qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
From: Richard Henderson <richard.henderson@linaro.org>
To: qemu-devel@nongnu.org
Cc: qemu-arm@nongnu.org, Pierrick Bouvier <pierrick.bouvier@linaro.org>
Subject: [PATCH v2 19/85] target/arm: Implement get_S1prot_indirect
Date: Sun,  3 Aug 2025 09:28:47 +1000	[thread overview]
Message-ID: <20250802232953.413294-20-richard.henderson@linaro.org> (raw)
In-Reply-To: <20250802232953.413294-1-richard.henderson@linaro.org>

This approximately corresponds to AArch64.S1IndirectBasePermissions
and the tail of AArch64.S1ComputePermissions which applies WXN.

Reviewed-by: Pierrick Bouvier <pierrick.bouvier@linaro.org>
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
---
 target/arm/ptw.c | 169 +++++++++++++++++++++++++++++++++++++++--------
 1 file changed, 143 insertions(+), 26 deletions(-)

diff --git a/target/arm/ptw.c b/target/arm/ptw.c
index a5a3c03a4c..7fd1cee98a 100644
--- a/target/arm/ptw.c
+++ b/target/arm/ptw.c
@@ -1449,6 +1449,106 @@ static int get_S1prot(CPUARMState *env, ARMMMUIdx mmu_idx, bool is_aa64,
     return prot_rw | PAGE_EXEC;
 }
 
+/* Extra page permission bits, during get_S1prot_indirect only. */
+#define PAGE_GCS      (1 << 3)
+#define PAGE_WXN      (1 << 4)
+#define PAGE_OVERLAY  (1 << 5)
+QEMU_BUILD_BUG_ON(PAGE_RWX & (PAGE_GCS | PAGE_WXN | PAGE_OVERLAY));
+
+static int get_S1prot_indirect(CPUARMState *env, S1Translate *ptw,
+                               ARMMMUIdx mmu_idx, int pi_index, int po_index,
+                               ARMSecuritySpace in_pa, ARMSecuritySpace out_pa)
+{
+    static const uint8_t perm_table[16] = {
+        /* 0 */ PAGE_OVERLAY,  /* no access */
+        /* 1 */ PAGE_OVERLAY | PAGE_READ,
+        /* 2 */ PAGE_OVERLAY | PAGE_EXEC,
+        /* 3 */ PAGE_OVERLAY | PAGE_READ | PAGE_EXEC,
+        /* 4 */ PAGE_OVERLAY,  /* reserved */
+        /* 5 */ PAGE_OVERLAY | PAGE_READ | PAGE_WRITE,
+        /* 6 */ PAGE_OVERLAY | PAGE_READ | PAGE_WRITE | PAGE_EXEC | PAGE_WXN,
+        /* 7 */ PAGE_OVERLAY | PAGE_READ | PAGE_WRITE | PAGE_EXEC,
+        /* 8 */ PAGE_READ,
+        /* 9 */ PAGE_READ | PAGE_GCS,
+        /* A */ PAGE_READ | PAGE_EXEC,
+        /* B */ 0,             /* reserved */
+        /* C */ PAGE_READ | PAGE_WRITE,
+        /* D */ 0,             /* reserved */
+        /* E */ PAGE_READ | PAGE_WRITE | PAGE_EXEC,
+        /* F */ 0,             /* reserved */
+    };
+
+    uint32_t el = regime_el(env, mmu_idx);
+    uint64_t pir = env->cp15.pir_el[el];
+    uint64_t pire0 = 0;
+    int perm;
+
+    if (el < 3) {
+        if (arm_feature(env, ARM_FEATURE_EL3)
+            && !(env->cp15.scr_el3 & SCR_PIEN)) {
+            pir = 0;
+        } else if (el == 2) {
+            pire0 = env->cp15.pire0_el2;
+        } else if (!ptw->in_nv1) {
+            pire0 = env->cp15.pir_el[0];
+        }
+    }
+    perm = perm_table[extract64(pir, pi_index * 4, 4)];
+
+    if (regime_has_2_ranges(mmu_idx)) {
+        int p_perm = perm;
+        int u_perm = perm_table[extract64(pire0, pi_index * 4, 4)];
+
+        if ((p_perm & (PAGE_EXEC | PAGE_GCS)) &&
+            (u_perm & (PAGE_WRITE | PAGE_GCS))) {
+            p_perm &= ~(PAGE_RWX | PAGE_GCS);
+            u_perm &= ~(PAGE_RWX | PAGE_GCS);
+        }
+        if ((u_perm & (PAGE_RWX | PAGE_GCS)) && regime_is_pan(env, mmu_idx)) {
+            p_perm &= ~(PAGE_READ | PAGE_WRITE);
+        }
+        perm = regime_is_user(env, mmu_idx) ? u_perm : p_perm;
+    }
+
+    if (in_pa != out_pa) {
+        switch (in_pa) {
+        case ARMSS_Root:
+            /*
+             * R_ZWRVD: permission fault for insn fetched from non-Root,
+             * I_WWBFB: SIF has no effect in EL3.
+             */
+            perm &= ~(PAGE_EXEC | PAGE_GCS);
+            break;
+        case ARMSS_Realm:
+            /*
+             * R_PKTDS: permission fault for insn fetched from non-Realm,
+             * for Realm EL2 or EL2&0.  The corresponding fault for EL1&0
+             * happens during any stage2 translation.
+             */
+            if (el == 2) {
+                perm &= ~(PAGE_EXEC | PAGE_GCS);
+            }
+            break;
+        case ARMSS_Secure:
+            if (env->cp15.scr_el3 & SCR_SIF) {
+                perm &= ~(PAGE_EXEC | PAGE_GCS);
+            }
+            break;
+        default:
+            /* Input NonSecure must have output NonSecure. */
+            g_assert_not_reached();
+        }
+    }
+
+    if (perm & PAGE_WXN) {
+        perm &= ~PAGE_EXEC;
+    }
+
+    /* TODO: FEAT_GCS */
+
+    return perm & PAGE_RWX;
+}
+
 static ARMVAParameters aa32_va_parameters(CPUARMState *env, uint32_t va,
                                           ARMMMUIdx mmu_idx)
 {
@@ -1678,7 +1778,7 @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
     int32_t stride;
     int addrsize, inputsize, outputsize;
     uint64_t tcr = regime_tcr(env, mmu_idx);
-    int ap, xn, pxn;
+    int ap;
     uint32_t el = regime_el(env, mmu_idx);
     uint64_t descaddrmask;
     bool aarch64 = arm_el_is_aa64(env, el);
@@ -2006,7 +2106,7 @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
             out_space = ARMSS_NonSecure;
             result->f.prot = get_S2prot_noexecute(ap);
         } else {
-            xn = extract64(attrs, 53, 2);
+            int xn = extract64(attrs, 53, 2);
             result->f.prot = get_S2prot(env, ap, xn, ptw->in_s1_is_el0);
         }
 
@@ -2022,7 +2122,6 @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
         int nse, ns = extract32(attrs, 5, 1);
         uint8_t attrindx;
         uint64_t mair;
-        int user_rw, prot_rw;
 
         switch (out_space) {
         case ARMSS_Root:
@@ -2071,33 +2170,51 @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
         default:
             g_assert_not_reached();
         }
-        xn = extract64(attrs, 54, 1);
-        pxn = extract64(attrs, 53, 1);
 
-        if (el == 1 && ptw->in_nv1) {
+        if (param.pie) {
+            int pi = extract64(attrs, 6, 1)
+                   | (extract64(attrs, 51, 1) << 1)
+                   | (extract64(attrs, 53, 2) << 2);
+            int po = extract64(attrs, 60, 3);
             /*
-             * With FEAT_NV, when HCR_EL2.{NV,NV1} == {1,1}, the block/page
-             * descriptor bit 54 holds PXN, 53 is RES0, and the effective value
-             * of UXN is 0. Similarly for bits 59 and 60 in table descriptors
-             * (which we have already folded into bits 53 and 54 of attrs).
-             * AP[1] (descriptor bit 6, our ap bit 0) is treated as 0.
-             * Similarly, APTable[0] from the table descriptor is treated as 0;
-             * we already folded this into AP[1] and squashing that to 0 does
-             * the right thing.
+             * Note that we modified ptw->in_space earlier for NSTable, but
+             * result->f.attrs retains a copy of the original security space.
              */
-            pxn = xn;
-            xn = 0;
-            ap &= ~1;
-        }
+            result->f.prot = get_S1prot_indirect(env, ptw, mmu_idx, pi, po,
+                                                 result->f.attrs.space,
+                                                 out_space);
+        } else {
+            int xn = extract64(attrs, 54, 1);
+            int pxn = extract64(attrs, 53, 1);
+            int user_rw, prot_rw;
 
-        user_rw = simple_ap_to_rw_prot_is_user(ap, true);
-        prot_rw = simple_ap_to_rw_prot_is_user(ap, false);
-        /*
-         * Note that we modified ptw->in_space earlier for NSTable, but
-         * result->f.attrs retains a copy of the original security space.
-         */
-        result->f.prot = get_S1prot(env, mmu_idx, aarch64, user_rw, prot_rw,
-                                    xn, pxn, result->f.attrs.space, out_space);
+            if (el == 1 && ptw->in_nv1) {
+                /*
+                 * With FEAT_NV, when HCR_EL2.{NV,NV1} == {1,1},
+                 * the block/page descriptor bit 54 holds PXN,
+                 * 53 is RES0, and the effective value of UXN is 0.
+                 * Similarly for bits 59 and 60 in table descriptors
+                 * (which we have already folded into bits 53 and 54 of attrs).
+                 * AP[1] (descriptor bit 6, our ap bit 0) is treated as 0.
+                 * Similarly, APTable[0] from the table descriptor is treated
+                 * as 0; we already folded this into AP[1] and squashing
+                 * that to 0 does the right thing.
+                 */
+                pxn = xn;
+                xn = 0;
+                ap &= ~1;
+            }
+
+            user_rw = simple_ap_to_rw_prot_is_user(ap, true);
+            prot_rw = simple_ap_to_rw_prot_is_user(ap, false);
+            /*
+             * Note that we modified ptw->in_space earlier for NSTable, but
+             * result->f.attrs retains a copy of the original security space.
+             */
+            result->f.prot = get_S1prot(env, mmu_idx, aarch64,
+                                        user_rw, prot_rw, xn, pxn,
+                                        result->f.attrs.space, out_space);
+        }
 
         /* Index into MAIR registers for cache attributes */
         attrindx = extract32(attrs, 2, 3);
-- 
2.43.0



  parent reply	other threads:[~2025-08-02 23:43 UTC|newest]

Thread overview: 109+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-08-02 23:28 [PATCH v2 00/85] target/arm: Implement FEAT_GCS Richard Henderson
2025-08-02 23:28 ` [PATCH v2 01/85] linux-user/aarch64: Split out signal_for_exception Richard Henderson
2025-08-12  6:33   ` Philippe Mathieu-Daudé
2025-08-02 23:28 ` [PATCH v2 02/85] linux-user/aarch64: Check syndrome for EXCP_UDEF Richard Henderson
2025-08-02 23:28 ` [PATCH v2 03/85] linux-user/aarch64: Generate ESR signal records Richard Henderson
2025-08-02 23:28 ` [PATCH v2 04/85] target/arm: Add prot_check parameter to pmsav8_mpu_lookup Richard Henderson
2025-08-12  6:34   ` Philippe Mathieu-Daudé
2025-08-02 23:28 ` [PATCH v2 05/85] target/arm: Add in_prot_check to S1Translate Richard Henderson
2025-08-02 23:28 ` [PATCH v2 06/85] target/arm: Skip permission check from arm_cpu_get_phys_page_attrs_debug Richard Henderson
2025-08-02 23:28 ` [PATCH v2 07/85] target/arm: Introduce get_phys_addr_for_at Richard Henderson
2025-08-02 23:28 ` [PATCH v2 08/85] target/arm: Skip AF and DB updates for AccessType_AT Richard Henderson
2025-08-02 23:28 ` [PATCH v2 09/85] target/arm: Add prot_check parameter to do_ats_write Richard Henderson
2025-08-02 23:28 ` [PATCH v2 10/85] target/arm: Fill in HFG[RWI]TR_EL2 bits for Arm v9.5 Richard Henderson
2025-08-02 23:28 ` [PATCH v2 11/85] target/arm: Remove outdated comment for ZCR_EL12 Richard Henderson
2025-08-02 23:28 ` [PATCH v2 12/85] target/arm: Implement FEAT_ATS1A Richard Henderson
2025-08-02 23:28 ` [PATCH v2 13/85] target/arm: Add isar feature test for FEAT_S1PIE, FEAT_S2PIE Richard Henderson
2025-08-02 23:28 ` [PATCH v2 14/85] target/arm: Enable TCR2_ELx.PIE Richard Henderson
2025-08-02 23:28 ` [PATCH v2 15/85] target/arm: Implement PIR_ELx, PIRE0_ELx, S2PIR_EL2 registers Richard Henderson
2025-08-02 23:28 ` [PATCH v2 16/85] target/arm: Force HPD for stage2 translations Richard Henderson
2025-08-02 23:28 ` [PATCH v2 17/85] target/arm: Cache NV1 early in get_phys_addr_lpae Richard Henderson
2025-08-02 23:28 ` [PATCH v2 18/85] target/arm: Populate PIE in aa64_va_parameters Richard Henderson
2025-08-02 23:28 ` Richard Henderson [this message]
2025-08-02 23:28 ` [PATCH v2 20/85] target/arm: Implement get_S2prot_indirect Richard Henderson
2025-08-02 23:28 ` [PATCH v2 21/85] target/arm: Do not migrate env->exception Richard Henderson
2025-08-12  6:24   ` Philippe Mathieu-Daudé
2025-08-02 23:28 ` [PATCH v2 22/85] target/arm: Expand CPUARMState.exception.syndrome to 64 bits Richard Henderson
2025-08-02 23:28 ` [PATCH v2 23/85] target/arm: Expand syndrome parameter to raise_exception* Richard Henderson
2025-08-12  6:26   ` Philippe Mathieu-Daudé
2025-08-12 12:15     ` Richard Henderson
2025-08-12 13:14       ` Philippe Mathieu-Daudé
2025-08-02 23:28 ` [PATCH v2 24/85] target/arm: Implement dirtybit check for PIE Richard Henderson
2025-08-02 23:28 ` [PATCH v2 25/85] target/arm: Enable FEAT_S1PIE and FEAT_S2PIE on -cpu max Richard Henderson
2025-08-02 23:28 ` [PATCH v2 26/85] include/hw/core/cpu: Introduce MMUIdxMap Richard Henderson
2025-08-12  6:22   ` Philippe Mathieu-Daudé
2025-08-02 23:28 ` [PATCH v2 27/85] include/hw/core/cpu: Introduce cpu_tlb_fast Richard Henderson
2025-08-12  6:22   ` Philippe Mathieu-Daudé
2025-08-02 23:28 ` [PATCH v2 28/85] include/hw/core/cpu: Invert the indexing into CPUTLBDescFast Richard Henderson
2025-08-12  6:23   ` Philippe Mathieu-Daudé
2025-08-02 23:28 ` [PATCH v2 29/85] target/hppa: Adjust mmu indexes to begin with 0 Richard Henderson
2025-08-02 23:28 ` [PATCH v2 30/85] include/exec/memopidx: Adjust for 32 mmu indexes Richard Henderson
2025-08-02 23:28 ` [PATCH v2 31/85] include/hw/core/cpu: Widen MMUIdxMap Richard Henderson
2025-08-12  6:16   ` Philippe Mathieu-Daudé
2025-08-02 23:29 ` [PATCH v2 32/85] target/arm: Split out mmuidx.h from cpu.h Richard Henderson
2025-08-12  6:17   ` Philippe Mathieu-Daudé
2025-08-02 23:29 ` [PATCH v2 33/85] target/arm: Convert arm_mmu_idx_to_el from switch to table Richard Henderson
2025-08-04 17:45   ` Pierrick Bouvier
2025-08-02 23:29 ` [PATCH v2 34/85] target/arm: Remove unused env argument from regime_el Richard Henderson
2025-08-12  6:15   ` Philippe Mathieu-Daudé
2025-08-02 23:29 ` [PATCH v2 35/85] target/arm: Convert regime_el from switch to table Richard Henderson
2025-08-02 23:29 ` [PATCH v2 36/85] target/arm: Convert regime_has_2_ranges " Richard Henderson
2025-08-02 23:29 ` [PATCH v2 37/85] target/arm: Remove unused env argument from regime_is_pan Richard Henderson
2025-08-12  6:15   ` Philippe Mathieu-Daudé
2025-08-02 23:29 ` [PATCH v2 38/85] target/arm: Convert regime_is_pan from switch to table Richard Henderson
2025-08-02 23:29 ` [PATCH v2 39/85] target/arm: Remove unused env argument from regime_is_user Richard Henderson
2025-08-12  6:14   ` Philippe Mathieu-Daudé
2025-08-02 23:29 ` [PATCH v2 40/85] target/arm: Convert regime_is_user from switch to table Richard Henderson
2025-08-12  6:13   ` Philippe Mathieu-Daudé
2025-08-02 23:29 ` [PATCH v2 41/85] target/arm: Convert arm_mmu_idx_is_stage1_of_2 " Richard Henderson
2025-08-12  6:14   ` Philippe Mathieu-Daudé
2025-08-02 23:29 ` [PATCH v2 42/85] target/arm: Convert regime_is_stage2 " Richard Henderson
2025-08-12  6:13   ` Philippe Mathieu-Daudé
2025-08-02 23:29 ` [PATCH v2 43/85] target/arm: Introduce mmu indexes for GCS Richard Henderson
2025-08-02 23:29 ` [PATCH v2 44/85] target/arm: Introduce regime_to_gcs Richard Henderson
2025-08-02 23:29 ` [PATCH v2 45/85] target/arm: Support page protections for GCS mmu indexes Richard Henderson
2025-08-02 23:29 ` [PATCH v2 46/85] target/arm: Implement gcs bit for data abort Richard Henderson
2025-08-02 23:29 ` [PATCH v2 47/85] target/arm: Add GCS cpregs Richard Henderson
2025-08-02 23:29 ` [PATCH v2 48/85] target/arm: Add GCS enable and trap levels to DisasContext Richard Henderson
2025-08-02 23:29 ` [PATCH v2 49/85] target/arm: Implement FEAT_CHK Richard Henderson
2025-08-02 23:29 ` [PATCH v2 50/85] target/arm: Expand pstate to 64 bits Richard Henderson
2025-08-12  6:11   ` Philippe Mathieu-Daudé
2025-08-02 23:29 ` [PATCH v2 51/85] target/arm: Add syndrome data for EC_GCS Richard Henderson
2025-08-02 23:29 ` [PATCH v2 52/85] target/arm: Implement EXLOCKException for ELR_ELx and SPSR_ELx Richard Henderson
2025-08-02 23:29 ` [PATCH v2 53/85] target/arm: Split {arm,core}_user_mem_index Richard Henderson
2025-08-02 23:29 ` [PATCH v2 54/85] target/arm: Introduce delay_exception{_el} Richard Henderson
2025-08-02 23:29 ` [PATCH v2 55/85] target/arm: Emit HSTR trap exception out of line Richard Henderson
2025-08-02 23:29 ` [PATCH v2 56/85] target/arm: Emit v7m LTPSIZE " Richard Henderson
2025-08-02 23:29 ` [PATCH v2 57/85] target/arm: Implement GCSSTR, GCSSTTR Richard Henderson
2025-08-02 23:29 ` [PATCH v2 58/85] target/arm: Implement GCSB Richard Henderson
2025-08-02 23:29 ` [PATCH v2 59/85] target/arm: Implement GCSPUSHM Richard Henderson
2025-08-02 23:29 ` [PATCH v2 60/85] target/arm: Implement GCSPOPM Richard Henderson
2025-08-02 23:29 ` [PATCH v2 61/85] target/arm: Implement GCSPUSHX Richard Henderson
2025-08-02 23:29 ` [PATCH v2 62/85] target/arm: Implement GCSPOPX Richard Henderson
2025-08-02 23:29 ` [PATCH v2 63/85] target/arm: Implement GCSPOPCX Richard Henderson
2025-08-02 23:29 ` [PATCH v2 64/85] target/arm: Implement GCSSS1 Richard Henderson
2025-08-02 23:29 ` [PATCH v2 65/85] target/arm: Implement GCSSS2 Richard Henderson
2025-08-02 23:29 ` [PATCH v2 66/85] target/arm: Add gcs record for BL Richard Henderson
2025-08-02 23:29 ` [PATCH v2 67/85] target/arm: Add gcs record for BLR Richard Henderson
2025-08-02 23:29 ` [PATCH v2 68/85] target/arm: Add gcs record for BLR with PAuth Richard Henderson
2025-08-02 23:29 ` [PATCH v2 69/85] target/arm: Load gcs record for RET Richard Henderson
2025-08-02 23:29 ` [PATCH v2 70/85] target/arm: Load gcs record for RET with PAuth Richard Henderson
2025-08-02 23:29 ` [PATCH v2 71/85] target/arm: Copy EXLOCKEn to EXLOCK on exception to the same EL Richard Henderson
2025-08-02 23:29 ` [PATCH v2 72/85] target/arm: Implement EXLOCK check during exception return Richard Henderson
2025-08-02 23:29 ` [PATCH v2 73/85] target/arm: Enable FEAT_GCS with -cpu max Richard Henderson
2025-08-02 23:29 ` [PATCH v2 74/85] linux-user/aarch64: Implement prctls for GCS Richard Henderson
2025-08-02 23:29 ` [PATCH v2 75/85] linux-user/aarch64: Allocate new gcs stack on clone Richard Henderson
2025-08-02 23:29 ` [PATCH v2 76/85] linux-user/aarch64: Release gcs stack on thread exit Richard Henderson
2025-08-02 23:29 ` [PATCH v2 77/85] linux-user/aarch64: Implement map_shadow_stack syscall Richard Henderson
2025-08-02 23:29 ` [PATCH v2 78/85] target/arm: Enable GCSPR_EL0 for read in user-mode Richard Henderson
2025-08-02 23:29 ` [PATCH v2 79/85] linux-user/aarch64: Inject SIGSEGV for GCS faults Richard Henderson
2025-08-02 23:29 ` [PATCH v2 80/85] linux-user/aarch64: Generate GCS signal records Richard Henderson
2025-08-02 23:29 ` [PATCH v2 81/85] linux-user: Change exported get_elf_hwcap to abi_ulong Richard Henderson
2025-08-12  6:44   ` Philippe Mathieu-Daudé
2025-08-02 23:29 ` [PATCH v2 82/85] linux-user/aarch64: Enable GCS in HWCAP Richard Henderson
2025-08-02 23:29 ` [PATCH v2 83/85] tests/tcg/aarch64: Add gcsstr Richard Henderson
2025-08-02 23:29 ` [PATCH v2 84/85] tests/tcg/aarch64: Add gcspushm Richard Henderson
2025-08-02 23:29 ` [PATCH v2 85/85] tests/tcg/aarch64: Add gcsss Richard Henderson
2025-08-12  3:46 ` [PATCH v2 00/85] target/arm: Implement FEAT_GCS Thiago Jung Bauermann
2025-08-12 12:07   ` Richard Henderson
2025-08-14 10:15     ` Richard Henderson

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20250802232953.413294-20-richard.henderson@linaro.org \
    --to=richard.henderson@linaro.org \
    --cc=pierrick.bouvier@linaro.org \
    --cc=qemu-arm@nongnu.org \
    --cc=qemu-devel@nongnu.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).