target/arm: Update excret sanity checks for v8M
In v8M, more bits are defined in the exception-return magic values; update the code that checks these so we accept the v8M values when the CPU permits them. Signed-off-by: Peter Maydell <peter.maydell@linaro.org> Reviewed-by: Richard Henderson <richard.henderson@linaro.org> Message-id: 1506092407-26985-11-git-send-email-peter.maydell@linaro.org
This commit is contained in:
parent
bed079da04
commit
bfb2eb5278
@ -6285,8 +6285,9 @@ static void do_v7m_exception_exit(ARMCPU *cpu)
|
|||||||
uint32_t excret;
|
uint32_t excret;
|
||||||
uint32_t xpsr;
|
uint32_t xpsr;
|
||||||
bool ufault = false;
|
bool ufault = false;
|
||||||
bool return_to_sp_process = false;
|
bool sfault = false;
|
||||||
bool return_to_handler = false;
|
bool return_to_sp_process;
|
||||||
|
bool return_to_handler;
|
||||||
bool rettobase = false;
|
bool rettobase = false;
|
||||||
bool exc_secure = false;
|
bool exc_secure = false;
|
||||||
bool return_to_secure;
|
bool return_to_secure;
|
||||||
@ -6320,6 +6321,19 @@ static void do_v7m_exception_exit(ARMCPU *cpu)
|
|||||||
excret);
|
excret);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (arm_feature(env, ARM_FEATURE_M_SECURITY)) {
|
||||||
|
/* EXC_RETURN.ES validation check (R_SMFL). We must do this before
|
||||||
|
* we pick which FAULTMASK to clear.
|
||||||
|
*/
|
||||||
|
if (!env->v7m.secure &&
|
||||||
|
((excret & R_V7M_EXCRET_ES_MASK) ||
|
||||||
|
!(excret & R_V7M_EXCRET_DCRS_MASK))) {
|
||||||
|
sfault = 1;
|
||||||
|
/* For all other purposes, treat ES as 0 (R_HXSR) */
|
||||||
|
excret &= ~R_V7M_EXCRET_ES_MASK;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if (env->v7m.exception != ARMV7M_EXCP_NMI) {
|
if (env->v7m.exception != ARMV7M_EXCP_NMI) {
|
||||||
/* Auto-clear FAULTMASK on return from other than NMI.
|
/* Auto-clear FAULTMASK on return from other than NMI.
|
||||||
* If the security extension is implemented then this only
|
* If the security extension is implemented then this only
|
||||||
@ -6357,25 +6371,54 @@ static void do_v7m_exception_exit(ARMCPU *cpu)
|
|||||||
g_assert_not_reached();
|
g_assert_not_reached();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
return_to_handler = !(excret & R_V7M_EXCRET_MODE_MASK);
|
||||||
|
return_to_sp_process = excret & R_V7M_EXCRET_SPSEL_MASK;
|
||||||
return_to_secure = arm_feature(env, ARM_FEATURE_M_SECURITY) &&
|
return_to_secure = arm_feature(env, ARM_FEATURE_M_SECURITY) &&
|
||||||
(excret & R_V7M_EXCRET_S_MASK);
|
(excret & R_V7M_EXCRET_S_MASK);
|
||||||
|
|
||||||
|
if (arm_feature(env, ARM_FEATURE_V8)) {
|
||||||
|
if (!arm_feature(env, ARM_FEATURE_M_SECURITY)) {
|
||||||
|
/* UNPREDICTABLE if S == 1 or DCRS == 0 or ES == 1 (R_XLCP);
|
||||||
|
* we choose to take the UsageFault.
|
||||||
|
*/
|
||||||
|
if ((excret & R_V7M_EXCRET_S_MASK) ||
|
||||||
|
(excret & R_V7M_EXCRET_ES_MASK) ||
|
||||||
|
!(excret & R_V7M_EXCRET_DCRS_MASK)) {
|
||||||
|
ufault = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (excret & R_V7M_EXCRET_RES0_MASK) {
|
||||||
|
ufault = true;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
/* For v7M we only recognize certain combinations of the low bits */
|
||||||
switch (excret & 0xf) {
|
switch (excret & 0xf) {
|
||||||
case 1: /* Return to Handler */
|
case 1: /* Return to Handler */
|
||||||
return_to_handler = true;
|
|
||||||
break;
|
break;
|
||||||
case 13: /* Return to Thread using Process stack */
|
case 13: /* Return to Thread using Process stack */
|
||||||
return_to_sp_process = true;
|
|
||||||
/* fall through */
|
|
||||||
case 9: /* Return to Thread using Main stack */
|
case 9: /* Return to Thread using Main stack */
|
||||||
|
/* We only need to check NONBASETHRDENA for v7M, because in
|
||||||
|
* v8M this bit does not exist (it is RES1).
|
||||||
|
*/
|
||||||
if (!rettobase &&
|
if (!rettobase &&
|
||||||
!(env->v7m.ccr[env->v7m.secure] & R_V7M_CCR_NONBASETHRDENA_MASK)) {
|
!(env->v7m.ccr[env->v7m.secure] &
|
||||||
|
R_V7M_CCR_NONBASETHRDENA_MASK)) {
|
||||||
ufault = true;
|
ufault = true;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
default:
|
default:
|
||||||
ufault = true;
|
ufault = true;
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (sfault) {
|
||||||
|
env->v7m.sfsr |= R_V7M_SFSR_INVER_MASK;
|
||||||
|
armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_SECURE, false);
|
||||||
|
v7m_exception_taken(cpu, excret);
|
||||||
|
qemu_log_mask(CPU_LOG_INT, "...taking SecureFault on existing "
|
||||||
|
"stackframe: failed EXC_RETURN.ES validity check\n");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
if (ufault) {
|
if (ufault) {
|
||||||
/* Bad exception return: instead of popping the exception
|
/* Bad exception return: instead of popping the exception
|
||||||
|
Loading…
Reference in New Issue
Block a user