1
A surprisingly short target-arm queue, but no point in holding
1
Hi; this pull request has a collection of bug fixes for rc0.
2
onto these waiting for more code to arrive :-)
2
The big one is the trusted firmware boot regression fix.
3
3
4
thanks
4
thanks
5
-- PMM
5
-- PMM
6
6
7
The following changes since commit 3d0bf8dfdfebd7f2ae41b6f220444b8047d6b1ee:
7
The following changes since commit ece5f8374d0416a339f0c0a9399faa2c42d4ad6f:
8
8
9
Merge remote-tracking branch 'remotes/dgilbert/tags/pull-migration-20170710a' into staging (2017-07-10 18:13:03 +0100)
9
Merge tag 'linux-user-for-7.2-pull-request' of https://gitlab.com/laurent_vivier/qemu into staging (2022-11-03 10:55:05 -0400)
10
10
11
are available in the git repository at:
11
are available in the Git repository at:
12
12
13
git://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20170711
13
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20221104
14
14
15
for you to fetch changes up to 792dac309c8660306557ba058b8b5a6a75ab3c1f:
15
for you to fetch changes up to cead7fa4c06087c86c67c5ce815cc1ff0bfeac3a:
16
16
17
target-arm: v7M: ignore writes to CONTROL.SPSEL from Thread mode (2017-07-11 11:21:26 +0100)
17
target/arm: Two fixes for secure ptw (2022-11-04 10:58:58 +0000)
18
18
19
----------------------------------------------------------------
19
----------------------------------------------------------------
20
target-arm queue:
20
target-arm queue:
21
* v7M: ignore writes to CONTROL.SPSEL from Thread mode
21
* Fix regression booting Trusted Firmware
22
* KVM: Enable in-kernel timers with user space gic
22
* Honor HCR_E2H and HCR_TGE in ats_write64()
23
* aspeed: Register all watchdogs
23
* Copy the entire vector in DO_ZIP
24
* hw/misc: Add Exynos4210 Pseudo Random Number Generator
24
* Fix Privileged Access Never (PAN) for aarch32
25
* Make TLBIOS and TLBIRANGE ops trap on HCR_EL2.TTLB
26
* Set SCR_EL3.HXEn when direct booting kernel
27
* Set SME and SVE EL3 vector lengths when direct booting kernel
25
28
26
----------------------------------------------------------------
29
----------------------------------------------------------------
27
Alexander Graf (1):
30
Ake Koomsin (1):
28
ARM: KVM: Enable in-kernel timers with user space gic
31
target/arm: Honor HCR_E2H and HCR_TGE in ats_write64()
29
32
30
Joel Stanley (1):
33
Peter Maydell (3):
31
aspeed: Register all watchdogs
34
hw/arm/boot: Set SME and SVE EL3 vector lengths when booting kernel
35
hw/arm/boot: Set SCR_EL3.HXEn when booting kernel
36
target/arm: Make TLBIOS and TLBIRANGE ops trap on HCR_EL2.TTLB
32
37
33
Krzysztof Kozlowski (1):
38
Richard Henderson (2):
34
hw/misc: Add Exynos4210 Pseudo Random Number Generator
39
target/arm: Copy the entire vector in DO_ZIP
40
target/arm: Two fixes for secure ptw
35
41
36
Peter Maydell (1):
42
Timofey Kutergin (1):
37
target-arm: v7M: ignore writes to CONTROL.SPSEL from Thread mode
43
target/arm: Fix Privileged Access Never (PAN) for aarch32
38
44
39
hw/misc/Makefile.objs | 2 +-
45
hw/arm/boot.c | 5 ++++
40
include/hw/arm/aspeed_soc.h | 4 +-
46
target/arm/helper.c | 64 +++++++++++++++++++++++++++++--------------------
41
include/sysemu/kvm.h | 11 ++
47
target/arm/ptw.c | 50 ++++++++++++++++++++++++++++----------
42
target/arm/cpu.h | 3 +
48
target/arm/sve_helper.c | 4 ++--
43
accel/kvm/kvm-all.c | 5 +
49
4 files changed, 83 insertions(+), 40 deletions(-)
44
accel/stubs/kvm-stub.c | 5 +
45
hw/arm/aspeed_soc.c | 25 ++--
46
hw/arm/exynos4210.c | 4 +
47
hw/intc/arm_gic.c | 7 ++
48
hw/misc/exynos4210_rng.c | 277 ++++++++++++++++++++++++++++++++++++++++++++
49
target/arm/helper.c | 13 ++-
50
target/arm/kvm.c | 51 ++++++++
51
12 files changed, 394 insertions(+), 13 deletions(-)
52
create mode 100644 hw/misc/exynos4210_rng.c
53
diff view generated by jsdifflib
New patch
1
When we direct boot a kernel on a CPU which emulates EL3, we need
2
to set up the EL3 system registers as the Linux kernel documentation
3
specifies:
4
https://www.kernel.org/doc/Documentation/arm64/booting.rst
1
5
6
For SVE and SME this includes:
7
- ZCR_EL3.LEN must be initialised to the same value for all CPUs the
8
kernel is executed on.
9
- SMCR_EL3.LEN must be initialised to the same value for all CPUs the
10
kernel will execute on.
11
12
Although we are technically compliant with this, the "same value" we
13
currently use by default is the reset value of 0. This will end up
14
forcing the guest kernel's SVE and SME vector length to be only the
15
smallest supported length.
16
17
Initialize the vector length fields to their maximum possible value,
18
which is 0xf. If the implementation doesn't actually support that
19
vector length then the effective vector length will be constrained
20
down to the maximum supported value at point of use.
21
22
This allows the guest to use all the vector lengths the emulated CPU
23
supports (by programming the _EL2 and _EL1 versions of these
24
registers.)
25
26
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
27
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
28
Message-id: 20221027140207.413084-2-peter.maydell@linaro.org
29
---
30
hw/arm/boot.c | 2 ++
31
1 file changed, 2 insertions(+)
32
33
diff --git a/hw/arm/boot.c b/hw/arm/boot.c
34
index XXXXXXX..XXXXXXX 100644
35
--- a/hw/arm/boot.c
36
+++ b/hw/arm/boot.c
37
@@ -XXX,XX +XXX,XX @@ static void do_cpu_reset(void *opaque)
38
}
39
if (cpu_isar_feature(aa64_sve, cpu)) {
40
env->cp15.cptr_el[3] |= R_CPTR_EL3_EZ_MASK;
41
+ env->vfp.zcr_el[3] = 0xf;
42
}
43
if (cpu_isar_feature(aa64_sme, cpu)) {
44
env->cp15.cptr_el[3] |= R_CPTR_EL3_ESM_MASK;
45
env->cp15.scr_el3 |= SCR_ENTP2;
46
+ env->vfp.smcr_el[3] = 0xf;
47
}
48
/* AArch64 kernels never boot in secure mode */
49
assert(!info->secure_boot);
50
--
51
2.25.1
diff view generated by jsdifflib
New patch
1
When we direct boot a kernel on a CPU which emulates EL3, we need to
2
set up the EL3 system registers as the Linux kernel documentation
3
specifies:
4
https://www.kernel.org/doc/Documentation/arm64/booting.rst
1
5
6
For CPUs with FEAT_HCX support this includes:
7
- SCR_EL3.HXEn (bit 38) must be initialised to 0b1.
8
9
but we forgot to do this when implementing FEAT_HCX, which would mean
10
that a guest trying to access the HCRX_EL2 register would crash.
11
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
14
Message-id: 20221027140207.413084-3-peter.maydell@linaro.org
15
---
16
hw/arm/boot.c | 3 +++
17
1 file changed, 3 insertions(+)
18
19
diff --git a/hw/arm/boot.c b/hw/arm/boot.c
20
index XXXXXXX..XXXXXXX 100644
21
--- a/hw/arm/boot.c
22
+++ b/hw/arm/boot.c
23
@@ -XXX,XX +XXX,XX @@ static void do_cpu_reset(void *opaque)
24
env->cp15.scr_el3 |= SCR_ENTP2;
25
env->vfp.smcr_el[3] = 0xf;
26
}
27
+ if (cpu_isar_feature(aa64_hcx, cpu)) {
28
+ env->cp15.scr_el3 |= SCR_HXEN;
29
+ }
30
/* AArch64 kernels never boot in secure mode */
31
assert(!info->secure_boot);
32
/* This hook is only supported for AArch32 currently:
33
--
34
2.25.1
diff view generated by jsdifflib
New patch
1
The HCR_EL2.TTLB bit is supposed to trap all EL1 execution of TLB
2
maintenance instructions. However we have added new TLB insns for
3
FEAT_TLBIOS and FEAT_TLBIRANGE, and forgot to set their accessfn to
4
access_ttlb. Add the missing accessfns.
1
5
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
8
---
9
target/arm/helper.c | 36 ++++++++++++++++++------------------
10
1 file changed, 18 insertions(+), 18 deletions(-)
11
12
diff --git a/target/arm/helper.c b/target/arm/helper.c
13
index XXXXXXX..XXXXXXX 100644
14
--- a/target/arm/helper.c
15
+++ b/target/arm/helper.c
16
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo pauth_reginfo[] = {
17
static const ARMCPRegInfo tlbirange_reginfo[] = {
18
{ .name = "TLBI_RVAE1IS", .state = ARM_CP_STATE_AA64,
19
.opc0 = 1, .opc1 = 0, .crn = 8, .crm = 2, .opc2 = 1,
20
- .access = PL1_W, .type = ARM_CP_NO_RAW,
21
+ .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW,
22
.writefn = tlbi_aa64_rvae1is_write },
23
{ .name = "TLBI_RVAAE1IS", .state = ARM_CP_STATE_AA64,
24
.opc0 = 1, .opc1 = 0, .crn = 8, .crm = 2, .opc2 = 3,
25
- .access = PL1_W, .type = ARM_CP_NO_RAW,
26
+ .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW,
27
.writefn = tlbi_aa64_rvae1is_write },
28
{ .name = "TLBI_RVALE1IS", .state = ARM_CP_STATE_AA64,
29
.opc0 = 1, .opc1 = 0, .crn = 8, .crm = 2, .opc2 = 5,
30
- .access = PL1_W, .type = ARM_CP_NO_RAW,
31
+ .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW,
32
.writefn = tlbi_aa64_rvae1is_write },
33
{ .name = "TLBI_RVAALE1IS", .state = ARM_CP_STATE_AA64,
34
.opc0 = 1, .opc1 = 0, .crn = 8, .crm = 2, .opc2 = 7,
35
- .access = PL1_W, .type = ARM_CP_NO_RAW,
36
+ .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW,
37
.writefn = tlbi_aa64_rvae1is_write },
38
{ .name = "TLBI_RVAE1OS", .state = ARM_CP_STATE_AA64,
39
.opc0 = 1, .opc1 = 0, .crn = 8, .crm = 5, .opc2 = 1,
40
- .access = PL1_W, .type = ARM_CP_NO_RAW,
41
+ .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW,
42
.writefn = tlbi_aa64_rvae1is_write },
43
{ .name = "TLBI_RVAAE1OS", .state = ARM_CP_STATE_AA64,
44
.opc0 = 1, .opc1 = 0, .crn = 8, .crm = 5, .opc2 = 3,
45
- .access = PL1_W, .type = ARM_CP_NO_RAW,
46
+ .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW,
47
.writefn = tlbi_aa64_rvae1is_write },
48
{ .name = "TLBI_RVALE1OS", .state = ARM_CP_STATE_AA64,
49
.opc0 = 1, .opc1 = 0, .crn = 8, .crm = 5, .opc2 = 5,
50
- .access = PL1_W, .type = ARM_CP_NO_RAW,
51
+ .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW,
52
.writefn = tlbi_aa64_rvae1is_write },
53
{ .name = "TLBI_RVAALE1OS", .state = ARM_CP_STATE_AA64,
54
.opc0 = 1, .opc1 = 0, .crn = 8, .crm = 5, .opc2 = 7,
55
- .access = PL1_W, .type = ARM_CP_NO_RAW,
56
+ .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW,
57
.writefn = tlbi_aa64_rvae1is_write },
58
{ .name = "TLBI_RVAE1", .state = ARM_CP_STATE_AA64,
59
.opc0 = 1, .opc1 = 0, .crn = 8, .crm = 6, .opc2 = 1,
60
- .access = PL1_W, .type = ARM_CP_NO_RAW,
61
+ .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW,
62
.writefn = tlbi_aa64_rvae1_write },
63
{ .name = "TLBI_RVAAE1", .state = ARM_CP_STATE_AA64,
64
.opc0 = 1, .opc1 = 0, .crn = 8, .crm = 6, .opc2 = 3,
65
- .access = PL1_W, .type = ARM_CP_NO_RAW,
66
+ .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW,
67
.writefn = tlbi_aa64_rvae1_write },
68
{ .name = "TLBI_RVALE1", .state = ARM_CP_STATE_AA64,
69
.opc0 = 1, .opc1 = 0, .crn = 8, .crm = 6, .opc2 = 5,
70
- .access = PL1_W, .type = ARM_CP_NO_RAW,
71
+ .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW,
72
.writefn = tlbi_aa64_rvae1_write },
73
{ .name = "TLBI_RVAALE1", .state = ARM_CP_STATE_AA64,
74
.opc0 = 1, .opc1 = 0, .crn = 8, .crm = 6, .opc2 = 7,
75
- .access = PL1_W, .type = ARM_CP_NO_RAW,
76
+ .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW,
77
.writefn = tlbi_aa64_rvae1_write },
78
{ .name = "TLBI_RIPAS2E1IS", .state = ARM_CP_STATE_AA64,
79
.opc0 = 1, .opc1 = 4, .crn = 8, .crm = 0, .opc2 = 2,
80
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo tlbirange_reginfo[] = {
81
static const ARMCPRegInfo tlbios_reginfo[] = {
82
{ .name = "TLBI_VMALLE1OS", .state = ARM_CP_STATE_AA64,
83
.opc0 = 1, .opc1 = 0, .crn = 8, .crm = 1, .opc2 = 0,
84
- .access = PL1_W, .type = ARM_CP_NO_RAW,
85
+ .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW,
86
.writefn = tlbi_aa64_vmalle1is_write },
87
{ .name = "TLBI_VAE1OS", .state = ARM_CP_STATE_AA64,
88
.opc0 = 1, .opc1 = 0, .crn = 8, .crm = 1, .opc2 = 1,
89
- .access = PL1_W, .type = ARM_CP_NO_RAW,
90
+ .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW,
91
.writefn = tlbi_aa64_vae1is_write },
92
{ .name = "TLBI_ASIDE1OS", .state = ARM_CP_STATE_AA64,
93
.opc0 = 1, .opc1 = 0, .crn = 8, .crm = 1, .opc2 = 2,
94
- .access = PL1_W, .type = ARM_CP_NO_RAW,
95
+ .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW,
96
.writefn = tlbi_aa64_vmalle1is_write },
97
{ .name = "TLBI_VAAE1OS", .state = ARM_CP_STATE_AA64,
98
.opc0 = 1, .opc1 = 0, .crn = 8, .crm = 1, .opc2 = 3,
99
- .access = PL1_W, .type = ARM_CP_NO_RAW,
100
+ .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW,
101
.writefn = tlbi_aa64_vae1is_write },
102
{ .name = "TLBI_VALE1OS", .state = ARM_CP_STATE_AA64,
103
.opc0 = 1, .opc1 = 0, .crn = 8, .crm = 1, .opc2 = 5,
104
- .access = PL1_W, .type = ARM_CP_NO_RAW,
105
+ .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW,
106
.writefn = tlbi_aa64_vae1is_write },
107
{ .name = "TLBI_VAALE1OS", .state = ARM_CP_STATE_AA64,
108
.opc0 = 1, .opc1 = 0, .crn = 8, .crm = 1, .opc2 = 7,
109
- .access = PL1_W, .type = ARM_CP_NO_RAW,
110
+ .access = PL1_W, .accessfn = access_ttlb, .type = ARM_CP_NO_RAW,
111
.writefn = tlbi_aa64_vae1is_write },
112
{ .name = "TLBI_ALLE2OS", .state = ARM_CP_STATE_AA64,
113
.opc0 = 1, .opc1 = 4, .crn = 8, .crm = 1, .opc2 = 0,
114
--
115
2.25.1
diff view generated by jsdifflib
1
From: Krzysztof Kozlowski <krzk@kernel.org>
1
From: Timofey Kutergin <tkutergin@gmail.com>
2
2
3
Add emulation for Exynos4210 Pseudo Random Number Generator which could
3
When we implemented the PAN support we theoretically wanted
4
work on fixed seeds or with seeds provided by True Random Number
4
to support it for both AArch32 and AArch64, but in practice
5
Generator block inside the SoC.
5
several bugs made it essentially unusable with an AArch32
6
guest. Fix all those problems:
6
7
7
Implement only the fixed seeds part of it in polling mode (no
8
- Use CPSR.PAN to check for PAN state in aarch32 mode
8
interrupts).
9
- throw permission fault during address translation when PAN is
10
enabled and kernel tries to access user acessible page
11
- ignore SCTLR_XP bit for armv7 and armv8 (conflicts with SCTLR_SPAN).
9
12
10
Emulation tested with two independent Linux kernel exynos-rng drivers:
13
Signed-off-by: Timofey Kutergin <tkutergin@gmail.com>
11
1. New kcapi-rng interface (targeting Linux v4.12),
12
2. Old hwrng inteface
13
# echo "exynos" > /sys/class/misc/hw_random/rng_current
14
# dd if=/dev/hwrng of=/dev/null bs=1 count=16
15
16
Signed-off-by: Krzysztof Kozlowski <krzk@kernel.org>
17
Message-id: 20170425180609.11004-1-krzk@kernel.org
18
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
14
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
19
[PMM: wrapped a few overlong lines; more efficient implementation
15
Message-id: 20221027112619.2205229-1-tkutergin@gmail.com
20
of exynos4210_rng_seed_ready()]
16
[PMM: tweak commit message]
21
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
22
---
18
---
23
hw/misc/Makefile.objs | 2 +-
19
target/arm/helper.c | 13 +++++++++++--
24
hw/arm/exynos4210.c | 4 +
20
target/arm/ptw.c | 35 ++++++++++++++++++++++++++++++-----
25
hw/misc/exynos4210_rng.c | 277 +++++++++++++++++++++++++++++++++++++++++++++++
21
2 files changed, 41 insertions(+), 7 deletions(-)
26
3 files changed, 282 insertions(+), 1 deletion(-)
27
create mode 100644 hw/misc/exynos4210_rng.c
28
22
29
diff --git a/hw/misc/Makefile.objs b/hw/misc/Makefile.objs
23
diff --git a/target/arm/helper.c b/target/arm/helper.c
30
index XXXXXXX..XXXXXXX 100644
24
index XXXXXXX..XXXXXXX 100644
31
--- a/hw/misc/Makefile.objs
25
--- a/target/arm/helper.c
32
+++ b/hw/misc/Makefile.objs
26
+++ b/target/arm/helper.c
33
@@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_IVSHMEM) += ivshmem.o
27
@@ -XXX,XX +XXX,XX @@ ARMMMUIdx arm_v7m_mmu_idx_for_secstate(CPUARMState *env, bool secstate)
34
obj-$(CONFIG_REALVIEW) += arm_sysctl.o
28
}
35
obj-$(CONFIG_NSERIES) += cbus.o
29
#endif
36
obj-$(CONFIG_ECCMEMCTL) += eccmemctl.o
30
37
-obj-$(CONFIG_EXYNOS4) += exynos4210_pmu.o exynos4210_clk.o
31
+static bool arm_pan_enabled(CPUARMState *env)
38
+obj-$(CONFIG_EXYNOS4) += exynos4210_pmu.o exynos4210_clk.o exynos4210_rng.o
39
obj-$(CONFIG_IMX) += imx_ccm.o
40
obj-$(CONFIG_IMX) += imx31_ccm.o
41
obj-$(CONFIG_IMX) += imx25_ccm.o
42
diff --git a/hw/arm/exynos4210.c b/hw/arm/exynos4210.c
43
index XXXXXXX..XXXXXXX 100644
44
--- a/hw/arm/exynos4210.c
45
+++ b/hw/arm/exynos4210.c
46
@@ -XXX,XX +XXX,XX @@
47
/* Clock controller SFR base address */
48
#define EXYNOS4210_CLK_BASE_ADDR 0x10030000
49
50
+/* PRNG/HASH SFR base address */
51
+#define EXYNOS4210_RNG_BASE_ADDR 0x10830400
52
+
53
/* Display controllers (FIMD) */
54
#define EXYNOS4210_FIMD0_BASE_ADDR 0x11C00000
55
56
@@ -XXX,XX +XXX,XX @@ Exynos4210State *exynos4210_init(MemoryRegion *system_mem)
57
sysbus_create_simple("exynos4210.pmu", EXYNOS4210_PMU_BASE_ADDR, NULL);
58
59
sysbus_create_simple("exynos4210.clk", EXYNOS4210_CLK_BASE_ADDR, NULL);
60
+ sysbus_create_simple("exynos4210.rng", EXYNOS4210_RNG_BASE_ADDR, NULL);
61
62
/* PWM */
63
sysbus_create_varargs("exynos4210.pwm", EXYNOS4210_PWM_BASE_ADDR,
64
diff --git a/hw/misc/exynos4210_rng.c b/hw/misc/exynos4210_rng.c
65
new file mode 100644
66
index XXXXXXX..XXXXXXX
67
--- /dev/null
68
+++ b/hw/misc/exynos4210_rng.c
69
@@ -XXX,XX +XXX,XX @@
70
+/*
71
+ * Exynos4210 Pseudo Random Nubmer Generator Emulation
72
+ *
73
+ * Copyright (c) 2017 Krzysztof Kozlowski <krzk@kernel.org>
74
+ *
75
+ * This program is free software; you can redistribute it and/or modify it
76
+ * under the terms of the GNU General Public License as published by the
77
+ * Free Software Foundation; either version 2 of the License, or
78
+ * (at your option) any later version.
79
+ *
80
+ * This program is distributed in the hope that it will be useful, but WITHOUT
81
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
82
+ * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
83
+ * for more details.
84
+ *
85
+ * You should have received a copy of the GNU General Public License along
86
+ * with this program; if not, see <http://www.gnu.org/licenses/>.
87
+ */
88
+
89
+#include "qemu/osdep.h"
90
+#include "crypto/random.h"
91
+#include "hw/sysbus.h"
92
+#include "qemu/log.h"
93
+
94
+#define DEBUG_EXYNOS_RNG 0
95
+
96
+#define DPRINTF(fmt, ...) \
97
+ do { \
98
+ if (DEBUG_EXYNOS_RNG) { \
99
+ printf("exynos4210_rng: " fmt, ## __VA_ARGS__); \
100
+ } \
101
+ } while (0)
102
+
103
+#define TYPE_EXYNOS4210_RNG "exynos4210.rng"
104
+#define EXYNOS4210_RNG(obj) \
105
+ OBJECT_CHECK(Exynos4210RngState, (obj), TYPE_EXYNOS4210_RNG)
106
+
107
+/*
108
+ * Exynos4220, PRNG, only polling mode is supported.
109
+ */
110
+
111
+/* RNG_CONTROL_1 register bitfields, reset value: 0x0 */
112
+#define EXYNOS4210_RNG_CONTROL_1_PRNG 0x8
113
+#define EXYNOS4210_RNG_CONTROL_1_START_INIT BIT(4)
114
+/* RNG_STATUS register bitfields, reset value: 0x1 */
115
+#define EXYNOS4210_RNG_STATUS_PRNG_ERROR BIT(7)
116
+#define EXYNOS4210_RNG_STATUS_PRNG_DONE BIT(5)
117
+#define EXYNOS4210_RNG_STATUS_MSG_DONE BIT(4)
118
+#define EXYNOS4210_RNG_STATUS_PARTIAL_DONE BIT(3)
119
+#define EXYNOS4210_RNG_STATUS_PRNG_BUSY BIT(2)
120
+#define EXYNOS4210_RNG_STATUS_SEED_SETTING_DONE BIT(1)
121
+#define EXYNOS4210_RNG_STATUS_BUFFER_READY BIT(0)
122
+#define EXYNOS4210_RNG_STATUS_WRITE_MASK (EXYNOS4210_RNG_STATUS_PRNG_DONE \
123
+ | EXYNOS4210_RNG_STATUS_MSG_DONE \
124
+ | EXYNOS4210_RNG_STATUS_PARTIAL_DONE)
125
+
126
+#define EXYNOS4210_RNG_CONTROL_1 0x0
127
+#define EXYNOS4210_RNG_STATUS 0x10
128
+#define EXYNOS4210_RNG_SEED_IN 0x140
129
+#define EXYNOS4210_RNG_SEED_IN_OFFSET(n) (EXYNOS4210_RNG_SEED_IN + (n * 0x4))
130
+#define EXYNOS4210_RNG_PRNG 0x160
131
+#define EXYNOS4210_RNG_PRNG_OFFSET(n) (EXYNOS4210_RNG_PRNG + (n * 0x4))
132
+
133
+#define EXYNOS4210_RNG_PRNG_NUM 5
134
+
135
+#define EXYNOS4210_RNG_REGS_MEM_SIZE 0x200
136
+
137
+typedef struct Exynos4210RngState {
138
+ SysBusDevice parent_obj;
139
+ MemoryRegion iomem;
140
+
141
+ int32_t randr_value[EXYNOS4210_RNG_PRNG_NUM];
142
+ /* bits from 0 to EXYNOS4210_RNG_PRNG_NUM if given seed register was set */
143
+ uint32_t seed_set;
144
+
145
+ /* Register values */
146
+ uint32_t reg_control;
147
+ uint32_t reg_status;
148
+} Exynos4210RngState;
149
+
150
+static bool exynos4210_rng_seed_ready(const Exynos4210RngState *s)
151
+{
32
+{
152
+ uint32_t mask = MAKE_64BIT_MASK(0, EXYNOS4210_RNG_PRNG_NUM);
33
+ if (is_a64(env)) {
153
+
34
+ return env->pstate & PSTATE_PAN;
154
+ /* Return true if all the seed-set bits are set. */
155
+ return (s->seed_set & mask) == mask;
156
+}
157
+
158
+static void exynos4210_rng_set_seed(Exynos4210RngState *s, unsigned int i,
159
+ uint64_t val)
160
+{
161
+ /*
162
+ * We actually ignore the seed and always generate true random numbers.
163
+ * Theoretically this should not match the device as Exynos has
164
+ * a Pseudo Random Number Generator but testing shown that it always
165
+ * generates random numbers regardless of the seed value.
166
+ */
167
+ s->seed_set |= BIT(i);
168
+
169
+ /* If all seeds were written, update the status to reflect it */
170
+ if (exynos4210_rng_seed_ready(s)) {
171
+ s->reg_status |= EXYNOS4210_RNG_STATUS_SEED_SETTING_DONE;
172
+ } else {
35
+ } else {
173
+ s->reg_status &= ~EXYNOS4210_RNG_STATUS_SEED_SETTING_DONE;
36
+ return env->uncached_cpsr & CPSR_PAN;
174
+ }
37
+ }
175
+}
38
+}
176
+
39
+
177
+static void exynos4210_rng_run_engine(Exynos4210RngState *s)
40
ARMMMUIdx arm_mmu_idx_el(CPUARMState *env, int el)
41
{
42
ARMMMUIdx idx;
43
@@ -XXX,XX +XXX,XX @@ ARMMMUIdx arm_mmu_idx_el(CPUARMState *env, int el)
44
}
45
break;
46
case 1:
47
- if (env->pstate & PSTATE_PAN) {
48
+ if (arm_pan_enabled(env)) {
49
idx = ARMMMUIdx_E10_1_PAN;
50
} else {
51
idx = ARMMMUIdx_E10_1;
52
@@ -XXX,XX +XXX,XX @@ ARMMMUIdx arm_mmu_idx_el(CPUARMState *env, int el)
53
case 2:
54
/* Note that TGE does not apply at EL2. */
55
if (arm_hcr_el2_eff(env) & HCR_E2H) {
56
- if (env->pstate & PSTATE_PAN) {
57
+ if (arm_pan_enabled(env)) {
58
idx = ARMMMUIdx_E20_2_PAN;
59
} else {
60
idx = ARMMMUIdx_E20_2;
61
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
62
index XXXXXXX..XXXXXXX 100644
63
--- a/target/arm/ptw.c
64
+++ b/target/arm/ptw.c
65
@@ -XXX,XX +XXX,XX @@ static bool get_level1_table_address(CPUARMState *env, ARMMMUIdx mmu_idx,
66
* @mmu_idx: MMU index indicating required translation regime
67
* @ap: The 3-bit access permissions (AP[2:0])
68
* @domain_prot: The 2-bit domain access permissions
69
+ * @is_user: TRUE if accessing from PL0
70
*/
71
-static int ap_to_rw_prot(CPUARMState *env, ARMMMUIdx mmu_idx,
72
- int ap, int domain_prot)
73
+static int ap_to_rw_prot_is_user(CPUARMState *env, ARMMMUIdx mmu_idx,
74
+ int ap, int domain_prot, bool is_user)
75
{
76
- bool is_user = regime_is_user(env, mmu_idx);
77
-
78
if (domain_prot == 3) {
79
return PAGE_READ | PAGE_WRITE;
80
}
81
@@ -XXX,XX +XXX,XX @@ static int ap_to_rw_prot(CPUARMState *env, ARMMMUIdx mmu_idx,
82
}
83
}
84
85
+/*
86
+ * Translate section/page access permissions to page R/W protection flags
87
+ * @env: CPUARMState
88
+ * @mmu_idx: MMU index indicating required translation regime
89
+ * @ap: The 3-bit access permissions (AP[2:0])
90
+ * @domain_prot: The 2-bit domain access permissions
91
+ */
92
+static int ap_to_rw_prot(CPUARMState *env, ARMMMUIdx mmu_idx,
93
+ int ap, int domain_prot)
178
+{
94
+{
179
+ Error *err = NULL;
95
+ return ap_to_rw_prot_is_user(env, mmu_idx, ap, domain_prot,
180
+ int ret;
96
+ regime_is_user(env, mmu_idx));
181
+
182
+ /* Seed set? */
183
+ if ((s->reg_status & EXYNOS4210_RNG_STATUS_SEED_SETTING_DONE) == 0) {
184
+ goto out;
185
+ }
186
+
187
+ /* PRNG engine chosen? */
188
+ if ((s->reg_control & EXYNOS4210_RNG_CONTROL_1_PRNG) == 0) {
189
+ goto out;
190
+ }
191
+
192
+ /* PRNG engine started? */
193
+ if ((s->reg_control & EXYNOS4210_RNG_CONTROL_1_START_INIT) == 0) {
194
+ goto out;
195
+ }
196
+
197
+ /* Get randoms */
198
+ ret = qcrypto_random_bytes((uint8_t *)s->randr_value,
199
+ sizeof(s->randr_value), &err);
200
+ if (!ret) {
201
+ /* Notify that PRNG is ready */
202
+ s->reg_status |= EXYNOS4210_RNG_STATUS_PRNG_DONE;
203
+ } else {
204
+ error_report_err(err);
205
+ }
206
+
207
+out:
208
+ /* Always clear start engine bit */
209
+ s->reg_control &= ~EXYNOS4210_RNG_CONTROL_1_START_INIT;
210
+}
97
+}
211
+
98
+
212
+static uint64_t exynos4210_rng_read(void *opaque, hwaddr offset,
99
/*
213
+ unsigned size)
100
* Translate section/page access permissions to page R/W protection flags.
214
+{
101
* @ap: The 2-bit simple AP (AP[2:1])
215
+ Exynos4210RngState *s = (Exynos4210RngState *)opaque;
102
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v6(CPUARMState *env, S1Translate *ptw,
216
+ uint32_t val = 0;
103
hwaddr phys_addr;
217
+
104
uint32_t dacr;
218
+ assert(size == 4);
105
bool ns;
219
+
106
+ int user_prot;
220
+ switch (offset) {
107
221
+ case EXYNOS4210_RNG_CONTROL_1:
108
/* Pagetable walk. */
222
+ val = s->reg_control;
109
/* Lookup l1 descriptor. */
223
+ break;
110
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v6(CPUARMState *env, S1Translate *ptw,
224
+
111
goto do_fault;
225
+ case EXYNOS4210_RNG_STATUS:
112
}
226
+ val = s->reg_status;
113
result->f.prot = simple_ap_to_rw_prot(env, mmu_idx, ap >> 1);
227
+ break;
114
+ user_prot = simple_ap_to_rw_prot_is_user(ap >> 1, 1);
228
+
115
} else {
229
+ case EXYNOS4210_RNG_PRNG_OFFSET(0):
116
result->f.prot = ap_to_rw_prot(env, mmu_idx, ap, domain_prot);
230
+ case EXYNOS4210_RNG_PRNG_OFFSET(1):
117
+ user_prot = ap_to_rw_prot_is_user(env, mmu_idx, ap, domain_prot, 1);
231
+ case EXYNOS4210_RNG_PRNG_OFFSET(2):
118
}
232
+ case EXYNOS4210_RNG_PRNG_OFFSET(3):
119
if (result->f.prot && !xn) {
233
+ case EXYNOS4210_RNG_PRNG_OFFSET(4):
120
result->f.prot |= PAGE_EXEC;
234
+ val = s->randr_value[(offset - EXYNOS4210_RNG_PRNG_OFFSET(0)) / 4];
121
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v6(CPUARMState *env, S1Translate *ptw,
235
+ DPRINTF("returning random @0x%" HWADDR_PRIx ": 0x%" PRIx32 "\n",
122
fi->type = ARMFault_Permission;
236
+ offset, val);
123
goto do_fault;
237
+ break;
124
}
238
+
125
+ if (regime_is_pan(env, mmu_idx) &&
239
+ default:
126
+ !regime_is_user(env, mmu_idx) &&
240
+ qemu_log_mask(LOG_GUEST_ERROR,
127
+ user_prot &&
241
+ "%s: bad read offset 0x%" HWADDR_PRIx "\n",
128
+ access_type != MMU_INST_FETCH) {
242
+ __func__, offset);
129
+ /* Privileged Access Never fault */
243
+ }
130
+ fi->type = ARMFault_Permission;
244
+
131
+ goto do_fault;
245
+ return val;
132
+ }
246
+}
133
}
247
+
134
if (ns) {
248
+static void exynos4210_rng_write(void *opaque, hwaddr offset,
135
/* The NS bit will (as required by the architecture) have no effect if
249
+ uint64_t val, unsigned size)
136
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_with_struct(CPUARMState *env, S1Translate *ptw,
250
+{
137
if (regime_using_lpae_format(env, mmu_idx)) {
251
+ Exynos4210RngState *s = (Exynos4210RngState *)opaque;
138
return get_phys_addr_lpae(env, ptw, address, access_type, false,
252
+
139
result, fi);
253
+ assert(size == 4);
140
- } else if (regime_sctlr(env, mmu_idx) & SCTLR_XP) {
254
+
141
+ } else if (arm_feature(env, ARM_FEATURE_V7) ||
255
+ switch (offset) {
142
+ regime_sctlr(env, mmu_idx) & SCTLR_XP) {
256
+ case EXYNOS4210_RNG_CONTROL_1:
143
return get_phys_addr_v6(env, ptw, address, access_type, result, fi);
257
+ DPRINTF("RNG_CONTROL_1 = 0x%" PRIx64 "\n", val);
144
} else {
258
+ s->reg_control = val;
145
return get_phys_addr_v5(env, ptw, address, access_type, result, fi);
259
+ exynos4210_rng_run_engine(s);
260
+ break;
261
+
262
+ case EXYNOS4210_RNG_STATUS:
263
+ /* For clearing status fields */
264
+ s->reg_status &= ~EXYNOS4210_RNG_STATUS_WRITE_MASK;
265
+ s->reg_status |= val & EXYNOS4210_RNG_STATUS_WRITE_MASK;
266
+ break;
267
+
268
+ case EXYNOS4210_RNG_SEED_IN_OFFSET(0):
269
+ case EXYNOS4210_RNG_SEED_IN_OFFSET(1):
270
+ case EXYNOS4210_RNG_SEED_IN_OFFSET(2):
271
+ case EXYNOS4210_RNG_SEED_IN_OFFSET(3):
272
+ case EXYNOS4210_RNG_SEED_IN_OFFSET(4):
273
+ exynos4210_rng_set_seed(s,
274
+ (offset - EXYNOS4210_RNG_SEED_IN_OFFSET(0)) / 4,
275
+ val);
276
+ break;
277
+
278
+ default:
279
+ qemu_log_mask(LOG_GUEST_ERROR,
280
+ "%s: bad write offset 0x%" HWADDR_PRIx "\n",
281
+ __func__, offset);
282
+ }
283
+}
284
+
285
+static const MemoryRegionOps exynos4210_rng_ops = {
286
+ .read = exynos4210_rng_read,
287
+ .write = exynos4210_rng_write,
288
+ .endianness = DEVICE_NATIVE_ENDIAN,
289
+};
290
+
291
+static void exynos4210_rng_reset(DeviceState *dev)
292
+{
293
+ Exynos4210RngState *s = EXYNOS4210_RNG(dev);
294
+
295
+ s->reg_control = 0;
296
+ s->reg_status = EXYNOS4210_RNG_STATUS_BUFFER_READY;
297
+ memset(s->randr_value, 0, sizeof(s->randr_value));
298
+ s->seed_set = 0;
299
+}
300
+
301
+static void exynos4210_rng_init(Object *obj)
302
+{
303
+ Exynos4210RngState *s = EXYNOS4210_RNG(obj);
304
+ SysBusDevice *dev = SYS_BUS_DEVICE(obj);
305
+
306
+ memory_region_init_io(&s->iomem, obj, &exynos4210_rng_ops, s,
307
+ TYPE_EXYNOS4210_RNG, EXYNOS4210_RNG_REGS_MEM_SIZE);
308
+ sysbus_init_mmio(dev, &s->iomem);
309
+}
310
+
311
+static const VMStateDescription exynos4210_rng_vmstate = {
312
+ .name = TYPE_EXYNOS4210_RNG,
313
+ .version_id = 1,
314
+ .minimum_version_id = 1,
315
+ .fields = (VMStateField[]) {
316
+ VMSTATE_INT32_ARRAY(randr_value, Exynos4210RngState,
317
+ EXYNOS4210_RNG_PRNG_NUM),
318
+ VMSTATE_UINT32(seed_set, Exynos4210RngState),
319
+ VMSTATE_UINT32(reg_status, Exynos4210RngState),
320
+ VMSTATE_UINT32(reg_control, Exynos4210RngState),
321
+ VMSTATE_END_OF_LIST()
322
+ }
323
+};
324
+
325
+static void exynos4210_rng_class_init(ObjectClass *klass, void *data)
326
+{
327
+ DeviceClass *dc = DEVICE_CLASS(klass);
328
+
329
+ dc->reset = exynos4210_rng_reset;
330
+ dc->vmsd = &exynos4210_rng_vmstate;
331
+}
332
+
333
+static const TypeInfo exynos4210_rng_info = {
334
+ .name = TYPE_EXYNOS4210_RNG,
335
+ .parent = TYPE_SYS_BUS_DEVICE,
336
+ .instance_size = sizeof(Exynos4210RngState),
337
+ .instance_init = exynos4210_rng_init,
338
+ .class_init = exynos4210_rng_class_init,
339
+};
340
+
341
+static void exynos4210_rng_register(void)
342
+{
343
+ type_register_static(&exynos4210_rng_info);
344
+}
345
+
346
+type_init(exynos4210_rng_register)
347
--
146
--
348
2.7.4
147
2.25.1
349
350
diff view generated by jsdifflib
1
From: Joel Stanley <joel@jms.id.au>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
The ast2400 contains two and the ast2500 contains three watchdogs.
3
With odd_ofs set, we weren't copying enough data.
4
Add this information to the AspeedSoCInfo and realise the correct number
5
of watchdogs for that each SoC type.
6
4
7
Signed-off-by: Joel Stanley <joel@jms.id.au>
5
Fixes: 09eb6d7025d1 ("target/arm: Move sve zip high_ofs into simd_data")
8
Reviewed-by: Cédric Le Goater <clg@kaod.org>
6
Reported-by: Idan Horowitz <idan.horowitz@gmail.com>
9
Tested-by: Cédric Le Goater <clg@kaod.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
9
Message-id: 20221031054144.3574-1-richard.henderson@linaro.org
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
11
---
12
include/hw/arm/aspeed_soc.h | 4 +++-
12
target/arm/sve_helper.c | 4 ++--
13
hw/arm/aspeed_soc.c | 25 +++++++++++++++++--------
13
1 file changed, 2 insertions(+), 2 deletions(-)
14
2 files changed, 20 insertions(+), 9 deletions(-)
15
14
16
diff --git a/include/hw/arm/aspeed_soc.h b/include/hw/arm/aspeed_soc.h
15
diff --git a/target/arm/sve_helper.c b/target/arm/sve_helper.c
17
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
18
--- a/include/hw/arm/aspeed_soc.h
17
--- a/target/arm/sve_helper.c
19
+++ b/include/hw/arm/aspeed_soc.h
18
+++ b/target/arm/sve_helper.c
20
@@ -XXX,XX +XXX,XX @@
19
@@ -XXX,XX +XXX,XX @@ void HELPER(NAME)(void *vd, void *vn, void *vm, uint32_t desc) \
21
#include "hw/net/ftgmac100.h"
20
/* We produce output faster than we consume input. \
22
21
Therefore we must be mindful of possible overlap. */ \
23
#define ASPEED_SPIS_NUM 2
22
if (unlikely((vn - vd) < (uintptr_t)oprsz)) { \
24
+#define ASPEED_WDTS_NUM 3
23
- vn = memcpy(&tmp_n, vn, oprsz_2); \
25
24
+ vn = memcpy(&tmp_n, vn, oprsz); \
26
typedef struct AspeedSoCState {
25
} \
27
/*< private >*/
26
if (unlikely((vm - vd) < (uintptr_t)oprsz)) { \
28
@@ -XXX,XX +XXX,XX @@ typedef struct AspeedSoCState {
27
- vm = memcpy(&tmp_m, vm, oprsz_2); \
29
AspeedSMCState fmc;
28
+ vm = memcpy(&tmp_m, vm, oprsz); \
30
AspeedSMCState spi[ASPEED_SPIS_NUM];
29
} \
31
AspeedSDMCState sdmc;
30
for (i = 0; i < oprsz_2; i += sizeof(TYPE)) { \
32
- AspeedWDTState wdt;
31
*(TYPE *)(vd + H(2 * i + 0)) = *(TYPE *)(vn + odd_ofs + H(i)); \
33
+ AspeedWDTState wdt[ASPEED_WDTS_NUM];
34
FTGMAC100State ftgmac100;
35
} AspeedSoCState;
36
37
@@ -XXX,XX +XXX,XX @@ typedef struct AspeedSoCInfo {
38
const hwaddr *spi_bases;
39
const char *fmc_typename;
40
const char **spi_typename;
41
+ int wdts_num;
42
} AspeedSoCInfo;
43
44
typedef struct AspeedSoCClass {
45
diff --git a/hw/arm/aspeed_soc.c b/hw/arm/aspeed_soc.c
46
index XXXXXXX..XXXXXXX 100644
47
--- a/hw/arm/aspeed_soc.c
48
+++ b/hw/arm/aspeed_soc.c
49
@@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = {
50
.spi_bases = aspeed_soc_ast2400_spi_bases,
51
.fmc_typename = "aspeed.smc.fmc",
52
.spi_typename = aspeed_soc_ast2400_typenames,
53
+ .wdts_num = 2,
54
}, {
55
.name = "ast2400-a1",
56
.cpu_model = "arm926",
57
@@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = {
58
.spi_bases = aspeed_soc_ast2400_spi_bases,
59
.fmc_typename = "aspeed.smc.fmc",
60
.spi_typename = aspeed_soc_ast2400_typenames,
61
+ .wdts_num = 2,
62
}, {
63
.name = "ast2400",
64
.cpu_model = "arm926",
65
@@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = {
66
.spi_bases = aspeed_soc_ast2400_spi_bases,
67
.fmc_typename = "aspeed.smc.fmc",
68
.spi_typename = aspeed_soc_ast2400_typenames,
69
+ .wdts_num = 2,
70
}, {
71
.name = "ast2500-a1",
72
.cpu_model = "arm1176",
73
@@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = {
74
.spi_bases = aspeed_soc_ast2500_spi_bases,
75
.fmc_typename = "aspeed.smc.ast2500-fmc",
76
.spi_typename = aspeed_soc_ast2500_typenames,
77
+ .wdts_num = 3,
78
},
79
};
80
81
@@ -XXX,XX +XXX,XX @@ static void aspeed_soc_init(Object *obj)
82
object_property_add_alias(obj, "ram-size", OBJECT(&s->sdmc),
83
"ram-size", &error_abort);
84
85
- object_initialize(&s->wdt, sizeof(s->wdt), TYPE_ASPEED_WDT);
86
- object_property_add_child(obj, "wdt", OBJECT(&s->wdt), NULL);
87
- qdev_set_parent_bus(DEVICE(&s->wdt), sysbus_get_default());
88
+ for (i = 0; i < sc->info->wdts_num; i++) {
89
+ object_initialize(&s->wdt[i], sizeof(s->wdt[i]), TYPE_ASPEED_WDT);
90
+ object_property_add_child(obj, "wdt[*]", OBJECT(&s->wdt[i]), NULL);
91
+ qdev_set_parent_bus(DEVICE(&s->wdt[i]), sysbus_get_default());
92
+ }
93
94
object_initialize(&s->ftgmac100, sizeof(s->ftgmac100), TYPE_FTGMAC100);
95
object_property_add_child(obj, "ftgmac100", OBJECT(&s->ftgmac100), NULL);
96
@@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp)
97
sysbus_mmio_map(SYS_BUS_DEVICE(&s->sdmc), 0, ASPEED_SOC_SDMC_BASE);
98
99
/* Watch dog */
100
- object_property_set_bool(OBJECT(&s->wdt), true, "realized", &err);
101
- if (err) {
102
- error_propagate(errp, err);
103
- return;
104
+ for (i = 0; i < sc->info->wdts_num; i++) {
105
+ object_property_set_bool(OBJECT(&s->wdt[i]), true, "realized", &err);
106
+ if (err) {
107
+ error_propagate(errp, err);
108
+ return;
109
+ }
110
+ sysbus_mmio_map(SYS_BUS_DEVICE(&s->wdt[i]), 0,
111
+ ASPEED_SOC_WDT_BASE + i * 0x20);
112
}
113
- sysbus_mmio_map(SYS_BUS_DEVICE(&s->wdt), 0, ASPEED_SOC_WDT_BASE);
114
115
/* Net */
116
qdev_set_nic_properties(DEVICE(&s->ftgmac100), &nd_table[0]);
117
--
32
--
118
2.7.4
33
2.25.1
119
34
120
35
diff view generated by jsdifflib
1
For v7M, writes to the CONTROL register are only permitted for
1
From: Ake Koomsin <ake@igel.co.jp>
2
privileged code. However even if the code is privileged, the
3
write must not affect the SPSEL bit in the CONTROL register
4
if the CPU is in Thread mode (as documented in the pseudocode
5
for the MSR instruction). Implement this, instead of permitting
6
SPSEL to be written in all cases.
7
2
8
This was causing mbed applications not to run, because the
3
We need to check HCR_E2H and HCR_TGE to select the right MMU index for
9
RTX RTOS they use relies on this behaviour.
4
the correct translation regime.
10
5
6
To check for EL2&0 translation regime:
7
- For S1E0*, S1E1* and S12E* ops, check both HCR_E2H and HCR_TGE
8
- For S1E2* ops, check only HCR_E2H
9
10
Signed-off-by: Ake Koomsin <ake@igel.co.jp>
11
Message-id: 20221101064250.12444-1-ake@igel.co.jp
12
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
13
Message-id: 1498820791-8130-1-git-send-email-peter.maydell@linaro.org
14
---
14
---
15
target/arm/helper.c | 13 ++++++++++---
15
target/arm/helper.c | 15 +++++++++------
16
1 file changed, 10 insertions(+), 3 deletions(-)
16
1 file changed, 9 insertions(+), 6 deletions(-)
17
17
18
diff --git a/target/arm/helper.c b/target/arm/helper.c
18
diff --git a/target/arm/helper.c b/target/arm/helper.c
19
index XXXXXXX..XXXXXXX 100644
19
index XXXXXXX..XXXXXXX 100644
20
--- a/target/arm/helper.c
20
--- a/target/arm/helper.c
21
+++ b/target/arm/helper.c
21
+++ b/target/arm/helper.c
22
@@ -XXX,XX +XXX,XX @@ void HELPER(v7m_msr)(CPUARMState *env, uint32_t maskreg, uint32_t val)
22
@@ -XXX,XX +XXX,XX @@ static void ats_write64(CPUARMState *env, const ARMCPRegInfo *ri,
23
MMUAccessType access_type = ri->opc2 & 1 ? MMU_DATA_STORE : MMU_DATA_LOAD;
24
ARMMMUIdx mmu_idx;
25
int secure = arm_is_secure_below_el3(env);
26
+ uint64_t hcr_el2 = arm_hcr_el2_eff(env);
27
+ bool regime_e20 = (hcr_el2 & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE);
28
29
switch (ri->opc2 & 6) {
30
case 0:
31
switch (ri->opc1) {
32
case 0: /* AT S1E1R, AT S1E1W, AT S1E1RP, AT S1E1WP */
33
if (ri->crm == 9 && (env->pstate & PSTATE_PAN)) {
34
- mmu_idx = ARMMMUIdx_Stage1_E1_PAN;
35
+ mmu_idx = regime_e20 ?
36
+ ARMMMUIdx_E20_2_PAN : ARMMMUIdx_Stage1_E1_PAN;
37
} else {
38
- mmu_idx = ARMMMUIdx_Stage1_E1;
39
+ mmu_idx = regime_e20 ? ARMMMUIdx_E20_2 : ARMMMUIdx_Stage1_E1;
40
}
41
break;
42
case 4: /* AT S1E2R, AT S1E2W */
43
- mmu_idx = ARMMMUIdx_E2;
44
+ mmu_idx = hcr_el2 & HCR_E2H ? ARMMMUIdx_E20_2 : ARMMMUIdx_E2;
45
break;
46
case 6: /* AT S1E3R, AT S1E3W */
47
mmu_idx = ARMMMUIdx_E3;
48
@@ -XXX,XX +XXX,XX @@ static void ats_write64(CPUARMState *env, const ARMCPRegInfo *ri,
23
}
49
}
24
break;
50
break;
25
case 20: /* CONTROL */
51
case 2: /* AT S1E0R, AT S1E0W */
26
- switch_v7m_sp(env, (val & R_V7M_CONTROL_SPSEL_MASK) != 0);
52
- mmu_idx = ARMMMUIdx_Stage1_E0;
27
- env->v7m.control = val & (R_V7M_CONTROL_SPSEL_MASK |
53
+ mmu_idx = regime_e20 ? ARMMMUIdx_E20_0 : ARMMMUIdx_Stage1_E0;
28
- R_V7M_CONTROL_NPRIV_MASK);
54
break;
29
+ /* Writing to the SPSEL bit only has an effect if we are in
55
case 4: /* AT S12E1R, AT S12E1W */
30
+ * thread mode; other bits can be updated by any privileged code.
56
- mmu_idx = ARMMMUIdx_E10_1;
31
+ * switch_v7m_sp() deals with updating the SPSEL bit in
57
+ mmu_idx = regime_e20 ? ARMMMUIdx_E20_2 : ARMMMUIdx_E10_1;
32
+ * env->v7m.control, so we only need update the others.
58
break;
33
+ */
59
case 6: /* AT S12E0R, AT S12E0W */
34
+ if (env->v7m.exception == 0) {
60
- mmu_idx = ARMMMUIdx_E10_0;
35
+ switch_v7m_sp(env, (val & R_V7M_CONTROL_SPSEL_MASK) != 0);
61
+ mmu_idx = regime_e20 ? ARMMMUIdx_E20_0 : ARMMMUIdx_E10_0;
36
+ }
37
+ env->v7m.control &= ~R_V7M_CONTROL_NPRIV_MASK;
38
+ env->v7m.control |= val & R_V7M_CONTROL_NPRIV_MASK;
39
break;
62
break;
40
default:
63
default:
41
qemu_log_mask(LOG_GUEST_ERROR, "Attempt to write unknown special"
64
g_assert_not_reached();
42
--
65
--
43
2.7.4
66
2.25.1
44
45
diff view generated by jsdifflib
1
From: Alexander Graf <agraf@suse.de>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
When running with KVM enabled, you can choose between emulating the
3
Reversed the sense of non-secure in get_phys_addr_lpae,
4
gic in kernel or user space. If the kernel supports in-kernel virtualization
4
and failed to initialize attrs.secure for ARMMMUIdx_Phys_S.
5
of the interrupt controller, it will default to that. If not, if will
6
default to user space emulation.
7
5
8
Unfortunately when running in user mode gic emulation, we miss out on
6
Fixes: 48da29e4 ("target/arm: Add ptw_idx to S1Translate")
9
interrupt events which are only available from kernel space, such as the timer.
7
Resolves: https://gitlab.com/qemu-project/qemu/-/issues/1293
10
This patch leverages the new kernel/user space pending line synchronization for
8
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
11
timer events. It does not handle PMU events yet.
9
Tested-by: Philippe Mathieu-Daudé <philmd@linaro.org>
12
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
13
Signed-off-by: Alexander Graf <agraf@suse.de>
14
Reviewed-by: Andrew Jones <drjones@redhat.com>
15
Message-id: 1498577737-130264-1-git-send-email-agraf@suse.de
16
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
---
12
---
18
include/sysemu/kvm.h | 11 +++++++++++
13
target/arm/ptw.c | 15 ++++++++-------
19
target/arm/cpu.h | 3 +++
14
1 file changed, 8 insertions(+), 7 deletions(-)
20
accel/kvm/kvm-all.c | 5 +++++
21
accel/stubs/kvm-stub.c | 5 +++++
22
hw/intc/arm_gic.c | 7 +++++++
23
target/arm/kvm.c | 51 ++++++++++++++++++++++++++++++++++++++++++++++++++
24
6 files changed, 82 insertions(+)
25
15
26
diff --git a/include/sysemu/kvm.h b/include/sysemu/kvm.h
16
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
27
index XXXXXXX..XXXXXXX 100644
17
index XXXXXXX..XXXXXXX 100644
28
--- a/include/sysemu/kvm.h
18
--- a/target/arm/ptw.c
29
+++ b/include/sysemu/kvm.h
19
+++ b/target/arm/ptw.c
30
@@ -XXX,XX +XXX,XX @@ int kvm_init_vcpu(CPUState *cpu);
20
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
31
int kvm_cpu_exec(CPUState *cpu);
21
descaddr |= (address >> (stride * (4 - level))) & indexmask;
32
int kvm_destroy_vcpu(CPUState *cpu);
22
descaddr &= ~7ULL;
33
23
nstable = extract32(tableattrs, 4, 1);
34
+/**
24
- if (!nstable) {
35
+ * kvm_arm_supports_user_irq
25
+ if (nstable) {
36
+ *
26
/*
37
+ * Not all KVM implementations support notifications for kernel generated
27
* Stage2_S -> Stage2 or Phys_S -> Phys_NS
38
+ * interrupt events to user space. This function indicates whether the current
28
* Assert that the non-secure idx are even, and relative order.
39
+ * KVM implementation does support them.
29
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_with_struct(CPUARMState *env, S1Translate *ptw,
40
+ *
30
bool is_secure = ptw->in_secure;
41
+ * Returns: true if KVM supports using kernel generated IRQs from user space
31
ARMMMUIdx s1_mmu_idx;
42
+ */
32
43
+bool kvm_arm_supports_user_irq(void);
33
+ /*
34
+ * The page table entries may downgrade secure to non-secure, but
35
+ * cannot upgrade an non-secure translation regime's attributes
36
+ * to secure.
37
+ */
38
+ result->f.attrs.secure = is_secure;
44
+
39
+
45
#ifdef NEED_CPU_H
40
switch (mmu_idx) {
46
#include "cpu.h"
41
case ARMMMUIdx_Phys_S:
47
42
case ARMMMUIdx_Phys_NS:
48
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
43
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_with_struct(CPUARMState *env, S1Translate *ptw,
49
index XXXXXXX..XXXXXXX 100644
44
break;
50
--- a/target/arm/cpu.h
51
+++ b/target/arm/cpu.h
52
@@ -XXX,XX +XXX,XX @@ struct ARMCPU {
53
void *el_change_hook_opaque;
54
55
int32_t node_id; /* NUMA node this CPU belongs to */
56
+
57
+ /* Used to synchronize KVM and QEMU in-kernel device levels */
58
+ uint8_t device_irq_level;
59
};
60
61
static inline ARMCPU *arm_env_get_cpu(CPUARMState *env)
62
diff --git a/accel/kvm/kvm-all.c b/accel/kvm/kvm-all.c
63
index XXXXXXX..XXXXXXX 100644
64
--- a/accel/kvm/kvm-all.c
65
+++ b/accel/kvm/kvm-all.c
66
@@ -XXX,XX +XXX,XX @@ int kvm_has_intx_set_mask(void)
67
return kvm_state->intx_set_mask;
68
}
69
70
+bool kvm_arm_supports_user_irq(void)
71
+{
72
+ return kvm_check_extension(kvm_state, KVM_CAP_ARM_USER_IRQ);
73
+}
74
+
75
#ifdef KVM_CAP_SET_GUEST_DEBUG
76
struct kvm_sw_breakpoint *kvm_find_sw_breakpoint(CPUState *cpu,
77
target_ulong pc)
78
diff --git a/accel/stubs/kvm-stub.c b/accel/stubs/kvm-stub.c
79
index XXXXXXX..XXXXXXX 100644
80
--- a/accel/stubs/kvm-stub.c
81
+++ b/accel/stubs/kvm-stub.c
82
@@ -XXX,XX +XXX,XX @@ void kvm_init_cpu_signals(CPUState *cpu)
83
{
84
abort();
85
}
86
+
87
+bool kvm_arm_supports_user_irq(void)
88
+{
89
+ return false;
90
+}
91
#endif
92
diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c
93
index XXXXXXX..XXXXXXX 100644
94
--- a/hw/intc/arm_gic.c
95
+++ b/hw/intc/arm_gic.c
96
@@ -XXX,XX +XXX,XX @@
97
#include "qom/cpu.h"
98
#include "qemu/log.h"
99
#include "trace.h"
100
+#include "sysemu/kvm.h"
101
102
/* #define DEBUG_GIC */
103
104
@@ -XXX,XX +XXX,XX @@ static void arm_gic_realize(DeviceState *dev, Error **errp)
105
return;
106
}
45
}
107
46
108
+ if (kvm_enabled() && !kvm_arm_supports_user_irq()) {
47
- /*
109
+ error_setg(errp, "KVM with user space irqchip only works when the "
48
- * The page table entries may downgrade secure to non-secure, but
110
+ "host kernel supports KVM_CAP_ARM_USER_IRQ");
49
- * cannot upgrade an non-secure translation regime's attributes
111
+ return;
50
- * to secure.
112
+ }
51
- */
113
+
52
- result->f.attrs.secure = is_secure;
114
/* This creates distributor and main CPU interface (s->cpuiomem[0]) */
53
result->f.attrs.user = regime_is_user(env, mmu_idx);
115
gic_init_irqs_and_mmio(s, gic_set_irq, gic_ops);
54
116
55
/*
117
diff --git a/target/arm/kvm.c b/target/arm/kvm.c
118
index XXXXXXX..XXXXXXX 100644
119
--- a/target/arm/kvm.c
120
+++ b/target/arm/kvm.c
121
@@ -XXX,XX +XXX,XX @@ int kvm_arch_init(MachineState *ms, KVMState *s)
122
*/
123
kvm_async_interrupts_allowed = true;
124
125
+ /*
126
+ * PSCI wakes up secondary cores, so we always need to
127
+ * have vCPUs waiting in kernel space
128
+ */
129
+ kvm_halt_in_kernel_allowed = true;
130
+
131
cap_has_mp_state = kvm_check_extension(s, KVM_CAP_MP_STATE);
132
133
type_register_static(&host_arm_cpu_type_info);
134
@@ -XXX,XX +XXX,XX @@ void kvm_arch_pre_run(CPUState *cs, struct kvm_run *run)
135
136
MemTxAttrs kvm_arch_post_run(CPUState *cs, struct kvm_run *run)
137
{
138
+ ARMCPU *cpu;
139
+ uint32_t switched_level;
140
+
141
+ if (kvm_irqchip_in_kernel()) {
142
+ /*
143
+ * We only need to sync timer states with user-space interrupt
144
+ * controllers, so return early and save cycles if we don't.
145
+ */
146
+ return MEMTXATTRS_UNSPECIFIED;
147
+ }
148
+
149
+ cpu = ARM_CPU(cs);
150
+
151
+ /* Synchronize our shadowed in-kernel device irq lines with the kvm ones */
152
+ if (run->s.regs.device_irq_level != cpu->device_irq_level) {
153
+ switched_level = cpu->device_irq_level ^ run->s.regs.device_irq_level;
154
+
155
+ qemu_mutex_lock_iothread();
156
+
157
+ if (switched_level & KVM_ARM_DEV_EL1_VTIMER) {
158
+ qemu_set_irq(cpu->gt_timer_outputs[GTIMER_VIRT],
159
+ !!(run->s.regs.device_irq_level &
160
+ KVM_ARM_DEV_EL1_VTIMER));
161
+ switched_level &= ~KVM_ARM_DEV_EL1_VTIMER;
162
+ }
163
+
164
+ if (switched_level & KVM_ARM_DEV_EL1_PTIMER) {
165
+ qemu_set_irq(cpu->gt_timer_outputs[GTIMER_PHYS],
166
+ !!(run->s.regs.device_irq_level &
167
+ KVM_ARM_DEV_EL1_PTIMER));
168
+ switched_level &= ~KVM_ARM_DEV_EL1_PTIMER;
169
+ }
170
+
171
+ /* XXX PMU IRQ is missing */
172
+
173
+ if (switched_level) {
174
+ qemu_log_mask(LOG_UNIMP, "%s: unhandled in-kernel device IRQ %x\n",
175
+ __func__, switched_level);
176
+ }
177
+
178
+ /* We also mark unknown levels as processed to not waste cycles */
179
+ cpu->device_irq_level = run->s.regs.device_irq_level;
180
+ qemu_mutex_unlock_iothread();
181
+ }
182
+
183
return MEMTXATTRS_UNSPECIFIED;
184
}
185
186
--
56
--
187
2.7.4
57
2.25.1
188
58
189
59
diff view generated by jsdifflib