1 | Second pull request of the week; mostly RTH's support for some | 1 | More accumulated patches from during the freeze... |
---|---|---|---|
2 | new-in-v8.1/v8.3 instructions, and my v8M board model. | ||
3 | 2 | ||
4 | thanks | 3 | The following changes since commit c83fcfaf8a54d0d034bd0edf7bbb3b0d16669be9: |
5 | -- PMM | ||
6 | 4 | ||
7 | The following changes since commit 427cbc7e4136a061628cb4315cc8182ea36d772f: | 5 | Merge remote-tracking branch 'remotes/armbru/tags/pull-qapi-2021-08-26' into staging (2021-08-26 13:42:34 +0100) |
8 | |||
9 | Merge remote-tracking branch 'remotes/mst/tags/for_upstream' into staging (2018-03-01 18:46:41 +0000) | ||
10 | 6 | ||
11 | are available in the Git repository at: | 7 | are available in the Git repository at: |
12 | 8 | ||
13 | git://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20180302 | 9 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20210826 |
14 | 10 | ||
15 | for you to fetch changes up to e66a67bf28e1b4fce2e3d72a2610dbd48d9d3078: | 11 | for you to fetch changes up to d2e6f370138a7f32bc28b20dcd55374b7a638f39: |
16 | 12 | ||
17 | target/arm: Enable ARM_FEATURE_V8_FCMA (2018-03-02 11:03:45 +0000) | 13 | hw/arm/xlnx-zynqmp: Add unimplemented APU mmio (2021-08-26 17:02:01 +0100) |
18 | 14 | ||
19 | ---------------------------------------------------------------- | 15 | ---------------------------------------------------------------- |
20 | target-arm queue: | 16 | target-arm queue: |
21 | * implement FCMA and RDM v8.1 and v8.3 instructions | 17 | * hw/dma/xlnx-zdma, xlnx_csu_dma: Require 'dma' link property to be set |
22 | * enable Cortex-M33 v8M core, and provide new mps2-an505 board model | 18 | * hw/arm/Kconfig: no need to enable ACPI_MEMORY_HOTPLUG/ACPI_NVDIMM explicitly |
23 | that uses it | 19 | * target/arm/cpu: Introduce sve_vq_supported bitmap |
24 | * decodetree: Propagate return value from translate subroutines | 20 | * docs/specs: Convert ACPI spec docs to rST |
25 | * xlnx-zynqmp: Implement the RTC device | 21 | * arch_init: Clean up and refactoring |
22 | * hw/core/loader: In gunzip(), check index is in range before use, not after | ||
23 | * softmmu/physmem.c: Remove unneeded NULL check in qemu_ram_alloc_from_fd() | ||
24 | * softmmu/physmem.c: Check return value from realpath() | ||
25 | * Zero-initialize sockaddr_in structs | ||
26 | * raspi: Use error_fatal for SoC realize errors, not error_abort | ||
27 | * target/arm: Avoid assertion trying to use KVM and multiple ASes | ||
28 | * target/arm: Implement HSTR.TTEE | ||
29 | * target/arm: Implement HSTR.TJDBX | ||
30 | * target/arm: Do hflags rebuild in cpsr_write() | ||
31 | * hw/arm/xlnx-versal, xlnx-zynqmp: Add unimplemented APU mmio | ||
26 | 32 | ||
27 | ---------------------------------------------------------------- | 33 | ---------------------------------------------------------------- |
28 | Alistair Francis (3): | 34 | Andrew Jones (4): |
29 | xlnx-zynqmp-rtc: Initial commit | 35 | target/arm/cpu: Introduce sve_vq_supported bitmap |
30 | xlnx-zynqmp-rtc: Add basic time support | 36 | target/arm/kvm64: Ensure sve vls map is completely clear |
31 | xlnx-zynqmp: Connect the RTC device | 37 | target/arm/cpu64: Replace kvm_supported with sve_vq_supported |
38 | target/arm/cpu64: Validate sve vector lengths are supported | ||
32 | 39 | ||
33 | Peter Maydell (19): | 40 | Ani Sinha (1): |
34 | loader: Add new load_ramdisk_as() | 41 | hw/arm/Kconfig: no need to enable ACPI_MEMORY_HOTPLUG/ACPI_NVDIMM explicitly |
35 | hw/arm/boot: Honour CPU's address space for image loads | ||
36 | hw/arm/armv7m: Honour CPU's address space for image loads | ||
37 | target/arm: Define an IDAU interface | ||
38 | armv7m: Forward idau property to CPU object | ||
39 | target/arm: Define init-svtor property for the reset secure VTOR value | ||
40 | armv7m: Forward init-svtor property to CPU object | ||
41 | target/arm: Add Cortex-M33 | ||
42 | hw/misc/unimp: Move struct to header file | ||
43 | include/hw/or-irq.h: Add missing include guard | ||
44 | qdev: Add new qdev_init_gpio_in_named_with_opaque() | ||
45 | hw/core/split-irq: Device that splits IRQ lines | ||
46 | hw/misc/mps2-fpgaio: FPGA control block for MPS2 AN505 | ||
47 | hw/misc/tz-ppc: Model TrustZone peripheral protection controller | ||
48 | hw/misc/iotkit-secctl: Arm IoT Kit security controller initial skeleton | ||
49 | hw/misc/iotkit-secctl: Add handling for PPCs | ||
50 | hw/misc/iotkit-secctl: Add remaining simple registers | ||
51 | hw/arm/iotkit: Model Arm IOT Kit | ||
52 | mps2-an505: New board model: MPS2 with AN505 Cortex-M33 FPGA image | ||
53 | 42 | ||
54 | Richard Henderson (17): | 43 | Peter Maydell (26): |
55 | decodetree: Propagate return value from translate subroutines | 44 | docs/specs/acpu_cpu_hotplug: Convert to rST |
56 | target/arm: Add ARM_FEATURE_V8_RDM | 45 | docs/specs/acpi_mem_hotplug: Convert to rST |
57 | target/arm: Refactor disas_simd_indexed decode | 46 | docs/specs/acpi_pci_hotplug: Convert to rST |
58 | target/arm: Refactor disas_simd_indexed size checks | 47 | docs/specs/acpi_nvdimm: Convert to rST |
59 | target/arm: Decode aa64 armv8.1 scalar three same extra | 48 | MAINTAINERS: Add ACPI specs documents to ACPI and NVDIMM sections |
60 | target/arm: Decode aa64 armv8.1 three same extra | 49 | softmmu: Use accel_find("xen") instead of xen_available() |
61 | target/arm: Decode aa64 armv8.1 scalar/vector x indexed element | 50 | monitor: Use accel_find("kvm") instead of kvm_available() |
62 | target/arm: Decode aa32 armv8.1 three same | 51 | softmmu/arch_init.c: Trim down include list |
63 | target/arm: Decode aa32 armv8.1 two reg and a scalar | 52 | meson.build: Define QEMU_ARCH in config-target.h |
64 | target/arm: Enable ARM_FEATURE_V8_RDM | 53 | arch_init.h: Add QEMU_ARCH_HEXAGON |
65 | target/arm: Add ARM_FEATURE_V8_FCMA | 54 | arch_init.h: Move QEMU_ARCH_VIRTIO_* to qdev-monitor.c |
66 | target/arm: Decode aa64 armv8.3 fcadd | 55 | arch_init.h: Don't include arch_init.h unnecessarily |
67 | target/arm: Decode aa64 armv8.3 fcmla | 56 | stubs: Remove unused arch_type.c stub |
68 | target/arm: Decode aa32 armv8.3 3-same | 57 | hw/core/loader: In gunzip(), check index is in range before use, not after |
69 | target/arm: Decode aa32 armv8.3 2-reg-index | 58 | softmmu/physmem.c: Remove unneeded NULL check in qemu_ram_alloc_from_fd() |
70 | target/arm: Decode t32 simd 3reg and 2reg_scalar extension | 59 | softmmu/physmem.c: Check return value from realpath() |
71 | target/arm: Enable ARM_FEATURE_V8_FCMA | 60 | net: Zero sockaddr_in in parse_host_port() |
61 | gdbstub: Zero-initialize sockaddr structs | ||
62 | tests/qtest/ipmi-bt-test: Zero-initialize sockaddr struct | ||
63 | tests/tcg/multiarch/linux-test: Zero-initialize sockaddr structs | ||
64 | raspi: Use error_fatal for SoC realize errors, not error_abort | ||
65 | target/arm: Avoid assertion trying to use KVM and multiple ASes | ||
66 | hw/arm/virt: Delete EL3 error checksnow provided in CPU realize | ||
67 | target/arm: Implement HSTR.TTEE | ||
68 | target/arm: Implement HSTR.TJDBX | ||
69 | target/arm: Do hflags rebuild in cpsr_write() | ||
72 | 70 | ||
73 | hw/arm/Makefile.objs | 2 + | 71 | Philippe Mathieu-Daudé (4): |
74 | hw/core/Makefile.objs | 1 + | 72 | hw/arm/xlnx-zynqmp: Realize qspi controller *after* qspi_dma |
75 | hw/misc/Makefile.objs | 4 + | 73 | hw/dma/xlnx_csu_dma: Run trivial checks early in realize() |
76 | hw/timer/Makefile.objs | 1 + | 74 | hw/dma/xlnx_csu_dma: Always expect 'dma' link property to be set |
77 | target/arm/Makefile.objs | 2 +- | 75 | hw/dma/xlnx-zdma Always expect 'dma' link property to be set |
78 | include/hw/arm/armv7m.h | 5 + | ||
79 | include/hw/arm/iotkit.h | 109 ++++++ | ||
80 | include/hw/arm/xlnx-zynqmp.h | 2 + | ||
81 | include/hw/core/split-irq.h | 57 +++ | ||
82 | include/hw/irq.h | 4 +- | ||
83 | include/hw/loader.h | 12 +- | ||
84 | include/hw/misc/iotkit-secctl.h | 103 ++++++ | ||
85 | include/hw/misc/mps2-fpgaio.h | 43 +++ | ||
86 | include/hw/misc/tz-ppc.h | 101 ++++++ | ||
87 | include/hw/misc/unimp.h | 10 + | ||
88 | include/hw/or-irq.h | 5 + | ||
89 | include/hw/qdev-core.h | 30 +- | ||
90 | include/hw/timer/xlnx-zynqmp-rtc.h | 86 +++++ | ||
91 | target/arm/cpu.h | 8 + | ||
92 | target/arm/helper.h | 31 ++ | ||
93 | target/arm/idau.h | 61 ++++ | ||
94 | hw/arm/armv7m.c | 35 +- | ||
95 | hw/arm/boot.c | 119 ++++--- | ||
96 | hw/arm/iotkit.c | 598 +++++++++++++++++++++++++++++++ | ||
97 | hw/arm/mps2-tz.c | 503 ++++++++++++++++++++++++++ | ||
98 | hw/arm/xlnx-zynqmp.c | 14 + | ||
99 | hw/core/loader.c | 8 +- | ||
100 | hw/core/qdev.c | 8 +- | ||
101 | hw/core/split-irq.c | 89 +++++ | ||
102 | hw/misc/iotkit-secctl.c | 704 +++++++++++++++++++++++++++++++++++++ | ||
103 | hw/misc/mps2-fpgaio.c | 176 ++++++++++ | ||
104 | hw/misc/tz-ppc.c | 302 ++++++++++++++++ | ||
105 | hw/misc/unimp.c | 10 - | ||
106 | hw/timer/xlnx-zynqmp-rtc.c | 272 ++++++++++++++ | ||
107 | linux-user/elfload.c | 2 + | ||
108 | target/arm/cpu.c | 66 +++- | ||
109 | target/arm/cpu64.c | 2 + | ||
110 | target/arm/helper.c | 28 +- | ||
111 | target/arm/translate-a64.c | 514 +++++++++++++++++++++------ | ||
112 | target/arm/translate.c | 275 +++++++++++++-- | ||
113 | target/arm/vec_helper.c | 429 ++++++++++++++++++++++ | ||
114 | default-configs/arm-softmmu.mak | 5 + | ||
115 | hw/misc/trace-events | 24 ++ | ||
116 | hw/timer/trace-events | 3 + | ||
117 | scripts/decodetree.py | 5 +- | ||
118 | 45 files changed, 4668 insertions(+), 200 deletions(-) | ||
119 | create mode 100644 include/hw/arm/iotkit.h | ||
120 | create mode 100644 include/hw/core/split-irq.h | ||
121 | create mode 100644 include/hw/misc/iotkit-secctl.h | ||
122 | create mode 100644 include/hw/misc/mps2-fpgaio.h | ||
123 | create mode 100644 include/hw/misc/tz-ppc.h | ||
124 | create mode 100644 include/hw/timer/xlnx-zynqmp-rtc.h | ||
125 | create mode 100644 target/arm/idau.h | ||
126 | create mode 100644 hw/arm/iotkit.c | ||
127 | create mode 100644 hw/arm/mps2-tz.c | ||
128 | create mode 100644 hw/core/split-irq.c | ||
129 | create mode 100644 hw/misc/iotkit-secctl.c | ||
130 | create mode 100644 hw/misc/mps2-fpgaio.c | ||
131 | create mode 100644 hw/misc/tz-ppc.c | ||
132 | create mode 100644 hw/timer/xlnx-zynqmp-rtc.c | ||
133 | create mode 100644 target/arm/vec_helper.c | ||
134 | 76 | ||
77 | Tong Ho (2): | ||
78 | hw/arm/xlnx-versal: Add unimplemented APU mmio | ||
79 | hw/arm/xlnx-zynqmp: Add unimplemented APU mmio | ||
80 | |||
81 | docs/specs/acpi_cpu_hotplug.rst | 235 +++++++++++++++++++++ | ||
82 | docs/specs/acpi_cpu_hotplug.txt | 160 -------------- | ||
83 | docs/specs/acpi_mem_hotplug.rst | 128 +++++++++++ | ||
84 | docs/specs/acpi_mem_hotplug.txt | 94 --------- | ||
85 | docs/specs/acpi_nvdimm.rst | 228 ++++++++++++++++++++ | ||
86 | docs/specs/acpi_nvdimm.txt | 188 ----------------- | ||
87 | .../{acpi_pci_hotplug.txt => acpi_pci_hotplug.rst} | 37 ++-- | ||
88 | docs/specs/index.rst | 4 + | ||
89 | meson.build | 2 + | ||
90 | include/hw/arm/xlnx-versal.h | 2 + | ||
91 | include/hw/arm/xlnx-zynqmp.h | 7 + | ||
92 | include/hw/dma/xlnx-zdma.h | 2 +- | ||
93 | include/hw/dma/xlnx_csu_dma.h | 2 +- | ||
94 | include/sysemu/arch_init.h | 15 +- | ||
95 | target/arm/cpu.h | 17 +- | ||
96 | target/arm/helper.h | 2 + | ||
97 | target/arm/syndrome.h | 7 + | ||
98 | blockdev.c | 1 - | ||
99 | gdbstub.c | 4 +- | ||
100 | hw/arm/raspi.c | 2 +- | ||
101 | hw/arm/virt.c | 5 - | ||
102 | hw/arm/xlnx-versal.c | 4 + | ||
103 | hw/arm/xlnx-zynqmp.c | 86 ++++++-- | ||
104 | hw/core/loader.c | 35 ++- | ||
105 | hw/dma/xlnx-zdma.c | 24 +-- | ||
106 | hw/dma/xlnx_csu_dma.c | 31 ++- | ||
107 | hw/i386/pc.c | 1 - | ||
108 | hw/i386/pc_piix.c | 1 - | ||
109 | hw/i386/pc_q35.c | 1 - | ||
110 | hw/mips/jazz.c | 1 - | ||
111 | hw/mips/malta.c | 1 - | ||
112 | hw/ppc/prep.c | 1 - | ||
113 | hw/riscv/sifive_e.c | 1 - | ||
114 | hw/riscv/sifive_u.c | 1 - | ||
115 | hw/riscv/spike.c | 1 - | ||
116 | hw/riscv/virt.c | 1 - | ||
117 | linux-user/arm/signal.c | 2 - | ||
118 | monitor/qmp-cmds.c | 3 +- | ||
119 | net/net.c | 2 + | ||
120 | softmmu/arch_init.c | 66 ------ | ||
121 | softmmu/physmem.c | 5 +- | ||
122 | softmmu/qdev-monitor.c | 9 + | ||
123 | softmmu/vl.c | 6 +- | ||
124 | stubs/arch_type.c | 4 - | ||
125 | target/arm/cpu.c | 23 ++ | ||
126 | target/arm/cpu64.c | 118 +++++------ | ||
127 | target/arm/helper.c | 40 +++- | ||
128 | target/arm/kvm64.c | 2 +- | ||
129 | target/arm/op_helper.c | 16 ++ | ||
130 | target/arm/translate.c | 12 ++ | ||
131 | target/ppc/cpu_init.c | 1 - | ||
132 | target/s390x/cpu-sysemu.c | 1 - | ||
133 | tests/qtest/ipmi-bt-test.c | 2 +- | ||
134 | tests/tcg/multiarch/linux-test.c | 4 +- | ||
135 | MAINTAINERS | 5 + | ||
136 | hw/arm/Kconfig | 2 - | ||
137 | stubs/meson.build | 1 - | ||
138 | 57 files changed, 949 insertions(+), 707 deletions(-) | ||
139 | create mode 100644 docs/specs/acpi_cpu_hotplug.rst | ||
140 | delete mode 100644 docs/specs/acpi_cpu_hotplug.txt | ||
141 | create mode 100644 docs/specs/acpi_mem_hotplug.rst | ||
142 | delete mode 100644 docs/specs/acpi_mem_hotplug.txt | ||
143 | create mode 100644 docs/specs/acpi_nvdimm.rst | ||
144 | delete mode 100644 docs/specs/acpi_nvdimm.txt | ||
145 | rename docs/specs/{acpi_pci_hotplug.txt => acpi_pci_hotplug.rst} (51%) | ||
146 | delete mode 100644 stubs/arch_type.c | ||
147 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 3 | If we link QOM object (a) as a property of QOM object (b), |
4 | Message-id: 20180228193125.20577-15-richard.henderson@linaro.org | 4 | we must set the property *before* (b) is realized. |
5 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 5 | |
6 | Move QSPI realization *after* QSPI DMA. | ||
7 | |||
8 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
9 | Reviewed-by: Alistair Francis <alistair.francis@wdc.com> | ||
10 | Message-id: 20210819163422.2863447-2-philmd@redhat.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | --- | 12 | --- |
8 | target/arm/translate.c | 61 ++++++++++++++++++++++++++++++++++++++++++++++++++ | 13 | hw/arm/xlnx-zynqmp.c | 42 ++++++++++++++++++++---------------------- |
9 | 1 file changed, 61 insertions(+) | 14 | 1 file changed, 20 insertions(+), 22 deletions(-) |
10 | 15 | ||
11 | diff --git a/target/arm/translate.c b/target/arm/translate.c | 16 | diff --git a/hw/arm/xlnx-zynqmp.c b/hw/arm/xlnx-zynqmp.c |
12 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
13 | --- a/target/arm/translate.c | 18 | --- a/hw/arm/xlnx-zynqmp.c |
14 | +++ b/target/arm/translate.c | 19 | +++ b/hw/arm/xlnx-zynqmp.c |
15 | @@ -XXX,XX +XXX,XX @@ static int disas_neon_insn_3same_ext(DisasContext *s, uint32_t insn) | 20 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) |
16 | return 0; | 21 | g_free(bus_name); |
22 | } | ||
23 | |||
24 | - if (!sysbus_realize(SYS_BUS_DEVICE(&s->qspi), errp)) { | ||
25 | - return; | ||
26 | - } | ||
27 | - sysbus_mmio_map(SYS_BUS_DEVICE(&s->qspi), 0, QSPI_ADDR); | ||
28 | - sysbus_mmio_map(SYS_BUS_DEVICE(&s->qspi), 1, LQSPI_ADDR); | ||
29 | - sysbus_connect_irq(SYS_BUS_DEVICE(&s->qspi), 0, gic_spi[QSPI_IRQ]); | ||
30 | - | ||
31 | - for (i = 0; i < XLNX_ZYNQMP_NUM_QSPI_BUS; i++) { | ||
32 | - gchar *bus_name; | ||
33 | - gchar *target_bus; | ||
34 | - | ||
35 | - /* Alias controller SPI bus to the SoC itself */ | ||
36 | - bus_name = g_strdup_printf("qspi%d", i); | ||
37 | - target_bus = g_strdup_printf("spi%d", i); | ||
38 | - object_property_add_alias(OBJECT(s), bus_name, | ||
39 | - OBJECT(&s->qspi), target_bus); | ||
40 | - g_free(bus_name); | ||
41 | - g_free(target_bus); | ||
42 | - } | ||
43 | - | ||
44 | if (!sysbus_realize(SYS_BUS_DEVICE(&s->dp), errp)) { | ||
45 | return; | ||
46 | } | ||
47 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) | ||
48 | |||
49 | sysbus_mmio_map(SYS_BUS_DEVICE(&s->qspi_dma), 0, QSPI_DMA_ADDR); | ||
50 | sysbus_connect_irq(SYS_BUS_DEVICE(&s->qspi_dma), 0, gic_spi[QSPI_IRQ]); | ||
51 | - object_property_set_link(OBJECT(&s->qspi), "stream-connected-dma", | ||
52 | - OBJECT(&s->qspi_dma), errp); | ||
53 | + | ||
54 | + if (!object_property_set_link(OBJECT(&s->qspi), "stream-connected-dma", | ||
55 | + OBJECT(&s->qspi_dma), errp)) { | ||
56 | + return; | ||
57 | + } | ||
58 | + if (!sysbus_realize(SYS_BUS_DEVICE(&s->qspi), errp)) { | ||
59 | + return; | ||
60 | + } | ||
61 | + sysbus_mmio_map(SYS_BUS_DEVICE(&s->qspi), 0, QSPI_ADDR); | ||
62 | + sysbus_mmio_map(SYS_BUS_DEVICE(&s->qspi), 1, LQSPI_ADDR); | ||
63 | + sysbus_connect_irq(SYS_BUS_DEVICE(&s->qspi), 0, gic_spi[QSPI_IRQ]); | ||
64 | + | ||
65 | + for (i = 0; i < XLNX_ZYNQMP_NUM_QSPI_BUS; i++) { | ||
66 | + g_autofree gchar *bus_name = g_strdup_printf("qspi%d", i); | ||
67 | + g_autofree gchar *target_bus = g_strdup_printf("spi%d", i); | ||
68 | + | ||
69 | + /* Alias controller SPI bus to the SoC itself */ | ||
70 | + object_property_add_alias(OBJECT(s), bus_name, | ||
71 | + OBJECT(&s->qspi), target_bus); | ||
72 | + } | ||
17 | } | 73 | } |
18 | 74 | ||
19 | +/* Advanced SIMD two registers and a scalar extension. | 75 | static Property xlnx_zynqmp_props[] = { |
20 | + * 31 24 23 22 20 16 12 11 10 9 8 3 0 | ||
21 | + * +-----------------+----+---+----+----+----+---+----+---+----+---------+----+ | ||
22 | + * | 1 1 1 1 1 1 1 0 | o1 | D | o2 | Vn | Vd | 1 | o3 | 0 | o4 | N Q M U | Vm | | ||
23 | + * +-----------------+----+---+----+----+----+---+----+---+----+---------+----+ | ||
24 | + * | ||
25 | + */ | ||
26 | + | ||
27 | +static int disas_neon_insn_2reg_scalar_ext(DisasContext *s, uint32_t insn) | ||
28 | +{ | ||
29 | + int rd, rn, rm, rot, size, opr_sz; | ||
30 | + TCGv_ptr fpst; | ||
31 | + bool q; | ||
32 | + | ||
33 | + q = extract32(insn, 6, 1); | ||
34 | + VFP_DREG_D(rd, insn); | ||
35 | + VFP_DREG_N(rn, insn); | ||
36 | + VFP_DREG_M(rm, insn); | ||
37 | + if ((rd | rn) & q) { | ||
38 | + return 1; | ||
39 | + } | ||
40 | + | ||
41 | + if ((insn & 0xff000f10) == 0xfe000800) { | ||
42 | + /* VCMLA (indexed) -- 1111 1110 S.RR .... .... 1000 ...0 .... */ | ||
43 | + rot = extract32(insn, 20, 2); | ||
44 | + size = extract32(insn, 23, 1); | ||
45 | + if (!arm_dc_feature(s, ARM_FEATURE_V8_FCMA) | ||
46 | + || (!size && !arm_dc_feature(s, ARM_FEATURE_V8_FP16))) { | ||
47 | + return 1; | ||
48 | + } | ||
49 | + } else { | ||
50 | + return 1; | ||
51 | + } | ||
52 | + | ||
53 | + if (s->fp_excp_el) { | ||
54 | + gen_exception_insn(s, 4, EXCP_UDEF, | ||
55 | + syn_fp_access_trap(1, 0xe, false), s->fp_excp_el); | ||
56 | + return 0; | ||
57 | + } | ||
58 | + if (!s->vfp_enabled) { | ||
59 | + return 1; | ||
60 | + } | ||
61 | + | ||
62 | + opr_sz = (1 + q) * 8; | ||
63 | + fpst = get_fpstatus_ptr(1); | ||
64 | + tcg_gen_gvec_3_ptr(vfp_reg_offset(1, rd), | ||
65 | + vfp_reg_offset(1, rn), | ||
66 | + vfp_reg_offset(1, rm), fpst, | ||
67 | + opr_sz, opr_sz, rot, | ||
68 | + size ? gen_helper_gvec_fcmlas_idx | ||
69 | + : gen_helper_gvec_fcmlah_idx); | ||
70 | + tcg_temp_free_ptr(fpst); | ||
71 | + return 0; | ||
72 | +} | ||
73 | + | ||
74 | static int disas_coproc_insn(DisasContext *s, uint32_t insn) | ||
75 | { | ||
76 | int cpnum, is64, crn, crm, opc1, opc2, isread, rt, rt2; | ||
77 | @@ -XXX,XX +XXX,XX @@ static void disas_arm_insn(DisasContext *s, unsigned int insn) | ||
78 | goto illegal_op; | ||
79 | } | ||
80 | return; | ||
81 | + } else if ((insn & 0x0f000a00) == 0x0e000800 | ||
82 | + && arm_dc_feature(s, ARM_FEATURE_V8)) { | ||
83 | + if (disas_neon_insn_2reg_scalar_ext(s, insn)) { | ||
84 | + goto illegal_op; | ||
85 | + } | ||
86 | + return; | ||
87 | } else if ((insn & 0x0fe00000) == 0x0c400000) { | ||
88 | /* Coprocessor double register transfer. */ | ||
89 | ARCH(5TE); | ||
90 | -- | 76 | -- |
91 | 2.16.2 | 77 | 2.20.1 |
92 | 78 | ||
93 | 79 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 3 | If some property are not set, we'll return indicating a failure, |
4 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 4 | so it is pointless to allocate / initialize some fields too early. |
5 | Message-id: 20180228193125.20577-14-richard.henderson@linaro.org | 5 | Move the trivial checks earlier in realize(). |
6 | |||
7 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
8 | Reviewed-by: Alistair Francis <alistair.francis@wdc.com> | ||
9 | Message-id: 20210819163422.2863447-3-philmd@redhat.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | --- | 11 | --- |
8 | target/arm/translate.c | 68 ++++++++++++++++++++++++++++++++++++++++++++++++++ | 12 | hw/dma/xlnx_csu_dma.c | 10 +++++----- |
9 | 1 file changed, 68 insertions(+) | 13 | 1 file changed, 5 insertions(+), 5 deletions(-) |
10 | 14 | ||
11 | diff --git a/target/arm/translate.c b/target/arm/translate.c | 15 | diff --git a/hw/dma/xlnx_csu_dma.c b/hw/dma/xlnx_csu_dma.c |
12 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
13 | --- a/target/arm/translate.c | 17 | --- a/hw/dma/xlnx_csu_dma.c |
14 | +++ b/target/arm/translate.c | 18 | +++ b/hw/dma/xlnx_csu_dma.c |
15 | @@ -XXX,XX +XXX,XX @@ static int disas_neon_data_insn(DisasContext *s, uint32_t insn) | 19 | @@ -XXX,XX +XXX,XX @@ static void xlnx_csu_dma_realize(DeviceState *dev, Error **errp) |
16 | return 0; | 20 | XlnxCSUDMA *s = XLNX_CSU_DMA(dev); |
17 | } | 21 | RegisterInfoArray *reg_array; |
18 | 22 | ||
19 | +/* Advanced SIMD three registers of the same length extension. | 23 | + if (!s->is_dst && !s->tx_dev) { |
20 | + * 31 25 23 22 20 16 12 11 10 9 8 3 0 | 24 | + error_setg(errp, "zynqmp.csu-dma: Stream not connected"); |
21 | + * +---------------+-----+---+-----+----+----+---+----+---+----+---------+----+ | 25 | + return; |
22 | + * | 1 1 1 1 1 1 0 | op1 | D | op2 | Vn | Vd | 1 | o3 | 0 | o4 | N Q M U | Vm | | ||
23 | + * +---------------+-----+---+-----+----+----+---+----+---+----+---------+----+ | ||
24 | + */ | ||
25 | +static int disas_neon_insn_3same_ext(DisasContext *s, uint32_t insn) | ||
26 | +{ | ||
27 | + gen_helper_gvec_3_ptr *fn_gvec_ptr; | ||
28 | + int rd, rn, rm, rot, size, opr_sz; | ||
29 | + TCGv_ptr fpst; | ||
30 | + bool q; | ||
31 | + | ||
32 | + q = extract32(insn, 6, 1); | ||
33 | + VFP_DREG_D(rd, insn); | ||
34 | + VFP_DREG_N(rn, insn); | ||
35 | + VFP_DREG_M(rm, insn); | ||
36 | + if ((rd | rn | rm) & q) { | ||
37 | + return 1; | ||
38 | + } | 26 | + } |
39 | + | 27 | + |
40 | + if ((insn & 0xfe200f10) == 0xfc200800) { | 28 | reg_array = |
41 | + /* VCMLA -- 1111 110R R.1S .... .... 1000 ...0 .... */ | 29 | register_init_block32(dev, xlnx_csu_dma_regs_info[!!s->is_dst], |
42 | + size = extract32(insn, 20, 1); | 30 | XLNX_CSU_DMA_R_MAX, |
43 | + rot = extract32(insn, 23, 2); | 31 | @@ -XXX,XX +XXX,XX @@ static void xlnx_csu_dma_realize(DeviceState *dev, Error **errp) |
44 | + if (!arm_dc_feature(s, ARM_FEATURE_V8_FCMA) | 32 | sysbus_init_mmio(SYS_BUS_DEVICE(dev), &s->iomem); |
45 | + || (!size && !arm_dc_feature(s, ARM_FEATURE_V8_FP16))) { | 33 | sysbus_init_irq(SYS_BUS_DEVICE(dev), &s->irq); |
46 | + return 1; | 34 | |
47 | + } | 35 | - if (!s->is_dst && !s->tx_dev) { |
48 | + fn_gvec_ptr = size ? gen_helper_gvec_fcmlas : gen_helper_gvec_fcmlah; | 36 | - error_setg(errp, "zynqmp.csu-dma: Stream not connected"); |
49 | + } else if ((insn & 0xfea00f10) == 0xfc800800) { | 37 | - return; |
50 | + /* VCADD -- 1111 110R 1.0S .... .... 1000 ...0 .... */ | 38 | - } |
51 | + size = extract32(insn, 20, 1); | 39 | - |
52 | + rot = extract32(insn, 24, 1); | 40 | s->src_timer = ptimer_init(xlnx_csu_dma_src_timeout_hit, |
53 | + if (!arm_dc_feature(s, ARM_FEATURE_V8_FCMA) | 41 | s, PTIMER_POLICY_DEFAULT); |
54 | + || (!size && !arm_dc_feature(s, ARM_FEATURE_V8_FP16))) { | 42 | |
55 | + return 1; | ||
56 | + } | ||
57 | + fn_gvec_ptr = size ? gen_helper_gvec_fcadds : gen_helper_gvec_fcaddh; | ||
58 | + } else { | ||
59 | + return 1; | ||
60 | + } | ||
61 | + | ||
62 | + if (s->fp_excp_el) { | ||
63 | + gen_exception_insn(s, 4, EXCP_UDEF, | ||
64 | + syn_fp_access_trap(1, 0xe, false), s->fp_excp_el); | ||
65 | + return 0; | ||
66 | + } | ||
67 | + if (!s->vfp_enabled) { | ||
68 | + return 1; | ||
69 | + } | ||
70 | + | ||
71 | + opr_sz = (1 + q) * 8; | ||
72 | + fpst = get_fpstatus_ptr(1); | ||
73 | + tcg_gen_gvec_3_ptr(vfp_reg_offset(1, rd), | ||
74 | + vfp_reg_offset(1, rn), | ||
75 | + vfp_reg_offset(1, rm), fpst, | ||
76 | + opr_sz, opr_sz, rot, fn_gvec_ptr); | ||
77 | + tcg_temp_free_ptr(fpst); | ||
78 | + return 0; | ||
79 | +} | ||
80 | + | ||
81 | static int disas_coproc_insn(DisasContext *s, uint32_t insn) | ||
82 | { | ||
83 | int cpnum, is64, crn, crm, opc1, opc2, isread, rt, rt2; | ||
84 | @@ -XXX,XX +XXX,XX @@ static void disas_arm_insn(DisasContext *s, unsigned int insn) | ||
85 | } | ||
86 | } | ||
87 | } | ||
88 | + } else if ((insn & 0x0e000a00) == 0x0c000800 | ||
89 | + && arm_dc_feature(s, ARM_FEATURE_V8)) { | ||
90 | + if (disas_neon_insn_3same_ext(s, insn)) { | ||
91 | + goto illegal_op; | ||
92 | + } | ||
93 | + return; | ||
94 | } else if ((insn & 0x0fe00000) == 0x0c400000) { | ||
95 | /* Coprocessor double register transfer. */ | ||
96 | ARCH(5TE); | ||
97 | -- | 43 | -- |
98 | 2.16.2 | 44 | 2.20.1 |
99 | 45 | ||
100 | 46 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | 3 | Simplify by always passing a MemoryRegion property to the device. |
4 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 4 | Doing so we can move the AddressSpace field to the device struct, |
5 | Message-id: 20180228193125.20577-5-richard.henderson@linaro.org | 5 | removing need for heap allocation. |
6 | |||
7 | Update the Xilinx ZynqMP SoC model to pass the default system | ||
8 | memory instead of a NULL value. | ||
9 | |||
10 | Suggested-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
12 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
13 | Message-id: 20210819163422.2863447-4-philmd@redhat.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | --- | 15 | --- |
8 | target/arm/Makefile.objs | 2 +- | 16 | include/hw/dma/xlnx_csu_dma.h | 2 +- |
9 | target/arm/helper.h | 4 ++ | 17 | hw/arm/xlnx-zynqmp.c | 4 ++++ |
10 | target/arm/translate-a64.c | 84 ++++++++++++++++++++++++++++++++++ | 18 | hw/dma/xlnx_csu_dma.c | 21 ++++++++++----------- |
11 | target/arm/vec_helper.c | 109 +++++++++++++++++++++++++++++++++++++++++++++ | 19 | 3 files changed, 15 insertions(+), 12 deletions(-) |
12 | 4 files changed, 198 insertions(+), 1 deletion(-) | ||
13 | create mode 100644 target/arm/vec_helper.c | ||
14 | 20 | ||
15 | diff --git a/target/arm/Makefile.objs b/target/arm/Makefile.objs | 21 | diff --git a/include/hw/dma/xlnx_csu_dma.h b/include/hw/dma/xlnx_csu_dma.h |
16 | index XXXXXXX..XXXXXXX 100644 | 22 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/target/arm/Makefile.objs | 23 | --- a/include/hw/dma/xlnx_csu_dma.h |
18 | +++ b/target/arm/Makefile.objs | 24 | +++ b/include/hw/dma/xlnx_csu_dma.h |
19 | @@ -XXX,XX +XXX,XX @@ obj-$(call land,$(CONFIG_KVM),$(call lnot,$(TARGET_AARCH64))) += kvm32.o | 25 | @@ -XXX,XX +XXX,XX @@ typedef struct XlnxCSUDMA { |
20 | obj-$(call land,$(CONFIG_KVM),$(TARGET_AARCH64)) += kvm64.o | 26 | MemoryRegion iomem; |
21 | obj-$(call lnot,$(CONFIG_KVM)) += kvm-stub.o | 27 | MemTxAttrs attr; |
22 | obj-y += translate.o op_helper.o helper.o cpu.o | 28 | MemoryRegion *dma_mr; |
23 | -obj-y += neon_helper.o iwmmxt_helper.o | 29 | - AddressSpace *dma_as; |
24 | +obj-y += neon_helper.o iwmmxt_helper.o vec_helper.o | 30 | + AddressSpace dma_as; |
25 | obj-y += gdbstub.o | 31 | qemu_irq irq; |
26 | obj-$(TARGET_AARCH64) += cpu64.o translate-a64.o helper-a64.o gdbstub64.o | 32 | StreamSink *tx_dev; /* Used as generic StreamSink */ |
27 | obj-y += crypto_helper.o | 33 | ptimer_state *src_timer; |
28 | diff --git a/target/arm/helper.h b/target/arm/helper.h | 34 | diff --git a/hw/arm/xlnx-zynqmp.c b/hw/arm/xlnx-zynqmp.c |
29 | index XXXXXXX..XXXXXXX 100644 | 35 | index XXXXXXX..XXXXXXX 100644 |
30 | --- a/target/arm/helper.h | 36 | --- a/hw/arm/xlnx-zynqmp.c |
31 | +++ b/target/arm/helper.h | 37 | +++ b/hw/arm/xlnx-zynqmp.c |
32 | @@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_1(neon_rbit_u8, TCG_CALL_NO_RWG_SE, i32, i32) | 38 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) |
33 | 39 | gic_spi[adma_ch_intr[i]]); | |
34 | DEF_HELPER_3(neon_qdmulh_s16, i32, env, i32, i32) | 40 | } |
35 | DEF_HELPER_3(neon_qrdmulh_s16, i32, env, i32, i32) | 41 | |
36 | +DEF_HELPER_4(neon_qrdmlah_s16, i32, env, i32, i32, i32) | 42 | + if (!object_property_set_link(OBJECT(&s->qspi_dma), "dma", |
37 | +DEF_HELPER_4(neon_qrdmlsh_s16, i32, env, i32, i32, i32) | 43 | + OBJECT(system_memory), errp)) { |
38 | DEF_HELPER_3(neon_qdmulh_s32, i32, env, i32, i32) | ||
39 | DEF_HELPER_3(neon_qrdmulh_s32, i32, env, i32, i32) | ||
40 | +DEF_HELPER_4(neon_qrdmlah_s32, i32, env, s32, s32, s32) | ||
41 | +DEF_HELPER_4(neon_qrdmlsh_s32, i32, env, s32, s32, s32) | ||
42 | |||
43 | DEF_HELPER_1(neon_narrow_u8, i32, i64) | ||
44 | DEF_HELPER_1(neon_narrow_u16, i32, i64) | ||
45 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c | ||
46 | index XXXXXXX..XXXXXXX 100644 | ||
47 | --- a/target/arm/translate-a64.c | ||
48 | +++ b/target/arm/translate-a64.c | ||
49 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_scalar_three_reg_same_fp16(DisasContext *s, | ||
50 | tcg_temp_free_ptr(fpst); | ||
51 | } | ||
52 | |||
53 | +/* AdvSIMD scalar three same extra | ||
54 | + * 31 30 29 28 24 23 22 21 20 16 15 14 11 10 9 5 4 0 | ||
55 | + * +-----+---+-----------+------+---+------+---+--------+---+----+----+ | ||
56 | + * | 0 1 | U | 1 1 1 1 0 | size | 0 | Rm | 1 | opcode | 1 | Rn | Rd | | ||
57 | + * +-----+---+-----------+------+---+------+---+--------+---+----+----+ | ||
58 | + */ | ||
59 | +static void disas_simd_scalar_three_reg_same_extra(DisasContext *s, | ||
60 | + uint32_t insn) | ||
61 | +{ | ||
62 | + int rd = extract32(insn, 0, 5); | ||
63 | + int rn = extract32(insn, 5, 5); | ||
64 | + int opcode = extract32(insn, 11, 4); | ||
65 | + int rm = extract32(insn, 16, 5); | ||
66 | + int size = extract32(insn, 22, 2); | ||
67 | + bool u = extract32(insn, 29, 1); | ||
68 | + TCGv_i32 ele1, ele2, ele3; | ||
69 | + TCGv_i64 res; | ||
70 | + int feature; | ||
71 | + | ||
72 | + switch (u * 16 + opcode) { | ||
73 | + case 0x10: /* SQRDMLAH (vector) */ | ||
74 | + case 0x11: /* SQRDMLSH (vector) */ | ||
75 | + if (size != 1 && size != 2) { | ||
76 | + unallocated_encoding(s); | ||
77 | + return; | ||
78 | + } | ||
79 | + feature = ARM_FEATURE_V8_RDM; | ||
80 | + break; | ||
81 | + default: | ||
82 | + unallocated_encoding(s); | ||
83 | + return; | 44 | + return; |
84 | + } | 45 | + } |
85 | + if (!arm_dc_feature(s, feature)) { | 46 | if (!sysbus_realize(SYS_BUS_DEVICE(&s->qspi_dma), errp)) { |
86 | + unallocated_encoding(s); | 47 | return; |
48 | } | ||
49 | diff --git a/hw/dma/xlnx_csu_dma.c b/hw/dma/xlnx_csu_dma.c | ||
50 | index XXXXXXX..XXXXXXX 100644 | ||
51 | --- a/hw/dma/xlnx_csu_dma.c | ||
52 | +++ b/hw/dma/xlnx_csu_dma.c | ||
53 | @@ -XXX,XX +XXX,XX @@ static uint32_t xlnx_csu_dma_read(XlnxCSUDMA *s, uint8_t *buf, uint32_t len) | ||
54 | for (i = 0; i < len && (result == MEMTX_OK); i += s->width) { | ||
55 | uint32_t mlen = MIN(len - i, s->width); | ||
56 | |||
57 | - result = address_space_rw(s->dma_as, addr, s->attr, | ||
58 | + result = address_space_rw(&s->dma_as, addr, s->attr, | ||
59 | buf + i, mlen, false); | ||
60 | } | ||
61 | } else { | ||
62 | - result = address_space_rw(s->dma_as, addr, s->attr, buf, len, false); | ||
63 | + result = address_space_rw(&s->dma_as, addr, s->attr, buf, len, false); | ||
64 | } | ||
65 | |||
66 | if (result == MEMTX_OK) { | ||
67 | @@ -XXX,XX +XXX,XX @@ static uint32_t xlnx_csu_dma_write(XlnxCSUDMA *s, uint8_t *buf, uint32_t len) | ||
68 | for (i = 0; i < len && (result == MEMTX_OK); i += s->width) { | ||
69 | uint32_t mlen = MIN(len - i, s->width); | ||
70 | |||
71 | - result = address_space_rw(s->dma_as, addr, s->attr, | ||
72 | + result = address_space_rw(&s->dma_as, addr, s->attr, | ||
73 | buf, mlen, true); | ||
74 | buf += mlen; | ||
75 | } | ||
76 | } else { | ||
77 | - result = address_space_rw(s->dma_as, addr, s->attr, buf, len, true); | ||
78 | + result = address_space_rw(&s->dma_as, addr, s->attr, buf, len, true); | ||
79 | } | ||
80 | |||
81 | if (result != MEMTX_OK) { | ||
82 | @@ -XXX,XX +XXX,XX @@ static void xlnx_csu_dma_realize(DeviceState *dev, Error **errp) | ||
83 | return; | ||
84 | } | ||
85 | |||
86 | + if (!s->dma_mr) { | ||
87 | + error_setg(errp, TYPE_XLNX_CSU_DMA " 'dma' link not set"); | ||
87 | + return; | 88 | + return; |
88 | + } | 89 | + } |
89 | + if (!fp_access_check(s)) { | 90 | + address_space_init(&s->dma_as, s->dma_mr, "csu-dma"); |
90 | + return; | ||
91 | + } | ||
92 | + | 91 | + |
93 | + /* Do a single operation on the lowest element in the vector. | 92 | reg_array = |
94 | + * We use the standard Neon helpers and rely on 0 OP 0 == 0 | 93 | register_init_block32(dev, xlnx_csu_dma_regs_info[!!s->is_dst], |
95 | + * with no side effects for all these operations. | 94 | XLNX_CSU_DMA_R_MAX, |
96 | + * OPTME: special-purpose helpers would avoid doing some | 95 | @@ -XXX,XX +XXX,XX @@ static void xlnx_csu_dma_realize(DeviceState *dev, Error **errp) |
97 | + * unnecessary work in the helper for the 16 bit cases. | 96 | s->src_timer = ptimer_init(xlnx_csu_dma_src_timeout_hit, |
98 | + */ | 97 | s, PTIMER_POLICY_DEFAULT); |
99 | + ele1 = tcg_temp_new_i32(); | 98 | |
100 | + ele2 = tcg_temp_new_i32(); | 99 | - if (s->dma_mr) { |
101 | + ele3 = tcg_temp_new_i32(); | 100 | - s->dma_as = g_malloc0(sizeof(AddressSpace)); |
102 | + | 101 | - address_space_init(s->dma_as, s->dma_mr, NULL); |
103 | + read_vec_element_i32(s, ele1, rn, 0, size); | 102 | - } else { |
104 | + read_vec_element_i32(s, ele2, rm, 0, size); | 103 | - s->dma_as = &address_space_memory; |
105 | + read_vec_element_i32(s, ele3, rd, 0, size); | 104 | - } |
106 | + | 105 | - |
107 | + switch (opcode) { | 106 | s->attr = MEMTXATTRS_UNSPECIFIED; |
108 | + case 0x0: /* SQRDMLAH */ | 107 | |
109 | + if (size == 1) { | 108 | s->r_size_last_word = 0; |
110 | + gen_helper_neon_qrdmlah_s16(ele3, cpu_env, ele1, ele2, ele3); | ||
111 | + } else { | ||
112 | + gen_helper_neon_qrdmlah_s32(ele3, cpu_env, ele1, ele2, ele3); | ||
113 | + } | ||
114 | + break; | ||
115 | + case 0x1: /* SQRDMLSH */ | ||
116 | + if (size == 1) { | ||
117 | + gen_helper_neon_qrdmlsh_s16(ele3, cpu_env, ele1, ele2, ele3); | ||
118 | + } else { | ||
119 | + gen_helper_neon_qrdmlsh_s32(ele3, cpu_env, ele1, ele2, ele3); | ||
120 | + } | ||
121 | + break; | ||
122 | + default: | ||
123 | + g_assert_not_reached(); | ||
124 | + } | ||
125 | + tcg_temp_free_i32(ele1); | ||
126 | + tcg_temp_free_i32(ele2); | ||
127 | + | ||
128 | + res = tcg_temp_new_i64(); | ||
129 | + tcg_gen_extu_i32_i64(res, ele3); | ||
130 | + tcg_temp_free_i32(ele3); | ||
131 | + | ||
132 | + write_fp_dreg(s, rd, res); | ||
133 | + tcg_temp_free_i64(res); | ||
134 | +} | ||
135 | + | ||
136 | static void handle_2misc_64(DisasContext *s, int opcode, bool u, | ||
137 | TCGv_i64 tcg_rd, TCGv_i64 tcg_rn, | ||
138 | TCGv_i32 tcg_rmode, TCGv_ptr tcg_fpstatus) | ||
139 | @@ -XXX,XX +XXX,XX @@ static const AArch64DecodeTable data_proc_simd[] = { | ||
140 | { 0x0e000800, 0xbf208c00, disas_simd_zip_trn }, | ||
141 | { 0x2e000000, 0xbf208400, disas_simd_ext }, | ||
142 | { 0x5e200400, 0xdf200400, disas_simd_scalar_three_reg_same }, | ||
143 | + { 0x5e008400, 0xdf208400, disas_simd_scalar_three_reg_same_extra }, | ||
144 | { 0x5e200000, 0xdf200c00, disas_simd_scalar_three_reg_diff }, | ||
145 | { 0x5e200800, 0xdf3e0c00, disas_simd_scalar_two_reg_misc }, | ||
146 | { 0x5e300800, 0xdf3e0c00, disas_simd_scalar_pairwise }, | ||
147 | diff --git a/target/arm/vec_helper.c b/target/arm/vec_helper.c | ||
148 | new file mode 100644 | ||
149 | index XXXXXXX..XXXXXXX | ||
150 | --- /dev/null | ||
151 | +++ b/target/arm/vec_helper.c | ||
152 | @@ -XXX,XX +XXX,XX @@ | ||
153 | +/* | ||
154 | + * ARM AdvSIMD / SVE Vector Operations | ||
155 | + * | ||
156 | + * Copyright (c) 2018 Linaro | ||
157 | + * | ||
158 | + * This library is free software; you can redistribute it and/or | ||
159 | + * modify it under the terms of the GNU Lesser General Public | ||
160 | + * License as published by the Free Software Foundation; either | ||
161 | + * version 2 of the License, or (at your option) any later version. | ||
162 | + * | ||
163 | + * This library is distributed in the hope that it will be useful, | ||
164 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
165 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | ||
166 | + * Lesser General Public License for more details. | ||
167 | + * | ||
168 | + * You should have received a copy of the GNU Lesser General Public | ||
169 | + * License along with this library; if not, see <http://www.gnu.org/licenses/>. | ||
170 | + */ | ||
171 | + | ||
172 | +#include "qemu/osdep.h" | ||
173 | +#include "cpu.h" | ||
174 | +#include "exec/exec-all.h" | ||
175 | +#include "exec/helper-proto.h" | ||
176 | +#include "tcg/tcg-gvec-desc.h" | ||
177 | + | ||
178 | + | ||
179 | +#define SET_QC() env->vfp.xregs[ARM_VFP_FPSCR] |= CPSR_Q | ||
180 | + | ||
181 | +/* Signed saturating rounding doubling multiply-accumulate high half, 16-bit */ | ||
182 | +static uint16_t inl_qrdmlah_s16(CPUARMState *env, int16_t src1, | ||
183 | + int16_t src2, int16_t src3) | ||
184 | +{ | ||
185 | + /* Simplify: | ||
186 | + * = ((a3 << 16) + ((e1 * e2) << 1) + (1 << 15)) >> 16 | ||
187 | + * = ((a3 << 15) + (e1 * e2) + (1 << 14)) >> 15 | ||
188 | + */ | ||
189 | + int32_t ret = (int32_t)src1 * src2; | ||
190 | + ret = ((int32_t)src3 << 15) + ret + (1 << 14); | ||
191 | + ret >>= 15; | ||
192 | + if (ret != (int16_t)ret) { | ||
193 | + SET_QC(); | ||
194 | + ret = (ret < 0 ? -0x8000 : 0x7fff); | ||
195 | + } | ||
196 | + return ret; | ||
197 | +} | ||
198 | + | ||
199 | +uint32_t HELPER(neon_qrdmlah_s16)(CPUARMState *env, uint32_t src1, | ||
200 | + uint32_t src2, uint32_t src3) | ||
201 | +{ | ||
202 | + uint16_t e1 = inl_qrdmlah_s16(env, src1, src2, src3); | ||
203 | + uint16_t e2 = inl_qrdmlah_s16(env, src1 >> 16, src2 >> 16, src3 >> 16); | ||
204 | + return deposit32(e1, 16, 16, e2); | ||
205 | +} | ||
206 | + | ||
207 | +/* Signed saturating rounding doubling multiply-subtract high half, 16-bit */ | ||
208 | +static uint16_t inl_qrdmlsh_s16(CPUARMState *env, int16_t src1, | ||
209 | + int16_t src2, int16_t src3) | ||
210 | +{ | ||
211 | + /* Similarly, using subtraction: | ||
212 | + * = ((a3 << 16) - ((e1 * e2) << 1) + (1 << 15)) >> 16 | ||
213 | + * = ((a3 << 15) - (e1 * e2) + (1 << 14)) >> 15 | ||
214 | + */ | ||
215 | + int32_t ret = (int32_t)src1 * src2; | ||
216 | + ret = ((int32_t)src3 << 15) - ret + (1 << 14); | ||
217 | + ret >>= 15; | ||
218 | + if (ret != (int16_t)ret) { | ||
219 | + SET_QC(); | ||
220 | + ret = (ret < 0 ? -0x8000 : 0x7fff); | ||
221 | + } | ||
222 | + return ret; | ||
223 | +} | ||
224 | + | ||
225 | +uint32_t HELPER(neon_qrdmlsh_s16)(CPUARMState *env, uint32_t src1, | ||
226 | + uint32_t src2, uint32_t src3) | ||
227 | +{ | ||
228 | + uint16_t e1 = inl_qrdmlsh_s16(env, src1, src2, src3); | ||
229 | + uint16_t e2 = inl_qrdmlsh_s16(env, src1 >> 16, src2 >> 16, src3 >> 16); | ||
230 | + return deposit32(e1, 16, 16, e2); | ||
231 | +} | ||
232 | + | ||
233 | +/* Signed saturating rounding doubling multiply-accumulate high half, 32-bit */ | ||
234 | +uint32_t HELPER(neon_qrdmlah_s32)(CPUARMState *env, int32_t src1, | ||
235 | + int32_t src2, int32_t src3) | ||
236 | +{ | ||
237 | + /* Simplify similarly to int_qrdmlah_s16 above. */ | ||
238 | + int64_t ret = (int64_t)src1 * src2; | ||
239 | + ret = ((int64_t)src3 << 31) + ret + (1 << 30); | ||
240 | + ret >>= 31; | ||
241 | + if (ret != (int32_t)ret) { | ||
242 | + SET_QC(); | ||
243 | + ret = (ret < 0 ? INT32_MIN : INT32_MAX); | ||
244 | + } | ||
245 | + return ret; | ||
246 | +} | ||
247 | + | ||
248 | +/* Signed saturating rounding doubling multiply-subtract high half, 32-bit */ | ||
249 | +uint32_t HELPER(neon_qrdmlsh_s32)(CPUARMState *env, int32_t src1, | ||
250 | + int32_t src2, int32_t src3) | ||
251 | +{ | ||
252 | + /* Simplify similarly to int_qrdmlsh_s16 above. */ | ||
253 | + int64_t ret = (int64_t)src1 * src2; | ||
254 | + ret = ((int64_t)src3 << 31) - ret + (1 << 30); | ||
255 | + ret >>= 31; | ||
256 | + if (ret != (int32_t)ret) { | ||
257 | + SET_QC(); | ||
258 | + ret = (ret < 0 ? INT32_MIN : INT32_MAX); | ||
259 | + } | ||
260 | + return ret; | ||
261 | +} | ||
262 | -- | 109 | -- |
263 | 2.16.2 | 110 | 2.20.1 |
264 | 111 | ||
265 | 112 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 3 | Simplify by always passing a MemoryRegion property to the device. |
4 | Message-id: 20180228193125.20577-13-richard.henderson@linaro.org | 4 | Doing so we can move the AddressSpace field to the device struct, |
5 | removing need for heap allocation. | ||
6 | |||
7 | Update the Xilinx ZynqMP / Versal SoC models to pass the default | ||
8 | system memory instead of a NULL value. | ||
9 | |||
10 | Suggested-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
12 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
13 | Message-id: 20210819163422.2863447-5-philmd@redhat.com | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
6 | [PMM: renamed e1/e2/e3/e4 to use the same naming as the version | ||
7 | of the pseudocode in the Arm ARM] | ||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | --- | 15 | --- |
10 | target/arm/helper.h | 11 ++++ | 16 | include/hw/dma/xlnx-zdma.h | 2 +- |
11 | target/arm/translate-a64.c | 94 +++++++++++++++++++++++++--- | 17 | hw/arm/xlnx-versal.c | 2 ++ |
12 | target/arm/vec_helper.c | 149 +++++++++++++++++++++++++++++++++++++++++++++ | 18 | hw/arm/xlnx-zynqmp.c | 8 ++++++++ |
13 | 3 files changed, 246 insertions(+), 8 deletions(-) | 19 | hw/dma/xlnx-zdma.c | 24 ++++++++++++------------ |
20 | 4 files changed, 23 insertions(+), 13 deletions(-) | ||
14 | 21 | ||
15 | diff --git a/target/arm/helper.h b/target/arm/helper.h | 22 | diff --git a/include/hw/dma/xlnx-zdma.h b/include/hw/dma/xlnx-zdma.h |
16 | index XXXXXXX..XXXXXXX 100644 | 23 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/target/arm/helper.h | 24 | --- a/include/hw/dma/xlnx-zdma.h |
18 | +++ b/target/arm/helper.h | 25 | +++ b/include/hw/dma/xlnx-zdma.h |
19 | @@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_5(gvec_fcadds, TCG_CALL_NO_RWG, | 26 | @@ -XXX,XX +XXX,XX @@ struct XlnxZDMA { |
20 | DEF_HELPER_FLAGS_5(gvec_fcaddd, TCG_CALL_NO_RWG, | 27 | MemoryRegion iomem; |
21 | void, ptr, ptr, ptr, ptr, i32) | 28 | MemTxAttrs attr; |
22 | 29 | MemoryRegion *dma_mr; | |
23 | +DEF_HELPER_FLAGS_5(gvec_fcmlah, TCG_CALL_NO_RWG, | 30 | - AddressSpace *dma_as; |
24 | + void, ptr, ptr, ptr, ptr, i32) | 31 | + AddressSpace dma_as; |
25 | +DEF_HELPER_FLAGS_5(gvec_fcmlah_idx, TCG_CALL_NO_RWG, | 32 | qemu_irq irq_zdma_ch_imr; |
26 | + void, ptr, ptr, ptr, ptr, i32) | 33 | |
27 | +DEF_HELPER_FLAGS_5(gvec_fcmlas, TCG_CALL_NO_RWG, | 34 | struct { |
28 | + void, ptr, ptr, ptr, ptr, i32) | 35 | diff --git a/hw/arm/xlnx-versal.c b/hw/arm/xlnx-versal.c |
29 | +DEF_HELPER_FLAGS_5(gvec_fcmlas_idx, TCG_CALL_NO_RWG, | ||
30 | + void, ptr, ptr, ptr, ptr, i32) | ||
31 | +DEF_HELPER_FLAGS_5(gvec_fcmlad, TCG_CALL_NO_RWG, | ||
32 | + void, ptr, ptr, ptr, ptr, i32) | ||
33 | + | ||
34 | #ifdef TARGET_AARCH64 | ||
35 | #include "helper-a64.h" | ||
36 | #endif | ||
37 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c | ||
38 | index XXXXXXX..XXXXXXX 100644 | 36 | index XXXXXXX..XXXXXXX 100644 |
39 | --- a/target/arm/translate-a64.c | 37 | --- a/hw/arm/xlnx-versal.c |
40 | +++ b/target/arm/translate-a64.c | 38 | +++ b/hw/arm/xlnx-versal.c |
41 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_three_reg_same_extra(DisasContext *s, uint32_t insn) | 39 | @@ -XXX,XX +XXX,XX @@ static void versal_create_admas(Versal *s, qemu_irq *pic) |
42 | } | 40 | TYPE_XLNX_ZDMA); |
43 | feature = ARM_FEATURE_V8_RDM; | 41 | dev = DEVICE(&s->lpd.iou.adma[i]); |
44 | break; | 42 | object_property_set_int(OBJECT(dev), "bus-width", 128, &error_abort); |
45 | + case 0x8: /* FCMLA, #0 */ | 43 | + object_property_set_link(OBJECT(dev), "dma", |
46 | + case 0x9: /* FCMLA, #90 */ | 44 | + OBJECT(get_system_memory()), &error_fatal); |
47 | + case 0xa: /* FCMLA, #180 */ | 45 | sysbus_realize(SYS_BUS_DEVICE(dev), &error_fatal); |
48 | + case 0xb: /* FCMLA, #270 */ | 46 | |
49 | case 0xc: /* FCADD, #90 */ | 47 | mr = sysbus_mmio_get_region(SYS_BUS_DEVICE(dev), 0); |
50 | case 0xe: /* FCADD, #270 */ | 48 | diff --git a/hw/arm/xlnx-zynqmp.c b/hw/arm/xlnx-zynqmp.c |
51 | if (size == 0 | 49 | index XXXXXXX..XXXXXXX 100644 |
52 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_three_reg_same_extra(DisasContext *s, uint32_t insn) | 50 | --- a/hw/arm/xlnx-zynqmp.c |
53 | } | 51 | +++ b/hw/arm/xlnx-zynqmp.c |
54 | return; | 52 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) |
55 | 53 | errp)) { | |
56 | + case 0x8: /* FCMLA, #0 */ | ||
57 | + case 0x9: /* FCMLA, #90 */ | ||
58 | + case 0xa: /* FCMLA, #180 */ | ||
59 | + case 0xb: /* FCMLA, #270 */ | ||
60 | + rot = extract32(opcode, 0, 2); | ||
61 | + switch (size) { | ||
62 | + case 1: | ||
63 | + gen_gvec_op3_fpst(s, is_q, rd, rn, rm, true, rot, | ||
64 | + gen_helper_gvec_fcmlah); | ||
65 | + break; | ||
66 | + case 2: | ||
67 | + gen_gvec_op3_fpst(s, is_q, rd, rn, rm, false, rot, | ||
68 | + gen_helper_gvec_fcmlas); | ||
69 | + break; | ||
70 | + case 3: | ||
71 | + gen_gvec_op3_fpst(s, is_q, rd, rn, rm, false, rot, | ||
72 | + gen_helper_gvec_fcmlad); | ||
73 | + break; | ||
74 | + default: | ||
75 | + g_assert_not_reached(); | ||
76 | + } | ||
77 | + return; | ||
78 | + | ||
79 | case 0xc: /* FCADD, #90 */ | ||
80 | case 0xe: /* FCADD, #270 */ | ||
81 | rot = extract32(opcode, 1, 1); | ||
82 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | ||
83 | int rn = extract32(insn, 5, 5); | ||
84 | int rd = extract32(insn, 0, 5); | ||
85 | bool is_long = false; | ||
86 | - bool is_fp = false; | ||
87 | + int is_fp = 0; | ||
88 | bool is_fp16 = false; | ||
89 | int index; | ||
90 | TCGv_ptr fpst; | ||
91 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | ||
92 | case 0x05: /* FMLS */ | ||
93 | case 0x09: /* FMUL */ | ||
94 | case 0x19: /* FMULX */ | ||
95 | - is_fp = true; | ||
96 | + is_fp = 1; | ||
97 | break; | ||
98 | case 0x1d: /* SQRDMLAH */ | ||
99 | case 0x1f: /* SQRDMLSH */ | ||
100 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | ||
101 | return; | 54 | return; |
102 | } | 55 | } |
103 | break; | 56 | + if (!object_property_set_link(OBJECT(&s->gdma[i]), "dma", |
104 | + case 0x11: /* FCMLA #0 */ | 57 | + OBJECT(system_memory), errp)) { |
105 | + case 0x13: /* FCMLA #90 */ | ||
106 | + case 0x15: /* FCMLA #180 */ | ||
107 | + case 0x17: /* FCMLA #270 */ | ||
108 | + if (!arm_dc_feature(s, ARM_FEATURE_V8_FCMA)) { | ||
109 | + unallocated_encoding(s); | ||
110 | + return; | 58 | + return; |
111 | + } | 59 | + } |
112 | + is_fp = 2; | 60 | if (!sysbus_realize(SYS_BUS_DEVICE(&s->gdma[i]), errp)) { |
113 | + break; | ||
114 | default: | ||
115 | unallocated_encoding(s); | ||
116 | return; | ||
117 | } | ||
118 | |||
119 | - if (is_fp) { | ||
120 | + switch (is_fp) { | ||
121 | + case 1: /* normal fp */ | ||
122 | /* convert insn encoded size to TCGMemOp size */ | ||
123 | switch (size) { | ||
124 | case 0: /* half-precision */ | ||
125 | - if (!arm_dc_feature(s, ARM_FEATURE_V8_FP16)) { | ||
126 | - unallocated_encoding(s); | ||
127 | - return; | ||
128 | - } | ||
129 | size = MO_16; | ||
130 | + is_fp16 = true; | ||
131 | break; | ||
132 | case MO_32: /* single precision */ | ||
133 | case MO_64: /* double precision */ | ||
134 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | ||
135 | unallocated_encoding(s); | ||
136 | return; | 61 | return; |
137 | } | 62 | } |
138 | - } else { | 63 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) |
139 | + break; | 64 | } |
140 | + | 65 | |
141 | + case 2: /* complex fp */ | 66 | for (i = 0; i < XLNX_ZYNQMP_NUM_ADMA_CH; i++) { |
142 | + /* Each indexable element is a complex pair. */ | 67 | + if (!object_property_set_link(OBJECT(&s->adma[i]), "dma", |
143 | + size <<= 1; | 68 | + OBJECT(system_memory), errp)) { |
144 | + switch (size) { | ||
145 | + case MO_32: | ||
146 | + if (h && !is_q) { | ||
147 | + unallocated_encoding(s); | ||
148 | + return; | ||
149 | + } | ||
150 | + is_fp16 = true; | ||
151 | + break; | ||
152 | + case MO_64: | ||
153 | + break; | ||
154 | + default: | ||
155 | + unallocated_encoding(s); | ||
156 | + return; | 69 | + return; |
157 | + } | 70 | + } |
158 | + break; | 71 | if (!sysbus_realize(SYS_BUS_DEVICE(&s->adma[i]), errp)) { |
159 | + | ||
160 | + default: /* integer */ | ||
161 | switch (size) { | ||
162 | case MO_8: | ||
163 | case MO_64: | ||
164 | unallocated_encoding(s); | ||
165 | return; | 72 | return; |
166 | } | 73 | } |
167 | + break; | 74 | diff --git a/hw/dma/xlnx-zdma.c b/hw/dma/xlnx-zdma.c |
168 | + } | 75 | index XXXXXXX..XXXXXXX 100644 |
169 | + if (is_fp16 && !arm_dc_feature(s, ARM_FEATURE_V8_FP16)) { | 76 | --- a/hw/dma/xlnx-zdma.c |
170 | + unallocated_encoding(s); | 77 | +++ b/hw/dma/xlnx-zdma.c |
171 | + return; | 78 | @@ -XXX,XX +XXX,XX @@ static bool zdma_load_descriptor(XlnxZDMA *s, uint64_t addr, |
79 | return false; | ||
172 | } | 80 | } |
173 | 81 | ||
174 | /* Given TCGMemOp size, adjust register and indexing. */ | 82 | - descr->addr = address_space_ldq_le(s->dma_as, addr, s->attr, NULL); |
175 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | 83 | - descr->size = address_space_ldl_le(s->dma_as, addr + 8, s->attr, NULL); |
176 | fpst = NULL; | 84 | - descr->attr = address_space_ldl_le(s->dma_as, addr + 12, s->attr, NULL); |
85 | + descr->addr = address_space_ldq_le(&s->dma_as, addr, s->attr, NULL); | ||
86 | + descr->size = address_space_ldl_le(&s->dma_as, addr + 8, s->attr, NULL); | ||
87 | + descr->attr = address_space_ldl_le(&s->dma_as, addr + 12, s->attr, NULL); | ||
88 | return true; | ||
89 | } | ||
90 | |||
91 | @@ -XXX,XX +XXX,XX @@ static void zdma_update_descr_addr(XlnxZDMA *s, bool type, | ||
92 | } else { | ||
93 | addr = zdma_get_regaddr64(s, basereg); | ||
94 | addr += sizeof(s->dsc_dst); | ||
95 | - next = address_space_ldq_le(s->dma_as, addr, s->attr, NULL); | ||
96 | + next = address_space_ldq_le(&s->dma_as, addr, s->attr, NULL); | ||
177 | } | 97 | } |
178 | 98 | ||
179 | + switch (16 * u + opcode) { | 99 | zdma_put_regaddr64(s, basereg, next); |
180 | + case 0x11: /* FCMLA #0 */ | 100 | @@ -XXX,XX +XXX,XX @@ static void zdma_write_dst(XlnxZDMA *s, uint8_t *buf, uint32_t len) |
181 | + case 0x13: /* FCMLA #90 */ | 101 | } |
182 | + case 0x15: /* FCMLA #180 */ | 102 | } |
183 | + case 0x17: /* FCMLA #270 */ | 103 | |
184 | + tcg_gen_gvec_3_ptr(vec_full_reg_offset(s, rd), | 104 | - address_space_write(s->dma_as, s->dsc_dst.addr, s->attr, buf, dlen); |
185 | + vec_full_reg_offset(s, rn), | 105 | + address_space_write(&s->dma_as, s->dsc_dst.addr, s->attr, buf, dlen); |
186 | + vec_reg_offset(s, rm, index, size), fpst, | 106 | if (burst_type == AXI_BURST_INCR) { |
187 | + is_q ? 16 : 8, vec_full_reg_size(s), | 107 | s->dsc_dst.addr += dlen; |
188 | + extract32(insn, 13, 2), /* rot */ | 108 | } |
189 | + size == MO_64 | 109 | @@ -XXX,XX +XXX,XX @@ static void zdma_process_descr(XlnxZDMA *s) |
190 | + ? gen_helper_gvec_fcmlas_idx | 110 | len = s->cfg.bus_width / 8; |
191 | + : gen_helper_gvec_fcmlah_idx); | 111 | } |
192 | + tcg_temp_free_ptr(fpst); | 112 | } else { |
113 | - address_space_read(s->dma_as, src_addr, s->attr, s->buf, len); | ||
114 | + address_space_read(&s->dma_as, src_addr, s->attr, s->buf, len); | ||
115 | if (burst_type == AXI_BURST_INCR) { | ||
116 | src_addr += len; | ||
117 | } | ||
118 | @@ -XXX,XX +XXX,XX @@ static void zdma_realize(DeviceState *dev, Error **errp) | ||
119 | XlnxZDMA *s = XLNX_ZDMA(dev); | ||
120 | unsigned int i; | ||
121 | |||
122 | + if (!s->dma_mr) { | ||
123 | + error_setg(errp, TYPE_XLNX_ZDMA " 'dma' link not set"); | ||
193 | + return; | 124 | + return; |
194 | + } | 125 | + } |
126 | + address_space_init(&s->dma_as, s->dma_mr, "zdma-dma"); | ||
195 | + | 127 | + |
196 | if (size == 3) { | 128 | for (i = 0; i < ARRAY_SIZE(zdma_regs_info); ++i) { |
197 | TCGv_i64 tcg_idx = tcg_temp_new_i64(); | 129 | RegisterInfo *r = &s->regs_info[zdma_regs_info[i].addr / 4]; |
198 | int pass; | 130 | |
199 | diff --git a/target/arm/vec_helper.c b/target/arm/vec_helper.c | 131 | @@ -XXX,XX +XXX,XX @@ static void zdma_realize(DeviceState *dev, Error **errp) |
200 | index XXXXXXX..XXXXXXX 100644 | 132 | }; |
201 | --- a/target/arm/vec_helper.c | ||
202 | +++ b/target/arm/vec_helper.c | ||
203 | @@ -XXX,XX +XXX,XX @@ void HELPER(gvec_fcaddd)(void *vd, void *vn, void *vm, | ||
204 | } | 133 | } |
205 | clear_tail(d, opr_sz, simd_maxsz(desc)); | 134 | |
135 | - if (s->dma_mr) { | ||
136 | - s->dma_as = g_malloc0(sizeof(AddressSpace)); | ||
137 | - address_space_init(s->dma_as, s->dma_mr, NULL); | ||
138 | - } else { | ||
139 | - s->dma_as = &address_space_memory; | ||
140 | - } | ||
141 | s->attr = MEMTXATTRS_UNSPECIFIED; | ||
206 | } | 142 | } |
207 | + | 143 | |
208 | +void HELPER(gvec_fcmlah)(void *vd, void *vn, void *vm, | ||
209 | + void *vfpst, uint32_t desc) | ||
210 | +{ | ||
211 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
212 | + float16 *d = vd; | ||
213 | + float16 *n = vn; | ||
214 | + float16 *m = vm; | ||
215 | + float_status *fpst = vfpst; | ||
216 | + intptr_t flip = extract32(desc, SIMD_DATA_SHIFT, 1); | ||
217 | + uint32_t neg_imag = extract32(desc, SIMD_DATA_SHIFT + 1, 1); | ||
218 | + uint32_t neg_real = flip ^ neg_imag; | ||
219 | + uintptr_t i; | ||
220 | + | ||
221 | + /* Shift boolean to the sign bit so we can xor to negate. */ | ||
222 | + neg_real <<= 15; | ||
223 | + neg_imag <<= 15; | ||
224 | + | ||
225 | + for (i = 0; i < opr_sz / 2; i += 2) { | ||
226 | + float16 e2 = n[H2(i + flip)]; | ||
227 | + float16 e1 = m[H2(i + flip)] ^ neg_real; | ||
228 | + float16 e4 = e2; | ||
229 | + float16 e3 = m[H2(i + 1 - flip)] ^ neg_imag; | ||
230 | + | ||
231 | + d[H2(i)] = float16_muladd(e2, e1, d[H2(i)], 0, fpst); | ||
232 | + d[H2(i + 1)] = float16_muladd(e4, e3, d[H2(i + 1)], 0, fpst); | ||
233 | + } | ||
234 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
235 | +} | ||
236 | + | ||
237 | +void HELPER(gvec_fcmlah_idx)(void *vd, void *vn, void *vm, | ||
238 | + void *vfpst, uint32_t desc) | ||
239 | +{ | ||
240 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
241 | + float16 *d = vd; | ||
242 | + float16 *n = vn; | ||
243 | + float16 *m = vm; | ||
244 | + float_status *fpst = vfpst; | ||
245 | + intptr_t flip = extract32(desc, SIMD_DATA_SHIFT, 1); | ||
246 | + uint32_t neg_imag = extract32(desc, SIMD_DATA_SHIFT + 1, 1); | ||
247 | + uint32_t neg_real = flip ^ neg_imag; | ||
248 | + uintptr_t i; | ||
249 | + float16 e1 = m[H2(flip)]; | ||
250 | + float16 e3 = m[H2(1 - flip)]; | ||
251 | + | ||
252 | + /* Shift boolean to the sign bit so we can xor to negate. */ | ||
253 | + neg_real <<= 15; | ||
254 | + neg_imag <<= 15; | ||
255 | + e1 ^= neg_real; | ||
256 | + e3 ^= neg_imag; | ||
257 | + | ||
258 | + for (i = 0; i < opr_sz / 2; i += 2) { | ||
259 | + float16 e2 = n[H2(i + flip)]; | ||
260 | + float16 e4 = e2; | ||
261 | + | ||
262 | + d[H2(i)] = float16_muladd(e2, e1, d[H2(i)], 0, fpst); | ||
263 | + d[H2(i + 1)] = float16_muladd(e4, e3, d[H2(i + 1)], 0, fpst); | ||
264 | + } | ||
265 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
266 | +} | ||
267 | + | ||
268 | +void HELPER(gvec_fcmlas)(void *vd, void *vn, void *vm, | ||
269 | + void *vfpst, uint32_t desc) | ||
270 | +{ | ||
271 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
272 | + float32 *d = vd; | ||
273 | + float32 *n = vn; | ||
274 | + float32 *m = vm; | ||
275 | + float_status *fpst = vfpst; | ||
276 | + intptr_t flip = extract32(desc, SIMD_DATA_SHIFT, 1); | ||
277 | + uint32_t neg_imag = extract32(desc, SIMD_DATA_SHIFT + 1, 1); | ||
278 | + uint32_t neg_real = flip ^ neg_imag; | ||
279 | + uintptr_t i; | ||
280 | + | ||
281 | + /* Shift boolean to the sign bit so we can xor to negate. */ | ||
282 | + neg_real <<= 31; | ||
283 | + neg_imag <<= 31; | ||
284 | + | ||
285 | + for (i = 0; i < opr_sz / 4; i += 2) { | ||
286 | + float32 e2 = n[H4(i + flip)]; | ||
287 | + float32 e1 = m[H4(i + flip)] ^ neg_real; | ||
288 | + float32 e4 = e2; | ||
289 | + float32 e3 = m[H4(i + 1 - flip)] ^ neg_imag; | ||
290 | + | ||
291 | + d[H4(i)] = float32_muladd(e2, e1, d[H4(i)], 0, fpst); | ||
292 | + d[H4(i + 1)] = float32_muladd(e4, e3, d[H4(i + 1)], 0, fpst); | ||
293 | + } | ||
294 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
295 | +} | ||
296 | + | ||
297 | +void HELPER(gvec_fcmlas_idx)(void *vd, void *vn, void *vm, | ||
298 | + void *vfpst, uint32_t desc) | ||
299 | +{ | ||
300 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
301 | + float32 *d = vd; | ||
302 | + float32 *n = vn; | ||
303 | + float32 *m = vm; | ||
304 | + float_status *fpst = vfpst; | ||
305 | + intptr_t flip = extract32(desc, SIMD_DATA_SHIFT, 1); | ||
306 | + uint32_t neg_imag = extract32(desc, SIMD_DATA_SHIFT + 1, 1); | ||
307 | + uint32_t neg_real = flip ^ neg_imag; | ||
308 | + uintptr_t i; | ||
309 | + float32 e1 = m[H4(flip)]; | ||
310 | + float32 e3 = m[H4(1 - flip)]; | ||
311 | + | ||
312 | + /* Shift boolean to the sign bit so we can xor to negate. */ | ||
313 | + neg_real <<= 31; | ||
314 | + neg_imag <<= 31; | ||
315 | + e1 ^= neg_real; | ||
316 | + e3 ^= neg_imag; | ||
317 | + | ||
318 | + for (i = 0; i < opr_sz / 4; i += 2) { | ||
319 | + float32 e2 = n[H4(i + flip)]; | ||
320 | + float32 e4 = e2; | ||
321 | + | ||
322 | + d[H4(i)] = float32_muladd(e2, e1, d[H4(i)], 0, fpst); | ||
323 | + d[H4(i + 1)] = float32_muladd(e4, e3, d[H4(i + 1)], 0, fpst); | ||
324 | + } | ||
325 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
326 | +} | ||
327 | + | ||
328 | +void HELPER(gvec_fcmlad)(void *vd, void *vn, void *vm, | ||
329 | + void *vfpst, uint32_t desc) | ||
330 | +{ | ||
331 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
332 | + float64 *d = vd; | ||
333 | + float64 *n = vn; | ||
334 | + float64 *m = vm; | ||
335 | + float_status *fpst = vfpst; | ||
336 | + intptr_t flip = extract32(desc, SIMD_DATA_SHIFT, 1); | ||
337 | + uint64_t neg_imag = extract32(desc, SIMD_DATA_SHIFT + 1, 1); | ||
338 | + uint64_t neg_real = flip ^ neg_imag; | ||
339 | + uintptr_t i; | ||
340 | + | ||
341 | + /* Shift boolean to the sign bit so we can xor to negate. */ | ||
342 | + neg_real <<= 63; | ||
343 | + neg_imag <<= 63; | ||
344 | + | ||
345 | + for (i = 0; i < opr_sz / 8; i += 2) { | ||
346 | + float64 e2 = n[i + flip]; | ||
347 | + float64 e1 = m[i + flip] ^ neg_real; | ||
348 | + float64 e4 = e2; | ||
349 | + float64 e3 = m[i + 1 - flip] ^ neg_imag; | ||
350 | + | ||
351 | + d[i] = float64_muladd(e2, e1, d[i], 0, fpst); | ||
352 | + d[i + 1] = float64_muladd(e4, e3, d[i + 1], 0, fpst); | ||
353 | + } | ||
354 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
355 | +} | ||
356 | -- | 144 | -- |
357 | 2.16.2 | 145 | 2.20.1 |
358 | 146 | ||
359 | 147 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Ani Sinha <ani@anisinha.ca> |
---|---|---|---|
2 | 2 | ||
3 | Happily, the bits are in the same places compared to a32. | 3 | Since commit |
4 | 36b79e3219d ("hw/acpi/Kconfig: Add missing Kconfig dependencies (build error)"), | ||
5 | ACPI_MEMORY_HOTPLUG and ACPI_NVDIMM is implicitly turned on when | ||
6 | ACPI_HW_REDUCED is selected. ACPI_HW_REDUCED is already enabled. No need to | ||
7 | turn on ACPI_MEMORY_HOTPLUG or ACPI_NVDIMM explicitly. This is a minor cleanup. | ||
4 | 8 | ||
5 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 9 | Signed-off-by: Ani Sinha <ani@anisinha.ca> |
6 | Message-id: 20180228193125.20577-16-richard.henderson@linaro.org | 10 | Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Message-id: 20210819162637.518507-1-ani@anisinha.ca |
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | --- | 13 | --- |
10 | target/arm/translate.c | 14 +++++++++++++- | 14 | hw/arm/Kconfig | 2 -- |
11 | 1 file changed, 13 insertions(+), 1 deletion(-) | 15 | 1 file changed, 2 deletions(-) |
12 | 16 | ||
13 | diff --git a/target/arm/translate.c b/target/arm/translate.c | 17 | diff --git a/hw/arm/Kconfig b/hw/arm/Kconfig |
14 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/target/arm/translate.c | 19 | --- a/hw/arm/Kconfig |
16 | +++ b/target/arm/translate.c | 20 | +++ b/hw/arm/Kconfig |
17 | @@ -XXX,XX +XXX,XX @@ static void disas_thumb2_insn(DisasContext *s, uint32_t insn) | 21 | @@ -XXX,XX +XXX,XX @@ config ARM_VIRT |
18 | default_exception_el(s)); | 22 | select ACPI_PCI |
19 | break; | 23 | select MEM_DEVICE |
20 | } | 24 | select DIMM |
21 | - if (((insn >> 24) & 3) == 3) { | 25 | - select ACPI_MEMORY_HOTPLUG |
22 | + if ((insn & 0xfe000a00) == 0xfc000800 | 26 | select ACPI_HW_REDUCED |
23 | + && arm_dc_feature(s, ARM_FEATURE_V8)) { | 27 | - select ACPI_NVDIMM |
24 | + /* The Thumb2 and ARM encodings are identical. */ | 28 | select ACPI_APEI |
25 | + if (disas_neon_insn_3same_ext(s, insn)) { | 29 | |
26 | + goto illegal_op; | 30 | config CHEETAH |
27 | + } | ||
28 | + } else if ((insn & 0xff000a00) == 0xfe000800 | ||
29 | + && arm_dc_feature(s, ARM_FEATURE_V8)) { | ||
30 | + /* The Thumb2 and ARM encodings are identical. */ | ||
31 | + if (disas_neon_insn_2reg_scalar_ext(s, insn)) { | ||
32 | + goto illegal_op; | ||
33 | + } | ||
34 | + } else if (((insn >> 24) & 3) == 3) { | ||
35 | /* Translate into the equivalent ARM encoding. */ | ||
36 | insn = (insn & 0xe2ffffff) | ((insn & (1 << 28)) >> 4) | (1 << 28); | ||
37 | if (disas_neon_data_insn(s, insn)) { | ||
38 | -- | 31 | -- |
39 | 2.16.2 | 32 | 2.20.1 |
40 | 33 | ||
41 | 34 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Andrew Jones <drjones@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | Not enabled anywhere yet. | 3 | Allow CPUs that support SVE to specify which SVE vector lengths they |
4 | support by setting them in this bitmap. Currently only the 'max' and | ||
5 | 'host' CPU types supports SVE and 'host' requires KVM which obtains | ||
6 | its supported bitmap from the host. So, we only need to initialize the | ||
7 | bitmap for 'max' with TCG. And, since 'max' should support all SVE | ||
8 | vector lengths we simply fill the bitmap. Future CPU types may have | ||
9 | less trivial maps though. | ||
4 | 10 | ||
5 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | 11 | Signed-off-by: Andrew Jones <drjones@redhat.com> |
6 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 12 | Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
7 | Message-id: 20180228193125.20577-11-richard.henderson@linaro.org | 13 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
14 | Message-id: 20210823160647.34028-2-drjones@redhat.com | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 15 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | --- | 16 | --- |
10 | target/arm/cpu.h | 1 + | 17 | target/arm/cpu.h | 4 ++++ |
11 | linux-user/elfload.c | 1 + | 18 | target/arm/cpu64.c | 2 ++ |
12 | 2 files changed, 2 insertions(+) | 19 | 2 files changed, 6 insertions(+) |
13 | 20 | ||
14 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 21 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
15 | index XXXXXXX..XXXXXXX 100644 | 22 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/target/arm/cpu.h | 23 | --- a/target/arm/cpu.h |
17 | +++ b/target/arm/cpu.h | 24 | +++ b/target/arm/cpu.h |
18 | @@ -XXX,XX +XXX,XX @@ enum arm_features { | 25 | @@ -XXX,XX +XXX,XX @@ struct ARMCPU { |
19 | ARM_FEATURE_V8_SM4, /* implements SM4 part of v8 Crypto Extensions */ | 26 | * While processing properties during initialization, corresponding |
20 | ARM_FEATURE_V8_RDM, /* implements v8.1 simd round multiply */ | 27 | * sve_vq_init bits are set for bits in sve_vq_map that have been |
21 | ARM_FEATURE_V8_FP16, /* implements v8.2 half-precision float */ | 28 | * set by properties. |
22 | + ARM_FEATURE_V8_FCMA, /* has complex number part of v8.3 extensions. */ | 29 | + * |
23 | }; | 30 | + * Bits set in sve_vq_supported represent valid vector lengths for |
24 | 31 | + * the CPU type. | |
25 | static inline int arm_feature(CPUARMState *env, int feature) | 32 | */ |
26 | diff --git a/linux-user/elfload.c b/linux-user/elfload.c | 33 | DECLARE_BITMAP(sve_vq_map, ARM_MAX_VQ); |
34 | DECLARE_BITMAP(sve_vq_init, ARM_MAX_VQ); | ||
35 | + DECLARE_BITMAP(sve_vq_supported, ARM_MAX_VQ); | ||
36 | |||
37 | /* Generic timer counter frequency, in Hz */ | ||
38 | uint64_t gt_cntfrq_hz; | ||
39 | diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c | ||
27 | index XXXXXXX..XXXXXXX 100644 | 40 | index XXXXXXX..XXXXXXX 100644 |
28 | --- a/linux-user/elfload.c | 41 | --- a/target/arm/cpu64.c |
29 | +++ b/linux-user/elfload.c | 42 | +++ b/target/arm/cpu64.c |
30 | @@ -XXX,XX +XXX,XX @@ static uint32_t get_elf_hwcap(void) | 43 | @@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj) |
31 | GET_FEATURE(ARM_FEATURE_V8_FP16, | 44 | /* Default to PAUTH on, with the architected algorithm. */ |
32 | ARM_HWCAP_A64_FPHP | ARM_HWCAP_A64_ASIMDHP); | 45 | qdev_property_add_static(DEVICE(obj), &arm_cpu_pauth_property); |
33 | GET_FEATURE(ARM_FEATURE_V8_RDM, ARM_HWCAP_A64_ASIMDRDM); | 46 | qdev_property_add_static(DEVICE(obj), &arm_cpu_pauth_impdef_property); |
34 | + GET_FEATURE(ARM_FEATURE_V8_FCMA, ARM_HWCAP_A64_FCMA); | 47 | + |
35 | #undef GET_FEATURE | 48 | + bitmap_fill(cpu->sve_vq_supported, ARM_MAX_VQ); |
36 | 49 | } | |
37 | return hwcaps; | 50 | |
51 | aarch64_add_sve_properties(obj); | ||
38 | -- | 52 | -- |
39 | 2.16.2 | 53 | 2.20.1 |
40 | 54 | ||
41 | 55 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Andrew Jones <drjones@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | 3 | bitmap_clear() only clears the given range. While the given |
4 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 4 | range should be sufficient in this case we might as well be |
5 | Message-id: 20180228193125.20577-12-richard.henderson@linaro.org | 5 | 100% sure all bits are zeroed by using bitmap_zero(). |
6 | |||
7 | Signed-off-by: Andrew Jones <drjones@redhat.com> | ||
8 | Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
10 | Message-id: 20210823160647.34028-3-drjones@redhat.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | --- | 12 | --- |
8 | target/arm/helper.h | 7 ++++ | 13 | target/arm/kvm64.c | 2 +- |
9 | target/arm/translate-a64.c | 48 ++++++++++++++++++++++- | 14 | 1 file changed, 1 insertion(+), 1 deletion(-) |
10 | target/arm/vec_helper.c | 97 ++++++++++++++++++++++++++++++++++++++++++++++ | ||
11 | 3 files changed, 151 insertions(+), 1 deletion(-) | ||
12 | 15 | ||
13 | diff --git a/target/arm/helper.h b/target/arm/helper.h | 16 | diff --git a/target/arm/kvm64.c b/target/arm/kvm64.c |
14 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/target/arm/helper.h | 18 | --- a/target/arm/kvm64.c |
16 | +++ b/target/arm/helper.h | 19 | +++ b/target/arm/kvm64.c |
17 | @@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_5(gvec_qrdmlah_s32, TCG_CALL_NO_RWG, | 20 | @@ -XXX,XX +XXX,XX @@ void kvm_arm_sve_get_vls(CPUState *cs, unsigned long *map) |
18 | DEF_HELPER_FLAGS_5(gvec_qrdmlsh_s32, TCG_CALL_NO_RWG, | 21 | uint32_t vq = 0; |
19 | void, ptr, ptr, ptr, ptr, i32) | 22 | int i, j; |
20 | 23 | ||
21 | +DEF_HELPER_FLAGS_5(gvec_fcaddh, TCG_CALL_NO_RWG, | 24 | - bitmap_clear(map, 0, ARM_MAX_VQ); |
22 | + void, ptr, ptr, ptr, ptr, i32) | 25 | + bitmap_zero(map, ARM_MAX_VQ); |
23 | +DEF_HELPER_FLAGS_5(gvec_fcadds, TCG_CALL_NO_RWG, | 26 | |
24 | + void, ptr, ptr, ptr, ptr, i32) | 27 | /* |
25 | +DEF_HELPER_FLAGS_5(gvec_fcaddd, TCG_CALL_NO_RWG, | 28 | * KVM ensures all host CPUs support the same set of vector lengths. |
26 | + void, ptr, ptr, ptr, ptr, i32) | ||
27 | + | ||
28 | #ifdef TARGET_AARCH64 | ||
29 | #include "helper-a64.h" | ||
30 | #endif | ||
31 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c | ||
32 | index XXXXXXX..XXXXXXX 100644 | ||
33 | --- a/target/arm/translate-a64.c | ||
34 | +++ b/target/arm/translate-a64.c | ||
35 | @@ -XXX,XX +XXX,XX @@ static void gen_gvec_op3_env(DisasContext *s, bool is_q, int rd, | ||
36 | is_q ? 16 : 8, vec_full_reg_size(s), 0, fn); | ||
37 | } | ||
38 | |||
39 | +/* Expand a 3-operand + fpstatus pointer + simd data value operation using | ||
40 | + * an out-of-line helper. | ||
41 | + */ | ||
42 | +static void gen_gvec_op3_fpst(DisasContext *s, bool is_q, int rd, int rn, | ||
43 | + int rm, bool is_fp16, int data, | ||
44 | + gen_helper_gvec_3_ptr *fn) | ||
45 | +{ | ||
46 | + TCGv_ptr fpst = get_fpstatus_ptr(is_fp16); | ||
47 | + tcg_gen_gvec_3_ptr(vec_full_reg_offset(s, rd), | ||
48 | + vec_full_reg_offset(s, rn), | ||
49 | + vec_full_reg_offset(s, rm), fpst, | ||
50 | + is_q ? 16 : 8, vec_full_reg_size(s), data, fn); | ||
51 | + tcg_temp_free_ptr(fpst); | ||
52 | +} | ||
53 | + | ||
54 | /* Set ZF and NF based on a 64 bit result. This is alas fiddlier | ||
55 | * than the 32 bit equivalent. | ||
56 | */ | ||
57 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_three_reg_same_extra(DisasContext *s, uint32_t insn) | ||
58 | int size = extract32(insn, 22, 2); | ||
59 | bool u = extract32(insn, 29, 1); | ||
60 | bool is_q = extract32(insn, 30, 1); | ||
61 | - int feature; | ||
62 | + int feature, rot; | ||
63 | |||
64 | switch (u * 16 + opcode) { | ||
65 | case 0x10: /* SQRDMLAH (vector) */ | ||
66 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_three_reg_same_extra(DisasContext *s, uint32_t insn) | ||
67 | } | ||
68 | feature = ARM_FEATURE_V8_RDM; | ||
69 | break; | ||
70 | + case 0xc: /* FCADD, #90 */ | ||
71 | + case 0xe: /* FCADD, #270 */ | ||
72 | + if (size == 0 | ||
73 | + || (size == 1 && !arm_dc_feature(s, ARM_FEATURE_V8_FP16)) | ||
74 | + || (size == 3 && !is_q)) { | ||
75 | + unallocated_encoding(s); | ||
76 | + return; | ||
77 | + } | ||
78 | + feature = ARM_FEATURE_V8_FCMA; | ||
79 | + break; | ||
80 | default: | ||
81 | unallocated_encoding(s); | ||
82 | return; | ||
83 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_three_reg_same_extra(DisasContext *s, uint32_t insn) | ||
84 | } | ||
85 | return; | ||
86 | |||
87 | + case 0xc: /* FCADD, #90 */ | ||
88 | + case 0xe: /* FCADD, #270 */ | ||
89 | + rot = extract32(opcode, 1, 1); | ||
90 | + switch (size) { | ||
91 | + case 1: | ||
92 | + gen_gvec_op3_fpst(s, is_q, rd, rn, rm, size == 1, rot, | ||
93 | + gen_helper_gvec_fcaddh); | ||
94 | + break; | ||
95 | + case 2: | ||
96 | + gen_gvec_op3_fpst(s, is_q, rd, rn, rm, size == 1, rot, | ||
97 | + gen_helper_gvec_fcadds); | ||
98 | + break; | ||
99 | + case 3: | ||
100 | + gen_gvec_op3_fpst(s, is_q, rd, rn, rm, size == 1, rot, | ||
101 | + gen_helper_gvec_fcaddd); | ||
102 | + break; | ||
103 | + default: | ||
104 | + g_assert_not_reached(); | ||
105 | + } | ||
106 | + return; | ||
107 | + | ||
108 | default: | ||
109 | g_assert_not_reached(); | ||
110 | } | ||
111 | diff --git a/target/arm/vec_helper.c b/target/arm/vec_helper.c | ||
112 | index XXXXXXX..XXXXXXX 100644 | ||
113 | --- a/target/arm/vec_helper.c | ||
114 | +++ b/target/arm/vec_helper.c | ||
115 | @@ -XXX,XX +XXX,XX @@ | ||
116 | #include "exec/exec-all.h" | ||
117 | #include "exec/helper-proto.h" | ||
118 | #include "tcg/tcg-gvec-desc.h" | ||
119 | +#include "fpu/softfloat.h" | ||
120 | |||
121 | |||
122 | +/* Note that vector data is stored in host-endian 64-bit chunks, | ||
123 | + so addressing units smaller than that needs a host-endian fixup. */ | ||
124 | +#ifdef HOST_WORDS_BIGENDIAN | ||
125 | +#define H1(x) ((x) ^ 7) | ||
126 | +#define H2(x) ((x) ^ 3) | ||
127 | +#define H4(x) ((x) ^ 1) | ||
128 | +#else | ||
129 | +#define H1(x) (x) | ||
130 | +#define H2(x) (x) | ||
131 | +#define H4(x) (x) | ||
132 | +#endif | ||
133 | + | ||
134 | #define SET_QC() env->vfp.xregs[ARM_VFP_FPSCR] |= CPSR_Q | ||
135 | |||
136 | static void clear_tail(void *vd, uintptr_t opr_sz, uintptr_t max_sz) | ||
137 | @@ -XXX,XX +XXX,XX @@ void HELPER(gvec_qrdmlsh_s32)(void *vd, void *vn, void *vm, | ||
138 | } | ||
139 | clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
140 | } | ||
141 | + | ||
142 | +void HELPER(gvec_fcaddh)(void *vd, void *vn, void *vm, | ||
143 | + void *vfpst, uint32_t desc) | ||
144 | +{ | ||
145 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
146 | + float16 *d = vd; | ||
147 | + float16 *n = vn; | ||
148 | + float16 *m = vm; | ||
149 | + float_status *fpst = vfpst; | ||
150 | + uint32_t neg_real = extract32(desc, SIMD_DATA_SHIFT, 1); | ||
151 | + uint32_t neg_imag = neg_real ^ 1; | ||
152 | + uintptr_t i; | ||
153 | + | ||
154 | + /* Shift boolean to the sign bit so we can xor to negate. */ | ||
155 | + neg_real <<= 15; | ||
156 | + neg_imag <<= 15; | ||
157 | + | ||
158 | + for (i = 0; i < opr_sz / 2; i += 2) { | ||
159 | + float16 e0 = n[H2(i)]; | ||
160 | + float16 e1 = m[H2(i + 1)] ^ neg_imag; | ||
161 | + float16 e2 = n[H2(i + 1)]; | ||
162 | + float16 e3 = m[H2(i)] ^ neg_real; | ||
163 | + | ||
164 | + d[H2(i)] = float16_add(e0, e1, fpst); | ||
165 | + d[H2(i + 1)] = float16_add(e2, e3, fpst); | ||
166 | + } | ||
167 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
168 | +} | ||
169 | + | ||
170 | +void HELPER(gvec_fcadds)(void *vd, void *vn, void *vm, | ||
171 | + void *vfpst, uint32_t desc) | ||
172 | +{ | ||
173 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
174 | + float32 *d = vd; | ||
175 | + float32 *n = vn; | ||
176 | + float32 *m = vm; | ||
177 | + float_status *fpst = vfpst; | ||
178 | + uint32_t neg_real = extract32(desc, SIMD_DATA_SHIFT, 1); | ||
179 | + uint32_t neg_imag = neg_real ^ 1; | ||
180 | + uintptr_t i; | ||
181 | + | ||
182 | + /* Shift boolean to the sign bit so we can xor to negate. */ | ||
183 | + neg_real <<= 31; | ||
184 | + neg_imag <<= 31; | ||
185 | + | ||
186 | + for (i = 0; i < opr_sz / 4; i += 2) { | ||
187 | + float32 e0 = n[H4(i)]; | ||
188 | + float32 e1 = m[H4(i + 1)] ^ neg_imag; | ||
189 | + float32 e2 = n[H4(i + 1)]; | ||
190 | + float32 e3 = m[H4(i)] ^ neg_real; | ||
191 | + | ||
192 | + d[H4(i)] = float32_add(e0, e1, fpst); | ||
193 | + d[H4(i + 1)] = float32_add(e2, e3, fpst); | ||
194 | + } | ||
195 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
196 | +} | ||
197 | + | ||
198 | +void HELPER(gvec_fcaddd)(void *vd, void *vn, void *vm, | ||
199 | + void *vfpst, uint32_t desc) | ||
200 | +{ | ||
201 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
202 | + float64 *d = vd; | ||
203 | + float64 *n = vn; | ||
204 | + float64 *m = vm; | ||
205 | + float_status *fpst = vfpst; | ||
206 | + uint64_t neg_real = extract64(desc, SIMD_DATA_SHIFT, 1); | ||
207 | + uint64_t neg_imag = neg_real ^ 1; | ||
208 | + uintptr_t i; | ||
209 | + | ||
210 | + /* Shift boolean to the sign bit so we can xor to negate. */ | ||
211 | + neg_real <<= 63; | ||
212 | + neg_imag <<= 63; | ||
213 | + | ||
214 | + for (i = 0; i < opr_sz / 8; i += 2) { | ||
215 | + float64 e0 = n[i]; | ||
216 | + float64 e1 = m[i + 1] ^ neg_imag; | ||
217 | + float64 e2 = n[i + 1]; | ||
218 | + float64 e3 = m[i] ^ neg_real; | ||
219 | + | ||
220 | + d[i] = float64_add(e0, e1, fpst); | ||
221 | + d[i + 1] = float64_add(e2, e3, fpst); | ||
222 | + } | ||
223 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
224 | +} | ||
225 | -- | 29 | -- |
226 | 2.16.2 | 30 | 2.20.1 |
227 | 31 | ||
228 | 32 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Andrew Jones <drjones@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | Enable it for the "any" CPU used by *-linux-user. | 3 | Now that we have an ARMCPU member sve_vq_supported we no longer |
4 | need the local kvm_supported bitmap for KVM's supported vector | ||
5 | lengths. | ||
4 | 6 | ||
5 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 7 | Signed-off-by: Andrew Jones <drjones@redhat.com> |
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
7 | Message-id: 20180228193125.20577-17-richard.henderson@linaro.org | 9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
10 | Message-id: 20210823160647.34028-4-drjones@redhat.com | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | --- | 12 | --- |
10 | target/arm/cpu.c | 1 + | 13 | target/arm/cpu64.c | 19 +++++++++++-------- |
11 | target/arm/cpu64.c | 1 + | 14 | 1 file changed, 11 insertions(+), 8 deletions(-) |
12 | 2 files changed, 2 insertions(+) | ||
13 | 15 | ||
14 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/target/arm/cpu.c | ||
17 | +++ b/target/arm/cpu.c | ||
18 | @@ -XXX,XX +XXX,XX @@ static void arm_any_initfn(Object *obj) | ||
19 | set_feature(&cpu->env, ARM_FEATURE_V8_PMULL); | ||
20 | set_feature(&cpu->env, ARM_FEATURE_CRC); | ||
21 | set_feature(&cpu->env, ARM_FEATURE_V8_RDM); | ||
22 | + set_feature(&cpu->env, ARM_FEATURE_V8_FCMA); | ||
23 | cpu->midr = 0xffffffff; | ||
24 | } | ||
25 | #endif | ||
26 | diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c | 16 | diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c |
27 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
28 | --- a/target/arm/cpu64.c | 18 | --- a/target/arm/cpu64.c |
29 | +++ b/target/arm/cpu64.c | 19 | +++ b/target/arm/cpu64.c |
30 | @@ -XXX,XX +XXX,XX @@ static void aarch64_any_initfn(Object *obj) | 20 | @@ -XXX,XX +XXX,XX @@ void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp) |
31 | set_feature(&cpu->env, ARM_FEATURE_CRC); | 21 | * any of the above. Finally, if SVE is not disabled, then at least one |
32 | set_feature(&cpu->env, ARM_FEATURE_V8_RDM); | 22 | * vector length must be enabled. |
33 | set_feature(&cpu->env, ARM_FEATURE_V8_FP16); | 23 | */ |
34 | + set_feature(&cpu->env, ARM_FEATURE_V8_FCMA); | 24 | - DECLARE_BITMAP(kvm_supported, ARM_MAX_VQ); |
35 | cpu->ctr = 0x80038003; /* 32 byte I and D cacheline size, VIPT icache */ | 25 | DECLARE_BITMAP(tmp, ARM_MAX_VQ); |
36 | cpu->dcz_blocksize = 7; /* 512 bytes */ | 26 | uint32_t vq, max_vq = 0; |
37 | } | 27 | |
28 | - /* Collect the set of vector lengths supported by KVM. */ | ||
29 | - bitmap_zero(kvm_supported, ARM_MAX_VQ); | ||
30 | + /* | ||
31 | + * CPU models specify a set of supported vector lengths which are | ||
32 | + * enabled by default. Attempting to enable any vector length not set | ||
33 | + * in the supported bitmap results in an error. When KVM is enabled we | ||
34 | + * fetch the supported bitmap from the host. | ||
35 | + */ | ||
36 | if (kvm_enabled() && kvm_arm_sve_supported()) { | ||
37 | - kvm_arm_sve_get_vls(CPU(cpu), kvm_supported); | ||
38 | + kvm_arm_sve_get_vls(CPU(cpu), cpu->sve_vq_supported); | ||
39 | } else if (kvm_enabled()) { | ||
40 | assert(!cpu_isar_feature(aa64_sve, cpu)); | ||
41 | } | ||
42 | @@ -XXX,XX +XXX,XX @@ void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp) | ||
43 | * For KVM we have to automatically enable all supported unitialized | ||
44 | * lengths, even when the smaller lengths are not all powers-of-two. | ||
45 | */ | ||
46 | - bitmap_andnot(tmp, kvm_supported, cpu->sve_vq_init, max_vq); | ||
47 | + bitmap_andnot(tmp, cpu->sve_vq_supported, cpu->sve_vq_init, max_vq); | ||
48 | bitmap_or(cpu->sve_vq_map, cpu->sve_vq_map, tmp, max_vq); | ||
49 | } else { | ||
50 | /* Propagate enabled bits down through required powers-of-two. */ | ||
51 | @@ -XXX,XX +XXX,XX @@ void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp) | ||
52 | /* Disabling a supported length disables all larger lengths. */ | ||
53 | for (vq = 1; vq <= ARM_MAX_VQ; ++vq) { | ||
54 | if (test_bit(vq - 1, cpu->sve_vq_init) && | ||
55 | - test_bit(vq - 1, kvm_supported)) { | ||
56 | + test_bit(vq - 1, cpu->sve_vq_supported)) { | ||
57 | break; | ||
58 | } | ||
59 | } | ||
60 | max_vq = vq <= ARM_MAX_VQ ? vq - 1 : ARM_MAX_VQ; | ||
61 | - bitmap_andnot(cpu->sve_vq_map, kvm_supported, | ||
62 | + bitmap_andnot(cpu->sve_vq_map, cpu->sve_vq_supported, | ||
63 | cpu->sve_vq_init, max_vq); | ||
64 | if (max_vq == 0 || bitmap_empty(cpu->sve_vq_map, max_vq)) { | ||
65 | error_setg(errp, "cannot disable sve%d", vq * 128); | ||
66 | @@ -XXX,XX +XXX,XX @@ void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp) | ||
67 | |||
68 | if (kvm_enabled()) { | ||
69 | /* Ensure the set of lengths matches what KVM supports. */ | ||
70 | - bitmap_xor(tmp, cpu->sve_vq_map, kvm_supported, max_vq); | ||
71 | + bitmap_xor(tmp, cpu->sve_vq_map, cpu->sve_vq_supported, max_vq); | ||
72 | if (!bitmap_empty(tmp, max_vq)) { | ||
73 | vq = find_last_bit(tmp, max_vq) + 1; | ||
74 | if (test_bit(vq - 1, cpu->sve_vq_map)) { | ||
38 | -- | 75 | -- |
39 | 2.16.2 | 76 | 2.20.1 |
40 | 77 | ||
41 | 78 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Andrew Jones <drjones@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | Enable it for the "any" CPU used by *-linux-user. | 3 | Future CPU types may specify which vector lengths are supported. |
4 | We can apply nearly the same logic to validate those lengths | ||
5 | as we do for KVM's supported vector lengths. We merge the code | ||
6 | where we can, but unfortunately can't completely merge it because | ||
7 | KVM requires all vector lengths, power-of-two or not, smaller than | ||
8 | the maximum enabled length to also be enabled. The architecture | ||
9 | only requires all the power-of-two lengths, though, so TCG will | ||
10 | only enforce that. | ||
4 | 11 | ||
5 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 12 | Signed-off-by: Andrew Jones <drjones@redhat.com> |
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 13 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
7 | Message-id: 20180228193125.20577-10-richard.henderson@linaro.org | 14 | Message-id: 20210823160647.34028-5-drjones@redhat.com |
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 15 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | --- | 16 | --- |
10 | target/arm/cpu.c | 1 + | 17 | target/arm/cpu64.c | 101 ++++++++++++++++++++------------------------- |
11 | target/arm/cpu64.c | 1 + | 18 | 1 file changed, 45 insertions(+), 56 deletions(-) |
12 | 2 files changed, 2 insertions(+) | ||
13 | 19 | ||
14 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/target/arm/cpu.c | ||
17 | +++ b/target/arm/cpu.c | ||
18 | @@ -XXX,XX +XXX,XX @@ static void arm_any_initfn(Object *obj) | ||
19 | set_feature(&cpu->env, ARM_FEATURE_V8_SHA256); | ||
20 | set_feature(&cpu->env, ARM_FEATURE_V8_PMULL); | ||
21 | set_feature(&cpu->env, ARM_FEATURE_CRC); | ||
22 | + set_feature(&cpu->env, ARM_FEATURE_V8_RDM); | ||
23 | cpu->midr = 0xffffffff; | ||
24 | } | ||
25 | #endif | ||
26 | diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c | 20 | diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c |
27 | index XXXXXXX..XXXXXXX 100644 | 21 | index XXXXXXX..XXXXXXX 100644 |
28 | --- a/target/arm/cpu64.c | 22 | --- a/target/arm/cpu64.c |
29 | +++ b/target/arm/cpu64.c | 23 | +++ b/target/arm/cpu64.c |
30 | @@ -XXX,XX +XXX,XX @@ static void aarch64_any_initfn(Object *obj) | 24 | @@ -XXX,XX +XXX,XX @@ void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp) |
31 | set_feature(&cpu->env, ARM_FEATURE_V8_SM4); | 25 | break; |
32 | set_feature(&cpu->env, ARM_FEATURE_V8_PMULL); | 26 | } |
33 | set_feature(&cpu->env, ARM_FEATURE_CRC); | 27 | } |
34 | + set_feature(&cpu->env, ARM_FEATURE_V8_RDM); | 28 | - max_vq = vq <= ARM_MAX_VQ ? vq - 1 : ARM_MAX_VQ; |
35 | set_feature(&cpu->env, ARM_FEATURE_V8_FP16); | 29 | - bitmap_andnot(cpu->sve_vq_map, cpu->sve_vq_supported, |
36 | cpu->ctr = 0x80038003; /* 32 byte I and D cacheline size, VIPT icache */ | 30 | - cpu->sve_vq_init, max_vq); |
37 | cpu->dcz_blocksize = 7; /* 512 bytes */ | 31 | - if (max_vq == 0 || bitmap_empty(cpu->sve_vq_map, max_vq)) { |
32 | - error_setg(errp, "cannot disable sve%d", vq * 128); | ||
33 | - error_append_hint(errp, "Disabling sve%d results in all " | ||
34 | - "vector lengths being disabled.\n", | ||
35 | - vq * 128); | ||
36 | - error_append_hint(errp, "With SVE enabled, at least one " | ||
37 | - "vector length must be enabled.\n"); | ||
38 | - return; | ||
39 | - } | ||
40 | } else { | ||
41 | /* Disabling a power-of-two disables all larger lengths. */ | ||
42 | - if (test_bit(0, cpu->sve_vq_init)) { | ||
43 | - error_setg(errp, "cannot disable sve128"); | ||
44 | - error_append_hint(errp, "Disabling sve128 results in all " | ||
45 | - "vector lengths being disabled.\n"); | ||
46 | - error_append_hint(errp, "With SVE enabled, at least one " | ||
47 | - "vector length must be enabled.\n"); | ||
48 | - return; | ||
49 | - } | ||
50 | - for (vq = 2; vq <= ARM_MAX_VQ; vq <<= 1) { | ||
51 | + for (vq = 1; vq <= ARM_MAX_VQ; vq <<= 1) { | ||
52 | if (test_bit(vq - 1, cpu->sve_vq_init)) { | ||
53 | break; | ||
54 | } | ||
55 | } | ||
56 | - max_vq = vq <= ARM_MAX_VQ ? vq - 1 : ARM_MAX_VQ; | ||
57 | - bitmap_complement(cpu->sve_vq_map, cpu->sve_vq_init, max_vq); | ||
58 | + } | ||
59 | + | ||
60 | + max_vq = vq <= ARM_MAX_VQ ? vq - 1 : ARM_MAX_VQ; | ||
61 | + bitmap_andnot(cpu->sve_vq_map, cpu->sve_vq_supported, | ||
62 | + cpu->sve_vq_init, max_vq); | ||
63 | + if (max_vq == 0 || bitmap_empty(cpu->sve_vq_map, max_vq)) { | ||
64 | + error_setg(errp, "cannot disable sve%d", vq * 128); | ||
65 | + error_append_hint(errp, "Disabling sve%d results in all " | ||
66 | + "vector lengths being disabled.\n", | ||
67 | + vq * 128); | ||
68 | + error_append_hint(errp, "With SVE enabled, at least one " | ||
69 | + "vector length must be enabled.\n"); | ||
70 | + return; | ||
71 | } | ||
72 | |||
73 | max_vq = find_last_bit(cpu->sve_vq_map, max_vq) + 1; | ||
74 | @@ -XXX,XX +XXX,XX @@ void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp) | ||
75 | assert(max_vq != 0); | ||
76 | bitmap_clear(cpu->sve_vq_map, max_vq, ARM_MAX_VQ - max_vq); | ||
77 | |||
78 | - if (kvm_enabled()) { | ||
79 | - /* Ensure the set of lengths matches what KVM supports. */ | ||
80 | - bitmap_xor(tmp, cpu->sve_vq_map, cpu->sve_vq_supported, max_vq); | ||
81 | - if (!bitmap_empty(tmp, max_vq)) { | ||
82 | - vq = find_last_bit(tmp, max_vq) + 1; | ||
83 | - if (test_bit(vq - 1, cpu->sve_vq_map)) { | ||
84 | - if (cpu->sve_max_vq) { | ||
85 | - error_setg(errp, "cannot set sve-max-vq=%d", | ||
86 | - cpu->sve_max_vq); | ||
87 | - error_append_hint(errp, "This KVM host does not support " | ||
88 | - "the vector length %d-bits.\n", | ||
89 | - vq * 128); | ||
90 | - error_append_hint(errp, "It may not be possible to use " | ||
91 | - "sve-max-vq with this KVM host. Try " | ||
92 | - "using only sve<N> properties.\n"); | ||
93 | - } else { | ||
94 | - error_setg(errp, "cannot enable sve%d", vq * 128); | ||
95 | - error_append_hint(errp, "This KVM host does not support " | ||
96 | - "the vector length %d-bits.\n", | ||
97 | - vq * 128); | ||
98 | - } | ||
99 | + /* Ensure the set of lengths matches what is supported. */ | ||
100 | + bitmap_xor(tmp, cpu->sve_vq_map, cpu->sve_vq_supported, max_vq); | ||
101 | + if (!bitmap_empty(tmp, max_vq)) { | ||
102 | + vq = find_last_bit(tmp, max_vq) + 1; | ||
103 | + if (test_bit(vq - 1, cpu->sve_vq_map)) { | ||
104 | + if (cpu->sve_max_vq) { | ||
105 | + error_setg(errp, "cannot set sve-max-vq=%d", cpu->sve_max_vq); | ||
106 | + error_append_hint(errp, "This CPU does not support " | ||
107 | + "the vector length %d-bits.\n", vq * 128); | ||
108 | + error_append_hint(errp, "It may not be possible to use " | ||
109 | + "sve-max-vq with this CPU. Try " | ||
110 | + "using only sve<N> properties.\n"); | ||
111 | } else { | ||
112 | + error_setg(errp, "cannot enable sve%d", vq * 128); | ||
113 | + error_append_hint(errp, "This CPU does not support " | ||
114 | + "the vector length %d-bits.\n", vq * 128); | ||
115 | + } | ||
116 | + return; | ||
117 | + } else { | ||
118 | + if (kvm_enabled()) { | ||
119 | error_setg(errp, "cannot disable sve%d", vq * 128); | ||
120 | error_append_hint(errp, "The KVM host requires all " | ||
121 | "supported vector lengths smaller " | ||
122 | "than %d bits to also be enabled.\n", | ||
123 | max_vq * 128); | ||
124 | - } | ||
125 | - return; | ||
126 | - } | ||
127 | - } else { | ||
128 | - /* Ensure all required powers-of-two are enabled. */ | ||
129 | - for (vq = pow2floor(max_vq); vq >= 1; vq >>= 1) { | ||
130 | - if (!test_bit(vq - 1, cpu->sve_vq_map)) { | ||
131 | - error_setg(errp, "cannot disable sve%d", vq * 128); | ||
132 | - error_append_hint(errp, "sve%d is required as it " | ||
133 | - "is a power-of-two length smaller than " | ||
134 | - "the maximum, sve%d\n", | ||
135 | - vq * 128, max_vq * 128); | ||
136 | return; | ||
137 | + } else { | ||
138 | + /* Ensure all required powers-of-two are enabled. */ | ||
139 | + for (vq = pow2floor(max_vq); vq >= 1; vq >>= 1) { | ||
140 | + if (!test_bit(vq - 1, cpu->sve_vq_map)) { | ||
141 | + error_setg(errp, "cannot disable sve%d", vq * 128); | ||
142 | + error_append_hint(errp, "sve%d is required as it " | ||
143 | + "is a power-of-two length smaller " | ||
144 | + "than the maximum, sve%d\n", | ||
145 | + vq * 128, max_vq * 128); | ||
146 | + return; | ||
147 | + } | ||
148 | + } | ||
149 | } | ||
150 | } | ||
151 | } | ||
38 | -- | 152 | -- |
39 | 2.16.2 | 153 | 2.20.1 |
40 | 154 | ||
41 | 155 | diff view generated by jsdifflib |
1 | In some board or SoC models it is necessary to split a qemu_irq line | 1 | Do a basic conversion of the acpi_cpu_hotplug spec document to rST. |
---|---|---|---|
2 | so that one input can feed multiple outputs. We currently have | ||
3 | qemu_irq_split() for this, but that has several deficiencies: | ||
4 | * it can only handle splitting a line into two | ||
5 | * it unavoidably leaks memory, so it can't be used | ||
6 | in a device that can be deleted | ||
7 | |||
8 | Implement a qdev device that encapsulates splitting of IRQs, with a | ||
9 | configurable number of outputs. (This is in some ways the inverse of | ||
10 | the TYPE_OR_IRQ device.) | ||
11 | 2 | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 3 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
13 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 4 | Reviewed-by: Igor Mammedov <imammedo@redhat.com> |
14 | Message-id: 20180220180325.29818-13-peter.maydell@linaro.org | 5 | Message-id: 20210727170414.3368-2-peter.maydell@linaro.org |
15 | --- | 6 | --- |
16 | hw/core/Makefile.objs | 1 + | 7 | docs/specs/acpi_cpu_hotplug.rst | 235 ++++++++++++++++++++++++++++++++ |
17 | include/hw/core/split-irq.h | 57 +++++++++++++++++++++++++++++ | 8 | docs/specs/acpi_cpu_hotplug.txt | 160 ---------------------- |
18 | include/hw/irq.h | 4 +- | 9 | docs/specs/index.rst | 1 + |
19 | hw/core/split-irq.c | 89 +++++++++++++++++++++++++++++++++++++++++++++ | 10 | 3 files changed, 236 insertions(+), 160 deletions(-) |
20 | 4 files changed, 150 insertions(+), 1 deletion(-) | 11 | create mode 100644 docs/specs/acpi_cpu_hotplug.rst |
21 | create mode 100644 include/hw/core/split-irq.h | 12 | delete mode 100644 docs/specs/acpi_cpu_hotplug.txt |
22 | create mode 100644 hw/core/split-irq.c | ||
23 | 13 | ||
24 | diff --git a/hw/core/Makefile.objs b/hw/core/Makefile.objs | 14 | diff --git a/docs/specs/acpi_cpu_hotplug.rst b/docs/specs/acpi_cpu_hotplug.rst |
25 | index XXXXXXX..XXXXXXX 100644 | ||
26 | --- a/hw/core/Makefile.objs | ||
27 | +++ b/hw/core/Makefile.objs | ||
28 | @@ -XXX,XX +XXX,XX @@ common-obj-$(CONFIG_FITLOADER) += loader-fit.o | ||
29 | common-obj-$(CONFIG_SOFTMMU) += qdev-properties-system.o | ||
30 | common-obj-$(CONFIG_SOFTMMU) += register.o | ||
31 | common-obj-$(CONFIG_SOFTMMU) += or-irq.o | ||
32 | +common-obj-$(CONFIG_SOFTMMU) += split-irq.o | ||
33 | common-obj-$(CONFIG_PLATFORM_BUS) += platform-bus.o | ||
34 | |||
35 | obj-$(CONFIG_SOFTMMU) += generic-loader.o | ||
36 | diff --git a/include/hw/core/split-irq.h b/include/hw/core/split-irq.h | ||
37 | new file mode 100644 | 15 | new file mode 100644 |
38 | index XXXXXXX..XXXXXXX | 16 | index XXXXXXX..XXXXXXX |
39 | --- /dev/null | 17 | --- /dev/null |
40 | +++ b/include/hw/core/split-irq.h | 18 | +++ b/docs/specs/acpi_cpu_hotplug.rst |
41 | @@ -XXX,XX +XXX,XX @@ | 19 | @@ -XXX,XX +XXX,XX @@ |
42 | +/* | 20 | +QEMU<->ACPI BIOS CPU hotplug interface |
43 | + * IRQ splitter device. | 21 | +====================================== |
44 | + * | 22 | + |
45 | + * Copyright (c) 2018 Linaro Limited. | 23 | +QEMU supports CPU hotplug via ACPI. This document |
46 | + * Written by Peter Maydell | 24 | +describes the interface between QEMU and the ACPI BIOS. |
47 | + * | 25 | + |
48 | + * Permission is hereby granted, free of charge, to any person obtaining a copy | 26 | +ACPI BIOS GPE.2 handler is dedicated for notifying OS about CPU hot-add |
49 | + * of this software and associated documentation files (the "Software"), to deal | 27 | +and hot-remove events. |
50 | + * in the Software without restriction, including without limitation the rights | 28 | + |
51 | + * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | 29 | + |
52 | + * copies of the Software, and to permit persons to whom the Software is | 30 | +Legacy ACPI CPU hotplug interface registers |
53 | + * furnished to do so, subject to the following conditions: | 31 | +------------------------------------------- |
54 | + * | 32 | + |
55 | + * The above copyright notice and this permission notice shall be included in | 33 | +CPU present bitmap for: |
56 | + * all copies or substantial portions of the Software. | 34 | + |
57 | + * | 35 | +- ICH9-LPC (IO port 0x0cd8-0xcf7, 1-byte access) |
58 | + * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | 36 | +- PIIX-PM (IO port 0xaf00-0xaf1f, 1-byte access) |
59 | + * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | 37 | +- One bit per CPU. Bit position reflects corresponding CPU APIC ID. Read-only. |
60 | + * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL | 38 | +- The first DWORD in bitmap is used in write mode to switch from legacy |
61 | + * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | 39 | + to modern CPU hotplug interface, write 0 into it to do switch. |
62 | + * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | 40 | + |
63 | + * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN | 41 | +QEMU sets corresponding CPU bit on hot-add event and issues SCI |
64 | + * THE SOFTWARE. | 42 | +with GPE.2 event set. CPU present map is read by ACPI BIOS GPE.2 handler |
65 | + */ | 43 | +to notify OS about CPU hot-add events. CPU hot-remove isn't supported. |
66 | + | 44 | + |
67 | +/* This is a simple device which has one GPIO input line and multiple | 45 | + |
68 | + * GPIO output lines. Any change on the input line is forwarded to all | 46 | +Modern ACPI CPU hotplug interface registers |
69 | + * of the outputs. | 47 | +------------------------------------------- |
70 | + * | 48 | + |
71 | + * QEMU interface: | 49 | +Register block base address: |
72 | + * + one unnamed GPIO input: the input line | 50 | + |
73 | + * + N unnamed GPIO outputs: the output lines | 51 | +- ICH9-LPC IO port 0x0cd8 |
74 | + * + QOM property "num-lines": sets the number of output lines | 52 | +- PIIX-PM IO port 0xaf00 |
75 | + */ | 53 | + |
76 | +#ifndef HW_SPLIT_IRQ_H | 54 | +Register block size: |
77 | +#define HW_SPLIT_IRQ_H | 55 | + |
78 | + | 56 | +- ACPI_CPU_HOTPLUG_REG_LEN = 12 |
79 | +#include "hw/irq.h" | 57 | + |
80 | +#include "hw/sysbus.h" | 58 | +All accesses to registers described below, imply little-endian byte order. |
81 | +#include "qom/object.h" | 59 | + |
82 | + | 60 | +Reserved registers behavior: |
83 | +#define TYPE_SPLIT_IRQ "split-irq" | 61 | + |
84 | + | 62 | +- write accesses are ignored |
85 | +#define MAX_SPLIT_LINES 16 | 63 | +- read accesses return all bits set to 0. |
86 | + | 64 | + |
87 | +typedef struct SplitIRQ SplitIRQ; | 65 | +The last stored value in 'CPU selector' must refer to a possible CPU, otherwise |
88 | + | 66 | + |
89 | +#define SPLIT_IRQ(obj) OBJECT_CHECK(SplitIRQ, (obj), TYPE_SPLIT_IRQ) | 67 | +- reads from any register return 0 |
90 | + | 68 | +- writes to any other register are ignored until valid value is stored into it |
91 | +struct SplitIRQ { | 69 | + |
92 | + DeviceState parent_obj; | 70 | +On QEMU start, 'CPU selector' is initialized to a valid value, on reset it |
93 | + | 71 | +keeps the current value. |
94 | + qemu_irq out_irq[MAX_SPLIT_LINES]; | 72 | + |
95 | + uint16_t num_lines; | 73 | +Read access behavior |
96 | +}; | 74 | +^^^^^^^^^^^^^^^^^^^^ |
97 | + | 75 | + |
98 | +#endif | 76 | +offset [0x0-0x3] |
99 | diff --git a/include/hw/irq.h b/include/hw/irq.h | 77 | + Command data 2: (DWORD access) |
78 | + | ||
79 | + If value last stored in 'Command field' is: | ||
80 | + | ||
81 | + 0: | ||
82 | + reads as 0x0 | ||
83 | + 3: | ||
84 | + upper 32 bits of architecture specific CPU ID value | ||
85 | + other values: | ||
86 | + reserved | ||
87 | + | ||
88 | +offset [0x4] | ||
89 | + CPU device status fields: (1 byte access) | ||
90 | + | ||
91 | + bits: | ||
92 | + | ||
93 | + 0: | ||
94 | + Device is enabled and may be used by guest | ||
95 | + 1: | ||
96 | + Device insert event, used to distinguish device for which | ||
97 | + no device check event to OSPM was issued. | ||
98 | + It's valid only when bit 0 is set. | ||
99 | + 2: | ||
100 | + Device remove event, used to distinguish device for which | ||
101 | + no device eject request to OSPM was issued. Firmware must | ||
102 | + ignore this bit. | ||
103 | + 3: | ||
104 | + reserved and should be ignored by OSPM | ||
105 | + 4: | ||
106 | + if set to 1, OSPM requests firmware to perform device eject. | ||
107 | + 5-7: | ||
108 | + reserved and should be ignored by OSPM | ||
109 | + | ||
110 | +offset [0x5-0x7] | ||
111 | + reserved | ||
112 | + | ||
113 | +offset [0x8] | ||
114 | + Command data: (DWORD access) | ||
115 | + | ||
116 | + If value last stored in 'Command field' is one of: | ||
117 | + | ||
118 | + 0: | ||
119 | + contains 'CPU selector' value of a CPU with pending event[s] | ||
120 | + 3: | ||
121 | + lower 32 bits of architecture specific CPU ID value | ||
122 | + (in x86 case: APIC ID) | ||
123 | + otherwise: | ||
124 | + contains 0 | ||
125 | + | ||
126 | +Write access behavior | ||
127 | +^^^^^^^^^^^^^^^^^^^^^ | ||
128 | + | ||
129 | +offset [0x0-0x3] | ||
130 | + CPU selector: (DWORD access) | ||
131 | + | ||
132 | + Selects active CPU device. All following accesses to other | ||
133 | + registers will read/store data from/to selected CPU. | ||
134 | + Valid values: [0 .. max_cpus) | ||
135 | + | ||
136 | +offset [0x4] | ||
137 | + CPU device control fields: (1 byte access) | ||
138 | + | ||
139 | + bits: | ||
140 | + | ||
141 | + 0: | ||
142 | + reserved, OSPM must clear it before writing to register. | ||
143 | + 1: | ||
144 | + if set to 1 clears device insert event, set by OSPM | ||
145 | + after it has emitted device check event for the | ||
146 | + selected CPU device | ||
147 | + 2: | ||
148 | + if set to 1 clears device remove event, set by OSPM | ||
149 | + after it has emitted device eject request for the | ||
150 | + selected CPU device. | ||
151 | + 3: | ||
152 | + if set to 1 initiates device eject, set by OSPM when it | ||
153 | + triggers CPU device removal and calls _EJ0 method or by firmware | ||
154 | + when bit #4 is set. In case bit #4 were set, it's cleared as | ||
155 | + part of device eject. | ||
156 | + 4: | ||
157 | + if set to 1, OSPM hands over device eject to firmware. | ||
158 | + Firmware shall issue device eject request as described above | ||
159 | + (bit #3) and OSPM should not touch device eject bit (#3) in case | ||
160 | + it's asked firmware to perform CPU device eject. | ||
161 | + 5-7: | ||
162 | + reserved, OSPM must clear them before writing to register | ||
163 | + | ||
164 | +offset[0x5] | ||
165 | + Command field: (1 byte access) | ||
166 | + | ||
167 | + value: | ||
168 | + | ||
169 | + 0: | ||
170 | + selects a CPU device with inserting/removing events and | ||
171 | + following reads from 'Command data' register return | ||
172 | + selected CPU ('CPU selector' value). | ||
173 | + If no CPU with events found, the current 'CPU selector' doesn't | ||
174 | + change and corresponding insert/remove event flags are not modified. | ||
175 | + | ||
176 | + 1: | ||
177 | + following writes to 'Command data' register set OST event | ||
178 | + register in QEMU | ||
179 | + 2: | ||
180 | + following writes to 'Command data' register set OST status | ||
181 | + register in QEMU | ||
182 | + 3: | ||
183 | + following reads from 'Command data' and 'Command data 2' return | ||
184 | + architecture specific CPU ID value for currently selected CPU. | ||
185 | + other values: | ||
186 | + reserved | ||
187 | + | ||
188 | +offset [0x6-0x7] | ||
189 | + reserved | ||
190 | + | ||
191 | +offset [0x8] | ||
192 | + Command data: (DWORD access) | ||
193 | + | ||
194 | + If last stored 'Command field' value is: | ||
195 | + | ||
196 | + 1: | ||
197 | + stores value into OST event register | ||
198 | + 2: | ||
199 | + stores value into OST status register, triggers | ||
200 | + ACPI_DEVICE_OST QMP event from QEMU to external applications | ||
201 | + with current values of OST event and status registers. | ||
202 | + other values: | ||
203 | + reserved | ||
204 | + | ||
205 | +Typical usecases | ||
206 | +---------------- | ||
207 | + | ||
208 | +(x86) Detecting and enabling modern CPU hotplug interface | ||
209 | +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | ||
210 | + | ||
211 | +QEMU starts with legacy CPU hotplug interface enabled. Detecting and | ||
212 | +switching to modern interface is based on the 2 legacy CPU hotplug features: | ||
213 | + | ||
214 | +#. Writes into CPU bitmap are ignored. | ||
215 | +#. CPU bitmap always has bit #0 set, corresponding to boot CPU. | ||
216 | + | ||
217 | +Use following steps to detect and enable modern CPU hotplug interface: | ||
218 | + | ||
219 | +#. Store 0x0 to the 'CPU selector' register, attempting to switch to modern mode | ||
220 | +#. Store 0x0 to the 'CPU selector' register, to ensure valid selector value | ||
221 | +#. Store 0x0 to the 'Command field' register | ||
222 | +#. Read the 'Command data 2' register. | ||
223 | + If read value is 0x0, the modern interface is enabled. | ||
224 | + Otherwise legacy or no CPU hotplug interface available | ||
225 | + | ||
226 | +Get a cpu with pending event | ||
227 | +^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | ||
228 | + | ||
229 | +#. Store 0x0 to the 'CPU selector' register. | ||
230 | +#. Store 0x0 to the 'Command field' register. | ||
231 | +#. Read the 'CPU device status fields' register. | ||
232 | +#. If both bit #1 and bit #2 are clear in the value read, there is no CPU | ||
233 | + with a pending event and selected CPU remains unchanged. | ||
234 | +#. Otherwise, read the 'Command data' register. The value read is the | ||
235 | + selector of the CPU with the pending event (which is already selected). | ||
236 | + | ||
237 | +Enumerate CPUs present/non present CPUs | ||
238 | +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | ||
239 | + | ||
240 | +#. Set the present CPU count to 0. | ||
241 | +#. Set the iterator to 0. | ||
242 | +#. Store 0x0 to the 'CPU selector' register, to ensure that it's in | ||
243 | + a valid state and that access to other registers won't be ignored. | ||
244 | +#. Store 0x0 to the 'Command field' register to make 'Command data' | ||
245 | + register return 'CPU selector' value of selected CPU | ||
246 | +#. Read the 'CPU device status fields' register. | ||
247 | +#. If bit #0 is set, increment the present CPU count. | ||
248 | +#. Increment the iterator. | ||
249 | +#. Store the iterator to the 'CPU selector' register. | ||
250 | +#. Read the 'Command data' register. | ||
251 | +#. If the value read is not zero, goto 05. | ||
252 | +#. Otherwise store 0x0 to the 'CPU selector' register, to put it | ||
253 | + into a valid state and exit. | ||
254 | + The iterator at this point equals "max_cpus". | ||
255 | diff --git a/docs/specs/acpi_cpu_hotplug.txt b/docs/specs/acpi_cpu_hotplug.txt | ||
256 | deleted file mode 100644 | ||
257 | index XXXXXXX..XXXXXXX | ||
258 | --- a/docs/specs/acpi_cpu_hotplug.txt | ||
259 | +++ /dev/null | ||
260 | @@ -XXX,XX +XXX,XX @@ | ||
261 | -QEMU<->ACPI BIOS CPU hotplug interface | ||
262 | --------------------------------------- | ||
263 | - | ||
264 | -QEMU supports CPU hotplug via ACPI. This document | ||
265 | -describes the interface between QEMU and the ACPI BIOS. | ||
266 | - | ||
267 | -ACPI BIOS GPE.2 handler is dedicated for notifying OS about CPU hot-add | ||
268 | -and hot-remove events. | ||
269 | - | ||
270 | -============================================ | ||
271 | -Legacy ACPI CPU hotplug interface registers: | ||
272 | --------------------------------------------- | ||
273 | -CPU present bitmap for: | ||
274 | - ICH9-LPC (IO port 0x0cd8-0xcf7, 1-byte access) | ||
275 | - PIIX-PM (IO port 0xaf00-0xaf1f, 1-byte access) | ||
276 | - One bit per CPU. Bit position reflects corresponding CPU APIC ID. Read-only. | ||
277 | - The first DWORD in bitmap is used in write mode to switch from legacy | ||
278 | - to modern CPU hotplug interface, write 0 into it to do switch. | ||
279 | ---------------------------------------------------------------- | ||
280 | -QEMU sets corresponding CPU bit on hot-add event and issues SCI | ||
281 | -with GPE.2 event set. CPU present map is read by ACPI BIOS GPE.2 handler | ||
282 | -to notify OS about CPU hot-add events. CPU hot-remove isn't supported. | ||
283 | - | ||
284 | -===================================== | ||
285 | -Modern ACPI CPU hotplug interface registers: | ||
286 | -------------------------------------- | ||
287 | -Register block base address: | ||
288 | - ICH9-LPC IO port 0x0cd8 | ||
289 | - PIIX-PM IO port 0xaf00 | ||
290 | -Register block size: | ||
291 | - ACPI_CPU_HOTPLUG_REG_LEN = 12 | ||
292 | - | ||
293 | -All accesses to registers described below, imply little-endian byte order. | ||
294 | - | ||
295 | -Reserved resisters behavior: | ||
296 | - - write accesses are ignored | ||
297 | - - read accesses return all bits set to 0. | ||
298 | - | ||
299 | -The last stored value in 'CPU selector' must refer to a possible CPU, otherwise | ||
300 | - - reads from any register return 0 | ||
301 | - - writes to any other register are ignored until valid value is stored into it | ||
302 | -On QEMU start, 'CPU selector' is initialized to a valid value, on reset it | ||
303 | -keeps the current value. | ||
304 | - | ||
305 | -read access: | ||
306 | - offset: | ||
307 | - [0x0-0x3] Command data 2: (DWORD access) | ||
308 | - if value last stored in 'Command field': | ||
309 | - 0: reads as 0x0 | ||
310 | - 3: upper 32 bits of architecture specific CPU ID value | ||
311 | - other values: reserved | ||
312 | - [0x4] CPU device status fields: (1 byte access) | ||
313 | - bits: | ||
314 | - 0: Device is enabled and may be used by guest | ||
315 | - 1: Device insert event, used to distinguish device for which | ||
316 | - no device check event to OSPM was issued. | ||
317 | - It's valid only when bit 0 is set. | ||
318 | - 2: Device remove event, used to distinguish device for which | ||
319 | - no device eject request to OSPM was issued. Firmware must | ||
320 | - ignore this bit. | ||
321 | - 3: reserved and should be ignored by OSPM | ||
322 | - 4: if set to 1, OSPM requests firmware to perform device eject. | ||
323 | - 5-7: reserved and should be ignored by OSPM | ||
324 | - [0x5-0x7] reserved | ||
325 | - [0x8] Command data: (DWORD access) | ||
326 | - contains 0 unless value last stored in 'Command field' is one of: | ||
327 | - 0: contains 'CPU selector' value of a CPU with pending event[s] | ||
328 | - 3: lower 32 bits of architecture specific CPU ID value | ||
329 | - (in x86 case: APIC ID) | ||
330 | - | ||
331 | -write access: | ||
332 | - offset: | ||
333 | - [0x0-0x3] CPU selector: (DWORD access) | ||
334 | - selects active CPU device. All following accesses to other | ||
335 | - registers will read/store data from/to selected CPU. | ||
336 | - Valid values: [0 .. max_cpus) | ||
337 | - [0x4] CPU device control fields: (1 byte access) | ||
338 | - bits: | ||
339 | - 0: reserved, OSPM must clear it before writing to register. | ||
340 | - 1: if set to 1 clears device insert event, set by OSPM | ||
341 | - after it has emitted device check event for the | ||
342 | - selected CPU device | ||
343 | - 2: if set to 1 clears device remove event, set by OSPM | ||
344 | - after it has emitted device eject request for the | ||
345 | - selected CPU device. | ||
346 | - 3: if set to 1 initiates device eject, set by OSPM when it | ||
347 | - triggers CPU device removal and calls _EJ0 method or by firmware | ||
348 | - when bit #4 is set. In case bit #4 were set, it's cleared as | ||
349 | - part of device eject. | ||
350 | - 4: if set to 1, OSPM hands over device eject to firmware. | ||
351 | - Firmware shall issue device eject request as described above | ||
352 | - (bit #3) and OSPM should not touch device eject bit (#3) in case | ||
353 | - it's asked firmware to perform CPU device eject. | ||
354 | - 5-7: reserved, OSPM must clear them before writing to register | ||
355 | - [0x5] Command field: (1 byte access) | ||
356 | - value: | ||
357 | - 0: selects a CPU device with inserting/removing events and | ||
358 | - following reads from 'Command data' register return | ||
359 | - selected CPU ('CPU selector' value). | ||
360 | - If no CPU with events found, the current 'CPU selector' doesn't | ||
361 | - change and corresponding insert/remove event flags are not modified. | ||
362 | - 1: following writes to 'Command data' register set OST event | ||
363 | - register in QEMU | ||
364 | - 2: following writes to 'Command data' register set OST status | ||
365 | - register in QEMU | ||
366 | - 3: following reads from 'Command data' and 'Command data 2' return | ||
367 | - architecture specific CPU ID value for currently selected CPU. | ||
368 | - other values: reserved | ||
369 | - [0x6-0x7] reserved | ||
370 | - [0x8] Command data: (DWORD access) | ||
371 | - if last stored 'Command field' value: | ||
372 | - 1: stores value into OST event register | ||
373 | - 2: stores value into OST status register, triggers | ||
374 | - ACPI_DEVICE_OST QMP event from QEMU to external applications | ||
375 | - with current values of OST event and status registers. | ||
376 | - other values: reserved | ||
377 | - | ||
378 | -Typical usecases: | ||
379 | - - (x86) Detecting and enabling modern CPU hotplug interface. | ||
380 | - QEMU starts with legacy CPU hotplug interface enabled. Detecting and | ||
381 | - switching to modern interface is based on the 2 legacy CPU hotplug features: | ||
382 | - 1. Writes into CPU bitmap are ignored. | ||
383 | - 2. CPU bitmap always has bit#0 set, corresponding to boot CPU. | ||
384 | - | ||
385 | - Use following steps to detect and enable modern CPU hotplug interface: | ||
386 | - 1. Store 0x0 to the 'CPU selector' register, | ||
387 | - attempting to switch to modern mode | ||
388 | - 2. Store 0x0 to the 'CPU selector' register, | ||
389 | - to ensure valid selector value | ||
390 | - 3. Store 0x0 to the 'Command field' register, | ||
391 | - 4. Read the 'Command data 2' register. | ||
392 | - If read value is 0x0, the modern interface is enabled. | ||
393 | - Otherwise legacy or no CPU hotplug interface available | ||
394 | - | ||
395 | - - Get a cpu with pending event | ||
396 | - 1. Store 0x0 to the 'CPU selector' register. | ||
397 | - 2. Store 0x0 to the 'Command field' register. | ||
398 | - 3. Read the 'CPU device status fields' register. | ||
399 | - 4. If both bit#1 and bit#2 are clear in the value read, there is no CPU | ||
400 | - with a pending event and selected CPU remains unchanged. | ||
401 | - 5. Otherwise, read the 'Command data' register. The value read is the | ||
402 | - selector of the CPU with the pending event (which is already | ||
403 | - selected). | ||
404 | - | ||
405 | - - Enumerate CPUs present/non present CPUs | ||
406 | - 01. Set the present CPU count to 0. | ||
407 | - 02. Set the iterator to 0. | ||
408 | - 03. Store 0x0 to the 'CPU selector' register, to ensure that it's in | ||
409 | - a valid state and that access to other registers won't be ignored. | ||
410 | - 04. Store 0x0 to the 'Command field' register to make 'Command data' | ||
411 | - register return 'CPU selector' value of selected CPU | ||
412 | - 05. Read the 'CPU device status fields' register. | ||
413 | - 06. If bit#0 is set, increment the present CPU count. | ||
414 | - 07. Increment the iterator. | ||
415 | - 08. Store the iterator to the 'CPU selector' register. | ||
416 | - 09. Read the 'Command data' register. | ||
417 | - 10. If the value read is not zero, goto 05. | ||
418 | - 11. Otherwise store 0x0 to the 'CPU selector' register, to put it | ||
419 | - into a valid state and exit. | ||
420 | - The iterator at this point equals "max_cpus". | ||
421 | diff --git a/docs/specs/index.rst b/docs/specs/index.rst | ||
100 | index XXXXXXX..XXXXXXX 100644 | 422 | index XXXXXXX..XXXXXXX 100644 |
101 | --- a/include/hw/irq.h | 423 | --- a/docs/specs/index.rst |
102 | +++ b/include/hw/irq.h | 424 | +++ b/docs/specs/index.rst |
103 | @@ -XXX,XX +XXX,XX @@ void qemu_free_irq(qemu_irq irq); | 425 | @@ -XXX,XX +XXX,XX @@ guest hardware that is specific to QEMU. |
104 | /* Returns a new IRQ with opposite polarity. */ | 426 | acpi_hw_reduced_hotplug |
105 | qemu_irq qemu_irq_invert(qemu_irq irq); | 427 | tpm |
106 | 428 | acpi_hest_ghes | |
107 | -/* Returns a new IRQ which feeds into both the passed IRQs */ | 429 | + acpi_cpu_hotplug |
108 | +/* Returns a new IRQ which feeds into both the passed IRQs. | ||
109 | + * It's probably better to use the TYPE_SPLIT_IRQ device instead. | ||
110 | + */ | ||
111 | qemu_irq qemu_irq_split(qemu_irq irq1, qemu_irq irq2); | ||
112 | |||
113 | /* Returns a new IRQ set which connects 1:1 to another IRQ set, which | ||
114 | diff --git a/hw/core/split-irq.c b/hw/core/split-irq.c | ||
115 | new file mode 100644 | ||
116 | index XXXXXXX..XXXXXXX | ||
117 | --- /dev/null | ||
118 | +++ b/hw/core/split-irq.c | ||
119 | @@ -XXX,XX +XXX,XX @@ | ||
120 | +/* | ||
121 | + * IRQ splitter device. | ||
122 | + * | ||
123 | + * Copyright (c) 2018 Linaro Limited. | ||
124 | + * Written by Peter Maydell | ||
125 | + * | ||
126 | + * Permission is hereby granted, free of charge, to any person obtaining a copy | ||
127 | + * of this software and associated documentation files (the "Software"), to deal | ||
128 | + * in the Software without restriction, including without limitation the rights | ||
129 | + * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | ||
130 | + * copies of the Software, and to permit persons to whom the Software is | ||
131 | + * furnished to do so, subject to the following conditions: | ||
132 | + * | ||
133 | + * The above copyright notice and this permission notice shall be included in | ||
134 | + * all copies or substantial portions of the Software. | ||
135 | + * | ||
136 | + * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | ||
137 | + * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | ||
138 | + * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL | ||
139 | + * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | ||
140 | + * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | ||
141 | + * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN | ||
142 | + * THE SOFTWARE. | ||
143 | + */ | ||
144 | + | ||
145 | +#include "qemu/osdep.h" | ||
146 | +#include "hw/core/split-irq.h" | ||
147 | +#include "qapi/error.h" | ||
148 | + | ||
149 | +static void split_irq_handler(void *opaque, int n, int level) | ||
150 | +{ | ||
151 | + SplitIRQ *s = SPLIT_IRQ(opaque); | ||
152 | + int i; | ||
153 | + | ||
154 | + for (i = 0; i < s->num_lines; i++) { | ||
155 | + qemu_set_irq(s->out_irq[i], level); | ||
156 | + } | ||
157 | +} | ||
158 | + | ||
159 | +static void split_irq_init(Object *obj) | ||
160 | +{ | ||
161 | + qdev_init_gpio_in(DEVICE(obj), split_irq_handler, 1); | ||
162 | +} | ||
163 | + | ||
164 | +static void split_irq_realize(DeviceState *dev, Error **errp) | ||
165 | +{ | ||
166 | + SplitIRQ *s = SPLIT_IRQ(dev); | ||
167 | + | ||
168 | + if (s->num_lines < 1 || s->num_lines >= MAX_SPLIT_LINES) { | ||
169 | + error_setg(errp, | ||
170 | + "IRQ splitter number of lines %d is not between 1 and %d", | ||
171 | + s->num_lines, MAX_SPLIT_LINES); | ||
172 | + return; | ||
173 | + } | ||
174 | + | ||
175 | + qdev_init_gpio_out(dev, s->out_irq, s->num_lines); | ||
176 | +} | ||
177 | + | ||
178 | +static Property split_irq_properties[] = { | ||
179 | + DEFINE_PROP_UINT16("num-lines", SplitIRQ, num_lines, 1), | ||
180 | + DEFINE_PROP_END_OF_LIST(), | ||
181 | +}; | ||
182 | + | ||
183 | +static void split_irq_class_init(ObjectClass *klass, void *data) | ||
184 | +{ | ||
185 | + DeviceClass *dc = DEVICE_CLASS(klass); | ||
186 | + | ||
187 | + /* No state to reset or migrate */ | ||
188 | + dc->props = split_irq_properties; | ||
189 | + dc->realize = split_irq_realize; | ||
190 | + | ||
191 | + /* Reason: Needs to be wired up to work */ | ||
192 | + dc->user_creatable = false; | ||
193 | +} | ||
194 | + | ||
195 | +static const TypeInfo split_irq_type_info = { | ||
196 | + .name = TYPE_SPLIT_IRQ, | ||
197 | + .parent = TYPE_DEVICE, | ||
198 | + .instance_size = sizeof(SplitIRQ), | ||
199 | + .instance_init = split_irq_init, | ||
200 | + .class_init = split_irq_class_init, | ||
201 | +}; | ||
202 | + | ||
203 | +static void split_irq_register_types(void) | ||
204 | +{ | ||
205 | + type_register_static(&split_irq_type_info); | ||
206 | +} | ||
207 | + | ||
208 | +type_init(split_irq_register_types) | ||
209 | -- | 430 | -- |
210 | 2.16.2 | 431 | 2.20.1 |
211 | 432 | ||
212 | 433 | diff view generated by jsdifflib |
1 | The Arm IoT Kit includes a "security controller" which is largely a | 1 | Convert the acpi memory hotplug spec to rST. |
---|---|---|---|
2 | collection of registers for controlling the PPCs and other bits of | 2 | |
3 | glue in the system. This commit provides the initial skeleton of the | 3 | Note that this includes converting a lot of weird whitespace |
4 | device, implementing just the ID registers, and a couple of read-only | 4 | characters to plain old spaces (the rST parser does not like |
5 | read-as-zero registers. | 5 | whatever the old ones were). |
6 | 6 | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 8 | Reviewed-by: Igor Mammedov <imammedo@redhat.com> |
9 | Message-id: 20180220180325.29818-16-peter.maydell@linaro.org | 9 | Message-id: 20210727170414.3368-3-peter.maydell@linaro.org |
10 | --- | 10 | --- |
11 | hw/misc/Makefile.objs | 1 + | 11 | docs/specs/acpi_mem_hotplug.rst | 128 ++++++++++++++++++++++++++++++++ |
12 | include/hw/misc/iotkit-secctl.h | 39 ++++ | 12 | docs/specs/acpi_mem_hotplug.txt | 94 ----------------------- |
13 | hw/misc/iotkit-secctl.c | 448 ++++++++++++++++++++++++++++++++++++++++ | 13 | docs/specs/index.rst | 1 + |
14 | default-configs/arm-softmmu.mak | 1 + | 14 | 3 files changed, 129 insertions(+), 94 deletions(-) |
15 | hw/misc/trace-events | 7 + | 15 | create mode 100644 docs/specs/acpi_mem_hotplug.rst |
16 | 5 files changed, 496 insertions(+) | 16 | delete mode 100644 docs/specs/acpi_mem_hotplug.txt |
17 | create mode 100644 include/hw/misc/iotkit-secctl.h | 17 | |
18 | create mode 100644 hw/misc/iotkit-secctl.c | 18 | diff --git a/docs/specs/acpi_mem_hotplug.rst b/docs/specs/acpi_mem_hotplug.rst |
19 | |||
20 | diff --git a/hw/misc/Makefile.objs b/hw/misc/Makefile.objs | ||
21 | index XXXXXXX..XXXXXXX 100644 | ||
22 | --- a/hw/misc/Makefile.objs | ||
23 | +++ b/hw/misc/Makefile.objs | ||
24 | @@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_MPS2_FPGAIO) += mps2-fpgaio.o | ||
25 | obj-$(CONFIG_MPS2_SCC) += mps2-scc.o | ||
26 | |||
27 | obj-$(CONFIG_TZ_PPC) += tz-ppc.o | ||
28 | +obj-$(CONFIG_IOTKIT_SECCTL) += iotkit-secctl.o | ||
29 | |||
30 | obj-$(CONFIG_PVPANIC) += pvpanic.o | ||
31 | obj-$(CONFIG_HYPERV_TESTDEV) += hyperv_testdev.o | ||
32 | diff --git a/include/hw/misc/iotkit-secctl.h b/include/hw/misc/iotkit-secctl.h | ||
33 | new file mode 100644 | 19 | new file mode 100644 |
34 | index XXXXXXX..XXXXXXX | 20 | index XXXXXXX..XXXXXXX |
35 | --- /dev/null | 21 | --- /dev/null |
36 | +++ b/include/hw/misc/iotkit-secctl.h | 22 | +++ b/docs/specs/acpi_mem_hotplug.rst |
37 | @@ -XXX,XX +XXX,XX @@ | 23 | @@ -XXX,XX +XXX,XX @@ |
38 | +/* | 24 | +QEMU<->ACPI BIOS memory hotplug interface |
39 | + * ARM IoT Kit security controller | 25 | +========================================= |
40 | + * | 26 | + |
41 | + * Copyright (c) 2018 Linaro Limited | 27 | +ACPI BIOS GPE.3 handler is dedicated for notifying OS about memory hot-add |
42 | + * Written by Peter Maydell | 28 | +and hot-remove events. |
43 | + * | 29 | + |
44 | + * This program is free software; you can redistribute it and/or modify | 30 | +Memory hot-plug interface (IO port 0xa00-0xa17, 1-4 byte access) |
45 | + * it under the terms of the GNU General Public License version 2 or | 31 | +---------------------------------------------------------------- |
46 | + * (at your option) any later version. | 32 | + |
47 | + */ | 33 | +Read access behavior |
48 | + | 34 | +^^^^^^^^^^^^^^^^^^^^ |
49 | +/* This is a model of the security controller which is part of the | 35 | + |
50 | + * Arm IoT Kit and documented in | 36 | +[0x0-0x3] |
51 | + * http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ecm0601256/index.html | 37 | + Lo part of memory device phys address |
52 | + * | 38 | +[0x4-0x7] |
53 | + * QEMU interface: | 39 | + Hi part of memory device phys address |
54 | + * + sysbus MMIO region 0 is the "secure privilege control block" registers | 40 | +[0x8-0xb] |
55 | + * + sysbus MMIO region 1 is the "non-secure privilege control block" registers | 41 | + Lo part of memory device size in bytes |
56 | + */ | 42 | +[0xc-0xf] |
57 | + | 43 | + Hi part of memory device size in bytes |
58 | +#ifndef IOTKIT_SECCTL_H | 44 | +[0x10-0x13] |
59 | +#define IOTKIT_SECCTL_H | 45 | + Memory device proximity domain |
60 | + | 46 | +[0x14] |
61 | +#include "hw/sysbus.h" | 47 | + Memory device status fields |
62 | + | 48 | + |
63 | +#define TYPE_IOTKIT_SECCTL "iotkit-secctl" | 49 | + bits: |
64 | +#define IOTKIT_SECCTL(obj) OBJECT_CHECK(IoTKitSecCtl, (obj), TYPE_IOTKIT_SECCTL) | 50 | + |
65 | + | 51 | + 0: |
66 | +typedef struct IoTKitSecCtl { | 52 | + Device is enabled and may be used by guest |
67 | + /*< private >*/ | 53 | + 1: |
68 | + SysBusDevice parent_obj; | 54 | + Device insert event, used to distinguish device for which |
69 | + | 55 | + no device check event to OSPM was issued. |
70 | + /*< public >*/ | 56 | + It's valid only when bit 1 is set. |
71 | + | 57 | + 2: |
72 | + MemoryRegion s_regs; | 58 | + Device remove event, used to distinguish device for which |
73 | + MemoryRegion ns_regs; | 59 | + no device eject request to OSPM was issued. |
74 | +} IoTKitSecCtl; | 60 | + 3-7: |
75 | + | 61 | + reserved and should be ignored by OSPM |
76 | +#endif | 62 | + |
77 | diff --git a/hw/misc/iotkit-secctl.c b/hw/misc/iotkit-secctl.c | 63 | +[0x15-0x17] |
78 | new file mode 100644 | 64 | + reserved |
65 | + | ||
66 | +Write access behavior | ||
67 | +^^^^^^^^^^^^^^^^^^^^^ | ||
68 | + | ||
69 | + | ||
70 | +[0x0-0x3] | ||
71 | + Memory device slot selector, selects active memory device. | ||
72 | + All following accesses to other registers in 0xa00-0xa17 | ||
73 | + region will read/store data from/to selected memory device. | ||
74 | +[0x4-0x7] | ||
75 | + OST event code reported by OSPM | ||
76 | +[0x8-0xb] | ||
77 | + OST status code reported by OSPM | ||
78 | +[0xc-0x13] | ||
79 | + reserved, writes into it are ignored | ||
80 | +[0x14] | ||
81 | + Memory device control fields | ||
82 | + | ||
83 | + bits: | ||
84 | + | ||
85 | + 0: | ||
86 | + reserved, OSPM must clear it before writing to register. | ||
87 | + Due to BUG in versions prior 2.4 that field isn't cleared | ||
88 | + when other fields are written. Keep it reserved and don't | ||
89 | + try to reuse it. | ||
90 | + 1: | ||
91 | + if set to 1 clears device insert event, set by OSPM | ||
92 | + after it has emitted device check event for the | ||
93 | + selected memory device | ||
94 | + 2: | ||
95 | + if set to 1 clears device remove event, set by OSPM | ||
96 | + after it has emitted device eject request for the | ||
97 | + selected memory device | ||
98 | + 3: | ||
99 | + if set to 1 initiates device eject, set by OSPM when it | ||
100 | + triggers memory device removal and calls _EJ0 method | ||
101 | + 4-7: | ||
102 | + reserved, OSPM must clear them before writing to register | ||
103 | + | ||
104 | +Selecting memory device slot beyond present range has no effect on platform: | ||
105 | + | ||
106 | +- write accesses to memory hot-plug registers not documented above are ignored | ||
107 | +- read accesses to memory hot-plug registers not documented above return | ||
108 | + all bits set to 1. | ||
109 | + | ||
110 | +Memory hot remove process diagram | ||
111 | +--------------------------------- | ||
112 | + | ||
113 | +:: | ||
114 | + | ||
115 | + +-------------+ +-----------------------+ +------------------+ | ||
116 | + | 1. QEMU | | 2. QEMU | |3. QEMU | | ||
117 | + | device_del +---->+ device unplug request +----->+Send SCI to guest,| | ||
118 | + | | | cb | |return control to | | ||
119 | + | | | | |management | | ||
120 | + +-------------+ +-----------------------+ +------------------+ | ||
121 | + | ||
122 | + +---------------------------------------------------------------------+ | ||
123 | + | ||
124 | + +---------------------+ +-------------------------+ | ||
125 | + | OSPM: | remove event | OSPM: | | ||
126 | + | send Eject Request, | | Scan memory devices | | ||
127 | + | clear remove event +<-------------+ for event flags | | ||
128 | + | | | | | ||
129 | + +---------------------+ +-------------------------+ | ||
130 | + | | ||
131 | + | | ||
132 | + +---------v--------+ +-----------------------+ | ||
133 | + | Guest OS: | success | OSPM: | | ||
134 | + | process Ejection +----------->+ Execute _EJ0 method, | | ||
135 | + | request | | set eject bit in flags| | ||
136 | + +------------------+ +-----------------------+ | ||
137 | + |failure | | ||
138 | + v v | ||
139 | + +------------------------+ +-----------------------+ | ||
140 | + | OSPM: | | QEMU: | | ||
141 | + | set OST event & status | | call device unplug cb | | ||
142 | + | fields | | | | ||
143 | + +------------------------+ +-----------------------+ | ||
144 | + | | | ||
145 | + v v | ||
146 | + +------------------+ +-------------------+ | ||
147 | + |QEMU: | |QEMU: | | ||
148 | + |Send OST QMP event| |Send device deleted| | ||
149 | + | | |QMP event | | ||
150 | + +------------------+ | | | ||
151 | + +-------------------+ | ||
152 | diff --git a/docs/specs/acpi_mem_hotplug.txt b/docs/specs/acpi_mem_hotplug.txt | ||
153 | deleted file mode 100644 | ||
79 | index XXXXXXX..XXXXXXX | 154 | index XXXXXXX..XXXXXXX |
80 | --- /dev/null | 155 | --- a/docs/specs/acpi_mem_hotplug.txt |
81 | +++ b/hw/misc/iotkit-secctl.c | 156 | +++ /dev/null |
82 | @@ -XXX,XX +XXX,XX @@ | 157 | @@ -XXX,XX +XXX,XX @@ |
83 | +/* | 158 | -QEMU<->ACPI BIOS memory hotplug interface |
84 | + * Arm IoT Kit security controller | 159 | --------------------------------------- |
85 | + * | 160 | - |
86 | + * Copyright (c) 2018 Linaro Limited | 161 | -ACPI BIOS GPE.3 handler is dedicated for notifying OS about memory hot-add |
87 | + * Written by Peter Maydell | 162 | -and hot-remove events. |
88 | + * | 163 | - |
89 | + * This program is free software; you can redistribute it and/or modify | 164 | -Memory hot-plug interface (IO port 0xa00-0xa17, 1-4 byte access): |
90 | + * it under the terms of the GNU General Public License version 2 or | 165 | ---------------------------------------------------------------- |
91 | + * (at your option) any later version. | 166 | -0xa00: |
92 | + */ | 167 | - read access: |
93 | + | 168 | - [0x0-0x3] Lo part of memory device phys address |
94 | +#include "qemu/osdep.h" | 169 | - [0x4-0x7] Hi part of memory device phys address |
95 | +#include "qemu/log.h" | 170 | - [0x8-0xb] Lo part of memory device size in bytes |
96 | +#include "qapi/error.h" | 171 | - [0xc-0xf] Hi part of memory device size in bytes |
97 | +#include "trace.h" | 172 | - [0x10-0x13] Memory device proximity domain |
98 | +#include "hw/sysbus.h" | 173 | - [0x14] Memory device status fields |
99 | +#include "hw/registerfields.h" | 174 | - bits: |
100 | +#include "hw/misc/iotkit-secctl.h" | 175 | - 0: Device is enabled and may be used by guest |
101 | + | 176 | - 1: Device insert event, used to distinguish device for which |
102 | +/* Registers in the secure privilege control block */ | 177 | - no device check event to OSPM was issued. |
103 | +REG32(SECRESPCFG, 0x10) | 178 | - It's valid only when bit 1 is set. |
104 | +REG32(NSCCFG, 0x14) | 179 | - 2: Device remove event, used to distinguish device for which |
105 | +REG32(SECMPCINTSTATUS, 0x1c) | 180 | - no device eject request to OSPM was issued. |
106 | +REG32(SECPPCINTSTAT, 0x20) | 181 | - 3-7: reserved and should be ignored by OSPM |
107 | +REG32(SECPPCINTCLR, 0x24) | 182 | - [0x15-0x17] reserved |
108 | +REG32(SECPPCINTEN, 0x28) | 183 | - |
109 | +REG32(SECMSCINTSTAT, 0x30) | 184 | - write access: |
110 | +REG32(SECMSCINTCLR, 0x34) | 185 | - [0x0-0x3] Memory device slot selector, selects active memory device. |
111 | +REG32(SECMSCINTEN, 0x38) | 186 | - All following accesses to other registers in 0xa00-0xa17 |
112 | +REG32(BRGINTSTAT, 0x40) | 187 | - region will read/store data from/to selected memory device. |
113 | +REG32(BRGINTCLR, 0x44) | 188 | - [0x4-0x7] OST event code reported by OSPM |
114 | +REG32(BRGINTEN, 0x48) | 189 | - [0x8-0xb] OST status code reported by OSPM |
115 | +REG32(AHBNSPPC0, 0x50) | 190 | - [0xc-0x13] reserved, writes into it are ignored |
116 | +REG32(AHBNSPPCEXP0, 0x60) | 191 | - [0x14] Memory device control fields |
117 | +REG32(AHBNSPPCEXP1, 0x64) | 192 | - bits: |
118 | +REG32(AHBNSPPCEXP2, 0x68) | 193 | - 0: reserved, OSPM must clear it before writing to register. |
119 | +REG32(AHBNSPPCEXP3, 0x6c) | 194 | - Due to BUG in versions prior 2.4 that field isn't cleared |
120 | +REG32(APBNSPPC0, 0x70) | 195 | - when other fields are written. Keep it reserved and don't |
121 | +REG32(APBNSPPC1, 0x74) | 196 | - try to reuse it. |
122 | +REG32(APBNSPPCEXP0, 0x80) | 197 | - 1: if set to 1 clears device insert event, set by OSPM |
123 | +REG32(APBNSPPCEXP1, 0x84) | 198 | - after it has emitted device check event for the |
124 | +REG32(APBNSPPCEXP2, 0x88) | 199 | - selected memory device |
125 | +REG32(APBNSPPCEXP3, 0x8c) | 200 | - 2: if set to 1 clears device remove event, set by OSPM |
126 | +REG32(AHBSPPPC0, 0x90) | 201 | - after it has emitted device eject request for the |
127 | +REG32(AHBSPPPCEXP0, 0xa0) | 202 | - selected memory device |
128 | +REG32(AHBSPPPCEXP1, 0xa4) | 203 | - 3: if set to 1 initiates device eject, set by OSPM when it |
129 | +REG32(AHBSPPPCEXP2, 0xa8) | 204 | - triggers memory device removal and calls _EJ0 method |
130 | +REG32(AHBSPPPCEXP3, 0xac) | 205 | - 4-7: reserved, OSPM must clear them before writing to register |
131 | +REG32(APBSPPPC0, 0xb0) | 206 | - |
132 | +REG32(APBSPPPC1, 0xb4) | 207 | -Selecting memory device slot beyond present range has no effect on platform: |
133 | +REG32(APBSPPPCEXP0, 0xc0) | 208 | - - write accesses to memory hot-plug registers not documented above are |
134 | +REG32(APBSPPPCEXP1, 0xc4) | 209 | - ignored |
135 | +REG32(APBSPPPCEXP2, 0xc8) | 210 | - - read accesses to memory hot-plug registers not documented above return |
136 | +REG32(APBSPPPCEXP3, 0xcc) | 211 | - all bits set to 1. |
137 | +REG32(NSMSCEXP, 0xd0) | 212 | - |
138 | +REG32(PID4, 0xfd0) | 213 | -Memory hot remove process diagram: |
139 | +REG32(PID5, 0xfd4) | 214 | ----------------------------------- |
140 | +REG32(PID6, 0xfd8) | 215 | - +-------------+ +-----------------------+ +------------------+ |
141 | +REG32(PID7, 0xfdc) | 216 | - | 1. QEMU | | 2. QEMU | |3. QEMU | |
142 | +REG32(PID0, 0xfe0) | 217 | - | device_del +---->+ device unplug request +----->+Send SCI to guest,| |
143 | +REG32(PID1, 0xfe4) | 218 | - | | | cb | |return control to | |
144 | +REG32(PID2, 0xfe8) | 219 | - +-------------+ +-----------------------+ |management | |
145 | +REG32(PID3, 0xfec) | 220 | - +------------------+ |
146 | +REG32(CID0, 0xff0) | 221 | - |
147 | +REG32(CID1, 0xff4) | 222 | - +---------------------------------------------------------------------+ |
148 | +REG32(CID2, 0xff8) | 223 | - |
149 | +REG32(CID3, 0xffc) | 224 | - +---------------------+ +-------------------------+ |
150 | + | 225 | - | OSPM: | remove event | OSPM: | |
151 | +/* Registers in the non-secure privilege control block */ | 226 | - | send Eject Request, | | Scan memory devices | |
152 | +REG32(AHBNSPPPC0, 0x90) | 227 | - | clear remove event +<-------------+ for event flags | |
153 | +REG32(AHBNSPPPCEXP0, 0xa0) | 228 | - | | | | |
154 | +REG32(AHBNSPPPCEXP1, 0xa4) | 229 | - +---------------------+ +-------------------------+ |
155 | +REG32(AHBNSPPPCEXP2, 0xa8) | 230 | - | |
156 | +REG32(AHBNSPPPCEXP3, 0xac) | 231 | - | |
157 | +REG32(APBNSPPPC0, 0xb0) | 232 | - +---------v--------+ +-----------------------+ |
158 | +REG32(APBNSPPPC1, 0xb4) | 233 | - | Guest OS: | success | OSPM: | |
159 | +REG32(APBNSPPPCEXP0, 0xc0) | 234 | - | process Ejection +----------->+ Execute _EJ0 method, | |
160 | +REG32(APBNSPPPCEXP1, 0xc4) | 235 | - | request | | set eject bit in flags| |
161 | +REG32(APBNSPPPCEXP2, 0xc8) | 236 | - +------------------+ +-----------------------+ |
162 | +REG32(APBNSPPPCEXP3, 0xcc) | 237 | - |failure | |
163 | +/* PID and CID registers are also present in the NS block */ | 238 | - v v |
164 | + | 239 | - +------------------------+ +-----------------------+ |
165 | +static const uint8_t iotkit_secctl_s_idregs[] = { | 240 | - | OSPM: | | QEMU: | |
166 | + 0x04, 0x00, 0x00, 0x00, | 241 | - | set OST event & status | | call device unplug cb | |
167 | + 0x52, 0xb8, 0x0b, 0x00, | 242 | - | fields | | | |
168 | + 0x0d, 0xf0, 0x05, 0xb1, | 243 | - +------------------------+ +-----------------------+ |
169 | +}; | 244 | - | | |
170 | + | 245 | - v v |
171 | +static const uint8_t iotkit_secctl_ns_idregs[] = { | 246 | - +------------------+ +-------------------+ |
172 | + 0x04, 0x00, 0x00, 0x00, | 247 | - |QEMU: | |QEMU: | |
173 | + 0x53, 0xb8, 0x0b, 0x00, | 248 | - |Send OST QMP event| |Send device deleted| |
174 | + 0x0d, 0xf0, 0x05, 0xb1, | 249 | - | | |QMP event | |
175 | +}; | 250 | - +------------------+ | | |
176 | + | 251 | - +-------------------+ |
177 | +static MemTxResult iotkit_secctl_s_read(void *opaque, hwaddr addr, | 252 | diff --git a/docs/specs/index.rst b/docs/specs/index.rst |
178 | + uint64_t *pdata, | ||
179 | + unsigned size, MemTxAttrs attrs) | ||
180 | +{ | ||
181 | + uint64_t r; | ||
182 | + uint32_t offset = addr & ~0x3; | ||
183 | + | ||
184 | + switch (offset) { | ||
185 | + case A_AHBNSPPC0: | ||
186 | + case A_AHBSPPPC0: | ||
187 | + r = 0; | ||
188 | + break; | ||
189 | + case A_SECRESPCFG: | ||
190 | + case A_NSCCFG: | ||
191 | + case A_SECMPCINTSTATUS: | ||
192 | + case A_SECPPCINTSTAT: | ||
193 | + case A_SECPPCINTEN: | ||
194 | + case A_SECMSCINTSTAT: | ||
195 | + case A_SECMSCINTEN: | ||
196 | + case A_BRGINTSTAT: | ||
197 | + case A_BRGINTEN: | ||
198 | + case A_AHBNSPPCEXP0: | ||
199 | + case A_AHBNSPPCEXP1: | ||
200 | + case A_AHBNSPPCEXP2: | ||
201 | + case A_AHBNSPPCEXP3: | ||
202 | + case A_APBNSPPC0: | ||
203 | + case A_APBNSPPC1: | ||
204 | + case A_APBNSPPCEXP0: | ||
205 | + case A_APBNSPPCEXP1: | ||
206 | + case A_APBNSPPCEXP2: | ||
207 | + case A_APBNSPPCEXP3: | ||
208 | + case A_AHBSPPPCEXP0: | ||
209 | + case A_AHBSPPPCEXP1: | ||
210 | + case A_AHBSPPPCEXP2: | ||
211 | + case A_AHBSPPPCEXP3: | ||
212 | + case A_APBSPPPC0: | ||
213 | + case A_APBSPPPC1: | ||
214 | + case A_APBSPPPCEXP0: | ||
215 | + case A_APBSPPPCEXP1: | ||
216 | + case A_APBSPPPCEXP2: | ||
217 | + case A_APBSPPPCEXP3: | ||
218 | + case A_NSMSCEXP: | ||
219 | + qemu_log_mask(LOG_UNIMP, | ||
220 | + "IoTKit SecCtl S block read: " | ||
221 | + "unimplemented offset 0x%x\n", offset); | ||
222 | + r = 0; | ||
223 | + break; | ||
224 | + case A_PID4: | ||
225 | + case A_PID5: | ||
226 | + case A_PID6: | ||
227 | + case A_PID7: | ||
228 | + case A_PID0: | ||
229 | + case A_PID1: | ||
230 | + case A_PID2: | ||
231 | + case A_PID3: | ||
232 | + case A_CID0: | ||
233 | + case A_CID1: | ||
234 | + case A_CID2: | ||
235 | + case A_CID3: | ||
236 | + r = iotkit_secctl_s_idregs[(offset - A_PID4) / 4]; | ||
237 | + break; | ||
238 | + case A_SECPPCINTCLR: | ||
239 | + case A_SECMSCINTCLR: | ||
240 | + case A_BRGINTCLR: | ||
241 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
242 | + "IotKit SecCtl S block read: write-only offset 0x%x\n", | ||
243 | + offset); | ||
244 | + r = 0; | ||
245 | + break; | ||
246 | + default: | ||
247 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
248 | + "IotKit SecCtl S block read: bad offset 0x%x\n", offset); | ||
249 | + r = 0; | ||
250 | + break; | ||
251 | + } | ||
252 | + | ||
253 | + if (size != 4) { | ||
254 | + /* None of our registers are access-sensitive, so just pull the right | ||
255 | + * byte out of the word read result. | ||
256 | + */ | ||
257 | + r = extract32(r, (addr & 3) * 8, size * 8); | ||
258 | + } | ||
259 | + | ||
260 | + trace_iotkit_secctl_s_read(offset, r, size); | ||
261 | + *pdata = r; | ||
262 | + return MEMTX_OK; | ||
263 | +} | ||
264 | + | ||
265 | +static MemTxResult iotkit_secctl_s_write(void *opaque, hwaddr addr, | ||
266 | + uint64_t value, | ||
267 | + unsigned size, MemTxAttrs attrs) | ||
268 | +{ | ||
269 | + uint32_t offset = addr; | ||
270 | + | ||
271 | + trace_iotkit_secctl_s_write(offset, value, size); | ||
272 | + | ||
273 | + if (size != 4) { | ||
274 | + /* Byte and halfword writes are ignored */ | ||
275 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
276 | + "IotKit SecCtl S block write: bad size, ignored\n"); | ||
277 | + return MEMTX_OK; | ||
278 | + } | ||
279 | + | ||
280 | + switch (offset) { | ||
281 | + case A_SECRESPCFG: | ||
282 | + case A_NSCCFG: | ||
283 | + case A_SECPPCINTCLR: | ||
284 | + case A_SECPPCINTEN: | ||
285 | + case A_SECMSCINTCLR: | ||
286 | + case A_SECMSCINTEN: | ||
287 | + case A_BRGINTCLR: | ||
288 | + case A_BRGINTEN: | ||
289 | + case A_AHBNSPPCEXP0: | ||
290 | + case A_AHBNSPPCEXP1: | ||
291 | + case A_AHBNSPPCEXP2: | ||
292 | + case A_AHBNSPPCEXP3: | ||
293 | + case A_APBNSPPC0: | ||
294 | + case A_APBNSPPC1: | ||
295 | + case A_APBNSPPCEXP0: | ||
296 | + case A_APBNSPPCEXP1: | ||
297 | + case A_APBNSPPCEXP2: | ||
298 | + case A_APBNSPPCEXP3: | ||
299 | + case A_AHBSPPPCEXP0: | ||
300 | + case A_AHBSPPPCEXP1: | ||
301 | + case A_AHBSPPPCEXP2: | ||
302 | + case A_AHBSPPPCEXP3: | ||
303 | + case A_APBSPPPC0: | ||
304 | + case A_APBSPPPC1: | ||
305 | + case A_APBSPPPCEXP0: | ||
306 | + case A_APBSPPPCEXP1: | ||
307 | + case A_APBSPPPCEXP2: | ||
308 | + case A_APBSPPPCEXP3: | ||
309 | + qemu_log_mask(LOG_UNIMP, | ||
310 | + "IoTKit SecCtl S block write: " | ||
311 | + "unimplemented offset 0x%x\n", offset); | ||
312 | + break; | ||
313 | + case A_SECMPCINTSTATUS: | ||
314 | + case A_SECPPCINTSTAT: | ||
315 | + case A_SECMSCINTSTAT: | ||
316 | + case A_BRGINTSTAT: | ||
317 | + case A_AHBNSPPC0: | ||
318 | + case A_AHBSPPPC0: | ||
319 | + case A_NSMSCEXP: | ||
320 | + case A_PID4: | ||
321 | + case A_PID5: | ||
322 | + case A_PID6: | ||
323 | + case A_PID7: | ||
324 | + case A_PID0: | ||
325 | + case A_PID1: | ||
326 | + case A_PID2: | ||
327 | + case A_PID3: | ||
328 | + case A_CID0: | ||
329 | + case A_CID1: | ||
330 | + case A_CID2: | ||
331 | + case A_CID3: | ||
332 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
333 | + "IoTKit SecCtl S block write: " | ||
334 | + "read-only offset 0x%x\n", offset); | ||
335 | + break; | ||
336 | + default: | ||
337 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
338 | + "IotKit SecCtl S block write: bad offset 0x%x\n", | ||
339 | + offset); | ||
340 | + break; | ||
341 | + } | ||
342 | + | ||
343 | + return MEMTX_OK; | ||
344 | +} | ||
345 | + | ||
346 | +static MemTxResult iotkit_secctl_ns_read(void *opaque, hwaddr addr, | ||
347 | + uint64_t *pdata, | ||
348 | + unsigned size, MemTxAttrs attrs) | ||
349 | +{ | ||
350 | + uint64_t r; | ||
351 | + uint32_t offset = addr & ~0x3; | ||
352 | + | ||
353 | + switch (offset) { | ||
354 | + case A_AHBNSPPPC0: | ||
355 | + r = 0; | ||
356 | + break; | ||
357 | + case A_AHBNSPPPCEXP0: | ||
358 | + case A_AHBNSPPPCEXP1: | ||
359 | + case A_AHBNSPPPCEXP2: | ||
360 | + case A_AHBNSPPPCEXP3: | ||
361 | + case A_APBNSPPPC0: | ||
362 | + case A_APBNSPPPC1: | ||
363 | + case A_APBNSPPPCEXP0: | ||
364 | + case A_APBNSPPPCEXP1: | ||
365 | + case A_APBNSPPPCEXP2: | ||
366 | + case A_APBNSPPPCEXP3: | ||
367 | + qemu_log_mask(LOG_UNIMP, | ||
368 | + "IoTKit SecCtl NS block read: " | ||
369 | + "unimplemented offset 0x%x\n", offset); | ||
370 | + break; | ||
371 | + case A_PID4: | ||
372 | + case A_PID5: | ||
373 | + case A_PID6: | ||
374 | + case A_PID7: | ||
375 | + case A_PID0: | ||
376 | + case A_PID1: | ||
377 | + case A_PID2: | ||
378 | + case A_PID3: | ||
379 | + case A_CID0: | ||
380 | + case A_CID1: | ||
381 | + case A_CID2: | ||
382 | + case A_CID3: | ||
383 | + r = iotkit_secctl_ns_idregs[(offset - A_PID4) / 4]; | ||
384 | + break; | ||
385 | + default: | ||
386 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
387 | + "IotKit SecCtl NS block write: bad offset 0x%x\n", | ||
388 | + offset); | ||
389 | + r = 0; | ||
390 | + break; | ||
391 | + } | ||
392 | + | ||
393 | + if (size != 4) { | ||
394 | + /* None of our registers are access-sensitive, so just pull the right | ||
395 | + * byte out of the word read result. | ||
396 | + */ | ||
397 | + r = extract32(r, (addr & 3) * 8, size * 8); | ||
398 | + } | ||
399 | + | ||
400 | + trace_iotkit_secctl_ns_read(offset, r, size); | ||
401 | + *pdata = r; | ||
402 | + return MEMTX_OK; | ||
403 | +} | ||
404 | + | ||
405 | +static MemTxResult iotkit_secctl_ns_write(void *opaque, hwaddr addr, | ||
406 | + uint64_t value, | ||
407 | + unsigned size, MemTxAttrs attrs) | ||
408 | +{ | ||
409 | + uint32_t offset = addr; | ||
410 | + | ||
411 | + trace_iotkit_secctl_ns_write(offset, value, size); | ||
412 | + | ||
413 | + if (size != 4) { | ||
414 | + /* Byte and halfword writes are ignored */ | ||
415 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
416 | + "IotKit SecCtl NS block write: bad size, ignored\n"); | ||
417 | + return MEMTX_OK; | ||
418 | + } | ||
419 | + | ||
420 | + switch (offset) { | ||
421 | + case A_AHBNSPPPCEXP0: | ||
422 | + case A_AHBNSPPPCEXP1: | ||
423 | + case A_AHBNSPPPCEXP2: | ||
424 | + case A_AHBNSPPPCEXP3: | ||
425 | + case A_APBNSPPPC0: | ||
426 | + case A_APBNSPPPC1: | ||
427 | + case A_APBNSPPPCEXP0: | ||
428 | + case A_APBNSPPPCEXP1: | ||
429 | + case A_APBNSPPPCEXP2: | ||
430 | + case A_APBNSPPPCEXP3: | ||
431 | + qemu_log_mask(LOG_UNIMP, | ||
432 | + "IoTKit SecCtl NS block write: " | ||
433 | + "unimplemented offset 0x%x\n", offset); | ||
434 | + break; | ||
435 | + case A_AHBNSPPPC0: | ||
436 | + case A_PID4: | ||
437 | + case A_PID5: | ||
438 | + case A_PID6: | ||
439 | + case A_PID7: | ||
440 | + case A_PID0: | ||
441 | + case A_PID1: | ||
442 | + case A_PID2: | ||
443 | + case A_PID3: | ||
444 | + case A_CID0: | ||
445 | + case A_CID1: | ||
446 | + case A_CID2: | ||
447 | + case A_CID3: | ||
448 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
449 | + "IoTKit SecCtl NS block write: " | ||
450 | + "read-only offset 0x%x\n", offset); | ||
451 | + break; | ||
452 | + default: | ||
453 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
454 | + "IotKit SecCtl NS block write: bad offset 0x%x\n", | ||
455 | + offset); | ||
456 | + break; | ||
457 | + } | ||
458 | + | ||
459 | + return MEMTX_OK; | ||
460 | +} | ||
461 | + | ||
462 | +static const MemoryRegionOps iotkit_secctl_s_ops = { | ||
463 | + .read_with_attrs = iotkit_secctl_s_read, | ||
464 | + .write_with_attrs = iotkit_secctl_s_write, | ||
465 | + .endianness = DEVICE_LITTLE_ENDIAN, | ||
466 | + .valid.min_access_size = 1, | ||
467 | + .valid.max_access_size = 4, | ||
468 | + .impl.min_access_size = 1, | ||
469 | + .impl.max_access_size = 4, | ||
470 | +}; | ||
471 | + | ||
472 | +static const MemoryRegionOps iotkit_secctl_ns_ops = { | ||
473 | + .read_with_attrs = iotkit_secctl_ns_read, | ||
474 | + .write_with_attrs = iotkit_secctl_ns_write, | ||
475 | + .endianness = DEVICE_LITTLE_ENDIAN, | ||
476 | + .valid.min_access_size = 1, | ||
477 | + .valid.max_access_size = 4, | ||
478 | + .impl.min_access_size = 1, | ||
479 | + .impl.max_access_size = 4, | ||
480 | +}; | ||
481 | + | ||
482 | +static void iotkit_secctl_reset(DeviceState *dev) | ||
483 | +{ | ||
484 | + | ||
485 | +} | ||
486 | + | ||
487 | +static void iotkit_secctl_init(Object *obj) | ||
488 | +{ | ||
489 | + IoTKitSecCtl *s = IOTKIT_SECCTL(obj); | ||
490 | + SysBusDevice *sbd = SYS_BUS_DEVICE(obj); | ||
491 | + | ||
492 | + memory_region_init_io(&s->s_regs, obj, &iotkit_secctl_s_ops, | ||
493 | + s, "iotkit-secctl-s-regs", 0x1000); | ||
494 | + memory_region_init_io(&s->ns_regs, obj, &iotkit_secctl_ns_ops, | ||
495 | + s, "iotkit-secctl-ns-regs", 0x1000); | ||
496 | + sysbus_init_mmio(sbd, &s->s_regs); | ||
497 | + sysbus_init_mmio(sbd, &s->ns_regs); | ||
498 | +} | ||
499 | + | ||
500 | +static const VMStateDescription iotkit_secctl_vmstate = { | ||
501 | + .name = "iotkit-secctl", | ||
502 | + .version_id = 1, | ||
503 | + .minimum_version_id = 1, | ||
504 | + .fields = (VMStateField[]) { | ||
505 | + VMSTATE_END_OF_LIST() | ||
506 | + } | ||
507 | +}; | ||
508 | + | ||
509 | +static void iotkit_secctl_class_init(ObjectClass *klass, void *data) | ||
510 | +{ | ||
511 | + DeviceClass *dc = DEVICE_CLASS(klass); | ||
512 | + | ||
513 | + dc->vmsd = &iotkit_secctl_vmstate; | ||
514 | + dc->reset = iotkit_secctl_reset; | ||
515 | +} | ||
516 | + | ||
517 | +static const TypeInfo iotkit_secctl_info = { | ||
518 | + .name = TYPE_IOTKIT_SECCTL, | ||
519 | + .parent = TYPE_SYS_BUS_DEVICE, | ||
520 | + .instance_size = sizeof(IoTKitSecCtl), | ||
521 | + .instance_init = iotkit_secctl_init, | ||
522 | + .class_init = iotkit_secctl_class_init, | ||
523 | +}; | ||
524 | + | ||
525 | +static void iotkit_secctl_register_types(void) | ||
526 | +{ | ||
527 | + type_register_static(&iotkit_secctl_info); | ||
528 | +} | ||
529 | + | ||
530 | +type_init(iotkit_secctl_register_types); | ||
531 | diff --git a/default-configs/arm-softmmu.mak b/default-configs/arm-softmmu.mak | ||
532 | index XXXXXXX..XXXXXXX 100644 | 253 | index XXXXXXX..XXXXXXX 100644 |
533 | --- a/default-configs/arm-softmmu.mak | 254 | --- a/docs/specs/index.rst |
534 | +++ b/default-configs/arm-softmmu.mak | 255 | +++ b/docs/specs/index.rst |
535 | @@ -XXX,XX +XXX,XX @@ CONFIG_MPS2_FPGAIO=y | 256 | @@ -XXX,XX +XXX,XX @@ guest hardware that is specific to QEMU. |
536 | CONFIG_MPS2_SCC=y | 257 | tpm |
537 | 258 | acpi_hest_ghes | |
538 | CONFIG_TZ_PPC=y | 259 | acpi_cpu_hotplug |
539 | +CONFIG_IOTKIT_SECCTL=y | 260 | + acpi_mem_hotplug |
540 | |||
541 | CONFIG_VERSATILE_PCI=y | ||
542 | CONFIG_VERSATILE_I2C=y | ||
543 | diff --git a/hw/misc/trace-events b/hw/misc/trace-events | ||
544 | index XXXXXXX..XXXXXXX 100644 | ||
545 | --- a/hw/misc/trace-events | ||
546 | +++ b/hw/misc/trace-events | ||
547 | @@ -XXX,XX +XXX,XX @@ tz_ppc_irq_clear(int level) "TZ PPC: int_clear = %d" | ||
548 | tz_ppc_update_irq(int level) "TZ PPC: setting irq line to %d" | ||
549 | tz_ppc_read_blocked(int n, hwaddr offset, bool secure, bool user) "TZ PPC: port %d offset 0x%" HWADDR_PRIx " read (secure %d user %d) blocked" | ||
550 | tz_ppc_write_blocked(int n, hwaddr offset, bool secure, bool user) "TZ PPC: port %d offset 0x%" HWADDR_PRIx " write (secure %d user %d) blocked" | ||
551 | + | ||
552 | +# hw/misc/iotkit-secctl.c | ||
553 | +iotkit_secctl_s_read(uint32_t offset, uint64_t data, unsigned size) "IoTKit SecCtl S regs read: offset 0x%x data 0x%" PRIx64 " size %u" | ||
554 | +iotkit_secctl_s_write(uint32_t offset, uint64_t data, unsigned size) "IoTKit SecCtl S regs write: offset 0x%x data 0x%" PRIx64 " size %u" | ||
555 | +iotkit_secctl_ns_read(uint32_t offset, uint64_t data, unsigned size) "IoTKit SecCtl NS regs read: offset 0x%x data 0x%" PRIx64 " size %u" | ||
556 | +iotkit_secctl_ns_write(uint32_t offset, uint64_t data, unsigned size) "IoTKit SecCtl NS regs write: offset 0x%x data 0x%" PRIx64 " size %u" | ||
557 | +iotkit_secctl_reset(void) "IoTKit SecCtl: reset" | ||
558 | -- | 261 | -- |
559 | 2.16.2 | 262 | 2.20.1 |
560 | 263 | ||
561 | 264 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | Convert the PCI hotplug spec document to rST. |
---|---|---|---|
2 | 2 | ||
3 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
4 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
5 | Message-id: 20180228193125.20577-9-richard.henderson@linaro.org | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 3 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
4 | Reviewed-by: Igor Mammedov <imammedo@redhat.com> | ||
7 | --- | 5 | --- |
8 | target/arm/translate.c | 46 ++++++++++++++++++++++++++++++++++++++++++---- | 6 | ...i_pci_hotplug.txt => acpi_pci_hotplug.rst} | 37 ++++++++++--------- |
9 | 1 file changed, 42 insertions(+), 4 deletions(-) | 7 | docs/specs/index.rst | 1 + |
8 | 2 files changed, 21 insertions(+), 17 deletions(-) | ||
9 | rename docs/specs/{acpi_pci_hotplug.txt => acpi_pci_hotplug.rst} (51%) | ||
10 | 10 | ||
11 | diff --git a/target/arm/translate.c b/target/arm/translate.c | 11 | diff --git a/docs/specs/acpi_pci_hotplug.txt b/docs/specs/acpi_pci_hotplug.rst |
12 | similarity index 51% | ||
13 | rename from docs/specs/acpi_pci_hotplug.txt | ||
14 | rename to docs/specs/acpi_pci_hotplug.rst | ||
12 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
13 | --- a/target/arm/translate.c | 16 | --- a/docs/specs/acpi_pci_hotplug.txt |
14 | +++ b/target/arm/translate.c | 17 | +++ b/docs/specs/acpi_pci_hotplug.rst |
15 | @@ -XXX,XX +XXX,XX @@ static const char *regnames[] = | 18 | @@ -XXX,XX +XXX,XX @@ |
16 | { "r0", "r1", "r2", "r3", "r4", "r5", "r6", "r7", | 19 | QEMU<->ACPI BIOS PCI hotplug interface |
17 | "r8", "r9", "r10", "r11", "r12", "r13", "r14", "pc" }; | 20 | --------------------------------------- |
18 | 21 | +====================================== | |
19 | +/* Function prototypes for gen_ functions calling Neon helpers. */ | 22 | |
20 | +typedef void NeonGenThreeOpEnvFn(TCGv_i32, TCGv_env, TCGv_i32, | 23 | QEMU supports PCI hotplug via ACPI, for PCI bus 0. This document |
21 | + TCGv_i32, TCGv_i32); | 24 | describes the interface between QEMU and the ACPI BIOS. |
25 | |||
26 | -ACPI GPE block (IO ports 0xafe0-0xafe3, byte access): | ||
27 | ------------------------------------------ | ||
28 | +ACPI GPE block (IO ports 0xafe0-0xafe3, byte access) | ||
29 | +---------------------------------------------------- | ||
30 | |||
31 | Generic ACPI GPE block. Bit 1 (GPE.1) used to notify PCI hotplug/eject | ||
32 | event to ACPI BIOS, via SCI interrupt. | ||
33 | |||
34 | -PCI slot injection notification pending (IO port 0xae00-0xae03, 4-byte access): | ||
35 | ---------------------------------------------------------------- | ||
36 | +PCI slot injection notification pending (IO port 0xae00-0xae03, 4-byte access) | ||
37 | +------------------------------------------------------------------------------ | ||
22 | + | 38 | + |
23 | /* initialize TCG globals. */ | 39 | Slot injection notification pending. One bit per slot. |
24 | void arm_translate_init(void) | 40 | |
25 | { | 41 | Read by ACPI BIOS GPE.1 handler to notify OS of injection |
26 | @@ -XXX,XX +XXX,XX @@ static int disas_neon_data_insn(DisasContext *s, uint32_t insn) | 42 | events. Read-only. |
27 | } | 43 | |
28 | neon_store_reg64(cpu_V0, rd + pass); | 44 | -PCI slot removal notification (IO port 0xae04-0xae07, 4-byte access): |
29 | } | 45 | ------------------------------------------------------ |
30 | - | 46 | +PCI slot removal notification (IO port 0xae04-0xae07, 4-byte access) |
31 | - | 47 | +-------------------------------------------------------------------- |
32 | break; | ||
33 | - default: /* 14 and 15 are RESERVED */ | ||
34 | - return 1; | ||
35 | + case 14: /* VQRDMLAH scalar */ | ||
36 | + case 15: /* VQRDMLSH scalar */ | ||
37 | + { | ||
38 | + NeonGenThreeOpEnvFn *fn; | ||
39 | + | 48 | + |
40 | + if (!arm_dc_feature(s, ARM_FEATURE_V8_RDM)) { | 49 | Slot removal notification pending. One bit per slot. |
41 | + return 1; | 50 | |
42 | + } | 51 | Read by ACPI BIOS GPE.1 handler to notify OS of removal |
43 | + if (u && ((rd | rn) & 1)) { | 52 | events. Read-only. |
44 | + return 1; | 53 | |
45 | + } | 54 | -PCI device eject (IO port 0xae08-0xae0b, 4-byte access): |
46 | + if (op == 14) { | 55 | ----------------------------------------- |
47 | + if (size == 1) { | 56 | +PCI device eject (IO port 0xae08-0xae0b, 4-byte access) |
48 | + fn = gen_helper_neon_qrdmlah_s16; | 57 | +------------------------------------------------------- |
49 | + } else { | 58 | |
50 | + fn = gen_helper_neon_qrdmlah_s32; | 59 | Write: Used by ACPI BIOS _EJ0 method to request device removal. |
51 | + } | 60 | One bit per slot. |
52 | + } else { | 61 | |
53 | + if (size == 1) { | 62 | Read: Hotplug features register. Used by platform to identify features |
54 | + fn = gen_helper_neon_qrdmlsh_s16; | 63 | available. Current base feature set (no bits set): |
55 | + } else { | 64 | - - Read-only "up" register @0xae00, 4-byte access, bit per slot |
56 | + fn = gen_helper_neon_qrdmlsh_s32; | 65 | - - Read-only "down" register @0xae04, 4-byte access, bit per slot |
57 | + } | 66 | - - Read/write "eject" register @0xae08, 4-byte access, |
58 | + } | 67 | - write: bit per slot eject, read: hotplug feature set |
68 | - - Read-only hotplug capable register @0xae0c, 4-byte access, bit per slot | ||
69 | |||
70 | -PCI removability status (IO port 0xae0c-0xae0f, 4-byte access): | ||
71 | ------------------------------------------------ | ||
72 | +- Read-only "up" register @0xae00, 4-byte access, bit per slot | ||
73 | +- Read-only "down" register @0xae04, 4-byte access, bit per slot | ||
74 | +- Read/write "eject" register @0xae08, 4-byte access, | ||
75 | + write: bit per slot eject, read: hotplug feature set | ||
76 | +- Read-only hotplug capable register @0xae0c, 4-byte access, bit per slot | ||
59 | + | 77 | + |
60 | + tmp2 = neon_get_scalar(size, rm); | 78 | +PCI removability status (IO port 0xae0c-0xae0f, 4-byte access) |
61 | + for (pass = 0; pass < (u ? 4 : 2); pass++) { | 79 | +-------------------------------------------------------------- |
62 | + tmp = neon_load_reg(rn, pass); | 80 | |
63 | + tmp3 = neon_load_reg(rd, pass); | 81 | Used by ACPI BIOS _RMV method to indicate removability status to OS. One |
64 | + fn(tmp, cpu_env, tmp, tmp2, tmp3); | 82 | -bit per slot. Read-only |
65 | + tcg_temp_free_i32(tmp3); | 83 | +bit per slot. Read-only. |
66 | + neon_store_reg(rd, pass, tmp); | 84 | diff --git a/docs/specs/index.rst b/docs/specs/index.rst |
67 | + } | 85 | index XXXXXXX..XXXXXXX 100644 |
68 | + tcg_temp_free_i32(tmp2); | 86 | --- a/docs/specs/index.rst |
69 | + } | 87 | +++ b/docs/specs/index.rst |
70 | + break; | 88 | @@ -XXX,XX +XXX,XX @@ guest hardware that is specific to QEMU. |
71 | + default: | 89 | acpi_hest_ghes |
72 | + g_assert_not_reached(); | 90 | acpi_cpu_hotplug |
73 | } | 91 | acpi_mem_hotplug |
74 | } | 92 | + acpi_pci_hotplug |
75 | } else { /* size == 3 */ | ||
76 | -- | 93 | -- |
77 | 2.16.2 | 94 | 2.20.1 |
78 | 95 | ||
79 | 96 | diff view generated by jsdifflib |
1 | From: Alistair Francis <alistair.francis@xilinx.com> | 1 | Convert the ACPI NVDIMM spec document to rST. |
---|---|---|---|
2 | 2 | ||
3 | Initial commit of the ZynqMP RTC device. | 3 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
4 | Reviewed-by: Igor Mammedov <imammedo@redhat.com> | ||
5 | Message-id: 20210727170414.3368-5-peter.maydell@linaro.org | ||
6 | --- | ||
7 | docs/specs/acpi_nvdimm.rst | 228 +++++++++++++++++++++++++++++++++++++ | ||
8 | docs/specs/acpi_nvdimm.txt | 188 ------------------------------ | ||
9 | docs/specs/index.rst | 1 + | ||
10 | 3 files changed, 229 insertions(+), 188 deletions(-) | ||
11 | create mode 100644 docs/specs/acpi_nvdimm.rst | ||
12 | delete mode 100644 docs/specs/acpi_nvdimm.txt | ||
4 | 13 | ||
5 | Signed-off-by: Alistair Francis <alistair.francis@xilinx.com> | 14 | diff --git a/docs/specs/acpi_nvdimm.rst b/docs/specs/acpi_nvdimm.rst |
6 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | --- | ||
9 | hw/timer/Makefile.objs | 1 + | ||
10 | include/hw/timer/xlnx-zynqmp-rtc.h | 84 +++++++++++++++ | ||
11 | hw/timer/xlnx-zynqmp-rtc.c | 214 +++++++++++++++++++++++++++++++++++++ | ||
12 | 3 files changed, 299 insertions(+) | ||
13 | create mode 100644 include/hw/timer/xlnx-zynqmp-rtc.h | ||
14 | create mode 100644 hw/timer/xlnx-zynqmp-rtc.c | ||
15 | |||
16 | diff --git a/hw/timer/Makefile.objs b/hw/timer/Makefile.objs | ||
17 | index XXXXXXX..XXXXXXX 100644 | ||
18 | --- a/hw/timer/Makefile.objs | ||
19 | +++ b/hw/timer/Makefile.objs | ||
20 | @@ -XXX,XX +XXX,XX @@ common-obj-$(CONFIG_IMX) += imx_epit.o | ||
21 | common-obj-$(CONFIG_IMX) += imx_gpt.o | ||
22 | common-obj-$(CONFIG_LM32) += lm32_timer.o | ||
23 | common-obj-$(CONFIG_MILKYMIST) += milkymist-sysctl.o | ||
24 | +common-obj-$(CONFIG_XLNX_ZYNQMP) += xlnx-zynqmp-rtc.o | ||
25 | |||
26 | obj-$(CONFIG_ALTERA_TIMER) += altera_timer.o | ||
27 | obj-$(CONFIG_EXYNOS4) += exynos4210_mct.o | ||
28 | diff --git a/include/hw/timer/xlnx-zynqmp-rtc.h b/include/hw/timer/xlnx-zynqmp-rtc.h | ||
29 | new file mode 100644 | 15 | new file mode 100644 |
30 | index XXXXXXX..XXXXXXX | 16 | index XXXXXXX..XXXXXXX |
31 | --- /dev/null | 17 | --- /dev/null |
32 | +++ b/include/hw/timer/xlnx-zynqmp-rtc.h | 18 | +++ b/docs/specs/acpi_nvdimm.rst |
33 | @@ -XXX,XX +XXX,XX @@ | 19 | @@ -XXX,XX +XXX,XX @@ |
34 | +/* | 20 | +QEMU<->ACPI BIOS NVDIMM interface |
35 | + * QEMU model of the Xilinx ZynqMP Real Time Clock (RTC). | 21 | +================================= |
36 | + * | 22 | + |
37 | + * Copyright (c) 2017 Xilinx Inc. | 23 | +QEMU supports NVDIMM via ACPI. This document describes the basic concepts of |
38 | + * | 24 | +NVDIMM ACPI and the interface between QEMU and the ACPI BIOS. |
39 | + * Written-by: Alistair Francis <alistair.francis@xilinx.com> | 25 | + |
40 | + * | 26 | +NVDIMM ACPI Background |
41 | + * Permission is hereby granted, free of charge, to any person obtaining a copy | 27 | +---------------------- |
42 | + * of this software and associated documentation files (the "Software"), to deal | 28 | + |
43 | + * in the Software without restriction, including without limitation the rights | 29 | +NVDIMM is introduced in ACPI 6.0 which defines an NVDIMM root device under |
44 | + * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | 30 | +_SB scope with a _HID of "ACPI0012". For each NVDIMM present or intended |
45 | + * copies of the Software, and to permit persons to whom the Software is | 31 | +to be supported by platform, platform firmware also exposes an ACPI |
46 | + * furnished to do so, subject to the following conditions: | 32 | +Namespace Device under the root device. |
47 | + * | 33 | + |
48 | + * The above copyright notice and this permission notice shall be included in | 34 | +The NVDIMM child devices under the NVDIMM root device are defined with _ADR |
49 | + * all copies or substantial portions of the Software. | 35 | +corresponding to the NFIT device handle. The NVDIMM root device and the |
50 | + * | 36 | +NVDIMM devices can have device specific methods (_DSM) to provide additional |
51 | + * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | 37 | +functions specific to a particular NVDIMM implementation. |
52 | + * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | 38 | + |
53 | + * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL | 39 | +This is an example from ACPI 6.0, a platform contains one NVDIMM:: |
54 | + * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | 40 | + |
55 | + * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | 41 | + Scope (\_SB){ |
56 | + * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN | 42 | + Device (NVDR) // Root device |
57 | + * THE SOFTWARE. | 43 | + { |
58 | + */ | 44 | + Name (_HID, "ACPI0012") |
59 | + | 45 | + Method (_STA) {...} |
60 | +#include "hw/register.h" | 46 | + Method (_FIT) {...} |
61 | + | 47 | + Method (_DSM, ...) {...} |
62 | +#define TYPE_XLNX_ZYNQMP_RTC "xlnx-zynmp.rtc" | 48 | + Device (NVD) |
63 | + | 49 | + { |
64 | +#define XLNX_ZYNQMP_RTC(obj) \ | 50 | + Name(_ADR, h) //where h is NFIT Device Handle for this NVDIMM |
65 | + OBJECT_CHECK(XlnxZynqMPRTC, (obj), TYPE_XLNX_ZYNQMP_RTC) | 51 | + Method (_DSM, ...) {...} |
66 | + | 52 | + } |
67 | +REG32(SET_TIME_WRITE, 0x0) | 53 | + } |
68 | +REG32(SET_TIME_READ, 0x4) | 54 | + } |
69 | +REG32(CALIB_WRITE, 0x8) | 55 | + |
70 | + FIELD(CALIB_WRITE, FRACTION_EN, 20, 1) | 56 | +Methods supported on both NVDIMM root device and NVDIMM device |
71 | + FIELD(CALIB_WRITE, FRACTION_DATA, 16, 4) | 57 | +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ |
72 | + FIELD(CALIB_WRITE, MAX_TICK, 0, 16) | 58 | + |
73 | +REG32(CALIB_READ, 0xc) | 59 | +_DSM (Device Specific Method) |
74 | + FIELD(CALIB_READ, FRACTION_EN, 20, 1) | 60 | + It is a control method that enables devices to provide device specific |
75 | + FIELD(CALIB_READ, FRACTION_DATA, 16, 4) | 61 | + control functions that are consumed by the device driver. |
76 | + FIELD(CALIB_READ, MAX_TICK, 0, 16) | 62 | + The NVDIMM DSM specification can be found at |
77 | +REG32(CURRENT_TIME, 0x10) | 63 | + http://pmem.io/documents/NVDIMM_DSM_Interface_Example.pdf |
78 | +REG32(CURRENT_TICK, 0x14) | 64 | + |
79 | + FIELD(CURRENT_TICK, VALUE, 0, 16) | 65 | + Arguments: |
80 | +REG32(ALARM, 0x18) | 66 | + |
81 | +REG32(RTC_INT_STATUS, 0x20) | 67 | + Arg0 |
82 | + FIELD(RTC_INT_STATUS, ALARM, 1, 1) | 68 | + A Buffer containing a UUID (16 Bytes) |
83 | + FIELD(RTC_INT_STATUS, SECONDS, 0, 1) | 69 | + Arg1 |
84 | +REG32(RTC_INT_MASK, 0x24) | 70 | + An Integer containing the Revision ID (4 Bytes) |
85 | + FIELD(RTC_INT_MASK, ALARM, 1, 1) | 71 | + Arg2 |
86 | + FIELD(RTC_INT_MASK, SECONDS, 0, 1) | 72 | + An Integer containing the Function Index (4 Bytes) |
87 | +REG32(RTC_INT_EN, 0x28) | 73 | + Arg3 |
88 | + FIELD(RTC_INT_EN, ALARM, 1, 1) | 74 | + A package containing parameters for the function specified by the |
89 | + FIELD(RTC_INT_EN, SECONDS, 0, 1) | 75 | + UUID, Revision ID, and Function Index |
90 | +REG32(RTC_INT_DIS, 0x2c) | 76 | + |
91 | + FIELD(RTC_INT_DIS, ALARM, 1, 1) | 77 | + Return Value: |
92 | + FIELD(RTC_INT_DIS, SECONDS, 0, 1) | 78 | + |
93 | +REG32(ADDR_ERROR, 0x30) | 79 | + If Function Index = 0, a Buffer containing a function index bitfield. |
94 | + FIELD(ADDR_ERROR, STATUS, 0, 1) | 80 | + Otherwise, the return value and type depends on the UUID, revision ID |
95 | +REG32(ADDR_ERROR_INT_MASK, 0x34) | 81 | + and function index which are described in the DSM specification. |
96 | + FIELD(ADDR_ERROR_INT_MASK, MASK, 0, 1) | 82 | + |
97 | +REG32(ADDR_ERROR_INT_EN, 0x38) | 83 | +Methods on NVDIMM ROOT Device |
98 | + FIELD(ADDR_ERROR_INT_EN, MASK, 0, 1) | 84 | +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ |
99 | +REG32(ADDR_ERROR_INT_DIS, 0x3c) | 85 | + |
100 | + FIELD(ADDR_ERROR_INT_DIS, MASK, 0, 1) | 86 | +_FIT(Firmware Interface Table) |
101 | +REG32(CONTROL, 0x40) | 87 | + It evaluates to a buffer returning data in the format of a series of NFIT |
102 | + FIELD(CONTROL, BATTERY_DISABLE, 31, 1) | 88 | + Type Structure. |
103 | + FIELD(CONTROL, OSC_CNTRL, 24, 4) | 89 | + |
104 | + FIELD(CONTROL, SLVERR_ENABLE, 0, 1) | 90 | + Arguments: None |
105 | +REG32(SAFETY_CHK, 0x50) | 91 | + |
106 | + | 92 | + Return Value: |
107 | +#define XLNX_ZYNQMP_RTC_R_MAX (R_SAFETY_CHK + 1) | 93 | + A Buffer containing a list of NFIT Type structure entries. |
108 | + | 94 | + |
109 | +typedef struct XlnxZynqMPRTC { | 95 | + The detailed definition of the structure can be found at ACPI 6.0: 5.2.25 |
110 | + SysBusDevice parent_obj; | 96 | + NVDIMM Firmware Interface Table (NFIT). |
111 | + MemoryRegion iomem; | 97 | + |
112 | + qemu_irq irq_rtc_int; | 98 | +QEMU NVDIMM Implementation |
113 | + qemu_irq irq_addr_error_int; | 99 | +-------------------------- |
114 | + | 100 | + |
115 | + uint32_t regs[XLNX_ZYNQMP_RTC_R_MAX]; | 101 | +QEMU uses 4 bytes IO Port starting from 0x0a18 and a RAM-based memory page |
116 | + RegisterInfo regs_info[XLNX_ZYNQMP_RTC_R_MAX]; | 102 | +for NVDIMM ACPI. |
117 | +} XlnxZynqMPRTC; | 103 | + |
118 | diff --git a/hw/timer/xlnx-zynqmp-rtc.c b/hw/timer/xlnx-zynqmp-rtc.c | 104 | +Memory: |
119 | new file mode 100644 | 105 | + QEMU uses BIOS Linker/loader feature to ask BIOS to allocate a memory |
106 | + page and dynamically patch its address into an int32 object named "MEMA" | ||
107 | + in ACPI. | ||
108 | + | ||
109 | + This page is RAM-based and it is used to transfer data between _DSM | ||
110 | + method and QEMU. If ACPI has control, this pages is owned by ACPI which | ||
111 | + writes _DSM input data to it, otherwise, it is owned by QEMU which | ||
112 | + emulates _DSM access and writes the output data to it. | ||
113 | + | ||
114 | + ACPI writes _DSM Input Data (based on the offset in the page): | ||
115 | + | ||
116 | + [0x0 - 0x3] | ||
117 | + 4 bytes, NVDIMM Device Handle. | ||
118 | + | ||
119 | + The handle is completely QEMU internal thing, the values in | ||
120 | + range [1, 0xFFFF] indicate nvdimm device. Other values are | ||
121 | + reserved for other purposes. | ||
122 | + | ||
123 | + Reserved handles: | ||
124 | + | ||
125 | + - 0 is reserved for nvdimm root device named NVDR. | ||
126 | + - 0x10000 is reserved for QEMU internal DSM function called on | ||
127 | + the root device. | ||
128 | + | ||
129 | + [0x4 - 0x7] | ||
130 | + 4 bytes, Revision ID, that is the Arg1 of _DSM method. | ||
131 | + | ||
132 | + [0x8 - 0xB] | ||
133 | + 4 bytes. Function Index, that is the Arg2 of _DSM method. | ||
134 | + | ||
135 | + [0xC - 0xFFF] | ||
136 | + 4084 bytes, the Arg3 of _DSM method. | ||
137 | + | ||
138 | + QEMU writes Output Data (based on the offset in the page): | ||
139 | + | ||
140 | + [0x0 - 0x3] | ||
141 | + 4 bytes, the length of result | ||
142 | + | ||
143 | + [0x4 - 0xFFF] | ||
144 | + 4092 bytes, the DSM result filled by QEMU | ||
145 | + | ||
146 | +IO Port 0x0a18 - 0xa1b: | ||
147 | + ACPI writes the address of the memory page allocated by BIOS to this | ||
148 | + port then QEMU gets the control and fills the result in the memory page. | ||
149 | + | ||
150 | + Write Access: | ||
151 | + | ||
152 | + [0x0a18 - 0xa1b] | ||
153 | + 4 bytes, the address of the memory page allocated by BIOS. | ||
154 | + | ||
155 | +_DSM process diagram | ||
156 | +-------------------- | ||
157 | + | ||
158 | +"MEMA" indicates the address of memory page allocated by BIOS. | ||
159 | + | ||
160 | +:: | ||
161 | + | ||
162 | + +----------------------+ +-----------------------+ | ||
163 | + | 1. OSPM | | 2. OSPM | | ||
164 | + | save _DSM input data | | write "MEMA" to | Exit to QEMU | ||
165 | + | to the page +----->| IO port 0x0a18 +------------+ | ||
166 | + | indicated by "MEMA" | | | | | ||
167 | + +----------------------+ +-----------------------+ | | ||
168 | + | | ||
169 | + v | ||
170 | + +--------------------+ +-----------+ +------------------+--------+ | ||
171 | + | 5 QEMU | | 4 QEMU | | 3. QEMU | | ||
172 | + | write _DSM result | | emulate | | get _DSM input data from | | ||
173 | + | to the page +<------+ _DSM +<-----+ the page indicated by the | | ||
174 | + | | | | | value from the IO port | | ||
175 | + +--------+-----------+ +-----------+ +---------------------------+ | ||
176 | + | | ||
177 | + | Enter Guest | ||
178 | + | | ||
179 | + v | ||
180 | + +--------------------------+ +--------------+ | ||
181 | + | 6 OSPM | | 7 OSPM | | ||
182 | + | result size is returned | | _DSM return | | ||
183 | + | by reading DSM +----->+ | | ||
184 | + | result from the page | | | | ||
185 | + +--------------------------+ +--------------+ | ||
186 | + | ||
187 | +NVDIMM hotplug | ||
188 | +-------------- | ||
189 | + | ||
190 | +ACPI BIOS GPE.4 handler is dedicated for notifying OS about nvdimm device | ||
191 | +hot-add event. | ||
192 | + | ||
193 | +QEMU internal use only _DSM functions | ||
194 | +------------------------------------- | ||
195 | + | ||
196 | +Read FIT | ||
197 | +^^^^^^^^ | ||
198 | + | ||
199 | +_FIT method uses _DSM method to fetch NFIT structures blob from QEMU | ||
200 | +in 1 page sized increments which are then concatenated and returned | ||
201 | +as _FIT method result. | ||
202 | + | ||
203 | +Input parameters: | ||
204 | + | ||
205 | +Arg0 | ||
206 | + UUID {set to 648B9CF2-CDA1-4312-8AD9-49C4AF32BD62} | ||
207 | +Arg1 | ||
208 | + Revision ID (set to 1) | ||
209 | +Arg2 | ||
210 | + Function Index, 0x1 | ||
211 | +Arg3 | ||
212 | + A package containing a buffer whose layout is as follows: | ||
213 | + | ||
214 | + +----------+--------+--------+-------------------------------------------+ | ||
215 | + | Field | Length | Offset | Description | | ||
216 | + +----------+--------+--------+-------------------------------------------+ | ||
217 | + | offset | 4 | 0 | offset in QEMU's NFIT structures blob to | | ||
218 | + | | | | read from | | ||
219 | + +----------+--------+--------+-------------------------------------------+ | ||
220 | + | ||
221 | +Output layout in the dsm memory page: | ||
222 | + | ||
223 | + +----------+--------+--------+-------------------------------------------+ | ||
224 | + | Field | Length | Offset | Description | | ||
225 | + +----------+--------+--------+-------------------------------------------+ | ||
226 | + | length | 4 | 0 | length of entire returned data | | ||
227 | + | | | | (including this header) | | ||
228 | + +----------+--------+--------+-------------------------------------------+ | ||
229 | + | | | | return status codes | | ||
230 | + | | | | | | ||
231 | + | | | | - 0x0 - success | | ||
232 | + | | | | - 0x100 - error caused by NFIT update | | ||
233 | + | status | 4 | 4 | while read by _FIT wasn't completed | | ||
234 | + | | | | - other codes follow Chapter 3 in | | ||
235 | + | | | | DSM Spec Rev1 | | ||
236 | + +----------+--------+--------+-------------------------------------------+ | ||
237 | + | fit data | Varies | 8 | contains FIT data. This field is present | | ||
238 | + | | | | if status field is 0. | | ||
239 | + +----------+--------+--------+-------------------------------------------+ | ||
240 | + | ||
241 | +The FIT offset is maintained by the OSPM itself, current offset plus | ||
242 | +the size of the fit data returned by the function is the next offset | ||
243 | +OSPM should read. When all FIT data has been read out, zero fit data | ||
244 | +size is returned. | ||
245 | + | ||
246 | +If it returns status code 0x100, OSPM should restart to read FIT (read | ||
247 | +from offset 0 again). | ||
248 | diff --git a/docs/specs/acpi_nvdimm.txt b/docs/specs/acpi_nvdimm.txt | ||
249 | deleted file mode 100644 | ||
120 | index XXXXXXX..XXXXXXX | 250 | index XXXXXXX..XXXXXXX |
121 | --- /dev/null | 251 | --- a/docs/specs/acpi_nvdimm.txt |
122 | +++ b/hw/timer/xlnx-zynqmp-rtc.c | 252 | +++ /dev/null |
123 | @@ -XXX,XX +XXX,XX @@ | 253 | @@ -XXX,XX +XXX,XX @@ |
124 | +/* | 254 | -QEMU<->ACPI BIOS NVDIMM interface |
125 | + * QEMU model of the Xilinx ZynqMP Real Time Clock (RTC). | 255 | ---------------------------------- |
126 | + * | 256 | - |
127 | + * Copyright (c) 2017 Xilinx Inc. | 257 | -QEMU supports NVDIMM via ACPI. This document describes the basic concepts of |
128 | + * | 258 | -NVDIMM ACPI and the interface between QEMU and the ACPI BIOS. |
129 | + * Written-by: Alistair Francis <alistair.francis@xilinx.com> | 259 | - |
130 | + * | 260 | -NVDIMM ACPI Background |
131 | + * Permission is hereby granted, free of charge, to any person obtaining a copy | 261 | ----------------------- |
132 | + * of this software and associated documentation files (the "Software"), to deal | 262 | -NVDIMM is introduced in ACPI 6.0 which defines an NVDIMM root device under |
133 | + * in the Software without restriction, including without limitation the rights | 263 | -_SB scope with a _HID of “ACPI0012”. For each NVDIMM present or intended |
134 | + * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | 264 | -to be supported by platform, platform firmware also exposes an ACPI |
135 | + * copies of the Software, and to permit persons to whom the Software is | 265 | -Namespace Device under the root device. |
136 | + * furnished to do so, subject to the following conditions: | 266 | - |
137 | + * | 267 | -The NVDIMM child devices under the NVDIMM root device are defined with _ADR |
138 | + * The above copyright notice and this permission notice shall be included in | 268 | -corresponding to the NFIT device handle. The NVDIMM root device and the |
139 | + * all copies or substantial portions of the Software. | 269 | -NVDIMM devices can have device specific methods (_DSM) to provide additional |
140 | + * | 270 | -functions specific to a particular NVDIMM implementation. |
141 | + * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | 271 | - |
142 | + * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | 272 | -This is an example from ACPI 6.0, a platform contains one NVDIMM: |
143 | + * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL | 273 | - |
144 | + * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | 274 | -Scope (\_SB){ |
145 | + * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | 275 | - Device (NVDR) // Root device |
146 | + * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN | 276 | - { |
147 | + * THE SOFTWARE. | 277 | - Name (_HID, “ACPI0012”) |
148 | + */ | 278 | - Method (_STA) {...} |
149 | + | 279 | - Method (_FIT) {...} |
150 | +#include "qemu/osdep.h" | 280 | - Method (_DSM, ...) {...} |
151 | +#include "hw/sysbus.h" | 281 | - Device (NVD) |
152 | +#include "hw/register.h" | 282 | - { |
153 | +#include "qemu/bitops.h" | 283 | - Name(_ADR, h) //where h is NFIT Device Handle for this NVDIMM |
154 | +#include "qemu/log.h" | 284 | - Method (_DSM, ...) {...} |
155 | +#include "hw/timer/xlnx-zynqmp-rtc.h" | 285 | - } |
156 | + | 286 | - } |
157 | +#ifndef XLNX_ZYNQMP_RTC_ERR_DEBUG | 287 | -} |
158 | +#define XLNX_ZYNQMP_RTC_ERR_DEBUG 0 | 288 | - |
159 | +#endif | 289 | -Method supported on both NVDIMM root device and NVDIMM device |
160 | + | 290 | -_DSM (Device Specific Method) |
161 | +static void rtc_int_update_irq(XlnxZynqMPRTC *s) | 291 | - It is a control method that enables devices to provide device specific |
162 | +{ | 292 | - control functions that are consumed by the device driver. |
163 | + bool pending = s->regs[R_RTC_INT_STATUS] & ~s->regs[R_RTC_INT_MASK]; | 293 | - The NVDIMM DSM specification can be found at: |
164 | + qemu_set_irq(s->irq_rtc_int, pending); | 294 | - http://pmem.io/documents/NVDIMM_DSM_Interface_Example.pdf |
165 | +} | 295 | - |
166 | + | 296 | - Arguments: |
167 | +static void addr_error_int_update_irq(XlnxZynqMPRTC *s) | 297 | - Arg0 – A Buffer containing a UUID (16 Bytes) |
168 | +{ | 298 | - Arg1 – An Integer containing the Revision ID (4 Bytes) |
169 | + bool pending = s->regs[R_ADDR_ERROR] & ~s->regs[R_ADDR_ERROR_INT_MASK]; | 299 | - Arg2 – An Integer containing the Function Index (4 Bytes) |
170 | + qemu_set_irq(s->irq_addr_error_int, pending); | 300 | - Arg3 – A package containing parameters for the function specified by the |
171 | +} | 301 | - UUID, Revision ID, and Function Index |
172 | + | 302 | - |
173 | +static void rtc_int_status_postw(RegisterInfo *reg, uint64_t val64) | 303 | - Return Value: |
174 | +{ | 304 | - If Function Index = 0, a Buffer containing a function index bitfield. |
175 | + XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(reg->opaque); | 305 | - Otherwise, the return value and type depends on the UUID, revision ID |
176 | + rtc_int_update_irq(s); | 306 | - and function index which are described in the DSM specification. |
177 | +} | 307 | - |
178 | + | 308 | -Methods on NVDIMM ROOT Device |
179 | +static uint64_t rtc_int_en_prew(RegisterInfo *reg, uint64_t val64) | 309 | -_FIT(Firmware Interface Table) |
180 | +{ | 310 | - It evaluates to a buffer returning data in the format of a series of NFIT |
181 | + XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(reg->opaque); | 311 | - Type Structure. |
182 | + | 312 | - |
183 | + s->regs[R_RTC_INT_MASK] &= (uint32_t) ~val64; | 313 | - Arguments: None |
184 | + rtc_int_update_irq(s); | 314 | - |
185 | + return 0; | 315 | - Return Value: |
186 | +} | 316 | - A Buffer containing a list of NFIT Type structure entries. |
187 | + | 317 | - |
188 | +static uint64_t rtc_int_dis_prew(RegisterInfo *reg, uint64_t val64) | 318 | - The detailed definition of the structure can be found at ACPI 6.0: 5.2.25 |
189 | +{ | 319 | - NVDIMM Firmware Interface Table (NFIT). |
190 | + XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(reg->opaque); | 320 | - |
191 | + | 321 | -QEMU NVDIMM Implementation |
192 | + s->regs[R_RTC_INT_MASK] |= (uint32_t) val64; | 322 | -========================== |
193 | + rtc_int_update_irq(s); | 323 | -QEMU uses 4 bytes IO Port starting from 0x0a18 and a RAM-based memory page |
194 | + return 0; | 324 | -for NVDIMM ACPI. |
195 | +} | 325 | - |
196 | + | 326 | -Memory: |
197 | +static void addr_error_postw(RegisterInfo *reg, uint64_t val64) | 327 | - QEMU uses BIOS Linker/loader feature to ask BIOS to allocate a memory |
198 | +{ | 328 | - page and dynamically patch its address into an int32 object named "MEMA" |
199 | + XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(reg->opaque); | 329 | - in ACPI. |
200 | + addr_error_int_update_irq(s); | 330 | - |
201 | +} | 331 | - This page is RAM-based and it is used to transfer data between _DSM |
202 | + | 332 | - method and QEMU. If ACPI has control, this pages is owned by ACPI which |
203 | +static uint64_t addr_error_int_en_prew(RegisterInfo *reg, uint64_t val64) | 333 | - writes _DSM input data to it, otherwise, it is owned by QEMU which |
204 | +{ | 334 | - emulates _DSM access and writes the output data to it. |
205 | + XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(reg->opaque); | 335 | - |
206 | + | 336 | - ACPI writes _DSM Input Data (based on the offset in the page): |
207 | + s->regs[R_ADDR_ERROR_INT_MASK] &= (uint32_t) ~val64; | 337 | - [0x0 - 0x3]: 4 bytes, NVDIMM Device Handle. |
208 | + addr_error_int_update_irq(s); | 338 | - |
209 | + return 0; | 339 | - The handle is completely QEMU internal thing, the values in |
210 | +} | 340 | - range [1, 0xFFFF] indicate nvdimm device. Other values are |
211 | + | 341 | - reserved for other purposes. |
212 | +static uint64_t addr_error_int_dis_prew(RegisterInfo *reg, uint64_t val64) | 342 | - |
213 | +{ | 343 | - Reserved handles: |
214 | + XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(reg->opaque); | 344 | - 0 is reserved for nvdimm root device named NVDR. |
215 | + | 345 | - 0x10000 is reserved for QEMU internal DSM function called on |
216 | + s->regs[R_ADDR_ERROR_INT_MASK] |= (uint32_t) val64; | 346 | - the root device. |
217 | + addr_error_int_update_irq(s); | 347 | - |
218 | + return 0; | 348 | - [0x4 - 0x7]: 4 bytes, Revision ID, that is the Arg1 of _DSM method. |
219 | +} | 349 | - [0x8 - 0xB]: 4 bytes. Function Index, that is the Arg2 of _DSM method. |
220 | + | 350 | - [0xC - 0xFFF]: 4084 bytes, the Arg3 of _DSM method. |
221 | +static const RegisterAccessInfo rtc_regs_info[] = { | 351 | - |
222 | + { .name = "SET_TIME_WRITE", .addr = A_SET_TIME_WRITE, | 352 | - QEMU Writes Output Data (based on the offset in the page): |
223 | + },{ .name = "SET_TIME_READ", .addr = A_SET_TIME_READ, | 353 | - [0x0 - 0x3]: 4 bytes, the length of result |
224 | + .ro = 0xffffffff, | 354 | - [0x4 - 0xFFF]: 4092 bytes, the DSM result filled by QEMU |
225 | + },{ .name = "CALIB_WRITE", .addr = A_CALIB_WRITE, | 355 | - |
226 | + },{ .name = "CALIB_READ", .addr = A_CALIB_READ, | 356 | -IO Port 0x0a18 - 0xa1b: |
227 | + .ro = 0x1fffff, | 357 | - ACPI writes the address of the memory page allocated by BIOS to this |
228 | + },{ .name = "CURRENT_TIME", .addr = A_CURRENT_TIME, | 358 | - port then QEMU gets the control and fills the result in the memory page. |
229 | + .ro = 0xffffffff, | 359 | - |
230 | + },{ .name = "CURRENT_TICK", .addr = A_CURRENT_TICK, | 360 | - write Access: |
231 | + .ro = 0xffff, | 361 | - [0x0a18 - 0xa1b]: 4 bytes, the address of the memory page allocated |
232 | + },{ .name = "ALARM", .addr = A_ALARM, | 362 | - by BIOS. |
233 | + },{ .name = "RTC_INT_STATUS", .addr = A_RTC_INT_STATUS, | 363 | - |
234 | + .w1c = 0x3, | 364 | -_DSM process diagram: |
235 | + .post_write = rtc_int_status_postw, | 365 | ---------------------- |
236 | + },{ .name = "RTC_INT_MASK", .addr = A_RTC_INT_MASK, | 366 | -"MEMA" indicates the address of memory page allocated by BIOS. |
237 | + .reset = 0x3, | 367 | - |
238 | + .ro = 0x3, | 368 | - +----------------------+ +-----------------------+ |
239 | + },{ .name = "RTC_INT_EN", .addr = A_RTC_INT_EN, | 369 | - | 1. OSPM | | 2. OSPM | |
240 | + .pre_write = rtc_int_en_prew, | 370 | - | save _DSM input data | | write "MEMA" to | Exit to QEMU |
241 | + },{ .name = "RTC_INT_DIS", .addr = A_RTC_INT_DIS, | 371 | - | to the page +----->| IO port 0x0a18 +------------+ |
242 | + .pre_write = rtc_int_dis_prew, | 372 | - | indicated by "MEMA" | | | | |
243 | + },{ .name = "ADDR_ERROR", .addr = A_ADDR_ERROR, | 373 | - +----------------------+ +-----------------------+ | |
244 | + .w1c = 0x1, | 374 | - | |
245 | + .post_write = addr_error_postw, | 375 | - v |
246 | + },{ .name = "ADDR_ERROR_INT_MASK", .addr = A_ADDR_ERROR_INT_MASK, | 376 | - +------------- ----+ +-----------+ +------------------+--------+ |
247 | + .reset = 0x1, | 377 | - | 5 QEMU | | 4 QEMU | | 3. QEMU | |
248 | + .ro = 0x1, | 378 | - | write _DSM result | | emulate | | get _DSM input data from | |
249 | + },{ .name = "ADDR_ERROR_INT_EN", .addr = A_ADDR_ERROR_INT_EN, | 379 | - | to the page +<------+ _DSM +<-----+ the page indicated by the | |
250 | + .pre_write = addr_error_int_en_prew, | 380 | - | | | | | value from the IO port | |
251 | + },{ .name = "ADDR_ERROR_INT_DIS", .addr = A_ADDR_ERROR_INT_DIS, | 381 | - +--------+-----------+ +-----------+ +---------------------------+ |
252 | + .pre_write = addr_error_int_dis_prew, | 382 | - | |
253 | + },{ .name = "CONTROL", .addr = A_CONTROL, | 383 | - | Enter Guest |
254 | + .reset = 0x1000000, | 384 | - | |
255 | + .rsvd = 0x70fffffe, | 385 | - v |
256 | + },{ .name = "SAFETY_CHK", .addr = A_SAFETY_CHK, | 386 | - +--------------------------+ +--------------+ |
257 | + } | 387 | - | 6 OSPM | | 7 OSPM | |
258 | +}; | 388 | - | result size is returned | | _DSM return | |
259 | + | 389 | - | by reading DSM +----->+ | |
260 | +static void rtc_reset(DeviceState *dev) | 390 | - | result from the page | | | |
261 | +{ | 391 | - +--------------------------+ +--------------+ |
262 | + XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(dev); | 392 | - |
263 | + unsigned int i; | 393 | -NVDIMM hotplug |
264 | + | 394 | --------------- |
265 | + for (i = 0; i < ARRAY_SIZE(s->regs_info); ++i) { | 395 | -ACPI BIOS GPE.4 handler is dedicated for notifying OS about nvdimm device |
266 | + register_reset(&s->regs_info[i]); | 396 | -hot-add event. |
267 | + } | 397 | - |
268 | + | 398 | -QEMU internal use only _DSM function |
269 | + rtc_int_update_irq(s); | 399 | ------------------------------------- |
270 | + addr_error_int_update_irq(s); | 400 | -1) Read FIT |
271 | +} | 401 | - _FIT method uses _DSM method to fetch NFIT structures blob from QEMU |
272 | + | 402 | - in 1 page sized increments which are then concatenated and returned |
273 | +static const MemoryRegionOps rtc_ops = { | 403 | - as _FIT method result. |
274 | + .read = register_read_memory, | 404 | - |
275 | + .write = register_write_memory, | 405 | - Input parameters: |
276 | + .endianness = DEVICE_LITTLE_ENDIAN, | 406 | - Arg0 – UUID {set to 648B9CF2-CDA1-4312-8AD9-49C4AF32BD62} |
277 | + .valid = { | 407 | - Arg1 – Revision ID (set to 1) |
278 | + .min_access_size = 4, | 408 | - Arg2 - Function Index, 0x1 |
279 | + .max_access_size = 4, | 409 | - Arg3 - A package containing a buffer whose layout is as follows: |
280 | + }, | 410 | - |
281 | +}; | 411 | - +----------+--------+--------+-------------------------------------------+ |
282 | + | 412 | - | Field | Length | Offset | Description | |
283 | +static void rtc_init(Object *obj) | 413 | - +----------+--------+--------+-------------------------------------------+ |
284 | +{ | 414 | - | offset | 4 | 0 | offset in QEMU's NFIT structures blob to | |
285 | + XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(obj); | 415 | - | | | | read from | |
286 | + SysBusDevice *sbd = SYS_BUS_DEVICE(obj); | 416 | - +----------+--------+--------+-------------------------------------------+ |
287 | + RegisterInfoArray *reg_array; | 417 | - |
288 | + | 418 | - Output layout in the dsm memory page: |
289 | + memory_region_init(&s->iomem, obj, TYPE_XLNX_ZYNQMP_RTC, | 419 | - +----------+--------+--------+-------------------------------------------+ |
290 | + XLNX_ZYNQMP_RTC_R_MAX * 4); | 420 | - | Field | Length | Offset | Description | |
291 | + reg_array = | 421 | - +----------+--------+--------+-------------------------------------------+ |
292 | + register_init_block32(DEVICE(obj), rtc_regs_info, | 422 | - | length | 4 | 0 | length of entire returned data | |
293 | + ARRAY_SIZE(rtc_regs_info), | 423 | - | | | | (including this header) | |
294 | + s->regs_info, s->regs, | 424 | - +----------+-----------------+-------------------------------------------+ |
295 | + &rtc_ops, | 425 | - | | | | return status codes | |
296 | + XLNX_ZYNQMP_RTC_ERR_DEBUG, | 426 | - | | | | 0x0 - success | |
297 | + XLNX_ZYNQMP_RTC_R_MAX * 4); | 427 | - | | | | 0x100 - error caused by NFIT update while | |
298 | + memory_region_add_subregion(&s->iomem, | 428 | - | status | 4 | 4 | read by _FIT wasn't completed, other | |
299 | + 0x0, | 429 | - | | | | codes follow Chapter 3 in DSM Spec Rev1 | |
300 | + ®_array->mem); | 430 | - +----------+-----------------+-------------------------------------------+ |
301 | + sysbus_init_mmio(sbd, &s->iomem); | 431 | - | fit data | Varies | 8 | contains FIT data, this field is present | |
302 | + sysbus_init_irq(sbd, &s->irq_rtc_int); | 432 | - | | | | if status field is 0; | |
303 | + sysbus_init_irq(sbd, &s->irq_addr_error_int); | 433 | - +----------+--------+--------+-------------------------------------------+ |
304 | +} | 434 | - |
305 | + | 435 | - The FIT offset is maintained by the OSPM itself, current offset plus |
306 | +static const VMStateDescription vmstate_rtc = { | 436 | - the size of the fit data returned by the function is the next offset |
307 | + .name = TYPE_XLNX_ZYNQMP_RTC, | 437 | - OSPM should read. When all FIT data has been read out, zero fit data |
308 | + .version_id = 1, | 438 | - size is returned. |
309 | + .minimum_version_id = 1, | 439 | - |
310 | + .fields = (VMStateField[]) { | 440 | - If it returns status code 0x100, OSPM should restart to read FIT (read |
311 | + VMSTATE_UINT32_ARRAY(regs, XlnxZynqMPRTC, XLNX_ZYNQMP_RTC_R_MAX), | 441 | - from offset 0 again). |
312 | + VMSTATE_END_OF_LIST(), | 442 | diff --git a/docs/specs/index.rst b/docs/specs/index.rst |
313 | + } | 443 | index XXXXXXX..XXXXXXX 100644 |
314 | +}; | 444 | --- a/docs/specs/index.rst |
315 | + | 445 | +++ b/docs/specs/index.rst |
316 | +static void rtc_class_init(ObjectClass *klass, void *data) | 446 | @@ -XXX,XX +XXX,XX @@ guest hardware that is specific to QEMU. |
317 | +{ | 447 | acpi_cpu_hotplug |
318 | + DeviceClass *dc = DEVICE_CLASS(klass); | 448 | acpi_mem_hotplug |
319 | + | 449 | acpi_pci_hotplug |
320 | + dc->reset = rtc_reset; | 450 | + acpi_nvdimm |
321 | + dc->vmsd = &vmstate_rtc; | ||
322 | +} | ||
323 | + | ||
324 | +static const TypeInfo rtc_info = { | ||
325 | + .name = TYPE_XLNX_ZYNQMP_RTC, | ||
326 | + .parent = TYPE_SYS_BUS_DEVICE, | ||
327 | + .instance_size = sizeof(XlnxZynqMPRTC), | ||
328 | + .class_init = rtc_class_init, | ||
329 | + .instance_init = rtc_init, | ||
330 | +}; | ||
331 | + | ||
332 | +static void rtc_register_types(void) | ||
333 | +{ | ||
334 | + type_register_static(&rtc_info); | ||
335 | +} | ||
336 | + | ||
337 | +type_init(rtc_register_types) | ||
338 | -- | 451 | -- |
339 | 2.16.2 | 452 | 2.20.1 |
340 | 453 | ||
341 | 454 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Alistair Francis <alistair.francis@xilinx.com> | ||
2 | 1 | ||
3 | Allow the guest to determine the time set from the QEMU command line. | ||
4 | |||
5 | This includes adding a trace event to debug the new time. | ||
6 | |||
7 | Signed-off-by: Alistair Francis <alistair.francis@xilinx.com> | ||
8 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | --- | ||
12 | include/hw/timer/xlnx-zynqmp-rtc.h | 2 ++ | ||
13 | hw/timer/xlnx-zynqmp-rtc.c | 58 ++++++++++++++++++++++++++++++++++++++ | ||
14 | hw/timer/trace-events | 3 ++ | ||
15 | 3 files changed, 63 insertions(+) | ||
16 | |||
17 | diff --git a/include/hw/timer/xlnx-zynqmp-rtc.h b/include/hw/timer/xlnx-zynqmp-rtc.h | ||
18 | index XXXXXXX..XXXXXXX 100644 | ||
19 | --- a/include/hw/timer/xlnx-zynqmp-rtc.h | ||
20 | +++ b/include/hw/timer/xlnx-zynqmp-rtc.h | ||
21 | @@ -XXX,XX +XXX,XX @@ typedef struct XlnxZynqMPRTC { | ||
22 | qemu_irq irq_rtc_int; | ||
23 | qemu_irq irq_addr_error_int; | ||
24 | |||
25 | + uint32_t tick_offset; | ||
26 | + | ||
27 | uint32_t regs[XLNX_ZYNQMP_RTC_R_MAX]; | ||
28 | RegisterInfo regs_info[XLNX_ZYNQMP_RTC_R_MAX]; | ||
29 | } XlnxZynqMPRTC; | ||
30 | diff --git a/hw/timer/xlnx-zynqmp-rtc.c b/hw/timer/xlnx-zynqmp-rtc.c | ||
31 | index XXXXXXX..XXXXXXX 100644 | ||
32 | --- a/hw/timer/xlnx-zynqmp-rtc.c | ||
33 | +++ b/hw/timer/xlnx-zynqmp-rtc.c | ||
34 | @@ -XXX,XX +XXX,XX @@ | ||
35 | #include "hw/register.h" | ||
36 | #include "qemu/bitops.h" | ||
37 | #include "qemu/log.h" | ||
38 | +#include "hw/ptimer.h" | ||
39 | +#include "qemu/cutils.h" | ||
40 | +#include "sysemu/sysemu.h" | ||
41 | +#include "trace.h" | ||
42 | #include "hw/timer/xlnx-zynqmp-rtc.h" | ||
43 | |||
44 | #ifndef XLNX_ZYNQMP_RTC_ERR_DEBUG | ||
45 | @@ -XXX,XX +XXX,XX @@ static void addr_error_int_update_irq(XlnxZynqMPRTC *s) | ||
46 | qemu_set_irq(s->irq_addr_error_int, pending); | ||
47 | } | ||
48 | |||
49 | +static uint32_t rtc_get_count(XlnxZynqMPRTC *s) | ||
50 | +{ | ||
51 | + int64_t now = qemu_clock_get_ns(rtc_clock); | ||
52 | + return s->tick_offset + now / NANOSECONDS_PER_SECOND; | ||
53 | +} | ||
54 | + | ||
55 | +static uint64_t current_time_postr(RegisterInfo *reg, uint64_t val64) | ||
56 | +{ | ||
57 | + XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(reg->opaque); | ||
58 | + | ||
59 | + return rtc_get_count(s); | ||
60 | +} | ||
61 | + | ||
62 | static void rtc_int_status_postw(RegisterInfo *reg, uint64_t val64) | ||
63 | { | ||
64 | XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(reg->opaque); | ||
65 | @@ -XXX,XX +XXX,XX @@ static uint64_t addr_error_int_dis_prew(RegisterInfo *reg, uint64_t val64) | ||
66 | |||
67 | static const RegisterAccessInfo rtc_regs_info[] = { | ||
68 | { .name = "SET_TIME_WRITE", .addr = A_SET_TIME_WRITE, | ||
69 | + .unimp = MAKE_64BIT_MASK(0, 32), | ||
70 | },{ .name = "SET_TIME_READ", .addr = A_SET_TIME_READ, | ||
71 | .ro = 0xffffffff, | ||
72 | + .post_read = current_time_postr, | ||
73 | },{ .name = "CALIB_WRITE", .addr = A_CALIB_WRITE, | ||
74 | + .unimp = MAKE_64BIT_MASK(0, 32), | ||
75 | },{ .name = "CALIB_READ", .addr = A_CALIB_READ, | ||
76 | .ro = 0x1fffff, | ||
77 | },{ .name = "CURRENT_TIME", .addr = A_CURRENT_TIME, | ||
78 | .ro = 0xffffffff, | ||
79 | + .post_read = current_time_postr, | ||
80 | },{ .name = "CURRENT_TICK", .addr = A_CURRENT_TICK, | ||
81 | .ro = 0xffff, | ||
82 | },{ .name = "ALARM", .addr = A_ALARM, | ||
83 | @@ -XXX,XX +XXX,XX @@ static void rtc_init(Object *obj) | ||
84 | XlnxZynqMPRTC *s = XLNX_ZYNQMP_RTC(obj); | ||
85 | SysBusDevice *sbd = SYS_BUS_DEVICE(obj); | ||
86 | RegisterInfoArray *reg_array; | ||
87 | + struct tm current_tm; | ||
88 | |||
89 | memory_region_init(&s->iomem, obj, TYPE_XLNX_ZYNQMP_RTC, | ||
90 | XLNX_ZYNQMP_RTC_R_MAX * 4); | ||
91 | @@ -XXX,XX +XXX,XX @@ static void rtc_init(Object *obj) | ||
92 | sysbus_init_mmio(sbd, &s->iomem); | ||
93 | sysbus_init_irq(sbd, &s->irq_rtc_int); | ||
94 | sysbus_init_irq(sbd, &s->irq_addr_error_int); | ||
95 | + | ||
96 | + qemu_get_timedate(¤t_tm, 0); | ||
97 | + s->tick_offset = mktimegm(¤t_tm) - | ||
98 | + qemu_clock_get_ns(rtc_clock) / NANOSECONDS_PER_SECOND; | ||
99 | + | ||
100 | + trace_xlnx_zynqmp_rtc_gettime(current_tm.tm_year, current_tm.tm_mon, | ||
101 | + current_tm.tm_mday, current_tm.tm_hour, | ||
102 | + current_tm.tm_min, current_tm.tm_sec); | ||
103 | +} | ||
104 | + | ||
105 | +static int rtc_pre_save(void *opaque) | ||
106 | +{ | ||
107 | + XlnxZynqMPRTC *s = opaque; | ||
108 | + int64_t now = qemu_clock_get_ns(rtc_clock) / NANOSECONDS_PER_SECOND; | ||
109 | + | ||
110 | + /* Add the time at migration */ | ||
111 | + s->tick_offset = s->tick_offset + now; | ||
112 | + | ||
113 | + return 0; | ||
114 | +} | ||
115 | + | ||
116 | +static int rtc_post_load(void *opaque, int version_id) | ||
117 | +{ | ||
118 | + XlnxZynqMPRTC *s = opaque; | ||
119 | + int64_t now = qemu_clock_get_ns(rtc_clock) / NANOSECONDS_PER_SECOND; | ||
120 | + | ||
121 | + /* Subtract the time after migration. This combined with the pre_save | ||
122 | + * action results in us having subtracted the time that the guest was | ||
123 | + * stopped to the offset. | ||
124 | + */ | ||
125 | + s->tick_offset = s->tick_offset - now; | ||
126 | + | ||
127 | + return 0; | ||
128 | } | ||
129 | |||
130 | static const VMStateDescription vmstate_rtc = { | ||
131 | .name = TYPE_XLNX_ZYNQMP_RTC, | ||
132 | .version_id = 1, | ||
133 | .minimum_version_id = 1, | ||
134 | + .pre_save = rtc_pre_save, | ||
135 | + .post_load = rtc_post_load, | ||
136 | .fields = (VMStateField[]) { | ||
137 | VMSTATE_UINT32_ARRAY(regs, XlnxZynqMPRTC, XLNX_ZYNQMP_RTC_R_MAX), | ||
138 | + VMSTATE_UINT32(tick_offset, XlnxZynqMPRTC), | ||
139 | VMSTATE_END_OF_LIST(), | ||
140 | } | ||
141 | }; | ||
142 | diff --git a/hw/timer/trace-events b/hw/timer/trace-events | ||
143 | index XXXXXXX..XXXXXXX 100644 | ||
144 | --- a/hw/timer/trace-events | ||
145 | +++ b/hw/timer/trace-events | ||
146 | @@ -XXX,XX +XXX,XX @@ systick_write(uint64_t addr, uint32_t value, unsigned size) "systick write addr | ||
147 | cmsdk_apb_timer_read(uint64_t offset, uint64_t data, unsigned size) "CMSDK APB timer read: offset 0x%" PRIx64 " data 0x%" PRIx64 " size %u" | ||
148 | cmsdk_apb_timer_write(uint64_t offset, uint64_t data, unsigned size) "CMSDK APB timer write: offset 0x%" PRIx64 " data 0x%" PRIx64 " size %u" | ||
149 | cmsdk_apb_timer_reset(void) "CMSDK APB timer: reset" | ||
150 | + | ||
151 | +# hw/timer/xlnx-zynqmp-rtc.c | ||
152 | +xlnx_zynqmp_rtc_gettime(int year, int month, int day, int hour, int min, int sec) "Get time from host: %d-%d-%d %2d:%02d:%02d" | ||
153 | -- | ||
154 | 2.16.2 | ||
155 | |||
156 | diff view generated by jsdifflib |
1 | The or-irq.h header file is missing the customary guard against | 1 | Add entries for the ACPI specs documents in docs/specs to |
---|---|---|---|
2 | multiple inclusion, which means compilation fails if it gets | 2 | appropriate sections of MAINTAINERS. |
3 | included twice. Fix the omission. | ||
4 | 3 | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
6 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 5 | Reviewed-by: Igor Mammedov <imammedo@redhat.com> |
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 6 | Message-id: 20210727170414.3368-6-peter.maydell@linaro.org |
8 | Message-id: 20180220180325.29818-11-peter.maydell@linaro.org | ||
9 | --- | 7 | --- |
10 | include/hw/or-irq.h | 5 +++++ | 8 | MAINTAINERS | 5 +++++ |
11 | 1 file changed, 5 insertions(+) | 9 | 1 file changed, 5 insertions(+) |
12 | 10 | ||
13 | diff --git a/include/hw/or-irq.h b/include/hw/or-irq.h | 11 | diff --git a/MAINTAINERS b/MAINTAINERS |
14 | index XXXXXXX..XXXXXXX 100644 | 12 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/include/hw/or-irq.h | 13 | --- a/MAINTAINERS |
16 | +++ b/include/hw/or-irq.h | 14 | +++ b/MAINTAINERS |
17 | @@ -XXX,XX +XXX,XX @@ | 15 | @@ -XXX,XX +XXX,XX @@ F: qapi/acpi.json |
18 | * THE SOFTWARE. | 16 | F: tests/qtest/bios-tables-test* |
19 | */ | 17 | F: tests/qtest/acpi-utils.[hc] |
20 | 18 | F: tests/data/acpi/ | |
21 | +#ifndef HW_OR_IRQ_H | 19 | +F: docs/specs/acpi_cpu_hotplug.rst |
22 | +#define HW_OR_IRQ_H | 20 | +F: docs/specs/acpi_mem_hotplug.rst |
23 | + | 21 | +F: docs/specs/acpi_pci_hotplug.rst |
24 | #include "hw/irq.h" | 22 | +F: docs/specs/acpi_hw_reduced_hotplug.rst |
25 | #include "hw/sysbus.h" | 23 | |
26 | #include "qom/object.h" | 24 | ACPI/HEST/GHES |
27 | @@ -XXX,XX +XXX,XX @@ struct OrIRQState { | 25 | R: Dongjiu Geng <gengdongjiu1@gmail.com> |
28 | bool levels[MAX_OR_LINES]; | 26 | @@ -XXX,XX +XXX,XX @@ F: hw/acpi/nvdimm.c |
29 | uint16_t num_lines; | 27 | F: hw/mem/nvdimm.c |
30 | }; | 28 | F: include/hw/mem/nvdimm.h |
31 | + | 29 | F: docs/nvdimm.txt |
32 | +#endif | 30 | +F: docs/specs/acpi_nvdimm.rst |
31 | |||
32 | e1000x | ||
33 | M: Dmitry Fleytman <dmitry.fleytman@gmail.com> | ||
33 | -- | 34 | -- |
34 | 2.16.2 | 35 | 2.20.1 |
35 | 36 | ||
36 | 37 | diff view generated by jsdifflib |
1 | Add a model of the TrustZone peripheral protection controller (PPC), | 1 | The xen_available() function is used only to produce an error |
---|---|---|---|
2 | which is used to gate transactions to non-TZ-aware peripherals so | 2 | for some Xen-specific command line options in QEMU binaries where |
3 | that secure software can configure them to not be accessible to | 3 | Xen support was not compiled in: it just returns the value of |
4 | non-secure software. | 4 | the CONFIG_XEN define. |
5 | |||
6 | Now that accelerators are QOM classes, we can check for | ||
7 | "does this binary have Xen compiled in" with accel_find("xen"), | ||
8 | and drop the xen_available() function. | ||
5 | 9 | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 11 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
8 | Message-id: 20180220180325.29818-15-peter.maydell@linaro.org | 12 | Message-id: 20210730105947.28215-2-peter.maydell@linaro.org |
9 | --- | 13 | --- |
10 | hw/misc/Makefile.objs | 2 + | 14 | include/sysemu/arch_init.h | 1 - |
11 | include/hw/misc/tz-ppc.h | 101 ++++++++++++++ | 15 | softmmu/arch_init.c | 9 --------- |
12 | hw/misc/tz-ppc.c | 302 ++++++++++++++++++++++++++++++++++++++++ | 16 | softmmu/vl.c | 6 +++--- |
13 | default-configs/arm-softmmu.mak | 2 + | 17 | 3 files changed, 3 insertions(+), 13 deletions(-) |
14 | hw/misc/trace-events | 11 ++ | ||
15 | 5 files changed, 418 insertions(+) | ||
16 | create mode 100644 include/hw/misc/tz-ppc.h | ||
17 | create mode 100644 hw/misc/tz-ppc.c | ||
18 | 18 | ||
19 | diff --git a/hw/misc/Makefile.objs b/hw/misc/Makefile.objs | 19 | diff --git a/include/sysemu/arch_init.h b/include/sysemu/arch_init.h |
20 | index XXXXXXX..XXXXXXX 100644 | 20 | index XXXXXXX..XXXXXXX 100644 |
21 | --- a/hw/misc/Makefile.objs | 21 | --- a/include/sysemu/arch_init.h |
22 | +++ b/hw/misc/Makefile.objs | 22 | +++ b/include/sysemu/arch_init.h |
23 | @@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_MIPS_ITU) += mips_itu.o | 23 | @@ -XXX,XX +XXX,XX @@ enum { |
24 | obj-$(CONFIG_MPS2_FPGAIO) += mps2-fpgaio.o | 24 | extern const uint32_t arch_type; |
25 | obj-$(CONFIG_MPS2_SCC) += mps2-scc.o | 25 | |
26 | 26 | int kvm_available(void); | |
27 | +obj-$(CONFIG_TZ_PPC) += tz-ppc.o | 27 | -int xen_available(void); |
28 | + | 28 | |
29 | obj-$(CONFIG_PVPANIC) += pvpanic.o | 29 | /* default virtio transport per architecture */ |
30 | obj-$(CONFIG_HYPERV_TESTDEV) += hyperv_testdev.o | 30 | #define QEMU_ARCH_VIRTIO_PCI (QEMU_ARCH_ALPHA | QEMU_ARCH_ARM | \ |
31 | obj-$(CONFIG_AUX) += auxbus.o | 31 | diff --git a/softmmu/arch_init.c b/softmmu/arch_init.c |
32 | diff --git a/include/hw/misc/tz-ppc.h b/include/hw/misc/tz-ppc.h | ||
33 | new file mode 100644 | ||
34 | index XXXXXXX..XXXXXXX | ||
35 | --- /dev/null | ||
36 | +++ b/include/hw/misc/tz-ppc.h | ||
37 | @@ -XXX,XX +XXX,XX @@ | ||
38 | +/* | ||
39 | + * ARM TrustZone peripheral protection controller emulation | ||
40 | + * | ||
41 | + * Copyright (c) 2018 Linaro Limited | ||
42 | + * Written by Peter Maydell | ||
43 | + * | ||
44 | + * This program is free software; you can redistribute it and/or modify | ||
45 | + * it under the terms of the GNU General Public License version 2 or | ||
46 | + * (at your option) any later version. | ||
47 | + */ | ||
48 | + | ||
49 | +/* This is a model of the TrustZone peripheral protection controller (PPC). | ||
50 | + * It is documented in the ARM CoreLink SIE-200 System IP for Embedded TRM | ||
51 | + * (DDI 0571G): | ||
52 | + * https://developer.arm.com/products/architecture/m-profile/docs/ddi0571/g | ||
53 | + * | ||
54 | + * The PPC sits in front of peripherals and allows secure software to | ||
55 | + * configure it to either pass through or reject transactions. | ||
56 | + * Rejected transactions may be configured to either be aborted, or to | ||
57 | + * behave as RAZ/WI. An interrupt can be signalled for a rejected transaction. | ||
58 | + * | ||
59 | + * The PPC has no register interface -- it is configured purely by a | ||
60 | + * collection of input signals from other hardware in the system. Typically | ||
61 | + * they are either hardwired or exposed in an ad-hoc register interface by | ||
62 | + * the SoC that uses the PPC. | ||
63 | + * | ||
64 | + * This QEMU model can be used to model either the AHB5 or APB4 TZ PPC, | ||
65 | + * since the only difference between them is that the AHB version has a | ||
66 | + * "default" port which has no security checks applied. In QEMU the default | ||
67 | + * port can be emulated simply by wiring its downstream devices directly | ||
68 | + * into the parent address space, since the PPC does not need to intercept | ||
69 | + * transactions there. | ||
70 | + * | ||
71 | + * In the hardware, selection of which downstream port to use is done by | ||
72 | + * the user's decode logic asserting one of the hsel[] signals. In QEMU, | ||
73 | + * we provide 16 MMIO regions, one per port, and the user maps these into | ||
74 | + * the desired addresses to implement the address decode. | ||
75 | + * | ||
76 | + * QEMU interface: | ||
77 | + * + sysbus MMIO regions 0..15: MemoryRegions defining the upstream end | ||
78 | + * of each of the 16 ports of the PPC | ||
79 | + * + Property "port[0..15]": MemoryRegion defining the downstream device(s) | ||
80 | + * for each of the 16 ports of the PPC | ||
81 | + * + Named GPIO inputs "cfg_nonsec[0..15]": set to 1 if the port should be | ||
82 | + * accessible to NonSecure transactions | ||
83 | + * + Named GPIO inputs "cfg_ap[0..15]": set to 1 if the port should be | ||
84 | + * accessible to non-privileged transactions | ||
85 | + * + Named GPIO input "cfg_sec_resp": set to 1 if a rejected transaction should | ||
86 | + * result in a transaction error, or 0 for the transaction to RAZ/WI | ||
87 | + * + Named GPIO input "irq_enable": set to 1 to enable interrupts | ||
88 | + * + Named GPIO input "irq_clear": set to 1 to clear a pending interrupt | ||
89 | + * + Named GPIO output "irq": set for a transaction-failed interrupt | ||
90 | + * + Property "NONSEC_MASK": if a bit is set in this mask then accesses to | ||
91 | + * the associated port do not have the TZ security check performed. (This | ||
92 | + * corresponds to the hardware allowing this to be set as a Verilog | ||
93 | + * parameter.) | ||
94 | + */ | ||
95 | + | ||
96 | +#ifndef TZ_PPC_H | ||
97 | +#define TZ_PPC_H | ||
98 | + | ||
99 | +#include "hw/sysbus.h" | ||
100 | + | ||
101 | +#define TYPE_TZ_PPC "tz-ppc" | ||
102 | +#define TZ_PPC(obj) OBJECT_CHECK(TZPPC, (obj), TYPE_TZ_PPC) | ||
103 | + | ||
104 | +#define TZ_NUM_PORTS 16 | ||
105 | + | ||
106 | +typedef struct TZPPC TZPPC; | ||
107 | + | ||
108 | +typedef struct TZPPCPort { | ||
109 | + TZPPC *ppc; | ||
110 | + MemoryRegion upstream; | ||
111 | + AddressSpace downstream_as; | ||
112 | + MemoryRegion *downstream; | ||
113 | +} TZPPCPort; | ||
114 | + | ||
115 | +struct TZPPC { | ||
116 | + /*< private >*/ | ||
117 | + SysBusDevice parent_obj; | ||
118 | + | ||
119 | + /*< public >*/ | ||
120 | + | ||
121 | + /* State: these just track the values of our input signals */ | ||
122 | + bool cfg_nonsec[TZ_NUM_PORTS]; | ||
123 | + bool cfg_ap[TZ_NUM_PORTS]; | ||
124 | + bool cfg_sec_resp; | ||
125 | + bool irq_enable; | ||
126 | + bool irq_clear; | ||
127 | + /* State: are we asserting irq ? */ | ||
128 | + bool irq_status; | ||
129 | + | ||
130 | + qemu_irq irq; | ||
131 | + | ||
132 | + /* Properties */ | ||
133 | + uint32_t nonsec_mask; | ||
134 | + | ||
135 | + TZPPCPort port[TZ_NUM_PORTS]; | ||
136 | +}; | ||
137 | + | ||
138 | +#endif | ||
139 | diff --git a/hw/misc/tz-ppc.c b/hw/misc/tz-ppc.c | ||
140 | new file mode 100644 | ||
141 | index XXXXXXX..XXXXXXX | ||
142 | --- /dev/null | ||
143 | +++ b/hw/misc/tz-ppc.c | ||
144 | @@ -XXX,XX +XXX,XX @@ | ||
145 | +/* | ||
146 | + * ARM TrustZone peripheral protection controller emulation | ||
147 | + * | ||
148 | + * Copyright (c) 2018 Linaro Limited | ||
149 | + * Written by Peter Maydell | ||
150 | + * | ||
151 | + * This program is free software; you can redistribute it and/or modify | ||
152 | + * it under the terms of the GNU General Public License version 2 or | ||
153 | + * (at your option) any later version. | ||
154 | + */ | ||
155 | + | ||
156 | +#include "qemu/osdep.h" | ||
157 | +#include "qemu/log.h" | ||
158 | +#include "qapi/error.h" | ||
159 | +#include "trace.h" | ||
160 | +#include "hw/sysbus.h" | ||
161 | +#include "hw/registerfields.h" | ||
162 | +#include "hw/misc/tz-ppc.h" | ||
163 | + | ||
164 | +static void tz_ppc_update_irq(TZPPC *s) | ||
165 | +{ | ||
166 | + bool level = s->irq_status && s->irq_enable; | ||
167 | + | ||
168 | + trace_tz_ppc_update_irq(level); | ||
169 | + qemu_set_irq(s->irq, level); | ||
170 | +} | ||
171 | + | ||
172 | +static void tz_ppc_cfg_nonsec(void *opaque, int n, int level) | ||
173 | +{ | ||
174 | + TZPPC *s = TZ_PPC(opaque); | ||
175 | + | ||
176 | + assert(n < TZ_NUM_PORTS); | ||
177 | + trace_tz_ppc_cfg_nonsec(n, level); | ||
178 | + s->cfg_nonsec[n] = level; | ||
179 | +} | ||
180 | + | ||
181 | +static void tz_ppc_cfg_ap(void *opaque, int n, int level) | ||
182 | +{ | ||
183 | + TZPPC *s = TZ_PPC(opaque); | ||
184 | + | ||
185 | + assert(n < TZ_NUM_PORTS); | ||
186 | + trace_tz_ppc_cfg_ap(n, level); | ||
187 | + s->cfg_ap[n] = level; | ||
188 | +} | ||
189 | + | ||
190 | +static void tz_ppc_cfg_sec_resp(void *opaque, int n, int level) | ||
191 | +{ | ||
192 | + TZPPC *s = TZ_PPC(opaque); | ||
193 | + | ||
194 | + trace_tz_ppc_cfg_sec_resp(level); | ||
195 | + s->cfg_sec_resp = level; | ||
196 | +} | ||
197 | + | ||
198 | +static void tz_ppc_irq_enable(void *opaque, int n, int level) | ||
199 | +{ | ||
200 | + TZPPC *s = TZ_PPC(opaque); | ||
201 | + | ||
202 | + trace_tz_ppc_irq_enable(level); | ||
203 | + s->irq_enable = level; | ||
204 | + tz_ppc_update_irq(s); | ||
205 | +} | ||
206 | + | ||
207 | +static void tz_ppc_irq_clear(void *opaque, int n, int level) | ||
208 | +{ | ||
209 | + TZPPC *s = TZ_PPC(opaque); | ||
210 | + | ||
211 | + trace_tz_ppc_irq_clear(level); | ||
212 | + | ||
213 | + s->irq_clear = level; | ||
214 | + if (level) { | ||
215 | + s->irq_status = false; | ||
216 | + tz_ppc_update_irq(s); | ||
217 | + } | ||
218 | +} | ||
219 | + | ||
220 | +static bool tz_ppc_check(TZPPC *s, int n, MemTxAttrs attrs) | ||
221 | +{ | ||
222 | + /* Check whether to allow an access to port n; return true if | ||
223 | + * the check passes, and false if the transaction must be blocked. | ||
224 | + * If the latter, the caller must check cfg_sec_resp to determine | ||
225 | + * whether to abort or RAZ/WI the transaction. | ||
226 | + * The checks are: | ||
227 | + * + nonsec_mask suppresses any check of the secure attribute | ||
228 | + * + otherwise, block if cfg_nonsec is 1 and transaction is secure, | ||
229 | + * or if cfg_nonsec is 0 and transaction is non-secure | ||
230 | + * + block if transaction is usermode and cfg_ap is 0 | ||
231 | + */ | ||
232 | + if ((attrs.secure == s->cfg_nonsec[n] && !(s->nonsec_mask & (1 << n))) || | ||
233 | + (attrs.user && !s->cfg_ap[n])) { | ||
234 | + /* Block the transaction. */ | ||
235 | + if (!s->irq_clear) { | ||
236 | + /* Note that holding irq_clear high suppresses interrupts */ | ||
237 | + s->irq_status = true; | ||
238 | + tz_ppc_update_irq(s); | ||
239 | + } | ||
240 | + return false; | ||
241 | + } | ||
242 | + return true; | ||
243 | +} | ||
244 | + | ||
245 | +static MemTxResult tz_ppc_read(void *opaque, hwaddr addr, uint64_t *pdata, | ||
246 | + unsigned size, MemTxAttrs attrs) | ||
247 | +{ | ||
248 | + TZPPCPort *p = opaque; | ||
249 | + TZPPC *s = p->ppc; | ||
250 | + int n = p - s->port; | ||
251 | + AddressSpace *as = &p->downstream_as; | ||
252 | + uint64_t data; | ||
253 | + MemTxResult res; | ||
254 | + | ||
255 | + if (!tz_ppc_check(s, n, attrs)) { | ||
256 | + trace_tz_ppc_read_blocked(n, addr, attrs.secure, attrs.user); | ||
257 | + if (s->cfg_sec_resp) { | ||
258 | + return MEMTX_ERROR; | ||
259 | + } else { | ||
260 | + *pdata = 0; | ||
261 | + return MEMTX_OK; | ||
262 | + } | ||
263 | + } | ||
264 | + | ||
265 | + switch (size) { | ||
266 | + case 1: | ||
267 | + data = address_space_ldub(as, addr, attrs, &res); | ||
268 | + break; | ||
269 | + case 2: | ||
270 | + data = address_space_lduw_le(as, addr, attrs, &res); | ||
271 | + break; | ||
272 | + case 4: | ||
273 | + data = address_space_ldl_le(as, addr, attrs, &res); | ||
274 | + break; | ||
275 | + case 8: | ||
276 | + data = address_space_ldq_le(as, addr, attrs, &res); | ||
277 | + break; | ||
278 | + default: | ||
279 | + g_assert_not_reached(); | ||
280 | + } | ||
281 | + *pdata = data; | ||
282 | + return res; | ||
283 | +} | ||
284 | + | ||
285 | +static MemTxResult tz_ppc_write(void *opaque, hwaddr addr, uint64_t val, | ||
286 | + unsigned size, MemTxAttrs attrs) | ||
287 | +{ | ||
288 | + TZPPCPort *p = opaque; | ||
289 | + TZPPC *s = p->ppc; | ||
290 | + AddressSpace *as = &p->downstream_as; | ||
291 | + int n = p - s->port; | ||
292 | + MemTxResult res; | ||
293 | + | ||
294 | + if (!tz_ppc_check(s, n, attrs)) { | ||
295 | + trace_tz_ppc_write_blocked(n, addr, attrs.secure, attrs.user); | ||
296 | + if (s->cfg_sec_resp) { | ||
297 | + return MEMTX_ERROR; | ||
298 | + } else { | ||
299 | + return MEMTX_OK; | ||
300 | + } | ||
301 | + } | ||
302 | + | ||
303 | + switch (size) { | ||
304 | + case 1: | ||
305 | + address_space_stb(as, addr, val, attrs, &res); | ||
306 | + break; | ||
307 | + case 2: | ||
308 | + address_space_stw_le(as, addr, val, attrs, &res); | ||
309 | + break; | ||
310 | + case 4: | ||
311 | + address_space_stl_le(as, addr, val, attrs, &res); | ||
312 | + break; | ||
313 | + case 8: | ||
314 | + address_space_stq_le(as, addr, val, attrs, &res); | ||
315 | + break; | ||
316 | + default: | ||
317 | + g_assert_not_reached(); | ||
318 | + } | ||
319 | + return res; | ||
320 | +} | ||
321 | + | ||
322 | +static const MemoryRegionOps tz_ppc_ops = { | ||
323 | + .read_with_attrs = tz_ppc_read, | ||
324 | + .write_with_attrs = tz_ppc_write, | ||
325 | + .endianness = DEVICE_LITTLE_ENDIAN, | ||
326 | +}; | ||
327 | + | ||
328 | +static void tz_ppc_reset(DeviceState *dev) | ||
329 | +{ | ||
330 | + TZPPC *s = TZ_PPC(dev); | ||
331 | + | ||
332 | + trace_tz_ppc_reset(); | ||
333 | + s->cfg_sec_resp = false; | ||
334 | + memset(s->cfg_nonsec, 0, sizeof(s->cfg_nonsec)); | ||
335 | + memset(s->cfg_ap, 0, sizeof(s->cfg_ap)); | ||
336 | +} | ||
337 | + | ||
338 | +static void tz_ppc_init(Object *obj) | ||
339 | +{ | ||
340 | + DeviceState *dev = DEVICE(obj); | ||
341 | + TZPPC *s = TZ_PPC(obj); | ||
342 | + | ||
343 | + qdev_init_gpio_in_named(dev, tz_ppc_cfg_nonsec, "cfg_nonsec", TZ_NUM_PORTS); | ||
344 | + qdev_init_gpio_in_named(dev, tz_ppc_cfg_ap, "cfg_ap", TZ_NUM_PORTS); | ||
345 | + qdev_init_gpio_in_named(dev, tz_ppc_cfg_sec_resp, "cfg_sec_resp", 1); | ||
346 | + qdev_init_gpio_in_named(dev, tz_ppc_irq_enable, "irq_enable", 1); | ||
347 | + qdev_init_gpio_in_named(dev, tz_ppc_irq_clear, "irq_clear", 1); | ||
348 | + qdev_init_gpio_out_named(dev, &s->irq, "irq", 1); | ||
349 | +} | ||
350 | + | ||
351 | +static void tz_ppc_realize(DeviceState *dev, Error **errp) | ||
352 | +{ | ||
353 | + Object *obj = OBJECT(dev); | ||
354 | + SysBusDevice *sbd = SYS_BUS_DEVICE(dev); | ||
355 | + TZPPC *s = TZ_PPC(dev); | ||
356 | + int i; | ||
357 | + | ||
358 | + /* We can't create the upstream end of the port until realize, | ||
359 | + * as we don't know the size of the MR used as the downstream until then. | ||
360 | + */ | ||
361 | + for (i = 0; i < TZ_NUM_PORTS; i++) { | ||
362 | + TZPPCPort *port = &s->port[i]; | ||
363 | + char *name; | ||
364 | + uint64_t size; | ||
365 | + | ||
366 | + if (!port->downstream) { | ||
367 | + continue; | ||
368 | + } | ||
369 | + | ||
370 | + name = g_strdup_printf("tz-ppc-port[%d]", i); | ||
371 | + | ||
372 | + port->ppc = s; | ||
373 | + address_space_init(&port->downstream_as, port->downstream, name); | ||
374 | + | ||
375 | + size = memory_region_size(port->downstream); | ||
376 | + memory_region_init_io(&port->upstream, obj, &tz_ppc_ops, | ||
377 | + port, name, size); | ||
378 | + sysbus_init_mmio(sbd, &port->upstream); | ||
379 | + g_free(name); | ||
380 | + } | ||
381 | +} | ||
382 | + | ||
383 | +static const VMStateDescription tz_ppc_vmstate = { | ||
384 | + .name = "tz-ppc", | ||
385 | + .version_id = 1, | ||
386 | + .minimum_version_id = 1, | ||
387 | + .fields = (VMStateField[]) { | ||
388 | + VMSTATE_BOOL_ARRAY(cfg_nonsec, TZPPC, 16), | ||
389 | + VMSTATE_BOOL_ARRAY(cfg_ap, TZPPC, 16), | ||
390 | + VMSTATE_BOOL(cfg_sec_resp, TZPPC), | ||
391 | + VMSTATE_BOOL(irq_enable, TZPPC), | ||
392 | + VMSTATE_BOOL(irq_clear, TZPPC), | ||
393 | + VMSTATE_BOOL(irq_status, TZPPC), | ||
394 | + VMSTATE_END_OF_LIST() | ||
395 | + } | ||
396 | +}; | ||
397 | + | ||
398 | +#define DEFINE_PORT(N) \ | ||
399 | + DEFINE_PROP_LINK("port[" #N "]", TZPPC, port[N].downstream, \ | ||
400 | + TYPE_MEMORY_REGION, MemoryRegion *) | ||
401 | + | ||
402 | +static Property tz_ppc_properties[] = { | ||
403 | + DEFINE_PROP_UINT32("NONSEC_MASK", TZPPC, nonsec_mask, 0), | ||
404 | + DEFINE_PORT(0), | ||
405 | + DEFINE_PORT(1), | ||
406 | + DEFINE_PORT(2), | ||
407 | + DEFINE_PORT(3), | ||
408 | + DEFINE_PORT(4), | ||
409 | + DEFINE_PORT(5), | ||
410 | + DEFINE_PORT(6), | ||
411 | + DEFINE_PORT(7), | ||
412 | + DEFINE_PORT(8), | ||
413 | + DEFINE_PORT(9), | ||
414 | + DEFINE_PORT(10), | ||
415 | + DEFINE_PORT(11), | ||
416 | + DEFINE_PORT(12), | ||
417 | + DEFINE_PORT(13), | ||
418 | + DEFINE_PORT(14), | ||
419 | + DEFINE_PORT(15), | ||
420 | + DEFINE_PROP_END_OF_LIST(), | ||
421 | +}; | ||
422 | + | ||
423 | +static void tz_ppc_class_init(ObjectClass *klass, void *data) | ||
424 | +{ | ||
425 | + DeviceClass *dc = DEVICE_CLASS(klass); | ||
426 | + | ||
427 | + dc->realize = tz_ppc_realize; | ||
428 | + dc->vmsd = &tz_ppc_vmstate; | ||
429 | + dc->reset = tz_ppc_reset; | ||
430 | + dc->props = tz_ppc_properties; | ||
431 | +} | ||
432 | + | ||
433 | +static const TypeInfo tz_ppc_info = { | ||
434 | + .name = TYPE_TZ_PPC, | ||
435 | + .parent = TYPE_SYS_BUS_DEVICE, | ||
436 | + .instance_size = sizeof(TZPPC), | ||
437 | + .instance_init = tz_ppc_init, | ||
438 | + .class_init = tz_ppc_class_init, | ||
439 | +}; | ||
440 | + | ||
441 | +static void tz_ppc_register_types(void) | ||
442 | +{ | ||
443 | + type_register_static(&tz_ppc_info); | ||
444 | +} | ||
445 | + | ||
446 | +type_init(tz_ppc_register_types); | ||
447 | diff --git a/default-configs/arm-softmmu.mak b/default-configs/arm-softmmu.mak | ||
448 | index XXXXXXX..XXXXXXX 100644 | 32 | index XXXXXXX..XXXXXXX 100644 |
449 | --- a/default-configs/arm-softmmu.mak | 33 | --- a/softmmu/arch_init.c |
450 | +++ b/default-configs/arm-softmmu.mak | 34 | +++ b/softmmu/arch_init.c |
451 | @@ -XXX,XX +XXX,XX @@ CONFIG_CMSDK_APB_UART=y | 35 | @@ -XXX,XX +XXX,XX @@ int kvm_available(void) |
452 | CONFIG_MPS2_FPGAIO=y | 36 | return 0; |
453 | CONFIG_MPS2_SCC=y | 37 | #endif |
454 | 38 | } | |
455 | +CONFIG_TZ_PPC=y | 39 | - |
456 | + | 40 | -int xen_available(void) |
457 | CONFIG_VERSATILE_PCI=y | 41 | -{ |
458 | CONFIG_VERSATILE_I2C=y | 42 | -#ifdef CONFIG_XEN |
459 | 43 | - return 1; | |
460 | diff --git a/hw/misc/trace-events b/hw/misc/trace-events | 44 | -#else |
45 | - return 0; | ||
46 | -#endif | ||
47 | -} | ||
48 | diff --git a/softmmu/vl.c b/softmmu/vl.c | ||
461 | index XXXXXXX..XXXXXXX 100644 | 49 | index XXXXXXX..XXXXXXX 100644 |
462 | --- a/hw/misc/trace-events | 50 | --- a/softmmu/vl.c |
463 | +++ b/hw/misc/trace-events | 51 | +++ b/softmmu/vl.c |
464 | @@ -XXX,XX +XXX,XX @@ mos6522_get_next_irq_time(uint16_t latch, int64_t d, int64_t delta) "latch=%d co | 52 | @@ -XXX,XX +XXX,XX @@ void qemu_init(int argc, char **argv, char **envp) |
465 | mos6522_set_sr_int(void) "set sr_int" | 53 | has_defaults = 0; |
466 | mos6522_write(uint64_t addr, uint64_t val) "reg=0x%"PRIx64 " val=0x%"PRIx64 | 54 | break; |
467 | mos6522_read(uint64_t addr, unsigned val) "reg=0x%"PRIx64 " val=0x%x" | 55 | case QEMU_OPTION_xen_domid: |
468 | + | 56 | - if (!(xen_available())) { |
469 | +# hw/misc/tz-ppc.c | 57 | + if (!(accel_find("xen"))) { |
470 | +tz_ppc_reset(void) "TZ PPC: reset" | 58 | error_report("Option not supported for this target"); |
471 | +tz_ppc_cfg_nonsec(int n, int level) "TZ PPC: cfg_nonsec[%d] = %d" | 59 | exit(1); |
472 | +tz_ppc_cfg_ap(int n, int level) "TZ PPC: cfg_ap[%d] = %d" | 60 | } |
473 | +tz_ppc_cfg_sec_resp(int level) "TZ PPC: cfg_sec_resp = %d" | 61 | xen_domid = atoi(optarg); |
474 | +tz_ppc_irq_enable(int level) "TZ PPC: int_enable = %d" | 62 | break; |
475 | +tz_ppc_irq_clear(int level) "TZ PPC: int_clear = %d" | 63 | case QEMU_OPTION_xen_attach: |
476 | +tz_ppc_update_irq(int level) "TZ PPC: setting irq line to %d" | 64 | - if (!(xen_available())) { |
477 | +tz_ppc_read_blocked(int n, hwaddr offset, bool secure, bool user) "TZ PPC: port %d offset 0x%" HWADDR_PRIx " read (secure %d user %d) blocked" | 65 | + if (!(accel_find("xen"))) { |
478 | +tz_ppc_write_blocked(int n, hwaddr offset, bool secure, bool user) "TZ PPC: port %d offset 0x%" HWADDR_PRIx " write (secure %d user %d) blocked" | 66 | error_report("Option not supported for this target"); |
67 | exit(1); | ||
68 | } | ||
69 | xen_mode = XEN_ATTACH; | ||
70 | break; | ||
71 | case QEMU_OPTION_xen_domid_restrict: | ||
72 | - if (!(xen_available())) { | ||
73 | + if (!(accel_find("xen"))) { | ||
74 | error_report("Option not supported for this target"); | ||
75 | exit(1); | ||
76 | } | ||
479 | -- | 77 | -- |
480 | 2.16.2 | 78 | 2.20.1 |
481 | 79 | ||
482 | 80 | diff view generated by jsdifflib |
1 | Define a new board model for the MPS2 with an AN505 FPGA image | 1 | The kvm_available() function reports whether KVM support was |
---|---|---|---|
2 | containing a Cortex-M33. Since the FPGA images for TrustZone | 2 | compiled into the QEMU binary; it returns the value of the |
3 | cores (AN505, and the similar AN519 for Cortex-M23) have a | 3 | CONFIG_KVM define. |
4 | significantly different layout of devices to the non-TrustZone | 4 | |
5 | images, we use a new source file rather than shoehorning them | 5 | The only place in the codebase where we use this function is |
6 | into the existing mps2.c. | 6 | in qmp_query_kvm(). Now that accelerators are based on QOM |
7 | classes we can instead use accel_find("kvm") and remove the | ||
8 | kvm_available() function. | ||
7 | 9 | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 11 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
10 | Message-id: 20180220180325.29818-20-peter.maydell@linaro.org | 12 | Message-id: 20210730105947.28215-3-peter.maydell@linaro.org |
11 | --- | 13 | --- |
12 | hw/arm/Makefile.objs | 1 + | 14 | include/sysemu/arch_init.h | 2 -- |
13 | hw/arm/mps2-tz.c | 503 +++++++++++++++++++++++++++++++++++++++++++++++++++ | 15 | monitor/qmp-cmds.c | 2 +- |
14 | 2 files changed, 504 insertions(+) | 16 | softmmu/arch_init.c | 9 --------- |
15 | create mode 100644 hw/arm/mps2-tz.c | 17 | 3 files changed, 1 insertion(+), 12 deletions(-) |
16 | 18 | ||
17 | diff --git a/hw/arm/Makefile.objs b/hw/arm/Makefile.objs | 19 | diff --git a/include/sysemu/arch_init.h b/include/sysemu/arch_init.h |
18 | index XXXXXXX..XXXXXXX 100644 | 20 | index XXXXXXX..XXXXXXX 100644 |
19 | --- a/hw/arm/Makefile.objs | 21 | --- a/include/sysemu/arch_init.h |
20 | +++ b/hw/arm/Makefile.objs | 22 | +++ b/include/sysemu/arch_init.h |
21 | @@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_FSL_IMX31) += fsl-imx31.o kzm.o | 23 | @@ -XXX,XX +XXX,XX @@ enum { |
22 | obj-$(CONFIG_FSL_IMX6) += fsl-imx6.o sabrelite.o | 24 | |
23 | obj-$(CONFIG_ASPEED_SOC) += aspeed_soc.o aspeed.o | 25 | extern const uint32_t arch_type; |
24 | obj-$(CONFIG_MPS2) += mps2.o | 26 | |
25 | +obj-$(CONFIG_MPS2) += mps2-tz.o | 27 | -int kvm_available(void); |
26 | obj-$(CONFIG_MSF2) += msf2-soc.o msf2-som.o | 28 | - |
27 | obj-$(CONFIG_IOTKIT) += iotkit.o | 29 | /* default virtio transport per architecture */ |
28 | diff --git a/hw/arm/mps2-tz.c b/hw/arm/mps2-tz.c | 30 | #define QEMU_ARCH_VIRTIO_PCI (QEMU_ARCH_ALPHA | QEMU_ARCH_ARM | \ |
29 | new file mode 100644 | 31 | QEMU_ARCH_HPPA | QEMU_ARCH_I386 | \ |
30 | index XXXXXXX..XXXXXXX | 32 | diff --git a/monitor/qmp-cmds.c b/monitor/qmp-cmds.c |
31 | --- /dev/null | 33 | index XXXXXXX..XXXXXXX 100644 |
32 | +++ b/hw/arm/mps2-tz.c | 34 | --- a/monitor/qmp-cmds.c |
33 | @@ -XXX,XX +XXX,XX @@ | 35 | +++ b/monitor/qmp-cmds.c |
34 | +/* | 36 | @@ -XXX,XX +XXX,XX @@ KvmInfo *qmp_query_kvm(Error **errp) |
35 | + * ARM V2M MPS2 board emulation, trustzone aware FPGA images | 37 | KvmInfo *info = g_malloc0(sizeof(*info)); |
36 | + * | 38 | |
37 | + * Copyright (c) 2017 Linaro Limited | 39 | info->enabled = kvm_enabled(); |
38 | + * Written by Peter Maydell | 40 | - info->present = kvm_available(); |
39 | + * | 41 | + info->present = accel_find("kvm"); |
40 | + * This program is free software; you can redistribute it and/or modify | 42 | |
41 | + * it under the terms of the GNU General Public License version 2 or | 43 | return info; |
42 | + * (at your option) any later version. | 44 | } |
43 | + */ | 45 | diff --git a/softmmu/arch_init.c b/softmmu/arch_init.c |
44 | + | 46 | index XXXXXXX..XXXXXXX 100644 |
45 | +/* The MPS2 and MPS2+ dev boards are FPGA based (the 2+ has a bigger | 47 | --- a/softmmu/arch_init.c |
46 | + * FPGA but is otherwise the same as the 2). Since the CPU itself | 48 | +++ b/softmmu/arch_init.c |
47 | + * and most of the devices are in the FPGA, the details of the board | 49 | @@ -XXX,XX +XXX,XX @@ int graphic_depth = 32; |
48 | + * as seen by the guest depend significantly on the FPGA image. | 50 | #endif |
49 | + * This source file covers the following FPGA images, for TrustZone cores: | 51 | |
50 | + * "mps2-an505" -- Cortex-M33 as documented in ARM Application Note AN505 | 52 | const uint32_t arch_type = QEMU_ARCH; |
51 | + * | 53 | - |
52 | + * Links to the TRM for the board itself and to the various Application | 54 | -int kvm_available(void) |
53 | + * Notes which document the FPGA images can be found here: | 55 | -{ |
54 | + * https://developer.arm.com/products/system-design/development-boards/fpga-prototyping-boards/mps2 | 56 | -#ifdef CONFIG_KVM |
55 | + * | 57 | - return 1; |
56 | + * Board TRM: | 58 | -#else |
57 | + * http://infocenter.arm.com/help/topic/com.arm.doc.100112_0200_06_en/versatile_express_cortex_m_prototyping_systems_v2m_mps2_and_v2m_mps2plus_technical_reference_100112_0200_06_en.pdf | 59 | - return 0; |
58 | + * Application Note AN505: | 60 | -#endif |
59 | + * http://infocenter.arm.com/help/topic/com.arm.doc.dai0505b/index.html | 61 | -} |
60 | + * | ||
61 | + * The AN505 defers to the Cortex-M33 processor ARMv8M IoT Kit FVP User Guide | ||
62 | + * (ARM ECM0601256) for the details of some of the device layout: | ||
63 | + * http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ecm0601256/index.html | ||
64 | + */ | ||
65 | + | ||
66 | +#include "qemu/osdep.h" | ||
67 | +#include "qapi/error.h" | ||
68 | +#include "qemu/error-report.h" | ||
69 | +#include "hw/arm/arm.h" | ||
70 | +#include "hw/arm/armv7m.h" | ||
71 | +#include "hw/or-irq.h" | ||
72 | +#include "hw/boards.h" | ||
73 | +#include "exec/address-spaces.h" | ||
74 | +#include "sysemu/sysemu.h" | ||
75 | +#include "hw/misc/unimp.h" | ||
76 | +#include "hw/char/cmsdk-apb-uart.h" | ||
77 | +#include "hw/timer/cmsdk-apb-timer.h" | ||
78 | +#include "hw/misc/mps2-scc.h" | ||
79 | +#include "hw/misc/mps2-fpgaio.h" | ||
80 | +#include "hw/arm/iotkit.h" | ||
81 | +#include "hw/devices.h" | ||
82 | +#include "net/net.h" | ||
83 | +#include "hw/core/split-irq.h" | ||
84 | + | ||
85 | +typedef enum MPS2TZFPGAType { | ||
86 | + FPGA_AN505, | ||
87 | +} MPS2TZFPGAType; | ||
88 | + | ||
89 | +typedef struct { | ||
90 | + MachineClass parent; | ||
91 | + MPS2TZFPGAType fpga_type; | ||
92 | + uint32_t scc_id; | ||
93 | +} MPS2TZMachineClass; | ||
94 | + | ||
95 | +typedef struct { | ||
96 | + MachineState parent; | ||
97 | + | ||
98 | + IoTKit iotkit; | ||
99 | + MemoryRegion psram; | ||
100 | + MemoryRegion ssram1; | ||
101 | + MemoryRegion ssram1_m; | ||
102 | + MemoryRegion ssram23; | ||
103 | + MPS2SCC scc; | ||
104 | + MPS2FPGAIO fpgaio; | ||
105 | + TZPPC ppc[5]; | ||
106 | + UnimplementedDeviceState ssram_mpc[3]; | ||
107 | + UnimplementedDeviceState spi[5]; | ||
108 | + UnimplementedDeviceState i2c[4]; | ||
109 | + UnimplementedDeviceState i2s_audio; | ||
110 | + UnimplementedDeviceState gpio[5]; | ||
111 | + UnimplementedDeviceState dma[4]; | ||
112 | + UnimplementedDeviceState gfx; | ||
113 | + CMSDKAPBUART uart[5]; | ||
114 | + SplitIRQ sec_resp_splitter; | ||
115 | + qemu_or_irq uart_irq_orgate; | ||
116 | +} MPS2TZMachineState; | ||
117 | + | ||
118 | +#define TYPE_MPS2TZ_MACHINE "mps2tz" | ||
119 | +#define TYPE_MPS2TZ_AN505_MACHINE MACHINE_TYPE_NAME("mps2-an505") | ||
120 | + | ||
121 | +#define MPS2TZ_MACHINE(obj) \ | ||
122 | + OBJECT_CHECK(MPS2TZMachineState, obj, TYPE_MPS2TZ_MACHINE) | ||
123 | +#define MPS2TZ_MACHINE_GET_CLASS(obj) \ | ||
124 | + OBJECT_GET_CLASS(MPS2TZMachineClass, obj, TYPE_MPS2TZ_MACHINE) | ||
125 | +#define MPS2TZ_MACHINE_CLASS(klass) \ | ||
126 | + OBJECT_CLASS_CHECK(MPS2TZMachineClass, klass, TYPE_MPS2TZ_MACHINE) | ||
127 | + | ||
128 | +/* Main SYSCLK frequency in Hz */ | ||
129 | +#define SYSCLK_FRQ 20000000 | ||
130 | + | ||
131 | +/* Initialize the auxiliary RAM region @mr and map it into | ||
132 | + * the memory map at @base. | ||
133 | + */ | ||
134 | +static void make_ram(MemoryRegion *mr, const char *name, | ||
135 | + hwaddr base, hwaddr size) | ||
136 | +{ | ||
137 | + memory_region_init_ram(mr, NULL, name, size, &error_fatal); | ||
138 | + memory_region_add_subregion(get_system_memory(), base, mr); | ||
139 | +} | ||
140 | + | ||
141 | +/* Create an alias of an entire original MemoryRegion @orig | ||
142 | + * located at @base in the memory map. | ||
143 | + */ | ||
144 | +static void make_ram_alias(MemoryRegion *mr, const char *name, | ||
145 | + MemoryRegion *orig, hwaddr base) | ||
146 | +{ | ||
147 | + memory_region_init_alias(mr, NULL, name, orig, 0, | ||
148 | + memory_region_size(orig)); | ||
149 | + memory_region_add_subregion(get_system_memory(), base, mr); | ||
150 | +} | ||
151 | + | ||
152 | +static void init_sysbus_child(Object *parent, const char *childname, | ||
153 | + void *child, size_t childsize, | ||
154 | + const char *childtype) | ||
155 | +{ | ||
156 | + object_initialize(child, childsize, childtype); | ||
157 | + object_property_add_child(parent, childname, OBJECT(child), &error_abort); | ||
158 | + qdev_set_parent_bus(DEVICE(child), sysbus_get_default()); | ||
159 | + | ||
160 | +} | ||
161 | + | ||
162 | +/* Most of the devices in the AN505 FPGA image sit behind | ||
163 | + * Peripheral Protection Controllers. These data structures | ||
164 | + * define the layout of which devices sit behind which PPCs. | ||
165 | + * The devfn for each port is a function which creates, configures | ||
166 | + * and initializes the device, returning the MemoryRegion which | ||
167 | + * needs to be plugged into the downstream end of the PPC port. | ||
168 | + */ | ||
169 | +typedef MemoryRegion *MakeDevFn(MPS2TZMachineState *mms, void *opaque, | ||
170 | + const char *name, hwaddr size); | ||
171 | + | ||
172 | +typedef struct PPCPortInfo { | ||
173 | + const char *name; | ||
174 | + MakeDevFn *devfn; | ||
175 | + void *opaque; | ||
176 | + hwaddr addr; | ||
177 | + hwaddr size; | ||
178 | +} PPCPortInfo; | ||
179 | + | ||
180 | +typedef struct PPCInfo { | ||
181 | + const char *name; | ||
182 | + PPCPortInfo ports[TZ_NUM_PORTS]; | ||
183 | +} PPCInfo; | ||
184 | + | ||
185 | +static MemoryRegion *make_unimp_dev(MPS2TZMachineState *mms, | ||
186 | + void *opaque, | ||
187 | + const char *name, hwaddr size) | ||
188 | +{ | ||
189 | + /* Initialize, configure and realize a TYPE_UNIMPLEMENTED_DEVICE, | ||
190 | + * and return a pointer to its MemoryRegion. | ||
191 | + */ | ||
192 | + UnimplementedDeviceState *uds = opaque; | ||
193 | + | ||
194 | + init_sysbus_child(OBJECT(mms), name, uds, | ||
195 | + sizeof(UnimplementedDeviceState), | ||
196 | + TYPE_UNIMPLEMENTED_DEVICE); | ||
197 | + qdev_prop_set_string(DEVICE(uds), "name", name); | ||
198 | + qdev_prop_set_uint64(DEVICE(uds), "size", size); | ||
199 | + object_property_set_bool(OBJECT(uds), true, "realized", &error_fatal); | ||
200 | + return sysbus_mmio_get_region(SYS_BUS_DEVICE(uds), 0); | ||
201 | +} | ||
202 | + | ||
203 | +static MemoryRegion *make_uart(MPS2TZMachineState *mms, void *opaque, | ||
204 | + const char *name, hwaddr size) | ||
205 | +{ | ||
206 | + CMSDKAPBUART *uart = opaque; | ||
207 | + int i = uart - &mms->uart[0]; | ||
208 | + Chardev *uartchr = i < MAX_SERIAL_PORTS ? serial_hds[i] : NULL; | ||
209 | + int rxirqno = i * 2; | ||
210 | + int txirqno = i * 2 + 1; | ||
211 | + int combirqno = i + 10; | ||
212 | + SysBusDevice *s; | ||
213 | + DeviceState *iotkitdev = DEVICE(&mms->iotkit); | ||
214 | + DeviceState *orgate_dev = DEVICE(&mms->uart_irq_orgate); | ||
215 | + | ||
216 | + init_sysbus_child(OBJECT(mms), name, uart, | ||
217 | + sizeof(mms->uart[0]), TYPE_CMSDK_APB_UART); | ||
218 | + qdev_prop_set_chr(DEVICE(uart), "chardev", uartchr); | ||
219 | + qdev_prop_set_uint32(DEVICE(uart), "pclk-frq", SYSCLK_FRQ); | ||
220 | + object_property_set_bool(OBJECT(uart), true, "realized", &error_fatal); | ||
221 | + s = SYS_BUS_DEVICE(uart); | ||
222 | + sysbus_connect_irq(s, 0, qdev_get_gpio_in_named(iotkitdev, | ||
223 | + "EXP_IRQ", txirqno)); | ||
224 | + sysbus_connect_irq(s, 1, qdev_get_gpio_in_named(iotkitdev, | ||
225 | + "EXP_IRQ", rxirqno)); | ||
226 | + sysbus_connect_irq(s, 2, qdev_get_gpio_in(orgate_dev, i * 2)); | ||
227 | + sysbus_connect_irq(s, 3, qdev_get_gpio_in(orgate_dev, i * 2 + 1)); | ||
228 | + sysbus_connect_irq(s, 4, qdev_get_gpio_in_named(iotkitdev, | ||
229 | + "EXP_IRQ", combirqno)); | ||
230 | + return sysbus_mmio_get_region(SYS_BUS_DEVICE(uart), 0); | ||
231 | +} | ||
232 | + | ||
233 | +static MemoryRegion *make_scc(MPS2TZMachineState *mms, void *opaque, | ||
234 | + const char *name, hwaddr size) | ||
235 | +{ | ||
236 | + MPS2SCC *scc = opaque; | ||
237 | + DeviceState *sccdev; | ||
238 | + MPS2TZMachineClass *mmc = MPS2TZ_MACHINE_GET_CLASS(mms); | ||
239 | + | ||
240 | + object_initialize(scc, sizeof(mms->scc), TYPE_MPS2_SCC); | ||
241 | + sccdev = DEVICE(scc); | ||
242 | + qdev_set_parent_bus(sccdev, sysbus_get_default()); | ||
243 | + qdev_prop_set_uint32(sccdev, "scc-cfg4", 0x2); | ||
244 | + qdev_prop_set_uint32(sccdev, "scc-aid", 0x02000008); | ||
245 | + qdev_prop_set_uint32(sccdev, "scc-id", mmc->scc_id); | ||
246 | + object_property_set_bool(OBJECT(scc), true, "realized", &error_fatal); | ||
247 | + return sysbus_mmio_get_region(SYS_BUS_DEVICE(sccdev), 0); | ||
248 | +} | ||
249 | + | ||
250 | +static MemoryRegion *make_fpgaio(MPS2TZMachineState *mms, void *opaque, | ||
251 | + const char *name, hwaddr size) | ||
252 | +{ | ||
253 | + MPS2FPGAIO *fpgaio = opaque; | ||
254 | + | ||
255 | + object_initialize(fpgaio, sizeof(mms->fpgaio), TYPE_MPS2_FPGAIO); | ||
256 | + qdev_set_parent_bus(DEVICE(fpgaio), sysbus_get_default()); | ||
257 | + object_property_set_bool(OBJECT(fpgaio), true, "realized", &error_fatal); | ||
258 | + return sysbus_mmio_get_region(SYS_BUS_DEVICE(fpgaio), 0); | ||
259 | +} | ||
260 | + | ||
261 | +static void mps2tz_common_init(MachineState *machine) | ||
262 | +{ | ||
263 | + MPS2TZMachineState *mms = MPS2TZ_MACHINE(machine); | ||
264 | + MachineClass *mc = MACHINE_GET_CLASS(machine); | ||
265 | + MemoryRegion *system_memory = get_system_memory(); | ||
266 | + DeviceState *iotkitdev; | ||
267 | + DeviceState *dev_splitter; | ||
268 | + int i; | ||
269 | + | ||
270 | + if (strcmp(machine->cpu_type, mc->default_cpu_type) != 0) { | ||
271 | + error_report("This board can only be used with CPU %s", | ||
272 | + mc->default_cpu_type); | ||
273 | + exit(1); | ||
274 | + } | ||
275 | + | ||
276 | + init_sysbus_child(OBJECT(machine), "iotkit", &mms->iotkit, | ||
277 | + sizeof(mms->iotkit), TYPE_IOTKIT); | ||
278 | + iotkitdev = DEVICE(&mms->iotkit); | ||
279 | + object_property_set_link(OBJECT(&mms->iotkit), OBJECT(system_memory), | ||
280 | + "memory", &error_abort); | ||
281 | + qdev_prop_set_uint32(iotkitdev, "EXP_NUMIRQ", 92); | ||
282 | + qdev_prop_set_uint32(iotkitdev, "MAINCLK", SYSCLK_FRQ); | ||
283 | + object_property_set_bool(OBJECT(&mms->iotkit), true, "realized", | ||
284 | + &error_fatal); | ||
285 | + | ||
286 | + /* The sec_resp_cfg output from the IoTKit must be split into multiple | ||
287 | + * lines, one for each of the PPCs we create here. | ||
288 | + */ | ||
289 | + object_initialize(&mms->sec_resp_splitter, sizeof(mms->sec_resp_splitter), | ||
290 | + TYPE_SPLIT_IRQ); | ||
291 | + object_property_add_child(OBJECT(machine), "sec-resp-splitter", | ||
292 | + OBJECT(&mms->sec_resp_splitter), &error_abort); | ||
293 | + object_property_set_int(OBJECT(&mms->sec_resp_splitter), 5, | ||
294 | + "num-lines", &error_fatal); | ||
295 | + object_property_set_bool(OBJECT(&mms->sec_resp_splitter), true, | ||
296 | + "realized", &error_fatal); | ||
297 | + dev_splitter = DEVICE(&mms->sec_resp_splitter); | ||
298 | + qdev_connect_gpio_out_named(iotkitdev, "sec_resp_cfg", 0, | ||
299 | + qdev_get_gpio_in(dev_splitter, 0)); | ||
300 | + | ||
301 | + /* The IoTKit sets up much of the memory layout, including | ||
302 | + * the aliases between secure and non-secure regions in the | ||
303 | + * address space. The FPGA itself contains: | ||
304 | + * | ||
305 | + * 0x00000000..0x003fffff SSRAM1 | ||
306 | + * 0x00400000..0x007fffff alias of SSRAM1 | ||
307 | + * 0x28000000..0x283fffff 4MB SSRAM2 + SSRAM3 | ||
308 | + * 0x40100000..0x4fffffff AHB Master Expansion 1 interface devices | ||
309 | + * 0x80000000..0x80ffffff 16MB PSRAM | ||
310 | + */ | ||
311 | + | ||
312 | + /* The FPGA images have an odd combination of different RAMs, | ||
313 | + * because in hardware they are different implementations and | ||
314 | + * connected to different buses, giving varying performance/size | ||
315 | + * tradeoffs. For QEMU they're all just RAM, though. We arbitrarily | ||
316 | + * call the 16MB our "system memory", as it's the largest lump. | ||
317 | + */ | ||
318 | + memory_region_allocate_system_memory(&mms->psram, | ||
319 | + NULL, "mps.ram", 0x01000000); | ||
320 | + memory_region_add_subregion(system_memory, 0x80000000, &mms->psram); | ||
321 | + | ||
322 | + /* The SSRAM memories should all be behind Memory Protection Controllers, | ||
323 | + * but we don't implement that yet. | ||
324 | + */ | ||
325 | + make_ram(&mms->ssram1, "mps.ssram1", 0x00000000, 0x00400000); | ||
326 | + make_ram_alias(&mms->ssram1_m, "mps.ssram1_m", &mms->ssram1, 0x00400000); | ||
327 | + | ||
328 | + make_ram(&mms->ssram23, "mps.ssram23", 0x28000000, 0x00400000); | ||
329 | + | ||
330 | + /* The overflow IRQs for all UARTs are ORed together. | ||
331 | + * Tx, Rx and "combined" IRQs are sent to the NVIC separately. | ||
332 | + * Create the OR gate for this. | ||
333 | + */ | ||
334 | + object_initialize(&mms->uart_irq_orgate, sizeof(mms->uart_irq_orgate), | ||
335 | + TYPE_OR_IRQ); | ||
336 | + object_property_add_child(OBJECT(mms), "uart-irq-orgate", | ||
337 | + OBJECT(&mms->uart_irq_orgate), &error_abort); | ||
338 | + object_property_set_int(OBJECT(&mms->uart_irq_orgate), 10, "num-lines", | ||
339 | + &error_fatal); | ||
340 | + object_property_set_bool(OBJECT(&mms->uart_irq_orgate), true, | ||
341 | + "realized", &error_fatal); | ||
342 | + qdev_connect_gpio_out(DEVICE(&mms->uart_irq_orgate), 0, | ||
343 | + qdev_get_gpio_in_named(iotkitdev, "EXP_IRQ", 15)); | ||
344 | + | ||
345 | + /* Most of the devices in the FPGA are behind Peripheral Protection | ||
346 | + * Controllers. The required order for initializing things is: | ||
347 | + * + initialize the PPC | ||
348 | + * + initialize, configure and realize downstream devices | ||
349 | + * + connect downstream device MemoryRegions to the PPC | ||
350 | + * + realize the PPC | ||
351 | + * + map the PPC's MemoryRegions to the places in the address map | ||
352 | + * where the downstream devices should appear | ||
353 | + * + wire up the PPC's control lines to the IoTKit object | ||
354 | + */ | ||
355 | + | ||
356 | + const PPCInfo ppcs[] = { { | ||
357 | + .name = "apb_ppcexp0", | ||
358 | + .ports = { | ||
359 | + { "ssram-mpc0", make_unimp_dev, &mms->ssram_mpc[0], | ||
360 | + 0x58007000, 0x1000 }, | ||
361 | + { "ssram-mpc1", make_unimp_dev, &mms->ssram_mpc[1], | ||
362 | + 0x58008000, 0x1000 }, | ||
363 | + { "ssram-mpc2", make_unimp_dev, &mms->ssram_mpc[2], | ||
364 | + 0x58009000, 0x1000 }, | ||
365 | + }, | ||
366 | + }, { | ||
367 | + .name = "apb_ppcexp1", | ||
368 | + .ports = { | ||
369 | + { "spi0", make_unimp_dev, &mms->spi[0], 0x40205000, 0x1000 }, | ||
370 | + { "spi1", make_unimp_dev, &mms->spi[1], 0x40206000, 0x1000 }, | ||
371 | + { "spi2", make_unimp_dev, &mms->spi[2], 0x40209000, 0x1000 }, | ||
372 | + { "spi3", make_unimp_dev, &mms->spi[3], 0x4020a000, 0x1000 }, | ||
373 | + { "spi4", make_unimp_dev, &mms->spi[4], 0x4020b000, 0x1000 }, | ||
374 | + { "uart0", make_uart, &mms->uart[0], 0x40200000, 0x1000 }, | ||
375 | + { "uart1", make_uart, &mms->uart[1], 0x40201000, 0x1000 }, | ||
376 | + { "uart2", make_uart, &mms->uart[2], 0x40202000, 0x1000 }, | ||
377 | + { "uart3", make_uart, &mms->uart[3], 0x40203000, 0x1000 }, | ||
378 | + { "uart4", make_uart, &mms->uart[4], 0x40204000, 0x1000 }, | ||
379 | + { "i2c0", make_unimp_dev, &mms->i2c[0], 0x40207000, 0x1000 }, | ||
380 | + { "i2c1", make_unimp_dev, &mms->i2c[1], 0x40208000, 0x1000 }, | ||
381 | + { "i2c2", make_unimp_dev, &mms->i2c[2], 0x4020c000, 0x1000 }, | ||
382 | + { "i2c3", make_unimp_dev, &mms->i2c[3], 0x4020d000, 0x1000 }, | ||
383 | + }, | ||
384 | + }, { | ||
385 | + .name = "apb_ppcexp2", | ||
386 | + .ports = { | ||
387 | + { "scc", make_scc, &mms->scc, 0x40300000, 0x1000 }, | ||
388 | + { "i2s-audio", make_unimp_dev, &mms->i2s_audio, | ||
389 | + 0x40301000, 0x1000 }, | ||
390 | + { "fpgaio", make_fpgaio, &mms->fpgaio, 0x40302000, 0x1000 }, | ||
391 | + }, | ||
392 | + }, { | ||
393 | + .name = "ahb_ppcexp0", | ||
394 | + .ports = { | ||
395 | + { "gfx", make_unimp_dev, &mms->gfx, 0x41000000, 0x140000 }, | ||
396 | + { "gpio0", make_unimp_dev, &mms->gpio[0], 0x40100000, 0x1000 }, | ||
397 | + { "gpio1", make_unimp_dev, &mms->gpio[1], 0x40101000, 0x1000 }, | ||
398 | + { "gpio2", make_unimp_dev, &mms->gpio[2], 0x40102000, 0x1000 }, | ||
399 | + { "gpio3", make_unimp_dev, &mms->gpio[3], 0x40103000, 0x1000 }, | ||
400 | + { "gpio4", make_unimp_dev, &mms->gpio[4], 0x40104000, 0x1000 }, | ||
401 | + }, | ||
402 | + }, { | ||
403 | + .name = "ahb_ppcexp1", | ||
404 | + .ports = { | ||
405 | + { "dma0", make_unimp_dev, &mms->dma[0], 0x40110000, 0x1000 }, | ||
406 | + { "dma1", make_unimp_dev, &mms->dma[1], 0x40111000, 0x1000 }, | ||
407 | + { "dma2", make_unimp_dev, &mms->dma[2], 0x40112000, 0x1000 }, | ||
408 | + { "dma3", make_unimp_dev, &mms->dma[3], 0x40113000, 0x1000 }, | ||
409 | + }, | ||
410 | + }, | ||
411 | + }; | ||
412 | + | ||
413 | + for (i = 0; i < ARRAY_SIZE(ppcs); i++) { | ||
414 | + const PPCInfo *ppcinfo = &ppcs[i]; | ||
415 | + TZPPC *ppc = &mms->ppc[i]; | ||
416 | + DeviceState *ppcdev; | ||
417 | + int port; | ||
418 | + char *gpioname; | ||
419 | + | ||
420 | + init_sysbus_child(OBJECT(machine), ppcinfo->name, ppc, | ||
421 | + sizeof(TZPPC), TYPE_TZ_PPC); | ||
422 | + ppcdev = DEVICE(ppc); | ||
423 | + | ||
424 | + for (port = 0; port < TZ_NUM_PORTS; port++) { | ||
425 | + const PPCPortInfo *pinfo = &ppcinfo->ports[port]; | ||
426 | + MemoryRegion *mr; | ||
427 | + char *portname; | ||
428 | + | ||
429 | + if (!pinfo->devfn) { | ||
430 | + continue; | ||
431 | + } | ||
432 | + | ||
433 | + mr = pinfo->devfn(mms, pinfo->opaque, pinfo->name, pinfo->size); | ||
434 | + portname = g_strdup_printf("port[%d]", port); | ||
435 | + object_property_set_link(OBJECT(ppc), OBJECT(mr), | ||
436 | + portname, &error_fatal); | ||
437 | + g_free(portname); | ||
438 | + } | ||
439 | + | ||
440 | + object_property_set_bool(OBJECT(ppc), true, "realized", &error_fatal); | ||
441 | + | ||
442 | + for (port = 0; port < TZ_NUM_PORTS; port++) { | ||
443 | + const PPCPortInfo *pinfo = &ppcinfo->ports[port]; | ||
444 | + | ||
445 | + if (!pinfo->devfn) { | ||
446 | + continue; | ||
447 | + } | ||
448 | + sysbus_mmio_map(SYS_BUS_DEVICE(ppc), port, pinfo->addr); | ||
449 | + | ||
450 | + gpioname = g_strdup_printf("%s_nonsec", ppcinfo->name); | ||
451 | + qdev_connect_gpio_out_named(iotkitdev, gpioname, port, | ||
452 | + qdev_get_gpio_in_named(ppcdev, | ||
453 | + "cfg_nonsec", | ||
454 | + port)); | ||
455 | + g_free(gpioname); | ||
456 | + gpioname = g_strdup_printf("%s_ap", ppcinfo->name); | ||
457 | + qdev_connect_gpio_out_named(iotkitdev, gpioname, port, | ||
458 | + qdev_get_gpio_in_named(ppcdev, | ||
459 | + "cfg_ap", port)); | ||
460 | + g_free(gpioname); | ||
461 | + } | ||
462 | + | ||
463 | + gpioname = g_strdup_printf("%s_irq_enable", ppcinfo->name); | ||
464 | + qdev_connect_gpio_out_named(iotkitdev, gpioname, 0, | ||
465 | + qdev_get_gpio_in_named(ppcdev, | ||
466 | + "irq_enable", 0)); | ||
467 | + g_free(gpioname); | ||
468 | + gpioname = g_strdup_printf("%s_irq_clear", ppcinfo->name); | ||
469 | + qdev_connect_gpio_out_named(iotkitdev, gpioname, 0, | ||
470 | + qdev_get_gpio_in_named(ppcdev, | ||
471 | + "irq_clear", 0)); | ||
472 | + g_free(gpioname); | ||
473 | + gpioname = g_strdup_printf("%s_irq_status", ppcinfo->name); | ||
474 | + qdev_connect_gpio_out_named(ppcdev, "irq", 0, | ||
475 | + qdev_get_gpio_in_named(iotkitdev, | ||
476 | + gpioname, 0)); | ||
477 | + g_free(gpioname); | ||
478 | + | ||
479 | + qdev_connect_gpio_out(dev_splitter, i, | ||
480 | + qdev_get_gpio_in_named(ppcdev, | ||
481 | + "cfg_sec_resp", 0)); | ||
482 | + } | ||
483 | + | ||
484 | + /* In hardware this is a LAN9220; the LAN9118 is software compatible | ||
485 | + * except that it doesn't support the checksum-offload feature. | ||
486 | + * The ethernet controller is not behind a PPC. | ||
487 | + */ | ||
488 | + lan9118_init(&nd_table[0], 0x42000000, | ||
489 | + qdev_get_gpio_in_named(iotkitdev, "EXP_IRQ", 16)); | ||
490 | + | ||
491 | + create_unimplemented_device("FPGA NS PC", 0x48007000, 0x1000); | ||
492 | + | ||
493 | + armv7m_load_kernel(ARM_CPU(first_cpu), machine->kernel_filename, 0x400000); | ||
494 | +} | ||
495 | + | ||
496 | +static void mps2tz_class_init(ObjectClass *oc, void *data) | ||
497 | +{ | ||
498 | + MachineClass *mc = MACHINE_CLASS(oc); | ||
499 | + | ||
500 | + mc->init = mps2tz_common_init; | ||
501 | + mc->max_cpus = 1; | ||
502 | +} | ||
503 | + | ||
504 | +static void mps2tz_an505_class_init(ObjectClass *oc, void *data) | ||
505 | +{ | ||
506 | + MachineClass *mc = MACHINE_CLASS(oc); | ||
507 | + MPS2TZMachineClass *mmc = MPS2TZ_MACHINE_CLASS(oc); | ||
508 | + | ||
509 | + mc->desc = "ARM MPS2 with AN505 FPGA image for Cortex-M33"; | ||
510 | + mmc->fpga_type = FPGA_AN505; | ||
511 | + mc->default_cpu_type = ARM_CPU_TYPE_NAME("cortex-m33"); | ||
512 | + mmc->scc_id = 0x41040000 | (505 << 4); | ||
513 | +} | ||
514 | + | ||
515 | +static const TypeInfo mps2tz_info = { | ||
516 | + .name = TYPE_MPS2TZ_MACHINE, | ||
517 | + .parent = TYPE_MACHINE, | ||
518 | + .abstract = true, | ||
519 | + .instance_size = sizeof(MPS2TZMachineState), | ||
520 | + .class_size = sizeof(MPS2TZMachineClass), | ||
521 | + .class_init = mps2tz_class_init, | ||
522 | +}; | ||
523 | + | ||
524 | +static const TypeInfo mps2tz_an505_info = { | ||
525 | + .name = TYPE_MPS2TZ_AN505_MACHINE, | ||
526 | + .parent = TYPE_MPS2TZ_MACHINE, | ||
527 | + .class_init = mps2tz_an505_class_init, | ||
528 | +}; | ||
529 | + | ||
530 | +static void mps2tz_machine_init(void) | ||
531 | +{ | ||
532 | + type_register_static(&mps2tz_info); | ||
533 | + type_register_static(&mps2tz_an505_info); | ||
534 | +} | ||
535 | + | ||
536 | +type_init(mps2tz_machine_init); | ||
537 | -- | 62 | -- |
538 | 2.16.2 | 63 | 2.20.1 |
539 | 64 | ||
540 | 65 | diff view generated by jsdifflib |
1 | Model the Arm IoT Kit documented in | 1 | arch_init.c does very little but has a long list of #include lines. |
---|---|---|---|
2 | http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ecm0601256/index.html | 2 | Remove all the unnecessary ones. |
3 | |||
4 | The Arm IoT Kit is a subsystem which includes a CPU and some devices, | ||
5 | and is intended be extended by adding extra devices to form a | ||
6 | complete system. It is used in the MPS2 board's AN505 image for the | ||
7 | Cortex-M33. | ||
8 | 3 | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 5 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
11 | Message-id: 20180220180325.29818-19-peter.maydell@linaro.org | 6 | Message-id: 20210730105947.28215-4-peter.maydell@linaro.org |
12 | --- | 7 | --- |
13 | hw/arm/Makefile.objs | 1 + | 8 | softmmu/arch_init.c | 7 ------- |
14 | include/hw/arm/iotkit.h | 109 ++++++++ | 9 | 1 file changed, 7 deletions(-) |
15 | hw/arm/iotkit.c | 598 ++++++++++++++++++++++++++++++++++++++++ | ||
16 | default-configs/arm-softmmu.mak | 1 + | ||
17 | 4 files changed, 709 insertions(+) | ||
18 | create mode 100644 include/hw/arm/iotkit.h | ||
19 | create mode 100644 hw/arm/iotkit.c | ||
20 | 10 | ||
21 | diff --git a/hw/arm/Makefile.objs b/hw/arm/Makefile.objs | 11 | diff --git a/softmmu/arch_init.c b/softmmu/arch_init.c |
22 | index XXXXXXX..XXXXXXX 100644 | 12 | index XXXXXXX..XXXXXXX 100644 |
23 | --- a/hw/arm/Makefile.objs | 13 | --- a/softmmu/arch_init.c |
24 | +++ b/hw/arm/Makefile.objs | 14 | +++ b/softmmu/arch_init.c |
25 | @@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_FSL_IMX6) += fsl-imx6.o sabrelite.o | ||
26 | obj-$(CONFIG_ASPEED_SOC) += aspeed_soc.o aspeed.o | ||
27 | obj-$(CONFIG_MPS2) += mps2.o | ||
28 | obj-$(CONFIG_MSF2) += msf2-soc.o msf2-som.o | ||
29 | +obj-$(CONFIG_IOTKIT) += iotkit.o | ||
30 | diff --git a/include/hw/arm/iotkit.h b/include/hw/arm/iotkit.h | ||
31 | new file mode 100644 | ||
32 | index XXXXXXX..XXXXXXX | ||
33 | --- /dev/null | ||
34 | +++ b/include/hw/arm/iotkit.h | ||
35 | @@ -XXX,XX +XXX,XX @@ | 15 | @@ -XXX,XX +XXX,XX @@ |
36 | +/* | 16 | */ |
37 | + * ARM IoT Kit | 17 | #include "qemu/osdep.h" |
38 | + * | 18 | #include "sysemu/arch_init.h" |
39 | + * Copyright (c) 2018 Linaro Limited | 19 | -#include "hw/pci/pci.h" |
40 | + * Written by Peter Maydell | 20 | -#include "hw/audio/soundhw.h" |
41 | + * | 21 | -#include "qapi/error.h" |
42 | + * This program is free software; you can redistribute it and/or modify | 22 | -#include "qemu/config-file.h" |
43 | + * it under the terms of the GNU General Public License version 2 or | 23 | -#include "qemu/error-report.h" |
44 | + * (at your option) any later version. | 24 | -#include "hw/acpi/acpi.h" |
45 | + */ | 25 | -#include "qemu/help_option.h" |
46 | + | 26 | |
47 | +/* This is a model of the Arm IoT Kit which is documented in | 27 | #ifdef TARGET_SPARC |
48 | + * http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ecm0601256/index.html | 28 | int graphic_width = 1024; |
49 | + * It contains: | ||
50 | + * a Cortex-M33 | ||
51 | + * the IDAU | ||
52 | + * some timers and watchdogs | ||
53 | + * two peripheral protection controllers | ||
54 | + * a memory protection controller | ||
55 | + * a security controller | ||
56 | + * a bus fabric which arranges that some parts of the address | ||
57 | + * space are secure and non-secure aliases of each other | ||
58 | + * | ||
59 | + * QEMU interface: | ||
60 | + * + QOM property "memory" is a MemoryRegion containing the devices provided | ||
61 | + * by the board model. | ||
62 | + * + QOM property "MAINCLK" is the frequency of the main system clock | ||
63 | + * + QOM property "EXP_NUMIRQ" sets the number of expansion interrupts | ||
64 | + * + Named GPIO inputs "EXP_IRQ" 0..n are the expansion interrupts, which | ||
65 | + * are wired to the NVIC lines 32 .. n+32 | ||
66 | + * Controlling up to 4 AHB expansion PPBs which a system using the IoTKit | ||
67 | + * might provide: | ||
68 | + * + named GPIO outputs apb_ppcexp{0,1,2,3}_nonsec[0..15] | ||
69 | + * + named GPIO outputs apb_ppcexp{0,1,2,3}_ap[0..15] | ||
70 | + * + named GPIO outputs apb_ppcexp{0,1,2,3}_irq_enable | ||
71 | + * + named GPIO outputs apb_ppcexp{0,1,2,3}_irq_clear | ||
72 | + * + named GPIO inputs apb_ppcexp{0,1,2,3}_irq_status | ||
73 | + * Controlling each of the 4 expansion AHB PPCs which a system using the IoTKit | ||
74 | + * might provide: | ||
75 | + * + named GPIO outputs ahb_ppcexp{0,1,2,3}_nonsec[0..15] | ||
76 | + * + named GPIO outputs ahb_ppcexp{0,1,2,3}_ap[0..15] | ||
77 | + * + named GPIO outputs ahb_ppcexp{0,1,2,3}_irq_enable | ||
78 | + * + named GPIO outputs ahb_ppcexp{0,1,2,3}_irq_clear | ||
79 | + * + named GPIO inputs ahb_ppcexp{0,1,2,3}_irq_status | ||
80 | + */ | ||
81 | + | ||
82 | +#ifndef IOTKIT_H | ||
83 | +#define IOTKIT_H | ||
84 | + | ||
85 | +#include "hw/sysbus.h" | ||
86 | +#include "hw/arm/armv7m.h" | ||
87 | +#include "hw/misc/iotkit-secctl.h" | ||
88 | +#include "hw/misc/tz-ppc.h" | ||
89 | +#include "hw/timer/cmsdk-apb-timer.h" | ||
90 | +#include "hw/misc/unimp.h" | ||
91 | +#include "hw/or-irq.h" | ||
92 | +#include "hw/core/split-irq.h" | ||
93 | + | ||
94 | +#define TYPE_IOTKIT "iotkit" | ||
95 | +#define IOTKIT(obj) OBJECT_CHECK(IoTKit, (obj), TYPE_IOTKIT) | ||
96 | + | ||
97 | +/* We have an IRQ splitter and an OR gate input for each external PPC | ||
98 | + * and the 2 internal PPCs | ||
99 | + */ | ||
100 | +#define NUM_EXTERNAL_PPCS (IOTS_NUM_AHB_EXP_PPC + IOTS_NUM_APB_EXP_PPC) | ||
101 | +#define NUM_PPCS (NUM_EXTERNAL_PPCS + 2) | ||
102 | + | ||
103 | +typedef struct IoTKit { | ||
104 | + /*< private >*/ | ||
105 | + SysBusDevice parent_obj; | ||
106 | + | ||
107 | + /*< public >*/ | ||
108 | + ARMv7MState armv7m; | ||
109 | + IoTKitSecCtl secctl; | ||
110 | + TZPPC apb_ppc0; | ||
111 | + TZPPC apb_ppc1; | ||
112 | + CMSDKAPBTIMER timer0; | ||
113 | + CMSDKAPBTIMER timer1; | ||
114 | + qemu_or_irq ppc_irq_orgate; | ||
115 | + SplitIRQ sec_resp_splitter; | ||
116 | + SplitIRQ ppc_irq_splitter[NUM_PPCS]; | ||
117 | + | ||
118 | + UnimplementedDeviceState dualtimer; | ||
119 | + UnimplementedDeviceState s32ktimer; | ||
120 | + | ||
121 | + MemoryRegion container; | ||
122 | + MemoryRegion alias1; | ||
123 | + MemoryRegion alias2; | ||
124 | + MemoryRegion alias3; | ||
125 | + MemoryRegion sram0; | ||
126 | + | ||
127 | + qemu_irq *exp_irqs; | ||
128 | + qemu_irq ppc0_irq; | ||
129 | + qemu_irq ppc1_irq; | ||
130 | + qemu_irq sec_resp_cfg; | ||
131 | + qemu_irq sec_resp_cfg_in; | ||
132 | + qemu_irq nsc_cfg_in; | ||
133 | + | ||
134 | + qemu_irq irq_status_in[NUM_EXTERNAL_PPCS]; | ||
135 | + | ||
136 | + uint32_t nsccfg; | ||
137 | + | ||
138 | + /* Properties */ | ||
139 | + MemoryRegion *board_memory; | ||
140 | + uint32_t exp_numirq; | ||
141 | + uint32_t mainclk_frq; | ||
142 | +} IoTKit; | ||
143 | + | ||
144 | +#endif | ||
145 | diff --git a/hw/arm/iotkit.c b/hw/arm/iotkit.c | ||
146 | new file mode 100644 | ||
147 | index XXXXXXX..XXXXXXX | ||
148 | --- /dev/null | ||
149 | +++ b/hw/arm/iotkit.c | ||
150 | @@ -XXX,XX +XXX,XX @@ | ||
151 | +/* | ||
152 | + * Arm IoT Kit | ||
153 | + * | ||
154 | + * Copyright (c) 2018 Linaro Limited | ||
155 | + * Written by Peter Maydell | ||
156 | + * | ||
157 | + * This program is free software; you can redistribute it and/or modify | ||
158 | + * it under the terms of the GNU General Public License version 2 or | ||
159 | + * (at your option) any later version. | ||
160 | + */ | ||
161 | + | ||
162 | +#include "qemu/osdep.h" | ||
163 | +#include "qemu/log.h" | ||
164 | +#include "qapi/error.h" | ||
165 | +#include "trace.h" | ||
166 | +#include "hw/sysbus.h" | ||
167 | +#include "hw/registerfields.h" | ||
168 | +#include "hw/arm/iotkit.h" | ||
169 | +#include "hw/misc/unimp.h" | ||
170 | +#include "hw/arm/arm.h" | ||
171 | + | ||
172 | +/* Create an alias region of @size bytes starting at @base | ||
173 | + * which mirrors the memory starting at @orig. | ||
174 | + */ | ||
175 | +static void make_alias(IoTKit *s, MemoryRegion *mr, const char *name, | ||
176 | + hwaddr base, hwaddr size, hwaddr orig) | ||
177 | +{ | ||
178 | + memory_region_init_alias(mr, NULL, name, &s->container, orig, size); | ||
179 | + /* The alias is even lower priority than unimplemented_device regions */ | ||
180 | + memory_region_add_subregion_overlap(&s->container, base, mr, -1500); | ||
181 | +} | ||
182 | + | ||
183 | +static void init_sysbus_child(Object *parent, const char *childname, | ||
184 | + void *child, size_t childsize, | ||
185 | + const char *childtype) | ||
186 | +{ | ||
187 | + object_initialize(child, childsize, childtype); | ||
188 | + object_property_add_child(parent, childname, OBJECT(child), &error_abort); | ||
189 | + qdev_set_parent_bus(DEVICE(child), sysbus_get_default()); | ||
190 | +} | ||
191 | + | ||
192 | +static void irq_status_forwarder(void *opaque, int n, int level) | ||
193 | +{ | ||
194 | + qemu_irq destirq = opaque; | ||
195 | + | ||
196 | + qemu_set_irq(destirq, level); | ||
197 | +} | ||
198 | + | ||
199 | +static void nsccfg_handler(void *opaque, int n, int level) | ||
200 | +{ | ||
201 | + IoTKit *s = IOTKIT(opaque); | ||
202 | + | ||
203 | + s->nsccfg = level; | ||
204 | +} | ||
205 | + | ||
206 | +static void iotkit_forward_ppc(IoTKit *s, const char *ppcname, int ppcnum) | ||
207 | +{ | ||
208 | + /* Each of the 4 AHB and 4 APB PPCs that might be present in a | ||
209 | + * system using the IoTKit has a collection of control lines which | ||
210 | + * are provided by the security controller and which we want to | ||
211 | + * expose as control lines on the IoTKit device itself, so the | ||
212 | + * code using the IoTKit can wire them up to the PPCs. | ||
213 | + */ | ||
214 | + SplitIRQ *splitter = &s->ppc_irq_splitter[ppcnum]; | ||
215 | + DeviceState *iotkitdev = DEVICE(s); | ||
216 | + DeviceState *dev_secctl = DEVICE(&s->secctl); | ||
217 | + DeviceState *dev_splitter = DEVICE(splitter); | ||
218 | + char *name; | ||
219 | + | ||
220 | + name = g_strdup_printf("%s_nonsec", ppcname); | ||
221 | + qdev_pass_gpios(dev_secctl, iotkitdev, name); | ||
222 | + g_free(name); | ||
223 | + name = g_strdup_printf("%s_ap", ppcname); | ||
224 | + qdev_pass_gpios(dev_secctl, iotkitdev, name); | ||
225 | + g_free(name); | ||
226 | + name = g_strdup_printf("%s_irq_enable", ppcname); | ||
227 | + qdev_pass_gpios(dev_secctl, iotkitdev, name); | ||
228 | + g_free(name); | ||
229 | + name = g_strdup_printf("%s_irq_clear", ppcname); | ||
230 | + qdev_pass_gpios(dev_secctl, iotkitdev, name); | ||
231 | + g_free(name); | ||
232 | + | ||
233 | + /* irq_status is a little more tricky, because we need to | ||
234 | + * split it so we can send it both to the security controller | ||
235 | + * and to our OR gate for the NVIC interrupt line. | ||
236 | + * Connect up the splitter's outputs, and create a GPIO input | ||
237 | + * which will pass the line state to the input splitter. | ||
238 | + */ | ||
239 | + name = g_strdup_printf("%s_irq_status", ppcname); | ||
240 | + qdev_connect_gpio_out(dev_splitter, 0, | ||
241 | + qdev_get_gpio_in_named(dev_secctl, | ||
242 | + name, 0)); | ||
243 | + qdev_connect_gpio_out(dev_splitter, 1, | ||
244 | + qdev_get_gpio_in(DEVICE(&s->ppc_irq_orgate), ppcnum)); | ||
245 | + s->irq_status_in[ppcnum] = qdev_get_gpio_in(dev_splitter, 0); | ||
246 | + qdev_init_gpio_in_named_with_opaque(iotkitdev, irq_status_forwarder, | ||
247 | + s->irq_status_in[ppcnum], name, 1); | ||
248 | + g_free(name); | ||
249 | +} | ||
250 | + | ||
251 | +static void iotkit_forward_sec_resp_cfg(IoTKit *s) | ||
252 | +{ | ||
253 | + /* Forward the 3rd output from the splitter device as a | ||
254 | + * named GPIO output of the iotkit object. | ||
255 | + */ | ||
256 | + DeviceState *dev = DEVICE(s); | ||
257 | + DeviceState *dev_splitter = DEVICE(&s->sec_resp_splitter); | ||
258 | + | ||
259 | + qdev_init_gpio_out_named(dev, &s->sec_resp_cfg, "sec_resp_cfg", 1); | ||
260 | + s->sec_resp_cfg_in = qemu_allocate_irq(irq_status_forwarder, | ||
261 | + s->sec_resp_cfg, 1); | ||
262 | + qdev_connect_gpio_out(dev_splitter, 2, s->sec_resp_cfg_in); | ||
263 | +} | ||
264 | + | ||
265 | +static void iotkit_init(Object *obj) | ||
266 | +{ | ||
267 | + IoTKit *s = IOTKIT(obj); | ||
268 | + int i; | ||
269 | + | ||
270 | + memory_region_init(&s->container, obj, "iotkit-container", UINT64_MAX); | ||
271 | + | ||
272 | + init_sysbus_child(obj, "armv7m", &s->armv7m, sizeof(s->armv7m), | ||
273 | + TYPE_ARMV7M); | ||
274 | + qdev_prop_set_string(DEVICE(&s->armv7m), "cpu-type", | ||
275 | + ARM_CPU_TYPE_NAME("cortex-m33")); | ||
276 | + | ||
277 | + init_sysbus_child(obj, "secctl", &s->secctl, sizeof(s->secctl), | ||
278 | + TYPE_IOTKIT_SECCTL); | ||
279 | + init_sysbus_child(obj, "apb-ppc0", &s->apb_ppc0, sizeof(s->apb_ppc0), | ||
280 | + TYPE_TZ_PPC); | ||
281 | + init_sysbus_child(obj, "apb-ppc1", &s->apb_ppc1, sizeof(s->apb_ppc1), | ||
282 | + TYPE_TZ_PPC); | ||
283 | + init_sysbus_child(obj, "timer0", &s->timer0, sizeof(s->timer0), | ||
284 | + TYPE_CMSDK_APB_TIMER); | ||
285 | + init_sysbus_child(obj, "timer1", &s->timer1, sizeof(s->timer1), | ||
286 | + TYPE_CMSDK_APB_TIMER); | ||
287 | + init_sysbus_child(obj, "dualtimer", &s->dualtimer, sizeof(s->dualtimer), | ||
288 | + TYPE_UNIMPLEMENTED_DEVICE); | ||
289 | + object_initialize(&s->ppc_irq_orgate, sizeof(s->ppc_irq_orgate), | ||
290 | + TYPE_OR_IRQ); | ||
291 | + object_property_add_child(obj, "ppc-irq-orgate", | ||
292 | + OBJECT(&s->ppc_irq_orgate), &error_abort); | ||
293 | + object_initialize(&s->sec_resp_splitter, sizeof(s->sec_resp_splitter), | ||
294 | + TYPE_SPLIT_IRQ); | ||
295 | + object_property_add_child(obj, "sec-resp-splitter", | ||
296 | + OBJECT(&s->sec_resp_splitter), &error_abort); | ||
297 | + for (i = 0; i < ARRAY_SIZE(s->ppc_irq_splitter); i++) { | ||
298 | + char *name = g_strdup_printf("ppc-irq-splitter-%d", i); | ||
299 | + SplitIRQ *splitter = &s->ppc_irq_splitter[i]; | ||
300 | + | ||
301 | + object_initialize(splitter, sizeof(*splitter), TYPE_SPLIT_IRQ); | ||
302 | + object_property_add_child(obj, name, OBJECT(splitter), &error_abort); | ||
303 | + } | ||
304 | + init_sysbus_child(obj, "s32ktimer", &s->s32ktimer, sizeof(s->s32ktimer), | ||
305 | + TYPE_UNIMPLEMENTED_DEVICE); | ||
306 | +} | ||
307 | + | ||
308 | +static void iotkit_exp_irq(void *opaque, int n, int level) | ||
309 | +{ | ||
310 | + IoTKit *s = IOTKIT(opaque); | ||
311 | + | ||
312 | + qemu_set_irq(s->exp_irqs[n], level); | ||
313 | +} | ||
314 | + | ||
315 | +static void iotkit_realize(DeviceState *dev, Error **errp) | ||
316 | +{ | ||
317 | + IoTKit *s = IOTKIT(dev); | ||
318 | + int i; | ||
319 | + MemoryRegion *mr; | ||
320 | + Error *err = NULL; | ||
321 | + SysBusDevice *sbd_apb_ppc0; | ||
322 | + SysBusDevice *sbd_secctl; | ||
323 | + DeviceState *dev_apb_ppc0; | ||
324 | + DeviceState *dev_apb_ppc1; | ||
325 | + DeviceState *dev_secctl; | ||
326 | + DeviceState *dev_splitter; | ||
327 | + | ||
328 | + if (!s->board_memory) { | ||
329 | + error_setg(errp, "memory property was not set"); | ||
330 | + return; | ||
331 | + } | ||
332 | + | ||
333 | + if (!s->mainclk_frq) { | ||
334 | + error_setg(errp, "MAINCLK property was not set"); | ||
335 | + return; | ||
336 | + } | ||
337 | + | ||
338 | + /* Handling of which devices should be available only to secure | ||
339 | + * code is usually done differently for M profile than for A profile. | ||
340 | + * Instead of putting some devices only into the secure address space, | ||
341 | + * devices exist in both address spaces but with hard-wired security | ||
342 | + * permissions that will cause the CPU to fault for non-secure accesses. | ||
343 | + * | ||
344 | + * The IoTKit has an IDAU (Implementation Defined Access Unit), | ||
345 | + * which specifies hard-wired security permissions for different | ||
346 | + * areas of the physical address space. For the IoTKit IDAU, the | ||
347 | + * top 4 bits of the physical address are the IDAU region ID, and | ||
348 | + * if bit 28 (ie the lowest bit of the ID) is 0 then this is an NS | ||
349 | + * region, otherwise it is an S region. | ||
350 | + * | ||
351 | + * The various devices and RAMs are generally all mapped twice, | ||
352 | + * once into a region that the IDAU defines as secure and once | ||
353 | + * into a non-secure region. They sit behind either a Memory | ||
354 | + * Protection Controller (for RAM) or a Peripheral Protection | ||
355 | + * Controller (for devices), which allow a more fine grained | ||
356 | + * configuration of whether non-secure accesses are permitted. | ||
357 | + * | ||
358 | + * (The other place that guest software can configure security | ||
359 | + * permissions is in the architected SAU (Security Attribution | ||
360 | + * Unit), which is entirely inside the CPU. The IDAU can upgrade | ||
361 | + * the security attributes for a region to more restrictive than | ||
362 | + * the SAU specifies, but cannot downgrade them.) | ||
363 | + * | ||
364 | + * 0x10000000..0x1fffffff alias of 0x00000000..0x0fffffff | ||
365 | + * 0x20000000..0x2007ffff 32KB FPGA block RAM | ||
366 | + * 0x30000000..0x3fffffff alias of 0x20000000..0x2fffffff | ||
367 | + * 0x40000000..0x4000ffff base peripheral region 1 | ||
368 | + * 0x40010000..0x4001ffff CPU peripherals (none for IoTKit) | ||
369 | + * 0x40020000..0x4002ffff system control element peripherals | ||
370 | + * 0x40080000..0x400fffff base peripheral region 2 | ||
371 | + * 0x50000000..0x5fffffff alias of 0x40000000..0x4fffffff | ||
372 | + */ | ||
373 | + | ||
374 | + memory_region_add_subregion_overlap(&s->container, 0, s->board_memory, -1); | ||
375 | + | ||
376 | + qdev_prop_set_uint32(DEVICE(&s->armv7m), "num-irq", s->exp_numirq + 32); | ||
377 | + /* In real hardware the initial Secure VTOR is set from the INITSVTOR0 | ||
378 | + * register in the IoT Kit System Control Register block, and the | ||
379 | + * initial value of that is in turn specifiable by the FPGA that | ||
380 | + * instantiates the IoT Kit. In QEMU we don't implement this wrinkle, | ||
381 | + * and simply set the CPU's init-svtor to the IoT Kit default value. | ||
382 | + */ | ||
383 | + qdev_prop_set_uint32(DEVICE(&s->armv7m), "init-svtor", 0x10000000); | ||
384 | + object_property_set_link(OBJECT(&s->armv7m), OBJECT(&s->container), | ||
385 | + "memory", &err); | ||
386 | + if (err) { | ||
387 | + error_propagate(errp, err); | ||
388 | + return; | ||
389 | + } | ||
390 | + object_property_set_link(OBJECT(&s->armv7m), OBJECT(s), "idau", &err); | ||
391 | + if (err) { | ||
392 | + error_propagate(errp, err); | ||
393 | + return; | ||
394 | + } | ||
395 | + object_property_set_bool(OBJECT(&s->armv7m), true, "realized", &err); | ||
396 | + if (err) { | ||
397 | + error_propagate(errp, err); | ||
398 | + return; | ||
399 | + } | ||
400 | + | ||
401 | + /* Connect our EXP_IRQ GPIOs to the NVIC's lines 32 and up. */ | ||
402 | + s->exp_irqs = g_new(qemu_irq, s->exp_numirq); | ||
403 | + for (i = 0; i < s->exp_numirq; i++) { | ||
404 | + s->exp_irqs[i] = qdev_get_gpio_in(DEVICE(&s->armv7m), i + 32); | ||
405 | + } | ||
406 | + qdev_init_gpio_in_named(dev, iotkit_exp_irq, "EXP_IRQ", s->exp_numirq); | ||
407 | + | ||
408 | + /* Set up the big aliases first */ | ||
409 | + make_alias(s, &s->alias1, "alias 1", 0x10000000, 0x10000000, 0x00000000); | ||
410 | + make_alias(s, &s->alias2, "alias 2", 0x30000000, 0x10000000, 0x20000000); | ||
411 | + /* The 0x50000000..0x5fffffff region is not a pure alias: it has | ||
412 | + * a few extra devices that only appear there (generally the | ||
413 | + * control interfaces for the protection controllers). | ||
414 | + * We implement this by mapping those devices over the top of this | ||
415 | + * alias MR at a higher priority. | ||
416 | + */ | ||
417 | + make_alias(s, &s->alias3, "alias 3", 0x50000000, 0x10000000, 0x40000000); | ||
418 | + | ||
419 | + /* This RAM should be behind a Memory Protection Controller, but we | ||
420 | + * don't implement that yet. | ||
421 | + */ | ||
422 | + memory_region_init_ram(&s->sram0, NULL, "iotkit.sram0", 0x00008000, &err); | ||
423 | + if (err) { | ||
424 | + error_propagate(errp, err); | ||
425 | + return; | ||
426 | + } | ||
427 | + memory_region_add_subregion(&s->container, 0x20000000, &s->sram0); | ||
428 | + | ||
429 | + /* Security controller */ | ||
430 | + object_property_set_bool(OBJECT(&s->secctl), true, "realized", &err); | ||
431 | + if (err) { | ||
432 | + error_propagate(errp, err); | ||
433 | + return; | ||
434 | + } | ||
435 | + sbd_secctl = SYS_BUS_DEVICE(&s->secctl); | ||
436 | + dev_secctl = DEVICE(&s->secctl); | ||
437 | + sysbus_mmio_map(sbd_secctl, 0, 0x50080000); | ||
438 | + sysbus_mmio_map(sbd_secctl, 1, 0x40080000); | ||
439 | + | ||
440 | + s->nsc_cfg_in = qemu_allocate_irq(nsccfg_handler, s, 1); | ||
441 | + qdev_connect_gpio_out_named(dev_secctl, "nsc_cfg", 0, s->nsc_cfg_in); | ||
442 | + | ||
443 | + /* The sec_resp_cfg output from the security controller must be split into | ||
444 | + * multiple lines, one for each of the PPCs within the IoTKit and one | ||
445 | + * that will be an output from the IoTKit to the system. | ||
446 | + */ | ||
447 | + object_property_set_int(OBJECT(&s->sec_resp_splitter), 3, | ||
448 | + "num-lines", &err); | ||
449 | + if (err) { | ||
450 | + error_propagate(errp, err); | ||
451 | + return; | ||
452 | + } | ||
453 | + object_property_set_bool(OBJECT(&s->sec_resp_splitter), true, | ||
454 | + "realized", &err); | ||
455 | + if (err) { | ||
456 | + error_propagate(errp, err); | ||
457 | + return; | ||
458 | + } | ||
459 | + dev_splitter = DEVICE(&s->sec_resp_splitter); | ||
460 | + qdev_connect_gpio_out_named(dev_secctl, "sec_resp_cfg", 0, | ||
461 | + qdev_get_gpio_in(dev_splitter, 0)); | ||
462 | + | ||
463 | + /* Devices behind APB PPC0: | ||
464 | + * 0x40000000: timer0 | ||
465 | + * 0x40001000: timer1 | ||
466 | + * 0x40002000: dual timer | ||
467 | + * We must configure and realize each downstream device and connect | ||
468 | + * it to the appropriate PPC port; then we can realize the PPC and | ||
469 | + * map its upstream ends to the right place in the container. | ||
470 | + */ | ||
471 | + qdev_prop_set_uint32(DEVICE(&s->timer0), "pclk-frq", s->mainclk_frq); | ||
472 | + object_property_set_bool(OBJECT(&s->timer0), true, "realized", &err); | ||
473 | + if (err) { | ||
474 | + error_propagate(errp, err); | ||
475 | + return; | ||
476 | + } | ||
477 | + sysbus_connect_irq(SYS_BUS_DEVICE(&s->timer0), 0, | ||
478 | + qdev_get_gpio_in(DEVICE(&s->armv7m), 3)); | ||
479 | + mr = sysbus_mmio_get_region(SYS_BUS_DEVICE(&s->timer0), 0); | ||
480 | + object_property_set_link(OBJECT(&s->apb_ppc0), OBJECT(mr), "port[0]", &err); | ||
481 | + if (err) { | ||
482 | + error_propagate(errp, err); | ||
483 | + return; | ||
484 | + } | ||
485 | + | ||
486 | + qdev_prop_set_uint32(DEVICE(&s->timer1), "pclk-frq", s->mainclk_frq); | ||
487 | + object_property_set_bool(OBJECT(&s->timer1), true, "realized", &err); | ||
488 | + if (err) { | ||
489 | + error_propagate(errp, err); | ||
490 | + return; | ||
491 | + } | ||
492 | + sysbus_connect_irq(SYS_BUS_DEVICE(&s->timer1), 0, | ||
493 | + qdev_get_gpio_in(DEVICE(&s->armv7m), 3)); | ||
494 | + mr = sysbus_mmio_get_region(SYS_BUS_DEVICE(&s->timer1), 0); | ||
495 | + object_property_set_link(OBJECT(&s->apb_ppc0), OBJECT(mr), "port[1]", &err); | ||
496 | + if (err) { | ||
497 | + error_propagate(errp, err); | ||
498 | + return; | ||
499 | + } | ||
500 | + | ||
501 | + qdev_prop_set_string(DEVICE(&s->dualtimer), "name", "Dual timer"); | ||
502 | + qdev_prop_set_uint64(DEVICE(&s->dualtimer), "size", 0x1000); | ||
503 | + object_property_set_bool(OBJECT(&s->dualtimer), true, "realized", &err); | ||
504 | + if (err) { | ||
505 | + error_propagate(errp, err); | ||
506 | + return; | ||
507 | + } | ||
508 | + mr = sysbus_mmio_get_region(SYS_BUS_DEVICE(&s->dualtimer), 0); | ||
509 | + object_property_set_link(OBJECT(&s->apb_ppc0), OBJECT(mr), "port[2]", &err); | ||
510 | + if (err) { | ||
511 | + error_propagate(errp, err); | ||
512 | + return; | ||
513 | + } | ||
514 | + | ||
515 | + object_property_set_bool(OBJECT(&s->apb_ppc0), true, "realized", &err); | ||
516 | + if (err) { | ||
517 | + error_propagate(errp, err); | ||
518 | + return; | ||
519 | + } | ||
520 | + | ||
521 | + sbd_apb_ppc0 = SYS_BUS_DEVICE(&s->apb_ppc0); | ||
522 | + dev_apb_ppc0 = DEVICE(&s->apb_ppc0); | ||
523 | + | ||
524 | + mr = sysbus_mmio_get_region(sbd_apb_ppc0, 0); | ||
525 | + memory_region_add_subregion(&s->container, 0x40000000, mr); | ||
526 | + mr = sysbus_mmio_get_region(sbd_apb_ppc0, 1); | ||
527 | + memory_region_add_subregion(&s->container, 0x40001000, mr); | ||
528 | + mr = sysbus_mmio_get_region(sbd_apb_ppc0, 2); | ||
529 | + memory_region_add_subregion(&s->container, 0x40002000, mr); | ||
530 | + for (i = 0; i < IOTS_APB_PPC0_NUM_PORTS; i++) { | ||
531 | + qdev_connect_gpio_out_named(dev_secctl, "apb_ppc0_nonsec", i, | ||
532 | + qdev_get_gpio_in_named(dev_apb_ppc0, | ||
533 | + "cfg_nonsec", i)); | ||
534 | + qdev_connect_gpio_out_named(dev_secctl, "apb_ppc0_ap", i, | ||
535 | + qdev_get_gpio_in_named(dev_apb_ppc0, | ||
536 | + "cfg_ap", i)); | ||
537 | + } | ||
538 | + qdev_connect_gpio_out_named(dev_secctl, "apb_ppc0_irq_enable", 0, | ||
539 | + qdev_get_gpio_in_named(dev_apb_ppc0, | ||
540 | + "irq_enable", 0)); | ||
541 | + qdev_connect_gpio_out_named(dev_secctl, "apb_ppc0_irq_clear", 0, | ||
542 | + qdev_get_gpio_in_named(dev_apb_ppc0, | ||
543 | + "irq_clear", 0)); | ||
544 | + qdev_connect_gpio_out(dev_splitter, 0, | ||
545 | + qdev_get_gpio_in_named(dev_apb_ppc0, | ||
546 | + "cfg_sec_resp", 0)); | ||
547 | + | ||
548 | + /* All the PPC irq lines (from the 2 internal PPCs and the 8 external | ||
549 | + * ones) are sent individually to the security controller, and also | ||
550 | + * ORed together to give a single combined PPC interrupt to the NVIC. | ||
551 | + */ | ||
552 | + object_property_set_int(OBJECT(&s->ppc_irq_orgate), | ||
553 | + NUM_PPCS, "num-lines", &err); | ||
554 | + if (err) { | ||
555 | + error_propagate(errp, err); | ||
556 | + return; | ||
557 | + } | ||
558 | + object_property_set_bool(OBJECT(&s->ppc_irq_orgate), true, | ||
559 | + "realized", &err); | ||
560 | + if (err) { | ||
561 | + error_propagate(errp, err); | ||
562 | + return; | ||
563 | + } | ||
564 | + qdev_connect_gpio_out(DEVICE(&s->ppc_irq_orgate), 0, | ||
565 | + qdev_get_gpio_in(DEVICE(&s->armv7m), 10)); | ||
566 | + | ||
567 | + /* 0x40010000 .. 0x4001ffff: private CPU region: unused in IoTKit */ | ||
568 | + | ||
569 | + /* 0x40020000 .. 0x4002ffff : IoTKit system control peripheral region */ | ||
570 | + /* Devices behind APB PPC1: | ||
571 | + * 0x4002f000: S32K timer | ||
572 | + */ | ||
573 | + qdev_prop_set_string(DEVICE(&s->s32ktimer), "name", "S32KTIMER"); | ||
574 | + qdev_prop_set_uint64(DEVICE(&s->s32ktimer), "size", 0x1000); | ||
575 | + object_property_set_bool(OBJECT(&s->s32ktimer), true, "realized", &err); | ||
576 | + if (err) { | ||
577 | + error_propagate(errp, err); | ||
578 | + return; | ||
579 | + } | ||
580 | + mr = sysbus_mmio_get_region(SYS_BUS_DEVICE(&s->s32ktimer), 0); | ||
581 | + object_property_set_link(OBJECT(&s->apb_ppc1), OBJECT(mr), "port[0]", &err); | ||
582 | + if (err) { | ||
583 | + error_propagate(errp, err); | ||
584 | + return; | ||
585 | + } | ||
586 | + | ||
587 | + object_property_set_bool(OBJECT(&s->apb_ppc1), true, "realized", &err); | ||
588 | + if (err) { | ||
589 | + error_propagate(errp, err); | ||
590 | + return; | ||
591 | + } | ||
592 | + mr = sysbus_mmio_get_region(SYS_BUS_DEVICE(&s->apb_ppc1), 0); | ||
593 | + memory_region_add_subregion(&s->container, 0x4002f000, mr); | ||
594 | + | ||
595 | + dev_apb_ppc1 = DEVICE(&s->apb_ppc1); | ||
596 | + qdev_connect_gpio_out_named(dev_secctl, "apb_ppc1_nonsec", 0, | ||
597 | + qdev_get_gpio_in_named(dev_apb_ppc1, | ||
598 | + "cfg_nonsec", 0)); | ||
599 | + qdev_connect_gpio_out_named(dev_secctl, "apb_ppc1_ap", 0, | ||
600 | + qdev_get_gpio_in_named(dev_apb_ppc1, | ||
601 | + "cfg_ap", 0)); | ||
602 | + qdev_connect_gpio_out_named(dev_secctl, "apb_ppc1_irq_enable", 0, | ||
603 | + qdev_get_gpio_in_named(dev_apb_ppc1, | ||
604 | + "irq_enable", 0)); | ||
605 | + qdev_connect_gpio_out_named(dev_secctl, "apb_ppc1_irq_clear", 0, | ||
606 | + qdev_get_gpio_in_named(dev_apb_ppc1, | ||
607 | + "irq_clear", 0)); | ||
608 | + qdev_connect_gpio_out(dev_splitter, 1, | ||
609 | + qdev_get_gpio_in_named(dev_apb_ppc1, | ||
610 | + "cfg_sec_resp", 0)); | ||
611 | + | ||
612 | + /* Using create_unimplemented_device() maps the stub into the | ||
613 | + * system address space rather than into our container, but the | ||
614 | + * overall effect to the guest is the same. | ||
615 | + */ | ||
616 | + create_unimplemented_device("SYSINFO", 0x40020000, 0x1000); | ||
617 | + | ||
618 | + create_unimplemented_device("SYSCONTROL", 0x50021000, 0x1000); | ||
619 | + create_unimplemented_device("S32KWATCHDOG", 0x5002e000, 0x1000); | ||
620 | + | ||
621 | + /* 0x40080000 .. 0x4008ffff : IoTKit second Base peripheral region */ | ||
622 | + | ||
623 | + create_unimplemented_device("NS watchdog", 0x40081000, 0x1000); | ||
624 | + create_unimplemented_device("S watchdog", 0x50081000, 0x1000); | ||
625 | + | ||
626 | + create_unimplemented_device("SRAM0 MPC", 0x50083000, 0x1000); | ||
627 | + | ||
628 | + for (i = 0; i < ARRAY_SIZE(s->ppc_irq_splitter); i++) { | ||
629 | + Object *splitter = OBJECT(&s->ppc_irq_splitter[i]); | ||
630 | + | ||
631 | + object_property_set_int(splitter, 2, "num-lines", &err); | ||
632 | + if (err) { | ||
633 | + error_propagate(errp, err); | ||
634 | + return; | ||
635 | + } | ||
636 | + object_property_set_bool(splitter, true, "realized", &err); | ||
637 | + if (err) { | ||
638 | + error_propagate(errp, err); | ||
639 | + return; | ||
640 | + } | ||
641 | + } | ||
642 | + | ||
643 | + for (i = 0; i < IOTS_NUM_AHB_EXP_PPC; i++) { | ||
644 | + char *ppcname = g_strdup_printf("ahb_ppcexp%d", i); | ||
645 | + | ||
646 | + iotkit_forward_ppc(s, ppcname, i); | ||
647 | + g_free(ppcname); | ||
648 | + } | ||
649 | + | ||
650 | + for (i = 0; i < IOTS_NUM_APB_EXP_PPC; i++) { | ||
651 | + char *ppcname = g_strdup_printf("apb_ppcexp%d", i); | ||
652 | + | ||
653 | + iotkit_forward_ppc(s, ppcname, i + IOTS_NUM_AHB_EXP_PPC); | ||
654 | + g_free(ppcname); | ||
655 | + } | ||
656 | + | ||
657 | + for (i = NUM_EXTERNAL_PPCS; i < NUM_PPCS; i++) { | ||
658 | + /* Wire up IRQ splitter for internal PPCs */ | ||
659 | + DeviceState *devs = DEVICE(&s->ppc_irq_splitter[i]); | ||
660 | + char *gpioname = g_strdup_printf("apb_ppc%d_irq_status", | ||
661 | + i - NUM_EXTERNAL_PPCS); | ||
662 | + TZPPC *ppc = (i == NUM_EXTERNAL_PPCS) ? &s->apb_ppc0 : &s->apb_ppc1; | ||
663 | + | ||
664 | + qdev_connect_gpio_out(devs, 0, | ||
665 | + qdev_get_gpio_in_named(dev_secctl, gpioname, 0)); | ||
666 | + qdev_connect_gpio_out(devs, 1, | ||
667 | + qdev_get_gpio_in(DEVICE(&s->ppc_irq_orgate), i)); | ||
668 | + qdev_connect_gpio_out_named(DEVICE(ppc), "irq", 0, | ||
669 | + qdev_get_gpio_in(devs, 0)); | ||
670 | + } | ||
671 | + | ||
672 | + iotkit_forward_sec_resp_cfg(s); | ||
673 | + | ||
674 | + system_clock_scale = NANOSECONDS_PER_SECOND / s->mainclk_frq; | ||
675 | +} | ||
676 | + | ||
677 | +static void iotkit_idau_check(IDAUInterface *ii, uint32_t address, | ||
678 | + int *iregion, bool *exempt, bool *ns, bool *nsc) | ||
679 | +{ | ||
680 | + /* For IoTKit systems the IDAU responses are simple logical functions | ||
681 | + * of the address bits. The NSC attribute is guest-adjustable via the | ||
682 | + * NSCCFG register in the security controller. | ||
683 | + */ | ||
684 | + IoTKit *s = IOTKIT(ii); | ||
685 | + int region = extract32(address, 28, 4); | ||
686 | + | ||
687 | + *ns = !(region & 1); | ||
688 | + *nsc = (region == 1 && (s->nsccfg & 1)) || (region == 3 && (s->nsccfg & 2)); | ||
689 | + /* 0xe0000000..0xe00fffff and 0xf0000000..0xf00fffff are exempt */ | ||
690 | + *exempt = (address & 0xeff00000) == 0xe0000000; | ||
691 | + *iregion = region; | ||
692 | +} | ||
693 | + | ||
694 | +static const VMStateDescription iotkit_vmstate = { | ||
695 | + .name = "iotkit", | ||
696 | + .version_id = 1, | ||
697 | + .minimum_version_id = 1, | ||
698 | + .fields = (VMStateField[]) { | ||
699 | + VMSTATE_UINT32(nsccfg, IoTKit), | ||
700 | + VMSTATE_END_OF_LIST() | ||
701 | + } | ||
702 | +}; | ||
703 | + | ||
704 | +static Property iotkit_properties[] = { | ||
705 | + DEFINE_PROP_LINK("memory", IoTKit, board_memory, TYPE_MEMORY_REGION, | ||
706 | + MemoryRegion *), | ||
707 | + DEFINE_PROP_UINT32("EXP_NUMIRQ", IoTKit, exp_numirq, 64), | ||
708 | + DEFINE_PROP_UINT32("MAINCLK", IoTKit, mainclk_frq, 0), | ||
709 | + DEFINE_PROP_END_OF_LIST() | ||
710 | +}; | ||
711 | + | ||
712 | +static void iotkit_reset(DeviceState *dev) | ||
713 | +{ | ||
714 | + IoTKit *s = IOTKIT(dev); | ||
715 | + | ||
716 | + s->nsccfg = 0; | ||
717 | +} | ||
718 | + | ||
719 | +static void iotkit_class_init(ObjectClass *klass, void *data) | ||
720 | +{ | ||
721 | + DeviceClass *dc = DEVICE_CLASS(klass); | ||
722 | + IDAUInterfaceClass *iic = IDAU_INTERFACE_CLASS(klass); | ||
723 | + | ||
724 | + dc->realize = iotkit_realize; | ||
725 | + dc->vmsd = &iotkit_vmstate; | ||
726 | + dc->props = iotkit_properties; | ||
727 | + dc->reset = iotkit_reset; | ||
728 | + iic->check = iotkit_idau_check; | ||
729 | +} | ||
730 | + | ||
731 | +static const TypeInfo iotkit_info = { | ||
732 | + .name = TYPE_IOTKIT, | ||
733 | + .parent = TYPE_SYS_BUS_DEVICE, | ||
734 | + .instance_size = sizeof(IoTKit), | ||
735 | + .instance_init = iotkit_init, | ||
736 | + .class_init = iotkit_class_init, | ||
737 | + .interfaces = (InterfaceInfo[]) { | ||
738 | + { TYPE_IDAU_INTERFACE }, | ||
739 | + { } | ||
740 | + } | ||
741 | +}; | ||
742 | + | ||
743 | +static void iotkit_register_types(void) | ||
744 | +{ | ||
745 | + type_register_static(&iotkit_info); | ||
746 | +} | ||
747 | + | ||
748 | +type_init(iotkit_register_types); | ||
749 | diff --git a/default-configs/arm-softmmu.mak b/default-configs/arm-softmmu.mak | ||
750 | index XXXXXXX..XXXXXXX 100644 | ||
751 | --- a/default-configs/arm-softmmu.mak | ||
752 | +++ b/default-configs/arm-softmmu.mak | ||
753 | @@ -XXX,XX +XXX,XX @@ CONFIG_MPS2_FPGAIO=y | ||
754 | CONFIG_MPS2_SCC=y | ||
755 | |||
756 | CONFIG_TZ_PPC=y | ||
757 | +CONFIG_IOTKIT=y | ||
758 | CONFIG_IOTKIT_SECCTL=y | ||
759 | |||
760 | CONFIG_VERSATILE_PCI=y | ||
761 | -- | 29 | -- |
762 | 2.16.2 | 30 | 2.20.1 |
763 | 31 | ||
764 | 32 | diff view generated by jsdifflib |
1 | Add remaining easy registers to iotkit-secctl: | 1 | Instead of using an ifdef ladder in arch_init.c (which we then have |
---|---|---|---|
2 | * NSCCFG just routes its two bits out to external GPIO lines | 2 | to manually update every time we add or remove a target |
3 | * BRGINSTAT/BRGINTCLR/BRGINTEN can be dummies, because QEMU's | 3 | architecture), have meson.build put "#define QEMU_ARCH QEMU_ARCH_FOO" |
4 | bus fabric can never report errors | 4 | in the config-target.h file. |
5 | 5 | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Message-id: 20180220180325.29818-18-peter.maydell@linaro.org | 7 | Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Message-id: 20210730105947.28215-5-peter.maydell@linaro.org | ||
8 | --- | 10 | --- |
9 | include/hw/misc/iotkit-secctl.h | 4 ++++ | 11 | meson.build | 2 ++ |
10 | hw/misc/iotkit-secctl.c | 32 ++++++++++++++++++++++++++------ | 12 | softmmu/arch_init.c | 41 ----------------------------------------- |
11 | 2 files changed, 30 insertions(+), 6 deletions(-) | 13 | 2 files changed, 2 insertions(+), 41 deletions(-) |
12 | 14 | ||
13 | diff --git a/include/hw/misc/iotkit-secctl.h b/include/hw/misc/iotkit-secctl.h | 15 | diff --git a/meson.build b/meson.build |
14 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/include/hw/misc/iotkit-secctl.h | 17 | --- a/meson.build |
16 | +++ b/include/hw/misc/iotkit-secctl.h | 18 | +++ b/meson.build |
17 | @@ -XXX,XX +XXX,XX @@ | 19 | @@ -XXX,XX +XXX,XX @@ foreach target : target_dirs |
18 | * + sysbus MMIO region 1 is the "non-secure privilege control block" registers | 20 | config_target_data.set(k, v) |
19 | * + named GPIO output "sec_resp_cfg" indicating whether blocked accesses | 21 | endif |
20 | * should RAZ/WI or bus error | 22 | endforeach |
21 | + * + named GPIO output "nsc_cfg" whose value tracks the NSCCFG register value | 23 | + config_target_data.set('QEMU_ARCH', |
22 | * Controlling the 2 APB PPCs in the IoTKit: | 24 | + 'QEMU_ARCH_' + config_target['TARGET_BASE_ARCH'].to_upper()) |
23 | * + named GPIO outputs apb_ppc0_nonsec[0..2] and apb_ppc1_nonsec | 25 | config_target_h += {target: configure_file(output: target + '-config-target.h', |
24 | * + named GPIO outputs apb_ppc0_ap[0..2] and apb_ppc1_ap | 26 | configuration: config_target_data)} |
25 | @@ -XXX,XX +XXX,XX @@ struct IoTKitSecCtl { | 27 | |
26 | 28 | diff --git a/softmmu/arch_init.c b/softmmu/arch_init.c | |
27 | /*< public >*/ | ||
28 | qemu_irq sec_resp_cfg; | ||
29 | + qemu_irq nsc_cfg_irq; | ||
30 | |||
31 | MemoryRegion s_regs; | ||
32 | MemoryRegion ns_regs; | ||
33 | @@ -XXX,XX +XXX,XX @@ struct IoTKitSecCtl { | ||
34 | uint32_t secppcintstat; | ||
35 | uint32_t secppcinten; | ||
36 | uint32_t secrespcfg; | ||
37 | + uint32_t nsccfg; | ||
38 | + uint32_t brginten; | ||
39 | |||
40 | IoTKitSecCtlPPC apb[IOTS_NUM_APB_PPC]; | ||
41 | IoTKitSecCtlPPC apbexp[IOTS_NUM_APB_EXP_PPC]; | ||
42 | diff --git a/hw/misc/iotkit-secctl.c b/hw/misc/iotkit-secctl.c | ||
43 | index XXXXXXX..XXXXXXX 100644 | 29 | index XXXXXXX..XXXXXXX 100644 |
44 | --- a/hw/misc/iotkit-secctl.c | 30 | --- a/softmmu/arch_init.c |
45 | +++ b/hw/misc/iotkit-secctl.c | 31 | +++ b/softmmu/arch_init.c |
46 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_s_read(void *opaque, hwaddr addr, | 32 | @@ -XXX,XX +XXX,XX @@ int graphic_height = 600; |
47 | case A_SECRESPCFG: | 33 | int graphic_depth = 32; |
48 | r = s->secrespcfg; | 34 | #endif |
49 | break; | 35 | |
50 | + case A_NSCCFG: | 36 | - |
51 | + r = s->nsccfg; | 37 | -#if defined(TARGET_ALPHA) |
52 | + break; | 38 | -#define QEMU_ARCH QEMU_ARCH_ALPHA |
53 | case A_SECPPCINTSTAT: | 39 | -#elif defined(TARGET_ARM) |
54 | r = s->secppcintstat; | 40 | -#define QEMU_ARCH QEMU_ARCH_ARM |
55 | break; | 41 | -#elif defined(TARGET_CRIS) |
56 | case A_SECPPCINTEN: | 42 | -#define QEMU_ARCH QEMU_ARCH_CRIS |
57 | r = s->secppcinten; | 43 | -#elif defined(TARGET_HPPA) |
58 | break; | 44 | -#define QEMU_ARCH QEMU_ARCH_HPPA |
59 | + case A_BRGINTSTAT: | 45 | -#elif defined(TARGET_I386) |
60 | + /* QEMU's bus fabric can never report errors as it doesn't buffer | 46 | -#define QEMU_ARCH QEMU_ARCH_I386 |
61 | + * writes, so we never report bridge interrupts. | 47 | -#elif defined(TARGET_M68K) |
62 | + */ | 48 | -#define QEMU_ARCH QEMU_ARCH_M68K |
63 | + r = 0; | 49 | -#elif defined(TARGET_MICROBLAZE) |
64 | + break; | 50 | -#define QEMU_ARCH QEMU_ARCH_MICROBLAZE |
65 | + case A_BRGINTEN: | 51 | -#elif defined(TARGET_MIPS) |
66 | + r = s->brginten; | 52 | -#define QEMU_ARCH QEMU_ARCH_MIPS |
67 | + break; | 53 | -#elif defined(TARGET_NIOS2) |
68 | case A_AHBNSPPCEXP0: | 54 | -#define QEMU_ARCH QEMU_ARCH_NIOS2 |
69 | case A_AHBNSPPCEXP1: | 55 | -#elif defined(TARGET_OPENRISC) |
70 | case A_AHBNSPPCEXP2: | 56 | -#define QEMU_ARCH QEMU_ARCH_OPENRISC |
71 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_s_read(void *opaque, hwaddr addr, | 57 | -#elif defined(TARGET_PPC) |
72 | case A_APBSPPPCEXP3: | 58 | -#define QEMU_ARCH QEMU_ARCH_PPC |
73 | r = s->apbexp[offset_to_ppc_idx(offset)].sp; | 59 | -#elif defined(TARGET_RISCV) |
74 | break; | 60 | -#define QEMU_ARCH QEMU_ARCH_RISCV |
75 | - case A_NSCCFG: | 61 | -#elif defined(TARGET_RX) |
76 | case A_SECMPCINTSTATUS: | 62 | -#define QEMU_ARCH QEMU_ARCH_RX |
77 | case A_SECMSCINTSTAT: | 63 | -#elif defined(TARGET_S390X) |
78 | case A_SECMSCINTEN: | 64 | -#define QEMU_ARCH QEMU_ARCH_S390X |
79 | - case A_BRGINTSTAT: | 65 | -#elif defined(TARGET_SH4) |
80 | - case A_BRGINTEN: | 66 | -#define QEMU_ARCH QEMU_ARCH_SH4 |
81 | case A_NSMSCEXP: | 67 | -#elif defined(TARGET_SPARC) |
82 | qemu_log_mask(LOG_UNIMP, | 68 | -#define QEMU_ARCH QEMU_ARCH_SPARC |
83 | "IoTKit SecCtl S block read: " | 69 | -#elif defined(TARGET_TRICORE) |
84 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_s_write(void *opaque, hwaddr addr, | 70 | -#define QEMU_ARCH QEMU_ARCH_TRICORE |
85 | } | 71 | -#elif defined(TARGET_XTENSA) |
86 | 72 | -#define QEMU_ARCH QEMU_ARCH_XTENSA | |
87 | switch (offset) { | 73 | -#elif defined(TARGET_AVR) |
88 | + case A_NSCCFG: | 74 | -#define QEMU_ARCH QEMU_ARCH_AVR |
89 | + s->nsccfg = value & 3; | 75 | -#endif |
90 | + qemu_set_irq(s->nsc_cfg_irq, s->nsccfg); | 76 | - |
91 | + break; | 77 | const uint32_t arch_type = QEMU_ARCH; |
92 | case A_SECRESPCFG: | ||
93 | value &= 1; | ||
94 | s->secrespcfg = value; | ||
95 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_s_write(void *opaque, hwaddr addr, | ||
96 | s->secppcinten = value & 0x00f000f3; | ||
97 | foreach_ppc(s, iotkit_secctl_ppc_update_irq_enable); | ||
98 | break; | ||
99 | + case A_BRGINTCLR: | ||
100 | + break; | ||
101 | + case A_BRGINTEN: | ||
102 | + s->brginten = value & 0xffff0000; | ||
103 | + break; | ||
104 | case A_AHBNSPPCEXP0: | ||
105 | case A_AHBNSPPCEXP1: | ||
106 | case A_AHBNSPPCEXP2: | ||
107 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_s_write(void *opaque, hwaddr addr, | ||
108 | ppc = &s->apbexp[offset_to_ppc_idx(offset)]; | ||
109 | iotkit_secctl_ppc_sp_write(ppc, value); | ||
110 | break; | ||
111 | - case A_NSCCFG: | ||
112 | case A_SECMSCINTCLR: | ||
113 | case A_SECMSCINTEN: | ||
114 | - case A_BRGINTCLR: | ||
115 | - case A_BRGINTEN: | ||
116 | qemu_log_mask(LOG_UNIMP, | ||
117 | "IoTKit SecCtl S block write: " | ||
118 | "unimplemented offset 0x%x\n", offset); | ||
119 | @@ -XXX,XX +XXX,XX @@ static void iotkit_secctl_reset(DeviceState *dev) | ||
120 | s->secppcintstat = 0; | ||
121 | s->secppcinten = 0; | ||
122 | s->secrespcfg = 0; | ||
123 | + s->nsccfg = 0; | ||
124 | + s->brginten = 0; | ||
125 | |||
126 | foreach_ppc(s, iotkit_secctl_reset_ppc); | ||
127 | } | ||
128 | @@ -XXX,XX +XXX,XX @@ static void iotkit_secctl_init(Object *obj) | ||
129 | } | ||
130 | |||
131 | qdev_init_gpio_out_named(dev, &s->sec_resp_cfg, "sec_resp_cfg", 1); | ||
132 | + qdev_init_gpio_out_named(dev, &s->nsc_cfg_irq, "nsc_cfg", 1); | ||
133 | |||
134 | memory_region_init_io(&s->s_regs, obj, &iotkit_secctl_s_ops, | ||
135 | s, "iotkit-secctl-s-regs", 0x1000); | ||
136 | @@ -XXX,XX +XXX,XX @@ static const VMStateDescription iotkit_secctl_vmstate = { | ||
137 | VMSTATE_UINT32(secppcintstat, IoTKitSecCtl), | ||
138 | VMSTATE_UINT32(secppcinten, IoTKitSecCtl), | ||
139 | VMSTATE_UINT32(secrespcfg, IoTKitSecCtl), | ||
140 | + VMSTATE_UINT32(nsccfg, IoTKitSecCtl), | ||
141 | + VMSTATE_UINT32(brginten, IoTKitSecCtl), | ||
142 | VMSTATE_STRUCT_ARRAY(apb, IoTKitSecCtl, IOTS_NUM_APB_PPC, 1, | ||
143 | iotkit_secctl_ppc_vmstate, IoTKitSecCtlPPC), | ||
144 | VMSTATE_STRUCT_ARRAY(apbexp, IoTKitSecCtl, IOTS_NUM_APB_EXP_PPC, 1, | ||
145 | -- | 78 | -- |
146 | 2.16.2 | 79 | 2.20.1 |
147 | 80 | ||
148 | 81 | diff view generated by jsdifflib |
1 | The function qdev_init_gpio_in_named() passes the DeviceState pointer | 1 | When Hexagon was added we forgot to add it to the QEMU_ARCH_* |
---|---|---|---|
2 | as the opaque data pointor for the irq handler function. Usually | 2 | enumeration. This doesn't cause a visible effect because at the |
3 | this is what you want, but in some cases it would be helpful to use | 3 | moment Hexagon is linux-user only and the QEMU_ARCH_* constants are |
4 | some other data pointer. | 4 | only used in softmmu, but we might as well add it in, since it's the |
5 | 5 | only architecture currently missing from the list. | |
6 | Add a new function qdev_init_gpio_in_named_with_opaque() which allows | ||
7 | the caller to specify the data pointer they want. | ||
8 | 6 | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 8 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
11 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
12 | Message-id: 20180220180325.29818-12-peter.maydell@linaro.org | 10 | Reviewed-by: Taylor Simpson <tsimpson@quicinc.com> |
11 | Message-id: 20210730105947.28215-6-peter.maydell@linaro.org | ||
13 | --- | 12 | --- |
14 | include/hw/qdev-core.h | 30 ++++++++++++++++++++++++++++-- | 13 | include/sysemu/arch_init.h | 1 + |
15 | hw/core/qdev.c | 8 +++++--- | 14 | 1 file changed, 1 insertion(+) |
16 | 2 files changed, 33 insertions(+), 5 deletions(-) | ||
17 | 15 | ||
18 | diff --git a/include/hw/qdev-core.h b/include/hw/qdev-core.h | 16 | diff --git a/include/sysemu/arch_init.h b/include/sysemu/arch_init.h |
19 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
20 | --- a/include/hw/qdev-core.h | 18 | --- a/include/sysemu/arch_init.h |
21 | +++ b/include/hw/qdev-core.h | 19 | +++ b/include/sysemu/arch_init.h |
22 | @@ -XXX,XX +XXX,XX @@ BusState *qdev_get_child_bus(DeviceState *dev, const char *name); | 20 | @@ -XXX,XX +XXX,XX @@ enum { |
23 | /* GPIO inputs also double as IRQ sinks. */ | 21 | QEMU_ARCH_RISCV = (1 << 19), |
24 | void qdev_init_gpio_in(DeviceState *dev, qemu_irq_handler handler, int n); | 22 | QEMU_ARCH_RX = (1 << 20), |
25 | void qdev_init_gpio_out(DeviceState *dev, qemu_irq *pins, int n); | 23 | QEMU_ARCH_AVR = (1 << 21), |
26 | -void qdev_init_gpio_in_named(DeviceState *dev, qemu_irq_handler handler, | 24 | + QEMU_ARCH_HEXAGON = (1 << 22), |
27 | - const char *name, int n); | 25 | |
28 | void qdev_init_gpio_out_named(DeviceState *dev, qemu_irq *pins, | 26 | QEMU_ARCH_NONE = (1 << 31), |
29 | const char *name, int n); | 27 | }; |
30 | +/** | ||
31 | + * qdev_init_gpio_in_named_with_opaque: create an array of input GPIO lines | ||
32 | + * for the specified device | ||
33 | + * | ||
34 | + * @dev: Device to create input GPIOs for | ||
35 | + * @handler: Function to call when GPIO line value is set | ||
36 | + * @opaque: Opaque data pointer to pass to @handler | ||
37 | + * @name: Name of the GPIO input (must be unique for this device) | ||
38 | + * @n: Number of GPIO lines in this input set | ||
39 | + */ | ||
40 | +void qdev_init_gpio_in_named_with_opaque(DeviceState *dev, | ||
41 | + qemu_irq_handler handler, | ||
42 | + void *opaque, | ||
43 | + const char *name, int n); | ||
44 | + | ||
45 | +/** | ||
46 | + * qdev_init_gpio_in_named: create an array of input GPIO lines | ||
47 | + * for the specified device | ||
48 | + * | ||
49 | + * Like qdev_init_gpio_in_named_with_opaque(), but the opaque pointer | ||
50 | + * passed to the handler is @dev (which is the most commonly desired behaviour). | ||
51 | + */ | ||
52 | +static inline void qdev_init_gpio_in_named(DeviceState *dev, | ||
53 | + qemu_irq_handler handler, | ||
54 | + const char *name, int n) | ||
55 | +{ | ||
56 | + qdev_init_gpio_in_named_with_opaque(dev, handler, dev, name, n); | ||
57 | +} | ||
58 | |||
59 | void qdev_pass_gpios(DeviceState *dev, DeviceState *container, | ||
60 | const char *name); | ||
61 | diff --git a/hw/core/qdev.c b/hw/core/qdev.c | ||
62 | index XXXXXXX..XXXXXXX 100644 | ||
63 | --- a/hw/core/qdev.c | ||
64 | +++ b/hw/core/qdev.c | ||
65 | @@ -XXX,XX +XXX,XX @@ static NamedGPIOList *qdev_get_named_gpio_list(DeviceState *dev, | ||
66 | return ngl; | ||
67 | } | ||
68 | |||
69 | -void qdev_init_gpio_in_named(DeviceState *dev, qemu_irq_handler handler, | ||
70 | - const char *name, int n) | ||
71 | +void qdev_init_gpio_in_named_with_opaque(DeviceState *dev, | ||
72 | + qemu_irq_handler handler, | ||
73 | + void *opaque, | ||
74 | + const char *name, int n) | ||
75 | { | ||
76 | int i; | ||
77 | NamedGPIOList *gpio_list = qdev_get_named_gpio_list(dev, name); | ||
78 | |||
79 | assert(gpio_list->num_out == 0 || !name); | ||
80 | gpio_list->in = qemu_extend_irqs(gpio_list->in, gpio_list->num_in, handler, | ||
81 | - dev, n); | ||
82 | + opaque, n); | ||
83 | |||
84 | if (!name) { | ||
85 | name = "unnamed-gpio-in"; | ||
86 | -- | 28 | -- |
87 | 2.16.2 | 29 | 2.20.1 |
88 | 30 | ||
89 | 31 | diff view generated by jsdifflib |
1 | The IoTKit Security Controller includes various registers | 1 | The QEMU_ARCH_VIRTIO_* defines are used only in one file, |
---|---|---|---|
2 | that expose to software the controls for the Peripheral | 2 | qdev-monitor.c. Move them to that file. |
3 | Protection Controllers in the system. Implement these. | ||
4 | 3 | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 5 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
7 | Message-id: 20180220180325.29818-17-peter.maydell@linaro.org | 6 | Reviewed-by: Markus Armbruster <armbru@redhat.com> |
7 | Message-id: 20210730105947.28215-7-peter.maydell@linaro.org | ||
8 | --- | 8 | --- |
9 | include/hw/misc/iotkit-secctl.h | 64 +++++++++- | 9 | include/sysemu/arch_init.h | 9 --------- |
10 | hw/misc/iotkit-secctl.c | 270 +++++++++++++++++++++++++++++++++++++--- | 10 | softmmu/qdev-monitor.c | 9 +++++++++ |
11 | 2 files changed, 315 insertions(+), 19 deletions(-) | 11 | 2 files changed, 9 insertions(+), 9 deletions(-) |
12 | 12 | ||
13 | diff --git a/include/hw/misc/iotkit-secctl.h b/include/hw/misc/iotkit-secctl.h | 13 | diff --git a/include/sysemu/arch_init.h b/include/sysemu/arch_init.h |
14 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/include/hw/misc/iotkit-secctl.h | 15 | --- a/include/sysemu/arch_init.h |
16 | +++ b/include/hw/misc/iotkit-secctl.h | 16 | +++ b/include/sysemu/arch_init.h |
17 | @@ -XXX,XX +XXX,XX @@ | 17 | @@ -XXX,XX +XXX,XX @@ enum { |
18 | * QEMU interface: | 18 | |
19 | * + sysbus MMIO region 0 is the "secure privilege control block" registers | 19 | extern const uint32_t arch_type; |
20 | * + sysbus MMIO region 1 is the "non-secure privilege control block" registers | 20 | |
21 | + * + named GPIO output "sec_resp_cfg" indicating whether blocked accesses | 21 | -/* default virtio transport per architecture */ |
22 | + * should RAZ/WI or bus error | 22 | -#define QEMU_ARCH_VIRTIO_PCI (QEMU_ARCH_ALPHA | QEMU_ARCH_ARM | \ |
23 | + * Controlling the 2 APB PPCs in the IoTKit: | 23 | - QEMU_ARCH_HPPA | QEMU_ARCH_I386 | \ |
24 | + * + named GPIO outputs apb_ppc0_nonsec[0..2] and apb_ppc1_nonsec | 24 | - QEMU_ARCH_MIPS | QEMU_ARCH_PPC | \ |
25 | + * + named GPIO outputs apb_ppc0_ap[0..2] and apb_ppc1_ap | 25 | - QEMU_ARCH_RISCV | QEMU_ARCH_SH4 | \ |
26 | + * + named GPIO outputs apb_ppc{0,1}_irq_enable | 26 | - QEMU_ARCH_SPARC | QEMU_ARCH_XTENSA) |
27 | + * + named GPIO outputs apb_ppc{0,1}_irq_clear | 27 | -#define QEMU_ARCH_VIRTIO_CCW (QEMU_ARCH_S390X) |
28 | + * + named GPIO inputs apb_ppc{0,1}_irq_status | 28 | -#define QEMU_ARCH_VIRTIO_MMIO (QEMU_ARCH_M68K) |
29 | + * Controlling each of the 4 expansion APB PPCs which a system using the IoTKit | 29 | - |
30 | + * might provide: | 30 | #endif |
31 | + * + named GPIO outputs apb_ppcexp{0,1,2,3}_nonsec[0..15] | 31 | diff --git a/softmmu/qdev-monitor.c b/softmmu/qdev-monitor.c |
32 | + * + named GPIO outputs apb_ppcexp{0,1,2,3}_ap[0..15] | 32 | index XXXXXXX..XXXXXXX 100644 |
33 | + * + named GPIO outputs apb_ppcexp{0,1,2,3}_irq_enable | 33 | --- a/softmmu/qdev-monitor.c |
34 | + * + named GPIO outputs apb_ppcexp{0,1,2,3}_irq_clear | 34 | +++ b/softmmu/qdev-monitor.c |
35 | + * + named GPIO inputs apb_ppcexp{0,1,2,3}_irq_status | 35 | @@ -XXX,XX +XXX,XX @@ typedef struct QDevAlias |
36 | + * Controlling each of the 4 expansion AHB PPCs which a system using the IoTKit | 36 | uint32_t arch_mask; |
37 | + * might provide: | 37 | } QDevAlias; |
38 | + * + named GPIO outputs ahb_ppcexp{0,1,2,3}_nonsec[0..15] | 38 | |
39 | + * + named GPIO outputs ahb_ppcexp{0,1,2,3}_ap[0..15] | 39 | +/* default virtio transport per architecture */ |
40 | + * + named GPIO outputs ahb_ppcexp{0,1,2,3}_irq_enable | 40 | +#define QEMU_ARCH_VIRTIO_PCI (QEMU_ARCH_ALPHA | QEMU_ARCH_ARM | \ |
41 | + * + named GPIO outputs ahb_ppcexp{0,1,2,3}_irq_clear | 41 | + QEMU_ARCH_HPPA | QEMU_ARCH_I386 | \ |
42 | + * + named GPIO inputs ahb_ppcexp{0,1,2,3}_irq_status | 42 | + QEMU_ARCH_MIPS | QEMU_ARCH_PPC | \ |
43 | */ | 43 | + QEMU_ARCH_RISCV | QEMU_ARCH_SH4 | \ |
44 | 44 | + QEMU_ARCH_SPARC | QEMU_ARCH_XTENSA) | |
45 | #ifndef IOTKIT_SECCTL_H | 45 | +#define QEMU_ARCH_VIRTIO_CCW (QEMU_ARCH_S390X) |
46 | @@ -XXX,XX +XXX,XX @@ | 46 | +#define QEMU_ARCH_VIRTIO_MMIO (QEMU_ARCH_M68K) |
47 | #define TYPE_IOTKIT_SECCTL "iotkit-secctl" | ||
48 | #define IOTKIT_SECCTL(obj) OBJECT_CHECK(IoTKitSecCtl, (obj), TYPE_IOTKIT_SECCTL) | ||
49 | |||
50 | -typedef struct IoTKitSecCtl { | ||
51 | +#define IOTS_APB_PPC0_NUM_PORTS 3 | ||
52 | +#define IOTS_APB_PPC1_NUM_PORTS 1 | ||
53 | +#define IOTS_PPC_NUM_PORTS 16 | ||
54 | +#define IOTS_NUM_APB_PPC 2 | ||
55 | +#define IOTS_NUM_APB_EXP_PPC 4 | ||
56 | +#define IOTS_NUM_AHB_EXP_PPC 4 | ||
57 | + | 47 | + |
58 | +typedef struct IoTKitSecCtl IoTKitSecCtl; | 48 | /* Please keep this table sorted by typename. */ |
59 | + | 49 | static const QDevAlias qdev_alias_table[] = { |
60 | +/* State and IRQ lines relating to a PPC. For the | 50 | { "AC97", "ac97" }, /* -soundhw name */ |
61 | + * PPCs in the IoTKit not all the IRQ lines are used. | ||
62 | + */ | ||
63 | +typedef struct IoTKitSecCtlPPC { | ||
64 | + qemu_irq nonsec[IOTS_PPC_NUM_PORTS]; | ||
65 | + qemu_irq ap[IOTS_PPC_NUM_PORTS]; | ||
66 | + qemu_irq irq_enable; | ||
67 | + qemu_irq irq_clear; | ||
68 | + | ||
69 | + uint32_t ns; | ||
70 | + uint32_t sp; | ||
71 | + uint32_t nsp; | ||
72 | + | ||
73 | + /* Number of ports actually present */ | ||
74 | + int numports; | ||
75 | + /* Offset of this PPC's interrupt bits in SECPPCINTSTAT */ | ||
76 | + int irq_bit_offset; | ||
77 | + IoTKitSecCtl *parent; | ||
78 | +} IoTKitSecCtlPPC; | ||
79 | + | ||
80 | +struct IoTKitSecCtl { | ||
81 | /*< private >*/ | ||
82 | SysBusDevice parent_obj; | ||
83 | |||
84 | /*< public >*/ | ||
85 | + qemu_irq sec_resp_cfg; | ||
86 | |||
87 | MemoryRegion s_regs; | ||
88 | MemoryRegion ns_regs; | ||
89 | -} IoTKitSecCtl; | ||
90 | + | ||
91 | + uint32_t secppcintstat; | ||
92 | + uint32_t secppcinten; | ||
93 | + uint32_t secrespcfg; | ||
94 | + | ||
95 | + IoTKitSecCtlPPC apb[IOTS_NUM_APB_PPC]; | ||
96 | + IoTKitSecCtlPPC apbexp[IOTS_NUM_APB_EXP_PPC]; | ||
97 | + IoTKitSecCtlPPC ahbexp[IOTS_NUM_APB_EXP_PPC]; | ||
98 | +}; | ||
99 | |||
100 | #endif | ||
101 | diff --git a/hw/misc/iotkit-secctl.c b/hw/misc/iotkit-secctl.c | ||
102 | index XXXXXXX..XXXXXXX 100644 | ||
103 | --- a/hw/misc/iotkit-secctl.c | ||
104 | +++ b/hw/misc/iotkit-secctl.c | ||
105 | @@ -XXX,XX +XXX,XX @@ static const uint8_t iotkit_secctl_ns_idregs[] = { | ||
106 | 0x0d, 0xf0, 0x05, 0xb1, | ||
107 | }; | ||
108 | |||
109 | +/* The register sets for the various PPCs (AHB internal, APB internal, | ||
110 | + * AHB expansion, APB expansion) are all set up so that they are | ||
111 | + * in 16-aligned blocks so offsets 0xN0, 0xN4, 0xN8, 0xNC are PPCs | ||
112 | + * 0, 1, 2, 3 of that type, so we can convert a register address offset | ||
113 | + * into an an index into a PPC array easily. | ||
114 | + */ | ||
115 | +static inline int offset_to_ppc_idx(uint32_t offset) | ||
116 | +{ | ||
117 | + return extract32(offset, 2, 2); | ||
118 | +} | ||
119 | + | ||
120 | +typedef void PerPPCFunction(IoTKitSecCtlPPC *ppc); | ||
121 | + | ||
122 | +static void foreach_ppc(IoTKitSecCtl *s, PerPPCFunction *fn) | ||
123 | +{ | ||
124 | + int i; | ||
125 | + | ||
126 | + for (i = 0; i < IOTS_NUM_APB_PPC; i++) { | ||
127 | + fn(&s->apb[i]); | ||
128 | + } | ||
129 | + for (i = 0; i < IOTS_NUM_APB_EXP_PPC; i++) { | ||
130 | + fn(&s->apbexp[i]); | ||
131 | + } | ||
132 | + for (i = 0; i < IOTS_NUM_AHB_EXP_PPC; i++) { | ||
133 | + fn(&s->ahbexp[i]); | ||
134 | + } | ||
135 | +} | ||
136 | + | ||
137 | static MemTxResult iotkit_secctl_s_read(void *opaque, hwaddr addr, | ||
138 | uint64_t *pdata, | ||
139 | unsigned size, MemTxAttrs attrs) | ||
140 | { | ||
141 | uint64_t r; | ||
142 | uint32_t offset = addr & ~0x3; | ||
143 | + IoTKitSecCtl *s = IOTKIT_SECCTL(opaque); | ||
144 | |||
145 | switch (offset) { | ||
146 | case A_AHBNSPPC0: | ||
147 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_s_read(void *opaque, hwaddr addr, | ||
148 | r = 0; | ||
149 | break; | ||
150 | case A_SECRESPCFG: | ||
151 | - case A_NSCCFG: | ||
152 | - case A_SECMPCINTSTATUS: | ||
153 | + r = s->secrespcfg; | ||
154 | + break; | ||
155 | case A_SECPPCINTSTAT: | ||
156 | + r = s->secppcintstat; | ||
157 | + break; | ||
158 | case A_SECPPCINTEN: | ||
159 | - case A_SECMSCINTSTAT: | ||
160 | - case A_SECMSCINTEN: | ||
161 | - case A_BRGINTSTAT: | ||
162 | - case A_BRGINTEN: | ||
163 | + r = s->secppcinten; | ||
164 | + break; | ||
165 | case A_AHBNSPPCEXP0: | ||
166 | case A_AHBNSPPCEXP1: | ||
167 | case A_AHBNSPPCEXP2: | ||
168 | case A_AHBNSPPCEXP3: | ||
169 | + r = s->ahbexp[offset_to_ppc_idx(offset)].ns; | ||
170 | + break; | ||
171 | case A_APBNSPPC0: | ||
172 | case A_APBNSPPC1: | ||
173 | + r = s->apb[offset_to_ppc_idx(offset)].ns; | ||
174 | + break; | ||
175 | case A_APBNSPPCEXP0: | ||
176 | case A_APBNSPPCEXP1: | ||
177 | case A_APBNSPPCEXP2: | ||
178 | case A_APBNSPPCEXP3: | ||
179 | + r = s->apbexp[offset_to_ppc_idx(offset)].ns; | ||
180 | + break; | ||
181 | case A_AHBSPPPCEXP0: | ||
182 | case A_AHBSPPPCEXP1: | ||
183 | case A_AHBSPPPCEXP2: | ||
184 | case A_AHBSPPPCEXP3: | ||
185 | + r = s->apbexp[offset_to_ppc_idx(offset)].sp; | ||
186 | + break; | ||
187 | case A_APBSPPPC0: | ||
188 | case A_APBSPPPC1: | ||
189 | + r = s->apb[offset_to_ppc_idx(offset)].sp; | ||
190 | + break; | ||
191 | case A_APBSPPPCEXP0: | ||
192 | case A_APBSPPPCEXP1: | ||
193 | case A_APBSPPPCEXP2: | ||
194 | case A_APBSPPPCEXP3: | ||
195 | + r = s->apbexp[offset_to_ppc_idx(offset)].sp; | ||
196 | + break; | ||
197 | + case A_NSCCFG: | ||
198 | + case A_SECMPCINTSTATUS: | ||
199 | + case A_SECMSCINTSTAT: | ||
200 | + case A_SECMSCINTEN: | ||
201 | + case A_BRGINTSTAT: | ||
202 | + case A_BRGINTEN: | ||
203 | case A_NSMSCEXP: | ||
204 | qemu_log_mask(LOG_UNIMP, | ||
205 | "IoTKit SecCtl S block read: " | ||
206 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_s_read(void *opaque, hwaddr addr, | ||
207 | return MEMTX_OK; | ||
208 | } | ||
209 | |||
210 | +static void iotkit_secctl_update_ppc_ap(IoTKitSecCtlPPC *ppc) | ||
211 | +{ | ||
212 | + int i; | ||
213 | + | ||
214 | + for (i = 0; i < ppc->numports; i++) { | ||
215 | + bool v; | ||
216 | + | ||
217 | + if (extract32(ppc->ns, i, 1)) { | ||
218 | + v = extract32(ppc->nsp, i, 1); | ||
219 | + } else { | ||
220 | + v = extract32(ppc->sp, i, 1); | ||
221 | + } | ||
222 | + qemu_set_irq(ppc->ap[i], v); | ||
223 | + } | ||
224 | +} | ||
225 | + | ||
226 | +static void iotkit_secctl_ppc_ns_write(IoTKitSecCtlPPC *ppc, uint32_t value) | ||
227 | +{ | ||
228 | + int i; | ||
229 | + | ||
230 | + ppc->ns = value & MAKE_64BIT_MASK(0, ppc->numports); | ||
231 | + for (i = 0; i < ppc->numports; i++) { | ||
232 | + qemu_set_irq(ppc->nonsec[i], extract32(ppc->ns, i, 1)); | ||
233 | + } | ||
234 | + iotkit_secctl_update_ppc_ap(ppc); | ||
235 | +} | ||
236 | + | ||
237 | +static void iotkit_secctl_ppc_sp_write(IoTKitSecCtlPPC *ppc, uint32_t value) | ||
238 | +{ | ||
239 | + ppc->sp = value & MAKE_64BIT_MASK(0, ppc->numports); | ||
240 | + iotkit_secctl_update_ppc_ap(ppc); | ||
241 | +} | ||
242 | + | ||
243 | +static void iotkit_secctl_ppc_nsp_write(IoTKitSecCtlPPC *ppc, uint32_t value) | ||
244 | +{ | ||
245 | + ppc->nsp = value & MAKE_64BIT_MASK(0, ppc->numports); | ||
246 | + iotkit_secctl_update_ppc_ap(ppc); | ||
247 | +} | ||
248 | + | ||
249 | +static void iotkit_secctl_ppc_update_irq_clear(IoTKitSecCtlPPC *ppc) | ||
250 | +{ | ||
251 | + uint32_t value = ppc->parent->secppcintstat; | ||
252 | + | ||
253 | + qemu_set_irq(ppc->irq_clear, extract32(value, ppc->irq_bit_offset, 1)); | ||
254 | +} | ||
255 | + | ||
256 | +static void iotkit_secctl_ppc_update_irq_enable(IoTKitSecCtlPPC *ppc) | ||
257 | +{ | ||
258 | + uint32_t value = ppc->parent->secppcinten; | ||
259 | + | ||
260 | + qemu_set_irq(ppc->irq_enable, extract32(value, ppc->irq_bit_offset, 1)); | ||
261 | +} | ||
262 | + | ||
263 | static MemTxResult iotkit_secctl_s_write(void *opaque, hwaddr addr, | ||
264 | uint64_t value, | ||
265 | unsigned size, MemTxAttrs attrs) | ||
266 | { | ||
267 | + IoTKitSecCtl *s = IOTKIT_SECCTL(opaque); | ||
268 | uint32_t offset = addr; | ||
269 | + IoTKitSecCtlPPC *ppc; | ||
270 | |||
271 | trace_iotkit_secctl_s_write(offset, value, size); | ||
272 | |||
273 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_s_write(void *opaque, hwaddr addr, | ||
274 | |||
275 | switch (offset) { | ||
276 | case A_SECRESPCFG: | ||
277 | - case A_NSCCFG: | ||
278 | + value &= 1; | ||
279 | + s->secrespcfg = value; | ||
280 | + qemu_set_irq(s->sec_resp_cfg, s->secrespcfg); | ||
281 | + break; | ||
282 | case A_SECPPCINTCLR: | ||
283 | + value &= 0x00f000f3; | ||
284 | + foreach_ppc(s, iotkit_secctl_ppc_update_irq_clear); | ||
285 | + break; | ||
286 | case A_SECPPCINTEN: | ||
287 | - case A_SECMSCINTCLR: | ||
288 | - case A_SECMSCINTEN: | ||
289 | - case A_BRGINTCLR: | ||
290 | - case A_BRGINTEN: | ||
291 | + s->secppcinten = value & 0x00f000f3; | ||
292 | + foreach_ppc(s, iotkit_secctl_ppc_update_irq_enable); | ||
293 | + break; | ||
294 | case A_AHBNSPPCEXP0: | ||
295 | case A_AHBNSPPCEXP1: | ||
296 | case A_AHBNSPPCEXP2: | ||
297 | case A_AHBNSPPCEXP3: | ||
298 | + ppc = &s->ahbexp[offset_to_ppc_idx(offset)]; | ||
299 | + iotkit_secctl_ppc_ns_write(ppc, value); | ||
300 | + break; | ||
301 | case A_APBNSPPC0: | ||
302 | case A_APBNSPPC1: | ||
303 | + ppc = &s->apb[offset_to_ppc_idx(offset)]; | ||
304 | + iotkit_secctl_ppc_ns_write(ppc, value); | ||
305 | + break; | ||
306 | case A_APBNSPPCEXP0: | ||
307 | case A_APBNSPPCEXP1: | ||
308 | case A_APBNSPPCEXP2: | ||
309 | case A_APBNSPPCEXP3: | ||
310 | + ppc = &s->apbexp[offset_to_ppc_idx(offset)]; | ||
311 | + iotkit_secctl_ppc_ns_write(ppc, value); | ||
312 | + break; | ||
313 | case A_AHBSPPPCEXP0: | ||
314 | case A_AHBSPPPCEXP1: | ||
315 | case A_AHBSPPPCEXP2: | ||
316 | case A_AHBSPPPCEXP3: | ||
317 | + ppc = &s->ahbexp[offset_to_ppc_idx(offset)]; | ||
318 | + iotkit_secctl_ppc_sp_write(ppc, value); | ||
319 | + break; | ||
320 | case A_APBSPPPC0: | ||
321 | case A_APBSPPPC1: | ||
322 | + ppc = &s->apb[offset_to_ppc_idx(offset)]; | ||
323 | + iotkit_secctl_ppc_sp_write(ppc, value); | ||
324 | + break; | ||
325 | case A_APBSPPPCEXP0: | ||
326 | case A_APBSPPPCEXP1: | ||
327 | case A_APBSPPPCEXP2: | ||
328 | case A_APBSPPPCEXP3: | ||
329 | + ppc = &s->apbexp[offset_to_ppc_idx(offset)]; | ||
330 | + iotkit_secctl_ppc_sp_write(ppc, value); | ||
331 | + break; | ||
332 | + case A_NSCCFG: | ||
333 | + case A_SECMSCINTCLR: | ||
334 | + case A_SECMSCINTEN: | ||
335 | + case A_BRGINTCLR: | ||
336 | + case A_BRGINTEN: | ||
337 | qemu_log_mask(LOG_UNIMP, | ||
338 | "IoTKit SecCtl S block write: " | ||
339 | "unimplemented offset 0x%x\n", offset); | ||
340 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_ns_read(void *opaque, hwaddr addr, | ||
341 | uint64_t *pdata, | ||
342 | unsigned size, MemTxAttrs attrs) | ||
343 | { | ||
344 | + IoTKitSecCtl *s = IOTKIT_SECCTL(opaque); | ||
345 | uint64_t r; | ||
346 | uint32_t offset = addr & ~0x3; | ||
347 | |||
348 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_ns_read(void *opaque, hwaddr addr, | ||
349 | case A_AHBNSPPPCEXP1: | ||
350 | case A_AHBNSPPPCEXP2: | ||
351 | case A_AHBNSPPPCEXP3: | ||
352 | + r = s->ahbexp[offset_to_ppc_idx(offset)].nsp; | ||
353 | + break; | ||
354 | case A_APBNSPPPC0: | ||
355 | case A_APBNSPPPC1: | ||
356 | + r = s->apb[offset_to_ppc_idx(offset)].nsp; | ||
357 | + break; | ||
358 | case A_APBNSPPPCEXP0: | ||
359 | case A_APBNSPPPCEXP1: | ||
360 | case A_APBNSPPPCEXP2: | ||
361 | case A_APBNSPPPCEXP3: | ||
362 | - qemu_log_mask(LOG_UNIMP, | ||
363 | - "IoTKit SecCtl NS block read: " | ||
364 | - "unimplemented offset 0x%x\n", offset); | ||
365 | + r = s->apbexp[offset_to_ppc_idx(offset)].nsp; | ||
366 | break; | ||
367 | case A_PID4: | ||
368 | case A_PID5: | ||
369 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_ns_write(void *opaque, hwaddr addr, | ||
370 | uint64_t value, | ||
371 | unsigned size, MemTxAttrs attrs) | ||
372 | { | ||
373 | + IoTKitSecCtl *s = IOTKIT_SECCTL(opaque); | ||
374 | uint32_t offset = addr; | ||
375 | + IoTKitSecCtlPPC *ppc; | ||
376 | |||
377 | trace_iotkit_secctl_ns_write(offset, value, size); | ||
378 | |||
379 | @@ -XXX,XX +XXX,XX @@ static MemTxResult iotkit_secctl_ns_write(void *opaque, hwaddr addr, | ||
380 | case A_AHBNSPPPCEXP1: | ||
381 | case A_AHBNSPPPCEXP2: | ||
382 | case A_AHBNSPPPCEXP3: | ||
383 | + ppc = &s->ahbexp[offset_to_ppc_idx(offset)]; | ||
384 | + iotkit_secctl_ppc_nsp_write(ppc, value); | ||
385 | + break; | ||
386 | case A_APBNSPPPC0: | ||
387 | case A_APBNSPPPC1: | ||
388 | + ppc = &s->apb[offset_to_ppc_idx(offset)]; | ||
389 | + iotkit_secctl_ppc_nsp_write(ppc, value); | ||
390 | + break; | ||
391 | case A_APBNSPPPCEXP0: | ||
392 | case A_APBNSPPPCEXP1: | ||
393 | case A_APBNSPPPCEXP2: | ||
394 | case A_APBNSPPPCEXP3: | ||
395 | - qemu_log_mask(LOG_UNIMP, | ||
396 | - "IoTKit SecCtl NS block write: " | ||
397 | - "unimplemented offset 0x%x\n", offset); | ||
398 | + ppc = &s->apbexp[offset_to_ppc_idx(offset)]; | ||
399 | + iotkit_secctl_ppc_nsp_write(ppc, value); | ||
400 | break; | ||
401 | case A_AHBNSPPPC0: | ||
402 | case A_PID4: | ||
403 | @@ -XXX,XX +XXX,XX @@ static const MemoryRegionOps iotkit_secctl_ns_ops = { | ||
404 | .impl.max_access_size = 4, | ||
405 | }; | ||
406 | |||
407 | +static void iotkit_secctl_reset_ppc(IoTKitSecCtlPPC *ppc) | ||
408 | +{ | ||
409 | + ppc->ns = 0; | ||
410 | + ppc->sp = 0; | ||
411 | + ppc->nsp = 0; | ||
412 | +} | ||
413 | + | ||
414 | static void iotkit_secctl_reset(DeviceState *dev) | ||
415 | { | ||
416 | + IoTKitSecCtl *s = IOTKIT_SECCTL(dev); | ||
417 | |||
418 | + s->secppcintstat = 0; | ||
419 | + s->secppcinten = 0; | ||
420 | + s->secrespcfg = 0; | ||
421 | + | ||
422 | + foreach_ppc(s, iotkit_secctl_reset_ppc); | ||
423 | +} | ||
424 | + | ||
425 | +static void iotkit_secctl_ppc_irqstatus(void *opaque, int n, int level) | ||
426 | +{ | ||
427 | + IoTKitSecCtlPPC *ppc = opaque; | ||
428 | + IoTKitSecCtl *s = IOTKIT_SECCTL(ppc->parent); | ||
429 | + int irqbit = ppc->irq_bit_offset + n; | ||
430 | + | ||
431 | + s->secppcintstat = deposit32(s->secppcintstat, irqbit, 1, level); | ||
432 | +} | ||
433 | + | ||
434 | +static void iotkit_secctl_init_ppc(IoTKitSecCtl *s, | ||
435 | + IoTKitSecCtlPPC *ppc, | ||
436 | + const char *name, | ||
437 | + int numports, | ||
438 | + int irq_bit_offset) | ||
439 | +{ | ||
440 | + char *gpioname; | ||
441 | + DeviceState *dev = DEVICE(s); | ||
442 | + | ||
443 | + ppc->numports = numports; | ||
444 | + ppc->irq_bit_offset = irq_bit_offset; | ||
445 | + ppc->parent = s; | ||
446 | + | ||
447 | + gpioname = g_strdup_printf("%s_nonsec", name); | ||
448 | + qdev_init_gpio_out_named(dev, ppc->nonsec, gpioname, numports); | ||
449 | + g_free(gpioname); | ||
450 | + gpioname = g_strdup_printf("%s_ap", name); | ||
451 | + qdev_init_gpio_out_named(dev, ppc->ap, gpioname, numports); | ||
452 | + g_free(gpioname); | ||
453 | + gpioname = g_strdup_printf("%s_irq_enable", name); | ||
454 | + qdev_init_gpio_out_named(dev, &ppc->irq_enable, gpioname, 1); | ||
455 | + g_free(gpioname); | ||
456 | + gpioname = g_strdup_printf("%s_irq_clear", name); | ||
457 | + qdev_init_gpio_out_named(dev, &ppc->irq_clear, gpioname, 1); | ||
458 | + g_free(gpioname); | ||
459 | + gpioname = g_strdup_printf("%s_irq_status", name); | ||
460 | + qdev_init_gpio_in_named_with_opaque(dev, iotkit_secctl_ppc_irqstatus, | ||
461 | + ppc, gpioname, 1); | ||
462 | + g_free(gpioname); | ||
463 | } | ||
464 | |||
465 | static void iotkit_secctl_init(Object *obj) | ||
466 | { | ||
467 | IoTKitSecCtl *s = IOTKIT_SECCTL(obj); | ||
468 | SysBusDevice *sbd = SYS_BUS_DEVICE(obj); | ||
469 | + DeviceState *dev = DEVICE(obj); | ||
470 | + int i; | ||
471 | + | ||
472 | + iotkit_secctl_init_ppc(s, &s->apb[0], "apb_ppc0", | ||
473 | + IOTS_APB_PPC0_NUM_PORTS, 0); | ||
474 | + iotkit_secctl_init_ppc(s, &s->apb[1], "apb_ppc1", | ||
475 | + IOTS_APB_PPC1_NUM_PORTS, 1); | ||
476 | + | ||
477 | + for (i = 0; i < IOTS_NUM_APB_EXP_PPC; i++) { | ||
478 | + IoTKitSecCtlPPC *ppc = &s->apbexp[i]; | ||
479 | + char *ppcname = g_strdup_printf("apb_ppcexp%d", i); | ||
480 | + iotkit_secctl_init_ppc(s, ppc, ppcname, IOTS_PPC_NUM_PORTS, 4 + i); | ||
481 | + g_free(ppcname); | ||
482 | + } | ||
483 | + for (i = 0; i < IOTS_NUM_AHB_EXP_PPC; i++) { | ||
484 | + IoTKitSecCtlPPC *ppc = &s->ahbexp[i]; | ||
485 | + char *ppcname = g_strdup_printf("ahb_ppcexp%d", i); | ||
486 | + iotkit_secctl_init_ppc(s, ppc, ppcname, IOTS_PPC_NUM_PORTS, 20 + i); | ||
487 | + g_free(ppcname); | ||
488 | + } | ||
489 | + | ||
490 | + qdev_init_gpio_out_named(dev, &s->sec_resp_cfg, "sec_resp_cfg", 1); | ||
491 | |||
492 | memory_region_init_io(&s->s_regs, obj, &iotkit_secctl_s_ops, | ||
493 | s, "iotkit-secctl-s-regs", 0x1000); | ||
494 | @@ -XXX,XX +XXX,XX @@ static void iotkit_secctl_init(Object *obj) | ||
495 | sysbus_init_mmio(sbd, &s->ns_regs); | ||
496 | } | ||
497 | |||
498 | +static const VMStateDescription iotkit_secctl_ppc_vmstate = { | ||
499 | + .name = "iotkit-secctl-ppc", | ||
500 | + .version_id = 1, | ||
501 | + .minimum_version_id = 1, | ||
502 | + .fields = (VMStateField[]) { | ||
503 | + VMSTATE_UINT32(ns, IoTKitSecCtlPPC), | ||
504 | + VMSTATE_UINT32(sp, IoTKitSecCtlPPC), | ||
505 | + VMSTATE_UINT32(nsp, IoTKitSecCtlPPC), | ||
506 | + VMSTATE_END_OF_LIST() | ||
507 | + } | ||
508 | +}; | ||
509 | + | ||
510 | static const VMStateDescription iotkit_secctl_vmstate = { | ||
511 | .name = "iotkit-secctl", | ||
512 | .version_id = 1, | ||
513 | .minimum_version_id = 1, | ||
514 | .fields = (VMStateField[]) { | ||
515 | + VMSTATE_UINT32(secppcintstat, IoTKitSecCtl), | ||
516 | + VMSTATE_UINT32(secppcinten, IoTKitSecCtl), | ||
517 | + VMSTATE_UINT32(secrespcfg, IoTKitSecCtl), | ||
518 | + VMSTATE_STRUCT_ARRAY(apb, IoTKitSecCtl, IOTS_NUM_APB_PPC, 1, | ||
519 | + iotkit_secctl_ppc_vmstate, IoTKitSecCtlPPC), | ||
520 | + VMSTATE_STRUCT_ARRAY(apbexp, IoTKitSecCtl, IOTS_NUM_APB_EXP_PPC, 1, | ||
521 | + iotkit_secctl_ppc_vmstate, IoTKitSecCtlPPC), | ||
522 | + VMSTATE_STRUCT_ARRAY(ahbexp, IoTKitSecCtl, IOTS_NUM_AHB_EXP_PPC, 1, | ||
523 | + iotkit_secctl_ppc_vmstate, IoTKitSecCtlPPC), | ||
524 | VMSTATE_END_OF_LIST() | ||
525 | } | ||
526 | }; | ||
527 | -- | 51 | -- |
528 | 2.16.2 | 52 | 2.20.1 |
529 | 53 | ||
530 | 54 | diff view generated by jsdifflib |
1 | Move the definition of the struct for the unimplemented-device | 1 | arch_init.h only defines the QEMU_ARCH_* enumeration and the |
---|---|---|---|
2 | from unimp.c to unimp.h, so that users can embed the struct | 2 | arch_type global. Don't include it in files that don't use those. |
3 | in their own device structs if they prefer. | ||
4 | 3 | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
6 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 5 | Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
8 | Message-id: 20180220180325.29818-10-peter.maydell@linaro.org | 7 | Reviewed-by: Alistair Francis <alistair.francis@wdc.com> |
8 | Message-id: 20210730105947.28215-8-peter.maydell@linaro.org | ||
9 | --- | 9 | --- |
10 | include/hw/misc/unimp.h | 10 ++++++++++ | 10 | blockdev.c | 1 - |
11 | hw/misc/unimp.c | 10 ---------- | 11 | hw/i386/pc.c | 1 - |
12 | 2 files changed, 10 insertions(+), 10 deletions(-) | 12 | hw/i386/pc_piix.c | 1 - |
13 | hw/i386/pc_q35.c | 1 - | ||
14 | hw/mips/jazz.c | 1 - | ||
15 | hw/mips/malta.c | 1 - | ||
16 | hw/ppc/prep.c | 1 - | ||
17 | hw/riscv/sifive_e.c | 1 - | ||
18 | hw/riscv/sifive_u.c | 1 - | ||
19 | hw/riscv/spike.c | 1 - | ||
20 | hw/riscv/virt.c | 1 - | ||
21 | monitor/qmp-cmds.c | 1 - | ||
22 | target/ppc/cpu_init.c | 1 - | ||
23 | target/s390x/cpu-sysemu.c | 1 - | ||
24 | 14 files changed, 14 deletions(-) | ||
13 | 25 | ||
14 | diff --git a/include/hw/misc/unimp.h b/include/hw/misc/unimp.h | 26 | diff --git a/blockdev.c b/blockdev.c |
15 | index XXXXXXX..XXXXXXX 100644 | 27 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/include/hw/misc/unimp.h | 28 | --- a/blockdev.c |
17 | +++ b/include/hw/misc/unimp.h | 29 | +++ b/blockdev.c |
18 | @@ -XXX,XX +XXX,XX @@ | 30 | @@ -XXX,XX +XXX,XX @@ |
19 | 31 | #include "sysemu/iothread.h" | |
20 | #define TYPE_UNIMPLEMENTED_DEVICE "unimplemented-device" | 32 | #include "block/block_int.h" |
21 | 33 | #include "block/trace.h" | |
22 | +#define UNIMPLEMENTED_DEVICE(obj) \ | 34 | -#include "sysemu/arch_init.h" |
23 | + OBJECT_CHECK(UnimplementedDeviceState, (obj), TYPE_UNIMPLEMENTED_DEVICE) | 35 | #include "sysemu/runstate.h" |
24 | + | 36 | #include "sysemu/replay.h" |
25 | +typedef struct { | 37 | #include "qemu/cutils.h" |
26 | + SysBusDevice parent_obj; | 38 | diff --git a/hw/i386/pc.c b/hw/i386/pc.c |
27 | + MemoryRegion iomem; | ||
28 | + char *name; | ||
29 | + uint64_t size; | ||
30 | +} UnimplementedDeviceState; | ||
31 | + | ||
32 | /** | ||
33 | * create_unimplemented_device: create and map a dummy device | ||
34 | * @name: name of the device for debug logging | ||
35 | diff --git a/hw/misc/unimp.c b/hw/misc/unimp.c | ||
36 | index XXXXXXX..XXXXXXX 100644 | 39 | index XXXXXXX..XXXXXXX 100644 |
37 | --- a/hw/misc/unimp.c | 40 | --- a/hw/i386/pc.c |
38 | +++ b/hw/misc/unimp.c | 41 | +++ b/hw/i386/pc.c |
39 | @@ -XXX,XX +XXX,XX @@ | 42 | @@ -XXX,XX +XXX,XX @@ |
43 | #include "hw/xen/start_info.h" | ||
44 | #include "ui/qemu-spice.h" | ||
45 | #include "exec/memory.h" | ||
46 | -#include "sysemu/arch_init.h" | ||
47 | #include "qemu/bitmap.h" | ||
48 | #include "qemu/config-file.h" | ||
49 | #include "qemu/error-report.h" | ||
50 | diff --git a/hw/i386/pc_piix.c b/hw/i386/pc_piix.c | ||
51 | index XXXXXXX..XXXXXXX 100644 | ||
52 | --- a/hw/i386/pc_piix.c | ||
53 | +++ b/hw/i386/pc_piix.c | ||
54 | @@ -XXX,XX +XXX,XX @@ | ||
55 | #include "sysemu/kvm.h" | ||
56 | #include "hw/kvm/clock.h" | ||
57 | #include "hw/sysbus.h" | ||
58 | -#include "sysemu/arch_init.h" | ||
59 | #include "hw/i2c/smbus_eeprom.h" | ||
60 | #include "hw/xen/xen-x86.h" | ||
61 | #include "exec/memory.h" | ||
62 | diff --git a/hw/i386/pc_q35.c b/hw/i386/pc_q35.c | ||
63 | index XXXXXXX..XXXXXXX 100644 | ||
64 | --- a/hw/i386/pc_q35.c | ||
65 | +++ b/hw/i386/pc_q35.c | ||
66 | @@ -XXX,XX +XXX,XX @@ | ||
67 | #include "qemu/osdep.h" | ||
68 | #include "qemu/units.h" | ||
69 | #include "hw/loader.h" | ||
70 | -#include "sysemu/arch_init.h" | ||
71 | #include "hw/i2c/smbus_eeprom.h" | ||
72 | #include "hw/rtc/mc146818rtc.h" | ||
73 | #include "sysemu/kvm.h" | ||
74 | diff --git a/hw/mips/jazz.c b/hw/mips/jazz.c | ||
75 | index XXXXXXX..XXXXXXX 100644 | ||
76 | --- a/hw/mips/jazz.c | ||
77 | +++ b/hw/mips/jazz.c | ||
78 | @@ -XXX,XX +XXX,XX @@ | ||
79 | #include "hw/isa/isa.h" | ||
80 | #include "hw/block/fdc.h" | ||
81 | #include "sysemu/sysemu.h" | ||
82 | -#include "sysemu/arch_init.h" | ||
83 | #include "hw/boards.h" | ||
84 | #include "net/net.h" | ||
85 | #include "hw/scsi/esp.h" | ||
86 | diff --git a/hw/mips/malta.c b/hw/mips/malta.c | ||
87 | index XXXXXXX..XXXXXXX 100644 | ||
88 | --- a/hw/mips/malta.c | ||
89 | +++ b/hw/mips/malta.c | ||
90 | @@ -XXX,XX +XXX,XX @@ | ||
91 | #include "hw/mips/mips.h" | ||
92 | #include "hw/mips/cpudevs.h" | ||
93 | #include "hw/pci/pci.h" | ||
94 | -#include "sysemu/arch_init.h" | ||
40 | #include "qemu/log.h" | 95 | #include "qemu/log.h" |
96 | #include "hw/mips/bios.h" | ||
97 | #include "hw/ide.h" | ||
98 | diff --git a/hw/ppc/prep.c b/hw/ppc/prep.c | ||
99 | index XXXXXXX..XXXXXXX 100644 | ||
100 | --- a/hw/ppc/prep.c | ||
101 | +++ b/hw/ppc/prep.c | ||
102 | @@ -XXX,XX +XXX,XX @@ | ||
103 | #include "hw/rtc/mc146818rtc.h" | ||
104 | #include "hw/isa/pc87312.h" | ||
105 | #include "hw/qdev-properties.h" | ||
106 | -#include "sysemu/arch_init.h" | ||
107 | #include "sysemu/kvm.h" | ||
108 | #include "sysemu/reset.h" | ||
109 | #include "trace.h" | ||
110 | diff --git a/hw/riscv/sifive_e.c b/hw/riscv/sifive_e.c | ||
111 | index XXXXXXX..XXXXXXX 100644 | ||
112 | --- a/hw/riscv/sifive_e.c | ||
113 | +++ b/hw/riscv/sifive_e.c | ||
114 | @@ -XXX,XX +XXX,XX @@ | ||
115 | #include "hw/intc/sifive_plic.h" | ||
116 | #include "hw/misc/sifive_e_prci.h" | ||
117 | #include "chardev/char.h" | ||
118 | -#include "sysemu/arch_init.h" | ||
119 | #include "sysemu/sysemu.h" | ||
120 | |||
121 | static const MemMapEntry sifive_e_memmap[] = { | ||
122 | diff --git a/hw/riscv/sifive_u.c b/hw/riscv/sifive_u.c | ||
123 | index XXXXXXX..XXXXXXX 100644 | ||
124 | --- a/hw/riscv/sifive_u.c | ||
125 | +++ b/hw/riscv/sifive_u.c | ||
126 | @@ -XXX,XX +XXX,XX @@ | ||
127 | #include "hw/intc/sifive_plic.h" | ||
128 | #include "chardev/char.h" | ||
129 | #include "net/eth.h" | ||
130 | -#include "sysemu/arch_init.h" | ||
131 | #include "sysemu/device_tree.h" | ||
132 | #include "sysemu/runstate.h" | ||
133 | #include "sysemu/sysemu.h" | ||
134 | diff --git a/hw/riscv/spike.c b/hw/riscv/spike.c | ||
135 | index XXXXXXX..XXXXXXX 100644 | ||
136 | --- a/hw/riscv/spike.c | ||
137 | +++ b/hw/riscv/spike.c | ||
138 | @@ -XXX,XX +XXX,XX @@ | ||
139 | #include "hw/char/riscv_htif.h" | ||
140 | #include "hw/intc/sifive_clint.h" | ||
141 | #include "chardev/char.h" | ||
142 | -#include "sysemu/arch_init.h" | ||
143 | #include "sysemu/device_tree.h" | ||
144 | #include "sysemu/sysemu.h" | ||
145 | |||
146 | diff --git a/hw/riscv/virt.c b/hw/riscv/virt.c | ||
147 | index XXXXXXX..XXXXXXX 100644 | ||
148 | --- a/hw/riscv/virt.c | ||
149 | +++ b/hw/riscv/virt.c | ||
150 | @@ -XXX,XX +XXX,XX @@ | ||
151 | #include "hw/intc/sifive_plic.h" | ||
152 | #include "hw/misc/sifive_test.h" | ||
153 | #include "chardev/char.h" | ||
154 | -#include "sysemu/arch_init.h" | ||
155 | #include "sysemu/device_tree.h" | ||
156 | #include "sysemu/sysemu.h" | ||
157 | #include "hw/pci/pci.h" | ||
158 | diff --git a/monitor/qmp-cmds.c b/monitor/qmp-cmds.c | ||
159 | index XXXXXXX..XXXXXXX 100644 | ||
160 | --- a/monitor/qmp-cmds.c | ||
161 | +++ b/monitor/qmp-cmds.c | ||
162 | @@ -XXX,XX +XXX,XX @@ | ||
163 | #include "sysemu/kvm.h" | ||
164 | #include "sysemu/runstate.h" | ||
165 | #include "sysemu/runstate-action.h" | ||
166 | -#include "sysemu/arch_init.h" | ||
167 | #include "sysemu/blockdev.h" | ||
168 | #include "sysemu/block-backend.h" | ||
41 | #include "qapi/error.h" | 169 | #include "qapi/error.h" |
42 | 170 | diff --git a/target/ppc/cpu_init.c b/target/ppc/cpu_init.c | |
43 | -#define UNIMPLEMENTED_DEVICE(obj) \ | 171 | index XXXXXXX..XXXXXXX 100644 |
44 | - OBJECT_CHECK(UnimplementedDeviceState, (obj), TYPE_UNIMPLEMENTED_DEVICE) | 172 | --- a/target/ppc/cpu_init.c |
45 | - | 173 | +++ b/target/ppc/cpu_init.c |
46 | -typedef struct { | 174 | @@ -XXX,XX +XXX,XX @@ |
47 | - SysBusDevice parent_obj; | 175 | #include "disas/dis-asm.h" |
48 | - MemoryRegion iomem; | 176 | #include "exec/gdbstub.h" |
49 | - char *name; | 177 | #include "kvm_ppc.h" |
50 | - uint64_t size; | 178 | -#include "sysemu/arch_init.h" |
51 | -} UnimplementedDeviceState; | 179 | #include "sysemu/cpus.h" |
52 | - | 180 | #include "sysemu/hw_accel.h" |
53 | static uint64_t unimp_read(void *opaque, hwaddr offset, unsigned size) | 181 | #include "sysemu/tcg.h" |
54 | { | 182 | diff --git a/target/s390x/cpu-sysemu.c b/target/s390x/cpu-sysemu.c |
55 | UnimplementedDeviceState *s = UNIMPLEMENTED_DEVICE(opaque); | 183 | index XXXXXXX..XXXXXXX 100644 |
184 | --- a/target/s390x/cpu-sysemu.c | ||
185 | +++ b/target/s390x/cpu-sysemu.c | ||
186 | @@ -XXX,XX +XXX,XX @@ | ||
187 | |||
188 | #include "hw/s390x/pv.h" | ||
189 | #include "hw/boards.h" | ||
190 | -#include "sysemu/arch_init.h" | ||
191 | #include "sysemu/sysemu.h" | ||
192 | #include "sysemu/tcg.h" | ||
193 | #include "hw/core/sysemu-cpu-ops.h" | ||
56 | -- | 194 | -- |
57 | 2.16.2 | 195 | 2.20.1 |
58 | 196 | ||
59 | 197 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | We added a stub for the arch_type global in commit 5964ed56d9a1 so |
---|---|---|---|
2 | that we could compile blockdev.c into the tools. However, in commit | ||
3 | 9db1d3a2be9bf we removed the only use of arch_type from blockdev.c. | ||
4 | The stub is therefore no longer needed, and we can delete it again, | ||
5 | together with the QEMU_ARCH_NONE value that only the stub was using. | ||
2 | 6 | ||
3 | Not enabled anywhere yet. | 7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
8 | Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
10 | Message-id: 20210730105947.28215-9-peter.maydell@linaro.org | ||
11 | --- | ||
12 | include/sysemu/arch_init.h | 2 -- | ||
13 | stubs/arch_type.c | 4 ---- | ||
14 | stubs/meson.build | 1 - | ||
15 | 3 files changed, 7 deletions(-) | ||
16 | delete mode 100644 stubs/arch_type.c | ||
4 | 17 | ||
5 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | 18 | diff --git a/include/sysemu/arch_init.h b/include/sysemu/arch_init.h |
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20180228193125.20577-2-richard.henderson@linaro.org | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | --- | ||
11 | target/arm/cpu.h | 1 + | ||
12 | linux-user/elfload.c | 1 + | ||
13 | 2 files changed, 2 insertions(+) | ||
14 | |||
15 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
16 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/target/arm/cpu.h | 20 | --- a/include/sysemu/arch_init.h |
18 | +++ b/target/arm/cpu.h | 21 | +++ b/include/sysemu/arch_init.h |
19 | @@ -XXX,XX +XXX,XX @@ enum arm_features { | 22 | @@ -XXX,XX +XXX,XX @@ enum { |
20 | ARM_FEATURE_V8_SHA3, /* implements SHA3 part of v8 Crypto Extensions */ | 23 | QEMU_ARCH_RX = (1 << 20), |
21 | ARM_FEATURE_V8_SM3, /* implements SM3 part of v8 Crypto Extensions */ | 24 | QEMU_ARCH_AVR = (1 << 21), |
22 | ARM_FEATURE_V8_SM4, /* implements SM4 part of v8 Crypto Extensions */ | 25 | QEMU_ARCH_HEXAGON = (1 << 22), |
23 | + ARM_FEATURE_V8_RDM, /* implements v8.1 simd round multiply */ | 26 | - |
24 | ARM_FEATURE_V8_FP16, /* implements v8.2 half-precision float */ | 27 | - QEMU_ARCH_NONE = (1 << 31), |
25 | }; | 28 | }; |
26 | 29 | ||
27 | diff --git a/linux-user/elfload.c b/linux-user/elfload.c | 30 | extern const uint32_t arch_type; |
31 | diff --git a/stubs/arch_type.c b/stubs/arch_type.c | ||
32 | deleted file mode 100644 | ||
33 | index XXXXXXX..XXXXXXX | ||
34 | --- a/stubs/arch_type.c | ||
35 | +++ /dev/null | ||
36 | @@ -XXX,XX +XXX,XX @@ | ||
37 | -#include "qemu/osdep.h" | ||
38 | -#include "sysemu/arch_init.h" | ||
39 | - | ||
40 | -const uint32_t arch_type = QEMU_ARCH_NONE; | ||
41 | diff --git a/stubs/meson.build b/stubs/meson.build | ||
28 | index XXXXXXX..XXXXXXX 100644 | 42 | index XXXXXXX..XXXXXXX 100644 |
29 | --- a/linux-user/elfload.c | 43 | --- a/stubs/meson.build |
30 | +++ b/linux-user/elfload.c | 44 | +++ b/stubs/meson.build |
31 | @@ -XXX,XX +XXX,XX @@ static uint32_t get_elf_hwcap(void) | 45 | @@ -XXX,XX +XXX,XX @@ |
32 | GET_FEATURE(ARM_FEATURE_V8_SHA512, ARM_HWCAP_A64_SHA512); | 46 | -stub_ss.add(files('arch_type.c')) |
33 | GET_FEATURE(ARM_FEATURE_V8_FP16, | 47 | stub_ss.add(files('bdrv-next-monitor-owned.c')) |
34 | ARM_HWCAP_A64_FPHP | ARM_HWCAP_A64_ASIMDHP); | 48 | stub_ss.add(files('blk-commit-all.c')) |
35 | + GET_FEATURE(ARM_FEATURE_V8_RDM, ARM_HWCAP_A64_ASIMDRDM); | 49 | stub_ss.add(files('blk-exp-close-all.c')) |
36 | #undef GET_FEATURE | ||
37 | |||
38 | return hwcaps; | ||
39 | -- | 50 | -- |
40 | 2.16.2 | 51 | 2.20.1 |
41 | 52 | ||
42 | 53 | diff view generated by jsdifflib |
1 | Add a function load_ramdisk_as() which behaves like the existing | 1 | The gunzip() function reads various fields from a passed in source |
---|---|---|---|
2 | load_ramdisk() but allows the caller to specify the AddressSpace | 2 | buffer in order to skip a header before passing the actual compressed |
3 | to use. This matches the pattern we have already for various | 3 | data to the zlib inflate() function. It does check whether the |
4 | other loader functions. | 4 | passed in buffer is too small, but unfortunately it checks that only |
5 | after reading bytes from the src buffer, so it could read off the end | ||
6 | of the buffer. | ||
5 | 7 | ||
8 | You can see this with valgrind: | ||
9 | |||
10 | $ printf "%b" '\x1f\x8b' > /tmp/image | ||
11 | $ valgrind qemu-system-aarch64 -display none -M virt -cpu max -kernel /tmp/image | ||
12 | [...] | ||
13 | ==19224== Invalid read of size 1 | ||
14 | ==19224== at 0x67302E: gunzip (loader.c:558) | ||
15 | ==19224== by 0x673907: load_image_gzipped_buffer (loader.c:788) | ||
16 | ==19224== by 0xA18032: load_aarch64_image (boot.c:932) | ||
17 | ==19224== by 0xA18489: arm_setup_direct_kernel_boot (boot.c:1063) | ||
18 | ==19224== by 0xA18D90: arm_load_kernel (boot.c:1317) | ||
19 | ==19224== by 0x9F3651: machvirt_init (virt.c:2114) | ||
20 | ==19224== by 0x794B7A: machine_run_board_init (machine.c:1272) | ||
21 | ==19224== by 0xD5CAD3: qemu_init_board (vl.c:2618) | ||
22 | ==19224== by 0xD5CCA6: qmp_x_exit_preconfig (vl.c:2692) | ||
23 | ==19224== by 0xD5F32E: qemu_init (vl.c:3713) | ||
24 | ==19224== by 0x5ADDB1: main (main.c:49) | ||
25 | ==19224== Address 0x3802a873 is 0 bytes after a block of size 3 alloc'd | ||
26 | ==19224== at 0x4C31B0F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) | ||
27 | ==19224== by 0x61E7657: g_file_get_contents (in /usr/lib/x86_64-linux-gnu/libglib-2.0.so.0.5600.4) | ||
28 | ==19224== by 0x673895: load_image_gzipped_buffer (loader.c:771) | ||
29 | ==19224== by 0xA18032: load_aarch64_image (boot.c:932) | ||
30 | ==19224== by 0xA18489: arm_setup_direct_kernel_boot (boot.c:1063) | ||
31 | ==19224== by 0xA18D90: arm_load_kernel (boot.c:1317) | ||
32 | ==19224== by 0x9F3651: machvirt_init (virt.c:2114) | ||
33 | ==19224== by 0x794B7A: machine_run_board_init (machine.c:1272) | ||
34 | ==19224== by 0xD5CAD3: qemu_init_board (vl.c:2618) | ||
35 | ==19224== by 0xD5CCA6: qmp_x_exit_preconfig (vl.c:2692) | ||
36 | ==19224== by 0xD5F32E: qemu_init (vl.c:3713) | ||
37 | ==19224== by 0x5ADDB1: main (main.c:49) | ||
38 | |||
39 | Check that we have enough bytes of data to read the header bytes that | ||
40 | we read before we read them. | ||
41 | |||
42 | Fixes: Coverity 1458997 | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 43 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 44 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 45 | Message-id: 20210812141803.20913-1-peter.maydell@linaro.org |
9 | Message-id: 20180220180325.29818-2-peter.maydell@linaro.org | ||
10 | --- | 46 | --- |
11 | include/hw/loader.h | 12 +++++++++++- | 47 | hw/core/loader.c | 35 +++++++++++++++++++++++++---------- |
12 | hw/core/loader.c | 8 +++++++- | 48 | 1 file changed, 25 insertions(+), 10 deletions(-) |
13 | 2 files changed, 18 insertions(+), 2 deletions(-) | ||
14 | 49 | ||
15 | diff --git a/include/hw/loader.h b/include/hw/loader.h | ||
16 | index XXXXXXX..XXXXXXX 100644 | ||
17 | --- a/include/hw/loader.h | ||
18 | +++ b/include/hw/loader.h | ||
19 | @@ -XXX,XX +XXX,XX @@ int load_uimage(const char *filename, hwaddr *ep, | ||
20 | void *translate_opaque); | ||
21 | |||
22 | /** | ||
23 | - * load_ramdisk: | ||
24 | + * load_ramdisk_as: | ||
25 | * @filename: Path to the ramdisk image | ||
26 | * @addr: Memory address to load the ramdisk to | ||
27 | * @max_sz: Maximum allowed ramdisk size (for non-u-boot ramdisks) | ||
28 | + * @as: The AddressSpace to load the ELF to. The value of address_space_memory | ||
29 | + * is used if nothing is supplied here. | ||
30 | * | ||
31 | * Load a ramdisk image with U-Boot header to the specified memory | ||
32 | * address. | ||
33 | * | ||
34 | * Returns the size of the loaded image on success, -1 otherwise. | ||
35 | */ | ||
36 | +int load_ramdisk_as(const char *filename, hwaddr addr, uint64_t max_sz, | ||
37 | + AddressSpace *as); | ||
38 | + | ||
39 | +/** | ||
40 | + * load_ramdisk: | ||
41 | + * Same as load_ramdisk_as(), but doesn't allow the caller to specify | ||
42 | + * an AddressSpace. | ||
43 | + */ | ||
44 | int load_ramdisk(const char *filename, hwaddr addr, uint64_t max_sz); | ||
45 | |||
46 | ssize_t gunzip(void *dst, size_t dstlen, uint8_t *src, size_t srclen); | ||
47 | diff --git a/hw/core/loader.c b/hw/core/loader.c | 50 | diff --git a/hw/core/loader.c b/hw/core/loader.c |
48 | index XXXXXXX..XXXXXXX 100644 | 51 | index XXXXXXX..XXXXXXX 100644 |
49 | --- a/hw/core/loader.c | 52 | --- a/hw/core/loader.c |
50 | +++ b/hw/core/loader.c | 53 | +++ b/hw/core/loader.c |
51 | @@ -XXX,XX +XXX,XX @@ int load_uimage_as(const char *filename, hwaddr *ep, hwaddr *loadaddr, | 54 | @@ -XXX,XX +XXX,XX @@ ssize_t gunzip(void *dst, size_t dstlen, uint8_t *src, size_t srclen) |
52 | 55 | ||
53 | /* Load a ramdisk. */ | 56 | /* skip header */ |
54 | int load_ramdisk(const char *filename, hwaddr addr, uint64_t max_sz) | 57 | i = 10; |
55 | +{ | 58 | + if (srclen < 4) { |
56 | + return load_ramdisk_as(filename, addr, max_sz, NULL); | 59 | + goto toosmall; |
57 | +} | 60 | + } |
61 | flags = src[3]; | ||
62 | if (src[2] != DEFLATED || (flags & RESERVED) != 0) { | ||
63 | puts ("Error: Bad gzipped data\n"); | ||
64 | return -1; | ||
65 | } | ||
66 | - if ((flags & EXTRA_FIELD) != 0) | ||
67 | + if ((flags & EXTRA_FIELD) != 0) { | ||
68 | + if (srclen < 12) { | ||
69 | + goto toosmall; | ||
70 | + } | ||
71 | i = 12 + src[10] + (src[11] << 8); | ||
72 | - if ((flags & ORIG_NAME) != 0) | ||
73 | - while (src[i++] != 0) | ||
74 | - ; | ||
75 | - if ((flags & COMMENT) != 0) | ||
76 | - while (src[i++] != 0) | ||
77 | - ; | ||
78 | - if ((flags & HEAD_CRC) != 0) | ||
79 | + } | ||
80 | + if ((flags & ORIG_NAME) != 0) { | ||
81 | + while (i < srclen && src[i++] != 0) { | ||
82 | + /* do nothing */ | ||
83 | + } | ||
84 | + } | ||
85 | + if ((flags & COMMENT) != 0) { | ||
86 | + while (i < srclen && src[i++] != 0) { | ||
87 | + /* do nothing */ | ||
88 | + } | ||
89 | + } | ||
90 | + if ((flags & HEAD_CRC) != 0) { | ||
91 | i += 2; | ||
92 | + } | ||
93 | if (i >= srclen) { | ||
94 | - puts ("Error: gunzip out of data in header\n"); | ||
95 | - return -1; | ||
96 | + goto toosmall; | ||
97 | } | ||
98 | |||
99 | s.zalloc = zalloc; | ||
100 | @@ -XXX,XX +XXX,XX @@ ssize_t gunzip(void *dst, size_t dstlen, uint8_t *src, size_t srclen) | ||
101 | inflateEnd(&s); | ||
102 | |||
103 | return dstbytes; | ||
58 | + | 104 | + |
59 | +int load_ramdisk_as(const char *filename, hwaddr addr, uint64_t max_sz, | 105 | +toosmall: |
60 | + AddressSpace *as) | 106 | + puts("Error: gunzip out of data in header\n"); |
61 | { | 107 | + return -1; |
62 | return load_uboot_image(filename, NULL, &addr, NULL, IH_TYPE_RAMDISK, | ||
63 | - NULL, NULL, NULL); | ||
64 | + NULL, NULL, as); | ||
65 | } | 108 | } |
66 | 109 | ||
67 | /* Load a gzip-compressed kernel to a dynamically allocated buffer. */ | 110 | /* Load a U-Boot image. */ |
68 | -- | 111 | -- |
69 | 2.16.2 | 112 | 2.20.1 |
70 | 113 | ||
71 | 114 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | In the alignment check added to qemu_ram_alloc_from_fd() in commit |
---|---|---|---|
2 | ce317be98db0dfdfa, the condition includes a check that 'mr' is not | ||
3 | NULL. This check is unnecessary because we can assume that the | ||
4 | caller always passes us a valid MemoryRegion, and indeed later in the | ||
5 | function we assume mr is not NULL when we pass it to file_ram_alloc() | ||
6 | as new_block->mr. Remove it. | ||
2 | 7 | ||
3 | The integer size check was already outside of the opcode switch; | 8 | Fixes: Coverity 1459867 |
4 | move the floating-point size check outside as well. Unify the | 9 | Fixes: ce317be98d ("exec: fetch the alignment of Linux devdax pmem character device nodes") |
5 | size vs index adjustment between fp and integer paths. | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | Reviewed-by: Jingqi Liu <jingqi.liu@intel.com> | ||
12 | Message-id: 20210812150624.29139-1-peter.maydell@linaro.org | ||
13 | --- | ||
14 | softmmu/physmem.c | 2 +- | ||
15 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
6 | 16 | ||
7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 17 | diff --git a/softmmu/physmem.c b/softmmu/physmem.c |
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | Message-id: 20180228193125.20577-4-richard.henderson@linaro.org | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | --- | ||
12 | target/arm/translate-a64.c | 65 +++++++++++++++++++++++----------------------- | ||
13 | 1 file changed, 32 insertions(+), 33 deletions(-) | ||
14 | |||
15 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c | ||
16 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/target/arm/translate-a64.c | 19 | --- a/softmmu/physmem.c |
18 | +++ b/target/arm/translate-a64.c | 20 | +++ b/softmmu/physmem.c |
19 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | 21 | @@ -XXX,XX +XXX,XX @@ RAMBlock *qemu_ram_alloc_from_fd(ram_addr_t size, MemoryRegion *mr, |
20 | case 0x05: /* FMLS */ | ||
21 | case 0x09: /* FMUL */ | ||
22 | case 0x19: /* FMULX */ | ||
23 | - if (size == 1) { | ||
24 | - unallocated_encoding(s); | ||
25 | - return; | ||
26 | - } | ||
27 | is_fp = true; | ||
28 | break; | ||
29 | default: | ||
30 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | ||
31 | if (is_fp) { | ||
32 | /* convert insn encoded size to TCGMemOp size */ | ||
33 | switch (size) { | ||
34 | - case 2: /* single precision */ | ||
35 | - size = MO_32; | ||
36 | - index = h << 1 | l; | ||
37 | - rm |= (m << 4); | ||
38 | - break; | ||
39 | - case 3: /* double precision */ | ||
40 | - size = MO_64; | ||
41 | - if (l || !is_q) { | ||
42 | + case 0: /* half-precision */ | ||
43 | + if (!arm_dc_feature(s, ARM_FEATURE_V8_FP16)) { | ||
44 | unallocated_encoding(s); | ||
45 | return; | ||
46 | } | ||
47 | - index = h; | ||
48 | - rm |= (m << 4); | ||
49 | - break; | ||
50 | - case 0: /* half precision */ | ||
51 | size = MO_16; | ||
52 | - index = h << 2 | l << 1 | m; | ||
53 | - is_fp16 = true; | ||
54 | - if (arm_dc_feature(s, ARM_FEATURE_V8_FP16)) { | ||
55 | - break; | ||
56 | - } | ||
57 | - /* fallthru */ | ||
58 | - default: /* unallocated */ | ||
59 | - unallocated_encoding(s); | ||
60 | - return; | ||
61 | - } | ||
62 | - } else { | ||
63 | - switch (size) { | ||
64 | - case 1: | ||
65 | - index = h << 2 | l << 1 | m; | ||
66 | break; | ||
67 | - case 2: | ||
68 | - index = h << 1 | l; | ||
69 | - rm |= (m << 4); | ||
70 | + case MO_32: /* single precision */ | ||
71 | + case MO_64: /* double precision */ | ||
72 | break; | ||
73 | default: | ||
74 | unallocated_encoding(s); | ||
75 | return; | ||
76 | } | ||
77 | + } else { | ||
78 | + switch (size) { | ||
79 | + case MO_8: | ||
80 | + case MO_64: | ||
81 | + unallocated_encoding(s); | ||
82 | + return; | ||
83 | + } | ||
84 | + } | ||
85 | + | ||
86 | + /* Given TCGMemOp size, adjust register and indexing. */ | ||
87 | + switch (size) { | ||
88 | + case MO_16: | ||
89 | + index = h << 2 | l << 1 | m; | ||
90 | + break; | ||
91 | + case MO_32: | ||
92 | + index = h << 1 | l; | ||
93 | + rm |= m << 4; | ||
94 | + break; | ||
95 | + case MO_64: | ||
96 | + if (l || !is_q) { | ||
97 | + unallocated_encoding(s); | ||
98 | + return; | ||
99 | + } | ||
100 | + index = h; | ||
101 | + rm |= m << 4; | ||
102 | + break; | ||
103 | + default: | ||
104 | + g_assert_not_reached(); | ||
105 | } | 22 | } |
106 | 23 | ||
107 | if (!fp_access_check(s)) { | 24 | file_align = get_file_align(fd); |
25 | - if (file_align > 0 && mr && file_align > mr->align) { | ||
26 | + if (file_align > 0 && file_align > mr->align) { | ||
27 | error_setg(errp, "backing store align 0x%" PRIx64 | ||
28 | " is larger than 'align' option 0x%" PRIx64, | ||
29 | file_align, mr->align); | ||
108 | -- | 30 | -- |
109 | 2.16.2 | 31 | 2.20.1 |
110 | 32 | ||
111 | 33 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | The realpath() function can return NULL on error, so we need to check |
---|---|---|---|
2 | for it to avoid crashing when we try to strstr() into it. | ||
3 | This can happen if we run out of memory, or if /sys/ is not mounted, | ||
4 | among other situations. | ||
2 | 5 | ||
3 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Fixes: Coverity 1459913, 1460474 |
4 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 7 | Fixes: ce317be98db0 ("exec: fetch the alignment of Linux devdax pmem character device nodes") |
5 | Message-id: 20180228193125.20577-8-richard.henderson@linaro.org | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | Reviewed-by: Jingqi Liu <jingqi.liu@intel.com> | ||
10 | Message-id: 20210812151525.31456-1-peter.maydell@linaro.org | ||
7 | --- | 11 | --- |
8 | target/arm/translate.c | 86 +++++++++++++++++++++++++++++++++++++++----------- | 12 | softmmu/physmem.c | 3 +++ |
9 | 1 file changed, 67 insertions(+), 19 deletions(-) | 13 | 1 file changed, 3 insertions(+) |
10 | 14 | ||
11 | diff --git a/target/arm/translate.c b/target/arm/translate.c | 15 | diff --git a/softmmu/physmem.c b/softmmu/physmem.c |
12 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
13 | --- a/target/arm/translate.c | 17 | --- a/softmmu/physmem.c |
14 | +++ b/target/arm/translate.c | 18 | +++ b/softmmu/physmem.c |
15 | @@ -XXX,XX +XXX,XX @@ | 19 | @@ -XXX,XX +XXX,XX @@ static int64_t get_file_align(int fd) |
16 | #include "disas/disas.h" | 20 | path = g_strdup_printf("/sys/dev/char/%d:%d", |
17 | #include "exec/exec-all.h" | 21 | major(st.st_rdev), minor(st.st_rdev)); |
18 | #include "tcg-op.h" | 22 | rpath = realpath(path, NULL); |
19 | +#include "tcg-op-gvec.h" | 23 | + if (!rpath) { |
20 | #include "qemu/log.h" | 24 | + return -errno; |
21 | #include "qemu/bitops.h" | 25 | + } |
22 | #include "arm_ldst.h" | 26 | |
23 | @@ -XXX,XX +XXX,XX @@ static void gen_neon_narrow_op(int op, int u, int size, | 27 | rc = daxctl_new(&ctx); |
24 | #define NEON_3R_VPMAX 20 | 28 | if (rc) { |
25 | #define NEON_3R_VPMIN 21 | ||
26 | #define NEON_3R_VQDMULH_VQRDMULH 22 | ||
27 | -#define NEON_3R_VPADD 23 | ||
28 | +#define NEON_3R_VPADD_VQRDMLAH 23 | ||
29 | #define NEON_3R_SHA 24 /* SHA1C,SHA1P,SHA1M,SHA1SU0,SHA256H{2},SHA256SU1 */ | ||
30 | -#define NEON_3R_VFM 25 /* VFMA, VFMS : float fused multiply-add */ | ||
31 | +#define NEON_3R_VFM_VQRDMLSH 25 /* VFMA, VFMS, VQRDMLSH */ | ||
32 | #define NEON_3R_FLOAT_ARITH 26 /* float VADD, VSUB, VPADD, VABD */ | ||
33 | #define NEON_3R_FLOAT_MULTIPLY 27 /* float VMLA, VMLS, VMUL */ | ||
34 | #define NEON_3R_FLOAT_CMP 28 /* float VCEQ, VCGE, VCGT */ | ||
35 | @@ -XXX,XX +XXX,XX @@ static const uint8_t neon_3r_sizes[] = { | ||
36 | [NEON_3R_VPMAX] = 0x7, | ||
37 | [NEON_3R_VPMIN] = 0x7, | ||
38 | [NEON_3R_VQDMULH_VQRDMULH] = 0x6, | ||
39 | - [NEON_3R_VPADD] = 0x7, | ||
40 | + [NEON_3R_VPADD_VQRDMLAH] = 0x7, | ||
41 | [NEON_3R_SHA] = 0xf, /* size field encodes op type */ | ||
42 | - [NEON_3R_VFM] = 0x5, /* size bit 1 encodes op */ | ||
43 | + [NEON_3R_VFM_VQRDMLSH] = 0x7, /* For VFM, size bit 1 encodes op */ | ||
44 | [NEON_3R_FLOAT_ARITH] = 0x5, /* size bit 1 encodes op */ | ||
45 | [NEON_3R_FLOAT_MULTIPLY] = 0x5, /* size bit 1 encodes op */ | ||
46 | [NEON_3R_FLOAT_CMP] = 0x5, /* size bit 1 encodes op */ | ||
47 | @@ -XXX,XX +XXX,XX @@ static const uint8_t neon_2rm_sizes[] = { | ||
48 | [NEON_2RM_VCVT_UF] = 0x4, | ||
49 | }; | ||
50 | |||
51 | + | ||
52 | +/* Expand v8.1 simd helper. */ | ||
53 | +static int do_v81_helper(DisasContext *s, gen_helper_gvec_3_ptr *fn, | ||
54 | + int q, int rd, int rn, int rm) | ||
55 | +{ | ||
56 | + if (arm_dc_feature(s, ARM_FEATURE_V8_RDM)) { | ||
57 | + int opr_sz = (1 + q) * 8; | ||
58 | + tcg_gen_gvec_3_ptr(vfp_reg_offset(1, rd), | ||
59 | + vfp_reg_offset(1, rn), | ||
60 | + vfp_reg_offset(1, rm), cpu_env, | ||
61 | + opr_sz, opr_sz, 0, fn); | ||
62 | + return 0; | ||
63 | + } | ||
64 | + return 1; | ||
65 | +} | ||
66 | + | ||
67 | /* Translate a NEON data processing instruction. Return nonzero if the | ||
68 | instruction is invalid. | ||
69 | We process data in a mixture of 32-bit and 64-bit chunks. | ||
70 | @@ -XXX,XX +XXX,XX @@ static int disas_neon_data_insn(DisasContext *s, uint32_t insn) | ||
71 | if (q && ((rd | rn | rm) & 1)) { | ||
72 | return 1; | ||
73 | } | ||
74 | - /* | ||
75 | - * The SHA-1/SHA-256 3-register instructions require special treatment | ||
76 | - * here, as their size field is overloaded as an op type selector, and | ||
77 | - * they all consume their input in a single pass. | ||
78 | - */ | ||
79 | - if (op == NEON_3R_SHA) { | ||
80 | + switch (op) { | ||
81 | + case NEON_3R_SHA: | ||
82 | + /* The SHA-1/SHA-256 3-register instructions require special | ||
83 | + * treatment here, as their size field is overloaded as an | ||
84 | + * op type selector, and they all consume their input in a | ||
85 | + * single pass. | ||
86 | + */ | ||
87 | if (!q) { | ||
88 | return 1; | ||
89 | } | ||
90 | @@ -XXX,XX +XXX,XX @@ static int disas_neon_data_insn(DisasContext *s, uint32_t insn) | ||
91 | tcg_temp_free_ptr(ptr2); | ||
92 | tcg_temp_free_ptr(ptr3); | ||
93 | return 0; | ||
94 | + | ||
95 | + case NEON_3R_VPADD_VQRDMLAH: | ||
96 | + if (!u) { | ||
97 | + break; /* VPADD */ | ||
98 | + } | ||
99 | + /* VQRDMLAH */ | ||
100 | + switch (size) { | ||
101 | + case 1: | ||
102 | + return do_v81_helper(s, gen_helper_gvec_qrdmlah_s16, | ||
103 | + q, rd, rn, rm); | ||
104 | + case 2: | ||
105 | + return do_v81_helper(s, gen_helper_gvec_qrdmlah_s32, | ||
106 | + q, rd, rn, rm); | ||
107 | + } | ||
108 | + return 1; | ||
109 | + | ||
110 | + case NEON_3R_VFM_VQRDMLSH: | ||
111 | + if (!u) { | ||
112 | + /* VFM, VFMS */ | ||
113 | + if (size == 1) { | ||
114 | + return 1; | ||
115 | + } | ||
116 | + break; | ||
117 | + } | ||
118 | + /* VQRDMLSH */ | ||
119 | + switch (size) { | ||
120 | + case 1: | ||
121 | + return do_v81_helper(s, gen_helper_gvec_qrdmlsh_s16, | ||
122 | + q, rd, rn, rm); | ||
123 | + case 2: | ||
124 | + return do_v81_helper(s, gen_helper_gvec_qrdmlsh_s32, | ||
125 | + q, rd, rn, rm); | ||
126 | + } | ||
127 | + return 1; | ||
128 | } | ||
129 | if (size == 3 && op != NEON_3R_LOGIC) { | ||
130 | /* 64-bit element instructions. */ | ||
131 | @@ -XXX,XX +XXX,XX @@ static int disas_neon_data_insn(DisasContext *s, uint32_t insn) | ||
132 | rm = rtmp; | ||
133 | } | ||
134 | break; | ||
135 | - case NEON_3R_VPADD: | ||
136 | - if (u) { | ||
137 | - return 1; | ||
138 | - } | ||
139 | - /* Fall through */ | ||
140 | + case NEON_3R_VPADD_VQRDMLAH: | ||
141 | case NEON_3R_VPMAX: | ||
142 | case NEON_3R_VPMIN: | ||
143 | pairwise = 1; | ||
144 | @@ -XXX,XX +XXX,XX @@ static int disas_neon_data_insn(DisasContext *s, uint32_t insn) | ||
145 | return 1; | ||
146 | } | ||
147 | break; | ||
148 | - case NEON_3R_VFM: | ||
149 | - if (!arm_dc_feature(s, ARM_FEATURE_VFP4) || u) { | ||
150 | + case NEON_3R_VFM_VQRDMLSH: | ||
151 | + if (!arm_dc_feature(s, ARM_FEATURE_VFP4)) { | ||
152 | return 1; | ||
153 | } | ||
154 | break; | ||
155 | @@ -XXX,XX +XXX,XX @@ static int disas_neon_data_insn(DisasContext *s, uint32_t insn) | ||
156 | } | ||
157 | } | ||
158 | break; | ||
159 | - case NEON_3R_VPADD: | ||
160 | + case NEON_3R_VPADD_VQRDMLAH: | ||
161 | switch (size) { | ||
162 | case 0: gen_helper_neon_padd_u8(tmp, tmp, tmp2); break; | ||
163 | case 1: gen_helper_neon_padd_u16(tmp, tmp, tmp2); break; | ||
164 | @@ -XXX,XX +XXX,XX @@ static int disas_neon_data_insn(DisasContext *s, uint32_t insn) | ||
165 | } | ||
166 | } | ||
167 | break; | ||
168 | - case NEON_3R_VFM: | ||
169 | + case NEON_3R_VFM_VQRDMLSH: | ||
170 | { | ||
171 | /* VFMA, VFMS: fused multiply-add */ | ||
172 | TCGv_ptr fpstatus = get_fpstatus_ptr(1); | ||
173 | -- | 29 | -- |
174 | 2.16.2 | 30 | 2.20.1 |
175 | 31 | ||
176 | 32 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | We don't currently zero-initialize the 'struct sockaddr_in' that |
---|---|---|---|
2 | parse_host_port() fills in, so any fields we don't explicitly | ||
3 | initialize might be left as random garbage. POSIX states that | ||
4 | implementations may define extensions in sockaddr_in, and that those | ||
5 | extensions must not trigger if zero-initialized. So not zero | ||
6 | initializing might result in inadvertently triggering an impdef | ||
7 | extension. | ||
2 | 8 | ||
3 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | 9 | memset() the sockaddr_in before we start to fill it in. |
4 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 10 | |
5 | Message-id: 20180228193125.20577-7-richard.henderson@linaro.org | 11 | Fixes: Coverity CID 1005338 |
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
13 | Reviewed-by: Eric Blake <eblake@redhat.com> | ||
14 | Message-id: 20210813150506.7768-2-peter.maydell@linaro.org | ||
7 | --- | 15 | --- |
8 | target/arm/translate-a64.c | 29 +++++++++++++++++++++++++++++ | 16 | net/net.c | 2 ++ |
9 | 1 file changed, 29 insertions(+) | 17 | 1 file changed, 2 insertions(+) |
10 | 18 | ||
11 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c | 19 | diff --git a/net/net.c b/net/net.c |
12 | index XXXXXXX..XXXXXXX 100644 | 20 | index XXXXXXX..XXXXXXX 100644 |
13 | --- a/target/arm/translate-a64.c | 21 | --- a/net/net.c |
14 | +++ b/target/arm/translate-a64.c | 22 | +++ b/net/net.c |
15 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | 23 | @@ -XXX,XX +XXX,XX @@ int parse_host_port(struct sockaddr_in *saddr, const char *str, |
16 | case 0x19: /* FMULX */ | 24 | const char *addr, *p, *r; |
17 | is_fp = true; | 25 | int port, ret = 0; |
18 | break; | 26 | |
19 | + case 0x1d: /* SQRDMLAH */ | 27 | + memset(saddr, 0, sizeof(*saddr)); |
20 | + case 0x1f: /* SQRDMLSH */ | 28 | + |
21 | + if (!arm_dc_feature(s, ARM_FEATURE_V8_RDM)) { | 29 | substrings = g_strsplit(str, ":", 2); |
22 | + unallocated_encoding(s); | 30 | if (!substrings || !substrings[0] || !substrings[1]) { |
23 | + return; | 31 | error_setg(errp, "host address '%s' doesn't contain ':' " |
24 | + } | ||
25 | + break; | ||
26 | default: | ||
27 | unallocated_encoding(s); | ||
28 | return; | ||
29 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | ||
30 | tcg_op, tcg_idx); | ||
31 | } | ||
32 | break; | ||
33 | + case 0x1d: /* SQRDMLAH */ | ||
34 | + read_vec_element_i32(s, tcg_res, rd, pass, | ||
35 | + is_scalar ? size : MO_32); | ||
36 | + if (size == 1) { | ||
37 | + gen_helper_neon_qrdmlah_s16(tcg_res, cpu_env, | ||
38 | + tcg_op, tcg_idx, tcg_res); | ||
39 | + } else { | ||
40 | + gen_helper_neon_qrdmlah_s32(tcg_res, cpu_env, | ||
41 | + tcg_op, tcg_idx, tcg_res); | ||
42 | + } | ||
43 | + break; | ||
44 | + case 0x1f: /* SQRDMLSH */ | ||
45 | + read_vec_element_i32(s, tcg_res, rd, pass, | ||
46 | + is_scalar ? size : MO_32); | ||
47 | + if (size == 1) { | ||
48 | + gen_helper_neon_qrdmlsh_s16(tcg_res, cpu_env, | ||
49 | + tcg_op, tcg_idx, tcg_res); | ||
50 | + } else { | ||
51 | + gen_helper_neon_qrdmlsh_s32(tcg_res, cpu_env, | ||
52 | + tcg_op, tcg_idx, tcg_res); | ||
53 | + } | ||
54 | + break; | ||
55 | default: | ||
56 | g_assert_not_reached(); | ||
57 | } | ||
58 | -- | 32 | -- |
59 | 2.16.2 | 33 | 2.20.1 |
60 | 34 | ||
61 | 35 | diff view generated by jsdifflib |
1 | Create an "idau" property on the armv7m container object which | 1 | Zero-initialize sockaddr_in and sockaddr_un structs that we're about |
---|---|---|---|
2 | we can forward to the CPU object. Annoyingly, we can't use | 2 | to fill in and pass to bind() or connect(), to ensure we don't leave |
3 | object_property_add_alias() because the CPU object we want to | 3 | possible implementation-defined extension fields as uninitialized |
4 | forward to doesn't exist until the armv7m container is realized. | 4 | garbage. |
5 | 5 | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 7 | Reviewed-by: Eric Blake <eblake@redhat.com> |
8 | Message-id: 20180220180325.29818-6-peter.maydell@linaro.org | 8 | Message-id: 20210813150506.7768-3-peter.maydell@linaro.org |
9 | --- | 9 | --- |
10 | include/hw/arm/armv7m.h | 3 +++ | 10 | gdbstub.c | 4 ++-- |
11 | hw/arm/armv7m.c | 9 +++++++++ | 11 | 1 file changed, 2 insertions(+), 2 deletions(-) |
12 | 2 files changed, 12 insertions(+) | ||
13 | 12 | ||
14 | diff --git a/include/hw/arm/armv7m.h b/include/hw/arm/armv7m.h | 13 | diff --git a/gdbstub.c b/gdbstub.c |
15 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/include/hw/arm/armv7m.h | 15 | --- a/gdbstub.c |
17 | +++ b/include/hw/arm/armv7m.h | 16 | +++ b/gdbstub.c |
18 | @@ -XXX,XX +XXX,XX @@ | 17 | @@ -XXX,XX +XXX,XX @@ static bool gdb_accept_socket(int gdb_fd) |
19 | 18 | ||
20 | #include "hw/sysbus.h" | 19 | static int gdbserver_open_socket(const char *path) |
21 | #include "hw/intc/armv7m_nvic.h" | 20 | { |
22 | +#include "target/arm/idau.h" | 21 | - struct sockaddr_un sockaddr; |
23 | 22 | + struct sockaddr_un sockaddr = {}; | |
24 | #define TYPE_BITBAND "ARM,bitband-memory" | 23 | int fd, ret; |
25 | #define BITBAND(obj) OBJECT_CHECK(BitBandState, (obj), TYPE_BITBAND) | 24 | |
26 | @@ -XXX,XX +XXX,XX @@ typedef struct { | 25 | fd = socket(AF_UNIX, SOCK_STREAM, 0); |
27 | * + Property "memory": MemoryRegion defining the physical address space | 26 | @@ -XXX,XX +XXX,XX @@ static int gdbserver_open_socket(const char *path) |
28 | * that CPU accesses see. (The NVIC, bitbanding and other CPU-internal | 27 | |
29 | * devices will be automatically layered on top of this view.) | 28 | static bool gdb_accept_tcp(int gdb_fd) |
30 | + * + Property "idau": IDAU interface (forwarded to CPU object) | 29 | { |
31 | */ | 30 | - struct sockaddr_in sockaddr; |
32 | typedef struct ARMv7MState { | 31 | + struct sockaddr_in sockaddr = {}; |
33 | /*< private >*/ | 32 | socklen_t len; |
34 | @@ -XXX,XX +XXX,XX @@ typedef struct ARMv7MState { | 33 | int fd; |
35 | char *cpu_type; | ||
36 | /* MemoryRegion the board provides to us (with its devices, RAM, etc) */ | ||
37 | MemoryRegion *board_memory; | ||
38 | + Object *idau; | ||
39 | } ARMv7MState; | ||
40 | |||
41 | #endif | ||
42 | diff --git a/hw/arm/armv7m.c b/hw/arm/armv7m.c | ||
43 | index XXXXXXX..XXXXXXX 100644 | ||
44 | --- a/hw/arm/armv7m.c | ||
45 | +++ b/hw/arm/armv7m.c | ||
46 | @@ -XXX,XX +XXX,XX @@ | ||
47 | #include "sysemu/qtest.h" | ||
48 | #include "qemu/error-report.h" | ||
49 | #include "exec/address-spaces.h" | ||
50 | +#include "target/arm/idau.h" | ||
51 | |||
52 | /* Bitbanded IO. Each word corresponds to a single bit. */ | ||
53 | |||
54 | @@ -XXX,XX +XXX,XX @@ static void armv7m_realize(DeviceState *dev, Error **errp) | ||
55 | |||
56 | object_property_set_link(OBJECT(s->cpu), OBJECT(&s->container), "memory", | ||
57 | &error_abort); | ||
58 | + if (object_property_find(OBJECT(s->cpu), "idau", NULL)) { | ||
59 | + object_property_set_link(OBJECT(s->cpu), s->idau, "idau", &err); | ||
60 | + if (err != NULL) { | ||
61 | + error_propagate(errp, err); | ||
62 | + return; | ||
63 | + } | ||
64 | + } | ||
65 | object_property_set_bool(OBJECT(s->cpu), true, "realized", &err); | ||
66 | if (err != NULL) { | ||
67 | error_propagate(errp, err); | ||
68 | @@ -XXX,XX +XXX,XX @@ static Property armv7m_properties[] = { | ||
69 | DEFINE_PROP_STRING("cpu-type", ARMv7MState, cpu_type), | ||
70 | DEFINE_PROP_LINK("memory", ARMv7MState, board_memory, TYPE_MEMORY_REGION, | ||
71 | MemoryRegion *), | ||
72 | + DEFINE_PROP_LINK("idau", ARMv7MState, idau, TYPE_IDAU_INTERFACE, Object *), | ||
73 | DEFINE_PROP_END_OF_LIST(), | ||
74 | }; | ||
75 | 34 | ||
76 | -- | 35 | -- |
77 | 2.16.2 | 36 | 2.20.1 |
78 | 37 | ||
79 | 38 | diff view generated by jsdifflib |
1 | The MPS2 AN505 FPGA image includes a "FPGA control block" | 1 | Zero-initialize the sockaddr_in struct that we're about to fill in |
---|---|---|---|
2 | which is a small set of registers handling LEDs, buttons | 2 | and pass to bind(), to ensure we don't leave possible |
3 | and some counters. | 3 | implementation-defined extension fields as uninitialized garbage. |
4 | 4 | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 6 | Reviewed-by: Eric Blake <eblake@redhat.com> |
7 | Message-id: 20180220180325.29818-14-peter.maydell@linaro.org | 7 | Reviewed-by: Corey Minyard <cminyard@mvista.com> |
8 | Acked-by: Thomas Huth <thuth@redhat.com> | ||
9 | Message-id: 20210813150506.7768-4-peter.maydell@linaro.org | ||
8 | --- | 10 | --- |
9 | hw/misc/Makefile.objs | 1 + | 11 | tests/qtest/ipmi-bt-test.c | 2 +- |
10 | include/hw/misc/mps2-fpgaio.h | 43 ++++++++++ | 12 | 1 file changed, 1 insertion(+), 1 deletion(-) |
11 | hw/misc/mps2-fpgaio.c | 176 ++++++++++++++++++++++++++++++++++++++++ | ||
12 | default-configs/arm-softmmu.mak | 1 + | ||
13 | hw/misc/trace-events | 6 ++ | ||
14 | 5 files changed, 227 insertions(+) | ||
15 | create mode 100644 include/hw/misc/mps2-fpgaio.h | ||
16 | create mode 100644 hw/misc/mps2-fpgaio.c | ||
17 | 13 | ||
18 | diff --git a/hw/misc/Makefile.objs b/hw/misc/Makefile.objs | 14 | diff --git a/tests/qtest/ipmi-bt-test.c b/tests/qtest/ipmi-bt-test.c |
19 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
20 | --- a/hw/misc/Makefile.objs | 16 | --- a/tests/qtest/ipmi-bt-test.c |
21 | +++ b/hw/misc/Makefile.objs | 17 | +++ b/tests/qtest/ipmi-bt-test.c |
22 | @@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_STM32F2XX_SYSCFG) += stm32f2xx_syscfg.o | 18 | @@ -XXX,XX +XXX,XX @@ static void test_enable_irq(void) |
23 | obj-$(CONFIG_MIPS_CPS) += mips_cmgcr.o | 19 | */ |
24 | obj-$(CONFIG_MIPS_CPS) += mips_cpc.o | 20 | static void open_socket(void) |
25 | obj-$(CONFIG_MIPS_ITU) += mips_itu.o | 21 | { |
26 | +obj-$(CONFIG_MPS2_FPGAIO) += mps2-fpgaio.o | 22 | - struct sockaddr_in myaddr; |
27 | obj-$(CONFIG_MPS2_SCC) += mps2-scc.o | 23 | + struct sockaddr_in myaddr = {}; |
28 | 24 | socklen_t addrlen; | |
29 | obj-$(CONFIG_PVPANIC) += pvpanic.o | 25 | |
30 | diff --git a/include/hw/misc/mps2-fpgaio.h b/include/hw/misc/mps2-fpgaio.h | 26 | myaddr.sin_family = AF_INET; |
31 | new file mode 100644 | ||
32 | index XXXXXXX..XXXXXXX | ||
33 | --- /dev/null | ||
34 | +++ b/include/hw/misc/mps2-fpgaio.h | ||
35 | @@ -XXX,XX +XXX,XX @@ | ||
36 | +/* | ||
37 | + * ARM MPS2 FPGAIO emulation | ||
38 | + * | ||
39 | + * Copyright (c) 2018 Linaro Limited | ||
40 | + * Written by Peter Maydell | ||
41 | + * | ||
42 | + * This program is free software; you can redistribute it and/or modify | ||
43 | + * it under the terms of the GNU General Public License version 2 or | ||
44 | + * (at your option) any later version. | ||
45 | + */ | ||
46 | + | ||
47 | +/* This is a model of the FPGAIO register block in the AN505 | ||
48 | + * FPGA image for the MPS2 dev board; it is documented in the | ||
49 | + * application note: | ||
50 | + * http://infocenter.arm.com/help/topic/com.arm.doc.dai0505b/index.html | ||
51 | + * | ||
52 | + * QEMU interface: | ||
53 | + * + sysbus MMIO region 0: the register bank | ||
54 | + */ | ||
55 | + | ||
56 | +#ifndef MPS2_FPGAIO_H | ||
57 | +#define MPS2_FPGAIO_H | ||
58 | + | ||
59 | +#include "hw/sysbus.h" | ||
60 | + | ||
61 | +#define TYPE_MPS2_FPGAIO "mps2-fpgaio" | ||
62 | +#define MPS2_FPGAIO(obj) OBJECT_CHECK(MPS2FPGAIO, (obj), TYPE_MPS2_FPGAIO) | ||
63 | + | ||
64 | +typedef struct { | ||
65 | + /*< private >*/ | ||
66 | + SysBusDevice parent_obj; | ||
67 | + | ||
68 | + /*< public >*/ | ||
69 | + MemoryRegion iomem; | ||
70 | + | ||
71 | + uint32_t led0; | ||
72 | + uint32_t prescale; | ||
73 | + uint32_t misc; | ||
74 | + | ||
75 | + uint32_t prescale_clk; | ||
76 | +} MPS2FPGAIO; | ||
77 | + | ||
78 | +#endif | ||
79 | diff --git a/hw/misc/mps2-fpgaio.c b/hw/misc/mps2-fpgaio.c | ||
80 | new file mode 100644 | ||
81 | index XXXXXXX..XXXXXXX | ||
82 | --- /dev/null | ||
83 | +++ b/hw/misc/mps2-fpgaio.c | ||
84 | @@ -XXX,XX +XXX,XX @@ | ||
85 | +/* | ||
86 | + * ARM MPS2 AN505 FPGAIO emulation | ||
87 | + * | ||
88 | + * Copyright (c) 2018 Linaro Limited | ||
89 | + * Written by Peter Maydell | ||
90 | + * | ||
91 | + * This program is free software; you can redistribute it and/or modify | ||
92 | + * it under the terms of the GNU General Public License version 2 or | ||
93 | + * (at your option) any later version. | ||
94 | + */ | ||
95 | + | ||
96 | +/* This is a model of the "FPGA system control and I/O" block found | ||
97 | + * in the AN505 FPGA image for the MPS2 devboard. | ||
98 | + * It is documented in AN505: | ||
99 | + * http://infocenter.arm.com/help/topic/com.arm.doc.dai0505b/index.html | ||
100 | + */ | ||
101 | + | ||
102 | +#include "qemu/osdep.h" | ||
103 | +#include "qemu/log.h" | ||
104 | +#include "qapi/error.h" | ||
105 | +#include "trace.h" | ||
106 | +#include "hw/sysbus.h" | ||
107 | +#include "hw/registerfields.h" | ||
108 | +#include "hw/misc/mps2-fpgaio.h" | ||
109 | + | ||
110 | +REG32(LED0, 0) | ||
111 | +REG32(BUTTON, 8) | ||
112 | +REG32(CLK1HZ, 0x10) | ||
113 | +REG32(CLK100HZ, 0x14) | ||
114 | +REG32(COUNTER, 0x18) | ||
115 | +REG32(PRESCALE, 0x1c) | ||
116 | +REG32(PSCNTR, 0x20) | ||
117 | +REG32(MISC, 0x4c) | ||
118 | + | ||
119 | +static uint64_t mps2_fpgaio_read(void *opaque, hwaddr offset, unsigned size) | ||
120 | +{ | ||
121 | + MPS2FPGAIO *s = MPS2_FPGAIO(opaque); | ||
122 | + uint64_t r; | ||
123 | + | ||
124 | + switch (offset) { | ||
125 | + case A_LED0: | ||
126 | + r = s->led0; | ||
127 | + break; | ||
128 | + case A_BUTTON: | ||
129 | + /* User-pressable board buttons. We don't model that, so just return | ||
130 | + * zeroes. | ||
131 | + */ | ||
132 | + r = 0; | ||
133 | + break; | ||
134 | + case A_PRESCALE: | ||
135 | + r = s->prescale; | ||
136 | + break; | ||
137 | + case A_MISC: | ||
138 | + r = s->misc; | ||
139 | + break; | ||
140 | + case A_CLK1HZ: | ||
141 | + case A_CLK100HZ: | ||
142 | + case A_COUNTER: | ||
143 | + case A_PSCNTR: | ||
144 | + /* These are all upcounters of various frequencies. */ | ||
145 | + qemu_log_mask(LOG_UNIMP, "MPS2 FPGAIO: counters unimplemented\n"); | ||
146 | + r = 0; | ||
147 | + break; | ||
148 | + default: | ||
149 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
150 | + "MPS2 FPGAIO read: bad offset %x\n", (int) offset); | ||
151 | + r = 0; | ||
152 | + break; | ||
153 | + } | ||
154 | + | ||
155 | + trace_mps2_fpgaio_read(offset, r, size); | ||
156 | + return r; | ||
157 | +} | ||
158 | + | ||
159 | +static void mps2_fpgaio_write(void *opaque, hwaddr offset, uint64_t value, | ||
160 | + unsigned size) | ||
161 | +{ | ||
162 | + MPS2FPGAIO *s = MPS2_FPGAIO(opaque); | ||
163 | + | ||
164 | + trace_mps2_fpgaio_write(offset, value, size); | ||
165 | + | ||
166 | + switch (offset) { | ||
167 | + case A_LED0: | ||
168 | + /* LED bits [1:0] control board LEDs. We don't currently have | ||
169 | + * a mechanism for displaying this graphically, so use a trace event. | ||
170 | + */ | ||
171 | + trace_mps2_fpgaio_leds(value & 0x02 ? '*' : '.', | ||
172 | + value & 0x01 ? '*' : '.'); | ||
173 | + s->led0 = value & 0x3; | ||
174 | + break; | ||
175 | + case A_PRESCALE: | ||
176 | + s->prescale = value; | ||
177 | + break; | ||
178 | + case A_MISC: | ||
179 | + /* These are control bits for some of the other devices on the | ||
180 | + * board (SPI, CLCD, etc). We don't implement that yet, so just | ||
181 | + * make the bits read as written. | ||
182 | + */ | ||
183 | + qemu_log_mask(LOG_UNIMP, | ||
184 | + "MPS2 FPGAIO: MISC control bits unimplemented\n"); | ||
185 | + s->misc = value; | ||
186 | + break; | ||
187 | + default: | ||
188 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
189 | + "MPS2 FPGAIO write: bad offset 0x%x\n", (int) offset); | ||
190 | + break; | ||
191 | + } | ||
192 | +} | ||
193 | + | ||
194 | +static const MemoryRegionOps mps2_fpgaio_ops = { | ||
195 | + .read = mps2_fpgaio_read, | ||
196 | + .write = mps2_fpgaio_write, | ||
197 | + .endianness = DEVICE_LITTLE_ENDIAN, | ||
198 | +}; | ||
199 | + | ||
200 | +static void mps2_fpgaio_reset(DeviceState *dev) | ||
201 | +{ | ||
202 | + MPS2FPGAIO *s = MPS2_FPGAIO(dev); | ||
203 | + | ||
204 | + trace_mps2_fpgaio_reset(); | ||
205 | + s->led0 = 0; | ||
206 | + s->prescale = 0; | ||
207 | + s->misc = 0; | ||
208 | +} | ||
209 | + | ||
210 | +static void mps2_fpgaio_init(Object *obj) | ||
211 | +{ | ||
212 | + SysBusDevice *sbd = SYS_BUS_DEVICE(obj); | ||
213 | + MPS2FPGAIO *s = MPS2_FPGAIO(obj); | ||
214 | + | ||
215 | + memory_region_init_io(&s->iomem, obj, &mps2_fpgaio_ops, s, | ||
216 | + "mps2-fpgaio", 0x1000); | ||
217 | + sysbus_init_mmio(sbd, &s->iomem); | ||
218 | +} | ||
219 | + | ||
220 | +static const VMStateDescription mps2_fpgaio_vmstate = { | ||
221 | + .name = "mps2-fpgaio", | ||
222 | + .version_id = 1, | ||
223 | + .minimum_version_id = 1, | ||
224 | + .fields = (VMStateField[]) { | ||
225 | + VMSTATE_UINT32(led0, MPS2FPGAIO), | ||
226 | + VMSTATE_UINT32(prescale, MPS2FPGAIO), | ||
227 | + VMSTATE_UINT32(misc, MPS2FPGAIO), | ||
228 | + VMSTATE_END_OF_LIST() | ||
229 | + } | ||
230 | +}; | ||
231 | + | ||
232 | +static Property mps2_fpgaio_properties[] = { | ||
233 | + /* Frequency of the prescale counter */ | ||
234 | + DEFINE_PROP_UINT32("prescale-clk", MPS2FPGAIO, prescale_clk, 20000000), | ||
235 | + DEFINE_PROP_END_OF_LIST(), | ||
236 | +}; | ||
237 | + | ||
238 | +static void mps2_fpgaio_class_init(ObjectClass *klass, void *data) | ||
239 | +{ | ||
240 | + DeviceClass *dc = DEVICE_CLASS(klass); | ||
241 | + | ||
242 | + dc->vmsd = &mps2_fpgaio_vmstate; | ||
243 | + dc->reset = mps2_fpgaio_reset; | ||
244 | + dc->props = mps2_fpgaio_properties; | ||
245 | +} | ||
246 | + | ||
247 | +static const TypeInfo mps2_fpgaio_info = { | ||
248 | + .name = TYPE_MPS2_FPGAIO, | ||
249 | + .parent = TYPE_SYS_BUS_DEVICE, | ||
250 | + .instance_size = sizeof(MPS2FPGAIO), | ||
251 | + .instance_init = mps2_fpgaio_init, | ||
252 | + .class_init = mps2_fpgaio_class_init, | ||
253 | +}; | ||
254 | + | ||
255 | +static void mps2_fpgaio_register_types(void) | ||
256 | +{ | ||
257 | + type_register_static(&mps2_fpgaio_info); | ||
258 | +} | ||
259 | + | ||
260 | +type_init(mps2_fpgaio_register_types); | ||
261 | diff --git a/default-configs/arm-softmmu.mak b/default-configs/arm-softmmu.mak | ||
262 | index XXXXXXX..XXXXXXX 100644 | ||
263 | --- a/default-configs/arm-softmmu.mak | ||
264 | +++ b/default-configs/arm-softmmu.mak | ||
265 | @@ -XXX,XX +XXX,XX @@ CONFIG_STM32F205_SOC=y | ||
266 | CONFIG_CMSDK_APB_TIMER=y | ||
267 | CONFIG_CMSDK_APB_UART=y | ||
268 | |||
269 | +CONFIG_MPS2_FPGAIO=y | ||
270 | CONFIG_MPS2_SCC=y | ||
271 | |||
272 | CONFIG_VERSATILE_PCI=y | ||
273 | diff --git a/hw/misc/trace-events b/hw/misc/trace-events | ||
274 | index XXXXXXX..XXXXXXX 100644 | ||
275 | --- a/hw/misc/trace-events | ||
276 | +++ b/hw/misc/trace-events | ||
277 | @@ -XXX,XX +XXX,XX @@ mps2_scc_leds(char led7, char led6, char led5, char led4, char led3, char led2, | ||
278 | mps2_scc_cfg_write(unsigned function, unsigned device, uint32_t value) "MPS2 SCC config write: function %d device %d data 0x%" PRIx32 | ||
279 | mps2_scc_cfg_read(unsigned function, unsigned device, uint32_t value) "MPS2 SCC config read: function %d device %d data 0x%" PRIx32 | ||
280 | |||
281 | +# hw/misc/mps2_fpgaio.c | ||
282 | +mps2_fpgaio_read(uint64_t offset, uint64_t data, unsigned size) "MPS2 FPGAIO read: offset 0x%" PRIx64 " data 0x%" PRIx64 " size %u" | ||
283 | +mps2_fpgaio_write(uint64_t offset, uint64_t data, unsigned size) "MPS2 FPGAIO write: offset 0x%" PRIx64 " data 0x%" PRIx64 " size %u" | ||
284 | +mps2_fpgaio_reset(void) "MPS2 FPGAIO: reset" | ||
285 | +mps2_fpgaio_leds(char led1, char led0) "MPS2 FPGAIO LEDs: %c%c" | ||
286 | + | ||
287 | # hw/misc/msf2-sysreg.c | ||
288 | msf2_sysreg_write(uint64_t offset, uint32_t val, uint32_t prev) "msf2-sysreg write: addr 0x%08" HWADDR_PRIx " data 0x%" PRIx32 " prev 0x%" PRIx32 | ||
289 | msf2_sysreg_read(uint64_t offset, uint32_t val) "msf2-sysreg read: addr 0x%08" HWADDR_PRIx " data 0x%08" PRIx32 | ||
290 | -- | 27 | -- |
291 | 2.16.2 | 28 | 2.20.1 |
292 | 29 | ||
293 | 30 | diff view generated by jsdifflib |
1 | Instead of loading guest images to the system address space, use the | 1 | Zero-initialize sockaddr_in and sockaddr_un structs that we're about |
---|---|---|---|
2 | CPU's address space. This is important if we're trying to load the | 2 | to fill in and pass to bind() or connect(), to ensure we don't leave |
3 | file to memory or via an alias memory region that is provided by an | 3 | possible implementation-defined extension fields as uninitialized |
4 | SoC object and thus not mapped into the system address space. | 4 | garbage. |
5 | 5 | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 7 | Reviewed-by: Eric Blake <eblake@redhat.com> |
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 8 | Message-id: 20210813150506.7768-5-peter.maydell@linaro.org |
9 | Message-id: 20180220180325.29818-4-peter.maydell@linaro.org | ||
10 | --- | 9 | --- |
11 | hw/arm/armv7m.c | 17 ++++++++++++++--- | 10 | tests/tcg/multiarch/linux-test.c | 4 ++-- |
12 | 1 file changed, 14 insertions(+), 3 deletions(-) | 11 | 1 file changed, 2 insertions(+), 2 deletions(-) |
13 | 12 | ||
14 | diff --git a/hw/arm/armv7m.c b/hw/arm/armv7m.c | 13 | diff --git a/tests/tcg/multiarch/linux-test.c b/tests/tcg/multiarch/linux-test.c |
15 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/hw/arm/armv7m.c | 15 | --- a/tests/tcg/multiarch/linux-test.c |
17 | +++ b/hw/arm/armv7m.c | 16 | +++ b/tests/tcg/multiarch/linux-test.c |
18 | @@ -XXX,XX +XXX,XX @@ void armv7m_load_kernel(ARMCPU *cpu, const char *kernel_filename, int mem_size) | 17 | @@ -XXX,XX +XXX,XX @@ static void test_time(void) |
19 | uint64_t entry; | 18 | static int server_socket(void) |
20 | uint64_t lowaddr; | 19 | { |
21 | int big_endian; | 20 | int val, fd; |
22 | + AddressSpace *as; | 21 | - struct sockaddr_in sockaddr; |
23 | + int asidx; | 22 | + struct sockaddr_in sockaddr = {}; |
24 | + CPUState *cs = CPU(cpu); | 23 | |
25 | 24 | /* server socket */ | |
26 | #ifdef TARGET_WORDS_BIGENDIAN | 25 | fd = chk_error(socket(PF_INET, SOCK_STREAM, 0)); |
27 | big_endian = 1; | 26 | @@ -XXX,XX +XXX,XX @@ static int server_socket(void) |
28 | @@ -XXX,XX +XXX,XX @@ void armv7m_load_kernel(ARMCPU *cpu, const char *kernel_filename, int mem_size) | 27 | static int client_socket(uint16_t port) |
29 | exit(1); | 28 | { |
30 | } | 29 | int fd; |
31 | 30 | - struct sockaddr_in sockaddr; | |
32 | + if (arm_feature(&cpu->env, ARM_FEATURE_EL3)) { | 31 | + struct sockaddr_in sockaddr = {}; |
33 | + asidx = ARMASIdx_S; | 32 | |
34 | + } else { | 33 | /* server socket */ |
35 | + asidx = ARMASIdx_NS; | 34 | fd = chk_error(socket(PF_INET, SOCK_STREAM, 0)); |
36 | + } | ||
37 | + as = cpu_get_address_space(cs, asidx); | ||
38 | + | ||
39 | if (kernel_filename) { | ||
40 | - image_size = load_elf(kernel_filename, NULL, NULL, &entry, &lowaddr, | ||
41 | - NULL, big_endian, EM_ARM, 1, 0); | ||
42 | + image_size = load_elf_as(kernel_filename, NULL, NULL, &entry, &lowaddr, | ||
43 | + NULL, big_endian, EM_ARM, 1, 0, as); | ||
44 | if (image_size < 0) { | ||
45 | - image_size = load_image_targphys(kernel_filename, 0, mem_size); | ||
46 | + image_size = load_image_targphys_as(kernel_filename, 0, | ||
47 | + mem_size, as); | ||
48 | lowaddr = 0; | ||
49 | } | ||
50 | if (image_size < 0) { | ||
51 | -- | 35 | -- |
52 | 2.16.2 | 36 | 2.20.1 |
53 | 37 | ||
54 | 38 | diff view generated by jsdifflib |
1 | Add a Cortex-M33 definition. The M33 is an M profile CPU | 1 | The SoC realize can fail for legitimate reasons, because it propagates |
---|---|---|---|
2 | which implements the ARM v8M architecture, including the | 2 | errors up from CPU realize, which in turn can be provoked by user |
3 | M profile Security Extension. | 3 | error in setting commandline options. Use error_fatal so we report |
4 | the error message to the user and exit, rather than asserting | ||
5 | via error_abort. | ||
4 | 6 | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
7 | Message-id: 20180220180325.29818-9-peter.maydell@linaro.org | 9 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
10 | Message-id: 20210816135842.25302-2-peter.maydell@linaro.org | ||
8 | --- | 11 | --- |
9 | target/arm/cpu.c | 31 +++++++++++++++++++++++++++++++ | 12 | hw/arm/raspi.c | 2 +- |
10 | 1 file changed, 31 insertions(+) | 13 | 1 file changed, 1 insertion(+), 1 deletion(-) |
11 | 14 | ||
12 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | 15 | diff --git a/hw/arm/raspi.c b/hw/arm/raspi.c |
13 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
14 | --- a/target/arm/cpu.c | 17 | --- a/hw/arm/raspi.c |
15 | +++ b/target/arm/cpu.c | 18 | +++ b/hw/arm/raspi.c |
16 | @@ -XXX,XX +XXX,XX @@ static void cortex_m4_initfn(Object *obj) | 19 | @@ -XXX,XX +XXX,XX @@ static void raspi_machine_init(MachineState *machine) |
17 | cpu->id_isar5 = 0x00000000; | 20 | object_property_add_const_link(OBJECT(&s->soc), "ram", OBJECT(machine->ram)); |
18 | } | 21 | object_property_set_int(OBJECT(&s->soc), "board-rev", board_rev, |
19 | 22 | &error_abort); | |
20 | +static void cortex_m33_initfn(Object *obj) | 23 | - qdev_realize(DEVICE(&s->soc), NULL, &error_abort); |
21 | +{ | 24 | + qdev_realize(DEVICE(&s->soc), NULL, &error_fatal); |
22 | + ARMCPU *cpu = ARM_CPU(obj); | 25 | |
23 | + | 26 | /* Create and plug in the SD cards */ |
24 | + set_feature(&cpu->env, ARM_FEATURE_V8); | 27 | di = drive_get_next(IF_SD); |
25 | + set_feature(&cpu->env, ARM_FEATURE_M); | ||
26 | + set_feature(&cpu->env, ARM_FEATURE_M_SECURITY); | ||
27 | + set_feature(&cpu->env, ARM_FEATURE_THUMB_DSP); | ||
28 | + cpu->midr = 0x410fd213; /* r0p3 */ | ||
29 | + cpu->pmsav7_dregion = 16; | ||
30 | + cpu->sau_sregion = 8; | ||
31 | + cpu->id_pfr0 = 0x00000030; | ||
32 | + cpu->id_pfr1 = 0x00000210; | ||
33 | + cpu->id_dfr0 = 0x00200000; | ||
34 | + cpu->id_afr0 = 0x00000000; | ||
35 | + cpu->id_mmfr0 = 0x00101F40; | ||
36 | + cpu->id_mmfr1 = 0x00000000; | ||
37 | + cpu->id_mmfr2 = 0x01000000; | ||
38 | + cpu->id_mmfr3 = 0x00000000; | ||
39 | + cpu->id_isar0 = 0x01101110; | ||
40 | + cpu->id_isar1 = 0x02212000; | ||
41 | + cpu->id_isar2 = 0x20232232; | ||
42 | + cpu->id_isar3 = 0x01111131; | ||
43 | + cpu->id_isar4 = 0x01310132; | ||
44 | + cpu->id_isar5 = 0x00000000; | ||
45 | + cpu->clidr = 0x00000000; | ||
46 | + cpu->ctr = 0x8000c000; | ||
47 | +} | ||
48 | + | ||
49 | static void arm_v7m_class_init(ObjectClass *oc, void *data) | ||
50 | { | ||
51 | CPUClass *cc = CPU_CLASS(oc); | ||
52 | @@ -XXX,XX +XXX,XX @@ static const ARMCPUInfo arm_cpus[] = { | ||
53 | .class_init = arm_v7m_class_init }, | ||
54 | { .name = "cortex-m4", .initfn = cortex_m4_initfn, | ||
55 | .class_init = arm_v7m_class_init }, | ||
56 | + { .name = "cortex-m33", .initfn = cortex_m33_initfn, | ||
57 | + .class_init = arm_v7m_class_init }, | ||
58 | { .name = "cortex-r5", .initfn = cortex_r5_initfn }, | ||
59 | { .name = "cortex-a7", .initfn = cortex_a7_initfn }, | ||
60 | { .name = "cortex-a8", .initfn = cortex_a8_initfn }, | ||
61 | -- | 28 | -- |
62 | 2.16.2 | 29 | 2.20.1 |
63 | 30 | ||
64 | 31 | diff view generated by jsdifflib |
1 | Create an "init-svtor" property on the armv7m container | 1 | KVM cannot support multiple address spaces per CPU; if you try to |
---|---|---|---|
2 | object which we can forward to the CPU object. | 2 | create more than one then cpu_address_space_init() will assert. |
3 | 3 | ||
4 | In the Arm CPU realize function, detect the configurations which | ||
5 | would cause us to need more than one AS, and cleanly fail the | ||
6 | realize rather than blundering on into the assertion. This | ||
7 | turns this: | ||
8 | $ qemu-system-aarch64 -enable-kvm -display none -cpu max -machine raspi3b | ||
9 | qemu-system-aarch64: ../../softmmu/physmem.c:747: cpu_address_space_init: Assertion `asidx == 0 || !kvm_enabled()' failed. | ||
10 | Aborted | ||
11 | |||
12 | into: | ||
13 | $ qemu-system-aarch64 -enable-kvm -display none -machine raspi3b | ||
14 | qemu-system-aarch64: Cannot enable KVM when guest CPU has EL3 enabled | ||
15 | |||
16 | and this: | ||
17 | $ qemu-system-aarch64 -enable-kvm -display none -machine mps3-an524 | ||
18 | qemu-system-aarch64: ../../softmmu/physmem.c:747: cpu_address_space_init: Assertion `asidx == 0 || !kvm_enabled()' failed. | ||
19 | Aborted | ||
20 | |||
21 | into: | ||
22 | $ qemu-system-aarch64 -enable-kvm -display none -machine mps3-an524 | ||
23 | qemu-system-aarch64: Cannot enable KVM when using an M-profile guest CPU | ||
24 | |||
25 | Fixes: https://gitlab.com/qemu-project/qemu/-/issues/528 | ||
4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 26 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
5 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 27 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
6 | Message-id: 20180220180325.29818-8-peter.maydell@linaro.org | 28 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
29 | Message-id: 20210816135842.25302-3-peter.maydell@linaro.org | ||
7 | --- | 30 | --- |
8 | include/hw/arm/armv7m.h | 2 ++ | 31 | target/arm/cpu.c | 23 +++++++++++++++++++++++ |
9 | hw/arm/armv7m.c | 9 +++++++++ | 32 | 1 file changed, 23 insertions(+) |
10 | 2 files changed, 11 insertions(+) | ||
11 | 33 | ||
12 | diff --git a/include/hw/arm/armv7m.h b/include/hw/arm/armv7m.h | 34 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c |
13 | index XXXXXXX..XXXXXXX 100644 | 35 | index XXXXXXX..XXXXXXX 100644 |
14 | --- a/include/hw/arm/armv7m.h | 36 | --- a/target/arm/cpu.c |
15 | +++ b/include/hw/arm/armv7m.h | 37 | +++ b/target/arm/cpu.c |
16 | @@ -XXX,XX +XXX,XX @@ typedef struct { | 38 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_realizefn(DeviceState *dev, Error **errp) |
17 | * that CPU accesses see. (The NVIC, bitbanding and other CPU-internal | ||
18 | * devices will be automatically layered on top of this view.) | ||
19 | * + Property "idau": IDAU interface (forwarded to CPU object) | ||
20 | + * + Property "init-svtor": secure VTOR reset value (forwarded to CPU object) | ||
21 | */ | ||
22 | typedef struct ARMv7MState { | ||
23 | /*< private >*/ | ||
24 | @@ -XXX,XX +XXX,XX @@ typedef struct ARMv7MState { | ||
25 | /* MemoryRegion the board provides to us (with its devices, RAM, etc) */ | ||
26 | MemoryRegion *board_memory; | ||
27 | Object *idau; | ||
28 | + uint32_t init_svtor; | ||
29 | } ARMv7MState; | ||
30 | |||
31 | #endif | ||
32 | diff --git a/hw/arm/armv7m.c b/hw/arm/armv7m.c | ||
33 | index XXXXXXX..XXXXXXX 100644 | ||
34 | --- a/hw/arm/armv7m.c | ||
35 | +++ b/hw/arm/armv7m.c | ||
36 | @@ -XXX,XX +XXX,XX @@ static void armv7m_realize(DeviceState *dev, Error **errp) | ||
37 | return; | ||
38 | } | 39 | } |
39 | } | 40 | } |
40 | + if (object_property_find(OBJECT(s->cpu), "init-svtor", NULL)) { | 41 | |
41 | + object_property_set_uint(OBJECT(s->cpu), s->init_svtor, | 42 | + if (kvm_enabled()) { |
42 | + "init-svtor", &err); | 43 | + /* |
43 | + if (err != NULL) { | 44 | + * Catch all the cases which might cause us to create more than one |
44 | + error_propagate(errp, err); | 45 | + * address space for the CPU (otherwise we will assert() later in |
46 | + * cpu_address_space_init()). | ||
47 | + */ | ||
48 | + if (arm_feature(env, ARM_FEATURE_M)) { | ||
49 | + error_setg(errp, | ||
50 | + "Cannot enable KVM when using an M-profile guest CPU"); | ||
51 | + return; | ||
52 | + } | ||
53 | + if (cpu->has_el3) { | ||
54 | + error_setg(errp, | ||
55 | + "Cannot enable KVM when guest CPU has EL3 enabled"); | ||
56 | + return; | ||
57 | + } | ||
58 | + if (cpu->tag_memory) { | ||
59 | + error_setg(errp, | ||
60 | + "Cannot enable KVM when guest CPUs has MTE enabled"); | ||
45 | + return; | 61 | + return; |
46 | + } | 62 | + } |
47 | + } | 63 | + } |
48 | object_property_set_bool(OBJECT(s->cpu), true, "realized", &err); | 64 | + |
49 | if (err != NULL) { | 65 | { |
50 | error_propagate(errp, err); | 66 | uint64_t scale; |
51 | @@ -XXX,XX +XXX,XX @@ static Property armv7m_properties[] = { | ||
52 | DEFINE_PROP_LINK("memory", ARMv7MState, board_memory, TYPE_MEMORY_REGION, | ||
53 | MemoryRegion *), | ||
54 | DEFINE_PROP_LINK("idau", ARMv7MState, idau, TYPE_IDAU_INTERFACE, Object *), | ||
55 | + DEFINE_PROP_UINT32("init-svtor", ARMv7MState, init_svtor, 0), | ||
56 | DEFINE_PROP_END_OF_LIST(), | ||
57 | }; | ||
58 | 67 | ||
59 | -- | 68 | -- |
60 | 2.16.2 | 69 | 2.20.1 |
61 | 70 | ||
62 | 71 | diff view generated by jsdifflib |
1 | Instead of loading kernels, device trees, and the like to | 1 | Now that the CPU realize function will fail cleanly if we ask for EL3 |
---|---|---|---|
2 | the system address space, use the CPU's address space. This | 2 | when KVM is enabled, we don't need to check for errors explicitly in |
3 | is important if we're trying to load the file to memory or | 3 | the virt board code. The reported message is slightly different; |
4 | via an alias memory region that is provided by an SoC | 4 | it is now: |
5 | object and thus not mapped into the system address space. | 5 | qemu-system-aarch64: Cannot enable KVM when guest CPU has EL3 enabled |
6 | instead of: | ||
7 | qemu-system-aarch64: mach-virt: KVM does not support Security extensions | ||
8 | |||
9 | We don't delete the MTE check because there the logic is more | ||
10 | complex; deleting the check would work but makes the error message | ||
11 | less helpful, as it would read: | ||
12 | qemu-system-aarch64: MTE requested, but not supported by the guest CPU | ||
13 | instead of: | ||
14 | qemu-system-aarch64: mach-virt: KVM does not support providing MTE to the guest CPU | ||
6 | 15 | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
17 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 18 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 19 | Message-id: 20210816135842.25302-4-peter.maydell@linaro.org |
10 | Message-id: 20180220180325.29818-3-peter.maydell@linaro.org | ||
11 | --- | 20 | --- |
12 | hw/arm/boot.c | 119 +++++++++++++++++++++++++++++++++++++--------------------- | 21 | hw/arm/virt.c | 5 ----- |
13 | 1 file changed, 76 insertions(+), 43 deletions(-) | 22 | 1 file changed, 5 deletions(-) |
14 | 23 | ||
15 | diff --git a/hw/arm/boot.c b/hw/arm/boot.c | 24 | diff --git a/hw/arm/virt.c b/hw/arm/virt.c |
16 | index XXXXXXX..XXXXXXX 100644 | 25 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/hw/arm/boot.c | 26 | --- a/hw/arm/virt.c |
18 | +++ b/hw/arm/boot.c | 27 | +++ b/hw/arm/virt.c |
19 | @@ -XXX,XX +XXX,XX @@ | 28 | @@ -XXX,XX +XXX,XX @@ static void machvirt_init(MachineState *machine) |
20 | #define ARM64_TEXT_OFFSET_OFFSET 8 | ||
21 | #define ARM64_MAGIC_OFFSET 56 | ||
22 | |||
23 | +static AddressSpace *arm_boot_address_space(ARMCPU *cpu, | ||
24 | + const struct arm_boot_info *info) | ||
25 | +{ | ||
26 | + /* Return the address space to use for bootloader reads and writes. | ||
27 | + * We prefer the secure address space if the CPU has it and we're | ||
28 | + * going to boot the guest into it. | ||
29 | + */ | ||
30 | + int asidx; | ||
31 | + CPUState *cs = CPU(cpu); | ||
32 | + | ||
33 | + if (arm_feature(&cpu->env, ARM_FEATURE_EL3) && info->secure_boot) { | ||
34 | + asidx = ARMASIdx_S; | ||
35 | + } else { | ||
36 | + asidx = ARMASIdx_NS; | ||
37 | + } | ||
38 | + | ||
39 | + return cpu_get_address_space(cs, asidx); | ||
40 | +} | ||
41 | + | ||
42 | typedef enum { | ||
43 | FIXUP_NONE = 0, /* do nothing */ | ||
44 | FIXUP_TERMINATOR, /* end of insns */ | ||
45 | @@ -XXX,XX +XXX,XX @@ static const ARMInsnFixup smpboot[] = { | ||
46 | }; | ||
47 | |||
48 | static void write_bootloader(const char *name, hwaddr addr, | ||
49 | - const ARMInsnFixup *insns, uint32_t *fixupcontext) | ||
50 | + const ARMInsnFixup *insns, uint32_t *fixupcontext, | ||
51 | + AddressSpace *as) | ||
52 | { | ||
53 | /* Fix up the specified bootloader fragment and write it into | ||
54 | * guest memory using rom_add_blob_fixed(). fixupcontext is | ||
55 | @@ -XXX,XX +XXX,XX @@ static void write_bootloader(const char *name, hwaddr addr, | ||
56 | code[i] = tswap32(insn); | ||
57 | } | 29 | } |
58 | 30 | ||
59 | - rom_add_blob_fixed(name, code, len * sizeof(uint32_t), addr); | 31 | if (vms->secure) { |
60 | + rom_add_blob_fixed_as(name, code, len * sizeof(uint32_t), addr, as); | 32 | - if (kvm_enabled()) { |
61 | 33 | - error_report("mach-virt: KVM does not support Security extensions"); | |
62 | g_free(code); | 34 | - exit(1); |
63 | } | 35 | - } |
64 | @@ -XXX,XX +XXX,XX @@ static void default_write_secondary(ARMCPU *cpu, | 36 | - |
65 | const struct arm_boot_info *info) | 37 | /* |
66 | { | 38 | * The Secure view of the world is the same as the NonSecure, |
67 | uint32_t fixupcontext[FIXUP_MAX]; | 39 | * but with a few extra devices. Create it as a container region |
68 | + AddressSpace *as = arm_boot_address_space(cpu, info); | ||
69 | |||
70 | fixupcontext[FIXUP_GIC_CPU_IF] = info->gic_cpu_if_addr; | ||
71 | fixupcontext[FIXUP_BOOTREG] = info->smp_bootreg_addr; | ||
72 | @@ -XXX,XX +XXX,XX @@ static void default_write_secondary(ARMCPU *cpu, | ||
73 | } | ||
74 | |||
75 | write_bootloader("smpboot", info->smp_loader_start, | ||
76 | - smpboot, fixupcontext); | ||
77 | + smpboot, fixupcontext, as); | ||
78 | } | ||
79 | |||
80 | void arm_write_secure_board_setup_dummy_smc(ARMCPU *cpu, | ||
81 | const struct arm_boot_info *info, | ||
82 | hwaddr mvbar_addr) | ||
83 | { | ||
84 | + AddressSpace *as = arm_boot_address_space(cpu, info); | ||
85 | int n; | ||
86 | uint32_t mvbar_blob[] = { | ||
87 | /* mvbar_addr: secure monitor vectors | ||
88 | @@ -XXX,XX +XXX,XX @@ void arm_write_secure_board_setup_dummy_smc(ARMCPU *cpu, | ||
89 | for (n = 0; n < ARRAY_SIZE(mvbar_blob); n++) { | ||
90 | mvbar_blob[n] = tswap32(mvbar_blob[n]); | ||
91 | } | ||
92 | - rom_add_blob_fixed("board-setup-mvbar", mvbar_blob, sizeof(mvbar_blob), | ||
93 | - mvbar_addr); | ||
94 | + rom_add_blob_fixed_as("board-setup-mvbar", mvbar_blob, sizeof(mvbar_blob), | ||
95 | + mvbar_addr, as); | ||
96 | |||
97 | for (n = 0; n < ARRAY_SIZE(board_setup_blob); n++) { | ||
98 | board_setup_blob[n] = tswap32(board_setup_blob[n]); | ||
99 | } | ||
100 | - rom_add_blob_fixed("board-setup", board_setup_blob, | ||
101 | - sizeof(board_setup_blob), info->board_setup_addr); | ||
102 | + rom_add_blob_fixed_as("board-setup", board_setup_blob, | ||
103 | + sizeof(board_setup_blob), info->board_setup_addr, as); | ||
104 | } | ||
105 | |||
106 | static void default_reset_secondary(ARMCPU *cpu, | ||
107 | const struct arm_boot_info *info) | ||
108 | { | ||
109 | + AddressSpace *as = arm_boot_address_space(cpu, info); | ||
110 | CPUState *cs = CPU(cpu); | ||
111 | |||
112 | - address_space_stl_notdirty(&address_space_memory, info->smp_bootreg_addr, | ||
113 | + address_space_stl_notdirty(as, info->smp_bootreg_addr, | ||
114 | 0, MEMTXATTRS_UNSPECIFIED, NULL); | ||
115 | cpu_set_pc(cs, info->smp_loader_start); | ||
116 | } | ||
117 | @@ -XXX,XX +XXX,XX @@ static inline bool have_dtb(const struct arm_boot_info *info) | ||
118 | } | ||
119 | |||
120 | #define WRITE_WORD(p, value) do { \ | ||
121 | - address_space_stl_notdirty(&address_space_memory, p, value, \ | ||
122 | + address_space_stl_notdirty(as, p, value, \ | ||
123 | MEMTXATTRS_UNSPECIFIED, NULL); \ | ||
124 | p += 4; \ | ||
125 | } while (0) | ||
126 | |||
127 | -static void set_kernel_args(const struct arm_boot_info *info) | ||
128 | +static void set_kernel_args(const struct arm_boot_info *info, AddressSpace *as) | ||
129 | { | ||
130 | int initrd_size = info->initrd_size; | ||
131 | hwaddr base = info->loader_start; | ||
132 | @@ -XXX,XX +XXX,XX @@ static void set_kernel_args(const struct arm_boot_info *info) | ||
133 | int cmdline_size; | ||
134 | |||
135 | cmdline_size = strlen(info->kernel_cmdline); | ||
136 | - cpu_physical_memory_write(p + 8, info->kernel_cmdline, | ||
137 | - cmdline_size + 1); | ||
138 | + address_space_write(as, p + 8, MEMTXATTRS_UNSPECIFIED, | ||
139 | + (const uint8_t *)info->kernel_cmdline, | ||
140 | + cmdline_size + 1); | ||
141 | cmdline_size = (cmdline_size >> 2) + 1; | ||
142 | WRITE_WORD(p, cmdline_size + 2); | ||
143 | WRITE_WORD(p, 0x54410009); | ||
144 | @@ -XXX,XX +XXX,XX @@ static void set_kernel_args(const struct arm_boot_info *info) | ||
145 | atag_board_len = (info->atag_board(info, atag_board_buf) + 3) & ~3; | ||
146 | WRITE_WORD(p, (atag_board_len + 8) >> 2); | ||
147 | WRITE_WORD(p, 0x414f4d50); | ||
148 | - cpu_physical_memory_write(p, atag_board_buf, atag_board_len); | ||
149 | + address_space_write(as, p, MEMTXATTRS_UNSPECIFIED, | ||
150 | + atag_board_buf, atag_board_len); | ||
151 | p += atag_board_len; | ||
152 | } | ||
153 | /* ATAG_END */ | ||
154 | @@ -XXX,XX +XXX,XX @@ static void set_kernel_args(const struct arm_boot_info *info) | ||
155 | WRITE_WORD(p, 0); | ||
156 | } | ||
157 | |||
158 | -static void set_kernel_args_old(const struct arm_boot_info *info) | ||
159 | +static void set_kernel_args_old(const struct arm_boot_info *info, | ||
160 | + AddressSpace *as) | ||
161 | { | ||
162 | hwaddr p; | ||
163 | const char *s; | ||
164 | @@ -XXX,XX +XXX,XX @@ static void set_kernel_args_old(const struct arm_boot_info *info) | ||
165 | } | ||
166 | s = info->kernel_cmdline; | ||
167 | if (s) { | ||
168 | - cpu_physical_memory_write(p, s, strlen(s) + 1); | ||
169 | + address_space_write(as, p, MEMTXATTRS_UNSPECIFIED, | ||
170 | + (const uint8_t *)s, strlen(s) + 1); | ||
171 | } else { | ||
172 | WRITE_WORD(p, 0); | ||
173 | } | ||
174 | @@ -XXX,XX +XXX,XX @@ static void fdt_add_psci_node(void *fdt) | ||
175 | * @addr: the address to load the image at | ||
176 | * @binfo: struct describing the boot environment | ||
177 | * @addr_limit: upper limit of the available memory area at @addr | ||
178 | + * @as: address space to load image to | ||
179 | * | ||
180 | * Load a device tree supplied by the machine or by the user with the | ||
181 | * '-dtb' command line option, and put it at offset @addr in target | ||
182 | @@ -XXX,XX +XXX,XX @@ static void fdt_add_psci_node(void *fdt) | ||
183 | * Note: Must not be called unless have_dtb(binfo) is true. | ||
184 | */ | ||
185 | static int load_dtb(hwaddr addr, const struct arm_boot_info *binfo, | ||
186 | - hwaddr addr_limit) | ||
187 | + hwaddr addr_limit, AddressSpace *as) | ||
188 | { | ||
189 | void *fdt = NULL; | ||
190 | int size, rc; | ||
191 | @@ -XXX,XX +XXX,XX @@ static int load_dtb(hwaddr addr, const struct arm_boot_info *binfo, | ||
192 | /* Put the DTB into the memory map as a ROM image: this will ensure | ||
193 | * the DTB is copied again upon reset, even if addr points into RAM. | ||
194 | */ | ||
195 | - rom_add_blob_fixed("dtb", fdt, size, addr); | ||
196 | + rom_add_blob_fixed_as("dtb", fdt, size, addr, as); | ||
197 | |||
198 | g_free(fdt); | ||
199 | |||
200 | @@ -XXX,XX +XXX,XX @@ static void do_cpu_reset(void *opaque) | ||
201 | } | ||
202 | |||
203 | if (cs == first_cpu) { | ||
204 | + AddressSpace *as = arm_boot_address_space(cpu, info); | ||
205 | + | ||
206 | cpu_set_pc(cs, info->loader_start); | ||
207 | |||
208 | if (!have_dtb(info)) { | ||
209 | if (old_param) { | ||
210 | - set_kernel_args_old(info); | ||
211 | + set_kernel_args_old(info, as); | ||
212 | } else { | ||
213 | - set_kernel_args(info); | ||
214 | + set_kernel_args(info, as); | ||
215 | } | ||
216 | } | ||
217 | } else { | ||
218 | @@ -XXX,XX +XXX,XX @@ static int do_arm_linux_init(Object *obj, void *opaque) | ||
219 | |||
220 | static uint64_t arm_load_elf(struct arm_boot_info *info, uint64_t *pentry, | ||
221 | uint64_t *lowaddr, uint64_t *highaddr, | ||
222 | - int elf_machine) | ||
223 | + int elf_machine, AddressSpace *as) | ||
224 | { | ||
225 | bool elf_is64; | ||
226 | union { | ||
227 | @@ -XXX,XX +XXX,XX @@ static uint64_t arm_load_elf(struct arm_boot_info *info, uint64_t *pentry, | ||
228 | } | ||
229 | } | ||
230 | |||
231 | - ret = load_elf(info->kernel_filename, NULL, NULL, | ||
232 | - pentry, lowaddr, highaddr, big_endian, elf_machine, | ||
233 | - 1, data_swab); | ||
234 | + ret = load_elf_as(info->kernel_filename, NULL, NULL, | ||
235 | + pentry, lowaddr, highaddr, big_endian, elf_machine, | ||
236 | + 1, data_swab, as); | ||
237 | if (ret <= 0) { | ||
238 | /* The header loaded but the image didn't */ | ||
239 | exit(1); | ||
240 | @@ -XXX,XX +XXX,XX @@ static uint64_t arm_load_elf(struct arm_boot_info *info, uint64_t *pentry, | ||
241 | } | ||
242 | |||
243 | static uint64_t load_aarch64_image(const char *filename, hwaddr mem_base, | ||
244 | - hwaddr *entry) | ||
245 | + hwaddr *entry, AddressSpace *as) | ||
246 | { | ||
247 | hwaddr kernel_load_offset = KERNEL64_LOAD_ADDR; | ||
248 | uint8_t *buffer; | ||
249 | @@ -XXX,XX +XXX,XX @@ static uint64_t load_aarch64_image(const char *filename, hwaddr mem_base, | ||
250 | } | ||
251 | |||
252 | *entry = mem_base + kernel_load_offset; | ||
253 | - rom_add_blob_fixed(filename, buffer, size, *entry); | ||
254 | + rom_add_blob_fixed_as(filename, buffer, size, *entry, as); | ||
255 | |||
256 | g_free(buffer); | ||
257 | |||
258 | @@ -XXX,XX +XXX,XX @@ static void arm_load_kernel_notify(Notifier *notifier, void *data) | ||
259 | ARMCPU *cpu = n->cpu; | ||
260 | struct arm_boot_info *info = | ||
261 | container_of(n, struct arm_boot_info, load_kernel_notifier); | ||
262 | + AddressSpace *as = arm_boot_address_space(cpu, info); | ||
263 | |||
264 | /* The board code is not supposed to set secure_board_setup unless | ||
265 | * running its code in secure mode is actually possible, and KVM | ||
266 | @@ -XXX,XX +XXX,XX @@ static void arm_load_kernel_notify(Notifier *notifier, void *data) | ||
267 | * the kernel is supposed to be loaded by the bootloader), copy the | ||
268 | * DTB to the base of RAM for the bootloader to pick up. | ||
269 | */ | ||
270 | - if (load_dtb(info->loader_start, info, 0) < 0) { | ||
271 | + if (load_dtb(info->loader_start, info, 0, as) < 0) { | ||
272 | exit(1); | ||
273 | } | ||
274 | } | ||
275 | @@ -XXX,XX +XXX,XX @@ static void arm_load_kernel_notify(Notifier *notifier, void *data) | ||
276 | |||
277 | /* Assume that raw images are linux kernels, and ELF images are not. */ | ||
278 | kernel_size = arm_load_elf(info, &elf_entry, &elf_low_addr, | ||
279 | - &elf_high_addr, elf_machine); | ||
280 | + &elf_high_addr, elf_machine, as); | ||
281 | if (kernel_size > 0 && have_dtb(info)) { | ||
282 | /* If there is still some room left at the base of RAM, try and put | ||
283 | * the DTB there like we do for images loaded with -bios or -pflash. | ||
284 | @@ -XXX,XX +XXX,XX @@ static void arm_load_kernel_notify(Notifier *notifier, void *data) | ||
285 | if (elf_low_addr < info->loader_start) { | ||
286 | elf_low_addr = 0; | ||
287 | } | ||
288 | - if (load_dtb(info->loader_start, info, elf_low_addr) < 0) { | ||
289 | + if (load_dtb(info->loader_start, info, elf_low_addr, as) < 0) { | ||
290 | exit(1); | ||
291 | } | ||
292 | } | ||
293 | } | ||
294 | entry = elf_entry; | ||
295 | if (kernel_size < 0) { | ||
296 | - kernel_size = load_uimage(info->kernel_filename, &entry, NULL, | ||
297 | - &is_linux, NULL, NULL); | ||
298 | + kernel_size = load_uimage_as(info->kernel_filename, &entry, NULL, | ||
299 | + &is_linux, NULL, NULL, as); | ||
300 | } | ||
301 | if (arm_feature(&cpu->env, ARM_FEATURE_AARCH64) && kernel_size < 0) { | ||
302 | kernel_size = load_aarch64_image(info->kernel_filename, | ||
303 | - info->loader_start, &entry); | ||
304 | + info->loader_start, &entry, as); | ||
305 | is_linux = 1; | ||
306 | } else if (kernel_size < 0) { | ||
307 | /* 32-bit ARM */ | ||
308 | entry = info->loader_start + KERNEL_LOAD_ADDR; | ||
309 | - kernel_size = load_image_targphys(info->kernel_filename, entry, | ||
310 | - info->ram_size - KERNEL_LOAD_ADDR); | ||
311 | + kernel_size = load_image_targphys_as(info->kernel_filename, entry, | ||
312 | + info->ram_size - KERNEL_LOAD_ADDR, | ||
313 | + as); | ||
314 | is_linux = 1; | ||
315 | } | ||
316 | if (kernel_size < 0) { | ||
317 | @@ -XXX,XX +XXX,XX @@ static void arm_load_kernel_notify(Notifier *notifier, void *data) | ||
318 | uint32_t fixupcontext[FIXUP_MAX]; | ||
319 | |||
320 | if (info->initrd_filename) { | ||
321 | - initrd_size = load_ramdisk(info->initrd_filename, | ||
322 | - info->initrd_start, | ||
323 | - info->ram_size - | ||
324 | - info->initrd_start); | ||
325 | + initrd_size = load_ramdisk_as(info->initrd_filename, | ||
326 | + info->initrd_start, | ||
327 | + info->ram_size - info->initrd_start, | ||
328 | + as); | ||
329 | if (initrd_size < 0) { | ||
330 | - initrd_size = load_image_targphys(info->initrd_filename, | ||
331 | - info->initrd_start, | ||
332 | - info->ram_size - | ||
333 | - info->initrd_start); | ||
334 | + initrd_size = load_image_targphys_as(info->initrd_filename, | ||
335 | + info->initrd_start, | ||
336 | + info->ram_size - | ||
337 | + info->initrd_start, | ||
338 | + as); | ||
339 | } | ||
340 | if (initrd_size < 0) { | ||
341 | error_report("could not load initrd '%s'", | ||
342 | @@ -XXX,XX +XXX,XX @@ static void arm_load_kernel_notify(Notifier *notifier, void *data) | ||
343 | |||
344 | /* Place the DTB after the initrd in memory with alignment. */ | ||
345 | dtb_start = QEMU_ALIGN_UP(info->initrd_start + initrd_size, align); | ||
346 | - if (load_dtb(dtb_start, info, 0) < 0) { | ||
347 | + if (load_dtb(dtb_start, info, 0, as) < 0) { | ||
348 | exit(1); | ||
349 | } | ||
350 | fixupcontext[FIXUP_ARGPTR] = dtb_start; | ||
351 | @@ -XXX,XX +XXX,XX @@ static void arm_load_kernel_notify(Notifier *notifier, void *data) | ||
352 | fixupcontext[FIXUP_ENTRYPOINT] = entry; | ||
353 | |||
354 | write_bootloader("bootloader", info->loader_start, | ||
355 | - primary_loader, fixupcontext); | ||
356 | + primary_loader, fixupcontext, as); | ||
357 | |||
358 | if (info->nb_cpus > 1) { | ||
359 | info->write_secondary_boot(cpu, info); | ||
360 | -- | 40 | -- |
361 | 2.16.2 | 41 | 2.20.1 |
362 | 42 | ||
363 | 43 | diff view generated by jsdifflib |
1 | The Cortex-M33 allows the system to specify the reset value of the | 1 | In v7, the HSTR register has a TTEE bit which allows EL0/EL1 accesses |
---|---|---|---|
2 | secure Vector Table Offset Register (VTOR) by asserting config | 2 | to the Thumb2EE TEECR and TEEHBR registers to be trapped to the |
3 | signals. In particular, guest images for the MPS2 AN505 board rely | 3 | hypervisor. Implement these traps. |
4 | on the MPS2's initial VTOR being correct for that board. | ||
5 | Implement a QEMU property so board and SoC code can set the reset | ||
6 | value to the correct value. | ||
7 | 4 | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
10 | Message-id: 20180220180325.29818-7-peter.maydell@linaro.org | 7 | Message-id: 20210816180305.20137-2-peter.maydell@linaro.org |
11 | --- | 8 | --- |
12 | target/arm/cpu.h | 3 +++ | 9 | target/arm/cpu.h | 2 ++ |
13 | target/arm/cpu.c | 18 ++++++++++++++---- | 10 | target/arm/helper.c | 18 ++++++++++++++++-- |
14 | 2 files changed, 17 insertions(+), 4 deletions(-) | 11 | 2 files changed, 18 insertions(+), 2 deletions(-) |
15 | 12 | ||
16 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 13 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
17 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/target/arm/cpu.h | 15 | --- a/target/arm/cpu.h |
19 | +++ b/target/arm/cpu.h | 16 | +++ b/target/arm/cpu.h |
20 | @@ -XXX,XX +XXX,XX @@ struct ARMCPU { | 17 | @@ -XXX,XX +XXX,XX @@ static inline void xpsr_write(CPUARMState *env, uint32_t val, uint32_t mask) |
21 | */ | 18 | #define SCR_ENSCXT (1U << 25) |
22 | uint32_t psci_conduit; | 19 | #define SCR_ATA (1U << 26) |
23 | 20 | ||
24 | + /* For v8M, initial value of the Secure VTOR */ | 21 | +#define HSTR_TTEE (1 << 16) |
25 | + uint32_t init_svtor; | ||
26 | + | 22 | + |
27 | /* [QEMU_]KVM_ARM_TARGET_* constant for this CPU, or | 23 | /* Return the current FPSCR value. */ |
28 | * QEMU_KVM_ARM_TARGET_NONE if the kernel doesn't support this CPU type. | 24 | uint32_t vfp_get_fpscr(CPUARMState *env); |
29 | */ | 25 | void vfp_set_fpscr(CPUARMState *env, uint32_t val); |
30 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | 26 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
31 | index XXXXXXX..XXXXXXX 100644 | 27 | index XXXXXXX..XXXXXXX 100644 |
32 | --- a/target/arm/cpu.c | 28 | --- a/target/arm/helper.c |
33 | +++ b/target/arm/cpu.c | 29 | +++ b/target/arm/helper.c |
34 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(CPUState *s) | 30 | @@ -XXX,XX +XXX,XX @@ static void teecr_write(CPUARMState *env, const ARMCPRegInfo *ri, |
35 | uint32_t initial_msp; /* Loaded from 0x0 */ | 31 | env->teecr = value; |
36 | uint32_t initial_pc; /* Loaded from 0x4 */ | 32 | } |
37 | uint8_t *rom; | 33 | |
38 | + uint32_t vecbase; | 34 | +static CPAccessResult teecr_access(CPUARMState *env, const ARMCPRegInfo *ri, |
39 | 35 | + bool isread) | |
40 | if (arm_feature(env, ARM_FEATURE_M_SECURITY)) { | 36 | +{ |
41 | env->v7m.secure = true; | 37 | + /* |
42 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(CPUState *s) | 38 | + * HSTR.TTEE only exists in v7A, not v8A, but v8A doesn't have T2EE |
43 | /* Unlike A/R profile, M profile defines the reset LR value */ | 39 | + * at all, so we don't need to check whether we're v8A. |
44 | env->regs[14] = 0xffffffff; | 40 | + */ |
45 | 41 | + if (arm_current_el(env) < 2 && !arm_is_secure_below_el3(env) && | |
46 | - /* Load the initial SP and PC from the vector table at address 0 */ | 42 | + (env->cp15.hstr_el2 & HSTR_TTEE)) { |
47 | - rom = rom_ptr(0); | 43 | + return CP_ACCESS_TRAP_EL2; |
48 | + env->v7m.vecbase[M_REG_S] = cpu->init_svtor & 0xffffff80; | 44 | + } |
45 | + return CP_ACCESS_OK; | ||
46 | +} | ||
49 | + | 47 | + |
50 | + /* Load the initial SP and PC from offset 0 and 4 in the vector table */ | 48 | static CPAccessResult teehbr_access(CPUARMState *env, const ARMCPRegInfo *ri, |
51 | + vecbase = env->v7m.vecbase[env->v7m.secure]; | 49 | bool isread) |
52 | + rom = rom_ptr(vecbase); | ||
53 | if (rom) { | ||
54 | /* Address zero is covered by ROM which hasn't yet been | ||
55 | * copied into physical memory. | ||
56 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(CPUState *s) | ||
57 | * it got copied into memory. In the latter case, rom_ptr | ||
58 | * will return a NULL pointer and we should use ldl_phys instead. | ||
59 | */ | ||
60 | - initial_msp = ldl_phys(s->as, 0); | ||
61 | - initial_pc = ldl_phys(s->as, 4); | ||
62 | + initial_msp = ldl_phys(s->as, vecbase); | ||
63 | + initial_pc = ldl_phys(s->as, vecbase + 4); | ||
64 | } | ||
65 | |||
66 | env->regs[13] = initial_msp & 0xFFFFFFFC; | ||
67 | @@ -XXX,XX +XXX,XX @@ static Property arm_cpu_pmsav7_dregion_property = | ||
68 | pmsav7_dregion, | ||
69 | qdev_prop_uint32, uint32_t); | ||
70 | |||
71 | +/* M profile: initial value of the Secure VTOR */ | ||
72 | +static Property arm_cpu_initsvtor_property = | ||
73 | + DEFINE_PROP_UINT32("init-svtor", ARMCPU, init_svtor, 0); | ||
74 | + | ||
75 | static void arm_cpu_post_init(Object *obj) | ||
76 | { | 50 | { |
77 | ARMCPU *cpu = ARM_CPU(obj); | 51 | if (arm_current_el(env) == 0 && (env->teecr & 1)) { |
78 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_post_init(Object *obj) | 52 | return CP_ACCESS_TRAP; |
79 | qdev_prop_allow_set_link_before_realize, | ||
80 | OBJ_PROP_LINK_UNREF_ON_RELEASE, | ||
81 | &error_abort); | ||
82 | + qdev_property_add_static(DEVICE(obj), &arm_cpu_initsvtor_property, | ||
83 | + &error_abort); | ||
84 | } | 53 | } |
85 | 54 | - return CP_ACCESS_OK; | |
86 | qdev_property_add_static(DEVICE(obj), &arm_cpu_cfgend_property, | 55 | + return teecr_access(env, ri, isread); |
56 | } | ||
57 | |||
58 | static const ARMCPRegInfo t2ee_cp_reginfo[] = { | ||
59 | { .name = "TEECR", .cp = 14, .crn = 0, .crm = 0, .opc1 = 6, .opc2 = 0, | ||
60 | .access = PL1_RW, .fieldoffset = offsetof(CPUARMState, teecr), | ||
61 | .resetvalue = 0, | ||
62 | - .writefn = teecr_write }, | ||
63 | + .writefn = teecr_write, .accessfn = teecr_access }, | ||
64 | { .name = "TEEHBR", .cp = 14, .crn = 1, .crm = 0, .opc1 = 6, .opc2 = 0, | ||
65 | .access = PL0_RW, .fieldoffset = offsetof(CPUARMState, teehbr), | ||
66 | .accessfn = teehbr_access, .resetvalue = 0 }, | ||
87 | -- | 67 | -- |
88 | 2.16.2 | 68 | 2.20.1 |
89 | 69 | ||
90 | 70 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | In v7A, the HSTR register has a TJDBX bit which traps NS EL0/EL1 |
---|---|---|---|
2 | access to the JOSCR and JMCR trivial Jazelle registers, and also BXJ. | ||
3 | Implement these traps. In v8A this HSTR bit doesn't exist, so don't | ||
4 | trap for v8A CPUs. | ||
2 | 5 | ||
3 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
4 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
5 | Message-id: 20180228193125.20577-6-richard.henderson@linaro.org | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20210816180305.20137-3-peter.maydell@linaro.org | ||
7 | --- | 9 | --- |
8 | target/arm/helper.h | 9 +++++ | 10 | target/arm/cpu.h | 1 + |
9 | target/arm/translate-a64.c | 83 ++++++++++++++++++++++++++++++++++++++++++++++ | 11 | target/arm/helper.h | 2 ++ |
10 | target/arm/vec_helper.c | 74 +++++++++++++++++++++++++++++++++++++++++ | 12 | target/arm/syndrome.h | 7 +++++++ |
11 | 3 files changed, 166 insertions(+) | 13 | target/arm/helper.c | 17 +++++++++++++++++ |
14 | target/arm/op_helper.c | 16 ++++++++++++++++ | ||
15 | target/arm/translate.c | 12 ++++++++++++ | ||
16 | 6 files changed, 55 insertions(+) | ||
12 | 17 | ||
18 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
19 | index XXXXXXX..XXXXXXX 100644 | ||
20 | --- a/target/arm/cpu.h | ||
21 | +++ b/target/arm/cpu.h | ||
22 | @@ -XXX,XX +XXX,XX @@ static inline void xpsr_write(CPUARMState *env, uint32_t val, uint32_t mask) | ||
23 | #define SCR_ATA (1U << 26) | ||
24 | |||
25 | #define HSTR_TTEE (1 << 16) | ||
26 | +#define HSTR_TJDBX (1 << 17) | ||
27 | |||
28 | /* Return the current FPSCR value. */ | ||
29 | uint32_t vfp_get_fpscr(CPUARMState *env); | ||
13 | diff --git a/target/arm/helper.h b/target/arm/helper.h | 30 | diff --git a/target/arm/helper.h b/target/arm/helper.h |
14 | index XXXXXXX..XXXXXXX 100644 | 31 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/target/arm/helper.h | 32 | --- a/target/arm/helper.h |
16 | +++ b/target/arm/helper.h | 33 | +++ b/target/arm/helper.h |
17 | @@ -XXX,XX +XXX,XX @@ DEF_HELPER_2(dc_zva, void, env, i64) | 34 | @@ -XXX,XX +XXX,XX @@ DEF_HELPER_2(v7m_vlldm, void, env, i32) |
18 | DEF_HELPER_FLAGS_2(neon_pmull_64_lo, TCG_CALL_NO_RWG_SE, i64, i64, i64) | 35 | |
19 | DEF_HELPER_FLAGS_2(neon_pmull_64_hi, TCG_CALL_NO_RWG_SE, i64, i64, i64) | 36 | DEF_HELPER_2(v8m_stackcheck, void, env, i32) |
20 | 37 | ||
21 | +DEF_HELPER_FLAGS_5(gvec_qrdmlah_s16, TCG_CALL_NO_RWG, | 38 | +DEF_HELPER_FLAGS_2(check_bxj_trap, TCG_CALL_NO_WG, void, env, i32) |
22 | + void, ptr, ptr, ptr, ptr, i32) | ||
23 | +DEF_HELPER_FLAGS_5(gvec_qrdmlsh_s16, TCG_CALL_NO_RWG, | ||
24 | + void, ptr, ptr, ptr, ptr, i32) | ||
25 | +DEF_HELPER_FLAGS_5(gvec_qrdmlah_s32, TCG_CALL_NO_RWG, | ||
26 | + void, ptr, ptr, ptr, ptr, i32) | ||
27 | +DEF_HELPER_FLAGS_5(gvec_qrdmlsh_s32, TCG_CALL_NO_RWG, | ||
28 | + void, ptr, ptr, ptr, ptr, i32) | ||
29 | + | 39 | + |
30 | #ifdef TARGET_AARCH64 | 40 | DEF_HELPER_4(access_check_cp_reg, void, env, ptr, i32, i32) |
31 | #include "helper-a64.h" | 41 | DEF_HELPER_3(set_cp_reg, void, env, ptr, i32) |
32 | #endif | 42 | DEF_HELPER_2(get_cp_reg, i32, env, ptr) |
33 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c | 43 | diff --git a/target/arm/syndrome.h b/target/arm/syndrome.h |
34 | index XXXXXXX..XXXXXXX 100644 | 44 | index XXXXXXX..XXXXXXX 100644 |
35 | --- a/target/arm/translate-a64.c | 45 | --- a/target/arm/syndrome.h |
36 | +++ b/target/arm/translate-a64.c | 46 | +++ b/target/arm/syndrome.h |
37 | @@ -XXX,XX +XXX,XX @@ static void gen_gvec_op3(DisasContext *s, bool is_q, int rd, | 47 | @@ -XXX,XX +XXX,XX @@ enum arm_exception_class { |
38 | vec_full_reg_size(s), gvec_op); | 48 | EC_ADVSIMDFPACCESSTRAP = 0x07, |
49 | EC_FPIDTRAP = 0x08, | ||
50 | EC_PACTRAP = 0x09, | ||
51 | + EC_BXJTRAP = 0x0a, | ||
52 | EC_CP14RRTTRAP = 0x0c, | ||
53 | EC_BTITRAP = 0x0d, | ||
54 | EC_ILLEGALSTATE = 0x0e, | ||
55 | @@ -XXX,XX +XXX,XX @@ static inline uint32_t syn_btitrap(int btype) | ||
56 | return (EC_BTITRAP << ARM_EL_EC_SHIFT) | btype; | ||
39 | } | 57 | } |
40 | 58 | ||
41 | +/* Expand a 3-operand + env pointer operation using | 59 | +static inline uint32_t syn_bxjtrap(int cv, int cond, int rm) |
42 | + * an out-of-line helper. | ||
43 | + */ | ||
44 | +static void gen_gvec_op3_env(DisasContext *s, bool is_q, int rd, | ||
45 | + int rn, int rm, gen_helper_gvec_3_ptr *fn) | ||
46 | +{ | 60 | +{ |
47 | + tcg_gen_gvec_3_ptr(vec_full_reg_offset(s, rd), | 61 | + return (EC_BXJTRAP << ARM_EL_EC_SHIFT) | ARM_EL_IL | |
48 | + vec_full_reg_offset(s, rn), | 62 | + (cv << 24) | (cond << 20) | rm; |
49 | + vec_full_reg_offset(s, rm), cpu_env, | ||
50 | + is_q ? 16 : 8, vec_full_reg_size(s), 0, fn); | ||
51 | +} | 63 | +} |
52 | + | 64 | + |
53 | /* Set ZF and NF based on a 64 bit result. This is alas fiddlier | 65 | static inline uint32_t syn_insn_abort(int same_el, int ea, int s1ptw, int fsc) |
54 | * than the 32 bit equivalent. | 66 | { |
55 | */ | 67 | return (EC_INSNABORT << ARM_EL_EC_SHIFT) | (same_el << ARM_EL_EC_SHIFT) |
56 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_three_reg_same_fp16(DisasContext *s, uint32_t insn) | 68 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
57 | clear_vec_high(s, is_q, rd); | 69 | index XXXXXXX..XXXXXXX 100644 |
70 | --- a/target/arm/helper.c | ||
71 | +++ b/target/arm/helper.c | ||
72 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_jazelle(CPUARMState *env, const ARMCPRegInfo *ri, | ||
73 | return CP_ACCESS_OK; | ||
58 | } | 74 | } |
59 | 75 | ||
60 | +/* AdvSIMD three same extra | 76 | +static CPAccessResult access_joscr_jmcr(CPUARMState *env, |
61 | + * 31 30 29 28 24 23 22 21 20 16 15 14 11 10 9 5 4 0 | 77 | + const ARMCPRegInfo *ri, bool isread) |
62 | + * +---+---+---+-----------+------+---+------+---+--------+---+----+----+ | ||
63 | + * | 0 | Q | U | 0 1 1 1 0 | size | 0 | Rm | 1 | opcode | 1 | Rn | Rd | | ||
64 | + * +---+---+---+-----------+------+---+------+---+--------+---+----+----+ | ||
65 | + */ | ||
66 | +static void disas_simd_three_reg_same_extra(DisasContext *s, uint32_t insn) | ||
67 | +{ | 78 | +{ |
68 | + int rd = extract32(insn, 0, 5); | 79 | + /* |
69 | + int rn = extract32(insn, 5, 5); | 80 | + * HSTR.TJDBX traps JOSCR and JMCR accesses, but it exists only |
70 | + int opcode = extract32(insn, 11, 4); | 81 | + * in v7A, not in v8A. |
71 | + int rm = extract32(insn, 16, 5); | 82 | + */ |
72 | + int size = extract32(insn, 22, 2); | 83 | + if (!arm_feature(env, ARM_FEATURE_V8) && |
73 | + bool u = extract32(insn, 29, 1); | 84 | + arm_current_el(env) < 2 && !arm_is_secure_below_el3(env) && |
74 | + bool is_q = extract32(insn, 30, 1); | 85 | + (env->cp15.hstr_el2 & HSTR_TJDBX)) { |
75 | + int feature; | 86 | + return CP_ACCESS_TRAP_EL2; |
87 | + } | ||
88 | + return CP_ACCESS_OK; | ||
89 | +} | ||
76 | + | 90 | + |
77 | + switch (u * 16 + opcode) { | 91 | static const ARMCPRegInfo jazelle_regs[] = { |
78 | + case 0x10: /* SQRDMLAH (vector) */ | 92 | { .name = "JIDR", |
79 | + case 0x11: /* SQRDMLSH (vector) */ | 93 | .cp = 14, .crn = 0, .crm = 0, .opc1 = 7, .opc2 = 0, |
80 | + if (size != 1 && size != 2) { | 94 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo jazelle_regs[] = { |
81 | + unallocated_encoding(s); | 95 | .type = ARM_CP_CONST, .resetvalue = 0 }, |
82 | + return; | 96 | { .name = "JOSCR", |
83 | + } | 97 | .cp = 14, .crn = 1, .crm = 0, .opc1 = 7, .opc2 = 0, |
84 | + feature = ARM_FEATURE_V8_RDM; | 98 | + .accessfn = access_joscr_jmcr, |
85 | + break; | 99 | .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, |
86 | + default: | 100 | { .name = "JMCR", |
87 | + unallocated_encoding(s); | 101 | .cp = 14, .crn = 2, .crm = 0, .opc1 = 7, .opc2 = 0, |
88 | + return; | 102 | + .accessfn = access_joscr_jmcr, |
89 | + } | 103 | .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, |
90 | + if (!arm_dc_feature(s, feature)) { | 104 | REGINFO_SENTINEL |
91 | + unallocated_encoding(s); | 105 | }; |
92 | + return; | 106 | diff --git a/target/arm/op_helper.c b/target/arm/op_helper.c |
93 | + } | 107 | index XXXXXXX..XXXXXXX 100644 |
94 | + if (!fp_access_check(s)) { | 108 | --- a/target/arm/op_helper.c |
95 | + return; | 109 | +++ b/target/arm/op_helper.c |
96 | + } | 110 | @@ -XXX,XX +XXX,XX @@ void HELPER(setend)(CPUARMState *env) |
97 | + | 111 | arm_rebuild_hflags(env); |
98 | + switch (opcode) { | 112 | } |
99 | + case 0x0: /* SQRDMLAH (vector) */ | 113 | |
100 | + switch (size) { | 114 | +void HELPER(check_bxj_trap)(CPUARMState *env, uint32_t rm) |
101 | + case 1: | 115 | +{ |
102 | + gen_gvec_op3_env(s, is_q, rd, rn, rm, gen_helper_gvec_qrdmlah_s16); | 116 | + /* |
103 | + break; | 117 | + * Only called if in NS EL0 or EL1 for a BXJ for a v7A CPU; |
104 | + case 2: | 118 | + * check if HSTR.TJDBX means we need to trap to EL2. |
105 | + gen_gvec_op3_env(s, is_q, rd, rn, rm, gen_helper_gvec_qrdmlah_s32); | 119 | + */ |
106 | + break; | 120 | + if (env->cp15.hstr_el2 & HSTR_TJDBX) { |
107 | + default: | 121 | + /* |
108 | + g_assert_not_reached(); | 122 | + * We know the condition code check passed, so take the IMPDEF |
109 | + } | 123 | + * choice to always report CV=1 COND 0xe |
110 | + return; | 124 | + */ |
111 | + | 125 | + uint32_t syn = syn_bxjtrap(1, 0xe, rm); |
112 | + case 0x1: /* SQRDMLSH (vector) */ | 126 | + raise_exception_ra(env, EXCP_HYP_TRAP, syn, 2, GETPC()); |
113 | + switch (size) { | ||
114 | + case 1: | ||
115 | + gen_gvec_op3_env(s, is_q, rd, rn, rm, gen_helper_gvec_qrdmlsh_s16); | ||
116 | + break; | ||
117 | + case 2: | ||
118 | + gen_gvec_op3_env(s, is_q, rd, rn, rm, gen_helper_gvec_qrdmlsh_s32); | ||
119 | + break; | ||
120 | + default: | ||
121 | + g_assert_not_reached(); | ||
122 | + } | ||
123 | + return; | ||
124 | + | ||
125 | + default: | ||
126 | + g_assert_not_reached(); | ||
127 | + } | 127 | + } |
128 | +} | 128 | +} |
129 | + | 129 | + |
130 | static void handle_2misc_widening(DisasContext *s, int opcode, bool is_q, | 130 | #ifndef CONFIG_USER_ONLY |
131 | int size, int rn, int rd) | 131 | /* Function checks whether WFx (WFI/WFE) instructions are set up to be trapped. |
132 | { | 132 | * The function returns the target EL (1-3) if the instruction is to be trapped; |
133 | @@ -XXX,XX +XXX,XX @@ static void disas_crypto_three_reg_imm2(DisasContext *s, uint32_t insn) | 133 | diff --git a/target/arm/translate.c b/target/arm/translate.c |
134 | static const AArch64DecodeTable data_proc_simd[] = { | ||
135 | /* pattern , mask , fn */ | ||
136 | { 0x0e200400, 0x9f200400, disas_simd_three_reg_same }, | ||
137 | + { 0x0e008400, 0x9f208400, disas_simd_three_reg_same_extra }, | ||
138 | { 0x0e200000, 0x9f200c00, disas_simd_three_reg_diff }, | ||
139 | { 0x0e200800, 0x9f3e0c00, disas_simd_two_reg_misc }, | ||
140 | { 0x0e300800, 0x9f3e0c00, disas_simd_across_lanes }, | ||
141 | diff --git a/target/arm/vec_helper.c b/target/arm/vec_helper.c | ||
142 | index XXXXXXX..XXXXXXX 100644 | 134 | index XXXXXXX..XXXXXXX 100644 |
143 | --- a/target/arm/vec_helper.c | 135 | --- a/target/arm/translate.c |
144 | +++ b/target/arm/vec_helper.c | 136 | +++ b/target/arm/translate.c |
145 | @@ -XXX,XX +XXX,XX @@ | 137 | @@ -XXX,XX +XXX,XX @@ static bool trans_BXJ(DisasContext *s, arg_BXJ *a) |
146 | 138 | if (!ENABLE_ARCH_5J || arm_dc_feature(s, ARM_FEATURE_M)) { | |
147 | #define SET_QC() env->vfp.xregs[ARM_VFP_FPSCR] |= CPSR_Q | 139 | return false; |
148 | 140 | } | |
149 | +static void clear_tail(void *vd, uintptr_t opr_sz, uintptr_t max_sz) | 141 | + /* |
150 | +{ | 142 | + * v7A allows BXJ to be trapped via HSTR.TJDBX. We don't waste a |
151 | + uint64_t *d = vd + opr_sz; | 143 | + * TBFLAGS bit on a basically-never-happens case, so call a helper |
152 | + uintptr_t i; | 144 | + * function to check for the trap and raise the exception if needed |
153 | + | 145 | + * (passing it the register number for the syndrome value). |
154 | + for (i = opr_sz; i < max_sz; i += 8) { | 146 | + * v8A doesn't have this HSTR bit. |
155 | + *d++ = 0; | 147 | + */ |
148 | + if (!arm_dc_feature(s, ARM_FEATURE_V8) && | ||
149 | + arm_dc_feature(s, ARM_FEATURE_EL2) && | ||
150 | + s->current_el < 2 && s->ns) { | ||
151 | + gen_helper_check_bxj_trap(cpu_env, tcg_constant_i32(a->rm)); | ||
156 | + } | 152 | + } |
157 | +} | 153 | /* Trivial implementation equivalent to bx. */ |
158 | + | 154 | gen_bx(s, load_reg(s, a->rm)); |
159 | /* Signed saturating rounding doubling multiply-accumulate high half, 16-bit */ | 155 | return true; |
160 | static uint16_t inl_qrdmlah_s16(CPUARMState *env, int16_t src1, | ||
161 | int16_t src2, int16_t src3) | ||
162 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(neon_qrdmlah_s16)(CPUARMState *env, uint32_t src1, | ||
163 | return deposit32(e1, 16, 16, e2); | ||
164 | } | ||
165 | |||
166 | +void HELPER(gvec_qrdmlah_s16)(void *vd, void *vn, void *vm, | ||
167 | + void *ve, uint32_t desc) | ||
168 | +{ | ||
169 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
170 | + int16_t *d = vd; | ||
171 | + int16_t *n = vn; | ||
172 | + int16_t *m = vm; | ||
173 | + CPUARMState *env = ve; | ||
174 | + uintptr_t i; | ||
175 | + | ||
176 | + for (i = 0; i < opr_sz / 2; ++i) { | ||
177 | + d[i] = inl_qrdmlah_s16(env, n[i], m[i], d[i]); | ||
178 | + } | ||
179 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
180 | +} | ||
181 | + | ||
182 | /* Signed saturating rounding doubling multiply-subtract high half, 16-bit */ | ||
183 | static uint16_t inl_qrdmlsh_s16(CPUARMState *env, int16_t src1, | ||
184 | int16_t src2, int16_t src3) | ||
185 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(neon_qrdmlsh_s16)(CPUARMState *env, uint32_t src1, | ||
186 | return deposit32(e1, 16, 16, e2); | ||
187 | } | ||
188 | |||
189 | +void HELPER(gvec_qrdmlsh_s16)(void *vd, void *vn, void *vm, | ||
190 | + void *ve, uint32_t desc) | ||
191 | +{ | ||
192 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
193 | + int16_t *d = vd; | ||
194 | + int16_t *n = vn; | ||
195 | + int16_t *m = vm; | ||
196 | + CPUARMState *env = ve; | ||
197 | + uintptr_t i; | ||
198 | + | ||
199 | + for (i = 0; i < opr_sz / 2; ++i) { | ||
200 | + d[i] = inl_qrdmlsh_s16(env, n[i], m[i], d[i]); | ||
201 | + } | ||
202 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
203 | +} | ||
204 | + | ||
205 | /* Signed saturating rounding doubling multiply-accumulate high half, 32-bit */ | ||
206 | uint32_t HELPER(neon_qrdmlah_s32)(CPUARMState *env, int32_t src1, | ||
207 | int32_t src2, int32_t src3) | ||
208 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(neon_qrdmlah_s32)(CPUARMState *env, int32_t src1, | ||
209 | return ret; | ||
210 | } | ||
211 | |||
212 | +void HELPER(gvec_qrdmlah_s32)(void *vd, void *vn, void *vm, | ||
213 | + void *ve, uint32_t desc) | ||
214 | +{ | ||
215 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
216 | + int32_t *d = vd; | ||
217 | + int32_t *n = vn; | ||
218 | + int32_t *m = vm; | ||
219 | + CPUARMState *env = ve; | ||
220 | + uintptr_t i; | ||
221 | + | ||
222 | + for (i = 0; i < opr_sz / 4; ++i) { | ||
223 | + d[i] = helper_neon_qrdmlah_s32(env, n[i], m[i], d[i]); | ||
224 | + } | ||
225 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
226 | +} | ||
227 | + | ||
228 | /* Signed saturating rounding doubling multiply-subtract high half, 32-bit */ | ||
229 | uint32_t HELPER(neon_qrdmlsh_s32)(CPUARMState *env, int32_t src1, | ||
230 | int32_t src2, int32_t src3) | ||
231 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(neon_qrdmlsh_s32)(CPUARMState *env, int32_t src1, | ||
232 | } | ||
233 | return ret; | ||
234 | } | ||
235 | + | ||
236 | +void HELPER(gvec_qrdmlsh_s32)(void *vd, void *vn, void *vm, | ||
237 | + void *ve, uint32_t desc) | ||
238 | +{ | ||
239 | + uintptr_t opr_sz = simd_oprsz(desc); | ||
240 | + int32_t *d = vd; | ||
241 | + int32_t *n = vn; | ||
242 | + int32_t *m = vm; | ||
243 | + CPUARMState *env = ve; | ||
244 | + uintptr_t i; | ||
245 | + | ||
246 | + for (i = 0; i < opr_sz / 4; ++i) { | ||
247 | + d[i] = helper_neon_qrdmlsh_s32(env, n[i], m[i], d[i]); | ||
248 | + } | ||
249 | + clear_tail(d, opr_sz, simd_maxsz(desc)); | ||
250 | +} | ||
251 | -- | 156 | -- |
252 | 2.16.2 | 157 | 2.20.1 |
253 | 158 | ||
254 | 159 | diff view generated by jsdifflib |
1 | In v8M, the Implementation Defined Attribution Unit (IDAU) is | 1 | Currently we rely on all the callsites of cpsr_write() to rebuild the |
---|---|---|---|
2 | a small piece of hardware typically implemented in the SoC | 2 | cached hflags if they change one of the CPSR bits which we use as a |
3 | which provides board or SoC specific security attribution | 3 | TB flag and cache in hflags. This is a bit awkward when we want to |
4 | information for each address that the CPU performs MPU/SAU | 4 | change the set of CPSR bits that we cache, because it means we need |
5 | checks on. For QEMU, we model this with a QOM interface which | 5 | to re-audit all the cpsr_write() callsites to see which flags they |
6 | is implemented by the board or SoC object and connected to | 6 | are writing and whether they now need to rebuild the hflags. |
7 | the CPU using a link property. | ||
8 | 7 | ||
9 | This commit defines the new interface class, adds the link | 8 | Switch instead to making cpsr_write() call arm_rebuild_hflags() |
10 | property to the CPU object, and makes the SAU checking | 9 | itself if one of the bits being changed is a cached bit. |
11 | code call the IDAU interface if one is present. | 10 | |
11 | We don't do the rebuild for the CPSRWriteRaw write type, because that | ||
12 | kind of write is generally doing something special anyway. For the | ||
13 | CPSRWriteRaw callsites in the KVM code and inbound migration we | ||
14 | definitely don't want to recalculate the hflags; the callsites in | ||
15 | boot.c and arm-powerctl.c have to do a rebuild-hflags call themselves | ||
16 | anyway because of other CPU state changes they make. | ||
17 | |||
18 | This allows us to drop explicit arm_rebuild_hflags() calls in a | ||
19 | couple of places where the only reason we needed to call it was the | ||
20 | CPSR write. | ||
21 | |||
22 | This fixes a bug where we were incorrectly failing to rebuild hflags | ||
23 | in the code path for a gdbstub write to CPSR, which meant that you | ||
24 | could make QEMU assert by breaking into a running guest, altering the | ||
25 | CPSR to change the value of, for example, CPSR.E, and then | ||
26 | continuing. | ||
12 | 27 | ||
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 28 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
14 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 29 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
15 | Message-id: 20180220180325.29818-5-peter.maydell@linaro.org | 30 | Message-id: 20210817201843.3829-1-peter.maydell@linaro.org |
16 | --- | 31 | --- |
17 | target/arm/cpu.h | 3 +++ | 32 | target/arm/cpu.h | 10 ++++++++-- |
18 | target/arm/idau.h | 61 +++++++++++++++++++++++++++++++++++++++++++++++++++++ | 33 | linux-user/arm/signal.c | 2 -- |
19 | target/arm/cpu.c | 15 +++++++++++++ | 34 | target/arm/helper.c | 5 +++++ |
20 | target/arm/helper.c | 28 +++++++++++++++++++++--- | 35 | 3 files changed, 13 insertions(+), 4 deletions(-) |
21 | 4 files changed, 104 insertions(+), 3 deletions(-) | ||
22 | create mode 100644 target/arm/idau.h | ||
23 | 36 | ||
24 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 37 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
25 | index XXXXXXX..XXXXXXX 100644 | 38 | index XXXXXXX..XXXXXXX 100644 |
26 | --- a/target/arm/cpu.h | 39 | --- a/target/arm/cpu.h |
27 | +++ b/target/arm/cpu.h | 40 | +++ b/target/arm/cpu.h |
28 | @@ -XXX,XX +XXX,XX @@ struct ARMCPU { | 41 | @@ -XXX,XX +XXX,XX @@ uint32_t cpsr_read(CPUARMState *env); |
29 | /* MemoryRegion to use for secure physical accesses */ | 42 | typedef enum CPSRWriteType { |
30 | MemoryRegion *secure_memory; | 43 | CPSRWriteByInstr = 0, /* from guest MSR or CPS */ |
31 | 44 | CPSRWriteExceptionReturn = 1, /* from guest exception return insn */ | |
32 | + /* For v8M, pointer to the IDAU interface provided by board/SoC */ | 45 | - CPSRWriteRaw = 2, /* trust values, do not switch reg banks */ |
33 | + Object *idau; | 46 | + CPSRWriteRaw = 2, |
34 | + | 47 | + /* trust values, no reg bank switch, no hflags rebuild */ |
35 | /* 'compatible' string for this CPU for Linux device trees */ | 48 | CPSRWriteByGDBStub = 3, /* from the GDB stub */ |
36 | const char *dtb_compatible; | 49 | } CPSRWriteType; |
37 | 50 | ||
38 | diff --git a/target/arm/idau.h b/target/arm/idau.h | 51 | -/* Set the CPSR. Note that some bits of mask must be all-set or all-clear.*/ |
39 | new file mode 100644 | ||
40 | index XXXXXXX..XXXXXXX | ||
41 | --- /dev/null | ||
42 | +++ b/target/arm/idau.h | ||
43 | @@ -XXX,XX +XXX,XX @@ | ||
44 | +/* | 52 | +/* |
45 | + * QEMU ARM CPU -- interface for the Arm v8M IDAU | 53 | + * Set the CPSR. Note that some bits of mask must be all-set or all-clear. |
46 | + * | 54 | + * This will do an arm_rebuild_hflags() if any of the bits in @mask |
47 | + * Copyright (c) 2018 Linaro Ltd | 55 | + * correspond to TB flags bits cached in the hflags, unless @write_type |
48 | + * | 56 | + * is CPSRWriteRaw. |
49 | + * This program is free software; you can redistribute it and/or | ||
50 | + * modify it under the terms of the GNU General Public License | ||
51 | + * as published by the Free Software Foundation; either version 2 | ||
52 | + * of the License, or (at your option) any later version. | ||
53 | + * | ||
54 | + * This program is distributed in the hope that it will be useful, | ||
55 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
56 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
57 | + * GNU General Public License for more details. | ||
58 | + * | ||
59 | + * You should have received a copy of the GNU General Public License | ||
60 | + * along with this program; if not, see | ||
61 | + * <http://www.gnu.org/licenses/gpl-2.0.html> | ||
62 | + * | ||
63 | + * In the v8M architecture, the IDAU is a small piece of hardware | ||
64 | + * typically implemented in the SoC which provides board or SoC | ||
65 | + * specific security attribution information for each address that | ||
66 | + * the CPU performs MPU/SAU checks on. For QEMU, we model this with a | ||
67 | + * QOM interface which is implemented by the board or SoC object and | ||
68 | + * connected to the CPU using a link property. | ||
69 | + */ | 57 | + */ |
70 | + | 58 | void cpsr_write(CPUARMState *env, uint32_t val, uint32_t mask, |
71 | +#ifndef TARGET_ARM_IDAU_H | 59 | CPSRWriteType write_type); |
72 | +#define TARGET_ARM_IDAU_H | 60 | |
73 | + | 61 | diff --git a/linux-user/arm/signal.c b/linux-user/arm/signal.c |
74 | +#include "qom/object.h" | ||
75 | + | ||
76 | +#define TYPE_IDAU_INTERFACE "idau-interface" | ||
77 | +#define IDAU_INTERFACE(obj) \ | ||
78 | + INTERFACE_CHECK(IDAUInterface, (obj), TYPE_IDAU_INTERFACE) | ||
79 | +#define IDAU_INTERFACE_CLASS(class) \ | ||
80 | + OBJECT_CLASS_CHECK(IDAUInterfaceClass, (class), TYPE_IDAU_INTERFACE) | ||
81 | +#define IDAU_INTERFACE_GET_CLASS(obj) \ | ||
82 | + OBJECT_GET_CLASS(IDAUInterfaceClass, (obj), TYPE_IDAU_INTERFACE) | ||
83 | + | ||
84 | +typedef struct IDAUInterface { | ||
85 | + Object parent; | ||
86 | +} IDAUInterface; | ||
87 | + | ||
88 | +#define IREGION_NOTVALID -1 | ||
89 | + | ||
90 | +typedef struct IDAUInterfaceClass { | ||
91 | + InterfaceClass parent; | ||
92 | + | ||
93 | + /* Check the specified address and return the IDAU security information | ||
94 | + * for it by filling in iregion, exempt, ns and nsc: | ||
95 | + * iregion: IDAU region number, or IREGION_NOTVALID if not valid | ||
96 | + * exempt: true if address is exempt from security attribution | ||
97 | + * ns: true if the address is NonSecure | ||
98 | + * nsc: true if the address is NonSecure-callable | ||
99 | + */ | ||
100 | + void (*check)(IDAUInterface *ii, uint32_t address, int *iregion, | ||
101 | + bool *exempt, bool *ns, bool *nsc); | ||
102 | +} IDAUInterfaceClass; | ||
103 | + | ||
104 | +#endif | ||
105 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | ||
106 | index XXXXXXX..XXXXXXX 100644 | 62 | index XXXXXXX..XXXXXXX 100644 |
107 | --- a/target/arm/cpu.c | 63 | --- a/linux-user/arm/signal.c |
108 | +++ b/target/arm/cpu.c | 64 | +++ b/linux-user/arm/signal.c |
109 | @@ -XXX,XX +XXX,XX @@ | 65 | @@ -XXX,XX +XXX,XX @@ setup_return(CPUARMState *env, struct target_sigaction *ka, |
110 | */ | 66 | env->regs[14] = retcode; |
111 | 67 | env->regs[15] = handler & (thumb ? ~1 : ~3); | |
112 | #include "qemu/osdep.h" | 68 | cpsr_write(env, cpsr, CPSR_IT | CPSR_T | CPSR_E, CPSRWriteByInstr); |
113 | +#include "target/arm/idau.h" | 69 | - arm_rebuild_hflags(env); |
114 | #include "qemu/error-report.h" | 70 | |
115 | #include "qapi/error.h" | 71 | return 0; |
116 | #include "cpu.h" | ||
117 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_post_init(Object *obj) | ||
118 | } | ||
119 | } | ||
120 | |||
121 | + if (arm_feature(&cpu->env, ARM_FEATURE_M_SECURITY)) { | ||
122 | + object_property_add_link(obj, "idau", TYPE_IDAU_INTERFACE, &cpu->idau, | ||
123 | + qdev_prop_allow_set_link_before_realize, | ||
124 | + OBJ_PROP_LINK_UNREF_ON_RELEASE, | ||
125 | + &error_abort); | ||
126 | + } | ||
127 | + | ||
128 | qdev_property_add_static(DEVICE(obj), &arm_cpu_cfgend_property, | ||
129 | &error_abort); | ||
130 | } | 72 | } |
131 | @@ -XXX,XX +XXX,XX @@ static const TypeInfo arm_cpu_type_info = { | 73 | @@ -XXX,XX +XXX,XX @@ restore_sigcontext(CPUARMState *env, struct target_sigcontext *sc) |
132 | .class_init = arm_cpu_class_init, | 74 | __get_user(env->regs[15], &sc->arm_pc); |
133 | }; | 75 | __get_user(cpsr, &sc->arm_cpsr); |
134 | 76 | cpsr_write(env, cpsr, CPSR_USER | CPSR_EXEC, CPSRWriteByInstr); | |
135 | +static const TypeInfo idau_interface_type_info = { | 77 | - arm_rebuild_hflags(env); |
136 | + .name = TYPE_IDAU_INTERFACE, | 78 | |
137 | + .parent = TYPE_INTERFACE, | 79 | err |= !valid_user_regs(env); |
138 | + .class_size = sizeof(IDAUInterfaceClass), | 80 | |
139 | +}; | ||
140 | + | ||
141 | static void arm_cpu_register_types(void) | ||
142 | { | ||
143 | const ARMCPUInfo *info = arm_cpus; | ||
144 | |||
145 | type_register_static(&arm_cpu_type_info); | ||
146 | + type_register_static(&idau_interface_type_info); | ||
147 | |||
148 | while (info->name) { | ||
149 | cpu_register(info); | ||
150 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 81 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
151 | index XXXXXXX..XXXXXXX 100644 | 82 | index XXXXXXX..XXXXXXX 100644 |
152 | --- a/target/arm/helper.c | 83 | --- a/target/arm/helper.c |
153 | +++ b/target/arm/helper.c | 84 | +++ b/target/arm/helper.c |
154 | @@ -XXX,XX +XXX,XX @@ | 85 | @@ -XXX,XX +XXX,XX @@ void cpsr_write(CPUARMState *env, uint32_t val, uint32_t mask, |
155 | #include "qemu/osdep.h" | 86 | CPSRWriteType write_type) |
156 | +#include "target/arm/idau.h" | 87 | { |
157 | #include "trace.h" | 88 | uint32_t changed_daif; |
158 | #include "cpu.h" | 89 | + bool rebuild_hflags = (write_type != CPSRWriteRaw) && |
159 | #include "internals.h" | 90 | + (mask & (CPSR_M | CPSR_E | CPSR_IL)); |
160 | @@ -XXX,XX +XXX,XX @@ static void v8m_security_lookup(CPUARMState *env, uint32_t address, | 91 | |
161 | */ | 92 | if (mask & CPSR_NZCV) { |
162 | ARMCPU *cpu = arm_env_get_cpu(env); | 93 | env->ZF = (~val) & CPSR_Z; |
163 | int r; | 94 | @@ -XXX,XX +XXX,XX @@ void cpsr_write(CPUARMState *env, uint32_t val, uint32_t mask, |
164 | + bool idau_exempt = false, idau_ns = true, idau_nsc = true; | 95 | } |
165 | + int idau_region = IREGION_NOTVALID; | 96 | mask &= ~CACHED_CPSR_BITS; |
166 | 97 | env->uncached_cpsr = (env->uncached_cpsr & ~mask) | (val & mask); | |
167 | - /* TODO: implement IDAU */ | 98 | + if (rebuild_hflags) { |
168 | + if (cpu->idau) { | 99 | + arm_rebuild_hflags(env); |
169 | + IDAUInterfaceClass *iic = IDAU_INTERFACE_GET_CLASS(cpu->idau); | ||
170 | + IDAUInterface *ii = IDAU_INTERFACE(cpu->idau); | ||
171 | + | ||
172 | + iic->check(ii, address, &idau_region, &idau_exempt, &idau_ns, | ||
173 | + &idau_nsc); | ||
174 | + } | 100 | + } |
175 | |||
176 | if (access_type == MMU_INST_FETCH && extract32(address, 28, 4) == 0xf) { | ||
177 | /* 0xf0000000..0xffffffff is always S for insn fetches */ | ||
178 | return; | ||
179 | } | ||
180 | |||
181 | - if (v8m_is_sau_exempt(env, address, access_type)) { | ||
182 | + if (idau_exempt || v8m_is_sau_exempt(env, address, access_type)) { | ||
183 | sattrs->ns = !regime_is_secure(env, mmu_idx); | ||
184 | return; | ||
185 | } | ||
186 | |||
187 | + if (idau_region != IREGION_NOTVALID) { | ||
188 | + sattrs->irvalid = true; | ||
189 | + sattrs->iregion = idau_region; | ||
190 | + } | ||
191 | + | ||
192 | switch (env->sau.ctrl & 3) { | ||
193 | case 0: /* SAU.ENABLE == 0, SAU.ALLNS == 0 */ | ||
194 | break; | ||
195 | @@ -XXX,XX +XXX,XX @@ static void v8m_security_lookup(CPUARMState *env, uint32_t address, | ||
196 | } | ||
197 | } | ||
198 | |||
199 | - /* TODO when we support the IDAU then it may override the result here */ | ||
200 | + /* The IDAU will override the SAU lookup results if it specifies | ||
201 | + * higher security than the SAU does. | ||
202 | + */ | ||
203 | + if (!idau_ns) { | ||
204 | + if (sattrs->ns || (!idau_nsc && sattrs->nsc)) { | ||
205 | + sattrs->ns = false; | ||
206 | + sattrs->nsc = idau_nsc; | ||
207 | + } | ||
208 | + } | ||
209 | break; | ||
210 | } | ||
211 | } | 101 | } |
102 | |||
103 | /* Sign/zero extend */ | ||
212 | -- | 104 | -- |
213 | 2.16.2 | 105 | 2.20.1 |
214 | 106 | ||
215 | 107 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Tong Ho <tong.ho@xilinx.com> |
---|---|---|---|
2 | 2 | ||
3 | Include the U bit in the switches rather than testing separately. | 3 | Add unimplemented APU mmio region to xlnx-versal for booting |
4 | bare-metal guests built with standalone bsp, which access the | ||
5 | region from one of the following places: | ||
6 | https://github.com/Xilinx/embeddedsw/blob/release-2020.2/lib/bsp/standalone/src/arm/ARMv8/64bit/armclang/boot.S#L139 | ||
7 | https://github.com/Xilinx/embeddedsw/blob/release-2020.2/lib/bsp/standalone/src/arm/ARMv8/64bit/gcc/boot.S#L183 | ||
4 | 8 | ||
5 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 9 | Acked-by: Alistair Francis <alistair.francis@wdc.com> |
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> |
7 | Message-id: 20180228193125.20577-3-richard.henderson@linaro.org | 11 | Signed-off-by: Tong Ho <tong.ho@xilinx.com> |
12 | Message-id: 20210823173818.201259-2-tong.ho@xilinx.com | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | --- | 14 | --- |
10 | target/arm/translate-a64.c | 129 +++++++++++++++++++++------------------------ | 15 | include/hw/arm/xlnx-versal.h | 2 ++ |
11 | 1 file changed, 61 insertions(+), 68 deletions(-) | 16 | hw/arm/xlnx-versal.c | 2 ++ |
17 | 2 files changed, 4 insertions(+) | ||
12 | 18 | ||
13 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c | 19 | diff --git a/include/hw/arm/xlnx-versal.h b/include/hw/arm/xlnx-versal.h |
14 | index XXXXXXX..XXXXXXX 100644 | 20 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/target/arm/translate-a64.c | 21 | --- a/include/hw/arm/xlnx-versal.h |
16 | +++ b/target/arm/translate-a64.c | 22 | +++ b/include/hw/arm/xlnx-versal.h |
17 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | 23 | @@ -XXX,XX +XXX,XX @@ struct Versal { |
18 | int index; | 24 | #define MM_IOU_SCNTRS_SIZE 0x10000 |
19 | TCGv_ptr fpst; | 25 | #define MM_FPD_CRF 0xfd1a0000U |
20 | 26 | #define MM_FPD_CRF_SIZE 0x140000 | |
21 | - switch (opcode) { | 27 | +#define MM_FPD_FPD_APU 0xfd5c0000 |
22 | - case 0x0: /* MLA */ | 28 | +#define MM_FPD_FPD_APU_SIZE 0x100 |
23 | - case 0x4: /* MLS */ | 29 | |
24 | - if (!u || is_scalar) { | 30 | #define MM_PMC_SD0 0xf1040000U |
25 | + switch (16 * u + opcode) { | 31 | #define MM_PMC_SD0_SIZE 0x10000 |
26 | + case 0x08: /* MUL */ | 32 | diff --git a/hw/arm/xlnx-versal.c b/hw/arm/xlnx-versal.c |
27 | + case 0x10: /* MLA */ | 33 | index XXXXXXX..XXXXXXX 100644 |
28 | + case 0x14: /* MLS */ | 34 | --- a/hw/arm/xlnx-versal.c |
29 | + if (is_scalar) { | 35 | +++ b/hw/arm/xlnx-versal.c |
30 | unallocated_encoding(s); | 36 | @@ -XXX,XX +XXX,XX @@ static void versal_unimp(Versal *s) |
31 | return; | 37 | MM_CRL, MM_CRL_SIZE); |
32 | } | 38 | versal_unimp_area(s, "crf", &s->mr_ps, |
33 | break; | 39 | MM_FPD_CRF, MM_FPD_CRF_SIZE); |
34 | - case 0x2: /* SMLAL, SMLAL2, UMLAL, UMLAL2 */ | 40 | + versal_unimp_area(s, "apu", &s->mr_ps, |
35 | - case 0x6: /* SMLSL, SMLSL2, UMLSL, UMLSL2 */ | 41 | + MM_FPD_FPD_APU, MM_FPD_FPD_APU_SIZE); |
36 | - case 0xa: /* SMULL, SMULL2, UMULL, UMULL2 */ | 42 | versal_unimp_area(s, "crp", &s->mr_ps, |
37 | + case 0x02: /* SMLAL, SMLAL2 */ | 43 | MM_PMC_CRP, MM_PMC_CRP_SIZE); |
38 | + case 0x12: /* UMLAL, UMLAL2 */ | 44 | versal_unimp_area(s, "iou-scntr", &s->mr_ps, |
39 | + case 0x06: /* SMLSL, SMLSL2 */ | ||
40 | + case 0x16: /* UMLSL, UMLSL2 */ | ||
41 | + case 0x0a: /* SMULL, SMULL2 */ | ||
42 | + case 0x1a: /* UMULL, UMULL2 */ | ||
43 | if (is_scalar) { | ||
44 | unallocated_encoding(s); | ||
45 | return; | ||
46 | } | ||
47 | is_long = true; | ||
48 | break; | ||
49 | - case 0x3: /* SQDMLAL, SQDMLAL2 */ | ||
50 | - case 0x7: /* SQDMLSL, SQDMLSL2 */ | ||
51 | - case 0xb: /* SQDMULL, SQDMULL2 */ | ||
52 | + case 0x03: /* SQDMLAL, SQDMLAL2 */ | ||
53 | + case 0x07: /* SQDMLSL, SQDMLSL2 */ | ||
54 | + case 0x0b: /* SQDMULL, SQDMULL2 */ | ||
55 | is_long = true; | ||
56 | - /* fall through */ | ||
57 | - case 0xc: /* SQDMULH */ | ||
58 | - case 0xd: /* SQRDMULH */ | ||
59 | - if (u) { | ||
60 | - unallocated_encoding(s); | ||
61 | - return; | ||
62 | - } | ||
63 | break; | ||
64 | - case 0x8: /* MUL */ | ||
65 | - if (u || is_scalar) { | ||
66 | - unallocated_encoding(s); | ||
67 | - return; | ||
68 | - } | ||
69 | + case 0x0c: /* SQDMULH */ | ||
70 | + case 0x0d: /* SQRDMULH */ | ||
71 | break; | ||
72 | - case 0x1: /* FMLA */ | ||
73 | - case 0x5: /* FMLS */ | ||
74 | - if (u) { | ||
75 | - unallocated_encoding(s); | ||
76 | - return; | ||
77 | - } | ||
78 | - /* fall through */ | ||
79 | - case 0x9: /* FMUL, FMULX */ | ||
80 | + case 0x01: /* FMLA */ | ||
81 | + case 0x05: /* FMLS */ | ||
82 | + case 0x09: /* FMUL */ | ||
83 | + case 0x19: /* FMULX */ | ||
84 | if (size == 1) { | ||
85 | unallocated_encoding(s); | ||
86 | return; | ||
87 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | ||
88 | |||
89 | read_vec_element(s, tcg_op, rn, pass, MO_64); | ||
90 | |||
91 | - switch (opcode) { | ||
92 | - case 0x5: /* FMLS */ | ||
93 | + switch (16 * u + opcode) { | ||
94 | + case 0x05: /* FMLS */ | ||
95 | /* As usual for ARM, separate negation for fused multiply-add */ | ||
96 | gen_helper_vfp_negd(tcg_op, tcg_op); | ||
97 | /* fall through */ | ||
98 | - case 0x1: /* FMLA */ | ||
99 | + case 0x01: /* FMLA */ | ||
100 | read_vec_element(s, tcg_res, rd, pass, MO_64); | ||
101 | gen_helper_vfp_muladdd(tcg_res, tcg_op, tcg_idx, tcg_res, fpst); | ||
102 | break; | ||
103 | - case 0x9: /* FMUL, FMULX */ | ||
104 | - if (u) { | ||
105 | - gen_helper_vfp_mulxd(tcg_res, tcg_op, tcg_idx, fpst); | ||
106 | - } else { | ||
107 | - gen_helper_vfp_muld(tcg_res, tcg_op, tcg_idx, fpst); | ||
108 | - } | ||
109 | + case 0x09: /* FMUL */ | ||
110 | + gen_helper_vfp_muld(tcg_res, tcg_op, tcg_idx, fpst); | ||
111 | + break; | ||
112 | + case 0x19: /* FMULX */ | ||
113 | + gen_helper_vfp_mulxd(tcg_res, tcg_op, tcg_idx, fpst); | ||
114 | break; | ||
115 | default: | ||
116 | g_assert_not_reached(); | ||
117 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | ||
118 | |||
119 | read_vec_element_i32(s, tcg_op, rn, pass, is_scalar ? size : MO_32); | ||
120 | |||
121 | - switch (opcode) { | ||
122 | - case 0x0: /* MLA */ | ||
123 | - case 0x4: /* MLS */ | ||
124 | - case 0x8: /* MUL */ | ||
125 | + switch (16 * u + opcode) { | ||
126 | + case 0x08: /* MUL */ | ||
127 | + case 0x10: /* MLA */ | ||
128 | + case 0x14: /* MLS */ | ||
129 | { | ||
130 | static NeonGenTwoOpFn * const fns[2][2] = { | ||
131 | { gen_helper_neon_add_u16, gen_helper_neon_sub_u16 }, | ||
132 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | ||
133 | genfn(tcg_res, tcg_op, tcg_res); | ||
134 | break; | ||
135 | } | ||
136 | - case 0x5: /* FMLS */ | ||
137 | - case 0x1: /* FMLA */ | ||
138 | + case 0x05: /* FMLS */ | ||
139 | + case 0x01: /* FMLA */ | ||
140 | read_vec_element_i32(s, tcg_res, rd, pass, | ||
141 | is_scalar ? size : MO_32); | ||
142 | switch (size) { | ||
143 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | ||
144 | g_assert_not_reached(); | ||
145 | } | ||
146 | break; | ||
147 | - case 0x9: /* FMUL, FMULX */ | ||
148 | + case 0x09: /* FMUL */ | ||
149 | switch (size) { | ||
150 | case 1: | ||
151 | - if (u) { | ||
152 | - if (is_scalar) { | ||
153 | - gen_helper_advsimd_mulxh(tcg_res, tcg_op, | ||
154 | - tcg_idx, fpst); | ||
155 | - } else { | ||
156 | - gen_helper_advsimd_mulx2h(tcg_res, tcg_op, | ||
157 | - tcg_idx, fpst); | ||
158 | - } | ||
159 | + if (is_scalar) { | ||
160 | + gen_helper_advsimd_mulh(tcg_res, tcg_op, | ||
161 | + tcg_idx, fpst); | ||
162 | } else { | ||
163 | - if (is_scalar) { | ||
164 | - gen_helper_advsimd_mulh(tcg_res, tcg_op, | ||
165 | - tcg_idx, fpst); | ||
166 | - } else { | ||
167 | - gen_helper_advsimd_mul2h(tcg_res, tcg_op, | ||
168 | - tcg_idx, fpst); | ||
169 | - } | ||
170 | + gen_helper_advsimd_mul2h(tcg_res, tcg_op, | ||
171 | + tcg_idx, fpst); | ||
172 | } | ||
173 | break; | ||
174 | case 2: | ||
175 | - if (u) { | ||
176 | - gen_helper_vfp_mulxs(tcg_res, tcg_op, tcg_idx, fpst); | ||
177 | - } else { | ||
178 | - gen_helper_vfp_muls(tcg_res, tcg_op, tcg_idx, fpst); | ||
179 | - } | ||
180 | + gen_helper_vfp_muls(tcg_res, tcg_op, tcg_idx, fpst); | ||
181 | break; | ||
182 | default: | ||
183 | g_assert_not_reached(); | ||
184 | } | ||
185 | break; | ||
186 | - case 0xc: /* SQDMULH */ | ||
187 | + case 0x19: /* FMULX */ | ||
188 | + switch (size) { | ||
189 | + case 1: | ||
190 | + if (is_scalar) { | ||
191 | + gen_helper_advsimd_mulxh(tcg_res, tcg_op, | ||
192 | + tcg_idx, fpst); | ||
193 | + } else { | ||
194 | + gen_helper_advsimd_mulx2h(tcg_res, tcg_op, | ||
195 | + tcg_idx, fpst); | ||
196 | + } | ||
197 | + break; | ||
198 | + case 2: | ||
199 | + gen_helper_vfp_mulxs(tcg_res, tcg_op, tcg_idx, fpst); | ||
200 | + break; | ||
201 | + default: | ||
202 | + g_assert_not_reached(); | ||
203 | + } | ||
204 | + break; | ||
205 | + case 0x0c: /* SQDMULH */ | ||
206 | if (size == 1) { | ||
207 | gen_helper_neon_qdmulh_s16(tcg_res, cpu_env, | ||
208 | tcg_op, tcg_idx); | ||
209 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn) | ||
210 | tcg_op, tcg_idx); | ||
211 | } | ||
212 | break; | ||
213 | - case 0xd: /* SQRDMULH */ | ||
214 | + case 0x0d: /* SQRDMULH */ | ||
215 | if (size == 1) { | ||
216 | gen_helper_neon_qrdmulh_s16(tcg_res, cpu_env, | ||
217 | tcg_op, tcg_idx); | ||
218 | -- | 45 | -- |
219 | 2.16.2 | 46 | 2.20.1 |
220 | 47 | ||
221 | 48 | diff view generated by jsdifflib |
1 | From: Alistair Francis <alistair.francis@xilinx.com> | 1 | From: Tong Ho <tong.ho@xilinx.com> |
---|---|---|---|
2 | 2 | ||
3 | Signed-off-by: Alistair Francis <alistair.francis@xilinx.com> | 3 | Add unimplemented APU mmio region to xlnx-zynqmp for booting |
4 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 4 | bare-metal guests built with standalone bsp, which access the |
5 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 5 | region from one of the following places: |
6 | https://github.com/Xilinx/embeddedsw/blob/release-2020.2/lib/bsp/standalone/src/arm/ARMv8/64bit/armclang/boot.S#L139 | ||
7 | https://github.com/Xilinx/embeddedsw/blob/release-2020.2/lib/bsp/standalone/src/arm/ARMv8/64bit/gcc/boot.S#L183 | ||
8 | |||
9 | Acked-by: Alistair Francis <alistair.francis@wdc.com> | ||
10 | Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | ||
11 | Signed-off-by: Tong Ho <tong.ho@xilinx.com> | ||
12 | Message-id: 20210823173818.201259-3-tong.ho@xilinx.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | --- | 14 | --- |
8 | include/hw/arm/xlnx-zynqmp.h | 2 ++ | 15 | include/hw/arm/xlnx-zynqmp.h | 7 +++++++ |
9 | hw/arm/xlnx-zynqmp.c | 14 ++++++++++++++ | 16 | hw/arm/xlnx-zynqmp.c | 32 ++++++++++++++++++++++++++++++++ |
10 | 2 files changed, 16 insertions(+) | 17 | 2 files changed, 39 insertions(+) |
11 | 18 | ||
12 | diff --git a/include/hw/arm/xlnx-zynqmp.h b/include/hw/arm/xlnx-zynqmp.h | 19 | diff --git a/include/hw/arm/xlnx-zynqmp.h b/include/hw/arm/xlnx-zynqmp.h |
13 | index XXXXXXX..XXXXXXX 100644 | 20 | index XXXXXXX..XXXXXXX 100644 |
14 | --- a/include/hw/arm/xlnx-zynqmp.h | 21 | --- a/include/hw/arm/xlnx-zynqmp.h |
15 | +++ b/include/hw/arm/xlnx-zynqmp.h | 22 | +++ b/include/hw/arm/xlnx-zynqmp.h |
16 | @@ -XXX,XX +XXX,XX @@ | 23 | @@ -XXX,XX +XXX,XX @@ OBJECT_DECLARE_SIMPLE_TYPE(XlnxZynqMPState, XLNX_ZYNQMP) |
17 | #include "hw/dma/xlnx_dpdma.h" | 24 | #define XLNX_ZYNQMP_MAX_RAM_SIZE (XLNX_ZYNQMP_MAX_LOW_RAM_SIZE + \ |
18 | #include "hw/display/xlnx_dp.h" | 25 | XLNX_ZYNQMP_MAX_HIGH_RAM_SIZE) |
19 | #include "hw/intc/xlnx-zynqmp-ipi.h" | 26 | |
20 | +#include "hw/timer/xlnx-zynqmp-rtc.h" | 27 | +/* |
21 | 28 | + * Unimplemented mmio regions needed to boot some images. | |
22 | #define TYPE_XLNX_ZYNQMP "xlnx,zynqmp" | 29 | + */ |
23 | #define XLNX_ZYNQMP(obj) OBJECT_CHECK(XlnxZynqMPState, (obj), \ | 30 | +#define XLNX_ZYNQMP_NUM_UNIMP_AREAS 1 |
24 | @@ -XXX,XX +XXX,XX @@ typedef struct XlnxZynqMPState { | 31 | + |
25 | XlnxDPState dp; | 32 | struct XlnxZynqMPState { |
26 | XlnxDPDMAState dpdma; | 33 | /*< private >*/ |
27 | XlnxZynqMPIPI ipi; | 34 | DeviceState parent_obj; |
28 | + XlnxZynqMPRTC rtc; | 35 | @@ -XXX,XX +XXX,XX @@ struct XlnxZynqMPState { |
29 | 36 | MemoryRegion *ddr_ram; | |
30 | char *boot_cpu; | 37 | MemoryRegion ddr_ram_low, ddr_ram_high; |
31 | ARMCPU *boot_cpu_ptr; | 38 | |
39 | + MemoryRegion mr_unimp[XLNX_ZYNQMP_NUM_UNIMP_AREAS]; | ||
40 | + | ||
41 | CadenceGEMState gem[XLNX_ZYNQMP_NUM_GEMS]; | ||
42 | CadenceUARTState uart[XLNX_ZYNQMP_NUM_UARTS]; | ||
43 | XlnxZynqMPCANState can[XLNX_ZYNQMP_NUM_CAN]; | ||
32 | diff --git a/hw/arm/xlnx-zynqmp.c b/hw/arm/xlnx-zynqmp.c | 44 | diff --git a/hw/arm/xlnx-zynqmp.c b/hw/arm/xlnx-zynqmp.c |
33 | index XXXXXXX..XXXXXXX 100644 | 45 | index XXXXXXX..XXXXXXX 100644 |
34 | --- a/hw/arm/xlnx-zynqmp.c | 46 | --- a/hw/arm/xlnx-zynqmp.c |
35 | +++ b/hw/arm/xlnx-zynqmp.c | 47 | +++ b/hw/arm/xlnx-zynqmp.c |
36 | @@ -XXX,XX +XXX,XX @@ | 48 | @@ -XXX,XX +XXX,XX @@ |
49 | #include "qemu/module.h" | ||
50 | #include "hw/arm/xlnx-zynqmp.h" | ||
51 | #include "hw/intc/arm_gic_common.h" | ||
52 | +#include "hw/misc/unimp.h" | ||
53 | #include "hw/boards.h" | ||
54 | #include "sysemu/kvm.h" | ||
55 | #include "sysemu/sysemu.h" | ||
56 | @@ -XXX,XX +XXX,XX @@ | ||
57 | #define DPDMA_ADDR 0xfd4c0000 | ||
58 | #define DPDMA_IRQ 116 | ||
59 | |||
60 | +#define APU_ADDR 0xfd5c0000 | ||
61 | +#define APU_SIZE 0x100 | ||
62 | + | ||
37 | #define IPI_ADDR 0xFF300000 | 63 | #define IPI_ADDR 0xFF300000 |
38 | #define IPI_IRQ 64 | 64 | #define IPI_IRQ 64 |
39 | 65 | ||
40 | +#define RTC_ADDR 0xffa60000 | 66 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_create_rpu(MachineState *ms, XlnxZynqMPState *s, |
41 | +#define RTC_IRQ 26 | 67 | qdev_realize(DEVICE(&s->rpu_cluster), NULL, &error_fatal); |
68 | } | ||
69 | |||
70 | +static void xlnx_zynqmp_create_unimp_mmio(XlnxZynqMPState *s) | ||
71 | +{ | ||
72 | + static const struct UnimpInfo { | ||
73 | + const char *name; | ||
74 | + hwaddr base; | ||
75 | + hwaddr size; | ||
76 | + } unimp_areas[ARRAY_SIZE(s->mr_unimp)] = { | ||
77 | + { .name = "apu", APU_ADDR, APU_SIZE }, | ||
78 | + }; | ||
79 | + unsigned int nr; | ||
42 | + | 80 | + |
43 | #define SDHCI_CAPABILITIES 0x280737ec6481 /* Datasheet: UG1085 (v1.7) */ | 81 | + for (nr = 0; nr < ARRAY_SIZE(unimp_areas); nr++) { |
44 | 82 | + const struct UnimpInfo *info = &unimp_areas[nr]; | |
45 | static const uint64_t gem_addr[XLNX_ZYNQMP_NUM_GEMS] = { | 83 | + DeviceState *dev = qdev_new(TYPE_UNIMPLEMENTED_DEVICE); |
46 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_init(Object *obj) | 84 | + SysBusDevice *sbd = SYS_BUS_DEVICE(dev); |
47 | |||
48 | object_initialize(&s->ipi, sizeof(s->ipi), TYPE_XLNX_ZYNQMP_IPI); | ||
49 | qdev_set_parent_bus(DEVICE(&s->ipi), sysbus_get_default()); | ||
50 | + | 85 | + |
51 | + object_initialize(&s->rtc, sizeof(s->rtc), TYPE_XLNX_ZYNQMP_RTC); | 86 | + assert(info->name && info->base && info->size > 0); |
52 | + qdev_set_parent_bus(DEVICE(&s->rtc), sysbus_get_default()); | 87 | + qdev_prop_set_string(dev, "name", info->name); |
53 | } | 88 | + qdev_prop_set_uint64(dev, "size", info->size); |
54 | 89 | + object_property_add_child(OBJECT(s), info->name, OBJECT(dev)); | |
55 | static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) | 90 | + |
91 | + sysbus_realize_and_unref(sbd, &error_fatal); | ||
92 | + sysbus_mmio_map(sbd, 0, info->base); | ||
93 | + } | ||
94 | +} | ||
95 | + | ||
96 | static void xlnx_zynqmp_init(Object *obj) | ||
97 | { | ||
98 | MachineState *ms = MACHINE(qdev_get_machine()); | ||
56 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) | 99 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) |
57 | } | 100 | sysbus_mmio_map(SYS_BUS_DEVICE(&s->rtc), 0, RTC_ADDR); |
58 | sysbus_mmio_map(SYS_BUS_DEVICE(&s->ipi), 0, IPI_ADDR); | 101 | sysbus_connect_irq(SYS_BUS_DEVICE(&s->rtc), 0, gic_spi[RTC_IRQ]); |
59 | sysbus_connect_irq(SYS_BUS_DEVICE(&s->ipi), 0, gic_spi[IPI_IRQ]); | 102 | |
103 | + xlnx_zynqmp_create_unimp_mmio(s); | ||
60 | + | 104 | + |
61 | + object_property_set_bool(OBJECT(&s->rtc), true, "realized", &err); | 105 | for (i = 0; i < XLNX_ZYNQMP_NUM_GDMA_CH; i++) { |
62 | + if (err) { | 106 | if (!object_property_set_uint(OBJECT(&s->gdma[i]), "bus-width", 128, |
63 | + error_propagate(errp, err); | 107 | errp)) { |
64 | + return; | ||
65 | + } | ||
66 | + sysbus_mmio_map(SYS_BUS_DEVICE(&s->rtc), 0, RTC_ADDR); | ||
67 | + sysbus_connect_irq(SYS_BUS_DEVICE(&s->rtc), 0, gic_spi[RTC_IRQ]); | ||
68 | } | ||
69 | |||
70 | static Property xlnx_zynqmp_props[] = { | ||
71 | -- | 108 | -- |
72 | 2.16.2 | 109 | 2.20.1 |
73 | 110 | ||
74 | 111 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Richard Henderson <richard.henderson@linaro.org> | ||
2 | 1 | ||
3 | Allow the translate subroutines to return false for invalid insns. | ||
4 | |||
5 | At present we can of course invoke an invalid insn exception from within | ||
6 | the translate subroutine, but in the short term this consolidates code. | ||
7 | In the long term it would allow the decodetree language to support | ||
8 | overlapping patterns for ISA extensions. | ||
9 | |||
10 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
11 | Message-id: 20180227232618.2908-1-richard.henderson@linaro.org | ||
12 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
14 | --- | ||
15 | scripts/decodetree.py | 5 ++--- | ||
16 | 1 file changed, 2 insertions(+), 3 deletions(-) | ||
17 | |||
18 | diff --git a/scripts/decodetree.py b/scripts/decodetree.py | ||
19 | index XXXXXXX..XXXXXXX 100755 | ||
20 | --- a/scripts/decodetree.py | ||
21 | +++ b/scripts/decodetree.py | ||
22 | @@ -XXX,XX +XXX,XX @@ class Pattern(General): | ||
23 | global translate_prefix | ||
24 | output('typedef ', self.base.base.struct_name(), | ||
25 | ' arg_', self.name, ';\n') | ||
26 | - output(translate_scope, 'void ', translate_prefix, '_', self.name, | ||
27 | + output(translate_scope, 'bool ', translate_prefix, '_', self.name, | ||
28 | '(DisasContext *ctx, arg_', self.name, | ||
29 | ' *a, ', insntype, ' insn);\n') | ||
30 | |||
31 | @@ -XXX,XX +XXX,XX @@ class Pattern(General): | ||
32 | output(ind, self.base.extract_name(), '(&u.f_', arg, ', insn);\n') | ||
33 | for n, f in self.fields.items(): | ||
34 | output(ind, 'u.f_', arg, '.', n, ' = ', f.str_extract(), ';\n') | ||
35 | - output(ind, translate_prefix, '_', self.name, | ||
36 | + output(ind, 'return ', translate_prefix, '_', self.name, | ||
37 | '(ctx, &u.f_', arg, ', insn);\n') | ||
38 | - output(ind, 'return true;\n') | ||
39 | # end Pattern | ||
40 | |||
41 | |||
42 | -- | ||
43 | 2.16.2 | ||
44 | |||
45 | diff view generated by jsdifflib |