2011-05-08 15:22:38 +04:00
|
|
|
/*
|
|
|
|
* User emulator execution
|
|
|
|
*
|
|
|
|
* Copyright (c) 2003-2005 Fabrice Bellard
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
2019-01-23 17:08:56 +03:00
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
2011-05-08 15:22:38 +04:00
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
2016-01-29 20:50:05 +03:00
|
|
|
#include "qemu/osdep.h"
|
2021-02-04 19:39:23 +03:00
|
|
|
#include "hw/core/tcg-cpu-ops.h"
|
2012-10-24 13:12:21 +04:00
|
|
|
#include "disas/disas.h"
|
2016-03-15 15:18:37 +03:00
|
|
|
#include "exec/exec-all.h"
|
2020-01-01 14:23:00 +03:00
|
|
|
#include "tcg/tcg.h"
|
2013-06-04 17:31:45 +04:00
|
|
|
#include "qemu/bitops.h"
|
2014-03-28 22:42:10 +04:00
|
|
|
#include "exec/cpu_ldst.h"
|
2020-12-16 15:27:58 +03:00
|
|
|
#include "exec/translate-all.h"
|
2017-09-13 00:19:34 +03:00
|
|
|
#include "exec/helper-proto.h"
|
2018-08-16 02:31:47 +03:00
|
|
|
#include "qemu/atomic128.h"
|
2020-02-04 14:20:10 +03:00
|
|
|
#include "trace/trace-root.h"
|
2021-07-28 08:41:04 +03:00
|
|
|
#include "tcg/tcg-ldst.h"
|
2021-07-27 02:21:38 +03:00
|
|
|
#include "internal.h"
|
2011-05-08 15:22:38 +04:00
|
|
|
|
2017-11-14 12:34:20 +03:00
|
|
|
__thread uintptr_t helper_retaddr;
|
|
|
|
|
2011-05-08 15:22:38 +04:00
|
|
|
//#define DEBUG_SIGNAL
|
|
|
|
|
2021-09-13 05:25:22 +03:00
|
|
|
/*
|
|
|
|
* Adjust the pc to pass to cpu_restore_state; return the memop type.
|
|
|
|
*/
|
|
|
|
MMUAccessType adjust_signal_pc(uintptr_t *pc, bool is_write)
|
2011-05-08 15:22:38 +04:00
|
|
|
{
|
2019-07-09 11:33:36 +03:00
|
|
|
switch (helper_retaddr) {
|
|
|
|
default:
|
|
|
|
/*
|
|
|
|
* Fault during host memory operation within a helper function.
|
|
|
|
* The helper's host return address, saved here, gives us a
|
|
|
|
* pointer into the generated code that will unwind to the
|
|
|
|
* correct guest pc.
|
|
|
|
*/
|
2021-09-13 05:25:22 +03:00
|
|
|
*pc = helper_retaddr;
|
2019-07-09 11:33:36 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
case 0:
|
|
|
|
/*
|
|
|
|
* Fault during host memory operation within generated code.
|
|
|
|
* (Or, a unrelated bug within qemu, but we can't tell from here).
|
|
|
|
*
|
|
|
|
* We take the host pc from the signal frame. However, we cannot
|
|
|
|
* use that value directly. Within cpu_restore_state_from_tb, we
|
|
|
|
* assume PC comes from GETPC(), as used by the helper functions,
|
|
|
|
* so we adjust the address by -GETPC_ADJ to form an address that
|
2020-09-17 10:50:20 +03:00
|
|
|
* is within the call insn, so that the address does not accidentally
|
2019-07-09 11:33:36 +03:00
|
|
|
* match the beginning of the next guest insn. However, when the
|
|
|
|
* pc comes from the signal frame it points to the actual faulting
|
|
|
|
* host memory insn and not the return from a call insn.
|
|
|
|
*
|
|
|
|
* Therefore, adjust to compensate for what will be done later
|
|
|
|
* by cpu_restore_state_from_tb.
|
|
|
|
*/
|
2021-09-13 05:25:22 +03:00
|
|
|
*pc += GETPC_ADJ;
|
2019-07-09 11:33:36 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
case 1:
|
|
|
|
/*
|
|
|
|
* Fault during host read for translation, or loosely, "execution".
|
|
|
|
*
|
|
|
|
* The guest pc is already pointing to the start of the TB for which
|
|
|
|
* code is being generated. If the guest translator manages the
|
|
|
|
* page crossings correctly, this is exactly the correct address
|
|
|
|
* (and if the translator doesn't handle page boundaries correctly
|
|
|
|
* there's little we can do about that here). Therefore, do not
|
|
|
|
* trigger the unwinder.
|
|
|
|
*/
|
2021-09-13 05:25:22 +03:00
|
|
|
*pc = 0;
|
|
|
|
return MMU_INST_FETCH;
|
2017-11-14 12:34:20 +03:00
|
|
|
}
|
|
|
|
|
2021-09-13 05:25:22 +03:00
|
|
|
return is_write ? MMU_DATA_STORE : MMU_DATA_LOAD;
|
|
|
|
}
|
|
|
|
|
2021-09-13 05:47:29 +03:00
|
|
|
/**
|
|
|
|
* handle_sigsegv_accerr_write:
|
|
|
|
* @cpu: the cpu context
|
|
|
|
* @old_set: the sigset_t from the signal ucontext_t
|
|
|
|
* @host_pc: the host pc, adjusted for the signal
|
|
|
|
* @guest_addr: the guest address of the fault
|
|
|
|
*
|
|
|
|
* Return true if the write fault has been handled, and should be re-tried.
|
|
|
|
*
|
|
|
|
* Note that it is important that we don't call page_unprotect() unless
|
2022-06-08 21:38:47 +03:00
|
|
|
* this is really a "write to nonwritable page" fault, because
|
2021-09-13 05:47:29 +03:00
|
|
|
* page_unprotect() assumes that if it is called for an access to
|
2022-06-08 21:38:47 +03:00
|
|
|
* a page that's writable this means we had two threads racing and
|
|
|
|
* another thread got there first and already made the page writable;
|
2021-09-13 05:47:29 +03:00
|
|
|
* so we will retry the access. If we were to call page_unprotect()
|
|
|
|
* for some other kind of fault that should really be passed to the
|
|
|
|
* guest, we'd end up in an infinite loop of retrying the faulting access.
|
|
|
|
*/
|
|
|
|
bool handle_sigsegv_accerr_write(CPUState *cpu, sigset_t *old_set,
|
|
|
|
uintptr_t host_pc, abi_ptr guest_addr)
|
|
|
|
{
|
|
|
|
switch (page_unprotect(guest_addr, host_pc)) {
|
|
|
|
case 0:
|
|
|
|
/*
|
|
|
|
* Fault not caused by a page marked unwritable to protect
|
|
|
|
* cached translations, must be the guest binary's problem.
|
|
|
|
*/
|
|
|
|
return false;
|
|
|
|
case 1:
|
|
|
|
/*
|
|
|
|
* Fault caused by protection of cached translation; TBs
|
|
|
|
* invalidated, so resume execution.
|
|
|
|
*/
|
|
|
|
return true;
|
|
|
|
case 2:
|
|
|
|
/*
|
|
|
|
* Fault caused by protection of cached translation, and the
|
|
|
|
* currently executing TB was modified and must be exited immediately.
|
|
|
|
*/
|
2021-09-13 23:04:11 +03:00
|
|
|
sigprocmask(SIG_SETMASK, old_set, NULL);
|
|
|
|
cpu_loop_exit_noexc(cpu);
|
2021-09-13 05:47:29 +03:00
|
|
|
/* NORETURN */
|
|
|
|
default:
|
|
|
|
g_assert_not_reached();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-10-05 17:34:51 +03:00
|
|
|
typedef struct PageFlagsNode {
|
|
|
|
IntervalTreeNode itree;
|
|
|
|
int flags;
|
|
|
|
} PageFlagsNode;
|
2022-10-05 03:47:00 +03:00
|
|
|
|
2022-10-05 17:34:51 +03:00
|
|
|
static IntervalTreeRoot pageflags_root;
|
2022-10-05 03:47:00 +03:00
|
|
|
|
2022-10-05 17:34:51 +03:00
|
|
|
static PageFlagsNode *pageflags_find(target_ulong start, target_long last)
|
|
|
|
{
|
|
|
|
IntervalTreeNode *n;
|
2022-10-05 03:47:00 +03:00
|
|
|
|
2022-10-05 17:34:51 +03:00
|
|
|
n = interval_tree_iter_first(&pageflags_root, start, last);
|
|
|
|
return n ? container_of(n, PageFlagsNode, itree) : NULL;
|
2022-10-05 03:47:00 +03:00
|
|
|
}
|
|
|
|
|
2022-10-05 17:34:51 +03:00
|
|
|
static PageFlagsNode *pageflags_next(PageFlagsNode *p, target_ulong start,
|
|
|
|
target_long last)
|
2022-10-05 03:47:00 +03:00
|
|
|
{
|
2022-10-05 17:34:51 +03:00
|
|
|
IntervalTreeNode *n;
|
2022-10-05 03:47:00 +03:00
|
|
|
|
2022-10-05 17:34:51 +03:00
|
|
|
n = interval_tree_iter_next(&p->itree, start, last);
|
|
|
|
return n ? container_of(n, PageFlagsNode, itree) : NULL;
|
2022-10-05 03:47:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
int walk_memory_regions(void *priv, walk_memory_regions_fn fn)
|
|
|
|
{
|
2022-10-05 17:34:51 +03:00
|
|
|
IntervalTreeNode *n;
|
|
|
|
int rc = 0;
|
2022-10-05 03:47:00 +03:00
|
|
|
|
2022-10-05 17:34:51 +03:00
|
|
|
mmap_lock();
|
|
|
|
for (n = interval_tree_iter_first(&pageflags_root, 0, -1);
|
|
|
|
n != NULL;
|
|
|
|
n = interval_tree_iter_next(n, 0, -1)) {
|
|
|
|
PageFlagsNode *p = container_of(n, PageFlagsNode, itree);
|
2022-10-05 03:47:00 +03:00
|
|
|
|
2022-10-05 17:34:51 +03:00
|
|
|
rc = fn(priv, n->start, n->last + 1, p->flags);
|
2022-10-05 03:47:00 +03:00
|
|
|
if (rc != 0) {
|
2022-10-05 17:34:51 +03:00
|
|
|
break;
|
2022-10-05 03:47:00 +03:00
|
|
|
}
|
|
|
|
}
|
2022-10-05 17:34:51 +03:00
|
|
|
mmap_unlock();
|
2022-10-05 03:47:00 +03:00
|
|
|
|
2022-10-05 17:34:51 +03:00
|
|
|
return rc;
|
2022-10-05 03:47:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static int dump_region(void *priv, target_ulong start,
|
2022-10-05 17:34:51 +03:00
|
|
|
target_ulong end, unsigned long prot)
|
2022-10-05 03:47:00 +03:00
|
|
|
{
|
|
|
|
FILE *f = (FILE *)priv;
|
|
|
|
|
2022-10-05 17:34:51 +03:00
|
|
|
fprintf(f, TARGET_FMT_lx"-"TARGET_FMT_lx" "TARGET_FMT_lx" %c%c%c\n",
|
|
|
|
start, end, end - start,
|
|
|
|
((prot & PAGE_READ) ? 'r' : '-'),
|
|
|
|
((prot & PAGE_WRITE) ? 'w' : '-'),
|
|
|
|
((prot & PAGE_EXEC) ? 'x' : '-'));
|
2022-10-05 03:47:00 +03:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* dump memory mappings */
|
|
|
|
void page_dump(FILE *f)
|
|
|
|
{
|
|
|
|
const int length = sizeof(target_ulong) * 2;
|
2022-10-05 17:34:51 +03:00
|
|
|
|
|
|
|
fprintf(f, "%-*s %-*s %-*s %s\n",
|
2022-10-05 03:47:00 +03:00
|
|
|
length, "start", length, "end", length, "size", "prot");
|
|
|
|
walk_memory_regions(f, dump_region);
|
|
|
|
}
|
|
|
|
|
|
|
|
int page_get_flags(target_ulong address)
|
|
|
|
{
|
2022-10-05 17:34:51 +03:00
|
|
|
PageFlagsNode *p = pageflags_find(address, address);
|
2022-10-05 03:47:00 +03:00
|
|
|
|
2022-10-05 17:34:51 +03:00
|
|
|
/*
|
|
|
|
* See util/interval-tree.c re lockless lookups: no false positives but
|
|
|
|
* there are false negatives. If we find nothing, retry with the mmap
|
|
|
|
* lock acquired.
|
|
|
|
*/
|
|
|
|
if (p) {
|
|
|
|
return p->flags;
|
|
|
|
}
|
|
|
|
if (have_mmap_lock()) {
|
2022-10-05 03:47:00 +03:00
|
|
|
return 0;
|
|
|
|
}
|
2022-10-05 17:34:51 +03:00
|
|
|
|
|
|
|
mmap_lock();
|
|
|
|
p = pageflags_find(address, address);
|
|
|
|
mmap_unlock();
|
|
|
|
return p ? p->flags : 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* A subroutine of page_set_flags: insert a new node for [start,last]. */
|
|
|
|
static void pageflags_create(target_ulong start, target_ulong last, int flags)
|
|
|
|
{
|
|
|
|
PageFlagsNode *p = g_new(PageFlagsNode, 1);
|
|
|
|
|
|
|
|
p->itree.start = start;
|
|
|
|
p->itree.last = last;
|
|
|
|
p->flags = flags;
|
|
|
|
interval_tree_insert(&p->itree, &pageflags_root);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* A subroutine of page_set_flags: remove everything in [start,last]. */
|
|
|
|
static bool pageflags_unset(target_ulong start, target_ulong last)
|
|
|
|
{
|
|
|
|
bool inval_tb = false;
|
|
|
|
|
|
|
|
while (true) {
|
|
|
|
PageFlagsNode *p = pageflags_find(start, last);
|
|
|
|
target_ulong p_last;
|
|
|
|
|
|
|
|
if (!p) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (p->flags & PAGE_EXEC) {
|
|
|
|
inval_tb = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
interval_tree_remove(&p->itree, &pageflags_root);
|
|
|
|
p_last = p->itree.last;
|
|
|
|
|
|
|
|
if (p->itree.start < start) {
|
|
|
|
/* Truncate the node from the end, or split out the middle. */
|
|
|
|
p->itree.last = start - 1;
|
|
|
|
interval_tree_insert(&p->itree, &pageflags_root);
|
|
|
|
if (last < p_last) {
|
|
|
|
pageflags_create(last + 1, p_last, p->flags);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else if (p_last <= last) {
|
|
|
|
/* Range completely covers node -- remove it. */
|
|
|
|
g_free(p);
|
|
|
|
} else {
|
|
|
|
/* Truncate the node from the start. */
|
|
|
|
p->itree.start = last + 1;
|
|
|
|
interval_tree_insert(&p->itree, &pageflags_root);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return inval_tb;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* A subroutine of page_set_flags: nothing overlaps [start,last],
|
|
|
|
* but check adjacent mappings and maybe merge into a single range.
|
|
|
|
*/
|
|
|
|
static void pageflags_create_merge(target_ulong start, target_ulong last,
|
|
|
|
int flags)
|
|
|
|
{
|
|
|
|
PageFlagsNode *next = NULL, *prev = NULL;
|
|
|
|
|
|
|
|
if (start > 0) {
|
|
|
|
prev = pageflags_find(start - 1, start - 1);
|
|
|
|
if (prev) {
|
|
|
|
if (prev->flags == flags) {
|
|
|
|
interval_tree_remove(&prev->itree, &pageflags_root);
|
|
|
|
} else {
|
|
|
|
prev = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (last + 1 != 0) {
|
|
|
|
next = pageflags_find(last + 1, last + 1);
|
|
|
|
if (next) {
|
|
|
|
if (next->flags == flags) {
|
|
|
|
interval_tree_remove(&next->itree, &pageflags_root);
|
|
|
|
} else {
|
|
|
|
next = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (prev) {
|
|
|
|
if (next) {
|
|
|
|
prev->itree.last = next->itree.last;
|
|
|
|
g_free(next);
|
|
|
|
} else {
|
|
|
|
prev->itree.last = last;
|
|
|
|
}
|
|
|
|
interval_tree_insert(&prev->itree, &pageflags_root);
|
|
|
|
} else if (next) {
|
|
|
|
next->itree.start = start;
|
|
|
|
interval_tree_insert(&next->itree, &pageflags_root);
|
|
|
|
} else {
|
|
|
|
pageflags_create(start, last, flags);
|
|
|
|
}
|
2022-10-05 03:47:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Allow the target to decide if PAGE_TARGET_[12] may be reset.
|
|
|
|
* By default, they are not kept.
|
|
|
|
*/
|
|
|
|
#ifndef PAGE_TARGET_STICKY
|
|
|
|
#define PAGE_TARGET_STICKY 0
|
|
|
|
#endif
|
|
|
|
#define PAGE_STICKY (PAGE_ANON | PAGE_PASSTHROUGH | PAGE_TARGET_STICKY)
|
|
|
|
|
2022-10-05 17:34:51 +03:00
|
|
|
/* A subroutine of page_set_flags: add flags to [start,last]. */
|
|
|
|
static bool pageflags_set_clear(target_ulong start, target_ulong last,
|
|
|
|
int set_flags, int clear_flags)
|
|
|
|
{
|
|
|
|
PageFlagsNode *p;
|
|
|
|
target_ulong p_start, p_last;
|
|
|
|
int p_flags, merge_flags;
|
|
|
|
bool inval_tb = false;
|
|
|
|
|
|
|
|
restart:
|
|
|
|
p = pageflags_find(start, last);
|
|
|
|
if (!p) {
|
|
|
|
if (set_flags) {
|
|
|
|
pageflags_create_merge(start, last, set_flags);
|
|
|
|
}
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
p_start = p->itree.start;
|
|
|
|
p_last = p->itree.last;
|
|
|
|
p_flags = p->flags;
|
|
|
|
/* Using mprotect on a page does not change sticky bits. */
|
|
|
|
merge_flags = (p_flags & ~clear_flags) | set_flags;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Need to flush if an overlapping executable region
|
|
|
|
* removes exec, or adds write.
|
|
|
|
*/
|
|
|
|
if ((p_flags & PAGE_EXEC)
|
|
|
|
&& (!(merge_flags & PAGE_EXEC)
|
|
|
|
|| (merge_flags & ~p_flags & PAGE_WRITE))) {
|
|
|
|
inval_tb = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If there is an exact range match, update and return without
|
|
|
|
* attempting to merge with adjacent regions.
|
|
|
|
*/
|
|
|
|
if (start == p_start && last == p_last) {
|
|
|
|
if (merge_flags) {
|
|
|
|
p->flags = merge_flags;
|
|
|
|
} else {
|
|
|
|
interval_tree_remove(&p->itree, &pageflags_root);
|
|
|
|
g_free(p);
|
|
|
|
}
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If sticky bits affect the original mapping, then we must be more
|
|
|
|
* careful about the existing intervals and the separate flags.
|
|
|
|
*/
|
|
|
|
if (set_flags != merge_flags) {
|
|
|
|
if (p_start < start) {
|
|
|
|
interval_tree_remove(&p->itree, &pageflags_root);
|
|
|
|
p->itree.last = start - 1;
|
|
|
|
interval_tree_insert(&p->itree, &pageflags_root);
|
|
|
|
|
|
|
|
if (last < p_last) {
|
|
|
|
if (merge_flags) {
|
|
|
|
pageflags_create(start, last, merge_flags);
|
|
|
|
}
|
|
|
|
pageflags_create(last + 1, p_last, p_flags);
|
|
|
|
} else {
|
|
|
|
if (merge_flags) {
|
|
|
|
pageflags_create(start, p_last, merge_flags);
|
|
|
|
}
|
|
|
|
if (p_last < last) {
|
|
|
|
start = p_last + 1;
|
|
|
|
goto restart;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (start < p_start && set_flags) {
|
|
|
|
pageflags_create(start, p_start - 1, set_flags);
|
|
|
|
}
|
|
|
|
if (last < p_last) {
|
|
|
|
interval_tree_remove(&p->itree, &pageflags_root);
|
|
|
|
p->itree.start = last + 1;
|
|
|
|
interval_tree_insert(&p->itree, &pageflags_root);
|
|
|
|
if (merge_flags) {
|
|
|
|
pageflags_create(start, last, merge_flags);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (merge_flags) {
|
|
|
|
p->flags = merge_flags;
|
|
|
|
} else {
|
|
|
|
interval_tree_remove(&p->itree, &pageflags_root);
|
|
|
|
g_free(p);
|
|
|
|
}
|
|
|
|
if (p_last < last) {
|
|
|
|
start = p_last + 1;
|
|
|
|
goto restart;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If flags are not changing for this range, incorporate it. */
|
|
|
|
if (set_flags == p_flags) {
|
|
|
|
if (start < p_start) {
|
|
|
|
interval_tree_remove(&p->itree, &pageflags_root);
|
|
|
|
p->itree.start = start;
|
|
|
|
interval_tree_insert(&p->itree, &pageflags_root);
|
|
|
|
}
|
|
|
|
if (p_last < last) {
|
|
|
|
start = p_last + 1;
|
|
|
|
goto restart;
|
|
|
|
}
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Maybe split out head and/or tail ranges with the original flags. */
|
|
|
|
interval_tree_remove(&p->itree, &pageflags_root);
|
|
|
|
if (p_start < start) {
|
|
|
|
p->itree.last = start - 1;
|
|
|
|
interval_tree_insert(&p->itree, &pageflags_root);
|
|
|
|
|
|
|
|
if (p_last < last) {
|
|
|
|
goto restart;
|
|
|
|
}
|
|
|
|
if (last < p_last) {
|
|
|
|
pageflags_create(last + 1, p_last, p_flags);
|
|
|
|
}
|
|
|
|
} else if (last < p_last) {
|
|
|
|
p->itree.start = last + 1;
|
|
|
|
interval_tree_insert(&p->itree, &pageflags_root);
|
|
|
|
} else {
|
|
|
|
g_free(p);
|
|
|
|
goto restart;
|
|
|
|
}
|
|
|
|
if (set_flags) {
|
|
|
|
pageflags_create(start, last, set_flags);
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
|
|
|
return inval_tb;
|
|
|
|
}
|
|
|
|
|
2022-10-05 03:47:00 +03:00
|
|
|
/*
|
|
|
|
* Modify the flags of a page and invalidate the code if necessary.
|
|
|
|
* The flag PAGE_WRITE_ORG is positioned automatically depending
|
|
|
|
* on PAGE_WRITE. The mmap_lock should already be held.
|
|
|
|
*/
|
|
|
|
void page_set_flags(target_ulong start, target_ulong end, int flags)
|
|
|
|
{
|
2022-10-05 17:34:51 +03:00
|
|
|
target_ulong last;
|
|
|
|
bool reset = false;
|
|
|
|
bool inval_tb = false;
|
2022-10-05 03:47:00 +03:00
|
|
|
|
|
|
|
/* This function should never be called with addresses outside the
|
|
|
|
guest address space. If this assert fires, it probably indicates
|
|
|
|
a missing call to h2g_valid. */
|
|
|
|
assert(start < end);
|
2022-10-05 17:34:51 +03:00
|
|
|
assert(end - 1 <= GUEST_ADDR_MAX);
|
2022-10-05 03:47:00 +03:00
|
|
|
/* Only set PAGE_ANON with new mappings. */
|
|
|
|
assert(!(flags & PAGE_ANON) || (flags & PAGE_RESET));
|
|
|
|
assert_memory_lock();
|
|
|
|
|
|
|
|
start = start & TARGET_PAGE_MASK;
|
|
|
|
end = TARGET_PAGE_ALIGN(end);
|
2022-10-05 17:34:51 +03:00
|
|
|
last = end - 1;
|
2022-10-05 03:47:00 +03:00
|
|
|
|
2022-10-05 17:34:51 +03:00
|
|
|
if (!(flags & PAGE_VALID)) {
|
|
|
|
flags = 0;
|
|
|
|
} else {
|
|
|
|
reset = flags & PAGE_RESET;
|
|
|
|
flags &= ~PAGE_RESET;
|
|
|
|
if (flags & PAGE_WRITE) {
|
|
|
|
flags |= PAGE_WRITE_ORG;
|
|
|
|
}
|
2022-10-05 03:47:00 +03:00
|
|
|
}
|
2022-10-05 17:34:51 +03:00
|
|
|
|
|
|
|
if (!flags || reset) {
|
2022-10-05 03:47:00 +03:00
|
|
|
page_reset_target_data(start, end);
|
2022-10-05 17:34:51 +03:00
|
|
|
inval_tb |= pageflags_unset(start, last);
|
2022-10-05 03:47:00 +03:00
|
|
|
}
|
2022-10-05 17:34:51 +03:00
|
|
|
if (flags) {
|
|
|
|
inval_tb |= pageflags_set_clear(start, last, flags,
|
|
|
|
~(reset ? 0 : PAGE_STICKY));
|
2022-10-05 03:47:00 +03:00
|
|
|
}
|
|
|
|
if (inval_tb) {
|
|
|
|
tb_invalidate_phys_range(start, end);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int page_check_range(target_ulong start, target_ulong len, int flags)
|
|
|
|
{
|
2022-10-05 17:34:51 +03:00
|
|
|
target_ulong last;
|
2022-10-05 03:47:00 +03:00
|
|
|
|
|
|
|
if (len == 0) {
|
2022-10-05 17:34:51 +03:00
|
|
|
return 0; /* trivial length */
|
2022-10-05 03:47:00 +03:00
|
|
|
}
|
2022-10-05 17:34:51 +03:00
|
|
|
|
|
|
|
last = start + len - 1;
|
|
|
|
if (last < start) {
|
|
|
|
return -1; /* wrap around */
|
2022-10-05 03:47:00 +03:00
|
|
|
}
|
|
|
|
|
2022-10-05 17:34:51 +03:00
|
|
|
while (true) {
|
|
|
|
PageFlagsNode *p = pageflags_find(start, last);
|
|
|
|
int missing;
|
2022-10-05 03:47:00 +03:00
|
|
|
|
|
|
|
if (!p) {
|
2022-10-05 17:34:51 +03:00
|
|
|
return -1; /* entire region invalid */
|
2022-10-05 03:47:00 +03:00
|
|
|
}
|
2022-10-05 17:34:51 +03:00
|
|
|
if (start < p->itree.start) {
|
|
|
|
return -1; /* initial bytes invalid */
|
2022-10-05 03:47:00 +03:00
|
|
|
}
|
|
|
|
|
2022-10-05 17:34:51 +03:00
|
|
|
missing = flags & ~p->flags;
|
|
|
|
if (missing & PAGE_READ) {
|
|
|
|
return -1; /* page not readable */
|
2022-10-05 03:47:00 +03:00
|
|
|
}
|
2022-10-05 17:34:51 +03:00
|
|
|
if (missing & PAGE_WRITE) {
|
2022-10-05 03:47:00 +03:00
|
|
|
if (!(p->flags & PAGE_WRITE_ORG)) {
|
2022-10-05 17:34:51 +03:00
|
|
|
return -1; /* page not writable */
|
|
|
|
}
|
|
|
|
/* Asking about writable, but has been protected: undo. */
|
|
|
|
if (!page_unprotect(start, 0)) {
|
2022-10-05 03:47:00 +03:00
|
|
|
return -1;
|
|
|
|
}
|
2022-10-05 17:34:51 +03:00
|
|
|
/* TODO: page_unprotect should take a range, not a single page. */
|
|
|
|
if (last - start < TARGET_PAGE_SIZE) {
|
|
|
|
return 0; /* ok */
|
2022-10-05 03:47:00 +03:00
|
|
|
}
|
2022-10-05 17:34:51 +03:00
|
|
|
start += TARGET_PAGE_SIZE;
|
|
|
|
continue;
|
2022-10-05 03:47:00 +03:00
|
|
|
}
|
2022-10-05 17:34:51 +03:00
|
|
|
|
|
|
|
if (last <= p->itree.last) {
|
|
|
|
return 0; /* ok */
|
|
|
|
}
|
|
|
|
start = p->itree.last + 1;
|
2022-10-05 03:47:00 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-10-05 17:34:51 +03:00
|
|
|
void page_protect(tb_page_addr_t address)
|
2022-10-05 03:47:00 +03:00
|
|
|
{
|
2022-10-05 17:34:51 +03:00
|
|
|
PageFlagsNode *p;
|
|
|
|
target_ulong start, last;
|
2022-10-05 03:47:00 +03:00
|
|
|
int prot;
|
|
|
|
|
2022-10-05 17:34:51 +03:00
|
|
|
assert_memory_lock();
|
|
|
|
|
|
|
|
if (qemu_host_page_size <= TARGET_PAGE_SIZE) {
|
|
|
|
start = address & TARGET_PAGE_MASK;
|
|
|
|
last = start + TARGET_PAGE_SIZE - 1;
|
|
|
|
} else {
|
|
|
|
start = address & qemu_host_page_mask;
|
|
|
|
last = start + qemu_host_page_size - 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
p = pageflags_find(start, last);
|
|
|
|
if (!p) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
prot = p->flags;
|
|
|
|
|
|
|
|
if (unlikely(p->itree.last < last)) {
|
|
|
|
/* More than one protection region covers the one host page. */
|
|
|
|
assert(TARGET_PAGE_SIZE < qemu_host_page_size);
|
|
|
|
while ((p = pageflags_next(p, start, last)) != NULL) {
|
2022-10-05 03:47:00 +03:00
|
|
|
prot |= p->flags;
|
|
|
|
}
|
2022-10-05 17:34:51 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (prot & PAGE_WRITE) {
|
|
|
|
pageflags_set_clear(start, last, 0, PAGE_WRITE);
|
|
|
|
mprotect(g2h_untagged(start), qemu_host_page_size,
|
|
|
|
prot & (PAGE_READ | PAGE_EXEC) ? PROT_READ : PROT_NONE);
|
2022-10-05 03:47:00 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Called from signal handler: invalidate the code and unprotect the
|
|
|
|
* page. Return 0 if the fault was not handled, 1 if it was handled,
|
|
|
|
* and 2 if it was handled but the caller must cause the TB to be
|
|
|
|
* immediately exited. (We can only return 2 if the 'pc' argument is
|
|
|
|
* non-zero.)
|
|
|
|
*/
|
|
|
|
int page_unprotect(target_ulong address, uintptr_t pc)
|
|
|
|
{
|
2022-10-05 17:34:51 +03:00
|
|
|
PageFlagsNode *p;
|
2022-10-05 03:47:00 +03:00
|
|
|
bool current_tb_invalidated;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Technically this isn't safe inside a signal handler. However we
|
|
|
|
* know this only ever happens in a synchronous SEGV handler, so in
|
|
|
|
* practice it seems to be ok.
|
|
|
|
*/
|
|
|
|
mmap_lock();
|
|
|
|
|
2022-10-05 17:34:51 +03:00
|
|
|
p = pageflags_find(address, address);
|
|
|
|
|
|
|
|
/* If this address was not really writable, nothing to do. */
|
|
|
|
if (!p || !(p->flags & PAGE_WRITE_ORG)) {
|
2022-10-05 03:47:00 +03:00
|
|
|
mmap_unlock();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-10-05 17:34:51 +03:00
|
|
|
current_tb_invalidated = false;
|
|
|
|
if (p->flags & PAGE_WRITE) {
|
|
|
|
/*
|
|
|
|
* If the page is actually marked WRITE then assume this is because
|
|
|
|
* this thread raced with another one which got here first and
|
|
|
|
* set the page to PAGE_WRITE and did the TB invalidate for us.
|
|
|
|
*/
|
2022-10-05 03:47:00 +03:00
|
|
|
#ifdef TARGET_HAS_PRECISE_SMC
|
2022-10-05 17:34:51 +03:00
|
|
|
TranslationBlock *current_tb = tcg_tb_lookup(pc);
|
|
|
|
if (current_tb) {
|
|
|
|
current_tb_invalidated = tb_cflags(current_tb) & CF_INVALID;
|
|
|
|
}
|
2022-10-05 03:47:00 +03:00
|
|
|
#endif
|
2022-10-05 17:34:51 +03:00
|
|
|
} else {
|
|
|
|
target_ulong start, len, i;
|
|
|
|
int prot;
|
|
|
|
|
|
|
|
if (qemu_host_page_size <= TARGET_PAGE_SIZE) {
|
|
|
|
start = address & TARGET_PAGE_MASK;
|
|
|
|
len = TARGET_PAGE_SIZE;
|
|
|
|
prot = p->flags | PAGE_WRITE;
|
|
|
|
pageflags_set_clear(start, start + len - 1, PAGE_WRITE, 0);
|
|
|
|
current_tb_invalidated = tb_invalidate_phys_page_unwind(start, pc);
|
2022-10-05 03:47:00 +03:00
|
|
|
} else {
|
2022-10-05 17:34:51 +03:00
|
|
|
start = address & qemu_host_page_mask;
|
|
|
|
len = qemu_host_page_size;
|
2022-10-05 03:47:00 +03:00
|
|
|
prot = 0;
|
|
|
|
|
2022-10-05 17:34:51 +03:00
|
|
|
for (i = 0; i < len; i += TARGET_PAGE_SIZE) {
|
|
|
|
target_ulong addr = start + i;
|
|
|
|
|
|
|
|
p = pageflags_find(addr, addr);
|
|
|
|
if (p) {
|
|
|
|
prot |= p->flags;
|
|
|
|
if (p->flags & PAGE_WRITE_ORG) {
|
|
|
|
prot |= PAGE_WRITE;
|
|
|
|
pageflags_set_clear(addr, addr + TARGET_PAGE_SIZE - 1,
|
|
|
|
PAGE_WRITE, 0);
|
|
|
|
}
|
|
|
|
}
|
2022-10-05 03:47:00 +03:00
|
|
|
/*
|
|
|
|
* Since the content will be modified, we must invalidate
|
|
|
|
* the corresponding translated code.
|
|
|
|
*/
|
|
|
|
current_tb_invalidated |=
|
|
|
|
tb_invalidate_phys_page_unwind(addr, pc);
|
|
|
|
}
|
|
|
|
}
|
2022-10-05 17:34:51 +03:00
|
|
|
if (prot & PAGE_EXEC) {
|
|
|
|
prot = (prot & ~PAGE_EXEC) | PAGE_READ;
|
|
|
|
}
|
|
|
|
mprotect((void *)g2h_untagged(start), len, prot & PAGE_BITS);
|
2022-10-05 03:47:00 +03:00
|
|
|
}
|
|
|
|
mmap_unlock();
|
2022-10-05 17:34:51 +03:00
|
|
|
|
|
|
|
/* If current TB was invalidated return to main loop */
|
|
|
|
return current_tb_invalidated ? 2 : 1;
|
2022-10-05 03:47:00 +03:00
|
|
|
}
|
|
|
|
|
2020-05-08 18:43:45 +03:00
|
|
|
static int probe_access_internal(CPUArchState *env, target_ulong addr,
|
|
|
|
int fault_size, MMUAccessType access_type,
|
|
|
|
bool nonfault, uintptr_t ra)
|
2019-08-26 10:51:08 +03:00
|
|
|
{
|
2021-09-18 03:32:56 +03:00
|
|
|
int acc_flag;
|
|
|
|
bool maperr;
|
2019-08-30 13:09:59 +03:00
|
|
|
|
|
|
|
switch (access_type) {
|
|
|
|
case MMU_DATA_STORE:
|
2021-09-18 03:32:56 +03:00
|
|
|
acc_flag = PAGE_WRITE_ORG;
|
2019-08-30 13:09:59 +03:00
|
|
|
break;
|
|
|
|
case MMU_DATA_LOAD:
|
2021-09-18 03:32:56 +03:00
|
|
|
acc_flag = PAGE_READ;
|
2019-08-30 13:09:59 +03:00
|
|
|
break;
|
|
|
|
case MMU_INST_FETCH:
|
2021-09-18 03:32:56 +03:00
|
|
|
acc_flag = PAGE_EXEC;
|
2019-08-30 13:09:59 +03:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
g_assert_not_reached();
|
|
|
|
}
|
|
|
|
|
2021-09-18 03:32:56 +03:00
|
|
|
if (guest_addr_valid_untagged(addr)) {
|
|
|
|
int page_flags = page_get_flags(addr);
|
|
|
|
if (page_flags & acc_flag) {
|
|
|
|
return 0; /* success */
|
2020-05-08 18:43:45 +03:00
|
|
|
}
|
2021-09-18 03:32:56 +03:00
|
|
|
maperr = !(page_flags & PAGE_VALID);
|
|
|
|
} else {
|
|
|
|
maperr = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (nonfault) {
|
|
|
|
return TLB_INVALID_MASK;
|
2019-08-26 10:51:08 +03:00
|
|
|
}
|
2021-09-18 03:32:56 +03:00
|
|
|
|
|
|
|
cpu_loop_exit_sigsegv(env_cpu(env), addr, access_type, maperr, ra);
|
2020-05-08 18:43:45 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
int probe_access_flags(CPUArchState *env, target_ulong addr,
|
|
|
|
MMUAccessType access_type, int mmu_idx,
|
|
|
|
bool nonfault, void **phost, uintptr_t ra)
|
|
|
|
{
|
|
|
|
int flags;
|
|
|
|
|
|
|
|
flags = probe_access_internal(env, addr, 0, access_type, nonfault, ra);
|
2021-02-12 21:48:43 +03:00
|
|
|
*phost = flags ? NULL : g2h(env_cpu(env), addr);
|
2020-05-08 18:43:45 +03:00
|
|
|
return flags;
|
|
|
|
}
|
|
|
|
|
|
|
|
void *probe_access(CPUArchState *env, target_ulong addr, int size,
|
|
|
|
MMUAccessType access_type, int mmu_idx, uintptr_t ra)
|
|
|
|
{
|
|
|
|
int flags;
|
|
|
|
|
|
|
|
g_assert(-(addr | TARGET_PAGE_MASK) >= size);
|
|
|
|
flags = probe_access_internal(env, addr, size, access_type, false, ra);
|
|
|
|
g_assert(flags == 0);
|
2019-08-30 13:09:58 +03:00
|
|
|
|
2021-02-12 21:48:43 +03:00
|
|
|
return size ? g2h(env_cpu(env), addr) : NULL;
|
2019-08-26 10:51:08 +03:00
|
|
|
}
|
|
|
|
|
2022-08-10 23:52:50 +03:00
|
|
|
tb_page_addr_t get_page_addr_code_hostp(CPUArchState *env, target_ulong addr,
|
|
|
|
void **hostp)
|
|
|
|
{
|
|
|
|
int flags;
|
|
|
|
|
|
|
|
flags = probe_access_internal(env, addr, 1, MMU_INST_FETCH, false, 0);
|
|
|
|
g_assert(flags == 0);
|
|
|
|
|
|
|
|
if (hostp) {
|
|
|
|
*hostp = g2h_untagged(addr);
|
|
|
|
}
|
|
|
|
return addr;
|
|
|
|
}
|
|
|
|
|
2022-10-06 02:22:16 +03:00
|
|
|
#ifdef TARGET_PAGE_DATA_SIZE
|
|
|
|
/*
|
|
|
|
* Allocate chunks of target data together. For the only current user,
|
|
|
|
* if we allocate one hunk per page, we have overhead of 40/128 or 40%.
|
|
|
|
* Therefore, allocate memory for 64 pages at a time for overhead < 1%.
|
|
|
|
*/
|
|
|
|
#define TPD_PAGES 64
|
|
|
|
#define TBD_MASK (TARGET_PAGE_MASK * TPD_PAGES)
|
|
|
|
|
|
|
|
typedef struct TargetPageDataNode {
|
|
|
|
IntervalTreeNode itree;
|
|
|
|
char data[TPD_PAGES][TARGET_PAGE_DATA_SIZE] __attribute__((aligned));
|
|
|
|
} TargetPageDataNode;
|
|
|
|
|
|
|
|
static IntervalTreeRoot targetdata_root;
|
|
|
|
|
2022-10-05 01:24:36 +03:00
|
|
|
void page_reset_target_data(target_ulong start, target_ulong end)
|
|
|
|
{
|
2022-10-06 02:22:16 +03:00
|
|
|
IntervalTreeNode *n, *next;
|
|
|
|
target_ulong last;
|
|
|
|
|
2022-10-05 01:24:36 +03:00
|
|
|
assert_memory_lock();
|
|
|
|
|
|
|
|
start = start & TARGET_PAGE_MASK;
|
2022-10-06 02:22:16 +03:00
|
|
|
last = TARGET_PAGE_ALIGN(end) - 1;
|
|
|
|
|
|
|
|
for (n = interval_tree_iter_first(&targetdata_root, start, last),
|
|
|
|
next = n ? interval_tree_iter_next(n, start, last) : NULL;
|
|
|
|
n != NULL;
|
|
|
|
n = next,
|
|
|
|
next = next ? interval_tree_iter_next(n, start, last) : NULL) {
|
|
|
|
target_ulong n_start, n_last, p_ofs, p_len;
|
|
|
|
TargetPageDataNode *t;
|
|
|
|
|
|
|
|
if (n->start >= start && n->last <= last) {
|
|
|
|
interval_tree_remove(n, &targetdata_root);
|
|
|
|
g_free(n);
|
|
|
|
continue;
|
|
|
|
}
|
2022-10-05 01:24:36 +03:00
|
|
|
|
2022-10-06 02:22:16 +03:00
|
|
|
if (n->start < start) {
|
|
|
|
n_start = start;
|
|
|
|
p_ofs = (start - n->start) >> TARGET_PAGE_BITS;
|
|
|
|
} else {
|
|
|
|
n_start = n->start;
|
|
|
|
p_ofs = 0;
|
|
|
|
}
|
|
|
|
n_last = MIN(last, n->last);
|
|
|
|
p_len = (n_last + 1 - n_start) >> TARGET_PAGE_BITS;
|
2022-10-05 01:24:36 +03:00
|
|
|
|
2022-10-06 02:22:16 +03:00
|
|
|
t = container_of(n, TargetPageDataNode, itree);
|
|
|
|
memset(t->data[p_ofs], 0, p_len * TARGET_PAGE_DATA_SIZE);
|
2022-10-05 01:24:36 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void *page_get_target_data(target_ulong address)
|
|
|
|
{
|
2022-10-06 02:22:16 +03:00
|
|
|
IntervalTreeNode *n;
|
|
|
|
TargetPageDataNode *t;
|
|
|
|
target_ulong page, region;
|
|
|
|
|
|
|
|
page = address & TARGET_PAGE_MASK;
|
|
|
|
region = address & TBD_MASK;
|
2022-10-05 01:24:36 +03:00
|
|
|
|
2022-10-06 02:22:16 +03:00
|
|
|
n = interval_tree_iter_first(&targetdata_root, page, page);
|
|
|
|
if (!n) {
|
|
|
|
/*
|
|
|
|
* See util/interval-tree.c re lockless lookups: no false positives
|
|
|
|
* but there are false negatives. If we find nothing, retry with
|
|
|
|
* the mmap lock acquired. We also need the lock for the
|
|
|
|
* allocation + insert.
|
|
|
|
*/
|
|
|
|
mmap_lock();
|
|
|
|
n = interval_tree_iter_first(&targetdata_root, page, page);
|
|
|
|
if (!n) {
|
|
|
|
t = g_new0(TargetPageDataNode, 1);
|
|
|
|
n = &t->itree;
|
|
|
|
n->start = region;
|
|
|
|
n->last = region | ~TBD_MASK;
|
|
|
|
interval_tree_insert(n, &targetdata_root);
|
|
|
|
}
|
|
|
|
mmap_unlock();
|
2022-10-05 01:24:36 +03:00
|
|
|
}
|
2022-10-06 02:22:16 +03:00
|
|
|
|
|
|
|
t = container_of(n, TargetPageDataNode, itree);
|
|
|
|
return t->data[(page - region) >> TARGET_PAGE_BITS];
|
2022-10-05 01:24:36 +03:00
|
|
|
}
|
2022-10-06 02:22:16 +03:00
|
|
|
#else
|
|
|
|
void page_reset_target_data(target_ulong start, target_ulong end) { }
|
|
|
|
#endif /* TARGET_PAGE_DATA_SIZE */
|
2022-10-05 01:24:36 +03:00
|
|
|
|
2017-09-13 00:19:34 +03:00
|
|
|
/* The softmmu versions of these helpers are in cputlb.c. */
|
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
/*
|
|
|
|
* Verify that we have passed the correct MemOp to the correct function.
|
|
|
|
*
|
|
|
|
* We could present one function to target code, and dispatch based on
|
|
|
|
* the MemOp, but so far we have worked hard to avoid an indirect function
|
|
|
|
* call along the memory path.
|
|
|
|
*/
|
|
|
|
static void validate_memop(MemOpIdx oi, MemOp expected)
|
2020-05-08 18:43:46 +03:00
|
|
|
{
|
2021-07-27 20:48:55 +03:00
|
|
|
#ifdef CONFIG_DEBUG_TCG
|
|
|
|
MemOp have = get_memop(oi) & (MO_SIZE | MO_BSWAP);
|
|
|
|
assert(have == expected);
|
|
|
|
#endif
|
2020-05-08 18:43:46 +03:00
|
|
|
}
|
|
|
|
|
2021-07-28 08:41:04 +03:00
|
|
|
void helper_unaligned_ld(CPUArchState *env, target_ulong addr)
|
|
|
|
{
|
|
|
|
cpu_loop_exit_sigbus(env_cpu(env), addr, MMU_DATA_LOAD, GETPC());
|
|
|
|
}
|
|
|
|
|
|
|
|
void helper_unaligned_st(CPUArchState *env, target_ulong addr)
|
|
|
|
{
|
|
|
|
cpu_loop_exit_sigbus(env_cpu(env), addr, MMU_DATA_STORE, GETPC());
|
|
|
|
}
|
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
static void *cpu_mmu_lookup(CPUArchState *env, target_ulong addr,
|
|
|
|
MemOpIdx oi, uintptr_t ra, MMUAccessType type)
|
2020-05-08 18:43:46 +03:00
|
|
|
{
|
2021-10-14 01:55:24 +03:00
|
|
|
MemOp mop = get_memop(oi);
|
|
|
|
int a_bits = get_alignment_bits(mop);
|
2021-07-27 20:48:55 +03:00
|
|
|
void *ret;
|
2020-05-08 18:43:46 +03:00
|
|
|
|
2021-10-14 01:55:24 +03:00
|
|
|
/* Enforce guest required alignment. */
|
|
|
|
if (unlikely(addr & ((1 << a_bits) - 1))) {
|
|
|
|
cpu_loop_exit_sigbus(env_cpu(env), addr, type, ra);
|
|
|
|
}
|
2020-05-08 18:43:46 +03:00
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
ret = g2h(env_cpu(env), addr);
|
|
|
|
set_helper_retaddr(ra);
|
2019-12-11 23:31:36 +03:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
uint8_t cpu_ldb_mmu(CPUArchState *env, abi_ptr addr,
|
|
|
|
MemOpIdx oi, uintptr_t ra)
|
2019-12-11 23:31:36 +03:00
|
|
|
{
|
2021-07-27 20:48:55 +03:00
|
|
|
void *haddr;
|
|
|
|
uint8_t ret;
|
2019-12-11 23:31:36 +03:00
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
validate_memop(oi, MO_UB);
|
|
|
|
haddr = cpu_mmu_lookup(env, addr, oi, ra, MMU_DATA_LOAD);
|
|
|
|
ret = ldub_p(haddr);
|
2019-12-11 23:31:36 +03:00
|
|
|
clear_helper_retaddr();
|
2021-07-27 20:48:55 +03:00
|
|
|
qemu_plugin_vcpu_mem_cb(env_cpu(env), addr, oi, QEMU_PLUGIN_MEM_R);
|
2019-12-11 23:31:36 +03:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
uint16_t cpu_ldw_be_mmu(CPUArchState *env, abi_ptr addr,
|
|
|
|
MemOpIdx oi, uintptr_t ra)
|
2019-12-11 23:31:36 +03:00
|
|
|
{
|
2021-07-27 20:48:55 +03:00
|
|
|
void *haddr;
|
|
|
|
uint16_t ret;
|
2019-12-11 23:31:36 +03:00
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
validate_memop(oi, MO_BEUW);
|
|
|
|
haddr = cpu_mmu_lookup(env, addr, oi, ra, MMU_DATA_LOAD);
|
|
|
|
ret = lduw_be_p(haddr);
|
2019-12-11 23:31:36 +03:00
|
|
|
clear_helper_retaddr();
|
2021-07-27 20:48:55 +03:00
|
|
|
qemu_plugin_vcpu_mem_cb(env_cpu(env), addr, oi, QEMU_PLUGIN_MEM_R);
|
2019-12-11 23:31:36 +03:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
uint32_t cpu_ldl_be_mmu(CPUArchState *env, abi_ptr addr,
|
|
|
|
MemOpIdx oi, uintptr_t ra)
|
2019-12-11 23:31:36 +03:00
|
|
|
{
|
2021-07-27 20:48:55 +03:00
|
|
|
void *haddr;
|
2019-12-11 23:31:36 +03:00
|
|
|
uint32_t ret;
|
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
validate_memop(oi, MO_BEUL);
|
|
|
|
haddr = cpu_mmu_lookup(env, addr, oi, ra, MMU_DATA_LOAD);
|
|
|
|
ret = ldl_be_p(haddr);
|
2019-12-11 23:31:36 +03:00
|
|
|
clear_helper_retaddr();
|
2021-07-27 20:48:55 +03:00
|
|
|
qemu_plugin_vcpu_mem_cb(env_cpu(env), addr, oi, QEMU_PLUGIN_MEM_R);
|
2019-12-11 23:31:36 +03:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
uint64_t cpu_ldq_be_mmu(CPUArchState *env, abi_ptr addr,
|
|
|
|
MemOpIdx oi, uintptr_t ra)
|
2019-12-11 23:31:36 +03:00
|
|
|
{
|
2021-07-27 20:48:55 +03:00
|
|
|
void *haddr;
|
2019-12-11 23:31:36 +03:00
|
|
|
uint64_t ret;
|
|
|
|
|
2022-01-07 00:00:51 +03:00
|
|
|
validate_memop(oi, MO_BEUQ);
|
2021-07-27 20:48:55 +03:00
|
|
|
haddr = cpu_mmu_lookup(env, addr, oi, ra, MMU_DATA_LOAD);
|
|
|
|
ret = ldq_be_p(haddr);
|
2020-05-08 18:43:46 +03:00
|
|
|
clear_helper_retaddr();
|
2021-07-27 20:48:55 +03:00
|
|
|
qemu_plugin_vcpu_mem_cb(env_cpu(env), addr, oi, QEMU_PLUGIN_MEM_R);
|
2020-05-08 18:43:46 +03:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
uint16_t cpu_ldw_le_mmu(CPUArchState *env, abi_ptr addr,
|
|
|
|
MemOpIdx oi, uintptr_t ra)
|
2020-05-08 18:43:46 +03:00
|
|
|
{
|
2021-07-27 20:48:55 +03:00
|
|
|
void *haddr;
|
|
|
|
uint16_t ret;
|
2020-05-08 18:43:46 +03:00
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
validate_memop(oi, MO_LEUW);
|
|
|
|
haddr = cpu_mmu_lookup(env, addr, oi, ra, MMU_DATA_LOAD);
|
|
|
|
ret = lduw_le_p(haddr);
|
2020-05-08 18:43:46 +03:00
|
|
|
clear_helper_retaddr();
|
2021-07-27 20:48:55 +03:00
|
|
|
qemu_plugin_vcpu_mem_cb(env_cpu(env), addr, oi, QEMU_PLUGIN_MEM_R);
|
2020-05-08 18:43:46 +03:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
uint32_t cpu_ldl_le_mmu(CPUArchState *env, abi_ptr addr,
|
|
|
|
MemOpIdx oi, uintptr_t ra)
|
2020-05-08 18:43:46 +03:00
|
|
|
{
|
2021-07-27 20:48:55 +03:00
|
|
|
void *haddr;
|
2020-05-08 18:43:46 +03:00
|
|
|
uint32_t ret;
|
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
validate_memop(oi, MO_LEUL);
|
|
|
|
haddr = cpu_mmu_lookup(env, addr, oi, ra, MMU_DATA_LOAD);
|
|
|
|
ret = ldl_le_p(haddr);
|
2020-05-08 18:43:46 +03:00
|
|
|
clear_helper_retaddr();
|
2021-07-27 20:48:55 +03:00
|
|
|
qemu_plugin_vcpu_mem_cb(env_cpu(env), addr, oi, QEMU_PLUGIN_MEM_R);
|
2020-05-08 18:43:46 +03:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
uint64_t cpu_ldq_le_mmu(CPUArchState *env, abi_ptr addr,
|
|
|
|
MemOpIdx oi, uintptr_t ra)
|
2020-05-08 18:43:46 +03:00
|
|
|
{
|
2021-07-27 20:48:55 +03:00
|
|
|
void *haddr;
|
2020-05-08 18:43:46 +03:00
|
|
|
uint64_t ret;
|
|
|
|
|
2022-01-07 00:00:51 +03:00
|
|
|
validate_memop(oi, MO_LEUQ);
|
2021-07-27 20:48:55 +03:00
|
|
|
haddr = cpu_mmu_lookup(env, addr, oi, ra, MMU_DATA_LOAD);
|
|
|
|
ret = ldq_le_p(haddr);
|
2019-12-11 23:31:36 +03:00
|
|
|
clear_helper_retaddr();
|
2021-07-27 20:48:55 +03:00
|
|
|
qemu_plugin_vcpu_mem_cb(env_cpu(env), addr, oi, QEMU_PLUGIN_MEM_R);
|
2019-12-11 23:31:36 +03:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
void cpu_stb_mmu(CPUArchState *env, abi_ptr addr, uint8_t val,
|
|
|
|
MemOpIdx oi, uintptr_t ra)
|
2019-12-11 23:31:36 +03:00
|
|
|
{
|
2021-07-27 20:48:55 +03:00
|
|
|
void *haddr;
|
2019-12-11 23:31:36 +03:00
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
validate_memop(oi, MO_UB);
|
|
|
|
haddr = cpu_mmu_lookup(env, addr, oi, ra, MMU_DATA_STORE);
|
|
|
|
stb_p(haddr, val);
|
|
|
|
clear_helper_retaddr();
|
|
|
|
qemu_plugin_vcpu_mem_cb(env_cpu(env), addr, oi, QEMU_PLUGIN_MEM_W);
|
2019-12-11 23:31:36 +03:00
|
|
|
}
|
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
void cpu_stw_be_mmu(CPUArchState *env, abi_ptr addr, uint16_t val,
|
|
|
|
MemOpIdx oi, uintptr_t ra)
|
2019-12-11 23:31:36 +03:00
|
|
|
{
|
2021-07-27 20:48:55 +03:00
|
|
|
void *haddr;
|
2019-12-11 23:31:36 +03:00
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
validate_memop(oi, MO_BEUW);
|
|
|
|
haddr = cpu_mmu_lookup(env, addr, oi, ra, MMU_DATA_STORE);
|
|
|
|
stw_be_p(haddr, val);
|
|
|
|
clear_helper_retaddr();
|
|
|
|
qemu_plugin_vcpu_mem_cb(env_cpu(env), addr, oi, QEMU_PLUGIN_MEM_W);
|
2020-05-08 18:43:46 +03:00
|
|
|
}
|
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
void cpu_stl_be_mmu(CPUArchState *env, abi_ptr addr, uint32_t val,
|
|
|
|
MemOpIdx oi, uintptr_t ra)
|
2020-05-08 18:43:46 +03:00
|
|
|
{
|
2021-07-27 20:48:55 +03:00
|
|
|
void *haddr;
|
2020-05-08 18:43:46 +03:00
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
validate_memop(oi, MO_BEUL);
|
|
|
|
haddr = cpu_mmu_lookup(env, addr, oi, ra, MMU_DATA_STORE);
|
|
|
|
stl_be_p(haddr, val);
|
|
|
|
clear_helper_retaddr();
|
|
|
|
qemu_plugin_vcpu_mem_cb(env_cpu(env), addr, oi, QEMU_PLUGIN_MEM_W);
|
2020-05-08 18:43:46 +03:00
|
|
|
}
|
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
void cpu_stq_be_mmu(CPUArchState *env, abi_ptr addr, uint64_t val,
|
|
|
|
MemOpIdx oi, uintptr_t ra)
|
2020-05-08 18:43:46 +03:00
|
|
|
{
|
2021-07-27 20:48:55 +03:00
|
|
|
void *haddr;
|
2020-05-08 18:43:46 +03:00
|
|
|
|
2022-01-07 00:00:51 +03:00
|
|
|
validate_memop(oi, MO_BEUQ);
|
2021-07-27 20:48:55 +03:00
|
|
|
haddr = cpu_mmu_lookup(env, addr, oi, ra, MMU_DATA_STORE);
|
|
|
|
stq_be_p(haddr, val);
|
2019-12-11 23:31:36 +03:00
|
|
|
clear_helper_retaddr();
|
2021-07-27 20:48:55 +03:00
|
|
|
qemu_plugin_vcpu_mem_cb(env_cpu(env), addr, oi, QEMU_PLUGIN_MEM_W);
|
2019-12-11 23:31:36 +03:00
|
|
|
}
|
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
void cpu_stw_le_mmu(CPUArchState *env, abi_ptr addr, uint16_t val,
|
|
|
|
MemOpIdx oi, uintptr_t ra)
|
2019-12-11 23:31:36 +03:00
|
|
|
{
|
2021-07-27 20:48:55 +03:00
|
|
|
void *haddr;
|
2019-12-11 23:31:36 +03:00
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
validate_memop(oi, MO_LEUW);
|
|
|
|
haddr = cpu_mmu_lookup(env, addr, oi, ra, MMU_DATA_STORE);
|
|
|
|
stw_le_p(haddr, val);
|
2020-05-08 18:43:46 +03:00
|
|
|
clear_helper_retaddr();
|
2021-07-27 20:48:55 +03:00
|
|
|
qemu_plugin_vcpu_mem_cb(env_cpu(env), addr, oi, QEMU_PLUGIN_MEM_W);
|
2020-05-08 18:43:46 +03:00
|
|
|
}
|
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
void cpu_stl_le_mmu(CPUArchState *env, abi_ptr addr, uint32_t val,
|
|
|
|
MemOpIdx oi, uintptr_t ra)
|
2020-05-08 18:43:46 +03:00
|
|
|
{
|
2021-07-27 20:48:55 +03:00
|
|
|
void *haddr;
|
2020-05-08 18:43:46 +03:00
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
validate_memop(oi, MO_LEUL);
|
|
|
|
haddr = cpu_mmu_lookup(env, addr, oi, ra, MMU_DATA_STORE);
|
|
|
|
stl_le_p(haddr, val);
|
2020-05-08 18:43:46 +03:00
|
|
|
clear_helper_retaddr();
|
2021-07-27 20:48:55 +03:00
|
|
|
qemu_plugin_vcpu_mem_cb(env_cpu(env), addr, oi, QEMU_PLUGIN_MEM_W);
|
2020-05-08 18:43:46 +03:00
|
|
|
}
|
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
void cpu_stq_le_mmu(CPUArchState *env, abi_ptr addr, uint64_t val,
|
|
|
|
MemOpIdx oi, uintptr_t ra)
|
2019-12-11 23:31:36 +03:00
|
|
|
{
|
2021-07-27 20:48:55 +03:00
|
|
|
void *haddr;
|
2019-12-11 23:31:36 +03:00
|
|
|
|
2022-01-07 00:00:51 +03:00
|
|
|
validate_memop(oi, MO_LEUQ);
|
2021-07-27 20:48:55 +03:00
|
|
|
haddr = cpu_mmu_lookup(env, addr, oi, ra, MMU_DATA_STORE);
|
|
|
|
stq_le_p(haddr, val);
|
2019-12-11 23:31:36 +03:00
|
|
|
clear_helper_retaddr();
|
2021-07-27 20:48:55 +03:00
|
|
|
qemu_plugin_vcpu_mem_cb(env_cpu(env), addr, oi, QEMU_PLUGIN_MEM_W);
|
2019-12-11 23:31:36 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t cpu_ldub_code(CPUArchState *env, abi_ptr ptr)
|
|
|
|
{
|
|
|
|
uint32_t ret;
|
|
|
|
|
|
|
|
set_helper_retaddr(1);
|
2021-02-12 21:48:43 +03:00
|
|
|
ret = ldub_p(g2h_untagged(ptr));
|
2019-12-11 23:31:36 +03:00
|
|
|
clear_helper_retaddr();
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t cpu_lduw_code(CPUArchState *env, abi_ptr ptr)
|
|
|
|
{
|
|
|
|
uint32_t ret;
|
|
|
|
|
|
|
|
set_helper_retaddr(1);
|
2021-02-12 21:48:43 +03:00
|
|
|
ret = lduw_p(g2h_untagged(ptr));
|
2019-12-11 23:31:36 +03:00
|
|
|
clear_helper_retaddr();
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t cpu_ldl_code(CPUArchState *env, abi_ptr ptr)
|
|
|
|
{
|
|
|
|
uint32_t ret;
|
|
|
|
|
|
|
|
set_helper_retaddr(1);
|
2021-02-12 21:48:43 +03:00
|
|
|
ret = ldl_p(g2h_untagged(ptr));
|
2019-12-11 23:31:36 +03:00
|
|
|
clear_helper_retaddr();
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint64_t cpu_ldq_code(CPUArchState *env, abi_ptr ptr)
|
|
|
|
{
|
|
|
|
uint64_t ret;
|
|
|
|
|
|
|
|
set_helper_retaddr(1);
|
2021-02-12 21:48:43 +03:00
|
|
|
ret = ldq_p(g2h_untagged(ptr));
|
2019-12-11 23:31:36 +03:00
|
|
|
clear_helper_retaddr();
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-07-27 20:48:55 +03:00
|
|
|
#include "ldst_common.c.inc"
|
|
|
|
|
2021-07-17 03:49:09 +03:00
|
|
|
/*
|
|
|
|
* Do not allow unaligned operations to proceed. Return the host address.
|
|
|
|
*
|
|
|
|
* @prot may be PAGE_READ, PAGE_WRITE, or PAGE_READ|PAGE_WRITE.
|
|
|
|
*/
|
2017-09-13 00:19:34 +03:00
|
|
|
static void *atomic_mmu_lookup(CPUArchState *env, target_ulong addr,
|
2021-07-26 01:06:49 +03:00
|
|
|
MemOpIdx oi, int size, int prot,
|
2021-07-17 03:49:09 +03:00
|
|
|
uintptr_t retaddr)
|
2017-09-13 00:19:34 +03:00
|
|
|
{
|
2021-07-25 21:25:21 +03:00
|
|
|
MemOp mop = get_memop(oi);
|
|
|
|
int a_bits = get_alignment_bits(mop);
|
|
|
|
void *ret;
|
|
|
|
|
|
|
|
/* Enforce guest required alignment. */
|
|
|
|
if (unlikely(addr & ((1 << a_bits) - 1))) {
|
|
|
|
MMUAccessType t = prot == PAGE_READ ? MMU_DATA_LOAD : MMU_DATA_STORE;
|
|
|
|
cpu_loop_exit_sigbus(env_cpu(env), addr, t, retaddr);
|
|
|
|
}
|
|
|
|
|
2017-09-13 00:19:34 +03:00
|
|
|
/* Enforce qemu required alignment. */
|
|
|
|
if (unlikely(addr & (size - 1))) {
|
2019-03-23 02:07:18 +03:00
|
|
|
cpu_loop_exit_atomic(env_cpu(env), retaddr);
|
2017-09-13 00:19:34 +03:00
|
|
|
}
|
2021-07-25 21:25:21 +03:00
|
|
|
|
|
|
|
ret = g2h(env_cpu(env), addr);
|
2019-06-14 01:54:22 +03:00
|
|
|
set_helper_retaddr(retaddr);
|
|
|
|
return ret;
|
2017-09-13 00:19:34 +03:00
|
|
|
}
|
|
|
|
|
2021-07-17 00:20:49 +03:00
|
|
|
#include "atomic_common.c.inc"
|
|
|
|
|
|
|
|
/*
|
|
|
|
* First set of functions passes in OI and RETADDR.
|
|
|
|
* This makes them callable from other helpers.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#define ATOMIC_NAME(X) \
|
|
|
|
glue(glue(glue(cpu_atomic_ ## X, SUFFIX), END), _mmu)
|
2019-06-14 01:54:22 +03:00
|
|
|
#define ATOMIC_MMU_CLEANUP do { clear_helper_retaddr(); } while (0)
|
2017-09-13 00:19:34 +03:00
|
|
|
|
|
|
|
#define DATA_SIZE 1
|
|
|
|
#include "atomic_template.h"
|
|
|
|
|
|
|
|
#define DATA_SIZE 2
|
|
|
|
#include "atomic_template.h"
|
|
|
|
|
|
|
|
#define DATA_SIZE 4
|
|
|
|
#include "atomic_template.h"
|
|
|
|
|
|
|
|
#ifdef CONFIG_ATOMIC64
|
|
|
|
#define DATA_SIZE 8
|
|
|
|
#include "atomic_template.h"
|
|
|
|
#endif
|
|
|
|
|
2018-08-16 02:31:47 +03:00
|
|
|
#if HAVE_ATOMIC128 || HAVE_CMPXCHG128
|
2021-07-17 00:20:49 +03:00
|
|
|
#define DATA_SIZE 16
|
|
|
|
#include "atomic_template.h"
|
|
|
|
#endif
|