]> git.proxmox.com Git - mirror_qemu.git/blame - cputlb.c
pc-bios/s390-ccw: build for z900
[mirror_qemu.git] / cputlb.c
CommitLineData
0cac1b66
BS
1/*
2 * Common CPU TLB handling
3 *
4 * Copyright (c) 2003 Fabrice Bellard
5 *
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2 of the License, or (at your option) any later version.
10 *
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
15 *
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, see <http://www.gnu.org/licenses/>.
18 */
19
20#include "config.h"
21#include "cpu.h"
022c62cb
PB
22#include "exec/exec-all.h"
23#include "exec/memory.h"
24#include "exec/address-spaces.h"
f08b6170 25#include "exec/cpu_ldst.h"
0cac1b66 26
022c62cb 27#include "exec/cputlb.h"
0cac1b66 28
022c62cb 29#include "exec/memory-internal.h"
220c3ebd 30#include "exec/ram_addr.h"
0f590e74 31#include "tcg/tcg.h"
0cac1b66
BS
32
33//#define DEBUG_TLB
34//#define DEBUG_TLB_CHECK
35
36/* statistics */
37int tlb_flush_count;
38
0cac1b66
BS
39/* NOTE:
40 * If flush_global is true (the usual case), flush all tlb entries.
41 * If flush_global is false, flush (at least) all tlb entries not
42 * marked global.
43 *
44 * Since QEMU doesn't currently implement a global/not-global flag
45 * for tlb entries, at the moment tlb_flush() will also flush all
46 * tlb entries in the flush_global == false case. This is OK because
47 * CPU architectures generally permit an implementation to drop
48 * entries from the TLB at any time, so flushing more entries than
49 * required is only an efficiency issue, not a correctness issue.
50 */
00c8cb0a 51void tlb_flush(CPUState *cpu, int flush_global)
0cac1b66 52{
00c8cb0a 53 CPUArchState *env = cpu->env_ptr;
0cac1b66
BS
54
55#if defined(DEBUG_TLB)
56 printf("tlb_flush:\n");
57#endif
58 /* must reset current TB so that interrupts cannot modify the
59 links while we are modifying them */
d77953b9 60 cpu->current_tb = NULL;
0cac1b66 61
4fadb3bb 62 memset(env->tlb_table, -1, sizeof(env->tlb_table));
88e89a57 63 memset(env->tlb_v_table, -1, sizeof(env->tlb_v_table));
8cd70437 64 memset(cpu->tb_jmp_cache, 0, sizeof(cpu->tb_jmp_cache));
0cac1b66 65
88e89a57 66 env->vtlb_index = 0;
0cac1b66
BS
67 env->tlb_flush_addr = -1;
68 env->tlb_flush_mask = 0;
69 tlb_flush_count++;
70}
71
d7a74a9d
PM
72static inline void v_tlb_flush_by_mmuidx(CPUState *cpu, va_list argp)
73{
74 CPUArchState *env = cpu->env_ptr;
75
76#if defined(DEBUG_TLB)
77 printf("tlb_flush_by_mmuidx:");
78#endif
79 /* must reset current TB so that interrupts cannot modify the
80 links while we are modifying them */
81 cpu->current_tb = NULL;
82
83 for (;;) {
84 int mmu_idx = va_arg(argp, int);
85
86 if (mmu_idx < 0) {
87 break;
88 }
89
90#if defined(DEBUG_TLB)
91 printf(" %d", mmu_idx);
92#endif
93
94 memset(env->tlb_table[mmu_idx], -1, sizeof(env->tlb_table[0]));
95 memset(env->tlb_v_table[mmu_idx], -1, sizeof(env->tlb_v_table[0]));
96 }
97
98#if defined(DEBUG_TLB)
99 printf("\n");
100#endif
101
102 memset(cpu->tb_jmp_cache, 0, sizeof(cpu->tb_jmp_cache));
103}
104
105void tlb_flush_by_mmuidx(CPUState *cpu, ...)
106{
107 va_list argp;
108 va_start(argp, cpu);
109 v_tlb_flush_by_mmuidx(cpu, argp);
110 va_end(argp);
111}
112
0cac1b66
BS
113static inline void tlb_flush_entry(CPUTLBEntry *tlb_entry, target_ulong addr)
114{
115 if (addr == (tlb_entry->addr_read &
116 (TARGET_PAGE_MASK | TLB_INVALID_MASK)) ||
117 addr == (tlb_entry->addr_write &
118 (TARGET_PAGE_MASK | TLB_INVALID_MASK)) ||
119 addr == (tlb_entry->addr_code &
120 (TARGET_PAGE_MASK | TLB_INVALID_MASK))) {
4fadb3bb 121 memset(tlb_entry, -1, sizeof(*tlb_entry));
0cac1b66
BS
122 }
123}
124
31b030d4 125void tlb_flush_page(CPUState *cpu, target_ulong addr)
0cac1b66 126{
31b030d4 127 CPUArchState *env = cpu->env_ptr;
0cac1b66
BS
128 int i;
129 int mmu_idx;
130
131#if defined(DEBUG_TLB)
132 printf("tlb_flush_page: " TARGET_FMT_lx "\n", addr);
133#endif
134 /* Check if we need to flush due to large pages. */
135 if ((addr & env->tlb_flush_mask) == env->tlb_flush_addr) {
136#if defined(DEBUG_TLB)
137 printf("tlb_flush_page: forced full flush ("
138 TARGET_FMT_lx "/" TARGET_FMT_lx ")\n",
139 env->tlb_flush_addr, env->tlb_flush_mask);
140#endif
00c8cb0a 141 tlb_flush(cpu, 1);
0cac1b66
BS
142 return;
143 }
144 /* must reset current TB so that interrupts cannot modify the
145 links while we are modifying them */
d77953b9 146 cpu->current_tb = NULL;
0cac1b66
BS
147
148 addr &= TARGET_PAGE_MASK;
149 i = (addr >> TARGET_PAGE_BITS) & (CPU_TLB_SIZE - 1);
150 for (mmu_idx = 0; mmu_idx < NB_MMU_MODES; mmu_idx++) {
151 tlb_flush_entry(&env->tlb_table[mmu_idx][i], addr);
152 }
153
88e89a57
XT
154 /* check whether there are entries that need to be flushed in the vtlb */
155 for (mmu_idx = 0; mmu_idx < NB_MMU_MODES; mmu_idx++) {
156 int k;
157 for (k = 0; k < CPU_VTLB_SIZE; k++) {
158 tlb_flush_entry(&env->tlb_v_table[mmu_idx][k], addr);
159 }
160 }
161
611d4f99 162 tb_flush_jmp_cache(cpu, addr);
0cac1b66
BS
163}
164
d7a74a9d
PM
165void tlb_flush_page_by_mmuidx(CPUState *cpu, target_ulong addr, ...)
166{
167 CPUArchState *env = cpu->env_ptr;
168 int i, k;
169 va_list argp;
170
171 va_start(argp, addr);
172
173#if defined(DEBUG_TLB)
174 printf("tlb_flush_page_by_mmu_idx: " TARGET_FMT_lx, addr);
175#endif
176 /* Check if we need to flush due to large pages. */
177 if ((addr & env->tlb_flush_mask) == env->tlb_flush_addr) {
178#if defined(DEBUG_TLB)
179 printf(" forced full flush ("
180 TARGET_FMT_lx "/" TARGET_FMT_lx ")\n",
181 env->tlb_flush_addr, env->tlb_flush_mask);
182#endif
183 v_tlb_flush_by_mmuidx(cpu, argp);
184 va_end(argp);
185 return;
186 }
187 /* must reset current TB so that interrupts cannot modify the
188 links while we are modifying them */
189 cpu->current_tb = NULL;
190
191 addr &= TARGET_PAGE_MASK;
192 i = (addr >> TARGET_PAGE_BITS) & (CPU_TLB_SIZE - 1);
193
194 for (;;) {
195 int mmu_idx = va_arg(argp, int);
196
197 if (mmu_idx < 0) {
198 break;
199 }
200
201#if defined(DEBUG_TLB)
202 printf(" %d", mmu_idx);
203#endif
204
205 tlb_flush_entry(&env->tlb_table[mmu_idx][i], addr);
206
207 /* check whether there are vltb entries that need to be flushed */
208 for (k = 0; k < CPU_VTLB_SIZE; k++) {
209 tlb_flush_entry(&env->tlb_v_table[mmu_idx][k], addr);
210 }
211 }
212 va_end(argp);
213
214#if defined(DEBUG_TLB)
215 printf("\n");
216#endif
217
218 tb_flush_jmp_cache(cpu, addr);
219}
220
0cac1b66
BS
221/* update the TLBs so that writes to code in the virtual page 'addr'
222 can be detected */
223void tlb_protect_code(ram_addr_t ram_addr)
224{
03eebc9e
SH
225 cpu_physical_memory_test_and_clear_dirty(ram_addr, TARGET_PAGE_SIZE,
226 DIRTY_MEMORY_CODE);
0cac1b66
BS
227}
228
229/* update the TLB so that writes in physical page 'phys_addr' are no longer
230 tested for self modifying code */
9564f52d 231void tlb_unprotect_code(ram_addr_t ram_addr)
0cac1b66 232{
52159192 233 cpu_physical_memory_set_dirty_flag(ram_addr, DIRTY_MEMORY_CODE);
0cac1b66
BS
234}
235
236static bool tlb_is_dirty_ram(CPUTLBEntry *tlbe)
237{
238 return (tlbe->addr_write & (TLB_INVALID_MASK|TLB_MMIO|TLB_NOTDIRTY)) == 0;
239}
240
241void tlb_reset_dirty_range(CPUTLBEntry *tlb_entry, uintptr_t start,
242 uintptr_t length)
243{
244 uintptr_t addr;
245
246 if (tlb_is_dirty_ram(tlb_entry)) {
247 addr = (tlb_entry->addr_write & TARGET_PAGE_MASK) + tlb_entry->addend;
248 if ((addr - start) < length) {
249 tlb_entry->addr_write |= TLB_NOTDIRTY;
250 }
251 }
252}
253
7443b437
PB
254static inline ram_addr_t qemu_ram_addr_from_host_nofail(void *ptr)
255{
256 ram_addr_t ram_addr;
257
1b5ec234 258 if (qemu_ram_addr_from_host(ptr, &ram_addr) == NULL) {
7443b437
PB
259 fprintf(stderr, "Bad ram pointer %p\n", ptr);
260 abort();
261 }
262 return ram_addr;
263}
264
9a13565d 265void tlb_reset_dirty(CPUState *cpu, ram_addr_t start1, ram_addr_t length)
0cac1b66
BS
266{
267 CPUArchState *env;
268
9a13565d 269 int mmu_idx;
0cac1b66 270
9a13565d
PC
271 env = cpu->env_ptr;
272 for (mmu_idx = 0; mmu_idx < NB_MMU_MODES; mmu_idx++) {
273 unsigned int i;
0cac1b66 274
9a13565d
PC
275 for (i = 0; i < CPU_TLB_SIZE; i++) {
276 tlb_reset_dirty_range(&env->tlb_table[mmu_idx][i],
277 start1, length);
278 }
88e89a57 279
9a13565d
PC
280 for (i = 0; i < CPU_VTLB_SIZE; i++) {
281 tlb_reset_dirty_range(&env->tlb_v_table[mmu_idx][i],
282 start1, length);
0cac1b66
BS
283 }
284 }
285}
286
287static inline void tlb_set_dirty1(CPUTLBEntry *tlb_entry, target_ulong vaddr)
288{
289 if (tlb_entry->addr_write == (vaddr | TLB_NOTDIRTY)) {
290 tlb_entry->addr_write = vaddr;
291 }
292}
293
294/* update the TLB corresponding to virtual page vaddr
295 so that it is no longer dirty */
bcae01e4 296void tlb_set_dirty(CPUState *cpu, target_ulong vaddr)
0cac1b66 297{
bcae01e4 298 CPUArchState *env = cpu->env_ptr;
0cac1b66
BS
299 int i;
300 int mmu_idx;
301
302 vaddr &= TARGET_PAGE_MASK;
303 i = (vaddr >> TARGET_PAGE_BITS) & (CPU_TLB_SIZE - 1);
304 for (mmu_idx = 0; mmu_idx < NB_MMU_MODES; mmu_idx++) {
305 tlb_set_dirty1(&env->tlb_table[mmu_idx][i], vaddr);
306 }
88e89a57
XT
307
308 for (mmu_idx = 0; mmu_idx < NB_MMU_MODES; mmu_idx++) {
309 int k;
310 for (k = 0; k < CPU_VTLB_SIZE; k++) {
311 tlb_set_dirty1(&env->tlb_v_table[mmu_idx][k], vaddr);
312 }
313 }
0cac1b66
BS
314}
315
316/* Our TLB does not support large pages, so remember the area covered by
317 large pages and trigger a full TLB flush if these are invalidated. */
318static void tlb_add_large_page(CPUArchState *env, target_ulong vaddr,
319 target_ulong size)
320{
321 target_ulong mask = ~(size - 1);
322
323 if (env->tlb_flush_addr == (target_ulong)-1) {
324 env->tlb_flush_addr = vaddr & mask;
325 env->tlb_flush_mask = mask;
326 return;
327 }
328 /* Extend the existing region to include the new page.
329 This is a compromise between unnecessary flushes and the cost
330 of maintaining a full variable size TLB. */
331 mask &= env->tlb_flush_mask;
332 while (((env->tlb_flush_addr ^ vaddr) & mask) != 0) {
333 mask <<= 1;
334 }
335 env->tlb_flush_addr &= mask;
336 env->tlb_flush_mask = mask;
337}
338
339/* Add a new TLB entry. At most one entry for a given virtual address
79e2b9ae
PB
340 * is permitted. Only a single TARGET_PAGE_SIZE region is mapped, the
341 * supplied size is only used by tlb_flush_page.
342 *
343 * Called from TCG-generated code, which is under an RCU read-side
344 * critical section.
345 */
fadc1cbe
PM
346void tlb_set_page_with_attrs(CPUState *cpu, target_ulong vaddr,
347 hwaddr paddr, MemTxAttrs attrs, int prot,
348 int mmu_idx, target_ulong size)
0cac1b66 349{
0c591eb0 350 CPUArchState *env = cpu->env_ptr;
0cac1b66
BS
351 MemoryRegionSection *section;
352 unsigned int index;
353 target_ulong address;
354 target_ulong code_address;
355 uintptr_t addend;
356 CPUTLBEntry *te;
149f54b5 357 hwaddr iotlb, xlat, sz;
88e89a57 358 unsigned vidx = env->vtlb_index++ % CPU_VTLB_SIZE;
0cac1b66
BS
359
360 assert(size >= TARGET_PAGE_SIZE);
361 if (size != TARGET_PAGE_SIZE) {
362 tlb_add_large_page(env, vaddr, size);
363 }
149f54b5
PB
364
365 sz = size;
9d82b5a7 366 section = address_space_translate_for_iotlb(cpu, paddr, &xlat, &sz);
149f54b5
PB
367 assert(sz >= TARGET_PAGE_SIZE);
368
0cac1b66 369#if defined(DEBUG_TLB)
339aaf5b
AP
370 qemu_log_mask(CPU_LOG_MMU,
371 "tlb_set_page: vaddr=" TARGET_FMT_lx " paddr=0x" TARGET_FMT_plx
54b949d2
HP
372 " prot=%x idx=%d\n",
373 vaddr, paddr, prot, mmu_idx);
0cac1b66
BS
374#endif
375
376 address = vaddr;
8f3e03cb
PB
377 if (!memory_region_is_ram(section->mr) && !memory_region_is_romd(section->mr)) {
378 /* IO memory case */
0cac1b66 379 address |= TLB_MMIO;
8f3e03cb
PB
380 addend = 0;
381 } else {
382 /* TLB_MMIO for rom/romd handled below */
149f54b5 383 addend = (uintptr_t)memory_region_get_ram_ptr(section->mr) + xlat;
0cac1b66 384 }
0cac1b66
BS
385
386 code_address = address;
bb0e627a 387 iotlb = memory_region_section_get_iotlb(cpu, section, vaddr, paddr, xlat,
149f54b5 388 prot, &address);
0cac1b66
BS
389
390 index = (vaddr >> TARGET_PAGE_BITS) & (CPU_TLB_SIZE - 1);
0cac1b66 391 te = &env->tlb_table[mmu_idx][index];
88e89a57
XT
392
393 /* do not discard the translation in te, evict it into a victim tlb */
394 env->tlb_v_table[mmu_idx][vidx] = *te;
395 env->iotlb_v[mmu_idx][vidx] = env->iotlb[mmu_idx][index];
396
397 /* refill the tlb */
e469b22f 398 env->iotlb[mmu_idx][index].addr = iotlb - vaddr;
fadc1cbe 399 env->iotlb[mmu_idx][index].attrs = attrs;
0cac1b66
BS
400 te->addend = addend - vaddr;
401 if (prot & PAGE_READ) {
402 te->addr_read = address;
403 } else {
404 te->addr_read = -1;
405 }
406
407 if (prot & PAGE_EXEC) {
408 te->addr_code = code_address;
409 } else {
410 te->addr_code = -1;
411 }
412 if (prot & PAGE_WRITE) {
413 if ((memory_region_is_ram(section->mr) && section->readonly)
cc5bea60 414 || memory_region_is_romd(section->mr)) {
0cac1b66
BS
415 /* Write access calls the I/O callback. */
416 te->addr_write = address | TLB_MMIO;
417 } else if (memory_region_is_ram(section->mr)
a2cd8c85
JQ
418 && cpu_physical_memory_is_clean(section->mr->ram_addr
419 + xlat)) {
0cac1b66
BS
420 te->addr_write = address | TLB_NOTDIRTY;
421 } else {
422 te->addr_write = address;
423 }
424 } else {
425 te->addr_write = -1;
426 }
427}
428
fadc1cbe
PM
429/* Add a new TLB entry, but without specifying the memory
430 * transaction attributes to be used.
431 */
432void tlb_set_page(CPUState *cpu, target_ulong vaddr,
433 hwaddr paddr, int prot,
434 int mmu_idx, target_ulong size)
435{
436 tlb_set_page_with_attrs(cpu, vaddr, paddr, MEMTXATTRS_UNSPECIFIED,
437 prot, mmu_idx, size);
438}
439
0cac1b66
BS
440/* NOTE: this function can trigger an exception */
441/* NOTE2: the returned address is not exactly the physical address: it
116aae36
PM
442 * is actually a ram_addr_t (in system mode; the user mode emulation
443 * version of this function returns a guest virtual address).
444 */
0cac1b66
BS
445tb_page_addr_t get_page_addr_code(CPUArchState *env1, target_ulong addr)
446{
447 int mmu_idx, page_index, pd;
448 void *p;
449 MemoryRegion *mr;
09daed84 450 CPUState *cpu = ENV_GET_CPU(env1);
0cac1b66
BS
451
452 page_index = (addr >> TARGET_PAGE_BITS) & (CPU_TLB_SIZE - 1);
97ed5ccd 453 mmu_idx = cpu_mmu_index(env1, true);
0cac1b66
BS
454 if (unlikely(env1->tlb_table[mmu_idx][page_index].addr_code !=
455 (addr & TARGET_PAGE_MASK))) {
0cac1b66 456 cpu_ldub_code(env1, addr);
0cac1b66 457 }
e469b22f 458 pd = env1->iotlb[mmu_idx][page_index].addr & ~TARGET_PAGE_MASK;
9d82b5a7 459 mr = iotlb_to_region(cpu, pd);
0cac1b66 460 if (memory_region_is_unassigned(mr)) {
c658b94f
AF
461 CPUClass *cc = CPU_GET_CLASS(cpu);
462
463 if (cc->do_unassigned_access) {
464 cc->do_unassigned_access(cpu, addr, false, true, 0, 4);
465 } else {
a47dddd7 466 cpu_abort(cpu, "Trying to execute code outside RAM or ROM at 0x"
c658b94f
AF
467 TARGET_FMT_lx "\n", addr);
468 }
0cac1b66
BS
469 }
470 p = (void *)((uintptr_t)addr + env1->tlb_table[mmu_idx][page_index].addend);
471 return qemu_ram_addr_from_host_nofail(p);
472}
473
0f590e74
PB
474#define MMUSUFFIX _mmu
475
476#define SHIFT 0
58ed270d 477#include "softmmu_template.h"
0f590e74
PB
478
479#define SHIFT 1
58ed270d 480#include "softmmu_template.h"
0f590e74
PB
481
482#define SHIFT 2
58ed270d 483#include "softmmu_template.h"
0f590e74
PB
484
485#define SHIFT 3
58ed270d 486#include "softmmu_template.h"
0f590e74
PB
487#undef MMUSUFFIX
488
0cac1b66 489#define MMUSUFFIX _cmmu
7e4e8865
SW
490#undef GETPC_ADJ
491#define GETPC_ADJ 0
492#undef GETRA
493#define GETRA() ((uintptr_t)0)
0cac1b66
BS
494#define SOFTMMU_CODE_ACCESS
495
496#define SHIFT 0
58ed270d 497#include "softmmu_template.h"
0cac1b66
BS
498
499#define SHIFT 1
58ed270d 500#include "softmmu_template.h"
0cac1b66
BS
501
502#define SHIFT 2
58ed270d 503#include "softmmu_template.h"
0cac1b66
BS
504
505#define SHIFT 3
58ed270d 506#include "softmmu_template.h"