6) | (1 << 3) | 2; + break; + case AUX_ID_mmu_rtp0: + reg = mmu_rtp0; + qemu_log_mask(CPU_LOG_MMU, "\n[MMUV3] RTP0 read %lx\n\n", mmu_rtp0); + break; + case AUX_ID_mmu_rtp0hi: + reg = (mmu_rtp0 >> 32); + break; + case AUX_ID_mmu_rtp1: + reg = mmu_rtp1; + break; + case AUX_ID_mmu_rtp1hi: + reg = (mmu_rtp1 >> 32); + break; + case AUX_ID_mmu_ctrl: + reg = mmu_ctrl; + break; + case AUX_ID_mmu_ttbcr: + reg = mmu_ttbcr; + break; + case AUX_ID_mmu_fault_status: + reg = mmu_fault_status; + break; + default: + break; + } + return reg; +} + +void +arc_mmuv6_aux_set(const struct arc_aux_reg_detail *aux_reg_detail, + target_ulong val, void *data) +{ + CPUARCState *env = (CPUARCState *) data; + CPUState *cs = env_cpu(env); + + switch(aux_reg_detail->id) + { + case AUX_ID_mmu_rtp0: + qemu_log_mask(CPU_LOG_MMU, "\n[MMUV3] RTP0 update %lx ==> %lx\n\n", mmu_rtp0, val); + if (mmu_rtp0 != val) + tlb_flush(cs); + mmu_rtp0 = val; + break; + case AUX_ID_mmu_rtp0hi: + if ((mmu_rtp0 >> 32) != val) + tlb_flush(cs); + mmu_rtp0 &= ~0xffffffff00000000; + mmu_rtp0 |= (val << 32); + break; + case AUX_ID_mmu_rtp1: + if (mmu_rtp1 != val) + tlb_flush(cs); + mmu_rtp1 = val; + break; + case AUX_ID_mmu_rtp1hi: + if ((mmu_rtp1 >> 32) != val) + tlb_flush(cs); + mmu_rtp1 &= ~0xffffffff00000000; + mmu_rtp1 |= (val << 32); + break; + case AUX_ID_mmu_ctrl: + if (mmu_ctrl != val) + tlb_flush(cs); + mmu_ctrl = val; + qemu_log_mask(CPU_LOG_MMU, "mmu_ctrl = 0x%08lx\n", val); + break; + case AUX_ID_mmu_ttbcr: + mmu_ttbcr = val; + break; + case AUX_ID_tlbcommand: + mmuv6_tlb_command(env, val); + break; + case AUX_ID_mmu_fault_status: + assert(0); + break; + default: + break; + } +} + +#define ALL1_64BIT (0xffffffffffffffff) + +static uint64_t +root_ptr_for_vaddr(uint64_t vaddr, bool *valid) +{ + /* TODO: This is only for MMUv48 */ + assert(MMU_TTBCR_TNSZ(0) == MMU_TTBCR_TNSZ(1) + && (MMU_TTBCR_TNSZ(0) == 16 || MMU_TTBCR_TNSZ(0) == 25)); + + if ((vaddr >> (64-MMU_TTBCR_TNSZ(0))) == 0) + return MMU_RTP0_ROOT_ADDRESS(vaddr); + + if ((vaddr >> (64-MMU_TTBCR_TNSZ(1))) == ((1 << MMU_TTBCR_TNSZ(1)) - 1)) + return MMU_RTP1_ROOT_ADDRESS(vaddr); + + *valid = false; + return 0; +} + +static int n_bits_on_level(int level) { return 9; } +static int max_levels(void) { return 4; } +static int vaddr_size(void) { return 48; } + +#define V6_PAGE_OFFSET_MASK ((((target_ulong) 1) << remainig_bits) - 1) +#define V6_PTE_PADDR_MASK (((((target_ulong) 1) << vaddr_size()) - 1) & (~V6_PAGE_OFFSET_MASK)) +#define V6_PADDR(PTE, VADDR) \ + ((PTE & V6_PTE_PADDR_MASK) | (VADDR & V6_PAGE_OFFSET_MASK)) + +#define RESTRICT_TBL_NO_USER_MODE (1 << 4) +#define RESTRICT_TBL_NO_WRITE_ACCESS (1 << 3) +#define RESTRICT_TBL_NO_USER_READ_WRITE_ACCESS (1 << 2) +#define RESTRICT_TBL_USER_EXECUTE_NEVER (1 << 1) +#define RESTRICT_TBL_KERNEL_EXECUTE_NEVER (1 << 0) + +static bool +protv_violation(struct CPUARCState *env, uint64_t pte, int level, int table_perm_overwride, enum mmu_access_type rwe) +{ + bool in_kernel_mode = !(GET_STATUS_BIT(env->stat, Uf)); /* Read status for user mode. */ + bool trigger_prot_v = false; + + /* FIXME: user write access if Kr needs to trigger priv_v not prot v */ + if(rwe == MMU_MEM_WRITE && PTE_BLK_IS_READ_ONLY(pte)) { + trigger_prot_v = true; + } + + /* TODO: Isn't it a little bit tool late for this guard check? */ + if(PTE_IS_BLOCK_DESCRIPTOR(pte, level) + || PTE_IS_PAGE_DESCRIPTOR(pte, level)) + { + if (in_kernel_mode == true) { + if (rwe == MMU_MEM_FETCH && + (PTE_BLK_KERNEL_EXECUTE_NEVER(pte) || + (table_perm_overwride & + RESTRICT_TBL_KERNEL_EXECUTE_NEVER))) { + trigger_prot_v = true; + } + } else { + if((rwe == MMU_MEM_READ || rwe == MMU_MEM_WRITE) + && (table_perm_overwride & RESTRICT_TBL_NO_USER_READ_WRITE_ACCESS) != 0) { + trigger_prot_v = true; + } + + if (rwe == MMU_MEM_FETCH && + (PTE_BLK_USER_EXECUTE_NEVER(pte) || + (table_perm_overwride & RESTRICT_TBL_USER_EXECUTE_NEVER))) { + trigger_prot_v = true; + } + + if((table_perm_overwride & RESTRICT_TBL_NO_USER_MODE) != 0) { + trigger_prot_v = true; + } + + if(PTE_BLK_IS_KERNEL_ONLY(pte)) { + trigger_prot_v = true; + } + } + } + + return trigger_prot_v; +} + +static int +get_prot_for_pte(struct CPUARCState *env, uint64_t pte, + int overwrite_permitions) +{ + int ret = PAGE_READ | PAGE_WRITE | PAGE_EXEC; + + bool in_kernel_mode = !(GET_STATUS_BIT(env->stat, Uf)); /* Read status for user mode. */ + + if(in_kernel_mode + && ((overwrite_permitions & RESTRICT_TBL_KERNEL_EXECUTE_NEVER) != 0 + || PTE_BLK_KERNEL_EXECUTE_NEVER(pte))) { + ret &= ~PAGE_EXEC; + } + + if(!in_kernel_mode + && ((overwrite_permitions & RESTRICT_TBL_USER_EXECUTE_NEVER) != 0 + || PTE_BLK_USER_EXECUTE_NEVER(pte))) { + ret &= ~PAGE_EXEC; + } + + if(!in_kernel_mode + && ((overwrite_permitions & RESTRICT_TBL_NO_USER_MODE) != 0 + || PTE_BLK_IS_KERNEL_ONLY(pte))) { + ret &= ~PAGE_WRITE; + ret &= ~PAGE_READ; + ret &= ~PAGE_EXEC; + } + + if((overwrite_permitions & RESTRICT_TBL_NO_WRITE_ACCESS) != 0) { + ret &= ~PAGE_WRITE; + } + + if(!in_kernel_mode + && (overwrite_permitions & RESTRICT_TBL_NO_USER_READ_WRITE_ACCESS) != 0) { + ret &= ~PAGE_WRITE; + ret &= ~PAGE_READ; + } + + if (PTE_BLK_IS_READ_ONLY(pte)) { + ret &= ~PAGE_WRITE; + } + + if ((!in_kernel_mode && PTE_BLK_USER_EXECUTE_NEVER(pte)) || + (in_kernel_mode && PTE_BLK_KERNEL_EXECUTE_NEVER(pte))) { + ret &= ~PAGE_EXEC; + } + + return ret; +} + +static target_ulong +page_table_traverse(struct CPUARCState *env, + target_ulong vaddr, enum mmu_access_type rwe, + int *prot) +{ + bool found_block_descriptor = false; + uint64_t pte, pte_addr; + int l; + int overwrite_permitions = 0; + bool valid_root = true; + uint64_t root = root_ptr_for_vaddr(vaddr, &valid_root); + ARCCPU *cpu = env_archcpu (env); + unsigned char remainig_bits = vaddr_size(); + + qemu_log_mask(CPU_LOG_MMU, "[MMUV3] [PC %lx] PageWalking for %lx [%s]\n", env->pc, vaddr, RWE_STRING(rwe)); + + if(valid_root == false) { + if(rwe == MMU_MEM_FETCH || rwe == MMU_MEM_IRRELEVANT_TYPE) { + SET_MMU_EXCEPTION(env, EXCP_IMMU_FAULT, 0x00, 0x00); + return -1; + } else if(rwe == MMU_MEM_READ || rwe == MMU_MEM_WRITE) { + SET_MMU_EXCEPTION(env, EXCP_DMMU_FAULT, CAUSE_CODE(rwe), 0x00); + return -1; + } + } + + for(l = 0; l < max_levels(); l++) { + unsigned char bits_to_compare = n_bits_on_level(l); + remainig_bits = remainig_bits - bits_to_compare; + unsigned offset = (vaddr >> remainig_bits) & ((1<<bits_to_compare)-1); + + pte_addr = root + (8 * offset); + pte = LOAD_DATA_IN(pte_addr); + + qemu_log_mask(CPU_LOG_MMU, "[MMUV3] == Level: %d, offset: %d, pte_addr: %lx ==> %lx\n", l, offset, pte_addr, pte); + + if(PTE_IS_INVALID(pte, l)) { + qemu_log_mask(CPU_LOG_MMU, "[MMUV3] PTE seems invalid\n"); + + mmu_fault_status = (l & 0x7); + if(rwe == MMU_MEM_FETCH || rwe == MMU_MEM_IRRELEVANT_TYPE) { + SET_MMU_EXCEPTION(env, EXCP_IMMU_FAULT, 0x00, 0x00); + return -1; + } else if(rwe == MMU_MEM_READ || rwe == MMU_MEM_WRITE) { + SET_MMU_EXCEPTION(env, EXCP_DMMU_FAULT, CAUSE_CODE(rwe), 0x00); + return -1; + } + } + + + if(PTE_IS_BLOCK_DESCRIPTOR(pte, l) || PTE_IS_PAGE_DESCRIPTOR(pte, l)) { + if(PTE_BLK_AF(pte) != 0) { + found_block_descriptor = true; + break; + } else { + qemu_log_mask(CPU_LOG_MMU, "[MMUV3] PTE AF is not set\n"); + mmu_fault_status = (l & 0x7); + if(rwe == MMU_MEM_FETCH || rwe == MMU_MEM_IRRELEVANT_TYPE) { + SET_MMU_EXCEPTION(env, EXCP_IMMU_FAULT, 0x10, 0x00); + return -1; + } else if(rwe == MMU_MEM_READ || rwe == MMU_MEM_WRITE) { + SET_MMU_EXCEPTION(env, EXCP_DMMU_FAULT, 0x10 | CAUSE_CODE(rwe), 0x00); + return -1; + } + } + } + + if(PTE_IS_TABLE_DESCRIPTOR(pte, l)) { + if(PTE_TBL_KERNEL_EXECUTE_NEVER_NEXT(pte)) { + overwrite_permitions |= RESTRICT_TBL_KERNEL_EXECUTE_NEVER; + } + if(PTE_TBL_USER_EXECUTE_NEVER_NEXT(pte)) { + overwrite_permitions |= RESTRICT_TBL_USER_EXECUTE_NEVER; + } + if(PTE_TBL_AP_NO_USER_MODE(pte)) { + overwrite_permitions |= RESTRICT_TBL_NO_USER_MODE; + } + if(PTE_TBL_AP_NO_WRITES(pte)) { + overwrite_permitions |= RESTRICT_TBL_NO_WRITE_ACCESS; + } + if(PTE_TBL_AP_NO_USER_READS_OR_WRITES(pte)) { + overwrite_permitions |= RESTRICT_TBL_NO_USER_READ_WRITE_ACCESS; + } + } + + if(PTE_IS_INVALID(pte, l)) { + if(rwe == MMU_MEM_FETCH || rwe == MMU_MEM_IRRELEVANT_TYPE) { + SET_MMU_EXCEPTION(env, EXCP_IMMU_FAULT, 0x00, 0x00); + return -1; + } else if(rwe == MMU_MEM_READ || rwe == MMU_MEM_WRITE) { + SET_MMU_EXCEPTION(env, EXCP_DMMU_FAULT, CAUSE_CODE(rwe), 0x00); + return -1; + } + } + + root = PTE_TBL_NEXT_LEVEL_TABLE_ADDRESS(pte); + } + + if(found_block_descriptor) { + + if(protv_violation(env, pte, l, overwrite_permitions, rwe)) { + qemu_log_mask(CPU_LOG_MMU, "\n[MMUV3] [PC %lx] PTE Protection violation: vaddr %lx pte [addr %lx val %lx]\n", env->pc, vaddr, pte_addr, pte); + found_block_descriptor = false; + SET_MMU_EXCEPTION(env, EXCP_PROTV, CAUSE_CODE(rwe), 0x08); + return -1; + } + + if(prot != NULL) { + *prot = get_prot_for_pte(env, pte, overwrite_permitions); + } + return V6_PADDR(pte, vaddr); + } + return -1; +} + +#undef PAGE_OFFSET_MASK +#undef PTE_PADDR_MASK +#undef PADDR + +static target_ulong +arc_mmuv6_translate(struct CPUARCState *env, + target_ulong vaddr, enum mmu_access_type rwe, + int *prot) +{ + target_ulong paddr; + + /* This is really required. Fail in non singlestep without in_asm. */ + env->mmu.exception.number = EXCP_NO_EXCEPTION; + + if(!MMU_ENABLED) { + paddr = vaddr; + } + + paddr = (target_ulong) page_table_traverse(env, vaddr, rwe, prot); + + // TODO: Check if address is valid + // Still need to know what it means ... + + return paddr; +} + +typedef enum { + DIRECT_ACTION, + MMU_ACTION, +} ACTION; + +static int mmuv6_decide_action(const struct CPUARCState *env, + target_ulong addr, + int mmu_idx) +{ + // TODO: Remove this later + //if((addr >= 0x80000000) && (addr < 0x90000000)) + // return DIRECT_ACTION; + + if (MMU_ENABLED) + return MMU_ACTION; + else + return DIRECT_ACTION; +} + +void arc_mmu_init(CPUARCState *env) +{ + return; +} + + +#ifndef CONFIG_USER_ONLY + +static void QEMU_NORETURN raise_mem_exception( + CPUState *cs, target_ulong addr, uintptr_t host_pc, + int32_t excp_idx, uint8_t excp_cause_code, uint8_t excp_param) +{ + CPUARCState *env = &(ARC_CPU(cs)->env); + if (excp_idx != EXCP_IMMU_FAULT) { + cpu_restore_state(cs, host_pc, true); + } + + env->efa = addr; + env->eret = env->pc; + env->erbta = env->bta; + + cs->exception_index = excp_idx; + env->causecode = excp_cause_code; + env->param = excp_param; + cpu_loop_exit(cs); +} + +/* Softmmu support function for MMU. */ +bool arc_cpu_tlb_fill(CPUState *cs, vaddr address, int size, + MMUAccessType access_type, int mmu_idx, + bool probe, uintptr_t retaddr) +{ + /* TODO: this rwe should go away when the TODO below is done */ + enum mmu_access_type rwe = (char) access_type; + ARCCPU *cpu = ARC_CPU(cs); + CPUARCState *env = &(cpu->env); + int prot; + + int action = mmuv6_decide_action(env, address, mmu_idx); + + switch (action) { + case DIRECT_ACTION: + tlb_set_page(cs, address & PAGE_MASK, address & PAGE_MASK, + PAGE_READ | PAGE_WRITE | PAGE_EXEC, + mmu_idx, TARGET_PAGE_SIZE); + break; + case MMU_ACTION: { + /* + * TODO: these lines must go inside arc_mmu_translate and it + * should only signal a failure or success --> generate an + * exception or not + */ + + target_ulong paddr; + paddr = arc_mmuv6_translate(env, address, rwe, &prot); + + if ((enum exception_code_list) env->mmu.exception.number != EXCP_NO_EXCEPTION) { + if (probe) { + return false; + } + const struct mmuv6_exception *mmu_excp = &(env->mmu.exception); + raise_mem_exception(cs, address, retaddr, + mmu_excp->number, mmu_excp->causecode, mmu_excp->parameter); + } + else { + tlb_set_page(cs, address, paddr & PAGE_MASK, prot, + mmu_idx, TARGET_PAGE_SIZE); + } + break; + } + default: + g_assert_not_reached(); + } + + return true; +} +#endif /* CONFIG_USER_ONLY */ + +hwaddr arc_mmu_debug_translate(CPUARCState *env, vaddr addr) +{ + if(mmuv6_enabled()) { + return arc_mmuv6_translate(env, addr, MMU_MEM_IRRELEVANT_TYPE, NULL); + } else { + return addr; + } +} + +void arc_mmu_disable(CPUARCState *env) { + disable_mmuv6(); +} + +/*-*-indent-tabs-mode:nil;tab-width:4;indent-line-function:'insert-tab'-*-*/ +/* vim: set ts=4 sw=4 et: */ diff --git a/target/arc/mmu-v6.h b/target/arc/mmu-v6.h new file mode 100644 index 0000000000..7745fe2139 --- /dev/null +++ b/target/arc/mmu-v6.h @@ -0,0 +1,36 @@ +/* + * QEMU ARC CPU + * + * Copyright (c) 2020 Cupertino Miranda (cmira...@synopsys.com) + * + * This library is free software; you can redistribute it and/or + * modify it under the terms of the GNU Lesser General Public + * License as published by the Free Software Foundation; either + * version 2.1 of the License, or (at your option) any later version. + * + * This library is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + * Lesser General Public License for more details. + * + * You should have received a copy of the GNU Lesser General Public + * License along with this library; if not, see + * http://www.gnu.org/licenses/lgpl-2.1.html + */ + +#ifndef ARC64_MMUV3_H +#define ARC64_MMUV3_H + +#include "target/arc/regs.h" + +struct arc_mmuv6 { + struct mmuv6_exception { + int32_t number; + uint8_t causecode; + uint8_t parameter; + } exception; +}; + +int mmuv6_enabled(void); + +#endif /* ARC64_MMUV3_H */ -- 2.20.1 _______________________________________________ linux-snps-arc mailing list linux-snps-arc@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-snps-arc