2015-08-21 07:04:50 +00:00
|
|
|
/*
|
|
|
|
* Virtual page mapping
|
|
|
|
*
|
|
|
|
* Copyright (c) 2003 Fabrice Bellard
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
/* Modified for Unicorn Engine by Nguyen Anh Quynh, 2015 */
|
|
|
|
|
2018-02-19 05:49:52 +00:00
|
|
|
#include "qemu/osdep.h"
|
include/qemu/osdep.h: Don't include qapi/error.h
Commit 57cb38b included qapi/error.h into qemu/osdep.h to get the
Error typedef. Since then, we've moved to include qemu/osdep.h
everywhere. Its file comment explains: "To avoid getting into
possible circular include dependencies, this file should not include
any other QEMU headers, with the exceptions of config-host.h,
compiler.h, os-posix.h and os-win32.h, all of which are doing a
similar job to this file and are under similar constraints."
qapi/error.h doesn't do a similar job, and it doesn't adhere to
similar constraints: it includes qapi-types.h. That's in excess of
100KiB of crap most .c files don't actually need.
Add the typedef to qemu/typedefs.h, and include that instead of
qapi/error.h. Include qapi/error.h in .c files that need it and don't
get it now. Include qapi-types.h in qom/object.h for uint16List.
Update scripts/clean-includes accordingly. Update it further to match
reality: replace config.h by config-target.h, add sysemu/os-posix.h,
sysemu/os-win32.h. Update the list of includes in the qemu/osdep.h
comment quoted above similarly.
This reduces the number of objects depending on qapi/error.h from "all
of them" to less than a third. Unfortunately, the number depending on
qapi-types.h shrinks only a little. More work is needed for that one.
Backports commit da34e65cb4025728566d6504a99916f6e7e1dd6a from qemu
2018-02-22 04:05:15 +00:00
|
|
|
#include "qapi/error.h"
|
2015-08-21 07:04:50 +00:00
|
|
|
#ifndef _WIN32
|
|
|
|
#include <sys/mman.h>
|
|
|
|
#endif
|
|
|
|
|
2018-02-22 14:24:12 +00:00
|
|
|
#include "qemu/cutils.h"
|
2015-08-21 07:04:50 +00:00
|
|
|
#include "cpu.h"
|
2018-02-24 07:26:26 +00:00
|
|
|
#include "exec/exec-all.h"
|
2015-08-21 07:04:50 +00:00
|
|
|
#include "tcg.h"
|
|
|
|
#include "hw/hw.h"
|
|
|
|
#include "hw/qdev.h"
|
|
|
|
#include "sysemu/sysemu.h"
|
|
|
|
#include "qemu/timer.h"
|
|
|
|
#include "exec/memory.h"
|
|
|
|
#include "exec/address-spaces.h"
|
|
|
|
#if defined(CONFIG_USER_ONLY)
|
2018-02-25 09:10:25 +00:00
|
|
|
#include "qemu.h"
|
2015-08-21 07:04:50 +00:00
|
|
|
#endif
|
|
|
|
#include "exec/cpu-all.h"
|
|
|
|
|
|
|
|
#include "translate-all.h"
|
|
|
|
|
|
|
|
#include "exec/memory-internal.h"
|
|
|
|
#include "exec/ram_addr.h"
|
|
|
|
|
|
|
|
#include "qemu/range.h"
|
2018-02-16 20:17:07 +00:00
|
|
|
#ifndef _WIN32
|
|
|
|
#include "qemu/mmap-alloc.h"
|
|
|
|
#endif
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
#include "uc_priv.h"
|
|
|
|
|
|
|
|
//#define DEBUG_SUBPAGE
|
|
|
|
|
2018-02-26 16:54:41 +00:00
|
|
|
bool set_preferred_target_page_bits(struct uc_struct *uc, int bits)
|
|
|
|
{
|
|
|
|
/* The target page size is the lowest common denominator for all
|
|
|
|
* the CPUs in the system, so we can only make it smaller, never
|
|
|
|
* larger. And we can't make it smaller once we've committed to
|
|
|
|
* a particular size.
|
|
|
|
*/
|
|
|
|
#ifdef TARGET_PAGE_BITS_VARY
|
|
|
|
assert(bits >= TARGET_PAGE_BITS_MIN);
|
|
|
|
if (uc->target_page_bits == 0 || uc->target_page_bits > bits) {
|
|
|
|
if (uc->target_page_bits_decided) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
uc->target_page_bits = bits;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2015-08-21 07:04:50 +00:00
|
|
|
#if !defined(CONFIG_USER_ONLY)
|
|
|
|
/* current CPU in the current thread. It is only valid inside
|
|
|
|
cpu_exec() */
|
|
|
|
//DEFINE_TLS(CPUState *, current_cpu);
|
|
|
|
|
2018-02-26 16:54:41 +00:00
|
|
|
static void finalize_target_page_bits(struct uc_struct *uc)
|
|
|
|
{
|
|
|
|
#ifdef TARGET_PAGE_BITS_VARY
|
|
|
|
if (uc->target_page_bits == 0) {
|
|
|
|
uc->target_page_bits = TARGET_PAGE_BITS_MIN;
|
|
|
|
}
|
|
|
|
uc->target_page_bits_decided = true;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2015-08-21 07:04:50 +00:00
|
|
|
typedef struct PhysPageEntry PhysPageEntry;
|
|
|
|
|
|
|
|
struct PhysPageEntry {
|
|
|
|
/* How many bits skip to next level (in units of L2_SIZE). 0 for a leaf. */
|
|
|
|
uint32_t skip : 6;
|
|
|
|
/* index into phys_sections (!skip) or phys_map_nodes (skip) */
|
|
|
|
uint32_t ptr : 26;
|
|
|
|
};
|
|
|
|
|
|
|
|
#define PHYS_MAP_NODE_NIL (((uint32_t)~0) >> 6)
|
|
|
|
|
|
|
|
/* Size of the L2 (and L3, etc) page tables. */
|
|
|
|
#define ADDR_SPACE_BITS 64
|
|
|
|
|
|
|
|
#define P_L2_BITS 9
|
|
|
|
#define P_L2_SIZE (1 << P_L2_BITS)
|
|
|
|
|
|
|
|
#define P_L2_LEVELS (((ADDR_SPACE_BITS - TARGET_PAGE_BITS - 1) / P_L2_BITS) + 1)
|
|
|
|
|
|
|
|
typedef PhysPageEntry Node[P_L2_SIZE];
|
|
|
|
|
|
|
|
typedef struct PhysPageMap {
|
|
|
|
unsigned sections_nb;
|
|
|
|
unsigned sections_nb_alloc;
|
|
|
|
unsigned nodes_nb;
|
|
|
|
unsigned nodes_nb_alloc;
|
|
|
|
Node *nodes;
|
|
|
|
MemoryRegionSection *sections;
|
|
|
|
} PhysPageMap;
|
|
|
|
|
|
|
|
struct AddressSpaceDispatch {
|
2018-02-22 02:10:12 +00:00
|
|
|
MemoryRegionSection *mru_section;
|
2015-08-21 07:04:50 +00:00
|
|
|
/* This is a multi-level map on the physical address space.
|
|
|
|
* The bottom level has pointers to MemoryRegionSections.
|
|
|
|
*/
|
|
|
|
PhysPageEntry phys_map;
|
|
|
|
PhysPageMap map;
|
2018-03-12 00:57:29 +00:00
|
|
|
struct uc_struct *uc;
|
2015-08-21 07:04:50 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
#define SUBPAGE_IDX(addr) ((addr) & ~TARGET_PAGE_MASK)
|
|
|
|
typedef struct subpage_t {
|
|
|
|
MemoryRegion iomem;
|
2018-03-12 00:57:29 +00:00
|
|
|
FlatView *fv;
|
2015-08-21 07:04:50 +00:00
|
|
|
hwaddr base;
|
2018-02-26 15:48:57 +00:00
|
|
|
uint16_t sub_section[];
|
2015-08-21 07:04:50 +00:00
|
|
|
} subpage_t;
|
|
|
|
|
|
|
|
#define PHYS_SECTION_UNASSIGNED 0
|
|
|
|
#define PHYS_SECTION_NOTDIRTY 1
|
|
|
|
#define PHYS_SECTION_ROM 2
|
|
|
|
#define PHYS_SECTION_WATCH 3
|
|
|
|
|
|
|
|
static void memory_map_init(struct uc_struct *uc);
|
|
|
|
static void tcg_commit(MemoryListener *listener);
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if !defined(CONFIG_USER_ONLY)
|
|
|
|
|
2018-02-26 00:24:46 +00:00
|
|
|
static void phys_map_node_reserve(struct uc_struct *uc, PhysPageMap *map, unsigned nodes)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
|
|
|
if (map->nodes_nb + nodes > map->nodes_nb_alloc) {
|
2019-11-20 18:12:40 +00:00
|
|
|
map->nodes_nb_alloc = MAX(uc->phys_map_node_alloc_hint, map->nodes_nb + nodes);
|
2015-08-21 07:04:50 +00:00
|
|
|
map->nodes = g_renew(Node, map->nodes, map->nodes_nb_alloc);
|
2018-02-26 00:24:46 +00:00
|
|
|
uc->phys_map_node_alloc_hint = map->nodes_nb_alloc;
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-13 13:38:22 +00:00
|
|
|
static uint32_t phys_map_node_alloc(PhysPageMap *map, bool leaf)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
|
|
|
unsigned i;
|
|
|
|
uint32_t ret;
|
2018-02-13 13:38:22 +00:00
|
|
|
PhysPageEntry e;
|
|
|
|
PhysPageEntry *p;
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
ret = map->nodes_nb++;
|
2018-02-13 13:38:22 +00:00
|
|
|
p = map->nodes[ret];
|
2015-08-21 07:04:50 +00:00
|
|
|
assert(ret != PHYS_MAP_NODE_NIL);
|
|
|
|
assert(ret != map->nodes_nb_alloc);
|
2018-02-13 13:38:22 +00:00
|
|
|
|
|
|
|
e.skip = leaf ? 0 : 1;
|
|
|
|
e.ptr = leaf ? PHYS_SECTION_UNASSIGNED : PHYS_MAP_NODE_NIL;
|
2015-08-21 07:04:50 +00:00
|
|
|
for (i = 0; i < P_L2_SIZE; ++i) {
|
2018-02-13 13:38:22 +00:00
|
|
|
memcpy(&p[i], &e, sizeof(e));
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void phys_page_set_level(PhysPageMap *map, PhysPageEntry *lp,
|
2019-11-20 18:11:09 +00:00
|
|
|
hwaddr *index, uint64_t *nb, uint16_t leaf,
|
2015-08-21 07:04:50 +00:00
|
|
|
int level)
|
|
|
|
{
|
|
|
|
PhysPageEntry *p;
|
|
|
|
hwaddr step = (hwaddr)1 << (level * P_L2_BITS);
|
|
|
|
|
|
|
|
if (lp->skip && lp->ptr == PHYS_MAP_NODE_NIL) {
|
2018-02-13 13:38:22 +00:00
|
|
|
lp->ptr = phys_map_node_alloc(map, level == 0);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
2018-02-13 13:38:22 +00:00
|
|
|
p = map->nodes[lp->ptr];
|
2015-08-21 07:04:50 +00:00
|
|
|
lp = &p[(*index >> (level * P_L2_BITS)) & (P_L2_SIZE - 1)];
|
|
|
|
|
|
|
|
while (*nb && lp < &p[P_L2_SIZE]) {
|
|
|
|
if ((*index & (step - 1)) == 0 && *nb >= step) {
|
|
|
|
lp->skip = 0;
|
|
|
|
lp->ptr = leaf;
|
|
|
|
*index += step;
|
|
|
|
*nb -= step;
|
|
|
|
} else {
|
|
|
|
phys_page_set_level(map, lp, index, nb, leaf, level - 1);
|
|
|
|
}
|
|
|
|
++lp;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-12 00:57:29 +00:00
|
|
|
static void phys_page_set(AddressSpaceDispatch *d,
|
2019-11-20 18:11:09 +00:00
|
|
|
hwaddr index, uint64_t nb,
|
2018-02-26 00:24:46 +00:00
|
|
|
uint16_t leaf)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
|
|
|
/* Wildly overreserve - it doesn't matter much. */
|
2018-03-12 00:57:29 +00:00
|
|
|
phys_map_node_reserve(d->uc, &d->map, 3 * P_L2_LEVELS);
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
phys_page_set_level(&d->map, &d->phys_map, &index, &nb, leaf, P_L2_LEVELS - 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Compact a non leaf page entry. Simply detect that the entry has a single child,
|
|
|
|
* and update our entry so we can skip it and go directly to the destination.
|
|
|
|
*/
|
|
|
|
static void phys_page_compact(PhysPageEntry *lp, Node *nodes, unsigned long *compacted)
|
|
|
|
{
|
|
|
|
unsigned valid_ptr = P_L2_SIZE;
|
|
|
|
int valid = 0;
|
|
|
|
PhysPageEntry *p;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (lp->ptr == PHYS_MAP_NODE_NIL) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
p = nodes[lp->ptr];
|
|
|
|
for (i = 0; i < P_L2_SIZE; i++) {
|
|
|
|
if (p[i].ptr == PHYS_MAP_NODE_NIL) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
valid_ptr = i;
|
|
|
|
valid++;
|
|
|
|
if (p[i].skip) {
|
|
|
|
phys_page_compact(&p[i], nodes, compacted);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* We can only compress if there's only one child. */
|
|
|
|
if (valid != 1) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
assert(valid_ptr < P_L2_SIZE);
|
|
|
|
|
|
|
|
/* Don't compress if it won't fit in the # of bits we have. */
|
2019-11-20 18:15:56 +00:00
|
|
|
if (P_L2_LEVELS >= (1 << 6) &&
|
|
|
|
lp->skip + p[valid_ptr].skip >= (1 << 6)) {
|
2015-08-21 07:04:50 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
lp->ptr = p[valid_ptr].ptr;
|
|
|
|
if (!p[valid_ptr].skip) {
|
|
|
|
/* If our only child is a leaf, make this a leaf. */
|
|
|
|
/* By design, we should have made this node a leaf to begin with so we
|
|
|
|
* should never reach here.
|
|
|
|
* But since it's so simple to handle this, let's do it just in case we
|
|
|
|
* change this rule.
|
|
|
|
*/
|
|
|
|
lp->skip = 0;
|
|
|
|
} else {
|
|
|
|
lp->skip += p[valid_ptr].skip;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-12 01:34:55 +00:00
|
|
|
void address_space_dispatch_compact(AddressSpaceDispatch *d)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
2017-01-19 11:50:28 +00:00
|
|
|
//DECLARE_BITMAP(compacted, nodes_nb);
|
|
|
|
// this isnt actually used
|
2017-01-20 14:07:10 +00:00
|
|
|
unsigned long* compacted = NULL;
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
if (d->phys_map.skip) {
|
|
|
|
phys_page_compact(&d->phys_map, d->map.nodes, compacted);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-22 02:07:56 +00:00
|
|
|
static inline bool section_covers_addr(const MemoryRegionSection *section,
|
|
|
|
hwaddr addr)
|
|
|
|
{
|
|
|
|
/* Memory topology clips a memory region to [0, 2^64); size.hi > 0 means
|
|
|
|
* the section must cover the entire address space.
|
|
|
|
*/
|
2018-02-27 16:01:41 +00:00
|
|
|
return int128_gethi(section->size) ||
|
2018-02-22 02:07:56 +00:00
|
|
|
range_covers_byte(section->offset_within_address_space,
|
2018-02-27 16:01:41 +00:00
|
|
|
int128_getlo(section->size), addr);
|
2018-02-22 02:07:56 +00:00
|
|
|
}
|
|
|
|
|
2018-03-03 19:28:19 +00:00
|
|
|
static MemoryRegionSection *phys_page_find(AddressSpaceDispatch *d, hwaddr addr)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
2018-03-03 19:28:19 +00:00
|
|
|
PhysPageEntry lp = d->phys_map, *p;
|
|
|
|
Node *nodes = d->map.nodes;
|
|
|
|
MemoryRegionSection *sections = d->map.sections;
|
2015-08-21 07:04:50 +00:00
|
|
|
hwaddr index = addr >> TARGET_PAGE_BITS;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = P_L2_LEVELS; lp.skip && (i -= lp.skip) >= 0;) {
|
|
|
|
if (lp.ptr == PHYS_MAP_NODE_NIL) {
|
|
|
|
return §ions[PHYS_SECTION_UNASSIGNED];
|
|
|
|
}
|
|
|
|
p = nodes[lp.ptr];
|
|
|
|
lp = p[(index >> (i * P_L2_BITS)) & (P_L2_SIZE - 1)];
|
|
|
|
}
|
|
|
|
|
2018-02-22 02:07:56 +00:00
|
|
|
if (section_covers_addr(§ions[lp.ptr], addr)) {
|
2015-08-21 07:04:50 +00:00
|
|
|
return §ions[lp.ptr];
|
|
|
|
} else {
|
|
|
|
return §ions[PHYS_SECTION_UNASSIGNED];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool memory_region_is_unassigned(struct uc_struct* uc, MemoryRegion *mr)
|
|
|
|
{
|
|
|
|
return mr != &uc->io_mem_rom && mr != &uc->io_mem_notdirty &&
|
|
|
|
!mr->rom_device && mr != &uc->io_mem_watch;
|
|
|
|
}
|
|
|
|
|
|
|
|
static MemoryRegionSection *address_space_lookup_region(AddressSpaceDispatch *d,
|
2018-02-22 02:10:12 +00:00
|
|
|
hwaddr addr,
|
|
|
|
bool resolve_subpage)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
2018-02-22 02:10:12 +00:00
|
|
|
MemoryRegionSection *section = atomic_read(&d->mru_section);
|
2015-08-21 07:04:50 +00:00
|
|
|
subpage_t *subpage;
|
2018-02-22 02:10:12 +00:00
|
|
|
bool update;
|
2015-08-21 07:04:50 +00:00
|
|
|
|
2018-02-22 02:10:12 +00:00
|
|
|
if (section && section != &d->map.sections[PHYS_SECTION_UNASSIGNED] &&
|
|
|
|
section_covers_addr(section, addr)) {
|
|
|
|
update = false;
|
|
|
|
} else {
|
2018-03-03 19:28:19 +00:00
|
|
|
section = phys_page_find(d, addr);
|
2018-02-22 02:10:12 +00:00
|
|
|
update = true;
|
|
|
|
}
|
2015-08-21 07:04:50 +00:00
|
|
|
if (resolve_subpage && section->mr->subpage) {
|
|
|
|
subpage = container_of(section->mr, subpage_t, iomem);
|
|
|
|
section = &d->map.sections[subpage->sub_section[SUBPAGE_IDX(addr)]];
|
|
|
|
}
|
2018-02-22 02:10:12 +00:00
|
|
|
if (update) {
|
|
|
|
atomic_set(&d->mru_section, section);
|
|
|
|
}
|
2015-08-21 07:04:50 +00:00
|
|
|
return section;
|
|
|
|
}
|
|
|
|
|
|
|
|
static MemoryRegionSection *
|
|
|
|
address_space_translate_internal(AddressSpaceDispatch *d, hwaddr addr, hwaddr *xlat,
|
|
|
|
hwaddr *plen, bool resolve_subpage)
|
|
|
|
{
|
|
|
|
MemoryRegionSection *section;
|
2018-02-18 22:50:06 +00:00
|
|
|
MemoryRegion *mr;
|
2015-08-21 07:04:50 +00:00
|
|
|
Int128 diff;
|
|
|
|
|
|
|
|
section = address_space_lookup_region(d, addr, resolve_subpage);
|
|
|
|
/* Compute offset within MemoryRegionSection */
|
|
|
|
addr -= section->offset_within_address_space;
|
|
|
|
|
|
|
|
/* Compute offset within MemoryRegion */
|
|
|
|
*xlat = addr + section->offset_within_region;
|
|
|
|
|
2018-02-18 22:50:06 +00:00
|
|
|
mr = section->mr;
|
exec: skip MMIO regions correctly in cpu_physical_memory_write_rom_internal
Loading the BIOS in the mac99 machine is interesting, because there is a
PROM in the middle of the BIOS region (from 16K to 32K). Before memory
region accesses were clamped, when QEMU was asked to load a BIOS from
0xfff00000 to 0xffffffff it would put even those 16K from the BIOS file
into the region. This is weird because those 16K were not actually
visible between 0xfff04000 and 0xfff07fff. However, it worked.
After clamping was added, this also worked. In this case, the
cpu_physical_memory_write_rom_internal function split the write in
three parts: the first 16K were copied, the PROM area (second 16K) were
ignored, then the rest was copied.
Problems then started with commit 965eb2f (exec: do not clamp accesses
to MMIO regions, 2015-06-17). Clamping accesses is not done for MMIO
regions because they can overlap wildly, and MMIO registers can be
expected to perform full-width accesses based only on their address
(with no respect for adjacent registers that could decode to completely
different MemoryRegions). However, this lack of clamping also applied
to the PROM area! cpu_physical_memory_write_rom_internal thus failed
to copy the third range above, i.e. only copied the first 16K of the BIOS.
In effect, address_space_translate is expecting _something else_ to do
the clamping for MMIO regions if the incoming length is large. This
"something else" is memory_access_size in the case of address_space_rw,
so use the same logic in cpu_physical_memory_write_rom_internal.
Backports commit b242e0e0e2969c044a318e56f7988bbd84de1f63 from qemu
2018-02-18 22:57:06 +00:00
|
|
|
|
|
|
|
/* MMIO registers can be expected to perform full-width accesses based only
|
|
|
|
* on their address, without considering adjacent registers that could
|
|
|
|
* decode to completely different MemoryRegions. When such registers
|
|
|
|
* exist (e.g. I/O ports 0xcf8 and 0xcf9 on most PC chipsets), MMIO
|
|
|
|
* regions overlap wildly. For this reason we cannot clamp the accesses
|
|
|
|
* here.
|
|
|
|
*
|
|
|
|
* If the length is small (as is the case for address_space_ldl/stl),
|
|
|
|
* everything works fine. If the incoming length is large, however,
|
|
|
|
* the caller really has to do the clamping through memory_access_size.
|
|
|
|
*/
|
2018-02-18 22:50:06 +00:00
|
|
|
if (memory_region_is_ram(mr)) {
|
2018-02-18 22:52:55 +00:00
|
|
|
diff = int128_sub(section->size, int128_make64(addr));
|
2018-02-18 22:50:06 +00:00
|
|
|
*plen = int128_get64(int128_min(diff, int128_make64(*plen)));
|
|
|
|
}
|
2015-08-21 07:04:50 +00:00
|
|
|
return section;
|
|
|
|
}
|
|
|
|
|
2018-03-12 00:57:29 +00:00
|
|
|
static MemoryRegionSection flatview_do_translate(FlatView *fv,
|
|
|
|
hwaddr addr,
|
|
|
|
hwaddr *xlat,
|
|
|
|
hwaddr *plen,
|
|
|
|
bool is_write,
|
|
|
|
bool is_mmio,
|
|
|
|
AddressSpace **target_as)
|
2018-03-01 18:03:39 +00:00
|
|
|
{
|
2018-03-02 20:24:21 +00:00
|
|
|
IOMMUTLBEntry iotlb;
|
2018-03-01 18:03:39 +00:00
|
|
|
MemoryRegionSection *section;
|
|
|
|
MemoryRegion *mr;
|
2018-03-02 20:24:21 +00:00
|
|
|
MemoryRegionSection failure_section = {0};
|
2018-03-12 00:57:29 +00:00
|
|
|
AddressSpaceDispatch *d = flatview_to_dispatch(fv);
|
2018-03-01 18:03:39 +00:00
|
|
|
|
|
|
|
for (;;) {
|
|
|
|
// Unicorn: atomic_read used instead of atomic_rcu_read
|
2018-03-12 00:57:29 +00:00
|
|
|
section = address_space_translate_internal(
|
|
|
|
flatview_to_dispatch(fv), addr, &addr,
|
|
|
|
plen, is_mmio);
|
2018-03-01 18:03:39 +00:00
|
|
|
mr = section->mr;
|
|
|
|
|
|
|
|
if (!mr->iommu_ops) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2018-03-02 20:31:42 +00:00
|
|
|
iotlb = mr->iommu_ops->translate(mr, addr, is_write ?
|
|
|
|
IOMMU_WO : IOMMU_RO);
|
2018-03-02 20:24:21 +00:00
|
|
|
addr = ((iotlb.translated_addr & ~iotlb.addr_mask)
|
|
|
|
| (addr & iotlb.addr_mask));
|
|
|
|
*plen = MIN(*plen, (addr | iotlb.addr_mask) - addr + 1);
|
2018-03-01 18:03:39 +00:00
|
|
|
if (!(iotlb.perm & (1 << is_write))) {
|
2018-03-02 20:24:21 +00:00
|
|
|
goto translate_fail;
|
2018-03-01 18:03:39 +00:00
|
|
|
}
|
|
|
|
|
2018-03-12 00:57:29 +00:00
|
|
|
fv = address_space_to_flatview(iotlb.target_as);
|
2018-03-04 06:56:02 +00:00
|
|
|
*target_as = iotlb.target_as;
|
2018-03-01 18:03:39 +00:00
|
|
|
}
|
|
|
|
|
2018-03-02 20:24:21 +00:00
|
|
|
*xlat = addr;
|
|
|
|
|
|
|
|
return *section;
|
|
|
|
|
|
|
|
translate_fail:
|
2018-03-12 00:57:29 +00:00
|
|
|
failure_section.mr = &d->uc->io_mem_unassigned;
|
2018-03-02 20:24:21 +00:00
|
|
|
return failure_section;
|
|
|
|
}
|
|
|
|
|
|
|
|
IOMMUTLBEntry address_space_get_iotlb_entry(AddressSpace *as, hwaddr addr,
|
|
|
|
bool is_write)
|
|
|
|
{
|
|
|
|
MemoryRegionSection section;
|
|
|
|
hwaddr xlat, plen;
|
|
|
|
IOMMUTLBEntry result = {0};
|
|
|
|
|
|
|
|
/* Try to get maximum page mask during translation. */
|
|
|
|
plen = (hwaddr)-1;
|
|
|
|
|
|
|
|
/* This can never be MMIO. */
|
2018-03-12 00:57:29 +00:00
|
|
|
section = flatview_do_translate(address_space_to_flatview(as), addr,
|
|
|
|
&xlat, &plen, is_write, false, &as);
|
2018-03-02 20:24:21 +00:00
|
|
|
|
|
|
|
/* Illegal translation */
|
|
|
|
if (section.mr == &as->uc->io_mem_unassigned) {
|
|
|
|
goto iotlb_fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Convert memory region offset into address space offset */
|
|
|
|
xlat += section.offset_within_address_space -
|
|
|
|
section.offset_within_region;
|
|
|
|
|
|
|
|
if (plen == (hwaddr)-1) {
|
|
|
|
/*
|
|
|
|
* We use default page size here. Logically it only happens
|
|
|
|
* for identity mappings.
|
|
|
|
*/
|
|
|
|
plen = TARGET_PAGE_SIZE;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Convert to address mask */
|
|
|
|
plen -= 1;
|
|
|
|
|
2018-03-04 06:56:02 +00:00
|
|
|
result.target_as = as;
|
2018-03-02 20:24:21 +00:00
|
|
|
result.iova = addr & ~plen;
|
|
|
|
result.translated_addr = xlat & ~plen;
|
|
|
|
result.addr_mask = plen;
|
|
|
|
/* IOTLBs are for DMAs, and DMA only allows on RAMs. */
|
|
|
|
result.perm = IOMMU_RW;
|
|
|
|
return result;
|
|
|
|
|
|
|
|
iotlb_fail:
|
|
|
|
return result;
|
2018-03-01 18:03:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Called from RCU critical section */
|
2018-03-12 00:57:29 +00:00
|
|
|
MemoryRegion *flatview_translate(FlatView *fv, hwaddr addr, hwaddr *xlat,
|
|
|
|
hwaddr *plen, bool is_write)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
|
|
|
MemoryRegion *mr;
|
2018-03-02 20:24:21 +00:00
|
|
|
MemoryRegionSection section;
|
2018-03-12 00:57:29 +00:00
|
|
|
AddressSpace *as = NULL;
|
2015-08-21 07:04:50 +00:00
|
|
|
|
2018-03-02 20:24:21 +00:00
|
|
|
/* This can be MMIO, so setup MMIO bit. */
|
2018-03-12 00:57:29 +00:00
|
|
|
section = flatview_do_translate(fv, addr, xlat, plen, is_write, true, &as);
|
2018-03-02 20:24:21 +00:00
|
|
|
mr = section.mr;
|
2015-08-21 07:04:50 +00:00
|
|
|
|
2018-03-02 20:24:21 +00:00
|
|
|
// Unicorn: if'd out
|
|
|
|
#if 0
|
|
|
|
if (xen_enabled() && memory_access_is_direct(mr, is_write)) {
|
|
|
|
hwaddr page = ((addr & TARGET_PAGE_MASK) + TARGET_PAGE_SIZE) - addr;
|
|
|
|
*plen = MIN(page, *plen);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
2018-03-02 20:24:21 +00:00
|
|
|
#endif
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
return mr;
|
|
|
|
}
|
|
|
|
|
|
|
|
MemoryRegionSection *
|
2018-02-18 03:50:28 +00:00
|
|
|
address_space_translate_for_iotlb(CPUState *cpu, int asidx, hwaddr addr,
|
2018-11-17 02:24:53 +00:00
|
|
|
hwaddr *xlat, hwaddr *plen,
|
|
|
|
MemTxAttrs attrs, int *prot)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
|
|
|
MemoryRegionSection *section;
|
2018-03-01 13:44:12 +00:00
|
|
|
// Unicorn: atomic_read used instead of atomic_rcu_read
|
|
|
|
AddressSpaceDispatch *d = atomic_read(&cpu->cpu_ases[asidx].memory_dispatch);
|
2018-02-18 03:50:28 +00:00
|
|
|
|
|
|
|
section = address_space_translate_internal(d, addr, xlat, plen, false);
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
assert(!section->mr->iommu_ops);
|
|
|
|
return section;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
CPUState *qemu_get_cpu(struct uc_struct *uc, int index)
|
|
|
|
{
|
2016-09-23 14:38:21 +00:00
|
|
|
CPUState *cpu = uc->cpu;
|
|
|
|
if (cpu->cpu_index == index) {
|
|
|
|
return cpu;
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
#if !defined(CONFIG_USER_ONLY)
|
2018-03-05 19:37:26 +00:00
|
|
|
void cpu_address_space_init(CPUState *cpu, int asidx,
|
|
|
|
const char *prefix, MemoryRegion *mr)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
2018-02-18 03:33:49 +00:00
|
|
|
CPUAddressSpace *newas;
|
2018-03-05 19:37:26 +00:00
|
|
|
AddressSpace *as = g_new0(AddressSpace, 1);
|
2018-03-05 19:41:19 +00:00
|
|
|
char *as_name;
|
2018-03-05 19:37:26 +00:00
|
|
|
|
|
|
|
assert(mr);
|
2018-03-05 19:41:19 +00:00
|
|
|
as_name = g_strdup_printf("%s-%d", prefix, cpu->cpu_index);
|
|
|
|
address_space_init(cpu->uc, as, mr, as_name);
|
|
|
|
g_free(as_name);
|
2018-02-18 03:33:49 +00:00
|
|
|
|
|
|
|
/* Target code should have set num_ases before calling us */
|
|
|
|
assert(asidx < cpu->num_ases);
|
|
|
|
|
2018-02-18 02:54:06 +00:00
|
|
|
if (asidx == 0) {
|
|
|
|
/* address space 0 gets the convenience alias */
|
|
|
|
cpu->as = as;
|
|
|
|
}
|
|
|
|
|
2018-02-18 03:33:49 +00:00
|
|
|
/* KVM cannot currently support multiple address spaces. */
|
|
|
|
// Unicorn: commented out
|
|
|
|
//assert(asidx == 0 || !kvm_enabled());
|
2015-08-21 07:04:50 +00:00
|
|
|
|
2018-02-18 03:33:49 +00:00
|
|
|
if (!cpu->cpu_ases) {
|
|
|
|
cpu->cpu_ases = g_new0(CPUAddressSpace, cpu->num_ases);
|
2018-02-18 02:54:06 +00:00
|
|
|
}
|
|
|
|
|
2018-02-18 03:33:49 +00:00
|
|
|
newas = &cpu->cpu_ases[asidx];
|
|
|
|
newas->cpu = cpu;
|
|
|
|
newas->as = as;
|
2018-02-18 02:54:06 +00:00
|
|
|
if (tcg_enabled(as->uc)) {
|
2018-02-18 03:33:49 +00:00
|
|
|
newas->tcg_as_listener.commit = tcg_commit;
|
|
|
|
memory_listener_register(as->uc, &newas->tcg_as_listener, as);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
}
|
2018-02-18 04:21:19 +00:00
|
|
|
|
|
|
|
AddressSpace *cpu_get_address_space(CPUState *cpu, int asidx)
|
|
|
|
{
|
|
|
|
/* Return the AddressSpace corresponding to the specified index */
|
|
|
|
return cpu->cpu_ases[asidx].as;
|
|
|
|
}
|
2015-08-21 07:04:50 +00:00
|
|
|
#endif
|
|
|
|
|
2018-03-21 11:57:39 +00:00
|
|
|
#ifndef CONFIG_USER_ONLY
|
|
|
|
static int cpu_get_free_index(Error **errp)
|
|
|
|
{
|
|
|
|
// Unicorn: if'd out
|
|
|
|
#if 0
|
|
|
|
int cpu = find_first_zero_bit(cpu_index_map, MAX_CPUMASK_BITS);
|
|
|
|
|
|
|
|
if (cpu >= MAX_CPUMASK_BITS) {
|
|
|
|
error_setg(errp, "Trying to use more CPUs than max of %d",
|
|
|
|
MAX_CPUMASK_BITS);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
bitmap_set(cpu_index_map, cpu, 1);
|
|
|
|
return cpu;
|
|
|
|
#endif
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void cpu_exec_exit(CPUState *cpu)
|
|
|
|
{
|
|
|
|
if (cpu->cpu_index == -1) {
|
|
|
|
/* cpu_index was never allocated by this @cpu or was already freed. */
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Unicorn: if'd out
|
|
|
|
#if 0
|
|
|
|
bitmap_clear(cpu_index_map, cpu->cpu_index, 1);
|
|
|
|
#endif
|
|
|
|
cpu->cpu_index = -1;
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
|
|
|
|
static int cpu_get_free_index(Error **errp)
|
|
|
|
{
|
|
|
|
// Unicorn: if'd out
|
|
|
|
#if 0
|
|
|
|
CPUState *some_cpu;
|
|
|
|
int cpu_index = 0;
|
|
|
|
|
|
|
|
CPU_FOREACH(some_cpu) {
|
|
|
|
cpu_index++;
|
|
|
|
}
|
|
|
|
return cpu_index;
|
|
|
|
#endif
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void cpu_exec_exit(CPUState *cpu)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2018-03-21 11:50:22 +00:00
|
|
|
void cpu_exec_init(CPUState *cpu, Error **errp, void *opaque)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
|
|
|
struct uc_struct *uc = opaque;
|
2018-03-05 14:27:40 +00:00
|
|
|
CPUClass *cc = CPU_GET_CLASS(uc, cpu);
|
2018-02-14 19:13:43 +00:00
|
|
|
CPUArchState *env = cpu->env_ptr;
|
2018-03-21 11:57:39 +00:00
|
|
|
Error *local_err = NULL;
|
2015-08-21 07:04:50 +00:00
|
|
|
|
2018-02-18 02:54:06 +00:00
|
|
|
cpu->as = NULL;
|
2018-02-18 03:33:49 +00:00
|
|
|
cpu->num_ases = 0;
|
2015-08-21 07:04:50 +00:00
|
|
|
cpu->uc = uc;
|
|
|
|
env->uc = uc;
|
|
|
|
|
2018-03-21 11:57:39 +00:00
|
|
|
cpu->cpu_index = cpu_get_free_index(&local_err);
|
|
|
|
if (local_err) {
|
|
|
|
error_propagate(errp, local_err);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-09-23 14:38:21 +00:00
|
|
|
// TODO: assert uc does not already have a cpu?
|
|
|
|
uc->cpu = cpu;
|
2018-02-19 02:40:52 +00:00
|
|
|
|
2018-03-02 01:13:37 +00:00
|
|
|
// Unicorn: Required to clean-slate TLB state
|
|
|
|
tlb_flush(cpu);
|
|
|
|
|
2018-03-05 14:27:40 +00:00
|
|
|
if (tcg_enabled(uc) && !cc->tcg_initialized) {
|
|
|
|
cc->tcg_initialized = true;
|
|
|
|
cc->tcg_initialize(uc);
|
|
|
|
}
|
2018-10-23 18:41:10 +00:00
|
|
|
tlb_init(cpu);
|
2018-03-05 14:27:40 +00:00
|
|
|
|
2018-02-19 02:40:52 +00:00
|
|
|
#ifndef CONFIG_USER_ONLY
|
|
|
|
|
|
|
|
// Unicorn: commented out
|
|
|
|
/* This is a softmmu CPU object, so create a property for it
|
|
|
|
* so users can wire up its memory. (This can't go in qom/cpu.c
|
|
|
|
* because that file is compiled only once for both user-mode
|
|
|
|
* and system builds.) The default if no link is set up is to use
|
|
|
|
* the system address space.
|
|
|
|
*/
|
|
|
|
/*object_property_add_link(OBJECT(cpu), "memory", TYPE_MEMORY_REGION,
|
|
|
|
(Object **)&cpu->memory,
|
|
|
|
qdev_prop_allow_set_link_before_realize,
|
|
|
|
OBJ_PROP_LINK_UNREF_ON_RELEASE,
|
|
|
|
&error_abort);*/
|
|
|
|
cpu->memory = uc->system_memory;
|
|
|
|
// Unicorn: commented out
|
|
|
|
/*object_ref(OBJECT(cpu->memory)); */
|
|
|
|
#endif
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
2018-03-20 17:47:38 +00:00
|
|
|
const char *parse_cpu_model(struct uc_struct *uc, const char *cpu_model)
|
|
|
|
{
|
|
|
|
ObjectClass *oc;
|
|
|
|
CPUClass *cc;
|
|
|
|
gchar **model_pieces;
|
|
|
|
const char *cpu_type;
|
|
|
|
|
|
|
|
model_pieces = g_strsplit(cpu_model, ",", 2);
|
|
|
|
|
|
|
|
oc = cpu_class_by_name(uc, CPU_RESOLVING_TYPE, model_pieces[0]);
|
|
|
|
if (oc == NULL) {
|
|
|
|
fprintf(stderr, "unable to find CPU model '%s'", model_pieces[0]);
|
|
|
|
g_strfreev(model_pieces);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
cpu_type = object_class_get_name(oc);
|
|
|
|
cc = CPU_CLASS(uc, oc);
|
|
|
|
cc->parse_features(uc, cpu_type, model_pieces[1], &error_fatal);
|
|
|
|
g_strfreev(model_pieces);
|
|
|
|
return cpu_type;
|
|
|
|
}
|
|
|
|
|
2018-03-04 03:14:22 +00:00
|
|
|
#if defined(CONFIG_USER_ONLY)
|
2015-08-21 07:04:50 +00:00
|
|
|
static void breakpoint_invalidate(CPUState *cpu, target_ulong pc)
|
|
|
|
{
|
2018-03-01 14:10:52 +00:00
|
|
|
/* Flush the whole TB as this will not have race conditions
|
|
|
|
* even if we don't have proper locking yet.
|
|
|
|
* Ideally we would just invalidate the TBs for the
|
|
|
|
* specified PC.
|
|
|
|
*/
|
|
|
|
tb_flush(cpu);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
2018-03-04 03:14:22 +00:00
|
|
|
#else
|
|
|
|
static void breakpoint_invalidate(CPUState *cpu, target_ulong pc)
|
|
|
|
{
|
|
|
|
MemTxAttrs attrs;
|
|
|
|
hwaddr phys = cpu_get_phys_page_attrs_debug(cpu, pc, &attrs);
|
|
|
|
int asidx = cpu_asidx_from_attrs(cpu, attrs);
|
|
|
|
if (phys != -1) {
|
|
|
|
/* Locks grabbed by tb_invalidate_phys_addr */
|
|
|
|
tb_invalidate_phys_addr(cpu->cpu_ases[asidx].as,
|
|
|
|
phys | (pc & ~TARGET_PAGE_MASK));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
#if defined(CONFIG_USER_ONLY)
|
|
|
|
void cpu_watchpoint_remove_all(CPUState *cpu, int mask)
|
|
|
|
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
int cpu_watchpoint_remove(CPUState *cpu, vaddr addr, vaddr len,
|
|
|
|
int flags)
|
|
|
|
{
|
|
|
|
return -ENOSYS;
|
|
|
|
}
|
|
|
|
|
|
|
|
void cpu_watchpoint_remove_by_ref(CPUState *cpu, CPUWatchpoint *watchpoint)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
int cpu_watchpoint_insert(CPUState *cpu, vaddr addr, vaddr len,
|
|
|
|
int flags, CPUWatchpoint **watchpoint)
|
|
|
|
{
|
|
|
|
return -ENOSYS;
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
/* Add a watchpoint. */
|
|
|
|
int cpu_watchpoint_insert(CPUState *cpu, vaddr addr, vaddr len,
|
|
|
|
int flags, CPUWatchpoint **watchpoint)
|
|
|
|
{
|
|
|
|
CPUWatchpoint *wp;
|
|
|
|
|
|
|
|
/* forbid ranges which are empty or run off the end of the address space */
|
|
|
|
if (len == 0 || (addr + len - 1) < addr) {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
wp = g_malloc(sizeof(*wp));
|
|
|
|
|
|
|
|
wp->vaddr = addr;
|
|
|
|
wp->len = len;
|
|
|
|
wp->flags = flags;
|
|
|
|
|
|
|
|
/* keep all GDB-injected watchpoints in front */
|
|
|
|
if (flags & BP_GDB) {
|
|
|
|
QTAILQ_INSERT_HEAD(&cpu->watchpoints, wp, entry);
|
|
|
|
} else {
|
|
|
|
QTAILQ_INSERT_TAIL(&cpu->watchpoints, wp, entry);
|
|
|
|
}
|
|
|
|
|
|
|
|
tlb_flush_page(cpu, addr);
|
|
|
|
|
|
|
|
if (watchpoint)
|
|
|
|
*watchpoint = wp;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Remove a specific watchpoint. */
|
|
|
|
int cpu_watchpoint_remove(CPUState *cpu, vaddr addr, vaddr len,
|
|
|
|
int flags)
|
|
|
|
{
|
|
|
|
CPUWatchpoint *wp;
|
|
|
|
|
|
|
|
QTAILQ_FOREACH(wp, &cpu->watchpoints, entry) {
|
|
|
|
if (addr == wp->vaddr && len == wp->len
|
|
|
|
&& flags == (wp->flags & ~BP_WATCHPOINT_HIT)) {
|
|
|
|
cpu_watchpoint_remove_by_ref(cpu, wp);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return -ENOENT;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Remove a specific watchpoint by reference. */
|
|
|
|
void cpu_watchpoint_remove_by_ref(CPUState *cpu, CPUWatchpoint *watchpoint)
|
|
|
|
{
|
|
|
|
QTAILQ_REMOVE(&cpu->watchpoints, watchpoint, entry);
|
|
|
|
|
|
|
|
tlb_flush_page(cpu, watchpoint->vaddr);
|
|
|
|
|
2016-12-21 14:28:36 +00:00
|
|
|
g_free(watchpoint);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Remove all matching watchpoints. */
|
|
|
|
void cpu_watchpoint_remove_all(CPUState *cpu, int mask)
|
|
|
|
{
|
|
|
|
CPUWatchpoint *wp, *next;
|
|
|
|
|
|
|
|
QTAILQ_FOREACH_SAFE(wp, &cpu->watchpoints, entry, next) {
|
|
|
|
if (wp->flags & mask) {
|
|
|
|
cpu_watchpoint_remove_by_ref(cpu, wp);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Return true if this watchpoint address matches the specified
|
|
|
|
* access (ie the address range covered by the watchpoint overlaps
|
|
|
|
* partially or completely with the address range covered by the
|
|
|
|
* access).
|
|
|
|
*/
|
|
|
|
static inline bool cpu_watchpoint_address_matches(CPUWatchpoint *wp,
|
|
|
|
vaddr addr,
|
|
|
|
vaddr len)
|
|
|
|
{
|
|
|
|
/* We know the lengths are non-zero, but a little caution is
|
|
|
|
* required to avoid errors in the case where the range ends
|
|
|
|
* exactly at the top of the address space and so addr + len
|
|
|
|
* wraps round to zero.
|
|
|
|
*/
|
|
|
|
vaddr wpend = wp->vaddr + wp->len - 1;
|
|
|
|
vaddr addrend = addr + len - 1;
|
|
|
|
|
|
|
|
return !(addr > wpend || wp->vaddr > addrend);
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Add a breakpoint. */
|
|
|
|
int cpu_breakpoint_insert(CPUState *cpu, vaddr pc, int flags,
|
|
|
|
CPUBreakpoint **breakpoint)
|
|
|
|
{
|
|
|
|
CPUBreakpoint *bp;
|
|
|
|
|
|
|
|
bp = g_malloc(sizeof(*bp));
|
|
|
|
|
|
|
|
bp->pc = pc;
|
|
|
|
bp->flags = flags;
|
|
|
|
|
|
|
|
/* keep all GDB-injected breakpoints in front */
|
|
|
|
if (flags & BP_GDB) {
|
|
|
|
QTAILQ_INSERT_HEAD(&cpu->breakpoints, bp, entry);
|
|
|
|
} else {
|
|
|
|
QTAILQ_INSERT_TAIL(&cpu->breakpoints, bp, entry);
|
|
|
|
}
|
|
|
|
|
|
|
|
breakpoint_invalidate(cpu, pc);
|
|
|
|
|
|
|
|
if (breakpoint) {
|
|
|
|
*breakpoint = bp;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Remove a specific breakpoint. */
|
|
|
|
int cpu_breakpoint_remove(CPUState *cpu, vaddr pc, int flags)
|
|
|
|
{
|
|
|
|
CPUBreakpoint *bp;
|
|
|
|
|
|
|
|
QTAILQ_FOREACH(bp, &cpu->breakpoints, entry) {
|
|
|
|
if (bp->pc == pc && bp->flags == flags) {
|
|
|
|
cpu_breakpoint_remove_by_ref(cpu, bp);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return -ENOENT;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Remove a specific breakpoint by reference. */
|
|
|
|
void cpu_breakpoint_remove_by_ref(CPUState *cpu, CPUBreakpoint *breakpoint)
|
|
|
|
{
|
|
|
|
QTAILQ_REMOVE(&cpu->breakpoints, breakpoint, entry);
|
|
|
|
|
|
|
|
breakpoint_invalidate(cpu, breakpoint->pc);
|
|
|
|
|
2016-12-21 14:28:36 +00:00
|
|
|
g_free(breakpoint);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Remove all matching breakpoints. */
|
|
|
|
void cpu_breakpoint_remove_all(CPUState *cpu, int mask)
|
|
|
|
{
|
|
|
|
CPUBreakpoint *bp, *next;
|
|
|
|
|
|
|
|
QTAILQ_FOREACH_SAFE(bp, &cpu->breakpoints, entry, next) {
|
|
|
|
if (bp->flags & mask) {
|
|
|
|
cpu_breakpoint_remove_by_ref(cpu, bp);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* enable or disable single step mode. EXCP_DEBUG is returned by the
|
|
|
|
CPU loop after each instruction */
|
|
|
|
void cpu_single_step(CPUState *cpu, int enabled)
|
|
|
|
{
|
|
|
|
if (cpu->singlestep_enabled != enabled) {
|
|
|
|
cpu->singlestep_enabled = enabled;
|
|
|
|
/* must flush all the translated code to avoid inconsistencies */
|
|
|
|
/* XXX: only flush what is necessary */
|
2018-02-14 18:56:00 +00:00
|
|
|
tb_flush(cpu);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void cpu_abort(CPUState *cpu, const char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
va_list ap2;
|
|
|
|
|
|
|
|
va_start(ap, fmt);
|
|
|
|
va_copy(ap2, ap);
|
|
|
|
fprintf(stderr, "qemu: fatal: ");
|
|
|
|
vfprintf(stderr, fmt, ap);
|
|
|
|
fprintf(stderr, "\n");
|
|
|
|
cpu_dump_state(cpu, stderr, fprintf, CPU_DUMP_FPU | CPU_DUMP_CCOP);
|
|
|
|
if (qemu_log_enabled()) {
|
|
|
|
qemu_log("qemu: fatal: ");
|
|
|
|
qemu_log_vprintf(fmt, ap2);
|
|
|
|
qemu_log("\n");
|
|
|
|
log_cpu_state(cpu, CPU_DUMP_FPU | CPU_DUMP_CCOP);
|
|
|
|
qemu_log_flush();
|
|
|
|
qemu_log_close();
|
|
|
|
}
|
|
|
|
va_end(ap2);
|
|
|
|
va_end(ap);
|
|
|
|
#if defined(CONFIG_USER_ONLY)
|
|
|
|
{
|
|
|
|
struct sigaction act;
|
|
|
|
sigfillset(&act.sa_mask);
|
|
|
|
act.sa_handler = SIG_DFL;
|
2018-06-07 15:46:53 +00:00
|
|
|
act.sa_flags = 0;
|
2015-08-21 07:04:50 +00:00
|
|
|
sigaction(SIGABRT, &act, NULL);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
|
|
|
#if !defined(CONFIG_USER_ONLY)
|
|
|
|
static RAMBlock *qemu_get_ram_block(struct uc_struct *uc, ram_addr_t addr)
|
|
|
|
{
|
|
|
|
RAMBlock *block;
|
|
|
|
|
|
|
|
/* The list is protected by the iothread lock here. */
|
|
|
|
block = uc->ram_list.mru_block;
|
2018-02-17 22:02:55 +00:00
|
|
|
if (block && addr - block->offset < block->max_length) {
|
2018-02-17 22:20:41 +00:00
|
|
|
return block;
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
2018-02-18 23:37:38 +00:00
|
|
|
QLIST_FOREACH(block, &uc->ram_list.blocks, next) {
|
2018-02-17 22:02:55 +00:00
|
|
|
if (addr - block->offset < block->max_length) {
|
2015-08-21 07:04:50 +00:00
|
|
|
goto found;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fprintf(stderr, "Bad ram offset %" PRIx64 "\n", (uint64_t)addr);
|
|
|
|
abort();
|
|
|
|
|
|
|
|
found:
|
|
|
|
uc->ram_list.mru_block = block;
|
|
|
|
return block;
|
|
|
|
}
|
|
|
|
|
|
|
|
hwaddr memory_region_section_get_iotlb(CPUState *cpu,
|
|
|
|
MemoryRegionSection *section,
|
|
|
|
target_ulong vaddr,
|
|
|
|
hwaddr paddr, hwaddr xlat,
|
|
|
|
int prot,
|
|
|
|
target_ulong *address)
|
|
|
|
{
|
|
|
|
hwaddr iotlb;
|
|
|
|
CPUWatchpoint *wp;
|
|
|
|
|
|
|
|
if (memory_region_is_ram(section->mr)) {
|
|
|
|
/* Normal RAM. */
|
|
|
|
iotlb = (memory_region_get_ram_addr(section->mr) & TARGET_PAGE_MASK)
|
|
|
|
+ xlat;
|
|
|
|
if (!section->readonly) {
|
|
|
|
iotlb |= PHYS_SECTION_NOTDIRTY;
|
|
|
|
} else {
|
|
|
|
iotlb |= PHYS_SECTION_ROM;
|
|
|
|
}
|
|
|
|
} else {
|
2018-02-19 00:22:30 +00:00
|
|
|
AddressSpaceDispatch *d;
|
|
|
|
|
2018-03-12 00:57:29 +00:00
|
|
|
d = flatview_to_dispatch(section->fv);
|
2018-02-19 00:22:30 +00:00
|
|
|
iotlb = section - d->map.sections;
|
2015-08-21 07:04:50 +00:00
|
|
|
iotlb += xlat;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Make accesses to pages with watchpoints go via the
|
|
|
|
watchpoint trap routines. */
|
|
|
|
QTAILQ_FOREACH(wp, &cpu->watchpoints, entry) {
|
|
|
|
if (cpu_watchpoint_address_matches(wp, vaddr, TARGET_PAGE_SIZE)) {
|
|
|
|
/* Avoid trapping reads of pages with a write breakpoint. */
|
|
|
|
if ((prot & PAGE_WRITE) || (wp->flags & BP_MEM_READ)) {
|
|
|
|
iotlb = PHYS_SECTION_WATCH + paddr;
|
|
|
|
*address |= TLB_MMIO;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return iotlb;
|
|
|
|
}
|
|
|
|
#endif /* defined(CONFIG_USER_ONLY) */
|
|
|
|
|
|
|
|
#if !defined(CONFIG_USER_ONLY)
|
|
|
|
|
2019-11-20 18:14:20 +00:00
|
|
|
static int subpage_register(subpage_t *mmio, uint32_t start, uint32_t end,
|
|
|
|
uint16_t section);
|
2018-03-12 00:57:29 +00:00
|
|
|
static subpage_t *subpage_init(FlatView *fv, hwaddr base);
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
static void *(*phys_mem_alloc)(size_t size, uint64_t *align) =
|
|
|
|
qemu_anon_ram_alloc;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Set a custom physical guest memory alloator.
|
|
|
|
* Accelerators with unusual needs may need this. Hopefully, we can
|
|
|
|
* get rid of it eventually.
|
|
|
|
*/
|
|
|
|
void phys_mem_set_alloc(void *(*alloc)(size_t, uint64_t *align))
|
|
|
|
{
|
|
|
|
phys_mem_alloc = alloc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static uint16_t phys_section_add(PhysPageMap *map,
|
|
|
|
MemoryRegionSection *section)
|
|
|
|
{
|
|
|
|
/* The physical section number is ORed with a page-aligned
|
|
|
|
* pointer to produce the iotlb entries. Thus it should
|
|
|
|
* never overflow into the page-aligned value.
|
|
|
|
*/
|
|
|
|
assert(map->sections_nb < TARGET_PAGE_SIZE);
|
|
|
|
|
|
|
|
if (map->sections_nb == map->sections_nb_alloc) {
|
|
|
|
map->sections_nb_alloc = MAX(map->sections_nb_alloc * 2, 16);
|
|
|
|
map->sections = g_renew(MemoryRegionSection, map->sections,
|
|
|
|
map->sections_nb_alloc);
|
|
|
|
}
|
|
|
|
map->sections[map->sections_nb] = *section;
|
|
|
|
memory_region_ref(section->mr);
|
|
|
|
return map->sections_nb++;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void phys_section_destroy(MemoryRegion *mr)
|
|
|
|
{
|
2018-02-18 00:11:41 +00:00
|
|
|
bool have_sub_page = mr->subpage;
|
|
|
|
|
2015-08-21 07:04:50 +00:00
|
|
|
memory_region_unref(mr);
|
|
|
|
|
2018-02-18 00:11:41 +00:00
|
|
|
if (have_sub_page) {
|
2015-08-21 07:04:50 +00:00
|
|
|
subpage_t *subpage = container_of(mr, subpage_t, iomem);
|
|
|
|
object_unref(mr->uc, OBJECT(&subpage->iomem));
|
2016-12-21 14:28:36 +00:00
|
|
|
g_free(subpage);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void phys_sections_free(PhysPageMap *map)
|
|
|
|
{
|
|
|
|
while (map->sections_nb > 0) {
|
|
|
|
MemoryRegionSection *section = &map->sections[--map->sections_nb];
|
|
|
|
phys_section_destroy(section->mr);
|
|
|
|
}
|
2016-12-21 14:28:36 +00:00
|
|
|
g_free(map->sections);
|
|
|
|
g_free(map->nodes);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
2018-03-12 01:26:46 +00:00
|
|
|
static void register_subpage(FlatView *fv, MemoryRegionSection *section)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
2018-03-12 01:26:46 +00:00
|
|
|
AddressSpaceDispatch *d = flatview_to_dispatch(fv);
|
2015-08-21 07:04:50 +00:00
|
|
|
subpage_t *subpage;
|
|
|
|
hwaddr base = section->offset_within_address_space
|
|
|
|
& TARGET_PAGE_MASK;
|
2018-03-03 19:28:19 +00:00
|
|
|
MemoryRegionSection *existing = phys_page_find(d, base);
|
2015-08-21 07:04:50 +00:00
|
|
|
hwaddr start, end;
|
2017-01-19 11:50:28 +00:00
|
|
|
MemoryRegionSection subsection = MemoryRegionSection_make(NULL, NULL, 0, int128_make64(TARGET_PAGE_SIZE), base, false);
|
2018-03-12 01:26:46 +00:00
|
|
|
struct uc_struct *uc = d->uc;
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
assert(existing->mr->subpage || existing->mr == &uc->io_mem_unassigned);
|
|
|
|
|
|
|
|
if (!(existing->mr->subpage)) {
|
2018-03-12 00:57:29 +00:00
|
|
|
subpage = subpage_init(fv, base);
|
|
|
|
subsection.fv = fv;
|
2015-08-21 07:04:50 +00:00
|
|
|
subsection.mr = &subpage->iomem;
|
2018-03-12 00:57:29 +00:00
|
|
|
phys_page_set(d, base >> TARGET_PAGE_BITS, 1,
|
2018-02-26 00:24:46 +00:00
|
|
|
phys_section_add(&d->map, &subsection));
|
2015-08-21 07:04:50 +00:00
|
|
|
} else {
|
|
|
|
subpage = container_of(existing->mr, subpage_t, iomem);
|
|
|
|
}
|
|
|
|
start = section->offset_within_address_space & ~TARGET_PAGE_MASK;
|
|
|
|
end = start + int128_get64(section->size) - 1;
|
|
|
|
subpage_register(subpage, start, end,
|
2018-02-26 00:24:46 +00:00
|
|
|
phys_section_add(&d->map, section));
|
2015-08-21 07:04:50 +00:00
|
|
|
//g_free(subpage);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-03-12 01:26:46 +00:00
|
|
|
static void register_multipage(FlatView *fv,
|
2018-02-26 00:24:46 +00:00
|
|
|
MemoryRegionSection *section)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
2018-03-12 01:26:46 +00:00
|
|
|
AddressSpaceDispatch *d = flatview_to_dispatch(fv);
|
2015-08-21 07:04:50 +00:00
|
|
|
hwaddr start_addr = section->offset_within_address_space;
|
|
|
|
uint16_t section_index = phys_section_add(&d->map, section);
|
|
|
|
uint64_t num_pages = int128_get64(int128_rshift(section->size,
|
|
|
|
TARGET_PAGE_BITS));
|
|
|
|
|
|
|
|
assert(num_pages);
|
2018-03-12 00:57:29 +00:00
|
|
|
phys_page_set(d, start_addr >> TARGET_PAGE_BITS, num_pages, section_index);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
2019-03-11 20:49:13 +00:00
|
|
|
/*
|
|
|
|
* The range in *section* may look like this:
|
|
|
|
*
|
|
|
|
* |s|PPPPPPP|s|
|
|
|
|
*
|
|
|
|
* where s stands for subpage and P for page.
|
|
|
|
*/
|
2018-03-12 01:34:55 +00:00
|
|
|
void flatview_add_to_dispatch(FlatView *fv, MemoryRegionSection *section)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
2019-03-11 20:49:13 +00:00
|
|
|
MemoryRegionSection remain = *section;
|
2015-08-21 07:04:50 +00:00
|
|
|
Int128 page_size = int128_make64(TARGET_PAGE_SIZE);
|
|
|
|
|
2019-03-11 20:49:13 +00:00
|
|
|
/* register first subpage */
|
|
|
|
if (remain.offset_within_address_space & ~TARGET_PAGE_MASK) {
|
|
|
|
uint64_t left = TARGET_PAGE_ALIGN(remain.offset_within_address_space)
|
|
|
|
- remain.offset_within_address_space;
|
2015-08-21 07:04:50 +00:00
|
|
|
|
2019-03-11 20:49:13 +00:00
|
|
|
MemoryRegionSection now = remain;
|
2015-08-21 07:04:50 +00:00
|
|
|
now.size = int128_min(int128_make64(left), now.size);
|
2018-03-12 01:26:46 +00:00
|
|
|
register_subpage(fv, &now);
|
2019-03-11 20:49:13 +00:00
|
|
|
if (int128_eq(remain.size, now.size)) {
|
|
|
|
return;
|
|
|
|
}
|
2015-08-21 07:04:50 +00:00
|
|
|
remain.size = int128_sub(remain.size, now.size);
|
|
|
|
remain.offset_within_address_space += int128_get64(now.size);
|
|
|
|
remain.offset_within_region += int128_get64(now.size);
|
2019-03-11 20:49:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* register whole pages */
|
|
|
|
if (int128_ge(remain.size, page_size)) {
|
|
|
|
MemoryRegionSection now = remain;
|
|
|
|
now.size = int128_and(now.size, int128_neg(page_size));
|
|
|
|
register_multipage(fv, &now);
|
|
|
|
if (int128_eq(remain.size, now.size)) {
|
|
|
|
return;
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
2019-03-11 20:49:13 +00:00
|
|
|
remain.size = int128_sub(remain.size, now.size);
|
|
|
|
remain.offset_within_address_space += int128_get64(now.size);
|
|
|
|
remain.offset_within_region += int128_get64(now.size);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
2019-03-11 20:49:13 +00:00
|
|
|
|
|
|
|
/* register last subpage */
|
|
|
|
register_subpage(fv, &remain);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef __linux__
|
|
|
|
|
|
|
|
#include <sys/vfs.h>
|
|
|
|
|
|
|
|
#define HUGETLBFS_MAGIC 0x958458f6
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
static ram_addr_t find_ram_offset(struct uc_struct *uc, ram_addr_t size)
|
|
|
|
{
|
|
|
|
RAMBlock *block, *next_block;
|
|
|
|
ram_addr_t offset = RAM_ADDR_MAX, mingap = RAM_ADDR_MAX;
|
|
|
|
|
|
|
|
assert(size != 0); /* it would hand out same offset multiple times */
|
|
|
|
|
2018-02-18 23:37:38 +00:00
|
|
|
if (QLIST_EMPTY(&uc->ram_list.blocks)) {
|
2015-08-21 07:04:50 +00:00
|
|
|
return 0;
|
2018-02-18 23:37:38 +00:00
|
|
|
}
|
2015-08-21 07:04:50 +00:00
|
|
|
|
2018-02-18 23:37:38 +00:00
|
|
|
QLIST_FOREACH(block, &uc->ram_list.blocks, next) {
|
2015-08-21 07:04:50 +00:00
|
|
|
ram_addr_t end, next = RAM_ADDR_MAX;
|
|
|
|
|
2018-02-17 22:02:55 +00:00
|
|
|
end = block->offset + block->max_length;
|
2015-08-21 07:04:50 +00:00
|
|
|
|
2018-02-18 23:37:38 +00:00
|
|
|
QLIST_FOREACH(next_block, &uc->ram_list.blocks, next) {
|
2015-08-21 07:04:50 +00:00
|
|
|
if (next_block->offset >= end) {
|
|
|
|
next = MIN(next, next_block->offset);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (next - end >= size && next - end < mingap) {
|
|
|
|
offset = end;
|
|
|
|
mingap = next - end;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (offset == RAM_ADDR_MAX) {
|
|
|
|
fprintf(stderr, "Failed to find gap of requested size: %" PRIu64 "\n",
|
|
|
|
(uint64_t)size);
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
|
|
|
|
ram_addr_t last_ram_offset(struct uc_struct *uc)
|
|
|
|
{
|
|
|
|
RAMBlock *block;
|
|
|
|
ram_addr_t last = 0;
|
|
|
|
|
2018-02-18 23:37:38 +00:00
|
|
|
QLIST_FOREACH(block, &uc->ram_list.blocks, next) {
|
2018-02-17 22:02:55 +00:00
|
|
|
last = MAX(last, block->offset + block->max_length);
|
2018-02-18 23:37:38 +00:00
|
|
|
}
|
2015-08-21 07:04:50 +00:00
|
|
|
return last;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void qemu_ram_setup_dump(void *addr, ram_addr_t size)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2018-02-17 22:52:30 +00:00
|
|
|
const char *qemu_ram_get_idstr(RAMBlock *rb)
|
|
|
|
{
|
|
|
|
return rb->idstr;
|
|
|
|
}
|
|
|
|
|
2018-03-02 18:04:57 +00:00
|
|
|
bool qemu_ram_is_shared(RAMBlock *rb)
|
|
|
|
{
|
|
|
|
return rb->flags & RAM_SHARED;
|
|
|
|
}
|
|
|
|
|
2018-02-24 07:52:14 +00:00
|
|
|
void qemu_ram_unset_idstr(struct uc_struct *uc, RAMBlock *block)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
|
|
|
if (block) {
|
|
|
|
memset(block->idstr, 0, sizeof(block->idstr));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int memory_try_enable_merging(void *addr, size_t len)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-02-17 22:02:55 +00:00
|
|
|
/* Only legal before guest might have detected the memory size: e.g. on
|
|
|
|
* incoming migration, or right after reset.
|
|
|
|
*
|
|
|
|
* As memory core doesn't know how is memory accessed, it is up to
|
|
|
|
* resize callback to update device state and/or add assertions to detect
|
|
|
|
* misuse, if necessary.
|
|
|
|
*/
|
2018-02-24 07:52:14 +00:00
|
|
|
int qemu_ram_resize(struct uc_struct *uc, RAMBlock *block, ram_addr_t newsize, Error **errp)
|
2018-02-17 22:02:55 +00:00
|
|
|
{
|
|
|
|
assert(block);
|
|
|
|
|
2018-02-19 00:02:19 +00:00
|
|
|
newsize = TARGET_PAGE_ALIGN(newsize);
|
|
|
|
|
2018-02-17 22:02:55 +00:00
|
|
|
if (block->used_length == newsize) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!(block->flags & RAM_RESIZEABLE)) {
|
|
|
|
error_setg_errno(errp, EINVAL,
|
|
|
|
"Length mismatch: %s: 0x" RAM_ADDR_FMT
|
|
|
|
" in != 0x" RAM_ADDR_FMT, block->idstr,
|
|
|
|
newsize, block->used_length);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (block->max_length < newsize) {
|
|
|
|
error_setg_errno(errp, EINVAL,
|
|
|
|
"Length too large: %s: 0x" RAM_ADDR_FMT
|
|
|
|
" > 0x" RAM_ADDR_FMT, block->idstr,
|
|
|
|
newsize, block->max_length);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
block->used_length = newsize;
|
2018-03-12 12:22:06 +00:00
|
|
|
|
2018-02-17 22:02:55 +00:00
|
|
|
memory_region_set_size(block->mr, newsize);
|
|
|
|
if (block->resized) {
|
|
|
|
block->resized(block->idstr, newsize, block->host);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-02-21 12:43:01 +00:00
|
|
|
static void ram_block_add(struct uc_struct *uc, RAMBlock *new_block, Error **errp)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
|
|
|
RAMBlock *block;
|
2018-02-18 23:37:38 +00:00
|
|
|
RAMBlock *last_block = NULL;
|
2015-08-21 07:04:50 +00:00
|
|
|
ram_addr_t old_ram_size, new_ram_size;
|
|
|
|
|
|
|
|
old_ram_size = last_ram_offset(uc) >> TARGET_PAGE_BITS;
|
|
|
|
|
2018-02-17 22:02:55 +00:00
|
|
|
new_block->offset = find_ram_offset(uc, new_block->max_length);
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
if (!new_block->host) {
|
2018-02-17 22:02:55 +00:00
|
|
|
new_block->host = phys_mem_alloc(new_block->max_length,
|
|
|
|
&new_block->mr->align);
|
2015-08-21 07:04:50 +00:00
|
|
|
if (!new_block->host) {
|
|
|
|
error_setg_errno(errp, errno,
|
2018-02-17 22:02:55 +00:00
|
|
|
"cannot set up guest memory '%s'",
|
|
|
|
memory_region_name(new_block->mr));
|
2018-02-22 02:37:52 +00:00
|
|
|
return;
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
2018-02-17 22:02:55 +00:00
|
|
|
memory_try_enable_merging(new_block->host, new_block->max_length);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
2018-02-22 18:43:01 +00:00
|
|
|
new_ram_size = MAX(old_ram_size,
|
|
|
|
(new_block->offset + new_block->max_length) >> TARGET_PAGE_BITS);
|
2018-03-12 12:22:06 +00:00
|
|
|
|
2018-02-18 23:37:38 +00:00
|
|
|
/* Keep the list sorted from biggest to smallest block. Unlike QTAILQ,
|
|
|
|
* QLIST (which has an RCU-friendly variant) does not have insertion at
|
|
|
|
* tail, so save the last element in last_block.
|
|
|
|
*/
|
|
|
|
QLIST_FOREACH(block, &uc->ram_list.blocks, next) {
|
|
|
|
last_block = block;
|
2018-02-17 22:02:55 +00:00
|
|
|
if (block->max_length < new_block->max_length) {
|
2015-08-21 07:04:50 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (block) {
|
2018-02-18 23:37:38 +00:00
|
|
|
QLIST_INSERT_BEFORE(block, new_block, next);
|
|
|
|
} else if (last_block) {
|
|
|
|
QLIST_INSERT_AFTER(last_block, new_block, next);
|
|
|
|
} else { /* list is empty */
|
|
|
|
QLIST_INSERT_HEAD(&uc->ram_list.blocks, new_block, next);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
uc->ram_list.mru_block = NULL;
|
|
|
|
|
2018-02-18 23:53:46 +00:00
|
|
|
/* Write list before version */
|
|
|
|
smp_wmb();
|
2015-08-21 07:04:50 +00:00
|
|
|
uc->ram_list.version++;
|
|
|
|
|
2018-02-18 23:19:15 +00:00
|
|
|
if (new_block->host) {
|
|
|
|
qemu_ram_setup_dump(new_block->host, new_block->max_length);
|
|
|
|
// Unicorn: commented out
|
|
|
|
//qemu_madvise(new_block->host, new_block->max_length, QEMU_MADV_HUGEPAGE);
|
|
|
|
//qemu_madvise(new_block->host, new_block->max_length, QEMU_MADV_DONTFORK);
|
|
|
|
//if (kvm_enabled()) {
|
|
|
|
// kvm_setup_guest_memory(new_block->host, new_block->max_length);
|
|
|
|
//}
|
|
|
|
}
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
2018-02-17 22:02:55 +00:00
|
|
|
static
|
2018-02-21 12:43:01 +00:00
|
|
|
RAMBlock *qemu_ram_alloc_internal(ram_addr_t size, ram_addr_t max_size,
|
2018-02-17 22:02:55 +00:00
|
|
|
void (*resized)(const char*,
|
|
|
|
uint64_t length,
|
|
|
|
void *host),
|
|
|
|
void *host, bool resizeable,
|
|
|
|
MemoryRegion *mr, Error **errp)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
|
|
|
RAMBlock *new_block;
|
|
|
|
Error *local_err = NULL;
|
|
|
|
|
|
|
|
size = TARGET_PAGE_ALIGN(size);
|
2018-02-17 22:02:55 +00:00
|
|
|
max_size = TARGET_PAGE_ALIGN(max_size);
|
2015-08-21 07:04:50 +00:00
|
|
|
new_block = g_malloc0(sizeof(*new_block));
|
2018-02-17 22:02:55 +00:00
|
|
|
if (new_block == NULL) {
|
2018-02-21 12:43:01 +00:00
|
|
|
return NULL;
|
2018-02-17 22:02:55 +00:00
|
|
|
}
|
2015-08-21 07:04:50 +00:00
|
|
|
new_block->mr = mr;
|
2018-02-17 22:02:55 +00:00
|
|
|
new_block->resized = resized;
|
|
|
|
new_block->used_length = size;
|
|
|
|
new_block->max_length = max_size;
|
|
|
|
assert(max_size >= size);
|
2015-08-21 07:04:50 +00:00
|
|
|
new_block->fd = -1;
|
|
|
|
new_block->host = host;
|
|
|
|
if (host) {
|
|
|
|
new_block->flags |= RAM_PREALLOC;
|
|
|
|
}
|
2018-02-17 22:02:55 +00:00
|
|
|
if (resizeable) {
|
|
|
|
new_block->flags |= RAM_RESIZEABLE;
|
|
|
|
}
|
2018-02-21 12:43:01 +00:00
|
|
|
ram_block_add(mr->uc, new_block, &local_err);
|
2015-08-21 07:04:50 +00:00
|
|
|
if (local_err) {
|
2016-12-21 14:28:36 +00:00
|
|
|
g_free(new_block);
|
2015-08-21 07:04:50 +00:00
|
|
|
error_propagate(errp, local_err);
|
2018-02-21 12:43:01 +00:00
|
|
|
return NULL;
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
2018-02-21 12:43:01 +00:00
|
|
|
return new_block;
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
2018-02-21 12:43:01 +00:00
|
|
|
RAMBlock *qemu_ram_alloc_from_ptr(ram_addr_t size, void *host,
|
|
|
|
MemoryRegion *mr, Error **errp)
|
2018-02-17 22:02:55 +00:00
|
|
|
{
|
|
|
|
return qemu_ram_alloc_internal(size, size, NULL, host, false, mr, errp);
|
|
|
|
}
|
|
|
|
|
2018-02-21 12:43:01 +00:00
|
|
|
RAMBlock *qemu_ram_alloc(ram_addr_t size, MemoryRegion *mr, Error **errp)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
2018-02-17 22:02:55 +00:00
|
|
|
return qemu_ram_alloc_internal(size, size, NULL, NULL, false, mr, errp);
|
|
|
|
}
|
|
|
|
|
2018-02-21 12:43:01 +00:00
|
|
|
RAMBlock *qemu_ram_alloc_resizeable(ram_addr_t size, ram_addr_t maxsz,
|
|
|
|
void (*resized)(const char*,
|
|
|
|
uint64_t length,
|
|
|
|
void *host),
|
|
|
|
MemoryRegion *mr, Error **errp)
|
2018-02-17 22:02:55 +00:00
|
|
|
{
|
|
|
|
return qemu_ram_alloc_internal(size, maxsz, resized, NULL, true, mr, errp);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
2018-02-19 00:36:18 +00:00
|
|
|
static void reclaim_ramblock(RAMBlock *block)
|
|
|
|
{
|
|
|
|
if (block->flags & RAM_PREALLOC) {
|
|
|
|
;
|
|
|
|
#ifndef _WIN32
|
|
|
|
} else if (block->fd >= 0) {
|
|
|
|
munmap(block->host, block->max_length);
|
|
|
|
close(block->fd);
|
|
|
|
#endif
|
|
|
|
} else {
|
|
|
|
qemu_anon_ram_free(block->host, block->max_length);
|
|
|
|
}
|
|
|
|
g_free(block);
|
|
|
|
}
|
|
|
|
|
2015-08-21 07:04:50 +00:00
|
|
|
void qemu_ram_free(struct uc_struct *uc, ram_addr_t addr)
|
|
|
|
{
|
|
|
|
RAMBlock *block;
|
|
|
|
|
2018-02-18 23:37:38 +00:00
|
|
|
QLIST_FOREACH(block, &uc->ram_list.blocks, next) {
|
2015-08-21 07:04:50 +00:00
|
|
|
if (addr == block->offset) {
|
2018-02-18 23:37:38 +00:00
|
|
|
QLIST_REMOVE(block, next);
|
2015-08-21 07:04:50 +00:00
|
|
|
uc->ram_list.mru_block = NULL;
|
2018-02-19 00:36:18 +00:00
|
|
|
/* Write list before version */
|
|
|
|
smp_wmb();
|
2015-08-21 07:04:50 +00:00
|
|
|
uc->ram_list.version++;
|
2018-02-19 00:36:18 +00:00
|
|
|
// Unicorn: call directly instead of via call_rcu
|
|
|
|
reclaim_ramblock(block);
|
2015-08-21 07:04:50 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef _WIN32
|
|
|
|
void qemu_ram_remap(struct uc_struct *uc, ram_addr_t addr, ram_addr_t length)
|
|
|
|
{
|
|
|
|
RAMBlock *block;
|
|
|
|
ram_addr_t offset;
|
|
|
|
int flags;
|
|
|
|
void *area, *vaddr;
|
|
|
|
|
2018-02-18 23:37:38 +00:00
|
|
|
QLIST_FOREACH(block, &uc->ram_list.blocks, next) {
|
2015-08-21 07:04:50 +00:00
|
|
|
offset = addr - block->offset;
|
2018-02-17 22:02:55 +00:00
|
|
|
if (offset < block->max_length) {
|
|
|
|
vaddr = ramblock_ptr(block, offset);
|
2015-08-21 07:04:50 +00:00
|
|
|
if (block->flags & RAM_PREALLOC) {
|
|
|
|
;
|
|
|
|
} else {
|
|
|
|
flags = MAP_FIXED;
|
|
|
|
if (block->fd >= 0) {
|
|
|
|
flags |= (block->flags & RAM_SHARED ?
|
|
|
|
MAP_SHARED : MAP_PRIVATE);
|
|
|
|
area = mmap(vaddr, length, PROT_READ | PROT_WRITE,
|
|
|
|
flags, block->fd, offset);
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* Remap needs to match alloc. Accelerators that
|
|
|
|
* set phys_mem_alloc never remap. If they did,
|
|
|
|
* we'd need a remap hook here.
|
|
|
|
*/
|
|
|
|
assert(phys_mem_alloc == qemu_anon_ram_alloc);
|
|
|
|
|
|
|
|
flags |= MAP_PRIVATE | MAP_ANONYMOUS;
|
|
|
|
area = mmap(vaddr, length, PROT_READ | PROT_WRITE,
|
|
|
|
flags, -1, 0);
|
|
|
|
}
|
|
|
|
if (area != vaddr) {
|
|
|
|
fprintf(stderr, "Could not remap addr: "
|
|
|
|
RAM_ADDR_FMT "@" RAM_ADDR_FMT "\n",
|
|
|
|
length, addr);
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
memory_try_enable_merging(vaddr, length);
|
|
|
|
qemu_ram_setup_dump(vaddr, length);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* !_WIN32 */
|
|
|
|
|
|
|
|
/* Return a host pointer to ram allocated with qemu_ram_alloc.
|
|
|
|
With the exception of the softmmu code in this file, this should
|
|
|
|
only be used for local memory (e.g. video ram) that the device owns,
|
|
|
|
and knows it isn't going to access beyond the end of the block.
|
|
|
|
|
|
|
|
It should not be used for general purpose DMA.
|
|
|
|
Use cpu_physical_memory_map/cpu_physical_memory_rw instead.
|
|
|
|
*/
|
2018-02-24 21:10:07 +00:00
|
|
|
void *qemu_map_ram_ptr(struct uc_struct *uc, RAMBlock *ram_block,
|
2018-02-21 01:50:50 +00:00
|
|
|
ram_addr_t addr)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
2018-02-21 01:50:50 +00:00
|
|
|
RAMBlock *block = ram_block;
|
|
|
|
|
|
|
|
if (block == NULL) {
|
|
|
|
block = qemu_get_ram_block(uc, addr);
|
2018-02-24 21:10:07 +00:00
|
|
|
addr -= block->offset;
|
2018-02-21 01:50:50 +00:00
|
|
|
}
|
2015-08-21 07:04:50 +00:00
|
|
|
|
2018-02-24 21:10:07 +00:00
|
|
|
return ramblock_ptr(block, addr);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
2018-02-24 21:10:07 +00:00
|
|
|
/* Return a host pointer to guest's ram. Similar to qemu_map_ram_ptr
|
2015-08-21 07:04:50 +00:00
|
|
|
* but takes a size argument */
|
2018-02-21 01:50:50 +00:00
|
|
|
static void *qemu_ram_ptr_length(struct uc_struct *uc, RAMBlock *ram_block,
|
exec: Add lock parameter to qemu_ram_ptr_length
Commit 04bf2526ce87f21b32c9acba1c5518708c243ad0 (exec: use
qemu_ram_ptr_length to access guest ram) start using qemu_ram_ptr_length
instead of qemu_map_ram_ptr, but when used with Xen, the behavior of
both function is different. They both call xen_map_cache, but one with
"lock", meaning the mapping of guest memory is never released
implicitly, and the second one without, which means, mapping can be
release later, when needed.
In the context of address_space_{read,write}_continue, the ptr to those
mapping should not be locked because it is used immediatly and never
used again.
The lock parameter make it explicit in which context qemu_ram_ptr_length
is called.
Backports commit f5aa69bdc3418773f26747ca282c291519626ece from qemu
2018-03-04 06:23:04 +00:00
|
|
|
ram_addr_t addr, hwaddr *size, bool lock)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
2018-02-21 01:50:50 +00:00
|
|
|
RAMBlock *block = ram_block;
|
2015-08-21 07:04:50 +00:00
|
|
|
if (*size == 0) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2018-02-21 01:50:50 +00:00
|
|
|
if (block == NULL) {
|
|
|
|
block = qemu_get_ram_block(uc, addr);
|
2018-02-24 21:10:07 +00:00
|
|
|
addr -= block->offset;
|
2018-02-21 01:50:50 +00:00
|
|
|
}
|
2018-02-24 21:10:07 +00:00
|
|
|
*size = MIN(*size, block->max_length - addr);
|
2018-02-18 00:44:38 +00:00
|
|
|
|
|
|
|
// Unicorn: Commented out
|
|
|
|
//if (xen_enabled() && block->host == NULL) {
|
|
|
|
// /* We need to check if the requested address is in the RAM
|
|
|
|
// * because we don't want to map the entire memory in QEMU.
|
|
|
|
// * In that case just map the requested area.
|
|
|
|
// */
|
|
|
|
// if (block->offset == 0) {
|
|
|
|
// return xen_map_cache(addr, *size, 1);
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// block->host = xen_map_cache(block->offset, block->max_length, 1);
|
|
|
|
//}
|
|
|
|
|
2018-02-24 21:10:07 +00:00
|
|
|
return ramblock_ptr(block, addr);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
2018-02-17 22:52:30 +00:00
|
|
|
/*
|
|
|
|
* Translates a host ptr back to a RAMBlock, a ram_addr and an offset
|
|
|
|
* in that RAMBlock.
|
|
|
|
*
|
|
|
|
* ptr: Host pointer to look up
|
|
|
|
* round_offset: If true round the result offset down to a page boundary
|
|
|
|
* *ram_addr: set to result ram_addr
|
|
|
|
* *offset: set to result offset within the RAMBlock
|
|
|
|
*
|
|
|
|
* Returns: RAMBlock (or NULL if not found)
|
|
|
|
*
|
|
|
|
*
|
|
|
|
* By the time this function returns, the returned pointer is not protected
|
|
|
|
* by RCU anymore. If the caller is not within an RCU critical section and
|
|
|
|
* does not hold the iothread lock, it must have other means of protecting the
|
|
|
|
* pointer, such as a reference to the region that includes the incoming
|
|
|
|
* ram_addr_t.
|
|
|
|
*/
|
|
|
|
RAMBlock *qemu_ram_block_from_host(struct uc_struct* uc, void *ptr, bool round_offset,
|
|
|
|
ram_addr_t *offset)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
|
|
|
RAMBlock *block;
|
|
|
|
uint8_t *host = ptr;
|
|
|
|
|
|
|
|
block = uc->ram_list.mru_block;
|
2018-02-17 22:02:55 +00:00
|
|
|
if (block && block->host && host - block->host < block->max_length) {
|
2015-08-21 07:04:50 +00:00
|
|
|
goto found;
|
|
|
|
}
|
|
|
|
|
2018-02-18 23:37:38 +00:00
|
|
|
QLIST_FOREACH(block, &uc->ram_list.blocks, next) {
|
2015-08-21 07:04:50 +00:00
|
|
|
/* This case append when the block is not mapped. */
|
|
|
|
if (block->host == NULL) {
|
|
|
|
continue;
|
|
|
|
}
|
2018-02-17 22:02:55 +00:00
|
|
|
if (host - block->host < block->max_length) {
|
2015-08-21 07:04:50 +00:00
|
|
|
goto found;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
found:
|
2018-02-17 22:52:30 +00:00
|
|
|
*offset = (host - block->host);
|
|
|
|
if (round_offset) {
|
|
|
|
*offset &= TARGET_PAGE_MASK;
|
|
|
|
}
|
|
|
|
return block;
|
|
|
|
}
|
|
|
|
|
2018-02-17 22:58:36 +00:00
|
|
|
/*
|
|
|
|
* Finds the named RAMBlock
|
|
|
|
*
|
|
|
|
* name: The name of RAMBlock to find
|
|
|
|
*
|
|
|
|
* Returns: RAMBlock (or NULL if not found)
|
|
|
|
*/
|
|
|
|
RAMBlock *qemu_ram_block_by_name(struct uc_struct* uc, const char *name)
|
|
|
|
{
|
|
|
|
RAMBlock *block;
|
|
|
|
|
2018-02-18 23:37:38 +00:00
|
|
|
// Unicorn: Changed from QLIST_FOREACH_RCU to QLIST_FOREACH
|
|
|
|
QLIST_FOREACH(block, &uc->ram_list.blocks, next) {
|
2018-02-17 22:58:36 +00:00
|
|
|
if (!strcmp(name, block->idstr)) {
|
|
|
|
return block;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2018-02-17 22:52:30 +00:00
|
|
|
/* Some of the softmmu routines need to translate from a host pointer
|
|
|
|
(typically a TLB entry) back to a ram offset. */
|
2018-02-24 20:52:04 +00:00
|
|
|
ram_addr_t qemu_ram_addr_from_host(struct uc_struct* uc, void *ptr)
|
2018-02-17 22:52:30 +00:00
|
|
|
{
|
|
|
|
RAMBlock *block;
|
2018-02-24 08:37:37 +00:00
|
|
|
ram_addr_t offset;
|
2018-02-17 22:52:30 +00:00
|
|
|
|
2018-02-24 08:37:37 +00:00
|
|
|
block = qemu_ram_block_from_host(uc, ptr, false, &offset);
|
2018-02-17 22:52:30 +00:00
|
|
|
if (!block) {
|
2018-02-24 20:52:04 +00:00
|
|
|
return RAM_ADDR_INVALID;
|
2018-02-17 22:52:30 +00:00
|
|
|
}
|
|
|
|
|
2018-02-24 20:52:04 +00:00
|
|
|
return block->offset + offset;
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
2018-03-12 00:57:29 +00:00
|
|
|
static MemTxResult flatview_write(FlatView *fv, hwaddr addr, MemTxAttrs attrs,
|
|
|
|
const uint8_t *buf, int len);
|
|
|
|
static bool flatview_access_valid(FlatView *fv, hwaddr addr, int len,
|
|
|
|
bool is_write);
|
|
|
|
|
2018-02-12 23:43:37 +00:00
|
|
|
static MemTxResult subpage_read(struct uc_struct* uc, void *opaque, hwaddr addr,
|
|
|
|
uint64_t *data, unsigned len, MemTxAttrs attrs)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
|
|
|
subpage_t *subpage = opaque;
|
2018-02-18 23:06:04 +00:00
|
|
|
uint8_t buf[8];
|
2018-02-12 23:56:13 +00:00
|
|
|
MemTxResult res;
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
#if defined(DEBUG_SUBPAGE)
|
|
|
|
printf("%s: subpage %p len %u addr " TARGET_FMT_plx "\n", __func__,
|
|
|
|
subpage, len, addr);
|
|
|
|
#endif
|
2018-03-12 00:57:29 +00:00
|
|
|
res = flatview_read(subpage->fv, addr + subpage->base, attrs, buf, len);
|
2018-02-12 23:56:13 +00:00
|
|
|
if (res) {
|
|
|
|
return res;
|
2018-02-12 23:43:37 +00:00
|
|
|
}
|
2018-06-15 16:20:58 +00:00
|
|
|
*data = ldn_p(buf, len);
|
|
|
|
return MEMTX_OK;
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
2018-02-12 23:43:37 +00:00
|
|
|
static MemTxResult subpage_write(struct uc_struct* uc, void *opaque, hwaddr addr,
|
|
|
|
uint64_t value, unsigned len, MemTxAttrs attrs)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
|
|
|
subpage_t *subpage = opaque;
|
2018-02-18 23:06:04 +00:00
|
|
|
uint8_t buf[8];
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
#if defined(DEBUG_SUBPAGE)
|
|
|
|
printf("%s: subpage %p len %u addr " TARGET_FMT_plx
|
|
|
|
" value %"PRIx64"\n",
|
|
|
|
__func__, subpage, len, addr, value);
|
|
|
|
#endif
|
2018-06-15 16:20:58 +00:00
|
|
|
stn_p(buf, len, value);
|
2018-03-12 00:57:29 +00:00
|
|
|
return flatview_write(subpage->fv, addr + subpage->base, attrs, buf, len);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static bool subpage_accepts(void *opaque, hwaddr addr,
|
|
|
|
unsigned len, bool is_write)
|
|
|
|
{
|
|
|
|
subpage_t *subpage = opaque;
|
|
|
|
#if defined(DEBUG_SUBPAGE)
|
|
|
|
printf("%s: subpage %p %c len %u addr " TARGET_FMT_plx "\n",
|
|
|
|
__func__, subpage, is_write ? 'w' : 'r', len, addr);
|
|
|
|
#endif
|
|
|
|
|
2018-03-12 00:57:29 +00:00
|
|
|
return flatview_access_valid(subpage->fv, addr + subpage->base,
|
|
|
|
len, is_write);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static const MemoryRegionOps subpage_ops = {
|
2018-02-12 21:56:31 +00:00
|
|
|
NULL,
|
|
|
|
NULL,
|
2018-02-12 23:43:37 +00:00
|
|
|
subpage_read,
|
|
|
|
subpage_write,
|
2017-01-19 11:50:28 +00:00
|
|
|
DEVICE_NATIVE_ENDIAN,
|
|
|
|
{
|
2018-02-18 23:06:04 +00:00
|
|
|
1, 8, false, subpage_accepts,
|
2017-01-21 01:28:22 +00:00
|
|
|
},
|
2018-02-18 23:06:04 +00:00
|
|
|
{
|
|
|
|
1, 8, false,
|
|
|
|
}
|
2015-08-21 07:04:50 +00:00
|
|
|
};
|
|
|
|
|
2019-11-20 18:14:20 +00:00
|
|
|
static int subpage_register(subpage_t *mmio, uint32_t start, uint32_t end,
|
|
|
|
uint16_t section)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
|
|
|
int idx, eidx;
|
|
|
|
|
|
|
|
if (start >= TARGET_PAGE_SIZE || end >= TARGET_PAGE_SIZE)
|
|
|
|
return -1;
|
|
|
|
idx = SUBPAGE_IDX(start);
|
|
|
|
eidx = SUBPAGE_IDX(end);
|
|
|
|
#if defined(DEBUG_SUBPAGE)
|
|
|
|
printf("%s: %p start %08x end %08x idx %08x eidx %08x section %d\n",
|
|
|
|
__func__, mmio, start, end, idx, eidx, section);
|
|
|
|
#endif
|
|
|
|
for (; idx <= eidx; idx++) {
|
|
|
|
mmio->sub_section[idx] = section;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void notdirty_mem_write(struct uc_struct* uc, void *opaque, hwaddr ram_addr,
|
|
|
|
uint64_t val, unsigned size)
|
|
|
|
{
|
|
|
|
switch (size) {
|
|
|
|
case 1:
|
2018-02-24 21:10:07 +00:00
|
|
|
stb_p(qemu_map_ram_ptr(uc, NULL, ram_addr), val);
|
2015-08-21 07:04:50 +00:00
|
|
|
break;
|
|
|
|
case 2:
|
2018-02-24 21:10:07 +00:00
|
|
|
stw_p(qemu_map_ram_ptr(uc, NULL, ram_addr), val);
|
2015-08-21 07:04:50 +00:00
|
|
|
break;
|
|
|
|
case 4:
|
2018-02-24 21:10:07 +00:00
|
|
|
stl_p(qemu_map_ram_ptr(uc, NULL, ram_addr), val);
|
2015-08-21 07:04:50 +00:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool notdirty_mem_accepts(void *opaque, hwaddr addr,
|
|
|
|
unsigned size, bool is_write)
|
|
|
|
{
|
|
|
|
return is_write;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const MemoryRegionOps notdirty_mem_ops = {
|
2017-01-19 11:50:28 +00:00
|
|
|
NULL,
|
2017-01-21 01:28:22 +00:00
|
|
|
notdirty_mem_write,
|
2018-02-12 21:56:31 +00:00
|
|
|
NULL,
|
|
|
|
NULL,
|
2017-01-19 11:50:28 +00:00
|
|
|
DEVICE_NATIVE_ENDIAN,
|
2017-01-21 01:28:22 +00:00
|
|
|
{
|
|
|
|
0, 0, false, notdirty_mem_accepts,
|
|
|
|
},
|
2015-08-21 07:04:50 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static void io_mem_init(struct uc_struct* uc)
|
|
|
|
{
|
|
|
|
memory_region_init_io(uc, &uc->io_mem_rom, NULL, &unassigned_mem_ops, NULL, NULL, UINT64_MAX);
|
|
|
|
memory_region_init_io(uc, &uc->io_mem_unassigned, NULL, &unassigned_mem_ops, NULL,
|
|
|
|
NULL, UINT64_MAX);
|
|
|
|
memory_region_init_io(uc, &uc->io_mem_notdirty, NULL, ¬dirty_mem_ops, NULL,
|
|
|
|
NULL, UINT64_MAX);
|
|
|
|
//memory_region_init_io(uc, &uc->io_mem_watch, NULL, &watch_mem_ops, NULL,
|
|
|
|
// NULL, UINT64_MAX);
|
|
|
|
}
|
|
|
|
|
2018-03-12 00:57:29 +00:00
|
|
|
static subpage_t *subpage_init(FlatView *fv, hwaddr base)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
2018-03-12 00:57:29 +00:00
|
|
|
AddressSpaceDispatch *d = flatview_to_dispatch(fv);
|
2015-08-21 07:04:50 +00:00
|
|
|
subpage_t *mmio;
|
|
|
|
|
2019-11-20 18:14:20 +00:00
|
|
|
/* mmio->sub_section is set to PHYS_SECTION_UNASSIGNED with g_malloc0 */
|
2018-02-26 15:48:57 +00:00
|
|
|
mmio = g_malloc0(sizeof(subpage_t) + TARGET_PAGE_SIZE * sizeof(uint16_t));
|
2015-08-21 07:04:50 +00:00
|
|
|
|
2018-03-12 00:57:29 +00:00
|
|
|
mmio->fv = fv;
|
2015-08-21 07:04:50 +00:00
|
|
|
mmio->base = base;
|
2018-03-12 00:57:29 +00:00
|
|
|
memory_region_init_io(d->uc, &mmio->iomem, NULL, &subpage_ops, mmio,
|
2015-08-21 07:04:50 +00:00
|
|
|
NULL, TARGET_PAGE_SIZE);
|
|
|
|
mmio->iomem.subpage = true;
|
|
|
|
#if defined(DEBUG_SUBPAGE)
|
|
|
|
printf("%s: %p base " TARGET_FMT_plx " len %08x\n", __func__,
|
|
|
|
mmio, base, TARGET_PAGE_SIZE);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return mmio;
|
|
|
|
}
|
|
|
|
|
2018-03-12 00:57:29 +00:00
|
|
|
static uint16_t dummy_section(PhysPageMap *map, FlatView *fv, MemoryRegion *mr)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
2017-01-19 11:50:28 +00:00
|
|
|
MemoryRegionSection section = MemoryRegionSection_make(
|
2018-03-12 00:57:29 +00:00
|
|
|
mr, fv, 0,
|
2017-01-21 01:28:22 +00:00
|
|
|
int128_2_64(),
|
|
|
|
false,
|
|
|
|
0
|
2017-01-19 11:50:28 +00:00
|
|
|
);
|
2018-03-12 00:57:29 +00:00
|
|
|
|
|
|
|
assert(fv);
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
return phys_section_add(map, §ion);
|
|
|
|
}
|
|
|
|
|
2018-06-15 16:01:23 +00:00
|
|
|
MemoryRegionSection *iotlb_to_section(CPUState *cpu,
|
|
|
|
hwaddr index, MemTxAttrs attrs)
|
|
|
|
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
2018-02-18 04:18:53 +00:00
|
|
|
int asidx = cpu_asidx_from_attrs(cpu, attrs);
|
|
|
|
CPUAddressSpace *cpuas = &cpu->cpu_ases[asidx];
|
2018-02-19 00:26:35 +00:00
|
|
|
// Unicorn: uses atomic_read instead of atomic_rcu_read
|
|
|
|
AddressSpaceDispatch *d = atomic_read(&cpuas->memory_dispatch);
|
2018-02-18 03:50:28 +00:00
|
|
|
MemoryRegionSection *sections = d->map.sections;
|
2018-02-12 20:20:15 +00:00
|
|
|
|
2018-06-15 16:01:23 +00:00
|
|
|
return §ions[index & ~TARGET_PAGE_MASK];
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
2018-03-12 01:34:55 +00:00
|
|
|
AddressSpaceDispatch *address_space_dispatch_new(struct uc_struct *uc, FlatView *fv)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
|
|
|
AddressSpaceDispatch *d = g_new0(AddressSpaceDispatch, 1);
|
|
|
|
uint16_t n;
|
2017-01-21 01:28:22 +00:00
|
|
|
PhysPageEntry ppe = { 1, PHYS_MAP_NODE_NIL };
|
2015-08-21 07:04:50 +00:00
|
|
|
|
2018-03-12 01:34:55 +00:00
|
|
|
d->uc = uc;
|
2018-03-12 00:57:29 +00:00
|
|
|
|
|
|
|
n = dummy_section(&d->map, fv, &uc->io_mem_unassigned);
|
2015-08-21 07:04:50 +00:00
|
|
|
assert(n == PHYS_SECTION_UNASSIGNED);
|
2018-03-12 00:57:29 +00:00
|
|
|
n = dummy_section(&d->map, fv, &uc->io_mem_notdirty);
|
2015-08-21 07:04:50 +00:00
|
|
|
assert(n == PHYS_SECTION_NOTDIRTY);
|
2018-03-12 00:57:29 +00:00
|
|
|
n = dummy_section(&d->map, fv, &uc->io_mem_rom);
|
2015-08-21 07:04:50 +00:00
|
|
|
assert(n == PHYS_SECTION_ROM);
|
2018-03-12 00:57:29 +00:00
|
|
|
// n = dummy_section(&d->map, fv, &uc->io_mem_watch);
|
2015-08-21 07:04:50 +00:00
|
|
|
// assert(n == PHYS_SECTION_WATCH);
|
|
|
|
|
2017-01-19 11:50:28 +00:00
|
|
|
d->phys_map = ppe;
|
2018-03-12 00:33:08 +00:00
|
|
|
|
|
|
|
return d;
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
2018-03-12 00:33:08 +00:00
|
|
|
void address_space_dispatch_free(AddressSpaceDispatch *d)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
2018-03-12 00:33:08 +00:00
|
|
|
phys_sections_free(&d->map);
|
|
|
|
g_free(d);
|
|
|
|
}
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
static void tcg_commit(MemoryListener *listener)
|
|
|
|
{
|
2018-02-18 03:50:28 +00:00
|
|
|
CPUAddressSpace *cpuas;
|
|
|
|
AddressSpaceDispatch *d;
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
/* since each CPU stores ram addresses in its TLB cache, we must
|
|
|
|
reset the modified entries */
|
2018-02-18 03:50:28 +00:00
|
|
|
cpuas = container_of(listener, CPUAddressSpace, tcg_as_listener);
|
|
|
|
|
|
|
|
/* The CPU and TLB are protected by the iothread lock.
|
|
|
|
* We reload the dispatch pointer now because cpu_reloading_memory_map()
|
|
|
|
* may have split the RCU critical section.
|
|
|
|
*/
|
2018-03-12 00:33:08 +00:00
|
|
|
d = address_space_to_dispatch(cpuas->as);
|
2018-03-01 13:44:12 +00:00
|
|
|
// Unicorn: atomic_set used instead of atomic_rcu_set
|
|
|
|
atomic_set(&cpuas->memory_dispatch, d);
|
2018-03-02 00:35:21 +00:00
|
|
|
tlb_flush(cpuas->cpu);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void memory_map_init(struct uc_struct *uc)
|
|
|
|
{
|
|
|
|
uc->system_memory = g_malloc(sizeof(*(uc->system_memory)));
|
|
|
|
|
|
|
|
memory_region_init(uc, uc->system_memory, NULL, "system", UINT64_MAX);
|
|
|
|
address_space_init(uc, &uc->as, uc->system_memory, "memory");
|
|
|
|
}
|
|
|
|
|
|
|
|
void cpu_exec_init_all(struct uc_struct *uc)
|
|
|
|
{
|
2018-02-26 16:54:41 +00:00
|
|
|
/* The data structures we set up here depend on knowing the page size,
|
|
|
|
* so no more changes can be made after this point.
|
|
|
|
* In an ideal world, nothing we did before we had finished the
|
|
|
|
* machine setup would care about the target page size, and we could
|
|
|
|
* do this much later, rather than requiring board models to state
|
|
|
|
* up front what their requirements are.
|
|
|
|
*/
|
|
|
|
finalize_target_page_bits(uc);
|
2018-02-17 20:01:05 +00:00
|
|
|
io_mem_init(uc);
|
2015-08-21 07:04:50 +00:00
|
|
|
#if !defined(CONFIG_USER_ONLY)
|
|
|
|
memory_map_init(uc);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
MemoryRegion *get_system_memory(struct uc_struct *uc)
|
|
|
|
{
|
|
|
|
return uc->system_memory;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* !defined(CONFIG_USER_ONLY) */
|
|
|
|
|
|
|
|
/* physical memory access (slow version, mainly for debug) */
|
|
|
|
#if defined(CONFIG_USER_ONLY)
|
|
|
|
int cpu_memory_rw_debug(CPUState *cpu, target_ulong addr,
|
|
|
|
uint8_t *buf, int len, int is_write)
|
|
|
|
{
|
|
|
|
int l, flags;
|
|
|
|
target_ulong page;
|
|
|
|
void * p;
|
|
|
|
|
|
|
|
while (len > 0) {
|
|
|
|
page = addr & TARGET_PAGE_MASK;
|
|
|
|
l = (page + TARGET_PAGE_SIZE) - addr;
|
|
|
|
if (l > len)
|
|
|
|
l = len;
|
|
|
|
flags = page_get_flags(page);
|
|
|
|
if (!(flags & PAGE_VALID))
|
|
|
|
return -1;
|
|
|
|
if (is_write) {
|
|
|
|
if (!(flags & PAGE_WRITE))
|
|
|
|
return -1;
|
|
|
|
/* XXX: this code should not depend on lock_user */
|
|
|
|
if (!(p = lock_user(VERIFY_WRITE, addr, l, 0)))
|
|
|
|
return -1;
|
|
|
|
memcpy(p, buf, l);
|
|
|
|
unlock_user(p, addr, l);
|
|
|
|
} else {
|
|
|
|
if (!(flags & PAGE_READ))
|
|
|
|
return -1;
|
|
|
|
/* XXX: this code should not depend on lock_user */
|
|
|
|
if (!(p = lock_user(VERIFY_READ, addr, l, 1)))
|
|
|
|
return -1;
|
|
|
|
memcpy(buf, p, l);
|
|
|
|
unlock_user(p, addr, 0);
|
|
|
|
}
|
|
|
|
len -= l;
|
|
|
|
buf += l;
|
|
|
|
addr += l;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#else
|
|
|
|
|
|
|
|
static int memory_access_size(MemoryRegion *mr, unsigned l, hwaddr addr)
|
|
|
|
{
|
|
|
|
unsigned access_size_max = mr->ops->valid.max_access_size;
|
|
|
|
|
|
|
|
/* Regions are assumed to support 1-4 byte accesses unless
|
|
|
|
otherwise specified. */
|
|
|
|
if (access_size_max == 0) {
|
|
|
|
access_size_max = 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Bound the maximum access by the alignment of the address. */
|
|
|
|
if (!mr->ops->impl.unaligned) {
|
2017-01-19 11:50:28 +00:00
|
|
|
unsigned align_size_max = addr & (0-addr);
|
2015-08-21 07:04:50 +00:00
|
|
|
if (align_size_max != 0 && align_size_max < access_size_max) {
|
|
|
|
access_size_max = align_size_max;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Don't attempt accesses larger than the maximum. */
|
|
|
|
if (l > access_size_max) {
|
|
|
|
l = access_size_max;
|
|
|
|
}
|
2018-02-15 16:09:26 +00:00
|
|
|
l = pow2floor(l);
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
return l;
|
|
|
|
}
|
|
|
|
|
2018-03-12 00:57:29 +00:00
|
|
|
static MemTxResult flatview_write_continue(FlatView *fv, hwaddr addr,
|
|
|
|
MemTxAttrs attrs,
|
|
|
|
const uint8_t *buf,
|
|
|
|
int len, hwaddr addr1,
|
|
|
|
hwaddr l, MemoryRegion *mr)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
|
|
|
uint8_t *ptr;
|
|
|
|
uint64_t val;
|
2018-02-12 22:26:24 +00:00
|
|
|
MemTxResult result = MEMTX_OK;
|
2018-02-18 01:14:23 +00:00
|
|
|
// Unicorn: commented out
|
|
|
|
//bool release_lock = false;
|
2015-08-21 07:04:50 +00:00
|
|
|
|
2018-02-18 01:28:47 +00:00
|
|
|
for (;;) {
|
2015-08-21 07:04:50 +00:00
|
|
|
if (!mr)
|
|
|
|
return true;
|
|
|
|
|
2018-02-18 01:14:23 +00:00
|
|
|
if (!memory_access_is_direct(mr, true)) {
|
|
|
|
// Unicorn: commented out
|
|
|
|
//release_lock |= prepare_mmio_access(mr);
|
|
|
|
l = memory_access_size(mr, l, addr1);
|
|
|
|
/* XXX: could force current_cpu to NULL to avoid
|
|
|
|
potential bugs */
|
2018-06-15 16:20:58 +00:00
|
|
|
val = ldn_p(buf, l);
|
|
|
|
result |= memory_region_dispatch_write(mr, addr1, val, l, attrs);
|
2015-08-21 07:04:50 +00:00
|
|
|
} else {
|
2018-02-18 01:14:23 +00:00
|
|
|
/* RAM case */
|
2018-02-24 21:10:07 +00:00
|
|
|
ptr = qemu_map_ram_ptr(mr->uc, mr->ram_block, addr1);
|
2018-02-18 01:14:23 +00:00
|
|
|
memcpy(ptr, buf, l);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
2018-02-18 01:14:23 +00:00
|
|
|
|
|
|
|
/* Unicorn: commented out
|
|
|
|
if (release_lock) {
|
|
|
|
qemu_mutex_unlock_iothread();
|
|
|
|
release_lock = false;
|
|
|
|
}*/
|
|
|
|
|
2015-08-21 07:04:50 +00:00
|
|
|
len -= l;
|
|
|
|
buf += l;
|
|
|
|
addr += l;
|
2018-02-18 01:28:47 +00:00
|
|
|
|
|
|
|
if (!len) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
l = len;
|
2018-03-12 00:57:29 +00:00
|
|
|
mr = flatview_translate(fv, addr, &addr1, &l, true);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
2018-02-18 01:14:23 +00:00
|
|
|
// Unicorn: commented out
|
|
|
|
//rcu_read_unlock();
|
2015-08-21 07:04:50 +00:00
|
|
|
|
2018-02-12 22:26:24 +00:00
|
|
|
return result;
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
2018-03-12 00:57:29 +00:00
|
|
|
static MemTxResult flatview_write(FlatView *fv, hwaddr addr, MemTxAttrs attrs,
|
|
|
|
const uint8_t *buf, int len)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
2018-02-18 01:14:23 +00:00
|
|
|
hwaddr l;
|
|
|
|
hwaddr addr1;
|
|
|
|
MemoryRegion *mr;
|
|
|
|
MemTxResult result = MEMTX_OK;
|
|
|
|
|
2018-02-18 01:28:47 +00:00
|
|
|
if (len > 0) {
|
|
|
|
// Unicorn: commented out
|
|
|
|
//rcu_read_lock();
|
2018-02-18 01:14:23 +00:00
|
|
|
l = len;
|
2018-03-12 00:57:29 +00:00
|
|
|
mr = flatview_translate(fv, addr, &addr1, &l, true);
|
|
|
|
result = flatview_write_continue(fv, addr, attrs, buf, len,
|
|
|
|
addr1, l, mr);
|
2018-02-18 01:28:47 +00:00
|
|
|
// Unicorn: commented out
|
|
|
|
//rcu_read_unlock();
|
|
|
|
}
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2018-03-12 00:57:29 +00:00
|
|
|
MemTxResult address_space_write(AddressSpace *as, hwaddr addr,
|
|
|
|
MemTxAttrs attrs,
|
|
|
|
const uint8_t *buf, int len)
|
|
|
|
{
|
|
|
|
return flatview_write(address_space_to_flatview(as), addr, attrs, buf, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
MemTxResult flatview_read_continue(FlatView *fv, hwaddr addr,
|
|
|
|
MemTxAttrs attrs, uint8_t *buf,
|
|
|
|
int len, hwaddr addr1, hwaddr l,
|
|
|
|
MemoryRegion *mr)
|
2018-02-18 01:28:47 +00:00
|
|
|
{
|
|
|
|
uint8_t *ptr;
|
|
|
|
uint64_t val;
|
|
|
|
MemTxResult result = MEMTX_OK;
|
|
|
|
// Unicorn: commented out
|
|
|
|
//bool release_lock = false;
|
2018-02-18 01:14:23 +00:00
|
|
|
|
2018-02-18 01:28:47 +00:00
|
|
|
for (;;) {
|
2018-02-18 01:14:23 +00:00
|
|
|
if (!memory_access_is_direct(mr, false)) {
|
|
|
|
/* I/O case */
|
|
|
|
// Unicorn: commented out
|
|
|
|
//release_lock |= prepare_mmio_access(mr);
|
|
|
|
l = memory_access_size(mr, l, addr1);
|
2018-06-15 16:20:58 +00:00
|
|
|
result |= memory_region_dispatch_read(mr, addr1, &val, l, attrs);
|
|
|
|
stn_p(buf, l, val);
|
2018-02-18 01:14:23 +00:00
|
|
|
} else {
|
|
|
|
/* RAM case */
|
2018-02-24 21:10:07 +00:00
|
|
|
ptr = qemu_map_ram_ptr(mr->uc, mr->ram_block, addr1);
|
2018-02-18 01:14:23 +00:00
|
|
|
memcpy(buf, ptr, l);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Unicorn: Commented out
|
|
|
|
if (release_lock) {
|
|
|
|
qemu_mutex_unlock_iothread();
|
|
|
|
release_lock = false;
|
|
|
|
}*/
|
|
|
|
|
|
|
|
len -= l;
|
|
|
|
buf += l;
|
|
|
|
addr += l;
|
2018-02-18 01:28:47 +00:00
|
|
|
|
|
|
|
if (!len) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
l = len;
|
2018-03-12 00:57:29 +00:00
|
|
|
mr = flatview_translate(fv, addr, &addr1, &l, false);
|
2018-02-18 01:14:23 +00:00
|
|
|
}
|
|
|
|
|
2018-02-18 01:28:47 +00:00
|
|
|
return result;
|
|
|
|
}
|
2018-02-18 01:14:23 +00:00
|
|
|
|
2018-03-12 00:57:29 +00:00
|
|
|
MemTxResult flatview_read_full(FlatView *fv, hwaddr addr,
|
|
|
|
MemTxAttrs attrs, uint8_t *buf, int len)
|
2018-02-18 01:28:47 +00:00
|
|
|
{
|
|
|
|
hwaddr l;
|
|
|
|
hwaddr addr1;
|
|
|
|
MemoryRegion *mr;
|
|
|
|
MemTxResult result = MEMTX_OK;
|
|
|
|
|
|
|
|
if (len > 0) {
|
|
|
|
// Unicorn: commented out
|
|
|
|
//rcu_read_lock();
|
|
|
|
l = len;
|
2018-03-12 00:57:29 +00:00
|
|
|
mr = flatview_translate(fv, addr, &addr1, &l, false);
|
|
|
|
result = flatview_read_continue(fv, addr, attrs, buf, len,
|
|
|
|
addr1, l, mr);
|
2018-02-18 01:28:47 +00:00
|
|
|
// Unicorn: commented out
|
|
|
|
//rcu_read_unlock();
|
|
|
|
}
|
2018-02-18 01:14:23 +00:00
|
|
|
return result;
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
2018-03-12 00:57:29 +00:00
|
|
|
static MemTxResult flatview_rw(FlatView *fv, hwaddr addr, MemTxAttrs attrs,
|
|
|
|
uint8_t *buf, int len, bool is_write)
|
2018-02-18 01:14:23 +00:00
|
|
|
{
|
|
|
|
if (is_write) {
|
2018-03-12 00:57:29 +00:00
|
|
|
return flatview_write(fv, addr, attrs, (uint8_t *)buf, len);
|
2018-02-18 01:14:23 +00:00
|
|
|
} else {
|
2018-03-12 00:57:29 +00:00
|
|
|
return flatview_read(fv, addr, attrs, (uint8_t *)buf, len);
|
2018-02-18 01:14:23 +00:00
|
|
|
}
|
|
|
|
}
|
2015-08-21 07:04:50 +00:00
|
|
|
|
2018-03-12 00:57:29 +00:00
|
|
|
MemTxResult address_space_rw(AddressSpace *as, hwaddr addr,
|
|
|
|
MemTxAttrs attrs, uint8_t *buf,
|
|
|
|
int len, bool is_write)
|
|
|
|
{
|
|
|
|
return flatview_rw(address_space_to_flatview(as),
|
|
|
|
addr, attrs, buf, len, is_write);
|
|
|
|
}
|
|
|
|
|
2015-08-21 07:04:50 +00:00
|
|
|
bool cpu_physical_memory_rw(AddressSpace *as, hwaddr addr, uint8_t *buf,
|
2018-02-12 23:56:13 +00:00
|
|
|
int len, int is_write)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
2018-02-12 23:56:13 +00:00
|
|
|
return address_space_rw(as, addr, MEMTXATTRS_UNSPECIFIED,
|
|
|
|
buf, len, is_write) == MEMTX_OK;
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
enum write_rom_type {
|
|
|
|
WRITE_DATA,
|
|
|
|
FLUSH_CACHE,
|
|
|
|
};
|
|
|
|
|
|
|
|
static inline void cpu_physical_memory_write_rom_internal(AddressSpace *as,
|
|
|
|
hwaddr addr, const uint8_t *buf, int len, enum write_rom_type type)
|
|
|
|
{
|
|
|
|
hwaddr l;
|
|
|
|
uint8_t *ptr;
|
|
|
|
hwaddr addr1;
|
|
|
|
MemoryRegion *mr;
|
|
|
|
|
|
|
|
while (len > 0) {
|
|
|
|
l = len;
|
|
|
|
mr = address_space_translate(as, addr, &addr1, &l, true);
|
|
|
|
|
|
|
|
if (!(memory_region_is_ram(mr) ||
|
exec: skip MMIO regions correctly in cpu_physical_memory_write_rom_internal
Loading the BIOS in the mac99 machine is interesting, because there is a
PROM in the middle of the BIOS region (from 16K to 32K). Before memory
region accesses were clamped, when QEMU was asked to load a BIOS from
0xfff00000 to 0xffffffff it would put even those 16K from the BIOS file
into the region. This is weird because those 16K were not actually
visible between 0xfff04000 and 0xfff07fff. However, it worked.
After clamping was added, this also worked. In this case, the
cpu_physical_memory_write_rom_internal function split the write in
three parts: the first 16K were copied, the PROM area (second 16K) were
ignored, then the rest was copied.
Problems then started with commit 965eb2f (exec: do not clamp accesses
to MMIO regions, 2015-06-17). Clamping accesses is not done for MMIO
regions because they can overlap wildly, and MMIO registers can be
expected to perform full-width accesses based only on their address
(with no respect for adjacent registers that could decode to completely
different MemoryRegions). However, this lack of clamping also applied
to the PROM area! cpu_physical_memory_write_rom_internal thus failed
to copy the third range above, i.e. only copied the first 16K of the BIOS.
In effect, address_space_translate is expecting _something else_ to do
the clamping for MMIO regions if the incoming length is large. This
"something else" is memory_access_size in the case of address_space_rw,
so use the same logic in cpu_physical_memory_write_rom_internal.
Backports commit b242e0e0e2969c044a318e56f7988bbd84de1f63 from qemu
2018-02-14 13:44:27 +00:00
|
|
|
memory_region_is_romd(mr))) {
|
|
|
|
l = memory_access_size(mr, l, addr1);
|
2015-08-21 07:04:50 +00:00
|
|
|
} else {
|
|
|
|
/* ROM/RAM case */
|
2018-02-24 21:10:07 +00:00
|
|
|
ptr = qemu_map_ram_ptr(mr->uc, mr->ram_block, addr1);
|
2015-08-21 07:04:50 +00:00
|
|
|
switch (type) {
|
|
|
|
case WRITE_DATA:
|
|
|
|
memcpy(ptr, buf, l);
|
|
|
|
break;
|
|
|
|
case FLUSH_CACHE:
|
|
|
|
flush_icache_range((uintptr_t)ptr, (uintptr_t)ptr + l);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
len -= l;
|
|
|
|
buf += l;
|
|
|
|
addr += l;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* used for ROM loading : can write in RAM and ROM */
|
2017-01-19 11:50:28 +00:00
|
|
|
DEFAULT_VISIBILITY
|
2015-08-21 07:04:50 +00:00
|
|
|
void cpu_physical_memory_write_rom(AddressSpace *as, hwaddr addr,
|
|
|
|
const uint8_t *buf, int len)
|
|
|
|
{
|
|
|
|
cpu_physical_memory_write_rom_internal(as, addr, buf, len, WRITE_DATA);
|
|
|
|
}
|
|
|
|
|
|
|
|
void cpu_flush_icache_range(AddressSpace *as, hwaddr start, int len)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* This function should do the same thing as an icache flush that was
|
|
|
|
* triggered from within the guest. For TCG we are always cache coherent,
|
|
|
|
* so there is no need to flush anything. For KVM / Xen we need to flush
|
|
|
|
* the host's instruction cache at least.
|
|
|
|
*/
|
|
|
|
if (tcg_enabled(as->uc)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
cpu_physical_memory_write_rom_internal(as,
|
|
|
|
start, NULL, len, FLUSH_CACHE);
|
|
|
|
}
|
|
|
|
|
2018-03-12 00:57:29 +00:00
|
|
|
static bool flatview_access_valid(FlatView *fv, hwaddr addr, int len,
|
|
|
|
bool is_write)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
|
|
|
MemoryRegion *mr;
|
|
|
|
hwaddr l, xlat;
|
|
|
|
|
|
|
|
while (len > 0) {
|
|
|
|
l = len;
|
2018-03-12 00:57:29 +00:00
|
|
|
mr = flatview_translate(fv, addr, &xlat, &l, is_write);
|
2015-08-21 07:04:50 +00:00
|
|
|
if (!memory_access_is_direct(mr, is_write)) {
|
|
|
|
l = memory_access_size(mr, l, addr);
|
|
|
|
if (!memory_region_access_valid(mr, xlat, l, is_write)) {
|
2018-03-01 14:12:20 +00:00
|
|
|
// Unicorn: commented out
|
|
|
|
//rcu_read_unlock();
|
2015-08-21 07:04:50 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
len -= l;
|
|
|
|
addr += l;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-03-12 00:57:29 +00:00
|
|
|
bool address_space_access_valid(AddressSpace *as, hwaddr addr,
|
|
|
|
int len, bool is_write)
|
|
|
|
{
|
|
|
|
return flatview_access_valid(address_space_to_flatview(as),
|
|
|
|
addr, len, is_write);
|
|
|
|
}
|
|
|
|
|
2018-03-01 15:04:52 +00:00
|
|
|
static hwaddr
|
2018-03-12 00:57:29 +00:00
|
|
|
flatview_extend_translation(FlatView *fv, hwaddr addr,
|
|
|
|
hwaddr target_len,
|
|
|
|
MemoryRegion *mr, hwaddr base, hwaddr len,
|
|
|
|
bool is_write)
|
2018-03-01 15:04:52 +00:00
|
|
|
{
|
|
|
|
hwaddr done = 0;
|
|
|
|
hwaddr xlat;
|
|
|
|
MemoryRegion *this_mr;
|
|
|
|
|
|
|
|
for (;;) {
|
|
|
|
target_len -= len;
|
|
|
|
addr += len;
|
|
|
|
done += len;
|
|
|
|
if (target_len == 0) {
|
|
|
|
return done;
|
|
|
|
}
|
|
|
|
|
|
|
|
len = target_len;
|
2018-03-12 00:57:29 +00:00
|
|
|
this_mr = flatview_translate(fv, addr, &xlat,
|
|
|
|
&len, is_write);
|
2018-03-01 15:04:52 +00:00
|
|
|
if (this_mr != mr || xlat != base + done) {
|
|
|
|
return done;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-21 07:04:50 +00:00
|
|
|
/* Map a physical memory region into a host virtual address.
|
|
|
|
* May map a subset of the requested range, given by and returned in *plen.
|
|
|
|
* May return NULL if resources needed to perform the mapping are exhausted.
|
|
|
|
* Use only for reads OR writes - not for read-modify-write operations.
|
|
|
|
* Use cpu_register_map_client() to know when retrying the map operation is
|
|
|
|
* likely to succeed.
|
|
|
|
*/
|
|
|
|
void *address_space_map(AddressSpace *as,
|
2018-03-01 15:04:52 +00:00
|
|
|
hwaddr addr,
|
|
|
|
hwaddr *plen,
|
|
|
|
bool is_write)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
|
|
|
hwaddr len = *plen;
|
2018-03-01 15:04:52 +00:00
|
|
|
hwaddr l, xlat;
|
|
|
|
MemoryRegion *mr;
|
|
|
|
void *ptr;
|
2018-03-12 00:57:29 +00:00
|
|
|
FlatView *fv = address_space_to_flatview(as);
|
2015-08-21 07:04:50 +00:00
|
|
|
|
|
|
|
if (len == 0) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
l = len;
|
2018-03-12 00:57:29 +00:00
|
|
|
mr = flatview_translate(fv, addr, &xlat, &l, is_write);
|
2015-08-21 07:04:50 +00:00
|
|
|
if (!memory_access_is_direct(mr, is_write)) {
|
2018-02-13 01:59:51 +00:00
|
|
|
if (atomic_xchg(&as->uc->bounce.in_use, true)) {
|
2015-08-21 07:04:50 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
/* Avoid unbounded allocations */
|
|
|
|
l = MIN(l, TARGET_PAGE_SIZE);
|
|
|
|
as->uc->bounce.buffer = qemu_memalign(TARGET_PAGE_SIZE, l);
|
|
|
|
as->uc->bounce.addr = addr;
|
|
|
|
as->uc->bounce.len = l;
|
|
|
|
|
|
|
|
memory_region_ref(mr);
|
|
|
|
as->uc->bounce.mr = mr;
|
|
|
|
if (!is_write) {
|
2018-03-12 00:57:29 +00:00
|
|
|
flatview_read(fv, addr, MEMTXATTRS_UNSPECIFIED,
|
|
|
|
as->uc->bounce.buffer, l);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
*plen = l;
|
|
|
|
return as->uc->bounce.buffer;
|
|
|
|
}
|
|
|
|
|
|
|
|
memory_region_ref(mr);
|
2018-03-12 00:57:29 +00:00
|
|
|
*plen = flatview_extend_translation(fv, addr, len, mr, xlat,
|
|
|
|
l, is_write);
|
exec: Add lock parameter to qemu_ram_ptr_length
Commit 04bf2526ce87f21b32c9acba1c5518708c243ad0 (exec: use
qemu_ram_ptr_length to access guest ram) start using qemu_ram_ptr_length
instead of qemu_map_ram_ptr, but when used with Xen, the behavior of
both function is different. They both call xen_map_cache, but one with
"lock", meaning the mapping of guest memory is never released
implicitly, and the second one without, which means, mapping can be
release later, when needed.
In the context of address_space_{read,write}_continue, the ptr to those
mapping should not be locked because it is used immediatly and never
used again.
The lock parameter make it explicit in which context qemu_ram_ptr_length
is called.
Backports commit f5aa69bdc3418773f26747ca282c291519626ece from qemu
2018-03-04 06:23:04 +00:00
|
|
|
ptr = qemu_ram_ptr_length(mr->uc, mr->ram_block, xlat, plen, true);
|
2018-03-01 15:04:52 +00:00
|
|
|
return ptr;
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Unmaps a memory region previously mapped by address_space_map().
|
|
|
|
* Will also mark the memory as dirty if is_write == 1. access_len gives
|
|
|
|
* the amount of memory that was actually read or written by the caller.
|
|
|
|
*/
|
|
|
|
void address_space_unmap(AddressSpace *as, void *buffer, hwaddr len,
|
|
|
|
int is_write, hwaddr access_len)
|
|
|
|
{
|
|
|
|
if (buffer != as->uc->bounce.buffer) {
|
|
|
|
MemoryRegion *mr;
|
|
|
|
ram_addr_t addr1;
|
|
|
|
|
2018-02-24 20:52:04 +00:00
|
|
|
mr = memory_region_from_host(as->uc, buffer, &addr1);
|
2015-08-21 07:04:50 +00:00
|
|
|
assert(mr != NULL);
|
|
|
|
memory_region_unref(mr);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (is_write) {
|
2018-02-12 23:56:13 +00:00
|
|
|
address_space_write(as, as->uc->bounce.addr, MEMTXATTRS_UNSPECIFIED,
|
|
|
|
as->uc->bounce.buffer, access_len);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
qemu_vfree(as->uc->bounce.buffer);
|
|
|
|
as->uc->bounce.buffer = NULL;
|
|
|
|
memory_region_unref(as->uc->bounce.mr);
|
2018-02-13 01:59:51 +00:00
|
|
|
atomic_mb_set(&as->uc->bounce.in_use, false);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void *cpu_physical_memory_map(AddressSpace *as, hwaddr addr,
|
|
|
|
hwaddr *plen,
|
|
|
|
int is_write)
|
|
|
|
{
|
|
|
|
return address_space_map(as, addr, plen, is_write);
|
|
|
|
}
|
|
|
|
|
|
|
|
void cpu_physical_memory_unmap(AddressSpace *as, void *buffer, hwaddr len,
|
|
|
|
int is_write, hwaddr access_len)
|
|
|
|
{
|
2017-01-19 11:50:28 +00:00
|
|
|
address_space_unmap(as, buffer, len, is_write, access_len);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
|
2018-03-01 14:49:15 +00:00
|
|
|
#define ARG1_DECL AddressSpace *as
|
|
|
|
#define ARG1 as
|
|
|
|
#define SUFFIX
|
|
|
|
#define TRANSLATE(...) address_space_translate(as, __VA_ARGS__)
|
2018-03-12 12:22:06 +00:00
|
|
|
#define INVALIDATE(mr, ofs, len)
|
2018-03-01 14:49:15 +00:00
|
|
|
#define RCU_READ_LOCK(...) rcu_read_lock()
|
|
|
|
#define RCU_READ_UNLOCK(...) rcu_read_unlock()
|
|
|
|
#include "memory_ldst.inc.c"
|
2015-08-21 07:04:50 +00:00
|
|
|
|
2018-03-01 15:10:15 +00:00
|
|
|
int64_t address_space_cache_init(MemoryRegionCache *cache,
|
|
|
|
AddressSpace *as,
|
|
|
|
hwaddr addr,
|
|
|
|
hwaddr len,
|
|
|
|
bool is_write)
|
|
|
|
{
|
2018-03-02 19:29:40 +00:00
|
|
|
cache->len = len;
|
|
|
|
cache->as = as;
|
|
|
|
cache->xlat = addr;
|
|
|
|
return len;
|
2018-03-01 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void address_space_cache_invalidate(MemoryRegionCache *cache,
|
|
|
|
hwaddr addr,
|
|
|
|
hwaddr access_len)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
void address_space_cache_destroy(MemoryRegionCache *cache)
|
|
|
|
{
|
|
|
|
// Unicorn: If'd out
|
|
|
|
#if 0
|
|
|
|
if (xen_enabled()) {
|
|
|
|
xen_invalidate_map_cache_entry(cache->ptr);
|
|
|
|
}
|
|
|
|
#endif
|
2018-03-02 19:29:40 +00:00
|
|
|
cache->as = NULL;
|
2018-03-01 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Unicorn: Necessary due to the fantastic way duplicate
|
|
|
|
// symbol errors are avoided.
|
|
|
|
// When appending the "_cache" suffix, the preprocessor
|
|
|
|
// replaces the names in the glue macros with the target's
|
|
|
|
// equivalent, resulting in names like "address_space_ldl_be_aarch64_cached"
|
|
|
|
// which is incorrect. Therefore undef all the offending macros beforehand.
|
|
|
|
#undef address_space_ldl
|
|
|
|
#undef address_space_ldl_be
|
|
|
|
#undef address_space_ldl_le
|
|
|
|
#undef address_space_ldq
|
|
|
|
#undef address_space_ldq_be
|
|
|
|
#undef address_space_ldq_le
|
|
|
|
#undef address_space_ldub
|
|
|
|
#undef address_space_lduw
|
|
|
|
#undef address_space_lduw_be
|
|
|
|
#undef address_space_lduw_le
|
|
|
|
#undef address_space_stb
|
|
|
|
#undef address_space_stl
|
|
|
|
#undef address_space_stl_be
|
|
|
|
#undef address_space_stl_le
|
|
|
|
#undef address_space_stl_notdirty
|
|
|
|
#undef address_space_stq
|
|
|
|
#undef address_space_stq_be
|
|
|
|
#undef address_space_stq_le
|
|
|
|
#undef address_space_stw
|
|
|
|
#undef address_space_stw_be
|
|
|
|
#undef address_space_stw_le
|
|
|
|
#undef ldl_be_phys
|
|
|
|
#undef ldl_le_phys
|
|
|
|
#undef ldl_phys
|
|
|
|
#undef ldq_be_phys
|
|
|
|
#undef ldq_le_phys
|
|
|
|
#undef ldq_phys
|
|
|
|
#undef ldub_phys
|
|
|
|
#undef lduw_be_phys
|
|
|
|
#undef lduw_le_phys
|
|
|
|
#undef lduw_phys
|
|
|
|
#undef stb_phys
|
|
|
|
#undef stl_be_phys
|
|
|
|
#undef stl_le_phys
|
|
|
|
#undef stl_phys
|
|
|
|
#undef stl_phys_notdirty
|
|
|
|
#undef stq_be_phys
|
|
|
|
#undef stq_le_phys
|
|
|
|
#undef stq_phys
|
|
|
|
#undef stw_be_phys
|
|
|
|
#undef stw_le_phys
|
|
|
|
#undef stw_phys
|
|
|
|
|
|
|
|
#define ARG1_DECL MemoryRegionCache *cache
|
|
|
|
#define ARG1 cache
|
|
|
|
#define SUFFIX _cached
|
2018-03-02 19:29:40 +00:00
|
|
|
#define TRANSLATE(addr, ...) \
|
|
|
|
address_space_translate(cache->as, cache->xlat + (addr), __VA_ARGS__)
|
2018-03-01 15:10:15 +00:00
|
|
|
#define IS_DIRECT(mr, is_write) true
|
2018-03-02 19:29:40 +00:00
|
|
|
#define MAP_RAM(mr, ofs) qemu_map_ram_ptr((mr)->uc, (mr)->ram_block, ofs)
|
2018-03-12 12:22:06 +00:00
|
|
|
#define INVALIDATE(mr, ofs, len)
|
2018-03-02 19:29:40 +00:00
|
|
|
#define RCU_READ_LOCK() //rcu_read_lock()
|
|
|
|
#define RCU_READ_UNLOCK() //rcu_read_unlock()
|
2018-03-01 15:10:15 +00:00
|
|
|
#include "memory_ldst.inc.c"
|
|
|
|
|
2015-08-21 07:04:50 +00:00
|
|
|
/* virtual memory access for debug (includes writing to ROM) */
|
|
|
|
int cpu_memory_rw_debug(CPUState *cpu, target_ulong addr,
|
|
|
|
uint8_t *buf, int len, int is_write)
|
|
|
|
{
|
|
|
|
int l;
|
|
|
|
hwaddr phys_addr;
|
|
|
|
target_ulong page;
|
|
|
|
|
|
|
|
while (len > 0) {
|
2018-02-18 04:24:18 +00:00
|
|
|
int asidx;
|
|
|
|
MemTxAttrs attrs;
|
|
|
|
|
2015-08-21 07:04:50 +00:00
|
|
|
page = addr & TARGET_PAGE_MASK;
|
2018-02-18 04:24:18 +00:00
|
|
|
phys_addr = cpu_get_phys_page_attrs_debug(cpu, page, &attrs);
|
|
|
|
asidx = cpu_asidx_from_attrs(cpu, attrs);
|
2015-08-21 07:04:50 +00:00
|
|
|
/* if no physical page mapped, return an error */
|
|
|
|
if (phys_addr == -1)
|
|
|
|
return -1;
|
|
|
|
l = (page + TARGET_PAGE_SIZE) - addr;
|
|
|
|
if (l > len)
|
|
|
|
l = len;
|
|
|
|
phys_addr += (addr & ~TARGET_PAGE_MASK);
|
|
|
|
if (is_write) {
|
2018-02-18 04:24:18 +00:00
|
|
|
cpu_physical_memory_write_rom(cpu->cpu_ases[asidx].as,
|
|
|
|
phys_addr, buf, l);
|
2015-08-21 07:04:50 +00:00
|
|
|
} else {
|
2018-02-18 04:24:18 +00:00
|
|
|
address_space_rw(cpu->cpu_ases[asidx].as, phys_addr,
|
2019-01-29 22:05:38 +00:00
|
|
|
attrs, buf, l, 0);
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
len -= l;
|
|
|
|
buf += l;
|
|
|
|
addr += l;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* A helper function for the _utterly broken_ virtio device model to find out if
|
|
|
|
* it's running on a big endian machine. Don't do this at home kids!
|
|
|
|
*/
|
|
|
|
bool target_words_bigendian(void);
|
|
|
|
bool target_words_bigendian(void)
|
|
|
|
{
|
|
|
|
#if defined(TARGET_WORDS_BIGENDIAN)
|
|
|
|
return true;
|
|
|
|
#else
|
|
|
|
return false;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef CONFIG_USER_ONLY
|
|
|
|
bool cpu_physical_memory_is_io(AddressSpace *as, hwaddr phys_addr)
|
|
|
|
{
|
|
|
|
MemoryRegion*mr;
|
|
|
|
hwaddr l = 1;
|
|
|
|
|
|
|
|
mr = address_space_translate(as, phys_addr, &phys_addr, &l, false);
|
|
|
|
|
|
|
|
return !(memory_region_is_ram(mr) ||
|
|
|
|
memory_region_is_romd(mr));
|
|
|
|
}
|
|
|
|
|
2018-02-19 00:16:52 +00:00
|
|
|
int qemu_ram_foreach_block(struct uc_struct *uc, RAMBlockIterFunc func, void *opaque)
|
2015-08-21 07:04:50 +00:00
|
|
|
{
|
|
|
|
RAMBlock *block;
|
2018-02-19 00:16:52 +00:00
|
|
|
int ret = 0;
|
2015-08-21 07:04:50 +00:00
|
|
|
|
2018-02-19 00:16:52 +00:00
|
|
|
// Unicorn: commented out
|
|
|
|
//rcu_read_lock();
|
2018-02-18 23:37:38 +00:00
|
|
|
QLIST_FOREACH(block, &uc->ram_list.blocks, next) {
|
2018-02-19 00:16:52 +00:00
|
|
|
ret = func(block->idstr, block->host, block->offset,
|
|
|
|
block->used_length, opaque);
|
|
|
|
if (ret) {
|
|
|
|
break;
|
|
|
|
}
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
2018-02-19 00:16:52 +00:00
|
|
|
// Unicorn: commented out
|
|
|
|
//rcu_read_unlock();
|
|
|
|
return ret;
|
2015-08-21 07:04:50 +00:00
|
|
|
}
|
|
|
|
#endif
|
2018-03-04 02:26:06 +00:00
|
|
|
|
|
|
|
void page_size_init(struct uc_struct *uc)
|
|
|
|
{
|
|
|
|
/* NOTE: we can always suppose that qemu_host_page_size >=
|
|
|
|
TARGET_PAGE_SIZE */
|
|
|
|
uc->qemu_real_host_page_size = getpagesize();
|
|
|
|
uc->qemu_real_host_page_mask = -(intptr_t)uc->qemu_real_host_page_size;
|
|
|
|
if (uc->qemu_host_page_size == 0) {
|
|
|
|
uc->qemu_host_page_size = uc->qemu_real_host_page_size;
|
|
|
|
}
|
|
|
|
if (uc->qemu_host_page_size < TARGET_PAGE_SIZE) {
|
|
|
|
uc->qemu_host_page_size = TARGET_PAGE_SIZE;
|
|
|
|
}
|
|
|
|
uc->qemu_host_page_mask = -(intptr_t)uc->qemu_host_page_size;
|
|
|
|
}
|