eeb6198ee8
'internal-target.h' is meant for target-specific declarations, while 'internal-common.h' for common ones. Move common declarations to it. Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org> Reviewed-by: Richard Henderson <richard.henderson@linaro.org> Reviewed-by: Pierrick Bouvier <pierrick.bouvier@linaro.org> Message-Id: <20240528145953.65398-3-philmd@linaro.org>
119 lines
3.2 KiB
C
119 lines
3.2 KiB
C
/*
|
|
* Internal execution defines for qemu (target specific)
|
|
*
|
|
* Copyright (c) 2003 Fabrice Bellard
|
|
*
|
|
* SPDX-License-Identifier: LGPL-2.1-or-later
|
|
*/
|
|
|
|
#ifndef ACCEL_TCG_INTERNAL_TARGET_H
|
|
#define ACCEL_TCG_INTERNAL_TARGET_H
|
|
|
|
#include "exec/exec-all.h"
|
|
#include "exec/translate-all.h"
|
|
|
|
/*
|
|
* Access to the various translations structures need to be serialised
|
|
* via locks for consistency. In user-mode emulation access to the
|
|
* memory related structures are protected with mmap_lock.
|
|
* In !user-mode we use per-page locks.
|
|
*/
|
|
#ifdef CONFIG_USER_ONLY
|
|
#define assert_memory_lock() tcg_debug_assert(have_mmap_lock())
|
|
#else
|
|
#define assert_memory_lock()
|
|
#endif
|
|
|
|
#if defined(CONFIG_SOFTMMU) && defined(CONFIG_DEBUG_TCG)
|
|
void assert_no_pages_locked(void);
|
|
#else
|
|
static inline void assert_no_pages_locked(void) { }
|
|
#endif
|
|
|
|
#ifdef CONFIG_USER_ONLY
|
|
static inline void page_table_config_init(void) { }
|
|
#else
|
|
void page_table_config_init(void);
|
|
#endif
|
|
|
|
#ifdef CONFIG_USER_ONLY
|
|
/*
|
|
* For user-only, page_protect sets the page read-only.
|
|
* Since most execution is already on read-only pages, and we'd need to
|
|
* account for other TBs on the same page, defer undoing any page protection
|
|
* until we receive the write fault.
|
|
*/
|
|
static inline void tb_lock_page0(tb_page_addr_t p0)
|
|
{
|
|
page_protect(p0);
|
|
}
|
|
|
|
static inline void tb_lock_page1(tb_page_addr_t p0, tb_page_addr_t p1)
|
|
{
|
|
page_protect(p1);
|
|
}
|
|
|
|
static inline void tb_unlock_page1(tb_page_addr_t p0, tb_page_addr_t p1) { }
|
|
static inline void tb_unlock_pages(TranslationBlock *tb) { }
|
|
#else
|
|
void tb_lock_page0(tb_page_addr_t);
|
|
void tb_lock_page1(tb_page_addr_t, tb_page_addr_t);
|
|
void tb_unlock_page1(tb_page_addr_t, tb_page_addr_t);
|
|
void tb_unlock_pages(TranslationBlock *);
|
|
#endif
|
|
|
|
#ifdef CONFIG_SOFTMMU
|
|
void tb_invalidate_phys_range_fast(ram_addr_t ram_addr,
|
|
unsigned size,
|
|
uintptr_t retaddr);
|
|
G_NORETURN void cpu_io_recompile(CPUState *cpu, uintptr_t retaddr);
|
|
#endif /* CONFIG_SOFTMMU */
|
|
|
|
bool tb_invalidate_phys_page_unwind(tb_page_addr_t addr, uintptr_t pc);
|
|
|
|
/* Return the current PC from CPU, which may be cached in TB. */
|
|
static inline vaddr log_pc(CPUState *cpu, const TranslationBlock *tb)
|
|
{
|
|
if (tb_cflags(tb) & CF_PCREL) {
|
|
return cpu->cc->get_pc(cpu);
|
|
} else {
|
|
return tb->pc;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* tcg_req_mo:
|
|
* @type: TCGBar
|
|
*
|
|
* Filter @type to the barrier that is required for the guest
|
|
* memory ordering vs the host memory ordering. A non-zero
|
|
* result indicates that some barrier is required.
|
|
*
|
|
* If TCG_GUEST_DEFAULT_MO is not defined, assume that the
|
|
* guest requires strict ordering.
|
|
*
|
|
* This is a macro so that it's constant even without optimization.
|
|
*/
|
|
#ifdef TCG_GUEST_DEFAULT_MO
|
|
# define tcg_req_mo(type) \
|
|
((type) & TCG_GUEST_DEFAULT_MO & ~TCG_TARGET_DEFAULT_MO)
|
|
#else
|
|
# define tcg_req_mo(type) ((type) & ~TCG_TARGET_DEFAULT_MO)
|
|
#endif
|
|
|
|
/**
|
|
* cpu_req_mo:
|
|
* @type: TCGBar
|
|
*
|
|
* If tcg_req_mo indicates a barrier for @type is required
|
|
* for the guest memory model, issue a host memory barrier.
|
|
*/
|
|
#define cpu_req_mo(type) \
|
|
do { \
|
|
if (tcg_req_mo(type)) { \
|
|
smp_mb(); \
|
|
} \
|
|
} while (0)
|
|
|
|
#endif /* ACCEL_TCG_INTERNAL_H */
|