1 | ARM bugfixes for rc1... | 1 | Hi; here's a target-arm pullreq for rc0; these are all bugfixes |
---|---|---|---|
2 | and similar minor stuff. | ||
2 | 3 | ||
4 | thanks | ||
5 | -- PMM | ||
3 | 6 | ||
4 | The following changes since commit f291910db61b5812e68f1e76afb3ade41d567bea: | 7 | The following changes since commit 0462a32b4f63b2448b4a196381138afd50719dc4: |
5 | 8 | ||
6 | Merge remote-tracking branch 'remotes/ericb/tags/pull-nbd-2017-11-09' into staging (2017-11-13 13:13:12 +0000) | 9 | Merge tag 'for-upstream' of https://repo.or.cz/qemu/kevin into staging (2025-03-14 09:31:13 +0800) |
7 | 10 | ||
8 | are available in the git repository at: | 11 | are available in the Git repository at: |
9 | 12 | ||
10 | git://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20171113 | 13 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20250314-1 |
11 | 14 | ||
12 | for you to fetch changes up to d25f2a72272b9ffe0d06710d6217d1169bc2cc7d: | 15 | for you to fetch changes up to a019e15edfd62beae1e2f6adc0fa7415ba20b14c: |
13 | 16 | ||
14 | accel/tcg/translate-all: expand cpu_restore_state addr check (2017-11-13 13:55:27 +0000) | 17 | meson.build: Set RUST_BACKTRACE for all tests (2025-03-14 12:54:33 +0000) |
15 | 18 | ||
16 | ---------------------------------------------------------------- | 19 | ---------------------------------------------------------------- |
17 | target-arm queue: | 20 | target-arm queue: |
18 | * translate-a64.c: silence gcc5 warning | 21 | * Correctly handle corner cases of guest attempting an exception |
19 | * highbank: validate register offset before access | 22 | return to AArch32 when target EL is AArch64 only |
20 | * MAINTAINERS: Add entries for Smartfusion2 | 23 | * MAINTAINERS: Fix status for Arm boards I "maintain" |
21 | * accel/tcg/translate-all: expand cpu_restore_state addr check | 24 | * tests/functional: Bump up arm_replay timeout |
22 | (so usermode insn aborts don't crash with an assertion failure) | 25 | * Revert "hw/char/pl011: Warn when using disabled receiver" |
23 | * fix TCG initialization of some Arm boards by allowing them | 26 | * util/cacheflush: Make first DSB unconditional on aarch64 |
24 | to specify min/default number of CPUs to create | 27 | * target/arm: Fix SVE/SME access check logic |
28 | * meson.build: Set RUST_BACKTRACE for all tests | ||
25 | 29 | ||
26 | ---------------------------------------------------------------- | 30 | ---------------------------------------------------------------- |
27 | Alex Bennée (1): | 31 | Joe Komlodi (1): |
28 | accel/tcg/translate-all: expand cpu_restore_state addr check | 32 | util/cacheflush: Make first DSB unconditional on aarch64 |
29 | 33 | ||
30 | Alistair Francis (2): | 34 | Paolo Bonzini (1): |
31 | xlnx-zynqmp: Properly support the smp command line option | 35 | Revert "hw/char/pl011: Warn when using disabled receiver" |
32 | xlnx-zcu102: Add an info message deprecating the EP108 | ||
33 | 36 | ||
34 | Emilio G. Cota (4): | 37 | Peter Maydell (13): |
35 | arm/translate-a64: mark path as unreachable to eliminate warning | 38 | target/arm: Move A32_BANKED_REG_{GET,SET} macros to cpregs.h |
36 | qom: move CPUClass.tcg_initialize to a global | 39 | target/arm: Un-inline access_secure_reg() |
37 | xlnx-zcu102: Specify the max number of CPUs for the EP108 | 40 | linux-user/aarch64: Remove unused get/put_user macros |
38 | hw: add .min_cpus and .default_cpus fields to machine_class | 41 | linux-user/arm: Remove unused get_put_user macros |
42 | target/arm: Move arm_cpu_data_is_big_endian() etc to internals.h | ||
43 | target/arm: Move arm_current_el() and arm_el_is_aa64() to internals.h | ||
44 | target/arm: SCR_EL3.RW should be treated as 1 if EL2 doesn't support AArch32 | ||
45 | target/arm: HCR_EL2.RW should be RAO/WI if EL1 doesn't support AArch32 | ||
46 | target/arm: Add cpu local variable to exception_return helper | ||
47 | target/arm: Forbid return to AArch32 when CPU is AArch64-only | ||
48 | MAINTAINERS: Fix status for Arm boards I "maintain" | ||
49 | tests/functional: Bump up arm_replay timeout | ||
50 | meson.build: Set RUST_BACKTRACE for all tests | ||
39 | 51 | ||
40 | Prasad J Pandit (1): | 52 | Richard Henderson (2): |
41 | highbank: validate register offset before access | 53 | target/arm: Make DisasContext.{fp, sve}_access_checked tristate |
54 | target/arm: Simplify pstate_sm check in sve_access_check | ||
42 | 55 | ||
43 | Subbaraya Sundeep (1): | 56 | MAINTAINERS | 14 ++-- |
44 | MAINTAINERS: Add entries for Smartfusion2 | 57 | meson.build | 9 ++- |
45 | 58 | target/arm/cpregs.h | 28 +++++++ | |
46 | include/exec/exec-all.h | 11 ++++++++++ | 59 | target/arm/cpu.h | 153 +----------------------------------- |
47 | include/hw/boards.h | 5 +++++ | 60 | target/arm/internals.h | 135 +++++++++++++++++++++++++++++++ |
48 | include/qom/cpu.h | 1 - | 61 | target/arm/tcg/translate-a64.h | 2 +- |
49 | accel/tcg/translate-all.c | 52 ++++++++++++++++++++++++++-------------------- | 62 | target/arm/tcg/translate.h | 10 ++- |
50 | exec.c | 5 +++-- | 63 | hw/char/pl011.c | 19 ++--- |
51 | hw/arm/exynos4_boards.c | 12 ++++------- | 64 | hw/intc/arm_gicv3_cpuif.c | 1 + |
52 | hw/arm/highbank.c | 17 +++++++++++++-- | 65 | linux-user/aarch64/cpu_loop.c | 48 ----------- |
53 | hw/arm/raspi.c | 2 ++ | 66 | linux-user/arm/cpu_loop.c | 43 +--------- |
54 | hw/arm/xlnx-zcu102.c | 9 +++++++- | 67 | target/arm/arch_dump.c | 1 + |
55 | hw/arm/xlnx-zynqmp.c | 26 ++++++++++++++--------- | 68 | target/arm/helper.c | 16 +++- |
56 | target/arm/translate-a64.c | 2 ++ | 69 | target/arm/tcg/helper-a64.c | 12 ++- |
57 | vl.c | 21 ++++++++++++++++--- | 70 | target/arm/tcg/hflags.c | 9 +++ |
58 | MAINTAINERS | 17 +++++++++++++++ | 71 | target/arm/tcg/translate-a64.c | 37 ++++----- |
59 | qemu-doc.texi | 7 +++++++ | 72 | util/cacheflush.c | 4 +- |
60 | 14 files changed, 137 insertions(+), 50 deletions(-) | 73 | .gitlab-ci.d/buildtest-template.yml | 1 - |
61 | 74 | 18 files changed, 257 insertions(+), 285 deletions(-) | diff view generated by jsdifflib |
1 | From: Alistair Francis <alistair.francis@xilinx.com> | 1 | The A32_BANKED_REG_{GET,SET} macros are only used inside target/arm; |
---|---|---|---|
2 | move their definitions to cpregs.h. There's no need to have them | ||
3 | defined in all the code that includes cpu.h. | ||
2 | 4 | ||
3 | The EP108 was an early access development board that is no longer used. | 5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
4 | Add an info message to convert any users to the ZCU102 instead. On QEMU | 6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
5 | they are both identical. | 7 | --- |
8 | target/arm/cpregs.h | 28 ++++++++++++++++++++++++++++ | ||
9 | target/arm/cpu.h | 27 --------------------------- | ||
10 | 2 files changed, 28 insertions(+), 27 deletions(-) | ||
6 | 11 | ||
7 | This patch also updated the qemu-doc.texi file to indicate that the | 12 | diff --git a/target/arm/cpregs.h b/target/arm/cpregs.h |
8 | EP108 has been deprecated. | ||
9 | |||
10 | Signed-off-by: Alistair Francis <alistair.francis@xilinx.com> | ||
11 | Reviewed-by: Emilio G. Cota <cota@braap.org> | ||
12 | Message-id: 1510343626-25861-4-git-send-email-cota@braap.org | ||
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
14 | --- | ||
15 | hw/arm/xlnx-zcu102.c | 3 +++ | ||
16 | qemu-doc.texi | 7 +++++++ | ||
17 | 2 files changed, 10 insertions(+) | ||
18 | |||
19 | diff --git a/hw/arm/xlnx-zcu102.c b/hw/arm/xlnx-zcu102.c | ||
20 | index XXXXXXX..XXXXXXX 100644 | 13 | index XXXXXXX..XXXXXXX 100644 |
21 | --- a/hw/arm/xlnx-zcu102.c | 14 | --- a/target/arm/cpregs.h |
22 | +++ b/hw/arm/xlnx-zcu102.c | 15 | +++ b/target/arm/cpregs.h |
23 | @@ -XXX,XX +XXX,XX @@ static void xlnx_ep108_init(MachineState *machine) | 16 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_cpreg_traps_in_nv(const ARMCPRegInfo *ri) |
24 | { | 17 | return ri->opc1 == 4 || ri->opc1 == 5; |
25 | XlnxZCU102 *s = EP108_MACHINE(machine); | 18 | } |
26 | 19 | ||
27 | + info_report("The Xilinx EP108 machine is deprecated, please use the " | 20 | +/* Macros for accessing a specified CP register bank */ |
28 | + "ZCU102 machine instead. It has the same features supported."); | 21 | +#define A32_BANKED_REG_GET(_env, _regname, _secure) \ |
22 | + ((_secure) ? (_env)->cp15._regname##_s : (_env)->cp15._regname##_ns) | ||
29 | + | 23 | + |
30 | xlnx_zynqmp_init(s, machine); | 24 | +#define A32_BANKED_REG_SET(_env, _regname, _secure, _val) \ |
25 | + do { \ | ||
26 | + if (_secure) { \ | ||
27 | + (_env)->cp15._regname##_s = (_val); \ | ||
28 | + } else { \ | ||
29 | + (_env)->cp15._regname##_ns = (_val); \ | ||
30 | + } \ | ||
31 | + } while (0) | ||
32 | + | ||
33 | +/* | ||
34 | + * Macros for automatically accessing a specific CP register bank depending on | ||
35 | + * the current secure state of the system. These macros are not intended for | ||
36 | + * supporting instruction translation reads/writes as these are dependent | ||
37 | + * solely on the SCR.NS bit and not the mode. | ||
38 | + */ | ||
39 | +#define A32_BANKED_CURRENT_REG_GET(_env, _regname) \ | ||
40 | + A32_BANKED_REG_GET((_env), _regname, \ | ||
41 | + (arm_is_secure(_env) && !arm_el_is_aa64((_env), 3))) | ||
42 | + | ||
43 | +#define A32_BANKED_CURRENT_REG_SET(_env, _regname, _val) \ | ||
44 | + A32_BANKED_REG_SET((_env), _regname, \ | ||
45 | + (arm_is_secure(_env) && !arm_el_is_aa64((_env), 3)), \ | ||
46 | + (_val)) | ||
47 | + | ||
48 | #endif /* TARGET_ARM_CPREGS_H */ | ||
49 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
50 | index XXXXXXX..XXXXXXX 100644 | ||
51 | --- a/target/arm/cpu.h | ||
52 | +++ b/target/arm/cpu.h | ||
53 | @@ -XXX,XX +XXX,XX @@ static inline bool access_secure_reg(CPUARMState *env) | ||
54 | return ret; | ||
31 | } | 55 | } |
32 | 56 | ||
33 | diff --git a/qemu-doc.texi b/qemu-doc.texi | 57 | -/* Macros for accessing a specified CP register bank */ |
34 | index XXXXXXX..XXXXXXX 100644 | 58 | -#define A32_BANKED_REG_GET(_env, _regname, _secure) \ |
35 | --- a/qemu-doc.texi | 59 | - ((_secure) ? (_env)->cp15._regname##_s : (_env)->cp15._regname##_ns) |
36 | +++ b/qemu-doc.texi | 60 | - |
37 | @@ -XXX,XX +XXX,XX @@ or ``ivshmem-doorbell`` device types. | 61 | -#define A32_BANKED_REG_SET(_env, _regname, _secure, _val) \ |
38 | The ``spapr-pci-vfio-host-bridge'' device type is replaced by | 62 | - do { \ |
39 | the ``spapr-pci-host-bridge'' device type. | 63 | - if (_secure) { \ |
40 | 64 | - (_env)->cp15._regname##_s = (_val); \ | |
41 | +@section System emulator machines | 65 | - } else { \ |
42 | + | 66 | - (_env)->cp15._regname##_ns = (_val); \ |
43 | +@subsection Xilinx EP108 (since 2.11.0) | 67 | - } \ |
44 | + | 68 | - } while (0) |
45 | +The ``xlnx-ep108'' machine has been replaced by the ``xlnx-zcu102'' machine. | 69 | - |
46 | +The ``xlnx-zcu102'' machine has the same features and capabilites in QEMU. | 70 | -/* Macros for automatically accessing a specific CP register bank depending on |
47 | + | 71 | - * the current secure state of the system. These macros are not intended for |
48 | @node License | 72 | - * supporting instruction translation reads/writes as these are dependent |
49 | @appendix License | 73 | - * solely on the SCR.NS bit and not the mode. |
74 | - */ | ||
75 | -#define A32_BANKED_CURRENT_REG_GET(_env, _regname) \ | ||
76 | - A32_BANKED_REG_GET((_env), _regname, \ | ||
77 | - (arm_is_secure(_env) && !arm_el_is_aa64((_env), 3))) | ||
78 | - | ||
79 | -#define A32_BANKED_CURRENT_REG_SET(_env, _regname, _val) \ | ||
80 | - A32_BANKED_REG_SET((_env), _regname, \ | ||
81 | - (arm_is_secure(_env) && !arm_el_is_aa64((_env), 3)), \ | ||
82 | - (_val)) | ||
83 | - | ||
84 | uint32_t arm_phys_excp_target_el(CPUState *cs, uint32_t excp_idx, | ||
85 | uint32_t cur_el, bool secure); | ||
50 | 86 | ||
51 | -- | 87 | -- |
52 | 2.7.4 | 88 | 2.43.0 |
53 | |||
54 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | We would like to move arm_el_is_aa64() to internals.h; however, it is | ||
2 | used by access_secure_reg(). Make that function not be inline, so | ||
3 | that it can stay in cpu.h. | ||
1 | 4 | ||
5 | access_secure_reg() is used only in two places: | ||
6 | * in hflags.c | ||
7 | * in the user-mode arm emulators, to decide whether to store | ||
8 | the TLS value in the secure or non-secure banked field | ||
9 | |||
10 | The second of these is not on a super-hot path that would care about | ||
11 | the inlining (and incidentally will always use the NS banked field | ||
12 | because our user-mode CPUs never set ARM_FEATURE_EL3); put the | ||
13 | definition of access_secure_reg() in hflags.c, near its only use | ||
14 | inside target/arm. | ||
15 | |||
16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
17 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
18 | --- | ||
19 | target/arm/cpu.h | 12 +++--------- | ||
20 | target/arm/tcg/hflags.c | 9 +++++++++ | ||
21 | 2 files changed, 12 insertions(+), 9 deletions(-) | ||
22 | |||
23 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
24 | index XXXXXXX..XXXXXXX 100644 | ||
25 | --- a/target/arm/cpu.h | ||
26 | +++ b/target/arm/cpu.h | ||
27 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_el_is_aa64(CPUARMState *env, int el) | ||
28 | return aa64; | ||
29 | } | ||
30 | |||
31 | -/* Function for determining whether guest cp register reads and writes should | ||
32 | +/* | ||
33 | + * Function for determining whether guest cp register reads and writes should | ||
34 | * access the secure or non-secure bank of a cp register. When EL3 is | ||
35 | * operating in AArch32 state, the NS-bit determines whether the secure | ||
36 | * instance of a cp register should be used. When EL3 is AArch64 (or if | ||
37 | * it doesn't exist at all) then there is no register banking, and all | ||
38 | * accesses are to the non-secure version. | ||
39 | */ | ||
40 | -static inline bool access_secure_reg(CPUARMState *env) | ||
41 | -{ | ||
42 | - bool ret = (arm_feature(env, ARM_FEATURE_EL3) && | ||
43 | - !arm_el_is_aa64(env, 3) && | ||
44 | - !(env->cp15.scr_el3 & SCR_NS)); | ||
45 | - | ||
46 | - return ret; | ||
47 | -} | ||
48 | +bool access_secure_reg(CPUARMState *env); | ||
49 | |||
50 | uint32_t arm_phys_excp_target_el(CPUState *cs, uint32_t excp_idx, | ||
51 | uint32_t cur_el, bool secure); | ||
52 | diff --git a/target/arm/tcg/hflags.c b/target/arm/tcg/hflags.c | ||
53 | index XXXXXXX..XXXXXXX 100644 | ||
54 | --- a/target/arm/tcg/hflags.c | ||
55 | +++ b/target/arm/tcg/hflags.c | ||
56 | @@ -XXX,XX +XXX,XX @@ static bool aprofile_require_alignment(CPUARMState *env, int el, uint64_t sctlr) | ||
57 | #endif | ||
58 | } | ||
59 | |||
60 | +bool access_secure_reg(CPUARMState *env) | ||
61 | +{ | ||
62 | + bool ret = (arm_feature(env, ARM_FEATURE_EL3) && | ||
63 | + !arm_el_is_aa64(env, 3) && | ||
64 | + !(env->cp15.scr_el3 & SCR_NS)); | ||
65 | + | ||
66 | + return ret; | ||
67 | +} | ||
68 | + | ||
69 | static CPUARMTBFlags rebuild_hflags_common(CPUARMState *env, int fp_el, | ||
70 | ARMMMUIdx mmu_idx, | ||
71 | CPUARMTBFlags flags) | ||
72 | -- | ||
73 | 2.43.0 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | At the top of linux-user/aarch64/cpu_loop.c we define a set of | ||
2 | macros for reading and writing data and code words, but we never | ||
3 | use these macros. Delete them. | ||
1 | 4 | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
7 | --- | ||
8 | linux-user/aarch64/cpu_loop.c | 48 ----------------------------------- | ||
9 | 1 file changed, 48 deletions(-) | ||
10 | |||
11 | diff --git a/linux-user/aarch64/cpu_loop.c b/linux-user/aarch64/cpu_loop.c | ||
12 | index XXXXXXX..XXXXXXX 100644 | ||
13 | --- a/linux-user/aarch64/cpu_loop.c | ||
14 | +++ b/linux-user/aarch64/cpu_loop.c | ||
15 | @@ -XXX,XX +XXX,XX @@ | ||
16 | #include "target/arm/syndrome.h" | ||
17 | #include "target/arm/cpu-features.h" | ||
18 | |||
19 | -#define get_user_code_u32(x, gaddr, env) \ | ||
20 | - ({ abi_long __r = get_user_u32((x), (gaddr)); \ | ||
21 | - if (!__r && bswap_code(arm_sctlr_b(env))) { \ | ||
22 | - (x) = bswap32(x); \ | ||
23 | - } \ | ||
24 | - __r; \ | ||
25 | - }) | ||
26 | - | ||
27 | -#define get_user_code_u16(x, gaddr, env) \ | ||
28 | - ({ abi_long __r = get_user_u16((x), (gaddr)); \ | ||
29 | - if (!__r && bswap_code(arm_sctlr_b(env))) { \ | ||
30 | - (x) = bswap16(x); \ | ||
31 | - } \ | ||
32 | - __r; \ | ||
33 | - }) | ||
34 | - | ||
35 | -#define get_user_data_u32(x, gaddr, env) \ | ||
36 | - ({ abi_long __r = get_user_u32((x), (gaddr)); \ | ||
37 | - if (!__r && arm_cpu_bswap_data(env)) { \ | ||
38 | - (x) = bswap32(x); \ | ||
39 | - } \ | ||
40 | - __r; \ | ||
41 | - }) | ||
42 | - | ||
43 | -#define get_user_data_u16(x, gaddr, env) \ | ||
44 | - ({ abi_long __r = get_user_u16((x), (gaddr)); \ | ||
45 | - if (!__r && arm_cpu_bswap_data(env)) { \ | ||
46 | - (x) = bswap16(x); \ | ||
47 | - } \ | ||
48 | - __r; \ | ||
49 | - }) | ||
50 | - | ||
51 | -#define put_user_data_u32(x, gaddr, env) \ | ||
52 | - ({ typeof(x) __x = (x); \ | ||
53 | - if (arm_cpu_bswap_data(env)) { \ | ||
54 | - __x = bswap32(__x); \ | ||
55 | - } \ | ||
56 | - put_user_u32(__x, (gaddr)); \ | ||
57 | - }) | ||
58 | - | ||
59 | -#define put_user_data_u16(x, gaddr, env) \ | ||
60 | - ({ typeof(x) __x = (x); \ | ||
61 | - if (arm_cpu_bswap_data(env)) { \ | ||
62 | - __x = bswap16(__x); \ | ||
63 | - } \ | ||
64 | - put_user_u16(__x, (gaddr)); \ | ||
65 | - }) | ||
66 | - | ||
67 | /* AArch64 main loop */ | ||
68 | void cpu_loop(CPUARMState *env) | ||
69 | { | ||
70 | -- | ||
71 | 2.43.0 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | In linux-user/arm/cpu_loop.c we define a full set of get/put | ||
2 | macros for both code and data (since the endianness handling | ||
3 | is different between the two). However the only one we actually | ||
4 | use is get_user_code_u32(). Remove the rest. | ||
1 | 5 | ||
6 | We leave a comment noting how data-side accesses should be handled | ||
7 | for big-endian, because that's a subtle point and we just removed the | ||
8 | macros that were effectively documenting it. | ||
9 | |||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
12 | --- | ||
13 | linux-user/arm/cpu_loop.c | 43 ++++----------------------------------- | ||
14 | 1 file changed, 4 insertions(+), 39 deletions(-) | ||
15 | |||
16 | diff --git a/linux-user/arm/cpu_loop.c b/linux-user/arm/cpu_loop.c | ||
17 | index XXXXXXX..XXXXXXX 100644 | ||
18 | --- a/linux-user/arm/cpu_loop.c | ||
19 | +++ b/linux-user/arm/cpu_loop.c | ||
20 | @@ -XXX,XX +XXX,XX @@ | ||
21 | __r; \ | ||
22 | }) | ||
23 | |||
24 | -#define get_user_code_u16(x, gaddr, env) \ | ||
25 | - ({ abi_long __r = get_user_u16((x), (gaddr)); \ | ||
26 | - if (!__r && bswap_code(arm_sctlr_b(env))) { \ | ||
27 | - (x) = bswap16(x); \ | ||
28 | - } \ | ||
29 | - __r; \ | ||
30 | - }) | ||
31 | - | ||
32 | -#define get_user_data_u32(x, gaddr, env) \ | ||
33 | - ({ abi_long __r = get_user_u32((x), (gaddr)); \ | ||
34 | - if (!__r && arm_cpu_bswap_data(env)) { \ | ||
35 | - (x) = bswap32(x); \ | ||
36 | - } \ | ||
37 | - __r; \ | ||
38 | - }) | ||
39 | - | ||
40 | -#define get_user_data_u16(x, gaddr, env) \ | ||
41 | - ({ abi_long __r = get_user_u16((x), (gaddr)); \ | ||
42 | - if (!__r && arm_cpu_bswap_data(env)) { \ | ||
43 | - (x) = bswap16(x); \ | ||
44 | - } \ | ||
45 | - __r; \ | ||
46 | - }) | ||
47 | - | ||
48 | -#define put_user_data_u32(x, gaddr, env) \ | ||
49 | - ({ typeof(x) __x = (x); \ | ||
50 | - if (arm_cpu_bswap_data(env)) { \ | ||
51 | - __x = bswap32(__x); \ | ||
52 | - } \ | ||
53 | - put_user_u32(__x, (gaddr)); \ | ||
54 | - }) | ||
55 | - | ||
56 | -#define put_user_data_u16(x, gaddr, env) \ | ||
57 | - ({ typeof(x) __x = (x); \ | ||
58 | - if (arm_cpu_bswap_data(env)) { \ | ||
59 | - __x = bswap16(__x); \ | ||
60 | - } \ | ||
61 | - put_user_u16(__x, (gaddr)); \ | ||
62 | - }) | ||
63 | +/* | ||
64 | + * Note that if we need to do data accesses here, they should do a | ||
65 | + * bswap if arm_cpu_bswap_data() returns true. | ||
66 | + */ | ||
67 | |||
68 | /* | ||
69 | * Similar to code in accel/tcg/user-exec.c, but outside the execution loop. | ||
70 | -- | ||
71 | 2.43.0 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | The arm_cpu_data_is_big_endian() and related functions are now used | ||
2 | only in target/arm; they can be moved to internals.h. | ||
1 | 3 | ||
4 | The motivation here is that we would like to move arm_current_el() | ||
5 | to internals.h. | ||
6 | |||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | --- | ||
10 | target/arm/cpu.h | 48 ------------------------------------------ | ||
11 | target/arm/internals.h | 48 ++++++++++++++++++++++++++++++++++++++++++ | ||
12 | 2 files changed, 48 insertions(+), 48 deletions(-) | ||
13 | |||
14 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/target/arm/cpu.h | ||
17 | +++ b/target/arm/cpu.h | ||
18 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_sctlr_b(CPUARMState *env) | ||
19 | |||
20 | uint64_t arm_sctlr(CPUARMState *env, int el); | ||
21 | |||
22 | -static inline bool arm_cpu_data_is_big_endian_a32(CPUARMState *env, | ||
23 | - bool sctlr_b) | ||
24 | -{ | ||
25 | -#ifdef CONFIG_USER_ONLY | ||
26 | - /* | ||
27 | - * In system mode, BE32 is modelled in line with the | ||
28 | - * architecture (as word-invariant big-endianness), where loads | ||
29 | - * and stores are done little endian but from addresses which | ||
30 | - * are adjusted by XORing with the appropriate constant. So the | ||
31 | - * endianness to use for the raw data access is not affected by | ||
32 | - * SCTLR.B. | ||
33 | - * In user mode, however, we model BE32 as byte-invariant | ||
34 | - * big-endianness (because user-only code cannot tell the | ||
35 | - * difference), and so we need to use a data access endianness | ||
36 | - * that depends on SCTLR.B. | ||
37 | - */ | ||
38 | - if (sctlr_b) { | ||
39 | - return true; | ||
40 | - } | ||
41 | -#endif | ||
42 | - /* In 32bit endianness is determined by looking at CPSR's E bit */ | ||
43 | - return env->uncached_cpsr & CPSR_E; | ||
44 | -} | ||
45 | - | ||
46 | -static inline bool arm_cpu_data_is_big_endian_a64(int el, uint64_t sctlr) | ||
47 | -{ | ||
48 | - return sctlr & (el ? SCTLR_EE : SCTLR_E0E); | ||
49 | -} | ||
50 | - | ||
51 | -/* Return true if the processor is in big-endian mode. */ | ||
52 | -static inline bool arm_cpu_data_is_big_endian(CPUARMState *env) | ||
53 | -{ | ||
54 | - if (!is_a64(env)) { | ||
55 | - return arm_cpu_data_is_big_endian_a32(env, arm_sctlr_b(env)); | ||
56 | - } else { | ||
57 | - int cur_el = arm_current_el(env); | ||
58 | - uint64_t sctlr = arm_sctlr(env, cur_el); | ||
59 | - return arm_cpu_data_is_big_endian_a64(cur_el, sctlr); | ||
60 | - } | ||
61 | -} | ||
62 | - | ||
63 | #include "exec/cpu-all.h" | ||
64 | |||
65 | /* | ||
66 | @@ -XXX,XX +XXX,XX @@ static inline bool bswap_code(bool sctlr_b) | ||
67 | #endif | ||
68 | } | ||
69 | |||
70 | -#ifdef CONFIG_USER_ONLY | ||
71 | -static inline bool arm_cpu_bswap_data(CPUARMState *env) | ||
72 | -{ | ||
73 | - return TARGET_BIG_ENDIAN ^ arm_cpu_data_is_big_endian(env); | ||
74 | -} | ||
75 | -#endif | ||
76 | - | ||
77 | void cpu_get_tb_cpu_state(CPUARMState *env, vaddr *pc, | ||
78 | uint64_t *cs_base, uint32_t *flags); | ||
79 | |||
80 | diff --git a/target/arm/internals.h b/target/arm/internals.h | ||
81 | index XXXXXXX..XXXXXXX 100644 | ||
82 | --- a/target/arm/internals.h | ||
83 | +++ b/target/arm/internals.h | ||
84 | @@ -XXX,XX +XXX,XX @@ static inline FloatRoundMode arm_rmode_to_sf(ARMFPRounding rmode) | ||
85 | return arm_rmode_to_sf_map[rmode]; | ||
86 | } | ||
87 | |||
88 | +static inline bool arm_cpu_data_is_big_endian_a32(CPUARMState *env, | ||
89 | + bool sctlr_b) | ||
90 | +{ | ||
91 | +#ifdef CONFIG_USER_ONLY | ||
92 | + /* | ||
93 | + * In system mode, BE32 is modelled in line with the | ||
94 | + * architecture (as word-invariant big-endianness), where loads | ||
95 | + * and stores are done little endian but from addresses which | ||
96 | + * are adjusted by XORing with the appropriate constant. So the | ||
97 | + * endianness to use for the raw data access is not affected by | ||
98 | + * SCTLR.B. | ||
99 | + * In user mode, however, we model BE32 as byte-invariant | ||
100 | + * big-endianness (because user-only code cannot tell the | ||
101 | + * difference), and so we need to use a data access endianness | ||
102 | + * that depends on SCTLR.B. | ||
103 | + */ | ||
104 | + if (sctlr_b) { | ||
105 | + return true; | ||
106 | + } | ||
107 | +#endif | ||
108 | + /* In 32bit endianness is determined by looking at CPSR's E bit */ | ||
109 | + return env->uncached_cpsr & CPSR_E; | ||
110 | +} | ||
111 | + | ||
112 | +static inline bool arm_cpu_data_is_big_endian_a64(int el, uint64_t sctlr) | ||
113 | +{ | ||
114 | + return sctlr & (el ? SCTLR_EE : SCTLR_E0E); | ||
115 | +} | ||
116 | + | ||
117 | +/* Return true if the processor is in big-endian mode. */ | ||
118 | +static inline bool arm_cpu_data_is_big_endian(CPUARMState *env) | ||
119 | +{ | ||
120 | + if (!is_a64(env)) { | ||
121 | + return arm_cpu_data_is_big_endian_a32(env, arm_sctlr_b(env)); | ||
122 | + } else { | ||
123 | + int cur_el = arm_current_el(env); | ||
124 | + uint64_t sctlr = arm_sctlr(env, cur_el); | ||
125 | + return arm_cpu_data_is_big_endian_a64(cur_el, sctlr); | ||
126 | + } | ||
127 | +} | ||
128 | + | ||
129 | +#ifdef CONFIG_USER_ONLY | ||
130 | +static inline bool arm_cpu_bswap_data(CPUARMState *env) | ||
131 | +{ | ||
132 | + return TARGET_BIG_ENDIAN ^ arm_cpu_data_is_big_endian(env); | ||
133 | +} | ||
134 | +#endif | ||
135 | + | ||
136 | static inline void aarch64_save_sp(CPUARMState *env, int el) | ||
137 | { | ||
138 | if (env->pstate & PSTATE_SP) { | ||
139 | -- | ||
140 | 2.43.0 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | 1 | The functions arm_current_el() and arm_el_is_aa64() are used only in | |
2 | target/arm and in hw/intc/arm_gicv3_cpuif.c. They're functions that | ||
3 | query internal state of the CPU. Move them out of cpu.h and into | ||
4 | internals.h. | ||
5 | |||
6 | This means we need to include internals.h in arm_gicv3_cpuif.c, but | ||
7 | this is justifiable because that file is implementing the GICv3 CPU | ||
8 | interface, which really is part of the CPU proper; we just ended up | ||
9 | implementing it in code in hw/intc/ for historical reasons. | ||
10 | |||
11 | The motivation for this move is that we'd like to change | ||
12 | arm_el_is_aa64() to add a condition that uses cpu_isar_feature(); | ||
13 | but we don't want to include cpu-features.h in cpu.h. | ||
14 | |||
15 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
16 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
17 | --- | ||
18 | target/arm/cpu.h | 66 -------------------------------------- | ||
19 | target/arm/internals.h | 67 +++++++++++++++++++++++++++++++++++++++ | ||
20 | hw/intc/arm_gicv3_cpuif.c | 1 + | ||
21 | target/arm/arch_dump.c | 1 + | ||
22 | 4 files changed, 69 insertions(+), 66 deletions(-) | ||
23 | |||
24 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
25 | index XXXXXXX..XXXXXXX 100644 | ||
26 | --- a/target/arm/cpu.h | ||
27 | +++ b/target/arm/cpu.h | ||
28 | @@ -XXX,XX +XXX,XX @@ uint64_t arm_hcr_el2_eff_secstate(CPUARMState *env, ARMSecuritySpace space); | ||
29 | uint64_t arm_hcr_el2_eff(CPUARMState *env); | ||
30 | uint64_t arm_hcrx_el2_eff(CPUARMState *env); | ||
31 | |||
32 | -/* Return true if the specified exception level is running in AArch64 state. */ | ||
33 | -static inline bool arm_el_is_aa64(CPUARMState *env, int el) | ||
34 | -{ | ||
35 | - /* This isn't valid for EL0 (if we're in EL0, is_a64() is what you want, | ||
36 | - * and if we're not in EL0 then the state of EL0 isn't well defined.) | ||
37 | - */ | ||
38 | - assert(el >= 1 && el <= 3); | ||
39 | - bool aa64 = arm_feature(env, ARM_FEATURE_AARCH64); | ||
40 | - | ||
41 | - /* The highest exception level is always at the maximum supported | ||
42 | - * register width, and then lower levels have a register width controlled | ||
43 | - * by bits in the SCR or HCR registers. | ||
44 | - */ | ||
45 | - if (el == 3) { | ||
46 | - return aa64; | ||
47 | - } | ||
48 | - | ||
49 | - if (arm_feature(env, ARM_FEATURE_EL3) && | ||
50 | - ((env->cp15.scr_el3 & SCR_NS) || !(env->cp15.scr_el3 & SCR_EEL2))) { | ||
51 | - aa64 = aa64 && (env->cp15.scr_el3 & SCR_RW); | ||
52 | - } | ||
53 | - | ||
54 | - if (el == 2) { | ||
55 | - return aa64; | ||
56 | - } | ||
57 | - | ||
58 | - if (arm_is_el2_enabled(env)) { | ||
59 | - aa64 = aa64 && (env->cp15.hcr_el2 & HCR_RW); | ||
60 | - } | ||
61 | - | ||
62 | - return aa64; | ||
63 | -} | ||
64 | - | ||
65 | /* | ||
66 | * Function for determining whether guest cp register reads and writes should | ||
67 | * access the secure or non-secure bank of a cp register. When EL3 is | ||
68 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_v7m_is_handler_mode(CPUARMState *env) | ||
69 | return env->v7m.exception != 0; | ||
70 | } | ||
71 | |||
72 | -/* Return the current Exception Level (as per ARMv8; note that this differs | ||
73 | - * from the ARMv7 Privilege Level). | ||
74 | - */ | ||
75 | -static inline int arm_current_el(CPUARMState *env) | ||
76 | -{ | ||
77 | - if (arm_feature(env, ARM_FEATURE_M)) { | ||
78 | - return arm_v7m_is_handler_mode(env) || | ||
79 | - !(env->v7m.control[env->v7m.secure] & 1); | ||
80 | - } | ||
81 | - | ||
82 | - if (is_a64(env)) { | ||
83 | - return extract32(env->pstate, 2, 2); | ||
84 | - } | ||
85 | - | ||
86 | - switch (env->uncached_cpsr & 0x1f) { | ||
87 | - case ARM_CPU_MODE_USR: | ||
88 | - return 0; | ||
89 | - case ARM_CPU_MODE_HYP: | ||
90 | - return 2; | ||
91 | - case ARM_CPU_MODE_MON: | ||
92 | - return 3; | ||
93 | - default: | ||
94 | - if (arm_is_secure(env) && !arm_el_is_aa64(env, 3)) { | ||
95 | - /* If EL3 is 32-bit then all secure privileged modes run in | ||
96 | - * EL3 | ||
97 | - */ | ||
98 | - return 3; | ||
99 | - } | ||
100 | - | ||
101 | - return 1; | ||
102 | - } | ||
103 | -} | ||
104 | - | ||
105 | /** | ||
106 | * write_list_to_cpustate | ||
107 | * @cpu: ARMCPU | ||
108 | diff --git a/target/arm/internals.h b/target/arm/internals.h | ||
109 | index XXXXXXX..XXXXXXX 100644 | ||
110 | --- a/target/arm/internals.h | ||
111 | +++ b/target/arm/internals.h | ||
112 | @@ -XXX,XX +XXX,XX @@ static inline FloatRoundMode arm_rmode_to_sf(ARMFPRounding rmode) | ||
113 | return arm_rmode_to_sf_map[rmode]; | ||
114 | } | ||
115 | |||
116 | +/* Return true if the specified exception level is running in AArch64 state. */ | ||
117 | +static inline bool arm_el_is_aa64(CPUARMState *env, int el) | ||
118 | +{ | ||
119 | + /* | ||
120 | + * This isn't valid for EL0 (if we're in EL0, is_a64() is what you want, | ||
121 | + * and if we're not in EL0 then the state of EL0 isn't well defined.) | ||
122 | + */ | ||
123 | + assert(el >= 1 && el <= 3); | ||
124 | + bool aa64 = arm_feature(env, ARM_FEATURE_AARCH64); | ||
125 | + | ||
126 | + /* | ||
127 | + * The highest exception level is always at the maximum supported | ||
128 | + * register width, and then lower levels have a register width controlled | ||
129 | + * by bits in the SCR or HCR registers. | ||
130 | + */ | ||
131 | + if (el == 3) { | ||
132 | + return aa64; | ||
133 | + } | ||
134 | + | ||
135 | + if (arm_feature(env, ARM_FEATURE_EL3) && | ||
136 | + ((env->cp15.scr_el3 & SCR_NS) || !(env->cp15.scr_el3 & SCR_EEL2))) { | ||
137 | + aa64 = aa64 && (env->cp15.scr_el3 & SCR_RW); | ||
138 | + } | ||
139 | + | ||
140 | + if (el == 2) { | ||
141 | + return aa64; | ||
142 | + } | ||
143 | + | ||
144 | + if (arm_is_el2_enabled(env)) { | ||
145 | + aa64 = aa64 && (env->cp15.hcr_el2 & HCR_RW); | ||
146 | + } | ||
147 | + | ||
148 | + return aa64; | ||
149 | +} | ||
150 | + | ||
151 | +/* | ||
152 | + * Return the current Exception Level (as per ARMv8; note that this differs | ||
153 | + * from the ARMv7 Privilege Level). | ||
154 | + */ | ||
155 | +static inline int arm_current_el(CPUARMState *env) | ||
156 | +{ | ||
157 | + if (arm_feature(env, ARM_FEATURE_M)) { | ||
158 | + return arm_v7m_is_handler_mode(env) || | ||
159 | + !(env->v7m.control[env->v7m.secure] & 1); | ||
160 | + } | ||
161 | + | ||
162 | + if (is_a64(env)) { | ||
163 | + return extract32(env->pstate, 2, 2); | ||
164 | + } | ||
165 | + | ||
166 | + switch (env->uncached_cpsr & 0x1f) { | ||
167 | + case ARM_CPU_MODE_USR: | ||
168 | + return 0; | ||
169 | + case ARM_CPU_MODE_HYP: | ||
170 | + return 2; | ||
171 | + case ARM_CPU_MODE_MON: | ||
172 | + return 3; | ||
173 | + default: | ||
174 | + if (arm_is_secure(env) && !arm_el_is_aa64(env, 3)) { | ||
175 | + /* If EL3 is 32-bit then all secure privileged modes run in EL3 */ | ||
176 | + return 3; | ||
177 | + } | ||
178 | + | ||
179 | + return 1; | ||
180 | + } | ||
181 | +} | ||
182 | + | ||
183 | static inline bool arm_cpu_data_is_big_endian_a32(CPUARMState *env, | ||
184 | bool sctlr_b) | ||
185 | { | ||
186 | diff --git a/hw/intc/arm_gicv3_cpuif.c b/hw/intc/arm_gicv3_cpuif.c | ||
187 | index XXXXXXX..XXXXXXX 100644 | ||
188 | --- a/hw/intc/arm_gicv3_cpuif.c | ||
189 | +++ b/hw/intc/arm_gicv3_cpuif.c | ||
190 | @@ -XXX,XX +XXX,XX @@ | ||
191 | #include "cpu.h" | ||
192 | #include "target/arm/cpregs.h" | ||
193 | #include "target/arm/cpu-features.h" | ||
194 | +#include "target/arm/internals.h" | ||
195 | #include "system/tcg.h" | ||
196 | #include "system/qtest.h" | ||
197 | |||
198 | diff --git a/target/arm/arch_dump.c b/target/arm/arch_dump.c | ||
199 | index XXXXXXX..XXXXXXX 100644 | ||
200 | --- a/target/arm/arch_dump.c | ||
201 | +++ b/target/arm/arch_dump.c | ||
202 | @@ -XXX,XX +XXX,XX @@ | ||
203 | #include "elf.h" | ||
204 | #include "system/dump.h" | ||
205 | #include "cpu-features.h" | ||
206 | +#include "internals.h" | ||
207 | |||
208 | /* struct user_pt_regs from arch/arm64/include/uapi/asm/ptrace.h */ | ||
209 | struct aarch64_user_regs { | ||
210 | -- | ||
211 | 2.43.0 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | The definition of SCR_EL3.RW says that its effective value is 1 if: | ||
2 | - EL2 is implemented and does not support AArch32, and SCR_EL3.NS is 1 | ||
3 | - the effective value of SCR_EL3.{EEL2,NS} is {1,0} (i.e. we are | ||
4 | Secure and Secure EL2 is disabled) | ||
1 | 5 | ||
6 | We implement the second of these in arm_el_is_aa64(), but forgot the | ||
7 | first. | ||
8 | |||
9 | Provide a new function arm_scr_rw_eff() to return the effective | ||
10 | value of SCR_EL3.RW, and use it in arm_el_is_aa64() and the other | ||
11 | places that currently look directly at the bit value. | ||
12 | |||
13 | (scr_write() enforces that the RW bit is RAO/WI if neither EL1 nor | ||
14 | EL2 have AArch32 support, but if EL1 does but EL2 does not then the | ||
15 | bit must still be writeable.) | ||
16 | |||
17 | This will mean that if code at EL3 attempts to perform an exception | ||
18 | return to AArch32 EL2 when EL2 is AArch64-only we will correctly | ||
19 | handle this as an illegal exception return: it will be caught by the | ||
20 | "return to an EL which is configured for a different register width" | ||
21 | check in HELPER(exception_return). | ||
22 | |||
23 | We do already have some CPU types which don't implement AArch32 | ||
24 | above EL0, so this is technically a bug; it doesn't seem worth | ||
25 | backporting to stable because no sensible guest code will be | ||
26 | deliberately attempting to set the RW bit to a value corresponding | ||
27 | to an unimplemented execution state and then checking that we | ||
28 | did the right thing. | ||
29 | |||
30 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
31 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
32 | --- | ||
33 | target/arm/internals.h | 26 +++++++++++++++++++++++--- | ||
34 | target/arm/helper.c | 4 ++-- | ||
35 | 2 files changed, 25 insertions(+), 5 deletions(-) | ||
36 | |||
37 | diff --git a/target/arm/internals.h b/target/arm/internals.h | ||
38 | index XXXXXXX..XXXXXXX 100644 | ||
39 | --- a/target/arm/internals.h | ||
40 | +++ b/target/arm/internals.h | ||
41 | @@ -XXX,XX +XXX,XX @@ static inline FloatRoundMode arm_rmode_to_sf(ARMFPRounding rmode) | ||
42 | return arm_rmode_to_sf_map[rmode]; | ||
43 | } | ||
44 | |||
45 | +/* Return the effective value of SCR_EL3.RW */ | ||
46 | +static inline bool arm_scr_rw_eff(CPUARMState *env) | ||
47 | +{ | ||
48 | + /* | ||
49 | + * SCR_EL3.RW has an effective value of 1 if: | ||
50 | + * - we are NS and EL2 is implemented but doesn't support AArch32 | ||
51 | + * - we are S and EL2 is enabled (in which case it must be AArch64) | ||
52 | + */ | ||
53 | + ARMCPU *cpu = env_archcpu(env); | ||
54 | + | ||
55 | + if (env->cp15.scr_el3 & SCR_RW) { | ||
56 | + return true; | ||
57 | + } | ||
58 | + if (env->cp15.scr_el3 & SCR_NS) { | ||
59 | + return arm_feature(env, ARM_FEATURE_EL2) && | ||
60 | + !cpu_isar_feature(aa64_aa32_el2, cpu); | ||
61 | + } else { | ||
62 | + return env->cp15.scr_el3 & SCR_EEL2; | ||
63 | + } | ||
64 | +} | ||
65 | + | ||
66 | /* Return true if the specified exception level is running in AArch64 state. */ | ||
67 | static inline bool arm_el_is_aa64(CPUARMState *env, int el) | ||
68 | { | ||
69 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_el_is_aa64(CPUARMState *env, int el) | ||
70 | return aa64; | ||
71 | } | ||
72 | |||
73 | - if (arm_feature(env, ARM_FEATURE_EL3) && | ||
74 | - ((env->cp15.scr_el3 & SCR_NS) || !(env->cp15.scr_el3 & SCR_EEL2))) { | ||
75 | - aa64 = aa64 && (env->cp15.scr_el3 & SCR_RW); | ||
76 | + if (arm_feature(env, ARM_FEATURE_EL3)) { | ||
77 | + aa64 = aa64 && arm_scr_rw_eff(env); | ||
78 | } | ||
79 | |||
80 | if (el == 2) { | ||
81 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
82 | index XXXXXXX..XXXXXXX 100644 | ||
83 | --- a/target/arm/helper.c | ||
84 | +++ b/target/arm/helper.c | ||
85 | @@ -XXX,XX +XXX,XX @@ uint32_t arm_phys_excp_target_el(CPUState *cs, uint32_t excp_idx, | ||
86 | uint64_t hcr_el2; | ||
87 | |||
88 | if (arm_feature(env, ARM_FEATURE_EL3)) { | ||
89 | - rw = ((env->cp15.scr_el3 & SCR_RW) == SCR_RW); | ||
90 | + rw = arm_scr_rw_eff(env); | ||
91 | } else { | ||
92 | /* | ||
93 | * Either EL2 is the highest EL (and so the EL2 register width | ||
94 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_do_interrupt_aarch64(CPUState *cs) | ||
95 | |||
96 | switch (new_el) { | ||
97 | case 3: | ||
98 | - is_aa64 = (env->cp15.scr_el3 & SCR_RW) != 0; | ||
99 | + is_aa64 = arm_scr_rw_eff(env); | ||
100 | break; | ||
101 | case 2: | ||
102 | hcr = arm_hcr_el2_eff(env); | ||
103 | -- | ||
104 | 2.43.0 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | When EL1 doesn't support AArch32, the HCR_EL2.RW bit is supposed to | ||
2 | be RAO/WI. Enforce the RAO/WI behaviour. | ||
1 | 3 | ||
4 | Note that we handle "reset value should honour RES1 bits" in the same | ||
5 | way that SCR_EL3 does, via a reset function. | ||
6 | |||
7 | We do already have some CPU types which don't implement AArch32 | ||
8 | above EL0, so this is technically a bug; it doesn't seem worth | ||
9 | backporting to stable because no sensible guest code will be | ||
10 | deliberately attempting to set the RW bit to a value corresponding | ||
11 | to an unimplemented execution state and then checking that we | ||
12 | did the right thing. | ||
13 | |||
14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
15 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
16 | --- | ||
17 | target/arm/helper.c | 12 ++++++++++++ | ||
18 | 1 file changed, 12 insertions(+) | ||
19 | |||
20 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
21 | index XXXXXXX..XXXXXXX 100644 | ||
22 | --- a/target/arm/helper.c | ||
23 | +++ b/target/arm/helper.c | ||
24 | @@ -XXX,XX +XXX,XX @@ static void do_hcr_write(CPUARMState *env, uint64_t value, uint64_t valid_mask) | ||
25 | /* Clear RES0 bits. */ | ||
26 | value &= valid_mask; | ||
27 | |||
28 | + /* RW is RAO/WI if EL1 is AArch64 only */ | ||
29 | + if (!cpu_isar_feature(aa64_aa32_el1, cpu)) { | ||
30 | + value |= HCR_RW; | ||
31 | + } | ||
32 | + | ||
33 | /* | ||
34 | * These bits change the MMU setup: | ||
35 | * HCR_VM enables stage 2 translation | ||
36 | @@ -XXX,XX +XXX,XX @@ static void hcr_writelow(CPUARMState *env, const ARMCPRegInfo *ri, | ||
37 | do_hcr_write(env, value, MAKE_64BIT_MASK(32, 32)); | ||
38 | } | ||
39 | |||
40 | +static void hcr_reset(CPUARMState *env, const ARMCPRegInfo *ri) | ||
41 | +{ | ||
42 | + /* hcr_write will set the RES1 bits on an AArch64-only CPU */ | ||
43 | + hcr_write(env, ri, 0); | ||
44 | +} | ||
45 | + | ||
46 | /* | ||
47 | * Return the effective value of HCR_EL2, at the given security state. | ||
48 | * Bits that are not included here: | ||
49 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo el2_cp_reginfo[] = { | ||
50 | .opc0 = 3, .opc1 = 4, .crn = 1, .crm = 1, .opc2 = 0, | ||
51 | .access = PL2_RW, .fieldoffset = offsetof(CPUARMState, cp15.hcr_el2), | ||
52 | .nv2_redirect_offset = 0x78, | ||
53 | + .resetfn = hcr_reset, | ||
54 | .writefn = hcr_write, .raw_writefn = raw_write }, | ||
55 | { .name = "HCR", .state = ARM_CP_STATE_AA32, | ||
56 | .type = ARM_CP_ALIAS | ARM_CP_IO, | ||
57 | -- | ||
58 | 2.43.0 | diff view generated by jsdifflib |
1 | From: "Emilio G. Cota" <cota@braap.org> | 1 | We already call env_archcpu() multiple times within the |
---|---|---|---|
2 | exception_return helper function, and we're about to want to | ||
3 | add another use of the ARMCPU pointer. Add a local variable | ||
4 | cpu so we can call env_archcpu() just once. | ||
2 | 5 | ||
3 | Fixes the following warning when compiling with gcc 5.4.0 with -O1 | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
4 | optimizations and --enable-debug: | 7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
8 | --- | ||
9 | target/arm/tcg/helper-a64.c | 7 ++++--- | ||
10 | 1 file changed, 4 insertions(+), 3 deletions(-) | ||
5 | 11 | ||
6 | target/arm/translate-a64.c: In function ‘aarch64_tr_translate_insn’: | 12 | diff --git a/target/arm/tcg/helper-a64.c b/target/arm/tcg/helper-a64.c |
7 | target/arm/translate-a64.c:2361:8: error: ‘post_index’ may be used uninitialized in this function [-Werror=maybe-uninitialized] | ||
8 | if (!post_index) { | ||
9 | ^ | ||
10 | target/arm/translate-a64.c:2307:10: note: ‘post_index’ was declared here | ||
11 | bool post_index; | ||
12 | ^ | ||
13 | target/arm/translate-a64.c:2386:8: error: ‘writeback’ may be used uninitialized in this function [-Werror=maybe-uninitialized] | ||
14 | if (writeback) { | ||
15 | ^ | ||
16 | target/arm/translate-a64.c:2308:10: note: ‘writeback’ was declared here | ||
17 | bool writeback; | ||
18 | ^ | ||
19 | |||
20 | Note that idx comes from selecting 2 bits, and therefore its value | ||
21 | can be at most 3. | ||
22 | |||
23 | Signed-off-by: Emilio G. Cota <cota@braap.org> | ||
24 | Acked-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
25 | Message-id: 1510087611-1851-1-git-send-email-cota@braap.org | ||
26 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
27 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
28 | --- | ||
29 | target/arm/translate-a64.c | 2 ++ | ||
30 | 1 file changed, 2 insertions(+) | ||
31 | |||
32 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c | ||
33 | index XXXXXXX..XXXXXXX 100644 | 13 | index XXXXXXX..XXXXXXX 100644 |
34 | --- a/target/arm/translate-a64.c | 14 | --- a/target/arm/tcg/helper-a64.c |
35 | +++ b/target/arm/translate-a64.c | 15 | +++ b/target/arm/tcg/helper-a64.c |
36 | @@ -XXX,XX +XXX,XX @@ static void disas_ldst_reg_imm9(DisasContext *s, uint32_t insn, | 16 | @@ -XXX,XX +XXX,XX @@ static void cpsr_write_from_spsr_elx(CPUARMState *env, |
37 | post_index = false; | 17 | |
38 | writeback = true; | 18 | void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc) |
39 | break; | 19 | { |
40 | + default: | 20 | + ARMCPU *cpu = env_archcpu(env); |
41 | + g_assert_not_reached(); | 21 | int cur_el = arm_current_el(env); |
22 | unsigned int spsr_idx = aarch64_banked_spsr_index(cur_el); | ||
23 | uint32_t spsr = env->banked_spsr[spsr_idx]; | ||
24 | @@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc) | ||
42 | } | 25 | } |
43 | 26 | ||
44 | if (rn == 31) { | 27 | bql_lock(); |
28 | - arm_call_pre_el_change_hook(env_archcpu(env)); | ||
29 | + arm_call_pre_el_change_hook(cpu); | ||
30 | bql_unlock(); | ||
31 | |||
32 | if (!return_to_aa64) { | ||
33 | @@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc) | ||
34 | int tbii; | ||
35 | |||
36 | env->aarch64 = true; | ||
37 | - spsr &= aarch64_pstate_valid_mask(&env_archcpu(env)->isar); | ||
38 | + spsr &= aarch64_pstate_valid_mask(&cpu->isar); | ||
39 | pstate_write(env, spsr); | ||
40 | if (!arm_singlestep_active(env)) { | ||
41 | env->pstate &= ~PSTATE_SS; | ||
42 | @@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc) | ||
43 | aarch64_sve_change_el(env, cur_el, new_el, return_to_aa64); | ||
44 | |||
45 | bql_lock(); | ||
46 | - arm_call_el_change_hook(env_archcpu(env)); | ||
47 | + arm_call_el_change_hook(cpu); | ||
48 | bql_unlock(); | ||
49 | |||
50 | return; | ||
45 | -- | 51 | -- |
46 | 2.7.4 | 52 | 2.43.0 |
47 | |||
48 | diff view generated by jsdifflib |
1 | From: Alistair Francis <alistair.francis@xilinx.com> | 1 | In the Arm ARM, rule R_TYTWB states that returning to AArch32 |
---|---|---|---|
2 | is an illegal exception return if: | ||
3 | * AArch32 is not supported at any exception level | ||
4 | * the target EL is configured for AArch64 via SCR_EL3.RW | ||
5 | or HCR_EL2.RW or via CPU state at reset | ||
2 | 6 | ||
3 | Allow the -smp command line option to control the number of CPUs we | 7 | We check the second of these, but not the first (which can only be |
4 | create. | 8 | relevant for the case of a return to EL0, because if AArch32 is not |
9 | supported at one of the higher ELs then the RW bits will have an | ||
10 | effective value of 1 and the the "configured for AArch64" condition | ||
11 | will hold also). | ||
5 | 12 | ||
6 | Signed-off-by: Alistair Francis <alistair.francis@xilinx.com> | 13 | Add the missing condition. Although this is technically a bug |
7 | Reviewed-by: Eduardo Habkost <ehabkost@redhat.com> | 14 | (because we have one AArch64-only CPU: a64fx) it isn't worth |
8 | Reviewed-by: Emilio G. Cota <cota@braap.org> | 15 | backporting to stable because no sensible guest code will |
9 | Tested-by: Emilio G. Cota <cota@braap.org> | 16 | deliberately try to return to a nonexistent execution state |
10 | Message-id: 1510343626-25861-3-git-send-email-cota@braap.org | 17 | to check that it gets an illegal exception return. |
18 | |||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 19 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
20 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
12 | --- | 21 | --- |
13 | hw/arm/xlnx-zcu102.c | 3 ++- | 22 | target/arm/tcg/helper-a64.c | 5 +++++ |
14 | hw/arm/xlnx-zynqmp.c | 26 ++++++++++++++++---------- | 23 | 1 file changed, 5 insertions(+) |
15 | 2 files changed, 18 insertions(+), 11 deletions(-) | ||
16 | 24 | ||
17 | diff --git a/hw/arm/xlnx-zcu102.c b/hw/arm/xlnx-zcu102.c | 25 | diff --git a/target/arm/tcg/helper-a64.c b/target/arm/tcg/helper-a64.c |
18 | index XXXXXXX..XXXXXXX 100644 | 26 | index XXXXXXX..XXXXXXX 100644 |
19 | --- a/hw/arm/xlnx-zcu102.c | 27 | --- a/target/arm/tcg/helper-a64.c |
20 | +++ b/hw/arm/xlnx-zcu102.c | 28 | +++ b/target/arm/tcg/helper-a64.c |
21 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zcu102_machine_class_init(ObjectClass *oc, void *data) | 29 | @@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc) |
22 | { | 30 | goto illegal_return; |
23 | MachineClass *mc = MACHINE_CLASS(oc); | ||
24 | |||
25 | - mc->desc = "Xilinx ZynqMP ZCU102 board"; | ||
26 | + mc->desc = "Xilinx ZynqMP ZCU102 board with 4xA53s and 2xR5s based on " \ | ||
27 | + "the value of smp"; | ||
28 | mc->init = xlnx_zcu102_init; | ||
29 | mc->block_default_type = IF_IDE; | ||
30 | mc->units_per_default_bus = 1; | ||
31 | diff --git a/hw/arm/xlnx-zynqmp.c b/hw/arm/xlnx-zynqmp.c | ||
32 | index XXXXXXX..XXXXXXX 100644 | ||
33 | --- a/hw/arm/xlnx-zynqmp.c | ||
34 | +++ b/hw/arm/xlnx-zynqmp.c | ||
35 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_create_rpu(XlnxZynqMPState *s, const char *boot_cpu, | ||
36 | { | ||
37 | Error *err = NULL; | ||
38 | int i; | ||
39 | + int num_rpus = MIN(smp_cpus - XLNX_ZYNQMP_NUM_APU_CPUS, XLNX_ZYNQMP_NUM_RPU_CPUS); | ||
40 | |||
41 | - for (i = 0; i < XLNX_ZYNQMP_NUM_RPU_CPUS; i++) { | ||
42 | + for (i = 0; i < num_rpus; i++) { | ||
43 | char *name; | ||
44 | |||
45 | object_initialize(&s->rpu_cpu[i], sizeof(s->rpu_cpu[i]), | ||
46 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_init(Object *obj) | ||
47 | { | ||
48 | XlnxZynqMPState *s = XLNX_ZYNQMP(obj); | ||
49 | int i; | ||
50 | + int num_apus = MIN(smp_cpus, XLNX_ZYNQMP_NUM_APU_CPUS); | ||
51 | |||
52 | - for (i = 0; i < XLNX_ZYNQMP_NUM_APU_CPUS; i++) { | ||
53 | + for (i = 0; i < num_apus; i++) { | ||
54 | object_initialize(&s->apu_cpu[i], sizeof(s->apu_cpu[i]), | ||
55 | "cortex-a53-" TYPE_ARM_CPU); | ||
56 | object_property_add_child(obj, "apu-cpu[*]", OBJECT(&s->apu_cpu[i]), | ||
57 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) | ||
58 | MemoryRegion *system_memory = get_system_memory(); | ||
59 | uint8_t i; | ||
60 | uint64_t ram_size; | ||
61 | + int num_apus = MIN(smp_cpus, XLNX_ZYNQMP_NUM_APU_CPUS); | ||
62 | const char *boot_cpu = s->boot_cpu ? s->boot_cpu : "apu-cpu[0]"; | ||
63 | ram_addr_t ddr_low_size, ddr_high_size; | ||
64 | qemu_irq gic_spi[GIC_NUM_SPI_INTR]; | ||
65 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) | ||
66 | |||
67 | qdev_prop_set_uint32(DEVICE(&s->gic), "num-irq", GIC_NUM_SPI_INTR + 32); | ||
68 | qdev_prop_set_uint32(DEVICE(&s->gic), "revision", 2); | ||
69 | - qdev_prop_set_uint32(DEVICE(&s->gic), "num-cpu", XLNX_ZYNQMP_NUM_APU_CPUS); | ||
70 | + qdev_prop_set_uint32(DEVICE(&s->gic), "num-cpu", num_apus); | ||
71 | |||
72 | /* Realize APUs before realizing the GIC. KVM requires this. */ | ||
73 | - for (i = 0; i < XLNX_ZYNQMP_NUM_APU_CPUS; i++) { | ||
74 | + for (i = 0; i < num_apus; i++) { | ||
75 | char *name; | ||
76 | |||
77 | object_property_set_int(OBJECT(&s->apu_cpu[i]), QEMU_PSCI_CONDUIT_SMC, | ||
78 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) | ||
79 | } | ||
80 | } | 31 | } |
81 | 32 | ||
82 | - for (i = 0; i < XLNX_ZYNQMP_NUM_APU_CPUS; i++) { | 33 | + if (!return_to_aa64 && !cpu_isar_feature(aa64_aa32, cpu)) { |
83 | + for (i = 0; i < num_apus; i++) { | 34 | + /* Return to AArch32 when CPU is AArch64-only */ |
84 | qemu_irq irq; | 35 | + goto illegal_return; |
85 | |||
86 | sysbus_connect_irq(SYS_BUS_DEVICE(&s->gic), i, | ||
87 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) | ||
88 | } | ||
89 | |||
90 | if (s->has_rpu) { | ||
91 | - xlnx_zynqmp_create_rpu(s, boot_cpu, &err); | ||
92 | - if (err) { | ||
93 | - error_propagate(errp, err); | ||
94 | - return; | ||
95 | - } | ||
96 | + info_report("The 'has_rpu' property is no longer required, to use the " | ||
97 | + "RPUs just use -smp 6."); | ||
98 | + } | 36 | + } |
99 | + | 37 | + |
100 | + xlnx_zynqmp_create_rpu(s, boot_cpu, &err); | 38 | if (new_el == 1 && (arm_hcr_el2_eff(env) & HCR_TGE)) { |
101 | + if (err) { | 39 | goto illegal_return; |
102 | + error_propagate(errp, err); | ||
103 | + return; | ||
104 | } | 40 | } |
105 | |||
106 | if (!s->boot_cpu_ptr) { | ||
107 | -- | 41 | -- |
108 | 2.7.4 | 42 | 2.43.0 |
109 | |||
110 | diff view generated by jsdifflib |
1 | From: Subbaraya Sundeep <sundeep.lkml@gmail.com> | 1 | I'm down as the only listed maintainer for quite a lot of Arm SoC and |
---|---|---|---|
2 | board types. In some cases this is only as the "maintainer of last | ||
3 | resort" and I'm not in practice doing anything beyond patch review | ||
4 | and the odd bit of tidyup. | ||
2 | 5 | ||
3 | Voluntarily add myself as maintainer for Smartfusion2 | 6 | Move these entries in MAINTAINERS from "Maintained" to "Odd Fixes", |
7 | to better represent reality. Entries for other boards and SoCs where | ||
8 | I do more actively care (or where there is a listed co-maintainer) | ||
9 | remain as they are. | ||
4 | 10 | ||
5 | Signed-off-by: Subbaraya Sundeep <sundeep.lkml@gmail.com> | ||
6 | Reviewed-by: Alistair Francis <alistair.francis@xilinx.com> | ||
7 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
8 | Message-id: 1510552520-3566-1-git-send-email-sundeep.lkml@gmail.com | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> | ||
13 | Message-id: 20250307152838.3226398-1-peter.maydell@linaro.org | ||
10 | --- | 14 | --- |
11 | MAINTAINERS | 17 +++++++++++++++++ | 15 | MAINTAINERS | 14 +++++++------- |
12 | 1 file changed, 17 insertions(+) | 16 | 1 file changed, 7 insertions(+), 7 deletions(-) |
13 | 17 | ||
14 | diff --git a/MAINTAINERS b/MAINTAINERS | 18 | diff --git a/MAINTAINERS b/MAINTAINERS |
15 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/MAINTAINERS | 20 | --- a/MAINTAINERS |
17 | +++ b/MAINTAINERS | 21 | +++ b/MAINTAINERS |
18 | @@ -XXX,XX +XXX,XX @@ M: Alistair Francis <alistair@alistair23.me> | 22 | @@ -XXX,XX +XXX,XX @@ F: docs/system/arm/kzm.rst |
19 | S: Maintained | 23 | Integrator CP |
20 | F: hw/arm/netduino2.c | 24 | M: Peter Maydell <peter.maydell@linaro.org> |
21 | 25 | L: qemu-arm@nongnu.org | |
22 | +SmartFusion2 | 26 | -S: Maintained |
23 | +M: Subbaraya Sundeep <sundeep.lkml@gmail.com> | 27 | +S: Odd Fixes |
24 | +S: Maintained | 28 | F: hw/arm/integratorcp.c |
25 | +F: hw/arm/msf2-soc.c | 29 | F: hw/misc/arm_integrator_debug.c |
26 | +F: hw/misc/msf2-sysreg.c | 30 | F: include/hw/misc/arm_integrator_debug.h |
27 | +F: hw/timer/mss-timer.c | 31 | @@ -XXX,XX +XXX,XX @@ F: docs/system/arm/mps2.rst |
28 | +F: hw/ssi/mss-spi.c | 32 | Musca |
29 | +F: include/hw/arm/msf2-soc.h | 33 | M: Peter Maydell <peter.maydell@linaro.org> |
30 | +F: include/hw/misc/msf2-sysreg.h | 34 | L: qemu-arm@nongnu.org |
31 | +F: include/hw/timer/mss-timer.h | 35 | -S: Maintained |
32 | +F: include/hw/ssi/mss-spi.h | 36 | +S: Odd Fixes |
33 | + | 37 | F: hw/arm/musca.c |
34 | +Emcraft M2S-FG484 | 38 | F: docs/system/arm/musca.rst |
35 | +M: Subbaraya Sundeep <sundeep.lkml@gmail.com> | 39 | |
36 | +S: Maintained | 40 | @@ -XXX,XX +XXX,XX @@ F: tests/functional/test_aarch64_raspi4.py |
37 | +F: hw/arm/msf2-som.c | 41 | Real View |
38 | + | 42 | M: Peter Maydell <peter.maydell@linaro.org> |
39 | CRIS Machines | 43 | L: qemu-arm@nongnu.org |
40 | ------------- | 44 | -S: Maintained |
41 | Axis Dev88 | 45 | +S: Odd Fixes |
46 | F: hw/arm/realview* | ||
47 | F: hw/cpu/realview_mpcore.c | ||
48 | F: hw/intc/realview_gic.c | ||
49 | @@ -XXX,XX +XXX,XX @@ F: tests/functional/test_arm_collie.py | ||
50 | Stellaris | ||
51 | M: Peter Maydell <peter.maydell@linaro.org> | ||
52 | L: qemu-arm@nongnu.org | ||
53 | -S: Maintained | ||
54 | +S: Odd Fixes | ||
55 | F: hw/*/stellaris* | ||
56 | F: hw/display/ssd03* | ||
57 | F: include/hw/input/gamepad.h | ||
58 | @@ -XXX,XX +XXX,XX @@ F: docs/system/arm/stm32.rst | ||
59 | Versatile Express | ||
60 | M: Peter Maydell <peter.maydell@linaro.org> | ||
61 | L: qemu-arm@nongnu.org | ||
62 | -S: Maintained | ||
63 | +S: Odd Fixes | ||
64 | F: hw/arm/vexpress.c | ||
65 | F: hw/display/sii9022.c | ||
66 | F: docs/system/arm/vexpress.rst | ||
67 | @@ -XXX,XX +XXX,XX @@ F: tests/functional/test_arm_vexpress.py | ||
68 | Versatile PB | ||
69 | M: Peter Maydell <peter.maydell@linaro.org> | ||
70 | L: qemu-arm@nongnu.org | ||
71 | -S: Maintained | ||
72 | +S: Odd Fixes | ||
73 | F: hw/*/versatile* | ||
74 | F: hw/i2c/arm_sbcon_i2c.c | ||
75 | F: include/hw/i2c/arm_sbcon_i2c.h | ||
76 | @@ -XXX,XX +XXX,XX @@ F: include/hw/hyperv/vmbus*.h | ||
77 | OMAP | ||
78 | M: Peter Maydell <peter.maydell@linaro.org> | ||
79 | L: qemu-arm@nongnu.org | ||
80 | -S: Maintained | ||
81 | +S: Odd Fixes | ||
82 | F: hw/*/omap* | ||
83 | F: include/hw/arm/omap.h | ||
84 | F: docs/system/arm/sx1.rst | ||
42 | -- | 85 | -- |
43 | 2.7.4 | 86 | 2.43.0 |
44 | 87 | ||
45 | 88 | diff view generated by jsdifflib |
1 | From: Prasad J Pandit <pjp@fedoraproject.org> | 1 | From: Paolo Bonzini <pbonzini@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | An 'offset' parameter sent to highbank register r/w functions | 3 | The guest does not control whether characters are sent on the UART. |
4 | could be greater than number(NUM_REGS=0x200) of hb registers, | 4 | Sending them before the guest happens to boot will now result in a |
5 | leading to an OOB access issue. Add check to avoid it. | 5 | "guest error" log entry that is only because of timing, even if the |
6 | guest _would_ later setup the receiver correctly. | ||
6 | 7 | ||
7 | Reported-by: Moguofang (Dennis mo) <moguofang@huawei.com> | 8 | This reverts the bulk of commit abf2b6a028670bd2890bb3aee7e103fe53e4b0df, |
8 | Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> | 9 | and instead adds a comment about why we don't check the enable bits. |
9 | Message-id: 20171113062658.9697-1-ppandit@redhat.com | 10 | |
11 | Cc: Philippe Mathieu-Daudé <philmd@linaro.org> | ||
12 | Cc: Peter Maydell <peter.maydell@linaro.org> | ||
13 | Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> | ||
14 | Message-id: 20250311153717.206129-1-pbonzini@redhat.com | ||
15 | [PMM: expanded comment] | ||
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 16 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 17 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | --- | 18 | --- |
13 | hw/arm/highbank.c | 17 +++++++++++++++-- | 19 | hw/char/pl011.c | 19 ++++++++++--------- |
14 | 1 file changed, 15 insertions(+), 2 deletions(-) | 20 | 1 file changed, 10 insertions(+), 9 deletions(-) |
15 | 21 | ||
16 | diff --git a/hw/arm/highbank.c b/hw/arm/highbank.c | 22 | diff --git a/hw/char/pl011.c b/hw/char/pl011.c |
17 | index XXXXXXX..XXXXXXX 100644 | 23 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/hw/arm/highbank.c | 24 | --- a/hw/char/pl011.c |
19 | +++ b/hw/arm/highbank.c | 25 | +++ b/hw/char/pl011.c |
20 | @@ -XXX,XX +XXX,XX @@ | 26 | @@ -XXX,XX +XXX,XX @@ static int pl011_can_receive(void *opaque) |
21 | #include "hw/ide/ahci.h" | 27 | unsigned fifo_depth = pl011_get_fifo_depth(s); |
22 | #include "hw/cpu/a9mpcore.h" | 28 | unsigned fifo_available = fifo_depth - s->read_count; |
23 | #include "hw/cpu/a15mpcore.h" | 29 | |
24 | +#include "qemu/log.h" | 30 | - if (!(s->cr & CR_UARTEN)) { |
25 | 31 | - qemu_log_mask(LOG_GUEST_ERROR, | |
26 | #define SMP_BOOT_ADDR 0x100 | 32 | - "PL011 receiving data on disabled UART\n"); |
27 | #define SMP_BOOT_REG 0x40 | 33 | - } |
28 | @@ -XXX,XX +XXX,XX @@ static void hb_regs_write(void *opaque, hwaddr offset, | 34 | - if (!(s->cr & CR_RXE)) { |
29 | } | 35 | - qemu_log_mask(LOG_GUEST_ERROR, |
30 | } | 36 | - "PL011 receiving data on disabled RX UART\n"); |
31 | 37 | - } | |
32 | - regs[offset/4] = value; | 38 | - trace_pl011_can_receive(s->lcr, s->read_count, fifo_depth, fifo_available); |
33 | + if (offset / 4 >= NUM_REGS) { | 39 | + /* |
34 | + qemu_log_mask(LOG_GUEST_ERROR, | 40 | + * In theory we should check the UART and RX enable bits here and |
35 | + "highbank: bad write offset 0x%" HWADDR_PRIx "\n", offset); | 41 | + * return 0 if they are not set (so the guest can't receive data |
36 | + return; | 42 | + * until you have enabled the UART). In practice we suspect there |
37 | + } | 43 | + * is at least some guest code out there which has been tested only |
38 | + regs[offset / 4] = value; | 44 | + * on QEMU and which never bothers to enable the UART because we |
45 | + * historically never enforced that. So we effectively keep the | ||
46 | + * UART continuously enabled regardless of the enable bits. | ||
47 | + */ | ||
48 | |||
49 | + trace_pl011_can_receive(s->lcr, s->read_count, fifo_depth, fifo_available); | ||
50 | return fifo_available; | ||
39 | } | 51 | } |
40 | 52 | ||
41 | static uint64_t hb_regs_read(void *opaque, hwaddr offset, | ||
42 | unsigned size) | ||
43 | { | ||
44 | + uint32_t value; | ||
45 | uint32_t *regs = opaque; | ||
46 | - uint32_t value = regs[offset/4]; | ||
47 | + | ||
48 | + if (offset / 4 >= NUM_REGS) { | ||
49 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
50 | + "highbank: bad read offset 0x%" HWADDR_PRIx "\n", offset); | ||
51 | + return 0; | ||
52 | + } | ||
53 | + value = regs[offset / 4]; | ||
54 | |||
55 | if ((offset == 0x100) || (offset == 0x108) || (offset == 0x10C)) { | ||
56 | value |= 0x30000000; | ||
57 | -- | 53 | -- |
58 | 2.7.4 | 54 | 2.43.0 |
59 | 55 | ||
60 | 56 | diff view generated by jsdifflib |
1 | From: "Emilio G. Cota" <cota@braap.org> | 1 | From: Joe Komlodi <komlodi@google.com> |
---|---|---|---|
2 | 2 | ||
3 | 55c3cee ("qom: Introduce CPUClass.tcg_initialize", 2017-10-24) | 3 | On ARM hosts with CTR_EL0.DIC and CTR_EL0.IDC set, this would only cause |
4 | introduces a per-CPUClass bool that we check so that the target CPU | 4 | an ISB to be executed during cache maintenance, which could lead to QEMU |
5 | is initialized for TCG only once. This works well except when | 5 | executing TBs containing garbage instructions. |
6 | we end up creating more than one CPUClass, in which case we end | ||
7 | up incorrectly initializing TCG more than once, i.e. once for | ||
8 | each CPUClass. | ||
9 | 6 | ||
10 | This can be replicated with: | 7 | This seems to be because the ISB finishes executing instructions and |
11 | $ aarch64-softmmu/qemu-system-aarch64 -machine xlnx-zcu102 -smp 6 \ | 8 | flushes the pipeline, but the ISB doesn't guarantee that writes from the |
12 | -global driver=xlnx,,zynqmp,property=has_rpu,value=on | 9 | executed instructions are committed. If a small enough TB is created, it's |
13 | In this case the class name of the "RPUs" is prefixed by "cortex-r5-", | 10 | possible that the writes setting up the TB aren't committed by the time the |
14 | whereas the "regular" CPUs are prefixed by "cortex-a53-". This | 11 | TB is executed. |
15 | results in two CPUClass instances being created. | ||
16 | 12 | ||
17 | Fix it by introducing a static variable, so that only the first | 13 | This function is intended to be a port of the gcc implementation |
18 | target CPU being initialized will initialize the target-dependent | 14 | (https://github.com/gcc-mirror/gcc/blob/85b46d0795ac76bc192cb8f88b646a647acf98c1/libgcc/config/aarch64/sync-cache.c#L67) |
19 | part of TCG, regardless of CPUClass instances. | 15 | which makes the first DSB unconditional, so we can fix the synchronization |
16 | issue by doing that as well. | ||
20 | 17 | ||
21 | Fixes: 55c3ceef61fcf06fc98ddc752b7cce788ce7680b | 18 | Cc: qemu-stable@nongnu.org |
22 | Signed-off-by: Emilio G. Cota <cota@braap.org> | 19 | Fixes: 664a79735e4deb1 ("util: Specialize flush_idcache_range for aarch64") |
23 | Reviewed-by: Eduardo Habkost <ehabkost@redhat.com> | 20 | Signed-off-by: Joe Komlodi <komlodi@google.com> |
24 | Reviewed-by: Alistair Francis <alistair.francis@xilinx.com> | 21 | Message-id: 20250310203622.1827940-2-komlodi@google.com |
22 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
25 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 23 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
26 | Tested-by: Alistair Francis <alistair.francis@xilinx.com> | ||
27 | Message-id: 1510343626-25861-2-git-send-email-cota@braap.org | ||
28 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 24 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
29 | --- | 25 | --- |
30 | include/qom/cpu.h | 1 - | 26 | util/cacheflush.c | 4 +++- |
31 | exec.c | 5 +++-- | 27 | 1 file changed, 3 insertions(+), 1 deletion(-) |
32 | 2 files changed, 3 insertions(+), 3 deletions(-) | ||
33 | 28 | ||
34 | diff --git a/include/qom/cpu.h b/include/qom/cpu.h | 29 | diff --git a/util/cacheflush.c b/util/cacheflush.c |
35 | index XXXXXXX..XXXXXXX 100644 | 30 | index XXXXXXX..XXXXXXX 100644 |
36 | --- a/include/qom/cpu.h | 31 | --- a/util/cacheflush.c |
37 | +++ b/include/qom/cpu.h | 32 | +++ b/util/cacheflush.c |
38 | @@ -XXX,XX +XXX,XX @@ typedef struct CPUClass { | 33 | @@ -XXX,XX +XXX,XX @@ void flush_idcache_range(uintptr_t rx, uintptr_t rw, size_t len) |
39 | /* Keep non-pointer data at the end to minimize holes. */ | 34 | for (p = rw & -dcache_lsize; p < rw + len; p += dcache_lsize) { |
40 | int gdb_num_core_regs; | 35 | asm volatile("dc\tcvau, %0" : : "r" (p) : "memory"); |
41 | bool gdb_stop_before_watchpoint; | 36 | } |
42 | - bool tcg_initialized; | 37 | - asm volatile("dsb\tish" : : : "memory"); |
43 | } CPUClass; | ||
44 | |||
45 | #ifdef HOST_WORDS_BIGENDIAN | ||
46 | diff --git a/exec.c b/exec.c | ||
47 | index XXXXXXX..XXXXXXX 100644 | ||
48 | --- a/exec.c | ||
49 | +++ b/exec.c | ||
50 | @@ -XXX,XX +XXX,XX @@ void cpu_exec_initfn(CPUState *cpu) | ||
51 | void cpu_exec_realizefn(CPUState *cpu, Error **errp) | ||
52 | { | ||
53 | CPUClass *cc = CPU_GET_CLASS(cpu); | ||
54 | + static bool tcg_target_initialized; | ||
55 | |||
56 | cpu_list_add(cpu); | ||
57 | |||
58 | - if (tcg_enabled() && !cc->tcg_initialized) { | ||
59 | - cc->tcg_initialized = true; | ||
60 | + if (tcg_enabled() && !tcg_target_initialized) { | ||
61 | + tcg_target_initialized = true; | ||
62 | cc->tcg_initialize(); | ||
63 | } | 38 | } |
64 | 39 | ||
40 | + /* DSB unconditionally to ensure any outstanding writes are committed. */ | ||
41 | + asm volatile("dsb\tish" : : : "memory"); | ||
42 | + | ||
43 | /* | ||
44 | * If CTR_EL0.DIC is enabled, Instruction cache cleaning to the Point | ||
45 | * of Unification is not required for instruction to data coherence. | ||
65 | -- | 46 | -- |
66 | 2.7.4 | 47 | 2.43.0 |
67 | |||
68 | diff view generated by jsdifflib |
1 | From: "Emilio G. Cota" <cota@braap.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | max_cpus needs to be an upper bound on the number of vCPUs | 3 | The check for fp_excp_el in assert_fp_access_checked is |
4 | initialized; otherwise TCG region initialization breaks. | 4 | incorrect. For SME, with StreamingMode enabled, the access |
5 | is really against the streaming mode vectors, and access | ||
6 | to the normal fp registers is allowed to be disabled. | ||
7 | C.f. sme_enabled_check. | ||
5 | 8 | ||
6 | Some boards initialize a hard-coded number of vCPUs, which is not | 9 | Convert sve_access_checked to match, even though we don't |
7 | captured by the global max_cpus and therefore breaks TCG initialization. | 10 | currently check the exception state. |
8 | Fix it by adding the .min_cpus field to machine_class. | ||
9 | 11 | ||
10 | This commit also changes some user-facing behaviour: we now die if | 12 | Cc: qemu-stable@nongnu.org |
11 | -smp is below this hard-coded vCPU minimum instead of silently | 13 | Fixes: 3d74825f4d6 ("target/arm: Add SME enablement checks") |
12 | ignoring the passed -smp value (sometimes announcing this by printing | 14 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
13 | a warning). However, the introduction of .default_cpus lessens the | 15 | Message-id: 20250307190415.982049-2-richard.henderson@linaro.org |
14 | likelihood that users will notice this: if -smp isn't set, we now | 16 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
15 | assign the value in .default_cpus to both smp_cpus and max_cpus. IOW, | ||
16 | if a user does not set -smp, they always get a correct number of vCPUs. | ||
17 | |||
18 | This change fixes 3468b59 ("tcg: enable multiple TCG contexts in | ||
19 | softmmu", 2017-10-24), which broke TCG initialization for some | ||
20 | ARM boards. | ||
21 | |||
22 | Fixes: 3468b59e18b179bc63c7ce934de912dfa9596122 | ||
23 | Reported-by: Thomas Huth <thuth@redhat.com> | ||
24 | Reviewed-by: Eduardo Habkost <ehabkost@redhat.com> | ||
25 | Reviewed-by: Alistair Francis <alistair.francis@xilinx.com> | ||
26 | Signed-off-by: Emilio G. Cota <cota@braap.org> | ||
27 | Message-id: 1510343626-25861-6-git-send-email-cota@braap.org | ||
28 | Suggested-by: Peter Maydell <peter.maydell@linaro.org> | ||
29 | Signed-off-by: Emilio G. Cota <cota@braap.org> | ||
30 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 17 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
31 | --- | 18 | --- |
32 | include/hw/boards.h | 5 +++++ | 19 | target/arm/tcg/translate-a64.h | 2 +- |
33 | hw/arm/exynos4_boards.c | 12 ++++-------- | 20 | target/arm/tcg/translate.h | 10 +++++++--- |
34 | hw/arm/raspi.c | 2 ++ | 21 | target/arm/tcg/translate-a64.c | 17 +++++++++-------- |
35 | hw/arm/xlnx-zcu102.c | 2 ++ | 22 | 3 files changed, 17 insertions(+), 12 deletions(-) |
36 | vl.c | 21 ++++++++++++++++++--- | ||
37 | 5 files changed, 31 insertions(+), 11 deletions(-) | ||
38 | 23 | ||
39 | diff --git a/include/hw/boards.h b/include/hw/boards.h | 24 | diff --git a/target/arm/tcg/translate-a64.h b/target/arm/tcg/translate-a64.h |
40 | index XXXXXXX..XXXXXXX 100644 | 25 | index XXXXXXX..XXXXXXX 100644 |
41 | --- a/include/hw/boards.h | 26 | --- a/target/arm/tcg/translate-a64.h |
42 | +++ b/include/hw/boards.h | 27 | +++ b/target/arm/tcg/translate-a64.h |
43 | @@ -XXX,XX +XXX,XX @@ typedef struct { | 28 | @@ -XXX,XX +XXX,XX @@ TCGv_i64 gen_mte_checkN(DisasContext *s, TCGv_i64 addr, bool is_write, |
44 | 29 | static inline void assert_fp_access_checked(DisasContext *s) | |
45 | /** | 30 | { |
46 | * MachineClass: | 31 | #ifdef CONFIG_DEBUG_TCG |
47 | + * @max_cpus: maximum number of CPUs supported. Default: 1 | 32 | - if (unlikely(!s->fp_access_checked || s->fp_excp_el)) { |
48 | + * @min_cpus: minimum number of CPUs supported. Default: 1 | 33 | + if (unlikely(s->fp_access_checked <= 0)) { |
49 | + * @default_cpus: number of CPUs instantiated if none are specified. Default: 1 | 34 | fprintf(stderr, "target-arm: FP access check missing for " |
50 | * @get_hotplug_handler: this function is called during bus-less | 35 | "instruction 0x%08x\n", s->insn); |
51 | * device hotplug. If defined it returns pointer to an instance | 36 | abort(); |
52 | * of HotplugHandler object, which handles hotplug operation | 37 | diff --git a/target/arm/tcg/translate.h b/target/arm/tcg/translate.h |
53 | @@ -XXX,XX +XXX,XX @@ struct MachineClass { | ||
54 | BlockInterfaceType block_default_type; | ||
55 | int units_per_default_bus; | ||
56 | int max_cpus; | ||
57 | + int min_cpus; | ||
58 | + int default_cpus; | ||
59 | unsigned int no_serial:1, | ||
60 | no_parallel:1, | ||
61 | use_virtcon:1, | ||
62 | diff --git a/hw/arm/exynos4_boards.c b/hw/arm/exynos4_boards.c | ||
63 | index XXXXXXX..XXXXXXX 100644 | 38 | index XXXXXXX..XXXXXXX 100644 |
64 | --- a/hw/arm/exynos4_boards.c | 39 | --- a/target/arm/tcg/translate.h |
65 | +++ b/hw/arm/exynos4_boards.c | 40 | +++ b/target/arm/tcg/translate.h |
66 | @@ -XXX,XX +XXX,XX @@ | 41 | @@ -XXX,XX +XXX,XX @@ typedef struct DisasContext { |
67 | #include "qemu-common.h" | 42 | bool aarch64; |
68 | #include "cpu.h" | 43 | bool thumb; |
69 | #include "sysemu/sysemu.h" | 44 | bool lse2; |
70 | -#include "sysemu/qtest.h" | 45 | - /* Because unallocated encodings generate different exception syndrome |
71 | #include "hw/sysbus.h" | 46 | + /* |
72 | #include "net/net.h" | 47 | + * Because unallocated encodings generate different exception syndrome |
73 | #include "hw/arm/arm.h" | 48 | * information from traps due to FP being disabled, we can't do a single |
74 | @@ -XXX,XX +XXX,XX @@ exynos4_boards_init_common(MachineState *machine, | 49 | * "is fp access disabled" check at a high level in the decode tree. |
75 | Exynos4BoardType board_type) | 50 | * To help in catching bugs where the access check was forgotten in some |
51 | * code path, we set this flag when the access check is done, and assert | ||
52 | * that it is set at the point where we actually touch the FP regs. | ||
53 | + * 0: not checked, | ||
54 | + * 1: checked, access ok | ||
55 | + * -1: checked, access denied | ||
56 | */ | ||
57 | - bool fp_access_checked; | ||
58 | - bool sve_access_checked; | ||
59 | + int8_t fp_access_checked; | ||
60 | + int8_t sve_access_checked; | ||
61 | /* ARMv8 single-step state (this is distinct from the QEMU gdbstub | ||
62 | * single-step support). | ||
63 | */ | ||
64 | diff --git a/target/arm/tcg/translate-a64.c b/target/arm/tcg/translate-a64.c | ||
65 | index XXXXXXX..XXXXXXX 100644 | ||
66 | --- a/target/arm/tcg/translate-a64.c | ||
67 | +++ b/target/arm/tcg/translate-a64.c | ||
68 | @@ -XXX,XX +XXX,XX @@ static bool fp_access_check_only(DisasContext *s) | ||
76 | { | 69 | { |
77 | Exynos4BoardState *s = g_new(Exynos4BoardState, 1); | 70 | if (s->fp_excp_el) { |
78 | - MachineClass *mc = MACHINE_GET_CLASS(machine); | 71 | assert(!s->fp_access_checked); |
79 | - | 72 | - s->fp_access_checked = true; |
80 | - if (smp_cpus != EXYNOS4210_NCPUS && !qtest_enabled()) { | 73 | + s->fp_access_checked = -1; |
81 | - error_report("%s board supports only %d CPU cores, ignoring smp_cpus" | 74 | |
82 | - " value", | 75 | gen_exception_insn_el(s, 0, EXCP_UDEF, |
83 | - mc->name, EXYNOS4210_NCPUS); | 76 | syn_fp_access_trap(1, 0xe, false, 0), |
84 | - } | 77 | s->fp_excp_el); |
85 | 78 | return false; | |
86 | exynos4_board_binfo.ram_size = exynos4_board_ram_size[board_type]; | 79 | } |
87 | exynos4_board_binfo.board_id = exynos4_board_id[board_type]; | 80 | - s->fp_access_checked = true; |
88 | @@ -XXX,XX +XXX,XX @@ static void nuri_class_init(ObjectClass *oc, void *data) | 81 | + s->fp_access_checked = 1; |
89 | mc->desc = "Samsung NURI board (Exynos4210)"; | 82 | return true; |
90 | mc->init = nuri_init; | ||
91 | mc->max_cpus = EXYNOS4210_NCPUS; | ||
92 | + mc->min_cpus = EXYNOS4210_NCPUS; | ||
93 | + mc->default_cpus = EXYNOS4210_NCPUS; | ||
94 | mc->ignore_memory_transaction_failures = true; | ||
95 | } | 83 | } |
96 | 84 | ||
97 | @@ -XXX,XX +XXX,XX @@ static void smdkc210_class_init(ObjectClass *oc, void *data) | 85 | @@ -XXX,XX +XXX,XX @@ bool sve_access_check(DisasContext *s) |
98 | mc->desc = "Samsung SMDKC210 board (Exynos4210)"; | 86 | syn_sve_access_trap(), s->sve_excp_el); |
99 | mc->init = smdkc210_init; | 87 | goto fail_exit; |
100 | mc->max_cpus = EXYNOS4210_NCPUS; | 88 | } |
101 | + mc->min_cpus = EXYNOS4210_NCPUS; | 89 | - s->sve_access_checked = true; |
102 | + mc->default_cpus = EXYNOS4210_NCPUS; | 90 | + s->sve_access_checked = 1; |
103 | mc->ignore_memory_transaction_failures = true; | 91 | return fp_access_check(s); |
92 | |||
93 | fail_exit: | ||
94 | /* Assert that we only raise one exception per instruction. */ | ||
95 | assert(!s->sve_access_checked); | ||
96 | - s->sve_access_checked = true; | ||
97 | + s->sve_access_checked = -1; | ||
98 | return false; | ||
104 | } | 99 | } |
105 | 100 | ||
106 | diff --git a/hw/arm/raspi.c b/hw/arm/raspi.c | 101 | @@ -XXX,XX +XXX,XX @@ bool sme_enabled_check(DisasContext *s) |
107 | index XXXXXXX..XXXXXXX 100644 | 102 | * sme_excp_el by itself for cpregs access checks. |
108 | --- a/hw/arm/raspi.c | 103 | */ |
109 | +++ b/hw/arm/raspi.c | 104 | if (!s->fp_excp_el || s->sme_excp_el < s->fp_excp_el) { |
110 | @@ -XXX,XX +XXX,XX @@ static void raspi2_machine_init(MachineClass *mc) | 105 | - s->fp_access_checked = true; |
111 | mc->no_floppy = 1; | 106 | - return sme_access_check(s); |
112 | mc->no_cdrom = 1; | 107 | + bool ret = sme_access_check(s); |
113 | mc->max_cpus = BCM2836_NCPUS; | 108 | + s->fp_access_checked = (ret ? 1 : -1); |
114 | + mc->min_cpus = BCM2836_NCPUS; | 109 | + return ret; |
115 | + mc->default_cpus = BCM2836_NCPUS; | 110 | } |
116 | mc->default_ram_size = 1024 * 1024 * 1024; | 111 | return fp_access_check_only(s); |
117 | mc->ignore_memory_transaction_failures = true; | ||
118 | }; | ||
119 | diff --git a/hw/arm/xlnx-zcu102.c b/hw/arm/xlnx-zcu102.c | ||
120 | index XXXXXXX..XXXXXXX 100644 | ||
121 | --- a/hw/arm/xlnx-zcu102.c | ||
122 | +++ b/hw/arm/xlnx-zcu102.c | ||
123 | @@ -XXX,XX +XXX,XX @@ static void xlnx_ep108_machine_class_init(ObjectClass *oc, void *data) | ||
124 | mc->units_per_default_bus = 1; | ||
125 | mc->ignore_memory_transaction_failures = true; | ||
126 | mc->max_cpus = XLNX_ZYNQMP_NUM_APU_CPUS + XLNX_ZYNQMP_NUM_RPU_CPUS; | ||
127 | + mc->default_cpus = XLNX_ZYNQMP_NUM_APU_CPUS; | ||
128 | } | 112 | } |
129 | 113 | @@ -XXX,XX +XXX,XX @@ static void aarch64_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu) | |
130 | static const TypeInfo xlnx_ep108_machine_init_typeinfo = { | 114 | s->insn = insn; |
131 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zcu102_machine_class_init(ObjectClass *oc, void *data) | 115 | s->base.pc_next = pc + 4; |
132 | mc->units_per_default_bus = 1; | 116 | |
133 | mc->ignore_memory_transaction_failures = true; | 117 | - s->fp_access_checked = false; |
134 | mc->max_cpus = XLNX_ZYNQMP_NUM_APU_CPUS + XLNX_ZYNQMP_NUM_RPU_CPUS; | 118 | - s->sve_access_checked = false; |
135 | + mc->default_cpus = XLNX_ZYNQMP_NUM_APU_CPUS; | 119 | + s->fp_access_checked = 0; |
136 | } | 120 | + s->sve_access_checked = 0; |
137 | 121 | ||
138 | static const TypeInfo xlnx_zcu102_machine_init_typeinfo = { | 122 | if (s->pstate_il) { |
139 | diff --git a/vl.c b/vl.c | 123 | /* |
140 | index XXXXXXX..XXXXXXX 100644 | ||
141 | --- a/vl.c | ||
142 | +++ b/vl.c | ||
143 | @@ -XXX,XX +XXX,XX @@ Chardev *virtcon_hds[MAX_VIRTIO_CONSOLES]; | ||
144 | Chardev *sclp_hds[MAX_SCLP_CONSOLES]; | ||
145 | int win2k_install_hack = 0; | ||
146 | int singlestep = 0; | ||
147 | -int smp_cpus = 1; | ||
148 | -unsigned int max_cpus = 1; | ||
149 | +int smp_cpus; | ||
150 | +unsigned int max_cpus; | ||
151 | int smp_cores = 1; | ||
152 | int smp_threads = 1; | ||
153 | int acpi_enabled = 1; | ||
154 | @@ -XXX,XX +XXX,XX @@ int main(int argc, char **argv, char **envp) | ||
155 | exit(0); | ||
156 | } | ||
157 | |||
158 | + /* machine_class: default to UP */ | ||
159 | + machine_class->max_cpus = machine_class->max_cpus ?: 1; | ||
160 | + machine_class->min_cpus = machine_class->min_cpus ?: 1; | ||
161 | + machine_class->default_cpus = machine_class->default_cpus ?: 1; | ||
162 | + | ||
163 | + /* default to machine_class->default_cpus */ | ||
164 | + smp_cpus = machine_class->default_cpus; | ||
165 | + max_cpus = machine_class->default_cpus; | ||
166 | + | ||
167 | smp_parse(qemu_opts_find(qemu_find_opts("smp-opts"), NULL)); | ||
168 | |||
169 | - machine_class->max_cpus = machine_class->max_cpus ?: 1; /* Default to UP */ | ||
170 | + /* sanity-check smp_cpus and max_cpus against machine_class */ | ||
171 | + if (smp_cpus < machine_class->min_cpus) { | ||
172 | + error_report("Invalid SMP CPUs %d. The min CPUs " | ||
173 | + "supported by machine '%s' is %d", smp_cpus, | ||
174 | + machine_class->name, machine_class->min_cpus); | ||
175 | + exit(1); | ||
176 | + } | ||
177 | if (max_cpus > machine_class->max_cpus) { | ||
178 | error_report("Invalid SMP CPUs %d. The max CPUs " | ||
179 | "supported by machine '%s' is %d", max_cpus, | ||
180 | -- | 124 | -- |
181 | 2.7.4 | 125 | 2.43.0 |
182 | |||
183 | diff view generated by jsdifflib |
1 | From: Alex Bennée <alex.bennee@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | We are still seeing signals during translation time when we walk over | 3 | In StreamingMode, fp_access_checked is handled already. |
4 | a page protection boundary. This expands the check to ensure the host | 4 | We cannot fall through to fp_access_check lest we fall |
5 | PC is inside the code generation buffer. The original suggestion was | 5 | foul of the double-check assertion. |
6 | to check versus tcg_ctx.code_gen_ptr but as we now segment the | ||
7 | translation buffer we have to settle for just a general check for | ||
8 | being inside. | ||
9 | 6 | ||
10 | I've also fixed up the declaration to make it clear it can deal with | 7 | Cc: qemu-stable@nongnu.org |
11 | invalid addresses. A later patch will fix up the call sites. | 8 | Fixes: 285b1d5fcef ("target/arm: Handle SME in sve_access_check") |
12 | 9 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | |
13 | Signed-off-by: Alex Bennée <alex.bennee@linaro.org> | 10 | Message-id: 20250307190415.982049-3-richard.henderson@linaro.org |
14 | Reported-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
15 | Reviewed-by: Laurent Vivier <laurent@vivier.eu> | 12 | [PMM: move declaration of 'ret' to top of block] |
16 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
17 | Message-id: 20171108153245.20740-2-alex.bennee@linaro.org | ||
18 | Suggested-by: Paolo Bonzini <pbonzini@redhat.com> | ||
19 | Cc: Richard Henderson <rth@twiddle.net> | ||
20 | Tested-by: Peter Maydell <peter.maydell@linaro.org> | ||
21 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
22 | --- | 14 | --- |
23 | include/exec/exec-all.h | 11 ++++++++++ | 15 | target/arm/tcg/translate-a64.c | 22 +++++++++++----------- |
24 | accel/tcg/translate-all.c | 52 ++++++++++++++++++++++++++--------------------- | 16 | 1 file changed, 11 insertions(+), 11 deletions(-) |
25 | 2 files changed, 40 insertions(+), 23 deletions(-) | ||
26 | 17 | ||
27 | diff --git a/include/exec/exec-all.h b/include/exec/exec-all.h | 18 | diff --git a/target/arm/tcg/translate-a64.c b/target/arm/tcg/translate-a64.c |
28 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
29 | --- a/include/exec/exec-all.h | 20 | --- a/target/arm/tcg/translate-a64.c |
30 | +++ b/include/exec/exec-all.h | 21 | +++ b/target/arm/tcg/translate-a64.c |
31 | @@ -XXX,XX +XXX,XX @@ void restore_state_to_opc(CPUArchState *env, struct TranslationBlock *tb, | 22 | @@ -XXX,XX +XXX,XX @@ static int fp_access_check_vector_hsd(DisasContext *s, bool is_q, MemOp esz) |
32 | target_ulong *data); | 23 | bool sve_access_check(DisasContext *s) |
33 | 24 | { | |
34 | void cpu_gen_init(void); | 25 | if (s->pstate_sm || !dc_isar_feature(aa64_sve, s)) { |
26 | + bool ret; | ||
35 | + | 27 | + |
36 | +/** | 28 | assert(dc_isar_feature(aa64_sme, s)); |
37 | + * cpu_restore_state: | 29 | - if (!sme_sm_enabled_check(s)) { |
38 | + * @cpu: the vCPU state is to be restore to | 30 | - goto fail_exit; |
39 | + * @searched_pc: the host PC the fault occurred at | 31 | - } |
40 | + * @return: true if state was restored, false otherwise | 32 | - } else if (s->sve_excp_el) { |
41 | + * | 33 | + ret = sme_sm_enabled_check(s); |
42 | + * Attempt to restore the state for a fault occurring in translated | 34 | + s->sve_access_checked = (ret ? 1 : -1); |
43 | + * code. If the searched_pc is not in translated code no state is | 35 | + return ret; |
44 | + * restored and the function returns false. | 36 | + } |
45 | + */ | 37 | + if (s->sve_excp_el) { |
46 | bool cpu_restore_state(CPUState *cpu, uintptr_t searched_pc); | 38 | + /* Assert that we only raise one exception per instruction. */ |
47 | 39 | + assert(!s->sve_access_checked); | |
48 | void QEMU_NORETURN cpu_loop_exit_noexc(CPUState *cpu); | 40 | gen_exception_insn_el(s, 0, EXCP_UDEF, |
49 | diff --git a/accel/tcg/translate-all.c b/accel/tcg/translate-all.c | 41 | syn_sve_access_trap(), s->sve_excp_el); |
50 | index XXXXXXX..XXXXXXX 100644 | 42 | - goto fail_exit; |
51 | --- a/accel/tcg/translate-all.c | 43 | + s->sve_access_checked = -1; |
52 | +++ b/accel/tcg/translate-all.c | 44 | + return false; |
53 | @@ -XXX,XX +XXX,XX @@ static int cpu_restore_state_from_tb(CPUState *cpu, TranslationBlock *tb, | 45 | } |
54 | return 0; | 46 | s->sve_access_checked = 1; |
47 | return fp_access_check(s); | ||
48 | - | ||
49 | - fail_exit: | ||
50 | - /* Assert that we only raise one exception per instruction. */ | ||
51 | - assert(!s->sve_access_checked); | ||
52 | - s->sve_access_checked = -1; | ||
53 | - return false; | ||
55 | } | 54 | } |
56 | 55 | ||
57 | -bool cpu_restore_state(CPUState *cpu, uintptr_t retaddr) | 56 | /* |
58 | +bool cpu_restore_state(CPUState *cpu, uintptr_t host_pc) | ||
59 | { | ||
60 | TranslationBlock *tb; | ||
61 | bool r = false; | ||
62 | + uintptr_t check_offset; | ||
63 | |||
64 | - /* A retaddr of zero is invalid so we really shouldn't have ended | ||
65 | - * up here. The target code has likely forgotten to check retaddr | ||
66 | - * != 0 before attempting to restore state. We return early to | ||
67 | - * avoid blowing up on a recursive tb_lock(). The target must have | ||
68 | - * previously survived a failed cpu_restore_state because | ||
69 | - * tb_find_pc(0) would have failed anyway. It still should be | ||
70 | - * fixed though. | ||
71 | + /* The host_pc has to be in the region of current code buffer. If | ||
72 | + * it is not we will not be able to resolve it here. The two cases | ||
73 | + * where host_pc will not be correct are: | ||
74 | + * | ||
75 | + * - fault during translation (instruction fetch) | ||
76 | + * - fault from helper (not using GETPC() macro) | ||
77 | + * | ||
78 | + * Either way we need return early to avoid blowing up on a | ||
79 | + * recursive tb_lock() as we can't resolve it here. | ||
80 | + * | ||
81 | + * We are using unsigned arithmetic so if host_pc < | ||
82 | + * tcg_init_ctx.code_gen_buffer check_offset will wrap to way | ||
83 | + * above the code_gen_buffer_size | ||
84 | */ | ||
85 | - | ||
86 | - if (!retaddr) { | ||
87 | - return r; | ||
88 | - } | ||
89 | - | ||
90 | - tb_lock(); | ||
91 | - tb = tb_find_pc(retaddr); | ||
92 | - if (tb) { | ||
93 | - cpu_restore_state_from_tb(cpu, tb, retaddr); | ||
94 | - if (tb->cflags & CF_NOCACHE) { | ||
95 | - /* one-shot translation, invalidate it immediately */ | ||
96 | - tb_phys_invalidate(tb, -1); | ||
97 | - tb_remove(tb); | ||
98 | + check_offset = host_pc - (uintptr_t) tcg_init_ctx.code_gen_buffer; | ||
99 | + | ||
100 | + if (check_offset < tcg_init_ctx.code_gen_buffer_size) { | ||
101 | + tb_lock(); | ||
102 | + tb = tb_find_pc(host_pc); | ||
103 | + if (tb) { | ||
104 | + cpu_restore_state_from_tb(cpu, tb, host_pc); | ||
105 | + if (tb->cflags & CF_NOCACHE) { | ||
106 | + /* one-shot translation, invalidate it immediately */ | ||
107 | + tb_phys_invalidate(tb, -1); | ||
108 | + tb_remove(tb); | ||
109 | + } | ||
110 | + r = true; | ||
111 | } | ||
112 | - r = true; | ||
113 | + tb_unlock(); | ||
114 | } | ||
115 | - tb_unlock(); | ||
116 | |||
117 | return r; | ||
118 | } | ||
119 | -- | 57 | -- |
120 | 2.7.4 | 58 | 2.43.0 |
121 | |||
122 | diff view generated by jsdifflib |
1 | From: "Emilio G. Cota" <cota@braap.org> | 1 | We want to capture potential Rust backtraces on panics in our test |
---|---|---|---|
2 | logs, which isn't Rust's default behaviour. Set RUST_BACKTRACE=1 in | ||
3 | the add_test_setup environments, so that all our tests get run with | ||
4 | this environment variable set. | ||
2 | 5 | ||
3 | Just like the zcu102, the ep108 can instantiate several CPUs. | 6 | This makes the setting of that variable in the gitlab CI template |
7 | redundant, so we can remove it. | ||
4 | 8 | ||
5 | Signed-off-by: Emilio G. Cota <cota@braap.org> | ||
6 | Reviewed-by: Alistair Francis <alistair.francis@xilinx.com> | ||
7 | Message-id: 1510343626-25861-5-git-send-email-cota@braap.org | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Reviewed-by: Daniel P. Berrangé <berrange@redhat.com> | ||
11 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> | ||
12 | Message-id: 20250310102950.3752908-1-peter.maydell@linaro.org | ||
9 | --- | 13 | --- |
10 | hw/arm/xlnx-zcu102.c | 1 + | 14 | meson.build | 9 ++++++--- |
11 | 1 file changed, 1 insertion(+) | 15 | .gitlab-ci.d/buildtest-template.yml | 1 - |
16 | 2 files changed, 6 insertions(+), 4 deletions(-) | ||
12 | 17 | ||
13 | diff --git a/hw/arm/xlnx-zcu102.c b/hw/arm/xlnx-zcu102.c | 18 | diff --git a/meson.build b/meson.build |
14 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/hw/arm/xlnx-zcu102.c | 20 | --- a/meson.build |
16 | +++ b/hw/arm/xlnx-zcu102.c | 21 | +++ b/meson.build |
17 | @@ -XXX,XX +XXX,XX @@ static void xlnx_ep108_machine_class_init(ObjectClass *oc, void *data) | 22 | @@ -XXX,XX +XXX,XX @@ project('qemu', ['c'], meson_version: '>=1.5.0', |
18 | mc->block_default_type = IF_IDE; | 23 | |
19 | mc->units_per_default_bus = 1; | 24 | meson.add_devenv({ 'MESON_BUILD_ROOT' : meson.project_build_root() }) |
20 | mc->ignore_memory_transaction_failures = true; | 25 | |
21 | + mc->max_cpus = XLNX_ZYNQMP_NUM_APU_CPUS + XLNX_ZYNQMP_NUM_RPU_CPUS; | 26 | -add_test_setup('quick', exclude_suites: ['slow', 'thorough'], is_default: true) |
22 | } | 27 | -add_test_setup('slow', exclude_suites: ['thorough'], env: ['G_TEST_SLOW=1', 'SPEED=slow']) |
23 | 28 | -add_test_setup('thorough', env: ['G_TEST_SLOW=1', 'SPEED=thorough']) | |
24 | static const TypeInfo xlnx_ep108_machine_init_typeinfo = { | 29 | +add_test_setup('quick', exclude_suites: ['slow', 'thorough'], is_default: true, |
30 | + env: ['RUST_BACKTRACE=1']) | ||
31 | +add_test_setup('slow', exclude_suites: ['thorough'], | ||
32 | + env: ['G_TEST_SLOW=1', 'SPEED=slow', 'RUST_BACKTRACE=1']) | ||
33 | +add_test_setup('thorough', | ||
34 | + env: ['G_TEST_SLOW=1', 'SPEED=thorough', 'RUST_BACKTRACE=1']) | ||
35 | |||
36 | meson.add_postconf_script(find_program('scripts/symlink-install-tree.py')) | ||
37 | |||
38 | diff --git a/.gitlab-ci.d/buildtest-template.yml b/.gitlab-ci.d/buildtest-template.yml | ||
39 | index XXXXXXX..XXXXXXX 100644 | ||
40 | --- a/.gitlab-ci.d/buildtest-template.yml | ||
41 | +++ b/.gitlab-ci.d/buildtest-template.yml | ||
42 | @@ -XXX,XX +XXX,XX @@ | ||
43 | stage: test | ||
44 | image: $CI_REGISTRY_IMAGE/qemu/$IMAGE:$QEMU_CI_CONTAINER_TAG | ||
45 | script: | ||
46 | - - export RUST_BACKTRACE=1 | ||
47 | - source scripts/ci/gitlab-ci-section | ||
48 | - section_start buildenv "Setting up to run tests" | ||
49 | - scripts/git-submodule.sh update roms/SLOF | ||
25 | -- | 50 | -- |
26 | 2.7.4 | 51 | 2.43.0 |
27 | 52 | ||
28 | 53 | diff view generated by jsdifflib |