From patchwork Wed Apr 22 17:09:17 2015 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Greg Bellows X-Patchwork-Id: 463726 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from lists.gnu.org (lists.gnu.org [IPv6:2001:4830:134:3::11]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 3F03B14010F for ; Thu, 23 Apr 2015 03:12:12 +1000 (AEST) Received: from localhost ([::1]:36242 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1YkyC2-00037s-5a for incoming@patchwork.ozlabs.org; Wed, 22 Apr 2015 13:12:10 -0400 Received: from eggs.gnu.org ([2001:4830:134:3::10]:41986) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1Yky9f-0007Bh-DT for qemu-devel@nongnu.org; Wed, 22 Apr 2015 13:09:47 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1Yky9e-0004pp-1W for qemu-devel@nongnu.org; Wed, 22 Apr 2015 13:09:43 -0400 Received: from mail-ob0-f170.google.com ([209.85.214.170]:35025) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1Yky9d-0004pl-T5 for qemu-devel@nongnu.org; Wed, 22 Apr 2015 13:09:41 -0400 Received: by obcux3 with SMTP id ux3so70805325obc.2 for ; Wed, 22 Apr 2015 10:09:41 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=+RVDJoXXmLhvRjA0I5SPSL+/+LgEOaUEv9BQ/r3nNII=; b=CzkFyrA4boEa4XIyRqWWZOwU3Hmt4Hc9VUHgqfWcIS+RAZXUurW1fQPiSW/iC/Jqe0 HM0C2mim2jsDLapmBMzRP2XEIDq9oPlbU9+sY8vXdnfOuuqVupIkodOtifBnC72PRqnn TaqL8pNbbKCV1V4IuUaQsqMCQq3wvhBfTh1b9wEPcNf8hEuHOaR82yLFlG0QWcV+Hang JfpwU8STZx7QsExIMYd7i0YVdze0lK81QJtZEwKqbVtC9Ybgzo2c8hi44UFeKwebJZ7b gJg/b29YG/r3arpEg4KB/XIIzht3/5QElzknZugACxIeqWTLug/UBJ7lYIo27Jvis4GY CCBA== X-Gm-Message-State: ALoCoQkZ/jb0jLBUB9hXknJO6tT4aVQfvWk1Mg436ayx0vfOFh11TtR+27CfzzErgEfgIsWOVBGE X-Received: by 10.202.209.148 with SMTP id i142mr23411660oig.113.1429722581689; Wed, 22 Apr 2015 10:09:41 -0700 (PDT) Received: from gbellows-linaro.gateway.pace.com (99-179-1-214.lightspeed.austtx.sbcglobal.net. [99.179.1.214]) by mx.google.com with ESMTPSA id w72sm3417636oie.28.2015.04.22.10.09.39 (version=TLSv1.1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 22 Apr 2015 10:09:40 -0700 (PDT) From: Greg Bellows To: qemu-devel@nongnu.org, peter.maydell@linaro.org, alex.bennee@linaro.org Date: Wed, 22 Apr 2015 12:09:17 -0500 Message-Id: <1429722561-12651-6-git-send-email-greg.bellows@linaro.org> X-Mailer: git-send-email 1.8.3.2 In-Reply-To: <1429722561-12651-1-git-send-email-greg.bellows@linaro.org> References: <1429722561-12651-1-git-send-email-greg.bellows@linaro.org> X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] [fuzzy] X-Received-From: 209.85.214.170 Cc: serge.fdrv@gmail.com, Greg Bellows Subject: [Qemu-devel] [PATCH v2 5/9] target-arm: Extend FP checks to use an EL X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org Sender: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org Extend the ARM disassemble context to take a target exception EL instead of a boolean enable. This change reverses the polarity of the check making a value of 0 indicate floating point enabled (no exception). Signed-off-by: Greg Bellows --- target-arm/cpu.h | 63 +++++++++++++++++++++++++++++++++++----------- target-arm/translate-a64.c | 8 +++--- target-arm/translate.c | 17 ++++++------- target-arm/translate.h | 2 +- 4 files changed, 61 insertions(+), 29 deletions(-) diff --git a/target-arm/cpu.h b/target-arm/cpu.h index d61bb3f..c7808da 100644 --- a/target-arm/cpu.h +++ b/target-arm/cpu.h @@ -1773,11 +1773,14 @@ static inline bool arm_singlestep_active(CPUARMState *env) #define ARM_TBFLAG_NS_MASK (1 << ARM_TBFLAG_NS_SHIFT) /* Bit usage when in AArch64 state */ +/* The floating-point mask in AArch64 is 2 bits to carry the target exception + * EL is not enabled. + */ #define ARM_TBFLAG_AA64_FPEN_SHIFT 2 -#define ARM_TBFLAG_AA64_FPEN_MASK (1 << ARM_TBFLAG_AA64_FPEN_SHIFT) -#define ARM_TBFLAG_AA64_SS_ACTIVE_SHIFT 3 +#define ARM_TBFLAG_AA64_FPEN_MASK (0x3 << ARM_TBFLAG_AA64_FPEN_SHIFT) +#define ARM_TBFLAG_AA64_SS_ACTIVE_SHIFT 4 #define ARM_TBFLAG_AA64_SS_ACTIVE_MASK (1 << ARM_TBFLAG_AA64_SS_ACTIVE_SHIFT) -#define ARM_TBFLAG_AA64_PSTATE_SS_SHIFT 4 +#define ARM_TBFLAG_AA64_PSTATE_SS_SHIFT 5 #define ARM_TBFLAG_AA64_PSTATE_SS_MASK (1 << ARM_TBFLAG_AA64_PSTATE_SS_SHIFT) /* some convenience accessor macros */ @@ -1814,24 +1817,55 @@ static inline bool arm_singlestep_active(CPUARMState *env) #define ARM_TBFLAG_NS(F) \ (((F) & ARM_TBFLAG_NS_MASK) >> ARM_TBFLAG_NS_SHIFT) -static inline void cpu_get_tb_cpu_state(CPUARMState *env, target_ulong *pc, - target_ulong *cs_base, int *flags) +/* Function to determine if floating point is disabled and what EL FP + * operations should be trapped to. If FP is enabled 0 is returned. + */ +static inline int get_fp_exception_el(CPUARMState *env) { int fpen; + int cur_el = arm_current_el(env); + /* CPACR doesn't exist before v6, so VFP is always accessible */ if (arm_feature(env, ARM_FEATURE_V6)) { fpen = extract32(env->cp15.c1_coproc, 20, 2); - } else { - /* CPACR doesn't exist before v6, so VFP is always accessible */ - fpen = 3; + + /* If we are less than EL2, check if the CPACR has floating point + * enabled. If not, return a trap to EL1. + */ + if ((cur_el == 0 && fpen == 1) || + (cur_el < 2 && (fpen == 0 || fpen == 2))) { + return 1; + } + + /* The CPTR registers only exist in ARMv8 */ + if (arm_feature(env, ARM_FEATURE_V8)) { + /* Check whether floating point operations are trapped to EL2 */ + if (cur_el < 2 && extract32(env->cp15.cptr_el[2], 10, 1)) { + return 2; + } + + /* Check whether floating point operations are trapped to EL3 */ + if (cur_el < 3 && extract32(env->cp15.cptr_el[3], 10, 1)) { + return 3; + } + } } + return 0; +} + +static inline void cpu_get_tb_cpu_state(CPUARMState *env, target_ulong *pc, + target_ulong *cs_base, int *flags) +{ + int fp_excp_el = get_fp_exception_el(env); + if (is_a64(env)) { *pc = env->pc; *flags = ARM_TBFLAG_AARCH64_STATE_MASK; - if (fpen == 3 || (fpen == 1 && arm_current_el(env) != 0)) { - *flags |= ARM_TBFLAG_AA64_FPEN_MASK; - } + + /* Add the target FP exception EL to the flags */ + *flags |= fp_excp_el << ARM_TBFLAG_AA64_FPEN_SHIFT; + /* The SS_ACTIVE and PSTATE_SS bits correspond to the state machine * states defined in the ARM ARM for software singlestep: * SS_ACTIVE PSTATE.SS State @@ -1859,9 +1893,10 @@ static inline void cpu_get_tb_cpu_state(CPUARMState *env, target_ulong *pc, || arm_el_is_aa64(env, 1)) { *flags |= ARM_TBFLAG_VFPEN_MASK; } - if (fpen == 3 || (fpen == 1 && arm_current_el(env) != 0)) { - *flags |= ARM_TBFLAG_CPACR_FPEN_MASK; - } + + /* Add the target FP exception EL to the flags */ + *flags |= fp_excp_el << ARM_TBFLAG_CPACR_FPEN_SHIFT; + /* The SS_ACTIVE and PSTATE_SS bits correspond to the state machine * states defined in the ARM ARM for software singlestep: * SS_ACTIVE PSTATE.SS State diff --git a/target-arm/translate-a64.c b/target-arm/translate-a64.c index b1f44c9..b4423ca 100644 --- a/target-arm/translate-a64.c +++ b/target-arm/translate-a64.c @@ -412,7 +412,7 @@ static TCGv_i64 read_cpu_reg_sp(DisasContext *s, int reg, int sf) static inline void assert_fp_access_checked(DisasContext *s) { #ifdef CONFIG_DEBUG_TCG - if (unlikely(!s->fp_access_checked || !s->cpacr_fpen)) { + if (unlikely(!s->fp_access_checked || s->fp_excp_el)) { fprintf(stderr, "target-arm: FP access check missing for " "instruction 0x%08x\n", s->insn); abort(); @@ -972,12 +972,12 @@ static inline bool fp_access_check(DisasContext *s) assert(!s->fp_access_checked); s->fp_access_checked = true; - if (s->cpacr_fpen) { + if (!s->fp_excp_el) { return true; } gen_exception_insn(s, 4, EXCP_UDEF, syn_fp_access_trap(1, 0xe, false), - default_exception_el(s)); + s->fp_excp_el); return false; } @@ -10954,7 +10954,7 @@ void gen_intermediate_code_internal_a64(ARMCPU *cpu, #if !defined(CONFIG_USER_ONLY) dc->user = (dc->current_el == 0); #endif - dc->cpacr_fpen = ARM_TBFLAG_AA64_FPEN(tb->flags); + dc->fp_excp_el = ARM_TBFLAG_AA64_FPEN(tb->flags); dc->vec_len = 0; dc->vec_stride = 0; dc->cp_regs = cpu->cp_regs; diff --git a/target-arm/translate.c b/target-arm/translate.c index 2bd5733..0d9b856 100644 --- a/target-arm/translate.c +++ b/target-arm/translate.c @@ -3044,10 +3044,9 @@ static int disas_vfp_insn(DisasContext *s, uint32_t insn) * for invalid encodings; we will generate incorrect syndrome information * for attempts to execute invalid vfp/neon encodings with FP disabled. */ - if (!s->cpacr_fpen) { + if (s->fp_excp_el) { gen_exception_insn(s, 4, EXCP_UDEF, - syn_fp_access_trap(1, 0xe, s->thumb), - default_exception_el(s)); + syn_fp_access_trap(1, 0xe, s->thumb), s->fp_excp_el); return 0; } @@ -4363,10 +4362,9 @@ static int disas_neon_ls_insn(DisasContext *s, uint32_t insn) * for invalid encodings; we will generate incorrect syndrome information * for attempts to execute invalid vfp/neon encodings with FP disabled. */ - if (!s->cpacr_fpen) { + if (s->fp_excp_el) { gen_exception_insn(s, 4, EXCP_UDEF, - syn_fp_access_trap(1, 0xe, s->thumb), - default_exception_el(s)); + syn_fp_access_trap(1, 0xe, s->thumb), s->fp_excp_el); return 0; } @@ -5102,10 +5100,9 @@ static int disas_neon_data_insn(DisasContext *s, uint32_t insn) * for invalid encodings; we will generate incorrect syndrome information * for attempts to execute invalid vfp/neon encodings with FP disabled. */ - if (!s->cpacr_fpen) { + if (s->fp_excp_el) { gen_exception_insn(s, 4, EXCP_UDEF, - syn_fp_access_trap(1, 0xe, s->thumb), - default_exception_el(s)); + syn_fp_access_trap(1, 0xe, s->thumb), s->fp_excp_el); return 0; } @@ -11082,7 +11079,7 @@ static inline void gen_intermediate_code_internal(ARMCPU *cpu, dc->user = (dc->current_el == 0); #endif dc->ns = ARM_TBFLAG_NS(tb->flags); - dc->cpacr_fpen = ARM_TBFLAG_CPACR_FPEN(tb->flags); + dc->fp_excp_el = ARM_TBFLAG_CPACR_FPEN(tb->flags); dc->vfp_enabled = ARM_TBFLAG_VFPEN(tb->flags); dc->vec_len = ARM_TBFLAG_VECLEN(tb->flags); dc->vec_stride = ARM_TBFLAG_VECSTRIDE(tb->flags); diff --git a/target-arm/translate.h b/target-arm/translate.h index 2eadcb7..bcdcf11 100644 --- a/target-arm/translate.h +++ b/target-arm/translate.h @@ -22,7 +22,7 @@ typedef struct DisasContext { #endif ARMMMUIdx mmu_idx; /* MMU index to use for normal loads/stores */ bool ns; /* Use non-secure CPREG bank on access */ - bool cpacr_fpen; /* FP enabled via CPACR.FPEN */ + int fp_excp_el; /* FP exception EL or 0 if enabled */ bool el3_is_aa64; /* Flag indicating whether EL3 is AArch64 or not */ bool vfp_enabled; /* FP enabled via FPSCR.EN */ int vec_len;