1 | ARM queue: nothing particularly exciting here, but no | 1 | target-arm queue for rc1 -- these are all bug fixes. |
---|---|---|---|
2 | reason to sit on them for another week. | ||
3 | 2 | ||
4 | thanks | 3 | thanks |
5 | -- PMM | 4 | -- PMM |
6 | 5 | ||
7 | The following changes since commit 61eedf7aec0e2395aabd628cc055096909a3ea15: | 6 | The following changes since commit b9404bf592e7ba74180e1a54ed7a266ec6ee67f2: |
8 | 7 | ||
9 | tests/prom-env: Ease time-out problems on slow hosts (2017-02-10 15:44:53 +0000) | 8 | Merge remote-tracking branch 'remotes/dgilbert/tags/pull-hmp-20190715' into staging (2019-07-15 12:22:07 +0100) |
10 | 9 | ||
11 | are available in the git repository at: | 10 | are available in the Git repository at: |
12 | 11 | ||
13 | git://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20170210 | 12 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20190715 |
14 | 13 | ||
15 | for you to fetch changes up to b4cc583f0285a2e1e78621dfba142f00ca47414a: | 14 | for you to fetch changes up to 51c9122e92b776a3f16af0b9282f1dc5012e2a19: |
16 | 15 | ||
17 | aspeed/smc: use a modulo to check segment limits (2017-02-10 17:40:30 +0000) | 16 | target/arm: NS BusFault on vector table fetch escalates to NS HardFault (2019-07-15 14:17:04 +0100) |
18 | 17 | ||
19 | ---------------------------------------------------------------- | 18 | ---------------------------------------------------------------- |
20 | target-arm queue: | 19 | target-arm queue: |
21 | * aspeed: minor fixes | 20 | * report ARMv8-A FP support for AArch32 -cpu max |
22 | * virt: declare fwcfg and virtio-mmio as DMA coherent in DT & ACPI | 21 | * hw/ssi/xilinx_spips: Avoid AXI writes to the LQSPI linear memory |
23 | * arm: enable basic TCG emulation of PMU for AArch64 | 22 | * hw/ssi/xilinx_spips: Avoid out-of-bound access to lqspi_buf[] |
23 | * hw/ssi/mss-spi: Avoid crash when reading empty RX FIFO | ||
24 | * hw/display/xlnx_dp: Avoid crash when reading empty RX FIFO | ||
25 | * hw/arm/virt: Fix non-secure flash mode | ||
26 | * pl031: Correctly migrate state when using -rtc clock=host | ||
27 | * fix regression that meant arm926 and arm1026 lost VFP | ||
28 | double-precision support | ||
29 | * v8M: NS BusFault on vector table fetch escalates to NS HardFault | ||
24 | 30 | ||
25 | ---------------------------------------------------------------- | 31 | ---------------------------------------------------------------- |
26 | Alexander Graf (4): | 32 | Alex Bennée (1): |
27 | target-arm: Declare virtio-mmio as dma-coherent in dt | 33 | target/arm: report ARMv8-A FP support for AArch32 -cpu max |
28 | hw/arm/virt: Declare virtio-mmio as dma cache coherent in ACPI | ||
29 | hw/arm/virt: Declare fwcfg as dma cache coherent in ACPI | ||
30 | hw/arm/virt: Declare fwcfg as dma cache coherent in dt | ||
31 | 34 | ||
32 | Cédric Le Goater (4): | 35 | David Engraf (1): |
33 | aspeed: check for negative values returned by blk_getlength() | 36 | hw/arm/virt: Fix non-secure flash mode |
34 | aspeed: remove useless comment on controller segment size | ||
35 | aspeed/smc: handle dummies only in fast read mode | ||
36 | aspeed/smc: use a modulo to check segment limits | ||
37 | 37 | ||
38 | Wei Huang (4): | 38 | Peter Maydell (3): |
39 | target-arm: Add support for PMU register PMSELR_EL0 | 39 | pl031: Correctly migrate state when using -rtc clock=host |
40 | target-arm: Add support for AArch64 PMU register PMXEVTYPER_EL0 | 40 | target/arm: Set VFP-related MVFR0 fields for arm926 and arm1026 |
41 | target-arm: Add support for PMU register PMINTENSET_EL1 | 41 | target/arm: NS BusFault on vector table fetch escalates to NS HardFault |
42 | target-arm: Enable vPMU support under TCG mode | ||
43 | 42 | ||
44 | target/arm/cpu.h | 4 +-- | 43 | Philippe Mathieu-Daudé (5): |
45 | hw/arm/aspeed.c | 22 +++++++++----- | 44 | hw/ssi/xilinx_spips: Convert lqspi_read() to read_with_attrs |
46 | hw/arm/vexpress.c | 1 + | 45 | hw/ssi/xilinx_spips: Avoid AXI writes to the LQSPI linear memory |
47 | hw/arm/virt-acpi-build.c | 2 ++ | 46 | hw/ssi/xilinx_spips: Avoid out-of-bound access to lqspi_buf[] |
48 | hw/arm/virt.c | 4 ++- | 47 | hw/ssi/mss-spi: Avoid crash when reading empty RX FIFO |
49 | hw/ssi/aspeed_smc.c | 13 +++++---- | 48 | hw/display/xlnx_dp: Avoid crash when reading empty RX FIFO |
50 | target/arm/cpu.c | 2 +- | ||
51 | target/arm/helper.c | 74 ++++++++++++++++++++++++++++++++++++------------ | ||
52 | 8 files changed, 88 insertions(+), 34 deletions(-) | ||
53 | 49 | ||
50 | include/hw/timer/pl031.h | 2 ++ | ||
51 | hw/arm/virt.c | 2 +- | ||
52 | hw/core/machine.c | 1 + | ||
53 | hw/display/xlnx_dp.c | 15 +++++--- | ||
54 | hw/ssi/mss-spi.c | 8 ++++- | ||
55 | hw/ssi/xilinx_spips.c | 43 +++++++++++++++------- | ||
56 | hw/timer/pl031.c | 92 +++++++++++++++++++++++++++++++++++++++++++++--- | ||
57 | target/arm/cpu.c | 16 +++++++++ | ||
58 | target/arm/m_helper.c | 21 ++++++++--- | ||
59 | 9 files changed, 174 insertions(+), 26 deletions(-) | ||
60 | diff view generated by jsdifflib |
1 | From: Cédric Le Goater <clg@kaod.org> | 1 | From: Alex Bennée <alex.bennee@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | HW works fine in normal read mode with dummy bytes being set. So let's | 3 | When we converted to using feature bits in 602f6e42cfbf we missed out |
4 | check this case to not transfer bytes. | 4 | the fact (dp && arm_dc_feature(s, ARM_FEATURE_V8)) was supported for |
5 | -cpu max configurations. This caused a regression in the GCC test | ||
6 | suite. Fix this by setting the appropriate bits in mvfr1.FPHP to | ||
7 | report ARMv8-A with FP support (but not ARMv8.2-FP16). | ||
5 | 8 | ||
6 | Signed-off-by: Cédric Le Goater <clg@kaod.org> | 9 | Fixes: https://bugs.launchpad.net/qemu/+bug/1836078 |
7 | Message-id: 1486648058-520-4-git-send-email-clg@kaod.org | 10 | Signed-off-by: Alex Bennée <alex.bennee@linaro.org> |
11 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
12 | Message-id: 20190711103737.10017-1-alex.bennee@linaro.org | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | --- | 14 | --- |
10 | hw/ssi/aspeed_smc.c | 9 ++++++--- | 15 | target/arm/cpu.c | 4 ++++ |
11 | 1 file changed, 6 insertions(+), 3 deletions(-) | 16 | 1 file changed, 4 insertions(+) |
12 | 17 | ||
13 | diff --git a/hw/ssi/aspeed_smc.c b/hw/ssi/aspeed_smc.c | 18 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c |
14 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/hw/ssi/aspeed_smc.c | 20 | --- a/target/arm/cpu.c |
16 | +++ b/hw/ssi/aspeed_smc.c | 21 | +++ b/target/arm/cpu.c |
17 | @@ -XXX,XX +XXX,XX @@ static uint64_t aspeed_smc_flash_read(void *opaque, hwaddr addr, unsigned size) | 22 | @@ -XXX,XX +XXX,XX @@ static void arm_max_initfn(Object *obj) |
18 | /* | 23 | t = FIELD_DP32(t, ID_ISAR6, SPECRES, 1); |
19 | * Use fake transfers to model dummy bytes. The value should | 24 | cpu->isar.id_isar6 = t; |
20 | * be configured to some non-zero value in fast read mode and | 25 | |
21 | - * zero in read mode. | 26 | + t = cpu->isar.mvfr1; |
22 | + * zero in read mode. But, as the HW allows inconsistent | 27 | + t = FIELD_DP32(t, MVFR1, FPHP, 2); /* v8.0 FP support */ |
23 | + * settings, let's check for fast read mode. | 28 | + cpu->isar.mvfr1 = t; |
24 | */ | 29 | + |
25 | - for (i = 0; i < aspeed_smc_flash_dummies(fl); i++) { | 30 | t = cpu->isar.mvfr2; |
26 | - ssi_transfer(fl->controller->spi, 0xFF); | 31 | t = FIELD_DP32(t, MVFR2, SIMDMISC, 3); /* SIMD MaxNum */ |
27 | + if (aspeed_smc_flash_mode(fl) == CTRL_FREADMODE) { | 32 | t = FIELD_DP32(t, MVFR2, FPMISC, 4); /* FP MaxNum */ |
28 | + for (i = 0; i < aspeed_smc_flash_dummies(fl); i++) { | ||
29 | + ssi_transfer(fl->controller->spi, 0xFF); | ||
30 | + } | ||
31 | } | ||
32 | |||
33 | for (i = 0; i < size; i++) { | ||
34 | -- | 33 | -- |
35 | 2.7.4 | 34 | 2.20.1 |
36 | 35 | ||
37 | 36 | diff view generated by jsdifflib |
1 | From: Alexander Graf <agraf@suse.de> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | QEMU emulated hardware is always dma coherent with its guest. We do | 3 | In the next commit we will implement the write_with_attrs() |
4 | annotate that correctly on the PCI host controller, but left out | 4 | handler. To avoid using different APIs, convert the read() |
5 | virtio-mmio. | 5 | handler first. |
6 | 6 | ||
7 | Recent kernels have started to interpret that flag rather than take | 7 | Reviewed-by: Francisco Iglesias <frasse.iglesias@gmail.com> |
8 | dma coherency as granted with virtio-mmio. While that is considered | 8 | Tested-by: Francisco Iglesias <frasse.iglesias@gmail.com> |
9 | a kernel bug, as it breaks previously working systems, it showed that | 9 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
10 | our dt description is incomplete. | ||
11 | |||
12 | This patch adds the respective marker that allows guest OSs to evaluate | ||
13 | that our virtio-mmio devices are indeed cache coherent. | ||
14 | |||
15 | Signed-off-by: Alexander Graf <agraf@suse.de> | ||
16 | Reviewed-by: Laszlo Ersek <lersek@redhat.com> | ||
17 | Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> | ||
18 | Message-id: 1486644810-33181-2-git-send-email-agraf@suse.de | ||
19 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
20 | --- | 11 | --- |
21 | hw/arm/vexpress.c | 1 + | 12 | hw/ssi/xilinx_spips.c | 23 +++++++++++------------ |
22 | hw/arm/virt.c | 1 + | 13 | 1 file changed, 11 insertions(+), 12 deletions(-) |
23 | 2 files changed, 2 insertions(+) | ||
24 | 14 | ||
25 | diff --git a/hw/arm/vexpress.c b/hw/arm/vexpress.c | 15 | diff --git a/hw/ssi/xilinx_spips.c b/hw/ssi/xilinx_spips.c |
26 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
27 | --- a/hw/arm/vexpress.c | 17 | --- a/hw/ssi/xilinx_spips.c |
28 | +++ b/hw/arm/vexpress.c | 18 | +++ b/hw/ssi/xilinx_spips.c |
29 | @@ -XXX,XX +XXX,XX @@ static int add_virtio_mmio_node(void *fdt, uint32_t acells, uint32_t scells, | 19 | @@ -XXX,XX +XXX,XX @@ static void lqspi_load_cache(void *opaque, hwaddr addr) |
30 | acells, addr, scells, size); | ||
31 | qemu_fdt_setprop_cells(fdt, nodename, "interrupt-parent", intc); | ||
32 | qemu_fdt_setprop_cells(fdt, nodename, "interrupts", 0, irq, 1); | ||
33 | + qemu_fdt_setprop(fdt, nodename, "dma-coherent", NULL, 0); | ||
34 | g_free(nodename); | ||
35 | if (rc) { | ||
36 | return -1; | ||
37 | diff --git a/hw/arm/virt.c b/hw/arm/virt.c | ||
38 | index XXXXXXX..XXXXXXX 100644 | ||
39 | --- a/hw/arm/virt.c | ||
40 | +++ b/hw/arm/virt.c | ||
41 | @@ -XXX,XX +XXX,XX @@ static void create_virtio_devices(const VirtMachineState *vms, qemu_irq *pic) | ||
42 | qemu_fdt_setprop_cells(vms->fdt, nodename, "interrupts", | ||
43 | GIC_FDT_IRQ_TYPE_SPI, irq, | ||
44 | GIC_FDT_IRQ_FLAGS_EDGE_LO_HI); | ||
45 | + qemu_fdt_setprop(vms->fdt, nodename, "dma-coherent", NULL, 0); | ||
46 | g_free(nodename); | ||
47 | } | 20 | } |
48 | } | 21 | } |
22 | |||
23 | -static uint64_t | ||
24 | -lqspi_read(void *opaque, hwaddr addr, unsigned int size) | ||
25 | +static MemTxResult lqspi_read(void *opaque, hwaddr addr, uint64_t *value, | ||
26 | + unsigned size, MemTxAttrs attrs) | ||
27 | { | ||
28 | - XilinxQSPIPS *q = opaque; | ||
29 | - uint32_t ret; | ||
30 | + XilinxQSPIPS *q = XILINX_QSPIPS(opaque); | ||
31 | |||
32 | if (addr >= q->lqspi_cached_addr && | ||
33 | addr <= q->lqspi_cached_addr + LQSPI_CACHE_SIZE - 4) { | ||
34 | uint8_t *retp = &q->lqspi_buf[addr - q->lqspi_cached_addr]; | ||
35 | - ret = cpu_to_le32(*(uint32_t *)retp); | ||
36 | - DB_PRINT_L(1, "addr: %08x, data: %08x\n", (unsigned)addr, | ||
37 | - (unsigned)ret); | ||
38 | - return ret; | ||
39 | - } else { | ||
40 | - lqspi_load_cache(opaque, addr); | ||
41 | - return lqspi_read(opaque, addr, size); | ||
42 | + *value = cpu_to_le32(*(uint32_t *)retp); | ||
43 | + DB_PRINT_L(1, "addr: %08" HWADDR_PRIx ", data: %08" PRIx64 "\n", | ||
44 | + addr, *value); | ||
45 | + return MEMTX_OK; | ||
46 | } | ||
47 | + | ||
48 | + lqspi_load_cache(opaque, addr); | ||
49 | + return lqspi_read(opaque, addr, value, size, attrs); | ||
50 | } | ||
51 | |||
52 | static const MemoryRegionOps lqspi_ops = { | ||
53 | - .read = lqspi_read, | ||
54 | + .read_with_attrs = lqspi_read, | ||
55 | .endianness = DEVICE_NATIVE_ENDIAN, | ||
56 | .valid = { | ||
57 | .min_access_size = 1, | ||
49 | -- | 58 | -- |
50 | 2.7.4 | 59 | 2.20.1 |
51 | 60 | ||
52 | 61 | diff view generated by jsdifflib |
1 | From: Wei Huang <wei@redhat.com> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | This patch adds support for AArch64 register PMSELR_EL0. The existing | 3 | Lei Sun found while auditing the code that a CPU write would |
4 | PMSELR definition is revised accordingly. | 4 | trigger a NULL pointer dereference. |
5 | 5 | ||
6 | Signed-off-by: Wei Huang <wei@redhat.com> | 6 | >From UG1085 datasheet [*] AXI writes in this region are ignored |
7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 7 | and generates an AXI Slave Error (SLVERR). |
8 | [PMM: Moved #ifndef CONFIG_USER_ONLY to cover new regdefs] | 8 | |
9 | Message-id: 1486504171-26807-2-git-send-email-wei@redhat.com | 9 | Fix by implementing the write_with_attrs() handler. |
10 | Return MEMTX_ERROR when the region is accessed (this error maps | ||
11 | to an AXI slave error). | ||
12 | |||
13 | [*] https://www.xilinx.com/support/documentation/user_guides/ug1085-zynq-ultrascale-trm.pdf | ||
14 | |||
15 | Reported-by: Lei Sun <slei.casper@gmail.com> | ||
16 | Reviewed-by: Francisco Iglesias <frasse.iglesias@gmail.com> | ||
17 | Tested-by: Francisco Iglesias <frasse.iglesias@gmail.com> | ||
18 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 19 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 20 | --- |
12 | target/arm/cpu.h | 1 + | 21 | hw/ssi/xilinx_spips.c | 16 ++++++++++++++++ |
13 | target/arm/helper.c | 27 +++++++++++++++++++++------ | 22 | 1 file changed, 16 insertions(+) |
14 | 2 files changed, 22 insertions(+), 6 deletions(-) | ||
15 | 23 | ||
16 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 24 | diff --git a/hw/ssi/xilinx_spips.c b/hw/ssi/xilinx_spips.c |
17 | index XXXXXXX..XXXXXXX 100644 | 25 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/target/arm/cpu.h | 26 | --- a/hw/ssi/xilinx_spips.c |
19 | +++ b/target/arm/cpu.h | 27 | +++ b/hw/ssi/xilinx_spips.c |
20 | @@ -XXX,XX +XXX,XX @@ typedef struct CPUARMState { | 28 | @@ -XXX,XX +XXX,XX @@ static MemTxResult lqspi_read(void *opaque, hwaddr addr, uint64_t *value, |
21 | uint32_t c9_pmovsr; /* perf monitor overflow status */ | 29 | return lqspi_read(opaque, addr, value, size, attrs); |
22 | uint32_t c9_pmxevtyper; /* perf monitor event type */ | ||
23 | uint32_t c9_pmuserenr; /* perf monitor user enable */ | ||
24 | + uint64_t c9_pmselr; /* perf monitor counter selection register */ | ||
25 | uint32_t c9_pminten; /* perf monitor interrupt enables */ | ||
26 | union { /* Memory attribute redirection */ | ||
27 | struct { | ||
28 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
29 | index XXXXXXX..XXXXXXX 100644 | ||
30 | --- a/target/arm/helper.c | ||
31 | +++ b/target/arm/helper.c | ||
32 | @@ -XXX,XX +XXX,XX @@ static uint64_t pmccntr_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
33 | return total_ticks - env->cp15.c15_ccnt; | ||
34 | } | 30 | } |
35 | 31 | ||
36 | +static void pmselr_write(CPUARMState *env, const ARMCPRegInfo *ri, | 32 | +static MemTxResult lqspi_write(void *opaque, hwaddr offset, uint64_t value, |
37 | + uint64_t value) | 33 | + unsigned size, MemTxAttrs attrs) |
38 | +{ | 34 | +{ |
39 | + /* The value of PMSELR.SEL affects the behavior of PMXEVTYPER and | 35 | + /* |
40 | + * PMXEVCNTR. We allow [0..31] to be written to PMSELR here; in the | 36 | + * From UG1085, Chapter 24 (Quad-SPI controllers): |
41 | + * meanwhile, we check PMSELR.SEL when PMXEVTYPER and PMXEVCNTR are | 37 | + * - Writes are ignored |
42 | + * accessed. | 38 | + * - AXI writes generate an external AXI slave error (SLVERR) |
43 | + */ | 39 | + */ |
44 | + env->cp15.c9_pmselr = value & 0x1f; | 40 | + qemu_log_mask(LOG_GUEST_ERROR, "%s Unexpected %u-bit access to 0x%" PRIx64 |
41 | + " (value: 0x%" PRIx64 "\n", | ||
42 | + __func__, size << 3, offset, value); | ||
43 | + | ||
44 | + return MEMTX_ERROR; | ||
45 | +} | 45 | +} |
46 | + | 46 | + |
47 | static void pmccntr_write(CPUARMState *env, const ARMCPRegInfo *ri, | 47 | static const MemoryRegionOps lqspi_ops = { |
48 | uint64_t value) | 48 | .read_with_attrs = lqspi_read, |
49 | { | 49 | + .write_with_attrs = lqspi_write, |
50 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v7_cp_reginfo[] = { | 50 | .endianness = DEVICE_NATIVE_ENDIAN, |
51 | /* Unimplemented so WI. */ | 51 | .valid = { |
52 | { .name = "PMSWINC", .cp = 15, .crn = 9, .crm = 12, .opc1 = 0, .opc2 = 4, | 52 | .min_access_size = 1, |
53 | .access = PL0_W, .accessfn = pmreg_access, .type = ARM_CP_NOP }, | ||
54 | - /* Since we don't implement any events, writing to PMSELR is UNPREDICTABLE. | ||
55 | - * We choose to RAZ/WI. | ||
56 | - */ | ||
57 | - { .name = "PMSELR", .cp = 15, .crn = 9, .crm = 12, .opc1 = 0, .opc2 = 5, | ||
58 | - .access = PL0_RW, .type = ARM_CP_CONST, .resetvalue = 0, | ||
59 | - .accessfn = pmreg_access }, | ||
60 | #ifndef CONFIG_USER_ONLY | ||
61 | + { .name = "PMSELR", .cp = 15, .crn = 9, .crm = 12, .opc1 = 0, .opc2 = 5, | ||
62 | + .access = PL0_RW, .type = ARM_CP_ALIAS, | ||
63 | + .fieldoffset = offsetoflow32(CPUARMState, cp15.c9_pmselr), | ||
64 | + .accessfn = pmreg_access, .writefn = pmselr_write, | ||
65 | + .raw_writefn = raw_write}, | ||
66 | + { .name = "PMSELR_EL0", .state = ARM_CP_STATE_AA64, | ||
67 | + .opc0 = 3, .opc1 = 3, .crn = 9, .crm = 12, .opc2 = 5, | ||
68 | + .access = PL0_RW, .accessfn = pmreg_access, | ||
69 | + .fieldoffset = offsetof(CPUARMState, cp15.c9_pmselr), | ||
70 | + .writefn = pmselr_write, .raw_writefn = raw_write, }, | ||
71 | { .name = "PMCCNTR", .cp = 15, .crn = 9, .crm = 13, .opc1 = 0, .opc2 = 0, | ||
72 | .access = PL0_RW, .resetvalue = 0, .type = ARM_CP_IO, | ||
73 | .readfn = pmccntr_read, .writefn = pmccntr_write32, | ||
74 | -- | 53 | -- |
75 | 2.7.4 | 54 | 2.20.1 |
76 | 55 | ||
77 | 56 | diff view generated by jsdifflib |
1 | From: Cédric Le Goater <clg@kaod.org> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | The flash devices used for the FMC controller (BMC firmware) are well | 3 | Both lqspi_read() and lqspi_load_cache() expect a 32-bit |
4 | defined for each Aspeed machine and are all smaller than the default | 4 | aligned address. |
5 | mapping window size, at least for CE0 which is the chip the SoC boots | ||
6 | from. | ||
7 | 5 | ||
8 | Signed-off-by: Cédric Le Goater <clg@kaod.org> | 6 | >From UG1085 datasheet [*] chapter on 'Quad-SPI Controller': |
9 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 7 | |
10 | Message-id: 1486648058-520-3-git-send-email-clg@kaod.org | 8 | Transfer Size Limitations |
9 | |||
10 | Because of the 32-bit wide TX, RX, and generic FIFO, all | ||
11 | APB/AXI transfers must be an integer multiple of 4-bytes. | ||
12 | Shorter transfers are not possible. | ||
13 | |||
14 | Set MemoryRegionOps.impl values to force 32-bit accesses, | ||
15 | this way we are sure we do not access the lqspi_buf[] array | ||
16 | out of bound. | ||
17 | |||
18 | [*] https://www.xilinx.com/support/documentation/user_guides/ug1085-zynq-ultrascale-trm.pdf | ||
19 | |||
20 | Reviewed-by: Francisco Iglesias <frasse.iglesias@gmail.com> | ||
21 | Tested-by: Francisco Iglesias <frasse.iglesias@gmail.com> | ||
22 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 23 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | --- | 24 | --- |
13 | hw/arm/aspeed.c | 8 +++----- | 25 | hw/ssi/xilinx_spips.c | 4 ++++ |
14 | 1 file changed, 3 insertions(+), 5 deletions(-) | 26 | 1 file changed, 4 insertions(+) |
15 | 27 | ||
16 | diff --git a/hw/arm/aspeed.c b/hw/arm/aspeed.c | 28 | diff --git a/hw/ssi/xilinx_spips.c b/hw/ssi/xilinx_spips.c |
17 | index XXXXXXX..XXXXXXX 100644 | 29 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/hw/arm/aspeed.c | 30 | --- a/hw/ssi/xilinx_spips.c |
19 | +++ b/hw/arm/aspeed.c | 31 | +++ b/hw/ssi/xilinx_spips.c |
20 | @@ -XXX,XX +XXX,XX @@ static void aspeed_board_init_flashes(AspeedSMCState *s, const char *flashtype, | 32 | @@ -XXX,XX +XXX,XX @@ static const MemoryRegionOps lqspi_ops = { |
21 | DriveInfo *dinfo = drive_get_next(IF_MTD); | 33 | .read_with_attrs = lqspi_read, |
22 | qemu_irq cs_line; | 34 | .write_with_attrs = lqspi_write, |
23 | 35 | .endianness = DEVICE_NATIVE_ENDIAN, | |
24 | - /* | 36 | + .impl = { |
25 | - * FIXME: check that we are not using a flash module exceeding | 37 | + .min_access_size = 4, |
26 | - * the controller segment size | 38 | + .max_access_size = 4, |
27 | - */ | 39 | + }, |
28 | fl->flash = ssi_create_slave_no_init(s->spi, flashtype); | 40 | .valid = { |
29 | if (dinfo) { | 41 | .min_access_size = 1, |
30 | qdev_prop_set_drive(fl->flash, "drive", blk_by_legacy_dinfo(dinfo), | 42 | .max_access_size = 4 |
31 | @@ -XXX,XX +XXX,XX @@ static void aspeed_board_init(MachineState *machine, | ||
32 | |||
33 | /* | ||
34 | * create a ROM region using the default mapping window size of | ||
35 | - * the flash module. | ||
36 | + * the flash module. The window size is 64MB for the AST2400 | ||
37 | + * SoC and 128MB for the AST2500 SoC, which is twice as big as | ||
38 | + * needed by the flash modules of the Aspeed machines. | ||
39 | */ | ||
40 | memory_region_init_rom(boot_rom, OBJECT(bmc), "aspeed.boot_rom", | ||
41 | fl->size, &error_abort); | ||
42 | -- | 43 | -- |
43 | 2.7.4 | 44 | 2.20.1 |
44 | 45 | ||
45 | 46 | diff view generated by jsdifflib |
1 | From: Cédric Le Goater <clg@kaod.org> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | write_boot_rom() does not check for negative values. This is more a | 3 | Reading the RX_DATA register when the RX_FIFO is empty triggers |
4 | problem for coverity than the actual code as the size of the flash | 4 | an abort. This can be easily reproduced: |
5 | device is checked when the m25p80 object is created. If there is | ||
6 | anything wrong with the backing file, we should not even reach that | ||
7 | path. | ||
8 | 5 | ||
9 | Signed-off-by: Cédric Le Goater <clg@kaod.org> | 6 | $ qemu-system-arm -M emcraft-sf2 -monitor stdio -S |
10 | Message-id: 1486648058-520-2-git-send-email-clg@kaod.org | 7 | QEMU 4.0.50 monitor - type 'help' for more information |
11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 8 | (qemu) x 0x40001010 |
9 | Aborted (core dumped) | ||
10 | |||
11 | (gdb) bt | ||
12 | #1 0x00007f035874f895 in abort () at /lib64/libc.so.6 | ||
13 | #2 0x00005628686591ff in fifo8_pop (fifo=0x56286a9a4c68) at util/fifo8.c:66 | ||
14 | #3 0x00005628683e0b8e in fifo32_pop (fifo=0x56286a9a4c68) at include/qemu/fifo32.h:137 | ||
15 | #4 0x00005628683e0efb in spi_read (opaque=0x56286a9a4850, addr=4, size=4) at hw/ssi/mss-spi.c:168 | ||
16 | #5 0x0000562867f96801 in memory_region_read_accessor (mr=0x56286a9a4b60, addr=16, value=0x7ffeecb0c5c8, size=4, shift=0, mask=4294967295, attrs=...) at memory.c:439 | ||
17 | #6 0x0000562867f96cdb in access_with_adjusted_size (addr=16, value=0x7ffeecb0c5c8, size=4, access_size_min=1, access_size_max=4, access_fn=0x562867f967c3 <memory_region_read_accessor>, mr=0x56286a9a4b60, attrs=...) at memory.c:569 | ||
18 | #7 0x0000562867f99940 in memory_region_dispatch_read1 (mr=0x56286a9a4b60, addr=16, pval=0x7ffeecb0c5c8, size=4, attrs=...) at memory.c:1420 | ||
19 | #8 0x0000562867f99a08 in memory_region_dispatch_read (mr=0x56286a9a4b60, addr=16, pval=0x7ffeecb0c5c8, size=4, attrs=...) at memory.c:1447 | ||
20 | #9 0x0000562867f38721 in flatview_read_continue (fv=0x56286aec6360, addr=1073745936, attrs=..., buf=0x7ffeecb0c7c0 "\340ǰ\354\376\177", len=4, addr1=16, l=4, mr=0x56286a9a4b60) at exec.c:3385 | ||
21 | #10 0x0000562867f38874 in flatview_read (fv=0x56286aec6360, addr=1073745936, attrs=..., buf=0x7ffeecb0c7c0 "\340ǰ\354\376\177", len=4) at exec.c:3423 | ||
22 | #11 0x0000562867f388ea in address_space_read_full (as=0x56286aa3e890, addr=1073745936, attrs=..., buf=0x7ffeecb0c7c0 "\340ǰ\354\376\177", len=4) at exec.c:3436 | ||
23 | #12 0x0000562867f389c5 in address_space_rw (as=0x56286aa3e890, addr=1073745936, attrs=..., buf=0x7ffeecb0c7c0 "\340ǰ\354\376\177", len=4, is_write=false) at exec.c:3466 | ||
24 | #13 0x0000562867f3bdd7 in cpu_memory_rw_debug (cpu=0x56286aa19d00, addr=1073745936, buf=0x7ffeecb0c7c0 "\340ǰ\354\376\177", len=4, is_write=0) at exec.c:3976 | ||
25 | #14 0x000056286811ed51 in memory_dump (mon=0x56286a8c32d0, count=1, format=120, wsize=4, addr=1073745936, is_physical=0) at monitor/misc.c:730 | ||
26 | #15 0x000056286811eff1 in hmp_memory_dump (mon=0x56286a8c32d0, qdict=0x56286b15c400) at monitor/misc.c:785 | ||
27 | #16 0x00005628684740ee in handle_hmp_command (mon=0x56286a8c32d0, cmdline=0x56286a8caeb2 "0x40001010") at monitor/hmp.c:1082 | ||
28 | |||
29 | From the datasheet "Actel SmartFusion Microcontroller Subsystem | ||
30 | User's Guide" Rev.1, Table 13-3 "SPI Register Summary", this | ||
31 | register has a reset value of 0. | ||
32 | |||
33 | Check the FIFO is not empty before accessing it, else log an | ||
34 | error message. | ||
35 | |||
36 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
37 | Reviewed-by: Alistair Francis <alistair.francis@wdc.com> | ||
38 | Message-id: 20190709113715.7761-3-philmd@redhat.com | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 39 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
13 | --- | 40 | --- |
14 | hw/arm/aspeed.c | 14 ++++++++++++-- | 41 | hw/ssi/mss-spi.c | 8 +++++++- |
15 | 1 file changed, 12 insertions(+), 2 deletions(-) | 42 | 1 file changed, 7 insertions(+), 1 deletion(-) |
16 | 43 | ||
17 | diff --git a/hw/arm/aspeed.c b/hw/arm/aspeed.c | 44 | diff --git a/hw/ssi/mss-spi.c b/hw/ssi/mss-spi.c |
18 | index XXXXXXX..XXXXXXX 100644 | 45 | index XXXXXXX..XXXXXXX 100644 |
19 | --- a/hw/arm/aspeed.c | 46 | --- a/hw/ssi/mss-spi.c |
20 | +++ b/hw/arm/aspeed.c | 47 | +++ b/hw/ssi/mss-spi.c |
21 | @@ -XXX,XX +XXX,XX @@ static void write_boot_rom(DriveInfo *dinfo, hwaddr addr, size_t rom_size, | 48 | @@ -XXX,XX +XXX,XX @@ spi_read(void *opaque, hwaddr addr, unsigned int size) |
22 | { | 49 | case R_SPI_RX: |
23 | BlockBackend *blk = blk_by_legacy_dinfo(dinfo); | 50 | s->regs[R_SPI_STATUS] &= ~S_RXFIFOFUL; |
24 | uint8_t *storage; | 51 | s->regs[R_SPI_STATUS] &= ~S_RXCHOVRF; |
25 | + int64_t size; | 52 | - ret = fifo32_pop(&s->rx_fifo); |
26 | 53 | + if (fifo32_is_empty(&s->rx_fifo)) { | |
27 | - if (rom_size > blk_getlength(blk)) { | 54 | + qemu_log_mask(LOG_GUEST_ERROR, |
28 | - rom_size = blk_getlength(blk); | 55 | + "%s: Reading empty RX_FIFO\n", |
29 | + /* The block backend size should have already been 'validated' by | 56 | + __func__); |
30 | + * the creation of the m25p80 object. | 57 | + } else { |
31 | + */ | 58 | + ret = fifo32_pop(&s->rx_fifo); |
32 | + size = blk_getlength(blk); | 59 | + } |
33 | + if (size <= 0) { | 60 | if (fifo32_is_empty(&s->rx_fifo)) { |
34 | + error_setg(errp, "failed to get flash size"); | 61 | s->regs[R_SPI_STATUS] |= S_RXFIFOEMP; |
35 | + return; | 62 | } |
36 | + } | ||
37 | + | ||
38 | + if (rom_size > size) { | ||
39 | + rom_size = size; | ||
40 | } | ||
41 | |||
42 | storage = g_new0(uint8_t, rom_size); | ||
43 | -- | 63 | -- |
44 | 2.7.4 | 64 | 2.20.1 |
45 | 65 | ||
46 | 66 | diff view generated by jsdifflib |
1 | From: Cédric Le Goater <clg@kaod.org> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | The size of a segment is not necessarily a power of 2. | 3 | In the previous commit we fixed a crash when the guest read a |
4 | register that pop from an empty FIFO. | ||
5 | By auditing the repository, we found another similar use with | ||
6 | an easy way to reproduce: | ||
4 | 7 | ||
5 | Signed-off-by: Cédric Le Goater <clg@kaod.org> | 8 | $ qemu-system-aarch64 -M xlnx-zcu102 -monitor stdio -S |
6 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 9 | QEMU 4.0.50 monitor - type 'help' for more information |
7 | Message-id: 1486648058-520-5-git-send-email-clg@kaod.org | 10 | (qemu) xp/b 0xfd4a0134 |
11 | Aborted (core dumped) | ||
12 | |||
13 | (gdb) bt | ||
14 | #0 0x00007f6936dea57f in raise () at /lib64/libc.so.6 | ||
15 | #1 0x00007f6936dd4895 in abort () at /lib64/libc.so.6 | ||
16 | #2 0x0000561ad32975ec in xlnx_dp_aux_pop_rx_fifo (s=0x7f692babee70) at hw/display/xlnx_dp.c:431 | ||
17 | #3 0x0000561ad3297dc0 in xlnx_dp_read (opaque=0x7f692babee70, offset=77, size=4) at hw/display/xlnx_dp.c:667 | ||
18 | #4 0x0000561ad321b896 in memory_region_read_accessor (mr=0x7f692babf620, addr=308, value=0x7ffe05c1db88, size=4, shift=0, mask=4294967295, attrs=...) at memory.c:439 | ||
19 | #5 0x0000561ad321bd70 in access_with_adjusted_size (addr=308, value=0x7ffe05c1db88, size=1, access_size_min=4, access_size_max=4, access_fn=0x561ad321b858 <memory_region_read_accessor>, mr=0x7f692babf620, attrs=...) at memory.c:569 | ||
20 | #6 0x0000561ad321e9d5 in memory_region_dispatch_read1 (mr=0x7f692babf620, addr=308, pval=0x7ffe05c1db88, size=1, attrs=...) at memory.c:1420 | ||
21 | #7 0x0000561ad321ea9d in memory_region_dispatch_read (mr=0x7f692babf620, addr=308, pval=0x7ffe05c1db88, size=1, attrs=...) at memory.c:1447 | ||
22 | #8 0x0000561ad31bd742 in flatview_read_continue (fv=0x561ad69c04f0, addr=4249485620, attrs=..., buf=0x7ffe05c1dcf0 "\020\335\301\005\376\177", len=1, addr1=308, l=1, mr=0x7f692babf620) at exec.c:3385 | ||
23 | #9 0x0000561ad31bd895 in flatview_read (fv=0x561ad69c04f0, addr=4249485620, attrs=..., buf=0x7ffe05c1dcf0 "\020\335\301\005\376\177", len=1) at exec.c:3423 | ||
24 | #10 0x0000561ad31bd90b in address_space_read_full (as=0x561ad5bb3020, addr=4249485620, attrs=..., buf=0x7ffe05c1dcf0 "\020\335\301\005\376\177", len=1) at exec.c:3436 | ||
25 | #11 0x0000561ad33b1c42 in address_space_read (len=1, buf=0x7ffe05c1dcf0 "\020\335\301\005\376\177", attrs=..., addr=4249485620, as=0x561ad5bb3020) at include/exec/memory.h:2131 | ||
26 | #12 0x0000561ad33b1c42 in memory_dump (mon=0x561ad59c4530, count=1, format=120, wsize=1, addr=4249485620, is_physical=1) at monitor/misc.c:723 | ||
27 | #13 0x0000561ad33b1fc1 in hmp_physical_memory_dump (mon=0x561ad59c4530, qdict=0x561ad6c6fd00) at monitor/misc.c:795 | ||
28 | #14 0x0000561ad37b4a9f in handle_hmp_command (mon=0x561ad59c4530, cmdline=0x561ad59d0f22 "/b 0x00000000fd4a0134") at monitor/hmp.c:1082 | ||
29 | |||
30 | Fix by checking the FIFO is not empty before popping from it. | ||
31 | |||
32 | The datasheet is not clear about the reset value of this register, | ||
33 | we choose to return '0'. | ||
34 | |||
35 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
36 | Reviewed-by: Alistair Francis <alistair.francis@wdc.com> | ||
37 | Message-id: 20190709113715.7761-4-philmd@redhat.com | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 38 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | --- | 39 | --- |
10 | hw/ssi/aspeed_smc.c | 4 ++-- | 40 | hw/display/xlnx_dp.c | 15 +++++++++++---- |
11 | 1 file changed, 2 insertions(+), 2 deletions(-) | 41 | 1 file changed, 11 insertions(+), 4 deletions(-) |
12 | 42 | ||
13 | diff --git a/hw/ssi/aspeed_smc.c b/hw/ssi/aspeed_smc.c | 43 | diff --git a/hw/display/xlnx_dp.c b/hw/display/xlnx_dp.c |
14 | index XXXXXXX..XXXXXXX 100644 | 44 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/hw/ssi/aspeed_smc.c | 45 | --- a/hw/display/xlnx_dp.c |
16 | +++ b/hw/ssi/aspeed_smc.c | 46 | +++ b/hw/display/xlnx_dp.c |
17 | @@ -XXX,XX +XXX,XX @@ static uint32_t aspeed_smc_check_segment_addr(const AspeedSMCFlash *fl, | 47 | @@ -XXX,XX +XXX,XX @@ static uint8_t xlnx_dp_aux_pop_rx_fifo(XlnxDPState *s) |
18 | AspeedSegments seg; | 48 | uint8_t ret; |
19 | 49 | ||
20 | aspeed_smc_reg_to_segment(s->regs[R_SEG_ADDR0 + fl->id], &seg); | 50 | if (fifo8_is_empty(&s->rx_fifo)) { |
21 | - if ((addr & (seg.size - 1)) != addr) { | 51 | - DPRINTF("rx_fifo underflow..\n"); |
22 | + if ((addr % seg.size) != addr) { | 52 | - abort(); |
23 | qemu_log_mask(LOG_GUEST_ERROR, | 53 | + qemu_log_mask(LOG_GUEST_ERROR, |
24 | "%s: invalid address 0x%08x for CS%d segment : " | 54 | + "%s: Reading empty RX_FIFO\n", |
25 | "[ 0x%"HWADDR_PRIx" - 0x%"HWADDR_PRIx" ]\n", | 55 | + __func__); |
26 | s->ctrl->name, addr, fl->id, seg.addr, | 56 | + /* |
27 | seg.addr + seg.size); | 57 | + * The datasheet is not clear about the reset value, it seems |
28 | + addr %= seg.size; | 58 | + * to be unspecified. We choose to return '0'. |
59 | + */ | ||
60 | + ret = 0; | ||
61 | + } else { | ||
62 | + ret = fifo8_pop(&s->rx_fifo); | ||
63 | + DPRINTF("pop 0x%" PRIX8 " from rx_fifo.\n", ret); | ||
29 | } | 64 | } |
30 | 65 | - ret = fifo8_pop(&s->rx_fifo); | |
31 | - addr &= seg.size - 1; | 66 | - DPRINTF("pop 0x%" PRIX8 " from rx_fifo.\n", ret); |
32 | return addr; | 67 | return ret; |
33 | } | 68 | } |
34 | 69 | ||
35 | -- | 70 | -- |
36 | 2.7.4 | 71 | 2.20.1 |
37 | 72 | ||
38 | 73 | diff view generated by jsdifflib |
1 | From: Alexander Graf <agraf@suse.de> | 1 | From: David Engraf <david.engraf@sysgo.com> |
---|---|---|---|
2 | 2 | ||
3 | Fw-cfg recently learned how to directly access guest memory and does so in | 3 | Using the whole 128 MiB flash in non-secure mode is not working because |
4 | cache coherent fashion. Tell the guest about that fact when it's using DT. | 4 | virt_flash_fdt() expects the same address for secure_sysmem and sysmem. |
5 | This is not correctly handled by caller because it forwards NULL for | ||
6 | secure_sysmem in non-secure flash mode. | ||
5 | 7 | ||
6 | Signed-off-by: Alexander Graf <agraf@suse.de> | 8 | Fixed by using sysmem when secure_sysmem is NULL. |
7 | Reviewed-by: Laszlo Ersek <lersek@redhat.com> | 9 | |
8 | Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> | 10 | Signed-off-by: David Engraf <david.engraf@sysgo.com> |
9 | Reviewed-by: Shannon Zhao <shannon.zhao@linaro.org> | 11 | Message-id: 20190712075002.14326-1-david.engraf@sysgo.com |
10 | Message-id: 1486644810-33181-5-git-send-email-agraf@suse.de | 12 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | --- | 14 | --- |
13 | hw/arm/virt.c | 1 + | 15 | hw/arm/virt.c | 2 +- |
14 | 1 file changed, 1 insertion(+) | 16 | 1 file changed, 1 insertion(+), 1 deletion(-) |
15 | 17 | ||
16 | diff --git a/hw/arm/virt.c b/hw/arm/virt.c | 18 | diff --git a/hw/arm/virt.c b/hw/arm/virt.c |
17 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/hw/arm/virt.c | 20 | --- a/hw/arm/virt.c |
19 | +++ b/hw/arm/virt.c | 21 | +++ b/hw/arm/virt.c |
20 | @@ -XXX,XX +XXX,XX @@ static FWCfgState *create_fw_cfg(const VirtMachineState *vms, AddressSpace *as) | 22 | @@ -XXX,XX +XXX,XX @@ static void machvirt_init(MachineState *machine) |
21 | "compatible", "qemu,fw-cfg-mmio"); | 23 | &machine->device_memory->mr); |
22 | qemu_fdt_setprop_sized_cells(vms->fdt, nodename, "reg", | 24 | } |
23 | 2, base, 2, size); | 25 | |
24 | + qemu_fdt_setprop(vms->fdt, nodename, "dma-coherent", NULL, 0); | 26 | - virt_flash_fdt(vms, sysmem, secure_sysmem); |
25 | g_free(nodename); | 27 | + virt_flash_fdt(vms, sysmem, secure_sysmem ?: sysmem); |
26 | return fw_cfg; | 28 | |
27 | } | 29 | create_gic(vms, pic); |
30 | |||
28 | -- | 31 | -- |
29 | 2.7.4 | 32 | 2.20.1 |
30 | 33 | ||
31 | 34 | diff view generated by jsdifflib |
1 | From: Wei Huang <wei@redhat.com> | 1 | The PL031 RTC tracks the difference between the guest RTC |
---|---|---|---|
2 | 2 | and the host RTC using a tick_offset field. For migration, | |
3 | In order to support Linux perf, which uses PMXEVTYPER register, | 3 | however, we currently always migrate the offset between |
4 | this patch adds read/write access support for PMXEVTYPER. The access | 4 | the guest and the vm_clock, even if the RTC clock is not |
5 | is CONSTRAINED UNPREDICTABLE when PMSELR is not 0x1f. Additionally | 5 | the same as the vm_clock; this was an attempt to retain |
6 | this patch adds support for PMXEVTYPER_EL0. | 6 | migration backwards compatibility. |
7 | 7 | ||
8 | Signed-off-by: Wei Huang <wei@redhat.com> | 8 | Unfortunately this results in the RTC behaving oddly across |
9 | Message-id: 1486504171-26807-3-git-send-email-wei@redhat.com | 9 | a VM state save and restore -- since the VM clock stands still |
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 10 | across save-then-restore, regardless of how much real world |
11 | time has elapsed, the guest RTC ends up out of sync with the | ||
12 | host RTC in the restored VM. | ||
13 | |||
14 | Fix this by migrating the raw tick_offset. To retain migration | ||
15 | compatibility as far as possible, we have a new property | ||
16 | migrate-tick-offset; by default this is 'true' and we will | ||
17 | migrate the true tick offset in a new subsection; if the | ||
18 | incoming data has no subsection we fall back to the old | ||
19 | vm_clock-based offset information, so old->new migration | ||
20 | compatibility is preserved. For complete new->old migration | ||
21 | compatibility, the property is set to 'false' for 4.0 and | ||
22 | earlier machine types (this will only affect 'virt-4.0' | ||
23 | and below, as none of the other pl031-using machines are | ||
24 | versioned). | ||
25 | |||
26 | Reported-by: Russell King <rmk@armlinux.org.uk> | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 27 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
28 | Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com> | ||
29 | Message-id: 20190709143912.28905-1-peter.maydell@linaro.org | ||
12 | --- | 30 | --- |
13 | target/arm/cpu.h | 1 - | 31 | include/hw/timer/pl031.h | 2 + |
14 | target/arm/helper.c | 30 +++++++++++++++++++++++++----- | 32 | hw/core/machine.c | 1 + |
15 | 2 files changed, 25 insertions(+), 6 deletions(-) | 33 | hw/timer/pl031.c | 92 ++++++++++++++++++++++++++++++++++++++-- |
16 | 34 | 3 files changed, 91 insertions(+), 4 deletions(-) | |
17 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 35 | |
36 | diff --git a/include/hw/timer/pl031.h b/include/hw/timer/pl031.h | ||
18 | index XXXXXXX..XXXXXXX 100644 | 37 | index XXXXXXX..XXXXXXX 100644 |
19 | --- a/target/arm/cpu.h | 38 | --- a/include/hw/timer/pl031.h |
20 | +++ b/target/arm/cpu.h | 39 | +++ b/include/hw/timer/pl031.h |
21 | @@ -XXX,XX +XXX,XX @@ typedef struct CPUARMState { | 40 | @@ -XXX,XX +XXX,XX @@ typedef struct PL031State { |
22 | uint64_t c9_pmcr; /* performance monitor control register */ | 41 | */ |
23 | uint64_t c9_pmcnten; /* perf monitor counter enables */ | 42 | uint32_t tick_offset_vmstate; |
24 | uint32_t c9_pmovsr; /* perf monitor overflow status */ | 43 | uint32_t tick_offset; |
25 | - uint32_t c9_pmxevtyper; /* perf monitor event type */ | 44 | + bool tick_offset_migrated; |
26 | uint32_t c9_pmuserenr; /* perf monitor user enable */ | 45 | + bool migrate_tick_offset; |
27 | uint64_t c9_pmselr; /* perf monitor counter selection register */ | 46 | |
28 | uint32_t c9_pminten; /* perf monitor interrupt enables */ | 47 | uint32_t mr; |
29 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 48 | uint32_t lr; |
49 | diff --git a/hw/core/machine.c b/hw/core/machine.c | ||
30 | index XXXXXXX..XXXXXXX 100644 | 50 | index XXXXXXX..XXXXXXX 100644 |
31 | --- a/target/arm/helper.c | 51 | --- a/hw/core/machine.c |
32 | +++ b/target/arm/helper.c | 52 | +++ b/hw/core/machine.c |
33 | @@ -XXX,XX +XXX,XX @@ static void pmovsr_write(CPUARMState *env, const ARMCPRegInfo *ri, | 53 | @@ -XXX,XX +XXX,XX @@ GlobalProperty hw_compat_4_0[] = { |
34 | static void pmxevtyper_write(CPUARMState *env, const ARMCPRegInfo *ri, | 54 | { "virtio-gpu-pci", "edid", "false" }, |
35 | uint64_t value) | 55 | { "virtio-device", "use-started", "false" }, |
56 | { "virtio-balloon-device", "qemu-4-0-config-size", "true" }, | ||
57 | + { "pl031", "migrate-tick-offset", "false" }, | ||
58 | }; | ||
59 | const size_t hw_compat_4_0_len = G_N_ELEMENTS(hw_compat_4_0); | ||
60 | |||
61 | diff --git a/hw/timer/pl031.c b/hw/timer/pl031.c | ||
62 | index XXXXXXX..XXXXXXX 100644 | ||
63 | --- a/hw/timer/pl031.c | ||
64 | +++ b/hw/timer/pl031.c | ||
65 | @@ -XXX,XX +XXX,XX @@ static int pl031_pre_save(void *opaque) | ||
36 | { | 66 | { |
37 | - env->cp15.c9_pmxevtyper = value & 0xff; | 67 | PL031State *s = opaque; |
38 | + /* Attempts to access PMXEVTYPER are CONSTRAINED UNPREDICTABLE when | 68 | |
39 | + * PMSELR value is equal to or greater than the number of implemented | 69 | - /* tick_offset is base_time - rtc_clock base time. Instead, we want to |
40 | + * counters, but not equal to 0x1f. We opt to behave as a RAZ/WI. | 70 | - * store the base time relative to the QEMU_CLOCK_VIRTUAL for backwards-compatibility. */ |
71 | + /* | ||
72 | + * The PL031 device model code uses the tick_offset field, which is | ||
73 | + * the offset between what the guest RTC should read and what the | ||
74 | + * QEMU rtc_clock reads: | ||
75 | + * guest_rtc = rtc_clock + tick_offset | ||
76 | + * and so | ||
77 | + * tick_offset = guest_rtc - rtc_clock | ||
78 | + * | ||
79 | + * We want to migrate this offset, which sounds straightforward. | ||
80 | + * Unfortunately older versions of QEMU migrated a conversion of this | ||
81 | + * offset into an offset from the vm_clock. (This was in turn an | ||
82 | + * attempt to be compatible with even older QEMU versions, but it | ||
83 | + * has incorrect behaviour if the rtc_clock is not the same as the | ||
84 | + * vm_clock.) So we put the actual tick_offset into a migration | ||
85 | + * subsection, and the backwards-compatible time-relative-to-vm_clock | ||
86 | + * in the main migration state. | ||
87 | + * | ||
88 | + * Calculate base time relative to QEMU_CLOCK_VIRTUAL: | ||
41 | + */ | 89 | + */ |
42 | + if (env->cp15.c9_pmselr == 0x1f) { | 90 | int64_t delta = qemu_clock_get_ns(rtc_clock) - qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); |
43 | + pmccfiltr_write(env, ri, value); | 91 | s->tick_offset_vmstate = s->tick_offset + delta / NANOSECONDS_PER_SECOND; |
92 | |||
93 | return 0; | ||
94 | } | ||
95 | |||
96 | +static int pl031_pre_load(void *opaque) | ||
97 | +{ | ||
98 | + PL031State *s = opaque; | ||
99 | + | ||
100 | + s->tick_offset_migrated = false; | ||
101 | + return 0; | ||
102 | +} | ||
103 | + | ||
104 | static int pl031_post_load(void *opaque, int version_id) | ||
105 | { | ||
106 | PL031State *s = opaque; | ||
107 | |||
108 | - int64_t delta = qemu_clock_get_ns(rtc_clock) - qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); | ||
109 | - s->tick_offset = s->tick_offset_vmstate - delta / NANOSECONDS_PER_SECOND; | ||
110 | + /* | ||
111 | + * If we got the tick_offset subsection, then we can just use | ||
112 | + * the value in that. Otherwise the source is an older QEMU and | ||
113 | + * has given us the offset from the vm_clock; convert it back to | ||
114 | + * an offset from the rtc_clock. This will cause time to incorrectly | ||
115 | + * go backwards compared to the host RTC, but this is unavoidable. | ||
116 | + */ | ||
117 | + | ||
118 | + if (!s->tick_offset_migrated) { | ||
119 | + int64_t delta = qemu_clock_get_ns(rtc_clock) - | ||
120 | + qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); | ||
121 | + s->tick_offset = s->tick_offset_vmstate - | ||
122 | + delta / NANOSECONDS_PER_SECOND; | ||
44 | + } | 123 | + } |
124 | pl031_set_alarm(s); | ||
125 | return 0; | ||
126 | } | ||
127 | |||
128 | +static int pl031_tick_offset_post_load(void *opaque, int version_id) | ||
129 | +{ | ||
130 | + PL031State *s = opaque; | ||
131 | + | ||
132 | + s->tick_offset_migrated = true; | ||
133 | + return 0; | ||
45 | +} | 134 | +} |
46 | + | 135 | + |
47 | +static uint64_t pmxevtyper_read(CPUARMState *env, const ARMCPRegInfo *ri) | 136 | +static bool pl031_tick_offset_needed(void *opaque) |
48 | +{ | 137 | +{ |
49 | + /* We opt to behave as a RAZ/WI when attempts to access PMXEVTYPER | 138 | + PL031State *s = opaque; |
50 | + * are CONSTRAINED UNPREDICTABLE. See comments in pmxevtyper_write(). | 139 | + |
140 | + return s->migrate_tick_offset; | ||
141 | +} | ||
142 | + | ||
143 | +static const VMStateDescription vmstate_pl031_tick_offset = { | ||
144 | + .name = "pl031/tick-offset", | ||
145 | + .version_id = 1, | ||
146 | + .minimum_version_id = 1, | ||
147 | + .needed = pl031_tick_offset_needed, | ||
148 | + .post_load = pl031_tick_offset_post_load, | ||
149 | + .fields = (VMStateField[]) { | ||
150 | + VMSTATE_UINT32(tick_offset, PL031State), | ||
151 | + VMSTATE_END_OF_LIST() | ||
152 | + } | ||
153 | +}; | ||
154 | + | ||
155 | static const VMStateDescription vmstate_pl031 = { | ||
156 | .name = "pl031", | ||
157 | .version_id = 1, | ||
158 | .minimum_version_id = 1, | ||
159 | .pre_save = pl031_pre_save, | ||
160 | + .pre_load = pl031_pre_load, | ||
161 | .post_load = pl031_post_load, | ||
162 | .fields = (VMStateField[]) { | ||
163 | VMSTATE_UINT32(tick_offset_vmstate, PL031State), | ||
164 | @@ -XXX,XX +XXX,XX @@ static const VMStateDescription vmstate_pl031 = { | ||
165 | VMSTATE_UINT32(im, PL031State), | ||
166 | VMSTATE_UINT32(is, PL031State), | ||
167 | VMSTATE_END_OF_LIST() | ||
168 | + }, | ||
169 | + .subsections = (const VMStateDescription*[]) { | ||
170 | + &vmstate_pl031_tick_offset, | ||
171 | + NULL | ||
172 | } | ||
173 | }; | ||
174 | |||
175 | +static Property pl031_properties[] = { | ||
176 | + /* | ||
177 | + * True to correctly migrate the tick offset of the RTC. False to | ||
178 | + * obtain backward migration compatibility with older QEMU versions, | ||
179 | + * at the expense of the guest RTC going backwards compared with the | ||
180 | + * host RTC when the VM is saved/restored if using -rtc host. | ||
181 | + * (Even if set to 'true' older QEMU can migrate forward to newer QEMU; | ||
182 | + * 'false' also permits newer QEMU to migrate to older QEMU.) | ||
51 | + */ | 183 | + */ |
52 | + if (env->cp15.c9_pmselr == 0x1f) { | 184 | + DEFINE_PROP_BOOL("migrate-tick-offset", |
53 | + return env->cp15.pmccfiltr_el0; | 185 | + PL031State, migrate_tick_offset, true), |
54 | + } else { | 186 | + DEFINE_PROP_END_OF_LIST() |
55 | + return 0; | 187 | +}; |
56 | + } | 188 | + |
189 | static void pl031_class_init(ObjectClass *klass, void *data) | ||
190 | { | ||
191 | DeviceClass *dc = DEVICE_CLASS(klass); | ||
192 | |||
193 | dc->vmsd = &vmstate_pl031; | ||
194 | + dc->props = pl031_properties; | ||
57 | } | 195 | } |
58 | 196 | ||
59 | static void pmuserenr_write(CPUARMState *env, const ARMCPRegInfo *ri, | 197 | static const TypeInfo pl031_info = { |
60 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v7_cp_reginfo[] = { | ||
61 | .fieldoffset = offsetof(CPUARMState, cp15.pmccfiltr_el0), | ||
62 | .resetvalue = 0, }, | ||
63 | { .name = "PMXEVTYPER", .cp = 15, .crn = 9, .crm = 13, .opc1 = 0, .opc2 = 1, | ||
64 | - .access = PL0_RW, | ||
65 | - .fieldoffset = offsetof(CPUARMState, cp15.c9_pmxevtyper), | ||
66 | - .accessfn = pmreg_access, .writefn = pmxevtyper_write, | ||
67 | - .raw_writefn = raw_write }, | ||
68 | + .access = PL0_RW, .type = ARM_CP_NO_RAW, .accessfn = pmreg_access, | ||
69 | + .writefn = pmxevtyper_write, .readfn = pmxevtyper_read }, | ||
70 | + { .name = "PMXEVTYPER_EL0", .state = ARM_CP_STATE_AA64, | ||
71 | + .opc0 = 3, .opc1 = 3, .crn = 9, .crm = 13, .opc2 = 1, | ||
72 | + .access = PL0_RW, .type = ARM_CP_NO_RAW, .accessfn = pmreg_access, | ||
73 | + .writefn = pmxevtyper_write, .readfn = pmxevtyper_read }, | ||
74 | /* Unimplemented, RAZ/WI. */ | ||
75 | { .name = "PMXEVCNTR", .cp = 15, .crn = 9, .crm = 13, .opc1 = 0, .opc2 = 2, | ||
76 | .access = PL0_RW, .type = ARM_CP_CONST, .resetvalue = 0, | ||
77 | -- | 198 | -- |
78 | 2.7.4 | 199 | 2.20.1 |
79 | 200 | ||
80 | 201 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Wei Huang <wei@redhat.com> | ||
2 | 1 | ||
3 | This patch adds access support for PMINTENSET_EL1. | ||
4 | |||
5 | Signed-off-by: Wei Huang <wei@redhat.com> | ||
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | Message-id: 1486504171-26807-4-git-send-email-wei@redhat.com | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | --- | ||
10 | target/arm/cpu.h | 2 +- | ||
11 | target/arm/helper.c | 10 +++++++++- | ||
12 | 2 files changed, 10 insertions(+), 2 deletions(-) | ||
13 | |||
14 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/target/arm/cpu.h | ||
17 | +++ b/target/arm/cpu.h | ||
18 | @@ -XXX,XX +XXX,XX @@ typedef struct CPUARMState { | ||
19 | uint32_t c9_pmovsr; /* perf monitor overflow status */ | ||
20 | uint32_t c9_pmuserenr; /* perf monitor user enable */ | ||
21 | uint64_t c9_pmselr; /* perf monitor counter selection register */ | ||
22 | - uint32_t c9_pminten; /* perf monitor interrupt enables */ | ||
23 | + uint64_t c9_pminten; /* perf monitor interrupt enables */ | ||
24 | union { /* Memory attribute redirection */ | ||
25 | struct { | ||
26 | #ifdef HOST_WORDS_BIGENDIAN | ||
27 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
28 | index XXXXXXX..XXXXXXX 100644 | ||
29 | --- a/target/arm/helper.c | ||
30 | +++ b/target/arm/helper.c | ||
31 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v7_cp_reginfo[] = { | ||
32 | .writefn = pmuserenr_write, .raw_writefn = raw_write }, | ||
33 | { .name = "PMINTENSET", .cp = 15, .crn = 9, .crm = 14, .opc1 = 0, .opc2 = 1, | ||
34 | .access = PL1_RW, .accessfn = access_tpm, | ||
35 | - .fieldoffset = offsetof(CPUARMState, cp15.c9_pminten), | ||
36 | + .type = ARM_CP_ALIAS, | ||
37 | + .fieldoffset = offsetoflow32(CPUARMState, cp15.c9_pminten), | ||
38 | .resetvalue = 0, | ||
39 | .writefn = pmintenset_write, .raw_writefn = raw_write }, | ||
40 | + { .name = "PMINTENSET_EL1", .state = ARM_CP_STATE_AA64, | ||
41 | + .opc0 = 3, .opc1 = 0, .crn = 9, .crm = 14, .opc2 = 1, | ||
42 | + .access = PL1_RW, .accessfn = access_tpm, | ||
43 | + .type = ARM_CP_IO, | ||
44 | + .fieldoffset = offsetof(CPUARMState, cp15.c9_pminten), | ||
45 | + .writefn = pmintenset_write, .raw_writefn = raw_write, | ||
46 | + .resetvalue = 0x0 }, | ||
47 | { .name = "PMINTENCLR", .cp = 15, .crn = 9, .crm = 14, .opc1 = 0, .opc2 = 2, | ||
48 | .access = PL1_RW, .accessfn = access_tpm, .type = ARM_CP_ALIAS, | ||
49 | .fieldoffset = offsetof(CPUARMState, cp15.c9_pminten), | ||
50 | -- | ||
51 | 2.7.4 | ||
52 | |||
53 | diff view generated by jsdifflib |
1 | From: Wei Huang <wei@redhat.com> | 1 | The ARMv5 architecture didn't specify detailed per-feature ID |
---|---|---|---|
2 | registers. Now that we're using the MVFR0 register fields to | ||
3 | gate the existence of VFP instructions, we need to set up | ||
4 | the correct values in the cpu->isar structure so that we still | ||
5 | provide an FPU to the guest. | ||
2 | 6 | ||
3 | This patch contains several fixes to enable vPMU under TCG mode. It | 7 | This fixes a regression in the arm926 and arm1026 CPUs, which |
4 | first removes the checking of kvm_enabled() while unsetting | 8 | are the only ones that both have VFP and are ARMv5 or earlier. |
5 | ARM_FEATURE_PMU. With it, the .pmu option can be used to turn on/off vPMU | 9 | This regression was introduced by the VFP refactoring, and more |
6 | under TCG mode. Secondly the PMU node of DT table is now created under TCG. | 10 | specifically by commits 1120827fa182f0e76 and 266bd25c485597c, |
7 | The last fix is to disable the masking of PMUver field of ID_AA64DFR0_EL1. | 11 | which accidentally disabled VFP short-vector support and |
12 | double-precision support on these CPUs. | ||
8 | 13 | ||
9 | Signed-off-by: Wei Huang <wei@redhat.com> | 14 | Fixes: 1120827fa182f0e |
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 15 | Fixes: 266bd25c485597c |
11 | Message-id: 1486504171-26807-5-git-send-email-wei@redhat.com | 16 | Fixes: https://bugs.launchpad.net/qemu/+bug/1836192 |
17 | Reported-by: Christophe Lyon <christophe.lyon@linaro.org> | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 18 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
19 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
20 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | ||
21 | Tested-by: Christophe Lyon <christophe.lyon@linaro.org> | ||
22 | Message-id: 20190711131241.22231-1-peter.maydell@linaro.org | ||
13 | --- | 23 | --- |
14 | hw/arm/virt.c | 2 +- | 24 | target/arm/cpu.c | 12 ++++++++++++ |
15 | target/arm/cpu.c | 2 +- | 25 | 1 file changed, 12 insertions(+) |
16 | target/arm/helper.c | 7 +------ | ||
17 | 3 files changed, 3 insertions(+), 8 deletions(-) | ||
18 | 26 | ||
19 | diff --git a/hw/arm/virt.c b/hw/arm/virt.c | ||
20 | index XXXXXXX..XXXXXXX 100644 | ||
21 | --- a/hw/arm/virt.c | ||
22 | +++ b/hw/arm/virt.c | ||
23 | @@ -XXX,XX +XXX,XX @@ static void fdt_add_pmu_nodes(const VirtMachineState *vms) | ||
24 | CPU_FOREACH(cpu) { | ||
25 | armcpu = ARM_CPU(cpu); | ||
26 | if (!arm_feature(&armcpu->env, ARM_FEATURE_PMU) || | ||
27 | - !kvm_arm_pmu_create(cpu, PPI(VIRTUAL_PMU_IRQ))) { | ||
28 | + (kvm_enabled() && !kvm_arm_pmu_create(cpu, PPI(VIRTUAL_PMU_IRQ)))) { | ||
29 | return; | ||
30 | } | ||
31 | } | ||
32 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | 27 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c |
33 | index XXXXXXX..XXXXXXX 100644 | 28 | index XXXXXXX..XXXXXXX 100644 |
34 | --- a/target/arm/cpu.c | 29 | --- a/target/arm/cpu.c |
35 | +++ b/target/arm/cpu.c | 30 | +++ b/target/arm/cpu.c |
36 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_realizefn(DeviceState *dev, Error **errp) | 31 | @@ -XXX,XX +XXX,XX @@ static void arm926_initfn(Object *obj) |
37 | unset_feature(env, ARM_FEATURE_EL2); | 32 | * set the field to indicate Jazelle support within QEMU. |
38 | } | 33 | */ |
39 | 34 | cpu->isar.id_isar1 = FIELD_DP32(cpu->isar.id_isar1, ID_ISAR1, JAZELLE, 1); | |
40 | - if (!cpu->has_pmu || !kvm_enabled()) { | 35 | + /* |
41 | + if (!cpu->has_pmu) { | 36 | + * Similarly, we need to set MVFR0 fields to enable double precision |
42 | cpu->has_pmu = false; | 37 | + * and short vector support even though ARMv5 doesn't have this register. |
43 | unset_feature(env, ARM_FEATURE_PMU); | 38 | + */ |
44 | } | 39 | + cpu->isar.mvfr0 = FIELD_DP32(cpu->isar.mvfr0, MVFR0, FPSHVEC, 1); |
45 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 40 | + cpu->isar.mvfr0 = FIELD_DP32(cpu->isar.mvfr0, MVFR0, FPDP, 1); |
46 | index XXXXXXX..XXXXXXX 100644 | 41 | } |
47 | --- a/target/arm/helper.c | 42 | |
48 | +++ b/target/arm/helper.c | 43 | static void arm946_initfn(Object *obj) |
49 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) | 44 | @@ -XXX,XX +XXX,XX @@ static void arm1026_initfn(Object *obj) |
50 | { .name = "ID_AA64DFR0_EL1", .state = ARM_CP_STATE_AA64, | 45 | * set the field to indicate Jazelle support within QEMU. |
51 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 5, .opc2 = 0, | 46 | */ |
52 | .access = PL1_R, .type = ARM_CP_CONST, | 47 | cpu->isar.id_isar1 = FIELD_DP32(cpu->isar.id_isar1, ID_ISAR1, JAZELLE, 1); |
53 | - /* We mask out the PMUVer field, because we don't currently | 48 | + /* |
54 | - * implement the PMU. Not advertising it prevents the guest | 49 | + * Similarly, we need to set MVFR0 fields to enable double precision |
55 | - * from trying to use it and getting UNDEFs on registers we | 50 | + * and short vector support even though ARMv5 doesn't have this register. |
56 | - * don't implement. | 51 | + */ |
57 | - */ | 52 | + cpu->isar.mvfr0 = FIELD_DP32(cpu->isar.mvfr0, MVFR0, FPSHVEC, 1); |
58 | - .resetvalue = cpu->id_aa64dfr0 & ~0xf00 }, | 53 | + cpu->isar.mvfr0 = FIELD_DP32(cpu->isar.mvfr0, MVFR0, FPDP, 1); |
59 | + .resetvalue = cpu->id_aa64dfr0 }, | 54 | |
60 | { .name = "ID_AA64DFR1_EL1", .state = ARM_CP_STATE_AA64, | 55 | { |
61 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 5, .opc2 = 1, | 56 | /* The 1026 had an IFAR at c6,c0,0,1 rather than the ARMv6 c6,c0,0,2 */ |
62 | .access = PL1_R, .type = ARM_CP_CONST, | ||
63 | -- | 57 | -- |
64 | 2.7.4 | 58 | 2.20.1 |
65 | 59 | ||
66 | 60 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Alexander Graf <agraf@suse.de> | ||
2 | 1 | ||
3 | Virtio-mmio devices can directly access guest memory and do so in cache | ||
4 | coherent fashion. Tell the guest about that fact when it's using ACPI. | ||
5 | |||
6 | Signed-off-by: Alexander Graf <agraf@suse.de> | ||
7 | Reviewed-by: Laszlo Ersek <lersek@redhat.com> | ||
8 | Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> | ||
9 | Reviewed-by: Shannon Zhao <shannon.zhao@linaro.org> | ||
10 | Message-id: 1486644810-33181-3-git-send-email-agraf@suse.de | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | --- | ||
13 | hw/arm/virt-acpi-build.c | 1 + | ||
14 | 1 file changed, 1 insertion(+) | ||
15 | |||
16 | diff --git a/hw/arm/virt-acpi-build.c b/hw/arm/virt-acpi-build.c | ||
17 | index XXXXXXX..XXXXXXX 100644 | ||
18 | --- a/hw/arm/virt-acpi-build.c | ||
19 | +++ b/hw/arm/virt-acpi-build.c | ||
20 | @@ -XXX,XX +XXX,XX @@ static void acpi_dsdt_add_virtio(Aml *scope, | ||
21 | Aml *dev = aml_device("VR%02u", i); | ||
22 | aml_append(dev, aml_name_decl("_HID", aml_string("LNRO0005"))); | ||
23 | aml_append(dev, aml_name_decl("_UID", aml_int(i))); | ||
24 | + aml_append(dev, aml_name_decl("_CCA", aml_int(1))); | ||
25 | |||
26 | Aml *crs = aml_resource_template(); | ||
27 | aml_append(crs, aml_memory32_fixed(base, size, AML_READ_WRITE)); | ||
28 | -- | ||
29 | 2.7.4 | ||
30 | |||
31 | diff view generated by jsdifflib |
1 | From: Alexander Graf <agraf@suse.de> | 1 | In the M-profile architecture, when we do a vector table fetch and it |
---|---|---|---|
2 | fails, we need to report a HardFault. Whether this is a Secure HF or | ||
3 | a NonSecure HF depends on several things. If AIRCR.BFHFNMINS is 0 | ||
4 | then HF is always Secure, because there is no NonSecure HardFault. | ||
5 | Otherwise, the answer depends on whether the 'underlying exception' | ||
6 | (MemManage, BusFault, SecureFault) targets Secure or NonSecure. (In | ||
7 | the pseudocode, this is handled in the Vector() function: the final | ||
8 | exc.isSecure is calculated by looking at the exc.isSecure from the | ||
9 | exception returned from the memory access, not the isSecure input | ||
10 | argument.) | ||
2 | 11 | ||
3 | Fw-cfg recently learned how to directly access guest memory and does so in | 12 | We weren't doing this correctly, because we were looking at |
4 | cache coherent fashion. Tell the guest about that fact when it's using ACPI. | 13 | the target security domain of the exception we were trying to |
14 | load the vector table entry for. This produces errors of two kinds: | ||
15 | * a load from the NS vector table which hits the "NS access | ||
16 | to S memory" SecureFault should end up as a Secure HardFault, | ||
17 | but we were raising an NS HardFault | ||
18 | * a load from the S vector table which causes a BusFault | ||
19 | should raise an NS HardFault if BFHFNMINS == 1 (because | ||
20 | in that case all BusFaults are NonSecure), but we were raising | ||
21 | a Secure HardFault | ||
5 | 22 | ||
6 | Signed-off-by: Alexander Graf <agraf@suse.de> | 23 | Correct the logic. |
7 | Reviewed-by: Laszlo Ersek <lersek@redhat.com> | 24 | |
8 | Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> | 25 | We also fix a comment error where we claimed that we might |
9 | Reviewed-by: Shannon Zhao <shannon.zhao@linaro.org> | 26 | be escalating MemManage to HardFault, and forgot about SecureFault. |
10 | Message-id: 1486644810-33181-4-git-send-email-agraf@suse.de | 27 | (Vector loads can never hit MPU access faults, because they're |
28 | always aligned and always use the default address map.) | ||
29 | |||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 30 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
31 | Message-id: 20190705094823.28905-1-peter.maydell@linaro.org | ||
12 | --- | 32 | --- |
13 | hw/arm/virt-acpi-build.c | 1 + | 33 | target/arm/m_helper.c | 21 +++++++++++++++++---- |
14 | 1 file changed, 1 insertion(+) | 34 | 1 file changed, 17 insertions(+), 4 deletions(-) |
15 | 35 | ||
16 | diff --git a/hw/arm/virt-acpi-build.c b/hw/arm/virt-acpi-build.c | 36 | diff --git a/target/arm/m_helper.c b/target/arm/m_helper.c |
17 | index XXXXXXX..XXXXXXX 100644 | 37 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/hw/arm/virt-acpi-build.c | 38 | --- a/target/arm/m_helper.c |
19 | +++ b/hw/arm/virt-acpi-build.c | 39 | +++ b/target/arm/m_helper.c |
20 | @@ -XXX,XX +XXX,XX @@ static void acpi_dsdt_add_fw_cfg(Aml *scope, const MemMapEntry *fw_cfg_memmap) | 40 | @@ -XXX,XX +XXX,XX @@ static bool arm_v7m_load_vector(ARMCPU *cpu, int exc, bool targets_secure, |
21 | aml_append(dev, aml_name_decl("_HID", aml_string("QEMU0002"))); | 41 | if (sattrs.ns) { |
22 | /* device present, functioning, decoding, not shown in UI */ | 42 | attrs.secure = false; |
23 | aml_append(dev, aml_name_decl("_STA", aml_int(0xB))); | 43 | } else if (!targets_secure) { |
24 | + aml_append(dev, aml_name_decl("_CCA", aml_int(1))); | 44 | - /* NS access to S memory */ |
25 | 45 | + /* | |
26 | Aml *crs = aml_resource_template(); | 46 | + * NS access to S memory: the underlying exception which we escalate |
27 | aml_append(crs, aml_memory32_fixed(fw_cfg_memmap->base, | 47 | + * to HardFault is SecureFault, which always targets Secure. |
48 | + */ | ||
49 | + exc_secure = true; | ||
50 | goto load_fail; | ||
51 | } | ||
52 | } | ||
53 | @@ -XXX,XX +XXX,XX @@ static bool arm_v7m_load_vector(ARMCPU *cpu, int exc, bool targets_secure, | ||
54 | vector_entry = address_space_ldl(arm_addressspace(cs, attrs), addr, | ||
55 | attrs, &result); | ||
56 | if (result != MEMTX_OK) { | ||
57 | + /* | ||
58 | + * Underlying exception is BusFault: its target security state | ||
59 | + * depends on BFHFNMINS. | ||
60 | + */ | ||
61 | + exc_secure = !(cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK); | ||
62 | goto load_fail; | ||
63 | } | ||
64 | *pvec = vector_entry; | ||
65 | @@ -XXX,XX +XXX,XX @@ load_fail: | ||
66 | /* | ||
67 | * All vector table fetch fails are reported as HardFault, with | ||
68 | * HFSR.VECTTBL and .FORCED set. (FORCED is set because | ||
69 | - * technically the underlying exception is a MemManage or BusFault | ||
70 | + * technically the underlying exception is a SecureFault or BusFault | ||
71 | * that is escalated to HardFault.) This is a terminal exception, | ||
72 | * so we will either take the HardFault immediately or else enter | ||
73 | * lockup (the latter case is handled in armv7m_nvic_set_pending_derived()). | ||
74 | + * The HardFault is Secure if BFHFNMINS is 0 (meaning that all HFs are | ||
75 | + * secure); otherwise it targets the same security state as the | ||
76 | + * underlying exception. | ||
77 | */ | ||
78 | - exc_secure = targets_secure || | ||
79 | - !(cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK); | ||
80 | + if (!(cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK)) { | ||
81 | + exc_secure = true; | ||
82 | + } | ||
83 | env->v7m.hfsr |= R_V7M_HFSR_VECTTBL_MASK | R_V7M_HFSR_FORCED_MASK; | ||
84 | armv7m_nvic_set_pending_derived(env->nvic, ARMV7M_EXCP_HARD, exc_secure); | ||
85 | return false; | ||
28 | -- | 86 | -- |
29 | 2.7.4 | 87 | 2.20.1 |
30 | 88 | ||
31 | 89 | diff view generated by jsdifflib |