1
target-arm queue:
1
Nothing too exciting, but does include the last bits of v8.1M support work.
2
* mostly my latest v8M stuff, plus a couple of minor patches
3
2
4
The following changes since commit a0b261db8c030813e30a39eae47359ac2a37f7e2:
3
-- PMM
5
4
6
Merge remote-tracking branch 'remotes/ehabkost/tags/python-next-pull-request' into staging (2017-10-12 10:02:09 +0100)
5
The following changes since commit e79de63ab1bd1f6550e7b915e433bec1ad1a870a:
7
6
8
are available in the git repository at:
7
Merge remote-tracking branch 'remotes/rth-gitlab/tags/pull-tcg-20210107' into staging (2021-01-07 20:34:05 +0000)
9
8
10
git://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20171012
9
are available in the Git repository at:
11
10
12
for you to fetch changes up to cf5f7937b05c84d5565134f058c00cd48304a117:
11
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20210108
13
12
14
nvic: Fix miscalculation of offsets into ITNS array (2017-10-12 16:33:16 +0100)
13
for you to fetch changes up to c9f8511ea8d2b80723af0fea1f716d752c1b5208:
14
15
docs/system: arm: Add sabrelite board description (2021-01-08 15:13:39 +0000)
15
16
16
----------------------------------------------------------------
17
----------------------------------------------------------------
17
target-arm queue:
18
target-arm queue:
18
* v8M: SG, BLXNS, secure-return
19
* intc/arm_gic: Fix gic_irq_signaling_enabled() for vCPUs
19
* v8M: fixes for coverity issues in previous patches
20
* target/arm: Fix MTE0_ACTIVE
20
* arm: fix armv7m_init() declaration to match definition
21
* target/arm: Implement v8.1M and Cortex-M55 model
21
* watchdog/aspeed: fix variable type to store reload value
22
* hw/arm/highbank: Drop dead KVM support code
23
* util/qemu-timer: Make timer_free() imply timer_del()
24
* various devices: Use ptimer_free() in finalize function
25
* docs/system: arm: Add sabrelite board description
26
* sabrelite: Minor fixes to allow booting U-Boot
22
27
23
----------------------------------------------------------------
28
----------------------------------------------------------------
24
Cédric Le Goater (1):
29
Andrew Jones (1):
25
watchdog/aspeed: fix variable type to store reload value
30
hw/arm/virt: Remove virt machine state 'smp_cpus'
26
31
27
Igor Mammedov (1):
32
Bin Meng (4):
28
arm: fix armv7m_init() declaration to match definition
33
hw/misc: imx6_ccm: Update PMU_MISC0 reset value
34
hw/msic: imx6_ccm: Correct register value for silicon type
35
hw/arm: sabrelite: Connect the Ethernet PHY at address 6
36
docs/system: arm: Add sabrelite board description
29
37
30
Peter Maydell (11):
38
Edgar E. Iglesias (1):
31
target/arm: Add M profile secure MMU index values to get_a32_user_mem_index()
39
intc/arm_gic: Fix gic_irq_signaling_enabled() for vCPUs
32
target/arm: Implement SG instruction
33
target/arm: Implement BLXNS
34
target/arm: Implement secure function return
35
target-arm: Don't check for "Thumb2 or M profile" for not-Thumb1
36
target/arm: Pull Thumb insn word loads up to top level
37
target-arm: Simplify insn_crosses_page()
38
target/arm: Support some Thumb insns being always unconditional
39
target/arm: Implement SG instruction corner cases
40
nvic: Add missing 'break'
41
nvic: Fix miscalculation of offsets into ITNS array
42
40
43
include/hw/arm/arm.h | 2 +-
41
Gan Qixin (7):
44
target/arm/helper.h | 1 +
42
digic-timer: Use ptimer_free() in the finalize function to avoid memleaks
45
target/arm/internals.h | 8 ++
43
allwinner-a10-pit: Use ptimer_free() in the finalize function to avoid memleaks
46
hw/intc/armv7m_nvic.c | 5 +-
44
exynos4210_rtc: Use ptimer_free() in the finalize function to avoid memleaks
47
hw/watchdog/wdt_aspeed.c | 4 +-
45
exynos4210_pwm: Use ptimer_free() in the finalize function to avoid memleaks
48
target/arm/helper.c | 306 ++++++++++++++++++++++++++++++++++++++++++++--
46
mss-timer: Use ptimer_free() in the finalize function to avoid memleaks
49
target/arm/translate.c | 310 ++++++++++++++++++++++++++++++++---------------
47
musicpal: Use ptimer_free() in the finalize function to avoid memleaks
50
7 files changed, 521 insertions(+), 115 deletions(-)
48
exynos4210_mct: Use ptimer_free() in the finalize function to avoid memleaks
51
49
50
Peter Maydell (9):
51
hw/intc/armv7m_nvic: Correct handling of CCR.BFHFNMIGN
52
target/arm: Correct store of FPSCR value via FPCXT_S
53
target/arm: Implement FPCXT_NS fp system register
54
target/arm: Implement Cortex-M55 model
55
hw/arm/highbank: Drop dead KVM support code
56
util/qemu-timer: Make timer_free() imply timer_del()
57
scripts/coccinelle: New script to remove unnecessary timer_del() calls
58
Remove superfluous timer_del() calls
59
target/arm: Remove timer_del()/timer_deinit() before timer_free()
60
61
Richard Henderson (1):
62
target/arm: Fix MTE0_ACTIVE
63
64
docs/system/arm/sabrelite.rst | 119 ++++++++++++++++++++++++++
65
docs/system/target-arm.rst | 1 +
66
scripts/coccinelle/timer-del-timer-free.cocci | 18 ++++
67
include/hw/arm/virt.h | 3 +-
68
include/qemu/timer.h | 24 +++---
69
block/iscsi.c | 2 -
70
block/nbd.c | 1 -
71
block/qcow2.c | 1 -
72
hw/arm/highbank.c | 14 +--
73
hw/arm/musicpal.c | 12 +++
74
hw/arm/sabrelite.c | 4 +
75
hw/arm/virt-acpi-build.c | 9 +-
76
hw/arm/virt.c | 21 +++--
77
hw/block/nvme.c | 2 -
78
hw/char/serial.c | 2 -
79
hw/char/virtio-serial-bus.c | 2 -
80
hw/ide/core.c | 1 -
81
hw/input/hid.c | 1 -
82
hw/intc/apic.c | 1 -
83
hw/intc/arm_gic.c | 4 +-
84
hw/intc/armv7m_nvic.c | 15 ++++
85
hw/intc/ioapic.c | 1 -
86
hw/ipmi/ipmi_bmc_extern.c | 1 -
87
hw/misc/imx6_ccm.c | 4 +-
88
hw/net/e1000.c | 3 -
89
hw/net/e1000e_core.c | 8 --
90
hw/net/pcnet-pci.c | 1 -
91
hw/net/rtl8139.c | 1 -
92
hw/net/spapr_llan.c | 1 -
93
hw/net/virtio-net.c | 2 -
94
hw/rtc/exynos4210_rtc.c | 9 ++
95
hw/s390x/s390-pci-inst.c | 1 -
96
hw/sd/sd.c | 1 -
97
hw/sd/sdhci.c | 2 -
98
hw/timer/allwinner-a10-pit.c | 11 +++
99
hw/timer/digic-timer.c | 8 ++
100
hw/timer/exynos4210_mct.c | 14 +++
101
hw/timer/exynos4210_pwm.c | 11 +++
102
hw/timer/mss-timer.c | 13 +++
103
hw/usb/dev-hub.c | 1 -
104
hw/usb/hcd-ehci.c | 1 -
105
hw/usb/hcd-ohci-pci.c | 1 -
106
hw/usb/hcd-uhci.c | 1 -
107
hw/usb/hcd-xhci.c | 1 -
108
hw/usb/redirect.c | 1 -
109
hw/vfio/display.c | 1 -
110
hw/virtio/vhost-vsock-common.c | 1 -
111
hw/virtio/virtio-balloon.c | 1 -
112
hw/virtio/virtio-rng.c | 1 -
113
hw/watchdog/wdt_diag288.c | 1 -
114
hw/watchdog/wdt_i6300esb.c | 1 -
115
migration/colo.c | 1 -
116
monitor/hmp-cmds.c | 1 -
117
net/announce.c | 1 -
118
net/colo-compare.c | 1 -
119
net/slirp.c | 1 -
120
replay/replay-debugging.c | 1 -
121
target/arm/cpu.c | 2 -
122
target/arm/cpu_tcg.c | 42 +++++++++
123
target/arm/helper.c | 2 +-
124
target/s390x/cpu.c | 2 -
125
ui/console.c | 1 -
126
ui/spice-core.c | 1 -
127
util/throttle.c | 1 -
128
target/arm/translate-vfp.c.inc | 114 ++++++++++++++++++++++--
129
65 files changed, 421 insertions(+), 111 deletions(-)
130
create mode 100644 docs/system/arm/sabrelite.rst
131
create mode 100644 scripts/coccinelle/timer-del-timer-free.cocci
132
diff view generated by jsdifflib
New patch
1
From: "Edgar E. Iglesias" <edgar.iglesias@xilinx.com>
1
2
3
Correct the indexing into s->cpu_ctlr for vCPUs.
4
5
Signed-off-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com>
6
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
7
Reviewed-by: Luc Michel <luc.michel@greensocs.com>
8
Message-id: 20201214222154.3480243-2-edgar.iglesias@gmail.com
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
hw/intc/arm_gic.c | 4 +++-
12
1 file changed, 3 insertions(+), 1 deletion(-)
13
14
diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c
15
index XXXXXXX..XXXXXXX 100644
16
--- a/hw/intc/arm_gic.c
17
+++ b/hw/intc/arm_gic.c
18
@@ -XXX,XX +XXX,XX @@ static inline void gic_get_best_virq(GICState *s, int cpu,
19
static inline bool gic_irq_signaling_enabled(GICState *s, int cpu, bool virt,
20
int group_mask)
21
{
22
+ int cpu_iface = virt ? (cpu + GIC_NCPU) : cpu;
23
+
24
if (!virt && !(s->ctlr & group_mask)) {
25
return false;
26
}
27
@@ -XXX,XX +XXX,XX @@ static inline bool gic_irq_signaling_enabled(GICState *s, int cpu, bool virt,
28
return false;
29
}
30
31
- if (!(s->cpu_ctlr[cpu] & group_mask)) {
32
+ if (!(s->cpu_ctlr[cpu_iface] & group_mask)) {
33
return false;
34
}
35
36
--
37
2.20.1
38
39
diff view generated by jsdifflib
New patch
1
From: Andrew Jones <drjones@redhat.com>
1
2
3
virt machine's 'smp_cpus' and machine->smp.cpus must always have the
4
same value. And, anywhere we have virt machine state we have machine
5
state. So let's remove the redundancy. Also, to make it easier to see
6
that machine->smp is the true source for "smp_cpus" and "max_cpus",
7
avoid passing them in function parameters, preferring instead to get
8
them from the state.
9
10
No functional change intended.
11
12
Signed-off-by: Andrew Jones <drjones@redhat.com>
13
Reviewed-by: David Edmondson <david.edmondson@oracle.com>
14
Reviewed-by: Ying Fang <fangying1@huawei.com>
15
Message-id: 20201215174815.51520-1-drjones@redhat.com
16
[PMM: minor formatting tweak to smp_cpus variable declaration]
17
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
18
---
19
include/hw/arm/virt.h | 3 +--
20
hw/arm/virt-acpi-build.c | 9 +++++----
21
hw/arm/virt.c | 21 ++++++++++-----------
22
3 files changed, 16 insertions(+), 17 deletions(-)
23
24
diff --git a/include/hw/arm/virt.h b/include/hw/arm/virt.h
25
index XXXXXXX..XXXXXXX 100644
26
--- a/include/hw/arm/virt.h
27
+++ b/include/hw/arm/virt.h
28
@@ -XXX,XX +XXX,XX @@ struct VirtMachineState {
29
MemMapEntry *memmap;
30
char *pciehb_nodename;
31
const int *irqmap;
32
- int smp_cpus;
33
void *fdt;
34
int fdt_size;
35
uint32_t clock_phandle;
36
@@ -XXX,XX +XXX,XX @@ static inline int virt_gicv3_redist_region_count(VirtMachineState *vms)
37
38
assert(vms->gic_version == VIRT_GIC_VERSION_3);
39
40
- return vms->smp_cpus > redist0_capacity ? 2 : 1;
41
+ return MACHINE(vms)->smp.cpus > redist0_capacity ? 2 : 1;
42
}
43
44
#endif /* QEMU_ARM_VIRT_H */
45
diff --git a/hw/arm/virt-acpi-build.c b/hw/arm/virt-acpi-build.c
46
index XXXXXXX..XXXXXXX 100644
47
--- a/hw/arm/virt-acpi-build.c
48
+++ b/hw/arm/virt-acpi-build.c
49
@@ -XXX,XX +XXX,XX @@
50
51
#define ACPI_BUILD_TABLE_SIZE 0x20000
52
53
-static void acpi_dsdt_add_cpus(Aml *scope, int smp_cpus)
54
+static void acpi_dsdt_add_cpus(Aml *scope, VirtMachineState *vms)
55
{
56
+ MachineState *ms = MACHINE(vms);
57
uint16_t i;
58
59
- for (i = 0; i < smp_cpus; i++) {
60
+ for (i = 0; i < ms->smp.cpus; i++) {
61
Aml *dev = aml_device("C%.03X", i);
62
aml_append(dev, aml_name_decl("_HID", aml_string("ACPI0007")));
63
aml_append(dev, aml_name_decl("_UID", aml_int(i)));
64
@@ -XXX,XX +XXX,XX @@ build_madt(GArray *table_data, BIOSLinker *linker, VirtMachineState *vms)
65
gicd->base_address = cpu_to_le64(memmap[VIRT_GIC_DIST].base);
66
gicd->version = vms->gic_version;
67
68
- for (i = 0; i < vms->smp_cpus; i++) {
69
+ for (i = 0; i < MACHINE(vms)->smp.cpus; i++) {
70
AcpiMadtGenericCpuInterface *gicc = acpi_data_push(table_data,
71
sizeof(*gicc));
72
ARMCPU *armcpu = ARM_CPU(qemu_get_cpu(i));
73
@@ -XXX,XX +XXX,XX @@ build_dsdt(GArray *table_data, BIOSLinker *linker, VirtMachineState *vms)
74
* the RTC ACPI device at all when using UEFI.
75
*/
76
scope = aml_scope("\\_SB");
77
- acpi_dsdt_add_cpus(scope, vms->smp_cpus);
78
+ acpi_dsdt_add_cpus(scope, vms);
79
acpi_dsdt_add_uart(scope, &memmap[VIRT_UART],
80
(irqmap[VIRT_UART] + ARM_SPI_BASE));
81
if (vmc->acpi_expose_flash) {
82
diff --git a/hw/arm/virt.c b/hw/arm/virt.c
83
index XXXXXXX..XXXXXXX 100644
84
--- a/hw/arm/virt.c
85
+++ b/hw/arm/virt.c
86
@@ -XXX,XX +XXX,XX @@ static void fdt_add_timer_nodes(const VirtMachineState *vms)
87
if (vms->gic_version == VIRT_GIC_VERSION_2) {
88
irqflags = deposit32(irqflags, GIC_FDT_IRQ_PPI_CPU_START,
89
GIC_FDT_IRQ_PPI_CPU_WIDTH,
90
- (1 << vms->smp_cpus) - 1);
91
+ (1 << MACHINE(vms)->smp.cpus) - 1);
92
}
93
94
qemu_fdt_add_subnode(vms->fdt, "/timer");
95
@@ -XXX,XX +XXX,XX @@ static void fdt_add_cpu_nodes(const VirtMachineState *vms)
96
int cpu;
97
int addr_cells = 1;
98
const MachineState *ms = MACHINE(vms);
99
+ int smp_cpus = ms->smp.cpus;
100
101
/*
102
* From Documentation/devicetree/bindings/arm/cpus.txt
103
@@ -XXX,XX +XXX,XX @@ static void fdt_add_cpu_nodes(const VirtMachineState *vms)
104
* The simplest way to go is to examine affinity IDs of all our CPUs. If
105
* at least one of them has Aff3 populated, we set #address-cells to 2.
106
*/
107
- for (cpu = 0; cpu < vms->smp_cpus; cpu++) {
108
+ for (cpu = 0; cpu < smp_cpus; cpu++) {
109
ARMCPU *armcpu = ARM_CPU(qemu_get_cpu(cpu));
110
111
if (armcpu->mp_affinity & ARM_AFF3_MASK) {
112
@@ -XXX,XX +XXX,XX @@ static void fdt_add_cpu_nodes(const VirtMachineState *vms)
113
qemu_fdt_setprop_cell(vms->fdt, "/cpus", "#address-cells", addr_cells);
114
qemu_fdt_setprop_cell(vms->fdt, "/cpus", "#size-cells", 0x0);
115
116
- for (cpu = vms->smp_cpus - 1; cpu >= 0; cpu--) {
117
+ for (cpu = smp_cpus - 1; cpu >= 0; cpu--) {
118
char *nodename = g_strdup_printf("/cpus/cpu@%d", cpu);
119
ARMCPU *armcpu = ARM_CPU(qemu_get_cpu(cpu));
120
CPUState *cs = CPU(armcpu);
121
@@ -XXX,XX +XXX,XX @@ static void fdt_add_cpu_nodes(const VirtMachineState *vms)
122
qemu_fdt_setprop_string(vms->fdt, nodename, "compatible",
123
armcpu->dtb_compatible);
124
125
- if (vms->psci_conduit != QEMU_PSCI_CONDUIT_DISABLED
126
- && vms->smp_cpus > 1) {
127
+ if (vms->psci_conduit != QEMU_PSCI_CONDUIT_DISABLED && smp_cpus > 1) {
128
qemu_fdt_setprop_string(vms->fdt, nodename,
129
"enable-method", "psci");
130
}
131
@@ -XXX,XX +XXX,XX @@ static void fdt_add_pmu_nodes(const VirtMachineState *vms)
132
if (vms->gic_version == VIRT_GIC_VERSION_2) {
133
irqflags = deposit32(irqflags, GIC_FDT_IRQ_PPI_CPU_START,
134
GIC_FDT_IRQ_PPI_CPU_WIDTH,
135
- (1 << vms->smp_cpus) - 1);
136
+ (1 << MACHINE(vms)->smp.cpus) - 1);
137
}
138
139
qemu_fdt_add_subnode(vms->fdt, "/pmu");
140
@@ -XXX,XX +XXX,XX @@ static void finalize_gic_version(VirtMachineState *vms)
141
* virt_cpu_post_init() must be called after the CPUs have
142
* been realized and the GIC has been created.
143
*/
144
-static void virt_cpu_post_init(VirtMachineState *vms, int max_cpus,
145
- MemoryRegion *sysmem)
146
+static void virt_cpu_post_init(VirtMachineState *vms, MemoryRegion *sysmem)
147
{
148
+ int max_cpus = MACHINE(vms)->smp.max_cpus;
149
bool aarch64, pmu, steal_time;
150
CPUState *cpu;
151
152
@@ -XXX,XX +XXX,XX @@ static void machvirt_init(MachineState *machine)
153
exit(1);
154
}
155
156
- vms->smp_cpus = smp_cpus;
157
-
158
if (vms->virt && kvm_enabled()) {
159
error_report("mach-virt: KVM does not support providing "
160
"Virtualization extensions to the guest CPU");
161
@@ -XXX,XX +XXX,XX @@ static void machvirt_init(MachineState *machine)
162
create_fdt(vms);
163
164
possible_cpus = mc->possible_cpu_arch_ids(machine);
165
+ assert(possible_cpus->len == max_cpus);
166
for (n = 0; n < possible_cpus->len; n++) {
167
Object *cpuobj;
168
CPUState *cs;
169
@@ -XXX,XX +XXX,XX @@ static void machvirt_init(MachineState *machine)
170
171
create_gic(vms);
172
173
- virt_cpu_post_init(vms, possible_cpus->len, sysmem);
174
+ virt_cpu_post_init(vms, sysmem);
175
176
fdt_add_pmu_nodes(vms);
177
178
--
179
2.20.1
180
181
diff view generated by jsdifflib
1
Secure function return happens when a non-secure function has been
1
From: Richard Henderson <richard.henderson@linaro.org>
2
called using BLXNS and so has a particular magic LR value (either
3
0xfefffffe or 0xfeffffff). The function return via BX behaves
4
specially when the new PC value is this magic value, in the same
5
way that exception returns are handled.
6
2
7
Adjust our BX excret guards so that they recognize the function
3
In 50244cc76abc we updated mte_check_fail to match the ARM
8
return magic number as well, and perform the function-return
4
pseudocode, using the correct EL to select the TCF field.
9
unstacking in do_v7m_exception_exit().
5
But we failed to update MTE0_ACTIVE the same way, which led
6
to g_assert_not_reached().
10
7
8
Cc: qemu-stable@nongnu.org
9
Buglink: https://bugs.launchpad.net/bugs/1907137
10
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
11
Message-id: 20201221204426.88514-1-richard.henderson@linaro.org
12
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Acked-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
13
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
14
Message-id: 1507556919-24992-5-git-send-email-peter.maydell@linaro.org
15
---
14
---
16
target/arm/internals.h | 7 +++
15
target/arm/helper.c | 2 +-
17
target/arm/helper.c | 115 +++++++++++++++++++++++++++++++++++++++++++++----
16
1 file changed, 1 insertion(+), 1 deletion(-)
18
target/arm/translate.c | 14 +++++-
19
3 files changed, 126 insertions(+), 10 deletions(-)
20
17
21
diff --git a/target/arm/internals.h b/target/arm/internals.h
22
index XXXXXXX..XXXXXXX 100644
23
--- a/target/arm/internals.h
24
+++ b/target/arm/internals.h
25
@@ -XXX,XX +XXX,XX @@ FIELD(V7M_EXCRET, DCRS, 5, 1)
26
FIELD(V7M_EXCRET, S, 6, 1)
27
FIELD(V7M_EXCRET, RES1, 7, 25) /* including the must-be-1 prefix */
28
29
+/* Minimum value which is a magic number for exception return */
30
+#define EXC_RETURN_MIN_MAGIC 0xff000000
31
+/* Minimum number which is a magic number for function or exception return
32
+ * when using v8M security extension
33
+ */
34
+#define FNC_RETURN_MIN_MAGIC 0xfefffffe
35
+
36
/* We use a few fake FSR values for internal purposes in M profile.
37
* M profile cores don't have A/R format FSRs, but currently our
38
* get_phys_addr() code assumes A/R profile and reports failures via
39
diff --git a/target/arm/helper.c b/target/arm/helper.c
18
diff --git a/target/arm/helper.c b/target/arm/helper.c
40
index XXXXXXX..XXXXXXX 100644
19
index XXXXXXX..XXXXXXX 100644
41
--- a/target/arm/helper.c
20
--- a/target/arm/helper.c
42
+++ b/target/arm/helper.c
21
+++ b/target/arm/helper.c
43
@@ -XXX,XX +XXX,XX @@ void HELPER(v7m_bxns)(CPUARMState *env, uint32_t dest)
22
@@ -XXX,XX +XXX,XX @@ static uint32_t rebuild_hflags_a64(CPUARMState *env, int el, int fp_el,
44
* - if the return value is a magic value, do exception return (like BX)
23
if (FIELD_EX32(flags, TBFLAG_A64, UNPRIV)
45
* - otherwise bit 0 of the return value is the target security state
24
&& tbid
46
*/
25
&& !(env->pstate & PSTATE_TCO)
47
- if (dest >= 0xff000000) {
26
- && (sctlr & SCTLR_TCF0)
48
+ uint32_t min_magic;
27
+ && (sctlr & SCTLR_TCF)
49
+
28
&& allocation_tag_access_enabled(env, 0, sctlr)) {
50
+ if (arm_feature(env, ARM_FEATURE_M_SECURITY)) {
29
flags = FIELD_DP32(flags, TBFLAG_A64, MTE0_ACTIVE, 1);
51
+ /* Covers FNC_RETURN and EXC_RETURN magic */
30
}
52
+ min_magic = FNC_RETURN_MIN_MAGIC;
53
+ } else {
54
+ /* EXC_RETURN magic only */
55
+ min_magic = EXC_RETURN_MIN_MAGIC;
56
+ }
57
+
58
+ if (dest >= min_magic) {
59
/* This is an exception return magic value; put it where
60
* do_v7m_exception_exit() expects and raise EXCEPTION_EXIT.
61
* Note that if we ever add gen_ss_advance() singlestep support to
62
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
63
bool exc_secure = false;
64
bool return_to_secure;
65
66
- /* We can only get here from an EXCP_EXCEPTION_EXIT, and
67
- * gen_bx_excret() enforces the architectural rule
68
- * that jumps to magic addresses don't have magic behaviour unless
69
- * we're in Handler mode (compare pseudocode BXWritePC()).
70
+ /* If we're not in Handler mode then jumps to magic exception-exit
71
+ * addresses don't have magic behaviour. However for the v8M
72
+ * security extensions the magic secure-function-return has to
73
+ * work in thread mode too, so to avoid doing an extra check in
74
+ * the generated code we allow exception-exit magic to also cause the
75
+ * internal exception and bring us here in thread mode. Correct code
76
+ * will never try to do this (the following insn fetch will always
77
+ * fault) so we the overhead of having taken an unnecessary exception
78
+ * doesn't matter.
79
*/
80
- assert(arm_v7m_is_handler_mode(env));
81
+ if (!arm_v7m_is_handler_mode(env)) {
82
+ return;
83
+ }
84
85
/* In the spec pseudocode ExceptionReturn() is called directly
86
* from BXWritePC() and gets the full target PC value including
87
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
88
qemu_log_mask(CPU_LOG_INT, "...successful exception return\n");
89
}
90
91
+static bool do_v7m_function_return(ARMCPU *cpu)
92
+{
93
+ /* v8M security extensions magic function return.
94
+ * We may either:
95
+ * (1) throw an exception (longjump)
96
+ * (2) return true if we successfully handled the function return
97
+ * (3) return false if we failed a consistency check and have
98
+ * pended a UsageFault that needs to be taken now
99
+ *
100
+ * At this point the magic return value is split between env->regs[15]
101
+ * and env->thumb. We don't bother to reconstitute it because we don't
102
+ * need it (all values are handled the same way).
103
+ */
104
+ CPUARMState *env = &cpu->env;
105
+ uint32_t newpc, newpsr, newpsr_exc;
106
+
107
+ qemu_log_mask(CPU_LOG_INT, "...really v7M secure function return\n");
108
+
109
+ {
110
+ bool threadmode, spsel;
111
+ TCGMemOpIdx oi;
112
+ ARMMMUIdx mmu_idx;
113
+ uint32_t *frame_sp_p;
114
+ uint32_t frameptr;
115
+
116
+ /* Pull the return address and IPSR from the Secure stack */
117
+ threadmode = !arm_v7m_is_handler_mode(env);
118
+ spsel = env->v7m.control[M_REG_S] & R_V7M_CONTROL_SPSEL_MASK;
119
+
120
+ frame_sp_p = get_v7m_sp_ptr(env, true, threadmode, spsel);
121
+ frameptr = *frame_sp_p;
122
+
123
+ /* These loads may throw an exception (for MPU faults). We want to
124
+ * do them as secure, so work out what MMU index that is.
125
+ */
126
+ mmu_idx = arm_v7m_mmu_idx_for_secstate(env, true);
127
+ oi = make_memop_idx(MO_LE, arm_to_core_mmu_idx(mmu_idx));
128
+ newpc = helper_le_ldul_mmu(env, frameptr, oi, 0);
129
+ newpsr = helper_le_ldul_mmu(env, frameptr + 4, oi, 0);
130
+
131
+ /* Consistency checks on new IPSR */
132
+ newpsr_exc = newpsr & XPSR_EXCP;
133
+ if (!((env->v7m.exception == 0 && newpsr_exc == 0) ||
134
+ (env->v7m.exception == 1 && newpsr_exc != 0))) {
135
+ /* Pend the fault and tell our caller to take it */
136
+ env->v7m.cfsr[env->v7m.secure] |= R_V7M_CFSR_INVPC_MASK;
137
+ armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE,
138
+ env->v7m.secure);
139
+ qemu_log_mask(CPU_LOG_INT,
140
+ "...taking INVPC UsageFault: "
141
+ "IPSR consistency check failed\n");
142
+ return false;
143
+ }
144
+
145
+ *frame_sp_p = frameptr + 8;
146
+ }
147
+
148
+ /* This invalidates frame_sp_p */
149
+ switch_v7m_security_state(env, true);
150
+ env->v7m.exception = newpsr_exc;
151
+ env->v7m.control[M_REG_S] &= ~R_V7M_CONTROL_SFPA_MASK;
152
+ if (newpsr & XPSR_SFPA) {
153
+ env->v7m.control[M_REG_S] |= R_V7M_CONTROL_SFPA_MASK;
154
+ }
155
+ xpsr_write(env, 0, XPSR_IT);
156
+ env->thumb = newpc & 1;
157
+ env->regs[15] = newpc & ~1;
158
+
159
+ qemu_log_mask(CPU_LOG_INT, "...function return successful\n");
160
+ return true;
161
+}
162
+
163
static void arm_log_exception(int idx)
164
{
165
if (qemu_loglevel_mask(CPU_LOG_INT)) {
166
@@ -XXX,XX +XXX,XX @@ void arm_v7m_cpu_do_interrupt(CPUState *cs)
167
case EXCP_IRQ:
168
break;
169
case EXCP_EXCEPTION_EXIT:
170
- do_v7m_exception_exit(cpu);
171
- return;
172
+ if (env->regs[15] < EXC_RETURN_MIN_MAGIC) {
173
+ /* Must be v8M security extension function return */
174
+ assert(env->regs[15] >= FNC_RETURN_MIN_MAGIC);
175
+ assert(arm_feature(env, ARM_FEATURE_M_SECURITY));
176
+ if (do_v7m_function_return(cpu)) {
177
+ return;
178
+ }
179
+ } else {
180
+ do_v7m_exception_exit(cpu);
181
+ return;
182
+ }
183
+ break;
184
default:
185
cpu_abort(cs, "Unhandled exception 0x%x\n", cs->exception_index);
186
return; /* Never happens. Keep compiler happy. */
187
diff --git a/target/arm/translate.c b/target/arm/translate.c
188
index XXXXXXX..XXXXXXX 100644
189
--- a/target/arm/translate.c
190
+++ b/target/arm/translate.c
191
@@ -XXX,XX +XXX,XX @@ static inline void gen_bx_excret(DisasContext *s, TCGv_i32 var)
192
* s->base.is_jmp that we need to do the rest of the work later.
193
*/
194
gen_bx(s, var);
195
- if (s->v7m_handler_mode && arm_dc_feature(s, ARM_FEATURE_M)) {
196
+ if (arm_dc_feature(s, ARM_FEATURE_M_SECURITY) ||
197
+ (s->v7m_handler_mode && arm_dc_feature(s, ARM_FEATURE_M))) {
198
s->base.is_jmp = DISAS_BX_EXCRET;
199
}
200
}
201
@@ -XXX,XX +XXX,XX @@ static inline void gen_bx_excret_final_code(DisasContext *s)
202
{
203
/* Generate the code to finish possible exception return and end the TB */
204
TCGLabel *excret_label = gen_new_label();
205
+ uint32_t min_magic;
206
+
207
+ if (arm_dc_feature(s, ARM_FEATURE_M_SECURITY)) {
208
+ /* Covers FNC_RETURN and EXC_RETURN magic */
209
+ min_magic = FNC_RETURN_MIN_MAGIC;
210
+ } else {
211
+ /* EXC_RETURN magic only */
212
+ min_magic = EXC_RETURN_MIN_MAGIC;
213
+ }
214
215
/* Is the new PC value in the magic range indicating exception return? */
216
- tcg_gen_brcondi_i32(TCG_COND_GEU, cpu_R[15], 0xff000000, excret_label);
217
+ tcg_gen_brcondi_i32(TCG_COND_GEU, cpu_R[15], min_magic, excret_label);
218
/* No: end the TB as we would for a DISAS_JMP */
219
if (is_singlestepping(s)) {
220
gen_singlestep_exception(s);
221
--
31
--
222
2.7.4
32
2.20.1
223
33
224
34
diff view generated by jsdifflib
1
This calculation of the first exception vector in
1
The CCR is a register most of whose bits are banked between security
2
the ITNS<n> register being accessed:
2
states but where BFHFNMIGN is not, and we keep it in the non-secure
3
int startvec = 32 * (offset - 0x380) + NVIC_FIRST_IRQ;
3
entry of the v7m.ccr[] array. The logic which tries to handle this
4
4
bit fails to implement the "RAZ/WI from Nonsecure if AIRCR.BFHFNMINS
5
is incorrect, because offset is in bytes, so we only want
5
is zero" requirement; correct the omission.
6
to multiply by 8.
7
8
Spotted by Coverity (CID 1381484, CID 1381488), though it is
9
not correct that it actually overflows the buffer, because
10
we have a 'startvec + i < s->num_irq' guard.
11
6
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
14
Message-id: 1507650856-11718-1-git-send-email-peter.maydell@linaro.org
9
Message-id: 20201210201433.26262-2-peter.maydell@linaro.org
15
---
10
---
16
hw/intc/armv7m_nvic.c | 4 ++--
11
hw/intc/armv7m_nvic.c | 15 +++++++++++++++
17
1 file changed, 2 insertions(+), 2 deletions(-)
12
1 file changed, 15 insertions(+)
18
13
19
diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c
14
diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c
20
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
21
--- a/hw/intc/armv7m_nvic.c
16
--- a/hw/intc/armv7m_nvic.c
22
+++ b/hw/intc/armv7m_nvic.c
17
+++ b/hw/intc/armv7m_nvic.c
23
@@ -XXX,XX +XXX,XX @@ static uint32_t nvic_readl(NVICState *s, uint32_t offset, MemTxAttrs attrs)
18
@@ -XXX,XX +XXX,XX @@ static uint32_t nvic_readl(NVICState *s, uint32_t offset, MemTxAttrs attrs)
24
return ((s->num_irq - NVIC_FIRST_IRQ) / 32) - 1;
19
*/
25
case 0x380 ... 0x3bf: /* NVIC_ITNS<n> */
20
val = cpu->env.v7m.ccr[attrs.secure];
26
{
21
val |= cpu->env.v7m.ccr[M_REG_NS] & R_V7M_CCR_BFHFNMIGN_MASK;
27
- int startvec = 32 * (offset - 0x380) + NVIC_FIRST_IRQ;
22
+ /* BFHFNMIGN is RAZ/WI from NS if AIRCR.BFHFNMINS is 0 */
28
+ int startvec = 8 * (offset - 0x380) + NVIC_FIRST_IRQ;
23
+ if (!attrs.secure) {
29
int i;
24
+ if (!(cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK)) {
30
25
+ val &= ~R_V7M_CCR_BFHFNMIGN_MASK;
31
if (!arm_feature(&cpu->env, ARM_FEATURE_V8)) {
26
+ }
27
+ }
28
return val;
29
case 0xd24: /* System Handler Control and State (SHCSR) */
30
if (!arm_feature(&cpu->env, ARM_FEATURE_V7)) {
32
@@ -XXX,XX +XXX,XX @@ static void nvic_writel(NVICState *s, uint32_t offset, uint32_t value,
31
@@ -XXX,XX +XXX,XX @@ static void nvic_writel(NVICState *s, uint32_t offset, uint32_t value,
33
switch (offset) {
32
(cpu->env.v7m.ccr[M_REG_NS] & ~R_V7M_CCR_BFHFNMIGN_MASK)
34
case 0x380 ... 0x3bf: /* NVIC_ITNS<n> */
33
| (value & R_V7M_CCR_BFHFNMIGN_MASK);
35
{
34
value &= ~R_V7M_CCR_BFHFNMIGN_MASK;
36
- int startvec = 32 * (offset - 0x380) + NVIC_FIRST_IRQ;
35
+ } else {
37
+ int startvec = 8 * (offset - 0x380) + NVIC_FIRST_IRQ;
36
+ /*
38
int i;
37
+ * BFHFNMIGN is RAZ/WI from NS if AIRCR.BFHFNMINS is 0, so
39
38
+ * preserve the state currently in the NS element of the array
40
if (!arm_feature(&cpu->env, ARM_FEATURE_V8)) {
39
+ */
40
+ if (!(cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK)) {
41
+ value &= ~R_V7M_CCR_BFHFNMIGN_MASK;
42
+ value |= cpu->env.v7m.ccr[M_REG_NS] & R_V7M_CCR_BFHFNMIGN_MASK;
43
+ }
44
}
45
46
cpu->env.v7m.ccr[attrs.secure] = value;
41
--
47
--
42
2.7.4
48
2.20.1
43
49
44
50
diff view generated by jsdifflib
1
The common situation of the SG instruction is that it is
1
In commit 64f863baeedc8659 we implemented the v8.1M FPCXT_S register,
2
executed from S&NSC memory by a CPU in NS state. That case
2
but we got the write behaviour wrong. On read, this register reads
3
is handled by v7m_handle_execute_nsc(). However the instruction
3
bits [27:0] of FPSCR plus the CONTROL.SFPA bit. On write, it doesn't
4
also has defined behaviour in a couple of other cases:
4
just write back those bits -- it writes a value to the whole FPSCR,
5
* SG instruction in NS memory (behaves as a NOP)
5
whose upper 4 bits are zeroes.
6
* SG in S memory but CPU already secure (clears IT bits and
7
does nothing else)
8
* SG instruction in v8M without Security Extension (NOP)
9
6
10
These can be implemented in translate.c.
7
We also incorrectly implemented the write-to-FPSCR as a simple store
8
to vfp.xregs; this skips the "update the softfloat flags" part of
9
the vfp_set_fpscr helper so the value would read back correctly but
10
not actually take effect.
11
12
Fix both of these things by doing a complete write to the FPSCR
13
using the helper function.
11
14
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
16
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
14
Message-id: 1507556919-24992-10-git-send-email-peter.maydell@linaro.org
17
Message-id: 20201210201433.26262-3-peter.maydell@linaro.org
15
---
18
---
16
target/arm/translate.c | 23 ++++++++++++++++++++++-
19
target/arm/translate-vfp.c.inc | 12 ++++++------
17
1 file changed, 22 insertions(+), 1 deletion(-)
20
1 file changed, 6 insertions(+), 6 deletions(-)
18
21
19
diff --git a/target/arm/translate.c b/target/arm/translate.c
22
diff --git a/target/arm/translate-vfp.c.inc b/target/arm/translate-vfp.c.inc
20
index XXXXXXX..XXXXXXX 100644
23
index XXXXXXX..XXXXXXX 100644
21
--- a/target/arm/translate.c
24
--- a/target/arm/translate-vfp.c.inc
22
+++ b/target/arm/translate.c
25
+++ b/target/arm/translate-vfp.c.inc
23
@@ -XXX,XX +XXX,XX @@ static int disas_thumb2_insn(DisasContext *s, uint32_t insn)
26
@@ -XXX,XX +XXX,XX @@ static bool gen_M_fp_sysreg_write(DisasContext *s, int regno,
24
* - load/store doubleword, load/store exclusive, ldacq/strel,
27
}
25
* table branch.
28
case ARM_VFP_FPCXT_S:
26
*/
29
{
27
- if (insn & 0x01200000) {
30
- TCGv_i32 sfpa, control, fpscr;
28
+ if (insn == 0xe97fe97f && arm_dc_feature(s, ARM_FEATURE_M) &&
31
- /* Set FPSCR[27:0] and CONTROL.SFPA from value */
29
+ arm_dc_feature(s, ARM_FEATURE_V8)) {
32
+ TCGv_i32 sfpa, control;
30
+ /* 0b1110_1001_0111_1111_1110_1001_0111_111
33
+ /*
31
+ * - SG (v8M only)
34
+ * Set FPSCR and CONTROL.SFPA from value; the new FPSCR takes
32
+ * The bulk of the behaviour for this instruction is implemented
35
+ * bits [27:0] from value and zeroes bits [31:28].
33
+ * in v7m_handle_execute_nsc(), which deals with the insn when
36
+ */
34
+ * it is executed by a CPU in non-secure state from memory
37
tmp = loadfn(s, opaque);
35
+ * which is Secure & NonSecure-Callable.
38
sfpa = tcg_temp_new_i32();
36
+ * Here we only need to handle the remaining cases:
39
tcg_gen_shri_i32(sfpa, tmp, 31);
37
+ * * in NS memory (including the "security extension not
40
@@ -XXX,XX +XXX,XX @@ static bool gen_M_fp_sysreg_write(DisasContext *s, int regno,
38
+ * implemented" case) : NOP
41
tcg_gen_deposit_i32(control, control, sfpa,
39
+ * * in S memory but CPU already secure (clear IT bits)
42
R_V7M_CONTROL_SFPA_SHIFT, 1);
40
+ * We know that the attribute for the memory this insn is
43
store_cpu_field(control, v7m.control[M_REG_S]);
41
+ * in must match the current CPU state, because otherwise
44
- fpscr = load_cpu_field(vfp.xregs[ARM_VFP_FPSCR]);
42
+ * get_phys_addr_pmsav8 would have generated an exception.
45
- tcg_gen_andi_i32(fpscr, fpscr, FPCR_NZCV_MASK);
43
+ */
46
tcg_gen_andi_i32(tmp, tmp, ~FPCR_NZCV_MASK);
44
+ if (s->v8m_secure) {
47
- tcg_gen_or_i32(fpscr, fpscr, tmp);
45
+ /* Like the IT insn, we don't need to generate any code */
48
- store_cpu_field(fpscr, vfp.xregs[ARM_VFP_FPSCR]);
46
+ s->condexec_cond = 0;
49
+ gen_helper_vfp_set_fpscr(cpu_env, tmp);
47
+ s->condexec_mask = 0;
50
tcg_temp_free_i32(tmp);
48
+ }
51
tcg_temp_free_i32(sfpa);
49
+ } else if (insn & 0x01200000) {
52
break;
50
/* 0b1110_1000_x11x_xxxx_xxxx_xxxx_xxxx_xxxx
51
* - load/store dual (post-indexed)
52
* 0b1111_1001_x10x_xxxx_xxxx_xxxx_xxxx_xxxx
53
--
53
--
54
2.7.4
54
2.20.1
55
55
56
56
diff view generated by jsdifflib
1
Implement the BLXNS instruction, which allows secure code to
1
Implement the v8.1M FPCXT_NS floating-point system register. This is
2
call non-secure code.
2
a little more complicated than FPCXT_S, because it has specific
3
handling for "current FP state is inactive", and it only wants to do
4
PreserveFPState(), not the full set of actions done by
5
ExecuteFPCheck() which vfp_access_check() implements.
3
6
4
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
5
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
6
Message-id: 1507556919-24992-4-git-send-email-peter.maydell@linaro.org
9
Message-id: 20201210201433.26262-4-peter.maydell@linaro.org
7
---
10
---
8
target/arm/helper.h | 1 +
11
target/arm/translate-vfp.c.inc | 102 ++++++++++++++++++++++++++++++++-
9
target/arm/internals.h | 1 +
12
1 file changed, 99 insertions(+), 3 deletions(-)
10
target/arm/helper.c | 59 ++++++++++++++++++++++++++++++++++++++++++++++++++
11
target/arm/translate.c | 17 +++++++++++++--
12
4 files changed, 76 insertions(+), 2 deletions(-)
13
13
14
diff --git a/target/arm/helper.h b/target/arm/helper.h
14
diff --git a/target/arm/translate-vfp.c.inc b/target/arm/translate-vfp.c.inc
15
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
16
--- a/target/arm/helper.h
16
--- a/target/arm/translate-vfp.c.inc
17
+++ b/target/arm/helper.h
17
+++ b/target/arm/translate-vfp.c.inc
18
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_3(v7m_msr, void, env, i32, i32)
18
@@ -XXX,XX +XXX,XX @@ static FPSysRegCheckResult fp_sysreg_checks(DisasContext *s, int regno)
19
DEF_HELPER_2(v7m_mrs, i32, env, i32)
19
}
20
20
break;
21
DEF_HELPER_2(v7m_bxns, void, env, i32)
21
case ARM_VFP_FPCXT_S:
22
+DEF_HELPER_2(v7m_blxns, void, env, i32)
22
+ case ARM_VFP_FPCXT_NS:
23
23
if (!arm_dc_feature(s, ARM_FEATURE_V8_1M)) {
24
DEF_HELPER_4(access_check_cp_reg, void, env, ptr, i32, i32)
24
return false;
25
DEF_HELPER_3(set_cp_reg, void, env, ptr, i32)
25
}
26
diff --git a/target/arm/internals.h b/target/arm/internals.h
26
@@ -XXX,XX +XXX,XX @@ static FPSysRegCheckResult fp_sysreg_checks(DisasContext *s, int regno)
27
index XXXXXXX..XXXXXXX 100644
27
return FPSysRegCheckFailed;
28
--- a/target/arm/internals.h
28
}
29
+++ b/target/arm/internals.h
29
30
@@ -XXX,XX +XXX,XX @@ static inline bool excp_is_internal(int excp)
30
- if (!vfp_access_check(s)) {
31
FIELD(V7M_CONTROL, NPRIV, 0, 1)
31
+ /*
32
FIELD(V7M_CONTROL, SPSEL, 1, 1)
32
+ * FPCXT_NS is a special case: it has specific handling for
33
FIELD(V7M_CONTROL, FPCA, 2, 1)
33
+ * "current FP state is inactive", and must do the PreserveFPState()
34
+FIELD(V7M_CONTROL, SFPA, 3, 1)
34
+ * but not the usual full set of actions done by ExecuteFPCheck().
35
35
+ * So we don't call vfp_access_check() and the callers must handle this.
36
/* Bit definitions for v7M exception return payload */
36
+ */
37
FIELD(V7M_EXCRET, ES, 0, 1)
37
+ if (regno != ARM_VFP_FPCXT_NS && !vfp_access_check(s)) {
38
diff --git a/target/arm/helper.c b/target/arm/helper.c
38
return FPSysRegCheckDone;
39
index XXXXXXX..XXXXXXX 100644
39
}
40
--- a/target/arm/helper.c
40
-
41
+++ b/target/arm/helper.c
41
return FPSysRegCheckContinue;
42
@@ -XXX,XX +XXX,XX @@ void HELPER(v7m_bxns)(CPUARMState *env, uint32_t dest)
43
g_assert_not_reached();
44
}
42
}
45
43
46
+void HELPER(v7m_blxns)(CPUARMState *env, uint32_t dest)
44
+static void gen_branch_fpInactive(DisasContext *s, TCGCond cond,
45
+ TCGLabel *label)
47
+{
46
+{
48
+ /* translate.c should never generate calls here in user-only mode */
47
+ /*
49
+ g_assert_not_reached();
48
+ * FPCXT_NS is a special case: it has specific handling for
49
+ * "current FP state is inactive", and must do the PreserveFPState()
50
+ * but not the usual full set of actions done by ExecuteFPCheck().
51
+ * We don't have a TB flag that matches the fpInactive check, so we
52
+ * do it at runtime as we don't expect FPCXT_NS accesses to be frequent.
53
+ *
54
+ * Emit code that checks fpInactive and does a conditional
55
+ * branch to label based on it:
56
+ * if cond is TCG_COND_NE then branch if fpInactive != 0 (ie if inactive)
57
+ * if cond is TCG_COND_EQ then branch if fpInactive == 0 (ie if active)
58
+ */
59
+ assert(cond == TCG_COND_EQ || cond == TCG_COND_NE);
60
+
61
+ /* fpInactive = FPCCR_NS.ASPEN == 1 && CONTROL.FPCA == 0 */
62
+ TCGv_i32 aspen, fpca;
63
+ aspen = load_cpu_field(v7m.fpccr[M_REG_NS]);
64
+ fpca = load_cpu_field(v7m.control[M_REG_S]);
65
+ tcg_gen_andi_i32(aspen, aspen, R_V7M_FPCCR_ASPEN_MASK);
66
+ tcg_gen_xori_i32(aspen, aspen, R_V7M_FPCCR_ASPEN_MASK);
67
+ tcg_gen_andi_i32(fpca, fpca, R_V7M_CONTROL_FPCA_MASK);
68
+ tcg_gen_or_i32(fpca, fpca, aspen);
69
+ tcg_gen_brcondi_i32(tcg_invert_cond(cond), fpca, 0, label);
70
+ tcg_temp_free_i32(aspen);
71
+ tcg_temp_free_i32(fpca);
50
+}
72
+}
51
+
73
+
52
void switch_mode(CPUARMState *env, int mode)
74
static bool gen_M_fp_sysreg_write(DisasContext *s, int regno,
75
76
fp_sysreg_loadfn *loadfn,
77
@@ -XXX,XX +XXX,XX @@ static bool gen_M_fp_sysreg_write(DisasContext *s, int regno,
53
{
78
{
54
ARMCPU *cpu = arm_env_get_cpu(env);
79
/* Do a write to an M-profile floating point system register */
55
@@ -XXX,XX +XXX,XX @@ void HELPER(v7m_bxns)(CPUARMState *env, uint32_t dest)
80
TCGv_i32 tmp;
56
env->regs[15] = dest & ~1;
81
+ TCGLabel *lab_end = NULL;
82
83
switch (fp_sysreg_checks(s, regno)) {
84
case FPSysRegCheckFailed:
85
@@ -XXX,XX +XXX,XX @@ static bool gen_M_fp_sysreg_write(DisasContext *s, int regno,
86
tcg_temp_free_i32(tmp);
87
break;
88
}
89
+ case ARM_VFP_FPCXT_NS:
90
+ lab_end = gen_new_label();
91
+ /* fpInactive case: write is a NOP, so branch to end */
92
+ gen_branch_fpInactive(s, TCG_COND_NE, lab_end);
93
+ /* !fpInactive: PreserveFPState(), and reads same as FPCXT_S */
94
+ gen_preserve_fp_state(s);
95
+ /* fall through */
96
case ARM_VFP_FPCXT_S:
97
{
98
TCGv_i32 sfpa, control;
99
@@ -XXX,XX +XXX,XX @@ static bool gen_M_fp_sysreg_write(DisasContext *s, int regno,
100
default:
101
g_assert_not_reached();
102
}
103
+ if (lab_end) {
104
+ gen_set_label(lab_end);
105
+ }
106
return true;
57
}
107
}
58
108
59
+void HELPER(v7m_blxns)(CPUARMState *env, uint32_t dest)
109
@@ -XXX,XX +XXX,XX @@ static bool gen_M_fp_sysreg_read(DisasContext *s, int regno,
60
+{
110
{
61
+ /* Handle v7M BLXNS:
111
/* Do a read from an M-profile floating point system register */
62
+ * - bit 0 of the destination address is the target security state
112
TCGv_i32 tmp;
63
+ */
113
+ TCGLabel *lab_end = NULL;
114
+ bool lookup_tb = false;
115
116
switch (fp_sysreg_checks(s, regno)) {
117
case FPSysRegCheckFailed:
118
@@ -XXX,XX +XXX,XX @@ static bool gen_M_fp_sysreg_read(DisasContext *s, int regno,
119
fpscr = load_cpu_field(v7m.fpdscr[M_REG_NS]);
120
gen_helper_vfp_set_fpscr(cpu_env, fpscr);
121
tcg_temp_free_i32(fpscr);
122
- gen_lookup_tb(s);
123
+ lookup_tb = true;
124
+ break;
125
+ }
126
+ case ARM_VFP_FPCXT_NS:
127
+ {
128
+ TCGv_i32 control, sfpa, fpscr, fpdscr, zero;
129
+ TCGLabel *lab_active = gen_new_label();
64
+
130
+
65
+ /* At this point regs[15] is the address just after the BLXNS */
131
+ lookup_tb = true;
66
+ uint32_t nextinst = env->regs[15] | 1;
67
+ uint32_t sp = env->regs[13] - 8;
68
+ uint32_t saved_psr;
69
+
132
+
70
+ /* translate.c will have made BLXNS UNDEF unless we're secure */
133
+ gen_branch_fpInactive(s, TCG_COND_EQ, lab_active);
71
+ assert(env->v7m.secure);
134
+ /* fpInactive case: reads as FPDSCR_NS */
135
+ TCGv_i32 tmp = load_cpu_field(v7m.fpdscr[M_REG_NS]);
136
+ storefn(s, opaque, tmp);
137
+ lab_end = gen_new_label();
138
+ tcg_gen_br(lab_end);
72
+
139
+
73
+ if (dest & 1) {
140
+ gen_set_label(lab_active);
74
+ /* target is Secure, so this is just a normal BLX,
141
+ /* !fpInactive: Reads the same as FPCXT_S, but side effects differ */
75
+ * except that the low bit doesn't indicate Thumb/not.
142
+ gen_preserve_fp_state(s);
76
+ */
143
+ tmp = tcg_temp_new_i32();
77
+ env->regs[14] = nextinst;
144
+ sfpa = tcg_temp_new_i32();
78
+ env->thumb = 1;
145
+ fpscr = tcg_temp_new_i32();
79
+ env->regs[15] = dest & ~1;
146
+ gen_helper_vfp_get_fpscr(fpscr, cpu_env);
80
+ return;
147
+ tcg_gen_andi_i32(tmp, fpscr, ~FPCR_NZCV_MASK);
148
+ control = load_cpu_field(v7m.control[M_REG_S]);
149
+ tcg_gen_andi_i32(sfpa, control, R_V7M_CONTROL_SFPA_MASK);
150
+ tcg_gen_shli_i32(sfpa, sfpa, 31 - R_V7M_CONTROL_SFPA_SHIFT);
151
+ tcg_gen_or_i32(tmp, tmp, sfpa);
152
+ tcg_temp_free_i32(control);
153
+ /* Store result before updating FPSCR, in case it faults */
154
+ storefn(s, opaque, tmp);
155
+ /* If SFPA is zero then set FPSCR from FPDSCR_NS */
156
+ fpdscr = load_cpu_field(v7m.fpdscr[M_REG_NS]);
157
+ zero = tcg_const_i32(0);
158
+ tcg_gen_movcond_i32(TCG_COND_EQ, fpscr, sfpa, zero, fpdscr, fpscr);
159
+ gen_helper_vfp_set_fpscr(cpu_env, fpscr);
160
+ tcg_temp_free_i32(zero);
161
+ tcg_temp_free_i32(sfpa);
162
+ tcg_temp_free_i32(fpdscr);
163
+ tcg_temp_free_i32(fpscr);
164
break;
165
}
166
default:
167
g_assert_not_reached();
168
}
169
+
170
+ if (lab_end) {
171
+ gen_set_label(lab_end);
81
+ }
172
+ }
82
+
173
+ if (lookup_tb) {
83
+ /* Target is non-secure: first push a stack frame */
174
+ gen_lookup_tb(s);
84
+ if (!QEMU_IS_ALIGNED(sp, 8)) {
85
+ qemu_log_mask(LOG_GUEST_ERROR,
86
+ "BLXNS with misaligned SP is UNPREDICTABLE\n");
87
+ }
175
+ }
88
+
176
return true;
89
+ saved_psr = env->v7m.exception;
90
+ if (env->v7m.control[M_REG_S] & R_V7M_CONTROL_SFPA_MASK) {
91
+ saved_psr |= XPSR_SFPA;
92
+ }
93
+
94
+ /* Note that these stores can throw exceptions on MPU faults */
95
+ cpu_stl_data(env, sp, nextinst);
96
+ cpu_stl_data(env, sp + 4, saved_psr);
97
+
98
+ env->regs[13] = sp;
99
+ env->regs[14] = 0xfeffffff;
100
+ if (arm_v7m_is_handler_mode(env)) {
101
+ /* Write a dummy value to IPSR, to avoid leaking the current secure
102
+ * exception number to non-secure code. This is guaranteed not
103
+ * to cause write_v7m_exception() to actually change stacks.
104
+ */
105
+ write_v7m_exception(env, 1);
106
+ }
107
+ switch_v7m_security_state(env, 0);
108
+ env->thumb = 1;
109
+ env->regs[15] = dest;
110
+}
111
+
112
static uint32_t *get_v7m_sp_ptr(CPUARMState *env, bool secure, bool threadmode,
113
bool spsel)
114
{
115
diff --git a/target/arm/translate.c b/target/arm/translate.c
116
index XXXXXXX..XXXXXXX 100644
117
--- a/target/arm/translate.c
118
+++ b/target/arm/translate.c
119
@@ -XXX,XX +XXX,XX @@ static inline void gen_bxns(DisasContext *s, int rm)
120
s->base.is_jmp = DISAS_EXIT;
121
}
177
}
122
178
123
+static inline void gen_blxns(DisasContext *s, int rm)
124
+{
125
+ TCGv_i32 var = load_reg(s, rm);
126
+
127
+ /* We don't need to sync condexec state, for the same reason as bxns.
128
+ * We do however need to set the PC, because the blxns helper reads it.
129
+ * The blxns helper may throw an exception.
130
+ */
131
+ gen_set_pc_im(s, s->pc);
132
+ gen_helper_v7m_blxns(cpu_env, var);
133
+ tcg_temp_free_i32(var);
134
+ s->base.is_jmp = DISAS_EXIT;
135
+}
136
+
137
/* Variant of store_reg which uses branch&exchange logic when storing
138
to r15 in ARM architecture v7 and above. The source must be a temporary
139
and will be marked as dead. */
140
@@ -XXX,XX +XXX,XX @@ static void disas_thumb_insn(CPUARMState *env, DisasContext *s)
141
goto undef;
142
}
143
if (link) {
144
- /* BLXNS: not yet implemented */
145
- goto undef;
146
+ gen_blxns(s, rm);
147
} else {
148
gen_bxns(s, rm);
149
}
150
--
179
--
151
2.7.4
180
2.20.1
152
181
153
182
diff view generated by jsdifflib
1
A few Thumb instructions are always unconditional even inside an
1
Now that we have implemented all the features needed by the v8.1M
2
IT block (as opposed to being UNPREDICTABLE if used inside an
2
architecture, we can add the model of the Cortex-M55. This is the
3
IT block): BKPT, the v8M SG instruction, and the A profile
3
configuration without MVE support; we'll add MVE later.
4
HLT (debug halt) instruction.
5
6
This means we need to suppress the jump-over-instruction-on-condfail
7
code generation (though the IT state still advances as usual and
8
subsequent insns in the IT block may be conditional).
9
4
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
6
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
12
Message-id: 1507556919-24992-9-git-send-email-peter.maydell@linaro.org
7
Message-id: 20201210201433.26262-5-peter.maydell@linaro.org
13
---
8
---
14
target/arm/translate.c | 48 +++++++++++++++++++++++++++++++++++++++++++++++-
9
target/arm/cpu_tcg.c | 42 ++++++++++++++++++++++++++++++++++++++++++
15
1 file changed, 47 insertions(+), 1 deletion(-)
10
1 file changed, 42 insertions(+)
16
11
17
diff --git a/target/arm/translate.c b/target/arm/translate.c
12
diff --git a/target/arm/cpu_tcg.c b/target/arm/cpu_tcg.c
18
index XXXXXXX..XXXXXXX 100644
13
index XXXXXXX..XXXXXXX 100644
19
--- a/target/arm/translate.c
14
--- a/target/arm/cpu_tcg.c
20
+++ b/target/arm/translate.c
15
+++ b/target/arm/cpu_tcg.c
21
@@ -XXX,XX +XXX,XX @@ static void arm_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu)
16
@@ -XXX,XX +XXX,XX @@ static void cortex_m33_initfn(Object *obj)
22
in init_disas_context by adjusting max_insns. */
17
cpu->ctr = 0x8000c000;
23
}
18
}
24
19
25
+static bool thumb_insn_is_unconditional(DisasContext *s, uint32_t insn)
20
+static void cortex_m55_initfn(Object *obj)
26
+{
21
+{
27
+ /* Return true if this Thumb insn is always unconditional,
22
+ ARMCPU *cpu = ARM_CPU(obj);
28
+ * even inside an IT block. This is true of only a very few
23
+
29
+ * instructions: BKPT, HLT, and SG.
24
+ set_feature(&cpu->env, ARM_FEATURE_V8);
30
+ *
25
+ set_feature(&cpu->env, ARM_FEATURE_V8_1M);
31
+ * A larger class of instructions are UNPREDICTABLE if used
26
+ set_feature(&cpu->env, ARM_FEATURE_M);
32
+ * inside an IT block; we do not need to detect those here, because
27
+ set_feature(&cpu->env, ARM_FEATURE_M_MAIN);
33
+ * what we do by default (perform the cc check and update the IT
28
+ set_feature(&cpu->env, ARM_FEATURE_M_SECURITY);
34
+ * bits state machine) is a permitted CONSTRAINED UNPREDICTABLE
29
+ set_feature(&cpu->env, ARM_FEATURE_THUMB_DSP);
35
+ * choice for those situations.
30
+ cpu->midr = 0x410fd221; /* r0p1 */
36
+ *
31
+ cpu->revidr = 0;
37
+ * insn is either a 16-bit or a 32-bit instruction; the two are
32
+ cpu->pmsav7_dregion = 16;
38
+ * distinguishable because for the 16-bit case the top 16 bits
33
+ cpu->sau_sregion = 8;
39
+ * are zeroes, and that isn't a valid 32-bit encoding.
34
+ /*
35
+ * These are the MVFR* values for the FPU, no MVE configuration;
36
+ * we will update them later when we implement MVE
40
+ */
37
+ */
41
+ if ((insn & 0xffffff00) == 0xbe00) {
38
+ cpu->isar.mvfr0 = 0x10110221;
42
+ /* BKPT */
39
+ cpu->isar.mvfr1 = 0x12100011;
43
+ return true;
40
+ cpu->isar.mvfr2 = 0x00000040;
44
+ }
41
+ cpu->isar.id_pfr0 = 0x20000030;
45
+
42
+ cpu->isar.id_pfr1 = 0x00000230;
46
+ if ((insn & 0xffffffc0) == 0xba80 && arm_dc_feature(s, ARM_FEATURE_V8) &&
43
+ cpu->isar.id_dfr0 = 0x10200000;
47
+ !arm_dc_feature(s, ARM_FEATURE_M)) {
44
+ cpu->id_afr0 = 0x00000000;
48
+ /* HLT: v8A only. This is unconditional even when it is going to
45
+ cpu->isar.id_mmfr0 = 0x00111040;
49
+ * UNDEF; see the v8A ARM ARM DDI0487B.a H3.3.
46
+ cpu->isar.id_mmfr1 = 0x00000000;
50
+ * For v7 cores this was a plain old undefined encoding and so
47
+ cpu->isar.id_mmfr2 = 0x01000000;
51
+ * honours its cc check. (We might be using the encoding as
48
+ cpu->isar.id_mmfr3 = 0x00000011;
52
+ * a semihosting trap, but we don't change the cc check behaviour
49
+ cpu->isar.id_isar0 = 0x01103110;
53
+ * on that account, because a debugger connected to a real v7A
50
+ cpu->isar.id_isar1 = 0x02212000;
54
+ * core and emulating semihosting traps by catching the UNDEF
51
+ cpu->isar.id_isar2 = 0x20232232;
55
+ * exception would also only see cases where the cc check passed.
52
+ cpu->isar.id_isar3 = 0x01111131;
56
+ * No guest code should be trying to do a HLT semihosting trap
53
+ cpu->isar.id_isar4 = 0x01310132;
57
+ * in an IT block anyway.
54
+ cpu->isar.id_isar5 = 0x00000000;
58
+ */
55
+ cpu->isar.id_isar6 = 0x00000000;
59
+ return true;
56
+ cpu->clidr = 0x00000000; /* caches not implemented */
60
+ }
57
+ cpu->ctr = 0x8303c003;
61
+
62
+ if (insn == 0xe97fe97f && arm_dc_feature(s, ARM_FEATURE_V8) &&
63
+ arm_dc_feature(s, ARM_FEATURE_M)) {
64
+ /* SG: v8M only */
65
+ return true;
66
+ }
67
+
68
+ return false;
69
+}
58
+}
70
+
59
+
71
static void thumb_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu)
60
static const ARMCPRegInfo cortexr5_cp_reginfo[] = {
72
{
61
/* Dummy the TCM region regs for the moment */
73
DisasContext *dc = container_of(dcbase, DisasContext, base);
62
{ .name = "ATCM", .cp = 15, .opc1 = 0, .crn = 9, .crm = 1, .opc2 = 0,
74
@@ -XXX,XX +XXX,XX @@ static void thumb_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu)
63
@@ -XXX,XX +XXX,XX @@ static const ARMCPUInfo arm_tcg_cpus[] = {
75
dc->pc += 2;
64
.class_init = arm_v7m_class_init },
76
}
65
{ .name = "cortex-m33", .initfn = cortex_m33_initfn,
77
66
.class_init = arm_v7m_class_init },
78
- if (dc->condexec_mask) {
67
+ { .name = "cortex-m55", .initfn = cortex_m55_initfn,
79
+ if (dc->condexec_mask && !thumb_insn_is_unconditional(dc, insn)) {
68
+ .class_init = arm_v7m_class_init },
80
uint32_t cond = dc->condexec_cond;
69
{ .name = "cortex-r5", .initfn = cortex_r5_initfn },
81
70
{ .name = "cortex-r5f", .initfn = cortex_r5f_initfn },
82
if (cond != 0x0e) { /* Skip conditional when condition is AL. */
71
{ .name = "ti925t", .initfn = ti925t_initfn },
83
--
72
--
84
2.7.4
73
2.20.1
85
74
86
75
diff view generated by jsdifflib
1
The code which implements the Thumb1 split BL/BLX instructions
1
Support for running KVM on 32-bit Arm hosts was removed in commit
2
is guarded by a check on "not M or THUMB2". All we really need
2
82bf7ae84ce739e. You can still run a 32-bit guest on a 64-bit Arm
3
to check here is "not THUMB2" (and we assume that elsewhere too,
3
host CPU, but because Arm KVM requires the host and guest CPU types
4
eg in the ARCH(6T2) test that UNDEFs the Thumb2 insns).
4
to match, it is not possible to run a guest that requires a Cortex-A9
5
5
or Cortex-A15 CPU there. That means that the code in the
6
This doesn't change behaviour because all M profile cores
6
highbank/midway board models to support KVM is no longer used, and we
7
have Thumb2 and so ARM_FEATURE_M implies ARM_FEATURE_THUMB2.
7
can delete it.
8
(v6M implements a very restricted subset of Thumb2, but we
9
can cross that bridge when we get to it with appropriate
10
feature bits.)
11
8
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
10
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
14
Message-id: 1507556919-24992-6-git-send-email-peter.maydell@linaro.org
11
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
12
Message-id: 20201215144215.28482-1-peter.maydell@linaro.org
15
---
13
---
16
target/arm/translate.c | 3 +--
14
hw/arm/highbank.c | 14 ++++----------
17
1 file changed, 1 insertion(+), 2 deletions(-)
15
1 file changed, 4 insertions(+), 10 deletions(-)
18
16
19
diff --git a/target/arm/translate.c b/target/arm/translate.c
17
diff --git a/hw/arm/highbank.c b/hw/arm/highbank.c
20
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
21
--- a/target/arm/translate.c
19
--- a/hw/arm/highbank.c
22
+++ b/target/arm/translate.c
20
+++ b/hw/arm/highbank.c
23
@@ -XXX,XX +XXX,XX @@ static int disas_thumb2_insn(CPUARMState *env, DisasContext *s, uint16_t insn_hw
21
@@ -XXX,XX +XXX,XX @@
24
int conds;
22
#include "hw/arm/boot.h"
25
int logic_cc;
23
#include "hw/loader.h"
26
24
#include "net/net.h"
27
- if (!(arm_dc_feature(s, ARM_FEATURE_THUMB2)
25
-#include "sysemu/kvm.h"
28
- || arm_dc_feature(s, ARM_FEATURE_M))) {
26
#include "sysemu/runstate.h"
29
+ if (!arm_dc_feature(s, ARM_FEATURE_THUMB2)) {
27
#include "sysemu/sysemu.h"
30
/* Thumb-1 cores may need to treat bl and blx as a pair of
28
#include "hw/boards.h"
31
16-bit instructions to get correct prefetch abort behavior. */
29
@@ -XXX,XX +XXX,XX @@
32
insn = insn_hw1;
30
#include "hw/cpu/a15mpcore.h"
31
#include "qemu/log.h"
32
#include "qom/object.h"
33
+#include "cpu.h"
34
35
#define SMP_BOOT_ADDR 0x100
36
#define SMP_BOOT_REG 0x40
37
@@ -XXX,XX +XXX,XX @@ static void calxeda_init(MachineState *machine, enum cxmachines machine_id)
38
highbank_binfo.loader_start = 0;
39
highbank_binfo.write_secondary_boot = hb_write_secondary;
40
highbank_binfo.secondary_cpu_reset_hook = hb_reset_secondary;
41
- if (!kvm_enabled()) {
42
- highbank_binfo.board_setup_addr = BOARD_SETUP_ADDR;
43
- highbank_binfo.write_board_setup = hb_write_board_setup;
44
- highbank_binfo.secure_board_setup = true;
45
- } else {
46
- warn_report("cannot load built-in Monitor support "
47
- "if KVM is enabled. Some guests (such as Linux) "
48
- "may not boot.");
49
- }
50
+ highbank_binfo.board_setup_addr = BOARD_SETUP_ADDR;
51
+ highbank_binfo.write_board_setup = hb_write_board_setup;
52
+ highbank_binfo.secure_board_setup = true;
53
54
arm_load_kernel(ARM_CPU(first_cpu), machine, &highbank_binfo);
55
}
33
--
56
--
34
2.7.4
57
2.20.1
35
58
36
59
diff view generated by jsdifflib
New patch
1
Currently timer_free() is a simple wrapper for g_free(). This means
2
that the timer being freed must not be currently active, as otherwise
3
QEMU might crash later when the active list is processed and still
4
has a pointer to freed memory on it. As a result almost all calls to
5
timer_free() are preceded by a timer_del() call, as can be seen in
6
the output of
7
git grep -B1 '\<timer_free\>'
1
8
9
This is unfortunate API design as it makes it easy to accidentally
10
misuse (by forgetting the timer_del()), and the correct use is
11
annoyingly verbose.
12
13
Make timer_free() imply a timer_del().
14
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
17
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
18
Message-id: 20201215154107.3255-2-peter.maydell@linaro.org
19
---
20
include/qemu/timer.h | 24 +++++++++++++-----------
21
1 file changed, 13 insertions(+), 11 deletions(-)
22
23
diff --git a/include/qemu/timer.h b/include/qemu/timer.h
24
index XXXXXXX..XXXXXXX 100644
25
--- a/include/qemu/timer.h
26
+++ b/include/qemu/timer.h
27
@@ -XXX,XX +XXX,XX @@ static inline QEMUTimer *timer_new_ms(QEMUClockType type, QEMUTimerCB *cb,
28
*/
29
void timer_deinit(QEMUTimer *ts);
30
31
-/**
32
- * timer_free:
33
- * @ts: the timer
34
- *
35
- * Free a timer (it must not be on the active list)
36
- */
37
-static inline void timer_free(QEMUTimer *ts)
38
-{
39
- g_free(ts);
40
-}
41
-
42
/**
43
* timer_del:
44
* @ts: the timer
45
@@ -XXX,XX +XXX,XX @@ static inline void timer_free(QEMUTimer *ts)
46
*/
47
void timer_del(QEMUTimer *ts);
48
49
+/**
50
+ * timer_free:
51
+ * @ts: the timer
52
+ *
53
+ * Free a timer. This will call timer_del() for you to remove
54
+ * the timer from the active list if it was still active.
55
+ */
56
+static inline void timer_free(QEMUTimer *ts)
57
+{
58
+ timer_del(ts);
59
+ g_free(ts);
60
+}
61
+
62
/**
63
* timer_mod_ns:
64
* @ts: the timer
65
--
66
2.20.1
67
68
diff view generated by jsdifflib
New patch
1
Now that timer_free() implicitly calls timer_del(), sequences
2
timer_del(mytimer);
3
timer_free(mytimer);
1
4
5
can be simplified to just
6
timer_free(mytimer);
7
8
Add a Coccinelle script to do this transformation.
9
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Acked-by: Paolo Bonzini <pbonzini@redhat.com>
12
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
13
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
14
Message-id: 20201215154107.3255-3-peter.maydell@linaro.org
15
---
16
scripts/coccinelle/timer-del-timer-free.cocci | 18 ++++++++++++++++++
17
1 file changed, 18 insertions(+)
18
create mode 100644 scripts/coccinelle/timer-del-timer-free.cocci
19
20
diff --git a/scripts/coccinelle/timer-del-timer-free.cocci b/scripts/coccinelle/timer-del-timer-free.cocci
21
new file mode 100644
22
index XXXXXXX..XXXXXXX
23
--- /dev/null
24
+++ b/scripts/coccinelle/timer-del-timer-free.cocci
25
@@ -XXX,XX +XXX,XX @@
26
+// Remove superfluous timer_del() calls
27
+//
28
+// Copyright Linaro Limited 2020
29
+// This work is licensed under the terms of the GNU GPLv2 or later.
30
+//
31
+// spatch --macro-file scripts/cocci-macro-file.h \
32
+// --sp-file scripts/coccinelle/timer-del-timer-free.cocci \
33
+// --in-place --dir .
34
+//
35
+// The timer_free() function now implicitly calls timer_del()
36
+// for you, so calls to timer_del() immediately before the
37
+// timer_free() of the same timer can be deleted.
38
+
39
+@@
40
+expression T;
41
+@@
42
+-timer_del(T);
43
+ timer_free(T);
44
--
45
2.20.1
46
47
diff view generated by jsdifflib
1
Refactor the Thumb decode to do the loads of the instruction words at
1
This commit is the result of running the timer-del-timer-free.cocci
2
the top level rather than only loading the second half of a 32-bit
2
script on the whole source tree.
3
Thumb insn in the middle of the decode.
4
5
This is simple apart from the awkward case of Thumb1, where the
6
BL/BLX prefix and suffix instructions live in what in Thumb2 is the
7
32-bit insn space. To handle these we decode enough to identify
8
whether we're looking at a prefix/suffix that we handle as a 16 bit
9
insn, or a prefix that we're going to merge with the following suffix
10
to consider as a 32 bit insn. The translation of the 16 bit cases
11
then moves from disas_thumb2_insn() to disas_thumb_insn().
12
13
The refactoring has the benefit that we don't need to pass the
14
CPUARMState* down into the decoder code any more, but the major
15
reason for doing this is that some Thumb instructions must be always
16
unconditional regardless of the IT state bits, so we need to know the
17
whole insn before we emit the "skip this insn if the IT bits and cond
18
state tell us to" code. (The always unconditional insns are BKPT,
19
HLT and SG; the last of these is 32 bits.)
20
3
21
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
4
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
5
Acked-by: Corey Minyard <cminyard@mvista.com>
6
Acked-by: Paolo Bonzini <pbonzini@redhat.com>
7
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
22
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
23
Message-id: 1507556919-24992-7-git-send-email-peter.maydell@linaro.org
9
Message-id: 20201215154107.3255-4-peter.maydell@linaro.org
24
---
10
---
25
target/arm/translate.c | 178 ++++++++++++++++++++++++++++++-------------------
11
block/iscsi.c | 2 --
26
1 file changed, 108 insertions(+), 70 deletions(-)
12
block/nbd.c | 1 -
13
block/qcow2.c | 1 -
14
hw/block/nvme.c | 2 --
15
hw/char/serial.c | 2 --
16
hw/char/virtio-serial-bus.c | 2 --
17
hw/ide/core.c | 1 -
18
hw/input/hid.c | 1 -
19
hw/intc/apic.c | 1 -
20
hw/intc/ioapic.c | 1 -
21
hw/ipmi/ipmi_bmc_extern.c | 1 -
22
hw/net/e1000.c | 3 ---
23
hw/net/e1000e_core.c | 8 --------
24
hw/net/pcnet-pci.c | 1 -
25
hw/net/rtl8139.c | 1 -
26
hw/net/spapr_llan.c | 1 -
27
hw/net/virtio-net.c | 2 --
28
hw/s390x/s390-pci-inst.c | 1 -
29
hw/sd/sd.c | 1 -
30
hw/sd/sdhci.c | 2 --
31
hw/usb/dev-hub.c | 1 -
32
hw/usb/hcd-ehci.c | 1 -
33
hw/usb/hcd-ohci-pci.c | 1 -
34
hw/usb/hcd-uhci.c | 1 -
35
hw/usb/hcd-xhci.c | 1 -
36
hw/usb/redirect.c | 1 -
37
hw/vfio/display.c | 1 -
38
hw/virtio/vhost-vsock-common.c | 1 -
39
hw/virtio/virtio-balloon.c | 1 -
40
hw/virtio/virtio-rng.c | 1 -
41
hw/watchdog/wdt_diag288.c | 1 -
42
hw/watchdog/wdt_i6300esb.c | 1 -
43
migration/colo.c | 1 -
44
monitor/hmp-cmds.c | 1 -
45
net/announce.c | 1 -
46
net/colo-compare.c | 1 -
47
net/slirp.c | 1 -
48
replay/replay-debugging.c | 1 -
49
target/s390x/cpu.c | 2 --
50
ui/console.c | 1 -
51
ui/spice-core.c | 1 -
52
util/throttle.c | 1 -
53
42 files changed, 58 deletions(-)
27
54
28
diff --git a/target/arm/translate.c b/target/arm/translate.c
55
diff --git a/block/iscsi.c b/block/iscsi.c
29
index XXXXXXX..XXXXXXX 100644
56
index XXXXXXX..XXXXXXX 100644
30
--- a/target/arm/translate.c
57
--- a/block/iscsi.c
31
+++ b/target/arm/translate.c
58
+++ b/block/iscsi.c
32
@@ -XXX,XX +XXX,XX @@ static void disas_arm_insn(DisasContext *s, unsigned int insn)
59
@@ -XXX,XX +XXX,XX @@ static void iscsi_detach_aio_context(BlockDriverState *bs)
33
}
60
iscsilun->events = 0;
34
}
61
35
62
if (iscsilun->nop_timer) {
36
+static bool thumb_insn_is_16bit(DisasContext *s, uint32_t insn)
63
- timer_del(iscsilun->nop_timer);
37
+{
64
timer_free(iscsilun->nop_timer);
38
+ /* Return true if this is a 16 bit instruction. We must be precise
65
iscsilun->nop_timer = NULL;
39
+ * about this (matching the decode). We assume that s->pc still
66
}
40
+ * points to the first 16 bits of the insn.
67
if (iscsilun->event_timer) {
41
+ */
68
- timer_del(iscsilun->event_timer);
42
+ if ((insn >> 11) < 0x1d) {
69
timer_free(iscsilun->event_timer);
43
+ /* Definitely a 16-bit instruction */
70
iscsilun->event_timer = NULL;
44
+ return true;
71
}
45
+ }
72
diff --git a/block/nbd.c b/block/nbd.c
46
+
73
index XXXXXXX..XXXXXXX 100644
47
+ /* Top five bits 0b11101 / 0b11110 / 0b11111 : this is the
74
--- a/block/nbd.c
48
+ * first half of a 32-bit Thumb insn. Thumb-1 cores might
75
+++ b/block/nbd.c
49
+ * end up actually treating this as two 16-bit insns, though,
76
@@ -XXX,XX +XXX,XX @@ static void nbd_recv_coroutines_wake_all(BDRVNBDState *s)
50
+ * if it's half of a bl/blx pair that might span a page boundary.
77
static void reconnect_delay_timer_del(BDRVNBDState *s)
51
+ */
78
{
52
+ if (arm_dc_feature(s, ARM_FEATURE_THUMB2)) {
79
if (s->reconnect_delay_timer) {
53
+ /* Thumb2 cores (including all M profile ones) always treat
80
- timer_del(s->reconnect_delay_timer);
54
+ * 32-bit insns as 32-bit.
81
timer_free(s->reconnect_delay_timer);
55
+ */
82
s->reconnect_delay_timer = NULL;
56
+ return false;
83
}
57
+ }
84
diff --git a/block/qcow2.c b/block/qcow2.c
58
+
85
index XXXXXXX..XXXXXXX 100644
59
+ if ((insn >> 11) == 0x1e && (s->pc < s->next_page_start - 3)) {
86
--- a/block/qcow2.c
60
+ /* 0b1111_0xxx_xxxx_xxxx : BL/BLX prefix, and the suffix
87
+++ b/block/qcow2.c
61
+ * is not on the next page; we merge this into a 32-bit
88
@@ -XXX,XX +XXX,XX @@ static void cache_clean_timer_del(BlockDriverState *bs)
62
+ * insn.
89
{
63
+ */
90
BDRVQcow2State *s = bs->opaque;
64
+ return false;
91
if (s->cache_clean_timer) {
65
+ }
92
- timer_del(s->cache_clean_timer);
66
+ /* 0b1110_1xxx_xxxx_xxxx : BLX suffix (or UNDEF);
93
timer_free(s->cache_clean_timer);
67
+ * 0b1111_1xxx_xxxx_xxxx : BL suffix;
94
s->cache_clean_timer = NULL;
68
+ * 0b1111_0xxx_xxxx_xxxx : BL/BLX prefix on the end of a page
95
}
69
+ * -- handle as single 16 bit insn
96
diff --git a/hw/block/nvme.c b/hw/block/nvme.c
70
+ */
97
index XXXXXXX..XXXXXXX 100644
71
+ return true;
98
--- a/hw/block/nvme.c
72
+}
99
+++ b/hw/block/nvme.c
73
+
100
@@ -XXX,XX +XXX,XX @@ static uint16_t nvme_io_cmd(NvmeCtrl *n, NvmeRequest *req)
74
/* Return true if this is a Thumb-2 logical op. */
101
static void nvme_free_sq(NvmeSQueue *sq, NvmeCtrl *n)
75
static int
102
{
76
thumb2_logic_op(int op)
103
n->sq[sq->sqid] = NULL;
77
@@ -XXX,XX +XXX,XX @@ gen_thumb2_data_op(DisasContext *s, int op, int conds, uint32_t shifter_out,
104
- timer_del(sq->timer);
78
105
timer_free(sq->timer);
79
/* Translate a 32-bit thumb instruction. Returns nonzero if the instruction
106
g_free(sq->io_req);
80
is not legal. */
107
if (sq->sqid) {
81
-static int disas_thumb2_insn(CPUARMState *env, DisasContext *s, uint16_t insn_hw1)
108
@@ -XXX,XX +XXX,XX @@ static uint16_t nvme_get_log(NvmeCtrl *n, NvmeRequest *req)
82
+static int disas_thumb2_insn(DisasContext *s, uint32_t insn)
109
static void nvme_free_cq(NvmeCQueue *cq, NvmeCtrl *n)
83
{
110
{
84
- uint32_t insn, imm, shift, offset;
111
n->cq[cq->cqid] = NULL;
85
+ uint32_t imm, shift, offset;
112
- timer_del(cq->timer);
86
uint32_t rd, rn, rm, rs;
113
timer_free(cq->timer);
87
TCGv_i32 tmp;
114
msix_vector_unuse(&n->parent_obj, cq->vector);
88
TCGv_i32 tmp2;
115
if (cq->cqid) {
89
@@ -XXX,XX +XXX,XX @@ static int disas_thumb2_insn(CPUARMState *env, DisasContext *s, uint16_t insn_hw
116
diff --git a/hw/char/serial.c b/hw/char/serial.c
90
int conds;
117
index XXXXXXX..XXXXXXX 100644
91
int logic_cc;
118
--- a/hw/char/serial.c
92
119
+++ b/hw/char/serial.c
93
- if (!arm_dc_feature(s, ARM_FEATURE_THUMB2)) {
120
@@ -XXX,XX +XXX,XX @@ static void serial_unrealize(DeviceState *dev)
94
- /* Thumb-1 cores may need to treat bl and blx as a pair of
121
95
- 16-bit instructions to get correct prefetch abort behavior. */
122
qemu_chr_fe_deinit(&s->chr, false);
96
- insn = insn_hw1;
123
97
- if ((insn & (1 << 12)) == 0) {
124
- timer_del(s->modem_status_poll);
98
- ARCH(5);
125
timer_free(s->modem_status_poll);
99
- /* Second half of blx. */
126
100
- offset = ((insn & 0x7ff) << 1);
127
- timer_del(s->fifo_timeout_timer);
101
- tmp = load_reg(s, 14);
128
timer_free(s->fifo_timeout_timer);
102
- tcg_gen_addi_i32(tmp, tmp, offset);
129
103
- tcg_gen_andi_i32(tmp, tmp, 0xfffffffc);
130
fifo8_destroy(&s->recv_fifo);
104
-
131
diff --git a/hw/char/virtio-serial-bus.c b/hw/char/virtio-serial-bus.c
105
- tmp2 = tcg_temp_new_i32();
132
index XXXXXXX..XXXXXXX 100644
106
- tcg_gen_movi_i32(tmp2, s->pc | 1);
133
--- a/hw/char/virtio-serial-bus.c
107
- store_reg(s, 14, tmp2);
134
+++ b/hw/char/virtio-serial-bus.c
108
- gen_bx(s, tmp);
135
@@ -XXX,XX +XXX,XX @@ static void virtio_serial_post_load_timer_cb(void *opaque)
109
- return 0;
136
}
110
- }
137
}
111
- if (insn & (1 << 11)) {
138
g_free(s->post_load->connected);
112
- /* Second half of bl. */
139
- timer_del(s->post_load->timer);
113
- offset = ((insn & 0x7ff) << 1) | 1;
140
timer_free(s->post_load->timer);
114
- tmp = load_reg(s, 14);
141
g_free(s->post_load);
115
- tcg_gen_addi_i32(tmp, tmp, offset);
142
s->post_load = NULL;
116
-
143
@@ -XXX,XX +XXX,XX @@ static void virtio_serial_device_unrealize(DeviceState *dev)
117
- tmp2 = tcg_temp_new_i32();
144
g_free(vser->ports_map);
118
- tcg_gen_movi_i32(tmp2, s->pc | 1);
145
if (vser->post_load) {
119
- store_reg(s, 14, tmp2);
146
g_free(vser->post_load->connected);
120
- gen_bx(s, tmp);
147
- timer_del(vser->post_load->timer);
121
- return 0;
148
timer_free(vser->post_load->timer);
122
- }
149
g_free(vser->post_load);
123
- if ((s->pc & ~TARGET_PAGE_MASK) == 0) {
150
}
124
- /* Instruction spans a page boundary. Implement it as two
151
diff --git a/hw/ide/core.c b/hw/ide/core.c
125
- 16-bit instructions in case the second half causes an
152
index XXXXXXX..XXXXXXX 100644
126
- prefetch abort. */
153
--- a/hw/ide/core.c
127
- offset = ((int32_t)insn << 21) >> 9;
154
+++ b/hw/ide/core.c
128
- tcg_gen_movi_i32(cpu_R[14], s->pc + 2 + offset);
155
@@ -XXX,XX +XXX,XX @@ void ide_init2(IDEBus *bus, qemu_irq irq)
129
- return 0;
156
130
- }
157
void ide_exit(IDEState *s)
131
- /* Fall through to 32-bit decode. */
158
{
132
- }
159
- timer_del(s->sector_write_timer);
133
-
160
timer_free(s->sector_write_timer);
134
- insn = arm_lduw_code(env, s->pc, s->sctlr_b);
161
qemu_vfree(s->smart_selftest_data);
135
- s->pc += 2;
162
qemu_vfree(s->io_buffer);
136
- insn |= (uint32_t)insn_hw1 << 16;
163
diff --git a/hw/input/hid.c b/hw/input/hid.c
137
-
164
index XXXXXXX..XXXXXXX 100644
138
+ /* The only 32 bit insn that's allowed for Thumb1 is the combined
165
--- a/hw/input/hid.c
139
+ * BL/BLX prefix and suffix.
166
+++ b/hw/input/hid.c
140
+ */
167
@@ -XXX,XX +XXX,XX @@ static void hid_idle_timer(void *opaque)
141
if ((insn & 0xf800e800) != 0xf000e800) {
168
static void hid_del_idle_timer(HIDState *hs)
142
ARCH(6T2);
169
{
143
}
170
if (hs->idle_timer) {
144
@@ -XXX,XX +XXX,XX @@ illegal_op:
171
- timer_del(hs->idle_timer);
145
return 1;
172
timer_free(hs->idle_timer);
146
}
173
hs->idle_timer = NULL;
147
174
}
148
-static void disas_thumb_insn(CPUARMState *env, DisasContext *s)
175
diff --git a/hw/intc/apic.c b/hw/intc/apic.c
149
+static void disas_thumb_insn(DisasContext *s, uint32_t insn)
176
index XXXXXXX..XXXXXXX 100644
150
{
177
--- a/hw/intc/apic.c
151
- uint32_t val, insn, op, rm, rn, rd, shift, cond;
178
+++ b/hw/intc/apic.c
152
+ uint32_t val, op, rm, rn, rd, shift, cond;
179
@@ -XXX,XX +XXX,XX @@ static void apic_unrealize(DeviceState *dev)
153
int32_t offset;
180
{
181
APICCommonState *s = APIC(dev);
182
183
- timer_del(s->timer);
184
timer_free(s->timer);
185
local_apics[s->id] = NULL;
186
}
187
diff --git a/hw/intc/ioapic.c b/hw/intc/ioapic.c
188
index XXXXXXX..XXXXXXX 100644
189
--- a/hw/intc/ioapic.c
190
+++ b/hw/intc/ioapic.c
191
@@ -XXX,XX +XXX,XX @@ static void ioapic_unrealize(DeviceState *dev)
192
{
193
IOAPICCommonState *s = IOAPIC_COMMON(dev);
194
195
- timer_del(s->delayed_ioapic_service_timer);
196
timer_free(s->delayed_ioapic_service_timer);
197
}
198
199
diff --git a/hw/ipmi/ipmi_bmc_extern.c b/hw/ipmi/ipmi_bmc_extern.c
200
index XXXXXXX..XXXXXXX 100644
201
--- a/hw/ipmi/ipmi_bmc_extern.c
202
+++ b/hw/ipmi/ipmi_bmc_extern.c
203
@@ -XXX,XX +XXX,XX @@ static void ipmi_bmc_extern_finalize(Object *obj)
204
{
205
IPMIBmcExtern *ibe = IPMI_BMC_EXTERN(obj);
206
207
- timer_del(ibe->extern_timer);
208
timer_free(ibe->extern_timer);
209
}
210
211
diff --git a/hw/net/e1000.c b/hw/net/e1000.c
212
index XXXXXXX..XXXXXXX 100644
213
--- a/hw/net/e1000.c
214
+++ b/hw/net/e1000.c
215
@@ -XXX,XX +XXX,XX @@ pci_e1000_uninit(PCIDevice *dev)
216
{
217
E1000State *d = E1000(dev);
218
219
- timer_del(d->autoneg_timer);
220
timer_free(d->autoneg_timer);
221
- timer_del(d->mit_timer);
222
timer_free(d->mit_timer);
223
- timer_del(d->flush_queue_timer);
224
timer_free(d->flush_queue_timer);
225
qemu_del_nic(d->nic);
226
}
227
diff --git a/hw/net/e1000e_core.c b/hw/net/e1000e_core.c
228
index XXXXXXX..XXXXXXX 100644
229
--- a/hw/net/e1000e_core.c
230
+++ b/hw/net/e1000e_core.c
231
@@ -XXX,XX +XXX,XX @@ e1000e_intrmgr_pci_unint(E1000ECore *core)
232
{
154
int i;
233
int i;
155
TCGv_i32 tmp;
234
156
TCGv_i32 tmp2;
235
- timer_del(core->radv.timer);
157
TCGv_i32 addr;
236
timer_free(core->radv.timer);
158
237
- timer_del(core->rdtr.timer);
159
- if (s->condexec_mask) {
238
timer_free(core->rdtr.timer);
160
- cond = s->condexec_cond;
239
- timer_del(core->raid.timer);
161
- if (cond != 0x0e) { /* Skip conditional when condition is AL. */
240
timer_free(core->raid.timer);
162
- s->condlabel = gen_new_label();
241
163
- arm_gen_test_cc(cond ^ 1, s->condlabel);
242
- timer_del(core->tadv.timer);
164
- s->condjmp = 1;
243
timer_free(core->tadv.timer);
165
- }
244
- timer_del(core->tidv.timer);
166
- }
245
timer_free(core->tidv.timer);
167
-
246
168
- insn = arm_lduw_code(env, s->pc, s->sctlr_b);
247
- timer_del(core->itr.timer);
169
- s->pc += 2;
248
timer_free(core->itr.timer);
170
-
249
171
switch (insn >> 12) {
250
for (i = 0; i < E1000E_MSIX_VEC_NUM; i++) {
172
case 0: case 1:
251
- timer_del(core->eitr[i].timer);
173
252
timer_free(core->eitr[i].timer);
174
@@ -XXX,XX +XXX,XX @@ static void disas_thumb_insn(CPUARMState *env, DisasContext *s)
253
}
175
254
}
176
case 14:
255
@@ -XXX,XX +XXX,XX @@ e1000e_core_pci_uninit(E1000ECore *core)
177
if (insn & (1 << 11)) {
256
{
178
- if (disas_thumb2_insn(env, s, insn))
257
int i;
179
- goto undef32;
258
180
+ /* thumb_insn_is_16bit() ensures we can't get here for
259
- timer_del(core->autoneg_timer);
181
+ * a Thumb2 CPU, so this must be a thumb1 split BL/BLX:
260
timer_free(core->autoneg_timer);
182
+ * 0b1110_1xxx_xxxx_xxxx : BLX suffix (or UNDEF)
261
183
+ */
262
e1000e_intrmgr_pci_unint(core);
184
+ assert(!arm_dc_feature(s, ARM_FEATURE_THUMB2));
263
diff --git a/hw/net/pcnet-pci.c b/hw/net/pcnet-pci.c
185
+ ARCH(5);
264
index XXXXXXX..XXXXXXX 100644
186
+ offset = ((insn & 0x7ff) << 1);
265
--- a/hw/net/pcnet-pci.c
187
+ tmp = load_reg(s, 14);
266
+++ b/hw/net/pcnet-pci.c
188
+ tcg_gen_addi_i32(tmp, tmp, offset);
267
@@ -XXX,XX +XXX,XX @@ static void pci_pcnet_uninit(PCIDevice *dev)
189
+ tcg_gen_andi_i32(tmp, tmp, 0xfffffffc);
268
PCIPCNetState *d = PCI_PCNET(dev);
190
+
269
191
+ tmp2 = tcg_temp_new_i32();
270
qemu_free_irq(d->state.irq);
192
+ tcg_gen_movi_i32(tmp2, s->pc | 1);
271
- timer_del(d->state.poll_timer);
193
+ store_reg(s, 14, tmp2);
272
timer_free(d->state.poll_timer);
194
+ gen_bx(s, tmp);
273
qemu_del_nic(d->state.nic);
195
break;
274
}
275
diff --git a/hw/net/rtl8139.c b/hw/net/rtl8139.c
276
index XXXXXXX..XXXXXXX 100644
277
--- a/hw/net/rtl8139.c
278
+++ b/hw/net/rtl8139.c
279
@@ -XXX,XX +XXX,XX @@ static void pci_rtl8139_uninit(PCIDevice *dev)
280
281
g_free(s->cplus_txbuffer);
282
s->cplus_txbuffer = NULL;
283
- timer_del(s->timer);
284
timer_free(s->timer);
285
qemu_del_nic(s->nic);
286
}
287
diff --git a/hw/net/spapr_llan.c b/hw/net/spapr_llan.c
288
index XXXXXXX..XXXXXXX 100644
289
--- a/hw/net/spapr_llan.c
290
+++ b/hw/net/spapr_llan.c
291
@@ -XXX,XX +XXX,XX @@ static void spapr_vlan_instance_finalize(Object *obj)
292
}
293
294
if (dev->rxp_timer) {
295
- timer_del(dev->rxp_timer);
296
timer_free(dev->rxp_timer);
297
}
298
}
299
diff --git a/hw/net/virtio-net.c b/hw/net/virtio-net.c
300
index XXXXXXX..XXXXXXX 100644
301
--- a/hw/net/virtio-net.c
302
+++ b/hw/net/virtio-net.c
303
@@ -XXX,XX +XXX,XX @@ static void virtio_net_rsc_cleanup(VirtIONet *n)
304
g_free(seg);
196
}
305
}
197
/* unconditional branch */
306
198
@@ -XXX,XX +XXX,XX @@ static void disas_thumb_insn(CPUARMState *env, DisasContext *s)
307
- timer_del(chain->drain_timer);
199
break;
308
timer_free(chain->drain_timer);
200
309
QTAILQ_REMOVE(&n->rsc_chains, chain, next);
201
case 15:
310
g_free(chain);
202
- if (disas_thumb2_insn(env, s, insn))
311
@@ -XXX,XX +XXX,XX @@ static void virtio_net_del_queue(VirtIONet *n, int index)
203
- goto undef32;
312
204
+ /* thumb_insn_is_16bit() ensures we can't get here for
313
virtio_del_queue(vdev, index * 2);
205
+ * a Thumb2 CPU, so this must be a thumb1 split BL/BLX.
314
if (q->tx_timer) {
206
+ */
315
- timer_del(q->tx_timer);
207
+ assert(!arm_dc_feature(s, ARM_FEATURE_THUMB2));
316
timer_free(q->tx_timer);
208
+
317
q->tx_timer = NULL;
209
+ if (insn & (1 << 11)) {
318
} else {
210
+ /* 0b1111_1xxx_xxxx_xxxx : BL suffix */
319
diff --git a/hw/s390x/s390-pci-inst.c b/hw/s390x/s390-pci-inst.c
211
+ offset = ((insn & 0x7ff) << 1) | 1;
320
index XXXXXXX..XXXXXXX 100644
212
+ tmp = load_reg(s, 14);
321
--- a/hw/s390x/s390-pci-inst.c
213
+ tcg_gen_addi_i32(tmp, tmp, offset);
322
+++ b/hw/s390x/s390-pci-inst.c
214
+
323
@@ -XXX,XX +XXX,XX @@ void pci_dereg_ioat(S390PCIIOMMU *iommu)
215
+ tmp2 = tcg_temp_new_i32();
324
void fmb_timer_free(S390PCIBusDevice *pbdev)
216
+ tcg_gen_movi_i32(tmp2, s->pc | 1);
325
{
217
+ store_reg(s, 14, tmp2);
326
if (pbdev->fmb_timer) {
218
+ gen_bx(s, tmp);
327
- timer_del(pbdev->fmb_timer);
219
+ } else {
328
timer_free(pbdev->fmb_timer);
220
+ /* 0b1111_0xxx_xxxx_xxxx : BL/BLX prefix */
329
pbdev->fmb_timer = NULL;
221
+ uint32_t uoffset = ((int32_t)insn << 21) >> 9;
330
}
222
+
331
diff --git a/hw/sd/sd.c b/hw/sd/sd.c
223
+ tcg_gen_movi_i32(cpu_R[14], s->pc + 2 + uoffset);
332
index XXXXXXX..XXXXXXX 100644
224
+ }
333
--- a/hw/sd/sd.c
225
break;
334
+++ b/hw/sd/sd.c
226
}
335
@@ -XXX,XX +XXX,XX @@ static void sd_instance_finalize(Object *obj)
227
return;
336
{
228
-undef32:
337
SDState *sd = SD_CARD(obj);
229
- gen_exception_insn(s, 4, EXCP_UDEF, syn_uncategorized(),
338
230
- default_exception_el(s));
339
- timer_del(sd->ocr_power_timer);
231
- return;
340
timer_free(sd->ocr_power_timer);
232
illegal_op:
341
}
233
undef:
342
234
gen_exception_insn(s, 2, EXCP_UDEF, syn_uncategorized(),
343
diff --git a/hw/sd/sdhci.c b/hw/sd/sdhci.c
235
@@ -XXX,XX +XXX,XX @@ static void thumb_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu)
344
index XXXXXXX..XXXXXXX 100644
236
{
345
--- a/hw/sd/sdhci.c
237
DisasContext *dc = container_of(dcbase, DisasContext, base);
346
+++ b/hw/sd/sdhci.c
238
CPUARMState *env = cpu->env_ptr;
347
@@ -XXX,XX +XXX,XX @@ void sdhci_initfn(SDHCIState *s)
239
+ uint32_t insn;
348
240
+ bool is_16bit;
349
void sdhci_uninitfn(SDHCIState *s)
241
350
{
242
if (arm_pre_translate_insn(dc)) {
351
- timer_del(s->insert_timer);
352
timer_free(s->insert_timer);
353
- timer_del(s->transfer_timer);
354
timer_free(s->transfer_timer);
355
356
g_free(s->fifo_buffer);
357
diff --git a/hw/usb/dev-hub.c b/hw/usb/dev-hub.c
358
index XXXXXXX..XXXXXXX 100644
359
--- a/hw/usb/dev-hub.c
360
+++ b/hw/usb/dev-hub.c
361
@@ -XXX,XX +XXX,XX @@ static void usb_hub_unrealize(USBDevice *dev)
362
&s->ports[i].port);
363
}
364
365
- timer_del(s->port_timer);
366
timer_free(s->port_timer);
367
}
368
369
diff --git a/hw/usb/hcd-ehci.c b/hw/usb/hcd-ehci.c
370
index XXXXXXX..XXXXXXX 100644
371
--- a/hw/usb/hcd-ehci.c
372
+++ b/hw/usb/hcd-ehci.c
373
@@ -XXX,XX +XXX,XX @@ void usb_ehci_unrealize(EHCIState *s, DeviceState *dev)
374
trace_usb_ehci_unrealize();
375
376
if (s->frame_timer) {
377
- timer_del(s->frame_timer);
378
timer_free(s->frame_timer);
379
s->frame_timer = NULL;
380
}
381
diff --git a/hw/usb/hcd-ohci-pci.c b/hw/usb/hcd-ohci-pci.c
382
index XXXXXXX..XXXXXXX 100644
383
--- a/hw/usb/hcd-ohci-pci.c
384
+++ b/hw/usb/hcd-ohci-pci.c
385
@@ -XXX,XX +XXX,XX @@ static void usb_ohci_exit(PCIDevice *dev)
386
usb_bus_release(&s->bus);
387
}
388
389
- timer_del(s->eof_timer);
390
timer_free(s->eof_timer);
391
}
392
393
diff --git a/hw/usb/hcd-uhci.c b/hw/usb/hcd-uhci.c
394
index XXXXXXX..XXXXXXX 100644
395
--- a/hw/usb/hcd-uhci.c
396
+++ b/hw/usb/hcd-uhci.c
397
@@ -XXX,XX +XXX,XX @@ static void usb_uhci_exit(PCIDevice *dev)
398
trace_usb_uhci_exit();
399
400
if (s->frame_timer) {
401
- timer_del(s->frame_timer);
402
timer_free(s->frame_timer);
403
s->frame_timer = NULL;
404
}
405
diff --git a/hw/usb/hcd-xhci.c b/hw/usb/hcd-xhci.c
406
index XXXXXXX..XXXXXXX 100644
407
--- a/hw/usb/hcd-xhci.c
408
+++ b/hw/usb/hcd-xhci.c
409
@@ -XXX,XX +XXX,XX @@ static void usb_xhci_unrealize(DeviceState *dev)
410
}
411
412
if (xhci->mfwrap_timer) {
413
- timer_del(xhci->mfwrap_timer);
414
timer_free(xhci->mfwrap_timer);
415
xhci->mfwrap_timer = NULL;
416
}
417
diff --git a/hw/usb/redirect.c b/hw/usb/redirect.c
418
index XXXXXXX..XXXXXXX 100644
419
--- a/hw/usb/redirect.c
420
+++ b/hw/usb/redirect.c
421
@@ -XXX,XX +XXX,XX @@ static void usbredir_unrealize(USBDevice *udev)
422
qemu_bh_delete(dev->chardev_close_bh);
423
qemu_bh_delete(dev->device_reject_bh);
424
425
- timer_del(dev->attach_timer);
426
timer_free(dev->attach_timer);
427
428
usbredir_cleanup_device_queues(dev);
429
diff --git a/hw/vfio/display.c b/hw/vfio/display.c
430
index XXXXXXX..XXXXXXX 100644
431
--- a/hw/vfio/display.c
432
+++ b/hw/vfio/display.c
433
@@ -XXX,XX +XXX,XX @@ static void vfio_display_edid_exit(VFIODisplay *dpy)
434
435
g_free(dpy->edid_regs);
436
g_free(dpy->edid_blob);
437
- timer_del(dpy->edid_link_timer);
438
timer_free(dpy->edid_link_timer);
439
}
440
441
diff --git a/hw/virtio/vhost-vsock-common.c b/hw/virtio/vhost-vsock-common.c
442
index XXXXXXX..XXXXXXX 100644
443
--- a/hw/virtio/vhost-vsock-common.c
444
+++ b/hw/virtio/vhost-vsock-common.c
445
@@ -XXX,XX +XXX,XX @@ static void vhost_vsock_common_post_load_timer_cleanup(VHostVSockCommon *vvc)
243
return;
446
return;
244
}
447
}
245
448
246
- disas_thumb_insn(env, dc);
449
- timer_del(vvc->post_load_timer);
247
+ insn = arm_lduw_code(env, dc->pc, dc->sctlr_b);
450
timer_free(vvc->post_load_timer);
248
+ is_16bit = thumb_insn_is_16bit(dc, insn);
451
vvc->post_load_timer = NULL;
249
+ dc->pc += 2;
452
}
250
+ if (!is_16bit) {
453
diff --git a/hw/virtio/virtio-balloon.c b/hw/virtio/virtio-balloon.c
251
+ uint32_t insn2 = arm_lduw_code(env, dc->pc, dc->sctlr_b);
454
index XXXXXXX..XXXXXXX 100644
252
+
455
--- a/hw/virtio/virtio-balloon.c
253
+ insn = insn << 16 | insn2;
456
+++ b/hw/virtio/virtio-balloon.c
254
+ dc->pc += 2;
457
@@ -XXX,XX +XXX,XX @@ static bool balloon_stats_enabled(const VirtIOBalloon *s)
255
+ }
458
static void balloon_stats_destroy_timer(VirtIOBalloon *s)
256
+
459
{
257
+ if (dc->condexec_mask) {
460
if (balloon_stats_enabled(s)) {
258
+ uint32_t cond = dc->condexec_cond;
461
- timer_del(s->stats_timer);
259
+
462
timer_free(s->stats_timer);
260
+ if (cond != 0x0e) { /* Skip conditional when condition is AL. */
463
s->stats_timer = NULL;
261
+ dc->condlabel = gen_new_label();
464
s->stats_poll_interval = 0;
262
+ arm_gen_test_cc(cond ^ 1, dc->condlabel);
465
diff --git a/hw/virtio/virtio-rng.c b/hw/virtio/virtio-rng.c
263
+ dc->condjmp = 1;
466
index XXXXXXX..XXXXXXX 100644
264
+ }
467
--- a/hw/virtio/virtio-rng.c
265
+ }
468
+++ b/hw/virtio/virtio-rng.c
266
+
469
@@ -XXX,XX +XXX,XX @@ static void virtio_rng_device_unrealize(DeviceState *dev)
267
+ if (is_16bit) {
470
VirtIORNG *vrng = VIRTIO_RNG(dev);
268
+ disas_thumb_insn(dc, insn);
471
269
+ } else {
472
qemu_del_vm_change_state_handler(vrng->vmstate);
270
+ disas_thumb2_insn(dc, insn);
473
- timer_del(vrng->rate_limit_timer);
271
+ }
474
timer_free(vrng->rate_limit_timer);
272
475
virtio_del_queue(vdev, 0);
273
/* Advance the Thumb condexec condition. */
476
virtio_cleanup(vdev);
274
if (dc->condexec_mask) {
477
diff --git a/hw/watchdog/wdt_diag288.c b/hw/watchdog/wdt_diag288.c
478
index XXXXXXX..XXXXXXX 100644
479
--- a/hw/watchdog/wdt_diag288.c
480
+++ b/hw/watchdog/wdt_diag288.c
481
@@ -XXX,XX +XXX,XX @@ static void wdt_diag288_unrealize(DeviceState *dev)
482
{
483
DIAG288State *diag288 = DIAG288(dev);
484
485
- timer_del(diag288->timer);
486
timer_free(diag288->timer);
487
}
488
489
diff --git a/hw/watchdog/wdt_i6300esb.c b/hw/watchdog/wdt_i6300esb.c
490
index XXXXXXX..XXXXXXX 100644
491
--- a/hw/watchdog/wdt_i6300esb.c
492
+++ b/hw/watchdog/wdt_i6300esb.c
493
@@ -XXX,XX +XXX,XX @@ static void i6300esb_exit(PCIDevice *dev)
494
{
495
I6300State *d = WATCHDOG_I6300ESB_DEVICE(dev);
496
497
- timer_del(d->timer);
498
timer_free(d->timer);
499
}
500
501
diff --git a/migration/colo.c b/migration/colo.c
502
index XXXXXXX..XXXXXXX 100644
503
--- a/migration/colo.c
504
+++ b/migration/colo.c
505
@@ -XXX,XX +XXX,XX @@ out:
506
* error.
507
*/
508
colo_compare_unregister_notifier(&packets_compare_notifier);
509
- timer_del(s->colo_delay_timer);
510
timer_free(s->colo_delay_timer);
511
qemu_event_destroy(&s->colo_checkpoint_event);
512
513
diff --git a/monitor/hmp-cmds.c b/monitor/hmp-cmds.c
514
index XXXXXXX..XXXXXXX 100644
515
--- a/monitor/hmp-cmds.c
516
+++ b/monitor/hmp-cmds.c
517
@@ -XXX,XX +XXX,XX @@ static void hmp_migrate_status_cb(void *opaque)
518
error_report("%s", info->error_desc);
519
}
520
monitor_resume(status->mon);
521
- timer_del(status->timer);
522
timer_free(status->timer);
523
g_free(status);
524
}
525
diff --git a/net/announce.c b/net/announce.c
526
index XXXXXXX..XXXXXXX 100644
527
--- a/net/announce.c
528
+++ b/net/announce.c
529
@@ -XXX,XX +XXX,XX @@ void qemu_announce_timer_del(AnnounceTimer *timer, bool free_named)
530
{
531
bool free_timer = false;
532
if (timer->tm) {
533
- timer_del(timer->tm);
534
timer_free(timer->tm);
535
timer->tm = NULL;
536
}
537
diff --git a/net/colo-compare.c b/net/colo-compare.c
538
index XXXXXXX..XXXXXXX 100644
539
--- a/net/colo-compare.c
540
+++ b/net/colo-compare.c
541
@@ -XXX,XX +XXX,XX @@ static void colo_compare_timer_init(CompareState *s)
542
static void colo_compare_timer_del(CompareState *s)
543
{
544
if (s->packet_check_timer) {
545
- timer_del(s->packet_check_timer);
546
timer_free(s->packet_check_timer);
547
s->packet_check_timer = NULL;
548
}
549
diff --git a/net/slirp.c b/net/slirp.c
550
index XXXXXXX..XXXXXXX 100644
551
--- a/net/slirp.c
552
+++ b/net/slirp.c
553
@@ -XXX,XX +XXX,XX @@ static void *net_slirp_timer_new(SlirpTimerCb cb,
554
555
static void net_slirp_timer_free(void *timer, void *opaque)
556
{
557
- timer_del(timer);
558
timer_free(timer);
559
}
560
561
diff --git a/replay/replay-debugging.c b/replay/replay-debugging.c
562
index XXXXXXX..XXXXXXX 100644
563
--- a/replay/replay-debugging.c
564
+++ b/replay/replay-debugging.c
565
@@ -XXX,XX +XXX,XX @@ static void replay_delete_break(void)
566
assert(replay_mutex_locked());
567
568
if (replay_break_timer) {
569
- timer_del(replay_break_timer);
570
timer_free(replay_break_timer);
571
replay_break_timer = NULL;
572
}
573
diff --git a/target/s390x/cpu.c b/target/s390x/cpu.c
574
index XXXXXXX..XXXXXXX 100644
575
--- a/target/s390x/cpu.c
576
+++ b/target/s390x/cpu.c
577
@@ -XXX,XX +XXX,XX @@ static void s390_cpu_finalize(Object *obj)
578
#if !defined(CONFIG_USER_ONLY)
579
S390CPU *cpu = S390_CPU(obj);
580
581
- timer_del(cpu->env.tod_timer);
582
timer_free(cpu->env.tod_timer);
583
- timer_del(cpu->env.cpu_timer);
584
timer_free(cpu->env.cpu_timer);
585
586
qemu_unregister_reset(s390_cpu_machine_reset_cb, cpu);
587
diff --git a/ui/console.c b/ui/console.c
588
index XXXXXXX..XXXXXXX 100644
589
--- a/ui/console.c
590
+++ b/ui/console.c
591
@@ -XXX,XX +XXX,XX @@ static void gui_setup_refresh(DisplayState *ds)
592
timer_mod(ds->gui_timer, qemu_clock_get_ms(QEMU_CLOCK_REALTIME));
593
}
594
if (!need_timer && ds->gui_timer != NULL) {
595
- timer_del(ds->gui_timer);
596
timer_free(ds->gui_timer);
597
ds->gui_timer = NULL;
598
}
599
diff --git a/ui/spice-core.c b/ui/spice-core.c
600
index XXXXXXX..XXXXXXX 100644
601
--- a/ui/spice-core.c
602
+++ b/ui/spice-core.c
603
@@ -XXX,XX +XXX,XX @@ static void timer_cancel(SpiceTimer *timer)
604
605
static void timer_remove(SpiceTimer *timer)
606
{
607
- timer_del(timer->timer);
608
timer_free(timer->timer);
609
g_free(timer);
610
}
611
diff --git a/util/throttle.c b/util/throttle.c
612
index XXXXXXX..XXXXXXX 100644
613
--- a/util/throttle.c
614
+++ b/util/throttle.c
615
@@ -XXX,XX +XXX,XX @@ static void throttle_timer_destroy(QEMUTimer **timer)
616
{
617
assert(*timer != NULL);
618
619
- timer_del(*timer);
620
timer_free(*timer);
621
*timer = NULL;
622
}
275
--
623
--
276
2.7.4
624
2.20.1
277
625
278
626
diff view generated by jsdifflib
1
Coverity points out that we forgot the 'break' for
1
The Arm CPU finalize function uses a sequence of timer_del(), timer_deinit(),
2
the SAU_CTRL write case (CID1381683). This has
2
timer_free() to free the timer. The timer_deinit() step in this was always
3
no actual visible consequences because it happens
3
unnecessary, and now the timer_del() is implied by timer_free(), so we can
4
that the following case is effectively a no-op.
4
collapse this down to simply calling timer_free().
5
5
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
7
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
8
Message-id: 1507742676-9908-1-git-send-email-peter.maydell@linaro.org
9
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20201215154107.3255-5-peter.maydell@linaro.org
10
---
10
---
11
hw/intc/armv7m_nvic.c | 1 +
11
target/arm/cpu.c | 2 --
12
1 file changed, 1 insertion(+)
12
1 file changed, 2 deletions(-)
13
13
14
diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c
14
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
15
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
16
--- a/hw/intc/armv7m_nvic.c
16
--- a/target/arm/cpu.c
17
+++ b/hw/intc/armv7m_nvic.c
17
+++ b/target/arm/cpu.c
18
@@ -XXX,XX +XXX,XX @@ static void nvic_writel(NVICState *s, uint32_t offset, uint32_t value,
18
@@ -XXX,XX +XXX,XX @@ static void arm_cpu_finalizefn(Object *obj)
19
return;
19
}
20
}
20
#ifndef CONFIG_USER_ONLY
21
cpu->env.sau.ctrl = value & 3;
21
if (cpu->pmu_timer) {
22
+ break;
22
- timer_del(cpu->pmu_timer);
23
case 0xdd4: /* SAU_TYPE */
23
- timer_deinit(cpu->pmu_timer);
24
if (!arm_feature(&cpu->env, ARM_FEATURE_V8)) {
24
timer_free(cpu->pmu_timer);
25
goto bad_offset;
25
}
26
#endif
26
--
27
--
27
2.7.4
28
2.20.1
28
29
29
30
diff view generated by jsdifflib
New patch
1
From: Gan Qixin <ganqixin@huawei.com>
1
2
3
When running device-introspect-test, a memory leak occurred in the
4
digic_timer_init function, so use ptimer_free() in the finalize function to
5
avoid it.
6
7
ASAN shows memory leak stack:
8
9
Indirect leak of 288 byte(s) in 3 object(s) allocated from:
10
#0 0xffffab97e1f0 in __interceptor_calloc (/lib64/libasan.so.5+0xee1f0)
11
#1 0xffffab256800 in g_malloc0 (/lib64/libglib-2.0.so.0+0x56800)
12
#2 0xaaabf555db78 in ptimer_init /qemu/hw/core/ptimer.c:432
13
#3 0xaaabf5b04084 in digic_timer_init /qemu/hw/timer/digic-timer.c:142
14
#4 0xaaabf6339f6c in object_initialize_with_type /qemu/qom/object.c:515
15
#5 0xaaabf633ca04 in object_initialize_child_with_propsv /qemu/qom/object.c:564
16
#6 0xaaabf633cc08 in object_initialize_child_with_props /qemu/qom/object.c:547
17
#7 0xaaabf5b40e84 in digic_init /qemu/hw/arm/digic.c:46
18
#8 0xaaabf6339f6c in object_initialize_with_type /qemu/qom/object.c:515
19
#9 0xaaabf633a1e0 in object_new_with_type /qemu/qom/object.c:729
20
#10 0xaaabf6375e40 in qmp_device_list_properties /qemu/qom/qom-qmp-cmds.c:153
21
#11 0xaaabf653d8ec in qmp_marshal_device_list_properties /qemu/qapi/qapi-commands-qdev.c:59
22
#12 0xaaabf6587d08 in do_qmp_dispatch_bh /qemu/qapi/qmp-dispatch.c:110
23
24
Reported-by: Euler Robot <euler.robot@huawei.com>
25
Signed-off-by: Gan Qixin <ganqixin@huawei.com>
26
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
27
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
28
---
29
hw/timer/digic-timer.c | 8 ++++++++
30
1 file changed, 8 insertions(+)
31
32
diff --git a/hw/timer/digic-timer.c b/hw/timer/digic-timer.c
33
index XXXXXXX..XXXXXXX 100644
34
--- a/hw/timer/digic-timer.c
35
+++ b/hw/timer/digic-timer.c
36
@@ -XXX,XX +XXX,XX @@ static void digic_timer_init(Object *obj)
37
sysbus_init_mmio(SYS_BUS_DEVICE(obj), &s->iomem);
38
}
39
40
+static void digic_timer_finalize(Object *obj)
41
+{
42
+ DigicTimerState *s = DIGIC_TIMER(obj);
43
+
44
+ ptimer_free(s->ptimer);
45
+}
46
+
47
static void digic_timer_class_init(ObjectClass *klass, void *class_data)
48
{
49
DeviceClass *dc = DEVICE_CLASS(klass);
50
@@ -XXX,XX +XXX,XX @@ static const TypeInfo digic_timer_info = {
51
.parent = TYPE_SYS_BUS_DEVICE,
52
.instance_size = sizeof(DigicTimerState),
53
.instance_init = digic_timer_init,
54
+ .instance_finalize = digic_timer_finalize,
55
.class_init = digic_timer_class_init,
56
};
57
58
--
59
2.20.1
60
61
diff view generated by jsdifflib
1
Implement the SG instruction, which we emulate 'by hand' in the
1
From: Gan Qixin <ganqixin@huawei.com>
2
exception handling code path.
3
2
3
When running device-introspect-test, a memory leak occurred in the a10_pit_init
4
function, so use ptimer_free() in the finalize function to avoid it.
5
6
ASAN shows memory leak stack:
7
8
Indirect leak of 288 byte(s) in 6 object(s) allocated from:
9
#0 0xffffab97e1f0 in __interceptor_calloc (/lib64/libasan.so.5+0xee1f0)
10
#1 0xffffab256800 in g_malloc0 (/lib64/libglib-2.0.so.0+0x56800)
11
#2 0xaaabf555db84 in timer_new_full /qemu/include/qemu/timer.h:523
12
#3 0xaaabf555db84 in timer_new /qemu/include/qemu/timer.h:544
13
#4 0xaaabf555db84 in timer_new_ns /qemu/include/qemu/timer.h:562
14
#5 0xaaabf555db84 in ptimer_init /qemu/hw/core/ptimer.c:433
15
#6 0xaaabf57415e8 in a10_pit_init /qemu/hw/timer/allwinner-a10-pit.c:278
16
#7 0xaaabf6339f6c in object_initialize_with_type /qemu/qom/object.c:515
17
#8 0xaaabf633ca04 in object_initialize_child_with_propsv /qemu/qom/object.c:564
18
#9 0xaaabf633cc08 in object_initialize_child_with_props /qemu/qom/object.c:547
19
#10 0xaaabf5b94680 in aw_a10_init /qemu/hw/arm/allwinner-a10.c:49
20
#11 0xaaabf6339f6c in object_initialize_with_type /qemu/qom/object.c:515
21
#12 0xaaabf633a1e0 in object_new_with_type /qemu/qom/object.c:729
22
23
Reported-by: Euler Robot <euler.robot@huawei.com>
24
Signed-off-by: Gan Qixin <ganqixin@huawei.com>
25
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
4
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
26
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
5
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
6
Message-id: 1507556919-24992-3-git-send-email-peter.maydell@linaro.org
7
---
27
---
8
target/arm/helper.c | 132 ++++++++++++++++++++++++++++++++++++++++++++++++++--
28
hw/timer/allwinner-a10-pit.c | 11 +++++++++++
9
1 file changed, 127 insertions(+), 5 deletions(-)
29
1 file changed, 11 insertions(+)
10
30
11
diff --git a/target/arm/helper.c b/target/arm/helper.c
31
diff --git a/hw/timer/allwinner-a10-pit.c b/hw/timer/allwinner-a10-pit.c
12
index XXXXXXX..XXXXXXX 100644
32
index XXXXXXX..XXXXXXX 100644
13
--- a/target/arm/helper.c
33
--- a/hw/timer/allwinner-a10-pit.c
14
+++ b/target/arm/helper.c
34
+++ b/hw/timer/allwinner-a10-pit.c
15
@@ -XXX,XX +XXX,XX @@ typedef struct V8M_SAttributes {
35
@@ -XXX,XX +XXX,XX @@ static void a10_pit_init(Object *obj)
16
bool irvalid;
17
} V8M_SAttributes;
18
19
+static void v8m_security_lookup(CPUARMState *env, uint32_t address,
20
+ MMUAccessType access_type, ARMMMUIdx mmu_idx,
21
+ V8M_SAttributes *sattrs);
22
+
23
/* Definitions for the PMCCNTR and PMCR registers */
24
#define PMCRD 0x8
25
#define PMCRC 0x4
26
@@ -XXX,XX +XXX,XX @@ static void arm_log_exception(int idx)
27
}
36
}
28
}
37
}
29
38
30
+static bool v7m_read_half_insn(ARMCPU *cpu, ARMMMUIdx mmu_idx,
39
+static void a10_pit_finalize(Object *obj)
31
+ uint32_t addr, uint16_t *insn)
32
+{
40
+{
33
+ /* Load a 16-bit portion of a v7M instruction, returning true on success,
41
+ AwA10PITState *s = AW_A10_PIT(obj);
34
+ * or false on failure (in which case we will have pended the appropriate
42
+ int i;
35
+ * exception).
36
+ * We need to do the instruction fetch's MPU and SAU checks
37
+ * like this because there is no MMU index that would allow
38
+ * doing the load with a single function call. Instead we must
39
+ * first check that the security attributes permit the load
40
+ * and that they don't mismatch on the two halves of the instruction,
41
+ * and then we do the load as a secure load (ie using the security
42
+ * attributes of the address, not the CPU, as architecturally required).
43
+ */
44
+ CPUState *cs = CPU(cpu);
45
+ CPUARMState *env = &cpu->env;
46
+ V8M_SAttributes sattrs = {};
47
+ MemTxAttrs attrs = {};
48
+ ARMMMUFaultInfo fi = {};
49
+ MemTxResult txres;
50
+ target_ulong page_size;
51
+ hwaddr physaddr;
52
+ int prot;
53
+ uint32_t fsr;
54
+
43
+
55
+ v8m_security_lookup(env, addr, MMU_INST_FETCH, mmu_idx, &sattrs);
44
+ for (i = 0; i < AW_A10_PIT_TIMER_NR; i++) {
56
+ if (!sattrs.nsc || sattrs.ns) {
45
+ ptimer_free(s->timer[i]);
57
+ /* This must be the second half of the insn, and it straddles a
58
+ * region boundary with the second half not being S&NSC.
59
+ */
60
+ env->v7m.sfsr |= R_V7M_SFSR_INVEP_MASK;
61
+ armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_SECURE, false);
62
+ qemu_log_mask(CPU_LOG_INT,
63
+ "...really SecureFault with SFSR.INVEP\n");
64
+ return false;
65
+ }
46
+ }
66
+ if (get_phys_addr(env, addr, MMU_INST_FETCH, mmu_idx,
67
+ &physaddr, &attrs, &prot, &page_size, &fsr, &fi)) {
68
+ /* the MPU lookup failed */
69
+ env->v7m.cfsr[env->v7m.secure] |= R_V7M_CFSR_IACCVIOL_MASK;
70
+ armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_MEM, env->v7m.secure);
71
+ qemu_log_mask(CPU_LOG_INT, "...really MemManage with CFSR.IACCVIOL\n");
72
+ return false;
73
+ }
74
+ *insn = address_space_lduw_le(arm_addressspace(cs, attrs), physaddr,
75
+ attrs, &txres);
76
+ if (txres != MEMTX_OK) {
77
+ env->v7m.cfsr[M_REG_NS] |= R_V7M_CFSR_IBUSERR_MASK;
78
+ armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_BUS, false);
79
+ qemu_log_mask(CPU_LOG_INT, "...really BusFault with CFSR.IBUSERR\n");
80
+ return false;
81
+ }
82
+ return true;
83
+}
47
+}
84
+
48
+
85
+static bool v7m_handle_execute_nsc(ARMCPU *cpu)
49
static void a10_pit_class_init(ObjectClass *klass, void *data)
86
+{
87
+ /* Check whether this attempt to execute code in a Secure & NS-Callable
88
+ * memory region is for an SG instruction; if so, then emulate the
89
+ * effect of the SG instruction and return true. Otherwise pend
90
+ * the correct kind of exception and return false.
91
+ */
92
+ CPUARMState *env = &cpu->env;
93
+ ARMMMUIdx mmu_idx;
94
+ uint16_t insn;
95
+
96
+ /* We should never get here unless get_phys_addr_pmsav8() caused
97
+ * an exception for NS executing in S&NSC memory.
98
+ */
99
+ assert(!env->v7m.secure);
100
+ assert(arm_feature(env, ARM_FEATURE_M_SECURITY));
101
+
102
+ /* We want to do the MPU lookup as secure; work out what mmu_idx that is */
103
+ mmu_idx = arm_v7m_mmu_idx_for_secstate(env, true);
104
+
105
+ if (!v7m_read_half_insn(cpu, mmu_idx, env->regs[15], &insn)) {
106
+ return false;
107
+ }
108
+
109
+ if (!env->thumb) {
110
+ goto gen_invep;
111
+ }
112
+
113
+ if (insn != 0xe97f) {
114
+ /* Not an SG instruction first half (we choose the IMPDEF
115
+ * early-SG-check option).
116
+ */
117
+ goto gen_invep;
118
+ }
119
+
120
+ if (!v7m_read_half_insn(cpu, mmu_idx, env->regs[15] + 2, &insn)) {
121
+ return false;
122
+ }
123
+
124
+ if (insn != 0xe97f) {
125
+ /* Not an SG instruction second half (yes, both halves of the SG
126
+ * insn have the same hex value)
127
+ */
128
+ goto gen_invep;
129
+ }
130
+
131
+ /* OK, we have confirmed that we really have an SG instruction.
132
+ * We know we're NS in S memory so don't need to repeat those checks.
133
+ */
134
+ qemu_log_mask(CPU_LOG_INT, "...really an SG instruction at 0x%08" PRIx32
135
+ ", executing it\n", env->regs[15]);
136
+ env->regs[14] &= ~1;
137
+ switch_v7m_security_state(env, true);
138
+ xpsr_write(env, 0, XPSR_IT);
139
+ env->regs[15] += 4;
140
+ return true;
141
+
142
+gen_invep:
143
+ env->v7m.sfsr |= R_V7M_SFSR_INVEP_MASK;
144
+ armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_SECURE, false);
145
+ qemu_log_mask(CPU_LOG_INT,
146
+ "...really SecureFault with SFSR.INVEP\n");
147
+ return false;
148
+}
149
+
150
void arm_v7m_cpu_do_interrupt(CPUState *cs)
151
{
50
{
152
ARMCPU *cpu = ARM_CPU(cs);
51
DeviceClass *dc = DEVICE_CLASS(klass);
153
@@ -XXX,XX +XXX,XX @@ void arm_v7m_cpu_do_interrupt(CPUState *cs)
52
@@ -XXX,XX +XXX,XX @@ static const TypeInfo a10_pit_info = {
154
* the SG instruction have the same security attributes.)
53
.parent = TYPE_SYS_BUS_DEVICE,
155
* Everything else must generate an INVEP SecureFault, so we
54
.instance_size = sizeof(AwA10PITState),
156
* emulate the SG instruction here.
55
.instance_init = a10_pit_init,
157
- * TODO: actually emulate SG.
56
+ .instance_finalize = a10_pit_finalize,
158
*/
57
.class_init = a10_pit_class_init,
159
- env->v7m.sfsr |= R_V7M_SFSR_INVEP_MASK;
58
};
160
- armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_SECURE, false);
59
161
- qemu_log_mask(CPU_LOG_INT,
162
- "...really SecureFault with SFSR.INVEP\n");
163
+ if (v7m_handle_execute_nsc(cpu)) {
164
+ return;
165
+ }
166
break;
167
case M_FAKE_FSR_SFAULT:
168
/* Various flavours of SecureFault for attempts to execute or
169
--
60
--
170
2.7.4
61
2.20.1
171
62
172
63
diff view generated by jsdifflib
New patch
1
From: Gan Qixin <ganqixin@huawei.com>
1
2
3
When running device-introspect-test, a memory leak occurred in the
4
exynos4210_rtc_init function, so use ptimer_free() in the finalize function to
5
avoid it.
6
7
ASAN shows memory leak stack:
8
9
Indirect leak of 96 byte(s) in 1 object(s) allocated from:
10
#0 0xffffab97e1f0 in __interceptor_calloc (/lib64/libasan.so.5+0xee1f0)
11
#1 0xffffab256800 in g_malloc0 (/lib64/libglib-2.0.so.0+0x56800)
12
#2 0xaaabf555db78 in ptimer_init /qemu/hw/core/ptimer.c:432
13
#3 0xaaabf57b3934 in exynos4210_rtc_init /qemu/hw/rtc/exynos4210_rtc.c:567
14
#4 0xaaabf6339f6c in object_initialize_with_type /qemu/qom/object.c:515
15
#5 0xaaabf633a1e0 in object_new_with_type /qemu/qom/object.c:729
16
#6 0xaaabf6375e40 in qmp_device_list_properties /qemu/qom/qom-qmp-cmds.c:153
17
#7 0xaaabf653d8ec in qmp_marshal_device_list_properties /qemu/qapi/qapi-commands-qdev.c:59
18
#8 0xaaabf6587d08 in do_qmp_dispatch_bh /qemu/qapi/qmp-dispatch.c:110
19
#9 0xaaabf6552708 in aio_bh_call /qemu/util/async.c:136
20
#10 0xaaabf6552708 in aio_bh_poll /qemu/util/async.c:164
21
#11 0xaaabf655f19c in aio_dispatch /qemu/util/aio-posix.c:381
22
#12 0xaaabf65523f4 in aio_ctx_dispatch /qemu/util/async.c:306
23
24
Reported-by: Euler Robot <euler.robot@huawei.com>
25
Signed-off-by: Gan Qixin <ganqixin@huawei.com>
26
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
27
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
28
---
29
hw/rtc/exynos4210_rtc.c | 9 +++++++++
30
1 file changed, 9 insertions(+)
31
32
diff --git a/hw/rtc/exynos4210_rtc.c b/hw/rtc/exynos4210_rtc.c
33
index XXXXXXX..XXXXXXX 100644
34
--- a/hw/rtc/exynos4210_rtc.c
35
+++ b/hw/rtc/exynos4210_rtc.c
36
@@ -XXX,XX +XXX,XX @@ static void exynos4210_rtc_init(Object *obj)
37
sysbus_init_mmio(dev, &s->iomem);
38
}
39
40
+static void exynos4210_rtc_finalize(Object *obj)
41
+{
42
+ Exynos4210RTCState *s = EXYNOS4210_RTC(obj);
43
+
44
+ ptimer_free(s->ptimer);
45
+ ptimer_free(s->ptimer_1Hz);
46
+}
47
+
48
static void exynos4210_rtc_class_init(ObjectClass *klass, void *data)
49
{
50
DeviceClass *dc = DEVICE_CLASS(klass);
51
@@ -XXX,XX +XXX,XX @@ static const TypeInfo exynos4210_rtc_info = {
52
.parent = TYPE_SYS_BUS_DEVICE,
53
.instance_size = sizeof(Exynos4210RTCState),
54
.instance_init = exynos4210_rtc_init,
55
+ .instance_finalize = exynos4210_rtc_finalize,
56
.class_init = exynos4210_rtc_class_init,
57
};
58
59
--
60
2.20.1
61
62
diff view generated by jsdifflib
New patch
1
From: Gan Qixin <ganqixin@huawei.com>
1
2
3
When running device-introspect-test, a memory leak occurred in the
4
exynos4210_pwm_init function, so use ptimer_free() in the finalize function to
5
avoid it.
6
7
ASAN shows memory leak stack:
8
9
Indirect leak of 240 byte(s) in 5 object(s) allocated from:
10
#0 0xffffab97e1f0 in __interceptor_calloc (/lib64/libasan.so.5+0xee1f0)
11
#1 0xffffab256800 in g_malloc0 (/lib64/libglib-2.0.so.0+0x56800)
12
#2 0xaaabf555db84 in timer_new_full /qemu/include/qemu/timer.h:523
13
#3 0xaaabf555db84 in timer_new /qemu/include/qemu/timer.h:544
14
#4 0xaaabf555db84 in timer_new_ns /qemu/include/qemu/timer.h:562
15
#5 0xaaabf555db84 in ptimer_init /qemu/hw/core/ptimer.c:433
16
#6 0xaaabf56a36cc in exynos4210_pwm_init /qemu/hw/timer/exynos4210_pwm.c:401
17
#7 0xaaabf6339f6c in object_initialize_with_type /qemu/qom/object.c:515
18
#8 0xaaabf633a1e0 in object_new_with_type /qemu/qom/object.c:729
19
#9 0xaaabf6375e40 in qmp_device_list_properties /qemu/qom/qom-qmp-cmds.c:153
20
#10 0xaaabf653d8ec in qmp_marshal_device_list_properties /qemu/qapi/qapi-commands-qdev.c:59
21
#11 0xaaabf6587d08 in do_qmp_dispatch_bh /qemu/qapi/qmp-dispatch.c:110
22
#12 0xaaabf6552708 in aio_bh_call /qemu/util/async.c:136
23
24
Reported-by: Euler Robot <euler.robot@huawei.com>
25
Signed-off-by: Gan Qixin <ganqixin@huawei.com>
26
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
27
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
28
---
29
hw/timer/exynos4210_pwm.c | 11 +++++++++++
30
1 file changed, 11 insertions(+)
31
32
diff --git a/hw/timer/exynos4210_pwm.c b/hw/timer/exynos4210_pwm.c
33
index XXXXXXX..XXXXXXX 100644
34
--- a/hw/timer/exynos4210_pwm.c
35
+++ b/hw/timer/exynos4210_pwm.c
36
@@ -XXX,XX +XXX,XX @@ static void exynos4210_pwm_init(Object *obj)
37
sysbus_init_mmio(dev, &s->iomem);
38
}
39
40
+static void exynos4210_pwm_finalize(Object *obj)
41
+{
42
+ Exynos4210PWMState *s = EXYNOS4210_PWM(obj);
43
+ int i;
44
+
45
+ for (i = 0; i < EXYNOS4210_PWM_TIMERS_NUM; i++) {
46
+ ptimer_free(s->timer[i].ptimer);
47
+ }
48
+}
49
+
50
static void exynos4210_pwm_class_init(ObjectClass *klass, void *data)
51
{
52
DeviceClass *dc = DEVICE_CLASS(klass);
53
@@ -XXX,XX +XXX,XX @@ static const TypeInfo exynos4210_pwm_info = {
54
.parent = TYPE_SYS_BUS_DEVICE,
55
.instance_size = sizeof(Exynos4210PWMState),
56
.instance_init = exynos4210_pwm_init,
57
+ .instance_finalize = exynos4210_pwm_finalize,
58
.class_init = exynos4210_pwm_class_init,
59
};
60
61
--
62
2.20.1
63
64
diff view generated by jsdifflib
New patch
1
From: Gan Qixin <ganqixin@huawei.com>
1
2
3
When running device-introspect-test, a memory leak occurred in the
4
mss_timer_init function, so use ptimer_free() in the finalize function to avoid
5
it.
6
7
ASAN shows memory leak stack:
8
9
Indirect leak of 192 byte(s) in 2 object(s) allocated from:
10
#0 0xffffab97e1f0 in __interceptor_calloc (/lib64/libasan.so.5+0xee1f0)
11
#1 0xffffab256800 in g_malloc0 (/lib64/libglib-2.0.so.0+0x56800)
12
#2 0xaaabf555db78 in ptimer_init /qemu/hw/core/ptimer.c:432
13
#3 0xaaabf58a0010 in mss_timer_init /qemu/hw/timer/mss-timer.c:235
14
#4 0xaaabf6339f6c in object_initialize_with_type /qemu/qom/object.c:515
15
#5 0xaaabf633ca04 in object_initialize_child_with_propsv /qemu/qom/object.c:564
16
#6 0xaaabf633cc08 in object_initialize_child_with_props /qemu/qom/object.c:547
17
#7 0xaaabf5b8316c in m2sxxx_soc_initfn /qemu/hw/arm/msf2-soc.c:70
18
#8 0xaaabf6339f6c in object_initialize_with_type /qemu/qom/object.c:515
19
#9 0xaaabf633a1e0 in object_new_with_type /qemu/qom/object.c:729
20
#10 0xaaabf6375e40 in qmp_device_list_properties /qemu/qom/qom-qmp-cmds.c:153
21
#11 0xaaabf653d8ec in qmp_marshal_device_list_properties /qemu/qapi/qapi-commands-qdev.c:59
22
#12 0xaaabf6587d08 in do_qmp_dispatch_bh /qemu/qapi/qmp-dispatch.c:110
23
24
Reported-by: Euler Robot <euler.robot@huawei.com>
25
Signed-off-by: Gan Qixin <ganqixin@huawei.com>
26
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
27
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
28
---
29
hw/timer/mss-timer.c | 13 +++++++++++++
30
1 file changed, 13 insertions(+)
31
32
diff --git a/hw/timer/mss-timer.c b/hw/timer/mss-timer.c
33
index XXXXXXX..XXXXXXX 100644
34
--- a/hw/timer/mss-timer.c
35
+++ b/hw/timer/mss-timer.c
36
@@ -XXX,XX +XXX,XX @@ static void mss_timer_init(Object *obj)
37
sysbus_init_mmio(SYS_BUS_DEVICE(obj), &t->mmio);
38
}
39
40
+static void mss_timer_finalize(Object *obj)
41
+{
42
+ MSSTimerState *t = MSS_TIMER(obj);
43
+ int i;
44
+
45
+ for (i = 0; i < NUM_TIMERS; i++) {
46
+ struct Msf2Timer *st = &t->timers[i];
47
+
48
+ ptimer_free(st->ptimer);
49
+ }
50
+}
51
+
52
static const VMStateDescription vmstate_timers = {
53
.name = "mss-timer-block",
54
.version_id = 1,
55
@@ -XXX,XX +XXX,XX @@ static const TypeInfo mss_timer_info = {
56
.parent = TYPE_SYS_BUS_DEVICE,
57
.instance_size = sizeof(MSSTimerState),
58
.instance_init = mss_timer_init,
59
+ .instance_finalize = mss_timer_finalize,
60
.class_init = mss_timer_class_init,
61
};
62
63
--
64
2.20.1
65
66
diff view generated by jsdifflib
1
Recent changes have left insn_crosses_page() more complicated
1
From: Gan Qixin <ganqixin@huawei.com>
2
than it needed to be:
3
* it's only called from thumb_tr_translate_insn() so we know
4
for certain that we're looking at a Thumb insn
5
* the caller's check for dc->pc >= dc->next_page_start - 3
6
means that dc->pc can't possibly be 4 aligned, so there's
7
no need to check that (the check was partly there to ensure
8
that we didn't treat an ARM insn as Thumb, I think)
9
* we now have thumb_insn_is_16bit() which lets us do a precise
10
check of the length of the next insn, rather than opencoding
11
an inaccurate check
12
2
13
Simplify it down to just loading the first half of the insn
3
When running device-introspect-test, a memory leak occurred in the
14
and calling thumb_insn_is_16bit() on it.
4
mv88w8618_pit_init function, so use ptimer_free() in the finalize function to
5
avoid it.
15
6
7
ASAN shows memory leak stack:
8
9
Indirect leak of 192 byte(s) in 4 object(s) allocated from:
10
#0 0xffffab97e1f0 in __interceptor_calloc (/lib64/libasan.so.5+0xee1f0)
11
#1 0xffffab256800 in g_malloc0 (/lib64/libglib-2.0.so.0+0x56800)
12
#2 0xaaabf555db84 in timer_new_full /qemu/include/qemu/timer.h:523
13
#3 0xaaabf555db84 in timer_new /qemu/include/qemu/timer.h:544
14
#4 0xaaabf555db84 in timer_new_ns /qemu/include/qemu/timer.h:562
15
#5 0xaaabf555db84 in ptimer_init /qemu/hw/core/ptimer.c:433
16
#6 0xaaabf5bb2290 in mv88w8618_timer_init /qemu/hw/arm/musicpal.c:862
17
#7 0xaaabf5bb2290 in mv88w8618_pit_init /qemu/hw/arm/musicpal.c:954
18
#8 0xaaabf6339f6c in object_initialize_with_type /qemu/qom/object.c:515
19
#9 0xaaabf633a1e0 in object_new_with_type /qemu/qom/object.c:729
20
#10 0xaaabf6375e40 in qmp_device_list_properties /qemu/qom/qom-qmp-cmds.c:153
21
#11 0xaaabf5a95540 in qdev_device_help /qemu/softmmu/qdev-monitor.c:283
22
#12 0xaaabf5a96940 in qmp_device_add /qemu/softmmu/qdev-monitor.c:801
23
24
Reported-by: Euler Robot <euler.robot@huawei.com>
25
Signed-off-by: Gan Qixin <ganqixin@huawei.com>
26
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
16
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
27
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
18
Message-id: 1507556919-24992-8-git-send-email-peter.maydell@linaro.org
19
---
28
---
20
target/arm/translate.c | 27 ++++++---------------------
29
hw/arm/musicpal.c | 12 ++++++++++++
21
1 file changed, 6 insertions(+), 21 deletions(-)
30
1 file changed, 12 insertions(+)
22
31
23
diff --git a/target/arm/translate.c b/target/arm/translate.c
32
diff --git a/hw/arm/musicpal.c b/hw/arm/musicpal.c
24
index XXXXXXX..XXXXXXX 100644
33
index XXXXXXX..XXXXXXX 100644
25
--- a/target/arm/translate.c
34
--- a/hw/arm/musicpal.c
26
+++ b/target/arm/translate.c
35
+++ b/hw/arm/musicpal.c
27
@@ -XXX,XX +XXX,XX @@ static bool insn_crosses_page(CPUARMState *env, DisasContext *s)
36
@@ -XXX,XX +XXX,XX @@ static void mv88w8618_pit_init(Object *obj)
28
{
37
sysbus_init_mmio(dev, &s->iomem);
29
/* Return true if the insn at dc->pc might cross a page boundary.
30
* (False positives are OK, false negatives are not.)
31
+ * We know this is a Thumb insn, and our caller ensures we are
32
+ * only called if dc->pc is less than 4 bytes from the page
33
+ * boundary, so we cross the page if the first 16 bits indicate
34
+ * that this is a 32 bit insn.
35
*/
36
- uint16_t insn;
37
+ uint16_t insn = arm_lduw_code(env, s->pc, s->sctlr_b);
38
39
- if ((s->pc & 3) == 0) {
40
- /* At a 4-aligned address we can't be crossing a page */
41
- return false;
42
- }
43
-
44
- /* This must be a Thumb insn */
45
- insn = arm_lduw_code(env, s->pc, s->sctlr_b);
46
-
47
- if ((insn >> 11) >= 0x1d) {
48
- /* Top five bits 0b11101 / 0b11110 / 0b11111 : this is the
49
- * First half of a 32-bit Thumb insn. Thumb-1 cores might
50
- * end up actually treating this as two 16-bit insns (see the
51
- * code at the start of disas_thumb2_insn()) but we don't bother
52
- * to check for that as it is unlikely, and false positives here
53
- * are harmless.
54
- */
55
- return true;
56
- }
57
- /* Definitely a 16-bit insn, can't be crossing a page. */
58
- return false;
59
+ return !thumb_insn_is_16bit(s, insn);
60
}
38
}
61
39
62
static int arm_tr_init_disas_context(DisasContextBase *dcbase,
40
+static void mv88w8618_pit_finalize(Object *obj)
41
+{
42
+ SysBusDevice *dev = SYS_BUS_DEVICE(obj);
43
+ mv88w8618_pit_state *s = MV88W8618_PIT(dev);
44
+ int i;
45
+
46
+ for (i = 0; i < 4; i++) {
47
+ ptimer_free(s->timer[i].ptimer);
48
+ }
49
+}
50
+
51
static const VMStateDescription mv88w8618_timer_vmsd = {
52
.name = "timer",
53
.version_id = 1,
54
@@ -XXX,XX +XXX,XX @@ static const TypeInfo mv88w8618_pit_info = {
55
.parent = TYPE_SYS_BUS_DEVICE,
56
.instance_size = sizeof(mv88w8618_pit_state),
57
.instance_init = mv88w8618_pit_init,
58
+ .instance_finalize = mv88w8618_pit_finalize,
59
.class_init = mv88w8618_pit_class_init,
60
};
61
63
--
62
--
64
2.7.4
63
2.20.1
65
64
66
65
diff view generated by jsdifflib
1
From: Cédric Le Goater <clg@kaod.org>
1
From: Gan Qixin <ganqixin@huawei.com>
2
2
3
Initially from Anton D. Kachalov" <mouse@yandex-team.ru> but the SoB was
3
When running device-introspect-test, a memory leak occurred in the
4
missing.
4
exynos4210_mct_init function, so use ptimer_free() in the finalize function to
5
avoid it.
5
6
6
Signed-off-by: Cédric Le Goater <clg@kaod.org>
7
ASAN shows memory leak stack:
7
Acked-by: Andrew Jeffery <andrew@aj.id.au>
8
8
Message-id: 20170920064915.30027-1-clg@kaod.org
9
Indirect leak of 96 byte(s) in 1 object(s) allocated from:
9
[clg: change commit log and subject
10
#0 0xffffab97e1f0 in __interceptor_calloc (/lib64/libasan.so.5+0xee1f0)
10
replace UL suffix by ULL ]
11
#1 0xffffab256800 in g_malloc0 (/lib64/libglib-2.0.so.0+0x56800)
11
Signed-off-by: Cédric Le Goater <clg@kaod.org>
12
#2 0xaaabf555db78 in ptimer_init /qemu/hw/core/ptimer.c:432
13
#3 0xaaabf56b01a0 in exynos4210_mct_init /qemu/hw/timer/exynos4210_mct.c:1505
14
#4 0xaaabf6339f6c in object_initialize_with_type /qemu/qom/object.c:515
15
#5 0xaaabf633a1e0 in object_new_with_type /qemu/qom/object.c:729
16
#6 0xaaabf6375e40 in qmp_device_list_properties /qemu/qom/qom-qmp-cmds.c:153
17
#7 0xaaabf653d8ec in qmp_marshal_device_list_properties /qemu/qapi/qapi-commands-qdev.c:59
18
#8 0xaaabf6587d08 in do_qmp_dispatch_bh /qemu/qapi/qmp-dispatch.c:110
19
#9 0xaaabf6552708 in aio_bh_call /qemu/util/async.c:136
20
#10 0xaaabf6552708 in aio_bh_poll /qemu/util/async.c:164
21
#11 0xaaabf655f19c in aio_dispatch /qemu/util/aio-posix.c:381
22
#12 0xaaabf65523f4 in aio_ctx_dispatch /qemu/util/async.c:306
23
24
Reported-by: Euler Robot <euler.robot@huawei.com>
25
Signed-off-by: Gan Qixin <ganqixin@huawei.com>
12
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
26
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
27
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
---
28
---
15
hw/watchdog/wdt_aspeed.c | 4 ++--
29
hw/timer/exynos4210_mct.c | 14 ++++++++++++++
16
1 file changed, 2 insertions(+), 2 deletions(-)
30
1 file changed, 14 insertions(+)
17
31
18
diff --git a/hw/watchdog/wdt_aspeed.c b/hw/watchdog/wdt_aspeed.c
32
diff --git a/hw/timer/exynos4210_mct.c b/hw/timer/exynos4210_mct.c
19
index XXXXXXX..XXXXXXX 100644
33
index XXXXXXX..XXXXXXX 100644
20
--- a/hw/watchdog/wdt_aspeed.c
34
--- a/hw/timer/exynos4210_mct.c
21
+++ b/hw/watchdog/wdt_aspeed.c
35
+++ b/hw/timer/exynos4210_mct.c
22
@@ -XXX,XX +XXX,XX @@ static uint64_t aspeed_wdt_read(void *opaque, hwaddr offset, unsigned size)
36
@@ -XXX,XX +XXX,XX @@ static void exynos4210_mct_init(Object *obj)
23
37
sysbus_init_mmio(dev, &s->iomem);
24
static void aspeed_wdt_reload(AspeedWDTState *s, bool pclk)
38
}
39
40
+static void exynos4210_mct_finalize(Object *obj)
41
+{
42
+ int i;
43
+ Exynos4210MCTState *s = EXYNOS4210_MCT(obj);
44
+
45
+ ptimer_free(s->g_timer.ptimer_frc);
46
+
47
+ for (i = 0; i < 2; i++) {
48
+ ptimer_free(s->l_timer[i].tick_timer.ptimer_tick);
49
+ ptimer_free(s->l_timer[i].ptimer_frc);
50
+ }
51
+}
52
+
53
static void exynos4210_mct_class_init(ObjectClass *klass, void *data)
25
{
54
{
26
- uint32_t reload;
55
DeviceClass *dc = DEVICE_CLASS(klass);
27
+ uint64_t reload;
56
@@ -XXX,XX +XXX,XX @@ static const TypeInfo exynos4210_mct_info = {
28
57
.parent = TYPE_SYS_BUS_DEVICE,
29
if (pclk) {
58
.instance_size = sizeof(Exynos4210MCTState),
30
reload = muldiv64(s->regs[WDT_RELOAD_VALUE], NANOSECONDS_PER_SECOND,
59
.instance_init = exynos4210_mct_init,
31
s->pclk_freq);
60
+ .instance_finalize = exynos4210_mct_finalize,
32
} else {
61
.class_init = exynos4210_mct_class_init,
33
- reload = s->regs[WDT_RELOAD_VALUE] * 1000;
62
};
34
+ reload = s->regs[WDT_RELOAD_VALUE] * 1000ULL;
63
35
}
36
37
if (aspeed_wdt_is_enabled(s)) {
38
--
64
--
39
2.7.4
65
2.20.1
40
66
41
67
diff view generated by jsdifflib
New patch
1
From: Bin Meng <bin.meng@windriver.com>
1
2
3
U-Boot expects PMU_MISC0 register bit 7 is set (see init_bandgap()
4
in arch/arm/mach-imx/mx6/soc.c) during boot. This bit indicates the
5
bandgap has stabilized.
6
7
With this change, the latest upstream U-Boot (v2021.01-rc3) for imx6
8
sabrelite board (mx6qsabrelite_defconfig), with a slight change made
9
by switching CONFIG_OF_SEPARATE to CONFIG_OF_EMBED, boots to U-Boot
10
shell on QEMU with the following command:
11
12
$ qemu-system-arm -M sabrelite -smp 4 -m 1G -kernel u-boot \
13
-display none -serial null -serial stdio
14
15
Boot log below:
16
17
U-Boot 2021.01-rc3 (Dec 12 2020 - 17:40:02 +0800)
18
19
CPU: Freescale i.MX?? rev1.0 at 792 MHz
20
Reset cause: POR
21
Model: Freescale i.MX6 Quad SABRE Lite Board
22
Board: SABRE Lite
23
I2C: ready
24
DRAM: 1 GiB
25
force_idle_bus: sda=0 scl=0 sda.gp=0x5c scl.gp=0x55
26
force_idle_bus: failed to clear bus, sda=0 scl=0
27
force_idle_bus: sda=0 scl=0 sda.gp=0x6d scl.gp=0x6c
28
force_idle_bus: failed to clear bus, sda=0 scl=0
29
force_idle_bus: sda=0 scl=0 sda.gp=0xcb scl.gp=0x5
30
force_idle_bus: failed to clear bus, sda=0 scl=0
31
MMC: FSL_SDHC: 0, FSL_SDHC: 1
32
Loading Environment from MMC... *** Warning - No block device, using default environment
33
34
In: serial
35
Out: serial
36
Err: serial
37
Net: Board Net Initialization Failed
38
No ethernet found.
39
starting USB...
40
Bus usb@2184000: usb dr_mode not found
41
USB EHCI 1.00
42
Bus usb@2184200: USB EHCI 1.00
43
scanning bus usb@2184000 for devices... 1 USB Device(s) found
44
scanning bus usb@2184200 for devices... 1 USB Device(s) found
45
scanning usb for storage devices... 0 Storage Device(s) found
46
scanning usb for ethernet devices... 0 Ethernet Device(s) found
47
Hit any key to stop autoboot: 0
48
=>
49
50
Signed-off-by: Bin Meng <bin.meng@windriver.com>
51
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
52
Message-id: 20210106063504.10841-2-bmeng.cn@gmail.com
53
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
54
---
55
hw/misc/imx6_ccm.c | 2 +-
56
1 file changed, 1 insertion(+), 1 deletion(-)
57
58
diff --git a/hw/misc/imx6_ccm.c b/hw/misc/imx6_ccm.c
59
index XXXXXXX..XXXXXXX 100644
60
--- a/hw/misc/imx6_ccm.c
61
+++ b/hw/misc/imx6_ccm.c
62
@@ -XXX,XX +XXX,XX @@ static void imx6_ccm_reset(DeviceState *dev)
63
s->analog[PMU_REG_3P0] = 0x00000F74;
64
s->analog[PMU_REG_2P5] = 0x00005071;
65
s->analog[PMU_REG_CORE] = 0x00402010;
66
- s->analog[PMU_MISC0] = 0x04000000;
67
+ s->analog[PMU_MISC0] = 0x04000080;
68
s->analog[PMU_MISC1] = 0x00000000;
69
s->analog[PMU_MISC2] = 0x00272727;
70
71
--
72
2.20.1
73
74
diff view generated by jsdifflib
1
From: Igor Mammedov <imammedo@redhat.com>
1
From: Bin Meng <bin.meng@windriver.com>
2
2
3
s/cpu_model/cpu_type/ that has been forgotten during
3
Currently when U-Boot boots, it prints "??" for i.MX processor:
4
conversion (ba1ba5cc), while touching the line also
5
fixup alignment.
6
4
7
Signed-off-by: Igor Mammedov <imammedo@redhat.com>
5
CPU: Freescale i.MX?? rev1.0 at 792 MHz
8
Message-id: 1507710805-221721-1-git-send-email-imammedo@redhat.com
6
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
The register that was used to determine the silicon type is
8
undocumented in the latest IMX6DQRM (Rev. 6, 05/2020), but we
9
can refer to get_cpu_rev() in arch/arm/mach-imx/mx6/soc.c in
10
the U-Boot source codes that USB_ANALOG_DIGPROG is used.
11
12
Update its reset value to indicate i.MX6Q.
13
14
Signed-off-by: Bin Meng <bin.meng@windriver.com>
15
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
16
Message-id: 20210106063504.10841-3-bmeng.cn@gmail.com
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
18
---
12
include/hw/arm/arm.h | 2 +-
19
hw/misc/imx6_ccm.c | 2 +-
13
1 file changed, 1 insertion(+), 1 deletion(-)
20
1 file changed, 1 insertion(+), 1 deletion(-)
14
21
15
diff --git a/include/hw/arm/arm.h b/include/hw/arm/arm.h
22
diff --git a/hw/misc/imx6_ccm.c b/hw/misc/imx6_ccm.c
16
index XXXXXXX..XXXXXXX 100644
23
index XXXXXXX..XXXXXXX 100644
17
--- a/include/hw/arm/arm.h
24
--- a/hw/misc/imx6_ccm.c
18
+++ b/include/hw/arm/arm.h
25
+++ b/hw/misc/imx6_ccm.c
19
@@ -XXX,XX +XXX,XX @@ typedef enum {
26
@@ -XXX,XX +XXX,XX @@ static void imx6_ccm_reset(DeviceState *dev)
20
27
s->analog[USB_ANALOG_USB2_VBUS_DETECT] = 0x00000004;
21
/* armv7m.c */
28
s->analog[USB_ANALOG_USB2_CHRG_DETECT] = 0x00000000;
22
DeviceState *armv7m_init(MemoryRegion *system_memory, int mem_size, int num_irq,
29
s->analog[USB_ANALOG_USB2_MISC] = 0x00000002;
23
- const char *kernel_filename, const char *cpu_model);
30
- s->analog[USB_ANALOG_DIGPROG] = 0x00000000;
24
+ const char *kernel_filename, const char *cpu_type);
31
+ s->analog[USB_ANALOG_DIGPROG] = 0x00630000;
25
/**
32
26
* armv7m_load_kernel:
33
/* all PLLs need to be locked */
27
* @cpu: CPU
34
s->analog[CCM_ANALOG_PLL_ARM] |= CCM_ANALOG_PLL_LOCK;
28
--
35
--
29
2.7.4
36
2.20.1
30
37
31
38
diff view generated by jsdifflib
1
Add the M profile secure MMU index values to the switch in
1
From: Bin Meng <bin.meng@windriver.com>
2
get_a32_user_mem_index() so that LDRT/STRT work correctly
3
rather than asserting at translate time.
4
2
3
At present, when booting U-Boot on QEMU sabrelite, we see:
4
5
Net: Board Net Initialization Failed
6
No ethernet found.
7
8
U-Boot scans PHY at address 4/5/6/7 (see board_eth_init() in the
9
U-Boot source: board/boundary/nitrogen6x/nitrogen6x.c). On the real
10
board, the Ethernet PHY is at address 6. Adjust this by updating the
11
"fec-phy-num" property of the fsl_imx6 SoC object.
12
13
With this change, U-Boot sees the PHY but complains MAC address:
14
15
Net: using phy at 6
16
FEC [PRIME]
17
Error: FEC address not set.
18
19
This is due to U-Boot tries to read the MAC address from the fuse,
20
which QEMU does not have any valid content filled in. However this
21
does not prevent the Ethernet from working in QEMU. We just need to
22
set up the MAC address later in the U-Boot command shell, by:
23
24
=> setenv ethaddr 00:11:22:33:44:55
25
26
Signed-off-by: Bin Meng <bin.meng@windriver.com>
27
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
28
Message-id: 20210106063504.10841-4-bmeng.cn@gmail.com
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
29
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 1507556919-24992-2-git-send-email-peter.maydell@linaro.org
8
---
30
---
9
target/arm/translate.c | 4 ++++
31
hw/arm/sabrelite.c | 4 ++++
10
1 file changed, 4 insertions(+)
32
1 file changed, 4 insertions(+)
11
33
12
diff --git a/target/arm/translate.c b/target/arm/translate.c
34
diff --git a/hw/arm/sabrelite.c b/hw/arm/sabrelite.c
13
index XXXXXXX..XXXXXXX 100644
35
index XXXXXXX..XXXXXXX 100644
14
--- a/target/arm/translate.c
36
--- a/hw/arm/sabrelite.c
15
+++ b/target/arm/translate.c
37
+++ b/hw/arm/sabrelite.c
16
@@ -XXX,XX +XXX,XX @@ static inline int get_a32_user_mem_index(DisasContext *s)
38
@@ -XXX,XX +XXX,XX @@ static void sabrelite_init(MachineState *machine)
17
case ARMMMUIdx_MPriv:
39
18
case ARMMMUIdx_MNegPri:
40
s = FSL_IMX6(object_new(TYPE_FSL_IMX6));
19
return arm_to_core_mmu_idx(ARMMMUIdx_MUser);
41
object_property_add_child(OBJECT(machine), "soc", OBJECT(s));
20
+ case ARMMMUIdx_MSUser:
42
+
21
+ case ARMMMUIdx_MSPriv:
43
+ /* Ethernet PHY address is 6 */
22
+ case ARMMMUIdx_MSNegPri:
44
+ object_property_set_int(OBJECT(s), "fec-phy-num", 6, &error_fatal);
23
+ return arm_to_core_mmu_idx(ARMMMUIdx_MSUser);
45
+
24
case ARMMMUIdx_S2NS:
46
qdev_realize(DEVICE(s), NULL, &error_fatal);
25
default:
47
26
g_assert_not_reached();
48
memory_region_add_subregion(get_system_memory(), FSL_IMX6_MMDC_ADDR,
27
--
49
--
28
2.7.4
50
2.20.1
29
51
30
52
diff view generated by jsdifflib
New patch
1
From: Bin Meng <bin.meng@windriver.com>
1
2
3
This adds the target guide for SABRE Lite board, and documents how
4
to boot a Linux kernel and U-Boot bootloader.
5
6
Signed-off-by: Bin Meng <bin.meng@windriver.com>
7
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
8
Message-id: 20210106063504.10841-5-bmeng.cn@gmail.com
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
docs/system/arm/sabrelite.rst | 119 ++++++++++++++++++++++++++++++++++
12
docs/system/target-arm.rst | 1 +
13
2 files changed, 120 insertions(+)
14
create mode 100644 docs/system/arm/sabrelite.rst
15
16
diff --git a/docs/system/arm/sabrelite.rst b/docs/system/arm/sabrelite.rst
17
new file mode 100644
18
index XXXXXXX..XXXXXXX
19
--- /dev/null
20
+++ b/docs/system/arm/sabrelite.rst
21
@@ -XXX,XX +XXX,XX @@
22
+Boundary Devices SABRE Lite (``sabrelite``)
23
+===========================================
24
+
25
+Boundary Devices SABRE Lite i.MX6 Development Board is a low-cost development
26
+platform featuring the powerful Freescale / NXP Semiconductor's i.MX 6 Quad
27
+Applications Processor.
28
+
29
+Supported devices
30
+-----------------
31
+
32
+The SABRE Lite machine supports the following devices:
33
+
34
+ * Up to 4 Cortex A9 cores
35
+ * Generic Interrupt Controller
36
+ * 1 Clock Controller Module
37
+ * 1 System Reset Controller
38
+ * 5 UARTs
39
+ * 2 EPIC timers
40
+ * 1 GPT timer
41
+ * 2 Watchdog timers
42
+ * 1 FEC Ethernet controller
43
+ * 3 I2C controllers
44
+ * 7 GPIO controllers
45
+ * 4 SDHC storage controllers
46
+ * 4 USB 2.0 host controllers
47
+ * 5 ECSPI controllers
48
+ * 1 SST 25VF016B flash
49
+
50
+Please note above list is a complete superset the QEMU SABRE Lite machine can
51
+support. For a normal use case, a device tree blob that represents a real world
52
+SABRE Lite board, only exposes a subset of devices to the guest software.
53
+
54
+Boot options
55
+------------
56
+
57
+The SABRE Lite machine can start using the standard -kernel functionality
58
+for loading a Linux kernel, U-Boot bootloader or ELF executable.
59
+
60
+Running Linux kernel
61
+--------------------
62
+
63
+Linux mainline v5.10 release is tested at the time of writing. To build a Linux
64
+mainline kernel that can be booted by the SABRE Lite machine, simply configure
65
+the kernel using the imx_v6_v7_defconfig configuration:
66
+
67
+.. code-block:: bash
68
+
69
+ $ export ARCH=arm
70
+ $ export CROSS_COMPILE=arm-linux-gnueabihf-
71
+ $ make imx_v6_v7_defconfig
72
+ $ make
73
+
74
+To boot the newly built Linux kernel in QEMU with the SABRE Lite machine, use:
75
+
76
+.. code-block:: bash
77
+
78
+ $ qemu-system-arm -M sabrelite -smp 4 -m 1G \
79
+ -display none -serial null -serial stdio \
80
+ -kernel arch/arm/boot/zImage \
81
+ -dtb arch/arm/boot/dts/imx6q-sabrelite.dtb \
82
+ -initrd /path/to/rootfs.ext4 \
83
+ -append "root=/dev/ram"
84
+
85
+Running U-Boot
86
+--------------
87
+
88
+U-Boot mainline v2020.10 release is tested at the time of writing. To build a
89
+U-Boot mainline bootloader that can be booted by the SABRE Lite machine, use
90
+the mx6qsabrelite_defconfig with similar commands as described above for Linux:
91
+
92
+.. code-block:: bash
93
+
94
+ $ export CROSS_COMPILE=arm-linux-gnueabihf-
95
+ $ make mx6qsabrelite_defconfig
96
+
97
+Note we need to adjust settings by:
98
+
99
+.. code-block:: bash
100
+
101
+ $ make menuconfig
102
+
103
+then manually select the following configuration in U-Boot:
104
+
105
+ Device Tree Control > Provider of DTB for DT Control > Embedded DTB
106
+
107
+To start U-Boot using the SABRE Lite machine, provide the u-boot binary to
108
+the -kernel argument, along with an SD card image with rootfs:
109
+
110
+.. code-block:: bash
111
+
112
+ $ qemu-system-arm -M sabrelite -smp 4 -m 1G \
113
+ -display none -serial null -serial stdio \
114
+ -kernel u-boot
115
+
116
+The following example shows booting Linux kernel from dhcp, and uses the
117
+rootfs on an SD card. This requires some additional command line parameters
118
+for QEMU:
119
+
120
+.. code-block:: none
121
+
122
+ -nic user,tftp=/path/to/kernel/zImage \
123
+ -drive file=sdcard.img,id=rootfs -device sd-card,drive=rootfs
124
+
125
+The directory for the built-in TFTP server should also contain the device tree
126
+blob of the SABRE Lite board. The sample SD card image was populated with the
127
+root file system with one single partition. You may adjust the kernel "root="
128
+boot parameter accordingly.
129
+
130
+After U-Boot boots, type the following commands in the U-Boot command shell to
131
+boot the Linux kernel:
132
+
133
+.. code-block:: none
134
+
135
+ => setenv ethaddr 00:11:22:33:44:55
136
+ => setenv bootfile zImage
137
+ => dhcp
138
+ => tftpboot 14000000 imx6q-sabrelite.dtb
139
+ => setenv bootargs root=/dev/mmcblk3p1
140
+ => bootz 12000000 - 14000000
141
diff --git a/docs/system/target-arm.rst b/docs/system/target-arm.rst
142
index XXXXXXX..XXXXXXX 100644
143
--- a/docs/system/target-arm.rst
144
+++ b/docs/system/target-arm.rst
145
@@ -XXX,XX +XXX,XX @@ undocumented; you can get a complete list by running
146
arm/versatile
147
arm/vexpress
148
arm/aspeed
149
+ arm/sabrelite
150
arm/digic
151
arm/musicpal
152
arm/gumstix
153
--
154
2.20.1
155
156
diff view generated by jsdifflib