1 | A surprisingly short target-arm queue, but no point in holding | 1 | Arm patches for rc3 : just a handful of bug fixes. |
---|---|---|---|
2 | onto these waiting for more code to arrive :-) | ||
3 | 2 | ||
4 | thanks | 3 | thanks |
5 | -- PMM | 4 | -- PMM |
6 | 5 | ||
7 | The following changes since commit 3d0bf8dfdfebd7f2ae41b6f220444b8047d6b1ee: | ||
8 | 6 | ||
9 | Merge remote-tracking branch 'remotes/dgilbert/tags/pull-migration-20170710a' into staging (2017-07-10 18:13:03 +0100) | 7 | The following changes since commit 4ecc984210ca1bf508a96a550ec8a93a5f833f6c: |
10 | 8 | ||
11 | are available in the git repository at: | 9 | Merge remote-tracking branch 'remotes/palmer/tags/riscv-for-master-4.2-rc3' into staging (2019-11-26 12:36:40 +0000) |
12 | 10 | ||
13 | git://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20170711 | 11 | are available in the Git repository at: |
14 | 12 | ||
15 | for you to fetch changes up to 792dac309c8660306557ba058b8b5a6a75ab3c1f: | 13 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20191126 |
16 | 14 | ||
17 | target-arm: v7M: ignore writes to CONTROL.SPSEL from Thread mode (2017-07-11 11:21:26 +0100) | 15 | for you to fetch changes up to 6a4ef4e5d1084ce41fafa7d470a644b0fd3d9317: |
16 | |||
17 | target/arm: Honor HCR_EL2.TID3 trapping requirements (2019-11-26 13:55:37 +0000) | ||
18 | 18 | ||
19 | ---------------------------------------------------------------- | 19 | ---------------------------------------------------------------- |
20 | target-arm queue: | 20 | target-arm queue: |
21 | * v7M: ignore writes to CONTROL.SPSEL from Thread mode | 21 | * handle FTYPE flag correctly in v7M exception return |
22 | * KVM: Enable in-kernel timers with user space gic | 22 | for v7M CPUs with an FPU (v8M CPUs were already correct) |
23 | * aspeed: Register all watchdogs | 23 | * versal: Add the CRP as unimplemented |
24 | * hw/misc: Add Exynos4210 Pseudo Random Number Generator | 24 | * Fix ISR_EL1 tracking when executing at EL2 |
25 | * Honor HCR_EL2.TID3 trapping requirements | ||
25 | 26 | ||
26 | ---------------------------------------------------------------- | 27 | ---------------------------------------------------------------- |
27 | Alexander Graf (1): | 28 | Edgar E. Iglesias (1): |
28 | ARM: KVM: Enable in-kernel timers with user space gic | 29 | hw/arm: versal: Add the CRP as unimplemented |
29 | 30 | ||
30 | Joel Stanley (1): | 31 | Jean-Hugues Deschênes (1): |
31 | aspeed: Register all watchdogs | 32 | target/arm: Fix handling of cortex-m FTYPE flag in EXCRET |
32 | 33 | ||
33 | Krzysztof Kozlowski (1): | 34 | Marc Zyngier (2): |
34 | hw/misc: Add Exynos4210 Pseudo Random Number Generator | 35 | target/arm: Fix ISR_EL1 tracking when executing at EL2 |
36 | target/arm: Honor HCR_EL2.TID3 trapping requirements | ||
35 | 37 | ||
36 | Peter Maydell (1): | 38 | include/hw/arm/xlnx-versal.h | 3 ++ |
37 | target-arm: v7M: ignore writes to CONTROL.SPSEL from Thread mode | 39 | hw/arm/xlnx-versal.c | 2 ++ |
40 | target/arm/helper.c | 83 ++++++++++++++++++++++++++++++++++++++++++-- | ||
41 | target/arm/m_helper.c | 7 ++-- | ||
42 | 4 files changed, 89 insertions(+), 6 deletions(-) | ||
38 | 43 | ||
39 | hw/misc/Makefile.objs | 2 +- | ||
40 | include/hw/arm/aspeed_soc.h | 4 +- | ||
41 | include/sysemu/kvm.h | 11 ++ | ||
42 | target/arm/cpu.h | 3 + | ||
43 | accel/kvm/kvm-all.c | 5 + | ||
44 | accel/stubs/kvm-stub.c | 5 + | ||
45 | hw/arm/aspeed_soc.c | 25 ++-- | ||
46 | hw/arm/exynos4210.c | 4 + | ||
47 | hw/intc/arm_gic.c | 7 ++ | ||
48 | hw/misc/exynos4210_rng.c | 277 ++++++++++++++++++++++++++++++++++++++++++++ | ||
49 | target/arm/helper.c | 13 ++- | ||
50 | target/arm/kvm.c | 51 ++++++++ | ||
51 | 12 files changed, 394 insertions(+), 13 deletions(-) | ||
52 | create mode 100644 hw/misc/exynos4210_rng.c | ||
53 | diff view generated by jsdifflib |
1 | From: Alexander Graf <agraf@suse.de> | 1 | From: Jean-Hugues Deschênes <Jean-Hugues.Deschenes@ossiaco.com> |
---|---|---|---|
2 | 2 | ||
3 | When running with KVM enabled, you can choose between emulating the | 3 | According to the PushStack() pseudocode in the armv7m RM, |
4 | gic in kernel or user space. If the kernel supports in-kernel virtualization | 4 | bit 4 of the LR should be set to NOT(CONTROL.PFCA) when |
5 | of the interrupt controller, it will default to that. If not, if will | 5 | an FPU is present. Current implementation is doing it for |
6 | default to user space emulation. | 6 | armv8, but not for armv7. This patch makes the existing |
7 | logic applicable to both code paths. | ||
7 | 8 | ||
8 | Unfortunately when running in user mode gic emulation, we miss out on | 9 | Signed-off-by: Jean-Hugues Deschenes <jean-hugues.deschenes@ossiaco.com> |
9 | interrupt events which are only available from kernel space, such as the timer. | 10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
10 | This patch leverages the new kernel/user space pending line synchronization for | ||
11 | timer events. It does not handle PMU events yet. | ||
12 | |||
13 | Signed-off-by: Alexander Graf <agraf@suse.de> | ||
14 | Reviewed-by: Andrew Jones <drjones@redhat.com> | ||
15 | Message-id: 1498577737-130264-1-git-send-email-agraf@suse.de | ||
16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
17 | --- | 12 | --- |
18 | include/sysemu/kvm.h | 11 +++++++++++ | 13 | target/arm/m_helper.c | 7 +++---- |
19 | target/arm/cpu.h | 3 +++ | 14 | 1 file changed, 3 insertions(+), 4 deletions(-) |
20 | accel/kvm/kvm-all.c | 5 +++++ | ||
21 | accel/stubs/kvm-stub.c | 5 +++++ | ||
22 | hw/intc/arm_gic.c | 7 +++++++ | ||
23 | target/arm/kvm.c | 51 ++++++++++++++++++++++++++++++++++++++++++++++++++ | ||
24 | 6 files changed, 82 insertions(+) | ||
25 | 15 | ||
26 | diff --git a/include/sysemu/kvm.h b/include/sysemu/kvm.h | 16 | diff --git a/target/arm/m_helper.c b/target/arm/m_helper.c |
27 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
28 | --- a/include/sysemu/kvm.h | 18 | --- a/target/arm/m_helper.c |
29 | +++ b/include/sysemu/kvm.h | 19 | +++ b/target/arm/m_helper.c |
30 | @@ -XXX,XX +XXX,XX @@ int kvm_init_vcpu(CPUState *cpu); | 20 | @@ -XXX,XX +XXX,XX @@ void arm_v7m_cpu_do_interrupt(CPUState *cs) |
31 | int kvm_cpu_exec(CPUState *cpu); | 21 | if (env->v7m.secure) { |
32 | int kvm_destroy_vcpu(CPUState *cpu); | 22 | lr |= R_V7M_EXCRET_S_MASK; |
33 | 23 | } | |
34 | +/** | 24 | - if (!(env->v7m.control[M_REG_S] & R_V7M_CONTROL_FPCA_MASK)) { |
35 | + * kvm_arm_supports_user_irq | 25 | - lr |= R_V7M_EXCRET_FTYPE_MASK; |
36 | + * | 26 | - } |
37 | + * Not all KVM implementations support notifications for kernel generated | 27 | } else { |
38 | + * interrupt events to user space. This function indicates whether the current | 28 | lr = R_V7M_EXCRET_RES1_MASK | |
39 | + * KVM implementation does support them. | 29 | R_V7M_EXCRET_S_MASK | |
40 | + * | 30 | R_V7M_EXCRET_DCRS_MASK | |
41 | + * Returns: true if KVM supports using kernel generated IRQs from user space | 31 | - R_V7M_EXCRET_FTYPE_MASK | |
42 | + */ | 32 | R_V7M_EXCRET_ES_MASK; |
43 | +bool kvm_arm_supports_user_irq(void); | 33 | if (env->v7m.control[M_REG_NS] & R_V7M_CONTROL_SPSEL_MASK) { |
44 | + | 34 | lr |= R_V7M_EXCRET_SPSEL_MASK; |
45 | #ifdef NEED_CPU_H | 35 | } |
46 | #include "cpu.h" | ||
47 | |||
48 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
49 | index XXXXXXX..XXXXXXX 100644 | ||
50 | --- a/target/arm/cpu.h | ||
51 | +++ b/target/arm/cpu.h | ||
52 | @@ -XXX,XX +XXX,XX @@ struct ARMCPU { | ||
53 | void *el_change_hook_opaque; | ||
54 | |||
55 | int32_t node_id; /* NUMA node this CPU belongs to */ | ||
56 | + | ||
57 | + /* Used to synchronize KVM and QEMU in-kernel device levels */ | ||
58 | + uint8_t device_irq_level; | ||
59 | }; | ||
60 | |||
61 | static inline ARMCPU *arm_env_get_cpu(CPUARMState *env) | ||
62 | diff --git a/accel/kvm/kvm-all.c b/accel/kvm/kvm-all.c | ||
63 | index XXXXXXX..XXXXXXX 100644 | ||
64 | --- a/accel/kvm/kvm-all.c | ||
65 | +++ b/accel/kvm/kvm-all.c | ||
66 | @@ -XXX,XX +XXX,XX @@ int kvm_has_intx_set_mask(void) | ||
67 | return kvm_state->intx_set_mask; | ||
68 | } | ||
69 | |||
70 | +bool kvm_arm_supports_user_irq(void) | ||
71 | +{ | ||
72 | + return kvm_check_extension(kvm_state, KVM_CAP_ARM_USER_IRQ); | ||
73 | +} | ||
74 | + | ||
75 | #ifdef KVM_CAP_SET_GUEST_DEBUG | ||
76 | struct kvm_sw_breakpoint *kvm_find_sw_breakpoint(CPUState *cpu, | ||
77 | target_ulong pc) | ||
78 | diff --git a/accel/stubs/kvm-stub.c b/accel/stubs/kvm-stub.c | ||
79 | index XXXXXXX..XXXXXXX 100644 | ||
80 | --- a/accel/stubs/kvm-stub.c | ||
81 | +++ b/accel/stubs/kvm-stub.c | ||
82 | @@ -XXX,XX +XXX,XX @@ void kvm_init_cpu_signals(CPUState *cpu) | ||
83 | { | ||
84 | abort(); | ||
85 | } | ||
86 | + | ||
87 | +bool kvm_arm_supports_user_irq(void) | ||
88 | +{ | ||
89 | + return false; | ||
90 | +} | ||
91 | #endif | ||
92 | diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c | ||
93 | index XXXXXXX..XXXXXXX 100644 | ||
94 | --- a/hw/intc/arm_gic.c | ||
95 | +++ b/hw/intc/arm_gic.c | ||
96 | @@ -XXX,XX +XXX,XX @@ | ||
97 | #include "qom/cpu.h" | ||
98 | #include "qemu/log.h" | ||
99 | #include "trace.h" | ||
100 | +#include "sysemu/kvm.h" | ||
101 | |||
102 | /* #define DEBUG_GIC */ | ||
103 | |||
104 | @@ -XXX,XX +XXX,XX @@ static void arm_gic_realize(DeviceState *dev, Error **errp) | ||
105 | return; | ||
106 | } | 36 | } |
107 | 37 | + if (!(env->v7m.control[M_REG_S] & R_V7M_CONTROL_FPCA_MASK)) { | |
108 | + if (kvm_enabled() && !kvm_arm_supports_user_irq()) { | 38 | + lr |= R_V7M_EXCRET_FTYPE_MASK; |
109 | + error_setg(errp, "KVM with user space irqchip only works when the " | ||
110 | + "host kernel supports KVM_CAP_ARM_USER_IRQ"); | ||
111 | + return; | ||
112 | + } | 39 | + } |
113 | + | 40 | if (!arm_v7m_is_handler_mode(env)) { |
114 | /* This creates distributor and main CPU interface (s->cpuiomem[0]) */ | 41 | lr |= R_V7M_EXCRET_MODE_MASK; |
115 | gic_init_irqs_and_mmio(s, gic_set_irq, gic_ops); | 42 | } |
116 | |||
117 | diff --git a/target/arm/kvm.c b/target/arm/kvm.c | ||
118 | index XXXXXXX..XXXXXXX 100644 | ||
119 | --- a/target/arm/kvm.c | ||
120 | +++ b/target/arm/kvm.c | ||
121 | @@ -XXX,XX +XXX,XX @@ int kvm_arch_init(MachineState *ms, KVMState *s) | ||
122 | */ | ||
123 | kvm_async_interrupts_allowed = true; | ||
124 | |||
125 | + /* | ||
126 | + * PSCI wakes up secondary cores, so we always need to | ||
127 | + * have vCPUs waiting in kernel space | ||
128 | + */ | ||
129 | + kvm_halt_in_kernel_allowed = true; | ||
130 | + | ||
131 | cap_has_mp_state = kvm_check_extension(s, KVM_CAP_MP_STATE); | ||
132 | |||
133 | type_register_static(&host_arm_cpu_type_info); | ||
134 | @@ -XXX,XX +XXX,XX @@ void kvm_arch_pre_run(CPUState *cs, struct kvm_run *run) | ||
135 | |||
136 | MemTxAttrs kvm_arch_post_run(CPUState *cs, struct kvm_run *run) | ||
137 | { | ||
138 | + ARMCPU *cpu; | ||
139 | + uint32_t switched_level; | ||
140 | + | ||
141 | + if (kvm_irqchip_in_kernel()) { | ||
142 | + /* | ||
143 | + * We only need to sync timer states with user-space interrupt | ||
144 | + * controllers, so return early and save cycles if we don't. | ||
145 | + */ | ||
146 | + return MEMTXATTRS_UNSPECIFIED; | ||
147 | + } | ||
148 | + | ||
149 | + cpu = ARM_CPU(cs); | ||
150 | + | ||
151 | + /* Synchronize our shadowed in-kernel device irq lines with the kvm ones */ | ||
152 | + if (run->s.regs.device_irq_level != cpu->device_irq_level) { | ||
153 | + switched_level = cpu->device_irq_level ^ run->s.regs.device_irq_level; | ||
154 | + | ||
155 | + qemu_mutex_lock_iothread(); | ||
156 | + | ||
157 | + if (switched_level & KVM_ARM_DEV_EL1_VTIMER) { | ||
158 | + qemu_set_irq(cpu->gt_timer_outputs[GTIMER_VIRT], | ||
159 | + !!(run->s.regs.device_irq_level & | ||
160 | + KVM_ARM_DEV_EL1_VTIMER)); | ||
161 | + switched_level &= ~KVM_ARM_DEV_EL1_VTIMER; | ||
162 | + } | ||
163 | + | ||
164 | + if (switched_level & KVM_ARM_DEV_EL1_PTIMER) { | ||
165 | + qemu_set_irq(cpu->gt_timer_outputs[GTIMER_PHYS], | ||
166 | + !!(run->s.regs.device_irq_level & | ||
167 | + KVM_ARM_DEV_EL1_PTIMER)); | ||
168 | + switched_level &= ~KVM_ARM_DEV_EL1_PTIMER; | ||
169 | + } | ||
170 | + | ||
171 | + /* XXX PMU IRQ is missing */ | ||
172 | + | ||
173 | + if (switched_level) { | ||
174 | + qemu_log_mask(LOG_UNIMP, "%s: unhandled in-kernel device IRQ %x\n", | ||
175 | + __func__, switched_level); | ||
176 | + } | ||
177 | + | ||
178 | + /* We also mark unknown levels as processed to not waste cycles */ | ||
179 | + cpu->device_irq_level = run->s.regs.device_irq_level; | ||
180 | + qemu_mutex_unlock_iothread(); | ||
181 | + } | ||
182 | + | ||
183 | return MEMTXATTRS_UNSPECIFIED; | ||
184 | } | ||
185 | |||
186 | -- | 43 | -- |
187 | 2.7.4 | 44 | 2.20.1 |
188 | 45 | ||
189 | 46 | diff view generated by jsdifflib |
1 | From: Joel Stanley <joel@jms.id.au> | 1 | From: "Edgar E. Iglesias" <edgar.iglesias@xilinx.com> |
---|---|---|---|
2 | 2 | ||
3 | The ast2400 contains two and the ast2500 contains three watchdogs. | 3 | Add the CRP as unimplemented thus avoiding bus errors when |
4 | Add this information to the AspeedSoCInfo and realise the correct number | 4 | guests access these registers. |
5 | of watchdogs for that each SoC type. | ||
6 | 5 | ||
7 | Signed-off-by: Joel Stanley <joel@jms.id.au> | 6 | Signed-off-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> |
8 | Reviewed-by: Cédric Le Goater <clg@kaod.org> | 7 | Reviewed-by: Alistair Francis <alistair.francis@wdc.com> |
9 | Tested-by: Cédric Le Goater <clg@kaod.org> | 8 | Reviewed-by: Luc Michel <luc.michel@greensocs.com> |
9 | Message-id: 20191115154734.26449-2-edgar.iglesias@gmail.com | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 11 | --- |
12 | include/hw/arm/aspeed_soc.h | 4 +++- | 12 | include/hw/arm/xlnx-versal.h | 3 +++ |
13 | hw/arm/aspeed_soc.c | 25 +++++++++++++++++-------- | 13 | hw/arm/xlnx-versal.c | 2 ++ |
14 | 2 files changed, 20 insertions(+), 9 deletions(-) | 14 | 2 files changed, 5 insertions(+) |
15 | 15 | ||
16 | diff --git a/include/hw/arm/aspeed_soc.h b/include/hw/arm/aspeed_soc.h | 16 | diff --git a/include/hw/arm/xlnx-versal.h b/include/hw/arm/xlnx-versal.h |
17 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/include/hw/arm/aspeed_soc.h | 18 | --- a/include/hw/arm/xlnx-versal.h |
19 | +++ b/include/hw/arm/aspeed_soc.h | 19 | +++ b/include/hw/arm/xlnx-versal.h |
20 | @@ -XXX,XX +XXX,XX @@ | 20 | @@ -XXX,XX +XXX,XX @@ typedef struct Versal { |
21 | #include "hw/net/ftgmac100.h" | 21 | #define MM_IOU_SCNTRS_SIZE 0x10000 |
22 | 22 | #define MM_FPD_CRF 0xfd1a0000U | |
23 | #define ASPEED_SPIS_NUM 2 | 23 | #define MM_FPD_CRF_SIZE 0x140000 |
24 | +#define ASPEED_WDTS_NUM 3 | 24 | + |
25 | 25 | +#define MM_PMC_CRP 0xf1260000U | |
26 | typedef struct AspeedSoCState { | 26 | +#define MM_PMC_CRP_SIZE 0x10000 |
27 | /*< private >*/ | 27 | #endif |
28 | @@ -XXX,XX +XXX,XX @@ typedef struct AspeedSoCState { | 28 | diff --git a/hw/arm/xlnx-versal.c b/hw/arm/xlnx-versal.c |
29 | AspeedSMCState fmc; | ||
30 | AspeedSMCState spi[ASPEED_SPIS_NUM]; | ||
31 | AspeedSDMCState sdmc; | ||
32 | - AspeedWDTState wdt; | ||
33 | + AspeedWDTState wdt[ASPEED_WDTS_NUM]; | ||
34 | FTGMAC100State ftgmac100; | ||
35 | } AspeedSoCState; | ||
36 | |||
37 | @@ -XXX,XX +XXX,XX @@ typedef struct AspeedSoCInfo { | ||
38 | const hwaddr *spi_bases; | ||
39 | const char *fmc_typename; | ||
40 | const char **spi_typename; | ||
41 | + int wdts_num; | ||
42 | } AspeedSoCInfo; | ||
43 | |||
44 | typedef struct AspeedSoCClass { | ||
45 | diff --git a/hw/arm/aspeed_soc.c b/hw/arm/aspeed_soc.c | ||
46 | index XXXXXXX..XXXXXXX 100644 | 29 | index XXXXXXX..XXXXXXX 100644 |
47 | --- a/hw/arm/aspeed_soc.c | 30 | --- a/hw/arm/xlnx-versal.c |
48 | +++ b/hw/arm/aspeed_soc.c | 31 | +++ b/hw/arm/xlnx-versal.c |
49 | @@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = { | 32 | @@ -XXX,XX +XXX,XX @@ static void versal_unimp(Versal *s) |
50 | .spi_bases = aspeed_soc_ast2400_spi_bases, | 33 | MM_CRL, MM_CRL_SIZE); |
51 | .fmc_typename = "aspeed.smc.fmc", | 34 | versal_unimp_area(s, "crf", &s->mr_ps, |
52 | .spi_typename = aspeed_soc_ast2400_typenames, | 35 | MM_FPD_CRF, MM_FPD_CRF_SIZE); |
53 | + .wdts_num = 2, | 36 | + versal_unimp_area(s, "crp", &s->mr_ps, |
54 | }, { | 37 | + MM_PMC_CRP, MM_PMC_CRP_SIZE); |
55 | .name = "ast2400-a1", | 38 | versal_unimp_area(s, "iou-scntr", &s->mr_ps, |
56 | .cpu_model = "arm926", | 39 | MM_IOU_SCNTR, MM_IOU_SCNTR_SIZE); |
57 | @@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = { | 40 | versal_unimp_area(s, "iou-scntr-seucre", &s->mr_ps, |
58 | .spi_bases = aspeed_soc_ast2400_spi_bases, | ||
59 | .fmc_typename = "aspeed.smc.fmc", | ||
60 | .spi_typename = aspeed_soc_ast2400_typenames, | ||
61 | + .wdts_num = 2, | ||
62 | }, { | ||
63 | .name = "ast2400", | ||
64 | .cpu_model = "arm926", | ||
65 | @@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = { | ||
66 | .spi_bases = aspeed_soc_ast2400_spi_bases, | ||
67 | .fmc_typename = "aspeed.smc.fmc", | ||
68 | .spi_typename = aspeed_soc_ast2400_typenames, | ||
69 | + .wdts_num = 2, | ||
70 | }, { | ||
71 | .name = "ast2500-a1", | ||
72 | .cpu_model = "arm1176", | ||
73 | @@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = { | ||
74 | .spi_bases = aspeed_soc_ast2500_spi_bases, | ||
75 | .fmc_typename = "aspeed.smc.ast2500-fmc", | ||
76 | .spi_typename = aspeed_soc_ast2500_typenames, | ||
77 | + .wdts_num = 3, | ||
78 | }, | ||
79 | }; | ||
80 | |||
81 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_init(Object *obj) | ||
82 | object_property_add_alias(obj, "ram-size", OBJECT(&s->sdmc), | ||
83 | "ram-size", &error_abort); | ||
84 | |||
85 | - object_initialize(&s->wdt, sizeof(s->wdt), TYPE_ASPEED_WDT); | ||
86 | - object_property_add_child(obj, "wdt", OBJECT(&s->wdt), NULL); | ||
87 | - qdev_set_parent_bus(DEVICE(&s->wdt), sysbus_get_default()); | ||
88 | + for (i = 0; i < sc->info->wdts_num; i++) { | ||
89 | + object_initialize(&s->wdt[i], sizeof(s->wdt[i]), TYPE_ASPEED_WDT); | ||
90 | + object_property_add_child(obj, "wdt[*]", OBJECT(&s->wdt[i]), NULL); | ||
91 | + qdev_set_parent_bus(DEVICE(&s->wdt[i]), sysbus_get_default()); | ||
92 | + } | ||
93 | |||
94 | object_initialize(&s->ftgmac100, sizeof(s->ftgmac100), TYPE_FTGMAC100); | ||
95 | object_property_add_child(obj, "ftgmac100", OBJECT(&s->ftgmac100), NULL); | ||
96 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
97 | sysbus_mmio_map(SYS_BUS_DEVICE(&s->sdmc), 0, ASPEED_SOC_SDMC_BASE); | ||
98 | |||
99 | /* Watch dog */ | ||
100 | - object_property_set_bool(OBJECT(&s->wdt), true, "realized", &err); | ||
101 | - if (err) { | ||
102 | - error_propagate(errp, err); | ||
103 | - return; | ||
104 | + for (i = 0; i < sc->info->wdts_num; i++) { | ||
105 | + object_property_set_bool(OBJECT(&s->wdt[i]), true, "realized", &err); | ||
106 | + if (err) { | ||
107 | + error_propagate(errp, err); | ||
108 | + return; | ||
109 | + } | ||
110 | + sysbus_mmio_map(SYS_BUS_DEVICE(&s->wdt[i]), 0, | ||
111 | + ASPEED_SOC_WDT_BASE + i * 0x20); | ||
112 | } | ||
113 | - sysbus_mmio_map(SYS_BUS_DEVICE(&s->wdt), 0, ASPEED_SOC_WDT_BASE); | ||
114 | |||
115 | /* Net */ | ||
116 | qdev_set_nic_properties(DEVICE(&s->ftgmac100), &nd_table[0]); | ||
117 | -- | 41 | -- |
118 | 2.7.4 | 42 | 2.20.1 |
119 | 43 | ||
120 | 44 | diff view generated by jsdifflib |
1 | For v7M, writes to the CONTROL register are only permitted for | 1 | From: Marc Zyngier <maz@kernel.org> |
---|---|---|---|
2 | privileged code. However even if the code is privileged, the | ||
3 | write must not affect the SPSEL bit in the CONTROL register | ||
4 | if the CPU is in Thread mode (as documented in the pseudocode | ||
5 | for the MSR instruction). Implement this, instead of permitting | ||
6 | SPSEL to be written in all cases. | ||
7 | 2 | ||
8 | This was causing mbed applications not to run, because the | 3 | The ARMv8 ARM states when executing at EL2, EL3 or Secure EL1, |
9 | RTX RTOS they use relies on this behaviour. | 4 | ISR_EL1 shows the pending status of the physical IRQ, FIQ, or |
5 | SError interrupts. | ||
10 | 6 | ||
7 | Unfortunately, QEMU's implementation only considers the HCR_EL2 | ||
8 | bits, and ignores the current exception level. This means a hypervisor | ||
9 | trying to look at its own interrupt state actually sees the guest | ||
10 | state, which is unexpected and breaks KVM as of Linux 5.3. | ||
11 | |||
12 | Instead, check for the running EL and return the physical bits | ||
13 | if not running in a virtualized context. | ||
14 | |||
15 | Fixes: 636540e9c40b | ||
16 | Cc: qemu-stable@nongnu.org | ||
17 | Reported-by: Quentin Perret <qperret@google.com> | ||
18 | Signed-off-by: Marc Zyngier <maz@kernel.org> | ||
19 | Message-id: 20191122135833.28953-1-maz@kernel.org | ||
20 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
21 | Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 22 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
13 | Message-id: 1498820791-8130-1-git-send-email-peter.maydell@linaro.org | ||
14 | --- | 23 | --- |
15 | target/arm/helper.c | 13 ++++++++++--- | 24 | target/arm/helper.c | 7 +++++-- |
16 | 1 file changed, 10 insertions(+), 3 deletions(-) | 25 | 1 file changed, 5 insertions(+), 2 deletions(-) |
17 | 26 | ||
18 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 27 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
19 | index XXXXXXX..XXXXXXX 100644 | 28 | index XXXXXXX..XXXXXXX 100644 |
20 | --- a/target/arm/helper.c | 29 | --- a/target/arm/helper.c |
21 | +++ b/target/arm/helper.c | 30 | +++ b/target/arm/helper.c |
22 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_msr)(CPUARMState *env, uint32_t maskreg, uint32_t val) | 31 | @@ -XXX,XX +XXX,XX @@ static uint64_t isr_read(CPUARMState *env, const ARMCPRegInfo *ri) |
32 | CPUState *cs = env_cpu(env); | ||
33 | uint64_t hcr_el2 = arm_hcr_el2_eff(env); | ||
34 | uint64_t ret = 0; | ||
35 | + bool allow_virt = (arm_current_el(env) == 1 && | ||
36 | + (!arm_is_secure_below_el3(env) || | ||
37 | + (env->cp15.scr_el3 & SCR_EEL2))); | ||
38 | |||
39 | - if (hcr_el2 & HCR_IMO) { | ||
40 | + if (allow_virt && (hcr_el2 & HCR_IMO)) { | ||
41 | if (cs->interrupt_request & CPU_INTERRUPT_VIRQ) { | ||
42 | ret |= CPSR_I; | ||
23 | } | 43 | } |
24 | break; | 44 | @@ -XXX,XX +XXX,XX @@ static uint64_t isr_read(CPUARMState *env, const ARMCPRegInfo *ri) |
25 | case 20: /* CONTROL */ | 45 | } |
26 | - switch_v7m_sp(env, (val & R_V7M_CONTROL_SPSEL_MASK) != 0); | 46 | } |
27 | - env->v7m.control = val & (R_V7M_CONTROL_SPSEL_MASK | | 47 | |
28 | - R_V7M_CONTROL_NPRIV_MASK); | 48 | - if (hcr_el2 & HCR_FMO) { |
29 | + /* Writing to the SPSEL bit only has an effect if we are in | 49 | + if (allow_virt && (hcr_el2 & HCR_FMO)) { |
30 | + * thread mode; other bits can be updated by any privileged code. | 50 | if (cs->interrupt_request & CPU_INTERRUPT_VFIQ) { |
31 | + * switch_v7m_sp() deals with updating the SPSEL bit in | 51 | ret |= CPSR_F; |
32 | + * env->v7m.control, so we only need update the others. | 52 | } |
33 | + */ | ||
34 | + if (env->v7m.exception == 0) { | ||
35 | + switch_v7m_sp(env, (val & R_V7M_CONTROL_SPSEL_MASK) != 0); | ||
36 | + } | ||
37 | + env->v7m.control &= ~R_V7M_CONTROL_NPRIV_MASK; | ||
38 | + env->v7m.control |= val & R_V7M_CONTROL_NPRIV_MASK; | ||
39 | break; | ||
40 | default: | ||
41 | qemu_log_mask(LOG_GUEST_ERROR, "Attempt to write unknown special" | ||
42 | -- | 53 | -- |
43 | 2.7.4 | 54 | 2.20.1 |
44 | 55 | ||
45 | 56 | diff view generated by jsdifflib |
1 | From: Krzysztof Kozlowski <krzk@kernel.org> | 1 | From: Marc Zyngier <maz@kernel.org> |
---|---|---|---|
2 | 2 | ||
3 | Add emulation for Exynos4210 Pseudo Random Number Generator which could | 3 | HCR_EL2.TID3 mandates that access from EL1 to a long list of id |
4 | work on fixed seeds or with seeds provided by True Random Number | 4 | registers traps to EL2, and QEMU has so far ignored this requirement. |
5 | Generator block inside the SoC. | 5 | |
6 | 6 | This breaks (among other things) KVM guests that have PtrAuth enabled, | |
7 | Implement only the fixed seeds part of it in polling mode (no | 7 | while the hypervisor doesn't want to expose the feature to its guest. |
8 | interrupts). | 8 | To achieve this, KVM traps the ID registers (ID_AA64ISAR1_EL1 in this |
9 | 9 | case), and masks out the unsupported feature. | |
10 | Emulation tested with two independent Linux kernel exynos-rng drivers: | 10 | |
11 | 1. New kcapi-rng interface (targeting Linux v4.12), | 11 | QEMU not honoring the trap request means that the guest observes |
12 | 2. Old hwrng inteface | 12 | that the feature is present in the HW, starts using it, and dies |
13 | # echo "exynos" > /sys/class/misc/hw_random/rng_current | 13 | a horrible death when KVM injects an UNDEF, because the feature |
14 | # dd if=/dev/hwrng of=/dev/null bs=1 count=16 | 14 | *really* isn't supported. |
15 | 15 | ||
16 | Signed-off-by: Krzysztof Kozlowski <krzk@kernel.org> | 16 | Do the right thing by trapping to EL2 if HCR_EL2.TID3 is set. |
17 | Message-id: 20170425180609.11004-1-krzk@kernel.org | 17 | |
18 | Note that this change does not include trapping of the MVFR | ||
19 | registers from AArch32 (they are accessed via the VMRS | ||
20 | instruction and need to be handled in a different way). | ||
21 | |||
22 | Reported-by: Will Deacon <will@kernel.org> | ||
23 | Signed-off-by: Marc Zyngier <maz@kernel.org> | ||
24 | Tested-by: Will Deacon <will@kernel.org> | ||
25 | Message-id: 20191123115618.29230-1-maz@kernel.org | ||
26 | [PMM: added missing accessfn line for ID_AA4PFR2_EL1_RESERVED; | ||
27 | changed names of access functions to include _tid3] | ||
18 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 28 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
19 | [PMM: wrapped a few overlong lines; more efficient implementation | ||
20 | of exynos4210_rng_seed_ready()] | ||
21 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 29 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
22 | --- | 30 | --- |
23 | hw/misc/Makefile.objs | 2 +- | 31 | target/arm/helper.c | 76 +++++++++++++++++++++++++++++++++++++++++++++ |
24 | hw/arm/exynos4210.c | 4 + | 32 | 1 file changed, 76 insertions(+) |
25 | hw/misc/exynos4210_rng.c | 277 +++++++++++++++++++++++++++++++++++++++++++++++ | 33 | |
26 | 3 files changed, 282 insertions(+), 1 deletion(-) | 34 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
27 | create mode 100644 hw/misc/exynos4210_rng.c | ||
28 | |||
29 | diff --git a/hw/misc/Makefile.objs b/hw/misc/Makefile.objs | ||
30 | index XXXXXXX..XXXXXXX 100644 | 35 | index XXXXXXX..XXXXXXX 100644 |
31 | --- a/hw/misc/Makefile.objs | 36 | --- a/target/arm/helper.c |
32 | +++ b/hw/misc/Makefile.objs | 37 | +++ b/target/arm/helper.c |
33 | @@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_IVSHMEM) += ivshmem.o | 38 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo predinv_reginfo[] = { |
34 | obj-$(CONFIG_REALVIEW) += arm_sysctl.o | 39 | REGINFO_SENTINEL |
35 | obj-$(CONFIG_NSERIES) += cbus.o | 40 | }; |
36 | obj-$(CONFIG_ECCMEMCTL) += eccmemctl.o | 41 | |
37 | -obj-$(CONFIG_EXYNOS4) += exynos4210_pmu.o exynos4210_clk.o | 42 | +static CPAccessResult access_aa64_tid3(CPUARMState *env, const ARMCPRegInfo *ri, |
38 | +obj-$(CONFIG_EXYNOS4) += exynos4210_pmu.o exynos4210_clk.o exynos4210_rng.o | 43 | + bool isread) |
39 | obj-$(CONFIG_IMX) += imx_ccm.o | 44 | +{ |
40 | obj-$(CONFIG_IMX) += imx31_ccm.o | 45 | + if ((arm_current_el(env) < 2) && (arm_hcr_el2_eff(env) & HCR_TID3)) { |
41 | obj-$(CONFIG_IMX) += imx25_ccm.o | 46 | + return CP_ACCESS_TRAP_EL2; |
42 | diff --git a/hw/arm/exynos4210.c b/hw/arm/exynos4210.c | 47 | + } |
43 | index XXXXXXX..XXXXXXX 100644 | ||
44 | --- a/hw/arm/exynos4210.c | ||
45 | +++ b/hw/arm/exynos4210.c | ||
46 | @@ -XXX,XX +XXX,XX @@ | ||
47 | /* Clock controller SFR base address */ | ||
48 | #define EXYNOS4210_CLK_BASE_ADDR 0x10030000 | ||
49 | |||
50 | +/* PRNG/HASH SFR base address */ | ||
51 | +#define EXYNOS4210_RNG_BASE_ADDR 0x10830400 | ||
52 | + | 48 | + |
53 | /* Display controllers (FIMD) */ | 49 | + return CP_ACCESS_OK; |
54 | #define EXYNOS4210_FIMD0_BASE_ADDR 0x11C00000 | ||
55 | |||
56 | @@ -XXX,XX +XXX,XX @@ Exynos4210State *exynos4210_init(MemoryRegion *system_mem) | ||
57 | sysbus_create_simple("exynos4210.pmu", EXYNOS4210_PMU_BASE_ADDR, NULL); | ||
58 | |||
59 | sysbus_create_simple("exynos4210.clk", EXYNOS4210_CLK_BASE_ADDR, NULL); | ||
60 | + sysbus_create_simple("exynos4210.rng", EXYNOS4210_RNG_BASE_ADDR, NULL); | ||
61 | |||
62 | /* PWM */ | ||
63 | sysbus_create_varargs("exynos4210.pwm", EXYNOS4210_PWM_BASE_ADDR, | ||
64 | diff --git a/hw/misc/exynos4210_rng.c b/hw/misc/exynos4210_rng.c | ||
65 | new file mode 100644 | ||
66 | index XXXXXXX..XXXXXXX | ||
67 | --- /dev/null | ||
68 | +++ b/hw/misc/exynos4210_rng.c | ||
69 | @@ -XXX,XX +XXX,XX @@ | ||
70 | +/* | ||
71 | + * Exynos4210 Pseudo Random Nubmer Generator Emulation | ||
72 | + * | ||
73 | + * Copyright (c) 2017 Krzysztof Kozlowski <krzk@kernel.org> | ||
74 | + * | ||
75 | + * This program is free software; you can redistribute it and/or modify it | ||
76 | + * under the terms of the GNU General Public License as published by the | ||
77 | + * Free Software Foundation; either version 2 of the License, or | ||
78 | + * (at your option) any later version. | ||
79 | + * | ||
80 | + * This program is distributed in the hope that it will be useful, but WITHOUT | ||
81 | + * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or | ||
82 | + * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License | ||
83 | + * for more details. | ||
84 | + * | ||
85 | + * You should have received a copy of the GNU General Public License along | ||
86 | + * with this program; if not, see <http://www.gnu.org/licenses/>. | ||
87 | + */ | ||
88 | + | ||
89 | +#include "qemu/osdep.h" | ||
90 | +#include "crypto/random.h" | ||
91 | +#include "hw/sysbus.h" | ||
92 | +#include "qemu/log.h" | ||
93 | + | ||
94 | +#define DEBUG_EXYNOS_RNG 0 | ||
95 | + | ||
96 | +#define DPRINTF(fmt, ...) \ | ||
97 | + do { \ | ||
98 | + if (DEBUG_EXYNOS_RNG) { \ | ||
99 | + printf("exynos4210_rng: " fmt, ## __VA_ARGS__); \ | ||
100 | + } \ | ||
101 | + } while (0) | ||
102 | + | ||
103 | +#define TYPE_EXYNOS4210_RNG "exynos4210.rng" | ||
104 | +#define EXYNOS4210_RNG(obj) \ | ||
105 | + OBJECT_CHECK(Exynos4210RngState, (obj), TYPE_EXYNOS4210_RNG) | ||
106 | + | ||
107 | +/* | ||
108 | + * Exynos4220, PRNG, only polling mode is supported. | ||
109 | + */ | ||
110 | + | ||
111 | +/* RNG_CONTROL_1 register bitfields, reset value: 0x0 */ | ||
112 | +#define EXYNOS4210_RNG_CONTROL_1_PRNG 0x8 | ||
113 | +#define EXYNOS4210_RNG_CONTROL_1_START_INIT BIT(4) | ||
114 | +/* RNG_STATUS register bitfields, reset value: 0x1 */ | ||
115 | +#define EXYNOS4210_RNG_STATUS_PRNG_ERROR BIT(7) | ||
116 | +#define EXYNOS4210_RNG_STATUS_PRNG_DONE BIT(5) | ||
117 | +#define EXYNOS4210_RNG_STATUS_MSG_DONE BIT(4) | ||
118 | +#define EXYNOS4210_RNG_STATUS_PARTIAL_DONE BIT(3) | ||
119 | +#define EXYNOS4210_RNG_STATUS_PRNG_BUSY BIT(2) | ||
120 | +#define EXYNOS4210_RNG_STATUS_SEED_SETTING_DONE BIT(1) | ||
121 | +#define EXYNOS4210_RNG_STATUS_BUFFER_READY BIT(0) | ||
122 | +#define EXYNOS4210_RNG_STATUS_WRITE_MASK (EXYNOS4210_RNG_STATUS_PRNG_DONE \ | ||
123 | + | EXYNOS4210_RNG_STATUS_MSG_DONE \ | ||
124 | + | EXYNOS4210_RNG_STATUS_PARTIAL_DONE) | ||
125 | + | ||
126 | +#define EXYNOS4210_RNG_CONTROL_1 0x0 | ||
127 | +#define EXYNOS4210_RNG_STATUS 0x10 | ||
128 | +#define EXYNOS4210_RNG_SEED_IN 0x140 | ||
129 | +#define EXYNOS4210_RNG_SEED_IN_OFFSET(n) (EXYNOS4210_RNG_SEED_IN + (n * 0x4)) | ||
130 | +#define EXYNOS4210_RNG_PRNG 0x160 | ||
131 | +#define EXYNOS4210_RNG_PRNG_OFFSET(n) (EXYNOS4210_RNG_PRNG + (n * 0x4)) | ||
132 | + | ||
133 | +#define EXYNOS4210_RNG_PRNG_NUM 5 | ||
134 | + | ||
135 | +#define EXYNOS4210_RNG_REGS_MEM_SIZE 0x200 | ||
136 | + | ||
137 | +typedef struct Exynos4210RngState { | ||
138 | + SysBusDevice parent_obj; | ||
139 | + MemoryRegion iomem; | ||
140 | + | ||
141 | + int32_t randr_value[EXYNOS4210_RNG_PRNG_NUM]; | ||
142 | + /* bits from 0 to EXYNOS4210_RNG_PRNG_NUM if given seed register was set */ | ||
143 | + uint32_t seed_set; | ||
144 | + | ||
145 | + /* Register values */ | ||
146 | + uint32_t reg_control; | ||
147 | + uint32_t reg_status; | ||
148 | +} Exynos4210RngState; | ||
149 | + | ||
150 | +static bool exynos4210_rng_seed_ready(const Exynos4210RngState *s) | ||
151 | +{ | ||
152 | + uint32_t mask = MAKE_64BIT_MASK(0, EXYNOS4210_RNG_PRNG_NUM); | ||
153 | + | ||
154 | + /* Return true if all the seed-set bits are set. */ | ||
155 | + return (s->seed_set & mask) == mask; | ||
156 | +} | 50 | +} |
157 | + | 51 | + |
158 | +static void exynos4210_rng_set_seed(Exynos4210RngState *s, unsigned int i, | 52 | +static CPAccessResult access_aa32_tid3(CPUARMState *env, const ARMCPRegInfo *ri, |
159 | + uint64_t val) | 53 | + bool isread) |
160 | +{ | 54 | +{ |
161 | + /* | 55 | + if (arm_feature(env, ARM_FEATURE_V8)) { |
162 | + * We actually ignore the seed and always generate true random numbers. | 56 | + return access_aa64_tid3(env, ri, isread); |
163 | + * Theoretically this should not match the device as Exynos has | 57 | + } |
164 | + * a Pseudo Random Number Generator but testing shown that it always | ||
165 | + * generates random numbers regardless of the seed value. | ||
166 | + */ | ||
167 | + s->seed_set |= BIT(i); | ||
168 | + | 58 | + |
169 | + /* If all seeds were written, update the status to reflect it */ | 59 | + return CP_ACCESS_OK; |
170 | + if (exynos4210_rng_seed_ready(s)) { | ||
171 | + s->reg_status |= EXYNOS4210_RNG_STATUS_SEED_SETTING_DONE; | ||
172 | + } else { | ||
173 | + s->reg_status &= ~EXYNOS4210_RNG_STATUS_SEED_SETTING_DONE; | ||
174 | + } | ||
175 | +} | 60 | +} |
176 | + | 61 | + |
177 | +static void exynos4210_rng_run_engine(Exynos4210RngState *s) | 62 | void register_cp_regs_for_features(ARMCPU *cpu) |
178 | +{ | 63 | { |
179 | + Error *err = NULL; | 64 | /* Register all the coprocessor registers based on feature bits */ |
180 | + int ret; | 65 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) |
181 | + | 66 | { .name = "ID_PFR0", .state = ARM_CP_STATE_BOTH, |
182 | + /* Seed set? */ | 67 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 1, .opc2 = 0, |
183 | + if ((s->reg_status & EXYNOS4210_RNG_STATUS_SEED_SETTING_DONE) == 0) { | 68 | .access = PL1_R, .type = ARM_CP_CONST, |
184 | + goto out; | 69 | + .accessfn = access_aa32_tid3, |
185 | + } | 70 | .resetvalue = cpu->id_pfr0 }, |
186 | + | 71 | /* ID_PFR1 is not a plain ARM_CP_CONST because we don't know |
187 | + /* PRNG engine chosen? */ | 72 | * the value of the GIC field until after we define these regs. |
188 | + if ((s->reg_control & EXYNOS4210_RNG_CONTROL_1_PRNG) == 0) { | 73 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) |
189 | + goto out; | 74 | { .name = "ID_PFR1", .state = ARM_CP_STATE_BOTH, |
190 | + } | 75 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 1, .opc2 = 1, |
191 | + | 76 | .access = PL1_R, .type = ARM_CP_NO_RAW, |
192 | + /* PRNG engine started? */ | 77 | + .accessfn = access_aa32_tid3, |
193 | + if ((s->reg_control & EXYNOS4210_RNG_CONTROL_1_START_INIT) == 0) { | 78 | .readfn = id_pfr1_read, |
194 | + goto out; | 79 | .writefn = arm_cp_write_ignore }, |
195 | + } | 80 | { .name = "ID_DFR0", .state = ARM_CP_STATE_BOTH, |
196 | + | 81 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 1, .opc2 = 2, |
197 | + /* Get randoms */ | 82 | .access = PL1_R, .type = ARM_CP_CONST, |
198 | + ret = qcrypto_random_bytes((uint8_t *)s->randr_value, | 83 | + .accessfn = access_aa32_tid3, |
199 | + sizeof(s->randr_value), &err); | 84 | .resetvalue = cpu->id_dfr0 }, |
200 | + if (!ret) { | 85 | { .name = "ID_AFR0", .state = ARM_CP_STATE_BOTH, |
201 | + /* Notify that PRNG is ready */ | 86 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 1, .opc2 = 3, |
202 | + s->reg_status |= EXYNOS4210_RNG_STATUS_PRNG_DONE; | 87 | .access = PL1_R, .type = ARM_CP_CONST, |
203 | + } else { | 88 | + .accessfn = access_aa32_tid3, |
204 | + error_report_err(err); | 89 | .resetvalue = cpu->id_afr0 }, |
205 | + } | 90 | { .name = "ID_MMFR0", .state = ARM_CP_STATE_BOTH, |
206 | + | 91 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 1, .opc2 = 4, |
207 | +out: | 92 | .access = PL1_R, .type = ARM_CP_CONST, |
208 | + /* Always clear start engine bit */ | 93 | + .accessfn = access_aa32_tid3, |
209 | + s->reg_control &= ~EXYNOS4210_RNG_CONTROL_1_START_INIT; | 94 | .resetvalue = cpu->id_mmfr0 }, |
210 | +} | 95 | { .name = "ID_MMFR1", .state = ARM_CP_STATE_BOTH, |
211 | + | 96 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 1, .opc2 = 5, |
212 | +static uint64_t exynos4210_rng_read(void *opaque, hwaddr offset, | 97 | .access = PL1_R, .type = ARM_CP_CONST, |
213 | + unsigned size) | 98 | + .accessfn = access_aa32_tid3, |
214 | +{ | 99 | .resetvalue = cpu->id_mmfr1 }, |
215 | + Exynos4210RngState *s = (Exynos4210RngState *)opaque; | 100 | { .name = "ID_MMFR2", .state = ARM_CP_STATE_BOTH, |
216 | + uint32_t val = 0; | 101 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 1, .opc2 = 6, |
217 | + | 102 | .access = PL1_R, .type = ARM_CP_CONST, |
218 | + assert(size == 4); | 103 | + .accessfn = access_aa32_tid3, |
219 | + | 104 | .resetvalue = cpu->id_mmfr2 }, |
220 | + switch (offset) { | 105 | { .name = "ID_MMFR3", .state = ARM_CP_STATE_BOTH, |
221 | + case EXYNOS4210_RNG_CONTROL_1: | 106 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 1, .opc2 = 7, |
222 | + val = s->reg_control; | 107 | .access = PL1_R, .type = ARM_CP_CONST, |
223 | + break; | 108 | + .accessfn = access_aa32_tid3, |
224 | + | 109 | .resetvalue = cpu->id_mmfr3 }, |
225 | + case EXYNOS4210_RNG_STATUS: | 110 | { .name = "ID_ISAR0", .state = ARM_CP_STATE_BOTH, |
226 | + val = s->reg_status; | 111 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 2, .opc2 = 0, |
227 | + break; | 112 | .access = PL1_R, .type = ARM_CP_CONST, |
228 | + | 113 | + .accessfn = access_aa32_tid3, |
229 | + case EXYNOS4210_RNG_PRNG_OFFSET(0): | 114 | .resetvalue = cpu->isar.id_isar0 }, |
230 | + case EXYNOS4210_RNG_PRNG_OFFSET(1): | 115 | { .name = "ID_ISAR1", .state = ARM_CP_STATE_BOTH, |
231 | + case EXYNOS4210_RNG_PRNG_OFFSET(2): | 116 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 2, .opc2 = 1, |
232 | + case EXYNOS4210_RNG_PRNG_OFFSET(3): | 117 | .access = PL1_R, .type = ARM_CP_CONST, |
233 | + case EXYNOS4210_RNG_PRNG_OFFSET(4): | 118 | + .accessfn = access_aa32_tid3, |
234 | + val = s->randr_value[(offset - EXYNOS4210_RNG_PRNG_OFFSET(0)) / 4]; | 119 | .resetvalue = cpu->isar.id_isar1 }, |
235 | + DPRINTF("returning random @0x%" HWADDR_PRIx ": 0x%" PRIx32 "\n", | 120 | { .name = "ID_ISAR2", .state = ARM_CP_STATE_BOTH, |
236 | + offset, val); | 121 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 2, .opc2 = 2, |
237 | + break; | 122 | .access = PL1_R, .type = ARM_CP_CONST, |
238 | + | 123 | + .accessfn = access_aa32_tid3, |
239 | + default: | 124 | .resetvalue = cpu->isar.id_isar2 }, |
240 | + qemu_log_mask(LOG_GUEST_ERROR, | 125 | { .name = "ID_ISAR3", .state = ARM_CP_STATE_BOTH, |
241 | + "%s: bad read offset 0x%" HWADDR_PRIx "\n", | 126 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 2, .opc2 = 3, |
242 | + __func__, offset); | 127 | .access = PL1_R, .type = ARM_CP_CONST, |
243 | + } | 128 | + .accessfn = access_aa32_tid3, |
244 | + | 129 | .resetvalue = cpu->isar.id_isar3 }, |
245 | + return val; | 130 | { .name = "ID_ISAR4", .state = ARM_CP_STATE_BOTH, |
246 | +} | 131 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 2, .opc2 = 4, |
247 | + | 132 | .access = PL1_R, .type = ARM_CP_CONST, |
248 | +static void exynos4210_rng_write(void *opaque, hwaddr offset, | 133 | + .accessfn = access_aa32_tid3, |
249 | + uint64_t val, unsigned size) | 134 | .resetvalue = cpu->isar.id_isar4 }, |
250 | +{ | 135 | { .name = "ID_ISAR5", .state = ARM_CP_STATE_BOTH, |
251 | + Exynos4210RngState *s = (Exynos4210RngState *)opaque; | 136 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 2, .opc2 = 5, |
252 | + | 137 | .access = PL1_R, .type = ARM_CP_CONST, |
253 | + assert(size == 4); | 138 | + .accessfn = access_aa32_tid3, |
254 | + | 139 | .resetvalue = cpu->isar.id_isar5 }, |
255 | + switch (offset) { | 140 | { .name = "ID_MMFR4", .state = ARM_CP_STATE_BOTH, |
256 | + case EXYNOS4210_RNG_CONTROL_1: | 141 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 2, .opc2 = 6, |
257 | + DPRINTF("RNG_CONTROL_1 = 0x%" PRIx64 "\n", val); | 142 | .access = PL1_R, .type = ARM_CP_CONST, |
258 | + s->reg_control = val; | 143 | + .accessfn = access_aa32_tid3, |
259 | + exynos4210_rng_run_engine(s); | 144 | .resetvalue = cpu->id_mmfr4 }, |
260 | + break; | 145 | { .name = "ID_ISAR6", .state = ARM_CP_STATE_BOTH, |
261 | + | 146 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 2, .opc2 = 7, |
262 | + case EXYNOS4210_RNG_STATUS: | 147 | .access = PL1_R, .type = ARM_CP_CONST, |
263 | + /* For clearing status fields */ | 148 | + .accessfn = access_aa32_tid3, |
264 | + s->reg_status &= ~EXYNOS4210_RNG_STATUS_WRITE_MASK; | 149 | .resetvalue = cpu->isar.id_isar6 }, |
265 | + s->reg_status |= val & EXYNOS4210_RNG_STATUS_WRITE_MASK; | 150 | REGINFO_SENTINEL |
266 | + break; | 151 | }; |
267 | + | 152 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) |
268 | + case EXYNOS4210_RNG_SEED_IN_OFFSET(0): | 153 | { .name = "ID_AA64PFR0_EL1", .state = ARM_CP_STATE_AA64, |
269 | + case EXYNOS4210_RNG_SEED_IN_OFFSET(1): | 154 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 4, .opc2 = 0, |
270 | + case EXYNOS4210_RNG_SEED_IN_OFFSET(2): | 155 | .access = PL1_R, .type = ARM_CP_NO_RAW, |
271 | + case EXYNOS4210_RNG_SEED_IN_OFFSET(3): | 156 | + .accessfn = access_aa64_tid3, |
272 | + case EXYNOS4210_RNG_SEED_IN_OFFSET(4): | 157 | .readfn = id_aa64pfr0_read, |
273 | + exynos4210_rng_set_seed(s, | 158 | .writefn = arm_cp_write_ignore }, |
274 | + (offset - EXYNOS4210_RNG_SEED_IN_OFFSET(0)) / 4, | 159 | { .name = "ID_AA64PFR1_EL1", .state = ARM_CP_STATE_AA64, |
275 | + val); | 160 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 4, .opc2 = 1, |
276 | + break; | 161 | .access = PL1_R, .type = ARM_CP_CONST, |
277 | + | 162 | + .accessfn = access_aa64_tid3, |
278 | + default: | 163 | .resetvalue = cpu->isar.id_aa64pfr1}, |
279 | + qemu_log_mask(LOG_GUEST_ERROR, | 164 | { .name = "ID_AA64PFR2_EL1_RESERVED", .state = ARM_CP_STATE_AA64, |
280 | + "%s: bad write offset 0x%" HWADDR_PRIx "\n", | 165 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 4, .opc2 = 2, |
281 | + __func__, offset); | 166 | .access = PL1_R, .type = ARM_CP_CONST, |
282 | + } | 167 | + .accessfn = access_aa64_tid3, |
283 | +} | 168 | .resetvalue = 0 }, |
284 | + | 169 | { .name = "ID_AA64PFR3_EL1_RESERVED", .state = ARM_CP_STATE_AA64, |
285 | +static const MemoryRegionOps exynos4210_rng_ops = { | 170 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 4, .opc2 = 3, |
286 | + .read = exynos4210_rng_read, | 171 | .access = PL1_R, .type = ARM_CP_CONST, |
287 | + .write = exynos4210_rng_write, | 172 | + .accessfn = access_aa64_tid3, |
288 | + .endianness = DEVICE_NATIVE_ENDIAN, | 173 | .resetvalue = 0 }, |
289 | +}; | 174 | { .name = "ID_AA64ZFR0_EL1", .state = ARM_CP_STATE_AA64, |
290 | + | 175 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 4, .opc2 = 4, |
291 | +static void exynos4210_rng_reset(DeviceState *dev) | 176 | .access = PL1_R, .type = ARM_CP_CONST, |
292 | +{ | 177 | + .accessfn = access_aa64_tid3, |
293 | + Exynos4210RngState *s = EXYNOS4210_RNG(dev); | 178 | /* At present, only SVEver == 0 is defined anyway. */ |
294 | + | 179 | .resetvalue = 0 }, |
295 | + s->reg_control = 0; | 180 | { .name = "ID_AA64PFR5_EL1_RESERVED", .state = ARM_CP_STATE_AA64, |
296 | + s->reg_status = EXYNOS4210_RNG_STATUS_BUFFER_READY; | 181 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 4, .opc2 = 5, |
297 | + memset(s->randr_value, 0, sizeof(s->randr_value)); | 182 | .access = PL1_R, .type = ARM_CP_CONST, |
298 | + s->seed_set = 0; | 183 | + .accessfn = access_aa64_tid3, |
299 | +} | 184 | .resetvalue = 0 }, |
300 | + | 185 | { .name = "ID_AA64PFR6_EL1_RESERVED", .state = ARM_CP_STATE_AA64, |
301 | +static void exynos4210_rng_init(Object *obj) | 186 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 4, .opc2 = 6, |
302 | +{ | 187 | .access = PL1_R, .type = ARM_CP_CONST, |
303 | + Exynos4210RngState *s = EXYNOS4210_RNG(obj); | 188 | + .accessfn = access_aa64_tid3, |
304 | + SysBusDevice *dev = SYS_BUS_DEVICE(obj); | 189 | .resetvalue = 0 }, |
305 | + | 190 | { .name = "ID_AA64PFR7_EL1_RESERVED", .state = ARM_CP_STATE_AA64, |
306 | + memory_region_init_io(&s->iomem, obj, &exynos4210_rng_ops, s, | 191 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 4, .opc2 = 7, |
307 | + TYPE_EXYNOS4210_RNG, EXYNOS4210_RNG_REGS_MEM_SIZE); | 192 | .access = PL1_R, .type = ARM_CP_CONST, |
308 | + sysbus_init_mmio(dev, &s->iomem); | 193 | + .accessfn = access_aa64_tid3, |
309 | +} | 194 | .resetvalue = 0 }, |
310 | + | 195 | { .name = "ID_AA64DFR0_EL1", .state = ARM_CP_STATE_AA64, |
311 | +static const VMStateDescription exynos4210_rng_vmstate = { | 196 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 5, .opc2 = 0, |
312 | + .name = TYPE_EXYNOS4210_RNG, | 197 | .access = PL1_R, .type = ARM_CP_CONST, |
313 | + .version_id = 1, | 198 | + .accessfn = access_aa64_tid3, |
314 | + .minimum_version_id = 1, | 199 | .resetvalue = cpu->id_aa64dfr0 }, |
315 | + .fields = (VMStateField[]) { | 200 | { .name = "ID_AA64DFR1_EL1", .state = ARM_CP_STATE_AA64, |
316 | + VMSTATE_INT32_ARRAY(randr_value, Exynos4210RngState, | 201 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 5, .opc2 = 1, |
317 | + EXYNOS4210_RNG_PRNG_NUM), | 202 | .access = PL1_R, .type = ARM_CP_CONST, |
318 | + VMSTATE_UINT32(seed_set, Exynos4210RngState), | 203 | + .accessfn = access_aa64_tid3, |
319 | + VMSTATE_UINT32(reg_status, Exynos4210RngState), | 204 | .resetvalue = cpu->id_aa64dfr1 }, |
320 | + VMSTATE_UINT32(reg_control, Exynos4210RngState), | 205 | { .name = "ID_AA64DFR2_EL1_RESERVED", .state = ARM_CP_STATE_AA64, |
321 | + VMSTATE_END_OF_LIST() | 206 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 5, .opc2 = 2, |
322 | + } | 207 | .access = PL1_R, .type = ARM_CP_CONST, |
323 | +}; | 208 | + .accessfn = access_aa64_tid3, |
324 | + | 209 | .resetvalue = 0 }, |
325 | +static void exynos4210_rng_class_init(ObjectClass *klass, void *data) | 210 | { .name = "ID_AA64DFR3_EL1_RESERVED", .state = ARM_CP_STATE_AA64, |
326 | +{ | 211 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 5, .opc2 = 3, |
327 | + DeviceClass *dc = DEVICE_CLASS(klass); | 212 | .access = PL1_R, .type = ARM_CP_CONST, |
328 | + | 213 | + .accessfn = access_aa64_tid3, |
329 | + dc->reset = exynos4210_rng_reset; | 214 | .resetvalue = 0 }, |
330 | + dc->vmsd = &exynos4210_rng_vmstate; | 215 | { .name = "ID_AA64AFR0_EL1", .state = ARM_CP_STATE_AA64, |
331 | +} | 216 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 5, .opc2 = 4, |
332 | + | 217 | .access = PL1_R, .type = ARM_CP_CONST, |
333 | +static const TypeInfo exynos4210_rng_info = { | 218 | + .accessfn = access_aa64_tid3, |
334 | + .name = TYPE_EXYNOS4210_RNG, | 219 | .resetvalue = cpu->id_aa64afr0 }, |
335 | + .parent = TYPE_SYS_BUS_DEVICE, | 220 | { .name = "ID_AA64AFR1_EL1", .state = ARM_CP_STATE_AA64, |
336 | + .instance_size = sizeof(Exynos4210RngState), | 221 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 5, .opc2 = 5, |
337 | + .instance_init = exynos4210_rng_init, | 222 | .access = PL1_R, .type = ARM_CP_CONST, |
338 | + .class_init = exynos4210_rng_class_init, | 223 | + .accessfn = access_aa64_tid3, |
339 | +}; | 224 | .resetvalue = cpu->id_aa64afr1 }, |
340 | + | 225 | { .name = "ID_AA64AFR2_EL1_RESERVED", .state = ARM_CP_STATE_AA64, |
341 | +static void exynos4210_rng_register(void) | 226 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 5, .opc2 = 6, |
342 | +{ | 227 | .access = PL1_R, .type = ARM_CP_CONST, |
343 | + type_register_static(&exynos4210_rng_info); | 228 | + .accessfn = access_aa64_tid3, |
344 | +} | 229 | .resetvalue = 0 }, |
345 | + | 230 | { .name = "ID_AA64AFR3_EL1_RESERVED", .state = ARM_CP_STATE_AA64, |
346 | +type_init(exynos4210_rng_register) | 231 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 5, .opc2 = 7, |
232 | .access = PL1_R, .type = ARM_CP_CONST, | ||
233 | + .accessfn = access_aa64_tid3, | ||
234 | .resetvalue = 0 }, | ||
235 | { .name = "ID_AA64ISAR0_EL1", .state = ARM_CP_STATE_AA64, | ||
236 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 6, .opc2 = 0, | ||
237 | .access = PL1_R, .type = ARM_CP_CONST, | ||
238 | + .accessfn = access_aa64_tid3, | ||
239 | .resetvalue = cpu->isar.id_aa64isar0 }, | ||
240 | { .name = "ID_AA64ISAR1_EL1", .state = ARM_CP_STATE_AA64, | ||
241 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 6, .opc2 = 1, | ||
242 | .access = PL1_R, .type = ARM_CP_CONST, | ||
243 | + .accessfn = access_aa64_tid3, | ||
244 | .resetvalue = cpu->isar.id_aa64isar1 }, | ||
245 | { .name = "ID_AA64ISAR2_EL1_RESERVED", .state = ARM_CP_STATE_AA64, | ||
246 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 6, .opc2 = 2, | ||
247 | .access = PL1_R, .type = ARM_CP_CONST, | ||
248 | + .accessfn = access_aa64_tid3, | ||
249 | .resetvalue = 0 }, | ||
250 | { .name = "ID_AA64ISAR3_EL1_RESERVED", .state = ARM_CP_STATE_AA64, | ||
251 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 6, .opc2 = 3, | ||
252 | .access = PL1_R, .type = ARM_CP_CONST, | ||
253 | + .accessfn = access_aa64_tid3, | ||
254 | .resetvalue = 0 }, | ||
255 | { .name = "ID_AA64ISAR4_EL1_RESERVED", .state = ARM_CP_STATE_AA64, | ||
256 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 6, .opc2 = 4, | ||
257 | .access = PL1_R, .type = ARM_CP_CONST, | ||
258 | + .accessfn = access_aa64_tid3, | ||
259 | .resetvalue = 0 }, | ||
260 | { .name = "ID_AA64ISAR5_EL1_RESERVED", .state = ARM_CP_STATE_AA64, | ||
261 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 6, .opc2 = 5, | ||
262 | .access = PL1_R, .type = ARM_CP_CONST, | ||
263 | + .accessfn = access_aa64_tid3, | ||
264 | .resetvalue = 0 }, | ||
265 | { .name = "ID_AA64ISAR6_EL1_RESERVED", .state = ARM_CP_STATE_AA64, | ||
266 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 6, .opc2 = 6, | ||
267 | .access = PL1_R, .type = ARM_CP_CONST, | ||
268 | + .accessfn = access_aa64_tid3, | ||
269 | .resetvalue = 0 }, | ||
270 | { .name = "ID_AA64ISAR7_EL1_RESERVED", .state = ARM_CP_STATE_AA64, | ||
271 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 6, .opc2 = 7, | ||
272 | .access = PL1_R, .type = ARM_CP_CONST, | ||
273 | + .accessfn = access_aa64_tid3, | ||
274 | .resetvalue = 0 }, | ||
275 | { .name = "ID_AA64MMFR0_EL1", .state = ARM_CP_STATE_AA64, | ||
276 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 7, .opc2 = 0, | ||
277 | .access = PL1_R, .type = ARM_CP_CONST, | ||
278 | + .accessfn = access_aa64_tid3, | ||
279 | .resetvalue = cpu->isar.id_aa64mmfr0 }, | ||
280 | { .name = "ID_AA64MMFR1_EL1", .state = ARM_CP_STATE_AA64, | ||
281 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 7, .opc2 = 1, | ||
282 | .access = PL1_R, .type = ARM_CP_CONST, | ||
283 | + .accessfn = access_aa64_tid3, | ||
284 | .resetvalue = cpu->isar.id_aa64mmfr1 }, | ||
285 | { .name = "ID_AA64MMFR2_EL1_RESERVED", .state = ARM_CP_STATE_AA64, | ||
286 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 7, .opc2 = 2, | ||
287 | .access = PL1_R, .type = ARM_CP_CONST, | ||
288 | + .accessfn = access_aa64_tid3, | ||
289 | .resetvalue = 0 }, | ||
290 | { .name = "ID_AA64MMFR3_EL1_RESERVED", .state = ARM_CP_STATE_AA64, | ||
291 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 7, .opc2 = 3, | ||
292 | .access = PL1_R, .type = ARM_CP_CONST, | ||
293 | + .accessfn = access_aa64_tid3, | ||
294 | .resetvalue = 0 }, | ||
295 | { .name = "ID_AA64MMFR4_EL1_RESERVED", .state = ARM_CP_STATE_AA64, | ||
296 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 7, .opc2 = 4, | ||
297 | .access = PL1_R, .type = ARM_CP_CONST, | ||
298 | + .accessfn = access_aa64_tid3, | ||
299 | .resetvalue = 0 }, | ||
300 | { .name = "ID_AA64MMFR5_EL1_RESERVED", .state = ARM_CP_STATE_AA64, | ||
301 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 7, .opc2 = 5, | ||
302 | .access = PL1_R, .type = ARM_CP_CONST, | ||
303 | + .accessfn = access_aa64_tid3, | ||
304 | .resetvalue = 0 }, | ||
305 | { .name = "ID_AA64MMFR6_EL1_RESERVED", .state = ARM_CP_STATE_AA64, | ||
306 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 7, .opc2 = 6, | ||
307 | .access = PL1_R, .type = ARM_CP_CONST, | ||
308 | + .accessfn = access_aa64_tid3, | ||
309 | .resetvalue = 0 }, | ||
310 | { .name = "ID_AA64MMFR7_EL1_RESERVED", .state = ARM_CP_STATE_AA64, | ||
311 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 7, .opc2 = 7, | ||
312 | .access = PL1_R, .type = ARM_CP_CONST, | ||
313 | + .accessfn = access_aa64_tid3, | ||
314 | .resetvalue = 0 }, | ||
315 | { .name = "MVFR0_EL1", .state = ARM_CP_STATE_AA64, | ||
316 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 3, .opc2 = 0, | ||
317 | .access = PL1_R, .type = ARM_CP_CONST, | ||
318 | + .accessfn = access_aa64_tid3, | ||
319 | .resetvalue = cpu->isar.mvfr0 }, | ||
320 | { .name = "MVFR1_EL1", .state = ARM_CP_STATE_AA64, | ||
321 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 3, .opc2 = 1, | ||
322 | .access = PL1_R, .type = ARM_CP_CONST, | ||
323 | + .accessfn = access_aa64_tid3, | ||
324 | .resetvalue = cpu->isar.mvfr1 }, | ||
325 | { .name = "MVFR2_EL1", .state = ARM_CP_STATE_AA64, | ||
326 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 3, .opc2 = 2, | ||
327 | .access = PL1_R, .type = ARM_CP_CONST, | ||
328 | + .accessfn = access_aa64_tid3, | ||
329 | .resetvalue = cpu->isar.mvfr2 }, | ||
330 | { .name = "MVFR3_EL1_RESERVED", .state = ARM_CP_STATE_AA64, | ||
331 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 3, .opc2 = 3, | ||
332 | .access = PL1_R, .type = ARM_CP_CONST, | ||
333 | + .accessfn = access_aa64_tid3, | ||
334 | .resetvalue = 0 }, | ||
335 | { .name = "MVFR4_EL1_RESERVED", .state = ARM_CP_STATE_AA64, | ||
336 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 3, .opc2 = 4, | ||
337 | .access = PL1_R, .type = ARM_CP_CONST, | ||
338 | + .accessfn = access_aa64_tid3, | ||
339 | .resetvalue = 0 }, | ||
340 | { .name = "MVFR5_EL1_RESERVED", .state = ARM_CP_STATE_AA64, | ||
341 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 3, .opc2 = 5, | ||
342 | .access = PL1_R, .type = ARM_CP_CONST, | ||
343 | + .accessfn = access_aa64_tid3, | ||
344 | .resetvalue = 0 }, | ||
345 | { .name = "MVFR6_EL1_RESERVED", .state = ARM_CP_STATE_AA64, | ||
346 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 3, .opc2 = 6, | ||
347 | .access = PL1_R, .type = ARM_CP_CONST, | ||
348 | + .accessfn = access_aa64_tid3, | ||
349 | .resetvalue = 0 }, | ||
350 | { .name = "MVFR7_EL1_RESERVED", .state = ARM_CP_STATE_AA64, | ||
351 | .opc0 = 3, .opc1 = 0, .crn = 0, .crm = 3, .opc2 = 7, | ||
352 | .access = PL1_R, .type = ARM_CP_CONST, | ||
353 | + .accessfn = access_aa64_tid3, | ||
354 | .resetvalue = 0 }, | ||
355 | { .name = "PMCEID0", .state = ARM_CP_STATE_AA32, | ||
356 | .cp = 15, .opc1 = 0, .crn = 9, .crm = 12, .opc2 = 6, | ||
347 | -- | 357 | -- |
348 | 2.7.4 | 358 | 2.20.1 |
349 | 359 | ||
350 | 360 | diff view generated by jsdifflib |