1 | A surprisingly short target-arm queue, but no point in holding | 1 | Hi; this pull request has a collection of bug fixes for rc0. |
---|---|---|---|
2 | onto these waiting for more code to arrive :-) | 2 | The big one is the trusted firmware boot regression fix. |
3 | 3 | ||
4 | thanks | 4 | thanks |
5 | -- PMM | 5 | -- PMM |
6 | 6 | ||
7 | The following changes since commit 3d0bf8dfdfebd7f2ae41b6f220444b8047d6b1ee: | 7 | The following changes since commit ece5f8374d0416a339f0c0a9399faa2c42d4ad6f: |
8 | 8 | ||
9 | Merge remote-tracking branch 'remotes/dgilbert/tags/pull-migration-20170710a' into staging (2017-07-10 18:13:03 +0100) | 9 | Merge tag 'linux-user-for-7.2-pull-request' of https://gitlab.com/laurent_vivier/qemu into staging (2022-11-03 10:55:05 -0400) |
10 | 10 | ||
11 | are available in the git repository at: | 11 | are available in the Git repository at: |
12 | 12 | ||
13 | git://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20170711 | 13 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20221104 |
14 | 14 | ||
15 | for you to fetch changes up to 792dac309c8660306557ba058b8b5a6a75ab3c1f: | 15 | for you to fetch changes up to cead7fa4c06087c86c67c5ce815cc1ff0bfeac3a: |
16 | 16 | ||
17 | target-arm: v7M: ignore writes to CONTROL.SPSEL from Thread mode (2017-07-11 11:21:26 +0100) | 17 | target/arm: Two fixes for secure ptw (2022-11-04 10:58:58 +0000) |
18 | 18 | ||
19 | ---------------------------------------------------------------- | 19 | ---------------------------------------------------------------- |
20 | target-arm queue: | 20 | target-arm queue: |
21 | * v7M: ignore writes to CONTROL.SPSEL from Thread mode | 21 | * Fix regression booting Trusted Firmware |
22 | * KVM: Enable in-kernel timers with user space gic | 22 | * Honor HCR_E2H and HCR_TGE in ats_write64() |
23 | * aspeed: Register all watchdogs | 23 | * Copy the entire vector in DO_ZIP |
24 | * hw/misc: Add Exynos4210 Pseudo Random Number Generator | 24 | * Fix Privileged Access Never (PAN) for aarch32 |
25 | * Make TLBIOS and TLBIRANGE ops trap on HCR_EL2.TTLB | ||
26 | * Set SCR_EL3.HXEn when direct booting kernel | ||
27 | * Set SME and SVE EL3 vector lengths when direct booting kernel | ||
25 | 28 | ||
26 | ---------------------------------------------------------------- | 29 | ---------------------------------------------------------------- |
27 | Alexander Graf (1): | 30 | Ake Koomsin (1): |
28 | ARM: KVM: Enable in-kernel timers with user space gic | 31 | target/arm: Honor HCR_E2H and HCR_TGE in ats_write64() |
29 | 32 | ||
30 | Joel Stanley (1): | 33 | Peter Maydell (3): |
31 | aspeed: Register all watchdogs | 34 | hw/arm/boot: Set SME and SVE EL3 vector lengths when booting kernel |
35 | hw/arm/boot: Set SCR_EL3.HXEn when booting kernel | ||
36 | target/arm: Make TLBIOS and TLBIRANGE ops trap on HCR_EL2.TTLB | ||
32 | 37 | ||
33 | Krzysztof Kozlowski (1): | 38 | Richard Henderson (2): |
34 | hw/misc: Add Exynos4210 Pseudo Random Number Generator | 39 | target/arm: Copy the entire vector in DO_ZIP |
40 | target/arm: Two fixes for secure ptw | ||
35 | 41 | ||
36 | Peter Maydell (1): | 42 | Timofey Kutergin (1): |
37 | target-arm: v7M: ignore writes to CONTROL.SPSEL from Thread mode | 43 | target/arm: Fix Privileged Access Never (PAN) for aarch32 |
38 | 44 | ||
39 | hw/misc/Makefile.objs | 2 +- | 45 | hw/arm/boot.c | 5 ++++ |
40 | include/hw/arm/aspeed_soc.h | 4 +- | 46 | target/arm/helper.c | 64 +++++++++++++++++++++++++++++-------------------- |
41 | include/sysemu/kvm.h | 11 ++ | 47 | target/arm/ptw.c | 50 ++++++++++++++++++++++++++++---------- |
42 | target/arm/cpu.h | 3 + | 48 | target/arm/sve_helper.c | 4 ++-- |
43 | accel/kvm/kvm-all.c | 5 + | 49 | 4 files changed, 83 insertions(+), 40 deletions(-) |
44 | accel/stubs/kvm-stub.c | 5 + | ||
45 | hw/arm/aspeed_soc.c | 25 ++-- | ||
46 | hw/arm/exynos4210.c | 4 + | ||
47 | hw/intc/arm_gic.c | 7 ++ | ||
48 | hw/misc/exynos4210_rng.c | 277 ++++++++++++++++++++++++++++++++++++++++++++ | ||
49 | target/arm/helper.c | 13 ++- | ||
50 | target/arm/kvm.c | 51 ++++++++ | ||
51 | 12 files changed, 394 insertions(+), 13 deletions(-) | ||
52 | create mode 100644 hw/misc/exynos4210_rng.c | ||
53 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | When we direct boot a kernel on a CPU which emulates EL3, we need | ||
2 | to set up the EL3 system registers as the Linux kernel documentation | ||
3 | specifies: | ||
4 | https://www.kernel.org/doc/Documentation/arm64/booting.rst | ||
1 | 5 | ||
6 | For SVE and SME this includes: | ||
7 | - ZCR_EL3.LEN must be initialised to the same value for all CPUs the | ||
8 | kernel is executed on. | ||
9 | - SMCR_EL3.LEN must be initialised to the same value for all CPUs the | ||
10 | kernel will execute on. | ||
11 | |||
12 | Although we are technically compliant with this, the "same value" we | ||
13 | currently use by default is the reset value of 0. This will end up | ||
14 | forcing the guest kernel's SVE and SME vector length to be only the | ||
15 | smallest supported length. | ||
16 | |||
17 | Initialize the vector length fields to their maximum possible value, | ||
18 | which is 0xf. If the implementation doesn't actually support that | ||
19 | vector length then the effective vector length will be constrained | ||
20 | down to the maximum supported value at point of use. | ||
21 | |||
22 | This allows the guest to use all the vector lengths the emulated CPU | ||
23 | supports (by programming the _EL2 and _EL1 versions of these | ||
24 | registers.) | ||
25 | |||
26 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
27 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
28 | Message-id: 20221027140207.413084-2-peter.maydell@linaro.org | ||
29 | --- | ||
30 | hw/arm/boot.c | 2 ++ | ||
31 | 1 file changed, 2 insertions(+) | ||
32 | |||
33 | diff --git a/hw/arm/boot.c b/hw/arm/boot.c | ||
34 | index XXXXXXX..XXXXXXX 100644 | ||
35 | --- a/hw/arm/boot.c | ||
36 | +++ b/hw/arm/boot.c | ||
37 | @@ -XXX,XX +XXX,XX @@ static void do_cpu_reset(void *opaque) | ||
38 | } | ||
39 | if (cpu_isar_feature(aa64_sve, cpu)) { | ||
40 | env->cp15.cptr_el[3] |= R_CPTR_EL3_EZ_MASK; | ||
41 | + env->vfp.zcr_el[3] = 0xf; | ||
42 | } | ||
43 | if (cpu_isar_feature(aa64_sme, cpu)) { | ||
44 | env->cp15.cptr_el[3] |= R_CPTR_EL3_ESM_MASK; | ||
45 | env->cp15.scr_el3 |= SCR_ENTP2; | ||
46 | + env->vfp.smcr_el[3] = 0xf; | ||
47 | } | ||
48 | /* AArch64 kernels never boot in secure mode */ | ||
49 | assert(!info->secure_boot); | ||
50 | -- | ||
51 | 2.25.1 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | When we direct boot a kernel on a CPU which emulates EL3, we need to | ||
2 | set up the EL3 system registers as the Linux kernel documentation | ||
3 | specifies: | ||
4 | https://www.kernel.org/doc/Documentation/arm64/booting.rst | ||
1 | 5 | ||
6 | For CPUs with FEAT_HCX support this includes: | ||
7 | - SCR_EL3.HXEn (bit 38) must be initialised to 0b1. | ||
8 | |||
9 | but we forgot to do this when implementing FEAT_HCX, which would mean | ||
10 | that a guest trying to access the HCRX_EL2 register would crash. | ||
11 | |||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
13 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
14 | Message-id: 20221027140207.413084-3-peter.maydell@linaro.org | ||
15 | --- | ||
16 | hw/arm/boot.c | 3 +++ | ||
17 | 1 file changed, 3 insertions(+) | ||
18 | |||
19 | diff --git a/hw/arm/boot.c b/hw/arm/boot.c | ||
20 | index XXXXXXX..XXXXXXX 100644 | ||
21 | --- a/hw/arm/boot.c | ||
22 | +++ b/hw/arm/boot.c | ||
23 | @@ -XXX,XX +XXX,XX @@ static void do_cpu_reset(void *opaque) | ||
24 | env->cp15.scr_el3 |= SCR_ENTP2; | ||
25 | env->vfp.smcr_el[3] = 0xf; | ||
26 | } | ||
27 | + if (cpu_isar_feature(aa64_hcx, cpu)) { | ||
28 | + env->cp15.scr_el3 |= SCR_HXEN; | ||
29 | + } | ||
30 | /* AArch64 kernels never boot in secure mode */ | ||
31 | assert(!info->secure_boot); | ||
32 | /* This hook is only supported for AArch32 currently: | ||
33 | -- | ||
34 | 2.25.1 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | The HCR_EL2.TTLB bit is supposed to trap all EL1 execution of TLB | ||
2 | maintenance instructions. However we have added new TLB insns for | ||
3 | FEAT_TLBIOS and FEAT_TLBIRANGE, and forgot to set their accessfn to | ||
4 | access_ttlb. Add the missing accessfns. | ||
1 | 5 | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | --- | ||
9 | target/arm/helper.c | 36 ++++++++++++++++++------------------ | ||
10 | 1 file changed, 18 insertions(+), 18 deletions(-) | ||
11 | |||
12 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
13 | index XXXXXXX..XXXXXXX 100644 | ||
14 | --- a/target/arm/helper.c | ||
15 | +++ b/target/arm/helper.c | ||
16 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo pauth_reginfo[] = { | ||
17 | static const ARMCPRegInfo tlbirange_reginfo[] = { | ||
18 | { .name = "TLBI_RVAE1IS", .state = ARM_CP_STATE_AA64, | ||
19 | .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 2, .opc2 = 1, | ||
20 | - .access = PL1_W, .type = ARM_CP_NO_RAW, | ||
21 | + .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW, | ||
22 | .writefn = tlbi_aa64_rvae1is_write }, | ||
23 | { .name = "TLBI_RVAAE1IS", .state = ARM_CP_STATE_AA64, | ||
24 | .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 2, .opc2 = 3, | ||
25 | - .access = PL1_W, .type = ARM_CP_NO_RAW, | ||
26 | + .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW, | ||
27 | .writefn = tlbi_aa64_rvae1is_write }, | ||
28 | { .name = "TLBI_RVALE1IS", .state = ARM_CP_STATE_AA64, | ||
29 | .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 2, .opc2 = 5, | ||
30 | - .access = PL1_W, .type = ARM_CP_NO_RAW, | ||
31 | + .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW, | ||
32 | .writefn = tlbi_aa64_rvae1is_write }, | ||
33 | { .name = "TLBI_RVAALE1IS", .state = ARM_CP_STATE_AA64, | ||
34 | .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 2, .opc2 = 7, | ||
35 | - .access = PL1_W, .type = ARM_CP_NO_RAW, | ||
36 | + .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW, | ||
37 | .writefn = tlbi_aa64_rvae1is_write }, | ||
38 | { .name = "TLBI_RVAE1OS", .state = ARM_CP_STATE_AA64, | ||
39 | .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 5, .opc2 = 1, | ||
40 | - .access = PL1_W, .type = ARM_CP_NO_RAW, | ||
41 | + .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW, | ||
42 | .writefn = tlbi_aa64_rvae1is_write }, | ||
43 | { .name = "TLBI_RVAAE1OS", .state = ARM_CP_STATE_AA64, | ||
44 | .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 5, .opc2 = 3, | ||
45 | - .access = PL1_W, .type = ARM_CP_NO_RAW, | ||
46 | + .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW, | ||
47 | .writefn = tlbi_aa64_rvae1is_write }, | ||
48 | { .name = "TLBI_RVALE1OS", .state = ARM_CP_STATE_AA64, | ||
49 | .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 5, .opc2 = 5, | ||
50 | - .access = PL1_W, .type = ARM_CP_NO_RAW, | ||
51 | + .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW, | ||
52 | .writefn = tlbi_aa64_rvae1is_write }, | ||
53 | { .name = "TLBI_RVAALE1OS", .state = ARM_CP_STATE_AA64, | ||
54 | .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 5, .opc2 = 7, | ||
55 | - .access = PL1_W, .type = ARM_CP_NO_RAW, | ||
56 | + .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW, | ||
57 | .writefn = tlbi_aa64_rvae1is_write }, | ||
58 | { .name = "TLBI_RVAE1", .state = ARM_CP_STATE_AA64, | ||
59 | .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 6, .opc2 = 1, | ||
60 | - .access = PL1_W, .type = ARM_CP_NO_RAW, | ||
61 | + .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW, | ||
62 | .writefn = tlbi_aa64_rvae1_write }, | ||
63 | { .name = "TLBI_RVAAE1", .state = ARM_CP_STATE_AA64, | ||
64 | .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 6, .opc2 = 3, | ||
65 | - .access = PL1_W, .type = ARM_CP_NO_RAW, | ||
66 | + .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW, | ||
67 | .writefn = tlbi_aa64_rvae1_write }, | ||
68 | { .name = "TLBI_RVALE1", .state = ARM_CP_STATE_AA64, | ||
69 | .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 6, .opc2 = 5, | ||
70 | - .access = PL1_W, .type = ARM_CP_NO_RAW, | ||
71 | + .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW, | ||
72 | .writefn = tlbi_aa64_rvae1_write }, | ||
73 | { .name = "TLBI_RVAALE1", .state = ARM_CP_STATE_AA64, | ||
74 | .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 6, .opc2 = 7, | ||
75 | - .access = PL1_W, .type = ARM_CP_NO_RAW, | ||
76 | + .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW, | ||
77 | .writefn = tlbi_aa64_rvae1_write }, | ||
78 | { .name = "TLBI_RIPAS2E1IS", .state = ARM_CP_STATE_AA64, | ||
79 | .opc0 = 1, .opc1 = 4, .crn = 8, .crm = 0, .opc2 = 2, | ||
80 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo tlbirange_reginfo[] = { | ||
81 | static const ARMCPRegInfo tlbios_reginfo[] = { | ||
82 | { .name = "TLBI_VMALLE1OS", .state = ARM_CP_STATE_AA64, | ||
83 | .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 1, .opc2 = 0, | ||
84 | - .access = PL1_W, .type = ARM_CP_NO_RAW, | ||
85 | + .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW, | ||
86 | .writefn = tlbi_aa64_vmalle1is_write }, | ||
87 | { .name = "TLBI_VAE1OS", .state = ARM_CP_STATE_AA64, | ||
88 | .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 1, .opc2 = 1, | ||
89 | - .access = PL1_W, .type = ARM_CP_NO_RAW, | ||
90 | + .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW, | ||
91 | .writefn = tlbi_aa64_vae1is_write }, | ||
92 | { .name = "TLBI_ASIDE1OS", .state = ARM_CP_STATE_AA64, | ||
93 | .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 1, .opc2 = 2, | ||
94 | - .access = PL1_W, .type = ARM_CP_NO_RAW, | ||
95 | + .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW, | ||
96 | .writefn = tlbi_aa64_vmalle1is_write }, | ||
97 | { .name = "TLBI_VAAE1OS", .state = ARM_CP_STATE_AA64, | ||
98 | .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 1, .opc2 = 3, | ||
99 | - .access = PL1_W, .type = ARM_CP_NO_RAW, | ||
100 | + .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW, | ||
101 | .writefn = tlbi_aa64_vae1is_write }, | ||
102 | { .name = "TLBI_VALE1OS", .state = ARM_CP_STATE_AA64, | ||
103 | .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 1, .opc2 = 5, | ||
104 | - .access = PL1_W, .type = ARM_CP_NO_RAW, | ||
105 | + .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW, | ||
106 | .writefn = tlbi_aa64_vae1is_write }, | ||
107 | { .name = "TLBI_VAALE1OS", .state = ARM_CP_STATE_AA64, | ||
108 | .opc0 = 1, .opc1 = 0, .crn = 8, .crm = 1, .opc2 = 7, | ||
109 | - .access = PL1_W, .type = ARM_CP_NO_RAW, | ||
110 | + .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW, | ||
111 | .writefn = tlbi_aa64_vae1is_write }, | ||
112 | { .name = "TLBI_ALLE2OS", .state = ARM_CP_STATE_AA64, | ||
113 | .opc0 = 1, .opc1 = 4, .crn = 8, .crm = 1, .opc2 = 0, | ||
114 | -- | ||
115 | 2.25.1 | diff view generated by jsdifflib |
1 | From: Krzysztof Kozlowski <krzk@kernel.org> | 1 | From: Timofey Kutergin <tkutergin@gmail.com> |
---|---|---|---|
2 | 2 | ||
3 | Add emulation for Exynos4210 Pseudo Random Number Generator which could | 3 | When we implemented the PAN support we theoretically wanted |
4 | work on fixed seeds or with seeds provided by True Random Number | 4 | to support it for both AArch32 and AArch64, but in practice |
5 | Generator block inside the SoC. | 5 | several bugs made it essentially unusable with an AArch32 |
6 | guest. Fix all those problems: | ||
6 | 7 | ||
7 | Implement only the fixed seeds part of it in polling mode (no | 8 | - Use CPSR.PAN to check for PAN state in aarch32 mode |
8 | interrupts). | 9 | - throw permission fault during address translation when PAN is |
10 | enabled and kernel tries to access user acessible page | ||
11 | - ignore SCTLR_XP bit for armv7 and armv8 (conflicts with SCTLR_SPAN). | ||
9 | 12 | ||
10 | Emulation tested with two independent Linux kernel exynos-rng drivers: | 13 | Signed-off-by: Timofey Kutergin <tkutergin@gmail.com> |
11 | 1. New kcapi-rng interface (targeting Linux v4.12), | ||
12 | 2. Old hwrng inteface | ||
13 | # echo "exynos" > /sys/class/misc/hw_random/rng_current | ||
14 | # dd if=/dev/hwrng of=/dev/null bs=1 count=16 | ||
15 | |||
16 | Signed-off-by: Krzysztof Kozlowski <krzk@kernel.org> | ||
17 | Message-id: 20170425180609.11004-1-krzk@kernel.org | ||
18 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 14 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
19 | [PMM: wrapped a few overlong lines; more efficient implementation | 15 | Message-id: 20221027112619.2205229-1-tkutergin@gmail.com |
20 | of exynos4210_rng_seed_ready()] | 16 | [PMM: tweak commit message] |
21 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 17 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
22 | --- | 18 | --- |
23 | hw/misc/Makefile.objs | 2 +- | 19 | target/arm/helper.c | 13 +++++++++++-- |
24 | hw/arm/exynos4210.c | 4 + | 20 | target/arm/ptw.c | 35 ++++++++++++++++++++++++++++++----- |
25 | hw/misc/exynos4210_rng.c | 277 +++++++++++++++++++++++++++++++++++++++++++++++ | 21 | 2 files changed, 41 insertions(+), 7 deletions(-) |
26 | 3 files changed, 282 insertions(+), 1 deletion(-) | ||
27 | create mode 100644 hw/misc/exynos4210_rng.c | ||
28 | 22 | ||
29 | diff --git a/hw/misc/Makefile.objs b/hw/misc/Makefile.objs | 23 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
30 | index XXXXXXX..XXXXXXX 100644 | 24 | index XXXXXXX..XXXXXXX 100644 |
31 | --- a/hw/misc/Makefile.objs | 25 | --- a/target/arm/helper.c |
32 | +++ b/hw/misc/Makefile.objs | 26 | +++ b/target/arm/helper.c |
33 | @@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_IVSHMEM) += ivshmem.o | 27 | @@ -XXX,XX +XXX,XX @@ ARMMMUIdx arm_v7m_mmu_idx_for_secstate(CPUARMState *env, bool secstate) |
34 | obj-$(CONFIG_REALVIEW) += arm_sysctl.o | 28 | } |
35 | obj-$(CONFIG_NSERIES) += cbus.o | 29 | #endif |
36 | obj-$(CONFIG_ECCMEMCTL) += eccmemctl.o | 30 | |
37 | -obj-$(CONFIG_EXYNOS4) += exynos4210_pmu.o exynos4210_clk.o | 31 | +static bool arm_pan_enabled(CPUARMState *env) |
38 | +obj-$(CONFIG_EXYNOS4) += exynos4210_pmu.o exynos4210_clk.o exynos4210_rng.o | ||
39 | obj-$(CONFIG_IMX) += imx_ccm.o | ||
40 | obj-$(CONFIG_IMX) += imx31_ccm.o | ||
41 | obj-$(CONFIG_IMX) += imx25_ccm.o | ||
42 | diff --git a/hw/arm/exynos4210.c b/hw/arm/exynos4210.c | ||
43 | index XXXXXXX..XXXXXXX 100644 | ||
44 | --- a/hw/arm/exynos4210.c | ||
45 | +++ b/hw/arm/exynos4210.c | ||
46 | @@ -XXX,XX +XXX,XX @@ | ||
47 | /* Clock controller SFR base address */ | ||
48 | #define EXYNOS4210_CLK_BASE_ADDR 0x10030000 | ||
49 | |||
50 | +/* PRNG/HASH SFR base address */ | ||
51 | +#define EXYNOS4210_RNG_BASE_ADDR 0x10830400 | ||
52 | + | ||
53 | /* Display controllers (FIMD) */ | ||
54 | #define EXYNOS4210_FIMD0_BASE_ADDR 0x11C00000 | ||
55 | |||
56 | @@ -XXX,XX +XXX,XX @@ Exynos4210State *exynos4210_init(MemoryRegion *system_mem) | ||
57 | sysbus_create_simple("exynos4210.pmu", EXYNOS4210_PMU_BASE_ADDR, NULL); | ||
58 | |||
59 | sysbus_create_simple("exynos4210.clk", EXYNOS4210_CLK_BASE_ADDR, NULL); | ||
60 | + sysbus_create_simple("exynos4210.rng", EXYNOS4210_RNG_BASE_ADDR, NULL); | ||
61 | |||
62 | /* PWM */ | ||
63 | sysbus_create_varargs("exynos4210.pwm", EXYNOS4210_PWM_BASE_ADDR, | ||
64 | diff --git a/hw/misc/exynos4210_rng.c b/hw/misc/exynos4210_rng.c | ||
65 | new file mode 100644 | ||
66 | index XXXXXXX..XXXXXXX | ||
67 | --- /dev/null | ||
68 | +++ b/hw/misc/exynos4210_rng.c | ||
69 | @@ -XXX,XX +XXX,XX @@ | ||
70 | +/* | ||
71 | + * Exynos4210 Pseudo Random Nubmer Generator Emulation | ||
72 | + * | ||
73 | + * Copyright (c) 2017 Krzysztof Kozlowski <krzk@kernel.org> | ||
74 | + * | ||
75 | + * This program is free software; you can redistribute it and/or modify it | ||
76 | + * under the terms of the GNU General Public License as published by the | ||
77 | + * Free Software Foundation; either version 2 of the License, or | ||
78 | + * (at your option) any later version. | ||
79 | + * | ||
80 | + * This program is distributed in the hope that it will be useful, but WITHOUT | ||
81 | + * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or | ||
82 | + * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License | ||
83 | + * for more details. | ||
84 | + * | ||
85 | + * You should have received a copy of the GNU General Public License along | ||
86 | + * with this program; if not, see <http://www.gnu.org/licenses/>. | ||
87 | + */ | ||
88 | + | ||
89 | +#include "qemu/osdep.h" | ||
90 | +#include "crypto/random.h" | ||
91 | +#include "hw/sysbus.h" | ||
92 | +#include "qemu/log.h" | ||
93 | + | ||
94 | +#define DEBUG_EXYNOS_RNG 0 | ||
95 | + | ||
96 | +#define DPRINTF(fmt, ...) \ | ||
97 | + do { \ | ||
98 | + if (DEBUG_EXYNOS_RNG) { \ | ||
99 | + printf("exynos4210_rng: " fmt, ## __VA_ARGS__); \ | ||
100 | + } \ | ||
101 | + } while (0) | ||
102 | + | ||
103 | +#define TYPE_EXYNOS4210_RNG "exynos4210.rng" | ||
104 | +#define EXYNOS4210_RNG(obj) \ | ||
105 | + OBJECT_CHECK(Exynos4210RngState, (obj), TYPE_EXYNOS4210_RNG) | ||
106 | + | ||
107 | +/* | ||
108 | + * Exynos4220, PRNG, only polling mode is supported. | ||
109 | + */ | ||
110 | + | ||
111 | +/* RNG_CONTROL_1 register bitfields, reset value: 0x0 */ | ||
112 | +#define EXYNOS4210_RNG_CONTROL_1_PRNG 0x8 | ||
113 | +#define EXYNOS4210_RNG_CONTROL_1_START_INIT BIT(4) | ||
114 | +/* RNG_STATUS register bitfields, reset value: 0x1 */ | ||
115 | +#define EXYNOS4210_RNG_STATUS_PRNG_ERROR BIT(7) | ||
116 | +#define EXYNOS4210_RNG_STATUS_PRNG_DONE BIT(5) | ||
117 | +#define EXYNOS4210_RNG_STATUS_MSG_DONE BIT(4) | ||
118 | +#define EXYNOS4210_RNG_STATUS_PARTIAL_DONE BIT(3) | ||
119 | +#define EXYNOS4210_RNG_STATUS_PRNG_BUSY BIT(2) | ||
120 | +#define EXYNOS4210_RNG_STATUS_SEED_SETTING_DONE BIT(1) | ||
121 | +#define EXYNOS4210_RNG_STATUS_BUFFER_READY BIT(0) | ||
122 | +#define EXYNOS4210_RNG_STATUS_WRITE_MASK (EXYNOS4210_RNG_STATUS_PRNG_DONE \ | ||
123 | + | EXYNOS4210_RNG_STATUS_MSG_DONE \ | ||
124 | + | EXYNOS4210_RNG_STATUS_PARTIAL_DONE) | ||
125 | + | ||
126 | +#define EXYNOS4210_RNG_CONTROL_1 0x0 | ||
127 | +#define EXYNOS4210_RNG_STATUS 0x10 | ||
128 | +#define EXYNOS4210_RNG_SEED_IN 0x140 | ||
129 | +#define EXYNOS4210_RNG_SEED_IN_OFFSET(n) (EXYNOS4210_RNG_SEED_IN + (n * 0x4)) | ||
130 | +#define EXYNOS4210_RNG_PRNG 0x160 | ||
131 | +#define EXYNOS4210_RNG_PRNG_OFFSET(n) (EXYNOS4210_RNG_PRNG + (n * 0x4)) | ||
132 | + | ||
133 | +#define EXYNOS4210_RNG_PRNG_NUM 5 | ||
134 | + | ||
135 | +#define EXYNOS4210_RNG_REGS_MEM_SIZE 0x200 | ||
136 | + | ||
137 | +typedef struct Exynos4210RngState { | ||
138 | + SysBusDevice parent_obj; | ||
139 | + MemoryRegion iomem; | ||
140 | + | ||
141 | + int32_t randr_value[EXYNOS4210_RNG_PRNG_NUM]; | ||
142 | + /* bits from 0 to EXYNOS4210_RNG_PRNG_NUM if given seed register was set */ | ||
143 | + uint32_t seed_set; | ||
144 | + | ||
145 | + /* Register values */ | ||
146 | + uint32_t reg_control; | ||
147 | + uint32_t reg_status; | ||
148 | +} Exynos4210RngState; | ||
149 | + | ||
150 | +static bool exynos4210_rng_seed_ready(const Exynos4210RngState *s) | ||
151 | +{ | 32 | +{ |
152 | + uint32_t mask = MAKE_64BIT_MASK(0, EXYNOS4210_RNG_PRNG_NUM); | 33 | + if (is_a64(env)) { |
153 | + | 34 | + return env->pstate & PSTATE_PAN; |
154 | + /* Return true if all the seed-set bits are set. */ | ||
155 | + return (s->seed_set & mask) == mask; | ||
156 | +} | ||
157 | + | ||
158 | +static void exynos4210_rng_set_seed(Exynos4210RngState *s, unsigned int i, | ||
159 | + uint64_t val) | ||
160 | +{ | ||
161 | + /* | ||
162 | + * We actually ignore the seed and always generate true random numbers. | ||
163 | + * Theoretically this should not match the device as Exynos has | ||
164 | + * a Pseudo Random Number Generator but testing shown that it always | ||
165 | + * generates random numbers regardless of the seed value. | ||
166 | + */ | ||
167 | + s->seed_set |= BIT(i); | ||
168 | + | ||
169 | + /* If all seeds were written, update the status to reflect it */ | ||
170 | + if (exynos4210_rng_seed_ready(s)) { | ||
171 | + s->reg_status |= EXYNOS4210_RNG_STATUS_SEED_SETTING_DONE; | ||
172 | + } else { | 35 | + } else { |
173 | + s->reg_status &= ~EXYNOS4210_RNG_STATUS_SEED_SETTING_DONE; | 36 | + return env->uncached_cpsr & CPSR_PAN; |
174 | + } | 37 | + } |
175 | +} | 38 | +} |
176 | + | 39 | + |
177 | +static void exynos4210_rng_run_engine(Exynos4210RngState *s) | 40 | ARMMMUIdx arm_mmu_idx_el(CPUARMState *env, int el) |
41 | { | ||
42 | ARMMMUIdx idx; | ||
43 | @@ -XXX,XX +XXX,XX @@ ARMMMUIdx arm_mmu_idx_el(CPUARMState *env, int el) | ||
44 | } | ||
45 | break; | ||
46 | case 1: | ||
47 | - if (env->pstate & PSTATE_PAN) { | ||
48 | + if (arm_pan_enabled(env)) { | ||
49 | idx = ARMMMUIdx_E10_1_PAN; | ||
50 | } else { | ||
51 | idx = ARMMMUIdx_E10_1; | ||
52 | @@ -XXX,XX +XXX,XX @@ ARMMMUIdx arm_mmu_idx_el(CPUARMState *env, int el) | ||
53 | case 2: | ||
54 | /* Note that TGE does not apply at EL2. */ | ||
55 | if (arm_hcr_el2_eff(env) & HCR_E2H) { | ||
56 | - if (env->pstate & PSTATE_PAN) { | ||
57 | + if (arm_pan_enabled(env)) { | ||
58 | idx = ARMMMUIdx_E20_2_PAN; | ||
59 | } else { | ||
60 | idx = ARMMMUIdx_E20_2; | ||
61 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c | ||
62 | index XXXXXXX..XXXXXXX 100644 | ||
63 | --- a/target/arm/ptw.c | ||
64 | +++ b/target/arm/ptw.c | ||
65 | @@ -XXX,XX +XXX,XX @@ static bool get_level1_table_address(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
66 | * @mmu_idx: MMU index indicating required translation regime | ||
67 | * @ap: The 3-bit access permissions (AP[2:0]) | ||
68 | * @domain_prot: The 2-bit domain access permissions | ||
69 | + * @is_user: TRUE if accessing from PL0 | ||
70 | */ | ||
71 | -static int ap_to_rw_prot(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
72 | - int ap, int domain_prot) | ||
73 | +static int ap_to_rw_prot_is_user(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
74 | + int ap, int domain_prot, bool is_user) | ||
75 | { | ||
76 | - bool is_user = regime_is_user(env, mmu_idx); | ||
77 | - | ||
78 | if (domain_prot == 3) { | ||
79 | return PAGE_READ | PAGE_WRITE; | ||
80 | } | ||
81 | @@ -XXX,XX +XXX,XX @@ static int ap_to_rw_prot(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
82 | } | ||
83 | } | ||
84 | |||
85 | +/* | ||
86 | + * Translate section/page access permissions to page R/W protection flags | ||
87 | + * @env: CPUARMState | ||
88 | + * @mmu_idx: MMU index indicating required translation regime | ||
89 | + * @ap: The 3-bit access permissions (AP[2:0]) | ||
90 | + * @domain_prot: The 2-bit domain access permissions | ||
91 | + */ | ||
92 | +static int ap_to_rw_prot(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
93 | + int ap, int domain_prot) | ||
178 | +{ | 94 | +{ |
179 | + Error *err = NULL; | 95 | + return ap_to_rw_prot_is_user(env, mmu_idx, ap, domain_prot, |
180 | + int ret; | 96 | + regime_is_user(env, mmu_idx)); |
181 | + | ||
182 | + /* Seed set? */ | ||
183 | + if ((s->reg_status & EXYNOS4210_RNG_STATUS_SEED_SETTING_DONE) == 0) { | ||
184 | + goto out; | ||
185 | + } | ||
186 | + | ||
187 | + /* PRNG engine chosen? */ | ||
188 | + if ((s->reg_control & EXYNOS4210_RNG_CONTROL_1_PRNG) == 0) { | ||
189 | + goto out; | ||
190 | + } | ||
191 | + | ||
192 | + /* PRNG engine started? */ | ||
193 | + if ((s->reg_control & EXYNOS4210_RNG_CONTROL_1_START_INIT) == 0) { | ||
194 | + goto out; | ||
195 | + } | ||
196 | + | ||
197 | + /* Get randoms */ | ||
198 | + ret = qcrypto_random_bytes((uint8_t *)s->randr_value, | ||
199 | + sizeof(s->randr_value), &err); | ||
200 | + if (!ret) { | ||
201 | + /* Notify that PRNG is ready */ | ||
202 | + s->reg_status |= EXYNOS4210_RNG_STATUS_PRNG_DONE; | ||
203 | + } else { | ||
204 | + error_report_err(err); | ||
205 | + } | ||
206 | + | ||
207 | +out: | ||
208 | + /* Always clear start engine bit */ | ||
209 | + s->reg_control &= ~EXYNOS4210_RNG_CONTROL_1_START_INIT; | ||
210 | +} | 97 | +} |
211 | + | 98 | + |
212 | +static uint64_t exynos4210_rng_read(void *opaque, hwaddr offset, | 99 | /* |
213 | + unsigned size) | 100 | * Translate section/page access permissions to page R/W protection flags. |
214 | +{ | 101 | * @ap: The 2-bit simple AP (AP[2:1]) |
215 | + Exynos4210RngState *s = (Exynos4210RngState *)opaque; | 102 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v6(CPUARMState *env, S1Translate *ptw, |
216 | + uint32_t val = 0; | 103 | hwaddr phys_addr; |
217 | + | 104 | uint32_t dacr; |
218 | + assert(size == 4); | 105 | bool ns; |
219 | + | 106 | + int user_prot; |
220 | + switch (offset) { | 107 | |
221 | + case EXYNOS4210_RNG_CONTROL_1: | 108 | /* Pagetable walk. */ |
222 | + val = s->reg_control; | 109 | /* Lookup l1 descriptor. */ |
223 | + break; | 110 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v6(CPUARMState *env, S1Translate *ptw, |
224 | + | 111 | goto do_fault; |
225 | + case EXYNOS4210_RNG_STATUS: | 112 | } |
226 | + val = s->reg_status; | 113 | result->f.prot = simple_ap_to_rw_prot(env, mmu_idx, ap >> 1); |
227 | + break; | 114 | + user_prot = simple_ap_to_rw_prot_is_user(ap >> 1, 1); |
228 | + | 115 | } else { |
229 | + case EXYNOS4210_RNG_PRNG_OFFSET(0): | 116 | result->f.prot = ap_to_rw_prot(env, mmu_idx, ap, domain_prot); |
230 | + case EXYNOS4210_RNG_PRNG_OFFSET(1): | 117 | + user_prot = ap_to_rw_prot_is_user(env, mmu_idx, ap, domain_prot, 1); |
231 | + case EXYNOS4210_RNG_PRNG_OFFSET(2): | 118 | } |
232 | + case EXYNOS4210_RNG_PRNG_OFFSET(3): | 119 | if (result->f.prot && !xn) { |
233 | + case EXYNOS4210_RNG_PRNG_OFFSET(4): | 120 | result->f.prot |= PAGE_EXEC; |
234 | + val = s->randr_value[(offset - EXYNOS4210_RNG_PRNG_OFFSET(0)) / 4]; | 121 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v6(CPUARMState *env, S1Translate *ptw, |
235 | + DPRINTF("returning random @0x%" HWADDR_PRIx ": 0x%" PRIx32 "\n", | 122 | fi->type = ARMFault_Permission; |
236 | + offset, val); | 123 | goto do_fault; |
237 | + break; | 124 | } |
238 | + | 125 | + if (regime_is_pan(env, mmu_idx) && |
239 | + default: | 126 | + !regime_is_user(env, mmu_idx) && |
240 | + qemu_log_mask(LOG_GUEST_ERROR, | 127 | + user_prot && |
241 | + "%s: bad read offset 0x%" HWADDR_PRIx "\n", | 128 | + access_type != MMU_INST_FETCH) { |
242 | + __func__, offset); | 129 | + /* Privileged Access Never fault */ |
243 | + } | 130 | + fi->type = ARMFault_Permission; |
244 | + | 131 | + goto do_fault; |
245 | + return val; | 132 | + } |
246 | +} | 133 | } |
247 | + | 134 | if (ns) { |
248 | +static void exynos4210_rng_write(void *opaque, hwaddr offset, | 135 | /* The NS bit will (as required by the architecture) have no effect if |
249 | + uint64_t val, unsigned size) | 136 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_with_struct(CPUARMState *env, S1Translate *ptw, |
250 | +{ | 137 | if (regime_using_lpae_format(env, mmu_idx)) { |
251 | + Exynos4210RngState *s = (Exynos4210RngState *)opaque; | 138 | return get_phys_addr_lpae(env, ptw, address, access_type, false, |
252 | + | 139 | result, fi); |
253 | + assert(size == 4); | 140 | - } else if (regime_sctlr(env, mmu_idx) & SCTLR_XP) { |
254 | + | 141 | + } else if (arm_feature(env, ARM_FEATURE_V7) || |
255 | + switch (offset) { | 142 | + regime_sctlr(env, mmu_idx) & SCTLR_XP) { |
256 | + case EXYNOS4210_RNG_CONTROL_1: | 143 | return get_phys_addr_v6(env, ptw, address, access_type, result, fi); |
257 | + DPRINTF("RNG_CONTROL_1 = 0x%" PRIx64 "\n", val); | 144 | } else { |
258 | + s->reg_control = val; | 145 | return get_phys_addr_v5(env, ptw, address, access_type, result, fi); |
259 | + exynos4210_rng_run_engine(s); | ||
260 | + break; | ||
261 | + | ||
262 | + case EXYNOS4210_RNG_STATUS: | ||
263 | + /* For clearing status fields */ | ||
264 | + s->reg_status &= ~EXYNOS4210_RNG_STATUS_WRITE_MASK; | ||
265 | + s->reg_status |= val & EXYNOS4210_RNG_STATUS_WRITE_MASK; | ||
266 | + break; | ||
267 | + | ||
268 | + case EXYNOS4210_RNG_SEED_IN_OFFSET(0): | ||
269 | + case EXYNOS4210_RNG_SEED_IN_OFFSET(1): | ||
270 | + case EXYNOS4210_RNG_SEED_IN_OFFSET(2): | ||
271 | + case EXYNOS4210_RNG_SEED_IN_OFFSET(3): | ||
272 | + case EXYNOS4210_RNG_SEED_IN_OFFSET(4): | ||
273 | + exynos4210_rng_set_seed(s, | ||
274 | + (offset - EXYNOS4210_RNG_SEED_IN_OFFSET(0)) / 4, | ||
275 | + val); | ||
276 | + break; | ||
277 | + | ||
278 | + default: | ||
279 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
280 | + "%s: bad write offset 0x%" HWADDR_PRIx "\n", | ||
281 | + __func__, offset); | ||
282 | + } | ||
283 | +} | ||
284 | + | ||
285 | +static const MemoryRegionOps exynos4210_rng_ops = { | ||
286 | + .read = exynos4210_rng_read, | ||
287 | + .write = exynos4210_rng_write, | ||
288 | + .endianness = DEVICE_NATIVE_ENDIAN, | ||
289 | +}; | ||
290 | + | ||
291 | +static void exynos4210_rng_reset(DeviceState *dev) | ||
292 | +{ | ||
293 | + Exynos4210RngState *s = EXYNOS4210_RNG(dev); | ||
294 | + | ||
295 | + s->reg_control = 0; | ||
296 | + s->reg_status = EXYNOS4210_RNG_STATUS_BUFFER_READY; | ||
297 | + memset(s->randr_value, 0, sizeof(s->randr_value)); | ||
298 | + s->seed_set = 0; | ||
299 | +} | ||
300 | + | ||
301 | +static void exynos4210_rng_init(Object *obj) | ||
302 | +{ | ||
303 | + Exynos4210RngState *s = EXYNOS4210_RNG(obj); | ||
304 | + SysBusDevice *dev = SYS_BUS_DEVICE(obj); | ||
305 | + | ||
306 | + memory_region_init_io(&s->iomem, obj, &exynos4210_rng_ops, s, | ||
307 | + TYPE_EXYNOS4210_RNG, EXYNOS4210_RNG_REGS_MEM_SIZE); | ||
308 | + sysbus_init_mmio(dev, &s->iomem); | ||
309 | +} | ||
310 | + | ||
311 | +static const VMStateDescription exynos4210_rng_vmstate = { | ||
312 | + .name = TYPE_EXYNOS4210_RNG, | ||
313 | + .version_id = 1, | ||
314 | + .minimum_version_id = 1, | ||
315 | + .fields = (VMStateField[]) { | ||
316 | + VMSTATE_INT32_ARRAY(randr_value, Exynos4210RngState, | ||
317 | + EXYNOS4210_RNG_PRNG_NUM), | ||
318 | + VMSTATE_UINT32(seed_set, Exynos4210RngState), | ||
319 | + VMSTATE_UINT32(reg_status, Exynos4210RngState), | ||
320 | + VMSTATE_UINT32(reg_control, Exynos4210RngState), | ||
321 | + VMSTATE_END_OF_LIST() | ||
322 | + } | ||
323 | +}; | ||
324 | + | ||
325 | +static void exynos4210_rng_class_init(ObjectClass *klass, void *data) | ||
326 | +{ | ||
327 | + DeviceClass *dc = DEVICE_CLASS(klass); | ||
328 | + | ||
329 | + dc->reset = exynos4210_rng_reset; | ||
330 | + dc->vmsd = &exynos4210_rng_vmstate; | ||
331 | +} | ||
332 | + | ||
333 | +static const TypeInfo exynos4210_rng_info = { | ||
334 | + .name = TYPE_EXYNOS4210_RNG, | ||
335 | + .parent = TYPE_SYS_BUS_DEVICE, | ||
336 | + .instance_size = sizeof(Exynos4210RngState), | ||
337 | + .instance_init = exynos4210_rng_init, | ||
338 | + .class_init = exynos4210_rng_class_init, | ||
339 | +}; | ||
340 | + | ||
341 | +static void exynos4210_rng_register(void) | ||
342 | +{ | ||
343 | + type_register_static(&exynos4210_rng_info); | ||
344 | +} | ||
345 | + | ||
346 | +type_init(exynos4210_rng_register) | ||
347 | -- | 146 | -- |
348 | 2.7.4 | 147 | 2.25.1 |
349 | |||
350 | diff view generated by jsdifflib |
1 | From: Joel Stanley <joel@jms.id.au> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | The ast2400 contains two and the ast2500 contains three watchdogs. | 3 | With odd_ofs set, we weren't copying enough data. |
4 | Add this information to the AspeedSoCInfo and realise the correct number | ||
5 | of watchdogs for that each SoC type. | ||
6 | 4 | ||
7 | Signed-off-by: Joel Stanley <joel@jms.id.au> | 5 | Fixes: 09eb6d7025d1 ("target/arm: Move sve zip high_ofs into simd_data") |
8 | Reviewed-by: Cédric Le Goater <clg@kaod.org> | 6 | Reported-by: Idan Horowitz <idan.horowitz@gmail.com> |
9 | Tested-by: Cédric Le Goater <clg@kaod.org> | 7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
8 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> | ||
9 | Message-id: 20221031054144.3574-1-richard.henderson@linaro.org | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 11 | --- |
12 | include/hw/arm/aspeed_soc.h | 4 +++- | 12 | target/arm/sve_helper.c | 4 ++-- |
13 | hw/arm/aspeed_soc.c | 25 +++++++++++++++++-------- | 13 | 1 file changed, 2 insertions(+), 2 deletions(-) |
14 | 2 files changed, 20 insertions(+), 9 deletions(-) | ||
15 | 14 | ||
16 | diff --git a/include/hw/arm/aspeed_soc.h b/include/hw/arm/aspeed_soc.h | 15 | diff --git a/target/arm/sve_helper.c b/target/arm/sve_helper.c |
17 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/include/hw/arm/aspeed_soc.h | 17 | --- a/target/arm/sve_helper.c |
19 | +++ b/include/hw/arm/aspeed_soc.h | 18 | +++ b/target/arm/sve_helper.c |
20 | @@ -XXX,XX +XXX,XX @@ | 19 | @@ -XXX,XX +XXX,XX @@ void HELPER(NAME)(void *vd, void *vn, void *vm, uint32_t desc) \ |
21 | #include "hw/net/ftgmac100.h" | 20 | /* We produce output faster than we consume input. \ |
22 | 21 | Therefore we must be mindful of possible overlap. */ \ | |
23 | #define ASPEED_SPIS_NUM 2 | 22 | if (unlikely((vn - vd) < (uintptr_t)oprsz)) { \ |
24 | +#define ASPEED_WDTS_NUM 3 | 23 | - vn = memcpy(&tmp_n, vn, oprsz_2); \ |
25 | 24 | + vn = memcpy(&tmp_n, vn, oprsz); \ | |
26 | typedef struct AspeedSoCState { | 25 | } \ |
27 | /*< private >*/ | 26 | if (unlikely((vm - vd) < (uintptr_t)oprsz)) { \ |
28 | @@ -XXX,XX +XXX,XX @@ typedef struct AspeedSoCState { | 27 | - vm = memcpy(&tmp_m, vm, oprsz_2); \ |
29 | AspeedSMCState fmc; | 28 | + vm = memcpy(&tmp_m, vm, oprsz); \ |
30 | AspeedSMCState spi[ASPEED_SPIS_NUM]; | 29 | } \ |
31 | AspeedSDMCState sdmc; | 30 | for (i = 0; i < oprsz_2; i += sizeof(TYPE)) { \ |
32 | - AspeedWDTState wdt; | 31 | *(TYPE *)(vd + H(2 * i + 0)) = *(TYPE *)(vn + odd_ofs + H(i)); \ |
33 | + AspeedWDTState wdt[ASPEED_WDTS_NUM]; | ||
34 | FTGMAC100State ftgmac100; | ||
35 | } AspeedSoCState; | ||
36 | |||
37 | @@ -XXX,XX +XXX,XX @@ typedef struct AspeedSoCInfo { | ||
38 | const hwaddr *spi_bases; | ||
39 | const char *fmc_typename; | ||
40 | const char **spi_typename; | ||
41 | + int wdts_num; | ||
42 | } AspeedSoCInfo; | ||
43 | |||
44 | typedef struct AspeedSoCClass { | ||
45 | diff --git a/hw/arm/aspeed_soc.c b/hw/arm/aspeed_soc.c | ||
46 | index XXXXXXX..XXXXXXX 100644 | ||
47 | --- a/hw/arm/aspeed_soc.c | ||
48 | +++ b/hw/arm/aspeed_soc.c | ||
49 | @@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = { | ||
50 | .spi_bases = aspeed_soc_ast2400_spi_bases, | ||
51 | .fmc_typename = "aspeed.smc.fmc", | ||
52 | .spi_typename = aspeed_soc_ast2400_typenames, | ||
53 | + .wdts_num = 2, | ||
54 | }, { | ||
55 | .name = "ast2400-a1", | ||
56 | .cpu_model = "arm926", | ||
57 | @@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = { | ||
58 | .spi_bases = aspeed_soc_ast2400_spi_bases, | ||
59 | .fmc_typename = "aspeed.smc.fmc", | ||
60 | .spi_typename = aspeed_soc_ast2400_typenames, | ||
61 | + .wdts_num = 2, | ||
62 | }, { | ||
63 | .name = "ast2400", | ||
64 | .cpu_model = "arm926", | ||
65 | @@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = { | ||
66 | .spi_bases = aspeed_soc_ast2400_spi_bases, | ||
67 | .fmc_typename = "aspeed.smc.fmc", | ||
68 | .spi_typename = aspeed_soc_ast2400_typenames, | ||
69 | + .wdts_num = 2, | ||
70 | }, { | ||
71 | .name = "ast2500-a1", | ||
72 | .cpu_model = "arm1176", | ||
73 | @@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = { | ||
74 | .spi_bases = aspeed_soc_ast2500_spi_bases, | ||
75 | .fmc_typename = "aspeed.smc.ast2500-fmc", | ||
76 | .spi_typename = aspeed_soc_ast2500_typenames, | ||
77 | + .wdts_num = 3, | ||
78 | }, | ||
79 | }; | ||
80 | |||
81 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_init(Object *obj) | ||
82 | object_property_add_alias(obj, "ram-size", OBJECT(&s->sdmc), | ||
83 | "ram-size", &error_abort); | ||
84 | |||
85 | - object_initialize(&s->wdt, sizeof(s->wdt), TYPE_ASPEED_WDT); | ||
86 | - object_property_add_child(obj, "wdt", OBJECT(&s->wdt), NULL); | ||
87 | - qdev_set_parent_bus(DEVICE(&s->wdt), sysbus_get_default()); | ||
88 | + for (i = 0; i < sc->info->wdts_num; i++) { | ||
89 | + object_initialize(&s->wdt[i], sizeof(s->wdt[i]), TYPE_ASPEED_WDT); | ||
90 | + object_property_add_child(obj, "wdt[*]", OBJECT(&s->wdt[i]), NULL); | ||
91 | + qdev_set_parent_bus(DEVICE(&s->wdt[i]), sysbus_get_default()); | ||
92 | + } | ||
93 | |||
94 | object_initialize(&s->ftgmac100, sizeof(s->ftgmac100), TYPE_FTGMAC100); | ||
95 | object_property_add_child(obj, "ftgmac100", OBJECT(&s->ftgmac100), NULL); | ||
96 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
97 | sysbus_mmio_map(SYS_BUS_DEVICE(&s->sdmc), 0, ASPEED_SOC_SDMC_BASE); | ||
98 | |||
99 | /* Watch dog */ | ||
100 | - object_property_set_bool(OBJECT(&s->wdt), true, "realized", &err); | ||
101 | - if (err) { | ||
102 | - error_propagate(errp, err); | ||
103 | - return; | ||
104 | + for (i = 0; i < sc->info->wdts_num; i++) { | ||
105 | + object_property_set_bool(OBJECT(&s->wdt[i]), true, "realized", &err); | ||
106 | + if (err) { | ||
107 | + error_propagate(errp, err); | ||
108 | + return; | ||
109 | + } | ||
110 | + sysbus_mmio_map(SYS_BUS_DEVICE(&s->wdt[i]), 0, | ||
111 | + ASPEED_SOC_WDT_BASE + i * 0x20); | ||
112 | } | ||
113 | - sysbus_mmio_map(SYS_BUS_DEVICE(&s->wdt), 0, ASPEED_SOC_WDT_BASE); | ||
114 | |||
115 | /* Net */ | ||
116 | qdev_set_nic_properties(DEVICE(&s->ftgmac100), &nd_table[0]); | ||
117 | -- | 32 | -- |
118 | 2.7.4 | 33 | 2.25.1 |
119 | 34 | ||
120 | 35 | diff view generated by jsdifflib |
1 | For v7M, writes to the CONTROL register are only permitted for | 1 | From: Ake Koomsin <ake@igel.co.jp> |
---|---|---|---|
2 | privileged code. However even if the code is privileged, the | ||
3 | write must not affect the SPSEL bit in the CONTROL register | ||
4 | if the CPU is in Thread mode (as documented in the pseudocode | ||
5 | for the MSR instruction). Implement this, instead of permitting | ||
6 | SPSEL to be written in all cases. | ||
7 | 2 | ||
8 | This was causing mbed applications not to run, because the | 3 | We need to check HCR_E2H and HCR_TGE to select the right MMU index for |
9 | RTX RTOS they use relies on this behaviour. | 4 | the correct translation regime. |
10 | 5 | ||
6 | To check for EL2&0 translation regime: | ||
7 | - For S1E0*, S1E1* and S12E* ops, check both HCR_E2H and HCR_TGE | ||
8 | - For S1E2* ops, check only HCR_E2H | ||
9 | |||
10 | Signed-off-by: Ake Koomsin <ake@igel.co.jp> | ||
11 | Message-id: 20221101064250.12444-1-ake@igel.co.jp | ||
12 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
13 | Message-id: 1498820791-8130-1-git-send-email-peter.maydell@linaro.org | ||
14 | --- | 14 | --- |
15 | target/arm/helper.c | 13 ++++++++++--- | 15 | target/arm/helper.c | 15 +++++++++------ |
16 | 1 file changed, 10 insertions(+), 3 deletions(-) | 16 | 1 file changed, 9 insertions(+), 6 deletions(-) |
17 | 17 | ||
18 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 18 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
19 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
20 | --- a/target/arm/helper.c | 20 | --- a/target/arm/helper.c |
21 | +++ b/target/arm/helper.c | 21 | +++ b/target/arm/helper.c |
22 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_msr)(CPUARMState *env, uint32_t maskreg, uint32_t val) | 22 | @@ -XXX,XX +XXX,XX @@ static void ats_write64(CPUARMState *env, const ARMCPRegInfo *ri, |
23 | MMUAccessType access_type = ri->opc2 & 1 ? MMU_DATA_STORE : MMU_DATA_LOAD; | ||
24 | ARMMMUIdx mmu_idx; | ||
25 | int secure = arm_is_secure_below_el3(env); | ||
26 | + uint64_t hcr_el2 = arm_hcr_el2_eff(env); | ||
27 | + bool regime_e20 = (hcr_el2 & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE); | ||
28 | |||
29 | switch (ri->opc2 & 6) { | ||
30 | case 0: | ||
31 | switch (ri->opc1) { | ||
32 | case 0: /* AT S1E1R, AT S1E1W, AT S1E1RP, AT S1E1WP */ | ||
33 | if (ri->crm == 9 && (env->pstate & PSTATE_PAN)) { | ||
34 | - mmu_idx = ARMMMUIdx_Stage1_E1_PAN; | ||
35 | + mmu_idx = regime_e20 ? | ||
36 | + ARMMMUIdx_E20_2_PAN : ARMMMUIdx_Stage1_E1_PAN; | ||
37 | } else { | ||
38 | - mmu_idx = ARMMMUIdx_Stage1_E1; | ||
39 | + mmu_idx = regime_e20 ? ARMMMUIdx_E20_2 : ARMMMUIdx_Stage1_E1; | ||
40 | } | ||
41 | break; | ||
42 | case 4: /* AT S1E2R, AT S1E2W */ | ||
43 | - mmu_idx = ARMMMUIdx_E2; | ||
44 | + mmu_idx = hcr_el2 & HCR_E2H ? ARMMMUIdx_E20_2 : ARMMMUIdx_E2; | ||
45 | break; | ||
46 | case 6: /* AT S1E3R, AT S1E3W */ | ||
47 | mmu_idx = ARMMMUIdx_E3; | ||
48 | @@ -XXX,XX +XXX,XX @@ static void ats_write64(CPUARMState *env, const ARMCPRegInfo *ri, | ||
23 | } | 49 | } |
24 | break; | 50 | break; |
25 | case 20: /* CONTROL */ | 51 | case 2: /* AT S1E0R, AT S1E0W */ |
26 | - switch_v7m_sp(env, (val & R_V7M_CONTROL_SPSEL_MASK) != 0); | 52 | - mmu_idx = ARMMMUIdx_Stage1_E0; |
27 | - env->v7m.control = val & (R_V7M_CONTROL_SPSEL_MASK | | 53 | + mmu_idx = regime_e20 ? ARMMMUIdx_E20_0 : ARMMMUIdx_Stage1_E0; |
28 | - R_V7M_CONTROL_NPRIV_MASK); | 54 | break; |
29 | + /* Writing to the SPSEL bit only has an effect if we are in | 55 | case 4: /* AT S12E1R, AT S12E1W */ |
30 | + * thread mode; other bits can be updated by any privileged code. | 56 | - mmu_idx = ARMMMUIdx_E10_1; |
31 | + * switch_v7m_sp() deals with updating the SPSEL bit in | 57 | + mmu_idx = regime_e20 ? ARMMMUIdx_E20_2 : ARMMMUIdx_E10_1; |
32 | + * env->v7m.control, so we only need update the others. | 58 | break; |
33 | + */ | 59 | case 6: /* AT S12E0R, AT S12E0W */ |
34 | + if (env->v7m.exception == 0) { | 60 | - mmu_idx = ARMMMUIdx_E10_0; |
35 | + switch_v7m_sp(env, (val & R_V7M_CONTROL_SPSEL_MASK) != 0); | 61 | + mmu_idx = regime_e20 ? ARMMMUIdx_E20_0 : ARMMMUIdx_E10_0; |
36 | + } | ||
37 | + env->v7m.control &= ~R_V7M_CONTROL_NPRIV_MASK; | ||
38 | + env->v7m.control |= val & R_V7M_CONTROL_NPRIV_MASK; | ||
39 | break; | 62 | break; |
40 | default: | 63 | default: |
41 | qemu_log_mask(LOG_GUEST_ERROR, "Attempt to write unknown special" | 64 | g_assert_not_reached(); |
42 | -- | 65 | -- |
43 | 2.7.4 | 66 | 2.25.1 |
44 | |||
45 | diff view generated by jsdifflib |
1 | From: Alexander Graf <agraf@suse.de> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | When running with KVM enabled, you can choose between emulating the | 3 | Reversed the sense of non-secure in get_phys_addr_lpae, |
4 | gic in kernel or user space. If the kernel supports in-kernel virtualization | 4 | and failed to initialize attrs.secure for ARMMMUIdx_Phys_S. |
5 | of the interrupt controller, it will default to that. If not, if will | ||
6 | default to user space emulation. | ||
7 | 5 | ||
8 | Unfortunately when running in user mode gic emulation, we miss out on | 6 | Fixes: 48da29e4 ("target/arm: Add ptw_idx to S1Translate") |
9 | interrupt events which are only available from kernel space, such as the timer. | 7 | Resolves: https://gitlab.com/qemu-project/qemu/-/issues/1293 |
10 | This patch leverages the new kernel/user space pending line synchronization for | 8 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
11 | timer events. It does not handle PMU events yet. | 9 | Tested-by: Philippe Mathieu-Daudé <philmd@linaro.org> |
12 | 10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | |
13 | Signed-off-by: Alexander Graf <agraf@suse.de> | ||
14 | Reviewed-by: Andrew Jones <drjones@redhat.com> | ||
15 | Message-id: 1498577737-130264-1-git-send-email-agraf@suse.de | ||
16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
17 | --- | 12 | --- |
18 | include/sysemu/kvm.h | 11 +++++++++++ | 13 | target/arm/ptw.c | 15 ++++++++------- |
19 | target/arm/cpu.h | 3 +++ | 14 | 1 file changed, 8 insertions(+), 7 deletions(-) |
20 | accel/kvm/kvm-all.c | 5 +++++ | ||
21 | accel/stubs/kvm-stub.c | 5 +++++ | ||
22 | hw/intc/arm_gic.c | 7 +++++++ | ||
23 | target/arm/kvm.c | 51 ++++++++++++++++++++++++++++++++++++++++++++++++++ | ||
24 | 6 files changed, 82 insertions(+) | ||
25 | 15 | ||
26 | diff --git a/include/sysemu/kvm.h b/include/sysemu/kvm.h | 16 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c |
27 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
28 | --- a/include/sysemu/kvm.h | 18 | --- a/target/arm/ptw.c |
29 | +++ b/include/sysemu/kvm.h | 19 | +++ b/target/arm/ptw.c |
30 | @@ -XXX,XX +XXX,XX @@ int kvm_init_vcpu(CPUState *cpu); | 20 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw, |
31 | int kvm_cpu_exec(CPUState *cpu); | 21 | descaddr |= (address >> (stride * (4 - level))) & indexmask; |
32 | int kvm_destroy_vcpu(CPUState *cpu); | 22 | descaddr &= ~7ULL; |
33 | 23 | nstable = extract32(tableattrs, 4, 1); | |
34 | +/** | 24 | - if (!nstable) { |
35 | + * kvm_arm_supports_user_irq | 25 | + if (nstable) { |
36 | + * | 26 | /* |
37 | + * Not all KVM implementations support notifications for kernel generated | 27 | * Stage2_S -> Stage2 or Phys_S -> Phys_NS |
38 | + * interrupt events to user space. This function indicates whether the current | 28 | * Assert that the non-secure idx are even, and relative order. |
39 | + * KVM implementation does support them. | 29 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_with_struct(CPUARMState *env, S1Translate *ptw, |
40 | + * | 30 | bool is_secure = ptw->in_secure; |
41 | + * Returns: true if KVM supports using kernel generated IRQs from user space | 31 | ARMMMUIdx s1_mmu_idx; |
42 | + */ | 32 | |
43 | +bool kvm_arm_supports_user_irq(void); | 33 | + /* |
34 | + * The page table entries may downgrade secure to non-secure, but | ||
35 | + * cannot upgrade an non-secure translation regime's attributes | ||
36 | + * to secure. | ||
37 | + */ | ||
38 | + result->f.attrs.secure = is_secure; | ||
44 | + | 39 | + |
45 | #ifdef NEED_CPU_H | 40 | switch (mmu_idx) { |
46 | #include "cpu.h" | 41 | case ARMMMUIdx_Phys_S: |
47 | 42 | case ARMMMUIdx_Phys_NS: | |
48 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 43 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_with_struct(CPUARMState *env, S1Translate *ptw, |
49 | index XXXXXXX..XXXXXXX 100644 | 44 | break; |
50 | --- a/target/arm/cpu.h | ||
51 | +++ b/target/arm/cpu.h | ||
52 | @@ -XXX,XX +XXX,XX @@ struct ARMCPU { | ||
53 | void *el_change_hook_opaque; | ||
54 | |||
55 | int32_t node_id; /* NUMA node this CPU belongs to */ | ||
56 | + | ||
57 | + /* Used to synchronize KVM and QEMU in-kernel device levels */ | ||
58 | + uint8_t device_irq_level; | ||
59 | }; | ||
60 | |||
61 | static inline ARMCPU *arm_env_get_cpu(CPUARMState *env) | ||
62 | diff --git a/accel/kvm/kvm-all.c b/accel/kvm/kvm-all.c | ||
63 | index XXXXXXX..XXXXXXX 100644 | ||
64 | --- a/accel/kvm/kvm-all.c | ||
65 | +++ b/accel/kvm/kvm-all.c | ||
66 | @@ -XXX,XX +XXX,XX @@ int kvm_has_intx_set_mask(void) | ||
67 | return kvm_state->intx_set_mask; | ||
68 | } | ||
69 | |||
70 | +bool kvm_arm_supports_user_irq(void) | ||
71 | +{ | ||
72 | + return kvm_check_extension(kvm_state, KVM_CAP_ARM_USER_IRQ); | ||
73 | +} | ||
74 | + | ||
75 | #ifdef KVM_CAP_SET_GUEST_DEBUG | ||
76 | struct kvm_sw_breakpoint *kvm_find_sw_breakpoint(CPUState *cpu, | ||
77 | target_ulong pc) | ||
78 | diff --git a/accel/stubs/kvm-stub.c b/accel/stubs/kvm-stub.c | ||
79 | index XXXXXXX..XXXXXXX 100644 | ||
80 | --- a/accel/stubs/kvm-stub.c | ||
81 | +++ b/accel/stubs/kvm-stub.c | ||
82 | @@ -XXX,XX +XXX,XX @@ void kvm_init_cpu_signals(CPUState *cpu) | ||
83 | { | ||
84 | abort(); | ||
85 | } | ||
86 | + | ||
87 | +bool kvm_arm_supports_user_irq(void) | ||
88 | +{ | ||
89 | + return false; | ||
90 | +} | ||
91 | #endif | ||
92 | diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c | ||
93 | index XXXXXXX..XXXXXXX 100644 | ||
94 | --- a/hw/intc/arm_gic.c | ||
95 | +++ b/hw/intc/arm_gic.c | ||
96 | @@ -XXX,XX +XXX,XX @@ | ||
97 | #include "qom/cpu.h" | ||
98 | #include "qemu/log.h" | ||
99 | #include "trace.h" | ||
100 | +#include "sysemu/kvm.h" | ||
101 | |||
102 | /* #define DEBUG_GIC */ | ||
103 | |||
104 | @@ -XXX,XX +XXX,XX @@ static void arm_gic_realize(DeviceState *dev, Error **errp) | ||
105 | return; | ||
106 | } | 45 | } |
107 | 46 | ||
108 | + if (kvm_enabled() && !kvm_arm_supports_user_irq()) { | 47 | - /* |
109 | + error_setg(errp, "KVM with user space irqchip only works when the " | 48 | - * The page table entries may downgrade secure to non-secure, but |
110 | + "host kernel supports KVM_CAP_ARM_USER_IRQ"); | 49 | - * cannot upgrade an non-secure translation regime's attributes |
111 | + return; | 50 | - * to secure. |
112 | + } | 51 | - */ |
113 | + | 52 | - result->f.attrs.secure = is_secure; |
114 | /* This creates distributor and main CPU interface (s->cpuiomem[0]) */ | 53 | result->f.attrs.user = regime_is_user(env, mmu_idx); |
115 | gic_init_irqs_and_mmio(s, gic_set_irq, gic_ops); | 54 | |
116 | 55 | /* | |
117 | diff --git a/target/arm/kvm.c b/target/arm/kvm.c | ||
118 | index XXXXXXX..XXXXXXX 100644 | ||
119 | --- a/target/arm/kvm.c | ||
120 | +++ b/target/arm/kvm.c | ||
121 | @@ -XXX,XX +XXX,XX @@ int kvm_arch_init(MachineState *ms, KVMState *s) | ||
122 | */ | ||
123 | kvm_async_interrupts_allowed = true; | ||
124 | |||
125 | + /* | ||
126 | + * PSCI wakes up secondary cores, so we always need to | ||
127 | + * have vCPUs waiting in kernel space | ||
128 | + */ | ||
129 | + kvm_halt_in_kernel_allowed = true; | ||
130 | + | ||
131 | cap_has_mp_state = kvm_check_extension(s, KVM_CAP_MP_STATE); | ||
132 | |||
133 | type_register_static(&host_arm_cpu_type_info); | ||
134 | @@ -XXX,XX +XXX,XX @@ void kvm_arch_pre_run(CPUState *cs, struct kvm_run *run) | ||
135 | |||
136 | MemTxAttrs kvm_arch_post_run(CPUState *cs, struct kvm_run *run) | ||
137 | { | ||
138 | + ARMCPU *cpu; | ||
139 | + uint32_t switched_level; | ||
140 | + | ||
141 | + if (kvm_irqchip_in_kernel()) { | ||
142 | + /* | ||
143 | + * We only need to sync timer states with user-space interrupt | ||
144 | + * controllers, so return early and save cycles if we don't. | ||
145 | + */ | ||
146 | + return MEMTXATTRS_UNSPECIFIED; | ||
147 | + } | ||
148 | + | ||
149 | + cpu = ARM_CPU(cs); | ||
150 | + | ||
151 | + /* Synchronize our shadowed in-kernel device irq lines with the kvm ones */ | ||
152 | + if (run->s.regs.device_irq_level != cpu->device_irq_level) { | ||
153 | + switched_level = cpu->device_irq_level ^ run->s.regs.device_irq_level; | ||
154 | + | ||
155 | + qemu_mutex_lock_iothread(); | ||
156 | + | ||
157 | + if (switched_level & KVM_ARM_DEV_EL1_VTIMER) { | ||
158 | + qemu_set_irq(cpu->gt_timer_outputs[GTIMER_VIRT], | ||
159 | + !!(run->s.regs.device_irq_level & | ||
160 | + KVM_ARM_DEV_EL1_VTIMER)); | ||
161 | + switched_level &= ~KVM_ARM_DEV_EL1_VTIMER; | ||
162 | + } | ||
163 | + | ||
164 | + if (switched_level & KVM_ARM_DEV_EL1_PTIMER) { | ||
165 | + qemu_set_irq(cpu->gt_timer_outputs[GTIMER_PHYS], | ||
166 | + !!(run->s.regs.device_irq_level & | ||
167 | + KVM_ARM_DEV_EL1_PTIMER)); | ||
168 | + switched_level &= ~KVM_ARM_DEV_EL1_PTIMER; | ||
169 | + } | ||
170 | + | ||
171 | + /* XXX PMU IRQ is missing */ | ||
172 | + | ||
173 | + if (switched_level) { | ||
174 | + qemu_log_mask(LOG_UNIMP, "%s: unhandled in-kernel device IRQ %x\n", | ||
175 | + __func__, switched_level); | ||
176 | + } | ||
177 | + | ||
178 | + /* We also mark unknown levels as processed to not waste cycles */ | ||
179 | + cpu->device_irq_level = run->s.regs.device_irq_level; | ||
180 | + qemu_mutex_unlock_iothread(); | ||
181 | + } | ||
182 | + | ||
183 | return MEMTXATTRS_UNSPECIFIED; | ||
184 | } | ||
185 | |||
186 | -- | 56 | -- |
187 | 2.7.4 | 57 | 2.25.1 |
188 | 58 | ||
189 | 59 | diff view generated by jsdifflib |