1
ARM bugfixes for rc1...
1
Hi; here's a target-arm pullreq for rc0; these are all bugfixes
2
and similar minor stuff.
2
3
4
thanks
5
-- PMM
3
6
4
The following changes since commit f291910db61b5812e68f1e76afb3ade41d567bea:
7
The following changes since commit 0462a32b4f63b2448b4a196381138afd50719dc4:
5
8
6
Merge remote-tracking branch 'remotes/ericb/tags/pull-nbd-2017-11-09' into staging (2017-11-13 13:13:12 +0000)
9
Merge tag 'for-upstream' of https://repo.or.cz/qemu/kevin into staging (2025-03-14 09:31:13 +0800)
7
10
8
are available in the git repository at:
11
are available in the Git repository at:
9
12
10
git://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20171113
13
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20250314-1
11
14
12
for you to fetch changes up to d25f2a72272b9ffe0d06710d6217d1169bc2cc7d:
15
for you to fetch changes up to a019e15edfd62beae1e2f6adc0fa7415ba20b14c:
13
16
14
accel/tcg/translate-all: expand cpu_restore_state addr check (2017-11-13 13:55:27 +0000)
17
meson.build: Set RUST_BACKTRACE for all tests (2025-03-14 12:54:33 +0000)
15
18
16
----------------------------------------------------------------
19
----------------------------------------------------------------
17
target-arm queue:
20
target-arm queue:
18
* translate-a64.c: silence gcc5 warning
21
* Correctly handle corner cases of guest attempting an exception
19
* highbank: validate register offset before access
22
return to AArch32 when target EL is AArch64 only
20
* MAINTAINERS: Add entries for Smartfusion2
23
* MAINTAINERS: Fix status for Arm boards I "maintain"
21
* accel/tcg/translate-all: expand cpu_restore_state addr check
24
* tests/functional: Bump up arm_replay timeout
22
(so usermode insn aborts don't crash with an assertion failure)
25
* Revert "hw/char/pl011: Warn when using disabled receiver"
23
* fix TCG initialization of some Arm boards by allowing them
26
* util/cacheflush: Make first DSB unconditional on aarch64
24
to specify min/default number of CPUs to create
27
* target/arm: Fix SVE/SME access check logic
28
* meson.build: Set RUST_BACKTRACE for all tests
25
29
26
----------------------------------------------------------------
30
----------------------------------------------------------------
27
Alex Bennée (1):
31
Joe Komlodi (1):
28
accel/tcg/translate-all: expand cpu_restore_state addr check
32
util/cacheflush: Make first DSB unconditional on aarch64
29
33
30
Alistair Francis (2):
34
Paolo Bonzini (1):
31
xlnx-zynqmp: Properly support the smp command line option
35
Revert "hw/char/pl011: Warn when using disabled receiver"
32
xlnx-zcu102: Add an info message deprecating the EP108
33
36
34
Emilio G. Cota (4):
37
Peter Maydell (13):
35
arm/translate-a64: mark path as unreachable to eliminate warning
38
target/arm: Move A32_BANKED_REG_{GET,SET} macros to cpregs.h
36
qom: move CPUClass.tcg_initialize to a global
39
target/arm: Un-inline access_secure_reg()
37
xlnx-zcu102: Specify the max number of CPUs for the EP108
40
linux-user/aarch64: Remove unused get/put_user macros
38
hw: add .min_cpus and .default_cpus fields to machine_class
41
linux-user/arm: Remove unused get_put_user macros
42
target/arm: Move arm_cpu_data_is_big_endian() etc to internals.h
43
target/arm: Move arm_current_el() and arm_el_is_aa64() to internals.h
44
target/arm: SCR_EL3.RW should be treated as 1 if EL2 doesn't support AArch32
45
target/arm: HCR_EL2.RW should be RAO/WI if EL1 doesn't support AArch32
46
target/arm: Add cpu local variable to exception_return helper
47
target/arm: Forbid return to AArch32 when CPU is AArch64-only
48
MAINTAINERS: Fix status for Arm boards I "maintain"
49
tests/functional: Bump up arm_replay timeout
50
meson.build: Set RUST_BACKTRACE for all tests
39
51
40
Prasad J Pandit (1):
52
Richard Henderson (2):
41
highbank: validate register offset before access
53
target/arm: Make DisasContext.{fp, sve}_access_checked tristate
54
target/arm: Simplify pstate_sm check in sve_access_check
42
55
43
Subbaraya Sundeep (1):
56
MAINTAINERS | 14 ++--
44
MAINTAINERS: Add entries for Smartfusion2
57
meson.build | 9 ++-
45
58
target/arm/cpregs.h | 28 +++++++
46
include/exec/exec-all.h | 11 ++++++++++
59
target/arm/cpu.h | 153 +-----------------------------------
47
include/hw/boards.h | 5 +++++
60
target/arm/internals.h | 135 +++++++++++++++++++++++++++++++
48
include/qom/cpu.h | 1 -
61
target/arm/tcg/translate-a64.h | 2 +-
49
accel/tcg/translate-all.c | 52 ++++++++++++++++++++++++++--------------------
62
target/arm/tcg/translate.h | 10 ++-
50
exec.c | 5 +++--
63
hw/char/pl011.c | 19 ++---
51
hw/arm/exynos4_boards.c | 12 ++++-------
64
hw/intc/arm_gicv3_cpuif.c | 1 +
52
hw/arm/highbank.c | 17 +++++++++++++--
65
linux-user/aarch64/cpu_loop.c | 48 -----------
53
hw/arm/raspi.c | 2 ++
66
linux-user/arm/cpu_loop.c | 43 +---------
54
hw/arm/xlnx-zcu102.c | 9 +++++++-
67
target/arm/arch_dump.c | 1 +
55
hw/arm/xlnx-zynqmp.c | 26 ++++++++++++++---------
68
target/arm/helper.c | 16 +++-
56
target/arm/translate-a64.c | 2 ++
69
target/arm/tcg/helper-a64.c | 12 ++-
57
vl.c | 21 ++++++++++++++++---
70
target/arm/tcg/hflags.c | 9 +++
58
MAINTAINERS | 17 +++++++++++++++
71
target/arm/tcg/translate-a64.c | 37 ++++-----
59
qemu-doc.texi | 7 +++++++
72
util/cacheflush.c | 4 +-
60
14 files changed, 137 insertions(+), 50 deletions(-)
73
.gitlab-ci.d/buildtest-template.yml | 1 -
61
74
18 files changed, 257 insertions(+), 285 deletions(-)
diff view generated by jsdifflib
1
From: Alistair Francis <alistair.francis@xilinx.com>
1
The A32_BANKED_REG_{GET,SET} macros are only used inside target/arm;
2
move their definitions to cpregs.h. There's no need to have them
3
defined in all the code that includes cpu.h.
2
4
3
The EP108 was an early access development board that is no longer used.
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
4
Add an info message to convert any users to the ZCU102 instead. On QEMU
6
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
5
they are both identical.
7
---
8
target/arm/cpregs.h | 28 ++++++++++++++++++++++++++++
9
target/arm/cpu.h | 27 ---------------------------
10
2 files changed, 28 insertions(+), 27 deletions(-)
6
11
7
This patch also updated the qemu-doc.texi file to indicate that the
12
diff --git a/target/arm/cpregs.h b/target/arm/cpregs.h
8
EP108 has been deprecated.
9
10
Signed-off-by: Alistair Francis <alistair.francis@xilinx.com>
11
Reviewed-by: Emilio G. Cota <cota@braap.org>
12
Message-id: 1510343626-25861-4-git-send-email-cota@braap.org
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
---
15
hw/arm/xlnx-zcu102.c | 3 +++
16
qemu-doc.texi | 7 +++++++
17
2 files changed, 10 insertions(+)
18
19
diff --git a/hw/arm/xlnx-zcu102.c b/hw/arm/xlnx-zcu102.c
20
index XXXXXXX..XXXXXXX 100644
13
index XXXXXXX..XXXXXXX 100644
21
--- a/hw/arm/xlnx-zcu102.c
14
--- a/target/arm/cpregs.h
22
+++ b/hw/arm/xlnx-zcu102.c
15
+++ b/target/arm/cpregs.h
23
@@ -XXX,XX +XXX,XX @@ static void xlnx_ep108_init(MachineState *machine)
16
@@ -XXX,XX +XXX,XX @@ static inline bool arm_cpreg_traps_in_nv(const ARMCPRegInfo *ri)
24
{
17
return ri->opc1 == 4 || ri->opc1 == 5;
25
XlnxZCU102 *s = EP108_MACHINE(machine);
18
}
26
19
27
+ info_report("The Xilinx EP108 machine is deprecated, please use the "
20
+/* Macros for accessing a specified CP register bank */
28
+ "ZCU102 machine instead. It has the same features supported.");
21
+#define A32_BANKED_REG_GET(_env, _regname, _secure) \
22
+ ((_secure) ? (_env)->cp15._regname##_s : (_env)->cp15._regname##_ns)
29
+
23
+
30
xlnx_zynqmp_init(s, machine);
24
+#define A32_BANKED_REG_SET(_env, _regname, _secure, _val) \
25
+ do { \
26
+ if (_secure) { \
27
+ (_env)->cp15._regname##_s = (_val); \
28
+ } else { \
29
+ (_env)->cp15._regname##_ns = (_val); \
30
+ } \
31
+ } while (0)
32
+
33
+/*
34
+ * Macros for automatically accessing a specific CP register bank depending on
35
+ * the current secure state of the system. These macros are not intended for
36
+ * supporting instruction translation reads/writes as these are dependent
37
+ * solely on the SCR.NS bit and not the mode.
38
+ */
39
+#define A32_BANKED_CURRENT_REG_GET(_env, _regname) \
40
+ A32_BANKED_REG_GET((_env), _regname, \
41
+ (arm_is_secure(_env) && !arm_el_is_aa64((_env), 3)))
42
+
43
+#define A32_BANKED_CURRENT_REG_SET(_env, _regname, _val) \
44
+ A32_BANKED_REG_SET((_env), _regname, \
45
+ (arm_is_secure(_env) && !arm_el_is_aa64((_env), 3)), \
46
+ (_val))
47
+
48
#endif /* TARGET_ARM_CPREGS_H */
49
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
50
index XXXXXXX..XXXXXXX 100644
51
--- a/target/arm/cpu.h
52
+++ b/target/arm/cpu.h
53
@@ -XXX,XX +XXX,XX @@ static inline bool access_secure_reg(CPUARMState *env)
54
return ret;
31
}
55
}
32
56
33
diff --git a/qemu-doc.texi b/qemu-doc.texi
57
-/* Macros for accessing a specified CP register bank */
34
index XXXXXXX..XXXXXXX 100644
58
-#define A32_BANKED_REG_GET(_env, _regname, _secure) \
35
--- a/qemu-doc.texi
59
- ((_secure) ? (_env)->cp15._regname##_s : (_env)->cp15._regname##_ns)
36
+++ b/qemu-doc.texi
60
-
37
@@ -XXX,XX +XXX,XX @@ or ``ivshmem-doorbell`` device types.
61
-#define A32_BANKED_REG_SET(_env, _regname, _secure, _val) \
38
The ``spapr-pci-vfio-host-bridge'' device type is replaced by
62
- do { \
39
the ``spapr-pci-host-bridge'' device type.
63
- if (_secure) { \
40
64
- (_env)->cp15._regname##_s = (_val); \
41
+@section System emulator machines
65
- } else { \
42
+
66
- (_env)->cp15._regname##_ns = (_val); \
43
+@subsection Xilinx EP108 (since 2.11.0)
67
- } \
44
+
68
- } while (0)
45
+The ``xlnx-ep108'' machine has been replaced by the ``xlnx-zcu102'' machine.
69
-
46
+The ``xlnx-zcu102'' machine has the same features and capabilites in QEMU.
70
-/* Macros for automatically accessing a specific CP register bank depending on
47
+
71
- * the current secure state of the system. These macros are not intended for
48
@node License
72
- * supporting instruction translation reads/writes as these are dependent
49
@appendix License
73
- * solely on the SCR.NS bit and not the mode.
74
- */
75
-#define A32_BANKED_CURRENT_REG_GET(_env, _regname) \
76
- A32_BANKED_REG_GET((_env), _regname, \
77
- (arm_is_secure(_env) && !arm_el_is_aa64((_env), 3)))
78
-
79
-#define A32_BANKED_CURRENT_REG_SET(_env, _regname, _val) \
80
- A32_BANKED_REG_SET((_env), _regname, \
81
- (arm_is_secure(_env) && !arm_el_is_aa64((_env), 3)), \
82
- (_val))
83
-
84
uint32_t arm_phys_excp_target_el(CPUState *cs, uint32_t excp_idx,
85
uint32_t cur_el, bool secure);
50
86
51
--
87
--
52
2.7.4
88
2.43.0
53
54
diff view generated by jsdifflib
New patch
1
We would like to move arm_el_is_aa64() to internals.h; however, it is
2
used by access_secure_reg(). Make that function not be inline, so
3
that it can stay in cpu.h.
1
4
5
access_secure_reg() is used only in two places:
6
* in hflags.c
7
* in the user-mode arm emulators, to decide whether to store
8
the TLS value in the secure or non-secure banked field
9
10
The second of these is not on a super-hot path that would care about
11
the inlining (and incidentally will always use the NS banked field
12
because our user-mode CPUs never set ARM_FEATURE_EL3); put the
13
definition of access_secure_reg() in hflags.c, near its only use
14
inside target/arm.
15
16
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
18
---
19
target/arm/cpu.h | 12 +++---------
20
target/arm/tcg/hflags.c | 9 +++++++++
21
2 files changed, 12 insertions(+), 9 deletions(-)
22
23
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
24
index XXXXXXX..XXXXXXX 100644
25
--- a/target/arm/cpu.h
26
+++ b/target/arm/cpu.h
27
@@ -XXX,XX +XXX,XX @@ static inline bool arm_el_is_aa64(CPUARMState *env, int el)
28
return aa64;
29
}
30
31
-/* Function for determining whether guest cp register reads and writes should
32
+/*
33
+ * Function for determining whether guest cp register reads and writes should
34
* access the secure or non-secure bank of a cp register. When EL3 is
35
* operating in AArch32 state, the NS-bit determines whether the secure
36
* instance of a cp register should be used. When EL3 is AArch64 (or if
37
* it doesn't exist at all) then there is no register banking, and all
38
* accesses are to the non-secure version.
39
*/
40
-static inline bool access_secure_reg(CPUARMState *env)
41
-{
42
- bool ret = (arm_feature(env, ARM_FEATURE_EL3) &&
43
- !arm_el_is_aa64(env, 3) &&
44
- !(env->cp15.scr_el3 & SCR_NS));
45
-
46
- return ret;
47
-}
48
+bool access_secure_reg(CPUARMState *env);
49
50
uint32_t arm_phys_excp_target_el(CPUState *cs, uint32_t excp_idx,
51
uint32_t cur_el, bool secure);
52
diff --git a/target/arm/tcg/hflags.c b/target/arm/tcg/hflags.c
53
index XXXXXXX..XXXXXXX 100644
54
--- a/target/arm/tcg/hflags.c
55
+++ b/target/arm/tcg/hflags.c
56
@@ -XXX,XX +XXX,XX @@ static bool aprofile_require_alignment(CPUARMState *env, int el, uint64_t sctlr)
57
#endif
58
}
59
60
+bool access_secure_reg(CPUARMState *env)
61
+{
62
+ bool ret = (arm_feature(env, ARM_FEATURE_EL3) &&
63
+ !arm_el_is_aa64(env, 3) &&
64
+ !(env->cp15.scr_el3 & SCR_NS));
65
+
66
+ return ret;
67
+}
68
+
69
static CPUARMTBFlags rebuild_hflags_common(CPUARMState *env, int fp_el,
70
ARMMMUIdx mmu_idx,
71
CPUARMTBFlags flags)
72
--
73
2.43.0
diff view generated by jsdifflib
New patch
1
At the top of linux-user/aarch64/cpu_loop.c we define a set of
2
macros for reading and writing data and code words, but we never
3
use these macros. Delete them.
1
4
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
7
---
8
linux-user/aarch64/cpu_loop.c | 48 -----------------------------------
9
1 file changed, 48 deletions(-)
10
11
diff --git a/linux-user/aarch64/cpu_loop.c b/linux-user/aarch64/cpu_loop.c
12
index XXXXXXX..XXXXXXX 100644
13
--- a/linux-user/aarch64/cpu_loop.c
14
+++ b/linux-user/aarch64/cpu_loop.c
15
@@ -XXX,XX +XXX,XX @@
16
#include "target/arm/syndrome.h"
17
#include "target/arm/cpu-features.h"
18
19
-#define get_user_code_u32(x, gaddr, env) \
20
- ({ abi_long __r = get_user_u32((x), (gaddr)); \
21
- if (!__r && bswap_code(arm_sctlr_b(env))) { \
22
- (x) = bswap32(x); \
23
- } \
24
- __r; \
25
- })
26
-
27
-#define get_user_code_u16(x, gaddr, env) \
28
- ({ abi_long __r = get_user_u16((x), (gaddr)); \
29
- if (!__r && bswap_code(arm_sctlr_b(env))) { \
30
- (x) = bswap16(x); \
31
- } \
32
- __r; \
33
- })
34
-
35
-#define get_user_data_u32(x, gaddr, env) \
36
- ({ abi_long __r = get_user_u32((x), (gaddr)); \
37
- if (!__r && arm_cpu_bswap_data(env)) { \
38
- (x) = bswap32(x); \
39
- } \
40
- __r; \
41
- })
42
-
43
-#define get_user_data_u16(x, gaddr, env) \
44
- ({ abi_long __r = get_user_u16((x), (gaddr)); \
45
- if (!__r && arm_cpu_bswap_data(env)) { \
46
- (x) = bswap16(x); \
47
- } \
48
- __r; \
49
- })
50
-
51
-#define put_user_data_u32(x, gaddr, env) \
52
- ({ typeof(x) __x = (x); \
53
- if (arm_cpu_bswap_data(env)) { \
54
- __x = bswap32(__x); \
55
- } \
56
- put_user_u32(__x, (gaddr)); \
57
- })
58
-
59
-#define put_user_data_u16(x, gaddr, env) \
60
- ({ typeof(x) __x = (x); \
61
- if (arm_cpu_bswap_data(env)) { \
62
- __x = bswap16(__x); \
63
- } \
64
- put_user_u16(__x, (gaddr)); \
65
- })
66
-
67
/* AArch64 main loop */
68
void cpu_loop(CPUARMState *env)
69
{
70
--
71
2.43.0
diff view generated by jsdifflib
New patch
1
In linux-user/arm/cpu_loop.c we define a full set of get/put
2
macros for both code and data (since the endianness handling
3
is different between the two). However the only one we actually
4
use is get_user_code_u32(). Remove the rest.
1
5
6
We leave a comment noting how data-side accesses should be handled
7
for big-endian, because that's a subtle point and we just removed the
8
macros that were effectively documenting it.
9
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
12
---
13
linux-user/arm/cpu_loop.c | 43 ++++-----------------------------------
14
1 file changed, 4 insertions(+), 39 deletions(-)
15
16
diff --git a/linux-user/arm/cpu_loop.c b/linux-user/arm/cpu_loop.c
17
index XXXXXXX..XXXXXXX 100644
18
--- a/linux-user/arm/cpu_loop.c
19
+++ b/linux-user/arm/cpu_loop.c
20
@@ -XXX,XX +XXX,XX @@
21
__r; \
22
})
23
24
-#define get_user_code_u16(x, gaddr, env) \
25
- ({ abi_long __r = get_user_u16((x), (gaddr)); \
26
- if (!__r && bswap_code(arm_sctlr_b(env))) { \
27
- (x) = bswap16(x); \
28
- } \
29
- __r; \
30
- })
31
-
32
-#define get_user_data_u32(x, gaddr, env) \
33
- ({ abi_long __r = get_user_u32((x), (gaddr)); \
34
- if (!__r && arm_cpu_bswap_data(env)) { \
35
- (x) = bswap32(x); \
36
- } \
37
- __r; \
38
- })
39
-
40
-#define get_user_data_u16(x, gaddr, env) \
41
- ({ abi_long __r = get_user_u16((x), (gaddr)); \
42
- if (!__r && arm_cpu_bswap_data(env)) { \
43
- (x) = bswap16(x); \
44
- } \
45
- __r; \
46
- })
47
-
48
-#define put_user_data_u32(x, gaddr, env) \
49
- ({ typeof(x) __x = (x); \
50
- if (arm_cpu_bswap_data(env)) { \
51
- __x = bswap32(__x); \
52
- } \
53
- put_user_u32(__x, (gaddr)); \
54
- })
55
-
56
-#define put_user_data_u16(x, gaddr, env) \
57
- ({ typeof(x) __x = (x); \
58
- if (arm_cpu_bswap_data(env)) { \
59
- __x = bswap16(__x); \
60
- } \
61
- put_user_u16(__x, (gaddr)); \
62
- })
63
+/*
64
+ * Note that if we need to do data accesses here, they should do a
65
+ * bswap if arm_cpu_bswap_data() returns true.
66
+ */
67
68
/*
69
* Similar to code in accel/tcg/user-exec.c, but outside the execution loop.
70
--
71
2.43.0
diff view generated by jsdifflib
New patch
1
The arm_cpu_data_is_big_endian() and related functions are now used
2
only in target/arm; they can be moved to internals.h.
1
3
4
The motivation here is that we would like to move arm_current_el()
5
to internals.h.
6
7
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
9
---
10
target/arm/cpu.h | 48 ------------------------------------------
11
target/arm/internals.h | 48 ++++++++++++++++++++++++++++++++++++++++++
12
2 files changed, 48 insertions(+), 48 deletions(-)
13
14
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
15
index XXXXXXX..XXXXXXX 100644
16
--- a/target/arm/cpu.h
17
+++ b/target/arm/cpu.h
18
@@ -XXX,XX +XXX,XX @@ static inline bool arm_sctlr_b(CPUARMState *env)
19
20
uint64_t arm_sctlr(CPUARMState *env, int el);
21
22
-static inline bool arm_cpu_data_is_big_endian_a32(CPUARMState *env,
23
- bool sctlr_b)
24
-{
25
-#ifdef CONFIG_USER_ONLY
26
- /*
27
- * In system mode, BE32 is modelled in line with the
28
- * architecture (as word-invariant big-endianness), where loads
29
- * and stores are done little endian but from addresses which
30
- * are adjusted by XORing with the appropriate constant. So the
31
- * endianness to use for the raw data access is not affected by
32
- * SCTLR.B.
33
- * In user mode, however, we model BE32 as byte-invariant
34
- * big-endianness (because user-only code cannot tell the
35
- * difference), and so we need to use a data access endianness
36
- * that depends on SCTLR.B.
37
- */
38
- if (sctlr_b) {
39
- return true;
40
- }
41
-#endif
42
- /* In 32bit endianness is determined by looking at CPSR's E bit */
43
- return env->uncached_cpsr & CPSR_E;
44
-}
45
-
46
-static inline bool arm_cpu_data_is_big_endian_a64(int el, uint64_t sctlr)
47
-{
48
- return sctlr & (el ? SCTLR_EE : SCTLR_E0E);
49
-}
50
-
51
-/* Return true if the processor is in big-endian mode. */
52
-static inline bool arm_cpu_data_is_big_endian(CPUARMState *env)
53
-{
54
- if (!is_a64(env)) {
55
- return arm_cpu_data_is_big_endian_a32(env, arm_sctlr_b(env));
56
- } else {
57
- int cur_el = arm_current_el(env);
58
- uint64_t sctlr = arm_sctlr(env, cur_el);
59
- return arm_cpu_data_is_big_endian_a64(cur_el, sctlr);
60
- }
61
-}
62
-
63
#include "exec/cpu-all.h"
64
65
/*
66
@@ -XXX,XX +XXX,XX @@ static inline bool bswap_code(bool sctlr_b)
67
#endif
68
}
69
70
-#ifdef CONFIG_USER_ONLY
71
-static inline bool arm_cpu_bswap_data(CPUARMState *env)
72
-{
73
- return TARGET_BIG_ENDIAN ^ arm_cpu_data_is_big_endian(env);
74
-}
75
-#endif
76
-
77
void cpu_get_tb_cpu_state(CPUARMState *env, vaddr *pc,
78
uint64_t *cs_base, uint32_t *flags);
79
80
diff --git a/target/arm/internals.h b/target/arm/internals.h
81
index XXXXXXX..XXXXXXX 100644
82
--- a/target/arm/internals.h
83
+++ b/target/arm/internals.h
84
@@ -XXX,XX +XXX,XX @@ static inline FloatRoundMode arm_rmode_to_sf(ARMFPRounding rmode)
85
return arm_rmode_to_sf_map[rmode];
86
}
87
88
+static inline bool arm_cpu_data_is_big_endian_a32(CPUARMState *env,
89
+ bool sctlr_b)
90
+{
91
+#ifdef CONFIG_USER_ONLY
92
+ /*
93
+ * In system mode, BE32 is modelled in line with the
94
+ * architecture (as word-invariant big-endianness), where loads
95
+ * and stores are done little endian but from addresses which
96
+ * are adjusted by XORing with the appropriate constant. So the
97
+ * endianness to use for the raw data access is not affected by
98
+ * SCTLR.B.
99
+ * In user mode, however, we model BE32 as byte-invariant
100
+ * big-endianness (because user-only code cannot tell the
101
+ * difference), and so we need to use a data access endianness
102
+ * that depends on SCTLR.B.
103
+ */
104
+ if (sctlr_b) {
105
+ return true;
106
+ }
107
+#endif
108
+ /* In 32bit endianness is determined by looking at CPSR's E bit */
109
+ return env->uncached_cpsr & CPSR_E;
110
+}
111
+
112
+static inline bool arm_cpu_data_is_big_endian_a64(int el, uint64_t sctlr)
113
+{
114
+ return sctlr & (el ? SCTLR_EE : SCTLR_E0E);
115
+}
116
+
117
+/* Return true if the processor is in big-endian mode. */
118
+static inline bool arm_cpu_data_is_big_endian(CPUARMState *env)
119
+{
120
+ if (!is_a64(env)) {
121
+ return arm_cpu_data_is_big_endian_a32(env, arm_sctlr_b(env));
122
+ } else {
123
+ int cur_el = arm_current_el(env);
124
+ uint64_t sctlr = arm_sctlr(env, cur_el);
125
+ return arm_cpu_data_is_big_endian_a64(cur_el, sctlr);
126
+ }
127
+}
128
+
129
+#ifdef CONFIG_USER_ONLY
130
+static inline bool arm_cpu_bswap_data(CPUARMState *env)
131
+{
132
+ return TARGET_BIG_ENDIAN ^ arm_cpu_data_is_big_endian(env);
133
+}
134
+#endif
135
+
136
static inline void aarch64_save_sp(CPUARMState *env, int el)
137
{
138
if (env->pstate & PSTATE_SP) {
139
--
140
2.43.0
diff view generated by jsdifflib
New patch
1
1
The functions arm_current_el() and arm_el_is_aa64() are used only in
2
target/arm and in hw/intc/arm_gicv3_cpuif.c. They're functions that
3
query internal state of the CPU. Move them out of cpu.h and into
4
internals.h.
5
6
This means we need to include internals.h in arm_gicv3_cpuif.c, but
7
this is justifiable because that file is implementing the GICv3 CPU
8
interface, which really is part of the CPU proper; we just ended up
9
implementing it in code in hw/intc/ for historical reasons.
10
11
The motivation for this move is that we'd like to change
12
arm_el_is_aa64() to add a condition that uses cpu_isar_feature();
13
but we don't want to include cpu-features.h in cpu.h.
14
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
17
---
18
target/arm/cpu.h | 66 --------------------------------------
19
target/arm/internals.h | 67 +++++++++++++++++++++++++++++++++++++++
20
hw/intc/arm_gicv3_cpuif.c | 1 +
21
target/arm/arch_dump.c | 1 +
22
4 files changed, 69 insertions(+), 66 deletions(-)
23
24
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
25
index XXXXXXX..XXXXXXX 100644
26
--- a/target/arm/cpu.h
27
+++ b/target/arm/cpu.h
28
@@ -XXX,XX +XXX,XX @@ uint64_t arm_hcr_el2_eff_secstate(CPUARMState *env, ARMSecuritySpace space);
29
uint64_t arm_hcr_el2_eff(CPUARMState *env);
30
uint64_t arm_hcrx_el2_eff(CPUARMState *env);
31
32
-/* Return true if the specified exception level is running in AArch64 state. */
33
-static inline bool arm_el_is_aa64(CPUARMState *env, int el)
34
-{
35
- /* This isn't valid for EL0 (if we're in EL0, is_a64() is what you want,
36
- * and if we're not in EL0 then the state of EL0 isn't well defined.)
37
- */
38
- assert(el >= 1 && el <= 3);
39
- bool aa64 = arm_feature(env, ARM_FEATURE_AARCH64);
40
-
41
- /* The highest exception level is always at the maximum supported
42
- * register width, and then lower levels have a register width controlled
43
- * by bits in the SCR or HCR registers.
44
- */
45
- if (el == 3) {
46
- return aa64;
47
- }
48
-
49
- if (arm_feature(env, ARM_FEATURE_EL3) &&
50
- ((env->cp15.scr_el3 & SCR_NS) || !(env->cp15.scr_el3 & SCR_EEL2))) {
51
- aa64 = aa64 && (env->cp15.scr_el3 & SCR_RW);
52
- }
53
-
54
- if (el == 2) {
55
- return aa64;
56
- }
57
-
58
- if (arm_is_el2_enabled(env)) {
59
- aa64 = aa64 && (env->cp15.hcr_el2 & HCR_RW);
60
- }
61
-
62
- return aa64;
63
-}
64
-
65
/*
66
* Function for determining whether guest cp register reads and writes should
67
* access the secure or non-secure bank of a cp register. When EL3 is
68
@@ -XXX,XX +XXX,XX @@ static inline bool arm_v7m_is_handler_mode(CPUARMState *env)
69
return env->v7m.exception != 0;
70
}
71
72
-/* Return the current Exception Level (as per ARMv8; note that this differs
73
- * from the ARMv7 Privilege Level).
74
- */
75
-static inline int arm_current_el(CPUARMState *env)
76
-{
77
- if (arm_feature(env, ARM_FEATURE_M)) {
78
- return arm_v7m_is_handler_mode(env) ||
79
- !(env->v7m.control[env->v7m.secure] & 1);
80
- }
81
-
82
- if (is_a64(env)) {
83
- return extract32(env->pstate, 2, 2);
84
- }
85
-
86
- switch (env->uncached_cpsr & 0x1f) {
87
- case ARM_CPU_MODE_USR:
88
- return 0;
89
- case ARM_CPU_MODE_HYP:
90
- return 2;
91
- case ARM_CPU_MODE_MON:
92
- return 3;
93
- default:
94
- if (arm_is_secure(env) && !arm_el_is_aa64(env, 3)) {
95
- /* If EL3 is 32-bit then all secure privileged modes run in
96
- * EL3
97
- */
98
- return 3;
99
- }
100
-
101
- return 1;
102
- }
103
-}
104
-
105
/**
106
* write_list_to_cpustate
107
* @cpu: ARMCPU
108
diff --git a/target/arm/internals.h b/target/arm/internals.h
109
index XXXXXXX..XXXXXXX 100644
110
--- a/target/arm/internals.h
111
+++ b/target/arm/internals.h
112
@@ -XXX,XX +XXX,XX @@ static inline FloatRoundMode arm_rmode_to_sf(ARMFPRounding rmode)
113
return arm_rmode_to_sf_map[rmode];
114
}
115
116
+/* Return true if the specified exception level is running in AArch64 state. */
117
+static inline bool arm_el_is_aa64(CPUARMState *env, int el)
118
+{
119
+ /*
120
+ * This isn't valid for EL0 (if we're in EL0, is_a64() is what you want,
121
+ * and if we're not in EL0 then the state of EL0 isn't well defined.)
122
+ */
123
+ assert(el >= 1 && el <= 3);
124
+ bool aa64 = arm_feature(env, ARM_FEATURE_AARCH64);
125
+
126
+ /*
127
+ * The highest exception level is always at the maximum supported
128
+ * register width, and then lower levels have a register width controlled
129
+ * by bits in the SCR or HCR registers.
130
+ */
131
+ if (el == 3) {
132
+ return aa64;
133
+ }
134
+
135
+ if (arm_feature(env, ARM_FEATURE_EL3) &&
136
+ ((env->cp15.scr_el3 & SCR_NS) || !(env->cp15.scr_el3 & SCR_EEL2))) {
137
+ aa64 = aa64 && (env->cp15.scr_el3 & SCR_RW);
138
+ }
139
+
140
+ if (el == 2) {
141
+ return aa64;
142
+ }
143
+
144
+ if (arm_is_el2_enabled(env)) {
145
+ aa64 = aa64 && (env->cp15.hcr_el2 & HCR_RW);
146
+ }
147
+
148
+ return aa64;
149
+}
150
+
151
+/*
152
+ * Return the current Exception Level (as per ARMv8; note that this differs
153
+ * from the ARMv7 Privilege Level).
154
+ */
155
+static inline int arm_current_el(CPUARMState *env)
156
+{
157
+ if (arm_feature(env, ARM_FEATURE_M)) {
158
+ return arm_v7m_is_handler_mode(env) ||
159
+ !(env->v7m.control[env->v7m.secure] & 1);
160
+ }
161
+
162
+ if (is_a64(env)) {
163
+ return extract32(env->pstate, 2, 2);
164
+ }
165
+
166
+ switch (env->uncached_cpsr & 0x1f) {
167
+ case ARM_CPU_MODE_USR:
168
+ return 0;
169
+ case ARM_CPU_MODE_HYP:
170
+ return 2;
171
+ case ARM_CPU_MODE_MON:
172
+ return 3;
173
+ default:
174
+ if (arm_is_secure(env) && !arm_el_is_aa64(env, 3)) {
175
+ /* If EL3 is 32-bit then all secure privileged modes run in EL3 */
176
+ return 3;
177
+ }
178
+
179
+ return 1;
180
+ }
181
+}
182
+
183
static inline bool arm_cpu_data_is_big_endian_a32(CPUARMState *env,
184
bool sctlr_b)
185
{
186
diff --git a/hw/intc/arm_gicv3_cpuif.c b/hw/intc/arm_gicv3_cpuif.c
187
index XXXXXXX..XXXXXXX 100644
188
--- a/hw/intc/arm_gicv3_cpuif.c
189
+++ b/hw/intc/arm_gicv3_cpuif.c
190
@@ -XXX,XX +XXX,XX @@
191
#include "cpu.h"
192
#include "target/arm/cpregs.h"
193
#include "target/arm/cpu-features.h"
194
+#include "target/arm/internals.h"
195
#include "system/tcg.h"
196
#include "system/qtest.h"
197
198
diff --git a/target/arm/arch_dump.c b/target/arm/arch_dump.c
199
index XXXXXXX..XXXXXXX 100644
200
--- a/target/arm/arch_dump.c
201
+++ b/target/arm/arch_dump.c
202
@@ -XXX,XX +XXX,XX @@
203
#include "elf.h"
204
#include "system/dump.h"
205
#include "cpu-features.h"
206
+#include "internals.h"
207
208
/* struct user_pt_regs from arch/arm64/include/uapi/asm/ptrace.h */
209
struct aarch64_user_regs {
210
--
211
2.43.0
diff view generated by jsdifflib
New patch
1
The definition of SCR_EL3.RW says that its effective value is 1 if:
2
- EL2 is implemented and does not support AArch32, and SCR_EL3.NS is 1
3
- the effective value of SCR_EL3.{EEL2,NS} is {1,0} (i.e. we are
4
Secure and Secure EL2 is disabled)
1
5
6
We implement the second of these in arm_el_is_aa64(), but forgot the
7
first.
8
9
Provide a new function arm_scr_rw_eff() to return the effective
10
value of SCR_EL3.RW, and use it in arm_el_is_aa64() and the other
11
places that currently look directly at the bit value.
12
13
(scr_write() enforces that the RW bit is RAO/WI if neither EL1 nor
14
EL2 have AArch32 support, but if EL1 does but EL2 does not then the
15
bit must still be writeable.)
16
17
This will mean that if code at EL3 attempts to perform an exception
18
return to AArch32 EL2 when EL2 is AArch64-only we will correctly
19
handle this as an illegal exception return: it will be caught by the
20
"return to an EL which is configured for a different register width"
21
check in HELPER(exception_return).
22
23
We do already have some CPU types which don't implement AArch32
24
above EL0, so this is technically a bug; it doesn't seem worth
25
backporting to stable because no sensible guest code will be
26
deliberately attempting to set the RW bit to a value corresponding
27
to an unimplemented execution state and then checking that we
28
did the right thing.
29
30
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
31
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
32
---
33
target/arm/internals.h | 26 +++++++++++++++++++++++---
34
target/arm/helper.c | 4 ++--
35
2 files changed, 25 insertions(+), 5 deletions(-)
36
37
diff --git a/target/arm/internals.h b/target/arm/internals.h
38
index XXXXXXX..XXXXXXX 100644
39
--- a/target/arm/internals.h
40
+++ b/target/arm/internals.h
41
@@ -XXX,XX +XXX,XX @@ static inline FloatRoundMode arm_rmode_to_sf(ARMFPRounding rmode)
42
return arm_rmode_to_sf_map[rmode];
43
}
44
45
+/* Return the effective value of SCR_EL3.RW */
46
+static inline bool arm_scr_rw_eff(CPUARMState *env)
47
+{
48
+ /*
49
+ * SCR_EL3.RW has an effective value of 1 if:
50
+ * - we are NS and EL2 is implemented but doesn't support AArch32
51
+ * - we are S and EL2 is enabled (in which case it must be AArch64)
52
+ */
53
+ ARMCPU *cpu = env_archcpu(env);
54
+
55
+ if (env->cp15.scr_el3 & SCR_RW) {
56
+ return true;
57
+ }
58
+ if (env->cp15.scr_el3 & SCR_NS) {
59
+ return arm_feature(env, ARM_FEATURE_EL2) &&
60
+ !cpu_isar_feature(aa64_aa32_el2, cpu);
61
+ } else {
62
+ return env->cp15.scr_el3 & SCR_EEL2;
63
+ }
64
+}
65
+
66
/* Return true if the specified exception level is running in AArch64 state. */
67
static inline bool arm_el_is_aa64(CPUARMState *env, int el)
68
{
69
@@ -XXX,XX +XXX,XX @@ static inline bool arm_el_is_aa64(CPUARMState *env, int el)
70
return aa64;
71
}
72
73
- if (arm_feature(env, ARM_FEATURE_EL3) &&
74
- ((env->cp15.scr_el3 & SCR_NS) || !(env->cp15.scr_el3 & SCR_EEL2))) {
75
- aa64 = aa64 && (env->cp15.scr_el3 & SCR_RW);
76
+ if (arm_feature(env, ARM_FEATURE_EL3)) {
77
+ aa64 = aa64 && arm_scr_rw_eff(env);
78
}
79
80
if (el == 2) {
81
diff --git a/target/arm/helper.c b/target/arm/helper.c
82
index XXXXXXX..XXXXXXX 100644
83
--- a/target/arm/helper.c
84
+++ b/target/arm/helper.c
85
@@ -XXX,XX +XXX,XX @@ uint32_t arm_phys_excp_target_el(CPUState *cs, uint32_t excp_idx,
86
uint64_t hcr_el2;
87
88
if (arm_feature(env, ARM_FEATURE_EL3)) {
89
- rw = ((env->cp15.scr_el3 & SCR_RW) == SCR_RW);
90
+ rw = arm_scr_rw_eff(env);
91
} else {
92
/*
93
* Either EL2 is the highest EL (and so the EL2 register width
94
@@ -XXX,XX +XXX,XX @@ static void arm_cpu_do_interrupt_aarch64(CPUState *cs)
95
96
switch (new_el) {
97
case 3:
98
- is_aa64 = (env->cp15.scr_el3 & SCR_RW) != 0;
99
+ is_aa64 = arm_scr_rw_eff(env);
100
break;
101
case 2:
102
hcr = arm_hcr_el2_eff(env);
103
--
104
2.43.0
diff view generated by jsdifflib
New patch
1
When EL1 doesn't support AArch32, the HCR_EL2.RW bit is supposed to
2
be RAO/WI. Enforce the RAO/WI behaviour.
1
3
4
Note that we handle "reset value should honour RES1 bits" in the same
5
way that SCR_EL3 does, via a reset function.
6
7
We do already have some CPU types which don't implement AArch32
8
above EL0, so this is technically a bug; it doesn't seem worth
9
backporting to stable because no sensible guest code will be
10
deliberately attempting to set the RW bit to a value corresponding
11
to an unimplemented execution state and then checking that we
12
did the right thing.
13
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
15
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
16
---
17
target/arm/helper.c | 12 ++++++++++++
18
1 file changed, 12 insertions(+)
19
20
diff --git a/target/arm/helper.c b/target/arm/helper.c
21
index XXXXXXX..XXXXXXX 100644
22
--- a/target/arm/helper.c
23
+++ b/target/arm/helper.c
24
@@ -XXX,XX +XXX,XX @@ static void do_hcr_write(CPUARMState *env, uint64_t value, uint64_t valid_mask)
25
/* Clear RES0 bits. */
26
value &= valid_mask;
27
28
+ /* RW is RAO/WI if EL1 is AArch64 only */
29
+ if (!cpu_isar_feature(aa64_aa32_el1, cpu)) {
30
+ value |= HCR_RW;
31
+ }
32
+
33
/*
34
* These bits change the MMU setup:
35
* HCR_VM enables stage 2 translation
36
@@ -XXX,XX +XXX,XX @@ static void hcr_writelow(CPUARMState *env, const ARMCPRegInfo *ri,
37
do_hcr_write(env, value, MAKE_64BIT_MASK(32, 32));
38
}
39
40
+static void hcr_reset(CPUARMState *env, const ARMCPRegInfo *ri)
41
+{
42
+ /* hcr_write will set the RES1 bits on an AArch64-only CPU */
43
+ hcr_write(env, ri, 0);
44
+}
45
+
46
/*
47
* Return the effective value of HCR_EL2, at the given security state.
48
* Bits that are not included here:
49
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo el2_cp_reginfo[] = {
50
.opc0 = 3, .opc1 = 4, .crn = 1, .crm = 1, .opc2 = 0,
51
.access = PL2_RW, .fieldoffset = offsetof(CPUARMState, cp15.hcr_el2),
52
.nv2_redirect_offset = 0x78,
53
+ .resetfn = hcr_reset,
54
.writefn = hcr_write, .raw_writefn = raw_write },
55
{ .name = "HCR", .state = ARM_CP_STATE_AA32,
56
.type = ARM_CP_ALIAS | ARM_CP_IO,
57
--
58
2.43.0
diff view generated by jsdifflib
1
From: "Emilio G. Cota" <cota@braap.org>
1
We already call env_archcpu() multiple times within the
2
exception_return helper function, and we're about to want to
3
add another use of the ARMCPU pointer. Add a local variable
4
cpu so we can call env_archcpu() just once.
2
5
3
Fixes the following warning when compiling with gcc 5.4.0 with -O1
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
4
optimizations and --enable-debug:
7
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
8
---
9
target/arm/tcg/helper-a64.c | 7 ++++---
10
1 file changed, 4 insertions(+), 3 deletions(-)
5
11
6
target/arm/translate-a64.c: In function ‘aarch64_tr_translate_insn’:
12
diff --git a/target/arm/tcg/helper-a64.c b/target/arm/tcg/helper-a64.c
7
target/arm/translate-a64.c:2361:8: error: ‘post_index’ may be used uninitialized in this function [-Werror=maybe-uninitialized]
8
if (!post_index) {
9
^
10
target/arm/translate-a64.c:2307:10: note: ‘post_index’ was declared here
11
bool post_index;
12
^
13
target/arm/translate-a64.c:2386:8: error: ‘writeback’ may be used uninitialized in this function [-Werror=maybe-uninitialized]
14
if (writeback) {
15
^
16
target/arm/translate-a64.c:2308:10: note: ‘writeback’ was declared here
17
bool writeback;
18
^
19
20
Note that idx comes from selecting 2 bits, and therefore its value
21
can be at most 3.
22
23
Signed-off-by: Emilio G. Cota <cota@braap.org>
24
Acked-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
25
Message-id: 1510087611-1851-1-git-send-email-cota@braap.org
26
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
27
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
28
---
29
target/arm/translate-a64.c | 2 ++
30
1 file changed, 2 insertions(+)
31
32
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
33
index XXXXXXX..XXXXXXX 100644
13
index XXXXXXX..XXXXXXX 100644
34
--- a/target/arm/translate-a64.c
14
--- a/target/arm/tcg/helper-a64.c
35
+++ b/target/arm/translate-a64.c
15
+++ b/target/arm/tcg/helper-a64.c
36
@@ -XXX,XX +XXX,XX @@ static void disas_ldst_reg_imm9(DisasContext *s, uint32_t insn,
16
@@ -XXX,XX +XXX,XX @@ static void cpsr_write_from_spsr_elx(CPUARMState *env,
37
post_index = false;
17
38
writeback = true;
18
void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc)
39
break;
19
{
40
+ default:
20
+ ARMCPU *cpu = env_archcpu(env);
41
+ g_assert_not_reached();
21
int cur_el = arm_current_el(env);
22
unsigned int spsr_idx = aarch64_banked_spsr_index(cur_el);
23
uint32_t spsr = env->banked_spsr[spsr_idx];
24
@@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc)
42
}
25
}
43
26
44
if (rn == 31) {
27
bql_lock();
28
- arm_call_pre_el_change_hook(env_archcpu(env));
29
+ arm_call_pre_el_change_hook(cpu);
30
bql_unlock();
31
32
if (!return_to_aa64) {
33
@@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc)
34
int tbii;
35
36
env->aarch64 = true;
37
- spsr &= aarch64_pstate_valid_mask(&env_archcpu(env)->isar);
38
+ spsr &= aarch64_pstate_valid_mask(&cpu->isar);
39
pstate_write(env, spsr);
40
if (!arm_singlestep_active(env)) {
41
env->pstate &= ~PSTATE_SS;
42
@@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc)
43
aarch64_sve_change_el(env, cur_el, new_el, return_to_aa64);
44
45
bql_lock();
46
- arm_call_el_change_hook(env_archcpu(env));
47
+ arm_call_el_change_hook(cpu);
48
bql_unlock();
49
50
return;
45
--
51
--
46
2.7.4
52
2.43.0
47
48
diff view generated by jsdifflib
1
From: Alistair Francis <alistair.francis@xilinx.com>
1
In the Arm ARM, rule R_TYTWB states that returning to AArch32
2
is an illegal exception return if:
3
* AArch32 is not supported at any exception level
4
* the target EL is configured for AArch64 via SCR_EL3.RW
5
or HCR_EL2.RW or via CPU state at reset
2
6
3
Allow the -smp command line option to control the number of CPUs we
7
We check the second of these, but not the first (which can only be
4
create.
8
relevant for the case of a return to EL0, because if AArch32 is not
9
supported at one of the higher ELs then the RW bits will have an
10
effective value of 1 and the the "configured for AArch64" condition
11
will hold also).
5
12
6
Signed-off-by: Alistair Francis <alistair.francis@xilinx.com>
13
Add the missing condition. Although this is technically a bug
7
Reviewed-by: Eduardo Habkost <ehabkost@redhat.com>
14
(because we have one AArch64-only CPU: a64fx) it isn't worth
8
Reviewed-by: Emilio G. Cota <cota@braap.org>
15
backporting to stable because no sensible guest code will
9
Tested-by: Emilio G. Cota <cota@braap.org>
16
deliberately try to return to a nonexistent execution state
10
Message-id: 1510343626-25861-3-git-send-email-cota@braap.org
17
to check that it gets an illegal exception return.
18
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
19
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
20
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
12
---
21
---
13
hw/arm/xlnx-zcu102.c | 3 ++-
22
target/arm/tcg/helper-a64.c | 5 +++++
14
hw/arm/xlnx-zynqmp.c | 26 ++++++++++++++++----------
23
1 file changed, 5 insertions(+)
15
2 files changed, 18 insertions(+), 11 deletions(-)
16
24
17
diff --git a/hw/arm/xlnx-zcu102.c b/hw/arm/xlnx-zcu102.c
25
diff --git a/target/arm/tcg/helper-a64.c b/target/arm/tcg/helper-a64.c
18
index XXXXXXX..XXXXXXX 100644
26
index XXXXXXX..XXXXXXX 100644
19
--- a/hw/arm/xlnx-zcu102.c
27
--- a/target/arm/tcg/helper-a64.c
20
+++ b/hw/arm/xlnx-zcu102.c
28
+++ b/target/arm/tcg/helper-a64.c
21
@@ -XXX,XX +XXX,XX @@ static void xlnx_zcu102_machine_class_init(ObjectClass *oc, void *data)
29
@@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc)
22
{
30
goto illegal_return;
23
MachineClass *mc = MACHINE_CLASS(oc);
24
25
- mc->desc = "Xilinx ZynqMP ZCU102 board";
26
+ mc->desc = "Xilinx ZynqMP ZCU102 board with 4xA53s and 2xR5s based on " \
27
+ "the value of smp";
28
mc->init = xlnx_zcu102_init;
29
mc->block_default_type = IF_IDE;
30
mc->units_per_default_bus = 1;
31
diff --git a/hw/arm/xlnx-zynqmp.c b/hw/arm/xlnx-zynqmp.c
32
index XXXXXXX..XXXXXXX 100644
33
--- a/hw/arm/xlnx-zynqmp.c
34
+++ b/hw/arm/xlnx-zynqmp.c
35
@@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_create_rpu(XlnxZynqMPState *s, const char *boot_cpu,
36
{
37
Error *err = NULL;
38
int i;
39
+ int num_rpus = MIN(smp_cpus - XLNX_ZYNQMP_NUM_APU_CPUS, XLNX_ZYNQMP_NUM_RPU_CPUS);
40
41
- for (i = 0; i < XLNX_ZYNQMP_NUM_RPU_CPUS; i++) {
42
+ for (i = 0; i < num_rpus; i++) {
43
char *name;
44
45
object_initialize(&s->rpu_cpu[i], sizeof(s->rpu_cpu[i]),
46
@@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_init(Object *obj)
47
{
48
XlnxZynqMPState *s = XLNX_ZYNQMP(obj);
49
int i;
50
+ int num_apus = MIN(smp_cpus, XLNX_ZYNQMP_NUM_APU_CPUS);
51
52
- for (i = 0; i < XLNX_ZYNQMP_NUM_APU_CPUS; i++) {
53
+ for (i = 0; i < num_apus; i++) {
54
object_initialize(&s->apu_cpu[i], sizeof(s->apu_cpu[i]),
55
"cortex-a53-" TYPE_ARM_CPU);
56
object_property_add_child(obj, "apu-cpu[*]", OBJECT(&s->apu_cpu[i]),
57
@@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp)
58
MemoryRegion *system_memory = get_system_memory();
59
uint8_t i;
60
uint64_t ram_size;
61
+ int num_apus = MIN(smp_cpus, XLNX_ZYNQMP_NUM_APU_CPUS);
62
const char *boot_cpu = s->boot_cpu ? s->boot_cpu : "apu-cpu[0]";
63
ram_addr_t ddr_low_size, ddr_high_size;
64
qemu_irq gic_spi[GIC_NUM_SPI_INTR];
65
@@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp)
66
67
qdev_prop_set_uint32(DEVICE(&s->gic), "num-irq", GIC_NUM_SPI_INTR + 32);
68
qdev_prop_set_uint32(DEVICE(&s->gic), "revision", 2);
69
- qdev_prop_set_uint32(DEVICE(&s->gic), "num-cpu", XLNX_ZYNQMP_NUM_APU_CPUS);
70
+ qdev_prop_set_uint32(DEVICE(&s->gic), "num-cpu", num_apus);
71
72
/* Realize APUs before realizing the GIC. KVM requires this. */
73
- for (i = 0; i < XLNX_ZYNQMP_NUM_APU_CPUS; i++) {
74
+ for (i = 0; i < num_apus; i++) {
75
char *name;
76
77
object_property_set_int(OBJECT(&s->apu_cpu[i]), QEMU_PSCI_CONDUIT_SMC,
78
@@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp)
79
}
80
}
31
}
81
32
82
- for (i = 0; i < XLNX_ZYNQMP_NUM_APU_CPUS; i++) {
33
+ if (!return_to_aa64 && !cpu_isar_feature(aa64_aa32, cpu)) {
83
+ for (i = 0; i < num_apus; i++) {
34
+ /* Return to AArch32 when CPU is AArch64-only */
84
qemu_irq irq;
35
+ goto illegal_return;
85
86
sysbus_connect_irq(SYS_BUS_DEVICE(&s->gic), i,
87
@@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp)
88
}
89
90
if (s->has_rpu) {
91
- xlnx_zynqmp_create_rpu(s, boot_cpu, &err);
92
- if (err) {
93
- error_propagate(errp, err);
94
- return;
95
- }
96
+ info_report("The 'has_rpu' property is no longer required, to use the "
97
+ "RPUs just use -smp 6.");
98
+ }
36
+ }
99
+
37
+
100
+ xlnx_zynqmp_create_rpu(s, boot_cpu, &err);
38
if (new_el == 1 && (arm_hcr_el2_eff(env) & HCR_TGE)) {
101
+ if (err) {
39
goto illegal_return;
102
+ error_propagate(errp, err);
103
+ return;
104
}
40
}
105
106
if (!s->boot_cpu_ptr) {
107
--
41
--
108
2.7.4
42
2.43.0
109
110
diff view generated by jsdifflib
1
From: Subbaraya Sundeep <sundeep.lkml@gmail.com>
1
I'm down as the only listed maintainer for quite a lot of Arm SoC and
2
board types. In some cases this is only as the "maintainer of last
3
resort" and I'm not in practice doing anything beyond patch review
4
and the odd bit of tidyup.
2
5
3
Voluntarily add myself as maintainer for Smartfusion2
6
Move these entries in MAINTAINERS from "Maintained" to "Odd Fixes",
7
to better represent reality. Entries for other boards and SoCs where
8
I do more actively care (or where there is a listed co-maintainer)
9
remain as they are.
4
10
5
Signed-off-by: Subbaraya Sundeep <sundeep.lkml@gmail.com>
6
Reviewed-by: Alistair Francis <alistair.francis@xilinx.com>
7
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
8
Message-id: 1510552520-3566-1-git-send-email-sundeep.lkml@gmail.com
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
13
Message-id: 20250307152838.3226398-1-peter.maydell@linaro.org
10
---
14
---
11
MAINTAINERS | 17 +++++++++++++++++
15
MAINTAINERS | 14 +++++++-------
12
1 file changed, 17 insertions(+)
16
1 file changed, 7 insertions(+), 7 deletions(-)
13
17
14
diff --git a/MAINTAINERS b/MAINTAINERS
18
diff --git a/MAINTAINERS b/MAINTAINERS
15
index XXXXXXX..XXXXXXX 100644
19
index XXXXXXX..XXXXXXX 100644
16
--- a/MAINTAINERS
20
--- a/MAINTAINERS
17
+++ b/MAINTAINERS
21
+++ b/MAINTAINERS
18
@@ -XXX,XX +XXX,XX @@ M: Alistair Francis <alistair@alistair23.me>
22
@@ -XXX,XX +XXX,XX @@ F: docs/system/arm/kzm.rst
19
S: Maintained
23
Integrator CP
20
F: hw/arm/netduino2.c
24
M: Peter Maydell <peter.maydell@linaro.org>
21
25
L: qemu-arm@nongnu.org
22
+SmartFusion2
26
-S: Maintained
23
+M: Subbaraya Sundeep <sundeep.lkml@gmail.com>
27
+S: Odd Fixes
24
+S: Maintained
28
F: hw/arm/integratorcp.c
25
+F: hw/arm/msf2-soc.c
29
F: hw/misc/arm_integrator_debug.c
26
+F: hw/misc/msf2-sysreg.c
30
F: include/hw/misc/arm_integrator_debug.h
27
+F: hw/timer/mss-timer.c
31
@@ -XXX,XX +XXX,XX @@ F: docs/system/arm/mps2.rst
28
+F: hw/ssi/mss-spi.c
32
Musca
29
+F: include/hw/arm/msf2-soc.h
33
M: Peter Maydell <peter.maydell@linaro.org>
30
+F: include/hw/misc/msf2-sysreg.h
34
L: qemu-arm@nongnu.org
31
+F: include/hw/timer/mss-timer.h
35
-S: Maintained
32
+F: include/hw/ssi/mss-spi.h
36
+S: Odd Fixes
33
+
37
F: hw/arm/musca.c
34
+Emcraft M2S-FG484
38
F: docs/system/arm/musca.rst
35
+M: Subbaraya Sundeep <sundeep.lkml@gmail.com>
39
36
+S: Maintained
40
@@ -XXX,XX +XXX,XX @@ F: tests/functional/test_aarch64_raspi4.py
37
+F: hw/arm/msf2-som.c
41
Real View
38
+
42
M: Peter Maydell <peter.maydell@linaro.org>
39
CRIS Machines
43
L: qemu-arm@nongnu.org
40
-------------
44
-S: Maintained
41
Axis Dev88
45
+S: Odd Fixes
46
F: hw/arm/realview*
47
F: hw/cpu/realview_mpcore.c
48
F: hw/intc/realview_gic.c
49
@@ -XXX,XX +XXX,XX @@ F: tests/functional/test_arm_collie.py
50
Stellaris
51
M: Peter Maydell <peter.maydell@linaro.org>
52
L: qemu-arm@nongnu.org
53
-S: Maintained
54
+S: Odd Fixes
55
F: hw/*/stellaris*
56
F: hw/display/ssd03*
57
F: include/hw/input/gamepad.h
58
@@ -XXX,XX +XXX,XX @@ F: docs/system/arm/stm32.rst
59
Versatile Express
60
M: Peter Maydell <peter.maydell@linaro.org>
61
L: qemu-arm@nongnu.org
62
-S: Maintained
63
+S: Odd Fixes
64
F: hw/arm/vexpress.c
65
F: hw/display/sii9022.c
66
F: docs/system/arm/vexpress.rst
67
@@ -XXX,XX +XXX,XX @@ F: tests/functional/test_arm_vexpress.py
68
Versatile PB
69
M: Peter Maydell <peter.maydell@linaro.org>
70
L: qemu-arm@nongnu.org
71
-S: Maintained
72
+S: Odd Fixes
73
F: hw/*/versatile*
74
F: hw/i2c/arm_sbcon_i2c.c
75
F: include/hw/i2c/arm_sbcon_i2c.h
76
@@ -XXX,XX +XXX,XX @@ F: include/hw/hyperv/vmbus*.h
77
OMAP
78
M: Peter Maydell <peter.maydell@linaro.org>
79
L: qemu-arm@nongnu.org
80
-S: Maintained
81
+S: Odd Fixes
82
F: hw/*/omap*
83
F: include/hw/arm/omap.h
84
F: docs/system/arm/sx1.rst
42
--
85
--
43
2.7.4
86
2.43.0
44
87
45
88
diff view generated by jsdifflib
1
From: Prasad J Pandit <pjp@fedoraproject.org>
1
From: Paolo Bonzini <pbonzini@redhat.com>
2
2
3
An 'offset' parameter sent to highbank register r/w functions
3
The guest does not control whether characters are sent on the UART.
4
could be greater than number(NUM_REGS=0x200) of hb registers,
4
Sending them before the guest happens to boot will now result in a
5
leading to an OOB access issue. Add check to avoid it.
5
"guest error" log entry that is only because of timing, even if the
6
guest _would_ later setup the receiver correctly.
6
7
7
Reported-by: Moguofang (Dennis mo) <moguofang@huawei.com>
8
This reverts the bulk of commit abf2b6a028670bd2890bb3aee7e103fe53e4b0df,
8
Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>
9
and instead adds a comment about why we don't check the enable bits.
9
Message-id: 20171113062658.9697-1-ppandit@redhat.com
10
11
Cc: Philippe Mathieu-Daudé <philmd@linaro.org>
12
Cc: Peter Maydell <peter.maydell@linaro.org>
13
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
14
Message-id: 20250311153717.206129-1-pbonzini@redhat.com
15
[PMM: expanded comment]
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
16
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
18
---
13
hw/arm/highbank.c | 17 +++++++++++++++--
19
hw/char/pl011.c | 19 ++++++++++---------
14
1 file changed, 15 insertions(+), 2 deletions(-)
20
1 file changed, 10 insertions(+), 9 deletions(-)
15
21
16
diff --git a/hw/arm/highbank.c b/hw/arm/highbank.c
22
diff --git a/hw/char/pl011.c b/hw/char/pl011.c
17
index XXXXXXX..XXXXXXX 100644
23
index XXXXXXX..XXXXXXX 100644
18
--- a/hw/arm/highbank.c
24
--- a/hw/char/pl011.c
19
+++ b/hw/arm/highbank.c
25
+++ b/hw/char/pl011.c
20
@@ -XXX,XX +XXX,XX @@
26
@@ -XXX,XX +XXX,XX @@ static int pl011_can_receive(void *opaque)
21
#include "hw/ide/ahci.h"
27
unsigned fifo_depth = pl011_get_fifo_depth(s);
22
#include "hw/cpu/a9mpcore.h"
28
unsigned fifo_available = fifo_depth - s->read_count;
23
#include "hw/cpu/a15mpcore.h"
29
24
+#include "qemu/log.h"
30
- if (!(s->cr & CR_UARTEN)) {
25
31
- qemu_log_mask(LOG_GUEST_ERROR,
26
#define SMP_BOOT_ADDR 0x100
32
- "PL011 receiving data on disabled UART\n");
27
#define SMP_BOOT_REG 0x40
33
- }
28
@@ -XXX,XX +XXX,XX @@ static void hb_regs_write(void *opaque, hwaddr offset,
34
- if (!(s->cr & CR_RXE)) {
29
}
35
- qemu_log_mask(LOG_GUEST_ERROR,
30
}
36
- "PL011 receiving data on disabled RX UART\n");
31
37
- }
32
- regs[offset/4] = value;
38
- trace_pl011_can_receive(s->lcr, s->read_count, fifo_depth, fifo_available);
33
+ if (offset / 4 >= NUM_REGS) {
39
+ /*
34
+ qemu_log_mask(LOG_GUEST_ERROR,
40
+ * In theory we should check the UART and RX enable bits here and
35
+ "highbank: bad write offset 0x%" HWADDR_PRIx "\n", offset);
41
+ * return 0 if they are not set (so the guest can't receive data
36
+ return;
42
+ * until you have enabled the UART). In practice we suspect there
37
+ }
43
+ * is at least some guest code out there which has been tested only
38
+ regs[offset / 4] = value;
44
+ * on QEMU and which never bothers to enable the UART because we
45
+ * historically never enforced that. So we effectively keep the
46
+ * UART continuously enabled regardless of the enable bits.
47
+ */
48
49
+ trace_pl011_can_receive(s->lcr, s->read_count, fifo_depth, fifo_available);
50
return fifo_available;
39
}
51
}
40
52
41
static uint64_t hb_regs_read(void *opaque, hwaddr offset,
42
unsigned size)
43
{
44
+ uint32_t value;
45
uint32_t *regs = opaque;
46
- uint32_t value = regs[offset/4];
47
+
48
+ if (offset / 4 >= NUM_REGS) {
49
+ qemu_log_mask(LOG_GUEST_ERROR,
50
+ "highbank: bad read offset 0x%" HWADDR_PRIx "\n", offset);
51
+ return 0;
52
+ }
53
+ value = regs[offset / 4];
54
55
if ((offset == 0x100) || (offset == 0x108) || (offset == 0x10C)) {
56
value |= 0x30000000;
57
--
53
--
58
2.7.4
54
2.43.0
59
55
60
56
diff view generated by jsdifflib
1
From: "Emilio G. Cota" <cota@braap.org>
1
From: Joe Komlodi <komlodi@google.com>
2
2
3
55c3cee ("qom: Introduce CPUClass.tcg_initialize", 2017-10-24)
3
On ARM hosts with CTR_EL0.DIC and CTR_EL0.IDC set, this would only cause
4
introduces a per-CPUClass bool that we check so that the target CPU
4
an ISB to be executed during cache maintenance, which could lead to QEMU
5
is initialized for TCG only once. This works well except when
5
executing TBs containing garbage instructions.
6
we end up creating more than one CPUClass, in which case we end
7
up incorrectly initializing TCG more than once, i.e. once for
8
each CPUClass.
9
6
10
This can be replicated with:
7
This seems to be because the ISB finishes executing instructions and
11
$ aarch64-softmmu/qemu-system-aarch64 -machine xlnx-zcu102 -smp 6 \
8
flushes the pipeline, but the ISB doesn't guarantee that writes from the
12
-global driver=xlnx,,zynqmp,property=has_rpu,value=on
9
executed instructions are committed. If a small enough TB is created, it's
13
In this case the class name of the "RPUs" is prefixed by "cortex-r5-",
10
possible that the writes setting up the TB aren't committed by the time the
14
whereas the "regular" CPUs are prefixed by "cortex-a53-". This
11
TB is executed.
15
results in two CPUClass instances being created.
16
12
17
Fix it by introducing a static variable, so that only the first
13
This function is intended to be a port of the gcc implementation
18
target CPU being initialized will initialize the target-dependent
14
(https://github.com/gcc-mirror/gcc/blob/85b46d0795ac76bc192cb8f88b646a647acf98c1/libgcc/config/aarch64/sync-cache.c#L67)
19
part of TCG, regardless of CPUClass instances.
15
which makes the first DSB unconditional, so we can fix the synchronization
16
issue by doing that as well.
20
17
21
Fixes: 55c3ceef61fcf06fc98ddc752b7cce788ce7680b
18
Cc: qemu-stable@nongnu.org
22
Signed-off-by: Emilio G. Cota <cota@braap.org>
19
Fixes: 664a79735e4deb1 ("util: Specialize flush_idcache_range for aarch64")
23
Reviewed-by: Eduardo Habkost <ehabkost@redhat.com>
20
Signed-off-by: Joe Komlodi <komlodi@google.com>
24
Reviewed-by: Alistair Francis <alistair.francis@xilinx.com>
21
Message-id: 20250310203622.1827940-2-komlodi@google.com
22
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
25
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
23
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
26
Tested-by: Alistair Francis <alistair.francis@xilinx.com>
27
Message-id: 1510343626-25861-2-git-send-email-cota@braap.org
28
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
24
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
29
---
25
---
30
include/qom/cpu.h | 1 -
26
util/cacheflush.c | 4 +++-
31
exec.c | 5 +++--
27
1 file changed, 3 insertions(+), 1 deletion(-)
32
2 files changed, 3 insertions(+), 3 deletions(-)
33
28
34
diff --git a/include/qom/cpu.h b/include/qom/cpu.h
29
diff --git a/util/cacheflush.c b/util/cacheflush.c
35
index XXXXXXX..XXXXXXX 100644
30
index XXXXXXX..XXXXXXX 100644
36
--- a/include/qom/cpu.h
31
--- a/util/cacheflush.c
37
+++ b/include/qom/cpu.h
32
+++ b/util/cacheflush.c
38
@@ -XXX,XX +XXX,XX @@ typedef struct CPUClass {
33
@@ -XXX,XX +XXX,XX @@ void flush_idcache_range(uintptr_t rx, uintptr_t rw, size_t len)
39
/* Keep non-pointer data at the end to minimize holes. */
34
for (p = rw & -dcache_lsize; p < rw + len; p += dcache_lsize) {
40
int gdb_num_core_regs;
35
asm volatile("dc\tcvau, %0" : : "r" (p) : "memory");
41
bool gdb_stop_before_watchpoint;
36
}
42
- bool tcg_initialized;
37
- asm volatile("dsb\tish" : : : "memory");
43
} CPUClass;
44
45
#ifdef HOST_WORDS_BIGENDIAN
46
diff --git a/exec.c b/exec.c
47
index XXXXXXX..XXXXXXX 100644
48
--- a/exec.c
49
+++ b/exec.c
50
@@ -XXX,XX +XXX,XX @@ void cpu_exec_initfn(CPUState *cpu)
51
void cpu_exec_realizefn(CPUState *cpu, Error **errp)
52
{
53
CPUClass *cc = CPU_GET_CLASS(cpu);
54
+ static bool tcg_target_initialized;
55
56
cpu_list_add(cpu);
57
58
- if (tcg_enabled() && !cc->tcg_initialized) {
59
- cc->tcg_initialized = true;
60
+ if (tcg_enabled() && !tcg_target_initialized) {
61
+ tcg_target_initialized = true;
62
cc->tcg_initialize();
63
}
38
}
64
39
40
+ /* DSB unconditionally to ensure any outstanding writes are committed. */
41
+ asm volatile("dsb\tish" : : : "memory");
42
+
43
/*
44
* If CTR_EL0.DIC is enabled, Instruction cache cleaning to the Point
45
* of Unification is not required for instruction to data coherence.
65
--
46
--
66
2.7.4
47
2.43.0
67
68
diff view generated by jsdifflib
1
From: "Emilio G. Cota" <cota@braap.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
max_cpus needs to be an upper bound on the number of vCPUs
3
The check for fp_excp_el in assert_fp_access_checked is
4
initialized; otherwise TCG region initialization breaks.
4
incorrect. For SME, with StreamingMode enabled, the access
5
is really against the streaming mode vectors, and access
6
to the normal fp registers is allowed to be disabled.
7
C.f. sme_enabled_check.
5
8
6
Some boards initialize a hard-coded number of vCPUs, which is not
9
Convert sve_access_checked to match, even though we don't
7
captured by the global max_cpus and therefore breaks TCG initialization.
10
currently check the exception state.
8
Fix it by adding the .min_cpus field to machine_class.
9
11
10
This commit also changes some user-facing behaviour: we now die if
12
Cc: qemu-stable@nongnu.org
11
-smp is below this hard-coded vCPU minimum instead of silently
13
Fixes: 3d74825f4d6 ("target/arm: Add SME enablement checks")
12
ignoring the passed -smp value (sometimes announcing this by printing
14
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
13
a warning). However, the introduction of .default_cpus lessens the
15
Message-id: 20250307190415.982049-2-richard.henderson@linaro.org
14
likelihood that users will notice this: if -smp isn't set, we now
16
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
15
assign the value in .default_cpus to both smp_cpus and max_cpus. IOW,
16
if a user does not set -smp, they always get a correct number of vCPUs.
17
18
This change fixes 3468b59 ("tcg: enable multiple TCG contexts in
19
softmmu", 2017-10-24), which broke TCG initialization for some
20
ARM boards.
21
22
Fixes: 3468b59e18b179bc63c7ce934de912dfa9596122
23
Reported-by: Thomas Huth <thuth@redhat.com>
24
Reviewed-by: Eduardo Habkost <ehabkost@redhat.com>
25
Reviewed-by: Alistair Francis <alistair.francis@xilinx.com>
26
Signed-off-by: Emilio G. Cota <cota@braap.org>
27
Message-id: 1510343626-25861-6-git-send-email-cota@braap.org
28
Suggested-by: Peter Maydell <peter.maydell@linaro.org>
29
Signed-off-by: Emilio G. Cota <cota@braap.org>
30
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
31
---
18
---
32
include/hw/boards.h | 5 +++++
19
target/arm/tcg/translate-a64.h | 2 +-
33
hw/arm/exynos4_boards.c | 12 ++++--------
20
target/arm/tcg/translate.h | 10 +++++++---
34
hw/arm/raspi.c | 2 ++
21
target/arm/tcg/translate-a64.c | 17 +++++++++--------
35
hw/arm/xlnx-zcu102.c | 2 ++
22
3 files changed, 17 insertions(+), 12 deletions(-)
36
vl.c | 21 ++++++++++++++++++---
37
5 files changed, 31 insertions(+), 11 deletions(-)
38
23
39
diff --git a/include/hw/boards.h b/include/hw/boards.h
24
diff --git a/target/arm/tcg/translate-a64.h b/target/arm/tcg/translate-a64.h
40
index XXXXXXX..XXXXXXX 100644
25
index XXXXXXX..XXXXXXX 100644
41
--- a/include/hw/boards.h
26
--- a/target/arm/tcg/translate-a64.h
42
+++ b/include/hw/boards.h
27
+++ b/target/arm/tcg/translate-a64.h
43
@@ -XXX,XX +XXX,XX @@ typedef struct {
28
@@ -XXX,XX +XXX,XX @@ TCGv_i64 gen_mte_checkN(DisasContext *s, TCGv_i64 addr, bool is_write,
44
29
static inline void assert_fp_access_checked(DisasContext *s)
45
/**
30
{
46
* MachineClass:
31
#ifdef CONFIG_DEBUG_TCG
47
+ * @max_cpus: maximum number of CPUs supported. Default: 1
32
- if (unlikely(!s->fp_access_checked || s->fp_excp_el)) {
48
+ * @min_cpus: minimum number of CPUs supported. Default: 1
33
+ if (unlikely(s->fp_access_checked <= 0)) {
49
+ * @default_cpus: number of CPUs instantiated if none are specified. Default: 1
34
fprintf(stderr, "target-arm: FP access check missing for "
50
* @get_hotplug_handler: this function is called during bus-less
35
"instruction 0x%08x\n", s->insn);
51
* device hotplug. If defined it returns pointer to an instance
36
abort();
52
* of HotplugHandler object, which handles hotplug operation
37
diff --git a/target/arm/tcg/translate.h b/target/arm/tcg/translate.h
53
@@ -XXX,XX +XXX,XX @@ struct MachineClass {
54
BlockInterfaceType block_default_type;
55
int units_per_default_bus;
56
int max_cpus;
57
+ int min_cpus;
58
+ int default_cpus;
59
unsigned int no_serial:1,
60
no_parallel:1,
61
use_virtcon:1,
62
diff --git a/hw/arm/exynos4_boards.c b/hw/arm/exynos4_boards.c
63
index XXXXXXX..XXXXXXX 100644
38
index XXXXXXX..XXXXXXX 100644
64
--- a/hw/arm/exynos4_boards.c
39
--- a/target/arm/tcg/translate.h
65
+++ b/hw/arm/exynos4_boards.c
40
+++ b/target/arm/tcg/translate.h
66
@@ -XXX,XX +XXX,XX @@
41
@@ -XXX,XX +XXX,XX @@ typedef struct DisasContext {
67
#include "qemu-common.h"
42
bool aarch64;
68
#include "cpu.h"
43
bool thumb;
69
#include "sysemu/sysemu.h"
44
bool lse2;
70
-#include "sysemu/qtest.h"
45
- /* Because unallocated encodings generate different exception syndrome
71
#include "hw/sysbus.h"
46
+ /*
72
#include "net/net.h"
47
+ * Because unallocated encodings generate different exception syndrome
73
#include "hw/arm/arm.h"
48
* information from traps due to FP being disabled, we can't do a single
74
@@ -XXX,XX +XXX,XX @@ exynos4_boards_init_common(MachineState *machine,
49
* "is fp access disabled" check at a high level in the decode tree.
75
Exynos4BoardType board_type)
50
* To help in catching bugs where the access check was forgotten in some
51
* code path, we set this flag when the access check is done, and assert
52
* that it is set at the point where we actually touch the FP regs.
53
+ * 0: not checked,
54
+ * 1: checked, access ok
55
+ * -1: checked, access denied
56
*/
57
- bool fp_access_checked;
58
- bool sve_access_checked;
59
+ int8_t fp_access_checked;
60
+ int8_t sve_access_checked;
61
/* ARMv8 single-step state (this is distinct from the QEMU gdbstub
62
* single-step support).
63
*/
64
diff --git a/target/arm/tcg/translate-a64.c b/target/arm/tcg/translate-a64.c
65
index XXXXXXX..XXXXXXX 100644
66
--- a/target/arm/tcg/translate-a64.c
67
+++ b/target/arm/tcg/translate-a64.c
68
@@ -XXX,XX +XXX,XX @@ static bool fp_access_check_only(DisasContext *s)
76
{
69
{
77
Exynos4BoardState *s = g_new(Exynos4BoardState, 1);
70
if (s->fp_excp_el) {
78
- MachineClass *mc = MACHINE_GET_CLASS(machine);
71
assert(!s->fp_access_checked);
79
-
72
- s->fp_access_checked = true;
80
- if (smp_cpus != EXYNOS4210_NCPUS && !qtest_enabled()) {
73
+ s->fp_access_checked = -1;
81
- error_report("%s board supports only %d CPU cores, ignoring smp_cpus"
74
82
- " value",
75
gen_exception_insn_el(s, 0, EXCP_UDEF,
83
- mc->name, EXYNOS4210_NCPUS);
76
syn_fp_access_trap(1, 0xe, false, 0),
84
- }
77
s->fp_excp_el);
85
78
return false;
86
exynos4_board_binfo.ram_size = exynos4_board_ram_size[board_type];
79
}
87
exynos4_board_binfo.board_id = exynos4_board_id[board_type];
80
- s->fp_access_checked = true;
88
@@ -XXX,XX +XXX,XX @@ static void nuri_class_init(ObjectClass *oc, void *data)
81
+ s->fp_access_checked = 1;
89
mc->desc = "Samsung NURI board (Exynos4210)";
82
return true;
90
mc->init = nuri_init;
91
mc->max_cpus = EXYNOS4210_NCPUS;
92
+ mc->min_cpus = EXYNOS4210_NCPUS;
93
+ mc->default_cpus = EXYNOS4210_NCPUS;
94
mc->ignore_memory_transaction_failures = true;
95
}
83
}
96
84
97
@@ -XXX,XX +XXX,XX @@ static void smdkc210_class_init(ObjectClass *oc, void *data)
85
@@ -XXX,XX +XXX,XX @@ bool sve_access_check(DisasContext *s)
98
mc->desc = "Samsung SMDKC210 board (Exynos4210)";
86
syn_sve_access_trap(), s->sve_excp_el);
99
mc->init = smdkc210_init;
87
goto fail_exit;
100
mc->max_cpus = EXYNOS4210_NCPUS;
88
}
101
+ mc->min_cpus = EXYNOS4210_NCPUS;
89
- s->sve_access_checked = true;
102
+ mc->default_cpus = EXYNOS4210_NCPUS;
90
+ s->sve_access_checked = 1;
103
mc->ignore_memory_transaction_failures = true;
91
return fp_access_check(s);
92
93
fail_exit:
94
/* Assert that we only raise one exception per instruction. */
95
assert(!s->sve_access_checked);
96
- s->sve_access_checked = true;
97
+ s->sve_access_checked = -1;
98
return false;
104
}
99
}
105
100
106
diff --git a/hw/arm/raspi.c b/hw/arm/raspi.c
101
@@ -XXX,XX +XXX,XX @@ bool sme_enabled_check(DisasContext *s)
107
index XXXXXXX..XXXXXXX 100644
102
* sme_excp_el by itself for cpregs access checks.
108
--- a/hw/arm/raspi.c
103
*/
109
+++ b/hw/arm/raspi.c
104
if (!s->fp_excp_el || s->sme_excp_el < s->fp_excp_el) {
110
@@ -XXX,XX +XXX,XX @@ static void raspi2_machine_init(MachineClass *mc)
105
- s->fp_access_checked = true;
111
mc->no_floppy = 1;
106
- return sme_access_check(s);
112
mc->no_cdrom = 1;
107
+ bool ret = sme_access_check(s);
113
mc->max_cpus = BCM2836_NCPUS;
108
+ s->fp_access_checked = (ret ? 1 : -1);
114
+ mc->min_cpus = BCM2836_NCPUS;
109
+ return ret;
115
+ mc->default_cpus = BCM2836_NCPUS;
110
}
116
mc->default_ram_size = 1024 * 1024 * 1024;
111
return fp_access_check_only(s);
117
mc->ignore_memory_transaction_failures = true;
118
};
119
diff --git a/hw/arm/xlnx-zcu102.c b/hw/arm/xlnx-zcu102.c
120
index XXXXXXX..XXXXXXX 100644
121
--- a/hw/arm/xlnx-zcu102.c
122
+++ b/hw/arm/xlnx-zcu102.c
123
@@ -XXX,XX +XXX,XX @@ static void xlnx_ep108_machine_class_init(ObjectClass *oc, void *data)
124
mc->units_per_default_bus = 1;
125
mc->ignore_memory_transaction_failures = true;
126
mc->max_cpus = XLNX_ZYNQMP_NUM_APU_CPUS + XLNX_ZYNQMP_NUM_RPU_CPUS;
127
+ mc->default_cpus = XLNX_ZYNQMP_NUM_APU_CPUS;
128
}
112
}
129
113
@@ -XXX,XX +XXX,XX @@ static void aarch64_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu)
130
static const TypeInfo xlnx_ep108_machine_init_typeinfo = {
114
s->insn = insn;
131
@@ -XXX,XX +XXX,XX @@ static void xlnx_zcu102_machine_class_init(ObjectClass *oc, void *data)
115
s->base.pc_next = pc + 4;
132
mc->units_per_default_bus = 1;
116
133
mc->ignore_memory_transaction_failures = true;
117
- s->fp_access_checked = false;
134
mc->max_cpus = XLNX_ZYNQMP_NUM_APU_CPUS + XLNX_ZYNQMP_NUM_RPU_CPUS;
118
- s->sve_access_checked = false;
135
+ mc->default_cpus = XLNX_ZYNQMP_NUM_APU_CPUS;
119
+ s->fp_access_checked = 0;
136
}
120
+ s->sve_access_checked = 0;
137
121
138
static const TypeInfo xlnx_zcu102_machine_init_typeinfo = {
122
if (s->pstate_il) {
139
diff --git a/vl.c b/vl.c
123
/*
140
index XXXXXXX..XXXXXXX 100644
141
--- a/vl.c
142
+++ b/vl.c
143
@@ -XXX,XX +XXX,XX @@ Chardev *virtcon_hds[MAX_VIRTIO_CONSOLES];
144
Chardev *sclp_hds[MAX_SCLP_CONSOLES];
145
int win2k_install_hack = 0;
146
int singlestep = 0;
147
-int smp_cpus = 1;
148
-unsigned int max_cpus = 1;
149
+int smp_cpus;
150
+unsigned int max_cpus;
151
int smp_cores = 1;
152
int smp_threads = 1;
153
int acpi_enabled = 1;
154
@@ -XXX,XX +XXX,XX @@ int main(int argc, char **argv, char **envp)
155
exit(0);
156
}
157
158
+ /* machine_class: default to UP */
159
+ machine_class->max_cpus = machine_class->max_cpus ?: 1;
160
+ machine_class->min_cpus = machine_class->min_cpus ?: 1;
161
+ machine_class->default_cpus = machine_class->default_cpus ?: 1;
162
+
163
+ /* default to machine_class->default_cpus */
164
+ smp_cpus = machine_class->default_cpus;
165
+ max_cpus = machine_class->default_cpus;
166
+
167
smp_parse(qemu_opts_find(qemu_find_opts("smp-opts"), NULL));
168
169
- machine_class->max_cpus = machine_class->max_cpus ?: 1; /* Default to UP */
170
+ /* sanity-check smp_cpus and max_cpus against machine_class */
171
+ if (smp_cpus < machine_class->min_cpus) {
172
+ error_report("Invalid SMP CPUs %d. The min CPUs "
173
+ "supported by machine '%s' is %d", smp_cpus,
174
+ machine_class->name, machine_class->min_cpus);
175
+ exit(1);
176
+ }
177
if (max_cpus > machine_class->max_cpus) {
178
error_report("Invalid SMP CPUs %d. The max CPUs "
179
"supported by machine '%s' is %d", max_cpus,
180
--
124
--
181
2.7.4
125
2.43.0
182
183
diff view generated by jsdifflib
1
From: Alex Bennée <alex.bennee@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
We are still seeing signals during translation time when we walk over
3
In StreamingMode, fp_access_checked is handled already.
4
a page protection boundary. This expands the check to ensure the host
4
We cannot fall through to fp_access_check lest we fall
5
PC is inside the code generation buffer. The original suggestion was
5
foul of the double-check assertion.
6
to check versus tcg_ctx.code_gen_ptr but as we now segment the
7
translation buffer we have to settle for just a general check for
8
being inside.
9
6
10
I've also fixed up the declaration to make it clear it can deal with
7
Cc: qemu-stable@nongnu.org
11
invalid addresses. A later patch will fix up the call sites.
8
Fixes: 285b1d5fcef ("target/arm: Handle SME in sve_access_check")
12
9
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
13
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
10
Message-id: 20250307190415.982049-3-richard.henderson@linaro.org
14
Reported-by: Peter Maydell <peter.maydell@linaro.org>
11
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
15
Reviewed-by: Laurent Vivier <laurent@vivier.eu>
12
[PMM: move declaration of 'ret' to top of block]
16
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
17
Message-id: 20171108153245.20740-2-alex.bennee@linaro.org
18
Suggested-by: Paolo Bonzini <pbonzini@redhat.com>
19
Cc: Richard Henderson <rth@twiddle.net>
20
Tested-by: Peter Maydell <peter.maydell@linaro.org>
21
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
22
---
14
---
23
include/exec/exec-all.h | 11 ++++++++++
15
target/arm/tcg/translate-a64.c | 22 +++++++++++-----------
24
accel/tcg/translate-all.c | 52 ++++++++++++++++++++++++++---------------------
16
1 file changed, 11 insertions(+), 11 deletions(-)
25
2 files changed, 40 insertions(+), 23 deletions(-)
26
17
27
diff --git a/include/exec/exec-all.h b/include/exec/exec-all.h
18
diff --git a/target/arm/tcg/translate-a64.c b/target/arm/tcg/translate-a64.c
28
index XXXXXXX..XXXXXXX 100644
19
index XXXXXXX..XXXXXXX 100644
29
--- a/include/exec/exec-all.h
20
--- a/target/arm/tcg/translate-a64.c
30
+++ b/include/exec/exec-all.h
21
+++ b/target/arm/tcg/translate-a64.c
31
@@ -XXX,XX +XXX,XX @@ void restore_state_to_opc(CPUArchState *env, struct TranslationBlock *tb,
22
@@ -XXX,XX +XXX,XX @@ static int fp_access_check_vector_hsd(DisasContext *s, bool is_q, MemOp esz)
32
target_ulong *data);
23
bool sve_access_check(DisasContext *s)
33
24
{
34
void cpu_gen_init(void);
25
if (s->pstate_sm || !dc_isar_feature(aa64_sve, s)) {
26
+ bool ret;
35
+
27
+
36
+/**
28
assert(dc_isar_feature(aa64_sme, s));
37
+ * cpu_restore_state:
29
- if (!sme_sm_enabled_check(s)) {
38
+ * @cpu: the vCPU state is to be restore to
30
- goto fail_exit;
39
+ * @searched_pc: the host PC the fault occurred at
31
- }
40
+ * @return: true if state was restored, false otherwise
32
- } else if (s->sve_excp_el) {
41
+ *
33
+ ret = sme_sm_enabled_check(s);
42
+ * Attempt to restore the state for a fault occurring in translated
34
+ s->sve_access_checked = (ret ? 1 : -1);
43
+ * code. If the searched_pc is not in translated code no state is
35
+ return ret;
44
+ * restored and the function returns false.
36
+ }
45
+ */
37
+ if (s->sve_excp_el) {
46
bool cpu_restore_state(CPUState *cpu, uintptr_t searched_pc);
38
+ /* Assert that we only raise one exception per instruction. */
47
39
+ assert(!s->sve_access_checked);
48
void QEMU_NORETURN cpu_loop_exit_noexc(CPUState *cpu);
40
gen_exception_insn_el(s, 0, EXCP_UDEF,
49
diff --git a/accel/tcg/translate-all.c b/accel/tcg/translate-all.c
41
syn_sve_access_trap(), s->sve_excp_el);
50
index XXXXXXX..XXXXXXX 100644
42
- goto fail_exit;
51
--- a/accel/tcg/translate-all.c
43
+ s->sve_access_checked = -1;
52
+++ b/accel/tcg/translate-all.c
44
+ return false;
53
@@ -XXX,XX +XXX,XX @@ static int cpu_restore_state_from_tb(CPUState *cpu, TranslationBlock *tb,
45
}
54
return 0;
46
s->sve_access_checked = 1;
47
return fp_access_check(s);
48
-
49
- fail_exit:
50
- /* Assert that we only raise one exception per instruction. */
51
- assert(!s->sve_access_checked);
52
- s->sve_access_checked = -1;
53
- return false;
55
}
54
}
56
55
57
-bool cpu_restore_state(CPUState *cpu, uintptr_t retaddr)
56
/*
58
+bool cpu_restore_state(CPUState *cpu, uintptr_t host_pc)
59
{
60
TranslationBlock *tb;
61
bool r = false;
62
+ uintptr_t check_offset;
63
64
- /* A retaddr of zero is invalid so we really shouldn't have ended
65
- * up here. The target code has likely forgotten to check retaddr
66
- * != 0 before attempting to restore state. We return early to
67
- * avoid blowing up on a recursive tb_lock(). The target must have
68
- * previously survived a failed cpu_restore_state because
69
- * tb_find_pc(0) would have failed anyway. It still should be
70
- * fixed though.
71
+ /* The host_pc has to be in the region of current code buffer. If
72
+ * it is not we will not be able to resolve it here. The two cases
73
+ * where host_pc will not be correct are:
74
+ *
75
+ * - fault during translation (instruction fetch)
76
+ * - fault from helper (not using GETPC() macro)
77
+ *
78
+ * Either way we need return early to avoid blowing up on a
79
+ * recursive tb_lock() as we can't resolve it here.
80
+ *
81
+ * We are using unsigned arithmetic so if host_pc <
82
+ * tcg_init_ctx.code_gen_buffer check_offset will wrap to way
83
+ * above the code_gen_buffer_size
84
*/
85
-
86
- if (!retaddr) {
87
- return r;
88
- }
89
-
90
- tb_lock();
91
- tb = tb_find_pc(retaddr);
92
- if (tb) {
93
- cpu_restore_state_from_tb(cpu, tb, retaddr);
94
- if (tb->cflags & CF_NOCACHE) {
95
- /* one-shot translation, invalidate it immediately */
96
- tb_phys_invalidate(tb, -1);
97
- tb_remove(tb);
98
+ check_offset = host_pc - (uintptr_t) tcg_init_ctx.code_gen_buffer;
99
+
100
+ if (check_offset < tcg_init_ctx.code_gen_buffer_size) {
101
+ tb_lock();
102
+ tb = tb_find_pc(host_pc);
103
+ if (tb) {
104
+ cpu_restore_state_from_tb(cpu, tb, host_pc);
105
+ if (tb->cflags & CF_NOCACHE) {
106
+ /* one-shot translation, invalidate it immediately */
107
+ tb_phys_invalidate(tb, -1);
108
+ tb_remove(tb);
109
+ }
110
+ r = true;
111
}
112
- r = true;
113
+ tb_unlock();
114
}
115
- tb_unlock();
116
117
return r;
118
}
119
--
57
--
120
2.7.4
58
2.43.0
121
122
diff view generated by jsdifflib
1
From: "Emilio G. Cota" <cota@braap.org>
1
We want to capture potential Rust backtraces on panics in our test
2
logs, which isn't Rust's default behaviour. Set RUST_BACKTRACE=1 in
3
the add_test_setup environments, so that all our tests get run with
4
this environment variable set.
2
5
3
Just like the zcu102, the ep108 can instantiate several CPUs.
6
This makes the setting of that variable in the gitlab CI template
7
redundant, so we can remove it.
4
8
5
Signed-off-by: Emilio G. Cota <cota@braap.org>
6
Reviewed-by: Alistair Francis <alistair.francis@xilinx.com>
7
Message-id: 1510343626-25861-5-git-send-email-cota@braap.org
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
11
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
12
Message-id: 20250310102950.3752908-1-peter.maydell@linaro.org
9
---
13
---
10
hw/arm/xlnx-zcu102.c | 1 +
14
meson.build | 9 ++++++---
11
1 file changed, 1 insertion(+)
15
.gitlab-ci.d/buildtest-template.yml | 1 -
16
2 files changed, 6 insertions(+), 4 deletions(-)
12
17
13
diff --git a/hw/arm/xlnx-zcu102.c b/hw/arm/xlnx-zcu102.c
18
diff --git a/meson.build b/meson.build
14
index XXXXXXX..XXXXXXX 100644
19
index XXXXXXX..XXXXXXX 100644
15
--- a/hw/arm/xlnx-zcu102.c
20
--- a/meson.build
16
+++ b/hw/arm/xlnx-zcu102.c
21
+++ b/meson.build
17
@@ -XXX,XX +XXX,XX @@ static void xlnx_ep108_machine_class_init(ObjectClass *oc, void *data)
22
@@ -XXX,XX +XXX,XX @@ project('qemu', ['c'], meson_version: '>=1.5.0',
18
mc->block_default_type = IF_IDE;
23
19
mc->units_per_default_bus = 1;
24
meson.add_devenv({ 'MESON_BUILD_ROOT' : meson.project_build_root() })
20
mc->ignore_memory_transaction_failures = true;
25
21
+ mc->max_cpus = XLNX_ZYNQMP_NUM_APU_CPUS + XLNX_ZYNQMP_NUM_RPU_CPUS;
26
-add_test_setup('quick', exclude_suites: ['slow', 'thorough'], is_default: true)
22
}
27
-add_test_setup('slow', exclude_suites: ['thorough'], env: ['G_TEST_SLOW=1', 'SPEED=slow'])
23
28
-add_test_setup('thorough', env: ['G_TEST_SLOW=1', 'SPEED=thorough'])
24
static const TypeInfo xlnx_ep108_machine_init_typeinfo = {
29
+add_test_setup('quick', exclude_suites: ['slow', 'thorough'], is_default: true,
30
+ env: ['RUST_BACKTRACE=1'])
31
+add_test_setup('slow', exclude_suites: ['thorough'],
32
+ env: ['G_TEST_SLOW=1', 'SPEED=slow', 'RUST_BACKTRACE=1'])
33
+add_test_setup('thorough',
34
+ env: ['G_TEST_SLOW=1', 'SPEED=thorough', 'RUST_BACKTRACE=1'])
35
36
meson.add_postconf_script(find_program('scripts/symlink-install-tree.py'))
37
38
diff --git a/.gitlab-ci.d/buildtest-template.yml b/.gitlab-ci.d/buildtest-template.yml
39
index XXXXXXX..XXXXXXX 100644
40
--- a/.gitlab-ci.d/buildtest-template.yml
41
+++ b/.gitlab-ci.d/buildtest-template.yml
42
@@ -XXX,XX +XXX,XX @@
43
stage: test
44
image: $CI_REGISTRY_IMAGE/qemu/$IMAGE:$QEMU_CI_CONTAINER_TAG
45
script:
46
- - export RUST_BACKTRACE=1
47
- source scripts/ci/gitlab-ci-section
48
- section_start buildenv "Setting up to run tests"
49
- scripts/git-submodule.sh update roms/SLOF
25
--
50
--
26
2.7.4
51
2.43.0
27
52
28
53
diff view generated by jsdifflib