diff options
author | Giacomo Travaglini <giacomo.travaglini@arm.com> | 2019-07-31 09:41:48 +0100 |
---|---|---|
committer | Giacomo Travaglini <giacomo.travaglini@arm.com> | 2019-09-18 13:30:01 +0000 |
commit | a4bf7c3c20756f01f39e644d65f97fd9813502f0 (patch) | |
tree | f9488099d2ccdddce14473881d82d59be82b0605 /src/arch/arm/tlb.cc | |
parent | dc70987e470d66f584e0ddf606e9f07da994ba75 (diff) | |
download | gem5-a4bf7c3c20756f01f39e644d65f97fd9813502f0.tar.xz |
arch-arm: Fix Data Abort ISS when caused by Atomic operation
Data Aborts caused by an atomic instruction have a special rule for
their syndrome:
From a ISS point of view they count as read if a read to that address
would generate a fault; they count as writes otherwise (ISS.WnR bit)
This patch is implementing this in the TLB. For permission faults we
need to explicitly check if a read would trigger a fault
(e.g. checking for the AP bits) since permissions can allow read-only
accesses.
For other MMU exceptions (like translation faults) we are confident the
nature of the access doesn't affect the genration of a fault.
This means that if the access is atomic, we treat it as a read from an
ISS.WnR point of view.
Change-Id: Ia524aa6ae07f81513cdc26c516b5fd9b01a931c3
Signed-off-by: Giacomo Travaglini <giacomo.travaglini@arm.com>
Reviewed-by: Andreas Sandberg <andreas.sandberg@arm.com>
Reviewed-on: https://gem5-review.googlesource.com/c/public/gem5/+/20981
Maintainer: Andreas Sandberg <andreas.sandberg@arm.com>
Tested-by: kokoro <noreply+kokoro@google.com>
Diffstat (limited to 'src/arch/arm/tlb.cc')
-rw-r--r-- | src/arch/arm/tlb.cc | 19 |
1 files changed, 16 insertions, 3 deletions
diff --git a/src/arch/arm/tlb.cc b/src/arch/arm/tlb.cc index 1e8003c21..1e4904c71 100644 --- a/src/arch/arm/tlb.cc +++ b/src/arch/arm/tlb.cc @@ -801,6 +801,7 @@ TLB::checkPermissions64(TlbEntry *te, const RequestPtr &req, Mode mode, bool is_fetch = (mode == Execute); // Cache clean operations require read permissions to the specified VA bool is_write = !req->isCacheClean() && mode == Write; + bool is_atomic = req->isAtomic(); bool is_priv M5_VAR_USED = isPriv && !(flags & UserMode); updateMiscReg(tc, curTranType); @@ -825,7 +826,8 @@ TLB::checkPermissions64(TlbEntry *te, const RequestPtr &req, Mode mode, alignFaults++; return std::make_shared<DataAbort>( vaddr_tainted, - TlbEntry::DomainType::NoAccess, is_write, + TlbEntry::DomainType::NoAccess, + is_atomic ? false : is_write, ArmFault::AlignmentFault, isStage2, ArmFault::LpaeTran); } @@ -852,6 +854,12 @@ TLB::checkPermissions64(TlbEntry *te, const RequestPtr &req, Mode mode, bool r = !is_write && !is_fetch; bool w = is_write; bool x = is_fetch; + + // grant_read is used for faults from an atomic instruction that + // both reads and writes from a memory location. From a ISS point + // of view they count as read if a read to that address would have + // generated the fault; they count as writes otherwise + bool grant_read = true; DPRINTF(TLBVerbose, "Checking permissions: ap:%d, xn:%d, pxn:%d, r:%d, " "w:%d, x:%d\n", ap, xn, pxn, r, w, x); @@ -861,18 +869,20 @@ TLB::checkPermissions64(TlbEntry *te, const RequestPtr &req, Mode mode, // The following permissions are described in ARM DDI 0487A.f // D4-1802 uint8_t hap = 0x3 & te->hap; + grant_read = hap & 0x1; if (is_fetch) { // sctlr.wxn overrides the xn bit grant = !sctlr.wxn && !xn; } else if (is_write) { grant = hap & 0x2; } else { // is_read - grant = hap & 0x1; + grant = grant_read; } } else { switch (aarch64EL) { case EL0: { + grant_read = ap & 0x1; uint8_t perm = (ap << 2) | (xn << 1) | pxn; switch (perm) { case 0: @@ -906,6 +916,7 @@ TLB::checkPermissions64(TlbEntry *te, const RequestPtr &req, Mode mode, { if (checkPAN(tc, ap, req, mode)) { grant = false; + grant_read = false; break; } @@ -945,6 +956,7 @@ TLB::checkPermissions64(TlbEntry *te, const RequestPtr &req, Mode mode, case EL2: if (hcr.e2h && checkPAN(tc, ap, req, mode)) { grant = false; + grant_read = false; break; } M5_FALLTHROUGH; @@ -990,7 +1002,8 @@ TLB::checkPermissions64(TlbEntry *te, const RequestPtr &req, Mode mode, DPRINTF(TLB, "TLB Fault: Data abort on permission check. AP:%d " "priv:%d write:%d\n", ap, is_priv, is_write); return std::make_shared<DataAbort>( - vaddr_tainted, te->domain, is_write, + vaddr_tainted, te->domain, + (is_atomic && !grant_read) ? false : is_write, ArmFault::PermissionLL + te->lookupLevel, isStage2, ArmFault::LpaeTran); } |