Michael Davidsaver 542b3478a0 armv7m: Replace armv7m.hack with unassigned_access handler
For v7m we need to catch attempts to execute from special
addresses at 0xfffffff0 and above. Previously we did this
with the aid of a hacky special purpose lump of memory
in the address space and a check in translate.c for whether
we were translating code at those addresses.

We can implement this more cleanly using a CPU
unassigned access handler which throws the exception
if the unassigned access is for one of the special addresses.

Signed-off-by: Michael Davidsaver <mdavidsaver@gmail.com>
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
Message-id: 1484937883-1068-3-git-send-email-peter.maydell@linaro.org
[PMM:
 * drop the deletion of the "don't interrupt if PC is magic"
   code in arm_v7m_cpu_exec_interrupt() -- this is still
   required
 * don't generate an exception for unassigned accesses
   which aren't to the magic address -- although doing
   this is in theory correct in practice it will break
   currently working guests which rely on the RAZ/WI
   behaviour when they touch devices which we haven't
   modelled.
 * trigger EXCP_EXCEPTION_EXIT on is_exec, not !is_write
]
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
2017-01-27 15:20:21 +00:00
..
2016-10-04 13:28:07 +01:00
2016-10-24 15:46:10 +02:00
2017-01-24 23:26:52 +03:00
2016-06-17 16:33:48 +10:00
2017-01-25 10:42:26 +00:00
2017-01-20 11:15:06 +00:00
2017-01-10 14:52:34 +00:00
2016-05-18 15:04:27 +03:00
2017-01-18 22:59:53 +02:00
2017-01-25 10:42:26 +00:00
2017-01-24 17:54:47 +00:00
2017-01-25 10:42:26 +00:00
2016-01-29 15:07:25 +00:00
2017-01-24 23:26:52 +03:00
2017-01-24 23:26:52 +03:00
2017-01-25 10:42:26 +00:00
2016-09-22 18:13:08 +01:00
2017-01-25 13:30:23 +00:00
2016-10-28 18:17:24 +03:00
2016-09-15 15:32:22 +03:00
2017-01-25 10:42:26 +00:00
2017-01-25 10:42:26 +00:00