ARMv8.4 adds the mandatory FEAT_TLBIRANGE. It provides TLBI maintenance instructions that apply to a range of input addresses.
Signed-off-by: Rebecca Cran <rebe...@nuviainc.com> --- accel/tcg/cputlb.c | 67 ++++++ include/exec/exec-all.h | 41 ++++ target/arm/cpu.h | 5 + target/arm/helper.c | 248 ++++++++++++++++++++ 4 files changed, 361 insertions(+) diff --git a/accel/tcg/cputlb.c b/accel/tcg/cputlb.c index 8a7b779270a4..ebf91cc4757f 100644 --- a/accel/tcg/cputlb.c +++ b/accel/tcg/cputlb.c @@ -590,6 +590,24 @@ static void tlb_flush_page_by_mmuidx_async_2(CPUState *cpu, g_free(d); } +typedef struct { + target_ulong addr; + unsigned int num_pages; + uint16_t idxmap; +} TLBFlushPageRangeByMMUIdxData; + +static void tlb_flush_page_range_by_mmuidx_async_0(CPUState *cpu, + run_on_cpu_data data) +{ + TLBFlushPageRangeByMMUIdxData *d = data.host_ptr; + + tlb_flush_page_range_by_mmuidx(cpu, + d->addr, + d->num_pages, + d->idxmap); + g_free(d); +} + void tlb_flush_page_by_mmuidx(CPUState *cpu, target_ulong addr, uint16_t idxmap) { tlb_debug("addr: "TARGET_FMT_lx" mmu_idx:%" PRIx16 "\n", addr, idxmap); @@ -623,6 +641,55 @@ void tlb_flush_page(CPUState *cpu, target_ulong addr) tlb_flush_page_by_mmuidx(cpu, addr, ALL_MMUIDX_BITS); } +void tlb_flush_page_range_by_mmuidx(CPUState *cpu, target_ulong addr, + unsigned int num_pages, uint16_t idxmap) +{ + int i; + int mmu_idx; + target_ulong p; + CPUArchState *env = cpu->env_ptr; + + /* This should already be page aligned */ + addr &= TARGET_PAGE_MASK; + + assert_cpu_is_self(cpu); + + tlb_debug("page addr:" TARGET_FMT_lx " mmu_map:0x%x\n", addr, idxmap); + + qemu_spin_lock(&env_tlb(env)->c.lock); + for (i = 0; i < num_pages; i++) { + for (mmu_idx = 0; mmu_idx < NB_MMU_MODES; mmu_idx++) { + if ((idxmap >> mmu_idx) & 1) { + p = addr + (i * TARGET_PAGE_SIZE); + tlb_flush_page_locked(env, mmu_idx, p); + tb_flush_jmp_cache(cpu, addr); + } + } + } + qemu_spin_unlock(&env_tlb(env)->c.lock); +} + +void tlb_flush_page_range_by_mmuidx_all_cpus_synced(CPUState *src_cpu, + target_ulong addr, + unsigned int num_pages, + uint16_t idxmap) +{ + CPUState *dst_cpu; + TLBFlushPageRangeByMMUIdxData *d; + + CPU_FOREACH(dst_cpu) { + d = g_new(TLBFlushPageRangeByMMUIdxData, 1); + + d->addr = addr; + d->num_pages = num_pages; + d->idxmap = idxmap; + + async_run_on_cpu(dst_cpu, + tlb_flush_page_range_by_mmuidx_async_0, + RUN_ON_CPU_HOST_PTR(d)); + } +} + void tlb_flush_page_by_mmuidx_all_cpus(CPUState *src_cpu, target_ulong addr, uint16_t idxmap) { diff --git a/include/exec/exec-all.h b/include/exec/exec-all.h index b7b3c0ef12d9..dcbf11b890b6 100644 --- a/include/exec/exec-all.h +++ b/include/exec/exec-all.h @@ -212,6 +212,35 @@ void tlb_flush_page_by_mmuidx_all_cpus(CPUState *cpu, target_ulong addr, */ void tlb_flush_page_by_mmuidx_all_cpus_synced(CPUState *cpu, target_ulong addr, uint16_t idxmap); +/** + * tlb_flush_page_range_by_mmuidx: + * @cpu: CPU whose TLB should be flushed + * @addr: virtual address of start of page range to be flushed + * @num_pages: the number of pages to be flushed + * @idxmap: bitmap of MMU indexes to flush + * + * Flush a range of pages from the TLB of the specified CPU, for the specified + * MMU indexes. + */ +void tlb_flush_page_range_by_mmuidx(CPUState *cpu, target_ulong addr, + unsigned int num_pages, uint16_t idxmap); +/** + * tlb_flush_page_range_by_mmuidx_all_cpus_synced: + * @cpu: Originating CPU of the flush + * @addr: virtual address of start of page range to be flushed + * @num_pages: the number of pages to be flushed + * @idxmap: bitmap of MMU indexes to flush + * + * Flush a range of pages from the TLB of all CPUs, for the specified MMU + * indexes like tlb_flush_page_by_mmuidx_all_cpus except the source + * vCPUs work is scheduled as safe work meaning all flushes will be + * complete once the source vCPUs safe work is complete. This will + * depend on when the guests translation ends the TB. + */ +void tlb_flush_page_range_by_mmuidx_all_cpus_synced(CPUState *cpu, + target_ulong addr, + unsigned int num_pages, + uint16_t idxmap); /** * tlb_flush_by_mmuidx: * @cpu: CPU whose TLB should be flushed @@ -313,6 +342,18 @@ static inline void tlb_flush_page_all_cpus_synced(CPUState *src, target_ulong addr) { } +static inline void tlb_flush_page_range_by_mmuidx(CPUState *cpu, + target_ulong addr, + unsigned int num_pages, + int idxmap) +{ +} +static inline void tlb_flush_page_range_by_mmuidx_all_cpus_synced(CPUState *src_cpu, + target_ulong addr, + unsigned int num_pages, + uint16_t idxmap) +{ +} static inline void tlb_flush(CPUState *cpu) { } diff --git a/target/arm/cpu.h b/target/arm/cpu.h index efa1618c4d51..782a77c7ca3b 100644 --- a/target/arm/cpu.h +++ b/target/arm/cpu.h @@ -4030,6 +4030,11 @@ static inline bool isar_feature_aa64_pauth_arch(const ARMISARegisters *id) return FIELD_EX64(id->id_aa64isar1, ID_AA64ISAR1, APA) != 0; } +static inline bool isar_feature_aa64_tlbirange(const ARMISARegisters *id) +{ + return FIELD_EX64(id->id_aa64isar0, ID_AA64ISAR0, TLB) == 2; +} + static inline bool isar_feature_aa64_sb(const ARMISARegisters *id) { return FIELD_EX64(id->id_aa64isar1, ID_AA64ISAR1, SB) != 0; diff --git a/target/arm/helper.c b/target/arm/helper.c index 0e1a3b94211c..2505afe5f65c 100644 --- a/target/arm/helper.c +++ b/target/arm/helper.c @@ -4741,6 +4741,171 @@ static void tlbi_aa64_vae3is_write(CPUARMState *env, const ARMCPRegInfo *ri, ARMMMUIdxBit_SE3, bits); } +#ifdef TARGET_AARCH64 +static unsigned int tlbi_aa64_range_get_num_pages(CPUARMState *env, + uint64_t value, + uint64_t addr) +{ + unsigned int page_size; + unsigned int page_shift; + unsigned int page_size_granule; + uint64_t num; + uint64_t scale; + uint64_t exponent; + uint64_t high_addr; + + num = (value >> 39) & 0xF; + scale = (value >> 44) & 0x3; + page_size_granule = (value >> 46) & 0x3; + + switch (page_size_granule) { + case 1: + page_size = 4096; + page_shift = 12; + break; + case 2: + page_size = 16384; + page_shift = 14; + break; + case 3: + page_size = 65536; + page_shift = 16; + break; + default: + qemu_log_mask(LOG_GUEST_ERROR, "Invalid page size granule %d\n", + page_size_granule); + + raise_exception(env, EXCP_UDEF, syn_uncategorized(), + exception_target_el(env)); + + break; + } + + exponent = (5 * scale) + 1; + high_addr = addr + (((num + 1) << exponent) * page_size); + + return (high_addr - addr) >> page_shift; +} + +static void tlbi_aa64_rvae1_write(CPUARMState *env, const ARMCPRegInfo *ri, + uint64_t value) +{ + /* + * Invalidate by VA range, EL1&0. + * Currently handles all of RVAE1, RVAAE1, RVAALE1 and RVALE1, + * since we don't support flush-for-specific-ASID-only or + * flush-last-level-only. + */ + CPUState *cs = env_cpu(env); + int mask = vae1_tlbmask(env); + uint64_t addr = (value & 0xFFFFFFFFFUL) << TARGET_PAGE_BITS; + unsigned int num_pages = tlbi_aa64_range_get_num_pages(env, value, addr); + + if (tlb_force_broadcast(env)) { + tlb_flush_page_range_by_mmuidx_all_cpus_synced(cs, addr, num_pages, + mask); + } else { + tlb_flush_page_range_by_mmuidx(cs, addr, num_pages, mask); + } +} + +static void tlbi_aa64_rvae1is_write(CPUARMState *env, const ARMCPRegInfo *ri, + uint64_t value) +{ + /* + * Invalidate by VA range, Inner/Outer Shareable EL1&0. + * Currently handles all of RVAE1IS, RVAE1OS, RVAAE1IS, RVAAE1OS, + * RVAALE1IS, RVAALE1OS, RVALE1IS and RVALE1OS, since we don't support + * flush-for-specific-ASID-only, flush-last-level-only or inner/outer + * shareable specific flushes. + */ + CPUState *cs = env_cpu(env); + int mask = vae1_tlbmask(env); + uint64_t addr = (value & 0xFFFFFFFFFUL) << TARGET_PAGE_BITS; + unsigned int num_pages = tlbi_aa64_range_get_num_pages(env, value, addr); + + tlb_flush_page_range_by_mmuidx_all_cpus_synced(cs, addr, num_pages, mask); +} + +static void tlbi_aa64_rvae2_write(CPUARMState *env, const ARMCPRegInfo *ri, + uint64_t value) +{ + /* + * Invalidate by VA range, EL2. + * Currently handles all of RVAE2, RVAAE2, RVAALE2 and RVALE2, + * since we don't support flush-for-specific-ASID-only or + * flush-last-level-only. + */ + CPUState *cs = env_cpu(env); + uint64_t addr = (value & 0xFFFFFFFFFUL) << TARGET_PAGE_BITS; + unsigned int num_pages = tlbi_aa64_range_get_num_pages(env, value, addr); + + if (tlb_force_broadcast(env)) { + tlb_flush_page_range_by_mmuidx_all_cpus_synced(cs, addr, num_pages, + ARMMMUIdxBit_E2); + } else { + tlb_flush_page_range_by_mmuidx(cs, addr, num_pages, ARMMMUIdxBit_E2); + } +} + +static void tlbi_aa64_rvae2is_write(CPUARMState *env, const ARMCPRegInfo *ri, + uint64_t value) +{ + /* + * Invalidate by VA range, Inner/Outer Shareable, EL2. + * Currently handles all of RVAE2IS, RVAE2OS, RVAAE2IS, RVAAE2OS, + * RVAALE2IS, RVAALE2OS, RVALE2IS and RVALE2OS, since we don't support + * flush-for-specific-ASID-only, flush-last-level-only or inner/outer + * shareable specific flushes. + */ + CPUState *cs = env_cpu(env); + uint64_t addr = (value & 0xFFFFFFFFFUL) << TARGET_PAGE_BITS; + unsigned int num_pages = tlbi_aa64_range_get_num_pages(env, value, addr); + + tlb_flush_page_range_by_mmuidx_all_cpus_synced(cs, addr, num_pages, + ARMMMUIdxBit_E2); +} + +static void tlbi_aa64_rvae3_write(CPUARMState *env, const ARMCPRegInfo *ri, + uint64_t value) +{ + /* + * Invalidate by VA range, EL3. + * Currently handles all of RVAE3, RVAAE3, RVAALE3 and RVALE3, + * since we don't support flush-for-specific-ASID-only or + * flush-last-level-only. + */ + CPUState *cs = env_cpu(env); + uint64_t addr = (value & 0xFFFFFFFFFUL) << TARGET_PAGE_BITS; + unsigned int num_pages = tlbi_aa64_range_get_num_pages(env, value, addr); + + if (tlb_force_broadcast(env)) { + tlb_flush_page_range_by_mmuidx_all_cpus_synced(cs, addr, num_pages, + ARMMMUIdxBit_SE3); + } else { + tlb_flush_page_range_by_mmuidx(cs, addr, num_pages, ARMMMUIdxBit_SE3); + } +} + +static void tlbi_aa64_rvae3is_write(CPUARMState *env, const ARMCPRegInfo *ri, + uint64_t value) +{ + /* + * Invalidate by VA range, EL3, Inner/Outer Shareable. + * Currently handles all of RVAE3IS, RVAE3OS, RVAAE3IS, RVAAE3OS, + * RVAALE3IS, RVAALE3OS, RVALE3IS, and RVALE3OS, since we don't support + * flush-for-specific-ASID-only, flush-last-level-only or inner/outer + * specific flushes. + */ + CPUState *cs = env_cpu(env); + uint64_t addr = (value & 0xFFFFFFFFFUL) << TARGET_PAGE_BITS; + unsigned int num_pages = tlbi_aa64_range_get_num_pages(env, value, addr); + + tlb_flush_page_range_by_mmuidx_all_cpus_synced(cs, addr, num_pages, + ARMMMUIdxBit_SE3); +} +#endif + static CPAccessResult aa64_zva_access(CPUARMState *env, const ARMCPRegInfo *ri, bool isread) { @@ -6902,6 +7067,86 @@ static const ARMCPRegInfo pauth_reginfo[] = { REGINFO_SENTINEL }; +static const ARMCPRegInfo tlbirange_reginfo[] = { + { .name = "TLBI_RVAE1IS", .state = ARM_CP_STATE_AA64, + .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 2, .opc2 = 1, + .access = PL1_W, .type = ARM_CP_NO_RAW, + .writefn = tlbi_aa64_rvae1is_write }, + { .name = "TLBI_RVAAE1IS", .state = ARM_CP_STATE_AA64, + .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 2, .opc2 = 3, + .access = PL1_W, .type = ARM_CP_NO_RAW, + .writefn = tlbi_aa64_rvae1is_write }, + { .name = "TLBI_RVALE1IS", .state = ARM_CP_STATE_AA64, + .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 2, .opc2 = 5, + .access = PL1_W, .type = ARM_CP_NO_RAW, + .writefn = tlbi_aa64_rvae1is_write }, + { .name = "TLBI_RVAALE1IS", .state = ARM_CP_STATE_AA64, + .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 2, .opc2 = 7, + .access = PL1_W, .type = ARM_CP_NO_RAW, + .writefn = tlbi_aa64_rvae1is_write }, + { .name = "TLBI_RVAE1", .state = ARM_CP_STATE_AA64, + .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 6, .opc2 = 1, + .access = PL1_W, .type = ARM_CP_NO_RAW, + .writefn = tlbi_aa64_rvae1_write }, + { .name = "TLBI_RVAAE1", .state = ARM_CP_STATE_AA64, + .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 6, .opc2 = 3, + .access = PL1_W, .type = ARM_CP_NO_RAW, + .writefn = tlbi_aa64_rvae1_write }, + { .name = "TLBI_RVALE1", .state = ARM_CP_STATE_AA64, + .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 6, .opc2 = 5, + .access = PL1_W, .type = ARM_CP_NO_RAW, + .writefn = tlbi_aa64_rvae1_write }, + { .name = "TLBI_RVAALE1", .state = ARM_CP_STATE_AA64, + .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 6, .opc2 = 7, + .access = PL1_W, .type = ARM_CP_NO_RAW, + .writefn = tlbi_aa64_rvae1_write }, + { .name = "TLBI_RIPAS2E1IS", .state = ARM_CP_STATE_AA64, + .opc0 = 1, .opc1 = 4, .crn = 8, .crm = 0, .opc2 = 2, + .access = PL2_W, .type = ARM_CP_NOP }, + { .name = "TLBI_RIPAS2LE1IS", .state = ARM_CP_STATE_AA64, + .opc0 = 1, .opc1 = 4, .crn = 8, .crm = 0, .opc2 = 6, + .access = PL2_W, .type = ARM_CP_NOP }, + { .name = "TLBI_RVAE2IS", .state = ARM_CP_STATE_AA64, + .opc0 = 1, .opc1 = 4, .crn = 8, .crm = 2, .opc2 = 1, + .access = PL2_W, .type = ARM_CP_NO_RAW, + .writefn = tlbi_aa64_rvae2is_write }, + { .name = "TLBI_RVALE2IS", .state = ARM_CP_STATE_AA64, + .opc0 = 1, .opc1 = 4, .crn = 8, .crm = 2, .opc2 = 5, + .access = PL2_W, .type = ARM_CP_NO_RAW, + .writefn = tlbi_aa64_rvae2is_write }, + { .name = "TLBI_RIPAS2E1", .state = ARM_CP_STATE_AA64, + .opc0 = 1, .opc1 = 4, .crn = 8, .crm = 4, .opc2 = 2, + .access = PL2_W, .type = ARM_CP_NOP }, + { .name = "TLBI_RIPAS2LE1", .state = ARM_CP_STATE_AA64, + .opc0 = 1, .opc1 = 4, .crn = 8, .crm = 4, .opc2 = 6, + .access = PL2_W, .type = ARM_CP_NOP }, + { .name = "TLBI_RVAE2", .state = ARM_CP_STATE_AA64, + .opc0 = 1, .opc1 = 4, .crn = 8, .crm = 6, .opc2 = 1, + .access = PL2_W, .type = ARM_CP_NO_RAW, + .writefn = tlbi_aa64_rvae2_write }, + { .name = "TLBI_RVALE2", .state = ARM_CP_STATE_AA64, + .opc0 = 1, .opc1 = 4, .crn = 8, .crm = 6, .opc2 = 5, + .access = PL2_W, .type = ARM_CP_NO_RAW, + .writefn = tlbi_aa64_rvae2_write }, + { .name = "TLBI_RVAE3IS", .state = ARM_CP_STATE_AA64, + .opc0 = 1, .opc1 = 6, .crn = 8, .crm = 2, .opc2 = 1, + .access = PL3_W, .type = ARM_CP_NO_RAW, + .writefn = tlbi_aa64_rvae3is_write }, + { .name = "TLBI_RVALE3IS", .state = ARM_CP_STATE_AA64, + .opc0 = 1, .opc1 = 6, .crn = 8, .crm = 2, .opc2 = 5, + .access = PL3_W, .type = ARM_CP_NO_RAW, + .writefn = tlbi_aa64_rvae3is_write }, + { .name = "TLBI_RVAE3", .state = ARM_CP_STATE_AA64, + .opc0 = 1, .opc1 = 6, .crn = 8, .crm = 6, .opc2 = 1, + .access = PL3_W, .type = ARM_CP_NO_RAW, + .writefn = tlbi_aa64_rvae3_write }, + { .name = "TLBI_RVALE3", .state = ARM_CP_STATE_AA64, + .opc0 = 1, .opc1 = 6, .crn = 8, .crm = 6, .opc2 = 5, + .access = PL3_W, .type = ARM_CP_NO_RAW, + .writefn = tlbi_aa64_rvae3_write }, + REGINFO_SENTINEL +}; + static uint64_t rndr_readfn(CPUARMState *env, const ARMCPRegInfo *ri) { Error *err = NULL; @@ -8268,6 +8513,9 @@ void register_cp_regs_for_features(ARMCPU *cpu) if (cpu_isar_feature(aa64_rndr, cpu)) { define_arm_cp_regs(cpu, rndr_reginfo); } + if (cpu_isar_feature(aa64_tlbirange, cpu)) { + define_arm_cp_regs(cpu, tlbirange_reginfo); + } #ifndef CONFIG_USER_ONLY /* Data Cache clean instructions up to PoP */ if (cpu_isar_feature(aa64_dcpop, cpu)) { -- 2.26.2