Signed-off-by: Richard Henderson <richard.hender...@linaro.org> --- target/arm/internals.h | 2 +- target/arm/ptw.c | 8 ++++---- target/arm/tcg/m_helper.c | 7 +++---- 3 files changed, 8 insertions(+), 9 deletions(-)
diff --git a/target/arm/internals.h b/target/arm/internals.h index 629aa7bc23..1781943fac 100644 --- a/target/arm/internals.h +++ b/target/arm/internals.h @@ -1535,7 +1535,7 @@ typedef struct V8M_SAttributes { } V8M_SAttributes; void v8m_security_lookup(CPUARMState *env, uint32_t address, - MMUAccessType access_type, ARMMMUIdx mmu_idx, + unsigned access_perm, ARMMMUIdx mmu_idx, bool secure, V8M_SAttributes *sattrs); /* Cacheability and shareability attributes for a memory access */ diff --git a/target/arm/ptw.c b/target/arm/ptw.c index 78a9c21fab..709dfa2684 100644 --- a/target/arm/ptw.c +++ b/target/arm/ptw.c @@ -2770,7 +2770,7 @@ static bool v8m_is_sau_exempt(CPUARMState *env, } void v8m_security_lookup(CPUARMState *env, uint32_t address, - MMUAccessType access_type, ARMMMUIdx mmu_idx, + unsigned access_perm, ARMMMUIdx mmu_idx, bool is_secure, V8M_SAttributes *sattrs) { /* @@ -2793,12 +2793,12 @@ void v8m_security_lookup(CPUARMState *env, uint32_t address, &idau_nsc); } - if (access_type == MMU_INST_FETCH && extract32(address, 28, 4) == 0xf) { + if ((access_perm & PAGE_EXEC) && extract32(address, 28, 4) == 0xf) { /* 0xf0000000..0xffffffff is always S for insn fetches */ return; } - if (idau_exempt || v8m_is_sau_exempt(env, address, 1 << access_type)) { + if (idau_exempt || v8m_is_sau_exempt(env, address, access_perm)) { sattrs->ns = !is_secure; return; } @@ -2891,7 +2891,7 @@ static bool get_phys_addr_pmsav8(CPUARMState *env, bool ret; if (arm_feature(env, ARM_FEATURE_M_SECURITY)) { - v8m_security_lookup(env, address, access_type, mmu_idx, + v8m_security_lookup(env, address, 1 << access_type, mmu_idx, secure, &sattrs); if (access_type == MMU_INST_FETCH) { /* diff --git a/target/arm/tcg/m_helper.c b/target/arm/tcg/m_helper.c index 220a3b472f..e52ab261be 100644 --- a/target/arm/tcg/m_helper.c +++ b/target/arm/tcg/m_helper.c @@ -684,7 +684,7 @@ static bool arm_v7m_load_vector(ARMCPU *cpu, int exc, bool targets_secure, if (arm_feature(env, ARM_FEATURE_M_SECURITY)) { V8M_SAttributes sattrs = {}; - v8m_security_lookup(env, addr, MMU_DATA_LOAD, mmu_idx, + v8m_security_lookup(env, addr, PAGE_READ, mmu_idx, targets_secure, &sattrs); if (sattrs.ns) { attrs.secure = false; @@ -1996,7 +1996,7 @@ static bool v7m_read_half_insn(ARMCPU *cpu, ARMMMUIdx mmu_idx, bool secure, ARMMMUFaultInfo fi = {}; MemTxResult txres; - v8m_security_lookup(env, addr, MMU_INST_FETCH, mmu_idx, secure, &sattrs); + v8m_security_lookup(env, addr, PAGE_EXEC, mmu_idx, secure, &sattrs); if (!sattrs.nsc || sattrs.ns) { /* * This must be the second half of the insn, and it straddles a @@ -2838,8 +2838,7 @@ uint32_t HELPER(v7m_tt)(CPUARMState *env, uint32_t addr, uint32_t op) } if (env->v7m.secure) { - v8m_security_lookup(env, addr, MMU_DATA_LOAD, mmu_idx, - targetsec, &sattrs); + v8m_security_lookup(env, addr, PAGE_READ, mmu_idx, targetsec, &sattrs); nsr = sattrs.ns && r; nsrw = sattrs.ns && rw; } else { -- 2.43.0