1
Another lump of target-arm patches. I still have some patches in
1
I don't have anything else queued up at the moment, so this is just
2
my to-review queue, but this is a big enough set that I wanted
2
Richard's SME patches.
3
to send it out.
4
3
5
thanks
6
-- PMM
4
-- PMM
7
5
8
The following changes since commit 04bb7fe2bf55bdf66d5b7a5a719b40bbb4048178:
6
The following changes since commit 63b38f6c85acd312c2cab68554abf33adf4ee2b3:
9
7
10
Merge remote-tracking branch 'remotes/rth/tags/pull-tcg-20180208' into staging (2018-02-08 17:41:15 +0000)
8
Merge tag 'pull-target-arm-20220707' of https://git.linaro.org/people/pmaydell/qemu-arm into staging (2022-07-08 06:17:11 +0530)
11
9
12
are available in the Git repository at:
10
are available in the Git repository at:
13
11
14
git://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20180209
12
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20220711
15
13
16
for you to fetch changes up to bbba7757bacc9f890a3f028d328b4b429dbe78ec:
14
for you to fetch changes up to f9982ceaf26df27d15547a3a7990a95019e9e3a8:
17
15
18
hw/core/generic-loader: Allow PC to be set on command line (2018-02-09 10:55:40 +0000)
16
linux-user/aarch64: Add SME related hwcap entries (2022-07-11 13:43:52 +0100)
19
17
20
----------------------------------------------------------------
18
----------------------------------------------------------------
21
target-arm queue:
19
target-arm:
22
* Support M profile derived exceptions on exception entry and exit
20
* Implement SME emulation, for both system and linux-user
23
* Implement AArch64 v8.2 crypto insns (SHA-512, SHA-3, SM3, SM4)
24
* Implement working i.MX6 SD controller
25
* Various devices preparatory to i.MX7 support
26
* Preparatory patches for SVE emulation
27
* v8M: Fix bug in implementation of 'TT' insn
28
* Give useful error if user tries to use userspace GICv3 with KVM
29
21
30
----------------------------------------------------------------
22
----------------------------------------------------------------
31
Andrey Smirnov (10):
23
Richard Henderson (45):
32
sdhci: Add i.MX specific subtype of SDHCI
24
target/arm: Handle SME in aarch64_cpu_dump_state
33
hw: i.MX: Convert i.MX6 to use TYPE_IMX_USDHC
25
target/arm: Add infrastructure for disas_sme
34
i.MX: Add code to emulate i.MX7 CCM, PMU and ANALOG IP blocks
26
target/arm: Trap non-streaming usage when Streaming SVE is active
35
i.MX: Add code to emulate i.MX2 watchdog IP block
27
target/arm: Mark ADR as non-streaming
36
i.MX: Add code to emulate i.MX7 SNVS IP-block
28
target/arm: Mark RDFFR, WRFFR, SETFFR as non-streaming
37
i.MX: Add code to emulate GPCv2 IP block
29
target/arm: Mark BDEP, BEXT, BGRP, COMPACT, FEXPA, FTSSEL as non-streaming
38
i.MX: Add i.MX7 GPT variant
30
target/arm: Mark PMULL, FMMLA as non-streaming
39
i.MX: Add implementation of i.MX7 GPR IP block
31
target/arm: Mark FTSMUL, FTMAD, FADDA as non-streaming
40
usb: Add basic code to emulate Chipidea USB IP
32
target/arm: Mark SMMLA, UMMLA, USMMLA as non-streaming
41
hw/arm: Move virt's PSCI DT fixup code to arm/boot.c
33
target/arm: Mark string/histo/crypto as non-streaming
34
target/arm: Mark gather/scatter load/store as non-streaming
35
target/arm: Mark gather prefetch as non-streaming
36
target/arm: Mark LDFF1 and LDNF1 as non-streaming
37
target/arm: Mark LD1RO as non-streaming
38
target/arm: Add SME enablement checks
39
target/arm: Handle SME in sve_access_check
40
target/arm: Implement SME RDSVL, ADDSVL, ADDSPL
41
target/arm: Implement SME ZERO
42
target/arm: Implement SME MOVA
43
target/arm: Implement SME LD1, ST1
44
target/arm: Export unpredicated ld/st from translate-sve.c
45
target/arm: Implement SME LDR, STR
46
target/arm: Implement SME ADDHA, ADDVA
47
target/arm: Implement FMOPA, FMOPS (non-widening)
48
target/arm: Implement BFMOPA, BFMOPS
49
target/arm: Implement FMOPA, FMOPS (widening)
50
target/arm: Implement SME integer outer product
51
target/arm: Implement PSEL
52
target/arm: Implement REVD
53
target/arm: Implement SCLAMP, UCLAMP
54
target/arm: Reset streaming sve state on exception boundaries
55
target/arm: Enable SME for -cpu max
56
linux-user/aarch64: Clear tpidr2_el0 if CLONE_SETTLS
57
linux-user/aarch64: Reset PSTATE.SM on syscalls
58
linux-user/aarch64: Add SM bit to SVE signal context
59
linux-user/aarch64: Tidy target_restore_sigframe error return
60
linux-user/aarch64: Do not allow duplicate or short sve records
61
linux-user/aarch64: Verify extra record lock succeeded
62
linux-user/aarch64: Move sve record checks into restore
63
linux-user/aarch64: Implement SME signal handling
64
linux-user: Rename sve prctls
65
linux-user/aarch64: Implement PR_SME_GET_VL, PR_SME_SET_VL
66
target/arm: Only set ZEN in reset if SVE present
67
target/arm: Enable SME for user-only
68
linux-user/aarch64: Add SME related hwcap entries
42
69
43
Ard Biesheuvel (5):
70
docs/system/arm/emulation.rst | 4 +
44
target/arm: implement SHA-512 instructions
71
linux-user/aarch64/target_cpu.h | 5 +-
45
target/arm: implement SHA-3 instructions
72
linux-user/aarch64/target_prctl.h | 62 +-
46
target/arm: implement SM3 instructions
73
target/arm/cpu.h | 7 +
47
target/arm: implement SM4 instructions
74
target/arm/helper-sme.h | 126 ++++
48
target/arm: enable user-mode SHA-3, SM3, SM4 and SHA-512 instruction support
75
target/arm/helper-sve.h | 4 +
49
76
target/arm/helper.h | 18 +
50
Christoffer Dall (1):
77
target/arm/translate-a64.h | 45 ++
51
target/arm/kvm: gic: Prevent creating userspace GICv3 with KVM
78
target/arm/translate.h | 16 +
52
79
target/arm/sme-fa64.decode | 60 ++
53
Peter Maydell (9):
80
target/arm/sme.decode | 88 +++
54
target/arm: Add armv7m_nvic_set_pending_derived()
81
target/arm/sve.decode | 41 +-
55
target/arm: Split "get pending exception info" from "acknowledge it"
82
linux-user/aarch64/cpu_loop.c | 9 +
56
target/arm: Add ignore_stackfaults argument to v7m_exception_taken()
83
linux-user/aarch64/signal.c | 243 ++++++--
57
target/arm: Make v7M exception entry stack push check MPU
84
linux-user/elfload.c | 20 +
58
target/arm: Make v7m_push_callee_stack() honour MPU
85
linux-user/syscall.c | 28 +-
59
target/arm: Make exception vector loads honour the SAU
86
target/arm/cpu.c | 35 +-
60
target/arm: Handle exceptions during exception stack pop
87
target/arm/cpu64.c | 11 +
61
target/arm/translate.c: Fix missing 'break' for TT insns
88
target/arm/helper.c | 56 +-
62
hw/core/generic-loader: Allow PC to be set on command line
89
target/arm/sme_helper.c | 1140 +++++++++++++++++++++++++++++++++++++
63
90
target/arm/sve_helper.c | 28 +
64
Richard Henderson (5):
91
target/arm/translate-a64.c | 103 +++-
65
target/arm: Expand vector registers for SVE
92
target/arm/translate-sme.c | 373 ++++++++++++
66
target/arm: Add predicate registers for SVE
93
target/arm/translate-sve.c | 393 ++++++++++---
67
target/arm: Add SVE to migration state
94
target/arm/translate-vfp.c | 12 +
68
target/arm: Add ZCR_ELx
95
target/arm/translate.c | 2 +
69
target/arm: Add SVE state to TB->FLAGS
96
target/arm/vec_helper.c | 24 +
70
97
target/arm/meson.build | 3 +
71
hw/intc/Makefile.objs | 2 +-
98
28 files changed, 2821 insertions(+), 135 deletions(-)
72
hw/misc/Makefile.objs | 4 +
99
create mode 100644 target/arm/sme-fa64.decode
73
hw/usb/Makefile.objs | 1 +
100
create mode 100644 target/arm/sme.decode
74
hw/sd/sdhci-internal.h | 23 ++
101
create mode 100644 target/arm/translate-sme.c
75
include/hw/intc/imx_gpcv2.h | 22 ++
76
include/hw/misc/imx2_wdt.h | 33 +++
77
include/hw/misc/imx7_ccm.h | 139 +++++++++++
78
include/hw/misc/imx7_gpr.h | 28 +++
79
include/hw/misc/imx7_snvs.h | 35 +++
80
include/hw/sd/sdhci.h | 13 ++
81
include/hw/timer/imx_gpt.h | 1 +
82
include/hw/usb/chipidea.h | 16 ++
83
target/arm/cpu.h | 120 ++++++++--
84
target/arm/helper.h | 12 +
85
target/arm/kvm_arm.h | 4 +
86
target/arm/translate.h | 2 +
87
hw/arm/boot.c | 65 ++++++
88
hw/arm/fsl-imx6.c | 2 +-
89
hw/arm/virt.c | 61 -----
90
hw/core/generic-loader.c | 2 +-
91
hw/intc/armv7m_nvic.c | 98 +++++++-
92
hw/intc/imx_gpcv2.c | 125 ++++++++++
93
hw/misc/imx2_wdt.c | 89 +++++++
94
hw/misc/imx7_ccm.c | 277 ++++++++++++++++++++++
95
hw/misc/imx7_gpr.c | 124 ++++++++++
96
hw/misc/imx7_snvs.c | 83 +++++++
97
hw/sd/sdhci.c | 230 ++++++++++++++++++-
98
hw/timer/imx_gpt.c | 25 ++
99
hw/usb/chipidea.c | 176 ++++++++++++++
100
linux-user/elfload.c | 19 ++
101
target/arm/cpu64.c | 4 +
102
target/arm/crypto_helper.c | 277 +++++++++++++++++++++-
103
target/arm/helper.c | 548 +++++++++++++++++++++++++++++++++++++-------
104
target/arm/machine.c | 88 ++++++-
105
target/arm/translate-a64.c | 350 +++++++++++++++++++++++++++-
106
target/arm/translate.c | 8 +-
107
hw/intc/trace-events | 5 +-
108
hw/misc/trace-events | 4 +
109
38 files changed, 2928 insertions(+), 187 deletions(-)
110
create mode 100644 include/hw/intc/imx_gpcv2.h
111
create mode 100644 include/hw/misc/imx2_wdt.h
112
create mode 100644 include/hw/misc/imx7_ccm.h
113
create mode 100644 include/hw/misc/imx7_gpr.h
114
create mode 100644 include/hw/misc/imx7_snvs.h
115
create mode 100644 include/hw/usb/chipidea.h
116
create mode 100644 hw/intc/imx_gpcv2.c
117
create mode 100644 hw/misc/imx2_wdt.c
118
create mode 100644 hw/misc/imx7_ccm.c
119
create mode 100644 hw/misc/imx7_gpr.c
120
create mode 100644 hw/misc/imx7_snvs.c
121
create mode 100644 hw/usb/chipidea.c
122
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Dump SVCR, plus use the correct access check for Streaming Mode.
4
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 20220708151540.18136-2-richard.henderson@linaro.org
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
---
10
target/arm/cpu.c | 17 ++++++++++++++++-
11
1 file changed, 16 insertions(+), 1 deletion(-)
12
13
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
14
index XXXXXXX..XXXXXXX 100644
15
--- a/target/arm/cpu.c
16
+++ b/target/arm/cpu.c
17
@@ -XXX,XX +XXX,XX @@ static void aarch64_cpu_dump_state(CPUState *cs, FILE *f, int flags)
18
int i;
19
int el = arm_current_el(env);
20
const char *ns_status;
21
+ bool sve;
22
23
qemu_fprintf(f, " PC=%016" PRIx64 " ", env->pc);
24
for (i = 0; i < 32; i++) {
25
@@ -XXX,XX +XXX,XX @@ static void aarch64_cpu_dump_state(CPUState *cs, FILE *f, int flags)
26
el,
27
psr & PSTATE_SP ? 'h' : 't');
28
29
+ if (cpu_isar_feature(aa64_sme, cpu)) {
30
+ qemu_fprintf(f, " SVCR=%08" PRIx64 " %c%c",
31
+ env->svcr,
32
+ (FIELD_EX64(env->svcr, SVCR, ZA) ? 'Z' : '-'),
33
+ (FIELD_EX64(env->svcr, SVCR, SM) ? 'S' : '-'));
34
+ }
35
if (cpu_isar_feature(aa64_bti, cpu)) {
36
qemu_fprintf(f, " BTYPE=%d", (psr & PSTATE_BTYPE) >> 10);
37
}
38
@@ -XXX,XX +XXX,XX @@ static void aarch64_cpu_dump_state(CPUState *cs, FILE *f, int flags)
39
qemu_fprintf(f, " FPCR=%08x FPSR=%08x\n",
40
vfp_get_fpcr(env), vfp_get_fpsr(env));
41
42
- if (cpu_isar_feature(aa64_sve, cpu) && sve_exception_el(env, el) == 0) {
43
+ if (cpu_isar_feature(aa64_sme, cpu) && FIELD_EX64(env->svcr, SVCR, SM)) {
44
+ sve = sme_exception_el(env, el) == 0;
45
+ } else if (cpu_isar_feature(aa64_sve, cpu)) {
46
+ sve = sve_exception_el(env, el) == 0;
47
+ } else {
48
+ sve = false;
49
+ }
50
+
51
+ if (sve) {
52
int j, zcr_len = sve_vqm1_for_el(env, el);
53
54
for (i = 0; i <= FFR_PRED_NUM; i++) {
55
--
56
2.25.1
diff view generated by jsdifflib
1
From: Andrey Smirnov <andrew.smirnov@gmail.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Add minimal code needed to allow upstream Linux guest to boot.
3
This includes the build rules for the decoder, and the
4
new file for translation, but excludes any instructions.
4
5
5
Cc: Peter Maydell <peter.maydell@linaro.org>
6
Cc: Jason Wang <jasowang@redhat.com>
7
Cc: Philippe Mathieu-Daudé <f4bug@amsat.org>
8
Cc: Marcel Apfelbaum <marcel.apfelbaum@zoho.com>
9
Cc: Michael S. Tsirkin <mst@redhat.com>
10
Cc: qemu-devel@nongnu.org
11
Cc: qemu-arm@nongnu.org
12
Cc: yurovsky@gmail.com
13
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
14
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
15
Signed-off-by: Andrey Smirnov <andrew.smirnov@gmail.com>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220708151540.18136-3-richard.henderson@linaro.org
16
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
---
10
---
18
hw/misc/Makefile.objs | 1 +
11
target/arm/translate-a64.h | 1 +
19
include/hw/misc/imx7_gpr.h | 28 ++++++++++
12
target/arm/sme.decode | 20 ++++++++++++++++++++
20
hw/misc/imx7_gpr.c | 124 +++++++++++++++++++++++++++++++++++++++++++++
13
target/arm/translate-a64.c | 7 ++++++-
21
hw/misc/trace-events | 4 ++
14
target/arm/translate-sme.c | 35 +++++++++++++++++++++++++++++++++++
22
4 files changed, 157 insertions(+)
15
target/arm/meson.build | 2 ++
23
create mode 100644 include/hw/misc/imx7_gpr.h
16
5 files changed, 64 insertions(+), 1 deletion(-)
24
create mode 100644 hw/misc/imx7_gpr.c
17
create mode 100644 target/arm/sme.decode
18
create mode 100644 target/arm/translate-sme.c
25
19
26
diff --git a/hw/misc/Makefile.objs b/hw/misc/Makefile.objs
20
diff --git a/target/arm/translate-a64.h b/target/arm/translate-a64.h
27
index XXXXXXX..XXXXXXX 100644
21
index XXXXXXX..XXXXXXX 100644
28
--- a/hw/misc/Makefile.objs
22
--- a/target/arm/translate-a64.h
29
+++ b/hw/misc/Makefile.objs
23
+++ b/target/arm/translate-a64.h
30
@@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_IMX) += imx6_src.o
24
@@ -XXX,XX +XXX,XX @@ static inline int pred_gvec_reg_size(DisasContext *s)
31
obj-$(CONFIG_IMX) += imx7_ccm.o
25
}
32
obj-$(CONFIG_IMX) += imx2_wdt.o
26
33
obj-$(CONFIG_IMX) += imx7_snvs.o
27
bool disas_sve(DisasContext *, uint32_t);
34
+obj-$(CONFIG_IMX) += imx7_gpr.o
28
+bool disas_sme(DisasContext *, uint32_t);
35
obj-$(CONFIG_MILKYMIST) += milkymist-hpdmc.o
29
36
obj-$(CONFIG_MILKYMIST) += milkymist-pfpu.o
30
void gen_gvec_rax1(unsigned vece, uint32_t rd_ofs, uint32_t rn_ofs,
37
obj-$(CONFIG_MAINSTONE) += mst_fpga.o
31
uint32_t rm_ofs, uint32_t opr_sz, uint32_t max_sz);
38
diff --git a/include/hw/misc/imx7_gpr.h b/include/hw/misc/imx7_gpr.h
32
diff --git a/target/arm/sme.decode b/target/arm/sme.decode
39
new file mode 100644
33
new file mode 100644
40
index XXXXXXX..XXXXXXX
34
index XXXXXXX..XXXXXXX
41
--- /dev/null
35
--- /dev/null
42
+++ b/include/hw/misc/imx7_gpr.h
36
+++ b/target/arm/sme.decode
43
@@ -XXX,XX +XXX,XX @@
37
@@ -XXX,XX +XXX,XX @@
44
+/*
38
+# AArch64 SME instruction descriptions
45
+ * Copyright (c) 2017, Impinj, Inc.
39
+#
46
+ *
40
+# Copyright (c) 2022 Linaro, Ltd
47
+ * i.MX7 GPR IP block emulation code
41
+#
48
+ *
42
+# This library is free software; you can redistribute it and/or
49
+ * Author: Andrey Smirnov <andrew.smirnov@gmail.com>
43
+# modify it under the terms of the GNU Lesser General Public
50
+ *
44
+# License as published by the Free Software Foundation; either
51
+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
45
+# version 2.1 of the License, or (at your option) any later version.
52
+ * See the COPYING file in the top-level directory.
46
+#
53
+ */
47
+# This library is distributed in the hope that it will be useful,
48
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
49
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
50
+# Lesser General Public License for more details.
51
+#
52
+# You should have received a copy of the GNU Lesser General Public
53
+# License along with this library; if not, see <http://www.gnu.org/licenses/>.
54
+
54
+
55
+#ifndef IMX7_GPR_H
55
+#
56
+#define IMX7_GPR_H
56
+# This file is processed by scripts/decodetree.py
57
+
57
+#
58
+#include "qemu/bitops.h"
58
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
59
+#include "hw/sysbus.h"
59
index XXXXXXX..XXXXXXX 100644
60
+
60
--- a/target/arm/translate-a64.c
61
+#define TYPE_IMX7_GPR "imx7.gpr"
61
+++ b/target/arm/translate-a64.c
62
+#define IMX7_GPR(obj) OBJECT_CHECK(IMX7GPRState, (obj), TYPE_IMX7_GPR)
62
@@ -XXX,XX +XXX,XX @@ static void aarch64_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu)
63
+
63
}
64
+typedef struct IMX7GPRState {
64
65
+ /* <private> */
65
switch (extract32(insn, 25, 4)) {
66
+ SysBusDevice parent_obj;
66
- case 0x0: case 0x1: case 0x3: /* UNALLOCATED */
67
+
67
+ case 0x0:
68
+ MemoryRegion mmio;
68
+ if (!extract32(insn, 31, 1) || !disas_sme(s, insn)) {
69
+} IMX7GPRState;
69
+ unallocated_encoding(s);
70
+
70
+ }
71
+#endif /* IMX7_GPR_H */
71
+ break;
72
diff --git a/hw/misc/imx7_gpr.c b/hw/misc/imx7_gpr.c
72
+ case 0x1: case 0x3: /* UNALLOCATED */
73
unallocated_encoding(s);
74
break;
75
case 0x2:
76
diff --git a/target/arm/translate-sme.c b/target/arm/translate-sme.c
73
new file mode 100644
77
new file mode 100644
74
index XXXXXXX..XXXXXXX
78
index XXXXXXX..XXXXXXX
75
--- /dev/null
79
--- /dev/null
76
+++ b/hw/misc/imx7_gpr.c
80
+++ b/target/arm/translate-sme.c
77
@@ -XXX,XX +XXX,XX @@
81
@@ -XXX,XX +XXX,XX @@
78
+/*
82
+/*
79
+ * Copyright (c) 2018, Impinj, Inc.
83
+ * AArch64 SME translation
80
+ *
84
+ *
81
+ * i.MX7 GPR IP block emulation code
85
+ * Copyright (c) 2022 Linaro, Ltd
82
+ *
86
+ *
83
+ * Author: Andrey Smirnov <andrew.smirnov@gmail.com>
87
+ * This library is free software; you can redistribute it and/or
88
+ * modify it under the terms of the GNU Lesser General Public
89
+ * License as published by the Free Software Foundation; either
90
+ * version 2.1 of the License, or (at your option) any later version.
84
+ *
91
+ *
85
+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
92
+ * This library is distributed in the hope that it will be useful,
86
+ * See the COPYING file in the top-level directory.
93
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
94
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
95
+ * Lesser General Public License for more details.
87
+ *
96
+ *
88
+ * Bare minimum emulation code needed to support being able to shut
97
+ * You should have received a copy of the GNU Lesser General Public
89
+ * down linux guest gracefully.
98
+ * License along with this library; if not, see <http://www.gnu.org/licenses/>.
90
+ */
99
+ */
91
+
100
+
92
+#include "qemu/osdep.h"
101
+#include "qemu/osdep.h"
93
+#include "hw/misc/imx7_gpr.h"
102
+#include "cpu.h"
94
+#include "qemu/log.h"
103
+#include "tcg/tcg-op.h"
95
+#include "sysemu/sysemu.h"
104
+#include "tcg/tcg-op-gvec.h"
96
+
105
+#include "tcg/tcg-gvec-desc.h"
97
+#include "trace.h"
106
+#include "translate.h"
98
+
107
+#include "exec/helper-gen.h"
99
+enum IMX7GPRRegisters {
108
+#include "translate-a64.h"
100
+ IOMUXC_GPR0 = 0x00,
109
+#include "fpu/softfloat.h"
101
+ IOMUXC_GPR1 = 0x04,
102
+ IOMUXC_GPR2 = 0x08,
103
+ IOMUXC_GPR3 = 0x0c,
104
+ IOMUXC_GPR4 = 0x10,
105
+ IOMUXC_GPR5 = 0x14,
106
+ IOMUXC_GPR6 = 0x18,
107
+ IOMUXC_GPR7 = 0x1c,
108
+ IOMUXC_GPR8 = 0x20,
109
+ IOMUXC_GPR9 = 0x24,
110
+ IOMUXC_GPR10 = 0x28,
111
+ IOMUXC_GPR11 = 0x2c,
112
+ IOMUXC_GPR12 = 0x30,
113
+ IOMUXC_GPR13 = 0x34,
114
+ IOMUXC_GPR14 = 0x38,
115
+ IOMUXC_GPR15 = 0x3c,
116
+ IOMUXC_GPR16 = 0x40,
117
+ IOMUXC_GPR17 = 0x44,
118
+ IOMUXC_GPR18 = 0x48,
119
+ IOMUXC_GPR19 = 0x4c,
120
+ IOMUXC_GPR20 = 0x50,
121
+ IOMUXC_GPR21 = 0x54,
122
+ IOMUXC_GPR22 = 0x58,
123
+};
124
+
125
+#define IMX7D_GPR1_IRQ_MASK BIT(12)
126
+#define IMX7D_GPR1_ENET1_TX_CLK_SEL_MASK BIT(13)
127
+#define IMX7D_GPR1_ENET2_TX_CLK_SEL_MASK BIT(14)
128
+#define IMX7D_GPR1_ENET_TX_CLK_SEL_MASK (0x3 << 13)
129
+#define IMX7D_GPR1_ENET1_CLK_DIR_MASK BIT(17)
130
+#define IMX7D_GPR1_ENET2_CLK_DIR_MASK BIT(18)
131
+#define IMX7D_GPR1_ENET_CLK_DIR_MASK (0x3 << 17)
132
+
133
+#define IMX7D_GPR5_CSI_MUX_CONTROL_MIPI BIT(4)
134
+#define IMX7D_GPR12_PCIE_PHY_REFCLK_SEL BIT(5)
135
+#define IMX7D_GPR22_PCIE_PHY_PLL_LOCKED BIT(31)
136
+
110
+
137
+
111
+
138
+static uint64_t imx7_gpr_read(void *opaque, hwaddr offset, unsigned size)
112
+/*
139
+{
113
+ * Include the generated decoder.
140
+ trace_imx7_gpr_read(offset);
114
+ */
141
+
115
+
142
+ if (offset == IOMUXC_GPR22) {
116
+#include "decode-sme.c.inc"
143
+ return IMX7D_GPR22_PCIE_PHY_PLL_LOCKED;
117
diff --git a/target/arm/meson.build b/target/arm/meson.build
144
+ }
145
+
146
+ return 0;
147
+}
148
+
149
+static void imx7_gpr_write(void *opaque, hwaddr offset,
150
+ uint64_t v, unsigned size)
151
+{
152
+ trace_imx7_gpr_write(offset, v);
153
+}
154
+
155
+static const struct MemoryRegionOps imx7_gpr_ops = {
156
+ .read = imx7_gpr_read,
157
+ .write = imx7_gpr_write,
158
+ .endianness = DEVICE_NATIVE_ENDIAN,
159
+ .impl = {
160
+ /*
161
+ * Our device would not work correctly if the guest was doing
162
+ * unaligned access. This might not be a limitation on the
163
+ * real device but in practice there is no reason for a guest
164
+ * to access this device unaligned.
165
+ */
166
+ .min_access_size = 4,
167
+ .max_access_size = 4,
168
+ .unaligned = false,
169
+ },
170
+};
171
+
172
+static void imx7_gpr_init(Object *obj)
173
+{
174
+ SysBusDevice *sd = SYS_BUS_DEVICE(obj);
175
+ IMX7GPRState *s = IMX7_GPR(obj);
176
+
177
+ memory_region_init_io(&s->mmio, obj, &imx7_gpr_ops, s,
178
+ TYPE_IMX7_GPR, 64 * 1024);
179
+ sysbus_init_mmio(sd, &s->mmio);
180
+}
181
+
182
+static void imx7_gpr_class_init(ObjectClass *klass, void *data)
183
+{
184
+ DeviceClass *dc = DEVICE_CLASS(klass);
185
+
186
+ dc->desc = "i.MX7 General Purpose Registers Module";
187
+}
188
+
189
+static const TypeInfo imx7_gpr_info = {
190
+ .name = TYPE_IMX7_GPR,
191
+ .parent = TYPE_SYS_BUS_DEVICE,
192
+ .instance_size = sizeof(IMX7GPRState),
193
+ .instance_init = imx7_gpr_init,
194
+ .class_init = imx7_gpr_class_init,
195
+};
196
+
197
+static void imx7_gpr_register_type(void)
198
+{
199
+ type_register_static(&imx7_gpr_info);
200
+}
201
+type_init(imx7_gpr_register_type)
202
diff --git a/hw/misc/trace-events b/hw/misc/trace-events
203
index XXXXXXX..XXXXXXX 100644
118
index XXXXXXX..XXXXXXX 100644
204
--- a/hw/misc/trace-events
119
--- a/target/arm/meson.build
205
+++ b/hw/misc/trace-events
120
+++ b/target/arm/meson.build
206
@@ -XXX,XX +XXX,XX @@ mps2_scc_cfg_read(unsigned function, unsigned device, uint32_t value) "MPS2 SCC
121
@@ -XXX,XX +XXX,XX @@
207
msf2_sysreg_write(uint64_t offset, uint32_t val, uint32_t prev) "msf2-sysreg write: addr 0x%08" HWADDR_PRIx " data 0x%" PRIx32 " prev 0x%" PRIx32
122
gen = [
208
msf2_sysreg_read(uint64_t offset, uint32_t val) "msf2-sysreg read: addr 0x%08" HWADDR_PRIx " data 0x%08" PRIx32
123
decodetree.process('sve.decode', extra_args: '--decode=disas_sve'),
209
msf2_sysreg_write_pll_status(void) "Invalid write to read only PLL status register"
124
+ decodetree.process('sme.decode', extra_args: '--decode=disas_sme'),
210
+
125
decodetree.process('neon-shared.decode', extra_args: '--decode=disas_neon_shared'),
211
+#hw/misc/imx7_gpr.c
126
decodetree.process('neon-dp.decode', extra_args: '--decode=disas_neon_dp'),
212
+imx7_gpr_read(uint64_t offset) "addr 0x%08" HWADDR_PRIx
127
decodetree.process('neon-ls.decode', extra_args: '--decode=disas_neon_ls'),
213
+imx7_gpr_write(uint64_t offset, uint64_t value) "addr 0x%08" HWADDR_PRIx "value 0x%08" HWADDR_PRIx
128
@@ -XXX,XX +XXX,XX @@ arm_ss.add(when: 'TARGET_AARCH64', if_true: files(
129
'sme_helper.c',
130
'translate-a64.c',
131
'translate-sve.c',
132
+ 'translate-sme.c',
133
))
134
135
arm_softmmu_ss = ss.source_set()
214
--
136
--
215
2.16.1
137
2.25.1
216
217
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Add both SVE exception state and vector length.
3
This new behaviour is in the ARM pseudocode function
4
4
AArch64.CheckFPAdvSIMDEnabled, which applies to AArch32
5
via AArch32.CheckAdvSIMDOrFPEnabled when the EL to which
6
the trap would be delivered is in AArch64 mode.
7
8
Given that ARMv9 drops support for AArch32 outside EL0, the trap EL
9
detection ought to be trivially true, but the pseudocode still contains
10
a number of conditions, and QEMU has not yet committed to dropping A32
11
support for EL[12] when v9 features are present.
12
13
Since the computation of SME_TRAP_NONSTREAMING is necessarily different
14
for the two modes, we might as well preserve bits within TBFLAG_ANY and
15
allocate separate bits within TBFLAG_A32 and TBFLAG_A64 instead.
16
17
Note that DDI0616A.a has typos for bits [22:21] of LD1RO in the table
18
of instructions illegal in streaming mode.
19
20
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
5
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
21
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
22
Message-id: 20220708151540.18136-4-richard.henderson@linaro.org
7
Message-id: 20180123035349.24538-6-richard.henderson@linaro.org
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
23
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
---
24
---
10
target/arm/cpu.h | 8 ++++++++
25
target/arm/cpu.h | 7 +++
11
target/arm/translate.h | 2 ++
26
target/arm/translate.h | 4 ++
12
target/arm/helper.c | 25 ++++++++++++++++++++++++-
27
target/arm/sme-fa64.decode | 90 ++++++++++++++++++++++++++++++++++++++
13
target/arm/translate-a64.c | 2 ++
28
target/arm/helper.c | 41 +++++++++++++++++
14
4 files changed, 36 insertions(+), 1 deletion(-)
29
target/arm/translate-a64.c | 40 ++++++++++++++++-
30
target/arm/translate-vfp.c | 12 +++++
31
target/arm/translate.c | 2 +
32
target/arm/meson.build | 1 +
33
8 files changed, 195 insertions(+), 2 deletions(-)
34
create mode 100644 target/arm/sme-fa64.decode
15
35
16
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
36
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
17
index XXXXXXX..XXXXXXX 100644
37
index XXXXXXX..XXXXXXX 100644
18
--- a/target/arm/cpu.h
38
--- a/target/arm/cpu.h
19
+++ b/target/arm/cpu.h
39
+++ b/target/arm/cpu.h
20
@@ -XXX,XX +XXX,XX @@ static inline bool arm_cpu_data_is_big_endian(CPUARMState *env)
40
@@ -XXX,XX +XXX,XX @@ FIELD(TBFLAG_A32, HSTR_ACTIVE, 9, 1)
21
#define ARM_TBFLAG_TBI0_MASK (0x1ull << ARM_TBFLAG_TBI0_SHIFT)
41
* the same thing as the current security state of the processor!
22
#define ARM_TBFLAG_TBI1_SHIFT 1 /* TBI1 for EL0/1 */
42
*/
23
#define ARM_TBFLAG_TBI1_MASK (0x1ull << ARM_TBFLAG_TBI1_SHIFT)
43
FIELD(TBFLAG_A32, NS, 10, 1)
24
+#define ARM_TBFLAG_SVEEXC_EL_SHIFT 2
44
+/*
25
+#define ARM_TBFLAG_SVEEXC_EL_MASK (0x3 << ARM_TBFLAG_SVEEXC_EL_SHIFT)
45
+ * Indicates that SME Streaming mode is active, and SMCR_ELx.FA64 is not.
26
+#define ARM_TBFLAG_ZCR_LEN_SHIFT 4
46
+ * This requires an SME trap from AArch32 mode when using NEON.
27
+#define ARM_TBFLAG_ZCR_LEN_MASK (0xf << ARM_TBFLAG_ZCR_LEN_SHIFT)
47
+ */
28
48
+FIELD(TBFLAG_A32, SME_TRAP_NONSTREAMING, 11, 1)
29
/* some convenience accessor macros */
49
30
#define ARM_TBFLAG_AARCH64_STATE(F) \
50
/*
31
@@ -XXX,XX +XXX,XX @@ static inline bool arm_cpu_data_is_big_endian(CPUARMState *env)
51
* Bit usage when in AArch32 state, for M-profile only.
32
(((F) & ARM_TBFLAG_TBI0_MASK) >> ARM_TBFLAG_TBI0_SHIFT)
52
@@ -XXX,XX +XXX,XX @@ FIELD(TBFLAG_A64, SMEEXC_EL, 20, 2)
33
#define ARM_TBFLAG_TBI1(F) \
53
FIELD(TBFLAG_A64, PSTATE_SM, 22, 1)
34
(((F) & ARM_TBFLAG_TBI1_MASK) >> ARM_TBFLAG_TBI1_SHIFT)
54
FIELD(TBFLAG_A64, PSTATE_ZA, 23, 1)
35
+#define ARM_TBFLAG_SVEEXC_EL(F) \
55
FIELD(TBFLAG_A64, SVL, 24, 4)
36
+ (((F) & ARM_TBFLAG_SVEEXC_EL_MASK) >> ARM_TBFLAG_SVEEXC_EL_SHIFT)
56
+/* Indicates that SME Streaming mode is active, and SMCR_ELx.FA64 is not. */
37
+#define ARM_TBFLAG_ZCR_LEN(F) \
57
+FIELD(TBFLAG_A64, SME_TRAP_NONSTREAMING, 28, 1)
38
+ (((F) & ARM_TBFLAG_ZCR_LEN_MASK) >> ARM_TBFLAG_ZCR_LEN_SHIFT)
58
39
59
/*
40
static inline bool bswap_code(bool sctlr_b)
60
* Helpers for using the above.
41
{
42
diff --git a/target/arm/translate.h b/target/arm/translate.h
61
diff --git a/target/arm/translate.h b/target/arm/translate.h
43
index XXXXXXX..XXXXXXX 100644
62
index XXXXXXX..XXXXXXX 100644
44
--- a/target/arm/translate.h
63
--- a/target/arm/translate.h
45
+++ b/target/arm/translate.h
64
+++ b/target/arm/translate.h
46
@@ -XXX,XX +XXX,XX @@ typedef struct DisasContext {
65
@@ -XXX,XX +XXX,XX @@ typedef struct DisasContext {
47
bool tbi1; /* TBI1 for EL0/1, not used for EL2/3 */
66
bool pstate_sm;
48
bool ns; /* Use non-secure CPREG bank on access */
67
/* True if PSTATE.ZA is set. */
49
int fp_excp_el; /* FP exception EL or 0 if enabled */
68
bool pstate_za;
50
+ int sve_excp_el; /* SVE exception EL or 0 if enabled */
69
+ /* True if non-streaming insns should raise an SME Streaming exception. */
51
+ int sve_len; /* SVE vector length in bytes */
70
+ bool sme_trap_nonstreaming;
52
/* Flag indicating that exceptions from secure mode are routed to EL3. */
71
+ /* True if the current instruction is non-streaming. */
53
bool secure_routed_to_el3;
72
+ bool is_nonstreaming;
54
bool vfp_enabled; /* FP enabled via FPSCR.EN */
73
/* True if MVE insns are definitely not predicated by VPR or LTPSIZE */
74
bool mve_no_pred;
75
/*
76
diff --git a/target/arm/sme-fa64.decode b/target/arm/sme-fa64.decode
77
new file mode 100644
78
index XXXXXXX..XXXXXXX
79
--- /dev/null
80
+++ b/target/arm/sme-fa64.decode
81
@@ -XXX,XX +XXX,XX @@
82
+# AArch64 SME allowed instruction decoding
83
+#
84
+# Copyright (c) 2022 Linaro, Ltd
85
+#
86
+# This library is free software; you can redistribute it and/or
87
+# modify it under the terms of the GNU Lesser General Public
88
+# License as published by the Free Software Foundation; either
89
+# version 2.1 of the License, or (at your option) any later version.
90
+#
91
+# This library is distributed in the hope that it will be useful,
92
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
93
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
94
+# Lesser General Public License for more details.
95
+#
96
+# You should have received a copy of the GNU Lesser General Public
97
+# License along with this library; if not, see <http://www.gnu.org/licenses/>.
98
+
99
+#
100
+# This file is processed by scripts/decodetree.py
101
+#
102
+
103
+# These patterns are taken from Appendix E1.1 of DDI0616 A.a,
104
+# Arm Architecture Reference Manual Supplement,
105
+# The Scalable Matrix Extension (SME), for Armv9-A
106
+
107
+{
108
+ [
109
+ OK 0-00 1110 0000 0001 0010 11-- ---- ---- # SMOV W|Xd,Vn.B[0]
110
+ OK 0-00 1110 0000 0010 0010 11-- ---- ---- # SMOV W|Xd,Vn.H[0]
111
+ OK 0100 1110 0000 0100 0010 11-- ---- ---- # SMOV Xd,Vn.S[0]
112
+ OK 0000 1110 0000 0001 0011 11-- ---- ---- # UMOV Wd,Vn.B[0]
113
+ OK 0000 1110 0000 0010 0011 11-- ---- ---- # UMOV Wd,Vn.H[0]
114
+ OK 0000 1110 0000 0100 0011 11-- ---- ---- # UMOV Wd,Vn.S[0]
115
+ OK 0100 1110 0000 1000 0011 11-- ---- ---- # UMOV Xd,Vn.D[0]
116
+ ]
117
+ FAIL 0--0 111- ---- ---- ---- ---- ---- ---- # Advanced SIMD vector operations
118
+}
119
+
120
+{
121
+ [
122
+ OK 0101 1110 --1- ---- 11-1 11-- ---- ---- # FMULX/FRECPS/FRSQRTS (scalar)
123
+ OK 0101 1110 -10- ---- 00-1 11-- ---- ---- # FMULX/FRECPS/FRSQRTS (scalar, FP16)
124
+ OK 01-1 1110 1-10 0001 11-1 10-- ---- ---- # FRECPE/FRSQRTE/FRECPX (scalar)
125
+ OK 01-1 1110 1111 1001 11-1 10-- ---- ---- # FRECPE/FRSQRTE/FRECPX (scalar, FP16)
126
+ ]
127
+ FAIL 01-1 111- ---- ---- ---- ---- ---- ---- # Advanced SIMD single-element operations
128
+}
129
+
130
+FAIL 0-00 110- ---- ---- ---- ---- ---- ---- # Advanced SIMD structure load/store
131
+FAIL 1100 1110 ---- ---- ---- ---- ---- ---- # Advanced SIMD cryptography extensions
132
+FAIL 0001 1110 0111 1110 0000 00-- ---- ---- # FJCVTZS
133
+
134
+# These are the "avoidance of doubt" final table of Illegal Advanced SIMD instructions
135
+# We don't actually need to include these, as the default is OK.
136
+# -001 111- ---- ---- ---- ---- ---- ---- # Scalar floating-point operations
137
+# --10 110- ---- ---- ---- ---- ---- ---- # Load/store pair of FP registers
138
+# --01 1100 ---- ---- ---- ---- ---- ---- # Load FP register (PC-relative literal)
139
+# --11 1100 --0- ---- ---- ---- ---- ---- # Load/store FP register (unscaled imm)
140
+# --11 1100 --1- ---- ---- ---- ---- --10 # Load/store FP register (register offset)
141
+# --11 1101 ---- ---- ---- ---- ---- ---- # Load/store FP register (scaled imm)
142
+
143
+FAIL 0000 0100 --1- ---- 1010 ---- ---- ---- # ADR
144
+FAIL 0000 0100 --1- ---- 1011 -0-- ---- ---- # FTSSEL, FEXPA
145
+FAIL 0000 0101 --10 0001 100- ---- ---- ---- # COMPACT
146
+FAIL 0010 0101 --01 100- 1111 000- ---0 ---- # RDFFR, RDFFRS
147
+FAIL 0010 0101 --10 1--- 1001 ---- ---- ---- # WRFFR, SETFFR
148
+FAIL 0100 0101 --0- ---- 1011 ---- ---- ---- # BDEP, BEXT, BGRP
149
+FAIL 0100 0101 000- ---- 0110 1--- ---- ---- # PMULLB, PMULLT (128b result)
150
+FAIL 0110 0100 --1- ---- 1110 01-- ---- ---- # FMMLA, BFMMLA
151
+FAIL 0110 0101 --0- ---- 0000 11-- ---- ---- # FTSMUL
152
+FAIL 0110 0101 --01 0--- 100- ---- ---- ---- # FTMAD
153
+FAIL 0110 0101 --01 1--- 001- ---- ---- ---- # FADDA
154
+FAIL 0100 0101 --0- ---- 1001 10-- ---- ---- # SMMLA, UMMLA, USMMLA
155
+FAIL 0100 0101 --1- ---- 1--- ---- ---- ---- # SVE2 string/histo/crypto instructions
156
+FAIL 1000 010- -00- ---- 10-- ---- ---- ---- # SVE2 32-bit gather NT load (vector+scalar)
157
+FAIL 1000 010- -00- ---- 111- ---- ---- ---- # SVE 32-bit gather prefetch (vector+imm)
158
+FAIL 1000 0100 0-1- ---- 0--- ---- ---- ---- # SVE 32-bit gather prefetch (scalar+vector)
159
+FAIL 1000 010- -01- ---- 1--- ---- ---- ---- # SVE 32-bit gather load (vector+imm)
160
+FAIL 1000 0100 0-0- ---- 0--- ---- ---- ---- # SVE 32-bit gather load byte (scalar+vector)
161
+FAIL 1000 0100 1--- ---- 0--- ---- ---- ---- # SVE 32-bit gather load half (scalar+vector)
162
+FAIL 1000 0101 0--- ---- 0--- ---- ---- ---- # SVE 32-bit gather load word (scalar+vector)
163
+FAIL 1010 010- ---- ---- 011- ---- ---- ---- # SVE contiguous FF load (scalar+scalar)
164
+FAIL 1010 010- ---1 ---- 101- ---- ---- ---- # SVE contiguous NF load (scalar+imm)
165
+FAIL 1010 010- -01- ---- 000- ---- ---- ---- # SVE load & replicate 32 bytes (scalar+scalar)
166
+FAIL 1010 010- -010 ---- 001- ---- ---- ---- # SVE load & replicate 32 bytes (scalar+imm)
167
+FAIL 1100 010- ---- ---- ---- ---- ---- ---- # SVE 64-bit gather load/prefetch
168
+FAIL 1110 010- -00- ---- 001- ---- ---- ---- # SVE2 64-bit scatter NT store (vector+scalar)
169
+FAIL 1110 010- -10- ---- 001- ---- ---- ---- # SVE2 32-bit scatter NT store (vector+scalar)
170
+FAIL 1110 010- ---- ---- 1-0- ---- ---- ---- # SVE scatter store (scalar+32-bit vector)
171
+FAIL 1110 010- ---- ---- 101- ---- ---- ---- # SVE scatter store (misc)
55
diff --git a/target/arm/helper.c b/target/arm/helper.c
172
diff --git a/target/arm/helper.c b/target/arm/helper.c
56
index XXXXXXX..XXXXXXX 100644
173
index XXXXXXX..XXXXXXX 100644
57
--- a/target/arm/helper.c
174
--- a/target/arm/helper.c
58
+++ b/target/arm/helper.c
175
+++ b/target/arm/helper.c
59
@@ -XXX,XX +XXX,XX @@ void cpu_get_tb_cpu_state(CPUARMState *env, target_ulong *pc,
176
@@ -XXX,XX +XXX,XX @@ int sme_exception_el(CPUARMState *env, int el)
60
target_ulong *cs_base, uint32_t *pflags)
177
return 0;
61
{
178
}
62
ARMMMUIdx mmu_idx = core_to_arm_mmu_idx(env, cpu_mmu_index(env, false));
179
63
+ int fp_el = fp_exception_el(env);
180
+/* This corresponds to the ARM pseudocode function IsFullA64Enabled(). */
64
uint32_t flags;
181
+static bool sme_fa64(CPUARMState *env, int el)
65
182
+{
66
if (is_a64(env)) {
183
+ if (!cpu_isar_feature(aa64_sme_fa64, env_archcpu(env))) {
67
+ int sve_el = sve_exception_el(env);
184
+ return false;
68
+ uint32_t zcr_len;
185
+ }
69
+
186
+
70
*pc = env->pc;
187
+ if (el <= 1 && !el_is_in_host(env, el)) {
71
flags = ARM_TBFLAG_AARCH64_STATE_MASK;
188
+ if (!FIELD_EX64(env->vfp.smcr_el[1], SMCR, FA64)) {
72
/* Get control bits for tagged addresses */
189
+ return false;
73
flags |= (arm_regime_tbi0(env, mmu_idx) << ARM_TBFLAG_TBI0_SHIFT);
74
flags |= (arm_regime_tbi1(env, mmu_idx) << ARM_TBFLAG_TBI1_SHIFT);
75
+ flags |= sve_el << ARM_TBFLAG_SVEEXC_EL_SHIFT;
76
+
77
+ /* If SVE is disabled, but FP is enabled,
78
+ then the effective len is 0. */
79
+ if (sve_el != 0 && fp_el == 0) {
80
+ zcr_len = 0;
81
+ } else {
82
+ int current_el = arm_current_el(env);
83
+
84
+ zcr_len = env->vfp.zcr_el[current_el <= 1 ? 1 : current_el];
85
+ zcr_len &= 0xf;
86
+ if (current_el < 2 && arm_feature(env, ARM_FEATURE_EL2)) {
87
+ zcr_len = MIN(zcr_len, 0xf & (uint32_t)env->vfp.zcr_el[2]);
88
+ }
89
+ if (current_el < 3 && arm_feature(env, ARM_FEATURE_EL3)) {
90
+ zcr_len = MIN(zcr_len, 0xf & (uint32_t)env->vfp.zcr_el[3]);
91
+ }
92
+ }
190
+ }
93
+ flags |= zcr_len << ARM_TBFLAG_ZCR_LEN_SHIFT;
191
+ }
94
} else {
192
+ if (el <= 2 && arm_is_el2_enabled(env)) {
95
*pc = env->regs[15];
193
+ if (!FIELD_EX64(env->vfp.smcr_el[2], SMCR, FA64)) {
96
flags = (env->thumb << ARM_TBFLAG_THUMB_SHIFT)
194
+ return false;
97
@@ -XXX,XX +XXX,XX @@ void cpu_get_tb_cpu_state(CPUARMState *env, target_ulong *pc,
195
+ }
98
if (arm_cpu_data_is_big_endian(env)) {
196
+ }
99
flags |= ARM_TBFLAG_BE_DATA_MASK;
197
+ if (arm_feature(env, ARM_FEATURE_EL3)) {
100
}
198
+ if (!FIELD_EX64(env->vfp.smcr_el[3], SMCR, FA64)) {
101
- flags |= fp_exception_el(env) << ARM_TBFLAG_FPEXC_EL_SHIFT;
199
+ return false;
102
+ flags |= fp_el << ARM_TBFLAG_FPEXC_EL_SHIFT;
200
+ }
103
201
+ }
104
if (arm_v7m_is_handler_mode(env)) {
202
+
105
flags |= ARM_TBFLAG_HANDLER_MASK;
203
+ return true;
204
+}
205
+
206
/*
207
* Given that SVE is enabled, return the vector length for EL.
208
*/
209
@@ -XXX,XX +XXX,XX @@ static CPUARMTBFlags rebuild_hflags_a32(CPUARMState *env, int fp_el,
210
DP_TBFLAG_ANY(flags, PSTATE__IL, 1);
211
}
212
213
+ /*
214
+ * The SME exception we are testing for is raised via
215
+ * AArch64.CheckFPAdvSIMDEnabled(), as called from
216
+ * AArch32.CheckAdvSIMDOrFPEnabled().
217
+ */
218
+ if (el == 0
219
+ && FIELD_EX64(env->svcr, SVCR, SM)
220
+ && (!arm_is_el2_enabled(env)
221
+ || (arm_el_is_aa64(env, 2) && !(env->cp15.hcr_el2 & HCR_TGE)))
222
+ && arm_el_is_aa64(env, 1)
223
+ && !sme_fa64(env, el)) {
224
+ DP_TBFLAG_A32(flags, SME_TRAP_NONSTREAMING, 1);
225
+ }
226
+
227
return rebuild_hflags_common_32(env, fp_el, mmu_idx, flags);
228
}
229
230
@@ -XXX,XX +XXX,XX @@ static CPUARMTBFlags rebuild_hflags_a64(CPUARMState *env, int el, int fp_el,
231
}
232
if (FIELD_EX64(env->svcr, SVCR, SM)) {
233
DP_TBFLAG_A64(flags, PSTATE_SM, 1);
234
+ DP_TBFLAG_A64(flags, SME_TRAP_NONSTREAMING, !sme_fa64(env, el));
235
}
236
DP_TBFLAG_A64(flags, PSTATE_ZA, FIELD_EX64(env->svcr, SVCR, ZA));
237
}
106
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
238
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
107
index XXXXXXX..XXXXXXX 100644
239
index XXXXXXX..XXXXXXX 100644
108
--- a/target/arm/translate-a64.c
240
--- a/target/arm/translate-a64.c
109
+++ b/target/arm/translate-a64.c
241
+++ b/target/arm/translate-a64.c
110
@@ -XXX,XX +XXX,XX @@ static int aarch64_tr_init_disas_context(DisasContextBase *dcbase,
242
@@ -XXX,XX +XXX,XX @@ static void do_vec_ld(DisasContext *s, int destidx, int element,
111
dc->user = (dc->current_el == 0);
243
* unallocated-encoding checks (otherwise the syndrome information
112
#endif
244
* for the resulting exception will be incorrect).
113
dc->fp_excp_el = ARM_TBFLAG_FPEXC_EL(dc->base.tb->flags);
245
*/
114
+ dc->sve_excp_el = ARM_TBFLAG_SVEEXC_EL(dc->base.tb->flags);
246
-static bool fp_access_check(DisasContext *s)
115
+ dc->sve_len = (ARM_TBFLAG_ZCR_LEN(dc->base.tb->flags) + 1) * 16;
247
+static bool fp_access_check_only(DisasContext *s)
248
{
249
if (s->fp_excp_el) {
250
assert(!s->fp_access_checked);
251
@@ -XXX,XX +XXX,XX @@ static bool fp_access_check(DisasContext *s)
252
return true;
253
}
254
255
+static bool fp_access_check(DisasContext *s)
256
+{
257
+ if (!fp_access_check_only(s)) {
258
+ return false;
259
+ }
260
+ if (s->sme_trap_nonstreaming && s->is_nonstreaming) {
261
+ gen_exception_insn(s, s->pc_curr, EXCP_UDEF,
262
+ syn_smetrap(SME_ET_Streaming, false));
263
+ return false;
264
+ }
265
+ return true;
266
+}
267
+
268
/* Check that SVE access is enabled. If it is, return true.
269
* If not, emit code to generate an appropriate exception and return false.
270
*/
271
@@ -XXX,XX +XXX,XX @@ static void handle_sys(DisasContext *s, uint32_t insn, bool isread,
272
default:
273
g_assert_not_reached();
274
}
275
- if ((ri->type & ARM_CP_FPU) && !fp_access_check(s)) {
276
+ if ((ri->type & ARM_CP_FPU) && !fp_access_check_only(s)) {
277
return;
278
} else if ((ri->type & ARM_CP_SVE) && !sve_access_check(s)) {
279
return;
280
@@ -XXX,XX +XXX,XX @@ static void disas_data_proc_simd_fp(DisasContext *s, uint32_t insn)
281
}
282
}
283
284
+/*
285
+ * Include the generated SME FA64 decoder.
286
+ */
287
+
288
+#include "decode-sme-fa64.c.inc"
289
+
290
+static bool trans_OK(DisasContext *s, arg_OK *a)
291
+{
292
+ return true;
293
+}
294
+
295
+static bool trans_FAIL(DisasContext *s, arg_OK *a)
296
+{
297
+ s->is_nonstreaming = true;
298
+ return true;
299
+}
300
+
301
/**
302
* is_guarded_page:
303
* @env: The cpu environment
304
@@ -XXX,XX +XXX,XX @@ static void aarch64_tr_init_disas_context(DisasContextBase *dcbase,
305
dc->mte_active[1] = EX_TBFLAG_A64(tb_flags, MTE0_ACTIVE);
306
dc->pstate_sm = EX_TBFLAG_A64(tb_flags, PSTATE_SM);
307
dc->pstate_za = EX_TBFLAG_A64(tb_flags, PSTATE_ZA);
308
+ dc->sme_trap_nonstreaming = EX_TBFLAG_A64(tb_flags, SME_TRAP_NONSTREAMING);
116
dc->vec_len = 0;
309
dc->vec_len = 0;
117
dc->vec_stride = 0;
310
dc->vec_stride = 0;
118
dc->cp_regs = arm_cpu->cp_regs;
311
dc->cp_regs = arm_cpu->cp_regs;
312
@@ -XXX,XX +XXX,XX @@ static void aarch64_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu)
313
}
314
}
315
316
+ s->is_nonstreaming = false;
317
+ if (s->sme_trap_nonstreaming) {
318
+ disas_sme_fa64(s, insn);
319
+ }
320
+
321
switch (extract32(insn, 25, 4)) {
322
case 0x0:
323
if (!extract32(insn, 31, 1) || !disas_sme(s, insn)) {
324
diff --git a/target/arm/translate-vfp.c b/target/arm/translate-vfp.c
325
index XXXXXXX..XXXXXXX 100644
326
--- a/target/arm/translate-vfp.c
327
+++ b/target/arm/translate-vfp.c
328
@@ -XXX,XX +XXX,XX @@ static bool vfp_access_check_a(DisasContext *s, bool ignore_vfp_enabled)
329
return false;
330
}
331
332
+ /*
333
+ * Note that rebuild_hflags_a32 has already accounted for being in EL0
334
+ * and the higher EL in A64 mode, etc. Unlike A64 mode, there do not
335
+ * appear to be any insns which touch VFP which are allowed.
336
+ */
337
+ if (s->sme_trap_nonstreaming) {
338
+ gen_exception_insn(s, s->pc_curr, EXCP_UDEF,
339
+ syn_smetrap(SME_ET_Streaming,
340
+ s->base.pc_next - s->pc_curr == 2));
341
+ return false;
342
+ }
343
+
344
if (!s->vfp_enabled && !ignore_vfp_enabled) {
345
assert(!arm_dc_feature(s, ARM_FEATURE_M));
346
unallocated_encoding(s);
347
diff --git a/target/arm/translate.c b/target/arm/translate.c
348
index XXXXXXX..XXXXXXX 100644
349
--- a/target/arm/translate.c
350
+++ b/target/arm/translate.c
351
@@ -XXX,XX +XXX,XX @@ static void arm_tr_init_disas_context(DisasContextBase *dcbase, CPUState *cs)
352
dc->vec_len = EX_TBFLAG_A32(tb_flags, VECLEN);
353
dc->vec_stride = EX_TBFLAG_A32(tb_flags, VECSTRIDE);
354
}
355
+ dc->sme_trap_nonstreaming =
356
+ EX_TBFLAG_A32(tb_flags, SME_TRAP_NONSTREAMING);
357
}
358
dc->cp_regs = cpu->cp_regs;
359
dc->features = env->features;
360
diff --git a/target/arm/meson.build b/target/arm/meson.build
361
index XXXXXXX..XXXXXXX 100644
362
--- a/target/arm/meson.build
363
+++ b/target/arm/meson.build
364
@@ -XXX,XX +XXX,XX @@
365
gen = [
366
decodetree.process('sve.decode', extra_args: '--decode=disas_sve'),
367
decodetree.process('sme.decode', extra_args: '--decode=disas_sme'),
368
+ decodetree.process('sme-fa64.decode', extra_args: '--static-decode=disas_sme_fa64'),
369
decodetree.process('neon-shared.decode', extra_args: '--decode=disas_neon_shared'),
370
decodetree.process('neon-dp.decode', extra_args: '--decode=disas_neon_dp'),
371
decodetree.process('neon-ls.decode', extra_args: '--decode=disas_neon_ls'),
119
--
372
--
120
2.16.1
373
2.25.1
121
122
diff view generated by jsdifflib
1
From: Andrey Smirnov <andrew.smirnov@gmail.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
IP block found on several generations of i.MX family does not use
3
Mark ADR as a non-streaming instruction, which should trap
4
vanilla SDHCI implementation and it comes with a number of quirks.
4
if full a64 support is not enabled in streaming mode.
5
5
6
Introduce i.MX SDHCI subtype of SDHCI block to add code necessary to
6
Removing entries from sme-fa64.decode is an easy way to see
7
support unmodified Linux guest driver.
7
what remains to be done.
8
8
9
Cc: Peter Maydell <peter.maydell@linaro.org>
10
Cc: Jason Wang <jasowang@redhat.com>
11
Cc: Philippe Mathieu-Daudé <f4bug@amsat.org>
12
Cc: Marcel Apfelbaum <marcel.apfelbaum@zoho.com>
13
Cc: Michael S. Tsirkin <mst@redhat.com>
14
Cc: qemu-devel@nongnu.org
15
Cc: qemu-arm@nongnu.org
16
Cc: yurovsky@gmail.com
17
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
18
Signed-off-by: Andrey Smirnov <andrew.smirnov@gmail.com>
10
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
19
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
11
Message-id: 20220708151540.18136-5-richard.henderson@linaro.org
20
[PMM: define and use ESDHC_UNDOCUMENTED_REG27]
21
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
22
---
13
---
23
hw/sd/sdhci-internal.h | 23 +++++
14
target/arm/translate.h | 7 +++++++
24
include/hw/sd/sdhci.h | 13 +++
15
target/arm/sme-fa64.decode | 1 -
25
hw/sd/sdhci.c | 230 ++++++++++++++++++++++++++++++++++++++++++++++++-
16
target/arm/translate-sve.c | 8 ++++----
26
3 files changed, 265 insertions(+), 1 deletion(-)
17
3 files changed, 11 insertions(+), 5 deletions(-)
27
18
28
diff --git a/hw/sd/sdhci-internal.h b/hw/sd/sdhci-internal.h
19
diff --git a/target/arm/translate.h b/target/arm/translate.h
29
index XXXXXXX..XXXXXXX 100644
20
index XXXXXXX..XXXXXXX 100644
30
--- a/hw/sd/sdhci-internal.h
21
--- a/target/arm/translate.h
31
+++ b/hw/sd/sdhci-internal.h
22
+++ b/target/arm/translate.h
32
@@ -XXX,XX +XXX,XX @@
23
@@ -XXX,XX +XXX,XX @@ uint64_t asimd_imm_const(uint32_t imm, int cmode, int op);
33
24
static bool trans_##NAME(DisasContext *s, arg_##NAME *a) \
34
/* R/W Host control Register 0x0 */
25
{ return dc_isar_feature(FEAT, s) && FUNC(s, __VA_ARGS__); }
35
#define SDHC_HOSTCTL 0x28
26
36
+#define SDHC_CTRL_LED 0x01
27
+#define TRANS_FEAT_NONSTREAMING(NAME, FEAT, FUNC, ...) \
37
#define SDHC_CTRL_DMA_CHECK_MASK 0x18
28
+ static bool trans_##NAME(DisasContext *s, arg_##NAME *a) \
38
#define SDHC_CTRL_SDMA 0x00
29
+ { \
39
#define SDHC_CTRL_ADMA1_32 0x08
30
+ s->is_nonstreaming = true; \
40
#define SDHC_CTRL_ADMA2_32 0x10
31
+ return dc_isar_feature(FEAT, s) && FUNC(s, __VA_ARGS__); \
41
#define SDHC_CTRL_ADMA2_64 0x18
42
#define SDHC_DMA_TYPE(x) ((x) & SDHC_CTRL_DMA_CHECK_MASK)
43
+#define SDHC_CTRL_4BITBUS 0x02
44
+#define SDHC_CTRL_8BITBUS 0x20
45
+#define SDHC_CTRL_CDTEST_INS 0x40
46
+#define SDHC_CTRL_CDTEST_EN 0x80
47
+
48
49
/* R/W Power Control Register 0x0 */
50
#define SDHC_PWRCON 0x29
51
@@ -XXX,XX +XXX,XX @@ enum {
52
sdhc_gap_write = 2 /* SDHC stopped at block gap during write operation */
53
};
54
55
+extern const VMStateDescription sdhci_vmstate;
56
+
57
+
58
+#define ESDHC_MIX_CTRL 0x48
59
+#define ESDHC_VENDOR_SPEC 0xc0
60
+#define ESDHC_DLL_CTRL 0x60
61
+
62
+#define ESDHC_TUNING_CTRL 0xcc
63
+#define ESDHC_TUNE_CTRL_STATUS 0x68
64
+#define ESDHC_WTMK_LVL 0x44
65
+
66
+/* Undocumented register used by guests working around erratum ERR004536 */
67
+#define ESDHC_UNDOCUMENTED_REG27 0x6c
68
+
69
+#define ESDHC_CTRL_4BITBUS (0x1 << 1)
70
+#define ESDHC_CTRL_8BITBUS (0x2 << 1)
71
+
72
#endif
73
diff --git a/include/hw/sd/sdhci.h b/include/hw/sd/sdhci.h
74
index XXXXXXX..XXXXXXX 100644
75
--- a/include/hw/sd/sdhci.h
76
+++ b/include/hw/sd/sdhci.h
77
@@ -XXX,XX +XXX,XX @@ typedef struct SDHCIState {
78
AddressSpace sysbus_dma_as;
79
AddressSpace *dma_as;
80
MemoryRegion *dma_mr;
81
+ const MemoryRegionOps *io_ops;
82
83
QEMUTimer *insert_timer; /* timer for 'changing' sd card. */
84
QEMUTimer *transfer_timer;
85
@@ -XXX,XX +XXX,XX @@ typedef struct SDHCIState {
86
87
/* Configurable properties */
88
bool pending_insert_quirk; /* Quirk for Raspberry Pi card insert int */
89
+ uint32_t quirks;
90
} SDHCIState;
91
92
+/*
93
+ * Controller does not provide transfer-complete interrupt when not
94
+ * busy.
95
+ *
96
+ * NOTE: This definition is taken out of Linux kernel and so the
97
+ * original bit number is preserved
98
+ */
99
+#define SDHCI_QUIRK_NO_BUSY_IRQ BIT(14)
100
+
101
#define TYPE_PCI_SDHCI "sdhci-pci"
102
#define PCI_SDHCI(obj) OBJECT_CHECK(SDHCIState, (obj), TYPE_PCI_SDHCI)
103
104
@@ -XXX,XX +XXX,XX @@ typedef struct SDHCIState {
105
#define SYSBUS_SDHCI(obj) \
106
OBJECT_CHECK(SDHCIState, (obj), TYPE_SYSBUS_SDHCI)
107
108
+#define TYPE_IMX_USDHC "imx-usdhc"
109
+
110
#endif /* SDHCI_H */
111
diff --git a/hw/sd/sdhci.c b/hw/sd/sdhci.c
112
index XXXXXXX..XXXXXXX 100644
113
--- a/hw/sd/sdhci.c
114
+++ b/hw/sd/sdhci.c
115
@@ -XXX,XX +XXX,XX @@ static void sdhci_send_command(SDHCIState *s)
116
}
117
}
118
119
- if ((s->norintstsen & SDHC_NISEN_TRSCMP) &&
120
+ if (!(s->quirks & SDHCI_QUIRK_NO_BUSY_IRQ) &&
121
+ (s->norintstsen & SDHC_NISEN_TRSCMP) &&
122
(s->cmdreg & SDHC_CMD_RESPONSE) == SDHC_CMD_RSP_WITH_BUSY) {
123
s->norintsts |= SDHC_NIS_TRSCMP;
124
}
125
@@ -XXX,XX +XXX,XX @@ static void sdhci_initfn(SDHCIState *s)
126
127
s->insert_timer = timer_new_ns(QEMU_CLOCK_VIRTUAL, sdhci_raise_insertion_irq, s);
128
s->transfer_timer = timer_new_ns(QEMU_CLOCK_VIRTUAL, sdhci_data_transfer, s);
129
+
130
+ s->io_ops = &sdhci_mmio_ops;
131
}
132
133
static void sdhci_uninitfn(SDHCIState *s)
134
@@ -XXX,XX +XXX,XX @@ static void sdhci_sysbus_realize(DeviceState *dev, Error ** errp)
135
}
136
137
sysbus_init_irq(sbd, &s->irq);
138
+
139
+ memory_region_init_io(&s->iomem, OBJECT(s), s->io_ops, s, "sdhci",
140
+ SDHC_REGISTERS_MAP_SIZE);
141
+
142
sysbus_init_mmio(sbd, &s->iomem);
143
}
144
145
@@ -XXX,XX +XXX,XX @@ static const TypeInfo sdhci_bus_info = {
146
.class_init = sdhci_bus_class_init,
147
};
148
149
+static uint64_t usdhc_read(void *opaque, hwaddr offset, unsigned size)
150
+{
151
+ SDHCIState *s = SYSBUS_SDHCI(opaque);
152
+ uint32_t ret;
153
+ uint16_t hostctl;
154
+
155
+ switch (offset) {
156
+ default:
157
+ return sdhci_read(opaque, offset, size);
158
+
159
+ case SDHC_HOSTCTL:
160
+ /*
161
+ * For a detailed explanation on the following bit
162
+ * manipulation code see comments in a similar part of
163
+ * usdhc_write()
164
+ */
165
+ hostctl = SDHC_DMA_TYPE(s->hostctl) << (8 - 3);
166
+
167
+ if (s->hostctl & SDHC_CTRL_8BITBUS) {
168
+ hostctl |= ESDHC_CTRL_8BITBUS;
169
+ }
170
+
171
+ if (s->hostctl & SDHC_CTRL_4BITBUS) {
172
+ hostctl |= ESDHC_CTRL_4BITBUS;
173
+ }
174
+
175
+ ret = hostctl;
176
+ ret |= (uint32_t)s->blkgap << 16;
177
+ ret |= (uint32_t)s->wakcon << 24;
178
+
179
+ break;
180
+
181
+ case ESDHC_DLL_CTRL:
182
+ case ESDHC_TUNE_CTRL_STATUS:
183
+ case ESDHC_UNDOCUMENTED_REG27:
184
+ case ESDHC_TUNING_CTRL:
185
+ case ESDHC_VENDOR_SPEC:
186
+ case ESDHC_MIX_CTRL:
187
+ case ESDHC_WTMK_LVL:
188
+ ret = 0;
189
+ break;
190
+ }
32
+ }
191
+
33
+
192
+ return ret;
34
#endif /* TARGET_ARM_TRANSLATE_H */
193
+}
35
diff --git a/target/arm/sme-fa64.decode b/target/arm/sme-fa64.decode
194
+
36
index XXXXXXX..XXXXXXX 100644
195
+static void
37
--- a/target/arm/sme-fa64.decode
196
+usdhc_write(void *opaque, hwaddr offset, uint64_t val, unsigned size)
38
+++ b/target/arm/sme-fa64.decode
197
+{
39
@@ -XXX,XX +XXX,XX @@ FAIL 0001 1110 0111 1110 0000 00-- ---- ---- # FJCVTZS
198
+ SDHCIState *s = SYSBUS_SDHCI(opaque);
40
# --11 1100 --1- ---- ---- ---- ---- --10 # Load/store FP register (register offset)
199
+ uint8_t hostctl;
41
# --11 1101 ---- ---- ---- ---- ---- ---- # Load/store FP register (scaled imm)
200
+ uint32_t value = (uint32_t)val;
42
201
+
43
-FAIL 0000 0100 --1- ---- 1010 ---- ---- ---- # ADR
202
+ switch (offset) {
44
FAIL 0000 0100 --1- ---- 1011 -0-- ---- ---- # FTSSEL, FEXPA
203
+ case ESDHC_DLL_CTRL:
45
FAIL 0000 0101 --10 0001 100- ---- ---- ---- # COMPACT
204
+ case ESDHC_TUNE_CTRL_STATUS:
46
FAIL 0010 0101 --01 100- 1111 000- ---0 ---- # RDFFR, RDFFRS
205
+ case ESDHC_UNDOCUMENTED_REG27:
47
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
206
+ case ESDHC_TUNING_CTRL:
48
index XXXXXXX..XXXXXXX 100644
207
+ case ESDHC_WTMK_LVL:
49
--- a/target/arm/translate-sve.c
208
+ case ESDHC_VENDOR_SPEC:
50
+++ b/target/arm/translate-sve.c
209
+ break;
51
@@ -XXX,XX +XXX,XX @@ static bool do_adr(DisasContext *s, arg_rrri *a, gen_helper_gvec_3 *fn)
210
+
52
return gen_gvec_ool_zzz(s, fn, a->rd, a->rn, a->rm, a->imm);
211
+ case SDHC_HOSTCTL:
212
+ /*
213
+ * Here's What ESDHCI has at offset 0x28 (SDHC_HOSTCTL)
214
+ *
215
+ * 7 6 5 4 3 2 1 0
216
+ * |-----------+--------+--------+-----------+----------+---------|
217
+ * | Card | Card | Endian | DATA3 | Data | Led |
218
+ * | Detect | Detect | Mode | as Card | Transfer | Control |
219
+ * | Signal | Test | | Detection | Width | |
220
+ * | Selection | Level | | Pin | | |
221
+ * |-----------+--------+--------+-----------+----------+---------|
222
+ *
223
+ * and 0x29
224
+ *
225
+ * 15 10 9 8
226
+ * |----------+------|
227
+ * | Reserved | DMA |
228
+ * | | Sel. |
229
+ * | | |
230
+ * |----------+------|
231
+ *
232
+ * and here's what SDCHI spec expects those offsets to be:
233
+ *
234
+ * 0x28 (Host Control Register)
235
+ *
236
+ * 7 6 5 4 3 2 1 0
237
+ * |--------+--------+----------+------+--------+----------+---------|
238
+ * | Card | Card | Extended | DMA | High | Data | LED |
239
+ * | Detect | Detect | Data | Sel. | Speed | Transfer | Control |
240
+ * | Signal | Test | Transfer | | Enable | Width | |
241
+ * | Sel. | Level | Width | | | | |
242
+ * |--------+--------+----------+------+--------+----------+---------|
243
+ *
244
+ * and 0x29 (Power Control Register)
245
+ *
246
+ * |----------------------------------|
247
+ * | Power Control Register |
248
+ * | |
249
+ * | Description omitted, |
250
+ * | since it has no analog in ESDHCI |
251
+ * | |
252
+ * |----------------------------------|
253
+ *
254
+ * Since offsets 0x2A and 0x2B should be compatible between
255
+ * both IP specs we only need to reconcile least 16-bit of the
256
+ * word we've been given.
257
+ */
258
+
259
+ /*
260
+ * First, save bits 7 6 and 0 since they are identical
261
+ */
262
+ hostctl = value & (SDHC_CTRL_LED |
263
+ SDHC_CTRL_CDTEST_INS |
264
+ SDHC_CTRL_CDTEST_EN);
265
+ /*
266
+ * Second, split "Data Transfer Width" from bits 2 and 1 in to
267
+ * bits 5 and 1
268
+ */
269
+ if (value & ESDHC_CTRL_8BITBUS) {
270
+ hostctl |= SDHC_CTRL_8BITBUS;
271
+ }
272
+
273
+ if (value & ESDHC_CTRL_4BITBUS) {
274
+ hostctl |= ESDHC_CTRL_4BITBUS;
275
+ }
276
+
277
+ /*
278
+ * Third, move DMA select from bits 9 and 8 to bits 4 and 3
279
+ */
280
+ hostctl |= SDHC_DMA_TYPE(value >> (8 - 3));
281
+
282
+ /*
283
+ * Now place the corrected value into low 16-bit of the value
284
+ * we are going to give standard SDHCI write function
285
+ *
286
+ * NOTE: This transformation should be the inverse of what can
287
+ * be found in drivers/mmc/host/sdhci-esdhc-imx.c in Linux
288
+ * kernel
289
+ */
290
+ value &= ~UINT16_MAX;
291
+ value |= hostctl;
292
+ value |= (uint16_t)s->pwrcon << 8;
293
+
294
+ sdhci_write(opaque, offset, value, size);
295
+ break;
296
+
297
+ case ESDHC_MIX_CTRL:
298
+ /*
299
+ * So, when SD/MMC stack in Linux tries to write to "Transfer
300
+ * Mode Register", ESDHC i.MX quirk code will translate it
301
+ * into a write to ESDHC_MIX_CTRL, so we do the opposite in
302
+ * order to get where we started
303
+ *
304
+ * Note that Auto CMD23 Enable bit is located in a wrong place
305
+ * on i.MX, but since it is not used by QEMU we do not care.
306
+ *
307
+ * We don't want to call sdhci_write(.., SDHC_TRNMOD, ...)
308
+ * here becuase it will result in a call to
309
+ * sdhci_send_command(s) which we don't want.
310
+ *
311
+ */
312
+ s->trnmod = value & UINT16_MAX;
313
+ break;
314
+ case SDHC_TRNMOD:
315
+ /*
316
+ * Similar to above, but this time a write to "Command
317
+ * Register" will be translated into a 4-byte write to
318
+ * "Transfer Mode register" where lower 16-bit of value would
319
+ * be set to zero. So what we do is fill those bits with
320
+ * cached value from s->trnmod and let the SDHCI
321
+ * infrastructure handle the rest
322
+ */
323
+ sdhci_write(opaque, offset, val | s->trnmod, size);
324
+ break;
325
+ case SDHC_BLKSIZE:
326
+ /*
327
+ * ESDHCI does not implement "Host SDMA Buffer Boundary", and
328
+ * Linux driver will try to zero this field out which will
329
+ * break the rest of SDHCI emulation.
330
+ *
331
+ * Linux defaults to maximum possible setting (512K boundary)
332
+ * and it seems to be the only option that i.MX IP implements,
333
+ * so we artificially set it to that value.
334
+ */
335
+ val |= 0x7 << 12;
336
+ /* FALLTHROUGH */
337
+ default:
338
+ sdhci_write(opaque, offset, val, size);
339
+ break;
340
+ }
341
+}
342
+
343
+
344
+static const MemoryRegionOps usdhc_mmio_ops = {
345
+ .read = usdhc_read,
346
+ .write = usdhc_write,
347
+ .valid = {
348
+ .min_access_size = 1,
349
+ .max_access_size = 4,
350
+ .unaligned = false
351
+ },
352
+ .endianness = DEVICE_LITTLE_ENDIAN,
353
+};
354
+
355
+static void imx_usdhc_init(Object *obj)
356
+{
357
+ SDHCIState *s = SYSBUS_SDHCI(obj);
358
+
359
+ s->io_ops = &usdhc_mmio_ops;
360
+ s->quirks = SDHCI_QUIRK_NO_BUSY_IRQ;
361
+}
362
+
363
+static const TypeInfo imx_usdhc_info = {
364
+ .name = TYPE_IMX_USDHC,
365
+ .parent = TYPE_SYSBUS_SDHCI,
366
+ .instance_init = imx_usdhc_init,
367
+};
368
+
369
static void sdhci_register_types(void)
370
{
371
type_register_static(&sdhci_pci_info);
372
type_register_static(&sdhci_sysbus_info);
373
type_register_static(&sdhci_bus_info);
374
+ type_register_static(&imx_usdhc_info);
375
}
53
}
376
54
377
type_init(sdhci_register_types)
55
-TRANS_FEAT(ADR_p32, aa64_sve, do_adr, a, gen_helper_sve_adr_p32)
56
-TRANS_FEAT(ADR_p64, aa64_sve, do_adr, a, gen_helper_sve_adr_p64)
57
-TRANS_FEAT(ADR_s32, aa64_sve, do_adr, a, gen_helper_sve_adr_s32)
58
-TRANS_FEAT(ADR_u32, aa64_sve, do_adr, a, gen_helper_sve_adr_u32)
59
+TRANS_FEAT_NONSTREAMING(ADR_p32, aa64_sve, do_adr, a, gen_helper_sve_adr_p32)
60
+TRANS_FEAT_NONSTREAMING(ADR_p64, aa64_sve, do_adr, a, gen_helper_sve_adr_p64)
61
+TRANS_FEAT_NONSTREAMING(ADR_s32, aa64_sve, do_adr, a, gen_helper_sve_adr_s32)
62
+TRANS_FEAT_NONSTREAMING(ADR_u32, aa64_sve, do_adr, a, gen_helper_sve_adr_u32)
63
64
/*
65
*** SVE Integer Misc - Unpredicated Group
378
--
66
--
379
2.16.1
67
2.25.1
380
381
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Mark these as a non-streaming instructions, which should trap
4
if full a64 support is not enabled in streaming mode.
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220708151540.18136-6-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/sme-fa64.decode | 2 --
12
target/arm/translate-sve.c | 9 ++++++---
13
2 files changed, 6 insertions(+), 5 deletions(-)
14
15
diff --git a/target/arm/sme-fa64.decode b/target/arm/sme-fa64.decode
16
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/sme-fa64.decode
18
+++ b/target/arm/sme-fa64.decode
19
@@ -XXX,XX +XXX,XX @@ FAIL 0001 1110 0111 1110 0000 00-- ---- ---- # FJCVTZS
20
21
FAIL 0000 0100 --1- ---- 1011 -0-- ---- ---- # FTSSEL, FEXPA
22
FAIL 0000 0101 --10 0001 100- ---- ---- ---- # COMPACT
23
-FAIL 0010 0101 --01 100- 1111 000- ---0 ---- # RDFFR, RDFFRS
24
-FAIL 0010 0101 --10 1--- 1001 ---- ---- ---- # WRFFR, SETFFR
25
FAIL 0100 0101 --0- ---- 1011 ---- ---- ---- # BDEP, BEXT, BGRP
26
FAIL 0100 0101 000- ---- 0110 1--- ---- ---- # PMULLB, PMULLT (128b result)
27
FAIL 0110 0100 --1- ---- 1110 01-- ---- ---- # FMMLA, BFMMLA
28
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
29
index XXXXXXX..XXXXXXX 100644
30
--- a/target/arm/translate-sve.c
31
+++ b/target/arm/translate-sve.c
32
@@ -XXX,XX +XXX,XX @@ static bool do_predset(DisasContext *s, int esz, int rd, int pat, bool setflag)
33
TRANS_FEAT(PTRUE, aa64_sve, do_predset, a->esz, a->rd, a->pat, a->s)
34
35
/* Note pat == 31 is #all, to set all elements. */
36
-TRANS_FEAT(SETFFR, aa64_sve, do_predset, 0, FFR_PRED_NUM, 31, false)
37
+TRANS_FEAT_NONSTREAMING(SETFFR, aa64_sve,
38
+ do_predset, 0, FFR_PRED_NUM, 31, false)
39
40
/* Note pat == 32 is #unimp, to set no elements. */
41
TRANS_FEAT(PFALSE, aa64_sve, do_predset, 0, a->rd, 32, false)
42
@@ -XXX,XX +XXX,XX @@ static bool trans_RDFFR_p(DisasContext *s, arg_RDFFR_p *a)
43
.rd = a->rd, .pg = a->pg, .s = a->s,
44
.rn = FFR_PRED_NUM, .rm = FFR_PRED_NUM,
45
};
46
+
47
+ s->is_nonstreaming = true;
48
return trans_AND_pppp(s, &alt_a);
49
}
50
51
-TRANS_FEAT(RDFFR, aa64_sve, do_mov_p, a->rd, FFR_PRED_NUM)
52
-TRANS_FEAT(WRFFR, aa64_sve, do_mov_p, FFR_PRED_NUM, a->rn)
53
+TRANS_FEAT_NONSTREAMING(RDFFR, aa64_sve, do_mov_p, a->rd, FFR_PRED_NUM)
54
+TRANS_FEAT_NONSTREAMING(WRFFR, aa64_sve, do_mov_p, FFR_PRED_NUM, a->rn)
55
56
static bool do_pfirst_pnext(DisasContext *s, arg_rr_esz *a,
57
void (*gen_fn)(TCGv_i32, TCGv_ptr,
58
--
59
2.25.1
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Mark these as a non-streaming instructions, which should trap
4
if full a64 support is not enabled in streaming mode.
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220708151540.18136-7-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/sme-fa64.decode | 3 ---
12
target/arm/translate-sve.c | 22 ++++++++++++----------
13
2 files changed, 12 insertions(+), 13 deletions(-)
14
15
diff --git a/target/arm/sme-fa64.decode b/target/arm/sme-fa64.decode
16
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/sme-fa64.decode
18
+++ b/target/arm/sme-fa64.decode
19
@@ -XXX,XX +XXX,XX @@ FAIL 0001 1110 0111 1110 0000 00-- ---- ---- # FJCVTZS
20
# --11 1100 --1- ---- ---- ---- ---- --10 # Load/store FP register (register offset)
21
# --11 1101 ---- ---- ---- ---- ---- ---- # Load/store FP register (scaled imm)
22
23
-FAIL 0000 0100 --1- ---- 1011 -0-- ---- ---- # FTSSEL, FEXPA
24
-FAIL 0000 0101 --10 0001 100- ---- ---- ---- # COMPACT
25
-FAIL 0100 0101 --0- ---- 1011 ---- ---- ---- # BDEP, BEXT, BGRP
26
FAIL 0100 0101 000- ---- 0110 1--- ---- ---- # PMULLB, PMULLT (128b result)
27
FAIL 0110 0100 --1- ---- 1110 01-- ---- ---- # FMMLA, BFMMLA
28
FAIL 0110 0101 --0- ---- 0000 11-- ---- ---- # FTSMUL
29
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
30
index XXXXXXX..XXXXXXX 100644
31
--- a/target/arm/translate-sve.c
32
+++ b/target/arm/translate-sve.c
33
@@ -XXX,XX +XXX,XX @@ static gen_helper_gvec_2 * const fexpa_fns[4] = {
34
NULL, gen_helper_sve_fexpa_h,
35
gen_helper_sve_fexpa_s, gen_helper_sve_fexpa_d,
36
};
37
-TRANS_FEAT(FEXPA, aa64_sve, gen_gvec_ool_zz,
38
- fexpa_fns[a->esz], a->rd, a->rn, 0)
39
+TRANS_FEAT_NONSTREAMING(FEXPA, aa64_sve, gen_gvec_ool_zz,
40
+ fexpa_fns[a->esz], a->rd, a->rn, 0)
41
42
static gen_helper_gvec_3 * const ftssel_fns[4] = {
43
NULL, gen_helper_sve_ftssel_h,
44
gen_helper_sve_ftssel_s, gen_helper_sve_ftssel_d,
45
};
46
-TRANS_FEAT(FTSSEL, aa64_sve, gen_gvec_ool_arg_zzz, ftssel_fns[a->esz], a, 0)
47
+TRANS_FEAT_NONSTREAMING(FTSSEL, aa64_sve, gen_gvec_ool_arg_zzz,
48
+ ftssel_fns[a->esz], a, 0)
49
50
/*
51
*** SVE Predicate Logical Operations Group
52
@@ -XXX,XX +XXX,XX @@ TRANS_FEAT(TRN2_q, aa64_sve_f64mm, gen_gvec_ool_arg_zzz,
53
static gen_helper_gvec_3 * const compact_fns[4] = {
54
NULL, NULL, gen_helper_sve_compact_s, gen_helper_sve_compact_d
55
};
56
-TRANS_FEAT(COMPACT, aa64_sve, gen_gvec_ool_arg_zpz, compact_fns[a->esz], a, 0)
57
+TRANS_FEAT_NONSTREAMING(COMPACT, aa64_sve, gen_gvec_ool_arg_zpz,
58
+ compact_fns[a->esz], a, 0)
59
60
/* Call the helper that computes the ARM LastActiveElement pseudocode
61
* function, scaled by the element size. This includes the not found
62
@@ -XXX,XX +XXX,XX @@ static gen_helper_gvec_3 * const bext_fns[4] = {
63
gen_helper_sve2_bext_b, gen_helper_sve2_bext_h,
64
gen_helper_sve2_bext_s, gen_helper_sve2_bext_d,
65
};
66
-TRANS_FEAT(BEXT, aa64_sve2_bitperm, gen_gvec_ool_arg_zzz,
67
- bext_fns[a->esz], a, 0)
68
+TRANS_FEAT_NONSTREAMING(BEXT, aa64_sve2_bitperm, gen_gvec_ool_arg_zzz,
69
+ bext_fns[a->esz], a, 0)
70
71
static gen_helper_gvec_3 * const bdep_fns[4] = {
72
gen_helper_sve2_bdep_b, gen_helper_sve2_bdep_h,
73
gen_helper_sve2_bdep_s, gen_helper_sve2_bdep_d,
74
};
75
-TRANS_FEAT(BDEP, aa64_sve2_bitperm, gen_gvec_ool_arg_zzz,
76
- bdep_fns[a->esz], a, 0)
77
+TRANS_FEAT_NONSTREAMING(BDEP, aa64_sve2_bitperm, gen_gvec_ool_arg_zzz,
78
+ bdep_fns[a->esz], a, 0)
79
80
static gen_helper_gvec_3 * const bgrp_fns[4] = {
81
gen_helper_sve2_bgrp_b, gen_helper_sve2_bgrp_h,
82
gen_helper_sve2_bgrp_s, gen_helper_sve2_bgrp_d,
83
};
84
-TRANS_FEAT(BGRP, aa64_sve2_bitperm, gen_gvec_ool_arg_zzz,
85
- bgrp_fns[a->esz], a, 0)
86
+TRANS_FEAT_NONSTREAMING(BGRP, aa64_sve2_bitperm, gen_gvec_ool_arg_zzz,
87
+ bgrp_fns[a->esz], a, 0)
88
89
static gen_helper_gvec_3 * const cadd_fns[4] = {
90
gen_helper_sve2_cadd_b, gen_helper_sve2_cadd_h,
91
--
92
2.25.1
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Mark these as a non-streaming instructions, which should trap
4
if full a64 support is not enabled in streaming mode.
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220708151540.18136-8-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/sme-fa64.decode | 2 --
12
target/arm/translate-sve.c | 24 +++++++++++++++---------
13
2 files changed, 15 insertions(+), 11 deletions(-)
14
15
diff --git a/target/arm/sme-fa64.decode b/target/arm/sme-fa64.decode
16
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/sme-fa64.decode
18
+++ b/target/arm/sme-fa64.decode
19
@@ -XXX,XX +XXX,XX @@ FAIL 0001 1110 0111 1110 0000 00-- ---- ---- # FJCVTZS
20
# --11 1100 --1- ---- ---- ---- ---- --10 # Load/store FP register (register offset)
21
# --11 1101 ---- ---- ---- ---- ---- ---- # Load/store FP register (scaled imm)
22
23
-FAIL 0100 0101 000- ---- 0110 1--- ---- ---- # PMULLB, PMULLT (128b result)
24
-FAIL 0110 0100 --1- ---- 1110 01-- ---- ---- # FMMLA, BFMMLA
25
FAIL 0110 0101 --0- ---- 0000 11-- ---- ---- # FTSMUL
26
FAIL 0110 0101 --01 0--- 100- ---- ---- ---- # FTMAD
27
FAIL 0110 0101 --01 1--- 001- ---- ---- ---- # FADDA
28
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
29
index XXXXXXX..XXXXXXX 100644
30
--- a/target/arm/translate-sve.c
31
+++ b/target/arm/translate-sve.c
32
@@ -XXX,XX +XXX,XX @@ static bool do_trans_pmull(DisasContext *s, arg_rrr_esz *a, bool sel)
33
gen_helper_gvec_pmull_q, gen_helper_sve2_pmull_h,
34
NULL, gen_helper_sve2_pmull_d,
35
};
36
- if (a->esz == 0
37
- ? !dc_isar_feature(aa64_sve2_pmull128, s)
38
- : !dc_isar_feature(aa64_sve, s)) {
39
+
40
+ if (a->esz == 0) {
41
+ if (!dc_isar_feature(aa64_sve2_pmull128, s)) {
42
+ return false;
43
+ }
44
+ s->is_nonstreaming = true;
45
+ } else if (!dc_isar_feature(aa64_sve, s)) {
46
return false;
47
}
48
return gen_gvec_ool_arg_zzz(s, fns[a->esz], a, sel);
49
@@ -XXX,XX +XXX,XX @@ DO_ZPZZ_FP(FMINP, aa64_sve2, sve2_fminp_zpzz)
50
* SVE Integer Multiply-Add (unpredicated)
51
*/
52
53
-TRANS_FEAT(FMMLA_s, aa64_sve_f32mm, gen_gvec_fpst_zzzz, gen_helper_fmmla_s,
54
- a->rd, a->rn, a->rm, a->ra, 0, FPST_FPCR)
55
-TRANS_FEAT(FMMLA_d, aa64_sve_f64mm, gen_gvec_fpst_zzzz, gen_helper_fmmla_d,
56
- a->rd, a->rn, a->rm, a->ra, 0, FPST_FPCR)
57
+TRANS_FEAT_NONSTREAMING(FMMLA_s, aa64_sve_f32mm, gen_gvec_fpst_zzzz,
58
+ gen_helper_fmmla_s, a->rd, a->rn, a->rm, a->ra,
59
+ 0, FPST_FPCR)
60
+TRANS_FEAT_NONSTREAMING(FMMLA_d, aa64_sve_f64mm, gen_gvec_fpst_zzzz,
61
+ gen_helper_fmmla_d, a->rd, a->rn, a->rm, a->ra,
62
+ 0, FPST_FPCR)
63
64
static gen_helper_gvec_4 * const sqdmlal_zzzw_fns[] = {
65
NULL, gen_helper_sve2_sqdmlal_zzzw_h,
66
@@ -XXX,XX +XXX,XX @@ TRANS_FEAT(BFDOT_zzzz, aa64_sve_bf16, gen_gvec_ool_arg_zzzz,
67
TRANS_FEAT(BFDOT_zzxz, aa64_sve_bf16, gen_gvec_ool_arg_zzxz,
68
gen_helper_gvec_bfdot_idx, a)
69
70
-TRANS_FEAT(BFMMLA, aa64_sve_bf16, gen_gvec_ool_arg_zzzz,
71
- gen_helper_gvec_bfmmla, a, 0)
72
+TRANS_FEAT_NONSTREAMING(BFMMLA, aa64_sve_bf16, gen_gvec_ool_arg_zzzz,
73
+ gen_helper_gvec_bfmmla, a, 0)
74
75
static bool do_BFMLAL_zzzw(DisasContext *s, arg_rrrr_esz *a, bool sel)
76
{
77
--
78
2.25.1
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Mark these as a non-streaming instructions, which should trap
4
if full a64 support is not enabled in streaming mode.
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220708151540.18136-9-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/sme-fa64.decode | 3 ---
12
target/arm/translate-sve.c | 15 +++++++++++----
13
2 files changed, 11 insertions(+), 7 deletions(-)
14
15
diff --git a/target/arm/sme-fa64.decode b/target/arm/sme-fa64.decode
16
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/sme-fa64.decode
18
+++ b/target/arm/sme-fa64.decode
19
@@ -XXX,XX +XXX,XX @@ FAIL 0001 1110 0111 1110 0000 00-- ---- ---- # FJCVTZS
20
# --11 1100 --1- ---- ---- ---- ---- --10 # Load/store FP register (register offset)
21
# --11 1101 ---- ---- ---- ---- ---- ---- # Load/store FP register (scaled imm)
22
23
-FAIL 0110 0101 --0- ---- 0000 11-- ---- ---- # FTSMUL
24
-FAIL 0110 0101 --01 0--- 100- ---- ---- ---- # FTMAD
25
-FAIL 0110 0101 --01 1--- 001- ---- ---- ---- # FADDA
26
FAIL 0100 0101 --0- ---- 1001 10-- ---- ---- # SMMLA, UMMLA, USMMLA
27
FAIL 0100 0101 --1- ---- 1--- ---- ---- ---- # SVE2 string/histo/crypto instructions
28
FAIL 1000 010- -00- ---- 10-- ---- ---- ---- # SVE2 32-bit gather NT load (vector+scalar)
29
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
30
index XXXXXXX..XXXXXXX 100644
31
--- a/target/arm/translate-sve.c
32
+++ b/target/arm/translate-sve.c
33
@@ -XXX,XX +XXX,XX @@ static gen_helper_gvec_3_ptr * const ftmad_fns[4] = {
34
NULL, gen_helper_sve_ftmad_h,
35
gen_helper_sve_ftmad_s, gen_helper_sve_ftmad_d,
36
};
37
-TRANS_FEAT(FTMAD, aa64_sve, gen_gvec_fpst_zzz,
38
- ftmad_fns[a->esz], a->rd, a->rn, a->rm, a->imm,
39
- a->esz == MO_16 ? FPST_FPCR_F16 : FPST_FPCR)
40
+TRANS_FEAT_NONSTREAMING(FTMAD, aa64_sve, gen_gvec_fpst_zzz,
41
+ ftmad_fns[a->esz], a->rd, a->rn, a->rm, a->imm,
42
+ a->esz == MO_16 ? FPST_FPCR_F16 : FPST_FPCR)
43
44
/*
45
*** SVE Floating Point Accumulating Reduction Group
46
@@ -XXX,XX +XXX,XX @@ static bool trans_FADDA(DisasContext *s, arg_rprr_esz *a)
47
if (a->esz == 0 || !dc_isar_feature(aa64_sve, s)) {
48
return false;
49
}
50
+ s->is_nonstreaming = true;
51
if (!sve_access_check(s)) {
52
return true;
53
}
54
@@ -XXX,XX +XXX,XX @@ static bool trans_FADDA(DisasContext *s, arg_rprr_esz *a)
55
DO_FP3(FADD_zzz, fadd)
56
DO_FP3(FSUB_zzz, fsub)
57
DO_FP3(FMUL_zzz, fmul)
58
-DO_FP3(FTSMUL, ftsmul)
59
DO_FP3(FRECPS, recps)
60
DO_FP3(FRSQRTS, rsqrts)
61
62
#undef DO_FP3
63
64
+static gen_helper_gvec_3_ptr * const ftsmul_fns[4] = {
65
+ NULL, gen_helper_gvec_ftsmul_h,
66
+ gen_helper_gvec_ftsmul_s, gen_helper_gvec_ftsmul_d
67
+};
68
+TRANS_FEAT_NONSTREAMING(FTSMUL, aa64_sve, gen_gvec_fpst_arg_zzz,
69
+ ftsmul_fns[a->esz], a, 0)
70
+
71
/*
72
*** SVE Floating Point Arithmetic - Predicated Group
73
*/
74
--
75
2.25.1
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Mark these as a non-streaming instructions, which should trap
4
if full a64 support is not enabled in streaming mode.
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220708151540.18136-10-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/sme-fa64.decode | 1 -
12
target/arm/translate-sve.c | 12 ++++++------
13
2 files changed, 6 insertions(+), 7 deletions(-)
14
15
diff --git a/target/arm/sme-fa64.decode b/target/arm/sme-fa64.decode
16
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/sme-fa64.decode
18
+++ b/target/arm/sme-fa64.decode
19
@@ -XXX,XX +XXX,XX @@ FAIL 0001 1110 0111 1110 0000 00-- ---- ---- # FJCVTZS
20
# --11 1100 --1- ---- ---- ---- ---- --10 # Load/store FP register (register offset)
21
# --11 1101 ---- ---- ---- ---- ---- ---- # Load/store FP register (scaled imm)
22
23
-FAIL 0100 0101 --0- ---- 1001 10-- ---- ---- # SMMLA, UMMLA, USMMLA
24
FAIL 0100 0101 --1- ---- 1--- ---- ---- ---- # SVE2 string/histo/crypto instructions
25
FAIL 1000 010- -00- ---- 10-- ---- ---- ---- # SVE2 32-bit gather NT load (vector+scalar)
26
FAIL 1000 010- -00- ---- 111- ---- ---- ---- # SVE 32-bit gather prefetch (vector+imm)
27
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
28
index XXXXXXX..XXXXXXX 100644
29
--- a/target/arm/translate-sve.c
30
+++ b/target/arm/translate-sve.c
31
@@ -XXX,XX +XXX,XX @@ TRANS_FEAT(FMLALT_zzxw, aa64_sve2, do_FMLAL_zzxw, a, false, true)
32
TRANS_FEAT(FMLSLB_zzxw, aa64_sve2, do_FMLAL_zzxw, a, true, false)
33
TRANS_FEAT(FMLSLT_zzxw, aa64_sve2, do_FMLAL_zzxw, a, true, true)
34
35
-TRANS_FEAT(SMMLA, aa64_sve_i8mm, gen_gvec_ool_arg_zzzz,
36
- gen_helper_gvec_smmla_b, a, 0)
37
-TRANS_FEAT(USMMLA, aa64_sve_i8mm, gen_gvec_ool_arg_zzzz,
38
- gen_helper_gvec_usmmla_b, a, 0)
39
-TRANS_FEAT(UMMLA, aa64_sve_i8mm, gen_gvec_ool_arg_zzzz,
40
- gen_helper_gvec_ummla_b, a, 0)
41
+TRANS_FEAT_NONSTREAMING(SMMLA, aa64_sve_i8mm, gen_gvec_ool_arg_zzzz,
42
+ gen_helper_gvec_smmla_b, a, 0)
43
+TRANS_FEAT_NONSTREAMING(USMMLA, aa64_sve_i8mm, gen_gvec_ool_arg_zzzz,
44
+ gen_helper_gvec_usmmla_b, a, 0)
45
+TRANS_FEAT_NONSTREAMING(UMMLA, aa64_sve_i8mm, gen_gvec_ool_arg_zzzz,
46
+ gen_helper_gvec_ummla_b, a, 0)
47
48
TRANS_FEAT(BFDOT_zzzz, aa64_sve_bf16, gen_gvec_ool_arg_zzzz,
49
gen_helper_gvec_bfdot, a, 0)
50
--
51
2.25.1
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Mark these as non-streaming instructions, which should trap
4
if full a64 support is not enabled in streaming mode.
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220708151540.18136-11-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/sme-fa64.decode | 1 -
12
target/arm/translate-sve.c | 35 ++++++++++++++++++-----------------
13
2 files changed, 18 insertions(+), 18 deletions(-)
14
15
diff --git a/target/arm/sme-fa64.decode b/target/arm/sme-fa64.decode
16
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/sme-fa64.decode
18
+++ b/target/arm/sme-fa64.decode
19
@@ -XXX,XX +XXX,XX @@ FAIL 0001 1110 0111 1110 0000 00-- ---- ---- # FJCVTZS
20
# --11 1100 --1- ---- ---- ---- ---- --10 # Load/store FP register (register offset)
21
# --11 1101 ---- ---- ---- ---- ---- ---- # Load/store FP register (scaled imm)
22
23
-FAIL 0100 0101 --1- ---- 1--- ---- ---- ---- # SVE2 string/histo/crypto instructions
24
FAIL 1000 010- -00- ---- 10-- ---- ---- ---- # SVE2 32-bit gather NT load (vector+scalar)
25
FAIL 1000 010- -00- ---- 111- ---- ---- ---- # SVE 32-bit gather prefetch (vector+imm)
26
FAIL 1000 0100 0-1- ---- 0--- ---- ---- ---- # SVE 32-bit gather prefetch (scalar+vector)
27
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
28
index XXXXXXX..XXXXXXX 100644
29
--- a/target/arm/translate-sve.c
30
+++ b/target/arm/translate-sve.c
31
@@ -XXX,XX +XXX,XX @@ DO_SVE2_ZZZ_NARROW(RSUBHNT, rsubhnt)
32
static gen_helper_gvec_flags_4 * const match_fns[4] = {
33
gen_helper_sve2_match_ppzz_b, gen_helper_sve2_match_ppzz_h, NULL, NULL
34
};
35
-TRANS_FEAT(MATCH, aa64_sve2, do_ppzz_flags, a, match_fns[a->esz])
36
+TRANS_FEAT_NONSTREAMING(MATCH, aa64_sve2, do_ppzz_flags, a, match_fns[a->esz])
37
38
static gen_helper_gvec_flags_4 * const nmatch_fns[4] = {
39
gen_helper_sve2_nmatch_ppzz_b, gen_helper_sve2_nmatch_ppzz_h, NULL, NULL
40
};
41
-TRANS_FEAT(NMATCH, aa64_sve2, do_ppzz_flags, a, nmatch_fns[a->esz])
42
+TRANS_FEAT_NONSTREAMING(NMATCH, aa64_sve2, do_ppzz_flags, a, nmatch_fns[a->esz])
43
44
static gen_helper_gvec_4 * const histcnt_fns[4] = {
45
NULL, NULL, gen_helper_sve2_histcnt_s, gen_helper_sve2_histcnt_d
46
};
47
-TRANS_FEAT(HISTCNT, aa64_sve2, gen_gvec_ool_arg_zpzz,
48
- histcnt_fns[a->esz], a, 0)
49
+TRANS_FEAT_NONSTREAMING(HISTCNT, aa64_sve2, gen_gvec_ool_arg_zpzz,
50
+ histcnt_fns[a->esz], a, 0)
51
52
-TRANS_FEAT(HISTSEG, aa64_sve2, gen_gvec_ool_arg_zzz,
53
- a->esz == 0 ? gen_helper_sve2_histseg : NULL, a, 0)
54
+TRANS_FEAT_NONSTREAMING(HISTSEG, aa64_sve2, gen_gvec_ool_arg_zzz,
55
+ a->esz == 0 ? gen_helper_sve2_histseg : NULL, a, 0)
56
57
DO_ZPZZ_FP(FADDP, aa64_sve2, sve2_faddp_zpzz)
58
DO_ZPZZ_FP(FMAXNMP, aa64_sve2, sve2_fmaxnmp_zpzz)
59
@@ -XXX,XX +XXX,XX @@ TRANS_FEAT(SQRDCMLAH_zzzz, aa64_sve2, gen_gvec_ool_zzzz,
60
TRANS_FEAT(USDOT_zzzz, aa64_sve_i8mm, gen_gvec_ool_arg_zzzz,
61
a->esz == 2 ? gen_helper_gvec_usdot_b : NULL, a, 0)
62
63
-TRANS_FEAT(AESMC, aa64_sve2_aes, gen_gvec_ool_zz,
64
- gen_helper_crypto_aesmc, a->rd, a->rd, a->decrypt)
65
+TRANS_FEAT_NONSTREAMING(AESMC, aa64_sve2_aes, gen_gvec_ool_zz,
66
+ gen_helper_crypto_aesmc, a->rd, a->rd, a->decrypt)
67
68
-TRANS_FEAT(AESE, aa64_sve2_aes, gen_gvec_ool_arg_zzz,
69
- gen_helper_crypto_aese, a, false)
70
-TRANS_FEAT(AESD, aa64_sve2_aes, gen_gvec_ool_arg_zzz,
71
- gen_helper_crypto_aese, a, true)
72
+TRANS_FEAT_NONSTREAMING(AESE, aa64_sve2_aes, gen_gvec_ool_arg_zzz,
73
+ gen_helper_crypto_aese, a, false)
74
+TRANS_FEAT_NONSTREAMING(AESD, aa64_sve2_aes, gen_gvec_ool_arg_zzz,
75
+ gen_helper_crypto_aese, a, true)
76
77
-TRANS_FEAT(SM4E, aa64_sve2_sm4, gen_gvec_ool_arg_zzz,
78
- gen_helper_crypto_sm4e, a, 0)
79
-TRANS_FEAT(SM4EKEY, aa64_sve2_sm4, gen_gvec_ool_arg_zzz,
80
- gen_helper_crypto_sm4ekey, a, 0)
81
+TRANS_FEAT_NONSTREAMING(SM4E, aa64_sve2_sm4, gen_gvec_ool_arg_zzz,
82
+ gen_helper_crypto_sm4e, a, 0)
83
+TRANS_FEAT_NONSTREAMING(SM4EKEY, aa64_sve2_sm4, gen_gvec_ool_arg_zzz,
84
+ gen_helper_crypto_sm4ekey, a, 0)
85
86
-TRANS_FEAT(RAX1, aa64_sve2_sha3, gen_gvec_fn_arg_zzz, gen_gvec_rax1, a)
87
+TRANS_FEAT_NONSTREAMING(RAX1, aa64_sve2_sha3, gen_gvec_fn_arg_zzz,
88
+ gen_gvec_rax1, a)
89
90
TRANS_FEAT(FCVTNT_sh, aa64_sve2, gen_gvec_fpst_arg_zpz,
91
gen_helper_sve2_fcvtnt_sh, a, 0, FPST_FPCR)
92
--
93
2.25.1
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Mark these as a non-streaming instructions, which should trap
4
if full a64 support is not enabled in streaming mode.
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220708151540.18136-12-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/sme-fa64.decode | 9 ---------
12
target/arm/translate-sve.c | 6 ++++++
13
2 files changed, 6 insertions(+), 9 deletions(-)
14
15
diff --git a/target/arm/sme-fa64.decode b/target/arm/sme-fa64.decode
16
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/sme-fa64.decode
18
+++ b/target/arm/sme-fa64.decode
19
@@ -XXX,XX +XXX,XX @@ FAIL 0001 1110 0111 1110 0000 00-- ---- ---- # FJCVTZS
20
# --11 1100 --1- ---- ---- ---- ---- --10 # Load/store FP register (register offset)
21
# --11 1101 ---- ---- ---- ---- ---- ---- # Load/store FP register (scaled imm)
22
23
-FAIL 1000 010- -00- ---- 10-- ---- ---- ---- # SVE2 32-bit gather NT load (vector+scalar)
24
FAIL 1000 010- -00- ---- 111- ---- ---- ---- # SVE 32-bit gather prefetch (vector+imm)
25
FAIL 1000 0100 0-1- ---- 0--- ---- ---- ---- # SVE 32-bit gather prefetch (scalar+vector)
26
-FAIL 1000 010- -01- ---- 1--- ---- ---- ---- # SVE 32-bit gather load (vector+imm)
27
-FAIL 1000 0100 0-0- ---- 0--- ---- ---- ---- # SVE 32-bit gather load byte (scalar+vector)
28
-FAIL 1000 0100 1--- ---- 0--- ---- ---- ---- # SVE 32-bit gather load half (scalar+vector)
29
-FAIL 1000 0101 0--- ---- 0--- ---- ---- ---- # SVE 32-bit gather load word (scalar+vector)
30
FAIL 1010 010- ---- ---- 011- ---- ---- ---- # SVE contiguous FF load (scalar+scalar)
31
FAIL 1010 010- ---1 ---- 101- ---- ---- ---- # SVE contiguous NF load (scalar+imm)
32
FAIL 1010 010- -01- ---- 000- ---- ---- ---- # SVE load & replicate 32 bytes (scalar+scalar)
33
FAIL 1010 010- -010 ---- 001- ---- ---- ---- # SVE load & replicate 32 bytes (scalar+imm)
34
FAIL 1100 010- ---- ---- ---- ---- ---- ---- # SVE 64-bit gather load/prefetch
35
-FAIL 1110 010- -00- ---- 001- ---- ---- ---- # SVE2 64-bit scatter NT store (vector+scalar)
36
-FAIL 1110 010- -10- ---- 001- ---- ---- ---- # SVE2 32-bit scatter NT store (vector+scalar)
37
-FAIL 1110 010- ---- ---- 1-0- ---- ---- ---- # SVE scatter store (scalar+32-bit vector)
38
-FAIL 1110 010- ---- ---- 101- ---- ---- ---- # SVE scatter store (misc)
39
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
40
index XXXXXXX..XXXXXXX 100644
41
--- a/target/arm/translate-sve.c
42
+++ b/target/arm/translate-sve.c
43
@@ -XXX,XX +XXX,XX @@ static bool trans_LD1_zprz(DisasContext *s, arg_LD1_zprz *a)
44
if (!dc_isar_feature(aa64_sve, s)) {
45
return false;
46
}
47
+ s->is_nonstreaming = true;
48
if (!sve_access_check(s)) {
49
return true;
50
}
51
@@ -XXX,XX +XXX,XX @@ static bool trans_LD1_zpiz(DisasContext *s, arg_LD1_zpiz *a)
52
if (!dc_isar_feature(aa64_sve, s)) {
53
return false;
54
}
55
+ s->is_nonstreaming = true;
56
if (!sve_access_check(s)) {
57
return true;
58
}
59
@@ -XXX,XX +XXX,XX @@ static bool trans_LDNT1_zprz(DisasContext *s, arg_LD1_zprz *a)
60
if (!dc_isar_feature(aa64_sve2, s)) {
61
return false;
62
}
63
+ s->is_nonstreaming = true;
64
if (!sve_access_check(s)) {
65
return true;
66
}
67
@@ -XXX,XX +XXX,XX @@ static bool trans_ST1_zprz(DisasContext *s, arg_ST1_zprz *a)
68
if (!dc_isar_feature(aa64_sve, s)) {
69
return false;
70
}
71
+ s->is_nonstreaming = true;
72
if (!sve_access_check(s)) {
73
return true;
74
}
75
@@ -XXX,XX +XXX,XX @@ static bool trans_ST1_zpiz(DisasContext *s, arg_ST1_zpiz *a)
76
if (!dc_isar_feature(aa64_sve, s)) {
77
return false;
78
}
79
+ s->is_nonstreaming = true;
80
if (!sve_access_check(s)) {
81
return true;
82
}
83
@@ -XXX,XX +XXX,XX @@ static bool trans_STNT1_zprz(DisasContext *s, arg_ST1_zprz *a)
84
if (!dc_isar_feature(aa64_sve2, s)) {
85
return false;
86
}
87
+ s->is_nonstreaming = true;
88
if (!sve_access_check(s)) {
89
return true;
90
}
91
--
92
2.25.1
diff view generated by jsdifflib
1
Handle possible MPU faults, SAU faults or bus errors when
1
From: Richard Henderson <richard.henderson@linaro.org>
2
popping register state off the stack during exception return.
3
2
3
Mark these as a non-streaming instructions, which should trap if full
4
a64 support is not enabled in streaming mode. In this case, introduce
5
PRF_ns (prefetch non-streaming) to handle the checks.
6
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20220708151540.18136-13-richard.henderson@linaro.org
4
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
5
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
6
Message-id: 1517324542-6607-8-git-send-email-peter.maydell@linaro.org
7
---
11
---
8
target/arm/helper.c | 115 ++++++++++++++++++++++++++++++++++++++++++----------
12
target/arm/sme-fa64.decode | 3 ---
9
1 file changed, 94 insertions(+), 21 deletions(-)
13
target/arm/sve.decode | 10 +++++-----
14
target/arm/translate-sve.c | 11 +++++++++++
15
3 files changed, 16 insertions(+), 8 deletions(-)
10
16
11
diff --git a/target/arm/helper.c b/target/arm/helper.c
17
diff --git a/target/arm/sme-fa64.decode b/target/arm/sme-fa64.decode
12
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
13
--- a/target/arm/helper.c
19
--- a/target/arm/sme-fa64.decode
14
+++ b/target/arm/helper.c
20
+++ b/target/arm/sme-fa64.decode
15
@@ -XXX,XX +XXX,XX @@ pend_fault:
21
@@ -XXX,XX +XXX,XX @@ FAIL 0001 1110 0111 1110 0000 00-- ---- ---- # FJCVTZS
16
return false;
22
# --11 1100 --1- ---- ---- ---- ---- --10 # Load/store FP register (register offset)
23
# --11 1101 ---- ---- ---- ---- ---- ---- # Load/store FP register (scaled imm)
24
25
-FAIL 1000 010- -00- ---- 111- ---- ---- ---- # SVE 32-bit gather prefetch (vector+imm)
26
-FAIL 1000 0100 0-1- ---- 0--- ---- ---- ---- # SVE 32-bit gather prefetch (scalar+vector)
27
FAIL 1010 010- ---- ---- 011- ---- ---- ---- # SVE contiguous FF load (scalar+scalar)
28
FAIL 1010 010- ---1 ---- 101- ---- ---- ---- # SVE contiguous NF load (scalar+imm)
29
FAIL 1010 010- -01- ---- 000- ---- ---- ---- # SVE load & replicate 32 bytes (scalar+scalar)
30
FAIL 1010 010- -010 ---- 001- ---- ---- ---- # SVE load & replicate 32 bytes (scalar+imm)
31
-FAIL 1100 010- ---- ---- ---- ---- ---- ---- # SVE 64-bit gather load/prefetch
32
diff --git a/target/arm/sve.decode b/target/arm/sve.decode
33
index XXXXXXX..XXXXXXX 100644
34
--- a/target/arm/sve.decode
35
+++ b/target/arm/sve.decode
36
@@ -XXX,XX +XXX,XX @@ LD1RO_zpri 1010010 .. 01 0.... 001 ... ..... ..... \
37
@rpri_load_msz nreg=0
38
39
# SVE 32-bit gather prefetch (scalar plus 32-bit scaled offsets)
40
-PRF 1000010 00 -1 ----- 0-- --- ----- 0 ----
41
+PRF_ns 1000010 00 -1 ----- 0-- --- ----- 0 ----
42
43
# SVE 32-bit gather prefetch (vector plus immediate)
44
-PRF 1000010 -- 00 ----- 111 --- ----- 0 ----
45
+PRF_ns 1000010 -- 00 ----- 111 --- ----- 0 ----
46
47
# SVE contiguous prefetch (scalar plus immediate)
48
PRF 1000010 11 1- ----- 0-- --- ----- 0 ----
49
@@ -XXX,XX +XXX,XX @@ LD1_zpiz 1100010 .. 01 ..... 1.. ... ..... ..... \
50
@rpri_g_load esz=3
51
52
# SVE 64-bit gather prefetch (scalar plus 64-bit scaled offsets)
53
-PRF 1100010 00 11 ----- 1-- --- ----- 0 ----
54
+PRF_ns 1100010 00 11 ----- 1-- --- ----- 0 ----
55
56
# SVE 64-bit gather prefetch (scalar plus unpacked 32-bit scaled offsets)
57
-PRF 1100010 00 -1 ----- 0-- --- ----- 0 ----
58
+PRF_ns 1100010 00 -1 ----- 0-- --- ----- 0 ----
59
60
# SVE 64-bit gather prefetch (vector plus immediate)
61
-PRF 1100010 -- 00 ----- 111 --- ----- 0 ----
62
+PRF_ns 1100010 -- 00 ----- 111 --- ----- 0 ----
63
64
### SVE Memory Store Group
65
66
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
67
index XXXXXXX..XXXXXXX 100644
68
--- a/target/arm/translate-sve.c
69
+++ b/target/arm/translate-sve.c
70
@@ -XXX,XX +XXX,XX @@ static bool trans_PRF_rr(DisasContext *s, arg_PRF_rr *a)
71
return true;
17
}
72
}
18
73
19
+static bool v7m_stack_read(ARMCPU *cpu, uint32_t *dest, uint32_t addr,
74
+static bool trans_PRF_ns(DisasContext *s, arg_PRF_ns *a)
20
+ ARMMMUIdx mmu_idx)
21
+{
75
+{
22
+ CPUState *cs = CPU(cpu);
76
+ if (!dc_isar_feature(aa64_sve, s)) {
23
+ CPUARMState *env = &cpu->env;
77
+ return false;
24
+ MemTxAttrs attrs = {};
25
+ MemTxResult txres;
26
+ target_ulong page_size;
27
+ hwaddr physaddr;
28
+ int prot;
29
+ ARMMMUFaultInfo fi;
30
+ bool secure = mmu_idx & ARM_MMU_IDX_M_S;
31
+ int exc;
32
+ bool exc_secure;
33
+ uint32_t value;
34
+
35
+ if (get_phys_addr(env, addr, MMU_DATA_LOAD, mmu_idx, &physaddr,
36
+ &attrs, &prot, &page_size, &fi, NULL)) {
37
+ /* MPU/SAU lookup failed */
38
+ if (fi.type == ARMFault_QEMU_SFault) {
39
+ qemu_log_mask(CPU_LOG_INT,
40
+ "...SecureFault with SFSR.AUVIOL during unstack\n");
41
+ env->v7m.sfsr |= R_V7M_SFSR_AUVIOL_MASK | R_V7M_SFSR_SFARVALID_MASK;
42
+ env->v7m.sfar = addr;
43
+ exc = ARMV7M_EXCP_SECURE;
44
+ exc_secure = false;
45
+ } else {
46
+ qemu_log_mask(CPU_LOG_INT,
47
+ "...MemManageFault with CFSR.MUNSTKERR\n");
48
+ env->v7m.cfsr[secure] |= R_V7M_CFSR_MUNSTKERR_MASK;
49
+ exc = ARMV7M_EXCP_MEM;
50
+ exc_secure = secure;
51
+ }
52
+ goto pend_fault;
53
+ }
78
+ }
54
+
79
+ /* Prefetch is a nop within QEMU. */
55
+ value = address_space_ldl(arm_addressspace(cs, attrs), physaddr,
80
+ s->is_nonstreaming = true;
56
+ attrs, &txres);
81
+ (void)sve_access_check(s);
57
+ if (txres != MEMTX_OK) {
58
+ /* BusFault trying to read the data */
59
+ qemu_log_mask(CPU_LOG_INT, "...BusFault with BFSR.UNSTKERR\n");
60
+ env->v7m.cfsr[M_REG_NS] |= R_V7M_CFSR_UNSTKERR_MASK;
61
+ exc = ARMV7M_EXCP_BUS;
62
+ exc_secure = false;
63
+ goto pend_fault;
64
+ }
65
+
66
+ *dest = value;
67
+ return true;
82
+ return true;
68
+
69
+pend_fault:
70
+ /* By pending the exception at this point we are making
71
+ * the IMPDEF choice "overridden exceptions pended" (see the
72
+ * MergeExcInfo() pseudocode). The other choice would be to not
73
+ * pend them now and then make a choice about which to throw away
74
+ * later if we have two derived exceptions.
75
+ */
76
+ armv7m_nvic_set_pending(env->nvic, exc, exc_secure);
77
+ return false;
78
+}
83
+}
79
+
84
+
80
/* Return true if we're using the process stack pointer (not the MSP) */
85
/*
81
static bool v7m_using_psp(CPUARMState *env)
86
* Move Prefix
82
{
87
*
83
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
84
!return_to_handler,
85
return_to_sp_process);
86
uint32_t frameptr = *frame_sp_p;
87
+ bool pop_ok = true;
88
+ ARMMMUIdx mmu_idx;
89
+
90
+ mmu_idx = arm_v7m_mmu_idx_for_secstate_and_priv(env, return_to_secure,
91
+ !return_to_handler);
92
93
if (!QEMU_IS_ALIGNED(frameptr, 8) &&
94
arm_feature(env, ARM_FEATURE_V8)) {
95
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
96
return;
97
}
98
99
- env->regs[4] = ldl_phys(cs->as, frameptr + 0x8);
100
- env->regs[5] = ldl_phys(cs->as, frameptr + 0xc);
101
- env->regs[6] = ldl_phys(cs->as, frameptr + 0x10);
102
- env->regs[7] = ldl_phys(cs->as, frameptr + 0x14);
103
- env->regs[8] = ldl_phys(cs->as, frameptr + 0x18);
104
- env->regs[9] = ldl_phys(cs->as, frameptr + 0x1c);
105
- env->regs[10] = ldl_phys(cs->as, frameptr + 0x20);
106
- env->regs[11] = ldl_phys(cs->as, frameptr + 0x24);
107
+ pop_ok =
108
+ v7m_stack_read(cpu, &env->regs[4], frameptr + 0x8, mmu_idx) &&
109
+ v7m_stack_read(cpu, &env->regs[4], frameptr + 0x8, mmu_idx) &&
110
+ v7m_stack_read(cpu, &env->regs[5], frameptr + 0xc, mmu_idx) &&
111
+ v7m_stack_read(cpu, &env->regs[6], frameptr + 0x10, mmu_idx) &&
112
+ v7m_stack_read(cpu, &env->regs[7], frameptr + 0x14, mmu_idx) &&
113
+ v7m_stack_read(cpu, &env->regs[8], frameptr + 0x18, mmu_idx) &&
114
+ v7m_stack_read(cpu, &env->regs[9], frameptr + 0x1c, mmu_idx) &&
115
+ v7m_stack_read(cpu, &env->regs[10], frameptr + 0x20, mmu_idx) &&
116
+ v7m_stack_read(cpu, &env->regs[11], frameptr + 0x24, mmu_idx);
117
118
frameptr += 0x28;
119
}
120
121
- /* Pop registers. TODO: make these accesses use the correct
122
- * attributes and address space (S/NS, priv/unpriv) and handle
123
- * memory transaction failures.
124
- */
125
- env->regs[0] = ldl_phys(cs->as, frameptr);
126
- env->regs[1] = ldl_phys(cs->as, frameptr + 0x4);
127
- env->regs[2] = ldl_phys(cs->as, frameptr + 0x8);
128
- env->regs[3] = ldl_phys(cs->as, frameptr + 0xc);
129
- env->regs[12] = ldl_phys(cs->as, frameptr + 0x10);
130
- env->regs[14] = ldl_phys(cs->as, frameptr + 0x14);
131
- env->regs[15] = ldl_phys(cs->as, frameptr + 0x18);
132
+ /* Pop registers */
133
+ pop_ok = pop_ok &&
134
+ v7m_stack_read(cpu, &env->regs[0], frameptr, mmu_idx) &&
135
+ v7m_stack_read(cpu, &env->regs[1], frameptr + 0x4, mmu_idx) &&
136
+ v7m_stack_read(cpu, &env->regs[2], frameptr + 0x8, mmu_idx) &&
137
+ v7m_stack_read(cpu, &env->regs[3], frameptr + 0xc, mmu_idx) &&
138
+ v7m_stack_read(cpu, &env->regs[12], frameptr + 0x10, mmu_idx) &&
139
+ v7m_stack_read(cpu, &env->regs[14], frameptr + 0x14, mmu_idx) &&
140
+ v7m_stack_read(cpu, &env->regs[15], frameptr + 0x18, mmu_idx) &&
141
+ v7m_stack_read(cpu, &xpsr, frameptr + 0x1c, mmu_idx);
142
+
143
+ if (!pop_ok) {
144
+ /* v7m_stack_read() pended a fault, so take it (as a tail
145
+ * chained exception on the same stack frame)
146
+ */
147
+ v7m_exception_taken(cpu, excret, true, false);
148
+ return;
149
+ }
150
151
/* Returning from an exception with a PC with bit 0 set is defined
152
* behaviour on v8M (bit 0 is ignored), but for v7M it was specified
153
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
154
}
155
}
156
157
- xpsr = ldl_phys(cs->as, frameptr + 0x1c);
158
-
159
if (arm_feature(env, ARM_FEATURE_V8)) {
160
/* For v8M we have to check whether the xPSR exception field
161
* matches the EXCRET value for return to handler/thread
162
--
88
--
163
2.16.1
89
2.25.1
164
165
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Mark these as a non-streaming instructions, which should trap
4
if full a64 support is not enabled in streaming mode.
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220708151540.18136-14-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/sme-fa64.decode | 2 --
12
target/arm/translate-sve.c | 2 ++
13
2 files changed, 2 insertions(+), 2 deletions(-)
14
15
diff --git a/target/arm/sme-fa64.decode b/target/arm/sme-fa64.decode
16
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/sme-fa64.decode
18
+++ b/target/arm/sme-fa64.decode
19
@@ -XXX,XX +XXX,XX @@ FAIL 0001 1110 0111 1110 0000 00-- ---- ---- # FJCVTZS
20
# --11 1100 --1- ---- ---- ---- ---- --10 # Load/store FP register (register offset)
21
# --11 1101 ---- ---- ---- ---- ---- ---- # Load/store FP register (scaled imm)
22
23
-FAIL 1010 010- ---- ---- 011- ---- ---- ---- # SVE contiguous FF load (scalar+scalar)
24
-FAIL 1010 010- ---1 ---- 101- ---- ---- ---- # SVE contiguous NF load (scalar+imm)
25
FAIL 1010 010- -01- ---- 000- ---- ---- ---- # SVE load & replicate 32 bytes (scalar+scalar)
26
FAIL 1010 010- -010 ---- 001- ---- ---- ---- # SVE load & replicate 32 bytes (scalar+imm)
27
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
28
index XXXXXXX..XXXXXXX 100644
29
--- a/target/arm/translate-sve.c
30
+++ b/target/arm/translate-sve.c
31
@@ -XXX,XX +XXX,XX @@ static bool trans_LDFF1_zprr(DisasContext *s, arg_rprr_load *a)
32
if (!dc_isar_feature(aa64_sve, s)) {
33
return false;
34
}
35
+ s->is_nonstreaming = true;
36
if (sve_access_check(s)) {
37
TCGv_i64 addr = new_tmp_a64(s);
38
tcg_gen_shli_i64(addr, cpu_reg(s, a->rm), dtype_msz(a->dtype));
39
@@ -XXX,XX +XXX,XX @@ static bool trans_LDNF1_zpri(DisasContext *s, arg_rpri_load *a)
40
if (!dc_isar_feature(aa64_sve, s)) {
41
return false;
42
}
43
+ s->is_nonstreaming = true;
44
if (sve_access_check(s)) {
45
int vsz = vec_full_reg_size(s);
46
int elements = vsz >> dtype_esz[a->dtype];
47
--
48
2.25.1
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Mark these as a non-streaming instructions, which should trap
4
if full a64 support is not enabled in streaming mode.
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220708151540.18136-15-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/sme-fa64.decode | 3 ---
12
target/arm/translate-sve.c | 2 ++
13
2 files changed, 2 insertions(+), 3 deletions(-)
14
15
diff --git a/target/arm/sme-fa64.decode b/target/arm/sme-fa64.decode
16
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/sme-fa64.decode
18
+++ b/target/arm/sme-fa64.decode
19
@@ -XXX,XX +XXX,XX @@ FAIL 0001 1110 0111 1110 0000 00-- ---- ---- # FJCVTZS
20
# --11 1100 --0- ---- ---- ---- ---- ---- # Load/store FP register (unscaled imm)
21
# --11 1100 --1- ---- ---- ---- ---- --10 # Load/store FP register (register offset)
22
# --11 1101 ---- ---- ---- ---- ---- ---- # Load/store FP register (scaled imm)
23
-
24
-FAIL 1010 010- -01- ---- 000- ---- ---- ---- # SVE load & replicate 32 bytes (scalar+scalar)
25
-FAIL 1010 010- -010 ---- 001- ---- ---- ---- # SVE load & replicate 32 bytes (scalar+imm)
26
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
27
index XXXXXXX..XXXXXXX 100644
28
--- a/target/arm/translate-sve.c
29
+++ b/target/arm/translate-sve.c
30
@@ -XXX,XX +XXX,XX @@ static bool trans_LD1RO_zprr(DisasContext *s, arg_rprr_load *a)
31
if (a->rm == 31) {
32
return false;
33
}
34
+ s->is_nonstreaming = true;
35
if (sve_access_check(s)) {
36
TCGv_i64 addr = new_tmp_a64(s);
37
tcg_gen_shli_i64(addr, cpu_reg(s, a->rm), dtype_msz(a->dtype));
38
@@ -XXX,XX +XXX,XX @@ static bool trans_LD1RO_zpri(DisasContext *s, arg_rpri_load *a)
39
if (!dc_isar_feature(aa64_sve_f64mm, s)) {
40
return false;
41
}
42
+ s->is_nonstreaming = true;
43
if (sve_access_check(s)) {
44
TCGv_i64 addr = new_tmp_a64(s);
45
tcg_gen_addi_i64(addr, cpu_reg_sp(s, a->rn), a->imm * 32);
46
--
47
2.25.1
diff view generated by jsdifflib
1
From: Ard Biesheuvel <ard.biesheuvel@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
This implements emulation of the new SHA-512 instructions that have
3
These functions will be used to verify that the cpu
4
been added as an optional extensions to the ARMv8 Crypto Extensions
4
is in the correct state for a given instruction.
5
in ARM v8.2.
6
5
7
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
8
Message-id: 20180207111729.15737-2-ard.biesheuvel@linaro.org
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220708151540.18136-16-richard.henderson@linaro.org
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
10
---
12
target/arm/cpu.h | 1 +
11
target/arm/translate-a64.h | 21 +++++++++++++++++++++
13
target/arm/helper.h | 5 +++
12
target/arm/translate-a64.c | 34 ++++++++++++++++++++++++++++++++++
14
target/arm/crypto_helper.c | 90 ++++++++++++++++++++++++++++++++++++-
13
2 files changed, 55 insertions(+)
15
target/arm/translate-a64.c | 110 +++++++++++++++++++++++++++++++++++++++++++++
16
4 files changed, 205 insertions(+), 1 deletion(-)
17
14
18
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
15
diff --git a/target/arm/translate-a64.h b/target/arm/translate-a64.h
19
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
20
--- a/target/arm/cpu.h
17
--- a/target/arm/translate-a64.h
21
+++ b/target/arm/cpu.h
18
+++ b/target/arm/translate-a64.h
22
@@ -XXX,XX +XXX,XX @@ enum arm_features {
19
@@ -XXX,XX +XXX,XX @@ void write_fp_dreg(DisasContext *s, int reg, TCGv_i64 v);
23
ARM_FEATURE_M_SECURITY, /* M profile Security Extension */
20
bool logic_imm_decode_wmask(uint64_t *result, unsigned int immn,
24
ARM_FEATURE_JAZELLE, /* has (trivial) Jazelle implementation */
21
unsigned int imms, unsigned int immr);
25
ARM_FEATURE_SVE, /* has Scalable Vector Extension */
22
bool sve_access_check(DisasContext *s);
26
+ ARM_FEATURE_V8_SHA512, /* implements SHA512 part of v8 Crypto Extensions */
23
+bool sme_enabled_check(DisasContext *s);
27
};
24
+bool sme_enabled_check_with_svcr(DisasContext *s, unsigned);
28
29
static inline int arm_feature(CPUARMState *env, int feature)
30
diff --git a/target/arm/helper.h b/target/arm/helper.h
31
index XXXXXXX..XXXXXXX 100644
32
--- a/target/arm/helper.h
33
+++ b/target/arm/helper.h
34
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_3(crypto_sha256h2, TCG_CALL_NO_RWG, void, ptr, ptr, ptr)
35
DEF_HELPER_FLAGS_2(crypto_sha256su0, TCG_CALL_NO_RWG, void, ptr, ptr)
36
DEF_HELPER_FLAGS_3(crypto_sha256su1, TCG_CALL_NO_RWG, void, ptr, ptr, ptr)
37
38
+DEF_HELPER_FLAGS_3(crypto_sha512h, TCG_CALL_NO_RWG, void, ptr, ptr, ptr)
39
+DEF_HELPER_FLAGS_3(crypto_sha512h2, TCG_CALL_NO_RWG, void, ptr, ptr, ptr)
40
+DEF_HELPER_FLAGS_2(crypto_sha512su0, TCG_CALL_NO_RWG, void, ptr, ptr)
41
+DEF_HELPER_FLAGS_3(crypto_sha512su1, TCG_CALL_NO_RWG, void, ptr, ptr, ptr)
42
+
25
+
43
DEF_HELPER_FLAGS_3(crc32, TCG_CALL_NO_RWG_SE, i32, i32, i32, i32)
26
+/* This function corresponds to CheckStreamingSVEEnabled. */
44
DEF_HELPER_FLAGS_3(crc32c, TCG_CALL_NO_RWG_SE, i32, i32, i32, i32)
27
+static inline bool sme_sm_enabled_check(DisasContext *s)
45
DEF_HELPER_2(dc_zva, void, env, i64)
46
diff --git a/target/arm/crypto_helper.c b/target/arm/crypto_helper.c
47
index XXXXXXX..XXXXXXX 100644
48
--- a/target/arm/crypto_helper.c
49
+++ b/target/arm/crypto_helper.c
50
@@ -XXX,XX +XXX,XX @@
51
/*
52
* crypto_helper.c - emulate v8 Crypto Extensions instructions
53
*
54
- * Copyright (C) 2013 - 2014 Linaro Ltd <ard.biesheuvel@linaro.org>
55
+ * Copyright (C) 2013 - 2018 Linaro Ltd <ard.biesheuvel@linaro.org>
56
*
57
* This library is free software; you can redistribute it and/or
58
* modify it under the terms of the GNU Lesser General Public
59
@@ -XXX,XX +XXX,XX @@ void HELPER(crypto_sha256su1)(void *vd, void *vn, void *vm)
60
rd[0] = d.l[0];
61
rd[1] = d.l[1];
62
}
63
+
64
+/*
65
+ * The SHA-512 logical functions (same as above but using 64-bit operands)
66
+ */
67
+
68
+static uint64_t cho512(uint64_t x, uint64_t y, uint64_t z)
69
+{
28
+{
70
+ return (x & (y ^ z)) ^ z;
29
+ return sme_enabled_check_with_svcr(s, R_SVCR_SM_MASK);
71
+}
30
+}
72
+
31
+
73
+static uint64_t maj512(uint64_t x, uint64_t y, uint64_t z)
32
+/* This function corresponds to CheckSMEAndZAEnabled. */
33
+static inline bool sme_za_enabled_check(DisasContext *s)
74
+{
34
+{
75
+ return (x & y) | ((x | y) & z);
35
+ return sme_enabled_check_with_svcr(s, R_SVCR_ZA_MASK);
76
+}
36
+}
77
+
37
+
78
+static uint64_t S0_512(uint64_t x)
38
+/* Note that this function corresponds to CheckStreamingSVEAndZAEnabled. */
39
+static inline bool sme_smza_enabled_check(DisasContext *s)
79
+{
40
+{
80
+ return ror64(x, 28) ^ ror64(x, 34) ^ ror64(x, 39);
41
+ return sme_enabled_check_with_svcr(s, R_SVCR_SM_MASK | R_SVCR_ZA_MASK);
81
+}
42
+}
82
+
43
+
83
+static uint64_t S1_512(uint64_t x)
44
TCGv_i64 clean_data_tbi(DisasContext *s, TCGv_i64 addr);
84
+{
45
TCGv_i64 gen_mte_check1(DisasContext *s, TCGv_i64 addr, bool is_write,
85
+ return ror64(x, 14) ^ ror64(x, 18) ^ ror64(x, 41);
46
bool tag_checked, int log2_size);
86
+}
87
+
88
+static uint64_t s0_512(uint64_t x)
89
+{
90
+ return ror64(x, 1) ^ ror64(x, 8) ^ (x >> 7);
91
+}
92
+
93
+static uint64_t s1_512(uint64_t x)
94
+{
95
+ return ror64(x, 19) ^ ror64(x, 61) ^ (x >> 6);
96
+}
97
+
98
+void HELPER(crypto_sha512h)(void *vd, void *vn, void *vm)
99
+{
100
+ uint64_t *rd = vd;
101
+ uint64_t *rn = vn;
102
+ uint64_t *rm = vm;
103
+ uint64_t d0 = rd[0];
104
+ uint64_t d1 = rd[1];
105
+
106
+ d1 += S1_512(rm[1]) + cho512(rm[1], rn[0], rn[1]);
107
+ d0 += S1_512(d1 + rm[0]) + cho512(d1 + rm[0], rm[1], rn[0]);
108
+
109
+ rd[0] = d0;
110
+ rd[1] = d1;
111
+}
112
+
113
+void HELPER(crypto_sha512h2)(void *vd, void *vn, void *vm)
114
+{
115
+ uint64_t *rd = vd;
116
+ uint64_t *rn = vn;
117
+ uint64_t *rm = vm;
118
+ uint64_t d0 = rd[0];
119
+ uint64_t d1 = rd[1];
120
+
121
+ d1 += S0_512(rm[0]) + maj512(rn[0], rm[1], rm[0]);
122
+ d0 += S0_512(d1) + maj512(d1, rm[0], rm[1]);
123
+
124
+ rd[0] = d0;
125
+ rd[1] = d1;
126
+}
127
+
128
+void HELPER(crypto_sha512su0)(void *vd, void *vn)
129
+{
130
+ uint64_t *rd = vd;
131
+ uint64_t *rn = vn;
132
+ uint64_t d0 = rd[0];
133
+ uint64_t d1 = rd[1];
134
+
135
+ d0 += s0_512(rd[1]);
136
+ d1 += s0_512(rn[0]);
137
+
138
+ rd[0] = d0;
139
+ rd[1] = d1;
140
+}
141
+
142
+void HELPER(crypto_sha512su1)(void *vd, void *vn, void *vm)
143
+{
144
+ uint64_t *rd = vd;
145
+ uint64_t *rn = vn;
146
+ uint64_t *rm = vm;
147
+
148
+ rd[0] += s1_512(rn[0]) + rm[0];
149
+ rd[1] += s1_512(rn[1]) + rm[1];
150
+}
151
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
47
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
152
index XXXXXXX..XXXXXXX 100644
48
index XXXXXXX..XXXXXXX 100644
153
--- a/target/arm/translate-a64.c
49
--- a/target/arm/translate-a64.c
154
+++ b/target/arm/translate-a64.c
50
+++ b/target/arm/translate-a64.c
155
@@ -XXX,XX +XXX,XX @@ static void disas_crypto_two_reg_sha(DisasContext *s, uint32_t insn)
51
@@ -XXX,XX +XXX,XX @@ static bool sme_access_check(DisasContext *s)
156
tcg_temp_free_ptr(tcg_rn_ptr);
52
return true;
157
}
53
}
158
54
159
+/* Crypto three-reg SHA512
55
+/* This function corresponds to CheckSMEEnabled. */
160
+ * 31 21 20 16 15 14 13 12 11 10 9 5 4 0
56
+bool sme_enabled_check(DisasContext *s)
161
+ * +-----------------------+------+---+---+-----+--------+------+------+
162
+ * | 1 1 0 0 1 1 1 0 0 1 1 | Rm | 1 | O | 0 0 | opcode | Rn | Rd |
163
+ * +-----------------------+------+---+---+-----+--------+------+------+
164
+ */
165
+static void disas_crypto_three_reg_sha512(DisasContext *s, uint32_t insn)
166
+{
57
+{
167
+ int opcode = extract32(insn, 10, 2);
58
+ /*
168
+ int o = extract32(insn, 14, 1);
59
+ * Note that unlike sve_excp_el, we have not constrained sme_excp_el
169
+ int rm = extract32(insn, 16, 5);
60
+ * to be zero when fp_excp_el has priority. This is because we need
170
+ int rn = extract32(insn, 5, 5);
61
+ * sme_excp_el by itself for cpregs access checks.
171
+ int rd = extract32(insn, 0, 5);
62
+ */
172
+ int feature;
63
+ if (!s->fp_excp_el || s->sme_excp_el < s->fp_excp_el) {
173
+ CryptoThreeOpFn *genfn;
64
+ s->fp_access_checked = true;
174
+
65
+ return sme_access_check(s);
175
+ if (o == 0) {
176
+ switch (opcode) {
177
+ case 0: /* SHA512H */
178
+ feature = ARM_FEATURE_V8_SHA512;
179
+ genfn = gen_helper_crypto_sha512h;
180
+ break;
181
+ case 1: /* SHA512H2 */
182
+ feature = ARM_FEATURE_V8_SHA512;
183
+ genfn = gen_helper_crypto_sha512h2;
184
+ break;
185
+ case 2: /* SHA512SU1 */
186
+ feature = ARM_FEATURE_V8_SHA512;
187
+ genfn = gen_helper_crypto_sha512su1;
188
+ break;
189
+ default:
190
+ unallocated_encoding(s);
191
+ return;
192
+ }
193
+ } else {
194
+ unallocated_encoding(s);
195
+ return;
196
+ }
66
+ }
197
+
67
+ return fp_access_check_only(s);
198
+ if (!arm_dc_feature(s, feature)) {
199
+ unallocated_encoding(s);
200
+ return;
201
+ }
202
+
203
+ if (!fp_access_check(s)) {
204
+ return;
205
+ }
206
+
207
+ if (genfn) {
208
+ TCGv_ptr tcg_rd_ptr, tcg_rn_ptr, tcg_rm_ptr;
209
+
210
+ tcg_rd_ptr = vec_full_reg_ptr(s, rd);
211
+ tcg_rn_ptr = vec_full_reg_ptr(s, rn);
212
+ tcg_rm_ptr = vec_full_reg_ptr(s, rm);
213
+
214
+ genfn(tcg_rd_ptr, tcg_rn_ptr, tcg_rm_ptr);
215
+
216
+ tcg_temp_free_ptr(tcg_rd_ptr);
217
+ tcg_temp_free_ptr(tcg_rn_ptr);
218
+ tcg_temp_free_ptr(tcg_rm_ptr);
219
+ } else {
220
+ g_assert_not_reached();
221
+ }
222
+}
68
+}
223
+
69
+
224
+/* Crypto two-reg SHA512
70
+/* Common subroutine for CheckSMEAnd*Enabled. */
225
+ * 31 12 11 10 9 5 4 0
71
+bool sme_enabled_check_with_svcr(DisasContext *s, unsigned req)
226
+ * +-----------------------------------------+--------+------+------+
227
+ * | 1 1 0 0 1 1 1 0 1 1 0 0 0 0 0 0 1 0 0 0 | opcode | Rn | Rd |
228
+ * +-----------------------------------------+--------+------+------+
229
+ */
230
+static void disas_crypto_two_reg_sha512(DisasContext *s, uint32_t insn)
231
+{
72
+{
232
+ int opcode = extract32(insn, 10, 2);
73
+ if (!sme_enabled_check(s)) {
233
+ int rn = extract32(insn, 5, 5);
74
+ return false;
234
+ int rd = extract32(insn, 0, 5);
235
+ TCGv_ptr tcg_rd_ptr, tcg_rn_ptr;
236
+ int feature;
237
+ CryptoTwoOpFn *genfn;
238
+
239
+ switch (opcode) {
240
+ case 0: /* SHA512SU0 */
241
+ feature = ARM_FEATURE_V8_SHA512;
242
+ genfn = gen_helper_crypto_sha512su0;
243
+ break;
244
+ default:
245
+ unallocated_encoding(s);
246
+ return;
247
+ }
75
+ }
248
+
76
+ if (FIELD_EX64(req, SVCR, SM) && !s->pstate_sm) {
249
+ if (!arm_dc_feature(s, feature)) {
77
+ gen_exception_insn(s, s->pc_curr, EXCP_UDEF,
250
+ unallocated_encoding(s);
78
+ syn_smetrap(SME_ET_NotStreaming, false));
251
+ return;
79
+ return false;
252
+ }
80
+ }
253
+
81
+ if (FIELD_EX64(req, SVCR, ZA) && !s->pstate_za) {
254
+ if (!fp_access_check(s)) {
82
+ gen_exception_insn(s, s->pc_curr, EXCP_UDEF,
255
+ return;
83
+ syn_smetrap(SME_ET_InactiveZA, false));
84
+ return false;
256
+ }
85
+ }
257
+
86
+ return true;
258
+ tcg_rd_ptr = vec_full_reg_ptr(s, rd);
259
+ tcg_rn_ptr = vec_full_reg_ptr(s, rn);
260
+
261
+ genfn(tcg_rd_ptr, tcg_rn_ptr);
262
+
263
+ tcg_temp_free_ptr(tcg_rd_ptr);
264
+ tcg_temp_free_ptr(tcg_rn_ptr);
265
+}
87
+}
266
+
88
+
267
/* C3.6 Data processing - SIMD, inc Crypto
89
/*
268
*
90
* This utility function is for doing register extension with an
269
* As the decode gets a little complex we are using a table based
91
* optional shift. You will likely want to pass a temporary for the
270
@@ -XXX,XX +XXX,XX @@ static const AArch64DecodeTable data_proc_simd[] = {
271
{ 0x4e280800, 0xff3e0c00, disas_crypto_aes },
272
{ 0x5e000000, 0xff208c00, disas_crypto_three_reg_sha },
273
{ 0x5e280800, 0xff3e0c00, disas_crypto_two_reg_sha },
274
+ { 0xce608000, 0xffe0b000, disas_crypto_three_reg_sha512 },
275
+ { 0xcec08000, 0xfffff000, disas_crypto_two_reg_sha512 },
276
{ 0x00000000, 0x00000000, NULL }
277
};
278
279
--
92
--
280
2.16.1
93
2.25.1
281
282
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Change vfp.regs as a uint64_t to vfp.zregs as an ARMVectorReg.
3
The pseudocode for CheckSVEEnabled gains a check for Streaming
4
The previous patches have made the change in representation
4
SVE mode, and for SME present but SVE absent.
5
relatively painless.
6
5
7
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Message-id: 20220708151540.18136-17-richard.henderson@linaro.org
10
Message-id: 20180123035349.24538-2-richard.henderson@linaro.org
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
10
---
13
target/arm/cpu.h | 59 +++++++++++++++++++++++++++++++---------------
11
target/arm/translate-a64.c | 22 ++++++++++++++++------
14
target/arm/machine.c | 35 ++++++++++++++++++++++++++-
12
1 file changed, 16 insertions(+), 6 deletions(-)
15
target/arm/translate-a64.c | 8 +++----
16
target/arm/translate.c | 7 +++---
17
4 files changed, 81 insertions(+), 28 deletions(-)
18
13
19
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
20
index XXXXXXX..XXXXXXX 100644
21
--- a/target/arm/cpu.h
22
+++ b/target/arm/cpu.h
23
@@ -XXX,XX +XXX,XX @@ typedef struct {
24
uint32_t base_mask;
25
} TCR;
26
27
+/* Define a maximum sized vector register.
28
+ * For 32-bit, this is a 128-bit NEON/AdvSIMD register.
29
+ * For 64-bit, this is a 2048-bit SVE register.
30
+ *
31
+ * Note that the mapping between S, D, and Q views of the register bank
32
+ * differs between AArch64 and AArch32.
33
+ * In AArch32:
34
+ * Qn = regs[n].d[1]:regs[n].d[0]
35
+ * Dn = regs[n / 2].d[n & 1]
36
+ * Sn = regs[n / 4].d[n % 4 / 2],
37
+ * bits 31..0 for even n, and bits 63..32 for odd n
38
+ * (and regs[16] to regs[31] are inaccessible)
39
+ * In AArch64:
40
+ * Zn = regs[n].d[*]
41
+ * Qn = regs[n].d[1]:regs[n].d[0]
42
+ * Dn = regs[n].d[0]
43
+ * Sn = regs[n].d[0] bits 31..0
44
+ *
45
+ * This corresponds to the architecturally defined mapping between
46
+ * the two execution states, and means we do not need to explicitly
47
+ * map these registers when changing states.
48
+ *
49
+ * Align the data for use with TCG host vector operations.
50
+ */
51
+
52
+#ifdef TARGET_AARCH64
53
+# define ARM_MAX_VQ 16
54
+#else
55
+# define ARM_MAX_VQ 1
56
+#endif
57
+
58
+typedef struct ARMVectorReg {
59
+ uint64_t d[2 * ARM_MAX_VQ] QEMU_ALIGNED(16);
60
+} ARMVectorReg;
61
+
62
+
63
typedef struct CPUARMState {
64
/* Regs for current mode. */
65
uint32_t regs[16];
66
@@ -XXX,XX +XXX,XX @@ typedef struct CPUARMState {
67
68
/* VFP coprocessor state. */
69
struct {
70
- /* VFP/Neon register state. Note that the mapping between S, D and Q
71
- * views of the register bank differs between AArch64 and AArch32:
72
- * In AArch32:
73
- * Qn = regs[2n+1]:regs[2n]
74
- * Dn = regs[n]
75
- * Sn = regs[n/2] bits 31..0 for even n, and bits 63..32 for odd n
76
- * (and regs[32] to regs[63] are inaccessible)
77
- * In AArch64:
78
- * Qn = regs[2n+1]:regs[2n]
79
- * Dn = regs[2n]
80
- * Sn = regs[2n] bits 31..0
81
- * This corresponds to the architecturally defined mapping between
82
- * the two execution states, and means we do not need to explicitly
83
- * map these registers when changing states.
84
- */
85
- uint64_t regs[64] QEMU_ALIGNED(16);
86
+ ARMVectorReg zregs[32];
87
88
uint32_t xregs[16];
89
/* We store these fpcsr fields separately for convenience. */
90
@@ -XXX,XX +XXX,XX @@ static inline void *arm_get_el_change_hook_opaque(ARMCPU *cpu)
91
*/
92
static inline uint64_t *aa32_vfp_dreg(CPUARMState *env, unsigned regno)
93
{
94
- return &env->vfp.regs[regno];
95
+ return &env->vfp.zregs[regno >> 1].d[regno & 1];
96
}
97
98
/**
99
@@ -XXX,XX +XXX,XX @@ static inline uint64_t *aa32_vfp_dreg(CPUARMState *env, unsigned regno)
100
*/
101
static inline uint64_t *aa32_vfp_qreg(CPUARMState *env, unsigned regno)
102
{
103
- return &env->vfp.regs[2 * regno];
104
+ return &env->vfp.zregs[regno].d[0];
105
}
106
107
/**
108
@@ -XXX,XX +XXX,XX @@ static inline uint64_t *aa32_vfp_qreg(CPUARMState *env, unsigned regno)
109
*/
110
static inline uint64_t *aa64_vfp_qreg(CPUARMState *env, unsigned regno)
111
{
112
- return &env->vfp.regs[2 * regno];
113
+ return &env->vfp.zregs[regno].d[0];
114
}
115
116
#endif
117
diff --git a/target/arm/machine.c b/target/arm/machine.c
118
index XXXXXXX..XXXXXXX 100644
119
--- a/target/arm/machine.c
120
+++ b/target/arm/machine.c
121
@@ -XXX,XX +XXX,XX @@ static const VMStateDescription vmstate_vfp = {
122
.minimum_version_id = 3,
123
.needed = vfp_needed,
124
.fields = (VMStateField[]) {
125
- VMSTATE_UINT64_ARRAY(env.vfp.regs, ARMCPU, 64),
126
+ /* For compatibility, store Qn out of Zn here. */
127
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[0].d, ARMCPU, 0, 2),
128
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[1].d, ARMCPU, 0, 2),
129
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[2].d, ARMCPU, 0, 2),
130
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[3].d, ARMCPU, 0, 2),
131
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[4].d, ARMCPU, 0, 2),
132
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[5].d, ARMCPU, 0, 2),
133
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[6].d, ARMCPU, 0, 2),
134
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[7].d, ARMCPU, 0, 2),
135
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[8].d, ARMCPU, 0, 2),
136
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[9].d, ARMCPU, 0, 2),
137
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[10].d, ARMCPU, 0, 2),
138
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[11].d, ARMCPU, 0, 2),
139
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[12].d, ARMCPU, 0, 2),
140
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[13].d, ARMCPU, 0, 2),
141
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[14].d, ARMCPU, 0, 2),
142
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[15].d, ARMCPU, 0, 2),
143
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[16].d, ARMCPU, 0, 2),
144
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[17].d, ARMCPU, 0, 2),
145
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[18].d, ARMCPU, 0, 2),
146
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[19].d, ARMCPU, 0, 2),
147
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[20].d, ARMCPU, 0, 2),
148
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[21].d, ARMCPU, 0, 2),
149
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[22].d, ARMCPU, 0, 2),
150
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[23].d, ARMCPU, 0, 2),
151
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[24].d, ARMCPU, 0, 2),
152
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[25].d, ARMCPU, 0, 2),
153
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[26].d, ARMCPU, 0, 2),
154
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[27].d, ARMCPU, 0, 2),
155
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[28].d, ARMCPU, 0, 2),
156
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[29].d, ARMCPU, 0, 2),
157
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[30].d, ARMCPU, 0, 2),
158
+ VMSTATE_UINT64_SUB_ARRAY(env.vfp.zregs[31].d, ARMCPU, 0, 2),
159
+
160
/* The xregs array is a little awkward because element 1 (FPSCR)
161
* requires a specific accessor, so we have to split it up in
162
* the vmstate:
163
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
14
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
164
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
165
--- a/target/arm/translate-a64.c
16
--- a/target/arm/translate-a64.c
166
+++ b/target/arm/translate-a64.c
17
+++ b/target/arm/translate-a64.c
167
@@ -XXX,XX +XXX,XX @@ static inline int vec_reg_offset(DisasContext *s, int regno,
18
@@ -XXX,XX +XXX,XX @@ static bool fp_access_check(DisasContext *s)
19
return true;
20
}
21
22
-/* Check that SVE access is enabled. If it is, return true.
23
+/*
24
+ * Check that SVE access is enabled. If it is, return true.
25
* If not, emit code to generate an appropriate exception and return false.
26
+ * This function corresponds to CheckSVEEnabled().
27
*/
28
bool sve_access_check(DisasContext *s)
168
{
29
{
169
int offs = 0;
30
- if (s->sve_excp_el) {
170
#ifdef HOST_WORDS_BIGENDIAN
31
- assert(!s->sve_access_checked);
171
- /* This is complicated slightly because vfp.regs[2n] is
32
- s->sve_access_checked = true;
172
- * still the low half and vfp.regs[2n+1] the high half
33
-
173
+ /* This is complicated slightly because vfp.zregs[n].d[0] is
34
+ if (s->pstate_sm || !dc_isar_feature(aa64_sve, s)) {
174
+ * still the low half and vfp.zregs[n].d[1] the high half
35
+ assert(dc_isar_feature(aa64_sme, s));
175
* of the 128 bit vector, even on big endian systems.
36
+ if (!sme_sm_enabled_check(s)) {
176
* Calculate the offset assuming a fully bigendian 128 bits,
37
+ goto fail_exit;
177
* then XOR to account for the order of the two 64 bit halves.
38
+ }
178
@@ -XXX,XX +XXX,XX @@ static inline int vec_reg_offset(DisasContext *s, int regno,
39
+ } else if (s->sve_excp_el) {
179
#else
40
gen_exception_insn_el(s, s->pc_curr, EXCP_UDEF,
180
offs += element * (1 << size);
41
syn_sve_access_trap(), s->sve_excp_el);
181
#endif
42
- return false;
182
- offs += offsetof(CPUARMState, vfp.regs[regno * 2]);
43
+ goto fail_exit;
183
+ offs += offsetof(CPUARMState, vfp.zregs[regno]);
44
}
184
assert_fp_access_checked(s);
45
s->sve_access_checked = true;
185
return offs;
46
return fp_access_check(s);
47
+
48
+ fail_exit:
49
+ /* Assert that we only raise one exception per instruction. */
50
+ assert(!s->sve_access_checked);
51
+ s->sve_access_checked = true;
52
+ return false;
186
}
53
}
187
@@ -XXX,XX +XXX,XX @@ static inline int vec_reg_offset(DisasContext *s, int regno,
54
188
static inline int vec_full_reg_offset(DisasContext *s, int regno)
55
/*
189
{
190
assert_fp_access_checked(s);
191
- return offsetof(CPUARMState, vfp.regs[regno * 2]);
192
+ return offsetof(CPUARMState, vfp.zregs[regno]);
193
}
194
195
/* Return a newly allocated pointer to the vector register. */
196
diff --git a/target/arm/translate.c b/target/arm/translate.c
197
index XXXXXXX..XXXXXXX 100644
198
--- a/target/arm/translate.c
199
+++ b/target/arm/translate.c
200
@@ -XXX,XX +XXX,XX @@ static inline void gen_vfp_st(DisasContext *s, int dp, TCGv_i32 addr)
201
}
202
}
203
204
-static inline long
205
-vfp_reg_offset (int dp, int reg)
206
+static inline long vfp_reg_offset(bool dp, unsigned reg)
207
{
208
if (dp) {
209
- return offsetof(CPUARMState, vfp.regs[reg]);
210
+ return offsetof(CPUARMState, vfp.zregs[reg >> 1].d[reg & 1]);
211
} else {
212
- long ofs = offsetof(CPUARMState, vfp.regs[reg >> 1]);
213
+ long ofs = offsetof(CPUARMState, vfp.zregs[reg >> 2].d[(reg >> 1) & 1]);
214
if (reg & 1) {
215
ofs += offsetof(CPU_DoubleU, l.upper);
216
} else {
217
--
56
--
218
2.16.1
57
2.25.1
219
220
diff view generated by jsdifflib
1
From: Andrey Smirnov <andrew.smirnov@gmail.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Add code to emulate Chipidea USB IP (used in i.MX SoCs). Tested to
3
These SME instructions are nominally within the SVE decode space,
4
work against:
4
so we add them to sve.decode and translate-sve.c.
5
5
6
-usb -drive if=none,id=stick,file=usb.img,format=raw -device \
7
usb-storage,bus=usb-bus.0,drive=stick
8
9
Cc: Peter Maydell <peter.maydell@linaro.org>
10
Cc: Jason Wang <jasowang@redhat.com>
11
Cc: Philippe Mathieu-Daudé <f4bug@amsat.org>
12
Cc: Marcel Apfelbaum <marcel.apfelbaum@zoho.com>
13
Cc: Michael S. Tsirkin <mst@redhat.com>
14
Cc: qemu-devel@nongnu.org
15
Cc: qemu-arm@nongnu.org
16
Cc: yurovsky@gmail.com
17
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
18
Signed-off-by: Andrey Smirnov <andrew.smirnov@gmail.com>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220708151540.18136-18-richard.henderson@linaro.org
19
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
20
---
10
---
21
hw/usb/Makefile.objs | 1 +
11
target/arm/translate-a64.h | 12 ++++++++++++
22
include/hw/usb/chipidea.h | 16 +++++
12
target/arm/sve.decode | 5 ++++-
23
hw/usb/chipidea.c | 176 ++++++++++++++++++++++++++++++++++++++++++++++
13
target/arm/translate-sve.c | 38 ++++++++++++++++++++++++++++++++++++++
24
3 files changed, 193 insertions(+)
14
3 files changed, 54 insertions(+), 1 deletion(-)
25
create mode 100644 include/hw/usb/chipidea.h
26
create mode 100644 hw/usb/chipidea.c
27
15
28
diff --git a/hw/usb/Makefile.objs b/hw/usb/Makefile.objs
16
diff --git a/target/arm/translate-a64.h b/target/arm/translate-a64.h
29
index XXXXXXX..XXXXXXX 100644
17
index XXXXXXX..XXXXXXX 100644
30
--- a/hw/usb/Makefile.objs
18
--- a/target/arm/translate-a64.h
31
+++ b/hw/usb/Makefile.objs
19
+++ b/target/arm/translate-a64.h
32
@@ -XXX,XX +XXX,XX @@ common-obj-$(CONFIG_USB_XHCI_NEC) += hcd-xhci-nec.o
20
@@ -XXX,XX +XXX,XX @@ static inline int vec_full_reg_size(DisasContext *s)
33
common-obj-$(CONFIG_USB_MUSB) += hcd-musb.o
21
return s->vl;
34
22
}
35
obj-$(CONFIG_TUSB6010) += tusb6010.o
23
36
+obj-$(CONFIG_IMX) += chipidea.o
24
+/* Return the byte size of the vector register, SVL / 8. */
37
25
+static inline int streaming_vec_reg_size(DisasContext *s)
38
# emulated usb devices
39
common-obj-$(CONFIG_USB) += dev-hub.o
40
diff --git a/include/hw/usb/chipidea.h b/include/hw/usb/chipidea.h
41
new file mode 100644
42
index XXXXXXX..XXXXXXX
43
--- /dev/null
44
+++ b/include/hw/usb/chipidea.h
45
@@ -XXX,XX +XXX,XX @@
46
+#ifndef CHIPIDEA_H
47
+#define CHIPIDEA_H
48
+
49
+#include "hw/usb/hcd-ehci.h"
50
+
51
+typedef struct ChipideaState {
52
+ /*< private >*/
53
+ EHCISysBusState parent_obj;
54
+
55
+ MemoryRegion iomem[3];
56
+} ChipideaState;
57
+
58
+#define TYPE_CHIPIDEA "usb-chipidea"
59
+#define CHIPIDEA(obj) OBJECT_CHECK(ChipideaState, (obj), TYPE_CHIPIDEA)
60
+
61
+#endif /* CHIPIDEA_H */
62
diff --git a/hw/usb/chipidea.c b/hw/usb/chipidea.c
63
new file mode 100644
64
index XXXXXXX..XXXXXXX
65
--- /dev/null
66
+++ b/hw/usb/chipidea.c
67
@@ -XXX,XX +XXX,XX @@
68
+/*
69
+ * Copyright (c) 2018, Impinj, Inc.
70
+ *
71
+ * Chipidea USB block emulation code
72
+ *
73
+ * Author: Andrey Smirnov <andrew.smirnov@gmail.com>
74
+ *
75
+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
76
+ * See the COPYING file in the top-level directory.
77
+ */
78
+
79
+#include "qemu/osdep.h"
80
+#include "hw/usb/hcd-ehci.h"
81
+#include "hw/usb/chipidea.h"
82
+#include "qemu/log.h"
83
+
84
+enum {
85
+ CHIPIDEA_USBx_DCIVERSION = 0x000,
86
+ CHIPIDEA_USBx_DCCPARAMS = 0x004,
87
+ CHIPIDEA_USBx_DCCPARAMS_HC = BIT(8),
88
+};
89
+
90
+static uint64_t chipidea_read(void *opaque, hwaddr offset,
91
+ unsigned size)
92
+{
26
+{
93
+ return 0;
27
+ return s->svl;
94
+}
28
+}
95
+
29
+
96
+static void chipidea_write(void *opaque, hwaddr offset,
30
/*
97
+ uint64_t value, unsigned size)
31
* Return the offset info CPUARMState of the predicate vector register Pn.
32
* Note for this purpose, FFR is P16.
33
@@ -XXX,XX +XXX,XX @@ static inline int pred_full_reg_size(DisasContext *s)
34
return s->vl >> 3;
35
}
36
37
+/* Return the byte size of the predicate register, SVL / 64. */
38
+static inline int streaming_pred_reg_size(DisasContext *s)
98
+{
39
+{
40
+ return s->svl >> 3;
99
+}
41
+}
100
+
42
+
101
+static const struct MemoryRegionOps chipidea_ops = {
43
/*
102
+ .read = chipidea_read,
44
* Round up the size of a register to a size allowed by
103
+ .write = chipidea_write,
45
* the tcg vector infrastructure. Any operation which uses this
104
+ .endianness = DEVICE_NATIVE_ENDIAN,
46
diff --git a/target/arm/sve.decode b/target/arm/sve.decode
105
+ .impl = {
47
index XXXXXXX..XXXXXXX 100644
106
+ /*
48
--- a/target/arm/sve.decode
107
+ * Our device would not work correctly if the guest was doing
49
+++ b/target/arm/sve.decode
108
+ * unaligned access. This might not be a limitation on the
50
@@ -XXX,XX +XXX,XX @@ INDEX_ri 00000100 esz:2 1 imm:s5 010001 rn:5 rd:5
109
+ * real device but in practice there is no reason for a guest
51
# SVE index generation (register start, register increment)
110
+ * to access this device unaligned.
52
INDEX_rr 00000100 .. 1 ..... 010011 ..... ..... @rd_rn_rm
111
+ */
53
112
+ .min_access_size = 4,
54
-### SVE Stack Allocation Group
113
+ .max_access_size = 4,
55
+### SVE / Streaming SVE Stack Allocation Group
114
+ .unaligned = false,
56
115
+ },
57
# SVE stack frame adjustment
116
+};
58
ADDVL 00000100 001 ..... 01010 ...... ..... @rd_rn_i6
117
+
59
+ADDSVL 00000100 001 ..... 01011 ...... ..... @rd_rn_i6
118
+static uint64_t chipidea_dc_read(void *opaque, hwaddr offset,
60
ADDPL 00000100 011 ..... 01010 ...... ..... @rd_rn_i6
119
+ unsigned size)
61
+ADDSPL 00000100 011 ..... 01011 ...... ..... @rd_rn_i6
62
63
# SVE stack frame size
64
RDVL 00000100 101 11111 01010 imm:s6 rd:5
65
+RDSVL 00000100 101 11111 01011 imm:s6 rd:5
66
67
### SVE Bitwise Shift - Unpredicated Group
68
69
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
70
index XXXXXXX..XXXXXXX 100644
71
--- a/target/arm/translate-sve.c
72
+++ b/target/arm/translate-sve.c
73
@@ -XXX,XX +XXX,XX @@ static bool trans_ADDVL(DisasContext *s, arg_ADDVL *a)
74
return true;
75
}
76
77
+static bool trans_ADDSVL(DisasContext *s, arg_ADDSVL *a)
120
+{
78
+{
121
+ switch (offset) {
79
+ if (!dc_isar_feature(aa64_sme, s)) {
122
+ case CHIPIDEA_USBx_DCIVERSION:
80
+ return false;
123
+ return 0x1;
124
+ case CHIPIDEA_USBx_DCCPARAMS:
125
+ /*
126
+ * Real hardware (at least i.MX7) will also report the
127
+ * controller as "Device Capable" (and 8 supported endpoints),
128
+ * but there doesn't seem to be much point in doing so, since
129
+ * we don't emulate that part.
130
+ */
131
+ return CHIPIDEA_USBx_DCCPARAMS_HC;
132
+ }
81
+ }
133
+
82
+ if (sme_enabled_check(s)) {
134
+ return 0;
83
+ TCGv_i64 rd = cpu_reg_sp(s, a->rd);
84
+ TCGv_i64 rn = cpu_reg_sp(s, a->rn);
85
+ tcg_gen_addi_i64(rd, rn, a->imm * streaming_vec_reg_size(s));
86
+ }
87
+ return true;
135
+}
88
+}
136
+
89
+
137
+static void chipidea_dc_write(void *opaque, hwaddr offset,
90
static bool trans_ADDPL(DisasContext *s, arg_ADDPL *a)
138
+ uint64_t value, unsigned size)
91
{
92
if (!dc_isar_feature(aa64_sve, s)) {
93
@@ -XXX,XX +XXX,XX @@ static bool trans_ADDPL(DisasContext *s, arg_ADDPL *a)
94
return true;
95
}
96
97
+static bool trans_ADDSPL(DisasContext *s, arg_ADDSPL *a)
139
+{
98
+{
99
+ if (!dc_isar_feature(aa64_sme, s)) {
100
+ return false;
101
+ }
102
+ if (sme_enabled_check(s)) {
103
+ TCGv_i64 rd = cpu_reg_sp(s, a->rd);
104
+ TCGv_i64 rn = cpu_reg_sp(s, a->rn);
105
+ tcg_gen_addi_i64(rd, rn, a->imm * streaming_pred_reg_size(s));
106
+ }
107
+ return true;
140
+}
108
+}
141
+
109
+
142
+static const struct MemoryRegionOps chipidea_dc_ops = {
110
static bool trans_RDVL(DisasContext *s, arg_RDVL *a)
143
+ .read = chipidea_dc_read,
111
{
144
+ .write = chipidea_dc_write,
112
if (!dc_isar_feature(aa64_sve, s)) {
145
+ .endianness = DEVICE_NATIVE_ENDIAN,
113
@@ -XXX,XX +XXX,XX @@ static bool trans_RDVL(DisasContext *s, arg_RDVL *a)
146
+ .impl = {
114
return true;
147
+ /*
115
}
148
+ * Our device would not work correctly if the guest was doing
116
149
+ * unaligned access. This might not be a limitation on the real
117
+static bool trans_RDSVL(DisasContext *s, arg_RDSVL *a)
150
+ * device but in practice there is no reason for a guest to access
151
+ * this device unaligned.
152
+ */
153
+ .min_access_size = 4,
154
+ .max_access_size = 4,
155
+ .unaligned = false,
156
+ },
157
+};
158
+
159
+static void chipidea_init(Object *obj)
160
+{
118
+{
161
+ EHCIState *ehci = &SYS_BUS_EHCI(obj)->ehci;
119
+ if (!dc_isar_feature(aa64_sme, s)) {
162
+ ChipideaState *ci = CHIPIDEA(obj);
120
+ return false;
163
+ int i;
164
+
165
+ for (i = 0; i < ARRAY_SIZE(ci->iomem); i++) {
166
+ const struct {
167
+ const char *name;
168
+ hwaddr offset;
169
+ uint64_t size;
170
+ const struct MemoryRegionOps *ops;
171
+ } regions[ARRAY_SIZE(ci->iomem)] = {
172
+ /*
173
+ * Registers located between offsets 0x000 and 0xFC
174
+ */
175
+ {
176
+ .name = TYPE_CHIPIDEA ".misc",
177
+ .offset = 0x000,
178
+ .size = 0x100,
179
+ .ops = &chipidea_ops,
180
+ },
181
+ /*
182
+ * Registers located between offsets 0x1A4 and 0x1DC
183
+ */
184
+ {
185
+ .name = TYPE_CHIPIDEA ".endpoints",
186
+ .offset = 0x1A4,
187
+ .size = 0x1DC - 0x1A4 + 4,
188
+ .ops = &chipidea_ops,
189
+ },
190
+ /*
191
+ * USB_x_DCIVERSION and USB_x_DCCPARAMS
192
+ */
193
+ {
194
+ .name = TYPE_CHIPIDEA ".dc",
195
+ .offset = 0x120,
196
+ .size = 8,
197
+ .ops = &chipidea_dc_ops,
198
+ },
199
+ };
200
+
201
+ memory_region_init_io(&ci->iomem[i],
202
+ obj,
203
+ regions[i].ops,
204
+ ci,
205
+ regions[i].name,
206
+ regions[i].size);
207
+
208
+ memory_region_add_subregion(&ehci->mem,
209
+ regions[i].offset,
210
+ &ci->iomem[i]);
211
+ }
121
+ }
122
+ if (sme_enabled_check(s)) {
123
+ TCGv_i64 reg = cpu_reg(s, a->rd);
124
+ tcg_gen_movi_i64(reg, a->imm * streaming_vec_reg_size(s));
125
+ }
126
+ return true;
212
+}
127
+}
213
+
128
+
214
+static void chipidea_class_init(ObjectClass *klass, void *data)
129
/*
215
+{
130
*** SVE Compute Vector Address Group
216
+ DeviceClass *dc = DEVICE_CLASS(klass);
131
*/
217
+ SysBusEHCIClass *sec = SYS_BUS_EHCI_CLASS(klass);
218
+
219
+ /*
220
+ * Offsets used were taken from i.MX7Dual Applications Processor
221
+ * Reference Manual, Rev 0.1, p. 3177, Table 11-59
222
+ */
223
+ sec->capsbase = 0x100;
224
+ sec->opregbase = 0x140;
225
+ sec->portnr = 1;
226
+
227
+ set_bit(DEVICE_CATEGORY_USB, dc->categories);
228
+ dc->desc = "Chipidea USB Module";
229
+}
230
+
231
+static const TypeInfo chipidea_info = {
232
+ .name = TYPE_CHIPIDEA,
233
+ .parent = TYPE_SYS_BUS_EHCI,
234
+ .instance_size = sizeof(ChipideaState),
235
+ .instance_init = chipidea_init,
236
+ .class_init = chipidea_class_init,
237
+};
238
+
239
+static void chipidea_register_type(void)
240
+{
241
+ type_register_static(&chipidea_info);
242
+}
243
+type_init(chipidea_register_type)
244
--
132
--
245
2.16.1
133
2.25.1
246
247
diff view generated by jsdifflib
1
From: Ard Biesheuvel <ard.biesheuvel@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
This implements emulation of the new SHA-3 instructions that have
4
been added as an optional extensions to the ARMv8 Crypto Extensions
5
in ARM v8.2.
6
7
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
8
Message-id: 20180207111729.15737-3-ard.biesheuvel@linaro.org
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
3
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
4
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
5
Message-id: 20220708151540.18136-19-richard.henderson@linaro.org
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
7
---
12
target/arm/cpu.h | 1 +
8
target/arm/helper-sme.h | 2 ++
13
target/arm/translate-a64.c | 148 +++++++++++++++++++++++++++++++++++++++++++--
9
target/arm/sme.decode | 4 ++++
14
2 files changed, 145 insertions(+), 4 deletions(-)
10
target/arm/sme_helper.c | 25 +++++++++++++++++++++++++
11
target/arm/translate-sme.c | 13 +++++++++++++
12
4 files changed, 44 insertions(+)
15
13
16
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
14
diff --git a/target/arm/helper-sme.h b/target/arm/helper-sme.h
17
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
18
--- a/target/arm/cpu.h
16
--- a/target/arm/helper-sme.h
19
+++ b/target/arm/cpu.h
17
+++ b/target/arm/helper-sme.h
20
@@ -XXX,XX +XXX,XX @@ enum arm_features {
18
@@ -XXX,XX +XXX,XX @@
21
ARM_FEATURE_JAZELLE, /* has (trivial) Jazelle implementation */
19
22
ARM_FEATURE_SVE, /* has Scalable Vector Extension */
20
DEF_HELPER_FLAGS_2(set_pstate_sm, TCG_CALL_NO_RWG, void, env, i32)
23
ARM_FEATURE_V8_SHA512, /* implements SHA512 part of v8 Crypto Extensions */
21
DEF_HELPER_FLAGS_2(set_pstate_za, TCG_CALL_NO_RWG, void, env, i32)
24
+ ARM_FEATURE_V8_SHA3, /* implements SHA3 part of v8 Crypto Extensions */
22
+
25
};
23
+DEF_HELPER_FLAGS_3(sme_zero, TCG_CALL_NO_RWG, void, env, i32, i32)
26
24
diff --git a/target/arm/sme.decode b/target/arm/sme.decode
27
static inline int arm_feature(CPUARMState *env, int feature)
28
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
29
index XXXXXXX..XXXXXXX 100644
25
index XXXXXXX..XXXXXXX 100644
30
--- a/target/arm/translate-a64.c
26
--- a/target/arm/sme.decode
31
+++ b/target/arm/translate-a64.c
27
+++ b/target/arm/sme.decode
32
@@ -XXX,XX +XXX,XX @@ static void disas_crypto_three_reg_sha512(DisasContext *s, uint32_t insn)
28
@@ -XXX,XX +XXX,XX @@
33
feature = ARM_FEATURE_V8_SHA512;
29
#
34
genfn = gen_helper_crypto_sha512su1;
30
# This file is processed by scripts/decodetree.py
35
break;
31
#
36
- default:
37
- unallocated_encoding(s);
38
- return;
39
+ case 3: /* RAX1 */
40
+ feature = ARM_FEATURE_V8_SHA3;
41
+ genfn = NULL;
42
+ break;
43
}
44
} else {
45
unallocated_encoding(s);
46
@@ -XXX,XX +XXX,XX @@ static void disas_crypto_three_reg_sha512(DisasContext *s, uint32_t insn)
47
tcg_temp_free_ptr(tcg_rn_ptr);
48
tcg_temp_free_ptr(tcg_rm_ptr);
49
} else {
50
- g_assert_not_reached();
51
+ TCGv_i64 tcg_op1, tcg_op2, tcg_res[2];
52
+ int pass;
53
+
32
+
54
+ tcg_op1 = tcg_temp_new_i64();
33
+### SME Misc
55
+ tcg_op2 = tcg_temp_new_i64();
56
+ tcg_res[0] = tcg_temp_new_i64();
57
+ tcg_res[1] = tcg_temp_new_i64();
58
+
34
+
59
+ for (pass = 0; pass < 2; pass++) {
35
+ZERO 11000000 00 001 00000000000 imm:8
60
+ read_vec_element(s, tcg_op1, rn, pass, MO_64);
36
diff --git a/target/arm/sme_helper.c b/target/arm/sme_helper.c
61
+ read_vec_element(s, tcg_op2, rm, pass, MO_64);
37
index XXXXXXX..XXXXXXX 100644
62
+
38
--- a/target/arm/sme_helper.c
63
+ tcg_gen_rotli_i64(tcg_res[pass], tcg_op2, 1);
39
+++ b/target/arm/sme_helper.c
64
+ tcg_gen_xor_i64(tcg_res[pass], tcg_res[pass], tcg_op1);
40
@@ -XXX,XX +XXX,XX @@ void helper_set_pstate_za(CPUARMState *env, uint32_t i)
65
+ }
41
memset(env->zarray, 0, sizeof(env->zarray));
66
+ write_vec_element(s, tcg_res[0], rd, 0, MO_64);
67
+ write_vec_element(s, tcg_res[1], rd, 1, MO_64);
68
+
69
+ tcg_temp_free_i64(tcg_op1);
70
+ tcg_temp_free_i64(tcg_op2);
71
+ tcg_temp_free_i64(tcg_res[0]);
72
+ tcg_temp_free_i64(tcg_res[1]);
73
}
42
}
74
}
43
}
75
44
+
76
@@ -XXX,XX +XXX,XX @@ static void disas_crypto_two_reg_sha512(DisasContext *s, uint32_t insn)
45
+void helper_sme_zero(CPUARMState *env, uint32_t imm, uint32_t svl)
77
tcg_temp_free_ptr(tcg_rn_ptr);
78
}
79
80
+/* Crypto four-register
81
+ * 31 23 22 21 20 16 15 14 10 9 5 4 0
82
+ * +-------------------+-----+------+---+------+------+------+
83
+ * | 1 1 0 0 1 1 1 0 0 | Op0 | Rm | 0 | Ra | Rn | Rd |
84
+ * +-------------------+-----+------+---+------+------+------+
85
+ */
86
+static void disas_crypto_four_reg(DisasContext *s, uint32_t insn)
87
+{
46
+{
88
+ int op0 = extract32(insn, 21, 2);
47
+ uint32_t i;
89
+ int rm = extract32(insn, 16, 5);
90
+ int ra = extract32(insn, 10, 5);
91
+ int rn = extract32(insn, 5, 5);
92
+ int rd = extract32(insn, 0, 5);
93
+ int feature;
94
+
48
+
95
+ switch (op0) {
49
+ /*
96
+ case 0: /* EOR3 */
50
+ * Special case clearing the entire ZA space.
97
+ case 1: /* BCAX */
51
+ * This falls into the CONSTRAINED UNPREDICTABLE zeroing of any
98
+ feature = ARM_FEATURE_V8_SHA3;
52
+ * parts of the ZA storage outside of SVL.
99
+ break;
53
+ */
100
+ default:
54
+ if (imm == 0xff) {
101
+ unallocated_encoding(s);
55
+ memset(env->zarray, 0, sizeof(env->zarray));
102
+ return;
56
+ return;
103
+ }
57
+ }
104
+
58
+
105
+ if (!arm_dc_feature(s, feature)) {
59
+ /*
106
+ unallocated_encoding(s);
60
+ * Recall that ZAnH.D[m] is spread across ZA[n+8*m],
107
+ return;
61
+ * so each row is discontiguous within ZA[].
108
+ }
62
+ */
109
+
63
+ for (i = 0; i < svl; i++) {
110
+ if (!fp_access_check(s)) {
64
+ if (imm & (1 << (i % 8))) {
111
+ return;
65
+ memset(&env->zarray[i], 0, svl);
112
+ }
113
+
114
+ if (op0 < 2) {
115
+ TCGv_i64 tcg_op1, tcg_op2, tcg_op3, tcg_res[2];
116
+ int pass;
117
+
118
+ tcg_op1 = tcg_temp_new_i64();
119
+ tcg_op2 = tcg_temp_new_i64();
120
+ tcg_op3 = tcg_temp_new_i64();
121
+ tcg_res[0] = tcg_temp_new_i64();
122
+ tcg_res[1] = tcg_temp_new_i64();
123
+
124
+ for (pass = 0; pass < 2; pass++) {
125
+ read_vec_element(s, tcg_op1, rn, pass, MO_64);
126
+ read_vec_element(s, tcg_op2, rm, pass, MO_64);
127
+ read_vec_element(s, tcg_op3, ra, pass, MO_64);
128
+
129
+ if (op0 == 0) {
130
+ /* EOR3 */
131
+ tcg_gen_xor_i64(tcg_res[pass], tcg_op2, tcg_op3);
132
+ } else {
133
+ /* BCAX */
134
+ tcg_gen_andc_i64(tcg_res[pass], tcg_op2, tcg_op3);
135
+ }
136
+ tcg_gen_xor_i64(tcg_res[pass], tcg_res[pass], tcg_op1);
137
+ }
66
+ }
138
+ write_vec_element(s, tcg_res[0], rd, 0, MO_64);
139
+ write_vec_element(s, tcg_res[1], rd, 1, MO_64);
140
+
141
+ tcg_temp_free_i64(tcg_op1);
142
+ tcg_temp_free_i64(tcg_op2);
143
+ tcg_temp_free_i64(tcg_op3);
144
+ tcg_temp_free_i64(tcg_res[0]);
145
+ tcg_temp_free_i64(tcg_res[1]);
146
+ } else {
147
+ g_assert_not_reached();
148
+ }
67
+ }
149
+}
68
+}
69
diff --git a/target/arm/translate-sme.c b/target/arm/translate-sme.c
70
index XXXXXXX..XXXXXXX 100644
71
--- a/target/arm/translate-sme.c
72
+++ b/target/arm/translate-sme.c
73
@@ -XXX,XX +XXX,XX @@
74
*/
75
76
#include "decode-sme.c.inc"
150
+
77
+
151
+/* Crypto XAR
78
+
152
+ * 31 21 20 16 15 10 9 5 4 0
79
+static bool trans_ZERO(DisasContext *s, arg_ZERO *a)
153
+ * +-----------------------+------+--------+------+------+
154
+ * | 1 1 0 0 1 1 1 0 1 0 0 | Rm | imm6 | Rn | Rd |
155
+ * +-----------------------+------+--------+------+------+
156
+ */
157
+static void disas_crypto_xar(DisasContext *s, uint32_t insn)
158
+{
80
+{
159
+ int rm = extract32(insn, 16, 5);
81
+ if (!dc_isar_feature(aa64_sme, s)) {
160
+ int imm6 = extract32(insn, 10, 6);
82
+ return false;
161
+ int rn = extract32(insn, 5, 5);
162
+ int rd = extract32(insn, 0, 5);
163
+ TCGv_i64 tcg_op1, tcg_op2, tcg_res[2];
164
+ int pass;
165
+
166
+ if (!arm_dc_feature(s, ARM_FEATURE_V8_SHA3)) {
167
+ unallocated_encoding(s);
168
+ return;
169
+ }
83
+ }
170
+
84
+ if (sme_za_enabled_check(s)) {
171
+ if (!fp_access_check(s)) {
85
+ gen_helper_sme_zero(cpu_env, tcg_constant_i32(a->imm),
172
+ return;
86
+ tcg_constant_i32(streaming_vec_reg_size(s)));
173
+ }
87
+ }
174
+
88
+ return true;
175
+ tcg_op1 = tcg_temp_new_i64();
176
+ tcg_op2 = tcg_temp_new_i64();
177
+ tcg_res[0] = tcg_temp_new_i64();
178
+ tcg_res[1] = tcg_temp_new_i64();
179
+
180
+ for (pass = 0; pass < 2; pass++) {
181
+ read_vec_element(s, tcg_op1, rn, pass, MO_64);
182
+ read_vec_element(s, tcg_op2, rm, pass, MO_64);
183
+
184
+ tcg_gen_xor_i64(tcg_res[pass], tcg_op1, tcg_op2);
185
+ tcg_gen_rotri_i64(tcg_res[pass], tcg_res[pass], imm6);
186
+ }
187
+ write_vec_element(s, tcg_res[0], rd, 0, MO_64);
188
+ write_vec_element(s, tcg_res[1], rd, 1, MO_64);
189
+
190
+ tcg_temp_free_i64(tcg_op1);
191
+ tcg_temp_free_i64(tcg_op2);
192
+ tcg_temp_free_i64(tcg_res[0]);
193
+ tcg_temp_free_i64(tcg_res[1]);
194
+}
89
+}
195
+
196
/* C3.6 Data processing - SIMD, inc Crypto
197
*
198
* As the decode gets a little complex we are using a table based
199
@@ -XXX,XX +XXX,XX @@ static const AArch64DecodeTable data_proc_simd[] = {
200
{ 0x5e280800, 0xff3e0c00, disas_crypto_two_reg_sha },
201
{ 0xce608000, 0xffe0b000, disas_crypto_three_reg_sha512 },
202
{ 0xcec08000, 0xfffff000, disas_crypto_two_reg_sha512 },
203
+ { 0xce000000, 0xff808000, disas_crypto_four_reg },
204
+ { 0xce800000, 0xffe00000, disas_crypto_xar },
205
{ 0x00000000, 0x00000000, NULL }
206
};
207
208
--
90
--
209
2.16.1
91
2.25.1
210
211
diff view generated by jsdifflib
1
From: Andrey Smirnov <andrew.smirnov@gmail.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Move virt's PSCI DT fixup code to arm/boot.c and set this fixup to
3
We can reuse the SVE functions for implementing moves to/from
4
happen automatically for every board that doesn't mark "psci-conduit"
4
horizontal tile slices, but we need new ones for moves to/from
5
as disabled. This way emulated boards other than "virt" that rely on
5
vertical tile slices.
6
PSIC for SMP could benefit from that code.
7
6
8
Cc: Peter Maydell <peter.maydell@linaro.org>
9
Cc: Jason Wang <jasowang@redhat.com>
10
Cc: Philippe Mathieu-Daudé <f4bug@amsat.org>
11
Cc: Marcel Apfelbaum <marcel.apfelbaum@zoho.com>
12
Cc: Michael S. Tsirkin <mst@redhat.com>
13
Cc: qemu-devel@nongnu.org
14
Cc: qemu-arm@nongnu.org
15
Cc: yurovsky@gmail.com
16
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
17
Signed-off-by: Andrey Smirnov <andrew.smirnov@gmail.com>
8
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
18
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
9
Message-id: 20220708151540.18136-20-richard.henderson@linaro.org
19
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
20
---
11
---
21
hw/arm/boot.c | 65 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
12
target/arm/helper-sme.h | 12 +++
22
hw/arm/virt.c | 61 -------------------------------------------------------
13
target/arm/helper-sve.h | 2 +
23
2 files changed, 65 insertions(+), 61 deletions(-)
14
target/arm/translate-a64.h | 8 ++
15
target/arm/translate.h | 5 ++
16
target/arm/sme.decode | 15 ++++
17
target/arm/sme_helper.c | 151 ++++++++++++++++++++++++++++++++++++-
18
target/arm/sve_helper.c | 12 +++
19
target/arm/translate-sme.c | 127 +++++++++++++++++++++++++++++++
20
8 files changed, 331 insertions(+), 1 deletion(-)
24
21
25
diff --git a/hw/arm/boot.c b/hw/arm/boot.c
22
diff --git a/target/arm/helper-sme.h b/target/arm/helper-sme.h
26
index XXXXXXX..XXXXXXX 100644
23
index XXXXXXX..XXXXXXX 100644
27
--- a/hw/arm/boot.c
24
--- a/target/arm/helper-sme.h
28
+++ b/hw/arm/boot.c
25
+++ b/target/arm/helper-sme.h
29
@@ -XXX,XX +XXX,XX @@ static void set_kernel_args_old(const struct arm_boot_info *info)
26
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_2(set_pstate_sm, TCG_CALL_NO_RWG, void, env, i32)
27
DEF_HELPER_FLAGS_2(set_pstate_za, TCG_CALL_NO_RWG, void, env, i32)
28
29
DEF_HELPER_FLAGS_3(sme_zero, TCG_CALL_NO_RWG, void, env, i32, i32)
30
+
31
+/* Move to/from vertical array slices, i.e. columns, so 'c'. */
32
+DEF_HELPER_FLAGS_4(sme_mova_cz_b, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32)
33
+DEF_HELPER_FLAGS_4(sme_mova_zc_b, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32)
34
+DEF_HELPER_FLAGS_4(sme_mova_cz_h, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32)
35
+DEF_HELPER_FLAGS_4(sme_mova_zc_h, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32)
36
+DEF_HELPER_FLAGS_4(sme_mova_cz_s, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32)
37
+DEF_HELPER_FLAGS_4(sme_mova_zc_s, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32)
38
+DEF_HELPER_FLAGS_4(sme_mova_cz_d, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32)
39
+DEF_HELPER_FLAGS_4(sme_mova_zc_d, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32)
40
+DEF_HELPER_FLAGS_4(sme_mova_cz_q, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32)
41
+DEF_HELPER_FLAGS_4(sme_mova_zc_q, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32)
42
diff --git a/target/arm/helper-sve.h b/target/arm/helper-sve.h
43
index XXXXXXX..XXXXXXX 100644
44
--- a/target/arm/helper-sve.h
45
+++ b/target/arm/helper-sve.h
46
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_5(sve_sel_zpzz_s, TCG_CALL_NO_RWG,
47
void, ptr, ptr, ptr, ptr, i32)
48
DEF_HELPER_FLAGS_5(sve_sel_zpzz_d, TCG_CALL_NO_RWG,
49
void, ptr, ptr, ptr, ptr, i32)
50
+DEF_HELPER_FLAGS_5(sve_sel_zpzz_q, TCG_CALL_NO_RWG,
51
+ void, ptr, ptr, ptr, ptr, i32)
52
53
DEF_HELPER_FLAGS_5(sve2_addp_zpzz_b, TCG_CALL_NO_RWG,
54
void, ptr, ptr, ptr, ptr, i32)
55
diff --git a/target/arm/translate-a64.h b/target/arm/translate-a64.h
56
index XXXXXXX..XXXXXXX 100644
57
--- a/target/arm/translate-a64.h
58
+++ b/target/arm/translate-a64.h
59
@@ -XXX,XX +XXX,XX @@ static inline int pred_gvec_reg_size(DisasContext *s)
60
return size_for_gvec(pred_full_reg_size(s));
61
}
62
63
+/* Return a newly allocated pointer to the predicate register. */
64
+static inline TCGv_ptr pred_full_reg_ptr(DisasContext *s, int regno)
65
+{
66
+ TCGv_ptr ret = tcg_temp_new_ptr();
67
+ tcg_gen_addi_ptr(ret, cpu_env, pred_full_reg_offset(s, regno));
68
+ return ret;
69
+}
70
+
71
bool disas_sve(DisasContext *, uint32_t);
72
bool disas_sme(DisasContext *, uint32_t);
73
74
diff --git a/target/arm/translate.h b/target/arm/translate.h
75
index XXXXXXX..XXXXXXX 100644
76
--- a/target/arm/translate.h
77
+++ b/target/arm/translate.h
78
@@ -XXX,XX +XXX,XX @@ static inline int plus_2(DisasContext *s, int x)
79
return x + 2;
80
}
81
82
+static inline int plus_12(DisasContext *s, int x)
83
+{
84
+ return x + 12;
85
+}
86
+
87
static inline int times_2(DisasContext *s, int x)
88
{
89
return x * 2;
90
diff --git a/target/arm/sme.decode b/target/arm/sme.decode
91
index XXXXXXX..XXXXXXX 100644
92
--- a/target/arm/sme.decode
93
+++ b/target/arm/sme.decode
94
@@ -XXX,XX +XXX,XX @@
95
### SME Misc
96
97
ZERO 11000000 00 001 00000000000 imm:8
98
+
99
+### SME Move into/from Array
100
+
101
+%mova_rs 13:2 !function=plus_12
102
+&mova esz rs pg zr za_imm v:bool to_vec:bool
103
+
104
+MOVA 11000000 esz:2 00000 0 v:1 .. pg:3 zr:5 0 za_imm:4 \
105
+ &mova to_vec=0 rs=%mova_rs
106
+MOVA 11000000 11 00000 1 v:1 .. pg:3 zr:5 0 za_imm:4 \
107
+ &mova to_vec=0 rs=%mova_rs esz=4
108
+
109
+MOVA 11000000 esz:2 00001 0 v:1 .. pg:3 0 za_imm:4 zr:5 \
110
+ &mova to_vec=1 rs=%mova_rs
111
+MOVA 11000000 11 00001 1 v:1 .. pg:3 0 za_imm:4 zr:5 \
112
+ &mova to_vec=1 rs=%mova_rs esz=4
113
diff --git a/target/arm/sme_helper.c b/target/arm/sme_helper.c
114
index XXXXXXX..XXXXXXX 100644
115
--- a/target/arm/sme_helper.c
116
+++ b/target/arm/sme_helper.c
117
@@ -XXX,XX +XXX,XX @@
118
119
#include "qemu/osdep.h"
120
#include "cpu.h"
121
-#include "internals.h"
122
+#include "tcg/tcg-gvec-desc.h"
123
#include "exec/helper-proto.h"
124
+#include "qemu/int128.h"
125
+#include "vec_internal.h"
126
127
/* ResetSVEState */
128
void arm_reset_sve_state(CPUARMState *env)
129
@@ -XXX,XX +XXX,XX @@ void helper_sme_zero(CPUARMState *env, uint32_t imm, uint32_t svl)
130
}
30
}
131
}
31
}
132
}
32
133
+
33
+static void fdt_add_psci_node(void *fdt)
134
+
34
+{
135
+/*
35
+ uint32_t cpu_suspend_fn;
136
+ * When considering the ZA storage as an array of elements of
36
+ uint32_t cpu_off_fn;
137
+ * type T, the index within that array of the Nth element of
37
+ uint32_t cpu_on_fn;
138
+ * a vertical slice of a tile can be calculated like this,
38
+ uint32_t migrate_fn;
139
+ * regardless of the size of type T. This is because the tiles
39
+ ARMCPU *armcpu = ARM_CPU(qemu_get_cpu(0));
140
+ * are interleaved, so if type T is size N bytes then row 1 of
40
+ const char *psci_method;
141
+ * the tile is N rows away from row 0. The division by N to
41
+ int64_t psci_conduit;
142
+ * convert a byte offset into an array index and the multiplication
42
+
143
+ * by N to convert from vslice-index-within-the-tile to
43
+ psci_conduit = object_property_get_int(OBJECT(armcpu),
144
+ * the index within the ZA storage cancel out.
44
+ "psci-conduit",
145
+ */
45
+ &error_abort);
146
+#define tile_vslice_index(i) ((i) * sizeof(ARMVectorReg))
46
+ switch (psci_conduit) {
147
+
47
+ case QEMU_PSCI_CONDUIT_DISABLED:
148
+/*
48
+ return;
149
+ * When doing byte arithmetic on the ZA storage, the element
49
+ case QEMU_PSCI_CONDUIT_HVC:
150
+ * byteoff bytes away in a tile vertical slice is always this
50
+ psci_method = "hvc";
151
+ * many bytes away in the ZA storage, regardless of the
51
+ break;
152
+ * size of the tile element, assuming that byteoff is a multiple
52
+ case QEMU_PSCI_CONDUIT_SMC:
153
+ * of the element size. Again this is because of the interleaving
53
+ psci_method = "smc";
154
+ * of the tiles. For instance if we have 1 byte per element then
54
+ break;
155
+ * each row of the ZA storage has one byte of the vslice data,
55
+ default:
156
+ * and (counting from 0) byte 8 goes in row 8 of the storage
56
+ g_assert_not_reached();
157
+ * at offset (8 * row-size-in-bytes).
57
+ }
158
+ * If we have 8 bytes per element then each row of the ZA storage
58
+
159
+ * has 8 bytes of the data, but there are 8 interleaved tiles and
59
+ qemu_fdt_add_subnode(fdt, "/psci");
160
+ * so byte 8 of the data goes into row 1 of the tile,
60
+ if (armcpu->psci_version == 2) {
161
+ * which is again row 8 of the storage, so the offset is still
61
+ const char comp[] = "arm,psci-0.2\0arm,psci";
162
+ * (8 * row-size-in-bytes). Similarly for other element sizes.
62
+ qemu_fdt_setprop(fdt, "/psci", "compatible", comp, sizeof(comp));
163
+ */
63
+
164
+#define tile_vslice_offset(byteoff) ((byteoff) * sizeof(ARMVectorReg))
64
+ cpu_off_fn = QEMU_PSCI_0_2_FN_CPU_OFF;
165
+
65
+ if (arm_feature(&armcpu->env, ARM_FEATURE_AARCH64)) {
166
+
66
+ cpu_suspend_fn = QEMU_PSCI_0_2_FN64_CPU_SUSPEND;
167
+/*
67
+ cpu_on_fn = QEMU_PSCI_0_2_FN64_CPU_ON;
168
+ * Move Zreg vector to ZArray column.
68
+ migrate_fn = QEMU_PSCI_0_2_FN64_MIGRATE;
169
+ */
69
+ } else {
170
+#define DO_MOVA_C(NAME, TYPE, H) \
70
+ cpu_suspend_fn = QEMU_PSCI_0_2_FN_CPU_SUSPEND;
171
+void HELPER(NAME)(void *za, void *vn, void *vg, uint32_t desc) \
71
+ cpu_on_fn = QEMU_PSCI_0_2_FN_CPU_ON;
172
+{ \
72
+ migrate_fn = QEMU_PSCI_0_2_FN_MIGRATE;
173
+ int i, oprsz = simd_oprsz(desc); \
73
+ }
174
+ for (i = 0; i < oprsz; ) { \
74
+ } else {
175
+ uint16_t pg = *(uint16_t *)(vg + H1_2(i >> 3)); \
75
+ qemu_fdt_setprop_string(fdt, "/psci", "compatible", "arm,psci");
176
+ do { \
76
+
177
+ if (pg & 1) { \
77
+ cpu_suspend_fn = QEMU_PSCI_0_1_FN_CPU_SUSPEND;
178
+ *(TYPE *)(za + tile_vslice_offset(i)) = *(TYPE *)(vn + H(i)); \
78
+ cpu_off_fn = QEMU_PSCI_0_1_FN_CPU_OFF;
179
+ } \
79
+ cpu_on_fn = QEMU_PSCI_0_1_FN_CPU_ON;
180
+ i += sizeof(TYPE); \
80
+ migrate_fn = QEMU_PSCI_0_1_FN_MIGRATE;
181
+ pg >>= sizeof(TYPE); \
81
+ }
182
+ } while (i & 15); \
82
+
183
+ } \
83
+ /* We adopt the PSCI spec's nomenclature, and use 'conduit' to refer
184
+}
84
+ * to the instruction that should be used to invoke PSCI functions.
185
+
85
+ * However, the device tree binding uses 'method' instead, so that is
186
+DO_MOVA_C(sme_mova_cz_b, uint8_t, H1)
86
+ * what we should use here.
187
+DO_MOVA_C(sme_mova_cz_h, uint16_t, H1_2)
188
+DO_MOVA_C(sme_mova_cz_s, uint32_t, H1_4)
189
+
190
+void HELPER(sme_mova_cz_d)(void *za, void *vn, void *vg, uint32_t desc)
191
+{
192
+ int i, oprsz = simd_oprsz(desc) / 8;
193
+ uint8_t *pg = vg;
194
+ uint64_t *n = vn;
195
+ uint64_t *a = za;
196
+
197
+ for (i = 0; i < oprsz; i++) {
198
+ if (pg[H1(i)] & 1) {
199
+ a[tile_vslice_index(i)] = n[i];
200
+ }
201
+ }
202
+}
203
+
204
+void HELPER(sme_mova_cz_q)(void *za, void *vn, void *vg, uint32_t desc)
205
+{
206
+ int i, oprsz = simd_oprsz(desc) / 16;
207
+ uint16_t *pg = vg;
208
+ Int128 *n = vn;
209
+ Int128 *a = za;
210
+
211
+ /*
212
+ * Int128 is used here simply to copy 16 bytes, and to simplify
213
+ * the address arithmetic.
87
+ */
214
+ */
88
+ qemu_fdt_setprop_string(fdt, "/psci", "method", psci_method);
215
+ for (i = 0; i < oprsz; i++) {
89
+
216
+ if (pg[H2(i)] & 1) {
90
+ qemu_fdt_setprop_cell(fdt, "/psci", "cpu_suspend", cpu_suspend_fn);
217
+ a[tile_vslice_index(i)] = n[i];
91
+ qemu_fdt_setprop_cell(fdt, "/psci", "cpu_off", cpu_off_fn);
218
+ }
92
+ qemu_fdt_setprop_cell(fdt, "/psci", "cpu_on", cpu_on_fn);
219
+ }
93
+ qemu_fdt_setprop_cell(fdt, "/psci", "migrate", migrate_fn);
220
+}
94
+}
221
+
95
+
222
+#undef DO_MOVA_C
96
/**
223
+
97
* load_dtb() - load a device tree binary image into memory
224
+/*
98
* @addr: the address to load the image at
225
+ * Move ZArray column to Zreg vector.
99
@@ -XXX,XX +XXX,XX @@ static int load_dtb(hwaddr addr, const struct arm_boot_info *binfo,
226
+ */
100
}
227
+#define DO_MOVA_Z(NAME, TYPE, H) \
101
}
228
+void HELPER(NAME)(void *vd, void *za, void *vg, uint32_t desc) \
102
229
+{ \
103
+ fdt_add_psci_node(fdt);
230
+ int i, oprsz = simd_oprsz(desc); \
104
+
231
+ for (i = 0; i < oprsz; ) { \
105
if (binfo->modify_dtb) {
232
+ uint16_t pg = *(uint16_t *)(vg + H1_2(i >> 3)); \
106
binfo->modify_dtb(binfo, fdt);
233
+ do { \
107
}
234
+ if (pg & 1) { \
108
diff --git a/hw/arm/virt.c b/hw/arm/virt.c
235
+ *(TYPE *)(vd + H(i)) = *(TYPE *)(za + tile_vslice_offset(i)); \
109
index XXXXXXX..XXXXXXX 100644
236
+ } \
110
--- a/hw/arm/virt.c
237
+ i += sizeof(TYPE); \
111
+++ b/hw/arm/virt.c
238
+ pg >>= sizeof(TYPE); \
112
@@ -XXX,XX +XXX,XX @@ static void create_fdt(VirtMachineState *vms)
239
+ } while (i & 15); \
240
+ } \
241
+}
242
+
243
+DO_MOVA_Z(sme_mova_zc_b, uint8_t, H1)
244
+DO_MOVA_Z(sme_mova_zc_h, uint16_t, H1_2)
245
+DO_MOVA_Z(sme_mova_zc_s, uint32_t, H1_4)
246
+
247
+void HELPER(sme_mova_zc_d)(void *vd, void *za, void *vg, uint32_t desc)
248
+{
249
+ int i, oprsz = simd_oprsz(desc) / 8;
250
+ uint8_t *pg = vg;
251
+ uint64_t *d = vd;
252
+ uint64_t *a = za;
253
+
254
+ for (i = 0; i < oprsz; i++) {
255
+ if (pg[H1(i)] & 1) {
256
+ d[i] = a[tile_vslice_index(i)];
257
+ }
258
+ }
259
+}
260
+
261
+void HELPER(sme_mova_zc_q)(void *vd, void *za, void *vg, uint32_t desc)
262
+{
263
+ int i, oprsz = simd_oprsz(desc) / 16;
264
+ uint16_t *pg = vg;
265
+ Int128 *d = vd;
266
+ Int128 *a = za;
267
+
268
+ /*
269
+ * Int128 is used here simply to copy 16 bytes, and to simplify
270
+ * the address arithmetic.
271
+ */
272
+ for (i = 0; i < oprsz; i++, za += sizeof(ARMVectorReg)) {
273
+ if (pg[H2(i)] & 1) {
274
+ d[i] = a[tile_vslice_index(i)];
275
+ }
276
+ }
277
+}
278
+
279
+#undef DO_MOVA_Z
280
diff --git a/target/arm/sve_helper.c b/target/arm/sve_helper.c
281
index XXXXXXX..XXXXXXX 100644
282
--- a/target/arm/sve_helper.c
283
+++ b/target/arm/sve_helper.c
284
@@ -XXX,XX +XXX,XX @@ void HELPER(sve_sel_zpzz_d)(void *vd, void *vn, void *vm,
113
}
285
}
114
}
286
}
115
287
116
-static void fdt_add_psci_node(const VirtMachineState *vms)
288
+void HELPER(sve_sel_zpzz_q)(void *vd, void *vn, void *vm,
117
-{
289
+ void *vg, uint32_t desc)
118
- uint32_t cpu_suspend_fn;
290
+{
119
- uint32_t cpu_off_fn;
291
+ intptr_t i, opr_sz = simd_oprsz(desc) / 16;
120
- uint32_t cpu_on_fn;
292
+ Int128 *d = vd, *n = vn, *m = vm;
121
- uint32_t migrate_fn;
293
+ uint16_t *pg = vg;
122
- void *fdt = vms->fdt;
294
+
123
- ARMCPU *armcpu = ARM_CPU(qemu_get_cpu(0));
295
+ for (i = 0; i < opr_sz; i += 1) {
124
- const char *psci_method;
296
+ d[i] = (pg[H2(i)] & 1 ? n : m)[i];
125
-
297
+ }
126
- switch (vms->psci_conduit) {
298
+}
127
- case QEMU_PSCI_CONDUIT_DISABLED:
299
+
128
- return;
300
/* Two operand comparison controlled by a predicate.
129
- case QEMU_PSCI_CONDUIT_HVC:
301
* ??? It is very tempting to want to be able to expand this inline
130
- psci_method = "hvc";
302
* with x86 instructions, e.g.
131
- break;
303
diff --git a/target/arm/translate-sme.c b/target/arm/translate-sme.c
132
- case QEMU_PSCI_CONDUIT_SMC:
304
index XXXXXXX..XXXXXXX 100644
133
- psci_method = "smc";
305
--- a/target/arm/translate-sme.c
134
- break;
306
+++ b/target/arm/translate-sme.c
135
- default:
307
@@ -XXX,XX +XXX,XX @@
136
- g_assert_not_reached();
308
#include "decode-sme.c.inc"
137
- }
309
138
-
310
139
- qemu_fdt_add_subnode(fdt, "/psci");
311
+/*
140
- if (armcpu->psci_version == 2) {
312
+ * Resolve tile.size[index] to a host pointer, where tile and index
141
- const char comp[] = "arm,psci-0.2\0arm,psci";
313
+ * are always decoded together, dependent on the element size.
142
- qemu_fdt_setprop(fdt, "/psci", "compatible", comp, sizeof(comp));
314
+ */
143
-
315
+static TCGv_ptr get_tile_rowcol(DisasContext *s, int esz, int rs,
144
- cpu_off_fn = QEMU_PSCI_0_2_FN_CPU_OFF;
316
+ int tile_index, bool vertical)
145
- if (arm_feature(&armcpu->env, ARM_FEATURE_AARCH64)) {
317
+{
146
- cpu_suspend_fn = QEMU_PSCI_0_2_FN64_CPU_SUSPEND;
318
+ int tile = tile_index >> (4 - esz);
147
- cpu_on_fn = QEMU_PSCI_0_2_FN64_CPU_ON;
319
+ int index = esz == MO_128 ? 0 : extract32(tile_index, 0, 4 - esz);
148
- migrate_fn = QEMU_PSCI_0_2_FN64_MIGRATE;
320
+ int pos, len, offset;
149
- } else {
321
+ TCGv_i32 tmp;
150
- cpu_suspend_fn = QEMU_PSCI_0_2_FN_CPU_SUSPEND;
322
+ TCGv_ptr addr;
151
- cpu_on_fn = QEMU_PSCI_0_2_FN_CPU_ON;
323
+
152
- migrate_fn = QEMU_PSCI_0_2_FN_MIGRATE;
324
+ /* Compute the final index, which is Rs+imm. */
153
- }
325
+ tmp = tcg_temp_new_i32();
154
- } else {
326
+ tcg_gen_trunc_tl_i32(tmp, cpu_reg(s, rs));
155
- qemu_fdt_setprop_string(fdt, "/psci", "compatible", "arm,psci");
327
+ tcg_gen_addi_i32(tmp, tmp, index);
156
-
328
+
157
- cpu_suspend_fn = QEMU_PSCI_0_1_FN_CPU_SUSPEND;
329
+ /* Prepare a power-of-two modulo via extraction of @len bits. */
158
- cpu_off_fn = QEMU_PSCI_0_1_FN_CPU_OFF;
330
+ len = ctz32(streaming_vec_reg_size(s)) - esz;
159
- cpu_on_fn = QEMU_PSCI_0_1_FN_CPU_ON;
331
+
160
- migrate_fn = QEMU_PSCI_0_1_FN_MIGRATE;
332
+ if (vertical) {
161
- }
333
+ /*
162
-
334
+ * Compute the byte offset of the index within the tile:
163
- /* We adopt the PSCI spec's nomenclature, and use 'conduit' to refer
335
+ * (index % (svl / size)) * size
164
- * to the instruction that should be used to invoke PSCI functions.
336
+ * = (index % (svl >> esz)) << esz
165
- * However, the device tree binding uses 'method' instead, so that is
337
+ * Perform the power-of-two modulo via extraction of the low @len bits.
166
- * what we should use here.
338
+ * Perform the multiply by shifting left by @pos bits.
167
- */
339
+ * Perform these operations simultaneously via deposit into zero.
168
- qemu_fdt_setprop_string(fdt, "/psci", "method", psci_method);
340
+ */
169
-
341
+ pos = esz;
170
- qemu_fdt_setprop_cell(fdt, "/psci", "cpu_suspend", cpu_suspend_fn);
342
+ tcg_gen_deposit_z_i32(tmp, tmp, pos, len);
171
- qemu_fdt_setprop_cell(fdt, "/psci", "cpu_off", cpu_off_fn);
343
+
172
- qemu_fdt_setprop_cell(fdt, "/psci", "cpu_on", cpu_on_fn);
344
+ /*
173
- qemu_fdt_setprop_cell(fdt, "/psci", "migrate", migrate_fn);
345
+ * For big-endian, adjust the indexed column byte offset within
174
-}
346
+ * the uint64_t host words that make up env->zarray[].
175
-
347
+ */
176
static void fdt_add_timer_nodes(const VirtMachineState *vms)
348
+ if (HOST_BIG_ENDIAN && esz < MO_64) {
349
+ tcg_gen_xori_i32(tmp, tmp, 8 - (1 << esz));
350
+ }
351
+ } else {
352
+ /*
353
+ * Compute the byte offset of the index within the tile:
354
+ * (index % (svl / size)) * (size * sizeof(row))
355
+ * = (index % (svl >> esz)) << (esz + log2(sizeof(row)))
356
+ */
357
+ pos = esz + ctz32(sizeof(ARMVectorReg));
358
+ tcg_gen_deposit_z_i32(tmp, tmp, pos, len);
359
+
360
+ /* Row slices are always aligned and need no endian adjustment. */
361
+ }
362
+
363
+ /* The tile byte offset within env->zarray is the row. */
364
+ offset = tile * sizeof(ARMVectorReg);
365
+
366
+ /* Include the byte offset of zarray to make this relative to env. */
367
+ offset += offsetof(CPUARMState, zarray);
368
+ tcg_gen_addi_i32(tmp, tmp, offset);
369
+
370
+ /* Add the byte offset to env to produce the final pointer. */
371
+ addr = tcg_temp_new_ptr();
372
+ tcg_gen_ext_i32_ptr(addr, tmp);
373
+ tcg_temp_free_i32(tmp);
374
+ tcg_gen_add_ptr(addr, addr, cpu_env);
375
+
376
+ return addr;
377
+}
378
+
379
static bool trans_ZERO(DisasContext *s, arg_ZERO *a)
177
{
380
{
178
/* On real hardware these interrupts are level-triggered.
381
if (!dc_isar_feature(aa64_sme, s)) {
179
@@ -XXX,XX +XXX,XX @@ static void machvirt_init(MachineState *machine)
382
@@ -XXX,XX +XXX,XX @@ static bool trans_ZERO(DisasContext *s, arg_ZERO *a)
180
}
383
}
181
fdt_add_timer_nodes(vms);
384
return true;
182
fdt_add_cpu_nodes(vms);
385
}
183
- fdt_add_psci_node(vms);
386
+
184
387
+static bool trans_MOVA(DisasContext *s, arg_MOVA *a)
185
memory_region_allocate_system_memory(ram, NULL, "mach-virt.ram",
388
+{
186
machine->ram_size);
389
+ static gen_helper_gvec_4 * const h_fns[5] = {
390
+ gen_helper_sve_sel_zpzz_b, gen_helper_sve_sel_zpzz_h,
391
+ gen_helper_sve_sel_zpzz_s, gen_helper_sve_sel_zpzz_d,
392
+ gen_helper_sve_sel_zpzz_q
393
+ };
394
+ static gen_helper_gvec_3 * const cz_fns[5] = {
395
+ gen_helper_sme_mova_cz_b, gen_helper_sme_mova_cz_h,
396
+ gen_helper_sme_mova_cz_s, gen_helper_sme_mova_cz_d,
397
+ gen_helper_sme_mova_cz_q,
398
+ };
399
+ static gen_helper_gvec_3 * const zc_fns[5] = {
400
+ gen_helper_sme_mova_zc_b, gen_helper_sme_mova_zc_h,
401
+ gen_helper_sme_mova_zc_s, gen_helper_sme_mova_zc_d,
402
+ gen_helper_sme_mova_zc_q,
403
+ };
404
+
405
+ TCGv_ptr t_za, t_zr, t_pg;
406
+ TCGv_i32 t_desc;
407
+ int svl;
408
+
409
+ if (!dc_isar_feature(aa64_sme, s)) {
410
+ return false;
411
+ }
412
+ if (!sme_smza_enabled_check(s)) {
413
+ return true;
414
+ }
415
+
416
+ t_za = get_tile_rowcol(s, a->esz, a->rs, a->za_imm, a->v);
417
+ t_zr = vec_full_reg_ptr(s, a->zr);
418
+ t_pg = pred_full_reg_ptr(s, a->pg);
419
+
420
+ svl = streaming_vec_reg_size(s);
421
+ t_desc = tcg_constant_i32(simd_desc(svl, svl, 0));
422
+
423
+ if (a->v) {
424
+ /* Vertical slice -- use sme mova helpers. */
425
+ if (a->to_vec) {
426
+ zc_fns[a->esz](t_zr, t_za, t_pg, t_desc);
427
+ } else {
428
+ cz_fns[a->esz](t_za, t_zr, t_pg, t_desc);
429
+ }
430
+ } else {
431
+ /* Horizontal slice -- reuse sve sel helpers. */
432
+ if (a->to_vec) {
433
+ h_fns[a->esz](t_zr, t_za, t_zr, t_pg, t_desc);
434
+ } else {
435
+ h_fns[a->esz](t_za, t_zr, t_za, t_pg, t_desc);
436
+ }
437
+ }
438
+
439
+ tcg_temp_free_ptr(t_za);
440
+ tcg_temp_free_ptr(t_zr);
441
+ tcg_temp_free_ptr(t_pg);
442
+
443
+ return true;
444
+}
187
--
445
--
188
2.16.1
446
2.25.1
189
190
diff view generated by jsdifflib
1
From: Andrey Smirnov <andrew.smirnov@gmail.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Add minimal code needed to allow upstream Linux guest to boot.
3
We cannot reuse the SVE functions for LD[1-4] and ST[1-4],
4
because those functions accept only a Zreg register number.
5
For SME, we want to pass a pointer into ZA storage.
4
6
5
Cc: Peter Maydell <peter.maydell@linaro.org>
6
Cc: Jason Wang <jasowang@redhat.com>
7
Cc: Philippe Mathieu-Daudé <f4bug@amsat.org>
8
Cc: Marcel Apfelbaum <marcel.apfelbaum@zoho.com>
9
Cc: Michael S. Tsirkin <mst@redhat.com>
10
Cc: qemu-devel@nongnu.org
11
Cc: qemu-arm@nongnu.org
12
Cc: yurovsky@gmail.com
13
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
14
Signed-off-by: Andrey Smirnov <andrew.smirnov@gmail.com>
8
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20220708151540.18136-21-richard.henderson@linaro.org
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
---
11
---
17
hw/misc/Makefile.objs | 1 +
12
target/arm/helper-sme.h | 82 +++++
18
include/hw/misc/imx7_ccm.h | 139 +++++++++++++++++++++++
13
target/arm/sme.decode | 9 +
19
hw/misc/imx7_ccm.c | 277 +++++++++++++++++++++++++++++++++++++++++++++
14
target/arm/sme_helper.c | 595 +++++++++++++++++++++++++++++++++++++
20
3 files changed, 417 insertions(+)
15
target/arm/translate-sme.c | 70 +++++
21
create mode 100644 include/hw/misc/imx7_ccm.h
16
4 files changed, 756 insertions(+)
22
create mode 100644 hw/misc/imx7_ccm.c
23
17
24
diff --git a/hw/misc/Makefile.objs b/hw/misc/Makefile.objs
18
diff --git a/target/arm/helper-sme.h b/target/arm/helper-sme.h
25
index XXXXXXX..XXXXXXX 100644
19
index XXXXXXX..XXXXXXX 100644
26
--- a/hw/misc/Makefile.objs
20
--- a/target/arm/helper-sme.h
27
+++ b/hw/misc/Makefile.objs
21
+++ b/target/arm/helper-sme.h
28
@@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_IMX) += imx31_ccm.o
22
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_4(sme_mova_cz_d, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32)
29
obj-$(CONFIG_IMX) += imx25_ccm.o
23
DEF_HELPER_FLAGS_4(sme_mova_zc_d, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32)
30
obj-$(CONFIG_IMX) += imx6_ccm.o
24
DEF_HELPER_FLAGS_4(sme_mova_cz_q, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32)
31
obj-$(CONFIG_IMX) += imx6_src.o
25
DEF_HELPER_FLAGS_4(sme_mova_zc_q, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32)
32
+obj-$(CONFIG_IMX) += imx7_ccm.o
26
+
33
obj-$(CONFIG_MILKYMIST) += milkymist-hpdmc.o
27
+DEF_HELPER_FLAGS_5(sme_ld1b_h, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
34
obj-$(CONFIG_MILKYMIST) += milkymist-pfpu.o
28
+DEF_HELPER_FLAGS_5(sme_ld1b_v, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
35
obj-$(CONFIG_MAINSTONE) += mst_fpga.o
29
+DEF_HELPER_FLAGS_5(sme_ld1b_h_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
36
diff --git a/include/hw/misc/imx7_ccm.h b/include/hw/misc/imx7_ccm.h
30
+DEF_HELPER_FLAGS_5(sme_ld1b_v_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
37
new file mode 100644
31
+
38
index XXXXXXX..XXXXXXX
32
+DEF_HELPER_FLAGS_5(sme_ld1h_be_h, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
39
--- /dev/null
33
+DEF_HELPER_FLAGS_5(sme_ld1h_le_h, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
40
+++ b/include/hw/misc/imx7_ccm.h
34
+DEF_HELPER_FLAGS_5(sme_ld1h_be_v, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
35
+DEF_HELPER_FLAGS_5(sme_ld1h_le_v, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
36
+DEF_HELPER_FLAGS_5(sme_ld1h_be_h_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
37
+DEF_HELPER_FLAGS_5(sme_ld1h_le_h_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
38
+DEF_HELPER_FLAGS_5(sme_ld1h_be_v_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
39
+DEF_HELPER_FLAGS_5(sme_ld1h_le_v_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
40
+
41
+DEF_HELPER_FLAGS_5(sme_ld1s_be_h, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
42
+DEF_HELPER_FLAGS_5(sme_ld1s_le_h, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
43
+DEF_HELPER_FLAGS_5(sme_ld1s_be_v, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
44
+DEF_HELPER_FLAGS_5(sme_ld1s_le_v, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
45
+DEF_HELPER_FLAGS_5(sme_ld1s_be_h_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
46
+DEF_HELPER_FLAGS_5(sme_ld1s_le_h_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
47
+DEF_HELPER_FLAGS_5(sme_ld1s_be_v_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
48
+DEF_HELPER_FLAGS_5(sme_ld1s_le_v_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
49
+
50
+DEF_HELPER_FLAGS_5(sme_ld1d_be_h, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
51
+DEF_HELPER_FLAGS_5(sme_ld1d_le_h, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
52
+DEF_HELPER_FLAGS_5(sme_ld1d_be_v, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
53
+DEF_HELPER_FLAGS_5(sme_ld1d_le_v, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
54
+DEF_HELPER_FLAGS_5(sme_ld1d_be_h_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
55
+DEF_HELPER_FLAGS_5(sme_ld1d_le_h_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
56
+DEF_HELPER_FLAGS_5(sme_ld1d_be_v_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
57
+DEF_HELPER_FLAGS_5(sme_ld1d_le_v_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
58
+
59
+DEF_HELPER_FLAGS_5(sme_ld1q_be_h, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
60
+DEF_HELPER_FLAGS_5(sme_ld1q_le_h, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
61
+DEF_HELPER_FLAGS_5(sme_ld1q_be_v, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
62
+DEF_HELPER_FLAGS_5(sme_ld1q_le_v, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
63
+DEF_HELPER_FLAGS_5(sme_ld1q_be_h_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
64
+DEF_HELPER_FLAGS_5(sme_ld1q_le_h_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
65
+DEF_HELPER_FLAGS_5(sme_ld1q_be_v_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
66
+DEF_HELPER_FLAGS_5(sme_ld1q_le_v_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
67
+
68
+DEF_HELPER_FLAGS_5(sme_st1b_h, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
69
+DEF_HELPER_FLAGS_5(sme_st1b_v, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
70
+DEF_HELPER_FLAGS_5(sme_st1b_h_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
71
+DEF_HELPER_FLAGS_5(sme_st1b_v_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
72
+
73
+DEF_HELPER_FLAGS_5(sme_st1h_be_h, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
74
+DEF_HELPER_FLAGS_5(sme_st1h_le_h, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
75
+DEF_HELPER_FLAGS_5(sme_st1h_be_v, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
76
+DEF_HELPER_FLAGS_5(sme_st1h_le_v, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
77
+DEF_HELPER_FLAGS_5(sme_st1h_be_h_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
78
+DEF_HELPER_FLAGS_5(sme_st1h_le_h_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
79
+DEF_HELPER_FLAGS_5(sme_st1h_be_v_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
80
+DEF_HELPER_FLAGS_5(sme_st1h_le_v_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
81
+
82
+DEF_HELPER_FLAGS_5(sme_st1s_be_h, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
83
+DEF_HELPER_FLAGS_5(sme_st1s_le_h, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
84
+DEF_HELPER_FLAGS_5(sme_st1s_be_v, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
85
+DEF_HELPER_FLAGS_5(sme_st1s_le_v, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
86
+DEF_HELPER_FLAGS_5(sme_st1s_be_h_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
87
+DEF_HELPER_FLAGS_5(sme_st1s_le_h_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
88
+DEF_HELPER_FLAGS_5(sme_st1s_be_v_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
89
+DEF_HELPER_FLAGS_5(sme_st1s_le_v_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
90
+
91
+DEF_HELPER_FLAGS_5(sme_st1d_be_h, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
92
+DEF_HELPER_FLAGS_5(sme_st1d_le_h, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
93
+DEF_HELPER_FLAGS_5(sme_st1d_be_v, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
94
+DEF_HELPER_FLAGS_5(sme_st1d_le_v, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
95
+DEF_HELPER_FLAGS_5(sme_st1d_be_h_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
96
+DEF_HELPER_FLAGS_5(sme_st1d_le_h_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
97
+DEF_HELPER_FLAGS_5(sme_st1d_be_v_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
98
+DEF_HELPER_FLAGS_5(sme_st1d_le_v_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
99
+
100
+DEF_HELPER_FLAGS_5(sme_st1q_be_h, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
101
+DEF_HELPER_FLAGS_5(sme_st1q_le_h, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
102
+DEF_HELPER_FLAGS_5(sme_st1q_be_v, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
103
+DEF_HELPER_FLAGS_5(sme_st1q_le_v, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
104
+DEF_HELPER_FLAGS_5(sme_st1q_be_h_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
105
+DEF_HELPER_FLAGS_5(sme_st1q_le_h_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
106
+DEF_HELPER_FLAGS_5(sme_st1q_be_v_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
107
+DEF_HELPER_FLAGS_5(sme_st1q_le_v_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
108
diff --git a/target/arm/sme.decode b/target/arm/sme.decode
109
index XXXXXXX..XXXXXXX 100644
110
--- a/target/arm/sme.decode
111
+++ b/target/arm/sme.decode
112
@@ -XXX,XX +XXX,XX @@ MOVA 11000000 esz:2 00001 0 v:1 .. pg:3 0 za_imm:4 zr:5 \
113
&mova to_vec=1 rs=%mova_rs
114
MOVA 11000000 11 00001 1 v:1 .. pg:3 0 za_imm:4 zr:5 \
115
&mova to_vec=1 rs=%mova_rs esz=4
116
+
117
+### SME Memory
118
+
119
+&ldst esz rs pg rn rm za_imm v:bool st:bool
120
+
121
+LDST1 1110000 0 esz:2 st:1 rm:5 v:1 .. pg:3 rn:5 0 za_imm:4 \
122
+ &ldst rs=%mova_rs
123
+LDST1 1110000 111 st:1 rm:5 v:1 .. pg:3 rn:5 0 za_imm:4 \
124
+ &ldst esz=4 rs=%mova_rs
125
diff --git a/target/arm/sme_helper.c b/target/arm/sme_helper.c
126
index XXXXXXX..XXXXXXX 100644
127
--- a/target/arm/sme_helper.c
128
+++ b/target/arm/sme_helper.c
41
@@ -XXX,XX +XXX,XX @@
129
@@ -XXX,XX +XXX,XX @@
130
131
#include "qemu/osdep.h"
132
#include "cpu.h"
133
+#include "internals.h"
134
#include "tcg/tcg-gvec-desc.h"
135
#include "exec/helper-proto.h"
136
+#include "exec/cpu_ldst.h"
137
+#include "exec/exec-all.h"
138
#include "qemu/int128.h"
139
#include "vec_internal.h"
140
+#include "sve_ldst_internal.h"
141
142
/* ResetSVEState */
143
void arm_reset_sve_state(CPUARMState *env)
144
@@ -XXX,XX +XXX,XX @@ void HELPER(sme_mova_zc_q)(void *vd, void *za, void *vg, uint32_t desc)
145
}
146
147
#undef DO_MOVA_Z
148
+
42
+/*
149
+/*
43
+ * Copyright (c) 2017, Impinj, Inc.
150
+ * Clear elements in a tile slice comprising len bytes.
44
+ *
45
+ * i.MX7 CCM, PMU and ANALOG IP blocks emulation code
46
+ *
47
+ * Author: Andrey Smirnov <andrew.smirnov@gmail.com>
48
+ *
49
+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
50
+ * See the COPYING file in the top-level directory.
51
+ */
151
+ */
52
+
152
+
53
+#ifndef IMX7_CCM_H
153
+typedef void ClearFn(void *ptr, size_t off, size_t len);
54
+#define IMX7_CCM_H
154
+
55
+
155
+static void clear_horizontal(void *ptr, size_t off, size_t len)
56
+#include "hw/misc/imx_ccm.h"
156
+{
57
+#include "qemu/bitops.h"
157
+ memset(ptr + off, 0, len);
58
+
158
+}
59
+enum IMX7AnalogRegisters {
159
+
60
+ ANALOG_PLL_ARM,
160
+static void clear_vertical_b(void *vptr, size_t off, size_t len)
61
+ ANALOG_PLL_ARM_SET,
161
+{
62
+ ANALOG_PLL_ARM_CLR,
162
+ for (size_t i = 0; i < len; ++i) {
63
+ ANALOG_PLL_ARM_TOG,
163
+ *(uint8_t *)(vptr + tile_vslice_offset(i + off)) = 0;
64
+ ANALOG_PLL_DDR,
164
+ }
65
+ ANALOG_PLL_DDR_SET,
165
+}
66
+ ANALOG_PLL_DDR_CLR,
166
+
67
+ ANALOG_PLL_DDR_TOG,
167
+static void clear_vertical_h(void *vptr, size_t off, size_t len)
68
+ ANALOG_PLL_DDR_SS,
168
+{
69
+ ANALOG_PLL_DDR_SS_SET,
169
+ for (size_t i = 0; i < len; i += 2) {
70
+ ANALOG_PLL_DDR_SS_CLR,
170
+ *(uint16_t *)(vptr + tile_vslice_offset(i + off)) = 0;
71
+ ANALOG_PLL_DDR_SS_TOG,
171
+ }
72
+ ANALOG_PLL_DDR_NUM,
172
+}
73
+ ANALOG_PLL_DDR_NUM_SET,
173
+
74
+ ANALOG_PLL_DDR_NUM_CLR,
174
+static void clear_vertical_s(void *vptr, size_t off, size_t len)
75
+ ANALOG_PLL_DDR_NUM_TOG,
175
+{
76
+ ANALOG_PLL_DDR_DENOM,
176
+ for (size_t i = 0; i < len; i += 4) {
77
+ ANALOG_PLL_DDR_DENOM_SET,
177
+ *(uint32_t *)(vptr + tile_vslice_offset(i + off)) = 0;
78
+ ANALOG_PLL_DDR_DENOM_CLR,
178
+ }
79
+ ANALOG_PLL_DDR_DENOM_TOG,
179
+}
80
+ ANALOG_PLL_480,
180
+
81
+ ANALOG_PLL_480_SET,
181
+static void clear_vertical_d(void *vptr, size_t off, size_t len)
82
+ ANALOG_PLL_480_CLR,
182
+{
83
+ ANALOG_PLL_480_TOG,
183
+ for (size_t i = 0; i < len; i += 8) {
84
+ ANALOG_PLL_480A,
184
+ *(uint64_t *)(vptr + tile_vslice_offset(i + off)) = 0;
85
+ ANALOG_PLL_480A_SET,
185
+ }
86
+ ANALOG_PLL_480A_CLR,
186
+}
87
+ ANALOG_PLL_480A_TOG,
187
+
88
+ ANALOG_PLL_480B,
188
+static void clear_vertical_q(void *vptr, size_t off, size_t len)
89
+ ANALOG_PLL_480B_SET,
189
+{
90
+ ANALOG_PLL_480B_CLR,
190
+ for (size_t i = 0; i < len; i += 16) {
91
+ ANALOG_PLL_480B_TOG,
191
+ memset(vptr + tile_vslice_offset(i + off), 0, 16);
92
+ ANALOG_PLL_ENET,
192
+ }
93
+ ANALOG_PLL_ENET_SET,
193
+}
94
+ ANALOG_PLL_ENET_CLR,
194
+
95
+ ANALOG_PLL_ENET_TOG,
96
+ ANALOG_PLL_AUDIO,
97
+ ANALOG_PLL_AUDIO_SET,
98
+ ANALOG_PLL_AUDIO_CLR,
99
+ ANALOG_PLL_AUDIO_TOG,
100
+ ANALOG_PLL_AUDIO_SS,
101
+ ANALOG_PLL_AUDIO_SS_SET,
102
+ ANALOG_PLL_AUDIO_SS_CLR,
103
+ ANALOG_PLL_AUDIO_SS_TOG,
104
+ ANALOG_PLL_AUDIO_NUM,
105
+ ANALOG_PLL_AUDIO_NUM_SET,
106
+ ANALOG_PLL_AUDIO_NUM_CLR,
107
+ ANALOG_PLL_AUDIO_NUM_TOG,
108
+ ANALOG_PLL_AUDIO_DENOM,
109
+ ANALOG_PLL_AUDIO_DENOM_SET,
110
+ ANALOG_PLL_AUDIO_DENOM_CLR,
111
+ ANALOG_PLL_AUDIO_DENOM_TOG,
112
+ ANALOG_PLL_VIDEO,
113
+ ANALOG_PLL_VIDEO_SET,
114
+ ANALOG_PLL_VIDEO_CLR,
115
+ ANALOG_PLL_VIDEO_TOG,
116
+ ANALOG_PLL_VIDEO_SS,
117
+ ANALOG_PLL_VIDEO_SS_SET,
118
+ ANALOG_PLL_VIDEO_SS_CLR,
119
+ ANALOG_PLL_VIDEO_SS_TOG,
120
+ ANALOG_PLL_VIDEO_NUM,
121
+ ANALOG_PLL_VIDEO_NUM_SET,
122
+ ANALOG_PLL_VIDEO_NUM_CLR,
123
+ ANALOG_PLL_VIDEO_NUM_TOG,
124
+ ANALOG_PLL_VIDEO_DENOM,
125
+ ANALOG_PLL_VIDEO_DENOM_SET,
126
+ ANALOG_PLL_VIDEO_DENOM_CLR,
127
+ ANALOG_PLL_VIDEO_DENOM_TOG,
128
+ ANALOG_PLL_MISC0,
129
+ ANALOG_PLL_MISC0_SET,
130
+ ANALOG_PLL_MISC0_CLR,
131
+ ANALOG_PLL_MISC0_TOG,
132
+
133
+ ANALOG_DIGPROG = 0x800 / sizeof(uint32_t),
134
+ ANALOG_MAX,
135
+
136
+ ANALOG_PLL_LOCK = BIT(31)
137
+};
138
+
139
+enum IMX7CCMRegisters {
140
+ CCM_MAX = 0xBE00 / sizeof(uint32_t) + 1,
141
+};
142
+
143
+enum IMX7PMURegisters {
144
+ PMU_MAX = 0x140 / sizeof(uint32_t),
145
+};
146
+
147
+#define TYPE_IMX7_CCM "imx7.ccm"
148
+#define IMX7_CCM(obj) OBJECT_CHECK(IMX7CCMState, (obj), TYPE_IMX7_CCM)
149
+
150
+typedef struct IMX7CCMState {
151
+ /* <private> */
152
+ IMXCCMState parent_obj;
153
+
154
+ /* <public> */
155
+ MemoryRegion iomem;
156
+
157
+ uint32_t ccm[CCM_MAX];
158
+} IMX7CCMState;
159
+
160
+
161
+#define TYPE_IMX7_ANALOG "imx7.analog"
162
+#define IMX7_ANALOG(obj) OBJECT_CHECK(IMX7AnalogState, (obj), TYPE_IMX7_ANALOG)
163
+
164
+typedef struct IMX7AnalogState {
165
+ /* <private> */
166
+ IMXCCMState parent_obj;
167
+
168
+ /* <public> */
169
+ struct {
170
+ MemoryRegion container;
171
+ MemoryRegion analog;
172
+ MemoryRegion digprog;
173
+ MemoryRegion pmu;
174
+ } mmio;
175
+
176
+ uint32_t analog[ANALOG_MAX];
177
+ uint32_t pmu[PMU_MAX];
178
+} IMX7AnalogState;
179
+
180
+#endif /* IMX7_CCM_H */
181
diff --git a/hw/misc/imx7_ccm.c b/hw/misc/imx7_ccm.c
182
new file mode 100644
183
index XXXXXXX..XXXXXXX
184
--- /dev/null
185
+++ b/hw/misc/imx7_ccm.c
186
@@ -XXX,XX +XXX,XX @@
187
+/*
195
+/*
188
+ * Copyright (c) 2018, Impinj, Inc.
196
+ * Copy elements from an array into a tile slice comprising len bytes.
189
+ *
190
+ * i.MX7 CCM, PMU and ANALOG IP blocks emulation code
191
+ *
192
+ * Author: Andrey Smirnov <andrew.smirnov@gmail.com>
193
+ *
194
+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
195
+ * See the COPYING file in the top-level directory.
196
+ */
197
+ */
197
+
198
+
198
+#include "qemu/osdep.h"
199
+typedef void CopyFn(void *dst, const void *src, size_t len);
199
+#include "qemu/log.h"
200
+
200
+
201
+static void copy_horizontal(void *dst, const void *src, size_t len)
201
+#include "hw/misc/imx7_ccm.h"
202
+{
202
+
203
+ memcpy(dst, src, len);
203
+static void imx7_analog_reset(DeviceState *dev)
204
+}
204
+{
205
+
205
+ IMX7AnalogState *s = IMX7_ANALOG(dev);
206
+static void copy_vertical_b(void *vdst, const void *vsrc, size_t len)
206
+
207
+{
207
+ memset(s->pmu, 0, sizeof(s->pmu));
208
+ const uint8_t *src = vsrc;
208
+ memset(s->analog, 0, sizeof(s->analog));
209
+ uint8_t *dst = vdst;
209
+
210
+ size_t i;
210
+ s->analog[ANALOG_PLL_ARM] = 0x00002042;
211
+
211
+ s->analog[ANALOG_PLL_DDR] = 0x0060302c;
212
+ for (i = 0; i < len; ++i) {
212
+ s->analog[ANALOG_PLL_DDR_SS] = 0x00000000;
213
+ dst[tile_vslice_index(i)] = src[i];
213
+ s->analog[ANALOG_PLL_DDR_NUM] = 0x06aaac4d;
214
+ }
214
+ s->analog[ANALOG_PLL_DDR_DENOM] = 0x100003ec;
215
+}
215
+ s->analog[ANALOG_PLL_480] = 0x00002000;
216
+
216
+ s->analog[ANALOG_PLL_480A] = 0x52605a56;
217
+static void copy_vertical_h(void *vdst, const void *vsrc, size_t len)
217
+ s->analog[ANALOG_PLL_480B] = 0x52525216;
218
+{
218
+ s->analog[ANALOG_PLL_ENET] = 0x00001fc0;
219
+ const uint16_t *src = vsrc;
219
+ s->analog[ANALOG_PLL_AUDIO] = 0x0001301b;
220
+ uint16_t *dst = vdst;
220
+ s->analog[ANALOG_PLL_AUDIO_SS] = 0x00000000;
221
+ size_t i;
221
+ s->analog[ANALOG_PLL_AUDIO_NUM] = 0x05f5e100;
222
+
222
+ s->analog[ANALOG_PLL_AUDIO_DENOM] = 0x2964619c;
223
+ for (i = 0; i < len / 2; ++i) {
223
+ s->analog[ANALOG_PLL_VIDEO] = 0x0008201b;
224
+ dst[tile_vslice_index(i)] = src[i];
224
+ s->analog[ANALOG_PLL_VIDEO_SS] = 0x00000000;
225
+ }
225
+ s->analog[ANALOG_PLL_VIDEO_NUM] = 0x0000f699;
226
+}
226
+ s->analog[ANALOG_PLL_VIDEO_DENOM] = 0x000f4240;
227
+
227
+ s->analog[ANALOG_PLL_MISC0] = 0x00000000;
228
+static void copy_vertical_s(void *vdst, const void *vsrc, size_t len)
228
+
229
+{
229
+ /* all PLLs need to be locked */
230
+ const uint32_t *src = vsrc;
230
+ s->analog[ANALOG_PLL_ARM] |= ANALOG_PLL_LOCK;
231
+ uint32_t *dst = vdst;
231
+ s->analog[ANALOG_PLL_DDR] |= ANALOG_PLL_LOCK;
232
+ size_t i;
232
+ s->analog[ANALOG_PLL_480] |= ANALOG_PLL_LOCK;
233
+
233
+ s->analog[ANALOG_PLL_480A] |= ANALOG_PLL_LOCK;
234
+ for (i = 0; i < len / 4; ++i) {
234
+ s->analog[ANALOG_PLL_480B] |= ANALOG_PLL_LOCK;
235
+ dst[tile_vslice_index(i)] = src[i];
235
+ s->analog[ANALOG_PLL_ENET] |= ANALOG_PLL_LOCK;
236
+ }
236
+ s->analog[ANALOG_PLL_AUDIO] |= ANALOG_PLL_LOCK;
237
+}
237
+ s->analog[ANALOG_PLL_VIDEO] |= ANALOG_PLL_LOCK;
238
+
238
+ s->analog[ANALOG_PLL_MISC0] |= ANALOG_PLL_LOCK;
239
+static void copy_vertical_d(void *vdst, const void *vsrc, size_t len)
240
+{
241
+ const uint64_t *src = vsrc;
242
+ uint64_t *dst = vdst;
243
+ size_t i;
244
+
245
+ for (i = 0; i < len / 8; ++i) {
246
+ dst[tile_vslice_index(i)] = src[i];
247
+ }
248
+}
249
+
250
+static void copy_vertical_q(void *vdst, const void *vsrc, size_t len)
251
+{
252
+ for (size_t i = 0; i < len; i += 16) {
253
+ memcpy(vdst + tile_vslice_offset(i), vsrc + i, 16);
254
+ }
255
+}
256
+
257
+/*
258
+ * Host and TLB primitives for vertical tile slice addressing.
259
+ */
260
+
261
+#define DO_LD(NAME, TYPE, HOST, TLB) \
262
+static inline void sme_##NAME##_v_host(void *za, intptr_t off, void *host) \
263
+{ \
264
+ TYPE val = HOST(host); \
265
+ *(TYPE *)(za + tile_vslice_offset(off)) = val; \
266
+} \
267
+static inline void sme_##NAME##_v_tlb(CPUARMState *env, void *za, \
268
+ intptr_t off, target_ulong addr, uintptr_t ra) \
269
+{ \
270
+ TYPE val = TLB(env, useronly_clean_ptr(addr), ra); \
271
+ *(TYPE *)(za + tile_vslice_offset(off)) = val; \
272
+}
273
+
274
+#define DO_ST(NAME, TYPE, HOST, TLB) \
275
+static inline void sme_##NAME##_v_host(void *za, intptr_t off, void *host) \
276
+{ \
277
+ TYPE val = *(TYPE *)(za + tile_vslice_offset(off)); \
278
+ HOST(host, val); \
279
+} \
280
+static inline void sme_##NAME##_v_tlb(CPUARMState *env, void *za, \
281
+ intptr_t off, target_ulong addr, uintptr_t ra) \
282
+{ \
283
+ TYPE val = *(TYPE *)(za + tile_vslice_offset(off)); \
284
+ TLB(env, useronly_clean_ptr(addr), val, ra); \
285
+}
286
+
287
+/*
288
+ * The ARMVectorReg elements are stored in host-endian 64-bit units.
289
+ * For 128-bit quantities, the sequence defined by the Elem[] pseudocode
290
+ * corresponds to storing the two 64-bit pieces in little-endian order.
291
+ */
292
+#define DO_LDQ(HNAME, VNAME, BE, HOST, TLB) \
293
+static inline void HNAME##_host(void *za, intptr_t off, void *host) \
294
+{ \
295
+ uint64_t val0 = HOST(host), val1 = HOST(host + 8); \
296
+ uint64_t *ptr = za + off; \
297
+ ptr[0] = BE ? val1 : val0, ptr[1] = BE ? val0 : val1; \
298
+} \
299
+static inline void VNAME##_v_host(void *za, intptr_t off, void *host) \
300
+{ \
301
+ HNAME##_host(za, tile_vslice_offset(off), host); \
302
+} \
303
+static inline void HNAME##_tlb(CPUARMState *env, void *za, intptr_t off, \
304
+ target_ulong addr, uintptr_t ra) \
305
+{ \
306
+ uint64_t val0 = TLB(env, useronly_clean_ptr(addr), ra); \
307
+ uint64_t val1 = TLB(env, useronly_clean_ptr(addr + 8), ra); \
308
+ uint64_t *ptr = za + off; \
309
+ ptr[0] = BE ? val1 : val0, ptr[1] = BE ? val0 : val1; \
310
+} \
311
+static inline void VNAME##_v_tlb(CPUARMState *env, void *za, intptr_t off, \
312
+ target_ulong addr, uintptr_t ra) \
313
+{ \
314
+ HNAME##_tlb(env, za, tile_vslice_offset(off), addr, ra); \
315
+}
316
+
317
+#define DO_STQ(HNAME, VNAME, BE, HOST, TLB) \
318
+static inline void HNAME##_host(void *za, intptr_t off, void *host) \
319
+{ \
320
+ uint64_t *ptr = za + off; \
321
+ HOST(host, ptr[BE]); \
322
+ HOST(host + 1, ptr[!BE]); \
323
+} \
324
+static inline void VNAME##_v_host(void *za, intptr_t off, void *host) \
325
+{ \
326
+ HNAME##_host(za, tile_vslice_offset(off), host); \
327
+} \
328
+static inline void HNAME##_tlb(CPUARMState *env, void *za, intptr_t off, \
329
+ target_ulong addr, uintptr_t ra) \
330
+{ \
331
+ uint64_t *ptr = za + off; \
332
+ TLB(env, useronly_clean_ptr(addr), ptr[BE], ra); \
333
+ TLB(env, useronly_clean_ptr(addr + 8), ptr[!BE], ra); \
334
+} \
335
+static inline void VNAME##_v_tlb(CPUARMState *env, void *za, intptr_t off, \
336
+ target_ulong addr, uintptr_t ra) \
337
+{ \
338
+ HNAME##_tlb(env, za, tile_vslice_offset(off), addr, ra); \
339
+}
340
+
341
+DO_LD(ld1b, uint8_t, ldub_p, cpu_ldub_data_ra)
342
+DO_LD(ld1h_be, uint16_t, lduw_be_p, cpu_lduw_be_data_ra)
343
+DO_LD(ld1h_le, uint16_t, lduw_le_p, cpu_lduw_le_data_ra)
344
+DO_LD(ld1s_be, uint32_t, ldl_be_p, cpu_ldl_be_data_ra)
345
+DO_LD(ld1s_le, uint32_t, ldl_le_p, cpu_ldl_le_data_ra)
346
+DO_LD(ld1d_be, uint64_t, ldq_be_p, cpu_ldq_be_data_ra)
347
+DO_LD(ld1d_le, uint64_t, ldq_le_p, cpu_ldq_le_data_ra)
348
+
349
+DO_LDQ(sve_ld1qq_be, sme_ld1q_be, 1, ldq_be_p, cpu_ldq_be_data_ra)
350
+DO_LDQ(sve_ld1qq_le, sme_ld1q_le, 0, ldq_le_p, cpu_ldq_le_data_ra)
351
+
352
+DO_ST(st1b, uint8_t, stb_p, cpu_stb_data_ra)
353
+DO_ST(st1h_be, uint16_t, stw_be_p, cpu_stw_be_data_ra)
354
+DO_ST(st1h_le, uint16_t, stw_le_p, cpu_stw_le_data_ra)
355
+DO_ST(st1s_be, uint32_t, stl_be_p, cpu_stl_be_data_ra)
356
+DO_ST(st1s_le, uint32_t, stl_le_p, cpu_stl_le_data_ra)
357
+DO_ST(st1d_be, uint64_t, stq_be_p, cpu_stq_be_data_ra)
358
+DO_ST(st1d_le, uint64_t, stq_le_p, cpu_stq_le_data_ra)
359
+
360
+DO_STQ(sve_st1qq_be, sme_st1q_be, 1, stq_be_p, cpu_stq_be_data_ra)
361
+DO_STQ(sve_st1qq_le, sme_st1q_le, 0, stq_le_p, cpu_stq_le_data_ra)
362
+
363
+#undef DO_LD
364
+#undef DO_ST
365
+#undef DO_LDQ
366
+#undef DO_STQ
367
+
368
+/*
369
+ * Common helper for all contiguous predicated loads.
370
+ */
371
+
372
+static inline QEMU_ALWAYS_INLINE
373
+void sme_ld1(CPUARMState *env, void *za, uint64_t *vg,
374
+ const target_ulong addr, uint32_t desc, const uintptr_t ra,
375
+ const int esz, uint32_t mtedesc, bool vertical,
376
+ sve_ldst1_host_fn *host_fn,
377
+ sve_ldst1_tlb_fn *tlb_fn,
378
+ ClearFn *clr_fn,
379
+ CopyFn *cpy_fn)
380
+{
381
+ const intptr_t reg_max = simd_oprsz(desc);
382
+ const intptr_t esize = 1 << esz;
383
+ intptr_t reg_off, reg_last;
384
+ SVEContLdSt info;
385
+ void *host;
386
+ int flags;
387
+
388
+ /* Find the active elements. */
389
+ if (!sve_cont_ldst_elements(&info, addr, vg, reg_max, esz, esize)) {
390
+ /* The entire predicate was false; no load occurs. */
391
+ clr_fn(za, 0, reg_max);
392
+ return;
393
+ }
394
+
395
+ /* Probe the page(s). Exit with exception for any invalid page. */
396
+ sve_cont_ldst_pages(&info, FAULT_ALL, env, addr, MMU_DATA_LOAD, ra);
397
+
398
+ /* Handle watchpoints for all active elements. */
399
+ sve_cont_ldst_watchpoints(&info, env, vg, addr, esize, esize,
400
+ BP_MEM_READ, ra);
239
+
401
+
240
+ /*
402
+ /*
241
+ * Since I couldn't find any info about this in the reference
403
+ * Handle mte checks for all active elements.
242
+ * manual the value of this register is based strictly on matching
404
+ * Since TBI must be set for MTE, !mtedesc => !mte_active.
243
+ * what Linux kernel expects it to be.
244
+ */
405
+ */
245
+ s->analog[ANALOG_DIGPROG] = 0x720000;
406
+ if (mtedesc) {
407
+ sve_cont_ldst_mte_check(&info, env, vg, addr, esize, esize,
408
+ mtedesc, ra);
409
+ }
410
+
411
+ flags = info.page[0].flags | info.page[1].flags;
412
+ if (unlikely(flags != 0)) {
413
+#ifdef CONFIG_USER_ONLY
414
+ g_assert_not_reached();
415
+#else
416
+ /*
417
+ * At least one page includes MMIO.
418
+ * Any bus operation can fail with cpu_transaction_failed,
419
+ * which for ARM will raise SyncExternal. Perform the load
420
+ * into scratch memory to preserve register state until the end.
421
+ */
422
+ ARMVectorReg scratch = { };
423
+
424
+ reg_off = info.reg_off_first[0];
425
+ reg_last = info.reg_off_last[1];
426
+ if (reg_last < 0) {
427
+ reg_last = info.reg_off_split;
428
+ if (reg_last < 0) {
429
+ reg_last = info.reg_off_last[0];
430
+ }
431
+ }
432
+
433
+ do {
434
+ uint64_t pg = vg[reg_off >> 6];
435
+ do {
436
+ if ((pg >> (reg_off & 63)) & 1) {
437
+ tlb_fn(env, &scratch, reg_off, addr + reg_off, ra);
438
+ }
439
+ reg_off += esize;
440
+ } while (reg_off & 63);
441
+ } while (reg_off <= reg_last);
442
+
443
+ cpy_fn(za, &scratch, reg_max);
444
+ return;
445
+#endif
446
+ }
447
+
448
+ /* The entire operation is in RAM, on valid pages. */
449
+
450
+ reg_off = info.reg_off_first[0];
451
+ reg_last = info.reg_off_last[0];
452
+ host = info.page[0].host;
453
+
454
+ if (!vertical) {
455
+ memset(za, 0, reg_max);
456
+ } else if (reg_off) {
457
+ clr_fn(za, 0, reg_off);
458
+ }
459
+
460
+ while (reg_off <= reg_last) {
461
+ uint64_t pg = vg[reg_off >> 6];
462
+ do {
463
+ if ((pg >> (reg_off & 63)) & 1) {
464
+ host_fn(za, reg_off, host + reg_off);
465
+ } else if (vertical) {
466
+ clr_fn(za, reg_off, esize);
467
+ }
468
+ reg_off += esize;
469
+ } while (reg_off <= reg_last && (reg_off & 63));
470
+ }
471
+
246
+ /*
472
+ /*
247
+ * Set revision to be 1.0 (Arbitrary choice, no particular
473
+ * Use the slow path to manage the cross-page misalignment.
248
+ * reason).
474
+ * But we know this is RAM and cannot trap.
249
+ */
475
+ */
250
+ s->analog[ANALOG_DIGPROG] |= 0x000010;
476
+ reg_off = info.reg_off_split;
251
+}
477
+ if (unlikely(reg_off >= 0)) {
252
+
478
+ tlb_fn(env, za, reg_off, addr + reg_off, ra);
253
+static void imx7_ccm_reset(DeviceState *dev)
479
+ }
254
+{
480
+
255
+ IMX7CCMState *s = IMX7_CCM(dev);
481
+ reg_off = info.reg_off_first[1];
256
+
482
+ if (unlikely(reg_off >= 0)) {
257
+ memset(s->ccm, 0, sizeof(s->ccm));
483
+ reg_last = info.reg_off_last[1];
258
+}
484
+ host = info.page[1].host;
259
+
485
+
260
+#define CCM_INDEX(offset) (((offset) & ~(hwaddr)0xF) / sizeof(uint32_t))
486
+ do {
261
+#define CCM_BITOP(offset) ((offset) & (hwaddr)0xF)
487
+ uint64_t pg = vg[reg_off >> 6];
262
+
488
+ do {
263
+enum {
489
+ if ((pg >> (reg_off & 63)) & 1) {
264
+ CCM_BITOP_NONE = 0x00,
490
+ host_fn(za, reg_off, host + reg_off);
265
+ CCM_BITOP_SET = 0x04,
491
+ } else if (vertical) {
266
+ CCM_BITOP_CLR = 0x08,
492
+ clr_fn(za, reg_off, esize);
267
+ CCM_BITOP_TOG = 0x0C,
493
+ }
268
+};
494
+ reg_off += esize;
269
+
495
+ } while (reg_off & 63);
270
+static uint64_t imx7_set_clr_tog_read(void *opaque, hwaddr offset,
496
+ } while (reg_off <= reg_last);
271
+ unsigned size)
497
+ }
272
+{
498
+}
273
+ const uint32_t *mmio = opaque;
499
+
274
+
500
+static inline QEMU_ALWAYS_INLINE
275
+ return mmio[CCM_INDEX(offset)];
501
+void sme_ld1_mte(CPUARMState *env, void *za, uint64_t *vg,
276
+}
502
+ target_ulong addr, uint32_t desc, uintptr_t ra,
277
+
503
+ const int esz, bool vertical,
278
+static void imx7_set_clr_tog_write(void *opaque, hwaddr offset,
504
+ sve_ldst1_host_fn *host_fn,
279
+ uint64_t value, unsigned size)
505
+ sve_ldst1_tlb_fn *tlb_fn,
280
+{
506
+ ClearFn *clr_fn,
281
+ const uint8_t bitop = CCM_BITOP(offset);
507
+ CopyFn *cpy_fn)
282
+ const uint32_t index = CCM_INDEX(offset);
508
+{
283
+ uint32_t *mmio = opaque;
509
+ uint32_t mtedesc = desc >> (SIMD_DATA_SHIFT + SVE_MTEDESC_SHIFT);
284
+
510
+ int bit55 = extract64(addr, 55, 1);
285
+ switch (bitop) {
511
+
286
+ case CCM_BITOP_NONE:
512
+ /* Remove mtedesc from the normal sve descriptor. */
287
+ mmio[index] = value;
513
+ desc = extract32(desc, 0, SIMD_DATA_SHIFT + SVE_MTEDESC_SHIFT);
288
+ break;
514
+
289
+ case CCM_BITOP_SET:
515
+ /* Perform gross MTE suppression early. */
290
+ mmio[index] |= value;
516
+ if (!tbi_check(desc, bit55) ||
291
+ break;
517
+ tcma_check(desc, bit55, allocation_tag_from_addr(addr))) {
292
+ case CCM_BITOP_CLR:
518
+ mtedesc = 0;
293
+ mmio[index] &= ~value;
519
+ }
294
+ break;
520
+
295
+ case CCM_BITOP_TOG:
521
+ sme_ld1(env, za, vg, addr, desc, ra, esz, mtedesc, vertical,
296
+ mmio[index] ^= value;
522
+ host_fn, tlb_fn, clr_fn, cpy_fn);
297
+ break;
523
+}
524
+
525
+#define DO_LD(L, END, ESZ) \
526
+void HELPER(sme_ld1##L##END##_h)(CPUARMState *env, void *za, void *vg, \
527
+ target_ulong addr, uint32_t desc) \
528
+{ \
529
+ sme_ld1(env, za, vg, addr, desc, GETPC(), ESZ, 0, false, \
530
+ sve_ld1##L##L##END##_host, sve_ld1##L##L##END##_tlb, \
531
+ clear_horizontal, copy_horizontal); \
532
+} \
533
+void HELPER(sme_ld1##L##END##_v)(CPUARMState *env, void *za, void *vg, \
534
+ target_ulong addr, uint32_t desc) \
535
+{ \
536
+ sme_ld1(env, za, vg, addr, desc, GETPC(), ESZ, 0, true, \
537
+ sme_ld1##L##END##_v_host, sme_ld1##L##END##_v_tlb, \
538
+ clear_vertical_##L, copy_vertical_##L); \
539
+} \
540
+void HELPER(sme_ld1##L##END##_h_mte)(CPUARMState *env, void *za, void *vg, \
541
+ target_ulong addr, uint32_t desc) \
542
+{ \
543
+ sme_ld1_mte(env, za, vg, addr, desc, GETPC(), ESZ, false, \
544
+ sve_ld1##L##L##END##_host, sve_ld1##L##L##END##_tlb, \
545
+ clear_horizontal, copy_horizontal); \
546
+} \
547
+void HELPER(sme_ld1##L##END##_v_mte)(CPUARMState *env, void *za, void *vg, \
548
+ target_ulong addr, uint32_t desc) \
549
+{ \
550
+ sme_ld1_mte(env, za, vg, addr, desc, GETPC(), ESZ, true, \
551
+ sme_ld1##L##END##_v_host, sme_ld1##L##END##_v_tlb, \
552
+ clear_vertical_##L, copy_vertical_##L); \
553
+}
554
+
555
+DO_LD(b, , MO_8)
556
+DO_LD(h, _be, MO_16)
557
+DO_LD(h, _le, MO_16)
558
+DO_LD(s, _be, MO_32)
559
+DO_LD(s, _le, MO_32)
560
+DO_LD(d, _be, MO_64)
561
+DO_LD(d, _le, MO_64)
562
+DO_LD(q, _be, MO_128)
563
+DO_LD(q, _le, MO_128)
564
+
565
+#undef DO_LD
566
+
567
+/*
568
+ * Common helper for all contiguous predicated stores.
569
+ */
570
+
571
+static inline QEMU_ALWAYS_INLINE
572
+void sme_st1(CPUARMState *env, void *za, uint64_t *vg,
573
+ const target_ulong addr, uint32_t desc, const uintptr_t ra,
574
+ const int esz, uint32_t mtedesc, bool vertical,
575
+ sve_ldst1_host_fn *host_fn,
576
+ sve_ldst1_tlb_fn *tlb_fn)
577
+{
578
+ const intptr_t reg_max = simd_oprsz(desc);
579
+ const intptr_t esize = 1 << esz;
580
+ intptr_t reg_off, reg_last;
581
+ SVEContLdSt info;
582
+ void *host;
583
+ int flags;
584
+
585
+ /* Find the active elements. */
586
+ if (!sve_cont_ldst_elements(&info, addr, vg, reg_max, esz, esize)) {
587
+ /* The entire predicate was false; no store occurs. */
588
+ return;
589
+ }
590
+
591
+ /* Probe the page(s). Exit with exception for any invalid page. */
592
+ sve_cont_ldst_pages(&info, FAULT_ALL, env, addr, MMU_DATA_STORE, ra);
593
+
594
+ /* Handle watchpoints for all active elements. */
595
+ sve_cont_ldst_watchpoints(&info, env, vg, addr, esize, esize,
596
+ BP_MEM_WRITE, ra);
597
+
598
+ /*
599
+ * Handle mte checks for all active elements.
600
+ * Since TBI must be set for MTE, !mtedesc => !mte_active.
601
+ */
602
+ if (mtedesc) {
603
+ sve_cont_ldst_mte_check(&info, env, vg, addr, esize, esize,
604
+ mtedesc, ra);
605
+ }
606
+
607
+ flags = info.page[0].flags | info.page[1].flags;
608
+ if (unlikely(flags != 0)) {
609
+#ifdef CONFIG_USER_ONLY
610
+ g_assert_not_reached();
611
+#else
612
+ /*
613
+ * At least one page includes MMIO.
614
+ * Any bus operation can fail with cpu_transaction_failed,
615
+ * which for ARM will raise SyncExternal. We cannot avoid
616
+ * this fault and will leave with the store incomplete.
617
+ */
618
+ reg_off = info.reg_off_first[0];
619
+ reg_last = info.reg_off_last[1];
620
+ if (reg_last < 0) {
621
+ reg_last = info.reg_off_split;
622
+ if (reg_last < 0) {
623
+ reg_last = info.reg_off_last[0];
624
+ }
625
+ }
626
+
627
+ do {
628
+ uint64_t pg = vg[reg_off >> 6];
629
+ do {
630
+ if ((pg >> (reg_off & 63)) & 1) {
631
+ tlb_fn(env, za, reg_off, addr + reg_off, ra);
632
+ }
633
+ reg_off += esize;
634
+ } while (reg_off & 63);
635
+ } while (reg_off <= reg_last);
636
+ return;
637
+#endif
638
+ }
639
+
640
+ reg_off = info.reg_off_first[0];
641
+ reg_last = info.reg_off_last[0];
642
+ host = info.page[0].host;
643
+
644
+ while (reg_off <= reg_last) {
645
+ uint64_t pg = vg[reg_off >> 6];
646
+ do {
647
+ if ((pg >> (reg_off & 63)) & 1) {
648
+ host_fn(za, reg_off, host + reg_off);
649
+ }
650
+ reg_off += 1 << esz;
651
+ } while (reg_off <= reg_last && (reg_off & 63));
652
+ }
653
+
654
+ /*
655
+ * Use the slow path to manage the cross-page misalignment.
656
+ * But we know this is RAM and cannot trap.
657
+ */
658
+ reg_off = info.reg_off_split;
659
+ if (unlikely(reg_off >= 0)) {
660
+ tlb_fn(env, za, reg_off, addr + reg_off, ra);
661
+ }
662
+
663
+ reg_off = info.reg_off_first[1];
664
+ if (unlikely(reg_off >= 0)) {
665
+ reg_last = info.reg_off_last[1];
666
+ host = info.page[1].host;
667
+
668
+ do {
669
+ uint64_t pg = vg[reg_off >> 6];
670
+ do {
671
+ if ((pg >> (reg_off & 63)) & 1) {
672
+ host_fn(za, reg_off, host + reg_off);
673
+ }
674
+ reg_off += 1 << esz;
675
+ } while (reg_off & 63);
676
+ } while (reg_off <= reg_last);
677
+ }
678
+}
679
+
680
+static inline QEMU_ALWAYS_INLINE
681
+void sme_st1_mte(CPUARMState *env, void *za, uint64_t *vg, target_ulong addr,
682
+ uint32_t desc, uintptr_t ra, int esz, bool vertical,
683
+ sve_ldst1_host_fn *host_fn,
684
+ sve_ldst1_tlb_fn *tlb_fn)
685
+{
686
+ uint32_t mtedesc = desc >> (SIMD_DATA_SHIFT + SVE_MTEDESC_SHIFT);
687
+ int bit55 = extract64(addr, 55, 1);
688
+
689
+ /* Remove mtedesc from the normal sve descriptor. */
690
+ desc = extract32(desc, 0, SIMD_DATA_SHIFT + SVE_MTEDESC_SHIFT);
691
+
692
+ /* Perform gross MTE suppression early. */
693
+ if (!tbi_check(desc, bit55) ||
694
+ tcma_check(desc, bit55, allocation_tag_from_addr(addr))) {
695
+ mtedesc = 0;
696
+ }
697
+
698
+ sme_st1(env, za, vg, addr, desc, ra, esz, mtedesc,
699
+ vertical, host_fn, tlb_fn);
700
+}
701
+
702
+#define DO_ST(L, END, ESZ) \
703
+void HELPER(sme_st1##L##END##_h)(CPUARMState *env, void *za, void *vg, \
704
+ target_ulong addr, uint32_t desc) \
705
+{ \
706
+ sme_st1(env, za, vg, addr, desc, GETPC(), ESZ, 0, false, \
707
+ sve_st1##L##L##END##_host, sve_st1##L##L##END##_tlb); \
708
+} \
709
+void HELPER(sme_st1##L##END##_v)(CPUARMState *env, void *za, void *vg, \
710
+ target_ulong addr, uint32_t desc) \
711
+{ \
712
+ sme_st1(env, za, vg, addr, desc, GETPC(), ESZ, 0, true, \
713
+ sme_st1##L##END##_v_host, sme_st1##L##END##_v_tlb); \
714
+} \
715
+void HELPER(sme_st1##L##END##_h_mte)(CPUARMState *env, void *za, void *vg, \
716
+ target_ulong addr, uint32_t desc) \
717
+{ \
718
+ sme_st1_mte(env, za, vg, addr, desc, GETPC(), ESZ, false, \
719
+ sve_st1##L##L##END##_host, sve_st1##L##L##END##_tlb); \
720
+} \
721
+void HELPER(sme_st1##L##END##_v_mte)(CPUARMState *env, void *za, void *vg, \
722
+ target_ulong addr, uint32_t desc) \
723
+{ \
724
+ sme_st1_mte(env, za, vg, addr, desc, GETPC(), ESZ, true, \
725
+ sme_st1##L##END##_v_host, sme_st1##L##END##_v_tlb); \
726
+}
727
+
728
+DO_ST(b, , MO_8)
729
+DO_ST(h, _be, MO_16)
730
+DO_ST(h, _le, MO_16)
731
+DO_ST(s, _be, MO_32)
732
+DO_ST(s, _le, MO_32)
733
+DO_ST(d, _be, MO_64)
734
+DO_ST(d, _le, MO_64)
735
+DO_ST(q, _be, MO_128)
736
+DO_ST(q, _le, MO_128)
737
+
738
+#undef DO_ST
739
diff --git a/target/arm/translate-sme.c b/target/arm/translate-sme.c
740
index XXXXXXX..XXXXXXX 100644
741
--- a/target/arm/translate-sme.c
742
+++ b/target/arm/translate-sme.c
743
@@ -XXX,XX +XXX,XX @@ static bool trans_MOVA(DisasContext *s, arg_MOVA *a)
744
745
return true;
746
}
747
+
748
+static bool trans_LDST1(DisasContext *s, arg_LDST1 *a)
749
+{
750
+ typedef void GenLdSt1(TCGv_env, TCGv_ptr, TCGv_ptr, TCGv, TCGv_i32);
751
+
752
+ /*
753
+ * Indexed by [esz][be][v][mte][st], which is (except for load/store)
754
+ * also the order in which the elements appear in the function names,
755
+ * and so how we must concatenate the pieces.
756
+ */
757
+
758
+#define FN_LS(F) { gen_helper_sme_ld1##F, gen_helper_sme_st1##F }
759
+#define FN_MTE(F) { FN_LS(F), FN_LS(F##_mte) }
760
+#define FN_HV(F) { FN_MTE(F##_h), FN_MTE(F##_v) }
761
+#define FN_END(L, B) { FN_HV(L), FN_HV(B) }
762
+
763
+ static GenLdSt1 * const fns[5][2][2][2][2] = {
764
+ FN_END(b, b),
765
+ FN_END(h_le, h_be),
766
+ FN_END(s_le, s_be),
767
+ FN_END(d_le, d_be),
768
+ FN_END(q_le, q_be),
298
+ };
769
+ };
299
+}
770
+
300
+
771
+#undef FN_LS
301
+static const struct MemoryRegionOps imx7_set_clr_tog_ops = {
772
+#undef FN_MTE
302
+ .read = imx7_set_clr_tog_read,
773
+#undef FN_HV
303
+ .write = imx7_set_clr_tog_write,
774
+#undef FN_END
304
+ .endianness = DEVICE_NATIVE_ENDIAN,
775
+
305
+ .impl = {
776
+ TCGv_ptr t_za, t_pg;
306
+ /*
777
+ TCGv_i64 addr;
307
+ * Our device would not work correctly if the guest was doing
778
+ int svl, desc = 0;
308
+ * unaligned access. This might not be a limitation on the real
779
+ bool be = s->be_data == MO_BE;
309
+ * device but in practice there is no reason for a guest to access
780
+ bool mte = s->mte_active[0];
310
+ * this device unaligned.
781
+
311
+ */
782
+ if (!dc_isar_feature(aa64_sme, s)) {
312
+ .min_access_size = 4,
783
+ return false;
313
+ .max_access_size = 4,
784
+ }
314
+ .unaligned = false,
785
+ if (!sme_smza_enabled_check(s)) {
315
+ },
786
+ return true;
316
+};
787
+ }
317
+
788
+
318
+static const struct MemoryRegionOps imx7_digprog_ops = {
789
+ t_za = get_tile_rowcol(s, a->esz, a->rs, a->za_imm, a->v);
319
+ .read = imx7_set_clr_tog_read,
790
+ t_pg = pred_full_reg_ptr(s, a->pg);
320
+ .endianness = DEVICE_NATIVE_ENDIAN,
791
+ addr = tcg_temp_new_i64();
321
+ .impl = {
792
+
322
+ .min_access_size = 4,
793
+ tcg_gen_shli_i64(addr, cpu_reg(s, a->rm), a->esz);
323
+ .max_access_size = 4,
794
+ tcg_gen_add_i64(addr, addr, cpu_reg_sp(s, a->rn));
324
+ .unaligned = false,
795
+
325
+ },
796
+ if (mte) {
326
+};
797
+ desc = FIELD_DP32(desc, MTEDESC, MIDX, get_mem_index(s));
327
+
798
+ desc = FIELD_DP32(desc, MTEDESC, TBI, s->tbid);
328
+static void imx7_ccm_init(Object *obj)
799
+ desc = FIELD_DP32(desc, MTEDESC, TCMA, s->tcma);
329
+{
800
+ desc = FIELD_DP32(desc, MTEDESC, WRITE, a->st);
330
+ SysBusDevice *sd = SYS_BUS_DEVICE(obj);
801
+ desc = FIELD_DP32(desc, MTEDESC, SIZEM1, (1 << a->esz) - 1);
331
+ IMX7CCMState *s = IMX7_CCM(obj);
802
+ desc <<= SVE_MTEDESC_SHIFT;
332
+
803
+ } else {
333
+ memory_region_init_io(&s->iomem,
804
+ addr = clean_data_tbi(s, addr);
334
+ obj,
805
+ }
335
+ &imx7_set_clr_tog_ops,
806
+ svl = streaming_vec_reg_size(s);
336
+ s->ccm,
807
+ desc = simd_desc(svl, svl, desc);
337
+ TYPE_IMX7_CCM ".ccm",
808
+
338
+ sizeof(s->ccm));
809
+ fns[a->esz][be][a->v][mte][a->st](cpu_env, t_za, t_pg, addr,
339
+
810
+ tcg_constant_i32(desc));
340
+ sysbus_init_mmio(sd, &s->iomem);
811
+
341
+}
812
+ tcg_temp_free_ptr(t_za);
342
+
813
+ tcg_temp_free_ptr(t_pg);
343
+static void imx7_analog_init(Object *obj)
814
+ tcg_temp_free_i64(addr);
344
+{
815
+ return true;
345
+ SysBusDevice *sd = SYS_BUS_DEVICE(obj);
816
+}
346
+ IMX7AnalogState *s = IMX7_ANALOG(obj);
347
+
348
+ memory_region_init(&s->mmio.container, obj, TYPE_IMX7_ANALOG,
349
+ 0x10000);
350
+
351
+ memory_region_init_io(&s->mmio.analog,
352
+ obj,
353
+ &imx7_set_clr_tog_ops,
354
+ s->analog,
355
+ TYPE_IMX7_ANALOG,
356
+ sizeof(s->analog));
357
+
358
+ memory_region_add_subregion(&s->mmio.container,
359
+ 0x60, &s->mmio.analog);
360
+
361
+ memory_region_init_io(&s->mmio.pmu,
362
+ obj,
363
+ &imx7_set_clr_tog_ops,
364
+ s->pmu,
365
+ TYPE_IMX7_ANALOG ".pmu",
366
+ sizeof(s->pmu));
367
+
368
+ memory_region_add_subregion(&s->mmio.container,
369
+ 0x200, &s->mmio.pmu);
370
+
371
+ memory_region_init_io(&s->mmio.digprog,
372
+ obj,
373
+ &imx7_digprog_ops,
374
+ &s->analog[ANALOG_DIGPROG],
375
+ TYPE_IMX7_ANALOG ".digprog",
376
+ sizeof(uint32_t));
377
+
378
+ memory_region_add_subregion_overlap(&s->mmio.container,
379
+ 0x800, &s->mmio.digprog, 10);
380
+
381
+
382
+ sysbus_init_mmio(sd, &s->mmio.container);
383
+}
384
+
385
+static const VMStateDescription vmstate_imx7_ccm = {
386
+ .name = TYPE_IMX7_CCM,
387
+ .version_id = 1,
388
+ .minimum_version_id = 1,
389
+ .fields = (VMStateField[]) {
390
+ VMSTATE_UINT32_ARRAY(ccm, IMX7CCMState, CCM_MAX),
391
+ VMSTATE_END_OF_LIST()
392
+ },
393
+};
394
+
395
+static uint32_t imx7_ccm_get_clock_frequency(IMXCCMState *dev, IMXClk clock)
396
+{
397
+ /*
398
+ * This function is "consumed" by GPT emulation code, however on
399
+ * i.MX7 each GPT block can have their own clock root. This means
400
+ * that this functions needs somehow to know requester's identity
401
+ * and the way to pass it: be it via additional IMXClk constants
402
+ * or by adding another argument to this method needs to be
403
+ * figured out
404
+ */
405
+ qemu_log_mask(LOG_GUEST_ERROR, "[%s]%s: Not implemented\n",
406
+ TYPE_IMX7_CCM, __func__);
407
+ return 0;
408
+}
409
+
410
+static void imx7_ccm_class_init(ObjectClass *klass, void *data)
411
+{
412
+ DeviceClass *dc = DEVICE_CLASS(klass);
413
+ IMXCCMClass *ccm = IMX_CCM_CLASS(klass);
414
+
415
+ dc->reset = imx7_ccm_reset;
416
+ dc->vmsd = &vmstate_imx7_ccm;
417
+ dc->desc = "i.MX7 Clock Control Module";
418
+
419
+ ccm->get_clock_frequency = imx7_ccm_get_clock_frequency;
420
+}
421
+
422
+static const TypeInfo imx7_ccm_info = {
423
+ .name = TYPE_IMX7_CCM,
424
+ .parent = TYPE_IMX_CCM,
425
+ .instance_size = sizeof(IMX7CCMState),
426
+ .instance_init = imx7_ccm_init,
427
+ .class_init = imx7_ccm_class_init,
428
+};
429
+
430
+static const VMStateDescription vmstate_imx7_analog = {
431
+ .name = TYPE_IMX7_ANALOG,
432
+ .version_id = 1,
433
+ .minimum_version_id = 1,
434
+ .fields = (VMStateField[]) {
435
+ VMSTATE_UINT32_ARRAY(analog, IMX7AnalogState, ANALOG_MAX),
436
+ VMSTATE_UINT32_ARRAY(pmu, IMX7AnalogState, PMU_MAX),
437
+ VMSTATE_END_OF_LIST()
438
+ },
439
+};
440
+
441
+static void imx7_analog_class_init(ObjectClass *klass, void *data)
442
+{
443
+ DeviceClass *dc = DEVICE_CLASS(klass);
444
+
445
+ dc->reset = imx7_analog_reset;
446
+ dc->vmsd = &vmstate_imx7_analog;
447
+ dc->desc = "i.MX7 Analog Module";
448
+}
449
+
450
+static const TypeInfo imx7_analog_info = {
451
+ .name = TYPE_IMX7_ANALOG,
452
+ .parent = TYPE_SYS_BUS_DEVICE,
453
+ .instance_size = sizeof(IMX7AnalogState),
454
+ .instance_init = imx7_analog_init,
455
+ .class_init = imx7_analog_class_init,
456
+};
457
+
458
+static void imx7_ccm_register_type(void)
459
+{
460
+ type_register_static(&imx7_ccm_info);
461
+ type_register_static(&imx7_analog_info);
462
+}
463
+type_init(imx7_ccm_register_type)
464
--
817
--
465
2.16.1
818
2.25.1
466
467
diff view generated by jsdifflib
1
Currently armv7m_nvic_acknowledge_irq() does three things:
1
From: Richard Henderson <richard.henderson@linaro.org>
2
* make the current highest priority pending interrupt active
3
* return a bool indicating whether that interrupt is targeting
4
Secure or NonSecure state
5
* implicitly tell the caller which is the highest priority
6
pending interrupt by setting env->v7m.exception
7
2
8
We need to split these jobs, because v7m_exception_taken()
3
Add a TCGv_ptr base argument, which will be cpu_env for SVE.
9
needs to know whether the pending interrupt targets Secure so
4
We will reuse this for SME save and restore array insns.
10
it can choose to stack callee-saves registers or not, but it
11
must not make the interrupt active until after it has done
12
that stacking, in case the stacking causes a derived exception.
13
Similarly, it needs to know the number of the pending interrupt
14
so it can read the correct vector table entry before the
15
interrupt is made active, because vector table reads might
16
also cause a derived exception.
17
5
18
Create a new armv7m_nvic_get_pending_irq_info() function which simply
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
19
returns information about the highest priority pending interrupt, and
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
20
use it to rearrange the v7m_exception_taken() code so we don't
8
Message-id: 20220708151540.18136-22-richard.henderson@linaro.org
21
acknowledge the exception until we've done all the things which could
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
22
possibly cause a derived exception.
10
---
11
target/arm/translate-a64.h | 3 +++
12
target/arm/translate-sve.c | 48 ++++++++++++++++++++++++++++----------
13
2 files changed, 39 insertions(+), 12 deletions(-)
23
14
24
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
15
diff --git a/target/arm/translate-a64.h b/target/arm/translate-a64.h
25
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
26
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
27
Message-id: 1517324542-6607-3-git-send-email-peter.maydell@linaro.org
28
---
29
target/arm/cpu.h | 19 ++++++++++++++++---
30
hw/intc/armv7m_nvic.c | 30 +++++++++++++++++++++++-------
31
target/arm/helper.c | 16 ++++++++++++----
32
hw/intc/trace-events | 3 ++-
33
4 files changed, 53 insertions(+), 15 deletions(-)
34
35
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
36
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
37
--- a/target/arm/cpu.h
17
--- a/target/arm/translate-a64.h
38
+++ b/target/arm/cpu.h
18
+++ b/target/arm/translate-a64.h
39
@@ -XXX,XX +XXX,XX @@ void armv7m_nvic_set_pending(void *opaque, int irq, bool secure);
19
@@ -XXX,XX +XXX,XX @@ void gen_gvec_xar(unsigned vece, uint32_t rd_ofs, uint32_t rn_ofs,
40
* a different exception).
20
uint32_t rm_ofs, int64_t shift,
21
uint32_t opr_sz, uint32_t max_sz);
22
23
+void gen_sve_ldr(DisasContext *s, TCGv_ptr, int vofs, int len, int rn, int imm);
24
+void gen_sve_str(DisasContext *s, TCGv_ptr, int vofs, int len, int rn, int imm);
25
+
26
#endif /* TARGET_ARM_TRANSLATE_A64_H */
27
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
28
index XXXXXXX..XXXXXXX 100644
29
--- a/target/arm/translate-sve.c
30
+++ b/target/arm/translate-sve.c
31
@@ -XXX,XX +XXX,XX @@ TRANS_FEAT(UCVTF_dd, aa64_sve, gen_gvec_fpst_arg_zpz,
32
* The load should begin at the address Rn + IMM.
41
*/
33
*/
42
void armv7m_nvic_set_pending_derived(void *opaque, int irq, bool secure);
34
43
+/**
35
-static void do_ldr(DisasContext *s, uint32_t vofs, int len, int rn, int imm)
44
+ * armv7m_nvic_get_pending_irq_info: return highest priority pending
36
+void gen_sve_ldr(DisasContext *s, TCGv_ptr base, int vofs,
45
+ * exception, and whether it targets Secure state
37
+ int len, int rn, int imm)
46
+ * @opaque: the NVIC
47
+ * @pirq: set to pending exception number
48
+ * @ptargets_secure: set to whether pending exception targets Secure
49
+ *
50
+ * This function writes the number of the highest priority pending
51
+ * exception (the one which would be made active by
52
+ * armv7m_nvic_acknowledge_irq()) to @pirq, and sets @ptargets_secure
53
+ * to true if the current highest priority pending exception should
54
+ * be taken to Secure state, false for NS.
55
+ */
56
+void armv7m_nvic_get_pending_irq_info(void *opaque, int *pirq,
57
+ bool *ptargets_secure);
58
/**
59
* armv7m_nvic_acknowledge_irq: make highest priority pending exception active
60
* @opaque: the NVIC
61
@@ -XXX,XX +XXX,XX @@ void armv7m_nvic_set_pending_derived(void *opaque, int irq, bool secure);
62
* Move the current highest priority pending exception from the pending
63
* state to the active state, and update v7m.exception to indicate that
64
* it is the exception currently being handled.
65
- *
66
- * Returns: true if exception should be taken to Secure state, false for NS
67
*/
68
-bool armv7m_nvic_acknowledge_irq(void *opaque);
69
+void armv7m_nvic_acknowledge_irq(void *opaque);
70
/**
71
* armv7m_nvic_complete_irq: complete specified interrupt or exception
72
* @opaque: the NVIC
73
diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c
74
index XXXXXXX..XXXXXXX 100644
75
--- a/hw/intc/armv7m_nvic.c
76
+++ b/hw/intc/armv7m_nvic.c
77
@@ -XXX,XX +XXX,XX @@ void armv7m_nvic_set_pending_derived(void *opaque, int irq, bool secure)
78
}
79
80
/* Make pending IRQ active. */
81
-bool armv7m_nvic_acknowledge_irq(void *opaque)
82
+void armv7m_nvic_acknowledge_irq(void *opaque)
83
{
38
{
84
NVICState *s = (NVICState *)opaque;
39
int len_align = QEMU_ALIGN_DOWN(len, 8);
85
CPUARMState *env = &s->cpu->env;
40
int len_remain = len % 8;
86
const int pending = s->vectpending;
41
@@ -XXX,XX +XXX,XX @@ static void do_ldr(DisasContext *s, uint32_t vofs, int len, int rn, int imm)
87
const int running = nvic_exec_prio(s);
42
t0 = tcg_temp_new_i64();
88
VecInfo *vec;
43
for (i = 0; i < len_align; i += 8) {
89
- bool targets_secure;
44
tcg_gen_qemu_ld_i64(t0, clean_addr, midx, MO_LEUQ);
90
45
- tcg_gen_st_i64(t0, cpu_env, vofs + i);
91
assert(pending > ARMV7M_EXCP_RESET && pending < s->num_irq);
46
+ tcg_gen_st_i64(t0, base, vofs + i);
92
47
tcg_gen_addi_i64(clean_addr, clean_addr, 8);
93
if (s->vectpending_is_s_banked) {
48
}
94
vec = &s->sec_vectors[pending];
49
tcg_temp_free_i64(t0);
95
- targets_secure = true;
50
@@ -XXX,XX +XXX,XX @@ static void do_ldr(DisasContext *s, uint32_t vofs, int len, int rn, int imm)
96
} else {
51
clean_addr = new_tmp_a64_local(s);
97
vec = &s->vectors[pending];
52
tcg_gen_mov_i64(clean_addr, t0);
98
- targets_secure = !exc_is_banked(s->vectpending) &&
53
99
- exc_targets_secure(s, s->vectpending);
54
+ if (base != cpu_env) {
55
+ TCGv_ptr b = tcg_temp_local_new_ptr();
56
+ tcg_gen_mov_ptr(b, base);
57
+ base = b;
58
+ }
59
+
60
gen_set_label(loop);
61
62
t0 = tcg_temp_new_i64();
63
@@ -XXX,XX +XXX,XX @@ static void do_ldr(DisasContext *s, uint32_t vofs, int len, int rn, int imm)
64
tcg_gen_addi_i64(clean_addr, clean_addr, 8);
65
66
tp = tcg_temp_new_ptr();
67
- tcg_gen_add_ptr(tp, cpu_env, i);
68
+ tcg_gen_add_ptr(tp, base, i);
69
tcg_gen_addi_ptr(i, i, 8);
70
tcg_gen_st_i64(t0, tp, vofs);
71
tcg_temp_free_ptr(tp);
72
@@ -XXX,XX +XXX,XX @@ static void do_ldr(DisasContext *s, uint32_t vofs, int len, int rn, int imm)
73
74
tcg_gen_brcondi_ptr(TCG_COND_LTU, i, len_align, loop);
75
tcg_temp_free_ptr(i);
76
+
77
+ if (base != cpu_env) {
78
+ tcg_temp_free_ptr(base);
79
+ assert(len_remain == 0);
80
+ }
100
}
81
}
101
82
102
assert(vec->enabled);
83
/*
103
@@ -XXX,XX +XXX,XX @@ bool armv7m_nvic_acknowledge_irq(void *opaque)
84
@@ -XXX,XX +XXX,XX @@ static void do_ldr(DisasContext *s, uint32_t vofs, int len, int rn, int imm)
104
85
default:
105
assert(s->vectpending_prio < running);
86
g_assert_not_reached();
106
87
}
107
- trace_nvic_acknowledge_irq(pending, s->vectpending_prio, targets_secure);
88
- tcg_gen_st_i64(t0, cpu_env, vofs + len_align);
108
+ trace_nvic_acknowledge_irq(pending, s->vectpending_prio);
89
+ tcg_gen_st_i64(t0, base, vofs + len_align);
109
90
tcg_temp_free_i64(t0);
110
vec->active = 1;
111
vec->pending = 0;
112
@@ -XXX,XX +XXX,XX @@ bool armv7m_nvic_acknowledge_irq(void *opaque)
113
write_v7m_exception(env, s->vectpending);
114
115
nvic_irq_update(s);
116
+}
117
+
118
+void armv7m_nvic_get_pending_irq_info(void *opaque,
119
+ int *pirq, bool *ptargets_secure)
120
+{
121
+ NVICState *s = (NVICState *)opaque;
122
+ const int pending = s->vectpending;
123
+ bool targets_secure;
124
+
125
+ assert(pending > ARMV7M_EXCP_RESET && pending < s->num_irq);
126
+
127
+ if (s->vectpending_is_s_banked) {
128
+ targets_secure = true;
129
+ } else {
130
+ targets_secure = !exc_is_banked(pending) &&
131
+ exc_targets_secure(s, pending);
132
+ }
133
+
134
+ trace_nvic_get_pending_irq_info(pending, targets_secure);
135
136
- return targets_secure;
137
+ *ptargets_secure = targets_secure;
138
+ *pirq = pending;
139
}
140
141
int armv7m_nvic_complete_irq(void *opaque, int irq, bool secure)
142
diff --git a/target/arm/helper.c b/target/arm/helper.c
143
index XXXXXXX..XXXXXXX 100644
144
--- a/target/arm/helper.c
145
+++ b/target/arm/helper.c
146
@@ -XXX,XX +XXX,XX @@ static uint32_t *get_v7m_sp_ptr(CPUARMState *env, bool secure, bool threadmode,
147
}
91
}
148
}
92
}
149
93
150
-static uint32_t arm_v7m_load_vector(ARMCPU *cpu, bool targets_secure)
94
/* Similarly for stores. */
151
+static uint32_t arm_v7m_load_vector(ARMCPU *cpu, int exc, bool targets_secure)
95
-static void do_str(DisasContext *s, uint32_t vofs, int len, int rn, int imm)
96
+void gen_sve_str(DisasContext *s, TCGv_ptr base, int vofs,
97
+ int len, int rn, int imm)
152
{
98
{
153
CPUState *cs = CPU(cpu);
99
int len_align = QEMU_ALIGN_DOWN(len, 8);
154
CPUARMState *env = &cpu->env;
100
int len_remain = len % 8;
155
MemTxResult result;
101
@@ -XXX,XX +XXX,XX @@ static void do_str(DisasContext *s, uint32_t vofs, int len, int rn, int imm)
156
- hwaddr vec = env->v7m.vecbase[targets_secure] + env->v7m.exception * 4;
102
157
+ hwaddr vec = env->v7m.vecbase[targets_secure] + exc * 4;
103
t0 = tcg_temp_new_i64();
158
uint32_t addr;
104
for (i = 0; i < len_align; i += 8) {
159
105
- tcg_gen_ld_i64(t0, cpu_env, vofs + i);
160
addr = address_space_ldl(cs->as, vec,
106
+ tcg_gen_ld_i64(t0, base, vofs + i);
161
@@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain)
107
tcg_gen_qemu_st_i64(t0, clean_addr, midx, MO_LEUQ);
162
CPUARMState *env = &cpu->env;
108
tcg_gen_addi_i64(clean_addr, clean_addr, 8);
163
uint32_t addr;
164
bool targets_secure;
165
+ int exc;
166
167
- targets_secure = armv7m_nvic_acknowledge_irq(env->nvic);
168
+ armv7m_nvic_get_pending_irq_info(env->nvic, &exc, &targets_secure);
169
170
if (arm_feature(env, ARM_FEATURE_V8)) {
171
if (arm_feature(env, ARM_FEATURE_M_SECURITY) &&
172
@@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain)
173
}
109
}
110
@@ -XXX,XX +XXX,XX @@ static void do_str(DisasContext *s, uint32_t vofs, int len, int rn, int imm)
111
clean_addr = new_tmp_a64_local(s);
112
tcg_gen_mov_i64(clean_addr, t0);
113
114
+ if (base != cpu_env) {
115
+ TCGv_ptr b = tcg_temp_local_new_ptr();
116
+ tcg_gen_mov_ptr(b, base);
117
+ base = b;
118
+ }
119
+
120
gen_set_label(loop);
121
122
t0 = tcg_temp_new_i64();
123
tp = tcg_temp_new_ptr();
124
- tcg_gen_add_ptr(tp, cpu_env, i);
125
+ tcg_gen_add_ptr(tp, base, i);
126
tcg_gen_ld_i64(t0, tp, vofs);
127
tcg_gen_addi_ptr(i, i, 8);
128
tcg_temp_free_ptr(tp);
129
@@ -XXX,XX +XXX,XX @@ static void do_str(DisasContext *s, uint32_t vofs, int len, int rn, int imm)
130
131
tcg_gen_brcondi_ptr(TCG_COND_LTU, i, len_align, loop);
132
tcg_temp_free_ptr(i);
133
+
134
+ if (base != cpu_env) {
135
+ tcg_temp_free_ptr(base);
136
+ assert(len_remain == 0);
137
+ }
174
}
138
}
175
139
176
+ addr = arm_v7m_load_vector(cpu, exc, targets_secure);
140
/* Predicate register stores can be any multiple of 2. */
177
+
141
if (len_remain) {
178
+ /* Now we've done everything that might cause a derived exception
142
t0 = tcg_temp_new_i64();
179
+ * we can go ahead and activate whichever exception we're going to
143
- tcg_gen_ld_i64(t0, cpu_env, vofs + len_align);
180
+ * take (which might now be the derived exception).
144
+ tcg_gen_ld_i64(t0, base, vofs + len_align);
181
+ */
145
182
+ armv7m_nvic_acknowledge_irq(env->nvic);
146
switch (len_remain) {
183
+
147
case 2:
184
/* Switch to target security state -- must do this before writing SPSEL */
148
@@ -XXX,XX +XXX,XX @@ static bool trans_LDR_zri(DisasContext *s, arg_rri *a)
185
switch_v7m_security_state(env, targets_secure);
149
if (sve_access_check(s)) {
186
write_v7m_control_spsel(env, 0);
150
int size = vec_full_reg_size(s);
187
@@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain)
151
int off = vec_full_reg_offset(s, a->rd);
188
/* Clear IT bits */
152
- do_ldr(s, off, size, a->rn, a->imm * size);
189
env->condexec_bits = 0;
153
+ gen_sve_ldr(s, cpu_env, off, size, a->rn, a->imm * size);
190
env->regs[14] = lr;
154
}
191
- addr = arm_v7m_load_vector(cpu, targets_secure);
155
return true;
192
env->regs[15] = addr & 0xfffffffe;
193
env->thumb = addr & 1;
194
}
156
}
195
diff --git a/hw/intc/trace-events b/hw/intc/trace-events
157
@@ -XXX,XX +XXX,XX @@ static bool trans_LDR_pri(DisasContext *s, arg_rri *a)
196
index XXXXXXX..XXXXXXX 100644
158
if (sve_access_check(s)) {
197
--- a/hw/intc/trace-events
159
int size = pred_full_reg_size(s);
198
+++ b/hw/intc/trace-events
160
int off = pred_full_reg_offset(s, a->rd);
199
@@ -XXX,XX +XXX,XX @@ nvic_escalate_disabled(int irq) "NVIC escalating irq %d to HardFault: disabled"
161
- do_ldr(s, off, size, a->rn, a->imm * size);
200
nvic_set_pending(int irq, bool secure, bool derived, int en, int prio) "NVIC set pending irq %d secure-bank %d derived %d (enabled: %d priority %d)"
162
+ gen_sve_ldr(s, cpu_env, off, size, a->rn, a->imm * size);
201
nvic_clear_pending(int irq, bool secure, int en, int prio) "NVIC clear pending irq %d secure-bank %d (enabled: %d priority %d)"
163
}
202
nvic_set_pending_level(int irq) "NVIC set pending: irq %d higher prio than vectpending: setting irq line to 1"
164
return true;
203
-nvic_acknowledge_irq(int irq, int prio, bool targets_secure) "NVIC acknowledge IRQ: %d now active (prio %d targets_secure %d)"
165
}
204
+nvic_acknowledge_irq(int irq, int prio) "NVIC acknowledge IRQ: %d now active (prio %d)"
166
@@ -XXX,XX +XXX,XX @@ static bool trans_STR_zri(DisasContext *s, arg_rri *a)
205
+nvic_get_pending_irq_info(int irq, bool secure) "NVIC next IRQ %d: targets_secure: %d"
167
if (sve_access_check(s)) {
206
nvic_complete_irq(int irq, bool secure) "NVIC complete IRQ %d (secure %d)"
168
int size = vec_full_reg_size(s);
207
nvic_set_irq_level(int irq, int level) "NVIC external irq %d level set to %d"
169
int off = vec_full_reg_offset(s, a->rd);
208
nvic_sysreg_read(uint64_t addr, uint32_t value, unsigned size) "NVIC sysreg read addr 0x%" PRIx64 " data 0x%" PRIx32 " size %u"
170
- do_str(s, off, size, a->rn, a->imm * size);
171
+ gen_sve_str(s, cpu_env, off, size, a->rn, a->imm * size);
172
}
173
return true;
174
}
175
@@ -XXX,XX +XXX,XX @@ static bool trans_STR_pri(DisasContext *s, arg_rri *a)
176
if (sve_access_check(s)) {
177
int size = pred_full_reg_size(s);
178
int off = pred_full_reg_offset(s, a->rd);
179
- do_str(s, off, size, a->rn, a->imm * size);
180
+ gen_sve_str(s, cpu_env, off, size, a->rn, a->imm * size);
181
}
182
return true;
183
}
209
--
184
--
210
2.16.1
185
2.25.1
211
212
diff view generated by jsdifflib
1
From: Ard Biesheuvel <ard.biesheuvel@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
This implements emulation of the new SM4 instructions that have
3
We can reuse the SVE functions for LDR and STR, passing in the
4
been added as an optional extension to the ARMv8 Crypto Extensions
4
base of the ZA vector and a zero offset.
5
in ARM v8.2.
6
5
7
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
8
Message-id: 20180207111729.15737-5-ard.biesheuvel@linaro.org
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220708151540.18136-23-richard.henderson@linaro.org
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
10
---
12
target/arm/cpu.h | 1 +
11
target/arm/sme.decode | 7 +++++++
13
target/arm/helper.h | 3 ++
12
target/arm/translate-sme.c | 24 ++++++++++++++++++++++++
14
target/arm/crypto_helper.c | 91 ++++++++++++++++++++++++++++++++++++++++++++++
13
2 files changed, 31 insertions(+)
15
target/arm/translate-a64.c | 8 ++++
16
4 files changed, 103 insertions(+)
17
14
18
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
15
diff --git a/target/arm/sme.decode b/target/arm/sme.decode
19
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
20
--- a/target/arm/cpu.h
17
--- a/target/arm/sme.decode
21
+++ b/target/arm/cpu.h
18
+++ b/target/arm/sme.decode
22
@@ -XXX,XX +XXX,XX @@ enum arm_features {
19
@@ -XXX,XX +XXX,XX @@ LDST1 1110000 0 esz:2 st:1 rm:5 v:1 .. pg:3 rn:5 0 za_imm:4 \
23
ARM_FEATURE_V8_SHA512, /* implements SHA512 part of v8 Crypto Extensions */
20
&ldst rs=%mova_rs
24
ARM_FEATURE_V8_SHA3, /* implements SHA3 part of v8 Crypto Extensions */
21
LDST1 1110000 111 st:1 rm:5 v:1 .. pg:3 rn:5 0 za_imm:4 \
25
ARM_FEATURE_V8_SM3, /* implements SM3 part of v8 Crypto Extensions */
22
&ldst esz=4 rs=%mova_rs
26
+ ARM_FEATURE_V8_SM4, /* implements SM4 part of v8 Crypto Extensions */
23
+
27
};
24
+&ldstr rv rn imm
28
25
+@ldstr ....... ... . ...... .. ... rn:5 . imm:4 \
29
static inline int arm_feature(CPUARMState *env, int feature)
26
+ &ldstr rv=%mova_rs
30
diff --git a/target/arm/helper.h b/target/arm/helper.h
27
+
28
+LDR 1110000 100 0 000000 .. 000 ..... 0 .... @ldstr
29
+STR 1110000 100 1 000000 .. 000 ..... 0 .... @ldstr
30
diff --git a/target/arm/translate-sme.c b/target/arm/translate-sme.c
31
index XXXXXXX..XXXXXXX 100644
31
index XXXXXXX..XXXXXXX 100644
32
--- a/target/arm/helper.h
32
--- a/target/arm/translate-sme.c
33
+++ b/target/arm/helper.h
33
+++ b/target/arm/translate-sme.c
34
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_5(crypto_sm3tt, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32, i32)
34
@@ -XXX,XX +XXX,XX @@ static bool trans_LDST1(DisasContext *s, arg_LDST1 *a)
35
DEF_HELPER_FLAGS_3(crypto_sm3partw1, TCG_CALL_NO_RWG, void, ptr, ptr, ptr)
35
tcg_temp_free_i64(addr);
36
DEF_HELPER_FLAGS_3(crypto_sm3partw2, TCG_CALL_NO_RWG, void, ptr, ptr, ptr)
36
return true;
37
38
+DEF_HELPER_FLAGS_2(crypto_sm4e, TCG_CALL_NO_RWG, void, ptr, ptr)
39
+DEF_HELPER_FLAGS_3(crypto_sm4ekey, TCG_CALL_NO_RWG, void, ptr, ptr, ptr)
40
+
41
DEF_HELPER_FLAGS_3(crc32, TCG_CALL_NO_RWG_SE, i32, i32, i32, i32)
42
DEF_HELPER_FLAGS_3(crc32c, TCG_CALL_NO_RWG_SE, i32, i32, i32, i32)
43
DEF_HELPER_2(dc_zva, void, env, i64)
44
diff --git a/target/arm/crypto_helper.c b/target/arm/crypto_helper.c
45
index XXXXXXX..XXXXXXX 100644
46
--- a/target/arm/crypto_helper.c
47
+++ b/target/arm/crypto_helper.c
48
@@ -XXX,XX +XXX,XX @@ void HELPER(crypto_sm3tt)(void *vd, void *vn, void *vm, uint32_t imm2,
49
rd[0] = d.l[0];
50
rd[1] = d.l[1];
51
}
37
}
52
+
38
+
53
+static uint8_t const sm4_sbox[] = {
39
+typedef void GenLdStR(DisasContext *, TCGv_ptr, int, int, int, int);
54
+ 0xd6, 0x90, 0xe9, 0xfe, 0xcc, 0xe1, 0x3d, 0xb7,
55
+ 0x16, 0xb6, 0x14, 0xc2, 0x28, 0xfb, 0x2c, 0x05,
56
+ 0x2b, 0x67, 0x9a, 0x76, 0x2a, 0xbe, 0x04, 0xc3,
57
+ 0xaa, 0x44, 0x13, 0x26, 0x49, 0x86, 0x06, 0x99,
58
+ 0x9c, 0x42, 0x50, 0xf4, 0x91, 0xef, 0x98, 0x7a,
59
+ 0x33, 0x54, 0x0b, 0x43, 0xed, 0xcf, 0xac, 0x62,
60
+ 0xe4, 0xb3, 0x1c, 0xa9, 0xc9, 0x08, 0xe8, 0x95,
61
+ 0x80, 0xdf, 0x94, 0xfa, 0x75, 0x8f, 0x3f, 0xa6,
62
+ 0x47, 0x07, 0xa7, 0xfc, 0xf3, 0x73, 0x17, 0xba,
63
+ 0x83, 0x59, 0x3c, 0x19, 0xe6, 0x85, 0x4f, 0xa8,
64
+ 0x68, 0x6b, 0x81, 0xb2, 0x71, 0x64, 0xda, 0x8b,
65
+ 0xf8, 0xeb, 0x0f, 0x4b, 0x70, 0x56, 0x9d, 0x35,
66
+ 0x1e, 0x24, 0x0e, 0x5e, 0x63, 0x58, 0xd1, 0xa2,
67
+ 0x25, 0x22, 0x7c, 0x3b, 0x01, 0x21, 0x78, 0x87,
68
+ 0xd4, 0x00, 0x46, 0x57, 0x9f, 0xd3, 0x27, 0x52,
69
+ 0x4c, 0x36, 0x02, 0xe7, 0xa0, 0xc4, 0xc8, 0x9e,
70
+ 0xea, 0xbf, 0x8a, 0xd2, 0x40, 0xc7, 0x38, 0xb5,
71
+ 0xa3, 0xf7, 0xf2, 0xce, 0xf9, 0x61, 0x15, 0xa1,
72
+ 0xe0, 0xae, 0x5d, 0xa4, 0x9b, 0x34, 0x1a, 0x55,
73
+ 0xad, 0x93, 0x32, 0x30, 0xf5, 0x8c, 0xb1, 0xe3,
74
+ 0x1d, 0xf6, 0xe2, 0x2e, 0x82, 0x66, 0xca, 0x60,
75
+ 0xc0, 0x29, 0x23, 0xab, 0x0d, 0x53, 0x4e, 0x6f,
76
+ 0xd5, 0xdb, 0x37, 0x45, 0xde, 0xfd, 0x8e, 0x2f,
77
+ 0x03, 0xff, 0x6a, 0x72, 0x6d, 0x6c, 0x5b, 0x51,
78
+ 0x8d, 0x1b, 0xaf, 0x92, 0xbb, 0xdd, 0xbc, 0x7f,
79
+ 0x11, 0xd9, 0x5c, 0x41, 0x1f, 0x10, 0x5a, 0xd8,
80
+ 0x0a, 0xc1, 0x31, 0x88, 0xa5, 0xcd, 0x7b, 0xbd,
81
+ 0x2d, 0x74, 0xd0, 0x12, 0xb8, 0xe5, 0xb4, 0xb0,
82
+ 0x89, 0x69, 0x97, 0x4a, 0x0c, 0x96, 0x77, 0x7e,
83
+ 0x65, 0xb9, 0xf1, 0x09, 0xc5, 0x6e, 0xc6, 0x84,
84
+ 0x18, 0xf0, 0x7d, 0xec, 0x3a, 0xdc, 0x4d, 0x20,
85
+ 0x79, 0xee, 0x5f, 0x3e, 0xd7, 0xcb, 0x39, 0x48,
86
+};
87
+
40
+
88
+void HELPER(crypto_sm4e)(void *vd, void *vn)
41
+static bool do_ldst_r(DisasContext *s, arg_ldstr *a, GenLdStR *fn)
89
+{
42
+{
90
+ uint64_t *rd = vd;
43
+ int svl = streaming_vec_reg_size(s);
91
+ uint64_t *rn = vn;
44
+ int imm = a->imm;
92
+ union CRYPTO_STATE d = { .l = { rd[0], rd[1] } };
45
+ TCGv_ptr base;
93
+ union CRYPTO_STATE n = { .l = { rn[0], rn[1] } };
94
+ uint32_t t, i;
95
+
46
+
96
+ for (i = 0; i < 4; i++) {
47
+ if (!sme_za_enabled_check(s)) {
97
+ t = CR_ST_WORD(d, (i + 1) % 4) ^
48
+ return true;
98
+ CR_ST_WORD(d, (i + 2) % 4) ^
99
+ CR_ST_WORD(d, (i + 3) % 4) ^
100
+ CR_ST_WORD(n, i);
101
+
102
+ t = sm4_sbox[t & 0xff] |
103
+ sm4_sbox[(t >> 8) & 0xff] << 8 |
104
+ sm4_sbox[(t >> 16) & 0xff] << 16 |
105
+ sm4_sbox[(t >> 24) & 0xff] << 24;
106
+
107
+ CR_ST_WORD(d, i) ^= t ^ rol32(t, 2) ^ rol32(t, 10) ^ rol32(t, 18) ^
108
+ rol32(t, 24);
109
+ }
49
+ }
110
+
50
+
111
+ rd[0] = d.l[0];
51
+ /* ZA[n] equates to ZA0H.B[n]. */
112
+ rd[1] = d.l[1];
52
+ base = get_tile_rowcol(s, MO_8, a->rv, imm, false);
53
+
54
+ fn(s, base, 0, svl, a->rn, imm * svl);
55
+
56
+ tcg_temp_free_ptr(base);
57
+ return true;
113
+}
58
+}
114
+
59
+
115
+void HELPER(crypto_sm4ekey)(void *vd, void *vn, void* vm)
60
+TRANS_FEAT(LDR, aa64_sme, do_ldst_r, a, gen_sve_ldr)
116
+{
61
+TRANS_FEAT(STR, aa64_sme, do_ldst_r, a, gen_sve_str)
117
+ uint64_t *rd = vd;
118
+ uint64_t *rn = vn;
119
+ uint64_t *rm = vm;
120
+ union CRYPTO_STATE d;
121
+ union CRYPTO_STATE n = { .l = { rn[0], rn[1] } };
122
+ union CRYPTO_STATE m = { .l = { rm[0], rm[1] } };
123
+ uint32_t t, i;
124
+
125
+ d = n;
126
+ for (i = 0; i < 4; i++) {
127
+ t = CR_ST_WORD(d, (i + 1) % 4) ^
128
+ CR_ST_WORD(d, (i + 2) % 4) ^
129
+ CR_ST_WORD(d, (i + 3) % 4) ^
130
+ CR_ST_WORD(m, i);
131
+
132
+ t = sm4_sbox[t & 0xff] |
133
+ sm4_sbox[(t >> 8) & 0xff] << 8 |
134
+ sm4_sbox[(t >> 16) & 0xff] << 16 |
135
+ sm4_sbox[(t >> 24) & 0xff] << 24;
136
+
137
+ CR_ST_WORD(d, i) ^= t ^ rol32(t, 13) ^ rol32(t, 23);
138
+ }
139
+
140
+ rd[0] = d.l[0];
141
+ rd[1] = d.l[1];
142
+}
143
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
144
index XXXXXXX..XXXXXXX 100644
145
--- a/target/arm/translate-a64.c
146
+++ b/target/arm/translate-a64.c
147
@@ -XXX,XX +XXX,XX @@ static void disas_crypto_three_reg_sha512(DisasContext *s, uint32_t insn)
148
feature = ARM_FEATURE_V8_SM3;
149
genfn = gen_helper_crypto_sm3partw2;
150
break;
151
+ case 2: /* SM4EKEY */
152
+ feature = ARM_FEATURE_V8_SM4;
153
+ genfn = gen_helper_crypto_sm4ekey;
154
+ break;
155
default:
156
unallocated_encoding(s);
157
return;
158
@@ -XXX,XX +XXX,XX @@ static void disas_crypto_two_reg_sha512(DisasContext *s, uint32_t insn)
159
feature = ARM_FEATURE_V8_SHA512;
160
genfn = gen_helper_crypto_sha512su0;
161
break;
162
+ case 1: /* SM4E */
163
+ feature = ARM_FEATURE_V8_SM4;
164
+ genfn = gen_helper_crypto_sm4e;
165
+ break;
166
default:
167
unallocated_encoding(s);
168
return;
169
--
62
--
170
2.16.1
63
2.25.1
171
172
diff view generated by jsdifflib
1
From: Andrey Smirnov <andrew.smirnov@gmail.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Add code to emulate SNVS IP-block. Currently only the bits needed to
4
be able to emulate machine shutdown are implemented.
5
6
Cc: Peter Maydell <peter.maydell@linaro.org>
7
Cc: Jason Wang <jasowang@redhat.com>
8
Cc: Philippe Mathieu-Daudé <f4bug@amsat.org>
9
Cc: Marcel Apfelbaum <marcel.apfelbaum@zoho.com>
10
Cc: Michael S. Tsirkin <mst@redhat.com>
11
Cc: qemu-devel@nongnu.org
12
Cc: qemu-arm@nongnu.org
13
Cc: yurovsky@gmail.com
14
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
3
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
15
Signed-off-by: Andrey Smirnov <andrew.smirnov@gmail.com>
4
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
5
Message-id: 20220708151540.18136-24-richard.henderson@linaro.org
16
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
---
7
---
18
hw/misc/Makefile.objs | 1 +
8
target/arm/helper-sme.h | 5 +++
19
include/hw/misc/imx7_snvs.h | 35 +++++++++++++++++++
9
target/arm/sme.decode | 11 +++++
20
hw/misc/imx7_snvs.c | 83 +++++++++++++++++++++++++++++++++++++++++++++
10
target/arm/sme_helper.c | 90 ++++++++++++++++++++++++++++++++++++++
21
3 files changed, 119 insertions(+)
11
target/arm/translate-sme.c | 31 +++++++++++++
22
create mode 100644 include/hw/misc/imx7_snvs.h
12
4 files changed, 137 insertions(+)
23
create mode 100644 hw/misc/imx7_snvs.c
24
13
25
diff --git a/hw/misc/Makefile.objs b/hw/misc/Makefile.objs
14
diff --git a/target/arm/helper-sme.h b/target/arm/helper-sme.h
26
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
27
--- a/hw/misc/Makefile.objs
16
--- a/target/arm/helper-sme.h
28
+++ b/hw/misc/Makefile.objs
17
+++ b/target/arm/helper-sme.h
29
@@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_IMX) += imx6_ccm.o
18
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_5(sme_st1q_be_h_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i
30
obj-$(CONFIG_IMX) += imx6_src.o
19
DEF_HELPER_FLAGS_5(sme_st1q_le_h_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
31
obj-$(CONFIG_IMX) += imx7_ccm.o
20
DEF_HELPER_FLAGS_5(sme_st1q_be_v_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
32
obj-$(CONFIG_IMX) += imx2_wdt.o
21
DEF_HELPER_FLAGS_5(sme_st1q_le_v_mte, TCG_CALL_NO_WG, void, env, ptr, ptr, tl, i32)
33
+obj-$(CONFIG_IMX) += imx7_snvs.o
34
obj-$(CONFIG_MILKYMIST) += milkymist-hpdmc.o
35
obj-$(CONFIG_MILKYMIST) += milkymist-pfpu.o
36
obj-$(CONFIG_MAINSTONE) += mst_fpga.o
37
diff --git a/include/hw/misc/imx7_snvs.h b/include/hw/misc/imx7_snvs.h
38
new file mode 100644
39
index XXXXXXX..XXXXXXX
40
--- /dev/null
41
+++ b/include/hw/misc/imx7_snvs.h
42
@@ -XXX,XX +XXX,XX @@
43
+/*
44
+ * Copyright (c) 2017, Impinj, Inc.
45
+ *
46
+ * i.MX7 SNVS block emulation code
47
+ *
48
+ * Author: Andrey Smirnov <andrew.smirnov@gmail.com>
49
+ *
50
+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
51
+ * See the COPYING file in the top-level directory.
52
+ */
53
+
22
+
54
+#ifndef IMX7_SNVS_H
23
+DEF_HELPER_FLAGS_5(sme_addha_s, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, ptr, i32)
55
+#define IMX7_SNVS_H
24
+DEF_HELPER_FLAGS_5(sme_addva_s, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, ptr, i32)
25
+DEF_HELPER_FLAGS_5(sme_addha_d, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, ptr, i32)
26
+DEF_HELPER_FLAGS_5(sme_addva_d, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, ptr, i32)
27
diff --git a/target/arm/sme.decode b/target/arm/sme.decode
28
index XXXXXXX..XXXXXXX 100644
29
--- a/target/arm/sme.decode
30
+++ b/target/arm/sme.decode
31
@@ -XXX,XX +XXX,XX @@ LDST1 1110000 111 st:1 rm:5 v:1 .. pg:3 rn:5 0 za_imm:4 \
32
33
LDR 1110000 100 0 000000 .. 000 ..... 0 .... @ldstr
34
STR 1110000 100 1 000000 .. 000 ..... 0 .... @ldstr
56
+
35
+
57
+#include "qemu/bitops.h"
36
+### SME Add Vector to Array
58
+#include "hw/sysbus.h"
59
+
37
+
38
+&adda zad zn pm pn
39
+@adda_32 ........ .. ..... . pm:3 pn:3 zn:5 ... zad:2 &adda
40
+@adda_64 ........ .. ..... . pm:3 pn:3 zn:5 .. zad:3 &adda
60
+
41
+
61
+enum IMX7SNVSRegisters {
42
+ADDHA_s 11000000 10 01000 0 ... ... ..... 000 .. @adda_32
62
+ SNVS_LPCR = 0x38,
43
+ADDVA_s 11000000 10 01000 1 ... ... ..... 000 .. @adda_32
63
+ SNVS_LPCR_TOP = BIT(6),
44
+ADDHA_d 11000000 11 01000 0 ... ... ..... 00 ... @adda_64
64
+ SNVS_LPCR_DP_EN = BIT(5)
45
+ADDVA_d 11000000 11 01000 1 ... ... ..... 00 ... @adda_64
65
+};
46
diff --git a/target/arm/sme_helper.c b/target/arm/sme_helper.c
47
index XXXXXXX..XXXXXXX 100644
48
--- a/target/arm/sme_helper.c
49
+++ b/target/arm/sme_helper.c
50
@@ -XXX,XX +XXX,XX @@ DO_ST(q, _be, MO_128)
51
DO_ST(q, _le, MO_128)
52
53
#undef DO_ST
66
+
54
+
67
+#define TYPE_IMX7_SNVS "imx7.snvs"
55
+void HELPER(sme_addha_s)(void *vzda, void *vzn, void *vpn,
68
+#define IMX7_SNVS(obj) OBJECT_CHECK(IMX7SNVSState, (obj), TYPE_IMX7_SNVS)
56
+ void *vpm, uint32_t desc)
57
+{
58
+ intptr_t row, col, oprsz = simd_oprsz(desc) / 4;
59
+ uint64_t *pn = vpn, *pm = vpm;
60
+ uint32_t *zda = vzda, *zn = vzn;
69
+
61
+
70
+typedef struct IMX7SNVSState {
62
+ for (row = 0; row < oprsz; ) {
71
+ /* <private> */
63
+ uint64_t pa = pn[row >> 4];
72
+ SysBusDevice parent_obj;
64
+ do {
73
+
65
+ if (pa & 1) {
74
+ MemoryRegion mmio;
66
+ for (col = 0; col < oprsz; ) {
75
+} IMX7SNVSState;
67
+ uint64_t pb = pm[col >> 4];
76
+
68
+ do {
77
+#endif /* IMX7_SNVS_H */
69
+ if (pb & 1) {
78
diff --git a/hw/misc/imx7_snvs.c b/hw/misc/imx7_snvs.c
70
+ zda[tile_vslice_index(row) + H4(col)] += zn[H4(col)];
79
new file mode 100644
71
+ }
80
index XXXXXXX..XXXXXXX
72
+ pb >>= 4;
81
--- /dev/null
73
+ } while (++col & 15);
82
+++ b/hw/misc/imx7_snvs.c
74
+ }
83
@@ -XXX,XX +XXX,XX @@
75
+ }
84
+/*
76
+ pa >>= 4;
85
+ * IMX7 Secure Non-Volatile Storage
77
+ } while (++row & 15);
86
+ *
87
+ * Copyright (c) 2018, Impinj, Inc.
88
+ *
89
+ * Author: Andrey Smirnov <andrew.smirnov@gmail.com>
90
+ *
91
+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
92
+ * See the COPYING file in the top-level directory.
93
+ *
94
+ * Bare minimum emulation code needed to support being able to shut
95
+ * down linux guest gracefully.
96
+ */
97
+
98
+#include "qemu/osdep.h"
99
+#include "hw/misc/imx7_snvs.h"
100
+#include "qemu/log.h"
101
+#include "sysemu/sysemu.h"
102
+
103
+static uint64_t imx7_snvs_read(void *opaque, hwaddr offset, unsigned size)
104
+{
105
+ return 0;
106
+}
107
+
108
+static void imx7_snvs_write(void *opaque, hwaddr offset,
109
+ uint64_t v, unsigned size)
110
+{
111
+ const uint32_t value = v;
112
+ const uint32_t mask = SNVS_LPCR_TOP | SNVS_LPCR_DP_EN;
113
+
114
+ if (offset == SNVS_LPCR && ((value & mask) == mask)) {
115
+ qemu_system_shutdown_request(SHUTDOWN_CAUSE_GUEST_SHUTDOWN);
116
+ }
78
+ }
117
+}
79
+}
118
+
80
+
119
+static const struct MemoryRegionOps imx7_snvs_ops = {
81
+void HELPER(sme_addha_d)(void *vzda, void *vzn, void *vpn,
120
+ .read = imx7_snvs_read,
82
+ void *vpm, uint32_t desc)
121
+ .write = imx7_snvs_write,
83
+{
122
+ .endianness = DEVICE_NATIVE_ENDIAN,
84
+ intptr_t row, col, oprsz = simd_oprsz(desc) / 8;
123
+ .impl = {
85
+ uint8_t *pn = vpn, *pm = vpm;
124
+ /*
86
+ uint64_t *zda = vzda, *zn = vzn;
125
+ * Our device would not work correctly if the guest was doing
126
+ * unaligned access. This might not be a limitation on the real
127
+ * device but in practice there is no reason for a guest to access
128
+ * this device unaligned.
129
+ */
130
+ .min_access_size = 4,
131
+ .max_access_size = 4,
132
+ .unaligned = false,
133
+ },
134
+};
135
+
87
+
136
+static void imx7_snvs_init(Object *obj)
88
+ for (row = 0; row < oprsz; ++row) {
137
+{
89
+ if (pn[H1(row)] & 1) {
138
+ SysBusDevice *sd = SYS_BUS_DEVICE(obj);
90
+ for (col = 0; col < oprsz; ++col) {
139
+ IMX7SNVSState *s = IMX7_SNVS(obj);
91
+ if (pm[H1(col)] & 1) {
140
+
92
+ zda[tile_vslice_index(row) + col] += zn[col];
141
+ memory_region_init_io(&s->mmio, obj, &imx7_snvs_ops, s,
93
+ }
142
+ TYPE_IMX7_SNVS, 0x1000);
94
+ }
143
+
95
+ }
144
+ sysbus_init_mmio(sd, &s->mmio);
96
+ }
145
+}
97
+}
146
+
98
+
147
+static void imx7_snvs_class_init(ObjectClass *klass, void *data)
99
+void HELPER(sme_addva_s)(void *vzda, void *vzn, void *vpn,
100
+ void *vpm, uint32_t desc)
148
+{
101
+{
149
+ DeviceClass *dc = DEVICE_CLASS(klass);
102
+ intptr_t row, col, oprsz = simd_oprsz(desc) / 4;
103
+ uint64_t *pn = vpn, *pm = vpm;
104
+ uint32_t *zda = vzda, *zn = vzn;
150
+
105
+
151
+ dc->desc = "i.MX7 Secure Non-Volatile Storage Module";
106
+ for (row = 0; row < oprsz; ) {
107
+ uint64_t pa = pn[row >> 4];
108
+ do {
109
+ if (pa & 1) {
110
+ uint32_t zn_row = zn[H4(row)];
111
+ for (col = 0; col < oprsz; ) {
112
+ uint64_t pb = pm[col >> 4];
113
+ do {
114
+ if (pb & 1) {
115
+ zda[tile_vslice_index(row) + H4(col)] += zn_row;
116
+ }
117
+ pb >>= 4;
118
+ } while (++col & 15);
119
+ }
120
+ }
121
+ pa >>= 4;
122
+ } while (++row & 15);
123
+ }
152
+}
124
+}
153
+
125
+
154
+static const TypeInfo imx7_snvs_info = {
126
+void HELPER(sme_addva_d)(void *vzda, void *vzn, void *vpn,
155
+ .name = TYPE_IMX7_SNVS,
127
+ void *vpm, uint32_t desc)
156
+ .parent = TYPE_SYS_BUS_DEVICE,
128
+{
157
+ .instance_size = sizeof(IMX7SNVSState),
129
+ intptr_t row, col, oprsz = simd_oprsz(desc) / 8;
158
+ .instance_init = imx7_snvs_init,
130
+ uint8_t *pn = vpn, *pm = vpm;
159
+ .class_init = imx7_snvs_class_init,
131
+ uint64_t *zda = vzda, *zn = vzn;
160
+};
161
+
132
+
162
+static void imx7_snvs_register_type(void)
133
+ for (row = 0; row < oprsz; ++row) {
134
+ if (pn[H1(row)] & 1) {
135
+ uint64_t zn_row = zn[row];
136
+ for (col = 0; col < oprsz; ++col) {
137
+ if (pm[H1(col)] & 1) {
138
+ zda[tile_vslice_index(row) + col] += zn_row;
139
+ }
140
+ }
141
+ }
142
+ }
143
+}
144
diff --git a/target/arm/translate-sme.c b/target/arm/translate-sme.c
145
index XXXXXXX..XXXXXXX 100644
146
--- a/target/arm/translate-sme.c
147
+++ b/target/arm/translate-sme.c
148
@@ -XXX,XX +XXX,XX @@ static bool do_ldst_r(DisasContext *s, arg_ldstr *a, GenLdStR *fn)
149
150
TRANS_FEAT(LDR, aa64_sme, do_ldst_r, a, gen_sve_ldr)
151
TRANS_FEAT(STR, aa64_sme, do_ldst_r, a, gen_sve_str)
152
+
153
+static bool do_adda(DisasContext *s, arg_adda *a, MemOp esz,
154
+ gen_helper_gvec_4 *fn)
163
+{
155
+{
164
+ type_register_static(&imx7_snvs_info);
156
+ int svl = streaming_vec_reg_size(s);
157
+ uint32_t desc = simd_desc(svl, svl, 0);
158
+ TCGv_ptr za, zn, pn, pm;
159
+
160
+ if (!sme_smza_enabled_check(s)) {
161
+ return true;
162
+ }
163
+
164
+ /* Sum XZR+zad to find ZAd. */
165
+ za = get_tile_rowcol(s, esz, 31, a->zad, false);
166
+ zn = vec_full_reg_ptr(s, a->zn);
167
+ pn = pred_full_reg_ptr(s, a->pn);
168
+ pm = pred_full_reg_ptr(s, a->pm);
169
+
170
+ fn(za, zn, pn, pm, tcg_constant_i32(desc));
171
+
172
+ tcg_temp_free_ptr(za);
173
+ tcg_temp_free_ptr(zn);
174
+ tcg_temp_free_ptr(pn);
175
+ tcg_temp_free_ptr(pm);
176
+ return true;
165
+}
177
+}
166
+type_init(imx7_snvs_register_type)
178
+
179
+TRANS_FEAT(ADDHA_s, aa64_sme, do_adda, a, MO_32, gen_helper_sme_addha_s)
180
+TRANS_FEAT(ADDVA_s, aa64_sme, do_adda, a, MO_32, gen_helper_sme_addva_s)
181
+TRANS_FEAT(ADDHA_d, aa64_sme_i16i64, do_adda, a, MO_64, gen_helper_sme_addha_d)
182
+TRANS_FEAT(ADDVA_d, aa64_sme_i16i64, do_adda, a, MO_64, gen_helper_sme_addva_d)
167
--
183
--
168
2.16.1
184
2.25.1
169
170
diff view generated by jsdifflib
1
From: Andrey Smirnov <andrew.smirnov@gmail.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Add minimal code needed to allow upstream Linux guest to boot.
3
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
4
Message-id: 20220708151540.18136-25-richard.henderson@linaro.org
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
---
8
target/arm/helper-sme.h | 5 +++
9
target/arm/sme.decode | 9 +++++
10
target/arm/sme_helper.c | 69 ++++++++++++++++++++++++++++++++++++++
11
target/arm/translate-sme.c | 32 ++++++++++++++++++
12
4 files changed, 115 insertions(+)
4
13
5
Cc: Peter Maydell <peter.maydell@linaro.org>
14
diff --git a/target/arm/helper-sme.h b/target/arm/helper-sme.h
6
Cc: Jason Wang <jasowang@redhat.com>
7
Cc: Philippe Mathieu-Daudé <f4bug@amsat.org>
8
Cc: Marcel Apfelbaum <marcel.apfelbaum@zoho.com>
9
Cc: Michael S. Tsirkin <mst@redhat.com>
10
Cc: qemu-devel@nongnu.org
11
Cc: qemu-arm@nongnu.org
12
Cc: yurovsky@gmail.com
13
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
14
Signed-off-by: Andrey Smirnov <andrew.smirnov@gmail.com>
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
---
17
hw/intc/Makefile.objs | 2 +-
18
include/hw/intc/imx_gpcv2.h | 22 ++++++++
19
hw/intc/imx_gpcv2.c | 125 ++++++++++++++++++++++++++++++++++++++++++++
20
3 files changed, 148 insertions(+), 1 deletion(-)
21
create mode 100644 include/hw/intc/imx_gpcv2.h
22
create mode 100644 hw/intc/imx_gpcv2.c
23
24
diff --git a/hw/intc/Makefile.objs b/hw/intc/Makefile.objs
25
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
26
--- a/hw/intc/Makefile.objs
16
--- a/target/arm/helper-sme.h
27
+++ b/hw/intc/Makefile.objs
17
+++ b/target/arm/helper-sme.h
28
@@ -XXX,XX +XXX,XX @@ common-obj-$(CONFIG_XILINX) += xilinx_intc.o
18
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_5(sme_addha_s, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, ptr, i32)
29
common-obj-$(CONFIG_XLNX_ZYNQMP) += xlnx-pmu-iomod-intc.o
19
DEF_HELPER_FLAGS_5(sme_addva_s, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, ptr, i32)
30
common-obj-$(CONFIG_XLNX_ZYNQMP) += xlnx-zynqmp-ipi.o
20
DEF_HELPER_FLAGS_5(sme_addha_d, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, ptr, i32)
31
common-obj-$(CONFIG_ETRAXFS) += etraxfs_pic.o
21
DEF_HELPER_FLAGS_5(sme_addva_d, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, ptr, i32)
32
-common-obj-$(CONFIG_IMX) += imx_avic.o
22
+
33
+common-obj-$(CONFIG_IMX) += imx_avic.o imx_gpcv2.o
23
+DEF_HELPER_FLAGS_7(sme_fmopa_s, TCG_CALL_NO_RWG,
34
common-obj-$(CONFIG_LM32) += lm32_pic.o
24
+ void, ptr, ptr, ptr, ptr, ptr, ptr, i32)
35
common-obj-$(CONFIG_REALVIEW) += realview_gic.o
25
+DEF_HELPER_FLAGS_7(sme_fmopa_d, TCG_CALL_NO_RWG,
36
common-obj-$(CONFIG_SLAVIO) += slavio_intctl.o
26
+ void, ptr, ptr, ptr, ptr, ptr, ptr, i32)
37
diff --git a/include/hw/intc/imx_gpcv2.h b/include/hw/intc/imx_gpcv2.h
27
diff --git a/target/arm/sme.decode b/target/arm/sme.decode
38
new file mode 100644
28
index XXXXXXX..XXXXXXX 100644
39
index XXXXXXX..XXXXXXX
29
--- a/target/arm/sme.decode
40
--- /dev/null
30
+++ b/target/arm/sme.decode
41
+++ b/include/hw/intc/imx_gpcv2.h
31
@@ -XXX,XX +XXX,XX @@ ADDHA_s 11000000 10 01000 0 ... ... ..... 000 .. @adda_32
32
ADDVA_s 11000000 10 01000 1 ... ... ..... 000 .. @adda_32
33
ADDHA_d 11000000 11 01000 0 ... ... ..... 00 ... @adda_64
34
ADDVA_d 11000000 11 01000 1 ... ... ..... 00 ... @adda_64
35
+
36
+### SME Outer Product
37
+
38
+&op zad zn zm pm pn sub:bool
39
+@op_32 ........ ... zm:5 pm:3 pn:3 zn:5 sub:1 .. zad:2 &op
40
+@op_64 ........ ... zm:5 pm:3 pn:3 zn:5 sub:1 . zad:3 &op
41
+
42
+FMOPA_s 10000000 100 ..... ... ... ..... . 00 .. @op_32
43
+FMOPA_d 10000000 110 ..... ... ... ..... . 0 ... @op_64
44
diff --git a/target/arm/sme_helper.c b/target/arm/sme_helper.c
45
index XXXXXXX..XXXXXXX 100644
46
--- a/target/arm/sme_helper.c
47
+++ b/target/arm/sme_helper.c
42
@@ -XXX,XX +XXX,XX @@
48
@@ -XXX,XX +XXX,XX @@
43
+#ifndef IMX_GPCV2_H
49
#include "exec/cpu_ldst.h"
44
+#define IMX_GPCV2_H
50
#include "exec/exec-all.h"
51
#include "qemu/int128.h"
52
+#include "fpu/softfloat.h"
53
#include "vec_internal.h"
54
#include "sve_ldst_internal.h"
55
56
@@ -XXX,XX +XXX,XX @@ void HELPER(sme_addva_d)(void *vzda, void *vzn, void *vpn,
57
}
58
}
59
}
45
+
60
+
46
+#include "hw/sysbus.h"
61
+void HELPER(sme_fmopa_s)(void *vza, void *vzn, void *vzm, void *vpn,
47
+
62
+ void *vpm, void *vst, uint32_t desc)
48
+enum IMXGPCv2Registers {
49
+ GPC_NUM = 0xE00 / sizeof(uint32_t),
50
+};
51
+
52
+typedef struct IMXGPCv2State {
53
+ /*< private >*/
54
+ SysBusDevice parent_obj;
55
+
56
+ /*< public >*/
57
+ MemoryRegion iomem;
58
+ uint32_t regs[GPC_NUM];
59
+} IMXGPCv2State;
60
+
61
+#define TYPE_IMX_GPCV2 "imx-gpcv2"
62
+#define IMX_GPCV2(obj) OBJECT_CHECK(IMXGPCv2State, (obj), TYPE_IMX_GPCV2)
63
+
64
+#endif /* IMX_GPCV2_H */
65
diff --git a/hw/intc/imx_gpcv2.c b/hw/intc/imx_gpcv2.c
66
new file mode 100644
67
index XXXXXXX..XXXXXXX
68
--- /dev/null
69
+++ b/hw/intc/imx_gpcv2.c
70
@@ -XXX,XX +XXX,XX @@
71
+/*
72
+ * Copyright (c) 2018, Impinj, Inc.
73
+ *
74
+ * i.MX7 GPCv2 block emulation code
75
+ *
76
+ * Author: Andrey Smirnov <andrew.smirnov@gmail.com>
77
+ *
78
+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
79
+ * See the COPYING file in the top-level directory.
80
+ */
81
+
82
+#include "qemu/osdep.h"
83
+#include "hw/intc/imx_gpcv2.h"
84
+#include "qemu/log.h"
85
+
86
+#define GPC_PU_PGC_SW_PUP_REQ 0x0f8
87
+#define GPC_PU_PGC_SW_PDN_REQ 0x104
88
+
89
+#define USB_HSIC_PHY_SW_Pxx_REQ BIT(4)
90
+#define USB_OTG2_PHY_SW_Pxx_REQ BIT(3)
91
+#define USB_OTG1_PHY_SW_Pxx_REQ BIT(2)
92
+#define PCIE_PHY_SW_Pxx_REQ BIT(1)
93
+#define MIPI_PHY_SW_Pxx_REQ BIT(0)
94
+
95
+
96
+static void imx_gpcv2_reset(DeviceState *dev)
97
+{
63
+{
98
+ IMXGPCv2State *s = IMX_GPCV2(dev);
64
+ intptr_t row, col, oprsz = simd_maxsz(desc);
99
+
65
+ uint32_t neg = simd_data(desc) << 31;
100
+ memset(s->regs, 0, sizeof(s->regs));
66
+ uint16_t *pn = vpn, *pm = vpm;
101
+}
67
+ float_status fpst;
102
+
103
+static uint64_t imx_gpcv2_read(void *opaque, hwaddr offset,
104
+ unsigned size)
105
+{
106
+ IMXGPCv2State *s = opaque;
107
+
108
+ return s->regs[offset / sizeof(uint32_t)];
109
+}
110
+
111
+static void imx_gpcv2_write(void *opaque, hwaddr offset,
112
+ uint64_t value, unsigned size)
113
+{
114
+ IMXGPCv2State *s = opaque;
115
+ const size_t idx = offset / sizeof(uint32_t);
116
+
117
+ s->regs[idx] = value;
118
+
68
+
119
+ /*
69
+ /*
120
+ * Real HW will clear those bits once as a way to indicate that
70
+ * Make a copy of float_status because this operation does not
121
+ * power up request is complete
71
+ * update the cumulative fp exception status. It also produces
72
+ * default nans.
122
+ */
73
+ */
123
+ if (offset == GPC_PU_PGC_SW_PUP_REQ ||
74
+ fpst = *(float_status *)vst;
124
+ offset == GPC_PU_PGC_SW_PDN_REQ) {
75
+ set_default_nan_mode(true, &fpst);
125
+ s->regs[idx] &= ~(USB_HSIC_PHY_SW_Pxx_REQ |
76
+
126
+ USB_OTG2_PHY_SW_Pxx_REQ |
77
+ for (row = 0; row < oprsz; ) {
127
+ USB_OTG1_PHY_SW_Pxx_REQ |
78
+ uint16_t pa = pn[H2(row >> 4)];
128
+ PCIE_PHY_SW_Pxx_REQ |
79
+ do {
129
+ MIPI_PHY_SW_Pxx_REQ);
80
+ if (pa & 1) {
81
+ void *vza_row = vza + tile_vslice_offset(row);
82
+ uint32_t n = *(uint32_t *)(vzn + H1_4(row)) ^ neg;
83
+
84
+ for (col = 0; col < oprsz; ) {
85
+ uint16_t pb = pm[H2(col >> 4)];
86
+ do {
87
+ if (pb & 1) {
88
+ uint32_t *a = vza_row + H1_4(col);
89
+ uint32_t *m = vzm + H1_4(col);
90
+ *a = float32_muladd(n, *m, *a, 0, vst);
91
+ }
92
+ col += 4;
93
+ pb >>= 4;
94
+ } while (col & 15);
95
+ }
96
+ }
97
+ row += 4;
98
+ pa >>= 4;
99
+ } while (row & 15);
130
+ }
100
+ }
131
+}
101
+}
132
+
102
+
133
+static const struct MemoryRegionOps imx_gpcv2_ops = {
103
+void HELPER(sme_fmopa_d)(void *vza, void *vzn, void *vzm, void *vpn,
134
+ .read = imx_gpcv2_read,
104
+ void *vpm, void *vst, uint32_t desc)
135
+ .write = imx_gpcv2_write,
105
+{
136
+ .endianness = DEVICE_NATIVE_ENDIAN,
106
+ intptr_t row, col, oprsz = simd_oprsz(desc) / 8;
137
+ .impl = {
107
+ uint64_t neg = (uint64_t)simd_data(desc) << 63;
138
+ /*
108
+ uint64_t *za = vza, *zn = vzn, *zm = vzm;
139
+ * Our device would not work correctly if the guest was doing
109
+ uint8_t *pn = vpn, *pm = vpm;
140
+ * unaligned access. This might not be a limitation on the real
110
+ float_status fpst = *(float_status *)vst;
141
+ * device but in practice there is no reason for a guest to access
142
+ * this device unaligned.
143
+ */
144
+ .min_access_size = 4,
145
+ .max_access_size = 4,
146
+ .unaligned = false,
147
+ },
148
+};
149
+
111
+
150
+static void imx_gpcv2_init(Object *obj)
112
+ set_default_nan_mode(true, &fpst);
113
+
114
+ for (row = 0; row < oprsz; ++row) {
115
+ if (pn[H1(row)] & 1) {
116
+ uint64_t *za_row = &za[tile_vslice_index(row)];
117
+ uint64_t n = zn[row] ^ neg;
118
+
119
+ for (col = 0; col < oprsz; ++col) {
120
+ if (pm[H1(col)] & 1) {
121
+ uint64_t *a = &za_row[col];
122
+ *a = float64_muladd(n, zm[col], *a, 0, &fpst);
123
+ }
124
+ }
125
+ }
126
+ }
127
+}
128
diff --git a/target/arm/translate-sme.c b/target/arm/translate-sme.c
129
index XXXXXXX..XXXXXXX 100644
130
--- a/target/arm/translate-sme.c
131
+++ b/target/arm/translate-sme.c
132
@@ -XXX,XX +XXX,XX @@ TRANS_FEAT(ADDHA_s, aa64_sme, do_adda, a, MO_32, gen_helper_sme_addha_s)
133
TRANS_FEAT(ADDVA_s, aa64_sme, do_adda, a, MO_32, gen_helper_sme_addva_s)
134
TRANS_FEAT(ADDHA_d, aa64_sme_i16i64, do_adda, a, MO_64, gen_helper_sme_addha_d)
135
TRANS_FEAT(ADDVA_d, aa64_sme_i16i64, do_adda, a, MO_64, gen_helper_sme_addva_d)
136
+
137
+static bool do_outprod_fpst(DisasContext *s, arg_op *a, MemOp esz,
138
+ gen_helper_gvec_5_ptr *fn)
151
+{
139
+{
152
+ SysBusDevice *sd = SYS_BUS_DEVICE(obj);
140
+ int svl = streaming_vec_reg_size(s);
153
+ IMXGPCv2State *s = IMX_GPCV2(obj);
141
+ uint32_t desc = simd_desc(svl, svl, a->sub);
142
+ TCGv_ptr za, zn, zm, pn, pm, fpst;
154
+
143
+
155
+ memory_region_init_io(&s->iomem,
144
+ if (!sme_smza_enabled_check(s)) {
156
+ obj,
145
+ return true;
157
+ &imx_gpcv2_ops,
146
+ }
158
+ s,
147
+
159
+ TYPE_IMX_GPCV2 ".iomem",
148
+ /* Sum XZR+zad to find ZAd. */
160
+ sizeof(s->regs));
149
+ za = get_tile_rowcol(s, esz, 31, a->zad, false);
161
+ sysbus_init_mmio(sd, &s->iomem);
150
+ zn = vec_full_reg_ptr(s, a->zn);
151
+ zm = vec_full_reg_ptr(s, a->zm);
152
+ pn = pred_full_reg_ptr(s, a->pn);
153
+ pm = pred_full_reg_ptr(s, a->pm);
154
+ fpst = fpstatus_ptr(FPST_FPCR);
155
+
156
+ fn(za, zn, zm, pn, pm, fpst, tcg_constant_i32(desc));
157
+
158
+ tcg_temp_free_ptr(za);
159
+ tcg_temp_free_ptr(zn);
160
+ tcg_temp_free_ptr(pn);
161
+ tcg_temp_free_ptr(pm);
162
+ tcg_temp_free_ptr(fpst);
163
+ return true;
162
+}
164
+}
163
+
165
+
164
+static const VMStateDescription vmstate_imx_gpcv2 = {
166
+TRANS_FEAT(FMOPA_s, aa64_sme, do_outprod_fpst, a, MO_32, gen_helper_sme_fmopa_s)
165
+ .name = TYPE_IMX_GPCV2,
167
+TRANS_FEAT(FMOPA_d, aa64_sme_f64f64, do_outprod_fpst, a, MO_64, gen_helper_sme_fmopa_d)
166
+ .version_id = 1,
167
+ .minimum_version_id = 1,
168
+ .fields = (VMStateField[]) {
169
+ VMSTATE_UINT32_ARRAY(regs, IMXGPCv2State, GPC_NUM),
170
+ VMSTATE_END_OF_LIST()
171
+ },
172
+};
173
+
174
+static void imx_gpcv2_class_init(ObjectClass *klass, void *data)
175
+{
176
+ DeviceClass *dc = DEVICE_CLASS(klass);
177
+
178
+ dc->reset = imx_gpcv2_reset;
179
+ dc->vmsd = &vmstate_imx_gpcv2;
180
+ dc->desc = "i.MX GPCv2 Module";
181
+}
182
+
183
+static const TypeInfo imx_gpcv2_info = {
184
+ .name = TYPE_IMX_GPCV2,
185
+ .parent = TYPE_SYS_BUS_DEVICE,
186
+ .instance_size = sizeof(IMXGPCv2State),
187
+ .instance_init = imx_gpcv2_init,
188
+ .class_init = imx_gpcv2_class_init,
189
+};
190
+
191
+static void imx_gpcv2_register_type(void)
192
+{
193
+ type_register_static(&imx_gpcv2_info);
194
+}
195
+type_init(imx_gpcv2_register_type)
196
--
168
--
197
2.16.1
169
2.25.1
198
199
diff view generated by jsdifflib
1
In order to support derived exceptions (exceptions generated in
1
From: Richard Henderson <richard.henderson@linaro.org>
2
the course of trying to take an exception), we need to be able
3
to handle prioritizing whether to take the original exception
4
or the derived exception.
5
2
6
We do this by introducing a new function
3
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
armv7m_nvic_set_pending_derived() which the exception-taking code in
4
Message-id: 20220708151540.18136-26-richard.henderson@linaro.org
8
helper.c will call when a derived exception occurs. Derived
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
exceptions are dealt with mostly like normal pending exceptions, so
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
we share the implementation with the armv7m_nvic_set_pending()
7
---
11
function.
8
target/arm/helper-sme.h | 2 ++
9
target/arm/sme.decode | 2 ++
10
target/arm/sme_helper.c | 56 ++++++++++++++++++++++++++++++++++++++
11
target/arm/translate-sme.c | 30 ++++++++++++++++++++
12
4 files changed, 90 insertions(+)
12
13
13
Note that the way we structure this is significantly different
14
diff --git a/target/arm/helper-sme.h b/target/arm/helper-sme.h
14
from the v8M Arm ARM pseudocode: that does all the prioritization
15
logic in the DerivedLateArrival() function, whereas we choose to
16
let the existing "identify highest priority exception" logic
17
do the prioritization for us. The effect is the same, though.
18
19
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
20
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
21
Message-id: 1517324542-6607-2-git-send-email-peter.maydell@linaro.org
22
---
23
target/arm/cpu.h | 13 ++++++++++
24
hw/intc/armv7m_nvic.c | 68 +++++++++++++++++++++++++++++++++++++++++++++++++--
25
hw/intc/trace-events | 2 +-
26
3 files changed, 80 insertions(+), 3 deletions(-)
27
28
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
29
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
30
--- a/target/arm/cpu.h
16
--- a/target/arm/helper-sme.h
31
+++ b/target/arm/cpu.h
17
+++ b/target/arm/helper-sme.h
32
@@ -XXX,XX +XXX,XX @@ static inline bool armv7m_nvic_can_take_pending_exception(void *opaque)
18
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_7(sme_fmopa_s, TCG_CALL_NO_RWG,
33
* of architecturally banked exceptions.
19
void, ptr, ptr, ptr, ptr, ptr, ptr, i32)
34
*/
20
DEF_HELPER_FLAGS_7(sme_fmopa_d, TCG_CALL_NO_RWG,
35
void armv7m_nvic_set_pending(void *opaque, int irq, bool secure);
21
void, ptr, ptr, ptr, ptr, ptr, ptr, i32)
36
+/**
22
+DEF_HELPER_FLAGS_6(sme_bfmopa, TCG_CALL_NO_RWG,
37
+ * armv7m_nvic_set_pending_derived: mark this derived exception as pending
23
+ void, ptr, ptr, ptr, ptr, ptr, i32)
38
+ * @opaque: the NVIC
24
diff --git a/target/arm/sme.decode b/target/arm/sme.decode
39
+ * @irq: the exception number to mark pending
40
+ * @secure: false for non-banked exceptions or for the nonsecure
41
+ * version of a banked exception, true for the secure version of a banked
42
+ * exception.
43
+ *
44
+ * Similar to armv7m_nvic_set_pending(), but specifically for derived
45
+ * exceptions (exceptions generated in the course of trying to take
46
+ * a different exception).
47
+ */
48
+void armv7m_nvic_set_pending_derived(void *opaque, int irq, bool secure);
49
/**
50
* armv7m_nvic_acknowledge_irq: make highest priority pending exception active
51
* @opaque: the NVIC
52
diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c
53
index XXXXXXX..XXXXXXX 100644
25
index XXXXXXX..XXXXXXX 100644
54
--- a/hw/intc/armv7m_nvic.c
26
--- a/target/arm/sme.decode
55
+++ b/hw/intc/armv7m_nvic.c
27
+++ b/target/arm/sme.decode
56
@@ -XXX,XX +XXX,XX @@ static void armv7m_nvic_clear_pending(void *opaque, int irq, bool secure)
28
@@ -XXX,XX +XXX,XX @@ ADDVA_d 11000000 11 01000 1 ... ... ..... 00 ... @adda_64
29
30
FMOPA_s 10000000 100 ..... ... ... ..... . 00 .. @op_32
31
FMOPA_d 10000000 110 ..... ... ... ..... . 0 ... @op_64
32
+
33
+BFMOPA 10000001 100 ..... ... ... ..... . 00 .. @op_32
34
diff --git a/target/arm/sme_helper.c b/target/arm/sme_helper.c
35
index XXXXXXX..XXXXXXX 100644
36
--- a/target/arm/sme_helper.c
37
+++ b/target/arm/sme_helper.c
38
@@ -XXX,XX +XXX,XX @@ void HELPER(sme_fmopa_d)(void *vza, void *vzn, void *vzm, void *vpn,
39
}
57
}
40
}
58
}
41
}
59
42
+
60
-void armv7m_nvic_set_pending(void *opaque, int irq, bool secure)
43
+/*
61
+static void do_armv7m_nvic_set_pending(void *opaque, int irq, bool secure,
44
+ * Alter PAIR as needed for controlling predicates being false,
62
+ bool derived)
45
+ * and for NEG on an enabled row element.
63
{
46
+ */
64
+ /* Pend an exception, including possibly escalating it to HardFault.
47
+static inline uint32_t f16mop_adj_pair(uint32_t pair, uint32_t pg, uint32_t neg)
65
+ *
48
+{
66
+ * This function handles both "normal" pending of interrupts and
49
+ /*
67
+ * exceptions, and also derived exceptions (ones which occur as
50
+ * The pseudocode uses a conditional negate after the conditional zero.
68
+ * a result of trying to take some other exception).
51
+ * It is simpler here to unconditionally negate before conditional zero.
69
+ *
70
+ * If derived == true, the caller guarantees that we are part way through
71
+ * trying to take an exception (but have not yet called
72
+ * armv7m_nvic_acknowledge_irq() to make it active), and so:
73
+ * - s->vectpending is the "original exception" we were trying to take
74
+ * - irq is the "derived exception"
75
+ * - nvic_exec_prio(s) gives the priority before exception entry
76
+ * Here we handle the prioritization logic which the pseudocode puts
77
+ * in the DerivedLateArrival() function.
78
+ */
52
+ */
79
+
53
+ pair ^= neg;
80
NVICState *s = (NVICState *)opaque;
54
+ if (!(pg & 1)) {
81
bool banked = exc_is_banked(irq);
55
+ pair &= 0xffff0000u;
82
VecInfo *vec;
83
@@ -XXX,XX +XXX,XX @@ void armv7m_nvic_set_pending(void *opaque, int irq, bool secure)
84
85
vec = (banked && secure) ? &s->sec_vectors[irq] : &s->vectors[irq];
86
87
- trace_nvic_set_pending(irq, secure, vec->enabled, vec->prio);
88
+ trace_nvic_set_pending(irq, secure, derived, vec->enabled, vec->prio);
89
+
90
+ if (derived) {
91
+ /* Derived exceptions are always synchronous. */
92
+ assert(irq >= ARMV7M_EXCP_HARD && irq < ARMV7M_EXCP_PENDSV);
93
+
94
+ if (irq == ARMV7M_EXCP_DEBUG &&
95
+ exc_group_prio(s, vec->prio, secure) >= nvic_exec_prio(s)) {
96
+ /* DebugMonitorFault, but its priority is lower than the
97
+ * preempted exception priority: just ignore it.
98
+ */
99
+ return;
100
+ }
101
+
102
+ if (irq == ARMV7M_EXCP_HARD && vec->prio >= s->vectpending_prio) {
103
+ /* If this is a terminal exception (one which means we cannot
104
+ * take the original exception, like a failure to read its
105
+ * vector table entry), then we must take the derived exception.
106
+ * If the derived exception can't take priority over the
107
+ * original exception, then we go into Lockup.
108
+ *
109
+ * For QEMU, we rely on the fact that a derived exception is
110
+ * terminal if and only if it's reported to us as HardFault,
111
+ * which saves having to have an extra argument is_terminal
112
+ * that we'd only use in one place.
113
+ */
114
+ cpu_abort(&s->cpu->parent_obj,
115
+ "Lockup: can't take terminal derived exception "
116
+ "(original exception priority %d)\n",
117
+ s->vectpending_prio);
118
+ }
119
+ /* We now continue with the same code as for a normal pending
120
+ * exception, which will cause us to pend the derived exception.
121
+ * We'll then take either the original or the derived exception
122
+ * based on which is higher priority by the usual mechanism
123
+ * for selecting the highest priority pending interrupt.
124
+ */
125
+ }
56
+ }
126
57
+ if (!(pg & 4)) {
127
if (irq >= ARMV7M_EXCP_HARD && irq < ARMV7M_EXCP_PENDSV) {
58
+ pair &= 0x0000ffffu;
128
/* If a synchronous exception is pending then it may be
59
+ }
129
@@ -XXX,XX +XXX,XX @@ void armv7m_nvic_set_pending(void *opaque, int irq, bool secure)
60
+ return pair;
130
}
131
}
132
133
+void armv7m_nvic_set_pending(void *opaque, int irq, bool secure)
134
+{
135
+ do_armv7m_nvic_set_pending(opaque, irq, secure, false);
136
+}
61
+}
137
+
62
+
138
+void armv7m_nvic_set_pending_derived(void *opaque, int irq, bool secure)
63
+void HELPER(sme_bfmopa)(void *vza, void *vzn, void *vzm, void *vpn,
64
+ void *vpm, uint32_t desc)
139
+{
65
+{
140
+ do_armv7m_nvic_set_pending(opaque, irq, secure, true);
66
+ intptr_t row, col, oprsz = simd_maxsz(desc);
67
+ uint32_t neg = simd_data(desc) * 0x80008000u;
68
+ uint16_t *pn = vpn, *pm = vpm;
69
+
70
+ for (row = 0; row < oprsz; ) {
71
+ uint16_t prow = pn[H2(row >> 4)];
72
+ do {
73
+ void *vza_row = vza + tile_vslice_offset(row);
74
+ uint32_t n = *(uint32_t *)(vzn + H1_4(row));
75
+
76
+ n = f16mop_adj_pair(n, prow, neg);
77
+
78
+ for (col = 0; col < oprsz; ) {
79
+ uint16_t pcol = pm[H2(col >> 4)];
80
+ do {
81
+ if (prow & pcol & 0b0101) {
82
+ uint32_t *a = vza_row + H1_4(col);
83
+ uint32_t m = *(uint32_t *)(vzm + H1_4(col));
84
+
85
+ m = f16mop_adj_pair(m, pcol, 0);
86
+ *a = bfdotadd(*a, n, m);
87
+
88
+ col += 4;
89
+ pcol >>= 4;
90
+ }
91
+ } while (col & 15);
92
+ }
93
+ row += 4;
94
+ prow >>= 4;
95
+ } while (row & 15);
96
+ }
97
+}
98
diff --git a/target/arm/translate-sme.c b/target/arm/translate-sme.c
99
index XXXXXXX..XXXXXXX 100644
100
--- a/target/arm/translate-sme.c
101
+++ b/target/arm/translate-sme.c
102
@@ -XXX,XX +XXX,XX @@ TRANS_FEAT(ADDVA_s, aa64_sme, do_adda, a, MO_32, gen_helper_sme_addva_s)
103
TRANS_FEAT(ADDHA_d, aa64_sme_i16i64, do_adda, a, MO_64, gen_helper_sme_addha_d)
104
TRANS_FEAT(ADDVA_d, aa64_sme_i16i64, do_adda, a, MO_64, gen_helper_sme_addva_d)
105
106
+static bool do_outprod(DisasContext *s, arg_op *a, MemOp esz,
107
+ gen_helper_gvec_5 *fn)
108
+{
109
+ int svl = streaming_vec_reg_size(s);
110
+ uint32_t desc = simd_desc(svl, svl, a->sub);
111
+ TCGv_ptr za, zn, zm, pn, pm;
112
+
113
+ if (!sme_smza_enabled_check(s)) {
114
+ return true;
115
+ }
116
+
117
+ /* Sum XZR+zad to find ZAd. */
118
+ za = get_tile_rowcol(s, esz, 31, a->zad, false);
119
+ zn = vec_full_reg_ptr(s, a->zn);
120
+ zm = vec_full_reg_ptr(s, a->zm);
121
+ pn = pred_full_reg_ptr(s, a->pn);
122
+ pm = pred_full_reg_ptr(s, a->pm);
123
+
124
+ fn(za, zn, zm, pn, pm, tcg_constant_i32(desc));
125
+
126
+ tcg_temp_free_ptr(za);
127
+ tcg_temp_free_ptr(zn);
128
+ tcg_temp_free_ptr(pn);
129
+ tcg_temp_free_ptr(pm);
130
+ return true;
141
+}
131
+}
142
+
132
+
143
/* Make pending IRQ active. */
133
static bool do_outprod_fpst(DisasContext *s, arg_op *a, MemOp esz,
144
bool armv7m_nvic_acknowledge_irq(void *opaque)
134
gen_helper_gvec_5_ptr *fn)
145
{
135
{
146
diff --git a/hw/intc/trace-events b/hw/intc/trace-events
136
@@ -XXX,XX +XXX,XX @@ static bool do_outprod_fpst(DisasContext *s, arg_op *a, MemOp esz,
147
index XXXXXXX..XXXXXXX 100644
137
148
--- a/hw/intc/trace-events
138
TRANS_FEAT(FMOPA_s, aa64_sme, do_outprod_fpst, a, MO_32, gen_helper_sme_fmopa_s)
149
+++ b/hw/intc/trace-events
139
TRANS_FEAT(FMOPA_d, aa64_sme_f64f64, do_outprod_fpst, a, MO_64, gen_helper_sme_fmopa_d)
150
@@ -XXX,XX +XXX,XX @@ nvic_set_prio(int irq, bool secure, uint8_t prio) "NVIC set irq %d secure-bank %
140
+
151
nvic_irq_update(int vectpending, int pendprio, int exception_prio, int level) "NVIC vectpending %d pending prio %d exception_prio %d: setting irq line to %d"
141
+/* TODO: FEAT_EBF16 */
152
nvic_escalate_prio(int irq, int irqprio, int runprio) "NVIC escalating irq %d to HardFault: insufficient priority %d >= %d"
142
+TRANS_FEAT(BFMOPA, aa64_sme, do_outprod, a, MO_32, gen_helper_sme_bfmopa)
153
nvic_escalate_disabled(int irq) "NVIC escalating irq %d to HardFault: disabled"
154
-nvic_set_pending(int irq, bool secure, int en, int prio) "NVIC set pending irq %d secure-bank %d (enabled: %d priority %d)"
155
+nvic_set_pending(int irq, bool secure, bool derived, int en, int prio) "NVIC set pending irq %d secure-bank %d derived %d (enabled: %d priority %d)"
156
nvic_clear_pending(int irq, bool secure, int en, int prio) "NVIC clear pending irq %d secure-bank %d (enabled: %d priority %d)"
157
nvic_set_pending_level(int irq) "NVIC set pending: irq %d higher prio than vectpending: setting irq line to 1"
158
nvic_acknowledge_irq(int irq, int prio, bool targets_secure) "NVIC acknowledge IRQ: %d now active (prio %d targets_secure %d)"
159
--
143
--
160
2.16.1
144
2.25.1
161
162
diff view generated by jsdifflib
1
In the v8M architecture, if the process of taking an exception
1
From: Richard Henderson <richard.henderson@linaro.org>
2
results in a further exception this is called a derived exception
3
(for example, an MPU exception when writing the exception frame to
4
memory). If the derived exception happens while pushing the initial
5
stack frame, we must ignore any subsequent possible exception
6
pushing the callee-saves registers.
7
2
8
In preparation for making the stack writes check for exceptions,
3
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
9
add a return value from v7m_push_stack() and a new parameter to
4
Message-id: 20220708151540.18136-27-richard.henderson@linaro.org
10
v7m_exception_taken(), so that the former can tell the latter that
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
it needs to ignore failures to write to the stack. We also plumb
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
12
the argument through to v7m_push_callee_stack(), which is where
7
---
13
the code to ignore the failures will be.
8
target/arm/helper-sme.h | 2 ++
9
target/arm/sme.decode | 1 +
10
target/arm/sme_helper.c | 74 ++++++++++++++++++++++++++++++++++++++
11
target/arm/translate-sme.c | 1 +
12
4 files changed, 78 insertions(+)
14
13
15
(Note that the v8M ARM pseudocode structures this slightly differently:
14
diff --git a/target/arm/helper-sme.h b/target/arm/helper-sme.h
16
derived exceptions cause the attempt to process the original
17
exception to be abandoned; then at the top level it calls
18
DerivedLateArrival to prioritize the derived exception and call
19
TakeException from there. We choose to let the NVIC do the prioritization
20
and continue forward with a call to TakeException which will then
21
take either the original or the derived exception. The effect is
22
the same, but this structure works better for QEMU because we don't
23
have a convenient top level place to do the abandon-and-retry logic.)
24
25
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
26
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
27
Message-id: 1517324542-6607-4-git-send-email-peter.maydell@linaro.org
28
---
29
target/arm/helper.c | 35 +++++++++++++++++++++++------------
30
1 file changed, 23 insertions(+), 12 deletions(-)
31
32
diff --git a/target/arm/helper.c b/target/arm/helper.c
33
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
34
--- a/target/arm/helper.c
16
--- a/target/arm/helper-sme.h
35
+++ b/target/arm/helper.c
17
+++ b/target/arm/helper-sme.h
36
@@ -XXX,XX +XXX,XX @@ static uint32_t arm_v7m_load_vector(ARMCPU *cpu, int exc, bool targets_secure)
18
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_5(sme_addva_s, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, ptr, i32)
37
return addr;
19
DEF_HELPER_FLAGS_5(sme_addha_d, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, ptr, i32)
20
DEF_HELPER_FLAGS_5(sme_addva_d, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, ptr, i32)
21
22
+DEF_HELPER_FLAGS_7(sme_fmopa_h, TCG_CALL_NO_RWG,
23
+ void, ptr, ptr, ptr, ptr, ptr, ptr, i32)
24
DEF_HELPER_FLAGS_7(sme_fmopa_s, TCG_CALL_NO_RWG,
25
void, ptr, ptr, ptr, ptr, ptr, ptr, i32)
26
DEF_HELPER_FLAGS_7(sme_fmopa_d, TCG_CALL_NO_RWG,
27
diff --git a/target/arm/sme.decode b/target/arm/sme.decode
28
index XXXXXXX..XXXXXXX 100644
29
--- a/target/arm/sme.decode
30
+++ b/target/arm/sme.decode
31
@@ -XXX,XX +XXX,XX @@ FMOPA_s 10000000 100 ..... ... ... ..... . 00 .. @op_32
32
FMOPA_d 10000000 110 ..... ... ... ..... . 0 ... @op_64
33
34
BFMOPA 10000001 100 ..... ... ... ..... . 00 .. @op_32
35
+FMOPA_h 10000001 101 ..... ... ... ..... . 00 .. @op_32
36
diff --git a/target/arm/sme_helper.c b/target/arm/sme_helper.c
37
index XXXXXXX..XXXXXXX 100644
38
--- a/target/arm/sme_helper.c
39
+++ b/target/arm/sme_helper.c
40
@@ -XXX,XX +XXX,XX @@ static inline uint32_t f16mop_adj_pair(uint32_t pair, uint32_t pg, uint32_t neg)
41
return pair;
38
}
42
}
39
43
40
-static void v7m_push_callee_stack(ARMCPU *cpu, uint32_t lr, bool dotailchain)
44
+static float32 f16_dotadd(float32 sum, uint32_t e1, uint32_t e2,
41
+static void v7m_push_callee_stack(ARMCPU *cpu, uint32_t lr, bool dotailchain,
45
+ float_status *s_std, float_status *s_odd)
42
+ bool ignore_faults)
46
+{
47
+ float64 e1r = float16_to_float64(e1 & 0xffff, true, s_std);
48
+ float64 e1c = float16_to_float64(e1 >> 16, true, s_std);
49
+ float64 e2r = float16_to_float64(e2 & 0xffff, true, s_std);
50
+ float64 e2c = float16_to_float64(e2 >> 16, true, s_std);
51
+ float64 t64;
52
+ float32 t32;
53
+
54
+ /*
55
+ * The ARM pseudocode function FPDot performs both multiplies
56
+ * and the add with a single rounding operation. Emulate this
57
+ * by performing the first multiply in round-to-odd, then doing
58
+ * the second multiply as fused multiply-add, and rounding to
59
+ * float32 all in one step.
60
+ */
61
+ t64 = float64_mul(e1r, e2r, s_odd);
62
+ t64 = float64r32_muladd(e1c, e2c, t64, 0, s_std);
63
+
64
+ /* This conversion is exact, because we've already rounded. */
65
+ t32 = float64_to_float32(t64, s_std);
66
+
67
+ /* The final accumulation step is not fused. */
68
+ return float32_add(sum, t32, s_std);
69
+}
70
+
71
+void HELPER(sme_fmopa_h)(void *vza, void *vzn, void *vzm, void *vpn,
72
+ void *vpm, void *vst, uint32_t desc)
73
+{
74
+ intptr_t row, col, oprsz = simd_maxsz(desc);
75
+ uint32_t neg = simd_data(desc) * 0x80008000u;
76
+ uint16_t *pn = vpn, *pm = vpm;
77
+ float_status fpst_odd, fpst_std;
78
+
79
+ /*
80
+ * Make a copy of float_status because this operation does not
81
+ * update the cumulative fp exception status. It also produces
82
+ * default nans. Make a second copy with round-to-odd -- see above.
83
+ */
84
+ fpst_std = *(float_status *)vst;
85
+ set_default_nan_mode(true, &fpst_std);
86
+ fpst_odd = fpst_std;
87
+ set_float_rounding_mode(float_round_to_odd, &fpst_odd);
88
+
89
+ for (row = 0; row < oprsz; ) {
90
+ uint16_t prow = pn[H2(row >> 4)];
91
+ do {
92
+ void *vza_row = vza + tile_vslice_offset(row);
93
+ uint32_t n = *(uint32_t *)(vzn + H1_4(row));
94
+
95
+ n = f16mop_adj_pair(n, prow, neg);
96
+
97
+ for (col = 0; col < oprsz; ) {
98
+ uint16_t pcol = pm[H2(col >> 4)];
99
+ do {
100
+ if (prow & pcol & 0b0101) {
101
+ uint32_t *a = vza_row + H1_4(col);
102
+ uint32_t m = *(uint32_t *)(vzm + H1_4(col));
103
+
104
+ m = f16mop_adj_pair(m, pcol, 0);
105
+ *a = f16_dotadd(*a, n, m, &fpst_std, &fpst_odd);
106
+
107
+ col += 4;
108
+ pcol >>= 4;
109
+ }
110
+ } while (col & 15);
111
+ }
112
+ row += 4;
113
+ prow >>= 4;
114
+ } while (row & 15);
115
+ }
116
+}
117
+
118
void HELPER(sme_bfmopa)(void *vza, void *vzn, void *vzm, void *vpn,
119
void *vpm, uint32_t desc)
43
{
120
{
44
/* For v8M, push the callee-saves register part of the stack frame.
121
diff --git a/target/arm/translate-sme.c b/target/arm/translate-sme.c
45
* Compare the v8M pseudocode PushCalleeStack().
122
index XXXXXXX..XXXXXXX 100644
46
@@ -XXX,XX +XXX,XX @@ static void v7m_push_callee_stack(ARMCPU *cpu, uint32_t lr, bool dotailchain)
123
--- a/target/arm/translate-sme.c
47
*frame_sp_p = frameptr;
124
+++ b/target/arm/translate-sme.c
125
@@ -XXX,XX +XXX,XX @@ static bool do_outprod_fpst(DisasContext *s, arg_op *a, MemOp esz,
126
return true;
48
}
127
}
49
128
50
-static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain)
129
+TRANS_FEAT(FMOPA_h, aa64_sme, do_outprod_fpst, a, MO_32, gen_helper_sme_fmopa_h)
51
+static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain,
130
TRANS_FEAT(FMOPA_s, aa64_sme, do_outprod_fpst, a, MO_32, gen_helper_sme_fmopa_s)
52
+ bool ignore_stackfaults)
131
TRANS_FEAT(FMOPA_d, aa64_sme_f64f64, do_outprod_fpst, a, MO_64, gen_helper_sme_fmopa_d)
53
{
54
/* Do the "take the exception" parts of exception entry,
55
* but not the pushing of state to the stack. This is
56
@@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain)
57
*/
58
if (lr & R_V7M_EXCRET_DCRS_MASK &&
59
!(dotailchain && (lr & R_V7M_EXCRET_ES_MASK))) {
60
- v7m_push_callee_stack(cpu, lr, dotailchain);
61
+ v7m_push_callee_stack(cpu, lr, dotailchain,
62
+ ignore_stackfaults);
63
}
64
lr |= R_V7M_EXCRET_DCRS_MASK;
65
}
66
@@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain)
67
env->thumb = addr & 1;
68
}
69
70
-static void v7m_push_stack(ARMCPU *cpu)
71
+static bool v7m_push_stack(ARMCPU *cpu)
72
{
73
/* Do the "set up stack frame" part of exception entry,
74
* similar to pseudocode PushStack().
75
+ * Return true if we generate a derived exception (and so
76
+ * should ignore further stack faults trying to process
77
+ * that derived exception.)
78
*/
79
CPUARMState *env = &cpu->env;
80
uint32_t xpsr = xpsr_read(env);
81
@@ -XXX,XX +XXX,XX @@ static void v7m_push_stack(ARMCPU *cpu)
82
v7m_push(env, env->regs[2]);
83
v7m_push(env, env->regs[1]);
84
v7m_push(env, env->regs[0]);
85
+
86
+ return false;
87
}
88
89
static void do_v7m_exception_exit(ARMCPU *cpu)
90
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
91
if (sfault) {
92
env->v7m.sfsr |= R_V7M_SFSR_INVER_MASK;
93
armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_SECURE, false);
94
- v7m_exception_taken(cpu, excret, true);
95
+ v7m_exception_taken(cpu, excret, true, false);
96
qemu_log_mask(CPU_LOG_INT, "...taking SecureFault on existing "
97
"stackframe: failed EXC_RETURN.ES validity check\n");
98
return;
99
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
100
*/
101
env->v7m.cfsr[env->v7m.secure] |= R_V7M_CFSR_INVPC_MASK;
102
armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE, env->v7m.secure);
103
- v7m_exception_taken(cpu, excret, true);
104
+ v7m_exception_taken(cpu, excret, true, false);
105
qemu_log_mask(CPU_LOG_INT, "...taking UsageFault on existing "
106
"stackframe: failed exception return integrity check\n");
107
return;
108
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
109
/* Take a SecureFault on the current stack */
110
env->v7m.sfsr |= R_V7M_SFSR_INVIS_MASK;
111
armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_SECURE, false);
112
- v7m_exception_taken(cpu, excret, true);
113
+ v7m_exception_taken(cpu, excret, true, false);
114
qemu_log_mask(CPU_LOG_INT, "...taking SecureFault on existing "
115
"stackframe: failed exception return integrity "
116
"signature check\n");
117
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
118
armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE,
119
env->v7m.secure);
120
env->v7m.cfsr[env->v7m.secure] |= R_V7M_CFSR_INVPC_MASK;
121
- v7m_exception_taken(cpu, excret, true);
122
+ v7m_exception_taken(cpu, excret, true, false);
123
qemu_log_mask(CPU_LOG_INT, "...taking UsageFault on existing "
124
"stackframe: failed exception return integrity "
125
"check\n");
126
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
127
/* Take an INVPC UsageFault by pushing the stack again;
128
* we know we're v7M so this is never a Secure UsageFault.
129
*/
130
+ bool ignore_stackfaults;
131
+
132
assert(!arm_feature(env, ARM_FEATURE_V8));
133
armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE, false);
134
env->v7m.cfsr[env->v7m.secure] |= R_V7M_CFSR_INVPC_MASK;
135
- v7m_push_stack(cpu);
136
- v7m_exception_taken(cpu, excret, false);
137
+ ignore_stackfaults = v7m_push_stack(cpu);
138
+ v7m_exception_taken(cpu, excret, false, ignore_stackfaults);
139
qemu_log_mask(CPU_LOG_INT, "...taking UsageFault on new stackframe: "
140
"failed exception return integrity check\n");
141
return;
142
@@ -XXX,XX +XXX,XX @@ void arm_v7m_cpu_do_interrupt(CPUState *cs)
143
ARMCPU *cpu = ARM_CPU(cs);
144
CPUARMState *env = &cpu->env;
145
uint32_t lr;
146
+ bool ignore_stackfaults;
147
148
arm_log_exception(cs->exception_index);
149
150
@@ -XXX,XX +XXX,XX @@ void arm_v7m_cpu_do_interrupt(CPUState *cs)
151
lr |= R_V7M_EXCRET_MODE_MASK;
152
}
153
154
- v7m_push_stack(cpu);
155
- v7m_exception_taken(cpu, lr, false);
156
+ ignore_stackfaults = v7m_push_stack(cpu);
157
+ v7m_exception_taken(cpu, lr, false, ignore_stackfaults);
158
qemu_log_mask(CPU_LOG_INT, "... as %d\n", env->v7m.exception);
159
}
160
132
161
--
133
--
162
2.16.1
134
2.25.1
163
164
diff view generated by jsdifflib
1
From: Andrey Smirnov <andrew.smirnov@gmail.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Add enough code to emulate i.MX2 watchdog IP block so it would be
3
This is SMOPA, SUMOPA, USMOPA_s, UMOPA, for both Int8 and Int16.
4
possible to reboot the machine running Linux Guest.
5
4
6
Cc: Peter Maydell <peter.maydell@linaro.org>
7
Cc: Jason Wang <jasowang@redhat.com>
8
Cc: Philippe Mathieu-Daudé <f4bug@amsat.org>
9
Cc: Marcel Apfelbaum <marcel.apfelbaum@zoho.com>
10
Cc: Michael S. Tsirkin <mst@redhat.com>
11
Cc: qemu-devel@nongnu.org
12
Cc: qemu-arm@nongnu.org
13
Cc: yurovsky@gmail.com
14
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
15
Signed-off-by: Andrey Smirnov <andrew.smirnov@gmail.com>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
16
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
7
Message-id: 20220708151540.18136-28-richard.henderson@linaro.org
17
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
18
---
9
---
19
hw/misc/Makefile.objs | 1 +
10
target/arm/helper-sme.h | 16 ++++++++
20
include/hw/misc/imx2_wdt.h | 33 +++++++++++++++++
11
target/arm/sme.decode | 10 +++++
21
hw/misc/imx2_wdt.c | 89 ++++++++++++++++++++++++++++++++++++++++++++++
12
target/arm/sme_helper.c | 82 ++++++++++++++++++++++++++++++++++++++
22
3 files changed, 123 insertions(+)
13
target/arm/translate-sme.c | 10 +++++
23
create mode 100644 include/hw/misc/imx2_wdt.h
14
4 files changed, 118 insertions(+)
24
create mode 100644 hw/misc/imx2_wdt.c
25
15
26
diff --git a/hw/misc/Makefile.objs b/hw/misc/Makefile.objs
16
diff --git a/target/arm/helper-sme.h b/target/arm/helper-sme.h
27
index XXXXXXX..XXXXXXX 100644
17
index XXXXXXX..XXXXXXX 100644
28
--- a/hw/misc/Makefile.objs
18
--- a/target/arm/helper-sme.h
29
+++ b/hw/misc/Makefile.objs
19
+++ b/target/arm/helper-sme.h
30
@@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_IMX) += imx25_ccm.o
20
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_7(sme_fmopa_d, TCG_CALL_NO_RWG,
31
obj-$(CONFIG_IMX) += imx6_ccm.o
21
void, ptr, ptr, ptr, ptr, ptr, ptr, i32)
32
obj-$(CONFIG_IMX) += imx6_src.o
22
DEF_HELPER_FLAGS_6(sme_bfmopa, TCG_CALL_NO_RWG,
33
obj-$(CONFIG_IMX) += imx7_ccm.o
23
void, ptr, ptr, ptr, ptr, ptr, i32)
34
+obj-$(CONFIG_IMX) += imx2_wdt.o
24
+DEF_HELPER_FLAGS_6(sme_smopa_s, TCG_CALL_NO_RWG,
35
obj-$(CONFIG_MILKYMIST) += milkymist-hpdmc.o
25
+ void, ptr, ptr, ptr, ptr, ptr, i32)
36
obj-$(CONFIG_MILKYMIST) += milkymist-pfpu.o
26
+DEF_HELPER_FLAGS_6(sme_umopa_s, TCG_CALL_NO_RWG,
37
obj-$(CONFIG_MAINSTONE) += mst_fpga.o
27
+ void, ptr, ptr, ptr, ptr, ptr, i32)
38
diff --git a/include/hw/misc/imx2_wdt.h b/include/hw/misc/imx2_wdt.h
28
+DEF_HELPER_FLAGS_6(sme_sumopa_s, TCG_CALL_NO_RWG,
39
new file mode 100644
29
+ void, ptr, ptr, ptr, ptr, ptr, i32)
40
index XXXXXXX..XXXXXXX
30
+DEF_HELPER_FLAGS_6(sme_usmopa_s, TCG_CALL_NO_RWG,
41
--- /dev/null
31
+ void, ptr, ptr, ptr, ptr, ptr, i32)
42
+++ b/include/hw/misc/imx2_wdt.h
32
+DEF_HELPER_FLAGS_6(sme_smopa_d, TCG_CALL_NO_RWG,
43
@@ -XXX,XX +XXX,XX @@
33
+ void, ptr, ptr, ptr, ptr, ptr, i32)
44
+/*
34
+DEF_HELPER_FLAGS_6(sme_umopa_d, TCG_CALL_NO_RWG,
45
+ * Copyright (c) 2017, Impinj, Inc.
35
+ void, ptr, ptr, ptr, ptr, ptr, i32)
46
+ *
36
+DEF_HELPER_FLAGS_6(sme_sumopa_d, TCG_CALL_NO_RWG,
47
+ * i.MX2 Watchdog IP block
37
+ void, ptr, ptr, ptr, ptr, ptr, i32)
48
+ *
38
+DEF_HELPER_FLAGS_6(sme_usmopa_d, TCG_CALL_NO_RWG,
49
+ * Author: Andrey Smirnov <andrew.smirnov@gmail.com>
39
+ void, ptr, ptr, ptr, ptr, ptr, i32)
50
+ *
40
diff --git a/target/arm/sme.decode b/target/arm/sme.decode
51
+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
41
index XXXXXXX..XXXXXXX 100644
52
+ * See the COPYING file in the top-level directory.
42
--- a/target/arm/sme.decode
53
+ */
43
+++ b/target/arm/sme.decode
44
@@ -XXX,XX +XXX,XX @@ FMOPA_d 10000000 110 ..... ... ... ..... . 0 ... @op_64
45
46
BFMOPA 10000001 100 ..... ... ... ..... . 00 .. @op_32
47
FMOPA_h 10000001 101 ..... ... ... ..... . 00 .. @op_32
54
+
48
+
55
+#ifndef IMX2_WDT_H
49
+SMOPA_s 1010000 0 10 0 ..... ... ... ..... . 00 .. @op_32
56
+#define IMX2_WDT_H
50
+SUMOPA_s 1010000 0 10 1 ..... ... ... ..... . 00 .. @op_32
51
+USMOPA_s 1010000 1 10 0 ..... ... ... ..... . 00 .. @op_32
52
+UMOPA_s 1010000 1 10 1 ..... ... ... ..... . 00 .. @op_32
57
+
53
+
58
+#include "hw/sysbus.h"
54
+SMOPA_d 1010000 0 11 0 ..... ... ... ..... . 0 ... @op_64
55
+SUMOPA_d 1010000 0 11 1 ..... ... ... ..... . 0 ... @op_64
56
+USMOPA_d 1010000 1 11 0 ..... ... ... ..... . 0 ... @op_64
57
+UMOPA_d 1010000 1 11 1 ..... ... ... ..... . 0 ... @op_64
58
diff --git a/target/arm/sme_helper.c b/target/arm/sme_helper.c
59
index XXXXXXX..XXXXXXX 100644
60
--- a/target/arm/sme_helper.c
61
+++ b/target/arm/sme_helper.c
62
@@ -XXX,XX +XXX,XX @@ void HELPER(sme_bfmopa)(void *vza, void *vzn, void *vzm, void *vpn,
63
} while (row & 15);
64
}
65
}
59
+
66
+
60
+#define TYPE_IMX2_WDT "imx2.wdt"
67
+typedef uint64_t IMOPFn(uint64_t, uint64_t, uint64_t, uint8_t, bool);
61
+#define IMX2_WDT(obj) OBJECT_CHECK(IMX2WdtState, (obj), TYPE_IMX2_WDT)
62
+
68
+
63
+enum IMX2WdtRegisters {
69
+static inline void do_imopa(uint64_t *za, uint64_t *zn, uint64_t *zm,
64
+ IMX2_WDT_WCR = 0x0000,
70
+ uint8_t *pn, uint8_t *pm,
65
+ IMX2_WDT_REG_NUM = 0x0008 / sizeof(uint16_t) + 1,
71
+ uint32_t desc, IMOPFn *fn)
66
+};
72
+{
73
+ intptr_t row, col, oprsz = simd_oprsz(desc) / 8;
74
+ bool neg = simd_data(desc);
67
+
75
+
76
+ for (row = 0; row < oprsz; ++row) {
77
+ uint8_t pa = pn[H1(row)];
78
+ uint64_t *za_row = &za[tile_vslice_index(row)];
79
+ uint64_t n = zn[row];
68
+
80
+
69
+typedef struct IMX2WdtState {
81
+ for (col = 0; col < oprsz; ++col) {
70
+ /* <private> */
82
+ uint8_t pb = pm[H1(col)];
71
+ SysBusDevice parent_obj;
83
+ uint64_t *a = &za_row[col];
72
+
84
+
73
+ MemoryRegion mmio;
85
+ *a = fn(n, zm[col], *a, pa & pb, neg);
74
+} IMX2WdtState;
86
+ }
75
+
76
+#endif /* IMX7_SNVS_H */
77
diff --git a/hw/misc/imx2_wdt.c b/hw/misc/imx2_wdt.c
78
new file mode 100644
79
index XXXXXXX..XXXXXXX
80
--- /dev/null
81
+++ b/hw/misc/imx2_wdt.c
82
@@ -XXX,XX +XXX,XX @@
83
+/*
84
+ * Copyright (c) 2018, Impinj, Inc.
85
+ *
86
+ * i.MX2 Watchdog IP block
87
+ *
88
+ * Author: Andrey Smirnov <andrew.smirnov@gmail.com>
89
+ *
90
+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
91
+ * See the COPYING file in the top-level directory.
92
+ */
93
+
94
+#include "qemu/osdep.h"
95
+#include "qemu/bitops.h"
96
+#include "sysemu/watchdog.h"
97
+
98
+#include "hw/misc/imx2_wdt.h"
99
+
100
+#define IMX2_WDT_WCR_WDA BIT(5) /* -> External Reset WDOG_B */
101
+#define IMX2_WDT_WCR_SRS BIT(4) /* -> Software Reset Signal */
102
+
103
+static uint64_t imx2_wdt_read(void *opaque, hwaddr addr,
104
+ unsigned int size)
105
+{
106
+ return 0;
107
+}
108
+
109
+static void imx2_wdt_write(void *opaque, hwaddr addr,
110
+ uint64_t value, unsigned int size)
111
+{
112
+ if (addr == IMX2_WDT_WCR &&
113
+ (value & (IMX2_WDT_WCR_WDA | IMX2_WDT_WCR_SRS))) {
114
+ watchdog_perform_action();
115
+ }
87
+ }
116
+}
88
+}
117
+
89
+
118
+static const MemoryRegionOps imx2_wdt_ops = {
90
+#define DEF_IMOP_32(NAME, NTYPE, MTYPE) \
119
+ .read = imx2_wdt_read,
91
+static uint64_t NAME(uint64_t n, uint64_t m, uint64_t a, uint8_t p, bool neg) \
120
+ .write = imx2_wdt_write,
92
+{ \
121
+ .endianness = DEVICE_NATIVE_ENDIAN,
93
+ uint32_t sum0 = 0, sum1 = 0; \
122
+ .impl = {
94
+ /* Apply P to N as a mask, making the inactive elements 0. */ \
123
+ /*
95
+ n &= expand_pred_b(p); \
124
+ * Our device would not work correctly if the guest was doing
96
+ sum0 += (NTYPE)(n >> 0) * (MTYPE)(m >> 0); \
125
+ * unaligned access. This might not be a limitation on the
97
+ sum0 += (NTYPE)(n >> 8) * (MTYPE)(m >> 8); \
126
+ * real device but in practice there is no reason for a guest
98
+ sum0 += (NTYPE)(n >> 16) * (MTYPE)(m >> 16); \
127
+ * to access this device unaligned.
99
+ sum0 += (NTYPE)(n >> 24) * (MTYPE)(m >> 24); \
128
+ */
100
+ sum1 += (NTYPE)(n >> 32) * (MTYPE)(m >> 32); \
129
+ .min_access_size = 4,
101
+ sum1 += (NTYPE)(n >> 40) * (MTYPE)(m >> 40); \
130
+ .max_access_size = 4,
102
+ sum1 += (NTYPE)(n >> 48) * (MTYPE)(m >> 48); \
131
+ .unaligned = false,
103
+ sum1 += (NTYPE)(n >> 56) * (MTYPE)(m >> 56); \
132
+ },
104
+ if (neg) { \
133
+};
105
+ sum0 = (uint32_t)a - sum0, sum1 = (uint32_t)(a >> 32) - sum1; \
134
+
106
+ } else { \
135
+static void imx2_wdt_realize(DeviceState *dev, Error **errp)
107
+ sum0 = (uint32_t)a + sum0, sum1 = (uint32_t)(a >> 32) + sum1; \
136
+{
108
+ } \
137
+ IMX2WdtState *s = IMX2_WDT(dev);
109
+ return ((uint64_t)sum1 << 32) | sum0; \
138
+
139
+ memory_region_init_io(&s->mmio, OBJECT(dev),
140
+ &imx2_wdt_ops, s,
141
+ TYPE_IMX2_WDT".mmio",
142
+ IMX2_WDT_REG_NUM * sizeof(uint16_t));
143
+ sysbus_init_mmio(SYS_BUS_DEVICE(dev), &s->mmio);
144
+}
110
+}
145
+
111
+
146
+static void imx2_wdt_class_init(ObjectClass *klass, void *data)
112
+#define DEF_IMOP_64(NAME, NTYPE, MTYPE) \
147
+{
113
+static uint64_t NAME(uint64_t n, uint64_t m, uint64_t a, uint8_t p, bool neg) \
148
+ DeviceClass *dc = DEVICE_CLASS(klass);
114
+{ \
149
+
115
+ uint64_t sum = 0; \
150
+ dc->realize = imx2_wdt_realize;
116
+ /* Apply P to N as a mask, making the inactive elements 0. */ \
151
+ set_bit(DEVICE_CATEGORY_MISC, dc->categories);
117
+ n &= expand_pred_h(p); \
118
+ sum += (NTYPE)(n >> 0) * (MTYPE)(m >> 0); \
119
+ sum += (NTYPE)(n >> 16) * (MTYPE)(m >> 16); \
120
+ sum += (NTYPE)(n >> 32) * (MTYPE)(m >> 32); \
121
+ sum += (NTYPE)(n >> 48) * (MTYPE)(m >> 48); \
122
+ return neg ? a - sum : a + sum; \
152
+}
123
+}
153
+
124
+
154
+static const TypeInfo imx2_wdt_info = {
125
+DEF_IMOP_32(smopa_s, int8_t, int8_t)
155
+ .name = TYPE_IMX2_WDT,
126
+DEF_IMOP_32(umopa_s, uint8_t, uint8_t)
156
+ .parent = TYPE_SYS_BUS_DEVICE,
127
+DEF_IMOP_32(sumopa_s, int8_t, uint8_t)
157
+ .instance_size = sizeof(IMX2WdtState),
128
+DEF_IMOP_32(usmopa_s, uint8_t, int8_t)
158
+ .class_init = imx2_wdt_class_init,
159
+};
160
+
129
+
161
+static WatchdogTimerModel model = {
130
+DEF_IMOP_64(smopa_d, int16_t, int16_t)
162
+ .wdt_name = "imx2-watchdog",
131
+DEF_IMOP_64(umopa_d, uint16_t, uint16_t)
163
+ .wdt_description = "i.MX2 Watchdog",
132
+DEF_IMOP_64(sumopa_d, int16_t, uint16_t)
164
+};
133
+DEF_IMOP_64(usmopa_d, uint16_t, int16_t)
165
+
134
+
166
+static void imx2_wdt_register_type(void)
135
+#define DEF_IMOPH(NAME) \
167
+{
136
+ void HELPER(sme_##NAME)(void *vza, void *vzn, void *vzm, void *vpn, \
168
+ watchdog_add_model(&model);
137
+ void *vpm, uint32_t desc) \
169
+ type_register_static(&imx2_wdt_info);
138
+ { do_imopa(vza, vzn, vzm, vpn, vpm, desc, NAME); }
170
+}
139
+
171
+type_init(imx2_wdt_register_type)
140
+DEF_IMOPH(smopa_s)
141
+DEF_IMOPH(umopa_s)
142
+DEF_IMOPH(sumopa_s)
143
+DEF_IMOPH(usmopa_s)
144
+DEF_IMOPH(smopa_d)
145
+DEF_IMOPH(umopa_d)
146
+DEF_IMOPH(sumopa_d)
147
+DEF_IMOPH(usmopa_d)
148
diff --git a/target/arm/translate-sme.c b/target/arm/translate-sme.c
149
index XXXXXXX..XXXXXXX 100644
150
--- a/target/arm/translate-sme.c
151
+++ b/target/arm/translate-sme.c
152
@@ -XXX,XX +XXX,XX @@ TRANS_FEAT(FMOPA_d, aa64_sme_f64f64, do_outprod_fpst, a, MO_64, gen_helper_sme_f
153
154
/* TODO: FEAT_EBF16 */
155
TRANS_FEAT(BFMOPA, aa64_sme, do_outprod, a, MO_32, gen_helper_sme_bfmopa)
156
+
157
+TRANS_FEAT(SMOPA_s, aa64_sme, do_outprod, a, MO_32, gen_helper_sme_smopa_s)
158
+TRANS_FEAT(UMOPA_s, aa64_sme, do_outprod, a, MO_32, gen_helper_sme_umopa_s)
159
+TRANS_FEAT(SUMOPA_s, aa64_sme, do_outprod, a, MO_32, gen_helper_sme_sumopa_s)
160
+TRANS_FEAT(USMOPA_s, aa64_sme, do_outprod, a, MO_32, gen_helper_sme_usmopa_s)
161
+
162
+TRANS_FEAT(SMOPA_d, aa64_sme_i16i64, do_outprod, a, MO_64, gen_helper_sme_smopa_d)
163
+TRANS_FEAT(UMOPA_d, aa64_sme_i16i64, do_outprod, a, MO_64, gen_helper_sme_umopa_d)
164
+TRANS_FEAT(SUMOPA_d, aa64_sme_i16i64, do_outprod, a, MO_64, gen_helper_sme_sumopa_d)
165
+TRANS_FEAT(USMOPA_d, aa64_sme_i16i64, do_outprod, a, MO_64, gen_helper_sme_usmopa_d)
172
--
166
--
173
2.16.1
167
2.25.1
174
175
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Define ZCR_EL[1-3].
3
This is an SVE instruction that operates using the SVE vector
4
length but that it is present only if SME is implemented.
4
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
5
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Message-id: 20220708151540.18136-29-richard.henderson@linaro.org
7
Message-id: 20180123035349.24538-5-richard.henderson@linaro.org
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
---
10
---
10
target/arm/cpu.h | 5 ++
11
target/arm/sve.decode | 20 +++++++++++++
11
target/arm/helper.c | 131 ++++++++++++++++++++++++++++++++++++++++++++++++++++
12
target/arm/translate-sve.c | 57 ++++++++++++++++++++++++++++++++++++++
12
2 files changed, 136 insertions(+)
13
2 files changed, 77 insertions(+)
13
14
14
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
15
diff --git a/target/arm/sve.decode b/target/arm/sve.decode
15
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
16
--- a/target/arm/cpu.h
17
--- a/target/arm/sve.decode
17
+++ b/target/arm/cpu.h
18
+++ b/target/arm/sve.decode
18
@@ -XXX,XX +XXX,XX @@ typedef struct CPUARMState {
19
@@ -XXX,XX +XXX,XX @@ BFMLALT_zzxw 01100100 11 1 ..... 0100.1 ..... ..... @rrxr_3a esz=2
19
*/
20
20
float_status fp_status;
21
### SVE2 floating-point bfloat16 dot-product (indexed)
21
float_status standard_fp_status;
22
BFDOT_zzxz 01100100 01 1 ..... 010000 ..... ..... @rrxr_2 esz=2
22
+
23
+
23
+ /* ZCR_EL[1-3] */
24
+### SVE broadcast predicate element
24
+ uint64_t zcr_el[4];
25
+
25
} vfp;
26
+&psel esz pd pn pm rv imm
26
uint64_t exclusive_addr;
27
+%psel_rv 16:2 !function=plus_12
27
uint64_t exclusive_val;
28
+%psel_imm_b 22:2 19:2
28
@@ -XXX,XX +XXX,XX @@ void pmccntr_sync(CPUARMState *env);
29
+%psel_imm_h 22:2 20:1
29
#define CPTR_TCPAC (1U << 31)
30
+%psel_imm_s 22:2
30
#define CPTR_TTA (1U << 20)
31
+%psel_imm_d 23:1
31
#define CPTR_TFP (1U << 10)
32
+@psel ........ .. . ... .. .. pn:4 . pm:4 . pd:4 \
32
+#define CPTR_TZ (1U << 8) /* CPTR_EL2 */
33
+ &psel rv=%psel_rv
33
+#define CPTR_EZ (1U << 8) /* CPTR_EL3 */
34
+
34
35
+PSEL 00100101 .. 1 ..1 .. 01 .... 0 .... 0 .... \
35
#define MDCR_EPMAD (1U << 21)
36
+ @psel esz=0 imm=%psel_imm_b
36
#define MDCR_EDAD (1U << 20)
37
+PSEL 00100101 .. 1 .10 .. 01 .... 0 .... 0 .... \
37
diff --git a/target/arm/helper.c b/target/arm/helper.c
38
+ @psel esz=1 imm=%psel_imm_h
39
+PSEL 00100101 .. 1 100 .. 01 .... 0 .... 0 .... \
40
+ @psel esz=2 imm=%psel_imm_s
41
+PSEL 00100101 .1 1 000 .. 01 .... 0 .... 0 .... \
42
+ @psel esz=3 imm=%psel_imm_d
43
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
38
index XXXXXXX..XXXXXXX 100644
44
index XXXXXXX..XXXXXXX 100644
39
--- a/target/arm/helper.c
45
--- a/target/arm/translate-sve.c
40
+++ b/target/arm/helper.c
46
+++ b/target/arm/translate-sve.c
41
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo debug_lpae_cp_reginfo[] = {
47
@@ -XXX,XX +XXX,XX @@ static bool do_BFMLAL_zzxw(DisasContext *s, arg_rrxr_esz *a, bool sel)
42
REGINFO_SENTINEL
48
43
};
49
TRANS_FEAT(BFMLALB_zzxw, aa64_sve_bf16, do_BFMLAL_zzxw, a, false)
44
50
TRANS_FEAT(BFMLALT_zzxw, aa64_sve_bf16, do_BFMLAL_zzxw, a, true)
45
+/* Return the exception level to which SVE-disabled exceptions should
51
+
46
+ * be taken, or 0 if SVE is enabled.
52
+static bool trans_PSEL(DisasContext *s, arg_psel *a)
47
+ */
48
+static int sve_exception_el(CPUARMState *env)
49
+{
53
+{
50
+#ifndef CONFIG_USER_ONLY
54
+ int vl = vec_full_reg_size(s);
51
+ unsigned current_el = arm_current_el(env);
55
+ int pl = pred_gvec_reg_size(s);
56
+ int elements = vl >> a->esz;
57
+ TCGv_i64 tmp, didx, dbit;
58
+ TCGv_ptr ptr;
52
+
59
+
53
+ /* The CPACR.ZEN controls traps to EL1:
60
+ if (!dc_isar_feature(aa64_sme, s)) {
54
+ * 0, 2 : trap EL0 and EL1 accesses
61
+ return false;
55
+ * 1 : trap only EL0 accesses
62
+ }
56
+ * 3 : trap no accesses
63
+ if (!sve_access_check(s)) {
57
+ */
64
+ return true;
58
+ switch (extract32(env->cp15.cpacr_el1, 16, 2)) {
59
+ default:
60
+ if (current_el <= 1) {
61
+ /* Trap to PL1, which might be EL1 or EL3 */
62
+ if (arm_is_secure(env) && !arm_el_is_aa64(env, 3)) {
63
+ return 3;
64
+ }
65
+ return 1;
66
+ }
67
+ break;
68
+ case 1:
69
+ if (current_el == 0) {
70
+ return 1;
71
+ }
72
+ break;
73
+ case 3:
74
+ break;
75
+ }
65
+ }
76
+
66
+
77
+ /* Similarly for CPACR.FPEN, after having checked ZEN. */
67
+ tmp = tcg_temp_new_i64();
78
+ switch (extract32(env->cp15.cpacr_el1, 20, 2)) {
68
+ dbit = tcg_temp_new_i64();
79
+ default:
69
+ didx = tcg_temp_new_i64();
80
+ if (current_el <= 1) {
70
+ ptr = tcg_temp_new_ptr();
81
+ if (arm_is_secure(env) && !arm_el_is_aa64(env, 3)) {
71
+
82
+ return 3;
72
+ /* Compute the predicate element. */
83
+ }
73
+ tcg_gen_addi_i64(tmp, cpu_reg(s, a->rv), a->imm);
84
+ return 1;
74
+ if (is_power_of_2(elements)) {
85
+ }
75
+ tcg_gen_andi_i64(tmp, tmp, elements - 1);
86
+ break;
76
+ } else {
87
+ case 1:
77
+ tcg_gen_remu_i64(tmp, tmp, tcg_constant_i64(elements));
88
+ if (current_el == 0) {
89
+ return 1;
90
+ }
91
+ break;
92
+ case 3:
93
+ break;
94
+ }
78
+ }
95
+
79
+
96
+ /* CPTR_EL2. Check both TZ and TFP. */
80
+ /* Extract the predicate byte and bit indices. */
97
+ if (current_el <= 2
81
+ tcg_gen_shli_i64(tmp, tmp, a->esz);
98
+ && (env->cp15.cptr_el[2] & (CPTR_TFP | CPTR_TZ))
82
+ tcg_gen_andi_i64(dbit, tmp, 7);
99
+ && !arm_is_secure_below_el3(env)) {
83
+ tcg_gen_shri_i64(didx, tmp, 3);
100
+ return 2;
84
+ if (HOST_BIG_ENDIAN) {
85
+ tcg_gen_xori_i64(didx, didx, 7);
101
+ }
86
+ }
102
+
87
+
103
+ /* CPTR_EL3. Check both EZ and TFP. */
88
+ /* Load the predicate word. */
104
+ if (!(env->cp15.cptr_el[3] & CPTR_EZ)
89
+ tcg_gen_trunc_i64_ptr(ptr, didx);
105
+ || (env->cp15.cptr_el[3] & CPTR_TFP)) {
90
+ tcg_gen_add_ptr(ptr, ptr, cpu_env);
106
+ return 3;
91
+ tcg_gen_ld8u_i64(tmp, ptr, pred_full_reg_offset(s, a->pm));
107
+ }
92
+
108
+#endif
93
+ /* Extract the predicate bit and replicate to MO_64. */
109
+ return 0;
94
+ tcg_gen_shr_i64(tmp, tmp, dbit);
95
+ tcg_gen_andi_i64(tmp, tmp, 1);
96
+ tcg_gen_neg_i64(tmp, tmp);
97
+
98
+ /* Apply to either copy the source, or write zeros. */
99
+ tcg_gen_gvec_ands(MO_64, pred_full_reg_offset(s, a->pd),
100
+ pred_full_reg_offset(s, a->pn), tmp, pl, pl);
101
+
102
+ tcg_temp_free_i64(tmp);
103
+ tcg_temp_free_i64(dbit);
104
+ tcg_temp_free_i64(didx);
105
+ tcg_temp_free_ptr(ptr);
106
+ return true;
110
+}
107
+}
111
+
112
+static CPAccessResult zcr_access(CPUARMState *env, const ARMCPRegInfo *ri,
113
+ bool isread)
114
+{
115
+ switch (sve_exception_el(env)) {
116
+ case 3:
117
+ return CP_ACCESS_TRAP_EL3;
118
+ case 2:
119
+ return CP_ACCESS_TRAP_EL2;
120
+ case 1:
121
+ return CP_ACCESS_TRAP;
122
+ }
123
+ return CP_ACCESS_OK;
124
+}
125
+
126
+static void zcr_write(CPUARMState *env, const ARMCPRegInfo *ri,
127
+ uint64_t value)
128
+{
129
+ /* Bits other than [3:0] are RAZ/WI. */
130
+ raw_write(env, ri, value & 0xf);
131
+}
132
+
133
+static const ARMCPRegInfo zcr_el1_reginfo = {
134
+ .name = "ZCR_EL1", .state = ARM_CP_STATE_AA64,
135
+ .opc0 = 3, .opc1 = 0, .crn = 1, .crm = 2, .opc2 = 0,
136
+ .access = PL1_RW, .accessfn = zcr_access, .type = ARM_CP_64BIT,
137
+ .fieldoffset = offsetof(CPUARMState, vfp.zcr_el[1]),
138
+ .writefn = zcr_write, .raw_writefn = raw_write
139
+};
140
+
141
+static const ARMCPRegInfo zcr_el2_reginfo = {
142
+ .name = "ZCR_EL2", .state = ARM_CP_STATE_AA64,
143
+ .opc0 = 3, .opc1 = 4, .crn = 1, .crm = 2, .opc2 = 0,
144
+ .access = PL2_RW, .accessfn = zcr_access, .type = ARM_CP_64BIT,
145
+ .fieldoffset = offsetof(CPUARMState, vfp.zcr_el[2]),
146
+ .writefn = zcr_write, .raw_writefn = raw_write
147
+};
148
+
149
+static const ARMCPRegInfo zcr_no_el2_reginfo = {
150
+ .name = "ZCR_EL2", .state = ARM_CP_STATE_AA64,
151
+ .opc0 = 3, .opc1 = 4, .crn = 1, .crm = 2, .opc2 = 0,
152
+ .access = PL2_RW, .type = ARM_CP_64BIT,
153
+ .readfn = arm_cp_read_zero, .writefn = arm_cp_write_ignore
154
+};
155
+
156
+static const ARMCPRegInfo zcr_el3_reginfo = {
157
+ .name = "ZCR_EL3", .state = ARM_CP_STATE_AA64,
158
+ .opc0 = 3, .opc1 = 6, .crn = 1, .crm = 2, .opc2 = 0,
159
+ .access = PL3_RW, .accessfn = zcr_access, .type = ARM_CP_64BIT,
160
+ .fieldoffset = offsetof(CPUARMState, vfp.zcr_el[3]),
161
+ .writefn = zcr_write, .raw_writefn = raw_write
162
+};
163
+
164
void hw_watchpoint_update(ARMCPU *cpu, int n)
165
{
166
CPUARMState *env = &cpu->env;
167
@@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu)
168
}
169
define_one_arm_cp_reg(cpu, &sctlr);
170
}
171
+
172
+ if (arm_feature(env, ARM_FEATURE_SVE)) {
173
+ define_one_arm_cp_reg(cpu, &zcr_el1_reginfo);
174
+ if (arm_feature(env, ARM_FEATURE_EL2)) {
175
+ define_one_arm_cp_reg(cpu, &zcr_el2_reginfo);
176
+ } else {
177
+ define_one_arm_cp_reg(cpu, &zcr_no_el2_reginfo);
178
+ }
179
+ if (arm_feature(env, ARM_FEATURE_EL3)) {
180
+ define_one_arm_cp_reg(cpu, &zcr_el3_reginfo);
181
+ }
182
+ }
183
}
184
185
void arm_cpu_register_gdb_regs_for_features(ARMCPU *cpu)
186
--
108
--
187
2.16.1
109
2.25.1
188
189
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Save the high parts of the Zregs and all of the Pregs.
3
This is an SVE instruction that operates using the SVE vector
4
The ZCR_ELx registers are migrated via the CP mechanism.
4
length but that it is present only if SME is implemented.
5
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
8
Message-id: 20220708151540.18136-30-richard.henderson@linaro.org
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Message-id: 20180123035349.24538-4-richard.henderson@linaro.org
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
10
---
12
target/arm/machine.c | 53 ++++++++++++++++++++++++++++++++++++++++++++++++++++
11
target/arm/helper-sve.h | 2 ++
13
1 file changed, 53 insertions(+)
12
target/arm/sve.decode | 1 +
13
target/arm/sve_helper.c | 16 ++++++++++++++++
14
target/arm/translate-sve.c | 2 ++
15
4 files changed, 21 insertions(+)
14
16
15
diff --git a/target/arm/machine.c b/target/arm/machine.c
17
diff --git a/target/arm/helper-sve.h b/target/arm/helper-sve.h
16
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/machine.c
19
--- a/target/arm/helper-sve.h
18
+++ b/target/arm/machine.c
20
+++ b/target/arm/helper-sve.h
19
@@ -XXX,XX +XXX,XX @@ static const VMStateDescription vmstate_iwmmxt = {
21
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_4(sve_revh_d, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32)
20
}
22
21
};
23
DEF_HELPER_FLAGS_4(sve_revw_d, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32)
22
24
23
+#ifdef TARGET_AARCH64
25
+DEF_HELPER_FLAGS_4(sme_revd_q, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32)
24
+/* The expression ARM_MAX_VQ - 2 is 0 for pure AArch32 build,
25
+ * and ARMPredicateReg is actively empty. This triggers errors
26
+ * in the expansion of the VMSTATE macros.
27
+ */
28
+
26
+
29
+static bool sve_needed(void *opaque)
27
DEF_HELPER_FLAGS_4(sve_rbit_b, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32)
28
DEF_HELPER_FLAGS_4(sve_rbit_h, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32)
29
DEF_HELPER_FLAGS_4(sve_rbit_s, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32)
30
diff --git a/target/arm/sve.decode b/target/arm/sve.decode
31
index XXXXXXX..XXXXXXX 100644
32
--- a/target/arm/sve.decode
33
+++ b/target/arm/sve.decode
34
@@ -XXX,XX +XXX,XX @@ REVB 00000101 .. 1001 00 100 ... ..... ..... @rd_pg_rn
35
REVH 00000101 .. 1001 01 100 ... ..... ..... @rd_pg_rn
36
REVW 00000101 .. 1001 10 100 ... ..... ..... @rd_pg_rn
37
RBIT 00000101 .. 1001 11 100 ... ..... ..... @rd_pg_rn
38
+REVD 00000101 00 1011 10 100 ... ..... ..... @rd_pg_rn_e0
39
40
# SVE vector splice (predicated, destructive)
41
SPLICE 00000101 .. 101 100 100 ... ..... ..... @rdn_pg_rm
42
diff --git a/target/arm/sve_helper.c b/target/arm/sve_helper.c
43
index XXXXXXX..XXXXXXX 100644
44
--- a/target/arm/sve_helper.c
45
+++ b/target/arm/sve_helper.c
46
@@ -XXX,XX +XXX,XX @@ DO_ZPZ_D(sve_revh_d, uint64_t, hswap64)
47
48
DO_ZPZ_D(sve_revw_d, uint64_t, wswap64)
49
50
+void HELPER(sme_revd_q)(void *vd, void *vn, void *vg, uint32_t desc)
30
+{
51
+{
31
+ ARMCPU *cpu = opaque;
52
+ intptr_t i, opr_sz = simd_oprsz(desc) / 8;
32
+ CPUARMState *env = &cpu->env;
53
+ uint64_t *d = vd, *n = vn;
54
+ uint8_t *pg = vg;
33
+
55
+
34
+ return arm_feature(env, ARM_FEATURE_SVE);
56
+ for (i = 0; i < opr_sz; i += 2) {
57
+ if (pg[H1(i)] & 1) {
58
+ uint64_t n0 = n[i + 0];
59
+ uint64_t n1 = n[i + 1];
60
+ d[i + 0] = n1;
61
+ d[i + 1] = n0;
62
+ }
63
+ }
35
+}
64
+}
36
+
65
+
37
+/* The first two words of each Zreg is stored in VFP state. */
66
DO_ZPZ(sve_rbit_b, uint8_t, H1, revbit8)
38
+static const VMStateDescription vmstate_zreg_hi_reg = {
67
DO_ZPZ(sve_rbit_h, uint16_t, H1_2, revbit16)
39
+ .name = "cpu/sve/zreg_hi",
68
DO_ZPZ(sve_rbit_s, uint32_t, H1_4, revbit32)
40
+ .version_id = 1,
69
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
41
+ .minimum_version_id = 1,
70
index XXXXXXX..XXXXXXX 100644
42
+ .fields = (VMStateField[]) {
71
--- a/target/arm/translate-sve.c
43
+ VMSTATE_UINT64_SUB_ARRAY(d, ARMVectorReg, 2, ARM_MAX_VQ - 2),
72
+++ b/target/arm/translate-sve.c
44
+ VMSTATE_END_OF_LIST()
73
@@ -XXX,XX +XXX,XX @@ TRANS_FEAT(REVH, aa64_sve, gen_gvec_ool_arg_zpz, revh_fns[a->esz], a, 0)
45
+ }
74
TRANS_FEAT(REVW, aa64_sve, gen_gvec_ool_arg_zpz,
46
+};
75
a->esz == 3 ? gen_helper_sve_revw_d : NULL, a, 0)
76
77
+TRANS_FEAT(REVD, aa64_sme, gen_gvec_ool_arg_zpz, gen_helper_sme_revd_q, a, 0)
47
+
78
+
48
+static const VMStateDescription vmstate_preg_reg = {
79
TRANS_FEAT(SPLICE, aa64_sve, gen_gvec_ool_arg_zpzz,
49
+ .name = "cpu/sve/preg",
80
gen_helper_sve_splice, a, a->esz)
50
+ .version_id = 1,
81
51
+ .minimum_version_id = 1,
52
+ .fields = (VMStateField[]) {
53
+ VMSTATE_UINT64_ARRAY(p, ARMPredicateReg, 2 * ARM_MAX_VQ / 8),
54
+ VMSTATE_END_OF_LIST()
55
+ }
56
+};
57
+
58
+static const VMStateDescription vmstate_sve = {
59
+ .name = "cpu/sve",
60
+ .version_id = 1,
61
+ .minimum_version_id = 1,
62
+ .needed = sve_needed,
63
+ .fields = (VMStateField[]) {
64
+ VMSTATE_STRUCT_ARRAY(env.vfp.zregs, ARMCPU, 32, 0,
65
+ vmstate_zreg_hi_reg, ARMVectorReg),
66
+ VMSTATE_STRUCT_ARRAY(env.vfp.pregs, ARMCPU, 17, 0,
67
+ vmstate_preg_reg, ARMPredicateReg),
68
+ VMSTATE_END_OF_LIST()
69
+ }
70
+};
71
+#endif /* AARCH64 */
72
+
73
static bool m_needed(void *opaque)
74
{
75
ARMCPU *cpu = opaque;
76
@@ -XXX,XX +XXX,XX @@ const VMStateDescription vmstate_arm_cpu = {
77
&vmstate_pmsav7,
78
&vmstate_pmsav8,
79
&vmstate_m_security,
80
+#ifdef TARGET_AARCH64
81
+ &vmstate_sve,
82
+#endif
83
NULL
84
}
85
};
86
--
82
--
87
2.16.1
83
2.25.1
88
89
diff view generated by jsdifflib
1
From: Ard Biesheuvel <ard.biesheuvel@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
This implements emulation of the new SM3 instructions that have
3
This is an SVE instruction that operates using the SVE vector
4
been added as an optional extension to the ARMv8 Crypto Extensions
4
length but that it is present only if SME is implemented.
5
in ARM v8.2.
6
5
7
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
8
Message-id: 20180207111729.15737-4-ard.biesheuvel@linaro.org
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220708151540.18136-31-richard.henderson@linaro.org
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
10
---
12
target/arm/cpu.h | 1 +
11
target/arm/helper.h | 18 +++++++
13
target/arm/helper.h | 4 ++
12
target/arm/sve.decode | 5 ++
14
target/arm/crypto_helper.c | 96 ++++++++++++++++++++++++++++++++++++++++++++++
13
target/arm/translate-sve.c | 102 +++++++++++++++++++++++++++++++++++++
15
target/arm/translate-a64.c | 88 ++++++++++++++++++++++++++++++++++++++++--
14
target/arm/vec_helper.c | 24 +++++++++
16
4 files changed, 186 insertions(+), 3 deletions(-)
15
4 files changed, 149 insertions(+)
17
16
18
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
19
index XXXXXXX..XXXXXXX 100644
20
--- a/target/arm/cpu.h
21
+++ b/target/arm/cpu.h
22
@@ -XXX,XX +XXX,XX @@ enum arm_features {
23
ARM_FEATURE_SVE, /* has Scalable Vector Extension */
24
ARM_FEATURE_V8_SHA512, /* implements SHA512 part of v8 Crypto Extensions */
25
ARM_FEATURE_V8_SHA3, /* implements SHA3 part of v8 Crypto Extensions */
26
+ ARM_FEATURE_V8_SM3, /* implements SM3 part of v8 Crypto Extensions */
27
};
28
29
static inline int arm_feature(CPUARMState *env, int feature)
30
diff --git a/target/arm/helper.h b/target/arm/helper.h
17
diff --git a/target/arm/helper.h b/target/arm/helper.h
31
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
32
--- a/target/arm/helper.h
19
--- a/target/arm/helper.h
33
+++ b/target/arm/helper.h
20
+++ b/target/arm/helper.h
34
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_3(crypto_sha512h2, TCG_CALL_NO_RWG, void, ptr, ptr, ptr)
21
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_6(gvec_bfmlal, TCG_CALL_NO_RWG,
35
DEF_HELPER_FLAGS_2(crypto_sha512su0, TCG_CALL_NO_RWG, void, ptr, ptr)
22
DEF_HELPER_FLAGS_6(gvec_bfmlal_idx, TCG_CALL_NO_RWG,
36
DEF_HELPER_FLAGS_3(crypto_sha512su1, TCG_CALL_NO_RWG, void, ptr, ptr, ptr)
23
void, ptr, ptr, ptr, ptr, ptr, i32)
37
24
38
+DEF_HELPER_FLAGS_5(crypto_sm3tt, TCG_CALL_NO_RWG, void, ptr, ptr, ptr, i32, i32)
25
+DEF_HELPER_FLAGS_5(gvec_sclamp_b, TCG_CALL_NO_RWG,
39
+DEF_HELPER_FLAGS_3(crypto_sm3partw1, TCG_CALL_NO_RWG, void, ptr, ptr, ptr)
26
+ void, ptr, ptr, ptr, ptr, i32)
40
+DEF_HELPER_FLAGS_3(crypto_sm3partw2, TCG_CALL_NO_RWG, void, ptr, ptr, ptr)
27
+DEF_HELPER_FLAGS_5(gvec_sclamp_h, TCG_CALL_NO_RWG,
41
+
28
+ void, ptr, ptr, ptr, ptr, i32)
42
DEF_HELPER_FLAGS_3(crc32, TCG_CALL_NO_RWG_SE, i32, i32, i32, i32)
29
+DEF_HELPER_FLAGS_5(gvec_sclamp_s, TCG_CALL_NO_RWG,
43
DEF_HELPER_FLAGS_3(crc32c, TCG_CALL_NO_RWG_SE, i32, i32, i32, i32)
30
+ void, ptr, ptr, ptr, ptr, i32)
44
DEF_HELPER_2(dc_zva, void, env, i64)
31
+DEF_HELPER_FLAGS_5(gvec_sclamp_d, TCG_CALL_NO_RWG,
45
diff --git a/target/arm/crypto_helper.c b/target/arm/crypto_helper.c
32
+ void, ptr, ptr, ptr, ptr, i32)
46
index XXXXXXX..XXXXXXX 100644
33
+
47
--- a/target/arm/crypto_helper.c
34
+DEF_HELPER_FLAGS_5(gvec_uclamp_b, TCG_CALL_NO_RWG,
48
+++ b/target/arm/crypto_helper.c
35
+ void, ptr, ptr, ptr, ptr, i32)
49
@@ -XXX,XX +XXX,XX @@ void HELPER(crypto_sha512su1)(void *vd, void *vn, void *vm)
36
+DEF_HELPER_FLAGS_5(gvec_uclamp_h, TCG_CALL_NO_RWG,
50
rd[0] += s1_512(rn[0]) + rm[0];
37
+ void, ptr, ptr, ptr, ptr, i32)
51
rd[1] += s1_512(rn[1]) + rm[1];
38
+DEF_HELPER_FLAGS_5(gvec_uclamp_s, TCG_CALL_NO_RWG,
39
+ void, ptr, ptr, ptr, ptr, i32)
40
+DEF_HELPER_FLAGS_5(gvec_uclamp_d, TCG_CALL_NO_RWG,
41
+ void, ptr, ptr, ptr, ptr, i32)
42
+
43
#ifdef TARGET_AARCH64
44
#include "helper-a64.h"
45
#include "helper-sve.h"
46
diff --git a/target/arm/sve.decode b/target/arm/sve.decode
47
index XXXXXXX..XXXXXXX 100644
48
--- a/target/arm/sve.decode
49
+++ b/target/arm/sve.decode
50
@@ -XXX,XX +XXX,XX @@ PSEL 00100101 .. 1 100 .. 01 .... 0 .... 0 .... \
51
@psel esz=2 imm=%psel_imm_s
52
PSEL 00100101 .1 1 000 .. 01 .... 0 .... 0 .... \
53
@psel esz=3 imm=%psel_imm_d
54
+
55
+### SVE clamp
56
+
57
+SCLAMP 01000100 .. 0 ..... 110000 ..... ..... @rda_rn_rm
58
+UCLAMP 01000100 .. 0 ..... 110001 ..... ..... @rda_rn_rm
59
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
60
index XXXXXXX..XXXXXXX 100644
61
--- a/target/arm/translate-sve.c
62
+++ b/target/arm/translate-sve.c
63
@@ -XXX,XX +XXX,XX @@ static bool trans_PSEL(DisasContext *s, arg_psel *a)
64
tcg_temp_free_ptr(ptr);
65
return true;
52
}
66
}
53
+
67
+
54
+void HELPER(crypto_sm3partw1)(void *vd, void *vn, void *vm)
68
+static void gen_sclamp_i32(TCGv_i32 d, TCGv_i32 n, TCGv_i32 m, TCGv_i32 a)
55
+{
69
+{
56
+ uint64_t *rd = vd;
70
+ tcg_gen_smax_i32(d, a, n);
57
+ uint64_t *rn = vn;
71
+ tcg_gen_smin_i32(d, d, m);
58
+ uint64_t *rm = vm;
72
+}
59
+ union CRYPTO_STATE d = { .l = { rd[0], rd[1] } };
73
+
60
+ union CRYPTO_STATE n = { .l = { rn[0], rn[1] } };
74
+static void gen_sclamp_i64(TCGv_i64 d, TCGv_i64 n, TCGv_i64 m, TCGv_i64 a)
61
+ union CRYPTO_STATE m = { .l = { rm[0], rm[1] } };
75
+{
62
+ uint32_t t;
76
+ tcg_gen_smax_i64(d, a, n);
63
+
77
+ tcg_gen_smin_i64(d, d, m);
64
+ t = CR_ST_WORD(d, 0) ^ CR_ST_WORD(n, 0) ^ ror32(CR_ST_WORD(m, 1), 17);
78
+}
65
+ CR_ST_WORD(d, 0) = t ^ ror32(t, 17) ^ ror32(t, 9);
79
+
66
+
80
+static void gen_sclamp_vec(unsigned vece, TCGv_vec d, TCGv_vec n,
67
+ t = CR_ST_WORD(d, 1) ^ CR_ST_WORD(n, 1) ^ ror32(CR_ST_WORD(m, 2), 17);
81
+ TCGv_vec m, TCGv_vec a)
68
+ CR_ST_WORD(d, 1) = t ^ ror32(t, 17) ^ ror32(t, 9);
82
+{
69
+
83
+ tcg_gen_smax_vec(vece, d, a, n);
70
+ t = CR_ST_WORD(d, 2) ^ CR_ST_WORD(n, 2) ^ ror32(CR_ST_WORD(m, 3), 17);
84
+ tcg_gen_smin_vec(vece, d, d, m);
71
+ CR_ST_WORD(d, 2) = t ^ ror32(t, 17) ^ ror32(t, 9);
85
+}
72
+
86
+
73
+ t = CR_ST_WORD(d, 3) ^ CR_ST_WORD(n, 3) ^ ror32(CR_ST_WORD(d, 0), 17);
87
+static void gen_sclamp(unsigned vece, uint32_t d, uint32_t n, uint32_t m,
74
+ CR_ST_WORD(d, 3) = t ^ ror32(t, 17) ^ ror32(t, 9);
88
+ uint32_t a, uint32_t oprsz, uint32_t maxsz)
75
+
89
+{
76
+ rd[0] = d.l[0];
90
+ static const TCGOpcode vecop[] = {
77
+ rd[1] = d.l[1];
91
+ INDEX_op_smin_vec, INDEX_op_smax_vec, 0
78
+}
92
+ };
79
+
93
+ static const GVecGen4 ops[4] = {
80
+void HELPER(crypto_sm3partw2)(void *vd, void *vn, void *vm)
94
+ { .fniv = gen_sclamp_vec,
81
+{
95
+ .fno = gen_helper_gvec_sclamp_b,
82
+ uint64_t *rd = vd;
96
+ .opt_opc = vecop,
83
+ uint64_t *rn = vn;
97
+ .vece = MO_8 },
84
+ uint64_t *rm = vm;
98
+ { .fniv = gen_sclamp_vec,
85
+ union CRYPTO_STATE d = { .l = { rd[0], rd[1] } };
99
+ .fno = gen_helper_gvec_sclamp_h,
86
+ union CRYPTO_STATE n = { .l = { rn[0], rn[1] } };
100
+ .opt_opc = vecop,
87
+ union CRYPTO_STATE m = { .l = { rm[0], rm[1] } };
101
+ .vece = MO_16 },
88
+ uint32_t t = CR_ST_WORD(n, 0) ^ ror32(CR_ST_WORD(m, 0), 25);
102
+ { .fni4 = gen_sclamp_i32,
89
+
103
+ .fniv = gen_sclamp_vec,
90
+ CR_ST_WORD(d, 0) ^= t;
104
+ .fno = gen_helper_gvec_sclamp_s,
91
+ CR_ST_WORD(d, 1) ^= CR_ST_WORD(n, 1) ^ ror32(CR_ST_WORD(m, 1), 25);
105
+ .opt_opc = vecop,
92
+ CR_ST_WORD(d, 2) ^= CR_ST_WORD(n, 2) ^ ror32(CR_ST_WORD(m, 2), 25);
106
+ .vece = MO_32 },
93
+ CR_ST_WORD(d, 3) ^= CR_ST_WORD(n, 3) ^ ror32(CR_ST_WORD(m, 3), 25) ^
107
+ { .fni8 = gen_sclamp_i64,
94
+ ror32(t, 17) ^ ror32(t, 2) ^ ror32(t, 26);
108
+ .fniv = gen_sclamp_vec,
95
+
109
+ .fno = gen_helper_gvec_sclamp_d,
96
+ rd[0] = d.l[0];
110
+ .opt_opc = vecop,
97
+ rd[1] = d.l[1];
111
+ .vece = MO_64,
98
+}
112
+ .prefer_i64 = TCG_TARGET_REG_BITS == 64 }
99
+
113
+ };
100
+void HELPER(crypto_sm3tt)(void *vd, void *vn, void *vm, uint32_t imm2,
114
+ tcg_gen_gvec_4(d, n, m, a, oprsz, maxsz, &ops[vece]);
101
+ uint32_t opcode)
115
+}
102
+{
116
+
103
+ uint64_t *rd = vd;
117
+TRANS_FEAT(SCLAMP, aa64_sme, gen_gvec_fn_arg_zzzz, gen_sclamp, a)
104
+ uint64_t *rn = vn;
118
+
105
+ uint64_t *rm = vm;
119
+static void gen_uclamp_i32(TCGv_i32 d, TCGv_i32 n, TCGv_i32 m, TCGv_i32 a)
106
+ union CRYPTO_STATE d = { .l = { rd[0], rd[1] } };
120
+{
107
+ union CRYPTO_STATE n = { .l = { rn[0], rn[1] } };
121
+ tcg_gen_umax_i32(d, a, n);
108
+ union CRYPTO_STATE m = { .l = { rm[0], rm[1] } };
122
+ tcg_gen_umin_i32(d, d, m);
109
+ uint32_t t;
123
+}
110
+
124
+
111
+ assert(imm2 < 4);
125
+static void gen_uclamp_i64(TCGv_i64 d, TCGv_i64 n, TCGv_i64 m, TCGv_i64 a)
112
+
126
+{
113
+ if (opcode == 0 || opcode == 2) {
127
+ tcg_gen_umax_i64(d, a, n);
114
+ /* SM3TT1A, SM3TT2A */
128
+ tcg_gen_umin_i64(d, d, m);
115
+ t = par(CR_ST_WORD(d, 3), CR_ST_WORD(d, 2), CR_ST_WORD(d, 1));
129
+}
116
+ } else if (opcode == 1) {
130
+
117
+ /* SM3TT1B */
131
+static void gen_uclamp_vec(unsigned vece, TCGv_vec d, TCGv_vec n,
118
+ t = maj(CR_ST_WORD(d, 3), CR_ST_WORD(d, 2), CR_ST_WORD(d, 1));
132
+ TCGv_vec m, TCGv_vec a)
119
+ } else if (opcode == 3) {
133
+{
120
+ /* SM3TT2B */
134
+ tcg_gen_umax_vec(vece, d, a, n);
121
+ t = cho(CR_ST_WORD(d, 3), CR_ST_WORD(d, 2), CR_ST_WORD(d, 1));
135
+ tcg_gen_umin_vec(vece, d, d, m);
122
+ } else {
136
+}
123
+ g_assert_not_reached();
137
+
124
+ }
138
+static void gen_uclamp(unsigned vece, uint32_t d, uint32_t n, uint32_t m,
125
+
139
+ uint32_t a, uint32_t oprsz, uint32_t maxsz)
126
+ t += CR_ST_WORD(d, 0) + CR_ST_WORD(m, imm2);
140
+{
127
+
141
+ static const TCGOpcode vecop[] = {
128
+ CR_ST_WORD(d, 0) = CR_ST_WORD(d, 1);
142
+ INDEX_op_umin_vec, INDEX_op_umax_vec, 0
129
+
143
+ };
130
+ if (opcode < 2) {
144
+ static const GVecGen4 ops[4] = {
131
+ /* SM3TT1A, SM3TT1B */
145
+ { .fniv = gen_uclamp_vec,
132
+ t += CR_ST_WORD(n, 3) ^ ror32(CR_ST_WORD(d, 3), 20);
146
+ .fno = gen_helper_gvec_uclamp_b,
133
+
147
+ .opt_opc = vecop,
134
+ CR_ST_WORD(d, 1) = ror32(CR_ST_WORD(d, 2), 23);
148
+ .vece = MO_8 },
135
+ } else {
149
+ { .fniv = gen_uclamp_vec,
136
+ /* SM3TT2A, SM3TT2B */
150
+ .fno = gen_helper_gvec_uclamp_h,
137
+ t += CR_ST_WORD(n, 3);
151
+ .opt_opc = vecop,
138
+ t ^= rol32(t, 9) ^ rol32(t, 17);
152
+ .vece = MO_16 },
139
+
153
+ { .fni4 = gen_uclamp_i32,
140
+ CR_ST_WORD(d, 1) = ror32(CR_ST_WORD(d, 2), 13);
154
+ .fniv = gen_uclamp_vec,
141
+ }
155
+ .fno = gen_helper_gvec_uclamp_s,
142
+
156
+ .opt_opc = vecop,
143
+ CR_ST_WORD(d, 2) = CR_ST_WORD(d, 3);
157
+ .vece = MO_32 },
144
+ CR_ST_WORD(d, 3) = t;
158
+ { .fni8 = gen_uclamp_i64,
145
+
159
+ .fniv = gen_uclamp_vec,
146
+ rd[0] = d.l[0];
160
+ .fno = gen_helper_gvec_uclamp_d,
147
+ rd[1] = d.l[1];
161
+ .opt_opc = vecop,
148
+}
162
+ .vece = MO_64,
149
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
163
+ .prefer_i64 = TCG_TARGET_REG_BITS == 64 }
150
index XXXXXXX..XXXXXXX 100644
164
+ };
151
--- a/target/arm/translate-a64.c
165
+ tcg_gen_gvec_4(d, n, m, a, oprsz, maxsz, &ops[vece]);
152
+++ b/target/arm/translate-a64.c
166
+}
153
@@ -XXX,XX +XXX,XX @@ static void disas_crypto_three_reg_sha512(DisasContext *s, uint32_t insn)
167
+
154
break;
168
+TRANS_FEAT(UCLAMP, aa64_sme, gen_gvec_fn_arg_zzzz, gen_uclamp, a)
155
}
169
diff --git a/target/arm/vec_helper.c b/target/arm/vec_helper.c
156
} else {
170
index XXXXXXX..XXXXXXX 100644
157
- unallocated_encoding(s);
171
--- a/target/arm/vec_helper.c
158
- return;
172
+++ b/target/arm/vec_helper.c
159
+ switch (opcode) {
173
@@ -XXX,XX +XXX,XX @@ void HELPER(gvec_bfmlal_idx)(void *vd, void *vn, void *vm,
160
+ case 0: /* SM3PARTW1 */
161
+ feature = ARM_FEATURE_V8_SM3;
162
+ genfn = gen_helper_crypto_sm3partw1;
163
+ break;
164
+ case 1: /* SM3PARTW2 */
165
+ feature = ARM_FEATURE_V8_SM3;
166
+ genfn = gen_helper_crypto_sm3partw2;
167
+ break;
168
+ default:
169
+ unallocated_encoding(s);
170
+ return;
171
+ }
172
}
174
}
173
175
clear_tail(d, opr_sz, simd_maxsz(desc));
174
if (!arm_dc_feature(s, feature)) {
175
@@ -XXX,XX +XXX,XX @@ static void disas_crypto_four_reg(DisasContext *s, uint32_t insn)
176
case 1: /* BCAX */
177
feature = ARM_FEATURE_V8_SHA3;
178
break;
179
+ case 2: /* SM3SS1 */
180
+ feature = ARM_FEATURE_V8_SM3;
181
+ break;
182
default:
183
unallocated_encoding(s);
184
return;
185
@@ -XXX,XX +XXX,XX @@ static void disas_crypto_four_reg(DisasContext *s, uint32_t insn)
186
tcg_temp_free_i64(tcg_res[0]);
187
tcg_temp_free_i64(tcg_res[1]);
188
} else {
189
- g_assert_not_reached();
190
+ TCGv_i32 tcg_op1, tcg_op2, tcg_op3, tcg_res, tcg_zero;
191
+
192
+ tcg_op1 = tcg_temp_new_i32();
193
+ tcg_op2 = tcg_temp_new_i32();
194
+ tcg_op3 = tcg_temp_new_i32();
195
+ tcg_res = tcg_temp_new_i32();
196
+ tcg_zero = tcg_const_i32(0);
197
+
198
+ read_vec_element_i32(s, tcg_op1, rn, 3, MO_32);
199
+ read_vec_element_i32(s, tcg_op2, rm, 3, MO_32);
200
+ read_vec_element_i32(s, tcg_op3, ra, 3, MO_32);
201
+
202
+ tcg_gen_rotri_i32(tcg_res, tcg_op1, 20);
203
+ tcg_gen_add_i32(tcg_res, tcg_res, tcg_op2);
204
+ tcg_gen_add_i32(tcg_res, tcg_res, tcg_op3);
205
+ tcg_gen_rotri_i32(tcg_res, tcg_res, 25);
206
+
207
+ write_vec_element_i32(s, tcg_zero, rd, 0, MO_32);
208
+ write_vec_element_i32(s, tcg_zero, rd, 1, MO_32);
209
+ write_vec_element_i32(s, tcg_zero, rd, 2, MO_32);
210
+ write_vec_element_i32(s, tcg_res, rd, 3, MO_32);
211
+
212
+ tcg_temp_free_i32(tcg_op1);
213
+ tcg_temp_free_i32(tcg_op2);
214
+ tcg_temp_free_i32(tcg_op3);
215
+ tcg_temp_free_i32(tcg_res);
216
+ tcg_temp_free_i32(tcg_zero);
217
}
218
}
176
}
219
177
+
220
@@ -XXX,XX +XXX,XX @@ static void disas_crypto_xar(DisasContext *s, uint32_t insn)
178
+#define DO_CLAMP(NAME, TYPE) \
221
tcg_temp_free_i64(tcg_res[1]);
179
+void HELPER(NAME)(void *d, void *n, void *m, void *a, uint32_t desc) \
222
}
180
+{ \
223
181
+ intptr_t i, opr_sz = simd_oprsz(desc); \
224
+/* Crypto three-reg imm2
182
+ for (i = 0; i < opr_sz; i += sizeof(TYPE)) { \
225
+ * 31 21 20 16 15 14 13 12 11 10 9 5 4 0
183
+ TYPE aa = *(TYPE *)(a + i); \
226
+ * +-----------------------+------+-----+------+--------+------+------+
184
+ TYPE nn = *(TYPE *)(n + i); \
227
+ * | 1 1 0 0 1 1 1 0 0 1 0 | Rm | 1 0 | imm2 | opcode | Rn | Rd |
185
+ TYPE mm = *(TYPE *)(m + i); \
228
+ * +-----------------------+------+-----+------+--------+------+------+
186
+ TYPE dd = MIN(MAX(aa, nn), mm); \
229
+ */
187
+ *(TYPE *)(d + i) = dd; \
230
+static void disas_crypto_three_reg_imm2(DisasContext *s, uint32_t insn)
188
+ } \
231
+{
189
+ clear_tail(d, opr_sz, simd_maxsz(desc)); \
232
+ int opcode = extract32(insn, 10, 2);
190
+}
233
+ int imm2 = extract32(insn, 12, 2);
191
+
234
+ int rm = extract32(insn, 16, 5);
192
+DO_CLAMP(gvec_sclamp_b, int8_t)
235
+ int rn = extract32(insn, 5, 5);
193
+DO_CLAMP(gvec_sclamp_h, int16_t)
236
+ int rd = extract32(insn, 0, 5);
194
+DO_CLAMP(gvec_sclamp_s, int32_t)
237
+ TCGv_ptr tcg_rd_ptr, tcg_rn_ptr, tcg_rm_ptr;
195
+DO_CLAMP(gvec_sclamp_d, int64_t)
238
+ TCGv_i32 tcg_imm2, tcg_opcode;
196
+
239
+
197
+DO_CLAMP(gvec_uclamp_b, uint8_t)
240
+ if (!arm_dc_feature(s, ARM_FEATURE_V8_SM3)) {
198
+DO_CLAMP(gvec_uclamp_h, uint16_t)
241
+ unallocated_encoding(s);
199
+DO_CLAMP(gvec_uclamp_s, uint32_t)
242
+ return;
200
+DO_CLAMP(gvec_uclamp_d, uint64_t)
243
+ }
244
+
245
+ if (!fp_access_check(s)) {
246
+ return;
247
+ }
248
+
249
+ tcg_rd_ptr = vec_full_reg_ptr(s, rd);
250
+ tcg_rn_ptr = vec_full_reg_ptr(s, rn);
251
+ tcg_rm_ptr = vec_full_reg_ptr(s, rm);
252
+ tcg_imm2 = tcg_const_i32(imm2);
253
+ tcg_opcode = tcg_const_i32(opcode);
254
+
255
+ gen_helper_crypto_sm3tt(tcg_rd_ptr, tcg_rn_ptr, tcg_rm_ptr, tcg_imm2,
256
+ tcg_opcode);
257
+
258
+ tcg_temp_free_ptr(tcg_rd_ptr);
259
+ tcg_temp_free_ptr(tcg_rn_ptr);
260
+ tcg_temp_free_ptr(tcg_rm_ptr);
261
+ tcg_temp_free_i32(tcg_imm2);
262
+ tcg_temp_free_i32(tcg_opcode);
263
+}
264
+
265
/* C3.6 Data processing - SIMD, inc Crypto
266
*
267
* As the decode gets a little complex we are using a table based
268
@@ -XXX,XX +XXX,XX @@ static const AArch64DecodeTable data_proc_simd[] = {
269
{ 0xcec08000, 0xfffff000, disas_crypto_two_reg_sha512 },
270
{ 0xce000000, 0xff808000, disas_crypto_four_reg },
271
{ 0xce800000, 0xffe00000, disas_crypto_xar },
272
+ { 0xce408000, 0xffe0c000, disas_crypto_three_reg_imm2 },
273
{ 0x00000000, 0x00000000, NULL }
274
};
275
276
--
201
--
277
2.16.1
202
2.25.1
278
279
diff view generated by jsdifflib
1
Make v7m_push_callee_stack() honour the MPU by using the
1
From: Richard Henderson <richard.henderson@linaro.org>
2
new v7m_stack_write() function. We return a flag to indicate
3
whether the pushes failed, which we can then use in
4
v7m_exception_taken() to cause us to handle the derived
5
exception correctly.
6
2
3
We can handle both exception entry and exception return by
4
hooking into aarch64_sve_change_el.
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220708151540.18136-32-richard.henderson@linaro.org
7
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
9
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
10
Message-id: 1517324542-6607-6-git-send-email-peter.maydell@linaro.org
11
---
10
---
12
target/arm/helper.c | 64 ++++++++++++++++++++++++++++++++++++++++-------------
11
target/arm/helper.c | 15 +++++++++++++--
13
1 file changed, 49 insertions(+), 15 deletions(-)
12
1 file changed, 13 insertions(+), 2 deletions(-)
14
13
15
diff --git a/target/arm/helper.c b/target/arm/helper.c
14
diff --git a/target/arm/helper.c b/target/arm/helper.c
16
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/helper.c
16
--- a/target/arm/helper.c
18
+++ b/target/arm/helper.c
17
+++ b/target/arm/helper.c
19
@@ -XXX,XX +XXX,XX @@ static uint32_t arm_v7m_load_vector(ARMCPU *cpu, int exc, bool targets_secure)
18
@@ -XXX,XX +XXX,XX @@ void aarch64_sve_change_el(CPUARMState *env, int old_el,
20
return addr;
19
return;
21
}
20
}
22
21
23
-static void v7m_push_callee_stack(ARMCPU *cpu, uint32_t lr, bool dotailchain,
22
+ old_a64 = old_el ? arm_el_is_aa64(env, old_el) : el0_a64;
24
+static bool v7m_push_callee_stack(ARMCPU *cpu, uint32_t lr, bool dotailchain,
23
+ new_a64 = new_el ? arm_el_is_aa64(env, new_el) : el0_a64;
25
bool ignore_faults)
26
{
27
/* For v8M, push the callee-saves register part of the stack frame.
28
@@ -XXX,XX +XXX,XX @@ static void v7m_push_callee_stack(ARMCPU *cpu, uint32_t lr, bool dotailchain,
29
* In the tailchaining case this may not be the current stack.
30
*/
31
CPUARMState *env = &cpu->env;
32
- CPUState *cs = CPU(cpu);
33
uint32_t *frame_sp_p;
34
uint32_t frameptr;
35
+ ARMMMUIdx mmu_idx;
36
+ bool stacked_ok;
37
38
if (dotailchain) {
39
- frame_sp_p = get_v7m_sp_ptr(env, true,
40
- lr & R_V7M_EXCRET_MODE_MASK,
41
+ bool mode = lr & R_V7M_EXCRET_MODE_MASK;
42
+ bool priv = !(env->v7m.control[M_REG_S] & R_V7M_CONTROL_NPRIV_MASK) ||
43
+ !mode;
44
+
24
+
45
+ mmu_idx = arm_v7m_mmu_idx_for_secstate_and_priv(env, M_REG_S, priv);
25
+ /*
46
+ frame_sp_p = get_v7m_sp_ptr(env, M_REG_S, mode,
26
+ * Both AArch64.TakeException and AArch64.ExceptionReturn
47
lr & R_V7M_EXCRET_SPSEL_MASK);
27
+ * invoke ResetSVEState when taking an exception from, or
48
} else {
28
+ * returning to, AArch32 state when PSTATE.SM is enabled.
49
+ mmu_idx = core_to_arm_mmu_idx(env, cpu_mmu_index(env, false));
50
frame_sp_p = &env->regs[13];
51
}
52
53
frameptr = *frame_sp_p - 0x28;
54
55
- stl_phys(cs->as, frameptr, 0xfefa125b);
56
- stl_phys(cs->as, frameptr + 0x8, env->regs[4]);
57
- stl_phys(cs->as, frameptr + 0xc, env->regs[5]);
58
- stl_phys(cs->as, frameptr + 0x10, env->regs[6]);
59
- stl_phys(cs->as, frameptr + 0x14, env->regs[7]);
60
- stl_phys(cs->as, frameptr + 0x18, env->regs[8]);
61
- stl_phys(cs->as, frameptr + 0x1c, env->regs[9]);
62
- stl_phys(cs->as, frameptr + 0x20, env->regs[10]);
63
- stl_phys(cs->as, frameptr + 0x24, env->regs[11]);
64
+ /* Write as much of the stack frame as we can. A write failure may
65
+ * cause us to pend a derived exception.
66
+ */
29
+ */
67
+ stacked_ok =
30
+ if (old_a64 != new_a64 && FIELD_EX64(env->svcr, SVCR, SM)) {
68
+ v7m_stack_write(cpu, frameptr, 0xfefa125b, mmu_idx, ignore_faults) &&
31
+ arm_reset_sve_state(env);
69
+ v7m_stack_write(cpu, frameptr + 0x8, env->regs[4], mmu_idx,
70
+ ignore_faults) &&
71
+ v7m_stack_write(cpu, frameptr + 0xc, env->regs[5], mmu_idx,
72
+ ignore_faults) &&
73
+ v7m_stack_write(cpu, frameptr + 0x10, env->regs[6], mmu_idx,
74
+ ignore_faults) &&
75
+ v7m_stack_write(cpu, frameptr + 0x14, env->regs[7], mmu_idx,
76
+ ignore_faults) &&
77
+ v7m_stack_write(cpu, frameptr + 0x18, env->regs[8], mmu_idx,
78
+ ignore_faults) &&
79
+ v7m_stack_write(cpu, frameptr + 0x1c, env->regs[9], mmu_idx,
80
+ ignore_faults) &&
81
+ v7m_stack_write(cpu, frameptr + 0x20, env->regs[10], mmu_idx,
82
+ ignore_faults) &&
83
+ v7m_stack_write(cpu, frameptr + 0x24, env->regs[11], mmu_idx,
84
+ ignore_faults);
85
86
+ /* Update SP regardless of whether any of the stack accesses failed.
87
+ * When we implement v8M stack limit checking then this attempt to
88
+ * update SP might also fail and result in a derived exception.
89
+ */
90
*frame_sp_p = frameptr;
91
+
92
+ return !stacked_ok;
93
}
94
95
static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain,
96
@@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain,
97
uint32_t addr;
98
bool targets_secure;
99
int exc;
100
+ bool push_failed = false;
101
102
armv7m_nvic_get_pending_irq_info(env->nvic, &exc, &targets_secure);
103
104
@@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain,
105
*/
106
if (lr & R_V7M_EXCRET_DCRS_MASK &&
107
!(dotailchain && (lr & R_V7M_EXCRET_ES_MASK))) {
108
- v7m_push_callee_stack(cpu, lr, dotailchain,
109
- ignore_stackfaults);
110
+ push_failed = v7m_push_callee_stack(cpu, lr, dotailchain,
111
+ ignore_stackfaults);
112
}
113
lr |= R_V7M_EXCRET_DCRS_MASK;
114
}
115
@@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain,
116
}
117
}
118
119
+ if (push_failed && !ignore_stackfaults) {
120
+ /* Derived exception on callee-saves register stacking:
121
+ * we might now want to take a different exception which
122
+ * targets a different security state, so try again from the top.
123
+ */
124
+ v7m_exception_taken(cpu, lr, true, true);
125
+ return;
32
+ return;
126
+ }
33
+ }
127
+
34
+
128
addr = arm_v7m_load_vector(cpu, exc, targets_secure);
35
/*
129
36
* DDI0584A.d sec 3.2: "If SVE instructions are disabled or trapped
130
/* Now we've done everything that might cause a derived exception
37
* at ELx, or not available because the EL is in AArch32 state, then
38
@@ -XXX,XX +XXX,XX @@ void aarch64_sve_change_el(CPUARMState *env, int old_el,
39
* we already have the correct register contents when encountering the
40
* vq0->vq0 transition between EL0->EL1.
41
*/
42
- old_a64 = old_el ? arm_el_is_aa64(env, old_el) : el0_a64;
43
old_len = (old_a64 && !sve_exception_el(env, old_el)
44
? sve_vqm1_for_el(env, old_el) : 0);
45
- new_a64 = new_el ? arm_el_is_aa64(env, new_el) : el0_a64;
46
new_len = (new_a64 && !sve_exception_el(env, new_el)
47
? sve_vqm1_for_el(env, new_el) : 0);
48
131
--
49
--
132
2.16.1
50
2.25.1
133
134
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Note that SME remains effectively disabled for user-only,
4
because we do not yet set CPACR_EL1.SMEN. This needs to
5
wait until the kernel ABI is implemented.
6
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20220708151540.18136-33-richard.henderson@linaro.org
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
12
docs/system/arm/emulation.rst | 4 ++++
13
target/arm/cpu64.c | 11 +++++++++++
14
2 files changed, 15 insertions(+)
15
16
diff --git a/docs/system/arm/emulation.rst b/docs/system/arm/emulation.rst
17
index XXXXXXX..XXXXXXX 100644
18
--- a/docs/system/arm/emulation.rst
19
+++ b/docs/system/arm/emulation.rst
20
@@ -XXX,XX +XXX,XX @@ the following architecture extensions:
21
- FEAT_SHA512 (Advanced SIMD SHA512 instructions)
22
- FEAT_SM3 (Advanced SIMD SM3 instructions)
23
- FEAT_SM4 (Advanced SIMD SM4 instructions)
24
+- FEAT_SME (Scalable Matrix Extension)
25
+- FEAT_SME_FA64 (Full A64 instruction set in Streaming SVE mode)
26
+- FEAT_SME_F64F64 (Double-precision floating-point outer product instructions)
27
+- FEAT_SME_I16I64 (16-bit to 64-bit integer widening outer product instructions)
28
- FEAT_SPECRES (Speculation restriction instructions)
29
- FEAT_SSBS (Speculative Store Bypass Safe)
30
- FEAT_TLBIOS (TLB invalidate instructions in Outer Shareable domain)
31
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
32
index XXXXXXX..XXXXXXX 100644
33
--- a/target/arm/cpu64.c
34
+++ b/target/arm/cpu64.c
35
@@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj)
36
*/
37
t = FIELD_DP64(t, ID_AA64PFR1, MTE, 3); /* FEAT_MTE3 */
38
t = FIELD_DP64(t, ID_AA64PFR1, RAS_FRAC, 0); /* FEAT_RASv1p1 + FEAT_DoubleFault */
39
+ t = FIELD_DP64(t, ID_AA64PFR1, SME, 1); /* FEAT_SME */
40
t = FIELD_DP64(t, ID_AA64PFR1, CSV2_FRAC, 0); /* FEAT_CSV2_2 */
41
cpu->isar.id_aa64pfr1 = t;
42
43
@@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj)
44
t = FIELD_DP64(t, ID_AA64DFR0, PMUVER, 5); /* FEAT_PMUv3p4 */
45
cpu->isar.id_aa64dfr0 = t;
46
47
+ t = cpu->isar.id_aa64smfr0;
48
+ t = FIELD_DP64(t, ID_AA64SMFR0, F32F32, 1); /* FEAT_SME */
49
+ t = FIELD_DP64(t, ID_AA64SMFR0, B16F32, 1); /* FEAT_SME */
50
+ t = FIELD_DP64(t, ID_AA64SMFR0, F16F32, 1); /* FEAT_SME */
51
+ t = FIELD_DP64(t, ID_AA64SMFR0, I8I32, 0xf); /* FEAT_SME */
52
+ t = FIELD_DP64(t, ID_AA64SMFR0, F64F64, 1); /* FEAT_SME_F64F64 */
53
+ t = FIELD_DP64(t, ID_AA64SMFR0, I16I64, 0xf); /* FEAT_SME_I16I64 */
54
+ t = FIELD_DP64(t, ID_AA64SMFR0, FA64, 1); /* FEAT_SME_FA64 */
55
+ cpu->isar.id_aa64smfr0 = t;
56
+
57
/* Replicate the same data to the 32-bit id registers. */
58
aa32_max_features(cpu);
59
60
--
61
2.25.1
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
4
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
5
Message-id: 20220708151540.18136-34-richard.henderson@linaro.org
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
---
8
linux-user/aarch64/target_cpu.h | 5 ++++-
9
1 file changed, 4 insertions(+), 1 deletion(-)
10
11
diff --git a/linux-user/aarch64/target_cpu.h b/linux-user/aarch64/target_cpu.h
12
index XXXXXXX..XXXXXXX 100644
13
--- a/linux-user/aarch64/target_cpu.h
14
+++ b/linux-user/aarch64/target_cpu.h
15
@@ -XXX,XX +XXX,XX @@ static inline void cpu_clone_regs_parent(CPUARMState *env, unsigned flags)
16
17
static inline void cpu_set_tls(CPUARMState *env, target_ulong newtls)
18
{
19
- /* Note that AArch64 Linux keeps the TLS pointer in TPIDR; this is
20
+ /*
21
+ * Note that AArch64 Linux keeps the TLS pointer in TPIDR; this is
22
* different from AArch32 Linux, which uses TPIDRRO.
23
*/
24
env->cp15.tpidr_el[0] = newtls;
25
+ /* TPIDR2_EL0 is cleared with CLONE_SETTLS. */
26
+ env->cp15.tpidr2_el0 = 0;
27
}
28
29
static inline abi_ulong get_sp_from_cpustate(CPUARMState *state)
30
--
31
2.25.1
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
4
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
5
Message-id: 20220708151540.18136-35-richard.henderson@linaro.org
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
---
8
linux-user/aarch64/cpu_loop.c | 9 +++++++++
9
1 file changed, 9 insertions(+)
10
11
diff --git a/linux-user/aarch64/cpu_loop.c b/linux-user/aarch64/cpu_loop.c
12
index XXXXXXX..XXXXXXX 100644
13
--- a/linux-user/aarch64/cpu_loop.c
14
+++ b/linux-user/aarch64/cpu_loop.c
15
@@ -XXX,XX +XXX,XX @@ void cpu_loop(CPUARMState *env)
16
17
switch (trapnr) {
18
case EXCP_SWI:
19
+ /*
20
+ * On syscall, PSTATE.ZA is preserved, along with the ZA matrix.
21
+ * PSTATE.SM is cleared, per SMSTOP, which does ResetSVEState.
22
+ */
23
+ if (FIELD_EX64(env->svcr, SVCR, SM)) {
24
+ env->svcr = FIELD_DP64(env->svcr, SVCR, SM, 0);
25
+ arm_rebuild_hflags(env);
26
+ arm_reset_sve_state(env);
27
+ }
28
ret = do_syscall(env,
29
env->xregs[8],
30
env->xregs[0],
31
--
32
2.25.1
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Make sure to zero the currently reserved fields.
4
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 20220708151540.18136-36-richard.henderson@linaro.org
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
---
10
linux-user/aarch64/signal.c | 9 ++++++++-
11
1 file changed, 8 insertions(+), 1 deletion(-)
12
13
diff --git a/linux-user/aarch64/signal.c b/linux-user/aarch64/signal.c
14
index XXXXXXX..XXXXXXX 100644
15
--- a/linux-user/aarch64/signal.c
16
+++ b/linux-user/aarch64/signal.c
17
@@ -XXX,XX +XXX,XX @@ struct target_extra_context {
18
struct target_sve_context {
19
struct target_aarch64_ctx head;
20
uint16_t vl;
21
- uint16_t reserved[3];
22
+ uint16_t flags;
23
+ uint16_t reserved[2];
24
/* The actual SVE data immediately follows. It is laid out
25
* according to TARGET_SVE_SIG_{Z,P}REG_OFFSET, based off of
26
* the original struct pointer.
27
@@ -XXX,XX +XXX,XX @@ struct target_sve_context {
28
#define TARGET_SVE_SIG_CONTEXT_SIZE(VQ) \
29
(TARGET_SVE_SIG_PREG_OFFSET(VQ, 17))
30
31
+#define TARGET_SVE_SIG_FLAG_SM 1
32
+
33
struct target_rt_sigframe {
34
struct target_siginfo info;
35
struct target_ucontext uc;
36
@@ -XXX,XX +XXX,XX @@ static void target_setup_sve_record(struct target_sve_context *sve,
37
{
38
int i, j;
39
40
+ memset(sve, 0, sizeof(*sve));
41
__put_user(TARGET_SVE_MAGIC, &sve->head.magic);
42
__put_user(size, &sve->head.size);
43
__put_user(vq * TARGET_SVE_VQ_BYTES, &sve->vl);
44
+ if (FIELD_EX64(env->svcr, SVCR, SM)) {
45
+ __put_user(TARGET_SVE_SIG_FLAG_SM, &sve->flags);
46
+ }
47
48
/* Note that SVE regs are stored as a byte stream, with each byte element
49
* at a subsequent address. This corresponds to a little-endian store
50
--
51
2.25.1
diff view generated by jsdifflib
1
The memory writes done to push registers on the stack
1
From: Richard Henderson <richard.henderson@linaro.org>
2
on exception entry in M profile CPUs are supposed to
3
go via MPU permissions checks, which may cause us to
4
take a derived exception instead of the original one of
5
the MPU lookup fails. We were implementing these as
6
always-succeeds direct writes to physical memory.
7
Rewrite v7m_push_stack() to do the necessary checks.
8
2
3
Fold the return value setting into the goto, so each
4
point of failure need not do both.
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220708151540.18136-37-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
11
Message-id: 1517324542-6607-5-git-send-email-peter.maydell@linaro.org
12
---
10
---
13
target/arm/helper.c | 103 ++++++++++++++++++++++++++++++++++++++++++++--------
11
linux-user/aarch64/signal.c | 26 +++++++++++---------------
14
1 file changed, 87 insertions(+), 16 deletions(-)
12
1 file changed, 11 insertions(+), 15 deletions(-)
15
13
16
diff --git a/target/arm/helper.c b/target/arm/helper.c
14
diff --git a/linux-user/aarch64/signal.c b/linux-user/aarch64/signal.c
17
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
18
--- a/target/arm/helper.c
16
--- a/linux-user/aarch64/signal.c
19
+++ b/target/arm/helper.c
17
+++ b/linux-user/aarch64/signal.c
20
@@ -XXX,XX +XXX,XX @@ uint32_t arm_phys_excp_target_el(CPUState *cs, uint32_t excp_idx,
18
@@ -XXX,XX +XXX,XX @@ static int target_restore_sigframe(CPUARMState *env,
21
return target_el;
19
struct target_sve_context *sve = NULL;
20
uint64_t extra_datap = 0;
21
bool used_extra = false;
22
- bool err = false;
23
int vq = 0, sve_size = 0;
24
25
target_restore_general_frame(env, sf);
26
@@ -XXX,XX +XXX,XX @@ static int target_restore_sigframe(CPUARMState *env,
27
switch (magic) {
28
case 0:
29
if (size != 0) {
30
- err = true;
31
- goto exit;
32
+ goto err;
33
}
34
if (used_extra) {
35
ctx = NULL;
36
@@ -XXX,XX +XXX,XX @@ static int target_restore_sigframe(CPUARMState *env,
37
38
case TARGET_FPSIMD_MAGIC:
39
if (fpsimd || size != sizeof(struct target_fpsimd_context)) {
40
- err = true;
41
- goto exit;
42
+ goto err;
43
}
44
fpsimd = (struct target_fpsimd_context *)ctx;
45
break;
46
@@ -XXX,XX +XXX,XX @@ static int target_restore_sigframe(CPUARMState *env,
47
break;
48
}
49
}
50
- err = true;
51
- goto exit;
52
+ goto err;
53
54
case TARGET_EXTRA_MAGIC:
55
if (extra || size != sizeof(struct target_extra_context)) {
56
- err = true;
57
- goto exit;
58
+ goto err;
59
}
60
__get_user(extra_datap,
61
&((struct target_extra_context *)ctx)->datap);
62
@@ -XXX,XX +XXX,XX @@ static int target_restore_sigframe(CPUARMState *env,
63
/* Unknown record -- we certainly didn't generate it.
64
* Did we in fact get out of sync?
65
*/
66
- err = true;
67
- goto exit;
68
+ goto err;
69
}
70
ctx = (void *)ctx + size;
71
}
72
@@ -XXX,XX +XXX,XX @@ static int target_restore_sigframe(CPUARMState *env,
73
if (fpsimd) {
74
target_restore_fpsimd_record(env, fpsimd);
75
} else {
76
- err = true;
77
+ goto err;
78
}
79
80
/* SVE data, if present, overwrites FPSIMD data. */
81
if (sve) {
82
target_restore_sve_record(env, sve, vq);
83
}
84
-
85
- exit:
86
unlock_user(extra, extra_datap, 0);
87
- return err;
88
+ return 0;
89
+
90
+ err:
91
+ unlock_user(extra, extra_datap, 0);
92
+ return 1;
22
}
93
}
23
94
24
-static void v7m_push(CPUARMState *env, uint32_t val)
95
static abi_ulong get_sigframe(struct target_sigaction *ka,
25
+static bool v7m_stack_write(ARMCPU *cpu, uint32_t addr, uint32_t value,
26
+ ARMMMUIdx mmu_idx, bool ignfault)
27
{
28
- CPUState *cs = CPU(arm_env_get_cpu(env));
29
+ CPUState *cs = CPU(cpu);
30
+ CPUARMState *env = &cpu->env;
31
+ MemTxAttrs attrs = {};
32
+ MemTxResult txres;
33
+ target_ulong page_size;
34
+ hwaddr physaddr;
35
+ int prot;
36
+ ARMMMUFaultInfo fi;
37
+ bool secure = mmu_idx & ARM_MMU_IDX_M_S;
38
+ int exc;
39
+ bool exc_secure;
40
41
- env->regs[13] -= 4;
42
- stl_phys(cs->as, env->regs[13], val);
43
+ if (get_phys_addr(env, addr, MMU_DATA_STORE, mmu_idx, &physaddr,
44
+ &attrs, &prot, &page_size, &fi, NULL)) {
45
+ /* MPU/SAU lookup failed */
46
+ if (fi.type == ARMFault_QEMU_SFault) {
47
+ qemu_log_mask(CPU_LOG_INT,
48
+ "...SecureFault with SFSR.AUVIOL during stacking\n");
49
+ env->v7m.sfsr |= R_V7M_SFSR_AUVIOL_MASK | R_V7M_SFSR_SFARVALID_MASK;
50
+ env->v7m.sfar = addr;
51
+ exc = ARMV7M_EXCP_SECURE;
52
+ exc_secure = false;
53
+ } else {
54
+ qemu_log_mask(CPU_LOG_INT, "...MemManageFault with CFSR.MSTKERR\n");
55
+ env->v7m.cfsr[secure] |= R_V7M_CFSR_MSTKERR_MASK;
56
+ exc = ARMV7M_EXCP_MEM;
57
+ exc_secure = secure;
58
+ }
59
+ goto pend_fault;
60
+ }
61
+ address_space_stl_le(arm_addressspace(cs, attrs), physaddr, value,
62
+ attrs, &txres);
63
+ if (txres != MEMTX_OK) {
64
+ /* BusFault trying to write the data */
65
+ qemu_log_mask(CPU_LOG_INT, "...BusFault with BFSR.STKERR\n");
66
+ env->v7m.cfsr[M_REG_NS] |= R_V7M_CFSR_STKERR_MASK;
67
+ exc = ARMV7M_EXCP_BUS;
68
+ exc_secure = false;
69
+ goto pend_fault;
70
+ }
71
+ return true;
72
+
73
+pend_fault:
74
+ /* By pending the exception at this point we are making
75
+ * the IMPDEF choice "overridden exceptions pended" (see the
76
+ * MergeExcInfo() pseudocode). The other choice would be to not
77
+ * pend them now and then make a choice about which to throw away
78
+ * later if we have two derived exceptions.
79
+ * The only case when we must not pend the exception but instead
80
+ * throw it away is if we are doing the push of the callee registers
81
+ * and we've already generated a derived exception. Even in this
82
+ * case we will still update the fault status registers.
83
+ */
84
+ if (!ignfault) {
85
+ armv7m_nvic_set_pending_derived(env->nvic, exc, exc_secure);
86
+ }
87
+ return false;
88
}
89
90
/* Return true if we're using the process stack pointer (not the MSP) */
91
@@ -XXX,XX +XXX,XX @@ static bool v7m_push_stack(ARMCPU *cpu)
92
* should ignore further stack faults trying to process
93
* that derived exception.)
94
*/
95
+ bool stacked_ok;
96
CPUARMState *env = &cpu->env;
97
uint32_t xpsr = xpsr_read(env);
98
+ uint32_t frameptr = env->regs[13];
99
+ ARMMMUIdx mmu_idx = core_to_arm_mmu_idx(env, cpu_mmu_index(env, false));
100
101
/* Align stack pointer if the guest wants that */
102
- if ((env->regs[13] & 4) &&
103
+ if ((frameptr & 4) &&
104
(env->v7m.ccr[env->v7m.secure] & R_V7M_CCR_STKALIGN_MASK)) {
105
- env->regs[13] -= 4;
106
+ frameptr -= 4;
107
xpsr |= XPSR_SPREALIGN;
108
}
109
- /* Switch to the handler mode. */
110
- v7m_push(env, xpsr);
111
- v7m_push(env, env->regs[15]);
112
- v7m_push(env, env->regs[14]);
113
- v7m_push(env, env->regs[12]);
114
- v7m_push(env, env->regs[3]);
115
- v7m_push(env, env->regs[2]);
116
- v7m_push(env, env->regs[1]);
117
- v7m_push(env, env->regs[0]);
118
119
- return false;
120
+ frameptr -= 0x20;
121
+
122
+ /* Write as much of the stack frame as we can. If we fail a stack
123
+ * write this will result in a derived exception being pended
124
+ * (which may be taken in preference to the one we started with
125
+ * if it has higher priority).
126
+ */
127
+ stacked_ok =
128
+ v7m_stack_write(cpu, frameptr, env->regs[0], mmu_idx, false) &&
129
+ v7m_stack_write(cpu, frameptr + 4, env->regs[1], mmu_idx, false) &&
130
+ v7m_stack_write(cpu, frameptr + 8, env->regs[2], mmu_idx, false) &&
131
+ v7m_stack_write(cpu, frameptr + 12, env->regs[3], mmu_idx, false) &&
132
+ v7m_stack_write(cpu, frameptr + 16, env->regs[12], mmu_idx, false) &&
133
+ v7m_stack_write(cpu, frameptr + 20, env->regs[14], mmu_idx, false) &&
134
+ v7m_stack_write(cpu, frameptr + 24, env->regs[15], mmu_idx, false) &&
135
+ v7m_stack_write(cpu, frameptr + 28, xpsr, mmu_idx, false);
136
+
137
+ /* Update SP regardless of whether any of the stack accesses failed.
138
+ * When we implement v8M stack limit checking then this attempt to
139
+ * update SP might also fail and result in a derived exception.
140
+ */
141
+ env->regs[13] = frameptr;
142
+
143
+ return !stacked_ok;
144
}
145
146
static void do_v7m_exception_exit(ARMCPU *cpu)
147
--
96
--
148
2.16.1
97
2.25.1
149
150
diff view generated by jsdifflib
1
The code where we added the TT instruction was accidentally
1
From: Richard Henderson <richard.henderson@linaro.org>
2
missing a 'break', which meant that after generating the code
3
to execute the TT we would fall through to 'goto illegal_op'
4
and generate code to take an UNDEF insn.
5
2
3
In parse_user_sigframe, the kernel rejects duplicate sve records,
4
or records that are smaller than the header. We were silently
5
allowing these cases to pass, dropping the record.
6
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20220708151540.18136-38-richard.henderson@linaro.org
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
8
Message-id: 20180206103941.13985-1-peter.maydell@linaro.org
9
---
11
---
10
target/arm/translate.c | 1 +
12
linux-user/aarch64/signal.c | 5 ++++-
11
1 file changed, 1 insertion(+)
13
1 file changed, 4 insertions(+), 1 deletion(-)
12
14
13
diff --git a/target/arm/translate.c b/target/arm/translate.c
15
diff --git a/linux-user/aarch64/signal.c b/linux-user/aarch64/signal.c
14
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
15
--- a/target/arm/translate.c
17
--- a/linux-user/aarch64/signal.c
16
+++ b/target/arm/translate.c
18
+++ b/linux-user/aarch64/signal.c
17
@@ -XXX,XX +XXX,XX @@ static void disas_thumb2_insn(DisasContext *s, uint32_t insn)
19
@@ -XXX,XX +XXX,XX @@ static int target_restore_sigframe(CPUARMState *env,
18
tcg_temp_free_i32(addr);
20
break;
19
tcg_temp_free_i32(op);
21
20
store_reg(s, rd, ttresp);
22
case TARGET_SVE_MAGIC:
21
+ break;
23
+ if (sve || size < sizeof(struct target_sve_context)) {
22
}
24
+ goto err;
23
goto illegal_op;
25
+ }
26
if (cpu_isar_feature(aa64_sve, env_archcpu(env))) {
27
vq = sve_vq(env);
28
sve_size = QEMU_ALIGN_UP(TARGET_SVE_SIG_CONTEXT_SIZE(vq), 16);
29
- if (!sve && size == sve_size) {
30
+ if (size == sve_size) {
31
sve = (struct target_sve_context *)ctx;
32
break;
24
}
33
}
25
--
34
--
26
2.16.1
35
2.25.1
27
28
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
4
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
5
Message-id: 20220708151540.18136-39-richard.henderson@linaro.org
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
---
8
linux-user/aarch64/signal.c | 3 +++
9
1 file changed, 3 insertions(+)
10
11
diff --git a/linux-user/aarch64/signal.c b/linux-user/aarch64/signal.c
12
index XXXXXXX..XXXXXXX 100644
13
--- a/linux-user/aarch64/signal.c
14
+++ b/linux-user/aarch64/signal.c
15
@@ -XXX,XX +XXX,XX @@ static int target_restore_sigframe(CPUARMState *env,
16
__get_user(extra_size,
17
&((struct target_extra_context *)ctx)->size);
18
extra = lock_user(VERIFY_READ, extra_datap, extra_size, 0);
19
+ if (!extra) {
20
+ return 1;
21
+ }
22
break;
23
24
default:
25
--
26
2.25.1
diff view generated by jsdifflib
1
Make the load of the exception vector from the vector table honour
1
From: Richard Henderson <richard.henderson@linaro.org>
2
the SAU and any bus error on the load (possibly provoking a derived
3
exception), rather than simply aborting if the load fails.
4
2
3
Move the checks out of the parsing loop and into the
4
restore function. This more closely mirrors the code
5
structure in the kernel, and is slightly clearer.
6
7
Reject rather than silently skip incorrect VL and SVE record sizes,
8
bringing our checks in to line with those the kernel does.
9
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
12
Message-id: 20220708151540.18136-40-richard.henderson@linaro.org
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 1517324542-6607-7-git-send-email-peter.maydell@linaro.org
8
---
14
---
9
target/arm/helper.c | 71 +++++++++++++++++++++++++++++++++++++++++------------
15
linux-user/aarch64/signal.c | 51 +++++++++++++++++++++++++------------
10
1 file changed, 55 insertions(+), 16 deletions(-)
16
1 file changed, 35 insertions(+), 16 deletions(-)
11
17
12
diff --git a/target/arm/helper.c b/target/arm/helper.c
18
diff --git a/linux-user/aarch64/signal.c b/linux-user/aarch64/signal.c
13
index XXXXXXX..XXXXXXX 100644
19
index XXXXXXX..XXXXXXX 100644
14
--- a/target/arm/helper.c
20
--- a/linux-user/aarch64/signal.c
15
+++ b/target/arm/helper.c
21
+++ b/linux-user/aarch64/signal.c
16
@@ -XXX,XX +XXX,XX @@ static uint32_t *get_v7m_sp_ptr(CPUARMState *env, bool secure, bool threadmode,
22
@@ -XXX,XX +XXX,XX @@ static void target_restore_fpsimd_record(CPUARMState *env,
17
}
23
}
18
}
24
}
19
25
20
-static uint32_t arm_v7m_load_vector(ARMCPU *cpu, int exc, bool targets_secure)
26
-static void target_restore_sve_record(CPUARMState *env,
21
+static bool arm_v7m_load_vector(ARMCPU *cpu, int exc, bool targets_secure,
27
- struct target_sve_context *sve, int vq)
22
+ uint32_t *pvec)
28
+static bool target_restore_sve_record(CPUARMState *env,
29
+ struct target_sve_context *sve,
30
+ int size)
23
{
31
{
24
CPUState *cs = CPU(cpu);
32
- int i, j;
25
CPUARMState *env = &cpu->env;
33
+ int i, j, vl, vq;
26
MemTxResult result;
34
27
- hwaddr vec = env->v7m.vecbase[targets_secure] + exc * 4;
35
- /* Note that SVE regs are stored as a byte stream, with each byte element
28
- uint32_t addr;
36
+ if (!cpu_isar_feature(aa64_sve, env_archcpu(env))) {
29
+ uint32_t addr = env->v7m.vecbase[targets_secure] + exc * 4;
37
+ return false;
30
+ uint32_t vector_entry;
31
+ MemTxAttrs attrs = {};
32
+ ARMMMUIdx mmu_idx;
33
+ bool exc_secure;
34
+
35
+ mmu_idx = arm_v7m_mmu_idx_for_secstate_and_priv(env, targets_secure, true);
36
37
- addr = address_space_ldl(cs->as, vec,
38
- MEMTXATTRS_UNSPECIFIED, &result);
39
+ /* We don't do a get_phys_addr() here because the rules for vector
40
+ * loads are special: they always use the default memory map, and
41
+ * the default memory map permits reads from all addresses.
42
+ * Since there's no easy way to pass through to pmsav8_mpu_lookup()
43
+ * that we want this special case which would always say "yes",
44
+ * we just do the SAU lookup here followed by a direct physical load.
45
+ */
46
+ attrs.secure = targets_secure;
47
+ attrs.user = false;
48
+
49
+ if (arm_feature(env, ARM_FEATURE_M_SECURITY)) {
50
+ V8M_SAttributes sattrs = {};
51
+
52
+ v8m_security_lookup(env, addr, MMU_DATA_LOAD, mmu_idx, &sattrs);
53
+ if (sattrs.ns) {
54
+ attrs.secure = false;
55
+ } else if (!targets_secure) {
56
+ /* NS access to S memory */
57
+ goto load_fail;
58
+ }
59
+ }
38
+ }
60
+
39
+
61
+ vector_entry = address_space_ldl(arm_addressspace(cs, attrs), addr,
40
+ __get_user(vl, &sve->vl);
62
+ attrs, &result);
41
+ vq = sve_vq(env);
63
if (result != MEMTX_OK) {
42
+
64
- /* Architecturally this should cause a HardFault setting HSFR.VECTTBL,
43
+ /* Reject mismatched VL. */
65
- * which would then be immediately followed by our failing to load
44
+ if (vl != vq * TARGET_SVE_VQ_BYTES) {
66
- * the entry vector for that HardFault, which is a Lockup case.
45
+ return false;
67
- * Since we don't model Lockup, we just report this guest error
46
+ }
68
- * via cpu_abort().
47
+
69
- */
48
+ /* Accept empty record -- used to clear PSTATE.SM. */
70
- cpu_abort(cs, "Failed to read from %s exception vector table "
49
+ if (size <= sizeof(*sve)) {
71
- "entry %08x\n", targets_secure ? "secure" : "nonsecure",
50
+ return true;
72
- (unsigned)vec);
51
+ }
73
+ goto load_fail;
52
+
53
+ /* Reject non-empty but incomplete record. */
54
+ if (size < TARGET_SVE_SIG_CONTEXT_SIZE(vq)) {
55
+ return false;
56
+ }
57
+
58
+ /*
59
+ * Note that SVE regs are stored as a byte stream, with each byte element
60
* at a subsequent address. This corresponds to a little-endian load
61
* of our 64-bit hunks.
62
*/
63
@@ -XXX,XX +XXX,XX @@ static void target_restore_sve_record(CPUARMState *env,
64
}
65
}
74
}
66
}
75
- return addr;
76
+ *pvec = vector_entry;
77
+ return true;
67
+ return true;
78
+
79
+load_fail:
80
+ /* All vector table fetch fails are reported as HardFault, with
81
+ * HFSR.VECTTBL and .FORCED set. (FORCED is set because
82
+ * technically the underlying exception is a MemManage or BusFault
83
+ * that is escalated to HardFault.) This is a terminal exception,
84
+ * so we will either take the HardFault immediately or else enter
85
+ * lockup (the latter case is handled in armv7m_nvic_set_pending_derived()).
86
+ */
87
+ exc_secure = targets_secure ||
88
+ !(cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK);
89
+ env->v7m.hfsr |= R_V7M_HFSR_VECTTBL_MASK | R_V7M_HFSR_FORCED_MASK;
90
+ armv7m_nvic_set_pending_derived(env->nvic, ARMV7M_EXCP_HARD, exc_secure);
91
+ return false;
92
}
68
}
93
69
94
static bool v7m_push_callee_stack(ARMCPU *cpu, uint32_t lr, bool dotailchain,
70
static int target_restore_sigframe(CPUARMState *env,
95
@@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain,
71
@@ -XXX,XX +XXX,XX @@ static int target_restore_sigframe(CPUARMState *env,
96
return;
72
struct target_sve_context *sve = NULL;
73
uint64_t extra_datap = 0;
74
bool used_extra = false;
75
- int vq = 0, sve_size = 0;
76
+ int sve_size = 0;
77
78
target_restore_general_frame(env, sf);
79
80
@@ -XXX,XX +XXX,XX @@ static int target_restore_sigframe(CPUARMState *env,
81
if (sve || size < sizeof(struct target_sve_context)) {
82
goto err;
83
}
84
- if (cpu_isar_feature(aa64_sve, env_archcpu(env))) {
85
- vq = sve_vq(env);
86
- sve_size = QEMU_ALIGN_UP(TARGET_SVE_SIG_CONTEXT_SIZE(vq), 16);
87
- if (size == sve_size) {
88
- sve = (struct target_sve_context *)ctx;
89
- break;
90
- }
91
- }
92
- goto err;
93
+ sve = (struct target_sve_context *)ctx;
94
+ sve_size = size;
95
+ break;
96
97
case TARGET_EXTRA_MAGIC:
98
if (extra || size != sizeof(struct target_extra_context)) {
99
@@ -XXX,XX +XXX,XX @@ static int target_restore_sigframe(CPUARMState *env,
97
}
100
}
98
101
99
- addr = arm_v7m_load_vector(cpu, exc, targets_secure);
102
/* SVE data, if present, overwrites FPSIMD data. */
100
+ if (!arm_v7m_load_vector(cpu, exc, targets_secure, &addr)) {
103
- if (sve) {
101
+ /* Vector load failed: derived exception */
104
- target_restore_sve_record(env, sve, vq);
102
+ v7m_exception_taken(cpu, lr, true, true);
105
+ if (sve && !target_restore_sve_record(env, sve, sve_size)) {
103
+ return;
106
+ goto err;
104
+ }
107
}
105
108
unlock_user(extra, extra_datap, 0);
106
/* Now we've done everything that might cause a derived exception
109
return 0;
107
* we can go ahead and activate whichever exception we're going to
108
--
110
--
109
2.16.1
111
2.25.1
110
111
diff view generated by jsdifflib
1
From: Andrey Smirnov <andrew.smirnov@gmail.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Add minimal code needed to allow upstream Linux guest to boot.
3
Set the SM bit in the SVE record on signal delivery, create the ZA record.
4
Restore SM and ZA state according to the records present on return.
4
5
5
Cc: Peter Maydell <peter.maydell@linaro.org>
6
Cc: Jason Wang <jasowang@redhat.com>
7
Cc: Philippe Mathieu-Daudé <f4bug@amsat.org>
8
Cc: Marcel Apfelbaum <marcel.apfelbaum@zoho.com>
9
Cc: Michael S. Tsirkin <mst@redhat.com>
10
Cc: qemu-devel@nongnu.org
11
Cc: qemu-arm@nongnu.org
12
Cc: yurovsky@gmail.com
13
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
14
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
15
Signed-off-by: Andrey Smirnov <andrew.smirnov@gmail.com>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220708151540.18136-41-richard.henderson@linaro.org
16
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
---
10
---
18
include/hw/timer/imx_gpt.h | 1 +
11
linux-user/aarch64/signal.c | 167 +++++++++++++++++++++++++++++++++---
19
hw/timer/imx_gpt.c | 25 +++++++++++++++++++++++++
12
1 file changed, 154 insertions(+), 13 deletions(-)
20
2 files changed, 26 insertions(+)
21
13
22
diff --git a/include/hw/timer/imx_gpt.h b/include/hw/timer/imx_gpt.h
14
diff --git a/linux-user/aarch64/signal.c b/linux-user/aarch64/signal.c
23
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
24
--- a/include/hw/timer/imx_gpt.h
16
--- a/linux-user/aarch64/signal.c
25
+++ b/include/hw/timer/imx_gpt.h
17
+++ b/linux-user/aarch64/signal.c
26
@@ -XXX,XX +XXX,XX @@
18
@@ -XXX,XX +XXX,XX @@ struct target_sve_context {
27
#define TYPE_IMX25_GPT "imx25.gpt"
19
28
#define TYPE_IMX31_GPT "imx31.gpt"
20
#define TARGET_SVE_SIG_FLAG_SM 1
29
#define TYPE_IMX6_GPT "imx6.gpt"
21
30
+#define TYPE_IMX7_GPT "imx7.gpt"
22
+#define TARGET_ZA_MAGIC 0x54366345
31
23
+
32
#define TYPE_IMX_GPT TYPE_IMX25_GPT
24
+struct target_za_context {
33
25
+ struct target_aarch64_ctx head;
34
diff --git a/hw/timer/imx_gpt.c b/hw/timer/imx_gpt.c
26
+ uint16_t vl;
35
index XXXXXXX..XXXXXXX 100644
27
+ uint16_t reserved[3];
36
--- a/hw/timer/imx_gpt.c
28
+ /* The actual ZA data immediately follows. */
37
+++ b/hw/timer/imx_gpt.c
38
@@ -XXX,XX +XXX,XX @@ static const IMXClk imx6_gpt_clocks[] = {
39
CLK_HIGH, /* 111 reference clock */
40
};
41
42
+static const IMXClk imx7_gpt_clocks[] = {
43
+ CLK_NONE, /* 000 No clock source */
44
+ CLK_IPG, /* 001 ipg_clk, 532MHz*/
45
+ CLK_IPG_HIGH, /* 010 ipg_clk_highfreq */
46
+ CLK_EXT, /* 011 External clock */
47
+ CLK_32k, /* 100 ipg_clk_32k */
48
+ CLK_HIGH, /* 101 reference clock */
49
+ CLK_NONE, /* 110 not defined */
50
+ CLK_NONE, /* 111 not defined */
51
+};
29
+};
52
+
30
+
53
static void imx_gpt_set_freq(IMXGPTState *s)
31
+#define TARGET_ZA_SIG_REGS_OFFSET \
54
{
32
+ QEMU_ALIGN_UP(sizeof(struct target_za_context), TARGET_SVE_VQ_BYTES)
55
uint32_t clksrc = extract32(s->cr, GPT_CR_CLKSRC_SHIFT, 3);
33
+#define TARGET_ZA_SIG_ZAV_OFFSET(VQ, N) \
56
@@ -XXX,XX +XXX,XX @@ static void imx6_gpt_init(Object *obj)
34
+ (TARGET_ZA_SIG_REGS_OFFSET + (VQ) * TARGET_SVE_VQ_BYTES * (N))
57
s->clocks = imx6_gpt_clocks;
35
+#define TARGET_ZA_SIG_CONTEXT_SIZE(VQ) \
36
+ TARGET_ZA_SIG_ZAV_OFFSET(VQ, VQ * TARGET_SVE_VQ_BYTES)
37
+
38
struct target_rt_sigframe {
39
struct target_siginfo info;
40
struct target_ucontext uc;
41
@@ -XXX,XX +XXX,XX @@ static void target_setup_end_record(struct target_aarch64_ctx *end)
58
}
42
}
59
43
60
+static void imx7_gpt_init(Object *obj)
44
static void target_setup_sve_record(struct target_sve_context *sve,
45
- CPUARMState *env, int vq, int size)
46
+ CPUARMState *env, int size)
47
{
48
- int i, j;
49
+ int i, j, vq = sve_vq(env);
50
51
memset(sve, 0, sizeof(*sve));
52
__put_user(TARGET_SVE_MAGIC, &sve->head.magic);
53
@@ -XXX,XX +XXX,XX @@ static void target_setup_sve_record(struct target_sve_context *sve,
54
}
55
}
56
57
+static void target_setup_za_record(struct target_za_context *za,
58
+ CPUARMState *env, int size)
61
+{
59
+{
62
+ IMXGPTState *s = IMX_GPT(obj);
60
+ int vq = sme_vq(env);
63
+
61
+ int vl = vq * TARGET_SVE_VQ_BYTES;
64
+ s->clocks = imx7_gpt_clocks;
62
+ int i, j;
63
+
64
+ memset(za, 0, sizeof(*za));
65
+ __put_user(TARGET_ZA_MAGIC, &za->head.magic);
66
+ __put_user(size, &za->head.size);
67
+ __put_user(vl, &za->vl);
68
+
69
+ if (size == TARGET_ZA_SIG_CONTEXT_SIZE(0)) {
70
+ return;
71
+ }
72
+ assert(size == TARGET_ZA_SIG_CONTEXT_SIZE(vq));
73
+
74
+ /*
75
+ * Note that ZA vectors are stored as a byte stream,
76
+ * with each byte element at a subsequent address.
77
+ */
78
+ for (i = 0; i < vl; ++i) {
79
+ uint64_t *z = (void *)za + TARGET_ZA_SIG_ZAV_OFFSET(vq, i);
80
+ for (j = 0; j < vq * 2; ++j) {
81
+ __put_user_e(env->zarray[i].d[j], z + j, le);
82
+ }
83
+ }
65
+}
84
+}
66
+
85
+
67
static const TypeInfo imx25_gpt_info = {
86
static void target_restore_general_frame(CPUARMState *env,
68
.name = TYPE_IMX25_GPT,
87
struct target_rt_sigframe *sf)
69
.parent = TYPE_SYS_BUS_DEVICE,
88
{
70
@@ -XXX,XX +XXX,XX @@ static const TypeInfo imx6_gpt_info = {
89
@@ -XXX,XX +XXX,XX @@ static void target_restore_fpsimd_record(CPUARMState *env,
71
.instance_init = imx6_gpt_init,
90
72
};
91
static bool target_restore_sve_record(CPUARMState *env,
73
92
struct target_sve_context *sve,
74
+static const TypeInfo imx7_gpt_info = {
93
- int size)
75
+ .name = TYPE_IMX7_GPT,
94
+ int size, int *svcr)
76
+ .parent = TYPE_IMX25_GPT,
95
{
77
+ .instance_init = imx7_gpt_init,
96
- int i, j, vl, vq;
78
+};
97
+ int i, j, vl, vq, flags;
79
+
98
+ bool sm;
80
static void imx_gpt_register_types(void)
99
81
{
100
- if (!cpu_isar_feature(aa64_sve, env_archcpu(env))) {
82
type_register_static(&imx25_gpt_info);
101
+ __get_user(vl, &sve->vl);
83
type_register_static(&imx31_gpt_info);
102
+ __get_user(flags, &sve->flags);
84
type_register_static(&imx6_gpt_info);
103
+
85
+ type_register_static(&imx7_gpt_info);
104
+ sm = flags & TARGET_SVE_SIG_FLAG_SM;
105
+
106
+ /* The cpu must support Streaming or Non-streaming SVE. */
107
+ if (sm
108
+ ? !cpu_isar_feature(aa64_sme, env_archcpu(env))
109
+ : !cpu_isar_feature(aa64_sve, env_archcpu(env))) {
110
return false;
111
}
112
113
- __get_user(vl, &sve->vl);
114
- vq = sve_vq(env);
115
+ /*
116
+ * Note that we cannot use sve_vq() because that depends on the
117
+ * current setting of PSTATE.SM, not the state to be restored.
118
+ */
119
+ vq = sve_vqm1_for_el_sm(env, 0, sm) + 1;
120
121
/* Reject mismatched VL. */
122
if (vl != vq * TARGET_SVE_VQ_BYTES) {
123
@@ -XXX,XX +XXX,XX @@ static bool target_restore_sve_record(CPUARMState *env,
124
return false;
125
}
126
127
+ *svcr = FIELD_DP64(*svcr, SVCR, SM, sm);
128
+
129
/*
130
* Note that SVE regs are stored as a byte stream, with each byte element
131
* at a subsequent address. This corresponds to a little-endian load
132
@@ -XXX,XX +XXX,XX @@ static bool target_restore_sve_record(CPUARMState *env,
133
return true;
86
}
134
}
87
135
88
type_init(imx_gpt_register_types)
136
+static bool target_restore_za_record(CPUARMState *env,
137
+ struct target_za_context *za,
138
+ int size, int *svcr)
139
+{
140
+ int i, j, vl, vq;
141
+
142
+ if (!cpu_isar_feature(aa64_sme, env_archcpu(env))) {
143
+ return false;
144
+ }
145
+
146
+ __get_user(vl, &za->vl);
147
+ vq = sme_vq(env);
148
+
149
+ /* Reject mismatched VL. */
150
+ if (vl != vq * TARGET_SVE_VQ_BYTES) {
151
+ return false;
152
+ }
153
+
154
+ /* Accept empty record -- used to clear PSTATE.ZA. */
155
+ if (size <= TARGET_ZA_SIG_CONTEXT_SIZE(0)) {
156
+ return true;
157
+ }
158
+
159
+ /* Reject non-empty but incomplete record. */
160
+ if (size < TARGET_ZA_SIG_CONTEXT_SIZE(vq)) {
161
+ return false;
162
+ }
163
+
164
+ *svcr = FIELD_DP64(*svcr, SVCR, ZA, 1);
165
+
166
+ for (i = 0; i < vl; ++i) {
167
+ uint64_t *z = (void *)za + TARGET_ZA_SIG_ZAV_OFFSET(vq, i);
168
+ for (j = 0; j < vq * 2; ++j) {
169
+ __get_user_e(env->zarray[i].d[j], z + j, le);
170
+ }
171
+ }
172
+ return true;
173
+}
174
+
175
static int target_restore_sigframe(CPUARMState *env,
176
struct target_rt_sigframe *sf)
177
{
178
struct target_aarch64_ctx *ctx, *extra = NULL;
179
struct target_fpsimd_context *fpsimd = NULL;
180
struct target_sve_context *sve = NULL;
181
+ struct target_za_context *za = NULL;
182
uint64_t extra_datap = 0;
183
bool used_extra = false;
184
int sve_size = 0;
185
+ int za_size = 0;
186
+ int svcr = 0;
187
188
target_restore_general_frame(env, sf);
189
190
@@ -XXX,XX +XXX,XX @@ static int target_restore_sigframe(CPUARMState *env,
191
sve_size = size;
192
break;
193
194
+ case TARGET_ZA_MAGIC:
195
+ if (za || size < sizeof(struct target_za_context)) {
196
+ goto err;
197
+ }
198
+ za = (struct target_za_context *)ctx;
199
+ za_size = size;
200
+ break;
201
+
202
case TARGET_EXTRA_MAGIC:
203
if (extra || size != sizeof(struct target_extra_context)) {
204
goto err;
205
@@ -XXX,XX +XXX,XX @@ static int target_restore_sigframe(CPUARMState *env,
206
}
207
208
/* SVE data, if present, overwrites FPSIMD data. */
209
- if (sve && !target_restore_sve_record(env, sve, sve_size)) {
210
+ if (sve && !target_restore_sve_record(env, sve, sve_size, &svcr)) {
211
goto err;
212
}
213
+ if (za && !target_restore_za_record(env, za, za_size, &svcr)) {
214
+ goto err;
215
+ }
216
+ if (env->svcr != svcr) {
217
+ env->svcr = svcr;
218
+ arm_rebuild_hflags(env);
219
+ }
220
unlock_user(extra, extra_datap, 0);
221
return 0;
222
223
@@ -XXX,XX +XXX,XX @@ static void target_setup_frame(int usig, struct target_sigaction *ka,
224
.total_size = offsetof(struct target_rt_sigframe,
225
uc.tuc_mcontext.__reserved),
226
};
227
- int fpsimd_ofs, fr_ofs, sve_ofs = 0, vq = 0, sve_size = 0;
228
+ int fpsimd_ofs, fr_ofs, sve_ofs = 0, za_ofs = 0;
229
+ int sve_size = 0, za_size = 0;
230
struct target_rt_sigframe *frame;
231
struct target_rt_frame_record *fr;
232
abi_ulong frame_addr, return_addr;
233
@@ -XXX,XX +XXX,XX @@ static void target_setup_frame(int usig, struct target_sigaction *ka,
234
&layout);
235
236
/* SVE state needs saving only if it exists. */
237
- if (cpu_isar_feature(aa64_sve, env_archcpu(env))) {
238
- vq = sve_vq(env);
239
- sve_size = QEMU_ALIGN_UP(TARGET_SVE_SIG_CONTEXT_SIZE(vq), 16);
240
+ if (cpu_isar_feature(aa64_sve, env_archcpu(env)) ||
241
+ cpu_isar_feature(aa64_sme, env_archcpu(env))) {
242
+ sve_size = QEMU_ALIGN_UP(TARGET_SVE_SIG_CONTEXT_SIZE(sve_vq(env)), 16);
243
sve_ofs = alloc_sigframe_space(sve_size, &layout);
244
}
245
+ if (cpu_isar_feature(aa64_sme, env_archcpu(env))) {
246
+ /* ZA state needs saving only if it is enabled. */
247
+ if (FIELD_EX64(env->svcr, SVCR, ZA)) {
248
+ za_size = TARGET_ZA_SIG_CONTEXT_SIZE(sme_vq(env));
249
+ } else {
250
+ za_size = TARGET_ZA_SIG_CONTEXT_SIZE(0);
251
+ }
252
+ za_ofs = alloc_sigframe_space(za_size, &layout);
253
+ }
254
255
if (layout.extra_ofs) {
256
/* Reserve space for the extra end marker. The standard end marker
257
@@ -XXX,XX +XXX,XX @@ static void target_setup_frame(int usig, struct target_sigaction *ka,
258
target_setup_end_record((void *)frame + layout.extra_end_ofs);
259
}
260
if (sve_ofs) {
261
- target_setup_sve_record((void *)frame + sve_ofs, env, vq, sve_size);
262
+ target_setup_sve_record((void *)frame + sve_ofs, env, sve_size);
263
+ }
264
+ if (za_ofs) {
265
+ target_setup_za_record((void *)frame + za_ofs, env, za_size);
266
}
267
268
/* Set up the stack frame for unwinding. */
269
@@ -XXX,XX +XXX,XX @@ static void target_setup_frame(int usig, struct target_sigaction *ka,
270
env->btype = 2;
271
}
272
273
+ /*
274
+ * Invoke the signal handler with both SM and ZA disabled.
275
+ * When clearing SM, ResetSVEState, per SMSTOP.
276
+ */
277
+ if (FIELD_EX64(env->svcr, SVCR, SM)) {
278
+ arm_reset_sve_state(env);
279
+ }
280
+ if (env->svcr) {
281
+ env->svcr = 0;
282
+ arm_rebuild_hflags(env);
283
+ }
284
+
285
if (info) {
286
tswap_siginfo(&frame->info, info);
287
env->xregs[1] = frame_addr + offsetof(struct target_rt_sigframe, info);
89
--
288
--
90
2.16.1
289
2.25.1
91
92
diff view generated by jsdifflib
1
The documentation for the generic loader claims that you can
1
From: Richard Henderson <richard.henderson@linaro.org>
2
set the PC for a CPU with an option of the form
3
-device loader,cpu-num=0,addr=0x10000004
4
2
5
However if you try this QEMU complains:
3
Add "sve" to the sve prctl functions, to distinguish
6
cpu_num must be specified when setting a program counter
4
them from the coming "sme" prctls with similar names.
7
5
8
This is because we were testing against 0 rather than CPU_NONE.
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220708151540.18136-42-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
linux-user/aarch64/target_prctl.h | 8 ++++----
12
linux-user/syscall.c | 12 ++++++------
13
2 files changed, 10 insertions(+), 10 deletions(-)
9
14
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
15
diff --git a/linux-user/aarch64/target_prctl.h b/linux-user/aarch64/target_prctl.h
11
Reviewed-by: Alistair Francis <alistair.francis@xilinx.com>
12
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
13
Message-id: 20180205150426.20542-1-peter.maydell@linaro.org
14
---
15
hw/core/generic-loader.c | 2 +-
16
1 file changed, 1 insertion(+), 1 deletion(-)
17
18
diff --git a/hw/core/generic-loader.c b/hw/core/generic-loader.c
19
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
20
--- a/hw/core/generic-loader.c
17
--- a/linux-user/aarch64/target_prctl.h
21
+++ b/hw/core/generic-loader.c
18
+++ b/linux-user/aarch64/target_prctl.h
22
@@ -XXX,XX +XXX,XX @@ static void generic_loader_realize(DeviceState *dev, Error **errp)
19
@@ -XXX,XX +XXX,XX @@
23
error_setg(errp, "data can not be specified when setting a "
20
#ifndef AARCH64_TARGET_PRCTL_H
24
"program counter");
21
#define AARCH64_TARGET_PRCTL_H
25
return;
22
26
- } else if (!s->cpu_num) {
23
-static abi_long do_prctl_get_vl(CPUArchState *env)
27
+ } else if (s->cpu_num == CPU_NONE) {
24
+static abi_long do_prctl_sve_get_vl(CPUArchState *env)
28
error_setg(errp, "cpu_num must be specified when setting a "
25
{
29
"program counter");
26
ARMCPU *cpu = env_archcpu(env);
30
return;
27
if (cpu_isar_feature(aa64_sve, cpu)) {
28
@@ -XXX,XX +XXX,XX @@ static abi_long do_prctl_get_vl(CPUArchState *env)
29
}
30
return -TARGET_EINVAL;
31
}
32
-#define do_prctl_get_vl do_prctl_get_vl
33
+#define do_prctl_sve_get_vl do_prctl_sve_get_vl
34
35
-static abi_long do_prctl_set_vl(CPUArchState *env, abi_long arg2)
36
+static abi_long do_prctl_sve_set_vl(CPUArchState *env, abi_long arg2)
37
{
38
/*
39
* We cannot support either PR_SVE_SET_VL_ONEXEC or PR_SVE_VL_INHERIT.
40
@@ -XXX,XX +XXX,XX @@ static abi_long do_prctl_set_vl(CPUArchState *env, abi_long arg2)
41
}
42
return -TARGET_EINVAL;
43
}
44
-#define do_prctl_set_vl do_prctl_set_vl
45
+#define do_prctl_sve_set_vl do_prctl_sve_set_vl
46
47
static abi_long do_prctl_reset_keys(CPUArchState *env, abi_long arg2)
48
{
49
diff --git a/linux-user/syscall.c b/linux-user/syscall.c
50
index XXXXXXX..XXXXXXX 100644
51
--- a/linux-user/syscall.c
52
+++ b/linux-user/syscall.c
53
@@ -XXX,XX +XXX,XX @@ static abi_long do_prctl_inval1(CPUArchState *env, abi_long arg2)
54
#ifndef do_prctl_set_fp_mode
55
#define do_prctl_set_fp_mode do_prctl_inval1
56
#endif
57
-#ifndef do_prctl_get_vl
58
-#define do_prctl_get_vl do_prctl_inval0
59
+#ifndef do_prctl_sve_get_vl
60
+#define do_prctl_sve_get_vl do_prctl_inval0
61
#endif
62
-#ifndef do_prctl_set_vl
63
-#define do_prctl_set_vl do_prctl_inval1
64
+#ifndef do_prctl_sve_set_vl
65
+#define do_prctl_sve_set_vl do_prctl_inval1
66
#endif
67
#ifndef do_prctl_reset_keys
68
#define do_prctl_reset_keys do_prctl_inval1
69
@@ -XXX,XX +XXX,XX @@ static abi_long do_prctl(CPUArchState *env, abi_long option, abi_long arg2,
70
case PR_SET_FP_MODE:
71
return do_prctl_set_fp_mode(env, arg2);
72
case PR_SVE_GET_VL:
73
- return do_prctl_get_vl(env);
74
+ return do_prctl_sve_get_vl(env);
75
case PR_SVE_SET_VL:
76
- return do_prctl_set_vl(env, arg2);
77
+ return do_prctl_sve_set_vl(env, arg2);
78
case PR_PAC_RESET_KEYS:
79
if (arg3 || arg4 || arg5) {
80
return -TARGET_EINVAL;
31
--
81
--
32
2.16.1
82
2.25.1
33
34
diff view generated by jsdifflib
1
From: Christoffer Dall <christoffer.dall@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
KVM doesn't support emulating a GICv3 in userspace, only GICv2. We
3
These prctl set the Streaming SVE vector length, which may
4
currently attempt this anyway, and as a result a KVM guest doesn't
4
be completely different from the Normal SVE vector length.
5
receive interrupts and the user is left wondering why. Report an error
6
to the user if this particular combination is requested.
7
5
8
Signed-off-by: Christoffer Dall <christoffer.dall@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
10
Message-id: 20180201205307.30343-1-christoffer.dall@linaro.org
8
Message-id: 20220708151540.18136-43-richard.henderson@linaro.org
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
10
---
13
target/arm/kvm_arm.h | 4 ++++
11
linux-user/aarch64/target_prctl.h | 54 +++++++++++++++++++++++++++++++
14
1 file changed, 4 insertions(+)
12
linux-user/syscall.c | 16 +++++++++
13
2 files changed, 70 insertions(+)
15
14
16
diff --git a/target/arm/kvm_arm.h b/target/arm/kvm_arm.h
15
diff --git a/linux-user/aarch64/target_prctl.h b/linux-user/aarch64/target_prctl.h
17
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
18
--- a/target/arm/kvm_arm.h
17
--- a/linux-user/aarch64/target_prctl.h
19
+++ b/target/arm/kvm_arm.h
18
+++ b/linux-user/aarch64/target_prctl.h
20
@@ -XXX,XX +XXX,XX @@ static inline const char *gicv3_class_name(void)
19
@@ -XXX,XX +XXX,XX @@ static abi_long do_prctl_sve_get_vl(CPUArchState *env)
21
exit(1);
20
{
21
ARMCPU *cpu = env_archcpu(env);
22
if (cpu_isar_feature(aa64_sve, cpu)) {
23
+ /* PSTATE.SM is always unset on syscall entry. */
24
return sve_vq(env) * 16;
25
}
26
return -TARGET_EINVAL;
27
@@ -XXX,XX +XXX,XX @@ static abi_long do_prctl_sve_set_vl(CPUArchState *env, abi_long arg2)
28
&& arg2 >= 0 && arg2 <= 512 * 16 && !(arg2 & 15)) {
29
uint32_t vq, old_vq;
30
31
+ /* PSTATE.SM is always unset on syscall entry. */
32
old_vq = sve_vq(env);
33
34
/*
35
@@ -XXX,XX +XXX,XX @@ static abi_long do_prctl_sve_set_vl(CPUArchState *env, abi_long arg2)
36
}
37
#define do_prctl_sve_set_vl do_prctl_sve_set_vl
38
39
+static abi_long do_prctl_sme_get_vl(CPUArchState *env)
40
+{
41
+ ARMCPU *cpu = env_archcpu(env);
42
+ if (cpu_isar_feature(aa64_sme, cpu)) {
43
+ return sme_vq(env) * 16;
44
+ }
45
+ return -TARGET_EINVAL;
46
+}
47
+#define do_prctl_sme_get_vl do_prctl_sme_get_vl
48
+
49
+static abi_long do_prctl_sme_set_vl(CPUArchState *env, abi_long arg2)
50
+{
51
+ /*
52
+ * We cannot support either PR_SME_SET_VL_ONEXEC or PR_SME_VL_INHERIT.
53
+ * Note the kernel definition of sve_vl_valid allows for VQ=512,
54
+ * i.e. VL=8192, even though the architectural maximum is VQ=16.
55
+ */
56
+ if (cpu_isar_feature(aa64_sme, env_archcpu(env))
57
+ && arg2 >= 0 && arg2 <= 512 * 16 && !(arg2 & 15)) {
58
+ int vq, old_vq;
59
+
60
+ old_vq = sme_vq(env);
61
+
62
+ /*
63
+ * Bound the value of vq, so that we know that it fits into
64
+ * the 4-bit field in SMCR_EL1. Because PSTATE.SM is cleared
65
+ * on syscall entry, we are not modifying the current SVE
66
+ * vector length.
67
+ */
68
+ vq = MAX(arg2 / 16, 1);
69
+ vq = MIN(vq, 16);
70
+ env->vfp.smcr_el[1] =
71
+ FIELD_DP64(env->vfp.smcr_el[1], SMCR, LEN, vq - 1);
72
+
73
+ /* Delay rebuilding hflags until we know if ZA must change. */
74
+ vq = sve_vqm1_for_el_sm(env, 0, true) + 1;
75
+
76
+ if (vq != old_vq) {
77
+ /*
78
+ * PSTATE.ZA state is cleared on any change to SVL.
79
+ * We need not call arm_rebuild_hflags because PSTATE.SM was
80
+ * cleared on syscall entry, so this hasn't changed VL.
81
+ */
82
+ env->svcr = FIELD_DP64(env->svcr, SVCR, ZA, 0);
83
+ arm_rebuild_hflags(env);
84
+ }
85
+ return vq * 16;
86
+ }
87
+ return -TARGET_EINVAL;
88
+}
89
+#define do_prctl_sme_set_vl do_prctl_sme_set_vl
90
+
91
static abi_long do_prctl_reset_keys(CPUArchState *env, abi_long arg2)
92
{
93
ARMCPU *cpu = env_archcpu(env);
94
diff --git a/linux-user/syscall.c b/linux-user/syscall.c
95
index XXXXXXX..XXXXXXX 100644
96
--- a/linux-user/syscall.c
97
+++ b/linux-user/syscall.c
98
@@ -XXX,XX +XXX,XX @@ abi_long do_arch_prctl(CPUX86State *env, int code, abi_ulong addr)
99
#ifndef PR_SET_SYSCALL_USER_DISPATCH
100
# define PR_SET_SYSCALL_USER_DISPATCH 59
22
#endif
101
#endif
23
} else {
102
+#ifndef PR_SME_SET_VL
24
+ if (kvm_enabled()) {
103
+# define PR_SME_SET_VL 63
25
+ error_report("Userspace GICv3 is not supported with KVM");
104
+# define PR_SME_GET_VL 64
26
+ exit(1);
105
+# define PR_SME_VL_LEN_MASK 0xffff
27
+ }
106
+# define PR_SME_VL_INHERIT (1 << 17)
28
return "arm-gicv3";
107
+#endif
29
}
108
30
}
109
#include "target_prctl.h"
110
111
@@ -XXX,XX +XXX,XX @@ static abi_long do_prctl_inval1(CPUArchState *env, abi_long arg2)
112
#ifndef do_prctl_set_unalign
113
#define do_prctl_set_unalign do_prctl_inval1
114
#endif
115
+#ifndef do_prctl_sme_get_vl
116
+#define do_prctl_sme_get_vl do_prctl_inval0
117
+#endif
118
+#ifndef do_prctl_sme_set_vl
119
+#define do_prctl_sme_set_vl do_prctl_inval1
120
+#endif
121
122
static abi_long do_prctl(CPUArchState *env, abi_long option, abi_long arg2,
123
abi_long arg3, abi_long arg4, abi_long arg5)
124
@@ -XXX,XX +XXX,XX @@ static abi_long do_prctl(CPUArchState *env, abi_long option, abi_long arg2,
125
return do_prctl_sve_get_vl(env);
126
case PR_SVE_SET_VL:
127
return do_prctl_sve_set_vl(env, arg2);
128
+ case PR_SME_GET_VL:
129
+ return do_prctl_sme_get_vl(env);
130
+ case PR_SME_SET_VL:
131
+ return do_prctl_sme_set_vl(env, arg2);
132
case PR_PAC_RESET_KEYS:
133
if (arg3 || arg4 || arg5) {
134
return -TARGET_EINVAL;
31
--
135
--
32
2.16.1
136
2.25.1
33
34
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
There's no reason to set CPACR_EL1.ZEN if SVE disabled.
4
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
3
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
4
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
7
Message-id: 20220708151540.18136-44-richard.henderson@linaro.org
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Message-id: 20180123035349.24538-3-richard.henderson@linaro.org
7
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
---
9
---
9
target/arm/cpu.h | 12 ++++++++++++
10
target/arm/cpu.c | 7 +++----
10
1 file changed, 12 insertions(+)
11
1 file changed, 3 insertions(+), 4 deletions(-)
11
12
12
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
13
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
13
index XXXXXXX..XXXXXXX 100644
14
index XXXXXXX..XXXXXXX 100644
14
--- a/target/arm/cpu.h
15
--- a/target/arm/cpu.c
15
+++ b/target/arm/cpu.h
16
+++ b/target/arm/cpu.c
16
@@ -XXX,XX +XXX,XX @@ typedef struct ARMVectorReg {
17
@@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(DeviceState *dev)
17
uint64_t d[2 * ARM_MAX_VQ] QEMU_ALIGNED(16);
18
/* and to the FP/Neon instructions */
18
} ARMVectorReg;
19
env->cp15.cpacr_el1 = FIELD_DP64(env->cp15.cpacr_el1,
19
20
CPACR_EL1, FPEN, 3);
20
+/* In AArch32 mode, predicate registers do not exist at all. */
21
- /* and to the SVE instructions */
21
+#ifdef TARGET_AARCH64
22
- env->cp15.cpacr_el1 = FIELD_DP64(env->cp15.cpacr_el1,
22
+typedef struct ARMPredicateReg {
23
- CPACR_EL1, ZEN, 3);
23
+ uint64_t p[2 * ARM_MAX_VQ / 8] QEMU_ALIGNED(16);
24
- /* with reasonable vector length */
24
+} ARMPredicateReg;
25
+ /* and to the SVE instructions, with default vector length */
25
+#endif
26
if (cpu_isar_feature(aa64_sve, cpu)) {
26
+
27
+ env->cp15.cpacr_el1 = FIELD_DP64(env->cp15.cpacr_el1,
27
28
+ CPACR_EL1, ZEN, 3);
28
typedef struct CPUARMState {
29
env->vfp.zcr_el[1] = cpu->sve_default_vq - 1;
29
/* Regs for current mode. */
30
}
30
@@ -XXX,XX +XXX,XX @@ typedef struct CPUARMState {
31
/*
31
struct {
32
ARMVectorReg zregs[32];
33
34
+#ifdef TARGET_AARCH64
35
+ /* Store FFR as pregs[16] to make it easier to treat as any other. */
36
+ ARMPredicateReg pregs[17];
37
+#endif
38
+
39
uint32_t xregs[16];
40
/* We store these fpcsr fields separately for convenience. */
41
int vec_len;
42
--
32
--
43
2.16.1
33
2.25.1
44
45
diff view generated by jsdifflib
1
From: Andrey Smirnov <andrew.smirnov@gmail.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Convert i.MX6 to use TYPE_IMX_USDHC since that's what real HW comes
3
Enable SME, TPIDR2_EL0, and FA64 if supported by the cpu.
4
with.
5
4
6
Cc: Peter Maydell <peter.maydell@linaro.org>
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Cc: Jason Wang <jasowang@redhat.com>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Cc: Philippe Mathieu-Daudé <f4bug@amsat.org>
7
Message-id: 20220708151540.18136-45-richard.henderson@linaro.org
9
Cc: Marcel Apfelbaum <marcel.apfelbaum@zoho.com>
10
Cc: Michael S. Tsirkin <mst@redhat.com>
11
Cc: qemu-devel@nongnu.org
12
Cc: qemu-arm@nongnu.org
13
Cc: yurovsky@gmail.com
14
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
15
Signed-off-by: Andrey Smirnov <andrew.smirnov@gmail.com>
16
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
---
9
---
18
hw/arm/fsl-imx6.c | 2 +-
10
target/arm/cpu.c | 11 +++++++++++
19
1 file changed, 1 insertion(+), 1 deletion(-)
11
1 file changed, 11 insertions(+)
20
12
21
diff --git a/hw/arm/fsl-imx6.c b/hw/arm/fsl-imx6.c
13
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
22
index XXXXXXX..XXXXXXX 100644
14
index XXXXXXX..XXXXXXX 100644
23
--- a/hw/arm/fsl-imx6.c
15
--- a/target/arm/cpu.c
24
+++ b/hw/arm/fsl-imx6.c
16
+++ b/target/arm/cpu.c
25
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6_init(Object *obj)
17
@@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(DeviceState *dev)
26
}
18
CPACR_EL1, ZEN, 3);
27
19
env->vfp.zcr_el[1] = cpu->sve_default_vq - 1;
28
for (i = 0; i < FSL_IMX6_NUM_ESDHCS; i++) {
20
}
29
- object_initialize(&s->esdhc[i], sizeof(s->esdhc[i]), TYPE_SYSBUS_SDHCI);
21
+ /* and for SME instructions, with default vector length, and TPIDR2 */
30
+ object_initialize(&s->esdhc[i], sizeof(s->esdhc[i]), TYPE_IMX_USDHC);
22
+ if (cpu_isar_feature(aa64_sme, cpu)) {
31
qdev_set_parent_bus(DEVICE(&s->esdhc[i]), sysbus_get_default());
23
+ env->cp15.sctlr_el[1] |= SCTLR_EnTP2;
32
snprintf(name, NAME_SIZE, "sdhc%d", i + 1);
24
+ env->cp15.cpacr_el1 = FIELD_DP64(env->cp15.cpacr_el1,
33
object_property_add_child(obj, name, OBJECT(&s->esdhc[i]), NULL);
25
+ CPACR_EL1, SMEN, 3);
26
+ env->vfp.smcr_el[1] = cpu->sme_default_vq - 1;
27
+ if (cpu_isar_feature(aa64_sme_fa64, cpu)) {
28
+ env->vfp.smcr_el[1] = FIELD_DP64(env->vfp.smcr_el[1],
29
+ SMCR, FA64, 1);
30
+ }
31
+ }
32
/*
33
* Enable 48-bit address space (TODO: take reserved_va into account).
34
* Enable TBI0 but not TBI1.
34
--
35
--
35
2.16.1
36
2.25.1
36
37
diff view generated by jsdifflib
1
From: Ard Biesheuvel <ard.biesheuvel@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Add support for the new ARMv8.2 SHA-3, SM3, SM4 and SHA-512 instructions to
4
AArch64 user mode emulation.
5
6
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
7
Message-id: 20180207111729.15737-6-ard.biesheuvel@linaro.org
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
3
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
4
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
5
Message-id: 20220708151540.18136-46-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
7
---
11
linux-user/elfload.c | 19 +++++++++++++++++++
8
linux-user/elfload.c | 20 ++++++++++++++++++++
12
target/arm/cpu64.c | 4 ++++
9
1 file changed, 20 insertions(+)
13
2 files changed, 23 insertions(+)
14
10
15
diff --git a/linux-user/elfload.c b/linux-user/elfload.c
11
diff --git a/linux-user/elfload.c b/linux-user/elfload.c
16
index XXXXXXX..XXXXXXX 100644
12
index XXXXXXX..XXXXXXX 100644
17
--- a/linux-user/elfload.c
13
--- a/linux-user/elfload.c
18
+++ b/linux-user/elfload.c
14
+++ b/linux-user/elfload.c
19
@@ -XXX,XX +XXX,XX @@ enum {
15
@@ -XXX,XX +XXX,XX @@ enum {
20
ARM_HWCAP_A64_SHA1 = 1 << 5,
16
ARM_HWCAP2_A64_RNG = 1 << 16,
21
ARM_HWCAP_A64_SHA2 = 1 << 6,
17
ARM_HWCAP2_A64_BTI = 1 << 17,
22
ARM_HWCAP_A64_CRC32 = 1 << 7,
18
ARM_HWCAP2_A64_MTE = 1 << 18,
23
+ ARM_HWCAP_A64_ATOMICS = 1 << 8,
19
+ ARM_HWCAP2_A64_ECV = 1 << 19,
24
+ ARM_HWCAP_A64_FPHP = 1 << 9,
20
+ ARM_HWCAP2_A64_AFP = 1 << 20,
25
+ ARM_HWCAP_A64_ASIMDHP = 1 << 10,
21
+ ARM_HWCAP2_A64_RPRES = 1 << 21,
26
+ ARM_HWCAP_A64_CPUID = 1 << 11,
22
+ ARM_HWCAP2_A64_MTE3 = 1 << 22,
27
+ ARM_HWCAP_A64_ASIMDRDM = 1 << 12,
23
+ ARM_HWCAP2_A64_SME = 1 << 23,
28
+ ARM_HWCAP_A64_JSCVT = 1 << 13,
24
+ ARM_HWCAP2_A64_SME_I16I64 = 1 << 24,
29
+ ARM_HWCAP_A64_FCMA = 1 << 14,
25
+ ARM_HWCAP2_A64_SME_F64F64 = 1 << 25,
30
+ ARM_HWCAP_A64_LRCPC = 1 << 15,
26
+ ARM_HWCAP2_A64_SME_I8I32 = 1 << 26,
31
+ ARM_HWCAP_A64_DCPOP = 1 << 16,
27
+ ARM_HWCAP2_A64_SME_F16F32 = 1 << 27,
32
+ ARM_HWCAP_A64_SHA3 = 1 << 17,
28
+ ARM_HWCAP2_A64_SME_B16F32 = 1 << 28,
33
+ ARM_HWCAP_A64_SM3 = 1 << 18,
29
+ ARM_HWCAP2_A64_SME_F32F32 = 1 << 29,
34
+ ARM_HWCAP_A64_SM4 = 1 << 19,
30
+ ARM_HWCAP2_A64_SME_FA64 = 1 << 30,
35
+ ARM_HWCAP_A64_ASIMDDP = 1 << 20,
36
+ ARM_HWCAP_A64_SHA512 = 1 << 21,
37
+ ARM_HWCAP_A64_SVE = 1 << 22,
38
};
31
};
39
32
40
#define ELF_HWCAP get_elf_hwcap()
33
#define ELF_HWCAP get_elf_hwcap()
41
@@ -XXX,XX +XXX,XX @@ static uint32_t get_elf_hwcap(void)
34
@@ -XXX,XX +XXX,XX @@ static uint32_t get_elf_hwcap2(void)
42
GET_FEATURE(ARM_FEATURE_V8_SHA1, ARM_HWCAP_A64_SHA1);
35
GET_FEATURE_ID(aa64_rndr, ARM_HWCAP2_A64_RNG);
43
GET_FEATURE(ARM_FEATURE_V8_SHA256, ARM_HWCAP_A64_SHA2);
36
GET_FEATURE_ID(aa64_bti, ARM_HWCAP2_A64_BTI);
44
GET_FEATURE(ARM_FEATURE_CRC, ARM_HWCAP_A64_CRC32);
37
GET_FEATURE_ID(aa64_mte, ARM_HWCAP2_A64_MTE);
45
+ GET_FEATURE(ARM_FEATURE_V8_SHA3, ARM_HWCAP_A64_SHA3);
38
+ GET_FEATURE_ID(aa64_sme, (ARM_HWCAP2_A64_SME |
46
+ GET_FEATURE(ARM_FEATURE_V8_SM3, ARM_HWCAP_A64_SM3);
39
+ ARM_HWCAP2_A64_SME_F32F32 |
47
+ GET_FEATURE(ARM_FEATURE_V8_SM4, ARM_HWCAP_A64_SM4);
40
+ ARM_HWCAP2_A64_SME_B16F32 |
48
+ GET_FEATURE(ARM_FEATURE_V8_SHA512, ARM_HWCAP_A64_SHA512);
41
+ ARM_HWCAP2_A64_SME_F16F32 |
49
#undef GET_FEATURE
42
+ ARM_HWCAP2_A64_SME_I8I32));
43
+ GET_FEATURE_ID(aa64_sme_f64f64, ARM_HWCAP2_A64_SME_F64F64);
44
+ GET_FEATURE_ID(aa64_sme_i16i64, ARM_HWCAP2_A64_SME_I16I64);
45
+ GET_FEATURE_ID(aa64_sme_fa64, ARM_HWCAP2_A64_SME_FA64);
50
46
51
return hwcaps;
47
return hwcaps;
52
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
48
}
53
index XXXXXXX..XXXXXXX 100644
54
--- a/target/arm/cpu64.c
55
+++ b/target/arm/cpu64.c
56
@@ -XXX,XX +XXX,XX @@ static void aarch64_any_initfn(Object *obj)
57
set_feature(&cpu->env, ARM_FEATURE_V8_AES);
58
set_feature(&cpu->env, ARM_FEATURE_V8_SHA1);
59
set_feature(&cpu->env, ARM_FEATURE_V8_SHA256);
60
+ set_feature(&cpu->env, ARM_FEATURE_V8_SHA512);
61
+ set_feature(&cpu->env, ARM_FEATURE_V8_SHA3);
62
+ set_feature(&cpu->env, ARM_FEATURE_V8_SM3);
63
+ set_feature(&cpu->env, ARM_FEATURE_V8_SM4);
64
set_feature(&cpu->env, ARM_FEATURE_V8_PMULL);
65
set_feature(&cpu->env, ARM_FEATURE_CRC);
66
cpu->ctr = 0x80038003; /* 32 byte I and D cacheline size, VIPT icache */
67
--
49
--
68
2.16.1
50
2.25.1
69
70
diff view generated by jsdifflib