1
A surprisingly short target-arm queue, but no point in holding
1
Only thing for Arm for rc1 is RTH's fix for the KVM SVE probe code.
2
onto these waiting for more code to arrive :-)
3
2
4
thanks
5
-- PMM
3
-- PMM
6
4
7
The following changes since commit 3d0bf8dfdfebd7f2ae41b6f220444b8047d6b1ee:
5
The following changes since commit 4e06b3fc1b5e1ec03f22190eabe56891dc9c2236:
8
6
9
Merge remote-tracking branch 'remotes/dgilbert/tags/pull-migration-20170710a' into staging (2017-07-10 18:13:03 +0100)
7
Merge tag 'pull-hex-20220731' of https://github.com/quic/qemu into staging (2022-07-31 21:38:54 -0700)
10
8
11
are available in the git repository at:
9
are available in the Git repository at:
12
10
13
git://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20170711
11
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20220801
14
12
15
for you to fetch changes up to 792dac309c8660306557ba058b8b5a6a75ab3c1f:
13
for you to fetch changes up to 5265d24c981dfdda8d29b44f7e84a514da75eedc:
16
14
17
target-arm: v7M: ignore writes to CONTROL.SPSEL from Thread mode (2017-07-11 11:21:26 +0100)
15
target/arm: Move sve probe inside kvm >= 4.15 branch (2022-08-01 16:21:18 +0100)
18
16
19
----------------------------------------------------------------
17
----------------------------------------------------------------
20
target-arm queue:
18
target-arm queue:
21
* v7M: ignore writes to CONTROL.SPSEL from Thread mode
19
* Fix KVM SVE ID register probe code
22
* KVM: Enable in-kernel timers with user space gic
23
* aspeed: Register all watchdogs
24
* hw/misc: Add Exynos4210 Pseudo Random Number Generator
25
20
26
----------------------------------------------------------------
21
----------------------------------------------------------------
27
Alexander Graf (1):
22
Richard Henderson (3):
28
ARM: KVM: Enable in-kernel timers with user space gic
23
target/arm: Use kvm_arm_sve_supported in kvm_arm_get_host_cpu_features
24
target/arm: Set KVM_ARM_VCPU_SVE while probing the host
25
target/arm: Move sve probe inside kvm >= 4.15 branch
29
26
30
Joel Stanley (1):
27
target/arm/kvm64.c | 45 ++++++++++++++++++++++-----------------------
31
aspeed: Register all watchdogs
28
1 file changed, 22 insertions(+), 23 deletions(-)
32
33
Krzysztof Kozlowski (1):
34
hw/misc: Add Exynos4210 Pseudo Random Number Generator
35
36
Peter Maydell (1):
37
target-arm: v7M: ignore writes to CONTROL.SPSEL from Thread mode
38
39
hw/misc/Makefile.objs | 2 +-
40
include/hw/arm/aspeed_soc.h | 4 +-
41
include/sysemu/kvm.h | 11 ++
42
target/arm/cpu.h | 3 +
43
accel/kvm/kvm-all.c | 5 +
44
accel/stubs/kvm-stub.c | 5 +
45
hw/arm/aspeed_soc.c | 25 ++--
46
hw/arm/exynos4210.c | 4 +
47
hw/intc/arm_gic.c | 7 ++
48
hw/misc/exynos4210_rng.c | 277 ++++++++++++++++++++++++++++++++++++++++++++
49
target/arm/helper.c | 13 ++-
50
target/arm/kvm.c | 51 ++++++++
51
12 files changed, 394 insertions(+), 13 deletions(-)
52
create mode 100644 hw/misc/exynos4210_rng.c
53
diff view generated by jsdifflib
1
From: Joel Stanley <joel@jms.id.au>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
The ast2400 contains two and the ast2500 contains three watchdogs.
3
Indication for support for SVE will not depend on whether we
4
Add this information to the AspeedSoCInfo and realise the correct number
4
perform the query on the main kvm_state or the temp vcpu.
5
of watchdogs for that each SoC type.
6
5
7
Signed-off-by: Joel Stanley <joel@jms.id.au>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Reviewed-by: Cédric Le Goater <clg@kaod.org>
7
Message-id: 20220726045828.53697-2-richard.henderson@linaro.org
9
Tested-by: Cédric Le Goater <clg@kaod.org>
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
10
---
12
include/hw/arm/aspeed_soc.h | 4 +++-
11
target/arm/kvm64.c | 2 +-
13
hw/arm/aspeed_soc.c | 25 +++++++++++++++++--------
12
1 file changed, 1 insertion(+), 1 deletion(-)
14
2 files changed, 20 insertions(+), 9 deletions(-)
15
13
16
diff --git a/include/hw/arm/aspeed_soc.h b/include/hw/arm/aspeed_soc.h
14
diff --git a/target/arm/kvm64.c b/target/arm/kvm64.c
17
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
18
--- a/include/hw/arm/aspeed_soc.h
16
--- a/target/arm/kvm64.c
19
+++ b/include/hw/arm/aspeed_soc.h
17
+++ b/target/arm/kvm64.c
20
@@ -XXX,XX +XXX,XX @@
18
@@ -XXX,XX +XXX,XX @@ bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)
21
#include "hw/net/ftgmac100.h"
19
}
22
23
#define ASPEED_SPIS_NUM 2
24
+#define ASPEED_WDTS_NUM 3
25
26
typedef struct AspeedSoCState {
27
/*< private >*/
28
@@ -XXX,XX +XXX,XX @@ typedef struct AspeedSoCState {
29
AspeedSMCState fmc;
30
AspeedSMCState spi[ASPEED_SPIS_NUM];
31
AspeedSDMCState sdmc;
32
- AspeedWDTState wdt;
33
+ AspeedWDTState wdt[ASPEED_WDTS_NUM];
34
FTGMAC100State ftgmac100;
35
} AspeedSoCState;
36
37
@@ -XXX,XX +XXX,XX @@ typedef struct AspeedSoCInfo {
38
const hwaddr *spi_bases;
39
const char *fmc_typename;
40
const char **spi_typename;
41
+ int wdts_num;
42
} AspeedSoCInfo;
43
44
typedef struct AspeedSoCClass {
45
diff --git a/hw/arm/aspeed_soc.c b/hw/arm/aspeed_soc.c
46
index XXXXXXX..XXXXXXX 100644
47
--- a/hw/arm/aspeed_soc.c
48
+++ b/hw/arm/aspeed_soc.c
49
@@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = {
50
.spi_bases = aspeed_soc_ast2400_spi_bases,
51
.fmc_typename = "aspeed.smc.fmc",
52
.spi_typename = aspeed_soc_ast2400_typenames,
53
+ .wdts_num = 2,
54
}, {
55
.name = "ast2400-a1",
56
.cpu_model = "arm926",
57
@@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = {
58
.spi_bases = aspeed_soc_ast2400_spi_bases,
59
.fmc_typename = "aspeed.smc.fmc",
60
.spi_typename = aspeed_soc_ast2400_typenames,
61
+ .wdts_num = 2,
62
}, {
63
.name = "ast2400",
64
.cpu_model = "arm926",
65
@@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = {
66
.spi_bases = aspeed_soc_ast2400_spi_bases,
67
.fmc_typename = "aspeed.smc.fmc",
68
.spi_typename = aspeed_soc_ast2400_typenames,
69
+ .wdts_num = 2,
70
}, {
71
.name = "ast2500-a1",
72
.cpu_model = "arm1176",
73
@@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = {
74
.spi_bases = aspeed_soc_ast2500_spi_bases,
75
.fmc_typename = "aspeed.smc.ast2500-fmc",
76
.spi_typename = aspeed_soc_ast2500_typenames,
77
+ .wdts_num = 3,
78
},
79
};
80
81
@@ -XXX,XX +XXX,XX @@ static void aspeed_soc_init(Object *obj)
82
object_property_add_alias(obj, "ram-size", OBJECT(&s->sdmc),
83
"ram-size", &error_abort);
84
85
- object_initialize(&s->wdt, sizeof(s->wdt), TYPE_ASPEED_WDT);
86
- object_property_add_child(obj, "wdt", OBJECT(&s->wdt), NULL);
87
- qdev_set_parent_bus(DEVICE(&s->wdt), sysbus_get_default());
88
+ for (i = 0; i < sc->info->wdts_num; i++) {
89
+ object_initialize(&s->wdt[i], sizeof(s->wdt[i]), TYPE_ASPEED_WDT);
90
+ object_property_add_child(obj, "wdt[*]", OBJECT(&s->wdt[i]), NULL);
91
+ qdev_set_parent_bus(DEVICE(&s->wdt[i]), sysbus_get_default());
92
+ }
93
94
object_initialize(&s->ftgmac100, sizeof(s->ftgmac100), TYPE_FTGMAC100);
95
object_property_add_child(obj, "ftgmac100", OBJECT(&s->ftgmac100), NULL);
96
@@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp)
97
sysbus_mmio_map(SYS_BUS_DEVICE(&s->sdmc), 0, ASPEED_SOC_SDMC_BASE);
98
99
/* Watch dog */
100
- object_property_set_bool(OBJECT(&s->wdt), true, "realized", &err);
101
- if (err) {
102
- error_propagate(errp, err);
103
- return;
104
+ for (i = 0; i < sc->info->wdts_num; i++) {
105
+ object_property_set_bool(OBJECT(&s->wdt[i]), true, "realized", &err);
106
+ if (err) {
107
+ error_propagate(errp, err);
108
+ return;
109
+ }
110
+ sysbus_mmio_map(SYS_BUS_DEVICE(&s->wdt[i]), 0,
111
+ ASPEED_SOC_WDT_BASE + i * 0x20);
112
}
20
}
113
- sysbus_mmio_map(SYS_BUS_DEVICE(&s->wdt), 0, ASPEED_SOC_WDT_BASE);
21
114
22
- sve_supported = ioctl(fdarray[0], KVM_CHECK_EXTENSION, KVM_CAP_ARM_SVE) > 0;
115
/* Net */
23
+ sve_supported = kvm_arm_sve_supported();
116
qdev_set_nic_properties(DEVICE(&s->ftgmac100), &nd_table[0]);
24
25
/* Add feature bits that can't appear until after VCPU init. */
26
if (sve_supported) {
117
--
27
--
118
2.7.4
28
2.25.1
119
120
diff view generated by jsdifflib
1
From: Krzysztof Kozlowski <krzk@kernel.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Add emulation for Exynos4210 Pseudo Random Number Generator which could
3
Because we weren't setting this flag, our probe of ID_AA64ZFR0
4
work on fixed seeds or with seeds provided by True Random Number
4
was always returning zero. This also obviates the adjustment
5
Generator block inside the SoC.
5
of ID_AA64PFR0, which had sanitized the SVE field.
6
6
7
Implement only the fixed seeds part of it in polling mode (no
7
The effects of the bug are not visible, because the only thing that
8
interrupts).
8
ID_AA64ZFR0 is used for within qemu at present is tcg translation.
9
The other tests for SVE within KVM are via ID_AA64PFR0.SVE.
9
10
10
Emulation tested with two independent Linux kernel exynos-rng drivers:
11
Reported-by: Zenghui Yu <yuzenghui@huawei.com>
11
1. New kcapi-rng interface (targeting Linux v4.12),
12
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
12
2. Old hwrng inteface
13
Message-id: 20220726045828.53697-3-richard.henderson@linaro.org
13
# echo "exynos" > /sys/class/misc/hw_random/rng_current
14
# dd if=/dev/hwrng of=/dev/null bs=1 count=16
15
16
Signed-off-by: Krzysztof Kozlowski <krzk@kernel.org>
17
Message-id: 20170425180609.11004-1-krzk@kernel.org
18
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
14
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
19
[PMM: wrapped a few overlong lines; more efficient implementation
20
of exynos4210_rng_seed_ready()]
21
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
22
---
16
---
23
hw/misc/Makefile.objs | 2 +-
17
target/arm/kvm64.c | 27 +++++++++++++--------------
24
hw/arm/exynos4210.c | 4 +
18
1 file changed, 13 insertions(+), 14 deletions(-)
25
hw/misc/exynos4210_rng.c | 277 +++++++++++++++++++++++++++++++++++++++++++++++
26
3 files changed, 282 insertions(+), 1 deletion(-)
27
create mode 100644 hw/misc/exynos4210_rng.c
28
19
29
diff --git a/hw/misc/Makefile.objs b/hw/misc/Makefile.objs
20
diff --git a/target/arm/kvm64.c b/target/arm/kvm64.c
30
index XXXXXXX..XXXXXXX 100644
21
index XXXXXXX..XXXXXXX 100644
31
--- a/hw/misc/Makefile.objs
22
--- a/target/arm/kvm64.c
32
+++ b/hw/misc/Makefile.objs
23
+++ b/target/arm/kvm64.c
33
@@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_IVSHMEM) += ivshmem.o
24
@@ -XXX,XX +XXX,XX @@ bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)
34
obj-$(CONFIG_REALVIEW) += arm_sysctl.o
25
bool sve_supported;
35
obj-$(CONFIG_NSERIES) += cbus.o
26
bool pmu_supported = false;
36
obj-$(CONFIG_ECCMEMCTL) += eccmemctl.o
27
uint64_t features = 0;
37
-obj-$(CONFIG_EXYNOS4) += exynos4210_pmu.o exynos4210_clk.o
28
- uint64_t t;
38
+obj-$(CONFIG_EXYNOS4) += exynos4210_pmu.o exynos4210_clk.o exynos4210_rng.o
29
int err;
39
obj-$(CONFIG_IMX) += imx_ccm.o
30
40
obj-$(CONFIG_IMX) += imx31_ccm.o
31
/* Old kernels may not know about the PREFERRED_TARGET ioctl: however
41
obj-$(CONFIG_IMX) += imx25_ccm.o
32
@@ -XXX,XX +XXX,XX @@ bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)
42
diff --git a/hw/arm/exynos4210.c b/hw/arm/exynos4210.c
33
struct kvm_vcpu_init init = { .target = -1, };
43
index XXXXXXX..XXXXXXX 100644
34
44
--- a/hw/arm/exynos4210.c
35
/*
45
+++ b/hw/arm/exynos4210.c
36
- * Ask for Pointer Authentication if supported. We can't play the
46
@@ -XXX,XX +XXX,XX @@
37
- * SVE trick of synthesising the ID reg as KVM won't tell us
47
/* Clock controller SFR base address */
38
- * whether we have the architected or IMPDEF version of PAuth, so
48
#define EXYNOS4210_CLK_BASE_ADDR 0x10030000
39
- * we have to use the actual ID regs.
49
40
+ * Ask for SVE if supported, so that we can query ID_AA64ZFR0,
50
+/* PRNG/HASH SFR base address */
41
+ * which is otherwise RAZ.
51
+#define EXYNOS4210_RNG_BASE_ADDR 0x10830400
52
+
53
/* Display controllers (FIMD) */
54
#define EXYNOS4210_FIMD0_BASE_ADDR 0x11C00000
55
56
@@ -XXX,XX +XXX,XX @@ Exynos4210State *exynos4210_init(MemoryRegion *system_mem)
57
sysbus_create_simple("exynos4210.pmu", EXYNOS4210_PMU_BASE_ADDR, NULL);
58
59
sysbus_create_simple("exynos4210.clk", EXYNOS4210_CLK_BASE_ADDR, NULL);
60
+ sysbus_create_simple("exynos4210.rng", EXYNOS4210_RNG_BASE_ADDR, NULL);
61
62
/* PWM */
63
sysbus_create_varargs("exynos4210.pwm", EXYNOS4210_PWM_BASE_ADDR,
64
diff --git a/hw/misc/exynos4210_rng.c b/hw/misc/exynos4210_rng.c
65
new file mode 100644
66
index XXXXXXX..XXXXXXX
67
--- /dev/null
68
+++ b/hw/misc/exynos4210_rng.c
69
@@ -XXX,XX +XXX,XX @@
70
+/*
71
+ * Exynos4210 Pseudo Random Nubmer Generator Emulation
72
+ *
73
+ * Copyright (c) 2017 Krzysztof Kozlowski <krzk@kernel.org>
74
+ *
75
+ * This program is free software; you can redistribute it and/or modify it
76
+ * under the terms of the GNU General Public License as published by the
77
+ * Free Software Foundation; either version 2 of the License, or
78
+ * (at your option) any later version.
79
+ *
80
+ * This program is distributed in the hope that it will be useful, but WITHOUT
81
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
82
+ * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
83
+ * for more details.
84
+ *
85
+ * You should have received a copy of the GNU General Public License along
86
+ * with this program; if not, see <http://www.gnu.org/licenses/>.
87
+ */
88
+
89
+#include "qemu/osdep.h"
90
+#include "crypto/random.h"
91
+#include "hw/sysbus.h"
92
+#include "qemu/log.h"
93
+
94
+#define DEBUG_EXYNOS_RNG 0
95
+
96
+#define DPRINTF(fmt, ...) \
97
+ do { \
98
+ if (DEBUG_EXYNOS_RNG) { \
99
+ printf("exynos4210_rng: " fmt, ## __VA_ARGS__); \
100
+ } \
101
+ } while (0)
102
+
103
+#define TYPE_EXYNOS4210_RNG "exynos4210.rng"
104
+#define EXYNOS4210_RNG(obj) \
105
+ OBJECT_CHECK(Exynos4210RngState, (obj), TYPE_EXYNOS4210_RNG)
106
+
107
+/*
108
+ * Exynos4220, PRNG, only polling mode is supported.
109
+ */
110
+
111
+/* RNG_CONTROL_1 register bitfields, reset value: 0x0 */
112
+#define EXYNOS4210_RNG_CONTROL_1_PRNG 0x8
113
+#define EXYNOS4210_RNG_CONTROL_1_START_INIT BIT(4)
114
+/* RNG_STATUS register bitfields, reset value: 0x1 */
115
+#define EXYNOS4210_RNG_STATUS_PRNG_ERROR BIT(7)
116
+#define EXYNOS4210_RNG_STATUS_PRNG_DONE BIT(5)
117
+#define EXYNOS4210_RNG_STATUS_MSG_DONE BIT(4)
118
+#define EXYNOS4210_RNG_STATUS_PARTIAL_DONE BIT(3)
119
+#define EXYNOS4210_RNG_STATUS_PRNG_BUSY BIT(2)
120
+#define EXYNOS4210_RNG_STATUS_SEED_SETTING_DONE BIT(1)
121
+#define EXYNOS4210_RNG_STATUS_BUFFER_READY BIT(0)
122
+#define EXYNOS4210_RNG_STATUS_WRITE_MASK (EXYNOS4210_RNG_STATUS_PRNG_DONE \
123
+ | EXYNOS4210_RNG_STATUS_MSG_DONE \
124
+ | EXYNOS4210_RNG_STATUS_PARTIAL_DONE)
125
+
126
+#define EXYNOS4210_RNG_CONTROL_1 0x0
127
+#define EXYNOS4210_RNG_STATUS 0x10
128
+#define EXYNOS4210_RNG_SEED_IN 0x140
129
+#define EXYNOS4210_RNG_SEED_IN_OFFSET(n) (EXYNOS4210_RNG_SEED_IN + (n * 0x4))
130
+#define EXYNOS4210_RNG_PRNG 0x160
131
+#define EXYNOS4210_RNG_PRNG_OFFSET(n) (EXYNOS4210_RNG_PRNG + (n * 0x4))
132
+
133
+#define EXYNOS4210_RNG_PRNG_NUM 5
134
+
135
+#define EXYNOS4210_RNG_REGS_MEM_SIZE 0x200
136
+
137
+typedef struct Exynos4210RngState {
138
+ SysBusDevice parent_obj;
139
+ MemoryRegion iomem;
140
+
141
+ int32_t randr_value[EXYNOS4210_RNG_PRNG_NUM];
142
+ /* bits from 0 to EXYNOS4210_RNG_PRNG_NUM if given seed register was set */
143
+ uint32_t seed_set;
144
+
145
+ /* Register values */
146
+ uint32_t reg_control;
147
+ uint32_t reg_status;
148
+} Exynos4210RngState;
149
+
150
+static bool exynos4210_rng_seed_ready(const Exynos4210RngState *s)
151
+{
152
+ uint32_t mask = MAKE_64BIT_MASK(0, EXYNOS4210_RNG_PRNG_NUM);
153
+
154
+ /* Return true if all the seed-set bits are set. */
155
+ return (s->seed_set & mask) == mask;
156
+}
157
+
158
+static void exynos4210_rng_set_seed(Exynos4210RngState *s, unsigned int i,
159
+ uint64_t val)
160
+{
161
+ /*
162
+ * We actually ignore the seed and always generate true random numbers.
163
+ * Theoretically this should not match the device as Exynos has
164
+ * a Pseudo Random Number Generator but testing shown that it always
165
+ * generates random numbers regardless of the seed value.
166
+ */
42
+ */
167
+ s->seed_set |= BIT(i);
43
+ sve_supported = kvm_arm_sve_supported();
168
+
44
+ if (sve_supported) {
169
+ /* If all seeds were written, update the status to reflect it */
45
+ init.features[0] |= 1 << KVM_ARM_VCPU_SVE;
170
+ if (exynos4210_rng_seed_ready(s)) {
171
+ s->reg_status |= EXYNOS4210_RNG_STATUS_SEED_SETTING_DONE;
172
+ } else {
173
+ s->reg_status &= ~EXYNOS4210_RNG_STATUS_SEED_SETTING_DONE;
174
+ }
175
+}
176
+
177
+static void exynos4210_rng_run_engine(Exynos4210RngState *s)
178
+{
179
+ Error *err = NULL;
180
+ int ret;
181
+
182
+ /* Seed set? */
183
+ if ((s->reg_status & EXYNOS4210_RNG_STATUS_SEED_SETTING_DONE) == 0) {
184
+ goto out;
185
+ }
46
+ }
186
+
47
+
187
+ /* PRNG engine chosen? */
48
+ /*
188
+ if ((s->reg_control & EXYNOS4210_RNG_CONTROL_1_PRNG) == 0) {
49
+ * Ask for Pointer Authentication if supported, so that we get
189
+ goto out;
50
+ * the unsanitized field values for AA64ISAR1_EL1.
190
+ }
51
*/
191
+
52
if (kvm_arm_pauth_supported()) {
192
+ /* PRNG engine started? */
53
init.features[0] |= (1 << KVM_ARM_VCPU_PTRAUTH_ADDRESS |
193
+ if ((s->reg_control & EXYNOS4210_RNG_CONTROL_1_START_INIT) == 0) {
54
@@ -XXX,XX +XXX,XX @@ bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)
194
+ goto out;
55
}
195
+ }
56
}
196
+
57
197
+ /* Get randoms */
58
- sve_supported = kvm_arm_sve_supported();
198
+ ret = qcrypto_random_bytes((uint8_t *)s->randr_value,
59
-
199
+ sizeof(s->randr_value), &err);
60
- /* Add feature bits that can't appear until after VCPU init. */
200
+ if (!ret) {
61
if (sve_supported) {
201
+ /* Notify that PRNG is ready */
62
- t = ahcf->isar.id_aa64pfr0;
202
+ s->reg_status |= EXYNOS4210_RNG_STATUS_PRNG_DONE;
63
- t = FIELD_DP64(t, ID_AA64PFR0, SVE, 1);
203
+ } else {
64
- ahcf->isar.id_aa64pfr0 = t;
204
+ error_report_err(err);
65
-
205
+ }
66
/*
206
+
67
* There is a range of kernels between kernel commit 73433762fcae
207
+out:
68
* and f81cb2c3ad41 which have a bug where the kernel doesn't expose
208
+ /* Always clear start engine bit */
69
* SYS_ID_AA64ZFR0_EL1 via the ONE_REG API unless the VM has enabled
209
+ s->reg_control &= ~EXYNOS4210_RNG_CONTROL_1_START_INIT;
70
- * SVE support, so we only read it here, rather than together with all
210
+}
71
- * the other ID registers earlier.
211
+
72
+ * SVE support, which resulted in an error rather than RAZ.
212
+static uint64_t exynos4210_rng_read(void *opaque, hwaddr offset,
73
+ * So only read the register if we set KVM_ARM_VCPU_SVE above.
213
+ unsigned size)
74
*/
214
+{
75
err |= read_sys_reg64(fdarray[2], &ahcf->isar.id_aa64zfr0,
215
+ Exynos4210RngState *s = (Exynos4210RngState *)opaque;
76
ARM64_SYS_REG(3, 0, 0, 4, 4));
216
+ uint32_t val = 0;
217
+
218
+ assert(size == 4);
219
+
220
+ switch (offset) {
221
+ case EXYNOS4210_RNG_CONTROL_1:
222
+ val = s->reg_control;
223
+ break;
224
+
225
+ case EXYNOS4210_RNG_STATUS:
226
+ val = s->reg_status;
227
+ break;
228
+
229
+ case EXYNOS4210_RNG_PRNG_OFFSET(0):
230
+ case EXYNOS4210_RNG_PRNG_OFFSET(1):
231
+ case EXYNOS4210_RNG_PRNG_OFFSET(2):
232
+ case EXYNOS4210_RNG_PRNG_OFFSET(3):
233
+ case EXYNOS4210_RNG_PRNG_OFFSET(4):
234
+ val = s->randr_value[(offset - EXYNOS4210_RNG_PRNG_OFFSET(0)) / 4];
235
+ DPRINTF("returning random @0x%" HWADDR_PRIx ": 0x%" PRIx32 "\n",
236
+ offset, val);
237
+ break;
238
+
239
+ default:
240
+ qemu_log_mask(LOG_GUEST_ERROR,
241
+ "%s: bad read offset 0x%" HWADDR_PRIx "\n",
242
+ __func__, offset);
243
+ }
244
+
245
+ return val;
246
+}
247
+
248
+static void exynos4210_rng_write(void *opaque, hwaddr offset,
249
+ uint64_t val, unsigned size)
250
+{
251
+ Exynos4210RngState *s = (Exynos4210RngState *)opaque;
252
+
253
+ assert(size == 4);
254
+
255
+ switch (offset) {
256
+ case EXYNOS4210_RNG_CONTROL_1:
257
+ DPRINTF("RNG_CONTROL_1 = 0x%" PRIx64 "\n", val);
258
+ s->reg_control = val;
259
+ exynos4210_rng_run_engine(s);
260
+ break;
261
+
262
+ case EXYNOS4210_RNG_STATUS:
263
+ /* For clearing status fields */
264
+ s->reg_status &= ~EXYNOS4210_RNG_STATUS_WRITE_MASK;
265
+ s->reg_status |= val & EXYNOS4210_RNG_STATUS_WRITE_MASK;
266
+ break;
267
+
268
+ case EXYNOS4210_RNG_SEED_IN_OFFSET(0):
269
+ case EXYNOS4210_RNG_SEED_IN_OFFSET(1):
270
+ case EXYNOS4210_RNG_SEED_IN_OFFSET(2):
271
+ case EXYNOS4210_RNG_SEED_IN_OFFSET(3):
272
+ case EXYNOS4210_RNG_SEED_IN_OFFSET(4):
273
+ exynos4210_rng_set_seed(s,
274
+ (offset - EXYNOS4210_RNG_SEED_IN_OFFSET(0)) / 4,
275
+ val);
276
+ break;
277
+
278
+ default:
279
+ qemu_log_mask(LOG_GUEST_ERROR,
280
+ "%s: bad write offset 0x%" HWADDR_PRIx "\n",
281
+ __func__, offset);
282
+ }
283
+}
284
+
285
+static const MemoryRegionOps exynos4210_rng_ops = {
286
+ .read = exynos4210_rng_read,
287
+ .write = exynos4210_rng_write,
288
+ .endianness = DEVICE_NATIVE_ENDIAN,
289
+};
290
+
291
+static void exynos4210_rng_reset(DeviceState *dev)
292
+{
293
+ Exynos4210RngState *s = EXYNOS4210_RNG(dev);
294
+
295
+ s->reg_control = 0;
296
+ s->reg_status = EXYNOS4210_RNG_STATUS_BUFFER_READY;
297
+ memset(s->randr_value, 0, sizeof(s->randr_value));
298
+ s->seed_set = 0;
299
+}
300
+
301
+static void exynos4210_rng_init(Object *obj)
302
+{
303
+ Exynos4210RngState *s = EXYNOS4210_RNG(obj);
304
+ SysBusDevice *dev = SYS_BUS_DEVICE(obj);
305
+
306
+ memory_region_init_io(&s->iomem, obj, &exynos4210_rng_ops, s,
307
+ TYPE_EXYNOS4210_RNG, EXYNOS4210_RNG_REGS_MEM_SIZE);
308
+ sysbus_init_mmio(dev, &s->iomem);
309
+}
310
+
311
+static const VMStateDescription exynos4210_rng_vmstate = {
312
+ .name = TYPE_EXYNOS4210_RNG,
313
+ .version_id = 1,
314
+ .minimum_version_id = 1,
315
+ .fields = (VMStateField[]) {
316
+ VMSTATE_INT32_ARRAY(randr_value, Exynos4210RngState,
317
+ EXYNOS4210_RNG_PRNG_NUM),
318
+ VMSTATE_UINT32(seed_set, Exynos4210RngState),
319
+ VMSTATE_UINT32(reg_status, Exynos4210RngState),
320
+ VMSTATE_UINT32(reg_control, Exynos4210RngState),
321
+ VMSTATE_END_OF_LIST()
322
+ }
323
+};
324
+
325
+static void exynos4210_rng_class_init(ObjectClass *klass, void *data)
326
+{
327
+ DeviceClass *dc = DEVICE_CLASS(klass);
328
+
329
+ dc->reset = exynos4210_rng_reset;
330
+ dc->vmsd = &exynos4210_rng_vmstate;
331
+}
332
+
333
+static const TypeInfo exynos4210_rng_info = {
334
+ .name = TYPE_EXYNOS4210_RNG,
335
+ .parent = TYPE_SYS_BUS_DEVICE,
336
+ .instance_size = sizeof(Exynos4210RngState),
337
+ .instance_init = exynos4210_rng_init,
338
+ .class_init = exynos4210_rng_class_init,
339
+};
340
+
341
+static void exynos4210_rng_register(void)
342
+{
343
+ type_register_static(&exynos4210_rng_info);
344
+}
345
+
346
+type_init(exynos4210_rng_register)
347
--
77
--
348
2.7.4
78
2.25.1
349
350
diff view generated by jsdifflib
1
From: Alexander Graf <agraf@suse.de>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
When running with KVM enabled, you can choose between emulating the
3
The test for the IF block indicates no ID registers are exposed, much
4
gic in kernel or user space. If the kernel supports in-kernel virtualization
4
less host support for SVE. Move the SVE probe into the ELSE block.
5
of the interrupt controller, it will default to that. If not, if will
6
default to user space emulation.
7
5
8
Unfortunately when running in user mode gic emulation, we miss out on
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
9
interrupt events which are only available from kernel space, such as the timer.
7
Message-id: 20220726045828.53697-4-richard.henderson@linaro.org
10
This patch leverages the new kernel/user space pending line synchronization for
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
timer events. It does not handle PMU events yet.
12
13
Signed-off-by: Alexander Graf <agraf@suse.de>
14
Reviewed-by: Andrew Jones <drjones@redhat.com>
15
Message-id: 1498577737-130264-1-git-send-email-agraf@suse.de
16
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
---
10
---
18
include/sysemu/kvm.h | 11 +++++++++++
11
target/arm/kvm64.c | 22 +++++++++++-----------
19
target/arm/cpu.h | 3 +++
12
1 file changed, 11 insertions(+), 11 deletions(-)
20
accel/kvm/kvm-all.c | 5 +++++
21
accel/stubs/kvm-stub.c | 5 +++++
22
hw/intc/arm_gic.c | 7 +++++++
23
target/arm/kvm.c | 51 ++++++++++++++++++++++++++++++++++++++++++++++++++
24
6 files changed, 82 insertions(+)
25
13
26
diff --git a/include/sysemu/kvm.h b/include/sysemu/kvm.h
14
diff --git a/target/arm/kvm64.c b/target/arm/kvm64.c
27
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
28
--- a/include/sysemu/kvm.h
16
--- a/target/arm/kvm64.c
29
+++ b/include/sysemu/kvm.h
17
+++ b/target/arm/kvm64.c
30
@@ -XXX,XX +XXX,XX @@ int kvm_init_vcpu(CPUState *cpu);
18
@@ -XXX,XX +XXX,XX @@ bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)
31
int kvm_cpu_exec(CPUState *cpu);
19
err |= read_sys_reg64(fdarray[2], &ahcf->isar.reset_pmcr_el0,
32
int kvm_destroy_vcpu(CPUState *cpu);
20
ARM64_SYS_REG(3, 3, 9, 12, 0));
33
21
}
34
+/**
22
- }
35
+ * kvm_arm_supports_user_irq
23
36
+ *
24
- if (sve_supported) {
37
+ * Not all KVM implementations support notifications for kernel generated
25
- /*
38
+ * interrupt events to user space. This function indicates whether the current
26
- * There is a range of kernels between kernel commit 73433762fcae
39
+ * KVM implementation does support them.
27
- * and f81cb2c3ad41 which have a bug where the kernel doesn't expose
40
+ *
28
- * SYS_ID_AA64ZFR0_EL1 via the ONE_REG API unless the VM has enabled
41
+ * Returns: true if KVM supports using kernel generated IRQs from user space
29
- * SVE support, which resulted in an error rather than RAZ.
42
+ */
30
- * So only read the register if we set KVM_ARM_VCPU_SVE above.
43
+bool kvm_arm_supports_user_irq(void);
31
- */
44
+
32
- err |= read_sys_reg64(fdarray[2], &ahcf->isar.id_aa64zfr0,
45
#ifdef NEED_CPU_H
33
- ARM64_SYS_REG(3, 0, 0, 4, 4));
46
#include "cpu.h"
34
+ if (sve_supported) {
47
35
+ /*
48
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
36
+ * There is a range of kernels between kernel commit 73433762fcae
49
index XXXXXXX..XXXXXXX 100644
37
+ * and f81cb2c3ad41 which have a bug where the kernel doesn't
50
--- a/target/arm/cpu.h
38
+ * expose SYS_ID_AA64ZFR0_EL1 via the ONE_REG API unless the VM has
51
+++ b/target/arm/cpu.h
39
+ * enabled SVE support, which resulted in an error rather than RAZ.
52
@@ -XXX,XX +XXX,XX @@ struct ARMCPU {
40
+ * So only read the register if we set KVM_ARM_VCPU_SVE above.
53
void *el_change_hook_opaque;
41
+ */
54
42
+ err |= read_sys_reg64(fdarray[2], &ahcf->isar.id_aa64zfr0,
55
int32_t node_id; /* NUMA node this CPU belongs to */
43
+ ARM64_SYS_REG(3, 0, 0, 4, 4));
56
+
44
+ }
57
+ /* Used to synchronize KVM and QEMU in-kernel device levels */
58
+ uint8_t device_irq_level;
59
};
60
61
static inline ARMCPU *arm_env_get_cpu(CPUARMState *env)
62
diff --git a/accel/kvm/kvm-all.c b/accel/kvm/kvm-all.c
63
index XXXXXXX..XXXXXXX 100644
64
--- a/accel/kvm/kvm-all.c
65
+++ b/accel/kvm/kvm-all.c
66
@@ -XXX,XX +XXX,XX @@ int kvm_has_intx_set_mask(void)
67
return kvm_state->intx_set_mask;
68
}
69
70
+bool kvm_arm_supports_user_irq(void)
71
+{
72
+ return kvm_check_extension(kvm_state, KVM_CAP_ARM_USER_IRQ);
73
+}
74
+
75
#ifdef KVM_CAP_SET_GUEST_DEBUG
76
struct kvm_sw_breakpoint *kvm_find_sw_breakpoint(CPUState *cpu,
77
target_ulong pc)
78
diff --git a/accel/stubs/kvm-stub.c b/accel/stubs/kvm-stub.c
79
index XXXXXXX..XXXXXXX 100644
80
--- a/accel/stubs/kvm-stub.c
81
+++ b/accel/stubs/kvm-stub.c
82
@@ -XXX,XX +XXX,XX @@ void kvm_init_cpu_signals(CPUState *cpu)
83
{
84
abort();
85
}
86
+
87
+bool kvm_arm_supports_user_irq(void)
88
+{
89
+ return false;
90
+}
91
#endif
92
diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c
93
index XXXXXXX..XXXXXXX 100644
94
--- a/hw/intc/arm_gic.c
95
+++ b/hw/intc/arm_gic.c
96
@@ -XXX,XX +XXX,XX @@
97
#include "qom/cpu.h"
98
#include "qemu/log.h"
99
#include "trace.h"
100
+#include "sysemu/kvm.h"
101
102
/* #define DEBUG_GIC */
103
104
@@ -XXX,XX +XXX,XX @@ static void arm_gic_realize(DeviceState *dev, Error **errp)
105
return;
106
}
45
}
107
46
108
+ if (kvm_enabled() && !kvm_arm_supports_user_irq()) {
47
kvm_arm_destroy_scratch_host_vcpu(fdarray);
109
+ error_setg(errp, "KVM with user space irqchip only works when the "
110
+ "host kernel supports KVM_CAP_ARM_USER_IRQ");
111
+ return;
112
+ }
113
+
114
/* This creates distributor and main CPU interface (s->cpuiomem[0]) */
115
gic_init_irqs_and_mmio(s, gic_set_irq, gic_ops);
116
117
diff --git a/target/arm/kvm.c b/target/arm/kvm.c
118
index XXXXXXX..XXXXXXX 100644
119
--- a/target/arm/kvm.c
120
+++ b/target/arm/kvm.c
121
@@ -XXX,XX +XXX,XX @@ int kvm_arch_init(MachineState *ms, KVMState *s)
122
*/
123
kvm_async_interrupts_allowed = true;
124
125
+ /*
126
+ * PSCI wakes up secondary cores, so we always need to
127
+ * have vCPUs waiting in kernel space
128
+ */
129
+ kvm_halt_in_kernel_allowed = true;
130
+
131
cap_has_mp_state = kvm_check_extension(s, KVM_CAP_MP_STATE);
132
133
type_register_static(&host_arm_cpu_type_info);
134
@@ -XXX,XX +XXX,XX @@ void kvm_arch_pre_run(CPUState *cs, struct kvm_run *run)
135
136
MemTxAttrs kvm_arch_post_run(CPUState *cs, struct kvm_run *run)
137
{
138
+ ARMCPU *cpu;
139
+ uint32_t switched_level;
140
+
141
+ if (kvm_irqchip_in_kernel()) {
142
+ /*
143
+ * We only need to sync timer states with user-space interrupt
144
+ * controllers, so return early and save cycles if we don't.
145
+ */
146
+ return MEMTXATTRS_UNSPECIFIED;
147
+ }
148
+
149
+ cpu = ARM_CPU(cs);
150
+
151
+ /* Synchronize our shadowed in-kernel device irq lines with the kvm ones */
152
+ if (run->s.regs.device_irq_level != cpu->device_irq_level) {
153
+ switched_level = cpu->device_irq_level ^ run->s.regs.device_irq_level;
154
+
155
+ qemu_mutex_lock_iothread();
156
+
157
+ if (switched_level & KVM_ARM_DEV_EL1_VTIMER) {
158
+ qemu_set_irq(cpu->gt_timer_outputs[GTIMER_VIRT],
159
+ !!(run->s.regs.device_irq_level &
160
+ KVM_ARM_DEV_EL1_VTIMER));
161
+ switched_level &= ~KVM_ARM_DEV_EL1_VTIMER;
162
+ }
163
+
164
+ if (switched_level & KVM_ARM_DEV_EL1_PTIMER) {
165
+ qemu_set_irq(cpu->gt_timer_outputs[GTIMER_PHYS],
166
+ !!(run->s.regs.device_irq_level &
167
+ KVM_ARM_DEV_EL1_PTIMER));
168
+ switched_level &= ~KVM_ARM_DEV_EL1_PTIMER;
169
+ }
170
+
171
+ /* XXX PMU IRQ is missing */
172
+
173
+ if (switched_level) {
174
+ qemu_log_mask(LOG_UNIMP, "%s: unhandled in-kernel device IRQ %x\n",
175
+ __func__, switched_level);
176
+ }
177
+
178
+ /* We also mark unknown levels as processed to not waste cycles */
179
+ cpu->device_irq_level = run->s.regs.device_irq_level;
180
+ qemu_mutex_unlock_iothread();
181
+ }
182
+
183
return MEMTXATTRS_UNSPECIFIED;
184
}
185
186
--
48
--
187
2.7.4
49
2.25.1
188
189
diff view generated by jsdifflib
Deleted patch
1
For v7M, writes to the CONTROL register are only permitted for
2
privileged code. However even if the code is privileged, the
3
write must not affect the SPSEL bit in the CONTROL register
4
if the CPU is in Thread mode (as documented in the pseudocode
5
for the MSR instruction). Implement this, instead of permitting
6
SPSEL to be written in all cases.
7
1
8
This was causing mbed applications not to run, because the
9
RTX RTOS they use relies on this behaviour.
10
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
13
Message-id: 1498820791-8130-1-git-send-email-peter.maydell@linaro.org
14
---
15
target/arm/helper.c | 13 ++++++++++---
16
1 file changed, 10 insertions(+), 3 deletions(-)
17
18
diff --git a/target/arm/helper.c b/target/arm/helper.c
19
index XXXXXXX..XXXXXXX 100644
20
--- a/target/arm/helper.c
21
+++ b/target/arm/helper.c
22
@@ -XXX,XX +XXX,XX @@ void HELPER(v7m_msr)(CPUARMState *env, uint32_t maskreg, uint32_t val)
23
}
24
break;
25
case 20: /* CONTROL */
26
- switch_v7m_sp(env, (val & R_V7M_CONTROL_SPSEL_MASK) != 0);
27
- env->v7m.control = val & (R_V7M_CONTROL_SPSEL_MASK |
28
- R_V7M_CONTROL_NPRIV_MASK);
29
+ /* Writing to the SPSEL bit only has an effect if we are in
30
+ * thread mode; other bits can be updated by any privileged code.
31
+ * switch_v7m_sp() deals with updating the SPSEL bit in
32
+ * env->v7m.control, so we only need update the others.
33
+ */
34
+ if (env->v7m.exception == 0) {
35
+ switch_v7m_sp(env, (val & R_V7M_CONTROL_SPSEL_MASK) != 0);
36
+ }
37
+ env->v7m.control &= ~R_V7M_CONTROL_NPRIV_MASK;
38
+ env->v7m.control |= val & R_V7M_CONTROL_NPRIV_MASK;
39
break;
40
default:
41
qemu_log_mask(LOG_GUEST_ERROR, "Attempt to write unknown special"
42
--
43
2.7.4
44
45
diff view generated by jsdifflib