mirror of https://github.com/xemu-project/xemu.git
target/arm: Store TCR_EL* registers as uint64_t
Change the representation of the TCR_EL* registers in the CPU state struct from struct TCR to uint64_t. This allows us to drop the custom vmsa_ttbcr_raw_write() function, moving the "enforce RES0" checks to their more usual location in the writefn vmsa_ttbcr_write(). We also don't need the resetfn any more. Signed-off-by: Peter Maydell <peter.maydell@linaro.org> Reviewed-by: Richard Henderson <richard.henderson@linaro.org> Message-id: 20220714132303.1287193-7-peter.maydell@linaro.org
This commit is contained in:
parent
988cc1909f
commit
cb4a0a3444
|
@ -226,7 +226,7 @@ static void arm_cpu_reset(DeviceState *dev)
|
|||
* Enable TBI0 but not TBI1.
|
||||
* Note that this must match useronly_clean_ptr.
|
||||
*/
|
||||
env->cp15.tcr_el[1].raw_tcr = 5 | (1ULL << 37);
|
||||
env->cp15.tcr_el[1] = 5 | (1ULL << 37);
|
||||
|
||||
/* Enable MTE */
|
||||
if (cpu_isar_feature(aa64_mte, cpu)) {
|
||||
|
|
|
@ -166,12 +166,6 @@ typedef struct ARMGenericTimer {
|
|||
#define GTIMER_HYPVIRT 4
|
||||
#define NUM_GTIMERS 5
|
||||
|
||||
typedef struct {
|
||||
uint64_t raw_tcr;
|
||||
uint32_t mask;
|
||||
uint32_t base_mask;
|
||||
} TCR;
|
||||
|
||||
#define VTCR_NSW (1u << 29)
|
||||
#define VTCR_NSA (1u << 30)
|
||||
#define VSTCR_SW VTCR_NSW
|
||||
|
@ -339,7 +333,7 @@ typedef struct CPUArchState {
|
|||
uint64_t vttbr_el2; /* Virtualization Translation Table Base. */
|
||||
uint64_t vsttbr_el2; /* Secure Virtualization Translation Table. */
|
||||
/* MMU translation table base control. */
|
||||
TCR tcr_el[4];
|
||||
uint64_t tcr_el[4];
|
||||
uint64_t vtcr_el2; /* Virtualization Translation Control. */
|
||||
uint64_t vstcr_el2; /* Secure Virtualization Translation Control. */
|
||||
uint32_t c2_data; /* MPU data cacheable bits. */
|
||||
|
|
|
@ -439,7 +439,7 @@ static uint32_t arm_debug_exception_fsr(CPUARMState *env)
|
|||
using_lpae = true;
|
||||
} else {
|
||||
if (arm_feature(env, ARM_FEATURE_LPAE) &&
|
||||
(env->cp15.tcr_el[target_el].raw_tcr & TTBCR_EAE)) {
|
||||
(env->cp15.tcr_el[target_el] & TTBCR_EAE)) {
|
||||
using_lpae = true;
|
||||
}
|
||||
}
|
||||
|
|
|
@ -3606,19 +3606,21 @@ static const ARMCPRegInfo pmsav5_cp_reginfo[] = {
|
|||
.fieldoffset = offsetof(CPUARMState, cp15.c6_region[7]) },
|
||||
};
|
||||
|
||||
static void vmsa_ttbcr_raw_write(CPUARMState *env, const ARMCPRegInfo *ri,
|
||||
uint64_t value)
|
||||
static void vmsa_ttbcr_write(CPUARMState *env, const ARMCPRegInfo *ri,
|
||||
uint64_t value)
|
||||
{
|
||||
TCR *tcr = raw_ptr(env, ri);
|
||||
int maskshift = extract32(value, 0, 3);
|
||||
ARMCPU *cpu = env_archcpu(env);
|
||||
|
||||
if (!arm_feature(env, ARM_FEATURE_V8)) {
|
||||
if (arm_feature(env, ARM_FEATURE_LPAE) && (value & TTBCR_EAE)) {
|
||||
/* Pre ARMv8 bits [21:19], [15:14] and [6:3] are UNK/SBZP when
|
||||
* using Long-desciptor translation table format */
|
||||
/*
|
||||
* Pre ARMv8 bits [21:19], [15:14] and [6:3] are UNK/SBZP when
|
||||
* using Long-descriptor translation table format
|
||||
*/
|
||||
value &= ~((7 << 19) | (3 << 14) | (0xf << 3));
|
||||
} else if (arm_feature(env, ARM_FEATURE_EL3)) {
|
||||
/* In an implementation that includes the Security Extensions
|
||||
/*
|
||||
* In an implementation that includes the Security Extensions
|
||||
* TTBCR has additional fields PD0 [4] and PD1 [5] for
|
||||
* Short-descriptor translation table format.
|
||||
*/
|
||||
|
@ -3628,55 +3630,23 @@ static void vmsa_ttbcr_raw_write(CPUARMState *env, const ARMCPRegInfo *ri,
|
|||
}
|
||||
}
|
||||
|
||||
/* Update the masks corresponding to the TCR bank being written
|
||||
* Note that we always calculate mask and base_mask, but
|
||||
* they are only used for short-descriptor tables (ie if EAE is 0);
|
||||
* for long-descriptor tables the TCR fields are used differently
|
||||
* and the mask and base_mask values are meaningless.
|
||||
*/
|
||||
tcr->raw_tcr = value;
|
||||
tcr->mask = ~(((uint32_t)0xffffffffu) >> maskshift);
|
||||
tcr->base_mask = ~((uint32_t)0x3fffu >> maskshift);
|
||||
}
|
||||
|
||||
static void vmsa_ttbcr_write(CPUARMState *env, const ARMCPRegInfo *ri,
|
||||
uint64_t value)
|
||||
{
|
||||
ARMCPU *cpu = env_archcpu(env);
|
||||
TCR *tcr = raw_ptr(env, ri);
|
||||
|
||||
if (arm_feature(env, ARM_FEATURE_LPAE)) {
|
||||
/* With LPAE the TTBCR could result in a change of ASID
|
||||
* via the TTBCR.A1 bit, so do a TLB flush.
|
||||
*/
|
||||
tlb_flush(CPU(cpu));
|
||||
}
|
||||
/* Preserve the high half of TCR_EL1, set via TTBCR2. */
|
||||
value = deposit64(tcr->raw_tcr, 0, 32, value);
|
||||
vmsa_ttbcr_raw_write(env, ri, value);
|
||||
}
|
||||
|
||||
static void vmsa_ttbcr_reset(CPUARMState *env, const ARMCPRegInfo *ri)
|
||||
{
|
||||
TCR *tcr = raw_ptr(env, ri);
|
||||
|
||||
/* Reset both the TCR as well as the masks corresponding to the bank of
|
||||
* the TCR being reset.
|
||||
*/
|
||||
tcr->raw_tcr = 0;
|
||||
tcr->mask = 0;
|
||||
tcr->base_mask = 0xffffc000u;
|
||||
raw_write(env, ri, value);
|
||||
}
|
||||
|
||||
static void vmsa_tcr_el12_write(CPUARMState *env, const ARMCPRegInfo *ri,
|
||||
uint64_t value)
|
||||
{
|
||||
ARMCPU *cpu = env_archcpu(env);
|
||||
TCR *tcr = raw_ptr(env, ri);
|
||||
|
||||
/* For AArch64 the A1 bit could result in a change of ASID, so TLB flush. */
|
||||
tlb_flush(CPU(cpu));
|
||||
tcr->raw_tcr = value;
|
||||
raw_write(env, ri, value);
|
||||
}
|
||||
|
||||
static void vmsa_ttbr_write(CPUARMState *env, const ARMCPRegInfo *ri,
|
||||
|
@ -3780,15 +3750,15 @@ static const ARMCPRegInfo vmsa_cp_reginfo[] = {
|
|||
.opc0 = 3, .crn = 2, .crm = 0, .opc1 = 0, .opc2 = 2,
|
||||
.access = PL1_RW, .accessfn = access_tvm_trvm,
|
||||
.writefn = vmsa_tcr_el12_write,
|
||||
.resetfn = vmsa_ttbcr_reset, .raw_writefn = raw_write,
|
||||
.raw_writefn = raw_write,
|
||||
.resetvalue = 0,
|
||||
.fieldoffset = offsetof(CPUARMState, cp15.tcr_el[1]) },
|
||||
{ .name = "TTBCR", .cp = 15, .crn = 2, .crm = 0, .opc1 = 0, .opc2 = 2,
|
||||
.access = PL1_RW, .accessfn = access_tvm_trvm,
|
||||
.type = ARM_CP_ALIAS, .writefn = vmsa_ttbcr_write,
|
||||
.raw_writefn = vmsa_ttbcr_raw_write,
|
||||
/* No offsetoflow32 -- pass the entire TCR to writefn/raw_writefn. */
|
||||
.bank_fieldoffsets = { offsetof(CPUARMState, cp15.tcr_el[3]),
|
||||
offsetof(CPUARMState, cp15.tcr_el[1])} },
|
||||
.raw_writefn = raw_write,
|
||||
.bank_fieldoffsets = { offsetoflow32(CPUARMState, cp15.tcr_el[3]),
|
||||
offsetoflow32(CPUARMState, cp15.tcr_el[1])} },
|
||||
};
|
||||
|
||||
/* Note that unlike TTBCR, writing to TTBCR2 does not require flushing
|
||||
|
@ -3799,8 +3769,8 @@ static const ARMCPRegInfo ttbcr2_reginfo = {
|
|||
.access = PL1_RW, .accessfn = access_tvm_trvm,
|
||||
.type = ARM_CP_ALIAS,
|
||||
.bank_fieldoffsets = {
|
||||
offsetofhigh32(CPUARMState, cp15.tcr_el[3].raw_tcr),
|
||||
offsetofhigh32(CPUARMState, cp15.tcr_el[1].raw_tcr),
|
||||
offsetofhigh32(CPUARMState, cp15.tcr_el[3]),
|
||||
offsetofhigh32(CPUARMState, cp15.tcr_el[1]),
|
||||
},
|
||||
};
|
||||
|
||||
|
@ -5403,7 +5373,6 @@ static const ARMCPRegInfo el2_cp_reginfo[] = {
|
|||
{ .name = "TCR_EL2", .state = ARM_CP_STATE_BOTH,
|
||||
.opc0 = 3, .opc1 = 4, .crn = 2, .crm = 0, .opc2 = 2,
|
||||
.access = PL2_RW, .writefn = vmsa_tcr_el12_write,
|
||||
/* no .raw_writefn or .resetfn needed as we never use mask/base_mask */
|
||||
.fieldoffset = offsetof(CPUARMState, cp15.tcr_el[2]) },
|
||||
{ .name = "VTCR", .state = ARM_CP_STATE_AA32,
|
||||
.cp = 15, .opc1 = 4, .crn = 2, .crm = 1, .opc2 = 2,
|
||||
|
@ -5643,12 +5612,8 @@ static const ARMCPRegInfo el3_cp_reginfo[] = {
|
|||
{ .name = "TCR_EL3", .state = ARM_CP_STATE_AA64,
|
||||
.opc0 = 3, .opc1 = 6, .crn = 2, .crm = 0, .opc2 = 2,
|
||||
.access = PL3_RW,
|
||||
/* no .writefn needed as this can't cause an ASID change;
|
||||
* we must provide a .raw_writefn and .resetfn because we handle
|
||||
* reset and migration for the AArch32 TTBCR(S), which might be
|
||||
* using mask and base_mask.
|
||||
*/
|
||||
.resetfn = vmsa_ttbcr_reset, .raw_writefn = vmsa_ttbcr_raw_write,
|
||||
/* no .writefn needed as this can't cause an ASID change */
|
||||
.resetvalue = 0,
|
||||
.fieldoffset = offsetof(CPUARMState, cp15.tcr_el[3]) },
|
||||
{ .name = "ELR_EL3", .state = ARM_CP_STATE_AA64,
|
||||
.type = ARM_CP_ALIAS,
|
||||
|
|
|
@ -252,9 +252,9 @@ unsigned int arm_pamax(ARMCPU *cpu);
|
|||
*/
|
||||
static inline bool extended_addresses_enabled(CPUARMState *env)
|
||||
{
|
||||
TCR *tcr = &env->cp15.tcr_el[arm_is_secure(env) ? 3 : 1];
|
||||
uint64_t tcr = env->cp15.tcr_el[arm_is_secure(env) ? 3 : 1];
|
||||
return arm_el_is_aa64(env, 1) ||
|
||||
(arm_feature(env, ARM_FEATURE_LPAE) && (tcr->raw_tcr & TTBCR_EAE));
|
||||
(arm_feature(env, ARM_FEATURE_LPAE) && (tcr & TTBCR_EAE));
|
||||
}
|
||||
|
||||
/* Update a QEMU watchpoint based on the information the guest has set in the
|
||||
|
@ -790,7 +790,7 @@ static inline uint64_t regime_tcr(CPUARMState *env, ARMMMUIdx mmu_idx)
|
|||
*/
|
||||
return env->cp15.vstcr_el2;
|
||||
}
|
||||
return env->cp15.tcr_el[regime_el(env, mmu_idx)].raw_tcr;
|
||||
return env->cp15.tcr_el[regime_el(env, mmu_idx)];
|
||||
}
|
||||
|
||||
/**
|
||||
|
|
|
@ -2466,7 +2466,7 @@ bool get_phys_addr(CPUARMState *env, target_ulong address,
|
|||
int r_el = regime_el(env, mmu_idx);
|
||||
if (arm_el_is_aa64(env, r_el)) {
|
||||
int pamax = arm_pamax(env_archcpu(env));
|
||||
uint64_t tcr = env->cp15.tcr_el[r_el].raw_tcr;
|
||||
uint64_t tcr = env->cp15.tcr_el[r_el];
|
||||
int addrtop, tbi;
|
||||
|
||||
tbi = aa64_va_parameter_tbi(tcr, mmu_idx);
|
||||
|
|
Loading…
Reference in New Issue