1
ARM queue: nothing particularly exciting, but 18 patches
1
Patches for rc1: nothing major, just some minor bugfixes and
2
is enough to send out.
2
code cleanups.
3
3
4
thanks
5
-- PMM
4
-- PMM
6
5
7
The following changes since commit 3dabde1128b671f36ac6cb36b97b273139964420:
6
The following changes since commit f7e1914adad8885a5d4c70239ab90d901ed97e9f:
8
7
9
Merge remote-tracking branch 'remotes/dgilbert/tags/pull-hmp-20170914' into staging (2017-09-14 16:33:02 +0100)
8
Merge remote-tracking branch 'remotes/alistair/tags/pull-riscv-to-apply-20201109' into staging (2020-11-10 09:24:56 +0000)
10
9
11
are available in the git repository at:
10
are available in the Git repository at:
12
11
13
git://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20170914
12
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20201110
14
13
15
for you to fetch changes up to ce3bc112cdb1d462e2d52eaa17a7314e7f3af504:
14
for you to fetch changes up to b6c56c8a9a4064ea783f352f43c5df6231a110fa:
16
15
17
mps2-an511: Fix wiring of UART overflow interrupt lines (2017-09-14 18:43:19 +0100)
16
target/arm/translate-neon.c: Handle VTBL UNDEF case before VFP access check (2020-11-10 11:03:48 +0000)
18
17
19
----------------------------------------------------------------
18
----------------------------------------------------------------
20
target-arm queue:
19
target-arm queue:
21
* v7M: various code cleanups
20
* hw/arm/Kconfig: ARM_V7M depends on PTIMER
22
* v7M: set correct BFSR bits on bus fault
21
* Minor coding style fixes
23
* v7M: clear exclusive monitor on reset and exception entry/exit
22
* docs: add some notes on the sbsa-ref machine
24
* v7M: don't apply priority mask to negative priorities
23
* hw/arm/virt: Remove dependency on Cortex-A15 MPCore peripherals
25
* zcu102: support 'secure' and 'virtualization' machine properties
24
* target/arm: Fix neon VTBL/VTBX for len > 1
26
* aarch64: fix ERET single stepping
25
* hw/arm/armsse: Correct expansion MPC interrupt lines
27
* gpex: implement PCI INTx routing
26
* hw/misc/stm32f2xx_syscfg: Remove extraneous IRQ
28
* mps2-an511: fix UART overflow interrupt line wiring
27
* hw/arm/nseries: Remove invalid/unnecessary n8x0_uart_setup()
28
* hw/arm/musicpal: Don't connect two qemu_irqs directly to the same input
29
* hw/arm/musicpal: Only use qdev_get_gpio_in() when necessary
30
* hw/arm/nseries: Check return value from load_image_targphys()
31
* tests/qtest/npcm7xx_rng-test: count runs properly
32
* target/arm/translate-neon.c: Handle VTBL UNDEF case before VFP access check
29
33
30
----------------------------------------------------------------
34
----------------------------------------------------------------
31
Alistair Francis (5):
35
Alex Bennée (1):
32
xlnx-ep108: Rename to ZCU102
36
docs: add some notes on the sbsa-ref machine
33
xlnx-zcu102: Manually create the machines
34
xlnx-zcu102: Add a machine level secure property
35
xlnx-zcu102: Add a machine level virtualization property
36
xlnx-zcu102: Mark the EP108 machine as deprecated
37
37
38
Jaroslaw Pelczar (1):
38
AlexChen (1):
39
AArch64: Fix single stepping of ERET instruction
39
ssi: Fix bad printf format specifiers
40
40
41
Peter Maydell (8):
41
Andrew Jones (1):
42
target/arm: Use M_REG_NUM_BANKS rather than hardcoding 2
42
hw/arm/Kconfig: ARM_V7M depends on PTIMER
43
target/arm: Clear exclusive monitor on v7M reset, exception entry/exit
44
target/arm: Get PRECISERR and IBUSERR the right way round
45
nvic: Don't apply group priority mask to negative priorities
46
target/arm: Remove unnecessary '| 0xf0000000' from do_v7m_exception_exit()
47
target/arm: Add and use defines for EXCRET constants
48
target/arm: Rename 'type' to 'excret' in do_v7m_exception_exit()
49
mps2-an511: Fix wiring of UART overflow interrupt lines
50
43
51
Pranavkumar Sawargaonkar (3):
44
Havard Skinnemoen (1):
52
hw/pci-host/gpex: Set INTx index/gsi mapping
45
tests/qtest/npcm7xx_rng-test: count runs properly
53
hw/arm/virt: Set INTx/gsi mapping
46
54
hw/pci-host/gpex: Implement PCI INTx routing
47
Peter Maydell (2):
48
hw/arm/nseries: Check return value from load_image_targphys()
49
target/arm/translate-neon.c: Handle VTBL UNDEF case before VFP access check
50
51
Philippe Mathieu-Daudé (6):
52
hw/arm/virt: Remove dependency on Cortex-A15 MPCore peripherals
53
hw/arm/armsse: Correct expansion MPC interrupt lines
54
hw/misc/stm32f2xx_syscfg: Remove extraneous IRQ
55
hw/arm/nseries: Remove invalid/unnecessary n8x0_uart_setup()
56
hw/arm/musicpal: Don't connect two qemu_irqs directly to the same input
57
hw/arm/musicpal: Only use qdev_get_gpio_in() when necessary
55
58
56
Richard Henderson (1):
59
Richard Henderson (1):
57
target/arm: Avoid an extra temporary for store_exclusive
60
target/arm: Fix neon VTBL/VTBX for len > 1
58
61
59
hw/arm/Makefile.objs | 2 +-
62
Xinhao Zhang (3):
60
include/hw/arm/xlnx-zynqmp.h | 2 +
63
target/arm: add spaces around operator
61
include/hw/pci-host/gpex.h | 3 +
64
target/arm: Don't use '#' flag of printf format
62
target/arm/cpu.h | 35 +++---
65
target/arm: add space before the open parenthesis '('
63
target/arm/internals.h | 20 ++++
64
hw/arm/mps2.c | 4 +-
65
hw/arm/virt.c | 1 +
66
hw/arm/xlnx-ep108.c | 139 -----------------------
67
hw/arm/xlnx-zcu102.c | 259 +++++++++++++++++++++++++++++++++++++++++++
68
hw/arm/xlnx-zynqmp.c | 3 +-
69
hw/intc/armv7m_nvic.c | 11 +-
70
hw/pci-host/gpex.c | 22 ++++
71
target/arm/cpu.c | 6 +
72
target/arm/helper.c | 43 ++++---
73
target/arm/op_helper.c | 2 +-
74
target/arm/translate-a64.c | 27 ++---
75
16 files changed, 382 insertions(+), 197 deletions(-)
76
delete mode 100644 hw/arm/xlnx-ep108.c
77
create mode 100644 hw/arm/xlnx-zcu102.c
78
66
67
docs/system/arm/sbsa.rst | 32 ++++++++++++++++++++++
68
docs/system/target-arm.rst | 1 +
69
include/hw/misc/stm32f2xx_syscfg.h | 2 --
70
target/arm/helper.h | 2 +-
71
hw/arm/armsse.c | 3 +-
72
hw/arm/musicpal.c | 40 +++++++++++++++++----------
73
hw/arm/nseries.c | 26 ++++++++----------
74
hw/arm/stm32f205_soc.c | 1 -
75
hw/misc/stm32f2xx_syscfg.c | 2 --
76
hw/ssi/imx_spi.c | 2 +-
77
hw/ssi/xilinx_spi.c | 2 +-
78
target/arm/arch_dump.c | 8 +++---
79
target/arm/arm-semi.c | 8 +++---
80
target/arm/helper.c | 2 +-
81
target/arm/op_helper.c | 23 +++++++++-------
82
target/arm/translate-a64.c | 4 +--
83
target/arm/translate.c | 2 +-
84
tests/qtest/npcm7xx_rng-test.c | 2 +-
85
hw/arm/Kconfig | 3 +-
86
target/arm/translate-neon.c.inc | 56 ++++++++++++++------------------------
87
20 files changed, 123 insertions(+), 98 deletions(-)
88
create mode 100644 docs/system/arm/sbsa.rst
89
diff view generated by jsdifflib
1
From: Pranavkumar Sawargaonkar <pranavkumar@linaro.org>
1
From: Andrew Jones <drjones@redhat.com>
2
2
3
Let's provide the GPEX host bridge with the INTx/gsi mapping. This is
3
commit 32bd322a0134 ("hw/timer/armv7m_systick: Rewrite to use ptimers")
4
needed for INTx/gsi routing.
4
changed armv7m_systick to build on ptimers. Make sure we have ptimers
5
in the build when building armv7m_systick.
5
6
6
Signed-off-by: Pranavkumar Sawargaonkar <pranavkumar@linaro.org>
7
Signed-off-by: Andrew Jones <drjones@redhat.com>
7
Signed-off-by: Tushar Jagad <tushar.jagad@linaro.org>
8
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
8
Signed-off-by: Eric Auger <eric.auger@redhat.com>
9
Message-id: 20201104103343.30392-1-drjones@redhat.com
9
Reviewed-by: Andrew Jones <drjones@redhat.com>
10
Tested-by: Feng Kan <fkan@apm.com>
11
Message-id: 1505296004-6798-3-git-send-email-eric.auger@redhat.com
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
---
11
---
14
hw/arm/virt.c | 1 +
12
hw/arm/Kconfig | 1 +
15
1 file changed, 1 insertion(+)
13
1 file changed, 1 insertion(+)
16
14
17
diff --git a/hw/arm/virt.c b/hw/arm/virt.c
15
diff --git a/hw/arm/Kconfig b/hw/arm/Kconfig
18
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
19
--- a/hw/arm/virt.c
17
--- a/hw/arm/Kconfig
20
+++ b/hw/arm/virt.c
18
+++ b/hw/arm/Kconfig
21
@@ -XXX,XX +XXX,XX @@ static void create_pcie(const VirtMachineState *vms, qemu_irq *pic)
19
@@ -XXX,XX +XXX,XX @@ config ZYNQ
22
20
23
for (i = 0; i < GPEX_NUM_IRQS; i++) {
21
config ARM_V7M
24
sysbus_connect_irq(SYS_BUS_DEVICE(dev), i, pic[irq + i]);
22
bool
25
+ gpex_set_irq_num(GPEX_HOST(dev), i, irq + i);
23
+ select PTIMER
26
}
24
27
25
config ALLWINNER_A10
28
pci = PCI_HOST_BRIDGE(dev);
26
bool
29
--
27
--
30
2.7.4
28
2.20.1
31
29
32
30
diff view generated by jsdifflib
1
Fix an error that meant we were wiring every UART's overflow
1
From: AlexChen <alex.chen@huawei.com>
2
interrupts into the same inputs 0 and 1 of the OR gate,
3
rather than giving each its own input.
4
2
5
Cc: qemu-stable@nongnu.org
3
We should use printf format specifier "%u" instead of "%d" for
4
argument of type "unsigned int".
5
6
Reported-by: Euler Robot <euler.robot@huawei.com>
7
Signed-off-by: Alex Chen <alex.chen@huawei.com>
8
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
9
Message-id: 5FA280F5.8060902@huawei.com
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
8
Reviewed-by: Alistair Francis <alistair.francis@xilinx.com>
9
Message-id: 1505232834-20890-1-git-send-email-peter.maydell@linaro.org
10
---
11
---
11
hw/arm/mps2.c | 4 ++--
12
hw/ssi/imx_spi.c | 2 +-
12
1 file changed, 2 insertions(+), 2 deletions(-)
13
hw/ssi/xilinx_spi.c | 2 +-
14
2 files changed, 2 insertions(+), 2 deletions(-)
13
15
14
diff --git a/hw/arm/mps2.c b/hw/arm/mps2.c
16
diff --git a/hw/ssi/imx_spi.c b/hw/ssi/imx_spi.c
15
index XXXXXXX..XXXXXXX 100644
17
index XXXXXXX..XXXXXXX 100644
16
--- a/hw/arm/mps2.c
18
--- a/hw/ssi/imx_spi.c
17
+++ b/hw/arm/mps2.c
19
+++ b/hw/ssi/imx_spi.c
18
@@ -XXX,XX +XXX,XX @@ static void mps2_common_init(MachineState *machine)
20
@@ -XXX,XX +XXX,XX @@ static const char *imx_spi_reg_name(uint32_t reg)
19
cmsdk_apb_uart_create(uartbase[i],
21
case ECSPI_MSGDATA:
20
qdev_get_gpio_in(txrx_orgate_dev, 0),
22
return "ECSPI_MSGDATA";
21
qdev_get_gpio_in(txrx_orgate_dev, 1),
23
default:
22
- qdev_get_gpio_in(orgate_dev, 0),
24
- sprintf(unknown, "%d ?", reg);
23
- qdev_get_gpio_in(orgate_dev, 1),
25
+ sprintf(unknown, "%u ?", reg);
24
+ qdev_get_gpio_in(orgate_dev, i * 2),
26
return unknown;
25
+ qdev_get_gpio_in(orgate_dev, i * 2 + 1),
27
}
26
NULL,
28
}
27
uartchr, SYSCLK_FRQ);
29
diff --git a/hw/ssi/xilinx_spi.c b/hw/ssi/xilinx_spi.c
28
}
30
index XXXXXXX..XXXXXXX 100644
31
--- a/hw/ssi/xilinx_spi.c
32
+++ b/hw/ssi/xilinx_spi.c
33
@@ -XXX,XX +XXX,XX @@ static void xlx_spi_update_irq(XilinxSPI *s)
34
irq chain unless things really changed. */
35
if (pending != s->irqline) {
36
s->irqline = pending;
37
- DB_PRINT("irq_change of state %d ISR:%x IER:%X\n",
38
+ DB_PRINT("irq_change of state %u ISR:%x IER:%X\n",
39
pending, s->regs[R_IPISR], s->regs[R_IPIER]);
40
qemu_set_irq(s->irq, pending);
41
}
29
--
42
--
30
2.7.4
43
2.20.1
31
44
32
45
diff view generated by jsdifflib
1
In the v7M and v8M ARM ARM, the magic exception return values are
1
From: Xinhao Zhang <zhangxinhao1@huawei.com>
2
referred to as EXC_RETURN values, and in QEMU we use V7M_EXCRET_*
3
constants to define bits within them. Rename the 'type' variable
4
which holds the exception return value in do_v7m_exception_exit()
5
to excret, making it clearer that it does hold an EXC_RETURN value.
6
2
3
Fix code style. Operator needs spaces both sides.
4
5
Signed-off-by: Xinhao Zhang <zhangxinhao1@huawei.com>
6
Signed-off-by: Kai Deng <dengkai1@huawei.com>
7
Message-id: 20201103114529.638233-1-zhangxinhao1@huawei.com
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
9
Reviewed-by: Alistair Francis <alistair.francis@xilinx.com>
10
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
11
Message-id: 1505137930-13255-8-git-send-email-peter.maydell@linaro.org
12
---
10
---
13
target/arm/helper.c | 23 ++++++++++++-----------
11
target/arm/arch_dump.c | 8 ++++----
14
1 file changed, 12 insertions(+), 11 deletions(-)
12
target/arm/arm-semi.c | 8 ++++----
13
target/arm/helper.c | 2 +-
14
3 files changed, 9 insertions(+), 9 deletions(-)
15
15
16
diff --git a/target/arm/arch_dump.c b/target/arm/arch_dump.c
17
index XXXXXXX..XXXXXXX 100644
18
--- a/target/arm/arch_dump.c
19
+++ b/target/arm/arch_dump.c
20
@@ -XXX,XX +XXX,XX @@ static int aarch64_write_elf64_prfpreg(WriteCoreDumpFunction f,
21
22
for (i = 0; i < 32; ++i) {
23
uint64_t *q = aa64_vfp_qreg(env, i);
24
- note.vfp.vregs[2*i + 0] = cpu_to_dump64(s, q[0]);
25
- note.vfp.vregs[2*i + 1] = cpu_to_dump64(s, q[1]);
26
+ note.vfp.vregs[2 * i + 0] = cpu_to_dump64(s, q[0]);
27
+ note.vfp.vregs[2 * i + 1] = cpu_to_dump64(s, q[1]);
28
}
29
30
if (s->dump_info.d_endian == ELFDATA2MSB) {
31
@@ -XXX,XX +XXX,XX @@ static int aarch64_write_elf64_prfpreg(WriteCoreDumpFunction f,
32
*/
33
for (i = 0; i < 32; ++i) {
34
uint64_t tmp = note.vfp.vregs[2*i];
35
- note.vfp.vregs[2*i] = note.vfp.vregs[2*i+1];
36
- note.vfp.vregs[2*i+1] = tmp;
37
+ note.vfp.vregs[2 * i] = note.vfp.vregs[2 * i + 1];
38
+ note.vfp.vregs[2 * i + 1] = tmp;
39
}
40
}
41
42
diff --git a/target/arm/arm-semi.c b/target/arm/arm-semi.c
43
index XXXXXXX..XXXXXXX 100644
44
--- a/target/arm/arm-semi.c
45
+++ b/target/arm/arm-semi.c
46
@@ -XXX,XX +XXX,XX @@ target_ulong do_arm_semihosting(CPUARMState *env)
47
if (use_gdb_syscalls()) {
48
arm_semi_open_guestfd = guestfd;
49
ret = arm_gdb_syscall(cpu, arm_semi_open_cb, "open,%s,%x,1a4", arg0,
50
- (int)arg2+1, gdb_open_modeflags[arg1]);
51
+ (int)arg2 + 1, gdb_open_modeflags[arg1]);
52
} else {
53
ret = set_swi_errno(env, open(s, open_modeflags[arg1], 0644));
54
if (ret == (uint32_t)-1) {
55
@@ -XXX,XX +XXX,XX @@ target_ulong do_arm_semihosting(CPUARMState *env)
56
GET_ARG(1);
57
if (use_gdb_syscalls()) {
58
ret = arm_gdb_syscall(cpu, arm_semi_cb, "unlink,%s",
59
- arg0, (int)arg1+1);
60
+ arg0, (int)arg1 + 1);
61
} else {
62
s = lock_user_string(arg0);
63
if (!s) {
64
@@ -XXX,XX +XXX,XX @@ target_ulong do_arm_semihosting(CPUARMState *env)
65
GET_ARG(3);
66
if (use_gdb_syscalls()) {
67
return arm_gdb_syscall(cpu, arm_semi_cb, "rename,%s,%s",
68
- arg0, (int)arg1+1, arg2, (int)arg3+1);
69
+ arg0, (int)arg1 + 1, arg2, (int)arg3 + 1);
70
} else {
71
char *s2;
72
s = lock_user_string(arg0);
73
@@ -XXX,XX +XXX,XX @@ target_ulong do_arm_semihosting(CPUARMState *env)
74
GET_ARG(1);
75
if (use_gdb_syscalls()) {
76
return arm_gdb_syscall(cpu, arm_semi_cb, "system,%s",
77
- arg0, (int)arg1+1);
78
+ arg0, (int)arg1 + 1);
79
} else {
80
s = lock_user_string(arg0);
81
if (!s) {
16
diff --git a/target/arm/helper.c b/target/arm/helper.c
82
diff --git a/target/arm/helper.c b/target/arm/helper.c
17
index XXXXXXX..XXXXXXX 100644
83
index XXXXXXX..XXXXXXX 100644
18
--- a/target/arm/helper.c
84
--- a/target/arm/helper.c
19
+++ b/target/arm/helper.c
85
+++ b/target/arm/helper.c
20
@@ -XXX,XX +XXX,XX @@ static void v7m_push_stack(ARMCPU *cpu)
86
@@ -XXX,XX +XXX,XX @@ uint32_t HELPER(usad8)(uint32_t a, uint32_t b)
21
static void do_v7m_exception_exit(ARMCPU *cpu)
87
uint32_t sum;
22
{
88
sum = do_usad(a, b);
23
CPUARMState *env = &cpu->env;
89
sum += do_usad(a >> 8, b >> 8);
24
- uint32_t type;
90
- sum += do_usad(a >> 16, b >>16);
25
+ uint32_t excret;
91
+ sum += do_usad(a >> 16, b >> 16);
26
uint32_t xpsr;
92
sum += do_usad(a >> 24, b >> 24);
27
bool ufault = false;
93
return sum;
28
bool return_to_sp_process = false;
94
}
29
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
30
* the target value up between env->regs[15] and env->thumb in
31
* gen_bx(). Reconstitute it.
32
*/
33
- type = env->regs[15];
34
+ excret = env->regs[15];
35
if (env->thumb) {
36
- type |= 1;
37
+ excret |= 1;
38
}
39
40
qemu_log_mask(CPU_LOG_INT, "Exception return: magic PC %" PRIx32
41
" previous exception %d\n",
42
- type, env->v7m.exception);
43
+ excret, env->v7m.exception);
44
45
- if ((type & R_V7M_EXCRET_RES1_MASK) != R_V7M_EXCRET_RES1_MASK) {
46
+ if ((excret & R_V7M_EXCRET_RES1_MASK) != R_V7M_EXCRET_RES1_MASK) {
47
qemu_log_mask(LOG_GUEST_ERROR, "M profile: zero high bits in exception "
48
- "exit PC value 0x%" PRIx32 " are UNPREDICTABLE\n", type);
49
+ "exit PC value 0x%" PRIx32 " are UNPREDICTABLE\n",
50
+ excret);
51
}
52
53
if (env->v7m.exception != ARMV7M_EXCP_NMI) {
54
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
55
* which security state's faultmask to clear. (v8M ARM ARM R_KBNF.)
56
*/
57
if (arm_feature(env, ARM_FEATURE_M_SECURITY)) {
58
- int es = type & R_V7M_EXCRET_ES_MASK;
59
+ int es = excret & R_V7M_EXCRET_ES_MASK;
60
if (armv7m_nvic_raw_execution_priority(env->nvic) >= 0) {
61
env->v7m.faultmask[es] = 0;
62
}
63
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
64
g_assert_not_reached();
65
}
66
67
- switch (type & 0xf) {
68
+ switch (excret & 0xf) {
69
case 1: /* Return to Handler */
70
return_to_handler = true;
71
break;
72
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
73
*/
74
env->v7m.cfsr[env->v7m.secure] |= R_V7M_CFSR_INVPC_MASK;
75
armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE);
76
- v7m_exception_taken(cpu, type);
77
+ v7m_exception_taken(cpu, excret);
78
qemu_log_mask(CPU_LOG_INT, "...taking UsageFault on existing "
79
"stackframe: failed exception return integrity check\n");
80
return;
81
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
82
83
/* The restored xPSR exception field will be zero if we're
84
* resuming in Thread mode. If that doesn't match what the
85
- * exception return type specified then this is a UsageFault.
86
+ * exception return excret specified then this is a UsageFault.
87
*/
88
if (return_to_handler != arm_v7m_is_handler_mode(env)) {
89
/* Take an INVPC UsageFault by pushing the stack again. */
90
armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE);
91
env->v7m.cfsr[env->v7m.secure] |= R_V7M_CFSR_INVPC_MASK;
92
v7m_push_stack(cpu);
93
- v7m_exception_taken(cpu, type);
94
+ v7m_exception_taken(cpu, excret);
95
qemu_log_mask(CPU_LOG_INT, "...taking UsageFault on new stackframe: "
96
"failed exception return integrity check\n");
97
return;
98
--
95
--
99
2.7.4
96
2.20.1
100
97
101
98
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Xinhao Zhang <zhangxinhao1@huawei.com>
2
2
3
Instead of copying addr to a local temp, reuse the value (which we
3
Fix code style. Don't use '#' flag of printf format ('%#') in
4
have just compared as equal) already saved in cpu_exclusive_addr.
4
format strings, use '0x' prefix instead
5
5
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
6
Signed-off-by: Xinhao Zhang <zhangxinhao1@huawei.com>
7
Reviewed-by: Alistair Francis <alistair.francis@xilinx.com>
7
Signed-off-by: Kai Deng <dengkai1@huawei.com>
8
Message-id: 20170908163859.29820-1-richard.henderson@linaro.org
8
Message-id: 20201103114529.638233-2-zhangxinhao1@huawei.com
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
---
11
target/arm/translate-a64.c | 26 +++++++++-----------------
12
target/arm/translate-a64.c | 4 ++--
12
1 file changed, 9 insertions(+), 17 deletions(-)
13
1 file changed, 2 insertions(+), 2 deletions(-)
13
14
14
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
15
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
15
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
16
--- a/target/arm/translate-a64.c
17
--- a/target/arm/translate-a64.c
17
+++ b/target/arm/translate-a64.c
18
+++ b/target/arm/translate-a64.c
18
@@ -XXX,XX +XXX,XX @@ static void gen_load_exclusive(DisasContext *s, int rt, int rt2,
19
@@ -XXX,XX +XXX,XX @@ static void disas_simd_three_reg_same_fp16(DisasContext *s, uint32_t insn)
19
}
20
gen_helper_advsimd_acgt_f16(tcg_res, tcg_op1, tcg_op2, fpst);
20
21
break;
21
static void gen_store_exclusive(DisasContext *s, int rd, int rt, int rt2,
22
default:
22
- TCGv_i64 inaddr, int size, int is_pair)
23
- fprintf(stderr, "%s: insn %#04x, fpop %#2x @ %#" PRIx64 "\n",
23
+ TCGv_i64 addr, int size, int is_pair)
24
+ fprintf(stderr, "%s: insn 0x%04x, fpop 0x%2x @ 0x%" PRIx64 "\n",
24
{
25
__func__, insn, fpopcode, s->pc_curr);
25
/* if (env->exclusive_addr == addr && env->exclusive_val == [addr]
26
g_assert_not_reached();
26
* && (!is_pair || env->exclusive_high == [addr + datasize])) {
27
@@ -XXX,XX +XXX,XX @@ static void gen_store_exclusive(DisasContext *s, int rd, int rt, int rt2,
28
*/
29
TCGLabel *fail_label = gen_new_label();
30
TCGLabel *done_label = gen_new_label();
31
- TCGv_i64 addr = tcg_temp_local_new_i64();
32
TCGv_i64 tmp;
33
34
- /* Copy input into a local temp so it is not trashed when the
35
- * basic block ends at the branch insn.
36
- */
37
- tcg_gen_mov_i64(addr, inaddr);
38
tcg_gen_brcond_i64(TCG_COND_NE, addr, cpu_exclusive_addr, fail_label);
39
40
tmp = tcg_temp_new_i64();
41
@@ -XXX,XX +XXX,XX @@ static void gen_store_exclusive(DisasContext *s, int rd, int rt, int rt2,
42
} else {
43
tcg_gen_concat32_i64(tmp, cpu_reg(s, rt2), cpu_reg(s, rt));
44
}
27
}
45
- tcg_gen_atomic_cmpxchg_i64(tmp, addr, cpu_exclusive_val, tmp,
28
@@ -XXX,XX +XXX,XX @@ static void disas_simd_two_reg_misc_fp16(DisasContext *s, uint32_t insn)
46
+ tcg_gen_atomic_cmpxchg_i64(tmp, cpu_exclusive_addr,
29
case 0x7f: /* FSQRT (vector) */
47
+ cpu_exclusive_val, tmp,
30
break;
48
get_mem_index(s),
31
default:
49
MO_64 | MO_ALIGN | s->be_data);
32
- fprintf(stderr, "%s: insn %#04x fpop %#2x\n", __func__, insn, fpop);
50
tcg_gen_setcond_i64(TCG_COND_NE, tmp, tmp, cpu_exclusive_val);
33
+ fprintf(stderr, "%s: insn 0x%04x fpop 0x%2x\n", __func__, insn, fpop);
51
} else if (s->be_data == MO_LE) {
34
g_assert_not_reached();
52
- gen_helper_paired_cmpxchg64_le(tmp, cpu_env, addr, cpu_reg(s, rt),
53
- cpu_reg(s, rt2));
54
+ gen_helper_paired_cmpxchg64_le(tmp, cpu_env, cpu_exclusive_addr,
55
+ cpu_reg(s, rt), cpu_reg(s, rt2));
56
} else {
57
- gen_helper_paired_cmpxchg64_be(tmp, cpu_env, addr, cpu_reg(s, rt),
58
- cpu_reg(s, rt2));
59
+ gen_helper_paired_cmpxchg64_be(tmp, cpu_env, cpu_exclusive_addr,
60
+ cpu_reg(s, rt), cpu_reg(s, rt2));
61
}
62
} else {
63
- TCGv_i64 val = cpu_reg(s, rt);
64
- tcg_gen_atomic_cmpxchg_i64(tmp, addr, cpu_exclusive_val, val,
65
- get_mem_index(s),
66
+ tcg_gen_atomic_cmpxchg_i64(tmp, cpu_exclusive_addr, cpu_exclusive_val,
67
+ cpu_reg(s, rt), get_mem_index(s),
68
size | MO_ALIGN | s->be_data);
69
tcg_gen_setcond_i64(TCG_COND_NE, tmp, tmp, cpu_exclusive_val);
70
}
35
}
71
-
36
72
- tcg_temp_free_i64(addr);
73
-
74
tcg_gen_mov_i64(cpu_reg(s, rd), tmp);
75
tcg_temp_free_i64(tmp);
76
tcg_gen_br(done_label);
77
--
37
--
78
2.7.4
38
2.20.1
79
39
80
40
diff view generated by jsdifflib
1
From: Alistair Francis <alistair.francis@xilinx.com>
1
From: Xinhao Zhang <zhangxinhao1@huawei.com>
2
2
3
The EP108 is the same as the ZCU102, mark it as deprecated as we don't
3
Fix code style. Space required before the open parenthesis '('.
4
need two machines.
5
4
6
Signed-off-by: Alistair Francis <alistair.francis@xilinx.com>
5
Signed-off-by: Xinhao Zhang <zhangxinhao1@huawei.com>
7
Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com>
6
Signed-off-by: Kai Deng <dengkai1@huawei.com>
7
Message-id: 20201103114529.638233-3-zhangxinhao1@huawei.com
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
---
10
---
10
hw/arm/xlnx-zcu102.c | 2 +-
11
target/arm/translate.c | 2 +-
11
1 file changed, 1 insertion(+), 1 deletion(-)
12
1 file changed, 1 insertion(+), 1 deletion(-)
12
13
13
diff --git a/hw/arm/xlnx-zcu102.c b/hw/arm/xlnx-zcu102.c
14
diff --git a/target/arm/translate.c b/target/arm/translate.c
14
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
15
--- a/hw/arm/xlnx-zcu102.c
16
--- a/target/arm/translate.c
16
+++ b/hw/arm/xlnx-zcu102.c
17
+++ b/target/arm/translate.c
17
@@ -XXX,XX +XXX,XX @@ static void xlnx_ep108_machine_class_init(ObjectClass *oc, void *data)
18
@@ -XXX,XX +XXX,XX @@ static void arm_tr_tb_stop(DisasContextBase *dcbase, CPUState *cpu)
18
{
19
- Hardware watchpoints.
19
MachineClass *mc = MACHINE_CLASS(oc);
20
Hardware breakpoints have already been handled and skip this code.
20
21
*/
21
- mc->desc = "Xilinx ZynqMP EP108 board";
22
- switch(dc->base.is_jmp) {
22
+ mc->desc = "Xilinx ZynqMP EP108 board (Deprecated, please use xlnx-zcu102)";
23
+ switch (dc->base.is_jmp) {
23
mc->init = xlnx_ep108_init;
24
case DISAS_NEXT:
24
mc->block_default_type = IF_IDE;
25
case DISAS_TOO_MANY:
25
mc->units_per_default_bus = 1;
26
gen_goto_tb(dc, 1, dc->base.pc_next);
26
--
27
--
27
2.7.4
28
2.20.1
28
29
29
30
diff view generated by jsdifflib
1
From: Pranavkumar Sawargaonkar <pranavkumar@linaro.org>
1
From: Alex Bennée <alex.bennee@linaro.org>
2
2
3
To implement INTx to gsi routing we need to pass the gpex host
3
We should at least document what this machine is about.
4
bridge the gsi associated to each INTx index. Let's introduce
5
irq_num array and gpex_set_irq_num setter function.
6
4
7
Signed-off-by: Pranavkumar Sawargaonkar <pranavkumar@linaro.org>
5
Reviewed-by: Graeme Gregory <graeme@nuviainc.com>
8
Signed-off-by: Tushar Jagad <tushar.jagad@linaro.org>
6
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
9
Signed-off-by: Eric Auger <eric.auger@redhat.com>
7
Message-id: 20201104165254.24822-1-alex.bennee@linaro.org
10
Tested-by: Feng Kan <fkan@apm.com>
8
Cc: Leif Lindholm <leif@nuviainc.com>
11
Reviewed-by: Andrew Jones <drjones@redhat.com>
9
Cc: Shashi Mallela <shashi.mallela@linaro.org>
12
Message-id: 1505296004-6798-2-git-send-email-eric.auger@redhat.com
10
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
11
[PMM: fixed filename mismatch]
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
---
13
---
15
include/hw/pci-host/gpex.h | 3 +++
14
docs/system/arm/sbsa.rst | 32 ++++++++++++++++++++++++++++++++
16
hw/pci-host/gpex.c | 10 ++++++++++
15
docs/system/target-arm.rst | 1 +
17
2 files changed, 13 insertions(+)
16
2 files changed, 33 insertions(+)
17
create mode 100644 docs/system/arm/sbsa.rst
18
18
19
diff --git a/include/hw/pci-host/gpex.h b/include/hw/pci-host/gpex.h
19
diff --git a/docs/system/arm/sbsa.rst b/docs/system/arm/sbsa.rst
20
new file mode 100644
21
index XXXXXXX..XXXXXXX
22
--- /dev/null
23
+++ b/docs/system/arm/sbsa.rst
24
@@ -XXX,XX +XXX,XX @@
25
+Arm Server Base System Architecture Reference board (``sbsa-ref``)
26
+==================================================================
27
+
28
+While the `virt` board is a generic board platform that doesn't match
29
+any real hardware the `sbsa-ref` board intends to look like real
30
+hardware. The `Server Base System Architecture
31
+<https://developer.arm.com/documentation/den0029/latest>` defines a
32
+minimum base line of hardware support and importantly how the firmware
33
+reports that to any operating system. It is a static system that
34
+reports a very minimal DT to the firmware for non-discoverable
35
+information about components affected by the qemu command line (i.e.
36
+cpus and memory). As a result it must have a firmware specifically
37
+built to expect a certain hardware layout (as you would in a real
38
+machine).
39
+
40
+It is intended to be a machine for developing firmware and testing
41
+standards compliance with operating systems.
42
+
43
+Supported devices
44
+"""""""""""""""""
45
+
46
+The sbsa-ref board supports:
47
+
48
+ - A configurable number of AArch64 CPUs
49
+ - GIC version 3
50
+ - System bus AHCI controller
51
+ - System bus EHCI controller
52
+ - CDROM and hard disc on AHCI bus
53
+ - E1000E ethernet card on PCIe bus
54
+ - VGA display adaptor on PCIe bus
55
+ - A generic SBSA watchdog device
56
+
57
diff --git a/docs/system/target-arm.rst b/docs/system/target-arm.rst
20
index XXXXXXX..XXXXXXX 100644
58
index XXXXXXX..XXXXXXX 100644
21
--- a/include/hw/pci-host/gpex.h
59
--- a/docs/system/target-arm.rst
22
+++ b/include/hw/pci-host/gpex.h
60
+++ b/docs/system/target-arm.rst
23
@@ -XXX,XX +XXX,XX @@ typedef struct GPEXHost {
61
@@ -XXX,XX +XXX,XX @@ undocumented; you can get a complete list by running
24
MemoryRegion io_ioport;
62
arm/mps2
25
MemoryRegion io_mmio;
63
arm/musca
26
qemu_irq irq[GPEX_NUM_IRQS];
64
arm/realview
27
+ int irq_num[GPEX_NUM_IRQS];
65
+ arm/sbsa
28
} GPEXHost;
66
arm/versatile
29
67
arm/vexpress
30
+int gpex_set_irq_num(GPEXHost *s, int index, int gsi);
68
arm/aspeed
31
+
32
#endif /* HW_GPEX_H */
33
diff --git a/hw/pci-host/gpex.c b/hw/pci-host/gpex.c
34
index XXXXXXX..XXXXXXX 100644
35
--- a/hw/pci-host/gpex.c
36
+++ b/hw/pci-host/gpex.c
37
@@ -XXX,XX +XXX,XX @@ static void gpex_set_irq(void *opaque, int irq_num, int level)
38
qemu_set_irq(s->irq[irq_num], level);
39
}
40
41
+int gpex_set_irq_num(GPEXHost *s, int index, int gsi)
42
+{
43
+ if (index >= GPEX_NUM_IRQS) {
44
+ return -EINVAL;
45
+ }
46
+
47
+ s->irq_num[index] = gsi;
48
+ return 0;
49
+}
50
+
51
static void gpex_host_realize(DeviceState *dev, Error **errp)
52
{
53
PCIHostState *pci = PCI_HOST_BRIDGE(dev);
54
--
69
--
55
2.7.4
70
2.20.1
56
71
57
72
diff view generated by jsdifflib
1
From: Jaroslaw Pelczar <j.pelczar@samsung.com>
1
From: Philippe Mathieu-Daudé <philmd@redhat.com>
2
2
3
Previously when single stepping through ERET instruction via GDB
3
When using a Cortex-A15, the Virt machine does not use any
4
would result in debugger entering the "next" PC after ERET instruction.
4
MPCore peripherals. Remove the dependency.
5
When debugging in kernel mode, this will also cause unintended behavior,
6
because debugger will try to access memory from EL0 point of view.
7
5
8
Signed-off-by: Jaroslaw Pelczar <j.pelczar@samsung.com>
6
Fixes: 7951c7b7c05 ("hw/arm: Express dependencies of the virt machine with Kconfig")
9
Message-id: 001c01d32895$483027f0$d89077d0$@samsung.com
7
Reported-by: Miroslav Rezanina <mrezanin@redhat.com>
10
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
8
Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com>
9
Message-id: 20201107114852.271922-1-philmd@redhat.com
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
12
---
13
target/arm/translate-a64.c | 1 +
13
hw/arm/Kconfig | 1 -
14
1 file changed, 1 insertion(+)
14
1 file changed, 1 deletion(-)
15
15
16
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
16
diff --git a/hw/arm/Kconfig b/hw/arm/Kconfig
17
index XXXXXXX..XXXXXXX 100644
17
index XXXXXXX..XXXXXXX 100644
18
--- a/target/arm/translate-a64.c
18
--- a/hw/arm/Kconfig
19
+++ b/target/arm/translate-a64.c
19
+++ b/hw/arm/Kconfig
20
@@ -XXX,XX +XXX,XX @@ static void aarch64_tr_tb_stop(DisasContextBase *dcbase, CPUState *cpu)
20
@@ -XXX,XX +XXX,XX @@ config ARM_VIRT
21
default:
21
imply VFIO_PLATFORM
22
gen_a64_set_pc_im(dc->pc);
22
imply VFIO_XGMAC
23
/* fall through */
23
imply TPM_TIS_SYSBUS
24
+ case DISAS_EXIT:
24
- select A15MPCORE
25
case DISAS_JUMP:
25
select ACPI
26
if (dc->base.singlestep_enabled) {
26
select ARM_SMMUV3
27
gen_exception_internal(EXCP_DEBUG);
27
select GPIO_KEY
28
--
28
--
29
2.7.4
29
2.20.1
30
30
31
31
diff view generated by jsdifflib
1
For M profile we must clear the exclusive monitor on reset, exception
1
From: Richard Henderson <richard.henderson@linaro.org>
2
entry and exception exit. We weren't doing any of these things; fix
3
this bug.
4
2
3
The helper function did not get updated when we reorganized
4
the vector register file for SVE. Since then, the neon dregs
5
are non-sequential and cannot be simply indexed.
6
7
At the same time, make the helper function operate on 64-bit
8
quantities so that we do not have to call it twice.
9
10
Fixes: c39c2b9043e
11
Reported-by: Ard Biesheuvel <ardb@kernel.org>
12
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
13
[PMM: use aa32_vfp_dreg() rather than opencoding]
14
Message-id: 20201105171126.88014-1-richard.henderson@linaro.org
15
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Alistair Francis <alistair.francis@xilinx.com>
7
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 1505137930-13255-3-git-send-email-peter.maydell@linaro.org
9
---
17
---
10
target/arm/internals.h | 10 ++++++++++
18
target/arm/helper.h | 2 +-
11
target/arm/cpu.c | 6 ++++++
19
target/arm/op_helper.c | 23 +++++++++--------
12
target/arm/helper.c | 2 ++
20
target/arm/translate-neon.c.inc | 44 +++++++++++----------------------
13
target/arm/op_helper.c | 2 +-
21
3 files changed, 29 insertions(+), 40 deletions(-)
14
4 files changed, 19 insertions(+), 1 deletion(-)
15
22
16
diff --git a/target/arm/internals.h b/target/arm/internals.h
23
diff --git a/target/arm/helper.h b/target/arm/helper.h
17
index XXXXXXX..XXXXXXX 100644
24
index XXXXXXX..XXXXXXX 100644
18
--- a/target/arm/internals.h
25
--- a/target/arm/helper.h
19
+++ b/target/arm/internals.h
26
+++ b/target/arm/helper.h
20
@@ -XXX,XX +XXX,XX @@ void arm_handle_psci_call(ARMCPU *cpu);
27
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_2(rsqrte_f32, TCG_CALL_NO_RWG, f32, f32, ptr)
21
#endif
28
DEF_HELPER_FLAGS_2(rsqrte_f64, TCG_CALL_NO_RWG, f64, f64, ptr)
22
29
DEF_HELPER_FLAGS_1(recpe_u32, TCG_CALL_NO_RWG, i32, i32)
23
/**
30
DEF_HELPER_FLAGS_1(rsqrte_u32, TCG_CALL_NO_RWG, i32, i32)
24
+ * arm_clear_exclusive: clear the exclusive monitor
31
-DEF_HELPER_FLAGS_4(neon_tbl, TCG_CALL_NO_RWG, i32, i32, i32, ptr, i32)
25
+ * @env: CPU env
32
+DEF_HELPER_FLAGS_4(neon_tbl, TCG_CALL_NO_RWG, i64, env, i32, i64, i64)
26
+ * Clear the CPU's exclusive monitor, like the guest CLREX instruction.
33
27
+ */
34
DEF_HELPER_3(shl_cc, i32, env, i32, i32)
28
+static inline void arm_clear_exclusive(CPUARMState *env)
35
DEF_HELPER_3(shr_cc, i32, env, i32, i32)
29
+{
30
+ env->exclusive_addr = -1;
31
+}
32
+
33
+/**
34
* ARMMMUFaultInfo: Information describing an ARM MMU Fault
35
* @s2addr: Address that caused a fault at stage 2
36
* @stage2: True if we faulted at stage 2
37
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
38
index XXXXXXX..XXXXXXX 100644
39
--- a/target/arm/cpu.c
40
+++ b/target/arm/cpu.c
41
@@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(CPUState *s)
42
env->regs[15] = 0xFFFF0000;
43
}
44
45
+ /* M profile requires that reset clears the exclusive monitor;
46
+ * A profile does not, but clearing it makes more sense than having it
47
+ * set with an exclusive access on address zero.
48
+ */
49
+ arm_clear_exclusive(env);
50
+
51
env->vfp.xregs[ARM_VFP_FPEXC] = 0;
52
#endif
53
54
diff --git a/target/arm/helper.c b/target/arm/helper.c
55
index XXXXXXX..XXXXXXX 100644
56
--- a/target/arm/helper.c
57
+++ b/target/arm/helper.c
58
@@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr)
59
60
armv7m_nvic_acknowledge_irq(env->nvic);
61
switch_v7m_sp(env, 0);
62
+ arm_clear_exclusive(env);
63
/* Clear IT bits */
64
env->condexec_bits = 0;
65
env->regs[14] = lr;
66
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
67
}
68
69
/* Otherwise, we have a successful exception exit. */
70
+ arm_clear_exclusive(env);
71
qemu_log_mask(CPU_LOG_INT, "...successful exception return\n");
72
}
73
74
diff --git a/target/arm/op_helper.c b/target/arm/op_helper.c
36
diff --git a/target/arm/op_helper.c b/target/arm/op_helper.c
75
index XXXXXXX..XXXXXXX 100644
37
index XXXXXXX..XXXXXXX 100644
76
--- a/target/arm/op_helper.c
38
--- a/target/arm/op_helper.c
77
+++ b/target/arm/op_helper.c
39
+++ b/target/arm/op_helper.c
78
@@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env)
40
@@ -XXX,XX +XXX,XX @@ void raise_exception_ra(CPUARMState *env, uint32_t excp, uint32_t syndrome,
79
41
cpu_loop_exit_restore(cs, ra);
80
aarch64_save_sp(env, cur_el);
42
}
81
43
82
- env->exclusive_addr = -1;
44
-uint32_t HELPER(neon_tbl)(uint32_t ireg, uint32_t def, void *vn,
83
+ arm_clear_exclusive(env);
45
- uint32_t maxindex)
84
46
+uint64_t HELPER(neon_tbl)(CPUARMState *env, uint32_t desc,
85
/* We must squash the PSTATE.SS bit to zero unless both of the
47
+ uint64_t ireg, uint64_t def)
86
* following hold:
48
{
49
- uint32_t val, shift;
50
- uint64_t *table = vn;
51
+ uint64_t tmp, val = 0;
52
+ uint32_t maxindex = ((desc & 3) + 1) * 8;
53
+ uint32_t base_reg = desc >> 2;
54
+ uint32_t shift, index, reg;
55
56
- val = 0;
57
- for (shift = 0; shift < 32; shift += 8) {
58
- uint32_t index = (ireg >> shift) & 0xff;
59
+ for (shift = 0; shift < 64; shift += 8) {
60
+ index = (ireg >> shift) & 0xff;
61
if (index < maxindex) {
62
- uint32_t tmp = (table[index >> 3] >> ((index & 7) << 3)) & 0xff;
63
- val |= tmp << shift;
64
+ reg = base_reg + (index >> 3);
65
+ tmp = *aa32_vfp_dreg(env, reg);
66
+ tmp = ((tmp >> ((index & 7) << 3)) & 0xff) << shift;
67
} else {
68
- val |= def & (0xff << shift);
69
+ tmp = def & (0xffull << shift);
70
}
71
+ val |= tmp;
72
}
73
return val;
74
}
75
diff --git a/target/arm/translate-neon.c.inc b/target/arm/translate-neon.c.inc
76
index XXXXXXX..XXXXXXX 100644
77
--- a/target/arm/translate-neon.c.inc
78
+++ b/target/arm/translate-neon.c.inc
79
@@ -XXX,XX +XXX,XX @@ static bool trans_VEXT(DisasContext *s, arg_VEXT *a)
80
81
static bool trans_VTBL(DisasContext *s, arg_VTBL *a)
82
{
83
- int n;
84
- TCGv_i32 tmp, tmp2, tmp3, tmp4;
85
- TCGv_ptr ptr1;
86
+ TCGv_i64 val, def;
87
+ TCGv_i32 desc;
88
89
if (!arm_dc_feature(s, ARM_FEATURE_NEON)) {
90
return false;
91
@@ -XXX,XX +XXX,XX @@ static bool trans_VTBL(DisasContext *s, arg_VTBL *a)
92
return true;
93
}
94
95
- n = a->len + 1;
96
- if ((a->vn + n) > 32) {
97
+ if ((a->vn + a->len + 1) > 32) {
98
/*
99
* This is UNPREDICTABLE; we choose to UNDEF to avoid the
100
* helper function running off the end of the register file.
101
*/
102
return false;
103
}
104
- n <<= 3;
105
- tmp = tcg_temp_new_i32();
106
- if (a->op) {
107
- read_neon_element32(tmp, a->vd, 0, MO_32);
108
- } else {
109
- tcg_gen_movi_i32(tmp, 0);
110
- }
111
- tmp2 = tcg_temp_new_i32();
112
- read_neon_element32(tmp2, a->vm, 0, MO_32);
113
- ptr1 = vfp_reg_ptr(true, a->vn);
114
- tmp4 = tcg_const_i32(n);
115
- gen_helper_neon_tbl(tmp2, tmp2, tmp, ptr1, tmp4);
116
117
+ desc = tcg_const_i32((a->vn << 2) | a->len);
118
+ def = tcg_temp_new_i64();
119
if (a->op) {
120
- read_neon_element32(tmp, a->vd, 1, MO_32);
121
+ read_neon_element64(def, a->vd, 0, MO_64);
122
} else {
123
- tcg_gen_movi_i32(tmp, 0);
124
+ tcg_gen_movi_i64(def, 0);
125
}
126
- tmp3 = tcg_temp_new_i32();
127
- read_neon_element32(tmp3, a->vm, 1, MO_32);
128
- gen_helper_neon_tbl(tmp3, tmp3, tmp, ptr1, tmp4);
129
- tcg_temp_free_i32(tmp);
130
- tcg_temp_free_i32(tmp4);
131
- tcg_temp_free_ptr(ptr1);
132
+ val = tcg_temp_new_i64();
133
+ read_neon_element64(val, a->vm, 0, MO_64);
134
135
- write_neon_element32(tmp2, a->vd, 0, MO_32);
136
- write_neon_element32(tmp3, a->vd, 1, MO_32);
137
- tcg_temp_free_i32(tmp2);
138
- tcg_temp_free_i32(tmp3);
139
+ gen_helper_neon_tbl(val, cpu_env, desc, val, def);
140
+ write_neon_element64(val, a->vd, 0, MO_64);
141
+
142
+ tcg_temp_free_i64(def);
143
+ tcg_temp_free_i64(val);
144
+ tcg_temp_free_i32(desc);
145
return true;
146
}
147
87
--
148
--
88
2.7.4
149
2.20.1
89
150
90
151
diff view generated by jsdifflib
1
From: Alistair Francis <alistair.francis@xilinx.com>
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
2
2
3
Add a machine level secure property. This defaults to false and can be
3
We can use one MPC per SRAM bank, but we currently only wire the
4
set to true using this machine command line argument:
4
IRQ from the first expansion MPC to the IRQ splitter. Fix that.
5
-machine xlnx-zcu102,secure=on
6
5
7
This follows what the ARM virt machine does.
6
Fixes: bb75e16d5e6 ("hw/arm/iotkit: Wire up MPC interrupt lines")
8
7
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
9
This property only applies to the ZCU102 machine. The EP108 machine does
8
Message-id: 20201107193403.436146-2-f4bug@amsat.org
10
not have this property.
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
12
Signed-off-by: Alistair Francis <alistair.francis@xilinx.com>
13
Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com>
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
15
---
11
---
16
hw/arm/xlnx-zcu102.c | 32 ++++++++++++++++++++++++++++++++
12
hw/arm/armsse.c | 3 ++-
17
1 file changed, 32 insertions(+)
13
1 file changed, 2 insertions(+), 1 deletion(-)
18
14
19
diff --git a/hw/arm/xlnx-zcu102.c b/hw/arm/xlnx-zcu102.c
15
diff --git a/hw/arm/armsse.c b/hw/arm/armsse.c
20
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
21
--- a/hw/arm/xlnx-zcu102.c
17
--- a/hw/arm/armsse.c
22
+++ b/hw/arm/xlnx-zcu102.c
18
+++ b/hw/arm/armsse.c
23
@@ -XXX,XX +XXX,XX @@ typedef struct XlnxZCU102 {
19
@@ -XXX,XX +XXX,XX @@ static void armsse_realize(DeviceState *dev, Error **errp)
24
20
qdev_get_gpio_in(dev_splitter, 0));
25
XlnxZynqMPState soc;
21
qdev_connect_gpio_out(dev_splitter, 0,
26
MemoryRegion ddr_ram;
22
qdev_get_gpio_in_named(dev_secctl,
27
+
23
- "mpc_status", 0));
28
+ bool secure;
24
+ "mpc_status",
29
} XlnxZCU102;
25
+ i - IOTS_NUM_EXP_MPC));
30
26
}
31
#define TYPE_ZCU102_MACHINE MACHINE_TYPE_NAME("xlnx-zcu102")
27
32
@@ -XXX,XX +XXX,XX @@ typedef struct XlnxZCU102 {
28
qdev_connect_gpio_out(dev_splitter, 1,
33
34
static struct arm_boot_info xlnx_zcu102_binfo;
35
36
+static bool zcu102_get_secure(Object *obj, Error **errp)
37
+{
38
+ XlnxZCU102 *s = ZCU102_MACHINE(obj);
39
+
40
+ return s->secure;
41
+}
42
+
43
+static void zcu102_set_secure(Object *obj, bool value, Error **errp)
44
+{
45
+ XlnxZCU102 *s = ZCU102_MACHINE(obj);
46
+
47
+ s->secure = value;
48
+}
49
+
50
static void xlnx_zynqmp_init(XlnxZCU102 *s, MachineState *machine)
51
{
52
int i;
53
@@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_init(XlnxZCU102 *s, MachineState *machine)
54
55
object_property_set_link(OBJECT(&s->soc), OBJECT(&s->ddr_ram),
56
"ddr-ram", &error_abort);
57
+ object_property_set_bool(OBJECT(&s->soc), s->secure, "secure",
58
+ &error_fatal);
59
60
object_property_set_bool(OBJECT(&s->soc), true, "realized", &error_fatal);
61
62
@@ -XXX,XX +XXX,XX @@ static void xlnx_ep108_init(MachineState *machine)
63
64
static void xlnx_ep108_machine_instance_init(Object *obj)
65
{
66
+ XlnxZCU102 *s = EP108_MACHINE(obj);
67
+
68
+ /* EP108, we don't support setting secure */
69
+ s->secure = false;
70
}
71
72
static void xlnx_ep108_machine_class_init(ObjectClass *oc, void *data)
73
@@ -XXX,XX +XXX,XX @@ static void xlnx_zcu102_init(MachineState *machine)
74
75
static void xlnx_zcu102_machine_instance_init(Object *obj)
76
{
77
+ XlnxZCU102 *s = ZCU102_MACHINE(obj);
78
+
79
+ /* Default to secure mode being disabled */
80
+ s->secure = false;
81
+ object_property_add_bool(obj, "secure", zcu102_get_secure,
82
+ zcu102_set_secure, NULL);
83
+ object_property_set_description(obj, "secure",
84
+ "Set on/off to enable/disable the ARM "
85
+ "Security Extensions (TrustZone)",
86
+ NULL);
87
}
88
89
static void xlnx_zcu102_machine_class_init(ObjectClass *oc, void *data)
90
--
29
--
91
2.7.4
30
2.20.1
92
31
93
32
diff view generated by jsdifflib
1
From: Alistair Francis <alistair.francis@xilinx.com>
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
2
2
3
In preperation for future work let's manually create the Xilnx machines.
3
The system configuration controller (SYSCFG) doesn't have
4
This will allow us to set properties for the machines in the future.
4
any output IRQ (and the INTC input #71 belongs to the UART6).
5
Remove the invalid code.
5
6
6
Signed-off-by: Alistair Francis <alistair.francis@xilinx.com>
7
Fixes: db635521a02 ("stm32f205: Add the stm32f205 SoC")
7
Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com>
8
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
9
Message-id: 20201107193403.436146-3-f4bug@amsat.org
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
---
12
---
10
hw/arm/xlnx-zcu102.c | 74 +++++++++++++++++++++++++++++++++++++++++++++++-----
13
include/hw/misc/stm32f2xx_syscfg.h | 2 --
11
1 file changed, 67 insertions(+), 7 deletions(-)
14
hw/arm/stm32f205_soc.c | 1 -
15
hw/misc/stm32f2xx_syscfg.c | 2 --
16
3 files changed, 5 deletions(-)
12
17
13
diff --git a/hw/arm/xlnx-zcu102.c b/hw/arm/xlnx-zcu102.c
18
diff --git a/include/hw/misc/stm32f2xx_syscfg.h b/include/hw/misc/stm32f2xx_syscfg.h
14
index XXXXXXX..XXXXXXX 100644
19
index XXXXXXX..XXXXXXX 100644
15
--- a/hw/arm/xlnx-zcu102.c
20
--- a/include/hw/misc/stm32f2xx_syscfg.h
16
+++ b/hw/arm/xlnx-zcu102.c
21
+++ b/include/hw/misc/stm32f2xx_syscfg.h
17
@@ -XXX,XX +XXX,XX @@
22
@@ -XXX,XX +XXX,XX @@ struct STM32F2XXSyscfgState {
18
#include "qemu/log.h"
23
uint32_t syscfg_exticr3;
19
24
uint32_t syscfg_exticr4;
20
typedef struct XlnxZCU102 {
25
uint32_t syscfg_cmpcr;
21
+ MachineState parent_obj;
26
-
22
+
27
- qemu_irq irq;
23
XlnxZynqMPState soc;
28
};
24
MemoryRegion ddr_ram;
29
25
} XlnxZCU102;
30
#endif /* HW_STM32F2XX_SYSCFG_H */
26
31
diff --git a/hw/arm/stm32f205_soc.c b/hw/arm/stm32f205_soc.c
27
+#define TYPE_ZCU102_MACHINE MACHINE_TYPE_NAME("xlnx-zcu102")
32
index XXXXXXX..XXXXXXX 100644
28
+#define ZCU102_MACHINE(obj) \
33
--- a/hw/arm/stm32f205_soc.c
29
+ OBJECT_CHECK(XlnxZCU102, (obj), TYPE_ZCU102_MACHINE)
34
+++ b/hw/arm/stm32f205_soc.c
30
+
35
@@ -XXX,XX +XXX,XX @@ static void stm32f205_soc_realize(DeviceState *dev_soc, Error **errp)
31
+#define TYPE_EP108_MACHINE MACHINE_TYPE_NAME("xlnx-ep108")
36
}
32
+#define EP108_MACHINE(obj) \
37
busdev = SYS_BUS_DEVICE(dev);
33
+ OBJECT_CHECK(XlnxZCU102, (obj), TYPE_EP108_MACHINE)
38
sysbus_mmio_map(busdev, 0, 0x40013800);
34
+
39
- sysbus_connect_irq(busdev, 0, qdev_get_gpio_in(armv7m, 71));
35
static struct arm_boot_info xlnx_zcu102_binfo;
40
36
41
/* Attach UART (uses USART registers) and USART controllers */
37
-static void xlnx_zcu102_init(MachineState *machine)
42
for (i = 0; i < STM_NUM_USARTS; i++) {
38
+static void xlnx_zynqmp_init(XlnxZCU102 *s, MachineState *machine)
43
diff --git a/hw/misc/stm32f2xx_syscfg.c b/hw/misc/stm32f2xx_syscfg.c
44
index XXXXXXX..XXXXXXX 100644
45
--- a/hw/misc/stm32f2xx_syscfg.c
46
+++ b/hw/misc/stm32f2xx_syscfg.c
47
@@ -XXX,XX +XXX,XX @@ static void stm32f2xx_syscfg_init(Object *obj)
39
{
48
{
40
- XlnxZCU102 *s = g_new0(XlnxZCU102, 1);
49
STM32F2XXSyscfgState *s = STM32F2XX_SYSCFG(obj);
41
int i;
50
42
uint64_t ram_size = machine->ram_size;
51
- sysbus_init_irq(SYS_BUS_DEVICE(obj), &s->irq);
43
52
-
44
@@ -XXX,XX +XXX,XX @@ static void xlnx_zcu102_init(MachineState *machine)
53
memory_region_init_io(&s->mmio, obj, &stm32f2xx_syscfg_ops, s,
45
arm_load_kernel(s->soc.boot_cpu_ptr, &xlnx_zcu102_binfo);
54
TYPE_STM32F2XX_SYSCFG, 0x400);
46
}
55
sysbus_init_mmio(SYS_BUS_DEVICE(obj), &s->mmio);
47
48
-static void xlnx_ep108_machine_init(MachineClass *mc)
49
+static void xlnx_ep108_init(MachineState *machine)
50
+{
51
+ XlnxZCU102 *s = EP108_MACHINE(machine);
52
+
53
+ xlnx_zynqmp_init(s, machine);
54
+}
55
+
56
+static void xlnx_ep108_machine_instance_init(Object *obj)
57
{
58
+}
59
+
60
+static void xlnx_ep108_machine_class_init(ObjectClass *oc, void *data)
61
+{
62
+ MachineClass *mc = MACHINE_CLASS(oc);
63
+
64
mc->desc = "Xilinx ZynqMP EP108 board";
65
- mc->init = xlnx_zcu102_init;
66
+ mc->init = xlnx_ep108_init;
67
mc->block_default_type = IF_IDE;
68
mc->units_per_default_bus = 1;
69
mc->ignore_memory_transaction_failures = true;
70
}
71
72
-DEFINE_MACHINE("xlnx-ep108", xlnx_ep108_machine_init)
73
+static const TypeInfo xlnx_ep108_machine_init_typeinfo = {
74
+ .name = MACHINE_TYPE_NAME("xlnx-ep108"),
75
+ .parent = TYPE_MACHINE,
76
+ .class_init = xlnx_ep108_machine_class_init,
77
+ .instance_init = xlnx_ep108_machine_instance_init,
78
+ .instance_size = sizeof(XlnxZCU102),
79
+};
80
81
-static void xlnx_zcu102_machine_init(MachineClass *mc)
82
+static void xlnx_ep108_machine_init_register_types(void)
83
{
84
+ type_register_static(&xlnx_ep108_machine_init_typeinfo);
85
+}
86
+
87
+static void xlnx_zcu102_init(MachineState *machine)
88
+{
89
+ XlnxZCU102 *s = ZCU102_MACHINE(machine);
90
+
91
+ xlnx_zynqmp_init(s, machine);
92
+}
93
+
94
+static void xlnx_zcu102_machine_instance_init(Object *obj)
95
+{
96
+}
97
+
98
+static void xlnx_zcu102_machine_class_init(ObjectClass *oc, void *data)
99
+{
100
+ MachineClass *mc = MACHINE_CLASS(oc);
101
+
102
mc->desc = "Xilinx ZynqMP ZCU102 board";
103
mc->init = xlnx_zcu102_init;
104
mc->block_default_type = IF_IDE;
105
@@ -XXX,XX +XXX,XX @@ static void xlnx_zcu102_machine_init(MachineClass *mc)
106
mc->ignore_memory_transaction_failures = true;
107
}
108
109
-DEFINE_MACHINE("xlnx-zcu102", xlnx_zcu102_machine_init)
110
+static const TypeInfo xlnx_zcu102_machine_init_typeinfo = {
111
+ .name = MACHINE_TYPE_NAME("xlnx-zcu102"),
112
+ .parent = TYPE_MACHINE,
113
+ .class_init = xlnx_zcu102_machine_class_init,
114
+ .instance_init = xlnx_zcu102_machine_instance_init,
115
+ .instance_size = sizeof(XlnxZCU102),
116
+};
117
+
118
+static void xlnx_zcu102_machine_init_register_types(void)
119
+{
120
+ type_register_static(&xlnx_zcu102_machine_init_typeinfo);
121
+}
122
+
123
+type_init(xlnx_zcu102_machine_init_register_types)
124
+type_init(xlnx_ep108_machine_init_register_types)
125
--
56
--
126
2.7.4
57
2.20.1
127
58
128
59
diff view generated by jsdifflib
1
From: Alistair Francis <alistair.francis@xilinx.com>
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
2
2
3
Add a machine level virtualization property. This defaults to false and can be
3
omap2420_mpu_init() introduced in commit 827df9f3c5f ("Add basic
4
set to true using this machine command line argument:
4
OMAP2 chip support") takes care of creating the 3 UARTs.
5
-machine xlnx-zcu102,virtualization=on
6
5
7
This follows what the ARM virt machine does.
6
Then commit 58a26b477e9 ("Emulate a serial bluetooth HCI with H4+
7
extensions and attach to n8x0's UART") added n8x0_uart_setup()
8
which create the UART and connects it to an IRQ output,
9
overwritting the existing peripheral and its IRQ connection.
10
This is incorrect.
8
11
9
This property only applies to the ZCU102 machine. The EP108 machine does
12
Fortunately we don't need to fix this, because commit 6da68df7f9b
10
not have this property.
13
("hw/arm/nseries: Replace the bluetooth chardev with a "null"
14
chardev") removed the use of this peripheral. We can simply
15
remove the code.
11
16
12
Signed-off-by: Alistair Francis <alistair.francis@xilinx.com>
17
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
13
Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com>
18
Message-id: 20201107193403.436146-4-f4bug@amsat.org
19
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
20
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
15
---
21
---
16
include/hw/arm/xlnx-zynqmp.h | 2 ++
22
hw/arm/nseries.c | 11 -----------
17
hw/arm/xlnx-zcu102.c | 30 +++++++++++++++++++++++++++++-
23
1 file changed, 11 deletions(-)
18
hw/arm/xlnx-zynqmp.c | 3 ++-
19
3 files changed, 33 insertions(+), 2 deletions(-)
20
24
21
diff --git a/include/hw/arm/xlnx-zynqmp.h b/include/hw/arm/xlnx-zynqmp.h
25
diff --git a/hw/arm/nseries.c b/hw/arm/nseries.c
22
index XXXXXXX..XXXXXXX 100644
26
index XXXXXXX..XXXXXXX 100644
23
--- a/include/hw/arm/xlnx-zynqmp.h
27
--- a/hw/arm/nseries.c
24
+++ b/include/hw/arm/xlnx-zynqmp.h
28
+++ b/hw/arm/nseries.c
25
@@ -XXX,XX +XXX,XX @@ typedef struct XlnxZynqMPState {
29
@@ -XXX,XX +XXX,XX @@ static void n8x0_cbus_setup(struct n800_s *s)
26
30
cbus_attach(cbus, s->tahvo = tahvo_init(tahvo_irq, 1));
27
/* Has the ARM Security extensions? */
28
bool secure;
29
+ /* Has the ARM Virtualization extensions? */
30
+ bool virt;
31
/* Has the RPU subsystem? */
32
bool has_rpu;
33
} XlnxZynqMPState;
34
diff --git a/hw/arm/xlnx-zcu102.c b/hw/arm/xlnx-zcu102.c
35
index XXXXXXX..XXXXXXX 100644
36
--- a/hw/arm/xlnx-zcu102.c
37
+++ b/hw/arm/xlnx-zcu102.c
38
@@ -XXX,XX +XXX,XX @@ typedef struct XlnxZCU102 {
39
MemoryRegion ddr_ram;
40
41
bool secure;
42
+ bool virt;
43
} XlnxZCU102;
44
45
#define TYPE_ZCU102_MACHINE MACHINE_TYPE_NAME("xlnx-zcu102")
46
@@ -XXX,XX +XXX,XX @@ static void zcu102_set_secure(Object *obj, bool value, Error **errp)
47
s->secure = value;
48
}
31
}
49
32
50
+static bool zcu102_get_virt(Object *obj, Error **errp)
33
-static void n8x0_uart_setup(struct n800_s *s)
51
+{
34
-{
52
+ XlnxZCU102 *s = ZCU102_MACHINE(obj);
35
- Chardev *radio = qemu_chr_new("bt-dummy-uart", "null", NULL);
53
+
36
- /*
54
+ return s->virt;
37
- * Note: We used to connect N8X0_BT_RESET_GPIO and N8X0_BT_WKUP_GPIO
55
+}
38
- * here, but this code has been removed with the bluetooth backend.
56
+
39
- */
57
+static void zcu102_set_virt(Object *obj, bool value, Error **errp)
40
- omap_uart_attach(s->mpu->uart[BT_UART], radio);
58
+{
41
-}
59
+ XlnxZCU102 *s = ZCU102_MACHINE(obj);
42
-
60
+
43
static void n8x0_usb_setup(struct n800_s *s)
61
+ s->virt = value;
62
+}
63
+
64
static void xlnx_zynqmp_init(XlnxZCU102 *s, MachineState *machine)
65
{
44
{
66
int i;
45
SysBusDevice *dev;
67
@@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_init(XlnxZCU102 *s, MachineState *machine)
46
@@ -XXX,XX +XXX,XX @@ static void n8x0_init(MachineState *machine,
68
"ddr-ram", &error_abort);
47
n8x0_spi_setup(s);
69
object_property_set_bool(OBJECT(&s->soc), s->secure, "secure",
48
n8x0_dss_setup(s);
70
&error_fatal);
49
n8x0_cbus_setup(s);
71
+ object_property_set_bool(OBJECT(&s->soc), s->virt, "virtualization",
50
- n8x0_uart_setup(s);
72
+ &error_fatal);
51
if (machine_usb(machine)) {
73
52
n8x0_usb_setup(s);
74
object_property_set_bool(OBJECT(&s->soc), true, "realized", &error_fatal);
53
}
75
76
@@ -XXX,XX +XXX,XX @@ static void xlnx_ep108_machine_instance_init(Object *obj)
77
{
78
XlnxZCU102 *s = EP108_MACHINE(obj);
79
80
- /* EP108, we don't support setting secure */
81
+ /* EP108, we don't support setting secure or virt */
82
s->secure = false;
83
+ s->virt = false;
84
}
85
86
static void xlnx_ep108_machine_class_init(ObjectClass *oc, void *data)
87
@@ -XXX,XX +XXX,XX @@ static void xlnx_zcu102_machine_instance_init(Object *obj)
88
"Set on/off to enable/disable the ARM "
89
"Security Extensions (TrustZone)",
90
NULL);
91
+
92
+ /* Default to virt (EL2) being disabled */
93
+ s->virt = false;
94
+ object_property_add_bool(obj, "virtualization", zcu102_get_virt,
95
+ zcu102_set_virt, NULL);
96
+ object_property_set_description(obj, "virtualization",
97
+ "Set on/off to enable/disable emulating a "
98
+ "guest CPU which implements the ARM "
99
+ "Virtualization Extensions",
100
+ NULL);
101
}
102
103
static void xlnx_zcu102_machine_class_init(ObjectClass *oc, void *data)
104
diff --git a/hw/arm/xlnx-zynqmp.c b/hw/arm/xlnx-zynqmp.c
105
index XXXXXXX..XXXXXXX 100644
106
--- a/hw/arm/xlnx-zynqmp.c
107
+++ b/hw/arm/xlnx-zynqmp.c
108
@@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp)
109
object_property_set_bool(OBJECT(&s->apu_cpu[i]),
110
s->secure, "has_el3", NULL);
111
object_property_set_bool(OBJECT(&s->apu_cpu[i]),
112
- false, "has_el2", NULL);
113
+ s->virt, "has_el2", NULL);
114
object_property_set_int(OBJECT(&s->apu_cpu[i]), GIC_BASE_ADDR,
115
"reset-cbar", &error_abort);
116
object_property_set_bool(OBJECT(&s->apu_cpu[i]), true, "realized",
117
@@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp)
118
static Property xlnx_zynqmp_props[] = {
119
DEFINE_PROP_STRING("boot-cpu", XlnxZynqMPState, boot_cpu),
120
DEFINE_PROP_BOOL("secure", XlnxZynqMPState, secure, false),
121
+ DEFINE_PROP_BOOL("virtualization", XlnxZynqMPState, virt, false),
122
DEFINE_PROP_BOOL("has_rpu", XlnxZynqMPState, has_rpu, false),
123
DEFINE_PROP_LINK("ddr-ram", XlnxZynqMPState, ddr_ram, TYPE_MEMORY_REGION,
124
MemoryRegion *),
125
--
54
--
126
2.7.4
55
2.20.1
127
56
128
57
diff view generated by jsdifflib
1
From: Alistair Francis <alistair.francis@xilinx.com>
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
2
2
3
The EP108 is a early access development board. Now that silicon is in
3
The MusicPal board code connects both of the IRQ outputs of the UART
4
production people have access to the ZCU102. Let's rename the internal
4
to the same INTC qemu_irq. Connecting two qemu_irqs outputs directly
5
QEMU files and variables to use the ZCU102.
5
to the same input is not valid as it produces subtly wrong behaviour
6
(for instance if both the IRQ lines are high, and then one goes
7
low, the INTC input will see this as a high-to-low transition
8
even though the second IRQ line should still be holding it high).
6
9
7
There is no functional change here as the EP108 is still a valid board
10
This kind of wiring needs an explicitly created OR gate; add one.
8
option.
9
11
10
Signed-off-by: Alistair Francis <alistair.francis@xilinx.com>
12
Inspired-by: Peter Maydell <peter.maydell@linaro.org>
11
Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com>
13
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
14
Message-id: 20201107193403.436146-5-f4bug@amsat.org
15
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
---
17
---
14
hw/arm/Makefile.objs | 2 +-
18
hw/arm/musicpal.c | 17 +++++++++++++----
15
hw/arm/{xlnx-ep108.c => xlnx-zcu102.c} | 30 +++++++++++++++---------------
19
hw/arm/Kconfig | 1 +
16
2 files changed, 16 insertions(+), 16 deletions(-)
20
2 files changed, 14 insertions(+), 4 deletions(-)
17
rename hw/arm/{xlnx-ep108.c => xlnx-zcu102.c} (85%)
18
21
19
diff --git a/hw/arm/Makefile.objs b/hw/arm/Makefile.objs
22
diff --git a/hw/arm/musicpal.c b/hw/arm/musicpal.c
20
index XXXXXXX..XXXXXXX 100644
23
index XXXXXXX..XXXXXXX 100644
21
--- a/hw/arm/Makefile.objs
24
--- a/hw/arm/musicpal.c
22
+++ b/hw/arm/Makefile.objs
25
+++ b/hw/arm/musicpal.c
23
@@ -XXX,XX +XXX,XX @@ obj-y += omap1.o omap2.o strongarm.o
26
@@ -XXX,XX +XXX,XX @@
24
obj-$(CONFIG_ALLWINNER_A10) += allwinner-a10.o cubieboard.o
27
#include "ui/console.h"
25
obj-$(CONFIG_RASPI) += bcm2835_peripherals.o bcm2836.o raspi.o
28
#include "hw/i2c/i2c.h"
26
obj-$(CONFIG_STM32F205_SOC) += stm32f205_soc.o
29
#include "hw/irq.h"
27
-obj-$(CONFIG_XLNX_ZYNQMP) += xlnx-zynqmp.o xlnx-ep108.o
30
+#include "hw/or-irq.h"
28
+obj-$(CONFIG_XLNX_ZYNQMP) += xlnx-zynqmp.o xlnx-zcu102.o
31
#include "hw/audio/wm8750.h"
29
obj-$(CONFIG_FSL_IMX25) += fsl-imx25.o imx25_pdk.o
32
#include "sysemu/block-backend.h"
30
obj-$(CONFIG_FSL_IMX31) += fsl-imx31.o kzm.o
33
#include "sysemu/runstate.h"
31
obj-$(CONFIG_FSL_IMX6) += fsl-imx6.o sabrelite.o
34
@@ -XXX,XX +XXX,XX @@
32
diff --git a/hw/arm/xlnx-ep108.c b/hw/arm/xlnx-zcu102.c
35
#define MP_TIMER4_IRQ 7
33
similarity index 85%
36
#define MP_EHCI_IRQ 8
34
rename from hw/arm/xlnx-ep108.c
37
#define MP_ETH_IRQ 9
35
rename to hw/arm/xlnx-zcu102.c
38
-#define MP_UART1_IRQ 11
39
-#define MP_UART2_IRQ 11
40
+#define MP_UART_SHARED_IRQ 11
41
#define MP_GPIO_IRQ 12
42
#define MP_RTC_IRQ 28
43
#define MP_AUDIO_IRQ 30
44
@@ -XXX,XX +XXX,XX @@ static void musicpal_init(MachineState *machine)
45
ARMCPU *cpu;
46
qemu_irq pic[32];
47
DeviceState *dev;
48
+ DeviceState *uart_orgate;
49
DeviceState *i2c_dev;
50
DeviceState *lcd_dev;
51
DeviceState *key_dev;
52
@@ -XXX,XX +XXX,XX @@ static void musicpal_init(MachineState *machine)
53
pic[MP_TIMER2_IRQ], pic[MP_TIMER3_IRQ],
54
pic[MP_TIMER4_IRQ], NULL);
55
56
- serial_mm_init(address_space_mem, MP_UART1_BASE, 2, pic[MP_UART1_IRQ],
57
+ /* Logically OR both UART IRQs together */
58
+ uart_orgate = DEVICE(object_new(TYPE_OR_IRQ));
59
+ object_property_set_int(OBJECT(uart_orgate), "num-lines", 2, &error_fatal);
60
+ qdev_realize_and_unref(uart_orgate, NULL, &error_fatal);
61
+ qdev_connect_gpio_out(DEVICE(uart_orgate), 0, pic[MP_UART_SHARED_IRQ]);
62
+
63
+ serial_mm_init(address_space_mem, MP_UART1_BASE, 2,
64
+ qdev_get_gpio_in(uart_orgate, 0),
65
1825000, serial_hd(0), DEVICE_NATIVE_ENDIAN);
66
- serial_mm_init(address_space_mem, MP_UART2_BASE, 2, pic[MP_UART2_IRQ],
67
+ serial_mm_init(address_space_mem, MP_UART2_BASE, 2,
68
+ qdev_get_gpio_in(uart_orgate, 1),
69
1825000, serial_hd(1), DEVICE_NATIVE_ENDIAN);
70
71
/* Register flash */
72
diff --git a/hw/arm/Kconfig b/hw/arm/Kconfig
36
index XXXXXXX..XXXXXXX 100644
73
index XXXXXXX..XXXXXXX 100644
37
--- a/hw/arm/xlnx-ep108.c
74
--- a/hw/arm/Kconfig
38
+++ b/hw/arm/xlnx-zcu102.c
75
+++ b/hw/arm/Kconfig
39
@@ -XXX,XX +XXX,XX @@
76
@@ -XXX,XX +XXX,XX @@ config MUSCA
40
/*
77
41
- * Xilinx ZynqMP EP108 board
78
config MUSICPAL
42
+ * Xilinx ZynqMP ZCU102 board
79
bool
43
*
80
+ select OR_IRQ
44
* Copyright (C) 2015 Xilinx Inc
81
select BITBANG_I2C
45
* Written by Peter Crosthwaite <peter.crosthwaite@xilinx.com>
82
select MARVELL_88W8618
46
@@ -XXX,XX +XXX,XX @@
83
select PTIMER
47
#include "exec/address-spaces.h"
48
#include "qemu/log.h"
49
50
-typedef struct XlnxEP108 {
51
+typedef struct XlnxZCU102 {
52
XlnxZynqMPState soc;
53
MemoryRegion ddr_ram;
54
-} XlnxEP108;
55
+} XlnxZCU102;
56
57
-static struct arm_boot_info xlnx_ep108_binfo;
58
+static struct arm_boot_info xlnx_zcu102_binfo;
59
60
-static void xlnx_ep108_init(MachineState *machine)
61
+static void xlnx_zcu102_init(MachineState *machine)
62
{
63
- XlnxEP108 *s = g_new0(XlnxEP108, 1);
64
+ XlnxZCU102 *s = g_new0(XlnxZCU102, 1);
65
int i;
66
uint64_t ram_size = machine->ram_size;
67
68
@@ -XXX,XX +XXX,XX @@ static void xlnx_ep108_init(MachineState *machine)
69
}
70
71
if (ram_size < 0x08000000) {
72
- qemu_log("WARNING: RAM size 0x%" PRIx64 " is small for EP108",
73
+ qemu_log("WARNING: RAM size 0x%" PRIx64 " is small for ZCU102",
74
ram_size);
75
}
76
77
@@ -XXX,XX +XXX,XX @@ static void xlnx_ep108_init(MachineState *machine)
78
79
/* TODO create and connect IDE devices for ide_drive_get() */
80
81
- xlnx_ep108_binfo.ram_size = ram_size;
82
- xlnx_ep108_binfo.kernel_filename = machine->kernel_filename;
83
- xlnx_ep108_binfo.kernel_cmdline = machine->kernel_cmdline;
84
- xlnx_ep108_binfo.initrd_filename = machine->initrd_filename;
85
- xlnx_ep108_binfo.loader_start = 0;
86
- arm_load_kernel(s->soc.boot_cpu_ptr, &xlnx_ep108_binfo);
87
+ xlnx_zcu102_binfo.ram_size = ram_size;
88
+ xlnx_zcu102_binfo.kernel_filename = machine->kernel_filename;
89
+ xlnx_zcu102_binfo.kernel_cmdline = machine->kernel_cmdline;
90
+ xlnx_zcu102_binfo.initrd_filename = machine->initrd_filename;
91
+ xlnx_zcu102_binfo.loader_start = 0;
92
+ arm_load_kernel(s->soc.boot_cpu_ptr, &xlnx_zcu102_binfo);
93
}
94
95
static void xlnx_ep108_machine_init(MachineClass *mc)
96
{
97
mc->desc = "Xilinx ZynqMP EP108 board";
98
- mc->init = xlnx_ep108_init;
99
+ mc->init = xlnx_zcu102_init;
100
mc->block_default_type = IF_IDE;
101
mc->units_per_default_bus = 1;
102
mc->ignore_memory_transaction_failures = true;
103
@@ -XXX,XX +XXX,XX @@ DEFINE_MACHINE("xlnx-ep108", xlnx_ep108_machine_init)
104
static void xlnx_zcu102_machine_init(MachineClass *mc)
105
{
106
mc->desc = "Xilinx ZynqMP ZCU102 board";
107
- mc->init = xlnx_ep108_init;
108
+ mc->init = xlnx_zcu102_init;
109
mc->block_default_type = IF_IDE;
110
mc->units_per_default_bus = 1;
111
mc->ignore_memory_transaction_failures = true;
112
--
84
--
113
2.7.4
85
2.20.1
114
86
115
87
diff view generated by jsdifflib
1
The exception-return magic values get some new bits in v8M, which
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
2
makes some bit definitions for them worthwhile.
3
2
4
We don't use the bit definitions for the switch on the low bits
3
We don't need to fill the full pic[] array if we only use
5
which checks the return type for v7M, because this is defined
4
few of the interrupt lines. Directly call qdev_get_gpio_in()
6
in the v7M ARM ARM as a set of valid values rather than via
5
when necessary.
7
per-bit checks.
8
6
7
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
8
Message-id: 20201107193403.436146-6-f4bug@amsat.org
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Reviewed-by: Alistair Francis <alistair.francis@xilinx.com>
11
Message-id: 1505137930-13255-7-git-send-email-peter.maydell@linaro.org
12
---
11
---
13
target/arm/internals.h | 10 ++++++++++
12
hw/arm/musicpal.c | 25 +++++++++++++------------
14
target/arm/helper.c | 14 +++++++++-----
13
1 file changed, 13 insertions(+), 12 deletions(-)
15
2 files changed, 19 insertions(+), 5 deletions(-)
16
14
17
diff --git a/target/arm/internals.h b/target/arm/internals.h
15
diff --git a/hw/arm/musicpal.c b/hw/arm/musicpal.c
18
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
19
--- a/target/arm/internals.h
17
--- a/hw/arm/musicpal.c
20
+++ b/target/arm/internals.h
18
+++ b/hw/arm/musicpal.c
21
@@ -XXX,XX +XXX,XX @@ FIELD(V7M_CONTROL, NPRIV, 0, 1)
19
@@ -XXX,XX +XXX,XX @@ static struct arm_boot_info musicpal_binfo = {
22
FIELD(V7M_CONTROL, SPSEL, 1, 1)
20
static void musicpal_init(MachineState *machine)
23
FIELD(V7M_CONTROL, FPCA, 2, 1)
21
{
24
22
ARMCPU *cpu;
25
+/* Bit definitions for v7M exception return payload */
23
- qemu_irq pic[32];
26
+FIELD(V7M_EXCRET, ES, 0, 1)
24
DeviceState *dev;
27
+FIELD(V7M_EXCRET, RES0, 1, 1)
25
+ DeviceState *pic;
28
+FIELD(V7M_EXCRET, SPSEL, 2, 1)
26
DeviceState *uart_orgate;
29
+FIELD(V7M_EXCRET, MODE, 3, 1)
27
DeviceState *i2c_dev;
30
+FIELD(V7M_EXCRET, FTYPE, 4, 1)
28
DeviceState *lcd_dev;
31
+FIELD(V7M_EXCRET, DCRS, 5, 1)
29
@@ -XXX,XX +XXX,XX @@ static void musicpal_init(MachineState *machine)
32
+FIELD(V7M_EXCRET, S, 6, 1)
30
&error_fatal);
33
+FIELD(V7M_EXCRET, RES1, 7, 25) /* including the must-be-1 prefix */
31
memory_region_add_subregion(address_space_mem, MP_SRAM_BASE, sram);
34
+
32
35
/*
33
- dev = sysbus_create_simple(TYPE_MV88W8618_PIC, MP_PIC_BASE,
36
* For AArch64, map a given EL to an index in the banked_spsr array.
34
+ pic = sysbus_create_simple(TYPE_MV88W8618_PIC, MP_PIC_BASE,
37
* Note that this mapping and the AArch32 mapping defined in bank_number()
35
qdev_get_gpio_in(DEVICE(cpu), ARM_CPU_IRQ));
38
diff --git a/target/arm/helper.c b/target/arm/helper.c
36
- for (i = 0; i < 32; i++) {
39
index XXXXXXX..XXXXXXX 100644
37
- pic[i] = qdev_get_gpio_in(dev, i);
40
--- a/target/arm/helper.c
38
- }
41
+++ b/target/arm/helper.c
39
- sysbus_create_varargs(TYPE_MV88W8618_PIT, MP_PIT_BASE, pic[MP_TIMER1_IRQ],
42
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
40
- pic[MP_TIMER2_IRQ], pic[MP_TIMER3_IRQ],
43
" previous exception %d\n",
41
- pic[MP_TIMER4_IRQ], NULL);
44
type, env->v7m.exception);
42
+ sysbus_create_varargs(TYPE_MV88W8618_PIT, MP_PIT_BASE,
45
43
+ qdev_get_gpio_in(pic, MP_TIMER1_IRQ),
46
- if (extract32(type, 5, 23) != extract32(-1, 5, 23)) {
44
+ qdev_get_gpio_in(pic, MP_TIMER2_IRQ),
47
+ if ((type & R_V7M_EXCRET_RES1_MASK) != R_V7M_EXCRET_RES1_MASK) {
45
+ qdev_get_gpio_in(pic, MP_TIMER3_IRQ),
48
qemu_log_mask(LOG_GUEST_ERROR, "M profile: zero high bits in exception "
46
+ qdev_get_gpio_in(pic, MP_TIMER4_IRQ), NULL);
49
"exit PC value 0x%" PRIx32 " are UNPREDICTABLE\n", type);
47
50
}
48
/* Logically OR both UART IRQs together */
51
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
49
uart_orgate = DEVICE(object_new(TYPE_OR_IRQ));
52
* which security state's faultmask to clear. (v8M ARM ARM R_KBNF.)
50
object_property_set_int(OBJECT(uart_orgate), "num-lines", 2, &error_fatal);
53
*/
51
qdev_realize_and_unref(uart_orgate, NULL, &error_fatal);
54
if (arm_feature(env, ARM_FEATURE_M_SECURITY)) {
52
- qdev_connect_gpio_out(DEVICE(uart_orgate), 0, pic[MP_UART_SHARED_IRQ]);
55
- int es = type & 1;
53
+ qdev_connect_gpio_out(DEVICE(uart_orgate), 0,
56
+ int es = type & R_V7M_EXCRET_ES_MASK;
54
+ qdev_get_gpio_in(pic, MP_UART_SHARED_IRQ));
57
if (armv7m_nvic_raw_execution_priority(env->nvic) >= 0) {
55
58
env->v7m.faultmask[es] = 0;
56
serial_mm_init(address_space_mem, MP_UART1_BASE, 2,
59
}
57
qdev_get_gpio_in(uart_orgate, 0),
60
@@ -XXX,XX +XXX,XX @@ void arm_v7m_cpu_do_interrupt(CPUState *cs)
58
@@ -XXX,XX +XXX,XX @@ static void musicpal_init(MachineState *machine)
61
return; /* Never happens. Keep compiler happy. */
59
OBJECT(get_system_memory()), &error_fatal);
62
}
60
sysbus_realize_and_unref(SYS_BUS_DEVICE(dev), &error_fatal);
63
61
sysbus_mmio_map(SYS_BUS_DEVICE(dev), 0, MP_ETH_BASE);
64
- lr = 0xfffffff1;
62
- sysbus_connect_irq(SYS_BUS_DEVICE(dev), 0, pic[MP_ETH_IRQ]);
65
+ lr = R_V7M_EXCRET_RES1_MASK |
63
+ sysbus_connect_irq(SYS_BUS_DEVICE(dev), 0,
66
+ R_V7M_EXCRET_S_MASK |
64
+ qdev_get_gpio_in(pic, MP_ETH_IRQ));
67
+ R_V7M_EXCRET_DCRS_MASK |
65
68
+ R_V7M_EXCRET_FTYPE_MASK |
66
sysbus_create_simple("mv88w8618_wlan", MP_WLAN_BASE, NULL);
69
+ R_V7M_EXCRET_ES_MASK;
67
70
if (env->v7m.control[env->v7m.secure] & R_V7M_CONTROL_SPSEL_MASK) {
68
sysbus_create_simple(TYPE_MUSICPAL_MISC, MP_MISC_BASE, NULL);
71
- lr |= 4;
69
72
+ lr |= R_V7M_EXCRET_SPSEL_MASK;
70
dev = sysbus_create_simple(TYPE_MUSICPAL_GPIO, MP_GPIO_BASE,
73
}
71
- pic[MP_GPIO_IRQ]);
74
if (!arm_v7m_is_handler_mode(env)) {
72
+ qdev_get_gpio_in(pic, MP_GPIO_IRQ));
75
- lr |= 8;
73
i2c_dev = sysbus_create_simple("gpio_i2c", -1, NULL);
76
+ lr |= R_V7M_EXCRET_MODE_MASK;
74
i2c = (I2CBus *)qdev_get_child_bus(i2c_dev, "i2c");
77
}
75
78
76
@@ -XXX,XX +XXX,XX @@ static void musicpal_init(MachineState *machine)
79
v7m_push_stack(cpu);
77
NULL);
78
sysbus_realize_and_unref(s, &error_fatal);
79
sysbus_mmio_map(s, 0, MP_AUDIO_BASE);
80
- sysbus_connect_irq(s, 0, pic[MP_AUDIO_IRQ]);
81
+ sysbus_connect_irq(s, 0, qdev_get_gpio_in(pic, MP_AUDIO_IRQ));
82
83
musicpal_binfo.ram_size = MP_RAM_DEFAULT_SIZE;
84
arm_load_kernel(cpu, machine, &musicpal_binfo);
80
--
85
--
81
2.7.4
86
2.20.1
82
87
83
88
diff view generated by jsdifflib
1
Use a symbolic constant M_REG_NUM_BANKS for the array size for
1
The nseries machines have a codepath that allows them to load a
2
registers which are banked by M profile security state, rather
2
secondary bootloader. This code wasn't checking that the
3
than hardcoding lots of 2s.
3
load_image_targphys() succeeded. Check the return value and report
4
the error to the user.
4
5
5
Suggested-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
6
While we're in the vicinity, fix the comment style of the
7
comment documenting what this image load is doing.
8
9
Fixes: Coverity CID 1192904
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
11
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
8
Reviewed-by: Alistair Francis <alistair.francis@xilinx.com>
12
Message-id: 20201103114918.11807-1-peter.maydell@linaro.org
9
Message-id: 1505137930-13255-2-git-send-email-peter.maydell@linaro.org
10
---
13
---
11
target/arm/cpu.h | 35 +++++++++++++++++++----------------
14
hw/arm/nseries.c | 15 +++++++++++----
12
1 file changed, 19 insertions(+), 16 deletions(-)
15
1 file changed, 11 insertions(+), 4 deletions(-)
13
16
14
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
17
diff --git a/hw/arm/nseries.c b/hw/arm/nseries.c
15
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
16
--- a/target/arm/cpu.h
19
--- a/hw/arm/nseries.c
17
+++ b/target/arm/cpu.h
20
+++ b/hw/arm/nseries.c
18
@@ -XXX,XX +XXX,XX @@
21
@@ -XXX,XX +XXX,XX @@ static void n8x0_init(MachineState *machine,
19
* accessed via env->registerfield[env->v7m.secure] (whether the security
22
/* No, wait, better start at the ROM. */
20
* extension is implemented or not).
23
s->mpu->cpu->env.regs[15] = OMAP2_Q2_BASE + 0x400000;
21
*/
24
22
-#define M_REG_NS 0
25
- /* This is intended for loading the `secondary.bin' program from
23
-#define M_REG_S 1
26
+ /*
24
+enum {
27
+ * This is intended for loading the `secondary.bin' program from
25
+ M_REG_NS = 0,
28
* Nokia images (the NOLO bootloader). The entry point seems
26
+ M_REG_S = 1,
29
* to be at OMAP2_Q2_BASE + 0x400000.
27
+ M_REG_NUM_BANKS = 2,
30
*
28
+};
31
@@ -XXX,XX +XXX,XX @@ static void n8x0_init(MachineState *machine,
29
32
* for them the entry point needs to be set to OMAP2_SRAM_BASE.
30
/* ARM-specific interrupt pending bits. */
33
*
31
#define CPU_INTERRUPT_FIQ CPU_INTERRUPT_TGT_EXT_1
34
* The code above is for loading the `zImage' file from Nokia
32
@@ -XXX,XX +XXX,XX @@ typedef struct CPUARMState {
35
- * images. */
33
uint32_t other_sp;
36
- load_image_targphys(option_rom[0].name, OMAP2_Q2_BASE + 0x400000,
34
uint32_t other_ss_msp;
37
- machine->ram_size - 0x400000);
35
uint32_t other_ss_psp;
38
+ * images.
36
- uint32_t vecbase[2];
39
+ */
37
- uint32_t basepri[2];
40
+ if (load_image_targphys(option_rom[0].name,
38
- uint32_t control[2];
41
+ OMAP2_Q2_BASE + 0x400000,
39
- uint32_t ccr[2]; /* Configuration and Control */
42
+ machine->ram_size - 0x400000) < 0) {
40
- uint32_t cfsr[2]; /* Configurable Fault Status */
43
+ error_report("Failed to load secondary bootloader %s",
41
+ uint32_t vecbase[M_REG_NUM_BANKS];
44
+ option_rom[0].name);
42
+ uint32_t basepri[M_REG_NUM_BANKS];
45
+ exit(EXIT_FAILURE);
43
+ uint32_t control[M_REG_NUM_BANKS];
46
+ }
44
+ uint32_t ccr[M_REG_NUM_BANKS]; /* Configuration and Control */
47
45
+ uint32_t cfsr[M_REG_NUM_BANKS]; /* Configurable Fault Status */
48
n800_setup_nolo_tags(nolo_tags);
46
uint32_t hfsr; /* HardFault Status */
49
cpu_physical_memory_write(OMAP2_SRAM_BASE, nolo_tags, 0x10000);
47
uint32_t dfsr; /* Debug Fault Status Register */
48
- uint32_t mmfar[2]; /* MemManage Fault Address */
49
+ uint32_t mmfar[M_REG_NUM_BANKS]; /* MemManage Fault Address */
50
uint32_t bfar; /* BusFault Address */
51
- unsigned mpu_ctrl[2]; /* MPU_CTRL */
52
+ unsigned mpu_ctrl[M_REG_NUM_BANKS]; /* MPU_CTRL */
53
int exception;
54
- uint32_t primask[2];
55
- uint32_t faultmask[2];
56
+ uint32_t primask[M_REG_NUM_BANKS];
57
+ uint32_t faultmask[M_REG_NUM_BANKS];
58
uint32_t secure; /* Is CPU in Secure state? (not guest visible) */
59
} v7m;
60
61
@@ -XXX,XX +XXX,XX @@ typedef struct CPUARMState {
62
uint32_t *drbar;
63
uint32_t *drsr;
64
uint32_t *dracr;
65
- uint32_t rnr[2];
66
+ uint32_t rnr[M_REG_NUM_BANKS];
67
} pmsav7;
68
69
/* PMSAv8 MPU */
70
@@ -XXX,XX +XXX,XX @@ typedef struct CPUARMState {
71
* pmsav7.rnr (region number register)
72
* pmsav7_dregion (number of configured regions)
73
*/
74
- uint32_t *rbar[2];
75
- uint32_t *rlar[2];
76
- uint32_t mair0[2];
77
- uint32_t mair1[2];
78
+ uint32_t *rbar[M_REG_NUM_BANKS];
79
+ uint32_t *rlar[M_REG_NUM_BANKS];
80
+ uint32_t mair0[M_REG_NUM_BANKS];
81
+ uint32_t mair1[M_REG_NUM_BANKS];
82
} pmsav8;
83
84
void *nvic;
85
--
50
--
86
2.7.4
51
2.20.1
87
52
88
53
diff view generated by jsdifflib
Deleted patch
1
For a bus fault, the M profile BFSR bit PRECISERR means a bus
2
fault on a data access, and IBUSERR means a bus fault on an
3
instruction access. We had these the wrong way around; fix this.
4
1
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Alistair Francis <alistair.francis@xilinx.com>
7
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 1505137930-13255-4-git-send-email-peter.maydell@linaro.org
9
---
10
target/arm/helper.c | 8 ++++----
11
1 file changed, 4 insertions(+), 4 deletions(-)
12
13
diff --git a/target/arm/helper.c b/target/arm/helper.c
14
index XXXXXXX..XXXXXXX 100644
15
--- a/target/arm/helper.c
16
+++ b/target/arm/helper.c
17
@@ -XXX,XX +XXX,XX @@ void arm_v7m_cpu_do_interrupt(CPUState *cs)
18
case 0x8: /* External Abort */
19
switch (cs->exception_index) {
20
case EXCP_PREFETCH_ABORT:
21
- env->v7m.cfsr[M_REG_NS] |= R_V7M_CFSR_PRECISERR_MASK;
22
- qemu_log_mask(CPU_LOG_INT, "...with CFSR.PRECISERR\n");
23
+ env->v7m.cfsr[M_REG_NS] |= R_V7M_CFSR_IBUSERR_MASK;
24
+ qemu_log_mask(CPU_LOG_INT, "...with CFSR.IBUSERR\n");
25
break;
26
case EXCP_DATA_ABORT:
27
env->v7m.cfsr[M_REG_NS] |=
28
- (R_V7M_CFSR_IBUSERR_MASK | R_V7M_CFSR_BFARVALID_MASK);
29
+ (R_V7M_CFSR_PRECISERR_MASK | R_V7M_CFSR_BFARVALID_MASK);
30
env->v7m.bfar = env->exception.vaddress;
31
qemu_log_mask(CPU_LOG_INT,
32
- "...with CFSR.IBUSERR and BFAR 0x%x\n",
33
+ "...with CFSR.PRECISERR and BFAR 0x%x\n",
34
env->v7m.bfar);
35
break;
36
}
37
--
38
2.7.4
39
40
diff view generated by jsdifflib
1
From: Pranavkumar Sawargaonkar <pranavkumar@linaro.org>
1
From: Havard Skinnemoen <hskinnemoen@google.com>
2
2
3
Now we are able to retrieve the gsi from the INTx pin, let's
3
The number of runs is equal to the number of 0-1 and 1-0 transitions,
4
enable intx_to_irq routing. From that point on, irqfd becomes
4
plus one. Currently, it's counting the number of times these transitions
5
usable along with INTx when assigning a PCIe device.
5
do _not_ happen, plus one.
6
6
7
Signed-off-by: Pranavkumar Sawargaonkar <pranavkumar@linaro.org>
7
Source:
8
Signed-off-by: Tushar Jagad <tushar.jagad@linaro.org>
8
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-22r1a.pdf
9
Signed-off-by: Eric Auger <eric.auger@redhat.com>
9
section 2.3.4 point (3).
10
Reviewed-by: Andrew Jones <drjones@redhat.com>
10
11
Tested-by: Feng Kan <fkan@apm.com>
11
Signed-off-by: Havard Skinnemoen <hskinnemoen@google.com>
12
Message-id: 1505296004-6798-4-git-send-email-eric.auger@redhat.com
12
Message-id: 20201103011457.2959989-2-hskinnemoen@google.com
13
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
---
15
---
15
hw/pci-host/gpex.c | 12 ++++++++++++
16
tests/qtest/npcm7xx_rng-test.c | 2 +-
16
1 file changed, 12 insertions(+)
17
1 file changed, 1 insertion(+), 1 deletion(-)
17
18
18
diff --git a/hw/pci-host/gpex.c b/hw/pci-host/gpex.c
19
diff --git a/tests/qtest/npcm7xx_rng-test.c b/tests/qtest/npcm7xx_rng-test.c
19
index XXXXXXX..XXXXXXX 100644
20
index XXXXXXX..XXXXXXX 100644
20
--- a/hw/pci-host/gpex.c
21
--- a/tests/qtest/npcm7xx_rng-test.c
21
+++ b/hw/pci-host/gpex.c
22
+++ b/tests/qtest/npcm7xx_rng-test.c
22
@@ -XXX,XX +XXX,XX @@ int gpex_set_irq_num(GPEXHost *s, int index, int gsi)
23
@@ -XXX,XX +XXX,XX @@ static double calc_runs_p(const unsigned long *buf, unsigned int nr_bits)
23
return 0;
24
pi = (double)nr_ones / nr_bits;
24
}
25
25
26
for (k = 0; k < nr_bits - 1; k++) {
26
+static PCIINTxRoute gpex_route_intx_pin_to_irq(void *opaque, int pin)
27
- vn_obs += !(test_bit(k, buf) ^ test_bit(k + 1, buf));
27
+{
28
+ vn_obs += (test_bit(k, buf) ^ test_bit(k + 1, buf));
28
+ PCIINTxRoute route;
29
}
29
+ GPEXHost *s = opaque;
30
vn_obs += 1;
30
+
31
+ route.mode = PCI_INTX_ENABLED;
32
+ route.irq = s->irq_num[pin];
33
+
34
+ return route;
35
+}
36
+
37
static void gpex_host_realize(DeviceState *dev, Error **errp)
38
{
39
PCIHostState *pci = PCI_HOST_BRIDGE(dev);
40
@@ -XXX,XX +XXX,XX @@ static void gpex_host_realize(DeviceState *dev, Error **errp)
41
&s->io_ioport, 0, 4, TYPE_PCIE_BUS);
42
43
qdev_set_parent_bus(DEVICE(&s->gpex_root), BUS(pci->bus));
44
+ pci_bus_set_route_irq_fn(pci->bus, gpex_route_intx_pin_to_irq);
45
qdev_init_nofail(DEVICE(&s->gpex_root));
46
}
47
31
48
--
32
--
49
2.7.4
33
2.20.1
50
34
51
35
diff view generated by jsdifflib
1
In several places we were unconditionally applying the
1
Checks for UNDEF cases should go before the "is VFP enabled?" access
2
nvic_gprio_mask() to a priority value. This is incorrect
2
check, except in special cases. Move a stray UNDEF check in the VTBL
3
if the priority is one of the fixed negative priority
3
trans function up above the access check.
4
values (for NMI and HardFault), so don't do it.
5
6
This bug would have caused both NMI and HardFault to be
7
considered as the same priority and so NMI wouldn't
8
correctly preempt HardFault.
9
4
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
6
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
12
Message-id: 1505137930-13255-5-git-send-email-peter.maydell@linaro.org
7
Message-id: 20201109145324.2859-1-peter.maydell@linaro.org
13
---
8
---
14
hw/intc/armv7m_nvic.c | 11 +++++++++--
9
target/arm/translate-neon.c.inc | 8 ++++----
15
1 file changed, 9 insertions(+), 2 deletions(-)
10
1 file changed, 4 insertions(+), 4 deletions(-)
16
11
17
diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c
12
diff --git a/target/arm/translate-neon.c.inc b/target/arm/translate-neon.c.inc
18
index XXXXXXX..XXXXXXX 100644
13
index XXXXXXX..XXXXXXX 100644
19
--- a/hw/intc/armv7m_nvic.c
14
--- a/target/arm/translate-neon.c.inc
20
+++ b/hw/intc/armv7m_nvic.c
15
+++ b/target/arm/translate-neon.c.inc
21
@@ -XXX,XX +XXX,XX @@ static void nvic_recompute_state(NVICState *s)
16
@@ -XXX,XX +XXX,XX @@ static bool trans_VTBL(DisasContext *s, arg_VTBL *a)
22
}
17
return false;
23
}
18
}
24
19
25
+ if (active_prio > 0) {
20
- if (!vfp_access_check(s)) {
26
+ active_prio &= nvic_gprio_mask(s);
21
- return true;
22
- }
23
-
24
if ((a->vn + a->len + 1) > 32) {
25
/*
26
* This is UNPREDICTABLE; we choose to UNDEF to avoid the
27
@@ -XXX,XX +XXX,XX @@ static bool trans_VTBL(DisasContext *s, arg_VTBL *a)
28
return false;
29
}
30
31
+ if (!vfp_access_check(s)) {
32
+ return true;
27
+ }
33
+ }
28
+
34
+
29
s->vectpending = pend_irq;
35
desc = tcg_const_i32((a->vn << 2) | a->len);
30
- s->exception_prio = active_prio & nvic_gprio_mask(s);
36
def = tcg_temp_new_i64();
31
+ s->exception_prio = active_prio;
37
if (a->op) {
32
33
trace_nvic_recompute_state(s->vectpending, s->exception_prio);
34
}
35
@@ -XXX,XX +XXX,XX @@ void armv7m_nvic_acknowledge_irq(void *opaque)
36
assert(vec->enabled);
37
assert(vec->pending);
38
39
- pendgroupprio = vec->prio & nvic_gprio_mask(s);
40
+ pendgroupprio = vec->prio;
41
+ if (pendgroupprio > 0) {
42
+ pendgroupprio &= nvic_gprio_mask(s);
43
+ }
44
assert(pendgroupprio < running);
45
46
trace_nvic_acknowledge_irq(pending, vec->prio);
47
--
38
--
48
2.7.4
39
2.20.1
49
40
50
41
diff view generated by jsdifflib
Deleted patch
1
In do_v7m_exception_exit(), there's no need to force the high 4
2
bits of 'type' to 1 when calling v7m_exception_taken(), because
3
we know that they're always 1 or we could not have got to this
4
"handle return to magic exception return address" code. Remove
5
the unnecessary ORs.
6
1
7
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
9
Acked-by: Alistair Francis <alistair.francis@xilinx.com>
10
Message-id: 1505137930-13255-6-git-send-email-peter.maydell@linaro.org
11
---
12
target/arm/helper.c | 4 ++--
13
1 file changed, 2 insertions(+), 2 deletions(-)
14
15
diff --git a/target/arm/helper.c b/target/arm/helper.c
16
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/helper.c
18
+++ b/target/arm/helper.c
19
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
20
*/
21
env->v7m.cfsr[env->v7m.secure] |= R_V7M_CFSR_INVPC_MASK;
22
armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE);
23
- v7m_exception_taken(cpu, type | 0xf0000000);
24
+ v7m_exception_taken(cpu, type);
25
qemu_log_mask(CPU_LOG_INT, "...taking UsageFault on existing "
26
"stackframe: failed exception return integrity check\n");
27
return;
28
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
29
armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE);
30
env->v7m.cfsr[env->v7m.secure] |= R_V7M_CFSR_INVPC_MASK;
31
v7m_push_stack(cpu);
32
- v7m_exception_taken(cpu, type | 0xf0000000);
33
+ v7m_exception_taken(cpu, type);
34
qemu_log_mask(CPU_LOG_INT, "...taking UsageFault on new stackframe: "
35
"failed exception return integrity check\n");
36
return;
37
--
38
2.7.4
39
40
diff view generated by jsdifflib