From: Richard Henderson <richard.henderson@linaro.org>
To: qemu-devel@nongnu.org
Cc: qemu-arm@nongnu.org, Pierrick Bouvier <pierrick.bouvier@linaro.org>
Subject: [PATCH v2 19/85] target/arm: Implement get_S1prot_indirect
Date: Sun, 3 Aug 2025 09:28:47 +1000 [thread overview]
Message-ID: <20250802232953.413294-20-richard.henderson@linaro.org> (raw)
In-Reply-To: <20250802232953.413294-1-richard.henderson@linaro.org>
This approximately corresponds to AArch64.S1IndirectBasePermissions
and the tail of AArch64.S1ComputePermissions which applies WXN.
Reviewed-by: Pierrick Bouvier <pierrick.bouvier@linaro.org>
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
---
target/arm/ptw.c | 169 +++++++++++++++++++++++++++++++++++++++--------
1 file changed, 143 insertions(+), 26 deletions(-)
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
index a5a3c03a4c..7fd1cee98a 100644
--- a/target/arm/ptw.c
+++ b/target/arm/ptw.c
@@ -1449,6 +1449,106 @@ static int get_S1prot(CPUARMState *env, ARMMMUIdx mmu_idx, bool is_aa64,
return prot_rw | PAGE_EXEC;
}
+/* Extra page permission bits, during get_S1prot_indirect only. */
+#define PAGE_GCS (1 << 3)
+#define PAGE_WXN (1 << 4)
+#define PAGE_OVERLAY (1 << 5)
+QEMU_BUILD_BUG_ON(PAGE_RWX & (PAGE_GCS | PAGE_WXN | PAGE_OVERLAY));
+
+static int get_S1prot_indirect(CPUARMState *env, S1Translate *ptw,
+ ARMMMUIdx mmu_idx, int pi_index, int po_index,
+ ARMSecuritySpace in_pa, ARMSecuritySpace out_pa)
+{
+ static const uint8_t perm_table[16] = {
+ /* 0 */ PAGE_OVERLAY, /* no access */
+ /* 1 */ PAGE_OVERLAY | PAGE_READ,
+ /* 2 */ PAGE_OVERLAY | PAGE_EXEC,
+ /* 3 */ PAGE_OVERLAY | PAGE_READ | PAGE_EXEC,
+ /* 4 */ PAGE_OVERLAY, /* reserved */
+ /* 5 */ PAGE_OVERLAY | PAGE_READ | PAGE_WRITE,
+ /* 6 */ PAGE_OVERLAY | PAGE_READ | PAGE_WRITE | PAGE_EXEC | PAGE_WXN,
+ /* 7 */ PAGE_OVERLAY | PAGE_READ | PAGE_WRITE | PAGE_EXEC,
+ /* 8 */ PAGE_READ,
+ /* 9 */ PAGE_READ | PAGE_GCS,
+ /* A */ PAGE_READ | PAGE_EXEC,
+ /* B */ 0, /* reserved */
+ /* C */ PAGE_READ | PAGE_WRITE,
+ /* D */ 0, /* reserved */
+ /* E */ PAGE_READ | PAGE_WRITE | PAGE_EXEC,
+ /* F */ 0, /* reserved */
+ };
+
+ uint32_t el = regime_el(env, mmu_idx);
+ uint64_t pir = env->cp15.pir_el[el];
+ uint64_t pire0 = 0;
+ int perm;
+
+ if (el < 3) {
+ if (arm_feature(env, ARM_FEATURE_EL3)
+ && !(env->cp15.scr_el3 & SCR_PIEN)) {
+ pir = 0;
+ } else if (el == 2) {
+ pire0 = env->cp15.pire0_el2;
+ } else if (!ptw->in_nv1) {
+ pire0 = env->cp15.pir_el[0];
+ }
+ }
+ perm = perm_table[extract64(pir, pi_index * 4, 4)];
+
+ if (regime_has_2_ranges(mmu_idx)) {
+ int p_perm = perm;
+ int u_perm = perm_table[extract64(pire0, pi_index * 4, 4)];
+
+ if ((p_perm & (PAGE_EXEC | PAGE_GCS)) &&
+ (u_perm & (PAGE_WRITE | PAGE_GCS))) {
+ p_perm &= ~(PAGE_RWX | PAGE_GCS);
+ u_perm &= ~(PAGE_RWX | PAGE_GCS);
+ }
+ if ((u_perm & (PAGE_RWX | PAGE_GCS)) && regime_is_pan(env, mmu_idx)) {
+ p_perm &= ~(PAGE_READ | PAGE_WRITE);
+ }
+ perm = regime_is_user(env, mmu_idx) ? u_perm : p_perm;
+ }
+
+ if (in_pa != out_pa) {
+ switch (in_pa) {
+ case ARMSS_Root:
+ /*
+ * R_ZWRVD: permission fault for insn fetched from non-Root,
+ * I_WWBFB: SIF has no effect in EL3.
+ */
+ perm &= ~(PAGE_EXEC | PAGE_GCS);
+ break;
+ case ARMSS_Realm:
+ /*
+ * R_PKTDS: permission fault for insn fetched from non-Realm,
+ * for Realm EL2 or EL2&0. The corresponding fault for EL1&0
+ * happens during any stage2 translation.
+ */
+ if (el == 2) {
+ perm &= ~(PAGE_EXEC | PAGE_GCS);
+ }
+ break;
+ case ARMSS_Secure:
+ if (env->cp15.scr_el3 & SCR_SIF) {
+ perm &= ~(PAGE_EXEC | PAGE_GCS);
+ }
+ break;
+ default:
+ /* Input NonSecure must have output NonSecure. */
+ g_assert_not_reached();
+ }
+ }
+
+ if (perm & PAGE_WXN) {
+ perm &= ~PAGE_EXEC;
+ }
+
+ /* TODO: FEAT_GCS */
+
+ return perm & PAGE_RWX;
+}
+
static ARMVAParameters aa32_va_parameters(CPUARMState *env, uint32_t va,
ARMMMUIdx mmu_idx)
{
@@ -1678,7 +1778,7 @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
int32_t stride;
int addrsize, inputsize, outputsize;
uint64_t tcr = regime_tcr(env, mmu_idx);
- int ap, xn, pxn;
+ int ap;
uint32_t el = regime_el(env, mmu_idx);
uint64_t descaddrmask;
bool aarch64 = arm_el_is_aa64(env, el);
@@ -2006,7 +2106,7 @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
out_space = ARMSS_NonSecure;
result->f.prot = get_S2prot_noexecute(ap);
} else {
- xn = extract64(attrs, 53, 2);
+ int xn = extract64(attrs, 53, 2);
result->f.prot = get_S2prot(env, ap, xn, ptw->in_s1_is_el0);
}
@@ -2022,7 +2122,6 @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
int nse, ns = extract32(attrs, 5, 1);
uint8_t attrindx;
uint64_t mair;
- int user_rw, prot_rw;
switch (out_space) {
case ARMSS_Root:
@@ -2071,33 +2170,51 @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
default:
g_assert_not_reached();
}
- xn = extract64(attrs, 54, 1);
- pxn = extract64(attrs, 53, 1);
- if (el == 1 && ptw->in_nv1) {
+ if (param.pie) {
+ int pi = extract64(attrs, 6, 1)
+ | (extract64(attrs, 51, 1) << 1)
+ | (extract64(attrs, 53, 2) << 2);
+ int po = extract64(attrs, 60, 3);
/*
- * With FEAT_NV, when HCR_EL2.{NV,NV1} == {1,1}, the block/page
- * descriptor bit 54 holds PXN, 53 is RES0, and the effective value
- * of UXN is 0. Similarly for bits 59 and 60 in table descriptors
- * (which we have already folded into bits 53 and 54 of attrs).
- * AP[1] (descriptor bit 6, our ap bit 0) is treated as 0.
- * Similarly, APTable[0] from the table descriptor is treated as 0;
- * we already folded this into AP[1] and squashing that to 0 does
- * the right thing.
+ * Note that we modified ptw->in_space earlier for NSTable, but
+ * result->f.attrs retains a copy of the original security space.
*/
- pxn = xn;
- xn = 0;
- ap &= ~1;
- }
+ result->f.prot = get_S1prot_indirect(env, ptw, mmu_idx, pi, po,
+ result->f.attrs.space,
+ out_space);
+ } else {
+ int xn = extract64(attrs, 54, 1);
+ int pxn = extract64(attrs, 53, 1);
+ int user_rw, prot_rw;
- user_rw = simple_ap_to_rw_prot_is_user(ap, true);
- prot_rw = simple_ap_to_rw_prot_is_user(ap, false);
- /*
- * Note that we modified ptw->in_space earlier for NSTable, but
- * result->f.attrs retains a copy of the original security space.
- */
- result->f.prot = get_S1prot(env, mmu_idx, aarch64, user_rw, prot_rw,
- xn, pxn, result->f.attrs.space, out_space);
+ if (el == 1 && ptw->in_nv1) {
+ /*
+ * With FEAT_NV, when HCR_EL2.{NV,NV1} == {1,1},
+ * the block/page descriptor bit 54 holds PXN,
+ * 53 is RES0, and the effective value of UXN is 0.
+ * Similarly for bits 59 and 60 in table descriptors
+ * (which we have already folded into bits 53 and 54 of attrs).
+ * AP[1] (descriptor bit 6, our ap bit 0) is treated as 0.
+ * Similarly, APTable[0] from the table descriptor is treated
+ * as 0; we already folded this into AP[1] and squashing
+ * that to 0 does the right thing.
+ */
+ pxn = xn;
+ xn = 0;
+ ap &= ~1;
+ }
+
+ user_rw = simple_ap_to_rw_prot_is_user(ap, true);
+ prot_rw = simple_ap_to_rw_prot_is_user(ap, false);
+ /*
+ * Note that we modified ptw->in_space earlier for NSTable, but
+ * result->f.attrs retains a copy of the original security space.
+ */
+ result->f.prot = get_S1prot(env, mmu_idx, aarch64,
+ user_rw, prot_rw, xn, pxn,
+ result->f.attrs.space, out_space);
+ }
/* Index into MAIR registers for cache attributes */
attrindx = extract32(attrs, 2, 3);
--
2.43.0
next prev parent reply other threads:[~2025-08-02 23:43 UTC|newest]
Thread overview: 109+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-08-02 23:28 [PATCH v2 00/85] target/arm: Implement FEAT_GCS Richard Henderson
2025-08-02 23:28 ` [PATCH v2 01/85] linux-user/aarch64: Split out signal_for_exception Richard Henderson
2025-08-12 6:33 ` Philippe Mathieu-Daudé
2025-08-02 23:28 ` [PATCH v2 02/85] linux-user/aarch64: Check syndrome for EXCP_UDEF Richard Henderson
2025-08-02 23:28 ` [PATCH v2 03/85] linux-user/aarch64: Generate ESR signal records Richard Henderson
2025-08-02 23:28 ` [PATCH v2 04/85] target/arm: Add prot_check parameter to pmsav8_mpu_lookup Richard Henderson
2025-08-12 6:34 ` Philippe Mathieu-Daudé
2025-08-02 23:28 ` [PATCH v2 05/85] target/arm: Add in_prot_check to S1Translate Richard Henderson
2025-08-02 23:28 ` [PATCH v2 06/85] target/arm: Skip permission check from arm_cpu_get_phys_page_attrs_debug Richard Henderson
2025-08-02 23:28 ` [PATCH v2 07/85] target/arm: Introduce get_phys_addr_for_at Richard Henderson
2025-08-02 23:28 ` [PATCH v2 08/85] target/arm: Skip AF and DB updates for AccessType_AT Richard Henderson
2025-08-02 23:28 ` [PATCH v2 09/85] target/arm: Add prot_check parameter to do_ats_write Richard Henderson
2025-08-02 23:28 ` [PATCH v2 10/85] target/arm: Fill in HFG[RWI]TR_EL2 bits for Arm v9.5 Richard Henderson
2025-08-02 23:28 ` [PATCH v2 11/85] target/arm: Remove outdated comment for ZCR_EL12 Richard Henderson
2025-08-02 23:28 ` [PATCH v2 12/85] target/arm: Implement FEAT_ATS1A Richard Henderson
2025-08-02 23:28 ` [PATCH v2 13/85] target/arm: Add isar feature test for FEAT_S1PIE, FEAT_S2PIE Richard Henderson
2025-08-02 23:28 ` [PATCH v2 14/85] target/arm: Enable TCR2_ELx.PIE Richard Henderson
2025-08-02 23:28 ` [PATCH v2 15/85] target/arm: Implement PIR_ELx, PIRE0_ELx, S2PIR_EL2 registers Richard Henderson
2025-08-02 23:28 ` [PATCH v2 16/85] target/arm: Force HPD for stage2 translations Richard Henderson
2025-08-02 23:28 ` [PATCH v2 17/85] target/arm: Cache NV1 early in get_phys_addr_lpae Richard Henderson
2025-08-02 23:28 ` [PATCH v2 18/85] target/arm: Populate PIE in aa64_va_parameters Richard Henderson
2025-08-02 23:28 ` Richard Henderson [this message]
2025-08-02 23:28 ` [PATCH v2 20/85] target/arm: Implement get_S2prot_indirect Richard Henderson
2025-08-02 23:28 ` [PATCH v2 21/85] target/arm: Do not migrate env->exception Richard Henderson
2025-08-12 6:24 ` Philippe Mathieu-Daudé
2025-08-02 23:28 ` [PATCH v2 22/85] target/arm: Expand CPUARMState.exception.syndrome to 64 bits Richard Henderson
2025-08-02 23:28 ` [PATCH v2 23/85] target/arm: Expand syndrome parameter to raise_exception* Richard Henderson
2025-08-12 6:26 ` Philippe Mathieu-Daudé
2025-08-12 12:15 ` Richard Henderson
2025-08-12 13:14 ` Philippe Mathieu-Daudé
2025-08-02 23:28 ` [PATCH v2 24/85] target/arm: Implement dirtybit check for PIE Richard Henderson
2025-08-02 23:28 ` [PATCH v2 25/85] target/arm: Enable FEAT_S1PIE and FEAT_S2PIE on -cpu max Richard Henderson
2025-08-02 23:28 ` [PATCH v2 26/85] include/hw/core/cpu: Introduce MMUIdxMap Richard Henderson
2025-08-12 6:22 ` Philippe Mathieu-Daudé
2025-08-02 23:28 ` [PATCH v2 27/85] include/hw/core/cpu: Introduce cpu_tlb_fast Richard Henderson
2025-08-12 6:22 ` Philippe Mathieu-Daudé
2025-08-02 23:28 ` [PATCH v2 28/85] include/hw/core/cpu: Invert the indexing into CPUTLBDescFast Richard Henderson
2025-08-12 6:23 ` Philippe Mathieu-Daudé
2025-08-02 23:28 ` [PATCH v2 29/85] target/hppa: Adjust mmu indexes to begin with 0 Richard Henderson
2025-08-02 23:28 ` [PATCH v2 30/85] include/exec/memopidx: Adjust for 32 mmu indexes Richard Henderson
2025-08-02 23:28 ` [PATCH v2 31/85] include/hw/core/cpu: Widen MMUIdxMap Richard Henderson
2025-08-12 6:16 ` Philippe Mathieu-Daudé
2025-08-02 23:29 ` [PATCH v2 32/85] target/arm: Split out mmuidx.h from cpu.h Richard Henderson
2025-08-12 6:17 ` Philippe Mathieu-Daudé
2025-08-02 23:29 ` [PATCH v2 33/85] target/arm: Convert arm_mmu_idx_to_el from switch to table Richard Henderson
2025-08-04 17:45 ` Pierrick Bouvier
2025-08-02 23:29 ` [PATCH v2 34/85] target/arm: Remove unused env argument from regime_el Richard Henderson
2025-08-12 6:15 ` Philippe Mathieu-Daudé
2025-08-02 23:29 ` [PATCH v2 35/85] target/arm: Convert regime_el from switch to table Richard Henderson
2025-08-02 23:29 ` [PATCH v2 36/85] target/arm: Convert regime_has_2_ranges " Richard Henderson
2025-08-02 23:29 ` [PATCH v2 37/85] target/arm: Remove unused env argument from regime_is_pan Richard Henderson
2025-08-12 6:15 ` Philippe Mathieu-Daudé
2025-08-02 23:29 ` [PATCH v2 38/85] target/arm: Convert regime_is_pan from switch to table Richard Henderson
2025-08-02 23:29 ` [PATCH v2 39/85] target/arm: Remove unused env argument from regime_is_user Richard Henderson
2025-08-12 6:14 ` Philippe Mathieu-Daudé
2025-08-02 23:29 ` [PATCH v2 40/85] target/arm: Convert regime_is_user from switch to table Richard Henderson
2025-08-12 6:13 ` Philippe Mathieu-Daudé
2025-08-02 23:29 ` [PATCH v2 41/85] target/arm: Convert arm_mmu_idx_is_stage1_of_2 " Richard Henderson
2025-08-12 6:14 ` Philippe Mathieu-Daudé
2025-08-02 23:29 ` [PATCH v2 42/85] target/arm: Convert regime_is_stage2 " Richard Henderson
2025-08-12 6:13 ` Philippe Mathieu-Daudé
2025-08-02 23:29 ` [PATCH v2 43/85] target/arm: Introduce mmu indexes for GCS Richard Henderson
2025-08-02 23:29 ` [PATCH v2 44/85] target/arm: Introduce regime_to_gcs Richard Henderson
2025-08-02 23:29 ` [PATCH v2 45/85] target/arm: Support page protections for GCS mmu indexes Richard Henderson
2025-08-02 23:29 ` [PATCH v2 46/85] target/arm: Implement gcs bit for data abort Richard Henderson
2025-08-02 23:29 ` [PATCH v2 47/85] target/arm: Add GCS cpregs Richard Henderson
2025-08-02 23:29 ` [PATCH v2 48/85] target/arm: Add GCS enable and trap levels to DisasContext Richard Henderson
2025-08-02 23:29 ` [PATCH v2 49/85] target/arm: Implement FEAT_CHK Richard Henderson
2025-08-02 23:29 ` [PATCH v2 50/85] target/arm: Expand pstate to 64 bits Richard Henderson
2025-08-12 6:11 ` Philippe Mathieu-Daudé
2025-08-02 23:29 ` [PATCH v2 51/85] target/arm: Add syndrome data for EC_GCS Richard Henderson
2025-08-02 23:29 ` [PATCH v2 52/85] target/arm: Implement EXLOCKException for ELR_ELx and SPSR_ELx Richard Henderson
2025-08-02 23:29 ` [PATCH v2 53/85] target/arm: Split {arm,core}_user_mem_index Richard Henderson
2025-08-02 23:29 ` [PATCH v2 54/85] target/arm: Introduce delay_exception{_el} Richard Henderson
2025-08-02 23:29 ` [PATCH v2 55/85] target/arm: Emit HSTR trap exception out of line Richard Henderson
2025-08-02 23:29 ` [PATCH v2 56/85] target/arm: Emit v7m LTPSIZE " Richard Henderson
2025-08-02 23:29 ` [PATCH v2 57/85] target/arm: Implement GCSSTR, GCSSTTR Richard Henderson
2025-08-02 23:29 ` [PATCH v2 58/85] target/arm: Implement GCSB Richard Henderson
2025-08-02 23:29 ` [PATCH v2 59/85] target/arm: Implement GCSPUSHM Richard Henderson
2025-08-02 23:29 ` [PATCH v2 60/85] target/arm: Implement GCSPOPM Richard Henderson
2025-08-02 23:29 ` [PATCH v2 61/85] target/arm: Implement GCSPUSHX Richard Henderson
2025-08-02 23:29 ` [PATCH v2 62/85] target/arm: Implement GCSPOPX Richard Henderson
2025-08-02 23:29 ` [PATCH v2 63/85] target/arm: Implement GCSPOPCX Richard Henderson
2025-08-02 23:29 ` [PATCH v2 64/85] target/arm: Implement GCSSS1 Richard Henderson
2025-08-02 23:29 ` [PATCH v2 65/85] target/arm: Implement GCSSS2 Richard Henderson
2025-08-02 23:29 ` [PATCH v2 66/85] target/arm: Add gcs record for BL Richard Henderson
2025-08-02 23:29 ` [PATCH v2 67/85] target/arm: Add gcs record for BLR Richard Henderson
2025-08-02 23:29 ` [PATCH v2 68/85] target/arm: Add gcs record for BLR with PAuth Richard Henderson
2025-08-02 23:29 ` [PATCH v2 69/85] target/arm: Load gcs record for RET Richard Henderson
2025-08-02 23:29 ` [PATCH v2 70/85] target/arm: Load gcs record for RET with PAuth Richard Henderson
2025-08-02 23:29 ` [PATCH v2 71/85] target/arm: Copy EXLOCKEn to EXLOCK on exception to the same EL Richard Henderson
2025-08-02 23:29 ` [PATCH v2 72/85] target/arm: Implement EXLOCK check during exception return Richard Henderson
2025-08-02 23:29 ` [PATCH v2 73/85] target/arm: Enable FEAT_GCS with -cpu max Richard Henderson
2025-08-02 23:29 ` [PATCH v2 74/85] linux-user/aarch64: Implement prctls for GCS Richard Henderson
2025-08-02 23:29 ` [PATCH v2 75/85] linux-user/aarch64: Allocate new gcs stack on clone Richard Henderson
2025-08-02 23:29 ` [PATCH v2 76/85] linux-user/aarch64: Release gcs stack on thread exit Richard Henderson
2025-08-02 23:29 ` [PATCH v2 77/85] linux-user/aarch64: Implement map_shadow_stack syscall Richard Henderson
2025-08-02 23:29 ` [PATCH v2 78/85] target/arm: Enable GCSPR_EL0 for read in user-mode Richard Henderson
2025-08-02 23:29 ` [PATCH v2 79/85] linux-user/aarch64: Inject SIGSEGV for GCS faults Richard Henderson
2025-08-02 23:29 ` [PATCH v2 80/85] linux-user/aarch64: Generate GCS signal records Richard Henderson
2025-08-02 23:29 ` [PATCH v2 81/85] linux-user: Change exported get_elf_hwcap to abi_ulong Richard Henderson
2025-08-12 6:44 ` Philippe Mathieu-Daudé
2025-08-02 23:29 ` [PATCH v2 82/85] linux-user/aarch64: Enable GCS in HWCAP Richard Henderson
2025-08-02 23:29 ` [PATCH v2 83/85] tests/tcg/aarch64: Add gcsstr Richard Henderson
2025-08-02 23:29 ` [PATCH v2 84/85] tests/tcg/aarch64: Add gcspushm Richard Henderson
2025-08-02 23:29 ` [PATCH v2 85/85] tests/tcg/aarch64: Add gcsss Richard Henderson
2025-08-12 3:46 ` [PATCH v2 00/85] target/arm: Implement FEAT_GCS Thiago Jung Bauermann
2025-08-12 12:07 ` Richard Henderson
2025-08-14 10:15 ` Richard Henderson
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20250802232953.413294-20-richard.henderson@linaro.org \
--to=richard.henderson@linaro.org \
--cc=pierrick.bouvier@linaro.org \
--cc=qemu-arm@nongnu.org \
--cc=qemu-devel@nongnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).