From: Richard Henderson <richard.henderson@linaro.org>
To: qemu-devel@nongnu.org
Cc: qemu-arm@nongnu.org, Pierrick Bouvier <pierrick.bouvier@linaro.org>
Subject: [PATCH v6 09/73] target/arm: Implement get_S2prot_indirect
Date: Fri, 3 Oct 2025 10:06:56 -0700 [thread overview]
Message-ID: <20251003170800.997167-10-richard.henderson@linaro.org> (raw)
In-Reply-To: <20251003170800.997167-1-richard.henderson@linaro.org>
Move the stage2 permissions for normal accesses to
GetPhysAddrResult.s2prot. Put the stage2 permissions
for page table walking in CPUTLBEntryFull.prot.
This allows the permission checks in S1_ptw_translate
and arm_casq_ptw to see the right permission.
Reviewed-by: Pierrick Bouvier <pierrick.bouvier@linaro.org>
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
---
target/arm/internals.h | 7 ++++
target/arm/ptw.c | 81 +++++++++++++++++++++++++++++++-----------
2 files changed, 68 insertions(+), 20 deletions(-)
diff --git a/target/arm/internals.h b/target/arm/internals.h
index face1019f5..22947c4b78 100644
--- a/target/arm/internals.h
+++ b/target/arm/internals.h
@@ -1577,6 +1577,13 @@ typedef struct ARMCacheAttrs {
typedef struct GetPhysAddrResult {
CPUTLBEntryFull f;
ARMCacheAttrs cacheattrs;
+ /*
+ * For ARMMMUIdx_Stage2*, the protection installed into f.prot
+ * is the result for AccessType_TTW, i.e. the page table walk itself.
+ * The protection installed info s2prot is the one to be merged
+ * with the stage1 protection.
+ */
+ int s2prot;
} GetPhysAddrResult;
/**
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
index 4fb4436db1..6dcd3adbdf 100644
--- a/target/arm/ptw.c
+++ b/target/arm/ptw.c
@@ -1280,7 +1280,7 @@ do_fault:
* @xn: XN (execute-never) bits
* @s1_is_el0: true if this is S2 of an S1+2 walk for EL0
*/
-static int get_S2prot_noexecute(int s2ap)
+static int get_S2prot(CPUARMState *env, int s2ap, int xn, bool s1_is_el0)
{
int prot = 0;
@@ -1290,12 +1290,6 @@ static int get_S2prot_noexecute(int s2ap)
if (s2ap & 2) {
prot |= PAGE_WRITE;
}
- return prot;
-}
-
-static int get_S2prot(CPUARMState *env, int s2ap, int xn, bool s1_is_el0)
-{
- int prot = get_S2prot_noexecute(s2ap);
if (cpu_isar_feature(any_tts2uxn, env_archcpu(env))) {
switch (xn) {
@@ -1327,6 +1321,44 @@ static int get_S2prot(CPUARMState *env, int s2ap, int xn, bool s1_is_el0)
return prot;
}
+static int get_S2prot_indirect(CPUARMState *env, GetPhysAddrResult *result,
+ int pi_index, int po_index, bool s1_is_el0)
+{
+ /* Last index is (priv, unpriv, ttw) */
+ static const uint8_t perm_table[16][3] = {
+ /* 0 */ { 0, 0, 0 }, /* no access */
+ /* 1 */ { 0, 0, 0 }, /* reserved */
+ /* 2 */ { PAGE_READ, PAGE_READ, PAGE_READ | PAGE_WRITE },
+ /* 3 */ { PAGE_READ, PAGE_READ, PAGE_READ | PAGE_WRITE },
+ /* 4 */ { PAGE_WRITE, PAGE_WRITE, 0 },
+ /* 5 */ { 0, 0, 0 }, /* reserved */
+ /* 6 */ { PAGE_READ, PAGE_READ, PAGE_READ | PAGE_WRITE },
+ /* 7 */ { PAGE_READ, PAGE_READ, PAGE_READ | PAGE_WRITE },
+ /* 8 */ { PAGE_READ, PAGE_READ, PAGE_READ },
+ /* 9 */ { PAGE_READ, PAGE_READ | PAGE_EXEC, PAGE_READ },
+ /* A */ { PAGE_READ | PAGE_EXEC, PAGE_READ, PAGE_READ },
+ /* B */ { PAGE_READ | PAGE_EXEC, PAGE_READ | PAGE_EXEC, PAGE_READ },
+ /* C */ { PAGE_READ | PAGE_WRITE,
+ PAGE_READ | PAGE_WRITE,
+ PAGE_READ | PAGE_WRITE },
+ /* D */ { PAGE_READ | PAGE_WRITE,
+ PAGE_READ | PAGE_WRITE | PAGE_EXEC,
+ PAGE_READ | PAGE_WRITE },
+ /* E */ { PAGE_READ | PAGE_WRITE | PAGE_EXEC,
+ PAGE_READ | PAGE_WRITE,
+ PAGE_READ | PAGE_WRITE },
+ /* F */ { PAGE_READ | PAGE_WRITE | PAGE_EXEC,
+ PAGE_READ | PAGE_WRITE | PAGE_EXEC,
+ PAGE_READ | PAGE_WRITE },
+ };
+
+ uint64_t pir = (env->cp15.scr_el3 & SCR_PIEN ? env->cp15.s2pir_el2 : 0);
+ int s2pi = extract64(pir, pi_index * 4, 4);
+
+ result->f.prot = perm_table[s2pi][2];
+ return perm_table[s2pi][s1_is_el0];
+}
+
/*
* Translate section/page access permissions to protection flags
* @env: CPUARMState
@@ -1777,7 +1809,7 @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
int32_t stride;
int addrsize, inputsize, outputsize;
uint64_t tcr = regime_tcr(env, mmu_idx);
- int ap;
+ int ap, prot;
uint32_t el = regime_el(env, mmu_idx);
uint64_t descaddrmask;
bool aarch64 = arm_el_is_aa64(env, el);
@@ -2101,6 +2133,18 @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
ap = extract32(attrs, 6, 2);
out_space = ptw->in_space;
if (regime_is_stage2(mmu_idx)) {
+ if (param.pie) {
+ int pi = extract64(attrs, 6, 1)
+ | (extract64(attrs, 51, 1) << 1)
+ | (extract64(attrs, 53, 2) << 2);
+ int po = extract64(attrs, 60, 3);
+ prot = get_S2prot_indirect(env, result, pi, po, ptw->in_s1_is_el0);
+ } else {
+ int xn = extract64(attrs, 53, 2);
+ prot = get_S2prot(env, ap, xn, ptw->in_s1_is_el0);
+ /* Install TTW permissions in f.prot. */
+ result->f.prot = prot & (PAGE_READ | PAGE_WRITE);
+ }
/*
* R_GYNXY: For stage2 in Realm security state, bit 55 is NS.
* The bit remains ignored for other security states.
@@ -2109,11 +2153,9 @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
*/
if (out_space == ARMSS_Realm && extract64(attrs, 55, 1)) {
out_space = ARMSS_NonSecure;
- result->f.prot = get_S2prot_noexecute(ap);
- } else {
- int xn = extract64(attrs, 53, 2);
- result->f.prot = get_S2prot(env, ap, xn, ptw->in_s1_is_el0);
+ prot &= ~PAGE_EXEC;
}
+ result->s2prot = prot;
result->cacheattrs.is_s2_format = true;
result->cacheattrs.attrs = extract32(attrs, 2, 4);
@@ -2185,9 +2227,8 @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
* Note that we modified ptw->in_space earlier for NSTable, but
* result->f.attrs retains a copy of the original security space.
*/
- result->f.prot = get_S1prot_indirect(env, ptw, mmu_idx, pi, po,
- result->f.attrs.space,
- out_space);
+ prot = get_S1prot_indirect(env, ptw, mmu_idx, pi, po,
+ result->f.attrs.space, out_space);
} else {
int xn = extract64(attrs, 54, 1);
int pxn = extract64(attrs, 53, 1);
@@ -2216,10 +2257,10 @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
* Note that we modified ptw->in_space earlier for NSTable, but
* result->f.attrs retains a copy of the original security space.
*/
- result->f.prot = get_S1prot(env, mmu_idx, aarch64,
- user_rw, prot_rw, xn, pxn,
- result->f.attrs.space, out_space);
+ prot = get_S1prot(env, mmu_idx, aarch64, user_rw, prot_rw, xn, pxn,
+ result->f.attrs.space, out_space);
}
+ result->f.prot = prot;
/* Index into MAIR registers for cache attributes */
attrindx = extract32(attrs, 2, 3);
@@ -2265,7 +2306,7 @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
result->f.tlb_fill_flags = 0;
}
- if (ptw->in_prot_check & ~result->f.prot) {
+ if (ptw->in_prot_check & ~prot) {
fi->type = ARMFault_Permission;
goto do_fault;
}
@@ -3463,7 +3504,7 @@ static bool get_phys_addr_twostage(CPUARMState *env, S1Translate *ptw,
fi->s2addr = ipa;
/* Combine the S1 and S2 perms. */
- result->f.prot &= s1_prot;
+ result->f.prot = s1_prot & result->s2prot;
/* If S2 fails, return early. */
if (ret) {
--
2.43.0
next prev parent reply other threads:[~2025-10-03 17:10 UTC|newest]
Thread overview: 83+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-10-03 17:06 [PATCH v6 00/73] target/arm: Implement FEAT_GCS Richard Henderson
2025-10-03 17:06 ` [PATCH v6 01/73] tests/functional: update tests using TF-A/TF-RMM to support FEAT_GCS Richard Henderson
2025-10-03 17:06 ` [PATCH v6 02/73] target/arm: Add isar feature test for FEAT_S1PIE, FEAT_S2PIE Richard Henderson
2025-10-03 17:06 ` [PATCH v6 03/73] target/arm: Enable TCR2_ELx.PIE Richard Henderson
2025-10-03 17:06 ` [PATCH v6 04/73] target/arm: Implement PIR_ELx, PIRE0_ELx, S2PIR_EL2 registers Richard Henderson
2025-10-03 17:06 ` [PATCH v6 05/73] target/arm: Force HPD for stage2 translations Richard Henderson
2025-10-03 17:06 ` [PATCH v6 06/73] target/arm: Cache NV1 early in get_phys_addr_lpae Richard Henderson
2025-10-03 17:06 ` [PATCH v6 07/73] target/arm: Populate PIE in aa64_va_parameters Richard Henderson
2025-10-03 17:06 ` [PATCH v6 08/73] target/arm: Implement get_S1prot_indirect Richard Henderson
2025-10-03 17:06 ` Richard Henderson [this message]
2025-10-03 17:06 ` [PATCH v6 10/73] target/arm: Expand CPUARMState.exception.syndrome to 64 bits Richard Henderson
2025-10-03 17:06 ` [PATCH v6 11/73] target/arm: Expand syndrome parameter to raise_exception* Richard Henderson
2025-10-03 17:06 ` [PATCH v6 12/73] target/arm: Implement dirtybit check for PIE Richard Henderson
2025-10-03 17:07 ` [PATCH v6 13/73] target/arm: Enable FEAT_S1PIE and FEAT_S2PIE on -cpu max Richard Henderson
2025-10-03 17:07 ` [PATCH v6 14/73] include/exec/memopidx: Adjust for 32 mmu indexes Richard Henderson
2025-10-03 17:07 ` [PATCH v6 15/73] include/hw/core/cpu: Widen MMUIdxMap Richard Henderson
2025-10-03 17:07 ` [PATCH v6 16/73] target/arm: Split out mmuidx.h from cpu.h Richard Henderson
2025-10-03 17:07 ` [PATCH v6 17/73] target/arm: Convert arm_mmu_idx_to_el from switch to table Richard Henderson
2025-10-03 17:07 ` [PATCH v6 18/73] target/arm: Remove unused env argument from regime_el Richard Henderson
2025-10-03 17:07 ` [PATCH v6 19/73] target/arm: Convert regime_el from switch to table Richard Henderson
2025-10-03 17:07 ` [PATCH v6 20/73] target/arm: Convert regime_has_2_ranges " Richard Henderson
2025-10-03 17:07 ` [PATCH v6 21/73] target/arm: Remove unused env argument from regime_is_pan Richard Henderson
2025-10-03 17:07 ` [PATCH v6 22/73] target/arm: Convert regime_is_pan from switch to table Richard Henderson
2025-10-03 17:07 ` [PATCH v6 23/73] target/arm: Remove unused env argument from regime_is_user Richard Henderson
2025-10-03 17:07 ` [PATCH v6 24/73] target/arm: Convert regime_is_user from switch to table Richard Henderson
2025-10-03 17:07 ` [PATCH v6 25/73] target/arm: Convert arm_mmu_idx_is_stage1_of_2 " Richard Henderson
2025-10-03 17:07 ` [PATCH v6 26/73] target/arm: Convert regime_is_stage2 " Richard Henderson
2025-10-03 17:07 ` [PATCH v6 27/73] target/arm: Introduce mmu indexes for GCS Richard Henderson
2025-10-03 17:07 ` [PATCH v6 28/73] target/arm: Introduce regime_to_gcs Richard Henderson
2025-10-03 17:07 ` [PATCH v6 29/73] target/arm: Support page protections for GCS mmu indexes Richard Henderson
2025-10-03 17:07 ` [PATCH v6 30/73] target/arm: Implement gcs bit for data abort Richard Henderson
2025-10-03 17:07 ` [PATCH v6 31/73] target/arm: Add GCS cpregs Richard Henderson
2025-10-03 17:07 ` [PATCH v6 32/73] target/arm: Add GCS enable and trap levels to DisasContext Richard Henderson
2025-10-03 17:07 ` [PATCH v6 33/73] target/arm: Implement FEAT_CHK Richard Henderson
2025-10-03 17:07 ` [PATCH v6 34/73] target/arm: Make helper_exception_return system-only Richard Henderson
2025-10-07 9:54 ` Peter Maydell
2025-10-03 17:07 ` [PATCH v6 35/73] target/arm: Export cpsr_{read_for, write_from}_spsr_elx Richard Henderson
2025-10-07 9:56 ` Peter Maydell
2025-10-03 17:07 ` [PATCH v6 36/73] target/arm: Expand pstate to 64 bits Richard Henderson
2025-10-07 9:58 ` Peter Maydell
2025-10-03 17:07 ` [PATCH v6 37/73] target/arm: Add syndrome data for EC_GCS Richard Henderson
2025-10-03 17:07 ` [PATCH v6 38/73] target/arm: Add arm_hcr_el2_nvx_eff Richard Henderson
2025-10-07 10:13 ` Peter Maydell
2025-10-03 17:07 ` [PATCH v6 39/73] target/arm: Use arm_hcr_el2_nvx_eff in access_nv1 Richard Henderson
2025-10-07 10:13 ` Peter Maydell
2025-10-03 17:07 ` [PATCH v6 40/73] target/arm: Split out access_nv1_with_nvx Richard Henderson
2025-10-07 10:14 ` Peter Maydell
2025-10-03 17:07 ` [PATCH v6 41/73] target/arm: Implement EXLOCKException for ELR_ELx and SPSR_ELx Richard Henderson
2025-10-03 17:07 ` [PATCH v6 42/73] target/arm: Split {full,core}_a64_user_mem_index Richard Henderson
2025-10-03 17:07 ` [PATCH v6 43/73] target/arm: Introduce delay_exception{_el} Richard Henderson
2025-10-03 17:07 ` [PATCH v6 44/73] target/arm: Emit HSTR trap exception out of line Richard Henderson
2025-10-03 17:07 ` [PATCH v6 45/73] target/arm: Emit v7m LTPSIZE " Richard Henderson
2025-10-03 17:07 ` [PATCH v6 46/73] target/arm: Implement GCSSTR, GCSSTTR Richard Henderson
2025-10-03 17:07 ` [PATCH v6 47/73] target/arm: Implement GCSB Richard Henderson
2025-10-03 17:07 ` [PATCH v6 48/73] target/arm: Implement GCSPUSHM Richard Henderson
2025-10-07 10:17 ` Peter Maydell
2025-10-07 14:03 ` Richard Henderson
2025-10-03 17:07 ` [PATCH v6 49/73] target/arm: Implement GCSPOPM Richard Henderson
2025-10-03 17:07 ` [PATCH v6 50/73] target/arm: Implement GCSPUSHX Richard Henderson
2025-10-03 17:07 ` [PATCH v6 51/73] target/arm: Implement GCSPOPX Richard Henderson
2025-10-03 17:07 ` [PATCH v6 52/73] target/arm: Implement GCSPOPCX Richard Henderson
2025-10-03 17:07 ` [PATCH v6 53/73] target/arm: Implement GCSSS1 Richard Henderson
2025-10-03 17:07 ` [PATCH v6 54/73] target/arm: Implement GCSSS2 Richard Henderson
2025-10-03 17:07 ` [PATCH v6 55/73] target/arm: Add gcs record for BL Richard Henderson
2025-10-03 17:07 ` [PATCH v6 56/73] target/arm: Add gcs record for BLR Richard Henderson
2025-10-03 17:07 ` [PATCH v6 57/73] target/arm: Add gcs record for BLR with PAuth Richard Henderson
2025-10-03 17:07 ` [PATCH v6 58/73] target/arm: Load gcs record for RET Richard Henderson
2025-10-03 17:07 ` [PATCH v6 59/73] target/arm: Load gcs record for RET with PAuth Richard Henderson
2025-10-03 17:07 ` [PATCH v6 60/73] target/arm: Copy EXLOCKEn to EXLOCK on exception to the same EL Richard Henderson
2025-10-03 17:07 ` [PATCH v6 61/73] target/arm: Implement EXLOCK check during exception return Richard Henderson
2025-10-03 17:07 ` [PATCH v6 62/73] target/arm: Enable FEAT_GCS with -cpu max Richard Henderson
2025-10-03 17:07 ` [PATCH v6 63/73] linux-user/aarch64: Implement prctls for GCS Richard Henderson
2025-10-03 17:07 ` [PATCH v6 64/73] linux-user/aarch64: Allocate new gcs stack on clone Richard Henderson
2025-10-03 17:07 ` [PATCH v6 65/73] linux-user/aarch64: Release gcs stack on thread exit Richard Henderson
2025-10-03 17:07 ` [PATCH v6 66/73] linux-user/aarch64: Implement map_shadow_stack syscall Richard Henderson
2025-10-03 17:07 ` [PATCH v6 67/73] target/arm: Enable GCSPR_EL0 for read in user-mode Richard Henderson
2025-10-03 17:07 ` [PATCH v6 68/73] linux-user/aarch64: Inject SIGSEGV for GCS faults Richard Henderson
2025-10-03 17:07 ` [PATCH v6 69/73] linux-user/aarch64: Generate GCS signal records Richard Henderson
2025-10-03 17:07 ` [PATCH v6 70/73] linux-user/aarch64: Enable GCS in HWCAP Richard Henderson
2025-10-03 17:07 ` [PATCH v6 71/73] tests/tcg/aarch64: Add gcsstr Richard Henderson
2025-10-03 17:07 ` [PATCH v6 72/73] tests/tcg/aarch64: Add gcspushm Richard Henderson
2025-10-03 17:08 ` [PATCH v6 73/73] tests/tcg/aarch64: Add gcsss Richard Henderson
2025-10-07 14:26 ` [PATCH v6 00/73] target/arm: Implement FEAT_GCS Peter Maydell
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20251003170800.997167-10-richard.henderson@linaro.org \
--to=richard.henderson@linaro.org \
--cc=pierrick.bouvier@linaro.org \
--cc=qemu-arm@nongnu.org \
--cc=qemu-devel@nongnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).