1
A surprisingly short target-arm queue, but no point in holding
1
Arm patches for rc3 : just a handful of bug fixes.
2
onto these waiting for more code to arrive :-)
3
2
4
thanks
3
thanks
5
-- PMM
4
-- PMM
6
5
7
The following changes since commit 3d0bf8dfdfebd7f2ae41b6f220444b8047d6b1ee:
8
6
9
Merge remote-tracking branch 'remotes/dgilbert/tags/pull-migration-20170710a' into staging (2017-07-10 18:13:03 +0100)
7
The following changes since commit 4ecc984210ca1bf508a96a550ec8a93a5f833f6c:
10
8
11
are available in the git repository at:
9
Merge remote-tracking branch 'remotes/palmer/tags/riscv-for-master-4.2-rc3' into staging (2019-11-26 12:36:40 +0000)
12
10
13
git://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20170711
11
are available in the Git repository at:
14
12
15
for you to fetch changes up to 792dac309c8660306557ba058b8b5a6a75ab3c1f:
13
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20191126
16
14
17
target-arm: v7M: ignore writes to CONTROL.SPSEL from Thread mode (2017-07-11 11:21:26 +0100)
15
for you to fetch changes up to 6a4ef4e5d1084ce41fafa7d470a644b0fd3d9317:
16
17
target/arm: Honor HCR_EL2.TID3 trapping requirements (2019-11-26 13:55:37 +0000)
18
18
19
----------------------------------------------------------------
19
----------------------------------------------------------------
20
target-arm queue:
20
target-arm queue:
21
* v7M: ignore writes to CONTROL.SPSEL from Thread mode
21
* handle FTYPE flag correctly in v7M exception return
22
* KVM: Enable in-kernel timers with user space gic
22
for v7M CPUs with an FPU (v8M CPUs were already correct)
23
* aspeed: Register all watchdogs
23
* versal: Add the CRP as unimplemented
24
* hw/misc: Add Exynos4210 Pseudo Random Number Generator
24
* Fix ISR_EL1 tracking when executing at EL2
25
* Honor HCR_EL2.TID3 trapping requirements
25
26
26
----------------------------------------------------------------
27
----------------------------------------------------------------
27
Alexander Graf (1):
28
Edgar E. Iglesias (1):
28
ARM: KVM: Enable in-kernel timers with user space gic
29
hw/arm: versal: Add the CRP as unimplemented
29
30
30
Joel Stanley (1):
31
Jean-Hugues Deschênes (1):
31
aspeed: Register all watchdogs
32
target/arm: Fix handling of cortex-m FTYPE flag in EXCRET
32
33
33
Krzysztof Kozlowski (1):
34
Marc Zyngier (2):
34
hw/misc: Add Exynos4210 Pseudo Random Number Generator
35
target/arm: Fix ISR_EL1 tracking when executing at EL2
36
target/arm: Honor HCR_EL2.TID3 trapping requirements
35
37
36
Peter Maydell (1):
38
include/hw/arm/xlnx-versal.h | 3 ++
37
target-arm: v7M: ignore writes to CONTROL.SPSEL from Thread mode
39
hw/arm/xlnx-versal.c | 2 ++
40
target/arm/helper.c | 83 ++++++++++++++++++++++++++++++++++++++++++--
41
target/arm/m_helper.c | 7 ++--
42
4 files changed, 89 insertions(+), 6 deletions(-)
38
43
39
hw/misc/Makefile.objs | 2 +-
40
include/hw/arm/aspeed_soc.h | 4 +-
41
include/sysemu/kvm.h | 11 ++
42
target/arm/cpu.h | 3 +
43
accel/kvm/kvm-all.c | 5 +
44
accel/stubs/kvm-stub.c | 5 +
45
hw/arm/aspeed_soc.c | 25 ++--
46
hw/arm/exynos4210.c | 4 +
47
hw/intc/arm_gic.c | 7 ++
48
hw/misc/exynos4210_rng.c | 277 ++++++++++++++++++++++++++++++++++++++++++++
49
target/arm/helper.c | 13 ++-
50
target/arm/kvm.c | 51 ++++++++
51
12 files changed, 394 insertions(+), 13 deletions(-)
52
create mode 100644 hw/misc/exynos4210_rng.c
53
diff view generated by jsdifflib
1
From: Alexander Graf <agraf@suse.de>
1
From: Jean-Hugues Deschênes <Jean-Hugues.Deschenes@ossiaco.com>
2
2
3
When running with KVM enabled, you can choose between emulating the
3
According to the PushStack() pseudocode in the armv7m RM,
4
gic in kernel or user space. If the kernel supports in-kernel virtualization
4
bit 4 of the LR should be set to NOT(CONTROL.PFCA) when
5
of the interrupt controller, it will default to that. If not, if will
5
an FPU is present. Current implementation is doing it for
6
default to user space emulation.
6
armv8, but not for armv7. This patch makes the existing
7
logic applicable to both code paths.
7
8
8
Unfortunately when running in user mode gic emulation, we miss out on
9
Signed-off-by: Jean-Hugues Deschenes <jean-hugues.deschenes@ossiaco.com>
9
interrupt events which are only available from kernel space, such as the timer.
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
This patch leverages the new kernel/user space pending line synchronization for
11
timer events. It does not handle PMU events yet.
12
13
Signed-off-by: Alexander Graf <agraf@suse.de>
14
Reviewed-by: Andrew Jones <drjones@redhat.com>
15
Message-id: 1498577737-130264-1-git-send-email-agraf@suse.de
16
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
---
12
---
18
include/sysemu/kvm.h | 11 +++++++++++
13
target/arm/m_helper.c | 7 +++----
19
target/arm/cpu.h | 3 +++
14
1 file changed, 3 insertions(+), 4 deletions(-)
20
accel/kvm/kvm-all.c | 5 +++++
21
accel/stubs/kvm-stub.c | 5 +++++
22
hw/intc/arm_gic.c | 7 +++++++
23
target/arm/kvm.c | 51 ++++++++++++++++++++++++++++++++++++++++++++++++++
24
6 files changed, 82 insertions(+)
25
15
26
diff --git a/include/sysemu/kvm.h b/include/sysemu/kvm.h
16
diff --git a/target/arm/m_helper.c b/target/arm/m_helper.c
27
index XXXXXXX..XXXXXXX 100644
17
index XXXXXXX..XXXXXXX 100644
28
--- a/include/sysemu/kvm.h
18
--- a/target/arm/m_helper.c
29
+++ b/include/sysemu/kvm.h
19
+++ b/target/arm/m_helper.c
30
@@ -XXX,XX +XXX,XX @@ int kvm_init_vcpu(CPUState *cpu);
20
@@ -XXX,XX +XXX,XX @@ void arm_v7m_cpu_do_interrupt(CPUState *cs)
31
int kvm_cpu_exec(CPUState *cpu);
21
if (env->v7m.secure) {
32
int kvm_destroy_vcpu(CPUState *cpu);
22
lr |= R_V7M_EXCRET_S_MASK;
33
23
}
34
+/**
24
- if (!(env->v7m.control[M_REG_S] & R_V7M_CONTROL_FPCA_MASK)) {
35
+ * kvm_arm_supports_user_irq
25
- lr |= R_V7M_EXCRET_FTYPE_MASK;
36
+ *
26
- }
37
+ * Not all KVM implementations support notifications for kernel generated
27
} else {
38
+ * interrupt events to user space. This function indicates whether the current
28
lr = R_V7M_EXCRET_RES1_MASK |
39
+ * KVM implementation does support them.
29
R_V7M_EXCRET_S_MASK |
40
+ *
30
R_V7M_EXCRET_DCRS_MASK |
41
+ * Returns: true if KVM supports using kernel generated IRQs from user space
31
- R_V7M_EXCRET_FTYPE_MASK |
42
+ */
32
R_V7M_EXCRET_ES_MASK;
43
+bool kvm_arm_supports_user_irq(void);
33
if (env->v7m.control[M_REG_NS] & R_V7M_CONTROL_SPSEL_MASK) {
44
+
34
lr |= R_V7M_EXCRET_SPSEL_MASK;
45
#ifdef NEED_CPU_H
35
}
46
#include "cpu.h"
47
48
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
49
index XXXXXXX..XXXXXXX 100644
50
--- a/target/arm/cpu.h
51
+++ b/target/arm/cpu.h
52
@@ -XXX,XX +XXX,XX @@ struct ARMCPU {
53
void *el_change_hook_opaque;
54
55
int32_t node_id; /* NUMA node this CPU belongs to */
56
+
57
+ /* Used to synchronize KVM and QEMU in-kernel device levels */
58
+ uint8_t device_irq_level;
59
};
60
61
static inline ARMCPU *arm_env_get_cpu(CPUARMState *env)
62
diff --git a/accel/kvm/kvm-all.c b/accel/kvm/kvm-all.c
63
index XXXXXXX..XXXXXXX 100644
64
--- a/accel/kvm/kvm-all.c
65
+++ b/accel/kvm/kvm-all.c
66
@@ -XXX,XX +XXX,XX @@ int kvm_has_intx_set_mask(void)
67
return kvm_state->intx_set_mask;
68
}
69
70
+bool kvm_arm_supports_user_irq(void)
71
+{
72
+ return kvm_check_extension(kvm_state, KVM_CAP_ARM_USER_IRQ);
73
+}
74
+
75
#ifdef KVM_CAP_SET_GUEST_DEBUG
76
struct kvm_sw_breakpoint *kvm_find_sw_breakpoint(CPUState *cpu,
77
target_ulong pc)
78
diff --git a/accel/stubs/kvm-stub.c b/accel/stubs/kvm-stub.c
79
index XXXXXXX..XXXXXXX 100644
80
--- a/accel/stubs/kvm-stub.c
81
+++ b/accel/stubs/kvm-stub.c
82
@@ -XXX,XX +XXX,XX @@ void kvm_init_cpu_signals(CPUState *cpu)
83
{
84
abort();
85
}
86
+
87
+bool kvm_arm_supports_user_irq(void)
88
+{
89
+ return false;
90
+}
91
#endif
92
diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c
93
index XXXXXXX..XXXXXXX 100644
94
--- a/hw/intc/arm_gic.c
95
+++ b/hw/intc/arm_gic.c
96
@@ -XXX,XX +XXX,XX @@
97
#include "qom/cpu.h"
98
#include "qemu/log.h"
99
#include "trace.h"
100
+#include "sysemu/kvm.h"
101
102
/* #define DEBUG_GIC */
103
104
@@ -XXX,XX +XXX,XX @@ static void arm_gic_realize(DeviceState *dev, Error **errp)
105
return;
106
}
36
}
107
37
+ if (!(env->v7m.control[M_REG_S] & R_V7M_CONTROL_FPCA_MASK)) {
108
+ if (kvm_enabled() && !kvm_arm_supports_user_irq()) {
38
+ lr |= R_V7M_EXCRET_FTYPE_MASK;
109
+ error_setg(errp, "KVM with user space irqchip only works when the "
110
+ "host kernel supports KVM_CAP_ARM_USER_IRQ");
111
+ return;
112
+ }
39
+ }
113
+
40
if (!arm_v7m_is_handler_mode(env)) {
114
/* This creates distributor and main CPU interface (s->cpuiomem[0]) */
41
lr |= R_V7M_EXCRET_MODE_MASK;
115
gic_init_irqs_and_mmio(s, gic_set_irq, gic_ops);
42
}
116
117
diff --git a/target/arm/kvm.c b/target/arm/kvm.c
118
index XXXXXXX..XXXXXXX 100644
119
--- a/target/arm/kvm.c
120
+++ b/target/arm/kvm.c
121
@@ -XXX,XX +XXX,XX @@ int kvm_arch_init(MachineState *ms, KVMState *s)
122
*/
123
kvm_async_interrupts_allowed = true;
124
125
+ /*
126
+ * PSCI wakes up secondary cores, so we always need to
127
+ * have vCPUs waiting in kernel space
128
+ */
129
+ kvm_halt_in_kernel_allowed = true;
130
+
131
cap_has_mp_state = kvm_check_extension(s, KVM_CAP_MP_STATE);
132
133
type_register_static(&host_arm_cpu_type_info);
134
@@ -XXX,XX +XXX,XX @@ void kvm_arch_pre_run(CPUState *cs, struct kvm_run *run)
135
136
MemTxAttrs kvm_arch_post_run(CPUState *cs, struct kvm_run *run)
137
{
138
+ ARMCPU *cpu;
139
+ uint32_t switched_level;
140
+
141
+ if (kvm_irqchip_in_kernel()) {
142
+ /*
143
+ * We only need to sync timer states with user-space interrupt
144
+ * controllers, so return early and save cycles if we don't.
145
+ */
146
+ return MEMTXATTRS_UNSPECIFIED;
147
+ }
148
+
149
+ cpu = ARM_CPU(cs);
150
+
151
+ /* Synchronize our shadowed in-kernel device irq lines with the kvm ones */
152
+ if (run->s.regs.device_irq_level != cpu->device_irq_level) {
153
+ switched_level = cpu->device_irq_level ^ run->s.regs.device_irq_level;
154
+
155
+ qemu_mutex_lock_iothread();
156
+
157
+ if (switched_level & KVM_ARM_DEV_EL1_VTIMER) {
158
+ qemu_set_irq(cpu->gt_timer_outputs[GTIMER_VIRT],
159
+ !!(run->s.regs.device_irq_level &
160
+ KVM_ARM_DEV_EL1_VTIMER));
161
+ switched_level &= ~KVM_ARM_DEV_EL1_VTIMER;
162
+ }
163
+
164
+ if (switched_level & KVM_ARM_DEV_EL1_PTIMER) {
165
+ qemu_set_irq(cpu->gt_timer_outputs[GTIMER_PHYS],
166
+ !!(run->s.regs.device_irq_level &
167
+ KVM_ARM_DEV_EL1_PTIMER));
168
+ switched_level &= ~KVM_ARM_DEV_EL1_PTIMER;
169
+ }
170
+
171
+ /* XXX PMU IRQ is missing */
172
+
173
+ if (switched_level) {
174
+ qemu_log_mask(LOG_UNIMP, "%s: unhandled in-kernel device IRQ %x\n",
175
+ __func__, switched_level);
176
+ }
177
+
178
+ /* We also mark unknown levels as processed to not waste cycles */
179
+ cpu->device_irq_level = run->s.regs.device_irq_level;
180
+ qemu_mutex_unlock_iothread();
181
+ }
182
+
183
return MEMTXATTRS_UNSPECIFIED;
184
}
185
186
--
43
--
187
2.7.4
44
2.20.1
188
45
189
46
diff view generated by jsdifflib
1
From: Joel Stanley <joel@jms.id.au>
1
From: "Edgar E. Iglesias" <edgar.iglesias@xilinx.com>
2
2
3
The ast2400 contains two and the ast2500 contains three watchdogs.
3
Add the CRP as unimplemented thus avoiding bus errors when
4
Add this information to the AspeedSoCInfo and realise the correct number
4
guests access these registers.
5
of watchdogs for that each SoC type.
6
5
7
Signed-off-by: Joel Stanley <joel@jms.id.au>
6
Signed-off-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com>
8
Reviewed-by: Cédric Le Goater <clg@kaod.org>
7
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
9
Tested-by: Cédric Le Goater <clg@kaod.org>
8
Reviewed-by: Luc Michel <luc.michel@greensocs.com>
9
Message-id: 20191115154734.26449-2-edgar.iglesias@gmail.com
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
11
---
12
include/hw/arm/aspeed_soc.h | 4 +++-
12
include/hw/arm/xlnx-versal.h | 3 +++
13
hw/arm/aspeed_soc.c | 25 +++++++++++++++++--------
13
hw/arm/xlnx-versal.c | 2 ++
14
2 files changed, 20 insertions(+), 9 deletions(-)
14
2 files changed, 5 insertions(+)
15
15
16
diff --git a/include/hw/arm/aspeed_soc.h b/include/hw/arm/aspeed_soc.h
16
diff --git a/include/hw/arm/xlnx-versal.h b/include/hw/arm/xlnx-versal.h
17
index XXXXXXX..XXXXXXX 100644
17
index XXXXXXX..XXXXXXX 100644
18
--- a/include/hw/arm/aspeed_soc.h
18
--- a/include/hw/arm/xlnx-versal.h
19
+++ b/include/hw/arm/aspeed_soc.h
19
+++ b/include/hw/arm/xlnx-versal.h
20
@@ -XXX,XX +XXX,XX @@
20
@@ -XXX,XX +XXX,XX @@ typedef struct Versal {
21
#include "hw/net/ftgmac100.h"
21
#define MM_IOU_SCNTRS_SIZE 0x10000
22
22
#define MM_FPD_CRF 0xfd1a0000U
23
#define ASPEED_SPIS_NUM 2
23
#define MM_FPD_CRF_SIZE 0x140000
24
+#define ASPEED_WDTS_NUM 3
24
+
25
25
+#define MM_PMC_CRP 0xf1260000U
26
typedef struct AspeedSoCState {
26
+#define MM_PMC_CRP_SIZE 0x10000
27
/*< private >*/
27
#endif
28
@@ -XXX,XX +XXX,XX @@ typedef struct AspeedSoCState {
28
diff --git a/hw/arm/xlnx-versal.c b/hw/arm/xlnx-versal.c
29
AspeedSMCState fmc;
30
AspeedSMCState spi[ASPEED_SPIS_NUM];
31
AspeedSDMCState sdmc;
32
- AspeedWDTState wdt;
33
+ AspeedWDTState wdt[ASPEED_WDTS_NUM];
34
FTGMAC100State ftgmac100;
35
} AspeedSoCState;
36
37
@@ -XXX,XX +XXX,XX @@ typedef struct AspeedSoCInfo {
38
const hwaddr *spi_bases;
39
const char *fmc_typename;
40
const char **spi_typename;
41
+ int wdts_num;
42
} AspeedSoCInfo;
43
44
typedef struct AspeedSoCClass {
45
diff --git a/hw/arm/aspeed_soc.c b/hw/arm/aspeed_soc.c
46
index XXXXXXX..XXXXXXX 100644
29
index XXXXXXX..XXXXXXX 100644
47
--- a/hw/arm/aspeed_soc.c
30
--- a/hw/arm/xlnx-versal.c
48
+++ b/hw/arm/aspeed_soc.c
31
+++ b/hw/arm/xlnx-versal.c
49
@@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = {
32
@@ -XXX,XX +XXX,XX @@ static void versal_unimp(Versal *s)
50
.spi_bases = aspeed_soc_ast2400_spi_bases,
33
MM_CRL, MM_CRL_SIZE);
51
.fmc_typename = "aspeed.smc.fmc",
34
versal_unimp_area(s, "crf", &s->mr_ps,
52
.spi_typename = aspeed_soc_ast2400_typenames,
35
MM_FPD_CRF, MM_FPD_CRF_SIZE);
53
+ .wdts_num = 2,
36
+ versal_unimp_area(s, "crp", &s->mr_ps,
54
}, {
37
+ MM_PMC_CRP, MM_PMC_CRP_SIZE);
55
.name = "ast2400-a1",
38
versal_unimp_area(s, "iou-scntr", &s->mr_ps,
56
.cpu_model = "arm926",
39
MM_IOU_SCNTR, MM_IOU_SCNTR_SIZE);
57
@@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = {
40
versal_unimp_area(s, "iou-scntr-seucre", &s->mr_ps,
58
.spi_bases = aspeed_soc_ast2400_spi_bases,
59
.fmc_typename = "aspeed.smc.fmc",
60
.spi_typename = aspeed_soc_ast2400_typenames,
61
+ .wdts_num = 2,
62
}, {
63
.name = "ast2400",
64
.cpu_model = "arm926",
65
@@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = {
66
.spi_bases = aspeed_soc_ast2400_spi_bases,
67
.fmc_typename = "aspeed.smc.fmc",
68
.spi_typename = aspeed_soc_ast2400_typenames,
69
+ .wdts_num = 2,
70
}, {
71
.name = "ast2500-a1",
72
.cpu_model = "arm1176",
73
@@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = {
74
.spi_bases = aspeed_soc_ast2500_spi_bases,
75
.fmc_typename = "aspeed.smc.ast2500-fmc",
76
.spi_typename = aspeed_soc_ast2500_typenames,
77
+ .wdts_num = 3,
78
},
79
};
80
81
@@ -XXX,XX +XXX,XX @@ static void aspeed_soc_init(Object *obj)
82
object_property_add_alias(obj, "ram-size", OBJECT(&s->sdmc),
83
"ram-size", &error_abort);
84
85
- object_initialize(&s->wdt, sizeof(s->wdt), TYPE_ASPEED_WDT);
86
- object_property_add_child(obj, "wdt", OBJECT(&s->wdt), NULL);
87
- qdev_set_parent_bus(DEVICE(&s->wdt), sysbus_get_default());
88
+ for (i = 0; i < sc->info->wdts_num; i++) {
89
+ object_initialize(&s->wdt[i], sizeof(s->wdt[i]), TYPE_ASPEED_WDT);
90
+ object_property_add_child(obj, "wdt[*]", OBJECT(&s->wdt[i]), NULL);
91
+ qdev_set_parent_bus(DEVICE(&s->wdt[i]), sysbus_get_default());
92
+ }
93
94
object_initialize(&s->ftgmac100, sizeof(s->ftgmac100), TYPE_FTGMAC100);
95
object_property_add_child(obj, "ftgmac100", OBJECT(&s->ftgmac100), NULL);
96
@@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp)
97
sysbus_mmio_map(SYS_BUS_DEVICE(&s->sdmc), 0, ASPEED_SOC_SDMC_BASE);
98
99
/* Watch dog */
100
- object_property_set_bool(OBJECT(&s->wdt), true, "realized", &err);
101
- if (err) {
102
- error_propagate(errp, err);
103
- return;
104
+ for (i = 0; i < sc->info->wdts_num; i++) {
105
+ object_property_set_bool(OBJECT(&s->wdt[i]), true, "realized", &err);
106
+ if (err) {
107
+ error_propagate(errp, err);
108
+ return;
109
+ }
110
+ sysbus_mmio_map(SYS_BUS_DEVICE(&s->wdt[i]), 0,
111
+ ASPEED_SOC_WDT_BASE + i * 0x20);
112
}
113
- sysbus_mmio_map(SYS_BUS_DEVICE(&s->wdt), 0, ASPEED_SOC_WDT_BASE);
114
115
/* Net */
116
qdev_set_nic_properties(DEVICE(&s->ftgmac100), &nd_table[0]);
117
--
41
--
118
2.7.4
42
2.20.1
119
43
120
44
diff view generated by jsdifflib
1
For v7M, writes to the CONTROL register are only permitted for
1
From: Marc Zyngier <maz@kernel.org>
2
privileged code. However even if the code is privileged, the
3
write must not affect the SPSEL bit in the CONTROL register
4
if the CPU is in Thread mode (as documented in the pseudocode
5
for the MSR instruction). Implement this, instead of permitting
6
SPSEL to be written in all cases.
7
2
8
This was causing mbed applications not to run, because the
3
The ARMv8 ARM states when executing at EL2, EL3 or Secure EL1,
9
RTX RTOS they use relies on this behaviour.
4
ISR_EL1 shows the pending status of the physical IRQ, FIQ, or
5
SError interrupts.
10
6
7
Unfortunately, QEMU's implementation only considers the HCR_EL2
8
bits, and ignores the current exception level. This means a hypervisor
9
trying to look at its own interrupt state actually sees the guest
10
state, which is unexpected and breaks KVM as of Linux 5.3.
11
12
Instead, check for the running EL and return the physical bits
13
if not running in a virtualized context.
14
15
Fixes: 636540e9c40b
16
Cc: qemu-stable@nongnu.org
17
Reported-by: Quentin Perret <qperret@google.com>
18
Signed-off-by: Marc Zyngier <maz@kernel.org>
19
Message-id: 20191122135833.28953-1-maz@kernel.org
20
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
21
Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
22
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
13
Message-id: 1498820791-8130-1-git-send-email-peter.maydell@linaro.org
14
---
23
---
15
target/arm/helper.c | 13 ++++++++++---
24
target/arm/helper.c | 7 +++++--
16
1 file changed, 10 insertions(+), 3 deletions(-)
25
1 file changed, 5 insertions(+), 2 deletions(-)
17
26
18
diff --git a/target/arm/helper.c b/target/arm/helper.c
27
diff --git a/target/arm/helper.c b/target/arm/helper.c
19
index XXXXXXX..XXXXXXX 100644
28
index XXXXXXX..XXXXXXX 100644
20
--- a/target/arm/helper.c
29
--- a/target/arm/helper.c
21
+++ b/target/arm/helper.c
30
+++ b/target/arm/helper.c
22
@@ -XXX,XX +XXX,XX @@ void HELPER(v7m_msr)(CPUARMState *env, uint32_t maskreg, uint32_t val)
31
@@ -XXX,XX +XXX,XX @@ static uint64_t isr_read(CPUARMState *env, const ARMCPRegInfo *ri)
32
CPUState *cs = env_cpu(env);
33
uint64_t hcr_el2 = arm_hcr_el2_eff(env);
34
uint64_t ret = 0;
35
+ bool allow_virt = (arm_current_el(env) == 1 &&
36
+ (!arm_is_secure_below_el3(env) ||
37
+ (env->cp15.scr_el3 & SCR_EEL2)));
38
39
- if (hcr_el2 & HCR_IMO) {
40
+ if (allow_virt && (hcr_el2 & HCR_IMO)) {
41
if (cs->interrupt_request & CPU_INTERRUPT_VIRQ) {
42
ret |= CPSR_I;
23
}
43
}
24
break;
44
@@ -XXX,XX +XXX,XX @@ static uint64_t isr_read(CPUARMState *env, const ARMCPRegInfo *ri)
25
case 20: /* CONTROL */
45
}
26
- switch_v7m_sp(env, (val & R_V7M_CONTROL_SPSEL_MASK) != 0);
46
}
27
- env->v7m.control = val & (R_V7M_CONTROL_SPSEL_MASK |
47
28
- R_V7M_CONTROL_NPRIV_MASK);
48
- if (hcr_el2 & HCR_FMO) {
29
+ /* Writing to the SPSEL bit only has an effect if we are in
49
+ if (allow_virt && (hcr_el2 & HCR_FMO)) {
30
+ * thread mode; other bits can be updated by any privileged code.
50
if (cs->interrupt_request & CPU_INTERRUPT_VFIQ) {
31
+ * switch_v7m_sp() deals with updating the SPSEL bit in
51
ret |= CPSR_F;
32
+ * env->v7m.control, so we only need update the others.
52
}
33
+ */
34
+ if (env->v7m.exception == 0) {
35
+ switch_v7m_sp(env, (val & R_V7M_CONTROL_SPSEL_MASK) != 0);
36
+ }
37
+ env->v7m.control &= ~R_V7M_CONTROL_NPRIV_MASK;
38
+ env->v7m.control |= val & R_V7M_CONTROL_NPRIV_MASK;
39
break;
40
default:
41
qemu_log_mask(LOG_GUEST_ERROR, "Attempt to write unknown special"
42
--
53
--
43
2.7.4
54
2.20.1
44
55
45
56
diff view generated by jsdifflib
1
From: Krzysztof Kozlowski <krzk@kernel.org>
1
From: Marc Zyngier <maz@kernel.org>
2
2
3
Add emulation for Exynos4210 Pseudo Random Number Generator which could
3
HCR_EL2.TID3 mandates that access from EL1 to a long list of id
4
work on fixed seeds or with seeds provided by True Random Number
4
registers traps to EL2, and QEMU has so far ignored this requirement.
5
Generator block inside the SoC.
5
6
6
This breaks (among other things) KVM guests that have PtrAuth enabled,
7
Implement only the fixed seeds part of it in polling mode (no
7
while the hypervisor doesn't want to expose the feature to its guest.
8
interrupts).
8
To achieve this, KVM traps the ID registers (ID_AA64ISAR1_EL1 in this
9
9
case), and masks out the unsupported feature.
10
Emulation tested with two independent Linux kernel exynos-rng drivers:
10
11
1. New kcapi-rng interface (targeting Linux v4.12),
11
QEMU not honoring the trap request means that the guest observes
12
2. Old hwrng inteface
12
that the feature is present in the HW, starts using it, and dies
13
# echo "exynos" > /sys/class/misc/hw_random/rng_current
13
a horrible death when KVM injects an UNDEF, because the feature
14
# dd if=/dev/hwrng of=/dev/null bs=1 count=16
14
*really* isn't supported.
15
15
16
Signed-off-by: Krzysztof Kozlowski <krzk@kernel.org>
16
Do the right thing by trapping to EL2 if HCR_EL2.TID3 is set.
17
Message-id: 20170425180609.11004-1-krzk@kernel.org
17
18
Note that this change does not include trapping of the MVFR
19
registers from AArch32 (they are accessed via the VMRS
20
instruction and need to be handled in a different way).
21
22
Reported-by: Will Deacon <will@kernel.org>
23
Signed-off-by: Marc Zyngier <maz@kernel.org>
24
Tested-by: Will Deacon <will@kernel.org>
25
Message-id: 20191123115618.29230-1-maz@kernel.org
26
[PMM: added missing accessfn line for ID_AA4PFR2_EL1_RESERVED;
27
changed names of access functions to include _tid3]
18
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
28
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
19
[PMM: wrapped a few overlong lines; more efficient implementation
20
of exynos4210_rng_seed_ready()]
21
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
29
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
22
---
30
---
23
hw/misc/Makefile.objs | 2 +-
31
target/arm/helper.c | 76 +++++++++++++++++++++++++++++++++++++++++++++
24
hw/arm/exynos4210.c | 4 +
32
1 file changed, 76 insertions(+)
25
hw/misc/exynos4210_rng.c | 277 +++++++++++++++++++++++++++++++++++++++++++++++
33
26
3 files changed, 282 insertions(+), 1 deletion(-)
34
diff --git a/target/arm/helper.c b/target/arm/helper.c
27
create mode 100644 hw/misc/exynos4210_rng.c
28
29
diff --git a/hw/misc/Makefile.objs b/hw/misc/Makefile.objs
30
index XXXXXXX..XXXXXXX 100644
35
index XXXXXXX..XXXXXXX 100644
31
--- a/hw/misc/Makefile.objs
36
--- a/target/arm/helper.c
32
+++ b/hw/misc/Makefile.objs
37
+++ b/target/arm/helper.c
33
@@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_IVSHMEM) += ivshmem.o
38
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo predinv_reginfo[] = {
34
obj-$(CONFIG_REALVIEW) += arm_sysctl.o
39
REGINFO_SENTINEL
35
obj-$(CONFIG_NSERIES) += cbus.o
40
};
36
obj-$(CONFIG_ECCMEMCTL) += eccmemctl.o
41
37
-obj-$(CONFIG_EXYNOS4) += exynos4210_pmu.o exynos4210_clk.o
42
+static CPAccessResult access_aa64_tid3(CPUARMState *env, const ARMCPRegInfo *ri,
38
+obj-$(CONFIG_EXYNOS4) += exynos4210_pmu.o exynos4210_clk.o exynos4210_rng.o
43
+ bool isread)
39
obj-$(CONFIG_IMX) += imx_ccm.o
44
+{
40
obj-$(CONFIG_IMX) += imx31_ccm.o
45
+ if ((arm_current_el(env) < 2) && (arm_hcr_el2_eff(env) & HCR_TID3)) {
41
obj-$(CONFIG_IMX) += imx25_ccm.o
46
+ return CP_ACCESS_TRAP_EL2;
42
diff --git a/hw/arm/exynos4210.c b/hw/arm/exynos4210.c
47
+ }
43
index XXXXXXX..XXXXXXX 100644
44
--- a/hw/arm/exynos4210.c
45
+++ b/hw/arm/exynos4210.c
46
@@ -XXX,XX +XXX,XX @@
47
/* Clock controller SFR base address */
48
#define EXYNOS4210_CLK_BASE_ADDR 0x10030000
49
50
+/* PRNG/HASH SFR base address */
51
+#define EXYNOS4210_RNG_BASE_ADDR 0x10830400
52
+
48
+
53
/* Display controllers (FIMD) */
49
+ return CP_ACCESS_OK;
54
#define EXYNOS4210_FIMD0_BASE_ADDR 0x11C00000
55
56
@@ -XXX,XX +XXX,XX @@ Exynos4210State *exynos4210_init(MemoryRegion *system_mem)
57
sysbus_create_simple("exynos4210.pmu", EXYNOS4210_PMU_BASE_ADDR, NULL);
58
59
sysbus_create_simple("exynos4210.clk", EXYNOS4210_CLK_BASE_ADDR, NULL);
60
+ sysbus_create_simple("exynos4210.rng", EXYNOS4210_RNG_BASE_ADDR, NULL);
61
62
/* PWM */
63
sysbus_create_varargs("exynos4210.pwm", EXYNOS4210_PWM_BASE_ADDR,
64
diff --git a/hw/misc/exynos4210_rng.c b/hw/misc/exynos4210_rng.c
65
new file mode 100644
66
index XXXXXXX..XXXXXXX
67
--- /dev/null
68
+++ b/hw/misc/exynos4210_rng.c
69
@@ -XXX,XX +XXX,XX @@
70
+/*
71
+ * Exynos4210 Pseudo Random Nubmer Generator Emulation
72
+ *
73
+ * Copyright (c) 2017 Krzysztof Kozlowski <krzk@kernel.org>
74
+ *
75
+ * This program is free software; you can redistribute it and/or modify it
76
+ * under the terms of the GNU General Public License as published by the
77
+ * Free Software Foundation; either version 2 of the License, or
78
+ * (at your option) any later version.
79
+ *
80
+ * This program is distributed in the hope that it will be useful, but WITHOUT
81
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
82
+ * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
83
+ * for more details.
84
+ *
85
+ * You should have received a copy of the GNU General Public License along
86
+ * with this program; if not, see <http://www.gnu.org/licenses/>.
87
+ */
88
+
89
+#include "qemu/osdep.h"
90
+#include "crypto/random.h"
91
+#include "hw/sysbus.h"
92
+#include "qemu/log.h"
93
+
94
+#define DEBUG_EXYNOS_RNG 0
95
+
96
+#define DPRINTF(fmt, ...) \
97
+ do { \
98
+ if (DEBUG_EXYNOS_RNG) { \
99
+ printf("exynos4210_rng: " fmt, ## __VA_ARGS__); \
100
+ } \
101
+ } while (0)
102
+
103
+#define TYPE_EXYNOS4210_RNG "exynos4210.rng"
104
+#define EXYNOS4210_RNG(obj) \
105
+ OBJECT_CHECK(Exynos4210RngState, (obj), TYPE_EXYNOS4210_RNG)
106
+
107
+/*
108
+ * Exynos4220, PRNG, only polling mode is supported.
109
+ */
110
+
111
+/* RNG_CONTROL_1 register bitfields, reset value: 0x0 */
112
+#define EXYNOS4210_RNG_CONTROL_1_PRNG 0x8
113
+#define EXYNOS4210_RNG_CONTROL_1_START_INIT BIT(4)
114
+/* RNG_STATUS register bitfields, reset value: 0x1 */
115
+#define EXYNOS4210_RNG_STATUS_PRNG_ERROR BIT(7)
116
+#define EXYNOS4210_RNG_STATUS_PRNG_DONE BIT(5)
117
+#define EXYNOS4210_RNG_STATUS_MSG_DONE BIT(4)
118
+#define EXYNOS4210_RNG_STATUS_PARTIAL_DONE BIT(3)
119
+#define EXYNOS4210_RNG_STATUS_PRNG_BUSY BIT(2)
120
+#define EXYNOS4210_RNG_STATUS_SEED_SETTING_DONE BIT(1)
121
+#define EXYNOS4210_RNG_STATUS_BUFFER_READY BIT(0)
122
+#define EXYNOS4210_RNG_STATUS_WRITE_MASK (EXYNOS4210_RNG_STATUS_PRNG_DONE \
123
+ | EXYNOS4210_RNG_STATUS_MSG_DONE \
124
+ | EXYNOS4210_RNG_STATUS_PARTIAL_DONE)
125
+
126
+#define EXYNOS4210_RNG_CONTROL_1 0x0
127
+#define EXYNOS4210_RNG_STATUS 0x10
128
+#define EXYNOS4210_RNG_SEED_IN 0x140
129
+#define EXYNOS4210_RNG_SEED_IN_OFFSET(n) (EXYNOS4210_RNG_SEED_IN + (n * 0x4))
130
+#define EXYNOS4210_RNG_PRNG 0x160
131
+#define EXYNOS4210_RNG_PRNG_OFFSET(n) (EXYNOS4210_RNG_PRNG + (n * 0x4))
132
+
133
+#define EXYNOS4210_RNG_PRNG_NUM 5
134
+
135
+#define EXYNOS4210_RNG_REGS_MEM_SIZE 0x200
136
+
137
+typedef struct Exynos4210RngState {
138
+ SysBusDevice parent_obj;
139
+ MemoryRegion iomem;
140
+
141
+ int32_t randr_value[EXYNOS4210_RNG_PRNG_NUM];
142
+ /* bits from 0 to EXYNOS4210_RNG_PRNG_NUM if given seed register was set */
143
+ uint32_t seed_set;
144
+
145
+ /* Register values */
146
+ uint32_t reg_control;
147
+ uint32_t reg_status;
148
+} Exynos4210RngState;
149
+
150
+static bool exynos4210_rng_seed_ready(const Exynos4210RngState *s)
151
+{
152
+ uint32_t mask = MAKE_64BIT_MASK(0, EXYNOS4210_RNG_PRNG_NUM);
153
+
154
+ /* Return true if all the seed-set bits are set. */
155
+ return (s->seed_set & mask) == mask;
156
+}
50
+}
157
+
51
+
158
+static void exynos4210_rng_set_seed(Exynos4210RngState *s, unsigned int i,
52
+static CPAccessResult access_aa32_tid3(CPUARMState *env, const ARMCPRegInfo *ri,
159
+ uint64_t val)
53
+ bool isread)
160
+{
54
+{
161
+ /*
55
+ if (arm_feature(env, ARM_FEATURE_V8)) {
162
+ * We actually ignore the seed and always generate true random numbers.
56
+ return access_aa64_tid3(env, ri, isread);
163
+ * Theoretically this should not match the device as Exynos has
57
+ }
164
+ * a Pseudo Random Number Generator but testing shown that it always
165
+ * generates random numbers regardless of the seed value.
166
+ */
167
+ s->seed_set |= BIT(i);
168
+
58
+
169
+ /* If all seeds were written, update the status to reflect it */
59
+ return CP_ACCESS_OK;
170
+ if (exynos4210_rng_seed_ready(s)) {
171
+ s->reg_status |= EXYNOS4210_RNG_STATUS_SEED_SETTING_DONE;
172
+ } else {
173
+ s->reg_status &= ~EXYNOS4210_RNG_STATUS_SEED_SETTING_DONE;
174
+ }
175
+}
60
+}
176
+
61
+
177
+static void exynos4210_rng_run_engine(Exynos4210RngState *s)
62
void register_cp_regs_for_features(ARMCPU *cpu)
178
+{
63
{
179
+ Error *err = NULL;
64
/* Register all the coprocessor registers based on feature bits */
180
+ int ret;
65
@@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu)
181
+
66
{ .name = "ID_PFR0", .state = ARM_CP_STATE_BOTH,
182
+ /* Seed set? */
67
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 1, .opc2 = 0,
183
+ if ((s->reg_status & EXYNOS4210_RNG_STATUS_SEED_SETTING_DONE) == 0) {
68
.access = PL1_R, .type = ARM_CP_CONST,
184
+ goto out;
69
+ .accessfn = access_aa32_tid3,
185
+ }
70
.resetvalue = cpu->id_pfr0 },
186
+
71
/* ID_PFR1 is not a plain ARM_CP_CONST because we don't know
187
+ /* PRNG engine chosen? */
72
* the value of the GIC field until after we define these regs.
188
+ if ((s->reg_control & EXYNOS4210_RNG_CONTROL_1_PRNG) == 0) {
73
@@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu)
189
+ goto out;
74
{ .name = "ID_PFR1", .state = ARM_CP_STATE_BOTH,
190
+ }
75
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 1, .opc2 = 1,
191
+
76
.access = PL1_R, .type = ARM_CP_NO_RAW,
192
+ /* PRNG engine started? */
77
+ .accessfn = access_aa32_tid3,
193
+ if ((s->reg_control & EXYNOS4210_RNG_CONTROL_1_START_INIT) == 0) {
78
.readfn = id_pfr1_read,
194
+ goto out;
79
.writefn = arm_cp_write_ignore },
195
+ }
80
{ .name = "ID_DFR0", .state = ARM_CP_STATE_BOTH,
196
+
81
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 1, .opc2 = 2,
197
+ /* Get randoms */
82
.access = PL1_R, .type = ARM_CP_CONST,
198
+ ret = qcrypto_random_bytes((uint8_t *)s->randr_value,
83
+ .accessfn = access_aa32_tid3,
199
+ sizeof(s->randr_value), &err);
84
.resetvalue = cpu->id_dfr0 },
200
+ if (!ret) {
85
{ .name = "ID_AFR0", .state = ARM_CP_STATE_BOTH,
201
+ /* Notify that PRNG is ready */
86
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 1, .opc2 = 3,
202
+ s->reg_status |= EXYNOS4210_RNG_STATUS_PRNG_DONE;
87
.access = PL1_R, .type = ARM_CP_CONST,
203
+ } else {
88
+ .accessfn = access_aa32_tid3,
204
+ error_report_err(err);
89
.resetvalue = cpu->id_afr0 },
205
+ }
90
{ .name = "ID_MMFR0", .state = ARM_CP_STATE_BOTH,
206
+
91
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 1, .opc2 = 4,
207
+out:
92
.access = PL1_R, .type = ARM_CP_CONST,
208
+ /* Always clear start engine bit */
93
+ .accessfn = access_aa32_tid3,
209
+ s->reg_control &= ~EXYNOS4210_RNG_CONTROL_1_START_INIT;
94
.resetvalue = cpu->id_mmfr0 },
210
+}
95
{ .name = "ID_MMFR1", .state = ARM_CP_STATE_BOTH,
211
+
96
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 1, .opc2 = 5,
212
+static uint64_t exynos4210_rng_read(void *opaque, hwaddr offset,
97
.access = PL1_R, .type = ARM_CP_CONST,
213
+ unsigned size)
98
+ .accessfn = access_aa32_tid3,
214
+{
99
.resetvalue = cpu->id_mmfr1 },
215
+ Exynos4210RngState *s = (Exynos4210RngState *)opaque;
100
{ .name = "ID_MMFR2", .state = ARM_CP_STATE_BOTH,
216
+ uint32_t val = 0;
101
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 1, .opc2 = 6,
217
+
102
.access = PL1_R, .type = ARM_CP_CONST,
218
+ assert(size == 4);
103
+ .accessfn = access_aa32_tid3,
219
+
104
.resetvalue = cpu->id_mmfr2 },
220
+ switch (offset) {
105
{ .name = "ID_MMFR3", .state = ARM_CP_STATE_BOTH,
221
+ case EXYNOS4210_RNG_CONTROL_1:
106
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 1, .opc2 = 7,
222
+ val = s->reg_control;
107
.access = PL1_R, .type = ARM_CP_CONST,
223
+ break;
108
+ .accessfn = access_aa32_tid3,
224
+
109
.resetvalue = cpu->id_mmfr3 },
225
+ case EXYNOS4210_RNG_STATUS:
110
{ .name = "ID_ISAR0", .state = ARM_CP_STATE_BOTH,
226
+ val = s->reg_status;
111
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 2, .opc2 = 0,
227
+ break;
112
.access = PL1_R, .type = ARM_CP_CONST,
228
+
113
+ .accessfn = access_aa32_tid3,
229
+ case EXYNOS4210_RNG_PRNG_OFFSET(0):
114
.resetvalue = cpu->isar.id_isar0 },
230
+ case EXYNOS4210_RNG_PRNG_OFFSET(1):
115
{ .name = "ID_ISAR1", .state = ARM_CP_STATE_BOTH,
231
+ case EXYNOS4210_RNG_PRNG_OFFSET(2):
116
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 2, .opc2 = 1,
232
+ case EXYNOS4210_RNG_PRNG_OFFSET(3):
117
.access = PL1_R, .type = ARM_CP_CONST,
233
+ case EXYNOS4210_RNG_PRNG_OFFSET(4):
118
+ .accessfn = access_aa32_tid3,
234
+ val = s->randr_value[(offset - EXYNOS4210_RNG_PRNG_OFFSET(0)) / 4];
119
.resetvalue = cpu->isar.id_isar1 },
235
+ DPRINTF("returning random @0x%" HWADDR_PRIx ": 0x%" PRIx32 "\n",
120
{ .name = "ID_ISAR2", .state = ARM_CP_STATE_BOTH,
236
+ offset, val);
121
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 2, .opc2 = 2,
237
+ break;
122
.access = PL1_R, .type = ARM_CP_CONST,
238
+
123
+ .accessfn = access_aa32_tid3,
239
+ default:
124
.resetvalue = cpu->isar.id_isar2 },
240
+ qemu_log_mask(LOG_GUEST_ERROR,
125
{ .name = "ID_ISAR3", .state = ARM_CP_STATE_BOTH,
241
+ "%s: bad read offset 0x%" HWADDR_PRIx "\n",
126
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 2, .opc2 = 3,
242
+ __func__, offset);
127
.access = PL1_R, .type = ARM_CP_CONST,
243
+ }
128
+ .accessfn = access_aa32_tid3,
244
+
129
.resetvalue = cpu->isar.id_isar3 },
245
+ return val;
130
{ .name = "ID_ISAR4", .state = ARM_CP_STATE_BOTH,
246
+}
131
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 2, .opc2 = 4,
247
+
132
.access = PL1_R, .type = ARM_CP_CONST,
248
+static void exynos4210_rng_write(void *opaque, hwaddr offset,
133
+ .accessfn = access_aa32_tid3,
249
+ uint64_t val, unsigned size)
134
.resetvalue = cpu->isar.id_isar4 },
250
+{
135
{ .name = "ID_ISAR5", .state = ARM_CP_STATE_BOTH,
251
+ Exynos4210RngState *s = (Exynos4210RngState *)opaque;
136
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 2, .opc2 = 5,
252
+
137
.access = PL1_R, .type = ARM_CP_CONST,
253
+ assert(size == 4);
138
+ .accessfn = access_aa32_tid3,
254
+
139
.resetvalue = cpu->isar.id_isar5 },
255
+ switch (offset) {
140
{ .name = "ID_MMFR4", .state = ARM_CP_STATE_BOTH,
256
+ case EXYNOS4210_RNG_CONTROL_1:
141
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 2, .opc2 = 6,
257
+ DPRINTF("RNG_CONTROL_1 = 0x%" PRIx64 "\n", val);
142
.access = PL1_R, .type = ARM_CP_CONST,
258
+ s->reg_control = val;
143
+ .accessfn = access_aa32_tid3,
259
+ exynos4210_rng_run_engine(s);
144
.resetvalue = cpu->id_mmfr4 },
260
+ break;
145
{ .name = "ID_ISAR6", .state = ARM_CP_STATE_BOTH,
261
+
146
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 2, .opc2 = 7,
262
+ case EXYNOS4210_RNG_STATUS:
147
.access = PL1_R, .type = ARM_CP_CONST,
263
+ /* For clearing status fields */
148
+ .accessfn = access_aa32_tid3,
264
+ s->reg_status &= ~EXYNOS4210_RNG_STATUS_WRITE_MASK;
149
.resetvalue = cpu->isar.id_isar6 },
265
+ s->reg_status |= val & EXYNOS4210_RNG_STATUS_WRITE_MASK;
150
REGINFO_SENTINEL
266
+ break;
151
};
267
+
152
@@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu)
268
+ case EXYNOS4210_RNG_SEED_IN_OFFSET(0):
153
{ .name = "ID_AA64PFR0_EL1", .state = ARM_CP_STATE_AA64,
269
+ case EXYNOS4210_RNG_SEED_IN_OFFSET(1):
154
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 4, .opc2 = 0,
270
+ case EXYNOS4210_RNG_SEED_IN_OFFSET(2):
155
.access = PL1_R, .type = ARM_CP_NO_RAW,
271
+ case EXYNOS4210_RNG_SEED_IN_OFFSET(3):
156
+ .accessfn = access_aa64_tid3,
272
+ case EXYNOS4210_RNG_SEED_IN_OFFSET(4):
157
.readfn = id_aa64pfr0_read,
273
+ exynos4210_rng_set_seed(s,
158
.writefn = arm_cp_write_ignore },
274
+ (offset - EXYNOS4210_RNG_SEED_IN_OFFSET(0)) / 4,
159
{ .name = "ID_AA64PFR1_EL1", .state = ARM_CP_STATE_AA64,
275
+ val);
160
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 4, .opc2 = 1,
276
+ break;
161
.access = PL1_R, .type = ARM_CP_CONST,
277
+
162
+ .accessfn = access_aa64_tid3,
278
+ default:
163
.resetvalue = cpu->isar.id_aa64pfr1},
279
+ qemu_log_mask(LOG_GUEST_ERROR,
164
{ .name = "ID_AA64PFR2_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
280
+ "%s: bad write offset 0x%" HWADDR_PRIx "\n",
165
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 4, .opc2 = 2,
281
+ __func__, offset);
166
.access = PL1_R, .type = ARM_CP_CONST,
282
+ }
167
+ .accessfn = access_aa64_tid3,
283
+}
168
.resetvalue = 0 },
284
+
169
{ .name = "ID_AA64PFR3_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
285
+static const MemoryRegionOps exynos4210_rng_ops = {
170
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 4, .opc2 = 3,
286
+ .read = exynos4210_rng_read,
171
.access = PL1_R, .type = ARM_CP_CONST,
287
+ .write = exynos4210_rng_write,
172
+ .accessfn = access_aa64_tid3,
288
+ .endianness = DEVICE_NATIVE_ENDIAN,
173
.resetvalue = 0 },
289
+};
174
{ .name = "ID_AA64ZFR0_EL1", .state = ARM_CP_STATE_AA64,
290
+
175
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 4, .opc2 = 4,
291
+static void exynos4210_rng_reset(DeviceState *dev)
176
.access = PL1_R, .type = ARM_CP_CONST,
292
+{
177
+ .accessfn = access_aa64_tid3,
293
+ Exynos4210RngState *s = EXYNOS4210_RNG(dev);
178
/* At present, only SVEver == 0 is defined anyway. */
294
+
179
.resetvalue = 0 },
295
+ s->reg_control = 0;
180
{ .name = "ID_AA64PFR5_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
296
+ s->reg_status = EXYNOS4210_RNG_STATUS_BUFFER_READY;
181
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 4, .opc2 = 5,
297
+ memset(s->randr_value, 0, sizeof(s->randr_value));
182
.access = PL1_R, .type = ARM_CP_CONST,
298
+ s->seed_set = 0;
183
+ .accessfn = access_aa64_tid3,
299
+}
184
.resetvalue = 0 },
300
+
185
{ .name = "ID_AA64PFR6_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
301
+static void exynos4210_rng_init(Object *obj)
186
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 4, .opc2 = 6,
302
+{
187
.access = PL1_R, .type = ARM_CP_CONST,
303
+ Exynos4210RngState *s = EXYNOS4210_RNG(obj);
188
+ .accessfn = access_aa64_tid3,
304
+ SysBusDevice *dev = SYS_BUS_DEVICE(obj);
189
.resetvalue = 0 },
305
+
190
{ .name = "ID_AA64PFR7_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
306
+ memory_region_init_io(&s->iomem, obj, &exynos4210_rng_ops, s,
191
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 4, .opc2 = 7,
307
+ TYPE_EXYNOS4210_RNG, EXYNOS4210_RNG_REGS_MEM_SIZE);
192
.access = PL1_R, .type = ARM_CP_CONST,
308
+ sysbus_init_mmio(dev, &s->iomem);
193
+ .accessfn = access_aa64_tid3,
309
+}
194
.resetvalue = 0 },
310
+
195
{ .name = "ID_AA64DFR0_EL1", .state = ARM_CP_STATE_AA64,
311
+static const VMStateDescription exynos4210_rng_vmstate = {
196
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 5, .opc2 = 0,
312
+ .name = TYPE_EXYNOS4210_RNG,
197
.access = PL1_R, .type = ARM_CP_CONST,
313
+ .version_id = 1,
198
+ .accessfn = access_aa64_tid3,
314
+ .minimum_version_id = 1,
199
.resetvalue = cpu->id_aa64dfr0 },
315
+ .fields = (VMStateField[]) {
200
{ .name = "ID_AA64DFR1_EL1", .state = ARM_CP_STATE_AA64,
316
+ VMSTATE_INT32_ARRAY(randr_value, Exynos4210RngState,
201
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 5, .opc2 = 1,
317
+ EXYNOS4210_RNG_PRNG_NUM),
202
.access = PL1_R, .type = ARM_CP_CONST,
318
+ VMSTATE_UINT32(seed_set, Exynos4210RngState),
203
+ .accessfn = access_aa64_tid3,
319
+ VMSTATE_UINT32(reg_status, Exynos4210RngState),
204
.resetvalue = cpu->id_aa64dfr1 },
320
+ VMSTATE_UINT32(reg_control, Exynos4210RngState),
205
{ .name = "ID_AA64DFR2_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
321
+ VMSTATE_END_OF_LIST()
206
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 5, .opc2 = 2,
322
+ }
207
.access = PL1_R, .type = ARM_CP_CONST,
323
+};
208
+ .accessfn = access_aa64_tid3,
324
+
209
.resetvalue = 0 },
325
+static void exynos4210_rng_class_init(ObjectClass *klass, void *data)
210
{ .name = "ID_AA64DFR3_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
326
+{
211
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 5, .opc2 = 3,
327
+ DeviceClass *dc = DEVICE_CLASS(klass);
212
.access = PL1_R, .type = ARM_CP_CONST,
328
+
213
+ .accessfn = access_aa64_tid3,
329
+ dc->reset = exynos4210_rng_reset;
214
.resetvalue = 0 },
330
+ dc->vmsd = &exynos4210_rng_vmstate;
215
{ .name = "ID_AA64AFR0_EL1", .state = ARM_CP_STATE_AA64,
331
+}
216
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 5, .opc2 = 4,
332
+
217
.access = PL1_R, .type = ARM_CP_CONST,
333
+static const TypeInfo exynos4210_rng_info = {
218
+ .accessfn = access_aa64_tid3,
334
+ .name = TYPE_EXYNOS4210_RNG,
219
.resetvalue = cpu->id_aa64afr0 },
335
+ .parent = TYPE_SYS_BUS_DEVICE,
220
{ .name = "ID_AA64AFR1_EL1", .state = ARM_CP_STATE_AA64,
336
+ .instance_size = sizeof(Exynos4210RngState),
221
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 5, .opc2 = 5,
337
+ .instance_init = exynos4210_rng_init,
222
.access = PL1_R, .type = ARM_CP_CONST,
338
+ .class_init = exynos4210_rng_class_init,
223
+ .accessfn = access_aa64_tid3,
339
+};
224
.resetvalue = cpu->id_aa64afr1 },
340
+
225
{ .name = "ID_AA64AFR2_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
341
+static void exynos4210_rng_register(void)
226
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 5, .opc2 = 6,
342
+{
227
.access = PL1_R, .type = ARM_CP_CONST,
343
+ type_register_static(&exynos4210_rng_info);
228
+ .accessfn = access_aa64_tid3,
344
+}
229
.resetvalue = 0 },
345
+
230
{ .name = "ID_AA64AFR3_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
346
+type_init(exynos4210_rng_register)
231
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 5, .opc2 = 7,
232
.access = PL1_R, .type = ARM_CP_CONST,
233
+ .accessfn = access_aa64_tid3,
234
.resetvalue = 0 },
235
{ .name = "ID_AA64ISAR0_EL1", .state = ARM_CP_STATE_AA64,
236
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 6, .opc2 = 0,
237
.access = PL1_R, .type = ARM_CP_CONST,
238
+ .accessfn = access_aa64_tid3,
239
.resetvalue = cpu->isar.id_aa64isar0 },
240
{ .name = "ID_AA64ISAR1_EL1", .state = ARM_CP_STATE_AA64,
241
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 6, .opc2 = 1,
242
.access = PL1_R, .type = ARM_CP_CONST,
243
+ .accessfn = access_aa64_tid3,
244
.resetvalue = cpu->isar.id_aa64isar1 },
245
{ .name = "ID_AA64ISAR2_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
246
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 6, .opc2 = 2,
247
.access = PL1_R, .type = ARM_CP_CONST,
248
+ .accessfn = access_aa64_tid3,
249
.resetvalue = 0 },
250
{ .name = "ID_AA64ISAR3_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
251
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 6, .opc2 = 3,
252
.access = PL1_R, .type = ARM_CP_CONST,
253
+ .accessfn = access_aa64_tid3,
254
.resetvalue = 0 },
255
{ .name = "ID_AA64ISAR4_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
256
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 6, .opc2 = 4,
257
.access = PL1_R, .type = ARM_CP_CONST,
258
+ .accessfn = access_aa64_tid3,
259
.resetvalue = 0 },
260
{ .name = "ID_AA64ISAR5_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
261
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 6, .opc2 = 5,
262
.access = PL1_R, .type = ARM_CP_CONST,
263
+ .accessfn = access_aa64_tid3,
264
.resetvalue = 0 },
265
{ .name = "ID_AA64ISAR6_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
266
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 6, .opc2 = 6,
267
.access = PL1_R, .type = ARM_CP_CONST,
268
+ .accessfn = access_aa64_tid3,
269
.resetvalue = 0 },
270
{ .name = "ID_AA64ISAR7_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
271
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 6, .opc2 = 7,
272
.access = PL1_R, .type = ARM_CP_CONST,
273
+ .accessfn = access_aa64_tid3,
274
.resetvalue = 0 },
275
{ .name = "ID_AA64MMFR0_EL1", .state = ARM_CP_STATE_AA64,
276
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 7, .opc2 = 0,
277
.access = PL1_R, .type = ARM_CP_CONST,
278
+ .accessfn = access_aa64_tid3,
279
.resetvalue = cpu->isar.id_aa64mmfr0 },
280
{ .name = "ID_AA64MMFR1_EL1", .state = ARM_CP_STATE_AA64,
281
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 7, .opc2 = 1,
282
.access = PL1_R, .type = ARM_CP_CONST,
283
+ .accessfn = access_aa64_tid3,
284
.resetvalue = cpu->isar.id_aa64mmfr1 },
285
{ .name = "ID_AA64MMFR2_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
286
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 7, .opc2 = 2,
287
.access = PL1_R, .type = ARM_CP_CONST,
288
+ .accessfn = access_aa64_tid3,
289
.resetvalue = 0 },
290
{ .name = "ID_AA64MMFR3_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
291
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 7, .opc2 = 3,
292
.access = PL1_R, .type = ARM_CP_CONST,
293
+ .accessfn = access_aa64_tid3,
294
.resetvalue = 0 },
295
{ .name = "ID_AA64MMFR4_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
296
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 7, .opc2 = 4,
297
.access = PL1_R, .type = ARM_CP_CONST,
298
+ .accessfn = access_aa64_tid3,
299
.resetvalue = 0 },
300
{ .name = "ID_AA64MMFR5_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
301
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 7, .opc2 = 5,
302
.access = PL1_R, .type = ARM_CP_CONST,
303
+ .accessfn = access_aa64_tid3,
304
.resetvalue = 0 },
305
{ .name = "ID_AA64MMFR6_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
306
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 7, .opc2 = 6,
307
.access = PL1_R, .type = ARM_CP_CONST,
308
+ .accessfn = access_aa64_tid3,
309
.resetvalue = 0 },
310
{ .name = "ID_AA64MMFR7_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
311
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 7, .opc2 = 7,
312
.access = PL1_R, .type = ARM_CP_CONST,
313
+ .accessfn = access_aa64_tid3,
314
.resetvalue = 0 },
315
{ .name = "MVFR0_EL1", .state = ARM_CP_STATE_AA64,
316
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 3, .opc2 = 0,
317
.access = PL1_R, .type = ARM_CP_CONST,
318
+ .accessfn = access_aa64_tid3,
319
.resetvalue = cpu->isar.mvfr0 },
320
{ .name = "MVFR1_EL1", .state = ARM_CP_STATE_AA64,
321
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 3, .opc2 = 1,
322
.access = PL1_R, .type = ARM_CP_CONST,
323
+ .accessfn = access_aa64_tid3,
324
.resetvalue = cpu->isar.mvfr1 },
325
{ .name = "MVFR2_EL1", .state = ARM_CP_STATE_AA64,
326
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 3, .opc2 = 2,
327
.access = PL1_R, .type = ARM_CP_CONST,
328
+ .accessfn = access_aa64_tid3,
329
.resetvalue = cpu->isar.mvfr2 },
330
{ .name = "MVFR3_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
331
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 3, .opc2 = 3,
332
.access = PL1_R, .type = ARM_CP_CONST,
333
+ .accessfn = access_aa64_tid3,
334
.resetvalue = 0 },
335
{ .name = "MVFR4_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
336
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 3, .opc2 = 4,
337
.access = PL1_R, .type = ARM_CP_CONST,
338
+ .accessfn = access_aa64_tid3,
339
.resetvalue = 0 },
340
{ .name = "MVFR5_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
341
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 3, .opc2 = 5,
342
.access = PL1_R, .type = ARM_CP_CONST,
343
+ .accessfn = access_aa64_tid3,
344
.resetvalue = 0 },
345
{ .name = "MVFR6_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
346
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 3, .opc2 = 6,
347
.access = PL1_R, .type = ARM_CP_CONST,
348
+ .accessfn = access_aa64_tid3,
349
.resetvalue = 0 },
350
{ .name = "MVFR7_EL1_RESERVED", .state = ARM_CP_STATE_AA64,
351
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 3, .opc2 = 7,
352
.access = PL1_R, .type = ARM_CP_CONST,
353
+ .accessfn = access_aa64_tid3,
354
.resetvalue = 0 },
355
{ .name = "PMCEID0", .state = ARM_CP_STATE_AA32,
356
.cp = 15, .opc1 = 0, .crn = 9, .crm = 12, .opc2 = 6,
347
--
357
--
348
2.7.4
358
2.20.1
349
359
350
360
diff view generated by jsdifflib