From: Peter Maydell <peter.maydell@linaro.org>
To: qemu-devel@nongnu.org
Subject: [Qemu-devel] [PULL 17/31] nvic: Add NS alias SCS region
Date: Thu, 7 Sep 2017 14:28:10 +0100 [thread overview]
Message-ID: <1504790904-17018-18-git-send-email-peter.maydell@linaro.org> (raw)
In-Reply-To: <1504790904-17018-1-git-send-email-peter.maydell@linaro.org>
For v8M the range 0xe002e000..0xe002efff is an alias region which
for secure accesses behaves like a NonSecure access to the main
SCS region. (For nonsecure accesses including when the security
extension is not implemented, it is RAZ/WI.)
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Message-id: 1503414539-28762-11-git-send-email-peter.maydell@linaro.org
---
include/hw/intc/armv7m_nvic.h | 1 +
hw/intc/armv7m_nvic.c | 66 ++++++++++++++++++++++++++++++++++++++++++-
2 files changed, 66 insertions(+), 1 deletion(-)
diff --git a/include/hw/intc/armv7m_nvic.h b/include/hw/intc/armv7m_nvic.h
index 1d145fb..1a4cce7 100644
--- a/include/hw/intc/armv7m_nvic.h
+++ b/include/hw/intc/armv7m_nvic.h
@@ -50,6 +50,7 @@ typedef struct NVICState {
int exception_prio; /* group prio of the highest prio active exception */
MemoryRegion sysregmem;
+ MemoryRegion sysreg_ns_mem;
MemoryRegion container;
uint32_t num_irq;
diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c
index babdc3b..2b0b328 100644
--- a/hw/intc/armv7m_nvic.c
+++ b/hw/intc/armv7m_nvic.c
@@ -1040,6 +1040,47 @@ static const MemoryRegionOps nvic_sysreg_ops = {
.endianness = DEVICE_NATIVE_ENDIAN,
};
+static MemTxResult nvic_sysreg_ns_write(void *opaque, hwaddr addr,
+ uint64_t value, unsigned size,
+ MemTxAttrs attrs)
+{
+ if (attrs.secure) {
+ /* S accesses to the alias act like NS accesses to the real region */
+ attrs.secure = 0;
+ return nvic_sysreg_write(opaque, addr, value, size, attrs);
+ } else {
+ /* NS attrs are RAZ/WI for privileged, and BusFault for user */
+ if (attrs.user) {
+ return MEMTX_ERROR;
+ }
+ return MEMTX_OK;
+ }
+}
+
+static MemTxResult nvic_sysreg_ns_read(void *opaque, hwaddr addr,
+ uint64_t *data, unsigned size,
+ MemTxAttrs attrs)
+{
+ if (attrs.secure) {
+ /* S accesses to the alias act like NS accesses to the real region */
+ attrs.secure = 0;
+ return nvic_sysreg_read(opaque, addr, data, size, attrs);
+ } else {
+ /* NS attrs are RAZ/WI for privileged, and BusFault for user */
+ if (attrs.user) {
+ return MEMTX_ERROR;
+ }
+ *data = 0;
+ return MEMTX_OK;
+ }
+}
+
+static const MemoryRegionOps nvic_sysreg_ns_ops = {
+ .read_with_attrs = nvic_sysreg_ns_read,
+ .write_with_attrs = nvic_sysreg_ns_write,
+ .endianness = DEVICE_NATIVE_ENDIAN,
+};
+
static int nvic_post_load(void *opaque, int version_id)
{
NVICState *s = opaque;
@@ -1141,6 +1182,7 @@ static void armv7m_nvic_realize(DeviceState *dev, Error **errp)
NVICState *s = NVIC(dev);
SysBusDevice *systick_sbd;
Error *err = NULL;
+ int regionlen;
s->cpu = ARM_CPU(qemu_get_cpu(0));
assert(s->cpu);
@@ -1173,8 +1215,23 @@ static void armv7m_nvic_realize(DeviceState *dev, Error **errp)
* 0xd00..0xd3c - SCS registers
* 0xd40..0xeff - Reserved or Not implemented
* 0xf00 - STIR
+ *
+ * Some registers within this space are banked between security states.
+ * In v8M there is a second range 0xe002e000..0xe002efff which is the
+ * NonSecure alias SCS; secure accesses to this behave like NS accesses
+ * to the main SCS range, and non-secure accesses (including when
+ * the security extension is not implemented) are RAZ/WI.
+ * Note that both the main SCS range and the alias range are defined
+ * to be exempt from memory attribution (R_BLJT) and so the memory
+ * transaction attribute always matches the current CPU security
+ * state (attrs.secure == env->v7m.secure). In the nvic_sysreg_ns_ops
+ * wrappers we change attrs.secure to indicate the NS access; so
+ * generally code determining which banked register to use should
+ * use attrs.secure; code determining actual behaviour of the system
+ * should use env->v7m.secure.
*/
- memory_region_init(&s->container, OBJECT(s), "nvic", 0x1000);
+ regionlen = arm_feature(&s->cpu->env, ARM_FEATURE_V8) ? 0x21000 : 0x1000;
+ memory_region_init(&s->container, OBJECT(s), "nvic", regionlen);
/* The system register region goes at the bottom of the priority
* stack as it covers the whole page.
*/
@@ -1185,6 +1242,13 @@ static void armv7m_nvic_realize(DeviceState *dev, Error **errp)
sysbus_mmio_get_region(systick_sbd, 0),
1);
+ if (arm_feature(&s->cpu->env, ARM_FEATURE_V8)) {
+ memory_region_init_io(&s->sysreg_ns_mem, OBJECT(s),
+ &nvic_sysreg_ns_ops, s,
+ "nvic_sysregs_ns", 0x1000);
+ memory_region_add_subregion(&s->container, 0x20000, &s->sysreg_ns_mem);
+ }
+
sysbus_init_mmio(SYS_BUS_DEVICE(dev), &s->container);
}
--
2.7.4
next prev parent reply other threads:[~2017-09-07 13:28 UTC|newest]
Thread overview: 33+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-09-07 13:27 [Qemu-devel] [PULL 00/31] target-arm queue Peter Maydell
2017-09-07 13:27 ` [Qemu-devel] [PULL 01/31] armv7m: Convert bitband.source-memory to DEFINE_PROP_LINK Peter Maydell
2017-09-07 13:27 ` [Qemu-devel] [PULL 02/31] armv7m: Convert armv7m.memory " Peter Maydell
2017-09-07 13:27 ` [Qemu-devel] [PULL 03/31] gicv3: Convert " Peter Maydell
2017-09-07 13:27 ` [Qemu-devel] [PULL 04/31] xlnx_zynqmp: " Peter Maydell
2017-09-07 13:27 ` [Qemu-devel] [PULL 05/31] xilinx_axienet: " Peter Maydell
2017-09-07 13:27 ` [Qemu-devel] [PULL 06/31] xilinx_axidma: " Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 07/31] hw/arm/allwinner-a10: Mark the allwinner-a10 device with user_creatable = false Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 08/31] target/arm: Implement ARMv8M's PMSAv8 registers Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 09/31] target/arm: Implement new PMSAv8 behaviour Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 10/31] target/arm: Add state field, feature bit and migration for v8M secure state Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 11/31] target/arm: Register second AddressSpace for secure v8M CPUs Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 12/31] target/arm: Add MMU indexes for secure v8M Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 13/31] target/arm: Make BASEPRI register banked for v8M Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 14/31] target/arm: Make PRIMASK " Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 15/31] target/arm: Make FAULTMASK " Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 16/31] target/arm: Make CONTROL " Peter Maydell
2017-09-07 13:28 ` Peter Maydell [this message]
2017-09-07 13:28 ` [Qemu-devel] [PULL 18/31] target/arm: Make VTOR " Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 19/31] target/arm: Make MPU_MAIR0, MPU_MAIR1 registers " Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 20/31] target/arm: Make MPU_RBAR, MPU_RLAR " Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 21/31] target/arm: Make MPU_RNR register " Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 22/31] target/arm: Make MPU_CTRL " Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 23/31] target/arm: Make CCR " Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 24/31] target/arm: Make MMFAR " Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 25/31] target/arm: Make CFSR register " Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 26/31] target/arm: Move regime_is_secure() to target/arm/internals.h Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 27/31] target/arm: Implement BXNS, and banked stack pointers Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 28/31] boards.h: Define new flag ignore_memory_transaction_failures Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 29/31] hw/arm: Set ignore_memory_transaction_failures for most ARM boards Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 30/31] target/arm: Implement new do_transaction_failed hook Peter Maydell
2017-09-07 13:28 ` [Qemu-devel] [PULL 31/31] target/arm: Add Jazelle feature Peter Maydell
2017-09-07 16:48 ` [Qemu-devel] [PULL 00/31] target-arm queue Peter Maydell
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1504790904-17018-18-git-send-email-peter.maydell@linaro.org \
--to=peter.maydell@linaro.org \
--cc=qemu-devel@nongnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).