Line data Source code
1 : // SPDX-License-Identifier: Apache-2.0
2 : // Copyright lowRISC contributors.
3 : // Copyright 2023 Antmicro, Ltd. <www.antmicro.com>
4 : //
5 : // Licensed under the Apache License, Version 2.0 (the "License");
6 : // you may not use this file except in compliance with the License.
7 : // You may obtain a copy of the License at
8 : //
9 : // http://www.apache.org/licenses/LICENSE-2.0
10 : //
11 : // Unless required by applicable law or agreed to in writing, software
12 : // distributed under the License is distributed on an "AS IS" BASIS,
13 : // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 : // See the License for the specific language governing permissions and
15 : // limitations under the License.
16 :
17 : module el2_pmp
18 : import el2_pkg::*;
19 : #(
20 : parameter PMP_CHANNELS = 3,
21 : // Granularity of NAPOT access,
22 : // 0 = No restriction, 1 = 8 byte, 2 = 16 byte, 3 = 32 byte, etc.
23 : parameter PMP_GRANULARITY = 0, // TODO: Move to veer.config
24 : `include "el2_param.vh"
25 : ) (
26 115892239 : input logic clk, // Top level clock
27 302 : input logic rst_l, // Reset
28 : /* pragma coverage off */
29 : input logic scan_mode, // Scan mode
30 : /* pragma coverage on */
31 :
32 : `ifdef RV_SMEPMP
33 4 : input el2_mseccfg_pkt_t mseccfg, // mseccfg CSR content, RLB, MMWP and MML bits
34 : `endif
35 :
36 : `ifdef RV_USER_MODE
37 420 : input logic priv_mode_ns, // operating privilege mode (next clock cycle)
38 474 : input logic priv_mode_eff, // operating effective privilege mode
39 : `endif
40 :
41 89 : input el2_pmp_cfg_pkt_t pmp_pmpcfg [pt.PMP_ENTRIES],
42 : input logic [31:0] pmp_pmpaddr[pt.PMP_ENTRIES],
43 :
44 8909947 : input logic [31:0] pmp_chan_addr[PMP_CHANNELS],
45 2073618 : input el2_pmp_type_pkt_t pmp_chan_type[PMP_CHANNELS],
46 79761 : output logic pmp_chan_err [PMP_CHANNELS]
47 : );
48 :
49 : logic [ 33:0] csr_pmp_addr_i [pt.PMP_ENTRIES];
50 8909947 : logic [ 33:0] pmp_req_addr_i [ PMP_CHANNELS];
51 :
52 : logic [ 33:0] region_start_addr [pt.PMP_ENTRIES];
53 : logic [33:PMP_GRANULARITY+2] region_addr_mask [pt.PMP_ENTRIES];
54 3787206 : logic [ PMP_CHANNELS-1:0][pt.PMP_ENTRIES-1:0] region_match_gt;
55 297199 : logic [ PMP_CHANNELS-1:0][pt.PMP_ENTRIES-1:0] region_match_lt;
56 3787573 : logic [ PMP_CHANNELS-1:0][pt.PMP_ENTRIES-1:0] region_match_eq;
57 186881 : logic [ PMP_CHANNELS-1:0][pt.PMP_ENTRIES-1:0] region_match_all;
58 1151353 : logic [ PMP_CHANNELS-1:0][pt.PMP_ENTRIES-1:0] region_basic_perm_check;
59 84034 : logic [ PMP_CHANNELS-1:0][pt.PMP_ENTRIES-1:0] region_perm_check;
60 :
61 : `ifdef RV_USER_MODE
62 30 : logic any_region_enabled;
63 : `endif
64 :
65 : ///////////////////////
66 : // Functions for PMP //
67 : ///////////////////////
68 :
69 : // Flow of the PMP checking operation follows as below
70 : //
71 : // basic_perm_check ---> perm_check_wrapper ---> orig_perm_check ---/
72 : // |
73 : // region_match_all -----------------> access_fault_check <----------
74 : // |
75 : // \--> pmp_chan_err
76 :
77 : // A wrapper function in which it is decided which form of permission check function gets called
78 7775757744 : function automatic logic perm_check_wrapper(el2_mseccfg_pkt_t csr_pmp_mseccfg,
79 : el2_pmp_cfg_pkt_t csr_pmp_cfg,
80 : el2_pmp_type_pkt_t req_type,
81 : logic priv_mode,
82 : logic permission_check);
83 :
84 7775757744 : return csr_pmp_mseccfg.MML ? mml_perm_check(csr_pmp_cfg,
85 7775757744 : req_type,
86 7775757744 : priv_mode,
87 7775757744 : permission_check) :
88 7775757744 : orig_perm_check(csr_pmp_cfg.lock,
89 7775757744 : priv_mode,
90 7775757744 : permission_check);
91 : endfunction
92 :
93 : // Compute permissions checks that apply when MSECCFG.MML is set. Added for Smepmp support.
94 1826784 : function automatic logic mml_perm_check(el2_pmp_cfg_pkt_t csr_pmp_cfg,
95 : el2_pmp_type_pkt_t pmp_req_type,
96 : logic priv_mode,
97 : logic permission_check);
98 : logic result;
99 1826784 : logic unused_cfg = |csr_pmp_cfg.mode;
100 :
101 1598436 : if (!csr_pmp_cfg.read && csr_pmp_cfg.write) begin
102 : // Special-case shared regions where R = 0, W = 1
103 228348 : unique case ({csr_pmp_cfg.lock, csr_pmp_cfg.execute})
104 : // Read/write in M, read only in U
105 114174 : 2'b00: result =
106 114174 : (pmp_req_type == READ) |
107 114174 : ((pmp_req_type == WRITE) & ~priv_mode);
108 : // Read/write in M/U
109 0 : 2'b01: result =
110 0 : (pmp_req_type == READ) |
111 0 : (pmp_req_type == WRITE);
112 : // Execute only on M/U
113 0 : 2'b10: result = (pmp_req_type == EXEC);
114 : // Read/execute in M, execute only on U
115 114174 : 2'b11: result =
116 114174 : (pmp_req_type == EXEC) |
117 114174 : ((pmp_req_type == READ) & ~priv_mode);
118 : /* pragma coverage off */
119 : default: ;
120 : /* pragma coverage on */
121 : endcase
122 1598436 : end else begin
123 1598436 : if (csr_pmp_cfg.read & csr_pmp_cfg.write & csr_pmp_cfg.execute & csr_pmp_cfg.lock) begin
124 : // Special-case shared read only region when R = 1, W = 1, X = 1, L = 1
125 0 : result = (pmp_req_type == READ);
126 1598436 : end else begin
127 : // Otherwise use basic permission check. Permission is always denied if in U mode and
128 : // L is set or if in M mode and L is unset.
129 1598436 : result = permission_check & (priv_mode ? ~csr_pmp_cfg.lock : csr_pmp_cfg.lock);
130 : end
131 : end
132 1826784 : return result;
133 : endfunction
134 :
135 : // Compute permissions checks that apply when MSECCFG.MML is unset. This is the original PMP
136 : // behaviour before Smepmp was added.
137 7773930960 : function automatic logic orig_perm_check(logic pmp_cfg_lock,
138 : logic priv_mode,
139 : logic permission_check);
140 : // For M-mode, any region which matches with the L-bit clear, or with sufficient
141 : // access permissions will be allowed.
142 : // For other modes, the lock bit doesn't matter
143 7773930960 : return priv_mode ? (permission_check) : (~pmp_cfg_lock | permission_check);
144 : endfunction
145 :
146 : // Access fault determination / prioritization
147 556329366 : function automatic logic access_fault_check(el2_mseccfg_pkt_t csr_pmp_mseccfg,
148 : el2_pmp_type_pkt_t req_type,
149 : logic [pt.PMP_ENTRIES-1:0] match_all,
150 : logic any_region_enabled,
151 : logic priv_mode,
152 : logic [pt.PMP_ENTRIES-1:0] final_perm_check);
153 :
154 : `ifdef RV_USER_MODE
155 : `ifdef RV_SMEPMP
156 : // When MSECCFG.MMWP is set default deny always, otherwise allow for M-mode, deny for other
157 : // modes. Also deny unmatched for M-mode when MSECCFG.MML is set and request type is EXEC.
158 305158245 : logic access_fail = csr_pmp_mseccfg.MMWP | priv_mode |
159 305158245 : (csr_pmp_mseccfg.MML && (req_type == EXEC));
160 : `else
161 : // When in user mode and at least one PMP region is enabled deny access by default.
162 : logic access_fail = any_region_enabled & priv_mode;
163 : `endif
164 : `else
165 251171121 : logic access_fail = 1'b0;
166 : `endif
167 :
168 556329366 : logic matched = 1'b0;
169 :
170 : // PMP entries are statically prioritized, from 0 to N-1
171 : // The lowest-numbered PMP entry which matches an address determines accessibility
172 8901269856 : for (int r = 0; r < pt.PMP_ENTRIES; r++) begin
173 8683012074 : if (!matched && match_all[r]) begin
174 218257782 : access_fail = ~final_perm_check[r];
175 218257782 : matched = 1'b1;
176 : end
177 : end
178 556329366 : return access_fail;
179 : endfunction
180 :
181 : // ---------------
182 : // Access checking
183 : // ---------------
184 :
185 : `ifdef RV_USER_MODE
186 36 : logic [pt.PMP_ENTRIES-1:0] region_enabled;
187 : for (genvar r = 0; r < pt.PMP_ENTRIES; r++) begin : g_reg_ena
188 : assign region_enabled[r] = pmp_pmpcfg[r].mode != OFF;
189 : end
190 : assign any_region_enabled = |region_enabled;
191 : `endif
192 :
193 : for (genvar r = 0; r < pt.PMP_ENTRIES; r++) begin : g_addr_exp
194 : assign csr_pmp_addr_i[r] = {
195 : pmp_pmpaddr[r], 2'b00
196 : }; // addr conv.: word @ 32-bit -> byte @ 34-bit
197 : // Start address for TOR matching
198 : if (r == 0) begin : g_entry0
199 : assign region_start_addr[r] = (pmp_pmpcfg[r].mode == TOR) ? 34'h000000000 : csr_pmp_addr_i[r];
200 : end else begin : g_oth
201 : assign region_start_addr[r] = (pmp_pmpcfg[r].mode == TOR) ? csr_pmp_addr_i[r-1] :
202 : csr_pmp_addr_i[r];
203 : end
204 : // Address mask for NA matching
205 : for (genvar b = PMP_GRANULARITY + 2; b < 34; b++) begin : g_bitmask
206 : if (b == 2) begin : g_bit0
207 : // Always mask bit 2 for NAPOT
208 : assign region_addr_mask[r][b] = (pmp_pmpcfg[r].mode != NAPOT);
209 : end else begin : g_others
210 : // We will mask this bit if it is within the programmed granule
211 : // i.e. addr = yyyy 0111
212 : // ^
213 : // | This bit pos is the top of the mask, all lower bits set
214 : // thus mask = 1111 0000
215 : if (PMP_GRANULARITY == 0) begin : g_region_addr_mask_zero_granularity
216 : assign region_addr_mask[r][b] = (pmp_pmpcfg[r].mode != NAPOT) |
217 : ~&csr_pmp_addr_i[r][b-1:2];
218 : end else begin : g_region_addr_mask_other_granularity
219 : assign region_addr_mask[r][b] = (pmp_pmpcfg[r].mode != NAPOT) |
220 : ~&csr_pmp_addr_i[r][b-1:PMP_GRANULARITY+1];
221 : end
222 : end
223 : end
224 : end
225 :
226 : `ifdef RV_USER_MODE
227 474 : logic [PMP_CHANNELS-1:0] pmp_priv_mode_eff;
228 : for (genvar c = 0; c < PMP_CHANNELS; c++) begin : g_priv_mode_eff
229 : assign pmp_priv_mode_eff[c] = (
230 : ((pmp_chan_type[c] == EXEC) & priv_mode_ns) |
231 : ((pmp_chan_type[c] != EXEC) & priv_mode_eff)); // RW affected by mstatus.MPRV
232 : end
233 : `endif
234 :
235 8901269856 : for (genvar c = 0; c < PMP_CHANNELS; c++) begin : g_access_check
236 : assign pmp_req_addr_i[c] = {2'b00, pmp_chan_addr[c]}; // addr. widening: 32-bit -> 34-bit
237 8901269856 : for (genvar r = 0; r < pt.PMP_ENTRIES; r++) begin : g_regions
238 : // Comparators are sized according to granularity
239 : assign region_match_eq[c][r] = (pmp_req_addr_i[c][33:PMP_GRANULARITY+2] &
240 : region_addr_mask[r]) ==
241 : (region_start_addr[r][33:PMP_GRANULARITY+2] &
242 : region_addr_mask[r]);
243 : assign region_match_gt[c][r] = pmp_req_addr_i[c][33:PMP_GRANULARITY+2] >
244 : region_start_addr[r][33:PMP_GRANULARITY+2];
245 : assign region_match_lt[c][r] = pmp_req_addr_i[c][33:PMP_GRANULARITY+2] <
246 : csr_pmp_addr_i[r][33:PMP_GRANULARITY+2];
247 :
248 8901269856 : always_comb begin
249 8901269856 : region_match_all[c][r] = 1'b0;
250 8901269856 : unique case (pmp_pmpcfg[r].mode)
251 8580909423 : OFF: region_match_all[c][r] = 1'b0;
252 78309 : NA4: region_match_all[c][r] = region_match_eq[c][r];
253 81274425 : NAPOT: region_match_all[c][r] = region_match_eq[c][r];
254 239007699 : TOR: begin
255 239007699 : region_match_all[c][r] = (region_match_eq[c][r] | region_match_gt[c][r]) &
256 239007699 : region_match_lt[c][r];
257 : end
258 0 : default: region_match_all[c][r] = 1'b0;
259 : endcase
260 : end
261 :
262 : // Basic permission check compares cfg register only.
263 : assign region_basic_perm_check[c][r] =
264 : ((pmp_chan_type[c] == EXEC) & pmp_pmpcfg[r].execute) |
265 : ((pmp_chan_type[c] == WRITE) & pmp_pmpcfg[r].write) |
266 : ((pmp_chan_type[c] == READ) & pmp_pmpcfg[r].read);
267 :
268 : // Check specific required permissions since the behaviour is different
269 : // between Smepmp implementation and original PMP.
270 : assign region_perm_check[c][r] = perm_check_wrapper(
271 : `ifdef RV_SMEPMP
272 : mseccfg,
273 : `else
274 : 3'b000,
275 : `endif
276 : pmp_pmpcfg[r],
277 : pmp_chan_type[c],
278 : `ifdef RV_USER_MODE
279 : pmp_priv_mode_eff[c],
280 : `else
281 : 1'b0,
282 : `endif
283 : region_basic_perm_check[c][r]
284 : );
285 :
286 : // Address bits below PMP granularity (which starts at 4 byte) are deliberately unused.
287 : logic unused_sigs;
288 : assign unused_sigs = ^{region_start_addr[r][PMP_GRANULARITY+2-1:0],
289 : pmp_req_addr_i[c][PMP_GRANULARITY+2-1:0]};
290 : end
291 :
292 : // Once the permission checks of the regions are done, decide if the access is
293 : // denied by figuring out the matching region and its permission check.
294 : assign pmp_chan_err[c] = access_fault_check(
295 : `ifdef RV_SMEPMP
296 : mseccfg,
297 : `else
298 : 3'b000,
299 : `endif
300 : pmp_chan_type[c],
301 : region_match_all[c],
302 : `ifdef RV_USER_MODE
303 : any_region_enabled,
304 : pmp_priv_mode_eff[c],
305 : `else
306 : 1'b0,
307 : 1'b0,
308 : `endif
309 : region_perm_check[c]);
310 :
311 : end
312 :
313 : endmodule // el2_pmp
|