mirror of
https://github.com/yuzu-emu/unicorn.git
synced 2024-12-23 00:05:36 +00:00
target/arm: use arm_is_el2_enabled() where applicable
Do not assume that EL2 is available in and only in non-secure context. That equivalence is broken by ARMv8.4-SEL2. Backports e6ef0169264b00cce552404f689ce137018ff290
This commit is contained in:
parent
7a694223ca
commit
58af3e76e6
|
@ -2078,7 +2078,7 @@ static inline bool arm_el_is_aa64(CPUARMState *env, int el)
|
|||
return aa64;
|
||||
}
|
||||
|
||||
if (arm_feature(env, ARM_FEATURE_EL2) && !arm_is_secure_below_el3(env)) {
|
||||
if (arm_is_el2_enabled(env)) {
|
||||
aa64 = aa64 && (env->cp15.hcr_el2 & HCR_RW);
|
||||
}
|
||||
|
||||
|
@ -3043,7 +3043,7 @@ static inline int arm_debug_target_el(CPUARMState *env)
|
|||
bool secure = arm_is_secure(env);
|
||||
bool route_to_el2 = false;
|
||||
|
||||
if (arm_feature(env, ARM_FEATURE_EL2) && !secure) {
|
||||
if (arm_is_el2_enabled(env)) {
|
||||
route_to_el2 = env->cp15.hcr_el2 & HCR_TGE ||
|
||||
env->cp15.mdcr_el2 & MDCR_TDE;
|
||||
}
|
||||
|
|
|
@ -970,8 +970,7 @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc)
|
|||
if (new_el == -1) {
|
||||
goto illegal_return;
|
||||
}
|
||||
if (new_el > cur_el
|
||||
|| (new_el == 2 && !arm_feature(env, ARM_FEATURE_EL2))) {
|
||||
if (new_el > cur_el || (new_el == 2 && !arm_is_el2_enabled(env))) {
|
||||
/* Disallow return to an EL which is unimplemented or higher
|
||||
* than the current one.
|
||||
*/
|
||||
|
@ -983,11 +982,6 @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc)
|
|||
goto illegal_return;
|
||||
}
|
||||
|
||||
if (new_el == 2 && arm_is_secure_below_el3(env)) {
|
||||
/* Return to the non-existent secure-EL2 */
|
||||
goto illegal_return;
|
||||
}
|
||||
|
||||
if (new_el == 1 && (arm_hcr_el2_eff(env) & HCR_TGE)) {
|
||||
goto illegal_return;
|
||||
}
|
||||
|
|
|
@ -798,8 +798,8 @@ static CPAccessResult cpacr_access(CPUARMState *env, const ARMCPRegInfo *ri,
|
|||
{
|
||||
if (arm_feature(env, ARM_FEATURE_V8)) {
|
||||
/* Check if CPACR accesses are to be trapped to EL2 */
|
||||
if (arm_current_el(env) == 1 &&
|
||||
(env->cp15.cptr_el[2] & CPTR_TCPAC) && !arm_is_secure(env)) {
|
||||
if (arm_current_el(env) == 1 && arm_is_el2_enabled(env) &&
|
||||
(env->cp15.cptr_el[2] & CPTR_TCPAC)) {
|
||||
return CP_ACCESS_TRAP_EL2;
|
||||
/* Check if CPACR accesses are to be trapped to EL3 */
|
||||
} else if (arm_current_el(env) < 3 &&
|
||||
|
@ -2219,7 +2219,7 @@ static CPAccessResult gt_counter_access(CPUARMState *env, int timeridx,
|
|||
bool isread)
|
||||
{
|
||||
unsigned int cur_el = arm_current_el(env);
|
||||
bool secure = arm_is_secure(env);
|
||||
bool has_el2 = arm_is_el2_enabled(env);
|
||||
uint64_t hcr = arm_hcr_el2_eff(env);
|
||||
|
||||
switch (cur_el) {
|
||||
|
@ -2243,8 +2243,7 @@ static CPAccessResult gt_counter_access(CPUARMState *env, int timeridx,
|
|||
}
|
||||
} else {
|
||||
/* If HCR_EL2.<E2H> == 0: check CNTHCTL_EL2.EL1PCEN. */
|
||||
if (arm_feature(env, ARM_FEATURE_EL2) &&
|
||||
timeridx == GTIMER_PHYS && !secure &&
|
||||
if (has_el2 && timeridx == GTIMER_PHYS &&
|
||||
!extract32(env->cp15.cnthctl_el2, 1, 1)) {
|
||||
return CP_ACCESS_TRAP_EL2;
|
||||
}
|
||||
|
@ -2253,8 +2252,7 @@ static CPAccessResult gt_counter_access(CPUARMState *env, int timeridx,
|
|||
|
||||
case 1:
|
||||
/* Check CNTHCTL_EL2.EL1PCTEN, which changes location based on E2H. */
|
||||
if (arm_feature(env, ARM_FEATURE_EL2) &&
|
||||
timeridx == GTIMER_PHYS && !secure &&
|
||||
if (has_el2 && timeridx == GTIMER_PHYS &&
|
||||
(hcr & HCR_E2H
|
||||
? !extract32(env->cp15.cnthctl_el2, 10, 1)
|
||||
: !extract32(env->cp15.cnthctl_el2, 0, 1))) {
|
||||
|
@ -2269,7 +2267,7 @@ static CPAccessResult gt_timer_access(CPUARMState *env, int timeridx,
|
|||
bool isread)
|
||||
{
|
||||
unsigned int cur_el = arm_current_el(env);
|
||||
bool secure = arm_is_secure(env);
|
||||
bool has_el2 = arm_is_el2_enabled(env);
|
||||
uint64_t hcr = arm_hcr_el2_eff(env);
|
||||
|
||||
switch (cur_el) {
|
||||
|
@ -2290,8 +2288,7 @@ static CPAccessResult gt_timer_access(CPUARMState *env, int timeridx,
|
|||
/* fall through */
|
||||
|
||||
case 1:
|
||||
if (arm_feature(env, ARM_FEATURE_EL2) &&
|
||||
timeridx == GTIMER_PHYS && !secure) {
|
||||
if (has_el2 && timeridx == GTIMER_PHYS) {
|
||||
if (hcr & HCR_E2H) {
|
||||
/* If HCR_EL2.<E2H,TGE> == '10': check CNTHCTL_EL2.EL1PTEN. */
|
||||
if (!extract32(env->cp15.cnthctl_el2, 11, 1)) {
|
||||
|
@ -3940,11 +3937,9 @@ static const ARMCPRegInfo strongarm_cp_reginfo[] = {
|
|||
|
||||
static uint64_t midr_read(CPUARMState *env, const ARMCPRegInfo *ri)
|
||||
{
|
||||
ARMCPU *cpu = env_archcpu(env);
|
||||
unsigned int cur_el = arm_current_el(env);
|
||||
bool secure = arm_is_secure(env);
|
||||
|
||||
if (arm_feature(&cpu->env, ARM_FEATURE_EL2) && !secure && cur_el == 1) {
|
||||
if (arm_is_el2_enabled(env) && cur_el == 1) {
|
||||
return env->cp15.vpidr_el2;
|
||||
}
|
||||
return raw_read(env, ri);
|
||||
|
@ -3971,9 +3966,8 @@ static uint64_t mpidr_read_val(CPUARMState *env)
|
|||
static uint64_t mpidr_read(CPUARMState *env, const ARMCPRegInfo *ri)
|
||||
{
|
||||
unsigned int cur_el = arm_current_el(env);
|
||||
bool secure = arm_is_secure(env);
|
||||
|
||||
if (arm_feature(env, ARM_FEATURE_EL2) && !secure && cur_el == 1) {
|
||||
if (arm_is_el2_enabled(env) && cur_el == 1) {
|
||||
return env->cp15.vmpidr_el2;
|
||||
}
|
||||
return mpidr_read_val(env);
|
||||
|
@ -5024,7 +5018,7 @@ uint64_t arm_hcr_el2_eff(CPUARMState *env)
|
|||
{
|
||||
uint64_t ret = env->cp15.hcr_el2;
|
||||
|
||||
if (arm_is_secure_below_el3(env)) {
|
||||
if (!arm_is_el2_enabled(env)) {
|
||||
/*
|
||||
* "This register has no effect if EL2 is not enabled in the
|
||||
* current Security state". This is ARMv8.4-SecEL2 speak for
|
||||
|
@ -5821,7 +5815,7 @@ int sve_exception_el(CPUARMState *env, int el)
|
|||
/* CPTR_EL2. Since TZ and TFP are positive,
|
||||
* they will be zero when EL2 is not present.
|
||||
*/
|
||||
if (el <= 2 && !arm_is_secure_below_el3(env)) {
|
||||
if (el <= 2 && arm_is_el2_enabled(env)) {
|
||||
if (env->cp15.cptr_el[2] & CPTR_TZ) {
|
||||
return 2;
|
||||
}
|
||||
|
@ -8330,8 +8324,7 @@ static int bad_mode_switch(CPUARMState *env, int mode, CPSRWriteType write_type)
|
|||
}
|
||||
return 0;
|
||||
case ARM_CPU_MODE_HYP:
|
||||
return !arm_feature(env, ARM_FEATURE_EL2)
|
||||
|| arm_current_el(env) < 2 || arm_is_secure_below_el3(env);
|
||||
return !arm_is_el2_enabled(env) || arm_current_el(env) < 2;
|
||||
case ARM_CPU_MODE_MON:
|
||||
return arm_current_el(env) < 3;
|
||||
default:
|
||||
|
@ -12340,7 +12333,7 @@ int fp_exception_el(CPUARMState *env, int cur_el)
|
|||
|
||||
/* CPTR_EL2 : present in v7VE or v8 */
|
||||
if (cur_el <= 2 && extract32(env->cp15.cptr_el[2], 10, 1)
|
||||
&& !arm_is_secure_below_el3(env)) {
|
||||
&& arm_is_el2_enabled(env)) {
|
||||
/* Trap FP ops at EL2, NS-EL1 or NS-EL0 to EL2 */
|
||||
return 2;
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue