1 | Second pull request of the week; mostly RTH's support for some | 1 | Arm pullreq: Rémi's ARMv8.4-SEL2 support is the big thing here. |
---|---|---|---|
2 | new-in-v8.1/v8.3 instructions, and my v8M board model. | ||
3 | 2 | ||
4 | thanks | 3 | thanks |
5 | -- PMM | 4 | -- PMM |
6 | 5 | ||
7 | The following changes since commit 427cbc7e4136a061628cb4315cc8182ea36d772f: | 6 | The following changes since commit f1fcb6851aba6dd9838886dc179717a11e344a1c: |
8 | 7 | ||
9 | Merge remote-tracking branch 'remotes/mst/tags/for_upstream' into staging (2018-03-01 18:46:41 +0000) | 8 | Merge remote-tracking branch 'remotes/huth-gitlab/tags/pull-request-2021-01-19' into staging (2021-01-19 11:57:07 +0000) |
10 | 9 | ||
11 | are available in the Git repository at: | 10 | are available in the Git repository at: |
12 | 11 | ||
13 | git://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20180302 | 12 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20210119 |
14 | 13 | ||
15 | for you to fetch changes up to e66a67bf28e1b4fce2e3d72a2610dbd48d9d3078: | 14 | for you to fetch changes up to 6d39956891b3d1857af84f72f0230a6d99eb3b6a: |
16 | 15 | ||
17 | target/arm: Enable ARM_FEATURE_V8_FCMA (2018-03-02 11:03:45 +0000) | 16 | docs: Build and install all the docs in a single manual (2021-01-19 14:38:53 +0000) |
18 | 17 | ||
19 | ---------------------------------------------------------------- | 18 | ---------------------------------------------------------------- |
20 | target-arm queue: | 19 | target-arm queue: |
21 | * implement FCMA and RDM v8.1 and v8.3 instructions | 20 | * Implement IMPDEF pauth algorithm |
22 | * enable Cortex-M33 v8M core, and provide new mps2-an505 board model | 21 | * Support ARMv8.4-SEL2 |
23 | that uses it | 22 | * Fix bug where we were truncating predicate vector lengths in SVE insns |
24 | * decodetree: Propagate return value from translate subroutines | 23 | * Implement new pvpanic-pci device |
25 | * xlnx-zynqmp: Implement the RTC device | 24 | * npcm7xx_adc-test: Fix memleak in adc_qom_set |
25 | * target/arm/m_helper: Silence GCC 10 maybe-uninitialized error | ||
26 | * docs: Build and install all the docs in a single manual | ||
26 | 27 | ||
27 | ---------------------------------------------------------------- | 28 | ---------------------------------------------------------------- |
28 | Alistair Francis (3): | 29 | Gan Qixin (1): |
29 | xlnx-zynqmp-rtc: Initial commit | 30 | npcm7xx_adc-test: Fix memleak in adc_qom_set |
30 | xlnx-zynqmp-rtc: Add basic time support | ||
31 | xlnx-zynqmp: Connect the RTC device | ||
32 | 31 | ||
33 | Peter Maydell (19): | 32 | Mihai Carabas (4): |
34 | loader: Add new load_ramdisk_as() | 33 | hw/misc/pvpanic: split-out generic and bus dependent code |
35 | hw/arm/boot: Honour CPU's address space for image loads | 34 | hw/misc/pvpanic: add PCI interface support |
36 | hw/arm/armv7m: Honour CPU's address space for image loads | 35 | pvpanic : update pvpanic spec document |
37 | target/arm: Define an IDAU interface | 36 | tests/qtest: add a test case for pvpanic-pci |
38 | armv7m: Forward idau property to CPU object | ||
39 | target/arm: Define init-svtor property for the reset secure VTOR value | ||
40 | armv7m: Forward init-svtor property to CPU object | ||
41 | target/arm: Add Cortex-M33 | ||
42 | hw/misc/unimp: Move struct to header file | ||
43 | include/hw/or-irq.h: Add missing include guard | ||
44 | qdev: Add new qdev_init_gpio_in_named_with_opaque() | ||
45 | hw/core/split-irq: Device that splits IRQ lines | ||
46 | hw/misc/mps2-fpgaio: FPGA control block for MPS2 AN505 | ||
47 | hw/misc/tz-ppc: Model TrustZone peripheral protection controller | ||
48 | hw/misc/iotkit-secctl: Arm IoT Kit security controller initial skeleton | ||
49 | hw/misc/iotkit-secctl: Add handling for PPCs | ||
50 | hw/misc/iotkit-secctl: Add remaining simple registers | ||
51 | hw/arm/iotkit: Model Arm IOT Kit | ||
52 | mps2-an505: New board model: MPS2 with AN505 Cortex-M33 FPGA image | ||
53 | 37 | ||
54 | Richard Henderson (17): | 38 | Peter Maydell (1): |
55 | decodetree: Propagate return value from translate subroutines | 39 | docs: Build and install all the docs in a single manual |
56 | target/arm: Add ARM_FEATURE_V8_RDM | ||
57 | target/arm: Refactor disas_simd_indexed decode | ||
58 | target/arm: Refactor disas_simd_indexed size checks | ||
59 | target/arm: Decode aa64 armv8.1 scalar three same extra | ||
60 | target/arm: Decode aa64 armv8.1 three same extra | ||
61 | target/arm: Decode aa64 armv8.1 scalar/vector x indexed element | ||
62 | target/arm: Decode aa32 armv8.1 three same | ||
63 | target/arm: Decode aa32 armv8.1 two reg and a scalar | ||
64 | target/arm: Enable ARM_FEATURE_V8_RDM | ||
65 | target/arm: Add ARM_FEATURE_V8_FCMA | ||
66 | target/arm: Decode aa64 armv8.3 fcadd | ||
67 | target/arm: Decode aa64 armv8.3 fcmla | ||
68 | target/arm: Decode aa32 armv8.3 3-same | ||
69 | target/arm: Decode aa32 armv8.3 2-reg-index | ||
70 | target/arm: Decode t32 simd 3reg and 2reg_scalar extension | ||
71 | target/arm: Enable ARM_FEATURE_V8_FCMA | ||
72 | 40 | ||
73 | hw/arm/Makefile.objs | 2 + | 41 | Philippe Mathieu-Daudé (1): |
74 | hw/core/Makefile.objs | 1 + | 42 | target/arm/m_helper: Silence GCC 10 maybe-uninitialized error |
75 | hw/misc/Makefile.objs | 4 + | ||
76 | hw/timer/Makefile.objs | 1 + | ||
77 | target/arm/Makefile.objs | 2 +- | ||
78 | include/hw/arm/armv7m.h | 5 + | ||
79 | include/hw/arm/iotkit.h | 109 ++++++ | ||
80 | include/hw/arm/xlnx-zynqmp.h | 2 + | ||
81 | include/hw/core/split-irq.h | 57 +++ | ||
82 | include/hw/irq.h | 4 +- | ||
83 | include/hw/loader.h | 12 +- | ||
84 | include/hw/misc/iotkit-secctl.h | 103 ++++++ | ||
85 | include/hw/misc/mps2-fpgaio.h | 43 +++ | ||
86 | include/hw/misc/tz-ppc.h | 101 ++++++ | ||
87 | include/hw/misc/unimp.h | 10 + | ||
88 | include/hw/or-irq.h | 5 + | ||
89 | include/hw/qdev-core.h | 30 +- | ||
90 | include/hw/timer/xlnx-zynqmp-rtc.h | 86 +++++ | ||
91 | target/arm/cpu.h | 8 + | ||
92 | target/arm/helper.h | 31 ++ | ||
93 | target/arm/idau.h | 61 ++++ | ||
94 | hw/arm/armv7m.c | 35 +- | ||
95 | hw/arm/boot.c | 119 ++++--- | ||
96 | hw/arm/iotkit.c | 598 +++++++++++++++++++++++++++++++ | ||
97 | hw/arm/mps2-tz.c | 503 ++++++++++++++++++++++++++ | ||
98 | hw/arm/xlnx-zynqmp.c | 14 + | ||
99 | hw/core/loader.c | 8 +- | ||
100 | hw/core/qdev.c | 8 +- | ||
101 | hw/core/split-irq.c | 89 +++++ | ||
102 | hw/misc/iotkit-secctl.c | 704 +++++++++++++++++++++++++++++++++++++ | ||
103 | hw/misc/mps2-fpgaio.c | 176 ++++++++++ | ||
104 | hw/misc/tz-ppc.c | 302 ++++++++++++++++ | ||
105 | hw/misc/unimp.c | 10 - | ||
106 | hw/timer/xlnx-zynqmp-rtc.c | 272 ++++++++++++++ | ||
107 | linux-user/elfload.c | 2 + | ||
108 | target/arm/cpu.c | 66 +++- | ||
109 | target/arm/cpu64.c | 2 + | ||
110 | target/arm/helper.c | 28 +- | ||
111 | target/arm/translate-a64.c | 514 +++++++++++++++++++++------ | ||
112 | target/arm/translate.c | 275 +++++++++++++-- | ||
113 | target/arm/vec_helper.c | 429 ++++++++++++++++++++++ | ||
114 | default-configs/arm-softmmu.mak | 5 + | ||
115 | hw/misc/trace-events | 24 ++ | ||
116 | hw/timer/trace-events | 3 + | ||
117 | scripts/decodetree.py | 5 +- | ||
118 | 45 files changed, 4668 insertions(+), 200 deletions(-) | ||
119 | create mode 100644 include/hw/arm/iotkit.h | ||
120 | create mode 100644 include/hw/core/split-irq.h | ||
121 | create mode 100644 include/hw/misc/iotkit-secctl.h | ||
122 | create mode 100644 include/hw/misc/mps2-fpgaio.h | ||
123 | create mode 100644 include/hw/misc/tz-ppc.h | ||
124 | create mode 100644 include/hw/timer/xlnx-zynqmp-rtc.h | ||
125 | create mode 100644 target/arm/idau.h | ||
126 | create mode 100644 hw/arm/iotkit.c | ||
127 | create mode 100644 hw/arm/mps2-tz.c | ||
128 | create mode 100644 hw/core/split-irq.c | ||
129 | create mode 100644 hw/misc/iotkit-secctl.c | ||
130 | create mode 100644 hw/misc/mps2-fpgaio.c | ||
131 | create mode 100644 hw/misc/tz-ppc.c | ||
132 | create mode 100644 hw/timer/xlnx-zynqmp-rtc.c | ||
133 | create mode 100644 target/arm/vec_helper.c | ||
134 | 43 | ||
44 | Richard Henderson (7): | ||
45 | target/arm: Implement an IMPDEF pauth algorithm | ||
46 | target/arm: Add cpu properties to control pauth | ||
47 | target/arm: Use object_property_add_bool for "sve" property | ||
48 | target/arm: Introduce PREDDESC field definitions | ||
49 | target/arm: Update PFIRST, PNEXT for pred_desc | ||
50 | target/arm: Update ZIP, UZP, TRN for pred_desc | ||
51 | target/arm: Update REV, PUNPK for pred_desc | ||
52 | |||
53 | Rémi Denis-Courmont (19): | ||
54 | target/arm: remove redundant tests | ||
55 | target/arm: add arm_is_el2_enabled() helper | ||
56 | target/arm: use arm_is_el2_enabled() where applicable | ||
57 | target/arm: use arm_hcr_el2_eff() where applicable | ||
58 | target/arm: factor MDCR_EL2 common handling | ||
59 | target/arm: Define isar_feature function to test for presence of SEL2 | ||
60 | target/arm: add 64-bit S-EL2 to EL exception table | ||
61 | target/arm: add MMU stage 1 for Secure EL2 | ||
62 | target/arm: add ARMv8.4-SEL2 system registers | ||
63 | target/arm: handle VMID change in secure state | ||
64 | target/arm: do S1_ptw_translate() before address space lookup | ||
65 | target/arm: translate NS bit in page-walks | ||
66 | target/arm: generalize 2-stage page-walk condition | ||
67 | target/arm: secure stage 2 translation regime | ||
68 | target/arm: set HPFAR_EL2.NS on secure stage 2 faults | ||
69 | target/arm: revector to run-time pick target EL | ||
70 | target/arm: Implement SCR_EL2.EEL2 | ||
71 | target/arm: enable Secure EL2 in max CPU | ||
72 | target/arm: refactor vae1_tlbmask() | ||
73 | |||
74 | docs/conf.py | 46 ++++- | ||
75 | docs/devel/conf.py | 15 -- | ||
76 | docs/index.html.in | 17 -- | ||
77 | docs/interop/conf.py | 28 --- | ||
78 | docs/meson.build | 64 +++--- | ||
79 | docs/specs/conf.py | 16 -- | ||
80 | docs/specs/pci-ids.txt | 1 + | ||
81 | docs/specs/pvpanic.txt | 13 +- | ||
82 | docs/system/arm/cpu-features.rst | 21 ++ | ||
83 | docs/system/conf.py | 28 --- | ||
84 | docs/tools/conf.py | 37 ---- | ||
85 | docs/user/conf.py | 15 -- | ||
86 | include/hw/misc/pvpanic.h | 24 ++- | ||
87 | include/hw/pci/pci.h | 1 + | ||
88 | include/qemu/xxhash.h | 98 +++++++++ | ||
89 | target/arm/cpu-param.h | 2 +- | ||
90 | target/arm/cpu.h | 107 ++++++++-- | ||
91 | target/arm/internals.h | 45 +++++ | ||
92 | hw/misc/pvpanic-isa.c | 94 +++++++++ | ||
93 | hw/misc/pvpanic-pci.c | 95 +++++++++ | ||
94 | hw/misc/pvpanic.c | 85 +------- | ||
95 | target/arm/cpu.c | 23 ++- | ||
96 | target/arm/cpu64.c | 65 ++++-- | ||
97 | target/arm/helper-a64.c | 8 +- | ||
98 | target/arm/helper.c | 414 ++++++++++++++++++++++++++------------- | ||
99 | target/arm/m_helper.c | 2 +- | ||
100 | target/arm/monitor.c | 1 + | ||
101 | target/arm/op_helper.c | 4 +- | ||
102 | target/arm/pauth_helper.c | 27 ++- | ||
103 | target/arm/sve_helper.c | 33 ++-- | ||
104 | target/arm/tlb_helper.c | 3 + | ||
105 | target/arm/translate-a64.c | 4 + | ||
106 | target/arm/translate-sve.c | 31 ++- | ||
107 | target/arm/translate.c | 36 +++- | ||
108 | tests/qtest/arm-cpu-features.c | 13 ++ | ||
109 | tests/qtest/npcm7xx_adc-test.c | 1 + | ||
110 | tests/qtest/pvpanic-pci-test.c | 62 ++++++ | ||
111 | .gitlab-ci.yml | 4 +- | ||
112 | hw/i386/Kconfig | 2 +- | ||
113 | hw/misc/Kconfig | 12 +- | ||
114 | hw/misc/meson.build | 4 +- | ||
115 | tests/qtest/meson.build | 3 +- | ||
116 | 42 files changed, 1080 insertions(+), 524 deletions(-) | ||
117 | delete mode 100644 docs/devel/conf.py | ||
118 | delete mode 100644 docs/index.html.in | ||
119 | delete mode 100644 docs/interop/conf.py | ||
120 | delete mode 100644 docs/specs/conf.py | ||
121 | delete mode 100644 docs/system/conf.py | ||
122 | delete mode 100644 docs/tools/conf.py | ||
123 | delete mode 100644 docs/user/conf.py | ||
124 | create mode 100644 hw/misc/pvpanic-isa.c | ||
125 | create mode 100644 hw/misc/pvpanic-pci.c | ||
126 | create mode 100644 tests/qtest/pvpanic-pci-test.c | ||
127 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Without hardware acceleration, a cryptographically strong | ||
4 | algorithm is too expensive for pauth_computepac. | ||
5 | |||
6 | Even with hardware accel, we are not currently expecting | ||
7 | to link the linux-user binaries to any crypto libraries, | ||
8 | and doing so would generally make the --static build fail. | ||
9 | |||
10 | So choose XXH64 as a reasonably quick and decent hash. | ||
11 | |||
12 | Tested-by: Mark Rutland <mark.rutland@arm.com> | ||
3 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 13 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
4 | Message-id: 20180228193125.20577-13-richard.henderson@linaro.org | 14 | Message-id: 20210111235740.462469-2-richard.henderson@linaro.org |
15 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
6 | [PMM: renamed e1/e2/e3/e4 to use the same naming as the version | ||
7 | of the pseudocode in the Arm ARM] | ||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | --- | 17 | --- |
10 | target/arm/helper.h | 11 ++++ | 18 | include/qemu/xxhash.h | 98 +++++++++++++++++++++++++++++++++++++++ |
11 | target/arm/translate-a64.c | 94 +++++++++++++++++++++++++--- | 19 | target/arm/cpu.h | 15 ++++-- |
12 | target/arm/vec_helper.c | 149 +++++++++++++++++++++++++++++++++++++++++++++ | 20 | target/arm/pauth_helper.c | 27 +++++++++-- |
13 | 3 files changed, 246 insertions(+), 8 deletions(-) | 21 | 3 files changed, 131 insertions(+), 9 deletions(-) |
14 | 22 | ||
15 | diff --git a/target/arm/helper.h b/target/arm/helper.h | 23 | diff --git a/include/qemu/xxhash.h b/include/qemu/xxhash.h |
16 | index XXXXXXX..XXXXXXX 100644 | 24 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/target/arm/helper.h | 25 | --- a/include/qemu/xxhash.h |
18 | +++ b/target/arm/helper.h | 26 | +++ b/include/qemu/xxhash.h |
19 | @@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_5(gvec_fcadds, TCG_CALL_NO_RWG, | 27 | @@ -XXX,XX +XXX,XX @@ static inline uint32_t qemu_xxhash6(uint64_t ab, uint64_t cd, uint32_t e, |
20 | DEF_HELPER_FLAGS_5(gvec_fcaddd, TCG_CALL_NO_RWG, | 28 | return qemu_xxhash7(ab, cd, e, f, 0); |
21 | void, ptr, ptr, ptr, ptr, i32) | 29 | } |
22 | 30 | ||
23 | +DEF_HELPER_FLAGS_5(gvec_fcmlah, TCG_CALL_NO_RWG, | 31 | +/* |
24 | + void, ptr, ptr, ptr, ptr, i32) | 32 | + * Component parts of the XXH64 algorithm from |
25 | +DEF_HELPER_FLAGS_5(gvec_fcmlah_idx, TCG_CALL_NO_RWG, | 33 | + * https://github.com/Cyan4973/xxHash/blob/v0.8.0/xxhash.h |
26 | + void, ptr, ptr, ptr, ptr, i32) | 34 | + * |
27 | +DEF_HELPER_FLAGS_5(gvec_fcmlas, TCG_CALL_NO_RWG, | 35 | + * The complete algorithm looks like |
28 | + void, ptr, ptr, ptr, ptr, i32) | 36 | + * |
29 | +DEF_HELPER_FLAGS_5(gvec_fcmlas_idx, TCG_CALL_NO_RWG, | 37 | + * i = 0; |
30 | + void, ptr, ptr, ptr, ptr, i32) | 38 | + * if (len >= 32) { |
31 | +DEF_HELPER_FLAGS_5(gvec_fcmlad, TCG_CALL_NO_RWG, | 39 | + * v1 = seed + XXH_PRIME64_1 + XXH_PRIME64_2; |
32 | + void, ptr, ptr, ptr, ptr, i32) | 40 | + * v2 = seed + XXH_PRIME64_2; |
33 | + | 41 | + * v3 = seed + 0; |
34 | #ifdef TARGET_AARCH64 | 42 | + * v4 = seed - XXH_PRIME64_1; |
35 | #include "helper-a64.h" | 43 | + * do { |
36 | #endif | 44 | + * v1 = XXH64_round(v1, get64bits(input + i)); |
37 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c | 45 | + * v2 = XXH64_round(v2, get64bits(input + i + 8)); |
46 | + * v3 = XXH64_round(v3, get64bits(input + i + 16)); | ||
47 | + * v4 = XXH64_round(v4, get64bits(input + i + 24)); | ||
48 | + * } while ((i += 32) <= len); | ||
49 | + * h64 = XXH64_mergerounds(v1, v2, v3, v4); | ||
50 | + * } else { | ||
51 | + * h64 = seed + XXH_PRIME64_5; | ||
52 | + * } | ||
53 | + * h64 += len; | ||
54 | + * | ||
55 | + * for (; i + 8 <= len; i += 8) { | ||
56 | + * h64 ^= XXH64_round(0, get64bits(input + i)); | ||
57 | + * h64 = rol64(h64, 27) * XXH_PRIME64_1 + XXH_PRIME64_4; | ||
58 | + * } | ||
59 | + * for (; i + 4 <= len; i += 4) { | ||
60 | + * h64 ^= get32bits(input + i) * PRIME64_1; | ||
61 | + * h64 = rol64(h64, 23) * XXH_PRIME64_2 + XXH_PRIME64_3; | ||
62 | + * } | ||
63 | + * for (; i < len; i += 1) { | ||
64 | + * h64 ^= get8bits(input + i) * XXH_PRIME64_5; | ||
65 | + * h64 = rol64(h64, 11) * XXH_PRIME64_1; | ||
66 | + * } | ||
67 | + * | ||
68 | + * return XXH64_avalanche(h64) | ||
69 | + * | ||
70 | + * Exposing the pieces instead allows for simplified usage when | ||
71 | + * the length is a known constant and the inputs are in registers. | ||
72 | + */ | ||
73 | +#define XXH_PRIME64_1 0x9E3779B185EBCA87ULL | ||
74 | +#define XXH_PRIME64_2 0xC2B2AE3D27D4EB4FULL | ||
75 | +#define XXH_PRIME64_3 0x165667B19E3779F9ULL | ||
76 | +#define XXH_PRIME64_4 0x85EBCA77C2B2AE63ULL | ||
77 | +#define XXH_PRIME64_5 0x27D4EB2F165667C5ULL | ||
78 | + | ||
79 | +static inline uint64_t XXH64_round(uint64_t acc, uint64_t input) | ||
80 | +{ | ||
81 | + return rol64(acc + input * XXH_PRIME64_2, 31) * XXH_PRIME64_1; | ||
82 | +} | ||
83 | + | ||
84 | +static inline uint64_t XXH64_mergeround(uint64_t acc, uint64_t val) | ||
85 | +{ | ||
86 | + return (acc ^ XXH64_round(0, val)) * XXH_PRIME64_1 + XXH_PRIME64_4; | ||
87 | +} | ||
88 | + | ||
89 | +static inline uint64_t XXH64_mergerounds(uint64_t v1, uint64_t v2, | ||
90 | + uint64_t v3, uint64_t v4) | ||
91 | +{ | ||
92 | + uint64_t h64; | ||
93 | + | ||
94 | + h64 = rol64(v1, 1) + rol64(v2, 7) + rol64(v3, 12) + rol64(v4, 18); | ||
95 | + h64 = XXH64_mergeround(h64, v1); | ||
96 | + h64 = XXH64_mergeround(h64, v2); | ||
97 | + h64 = XXH64_mergeround(h64, v3); | ||
98 | + h64 = XXH64_mergeround(h64, v4); | ||
99 | + | ||
100 | + return h64; | ||
101 | +} | ||
102 | + | ||
103 | +static inline uint64_t XXH64_avalanche(uint64_t h64) | ||
104 | +{ | ||
105 | + h64 ^= h64 >> 33; | ||
106 | + h64 *= XXH_PRIME64_2; | ||
107 | + h64 ^= h64 >> 29; | ||
108 | + h64 *= XXH_PRIME64_3; | ||
109 | + h64 ^= h64 >> 32; | ||
110 | + return h64; | ||
111 | +} | ||
112 | + | ||
113 | +static inline uint64_t qemu_xxhash64_4(uint64_t a, uint64_t b, | ||
114 | + uint64_t c, uint64_t d) | ||
115 | +{ | ||
116 | + uint64_t v1 = QEMU_XXHASH_SEED + XXH_PRIME64_1 + XXH_PRIME64_2; | ||
117 | + uint64_t v2 = QEMU_XXHASH_SEED + XXH_PRIME64_2; | ||
118 | + uint64_t v3 = QEMU_XXHASH_SEED + 0; | ||
119 | + uint64_t v4 = QEMU_XXHASH_SEED - XXH_PRIME64_1; | ||
120 | + | ||
121 | + v1 = XXH64_round(v1, a); | ||
122 | + v2 = XXH64_round(v2, b); | ||
123 | + v3 = XXH64_round(v3, c); | ||
124 | + v4 = XXH64_round(v4, d); | ||
125 | + | ||
126 | + return XXH64_avalanche(XXH64_mergerounds(v1, v2, v3, v4)); | ||
127 | +} | ||
128 | + | ||
129 | #endif /* QEMU_XXHASH_H */ | ||
130 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
38 | index XXXXXXX..XXXXXXX 100644 | 131 | index XXXXXXX..XXXXXXX 100644 |
39 | --- a/target/arm/translate-a64.c | 132 | --- a/target/arm/cpu.h |
40 | +++ b/target/arm/translate-a64.c | 133 | +++ b/target/arm/cpu.h |
41 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_three_reg_same_extra(DisasContext *s, uint32_t insn) | 134 | @@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_fcma(const ARMISARegisters *id) |
42 | } | 135 | static inline bool isar_feature_aa64_pauth(const ARMISARegisters *id) |
43 | feature = ARM_FEATURE_V8_RDM; | 136 | { |
44 | break; | 137 | /* |
45 | + case 0x8: /* FCMLA, #0 */ | 138 | - * Note that while QEMU will only implement the architected algorithm |
46 | + case 0x9: /* FCMLA, #90 */ | 139 | - * QARMA, and thus APA+GPA, the host cpu for kvm may use implementation |
47 | + case 0xa: /* FCMLA, #180 */ | 140 | - * defined algorithms, and thus API+GPI, and this predicate controls |
48 | + case 0xb: /* FCMLA, #270 */ | 141 | - * migration of the 128-bit keys. |
49 | case 0xc: /* FCADD, #90 */ | 142 | + * Return true if any form of pauth is enabled, as this |
50 | case 0xe: /* FCADD, #270 */ | 143 | + * predicate controls migration of the 128-bit keys. |
51 | if (size == 0 | 144 | */ |
52 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_three_reg_same_extra(DisasContext *s, uint32_t insn) | 145 | return (id->id_aa64isar1 & |
53 | } | 146 | (FIELD_DP64(0, ID_AA64ISAR1, APA, 0xf) | |
54 | return; | 147 | @@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_pauth(const ARMISARegisters *id) |
55 | 148 | FIELD_DP64(0, ID_AA64ISAR1, GPI, 0xf))) != 0; | |
56 | + case 0x8: /* FCMLA, #0 */ | 149 | } |
57 | + case 0x9: /* FCMLA, #90 */ | 150 | |
58 | + case 0xa: /* FCMLA, #180 */ | 151 | +static inline bool isar_feature_aa64_pauth_arch(const ARMISARegisters *id) |
59 | + case 0xb: /* FCMLA, #270 */ | 152 | +{ |
60 | + rot = extract32(opcode, 0, 2); | 153 | + /* |
61 | + switch (size) { | 154 | + * Return true if pauth is enabled with the architected QARMA algorithm. |
62 | + case 1: | 155 | + * QEMU will always set APA+GPA to the same value. |
63 | + gen_gvec_op3_fpst(s, is_q, rd, rn, rm, true, rot, | 156 | + */ |
64 | + gen_helper_gvec_fcmlah); | 157 | + return FIELD_EX64(id->id_aa64isar1, ID_AA64ISAR1, APA) != 0; |
65 | + break; | 158 | +} |
66 | + case 2: | 159 | + |
67 | + gen_gvec_op3_fpst(s, is_q, rd, rn, rm, false, rot, | 160 | static inline bool isar_feature_aa64_sb(const ARMISARegisters *id) |
68 | + gen_helper_gvec_fcmlas); | 161 | { |
69 | + break; | 162 | return FIELD_EX64(id->id_aa64isar1, ID_AA64ISAR1, SB) != 0; |
70 | + case 3: | 163 | diff --git a/target/arm/pauth_helper.c b/target/arm/pauth_helper.c |
71 | + gen_gvec_op3_fpst(s, is_q, rd, rn, rm, false, rot, | 164 | index XXXXXXX..XXXXXXX 100644 |
72 | + gen_helper_gvec_fcmlad); | 165 | --- a/target/arm/pauth_helper.c |
73 | + break; | 166 | +++ b/target/arm/pauth_helper.c |
74 | + default: | 167 | @@ -XXX,XX +XXX,XX @@ |
75 | + g_assert_not_reached(); | 168 | #include "exec/cpu_ldst.h" |
76 | + } | 169 | #include "exec/helper-proto.h" |
77 | + return; | 170 | #include "tcg/tcg-gvec-desc.h" |
78 | + | 171 | +#include "qemu/xxhash.h" |
79 | case 0xc: /* FCADD, #90 */ | 172 | |
80 | case 0xe: /* FCADD, #270 */ | 173 | |
81 | rot = extract32(opcode, 1, 1); | 174 | static uint64_t pac_cell_shuffle(uint64_t i) |
82 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | 175 | @@ -XXX,XX +XXX,XX @@ static uint64_t tweak_inv_shuffle(uint64_t i) |
83 | int rn = extract32(insn, 5, 5); | 176 | return o; |
84 | int rd = extract32(insn, 0, 5); | 177 | } |
85 | bool is_long = false; | 178 | |
86 | - bool is_fp = false; | 179 | -static uint64_t pauth_computepac(uint64_t data, uint64_t modifier, |
87 | + int is_fp = 0; | 180 | - ARMPACKey key) |
88 | bool is_fp16 = false; | 181 | +static uint64_t pauth_computepac_architected(uint64_t data, uint64_t modifier, |
89 | int index; | 182 | + ARMPACKey key) |
90 | TCGv_ptr fpst; | 183 | { |
91 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | 184 | static const uint64_t RC[5] = { |
92 | case 0x05: /* FMLS */ | 185 | 0x0000000000000000ull, |
93 | case 0x09: /* FMUL */ | 186 | @@ -XXX,XX +XXX,XX @@ static uint64_t pauth_computepac(uint64_t data, uint64_t modifier, |
94 | case 0x19: /* FMULX */ | 187 | return workingval; |
95 | - is_fp = true; | 188 | } |
96 | + is_fp = 1; | 189 | |
97 | break; | 190 | +static uint64_t pauth_computepac_impdef(uint64_t data, uint64_t modifier, |
98 | case 0x1d: /* SQRDMLAH */ | 191 | + ARMPACKey key) |
99 | case 0x1f: /* SQRDMLSH */ | 192 | +{ |
100 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | 193 | + return qemu_xxhash64_4(data, modifier, key.lo, key.hi); |
101 | return; | 194 | +} |
102 | } | 195 | + |
103 | break; | 196 | +static uint64_t pauth_computepac(CPUARMState *env, uint64_t data, |
104 | + case 0x11: /* FCMLA #0 */ | 197 | + uint64_t modifier, ARMPACKey key) |
105 | + case 0x13: /* FCMLA #90 */ | 198 | +{ |
106 | + case 0x15: /* FCMLA #180 */ | 199 | + if (cpu_isar_feature(aa64_pauth_arch, env_archcpu(env))) { |
107 | + case 0x17: /* FCMLA #270 */ | 200 | + return pauth_computepac_architected(data, modifier, key); |
108 | + if (!arm_dc_feature(s, ARM_FEATURE_V8_FCMA)) { | 201 | + } else { |
109 | + unallocated_encoding(s); | 202 | + return pauth_computepac_impdef(data, modifier, key); |
110 | + return; | ||
111 | + } | ||
112 | + is_fp = 2; | ||
113 | + break; | ||
114 | default: | ||
115 | unallocated_encoding(s); | ||
116 | return; | ||
117 | } | ||
118 | |||
119 | - if (is_fp) { | ||
120 | + switch (is_fp) { | ||
121 | + case 1: /* normal fp */ | ||
122 | /* convert insn encoded size to TCGMemOp size */ | ||
123 | switch (size) { | ||
124 | case 0: /* half-precision */ | ||
125 | - if (!arm_dc_feature(s, ARM_FEATURE_V8_FP16)) { | ||
126 | - unallocated_encoding(s); | ||
127 | - return; | ||
128 | - } | ||
129 | size = MO_16; | ||
130 | + is_fp16 = true; | ||
131 | break; | ||
132 | case MO_32: /* single precision */ | ||
133 | case MO_64: /* double precision */ | ||
134 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | ||
135 | unallocated_encoding(s); | ||
136 | return; | ||
137 | } | ||
138 | - } else { | ||
139 | + break; | ||
140 | + | ||
141 | + case 2: /* complex fp */ | ||
142 | + /* Each indexable element is a complex pair. */ | ||
143 | + size <<= 1; | ||
144 | + switch (size) { | ||
145 | + case MO_32: | ||
146 | + if (h && !is_q) { | ||
147 | + unallocated_encoding(s); | ||
148 | + return; | ||
149 | + } | ||
150 | + is_fp16 = true; | ||
151 | + break; | ||
152 | + case MO_64: | ||
153 | + break; | ||
154 | + default: | ||
155 | + unallocated_encoding(s); | ||
156 | + return; | ||
157 | + } | ||
158 | + break; | ||
159 | + | ||
160 | + default: /* integer */ | ||
161 | switch (size) { | ||
162 | case MO_8: | ||
163 | case MO_64: | ||
164 | unallocated_encoding(s); | ||
165 | return; | ||
166 | } | ||
167 | + break; | ||
168 | + } | 203 | + } |
169 | + if (is_fp16 && !arm_dc_feature(s, ARM_FEATURE_V8_FP16)) { | 204 | +} |
170 | + unallocated_encoding(s); | 205 | + |
171 | + return; | 206 | static uint64_t pauth_addpac(CPUARMState *env, uint64_t ptr, uint64_t modifier, |
172 | } | 207 | ARMPACKey *key, bool data) |
173 | 208 | { | |
174 | /* Given TCGMemOp size, adjust register and indexing. */ | 209 | @@ -XXX,XX +XXX,XX @@ static uint64_t pauth_addpac(CPUARMState *env, uint64_t ptr, uint64_t modifier, |
175 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | 210 | bot_bit = 64 - param.tsz; |
176 | fpst = NULL; | 211 | ext_ptr = deposit64(ptr, bot_bit, top_bit - bot_bit, ext); |
177 | } | 212 | |
178 | 213 | - pac = pauth_computepac(ext_ptr, modifier, *key); | |
179 | + switch (16 * u + opcode) { | 214 | + pac = pauth_computepac(env, ext_ptr, modifier, *key); |
180 | + case 0x11: /* FCMLA #0 */ | 215 | |
181 | + case 0x13: /* FCMLA #90 */ | 216 | /* |
182 | + case 0x15: /* FCMLA #180 */ | 217 | * Check if the ptr has good extension bits and corrupt the |
183 | + case 0x17: /* FCMLA #270 */ | 218 | @@ -XXX,XX +XXX,XX @@ static uint64_t pauth_auth(CPUARMState *env, uint64_t ptr, uint64_t modifier, |
184 | + tcg_gen_gvec_3_ptr(vec_full_reg_offset(s, rd), | 219 | uint64_t pac, orig_ptr, test; |
185 | + vec_full_reg_offset(s, rn), | 220 | |
186 | + vec_reg_offset(s, rm, index, size), fpst, | 221 | orig_ptr = pauth_original_ptr(ptr, param); |
187 | + is_q ? 16 : 8, vec_full_reg_size(s), | 222 | - pac = pauth_computepac(orig_ptr, modifier, *key); |
188 | + extract32(insn, 13, 2), /* rot */ | 223 | + pac = pauth_computepac(env, orig_ptr, modifier, *key); |
189 | + size == MO_64 | 224 | bot_bit = 64 - param.tsz; |
190 | + ? gen_helper_gvec_fcmlas_idx | 225 | top_bit = 64 - 8 * param.tbi; |
191 | + : gen_helper_gvec_fcmlah_idx); | 226 | |
192 | + tcg_temp_free_ptr(fpst); | 227 | @@ -XXX,XX +XXX,XX @@ uint64_t HELPER(pacga)(CPUARMState *env, uint64_t x, uint64_t y) |
193 | + return; | 228 | uint64_t pac; |
194 | + } | 229 | |
195 | + | 230 | pauth_check_trap(env, arm_current_el(env), GETPC()); |
196 | if (size == 3) { | 231 | - pac = pauth_computepac(x, y, env->keys.apga); |
197 | TCGv_i64 tcg_idx = tcg_temp_new_i64(); | 232 | + pac = pauth_computepac(env, x, y, env->keys.apga); |
198 | int pass; | 233 | |
199 | diff --git a/target/arm/vec_helper.c b/target/arm/vec_helper.c | 234 | return pac & 0xffffffff00000000ull; |
200 | index XXXXXXX..XXXXXXX 100644 | 235 | } |
201 | --- a/target/arm/vec_helper.c | ||
202 | +++ b/target/arm/vec_helper.c | ||
203 | @@ -XXX,XX +XXX,XX @@ void HELPER(gvec_fcaddd)(void *vd, void *vn, void *vm, | ||
204 | } | ||
205 | clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
206 | } | ||
207 | + | ||
208 | +void HELPER(gvec_fcmlah)(void *vd, void *vn, void *vm, | ||
209 | + void *vfpst, uint32_t desc) | ||
210 | +{ | ||
211 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
212 | + float16 *d = vd; | ||
213 | + float16 *n = vn; | ||
214 | + float16 *m = vm; | ||
215 | + float_status *fpst = vfpst; | ||
216 | + intptr_t flip = extract32(desc, SIMD_DATA_SHIFT, 1); | ||
217 | + uint32_t neg_imag = extract32(desc, SIMD_DATA_SHIFT + 1, 1); | ||
218 | + uint32_t neg_real = flip ^ neg_imag; | ||
219 | + uintptr_t i; | ||
220 | + | ||
221 | + /* Shift boolean to the sign bit so we can xor to negate. */ | ||
222 | + neg_real <<= 15; | ||
223 | + neg_imag <<= 15; | ||
224 | + | ||
225 | + for (i = 0; i < opr_sz / 2; i += 2) { | ||
226 | + float16 e2 = n[H2(i + flip)]; | ||
227 | + float16 e1 = m[H2(i + flip)] ^ neg_real; | ||
228 | + float16 e4 = e2; | ||
229 | + float16 e3 = m[H2(i + 1 - flip)] ^ neg_imag; | ||
230 | + | ||
231 | + d[H2(i)] = float16_muladd(e2, e1, d[H2(i)], 0, fpst); | ||
232 | + d[H2(i + 1)] = float16_muladd(e4, e3, d[H2(i + 1)], 0, fpst); | ||
233 | + } | ||
234 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
235 | +} | ||
236 | + | ||
237 | +void HELPER(gvec_fcmlah_idx)(void *vd, void *vn, void *vm, | ||
238 | + void *vfpst, uint32_t desc) | ||
239 | +{ | ||
240 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
241 | + float16 *d = vd; | ||
242 | + float16 *n = vn; | ||
243 | + float16 *m = vm; | ||
244 | + float_status *fpst = vfpst; | ||
245 | + intptr_t flip = extract32(desc, SIMD_DATA_SHIFT, 1); | ||
246 | + uint32_t neg_imag = extract32(desc, SIMD_DATA_SHIFT + 1, 1); | ||
247 | + uint32_t neg_real = flip ^ neg_imag; | ||
248 | + uintptr_t i; | ||
249 | + float16 e1 = m[H2(flip)]; | ||
250 | + float16 e3 = m[H2(1 - flip)]; | ||
251 | + | ||
252 | + /* Shift boolean to the sign bit so we can xor to negate. */ | ||
253 | + neg_real <<= 15; | ||
254 | + neg_imag <<= 15; | ||
255 | + e1 ^= neg_real; | ||
256 | + e3 ^= neg_imag; | ||
257 | + | ||
258 | + for (i = 0; i < opr_sz / 2; i += 2) { | ||
259 | + float16 e2 = n[H2(i + flip)]; | ||
260 | + float16 e4 = e2; | ||
261 | + | ||
262 | + d[H2(i)] = float16_muladd(e2, e1, d[H2(i)], 0, fpst); | ||
263 | + d[H2(i + 1)] = float16_muladd(e4, e3, d[H2(i + 1)], 0, fpst); | ||
264 | + } | ||
265 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
266 | +} | ||
267 | + | ||
268 | +void HELPER(gvec_fcmlas)(void *vd, void *vn, void *vm, | ||
269 | + void *vfpst, uint32_t desc) | ||
270 | +{ | ||
271 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
272 | + float32 *d = vd; | ||
273 | + float32 *n = vn; | ||
274 | + float32 *m = vm; | ||
275 | + float_status *fpst = vfpst; | ||
276 | + intptr_t flip = extract32(desc, SIMD_DATA_SHIFT, 1); | ||
277 | + uint32_t neg_imag = extract32(desc, SIMD_DATA_SHIFT + 1, 1); | ||
278 | + uint32_t neg_real = flip ^ neg_imag; | ||
279 | + uintptr_t i; | ||
280 | + | ||
281 | + /* Shift boolean to the sign bit so we can xor to negate. */ | ||
282 | + neg_real <<= 31; | ||
283 | + neg_imag <<= 31; | ||
284 | + | ||
285 | + for (i = 0; i < opr_sz / 4; i += 2) { | ||
286 | + float32 e2 = n[H4(i + flip)]; | ||
287 | + float32 e1 = m[H4(i + flip)] ^ neg_real; | ||
288 | + float32 e4 = e2; | ||
289 | + float32 e3 = m[H4(i + 1 - flip)] ^ neg_imag; | ||
290 | + | ||
291 | + d[H4(i)] = float32_muladd(e2, e1, d[H4(i)], 0, fpst); | ||
292 | + d[H4(i + 1)] = float32_muladd(e4, e3, d[H4(i + 1)], 0, fpst); | ||
293 | + } | ||
294 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
295 | +} | ||
296 | + | ||
297 | +void HELPER(gvec_fcmlas_idx)(void *vd, void *vn, void *vm, | ||
298 | + void *vfpst, uint32_t desc) | ||
299 | +{ | ||
300 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
301 | + float32 *d = vd; | ||
302 | + float32 *n = vn; | ||
303 | + float32 *m = vm; | ||
304 | + float_status *fpst = vfpst; | ||
305 | + intptr_t flip = extract32(desc, SIMD_DATA_SHIFT, 1); | ||
306 | + uint32_t neg_imag = extract32(desc, SIMD_DATA_SHIFT + 1, 1); | ||
307 | + uint32_t neg_real = flip ^ neg_imag; | ||
308 | + uintptr_t i; | ||
309 | + float32 e1 = m[H4(flip)]; | ||
310 | + float32 e3 = m[H4(1 - flip)]; | ||
311 | + | ||
312 | + /* Shift boolean to the sign bit so we can xor to negate. */ | ||
313 | + neg_real <<= 31; | ||
314 | + neg_imag <<= 31; | ||
315 | + e1 ^= neg_real; | ||
316 | + e3 ^= neg_imag; | ||
317 | + | ||
318 | + for (i = 0; i < opr_sz / 4; i += 2) { | ||
319 | + float32 e2 = n[H4(i + flip)]; | ||
320 | + float32 e4 = e2; | ||
321 | + | ||
322 | + d[H4(i)] = float32_muladd(e2, e1, d[H4(i)], 0, fpst); | ||
323 | + d[H4(i + 1)] = float32_muladd(e4, e3, d[H4(i + 1)], 0, fpst); | ||
324 | + } | ||
325 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
326 | +} | ||
327 | + | ||
328 | +void HELPER(gvec_fcmlad)(void *vd, void *vn, void *vm, | ||
329 | + void *vfpst, uint32_t desc) | ||
330 | +{ | ||
331 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
332 | + float64 *d = vd; | ||
333 | + float64 *n = vn; | ||
334 | + float64 *m = vm; | ||
335 | + float_status *fpst = vfpst; | ||
336 | + intptr_t flip = extract32(desc, SIMD_DATA_SHIFT, 1); | ||
337 | + uint64_t neg_imag = extract32(desc, SIMD_DATA_SHIFT + 1, 1); | ||
338 | + uint64_t neg_real = flip ^ neg_imag; | ||
339 | + uintptr_t i; | ||
340 | + | ||
341 | + /* Shift boolean to the sign bit so we can xor to negate. */ | ||
342 | + neg_real <<= 63; | ||
343 | + neg_imag <<= 63; | ||
344 | + | ||
345 | + for (i = 0; i < opr_sz / 8; i += 2) { | ||
346 | + float64 e2 = n[i + flip]; | ||
347 | + float64 e1 = m[i + flip] ^ neg_real; | ||
348 | + float64 e4 = e2; | ||
349 | + float64 e3 = m[i + 1 - flip] ^ neg_imag; | ||
350 | + | ||
351 | + d[i] = float64_muladd(e2, e1, d[i], 0, fpst); | ||
352 | + d[i + 1] = float64_muladd(e4, e3, d[i + 1], 0, fpst); | ||
353 | + } | ||
354 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
355 | +} | ||
356 | -- | 236 | -- |
357 | 2.16.2 | 237 | 2.20.1 |
358 | 238 | ||
359 | 239 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Enable it for the "any" CPU used by *-linux-user. | 3 | The crypto overhead of emulating pauth can be significant for |
4 | 4 | some workloads. Add two boolean properties that allows the | |
5 | feature to be turned off, on with the architected algorithm, | ||
6 | or on with an implementation defined algorithm. | ||
7 | |||
8 | We need two intermediate booleans to control the state while | ||
9 | parsing properties lest we clobber ID_AA64ISAR1 into an invalid | ||
10 | intermediate state. | ||
11 | |||
12 | Tested-by: Mark Rutland <mark.rutland@arm.com> | ||
13 | Reviewed-by: Andrew Jones <drjones@redhat.com> | ||
5 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 14 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 15 | Message-id: 20210111235740.462469-3-richard.henderson@linaro.org |
7 | Message-id: 20180228193125.20577-17-richard.henderson@linaro.org | 16 | [PMM: fixed docs typo, tweaked text to clarify that the impdef |
17 | algorithm is specific to QEMU] | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 18 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | --- | 19 | --- |
10 | target/arm/cpu.c | 1 + | 20 | docs/system/arm/cpu-features.rst | 21 +++++++++++++++++ |
11 | target/arm/cpu64.c | 1 + | 21 | target/arm/cpu.h | 10 ++++++++ |
12 | 2 files changed, 2 insertions(+) | 22 | target/arm/cpu.c | 13 +++++++++++ |
13 | 23 | target/arm/cpu64.c | 40 ++++++++++++++++++++++++++++---- | |
24 | target/arm/monitor.c | 1 + | ||
25 | tests/qtest/arm-cpu-features.c | 13 +++++++++++ | ||
26 | 6 files changed, 94 insertions(+), 4 deletions(-) | ||
27 | |||
28 | diff --git a/docs/system/arm/cpu-features.rst b/docs/system/arm/cpu-features.rst | ||
29 | index XXXXXXX..XXXXXXX 100644 | ||
30 | --- a/docs/system/arm/cpu-features.rst | ||
31 | +++ b/docs/system/arm/cpu-features.rst | ||
32 | @@ -XXX,XX +XXX,XX @@ the list of KVM VCPU features and their descriptions. | ||
33 | influence the guest scheduler behavior and/or be | ||
34 | exposed to the guest userspace. | ||
35 | |||
36 | +TCG VCPU Features | ||
37 | +================= | ||
38 | + | ||
39 | +TCG VCPU features are CPU features that are specific to TCG. | ||
40 | +Below is the list of TCG VCPU features and their descriptions. | ||
41 | + | ||
42 | + pauth Enable or disable `FEAT_Pauth`, pointer | ||
43 | + authentication. By default, the feature is | ||
44 | + enabled with `-cpu max`. | ||
45 | + | ||
46 | + pauth-impdef When `FEAT_Pauth` is enabled, either the | ||
47 | + *impdef* (Implementation Defined) algorithm | ||
48 | + is enabled or the *architected* QARMA algorithm | ||
49 | + is enabled. By default the impdef algorithm | ||
50 | + is disabled, and QARMA is enabled. | ||
51 | + | ||
52 | + The architected QARMA algorithm has good | ||
53 | + cryptographic properties, but can be quite slow | ||
54 | + to emulate. The impdef algorithm used by QEMU | ||
55 | + is non-cryptographic but significantly faster. | ||
56 | + | ||
57 | SVE CPU Properties | ||
58 | ================== | ||
59 | |||
60 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
61 | index XXXXXXX..XXXXXXX 100644 | ||
62 | --- a/target/arm/cpu.h | ||
63 | +++ b/target/arm/cpu.h | ||
64 | @@ -XXX,XX +XXX,XX @@ typedef struct { | ||
65 | #ifdef TARGET_AARCH64 | ||
66 | # define ARM_MAX_VQ 16 | ||
67 | void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp); | ||
68 | +void arm_cpu_pauth_finalize(ARMCPU *cpu, Error **errp); | ||
69 | #else | ||
70 | # define ARM_MAX_VQ 1 | ||
71 | static inline void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp) { } | ||
72 | +static inline void arm_cpu_pauth_finalize(ARMCPU *cpu, Error **errp) { } | ||
73 | #endif | ||
74 | |||
75 | typedef struct ARMVectorReg { | ||
76 | @@ -XXX,XX +XXX,XX @@ struct ARMCPU { | ||
77 | uint64_t reset_cbar; | ||
78 | uint32_t reset_auxcr; | ||
79 | bool reset_hivecs; | ||
80 | + | ||
81 | + /* | ||
82 | + * Intermediate values used during property parsing. | ||
83 | + * Once finalized, the values should be read from ID_AA64ISAR1. | ||
84 | + */ | ||
85 | + bool prop_pauth; | ||
86 | + bool prop_pauth_impdef; | ||
87 | + | ||
88 | /* DCZ blocksize, in log_2(words), ie low 4 bits of DCZID_EL0 */ | ||
89 | uint32_t dcz_blocksize; | ||
90 | uint64_t rvbar; | ||
14 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | 91 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c |
15 | index XXXXXXX..XXXXXXX 100644 | 92 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/target/arm/cpu.c | 93 | --- a/target/arm/cpu.c |
17 | +++ b/target/arm/cpu.c | 94 | +++ b/target/arm/cpu.c |
18 | @@ -XXX,XX +XXX,XX @@ static void arm_any_initfn(Object *obj) | 95 | @@ -XXX,XX +XXX,XX @@ void arm_cpu_finalize_features(ARMCPU *cpu, Error **errp) |
19 | set_feature(&cpu->env, ARM_FEATURE_V8_PMULL); | 96 | error_propagate(errp, local_err); |
20 | set_feature(&cpu->env, ARM_FEATURE_CRC); | 97 | return; |
21 | set_feature(&cpu->env, ARM_FEATURE_V8_RDM); | 98 | } |
22 | + set_feature(&cpu->env, ARM_FEATURE_V8_FCMA); | 99 | + |
23 | cpu->midr = 0xffffffff; | 100 | + /* |
24 | } | 101 | + * KVM does not support modifications to this feature. |
25 | #endif | 102 | + * We have not registered the cpu properties when KVM |
103 | + * is in use, so the user will not be able to set them. | ||
104 | + */ | ||
105 | + if (!kvm_enabled()) { | ||
106 | + arm_cpu_pauth_finalize(cpu, &local_err); | ||
107 | + if (local_err != NULL) { | ||
108 | + error_propagate(errp, local_err); | ||
109 | + return; | ||
110 | + } | ||
111 | + } | ||
112 | } | ||
113 | |||
114 | if (kvm_enabled()) { | ||
26 | diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c | 115 | diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c |
27 | index XXXXXXX..XXXXXXX 100644 | 116 | index XXXXXXX..XXXXXXX 100644 |
28 | --- a/target/arm/cpu64.c | 117 | --- a/target/arm/cpu64.c |
29 | +++ b/target/arm/cpu64.c | 118 | +++ b/target/arm/cpu64.c |
30 | @@ -XXX,XX +XXX,XX @@ static void aarch64_any_initfn(Object *obj) | 119 | @@ -XXX,XX +XXX,XX @@ |
31 | set_feature(&cpu->env, ARM_FEATURE_CRC); | 120 | #include "sysemu/kvm.h" |
32 | set_feature(&cpu->env, ARM_FEATURE_V8_RDM); | 121 | #include "kvm_arm.h" |
33 | set_feature(&cpu->env, ARM_FEATURE_V8_FP16); | 122 | #include "qapi/visitor.h" |
34 | + set_feature(&cpu->env, ARM_FEATURE_V8_FCMA); | 123 | +#include "hw/qdev-properties.h" |
35 | cpu->ctr = 0x80038003; /* 32 byte I and D cacheline size, VIPT icache */ | 124 | + |
36 | cpu->dcz_blocksize = 7; /* 512 bytes */ | 125 | |
126 | #ifndef CONFIG_USER_ONLY | ||
127 | static uint64_t a57_a53_l2ctlr_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
128 | @@ -XXX,XX +XXX,XX @@ void aarch64_add_sve_properties(Object *obj) | ||
129 | } | ||
37 | } | 130 | } |
131 | |||
132 | +void arm_cpu_pauth_finalize(ARMCPU *cpu, Error **errp) | ||
133 | +{ | ||
134 | + int arch_val = 0, impdef_val = 0; | ||
135 | + uint64_t t; | ||
136 | + | ||
137 | + /* TODO: Handle HaveEnhancedPAC, HaveEnhancedPAC2, HaveFPAC. */ | ||
138 | + if (cpu->prop_pauth) { | ||
139 | + if (cpu->prop_pauth_impdef) { | ||
140 | + impdef_val = 1; | ||
141 | + } else { | ||
142 | + arch_val = 1; | ||
143 | + } | ||
144 | + } else if (cpu->prop_pauth_impdef) { | ||
145 | + error_setg(errp, "cannot enable pauth-impdef without pauth"); | ||
146 | + error_append_hint(errp, "Add pauth=on to the CPU property list.\n"); | ||
147 | + } | ||
148 | + | ||
149 | + t = cpu->isar.id_aa64isar1; | ||
150 | + t = FIELD_DP64(t, ID_AA64ISAR1, APA, arch_val); | ||
151 | + t = FIELD_DP64(t, ID_AA64ISAR1, GPA, arch_val); | ||
152 | + t = FIELD_DP64(t, ID_AA64ISAR1, API, impdef_val); | ||
153 | + t = FIELD_DP64(t, ID_AA64ISAR1, GPI, impdef_val); | ||
154 | + cpu->isar.id_aa64isar1 = t; | ||
155 | +} | ||
156 | + | ||
157 | +static Property arm_cpu_pauth_property = | ||
158 | + DEFINE_PROP_BOOL("pauth", ARMCPU, prop_pauth, true); | ||
159 | +static Property arm_cpu_pauth_impdef_property = | ||
160 | + DEFINE_PROP_BOOL("pauth-impdef", ARMCPU, prop_pauth_impdef, false); | ||
161 | + | ||
162 | /* -cpu max: if KVM is enabled, like -cpu host (best possible with this host); | ||
163 | * otherwise, a CPU with as many features enabled as our emulation supports. | ||
164 | * The version of '-cpu max' for qemu-system-arm is defined in cpu.c; | ||
165 | @@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj) | ||
166 | t = FIELD_DP64(t, ID_AA64ISAR1, DPB, 2); | ||
167 | t = FIELD_DP64(t, ID_AA64ISAR1, JSCVT, 1); | ||
168 | t = FIELD_DP64(t, ID_AA64ISAR1, FCMA, 1); | ||
169 | - t = FIELD_DP64(t, ID_AA64ISAR1, APA, 1); /* PAuth, architected only */ | ||
170 | - t = FIELD_DP64(t, ID_AA64ISAR1, API, 0); | ||
171 | - t = FIELD_DP64(t, ID_AA64ISAR1, GPA, 1); | ||
172 | - t = FIELD_DP64(t, ID_AA64ISAR1, GPI, 0); | ||
173 | t = FIELD_DP64(t, ID_AA64ISAR1, SB, 1); | ||
174 | t = FIELD_DP64(t, ID_AA64ISAR1, SPECRES, 1); | ||
175 | t = FIELD_DP64(t, ID_AA64ISAR1, FRINTTS, 1); | ||
176 | @@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj) | ||
177 | cpu->ctr = 0x80038003; /* 32 byte I and D cacheline size, VIPT icache */ | ||
178 | cpu->dcz_blocksize = 7; /* 512 bytes */ | ||
179 | #endif | ||
180 | + | ||
181 | + /* Default to PAUTH on, with the architected algorithm. */ | ||
182 | + qdev_property_add_static(DEVICE(obj), &arm_cpu_pauth_property); | ||
183 | + qdev_property_add_static(DEVICE(obj), &arm_cpu_pauth_impdef_property); | ||
184 | } | ||
185 | |||
186 | aarch64_add_sve_properties(obj); | ||
187 | diff --git a/target/arm/monitor.c b/target/arm/monitor.c | ||
188 | index XXXXXXX..XXXXXXX 100644 | ||
189 | --- a/target/arm/monitor.c | ||
190 | +++ b/target/arm/monitor.c | ||
191 | @@ -XXX,XX +XXX,XX @@ static const char *cpu_model_advertised_features[] = { | ||
192 | "sve640", "sve768", "sve896", "sve1024", "sve1152", "sve1280", | ||
193 | "sve1408", "sve1536", "sve1664", "sve1792", "sve1920", "sve2048", | ||
194 | "kvm-no-adjvtime", "kvm-steal-time", | ||
195 | + "pauth", "pauth-impdef", | ||
196 | NULL | ||
197 | }; | ||
198 | |||
199 | diff --git a/tests/qtest/arm-cpu-features.c b/tests/qtest/arm-cpu-features.c | ||
200 | index XXXXXXX..XXXXXXX 100644 | ||
201 | --- a/tests/qtest/arm-cpu-features.c | ||
202 | +++ b/tests/qtest/arm-cpu-features.c | ||
203 | @@ -XXX,XX +XXX,XX @@ static void sve_tests_sve_off_kvm(const void *data) | ||
204 | qtest_quit(qts); | ||
205 | } | ||
206 | |||
207 | +static void pauth_tests_default(QTestState *qts, const char *cpu_type) | ||
208 | +{ | ||
209 | + assert_has_feature_enabled(qts, cpu_type, "pauth"); | ||
210 | + assert_has_feature_disabled(qts, cpu_type, "pauth-impdef"); | ||
211 | + assert_set_feature(qts, cpu_type, "pauth", false); | ||
212 | + assert_set_feature(qts, cpu_type, "pauth", true); | ||
213 | + assert_set_feature(qts, cpu_type, "pauth-impdef", true); | ||
214 | + assert_set_feature(qts, cpu_type, "pauth-impdef", false); | ||
215 | + assert_error(qts, cpu_type, "cannot enable pauth-impdef without pauth", | ||
216 | + "{ 'pauth': false, 'pauth-impdef': true }"); | ||
217 | +} | ||
218 | + | ||
219 | static void test_query_cpu_model_expansion(const void *data) | ||
220 | { | ||
221 | QTestState *qts; | ||
222 | @@ -XXX,XX +XXX,XX @@ static void test_query_cpu_model_expansion(const void *data) | ||
223 | assert_has_feature_enabled(qts, "cortex-a57", "aarch64"); | ||
224 | |||
225 | sve_tests_default(qts, "max"); | ||
226 | + pauth_tests_default(qts, "max"); | ||
227 | |||
228 | /* Test that features that depend on KVM generate errors without. */ | ||
229 | assert_error(qts, "max", | ||
38 | -- | 230 | -- |
39 | 2.16.2 | 231 | 2.20.1 |
40 | 232 | ||
41 | 233 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 3 | The interface for object_property_add_bool is simpler, |
4 | making the code easier to understand. | ||
5 | |||
6 | Reviewed-by: Andrew Jones <drjones@redhat.com> | ||
4 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
5 | Message-id: 20180228193125.20577-6-richard.henderson@linaro.org | 8 | Message-id: 20210111235740.462469-4-richard.henderson@linaro.org |
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | --- | 10 | --- |
8 | target/arm/helper.h | 9 +++++ | 11 | target/arm/cpu64.c | 24 ++++++++++-------------- |
9 | target/arm/translate-a64.c | 83 ++++++++++++++++++++++++++++++++++++++++++++++ | 12 | 1 file changed, 10 insertions(+), 14 deletions(-) |
10 | target/arm/vec_helper.c | 74 +++++++++++++++++++++++++++++++++++++++++ | ||
11 | 3 files changed, 166 insertions(+) | ||
12 | 13 | ||
13 | diff --git a/target/arm/helper.h b/target/arm/helper.h | 14 | diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c |
14 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/target/arm/helper.h | 16 | --- a/target/arm/cpu64.c |
16 | +++ b/target/arm/helper.h | 17 | +++ b/target/arm/cpu64.c |
17 | @@ -XXX,XX +XXX,XX @@ DEF_HELPER_2(dc_zva, void, env, i64) | 18 | @@ -XXX,XX +XXX,XX @@ static void cpu_max_set_sve_max_vq(Object *obj, Visitor *v, const char *name, |
18 | DEF_HELPER_FLAGS_2(neon_pmull_64_lo, TCG_CALL_NO_RWG_SE, i64, i64, i64) | 19 | cpu->sve_max_vq = max_vq; |
19 | DEF_HELPER_FLAGS_2(neon_pmull_64_hi, TCG_CALL_NO_RWG_SE, i64, i64, i64) | ||
20 | |||
21 | +DEF_HELPER_FLAGS_5(gvec_qrdmlah_s16, TCG_CALL_NO_RWG, | ||
22 | + void, ptr, ptr, ptr, ptr, i32) | ||
23 | +DEF_HELPER_FLAGS_5(gvec_qrdmlsh_s16, TCG_CALL_NO_RWG, | ||
24 | + void, ptr, ptr, ptr, ptr, i32) | ||
25 | +DEF_HELPER_FLAGS_5(gvec_qrdmlah_s32, TCG_CALL_NO_RWG, | ||
26 | + void, ptr, ptr, ptr, ptr, i32) | ||
27 | +DEF_HELPER_FLAGS_5(gvec_qrdmlsh_s32, TCG_CALL_NO_RWG, | ||
28 | + void, ptr, ptr, ptr, ptr, i32) | ||
29 | + | ||
30 | #ifdef TARGET_AARCH64 | ||
31 | #include "helper-a64.h" | ||
32 | #endif | ||
33 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c | ||
34 | index XXXXXXX..XXXXXXX 100644 | ||
35 | --- a/target/arm/translate-a64.c | ||
36 | +++ b/target/arm/translate-a64.c | ||
37 | @@ -XXX,XX +XXX,XX @@ static void gen_gvec_op3(DisasContext *s, bool is_q, int rd, | ||
38 | vec_full_reg_size(s), gvec_op); | ||
39 | } | 20 | } |
40 | 21 | ||
41 | +/* Expand a 3-operand + env pointer operation using | 22 | +/* |
42 | + * an out-of-line helper. | 23 | + * Note that cpu_arm_get/set_sve_vq cannot use the simpler |
24 | + * object_property_add_bool interface because they make use | ||
25 | + * of the contents of "name" to determine which bit on which | ||
26 | + * to operate. | ||
43 | + */ | 27 | + */ |
44 | +static void gen_gvec_op3_env(DisasContext *s, bool is_q, int rd, | 28 | static void cpu_arm_get_sve_vq(Object *obj, Visitor *v, const char *name, |
45 | + int rn, int rm, gen_helper_gvec_3_ptr *fn) | 29 | void *opaque, Error **errp) |
46 | +{ | 30 | { |
47 | + tcg_gen_gvec_3_ptr(vec_full_reg_offset(s, rd), | 31 | @@ -XXX,XX +XXX,XX @@ static void cpu_arm_set_sve_vq(Object *obj, Visitor *v, const char *name, |
48 | + vec_full_reg_offset(s, rn), | 32 | set_bit(vq - 1, cpu->sve_vq_init); |
49 | + vec_full_reg_offset(s, rm), cpu_env, | ||
50 | + is_q ? 16 : 8, vec_full_reg_size(s), 0, fn); | ||
51 | +} | ||
52 | + | ||
53 | /* Set ZF and NF based on a 64 bit result. This is alas fiddlier | ||
54 | * than the 32 bit equivalent. | ||
55 | */ | ||
56 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_three_reg_same_fp16(DisasContext *s, uint32_t insn) | ||
57 | clear_vec_high(s, is_q, rd); | ||
58 | } | 33 | } |
59 | 34 | ||
60 | +/* AdvSIMD three same extra | 35 | -static void cpu_arm_get_sve(Object *obj, Visitor *v, const char *name, |
61 | + * 31 30 29 28 24 23 22 21 20 16 15 14 11 10 9 5 4 0 | 36 | - void *opaque, Error **errp) |
62 | + * +---+---+---+-----------+------+---+------+---+--------+---+----+----+ | 37 | +static bool cpu_arm_get_sve(Object *obj, Error **errp) |
63 | + * | 0 | Q | U | 0 1 1 1 0 | size | 0 | Rm | 1 | opcode | 1 | Rn | Rd | | ||
64 | + * +---+---+---+-----------+------+---+------+---+--------+---+----+----+ | ||
65 | + */ | ||
66 | +static void disas_simd_three_reg_same_extra(DisasContext *s, uint32_t insn) | ||
67 | +{ | ||
68 | + int rd = extract32(insn, 0, 5); | ||
69 | + int rn = extract32(insn, 5, 5); | ||
70 | + int opcode = extract32(insn, 11, 4); | ||
71 | + int rm = extract32(insn, 16, 5); | ||
72 | + int size = extract32(insn, 22, 2); | ||
73 | + bool u = extract32(insn, 29, 1); | ||
74 | + bool is_q = extract32(insn, 30, 1); | ||
75 | + int feature; | ||
76 | + | ||
77 | + switch (u * 16 + opcode) { | ||
78 | + case 0x10: /* SQRDMLAH (vector) */ | ||
79 | + case 0x11: /* SQRDMLSH (vector) */ | ||
80 | + if (size != 1 && size != 2) { | ||
81 | + unallocated_encoding(s); | ||
82 | + return; | ||
83 | + } | ||
84 | + feature = ARM_FEATURE_V8_RDM; | ||
85 | + break; | ||
86 | + default: | ||
87 | + unallocated_encoding(s); | ||
88 | + return; | ||
89 | + } | ||
90 | + if (!arm_dc_feature(s, feature)) { | ||
91 | + unallocated_encoding(s); | ||
92 | + return; | ||
93 | + } | ||
94 | + if (!fp_access_check(s)) { | ||
95 | + return; | ||
96 | + } | ||
97 | + | ||
98 | + switch (opcode) { | ||
99 | + case 0x0: /* SQRDMLAH (vector) */ | ||
100 | + switch (size) { | ||
101 | + case 1: | ||
102 | + gen_gvec_op3_env(s, is_q, rd, rn, rm, gen_helper_gvec_qrdmlah_s16); | ||
103 | + break; | ||
104 | + case 2: | ||
105 | + gen_gvec_op3_env(s, is_q, rd, rn, rm, gen_helper_gvec_qrdmlah_s32); | ||
106 | + break; | ||
107 | + default: | ||
108 | + g_assert_not_reached(); | ||
109 | + } | ||
110 | + return; | ||
111 | + | ||
112 | + case 0x1: /* SQRDMLSH (vector) */ | ||
113 | + switch (size) { | ||
114 | + case 1: | ||
115 | + gen_gvec_op3_env(s, is_q, rd, rn, rm, gen_helper_gvec_qrdmlsh_s16); | ||
116 | + break; | ||
117 | + case 2: | ||
118 | + gen_gvec_op3_env(s, is_q, rd, rn, rm, gen_helper_gvec_qrdmlsh_s32); | ||
119 | + break; | ||
120 | + default: | ||
121 | + g_assert_not_reached(); | ||
122 | + } | ||
123 | + return; | ||
124 | + | ||
125 | + default: | ||
126 | + g_assert_not_reached(); | ||
127 | + } | ||
128 | +} | ||
129 | + | ||
130 | static void handle_2misc_widening(DisasContext *s, int opcode, bool is_q, | ||
131 | int size, int rn, int rd) | ||
132 | { | 38 | { |
133 | @@ -XXX,XX +XXX,XX @@ static void disas_crypto_three_reg_imm2(DisasContext *s, uint32_t insn) | 39 | ARMCPU *cpu = ARM_CPU(obj); |
134 | static const AArch64DecodeTable data_proc_simd[] = { | 40 | - bool value = cpu_isar_feature(aa64_sve, cpu); |
135 | /* pattern , mask , fn */ | 41 | - |
136 | { 0x0e200400, 0x9f200400, disas_simd_three_reg_same }, | 42 | - visit_type_bool(v, name, &value, errp); |
137 | + { 0x0e008400, 0x9f208400, disas_simd_three_reg_same_extra }, | 43 | + return cpu_isar_feature(aa64_sve, cpu); |
138 | { 0x0e200000, 0x9f200c00, disas_simd_three_reg_diff }, | ||
139 | { 0x0e200800, 0x9f3e0c00, disas_simd_two_reg_misc }, | ||
140 | { 0x0e300800, 0x9f3e0c00, disas_simd_across_lanes }, | ||
141 | diff --git a/target/arm/vec_helper.c b/target/arm/vec_helper.c | ||
142 | index XXXXXXX..XXXXXXX 100644 | ||
143 | --- a/target/arm/vec_helper.c | ||
144 | +++ b/target/arm/vec_helper.c | ||
145 | @@ -XXX,XX +XXX,XX @@ | ||
146 | |||
147 | #define SET_QC() env->vfp.xregs[ARM_VFP_FPSCR] |= CPSR_Q | ||
148 | |||
149 | +static void clear_tail(void *vd, uintptr_t opr_sz, uintptr_t max_sz) | ||
150 | +{ | ||
151 | + uint64_t *d = vd + opr_sz; | ||
152 | + uintptr_t i; | ||
153 | + | ||
154 | + for (i = opr_sz; i < max_sz; i += 8) { | ||
155 | + *d++ = 0; | ||
156 | + } | ||
157 | +} | ||
158 | + | ||
159 | /* Signed saturating rounding doubling multiply-accumulate high half, 16-bit */ | ||
160 | static uint16_t inl_qrdmlah_s16(CPUARMState *env, int16_t src1, | ||
161 | int16_t src2, int16_t src3) | ||
162 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(neon_qrdmlah_s16)(CPUARMState *env, uint32_t src1, | ||
163 | return deposit32(e1, 16, 16, e2); | ||
164 | } | 44 | } |
165 | 45 | ||
166 | +void HELPER(gvec_qrdmlah_s16)(void *vd, void *vn, void *vm, | 46 | -static void cpu_arm_set_sve(Object *obj, Visitor *v, const char *name, |
167 | + void *ve, uint32_t desc) | 47 | - void *opaque, Error **errp) |
168 | +{ | 48 | +static void cpu_arm_set_sve(Object *obj, bool value, Error **errp) |
169 | + uintptr_t opr_sz = simd_oprsz(desc); | 49 | { |
170 | + int16_t *d = vd; | 50 | ARMCPU *cpu = ARM_CPU(obj); |
171 | + int16_t *n = vn; | 51 | - bool value; |
172 | + int16_t *m = vm; | 52 | uint64_t t; |
173 | + CPUARMState *env = ve; | 53 | |
174 | + uintptr_t i; | 54 | - if (!visit_type_bool(v, name, &value, errp)) { |
175 | + | 55 | - return; |
176 | + for (i = 0; i < opr_sz / 2; ++i) { | 56 | - } |
177 | + d[i] = inl_qrdmlah_s16(env, n[i], m[i], d[i]); | 57 | - |
178 | + } | 58 | if (value && kvm_enabled() && !kvm_arm_sve_supported()) { |
179 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | 59 | error_setg(errp, "'sve' feature not supported by KVM on this host"); |
180 | +} | 60 | return; |
181 | + | 61 | @@ -XXX,XX +XXX,XX @@ void aarch64_add_sve_properties(Object *obj) |
182 | /* Signed saturating rounding doubling multiply-subtract high half, 16-bit */ | 62 | { |
183 | static uint16_t inl_qrdmlsh_s16(CPUARMState *env, int16_t src1, | 63 | uint32_t vq; |
184 | int16_t src2, int16_t src3) | 64 | |
185 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(neon_qrdmlsh_s16)(CPUARMState *env, uint32_t src1, | 65 | - object_property_add(obj, "sve", "bool", cpu_arm_get_sve, |
186 | return deposit32(e1, 16, 16, e2); | 66 | - cpu_arm_set_sve, NULL, NULL); |
187 | } | 67 | + object_property_add_bool(obj, "sve", cpu_arm_get_sve, cpu_arm_set_sve); |
188 | 68 | ||
189 | +void HELPER(gvec_qrdmlsh_s16)(void *vd, void *vn, void *vm, | 69 | for (vq = 1; vq <= ARM_MAX_VQ; ++vq) { |
190 | + void *ve, uint32_t desc) | 70 | char name[8]; |
191 | +{ | ||
192 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
193 | + int16_t *d = vd; | ||
194 | + int16_t *n = vn; | ||
195 | + int16_t *m = vm; | ||
196 | + CPUARMState *env = ve; | ||
197 | + uintptr_t i; | ||
198 | + | ||
199 | + for (i = 0; i < opr_sz / 2; ++i) { | ||
200 | + d[i] = inl_qrdmlsh_s16(env, n[i], m[i], d[i]); | ||
201 | + } | ||
202 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
203 | +} | ||
204 | + | ||
205 | /* Signed saturating rounding doubling multiply-accumulate high half, 32-bit */ | ||
206 | uint32_t HELPER(neon_qrdmlah_s32)(CPUARMState *env, int32_t src1, | ||
207 | int32_t src2, int32_t src3) | ||
208 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(neon_qrdmlah_s32)(CPUARMState *env, int32_t src1, | ||
209 | return ret; | ||
210 | } | ||
211 | |||
212 | +void HELPER(gvec_qrdmlah_s32)(void *vd, void *vn, void *vm, | ||
213 | + void *ve, uint32_t desc) | ||
214 | +{ | ||
215 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
216 | + int32_t *d = vd; | ||
217 | + int32_t *n = vn; | ||
218 | + int32_t *m = vm; | ||
219 | + CPUARMState *env = ve; | ||
220 | + uintptr_t i; | ||
221 | + | ||
222 | + for (i = 0; i < opr_sz / 4; ++i) { | ||
223 | + d[i] = helper_neon_qrdmlah_s32(env, n[i], m[i], d[i]); | ||
224 | + } | ||
225 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
226 | +} | ||
227 | + | ||
228 | /* Signed saturating rounding doubling multiply-subtract high half, 32-bit */ | ||
229 | uint32_t HELPER(neon_qrdmlsh_s32)(CPUARMState *env, int32_t src1, | ||
230 | int32_t src2, int32_t src3) | ||
231 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(neon_qrdmlsh_s32)(CPUARMState *env, int32_t src1, | ||
232 | } | ||
233 | return ret; | ||
234 | } | ||
235 | + | ||
236 | +void HELPER(gvec_qrdmlsh_s32)(void *vd, void *vn, void *vm, | ||
237 | + void *ve, uint32_t desc) | ||
238 | +{ | ||
239 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
240 | + int32_t *d = vd; | ||
241 | + int32_t *n = vn; | ||
242 | + int32_t *m = vm; | ||
243 | + CPUARMState *env = ve; | ||
244 | + uintptr_t i; | ||
245 | + | ||
246 | + for (i = 0; i < opr_sz / 4; ++i) { | ||
247 | + d[i] = helper_neon_qrdmlsh_s32(env, n[i], m[i], d[i]); | ||
248 | + } | ||
249 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
250 | +} | ||
251 | -- | 71 | -- |
252 | 2.16.2 | 72 | 2.20.1 |
253 | 73 | ||
254 | 74 | diff view generated by jsdifflib |
1 | Add a Cortex-M33 definition. The M33 is an M profile CPU | 1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
---|---|---|---|
2 | which implements the ARM v8M architecture, including the | ||
3 | M profile Security Extension. | ||
4 | 2 | ||
3 | In this context, the HCR value is the effective value, and thus is | ||
4 | zero in secure mode. The tests for HCR.{F,I}MO are sufficient. | ||
5 | |||
6 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20210112104511.36576-1-remi.denis.courmont@huawei.com | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
7 | Message-id: 20180220180325.29818-9-peter.maydell@linaro.org | ||
8 | --- | 10 | --- |
9 | target/arm/cpu.c | 31 +++++++++++++++++++++++++++++++ | 11 | target/arm/cpu.c | 8 ++++---- |
10 | 1 file changed, 31 insertions(+) | 12 | target/arm/helper.c | 10 ++++------ |
13 | 2 files changed, 8 insertions(+), 10 deletions(-) | ||
11 | 14 | ||
12 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | 15 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c |
13 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
14 | --- a/target/arm/cpu.c | 17 | --- a/target/arm/cpu.c |
15 | +++ b/target/arm/cpu.c | 18 | +++ b/target/arm/cpu.c |
16 | @@ -XXX,XX +XXX,XX @@ static void cortex_m4_initfn(Object *obj) | 19 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_excp_unmasked(CPUState *cs, unsigned int excp_idx, |
17 | cpu->id_isar5 = 0x00000000; | 20 | break; |
18 | } | 21 | |
19 | 22 | case EXCP_VFIQ: | |
20 | +static void cortex_m33_initfn(Object *obj) | 23 | - if (secure || !(hcr_el2 & HCR_FMO) || (hcr_el2 & HCR_TGE)) { |
21 | +{ | 24 | - /* VFIQs are only taken when hypervized and non-secure. */ |
22 | + ARMCPU *cpu = ARM_CPU(obj); | 25 | + if (!(hcr_el2 & HCR_FMO) || (hcr_el2 & HCR_TGE)) { |
23 | + | 26 | + /* VFIQs are only taken when hypervized. */ |
24 | + set_feature(&cpu->env, ARM_FEATURE_V8); | 27 | return false; |
25 | + set_feature(&cpu->env, ARM_FEATURE_M); | 28 | } |
26 | + set_feature(&cpu->env, ARM_FEATURE_M_SECURITY); | 29 | return !(env->daif & PSTATE_F); |
27 | + set_feature(&cpu->env, ARM_FEATURE_THUMB_DSP); | 30 | case EXCP_VIRQ: |
28 | + cpu->midr = 0x410fd213; /* r0p3 */ | 31 | - if (secure || !(hcr_el2 & HCR_IMO) || (hcr_el2 & HCR_TGE)) { |
29 | + cpu->pmsav7_dregion = 16; | 32 | - /* VIRQs are only taken when hypervized and non-secure. */ |
30 | + cpu->sau_sregion = 8; | 33 | + if (!(hcr_el2 & HCR_IMO) || (hcr_el2 & HCR_TGE)) { |
31 | + cpu->id_pfr0 = 0x00000030; | 34 | + /* VIRQs are only taken when hypervized. */ |
32 | + cpu->id_pfr1 = 0x00000210; | 35 | return false; |
33 | + cpu->id_dfr0 = 0x00200000; | 36 | } |
34 | + cpu->id_afr0 = 0x00000000; | 37 | return !(env->daif & PSTATE_I); |
35 | + cpu->id_mmfr0 = 0x00101F40; | 38 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
36 | + cpu->id_mmfr1 = 0x00000000; | 39 | index XXXXXXX..XXXXXXX 100644 |
37 | + cpu->id_mmfr2 = 0x01000000; | 40 | --- a/target/arm/helper.c |
38 | + cpu->id_mmfr3 = 0x00000000; | 41 | +++ b/target/arm/helper.c |
39 | + cpu->id_isar0 = 0x01101110; | 42 | @@ -XXX,XX +XXX,XX @@ static void csselr_write(CPUARMState *env, const ARMCPRegInfo *ri, |
40 | + cpu->id_isar1 = 0x02212000; | 43 | static uint64_t isr_read(CPUARMState *env, const ARMCPRegInfo *ri) |
41 | + cpu->id_isar2 = 0x20232232; | ||
42 | + cpu->id_isar3 = 0x01111131; | ||
43 | + cpu->id_isar4 = 0x01310132; | ||
44 | + cpu->id_isar5 = 0x00000000; | ||
45 | + cpu->clidr = 0x00000000; | ||
46 | + cpu->ctr = 0x8000c000; | ||
47 | +} | ||
48 | + | ||
49 | static void arm_v7m_class_init(ObjectClass *oc, void *data) | ||
50 | { | 44 | { |
51 | CPUClass *cc = CPU_CLASS(oc); | 45 | CPUState *cs = env_cpu(env); |
52 | @@ -XXX,XX +XXX,XX @@ static const ARMCPUInfo arm_cpus[] = { | 46 | - uint64_t hcr_el2 = arm_hcr_el2_eff(env); |
53 | .class_init = arm_v7m_class_init }, | 47 | + bool el1 = arm_current_el(env) == 1; |
54 | { .name = "cortex-m4", .initfn = cortex_m4_initfn, | 48 | + uint64_t hcr_el2 = el1 ? arm_hcr_el2_eff(env) : 0; |
55 | .class_init = arm_v7m_class_init }, | 49 | uint64_t ret = 0; |
56 | + { .name = "cortex-m33", .initfn = cortex_m33_initfn, | 50 | - bool allow_virt = (arm_current_el(env) == 1 && |
57 | + .class_init = arm_v7m_class_init }, | 51 | - (!arm_is_secure_below_el3(env) || |
58 | { .name = "cortex-r5", .initfn = cortex_r5_initfn }, | 52 | - (env->cp15.scr_el3 & SCR_EEL2))); |
59 | { .name = "cortex-a7", .initfn = cortex_a7_initfn }, | 53 | |
60 | { .name = "cortex-a8", .initfn = cortex_a8_initfn }, | 54 | - if (allow_virt && (hcr_el2 & HCR_IMO)) { |
55 | + if (hcr_el2 & HCR_IMO) { | ||
56 | if (cs->interrupt_request & CPU_INTERRUPT_VIRQ) { | ||
57 | ret |= CPSR_I; | ||
58 | } | ||
59 | @@ -XXX,XX +XXX,XX @@ static uint64_t isr_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
60 | } | ||
61 | } | ||
62 | |||
63 | - if (allow_virt && (hcr_el2 & HCR_FMO)) { | ||
64 | + if (hcr_el2 & HCR_FMO) { | ||
65 | if (cs->interrupt_request & CPU_INTERRUPT_VFIQ) { | ||
66 | ret |= CPSR_F; | ||
67 | } | ||
61 | -- | 68 | -- |
62 | 2.16.2 | 69 | 2.20.1 |
63 | 70 | ||
64 | 71 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
---|---|---|---|
2 | 2 | ||
3 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | 3 | This checks if EL2 is enabled (meaning EL2 registers take effects) in |
4 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 4 | the current security context. |
5 | Message-id: 20180228193125.20577-12-richard.henderson@linaro.org | 5 | |
6 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20210112104511.36576-2-remi.denis.courmont@huawei.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | --- | 10 | --- |
8 | target/arm/helper.h | 7 ++++ | 11 | target/arm/cpu.h | 17 +++++++++++++++++ |
9 | target/arm/translate-a64.c | 48 ++++++++++++++++++++++- | 12 | 1 file changed, 17 insertions(+) |
10 | target/arm/vec_helper.c | 97 ++++++++++++++++++++++++++++++++++++++++++++++ | ||
11 | 3 files changed, 151 insertions(+), 1 deletion(-) | ||
12 | 13 | ||
13 | diff --git a/target/arm/helper.h b/target/arm/helper.h | 14 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
14 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/target/arm/helper.h | 16 | --- a/target/arm/cpu.h |
16 | +++ b/target/arm/helper.h | 17 | +++ b/target/arm/cpu.h |
17 | @@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_5(gvec_qrdmlah_s32, TCG_CALL_NO_RWG, | 18 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_is_secure(CPUARMState *env) |
18 | DEF_HELPER_FLAGS_5(gvec_qrdmlsh_s32, TCG_CALL_NO_RWG, | 19 | return arm_is_secure_below_el3(env); |
19 | void, ptr, ptr, ptr, ptr, i32) | ||
20 | |||
21 | +DEF_HELPER_FLAGS_5(gvec_fcaddh, TCG_CALL_NO_RWG, | ||
22 | + void, ptr, ptr, ptr, ptr, i32) | ||
23 | +DEF_HELPER_FLAGS_5(gvec_fcadds, TCG_CALL_NO_RWG, | ||
24 | + void, ptr, ptr, ptr, ptr, i32) | ||
25 | +DEF_HELPER_FLAGS_5(gvec_fcaddd, TCG_CALL_NO_RWG, | ||
26 | + void, ptr, ptr, ptr, ptr, i32) | ||
27 | + | ||
28 | #ifdef TARGET_AARCH64 | ||
29 | #include "helper-a64.h" | ||
30 | #endif | ||
31 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c | ||
32 | index XXXXXXX..XXXXXXX 100644 | ||
33 | --- a/target/arm/translate-a64.c | ||
34 | +++ b/target/arm/translate-a64.c | ||
35 | @@ -XXX,XX +XXX,XX @@ static void gen_gvec_op3_env(DisasContext *s, bool is_q, int rd, | ||
36 | is_q ? 16 : 8, vec_full_reg_size(s), 0, fn); | ||
37 | } | 20 | } |
38 | 21 | ||
39 | +/* Expand a 3-operand + fpstatus pointer + simd data value operation using | 22 | +/* |
40 | + * an out-of-line helper. | 23 | + * Return true if the current security state has AArch64 EL2 or AArch32 Hyp. |
24 | + * This corresponds to the pseudocode EL2Enabled() | ||
41 | + */ | 25 | + */ |
42 | +static void gen_gvec_op3_fpst(DisasContext *s, bool is_q, int rd, int rn, | 26 | +static inline bool arm_is_el2_enabled(CPUARMState *env) |
43 | + int rm, bool is_fp16, int data, | ||
44 | + gen_helper_gvec_3_ptr *fn) | ||
45 | +{ | 27 | +{ |
46 | + TCGv_ptr fpst = get_fpstatus_ptr(is_fp16); | 28 | + if (arm_feature(env, ARM_FEATURE_EL2)) { |
47 | + tcg_gen_gvec_3_ptr(vec_full_reg_offset(s, rd), | 29 | + return !arm_is_secure_below_el3(env); |
48 | + vec_full_reg_offset(s, rn), | 30 | + } |
49 | + vec_full_reg_offset(s, rm), fpst, | 31 | + return false; |
50 | + is_q ? 16 : 8, vec_full_reg_size(s), data, fn); | ||
51 | + tcg_temp_free_ptr(fpst); | ||
52 | +} | 32 | +} |
53 | + | 33 | + |
54 | /* Set ZF and NF based on a 64 bit result. This is alas fiddlier | 34 | #else |
55 | * than the 32 bit equivalent. | 35 | static inline bool arm_is_secure_below_el3(CPUARMState *env) |
56 | */ | 36 | { |
57 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_three_reg_same_extra(DisasContext *s, uint32_t insn) | 37 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_is_secure(CPUARMState *env) |
58 | int size = extract32(insn, 22, 2); | 38 | { |
59 | bool u = extract32(insn, 29, 1); | 39 | return false; |
60 | bool is_q = extract32(insn, 30, 1); | ||
61 | - int feature; | ||
62 | + int feature, rot; | ||
63 | |||
64 | switch (u * 16 + opcode) { | ||
65 | case 0x10: /* SQRDMLAH (vector) */ | ||
66 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_three_reg_same_extra(DisasContext *s, uint32_t insn) | ||
67 | } | ||
68 | feature = ARM_FEATURE_V8_RDM; | ||
69 | break; | ||
70 | + case 0xc: /* FCADD, #90 */ | ||
71 | + case 0xe: /* FCADD, #270 */ | ||
72 | + if (size == 0 | ||
73 | + || (size == 1 && !arm_dc_feature(s, ARM_FEATURE_V8_FP16)) | ||
74 | + || (size == 3 && !is_q)) { | ||
75 | + unallocated_encoding(s); | ||
76 | + return; | ||
77 | + } | ||
78 | + feature = ARM_FEATURE_V8_FCMA; | ||
79 | + break; | ||
80 | default: | ||
81 | unallocated_encoding(s); | ||
82 | return; | ||
83 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_three_reg_same_extra(DisasContext *s, uint32_t insn) | ||
84 | } | ||
85 | return; | ||
86 | |||
87 | + case 0xc: /* FCADD, #90 */ | ||
88 | + case 0xe: /* FCADD, #270 */ | ||
89 | + rot = extract32(opcode, 1, 1); | ||
90 | + switch (size) { | ||
91 | + case 1: | ||
92 | + gen_gvec_op3_fpst(s, is_q, rd, rn, rm, size == 1, rot, | ||
93 | + gen_helper_gvec_fcaddh); | ||
94 | + break; | ||
95 | + case 2: | ||
96 | + gen_gvec_op3_fpst(s, is_q, rd, rn, rm, size == 1, rot, | ||
97 | + gen_helper_gvec_fcadds); | ||
98 | + break; | ||
99 | + case 3: | ||
100 | + gen_gvec_op3_fpst(s, is_q, rd, rn, rm, size == 1, rot, | ||
101 | + gen_helper_gvec_fcaddd); | ||
102 | + break; | ||
103 | + default: | ||
104 | + g_assert_not_reached(); | ||
105 | + } | ||
106 | + return; | ||
107 | + | ||
108 | default: | ||
109 | g_assert_not_reached(); | ||
110 | } | ||
111 | diff --git a/target/arm/vec_helper.c b/target/arm/vec_helper.c | ||
112 | index XXXXXXX..XXXXXXX 100644 | ||
113 | --- a/target/arm/vec_helper.c | ||
114 | +++ b/target/arm/vec_helper.c | ||
115 | @@ -XXX,XX +XXX,XX @@ | ||
116 | #include "exec/exec-all.h" | ||
117 | #include "exec/helper-proto.h" | ||
118 | #include "tcg/tcg-gvec-desc.h" | ||
119 | +#include "fpu/softfloat.h" | ||
120 | |||
121 | |||
122 | +/* Note that vector data is stored in host-endian 64-bit chunks, | ||
123 | + so addressing units smaller than that needs a host-endian fixup. */ | ||
124 | +#ifdef HOST_WORDS_BIGENDIAN | ||
125 | +#define H1(x) ((x) ^ 7) | ||
126 | +#define H2(x) ((x) ^ 3) | ||
127 | +#define H4(x) ((x) ^ 1) | ||
128 | +#else | ||
129 | +#define H1(x) (x) | ||
130 | +#define H2(x) (x) | ||
131 | +#define H4(x) (x) | ||
132 | +#endif | ||
133 | + | ||
134 | #define SET_QC() env->vfp.xregs[ARM_VFP_FPSCR] |= CPSR_Q | ||
135 | |||
136 | static void clear_tail(void *vd, uintptr_t opr_sz, uintptr_t max_sz) | ||
137 | @@ -XXX,XX +XXX,XX @@ void HELPER(gvec_qrdmlsh_s32)(void *vd, void *vn, void *vm, | ||
138 | } | ||
139 | clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
140 | } | 40 | } |
141 | + | 41 | + |
142 | +void HELPER(gvec_fcaddh)(void *vd, void *vn, void *vm, | 42 | +static inline bool arm_is_el2_enabled(CPUARMState *env) |
143 | + void *vfpst, uint32_t desc) | ||
144 | +{ | 43 | +{ |
145 | + uintptr_t opr_sz = simd_oprsz(desc); | 44 | + return false; |
146 | + float16 *d = vd; | ||
147 | + float16 *n = vn; | ||
148 | + float16 *m = vm; | ||
149 | + float_status *fpst = vfpst; | ||
150 | + uint32_t neg_real = extract32(desc, SIMD_DATA_SHIFT, 1); | ||
151 | + uint32_t neg_imag = neg_real ^ 1; | ||
152 | + uintptr_t i; | ||
153 | + | ||
154 | + /* Shift boolean to the sign bit so we can xor to negate. */ | ||
155 | + neg_real <<= 15; | ||
156 | + neg_imag <<= 15; | ||
157 | + | ||
158 | + for (i = 0; i < opr_sz / 2; i += 2) { | ||
159 | + float16 e0 = n[H2(i)]; | ||
160 | + float16 e1 = m[H2(i + 1)] ^ neg_imag; | ||
161 | + float16 e2 = n[H2(i + 1)]; | ||
162 | + float16 e3 = m[H2(i)] ^ neg_real; | ||
163 | + | ||
164 | + d[H2(i)] = float16_add(e0, e1, fpst); | ||
165 | + d[H2(i + 1)] = float16_add(e2, e3, fpst); | ||
166 | + } | ||
167 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
168 | +} | 45 | +} |
169 | + | 46 | #endif |
170 | +void HELPER(gvec_fcadds)(void *vd, void *vn, void *vm, | 47 | |
171 | + void *vfpst, uint32_t desc) | 48 | /** |
172 | +{ | ||
173 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
174 | + float32 *d = vd; | ||
175 | + float32 *n = vn; | ||
176 | + float32 *m = vm; | ||
177 | + float_status *fpst = vfpst; | ||
178 | + uint32_t neg_real = extract32(desc, SIMD_DATA_SHIFT, 1); | ||
179 | + uint32_t neg_imag = neg_real ^ 1; | ||
180 | + uintptr_t i; | ||
181 | + | ||
182 | + /* Shift boolean to the sign bit so we can xor to negate. */ | ||
183 | + neg_real <<= 31; | ||
184 | + neg_imag <<= 31; | ||
185 | + | ||
186 | + for (i = 0; i < opr_sz / 4; i += 2) { | ||
187 | + float32 e0 = n[H4(i)]; | ||
188 | + float32 e1 = m[H4(i + 1)] ^ neg_imag; | ||
189 | + float32 e2 = n[H4(i + 1)]; | ||
190 | + float32 e3 = m[H4(i)] ^ neg_real; | ||
191 | + | ||
192 | + d[H4(i)] = float32_add(e0, e1, fpst); | ||
193 | + d[H4(i + 1)] = float32_add(e2, e3, fpst); | ||
194 | + } | ||
195 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
196 | +} | ||
197 | + | ||
198 | +void HELPER(gvec_fcaddd)(void *vd, void *vn, void *vm, | ||
199 | + void *vfpst, uint32_t desc) | ||
200 | +{ | ||
201 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
202 | + float64 *d = vd; | ||
203 | + float64 *n = vn; | ||
204 | + float64 *m = vm; | ||
205 | + float_status *fpst = vfpst; | ||
206 | + uint64_t neg_real = extract64(desc, SIMD_DATA_SHIFT, 1); | ||
207 | + uint64_t neg_imag = neg_real ^ 1; | ||
208 | + uintptr_t i; | ||
209 | + | ||
210 | + /* Shift boolean to the sign bit so we can xor to negate. */ | ||
211 | + neg_real <<= 63; | ||
212 | + neg_imag <<= 63; | ||
213 | + | ||
214 | + for (i = 0; i < opr_sz / 8; i += 2) { | ||
215 | + float64 e0 = n[i]; | ||
216 | + float64 e1 = m[i + 1] ^ neg_imag; | ||
217 | + float64 e2 = n[i + 1]; | ||
218 | + float64 e3 = m[i] ^ neg_real; | ||
219 | + | ||
220 | + d[i] = float64_add(e0, e1, fpst); | ||
221 | + d[i + 1] = float64_add(e2, e3, fpst); | ||
222 | + } | ||
223 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
224 | +} | ||
225 | -- | 49 | -- |
226 | 2.16.2 | 50 | 2.20.1 |
227 | 51 | ||
228 | 52 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
---|---|---|---|
2 | 2 | ||
3 | Not enabled anywhere yet. | 3 | Do not assume that EL2 is available in and only in non-secure context. |
4 | That equivalence is broken by ARMv8.4-SEL2. | ||
4 | 5 | ||
5 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | 6 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
6 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
7 | Message-id: 20180228193125.20577-11-richard.henderson@linaro.org | 8 | Message-id: 20210112104511.36576-3-remi.denis.courmont@huawei.com |
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | --- | 10 | --- |
10 | target/arm/cpu.h | 1 + | 11 | target/arm/cpu.h | 4 ++-- |
11 | linux-user/elfload.c | 1 + | 12 | target/arm/helper-a64.c | 8 +------- |
12 | 2 files changed, 2 insertions(+) | 13 | target/arm/helper.c | 33 +++++++++++++-------------------- |
14 | 3 files changed, 16 insertions(+), 29 deletions(-) | ||
13 | 15 | ||
14 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 16 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
15 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/target/arm/cpu.h | 18 | --- a/target/arm/cpu.h |
17 | +++ b/target/arm/cpu.h | 19 | +++ b/target/arm/cpu.h |
18 | @@ -XXX,XX +XXX,XX @@ enum arm_features { | 20 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_el_is_aa64(CPUARMState *env, int el) |
19 | ARM_FEATURE_V8_SM4, /* implements SM4 part of v8 Crypto Extensions */ | 21 | return aa64; |
20 | ARM_FEATURE_V8_RDM, /* implements v8.1 simd round multiply */ | 22 | } |
21 | ARM_FEATURE_V8_FP16, /* implements v8.2 half-precision float */ | 23 | |
22 | + ARM_FEATURE_V8_FCMA, /* has complex number part of v8.3 extensions. */ | 24 | - if (arm_feature(env, ARM_FEATURE_EL2) && !arm_is_secure_below_el3(env)) { |
23 | }; | 25 | + if (arm_is_el2_enabled(env)) { |
24 | 26 | aa64 = aa64 && (env->cp15.hcr_el2 & HCR_RW); | |
25 | static inline int arm_feature(CPUARMState *env, int feature) | 27 | } |
26 | diff --git a/linux-user/elfload.c b/linux-user/elfload.c | 28 | |
29 | @@ -XXX,XX +XXX,XX @@ static inline int arm_debug_target_el(CPUARMState *env) | ||
30 | bool secure = arm_is_secure(env); | ||
31 | bool route_to_el2 = false; | ||
32 | |||
33 | - if (arm_feature(env, ARM_FEATURE_EL2) && !secure) { | ||
34 | + if (arm_is_el2_enabled(env)) { | ||
35 | route_to_el2 = env->cp15.hcr_el2 & HCR_TGE || | ||
36 | env->cp15.mdcr_el2 & MDCR_TDE; | ||
37 | } | ||
38 | diff --git a/target/arm/helper-a64.c b/target/arm/helper-a64.c | ||
27 | index XXXXXXX..XXXXXXX 100644 | 39 | index XXXXXXX..XXXXXXX 100644 |
28 | --- a/linux-user/elfload.c | 40 | --- a/target/arm/helper-a64.c |
29 | +++ b/linux-user/elfload.c | 41 | +++ b/target/arm/helper-a64.c |
30 | @@ -XXX,XX +XXX,XX @@ static uint32_t get_elf_hwcap(void) | 42 | @@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc) |
31 | GET_FEATURE(ARM_FEATURE_V8_FP16, | 43 | if (new_el == -1) { |
32 | ARM_HWCAP_A64_FPHP | ARM_HWCAP_A64_ASIMDHP); | 44 | goto illegal_return; |
33 | GET_FEATURE(ARM_FEATURE_V8_RDM, ARM_HWCAP_A64_ASIMDRDM); | 45 | } |
34 | + GET_FEATURE(ARM_FEATURE_V8_FCMA, ARM_HWCAP_A64_FCMA); | 46 | - if (new_el > cur_el |
35 | #undef GET_FEATURE | 47 | - || (new_el == 2 && !arm_feature(env, ARM_FEATURE_EL2))) { |
36 | 48 | + if (new_el > cur_el || (new_el == 2 && !arm_is_el2_enabled(env))) { | |
37 | return hwcaps; | 49 | /* Disallow return to an EL which is unimplemented or higher |
50 | * than the current one. | ||
51 | */ | ||
52 | @@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc) | ||
53 | goto illegal_return; | ||
54 | } | ||
55 | |||
56 | - if (new_el == 2 && arm_is_secure_below_el3(env)) { | ||
57 | - /* Return to the non-existent secure-EL2 */ | ||
58 | - goto illegal_return; | ||
59 | - } | ||
60 | - | ||
61 | if (new_el == 1 && (arm_hcr_el2_eff(env) & HCR_TGE)) { | ||
62 | goto illegal_return; | ||
63 | } | ||
64 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
65 | index XXXXXXX..XXXXXXX 100644 | ||
66 | --- a/target/arm/helper.c | ||
67 | +++ b/target/arm/helper.c | ||
68 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult cpacr_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
69 | { | ||
70 | if (arm_feature(env, ARM_FEATURE_V8)) { | ||
71 | /* Check if CPACR accesses are to be trapped to EL2 */ | ||
72 | - if (arm_current_el(env) == 1 && | ||
73 | - (env->cp15.cptr_el[2] & CPTR_TCPAC) && !arm_is_secure(env)) { | ||
74 | + if (arm_current_el(env) == 1 && arm_is_el2_enabled(env) && | ||
75 | + (env->cp15.cptr_el[2] & CPTR_TCPAC)) { | ||
76 | return CP_ACCESS_TRAP_EL2; | ||
77 | /* Check if CPACR accesses are to be trapped to EL3 */ | ||
78 | } else if (arm_current_el(env) < 3 && | ||
79 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult gt_counter_access(CPUARMState *env, int timeridx, | ||
80 | bool isread) | ||
81 | { | ||
82 | unsigned int cur_el = arm_current_el(env); | ||
83 | - bool secure = arm_is_secure(env); | ||
84 | + bool has_el2 = arm_is_el2_enabled(env); | ||
85 | uint64_t hcr = arm_hcr_el2_eff(env); | ||
86 | |||
87 | switch (cur_el) { | ||
88 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult gt_counter_access(CPUARMState *env, int timeridx, | ||
89 | } | ||
90 | } else { | ||
91 | /* If HCR_EL2.<E2H> == 0: check CNTHCTL_EL2.EL1PCEN. */ | ||
92 | - if (arm_feature(env, ARM_FEATURE_EL2) && | ||
93 | - timeridx == GTIMER_PHYS && !secure && | ||
94 | + if (has_el2 && timeridx == GTIMER_PHYS && | ||
95 | !extract32(env->cp15.cnthctl_el2, 1, 1)) { | ||
96 | return CP_ACCESS_TRAP_EL2; | ||
97 | } | ||
98 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult gt_counter_access(CPUARMState *env, int timeridx, | ||
99 | |||
100 | case 1: | ||
101 | /* Check CNTHCTL_EL2.EL1PCTEN, which changes location based on E2H. */ | ||
102 | - if (arm_feature(env, ARM_FEATURE_EL2) && | ||
103 | - timeridx == GTIMER_PHYS && !secure && | ||
104 | + if (has_el2 && timeridx == GTIMER_PHYS && | ||
105 | (hcr & HCR_E2H | ||
106 | ? !extract32(env->cp15.cnthctl_el2, 10, 1) | ||
107 | : !extract32(env->cp15.cnthctl_el2, 0, 1))) { | ||
108 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult gt_timer_access(CPUARMState *env, int timeridx, | ||
109 | bool isread) | ||
110 | { | ||
111 | unsigned int cur_el = arm_current_el(env); | ||
112 | - bool secure = arm_is_secure(env); | ||
113 | + bool has_el2 = arm_is_el2_enabled(env); | ||
114 | uint64_t hcr = arm_hcr_el2_eff(env); | ||
115 | |||
116 | switch (cur_el) { | ||
117 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult gt_timer_access(CPUARMState *env, int timeridx, | ||
118 | /* fall through */ | ||
119 | |||
120 | case 1: | ||
121 | - if (arm_feature(env, ARM_FEATURE_EL2) && | ||
122 | - timeridx == GTIMER_PHYS && !secure) { | ||
123 | + if (has_el2 && timeridx == GTIMER_PHYS) { | ||
124 | if (hcr & HCR_E2H) { | ||
125 | /* If HCR_EL2.<E2H,TGE> == '10': check CNTHCTL_EL2.EL1PTEN. */ | ||
126 | if (!extract32(env->cp15.cnthctl_el2, 11, 1)) { | ||
127 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo strongarm_cp_reginfo[] = { | ||
128 | |||
129 | static uint64_t midr_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
130 | { | ||
131 | - ARMCPU *cpu = env_archcpu(env); | ||
132 | unsigned int cur_el = arm_current_el(env); | ||
133 | - bool secure = arm_is_secure(env); | ||
134 | |||
135 | - if (arm_feature(&cpu->env, ARM_FEATURE_EL2) && !secure && cur_el == 1) { | ||
136 | + if (arm_is_el2_enabled(env) && cur_el == 1) { | ||
137 | return env->cp15.vpidr_el2; | ||
138 | } | ||
139 | return raw_read(env, ri); | ||
140 | @@ -XXX,XX +XXX,XX @@ static uint64_t mpidr_read_val(CPUARMState *env) | ||
141 | static uint64_t mpidr_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
142 | { | ||
143 | unsigned int cur_el = arm_current_el(env); | ||
144 | - bool secure = arm_is_secure(env); | ||
145 | |||
146 | - if (arm_feature(env, ARM_FEATURE_EL2) && !secure && cur_el == 1) { | ||
147 | + if (arm_is_el2_enabled(env) && cur_el == 1) { | ||
148 | return env->cp15.vmpidr_el2; | ||
149 | } | ||
150 | return mpidr_read_val(env); | ||
151 | @@ -XXX,XX +XXX,XX @@ uint64_t arm_hcr_el2_eff(CPUARMState *env) | ||
152 | { | ||
153 | uint64_t ret = env->cp15.hcr_el2; | ||
154 | |||
155 | - if (arm_is_secure_below_el3(env)) { | ||
156 | + if (!arm_is_el2_enabled(env)) { | ||
157 | /* | ||
158 | * "This register has no effect if EL2 is not enabled in the | ||
159 | * current Security state". This is ARMv8.4-SecEL2 speak for | ||
160 | @@ -XXX,XX +XXX,XX @@ int sve_exception_el(CPUARMState *env, int el) | ||
161 | /* CPTR_EL2. Since TZ and TFP are positive, | ||
162 | * they will be zero when EL2 is not present. | ||
163 | */ | ||
164 | - if (el <= 2 && !arm_is_secure_below_el3(env)) { | ||
165 | + if (el <= 2 && arm_is_el2_enabled(env)) { | ||
166 | if (env->cp15.cptr_el[2] & CPTR_TZ) { | ||
167 | return 2; | ||
168 | } | ||
169 | @@ -XXX,XX +XXX,XX @@ static int bad_mode_switch(CPUARMState *env, int mode, CPSRWriteType write_type) | ||
170 | } | ||
171 | return 0; | ||
172 | case ARM_CPU_MODE_HYP: | ||
173 | - return !arm_feature(env, ARM_FEATURE_EL2) | ||
174 | - || arm_current_el(env) < 2 || arm_is_secure_below_el3(env); | ||
175 | + return !arm_is_el2_enabled(env) || arm_current_el(env) < 2; | ||
176 | case ARM_CPU_MODE_MON: | ||
177 | return arm_current_el(env) < 3; | ||
178 | default: | ||
179 | @@ -XXX,XX +XXX,XX @@ int fp_exception_el(CPUARMState *env, int cur_el) | ||
180 | |||
181 | /* CPTR_EL2 : present in v7VE or v8 */ | ||
182 | if (cur_el <= 2 && extract32(env->cp15.cptr_el[2], 10, 1) | ||
183 | - && !arm_is_secure_below_el3(env)) { | ||
184 | + && arm_is_el2_enabled(env)) { | ||
185 | /* Trap FP ops at EL2, NS-EL1 or NS-EL0 to EL2 */ | ||
186 | return 2; | ||
187 | } | ||
38 | -- | 188 | -- |
39 | 2.16.2 | 189 | 2.20.1 |
40 | 190 | ||
41 | 191 | diff view generated by jsdifflib |
1 | Instead of loading kernels, device trees, and the like to | 1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
---|---|---|---|
2 | the system address space, use the CPU's address space. This | ||
3 | is important if we're trying to load the file to memory or | ||
4 | via an alias memory region that is provided by an SoC | ||
5 | object and thus not mapped into the system address space. | ||
6 | 2 | ||
3 | This will simplify accessing HCR conditionally in secure state. | ||
4 | |||
5 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
7 | Message-id: 20210112104511.36576-4-remi.denis.courmont@huawei.com | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
8 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
10 | Message-id: 20180220180325.29818-3-peter.maydell@linaro.org | ||
11 | --- | 9 | --- |
12 | hw/arm/boot.c | 119 +++++++++++++++++++++++++++++++++++++--------------------- | 10 | target/arm/helper.c | 31 ++++++++++++++++++------------- |
13 | 1 file changed, 76 insertions(+), 43 deletions(-) | 11 | 1 file changed, 18 insertions(+), 13 deletions(-) |
14 | 12 | ||
15 | diff --git a/hw/arm/boot.c b/hw/arm/boot.c | 13 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
16 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/hw/arm/boot.c | 15 | --- a/target/arm/helper.c |
18 | +++ b/hw/arm/boot.c | 16 | +++ b/target/arm/helper.c |
19 | @@ -XXX,XX +XXX,XX @@ | 17 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult aa64_cacheop_pou_access(CPUARMState *env, |
20 | #define ARM64_TEXT_OFFSET_OFFSET 8 | 18 | |
21 | #define ARM64_MAGIC_OFFSET 56 | 19 | static int vae1_tlbmask(CPUARMState *env) |
22 | 20 | { | |
23 | +static AddressSpace *arm_boot_address_space(ARMCPU *cpu, | 21 | - /* Since we exclude secure first, we may read HCR_EL2 directly. */ |
24 | + const struct arm_boot_info *info) | 22 | - if (arm_is_secure_below_el3(env)) { |
25 | +{ | 23 | - return ARMMMUIdxBit_SE10_1 | |
26 | + /* Return the address space to use for bootloader reads and writes. | 24 | - ARMMMUIdxBit_SE10_1_PAN | |
27 | + * We prefer the secure address space if the CPU has it and we're | 25 | - ARMMMUIdxBit_SE10_0; |
28 | + * going to boot the guest into it. | 26 | - } else if ((env->cp15.hcr_el2 & (HCR_E2H | HCR_TGE)) |
29 | + */ | 27 | - == (HCR_E2H | HCR_TGE)) { |
30 | + int asidx; | 28 | + uint64_t hcr = arm_hcr_el2_eff(env); |
31 | + CPUState *cs = CPU(cpu); | ||
32 | + | 29 | + |
33 | + if (arm_feature(&cpu->env, ARM_FEATURE_EL3) && info->secure_boot) { | 30 | + if ((hcr & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE)) { |
34 | + asidx = ARMASIdx_S; | 31 | return ARMMMUIdxBit_E20_2 | |
35 | + } else { | 32 | ARMMMUIdxBit_E20_2_PAN | |
36 | + asidx = ARMASIdx_NS; | 33 | ARMMMUIdxBit_E20_0; |
37 | + } | 34 | + } else if (arm_is_secure_below_el3(env)) { |
35 | + return ARMMMUIdxBit_SE10_1 | | ||
36 | + ARMMMUIdxBit_SE10_1_PAN | | ||
37 | + ARMMMUIdxBit_SE10_0; | ||
38 | } else { | ||
39 | return ARMMMUIdxBit_E10_1 | | ||
40 | ARMMMUIdxBit_E10_1_PAN | | ||
41 | @@ -XXX,XX +XXX,XX @@ static inline uint64_t regime_sctlr(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
42 | static inline bool regime_translation_disabled(CPUARMState *env, | ||
43 | ARMMMUIdx mmu_idx) | ||
44 | { | ||
45 | + uint64_t hcr_el2; | ||
38 | + | 46 | + |
39 | + return cpu_get_address_space(cs, asidx); | 47 | if (arm_feature(env, ARM_FEATURE_M)) { |
40 | +} | 48 | switch (env->v7m.mpu_ctrl[regime_is_secure(env, mmu_idx)] & |
41 | + | 49 | (R_V7M_MPU_CTRL_ENABLE_MASK | R_V7M_MPU_CTRL_HFNMIENA_MASK)) { |
42 | typedef enum { | 50 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_translation_disabled(CPUARMState *env, |
43 | FIXUP_NONE = 0, /* do nothing */ | ||
44 | FIXUP_TERMINATOR, /* end of insns */ | ||
45 | @@ -XXX,XX +XXX,XX @@ static const ARMInsnFixup smpboot[] = { | ||
46 | }; | ||
47 | |||
48 | static void write_bootloader(const char *name, hwaddr addr, | ||
49 | - const ARMInsnFixup *insns, uint32_t *fixupcontext) | ||
50 | + const ARMInsnFixup *insns, uint32_t *fixupcontext, | ||
51 | + AddressSpace *as) | ||
52 | { | ||
53 | /* Fix up the specified bootloader fragment and write it into | ||
54 | * guest memory using rom_add_blob_fixed(). fixupcontext is | ||
55 | @@ -XXX,XX +XXX,XX @@ static void write_bootloader(const char *name, hwaddr addr, | ||
56 | code[i] = tswap32(insn); | ||
57 | } | ||
58 | |||
59 | - rom_add_blob_fixed(name, code, len * sizeof(uint32_t), addr); | ||
60 | + rom_add_blob_fixed_as(name, code, len * sizeof(uint32_t), addr, as); | ||
61 | |||
62 | g_free(code); | ||
63 | } | ||
64 | @@ -XXX,XX +XXX,XX @@ static void default_write_secondary(ARMCPU *cpu, | ||
65 | const struct arm_boot_info *info) | ||
66 | { | ||
67 | uint32_t fixupcontext[FIXUP_MAX]; | ||
68 | + AddressSpace *as = arm_boot_address_space(cpu, info); | ||
69 | |||
70 | fixupcontext[FIXUP_GIC_CPU_IF] = info->gic_cpu_if_addr; | ||
71 | fixupcontext[FIXUP_BOOTREG] = info->smp_bootreg_addr; | ||
72 | @@ -XXX,XX +XXX,XX @@ static void default_write_secondary(ARMCPU *cpu, | ||
73 | } | ||
74 | |||
75 | write_bootloader("smpboot", info->smp_loader_start, | ||
76 | - smpboot, fixupcontext); | ||
77 | + smpboot, fixupcontext, as); | ||
78 | } | ||
79 | |||
80 | void arm_write_secure_board_setup_dummy_smc(ARMCPU *cpu, | ||
81 | const struct arm_boot_info *info, | ||
82 | hwaddr mvbar_addr) | ||
83 | { | ||
84 | + AddressSpace *as = arm_boot_address_space(cpu, info); | ||
85 | int n; | ||
86 | uint32_t mvbar_blob[] = { | ||
87 | /* mvbar_addr: secure monitor vectors | ||
88 | @@ -XXX,XX +XXX,XX @@ void arm_write_secure_board_setup_dummy_smc(ARMCPU *cpu, | ||
89 | for (n = 0; n < ARRAY_SIZE(mvbar_blob); n++) { | ||
90 | mvbar_blob[n] = tswap32(mvbar_blob[n]); | ||
91 | } | ||
92 | - rom_add_blob_fixed("board-setup-mvbar", mvbar_blob, sizeof(mvbar_blob), | ||
93 | - mvbar_addr); | ||
94 | + rom_add_blob_fixed_as("board-setup-mvbar", mvbar_blob, sizeof(mvbar_blob), | ||
95 | + mvbar_addr, as); | ||
96 | |||
97 | for (n = 0; n < ARRAY_SIZE(board_setup_blob); n++) { | ||
98 | board_setup_blob[n] = tswap32(board_setup_blob[n]); | ||
99 | } | ||
100 | - rom_add_blob_fixed("board-setup", board_setup_blob, | ||
101 | - sizeof(board_setup_blob), info->board_setup_addr); | ||
102 | + rom_add_blob_fixed_as("board-setup", board_setup_blob, | ||
103 | + sizeof(board_setup_blob), info->board_setup_addr, as); | ||
104 | } | ||
105 | |||
106 | static void default_reset_secondary(ARMCPU *cpu, | ||
107 | const struct arm_boot_info *info) | ||
108 | { | ||
109 | + AddressSpace *as = arm_boot_address_space(cpu, info); | ||
110 | CPUState *cs = CPU(cpu); | ||
111 | |||
112 | - address_space_stl_notdirty(&address_space_memory, info->smp_bootreg_addr, | ||
113 | + address_space_stl_notdirty(as, info->smp_bootreg_addr, | ||
114 | 0, MEMTXATTRS_UNSPECIFIED, NULL); | ||
115 | cpu_set_pc(cs, info->smp_loader_start); | ||
116 | } | ||
117 | @@ -XXX,XX +XXX,XX @@ static inline bool have_dtb(const struct arm_boot_info *info) | ||
118 | } | ||
119 | |||
120 | #define WRITE_WORD(p, value) do { \ | ||
121 | - address_space_stl_notdirty(&address_space_memory, p, value, \ | ||
122 | + address_space_stl_notdirty(as, p, value, \ | ||
123 | MEMTXATTRS_UNSPECIFIED, NULL); \ | ||
124 | p += 4; \ | ||
125 | } while (0) | ||
126 | |||
127 | -static void set_kernel_args(const struct arm_boot_info *info) | ||
128 | +static void set_kernel_args(const struct arm_boot_info *info, AddressSpace *as) | ||
129 | { | ||
130 | int initrd_size = info->initrd_size; | ||
131 | hwaddr base = info->loader_start; | ||
132 | @@ -XXX,XX +XXX,XX @@ static void set_kernel_args(const struct arm_boot_info *info) | ||
133 | int cmdline_size; | ||
134 | |||
135 | cmdline_size = strlen(info->kernel_cmdline); | ||
136 | - cpu_physical_memory_write(p + 8, info->kernel_cmdline, | ||
137 | - cmdline_size + 1); | ||
138 | + address_space_write(as, p + 8, MEMTXATTRS_UNSPECIFIED, | ||
139 | + (const uint8_t *)info->kernel_cmdline, | ||
140 | + cmdline_size + 1); | ||
141 | cmdline_size = (cmdline_size >> 2) + 1; | ||
142 | WRITE_WORD(p, cmdline_size + 2); | ||
143 | WRITE_WORD(p, 0x54410009); | ||
144 | @@ -XXX,XX +XXX,XX @@ static void set_kernel_args(const struct arm_boot_info *info) | ||
145 | atag_board_len = (info->atag_board(info, atag_board_buf) + 3) & ~3; | ||
146 | WRITE_WORD(p, (atag_board_len + 8) >> 2); | ||
147 | WRITE_WORD(p, 0x414f4d50); | ||
148 | - cpu_physical_memory_write(p, atag_board_buf, atag_board_len); | ||
149 | + address_space_write(as, p, MEMTXATTRS_UNSPECIFIED, | ||
150 | + atag_board_buf, atag_board_len); | ||
151 | p += atag_board_len; | ||
152 | } | ||
153 | /* ATAG_END */ | ||
154 | @@ -XXX,XX +XXX,XX @@ static void set_kernel_args(const struct arm_boot_info *info) | ||
155 | WRITE_WORD(p, 0); | ||
156 | } | ||
157 | |||
158 | -static void set_kernel_args_old(const struct arm_boot_info *info) | ||
159 | +static void set_kernel_args_old(const struct arm_boot_info *info, | ||
160 | + AddressSpace *as) | ||
161 | { | ||
162 | hwaddr p; | ||
163 | const char *s; | ||
164 | @@ -XXX,XX +XXX,XX @@ static void set_kernel_args_old(const struct arm_boot_info *info) | ||
165 | } | ||
166 | s = info->kernel_cmdline; | ||
167 | if (s) { | ||
168 | - cpu_physical_memory_write(p, s, strlen(s) + 1); | ||
169 | + address_space_write(as, p, MEMTXATTRS_UNSPECIFIED, | ||
170 | + (const uint8_t *)s, strlen(s) + 1); | ||
171 | } else { | ||
172 | WRITE_WORD(p, 0); | ||
173 | } | ||
174 | @@ -XXX,XX +XXX,XX @@ static void fdt_add_psci_node(void *fdt) | ||
175 | * @addr: the address to load the image at | ||
176 | * @binfo: struct describing the boot environment | ||
177 | * @addr_limit: upper limit of the available memory area at @addr | ||
178 | + * @as: address space to load image to | ||
179 | * | ||
180 | * Load a device tree supplied by the machine or by the user with the | ||
181 | * '-dtb' command line option, and put it at offset @addr in target | ||
182 | @@ -XXX,XX +XXX,XX @@ static void fdt_add_psci_node(void *fdt) | ||
183 | * Note: Must not be called unless have_dtb(binfo) is true. | ||
184 | */ | ||
185 | static int load_dtb(hwaddr addr, const struct arm_boot_info *binfo, | ||
186 | - hwaddr addr_limit) | ||
187 | + hwaddr addr_limit, AddressSpace *as) | ||
188 | { | ||
189 | void *fdt = NULL; | ||
190 | int size, rc; | ||
191 | @@ -XXX,XX +XXX,XX @@ static int load_dtb(hwaddr addr, const struct arm_boot_info *binfo, | ||
192 | /* Put the DTB into the memory map as a ROM image: this will ensure | ||
193 | * the DTB is copied again upon reset, even if addr points into RAM. | ||
194 | */ | ||
195 | - rom_add_blob_fixed("dtb", fdt, size, addr); | ||
196 | + rom_add_blob_fixed_as("dtb", fdt, size, addr, as); | ||
197 | |||
198 | g_free(fdt); | ||
199 | |||
200 | @@ -XXX,XX +XXX,XX @@ static void do_cpu_reset(void *opaque) | ||
201 | } | ||
202 | |||
203 | if (cs == first_cpu) { | ||
204 | + AddressSpace *as = arm_boot_address_space(cpu, info); | ||
205 | + | ||
206 | cpu_set_pc(cs, info->loader_start); | ||
207 | |||
208 | if (!have_dtb(info)) { | ||
209 | if (old_param) { | ||
210 | - set_kernel_args_old(info); | ||
211 | + set_kernel_args_old(info, as); | ||
212 | } else { | ||
213 | - set_kernel_args(info); | ||
214 | + set_kernel_args(info, as); | ||
215 | } | ||
216 | } | ||
217 | } else { | ||
218 | @@ -XXX,XX +XXX,XX @@ static int do_arm_linux_init(Object *obj, void *opaque) | ||
219 | |||
220 | static uint64_t arm_load_elf(struct arm_boot_info *info, uint64_t *pentry, | ||
221 | uint64_t *lowaddr, uint64_t *highaddr, | ||
222 | - int elf_machine) | ||
223 | + int elf_machine, AddressSpace *as) | ||
224 | { | ||
225 | bool elf_is64; | ||
226 | union { | ||
227 | @@ -XXX,XX +XXX,XX @@ static uint64_t arm_load_elf(struct arm_boot_info *info, uint64_t *pentry, | ||
228 | } | 51 | } |
229 | } | 52 | } |
230 | 53 | ||
231 | - ret = load_elf(info->kernel_filename, NULL, NULL, | 54 | + hcr_el2 = arm_hcr_el2_eff(env); |
232 | - pentry, lowaddr, highaddr, big_endian, elf_machine, | 55 | + |
233 | - 1, data_swab); | 56 | if (mmu_idx == ARMMMUIdx_Stage2) { |
234 | + ret = load_elf_as(info->kernel_filename, NULL, NULL, | 57 | /* HCR.DC means HCR.VM behaves as 1 */ |
235 | + pentry, lowaddr, highaddr, big_endian, elf_machine, | 58 | - return (env->cp15.hcr_el2 & (HCR_DC | HCR_VM)) == 0; |
236 | + 1, data_swab, as); | 59 | + return (hcr_el2 & (HCR_DC | HCR_VM)) == 0; |
237 | if (ret <= 0) { | ||
238 | /* The header loaded but the image didn't */ | ||
239 | exit(1); | ||
240 | @@ -XXX,XX +XXX,XX @@ static uint64_t arm_load_elf(struct arm_boot_info *info, uint64_t *pentry, | ||
241 | } | ||
242 | |||
243 | static uint64_t load_aarch64_image(const char *filename, hwaddr mem_base, | ||
244 | - hwaddr *entry) | ||
245 | + hwaddr *entry, AddressSpace *as) | ||
246 | { | ||
247 | hwaddr kernel_load_offset = KERNEL64_LOAD_ADDR; | ||
248 | uint8_t *buffer; | ||
249 | @@ -XXX,XX +XXX,XX @@ static uint64_t load_aarch64_image(const char *filename, hwaddr mem_base, | ||
250 | } | 60 | } |
251 | 61 | ||
252 | *entry = mem_base + kernel_load_offset; | 62 | - if (env->cp15.hcr_el2 & HCR_TGE) { |
253 | - rom_add_blob_fixed(filename, buffer, size, *entry); | 63 | + if (hcr_el2 & HCR_TGE) { |
254 | + rom_add_blob_fixed_as(filename, buffer, size, *entry, as); | 64 | /* TGE means that NS EL0/1 act as if SCTLR_EL1.M is zero */ |
255 | 65 | if (!regime_is_secure(env, mmu_idx) && regime_el(env, mmu_idx) == 1) { | |
256 | g_free(buffer); | 66 | return true; |
257 | |||
258 | @@ -XXX,XX +XXX,XX @@ static void arm_load_kernel_notify(Notifier *notifier, void *data) | ||
259 | ARMCPU *cpu = n->cpu; | ||
260 | struct arm_boot_info *info = | ||
261 | container_of(n, struct arm_boot_info, load_kernel_notifier); | ||
262 | + AddressSpace *as = arm_boot_address_space(cpu, info); | ||
263 | |||
264 | /* The board code is not supposed to set secure_board_setup unless | ||
265 | * running its code in secure mode is actually possible, and KVM | ||
266 | @@ -XXX,XX +XXX,XX @@ static void arm_load_kernel_notify(Notifier *notifier, void *data) | ||
267 | * the kernel is supposed to be loaded by the bootloader), copy the | ||
268 | * DTB to the base of RAM for the bootloader to pick up. | ||
269 | */ | ||
270 | - if (load_dtb(info->loader_start, info, 0) < 0) { | ||
271 | + if (load_dtb(info->loader_start, info, 0, as) < 0) { | ||
272 | exit(1); | ||
273 | } | ||
274 | } | ||
275 | @@ -XXX,XX +XXX,XX @@ static void arm_load_kernel_notify(Notifier *notifier, void *data) | ||
276 | |||
277 | /* Assume that raw images are linux kernels, and ELF images are not. */ | ||
278 | kernel_size = arm_load_elf(info, &elf_entry, &elf_low_addr, | ||
279 | - &elf_high_addr, elf_machine); | ||
280 | + &elf_high_addr, elf_machine, as); | ||
281 | if (kernel_size > 0 && have_dtb(info)) { | ||
282 | /* If there is still some room left at the base of RAM, try and put | ||
283 | * the DTB there like we do for images loaded with -bios or -pflash. | ||
284 | @@ -XXX,XX +XXX,XX @@ static void arm_load_kernel_notify(Notifier *notifier, void *data) | ||
285 | if (elf_low_addr < info->loader_start) { | ||
286 | elf_low_addr = 0; | ||
287 | } | ||
288 | - if (load_dtb(info->loader_start, info, elf_low_addr) < 0) { | ||
289 | + if (load_dtb(info->loader_start, info, elf_low_addr, as) < 0) { | ||
290 | exit(1); | ||
291 | } | ||
292 | } | 67 | } |
293 | } | 68 | } |
294 | entry = elf_entry; | 69 | |
295 | if (kernel_size < 0) { | 70 | - if ((env->cp15.hcr_el2 & HCR_DC) && arm_mmu_idx_is_stage1_of_2(mmu_idx)) { |
296 | - kernel_size = load_uimage(info->kernel_filename, &entry, NULL, | 71 | + if ((hcr_el2 & HCR_DC) && arm_mmu_idx_is_stage1_of_2(mmu_idx)) { |
297 | - &is_linux, NULL, NULL); | 72 | /* HCR.DC means SCTLR_EL1.M behaves as 0 */ |
298 | + kernel_size = load_uimage_as(info->kernel_filename, &entry, NULL, | 73 | return true; |
299 | + &is_linux, NULL, NULL, as); | ||
300 | } | 74 | } |
301 | if (arm_feature(&cpu->env, ARM_FEATURE_AARCH64) && kernel_size < 0) { | 75 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, |
302 | kernel_size = load_aarch64_image(info->kernel_filename, | 76 | fi->s1ptw = true; |
303 | - info->loader_start, &entry); | 77 | return ~0; |
304 | + info->loader_start, &entry, as); | 78 | } |
305 | is_linux = 1; | 79 | - if ((env->cp15.hcr_el2 & HCR_PTW) && (cacheattrs.attrs & 0xf0) == 0) { |
306 | } else if (kernel_size < 0) { | 80 | + if ((arm_hcr_el2_eff(env) & HCR_PTW) && |
307 | /* 32-bit ARM */ | 81 | + (cacheattrs.attrs & 0xf0) == 0) { |
308 | entry = info->loader_start + KERNEL_LOAD_ADDR; | 82 | /* |
309 | - kernel_size = load_image_targphys(info->kernel_filename, entry, | 83 | * PTW set and S1 walk touched S2 Device memory: |
310 | - info->ram_size - KERNEL_LOAD_ADDR); | 84 | * generate Permission fault. |
311 | + kernel_size = load_image_targphys_as(info->kernel_filename, entry, | 85 | @@ -XXX,XX +XXX,XX @@ static uint8_t convert_stage2_attrs(CPUARMState *env, uint8_t s2attrs) |
312 | + info->ram_size - KERNEL_LOAD_ADDR, | 86 | uint8_t hihint = 0, lohint = 0; |
313 | + as); | 87 | |
314 | is_linux = 1; | 88 | if (hiattr != 0) { /* normal memory */ |
315 | } | 89 | - if ((env->cp15.hcr_el2 & HCR_CD) != 0) { /* cache disabled */ |
316 | if (kernel_size < 0) { | 90 | + if (arm_hcr_el2_eff(env) & HCR_CD) { /* cache disabled */ |
317 | @@ -XXX,XX +XXX,XX @@ static void arm_load_kernel_notify(Notifier *notifier, void *data) | 91 | hiattr = loattr = 1; /* non-cacheable */ |
318 | uint32_t fixupcontext[FIXUP_MAX]; | 92 | } else { |
319 | 93 | if (hiattr != 1) { /* Write-through or write-back */ | |
320 | if (info->initrd_filename) { | 94 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, |
321 | - initrd_size = load_ramdisk(info->initrd_filename, | ||
322 | - info->initrd_start, | ||
323 | - info->ram_size - | ||
324 | - info->initrd_start); | ||
325 | + initrd_size = load_ramdisk_as(info->initrd_filename, | ||
326 | + info->initrd_start, | ||
327 | + info->ram_size - info->initrd_start, | ||
328 | + as); | ||
329 | if (initrd_size < 0) { | ||
330 | - initrd_size = load_image_targphys(info->initrd_filename, | ||
331 | - info->initrd_start, | ||
332 | - info->ram_size - | ||
333 | - info->initrd_start); | ||
334 | + initrd_size = load_image_targphys_as(info->initrd_filename, | ||
335 | + info->initrd_start, | ||
336 | + info->ram_size - | ||
337 | + info->initrd_start, | ||
338 | + as); | ||
339 | } | 95 | } |
340 | if (initrd_size < 0) { | 96 | |
341 | error_report("could not load initrd '%s'", | 97 | /* Combine the S1 and S2 cache attributes. */ |
342 | @@ -XXX,XX +XXX,XX @@ static void arm_load_kernel_notify(Notifier *notifier, void *data) | 98 | - if (env->cp15.hcr_el2 & HCR_DC) { |
343 | 99 | + if (arm_hcr_el2_eff(env) & HCR_DC) { | |
344 | /* Place the DTB after the initrd in memory with alignment. */ | 100 | /* |
345 | dtb_start = QEMU_ALIGN_UP(info->initrd_start + initrd_size, align); | 101 | * HCR.DC forces the first stage attributes to |
346 | - if (load_dtb(dtb_start, info, 0) < 0) { | 102 | * Normal Non-Shareable, |
347 | + if (load_dtb(dtb_start, info, 0, as) < 0) { | ||
348 | exit(1); | ||
349 | } | ||
350 | fixupcontext[FIXUP_ARGPTR] = dtb_start; | ||
351 | @@ -XXX,XX +XXX,XX @@ static void arm_load_kernel_notify(Notifier *notifier, void *data) | ||
352 | fixupcontext[FIXUP_ENTRYPOINT] = entry; | ||
353 | |||
354 | write_bootloader("bootloader", info->loader_start, | ||
355 | - primary_loader, fixupcontext); | ||
356 | + primary_loader, fixupcontext, as); | ||
357 | |||
358 | if (info->nb_cpus > 1) { | ||
359 | info->write_secondary_boot(cpu, info); | ||
360 | -- | 103 | -- |
361 | 2.16.2 | 104 | 2.20.1 |
362 | 105 | ||
363 | 106 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
---|---|---|---|
2 | 2 | ||
3 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | 3 | This adds a common helper to compute the effective value of MDCR_EL2. |
4 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 4 | That is the actual value if EL2 is enabled in the current security |
5 | Message-id: 20180228193125.20577-5-richard.henderson@linaro.org | 5 | context, or 0 elsewise. |
6 | |||
7 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Message-id: 20210112104511.36576-5-remi.denis.courmont@huawei.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | --- | 11 | --- |
8 | target/arm/Makefile.objs | 2 +- | 12 | target/arm/helper.c | 38 ++++++++++++++++++++++---------------- |
9 | target/arm/helper.h | 4 ++ | 13 | 1 file changed, 22 insertions(+), 16 deletions(-) |
10 | target/arm/translate-a64.c | 84 ++++++++++++++++++++++++++++++++++ | ||
11 | target/arm/vec_helper.c | 109 +++++++++++++++++++++++++++++++++++++++++++++ | ||
12 | 4 files changed, 198 insertions(+), 1 deletion(-) | ||
13 | create mode 100644 target/arm/vec_helper.c | ||
14 | 14 | ||
15 | diff --git a/target/arm/Makefile.objs b/target/arm/Makefile.objs | 15 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
16 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/target/arm/Makefile.objs | 17 | --- a/target/arm/helper.c |
18 | +++ b/target/arm/Makefile.objs | 18 | +++ b/target/arm/helper.c |
19 | @@ -XXX,XX +XXX,XX @@ obj-$(call land,$(CONFIG_KVM),$(call lnot,$(TARGET_AARCH64))) += kvm32.o | 19 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_trap_aa32s_el1(CPUARMState *env, |
20 | obj-$(call land,$(CONFIG_KVM),$(TARGET_AARCH64)) += kvm64.o | 20 | return CP_ACCESS_TRAP_UNCATEGORIZED; |
21 | obj-$(call lnot,$(CONFIG_KVM)) += kvm-stub.o | ||
22 | obj-y += translate.o op_helper.o helper.o cpu.o | ||
23 | -obj-y += neon_helper.o iwmmxt_helper.o | ||
24 | +obj-y += neon_helper.o iwmmxt_helper.o vec_helper.o | ||
25 | obj-y += gdbstub.o | ||
26 | obj-$(TARGET_AARCH64) += cpu64.o translate-a64.o helper-a64.o gdbstub64.o | ||
27 | obj-y += crypto_helper.o | ||
28 | diff --git a/target/arm/helper.h b/target/arm/helper.h | ||
29 | index XXXXXXX..XXXXXXX 100644 | ||
30 | --- a/target/arm/helper.h | ||
31 | +++ b/target/arm/helper.h | ||
32 | @@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_1(neon_rbit_u8, TCG_CALL_NO_RWG_SE, i32, i32) | ||
33 | |||
34 | DEF_HELPER_3(neon_qdmulh_s16, i32, env, i32, i32) | ||
35 | DEF_HELPER_3(neon_qrdmulh_s16, i32, env, i32, i32) | ||
36 | +DEF_HELPER_4(neon_qrdmlah_s16, i32, env, i32, i32, i32) | ||
37 | +DEF_HELPER_4(neon_qrdmlsh_s16, i32, env, i32, i32, i32) | ||
38 | DEF_HELPER_3(neon_qdmulh_s32, i32, env, i32, i32) | ||
39 | DEF_HELPER_3(neon_qrdmulh_s32, i32, env, i32, i32) | ||
40 | +DEF_HELPER_4(neon_qrdmlah_s32, i32, env, s32, s32, s32) | ||
41 | +DEF_HELPER_4(neon_qrdmlsh_s32, i32, env, s32, s32, s32) | ||
42 | |||
43 | DEF_HELPER_1(neon_narrow_u8, i32, i64) | ||
44 | DEF_HELPER_1(neon_narrow_u16, i32, i64) | ||
45 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c | ||
46 | index XXXXXXX..XXXXXXX 100644 | ||
47 | --- a/target/arm/translate-a64.c | ||
48 | +++ b/target/arm/translate-a64.c | ||
49 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_scalar_three_reg_same_fp16(DisasContext *s, | ||
50 | tcg_temp_free_ptr(fpst); | ||
51 | } | 21 | } |
52 | 22 | ||
53 | +/* AdvSIMD scalar three same extra | 23 | +static uint64_t arm_mdcr_el2_eff(CPUARMState *env) |
54 | + * 31 30 29 28 24 23 22 21 20 16 15 14 11 10 9 5 4 0 | ||
55 | + * +-----+---+-----------+------+---+------+---+--------+---+----+----+ | ||
56 | + * | 0 1 | U | 1 1 1 1 0 | size | 0 | Rm | 1 | opcode | 1 | Rn | Rd | | ||
57 | + * +-----+---+-----------+------+---+------+---+--------+---+----+----+ | ||
58 | + */ | ||
59 | +static void disas_simd_scalar_three_reg_same_extra(DisasContext *s, | ||
60 | + uint32_t insn) | ||
61 | +{ | 24 | +{ |
62 | + int rd = extract32(insn, 0, 5); | 25 | + return arm_is_el2_enabled(env) ? env->cp15.mdcr_el2 : 0; |
63 | + int rn = extract32(insn, 5, 5); | ||
64 | + int opcode = extract32(insn, 11, 4); | ||
65 | + int rm = extract32(insn, 16, 5); | ||
66 | + int size = extract32(insn, 22, 2); | ||
67 | + bool u = extract32(insn, 29, 1); | ||
68 | + TCGv_i32 ele1, ele2, ele3; | ||
69 | + TCGv_i64 res; | ||
70 | + int feature; | ||
71 | + | ||
72 | + switch (u * 16 + opcode) { | ||
73 | + case 0x10: /* SQRDMLAH (vector) */ | ||
74 | + case 0x11: /* SQRDMLSH (vector) */ | ||
75 | + if (size != 1 && size != 2) { | ||
76 | + unallocated_encoding(s); | ||
77 | + return; | ||
78 | + } | ||
79 | + feature = ARM_FEATURE_V8_RDM; | ||
80 | + break; | ||
81 | + default: | ||
82 | + unallocated_encoding(s); | ||
83 | + return; | ||
84 | + } | ||
85 | + if (!arm_dc_feature(s, feature)) { | ||
86 | + unallocated_encoding(s); | ||
87 | + return; | ||
88 | + } | ||
89 | + if (!fp_access_check(s)) { | ||
90 | + return; | ||
91 | + } | ||
92 | + | ||
93 | + /* Do a single operation on the lowest element in the vector. | ||
94 | + * We use the standard Neon helpers and rely on 0 OP 0 == 0 | ||
95 | + * with no side effects for all these operations. | ||
96 | + * OPTME: special-purpose helpers would avoid doing some | ||
97 | + * unnecessary work in the helper for the 16 bit cases. | ||
98 | + */ | ||
99 | + ele1 = tcg_temp_new_i32(); | ||
100 | + ele2 = tcg_temp_new_i32(); | ||
101 | + ele3 = tcg_temp_new_i32(); | ||
102 | + | ||
103 | + read_vec_element_i32(s, ele1, rn, 0, size); | ||
104 | + read_vec_element_i32(s, ele2, rm, 0, size); | ||
105 | + read_vec_element_i32(s, ele3, rd, 0, size); | ||
106 | + | ||
107 | + switch (opcode) { | ||
108 | + case 0x0: /* SQRDMLAH */ | ||
109 | + if (size == 1) { | ||
110 | + gen_helper_neon_qrdmlah_s16(ele3, cpu_env, ele1, ele2, ele3); | ||
111 | + } else { | ||
112 | + gen_helper_neon_qrdmlah_s32(ele3, cpu_env, ele1, ele2, ele3); | ||
113 | + } | ||
114 | + break; | ||
115 | + case 0x1: /* SQRDMLSH */ | ||
116 | + if (size == 1) { | ||
117 | + gen_helper_neon_qrdmlsh_s16(ele3, cpu_env, ele1, ele2, ele3); | ||
118 | + } else { | ||
119 | + gen_helper_neon_qrdmlsh_s32(ele3, cpu_env, ele1, ele2, ele3); | ||
120 | + } | ||
121 | + break; | ||
122 | + default: | ||
123 | + g_assert_not_reached(); | ||
124 | + } | ||
125 | + tcg_temp_free_i32(ele1); | ||
126 | + tcg_temp_free_i32(ele2); | ||
127 | + | ||
128 | + res = tcg_temp_new_i64(); | ||
129 | + tcg_gen_extu_i32_i64(res, ele3); | ||
130 | + tcg_temp_free_i32(ele3); | ||
131 | + | ||
132 | + write_fp_dreg(s, rd, res); | ||
133 | + tcg_temp_free_i64(res); | ||
134 | +} | 26 | +} |
135 | + | 27 | + |
136 | static void handle_2misc_64(DisasContext *s, int opcode, bool u, | 28 | /* Check for traps to "powerdown debug" registers, which are controlled |
137 | TCGv_i64 tcg_rd, TCGv_i64 tcg_rn, | 29 | * by MDCR.TDOSA |
138 | TCGv_i32 tcg_rmode, TCGv_ptr tcg_fpstatus) | 30 | */ |
139 | @@ -XXX,XX +XXX,XX @@ static const AArch64DecodeTable data_proc_simd[] = { | 31 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tdosa(CPUARMState *env, const ARMCPRegInfo *ri, |
140 | { 0x0e000800, 0xbf208c00, disas_simd_zip_trn }, | 32 | bool isread) |
141 | { 0x2e000000, 0xbf208400, disas_simd_ext }, | 33 | { |
142 | { 0x5e200400, 0xdf200400, disas_simd_scalar_three_reg_same }, | 34 | int el = arm_current_el(env); |
143 | + { 0x5e008400, 0xdf208400, disas_simd_scalar_three_reg_same_extra }, | 35 | - bool mdcr_el2_tdosa = (env->cp15.mdcr_el2 & MDCR_TDOSA) || |
144 | { 0x5e200000, 0xdf200c00, disas_simd_scalar_three_reg_diff }, | 36 | - (env->cp15.mdcr_el2 & MDCR_TDE) || |
145 | { 0x5e200800, 0xdf3e0c00, disas_simd_scalar_two_reg_misc }, | 37 | + uint64_t mdcr_el2 = arm_mdcr_el2_eff(env); |
146 | { 0x5e300800, 0xdf3e0c00, disas_simd_scalar_pairwise }, | 38 | + bool mdcr_el2_tdosa = (mdcr_el2 & MDCR_TDOSA) || (mdcr_el2 & MDCR_TDE) || |
147 | diff --git a/target/arm/vec_helper.c b/target/arm/vec_helper.c | 39 | (arm_hcr_el2_eff(env) & HCR_TGE); |
148 | new file mode 100644 | 40 | |
149 | index XXXXXXX..XXXXXXX | 41 | - if (el < 2 && mdcr_el2_tdosa && !arm_is_secure_below_el3(env)) { |
150 | --- /dev/null | 42 | + if (el < 2 && mdcr_el2_tdosa) { |
151 | +++ b/target/arm/vec_helper.c | 43 | return CP_ACCESS_TRAP_EL2; |
152 | @@ -XXX,XX +XXX,XX @@ | 44 | } |
153 | +/* | 45 | if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TDOSA)) { |
154 | + * ARM AdvSIMD / SVE Vector Operations | 46 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tdra(CPUARMState *env, const ARMCPRegInfo *ri, |
155 | + * | 47 | bool isread) |
156 | + * Copyright (c) 2018 Linaro | 48 | { |
157 | + * | 49 | int el = arm_current_el(env); |
158 | + * This library is free software; you can redistribute it and/or | 50 | - bool mdcr_el2_tdra = (env->cp15.mdcr_el2 & MDCR_TDRA) || |
159 | + * modify it under the terms of the GNU Lesser General Public | 51 | - (env->cp15.mdcr_el2 & MDCR_TDE) || |
160 | + * License as published by the Free Software Foundation; either | 52 | + uint64_t mdcr_el2 = arm_mdcr_el2_eff(env); |
161 | + * version 2 of the License, or (at your option) any later version. | 53 | + bool mdcr_el2_tdra = (mdcr_el2 & MDCR_TDRA) || (mdcr_el2 & MDCR_TDE) || |
162 | + * | 54 | (arm_hcr_el2_eff(env) & HCR_TGE); |
163 | + * This library is distributed in the hope that it will be useful, | 55 | |
164 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of | 56 | - if (el < 2 && mdcr_el2_tdra && !arm_is_secure_below_el3(env)) { |
165 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | 57 | + if (el < 2 && mdcr_el2_tdra) { |
166 | + * Lesser General Public License for more details. | 58 | return CP_ACCESS_TRAP_EL2; |
167 | + * | 59 | } |
168 | + * You should have received a copy of the GNU Lesser General Public | 60 | if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TDA)) { |
169 | + * License along with this library; if not, see <http://www.gnu.org/licenses/>. | 61 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tda(CPUARMState *env, const ARMCPRegInfo *ri, |
170 | + */ | 62 | bool isread) |
171 | + | 63 | { |
172 | +#include "qemu/osdep.h" | 64 | int el = arm_current_el(env); |
173 | +#include "cpu.h" | 65 | - bool mdcr_el2_tda = (env->cp15.mdcr_el2 & MDCR_TDA) || |
174 | +#include "exec/exec-all.h" | 66 | - (env->cp15.mdcr_el2 & MDCR_TDE) || |
175 | +#include "exec/helper-proto.h" | 67 | + uint64_t mdcr_el2 = arm_mdcr_el2_eff(env); |
176 | +#include "tcg/tcg-gvec-desc.h" | 68 | + bool mdcr_el2_tda = (mdcr_el2 & MDCR_TDA) || (mdcr_el2 & MDCR_TDE) || |
177 | + | 69 | (arm_hcr_el2_eff(env) & HCR_TGE); |
178 | + | 70 | |
179 | +#define SET_QC() env->vfp.xregs[ARM_VFP_FPSCR] |= CPSR_Q | 71 | - if (el < 2 && mdcr_el2_tda && !arm_is_secure_below_el3(env)) { |
180 | + | 72 | + if (el < 2 && mdcr_el2_tda) { |
181 | +/* Signed saturating rounding doubling multiply-accumulate high half, 16-bit */ | 73 | return CP_ACCESS_TRAP_EL2; |
182 | +static uint16_t inl_qrdmlah_s16(CPUARMState *env, int16_t src1, | 74 | } |
183 | + int16_t src2, int16_t src3) | 75 | if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TDA)) { |
184 | +{ | 76 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tpm(CPUARMState *env, const ARMCPRegInfo *ri, |
185 | + /* Simplify: | 77 | bool isread) |
186 | + * = ((a3 << 16) + ((e1 * e2) << 1) + (1 << 15)) >> 16 | 78 | { |
187 | + * = ((a3 << 15) + (e1 * e2) + (1 << 14)) >> 15 | 79 | int el = arm_current_el(env); |
188 | + */ | 80 | + uint64_t mdcr_el2 = arm_mdcr_el2_eff(env); |
189 | + int32_t ret = (int32_t)src1 * src2; | 81 | |
190 | + ret = ((int32_t)src3 << 15) + ret + (1 << 14); | 82 | - if (el < 2 && (env->cp15.mdcr_el2 & MDCR_TPM) |
191 | + ret >>= 15; | 83 | - && !arm_is_secure_below_el3(env)) { |
192 | + if (ret != (int16_t)ret) { | 84 | + if (el < 2 && (mdcr_el2 & MDCR_TPM)) { |
193 | + SET_QC(); | 85 | return CP_ACCESS_TRAP_EL2; |
194 | + ret = (ret < 0 ? -0x8000 : 0x7fff); | 86 | } |
195 | + } | 87 | if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TPM)) { |
196 | + return ret; | 88 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult pmreg_access(CPUARMState *env, const ARMCPRegInfo *ri, |
197 | +} | 89 | * trapping to EL2 or EL3 for other accesses. |
198 | + | 90 | */ |
199 | +uint32_t HELPER(neon_qrdmlah_s16)(CPUARMState *env, uint32_t src1, | 91 | int el = arm_current_el(env); |
200 | + uint32_t src2, uint32_t src3) | 92 | + uint64_t mdcr_el2 = arm_mdcr_el2_eff(env); |
201 | +{ | 93 | |
202 | + uint16_t e1 = inl_qrdmlah_s16(env, src1, src2, src3); | 94 | if (el == 0 && !(env->cp15.c9_pmuserenr & 1)) { |
203 | + uint16_t e2 = inl_qrdmlah_s16(env, src1 >> 16, src2 >> 16, src3 >> 16); | 95 | return CP_ACCESS_TRAP; |
204 | + return deposit32(e1, 16, 16, e2); | 96 | } |
205 | +} | 97 | - if (el < 2 && (env->cp15.mdcr_el2 & MDCR_TPM) |
206 | + | 98 | - && !arm_is_secure_below_el3(env)) { |
207 | +/* Signed saturating rounding doubling multiply-subtract high half, 16-bit */ | 99 | + if (el < 2 && (mdcr_el2 & MDCR_TPM)) { |
208 | +static uint16_t inl_qrdmlsh_s16(CPUARMState *env, int16_t src1, | 100 | return CP_ACCESS_TRAP_EL2; |
209 | + int16_t src2, int16_t src3) | 101 | } |
210 | +{ | 102 | if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TPM)) { |
211 | + /* Similarly, using subtraction: | 103 | @@ -XXX,XX +XXX,XX @@ static bool pmu_counter_enabled(CPUARMState *env, uint8_t counter) |
212 | + * = ((a3 << 16) - ((e1 * e2) << 1) + (1 << 15)) >> 16 | 104 | bool enabled, prohibited, filtered; |
213 | + * = ((a3 << 15) - (e1 * e2) + (1 << 14)) >> 15 | 105 | bool secure = arm_is_secure(env); |
214 | + */ | 106 | int el = arm_current_el(env); |
215 | + int32_t ret = (int32_t)src1 * src2; | 107 | - uint8_t hpmn = env->cp15.mdcr_el2 & MDCR_HPMN; |
216 | + ret = ((int32_t)src3 << 15) - ret + (1 << 14); | 108 | + uint64_t mdcr_el2 = arm_mdcr_el2_eff(env); |
217 | + ret >>= 15; | 109 | + uint8_t hpmn = mdcr_el2 & MDCR_HPMN; |
218 | + if (ret != (int16_t)ret) { | 110 | |
219 | + SET_QC(); | 111 | if (!arm_feature(env, ARM_FEATURE_PMU)) { |
220 | + ret = (ret < 0 ? -0x8000 : 0x7fff); | 112 | return false; |
221 | + } | 113 | @@ -XXX,XX +XXX,XX @@ static bool pmu_counter_enabled(CPUARMState *env, uint8_t counter) |
222 | + return ret; | 114 | (counter < hpmn || counter == 31)) { |
223 | +} | 115 | e = env->cp15.c9_pmcr & PMCRE; |
224 | + | 116 | } else { |
225 | +uint32_t HELPER(neon_qrdmlsh_s16)(CPUARMState *env, uint32_t src1, | 117 | - e = env->cp15.mdcr_el2 & MDCR_HPME; |
226 | + uint32_t src2, uint32_t src3) | 118 | + e = mdcr_el2 & MDCR_HPME; |
227 | +{ | 119 | } |
228 | + uint16_t e1 = inl_qrdmlsh_s16(env, src1, src2, src3); | 120 | enabled = e && (env->cp15.c9_pmcnten & (1 << counter)); |
229 | + uint16_t e2 = inl_qrdmlsh_s16(env, src1 >> 16, src2 >> 16, src3 >> 16); | 121 | |
230 | + return deposit32(e1, 16, 16, e2); | 122 | if (!secure) { |
231 | +} | 123 | if (el == 2 && (counter < hpmn || counter == 31)) { |
232 | + | 124 | - prohibited = env->cp15.mdcr_el2 & MDCR_HPMD; |
233 | +/* Signed saturating rounding doubling multiply-accumulate high half, 32-bit */ | 125 | + prohibited = mdcr_el2 & MDCR_HPMD; |
234 | +uint32_t HELPER(neon_qrdmlah_s32)(CPUARMState *env, int32_t src1, | 126 | } else { |
235 | + int32_t src2, int32_t src3) | 127 | prohibited = false; |
236 | +{ | 128 | } |
237 | + /* Simplify similarly to int_qrdmlah_s16 above. */ | ||
238 | + int64_t ret = (int64_t)src1 * src2; | ||
239 | + ret = ((int64_t)src3 << 31) + ret + (1 << 30); | ||
240 | + ret >>= 31; | ||
241 | + if (ret != (int32_t)ret) { | ||
242 | + SET_QC(); | ||
243 | + ret = (ret < 0 ? INT32_MIN : INT32_MAX); | ||
244 | + } | ||
245 | + return ret; | ||
246 | +} | ||
247 | + | ||
248 | +/* Signed saturating rounding doubling multiply-subtract high half, 32-bit */ | ||
249 | +uint32_t HELPER(neon_qrdmlsh_s32)(CPUARMState *env, int32_t src1, | ||
250 | + int32_t src2, int32_t src3) | ||
251 | +{ | ||
252 | + /* Simplify similarly to int_qrdmlsh_s16 above. */ | ||
253 | + int64_t ret = (int64_t)src1 * src2; | ||
254 | + ret = ((int64_t)src3 << 31) - ret + (1 << 30); | ||
255 | + ret >>= 31; | ||
256 | + if (ret != (int32_t)ret) { | ||
257 | + SET_QC(); | ||
258 | + ret = (ret < 0 ? INT32_MIN : INT32_MAX); | ||
259 | + } | ||
260 | + return ret; | ||
261 | +} | ||
262 | -- | 129 | -- |
263 | 2.16.2 | 130 | 2.20.1 |
264 | 131 | ||
265 | 132 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
---|---|---|---|
2 | 2 | ||
3 | Not enabled anywhere yet. | 3 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
4 | 4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | |
5 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | 5 | Message-id: 20210112104511.36576-6-remi.denis.courmont@huawei.com |
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 6 | [PMM: tweaked commit message to match reduced scope of patch |
7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 7 | following rebase] |
8 | Message-id: 20180228193125.20577-2-richard.henderson@linaro.org | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | --- | 9 | --- |
11 | target/arm/cpu.h | 1 + | 10 | target/arm/cpu.h | 5 +++++ |
12 | linux-user/elfload.c | 1 + | 11 | 1 file changed, 5 insertions(+) |
13 | 2 files changed, 2 insertions(+) | ||
14 | 12 | ||
15 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 13 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
16 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/target/arm/cpu.h | 15 | --- a/target/arm/cpu.h |
18 | +++ b/target/arm/cpu.h | 16 | +++ b/target/arm/cpu.h |
19 | @@ -XXX,XX +XXX,XX @@ enum arm_features { | 17 | @@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_sve(const ARMISARegisters *id) |
20 | ARM_FEATURE_V8_SHA3, /* implements SHA3 part of v8 Crypto Extensions */ | 18 | return FIELD_EX64(id->id_aa64pfr0, ID_AA64PFR0, SVE) != 0; |
21 | ARM_FEATURE_V8_SM3, /* implements SM3 part of v8 Crypto Extensions */ | 19 | } |
22 | ARM_FEATURE_V8_SM4, /* implements SM4 part of v8 Crypto Extensions */ | 20 | |
23 | + ARM_FEATURE_V8_RDM, /* implements v8.1 simd round multiply */ | 21 | +static inline bool isar_feature_aa64_sel2(const ARMISARegisters *id) |
24 | ARM_FEATURE_V8_FP16, /* implements v8.2 half-precision float */ | 22 | +{ |
25 | }; | 23 | + return FIELD_EX64(id->id_aa64pfr0, ID_AA64PFR0, SEL2) != 0; |
26 | 24 | +} | |
27 | diff --git a/linux-user/elfload.c b/linux-user/elfload.c | 25 | + |
28 | index XXXXXXX..XXXXXXX 100644 | 26 | static inline bool isar_feature_aa64_vh(const ARMISARegisters *id) |
29 | --- a/linux-user/elfload.c | 27 | { |
30 | +++ b/linux-user/elfload.c | 28 | return FIELD_EX64(id->id_aa64mmfr1, ID_AA64MMFR1, VH) != 0; |
31 | @@ -XXX,XX +XXX,XX @@ static uint32_t get_elf_hwcap(void) | ||
32 | GET_FEATURE(ARM_FEATURE_V8_SHA512, ARM_HWCAP_A64_SHA512); | ||
33 | GET_FEATURE(ARM_FEATURE_V8_FP16, | ||
34 | ARM_HWCAP_A64_FPHP | ARM_HWCAP_A64_ASIMDHP); | ||
35 | + GET_FEATURE(ARM_FEATURE_V8_RDM, ARM_HWCAP_A64_ASIMDRDM); | ||
36 | #undef GET_FEATURE | ||
37 | |||
38 | return hwcaps; | ||
39 | -- | 29 | -- |
40 | 2.16.2 | 30 | 2.20.1 |
41 | 31 | ||
42 | 32 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
---|---|---|---|
2 | 2 | ||
3 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 3 | With the ARMv8.4-SEL2 extension, EL2 is a legal exception level in |
4 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 4 | secure mode, though it can only be AArch64. |
5 | Message-id: 20180228193125.20577-8-richard.henderson@linaro.org | 5 | |
6 | This patch adds the target EL for exceptions from 64-bit S-EL2. | ||
7 | |||
8 | It also fixes the target EL to EL2 when HCR.{A,F,I}MO are set in secure | ||
9 | mode. Those values were never used in practice as the effective value of | ||
10 | HCR was always 0 in secure mode. | ||
11 | |||
12 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
13 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
14 | Message-id: 20210112104511.36576-7-remi.denis.courmont@huawei.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 15 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | --- | 16 | --- |
8 | target/arm/translate.c | 86 +++++++++++++++++++++++++++++++++++++++----------- | 17 | target/arm/helper.c | 10 +++++----- |
9 | 1 file changed, 67 insertions(+), 19 deletions(-) | 18 | target/arm/op_helper.c | 4 ++-- |
19 | 2 files changed, 7 insertions(+), 7 deletions(-) | ||
10 | 20 | ||
11 | diff --git a/target/arm/translate.c b/target/arm/translate.c | 21 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
12 | index XXXXXXX..XXXXXXX 100644 | 22 | index XXXXXXX..XXXXXXX 100644 |
13 | --- a/target/arm/translate.c | 23 | --- a/target/arm/helper.c |
14 | +++ b/target/arm/translate.c | 24 | +++ b/target/arm/helper.c |
15 | @@ -XXX,XX +XXX,XX @@ | 25 | @@ -XXX,XX +XXX,XX @@ static const int8_t target_el_table[2][2][2][2][2][4] = { |
16 | #include "disas/disas.h" | 26 | {{/* 0 1 1 0 */{ 3, 3, 3, -1 },{ 3, -1, -1, 3 },}, |
17 | #include "exec/exec-all.h" | 27 | {/* 0 1 1 1 */{ 3, 3, 3, -1 },{ 3, -1, -1, 3 },},},},}, |
18 | #include "tcg-op.h" | 28 | {{{{/* 1 0 0 0 */{ 1, 1, 2, -1 },{ 1, 1, -1, 1 },}, |
19 | +#include "tcg-op-gvec.h" | 29 | - {/* 1 0 0 1 */{ 2, 2, 2, -1 },{ 1, 1, -1, 1 },},}, |
20 | #include "qemu/log.h" | 30 | - {{/* 1 0 1 0 */{ 1, 1, 1, -1 },{ 1, 1, -1, 1 },}, |
21 | #include "qemu/bitops.h" | 31 | - {/* 1 0 1 1 */{ 2, 2, 2, -1 },{ 1, 1, -1, 1 },},},}, |
22 | #include "arm_ldst.h" | 32 | + {/* 1 0 0 1 */{ 2, 2, 2, -1 },{ 2, 2, -1, 1 },},}, |
23 | @@ -XXX,XX +XXX,XX @@ static void gen_neon_narrow_op(int op, int u, int size, | 33 | + {{/* 1 0 1 0 */{ 1, 1, 1, -1 },{ 1, 1, 1, 1 },}, |
24 | #define NEON_3R_VPMAX 20 | 34 | + {/* 1 0 1 1 */{ 2, 2, 2, -1 },{ 2, 2, 2, 1 },},},}, |
25 | #define NEON_3R_VPMIN 21 | 35 | {{{/* 1 1 0 0 */{ 3, 3, 3, -1 },{ 3, 3, -1, 3 },}, |
26 | #define NEON_3R_VQDMULH_VQRDMULH 22 | 36 | {/* 1 1 0 1 */{ 3, 3, 3, -1 },{ 3, 3, -1, 3 },},}, |
27 | -#define NEON_3R_VPADD 23 | 37 | - {{/* 1 1 1 0 */{ 3, 3, 3, -1 },{ 3, 3, -1, 3 },}, |
28 | +#define NEON_3R_VPADD_VQRDMLAH 23 | 38 | - {/* 1 1 1 1 */{ 3, 3, 3, -1 },{ 3, 3, -1, 3 },},},},}, |
29 | #define NEON_3R_SHA 24 /* SHA1C,SHA1P,SHA1M,SHA1SU0,SHA256H{2},SHA256SU1 */ | 39 | + {{/* 1 1 1 0 */{ 3, 3, 3, -1 },{ 3, 3, 3, 3 },}, |
30 | -#define NEON_3R_VFM 25 /* VFMA, VFMS : float fused multiply-add */ | 40 | + {/* 1 1 1 1 */{ 3, 3, 3, -1 },{ 3, 3, 3, 3 },},},},}, |
31 | +#define NEON_3R_VFM_VQRDMLSH 25 /* VFMA, VFMS, VQRDMLSH */ | ||
32 | #define NEON_3R_FLOAT_ARITH 26 /* float VADD, VSUB, VPADD, VABD */ | ||
33 | #define NEON_3R_FLOAT_MULTIPLY 27 /* float VMLA, VMLS, VMUL */ | ||
34 | #define NEON_3R_FLOAT_CMP 28 /* float VCEQ, VCGE, VCGT */ | ||
35 | @@ -XXX,XX +XXX,XX @@ static const uint8_t neon_3r_sizes[] = { | ||
36 | [NEON_3R_VPMAX] = 0x7, | ||
37 | [NEON_3R_VPMIN] = 0x7, | ||
38 | [NEON_3R_VQDMULH_VQRDMULH] = 0x6, | ||
39 | - [NEON_3R_VPADD] = 0x7, | ||
40 | + [NEON_3R_VPADD_VQRDMLAH] = 0x7, | ||
41 | [NEON_3R_SHA] = 0xf, /* size field encodes op type */ | ||
42 | - [NEON_3R_VFM] = 0x5, /* size bit 1 encodes op */ | ||
43 | + [NEON_3R_VFM_VQRDMLSH] = 0x7, /* For VFM, size bit 1 encodes op */ | ||
44 | [NEON_3R_FLOAT_ARITH] = 0x5, /* size bit 1 encodes op */ | ||
45 | [NEON_3R_FLOAT_MULTIPLY] = 0x5, /* size bit 1 encodes op */ | ||
46 | [NEON_3R_FLOAT_CMP] = 0x5, /* size bit 1 encodes op */ | ||
47 | @@ -XXX,XX +XXX,XX @@ static const uint8_t neon_2rm_sizes[] = { | ||
48 | [NEON_2RM_VCVT_UF] = 0x4, | ||
49 | }; | 41 | }; |
50 | 42 | ||
51 | + | 43 | /* |
52 | +/* Expand v8.1 simd helper. */ | 44 | diff --git a/target/arm/op_helper.c b/target/arm/op_helper.c |
53 | +static int do_v81_helper(DisasContext *s, gen_helper_gvec_3_ptr *fn, | 45 | index XXXXXXX..XXXXXXX 100644 |
54 | + int q, int rd, int rn, int rm) | 46 | --- a/target/arm/op_helper.c |
55 | +{ | 47 | +++ b/target/arm/op_helper.c |
56 | + if (arm_dc_feature(s, ARM_FEATURE_V8_RDM)) { | 48 | @@ -XXX,XX +XXX,XX @@ void HELPER(access_check_cp_reg)(CPUARMState *env, void *rip, uint32_t syndrome, |
57 | + int opr_sz = (1 + q) * 8; | 49 | target_el = exception_target_el(env); |
58 | + tcg_gen_gvec_3_ptr(vfp_reg_offset(1, rd), | 50 | break; |
59 | + vfp_reg_offset(1, rn), | 51 | case CP_ACCESS_TRAP_EL2: |
60 | + vfp_reg_offset(1, rm), cpu_env, | 52 | - /* Requesting a trap to EL2 when we're in EL3 or S-EL0/1 is |
61 | + opr_sz, opr_sz, 0, fn); | 53 | + /* Requesting a trap to EL2 when we're in EL3 is |
62 | + return 0; | 54 | * a bug in the access function. |
63 | + } | 55 | */ |
64 | + return 1; | 56 | - assert(!arm_is_secure(env) && arm_current_el(env) != 3); |
65 | +} | 57 | + assert(arm_current_el(env) != 3); |
66 | + | 58 | target_el = 2; |
67 | /* Translate a NEON data processing instruction. Return nonzero if the | 59 | break; |
68 | instruction is invalid. | 60 | case CP_ACCESS_TRAP_EL3: |
69 | We process data in a mixture of 32-bit and 64-bit chunks. | ||
70 | @@ -XXX,XX +XXX,XX @@ static int disas_neon_data_insn(DisasContext *s, uint32_t insn) | ||
71 | if (q && ((rd | rn | rm) & 1)) { | ||
72 | return 1; | ||
73 | } | ||
74 | - /* | ||
75 | - * The SHA-1/SHA-256 3-register instructions require special treatment | ||
76 | - * here, as their size field is overloaded as an op type selector, and | ||
77 | - * they all consume their input in a single pass. | ||
78 | - */ | ||
79 | - if (op == NEON_3R_SHA) { | ||
80 | + switch (op) { | ||
81 | + case NEON_3R_SHA: | ||
82 | + /* The SHA-1/SHA-256 3-register instructions require special | ||
83 | + * treatment here, as their size field is overloaded as an | ||
84 | + * op type selector, and they all consume their input in a | ||
85 | + * single pass. | ||
86 | + */ | ||
87 | if (!q) { | ||
88 | return 1; | ||
89 | } | ||
90 | @@ -XXX,XX +XXX,XX @@ static int disas_neon_data_insn(DisasContext *s, uint32_t insn) | ||
91 | tcg_temp_free_ptr(ptr2); | ||
92 | tcg_temp_free_ptr(ptr3); | ||
93 | return 0; | ||
94 | + | ||
95 | + case NEON_3R_VPADD_VQRDMLAH: | ||
96 | + if (!u) { | ||
97 | + break; /* VPADD */ | ||
98 | + } | ||
99 | + /* VQRDMLAH */ | ||
100 | + switch (size) { | ||
101 | + case 1: | ||
102 | + return do_v81_helper(s, gen_helper_gvec_qrdmlah_s16, | ||
103 | + q, rd, rn, rm); | ||
104 | + case 2: | ||
105 | + return do_v81_helper(s, gen_helper_gvec_qrdmlah_s32, | ||
106 | + q, rd, rn, rm); | ||
107 | + } | ||
108 | + return 1; | ||
109 | + | ||
110 | + case NEON_3R_VFM_VQRDMLSH: | ||
111 | + if (!u) { | ||
112 | + /* VFM, VFMS */ | ||
113 | + if (size == 1) { | ||
114 | + return 1; | ||
115 | + } | ||
116 | + break; | ||
117 | + } | ||
118 | + /* VQRDMLSH */ | ||
119 | + switch (size) { | ||
120 | + case 1: | ||
121 | + return do_v81_helper(s, gen_helper_gvec_qrdmlsh_s16, | ||
122 | + q, rd, rn, rm); | ||
123 | + case 2: | ||
124 | + return do_v81_helper(s, gen_helper_gvec_qrdmlsh_s32, | ||
125 | + q, rd, rn, rm); | ||
126 | + } | ||
127 | + return 1; | ||
128 | } | ||
129 | if (size == 3 && op != NEON_3R_LOGIC) { | ||
130 | /* 64-bit element instructions. */ | ||
131 | @@ -XXX,XX +XXX,XX @@ static int disas_neon_data_insn(DisasContext *s, uint32_t insn) | ||
132 | rm = rtmp; | ||
133 | } | ||
134 | break; | ||
135 | - case NEON_3R_VPADD: | ||
136 | - if (u) { | ||
137 | - return 1; | ||
138 | - } | ||
139 | - /* Fall through */ | ||
140 | + case NEON_3R_VPADD_VQRDMLAH: | ||
141 | case NEON_3R_VPMAX: | ||
142 | case NEON_3R_VPMIN: | ||
143 | pairwise = 1; | ||
144 | @@ -XXX,XX +XXX,XX @@ static int disas_neon_data_insn(DisasContext *s, uint32_t insn) | ||
145 | return 1; | ||
146 | } | ||
147 | break; | ||
148 | - case NEON_3R_VFM: | ||
149 | - if (!arm_dc_feature(s, ARM_FEATURE_VFP4) || u) { | ||
150 | + case NEON_3R_VFM_VQRDMLSH: | ||
151 | + if (!arm_dc_feature(s, ARM_FEATURE_VFP4)) { | ||
152 | return 1; | ||
153 | } | ||
154 | break; | ||
155 | @@ -XXX,XX +XXX,XX @@ static int disas_neon_data_insn(DisasContext *s, uint32_t insn) | ||
156 | } | ||
157 | } | ||
158 | break; | ||
159 | - case NEON_3R_VPADD: | ||
160 | + case NEON_3R_VPADD_VQRDMLAH: | ||
161 | switch (size) { | ||
162 | case 0: gen_helper_neon_padd_u8(tmp, tmp, tmp2); break; | ||
163 | case 1: gen_helper_neon_padd_u16(tmp, tmp, tmp2); break; | ||
164 | @@ -XXX,XX +XXX,XX @@ static int disas_neon_data_insn(DisasContext *s, uint32_t insn) | ||
165 | } | ||
166 | } | ||
167 | break; | ||
168 | - case NEON_3R_VFM: | ||
169 | + case NEON_3R_VFM_VQRDMLSH: | ||
170 | { | ||
171 | /* VFMA, VFMS: fused multiply-add */ | ||
172 | TCGv_ptr fpstatus = get_fpstatus_ptr(1); | ||
173 | -- | 61 | -- |
174 | 2.16.2 | 62 | 2.20.1 |
175 | 63 | ||
176 | 64 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
---|---|---|---|
2 | 2 | ||
3 | Include the U bit in the switches rather than testing separately. | 3 | This adds the MMU indices for EL2 stage 1 in secure state. |
4 | 4 | ||
5 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 5 | To keep code contained, which is largelly identical between secure and |
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 6 | non-secure modes, the MMU indices are reassigned. The new assignments |
7 | Message-id: 20180228193125.20577-3-richard.henderson@linaro.org | 7 | provide a systematic pattern with a non-secure bit. |
8 | |||
9 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
10 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
11 | Message-id: 20210112104511.36576-8-remi.denis.courmont@huawei.com | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | --- | 13 | --- |
10 | target/arm/translate-a64.c | 129 +++++++++++++++++++++------------------------ | 14 | target/arm/cpu-param.h | 2 +- |
11 | 1 file changed, 61 insertions(+), 68 deletions(-) | 15 | target/arm/cpu.h | 35 ++++++---- |
12 | 16 | target/arm/internals.h | 12 ++++ | |
17 | target/arm/helper.c | 127 ++++++++++++++++++++++++------------- | ||
18 | target/arm/translate-a64.c | 4 ++ | ||
19 | 5 files changed, 123 insertions(+), 57 deletions(-) | ||
20 | |||
21 | diff --git a/target/arm/cpu-param.h b/target/arm/cpu-param.h | ||
22 | index XXXXXXX..XXXXXXX 100644 | ||
23 | --- a/target/arm/cpu-param.h | ||
24 | +++ b/target/arm/cpu-param.h | ||
25 | @@ -XXX,XX +XXX,XX @@ | ||
26 | # define TARGET_PAGE_BITS_MIN 10 | ||
27 | #endif | ||
28 | |||
29 | -#define NB_MMU_MODES 11 | ||
30 | +#define NB_MMU_MODES 15 | ||
31 | |||
32 | #endif | ||
33 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
34 | index XXXXXXX..XXXXXXX 100644 | ||
35 | --- a/target/arm/cpu.h | ||
36 | +++ b/target/arm/cpu.h | ||
37 | @@ -XXX,XX +XXX,XX @@ bool write_cpustate_to_list(ARMCPU *cpu, bool kvm_sync); | ||
38 | #define ARM_MMU_IDX_NOTLB 0x20 /* does not have a TLB */ | ||
39 | #define ARM_MMU_IDX_M 0x40 /* M profile */ | ||
40 | |||
41 | +/* Meanings of the bits for A profile mmu idx values */ | ||
42 | +#define ARM_MMU_IDX_A_NS 0x8 | ||
43 | + | ||
44 | /* Meanings of the bits for M profile mmu idx values */ | ||
45 | #define ARM_MMU_IDX_M_PRIV 0x1 | ||
46 | #define ARM_MMU_IDX_M_NEGPRI 0x2 | ||
47 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdx { | ||
48 | /* | ||
49 | * A-profile. | ||
50 | */ | ||
51 | - ARMMMUIdx_E10_0 = 0 | ARM_MMU_IDX_A, | ||
52 | - ARMMMUIdx_E20_0 = 1 | ARM_MMU_IDX_A, | ||
53 | + ARMMMUIdx_SE10_0 = 0 | ARM_MMU_IDX_A, | ||
54 | + ARMMMUIdx_SE20_0 = 1 | ARM_MMU_IDX_A, | ||
55 | + ARMMMUIdx_SE10_1 = 2 | ARM_MMU_IDX_A, | ||
56 | + ARMMMUIdx_SE20_2 = 3 | ARM_MMU_IDX_A, | ||
57 | + ARMMMUIdx_SE10_1_PAN = 4 | ARM_MMU_IDX_A, | ||
58 | + ARMMMUIdx_SE20_2_PAN = 5 | ARM_MMU_IDX_A, | ||
59 | + ARMMMUIdx_SE2 = 6 | ARM_MMU_IDX_A, | ||
60 | + ARMMMUIdx_SE3 = 7 | ARM_MMU_IDX_A, | ||
61 | |||
62 | - ARMMMUIdx_E10_1 = 2 | ARM_MMU_IDX_A, | ||
63 | - ARMMMUIdx_E10_1_PAN = 3 | ARM_MMU_IDX_A, | ||
64 | - | ||
65 | - ARMMMUIdx_E2 = 4 | ARM_MMU_IDX_A, | ||
66 | - ARMMMUIdx_E20_2 = 5 | ARM_MMU_IDX_A, | ||
67 | - ARMMMUIdx_E20_2_PAN = 6 | ARM_MMU_IDX_A, | ||
68 | - | ||
69 | - ARMMMUIdx_SE10_0 = 7 | ARM_MMU_IDX_A, | ||
70 | - ARMMMUIdx_SE10_1 = 8 | ARM_MMU_IDX_A, | ||
71 | - ARMMMUIdx_SE10_1_PAN = 9 | ARM_MMU_IDX_A, | ||
72 | - ARMMMUIdx_SE3 = 10 | ARM_MMU_IDX_A, | ||
73 | + ARMMMUIdx_E10_0 = ARMMMUIdx_SE10_0 | ARM_MMU_IDX_A_NS, | ||
74 | + ARMMMUIdx_E20_0 = ARMMMUIdx_SE20_0 | ARM_MMU_IDX_A_NS, | ||
75 | + ARMMMUIdx_E10_1 = ARMMMUIdx_SE10_1 | ARM_MMU_IDX_A_NS, | ||
76 | + ARMMMUIdx_E20_2 = ARMMMUIdx_SE20_2 | ARM_MMU_IDX_A_NS, | ||
77 | + ARMMMUIdx_E10_1_PAN = ARMMMUIdx_SE10_1_PAN | ARM_MMU_IDX_A_NS, | ||
78 | + ARMMMUIdx_E20_2_PAN = ARMMMUIdx_SE20_2_PAN | ARM_MMU_IDX_A_NS, | ||
79 | + ARMMMUIdx_E2 = ARMMMUIdx_SE2 | ARM_MMU_IDX_A_NS, | ||
80 | |||
81 | /* | ||
82 | * These are not allocated TLBs and are used only for AT system | ||
83 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdxBit { | ||
84 | TO_CORE_BIT(E20_2), | ||
85 | TO_CORE_BIT(E20_2_PAN), | ||
86 | TO_CORE_BIT(SE10_0), | ||
87 | + TO_CORE_BIT(SE20_0), | ||
88 | TO_CORE_BIT(SE10_1), | ||
89 | + TO_CORE_BIT(SE20_2), | ||
90 | TO_CORE_BIT(SE10_1_PAN), | ||
91 | + TO_CORE_BIT(SE20_2_PAN), | ||
92 | + TO_CORE_BIT(SE2), | ||
93 | TO_CORE_BIT(SE3), | ||
94 | |||
95 | TO_CORE_BIT(MUser), | ||
96 | diff --git a/target/arm/internals.h b/target/arm/internals.h | ||
97 | index XXXXXXX..XXXXXXX 100644 | ||
98 | --- a/target/arm/internals.h | ||
99 | +++ b/target/arm/internals.h | ||
100 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_has_2_ranges(ARMMMUIdx mmu_idx) | ||
101 | case ARMMMUIdx_SE10_0: | ||
102 | case ARMMMUIdx_SE10_1: | ||
103 | case ARMMMUIdx_SE10_1_PAN: | ||
104 | + case ARMMMUIdx_SE20_0: | ||
105 | + case ARMMMUIdx_SE20_2: | ||
106 | + case ARMMMUIdx_SE20_2_PAN: | ||
107 | return true; | ||
108 | default: | ||
109 | return false; | ||
110 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_secure(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
111 | case ARMMMUIdx_SE10_0: | ||
112 | case ARMMMUIdx_SE10_1: | ||
113 | case ARMMMUIdx_SE10_1_PAN: | ||
114 | + case ARMMMUIdx_SE20_0: | ||
115 | + case ARMMMUIdx_SE20_2: | ||
116 | + case ARMMMUIdx_SE20_2_PAN: | ||
117 | + case ARMMMUIdx_SE2: | ||
118 | case ARMMMUIdx_MSPrivNegPri: | ||
119 | case ARMMMUIdx_MSUserNegPri: | ||
120 | case ARMMMUIdx_MSPriv: | ||
121 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_pan(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
122 | case ARMMMUIdx_E10_1_PAN: | ||
123 | case ARMMMUIdx_E20_2_PAN: | ||
124 | case ARMMMUIdx_SE10_1_PAN: | ||
125 | + case ARMMMUIdx_SE20_2_PAN: | ||
126 | return true; | ||
127 | default: | ||
128 | return false; | ||
129 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_pan(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
130 | static inline uint32_t regime_el(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
131 | { | ||
132 | switch (mmu_idx) { | ||
133 | + case ARMMMUIdx_SE20_0: | ||
134 | + case ARMMMUIdx_SE20_2: | ||
135 | + case ARMMMUIdx_SE20_2_PAN: | ||
136 | case ARMMMUIdx_E20_0: | ||
137 | case ARMMMUIdx_E20_2: | ||
138 | case ARMMMUIdx_E20_2_PAN: | ||
139 | case ARMMMUIdx_Stage2: | ||
140 | + case ARMMMUIdx_SE2: | ||
141 | case ARMMMUIdx_E2: | ||
142 | return 2; | ||
143 | case ARMMMUIdx_SE3: | ||
144 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
145 | index XXXXXXX..XXXXXXX 100644 | ||
146 | --- a/target/arm/helper.c | ||
147 | +++ b/target/arm/helper.c | ||
148 | @@ -XXX,XX +XXX,XX @@ static int gt_phys_redir_timeridx(CPUARMState *env) | ||
149 | case ARMMMUIdx_E20_0: | ||
150 | case ARMMMUIdx_E20_2: | ||
151 | case ARMMMUIdx_E20_2_PAN: | ||
152 | + case ARMMMUIdx_SE20_0: | ||
153 | + case ARMMMUIdx_SE20_2: | ||
154 | + case ARMMMUIdx_SE20_2_PAN: | ||
155 | return GTIMER_HYP; | ||
156 | default: | ||
157 | return GTIMER_PHYS; | ||
158 | @@ -XXX,XX +XXX,XX @@ static int gt_virt_redir_timeridx(CPUARMState *env) | ||
159 | case ARMMMUIdx_E20_0: | ||
160 | case ARMMMUIdx_E20_2: | ||
161 | case ARMMMUIdx_E20_2_PAN: | ||
162 | + case ARMMMUIdx_SE20_0: | ||
163 | + case ARMMMUIdx_SE20_2: | ||
164 | + case ARMMMUIdx_SE20_2_PAN: | ||
165 | return GTIMER_HYPVIRT; | ||
166 | default: | ||
167 | return GTIMER_VIRT; | ||
168 | @@ -XXX,XX +XXX,XX @@ static void ats_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
169 | mmu_idx = ARMMMUIdx_SE3; | ||
170 | break; | ||
171 | case 2: | ||
172 | - g_assert(!secure); /* TODO: ARMv8.4-SecEL2 */ | ||
173 | + g_assert(!secure); /* ARMv8.4-SecEL2 is 64-bit only */ | ||
174 | /* fall through */ | ||
175 | case 1: | ||
176 | if (ri->crm == 9 && (env->uncached_cpsr & CPSR_PAN)) { | ||
177 | @@ -XXX,XX +XXX,XX @@ static void ats_write64(CPUARMState *env, const ARMCPRegInfo *ri, | ||
178 | } | ||
179 | break; | ||
180 | case 4: /* AT S1E2R, AT S1E2W */ | ||
181 | - mmu_idx = ARMMMUIdx_E2; | ||
182 | + mmu_idx = secure ? ARMMMUIdx_SE2 : ARMMMUIdx_E2; | ||
183 | break; | ||
184 | case 6: /* AT S1E3R, AT S1E3W */ | ||
185 | mmu_idx = ARMMMUIdx_SE3; | ||
186 | @@ -XXX,XX +XXX,XX @@ static void vmsa_tcr_ttbr_el2_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
187 | */ | ||
188 | if (extract64(raw_read(env, ri) ^ value, 48, 16) && | ||
189 | (arm_hcr_el2_eff(env) & HCR_E2H)) { | ||
190 | - tlb_flush_by_mmuidx(env_cpu(env), | ||
191 | - ARMMMUIdxBit_E20_2 | | ||
192 | - ARMMMUIdxBit_E20_2_PAN | | ||
193 | - ARMMMUIdxBit_E20_0); | ||
194 | + uint16_t mask = ARMMMUIdxBit_E20_2 | | ||
195 | + ARMMMUIdxBit_E20_2_PAN | | ||
196 | + ARMMMUIdxBit_E20_0; | ||
197 | + | ||
198 | + if (arm_is_secure_below_el3(env)) { | ||
199 | + mask >>= ARM_MMU_IDX_A_NS; | ||
200 | + } | ||
201 | + | ||
202 | + tlb_flush_by_mmuidx(env_cpu(env), mask); | ||
203 | } | ||
204 | raw_write(env, ri, value); | ||
205 | } | ||
206 | @@ -XXX,XX +XXX,XX @@ static int vae1_tlbmask(CPUARMState *env) | ||
207 | uint64_t hcr = arm_hcr_el2_eff(env); | ||
208 | |||
209 | if ((hcr & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE)) { | ||
210 | - return ARMMMUIdxBit_E20_2 | | ||
211 | - ARMMMUIdxBit_E20_2_PAN | | ||
212 | - ARMMMUIdxBit_E20_0; | ||
213 | + uint16_t mask = ARMMMUIdxBit_E20_2 | | ||
214 | + ARMMMUIdxBit_E20_2_PAN | | ||
215 | + ARMMMUIdxBit_E20_0; | ||
216 | + | ||
217 | + if (arm_is_secure_below_el3(env)) { | ||
218 | + mask >>= ARM_MMU_IDX_A_NS; | ||
219 | + } | ||
220 | + | ||
221 | + return mask; | ||
222 | } else if (arm_is_secure_below_el3(env)) { | ||
223 | return ARMMMUIdxBit_SE10_1 | | ||
224 | ARMMMUIdxBit_SE10_1_PAN | | ||
225 | @@ -XXX,XX +XXX,XX @@ static int tlbbits_for_regime(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
226 | |||
227 | static int vae1_tlbbits(CPUARMState *env, uint64_t addr) | ||
228 | { | ||
229 | + uint64_t hcr = arm_hcr_el2_eff(env); | ||
230 | ARMMMUIdx mmu_idx; | ||
231 | |||
232 | /* Only the regime of the mmu_idx below is significant. */ | ||
233 | - if (arm_is_secure_below_el3(env)) { | ||
234 | - mmu_idx = ARMMMUIdx_SE10_0; | ||
235 | - } else if ((env->cp15.hcr_el2 & (HCR_E2H | HCR_TGE)) | ||
236 | - == (HCR_E2H | HCR_TGE)) { | ||
237 | + if ((hcr & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE)) { | ||
238 | mmu_idx = ARMMMUIdx_E20_0; | ||
239 | } else { | ||
240 | mmu_idx = ARMMMUIdx_E10_0; | ||
241 | } | ||
242 | + | ||
243 | + if (arm_is_secure_below_el3(env)) { | ||
244 | + mmu_idx &= ~ARM_MMU_IDX_A_NS; | ||
245 | + } | ||
246 | + | ||
247 | return tlbbits_for_regime(env, mmu_idx, addr); | ||
248 | } | ||
249 | |||
250 | @@ -XXX,XX +XXX,XX @@ static int alle1_tlbmask(CPUARMState *env) | ||
251 | |||
252 | static int e2_tlbmask(CPUARMState *env) | ||
253 | { | ||
254 | - /* TODO: ARMv8.4-SecEL2 */ | ||
255 | - return ARMMMUIdxBit_E20_0 | | ||
256 | - ARMMMUIdxBit_E20_2 | | ||
257 | - ARMMMUIdxBit_E20_2_PAN | | ||
258 | - ARMMMUIdxBit_E2; | ||
259 | + if (arm_is_secure_below_el3(env)) { | ||
260 | + return ARMMMUIdxBit_SE20_0 | | ||
261 | + ARMMMUIdxBit_SE20_2 | | ||
262 | + ARMMMUIdxBit_SE20_2_PAN | | ||
263 | + ARMMMUIdxBit_SE2; | ||
264 | + } else { | ||
265 | + return ARMMMUIdxBit_E20_0 | | ||
266 | + ARMMMUIdxBit_E20_2 | | ||
267 | + ARMMMUIdxBit_E20_2_PAN | | ||
268 | + ARMMMUIdxBit_E2; | ||
269 | + } | ||
270 | } | ||
271 | |||
272 | static void tlbi_aa64_alle1_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
273 | @@ -XXX,XX +XXX,XX @@ static void tlbi_aa64_vae2is_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
274 | { | ||
275 | CPUState *cs = env_cpu(env); | ||
276 | uint64_t pageaddr = sextract64(value << 12, 0, 56); | ||
277 | - int bits = tlbbits_for_regime(env, ARMMMUIdx_E2, pageaddr); | ||
278 | + bool secure = arm_is_secure_below_el3(env); | ||
279 | + int mask = secure ? ARMMMUIdxBit_SE2 : ARMMMUIdxBit_E2; | ||
280 | + int bits = tlbbits_for_regime(env, secure ? ARMMMUIdx_E2 : ARMMMUIdx_SE2, | ||
281 | + pageaddr); | ||
282 | |||
283 | - tlb_flush_page_bits_by_mmuidx_all_cpus_synced(cs, pageaddr, | ||
284 | - ARMMMUIdxBit_E2, bits); | ||
285 | + tlb_flush_page_bits_by_mmuidx_all_cpus_synced(cs, pageaddr, mask, bits); | ||
286 | } | ||
287 | |||
288 | static void tlbi_aa64_vae3is_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
289 | @@ -XXX,XX +XXX,XX @@ uint64_t arm_sctlr(CPUARMState *env, int el) | ||
290 | /* Only EL0 needs to be adjusted for EL1&0 or EL2&0. */ | ||
291 | if (el == 0) { | ||
292 | ARMMMUIdx mmu_idx = arm_mmu_idx_el(env, 0); | ||
293 | - el = (mmu_idx == ARMMMUIdx_E20_0 ? 2 : 1); | ||
294 | + el = (mmu_idx == ARMMMUIdx_E20_0 || mmu_idx == ARMMMUIdx_SE20_0) | ||
295 | + ? 2 : 1; | ||
296 | } | ||
297 | return env->cp15.sctlr_el[el]; | ||
298 | } | ||
299 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_user(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
300 | switch (mmu_idx) { | ||
301 | case ARMMMUIdx_SE10_0: | ||
302 | case ARMMMUIdx_E20_0: | ||
303 | + case ARMMMUIdx_SE20_0: | ||
304 | case ARMMMUIdx_Stage1_E0: | ||
305 | case ARMMMUIdx_MUser: | ||
306 | case ARMMMUIdx_MSUser: | ||
307 | @@ -XXX,XX +XXX,XX @@ int arm_mmu_idx_to_el(ARMMMUIdx mmu_idx) | ||
308 | case ARMMMUIdx_E10_0: | ||
309 | case ARMMMUIdx_E20_0: | ||
310 | case ARMMMUIdx_SE10_0: | ||
311 | + case ARMMMUIdx_SE20_0: | ||
312 | return 0; | ||
313 | case ARMMMUIdx_E10_1: | ||
314 | case ARMMMUIdx_E10_1_PAN: | ||
315 | @@ -XXX,XX +XXX,XX @@ int arm_mmu_idx_to_el(ARMMMUIdx mmu_idx) | ||
316 | case ARMMMUIdx_E2: | ||
317 | case ARMMMUIdx_E20_2: | ||
318 | case ARMMMUIdx_E20_2_PAN: | ||
319 | + case ARMMMUIdx_SE2: | ||
320 | + case ARMMMUIdx_SE20_2: | ||
321 | + case ARMMMUIdx_SE20_2_PAN: | ||
322 | return 2; | ||
323 | case ARMMMUIdx_SE3: | ||
324 | return 3; | ||
325 | @@ -XXX,XX +XXX,XX @@ ARMMMUIdx arm_v7m_mmu_idx_for_secstate(CPUARMState *env, bool secstate) | ||
326 | |||
327 | ARMMMUIdx arm_mmu_idx_el(CPUARMState *env, int el) | ||
328 | { | ||
329 | + ARMMMUIdx idx; | ||
330 | + uint64_t hcr; | ||
331 | + | ||
332 | if (arm_feature(env, ARM_FEATURE_M)) { | ||
333 | return arm_v7m_mmu_idx_for_secstate(env, env->v7m.secure); | ||
334 | } | ||
335 | @@ -XXX,XX +XXX,XX @@ ARMMMUIdx arm_mmu_idx_el(CPUARMState *env, int el) | ||
336 | /* See ARM pseudo-function ELIsInHost. */ | ||
337 | switch (el) { | ||
338 | case 0: | ||
339 | - if (arm_is_secure_below_el3(env)) { | ||
340 | - return ARMMMUIdx_SE10_0; | ||
341 | + hcr = arm_hcr_el2_eff(env); | ||
342 | + if ((hcr & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE)) { | ||
343 | + idx = ARMMMUIdx_E20_0; | ||
344 | + } else { | ||
345 | + idx = ARMMMUIdx_E10_0; | ||
346 | } | ||
347 | - if ((env->cp15.hcr_el2 & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE) | ||
348 | - && arm_el_is_aa64(env, 2)) { | ||
349 | - return ARMMMUIdx_E20_0; | ||
350 | - } | ||
351 | - return ARMMMUIdx_E10_0; | ||
352 | + break; | ||
353 | case 1: | ||
354 | - if (arm_is_secure_below_el3(env)) { | ||
355 | - if (env->pstate & PSTATE_PAN) { | ||
356 | - return ARMMMUIdx_SE10_1_PAN; | ||
357 | - } | ||
358 | - return ARMMMUIdx_SE10_1; | ||
359 | - } | ||
360 | if (env->pstate & PSTATE_PAN) { | ||
361 | - return ARMMMUIdx_E10_1_PAN; | ||
362 | + idx = ARMMMUIdx_E10_1_PAN; | ||
363 | + } else { | ||
364 | + idx = ARMMMUIdx_E10_1; | ||
365 | } | ||
366 | - return ARMMMUIdx_E10_1; | ||
367 | + break; | ||
368 | case 2: | ||
369 | - /* TODO: ARMv8.4-SecEL2 */ | ||
370 | /* Note that TGE does not apply at EL2. */ | ||
371 | - if ((env->cp15.hcr_el2 & HCR_E2H) && arm_el_is_aa64(env, 2)) { | ||
372 | + if (arm_hcr_el2_eff(env) & HCR_E2H) { | ||
373 | if (env->pstate & PSTATE_PAN) { | ||
374 | - return ARMMMUIdx_E20_2_PAN; | ||
375 | + idx = ARMMMUIdx_E20_2_PAN; | ||
376 | + } else { | ||
377 | + idx = ARMMMUIdx_E20_2; | ||
378 | } | ||
379 | - return ARMMMUIdx_E20_2; | ||
380 | + } else { | ||
381 | + idx = ARMMMUIdx_E2; | ||
382 | } | ||
383 | - return ARMMMUIdx_E2; | ||
384 | + break; | ||
385 | case 3: | ||
386 | return ARMMMUIdx_SE3; | ||
387 | default: | ||
388 | g_assert_not_reached(); | ||
389 | } | ||
390 | + | ||
391 | + if (arm_is_secure_below_el3(env)) { | ||
392 | + idx &= ~ARM_MMU_IDX_A_NS; | ||
393 | + } | ||
394 | + | ||
395 | + return idx; | ||
396 | } | ||
397 | |||
398 | ARMMMUIdx arm_mmu_idx(CPUARMState *env) | ||
399 | @@ -XXX,XX +XXX,XX @@ static uint32_t rebuild_hflags_a64(CPUARMState *env, int el, int fp_el, | ||
400 | break; | ||
401 | case ARMMMUIdx_E20_2: | ||
402 | case ARMMMUIdx_E20_2_PAN: | ||
403 | - /* TODO: ARMv8.4-SecEL2 */ | ||
404 | + case ARMMMUIdx_SE20_2: | ||
405 | + case ARMMMUIdx_SE20_2_PAN: | ||
406 | /* | ||
407 | * Note that EL20_2 is gated by HCR_EL2.E2H == 1, but EL20_0 is | ||
408 | * gated by HCR_EL2.<E2H,TGE> == '11', and so is LDTR. | ||
13 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c | 409 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c |
14 | index XXXXXXX..XXXXXXX 100644 | 410 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/target/arm/translate-a64.c | 411 | --- a/target/arm/translate-a64.c |
16 | +++ b/target/arm/translate-a64.c | 412 | +++ b/target/arm/translate-a64.c |
17 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | 413 | @@ -XXX,XX +XXX,XX @@ static int get_a64_user_mem_index(DisasContext *s) |
18 | int index; | 414 | case ARMMMUIdx_SE10_1_PAN: |
19 | TCGv_ptr fpst; | 415 | useridx = ARMMMUIdx_SE10_0; |
20 | 416 | break; | |
21 | - switch (opcode) { | 417 | + case ARMMMUIdx_SE20_2: |
22 | - case 0x0: /* MLA */ | 418 | + case ARMMMUIdx_SE20_2_PAN: |
23 | - case 0x4: /* MLS */ | 419 | + useridx = ARMMMUIdx_SE20_0; |
24 | - if (!u || is_scalar) { | 420 | + break; |
25 | + switch (16 * u + opcode) { | 421 | default: |
26 | + case 0x08: /* MUL */ | 422 | g_assert_not_reached(); |
27 | + case 0x10: /* MLA */ | ||
28 | + case 0x14: /* MLS */ | ||
29 | + if (is_scalar) { | ||
30 | unallocated_encoding(s); | ||
31 | return; | ||
32 | } | 423 | } |
33 | break; | ||
34 | - case 0x2: /* SMLAL, SMLAL2, UMLAL, UMLAL2 */ | ||
35 | - case 0x6: /* SMLSL, SMLSL2, UMLSL, UMLSL2 */ | ||
36 | - case 0xa: /* SMULL, SMULL2, UMULL, UMULL2 */ | ||
37 | + case 0x02: /* SMLAL, SMLAL2 */ | ||
38 | + case 0x12: /* UMLAL, UMLAL2 */ | ||
39 | + case 0x06: /* SMLSL, SMLSL2 */ | ||
40 | + case 0x16: /* UMLSL, UMLSL2 */ | ||
41 | + case 0x0a: /* SMULL, SMULL2 */ | ||
42 | + case 0x1a: /* UMULL, UMULL2 */ | ||
43 | if (is_scalar) { | ||
44 | unallocated_encoding(s); | ||
45 | return; | ||
46 | } | ||
47 | is_long = true; | ||
48 | break; | ||
49 | - case 0x3: /* SQDMLAL, SQDMLAL2 */ | ||
50 | - case 0x7: /* SQDMLSL, SQDMLSL2 */ | ||
51 | - case 0xb: /* SQDMULL, SQDMULL2 */ | ||
52 | + case 0x03: /* SQDMLAL, SQDMLAL2 */ | ||
53 | + case 0x07: /* SQDMLSL, SQDMLSL2 */ | ||
54 | + case 0x0b: /* SQDMULL, SQDMULL2 */ | ||
55 | is_long = true; | ||
56 | - /* fall through */ | ||
57 | - case 0xc: /* SQDMULH */ | ||
58 | - case 0xd: /* SQRDMULH */ | ||
59 | - if (u) { | ||
60 | - unallocated_encoding(s); | ||
61 | - return; | ||
62 | - } | ||
63 | break; | ||
64 | - case 0x8: /* MUL */ | ||
65 | - if (u || is_scalar) { | ||
66 | - unallocated_encoding(s); | ||
67 | - return; | ||
68 | - } | ||
69 | + case 0x0c: /* SQDMULH */ | ||
70 | + case 0x0d: /* SQRDMULH */ | ||
71 | break; | ||
72 | - case 0x1: /* FMLA */ | ||
73 | - case 0x5: /* FMLS */ | ||
74 | - if (u) { | ||
75 | - unallocated_encoding(s); | ||
76 | - return; | ||
77 | - } | ||
78 | - /* fall through */ | ||
79 | - case 0x9: /* FMUL, FMULX */ | ||
80 | + case 0x01: /* FMLA */ | ||
81 | + case 0x05: /* FMLS */ | ||
82 | + case 0x09: /* FMUL */ | ||
83 | + case 0x19: /* FMULX */ | ||
84 | if (size == 1) { | ||
85 | unallocated_encoding(s); | ||
86 | return; | ||
87 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | ||
88 | |||
89 | read_vec_element(s, tcg_op, rn, pass, MO_64); | ||
90 | |||
91 | - switch (opcode) { | ||
92 | - case 0x5: /* FMLS */ | ||
93 | + switch (16 * u + opcode) { | ||
94 | + case 0x05: /* FMLS */ | ||
95 | /* As usual for ARM, separate negation for fused multiply-add */ | ||
96 | gen_helper_vfp_negd(tcg_op, tcg_op); | ||
97 | /* fall through */ | ||
98 | - case 0x1: /* FMLA */ | ||
99 | + case 0x01: /* FMLA */ | ||
100 | read_vec_element(s, tcg_res, rd, pass, MO_64); | ||
101 | gen_helper_vfp_muladdd(tcg_res, tcg_op, tcg_idx, tcg_res, fpst); | ||
102 | break; | ||
103 | - case 0x9: /* FMUL, FMULX */ | ||
104 | - if (u) { | ||
105 | - gen_helper_vfp_mulxd(tcg_res, tcg_op, tcg_idx, fpst); | ||
106 | - } else { | ||
107 | - gen_helper_vfp_muld(tcg_res, tcg_op, tcg_idx, fpst); | ||
108 | - } | ||
109 | + case 0x09: /* FMUL */ | ||
110 | + gen_helper_vfp_muld(tcg_res, tcg_op, tcg_idx, fpst); | ||
111 | + break; | ||
112 | + case 0x19: /* FMULX */ | ||
113 | + gen_helper_vfp_mulxd(tcg_res, tcg_op, tcg_idx, fpst); | ||
114 | break; | ||
115 | default: | ||
116 | g_assert_not_reached(); | ||
117 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | ||
118 | |||
119 | read_vec_element_i32(s, tcg_op, rn, pass, is_scalar ? size : MO_32); | ||
120 | |||
121 | - switch (opcode) { | ||
122 | - case 0x0: /* MLA */ | ||
123 | - case 0x4: /* MLS */ | ||
124 | - case 0x8: /* MUL */ | ||
125 | + switch (16 * u + opcode) { | ||
126 | + case 0x08: /* MUL */ | ||
127 | + case 0x10: /* MLA */ | ||
128 | + case 0x14: /* MLS */ | ||
129 | { | ||
130 | static NeonGenTwoOpFn * const fns[2][2] = { | ||
131 | { gen_helper_neon_add_u16, gen_helper_neon_sub_u16 }, | ||
132 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | ||
133 | genfn(tcg_res, tcg_op, tcg_res); | ||
134 | break; | ||
135 | } | ||
136 | - case 0x5: /* FMLS */ | ||
137 | - case 0x1: /* FMLA */ | ||
138 | + case 0x05: /* FMLS */ | ||
139 | + case 0x01: /* FMLA */ | ||
140 | read_vec_element_i32(s, tcg_res, rd, pass, | ||
141 | is_scalar ? size : MO_32); | ||
142 | switch (size) { | ||
143 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | ||
144 | g_assert_not_reached(); | ||
145 | } | ||
146 | break; | ||
147 | - case 0x9: /* FMUL, FMULX */ | ||
148 | + case 0x09: /* FMUL */ | ||
149 | switch (size) { | ||
150 | case 1: | ||
151 | - if (u) { | ||
152 | - if (is_scalar) { | ||
153 | - gen_helper_advsimd_mulxh(tcg_res, tcg_op, | ||
154 | - tcg_idx, fpst); | ||
155 | - } else { | ||
156 | - gen_helper_advsimd_mulx2h(tcg_res, tcg_op, | ||
157 | - tcg_idx, fpst); | ||
158 | - } | ||
159 | + if (is_scalar) { | ||
160 | + gen_helper_advsimd_mulh(tcg_res, tcg_op, | ||
161 | + tcg_idx, fpst); | ||
162 | } else { | ||
163 | - if (is_scalar) { | ||
164 | - gen_helper_advsimd_mulh(tcg_res, tcg_op, | ||
165 | - tcg_idx, fpst); | ||
166 | - } else { | ||
167 | - gen_helper_advsimd_mul2h(tcg_res, tcg_op, | ||
168 | - tcg_idx, fpst); | ||
169 | - } | ||
170 | + gen_helper_advsimd_mul2h(tcg_res, tcg_op, | ||
171 | + tcg_idx, fpst); | ||
172 | } | ||
173 | break; | ||
174 | case 2: | ||
175 | - if (u) { | ||
176 | - gen_helper_vfp_mulxs(tcg_res, tcg_op, tcg_idx, fpst); | ||
177 | - } else { | ||
178 | - gen_helper_vfp_muls(tcg_res, tcg_op, tcg_idx, fpst); | ||
179 | - } | ||
180 | + gen_helper_vfp_muls(tcg_res, tcg_op, tcg_idx, fpst); | ||
181 | break; | ||
182 | default: | ||
183 | g_assert_not_reached(); | ||
184 | } | ||
185 | break; | ||
186 | - case 0xc: /* SQDMULH */ | ||
187 | + case 0x19: /* FMULX */ | ||
188 | + switch (size) { | ||
189 | + case 1: | ||
190 | + if (is_scalar) { | ||
191 | + gen_helper_advsimd_mulxh(tcg_res, tcg_op, | ||
192 | + tcg_idx, fpst); | ||
193 | + } else { | ||
194 | + gen_helper_advsimd_mulx2h(tcg_res, tcg_op, | ||
195 | + tcg_idx, fpst); | ||
196 | + } | ||
197 | + break; | ||
198 | + case 2: | ||
199 | + gen_helper_vfp_mulxs(tcg_res, tcg_op, tcg_idx, fpst); | ||
200 | + break; | ||
201 | + default: | ||
202 | + g_assert_not_reached(); | ||
203 | + } | ||
204 | + break; | ||
205 | + case 0x0c: /* SQDMULH */ | ||
206 | if (size == 1) { | ||
207 | gen_helper_neon_qdmulh_s16(tcg_res, cpu_env, | ||
208 | tcg_op, tcg_idx); | ||
209 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | ||
210 | tcg_op, tcg_idx); | ||
211 | } | ||
212 | break; | ||
213 | - case 0xd: /* SQRDMULH */ | ||
214 | + case 0x0d: /* SQRDMULH */ | ||
215 | if (size == 1) { | ||
216 | gen_helper_neon_qrdmulh_s16(tcg_res, cpu_env, | ||
217 | tcg_op, tcg_idx); | ||
218 | -- | 424 | -- |
219 | 2.16.2 | 425 | 2.20.1 |
220 | 426 | ||
221 | 427 | diff view generated by jsdifflib |
1 | The IoTKit Security Controller includes various registers | 1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
---|---|---|---|
2 | that expose to software the controls for the Peripheral | ||
3 | Protection Controllers in the system. Implement these. | ||
4 | 2 | ||
3 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
5 | Message-id: 20210112104511.36576-9-remi.denis.courmont@huawei.com | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
7 | Message-id: 20180220180325.29818-17-peter.maydell@linaro.org | ||
8 | --- | 7 | --- |
9 | include/hw/misc/iotkit-secctl.h | 64 +++++++++- | 8 | target/arm/cpu.h | 7 +++++++ |
10 | hw/misc/iotkit-secctl.c | 270 +++++++++++++++++++++++++++++++++++++--- | 9 | target/arm/helper.c | 24 ++++++++++++++++++++++++ |
11 | 2 files changed, 315 insertions(+), 19 deletions(-) | 10 | 2 files changed, 31 insertions(+) |
12 | 11 | ||
13 | diff --git a/include/hw/misc/iotkit-secctl.h b/include/hw/misc/iotkit-secctl.h | 12 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
14 | index XXXXXXX..XXXXXXX 100644 | 13 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/include/hw/misc/iotkit-secctl.h | 14 | --- a/target/arm/cpu.h |
16 | +++ b/include/hw/misc/iotkit-secctl.h | 15 | +++ b/target/arm/cpu.h |
17 | @@ -XXX,XX +XXX,XX @@ | 16 | @@ -XXX,XX +XXX,XX @@ typedef struct { |
18 | * QEMU interface: | 17 | uint32_t base_mask; |
19 | * + sysbus MMIO region 0 is the "secure privilege control block" registers | 18 | } TCR; |
20 | * + sysbus MMIO region 1 is the "non-secure privilege control block" registers | 19 | |
21 | + * + named GPIO output "sec_resp_cfg" indicating whether blocked accesses | 20 | +#define VTCR_NSW (1u << 29) |
22 | + * should RAZ/WI or bus error | 21 | +#define VTCR_NSA (1u << 30) |
23 | + * Controlling the 2 APB PPCs in the IoTKit: | 22 | +#define VSTCR_SW VTCR_NSW |
24 | + * + named GPIO outputs apb_ppc0_nonsec[0..2] and apb_ppc1_nonsec | 23 | +#define VSTCR_SA VTCR_NSA |
25 | + * + named GPIO outputs apb_ppc0_ap[0..2] and apb_ppc1_ap | ||
26 | + * + named GPIO outputs apb_ppc{0,1}_irq_enable | ||
27 | + * + named GPIO outputs apb_ppc{0,1}_irq_clear | ||
28 | + * + named GPIO inputs apb_ppc{0,1}_irq_status | ||
29 | + * Controlling each of the 4 expansion APB PPCs which a system using the IoTKit | ||
30 | + * might provide: | ||
31 | + * + named GPIO outputs apb_ppcexp{0,1,2,3}_nonsec[0..15] | ||
32 | + * + named GPIO outputs apb_ppcexp{0,1,2,3}_ap[0..15] | ||
33 | + * + named GPIO outputs apb_ppcexp{0,1,2,3}_irq_enable | ||
34 | + * + named GPIO outputs apb_ppcexp{0,1,2,3}_irq_clear | ||
35 | + * + named GPIO inputs apb_ppcexp{0,1,2,3}_irq_status | ||
36 | + * Controlling each of the 4 expansion AHB PPCs which a system using the IoTKit | ||
37 | + * might provide: | ||
38 | + * + named GPIO outputs ahb_ppcexp{0,1,2,3}_nonsec[0..15] | ||
39 | + * + named GPIO outputs ahb_ppcexp{0,1,2,3}_ap[0..15] | ||
40 | + * + named GPIO outputs ahb_ppcexp{0,1,2,3}_irq_enable | ||
41 | + * + named GPIO outputs ahb_ppcexp{0,1,2,3}_irq_clear | ||
42 | + * + named GPIO inputs ahb_ppcexp{0,1,2,3}_irq_status | ||
43 | */ | ||
44 | |||
45 | #ifndef IOTKIT_SECCTL_H | ||
46 | @@ -XXX,XX +XXX,XX @@ | ||
47 | #define TYPE_IOTKIT_SECCTL "iotkit-secctl" | ||
48 | #define IOTKIT_SECCTL(obj) OBJECT_CHECK(IoTKitSecCtl, (obj), TYPE_IOTKIT_SECCTL) | ||
49 | |||
50 | -typedef struct IoTKitSecCtl { | ||
51 | +#define IOTS_APB_PPC0_NUM_PORTS 3 | ||
52 | +#define IOTS_APB_PPC1_NUM_PORTS 1 | ||
53 | +#define IOTS_PPC_NUM_PORTS 16 | ||
54 | +#define IOTS_NUM_APB_PPC 2 | ||
55 | +#define IOTS_NUM_APB_EXP_PPC 4 | ||
56 | +#define IOTS_NUM_AHB_EXP_PPC 4 | ||
57 | + | 24 | + |
58 | +typedef struct IoTKitSecCtl IoTKitSecCtl; | 25 | /* Define a maximum sized vector register. |
59 | + | 26 | * For 32-bit, this is a 128-bit NEON/AdvSIMD register. |
60 | +/* State and IRQ lines relating to a PPC. For the | 27 | * For 64-bit, this is a 2048-bit SVE register. |
61 | + * PPCs in the IoTKit not all the IRQ lines are used. | 28 | @@ -XXX,XX +XXX,XX @@ typedef struct CPUARMState { |
62 | + */ | 29 | uint64_t ttbr1_el[4]; |
63 | +typedef struct IoTKitSecCtlPPC { | 30 | }; |
64 | + qemu_irq nonsec[IOTS_PPC_NUM_PORTS]; | 31 | uint64_t vttbr_el2; /* Virtualization Translation Table Base. */ |
65 | + qemu_irq ap[IOTS_PPC_NUM_PORTS]; | 32 | + uint64_t vsttbr_el2; /* Secure Virtualization Translation Table. */ |
66 | + qemu_irq irq_enable; | 33 | /* MMU translation table base control. */ |
67 | + qemu_irq irq_clear; | 34 | TCR tcr_el[4]; |
68 | + | 35 | TCR vtcr_el2; /* Virtualization Translation Control. */ |
69 | + uint32_t ns; | 36 | + TCR vstcr_el2; /* Secure Virtualization Translation Control. */ |
70 | + uint32_t sp; | 37 | uint32_t c2_data; /* MPU data cacheable bits. */ |
71 | + uint32_t nsp; | 38 | uint32_t c2_insn; /* MPU instruction cacheable bits. */ |
72 | + | 39 | union { /* MMU domain access control register |
73 | + /* Number of ports actually present */ | 40 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
74 | + int numports; | ||
75 | + /* Offset of this PPC's interrupt bits in SECPPCINTSTAT */ | ||
76 | + int irq_bit_offset; | ||
77 | + IoTKitSecCtl *parent; | ||
78 | +} IoTKitSecCtlPPC; | ||
79 | + | ||
80 | +struct IoTKitSecCtl { | ||
81 | /*< private >*/ | ||
82 | SysBusDevice parent_obj; | ||
83 | |||
84 | /*< public >*/ | ||
85 | + qemu_irq sec_resp_cfg; | ||
86 | |||
87 | MemoryRegion s_regs; | ||
88 | MemoryRegion ns_regs; | ||
89 | -} IoTKitSecCtl; | ||
90 | + | ||
91 | + uint32_t secppcintstat; | ||
92 | + uint32_t secppcinten; | ||
93 | + uint32_t secrespcfg; | ||
94 | + | ||
95 | + IoTKitSecCtlPPC apb[IOTS_NUM_APB_PPC]; | ||
96 | + IoTKitSecCtlPPC apbexp[IOTS_NUM_APB_EXP_PPC]; | ||
97 | + IoTKitSecCtlPPC ahbexp[IOTS_NUM_APB_EXP_PPC]; | ||
98 | +}; | ||
99 | |||
100 | #endif | ||
101 | diff --git a/hw/misc/iotkit-secctl.c b/hw/misc/iotkit-secctl.c | ||
102 | index XXXXXXX..XXXXXXX 100644 | 41 | index XXXXXXX..XXXXXXX 100644 |
103 | --- a/hw/misc/iotkit-secctl.c | 42 | --- a/target/arm/helper.c |
104 | +++ b/hw/misc/iotkit-secctl.c | 43 | +++ b/target/arm/helper.c |
105 | @@ -XXX,XX +XXX,XX @@ static const uint8_t iotkit_secctl_ns_idregs[] = { | 44 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo el2_v8_cp_reginfo[] = { |
106 | 0x0d, 0xf0, 0x05, 0xb1, | 45 | REGINFO_SENTINEL |
107 | }; | 46 | }; |
108 | 47 | ||
109 | +/* The register sets for the various PPCs (AHB internal, APB internal, | 48 | +static CPAccessResult sel2_access(CPUARMState *env, const ARMCPRegInfo *ri, |
110 | + * AHB expansion, APB expansion) are all set up so that they are | 49 | + bool isread) |
111 | + * in 16-aligned blocks so offsets 0xN0, 0xN4, 0xN8, 0xNC are PPCs | ||
112 | + * 0, 1, 2, 3 of that type, so we can convert a register address offset | ||
113 | + * into an an index into a PPC array easily. | ||
114 | + */ | ||
115 | +static inline int offset_to_ppc_idx(uint32_t offset) | ||
116 | +{ | 50 | +{ |
117 | + return extract32(offset, 2, 2); | 51 | + if (arm_current_el(env) == 3 || arm_is_secure_below_el3(env)) { |
52 | + return CP_ACCESS_OK; | ||
53 | + } | ||
54 | + return CP_ACCESS_TRAP_UNCATEGORIZED; | ||
118 | +} | 55 | +} |
119 | + | 56 | + |
120 | +typedef void PerPPCFunction(IoTKitSecCtlPPC *ppc); | 57 | +static const ARMCPRegInfo el2_sec_cp_reginfo[] = { |
121 | + | 58 | + { .name = "VSTTBR_EL2", .state = ARM_CP_STATE_AA64, |
122 | +static void foreach_ppc(IoTKitSecCtl *s, PerPPCFunction *fn) | 59 | + .opc0 = 3, .opc1 = 4, .crn = 2, .crm = 6, .opc2 = 0, |
123 | +{ | 60 | + .access = PL2_RW, .accessfn = sel2_access, |
124 | + int i; | 61 | + .fieldoffset = offsetof(CPUARMState, cp15.vsttbr_el2) }, |
125 | + | 62 | + { .name = "VSTCR_EL2", .state = ARM_CP_STATE_AA64, |
126 | + for (i = 0; i < IOTS_NUM_APB_PPC; i++) { | 63 | + .opc0 = 3, .opc1 = 4, .crn = 2, .crm = 6, .opc2 = 2, |
127 | + fn(&s->apb[i]); | 64 | + .access = PL2_RW, .accessfn = sel2_access, |
128 | + } | 65 | + .fieldoffset = offsetof(CPUARMState, cp15.vstcr_el2) }, |
129 | + for (i = 0; i < IOTS_NUM_APB_EXP_PPC; i++) { | 66 | + REGINFO_SENTINEL |
130 | + fn(&s->apbexp[i]); | ||
131 | + } | ||
132 | + for (i = 0; i < IOTS_NUM_AHB_EXP_PPC; i++) { | ||
133 | + fn(&s->ahbexp[i]); | ||
134 | + } | ||
135 | +} | ||
136 | + | ||
137 | static MemTxResult iotkit_secctl_s_read(void *opaque, hwaddr addr, | ||
138 | uint64_t *pdata, | ||
139 | unsigned size, MemTxAttrs attrs) | ||
140 | { | ||
141 | uint64_t r; | ||
142 | uint32_t offset = addr & ~0x3; | ||
143 | + IoTKitSecCtl *s = IOTKIT_SECCTL(opaque); | ||
144 | |||
145 | switch (offset) { | ||
146 | case A_AHBNSPPC0: | ||
147 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_s_read(void *opaque, hwaddr addr, | ||
148 | r = 0; | ||
149 | break; | ||
150 | case A_SECRESPCFG: | ||
151 | - case A_NSCCFG: | ||
152 | - case A_SECMPCINTSTATUS: | ||
153 | + r = s->secrespcfg; | ||
154 | + break; | ||
155 | case A_SECPPCINTSTAT: | ||
156 | + r = s->secppcintstat; | ||
157 | + break; | ||
158 | case A_SECPPCINTEN: | ||
159 | - case A_SECMSCINTSTAT: | ||
160 | - case A_SECMSCINTEN: | ||
161 | - case A_BRGINTSTAT: | ||
162 | - case A_BRGINTEN: | ||
163 | + r = s->secppcinten; | ||
164 | + break; | ||
165 | case A_AHBNSPPCEXP0: | ||
166 | case A_AHBNSPPCEXP1: | ||
167 | case A_AHBNSPPCEXP2: | ||
168 | case A_AHBNSPPCEXP3: | ||
169 | + r = s->ahbexp[offset_to_ppc_idx(offset)].ns; | ||
170 | + break; | ||
171 | case A_APBNSPPC0: | ||
172 | case A_APBNSPPC1: | ||
173 | + r = s->apb[offset_to_ppc_idx(offset)].ns; | ||
174 | + break; | ||
175 | case A_APBNSPPCEXP0: | ||
176 | case A_APBNSPPCEXP1: | ||
177 | case A_APBNSPPCEXP2: | ||
178 | case A_APBNSPPCEXP3: | ||
179 | + r = s->apbexp[offset_to_ppc_idx(offset)].ns; | ||
180 | + break; | ||
181 | case A_AHBSPPPCEXP0: | ||
182 | case A_AHBSPPPCEXP1: | ||
183 | case A_AHBSPPPCEXP2: | ||
184 | case A_AHBSPPPCEXP3: | ||
185 | + r = s->apbexp[offset_to_ppc_idx(offset)].sp; | ||
186 | + break; | ||
187 | case A_APBSPPPC0: | ||
188 | case A_APBSPPPC1: | ||
189 | + r = s->apb[offset_to_ppc_idx(offset)].sp; | ||
190 | + break; | ||
191 | case A_APBSPPPCEXP0: | ||
192 | case A_APBSPPPCEXP1: | ||
193 | case A_APBSPPPCEXP2: | ||
194 | case A_APBSPPPCEXP3: | ||
195 | + r = s->apbexp[offset_to_ppc_idx(offset)].sp; | ||
196 | + break; | ||
197 | + case A_NSCCFG: | ||
198 | + case A_SECMPCINTSTATUS: | ||
199 | + case A_SECMSCINTSTAT: | ||
200 | + case A_SECMSCINTEN: | ||
201 | + case A_BRGINTSTAT: | ||
202 | + case A_BRGINTEN: | ||
203 | case A_NSMSCEXP: | ||
204 | qemu_log_mask(LOG_UNIMP, | ||
205 | "IoTKit SecCtl S block read: " | ||
206 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_s_read(void *opaque, hwaddr addr, | ||
207 | return MEMTX_OK; | ||
208 | } | ||
209 | |||
210 | +static void iotkit_secctl_update_ppc_ap(IoTKitSecCtlPPC *ppc) | ||
211 | +{ | ||
212 | + int i; | ||
213 | + | ||
214 | + for (i = 0; i < ppc->numports; i++) { | ||
215 | + bool v; | ||
216 | + | ||
217 | + if (extract32(ppc->ns, i, 1)) { | ||
218 | + v = extract32(ppc->nsp, i, 1); | ||
219 | + } else { | ||
220 | + v = extract32(ppc->sp, i, 1); | ||
221 | + } | ||
222 | + qemu_set_irq(ppc->ap[i], v); | ||
223 | + } | ||
224 | +} | ||
225 | + | ||
226 | +static void iotkit_secctl_ppc_ns_write(IoTKitSecCtlPPC *ppc, uint32_t value) | ||
227 | +{ | ||
228 | + int i; | ||
229 | + | ||
230 | + ppc->ns = value & MAKE_64BIT_MASK(0, ppc->numports); | ||
231 | + for (i = 0; i < ppc->numports; i++) { | ||
232 | + qemu_set_irq(ppc->nonsec[i], extract32(ppc->ns, i, 1)); | ||
233 | + } | ||
234 | + iotkit_secctl_update_ppc_ap(ppc); | ||
235 | +} | ||
236 | + | ||
237 | +static void iotkit_secctl_ppc_sp_write(IoTKitSecCtlPPC *ppc, uint32_t value) | ||
238 | +{ | ||
239 | + ppc->sp = value & MAKE_64BIT_MASK(0, ppc->numports); | ||
240 | + iotkit_secctl_update_ppc_ap(ppc); | ||
241 | +} | ||
242 | + | ||
243 | +static void iotkit_secctl_ppc_nsp_write(IoTKitSecCtlPPC *ppc, uint32_t value) | ||
244 | +{ | ||
245 | + ppc->nsp = value & MAKE_64BIT_MASK(0, ppc->numports); | ||
246 | + iotkit_secctl_update_ppc_ap(ppc); | ||
247 | +} | ||
248 | + | ||
249 | +static void iotkit_secctl_ppc_update_irq_clear(IoTKitSecCtlPPC *ppc) | ||
250 | +{ | ||
251 | + uint32_t value = ppc->parent->secppcintstat; | ||
252 | + | ||
253 | + qemu_set_irq(ppc->irq_clear, extract32(value, ppc->irq_bit_offset, 1)); | ||
254 | +} | ||
255 | + | ||
256 | +static void iotkit_secctl_ppc_update_irq_enable(IoTKitSecCtlPPC *ppc) | ||
257 | +{ | ||
258 | + uint32_t value = ppc->parent->secppcinten; | ||
259 | + | ||
260 | + qemu_set_irq(ppc->irq_enable, extract32(value, ppc->irq_bit_offset, 1)); | ||
261 | +} | ||
262 | + | ||
263 | static MemTxResult iotkit_secctl_s_write(void *opaque, hwaddr addr, | ||
264 | uint64_t value, | ||
265 | unsigned size, MemTxAttrs attrs) | ||
266 | { | ||
267 | + IoTKitSecCtl *s = IOTKIT_SECCTL(opaque); | ||
268 | uint32_t offset = addr; | ||
269 | + IoTKitSecCtlPPC *ppc; | ||
270 | |||
271 | trace_iotkit_secctl_s_write(offset, value, size); | ||
272 | |||
273 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_s_write(void *opaque, hwaddr addr, | ||
274 | |||
275 | switch (offset) { | ||
276 | case A_SECRESPCFG: | ||
277 | - case A_NSCCFG: | ||
278 | + value &= 1; | ||
279 | + s->secrespcfg = value; | ||
280 | + qemu_set_irq(s->sec_resp_cfg, s->secrespcfg); | ||
281 | + break; | ||
282 | case A_SECPPCINTCLR: | ||
283 | + value &= 0x00f000f3; | ||
284 | + foreach_ppc(s, iotkit_secctl_ppc_update_irq_clear); | ||
285 | + break; | ||
286 | case A_SECPPCINTEN: | ||
287 | - case A_SECMSCINTCLR: | ||
288 | - case A_SECMSCINTEN: | ||
289 | - case A_BRGINTCLR: | ||
290 | - case A_BRGINTEN: | ||
291 | + s->secppcinten = value & 0x00f000f3; | ||
292 | + foreach_ppc(s, iotkit_secctl_ppc_update_irq_enable); | ||
293 | + break; | ||
294 | case A_AHBNSPPCEXP0: | ||
295 | case A_AHBNSPPCEXP1: | ||
296 | case A_AHBNSPPCEXP2: | ||
297 | case A_AHBNSPPCEXP3: | ||
298 | + ppc = &s->ahbexp[offset_to_ppc_idx(offset)]; | ||
299 | + iotkit_secctl_ppc_ns_write(ppc, value); | ||
300 | + break; | ||
301 | case A_APBNSPPC0: | ||
302 | case A_APBNSPPC1: | ||
303 | + ppc = &s->apb[offset_to_ppc_idx(offset)]; | ||
304 | + iotkit_secctl_ppc_ns_write(ppc, value); | ||
305 | + break; | ||
306 | case A_APBNSPPCEXP0: | ||
307 | case A_APBNSPPCEXP1: | ||
308 | case A_APBNSPPCEXP2: | ||
309 | case A_APBNSPPCEXP3: | ||
310 | + ppc = &s->apbexp[offset_to_ppc_idx(offset)]; | ||
311 | + iotkit_secctl_ppc_ns_write(ppc, value); | ||
312 | + break; | ||
313 | case A_AHBSPPPCEXP0: | ||
314 | case A_AHBSPPPCEXP1: | ||
315 | case A_AHBSPPPCEXP2: | ||
316 | case A_AHBSPPPCEXP3: | ||
317 | + ppc = &s->ahbexp[offset_to_ppc_idx(offset)]; | ||
318 | + iotkit_secctl_ppc_sp_write(ppc, value); | ||
319 | + break; | ||
320 | case A_APBSPPPC0: | ||
321 | case A_APBSPPPC1: | ||
322 | + ppc = &s->apb[offset_to_ppc_idx(offset)]; | ||
323 | + iotkit_secctl_ppc_sp_write(ppc, value); | ||
324 | + break; | ||
325 | case A_APBSPPPCEXP0: | ||
326 | case A_APBSPPPCEXP1: | ||
327 | case A_APBSPPPCEXP2: | ||
328 | case A_APBSPPPCEXP3: | ||
329 | + ppc = &s->apbexp[offset_to_ppc_idx(offset)]; | ||
330 | + iotkit_secctl_ppc_sp_write(ppc, value); | ||
331 | + break; | ||
332 | + case A_NSCCFG: | ||
333 | + case A_SECMSCINTCLR: | ||
334 | + case A_SECMSCINTEN: | ||
335 | + case A_BRGINTCLR: | ||
336 | + case A_BRGINTEN: | ||
337 | qemu_log_mask(LOG_UNIMP, | ||
338 | "IoTKit SecCtl S block write: " | ||
339 | "unimplemented offset 0x%x\n", offset); | ||
340 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_ns_read(void *opaque, hwaddr addr, | ||
341 | uint64_t *pdata, | ||
342 | unsigned size, MemTxAttrs attrs) | ||
343 | { | ||
344 | + IoTKitSecCtl *s = IOTKIT_SECCTL(opaque); | ||
345 | uint64_t r; | ||
346 | uint32_t offset = addr & ~0x3; | ||
347 | |||
348 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_ns_read(void *opaque, hwaddr addr, | ||
349 | case A_AHBNSPPPCEXP1: | ||
350 | case A_AHBNSPPPCEXP2: | ||
351 | case A_AHBNSPPPCEXP3: | ||
352 | + r = s->ahbexp[offset_to_ppc_idx(offset)].nsp; | ||
353 | + break; | ||
354 | case A_APBNSPPPC0: | ||
355 | case A_APBNSPPPC1: | ||
356 | + r = s->apb[offset_to_ppc_idx(offset)].nsp; | ||
357 | + break; | ||
358 | case A_APBNSPPPCEXP0: | ||
359 | case A_APBNSPPPCEXP1: | ||
360 | case A_APBNSPPPCEXP2: | ||
361 | case A_APBNSPPPCEXP3: | ||
362 | - qemu_log_mask(LOG_UNIMP, | ||
363 | - "IoTKit SecCtl NS block read: " | ||
364 | - "unimplemented offset 0x%x\n", offset); | ||
365 | + r = s->apbexp[offset_to_ppc_idx(offset)].nsp; | ||
366 | break; | ||
367 | case A_PID4: | ||
368 | case A_PID5: | ||
369 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_ns_write(void *opaque, hwaddr addr, | ||
370 | uint64_t value, | ||
371 | unsigned size, MemTxAttrs attrs) | ||
372 | { | ||
373 | + IoTKitSecCtl *s = IOTKIT_SECCTL(opaque); | ||
374 | uint32_t offset = addr; | ||
375 | + IoTKitSecCtlPPC *ppc; | ||
376 | |||
377 | trace_iotkit_secctl_ns_write(offset, value, size); | ||
378 | |||
379 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_ns_write(void *opaque, hwaddr addr, | ||
380 | case A_AHBNSPPPCEXP1: | ||
381 | case A_AHBNSPPPCEXP2: | ||
382 | case A_AHBNSPPPCEXP3: | ||
383 | + ppc = &s->ahbexp[offset_to_ppc_idx(offset)]; | ||
384 | + iotkit_secctl_ppc_nsp_write(ppc, value); | ||
385 | + break; | ||
386 | case A_APBNSPPPC0: | ||
387 | case A_APBNSPPPC1: | ||
388 | + ppc = &s->apb[offset_to_ppc_idx(offset)]; | ||
389 | + iotkit_secctl_ppc_nsp_write(ppc, value); | ||
390 | + break; | ||
391 | case A_APBNSPPPCEXP0: | ||
392 | case A_APBNSPPPCEXP1: | ||
393 | case A_APBNSPPPCEXP2: | ||
394 | case A_APBNSPPPCEXP3: | ||
395 | - qemu_log_mask(LOG_UNIMP, | ||
396 | - "IoTKit SecCtl NS block write: " | ||
397 | - "unimplemented offset 0x%x\n", offset); | ||
398 | + ppc = &s->apbexp[offset_to_ppc_idx(offset)]; | ||
399 | + iotkit_secctl_ppc_nsp_write(ppc, value); | ||
400 | break; | ||
401 | case A_AHBNSPPPC0: | ||
402 | case A_PID4: | ||
403 | @@ -XXX,XX +XXX,XX @@ static const MemoryRegionOps iotkit_secctl_ns_ops = { | ||
404 | .impl.max_access_size = 4, | ||
405 | }; | ||
406 | |||
407 | +static void iotkit_secctl_reset_ppc(IoTKitSecCtlPPC *ppc) | ||
408 | +{ | ||
409 | + ppc->ns = 0; | ||
410 | + ppc->sp = 0; | ||
411 | + ppc->nsp = 0; | ||
412 | +} | ||
413 | + | ||
414 | static void iotkit_secctl_reset(DeviceState *dev) | ||
415 | { | ||
416 | + IoTKitSecCtl *s = IOTKIT_SECCTL(dev); | ||
417 | |||
418 | + s->secppcintstat = 0; | ||
419 | + s->secppcinten = 0; | ||
420 | + s->secrespcfg = 0; | ||
421 | + | ||
422 | + foreach_ppc(s, iotkit_secctl_reset_ppc); | ||
423 | +} | ||
424 | + | ||
425 | +static void iotkit_secctl_ppc_irqstatus(void *opaque, int n, int level) | ||
426 | +{ | ||
427 | + IoTKitSecCtlPPC *ppc = opaque; | ||
428 | + IoTKitSecCtl *s = IOTKIT_SECCTL(ppc->parent); | ||
429 | + int irqbit = ppc->irq_bit_offset + n; | ||
430 | + | ||
431 | + s->secppcintstat = deposit32(s->secppcintstat, irqbit, 1, level); | ||
432 | +} | ||
433 | + | ||
434 | +static void iotkit_secctl_init_ppc(IoTKitSecCtl *s, | ||
435 | + IoTKitSecCtlPPC *ppc, | ||
436 | + const char *name, | ||
437 | + int numports, | ||
438 | + int irq_bit_offset) | ||
439 | +{ | ||
440 | + char *gpioname; | ||
441 | + DeviceState *dev = DEVICE(s); | ||
442 | + | ||
443 | + ppc->numports = numports; | ||
444 | + ppc->irq_bit_offset = irq_bit_offset; | ||
445 | + ppc->parent = s; | ||
446 | + | ||
447 | + gpioname = g_strdup_printf("%s_nonsec", name); | ||
448 | + qdev_init_gpio_out_named(dev, ppc->nonsec, gpioname, numports); | ||
449 | + g_free(gpioname); | ||
450 | + gpioname = g_strdup_printf("%s_ap", name); | ||
451 | + qdev_init_gpio_out_named(dev, ppc->ap, gpioname, numports); | ||
452 | + g_free(gpioname); | ||
453 | + gpioname = g_strdup_printf("%s_irq_enable", name); | ||
454 | + qdev_init_gpio_out_named(dev, &ppc->irq_enable, gpioname, 1); | ||
455 | + g_free(gpioname); | ||
456 | + gpioname = g_strdup_printf("%s_irq_clear", name); | ||
457 | + qdev_init_gpio_out_named(dev, &ppc->irq_clear, gpioname, 1); | ||
458 | + g_free(gpioname); | ||
459 | + gpioname = g_strdup_printf("%s_irq_status", name); | ||
460 | + qdev_init_gpio_in_named_with_opaque(dev, iotkit_secctl_ppc_irqstatus, | ||
461 | + ppc, gpioname, 1); | ||
462 | + g_free(gpioname); | ||
463 | } | ||
464 | |||
465 | static void iotkit_secctl_init(Object *obj) | ||
466 | { | ||
467 | IoTKitSecCtl *s = IOTKIT_SECCTL(obj); | ||
468 | SysBusDevice *sbd = SYS_BUS_DEVICE(obj); | ||
469 | + DeviceState *dev = DEVICE(obj); | ||
470 | + int i; | ||
471 | + | ||
472 | + iotkit_secctl_init_ppc(s, &s->apb[0], "apb_ppc0", | ||
473 | + IOTS_APB_PPC0_NUM_PORTS, 0); | ||
474 | + iotkit_secctl_init_ppc(s, &s->apb[1], "apb_ppc1", | ||
475 | + IOTS_APB_PPC1_NUM_PORTS, 1); | ||
476 | + | ||
477 | + for (i = 0; i < IOTS_NUM_APB_EXP_PPC; i++) { | ||
478 | + IoTKitSecCtlPPC *ppc = &s->apbexp[i]; | ||
479 | + char *ppcname = g_strdup_printf("apb_ppcexp%d", i); | ||
480 | + iotkit_secctl_init_ppc(s, ppc, ppcname, IOTS_PPC_NUM_PORTS, 4 + i); | ||
481 | + g_free(ppcname); | ||
482 | + } | ||
483 | + for (i = 0; i < IOTS_NUM_AHB_EXP_PPC; i++) { | ||
484 | + IoTKitSecCtlPPC *ppc = &s->ahbexp[i]; | ||
485 | + char *ppcname = g_strdup_printf("ahb_ppcexp%d", i); | ||
486 | + iotkit_secctl_init_ppc(s, ppc, ppcname, IOTS_PPC_NUM_PORTS, 20 + i); | ||
487 | + g_free(ppcname); | ||
488 | + } | ||
489 | + | ||
490 | + qdev_init_gpio_out_named(dev, &s->sec_resp_cfg, "sec_resp_cfg", 1); | ||
491 | |||
492 | memory_region_init_io(&s->s_regs, obj, &iotkit_secctl_s_ops, | ||
493 | s, "iotkit-secctl-s-regs", 0x1000); | ||
494 | @@ -XXX,XX +XXX,XX @@ static void iotkit_secctl_init(Object *obj) | ||
495 | sysbus_init_mmio(sbd, &s->ns_regs); | ||
496 | } | ||
497 | |||
498 | +static const VMStateDescription iotkit_secctl_ppc_vmstate = { | ||
499 | + .name = "iotkit-secctl-ppc", | ||
500 | + .version_id = 1, | ||
501 | + .minimum_version_id = 1, | ||
502 | + .fields = (VMStateField[]) { | ||
503 | + VMSTATE_UINT32(ns, IoTKitSecCtlPPC), | ||
504 | + VMSTATE_UINT32(sp, IoTKitSecCtlPPC), | ||
505 | + VMSTATE_UINT32(nsp, IoTKitSecCtlPPC), | ||
506 | + VMSTATE_END_OF_LIST() | ||
507 | + } | ||
508 | +}; | 67 | +}; |
509 | + | 68 | + |
510 | static const VMStateDescription iotkit_secctl_vmstate = { | 69 | static CPAccessResult nsacr_access(CPUARMState *env, const ARMCPRegInfo *ri, |
511 | .name = "iotkit-secctl", | 70 | bool isread) |
512 | .version_id = 1, | 71 | { |
513 | .minimum_version_id = 1, | 72 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) |
514 | .fields = (VMStateField[]) { | 73 | if (arm_feature(env, ARM_FEATURE_V8)) { |
515 | + VMSTATE_UINT32(secppcintstat, IoTKitSecCtl), | 74 | define_arm_cp_regs(cpu, el2_v8_cp_reginfo); |
516 | + VMSTATE_UINT32(secppcinten, IoTKitSecCtl), | 75 | } |
517 | + VMSTATE_UINT32(secrespcfg, IoTKitSecCtl), | 76 | + if (cpu_isar_feature(aa64_sel2, cpu)) { |
518 | + VMSTATE_STRUCT_ARRAY(apb, IoTKitSecCtl, IOTS_NUM_APB_PPC, 1, | 77 | + define_arm_cp_regs(cpu, el2_sec_cp_reginfo); |
519 | + iotkit_secctl_ppc_vmstate, IoTKitSecCtlPPC), | 78 | + } |
520 | + VMSTATE_STRUCT_ARRAY(apbexp, IoTKitSecCtl, IOTS_NUM_APB_EXP_PPC, 1, | 79 | /* RVBAR_EL2 is only implemented if EL2 is the highest EL */ |
521 | + iotkit_secctl_ppc_vmstate, IoTKitSecCtlPPC), | 80 | if (!arm_feature(env, ARM_FEATURE_EL3)) { |
522 | + VMSTATE_STRUCT_ARRAY(ahbexp, IoTKitSecCtl, IOTS_NUM_AHB_EXP_PPC, 1, | 81 | ARMCPRegInfo rvbar = { |
523 | + iotkit_secctl_ppc_vmstate, IoTKitSecCtlPPC), | ||
524 | VMSTATE_END_OF_LIST() | ||
525 | } | ||
526 | }; | ||
527 | -- | 82 | -- |
528 | 2.16.2 | 83 | 2.20.1 |
529 | 84 | ||
530 | 85 | diff view generated by jsdifflib |
1 | Define a new board model for the MPS2 with an AN505 FPGA image | 1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
---|---|---|---|
2 | containing a Cortex-M33. Since the FPGA images for TrustZone | ||
3 | cores (AN505, and the similar AN519 for Cortex-M23) have a | ||
4 | significantly different layout of devices to the non-TrustZone | ||
5 | images, we use a new source file rather than shoehorning them | ||
6 | into the existing mps2.c. | ||
7 | 2 | ||
3 | The VTTBR write callback so far assumes that the underlying VM lies in | ||
4 | non-secure state. This handles the secure state scenario. | ||
5 | |||
6 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20210112104511.36576-10-remi.denis.courmont@huawei.com | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
10 | Message-id: 20180220180325.29818-20-peter.maydell@linaro.org | ||
11 | --- | 10 | --- |
12 | hw/arm/Makefile.objs | 1 + | 11 | target/arm/helper.c | 13 +++++++++---- |
13 | hw/arm/mps2-tz.c | 503 +++++++++++++++++++++++++++++++++++++++++++++++++++ | 12 | 1 file changed, 9 insertions(+), 4 deletions(-) |
14 | 2 files changed, 504 insertions(+) | ||
15 | create mode 100644 hw/arm/mps2-tz.c | ||
16 | 13 | ||
17 | diff --git a/hw/arm/Makefile.objs b/hw/arm/Makefile.objs | 14 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
18 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
19 | --- a/hw/arm/Makefile.objs | 16 | --- a/target/arm/helper.c |
20 | +++ b/hw/arm/Makefile.objs | 17 | +++ b/target/arm/helper.c |
21 | @@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_FSL_IMX31) += fsl-imx31.o kzm.o | 18 | @@ -XXX,XX +XXX,XX @@ static void vttbr_write(CPUARMState *env, const ARMCPRegInfo *ri, |
22 | obj-$(CONFIG_FSL_IMX6) += fsl-imx6.o sabrelite.o | 19 | * the combined stage 1&2 tlbs (EL10_1 and EL10_0). |
23 | obj-$(CONFIG_ASPEED_SOC) += aspeed_soc.o aspeed.o | 20 | */ |
24 | obj-$(CONFIG_MPS2) += mps2.o | 21 | if (raw_read(env, ri) != value) { |
25 | +obj-$(CONFIG_MPS2) += mps2-tz.o | 22 | - tlb_flush_by_mmuidx(cs, |
26 | obj-$(CONFIG_MSF2) += msf2-soc.o msf2-som.o | 23 | - ARMMMUIdxBit_E10_1 | |
27 | obj-$(CONFIG_IOTKIT) += iotkit.o | 24 | - ARMMMUIdxBit_E10_1_PAN | |
28 | diff --git a/hw/arm/mps2-tz.c b/hw/arm/mps2-tz.c | 25 | - ARMMMUIdxBit_E10_0); |
29 | new file mode 100644 | 26 | + uint16_t mask = ARMMMUIdxBit_E10_1 | |
30 | index XXXXXXX..XXXXXXX | 27 | + ARMMMUIdxBit_E10_1_PAN | |
31 | --- /dev/null | 28 | + ARMMMUIdxBit_E10_0; |
32 | +++ b/hw/arm/mps2-tz.c | ||
33 | @@ -XXX,XX +XXX,XX @@ | ||
34 | +/* | ||
35 | + * ARM V2M MPS2 board emulation, trustzone aware FPGA images | ||
36 | + * | ||
37 | + * Copyright (c) 2017 Linaro Limited | ||
38 | + * Written by Peter Maydell | ||
39 | + * | ||
40 | + * This program is free software; you can redistribute it and/or modify | ||
41 | + * it under the terms of the GNU General Public License version 2 or | ||
42 | + * (at your option) any later version. | ||
43 | + */ | ||
44 | + | 29 | + |
45 | +/* The MPS2 and MPS2+ dev boards are FPGA based (the 2+ has a bigger | 30 | + if (arm_is_secure_below_el3(env)) { |
46 | + * FPGA but is otherwise the same as the 2). Since the CPU itself | 31 | + mask >>= ARM_MMU_IDX_A_NS; |
47 | + * and most of the devices are in the FPGA, the details of the board | ||
48 | + * as seen by the guest depend significantly on the FPGA image. | ||
49 | + * This source file covers the following FPGA images, for TrustZone cores: | ||
50 | + * "mps2-an505" -- Cortex-M33 as documented in ARM Application Note AN505 | ||
51 | + * | ||
52 | + * Links to the TRM for the board itself and to the various Application | ||
53 | + * Notes which document the FPGA images can be found here: | ||
54 | + * https://developer.arm.com/products/system-design/development-boards/fpga-prototyping-boards/mps2 | ||
55 | + * | ||
56 | + * Board TRM: | ||
57 | + * http://infocenter.arm.com/help/topic/com.arm.doc.100112_0200_06_en/versatile_express_cortex_m_prototyping_systems_v2m_mps2_and_v2m_mps2plus_technical_reference_100112_0200_06_en.pdf | ||
58 | + * Application Note AN505: | ||
59 | + * http://infocenter.arm.com/help/topic/com.arm.doc.dai0505b/index.html | ||
60 | + * | ||
61 | + * The AN505 defers to the Cortex-M33 processor ARMv8M IoT Kit FVP User Guide | ||
62 | + * (ARM ECM0601256) for the details of some of the device layout: | ||
63 | + * http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ecm0601256/index.html | ||
64 | + */ | ||
65 | + | ||
66 | +#include "qemu/osdep.h" | ||
67 | +#include "qapi/error.h" | ||
68 | +#include "qemu/error-report.h" | ||
69 | +#include "hw/arm/arm.h" | ||
70 | +#include "hw/arm/armv7m.h" | ||
71 | +#include "hw/or-irq.h" | ||
72 | +#include "hw/boards.h" | ||
73 | +#include "exec/address-spaces.h" | ||
74 | +#include "sysemu/sysemu.h" | ||
75 | +#include "hw/misc/unimp.h" | ||
76 | +#include "hw/char/cmsdk-apb-uart.h" | ||
77 | +#include "hw/timer/cmsdk-apb-timer.h" | ||
78 | +#include "hw/misc/mps2-scc.h" | ||
79 | +#include "hw/misc/mps2-fpgaio.h" | ||
80 | +#include "hw/arm/iotkit.h" | ||
81 | +#include "hw/devices.h" | ||
82 | +#include "net/net.h" | ||
83 | +#include "hw/core/split-irq.h" | ||
84 | + | ||
85 | +typedef enum MPS2TZFPGAType { | ||
86 | + FPGA_AN505, | ||
87 | +} MPS2TZFPGAType; | ||
88 | + | ||
89 | +typedef struct { | ||
90 | + MachineClass parent; | ||
91 | + MPS2TZFPGAType fpga_type; | ||
92 | + uint32_t scc_id; | ||
93 | +} MPS2TZMachineClass; | ||
94 | + | ||
95 | +typedef struct { | ||
96 | + MachineState parent; | ||
97 | + | ||
98 | + IoTKit iotkit; | ||
99 | + MemoryRegion psram; | ||
100 | + MemoryRegion ssram1; | ||
101 | + MemoryRegion ssram1_m; | ||
102 | + MemoryRegion ssram23; | ||
103 | + MPS2SCC scc; | ||
104 | + MPS2FPGAIO fpgaio; | ||
105 | + TZPPC ppc[5]; | ||
106 | + UnimplementedDeviceState ssram_mpc[3]; | ||
107 | + UnimplementedDeviceState spi[5]; | ||
108 | + UnimplementedDeviceState i2c[4]; | ||
109 | + UnimplementedDeviceState i2s_audio; | ||
110 | + UnimplementedDeviceState gpio[5]; | ||
111 | + UnimplementedDeviceState dma[4]; | ||
112 | + UnimplementedDeviceState gfx; | ||
113 | + CMSDKAPBUART uart[5]; | ||
114 | + SplitIRQ sec_resp_splitter; | ||
115 | + qemu_or_irq uart_irq_orgate; | ||
116 | +} MPS2TZMachineState; | ||
117 | + | ||
118 | +#define TYPE_MPS2TZ_MACHINE "mps2tz" | ||
119 | +#define TYPE_MPS2TZ_AN505_MACHINE MACHINE_TYPE_NAME("mps2-an505") | ||
120 | + | ||
121 | +#define MPS2TZ_MACHINE(obj) \ | ||
122 | + OBJECT_CHECK(MPS2TZMachineState, obj, TYPE_MPS2TZ_MACHINE) | ||
123 | +#define MPS2TZ_MACHINE_GET_CLASS(obj) \ | ||
124 | + OBJECT_GET_CLASS(MPS2TZMachineClass, obj, TYPE_MPS2TZ_MACHINE) | ||
125 | +#define MPS2TZ_MACHINE_CLASS(klass) \ | ||
126 | + OBJECT_CLASS_CHECK(MPS2TZMachineClass, klass, TYPE_MPS2TZ_MACHINE) | ||
127 | + | ||
128 | +/* Main SYSCLK frequency in Hz */ | ||
129 | +#define SYSCLK_FRQ 20000000 | ||
130 | + | ||
131 | +/* Initialize the auxiliary RAM region @mr and map it into | ||
132 | + * the memory map at @base. | ||
133 | + */ | ||
134 | +static void make_ram(MemoryRegion *mr, const char *name, | ||
135 | + hwaddr base, hwaddr size) | ||
136 | +{ | ||
137 | + memory_region_init_ram(mr, NULL, name, size, &error_fatal); | ||
138 | + memory_region_add_subregion(get_system_memory(), base, mr); | ||
139 | +} | ||
140 | + | ||
141 | +/* Create an alias of an entire original MemoryRegion @orig | ||
142 | + * located at @base in the memory map. | ||
143 | + */ | ||
144 | +static void make_ram_alias(MemoryRegion *mr, const char *name, | ||
145 | + MemoryRegion *orig, hwaddr base) | ||
146 | +{ | ||
147 | + memory_region_init_alias(mr, NULL, name, orig, 0, | ||
148 | + memory_region_size(orig)); | ||
149 | + memory_region_add_subregion(get_system_memory(), base, mr); | ||
150 | +} | ||
151 | + | ||
152 | +static void init_sysbus_child(Object *parent, const char *childname, | ||
153 | + void *child, size_t childsize, | ||
154 | + const char *childtype) | ||
155 | +{ | ||
156 | + object_initialize(child, childsize, childtype); | ||
157 | + object_property_add_child(parent, childname, OBJECT(child), &error_abort); | ||
158 | + qdev_set_parent_bus(DEVICE(child), sysbus_get_default()); | ||
159 | + | ||
160 | +} | ||
161 | + | ||
162 | +/* Most of the devices in the AN505 FPGA image sit behind | ||
163 | + * Peripheral Protection Controllers. These data structures | ||
164 | + * define the layout of which devices sit behind which PPCs. | ||
165 | + * The devfn for each port is a function which creates, configures | ||
166 | + * and initializes the device, returning the MemoryRegion which | ||
167 | + * needs to be plugged into the downstream end of the PPC port. | ||
168 | + */ | ||
169 | +typedef MemoryRegion *MakeDevFn(MPS2TZMachineState *mms, void *opaque, | ||
170 | + const char *name, hwaddr size); | ||
171 | + | ||
172 | +typedef struct PPCPortInfo { | ||
173 | + const char *name; | ||
174 | + MakeDevFn *devfn; | ||
175 | + void *opaque; | ||
176 | + hwaddr addr; | ||
177 | + hwaddr size; | ||
178 | +} PPCPortInfo; | ||
179 | + | ||
180 | +typedef struct PPCInfo { | ||
181 | + const char *name; | ||
182 | + PPCPortInfo ports[TZ_NUM_PORTS]; | ||
183 | +} PPCInfo; | ||
184 | + | ||
185 | +static MemoryRegion *make_unimp_dev(MPS2TZMachineState *mms, | ||
186 | + void *opaque, | ||
187 | + const char *name, hwaddr size) | ||
188 | +{ | ||
189 | + /* Initialize, configure and realize a TYPE_UNIMPLEMENTED_DEVICE, | ||
190 | + * and return a pointer to its MemoryRegion. | ||
191 | + */ | ||
192 | + UnimplementedDeviceState *uds = opaque; | ||
193 | + | ||
194 | + init_sysbus_child(OBJECT(mms), name, uds, | ||
195 | + sizeof(UnimplementedDeviceState), | ||
196 | + TYPE_UNIMPLEMENTED_DEVICE); | ||
197 | + qdev_prop_set_string(DEVICE(uds), "name", name); | ||
198 | + qdev_prop_set_uint64(DEVICE(uds), "size", size); | ||
199 | + object_property_set_bool(OBJECT(uds), true, "realized", &error_fatal); | ||
200 | + return sysbus_mmio_get_region(SYS_BUS_DEVICE(uds), 0); | ||
201 | +} | ||
202 | + | ||
203 | +static MemoryRegion *make_uart(MPS2TZMachineState *mms, void *opaque, | ||
204 | + const char *name, hwaddr size) | ||
205 | +{ | ||
206 | + CMSDKAPBUART *uart = opaque; | ||
207 | + int i = uart - &mms->uart[0]; | ||
208 | + Chardev *uartchr = i < MAX_SERIAL_PORTS ? serial_hds[i] : NULL; | ||
209 | + int rxirqno = i * 2; | ||
210 | + int txirqno = i * 2 + 1; | ||
211 | + int combirqno = i + 10; | ||
212 | + SysBusDevice *s; | ||
213 | + DeviceState *iotkitdev = DEVICE(&mms->iotkit); | ||
214 | + DeviceState *orgate_dev = DEVICE(&mms->uart_irq_orgate); | ||
215 | + | ||
216 | + init_sysbus_child(OBJECT(mms), name, uart, | ||
217 | + sizeof(mms->uart[0]), TYPE_CMSDK_APB_UART); | ||
218 | + qdev_prop_set_chr(DEVICE(uart), "chardev", uartchr); | ||
219 | + qdev_prop_set_uint32(DEVICE(uart), "pclk-frq", SYSCLK_FRQ); | ||
220 | + object_property_set_bool(OBJECT(uart), true, "realized", &error_fatal); | ||
221 | + s = SYS_BUS_DEVICE(uart); | ||
222 | + sysbus_connect_irq(s, 0, qdev_get_gpio_in_named(iotkitdev, | ||
223 | + "EXP_IRQ", txirqno)); | ||
224 | + sysbus_connect_irq(s, 1, qdev_get_gpio_in_named(iotkitdev, | ||
225 | + "EXP_IRQ", rxirqno)); | ||
226 | + sysbus_connect_irq(s, 2, qdev_get_gpio_in(orgate_dev, i * 2)); | ||
227 | + sysbus_connect_irq(s, 3, qdev_get_gpio_in(orgate_dev, i * 2 + 1)); | ||
228 | + sysbus_connect_irq(s, 4, qdev_get_gpio_in_named(iotkitdev, | ||
229 | + "EXP_IRQ", combirqno)); | ||
230 | + return sysbus_mmio_get_region(SYS_BUS_DEVICE(uart), 0); | ||
231 | +} | ||
232 | + | ||
233 | +static MemoryRegion *make_scc(MPS2TZMachineState *mms, void *opaque, | ||
234 | + const char *name, hwaddr size) | ||
235 | +{ | ||
236 | + MPS2SCC *scc = opaque; | ||
237 | + DeviceState *sccdev; | ||
238 | + MPS2TZMachineClass *mmc = MPS2TZ_MACHINE_GET_CLASS(mms); | ||
239 | + | ||
240 | + object_initialize(scc, sizeof(mms->scc), TYPE_MPS2_SCC); | ||
241 | + sccdev = DEVICE(scc); | ||
242 | + qdev_set_parent_bus(sccdev, sysbus_get_default()); | ||
243 | + qdev_prop_set_uint32(sccdev, "scc-cfg4", 0x2); | ||
244 | + qdev_prop_set_uint32(sccdev, "scc-aid", 0x02000008); | ||
245 | + qdev_prop_set_uint32(sccdev, "scc-id", mmc->scc_id); | ||
246 | + object_property_set_bool(OBJECT(scc), true, "realized", &error_fatal); | ||
247 | + return sysbus_mmio_get_region(SYS_BUS_DEVICE(sccdev), 0); | ||
248 | +} | ||
249 | + | ||
250 | +static MemoryRegion *make_fpgaio(MPS2TZMachineState *mms, void *opaque, | ||
251 | + const char *name, hwaddr size) | ||
252 | +{ | ||
253 | + MPS2FPGAIO *fpgaio = opaque; | ||
254 | + | ||
255 | + object_initialize(fpgaio, sizeof(mms->fpgaio), TYPE_MPS2_FPGAIO); | ||
256 | + qdev_set_parent_bus(DEVICE(fpgaio), sysbus_get_default()); | ||
257 | + object_property_set_bool(OBJECT(fpgaio), true, "realized", &error_fatal); | ||
258 | + return sysbus_mmio_get_region(SYS_BUS_DEVICE(fpgaio), 0); | ||
259 | +} | ||
260 | + | ||
261 | +static void mps2tz_common_init(MachineState *machine) | ||
262 | +{ | ||
263 | + MPS2TZMachineState *mms = MPS2TZ_MACHINE(machine); | ||
264 | + MachineClass *mc = MACHINE_GET_CLASS(machine); | ||
265 | + MemoryRegion *system_memory = get_system_memory(); | ||
266 | + DeviceState *iotkitdev; | ||
267 | + DeviceState *dev_splitter; | ||
268 | + int i; | ||
269 | + | ||
270 | + if (strcmp(machine->cpu_type, mc->default_cpu_type) != 0) { | ||
271 | + error_report("This board can only be used with CPU %s", | ||
272 | + mc->default_cpu_type); | ||
273 | + exit(1); | ||
274 | + } | ||
275 | + | ||
276 | + init_sysbus_child(OBJECT(machine), "iotkit", &mms->iotkit, | ||
277 | + sizeof(mms->iotkit), TYPE_IOTKIT); | ||
278 | + iotkitdev = DEVICE(&mms->iotkit); | ||
279 | + object_property_set_link(OBJECT(&mms->iotkit), OBJECT(system_memory), | ||
280 | + "memory", &error_abort); | ||
281 | + qdev_prop_set_uint32(iotkitdev, "EXP_NUMIRQ", 92); | ||
282 | + qdev_prop_set_uint32(iotkitdev, "MAINCLK", SYSCLK_FRQ); | ||
283 | + object_property_set_bool(OBJECT(&mms->iotkit), true, "realized", | ||
284 | + &error_fatal); | ||
285 | + | ||
286 | + /* The sec_resp_cfg output from the IoTKit must be split into multiple | ||
287 | + * lines, one for each of the PPCs we create here. | ||
288 | + */ | ||
289 | + object_initialize(&mms->sec_resp_splitter, sizeof(mms->sec_resp_splitter), | ||
290 | + TYPE_SPLIT_IRQ); | ||
291 | + object_property_add_child(OBJECT(machine), "sec-resp-splitter", | ||
292 | + OBJECT(&mms->sec_resp_splitter), &error_abort); | ||
293 | + object_property_set_int(OBJECT(&mms->sec_resp_splitter), 5, | ||
294 | + "num-lines", &error_fatal); | ||
295 | + object_property_set_bool(OBJECT(&mms->sec_resp_splitter), true, | ||
296 | + "realized", &error_fatal); | ||
297 | + dev_splitter = DEVICE(&mms->sec_resp_splitter); | ||
298 | + qdev_connect_gpio_out_named(iotkitdev, "sec_resp_cfg", 0, | ||
299 | + qdev_get_gpio_in(dev_splitter, 0)); | ||
300 | + | ||
301 | + /* The IoTKit sets up much of the memory layout, including | ||
302 | + * the aliases between secure and non-secure regions in the | ||
303 | + * address space. The FPGA itself contains: | ||
304 | + * | ||
305 | + * 0x00000000..0x003fffff SSRAM1 | ||
306 | + * 0x00400000..0x007fffff alias of SSRAM1 | ||
307 | + * 0x28000000..0x283fffff 4MB SSRAM2 + SSRAM3 | ||
308 | + * 0x40100000..0x4fffffff AHB Master Expansion 1 interface devices | ||
309 | + * 0x80000000..0x80ffffff 16MB PSRAM | ||
310 | + */ | ||
311 | + | ||
312 | + /* The FPGA images have an odd combination of different RAMs, | ||
313 | + * because in hardware they are different implementations and | ||
314 | + * connected to different buses, giving varying performance/size | ||
315 | + * tradeoffs. For QEMU they're all just RAM, though. We arbitrarily | ||
316 | + * call the 16MB our "system memory", as it's the largest lump. | ||
317 | + */ | ||
318 | + memory_region_allocate_system_memory(&mms->psram, | ||
319 | + NULL, "mps.ram", 0x01000000); | ||
320 | + memory_region_add_subregion(system_memory, 0x80000000, &mms->psram); | ||
321 | + | ||
322 | + /* The SSRAM memories should all be behind Memory Protection Controllers, | ||
323 | + * but we don't implement that yet. | ||
324 | + */ | ||
325 | + make_ram(&mms->ssram1, "mps.ssram1", 0x00000000, 0x00400000); | ||
326 | + make_ram_alias(&mms->ssram1_m, "mps.ssram1_m", &mms->ssram1, 0x00400000); | ||
327 | + | ||
328 | + make_ram(&mms->ssram23, "mps.ssram23", 0x28000000, 0x00400000); | ||
329 | + | ||
330 | + /* The overflow IRQs for all UARTs are ORed together. | ||
331 | + * Tx, Rx and "combined" IRQs are sent to the NVIC separately. | ||
332 | + * Create the OR gate for this. | ||
333 | + */ | ||
334 | + object_initialize(&mms->uart_irq_orgate, sizeof(mms->uart_irq_orgate), | ||
335 | + TYPE_OR_IRQ); | ||
336 | + object_property_add_child(OBJECT(mms), "uart-irq-orgate", | ||
337 | + OBJECT(&mms->uart_irq_orgate), &error_abort); | ||
338 | + object_property_set_int(OBJECT(&mms->uart_irq_orgate), 10, "num-lines", | ||
339 | + &error_fatal); | ||
340 | + object_property_set_bool(OBJECT(&mms->uart_irq_orgate), true, | ||
341 | + "realized", &error_fatal); | ||
342 | + qdev_connect_gpio_out(DEVICE(&mms->uart_irq_orgate), 0, | ||
343 | + qdev_get_gpio_in_named(iotkitdev, "EXP_IRQ", 15)); | ||
344 | + | ||
345 | + /* Most of the devices in the FPGA are behind Peripheral Protection | ||
346 | + * Controllers. The required order for initializing things is: | ||
347 | + * + initialize the PPC | ||
348 | + * + initialize, configure and realize downstream devices | ||
349 | + * + connect downstream device MemoryRegions to the PPC | ||
350 | + * + realize the PPC | ||
351 | + * + map the PPC's MemoryRegions to the places in the address map | ||
352 | + * where the downstream devices should appear | ||
353 | + * + wire up the PPC's control lines to the IoTKit object | ||
354 | + */ | ||
355 | + | ||
356 | + const PPCInfo ppcs[] = { { | ||
357 | + .name = "apb_ppcexp0", | ||
358 | + .ports = { | ||
359 | + { "ssram-mpc0", make_unimp_dev, &mms->ssram_mpc[0], | ||
360 | + 0x58007000, 0x1000 }, | ||
361 | + { "ssram-mpc1", make_unimp_dev, &mms->ssram_mpc[1], | ||
362 | + 0x58008000, 0x1000 }, | ||
363 | + { "ssram-mpc2", make_unimp_dev, &mms->ssram_mpc[2], | ||
364 | + 0x58009000, 0x1000 }, | ||
365 | + }, | ||
366 | + }, { | ||
367 | + .name = "apb_ppcexp1", | ||
368 | + .ports = { | ||
369 | + { "spi0", make_unimp_dev, &mms->spi[0], 0x40205000, 0x1000 }, | ||
370 | + { "spi1", make_unimp_dev, &mms->spi[1], 0x40206000, 0x1000 }, | ||
371 | + { "spi2", make_unimp_dev, &mms->spi[2], 0x40209000, 0x1000 }, | ||
372 | + { "spi3", make_unimp_dev, &mms->spi[3], 0x4020a000, 0x1000 }, | ||
373 | + { "spi4", make_unimp_dev, &mms->spi[4], 0x4020b000, 0x1000 }, | ||
374 | + { "uart0", make_uart, &mms->uart[0], 0x40200000, 0x1000 }, | ||
375 | + { "uart1", make_uart, &mms->uart[1], 0x40201000, 0x1000 }, | ||
376 | + { "uart2", make_uart, &mms->uart[2], 0x40202000, 0x1000 }, | ||
377 | + { "uart3", make_uart, &mms->uart[3], 0x40203000, 0x1000 }, | ||
378 | + { "uart4", make_uart, &mms->uart[4], 0x40204000, 0x1000 }, | ||
379 | + { "i2c0", make_unimp_dev, &mms->i2c[0], 0x40207000, 0x1000 }, | ||
380 | + { "i2c1", make_unimp_dev, &mms->i2c[1], 0x40208000, 0x1000 }, | ||
381 | + { "i2c2", make_unimp_dev, &mms->i2c[2], 0x4020c000, 0x1000 }, | ||
382 | + { "i2c3", make_unimp_dev, &mms->i2c[3], 0x4020d000, 0x1000 }, | ||
383 | + }, | ||
384 | + }, { | ||
385 | + .name = "apb_ppcexp2", | ||
386 | + .ports = { | ||
387 | + { "scc", make_scc, &mms->scc, 0x40300000, 0x1000 }, | ||
388 | + { "i2s-audio", make_unimp_dev, &mms->i2s_audio, | ||
389 | + 0x40301000, 0x1000 }, | ||
390 | + { "fpgaio", make_fpgaio, &mms->fpgaio, 0x40302000, 0x1000 }, | ||
391 | + }, | ||
392 | + }, { | ||
393 | + .name = "ahb_ppcexp0", | ||
394 | + .ports = { | ||
395 | + { "gfx", make_unimp_dev, &mms->gfx, 0x41000000, 0x140000 }, | ||
396 | + { "gpio0", make_unimp_dev, &mms->gpio[0], 0x40100000, 0x1000 }, | ||
397 | + { "gpio1", make_unimp_dev, &mms->gpio[1], 0x40101000, 0x1000 }, | ||
398 | + { "gpio2", make_unimp_dev, &mms->gpio[2], 0x40102000, 0x1000 }, | ||
399 | + { "gpio3", make_unimp_dev, &mms->gpio[3], 0x40103000, 0x1000 }, | ||
400 | + { "gpio4", make_unimp_dev, &mms->gpio[4], 0x40104000, 0x1000 }, | ||
401 | + }, | ||
402 | + }, { | ||
403 | + .name = "ahb_ppcexp1", | ||
404 | + .ports = { | ||
405 | + { "dma0", make_unimp_dev, &mms->dma[0], 0x40110000, 0x1000 }, | ||
406 | + { "dma1", make_unimp_dev, &mms->dma[1], 0x40111000, 0x1000 }, | ||
407 | + { "dma2", make_unimp_dev, &mms->dma[2], 0x40112000, 0x1000 }, | ||
408 | + { "dma3", make_unimp_dev, &mms->dma[3], 0x40113000, 0x1000 }, | ||
409 | + }, | ||
410 | + }, | ||
411 | + }; | ||
412 | + | ||
413 | + for (i = 0; i < ARRAY_SIZE(ppcs); i++) { | ||
414 | + const PPCInfo *ppcinfo = &ppcs[i]; | ||
415 | + TZPPC *ppc = &mms->ppc[i]; | ||
416 | + DeviceState *ppcdev; | ||
417 | + int port; | ||
418 | + char *gpioname; | ||
419 | + | ||
420 | + init_sysbus_child(OBJECT(machine), ppcinfo->name, ppc, | ||
421 | + sizeof(TZPPC), TYPE_TZ_PPC); | ||
422 | + ppcdev = DEVICE(ppc); | ||
423 | + | ||
424 | + for (port = 0; port < TZ_NUM_PORTS; port++) { | ||
425 | + const PPCPortInfo *pinfo = &ppcinfo->ports[port]; | ||
426 | + MemoryRegion *mr; | ||
427 | + char *portname; | ||
428 | + | ||
429 | + if (!pinfo->devfn) { | ||
430 | + continue; | ||
431 | + } | ||
432 | + | ||
433 | + mr = pinfo->devfn(mms, pinfo->opaque, pinfo->name, pinfo->size); | ||
434 | + portname = g_strdup_printf("port[%d]", port); | ||
435 | + object_property_set_link(OBJECT(ppc), OBJECT(mr), | ||
436 | + portname, &error_fatal); | ||
437 | + g_free(portname); | ||
438 | + } | 32 | + } |
439 | + | 33 | + |
440 | + object_property_set_bool(OBJECT(ppc), true, "realized", &error_fatal); | 34 | + tlb_flush_by_mmuidx(cs, mask); |
441 | + | 35 | raw_write(env, ri, value); |
442 | + for (port = 0; port < TZ_NUM_PORTS; port++) { | 36 | } |
443 | + const PPCPortInfo *pinfo = &ppcinfo->ports[port]; | 37 | } |
444 | + | ||
445 | + if (!pinfo->devfn) { | ||
446 | + continue; | ||
447 | + } | ||
448 | + sysbus_mmio_map(SYS_BUS_DEVICE(ppc), port, pinfo->addr); | ||
449 | + | ||
450 | + gpioname = g_strdup_printf("%s_nonsec", ppcinfo->name); | ||
451 | + qdev_connect_gpio_out_named(iotkitdev, gpioname, port, | ||
452 | + qdev_get_gpio_in_named(ppcdev, | ||
453 | + "cfg_nonsec", | ||
454 | + port)); | ||
455 | + g_free(gpioname); | ||
456 | + gpioname = g_strdup_printf("%s_ap", ppcinfo->name); | ||
457 | + qdev_connect_gpio_out_named(iotkitdev, gpioname, port, | ||
458 | + qdev_get_gpio_in_named(ppcdev, | ||
459 | + "cfg_ap", port)); | ||
460 | + g_free(gpioname); | ||
461 | + } | ||
462 | + | ||
463 | + gpioname = g_strdup_printf("%s_irq_enable", ppcinfo->name); | ||
464 | + qdev_connect_gpio_out_named(iotkitdev, gpioname, 0, | ||
465 | + qdev_get_gpio_in_named(ppcdev, | ||
466 | + "irq_enable", 0)); | ||
467 | + g_free(gpioname); | ||
468 | + gpioname = g_strdup_printf("%s_irq_clear", ppcinfo->name); | ||
469 | + qdev_connect_gpio_out_named(iotkitdev, gpioname, 0, | ||
470 | + qdev_get_gpio_in_named(ppcdev, | ||
471 | + "irq_clear", 0)); | ||
472 | + g_free(gpioname); | ||
473 | + gpioname = g_strdup_printf("%s_irq_status", ppcinfo->name); | ||
474 | + qdev_connect_gpio_out_named(ppcdev, "irq", 0, | ||
475 | + qdev_get_gpio_in_named(iotkitdev, | ||
476 | + gpioname, 0)); | ||
477 | + g_free(gpioname); | ||
478 | + | ||
479 | + qdev_connect_gpio_out(dev_splitter, i, | ||
480 | + qdev_get_gpio_in_named(ppcdev, | ||
481 | + "cfg_sec_resp", 0)); | ||
482 | + } | ||
483 | + | ||
484 | + /* In hardware this is a LAN9220; the LAN9118 is software compatible | ||
485 | + * except that it doesn't support the checksum-offload feature. | ||
486 | + * The ethernet controller is not behind a PPC. | ||
487 | + */ | ||
488 | + lan9118_init(&nd_table[0], 0x42000000, | ||
489 | + qdev_get_gpio_in_named(iotkitdev, "EXP_IRQ", 16)); | ||
490 | + | ||
491 | + create_unimplemented_device("FPGA NS PC", 0x48007000, 0x1000); | ||
492 | + | ||
493 | + armv7m_load_kernel(ARM_CPU(first_cpu), machine->kernel_filename, 0x400000); | ||
494 | +} | ||
495 | + | ||
496 | +static void mps2tz_class_init(ObjectClass *oc, void *data) | ||
497 | +{ | ||
498 | + MachineClass *mc = MACHINE_CLASS(oc); | ||
499 | + | ||
500 | + mc->init = mps2tz_common_init; | ||
501 | + mc->max_cpus = 1; | ||
502 | +} | ||
503 | + | ||
504 | +static void mps2tz_an505_class_init(ObjectClass *oc, void *data) | ||
505 | +{ | ||
506 | + MachineClass *mc = MACHINE_CLASS(oc); | ||
507 | + MPS2TZMachineClass *mmc = MPS2TZ_MACHINE_CLASS(oc); | ||
508 | + | ||
509 | + mc->desc = "ARM MPS2 with AN505 FPGA image for Cortex-M33"; | ||
510 | + mmc->fpga_type = FPGA_AN505; | ||
511 | + mc->default_cpu_type = ARM_CPU_TYPE_NAME("cortex-m33"); | ||
512 | + mmc->scc_id = 0x41040000 | (505 << 4); | ||
513 | +} | ||
514 | + | ||
515 | +static const TypeInfo mps2tz_info = { | ||
516 | + .name = TYPE_MPS2TZ_MACHINE, | ||
517 | + .parent = TYPE_MACHINE, | ||
518 | + .abstract = true, | ||
519 | + .instance_size = sizeof(MPS2TZMachineState), | ||
520 | + .class_size = sizeof(MPS2TZMachineClass), | ||
521 | + .class_init = mps2tz_class_init, | ||
522 | +}; | ||
523 | + | ||
524 | +static const TypeInfo mps2tz_an505_info = { | ||
525 | + .name = TYPE_MPS2TZ_AN505_MACHINE, | ||
526 | + .parent = TYPE_MPS2TZ_MACHINE, | ||
527 | + .class_init = mps2tz_an505_class_init, | ||
528 | +}; | ||
529 | + | ||
530 | +static void mps2tz_machine_init(void) | ||
531 | +{ | ||
532 | + type_register_static(&mps2tz_info); | ||
533 | + type_register_static(&mps2tz_an505_info); | ||
534 | +} | ||
535 | + | ||
536 | +type_init(mps2tz_machine_init); | ||
537 | -- | 38 | -- |
538 | 2.16.2 | 39 | 2.20.1 |
539 | 40 | ||
540 | 41 | diff view generated by jsdifflib |
1 | Model the Arm IoT Kit documented in | 1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
---|---|---|---|
2 | http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ecm0601256/index.html | ||
3 | 2 | ||
4 | The Arm IoT Kit is a subsystem which includes a CPU and some devices, | 3 | In the secure stage 2 translation regime, the VSTCR.SW and VTCR.NSW |
5 | and is intended be extended by adding extra devices to form a | 4 | bits can invert the secure flag for pagetable walks. This patchset |
6 | complete system. It is used in the MPS2 board's AN505 image for the | 5 | allows S1_ptw_translate() to change the non-secure bit. |
7 | Cortex-M33. | ||
8 | 6 | ||
7 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Message-id: 20210112104511.36576-11-remi.denis.courmont@huawei.com | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
11 | Message-id: 20180220180325.29818-19-peter.maydell@linaro.org | ||
12 | --- | 11 | --- |
13 | hw/arm/Makefile.objs | 1 + | 12 | target/arm/helper.c | 9 ++++++--- |
14 | include/hw/arm/iotkit.h | 109 ++++++++ | 13 | 1 file changed, 6 insertions(+), 3 deletions(-) |
15 | hw/arm/iotkit.c | 598 ++++++++++++++++++++++++++++++++++++++++ | ||
16 | default-configs/arm-softmmu.mak | 1 + | ||
17 | 4 files changed, 709 insertions(+) | ||
18 | create mode 100644 include/hw/arm/iotkit.h | ||
19 | create mode 100644 hw/arm/iotkit.c | ||
20 | 14 | ||
21 | diff --git a/hw/arm/Makefile.objs b/hw/arm/Makefile.objs | 15 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
22 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
23 | --- a/hw/arm/Makefile.objs | 17 | --- a/target/arm/helper.c |
24 | +++ b/hw/arm/Makefile.objs | 18 | +++ b/target/arm/helper.c |
25 | @@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_FSL_IMX6) += fsl-imx6.o sabrelite.o | 19 | @@ -XXX,XX +XXX,XX @@ static bool get_level1_table_address(CPUARMState *env, ARMMMUIdx mmu_idx, |
26 | obj-$(CONFIG_ASPEED_SOC) += aspeed_soc.o aspeed.o | 20 | |
27 | obj-$(CONFIG_MPS2) += mps2.o | 21 | /* Translate a S1 pagetable walk through S2 if needed. */ |
28 | obj-$(CONFIG_MSF2) += msf2-soc.o msf2-som.o | 22 | static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, |
29 | +obj-$(CONFIG_IOTKIT) += iotkit.o | 23 | - hwaddr addr, MemTxAttrs txattrs, |
30 | diff --git a/include/hw/arm/iotkit.h b/include/hw/arm/iotkit.h | 24 | + hwaddr addr, bool *is_secure, |
31 | new file mode 100644 | 25 | ARMMMUFaultInfo *fi) |
32 | index XXXXXXX..XXXXXXX | 26 | { |
33 | --- /dev/null | 27 | if (arm_mmu_idx_is_stage1_of_2(mmu_idx) && |
34 | +++ b/include/hw/arm/iotkit.h | 28 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, |
35 | @@ -XXX,XX +XXX,XX @@ | 29 | int s2prot; |
36 | +/* | 30 | int ret; |
37 | + * ARM IoT Kit | 31 | ARMCacheAttrs cacheattrs = {}; |
38 | + * | 32 | + MemTxAttrs txattrs = {}; |
39 | + * Copyright (c) 2018 Linaro Limited | ||
40 | + * Written by Peter Maydell | ||
41 | + * | ||
42 | + * This program is free software; you can redistribute it and/or modify | ||
43 | + * it under the terms of the GNU General Public License version 2 or | ||
44 | + * (at your option) any later version. | ||
45 | + */ | ||
46 | + | 33 | + |
47 | +/* This is a model of the Arm IoT Kit which is documented in | 34 | + assert(!*is_secure); /* TODO: S-EL2 */ |
48 | + * http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ecm0601256/index.html | 35 | |
49 | + * It contains: | 36 | ret = get_phys_addr_lpae(env, addr, MMU_DATA_LOAD, ARMMMUIdx_Stage2, |
50 | + * a Cortex-M33 | 37 | false, |
51 | + * the IDAU | 38 | @@ -XXX,XX +XXX,XX @@ static uint32_t arm_ldl_ptw(CPUState *cs, hwaddr addr, bool is_secure, |
52 | + * some timers and watchdogs | 39 | AddressSpace *as; |
53 | + * two peripheral protection controllers | 40 | uint32_t data; |
54 | + * a memory protection controller | 41 | |
55 | + * a security controller | 42 | + addr = S1_ptw_translate(env, mmu_idx, addr, &is_secure, fi); |
56 | + * a bus fabric which arranges that some parts of the address | 43 | attrs.secure = is_secure; |
57 | + * space are secure and non-secure aliases of each other | 44 | as = arm_addressspace(cs, attrs); |
58 | + * | 45 | - addr = S1_ptw_translate(env, mmu_idx, addr, attrs, fi); |
59 | + * QEMU interface: | 46 | if (fi->s1ptw) { |
60 | + * + QOM property "memory" is a MemoryRegion containing the devices provided | 47 | return 0; |
61 | + * by the board model. | 48 | } |
62 | + * + QOM property "MAINCLK" is the frequency of the main system clock | 49 | @@ -XXX,XX +XXX,XX @@ static uint64_t arm_ldq_ptw(CPUState *cs, hwaddr addr, bool is_secure, |
63 | + * + QOM property "EXP_NUMIRQ" sets the number of expansion interrupts | 50 | AddressSpace *as; |
64 | + * + Named GPIO inputs "EXP_IRQ" 0..n are the expansion interrupts, which | 51 | uint64_t data; |
65 | + * are wired to the NVIC lines 32 .. n+32 | 52 | |
66 | + * Controlling up to 4 AHB expansion PPBs which a system using the IoTKit | 53 | + addr = S1_ptw_translate(env, mmu_idx, addr, &is_secure, fi); |
67 | + * might provide: | 54 | attrs.secure = is_secure; |
68 | + * + named GPIO outputs apb_ppcexp{0,1,2,3}_nonsec[0..15] | 55 | as = arm_addressspace(cs, attrs); |
69 | + * + named GPIO outputs apb_ppcexp{0,1,2,3}_ap[0..15] | 56 | - addr = S1_ptw_translate(env, mmu_idx, addr, attrs, fi); |
70 | + * + named GPIO outputs apb_ppcexp{0,1,2,3}_irq_enable | 57 | if (fi->s1ptw) { |
71 | + * + named GPIO outputs apb_ppcexp{0,1,2,3}_irq_clear | 58 | return 0; |
72 | + * + named GPIO inputs apb_ppcexp{0,1,2,3}_irq_status | 59 | } |
73 | + * Controlling each of the 4 expansion AHB PPCs which a system using the IoTKit | ||
74 | + * might provide: | ||
75 | + * + named GPIO outputs ahb_ppcexp{0,1,2,3}_nonsec[0..15] | ||
76 | + * + named GPIO outputs ahb_ppcexp{0,1,2,3}_ap[0..15] | ||
77 | + * + named GPIO outputs ahb_ppcexp{0,1,2,3}_irq_enable | ||
78 | + * + named GPIO outputs ahb_ppcexp{0,1,2,3}_irq_clear | ||
79 | + * + named GPIO inputs ahb_ppcexp{0,1,2,3}_irq_status | ||
80 | + */ | ||
81 | + | ||
82 | +#ifndef IOTKIT_H | ||
83 | +#define IOTKIT_H | ||
84 | + | ||
85 | +#include "hw/sysbus.h" | ||
86 | +#include "hw/arm/armv7m.h" | ||
87 | +#include "hw/misc/iotkit-secctl.h" | ||
88 | +#include "hw/misc/tz-ppc.h" | ||
89 | +#include "hw/timer/cmsdk-apb-timer.h" | ||
90 | +#include "hw/misc/unimp.h" | ||
91 | +#include "hw/or-irq.h" | ||
92 | +#include "hw/core/split-irq.h" | ||
93 | + | ||
94 | +#define TYPE_IOTKIT "iotkit" | ||
95 | +#define IOTKIT(obj) OBJECT_CHECK(IoTKit, (obj), TYPE_IOTKIT) | ||
96 | + | ||
97 | +/* We have an IRQ splitter and an OR gate input for each external PPC | ||
98 | + * and the 2 internal PPCs | ||
99 | + */ | ||
100 | +#define NUM_EXTERNAL_PPCS (IOTS_NUM_AHB_EXP_PPC + IOTS_NUM_APB_EXP_PPC) | ||
101 | +#define NUM_PPCS (NUM_EXTERNAL_PPCS + 2) | ||
102 | + | ||
103 | +typedef struct IoTKit { | ||
104 | + /*< private >*/ | ||
105 | + SysBusDevice parent_obj; | ||
106 | + | ||
107 | + /*< public >*/ | ||
108 | + ARMv7MState armv7m; | ||
109 | + IoTKitSecCtl secctl; | ||
110 | + TZPPC apb_ppc0; | ||
111 | + TZPPC apb_ppc1; | ||
112 | + CMSDKAPBTIMER timer0; | ||
113 | + CMSDKAPBTIMER timer1; | ||
114 | + qemu_or_irq ppc_irq_orgate; | ||
115 | + SplitIRQ sec_resp_splitter; | ||
116 | + SplitIRQ ppc_irq_splitter[NUM_PPCS]; | ||
117 | + | ||
118 | + UnimplementedDeviceState dualtimer; | ||
119 | + UnimplementedDeviceState s32ktimer; | ||
120 | + | ||
121 | + MemoryRegion container; | ||
122 | + MemoryRegion alias1; | ||
123 | + MemoryRegion alias2; | ||
124 | + MemoryRegion alias3; | ||
125 | + MemoryRegion sram0; | ||
126 | + | ||
127 | + qemu_irq *exp_irqs; | ||
128 | + qemu_irq ppc0_irq; | ||
129 | + qemu_irq ppc1_irq; | ||
130 | + qemu_irq sec_resp_cfg; | ||
131 | + qemu_irq sec_resp_cfg_in; | ||
132 | + qemu_irq nsc_cfg_in; | ||
133 | + | ||
134 | + qemu_irq irq_status_in[NUM_EXTERNAL_PPCS]; | ||
135 | + | ||
136 | + uint32_t nsccfg; | ||
137 | + | ||
138 | + /* Properties */ | ||
139 | + MemoryRegion *board_memory; | ||
140 | + uint32_t exp_numirq; | ||
141 | + uint32_t mainclk_frq; | ||
142 | +} IoTKit; | ||
143 | + | ||
144 | +#endif | ||
145 | diff --git a/hw/arm/iotkit.c b/hw/arm/iotkit.c | ||
146 | new file mode 100644 | ||
147 | index XXXXXXX..XXXXXXX | ||
148 | --- /dev/null | ||
149 | +++ b/hw/arm/iotkit.c | ||
150 | @@ -XXX,XX +XXX,XX @@ | ||
151 | +/* | ||
152 | + * Arm IoT Kit | ||
153 | + * | ||
154 | + * Copyright (c) 2018 Linaro Limited | ||
155 | + * Written by Peter Maydell | ||
156 | + * | ||
157 | + * This program is free software; you can redistribute it and/or modify | ||
158 | + * it under the terms of the GNU General Public License version 2 or | ||
159 | + * (at your option) any later version. | ||
160 | + */ | ||
161 | + | ||
162 | +#include "qemu/osdep.h" | ||
163 | +#include "qemu/log.h" | ||
164 | +#include "qapi/error.h" | ||
165 | +#include "trace.h" | ||
166 | +#include "hw/sysbus.h" | ||
167 | +#include "hw/registerfields.h" | ||
168 | +#include "hw/arm/iotkit.h" | ||
169 | +#include "hw/misc/unimp.h" | ||
170 | +#include "hw/arm/arm.h" | ||
171 | + | ||
172 | +/* Create an alias region of @size bytes starting at @base | ||
173 | + * which mirrors the memory starting at @orig. | ||
174 | + */ | ||
175 | +static void make_alias(IoTKit *s, MemoryRegion *mr, const char *name, | ||
176 | + hwaddr base, hwaddr size, hwaddr orig) | ||
177 | +{ | ||
178 | + memory_region_init_alias(mr, NULL, name, &s->container, orig, size); | ||
179 | + /* The alias is even lower priority than unimplemented_device regions */ | ||
180 | + memory_region_add_subregion_overlap(&s->container, base, mr, -1500); | ||
181 | +} | ||
182 | + | ||
183 | +static void init_sysbus_child(Object *parent, const char *childname, | ||
184 | + void *child, size_t childsize, | ||
185 | + const char *childtype) | ||
186 | +{ | ||
187 | + object_initialize(child, childsize, childtype); | ||
188 | + object_property_add_child(parent, childname, OBJECT(child), &error_abort); | ||
189 | + qdev_set_parent_bus(DEVICE(child), sysbus_get_default()); | ||
190 | +} | ||
191 | + | ||
192 | +static void irq_status_forwarder(void *opaque, int n, int level) | ||
193 | +{ | ||
194 | + qemu_irq destirq = opaque; | ||
195 | + | ||
196 | + qemu_set_irq(destirq, level); | ||
197 | +} | ||
198 | + | ||
199 | +static void nsccfg_handler(void *opaque, int n, int level) | ||
200 | +{ | ||
201 | + IoTKit *s = IOTKIT(opaque); | ||
202 | + | ||
203 | + s->nsccfg = level; | ||
204 | +} | ||
205 | + | ||
206 | +static void iotkit_forward_ppc(IoTKit *s, const char *ppcname, int ppcnum) | ||
207 | +{ | ||
208 | + /* Each of the 4 AHB and 4 APB PPCs that might be present in a | ||
209 | + * system using the IoTKit has a collection of control lines which | ||
210 | + * are provided by the security controller and which we want to | ||
211 | + * expose as control lines on the IoTKit device itself, so the | ||
212 | + * code using the IoTKit can wire them up to the PPCs. | ||
213 | + */ | ||
214 | + SplitIRQ *splitter = &s->ppc_irq_splitter[ppcnum]; | ||
215 | + DeviceState *iotkitdev = DEVICE(s); | ||
216 | + DeviceState *dev_secctl = DEVICE(&s->secctl); | ||
217 | + DeviceState *dev_splitter = DEVICE(splitter); | ||
218 | + char *name; | ||
219 | + | ||
220 | + name = g_strdup_printf("%s_nonsec", ppcname); | ||
221 | + qdev_pass_gpios(dev_secctl, iotkitdev, name); | ||
222 | + g_free(name); | ||
223 | + name = g_strdup_printf("%s_ap", ppcname); | ||
224 | + qdev_pass_gpios(dev_secctl, iotkitdev, name); | ||
225 | + g_free(name); | ||
226 | + name = g_strdup_printf("%s_irq_enable", ppcname); | ||
227 | + qdev_pass_gpios(dev_secctl, iotkitdev, name); | ||
228 | + g_free(name); | ||
229 | + name = g_strdup_printf("%s_irq_clear", ppcname); | ||
230 | + qdev_pass_gpios(dev_secctl, iotkitdev, name); | ||
231 | + g_free(name); | ||
232 | + | ||
233 | + /* irq_status is a little more tricky, because we need to | ||
234 | + * split it so we can send it both to the security controller | ||
235 | + * and to our OR gate for the NVIC interrupt line. | ||
236 | + * Connect up the splitter's outputs, and create a GPIO input | ||
237 | + * which will pass the line state to the input splitter. | ||
238 | + */ | ||
239 | + name = g_strdup_printf("%s_irq_status", ppcname); | ||
240 | + qdev_connect_gpio_out(dev_splitter, 0, | ||
241 | + qdev_get_gpio_in_named(dev_secctl, | ||
242 | + name, 0)); | ||
243 | + qdev_connect_gpio_out(dev_splitter, 1, | ||
244 | + qdev_get_gpio_in(DEVICE(&s->ppc_irq_orgate), ppcnum)); | ||
245 | + s->irq_status_in[ppcnum] = qdev_get_gpio_in(dev_splitter, 0); | ||
246 | + qdev_init_gpio_in_named_with_opaque(iotkitdev, irq_status_forwarder, | ||
247 | + s->irq_status_in[ppcnum], name, 1); | ||
248 | + g_free(name); | ||
249 | +} | ||
250 | + | ||
251 | +static void iotkit_forward_sec_resp_cfg(IoTKit *s) | ||
252 | +{ | ||
253 | + /* Forward the 3rd output from the splitter device as a | ||
254 | + * named GPIO output of the iotkit object. | ||
255 | + */ | ||
256 | + DeviceState *dev = DEVICE(s); | ||
257 | + DeviceState *dev_splitter = DEVICE(&s->sec_resp_splitter); | ||
258 | + | ||
259 | + qdev_init_gpio_out_named(dev, &s->sec_resp_cfg, "sec_resp_cfg", 1); | ||
260 | + s->sec_resp_cfg_in = qemu_allocate_irq(irq_status_forwarder, | ||
261 | + s->sec_resp_cfg, 1); | ||
262 | + qdev_connect_gpio_out(dev_splitter, 2, s->sec_resp_cfg_in); | ||
263 | +} | ||
264 | + | ||
265 | +static void iotkit_init(Object *obj) | ||
266 | +{ | ||
267 | + IoTKit *s = IOTKIT(obj); | ||
268 | + int i; | ||
269 | + | ||
270 | + memory_region_init(&s->container, obj, "iotkit-container", UINT64_MAX); | ||
271 | + | ||
272 | + init_sysbus_child(obj, "armv7m", &s->armv7m, sizeof(s->armv7m), | ||
273 | + TYPE_ARMV7M); | ||
274 | + qdev_prop_set_string(DEVICE(&s->armv7m), "cpu-type", | ||
275 | + ARM_CPU_TYPE_NAME("cortex-m33")); | ||
276 | + | ||
277 | + init_sysbus_child(obj, "secctl", &s->secctl, sizeof(s->secctl), | ||
278 | + TYPE_IOTKIT_SECCTL); | ||
279 | + init_sysbus_child(obj, "apb-ppc0", &s->apb_ppc0, sizeof(s->apb_ppc0), | ||
280 | + TYPE_TZ_PPC); | ||
281 | + init_sysbus_child(obj, "apb-ppc1", &s->apb_ppc1, sizeof(s->apb_ppc1), | ||
282 | + TYPE_TZ_PPC); | ||
283 | + init_sysbus_child(obj, "timer0", &s->timer0, sizeof(s->timer0), | ||
284 | + TYPE_CMSDK_APB_TIMER); | ||
285 | + init_sysbus_child(obj, "timer1", &s->timer1, sizeof(s->timer1), | ||
286 | + TYPE_CMSDK_APB_TIMER); | ||
287 | + init_sysbus_child(obj, "dualtimer", &s->dualtimer, sizeof(s->dualtimer), | ||
288 | + TYPE_UNIMPLEMENTED_DEVICE); | ||
289 | + object_initialize(&s->ppc_irq_orgate, sizeof(s->ppc_irq_orgate), | ||
290 | + TYPE_OR_IRQ); | ||
291 | + object_property_add_child(obj, "ppc-irq-orgate", | ||
292 | + OBJECT(&s->ppc_irq_orgate), &error_abort); | ||
293 | + object_initialize(&s->sec_resp_splitter, sizeof(s->sec_resp_splitter), | ||
294 | + TYPE_SPLIT_IRQ); | ||
295 | + object_property_add_child(obj, "sec-resp-splitter", | ||
296 | + OBJECT(&s->sec_resp_splitter), &error_abort); | ||
297 | + for (i = 0; i < ARRAY_SIZE(s->ppc_irq_splitter); i++) { | ||
298 | + char *name = g_strdup_printf("ppc-irq-splitter-%d", i); | ||
299 | + SplitIRQ *splitter = &s->ppc_irq_splitter[i]; | ||
300 | + | ||
301 | + object_initialize(splitter, sizeof(*splitter), TYPE_SPLIT_IRQ); | ||
302 | + object_property_add_child(obj, name, OBJECT(splitter), &error_abort); | ||
303 | + } | ||
304 | + init_sysbus_child(obj, "s32ktimer", &s->s32ktimer, sizeof(s->s32ktimer), | ||
305 | + TYPE_UNIMPLEMENTED_DEVICE); | ||
306 | +} | ||
307 | + | ||
308 | +static void iotkit_exp_irq(void *opaque, int n, int level) | ||
309 | +{ | ||
310 | + IoTKit *s = IOTKIT(opaque); | ||
311 | + | ||
312 | + qemu_set_irq(s->exp_irqs[n], level); | ||
313 | +} | ||
314 | + | ||
315 | +static void iotkit_realize(DeviceState *dev, Error **errp) | ||
316 | +{ | ||
317 | + IoTKit *s = IOTKIT(dev); | ||
318 | + int i; | ||
319 | + MemoryRegion *mr; | ||
320 | + Error *err = NULL; | ||
321 | + SysBusDevice *sbd_apb_ppc0; | ||
322 | + SysBusDevice *sbd_secctl; | ||
323 | + DeviceState *dev_apb_ppc0; | ||
324 | + DeviceState *dev_apb_ppc1; | ||
325 | + DeviceState *dev_secctl; | ||
326 | + DeviceState *dev_splitter; | ||
327 | + | ||
328 | + if (!s->board_memory) { | ||
329 | + error_setg(errp, "memory property was not set"); | ||
330 | + return; | ||
331 | + } | ||
332 | + | ||
333 | + if (!s->mainclk_frq) { | ||
334 | + error_setg(errp, "MAINCLK property was not set"); | ||
335 | + return; | ||
336 | + } | ||
337 | + | ||
338 | + /* Handling of which devices should be available only to secure | ||
339 | + * code is usually done differently for M profile than for A profile. | ||
340 | + * Instead of putting some devices only into the secure address space, | ||
341 | + * devices exist in both address spaces but with hard-wired security | ||
342 | + * permissions that will cause the CPU to fault for non-secure accesses. | ||
343 | + * | ||
344 | + * The IoTKit has an IDAU (Implementation Defined Access Unit), | ||
345 | + * which specifies hard-wired security permissions for different | ||
346 | + * areas of the physical address space. For the IoTKit IDAU, the | ||
347 | + * top 4 bits of the physical address are the IDAU region ID, and | ||
348 | + * if bit 28 (ie the lowest bit of the ID) is 0 then this is an NS | ||
349 | + * region, otherwise it is an S region. | ||
350 | + * | ||
351 | + * The various devices and RAMs are generally all mapped twice, | ||
352 | + * once into a region that the IDAU defines as secure and once | ||
353 | + * into a non-secure region. They sit behind either a Memory | ||
354 | + * Protection Controller (for RAM) or a Peripheral Protection | ||
355 | + * Controller (for devices), which allow a more fine grained | ||
356 | + * configuration of whether non-secure accesses are permitted. | ||
357 | + * | ||
358 | + * (The other place that guest software can configure security | ||
359 | + * permissions is in the architected SAU (Security Attribution | ||
360 | + * Unit), which is entirely inside the CPU. The IDAU can upgrade | ||
361 | + * the security attributes for a region to more restrictive than | ||
362 | + * the SAU specifies, but cannot downgrade them.) | ||
363 | + * | ||
364 | + * 0x10000000..0x1fffffff alias of 0x00000000..0x0fffffff | ||
365 | + * 0x20000000..0x2007ffff 32KB FPGA block RAM | ||
366 | + * 0x30000000..0x3fffffff alias of 0x20000000..0x2fffffff | ||
367 | + * 0x40000000..0x4000ffff base peripheral region 1 | ||
368 | + * 0x40010000..0x4001ffff CPU peripherals (none for IoTKit) | ||
369 | + * 0x40020000..0x4002ffff system control element peripherals | ||
370 | + * 0x40080000..0x400fffff base peripheral region 2 | ||
371 | + * 0x50000000..0x5fffffff alias of 0x40000000..0x4fffffff | ||
372 | + */ | ||
373 | + | ||
374 | + memory_region_add_subregion_overlap(&s->container, 0, s->board_memory, -1); | ||
375 | + | ||
376 | + qdev_prop_set_uint32(DEVICE(&s->armv7m), "num-irq", s->exp_numirq + 32); | ||
377 | + /* In real hardware the initial Secure VTOR is set from the INITSVTOR0 | ||
378 | + * register in the IoT Kit System Control Register block, and the | ||
379 | + * initial value of that is in turn specifiable by the FPGA that | ||
380 | + * instantiates the IoT Kit. In QEMU we don't implement this wrinkle, | ||
381 | + * and simply set the CPU's init-svtor to the IoT Kit default value. | ||
382 | + */ | ||
383 | + qdev_prop_set_uint32(DEVICE(&s->armv7m), "init-svtor", 0x10000000); | ||
384 | + object_property_set_link(OBJECT(&s->armv7m), OBJECT(&s->container), | ||
385 | + "memory", &err); | ||
386 | + if (err) { | ||
387 | + error_propagate(errp, err); | ||
388 | + return; | ||
389 | + } | ||
390 | + object_property_set_link(OBJECT(&s->armv7m), OBJECT(s), "idau", &err); | ||
391 | + if (err) { | ||
392 | + error_propagate(errp, err); | ||
393 | + return; | ||
394 | + } | ||
395 | + object_property_set_bool(OBJECT(&s->armv7m), true, "realized", &err); | ||
396 | + if (err) { | ||
397 | + error_propagate(errp, err); | ||
398 | + return; | ||
399 | + } | ||
400 | + | ||
401 | + /* Connect our EXP_IRQ GPIOs to the NVIC's lines 32 and up. */ | ||
402 | + s->exp_irqs = g_new(qemu_irq, s->exp_numirq); | ||
403 | + for (i = 0; i < s->exp_numirq; i++) { | ||
404 | + s->exp_irqs[i] = qdev_get_gpio_in(DEVICE(&s->armv7m), i + 32); | ||
405 | + } | ||
406 | + qdev_init_gpio_in_named(dev, iotkit_exp_irq, "EXP_IRQ", s->exp_numirq); | ||
407 | + | ||
408 | + /* Set up the big aliases first */ | ||
409 | + make_alias(s, &s->alias1, "alias 1", 0x10000000, 0x10000000, 0x00000000); | ||
410 | + make_alias(s, &s->alias2, "alias 2", 0x30000000, 0x10000000, 0x20000000); | ||
411 | + /* The 0x50000000..0x5fffffff region is not a pure alias: it has | ||
412 | + * a few extra devices that only appear there (generally the | ||
413 | + * control interfaces for the protection controllers). | ||
414 | + * We implement this by mapping those devices over the top of this | ||
415 | + * alias MR at a higher priority. | ||
416 | + */ | ||
417 | + make_alias(s, &s->alias3, "alias 3", 0x50000000, 0x10000000, 0x40000000); | ||
418 | + | ||
419 | + /* This RAM should be behind a Memory Protection Controller, but we | ||
420 | + * don't implement that yet. | ||
421 | + */ | ||
422 | + memory_region_init_ram(&s->sram0, NULL, "iotkit.sram0", 0x00008000, &err); | ||
423 | + if (err) { | ||
424 | + error_propagate(errp, err); | ||
425 | + return; | ||
426 | + } | ||
427 | + memory_region_add_subregion(&s->container, 0x20000000, &s->sram0); | ||
428 | + | ||
429 | + /* Security controller */ | ||
430 | + object_property_set_bool(OBJECT(&s->secctl), true, "realized", &err); | ||
431 | + if (err) { | ||
432 | + error_propagate(errp, err); | ||
433 | + return; | ||
434 | + } | ||
435 | + sbd_secctl = SYS_BUS_DEVICE(&s->secctl); | ||
436 | + dev_secctl = DEVICE(&s->secctl); | ||
437 | + sysbus_mmio_map(sbd_secctl, 0, 0x50080000); | ||
438 | + sysbus_mmio_map(sbd_secctl, 1, 0x40080000); | ||
439 | + | ||
440 | + s->nsc_cfg_in = qemu_allocate_irq(nsccfg_handler, s, 1); | ||
441 | + qdev_connect_gpio_out_named(dev_secctl, "nsc_cfg", 0, s->nsc_cfg_in); | ||
442 | + | ||
443 | + /* The sec_resp_cfg output from the security controller must be split into | ||
444 | + * multiple lines, one for each of the PPCs within the IoTKit and one | ||
445 | + * that will be an output from the IoTKit to the system. | ||
446 | + */ | ||
447 | + object_property_set_int(OBJECT(&s->sec_resp_splitter), 3, | ||
448 | + "num-lines", &err); | ||
449 | + if (err) { | ||
450 | + error_propagate(errp, err); | ||
451 | + return; | ||
452 | + } | ||
453 | + object_property_set_bool(OBJECT(&s->sec_resp_splitter), true, | ||
454 | + "realized", &err); | ||
455 | + if (err) { | ||
456 | + error_propagate(errp, err); | ||
457 | + return; | ||
458 | + } | ||
459 | + dev_splitter = DEVICE(&s->sec_resp_splitter); | ||
460 | + qdev_connect_gpio_out_named(dev_secctl, "sec_resp_cfg", 0, | ||
461 | + qdev_get_gpio_in(dev_splitter, 0)); | ||
462 | + | ||
463 | + /* Devices behind APB PPC0: | ||
464 | + * 0x40000000: timer0 | ||
465 | + * 0x40001000: timer1 | ||
466 | + * 0x40002000: dual timer | ||
467 | + * We must configure and realize each downstream device and connect | ||
468 | + * it to the appropriate PPC port; then we can realize the PPC and | ||
469 | + * map its upstream ends to the right place in the container. | ||
470 | + */ | ||
471 | + qdev_prop_set_uint32(DEVICE(&s->timer0), "pclk-frq", s->mainclk_frq); | ||
472 | + object_property_set_bool(OBJECT(&s->timer0), true, "realized", &err); | ||
473 | + if (err) { | ||
474 | + error_propagate(errp, err); | ||
475 | + return; | ||
476 | + } | ||
477 | + sysbus_connect_irq(SYS_BUS_DEVICE(&s->timer0), 0, | ||
478 | + qdev_get_gpio_in(DEVICE(&s->armv7m), 3)); | ||
479 | + mr = sysbus_mmio_get_region(SYS_BUS_DEVICE(&s->timer0), 0); | ||
480 | + object_property_set_link(OBJECT(&s->apb_ppc0), OBJECT(mr), "port[0]", &err); | ||
481 | + if (err) { | ||
482 | + error_propagate(errp, err); | ||
483 | + return; | ||
484 | + } | ||
485 | + | ||
486 | + qdev_prop_set_uint32(DEVICE(&s->timer1), "pclk-frq", s->mainclk_frq); | ||
487 | + object_property_set_bool(OBJECT(&s->timer1), true, "realized", &err); | ||
488 | + if (err) { | ||
489 | + error_propagate(errp, err); | ||
490 | + return; | ||
491 | + } | ||
492 | + sysbus_connect_irq(SYS_BUS_DEVICE(&s->timer1), 0, | ||
493 | + qdev_get_gpio_in(DEVICE(&s->armv7m), 3)); | ||
494 | + mr = sysbus_mmio_get_region(SYS_BUS_DEVICE(&s->timer1), 0); | ||
495 | + object_property_set_link(OBJECT(&s->apb_ppc0), OBJECT(mr), "port[1]", &err); | ||
496 | + if (err) { | ||
497 | + error_propagate(errp, err); | ||
498 | + return; | ||
499 | + } | ||
500 | + | ||
501 | + qdev_prop_set_string(DEVICE(&s->dualtimer), "name", "Dual timer"); | ||
502 | + qdev_prop_set_uint64(DEVICE(&s->dualtimer), "size", 0x1000); | ||
503 | + object_property_set_bool(OBJECT(&s->dualtimer), true, "realized", &err); | ||
504 | + if (err) { | ||
505 | + error_propagate(errp, err); | ||
506 | + return; | ||
507 | + } | ||
508 | + mr = sysbus_mmio_get_region(SYS_BUS_DEVICE(&s->dualtimer), 0); | ||
509 | + object_property_set_link(OBJECT(&s->apb_ppc0), OBJECT(mr), "port[2]", &err); | ||
510 | + if (err) { | ||
511 | + error_propagate(errp, err); | ||
512 | + return; | ||
513 | + } | ||
514 | + | ||
515 | + object_property_set_bool(OBJECT(&s->apb_ppc0), true, "realized", &err); | ||
516 | + if (err) { | ||
517 | + error_propagate(errp, err); | ||
518 | + return; | ||
519 | + } | ||
520 | + | ||
521 | + sbd_apb_ppc0 = SYS_BUS_DEVICE(&s->apb_ppc0); | ||
522 | + dev_apb_ppc0 = DEVICE(&s->apb_ppc0); | ||
523 | + | ||
524 | + mr = sysbus_mmio_get_region(sbd_apb_ppc0, 0); | ||
525 | + memory_region_add_subregion(&s->container, 0x40000000, mr); | ||
526 | + mr = sysbus_mmio_get_region(sbd_apb_ppc0, 1); | ||
527 | + memory_region_add_subregion(&s->container, 0x40001000, mr); | ||
528 | + mr = sysbus_mmio_get_region(sbd_apb_ppc0, 2); | ||
529 | + memory_region_add_subregion(&s->container, 0x40002000, mr); | ||
530 | + for (i = 0; i < IOTS_APB_PPC0_NUM_PORTS; i++) { | ||
531 | + qdev_connect_gpio_out_named(dev_secctl, "apb_ppc0_nonsec", i, | ||
532 | + qdev_get_gpio_in_named(dev_apb_ppc0, | ||
533 | + "cfg_nonsec", i)); | ||
534 | + qdev_connect_gpio_out_named(dev_secctl, "apb_ppc0_ap", i, | ||
535 | + qdev_get_gpio_in_named(dev_apb_ppc0, | ||
536 | + "cfg_ap", i)); | ||
537 | + } | ||
538 | + qdev_connect_gpio_out_named(dev_secctl, "apb_ppc0_irq_enable", 0, | ||
539 | + qdev_get_gpio_in_named(dev_apb_ppc0, | ||
540 | + "irq_enable", 0)); | ||
541 | + qdev_connect_gpio_out_named(dev_secctl, "apb_ppc0_irq_clear", 0, | ||
542 | + qdev_get_gpio_in_named(dev_apb_ppc0, | ||
543 | + "irq_clear", 0)); | ||
544 | + qdev_connect_gpio_out(dev_splitter, 0, | ||
545 | + qdev_get_gpio_in_named(dev_apb_ppc0, | ||
546 | + "cfg_sec_resp", 0)); | ||
547 | + | ||
548 | + /* All the PPC irq lines (from the 2 internal PPCs and the 8 external | ||
549 | + * ones) are sent individually to the security controller, and also | ||
550 | + * ORed together to give a single combined PPC interrupt to the NVIC. | ||
551 | + */ | ||
552 | + object_property_set_int(OBJECT(&s->ppc_irq_orgate), | ||
553 | + NUM_PPCS, "num-lines", &err); | ||
554 | + if (err) { | ||
555 | + error_propagate(errp, err); | ||
556 | + return; | ||
557 | + } | ||
558 | + object_property_set_bool(OBJECT(&s->ppc_irq_orgate), true, | ||
559 | + "realized", &err); | ||
560 | + if (err) { | ||
561 | + error_propagate(errp, err); | ||
562 | + return; | ||
563 | + } | ||
564 | + qdev_connect_gpio_out(DEVICE(&s->ppc_irq_orgate), 0, | ||
565 | + qdev_get_gpio_in(DEVICE(&s->armv7m), 10)); | ||
566 | + | ||
567 | + /* 0x40010000 .. 0x4001ffff: private CPU region: unused in IoTKit */ | ||
568 | + | ||
569 | + /* 0x40020000 .. 0x4002ffff : IoTKit system control peripheral region */ | ||
570 | + /* Devices behind APB PPC1: | ||
571 | + * 0x4002f000: S32K timer | ||
572 | + */ | ||
573 | + qdev_prop_set_string(DEVICE(&s->s32ktimer), "name", "S32KTIMER"); | ||
574 | + qdev_prop_set_uint64(DEVICE(&s->s32ktimer), "size", 0x1000); | ||
575 | + object_property_set_bool(OBJECT(&s->s32ktimer), true, "realized", &err); | ||
576 | + if (err) { | ||
577 | + error_propagate(errp, err); | ||
578 | + return; | ||
579 | + } | ||
580 | + mr = sysbus_mmio_get_region(SYS_BUS_DEVICE(&s->s32ktimer), 0); | ||
581 | + object_property_set_link(OBJECT(&s->apb_ppc1), OBJECT(mr), "port[0]", &err); | ||
582 | + if (err) { | ||
583 | + error_propagate(errp, err); | ||
584 | + return; | ||
585 | + } | ||
586 | + | ||
587 | + object_property_set_bool(OBJECT(&s->apb_ppc1), true, "realized", &err); | ||
588 | + if (err) { | ||
589 | + error_propagate(errp, err); | ||
590 | + return; | ||
591 | + } | ||
592 | + mr = sysbus_mmio_get_region(SYS_BUS_DEVICE(&s->apb_ppc1), 0); | ||
593 | + memory_region_add_subregion(&s->container, 0x4002f000, mr); | ||
594 | + | ||
595 | + dev_apb_ppc1 = DEVICE(&s->apb_ppc1); | ||
596 | + qdev_connect_gpio_out_named(dev_secctl, "apb_ppc1_nonsec", 0, | ||
597 | + qdev_get_gpio_in_named(dev_apb_ppc1, | ||
598 | + "cfg_nonsec", 0)); | ||
599 | + qdev_connect_gpio_out_named(dev_secctl, "apb_ppc1_ap", 0, | ||
600 | + qdev_get_gpio_in_named(dev_apb_ppc1, | ||
601 | + "cfg_ap", 0)); | ||
602 | + qdev_connect_gpio_out_named(dev_secctl, "apb_ppc1_irq_enable", 0, | ||
603 | + qdev_get_gpio_in_named(dev_apb_ppc1, | ||
604 | + "irq_enable", 0)); | ||
605 | + qdev_connect_gpio_out_named(dev_secctl, "apb_ppc1_irq_clear", 0, | ||
606 | + qdev_get_gpio_in_named(dev_apb_ppc1, | ||
607 | + "irq_clear", 0)); | ||
608 | + qdev_connect_gpio_out(dev_splitter, 1, | ||
609 | + qdev_get_gpio_in_named(dev_apb_ppc1, | ||
610 | + "cfg_sec_resp", 0)); | ||
611 | + | ||
612 | + /* Using create_unimplemented_device() maps the stub into the | ||
613 | + * system address space rather than into our container, but the | ||
614 | + * overall effect to the guest is the same. | ||
615 | + */ | ||
616 | + create_unimplemented_device("SYSINFO", 0x40020000, 0x1000); | ||
617 | + | ||
618 | + create_unimplemented_device("SYSCONTROL", 0x50021000, 0x1000); | ||
619 | + create_unimplemented_device("S32KWATCHDOG", 0x5002e000, 0x1000); | ||
620 | + | ||
621 | + /* 0x40080000 .. 0x4008ffff : IoTKit second Base peripheral region */ | ||
622 | + | ||
623 | + create_unimplemented_device("NS watchdog", 0x40081000, 0x1000); | ||
624 | + create_unimplemented_device("S watchdog", 0x50081000, 0x1000); | ||
625 | + | ||
626 | + create_unimplemented_device("SRAM0 MPC", 0x50083000, 0x1000); | ||
627 | + | ||
628 | + for (i = 0; i < ARRAY_SIZE(s->ppc_irq_splitter); i++) { | ||
629 | + Object *splitter = OBJECT(&s->ppc_irq_splitter[i]); | ||
630 | + | ||
631 | + object_property_set_int(splitter, 2, "num-lines", &err); | ||
632 | + if (err) { | ||
633 | + error_propagate(errp, err); | ||
634 | + return; | ||
635 | + } | ||
636 | + object_property_set_bool(splitter, true, "realized", &err); | ||
637 | + if (err) { | ||
638 | + error_propagate(errp, err); | ||
639 | + return; | ||
640 | + } | ||
641 | + } | ||
642 | + | ||
643 | + for (i = 0; i < IOTS_NUM_AHB_EXP_PPC; i++) { | ||
644 | + char *ppcname = g_strdup_printf("ahb_ppcexp%d", i); | ||
645 | + | ||
646 | + iotkit_forward_ppc(s, ppcname, i); | ||
647 | + g_free(ppcname); | ||
648 | + } | ||
649 | + | ||
650 | + for (i = 0; i < IOTS_NUM_APB_EXP_PPC; i++) { | ||
651 | + char *ppcname = g_strdup_printf("apb_ppcexp%d", i); | ||
652 | + | ||
653 | + iotkit_forward_ppc(s, ppcname, i + IOTS_NUM_AHB_EXP_PPC); | ||
654 | + g_free(ppcname); | ||
655 | + } | ||
656 | + | ||
657 | + for (i = NUM_EXTERNAL_PPCS; i < NUM_PPCS; i++) { | ||
658 | + /* Wire up IRQ splitter for internal PPCs */ | ||
659 | + DeviceState *devs = DEVICE(&s->ppc_irq_splitter[i]); | ||
660 | + char *gpioname = g_strdup_printf("apb_ppc%d_irq_status", | ||
661 | + i - NUM_EXTERNAL_PPCS); | ||
662 | + TZPPC *ppc = (i == NUM_EXTERNAL_PPCS) ? &s->apb_ppc0 : &s->apb_ppc1; | ||
663 | + | ||
664 | + qdev_connect_gpio_out(devs, 0, | ||
665 | + qdev_get_gpio_in_named(dev_secctl, gpioname, 0)); | ||
666 | + qdev_connect_gpio_out(devs, 1, | ||
667 | + qdev_get_gpio_in(DEVICE(&s->ppc_irq_orgate), i)); | ||
668 | + qdev_connect_gpio_out_named(DEVICE(ppc), "irq", 0, | ||
669 | + qdev_get_gpio_in(devs, 0)); | ||
670 | + } | ||
671 | + | ||
672 | + iotkit_forward_sec_resp_cfg(s); | ||
673 | + | ||
674 | + system_clock_scale = NANOSECONDS_PER_SECOND / s->mainclk_frq; | ||
675 | +} | ||
676 | + | ||
677 | +static void iotkit_idau_check(IDAUInterface *ii, uint32_t address, | ||
678 | + int *iregion, bool *exempt, bool *ns, bool *nsc) | ||
679 | +{ | ||
680 | + /* For IoTKit systems the IDAU responses are simple logical functions | ||
681 | + * of the address bits. The NSC attribute is guest-adjustable via the | ||
682 | + * NSCCFG register in the security controller. | ||
683 | + */ | ||
684 | + IoTKit *s = IOTKIT(ii); | ||
685 | + int region = extract32(address, 28, 4); | ||
686 | + | ||
687 | + *ns = !(region & 1); | ||
688 | + *nsc = (region == 1 && (s->nsccfg & 1)) || (region == 3 && (s->nsccfg & 2)); | ||
689 | + /* 0xe0000000..0xe00fffff and 0xf0000000..0xf00fffff are exempt */ | ||
690 | + *exempt = (address & 0xeff00000) == 0xe0000000; | ||
691 | + *iregion = region; | ||
692 | +} | ||
693 | + | ||
694 | +static const VMStateDescription iotkit_vmstate = { | ||
695 | + .name = "iotkit", | ||
696 | + .version_id = 1, | ||
697 | + .minimum_version_id = 1, | ||
698 | + .fields = (VMStateField[]) { | ||
699 | + VMSTATE_UINT32(nsccfg, IoTKit), | ||
700 | + VMSTATE_END_OF_LIST() | ||
701 | + } | ||
702 | +}; | ||
703 | + | ||
704 | +static Property iotkit_properties[] = { | ||
705 | + DEFINE_PROP_LINK("memory", IoTKit, board_memory, TYPE_MEMORY_REGION, | ||
706 | + MemoryRegion *), | ||
707 | + DEFINE_PROP_UINT32("EXP_NUMIRQ", IoTKit, exp_numirq, 64), | ||
708 | + DEFINE_PROP_UINT32("MAINCLK", IoTKit, mainclk_frq, 0), | ||
709 | + DEFINE_PROP_END_OF_LIST() | ||
710 | +}; | ||
711 | + | ||
712 | +static void iotkit_reset(DeviceState *dev) | ||
713 | +{ | ||
714 | + IoTKit *s = IOTKIT(dev); | ||
715 | + | ||
716 | + s->nsccfg = 0; | ||
717 | +} | ||
718 | + | ||
719 | +static void iotkit_class_init(ObjectClass *klass, void *data) | ||
720 | +{ | ||
721 | + DeviceClass *dc = DEVICE_CLASS(klass); | ||
722 | + IDAUInterfaceClass *iic = IDAU_INTERFACE_CLASS(klass); | ||
723 | + | ||
724 | + dc->realize = iotkit_realize; | ||
725 | + dc->vmsd = &iotkit_vmstate; | ||
726 | + dc->props = iotkit_properties; | ||
727 | + dc->reset = iotkit_reset; | ||
728 | + iic->check = iotkit_idau_check; | ||
729 | +} | ||
730 | + | ||
731 | +static const TypeInfo iotkit_info = { | ||
732 | + .name = TYPE_IOTKIT, | ||
733 | + .parent = TYPE_SYS_BUS_DEVICE, | ||
734 | + .instance_size = sizeof(IoTKit), | ||
735 | + .instance_init = iotkit_init, | ||
736 | + .class_init = iotkit_class_init, | ||
737 | + .interfaces = (InterfaceInfo[]) { | ||
738 | + { TYPE_IDAU_INTERFACE }, | ||
739 | + { } | ||
740 | + } | ||
741 | +}; | ||
742 | + | ||
743 | +static void iotkit_register_types(void) | ||
744 | +{ | ||
745 | + type_register_static(&iotkit_info); | ||
746 | +} | ||
747 | + | ||
748 | +type_init(iotkit_register_types); | ||
749 | diff --git a/default-configs/arm-softmmu.mak b/default-configs/arm-softmmu.mak | ||
750 | index XXXXXXX..XXXXXXX 100644 | ||
751 | --- a/default-configs/arm-softmmu.mak | ||
752 | +++ b/default-configs/arm-softmmu.mak | ||
753 | @@ -XXX,XX +XXX,XX @@ CONFIG_MPS2_FPGAIO=y | ||
754 | CONFIG_MPS2_SCC=y | ||
755 | |||
756 | CONFIG_TZ_PPC=y | ||
757 | +CONFIG_IOTKIT=y | ||
758 | CONFIG_IOTKIT_SECCTL=y | ||
759 | |||
760 | CONFIG_VERSATILE_PCI=y | ||
761 | -- | 60 | -- |
762 | 2.16.2 | 61 | 2.20.1 |
763 | 62 | ||
764 | 63 | diff view generated by jsdifflib |
1 | Add a model of the TrustZone peripheral protection controller (PPC), | 1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
---|---|---|---|
2 | which is used to gate transactions to non-TZ-aware peripherals so | ||
3 | that secure software can configure them to not be accessible to | ||
4 | non-secure software. | ||
5 | 2 | ||
3 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
5 | Message-id: 20210112104511.36576-12-remi.denis.courmont@huawei.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20180220180325.29818-15-peter.maydell@linaro.org | ||
9 | --- | 7 | --- |
10 | hw/misc/Makefile.objs | 2 + | 8 | target/arm/helper.c | 12 ++++++++++++ |
11 | include/hw/misc/tz-ppc.h | 101 ++++++++++++++ | 9 | 1 file changed, 12 insertions(+) |
12 | hw/misc/tz-ppc.c | 302 ++++++++++++++++++++++++++++++++++++++++ | ||
13 | default-configs/arm-softmmu.mak | 2 + | ||
14 | hw/misc/trace-events | 11 ++ | ||
15 | 5 files changed, 418 insertions(+) | ||
16 | create mode 100644 include/hw/misc/tz-ppc.h | ||
17 | create mode 100644 hw/misc/tz-ppc.c | ||
18 | 10 | ||
19 | diff --git a/hw/misc/Makefile.objs b/hw/misc/Makefile.objs | 11 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
20 | index XXXXXXX..XXXXXXX 100644 | 12 | index XXXXXXX..XXXXXXX 100644 |
21 | --- a/hw/misc/Makefile.objs | 13 | --- a/target/arm/helper.c |
22 | +++ b/hw/misc/Makefile.objs | 14 | +++ b/target/arm/helper.c |
23 | @@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_MIPS_ITU) += mips_itu.o | 15 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, |
24 | obj-$(CONFIG_MPS2_FPGAIO) += mps2-fpgaio.o | 16 | fi->s1ptw = true; |
25 | obj-$(CONFIG_MPS2_SCC) += mps2-scc.o | 17 | return ~0; |
26 | 18 | } | |
27 | +obj-$(CONFIG_TZ_PPC) += tz-ppc.o | ||
28 | + | 19 | + |
29 | obj-$(CONFIG_PVPANIC) += pvpanic.o | 20 | + if (arm_is_secure_below_el3(env)) { |
30 | obj-$(CONFIG_HYPERV_TESTDEV) += hyperv_testdev.o | 21 | + /* Check if page table walk is to secure or non-secure PA space. */ |
31 | obj-$(CONFIG_AUX) += auxbus.o | 22 | + if (*is_secure) { |
32 | diff --git a/include/hw/misc/tz-ppc.h b/include/hw/misc/tz-ppc.h | 23 | + *is_secure = !(env->cp15.vstcr_el2.raw_tcr & VSTCR_SW); |
33 | new file mode 100644 | 24 | + } else { |
34 | index XXXXXXX..XXXXXXX | 25 | + *is_secure = !(env->cp15.vtcr_el2.raw_tcr & VTCR_NSW); |
35 | --- /dev/null | 26 | + } |
36 | +++ b/include/hw/misc/tz-ppc.h | ||
37 | @@ -XXX,XX +XXX,XX @@ | ||
38 | +/* | ||
39 | + * ARM TrustZone peripheral protection controller emulation | ||
40 | + * | ||
41 | + * Copyright (c) 2018 Linaro Limited | ||
42 | + * Written by Peter Maydell | ||
43 | + * | ||
44 | + * This program is free software; you can redistribute it and/or modify | ||
45 | + * it under the terms of the GNU General Public License version 2 or | ||
46 | + * (at your option) any later version. | ||
47 | + */ | ||
48 | + | ||
49 | +/* This is a model of the TrustZone peripheral protection controller (PPC). | ||
50 | + * It is documented in the ARM CoreLink SIE-200 System IP for Embedded TRM | ||
51 | + * (DDI 0571G): | ||
52 | + * https://developer.arm.com/products/architecture/m-profile/docs/ddi0571/g | ||
53 | + * | ||
54 | + * The PPC sits in front of peripherals and allows secure software to | ||
55 | + * configure it to either pass through or reject transactions. | ||
56 | + * Rejected transactions may be configured to either be aborted, or to | ||
57 | + * behave as RAZ/WI. An interrupt can be signalled for a rejected transaction. | ||
58 | + * | ||
59 | + * The PPC has no register interface -- it is configured purely by a | ||
60 | + * collection of input signals from other hardware in the system. Typically | ||
61 | + * they are either hardwired or exposed in an ad-hoc register interface by | ||
62 | + * the SoC that uses the PPC. | ||
63 | + * | ||
64 | + * This QEMU model can be used to model either the AHB5 or APB4 TZ PPC, | ||
65 | + * since the only difference between them is that the AHB version has a | ||
66 | + * "default" port which has no security checks applied. In QEMU the default | ||
67 | + * port can be emulated simply by wiring its downstream devices directly | ||
68 | + * into the parent address space, since the PPC does not need to intercept | ||
69 | + * transactions there. | ||
70 | + * | ||
71 | + * In the hardware, selection of which downstream port to use is done by | ||
72 | + * the user's decode logic asserting one of the hsel[] signals. In QEMU, | ||
73 | + * we provide 16 MMIO regions, one per port, and the user maps these into | ||
74 | + * the desired addresses to implement the address decode. | ||
75 | + * | ||
76 | + * QEMU interface: | ||
77 | + * + sysbus MMIO regions 0..15: MemoryRegions defining the upstream end | ||
78 | + * of each of the 16 ports of the PPC | ||
79 | + * + Property "port[0..15]": MemoryRegion defining the downstream device(s) | ||
80 | + * for each of the 16 ports of the PPC | ||
81 | + * + Named GPIO inputs "cfg_nonsec[0..15]": set to 1 if the port should be | ||
82 | + * accessible to NonSecure transactions | ||
83 | + * + Named GPIO inputs "cfg_ap[0..15]": set to 1 if the port should be | ||
84 | + * accessible to non-privileged transactions | ||
85 | + * + Named GPIO input "cfg_sec_resp": set to 1 if a rejected transaction should | ||
86 | + * result in a transaction error, or 0 for the transaction to RAZ/WI | ||
87 | + * + Named GPIO input "irq_enable": set to 1 to enable interrupts | ||
88 | + * + Named GPIO input "irq_clear": set to 1 to clear a pending interrupt | ||
89 | + * + Named GPIO output "irq": set for a transaction-failed interrupt | ||
90 | + * + Property "NONSEC_MASK": if a bit is set in this mask then accesses to | ||
91 | + * the associated port do not have the TZ security check performed. (This | ||
92 | + * corresponds to the hardware allowing this to be set as a Verilog | ||
93 | + * parameter.) | ||
94 | + */ | ||
95 | + | ||
96 | +#ifndef TZ_PPC_H | ||
97 | +#define TZ_PPC_H | ||
98 | + | ||
99 | +#include "hw/sysbus.h" | ||
100 | + | ||
101 | +#define TYPE_TZ_PPC "tz-ppc" | ||
102 | +#define TZ_PPC(obj) OBJECT_CHECK(TZPPC, (obj), TYPE_TZ_PPC) | ||
103 | + | ||
104 | +#define TZ_NUM_PORTS 16 | ||
105 | + | ||
106 | +typedef struct TZPPC TZPPC; | ||
107 | + | ||
108 | +typedef struct TZPPCPort { | ||
109 | + TZPPC *ppc; | ||
110 | + MemoryRegion upstream; | ||
111 | + AddressSpace downstream_as; | ||
112 | + MemoryRegion *downstream; | ||
113 | +} TZPPCPort; | ||
114 | + | ||
115 | +struct TZPPC { | ||
116 | + /*< private >*/ | ||
117 | + SysBusDevice parent_obj; | ||
118 | + | ||
119 | + /*< public >*/ | ||
120 | + | ||
121 | + /* State: these just track the values of our input signals */ | ||
122 | + bool cfg_nonsec[TZ_NUM_PORTS]; | ||
123 | + bool cfg_ap[TZ_NUM_PORTS]; | ||
124 | + bool cfg_sec_resp; | ||
125 | + bool irq_enable; | ||
126 | + bool irq_clear; | ||
127 | + /* State: are we asserting irq ? */ | ||
128 | + bool irq_status; | ||
129 | + | ||
130 | + qemu_irq irq; | ||
131 | + | ||
132 | + /* Properties */ | ||
133 | + uint32_t nonsec_mask; | ||
134 | + | ||
135 | + TZPPCPort port[TZ_NUM_PORTS]; | ||
136 | +}; | ||
137 | + | ||
138 | +#endif | ||
139 | diff --git a/hw/misc/tz-ppc.c b/hw/misc/tz-ppc.c | ||
140 | new file mode 100644 | ||
141 | index XXXXXXX..XXXXXXX | ||
142 | --- /dev/null | ||
143 | +++ b/hw/misc/tz-ppc.c | ||
144 | @@ -XXX,XX +XXX,XX @@ | ||
145 | +/* | ||
146 | + * ARM TrustZone peripheral protection controller emulation | ||
147 | + * | ||
148 | + * Copyright (c) 2018 Linaro Limited | ||
149 | + * Written by Peter Maydell | ||
150 | + * | ||
151 | + * This program is free software; you can redistribute it and/or modify | ||
152 | + * it under the terms of the GNU General Public License version 2 or | ||
153 | + * (at your option) any later version. | ||
154 | + */ | ||
155 | + | ||
156 | +#include "qemu/osdep.h" | ||
157 | +#include "qemu/log.h" | ||
158 | +#include "qapi/error.h" | ||
159 | +#include "trace.h" | ||
160 | +#include "hw/sysbus.h" | ||
161 | +#include "hw/registerfields.h" | ||
162 | +#include "hw/misc/tz-ppc.h" | ||
163 | + | ||
164 | +static void tz_ppc_update_irq(TZPPC *s) | ||
165 | +{ | ||
166 | + bool level = s->irq_status && s->irq_enable; | ||
167 | + | ||
168 | + trace_tz_ppc_update_irq(level); | ||
169 | + qemu_set_irq(s->irq, level); | ||
170 | +} | ||
171 | + | ||
172 | +static void tz_ppc_cfg_nonsec(void *opaque, int n, int level) | ||
173 | +{ | ||
174 | + TZPPC *s = TZ_PPC(opaque); | ||
175 | + | ||
176 | + assert(n < TZ_NUM_PORTS); | ||
177 | + trace_tz_ppc_cfg_nonsec(n, level); | ||
178 | + s->cfg_nonsec[n] = level; | ||
179 | +} | ||
180 | + | ||
181 | +static void tz_ppc_cfg_ap(void *opaque, int n, int level) | ||
182 | +{ | ||
183 | + TZPPC *s = TZ_PPC(opaque); | ||
184 | + | ||
185 | + assert(n < TZ_NUM_PORTS); | ||
186 | + trace_tz_ppc_cfg_ap(n, level); | ||
187 | + s->cfg_ap[n] = level; | ||
188 | +} | ||
189 | + | ||
190 | +static void tz_ppc_cfg_sec_resp(void *opaque, int n, int level) | ||
191 | +{ | ||
192 | + TZPPC *s = TZ_PPC(opaque); | ||
193 | + | ||
194 | + trace_tz_ppc_cfg_sec_resp(level); | ||
195 | + s->cfg_sec_resp = level; | ||
196 | +} | ||
197 | + | ||
198 | +static void tz_ppc_irq_enable(void *opaque, int n, int level) | ||
199 | +{ | ||
200 | + TZPPC *s = TZ_PPC(opaque); | ||
201 | + | ||
202 | + trace_tz_ppc_irq_enable(level); | ||
203 | + s->irq_enable = level; | ||
204 | + tz_ppc_update_irq(s); | ||
205 | +} | ||
206 | + | ||
207 | +static void tz_ppc_irq_clear(void *opaque, int n, int level) | ||
208 | +{ | ||
209 | + TZPPC *s = TZ_PPC(opaque); | ||
210 | + | ||
211 | + trace_tz_ppc_irq_clear(level); | ||
212 | + | ||
213 | + s->irq_clear = level; | ||
214 | + if (level) { | ||
215 | + s->irq_status = false; | ||
216 | + tz_ppc_update_irq(s); | ||
217 | + } | ||
218 | +} | ||
219 | + | ||
220 | +static bool tz_ppc_check(TZPPC *s, int n, MemTxAttrs attrs) | ||
221 | +{ | ||
222 | + /* Check whether to allow an access to port n; return true if | ||
223 | + * the check passes, and false if the transaction must be blocked. | ||
224 | + * If the latter, the caller must check cfg_sec_resp to determine | ||
225 | + * whether to abort or RAZ/WI the transaction. | ||
226 | + * The checks are: | ||
227 | + * + nonsec_mask suppresses any check of the secure attribute | ||
228 | + * + otherwise, block if cfg_nonsec is 1 and transaction is secure, | ||
229 | + * or if cfg_nonsec is 0 and transaction is non-secure | ||
230 | + * + block if transaction is usermode and cfg_ap is 0 | ||
231 | + */ | ||
232 | + if ((attrs.secure == s->cfg_nonsec[n] && !(s->nonsec_mask & (1 << n))) || | ||
233 | + (attrs.user && !s->cfg_ap[n])) { | ||
234 | + /* Block the transaction. */ | ||
235 | + if (!s->irq_clear) { | ||
236 | + /* Note that holding irq_clear high suppresses interrupts */ | ||
237 | + s->irq_status = true; | ||
238 | + tz_ppc_update_irq(s); | ||
239 | + } | ||
240 | + return false; | ||
241 | + } | ||
242 | + return true; | ||
243 | +} | ||
244 | + | ||
245 | +static MemTxResult tz_ppc_read(void *opaque, hwaddr addr, uint64_t *pdata, | ||
246 | + unsigned size, MemTxAttrs attrs) | ||
247 | +{ | ||
248 | + TZPPCPort *p = opaque; | ||
249 | + TZPPC *s = p->ppc; | ||
250 | + int n = p - s->port; | ||
251 | + AddressSpace *as = &p->downstream_as; | ||
252 | + uint64_t data; | ||
253 | + MemTxResult res; | ||
254 | + | ||
255 | + if (!tz_ppc_check(s, n, attrs)) { | ||
256 | + trace_tz_ppc_read_blocked(n, addr, attrs.secure, attrs.user); | ||
257 | + if (s->cfg_sec_resp) { | ||
258 | + return MEMTX_ERROR; | ||
259 | + } else { | 27 | + } else { |
260 | + *pdata = 0; | 28 | + assert(!*is_secure); |
261 | + return MEMTX_OK; | ||
262 | + } | ||
263 | + } | ||
264 | + | ||
265 | + switch (size) { | ||
266 | + case 1: | ||
267 | + data = address_space_ldub(as, addr, attrs, &res); | ||
268 | + break; | ||
269 | + case 2: | ||
270 | + data = address_space_lduw_le(as, addr, attrs, &res); | ||
271 | + break; | ||
272 | + case 4: | ||
273 | + data = address_space_ldl_le(as, addr, attrs, &res); | ||
274 | + break; | ||
275 | + case 8: | ||
276 | + data = address_space_ldq_le(as, addr, attrs, &res); | ||
277 | + break; | ||
278 | + default: | ||
279 | + g_assert_not_reached(); | ||
280 | + } | ||
281 | + *pdata = data; | ||
282 | + return res; | ||
283 | +} | ||
284 | + | ||
285 | +static MemTxResult tz_ppc_write(void *opaque, hwaddr addr, uint64_t val, | ||
286 | + unsigned size, MemTxAttrs attrs) | ||
287 | +{ | ||
288 | + TZPPCPort *p = opaque; | ||
289 | + TZPPC *s = p->ppc; | ||
290 | + AddressSpace *as = &p->downstream_as; | ||
291 | + int n = p - s->port; | ||
292 | + MemTxResult res; | ||
293 | + | ||
294 | + if (!tz_ppc_check(s, n, attrs)) { | ||
295 | + trace_tz_ppc_write_blocked(n, addr, attrs.secure, attrs.user); | ||
296 | + if (s->cfg_sec_resp) { | ||
297 | + return MEMTX_ERROR; | ||
298 | + } else { | ||
299 | + return MEMTX_OK; | ||
300 | + } | ||
301 | + } | ||
302 | + | ||
303 | + switch (size) { | ||
304 | + case 1: | ||
305 | + address_space_stb(as, addr, val, attrs, &res); | ||
306 | + break; | ||
307 | + case 2: | ||
308 | + address_space_stw_le(as, addr, val, attrs, &res); | ||
309 | + break; | ||
310 | + case 4: | ||
311 | + address_space_stl_le(as, addr, val, attrs, &res); | ||
312 | + break; | ||
313 | + case 8: | ||
314 | + address_space_stq_le(as, addr, val, attrs, &res); | ||
315 | + break; | ||
316 | + default: | ||
317 | + g_assert_not_reached(); | ||
318 | + } | ||
319 | + return res; | ||
320 | +} | ||
321 | + | ||
322 | +static const MemoryRegionOps tz_ppc_ops = { | ||
323 | + .read_with_attrs = tz_ppc_read, | ||
324 | + .write_with_attrs = tz_ppc_write, | ||
325 | + .endianness = DEVICE_LITTLE_ENDIAN, | ||
326 | +}; | ||
327 | + | ||
328 | +static void tz_ppc_reset(DeviceState *dev) | ||
329 | +{ | ||
330 | + TZPPC *s = TZ_PPC(dev); | ||
331 | + | ||
332 | + trace_tz_ppc_reset(); | ||
333 | + s->cfg_sec_resp = false; | ||
334 | + memset(s->cfg_nonsec, 0, sizeof(s->cfg_nonsec)); | ||
335 | + memset(s->cfg_ap, 0, sizeof(s->cfg_ap)); | ||
336 | +} | ||
337 | + | ||
338 | +static void tz_ppc_init(Object *obj) | ||
339 | +{ | ||
340 | + DeviceState *dev = DEVICE(obj); | ||
341 | + TZPPC *s = TZ_PPC(obj); | ||
342 | + | ||
343 | + qdev_init_gpio_in_named(dev, tz_ppc_cfg_nonsec, "cfg_nonsec", TZ_NUM_PORTS); | ||
344 | + qdev_init_gpio_in_named(dev, tz_ppc_cfg_ap, "cfg_ap", TZ_NUM_PORTS); | ||
345 | + qdev_init_gpio_in_named(dev, tz_ppc_cfg_sec_resp, "cfg_sec_resp", 1); | ||
346 | + qdev_init_gpio_in_named(dev, tz_ppc_irq_enable, "irq_enable", 1); | ||
347 | + qdev_init_gpio_in_named(dev, tz_ppc_irq_clear, "irq_clear", 1); | ||
348 | + qdev_init_gpio_out_named(dev, &s->irq, "irq", 1); | ||
349 | +} | ||
350 | + | ||
351 | +static void tz_ppc_realize(DeviceState *dev, Error **errp) | ||
352 | +{ | ||
353 | + Object *obj = OBJECT(dev); | ||
354 | + SysBusDevice *sbd = SYS_BUS_DEVICE(dev); | ||
355 | + TZPPC *s = TZ_PPC(dev); | ||
356 | + int i; | ||
357 | + | ||
358 | + /* We can't create the upstream end of the port until realize, | ||
359 | + * as we don't know the size of the MR used as the downstream until then. | ||
360 | + */ | ||
361 | + for (i = 0; i < TZ_NUM_PORTS; i++) { | ||
362 | + TZPPCPort *port = &s->port[i]; | ||
363 | + char *name; | ||
364 | + uint64_t size; | ||
365 | + | ||
366 | + if (!port->downstream) { | ||
367 | + continue; | ||
368 | + } | 29 | + } |
369 | + | 30 | + |
370 | + name = g_strdup_printf("tz-ppc-port[%d]", i); | 31 | addr = s2pa; |
371 | + | 32 | } |
372 | + port->ppc = s; | 33 | return addr; |
373 | + address_space_init(&port->downstream_as, port->downstream, name); | ||
374 | + | ||
375 | + size = memory_region_size(port->downstream); | ||
376 | + memory_region_init_io(&port->upstream, obj, &tz_ppc_ops, | ||
377 | + port, name, size); | ||
378 | + sysbus_init_mmio(sbd, &port->upstream); | ||
379 | + g_free(name); | ||
380 | + } | ||
381 | +} | ||
382 | + | ||
383 | +static const VMStateDescription tz_ppc_vmstate = { | ||
384 | + .name = "tz-ppc", | ||
385 | + .version_id = 1, | ||
386 | + .minimum_version_id = 1, | ||
387 | + .fields = (VMStateField[]) { | ||
388 | + VMSTATE_BOOL_ARRAY(cfg_nonsec, TZPPC, 16), | ||
389 | + VMSTATE_BOOL_ARRAY(cfg_ap, TZPPC, 16), | ||
390 | + VMSTATE_BOOL(cfg_sec_resp, TZPPC), | ||
391 | + VMSTATE_BOOL(irq_enable, TZPPC), | ||
392 | + VMSTATE_BOOL(irq_clear, TZPPC), | ||
393 | + VMSTATE_BOOL(irq_status, TZPPC), | ||
394 | + VMSTATE_END_OF_LIST() | ||
395 | + } | ||
396 | +}; | ||
397 | + | ||
398 | +#define DEFINE_PORT(N) \ | ||
399 | + DEFINE_PROP_LINK("port[" #N "]", TZPPC, port[N].downstream, \ | ||
400 | + TYPE_MEMORY_REGION, MemoryRegion *) | ||
401 | + | ||
402 | +static Property tz_ppc_properties[] = { | ||
403 | + DEFINE_PROP_UINT32("NONSEC_MASK", TZPPC, nonsec_mask, 0), | ||
404 | + DEFINE_PORT(0), | ||
405 | + DEFINE_PORT(1), | ||
406 | + DEFINE_PORT(2), | ||
407 | + DEFINE_PORT(3), | ||
408 | + DEFINE_PORT(4), | ||
409 | + DEFINE_PORT(5), | ||
410 | + DEFINE_PORT(6), | ||
411 | + DEFINE_PORT(7), | ||
412 | + DEFINE_PORT(8), | ||
413 | + DEFINE_PORT(9), | ||
414 | + DEFINE_PORT(10), | ||
415 | + DEFINE_PORT(11), | ||
416 | + DEFINE_PORT(12), | ||
417 | + DEFINE_PORT(13), | ||
418 | + DEFINE_PORT(14), | ||
419 | + DEFINE_PORT(15), | ||
420 | + DEFINE_PROP_END_OF_LIST(), | ||
421 | +}; | ||
422 | + | ||
423 | +static void tz_ppc_class_init(ObjectClass *klass, void *data) | ||
424 | +{ | ||
425 | + DeviceClass *dc = DEVICE_CLASS(klass); | ||
426 | + | ||
427 | + dc->realize = tz_ppc_realize; | ||
428 | + dc->vmsd = &tz_ppc_vmstate; | ||
429 | + dc->reset = tz_ppc_reset; | ||
430 | + dc->props = tz_ppc_properties; | ||
431 | +} | ||
432 | + | ||
433 | +static const TypeInfo tz_ppc_info = { | ||
434 | + .name = TYPE_TZ_PPC, | ||
435 | + .parent = TYPE_SYS_BUS_DEVICE, | ||
436 | + .instance_size = sizeof(TZPPC), | ||
437 | + .instance_init = tz_ppc_init, | ||
438 | + .class_init = tz_ppc_class_init, | ||
439 | +}; | ||
440 | + | ||
441 | +static void tz_ppc_register_types(void) | ||
442 | +{ | ||
443 | + type_register_static(&tz_ppc_info); | ||
444 | +} | ||
445 | + | ||
446 | +type_init(tz_ppc_register_types); | ||
447 | diff --git a/default-configs/arm-softmmu.mak b/default-configs/arm-softmmu.mak | ||
448 | index XXXXXXX..XXXXXXX 100644 | ||
449 | --- a/default-configs/arm-softmmu.mak | ||
450 | +++ b/default-configs/arm-softmmu.mak | ||
451 | @@ -XXX,XX +XXX,XX @@ CONFIG_CMSDK_APB_UART=y | ||
452 | CONFIG_MPS2_FPGAIO=y | ||
453 | CONFIG_MPS2_SCC=y | ||
454 | |||
455 | +CONFIG_TZ_PPC=y | ||
456 | + | ||
457 | CONFIG_VERSATILE_PCI=y | ||
458 | CONFIG_VERSATILE_I2C=y | ||
459 | |||
460 | diff --git a/hw/misc/trace-events b/hw/misc/trace-events | ||
461 | index XXXXXXX..XXXXXXX 100644 | ||
462 | --- a/hw/misc/trace-events | ||
463 | +++ b/hw/misc/trace-events | ||
464 | @@ -XXX,XX +XXX,XX @@ mos6522_get_next_irq_time(uint16_t latch, int64_t d, int64_t delta) "latch=%d co | ||
465 | mos6522_set_sr_int(void) "set sr_int" | ||
466 | mos6522_write(uint64_t addr, uint64_t val) "reg=0x%"PRIx64 " val=0x%"PRIx64 | ||
467 | mos6522_read(uint64_t addr, unsigned val) "reg=0x%"PRIx64 " val=0x%x" | ||
468 | + | ||
469 | +# hw/misc/tz-ppc.c | ||
470 | +tz_ppc_reset(void) "TZ PPC: reset" | ||
471 | +tz_ppc_cfg_nonsec(int n, int level) "TZ PPC: cfg_nonsec[%d] = %d" | ||
472 | +tz_ppc_cfg_ap(int n, int level) "TZ PPC: cfg_ap[%d] = %d" | ||
473 | +tz_ppc_cfg_sec_resp(int level) "TZ PPC: cfg_sec_resp = %d" | ||
474 | +tz_ppc_irq_enable(int level) "TZ PPC: int_enable = %d" | ||
475 | +tz_ppc_irq_clear(int level) "TZ PPC: int_clear = %d" | ||
476 | +tz_ppc_update_irq(int level) "TZ PPC: setting irq line to %d" | ||
477 | +tz_ppc_read_blocked(int n, hwaddr offset, bool secure, bool user) "TZ PPC: port %d offset 0x%" HWADDR_PRIx " read (secure %d user %d) blocked" | ||
478 | +tz_ppc_write_blocked(int n, hwaddr offset, bool secure, bool user) "TZ PPC: port %d offset 0x%" HWADDR_PRIx " write (secure %d user %d) blocked" | ||
479 | -- | 34 | -- |
480 | 2.16.2 | 35 | 2.20.1 |
481 | 36 | ||
482 | 37 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
---|---|---|---|
2 | 2 | ||
3 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 3 | The stage_1_mmu_idx() already effectively keeps track of which |
4 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 4 | translation regimes have two stages. Don't hard-code another test. |
5 | Message-id: 20180228193125.20577-9-richard.henderson@linaro.org | 5 | |
6 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20210112104511.36576-13-remi.denis.courmont@huawei.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | --- | 10 | --- |
8 | target/arm/translate.c | 46 ++++++++++++++++++++++++++++++++++++++++++---- | 11 | target/arm/helper.c | 13 ++++++------- |
9 | 1 file changed, 42 insertions(+), 4 deletions(-) | 12 | 1 file changed, 6 insertions(+), 7 deletions(-) |
10 | 13 | ||
11 | diff --git a/target/arm/translate.c b/target/arm/translate.c | 14 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
12 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
13 | --- a/target/arm/translate.c | 16 | --- a/target/arm/helper.c |
14 | +++ b/target/arm/translate.c | 17 | +++ b/target/arm/helper.c |
15 | @@ -XXX,XX +XXX,XX @@ static const char *regnames[] = | 18 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, |
16 | { "r0", "r1", "r2", "r3", "r4", "r5", "r6", "r7", | 19 | target_ulong *page_size, |
17 | "r8", "r9", "r10", "r11", "r12", "r13", "r14", "pc" }; | 20 | ARMMMUFaultInfo *fi, ARMCacheAttrs *cacheattrs) |
18 | 21 | { | |
19 | +/* Function prototypes for gen_ functions calling Neon helpers. */ | 22 | - if (mmu_idx == ARMMMUIdx_E10_0 || |
20 | +typedef void NeonGenThreeOpEnvFn(TCGv_i32, TCGv_env, TCGv_i32, | 23 | - mmu_idx == ARMMMUIdx_E10_1 || |
21 | + TCGv_i32, TCGv_i32); | 24 | - mmu_idx == ARMMMUIdx_E10_1_PAN) { |
25 | + ARMMMUIdx s1_mmu_idx = stage_1_mmu_idx(mmu_idx); | ||
22 | + | 26 | + |
23 | /* initialize TCG globals. */ | 27 | + if (mmu_idx != s1_mmu_idx) { |
24 | void arm_translate_init(void) | 28 | /* Call ourselves recursively to do the stage 1 and then stage 2 |
25 | { | 29 | - * translations. |
26 | @@ -XXX,XX +XXX,XX @@ static int disas_neon_data_insn(DisasContext *s, uint32_t insn) | 30 | + * translations if mmu_idx is a two-stage regime. |
27 | } | 31 | */ |
28 | neon_store_reg64(cpu_V0, rd + pass); | 32 | if (arm_feature(env, ARM_FEATURE_EL2)) { |
29 | } | 33 | hwaddr ipa; |
30 | - | 34 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, |
31 | - | 35 | int ret; |
32 | break; | 36 | ARMCacheAttrs cacheattrs2 = {}; |
33 | - default: /* 14 and 15 are RESERVED */ | 37 | |
34 | - return 1; | 38 | - ret = get_phys_addr(env, address, access_type, |
35 | + case 14: /* VQRDMLAH scalar */ | 39 | - stage_1_mmu_idx(mmu_idx), &ipa, attrs, |
36 | + case 15: /* VQRDMLSH scalar */ | 40 | - prot, page_size, fi, cacheattrs); |
37 | + { | 41 | + ret = get_phys_addr(env, address, access_type, s1_mmu_idx, &ipa, |
38 | + NeonGenThreeOpEnvFn *fn; | 42 | + attrs, prot, page_size, fi, cacheattrs); |
39 | + | 43 | |
40 | + if (!arm_dc_feature(s, ARM_FEATURE_V8_RDM)) { | 44 | /* If S1 fails or S2 is disabled, return early. */ |
41 | + return 1; | 45 | if (ret || regime_translation_disabled(env, ARMMMUIdx_Stage2)) { |
42 | + } | ||
43 | + if (u && ((rd | rn) & 1)) { | ||
44 | + return 1; | ||
45 | + } | ||
46 | + if (op == 14) { | ||
47 | + if (size == 1) { | ||
48 | + fn = gen_helper_neon_qrdmlah_s16; | ||
49 | + } else { | ||
50 | + fn = gen_helper_neon_qrdmlah_s32; | ||
51 | + } | ||
52 | + } else { | ||
53 | + if (size == 1) { | ||
54 | + fn = gen_helper_neon_qrdmlsh_s16; | ||
55 | + } else { | ||
56 | + fn = gen_helper_neon_qrdmlsh_s32; | ||
57 | + } | ||
58 | + } | ||
59 | + | ||
60 | + tmp2 = neon_get_scalar(size, rm); | ||
61 | + for (pass = 0; pass < (u ? 4 : 2); pass++) { | ||
62 | + tmp = neon_load_reg(rn, pass); | ||
63 | + tmp3 = neon_load_reg(rd, pass); | ||
64 | + fn(tmp, cpu_env, tmp, tmp2, tmp3); | ||
65 | + tcg_temp_free_i32(tmp3); | ||
66 | + neon_store_reg(rd, pass, tmp); | ||
67 | + } | ||
68 | + tcg_temp_free_i32(tmp2); | ||
69 | + } | ||
70 | + break; | ||
71 | + default: | ||
72 | + g_assert_not_reached(); | ||
73 | } | ||
74 | } | ||
75 | } else { /* size == 3 */ | ||
76 | -- | 46 | -- |
77 | 2.16.2 | 47 | 2.20.1 |
78 | 48 | ||
79 | 49 | diff view generated by jsdifflib |
1 | The function qdev_init_gpio_in_named() passes the DeviceState pointer | 1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
---|---|---|---|
2 | as the opaque data pointor for the irq handler function. Usually | ||
3 | this is what you want, but in some cases it would be helpful to use | ||
4 | some other data pointer. | ||
5 | 2 | ||
6 | Add a new function qdev_init_gpio_in_named_with_opaque() which allows | 3 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
7 | the caller to specify the data pointer they want. | 4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
5 | Message-id: 20210112104511.36576-14-remi.denis.courmont@huawei.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | --- | ||
8 | target/arm/cpu.h | 6 +++- | ||
9 | target/arm/internals.h | 22 ++++++++++++ | ||
10 | target/arm/helper.c | 78 +++++++++++++++++++++++++++++------------- | ||
11 | 3 files changed, 81 insertions(+), 25 deletions(-) | ||
8 | 12 | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 13 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
10 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
11 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
12 | Message-id: 20180220180325.29818-12-peter.maydell@linaro.org | ||
13 | --- | ||
14 | include/hw/qdev-core.h | 30 ++++++++++++++++++++++++++++-- | ||
15 | hw/core/qdev.c | 8 +++++--- | ||
16 | 2 files changed, 33 insertions(+), 5 deletions(-) | ||
17 | |||
18 | diff --git a/include/hw/qdev-core.h b/include/hw/qdev-core.h | ||
19 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
20 | --- a/include/hw/qdev-core.h | 15 | --- a/target/arm/cpu.h |
21 | +++ b/include/hw/qdev-core.h | 16 | +++ b/target/arm/cpu.h |
22 | @@ -XXX,XX +XXX,XX @@ BusState *qdev_get_child_bus(DeviceState *dev, const char *name); | 17 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdx { |
23 | /* GPIO inputs also double as IRQ sinks. */ | 18 | ARMMMUIdx_Stage1_E0 = 0 | ARM_MMU_IDX_NOTLB, |
24 | void qdev_init_gpio_in(DeviceState *dev, qemu_irq_handler handler, int n); | 19 | ARMMMUIdx_Stage1_E1 = 1 | ARM_MMU_IDX_NOTLB, |
25 | void qdev_init_gpio_out(DeviceState *dev, qemu_irq *pins, int n); | 20 | ARMMMUIdx_Stage1_E1_PAN = 2 | ARM_MMU_IDX_NOTLB, |
26 | -void qdev_init_gpio_in_named(DeviceState *dev, qemu_irq_handler handler, | 21 | + ARMMMUIdx_Stage1_SE0 = 3 | ARM_MMU_IDX_NOTLB, |
27 | - const char *name, int n); | 22 | + ARMMMUIdx_Stage1_SE1 = 4 | ARM_MMU_IDX_NOTLB, |
28 | void qdev_init_gpio_out_named(DeviceState *dev, qemu_irq *pins, | 23 | + ARMMMUIdx_Stage1_SE1_PAN = 5 | ARM_MMU_IDX_NOTLB, |
29 | const char *name, int n); | 24 | /* |
30 | +/** | 25 | * Not allocated a TLB: used only for second stage of an S12 page |
31 | + * qdev_init_gpio_in_named_with_opaque: create an array of input GPIO lines | 26 | * table walk, or for descriptor loads during first stage of an S1 |
32 | + * for the specified device | 27 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdx { |
33 | + * | 28 | * then various TLB flush insns which currently are no-ops or flush |
34 | + * @dev: Device to create input GPIOs for | 29 | * only stage 1 MMU indexes will need to change to flush stage 2. |
35 | + * @handler: Function to call when GPIO line value is set | 30 | */ |
36 | + * @opaque: Opaque data pointer to pass to @handler | 31 | - ARMMMUIdx_Stage2 = 3 | ARM_MMU_IDX_NOTLB, |
37 | + * @name: Name of the GPIO input (must be unique for this device) | 32 | + ARMMMUIdx_Stage2 = 6 | ARM_MMU_IDX_NOTLB, |
38 | + * @n: Number of GPIO lines in this input set | 33 | + ARMMMUIdx_Stage2_S = 7 | ARM_MMU_IDX_NOTLB, |
39 | + */ | 34 | |
40 | +void qdev_init_gpio_in_named_with_opaque(DeviceState *dev, | 35 | /* |
41 | + qemu_irq_handler handler, | 36 | * M-profile. |
42 | + void *opaque, | 37 | diff --git a/target/arm/internals.h b/target/arm/internals.h |
43 | + const char *name, int n); | 38 | index XXXXXXX..XXXXXXX 100644 |
39 | --- a/target/arm/internals.h | ||
40 | +++ b/target/arm/internals.h | ||
41 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_has_2_ranges(ARMMMUIdx mmu_idx) | ||
42 | case ARMMMUIdx_Stage1_E0: | ||
43 | case ARMMMUIdx_Stage1_E1: | ||
44 | case ARMMMUIdx_Stage1_E1_PAN: | ||
45 | + case ARMMMUIdx_Stage1_SE0: | ||
46 | + case ARMMMUIdx_Stage1_SE1: | ||
47 | + case ARMMMUIdx_Stage1_SE1_PAN: | ||
48 | case ARMMMUIdx_E10_0: | ||
49 | case ARMMMUIdx_E10_1: | ||
50 | case ARMMMUIdx_E10_1_PAN: | ||
51 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_secure(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
52 | case ARMMMUIdx_SE20_0: | ||
53 | case ARMMMUIdx_SE20_2: | ||
54 | case ARMMMUIdx_SE20_2_PAN: | ||
55 | + case ARMMMUIdx_Stage1_SE0: | ||
56 | + case ARMMMUIdx_Stage1_SE1: | ||
57 | + case ARMMMUIdx_Stage1_SE1_PAN: | ||
58 | case ARMMMUIdx_SE2: | ||
59 | + case ARMMMUIdx_Stage2_S: | ||
60 | case ARMMMUIdx_MSPrivNegPri: | ||
61 | case ARMMMUIdx_MSUserNegPri: | ||
62 | case ARMMMUIdx_MSPriv: | ||
63 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_pan(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
64 | { | ||
65 | switch (mmu_idx) { | ||
66 | case ARMMMUIdx_Stage1_E1_PAN: | ||
67 | + case ARMMMUIdx_Stage1_SE1_PAN: | ||
68 | case ARMMMUIdx_E10_1_PAN: | ||
69 | case ARMMMUIdx_E20_2_PAN: | ||
70 | case ARMMMUIdx_SE10_1_PAN: | ||
71 | @@ -XXX,XX +XXX,XX @@ static inline uint32_t regime_el(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
72 | case ARMMMUIdx_E20_2: | ||
73 | case ARMMMUIdx_E20_2_PAN: | ||
74 | case ARMMMUIdx_Stage2: | ||
75 | + case ARMMMUIdx_Stage2_S: | ||
76 | case ARMMMUIdx_SE2: | ||
77 | case ARMMMUIdx_E2: | ||
78 | return 2; | ||
79 | case ARMMMUIdx_SE3: | ||
80 | return 3; | ||
81 | case ARMMMUIdx_SE10_0: | ||
82 | + case ARMMMUIdx_Stage1_SE0: | ||
83 | return arm_el_is_aa64(env, 3) ? 1 : 3; | ||
84 | case ARMMMUIdx_SE10_1: | ||
85 | case ARMMMUIdx_SE10_1_PAN: | ||
86 | case ARMMMUIdx_Stage1_E0: | ||
87 | case ARMMMUIdx_Stage1_E1: | ||
88 | case ARMMMUIdx_Stage1_E1_PAN: | ||
89 | + case ARMMMUIdx_Stage1_SE1: | ||
90 | + case ARMMMUIdx_Stage1_SE1_PAN: | ||
91 | case ARMMMUIdx_E10_0: | ||
92 | case ARMMMUIdx_E10_1: | ||
93 | case ARMMMUIdx_E10_1_PAN: | ||
94 | @@ -XXX,XX +XXX,XX @@ static inline TCR *regime_tcr(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
95 | if (mmu_idx == ARMMMUIdx_Stage2) { | ||
96 | return &env->cp15.vtcr_el2; | ||
97 | } | ||
98 | + if (mmu_idx == ARMMMUIdx_Stage2_S) { | ||
99 | + /* | ||
100 | + * Note: Secure stage 2 nominally shares fields from VTCR_EL2, but | ||
101 | + * those are not currently used by QEMU, so just return VSTCR_EL2. | ||
102 | + */ | ||
103 | + return &env->cp15.vstcr_el2; | ||
104 | + } | ||
105 | return &env->cp15.tcr_el[regime_el(env, mmu_idx)]; | ||
106 | } | ||
107 | |||
108 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_mmu_idx_is_stage1_of_2(ARMMMUIdx mmu_idx) | ||
109 | case ARMMMUIdx_Stage1_E0: | ||
110 | case ARMMMUIdx_Stage1_E1: | ||
111 | case ARMMMUIdx_Stage1_E1_PAN: | ||
112 | + case ARMMMUIdx_Stage1_SE0: | ||
113 | + case ARMMMUIdx_Stage1_SE1: | ||
114 | + case ARMMMUIdx_Stage1_SE1_PAN: | ||
115 | return true; | ||
116 | default: | ||
117 | return false; | ||
118 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
119 | index XXXXXXX..XXXXXXX 100644 | ||
120 | --- a/target/arm/helper.c | ||
121 | +++ b/target/arm/helper.c | ||
122 | @@ -XXX,XX +XXX,XX @@ static uint64_t do_ats_write(CPUARMState *env, uint64_t value, | ||
123 | uint32_t syn, fsr, fsc; | ||
124 | bool take_exc = false; | ||
125 | |||
126 | - if (fi.s1ptw && current_el == 1 && !arm_is_secure(env) | ||
127 | + if (fi.s1ptw && current_el == 1 | ||
128 | && arm_mmu_idx_is_stage1_of_2(mmu_idx)) { | ||
129 | /* | ||
130 | * Synchronous stage 2 fault on an access made as part of the | ||
131 | @@ -XXX,XX +XXX,XX @@ static void ats_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
132 | /* fall through */ | ||
133 | case 1: | ||
134 | if (ri->crm == 9 && (env->uncached_cpsr & CPSR_PAN)) { | ||
135 | - mmu_idx = (secure ? ARMMMUIdx_SE10_1_PAN | ||
136 | + mmu_idx = (secure ? ARMMMUIdx_Stage1_SE1_PAN | ||
137 | : ARMMMUIdx_Stage1_E1_PAN); | ||
138 | } else { | ||
139 | - mmu_idx = secure ? ARMMMUIdx_SE10_1 : ARMMMUIdx_Stage1_E1; | ||
140 | + mmu_idx = secure ? ARMMMUIdx_Stage1_SE1 : ARMMMUIdx_Stage1_E1; | ||
141 | } | ||
142 | break; | ||
143 | default: | ||
144 | @@ -XXX,XX +XXX,XX @@ static void ats_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
145 | mmu_idx = ARMMMUIdx_SE10_0; | ||
146 | break; | ||
147 | case 2: | ||
148 | + g_assert(!secure); /* ARMv8.4-SecEL2 is 64-bit only */ | ||
149 | mmu_idx = ARMMMUIdx_Stage1_E0; | ||
150 | break; | ||
151 | case 1: | ||
152 | - mmu_idx = secure ? ARMMMUIdx_SE10_0 : ARMMMUIdx_Stage1_E0; | ||
153 | + mmu_idx = secure ? ARMMMUIdx_Stage1_SE0 : ARMMMUIdx_Stage1_E0; | ||
154 | break; | ||
155 | default: | ||
156 | g_assert_not_reached(); | ||
157 | @@ -XXX,XX +XXX,XX @@ static void ats_write64(CPUARMState *env, const ARMCPRegInfo *ri, | ||
158 | switch (ri->opc1) { | ||
159 | case 0: /* AT S1E1R, AT S1E1W, AT S1E1RP, AT S1E1WP */ | ||
160 | if (ri->crm == 9 && (env->pstate & PSTATE_PAN)) { | ||
161 | - mmu_idx = (secure ? ARMMMUIdx_SE10_1_PAN | ||
162 | + mmu_idx = (secure ? ARMMMUIdx_Stage1_SE1_PAN | ||
163 | : ARMMMUIdx_Stage1_E1_PAN); | ||
164 | } else { | ||
165 | - mmu_idx = secure ? ARMMMUIdx_SE10_1 : ARMMMUIdx_Stage1_E1; | ||
166 | + mmu_idx = secure ? ARMMMUIdx_Stage1_SE1 : ARMMMUIdx_Stage1_E1; | ||
167 | } | ||
168 | break; | ||
169 | case 4: /* AT S1E2R, AT S1E2W */ | ||
170 | @@ -XXX,XX +XXX,XX @@ static void ats_write64(CPUARMState *env, const ARMCPRegInfo *ri, | ||
171 | } | ||
172 | break; | ||
173 | case 2: /* AT S1E0R, AT S1E0W */ | ||
174 | - mmu_idx = secure ? ARMMMUIdx_SE10_0 : ARMMMUIdx_Stage1_E0; | ||
175 | + mmu_idx = secure ? ARMMMUIdx_Stage1_SE0 : ARMMMUIdx_Stage1_E0; | ||
176 | break; | ||
177 | case 4: /* AT S12E1R, AT S12E1W */ | ||
178 | mmu_idx = secure ? ARMMMUIdx_SE10_1 : ARMMMUIdx_E10_1; | ||
179 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_translation_disabled(CPUARMState *env, | ||
180 | |||
181 | hcr_el2 = arm_hcr_el2_eff(env); | ||
182 | |||
183 | - if (mmu_idx == ARMMMUIdx_Stage2) { | ||
184 | + if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
185 | /* HCR.DC means HCR.VM behaves as 1 */ | ||
186 | return (hcr_el2 & (HCR_DC | HCR_VM)) == 0; | ||
187 | } | ||
188 | @@ -XXX,XX +XXX,XX @@ static inline uint64_t regime_ttbr(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
189 | if (mmu_idx == ARMMMUIdx_Stage2) { | ||
190 | return env->cp15.vttbr_el2; | ||
191 | } | ||
192 | + if (mmu_idx == ARMMMUIdx_Stage2_S) { | ||
193 | + return env->cp15.vsttbr_el2; | ||
194 | + } | ||
195 | if (ttbrn == 0) { | ||
196 | return env->cp15.ttbr0_el[regime_el(env, mmu_idx)]; | ||
197 | } else { | ||
198 | @@ -XXX,XX +XXX,XX @@ static inline uint64_t regime_ttbr(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
199 | static inline ARMMMUIdx stage_1_mmu_idx(ARMMMUIdx mmu_idx) | ||
200 | { | ||
201 | switch (mmu_idx) { | ||
202 | + case ARMMMUIdx_SE10_0: | ||
203 | + return ARMMMUIdx_Stage1_SE0; | ||
204 | + case ARMMMUIdx_SE10_1: | ||
205 | + return ARMMMUIdx_Stage1_SE1; | ||
206 | + case ARMMMUIdx_SE10_1_PAN: | ||
207 | + return ARMMMUIdx_Stage1_SE1_PAN; | ||
208 | case ARMMMUIdx_E10_0: | ||
209 | return ARMMMUIdx_Stage1_E0; | ||
210 | case ARMMMUIdx_E10_1: | ||
211 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_user(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
212 | case ARMMMUIdx_E20_0: | ||
213 | case ARMMMUIdx_SE20_0: | ||
214 | case ARMMMUIdx_Stage1_E0: | ||
215 | + case ARMMMUIdx_Stage1_SE0: | ||
216 | case ARMMMUIdx_MUser: | ||
217 | case ARMMMUIdx_MSUser: | ||
218 | case ARMMMUIdx_MUserNegPri: | ||
219 | @@ -XXX,XX +XXX,XX @@ static int get_S1prot(CPUARMState *env, ARMMMUIdx mmu_idx, bool is_aa64, | ||
220 | int wxn = 0; | ||
221 | |||
222 | assert(mmu_idx != ARMMMUIdx_Stage2); | ||
223 | + assert(mmu_idx != ARMMMUIdx_Stage2_S); | ||
224 | |||
225 | user_rw = simple_ap_to_rw_prot_is_user(ap, true); | ||
226 | if (is_user) { | ||
227 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
228 | hwaddr s2pa; | ||
229 | int s2prot; | ||
230 | int ret; | ||
231 | + ARMMMUIdx s2_mmu_idx = *is_secure ? ARMMMUIdx_Stage2_S | ||
232 | + : ARMMMUIdx_Stage2; | ||
233 | ARMCacheAttrs cacheattrs = {}; | ||
234 | MemTxAttrs txattrs = {}; | ||
235 | |||
236 | - assert(!*is_secure); /* TODO: S-EL2 */ | ||
237 | - | ||
238 | - ret = get_phys_addr_lpae(env, addr, MMU_DATA_LOAD, ARMMMUIdx_Stage2, | ||
239 | - false, | ||
240 | + ret = get_phys_addr_lpae(env, addr, MMU_DATA_LOAD, s2_mmu_idx, false, | ||
241 | &s2pa, &txattrs, &s2prot, &s2size, fi, | ||
242 | &cacheattrs); | ||
243 | if (ret) { | ||
244 | @@ -XXX,XX +XXX,XX @@ static int aa64_va_parameter_tbi(uint64_t tcr, ARMMMUIdx mmu_idx) | ||
245 | { | ||
246 | if (regime_has_2_ranges(mmu_idx)) { | ||
247 | return extract64(tcr, 37, 2); | ||
248 | - } else if (mmu_idx == ARMMMUIdx_Stage2) { | ||
249 | + } else if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
250 | return 0; /* VTCR_EL2 */ | ||
251 | } else { | ||
252 | /* Replicate the single TBI bit so we always have 2 bits. */ | ||
253 | @@ -XXX,XX +XXX,XX @@ static int aa64_va_parameter_tbid(uint64_t tcr, ARMMMUIdx mmu_idx) | ||
254 | { | ||
255 | if (regime_has_2_ranges(mmu_idx)) { | ||
256 | return extract64(tcr, 51, 2); | ||
257 | - } else if (mmu_idx == ARMMMUIdx_Stage2) { | ||
258 | + } else if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
259 | return 0; /* VTCR_EL2 */ | ||
260 | } else { | ||
261 | /* Replicate the single TBID bit so we always have 2 bits. */ | ||
262 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
263 | tsz = extract32(tcr, 0, 6); | ||
264 | using64k = extract32(tcr, 14, 1); | ||
265 | using16k = extract32(tcr, 15, 1); | ||
266 | - if (mmu_idx == ARMMMUIdx_Stage2) { | ||
267 | + if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
268 | /* VTCR_EL2 */ | ||
269 | hpd = false; | ||
270 | } else { | ||
271 | @@ -XXX,XX +XXX,XX @@ static ARMVAParameters aa32_va_parameters(CPUARMState *env, uint32_t va, | ||
272 | int select, tsz; | ||
273 | bool epd, hpd; | ||
274 | |||
275 | + assert(mmu_idx != ARMMMUIdx_Stage2_S); | ||
44 | + | 276 | + |
45 | +/** | 277 | if (mmu_idx == ARMMMUIdx_Stage2) { |
46 | + * qdev_init_gpio_in_named: create an array of input GPIO lines | 278 | /* VTCR */ |
47 | + * for the specified device | 279 | bool sext = extract32(tcr, 4, 1); |
48 | + * | 280 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, |
49 | + * Like qdev_init_gpio_in_named_with_opaque(), but the opaque pointer | 281 | goto do_fault; |
50 | + * passed to the handler is @dev (which is the most commonly desired behaviour). | 282 | } |
51 | + */ | 283 | |
52 | +static inline void qdev_init_gpio_in_named(DeviceState *dev, | 284 | - if (mmu_idx != ARMMMUIdx_Stage2) { |
53 | + qemu_irq_handler handler, | 285 | + if (mmu_idx != ARMMMUIdx_Stage2 && mmu_idx != ARMMMUIdx_Stage2_S) { |
54 | + const char *name, int n) | 286 | /* The starting level depends on the virtual address size (which can |
55 | +{ | 287 | * be up to 48 bits) and the translation granule size. It indicates |
56 | + qdev_init_gpio_in_named_with_opaque(dev, handler, dev, name, n); | 288 | * the number of strides (stride bits at a time) needed to |
57 | +} | 289 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, |
58 | 290 | attrs = extract64(descriptor, 2, 10) | |
59 | void qdev_pass_gpios(DeviceState *dev, DeviceState *container, | 291 | | (extract64(descriptor, 52, 12) << 10); |
60 | const char *name); | 292 | |
61 | diff --git a/hw/core/qdev.c b/hw/core/qdev.c | 293 | - if (mmu_idx == ARMMMUIdx_Stage2) { |
62 | index XXXXXXX..XXXXXXX 100644 | 294 | + if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { |
63 | --- a/hw/core/qdev.c | 295 | /* Stage 2 table descriptors do not include any attribute fields */ |
64 | +++ b/hw/core/qdev.c | 296 | break; |
65 | @@ -XXX,XX +XXX,XX @@ static NamedGPIOList *qdev_get_named_gpio_list(DeviceState *dev, | 297 | } |
66 | return ngl; | 298 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, |
299 | |||
300 | ap = extract32(attrs, 4, 2); | ||
301 | |||
302 | - if (mmu_idx == ARMMMUIdx_Stage2) { | ||
303 | - ns = true; | ||
304 | + if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
305 | + ns = mmu_idx == ARMMMUIdx_Stage2; | ||
306 | xn = extract32(attrs, 11, 2); | ||
307 | *prot = get_S2prot(env, ap, xn, s1_is_el0); | ||
308 | } else { | ||
309 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
310 | arm_tlb_bti_gp(txattrs) = true; | ||
311 | } | ||
312 | |||
313 | - if (mmu_idx == ARMMMUIdx_Stage2) { | ||
314 | + if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
315 | cacheattrs->attrs = convert_stage2_attrs(env, extract32(attrs, 0, 4)); | ||
316 | } else { | ||
317 | /* Index into MAIR registers for cache attributes */ | ||
318 | @@ -XXX,XX +XXX,XX @@ do_fault: | ||
319 | fi->type = fault_type; | ||
320 | fi->level = level; | ||
321 | /* Tag the error as S2 for failed S1 PTW at S2 or ordinary S2. */ | ||
322 | - fi->stage2 = fi->s1ptw || (mmu_idx == ARMMMUIdx_Stage2); | ||
323 | + fi->stage2 = fi->s1ptw || (mmu_idx == ARMMMUIdx_Stage2 || | ||
324 | + mmu_idx == ARMMMUIdx_Stage2_S); | ||
325 | return true; | ||
67 | } | 326 | } |
68 | 327 | ||
69 | -void qdev_init_gpio_in_named(DeviceState *dev, qemu_irq_handler handler, | 328 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, |
70 | - const char *name, int n) | 329 | int s2_prot; |
71 | +void qdev_init_gpio_in_named_with_opaque(DeviceState *dev, | 330 | int ret; |
72 | + qemu_irq_handler handler, | 331 | ARMCacheAttrs cacheattrs2 = {}; |
73 | + void *opaque, | 332 | + ARMMMUIdx s2_mmu_idx; |
74 | + const char *name, int n) | 333 | + bool is_el0; |
75 | { | 334 | |
76 | int i; | 335 | ret = get_phys_addr(env, address, access_type, s1_mmu_idx, &ipa, |
77 | NamedGPIOList *gpio_list = qdev_get_named_gpio_list(dev, name); | 336 | attrs, prot, page_size, fi, cacheattrs); |
78 | 337 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | |
79 | assert(gpio_list->num_out == 0 || !name); | 338 | return ret; |
80 | gpio_list->in = qemu_extend_irqs(gpio_list->in, gpio_list->num_in, handler, | 339 | } |
81 | - dev, n); | 340 | |
82 | + opaque, n); | 341 | + s2_mmu_idx = attrs->secure ? ARMMMUIdx_Stage2_S : ARMMMUIdx_Stage2; |
83 | 342 | + is_el0 = mmu_idx == ARMMMUIdx_E10_0 || mmu_idx == ARMMMUIdx_SE10_0; | |
84 | if (!name) { | 343 | + |
85 | name = "unnamed-gpio-in"; | 344 | /* S1 is done. Now do S2 translation. */ |
345 | - ret = get_phys_addr_lpae(env, ipa, access_type, ARMMMUIdx_Stage2, | ||
346 | - mmu_idx == ARMMMUIdx_E10_0, | ||
347 | + ret = get_phys_addr_lpae(env, ipa, access_type, s2_mmu_idx, is_el0, | ||
348 | phys_ptr, attrs, &s2_prot, | ||
349 | page_size, fi, &cacheattrs2); | ||
350 | fi->s2addr = ipa; | ||
351 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
352 | cacheattrs->shareability = 0; | ||
353 | } | ||
354 | *cacheattrs = combine_cacheattrs(*cacheattrs, cacheattrs2); | ||
355 | + | ||
356 | + /* Check if IPA translates to secure or non-secure PA space. */ | ||
357 | + if (arm_is_secure_below_el3(env)) { | ||
358 | + if (attrs->secure) { | ||
359 | + attrs->secure = | ||
360 | + !(env->cp15.vstcr_el2.raw_tcr & (VSTCR_SA | VSTCR_SW)); | ||
361 | + } else { | ||
362 | + attrs->secure = | ||
363 | + !((env->cp15.vtcr_el2.raw_tcr & (VTCR_NSA | VTCR_NSW)) | ||
364 | + || (env->cp15.vstcr_el2.raw_tcr & VSTCR_SA)); | ||
365 | + } | ||
366 | + } | ||
367 | return 0; | ||
368 | } else { | ||
369 | /* | ||
370 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
371 | * MMU disabled. S1 addresses within aa64 translation regimes are | ||
372 | * still checked for bounds -- see AArch64.TranslateAddressS1Off. | ||
373 | */ | ||
374 | - if (mmu_idx != ARMMMUIdx_Stage2) { | ||
375 | + if (mmu_idx != ARMMMUIdx_Stage2 && mmu_idx != ARMMMUIdx_Stage2_S) { | ||
376 | int r_el = regime_el(env, mmu_idx); | ||
377 | if (arm_el_is_aa64(env, r_el)) { | ||
378 | int pamax = arm_pamax(env_archcpu(env)); | ||
86 | -- | 379 | -- |
87 | 2.16.2 | 380 | 2.20.1 |
88 | 381 | ||
89 | 382 | diff view generated by jsdifflib |
1 | In v8M, the Implementation Defined Attribution Unit (IDAU) is | 1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
---|---|---|---|
2 | a small piece of hardware typically implemented in the SoC | ||
3 | which provides board or SoC specific security attribution | ||
4 | information for each address that the CPU performs MPU/SAU | ||
5 | checks on. For QEMU, we model this with a QOM interface which | ||
6 | is implemented by the board or SoC object and connected to | ||
7 | the CPU using a link property. | ||
8 | 2 | ||
9 | This commit defines the new interface class, adds the link | 3 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
10 | property to the CPU object, and makes the SAU checking | 4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
11 | code call the IDAU interface if one is present. | 5 | Message-id: 20210112104511.36576-15-remi.denis.courmont@huawei.com |
12 | |||
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
14 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
15 | Message-id: 20180220180325.29818-5-peter.maydell@linaro.org | ||
16 | --- | 7 | --- |
17 | target/arm/cpu.h | 3 +++ | 8 | target/arm/cpu.h | 2 ++ |
18 | target/arm/idau.h | 61 +++++++++++++++++++++++++++++++++++++++++++++++++++++ | 9 | target/arm/internals.h | 2 ++ |
19 | target/arm/cpu.c | 15 +++++++++++++ | 10 | target/arm/helper.c | 6 ++++++ |
20 | target/arm/helper.c | 28 +++++++++++++++++++++--- | 11 | target/arm/tlb_helper.c | 3 +++ |
21 | 4 files changed, 104 insertions(+), 3 deletions(-) | 12 | 4 files changed, 13 insertions(+) |
22 | create mode 100644 target/arm/idau.h | ||
23 | 13 | ||
24 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 14 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
25 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
26 | --- a/target/arm/cpu.h | 16 | --- a/target/arm/cpu.h |
27 | +++ b/target/arm/cpu.h | 17 | +++ b/target/arm/cpu.h |
28 | @@ -XXX,XX +XXX,XX @@ struct ARMCPU { | 18 | @@ -XXX,XX +XXX,XX @@ static inline void xpsr_write(CPUARMState *env, uint32_t val, uint32_t mask) |
29 | /* MemoryRegion to use for secure physical accesses */ | 19 | #define HCR_TWEDEN (1ULL << 59) |
30 | MemoryRegion *secure_memory; | 20 | #define HCR_TWEDEL MAKE_64BIT_MASK(60, 4) |
31 | 21 | ||
32 | + /* For v8M, pointer to the IDAU interface provided by board/SoC */ | 22 | +#define HPFAR_NS (1ULL << 63) |
33 | + Object *idau; | ||
34 | + | 23 | + |
35 | /* 'compatible' string for this CPU for Linux device trees */ | 24 | #define SCR_NS (1U << 0) |
36 | const char *dtb_compatible; | 25 | #define SCR_IRQ (1U << 1) |
37 | 26 | #define SCR_FIQ (1U << 2) | |
38 | diff --git a/target/arm/idau.h b/target/arm/idau.h | 27 | diff --git a/target/arm/internals.h b/target/arm/internals.h |
39 | new file mode 100644 | ||
40 | index XXXXXXX..XXXXXXX | ||
41 | --- /dev/null | ||
42 | +++ b/target/arm/idau.h | ||
43 | @@ -XXX,XX +XXX,XX @@ | ||
44 | +/* | ||
45 | + * QEMU ARM CPU -- interface for the Arm v8M IDAU | ||
46 | + * | ||
47 | + * Copyright (c) 2018 Linaro Ltd | ||
48 | + * | ||
49 | + * This program is free software; you can redistribute it and/or | ||
50 | + * modify it under the terms of the GNU General Public License | ||
51 | + * as published by the Free Software Foundation; either version 2 | ||
52 | + * of the License, or (at your option) any later version. | ||
53 | + * | ||
54 | + * This program is distributed in the hope that it will be useful, | ||
55 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
56 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
57 | + * GNU General Public License for more details. | ||
58 | + * | ||
59 | + * You should have received a copy of the GNU General Public License | ||
60 | + * along with this program; if not, see | ||
61 | + * <http://www.gnu.org/licenses/gpl-2.0.html> | ||
62 | + * | ||
63 | + * In the v8M architecture, the IDAU is a small piece of hardware | ||
64 | + * typically implemented in the SoC which provides board or SoC | ||
65 | + * specific security attribution information for each address that | ||
66 | + * the CPU performs MPU/SAU checks on. For QEMU, we model this with a | ||
67 | + * QOM interface which is implemented by the board or SoC object and | ||
68 | + * connected to the CPU using a link property. | ||
69 | + */ | ||
70 | + | ||
71 | +#ifndef TARGET_ARM_IDAU_H | ||
72 | +#define TARGET_ARM_IDAU_H | ||
73 | + | ||
74 | +#include "qom/object.h" | ||
75 | + | ||
76 | +#define TYPE_IDAU_INTERFACE "idau-interface" | ||
77 | +#define IDAU_INTERFACE(obj) \ | ||
78 | + INTERFACE_CHECK(IDAUInterface, (obj), TYPE_IDAU_INTERFACE) | ||
79 | +#define IDAU_INTERFACE_CLASS(class) \ | ||
80 | + OBJECT_CLASS_CHECK(IDAUInterfaceClass, (class), TYPE_IDAU_INTERFACE) | ||
81 | +#define IDAU_INTERFACE_GET_CLASS(obj) \ | ||
82 | + OBJECT_GET_CLASS(IDAUInterfaceClass, (obj), TYPE_IDAU_INTERFACE) | ||
83 | + | ||
84 | +typedef struct IDAUInterface { | ||
85 | + Object parent; | ||
86 | +} IDAUInterface; | ||
87 | + | ||
88 | +#define IREGION_NOTVALID -1 | ||
89 | + | ||
90 | +typedef struct IDAUInterfaceClass { | ||
91 | + InterfaceClass parent; | ||
92 | + | ||
93 | + /* Check the specified address and return the IDAU security information | ||
94 | + * for it by filling in iregion, exempt, ns and nsc: | ||
95 | + * iregion: IDAU region number, or IREGION_NOTVALID if not valid | ||
96 | + * exempt: true if address is exempt from security attribution | ||
97 | + * ns: true if the address is NonSecure | ||
98 | + * nsc: true if the address is NonSecure-callable | ||
99 | + */ | ||
100 | + void (*check)(IDAUInterface *ii, uint32_t address, int *iregion, | ||
101 | + bool *exempt, bool *ns, bool *nsc); | ||
102 | +} IDAUInterfaceClass; | ||
103 | + | ||
104 | +#endif | ||
105 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | ||
106 | index XXXXXXX..XXXXXXX 100644 | 28 | index XXXXXXX..XXXXXXX 100644 |
107 | --- a/target/arm/cpu.c | 29 | --- a/target/arm/internals.h |
108 | +++ b/target/arm/cpu.c | 30 | +++ b/target/arm/internals.h |
109 | @@ -XXX,XX +XXX,XX @@ | 31 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMFaultType { |
32 | * @s2addr: Address that caused a fault at stage 2 | ||
33 | * @stage2: True if we faulted at stage 2 | ||
34 | * @s1ptw: True if we faulted at stage 2 while doing a stage 1 page-table walk | ||
35 | + * @s1ns: True if we faulted on a non-secure IPA while in secure state | ||
36 | * @ea: True if we should set the EA (external abort type) bit in syndrome | ||
110 | */ | 37 | */ |
111 | 38 | typedef struct ARMMMUFaultInfo ARMMMUFaultInfo; | |
112 | #include "qemu/osdep.h" | 39 | @@ -XXX,XX +XXX,XX @@ struct ARMMMUFaultInfo { |
113 | +#include "target/arm/idau.h" | 40 | int domain; |
114 | #include "qemu/error-report.h" | 41 | bool stage2; |
115 | #include "qapi/error.h" | 42 | bool s1ptw; |
116 | #include "cpu.h" | 43 | + bool s1ns; |
117 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_post_init(Object *obj) | 44 | bool ea; |
118 | } | ||
119 | } | ||
120 | |||
121 | + if (arm_feature(&cpu->env, ARM_FEATURE_M_SECURITY)) { | ||
122 | + object_property_add_link(obj, "idau", TYPE_IDAU_INTERFACE, &cpu->idau, | ||
123 | + qdev_prop_allow_set_link_before_realize, | ||
124 | + OBJ_PROP_LINK_UNREF_ON_RELEASE, | ||
125 | + &error_abort); | ||
126 | + } | ||
127 | + | ||
128 | qdev_property_add_static(DEVICE(obj), &arm_cpu_cfgend_property, | ||
129 | &error_abort); | ||
130 | } | ||
131 | @@ -XXX,XX +XXX,XX @@ static const TypeInfo arm_cpu_type_info = { | ||
132 | .class_init = arm_cpu_class_init, | ||
133 | }; | 45 | }; |
134 | 46 | ||
135 | +static const TypeInfo idau_interface_type_info = { | ||
136 | + .name = TYPE_IDAU_INTERFACE, | ||
137 | + .parent = TYPE_INTERFACE, | ||
138 | + .class_size = sizeof(IDAUInterfaceClass), | ||
139 | +}; | ||
140 | + | ||
141 | static void arm_cpu_register_types(void) | ||
142 | { | ||
143 | const ARMCPUInfo *info = arm_cpus; | ||
144 | |||
145 | type_register_static(&arm_cpu_type_info); | ||
146 | + type_register_static(&idau_interface_type_info); | ||
147 | |||
148 | while (info->name) { | ||
149 | cpu_register(info); | ||
150 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 47 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
151 | index XXXXXXX..XXXXXXX 100644 | 48 | index XXXXXXX..XXXXXXX 100644 |
152 | --- a/target/arm/helper.c | 49 | --- a/target/arm/helper.c |
153 | +++ b/target/arm/helper.c | 50 | +++ b/target/arm/helper.c |
154 | @@ -XXX,XX +XXX,XX @@ | 51 | @@ -XXX,XX +XXX,XX @@ static uint64_t do_ats_write(CPUARMState *env, uint64_t value, |
155 | #include "qemu/osdep.h" | 52 | target_el = 3; |
156 | +#include "target/arm/idau.h" | 53 | } else { |
157 | #include "trace.h" | 54 | env->cp15.hpfar_el2 = extract64(fi.s2addr, 12, 47) << 4; |
158 | #include "cpu.h" | 55 | + if (arm_is_secure_below_el3(env) && fi.s1ns) { |
159 | #include "internals.h" | 56 | + env->cp15.hpfar_el2 |= HPFAR_NS; |
160 | @@ -XXX,XX +XXX,XX @@ static void v8m_security_lookup(CPUARMState *env, uint32_t address, | 57 | + } |
161 | */ | 58 | target_el = 2; |
162 | ARMCPU *cpu = arm_env_get_cpu(env); | 59 | } |
163 | int r; | 60 | take_exc = true; |
164 | + bool idau_exempt = false, idau_ns = true, idau_nsc = true; | 61 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, |
165 | + int idau_region = IREGION_NOTVALID; | 62 | fi->s2addr = addr; |
166 | 63 | fi->stage2 = true; | |
167 | - /* TODO: implement IDAU */ | 64 | fi->s1ptw = true; |
168 | + if (cpu->idau) { | 65 | + fi->s1ns = !*is_secure; |
169 | + IDAUInterfaceClass *iic = IDAU_INTERFACE_GET_CLASS(cpu->idau); | 66 | return ~0; |
170 | + IDAUInterface *ii = IDAU_INTERFACE(cpu->idau); | 67 | } |
171 | + | 68 | if ((arm_hcr_el2_eff(env) & HCR_PTW) && |
172 | + iic->check(ii, address, &idau_region, &idau_exempt, &idau_ns, | 69 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, |
173 | + &idau_nsc); | 70 | fi->s2addr = addr; |
174 | + } | 71 | fi->stage2 = true; |
175 | 72 | fi->s1ptw = true; | |
176 | if (access_type == MMU_INST_FETCH && extract32(address, 28, 4) == 0xf) { | 73 | + fi->s1ns = !*is_secure; |
177 | /* 0xf0000000..0xffffffff is always S for insn fetches */ | 74 | return ~0; |
178 | return; | 75 | } |
76 | |||
77 | @@ -XXX,XX +XXX,XX @@ do_fault: | ||
78 | /* Tag the error as S2 for failed S1 PTW at S2 or ordinary S2. */ | ||
79 | fi->stage2 = fi->s1ptw || (mmu_idx == ARMMMUIdx_Stage2 || | ||
80 | mmu_idx == ARMMMUIdx_Stage2_S); | ||
81 | + fi->s1ns = mmu_idx == ARMMMUIdx_Stage2; | ||
82 | return true; | ||
83 | } | ||
84 | |||
85 | diff --git a/target/arm/tlb_helper.c b/target/arm/tlb_helper.c | ||
86 | index XXXXXXX..XXXXXXX 100644 | ||
87 | --- a/target/arm/tlb_helper.c | ||
88 | +++ b/target/arm/tlb_helper.c | ||
89 | @@ -XXX,XX +XXX,XX @@ static void QEMU_NORETURN arm_deliver_fault(ARMCPU *cpu, vaddr addr, | ||
90 | if (fi->stage2) { | ||
91 | target_el = 2; | ||
92 | env->cp15.hpfar_el2 = extract64(fi->s2addr, 12, 47) << 4; | ||
93 | + if (arm_is_secure_below_el3(env) && fi->s1ns) { | ||
94 | + env->cp15.hpfar_el2 |= HPFAR_NS; | ||
95 | + } | ||
179 | } | 96 | } |
180 | 97 | same_el = (arm_current_el(env) == target_el); | |
181 | - if (v8m_is_sau_exempt(env, address, access_type)) { | 98 | |
182 | + if (idau_exempt || v8m_is_sau_exempt(env, address, access_type)) { | ||
183 | sattrs->ns = !regime_is_secure(env, mmu_idx); | ||
184 | return; | ||
185 | } | ||
186 | |||
187 | + if (idau_region != IREGION_NOTVALID) { | ||
188 | + sattrs->irvalid = true; | ||
189 | + sattrs->iregion = idau_region; | ||
190 | + } | ||
191 | + | ||
192 | switch (env->sau.ctrl & 3) { | ||
193 | case 0: /* SAU.ENABLE == 0, SAU.ALLNS == 0 */ | ||
194 | break; | ||
195 | @@ -XXX,XX +XXX,XX @@ static void v8m_security_lookup(CPUARMState *env, uint32_t address, | ||
196 | } | ||
197 | } | ||
198 | |||
199 | - /* TODO when we support the IDAU then it may override the result here */ | ||
200 | + /* The IDAU will override the SAU lookup results if it specifies | ||
201 | + * higher security than the SAU does. | ||
202 | + */ | ||
203 | + if (!idau_ns) { | ||
204 | + if (sattrs->ns || (!idau_nsc && sattrs->nsc)) { | ||
205 | + sattrs->ns = false; | ||
206 | + sattrs->nsc = idau_nsc; | ||
207 | + } | ||
208 | + } | ||
209 | break; | ||
210 | } | ||
211 | } | ||
212 | -- | 99 | -- |
213 | 2.16.2 | 100 | 2.20.1 |
214 | 101 | ||
215 | 102 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
---|---|---|---|
2 | 2 | ||
3 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 3 | On ARMv8-A, accesses by 32-bit secure EL1 to monitor registers trap to |
4 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 4 | the upper (64-bit) EL. With Secure EL2 support, we can no longer assume |
5 | Message-id: 20180228193125.20577-14-richard.henderson@linaro.org | 5 | that that is always EL3, so make room for the value to be computed at |
6 | run-time. | ||
7 | |||
8 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
10 | Message-id: 20210112104511.36576-16-remi.denis.courmont@huawei.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | --- | 12 | --- |
8 | target/arm/translate.c | 68 ++++++++++++++++++++++++++++++++++++++++++++++++++ | 13 | target/arm/translate.c | 23 +++++++++++++++++++++-- |
9 | 1 file changed, 68 insertions(+) | 14 | 1 file changed, 21 insertions(+), 2 deletions(-) |
10 | 15 | ||
11 | diff --git a/target/arm/translate.c b/target/arm/translate.c | 16 | diff --git a/target/arm/translate.c b/target/arm/translate.c |
12 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
13 | --- a/target/arm/translate.c | 18 | --- a/target/arm/translate.c |
14 | +++ b/target/arm/translate.c | 19 | +++ b/target/arm/translate.c |
15 | @@ -XXX,XX +XXX,XX @@ static int disas_neon_data_insn(DisasContext *s, uint32_t insn) | 20 | @@ -XXX,XX +XXX,XX @@ static void unallocated_encoding(DisasContext *s) |
16 | return 0; | 21 | default_exception_el(s)); |
17 | } | 22 | } |
18 | 23 | ||
19 | +/* Advanced SIMD three registers of the same length extension. | 24 | +static void gen_exception_el(DisasContext *s, int excp, uint32_t syn, |
20 | + * 31 25 23 22 20 16 12 11 10 9 8 3 0 | 25 | + TCGv_i32 tcg_el) |
21 | + * +---------------+-----+---+-----+----+----+---+----+---+----+---------+----+ | ||
22 | + * | 1 1 1 1 1 1 0 | op1 | D | op2 | Vn | Vd | 1 | o3 | 0 | o4 | N Q M U | Vm | | ||
23 | + * +---------------+-----+---+-----+----+----+---+----+---+----+---------+----+ | ||
24 | + */ | ||
25 | +static int disas_neon_insn_3same_ext(DisasContext *s, uint32_t insn) | ||
26 | +{ | 26 | +{ |
27 | + gen_helper_gvec_3_ptr *fn_gvec_ptr; | 27 | + TCGv_i32 tcg_excp; |
28 | + int rd, rn, rm, rot, size, opr_sz; | 28 | + TCGv_i32 tcg_syn; |
29 | + TCGv_ptr fpst; | ||
30 | + bool q; | ||
31 | + | 29 | + |
32 | + q = extract32(insn, 6, 1); | 30 | + gen_set_condexec(s); |
33 | + VFP_DREG_D(rd, insn); | 31 | + gen_set_pc_im(s, s->pc_curr); |
34 | + VFP_DREG_N(rn, insn); | 32 | + tcg_excp = tcg_const_i32(excp); |
35 | + VFP_DREG_M(rm, insn); | 33 | + tcg_syn = tcg_const_i32(syn); |
36 | + if ((rd | rn | rm) & q) { | 34 | + gen_helper_exception_with_syndrome(cpu_env, tcg_excp, tcg_syn, tcg_el); |
37 | + return 1; | 35 | + tcg_temp_free_i32(tcg_syn); |
38 | + } | 36 | + tcg_temp_free_i32(tcg_excp); |
39 | + | 37 | + s->base.is_jmp = DISAS_NORETURN; |
40 | + if ((insn & 0xfe200f10) == 0xfc200800) { | ||
41 | + /* VCMLA -- 1111 110R R.1S .... .... 1000 ...0 .... */ | ||
42 | + size = extract32(insn, 20, 1); | ||
43 | + rot = extract32(insn, 23, 2); | ||
44 | + if (!arm_dc_feature(s, ARM_FEATURE_V8_FCMA) | ||
45 | + || (!size && !arm_dc_feature(s, ARM_FEATURE_V8_FP16))) { | ||
46 | + return 1; | ||
47 | + } | ||
48 | + fn_gvec_ptr = size ? gen_helper_gvec_fcmlas : gen_helper_gvec_fcmlah; | ||
49 | + } else if ((insn & 0xfea00f10) == 0xfc800800) { | ||
50 | + /* VCADD -- 1111 110R 1.0S .... .... 1000 ...0 .... */ | ||
51 | + size = extract32(insn, 20, 1); | ||
52 | + rot = extract32(insn, 24, 1); | ||
53 | + if (!arm_dc_feature(s, ARM_FEATURE_V8_FCMA) | ||
54 | + || (!size && !arm_dc_feature(s, ARM_FEATURE_V8_FP16))) { | ||
55 | + return 1; | ||
56 | + } | ||
57 | + fn_gvec_ptr = size ? gen_helper_gvec_fcadds : gen_helper_gvec_fcaddh; | ||
58 | + } else { | ||
59 | + return 1; | ||
60 | + } | ||
61 | + | ||
62 | + if (s->fp_excp_el) { | ||
63 | + gen_exception_insn(s, 4, EXCP_UDEF, | ||
64 | + syn_fp_access_trap(1, 0xe, false), s->fp_excp_el); | ||
65 | + return 0; | ||
66 | + } | ||
67 | + if (!s->vfp_enabled) { | ||
68 | + return 1; | ||
69 | + } | ||
70 | + | ||
71 | + opr_sz = (1 + q) * 8; | ||
72 | + fpst = get_fpstatus_ptr(1); | ||
73 | + tcg_gen_gvec_3_ptr(vfp_reg_offset(1, rd), | ||
74 | + vfp_reg_offset(1, rn), | ||
75 | + vfp_reg_offset(1, rm), fpst, | ||
76 | + opr_sz, opr_sz, rot, fn_gvec_ptr); | ||
77 | + tcg_temp_free_ptr(fpst); | ||
78 | + return 0; | ||
79 | +} | 38 | +} |
80 | + | 39 | + |
81 | static int disas_coproc_insn(DisasContext *s, uint32_t insn) | 40 | /* Force a TB lookup after an instruction that changes the CPU state. */ |
41 | static inline void gen_lookup_tb(DisasContext *s) | ||
82 | { | 42 | { |
83 | int cpnum, is64, crn, crm, opc1, opc2, isread, rt, rt2; | 43 | @@ -XXX,XX +XXX,XX @@ static bool msr_banked_access_decode(DisasContext *s, int r, int sysm, int rn, |
84 | @@ -XXX,XX +XXX,XX @@ static void disas_arm_insn(DisasContext *s, unsigned int insn) | 44 | /* If we're in Secure EL1 (which implies that EL3 is AArch64) |
85 | } | 45 | * then accesses to Mon registers trap to EL3 |
86 | } | 46 | */ |
87 | } | 47 | - exc_target = 3; |
88 | + } else if ((insn & 0x0e000a00) == 0x0c000800 | 48 | - goto undef; |
89 | + && arm_dc_feature(s, ARM_FEATURE_V8)) { | 49 | + TCGv_i32 tcg_el = tcg_const_i32(3); |
90 | + if (disas_neon_insn_3same_ext(s, insn)) { | 50 | + |
91 | + goto illegal_op; | 51 | + gen_exception_el(s, EXCP_UDEF, syn_uncategorized(), tcg_el); |
92 | + } | 52 | + tcg_temp_free_i32(tcg_el); |
93 | + return; | 53 | + return false; |
94 | } else if ((insn & 0x0fe00000) == 0x0c400000) { | 54 | } |
95 | /* Coprocessor double register transfer. */ | 55 | break; |
96 | ARCH(5TE); | 56 | case ARM_CPU_MODE_HYP: |
97 | -- | 57 | -- |
98 | 2.16.2 | 58 | 2.20.1 |
99 | 59 | ||
100 | 60 | diff view generated by jsdifflib |
1 | The Cortex-M33 allows the system to specify the reset value of the | 1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
---|---|---|---|
2 | secure Vector Table Offset Register (VTOR) by asserting config | ||
3 | signals. In particular, guest images for the MPS2 AN505 board rely | ||
4 | on the MPS2's initial VTOR being correct for that board. | ||
5 | Implement a QEMU property so board and SoC code can set the reset | ||
6 | value to the correct value. | ||
7 | 2 | ||
3 | This adds handling for the SCR_EL3.EEL2 bit. | ||
4 | |||
5 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
6 | Message-id: 20210112104511.36576-17-remi.denis.courmont@huawei.com | ||
7 | [PMM: Applied fixes for review issues noted by RTH: | ||
8 | - check for FEATURE_AARCH64 before checking sel2 isar feature | ||
9 | - correct the commit message subject line] | ||
10 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
10 | Message-id: 20180220180325.29818-7-peter.maydell@linaro.org | ||
11 | --- | 12 | --- |
12 | target/arm/cpu.h | 3 +++ | 13 | target/arm/cpu.h | 8 ++++++-- |
13 | target/arm/cpu.c | 18 ++++++++++++++---- | 14 | target/arm/cpu.c | 2 +- |
14 | 2 files changed, 17 insertions(+), 4 deletions(-) | 15 | target/arm/helper.c | 19 ++++++++++++++++--- |
16 | target/arm/translate.c | 15 +++++++++++++-- | ||
17 | 4 files changed, 36 insertions(+), 8 deletions(-) | ||
15 | 18 | ||
16 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 19 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
17 | index XXXXXXX..XXXXXXX 100644 | 20 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/target/arm/cpu.h | 21 | --- a/target/arm/cpu.h |
19 | +++ b/target/arm/cpu.h | 22 | +++ b/target/arm/cpu.h |
20 | @@ -XXX,XX +XXX,XX @@ struct ARMCPU { | 23 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_is_secure(CPUARMState *env) |
21 | */ | 24 | static inline bool arm_is_el2_enabled(CPUARMState *env) |
22 | uint32_t psci_conduit; | 25 | { |
23 | 26 | if (arm_feature(env, ARM_FEATURE_EL2)) { | |
24 | + /* For v8M, initial value of the Secure VTOR */ | 27 | - return !arm_is_secure_below_el3(env); |
25 | + uint32_t init_svtor; | 28 | + if (arm_is_secure_below_el3(env)) { |
26 | + | 29 | + return (env->cp15.scr_el3 & SCR_EEL2) != 0; |
27 | /* [QEMU_]KVM_ARM_TARGET_* constant for this CPU, or | 30 | + } |
28 | * QEMU_KVM_ARM_TARGET_NONE if the kernel doesn't support this CPU type. | 31 | + return true; |
29 | */ | 32 | } |
33 | return false; | ||
34 | } | ||
35 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_el_is_aa64(CPUARMState *env, int el) | ||
36 | return aa64; | ||
37 | } | ||
38 | |||
39 | - if (arm_feature(env, ARM_FEATURE_EL3)) { | ||
40 | + if (arm_feature(env, ARM_FEATURE_EL3) && | ||
41 | + ((env->cp15.scr_el3 & SCR_NS) || !(env->cp15.scr_el3 & SCR_EEL2))) { | ||
42 | aa64 = aa64 && (env->cp15.scr_el3 & SCR_RW); | ||
43 | } | ||
44 | |||
30 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | 45 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c |
31 | index XXXXXXX..XXXXXXX 100644 | 46 | index XXXXXXX..XXXXXXX 100644 |
32 | --- a/target/arm/cpu.c | 47 | --- a/target/arm/cpu.c |
33 | +++ b/target/arm/cpu.c | 48 | +++ b/target/arm/cpu.c |
34 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(CPUState *s) | 49 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_excp_unmasked(CPUState *cs, unsigned int excp_idx, |
35 | uint32_t initial_msp; /* Loaded from 0x0 */ | 50 | * masked from Secure state. The HCR and SCR settings |
36 | uint32_t initial_pc; /* Loaded from 0x4 */ | 51 | * don't affect the masking logic, only the interrupt routing. |
37 | uint8_t *rom; | 52 | */ |
38 | + uint32_t vecbase; | 53 | - if (target_el == 3 || !secure) { |
39 | 54 | + if (target_el == 3 || !secure || (env->cp15.scr_el3 & SCR_EEL2)) { | |
40 | if (arm_feature(env, ARM_FEATURE_M_SECURITY)) { | 55 | unmasked = true; |
41 | env->v7m.secure = true; | 56 | } |
42 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(CPUState *s) | 57 | } else { |
43 | /* Unlike A/R profile, M profile defines the reset LR value */ | 58 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
44 | env->regs[14] = 0xffffffff; | 59 | index XXXXXXX..XXXXXXX 100644 |
45 | 60 | --- a/target/arm/helper.c | |
46 | - /* Load the initial SP and PC from the vector table at address 0 */ | 61 | +++ b/target/arm/helper.c |
47 | - rom = rom_ptr(0); | 62 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_trap_aa32s_el1(CPUARMState *env, |
48 | + env->v7m.vecbase[M_REG_S] = cpu->init_svtor & 0xffffff80; | 63 | return CP_ACCESS_OK; |
64 | } | ||
65 | if (arm_is_secure_below_el3(env)) { | ||
66 | + if (env->cp15.scr_el3 & SCR_EEL2) { | ||
67 | + return CP_ACCESS_TRAP_EL2; | ||
68 | + } | ||
69 | return CP_ACCESS_TRAP_EL3; | ||
70 | } | ||
71 | /* This will be EL1 NS and EL2 NS, which just UNDEF */ | ||
72 | @@ -XXX,XX +XXX,XX @@ static void scr_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
73 | if (cpu_isar_feature(aa64_pauth, cpu)) { | ||
74 | valid_mask |= SCR_API | SCR_APK; | ||
75 | } | ||
76 | + if (cpu_isar_feature(aa64_sel2, cpu)) { | ||
77 | + valid_mask |= SCR_EEL2; | ||
78 | + } | ||
79 | if (cpu_isar_feature(aa64_mte, cpu)) { | ||
80 | valid_mask |= SCR_ATA; | ||
81 | } | ||
82 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult ats_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
83 | bool isread) | ||
84 | { | ||
85 | if (ri->opc2 & 4) { | ||
86 | - /* The ATS12NSO* operations must trap to EL3 if executed in | ||
87 | + /* The ATS12NSO* operations must trap to EL3 or EL2 if executed in | ||
88 | * Secure EL1 (which can only happen if EL3 is AArch64). | ||
89 | * They are simply UNDEF if executed from NS EL1. | ||
90 | * They function normally from EL2 or EL3. | ||
91 | */ | ||
92 | if (arm_current_el(env) == 1) { | ||
93 | if (arm_is_secure_below_el3(env)) { | ||
94 | + if (env->cp15.scr_el3 & SCR_EEL2) { | ||
95 | + return CP_ACCESS_TRAP_UNCATEGORIZED_EL2; | ||
96 | + } | ||
97 | return CP_ACCESS_TRAP_UNCATEGORIZED_EL3; | ||
98 | } | ||
99 | return CP_ACCESS_TRAP_UNCATEGORIZED; | ||
100 | @@ -XXX,XX +XXX,XX @@ static void ats1h_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
101 | static CPAccessResult at_s1e2_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
102 | bool isread) | ||
103 | { | ||
104 | - if (arm_current_el(env) == 3 && !(env->cp15.scr_el3 & SCR_NS)) { | ||
105 | + if (arm_current_el(env) == 3 && | ||
106 | + !(env->cp15.scr_el3 & (SCR_NS | SCR_EEL2))) { | ||
107 | return CP_ACCESS_TRAP; | ||
108 | } | ||
109 | return CP_ACCESS_OK; | ||
110 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult nsacr_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
111 | bool isread) | ||
112 | { | ||
113 | /* The NSACR is RW at EL3, and RO for NS EL1 and NS EL2. | ||
114 | - * At Secure EL1 it traps to EL3. | ||
115 | + * At Secure EL1 it traps to EL3 or EL2. | ||
116 | */ | ||
117 | if (arm_current_el(env) == 3) { | ||
118 | return CP_ACCESS_OK; | ||
119 | } | ||
120 | if (arm_is_secure_below_el3(env)) { | ||
121 | + if (env->cp15.scr_el3 & SCR_EEL2) { | ||
122 | + return CP_ACCESS_TRAP_EL2; | ||
123 | + } | ||
124 | return CP_ACCESS_TRAP_EL3; | ||
125 | } | ||
126 | /* Accesses from EL1 NS and EL2 NS are UNDEF for write but allow reads. */ | ||
127 | diff --git a/target/arm/translate.c b/target/arm/translate.c | ||
128 | index XXXXXXX..XXXXXXX 100644 | ||
129 | --- a/target/arm/translate.c | ||
130 | +++ b/target/arm/translate.c | ||
131 | @@ -XXX,XX +XXX,XX @@ static bool msr_banked_access_decode(DisasContext *s, int r, int sysm, int rn, | ||
132 | } | ||
133 | if (s->current_el == 1) { | ||
134 | /* If we're in Secure EL1 (which implies that EL3 is AArch64) | ||
135 | - * then accesses to Mon registers trap to EL3 | ||
136 | + * then accesses to Mon registers trap to Secure EL2, if it exists, | ||
137 | + * otherwise EL3. | ||
138 | */ | ||
139 | - TCGv_i32 tcg_el = tcg_const_i32(3); | ||
140 | + TCGv_i32 tcg_el; | ||
49 | + | 141 | + |
50 | + /* Load the initial SP and PC from offset 0 and 4 in the vector table */ | 142 | + if (arm_dc_feature(s, ARM_FEATURE_AARCH64) && |
51 | + vecbase = env->v7m.vecbase[env->v7m.secure]; | 143 | + dc_isar_feature(aa64_sel2, s)) { |
52 | + rom = rom_ptr(vecbase); | 144 | + /* Target EL is EL<3 minus SCR_EL3.EEL2> */ |
53 | if (rom) { | 145 | + tcg_el = load_cpu_field(cp15.scr_el3); |
54 | /* Address zero is covered by ROM which hasn't yet been | 146 | + tcg_gen_sextract_i32(tcg_el, tcg_el, ctz32(SCR_EEL2), 1); |
55 | * copied into physical memory. | 147 | + tcg_gen_addi_i32(tcg_el, tcg_el, 3); |
56 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(CPUState *s) | 148 | + } else { |
57 | * it got copied into memory. In the latter case, rom_ptr | 149 | + tcg_el = tcg_const_i32(3); |
58 | * will return a NULL pointer and we should use ldl_phys instead. | 150 | + } |
59 | */ | 151 | |
60 | - initial_msp = ldl_phys(s->as, 0); | 152 | gen_exception_el(s, EXCP_UDEF, syn_uncategorized(), tcg_el); |
61 | - initial_pc = ldl_phys(s->as, 4); | 153 | tcg_temp_free_i32(tcg_el); |
62 | + initial_msp = ldl_phys(s->as, vecbase); | ||
63 | + initial_pc = ldl_phys(s->as, vecbase + 4); | ||
64 | } | ||
65 | |||
66 | env->regs[13] = initial_msp & 0xFFFFFFFC; | ||
67 | @@ -XXX,XX +XXX,XX @@ static Property arm_cpu_pmsav7_dregion_property = | ||
68 | pmsav7_dregion, | ||
69 | qdev_prop_uint32, uint32_t); | ||
70 | |||
71 | +/* M profile: initial value of the Secure VTOR */ | ||
72 | +static Property arm_cpu_initsvtor_property = | ||
73 | + DEFINE_PROP_UINT32("init-svtor", ARMCPU, init_svtor, 0); | ||
74 | + | ||
75 | static void arm_cpu_post_init(Object *obj) | ||
76 | { | ||
77 | ARMCPU *cpu = ARM_CPU(obj); | ||
78 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_post_init(Object *obj) | ||
79 | qdev_prop_allow_set_link_before_realize, | ||
80 | OBJ_PROP_LINK_UNREF_ON_RELEASE, | ||
81 | &error_abort); | ||
82 | + qdev_property_add_static(DEVICE(obj), &arm_cpu_initsvtor_property, | ||
83 | + &error_abort); | ||
84 | } | ||
85 | |||
86 | qdev_property_add_static(DEVICE(obj), &arm_cpu_cfgend_property, | ||
87 | -- | 154 | -- |
88 | 2.16.2 | 155 | 2.20.1 |
89 | 156 | ||
90 | 157 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
---|---|---|---|
2 | 2 | ||
3 | Enable it for the "any" CPU used by *-linux-user. | 3 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
4 | 4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | |
5 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 5 | Message-id: 20210112104511.36576-18-remi.denis.courmont@huawei.com |
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | Message-id: 20180228193125.20577-10-richard.henderson@linaro.org | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | --- | 7 | --- |
10 | target/arm/cpu.c | 1 + | ||
11 | target/arm/cpu64.c | 1 + | 8 | target/arm/cpu64.c | 1 + |
12 | 2 files changed, 2 insertions(+) | 9 | 1 file changed, 1 insertion(+) |
13 | 10 | ||
14 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/target/arm/cpu.c | ||
17 | +++ b/target/arm/cpu.c | ||
18 | @@ -XXX,XX +XXX,XX @@ static void arm_any_initfn(Object *obj) | ||
19 | set_feature(&cpu->env, ARM_FEATURE_V8_SHA256); | ||
20 | set_feature(&cpu->env, ARM_FEATURE_V8_PMULL); | ||
21 | set_feature(&cpu->env, ARM_FEATURE_CRC); | ||
22 | + set_feature(&cpu->env, ARM_FEATURE_V8_RDM); | ||
23 | cpu->midr = 0xffffffff; | ||
24 | } | ||
25 | #endif | ||
26 | diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c | 11 | diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c |
27 | index XXXXXXX..XXXXXXX 100644 | 12 | index XXXXXXX..XXXXXXX 100644 |
28 | --- a/target/arm/cpu64.c | 13 | --- a/target/arm/cpu64.c |
29 | +++ b/target/arm/cpu64.c | 14 | +++ b/target/arm/cpu64.c |
30 | @@ -XXX,XX +XXX,XX @@ static void aarch64_any_initfn(Object *obj) | 15 | @@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj) |
31 | set_feature(&cpu->env, ARM_FEATURE_V8_SM4); | 16 | t = FIELD_DP64(t, ID_AA64PFR0, SVE, 1); |
32 | set_feature(&cpu->env, ARM_FEATURE_V8_PMULL); | 17 | t = FIELD_DP64(t, ID_AA64PFR0, FP, 1); |
33 | set_feature(&cpu->env, ARM_FEATURE_CRC); | 18 | t = FIELD_DP64(t, ID_AA64PFR0, ADVSIMD, 1); |
34 | + set_feature(&cpu->env, ARM_FEATURE_V8_RDM); | 19 | + t = FIELD_DP64(t, ID_AA64PFR0, SEL2, 1); |
35 | set_feature(&cpu->env, ARM_FEATURE_V8_FP16); | 20 | cpu->isar.id_aa64pfr0 = t; |
36 | cpu->ctr = 0x80038003; /* 32 byte I and D cacheline size, VIPT icache */ | 21 | |
37 | cpu->dcz_blocksize = 7; /* 512 bytes */ | 22 | t = cpu->isar.id_aa64pfr1; |
38 | -- | 23 | -- |
39 | 2.16.2 | 24 | 2.20.1 |
40 | 25 | ||
41 | 26 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
---|---|---|---|
2 | 2 | ||
3 | The integer size check was already outside of the opcode switch; | 3 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
4 | move the floating-point size check outside as well. Unify the | 4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
5 | size vs index adjustment between fp and integer paths. | 5 | Message-id: 20210112104511.36576-19-remi.denis.courmont@huawei.com |
6 | |||
7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | Message-id: 20180228193125.20577-4-richard.henderson@linaro.org | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 7 | --- |
12 | target/arm/translate-a64.c | 65 +++++++++++++++++++++++----------------------- | 8 | target/arm/helper.c | 25 +++++++++++-------------- |
13 | 1 file changed, 32 insertions(+), 33 deletions(-) | 9 | 1 file changed, 11 insertions(+), 14 deletions(-) |
14 | 10 | ||
15 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c | 11 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
16 | index XXXXXXX..XXXXXXX 100644 | 12 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/target/arm/translate-a64.c | 13 | --- a/target/arm/helper.c |
18 | +++ b/target/arm/translate-a64.c | 14 | +++ b/target/arm/helper.c |
19 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | 15 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult aa64_cacheop_pou_access(CPUARMState *env, |
20 | case 0x05: /* FMLS */ | 16 | static int vae1_tlbmask(CPUARMState *env) |
21 | case 0x09: /* FMUL */ | 17 | { |
22 | case 0x19: /* FMULX */ | 18 | uint64_t hcr = arm_hcr_el2_eff(env); |
23 | - if (size == 1) { | 19 | + uint16_t mask; |
24 | - unallocated_encoding(s); | 20 | |
25 | - return; | 21 | if ((hcr & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE)) { |
22 | - uint16_t mask = ARMMMUIdxBit_E20_2 | | ||
23 | - ARMMMUIdxBit_E20_2_PAN | | ||
24 | - ARMMMUIdxBit_E20_0; | ||
25 | - | ||
26 | - if (arm_is_secure_below_el3(env)) { | ||
27 | - mask >>= ARM_MMU_IDX_A_NS; | ||
26 | - } | 28 | - } |
27 | is_fp = true; | 29 | - |
28 | break; | 30 | - return mask; |
29 | default: | 31 | - } else if (arm_is_secure_below_el3(env)) { |
30 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | 32 | - return ARMMMUIdxBit_SE10_1 | |
31 | if (is_fp) { | 33 | - ARMMMUIdxBit_SE10_1_PAN | |
32 | /* convert insn encoded size to TCGMemOp size */ | 34 | - ARMMMUIdxBit_SE10_0; |
33 | switch (size) { | 35 | + mask = ARMMMUIdxBit_E20_2 | |
34 | - case 2: /* single precision */ | 36 | + ARMMMUIdxBit_E20_2_PAN | |
35 | - size = MO_32; | 37 | + ARMMMUIdxBit_E20_0; |
36 | - index = h << 1 | l; | 38 | } else { |
37 | - rm |= (m << 4); | 39 | - return ARMMMUIdxBit_E10_1 | |
38 | - break; | 40 | + mask = ARMMMUIdxBit_E10_1 | |
39 | - case 3: /* double precision */ | 41 | ARMMMUIdxBit_E10_1_PAN | |
40 | - size = MO_64; | 42 | ARMMMUIdxBit_E10_0; |
41 | - if (l || !is_q) { | 43 | } |
42 | + case 0: /* half-precision */ | 44 | + |
43 | + if (!arm_dc_feature(s, ARM_FEATURE_V8_FP16)) { | 45 | + if (arm_is_secure_below_el3(env)) { |
44 | unallocated_encoding(s); | 46 | + mask >>= ARM_MMU_IDX_A_NS; |
45 | return; | ||
46 | } | ||
47 | - index = h; | ||
48 | - rm |= (m << 4); | ||
49 | - break; | ||
50 | - case 0: /* half precision */ | ||
51 | size = MO_16; | ||
52 | - index = h << 2 | l << 1 | m; | ||
53 | - is_fp16 = true; | ||
54 | - if (arm_dc_feature(s, ARM_FEATURE_V8_FP16)) { | ||
55 | - break; | ||
56 | - } | ||
57 | - /* fallthru */ | ||
58 | - default: /* unallocated */ | ||
59 | - unallocated_encoding(s); | ||
60 | - return; | ||
61 | - } | ||
62 | - } else { | ||
63 | - switch (size) { | ||
64 | - case 1: | ||
65 | - index = h << 2 | l << 1 | m; | ||
66 | break; | ||
67 | - case 2: | ||
68 | - index = h << 1 | l; | ||
69 | - rm |= (m << 4); | ||
70 | + case MO_32: /* single precision */ | ||
71 | + case MO_64: /* double precision */ | ||
72 | break; | ||
73 | default: | ||
74 | unallocated_encoding(s); | ||
75 | return; | ||
76 | } | ||
77 | + } else { | ||
78 | + switch (size) { | ||
79 | + case MO_8: | ||
80 | + case MO_64: | ||
81 | + unallocated_encoding(s); | ||
82 | + return; | ||
83 | + } | ||
84 | + } | 47 | + } |
85 | + | 48 | + |
86 | + /* Given TCGMemOp size, adjust register and indexing. */ | 49 | + return mask; |
87 | + switch (size) { | 50 | } |
88 | + case MO_16: | 51 | |
89 | + index = h << 2 | l << 1 | m; | 52 | /* Return 56 if TBI is enabled, 64 otherwise. */ |
90 | + break; | ||
91 | + case MO_32: | ||
92 | + index = h << 1 | l; | ||
93 | + rm |= m << 4; | ||
94 | + break; | ||
95 | + case MO_64: | ||
96 | + if (l || !is_q) { | ||
97 | + unallocated_encoding(s); | ||
98 | + return; | ||
99 | + } | ||
100 | + index = h; | ||
101 | + rm |= m << 4; | ||
102 | + break; | ||
103 | + default: | ||
104 | + g_assert_not_reached(); | ||
105 | } | ||
106 | |||
107 | if (!fp_access_check(s)) { | ||
108 | -- | 53 | -- |
109 | 2.16.2 | 54 | 2.20.1 |
110 | 55 | ||
111 | 56 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Happily, the bits are in the same places compared to a32. | 3 | SVE predicate operations cannot use the "usual" simd_desc |
4 | encoding, because the lengths are not a multiple of 8. | ||
5 | But we were abusing the SIMD_* fields to store values anyway. | ||
6 | This abuse broke when SIMD_OPRSZ_BITS was modified in e2e7168a214. | ||
4 | 7 | ||
8 | Introduce a new set of field definitions for exclusive use | ||
9 | of predicates, so that it is obvious what kind of predicate | ||
10 | we are manipulating. To be used in future patches. | ||
11 | |||
12 | Cc: qemu-stable@nongnu.org | ||
5 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 13 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
6 | Message-id: 20180228193125.20577-16-richard.henderson@linaro.org | 14 | Message-id: 20210113062650.593824-2-richard.henderson@linaro.org |
7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 15 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | --- | 17 | --- |
10 | target/arm/translate.c | 14 +++++++++++++- | 18 | target/arm/internals.h | 9 +++++++++ |
11 | 1 file changed, 13 insertions(+), 1 deletion(-) | 19 | 1 file changed, 9 insertions(+) |
12 | 20 | ||
13 | diff --git a/target/arm/translate.c b/target/arm/translate.c | 21 | diff --git a/target/arm/internals.h b/target/arm/internals.h |
14 | index XXXXXXX..XXXXXXX 100644 | 22 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/target/arm/translate.c | 23 | --- a/target/arm/internals.h |
16 | +++ b/target/arm/translate.c | 24 | +++ b/target/arm/internals.h |
17 | @@ -XXX,XX +XXX,XX @@ static void disas_thumb2_insn(DisasContext *s, uint32_t insn) | 25 | @@ -XXX,XX +XXX,XX @@ void arm_log_exception(int idx); |
18 | default_exception_el(s)); | 26 | #define LOG2_TAG_GRANULE 4 |
19 | break; | 27 | #define TAG_GRANULE (1 << LOG2_TAG_GRANULE) |
20 | } | 28 | |
21 | - if (((insn >> 24) & 3) == 3) { | 29 | +/* |
22 | + if ((insn & 0xfe000a00) == 0xfc000800 | 30 | + * SVE predicates are 1/8 the size of SVE vectors, and cannot use |
23 | + && arm_dc_feature(s, ARM_FEATURE_V8)) { | 31 | + * the same simd_desc() encoding due to restrictions on size. |
24 | + /* The Thumb2 and ARM encodings are identical. */ | 32 | + * Use these instead. |
25 | + if (disas_neon_insn_3same_ext(s, insn)) { | 33 | + */ |
26 | + goto illegal_op; | 34 | +FIELD(PREDDESC, OPRSZ, 0, 6) |
27 | + } | 35 | +FIELD(PREDDESC, ESZ, 6, 2) |
28 | + } else if ((insn & 0xff000a00) == 0xfe000800 | 36 | +FIELD(PREDDESC, DATA, 8, 24) |
29 | + && arm_dc_feature(s, ARM_FEATURE_V8)) { | 37 | + |
30 | + /* The Thumb2 and ARM encodings are identical. */ | 38 | /* |
31 | + if (disas_neon_insn_2reg_scalar_ext(s, insn)) { | 39 | * The SVE simd_data field, for memory ops, contains either |
32 | + goto illegal_op; | 40 | * rd (5 bits) or a shift count (2 bits). |
33 | + } | ||
34 | + } else if (((insn >> 24) & 3) == 3) { | ||
35 | /* Translate into the equivalent ARM encoding. */ | ||
36 | insn = (insn & 0xe2ffffff) | ((insn & (1 << 28)) >> 4) | (1 << 28); | ||
37 | if (disas_neon_data_insn(s, insn)) { | ||
38 | -- | 41 | -- |
39 | 2.16.2 | 42 | 2.20.1 |
40 | 43 | ||
41 | 44 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | These two were odd, in that do_pfirst_pnext passed the | ||
4 | count of 64-bit words rather than bytes. Change to pass | ||
5 | the standard pred_full_reg_size to avoid confusion. | ||
6 | |||
7 | Cc: qemu-stable@nongnu.org | ||
3 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 8 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
4 | Message-id: 20180228193125.20577-15-richard.henderson@linaro.org | 9 | Message-id: 20210113062650.593824-3-richard.henderson@linaro.org |
5 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | --- | 12 | --- |
8 | target/arm/translate.c | 61 ++++++++++++++++++++++++++++++++++++++++++++++++++ | 13 | target/arm/sve_helper.c | 7 ++++--- |
9 | 1 file changed, 61 insertions(+) | 14 | target/arm/translate-sve.c | 6 +++--- |
15 | 2 files changed, 7 insertions(+), 6 deletions(-) | ||
10 | 16 | ||
11 | diff --git a/target/arm/translate.c b/target/arm/translate.c | 17 | diff --git a/target/arm/sve_helper.c b/target/arm/sve_helper.c |
12 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
13 | --- a/target/arm/translate.c | 19 | --- a/target/arm/sve_helper.c |
14 | +++ b/target/arm/translate.c | 20 | +++ b/target/arm/sve_helper.c |
15 | @@ -XXX,XX +XXX,XX @@ static int disas_neon_insn_3same_ext(DisasContext *s, uint32_t insn) | 21 | @@ -XXX,XX +XXX,XX @@ static intptr_t last_active_element(uint64_t *g, intptr_t words, intptr_t esz) |
16 | return 0; | 22 | return (intptr_t)-1 << esz; |
17 | } | 23 | } |
18 | 24 | ||
19 | +/* Advanced SIMD two registers and a scalar extension. | 25 | -uint32_t HELPER(sve_pfirst)(void *vd, void *vg, uint32_t words) |
20 | + * 31 24 23 22 20 16 12 11 10 9 8 3 0 | 26 | +uint32_t HELPER(sve_pfirst)(void *vd, void *vg, uint32_t pred_desc) |
21 | + * +-----------------+----+---+----+----+----+---+----+---+----+---------+----+ | ||
22 | + * | 1 1 1 1 1 1 1 0 | o1 | D | o2 | Vn | Vd | 1 | o3 | 0 | o4 | N Q M U | Vm | | ||
23 | + * +-----------------+----+---+----+----+----+---+----+---+----+---------+----+ | ||
24 | + * | ||
25 | + */ | ||
26 | + | ||
27 | +static int disas_neon_insn_2reg_scalar_ext(DisasContext *s, uint32_t insn) | ||
28 | +{ | ||
29 | + int rd, rn, rm, rot, size, opr_sz; | ||
30 | + TCGv_ptr fpst; | ||
31 | + bool q; | ||
32 | + | ||
33 | + q = extract32(insn, 6, 1); | ||
34 | + VFP_DREG_D(rd, insn); | ||
35 | + VFP_DREG_N(rn, insn); | ||
36 | + VFP_DREG_M(rm, insn); | ||
37 | + if ((rd | rn) & q) { | ||
38 | + return 1; | ||
39 | + } | ||
40 | + | ||
41 | + if ((insn & 0xff000f10) == 0xfe000800) { | ||
42 | + /* VCMLA (indexed) -- 1111 1110 S.RR .... .... 1000 ...0 .... */ | ||
43 | + rot = extract32(insn, 20, 2); | ||
44 | + size = extract32(insn, 23, 1); | ||
45 | + if (!arm_dc_feature(s, ARM_FEATURE_V8_FCMA) | ||
46 | + || (!size && !arm_dc_feature(s, ARM_FEATURE_V8_FP16))) { | ||
47 | + return 1; | ||
48 | + } | ||
49 | + } else { | ||
50 | + return 1; | ||
51 | + } | ||
52 | + | ||
53 | + if (s->fp_excp_el) { | ||
54 | + gen_exception_insn(s, 4, EXCP_UDEF, | ||
55 | + syn_fp_access_trap(1, 0xe, false), s->fp_excp_el); | ||
56 | + return 0; | ||
57 | + } | ||
58 | + if (!s->vfp_enabled) { | ||
59 | + return 1; | ||
60 | + } | ||
61 | + | ||
62 | + opr_sz = (1 + q) * 8; | ||
63 | + fpst = get_fpstatus_ptr(1); | ||
64 | + tcg_gen_gvec_3_ptr(vfp_reg_offset(1, rd), | ||
65 | + vfp_reg_offset(1, rn), | ||
66 | + vfp_reg_offset(1, rm), fpst, | ||
67 | + opr_sz, opr_sz, rot, | ||
68 | + size ? gen_helper_gvec_fcmlas_idx | ||
69 | + : gen_helper_gvec_fcmlah_idx); | ||
70 | + tcg_temp_free_ptr(fpst); | ||
71 | + return 0; | ||
72 | +} | ||
73 | + | ||
74 | static int disas_coproc_insn(DisasContext *s, uint32_t insn) | ||
75 | { | 27 | { |
76 | int cpnum, is64, crn, crm, opc1, opc2, isread, rt, rt2; | 28 | + intptr_t words = DIV_ROUND_UP(FIELD_EX32(pred_desc, PREDDESC, OPRSZ), 8); |
77 | @@ -XXX,XX +XXX,XX @@ static void disas_arm_insn(DisasContext *s, unsigned int insn) | 29 | uint32_t flags = PREDTEST_INIT; |
78 | goto illegal_op; | 30 | uint64_t *d = vd, *g = vg; |
79 | } | 31 | intptr_t i = 0; |
80 | return; | 32 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(sve_pfirst)(void *vd, void *vg, uint32_t words) |
81 | + } else if ((insn & 0x0f000a00) == 0x0e000800 | 33 | |
82 | + && arm_dc_feature(s, ARM_FEATURE_V8)) { | 34 | uint32_t HELPER(sve_pnext)(void *vd, void *vg, uint32_t pred_desc) |
83 | + if (disas_neon_insn_2reg_scalar_ext(s, insn)) { | 35 | { |
84 | + goto illegal_op; | 36 | - intptr_t words = extract32(pred_desc, 0, SIMD_OPRSZ_BITS); |
85 | + } | 37 | - intptr_t esz = extract32(pred_desc, SIMD_DATA_SHIFT, 2); |
86 | + return; | 38 | + intptr_t words = DIV_ROUND_UP(FIELD_EX32(pred_desc, PREDDESC, OPRSZ), 8); |
87 | } else if ((insn & 0x0fe00000) == 0x0c400000) { | 39 | + intptr_t esz = FIELD_EX32(pred_desc, PREDDESC, ESZ); |
88 | /* Coprocessor double register transfer. */ | 40 | uint32_t flags = PREDTEST_INIT; |
89 | ARCH(5TE); | 41 | uint64_t *d = vd, *g = vg, esz_mask; |
42 | intptr_t i, next; | ||
43 | diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c | ||
44 | index XXXXXXX..XXXXXXX 100644 | ||
45 | --- a/target/arm/translate-sve.c | ||
46 | +++ b/target/arm/translate-sve.c | ||
47 | @@ -XXX,XX +XXX,XX @@ static bool do_pfirst_pnext(DisasContext *s, arg_rr_esz *a, | ||
48 | TCGv_ptr t_pd = tcg_temp_new_ptr(); | ||
49 | TCGv_ptr t_pg = tcg_temp_new_ptr(); | ||
50 | TCGv_i32 t; | ||
51 | - unsigned desc; | ||
52 | + unsigned desc = 0; | ||
53 | |||
54 | - desc = DIV_ROUND_UP(pred_full_reg_size(s), 8); | ||
55 | - desc = deposit32(desc, SIMD_DATA_SHIFT, 2, a->esz); | ||
56 | + desc = FIELD_DP32(desc, PREDDESC, OPRSZ, pred_full_reg_size(s)); | ||
57 | + desc = FIELD_DP32(desc, PREDDESC, ESZ, a->esz); | ||
58 | |||
59 | tcg_gen_addi_ptr(t_pd, cpu_env, pred_full_reg_offset(s, a->rd)); | ||
60 | tcg_gen_addi_ptr(t_pg, cpu_env, pred_full_reg_offset(s, a->rn)); | ||
90 | -- | 61 | -- |
91 | 2.16.2 | 62 | 2.20.1 |
92 | 63 | ||
93 | 64 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | 3 | Update all users of do_perm_pred3 for the new |
4 | predicate descriptor field definitions. | ||
5 | |||
6 | Cc: qemu-stable@nongnu.org | ||
4 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
5 | Message-id: 20180228193125.20577-7-richard.henderson@linaro.org | 8 | Message-id: 20210113062650.593824-4-richard.henderson@linaro.org |
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | --- | 11 | --- |
8 | target/arm/translate-a64.c | 29 +++++++++++++++++++++++++++++ | 12 | target/arm/sve_helper.c | 18 +++++++++--------- |
9 | 1 file changed, 29 insertions(+) | 13 | target/arm/translate-sve.c | 12 ++++-------- |
14 | 2 files changed, 13 insertions(+), 17 deletions(-) | ||
10 | 15 | ||
11 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c | 16 | diff --git a/target/arm/sve_helper.c b/target/arm/sve_helper.c |
12 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
13 | --- a/target/arm/translate-a64.c | 18 | --- a/target/arm/sve_helper.c |
14 | +++ b/target/arm/translate-a64.c | 19 | +++ b/target/arm/sve_helper.c |
15 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | 20 | @@ -XXX,XX +XXX,XX @@ static uint64_t compress_bits(uint64_t x, int n) |
16 | case 0x19: /* FMULX */ | 21 | |
17 | is_fp = true; | 22 | void HELPER(sve_zip_p)(void *vd, void *vn, void *vm, uint32_t pred_desc) |
18 | break; | 23 | { |
19 | + case 0x1d: /* SQRDMLAH */ | 24 | - intptr_t oprsz = extract32(pred_desc, 0, SIMD_OPRSZ_BITS) + 2; |
20 | + case 0x1f: /* SQRDMLSH */ | 25 | - int esz = extract32(pred_desc, SIMD_DATA_SHIFT, 2); |
21 | + if (!arm_dc_feature(s, ARM_FEATURE_V8_RDM)) { | 26 | - intptr_t high = extract32(pred_desc, SIMD_DATA_SHIFT + 2, 1); |
22 | + unallocated_encoding(s); | 27 | + intptr_t oprsz = FIELD_EX32(pred_desc, PREDDESC, OPRSZ); |
23 | + return; | 28 | + int esz = FIELD_EX32(pred_desc, PREDDESC, ESZ); |
24 | + } | 29 | + intptr_t high = FIELD_EX32(pred_desc, PREDDESC, DATA); |
25 | + break; | 30 | uint64_t *d = vd; |
26 | default: | 31 | intptr_t i; |
27 | unallocated_encoding(s); | 32 | |
28 | return; | 33 | @@ -XXX,XX +XXX,XX @@ void HELPER(sve_zip_p)(void *vd, void *vn, void *vm, uint32_t pred_desc) |
29 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | 34 | |
30 | tcg_op, tcg_idx); | 35 | void HELPER(sve_uzp_p)(void *vd, void *vn, void *vm, uint32_t pred_desc) |
31 | } | 36 | { |
32 | break; | 37 | - intptr_t oprsz = extract32(pred_desc, 0, SIMD_OPRSZ_BITS) + 2; |
33 | + case 0x1d: /* SQRDMLAH */ | 38 | - int esz = extract32(pred_desc, SIMD_DATA_SHIFT, 2); |
34 | + read_vec_element_i32(s, tcg_res, rd, pass, | 39 | - int odd = extract32(pred_desc, SIMD_DATA_SHIFT + 2, 1) << esz; |
35 | + is_scalar ? size : MO_32); | 40 | + intptr_t oprsz = FIELD_EX32(pred_desc, PREDDESC, OPRSZ); |
36 | + if (size == 1) { | 41 | + int esz = FIELD_EX32(pred_desc, PREDDESC, ESZ); |
37 | + gen_helper_neon_qrdmlah_s16(tcg_res, cpu_env, | 42 | + int odd = FIELD_EX32(pred_desc, PREDDESC, DATA) << esz; |
38 | + tcg_op, tcg_idx, tcg_res); | 43 | uint64_t *d = vd, *n = vn, *m = vm; |
39 | + } else { | 44 | uint64_t l, h; |
40 | + gen_helper_neon_qrdmlah_s32(tcg_res, cpu_env, | 45 | intptr_t i; |
41 | + tcg_op, tcg_idx, tcg_res); | 46 | @@ -XXX,XX +XXX,XX @@ void HELPER(sve_uzp_p)(void *vd, void *vn, void *vm, uint32_t pred_desc) |
42 | + } | 47 | |
43 | + break; | 48 | void HELPER(sve_trn_p)(void *vd, void *vn, void *vm, uint32_t pred_desc) |
44 | + case 0x1f: /* SQRDMLSH */ | 49 | { |
45 | + read_vec_element_i32(s, tcg_res, rd, pass, | 50 | - intptr_t oprsz = extract32(pred_desc, 0, SIMD_OPRSZ_BITS) + 2; |
46 | + is_scalar ? size : MO_32); | 51 | - uintptr_t esz = extract32(pred_desc, SIMD_DATA_SHIFT, 2); |
47 | + if (size == 1) { | 52 | - bool odd = extract32(pred_desc, SIMD_DATA_SHIFT + 2, 1); |
48 | + gen_helper_neon_qrdmlsh_s16(tcg_res, cpu_env, | 53 | + intptr_t oprsz = FIELD_EX32(pred_desc, PREDDESC, OPRSZ); |
49 | + tcg_op, tcg_idx, tcg_res); | 54 | + int esz = FIELD_EX32(pred_desc, PREDDESC, ESZ); |
50 | + } else { | 55 | + int odd = FIELD_EX32(pred_desc, PREDDESC, DATA); |
51 | + gen_helper_neon_qrdmlsh_s32(tcg_res, cpu_env, | 56 | uint64_t *d = vd, *n = vn, *m = vm; |
52 | + tcg_op, tcg_idx, tcg_res); | 57 | uint64_t mask; |
53 | + } | 58 | int shr, shl; |
54 | + break; | 59 | diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c |
55 | default: | 60 | index XXXXXXX..XXXXXXX 100644 |
56 | g_assert_not_reached(); | 61 | --- a/target/arm/translate-sve.c |
57 | } | 62 | +++ b/target/arm/translate-sve.c |
63 | @@ -XXX,XX +XXX,XX @@ static bool do_perm_pred3(DisasContext *s, arg_rrr_esz *a, bool high_odd, | ||
64 | |||
65 | unsigned vsz = pred_full_reg_size(s); | ||
66 | |||
67 | - /* Predicate sizes may be smaller and cannot use simd_desc. | ||
68 | - We cannot round up, as we do elsewhere, because we need | ||
69 | - the exact size for ZIP2 and REV. We retain the style for | ||
70 | - the other helpers for consistency. */ | ||
71 | TCGv_ptr t_d = tcg_temp_new_ptr(); | ||
72 | TCGv_ptr t_n = tcg_temp_new_ptr(); | ||
73 | TCGv_ptr t_m = tcg_temp_new_ptr(); | ||
74 | TCGv_i32 t_desc; | ||
75 | - int desc; | ||
76 | + uint32_t desc = 0; | ||
77 | |||
78 | - desc = vsz - 2; | ||
79 | - desc = deposit32(desc, SIMD_DATA_SHIFT, 2, a->esz); | ||
80 | - desc = deposit32(desc, SIMD_DATA_SHIFT + 2, 2, high_odd); | ||
81 | + desc = FIELD_DP32(desc, PREDDESC, OPRSZ, vsz); | ||
82 | + desc = FIELD_DP32(desc, PREDDESC, ESZ, a->esz); | ||
83 | + desc = FIELD_DP32(desc, PREDDESC, DATA, high_odd); | ||
84 | |||
85 | tcg_gen_addi_ptr(t_d, cpu_env, pred_full_reg_offset(s, a->rd)); | ||
86 | tcg_gen_addi_ptr(t_n, cpu_env, pred_full_reg_offset(s, a->rn)); | ||
58 | -- | 87 | -- |
59 | 2.16.2 | 88 | 2.20.1 |
60 | 89 | ||
61 | 90 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Allow the translate subroutines to return false for invalid insns. | 3 | Update all users of do_perm_pred2 for the new |
4 | predicate descriptor field definitions. | ||
4 | 5 | ||
5 | At present we can of course invoke an invalid insn exception from within | 6 | Cc: qemu-stable@nongnu.org |
6 | the translate subroutine, but in the short term this consolidates code. | 7 | Buglink: https://bugs.launchpad.net/bugs/1908551 |
7 | In the long term it would allow the decodetree language to support | ||
8 | overlapping patterns for ISA extensions. | ||
9 | |||
10 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 8 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
11 | Message-id: 20180227232618.2908-1-richard.henderson@linaro.org | 9 | Message-id: 20210113062650.593824-5-richard.henderson@linaro.org |
12 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
14 | --- | 12 | --- |
15 | scripts/decodetree.py | 5 ++--- | 13 | target/arm/sve_helper.c | 8 ++++---- |
16 | 1 file changed, 2 insertions(+), 3 deletions(-) | 14 | target/arm/translate-sve.c | 13 ++++--------- |
15 | 2 files changed, 8 insertions(+), 13 deletions(-) | ||
17 | 16 | ||
18 | diff --git a/scripts/decodetree.py b/scripts/decodetree.py | 17 | diff --git a/target/arm/sve_helper.c b/target/arm/sve_helper.c |
19 | index XXXXXXX..XXXXXXX 100755 | 18 | index XXXXXXX..XXXXXXX 100644 |
20 | --- a/scripts/decodetree.py | 19 | --- a/target/arm/sve_helper.c |
21 | +++ b/scripts/decodetree.py | 20 | +++ b/target/arm/sve_helper.c |
22 | @@ -XXX,XX +XXX,XX @@ class Pattern(General): | 21 | @@ -XXX,XX +XXX,XX @@ static uint8_t reverse_bits_8(uint8_t x, int n) |
23 | global translate_prefix | 22 | |
24 | output('typedef ', self.base.base.struct_name(), | 23 | void HELPER(sve_rev_p)(void *vd, void *vn, uint32_t pred_desc) |
25 | ' arg_', self.name, ';\n') | 24 | { |
26 | - output(translate_scope, 'void ', translate_prefix, '_', self.name, | 25 | - intptr_t oprsz = extract32(pred_desc, 0, SIMD_OPRSZ_BITS) + 2; |
27 | + output(translate_scope, 'bool ', translate_prefix, '_', self.name, | 26 | - int esz = extract32(pred_desc, SIMD_DATA_SHIFT, 2); |
28 | '(DisasContext *ctx, arg_', self.name, | 27 | + intptr_t oprsz = FIELD_EX32(pred_desc, PREDDESC, OPRSZ); |
29 | ' *a, ', insntype, ' insn);\n') | 28 | + int esz = FIELD_EX32(pred_desc, PREDDESC, ESZ); |
30 | 29 | intptr_t i, oprsz_2 = oprsz / 2; | |
31 | @@ -XXX,XX +XXX,XX @@ class Pattern(General): | 30 | |
32 | output(ind, self.base.extract_name(), '(&u.f_', arg, ', insn);\n') | 31 | if (oprsz <= 8) { |
33 | for n, f in self.fields.items(): | 32 | @@ -XXX,XX +XXX,XX @@ void HELPER(sve_rev_p)(void *vd, void *vn, uint32_t pred_desc) |
34 | output(ind, 'u.f_', arg, '.', n, ' = ', f.str_extract(), ';\n') | 33 | |
35 | - output(ind, translate_prefix, '_', self.name, | 34 | void HELPER(sve_punpk_p)(void *vd, void *vn, uint32_t pred_desc) |
36 | + output(ind, 'return ', translate_prefix, '_', self.name, | 35 | { |
37 | '(ctx, &u.f_', arg, ', insn);\n') | 36 | - intptr_t oprsz = extract32(pred_desc, 0, SIMD_OPRSZ_BITS) + 2; |
38 | - output(ind, 'return true;\n') | 37 | - intptr_t high = extract32(pred_desc, SIMD_DATA_SHIFT + 2, 1); |
39 | # end Pattern | 38 | + intptr_t oprsz = FIELD_EX32(pred_desc, PREDDESC, OPRSZ); |
40 | 39 | + intptr_t high = FIELD_EX32(pred_desc, PREDDESC, DATA); | |
41 | 40 | uint64_t *d = vd; | |
41 | intptr_t i; | ||
42 | |||
43 | diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c | ||
44 | index XXXXXXX..XXXXXXX 100644 | ||
45 | --- a/target/arm/translate-sve.c | ||
46 | +++ b/target/arm/translate-sve.c | ||
47 | @@ -XXX,XX +XXX,XX @@ static bool do_perm_pred2(DisasContext *s, arg_rr_esz *a, bool high_odd, | ||
48 | TCGv_ptr t_d = tcg_temp_new_ptr(); | ||
49 | TCGv_ptr t_n = tcg_temp_new_ptr(); | ||
50 | TCGv_i32 t_desc; | ||
51 | - int desc; | ||
52 | + uint32_t desc = 0; | ||
53 | |||
54 | tcg_gen_addi_ptr(t_d, cpu_env, pred_full_reg_offset(s, a->rd)); | ||
55 | tcg_gen_addi_ptr(t_n, cpu_env, pred_full_reg_offset(s, a->rn)); | ||
56 | |||
57 | - /* Predicate sizes may be smaller and cannot use simd_desc. | ||
58 | - We cannot round up, as we do elsewhere, because we need | ||
59 | - the exact size for ZIP2 and REV. We retain the style for | ||
60 | - the other helpers for consistency. */ | ||
61 | - | ||
62 | - desc = vsz - 2; | ||
63 | - desc = deposit32(desc, SIMD_DATA_SHIFT, 2, a->esz); | ||
64 | - desc = deposit32(desc, SIMD_DATA_SHIFT + 2, 2, high_odd); | ||
65 | + desc = FIELD_DP32(desc, PREDDESC, OPRSZ, vsz); | ||
66 | + desc = FIELD_DP32(desc, PREDDESC, ESZ, a->esz); | ||
67 | + desc = FIELD_DP32(desc, PREDDESC, DATA, high_odd); | ||
68 | t_desc = tcg_const_i32(desc); | ||
69 | |||
70 | fn(t_d, t_n, t_desc); | ||
42 | -- | 71 | -- |
43 | 2.16.2 | 72 | 2.20.1 |
44 | 73 | ||
45 | 74 | diff view generated by jsdifflib |
1 | In some board or SoC models it is necessary to split a qemu_irq line | 1 | From: Mihai Carabas <mihai.carabas@oracle.com> |
---|---|---|---|
2 | so that one input can feed multiple outputs. We currently have | 2 | |
3 | qemu_irq_split() for this, but that has several deficiencies: | 3 | To ease the PCI device addition in next patches, split the code as follows: |
4 | * it can only handle splitting a line into two | 4 | - generic code (read/write/setup) is being kept in pvpanic.c |
5 | * it unavoidably leaks memory, so it can't be used | 5 | - ISA dependent code moved to pvpanic-isa.c |
6 | in a device that can be deleted | 6 | |
7 | 7 | Also, rename: | |
8 | Implement a qdev device that encapsulates splitting of IRQs, with a | 8 | - ISA_PVPANIC_DEVICE -> PVPANIC_ISA_DEVICE. |
9 | configurable number of outputs. (This is in some ways the inverse of | 9 | - TYPE_PVPANIC -> TYPE_PVPANIC_ISA. |
10 | the TYPE_OR_IRQ device.) | 10 | - MemoryRegion io -> mr. |
11 | 11 | - pvpanic_ioport_* in pvpanic_*. | |
12 | |||
13 | Update the build system with the new files and config structure. | ||
14 | |||
15 | Signed-off-by: Mihai Carabas <mihai.carabas@oracle.com> | ||
16 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 17 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
13 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
14 | Message-id: 20180220180325.29818-13-peter.maydell@linaro.org | ||
15 | --- | 18 | --- |
16 | hw/core/Makefile.objs | 1 + | 19 | include/hw/misc/pvpanic.h | 23 +++++++++- |
17 | include/hw/core/split-irq.h | 57 +++++++++++++++++++++++++++++ | 20 | hw/misc/pvpanic-isa.c | 94 +++++++++++++++++++++++++++++++++++++++ |
18 | include/hw/irq.h | 4 +- | 21 | hw/misc/pvpanic.c | 85 +++-------------------------------- |
19 | hw/core/split-irq.c | 89 +++++++++++++++++++++++++++++++++++++++++++++ | 22 | hw/i386/Kconfig | 2 +- |
20 | 4 files changed, 150 insertions(+), 1 deletion(-) | 23 | hw/misc/Kconfig | 6 ++- |
21 | create mode 100644 include/hw/core/split-irq.h | 24 | hw/misc/meson.build | 3 +- |
22 | create mode 100644 hw/core/split-irq.c | 25 | tests/qtest/meson.build | 2 +- |
23 | 26 | 7 files changed, 130 insertions(+), 85 deletions(-) | |
24 | diff --git a/hw/core/Makefile.objs b/hw/core/Makefile.objs | 27 | create mode 100644 hw/misc/pvpanic-isa.c |
25 | index XXXXXXX..XXXXXXX 100644 | 28 | |
26 | --- a/hw/core/Makefile.objs | 29 | diff --git a/include/hw/misc/pvpanic.h b/include/hw/misc/pvpanic.h |
27 | +++ b/hw/core/Makefile.objs | 30 | index XXXXXXX..XXXXXXX 100644 |
28 | @@ -XXX,XX +XXX,XX @@ common-obj-$(CONFIG_FITLOADER) += loader-fit.o | 31 | --- a/include/hw/misc/pvpanic.h |
29 | common-obj-$(CONFIG_SOFTMMU) += qdev-properties-system.o | 32 | +++ b/include/hw/misc/pvpanic.h |
30 | common-obj-$(CONFIG_SOFTMMU) += register.o | 33 | @@ -XXX,XX +XXX,XX @@ |
31 | common-obj-$(CONFIG_SOFTMMU) += or-irq.o | 34 | |
32 | +common-obj-$(CONFIG_SOFTMMU) += split-irq.o | 35 | #include "qom/object.h" |
33 | common-obj-$(CONFIG_PLATFORM_BUS) += platform-bus.o | 36 | |
34 | 37 | -#define TYPE_PVPANIC "pvpanic" | |
35 | obj-$(CONFIG_SOFTMMU) += generic-loader.o | 38 | +#define TYPE_PVPANIC_ISA_DEVICE "pvpanic" |
36 | diff --git a/include/hw/core/split-irq.h b/include/hw/core/split-irq.h | 39 | |
40 | #define PVPANIC_IOPORT_PROP "ioport" | ||
41 | |||
42 | +/* The bit of supported pv event, TODO: include uapi header and remove this */ | ||
43 | +#define PVPANIC_F_PANICKED 0 | ||
44 | +#define PVPANIC_F_CRASHLOADED 1 | ||
45 | + | ||
46 | +/* The pv event value */ | ||
47 | +#define PVPANIC_PANICKED (1 << PVPANIC_F_PANICKED) | ||
48 | +#define PVPANIC_CRASHLOADED (1 << PVPANIC_F_CRASHLOADED) | ||
49 | + | ||
50 | +/* | ||
51 | + * PVPanicState for any device type | ||
52 | + */ | ||
53 | +typedef struct PVPanicState PVPanicState; | ||
54 | +struct PVPanicState { | ||
55 | + MemoryRegion mr; | ||
56 | + uint8_t events; | ||
57 | +}; | ||
58 | + | ||
59 | +void pvpanic_setup_io(PVPanicState *s, DeviceState *dev, unsigned size); | ||
60 | + | ||
61 | static inline uint16_t pvpanic_port(void) | ||
62 | { | ||
63 | - Object *o = object_resolve_path_type("", TYPE_PVPANIC, NULL); | ||
64 | + Object *o = object_resolve_path_type("", TYPE_PVPANIC_ISA_DEVICE, NULL); | ||
65 | if (!o) { | ||
66 | return 0; | ||
67 | } | ||
68 | diff --git a/hw/misc/pvpanic-isa.c b/hw/misc/pvpanic-isa.c | ||
37 | new file mode 100644 | 69 | new file mode 100644 |
38 | index XXXXXXX..XXXXXXX | 70 | index XXXXXXX..XXXXXXX |
39 | --- /dev/null | 71 | --- /dev/null |
40 | +++ b/include/hw/core/split-irq.h | 72 | +++ b/hw/misc/pvpanic-isa.c |
41 | @@ -XXX,XX +XXX,XX @@ | 73 | @@ -XXX,XX +XXX,XX @@ |
42 | +/* | 74 | +/* |
43 | + * IRQ splitter device. | 75 | + * QEMU simulated pvpanic device. |
44 | + * | 76 | + * |
45 | + * Copyright (c) 2018 Linaro Limited. | 77 | + * Copyright Fujitsu, Corp. 2013 |
46 | + * Written by Peter Maydell | ||
47 | + * | 78 | + * |
48 | + * Permission is hereby granted, free of charge, to any person obtaining a copy | 79 | + * Authors: |
49 | + * of this software and associated documentation files (the "Software"), to deal | 80 | + * Wen Congyang <wency@cn.fujitsu.com> |
50 | + * in the Software without restriction, including without limitation the rights | 81 | + * Hu Tao <hutao@cn.fujitsu.com> |
51 | + * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | ||
52 | + * copies of the Software, and to permit persons to whom the Software is | ||
53 | + * furnished to do so, subject to the following conditions: | ||
54 | + * | 82 | + * |
55 | + * The above copyright notice and this permission notice shall be included in | 83 | + * This work is licensed under the terms of the GNU GPL, version 2 or later. |
56 | + * all copies or substantial portions of the Software. | 84 | + * See the COPYING file in the top-level directory. |
57 | + * | 85 | + * |
58 | + * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | ||
59 | + * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | ||
60 | + * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL | ||
61 | + * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | ||
62 | + * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | ||
63 | + * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN | ||
64 | + * THE SOFTWARE. | ||
65 | + */ | 86 | + */ |
66 | + | 87 | + |
67 | +/* This is a simple device which has one GPIO input line and multiple | 88 | +#include "qemu/osdep.h" |
68 | + * GPIO output lines. Any change on the input line is forwarded to all | 89 | +#include "qemu/log.h" |
69 | + * of the outputs. | 90 | +#include "qemu/module.h" |
70 | + * | 91 | +#include "sysemu/runstate.h" |
71 | + * QEMU interface: | 92 | + |
72 | + * + one unnamed GPIO input: the input line | 93 | +#include "hw/nvram/fw_cfg.h" |
73 | + * + N unnamed GPIO outputs: the output lines | 94 | +#include "hw/qdev-properties.h" |
74 | + * + QOM property "num-lines": sets the number of output lines | 95 | +#include "hw/misc/pvpanic.h" |
96 | +#include "qom/object.h" | ||
97 | +#include "hw/isa/isa.h" | ||
98 | + | ||
99 | +OBJECT_DECLARE_SIMPLE_TYPE(PVPanicISAState, PVPANIC_ISA_DEVICE) | ||
100 | + | ||
101 | +/* | ||
102 | + * PVPanicISAState for ISA device and | ||
103 | + * use ioport. | ||
75 | + */ | 104 | + */ |
76 | +#ifndef HW_SPLIT_IRQ_H | 105 | +struct PVPanicISAState { |
77 | +#define HW_SPLIT_IRQ_H | 106 | + ISADevice parent_obj; |
78 | + | 107 | + |
79 | +#include "hw/irq.h" | 108 | + uint16_t ioport; |
80 | +#include "hw/sysbus.h" | 109 | + PVPanicState pvpanic; |
81 | +#include "qom/object.h" | ||
82 | + | ||
83 | +#define TYPE_SPLIT_IRQ "split-irq" | ||
84 | + | ||
85 | +#define MAX_SPLIT_LINES 16 | ||
86 | + | ||
87 | +typedef struct SplitIRQ SplitIRQ; | ||
88 | + | ||
89 | +#define SPLIT_IRQ(obj) OBJECT_CHECK(SplitIRQ, (obj), TYPE_SPLIT_IRQ) | ||
90 | + | ||
91 | +struct SplitIRQ { | ||
92 | + DeviceState parent_obj; | ||
93 | + | ||
94 | + qemu_irq out_irq[MAX_SPLIT_LINES]; | ||
95 | + uint16_t num_lines; | ||
96 | +}; | 110 | +}; |
97 | + | 111 | + |
98 | +#endif | 112 | +static void pvpanic_isa_initfn(Object *obj) |
99 | diff --git a/include/hw/irq.h b/include/hw/irq.h | ||
100 | index XXXXXXX..XXXXXXX 100644 | ||
101 | --- a/include/hw/irq.h | ||
102 | +++ b/include/hw/irq.h | ||
103 | @@ -XXX,XX +XXX,XX @@ void qemu_free_irq(qemu_irq irq); | ||
104 | /* Returns a new IRQ with opposite polarity. */ | ||
105 | qemu_irq qemu_irq_invert(qemu_irq irq); | ||
106 | |||
107 | -/* Returns a new IRQ which feeds into both the passed IRQs */ | ||
108 | +/* Returns a new IRQ which feeds into both the passed IRQs. | ||
109 | + * It's probably better to use the TYPE_SPLIT_IRQ device instead. | ||
110 | + */ | ||
111 | qemu_irq qemu_irq_split(qemu_irq irq1, qemu_irq irq2); | ||
112 | |||
113 | /* Returns a new IRQ set which connects 1:1 to another IRQ set, which | ||
114 | diff --git a/hw/core/split-irq.c b/hw/core/split-irq.c | ||
115 | new file mode 100644 | ||
116 | index XXXXXXX..XXXXXXX | ||
117 | --- /dev/null | ||
118 | +++ b/hw/core/split-irq.c | ||
119 | @@ -XXX,XX +XXX,XX @@ | ||
120 | +/* | ||
121 | + * IRQ splitter device. | ||
122 | + * | ||
123 | + * Copyright (c) 2018 Linaro Limited. | ||
124 | + * Written by Peter Maydell | ||
125 | + * | ||
126 | + * Permission is hereby granted, free of charge, to any person obtaining a copy | ||
127 | + * of this software and associated documentation files (the "Software"), to deal | ||
128 | + * in the Software without restriction, including without limitation the rights | ||
129 | + * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | ||
130 | + * copies of the Software, and to permit persons to whom the Software is | ||
131 | + * furnished to do so, subject to the following conditions: | ||
132 | + * | ||
133 | + * The above copyright notice and this permission notice shall be included in | ||
134 | + * all copies or substantial portions of the Software. | ||
135 | + * | ||
136 | + * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | ||
137 | + * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | ||
138 | + * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL | ||
139 | + * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | ||
140 | + * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | ||
141 | + * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN | ||
142 | + * THE SOFTWARE. | ||
143 | + */ | ||
144 | + | ||
145 | +#include "qemu/osdep.h" | ||
146 | +#include "hw/core/split-irq.h" | ||
147 | +#include "qapi/error.h" | ||
148 | + | ||
149 | +static void split_irq_handler(void *opaque, int n, int level) | ||
150 | +{ | 113 | +{ |
151 | + SplitIRQ *s = SPLIT_IRQ(opaque); | 114 | + PVPanicISAState *s = PVPANIC_ISA_DEVICE(obj); |
152 | + int i; | 115 | + |
153 | + | 116 | + pvpanic_setup_io(&s->pvpanic, DEVICE(s), 1); |
154 | + for (i = 0; i < s->num_lines; i++) { | ||
155 | + qemu_set_irq(s->out_irq[i], level); | ||
156 | + } | ||
157 | +} | 117 | +} |
158 | + | 118 | + |
159 | +static void split_irq_init(Object *obj) | 119 | +static void pvpanic_isa_realizefn(DeviceState *dev, Error **errp) |
160 | +{ | 120 | +{ |
161 | + qdev_init_gpio_in(DEVICE(obj), split_irq_handler, 1); | 121 | + ISADevice *d = ISA_DEVICE(dev); |
162 | +} | 122 | + PVPanicISAState *s = PVPANIC_ISA_DEVICE(dev); |
163 | + | 123 | + PVPanicState *ps = &s->pvpanic; |
164 | +static void split_irq_realize(DeviceState *dev, Error **errp) | 124 | + FWCfgState *fw_cfg = fw_cfg_find(); |
165 | +{ | 125 | + uint16_t *pvpanic_port; |
166 | + SplitIRQ *s = SPLIT_IRQ(dev); | 126 | + |
167 | + | 127 | + if (!fw_cfg) { |
168 | + if (s->num_lines < 1 || s->num_lines >= MAX_SPLIT_LINES) { | ||
169 | + error_setg(errp, | ||
170 | + "IRQ splitter number of lines %d is not between 1 and %d", | ||
171 | + s->num_lines, MAX_SPLIT_LINES); | ||
172 | + return; | 128 | + return; |
173 | + } | 129 | + } |
174 | + | 130 | + |
175 | + qdev_init_gpio_out(dev, s->out_irq, s->num_lines); | 131 | + pvpanic_port = g_malloc(sizeof(*pvpanic_port)); |
132 | + *pvpanic_port = cpu_to_le16(s->ioport); | ||
133 | + fw_cfg_add_file(fw_cfg, "etc/pvpanic-port", pvpanic_port, | ||
134 | + sizeof(*pvpanic_port)); | ||
135 | + | ||
136 | + isa_register_ioport(d, &ps->mr, s->ioport); | ||
176 | +} | 137 | +} |
177 | + | 138 | + |
178 | +static Property split_irq_properties[] = { | 139 | +static Property pvpanic_isa_properties[] = { |
179 | + DEFINE_PROP_UINT16("num-lines", SplitIRQ, num_lines, 1), | 140 | + DEFINE_PROP_UINT16(PVPANIC_IOPORT_PROP, PVPanicISAState, ioport, 0x505), |
141 | + DEFINE_PROP_UINT8("events", PVPanicISAState, pvpanic.events, PVPANIC_PANICKED | PVPANIC_CRASHLOADED), | ||
180 | + DEFINE_PROP_END_OF_LIST(), | 142 | + DEFINE_PROP_END_OF_LIST(), |
181 | +}; | 143 | +}; |
182 | + | 144 | + |
183 | +static void split_irq_class_init(ObjectClass *klass, void *data) | 145 | +static void pvpanic_isa_class_init(ObjectClass *klass, void *data) |
184 | +{ | 146 | +{ |
185 | + DeviceClass *dc = DEVICE_CLASS(klass); | 147 | + DeviceClass *dc = DEVICE_CLASS(klass); |
186 | + | 148 | + |
187 | + /* No state to reset or migrate */ | 149 | + dc->realize = pvpanic_isa_realizefn; |
188 | + dc->props = split_irq_properties; | 150 | + device_class_set_props(dc, pvpanic_isa_properties); |
189 | + dc->realize = split_irq_realize; | 151 | + set_bit(DEVICE_CATEGORY_MISC, dc->categories); |
190 | + | ||
191 | + /* Reason: Needs to be wired up to work */ | ||
192 | + dc->user_creatable = false; | ||
193 | +} | 152 | +} |
194 | + | 153 | + |
195 | +static const TypeInfo split_irq_type_info = { | 154 | +static TypeInfo pvpanic_isa_info = { |
196 | + .name = TYPE_SPLIT_IRQ, | 155 | + .name = TYPE_PVPANIC_ISA_DEVICE, |
197 | + .parent = TYPE_DEVICE, | 156 | + .parent = TYPE_ISA_DEVICE, |
198 | + .instance_size = sizeof(SplitIRQ), | 157 | + .instance_size = sizeof(PVPanicISAState), |
199 | + .instance_init = split_irq_init, | 158 | + .instance_init = pvpanic_isa_initfn, |
200 | + .class_init = split_irq_class_init, | 159 | + .class_init = pvpanic_isa_class_init, |
201 | +}; | 160 | +}; |
202 | + | 161 | + |
203 | +static void split_irq_register_types(void) | 162 | +static void pvpanic_register_types(void) |
204 | +{ | 163 | +{ |
205 | + type_register_static(&split_irq_type_info); | 164 | + type_register_static(&pvpanic_isa_info); |
206 | +} | 165 | +} |
207 | + | 166 | + |
208 | +type_init(split_irq_register_types) | 167 | +type_init(pvpanic_register_types) |
168 | diff --git a/hw/misc/pvpanic.c b/hw/misc/pvpanic.c | ||
169 | index XXXXXXX..XXXXXXX 100644 | ||
170 | --- a/hw/misc/pvpanic.c | ||
171 | +++ b/hw/misc/pvpanic.c | ||
172 | @@ -XXX,XX +XXX,XX @@ | ||
173 | #include "hw/misc/pvpanic.h" | ||
174 | #include "qom/object.h" | ||
175 | |||
176 | -/* The bit of supported pv event, TODO: include uapi header and remove this */ | ||
177 | -#define PVPANIC_F_PANICKED 0 | ||
178 | -#define PVPANIC_F_CRASHLOADED 1 | ||
179 | - | ||
180 | -/* The pv event value */ | ||
181 | -#define PVPANIC_PANICKED (1 << PVPANIC_F_PANICKED) | ||
182 | -#define PVPANIC_CRASHLOADED (1 << PVPANIC_F_CRASHLOADED) | ||
183 | - | ||
184 | -typedef struct PVPanicState PVPanicState; | ||
185 | -DECLARE_INSTANCE_CHECKER(PVPanicState, ISA_PVPANIC_DEVICE, | ||
186 | - TYPE_PVPANIC) | ||
187 | - | ||
188 | static void handle_event(int event) | ||
189 | { | ||
190 | static bool logged; | ||
191 | @@ -XXX,XX +XXX,XX @@ static void handle_event(int event) | ||
192 | } | ||
193 | } | ||
194 | |||
195 | -#include "hw/isa/isa.h" | ||
196 | - | ||
197 | -struct PVPanicState { | ||
198 | - ISADevice parent_obj; | ||
199 | - | ||
200 | - MemoryRegion io; | ||
201 | - uint16_t ioport; | ||
202 | - uint8_t events; | ||
203 | -}; | ||
204 | - | ||
205 | /* return supported events on read */ | ||
206 | -static uint64_t pvpanic_ioport_read(void *opaque, hwaddr addr, unsigned size) | ||
207 | +static uint64_t pvpanic_read(void *opaque, hwaddr addr, unsigned size) | ||
208 | { | ||
209 | PVPanicState *pvp = opaque; | ||
210 | return pvp->events; | ||
211 | } | ||
212 | |||
213 | -static void pvpanic_ioport_write(void *opaque, hwaddr addr, uint64_t val, | ||
214 | +static void pvpanic_write(void *opaque, hwaddr addr, uint64_t val, | ||
215 | unsigned size) | ||
216 | { | ||
217 | handle_event(val); | ||
218 | } | ||
219 | |||
220 | static const MemoryRegionOps pvpanic_ops = { | ||
221 | - .read = pvpanic_ioport_read, | ||
222 | - .write = pvpanic_ioport_write, | ||
223 | + .read = pvpanic_read, | ||
224 | + .write = pvpanic_write, | ||
225 | .impl = { | ||
226 | .min_access_size = 1, | ||
227 | .max_access_size = 1, | ||
228 | }, | ||
229 | }; | ||
230 | |||
231 | -static void pvpanic_isa_initfn(Object *obj) | ||
232 | +void pvpanic_setup_io(PVPanicState *s, DeviceState *dev, unsigned size) | ||
233 | { | ||
234 | - PVPanicState *s = ISA_PVPANIC_DEVICE(obj); | ||
235 | - | ||
236 | - memory_region_init_io(&s->io, OBJECT(s), &pvpanic_ops, s, "pvpanic", 1); | ||
237 | + memory_region_init_io(&s->mr, OBJECT(dev), &pvpanic_ops, s, "pvpanic", size); | ||
238 | } | ||
239 | - | ||
240 | -static void pvpanic_isa_realizefn(DeviceState *dev, Error **errp) | ||
241 | -{ | ||
242 | - ISADevice *d = ISA_DEVICE(dev); | ||
243 | - PVPanicState *s = ISA_PVPANIC_DEVICE(dev); | ||
244 | - FWCfgState *fw_cfg = fw_cfg_find(); | ||
245 | - uint16_t *pvpanic_port; | ||
246 | - | ||
247 | - if (!fw_cfg) { | ||
248 | - return; | ||
249 | - } | ||
250 | - | ||
251 | - pvpanic_port = g_malloc(sizeof(*pvpanic_port)); | ||
252 | - *pvpanic_port = cpu_to_le16(s->ioport); | ||
253 | - fw_cfg_add_file(fw_cfg, "etc/pvpanic-port", pvpanic_port, | ||
254 | - sizeof(*pvpanic_port)); | ||
255 | - | ||
256 | - isa_register_ioport(d, &s->io, s->ioport); | ||
257 | -} | ||
258 | - | ||
259 | -static Property pvpanic_isa_properties[] = { | ||
260 | - DEFINE_PROP_UINT16(PVPANIC_IOPORT_PROP, PVPanicState, ioport, 0x505), | ||
261 | - DEFINE_PROP_UINT8("events", PVPanicState, events, PVPANIC_PANICKED | PVPANIC_CRASHLOADED), | ||
262 | - DEFINE_PROP_END_OF_LIST(), | ||
263 | -}; | ||
264 | - | ||
265 | -static void pvpanic_isa_class_init(ObjectClass *klass, void *data) | ||
266 | -{ | ||
267 | - DeviceClass *dc = DEVICE_CLASS(klass); | ||
268 | - | ||
269 | - dc->realize = pvpanic_isa_realizefn; | ||
270 | - device_class_set_props(dc, pvpanic_isa_properties); | ||
271 | - set_bit(DEVICE_CATEGORY_MISC, dc->categories); | ||
272 | -} | ||
273 | - | ||
274 | -static TypeInfo pvpanic_isa_info = { | ||
275 | - .name = TYPE_PVPANIC, | ||
276 | - .parent = TYPE_ISA_DEVICE, | ||
277 | - .instance_size = sizeof(PVPanicState), | ||
278 | - .instance_init = pvpanic_isa_initfn, | ||
279 | - .class_init = pvpanic_isa_class_init, | ||
280 | -}; | ||
281 | - | ||
282 | -static void pvpanic_register_types(void) | ||
283 | -{ | ||
284 | - type_register_static(&pvpanic_isa_info); | ||
285 | -} | ||
286 | - | ||
287 | -type_init(pvpanic_register_types) | ||
288 | diff --git a/hw/i386/Kconfig b/hw/i386/Kconfig | ||
289 | index XXXXXXX..XXXXXXX 100644 | ||
290 | --- a/hw/i386/Kconfig | ||
291 | +++ b/hw/i386/Kconfig | ||
292 | @@ -XXX,XX +XXX,XX @@ config PC | ||
293 | imply ISA_DEBUG | ||
294 | imply PARALLEL | ||
295 | imply PCI_DEVICES | ||
296 | - imply PVPANIC | ||
297 | + imply PVPANIC_ISA | ||
298 | imply QXL | ||
299 | imply SEV | ||
300 | imply SGA | ||
301 | diff --git a/hw/misc/Kconfig b/hw/misc/Kconfig | ||
302 | index XXXXXXX..XXXXXXX 100644 | ||
303 | --- a/hw/misc/Kconfig | ||
304 | +++ b/hw/misc/Kconfig | ||
305 | @@ -XXX,XX +XXX,XX @@ config IOTKIT_SYSCTL | ||
306 | config IOTKIT_SYSINFO | ||
307 | bool | ||
308 | |||
309 | -config PVPANIC | ||
310 | +config PVPANIC_COMMON | ||
311 | + bool | ||
312 | + | ||
313 | +config PVPANIC_ISA | ||
314 | bool | ||
315 | depends on ISA_BUS | ||
316 | + select PVPANIC_COMMON | ||
317 | |||
318 | config AUX | ||
319 | bool | ||
320 | diff --git a/hw/misc/meson.build b/hw/misc/meson.build | ||
321 | index XXXXXXX..XXXXXXX 100644 | ||
322 | --- a/hw/misc/meson.build | ||
323 | +++ b/hw/misc/meson.build | ||
324 | @@ -XXX,XX +XXX,XX @@ softmmu_ss.add(when: 'CONFIG_EMC141X', if_true: files('emc141x.c')) | ||
325 | softmmu_ss.add(when: 'CONFIG_UNIMP', if_true: files('unimp.c')) | ||
326 | softmmu_ss.add(when: 'CONFIG_EMPTY_SLOT', if_true: files('empty_slot.c')) | ||
327 | softmmu_ss.add(when: 'CONFIG_LED', if_true: files('led.c')) | ||
328 | +softmmu_ss.add(when: 'CONFIG_PVPANIC_COMMON', if_true: files('pvpanic.c')) | ||
329 | |||
330 | # ARM devices | ||
331 | softmmu_ss.add(when: 'CONFIG_PL310', if_true: files('arm_l2x0.c')) | ||
332 | @@ -XXX,XX +XXX,XX @@ softmmu_ss.add(when: 'CONFIG_IOTKIT_SYSINFO', if_true: files('iotkit-sysinfo.c') | ||
333 | softmmu_ss.add(when: 'CONFIG_ARMSSE_CPUID', if_true: files('armsse-cpuid.c')) | ||
334 | softmmu_ss.add(when: 'CONFIG_ARMSSE_MHU', if_true: files('armsse-mhu.c')) | ||
335 | |||
336 | -softmmu_ss.add(when: 'CONFIG_PVPANIC', if_true: files('pvpanic.c')) | ||
337 | +softmmu_ss.add(when: 'CONFIG_PVPANIC_ISA', if_true: files('pvpanic-isa.c')) | ||
338 | softmmu_ss.add(when: 'CONFIG_AUX', if_true: files('auxbus.c')) | ||
339 | softmmu_ss.add(when: 'CONFIG_ASPEED_SOC', if_true: files('aspeed_scu.c', 'aspeed_sdmc.c', 'aspeed_xdma.c')) | ||
340 | softmmu_ss.add(when: 'CONFIG_MSF2', if_true: files('msf2-sysreg.c')) | ||
341 | diff --git a/tests/qtest/meson.build b/tests/qtest/meson.build | ||
342 | index XXXXXXX..XXXXXXX 100644 | ||
343 | --- a/tests/qtest/meson.build | ||
344 | +++ b/tests/qtest/meson.build | ||
345 | @@ -XXX,XX +XXX,XX @@ qtests_i386 = \ | ||
346 | (config_host.has_key('CONFIG_LINUX') and \ | ||
347 | config_all_devices.has_key('CONFIG_ISA_IPMI_BT') ? ['ipmi-bt-test'] : []) + \ | ||
348 | (config_all_devices.has_key('CONFIG_WDT_IB700') ? ['wdt_ib700-test'] : []) + \ | ||
349 | - (config_all_devices.has_key('CONFIG_PVPANIC') ? ['pvpanic-test'] : []) + \ | ||
350 | + (config_all_devices.has_key('CONFIG_PVPANIC_ISA') ? ['pvpanic-test'] : []) + \ | ||
351 | (config_all_devices.has_key('CONFIG_HDA') ? ['intel-hda-test'] : []) + \ | ||
352 | (config_all_devices.has_key('CONFIG_I82801B11') ? ['i82801b11-test'] : []) + \ | ||
353 | (config_all_devices.has_key('CONFIG_IOH3420') ? ['ioh3420-test'] : []) + \ | ||
209 | -- | 354 | -- |
210 | 2.16.2 | 355 | 2.20.1 |
211 | 356 | ||
212 | 357 | diff view generated by jsdifflib |
1 | The MPS2 AN505 FPGA image includes a "FPGA control block" | 1 | From: Mihai Carabas <mihai.carabas@oracle.com> |
---|---|---|---|
2 | which is a small set of registers handling LEDs, buttons | ||
3 | and some counters. | ||
4 | 2 | ||
3 | Add PCI interface support for PVPANIC device. Create a new file pvpanic-pci.c | ||
4 | where the PCI specific routines reside and update the build system with the new | ||
5 | files and config structure. | ||
6 | |||
7 | Signed-off-by: Mihai Carabas <mihai.carabas@oracle.com> | ||
8 | Reviewed-by: Gerd Hoffmann <kraxel@redhat.com> | ||
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | [PMM: wrapped one long line] | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
7 | Message-id: 20180220180325.29818-14-peter.maydell@linaro.org | ||
8 | --- | 12 | --- |
9 | hw/misc/Makefile.objs | 1 + | 13 | docs/specs/pci-ids.txt | 1 + |
10 | include/hw/misc/mps2-fpgaio.h | 43 ++++++++++ | 14 | include/hw/misc/pvpanic.h | 1 + |
11 | hw/misc/mps2-fpgaio.c | 176 ++++++++++++++++++++++++++++++++++++++++ | 15 | include/hw/pci/pci.h | 1 + |
12 | default-configs/arm-softmmu.mak | 1 + | 16 | hw/misc/pvpanic-pci.c | 95 +++++++++++++++++++++++++++++++++++++++ |
13 | hw/misc/trace-events | 6 ++ | 17 | hw/misc/Kconfig | 6 +++ |
14 | 5 files changed, 227 insertions(+) | 18 | hw/misc/meson.build | 1 + |
15 | create mode 100644 include/hw/misc/mps2-fpgaio.h | 19 | 6 files changed, 105 insertions(+) |
16 | create mode 100644 hw/misc/mps2-fpgaio.c | 20 | create mode 100644 hw/misc/pvpanic-pci.c |
17 | 21 | ||
18 | diff --git a/hw/misc/Makefile.objs b/hw/misc/Makefile.objs | 22 | diff --git a/docs/specs/pci-ids.txt b/docs/specs/pci-ids.txt |
19 | index XXXXXXX..XXXXXXX 100644 | 23 | index XXXXXXX..XXXXXXX 100644 |
20 | --- a/hw/misc/Makefile.objs | 24 | --- a/docs/specs/pci-ids.txt |
21 | +++ b/hw/misc/Makefile.objs | 25 | +++ b/docs/specs/pci-ids.txt |
22 | @@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_STM32F2XX_SYSCFG) += stm32f2xx_syscfg.o | 26 | @@ -XXX,XX +XXX,XX @@ PCI devices (other than virtio): |
23 | obj-$(CONFIG_MIPS_CPS) += mips_cmgcr.o | 27 | 1b36:000d PCI xhci usb host adapter |
24 | obj-$(CONFIG_MIPS_CPS) += mips_cpc.o | 28 | 1b36:000f mdpy (mdev sample device), linux/samples/vfio-mdev/mdpy.c |
25 | obj-$(CONFIG_MIPS_ITU) += mips_itu.o | 29 | 1b36:0010 PCIe NVMe device (-device nvme) |
26 | +obj-$(CONFIG_MPS2_FPGAIO) += mps2-fpgaio.o | 30 | +1b36:0011 PCI PVPanic device (-device pvpanic-pci) |
27 | obj-$(CONFIG_MPS2_SCC) += mps2-scc.o | 31 | |
28 | 32 | All these devices are documented in docs/specs. | |
29 | obj-$(CONFIG_PVPANIC) += pvpanic.o | 33 | |
30 | diff --git a/include/hw/misc/mps2-fpgaio.h b/include/hw/misc/mps2-fpgaio.h | 34 | diff --git a/include/hw/misc/pvpanic.h b/include/hw/misc/pvpanic.h |
35 | index XXXXXXX..XXXXXXX 100644 | ||
36 | --- a/include/hw/misc/pvpanic.h | ||
37 | +++ b/include/hw/misc/pvpanic.h | ||
38 | @@ -XXX,XX +XXX,XX @@ | ||
39 | #include "qom/object.h" | ||
40 | |||
41 | #define TYPE_PVPANIC_ISA_DEVICE "pvpanic" | ||
42 | +#define TYPE_PVPANIC_PCI_DEVICE "pvpanic-pci" | ||
43 | |||
44 | #define PVPANIC_IOPORT_PROP "ioport" | ||
45 | |||
46 | diff --git a/include/hw/pci/pci.h b/include/hw/pci/pci.h | ||
47 | index XXXXXXX..XXXXXXX 100644 | ||
48 | --- a/include/hw/pci/pci.h | ||
49 | +++ b/include/hw/pci/pci.h | ||
50 | @@ -XXX,XX +XXX,XX @@ extern bool pci_available; | ||
51 | #define PCI_DEVICE_ID_REDHAT_PCIE_BRIDGE 0x000e | ||
52 | #define PCI_DEVICE_ID_REDHAT_MDPY 0x000f | ||
53 | #define PCI_DEVICE_ID_REDHAT_NVME 0x0010 | ||
54 | +#define PCI_DEVICE_ID_REDHAT_PVPANIC 0x0011 | ||
55 | #define PCI_DEVICE_ID_REDHAT_QXL 0x0100 | ||
56 | |||
57 | #define FMT_PCIBUS PRIx64 | ||
58 | diff --git a/hw/misc/pvpanic-pci.c b/hw/misc/pvpanic-pci.c | ||
31 | new file mode 100644 | 59 | new file mode 100644 |
32 | index XXXXXXX..XXXXXXX | 60 | index XXXXXXX..XXXXXXX |
33 | --- /dev/null | 61 | --- /dev/null |
34 | +++ b/include/hw/misc/mps2-fpgaio.h | 62 | +++ b/hw/misc/pvpanic-pci.c |
35 | @@ -XXX,XX +XXX,XX @@ | 63 | @@ -XXX,XX +XXX,XX @@ |
36 | +/* | 64 | +/* |
37 | + * ARM MPS2 FPGAIO emulation | 65 | + * QEMU simulated PCI pvpanic device. |
38 | + * | 66 | + * |
39 | + * Copyright (c) 2018 Linaro Limited | 67 | + * Copyright (C) 2020 Oracle |
40 | + * Written by Peter Maydell | ||
41 | + * | 68 | + * |
42 | + * This program is free software; you can redistribute it and/or modify | 69 | + * Authors: |
43 | + * it under the terms of the GNU General Public License version 2 or | 70 | + * Mihai Carabas <mihai.carabas@oracle.com> |
44 | + * (at your option) any later version. | ||
45 | + */ | ||
46 | + | ||
47 | +/* This is a model of the FPGAIO register block in the AN505 | ||
48 | + * FPGA image for the MPS2 dev board; it is documented in the | ||
49 | + * application note: | ||
50 | + * http://infocenter.arm.com/help/topic/com.arm.doc.dai0505b/index.html | ||
51 | + * | 71 | + * |
52 | + * QEMU interface: | 72 | + * This work is licensed under the terms of the GNU GPL, version 2 or later. |
53 | + * + sysbus MMIO region 0: the register bank | 73 | + * See the COPYING file in the top-level directory. |
54 | + */ | ||
55 | + | ||
56 | +#ifndef MPS2_FPGAIO_H | ||
57 | +#define MPS2_FPGAIO_H | ||
58 | + | ||
59 | +#include "hw/sysbus.h" | ||
60 | + | ||
61 | +#define TYPE_MPS2_FPGAIO "mps2-fpgaio" | ||
62 | +#define MPS2_FPGAIO(obj) OBJECT_CHECK(MPS2FPGAIO, (obj), TYPE_MPS2_FPGAIO) | ||
63 | + | ||
64 | +typedef struct { | ||
65 | + /*< private >*/ | ||
66 | + SysBusDevice parent_obj; | ||
67 | + | ||
68 | + /*< public >*/ | ||
69 | + MemoryRegion iomem; | ||
70 | + | ||
71 | + uint32_t led0; | ||
72 | + uint32_t prescale; | ||
73 | + uint32_t misc; | ||
74 | + | ||
75 | + uint32_t prescale_clk; | ||
76 | +} MPS2FPGAIO; | ||
77 | + | ||
78 | +#endif | ||
79 | diff --git a/hw/misc/mps2-fpgaio.c b/hw/misc/mps2-fpgaio.c | ||
80 | new file mode 100644 | ||
81 | index XXXXXXX..XXXXXXX | ||
82 | --- /dev/null | ||
83 | +++ b/hw/misc/mps2-fpgaio.c | ||
84 | @@ -XXX,XX +XXX,XX @@ | ||
85 | +/* | ||
86 | + * ARM MPS2 AN505 FPGAIO emulation | ||
87 | + * | 74 | + * |
88 | + * Copyright (c) 2018 Linaro Limited | ||
89 | + * Written by Peter Maydell | ||
90 | + * | ||
91 | + * This program is free software; you can redistribute it and/or modify | ||
92 | + * it under the terms of the GNU General Public License version 2 or | ||
93 | + * (at your option) any later version. | ||
94 | + */ | ||
95 | + | ||
96 | +/* This is a model of the "FPGA system control and I/O" block found | ||
97 | + * in the AN505 FPGA image for the MPS2 devboard. | ||
98 | + * It is documented in AN505: | ||
99 | + * http://infocenter.arm.com/help/topic/com.arm.doc.dai0505b/index.html | ||
100 | + */ | 75 | + */ |
101 | + | 76 | + |
102 | +#include "qemu/osdep.h" | 77 | +#include "qemu/osdep.h" |
103 | +#include "qemu/log.h" | 78 | +#include "qemu/log.h" |
104 | +#include "qapi/error.h" | 79 | +#include "qemu/module.h" |
105 | +#include "trace.h" | 80 | +#include "sysemu/runstate.h" |
106 | +#include "hw/sysbus.h" | ||
107 | +#include "hw/registerfields.h" | ||
108 | +#include "hw/misc/mps2-fpgaio.h" | ||
109 | + | 81 | + |
110 | +REG32(LED0, 0) | 82 | +#include "hw/nvram/fw_cfg.h" |
111 | +REG32(BUTTON, 8) | 83 | +#include "hw/qdev-properties.h" |
112 | +REG32(CLK1HZ, 0x10) | 84 | +#include "migration/vmstate.h" |
113 | +REG32(CLK100HZ, 0x14) | 85 | +#include "hw/misc/pvpanic.h" |
114 | +REG32(COUNTER, 0x18) | 86 | +#include "qom/object.h" |
115 | +REG32(PRESCALE, 0x1c) | 87 | +#include "hw/pci/pci.h" |
116 | +REG32(PSCNTR, 0x20) | ||
117 | +REG32(MISC, 0x4c) | ||
118 | + | 88 | + |
119 | +static uint64_t mps2_fpgaio_read(void *opaque, hwaddr offset, unsigned size) | 89 | +OBJECT_DECLARE_SIMPLE_TYPE(PVPanicPCIState, PVPANIC_PCI_DEVICE) |
120 | +{ | ||
121 | + MPS2FPGAIO *s = MPS2_FPGAIO(opaque); | ||
122 | + uint64_t r; | ||
123 | + | 90 | + |
124 | + switch (offset) { | 91 | +/* |
125 | + case A_LED0: | 92 | + * PVPanicPCIState for PCI device |
126 | + r = s->led0; | 93 | + */ |
127 | + break; | 94 | +typedef struct PVPanicPCIState { |
128 | + case A_BUTTON: | 95 | + PCIDevice dev; |
129 | + /* User-pressable board buttons. We don't model that, so just return | 96 | + PVPanicState pvpanic; |
130 | + * zeroes. | 97 | +} PVPanicPCIState; |
131 | + */ | ||
132 | + r = 0; | ||
133 | + break; | ||
134 | + case A_PRESCALE: | ||
135 | + r = s->prescale; | ||
136 | + break; | ||
137 | + case A_MISC: | ||
138 | + r = s->misc; | ||
139 | + break; | ||
140 | + case A_CLK1HZ: | ||
141 | + case A_CLK100HZ: | ||
142 | + case A_COUNTER: | ||
143 | + case A_PSCNTR: | ||
144 | + /* These are all upcounters of various frequencies. */ | ||
145 | + qemu_log_mask(LOG_UNIMP, "MPS2 FPGAIO: counters unimplemented\n"); | ||
146 | + r = 0; | ||
147 | + break; | ||
148 | + default: | ||
149 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
150 | + "MPS2 FPGAIO read: bad offset %x\n", (int) offset); | ||
151 | + r = 0; | ||
152 | + break; | ||
153 | + } | ||
154 | + | 98 | + |
155 | + trace_mps2_fpgaio_read(offset, r, size); | 99 | +static const VMStateDescription vmstate_pvpanic_pci = { |
156 | + return r; | 100 | + .name = "pvpanic-pci", |
157 | +} | ||
158 | + | ||
159 | +static void mps2_fpgaio_write(void *opaque, hwaddr offset, uint64_t value, | ||
160 | + unsigned size) | ||
161 | +{ | ||
162 | + MPS2FPGAIO *s = MPS2_FPGAIO(opaque); | ||
163 | + | ||
164 | + trace_mps2_fpgaio_write(offset, value, size); | ||
165 | + | ||
166 | + switch (offset) { | ||
167 | + case A_LED0: | ||
168 | + /* LED bits [1:0] control board LEDs. We don't currently have | ||
169 | + * a mechanism for displaying this graphically, so use a trace event. | ||
170 | + */ | ||
171 | + trace_mps2_fpgaio_leds(value & 0x02 ? '*' : '.', | ||
172 | + value & 0x01 ? '*' : '.'); | ||
173 | + s->led0 = value & 0x3; | ||
174 | + break; | ||
175 | + case A_PRESCALE: | ||
176 | + s->prescale = value; | ||
177 | + break; | ||
178 | + case A_MISC: | ||
179 | + /* These are control bits for some of the other devices on the | ||
180 | + * board (SPI, CLCD, etc). We don't implement that yet, so just | ||
181 | + * make the bits read as written. | ||
182 | + */ | ||
183 | + qemu_log_mask(LOG_UNIMP, | ||
184 | + "MPS2 FPGAIO: MISC control bits unimplemented\n"); | ||
185 | + s->misc = value; | ||
186 | + break; | ||
187 | + default: | ||
188 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
189 | + "MPS2 FPGAIO write: bad offset 0x%x\n", (int) offset); | ||
190 | + break; | ||
191 | + } | ||
192 | +} | ||
193 | + | ||
194 | +static const MemoryRegionOps mps2_fpgaio_ops = { | ||
195 | + .read = mps2_fpgaio_read, | ||
196 | + .write = mps2_fpgaio_write, | ||
197 | + .endianness = DEVICE_LITTLE_ENDIAN, | ||
198 | +}; | ||
199 | + | ||
200 | +static void mps2_fpgaio_reset(DeviceState *dev) | ||
201 | +{ | ||
202 | + MPS2FPGAIO *s = MPS2_FPGAIO(dev); | ||
203 | + | ||
204 | + trace_mps2_fpgaio_reset(); | ||
205 | + s->led0 = 0; | ||
206 | + s->prescale = 0; | ||
207 | + s->misc = 0; | ||
208 | +} | ||
209 | + | ||
210 | +static void mps2_fpgaio_init(Object *obj) | ||
211 | +{ | ||
212 | + SysBusDevice *sbd = SYS_BUS_DEVICE(obj); | ||
213 | + MPS2FPGAIO *s = MPS2_FPGAIO(obj); | ||
214 | + | ||
215 | + memory_region_init_io(&s->iomem, obj, &mps2_fpgaio_ops, s, | ||
216 | + "mps2-fpgaio", 0x1000); | ||
217 | + sysbus_init_mmio(sbd, &s->iomem); | ||
218 | +} | ||
219 | + | ||
220 | +static const VMStateDescription mps2_fpgaio_vmstate = { | ||
221 | + .name = "mps2-fpgaio", | ||
222 | + .version_id = 1, | 101 | + .version_id = 1, |
223 | + .minimum_version_id = 1, | 102 | + .minimum_version_id = 1, |
224 | + .fields = (VMStateField[]) { | 103 | + .fields = (VMStateField[]) { |
225 | + VMSTATE_UINT32(led0, MPS2FPGAIO), | 104 | + VMSTATE_PCI_DEVICE(dev, PVPanicPCIState), |
226 | + VMSTATE_UINT32(prescale, MPS2FPGAIO), | ||
227 | + VMSTATE_UINT32(misc, MPS2FPGAIO), | ||
228 | + VMSTATE_END_OF_LIST() | 105 | + VMSTATE_END_OF_LIST() |
229 | + } | 106 | + } |
230 | +}; | 107 | +}; |
231 | + | 108 | + |
232 | +static Property mps2_fpgaio_properties[] = { | 109 | +static void pvpanic_pci_realizefn(PCIDevice *dev, Error **errp) |
233 | + /* Frequency of the prescale counter */ | 110 | +{ |
234 | + DEFINE_PROP_UINT32("prescale-clk", MPS2FPGAIO, prescale_clk, 20000000), | 111 | + PVPanicPCIState *s = PVPANIC_PCI_DEVICE(dev); |
112 | + PVPanicState *ps = &s->pvpanic; | ||
113 | + | ||
114 | + pvpanic_setup_io(&s->pvpanic, DEVICE(s), 2); | ||
115 | + | ||
116 | + pci_register_bar(dev, 0, PCI_BASE_ADDRESS_SPACE_MEMORY, &ps->mr); | ||
117 | +} | ||
118 | + | ||
119 | +static Property pvpanic_pci_properties[] = { | ||
120 | + DEFINE_PROP_UINT8("events", PVPanicPCIState, pvpanic.events, | ||
121 | + PVPANIC_PANICKED | PVPANIC_CRASHLOADED), | ||
235 | + DEFINE_PROP_END_OF_LIST(), | 122 | + DEFINE_PROP_END_OF_LIST(), |
236 | +}; | 123 | +}; |
237 | + | 124 | + |
238 | +static void mps2_fpgaio_class_init(ObjectClass *klass, void *data) | 125 | +static void pvpanic_pci_class_init(ObjectClass *klass, void *data) |
239 | +{ | 126 | +{ |
240 | + DeviceClass *dc = DEVICE_CLASS(klass); | 127 | + DeviceClass *dc = DEVICE_CLASS(klass); |
128 | + PCIDeviceClass *pc = PCI_DEVICE_CLASS(klass); | ||
241 | + | 129 | + |
242 | + dc->vmsd = &mps2_fpgaio_vmstate; | 130 | + device_class_set_props(dc, pvpanic_pci_properties); |
243 | + dc->reset = mps2_fpgaio_reset; | 131 | + |
244 | + dc->props = mps2_fpgaio_properties; | 132 | + pc->realize = pvpanic_pci_realizefn; |
133 | + pc->vendor_id = PCI_VENDOR_ID_REDHAT; | ||
134 | + pc->device_id = PCI_DEVICE_ID_REDHAT_PVPANIC; | ||
135 | + pc->revision = 1; | ||
136 | + pc->class_id = PCI_CLASS_SYSTEM_OTHER; | ||
137 | + dc->vmsd = &vmstate_pvpanic_pci; | ||
138 | + | ||
139 | + set_bit(DEVICE_CATEGORY_MISC, dc->categories); | ||
245 | +} | 140 | +} |
246 | + | 141 | + |
247 | +static const TypeInfo mps2_fpgaio_info = { | 142 | +static TypeInfo pvpanic_pci_info = { |
248 | + .name = TYPE_MPS2_FPGAIO, | 143 | + .name = TYPE_PVPANIC_PCI_DEVICE, |
249 | + .parent = TYPE_SYS_BUS_DEVICE, | 144 | + .parent = TYPE_PCI_DEVICE, |
250 | + .instance_size = sizeof(MPS2FPGAIO), | 145 | + .instance_size = sizeof(PVPanicPCIState), |
251 | + .instance_init = mps2_fpgaio_init, | 146 | + .class_init = pvpanic_pci_class_init, |
252 | + .class_init = mps2_fpgaio_class_init, | 147 | + .interfaces = (InterfaceInfo[]) { |
148 | + { INTERFACE_CONVENTIONAL_PCI_DEVICE }, | ||
149 | + { } | ||
150 | + } | ||
253 | +}; | 151 | +}; |
254 | + | 152 | + |
255 | +static void mps2_fpgaio_register_types(void) | 153 | +static void pvpanic_register_types(void) |
256 | +{ | 154 | +{ |
257 | + type_register_static(&mps2_fpgaio_info); | 155 | + type_register_static(&pvpanic_pci_info); |
258 | +} | 156 | +} |
259 | + | 157 | + |
260 | +type_init(mps2_fpgaio_register_types); | 158 | +type_init(pvpanic_register_types); |
261 | diff --git a/default-configs/arm-softmmu.mak b/default-configs/arm-softmmu.mak | 159 | diff --git a/hw/misc/Kconfig b/hw/misc/Kconfig |
262 | index XXXXXXX..XXXXXXX 100644 | 160 | index XXXXXXX..XXXXXXX 100644 |
263 | --- a/default-configs/arm-softmmu.mak | 161 | --- a/hw/misc/Kconfig |
264 | +++ b/default-configs/arm-softmmu.mak | 162 | +++ b/hw/misc/Kconfig |
265 | @@ -XXX,XX +XXX,XX @@ CONFIG_STM32F205_SOC=y | 163 | @@ -XXX,XX +XXX,XX @@ config IOTKIT_SYSINFO |
266 | CONFIG_CMSDK_APB_TIMER=y | 164 | config PVPANIC_COMMON |
267 | CONFIG_CMSDK_APB_UART=y | 165 | bool |
268 | 166 | ||
269 | +CONFIG_MPS2_FPGAIO=y | 167 | +config PVPANIC_PCI |
270 | CONFIG_MPS2_SCC=y | 168 | + bool |
271 | 169 | + default y if PCI_DEVICES | |
272 | CONFIG_VERSATILE_PCI=y | 170 | + depends on PCI |
273 | diff --git a/hw/misc/trace-events b/hw/misc/trace-events | 171 | + select PVPANIC_COMMON |
172 | + | ||
173 | config PVPANIC_ISA | ||
174 | bool | ||
175 | depends on ISA_BUS | ||
176 | diff --git a/hw/misc/meson.build b/hw/misc/meson.build | ||
274 | index XXXXXXX..XXXXXXX 100644 | 177 | index XXXXXXX..XXXXXXX 100644 |
275 | --- a/hw/misc/trace-events | 178 | --- a/hw/misc/meson.build |
276 | +++ b/hw/misc/trace-events | 179 | +++ b/hw/misc/meson.build |
277 | @@ -XXX,XX +XXX,XX @@ mps2_scc_leds(char led7, char led6, char led5, char led4, char led3, char led2, | 180 | @@ -XXX,XX +XXX,XX @@ softmmu_ss.add(when: 'CONFIG_ARMSSE_CPUID', if_true: files('armsse-cpuid.c')) |
278 | mps2_scc_cfg_write(unsigned function, unsigned device, uint32_t value) "MPS2 SCC config write: function %d device %d data 0x%" PRIx32 | 181 | softmmu_ss.add(when: 'CONFIG_ARMSSE_MHU', if_true: files('armsse-mhu.c')) |
279 | mps2_scc_cfg_read(unsigned function, unsigned device, uint32_t value) "MPS2 SCC config read: function %d device %d data 0x%" PRIx32 | 182 | |
280 | 183 | softmmu_ss.add(when: 'CONFIG_PVPANIC_ISA', if_true: files('pvpanic-isa.c')) | |
281 | +# hw/misc/mps2_fpgaio.c | 184 | +softmmu_ss.add(when: 'CONFIG_PVPANIC_PCI', if_true: files('pvpanic-pci.c')) |
282 | +mps2_fpgaio_read(uint64_t offset, uint64_t data, unsigned size) "MPS2 FPGAIO read: offset 0x%" PRIx64 " data 0x%" PRIx64 " size %u" | 185 | softmmu_ss.add(when: 'CONFIG_AUX', if_true: files('auxbus.c')) |
283 | +mps2_fpgaio_write(uint64_t offset, uint64_t data, unsigned size) "MPS2 FPGAIO write: offset 0x%" PRIx64 " data 0x%" PRIx64 " size %u" | 186 | softmmu_ss.add(when: 'CONFIG_ASPEED_SOC', if_true: files('aspeed_scu.c', 'aspeed_sdmc.c', 'aspeed_xdma.c')) |
284 | +mps2_fpgaio_reset(void) "MPS2 FPGAIO: reset" | 187 | softmmu_ss.add(when: 'CONFIG_MSF2', if_true: files('msf2-sysreg.c')) |
285 | +mps2_fpgaio_leds(char led1, char led0) "MPS2 FPGAIO LEDs: %c%c" | ||
286 | + | ||
287 | # hw/misc/msf2-sysreg.c | ||
288 | msf2_sysreg_write(uint64_t offset, uint32_t val, uint32_t prev) "msf2-sysreg write: addr 0x%08" HWADDR_PRIx " data 0x%" PRIx32 " prev 0x%" PRIx32 | ||
289 | msf2_sysreg_read(uint64_t offset, uint32_t val) "msf2-sysreg read: addr 0x%08" HWADDR_PRIx " data 0x%08" PRIx32 | ||
290 | -- | 188 | -- |
291 | 2.16.2 | 189 | 2.20.1 |
292 | 190 | ||
293 | 191 | diff view generated by jsdifflib |
1 | Create an "init-svtor" property on the armv7m container | 1 | From: Mihai Carabas <mihai.carabas@oracle.com> |
---|---|---|---|
2 | object which we can forward to the CPU object. | ||
3 | 2 | ||
3 | Add pvpanic PCI device support details in docs/specs/pvpanic.txt. | ||
4 | |||
5 | Signed-off-by: Mihai Carabas <mihai.carabas@oracle.com> | ||
6 | [fixed s/device/bus/ error] | ||
7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
5 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
6 | Message-id: 20180220180325.29818-8-peter.maydell@linaro.org | ||
7 | --- | 9 | --- |
8 | include/hw/arm/armv7m.h | 2 ++ | 10 | docs/specs/pvpanic.txt | 13 ++++++++++++- |
9 | hw/arm/armv7m.c | 9 +++++++++ | 11 | 1 file changed, 12 insertions(+), 1 deletion(-) |
10 | 2 files changed, 11 insertions(+) | ||
11 | 12 | ||
12 | diff --git a/include/hw/arm/armv7m.h b/include/hw/arm/armv7m.h | 13 | diff --git a/docs/specs/pvpanic.txt b/docs/specs/pvpanic.txt |
13 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
14 | --- a/include/hw/arm/armv7m.h | 15 | --- a/docs/specs/pvpanic.txt |
15 | +++ b/include/hw/arm/armv7m.h | 16 | +++ b/docs/specs/pvpanic.txt |
16 | @@ -XXX,XX +XXX,XX @@ typedef struct { | 17 | @@ -XXX,XX +XXX,XX @@ |
17 | * that CPU accesses see. (The NVIC, bitbanding and other CPU-internal | 18 | PVPANIC DEVICE |
18 | * devices will be automatically layered on top of this view.) | 19 | ============== |
19 | * + Property "idau": IDAU interface (forwarded to CPU object) | 20 | |
20 | + * + Property "init-svtor": secure VTOR reset value (forwarded to CPU object) | 21 | -pvpanic device is a simulated ISA device, through which a guest panic |
21 | */ | 22 | +pvpanic device is a simulated device, through which a guest panic |
22 | typedef struct ARMv7MState { | 23 | event is sent to qemu, and a QMP event is generated. This allows |
23 | /*< private >*/ | 24 | management apps (e.g. libvirt) to be notified and respond to the event. |
24 | @@ -XXX,XX +XXX,XX @@ typedef struct ARMv7MState { | 25 | |
25 | /* MemoryRegion the board provides to us (with its devices, RAM, etc) */ | 26 | @@ -XXX,XX +XXX,XX @@ The management app has the option of waiting for GUEST_PANICKED events, |
26 | MemoryRegion *board_memory; | 27 | and/or polling for guest-panicked RunState, to learn when the pvpanic |
27 | Object *idau; | 28 | device has fired a panic event. |
28 | + uint32_t init_svtor; | 29 | |
29 | } ARMv7MState; | 30 | +The pvpanic device can be implemented as an ISA device (using IOPORT) or as a |
30 | 31 | +PCI device. | |
31 | #endif | 32 | + |
32 | diff --git a/hw/arm/armv7m.c b/hw/arm/armv7m.c | 33 | ISA Interface |
33 | index XXXXXXX..XXXXXXX 100644 | 34 | ------------- |
34 | --- a/hw/arm/armv7m.c | 35 | |
35 | +++ b/hw/arm/armv7m.c | 36 | @@ -XXX,XX +XXX,XX @@ bit 1: a guest panic has happened and will be handled by the guest; |
36 | @@ -XXX,XX +XXX,XX @@ static void armv7m_realize(DeviceState *dev, Error **errp) | 37 | the host should record it or report it, but should not affect |
37 | return; | 38 | the execution of the guest. |
38 | } | 39 | |
39 | } | 40 | +PCI Interface |
40 | + if (object_property_find(OBJECT(s->cpu), "init-svtor", NULL)) { | 41 | +------------- |
41 | + object_property_set_uint(OBJECT(s->cpu), s->init_svtor, | 42 | + |
42 | + "init-svtor", &err); | 43 | +The PCI interface is similar to the ISA interface except that it uses an MMIO |
43 | + if (err != NULL) { | 44 | +address space provided by its BAR0, 1 byte long. Any machine with a PCI bus |
44 | + error_propagate(errp, err); | 45 | +can enable a pvpanic device by adding '-device pvpanic-pci' to the command |
45 | + return; | 46 | +line. |
46 | + } | 47 | + |
47 | + } | 48 | ACPI Interface |
48 | object_property_set_bool(OBJECT(s->cpu), true, "realized", &err); | 49 | -------------- |
49 | if (err != NULL) { | ||
50 | error_propagate(errp, err); | ||
51 | @@ -XXX,XX +XXX,XX @@ static Property armv7m_properties[] = { | ||
52 | DEFINE_PROP_LINK("memory", ARMv7MState, board_memory, TYPE_MEMORY_REGION, | ||
53 | MemoryRegion *), | ||
54 | DEFINE_PROP_LINK("idau", ARMv7MState, idau, TYPE_IDAU_INTERFACE, Object *), | ||
55 | + DEFINE_PROP_UINT32("init-svtor", ARMv7MState, init_svtor, 0), | ||
56 | DEFINE_PROP_END_OF_LIST(), | ||
57 | }; | ||
58 | 50 | ||
59 | -- | 51 | -- |
60 | 2.16.2 | 52 | 2.20.1 |
61 | 53 | ||
62 | 54 | diff view generated by jsdifflib |
1 | From: Alistair Francis <alistair.francis@xilinx.com> | 1 | From: Mihai Carabas <mihai.carabas@oracle.com> |
---|---|---|---|
2 | 2 | ||
3 | Initial commit of the ZynqMP RTC device. | 3 | Add a test case for pvpanic-pci device. The scenario is the same as pvpapnic |
4 | ISA device, but is using the PCI bus. | ||
4 | 5 | ||
5 | Signed-off-by: Alistair Francis <alistair.francis@xilinx.com> | 6 | Signed-off-by: Mihai Carabas <mihai.carabas@oracle.com> |
6 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 7 | Acked-by: Thomas Huth <thuth@redhat.com> |
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
8 | --- | 10 | --- |
9 | hw/timer/Makefile.objs | 1 + | 11 | tests/qtest/pvpanic-pci-test.c | 62 ++++++++++++++++++++++++++++++++++ |
10 | include/hw/timer/xlnx-zynqmp-rtc.h | 84 +++++++++++++++ | 12 | tests/qtest/meson.build | 1 + |
11 | hw/timer/xlnx-zynqmp-rtc.c | 214 +++++++++++++++++++++++++++++++++++++ | 13 | 2 files changed, 63 insertions(+) |
12 | 3 files changed, 299 insertions(+) | 14 | create mode 100644 tests/qtest/pvpanic-pci-test.c |
13 | create mode 100644 include/hw/timer/xlnx-zynqmp-rtc.h | ||
14 | create mode 100644 hw/timer/xlnx-zynqmp-rtc.c | ||
15 | 15 | ||
16 | diff --git a/hw/timer/Makefile.objs b/hw/timer/Makefile.objs | 16 | diff --git a/tests/qtest/pvpanic-pci-test.c b/tests/qtest/pvpanic-pci-test.c |
17 | index XXXXXXX..XXXXXXX 100644 | ||
18 | --- a/hw/timer/Makefile.objs | ||
19 | +++ b/hw/timer/Makefile.objs | ||
20 | @@ -XXX,XX +XXX,XX @@ common-obj-$(CONFIG_IMX) += imx_epit.o | ||
21 | common-obj-$(CONFIG_IMX) += imx_gpt.o | ||
22 | common-obj-$(CONFIG_LM32) += lm32_timer.o | ||
23 | common-obj-$(CONFIG_MILKYMIST) += milkymist-sysctl.o | ||
24 | +common-obj-$(CONFIG_XLNX_ZYNQMP) += xlnx-zynqmp-rtc.o | ||
25 | |||
26 | obj-$(CONFIG_ALTERA_TIMER) += altera_timer.o | ||
27 | obj-$(CONFIG_EXYNOS4) += exynos4210_mct.o | ||
28 | diff --git a/include/hw/timer/xlnx-zynqmp-rtc.h b/include/hw/timer/xlnx-zynqmp-rtc.h | ||
29 | new file mode 100644 | 17 | new file mode 100644 |
30 | index XXXXXXX..XXXXXXX | 18 | index XXXXXXX..XXXXXXX |
31 | --- /dev/null | 19 | --- /dev/null |
32 | +++ b/include/hw/timer/xlnx-zynqmp-rtc.h | 20 | +++ b/tests/qtest/pvpanic-pci-test.c |
33 | @@ -XXX,XX +XXX,XX @@ | 21 | @@ -XXX,XX +XXX,XX @@ |
34 | +/* | 22 | +/* |
35 | + * QEMU model of the Xilinx ZynqMP Real Time Clock (RTC). | 23 | + * QTest testcase for PV Panic PCI device |
36 | + * | 24 | + * |
37 | + * Copyright (c) 2017 Xilinx Inc. | 25 | + * Copyright (C) 2020 Oracle |
38 | + * | 26 | + * |
39 | + * Written-by: Alistair Francis <alistair.francis@xilinx.com> | 27 | + * Authors: |
28 | + * Mihai Carabas <mihai.carabas@oracle.com> | ||
40 | + * | 29 | + * |
41 | + * Permission is hereby granted, free of charge, to any person obtaining a copy | 30 | + * This work is licensed under the terms of the GNU GPL, version 2 or later. |
42 | + * of this software and associated documentation files (the "Software"), to deal | 31 | + * See the COPYING file in the top-level directory. |
43 | + * in the Software without restriction, including without limitation the rights | ||
44 | + * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | ||
45 | + * copies of the Software, and to permit persons to whom the Software is | ||
46 | + * furnished to do so, subject to the following conditions: | ||
47 | + * | 32 | + * |
48 | + * The above copyright notice and this permission notice shall be included in | ||
49 | + * all copies or substantial portions of the Software. | ||
50 | + * | ||
51 | + * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | ||
52 | + * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | ||
53 | + * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL | ||
54 | + * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | ||
55 | + * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | ||
56 | + * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN | ||
57 | + * THE SOFTWARE. | ||
58 | + */ | ||
59 | + | ||
60 | +#include "hw/register.h" | ||
61 | + | ||
62 | +#define TYPE_XLNX_ZYNQMP_RTC "xlnx-zynmp.rtc" | ||
63 | + | ||
64 | +#define XLNX_ZYNQMP_RTC(obj) \ | ||
65 | + OBJECT_CHECK(XlnxZynqMPRTC, (obj), TYPE_XLNX_ZYNQMP_RTC) | ||
66 | + | ||
67 | +REG32(SET_TIME_WRITE, 0x0) | ||
68 | +REG32(SET_TIME_READ, 0x4) | ||
69 | +REG32(CALIB_WRITE, 0x8) | ||
70 | + FIELD(CALIB_WRITE, FRACTION_EN, 20, 1) | ||
71 | + FIELD(CALIB_WRITE, FRACTION_DATA, 16, 4) | ||
72 | + FIELD(CALIB_WRITE, MAX_TICK, 0, 16) | ||
73 | +REG32(CALIB_READ, 0xc) | ||
74 | + FIELD(CALIB_READ, FRACTION_EN, 20, 1) | ||
75 | + FIELD(CALIB_READ, FRACTION_DATA, 16, 4) | ||
76 | + FIELD(CALIB_READ, MAX_TICK, 0, 16) | ||
77 | +REG32(CURRENT_TIME, 0x10) | ||
78 | +REG32(CURRENT_TICK, 0x14) | ||
79 | + FIELD(CURRENT_TICK, VALUE, 0, 16) | ||
80 | +REG32(ALARM, 0x18) | ||
81 | +REG32(RTC_INT_STATUS, 0x20) | ||
82 | + FIELD(RTC_INT_STATUS, ALARM, 1, 1) | ||
83 | + FIELD(RTC_INT_STATUS, SECONDS, 0, 1) | ||
84 | +REG32(RTC_INT_MASK, 0x24) | ||
85 | + FIELD(RTC_INT_MASK, ALARM, 1, 1) | ||
86 | + FIELD(RTC_INT_MASK, SECONDS, 0, 1) | ||
87 | +REG32(RTC_INT_EN, 0x28) | ||
88 | + FIELD(RTC_INT_EN, ALARM, 1, 1) | ||
89 | + FIELD(RTC_INT_EN, SECONDS, 0, 1) | ||
90 | +REG32(RTC_INT_DIS, 0x2c) | ||
91 | + FIELD(RTC_INT_DIS, ALARM, 1, 1) | ||
92 | + FIELD(RTC_INT_DIS, SECONDS, 0, 1) | ||
93 | +REG32(ADDR_ERROR, 0x30) | ||
94 | + FIELD(ADDR_ERROR, STATUS, 0, 1) | ||
95 | +REG32(ADDR_ERROR_INT_MASK, 0x34) | ||
96 | + FIELD(ADDR_ERROR_INT_MASK, MASK, 0, 1) | ||
97 | +REG32(ADDR_ERROR_INT_EN, 0x38) | ||
98 | + FIELD(ADDR_ERROR_INT_EN, MASK, 0, 1) | ||
99 | +REG32(ADDR_ERROR_INT_DIS, 0x3c) | ||
100 | + FIELD(ADDR_ERROR_INT_DIS, MASK, 0, 1) | ||
101 | +REG32(CONTROL, 0x40) | ||
102 | + FIELD(CONTROL, BATTERY_DISABLE, 31, 1) | ||
103 | + FIELD(CONTROL, OSC_CNTRL, 24, 4) | ||
104 | + FIELD(CONTROL, SLVERR_ENABLE, 0, 1) | ||
105 | +REG32(SAFETY_CHK, 0x50) | ||
106 | + | ||
107 | +#define XLNX_ZYNQMP_RTC_R_MAX (R_SAFETY_CHK + 1) | ||
108 | + | ||
109 | +typedef struct XlnxZynqMPRTC { | ||
110 | + SysBusDevice parent_obj; | ||
111 | + MemoryRegion iomem; | ||
112 | + qemu_irq irq_rtc_int; | ||
113 | + qemu_irq irq_addr_error_int; | ||
114 | + | ||
115 | + uint32_t regs[XLNX_ZYNQMP_RTC_R_MAX]; | ||
116 | + RegisterInfo regs_info[XLNX_ZYNQMP_RTC_R_MAX]; | ||
117 | +} XlnxZynqMPRTC; | ||
118 | diff --git a/hw/timer/xlnx-zynqmp-rtc.c b/hw/timer/xlnx-zynqmp-rtc.c | ||
119 | new file mode 100644 | ||
120 | index XXXXXXX..XXXXXXX | ||
121 | --- /dev/null | ||
122 | +++ b/hw/timer/xlnx-zynqmp-rtc.c | ||
123 | @@ -XXX,XX +XXX,XX @@ | ||
124 | +/* | ||
125 | + * QEMU model of the Xilinx ZynqMP Real Time Clock (RTC). | ||
126 | + * | ||
127 | + * Copyright (c) 2017 Xilinx Inc. | ||
128 | + * | ||
129 | + * Written-by: Alistair Francis <alistair.francis@xilinx.com> | ||
130 | + * | ||
131 | + * Permission is hereby granted, free of charge, to any person obtaining a copy | ||
132 | + * of this software and associated documentation files (the "Software"), to deal | ||
133 | + * in the Software without restriction, including without limitation the rights | ||
134 | + * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | ||
135 | + * copies of the Software, and to permit persons to whom the Software is | ||
136 | + * furnished to do so, subject to the following conditions: | ||
137 | + * | ||
138 | + * The above copyright notice and this permission notice shall be included in | ||
139 | + * all copies or substantial portions of the Software. | ||
140 | + * | ||
141 | + * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | ||
142 | + * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | ||
143 | + * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL | ||
144 | + * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | ||
145 | + * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | ||
146 | + * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN | ||
147 | + * THE SOFTWARE. | ||
148 | + */ | 33 | + */ |
149 | + | 34 | + |
150 | +#include "qemu/osdep.h" | 35 | +#include "qemu/osdep.h" |
151 | +#include "hw/sysbus.h" | 36 | +#include "libqos/libqtest.h" |
152 | +#include "hw/register.h" | 37 | +#include "qapi/qmp/qdict.h" |
153 | +#include "qemu/bitops.h" | 38 | +#include "libqos/pci.h" |
154 | +#include "qemu/log.h" | 39 | +#include "libqos/pci-pc.h" |
155 | +#include "hw/timer/xlnx-zynqmp-rtc.h" | 40 | +#include "hw/pci/pci_regs.h" |
156 | + | 41 | + |
157 | +#ifndef XLNX_ZYNQMP_RTC_ERR_DEBUG | 42 | +static void test_panic(void) |
158 | +#define XLNX_ZYNQMP_RTC_ERR_DEBUG 0 | 43 | +{ |
159 | +#endif | 44 | + uint8_t val; |
45 | + QDict *response, *data; | ||
46 | + QTestState *qts; | ||
47 | + QPCIBus *pcibus; | ||
48 | + QPCIDevice *dev; | ||
49 | + QPCIBar bar; | ||
160 | + | 50 | + |
161 | +static void rtc_int_update_irq(XlnxZynqMPRTC *s) | 51 | + qts = qtest_init("-device pvpanic-pci"); |
162 | +{ | 52 | + pcibus = qpci_new_pc(qts, NULL); |
163 | + bool pending = s->regs[R_RTC_INT_STATUS] & ~s->regs[R_RTC_INT_MASK]; | 53 | + dev = qpci_device_find(pcibus, QPCI_DEVFN(0x4, 0x0)); |
164 | + qemu_set_irq(s->irq_rtc_int, pending); | 54 | + qpci_device_enable(dev); |
55 | + bar = qpci_iomap(dev, 0, NULL); | ||
56 | + | ||
57 | + qpci_memread(dev, bar, 0, &val, sizeof(val)); | ||
58 | + g_assert_cmpuint(val, ==, 3); | ||
59 | + | ||
60 | + val = 1; | ||
61 | + qpci_memwrite(dev, bar, 0, &val, sizeof(val)); | ||
62 | + | ||
63 | + response = qtest_qmp_eventwait_ref(qts, "GUEST_PANICKED"); | ||
64 | + g_assert(qdict_haskey(response, "data")); | ||
65 | + data = qdict_get_qdict(response, "data"); | ||
66 | + g_assert(qdict_haskey(data, "action")); | ||
67 | + g_assert_cmpstr(qdict_get_str(data, "action"), ==, "pause"); | ||
68 | + qobject_unref(response); | ||
69 | + | ||
70 | + qtest_quit(qts); | ||
165 | +} | 71 | +} |
166 | + | 72 | + |
167 | +static void addr_error_int_update_irq(XlnxZynqMPRTC *s) | 73 | +int main(int argc, char **argv) |
168 | +{ | 74 | +{ |
169 | + bool pending = s->regs[R_ADDR_ERROR] & ~s->regs[R_ADDR_ERROR_INT_MASK]; | 75 | + int ret; |
170 | + qemu_set_irq(s->irq_addr_error_int, pending); | 76 | + |
77 | + g_test_init(&argc, &argv, NULL); | ||
78 | + qtest_add_func("/pvpanic-pci/panic", test_panic); | ||
79 | + | ||
80 | + ret = g_test_run(); | ||
81 | + | ||
82 | + return ret; | ||
171 | +} | 83 | +} |
172 | + | 84 | diff --git a/tests/qtest/meson.build b/tests/qtest/meson.build |
173 | +static void rtc_int_status_postw(RegisterInfo *reg, uint64_t val64) | 85 | index XXXXXXX..XXXXXXX 100644 |
174 | +{ | 86 | --- a/tests/qtest/meson.build |
175 | + XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(reg->opaque); | 87 | +++ b/tests/qtest/meson.build |
176 | + rtc_int_update_irq(s); | 88 | @@ -XXX,XX +XXX,XX @@ endif |
177 | +} | 89 | |
178 | + | 90 | qtests_pci = \ |
179 | +static uint64_t rtc_int_en_prew(RegisterInfo *reg, uint64_t val64) | 91 | (config_all_devices.has_key('CONFIG_VGA') ? ['display-vga-test'] : []) + \ |
180 | +{ | 92 | + (config_all_devices.has_key('CONFIG_PVPANIC_PCI') ? ['pvpanic-pci-test'] : []) + \ |
181 | + XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(reg->opaque); | 93 | (config_all_devices.has_key('CONFIG_IVSHMEM_DEVICE') ? ['ivshmem-test'] : []) |
182 | + | 94 | |
183 | + s->regs[R_RTC_INT_MASK] &= (uint32_t) ~val64; | 95 | qtests_i386 = \ |
184 | + rtc_int_update_irq(s); | ||
185 | + return 0; | ||
186 | +} | ||
187 | + | ||
188 | +static uint64_t rtc_int_dis_prew(RegisterInfo *reg, uint64_t val64) | ||
189 | +{ | ||
190 | + XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(reg->opaque); | ||
191 | + | ||
192 | + s->regs[R_RTC_INT_MASK] |= (uint32_t) val64; | ||
193 | + rtc_int_update_irq(s); | ||
194 | + return 0; | ||
195 | +} | ||
196 | + | ||
197 | +static void addr_error_postw(RegisterInfo *reg, uint64_t val64) | ||
198 | +{ | ||
199 | + XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(reg->opaque); | ||
200 | + addr_error_int_update_irq(s); | ||
201 | +} | ||
202 | + | ||
203 | +static uint64_t addr_error_int_en_prew(RegisterInfo *reg, uint64_t val64) | ||
204 | +{ | ||
205 | + XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(reg->opaque); | ||
206 | + | ||
207 | + s->regs[R_ADDR_ERROR_INT_MASK] &= (uint32_t) ~val64; | ||
208 | + addr_error_int_update_irq(s); | ||
209 | + return 0; | ||
210 | +} | ||
211 | + | ||
212 | +static uint64_t addr_error_int_dis_prew(RegisterInfo *reg, uint64_t val64) | ||
213 | +{ | ||
214 | + XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(reg->opaque); | ||
215 | + | ||
216 | + s->regs[R_ADDR_ERROR_INT_MASK] |= (uint32_t) val64; | ||
217 | + addr_error_int_update_irq(s); | ||
218 | + return 0; | ||
219 | +} | ||
220 | + | ||
221 | +static const RegisterAccessInfo rtc_regs_info[] = { | ||
222 | + { .name = "SET_TIME_WRITE", .addr = A_SET_TIME_WRITE, | ||
223 | + },{ .name = "SET_TIME_READ", .addr = A_SET_TIME_READ, | ||
224 | + .ro = 0xffffffff, | ||
225 | + },{ .name = "CALIB_WRITE", .addr = A_CALIB_WRITE, | ||
226 | + },{ .name = "CALIB_READ", .addr = A_CALIB_READ, | ||
227 | + .ro = 0x1fffff, | ||
228 | + },{ .name = "CURRENT_TIME", .addr = A_CURRENT_TIME, | ||
229 | + .ro = 0xffffffff, | ||
230 | + },{ .name = "CURRENT_TICK", .addr = A_CURRENT_TICK, | ||
231 | + .ro = 0xffff, | ||
232 | + },{ .name = "ALARM", .addr = A_ALARM, | ||
233 | + },{ .name = "RTC_INT_STATUS", .addr = A_RTC_INT_STATUS, | ||
234 | + .w1c = 0x3, | ||
235 | + .post_write = rtc_int_status_postw, | ||
236 | + },{ .name = "RTC_INT_MASK", .addr = A_RTC_INT_MASK, | ||
237 | + .reset = 0x3, | ||
238 | + .ro = 0x3, | ||
239 | + },{ .name = "RTC_INT_EN", .addr = A_RTC_INT_EN, | ||
240 | + .pre_write = rtc_int_en_prew, | ||
241 | + },{ .name = "RTC_INT_DIS", .addr = A_RTC_INT_DIS, | ||
242 | + .pre_write = rtc_int_dis_prew, | ||
243 | + },{ .name = "ADDR_ERROR", .addr = A_ADDR_ERROR, | ||
244 | + .w1c = 0x1, | ||
245 | + .post_write = addr_error_postw, | ||
246 | + },{ .name = "ADDR_ERROR_INT_MASK", .addr = A_ADDR_ERROR_INT_MASK, | ||
247 | + .reset = 0x1, | ||
248 | + .ro = 0x1, | ||
249 | + },{ .name = "ADDR_ERROR_INT_EN", .addr = A_ADDR_ERROR_INT_EN, | ||
250 | + .pre_write = addr_error_int_en_prew, | ||
251 | + },{ .name = "ADDR_ERROR_INT_DIS", .addr = A_ADDR_ERROR_INT_DIS, | ||
252 | + .pre_write = addr_error_int_dis_prew, | ||
253 | + },{ .name = "CONTROL", .addr = A_CONTROL, | ||
254 | + .reset = 0x1000000, | ||
255 | + .rsvd = 0x70fffffe, | ||
256 | + },{ .name = "SAFETY_CHK", .addr = A_SAFETY_CHK, | ||
257 | + } | ||
258 | +}; | ||
259 | + | ||
260 | +static void rtc_reset(DeviceState *dev) | ||
261 | +{ | ||
262 | + XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(dev); | ||
263 | + unsigned int i; | ||
264 | + | ||
265 | + for (i = 0; i < ARRAY_SIZE(s->regs_info); ++i) { | ||
266 | + register_reset(&s->regs_info[i]); | ||
267 | + } | ||
268 | + | ||
269 | + rtc_int_update_irq(s); | ||
270 | + addr_error_int_update_irq(s); | ||
271 | +} | ||
272 | + | ||
273 | +static const MemoryRegionOps rtc_ops = { | ||
274 | + .read = register_read_memory, | ||
275 | + .write = register_write_memory, | ||
276 | + .endianness = DEVICE_LITTLE_ENDIAN, | ||
277 | + .valid = { | ||
278 | + .min_access_size = 4, | ||
279 | + .max_access_size = 4, | ||
280 | + }, | ||
281 | +}; | ||
282 | + | ||
283 | +static void rtc_init(Object *obj) | ||
284 | +{ | ||
285 | + XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(obj); | ||
286 | + SysBusDevice *sbd = SYS_BUS_DEVICE(obj); | ||
287 | + RegisterInfoArray *reg_array; | ||
288 | + | ||
289 | + memory_region_init(&s->iomem, obj, TYPE_XLNX_ZYNQMP_RTC, | ||
290 | + XLNX_ZYNQMP_RTC_R_MAX * 4); | ||
291 | + reg_array = | ||
292 | + register_init_block32(DEVICE(obj), rtc_regs_info, | ||
293 | + ARRAY_SIZE(rtc_regs_info), | ||
294 | + s->regs_info, s->regs, | ||
295 | + &rtc_ops, | ||
296 | + XLNX_ZYNQMP_RTC_ERR_DEBUG, | ||
297 | + XLNX_ZYNQMP_RTC_R_MAX * 4); | ||
298 | + memory_region_add_subregion(&s->iomem, | ||
299 | + 0x0, | ||
300 | + ®_array->mem); | ||
301 | + sysbus_init_mmio(sbd, &s->iomem); | ||
302 | + sysbus_init_irq(sbd, &s->irq_rtc_int); | ||
303 | + sysbus_init_irq(sbd, &s->irq_addr_error_int); | ||
304 | +} | ||
305 | + | ||
306 | +static const VMStateDescription vmstate_rtc = { | ||
307 | + .name = TYPE_XLNX_ZYNQMP_RTC, | ||
308 | + .version_id = 1, | ||
309 | + .minimum_version_id = 1, | ||
310 | + .fields = (VMStateField[]) { | ||
311 | + VMSTATE_UINT32_ARRAY(regs, XlnxZynqMPRTC, XLNX_ZYNQMP_RTC_R_MAX), | ||
312 | + VMSTATE_END_OF_LIST(), | ||
313 | + } | ||
314 | +}; | ||
315 | + | ||
316 | +static void rtc_class_init(ObjectClass *klass, void *data) | ||
317 | +{ | ||
318 | + DeviceClass *dc = DEVICE_CLASS(klass); | ||
319 | + | ||
320 | + dc->reset = rtc_reset; | ||
321 | + dc->vmsd = &vmstate_rtc; | ||
322 | +} | ||
323 | + | ||
324 | +static const TypeInfo rtc_info = { | ||
325 | + .name = TYPE_XLNX_ZYNQMP_RTC, | ||
326 | + .parent = TYPE_SYS_BUS_DEVICE, | ||
327 | + .instance_size = sizeof(XlnxZynqMPRTC), | ||
328 | + .class_init = rtc_class_init, | ||
329 | + .instance_init = rtc_init, | ||
330 | +}; | ||
331 | + | ||
332 | +static void rtc_register_types(void) | ||
333 | +{ | ||
334 | + type_register_static(&rtc_info); | ||
335 | +} | ||
336 | + | ||
337 | +type_init(rtc_register_types) | ||
338 | -- | 96 | -- |
339 | 2.16.2 | 97 | 2.20.1 |
340 | 98 | ||
341 | 99 | diff view generated by jsdifflib |
1 | From: Alistair Francis <alistair.francis@xilinx.com> | 1 | From: Gan Qixin <ganqixin@huawei.com> |
---|---|---|---|
2 | 2 | ||
3 | Signed-off-by: Alistair Francis <alistair.francis@xilinx.com> | 3 | The adc_qom_set function didn't free "response", which caused an indirect |
4 | memory leak. So use qobject_unref() to fix it. | ||
5 | |||
6 | ASAN shows memory leak stack: | ||
7 | |||
8 | Indirect leak of 593280 byte(s) in 144 object(s) allocated from: | ||
9 | #0 0x7f9a5e7e8d4e in __interceptor_calloc (/lib64/libasan.so.5+0x112d4e) | ||
10 | #1 0x7f9a5e607a50 in g_malloc0 (/lib64/libglib-2.0.so.0+0x55a50) | ||
11 | #2 0x55b1bebf636b in qdict_new ../qobject/qdict.c:30 | ||
12 | #3 0x55b1bec09699 in parse_object ../qobject/json-parser.c:318 | ||
13 | #4 0x55b1bec0b2df in parse_value ../qobject/json-parser.c:546 | ||
14 | #5 0x55b1bec0b6a9 in json_parser_parse ../qobject/json-parser.c:580 | ||
15 | #6 0x55b1bec060d1 in json_message_process_token ../qobject/json-streamer.c:92 | ||
16 | #7 0x55b1bec16a12 in json_lexer_feed_char ../qobject/json-lexer.c:313 | ||
17 | #8 0x55b1bec16fbd in json_lexer_feed ../qobject/json-lexer.c:350 | ||
18 | #9 0x55b1bec06453 in json_message_parser_feed ../qobject/json-streamer.c:121 | ||
19 | #10 0x55b1bebc2d51 in qmp_fd_receive ../tests/qtest/libqtest.c:614 | ||
20 | #11 0x55b1bebc2f5e in qtest_qmp_receive_dict ../tests/qtest/libqtest.c:636 | ||
21 | #12 0x55b1bebc2e6c in qtest_qmp_receive ../tests/qtest/libqtest.c:624 | ||
22 | #13 0x55b1bebc3340 in qtest_vqmp ../tests/qtest/libqtest.c:715 | ||
23 | #14 0x55b1bebc3942 in qtest_qmp ../tests/qtest/libqtest.c:756 | ||
24 | #15 0x55b1bebbd64a in adc_qom_set ../tests/qtest/npcm7xx_adc-test.c:127 | ||
25 | #16 0x55b1bebbd793 in adc_write_input ../tests/qtest/npcm7xx_adc-test.c:140 | ||
26 | #17 0x55b1bebbdf92 in test_convert_external ../tests/qtest/npcm7xx_adc-test.c:246 | ||
27 | |||
28 | Reported-by: Euler Robot <euler.robot@huawei.com> | ||
29 | Signed-off-by: Gan Qixin <ganqixin@huawei.com> | ||
30 | Reviewed-by: Hao Wu <wuhaotsh@google.com> | ||
31 | Message-id: 20210118065627.79903-1-ganqixin@huawei.com | ||
4 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 32 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
5 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 33 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | --- | 34 | --- |
8 | include/hw/arm/xlnx-zynqmp.h | 2 ++ | 35 | tests/qtest/npcm7xx_adc-test.c | 1 + |
9 | hw/arm/xlnx-zynqmp.c | 14 ++++++++++++++ | 36 | 1 file changed, 1 insertion(+) |
10 | 2 files changed, 16 insertions(+) | ||
11 | 37 | ||
12 | diff --git a/include/hw/arm/xlnx-zynqmp.h b/include/hw/arm/xlnx-zynqmp.h | 38 | diff --git a/tests/qtest/npcm7xx_adc-test.c b/tests/qtest/npcm7xx_adc-test.c |
13 | index XXXXXXX..XXXXXXX 100644 | 39 | index XXXXXXX..XXXXXXX 100644 |
14 | --- a/include/hw/arm/xlnx-zynqmp.h | 40 | --- a/tests/qtest/npcm7xx_adc-test.c |
15 | +++ b/include/hw/arm/xlnx-zynqmp.h | 41 | +++ b/tests/qtest/npcm7xx_adc-test.c |
16 | @@ -XXX,XX +XXX,XX @@ | 42 | @@ -XXX,XX +XXX,XX @@ static void adc_qom_set(QTestState *qts, const ADC *adc, |
17 | #include "hw/dma/xlnx_dpdma.h" | 43 | path, name, value); |
18 | #include "hw/display/xlnx_dp.h" | 44 | /* The qom set message returns successfully. */ |
19 | #include "hw/intc/xlnx-zynqmp-ipi.h" | 45 | g_assert_true(qdict_haskey(response, "return")); |
20 | +#include "hw/timer/xlnx-zynqmp-rtc.h" | 46 | + qobject_unref(response); |
21 | |||
22 | #define TYPE_XLNX_ZYNQMP "xlnx,zynqmp" | ||
23 | #define XLNX_ZYNQMP(obj) OBJECT_CHECK(XlnxZynqMPState, (obj), \ | ||
24 | @@ -XXX,XX +XXX,XX @@ typedef struct XlnxZynqMPState { | ||
25 | XlnxDPState dp; | ||
26 | XlnxDPDMAState dpdma; | ||
27 | XlnxZynqMPIPI ipi; | ||
28 | + XlnxZynqMPRTC rtc; | ||
29 | |||
30 | char *boot_cpu; | ||
31 | ARMCPU *boot_cpu_ptr; | ||
32 | diff --git a/hw/arm/xlnx-zynqmp.c b/hw/arm/xlnx-zynqmp.c | ||
33 | index XXXXXXX..XXXXXXX 100644 | ||
34 | --- a/hw/arm/xlnx-zynqmp.c | ||
35 | +++ b/hw/arm/xlnx-zynqmp.c | ||
36 | @@ -XXX,XX +XXX,XX @@ | ||
37 | #define IPI_ADDR 0xFF300000 | ||
38 | #define IPI_IRQ 64 | ||
39 | |||
40 | +#define RTC_ADDR 0xffa60000 | ||
41 | +#define RTC_IRQ 26 | ||
42 | + | ||
43 | #define SDHCI_CAPABILITIES 0x280737ec6481 /* Datasheet: UG1085 (v1.7) */ | ||
44 | |||
45 | static const uint64_t gem_addr[XLNX_ZYNQMP_NUM_GEMS] = { | ||
46 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_init(Object *obj) | ||
47 | |||
48 | object_initialize(&s->ipi, sizeof(s->ipi), TYPE_XLNX_ZYNQMP_IPI); | ||
49 | qdev_set_parent_bus(DEVICE(&s->ipi), sysbus_get_default()); | ||
50 | + | ||
51 | + object_initialize(&s->rtc, sizeof(s->rtc), TYPE_XLNX_ZYNQMP_RTC); | ||
52 | + qdev_set_parent_bus(DEVICE(&s->rtc), sysbus_get_default()); | ||
53 | } | 47 | } |
54 | 48 | ||
55 | static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) | 49 | static void adc_write_input(QTestState *qts, const ADC *adc, |
56 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) | ||
57 | } | ||
58 | sysbus_mmio_map(SYS_BUS_DEVICE(&s->ipi), 0, IPI_ADDR); | ||
59 | sysbus_connect_irq(SYS_BUS_DEVICE(&s->ipi), 0, gic_spi[IPI_IRQ]); | ||
60 | + | ||
61 | + object_property_set_bool(OBJECT(&s->rtc), true, "realized", &err); | ||
62 | + if (err) { | ||
63 | + error_propagate(errp, err); | ||
64 | + return; | ||
65 | + } | ||
66 | + sysbus_mmio_map(SYS_BUS_DEVICE(&s->rtc), 0, RTC_ADDR); | ||
67 | + sysbus_connect_irq(SYS_BUS_DEVICE(&s->rtc), 0, gic_spi[RTC_IRQ]); | ||
68 | } | ||
69 | |||
70 | static Property xlnx_zynqmp_props[] = { | ||
71 | -- | 50 | -- |
72 | 2.16.2 | 51 | 2.20.1 |
73 | 52 | ||
74 | 53 | diff view generated by jsdifflib |
1 | From: Alistair Francis <alistair.francis@xilinx.com> | 1 | From: Philippe Mathieu-Daudé <f4bug@amsat.org> |
---|---|---|---|
2 | 2 | ||
3 | Allow the guest to determine the time set from the QEMU command line. | 3 | When building with GCC 10.2 configured with --extra-cflags=-Os, we get: |
4 | 4 | ||
5 | This includes adding a trace event to debug the new time. | 5 | target/arm/m_helper.c: In function ‘arm_v7m_cpu_do_interrupt’: |
6 | target/arm/m_helper.c:1811:16: error: ‘restore_s16_s31’ may be used uninitialized in this function [-Werror=maybe-uninitialized] | ||
7 | 1811 | if (restore_s16_s31) { | ||
8 | | ^ | ||
9 | target/arm/m_helper.c:1350:10: note: ‘restore_s16_s31’ was declared here | ||
10 | 1350 | bool restore_s16_s31; | ||
11 | | ^~~~~~~~~~~~~~~ | ||
12 | cc1: all warnings being treated as errors | ||
6 | 13 | ||
7 | Signed-off-by: Alistair Francis <alistair.francis@xilinx.com> | 14 | Initialize the 'restore_s16_s31' variable to silence the warning. |
8 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 15 | |
16 | Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
17 | Message-id: 20210119062739.589049-1-f4bug@amsat.org | ||
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 18 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 19 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 20 | --- |
12 | include/hw/timer/xlnx-zynqmp-rtc.h | 2 ++ | 21 | target/arm/m_helper.c | 2 +- |
13 | hw/timer/xlnx-zynqmp-rtc.c | 58 ++++++++++++++++++++++++++++++++++++++ | 22 | 1 file changed, 1 insertion(+), 1 deletion(-) |
14 | hw/timer/trace-events | 3 ++ | ||
15 | 3 files changed, 63 insertions(+) | ||
16 | 23 | ||
17 | diff --git a/include/hw/timer/xlnx-zynqmp-rtc.h b/include/hw/timer/xlnx-zynqmp-rtc.h | 24 | diff --git a/target/arm/m_helper.c b/target/arm/m_helper.c |
18 | index XXXXXXX..XXXXXXX 100644 | 25 | index XXXXXXX..XXXXXXX 100644 |
19 | --- a/include/hw/timer/xlnx-zynqmp-rtc.h | 26 | --- a/target/arm/m_helper.c |
20 | +++ b/include/hw/timer/xlnx-zynqmp-rtc.h | 27 | +++ b/target/arm/m_helper.c |
21 | @@ -XXX,XX +XXX,XX @@ typedef struct XlnxZynqMPRTC { | 28 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) |
22 | qemu_irq irq_rtc_int; | 29 | bool exc_secure = false; |
23 | qemu_irq irq_addr_error_int; | 30 | bool return_to_secure; |
24 | 31 | bool ftype; | |
25 | + uint32_t tick_offset; | 32 | - bool restore_s16_s31; |
26 | + | 33 | + bool restore_s16_s31 = false; |
27 | uint32_t regs[XLNX_ZYNQMP_RTC_R_MAX]; | 34 | |
28 | RegisterInfo regs_info[XLNX_ZYNQMP_RTC_R_MAX]; | 35 | /* |
29 | } XlnxZynqMPRTC; | 36 | * If we're not in Handler mode then jumps to magic exception-exit |
30 | diff --git a/hw/timer/xlnx-zynqmp-rtc.c b/hw/timer/xlnx-zynqmp-rtc.c | ||
31 | index XXXXXXX..XXXXXXX 100644 | ||
32 | --- a/hw/timer/xlnx-zynqmp-rtc.c | ||
33 | +++ b/hw/timer/xlnx-zynqmp-rtc.c | ||
34 | @@ -XXX,XX +XXX,XX @@ | ||
35 | #include "hw/register.h" | ||
36 | #include "qemu/bitops.h" | ||
37 | #include "qemu/log.h" | ||
38 | +#include "hw/ptimer.h" | ||
39 | +#include "qemu/cutils.h" | ||
40 | +#include "sysemu/sysemu.h" | ||
41 | +#include "trace.h" | ||
42 | #include "hw/timer/xlnx-zynqmp-rtc.h" | ||
43 | |||
44 | #ifndef XLNX_ZYNQMP_RTC_ERR_DEBUG | ||
45 | @@ -XXX,XX +XXX,XX @@ static void addr_error_int_update_irq(XlnxZynqMPRTC *s) | ||
46 | qemu_set_irq(s->irq_addr_error_int, pending); | ||
47 | } | ||
48 | |||
49 | +static uint32_t rtc_get_count(XlnxZynqMPRTC *s) | ||
50 | +{ | ||
51 | + int64_t now = qemu_clock_get_ns(rtc_clock); | ||
52 | + return s->tick_offset + now / NANOSECONDS_PER_SECOND; | ||
53 | +} | ||
54 | + | ||
55 | +static uint64_t current_time_postr(RegisterInfo *reg, uint64_t val64) | ||
56 | +{ | ||
57 | + XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(reg->opaque); | ||
58 | + | ||
59 | + return rtc_get_count(s); | ||
60 | +} | ||
61 | + | ||
62 | static void rtc_int_status_postw(RegisterInfo *reg, uint64_t val64) | ||
63 | { | ||
64 | XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(reg->opaque); | ||
65 | @@ -XXX,XX +XXX,XX @@ static uint64_t addr_error_int_dis_prew(RegisterInfo *reg, uint64_t val64) | ||
66 | |||
67 | static const RegisterAccessInfo rtc_regs_info[] = { | ||
68 | { .name = "SET_TIME_WRITE", .addr = A_SET_TIME_WRITE, | ||
69 | + .unimp = MAKE_64BIT_MASK(0, 32), | ||
70 | },{ .name = "SET_TIME_READ", .addr = A_SET_TIME_READ, | ||
71 | .ro = 0xffffffff, | ||
72 | + .post_read = current_time_postr, | ||
73 | },{ .name = "CALIB_WRITE", .addr = A_CALIB_WRITE, | ||
74 | + .unimp = MAKE_64BIT_MASK(0, 32), | ||
75 | },{ .name = "CALIB_READ", .addr = A_CALIB_READ, | ||
76 | .ro = 0x1fffff, | ||
77 | },{ .name = "CURRENT_TIME", .addr = A_CURRENT_TIME, | ||
78 | .ro = 0xffffffff, | ||
79 | + .post_read = current_time_postr, | ||
80 | },{ .name = "CURRENT_TICK", .addr = A_CURRENT_TICK, | ||
81 | .ro = 0xffff, | ||
82 | },{ .name = "ALARM", .addr = A_ALARM, | ||
83 | @@ -XXX,XX +XXX,XX @@ static void rtc_init(Object *obj) | ||
84 | XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(obj); | ||
85 | SysBusDevice *sbd = SYS_BUS_DEVICE(obj); | ||
86 | RegisterInfoArray *reg_array; | ||
87 | + struct tm current_tm; | ||
88 | |||
89 | memory_region_init(&s->iomem, obj, TYPE_XLNX_ZYNQMP_RTC, | ||
90 | XLNX_ZYNQMP_RTC_R_MAX * 4); | ||
91 | @@ -XXX,XX +XXX,XX @@ static void rtc_init(Object *obj) | ||
92 | sysbus_init_mmio(sbd, &s->iomem); | ||
93 | sysbus_init_irq(sbd, &s->irq_rtc_int); | ||
94 | sysbus_init_irq(sbd, &s->irq_addr_error_int); | ||
95 | + | ||
96 | + qemu_get_timedate(¤t_tm, 0); | ||
97 | + s->tick_offset = mktimegm(¤t_tm) - | ||
98 | + qemu_clock_get_ns(rtc_clock) / NANOSECONDS_PER_SECOND; | ||
99 | + | ||
100 | + trace_xlnx_zynqmp_rtc_gettime(current_tm.tm_year, current_tm.tm_mon, | ||
101 | + current_tm.tm_mday, current_tm.tm_hour, | ||
102 | + current_tm.tm_min, current_tm.tm_sec); | ||
103 | +} | ||
104 | + | ||
105 | +static int rtc_pre_save(void *opaque) | ||
106 | +{ | ||
107 | + XlnxZynqMPRTC *s = opaque; | ||
108 | + int64_t now = qemu_clock_get_ns(rtc_clock) / NANOSECONDS_PER_SECOND; | ||
109 | + | ||
110 | + /* Add the time at migration */ | ||
111 | + s->tick_offset = s->tick_offset + now; | ||
112 | + | ||
113 | + return 0; | ||
114 | +} | ||
115 | + | ||
116 | +static int rtc_post_load(void *opaque, int version_id) | ||
117 | +{ | ||
118 | + XlnxZynqMPRTC *s = opaque; | ||
119 | + int64_t now = qemu_clock_get_ns(rtc_clock) / NANOSECONDS_PER_SECOND; | ||
120 | + | ||
121 | + /* Subtract the time after migration. This combined with the pre_save | ||
122 | + * action results in us having subtracted the time that the guest was | ||
123 | + * stopped to the offset. | ||
124 | + */ | ||
125 | + s->tick_offset = s->tick_offset - now; | ||
126 | + | ||
127 | + return 0; | ||
128 | } | ||
129 | |||
130 | static const VMStateDescription vmstate_rtc = { | ||
131 | .name = TYPE_XLNX_ZYNQMP_RTC, | ||
132 | .version_id = 1, | ||
133 | .minimum_version_id = 1, | ||
134 | + .pre_save = rtc_pre_save, | ||
135 | + .post_load = rtc_post_load, | ||
136 | .fields = (VMStateField[]) { | ||
137 | VMSTATE_UINT32_ARRAY(regs, XlnxZynqMPRTC, XLNX_ZYNQMP_RTC_R_MAX), | ||
138 | + VMSTATE_UINT32(tick_offset, XlnxZynqMPRTC), | ||
139 | VMSTATE_END_OF_LIST(), | ||
140 | } | ||
141 | }; | ||
142 | diff --git a/hw/timer/trace-events b/hw/timer/trace-events | ||
143 | index XXXXXXX..XXXXXXX 100644 | ||
144 | --- a/hw/timer/trace-events | ||
145 | +++ b/hw/timer/trace-events | ||
146 | @@ -XXX,XX +XXX,XX @@ systick_write(uint64_t addr, uint32_t value, unsigned size) "systick write addr | ||
147 | cmsdk_apb_timer_read(uint64_t offset, uint64_t data, unsigned size) "CMSDK APB timer read: offset 0x%" PRIx64 " data 0x%" PRIx64 " size %u" | ||
148 | cmsdk_apb_timer_write(uint64_t offset, uint64_t data, unsigned size) "CMSDK APB timer write: offset 0x%" PRIx64 " data 0x%" PRIx64 " size %u" | ||
149 | cmsdk_apb_timer_reset(void) "CMSDK APB timer: reset" | ||
150 | + | ||
151 | +# hw/timer/xlnx-zynqmp-rtc.c | ||
152 | +xlnx_zynqmp_rtc_gettime(int year, int month, int day, int hour, int min, int sec) "Get time from host: %d-%d-%d %2d:%02d:%02d" | ||
153 | -- | 37 | -- |
154 | 2.16.2 | 38 | 2.20.1 |
155 | 39 | ||
156 | 40 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Add a function load_ramdisk_as() which behaves like the existing | ||
2 | load_ramdisk() but allows the caller to specify the AddressSpace | ||
3 | to use. This matches the pattern we have already for various | ||
4 | other loader functions. | ||
5 | 1 | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Message-id: 20180220180325.29818-2-peter.maydell@linaro.org | ||
10 | --- | ||
11 | include/hw/loader.h | 12 +++++++++++- | ||
12 | hw/core/loader.c | 8 +++++++- | ||
13 | 2 files changed, 18 insertions(+), 2 deletions(-) | ||
14 | |||
15 | diff --git a/include/hw/loader.h b/include/hw/loader.h | ||
16 | index XXXXXXX..XXXXXXX 100644 | ||
17 | --- a/include/hw/loader.h | ||
18 | +++ b/include/hw/loader.h | ||
19 | @@ -XXX,XX +XXX,XX @@ int load_uimage(const char *filename, hwaddr *ep, | ||
20 | void *translate_opaque); | ||
21 | |||
22 | /** | ||
23 | - * load_ramdisk: | ||
24 | + * load_ramdisk_as: | ||
25 | * @filename: Path to the ramdisk image | ||
26 | * @addr: Memory address to load the ramdisk to | ||
27 | * @max_sz: Maximum allowed ramdisk size (for non-u-boot ramdisks) | ||
28 | + * @as: The AddressSpace to load the ELF to. The value of address_space_memory | ||
29 | + * is used if nothing is supplied here. | ||
30 | * | ||
31 | * Load a ramdisk image with U-Boot header to the specified memory | ||
32 | * address. | ||
33 | * | ||
34 | * Returns the size of the loaded image on success, -1 otherwise. | ||
35 | */ | ||
36 | +int load_ramdisk_as(const char *filename, hwaddr addr, uint64_t max_sz, | ||
37 | + AddressSpace *as); | ||
38 | + | ||
39 | +/** | ||
40 | + * load_ramdisk: | ||
41 | + * Same as load_ramdisk_as(), but doesn't allow the caller to specify | ||
42 | + * an AddressSpace. | ||
43 | + */ | ||
44 | int load_ramdisk(const char *filename, hwaddr addr, uint64_t max_sz); | ||
45 | |||
46 | ssize_t gunzip(void *dst, size_t dstlen, uint8_t *src, size_t srclen); | ||
47 | diff --git a/hw/core/loader.c b/hw/core/loader.c | ||
48 | index XXXXXXX..XXXXXXX 100644 | ||
49 | --- a/hw/core/loader.c | ||
50 | +++ b/hw/core/loader.c | ||
51 | @@ -XXX,XX +XXX,XX @@ int load_uimage_as(const char *filename, hwaddr *ep, hwaddr *loadaddr, | ||
52 | |||
53 | /* Load a ramdisk. */ | ||
54 | int load_ramdisk(const char *filename, hwaddr addr, uint64_t max_sz) | ||
55 | +{ | ||
56 | + return load_ramdisk_as(filename, addr, max_sz, NULL); | ||
57 | +} | ||
58 | + | ||
59 | +int load_ramdisk_as(const char *filename, hwaddr addr, uint64_t max_sz, | ||
60 | + AddressSpace *as) | ||
61 | { | ||
62 | return load_uboot_image(filename, NULL, &addr, NULL, IH_TYPE_RAMDISK, | ||
63 | - NULL, NULL, NULL); | ||
64 | + NULL, NULL, as); | ||
65 | } | ||
66 | |||
67 | /* Load a gzip-compressed kernel to a dynamically allocated buffer. */ | ||
68 | -- | ||
69 | 2.16.2 | ||
70 | |||
71 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Instead of loading guest images to the system address space, use the | ||
2 | CPU's address space. This is important if we're trying to load the | ||
3 | file to memory or via an alias memory region that is provided by an | ||
4 | SoC object and thus not mapped into the system address space. | ||
5 | 1 | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Message-id: 20180220180325.29818-4-peter.maydell@linaro.org | ||
10 | --- | ||
11 | hw/arm/armv7m.c | 17 ++++++++++++++--- | ||
12 | 1 file changed, 14 insertions(+), 3 deletions(-) | ||
13 | |||
14 | diff --git a/hw/arm/armv7m.c b/hw/arm/armv7m.c | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/hw/arm/armv7m.c | ||
17 | +++ b/hw/arm/armv7m.c | ||
18 | @@ -XXX,XX +XXX,XX @@ void armv7m_load_kernel(ARMCPU *cpu, const char *kernel_filename, int mem_size) | ||
19 | uint64_t entry; | ||
20 | uint64_t lowaddr; | ||
21 | int big_endian; | ||
22 | + AddressSpace *as; | ||
23 | + int asidx; | ||
24 | + CPUState *cs = CPU(cpu); | ||
25 | |||
26 | #ifdef TARGET_WORDS_BIGENDIAN | ||
27 | big_endian = 1; | ||
28 | @@ -XXX,XX +XXX,XX @@ void armv7m_load_kernel(ARMCPU *cpu, const char *kernel_filename, int mem_size) | ||
29 | exit(1); | ||
30 | } | ||
31 | |||
32 | + if (arm_feature(&cpu->env, ARM_FEATURE_EL3)) { | ||
33 | + asidx = ARMASIdx_S; | ||
34 | + } else { | ||
35 | + asidx = ARMASIdx_NS; | ||
36 | + } | ||
37 | + as = cpu_get_address_space(cs, asidx); | ||
38 | + | ||
39 | if (kernel_filename) { | ||
40 | - image_size = load_elf(kernel_filename, NULL, NULL, &entry, &lowaddr, | ||
41 | - NULL, big_endian, EM_ARM, 1, 0); | ||
42 | + image_size = load_elf_as(kernel_filename, NULL, NULL, &entry, &lowaddr, | ||
43 | + NULL, big_endian, EM_ARM, 1, 0, as); | ||
44 | if (image_size < 0) { | ||
45 | - image_size = load_image_targphys(kernel_filename, 0, mem_size); | ||
46 | + image_size = load_image_targphys_as(kernel_filename, 0, | ||
47 | + mem_size, as); | ||
48 | lowaddr = 0; | ||
49 | } | ||
50 | if (image_size < 0) { | ||
51 | -- | ||
52 | 2.16.2 | ||
53 | |||
54 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Create an "idau" property on the armv7m container object which | ||
2 | we can forward to the CPU object. Annoyingly, we can't use | ||
3 | object_property_add_alias() because the CPU object we want to | ||
4 | forward to doesn't exist until the armv7m container is realized. | ||
5 | 1 | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20180220180325.29818-6-peter.maydell@linaro.org | ||
9 | --- | ||
10 | include/hw/arm/armv7m.h | 3 +++ | ||
11 | hw/arm/armv7m.c | 9 +++++++++ | ||
12 | 2 files changed, 12 insertions(+) | ||
13 | |||
14 | diff --git a/include/hw/arm/armv7m.h b/include/hw/arm/armv7m.h | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/include/hw/arm/armv7m.h | ||
17 | +++ b/include/hw/arm/armv7m.h | ||
18 | @@ -XXX,XX +XXX,XX @@ | ||
19 | |||
20 | #include "hw/sysbus.h" | ||
21 | #include "hw/intc/armv7m_nvic.h" | ||
22 | +#include "target/arm/idau.h" | ||
23 | |||
24 | #define TYPE_BITBAND "ARM,bitband-memory" | ||
25 | #define BITBAND(obj) OBJECT_CHECK(BitBandState, (obj), TYPE_BITBAND) | ||
26 | @@ -XXX,XX +XXX,XX @@ typedef struct { | ||
27 | * + Property "memory": MemoryRegion defining the physical address space | ||
28 | * that CPU accesses see. (The NVIC, bitbanding and other CPU-internal | ||
29 | * devices will be automatically layered on top of this view.) | ||
30 | + * + Property "idau": IDAU interface (forwarded to CPU object) | ||
31 | */ | ||
32 | typedef struct ARMv7MState { | ||
33 | /*< private >*/ | ||
34 | @@ -XXX,XX +XXX,XX @@ typedef struct ARMv7MState { | ||
35 | char *cpu_type; | ||
36 | /* MemoryRegion the board provides to us (with its devices, RAM, etc) */ | ||
37 | MemoryRegion *board_memory; | ||
38 | + Object *idau; | ||
39 | } ARMv7MState; | ||
40 | |||
41 | #endif | ||
42 | diff --git a/hw/arm/armv7m.c b/hw/arm/armv7m.c | ||
43 | index XXXXXXX..XXXXXXX 100644 | ||
44 | --- a/hw/arm/armv7m.c | ||
45 | +++ b/hw/arm/armv7m.c | ||
46 | @@ -XXX,XX +XXX,XX @@ | ||
47 | #include "sysemu/qtest.h" | ||
48 | #include "qemu/error-report.h" | ||
49 | #include "exec/address-spaces.h" | ||
50 | +#include "target/arm/idau.h" | ||
51 | |||
52 | /* Bitbanded IO. Each word corresponds to a single bit. */ | ||
53 | |||
54 | @@ -XXX,XX +XXX,XX @@ static void armv7m_realize(DeviceState *dev, Error **errp) | ||
55 | |||
56 | object_property_set_link(OBJECT(s->cpu), OBJECT(&s->container), "memory", | ||
57 | &error_abort); | ||
58 | + if (object_property_find(OBJECT(s->cpu), "idau", NULL)) { | ||
59 | + object_property_set_link(OBJECT(s->cpu), s->idau, "idau", &err); | ||
60 | + if (err != NULL) { | ||
61 | + error_propagate(errp, err); | ||
62 | + return; | ||
63 | + } | ||
64 | + } | ||
65 | object_property_set_bool(OBJECT(s->cpu), true, "realized", &err); | ||
66 | if (err != NULL) { | ||
67 | error_propagate(errp, err); | ||
68 | @@ -XXX,XX +XXX,XX @@ static Property armv7m_properties[] = { | ||
69 | DEFINE_PROP_STRING("cpu-type", ARMv7MState, cpu_type), | ||
70 | DEFINE_PROP_LINK("memory", ARMv7MState, board_memory, TYPE_MEMORY_REGION, | ||
71 | MemoryRegion *), | ||
72 | + DEFINE_PROP_LINK("idau", ARMv7MState, idau, TYPE_IDAU_INTERFACE, Object *), | ||
73 | DEFINE_PROP_END_OF_LIST(), | ||
74 | }; | ||
75 | |||
76 | -- | ||
77 | 2.16.2 | ||
78 | |||
79 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Move the definition of the struct for the unimplemented-device | ||
2 | from unimp.c to unimp.h, so that users can embed the struct | ||
3 | in their own device structs if they prefer. | ||
4 | 1 | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
6 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20180220180325.29818-10-peter.maydell@linaro.org | ||
9 | --- | ||
10 | include/hw/misc/unimp.h | 10 ++++++++++ | ||
11 | hw/misc/unimp.c | 10 ---------- | ||
12 | 2 files changed, 10 insertions(+), 10 deletions(-) | ||
13 | |||
14 | diff --git a/include/hw/misc/unimp.h b/include/hw/misc/unimp.h | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/include/hw/misc/unimp.h | ||
17 | +++ b/include/hw/misc/unimp.h | ||
18 | @@ -XXX,XX +XXX,XX @@ | ||
19 | |||
20 | #define TYPE_UNIMPLEMENTED_DEVICE "unimplemented-device" | ||
21 | |||
22 | +#define UNIMPLEMENTED_DEVICE(obj) \ | ||
23 | + OBJECT_CHECK(UnimplementedDeviceState, (obj), TYPE_UNIMPLEMENTED_DEVICE) | ||
24 | + | ||
25 | +typedef struct { | ||
26 | + SysBusDevice parent_obj; | ||
27 | + MemoryRegion iomem; | ||
28 | + char *name; | ||
29 | + uint64_t size; | ||
30 | +} UnimplementedDeviceState; | ||
31 | + | ||
32 | /** | ||
33 | * create_unimplemented_device: create and map a dummy device | ||
34 | * @name: name of the device for debug logging | ||
35 | diff --git a/hw/misc/unimp.c b/hw/misc/unimp.c | ||
36 | index XXXXXXX..XXXXXXX 100644 | ||
37 | --- a/hw/misc/unimp.c | ||
38 | +++ b/hw/misc/unimp.c | ||
39 | @@ -XXX,XX +XXX,XX @@ | ||
40 | #include "qemu/log.h" | ||
41 | #include "qapi/error.h" | ||
42 | |||
43 | -#define UNIMPLEMENTED_DEVICE(obj) \ | ||
44 | - OBJECT_CHECK(UnimplementedDeviceState, (obj), TYPE_UNIMPLEMENTED_DEVICE) | ||
45 | - | ||
46 | -typedef struct { | ||
47 | - SysBusDevice parent_obj; | ||
48 | - MemoryRegion iomem; | ||
49 | - char *name; | ||
50 | - uint64_t size; | ||
51 | -} UnimplementedDeviceState; | ||
52 | - | ||
53 | static uint64_t unimp_read(void *opaque, hwaddr offset, unsigned size) | ||
54 | { | ||
55 | UnimplementedDeviceState *s = UNIMPLEMENTED_DEVICE(opaque); | ||
56 | -- | ||
57 | 2.16.2 | ||
58 | |||
59 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | The or-irq.h header file is missing the customary guard against | ||
2 | multiple inclusion, which means compilation fails if it gets | ||
3 | included twice. Fix the omission. | ||
4 | 1 | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
6 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20180220180325.29818-11-peter.maydell@linaro.org | ||
9 | --- | ||
10 | include/hw/or-irq.h | 5 +++++ | ||
11 | 1 file changed, 5 insertions(+) | ||
12 | |||
13 | diff --git a/include/hw/or-irq.h b/include/hw/or-irq.h | ||
14 | index XXXXXXX..XXXXXXX 100644 | ||
15 | --- a/include/hw/or-irq.h | ||
16 | +++ b/include/hw/or-irq.h | ||
17 | @@ -XXX,XX +XXX,XX @@ | ||
18 | * THE SOFTWARE. | ||
19 | */ | ||
20 | |||
21 | +#ifndef HW_OR_IRQ_H | ||
22 | +#define HW_OR_IRQ_H | ||
23 | + | ||
24 | #include "hw/irq.h" | ||
25 | #include "hw/sysbus.h" | ||
26 | #include "qom/object.h" | ||
27 | @@ -XXX,XX +XXX,XX @@ struct OrIRQState { | ||
28 | bool levels[MAX_OR_LINES]; | ||
29 | uint16_t num_lines; | ||
30 | }; | ||
31 | + | ||
32 | +#endif | ||
33 | -- | ||
34 | 2.16.2 | ||
35 | |||
36 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | The Arm IoT Kit includes a "security controller" which is largely a | ||
2 | collection of registers for controlling the PPCs and other bits of | ||
3 | glue in the system. This commit provides the initial skeleton of the | ||
4 | device, implementing just the ID registers, and a couple of read-only | ||
5 | read-as-zero registers. | ||
6 | 1 | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Message-id: 20180220180325.29818-16-peter.maydell@linaro.org | ||
10 | --- | ||
11 | hw/misc/Makefile.objs | 1 + | ||
12 | include/hw/misc/iotkit-secctl.h | 39 ++++ | ||
13 | hw/misc/iotkit-secctl.c | 448 ++++++++++++++++++++++++++++++++++++++++ | ||
14 | default-configs/arm-softmmu.mak | 1 + | ||
15 | hw/misc/trace-events | 7 + | ||
16 | 5 files changed, 496 insertions(+) | ||
17 | create mode 100644 include/hw/misc/iotkit-secctl.h | ||
18 | create mode 100644 hw/misc/iotkit-secctl.c | ||
19 | |||
20 | diff --git a/hw/misc/Makefile.objs b/hw/misc/Makefile.objs | ||
21 | index XXXXXXX..XXXXXXX 100644 | ||
22 | --- a/hw/misc/Makefile.objs | ||
23 | +++ b/hw/misc/Makefile.objs | ||
24 | @@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_MPS2_FPGAIO) += mps2-fpgaio.o | ||
25 | obj-$(CONFIG_MPS2_SCC) += mps2-scc.o | ||
26 | |||
27 | obj-$(CONFIG_TZ_PPC) += tz-ppc.o | ||
28 | +obj-$(CONFIG_IOTKIT_SECCTL) += iotkit-secctl.o | ||
29 | |||
30 | obj-$(CONFIG_PVPANIC) += pvpanic.o | ||
31 | obj-$(CONFIG_HYPERV_TESTDEV) += hyperv_testdev.o | ||
32 | diff --git a/include/hw/misc/iotkit-secctl.h b/include/hw/misc/iotkit-secctl.h | ||
33 | new file mode 100644 | ||
34 | index XXXXXXX..XXXXXXX | ||
35 | --- /dev/null | ||
36 | +++ b/include/hw/misc/iotkit-secctl.h | ||
37 | @@ -XXX,XX +XXX,XX @@ | ||
38 | +/* | ||
39 | + * ARM IoT Kit security controller | ||
40 | + * | ||
41 | + * Copyright (c) 2018 Linaro Limited | ||
42 | + * Written by Peter Maydell | ||
43 | + * | ||
44 | + * This program is free software; you can redistribute it and/or modify | ||
45 | + * it under the terms of the GNU General Public License version 2 or | ||
46 | + * (at your option) any later version. | ||
47 | + */ | ||
48 | + | ||
49 | +/* This is a model of the security controller which is part of the | ||
50 | + * Arm IoT Kit and documented in | ||
51 | + * http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ecm0601256/index.html | ||
52 | + * | ||
53 | + * QEMU interface: | ||
54 | + * + sysbus MMIO region 0 is the "secure privilege control block" registers | ||
55 | + * + sysbus MMIO region 1 is the "non-secure privilege control block" registers | ||
56 | + */ | ||
57 | + | ||
58 | +#ifndef IOTKIT_SECCTL_H | ||
59 | +#define IOTKIT_SECCTL_H | ||
60 | + | ||
61 | +#include "hw/sysbus.h" | ||
62 | + | ||
63 | +#define TYPE_IOTKIT_SECCTL "iotkit-secctl" | ||
64 | +#define IOTKIT_SECCTL(obj) OBJECT_CHECK(IoTKitSecCtl, (obj), TYPE_IOTKIT_SECCTL) | ||
65 | + | ||
66 | +typedef struct IoTKitSecCtl { | ||
67 | + /*< private >*/ | ||
68 | + SysBusDevice parent_obj; | ||
69 | + | ||
70 | + /*< public >*/ | ||
71 | + | ||
72 | + MemoryRegion s_regs; | ||
73 | + MemoryRegion ns_regs; | ||
74 | +} IoTKitSecCtl; | ||
75 | + | ||
76 | +#endif | ||
77 | diff --git a/hw/misc/iotkit-secctl.c b/hw/misc/iotkit-secctl.c | ||
78 | new file mode 100644 | ||
79 | index XXXXXXX..XXXXXXX | ||
80 | --- /dev/null | ||
81 | +++ b/hw/misc/iotkit-secctl.c | ||
82 | @@ -XXX,XX +XXX,XX @@ | ||
83 | +/* | ||
84 | + * Arm IoT Kit security controller | ||
85 | + * | ||
86 | + * Copyright (c) 2018 Linaro Limited | ||
87 | + * Written by Peter Maydell | ||
88 | + * | ||
89 | + * This program is free software; you can redistribute it and/or modify | ||
90 | + * it under the terms of the GNU General Public License version 2 or | ||
91 | + * (at your option) any later version. | ||
92 | + */ | ||
93 | + | ||
94 | +#include "qemu/osdep.h" | ||
95 | +#include "qemu/log.h" | ||
96 | +#include "qapi/error.h" | ||
97 | +#include "trace.h" | ||
98 | +#include "hw/sysbus.h" | ||
99 | +#include "hw/registerfields.h" | ||
100 | +#include "hw/misc/iotkit-secctl.h" | ||
101 | + | ||
102 | +/* Registers in the secure privilege control block */ | ||
103 | +REG32(SECRESPCFG, 0x10) | ||
104 | +REG32(NSCCFG, 0x14) | ||
105 | +REG32(SECMPCINTSTATUS, 0x1c) | ||
106 | +REG32(SECPPCINTSTAT, 0x20) | ||
107 | +REG32(SECPPCINTCLR, 0x24) | ||
108 | +REG32(SECPPCINTEN, 0x28) | ||
109 | +REG32(SECMSCINTSTAT, 0x30) | ||
110 | +REG32(SECMSCINTCLR, 0x34) | ||
111 | +REG32(SECMSCINTEN, 0x38) | ||
112 | +REG32(BRGINTSTAT, 0x40) | ||
113 | +REG32(BRGINTCLR, 0x44) | ||
114 | +REG32(BRGINTEN, 0x48) | ||
115 | +REG32(AHBNSPPC0, 0x50) | ||
116 | +REG32(AHBNSPPCEXP0, 0x60) | ||
117 | +REG32(AHBNSPPCEXP1, 0x64) | ||
118 | +REG32(AHBNSPPCEXP2, 0x68) | ||
119 | +REG32(AHBNSPPCEXP3, 0x6c) | ||
120 | +REG32(APBNSPPC0, 0x70) | ||
121 | +REG32(APBNSPPC1, 0x74) | ||
122 | +REG32(APBNSPPCEXP0, 0x80) | ||
123 | +REG32(APBNSPPCEXP1, 0x84) | ||
124 | +REG32(APBNSPPCEXP2, 0x88) | ||
125 | +REG32(APBNSPPCEXP3, 0x8c) | ||
126 | +REG32(AHBSPPPC0, 0x90) | ||
127 | +REG32(AHBSPPPCEXP0, 0xa0) | ||
128 | +REG32(AHBSPPPCEXP1, 0xa4) | ||
129 | +REG32(AHBSPPPCEXP2, 0xa8) | ||
130 | +REG32(AHBSPPPCEXP3, 0xac) | ||
131 | +REG32(APBSPPPC0, 0xb0) | ||
132 | +REG32(APBSPPPC1, 0xb4) | ||
133 | +REG32(APBSPPPCEXP0, 0xc0) | ||
134 | +REG32(APBSPPPCEXP1, 0xc4) | ||
135 | +REG32(APBSPPPCEXP2, 0xc8) | ||
136 | +REG32(APBSPPPCEXP3, 0xcc) | ||
137 | +REG32(NSMSCEXP, 0xd0) | ||
138 | +REG32(PID4, 0xfd0) | ||
139 | +REG32(PID5, 0xfd4) | ||
140 | +REG32(PID6, 0xfd8) | ||
141 | +REG32(PID7, 0xfdc) | ||
142 | +REG32(PID0, 0xfe0) | ||
143 | +REG32(PID1, 0xfe4) | ||
144 | +REG32(PID2, 0xfe8) | ||
145 | +REG32(PID3, 0xfec) | ||
146 | +REG32(CID0, 0xff0) | ||
147 | +REG32(CID1, 0xff4) | ||
148 | +REG32(CID2, 0xff8) | ||
149 | +REG32(CID3, 0xffc) | ||
150 | + | ||
151 | +/* Registers in the non-secure privilege control block */ | ||
152 | +REG32(AHBNSPPPC0, 0x90) | ||
153 | +REG32(AHBNSPPPCEXP0, 0xa0) | ||
154 | +REG32(AHBNSPPPCEXP1, 0xa4) | ||
155 | +REG32(AHBNSPPPCEXP2, 0xa8) | ||
156 | +REG32(AHBNSPPPCEXP3, 0xac) | ||
157 | +REG32(APBNSPPPC0, 0xb0) | ||
158 | +REG32(APBNSPPPC1, 0xb4) | ||
159 | +REG32(APBNSPPPCEXP0, 0xc0) | ||
160 | +REG32(APBNSPPPCEXP1, 0xc4) | ||
161 | +REG32(APBNSPPPCEXP2, 0xc8) | ||
162 | +REG32(APBNSPPPCEXP3, 0xcc) | ||
163 | +/* PID and CID registers are also present in the NS block */ | ||
164 | + | ||
165 | +static const uint8_t iotkit_secctl_s_idregs[] = { | ||
166 | + 0x04, 0x00, 0x00, 0x00, | ||
167 | + 0x52, 0xb8, 0x0b, 0x00, | ||
168 | + 0x0d, 0xf0, 0x05, 0xb1, | ||
169 | +}; | ||
170 | + | ||
171 | +static const uint8_t iotkit_secctl_ns_idregs[] = { | ||
172 | + 0x04, 0x00, 0x00, 0x00, | ||
173 | + 0x53, 0xb8, 0x0b, 0x00, | ||
174 | + 0x0d, 0xf0, 0x05, 0xb1, | ||
175 | +}; | ||
176 | + | ||
177 | +static MemTxResult iotkit_secctl_s_read(void *opaque, hwaddr addr, | ||
178 | + uint64_t *pdata, | ||
179 | + unsigned size, MemTxAttrs attrs) | ||
180 | +{ | ||
181 | + uint64_t r; | ||
182 | + uint32_t offset = addr & ~0x3; | ||
183 | + | ||
184 | + switch (offset) { | ||
185 | + case A_AHBNSPPC0: | ||
186 | + case A_AHBSPPPC0: | ||
187 | + r = 0; | ||
188 | + break; | ||
189 | + case A_SECRESPCFG: | ||
190 | + case A_NSCCFG: | ||
191 | + case A_SECMPCINTSTATUS: | ||
192 | + case A_SECPPCINTSTAT: | ||
193 | + case A_SECPPCINTEN: | ||
194 | + case A_SECMSCINTSTAT: | ||
195 | + case A_SECMSCINTEN: | ||
196 | + case A_BRGINTSTAT: | ||
197 | + case A_BRGINTEN: | ||
198 | + case A_AHBNSPPCEXP0: | ||
199 | + case A_AHBNSPPCEXP1: | ||
200 | + case A_AHBNSPPCEXP2: | ||
201 | + case A_AHBNSPPCEXP3: | ||
202 | + case A_APBNSPPC0: | ||
203 | + case A_APBNSPPC1: | ||
204 | + case A_APBNSPPCEXP0: | ||
205 | + case A_APBNSPPCEXP1: | ||
206 | + case A_APBNSPPCEXP2: | ||
207 | + case A_APBNSPPCEXP3: | ||
208 | + case A_AHBSPPPCEXP0: | ||
209 | + case A_AHBSPPPCEXP1: | ||
210 | + case A_AHBSPPPCEXP2: | ||
211 | + case A_AHBSPPPCEXP3: | ||
212 | + case A_APBSPPPC0: | ||
213 | + case A_APBSPPPC1: | ||
214 | + case A_APBSPPPCEXP0: | ||
215 | + case A_APBSPPPCEXP1: | ||
216 | + case A_APBSPPPCEXP2: | ||
217 | + case A_APBSPPPCEXP3: | ||
218 | + case A_NSMSCEXP: | ||
219 | + qemu_log_mask(LOG_UNIMP, | ||
220 | + "IoTKit SecCtl S block read: " | ||
221 | + "unimplemented offset 0x%x\n", offset); | ||
222 | + r = 0; | ||
223 | + break; | ||
224 | + case A_PID4: | ||
225 | + case A_PID5: | ||
226 | + case A_PID6: | ||
227 | + case A_PID7: | ||
228 | + case A_PID0: | ||
229 | + case A_PID1: | ||
230 | + case A_PID2: | ||
231 | + case A_PID3: | ||
232 | + case A_CID0: | ||
233 | + case A_CID1: | ||
234 | + case A_CID2: | ||
235 | + case A_CID3: | ||
236 | + r = iotkit_secctl_s_idregs[(offset - A_PID4) / 4]; | ||
237 | + break; | ||
238 | + case A_SECPPCINTCLR: | ||
239 | + case A_SECMSCINTCLR: | ||
240 | + case A_BRGINTCLR: | ||
241 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
242 | + "IotKit SecCtl S block read: write-only offset 0x%x\n", | ||
243 | + offset); | ||
244 | + r = 0; | ||
245 | + break; | ||
246 | + default: | ||
247 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
248 | + "IotKit SecCtl S block read: bad offset 0x%x\n", offset); | ||
249 | + r = 0; | ||
250 | + break; | ||
251 | + } | ||
252 | + | ||
253 | + if (size != 4) { | ||
254 | + /* None of our registers are access-sensitive, so just pull the right | ||
255 | + * byte out of the word read result. | ||
256 | + */ | ||
257 | + r = extract32(r, (addr & 3) * 8, size * 8); | ||
258 | + } | ||
259 | + | ||
260 | + trace_iotkit_secctl_s_read(offset, r, size); | ||
261 | + *pdata = r; | ||
262 | + return MEMTX_OK; | ||
263 | +} | ||
264 | + | ||
265 | +static MemTxResult iotkit_secctl_s_write(void *opaque, hwaddr addr, | ||
266 | + uint64_t value, | ||
267 | + unsigned size, MemTxAttrs attrs) | ||
268 | +{ | ||
269 | + uint32_t offset = addr; | ||
270 | + | ||
271 | + trace_iotkit_secctl_s_write(offset, value, size); | ||
272 | + | ||
273 | + if (size != 4) { | ||
274 | + /* Byte and halfword writes are ignored */ | ||
275 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
276 | + "IotKit SecCtl S block write: bad size, ignored\n"); | ||
277 | + return MEMTX_OK; | ||
278 | + } | ||
279 | + | ||
280 | + switch (offset) { | ||
281 | + case A_SECRESPCFG: | ||
282 | + case A_NSCCFG: | ||
283 | + case A_SECPPCINTCLR: | ||
284 | + case A_SECPPCINTEN: | ||
285 | + case A_SECMSCINTCLR: | ||
286 | + case A_SECMSCINTEN: | ||
287 | + case A_BRGINTCLR: | ||
288 | + case A_BRGINTEN: | ||
289 | + case A_AHBNSPPCEXP0: | ||
290 | + case A_AHBNSPPCEXP1: | ||
291 | + case A_AHBNSPPCEXP2: | ||
292 | + case A_AHBNSPPCEXP3: | ||
293 | + case A_APBNSPPC0: | ||
294 | + case A_APBNSPPC1: | ||
295 | + case A_APBNSPPCEXP0: | ||
296 | + case A_APBNSPPCEXP1: | ||
297 | + case A_APBNSPPCEXP2: | ||
298 | + case A_APBNSPPCEXP3: | ||
299 | + case A_AHBSPPPCEXP0: | ||
300 | + case A_AHBSPPPCEXP1: | ||
301 | + case A_AHBSPPPCEXP2: | ||
302 | + case A_AHBSPPPCEXP3: | ||
303 | + case A_APBSPPPC0: | ||
304 | + case A_APBSPPPC1: | ||
305 | + case A_APBSPPPCEXP0: | ||
306 | + case A_APBSPPPCEXP1: | ||
307 | + case A_APBSPPPCEXP2: | ||
308 | + case A_APBSPPPCEXP3: | ||
309 | + qemu_log_mask(LOG_UNIMP, | ||
310 | + "IoTKit SecCtl S block write: " | ||
311 | + "unimplemented offset 0x%x\n", offset); | ||
312 | + break; | ||
313 | + case A_SECMPCINTSTATUS: | ||
314 | + case A_SECPPCINTSTAT: | ||
315 | + case A_SECMSCINTSTAT: | ||
316 | + case A_BRGINTSTAT: | ||
317 | + case A_AHBNSPPC0: | ||
318 | + case A_AHBSPPPC0: | ||
319 | + case A_NSMSCEXP: | ||
320 | + case A_PID4: | ||
321 | + case A_PID5: | ||
322 | + case A_PID6: | ||
323 | + case A_PID7: | ||
324 | + case A_PID0: | ||
325 | + case A_PID1: | ||
326 | + case A_PID2: | ||
327 | + case A_PID3: | ||
328 | + case A_CID0: | ||
329 | + case A_CID1: | ||
330 | + case A_CID2: | ||
331 | + case A_CID3: | ||
332 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
333 | + "IoTKit SecCtl S block write: " | ||
334 | + "read-only offset 0x%x\n", offset); | ||
335 | + break; | ||
336 | + default: | ||
337 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
338 | + "IotKit SecCtl S block write: bad offset 0x%x\n", | ||
339 | + offset); | ||
340 | + break; | ||
341 | + } | ||
342 | + | ||
343 | + return MEMTX_OK; | ||
344 | +} | ||
345 | + | ||
346 | +static MemTxResult iotkit_secctl_ns_read(void *opaque, hwaddr addr, | ||
347 | + uint64_t *pdata, | ||
348 | + unsigned size, MemTxAttrs attrs) | ||
349 | +{ | ||
350 | + uint64_t r; | ||
351 | + uint32_t offset = addr & ~0x3; | ||
352 | + | ||
353 | + switch (offset) { | ||
354 | + case A_AHBNSPPPC0: | ||
355 | + r = 0; | ||
356 | + break; | ||
357 | + case A_AHBNSPPPCEXP0: | ||
358 | + case A_AHBNSPPPCEXP1: | ||
359 | + case A_AHBNSPPPCEXP2: | ||
360 | + case A_AHBNSPPPCEXP3: | ||
361 | + case A_APBNSPPPC0: | ||
362 | + case A_APBNSPPPC1: | ||
363 | + case A_APBNSPPPCEXP0: | ||
364 | + case A_APBNSPPPCEXP1: | ||
365 | + case A_APBNSPPPCEXP2: | ||
366 | + case A_APBNSPPPCEXP3: | ||
367 | + qemu_log_mask(LOG_UNIMP, | ||
368 | + "IoTKit SecCtl NS block read: " | ||
369 | + "unimplemented offset 0x%x\n", offset); | ||
370 | + break; | ||
371 | + case A_PID4: | ||
372 | + case A_PID5: | ||
373 | + case A_PID6: | ||
374 | + case A_PID7: | ||
375 | + case A_PID0: | ||
376 | + case A_PID1: | ||
377 | + case A_PID2: | ||
378 | + case A_PID3: | ||
379 | + case A_CID0: | ||
380 | + case A_CID1: | ||
381 | + case A_CID2: | ||
382 | + case A_CID3: | ||
383 | + r = iotkit_secctl_ns_idregs[(offset - A_PID4) / 4]; | ||
384 | + break; | ||
385 | + default: | ||
386 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
387 | + "IotKit SecCtl NS block write: bad offset 0x%x\n", | ||
388 | + offset); | ||
389 | + r = 0; | ||
390 | + break; | ||
391 | + } | ||
392 | + | ||
393 | + if (size != 4) { | ||
394 | + /* None of our registers are access-sensitive, so just pull the right | ||
395 | + * byte out of the word read result. | ||
396 | + */ | ||
397 | + r = extract32(r, (addr & 3) * 8, size * 8); | ||
398 | + } | ||
399 | + | ||
400 | + trace_iotkit_secctl_ns_read(offset, r, size); | ||
401 | + *pdata = r; | ||
402 | + return MEMTX_OK; | ||
403 | +} | ||
404 | + | ||
405 | +static MemTxResult iotkit_secctl_ns_write(void *opaque, hwaddr addr, | ||
406 | + uint64_t value, | ||
407 | + unsigned size, MemTxAttrs attrs) | ||
408 | +{ | ||
409 | + uint32_t offset = addr; | ||
410 | + | ||
411 | + trace_iotkit_secctl_ns_write(offset, value, size); | ||
412 | + | ||
413 | + if (size != 4) { | ||
414 | + /* Byte and halfword writes are ignored */ | ||
415 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
416 | + "IotKit SecCtl NS block write: bad size, ignored\n"); | ||
417 | + return MEMTX_OK; | ||
418 | + } | ||
419 | + | ||
420 | + switch (offset) { | ||
421 | + case A_AHBNSPPPCEXP0: | ||
422 | + case A_AHBNSPPPCEXP1: | ||
423 | + case A_AHBNSPPPCEXP2: | ||
424 | + case A_AHBNSPPPCEXP3: | ||
425 | + case A_APBNSPPPC0: | ||
426 | + case A_APBNSPPPC1: | ||
427 | + case A_APBNSPPPCEXP0: | ||
428 | + case A_APBNSPPPCEXP1: | ||
429 | + case A_APBNSPPPCEXP2: | ||
430 | + case A_APBNSPPPCEXP3: | ||
431 | + qemu_log_mask(LOG_UNIMP, | ||
432 | + "IoTKit SecCtl NS block write: " | ||
433 | + "unimplemented offset 0x%x\n", offset); | ||
434 | + break; | ||
435 | + case A_AHBNSPPPC0: | ||
436 | + case A_PID4: | ||
437 | + case A_PID5: | ||
438 | + case A_PID6: | ||
439 | + case A_PID7: | ||
440 | + case A_PID0: | ||
441 | + case A_PID1: | ||
442 | + case A_PID2: | ||
443 | + case A_PID3: | ||
444 | + case A_CID0: | ||
445 | + case A_CID1: | ||
446 | + case A_CID2: | ||
447 | + case A_CID3: | ||
448 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
449 | + "IoTKit SecCtl NS block write: " | ||
450 | + "read-only offset 0x%x\n", offset); | ||
451 | + break; | ||
452 | + default: | ||
453 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
454 | + "IotKit SecCtl NS block write: bad offset 0x%x\n", | ||
455 | + offset); | ||
456 | + break; | ||
457 | + } | ||
458 | + | ||
459 | + return MEMTX_OK; | ||
460 | +} | ||
461 | + | ||
462 | +static const MemoryRegionOps iotkit_secctl_s_ops = { | ||
463 | + .read_with_attrs = iotkit_secctl_s_read, | ||
464 | + .write_with_attrs = iotkit_secctl_s_write, | ||
465 | + .endianness = DEVICE_LITTLE_ENDIAN, | ||
466 | + .valid.min_access_size = 1, | ||
467 | + .valid.max_access_size = 4, | ||
468 | + .impl.min_access_size = 1, | ||
469 | + .impl.max_access_size = 4, | ||
470 | +}; | ||
471 | + | ||
472 | +static const MemoryRegionOps iotkit_secctl_ns_ops = { | ||
473 | + .read_with_attrs = iotkit_secctl_ns_read, | ||
474 | + .write_with_attrs = iotkit_secctl_ns_write, | ||
475 | + .endianness = DEVICE_LITTLE_ENDIAN, | ||
476 | + .valid.min_access_size = 1, | ||
477 | + .valid.max_access_size = 4, | ||
478 | + .impl.min_access_size = 1, | ||
479 | + .impl.max_access_size = 4, | ||
480 | +}; | ||
481 | + | ||
482 | +static void iotkit_secctl_reset(DeviceState *dev) | ||
483 | +{ | ||
484 | + | ||
485 | +} | ||
486 | + | ||
487 | +static void iotkit_secctl_init(Object *obj) | ||
488 | +{ | ||
489 | + IoTKitSecCtl *s = IOTKIT_SECCTL(obj); | ||
490 | + SysBusDevice *sbd = SYS_BUS_DEVICE(obj); | ||
491 | + | ||
492 | + memory_region_init_io(&s->s_regs, obj, &iotkit_secctl_s_ops, | ||
493 | + s, "iotkit-secctl-s-regs", 0x1000); | ||
494 | + memory_region_init_io(&s->ns_regs, obj, &iotkit_secctl_ns_ops, | ||
495 | + s, "iotkit-secctl-ns-regs", 0x1000); | ||
496 | + sysbus_init_mmio(sbd, &s->s_regs); | ||
497 | + sysbus_init_mmio(sbd, &s->ns_regs); | ||
498 | +} | ||
499 | + | ||
500 | +static const VMStateDescription iotkit_secctl_vmstate = { | ||
501 | + .name = "iotkit-secctl", | ||
502 | + .version_id = 1, | ||
503 | + .minimum_version_id = 1, | ||
504 | + .fields = (VMStateField[]) { | ||
505 | + VMSTATE_END_OF_LIST() | ||
506 | + } | ||
507 | +}; | ||
508 | + | ||
509 | +static void iotkit_secctl_class_init(ObjectClass *klass, void *data) | ||
510 | +{ | ||
511 | + DeviceClass *dc = DEVICE_CLASS(klass); | ||
512 | + | ||
513 | + dc->vmsd = &iotkit_secctl_vmstate; | ||
514 | + dc->reset = iotkit_secctl_reset; | ||
515 | +} | ||
516 | + | ||
517 | +static const TypeInfo iotkit_secctl_info = { | ||
518 | + .name = TYPE_IOTKIT_SECCTL, | ||
519 | + .parent = TYPE_SYS_BUS_DEVICE, | ||
520 | + .instance_size = sizeof(IoTKitSecCtl), | ||
521 | + .instance_init = iotkit_secctl_init, | ||
522 | + .class_init = iotkit_secctl_class_init, | ||
523 | +}; | ||
524 | + | ||
525 | +static void iotkit_secctl_register_types(void) | ||
526 | +{ | ||
527 | + type_register_static(&iotkit_secctl_info); | ||
528 | +} | ||
529 | + | ||
530 | +type_init(iotkit_secctl_register_types); | ||
531 | diff --git a/default-configs/arm-softmmu.mak b/default-configs/arm-softmmu.mak | ||
532 | index XXXXXXX..XXXXXXX 100644 | ||
533 | --- a/default-configs/arm-softmmu.mak | ||
534 | +++ b/default-configs/arm-softmmu.mak | ||
535 | @@ -XXX,XX +XXX,XX @@ CONFIG_MPS2_FPGAIO=y | ||
536 | CONFIG_MPS2_SCC=y | ||
537 | |||
538 | CONFIG_TZ_PPC=y | ||
539 | +CONFIG_IOTKIT_SECCTL=y | ||
540 | |||
541 | CONFIG_VERSATILE_PCI=y | ||
542 | CONFIG_VERSATILE_I2C=y | ||
543 | diff --git a/hw/misc/trace-events b/hw/misc/trace-events | ||
544 | index XXXXXXX..XXXXXXX 100644 | ||
545 | --- a/hw/misc/trace-events | ||
546 | +++ b/hw/misc/trace-events | ||
547 | @@ -XXX,XX +XXX,XX @@ tz_ppc_irq_clear(int level) "TZ PPC: int_clear = %d" | ||
548 | tz_ppc_update_irq(int level) "TZ PPC: setting irq line to %d" | ||
549 | tz_ppc_read_blocked(int n, hwaddr offset, bool secure, bool user) "TZ PPC: port %d offset 0x%" HWADDR_PRIx " read (secure %d user %d) blocked" | ||
550 | tz_ppc_write_blocked(int n, hwaddr offset, bool secure, bool user) "TZ PPC: port %d offset 0x%" HWADDR_PRIx " write (secure %d user %d) blocked" | ||
551 | + | ||
552 | +# hw/misc/iotkit-secctl.c | ||
553 | +iotkit_secctl_s_read(uint32_t offset, uint64_t data, unsigned size) "IoTKit SecCtl S regs read: offset 0x%x data 0x%" PRIx64 " size %u" | ||
554 | +iotkit_secctl_s_write(uint32_t offset, uint64_t data, unsigned size) "IoTKit SecCtl S regs write: offset 0x%x data 0x%" PRIx64 " size %u" | ||
555 | +iotkit_secctl_ns_read(uint32_t offset, uint64_t data, unsigned size) "IoTKit SecCtl NS regs read: offset 0x%x data 0x%" PRIx64 " size %u" | ||
556 | +iotkit_secctl_ns_write(uint32_t offset, uint64_t data, unsigned size) "IoTKit SecCtl NS regs write: offset 0x%x data 0x%" PRIx64 " size %u" | ||
557 | +iotkit_secctl_reset(void) "IoTKit SecCtl: reset" | ||
558 | -- | ||
559 | 2.16.2 | ||
560 | |||
561 | diff view generated by jsdifflib |
1 | Add remaining easy registers to iotkit-secctl: | 1 | When we first converted our documentation to Sphinx, we split it into |
---|---|---|---|
2 | * NSCCFG just routes its two bits out to external GPIO lines | 2 | multiple manuals (system, interop, tools, etc), which are all built |
3 | * BRGINSTAT/BRGINTCLR/BRGINTEN can be dummies, because QEMU's | 3 | separately. The primary driver for this was wanting to be able to |
4 | bus fabric can never report errors | 4 | avoid shipping the 'devel' manual to end-users. However, this is |
5 | working against the grain of the way Sphinx wants to be used and | ||
6 | causes some annoyances: | ||
7 | * Cross-references between documents become much harder or | ||
8 | possibly impossible | ||
9 | * There is no single index to the whole documentation | ||
10 | * Within one manual there's no links or table-of-contents info | ||
11 | that lets you easily navigate to the others | ||
12 | * The devel manual doesn't get published on the QEMU website | ||
13 | (it would be nice to able to refer to it there) | ||
14 | |||
15 | Merely hiding our developer documentation from end users seems like | ||
16 | it's not enough benefit for these costs. Combine all the | ||
17 | documentation into a single manual (the same way that the readthedocs | ||
18 | site builds it) and install the whole thing. The previous manual | ||
19 | divisions remain as the new top level sections in the manual. | ||
20 | |||
21 | * The per-manual conf.py files are no longer needed | ||
22 | * The man_pages[] specifications previously in each per-manual | ||
23 | conf.py move to the top level conf.py | ||
24 | * docs/meson.build logic is simplified as we now only need to run | ||
25 | Sphinx once for the HTML and then once for the manpages5B | ||
26 | * The old index.html.in that produced the top-level page with | ||
27 | links to each manual is no longer needed | ||
28 | |||
29 | Unfortunately this means that we now have to build the HTML | ||
30 | documentation into docs/manual in the build tree rather than directly | ||
31 | into docs/; otherwise it is too awkward to ensure we install only the | ||
32 | built manual and not also the dependency info, stamp file, etc. The | ||
33 | manual still ends up in the same place in the final installed | ||
34 | directory, but anybody who was consulting documentation from within | ||
35 | the build tree will have to adjust where they're looking. | ||
5 | 36 | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 37 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Message-id: 20180220180325.29818-18-peter.maydell@linaro.org | 38 | Reviewed-by: Paolo Bonzini <pbonzini@redhat.com> |
39 | Message-id: 20210115154449.4801-1-peter.maydell@linaro.org | ||
8 | --- | 40 | --- |
9 | include/hw/misc/iotkit-secctl.h | 4 ++++ | 41 | docs/conf.py | 46 ++++++++++++++++++++++++++++++- |
10 | hw/misc/iotkit-secctl.c | 32 ++++++++++++++++++++++++++------ | 42 | docs/devel/conf.py | 15 ----------- |
11 | 2 files changed, 30 insertions(+), 6 deletions(-) | 43 | docs/index.html.in | 17 ------------ |
12 | 44 | docs/interop/conf.py | 28 ------------------- | |
13 | diff --git a/include/hw/misc/iotkit-secctl.h b/include/hw/misc/iotkit-secctl.h | 45 | docs/meson.build | 64 +++++++++++++++++--------------------------- |
46 | docs/specs/conf.py | 16 ----------- | ||
47 | docs/system/conf.py | 28 ------------------- | ||
48 | docs/tools/conf.py | 37 ------------------------- | ||
49 | docs/user/conf.py | 15 ----------- | ||
50 | .gitlab-ci.yml | 4 +-- | ||
51 | 10 files changed, 72 insertions(+), 198 deletions(-) | ||
52 | delete mode 100644 docs/devel/conf.py | ||
53 | delete mode 100644 docs/index.html.in | ||
54 | delete mode 100644 docs/interop/conf.py | ||
55 | delete mode 100644 docs/specs/conf.py | ||
56 | delete mode 100644 docs/system/conf.py | ||
57 | delete mode 100644 docs/tools/conf.py | ||
58 | delete mode 100644 docs/user/conf.py | ||
59 | |||
60 | diff --git a/docs/conf.py b/docs/conf.py | ||
14 | index XXXXXXX..XXXXXXX 100644 | 61 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/include/hw/misc/iotkit-secctl.h | 62 | --- a/docs/conf.py |
16 | +++ b/include/hw/misc/iotkit-secctl.h | 63 | +++ b/docs/conf.py |
17 | @@ -XXX,XX +XXX,XX @@ | 64 | @@ -XXX,XX +XXX,XX @@ latex_documents = [ |
18 | * + sysbus MMIO region 1 is the "non-secure privilege control block" registers | 65 | |
19 | * + named GPIO output "sec_resp_cfg" indicating whether blocked accesses | 66 | # -- Options for manual page output --------------------------------------- |
20 | * should RAZ/WI or bus error | 67 | # Individual manual/conf.py can override this to create man pages |
21 | + * + named GPIO output "nsc_cfg" whose value tracks the NSCCFG register value | 68 | -man_pages = [] |
22 | * Controlling the 2 APB PPCs in the IoTKit: | 69 | +man_pages = [ |
23 | * + named GPIO outputs apb_ppc0_nonsec[0..2] and apb_ppc1_nonsec | 70 | + ('interop/qemu-ga', 'qemu-ga', |
24 | * + named GPIO outputs apb_ppc0_ap[0..2] and apb_ppc1_ap | 71 | + 'QEMU Guest Agent', |
25 | @@ -XXX,XX +XXX,XX @@ struct IoTKitSecCtl { | 72 | + ['Michael Roth <mdroth@linux.vnet.ibm.com>'], 8), |
26 | 73 | + ('interop/qemu-ga-ref', 'qemu-ga-ref', | |
27 | /*< public >*/ | 74 | + 'QEMU Guest Agent Protocol Reference', |
28 | qemu_irq sec_resp_cfg; | 75 | + [], 7), |
29 | + qemu_irq nsc_cfg_irq; | 76 | + ('interop/qemu-qmp-ref', 'qemu-qmp-ref', |
30 | 77 | + 'QEMU QMP Reference Manual', | |
31 | MemoryRegion s_regs; | 78 | + [], 7), |
32 | MemoryRegion ns_regs; | 79 | + ('interop/qemu-storage-daemon-qmp-ref', 'qemu-storage-daemon-qmp-ref', |
33 | @@ -XXX,XX +XXX,XX @@ struct IoTKitSecCtl { | 80 | + 'QEMU Storage Daemon QMP Reference Manual', |
34 | uint32_t secppcintstat; | 81 | + [], 7), |
35 | uint32_t secppcinten; | 82 | + ('system/qemu-manpage', 'qemu', |
36 | uint32_t secrespcfg; | 83 | + 'QEMU User Documentation', |
37 | + uint32_t nsccfg; | 84 | + ['Fabrice Bellard'], 1), |
38 | + uint32_t brginten; | 85 | + ('system/qemu-block-drivers', 'qemu-block-drivers', |
39 | 86 | + 'QEMU block drivers reference', | |
40 | IoTKitSecCtlPPC apb[IOTS_NUM_APB_PPC]; | 87 | + ['Fabrice Bellard and the QEMU Project developers'], 7), |
41 | IoTKitSecCtlPPC apbexp[IOTS_NUM_APB_EXP_PPC]; | 88 | + ('system/qemu-cpu-models', 'qemu-cpu-models', |
42 | diff --git a/hw/misc/iotkit-secctl.c b/hw/misc/iotkit-secctl.c | 89 | + 'QEMU CPU Models', |
90 | + ['The QEMU Project developers'], 7), | ||
91 | + ('tools/qemu-img', 'qemu-img', | ||
92 | + 'QEMU disk image utility', | ||
93 | + ['Fabrice Bellard'], 1), | ||
94 | + ('tools/qemu-nbd', 'qemu-nbd', | ||
95 | + 'QEMU Disk Network Block Device Server', | ||
96 | + ['Anthony Liguori <anthony@codemonkey.ws>'], 8), | ||
97 | + ('tools/qemu-pr-helper', 'qemu-pr-helper', | ||
98 | + 'QEMU persistent reservation helper', | ||
99 | + [], 8), | ||
100 | + ('tools/qemu-storage-daemon', 'qemu-storage-daemon', | ||
101 | + 'QEMU storage daemon', | ||
102 | + [], 1), | ||
103 | + ('tools/qemu-trace-stap', 'qemu-trace-stap', | ||
104 | + 'QEMU SystemTap trace tool', | ||
105 | + [], 1), | ||
106 | + ('tools/virtfs-proxy-helper', 'virtfs-proxy-helper', | ||
107 | + 'QEMU 9p virtfs proxy filesystem helper', | ||
108 | + ['M. Mohan Kumar'], 1), | ||
109 | + ('tools/virtiofsd', 'virtiofsd', | ||
110 | + 'QEMU virtio-fs shared file system daemon', | ||
111 | + ['Stefan Hajnoczi <stefanha@redhat.com>', | ||
112 | + 'Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>'], 1), | ||
113 | +] | ||
114 | |||
115 | # -- Options for Texinfo output ------------------------------------------- | ||
116 | |||
117 | diff --git a/docs/devel/conf.py b/docs/devel/conf.py | ||
118 | deleted file mode 100644 | ||
119 | index XXXXXXX..XXXXXXX | ||
120 | --- a/docs/devel/conf.py | ||
121 | +++ /dev/null | ||
122 | @@ -XXX,XX +XXX,XX @@ | ||
123 | -# -*- coding: utf-8 -*- | ||
124 | -# | ||
125 | -# QEMU documentation build configuration file for the 'devel' manual. | ||
126 | -# | ||
127 | -# This includes the top level conf file and then makes any necessary tweaks. | ||
128 | -import sys | ||
129 | -import os | ||
130 | - | ||
131 | -qemu_docdir = os.path.abspath("..") | ||
132 | -parent_config = os.path.join(qemu_docdir, "conf.py") | ||
133 | -exec(compile(open(parent_config, "rb").read(), parent_config, 'exec')) | ||
134 | - | ||
135 | -# This slightly misuses the 'description', but is the best way to get | ||
136 | -# the manual title to appear in the sidebar. | ||
137 | -html_theme_options['description'] = u'Developer''s Guide' | ||
138 | diff --git a/docs/index.html.in b/docs/index.html.in | ||
139 | deleted file mode 100644 | ||
140 | index XXXXXXX..XXXXXXX | ||
141 | --- a/docs/index.html.in | ||
142 | +++ /dev/null | ||
143 | @@ -XXX,XX +XXX,XX @@ | ||
144 | -<!DOCTYPE html> | ||
145 | -<html lang="en"> | ||
146 | - <head> | ||
147 | - <meta charset="UTF-8"> | ||
148 | - <title>QEMU @VERSION@ Documentation</title> | ||
149 | - </head> | ||
150 | - <body> | ||
151 | - <h1>QEMU @VERSION@ Documentation</h1> | ||
152 | - <ul> | ||
153 | - <li><a href="system/index.html">System Emulation User's Guide</a></li> | ||
154 | - <li><a href="user/index.html">User Mode Emulation User's Guide</a></li> | ||
155 | - <li><a href="tools/index.html">Tools Guide</a></li> | ||
156 | - <li><a href="interop/index.html">System Emulation Management and Interoperability Guide</a></li> | ||
157 | - <li><a href="specs/index.html">System Emulation Guest Hardware Specifications</a></li> | ||
158 | - </ul> | ||
159 | - </body> | ||
160 | -</html> | ||
161 | diff --git a/docs/interop/conf.py b/docs/interop/conf.py | ||
162 | deleted file mode 100644 | ||
163 | index XXXXXXX..XXXXXXX | ||
164 | --- a/docs/interop/conf.py | ||
165 | +++ /dev/null | ||
166 | @@ -XXX,XX +XXX,XX @@ | ||
167 | -# -*- coding: utf-8 -*- | ||
168 | -# | ||
169 | -# QEMU documentation build configuration file for the 'interop' manual. | ||
170 | -# | ||
171 | -# This includes the top level conf file and then makes any necessary tweaks. | ||
172 | -import sys | ||
173 | -import os | ||
174 | - | ||
175 | -qemu_docdir = os.path.abspath("..") | ||
176 | -parent_config = os.path.join(qemu_docdir, "conf.py") | ||
177 | -exec(compile(open(parent_config, "rb").read(), parent_config, 'exec')) | ||
178 | - | ||
179 | -# This slightly misuses the 'description', but is the best way to get | ||
180 | -# the manual title to appear in the sidebar. | ||
181 | -html_theme_options['description'] = u'System Emulation Management and Interoperability Guide' | ||
182 | - | ||
183 | -# One entry per manual page. List of tuples | ||
184 | -# (source start file, name, description, authors, manual section). | ||
185 | -man_pages = [ | ||
186 | - ('qemu-ga', 'qemu-ga', u'QEMU Guest Agent', | ||
187 | - ['Michael Roth <mdroth@linux.vnet.ibm.com>'], 8), | ||
188 | - ('qemu-ga-ref', 'qemu-ga-ref', 'QEMU Guest Agent Protocol Reference', | ||
189 | - [], 7), | ||
190 | - ('qemu-qmp-ref', 'qemu-qmp-ref', 'QEMU QMP Reference Manual', | ||
191 | - [], 7), | ||
192 | - ('qemu-storage-daemon-qmp-ref', 'qemu-storage-daemon-qmp-ref', | ||
193 | - 'QEMU Storage Daemon QMP Reference Manual', [], 7), | ||
194 | -] | ||
195 | diff --git a/docs/meson.build b/docs/meson.build | ||
43 | index XXXXXXX..XXXXXXX 100644 | 196 | index XXXXXXX..XXXXXXX 100644 |
44 | --- a/hw/misc/iotkit-secctl.c | 197 | --- a/docs/meson.build |
45 | +++ b/hw/misc/iotkit-secctl.c | 198 | +++ b/docs/meson.build |
46 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_s_read(void *opaque, hwaddr addr, | 199 | @@ -XXX,XX +XXX,XX @@ if build_docs |
47 | case A_SECRESPCFG: | 200 | meson.source_root() / 'docs/sphinx/qmp_lexer.py', |
48 | r = s->secrespcfg; | 201 | qapi_gen_depends ] |
49 | break; | 202 | |
50 | + case A_NSCCFG: | 203 | - configure_file(output: 'index.html', |
51 | + r = s->nsccfg; | 204 | - input: files('index.html.in'), |
52 | + break; | 205 | - configuration: {'VERSION': meson.project_version()}, |
53 | case A_SECPPCINTSTAT: | 206 | - install_dir: qemu_docdir) |
54 | r = s->secppcintstat; | 207 | - manuals = [ 'devel', 'interop', 'tools', 'specs', 'system', 'user' ] |
55 | break; | 208 | man_pages = { |
56 | case A_SECPPCINTEN: | 209 | - 'interop' : { |
57 | r = s->secppcinten; | 210 | 'qemu-ga.8': (have_tools ? 'man8' : ''), |
58 | break; | 211 | 'qemu-ga-ref.7': 'man7', |
59 | + case A_BRGINTSTAT: | 212 | 'qemu-qmp-ref.7': 'man7', |
60 | + /* QEMU's bus fabric can never report errors as it doesn't buffer | 213 | 'qemu-storage-daemon-qmp-ref.7': (have_tools ? 'man7' : ''), |
61 | + * writes, so we never report bridge interrupts. | 214 | - }, |
62 | + */ | 215 | - 'tools': { |
63 | + r = 0; | 216 | 'qemu-img.1': (have_tools ? 'man1' : ''), |
64 | + break; | 217 | 'qemu-nbd.8': (have_tools ? 'man8' : ''), |
65 | + case A_BRGINTEN: | 218 | 'qemu-pr-helper.8': (have_tools ? 'man8' : ''), |
66 | + r = s->brginten; | 219 | @@ -XXX,XX +XXX,XX @@ if build_docs |
67 | + break; | 220 | 'qemu-trace-stap.1': (config_host.has_key('CONFIG_TRACE_SYSTEMTAP') ? 'man1' : ''), |
68 | case A_AHBNSPPCEXP0: | 221 | 'virtfs-proxy-helper.1': (have_virtfs_proxy_helper ? 'man1' : ''), |
69 | case A_AHBNSPPCEXP1: | 222 | 'virtiofsd.1': (have_virtiofsd ? 'man1' : ''), |
70 | case A_AHBNSPPCEXP2: | 223 | - }, |
71 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_s_read(void *opaque, hwaddr addr, | 224 | - 'system': { |
72 | case A_APBSPPPCEXP3: | 225 | 'qemu.1': 'man1', |
73 | r = s->apbexp[offset_to_ppc_idx(offset)].sp; | 226 | 'qemu-block-drivers.7': 'man7', |
74 | break; | 227 | 'qemu-cpu-models.7': 'man7' |
75 | - case A_NSCCFG: | 228 | - }, |
76 | case A_SECMPCINTSTATUS: | 229 | } |
77 | case A_SECMSCINTSTAT: | 230 | |
78 | case A_SECMSCINTEN: | 231 | sphinxdocs = [] |
79 | - case A_BRGINTSTAT: | 232 | sphinxmans = [] |
80 | - case A_BRGINTEN: | 233 | - foreach manual : manuals |
81 | case A_NSMSCEXP: | 234 | - private_dir = meson.current_build_dir() / (manual + '.p') |
82 | qemu_log_mask(LOG_UNIMP, | 235 | - output_dir = meson.current_build_dir() / manual |
83 | "IoTKit SecCtl S block read: " | 236 | - input_dir = meson.current_source_dir() / manual |
84 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_s_write(void *opaque, hwaddr addr, | 237 | |
85 | } | 238 | - this_manual = custom_target(manual + ' manual', |
86 | 239 | + private_dir = meson.current_build_dir() / 'manual.p' | |
87 | switch (offset) { | 240 | + output_dir = meson.current_build_dir() / 'manual' |
88 | + case A_NSCCFG: | 241 | + input_dir = meson.current_source_dir() |
89 | + s->nsccfg = value & 3; | 242 | + |
90 | + qemu_set_irq(s->nsc_cfg_irq, s->nsccfg); | 243 | + this_manual = custom_target('QEMU manual', |
91 | + break; | 244 | build_by_default: build_docs, |
92 | case A_SECRESPCFG: | 245 | - output: [manual + '.stamp'], |
93 | value &= 1; | 246 | - input: [files('conf.py'), files(manual / 'conf.py')], |
94 | s->secrespcfg = value; | 247 | - depfile: manual + '.d', |
95 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_s_write(void *opaque, hwaddr addr, | 248 | + output: 'docs.stamp', |
96 | s->secppcinten = value & 0x00f000f3; | 249 | + input: files('conf.py'), |
97 | foreach_ppc(s, iotkit_secctl_ppc_update_irq_enable); | 250 | + depfile: 'docs.d', |
98 | break; | 251 | depend_files: sphinx_extn_depends, |
99 | + case A_BRGINTCLR: | 252 | command: [SPHINX_ARGS, '-Ddepfile=@DEPFILE@', |
100 | + break; | 253 | '-Ddepfile_stamp=@OUTPUT0@', |
101 | + case A_BRGINTEN: | 254 | '-b', 'html', '-d', private_dir, |
102 | + s->brginten = value & 0xffff0000; | 255 | input_dir, output_dir]) |
103 | + break; | 256 | - sphinxdocs += this_manual |
104 | case A_AHBNSPPCEXP0: | 257 | - if build_docs and manual != 'devel' |
105 | case A_AHBNSPPCEXP1: | 258 | - install_subdir(output_dir, install_dir: qemu_docdir) |
106 | case A_AHBNSPPCEXP2: | 259 | - endif |
107 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_s_write(void *opaque, hwaddr addr, | 260 | + sphinxdocs += this_manual |
108 | ppc = &s->apbexp[offset_to_ppc_idx(offset)]; | 261 | + install_subdir(output_dir, install_dir: qemu_docdir, strip_directory: true) |
109 | iotkit_secctl_ppc_sp_write(ppc, value); | 262 | |
110 | break; | 263 | - these_man_pages = [] |
111 | - case A_NSCCFG: | 264 | - install_dirs = [] |
112 | case A_SECMSCINTCLR: | 265 | - foreach page, section : man_pages.get(manual, {}) |
113 | case A_SECMSCINTEN: | 266 | - these_man_pages += page |
114 | - case A_BRGINTCLR: | 267 | - install_dirs += section == '' ? false : get_option('mandir') / section |
115 | - case A_BRGINTEN: | 268 | - endforeach |
116 | qemu_log_mask(LOG_UNIMP, | 269 | - if these_man_pages.length() > 0 |
117 | "IoTKit SecCtl S block write: " | 270 | - sphinxmans += custom_target(manual + ' man pages', |
118 | "unimplemented offset 0x%x\n", offset); | 271 | - build_by_default: build_docs, |
119 | @@ -XXX,XX +XXX,XX @@ static void iotkit_secctl_reset(DeviceState *dev) | 272 | - output: these_man_pages, |
120 | s->secppcintstat = 0; | 273 | - input: this_manual, |
121 | s->secppcinten = 0; | 274 | - install: build_docs, |
122 | s->secrespcfg = 0; | 275 | - install_dir: install_dirs, |
123 | + s->nsccfg = 0; | 276 | - command: [SPHINX_ARGS, '-b', 'man', '-d', private_dir, |
124 | + s->brginten = 0; | 277 | - input_dir, meson.current_build_dir()]) |
125 | 278 | - endif | |
126 | foreach_ppc(s, iotkit_secctl_reset_ppc); | 279 | + these_man_pages = [] |
127 | } | 280 | + install_dirs = [] |
128 | @@ -XXX,XX +XXX,XX @@ static void iotkit_secctl_init(Object *obj) | 281 | + foreach page, section : man_pages |
129 | } | 282 | + these_man_pages += page |
130 | 283 | + install_dirs += section == '' ? false : get_option('mandir') / section | |
131 | qdev_init_gpio_out_named(dev, &s->sec_resp_cfg, "sec_resp_cfg", 1); | 284 | endforeach |
132 | + qdev_init_gpio_out_named(dev, &s->nsc_cfg_irq, "nsc_cfg", 1); | 285 | + |
133 | 286 | + sphinxmans += custom_target('QEMU man pages', | |
134 | memory_region_init_io(&s->s_regs, obj, &iotkit_secctl_s_ops, | 287 | + build_by_default: build_docs, |
135 | s, "iotkit-secctl-s-regs", 0x1000); | 288 | + output: these_man_pages, |
136 | @@ -XXX,XX +XXX,XX @@ static const VMStateDescription iotkit_secctl_vmstate = { | 289 | + input: this_manual, |
137 | VMSTATE_UINT32(secppcintstat, IoTKitSecCtl), | 290 | + install: build_docs, |
138 | VMSTATE_UINT32(secppcinten, IoTKitSecCtl), | 291 | + install_dir: install_dirs, |
139 | VMSTATE_UINT32(secrespcfg, IoTKitSecCtl), | 292 | + command: [SPHINX_ARGS, '-b', 'man', '-d', private_dir, |
140 | + VMSTATE_UINT32(nsccfg, IoTKitSecCtl), | 293 | + input_dir, meson.current_build_dir()]) |
141 | + VMSTATE_UINT32(brginten, IoTKitSecCtl), | 294 | + |
142 | VMSTATE_STRUCT_ARRAY(apb, IoTKitSecCtl, IOTS_NUM_APB_PPC, 1, | 295 | alias_target('sphinxdocs', sphinxdocs) |
143 | iotkit_secctl_ppc_vmstate, IoTKitSecCtlPPC), | 296 | alias_target('html', sphinxdocs) |
144 | VMSTATE_STRUCT_ARRAY(apbexp, IoTKitSecCtl, IOTS_NUM_APB_EXP_PPC, 1, | 297 | alias_target('man', sphinxmans) |
298 | diff --git a/docs/specs/conf.py b/docs/specs/conf.py | ||
299 | deleted file mode 100644 | ||
300 | index XXXXXXX..XXXXXXX | ||
301 | --- a/docs/specs/conf.py | ||
302 | +++ /dev/null | ||
303 | @@ -XXX,XX +XXX,XX @@ | ||
304 | -# -*- coding: utf-8 -*- | ||
305 | -# | ||
306 | -# QEMU documentation build configuration file for the 'specs' manual. | ||
307 | -# | ||
308 | -# This includes the top level conf file and then makes any necessary tweaks. | ||
309 | -import sys | ||
310 | -import os | ||
311 | - | ||
312 | -qemu_docdir = os.path.abspath("..") | ||
313 | -parent_config = os.path.join(qemu_docdir, "conf.py") | ||
314 | -exec(compile(open(parent_config, "rb").read(), parent_config, 'exec')) | ||
315 | - | ||
316 | -# This slightly misuses the 'description', but is the best way to get | ||
317 | -# the manual title to appear in the sidebar. | ||
318 | -html_theme_options['description'] = \ | ||
319 | - u'System Emulation Guest Hardware Specifications' | ||
320 | diff --git a/docs/system/conf.py b/docs/system/conf.py | ||
321 | deleted file mode 100644 | ||
322 | index XXXXXXX..XXXXXXX | ||
323 | --- a/docs/system/conf.py | ||
324 | +++ /dev/null | ||
325 | @@ -XXX,XX +XXX,XX @@ | ||
326 | -# -*- coding: utf-8 -*- | ||
327 | -# | ||
328 | -# QEMU documentation build configuration file for the 'system' manual. | ||
329 | -# | ||
330 | -# This includes the top level conf file and then makes any necessary tweaks. | ||
331 | -import sys | ||
332 | -import os | ||
333 | - | ||
334 | -qemu_docdir = os.path.abspath("..") | ||
335 | -parent_config = os.path.join(qemu_docdir, "conf.py") | ||
336 | -exec(compile(open(parent_config, "rb").read(), parent_config, 'exec')) | ||
337 | - | ||
338 | -# This slightly misuses the 'description', but is the best way to get | ||
339 | -# the manual title to appear in the sidebar. | ||
340 | -html_theme_options['description'] = u'System Emulation User''s Guide' | ||
341 | - | ||
342 | -# One entry per manual page. List of tuples | ||
343 | -# (source start file, name, description, authors, manual section). | ||
344 | -man_pages = [ | ||
345 | - ('qemu-manpage', 'qemu', u'QEMU User Documentation', | ||
346 | - ['Fabrice Bellard'], 1), | ||
347 | - ('qemu-block-drivers', 'qemu-block-drivers', | ||
348 | - u'QEMU block drivers reference', | ||
349 | - ['Fabrice Bellard and the QEMU Project developers'], 7), | ||
350 | - ('qemu-cpu-models', 'qemu-cpu-models', | ||
351 | - u'QEMU CPU Models', | ||
352 | - ['The QEMU Project developers'], 7) | ||
353 | -] | ||
354 | diff --git a/docs/tools/conf.py b/docs/tools/conf.py | ||
355 | deleted file mode 100644 | ||
356 | index XXXXXXX..XXXXXXX | ||
357 | --- a/docs/tools/conf.py | ||
358 | +++ /dev/null | ||
359 | @@ -XXX,XX +XXX,XX @@ | ||
360 | -# -*- coding: utf-8 -*- | ||
361 | -# | ||
362 | -# QEMU documentation build configuration file for the 'tools' manual. | ||
363 | -# | ||
364 | -# This includes the top level conf file and then makes any necessary tweaks. | ||
365 | -import sys | ||
366 | -import os | ||
367 | - | ||
368 | -qemu_docdir = os.path.abspath("..") | ||
369 | -parent_config = os.path.join(qemu_docdir, "conf.py") | ||
370 | -exec(compile(open(parent_config, "rb").read(), parent_config, 'exec')) | ||
371 | - | ||
372 | -# This slightly misuses the 'description', but is the best way to get | ||
373 | -# the manual title to appear in the sidebar. | ||
374 | -html_theme_options['description'] = \ | ||
375 | - u'Tools Guide' | ||
376 | - | ||
377 | -# One entry per manual page. List of tuples | ||
378 | -# (source start file, name, description, authors, manual section). | ||
379 | -man_pages = [ | ||
380 | - ('qemu-img', 'qemu-img', u'QEMU disk image utility', | ||
381 | - ['Fabrice Bellard'], 1), | ||
382 | - ('qemu-storage-daemon', 'qemu-storage-daemon', u'QEMU storage daemon', | ||
383 | - [], 1), | ||
384 | - ('qemu-nbd', 'qemu-nbd', u'QEMU Disk Network Block Device Server', | ||
385 | - ['Anthony Liguori <anthony@codemonkey.ws>'], 8), | ||
386 | - ('qemu-pr-helper', 'qemu-pr-helper', 'QEMU persistent reservation helper', | ||
387 | - [], 8), | ||
388 | - ('qemu-trace-stap', 'qemu-trace-stap', u'QEMU SystemTap trace tool', | ||
389 | - [], 1), | ||
390 | - ('virtfs-proxy-helper', 'virtfs-proxy-helper', | ||
391 | - u'QEMU 9p virtfs proxy filesystem helper', | ||
392 | - ['M. Mohan Kumar'], 1), | ||
393 | - ('virtiofsd', 'virtiofsd', u'QEMU virtio-fs shared file system daemon', | ||
394 | - ['Stefan Hajnoczi <stefanha@redhat.com>', | ||
395 | - 'Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>'], 1), | ||
396 | -] | ||
397 | diff --git a/docs/user/conf.py b/docs/user/conf.py | ||
398 | deleted file mode 100644 | ||
399 | index XXXXXXX..XXXXXXX | ||
400 | --- a/docs/user/conf.py | ||
401 | +++ /dev/null | ||
402 | @@ -XXX,XX +XXX,XX @@ | ||
403 | -# -*- coding: utf-8 -*- | ||
404 | -# | ||
405 | -# QEMU documentation build configuration file for the 'user' manual. | ||
406 | -# | ||
407 | -# This includes the top level conf file and then makes any necessary tweaks. | ||
408 | -import sys | ||
409 | -import os | ||
410 | - | ||
411 | -qemu_docdir = os.path.abspath("..") | ||
412 | -parent_config = os.path.join(qemu_docdir, "conf.py") | ||
413 | -exec(compile(open(parent_config, "rb").read(), parent_config, 'exec')) | ||
414 | - | ||
415 | -# This slightly misuses the 'description', but is the best way to get | ||
416 | -# the manual title to appear in the sidebar. | ||
417 | -html_theme_options['description'] = u'User Mode Emulation User''s Guide' | ||
418 | diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml | ||
419 | index XXXXXXX..XXXXXXX 100644 | ||
420 | --- a/.gitlab-ci.yml | ||
421 | +++ b/.gitlab-ci.yml | ||
422 | @@ -XXX,XX +XXX,XX @@ pages: | ||
423 | -t "Welcome to the QEMU sourcecode" | ||
424 | - mv HTML public/src | ||
425 | # Project documentation | ||
426 | - - mv build/docs/index.html public/ | ||
427 | - - for i in devel interop specs system tools user ; do mv build/docs/$i public/ ; done | ||
428 | + - make -C build install DESTDIR=$(pwd)/temp-install | ||
429 | + - mv temp-install/usr/local/share/doc/qemu/* public/ | ||
430 | artifacts: | ||
431 | paths: | ||
432 | - public | ||
145 | -- | 433 | -- |
146 | 2.16.2 | 434 | 2.20.1 |
147 | 435 | ||
148 | 436 | diff view generated by jsdifflib |