diff options
author | David Gibson <david@gibson.dropbear.id.au> | 2013-03-12 00:31:40 +0000 |
---|---|---|
committer | Alexander Graf <agraf@suse.de> | 2013-03-22 15:28:52 +0100 |
commit | e01b444523e2b0c663b42b3e8f44ef48a6153051 (patch) | |
tree | 3b80bd7a3b7bee6819442c8d16abf2dd4525d40f | |
parent | e1a53ba2e0f6dcf4a8b25586cc9d8ec1e408305c (diff) |
mmu-hash*: Clean up permission checking
Currently checking of PTE permission bits is split messily amongst
ppc_hash{32,64}_pp_check(), ppc_hash{32,64}_check_prot() and their callers.
This patch cleans this up to have the new function
ppc_hash{32,64}_pte_prot() compute the page permissions from the SLBE (for
64-bit) or segment register (32-bit) and the pte. A greatly simplified
version of the actual permissions check is then open coded in the callers.
The 32-bit version of ppc_hash32_pte_prot() is implemented in terms of
ppc_hash32_pp_prot(), a renamed and slightly cleaned up version of the old
ppc_hash32_pp_check(), which is also used for checking BAT permissions on
the 601.
Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
Signed-off-by: Alexander Graf <agraf@suse.de>
-rw-r--r-- | target-ppc/mmu-hash32.c | 95 | ||||
-rw-r--r-- | target-ppc/mmu-hash64.c | 93 |
2 files changed, 72 insertions, 116 deletions
diff --git a/target-ppc/mmu-hash32.c b/target-ppc/mmu-hash32.c index 2b88b9ff3a..6581d0f425 100644 --- a/target-ppc/mmu-hash32.c +++ b/target-ppc/mmu-hash32.c @@ -47,69 +47,60 @@ struct mmu_ctx_hash32 { int key; /* Access key */ }; -static int ppc_hash32_pp_check(int key, int pp, int nx) +static int ppc_hash32_pp_prot(int key, int pp, int nx) { - int access; + int prot; - /* Compute access rights */ - access = 0; if (key == 0) { switch (pp) { case 0x0: case 0x1: case 0x2: - access |= PAGE_WRITE; - /* No break here */ + prot = PAGE_READ | PAGE_WRITE; + break; + case 0x3: - access |= PAGE_READ; + prot = PAGE_READ; break; + + default: + abort(); } } else { switch (pp) { case 0x0: - access = 0; + prot = 0; break; + case 0x1: case 0x3: - access = PAGE_READ; + prot = PAGE_READ; break; + case 0x2: - access = PAGE_READ | PAGE_WRITE; + prot = PAGE_READ | PAGE_WRITE; break; + + default: + abort(); } } if (nx == 0) { - access |= PAGE_EXEC; + prot |= PAGE_EXEC; } - return access; + return prot; } -static int ppc_hash32_check_prot(int prot, int rwx) +static int ppc_hash32_pte_prot(CPUPPCState *env, + target_ulong sr, ppc_hash_pte32_t pte) { - int ret; + unsigned pp, key; - if (rwx == 2) { - if (prot & PAGE_EXEC) { - ret = 0; - } else { - ret = -2; - } - } else if (rwx) { - if (prot & PAGE_WRITE) { - ret = 0; - } else { - ret = -2; - } - } else { - if (prot & PAGE_READ) { - ret = 0; - } else { - ret = -2; - } - } + key = !!(msr_pr ? (sr & SR32_KP) : (sr & SR32_KS)); + pp = pte.pte1 & HPTE32_R_PP; - return ret; + return ppc_hash32_pp_prot(key, pp, !!(sr & SR32_NX)); } static target_ulong hash32_bat_size(CPUPPCState *env, @@ -160,7 +151,7 @@ static int hash32_bat_601_prot(CPUPPCState *env, } else { key = !!(batu & BATU32_601_KP); } - return ppc_hash32_pp_check(key, pp, 0); + return ppc_hash32_pp_prot(key, pp, 0); } static hwaddr ppc_hash32_bat_lookup(CPUPPCState *env, target_ulong ea, int rwx, @@ -380,11 +371,10 @@ static hwaddr ppc_hash32_htab_lookup(CPUPPCState *env, static int ppc_hash32_translate(CPUPPCState *env, struct mmu_ctx_hash32 *ctx, target_ulong eaddr, int rwx) { - int ret; target_ulong sr; - bool nx; hwaddr pte_offset; ppc_hash_pte32_t pte; + const int need_prot[] = {PAGE_READ, PAGE_WRITE, PAGE_EXEC}; assert((rwx == 0) || (rwx == 1) || (rwx == 2)); @@ -400,7 +390,10 @@ static int ppc_hash32_translate(CPUPPCState *env, struct mmu_ctx_hash32 *ctx, if (env->nb_BATs != 0) { ctx->raddr = ppc_hash32_bat_lookup(env, eaddr, rwx, &ctx->prot); if (ctx->raddr != -1) { - return ppc_hash32_check_prot(ctx->prot, rwx); + if (need_prot[rwx] & ~ctx->prot) { + return -2; + } + return 0; } } @@ -414,8 +407,7 @@ static int ppc_hash32_translate(CPUPPCState *env, struct mmu_ctx_hash32 *ctx, } /* 5. Check for segment level no-execute violation */ - nx = !!(sr & SR32_NX); - if ((rwx == 2) && nx) { + if ((rwx == 2) && (sr & SR32_NX)) { return -3; } @@ -427,34 +419,27 @@ static int ppc_hash32_translate(CPUPPCState *env, struct mmu_ctx_hash32 *ctx, LOG_MMU("found PTE at offset %08" HWADDR_PRIx "\n", pte_offset); /* 7. Check access permissions */ - ctx->key = (((sr & SR32_KP) && (msr_pr != 0)) || - ((sr & SR32_KS) && (msr_pr == 0))) ? 1 : 0; - - int access, pp; - pp = pte.pte1 & HPTE32_R_PP; - /* Compute access rights */ - access = ppc_hash32_pp_check(ctx->key, pp, nx); - /* Keep the matching PTE informations */ - ctx->raddr = pte.pte1; - ctx->prot = access; - ret = ppc_hash32_check_prot(ctx->prot, rwx); + ctx->prot = ppc_hash32_pte_prot(env, sr, pte); - if (ret) { + if (need_prot[rwx] & ~ctx->prot) { /* Access right violation */ LOG_MMU("PTE access rejected\n"); - return ret; + return -2; } LOG_MMU("PTE access granted !\n"); /* 8. Update PTE referenced and changed bits if necessary */ - if (ppc_hash32_pte_update_flags(ctx, &pte.pte1, ret, rwx) == 1) { + if (ppc_hash32_pte_update_flags(ctx, &pte.pte1, 0, rwx) == 1) { ppc_hash32_store_hpte1(env, pte_offset, pte.pte1); } - return ret; + /* Keep the matching PTE informations */ + ctx->raddr = pte.pte1; + + return 0; } hwaddr ppc_hash32_get_phys_page_debug(CPUPPCState *env, target_ulong addr) diff --git a/target-ppc/mmu-hash64.c b/target-ppc/mmu-hash64.c index f7aa352a9b..1458f15dd2 100644 --- a/target-ppc/mmu-hash64.c +++ b/target-ppc/mmu-hash64.c @@ -43,7 +43,6 @@ struct mmu_ctx_hash64 { hwaddr raddr; /* Real address */ int prot; /* Protection bits */ - int key; /* Access key */ }; /* @@ -229,72 +228,55 @@ target_ulong helper_load_slb_vsid(CPUPPCState *env, target_ulong rb) * 64-bit hash table MMU handling */ -static int ppc_hash64_pp_check(int key, int pp, bool nx) +static int ppc_hash64_pte_prot(CPUPPCState *env, + ppc_slb_t *slb, ppc_hash_pte64_t pte) { - int access; + unsigned pp, key; + /* Some pp bit combinations have undefined behaviour, so default + * to no access in those cases */ + int prot = 0; + + key = !!(msr_pr ? (slb->vsid & SLB_VSID_KP) + : (slb->vsid & SLB_VSID_KS)); + pp = (pte.pte1 & HPTE64_R_PP) | ((pte.pte1 & HPTE64_R_PP0) >> 61); - /* Compute access rights */ - /* When pp is 4, 5 or 7, the result is undefined. Set it to noaccess */ - access = 0; if (key == 0) { switch (pp) { case 0x0: case 0x1: case 0x2: - access |= PAGE_WRITE; - /* No break here */ + prot = PAGE_READ | PAGE_WRITE; + break; + case 0x3: case 0x6: - access |= PAGE_READ; + prot = PAGE_READ; break; } } else { switch (pp) { case 0x0: case 0x6: - access = 0; + prot = 0; break; + case 0x1: case 0x3: - access = PAGE_READ; + prot = PAGE_READ; break; + case 0x2: - access = PAGE_READ | PAGE_WRITE; + prot = PAGE_READ | PAGE_WRITE; break; } } - if (!nx) { - access |= PAGE_EXEC; - } - - return access; -} - -static int ppc_hash64_check_prot(int prot, int rwx) -{ - int ret; - if (rwx == 2) { - if (prot & PAGE_EXEC) { - ret = 0; - } else { - ret = -2; - } - } else if (rwx == 1) { - if (prot & PAGE_WRITE) { - ret = 0; - } else { - ret = -2; - } - } else { - if (prot & PAGE_READ) { - ret = 0; - } else { - ret = -2; - } + /* No execute if either noexec or guarded bits set */ + if (!(pte.pte1 & HPTE64_R_N) || (pte.pte1 & HPTE64_R_G)) { + prot |= PAGE_EXEC; } - return ret; + return prot; } static int ppc_hash64_pte_update_flags(struct mmu_ctx_hash64 *ctx, @@ -407,11 +389,11 @@ static hwaddr ppc_hash64_htab_lookup(CPUPPCState *env, static int ppc_hash64_translate(CPUPPCState *env, struct mmu_ctx_hash64 *ctx, target_ulong eaddr, int rwx) { - int ret; ppc_slb_t *slb; hwaddr pte_offset; ppc_hash_pte64_t pte; int target_page_bits; + const int need_prot[] = {PAGE_READ, PAGE_WRITE, PAGE_EXEC}; assert((rwx == 0) || (rwx == 1) || (rwx == 2)); @@ -444,37 +426,26 @@ static int ppc_hash64_translate(CPUPPCState *env, struct mmu_ctx_hash64 *ctx, LOG_MMU("found PTE at offset %08" HWADDR_PRIx "\n", pte_offset); /* 5. Check access permissions */ - ctx->key = !!(msr_pr ? (slb->vsid & SLB_VSID_KP) - : (slb->vsid & SLB_VSID_KS)); + ctx->prot = ppc_hash64_pte_prot(env, slb, pte); - int access, pp; - bool nx; - - pp = (pte.pte1 & HPTE64_R_PP) | ((pte.pte1 & HPTE64_R_PP0) >> 61); - /* No execute if either noexec or guarded bits set */ - nx = (pte.pte1 & HPTE64_R_N) || (pte.pte1 & HPTE64_R_G); - /* Compute access rights */ - access = ppc_hash64_pp_check(ctx->key, pp, nx); - /* Keep the matching PTE informations */ - ctx->raddr = pte.pte1; - ctx->prot = access; - ret = ppc_hash64_check_prot(ctx->prot, rwx); - - if (ret) { + if ((need_prot[rwx] & ~ctx->prot) != 0) { /* Access right violation */ LOG_MMU("PTE access rejected\n"); - return ret; + return -2; } LOG_MMU("PTE access granted !\n"); /* 6. Update PTE referenced and changed bits if necessary */ - if (ppc_hash64_pte_update_flags(ctx, &pte.pte1, ret, rwx) == 1) { + if (ppc_hash64_pte_update_flags(ctx, &pte.pte1, 0, rwx) == 1) { ppc_hash64_store_hpte1(env, pte_offset, pte.pte1); } + /* Keep the matching PTE informations */ + ctx->raddr = pte.pte1; + /* We have a TLB that saves 4K pages, so let's * split a huge page to 4k chunks */ target_page_bits = (slb->vsid & SLB_VSID_L) @@ -483,7 +454,7 @@ static int ppc_hash64_translate(CPUPPCState *env, struct mmu_ctx_hash64 *ctx, ctx->raddr |= (eaddr & ((1 << target_page_bits) - 1)) & TARGET_PAGE_MASK; } - return ret; + return 0; } hwaddr ppc_hash64_get_phys_page_debug(CPUPPCState *env, target_ulong addr) |