1 | target-arm queue: Eric's SMMUv3 patchset, and an array | 1 | Some arm patches; my to-review queue is by no means empty, but |
---|---|---|---|
2 | of minor bugfixes and improvements from various others. | 2 | this is a big enough set of patches to be getting on with... |
3 | 3 | ||
4 | thanks | ||
5 | -- PMM | 4 | -- PMM |
6 | 5 | ||
7 | The following changes since commit c8b7e627b4269a3bc3ae41d9f420547a47e6d9b9: | 6 | The following changes since commit cb9c6a8e5ad6a1f0ce164d352e3102df46986e22: |
8 | 7 | ||
9 | Merge remote-tracking branch 'remotes/ericb/tags/pull-nbd-2018-05-04' into staging (2018-05-04 14:42:46 +0100) | 8 | .gitlab-ci.d/windows: Work-around timeout and OpenGL problems of the MSYS2 jobs (2023-01-04 18:58:33 +0000) |
10 | 9 | ||
11 | are available in the Git repository at: | 10 | are available in the Git repository at: |
12 | 11 | ||
13 | git://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20180504 | 12 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20230105 |
14 | 13 | ||
15 | for you to fetch changes up to 5680740c92993e9b3f3e011f2a2c394070e33f56: | 14 | for you to fetch changes up to 93c9678de9dc7d2e68f9e8477da072bac30ef132: |
16 | 15 | ||
17 | hw/arm/virt: Introduce the iommu option (2018-05-04 18:05:52 +0100) | 16 | hw/net: Fix read of uninitialized memory in imx_fec. (2023-01-05 15:33:00 +0000) |
18 | 17 | ||
19 | ---------------------------------------------------------------- | 18 | ---------------------------------------------------------------- |
20 | target-arm queue: | 19 | target-arm queue: |
21 | * Emulate the SMMUv3 (IOMMU); one will be created in the 'virt' board | 20 | * Implement AArch32 ARMv8-R support |
22 | if the commandline includes "-machine iommu=smmuv3" | 21 | * Add Cortex-R52 CPU |
23 | * target/arm: Implement v8M VLLDM and VLSTM | 22 | * fix handling of HLT semihosting in system mode |
24 | * hw/arm: Don't fail qtest due to missing SD card in -nodefaults mode | 23 | * hw/timer/ixm_epit: cleanup and fix bug in compare handling |
25 | * Some fixes to silence Coverity false-positives | 24 | * target/arm: Coding style fixes |
26 | * arm: boot: set boot_info starting from first_cpu | 25 | * target/arm: Clean up includes |
27 | (fixes a technical bug not visible in practice) | 26 | * nseries: minor code cleanups |
28 | * hw/net/smc91c111: Convert away from old_mmio | 27 | * target/arm: align exposed ID registers with Linux |
29 | * hw/usb/tusb6010: Convert away from old_mmio | 28 | * hw/arm/smmu-common: remove unnecessary inlines |
30 | * hw/char/cmsdk-apb-uart.c: Accept more input after character read | 29 | * i.MX7D: Handle GPT timers |
31 | * target/arm: Make MPUIR write-ignored on OMAP, StrongARM | 30 | * i.MX7D: Connect IRQs to GPIO devices |
32 | * hw/arm/virt: Add linux,pci-domain property | 31 | * i.MX6UL: Add a specific GPT timer instance |
32 | * hw/net: Fix read of uninitialized memory in imx_fec | ||
33 | 33 | ||
34 | ---------------------------------------------------------------- | 34 | ---------------------------------------------------------------- |
35 | Eric Auger (11): | 35 | Alex Bennée (1): |
36 | hw/arm/smmu-common: smmu base device and datatypes | 36 | target/arm: fix handling of HLT semihosting in system mode |
37 | hw/arm/smmu-common: IOMMU memory region and address space setup | ||
38 | hw/arm/smmu-common: VMSAv8-64 page table walk | ||
39 | hw/arm/smmuv3: Wired IRQ and GERROR helpers | ||
40 | hw/arm/smmuv3: Queue helpers | ||
41 | hw/arm/smmuv3: Implement MMIO write operations | ||
42 | hw/arm/smmuv3: Event queue recording helper | ||
43 | hw/arm/smmuv3: Implement translate callback | ||
44 | hw/arm/smmuv3: Abort on vfio or vhost case | ||
45 | target/arm/kvm: Translate the MSI doorbell in kvm_arch_fixup_msi_route | ||
46 | hw/arm/virt: Introduce the iommu option | ||
47 | 37 | ||
48 | Igor Mammedov (1): | 38 | Axel Heider (8): |
49 | arm: boot: set boot_info starting from first_cpu | 39 | hw/timer/imx_epit: improve comments |
40 | hw/timer/imx_epit: cleanup CR defines | ||
41 | hw/timer/imx_epit: define SR_OCIF | ||
42 | hw/timer/imx_epit: update interrupt state on CR write access | ||
43 | hw/timer/imx_epit: hard reset initializes CR with 0 | ||
44 | hw/timer/imx_epit: factor out register write handlers | ||
45 | hw/timer/imx_epit: remove explicit fields cnt and freq | ||
46 | hw/timer/imx_epit: fix compare timer handling | ||
50 | 47 | ||
51 | Jan Kiszka (1): | 48 | Claudio Fontana (1): |
52 | hw/arm/virt: Add linux,pci-domain property | 49 | target/arm: cleanup cpu includes |
53 | 50 | ||
54 | Mathew Maidment (1): | 51 | Fabiano Rosas (5): |
55 | target/arm: Correct MPUIR privilege level in register_cp_regs_for_features() conditional case | 52 | target/arm: Fix checkpatch comment style warnings in helper.c |
53 | target/arm: Fix checkpatch space errors in helper.c | ||
54 | target/arm: Fix checkpatch brace errors in helper.c | ||
55 | target/arm: Remove unused includes from m_helper.c | ||
56 | target/arm: Remove unused includes from helper.c | ||
56 | 57 | ||
57 | Patrick Oppenlander (1): | 58 | Jean-Christophe Dubois (4): |
58 | hw/char/cmsdk-apb-uart.c: Accept more input after character read | 59 | i.MX7D: Connect GPT timers to IRQ |
60 | i.MX7D: Compute clock frequency for the fixed frequency clocks. | ||
61 | i.MX6UL: Add a specific GPT timer instance for the i.MX6UL | ||
62 | i.MX7D: Connect IRQs to GPIO devices. | ||
59 | 63 | ||
60 | Peter Maydell (3): | 64 | Peter Maydell (1): |
61 | hw/usb/tusb6010: Convert away from old_mmio | 65 | target/arm:Set lg_page_size to 0 if either S1 or S2 asks for it |
62 | hw/net/smc91c111: Convert away from old_mmio | ||
63 | target/arm: Implement v8M VLLDM and VLSTM | ||
64 | 66 | ||
65 | Prem Mallappa (3): | 67 | Philippe Mathieu-Daudé (5): |
66 | hw/arm/smmuv3: Skeleton | 68 | hw/input/tsc2xxx: Constify set_transform()'s MouseTransformInfo arg |
67 | hw/arm/virt: Add SMMUv3 to the virt board | 69 | hw/arm/nseries: Constify various read-only arrays |
68 | hw/arm/virt-acpi-build: Add smmuv3 node in IORT table | 70 | hw/arm/nseries: Silent -Wmissing-field-initializers warning |
71 | hw/arm/smmu-common: Reduce smmu_inv_notifiers_mr() scope | ||
72 | hw/arm/smmu-common: Avoid using inlined functions with external linkage | ||
69 | 73 | ||
70 | Richard Henderson (2): | 74 | Stephen Longfield (1): |
71 | target/arm: Tidy conditions in handle_vec_simd_shri | 75 | hw/net: Fix read of uninitialized memory in imx_fec. |
72 | target/arm: Tidy condition in disas_simd_two_reg_misc | ||
73 | 76 | ||
74 | Thomas Huth (1): | 77 | Tobias Röhmel (7): |
75 | hw/arm: Don't fail qtest due to missing SD card in -nodefaults mode | 78 | target/arm: Don't add all MIDR aliases for cores that implement PMSA |
79 | target/arm: Make RVBAR available for all ARMv8 CPUs | ||
80 | target/arm: Make stage_2_format for cache attributes optional | ||
81 | target/arm: Enable TTBCR_EAE for ARMv8-R AArch32 | ||
82 | target/arm: Add PMSAv8r registers | ||
83 | target/arm: Add PMSAv8r functionality | ||
84 | target/arm: Add ARM Cortex-R52 CPU | ||
76 | 85 | ||
77 | hw/arm/Makefile.objs | 1 + | 86 | Zhuojia Shen (1): |
78 | hw/arm/smmu-internal.h | 99 +++ | 87 | target/arm: align exposed ID registers with Linux |
79 | hw/arm/smmuv3-internal.h | 621 ++++++++++++++++++ | ||
80 | include/hw/acpi/acpi-defs.h | 15 + | ||
81 | include/hw/arm/smmu-common.h | 145 +++++ | ||
82 | include/hw/arm/smmuv3.h | 87 +++ | ||
83 | include/hw/arm/virt.h | 10 + | ||
84 | hw/arm/boot.c | 2 +- | ||
85 | hw/arm/omap1.c | 8 +- | ||
86 | hw/arm/omap2.c | 8 +- | ||
87 | hw/arm/pxa2xx.c | 15 +- | ||
88 | hw/arm/smmu-common.c | 372 +++++++++++ | ||
89 | hw/arm/smmuv3.c | 1191 +++++++++++++++++++++++++++++++++++ | ||
90 | hw/arm/virt-acpi-build.c | 55 +- | ||
91 | hw/arm/virt.c | 101 ++- | ||
92 | hw/char/cmsdk-apb-uart.c | 1 + | ||
93 | hw/net/smc91c111.c | 54 +- | ||
94 | hw/usb/tusb6010.c | 40 +- | ||
95 | target/arm/helper.c | 2 +- | ||
96 | target/arm/kvm.c | 38 +- | ||
97 | target/arm/translate-a64.c | 12 +- | ||
98 | target/arm/translate.c | 17 +- | ||
99 | default-configs/aarch64-softmmu.mak | 1 + | ||
100 | hw/arm/trace-events | 37 ++ | ||
101 | target/arm/trace-events | 3 + | ||
102 | 25 files changed, 2868 insertions(+), 67 deletions(-) | ||
103 | create mode 100644 hw/arm/smmu-internal.h | ||
104 | create mode 100644 hw/arm/smmuv3-internal.h | ||
105 | create mode 100644 include/hw/arm/smmu-common.h | ||
106 | create mode 100644 include/hw/arm/smmuv3.h | ||
107 | create mode 100644 hw/arm/smmu-common.c | ||
108 | create mode 100644 hw/arm/smmuv3.c | ||
109 | 88 | ||
89 | include/hw/arm/fsl-imx7.h | 20 + | ||
90 | include/hw/arm/smmu-common.h | 3 - | ||
91 | include/hw/input/tsc2xxx.h | 4 +- | ||
92 | include/hw/timer/imx_epit.h | 8 +- | ||
93 | include/hw/timer/imx_gpt.h | 1 + | ||
94 | target/arm/cpu.h | 6 + | ||
95 | target/arm/internals.h | 4 + | ||
96 | hw/arm/fsl-imx6ul.c | 2 +- | ||
97 | hw/arm/fsl-imx7.c | 41 +- | ||
98 | hw/arm/nseries.c | 28 +- | ||
99 | hw/arm/smmu-common.c | 15 +- | ||
100 | hw/input/tsc2005.c | 2 +- | ||
101 | hw/input/tsc210x.c | 3 +- | ||
102 | hw/misc/imx6ul_ccm.c | 6 - | ||
103 | hw/misc/imx7_ccm.c | 49 ++- | ||
104 | hw/net/imx_fec.c | 8 +- | ||
105 | hw/timer/imx_epit.c | 376 +++++++++------- | ||
106 | hw/timer/imx_gpt.c | 25 ++ | ||
107 | target/arm/cpu.c | 35 +- | ||
108 | target/arm/cpu64.c | 6 - | ||
109 | target/arm/cpu_tcg.c | 42 ++ | ||
110 | target/arm/debug_helper.c | 3 + | ||
111 | target/arm/helper.c | 871 +++++++++++++++++++++++++++++--------- | ||
112 | target/arm/m_helper.c | 16 - | ||
113 | target/arm/machine.c | 28 ++ | ||
114 | target/arm/ptw.c | 152 +++++-- | ||
115 | target/arm/tlb_helper.c | 4 + | ||
116 | target/arm/translate.c | 2 +- | ||
117 | tests/tcg/aarch64/sysregs.c | 24 +- | ||
118 | tests/tcg/aarch64/Makefile.target | 7 +- | ||
119 | 30 files changed, 1330 insertions(+), 461 deletions(-) | ||
120 | diff view generated by jsdifflib |
1 | Convert the tusb6010 device away from using the old_mmio field | 1 | In get_phys_addr_twostage() we set the lg_page_size of the result to |
---|---|---|---|
2 | of MemoryRegionOps. This device is used only in the n800 and n810 | 2 | the maximum of the stage 1 and stage 2 page sizes. This works for |
3 | boards. | 3 | the case where we do want to create a TLB entry, because we know the |
4 | common TLB code only creates entries of the TARGET_PAGE_SIZE and | ||
5 | asking for a size larger than that only means that invalidations | ||
6 | invalidate the whole larger area. However, if lg_page_size is | ||
7 | smaller than TARGET_PAGE_SIZE this effectively means "don't create a | ||
8 | TLB entry"; in this case if either S1 or S2 said "this covers less | ||
9 | than a page and can't go in a TLB" then the final result also should | ||
10 | be marked that way. Set the resulting page size to 0 if either | ||
11 | stage asked for a less-than-a-page entry, and expand the comment | ||
12 | to explain what's going on. | ||
13 | |||
14 | This has no effect for VMSA because currently the VMSA lookup always | ||
15 | returns results that cover at least TARGET_PAGE_SIZE; however when we | ||
16 | add v8R support it will reuse this code path, and for v8R the S1 and | ||
17 | S2 results can be smaller than TARGET_PAGE_SIZE. | ||
4 | 18 | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 19 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 20 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
7 | Message-id: 20180427173611.10281-2-peter.maydell@linaro.org | 21 | Message-id: 20221212142708.610090-1-peter.maydell@linaro.org |
8 | --- | 22 | --- |
9 | hw/usb/tusb6010.c | 40 ++++++++++++++++++++++++++++++++++++---- | 23 | target/arm/ptw.c | 16 +++++++++++++--- |
10 | 1 file changed, 36 insertions(+), 4 deletions(-) | 24 | 1 file changed, 13 insertions(+), 3 deletions(-) |
11 | 25 | ||
12 | diff --git a/hw/usb/tusb6010.c b/hw/usb/tusb6010.c | 26 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c |
13 | index XXXXXXX..XXXXXXX 100644 | 27 | index XXXXXXX..XXXXXXX 100644 |
14 | --- a/hw/usb/tusb6010.c | 28 | --- a/target/arm/ptw.c |
15 | +++ b/hw/usb/tusb6010.c | 29 | +++ b/target/arm/ptw.c |
16 | @@ -XXX,XX +XXX,XX @@ static void tusb_async_writew(void *opaque, hwaddr addr, | 30 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_twostage(CPUARMState *env, S1Translate *ptw, |
17 | } | 31 | } |
18 | } | 32 | |
19 | 33 | /* | |
20 | +static uint64_t tusb_async_readfn(void *opaque, hwaddr addr, unsigned size) | 34 | - * Use the maximum of the S1 & S2 page size, so that invalidation |
21 | +{ | 35 | - * of pages > TARGET_PAGE_SIZE works correctly. |
22 | + switch (size) { | 36 | + * If either S1 or S2 returned a result smaller than TARGET_PAGE_SIZE, |
23 | + case 1: | 37 | + * this means "don't put this in the TLB"; in this case, return a |
24 | + return tusb_async_readb(opaque, addr); | 38 | + * result with lg_page_size == 0 to achieve that. Otherwise, |
25 | + case 2: | 39 | + * use the maximum of the S1 & S2 page size, so that invalidation |
26 | + return tusb_async_readh(opaque, addr); | 40 | + * of pages > TARGET_PAGE_SIZE works correctly. (This works even though |
27 | + case 4: | 41 | + * we know the combined result permissions etc only cover the minimum |
28 | + return tusb_async_readw(opaque, addr); | 42 | + * of the S1 and S2 page size, because we know that the common TLB code |
29 | + default: | 43 | + * never actually creates TLB entries bigger than TARGET_PAGE_SIZE, |
30 | + g_assert_not_reached(); | 44 | + * and passing a larger page size value only affects invalidations.) |
31 | + } | 45 | */ |
32 | +} | 46 | - if (result->f.lg_page_size < s1_lgpgsz) { |
33 | + | 47 | + if (result->f.lg_page_size < TARGET_PAGE_BITS || |
34 | +static void tusb_async_writefn(void *opaque, hwaddr addr, | 48 | + s1_lgpgsz < TARGET_PAGE_BITS) { |
35 | + uint64_t value, unsigned size) | 49 | + result->f.lg_page_size = 0; |
36 | +{ | 50 | + } else if (result->f.lg_page_size < s1_lgpgsz) { |
37 | + switch (size) { | 51 | result->f.lg_page_size = s1_lgpgsz; |
38 | + case 1: | 52 | } |
39 | + tusb_async_writeb(opaque, addr, value); | ||
40 | + break; | ||
41 | + case 2: | ||
42 | + tusb_async_writeh(opaque, addr, value); | ||
43 | + break; | ||
44 | + case 4: | ||
45 | + tusb_async_writew(opaque, addr, value); | ||
46 | + break; | ||
47 | + default: | ||
48 | + g_assert_not_reached(); | ||
49 | + } | ||
50 | +} | ||
51 | + | ||
52 | static const MemoryRegionOps tusb_async_ops = { | ||
53 | - .old_mmio = { | ||
54 | - .read = { tusb_async_readb, tusb_async_readh, tusb_async_readw, }, | ||
55 | - .write = { tusb_async_writeb, tusb_async_writeh, tusb_async_writew, }, | ||
56 | - }, | ||
57 | + .read = tusb_async_readfn, | ||
58 | + .write = tusb_async_writefn, | ||
59 | + .valid.min_access_size = 1, | ||
60 | + .valid.max_access_size = 4, | ||
61 | .endianness = DEVICE_NATIVE_ENDIAN, | ||
62 | }; | ||
63 | 53 | ||
64 | -- | 54 | -- |
65 | 2.17.0 | 55 | 2.25.1 |
66 | |||
67 | diff view generated by jsdifflib |
1 | From: Mathew Maidment <mathew1800@gmail.com> | 1 | From: Tobias Röhmel <tobias.roehmel@rwth-aachen.de> |
---|---|---|---|
2 | 2 | ||
3 | The duplication of id_tlbtr_reginfo was unintentionally added within | 3 | Cores with PMSA have the MPUIR register which has the |
4 | 3281af8114c6b8ead02f08b58e3c36895c1ea047 which should have been | 4 | same encoding as the MIDR alias with opc2=4. So we only |
5 | id_mpuir_reginfo. | 5 | add that alias if we are not realizing a core that |
6 | implements PMSA. | ||
6 | 7 | ||
7 | The effect was that for OMAP and StrongARM CPUs we would | 8 | Signed-off-by: Tobias Röhmel <tobias.roehmel@rwth-aachen.de> |
8 | incorrectly UNDEF writes to MPUIR rather than NOPing them. | ||
9 | |||
10 | Signed-off-by: Mathew Maidment <mathew1800@gmail.com> | ||
11 | Message-id: 20180501184933.37609-2-mathew1800@gmail.com | ||
12 | [PMM: tweak commit message] | ||
13 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
11 | Message-id: 20221206102504.165775-2-tobias.roehmel@rwth-aachen.de | ||
14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
15 | --- | 13 | --- |
16 | target/arm/helper.c | 2 +- | 14 | target/arm/helper.c | 13 +++++++++---- |
17 | 1 file changed, 1 insertion(+), 1 deletion(-) | 15 | 1 file changed, 9 insertions(+), 4 deletions(-) |
18 | 16 | ||
19 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 17 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
20 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
21 | --- a/target/arm/helper.c | 19 | --- a/target/arm/helper.c |
22 | +++ b/target/arm/helper.c | 20 | +++ b/target/arm/helper.c |
23 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) | 21 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) |
24 | for (r = id_cp_reginfo; r->type != ARM_CP_SENTINEL; r++) { | 22 | .access = PL1_R, .type = ARM_CP_NO_RAW, .resetvalue = cpu->midr, |
25 | r->access = PL1_RW; | 23 | .fieldoffset = offsetof(CPUARMState, cp15.c0_cpuid), |
26 | } | 24 | .readfn = midr_read }, |
27 | - id_tlbtr_reginfo.access = PL1_RW; | 25 | - /* crn = 0 op1 = 0 crm = 0 op2 = 4,7 : AArch32 aliases of MIDR */ |
28 | + id_mpuir_reginfo.access = PL1_RW; | 26 | - { .name = "MIDR", .type = ARM_CP_ALIAS | ARM_CP_CONST, |
29 | id_tlbtr_reginfo.access = PL1_RW; | 27 | - .cp = 15, .crn = 0, .crm = 0, .opc1 = 0, .opc2 = 4, |
28 | - .access = PL1_R, .resetvalue = cpu->midr }, | ||
29 | + /* crn = 0 op1 = 0 crm = 0 op2 = 7 : AArch32 aliases of MIDR */ | ||
30 | { .name = "MIDR", .type = ARM_CP_ALIAS | ARM_CP_CONST, | ||
31 | .cp = 15, .crn = 0, .crm = 0, .opc1 = 0, .opc2 = 7, | ||
32 | .access = PL1_R, .resetvalue = cpu->midr }, | ||
33 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) | ||
34 | .accessfn = access_aa64_tid1, | ||
35 | .type = ARM_CP_CONST, .resetvalue = cpu->revidr }, | ||
36 | }; | ||
37 | + ARMCPRegInfo id_v8_midr_alias_cp_reginfo = { | ||
38 | + .name = "MIDR", .type = ARM_CP_ALIAS | ARM_CP_CONST, | ||
39 | + .cp = 15, .crn = 0, .crm = 0, .opc1 = 0, .opc2 = 4, | ||
40 | + .access = PL1_R, .resetvalue = cpu->midr | ||
41 | + }; | ||
42 | ARMCPRegInfo id_cp_reginfo[] = { | ||
43 | /* These are common to v8 and pre-v8 */ | ||
44 | { .name = "CTR", | ||
45 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) | ||
30 | } | 46 | } |
31 | if (arm_feature(env, ARM_FEATURE_V8)) { | 47 | if (arm_feature(env, ARM_FEATURE_V8)) { |
48 | define_arm_cp_regs(cpu, id_v8_midr_cp_reginfo); | ||
49 | + if (!arm_feature(env, ARM_FEATURE_PMSA)) { | ||
50 | + define_one_arm_cp_reg(cpu, &id_v8_midr_alias_cp_reginfo); | ||
51 | + } | ||
52 | } else { | ||
53 | define_arm_cp_regs(cpu, id_pre_v8_midr_cp_reginfo); | ||
54 | } | ||
32 | -- | 55 | -- |
33 | 2.17.0 | 56 | 2.25.1 |
34 | 57 | ||
35 | 58 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Tobias Röhmel <tobias.roehmel@rwth-aachen.de> |
---|---|---|---|
2 | 2 | ||
3 | Path analysis shows that size == 3 && !is_q has been eliminated. | 3 | RVBAR shadows RVBAR_ELx where x is the highest exception |
4 | level if the highest EL is not EL3. This patch also allows | ||
5 | ARMv8 CPUs to change the reset address with | ||
6 | the rvbar property. | ||
4 | 7 | ||
5 | Fixes: Coverity CID1385853 | 8 | Signed-off-by: Tobias Röhmel <tobias.roehmel@rwth-aachen.de> |
6 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | 10 | Message-id: 20221206102504.165775-3-tobias.roehmel@rwth-aachen.de |
8 | Message-id: 20180501180455.11214-3-richard.henderson@linaro.org | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | --- | 12 | --- |
11 | target/arm/translate-a64.c | 6 +++++- | 13 | target/arm/cpu.c | 6 +++++- |
12 | 1 file changed, 5 insertions(+), 1 deletion(-) | 14 | target/arm/helper.c | 21 ++++++++++++++------- |
15 | 2 files changed, 19 insertions(+), 8 deletions(-) | ||
13 | 16 | ||
14 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c | 17 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c |
15 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/target/arm/translate-a64.c | 19 | --- a/target/arm/cpu.c |
17 | +++ b/target/arm/translate-a64.c | 20 | +++ b/target/arm/cpu.c |
18 | @@ -XXX,XX +XXX,XX @@ static void disas_simd_two_reg_misc(DisasContext *s, uint32_t insn) | 21 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset_hold(Object *obj) |
19 | /* All 64-bit element operations can be shared with scalar 2misc */ | 22 | env->cp15.cpacr_el1 = FIELD_DP64(env->cp15.cpacr_el1, |
20 | int pass; | 23 | CPACR, CP11, 3); |
21 | 24 | #endif | |
22 | - for (pass = 0; pass < (is_q ? 2 : 1); pass++) { | 25 | + if (arm_feature(env, ARM_FEATURE_V8)) { |
23 | + /* Coverity claims (size == 3 && !is_q) has been eliminated | 26 | + env->cp15.rvbar = cpu->rvbar_prop; |
24 | + * from all paths leading to here. | 27 | + env->regs[15] = cpu->rvbar_prop; |
25 | + */ | 28 | + } |
26 | + tcg_debug_assert(is_q); | 29 | } |
27 | + for (pass = 0; pass < 2; pass++) { | 30 | |
28 | TCGv_i64 tcg_op = tcg_temp_new_i64(); | 31 | #if defined(CONFIG_USER_ONLY) |
29 | TCGv_i64 tcg_res = tcg_temp_new_i64(); | 32 | @@ -XXX,XX +XXX,XX @@ void arm_cpu_post_init(Object *obj) |
33 | qdev_property_add_static(DEVICE(obj), &arm_cpu_reset_hivecs_property); | ||
34 | } | ||
35 | |||
36 | - if (arm_feature(&cpu->env, ARM_FEATURE_AARCH64)) { | ||
37 | + if (arm_feature(&cpu->env, ARM_FEATURE_V8)) { | ||
38 | object_property_add_uint64_ptr(obj, "rvbar", | ||
39 | &cpu->rvbar_prop, | ||
40 | OBJ_PROP_FLAG_READWRITE); | ||
41 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
42 | index XXXXXXX..XXXXXXX 100644 | ||
43 | --- a/target/arm/helper.c | ||
44 | +++ b/target/arm/helper.c | ||
45 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) | ||
46 | if (!arm_feature(env, ARM_FEATURE_EL3) && | ||
47 | !arm_feature(env, ARM_FEATURE_EL2)) { | ||
48 | ARMCPRegInfo rvbar = { | ||
49 | - .name = "RVBAR_EL1", .state = ARM_CP_STATE_AA64, | ||
50 | + .name = "RVBAR_EL1", .state = ARM_CP_STATE_BOTH, | ||
51 | .opc0 = 3, .opc1 = 0, .crn = 12, .crm = 0, .opc2 = 1, | ||
52 | .access = PL1_R, | ||
53 | .fieldoffset = offsetof(CPUARMState, cp15.rvbar), | ||
54 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) | ||
55 | } | ||
56 | /* RVBAR_EL2 is only implemented if EL2 is the highest EL */ | ||
57 | if (!arm_feature(env, ARM_FEATURE_EL3)) { | ||
58 | - ARMCPRegInfo rvbar = { | ||
59 | - .name = "RVBAR_EL2", .state = ARM_CP_STATE_AA64, | ||
60 | - .opc0 = 3, .opc1 = 4, .crn = 12, .crm = 0, .opc2 = 1, | ||
61 | - .access = PL2_R, | ||
62 | - .fieldoffset = offsetof(CPUARMState, cp15.rvbar), | ||
63 | + ARMCPRegInfo rvbar[] = { | ||
64 | + { | ||
65 | + .name = "RVBAR_EL2", .state = ARM_CP_STATE_AA64, | ||
66 | + .opc0 = 3, .opc1 = 4, .crn = 12, .crm = 0, .opc2 = 1, | ||
67 | + .access = PL2_R, | ||
68 | + .fieldoffset = offsetof(CPUARMState, cp15.rvbar), | ||
69 | + }, | ||
70 | + { .name = "RVBAR", .type = ARM_CP_ALIAS, | ||
71 | + .cp = 15, .opc1 = 0, .crn = 12, .crm = 0, .opc2 = 1, | ||
72 | + .access = PL2_R, | ||
73 | + .fieldoffset = offsetof(CPUARMState, cp15.rvbar), | ||
74 | + }, | ||
75 | }; | ||
76 | - define_one_arm_cp_reg(cpu, &rvbar); | ||
77 | + define_arm_cp_regs(cpu, rvbar); | ||
78 | } | ||
79 | } | ||
30 | 80 | ||
31 | -- | 81 | -- |
32 | 2.17.0 | 82 | 2.25.1 |
33 | 83 | ||
34 | 84 | diff view generated by jsdifflib |
1 | From: Thomas Huth <thuth@redhat.com> | 1 | From: Tobias Röhmel <tobias.roehmel@rwth-aachen.de> |
---|---|---|---|
2 | 2 | ||
3 | When running omap1/2 or pxa2xx based ARM machines with -nodefaults, | 3 | The v8R PMSAv8 has a two-stage MPU translation process, but, unlike |
4 | they bail out immediately complaining about a "missing SecureDigital | 4 | VMSAv8, the stage 2 attributes are in the same format as the stage 1 |
5 | device". That's not how the "default" devices in vl.c are meant to | 5 | attributes (8-bit MAIR format). Rather than converting the MAIR |
6 | work - it should be possible for a board to also start up without | 6 | format to the format used for VMSA stage 2 (bits [5:2] of a VMSA |
7 | default devices. So let's turn the error message and exit() into | 7 | stage 2 descriptor) and then converting back to do the attribute |
8 | a warning instead. | 8 | combination, allow combined_attrs_nofwb() to accept s2 attributes |
9 | that are already in the MAIR format. | ||
9 | 10 | ||
10 | Signed-off-by: Thomas Huth <thuth@redhat.com> | 11 | We move the assert() to combined_attrs_fwb(), because that function |
11 | Message-id: 1525326811-3233-1-git-send-email-thuth@redhat.com | 12 | really does require a VMSA stage 2 attribute format. (We will never |
12 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 13 | get there for v8R, because PMSAv8 does not implement FEAT_S2FWB.) |
14 | |||
15 | Signed-off-by: Tobias Röhmel <tobias.roehmel@rwth-aachen.de> | ||
13 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 16 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
17 | Message-id: 20221206102504.165775-4-tobias.roehmel@rwth-aachen.de | ||
14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 18 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
15 | --- | 19 | --- |
16 | hw/arm/omap1.c | 8 ++++---- | 20 | target/arm/ptw.c | 10 ++++++++-- |
17 | hw/arm/omap2.c | 8 ++++---- | 21 | 1 file changed, 8 insertions(+), 2 deletions(-) |
18 | hw/arm/pxa2xx.c | 15 +++++++-------- | ||
19 | 3 files changed, 15 insertions(+), 16 deletions(-) | ||
20 | 22 | ||
21 | diff --git a/hw/arm/omap1.c b/hw/arm/omap1.c | 23 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c |
22 | index XXXXXXX..XXXXXXX 100644 | 24 | index XXXXXXX..XXXXXXX 100644 |
23 | --- a/hw/arm/omap1.c | 25 | --- a/target/arm/ptw.c |
24 | +++ b/hw/arm/omap1.c | 26 | +++ b/target/arm/ptw.c |
25 | @@ -XXX,XX +XXX,XX @@ | 27 | @@ -XXX,XX +XXX,XX @@ static uint8_t combined_attrs_nofwb(uint64_t hcr, |
26 | #include "hw/arm/soc_dma.h" | 28 | { |
27 | #include "sysemu/block-backend.h" | 29 | uint8_t s1lo, s2lo, s1hi, s2hi, s2_mair_attrs, ret_attrs; |
28 | #include "sysemu/blockdev.h" | 30 | |
29 | +#include "sysemu/qtest.h" | 31 | - s2_mair_attrs = convert_stage2_attrs(hcr, s2.attrs); |
30 | #include "qemu/range.h" | 32 | + if (s2.is_s2_format) { |
31 | #include "hw/sysbus.h" | 33 | + s2_mair_attrs = convert_stage2_attrs(hcr, s2.attrs); |
32 | #include "qemu/cutils.h" | 34 | + } else { |
33 | @@ -XXX,XX +XXX,XX @@ struct omap_mpu_state_s *omap310_mpu_init(MemoryRegion *system_memory, | 35 | + s2_mair_attrs = s2.attrs; |
34 | omap_findclk(s, "dpll3")); | 36 | + } |
35 | 37 | ||
36 | dinfo = drive_get(IF_SD, 0, 0); | 38 | s1lo = extract32(s1.attrs, 0, 4); |
37 | - if (!dinfo) { | 39 | s2lo = extract32(s2_mair_attrs, 0, 4); |
38 | - error_report("missing SecureDigital device"); | 40 | @@ -XXX,XX +XXX,XX @@ static uint8_t force_cacheattr_nibble_wb(uint8_t attr) |
39 | - exit(1); | 41 | */ |
40 | + if (!dinfo && !qtest_enabled()) { | 42 | static uint8_t combined_attrs_fwb(ARMCacheAttrs s1, ARMCacheAttrs s2) |
41 | + warn_report("missing SecureDigital device"); | 43 | { |
42 | } | 44 | + assert(s2.is_s2_format && !s1.is_s2_format); |
43 | s->mmc = omap_mmc_init(0xfffb7800, system_memory, | 45 | + |
44 | - blk_by_legacy_dinfo(dinfo), | 46 | switch (s2.attrs) { |
45 | + dinfo ? blk_by_legacy_dinfo(dinfo) : NULL, | 47 | case 7: |
46 | qdev_get_gpio_in(s->ih[1], OMAP_INT_OQN), | 48 | /* Use stage 1 attributes */ |
47 | &s->drq[OMAP_DMA_MMC_TX], | 49 | @@ -XXX,XX +XXX,XX @@ static ARMCacheAttrs combine_cacheattrs(uint64_t hcr, |
48 | omap_findclk(s, "mmc_ck")); | 50 | ARMCacheAttrs ret; |
49 | diff --git a/hw/arm/omap2.c b/hw/arm/omap2.c | 51 | bool tagged = false; |
50 | index XXXXXXX..XXXXXXX 100644 | 52 | |
51 | --- a/hw/arm/omap2.c | 53 | - assert(s2.is_s2_format && !s1.is_s2_format); |
52 | +++ b/hw/arm/omap2.c | 54 | + assert(!s1.is_s2_format); |
53 | @@ -XXX,XX +XXX,XX @@ | 55 | ret.is_s2_format = false; |
54 | #include "cpu.h" | 56 | |
55 | #include "sysemu/block-backend.h" | 57 | if (s1.attrs == 0xf0) { |
56 | #include "sysemu/blockdev.h" | ||
57 | +#include "sysemu/qtest.h" | ||
58 | #include "hw/boards.h" | ||
59 | #include "hw/hw.h" | ||
60 | #include "hw/arm/arm.h" | ||
61 | @@ -XXX,XX +XXX,XX @@ struct omap_mpu_state_s *omap2420_mpu_init(MemoryRegion *sysmem, | ||
62 | s->drq[OMAP24XX_DMA_GPMC]); | ||
63 | |||
64 | dinfo = drive_get(IF_SD, 0, 0); | ||
65 | - if (!dinfo) { | ||
66 | - error_report("missing SecureDigital device"); | ||
67 | - exit(1); | ||
68 | + if (!dinfo && !qtest_enabled()) { | ||
69 | + warn_report("missing SecureDigital device"); | ||
70 | } | ||
71 | s->mmc = omap2_mmc_init(omap_l4tao(s->l4, 9), | ||
72 | - blk_by_legacy_dinfo(dinfo), | ||
73 | + dinfo ? blk_by_legacy_dinfo(dinfo) : NULL, | ||
74 | qdev_get_gpio_in(s->ih[0], OMAP_INT_24XX_MMC_IRQ), | ||
75 | &s->drq[OMAP24XX_DMA_MMC1_TX], | ||
76 | omap_findclk(s, "mmc_fclk"), omap_findclk(s, "mmc_iclk")); | ||
77 | diff --git a/hw/arm/pxa2xx.c b/hw/arm/pxa2xx.c | ||
78 | index XXXXXXX..XXXXXXX 100644 | ||
79 | --- a/hw/arm/pxa2xx.c | ||
80 | +++ b/hw/arm/pxa2xx.c | ||
81 | @@ -XXX,XX +XXX,XX @@ | ||
82 | #include "chardev/char-fe.h" | ||
83 | #include "sysemu/block-backend.h" | ||
84 | #include "sysemu/blockdev.h" | ||
85 | +#include "sysemu/qtest.h" | ||
86 | #include "qemu/cutils.h" | ||
87 | |||
88 | static struct { | ||
89 | @@ -XXX,XX +XXX,XX @@ PXA2xxState *pxa270_init(MemoryRegion *address_space, | ||
90 | s->gpio = pxa2xx_gpio_init(0x40e00000, s->cpu, s->pic, 121); | ||
91 | |||
92 | dinfo = drive_get(IF_SD, 0, 0); | ||
93 | - if (!dinfo) { | ||
94 | - error_report("missing SecureDigital device"); | ||
95 | - exit(1); | ||
96 | + if (!dinfo && !qtest_enabled()) { | ||
97 | + warn_report("missing SecureDigital device"); | ||
98 | } | ||
99 | s->mmc = pxa2xx_mmci_init(address_space, 0x41100000, | ||
100 | - blk_by_legacy_dinfo(dinfo), | ||
101 | + dinfo ? blk_by_legacy_dinfo(dinfo) : NULL, | ||
102 | qdev_get_gpio_in(s->pic, PXA2XX_PIC_MMC), | ||
103 | qdev_get_gpio_in(s->dma, PXA2XX_RX_RQ_MMCI), | ||
104 | qdev_get_gpio_in(s->dma, PXA2XX_TX_RQ_MMCI)); | ||
105 | @@ -XXX,XX +XXX,XX @@ PXA2xxState *pxa255_init(MemoryRegion *address_space, unsigned int sdram_size) | ||
106 | s->gpio = pxa2xx_gpio_init(0x40e00000, s->cpu, s->pic, 85); | ||
107 | |||
108 | dinfo = drive_get(IF_SD, 0, 0); | ||
109 | - if (!dinfo) { | ||
110 | - error_report("missing SecureDigital device"); | ||
111 | - exit(1); | ||
112 | + if (!dinfo && !qtest_enabled()) { | ||
113 | + warn_report("missing SecureDigital device"); | ||
114 | } | ||
115 | s->mmc = pxa2xx_mmci_init(address_space, 0x41100000, | ||
116 | - blk_by_legacy_dinfo(dinfo), | ||
117 | + dinfo ? blk_by_legacy_dinfo(dinfo) : NULL, | ||
118 | qdev_get_gpio_in(s->pic, PXA2XX_PIC_MMC), | ||
119 | qdev_get_gpio_in(s->dma, PXA2XX_RX_RQ_MMCI), | ||
120 | qdev_get_gpio_in(s->dma, PXA2XX_TX_RQ_MMCI)); | ||
121 | -- | 58 | -- |
122 | 2.17.0 | 59 | 2.25.1 |
123 | 60 | ||
124 | 61 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Tobias Röhmel <tobias.roehmel@rwth-aachen.de> |
---|---|---|---|
2 | 2 | ||
3 | The (size > 3 && !is_q) condition is identical to the preceeding test | 3 | ARMv8-R AArch32 CPUs behave as if TTBCR.EAE is always 1 even |
4 | of bit 3 in immh; eliminate it. For the benefit of Coverity, assert | 4 | tough they don't have the TTBCR register. |
5 | that size is within the bounds we expect. | 5 | See ARM Architecture Reference Manual Supplement - ARMv8, for the ARMv8-R |
6 | AArch32 architecture profile Version:A.c section C1.2. | ||
6 | 7 | ||
7 | Fixes: Coverity CID1385846 | 8 | Signed-off-by: Tobias Röhmel <tobias.roehmel@rwth-aachen.de> |
8 | Fixes: Coverity CID1385849 | 9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
9 | Fixes: Coverity CID1385852 | 10 | Message-id: 20221206102504.165775-5-tobias.roehmel@rwth-aachen.de |
10 | Fixes: Coverity CID1385857 | ||
11 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
12 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | ||
13 | Message-id: 20180501180455.11214-2-richard.henderson@linaro.org | ||
14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
15 | --- | 12 | --- |
16 | target/arm/translate-a64.c | 6 +----- | 13 | target/arm/internals.h | 4 ++++ |
17 | 1 file changed, 1 insertion(+), 5 deletions(-) | 14 | target/arm/debug_helper.c | 3 +++ |
15 | target/arm/tlb_helper.c | 4 ++++ | ||
16 | 3 files changed, 11 insertions(+) | ||
18 | 17 | ||
19 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c | 18 | diff --git a/target/arm/internals.h b/target/arm/internals.h |
20 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
21 | --- a/target/arm/translate-a64.c | 20 | --- a/target/arm/internals.h |
22 | +++ b/target/arm/translate-a64.c | 21 | +++ b/target/arm/internals.h |
23 | @@ -XXX,XX +XXX,XX @@ static void handle_vec_simd_shri(DisasContext *s, bool is_q, bool is_u, | 22 | @@ -XXX,XX +XXX,XX @@ unsigned int arm_pamax(ARMCPU *cpu); |
24 | unallocated_encoding(s); | 23 | static inline bool extended_addresses_enabled(CPUARMState *env) |
25 | return; | 24 | { |
25 | uint64_t tcr = env->cp15.tcr_el[arm_is_secure(env) ? 3 : 1]; | ||
26 | + if (arm_feature(env, ARM_FEATURE_PMSA) && | ||
27 | + arm_feature(env, ARM_FEATURE_V8)) { | ||
28 | + return true; | ||
29 | + } | ||
30 | return arm_el_is_aa64(env, 1) || | ||
31 | (arm_feature(env, ARM_FEATURE_LPAE) && (tcr & TTBCR_EAE)); | ||
32 | } | ||
33 | diff --git a/target/arm/debug_helper.c b/target/arm/debug_helper.c | ||
34 | index XXXXXXX..XXXXXXX 100644 | ||
35 | --- a/target/arm/debug_helper.c | ||
36 | +++ b/target/arm/debug_helper.c | ||
37 | @@ -XXX,XX +XXX,XX @@ static uint32_t arm_debug_exception_fsr(CPUARMState *env) | ||
38 | |||
39 | if (target_el == 2 || arm_el_is_aa64(env, target_el)) { | ||
40 | using_lpae = true; | ||
41 | + } else if (arm_feature(env, ARM_FEATURE_PMSA) && | ||
42 | + arm_feature(env, ARM_FEATURE_V8)) { | ||
43 | + using_lpae = true; | ||
44 | } else { | ||
45 | if (arm_feature(env, ARM_FEATURE_LPAE) && | ||
46 | (env->cp15.tcr_el[target_el] & TTBCR_EAE)) { | ||
47 | diff --git a/target/arm/tlb_helper.c b/target/arm/tlb_helper.c | ||
48 | index XXXXXXX..XXXXXXX 100644 | ||
49 | --- a/target/arm/tlb_helper.c | ||
50 | +++ b/target/arm/tlb_helper.c | ||
51 | @@ -XXX,XX +XXX,XX @@ bool regime_using_lpae_format(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
52 | if (el == 2 || arm_el_is_aa64(env, el)) { | ||
53 | return true; | ||
26 | } | 54 | } |
27 | - | 55 | + if (arm_feature(env, ARM_FEATURE_PMSA) && |
28 | - if (size > 3 && !is_q) { | 56 | + arm_feature(env, ARM_FEATURE_V8)) { |
29 | - unallocated_encoding(s); | 57 | + return true; |
30 | - return; | 58 | + } |
31 | - } | 59 | if (arm_feature(env, ARM_FEATURE_LPAE) |
32 | + tcg_debug_assert(size <= 3); | 60 | && (regime_tcr(env, mmu_idx) & TTBCR_EAE)) { |
33 | 61 | return true; | |
34 | if (!fp_access_check(s)) { | ||
35 | return; | ||
36 | -- | 62 | -- |
37 | 2.17.0 | 63 | 2.25.1 |
38 | 64 | ||
39 | 65 | diff view generated by jsdifflib |
1 | From: Eric Auger <eric.auger@redhat.com> | 1 | From: Tobias Röhmel <tobias.roehmel@rwth-aachen.de> |
---|---|---|---|
2 | 2 | ||
3 | The patch introduces the smmu base device and class for the ARM | 3 | Signed-off-by: Tobias Röhmel <tobias.roehmel@rwth-aachen.de> |
4 | smmu. Devices for specific versions will be derived from this | 4 | Message-id: 20221206102504.165775-6-tobias.roehmel@rwth-aachen.de |
5 | base device. | ||
6 | |||
7 | We also introduce some important datatypes. | ||
8 | |||
9 | Signed-off-by: Eric Auger <eric.auger@redhat.com> | ||
10 | Signed-off-by: Prem Mallappa <prem.mallappa@broadcom.com> | ||
11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | Message-id: 1524665762-31355-2-git-send-email-eric.auger@redhat.com | ||
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
14 | --- | 6 | --- |
15 | hw/arm/Makefile.objs | 1 + | 7 | target/arm/cpu.h | 6 + |
16 | include/hw/arm/smmu-common.h | 123 ++++++++++++++++++++++++++++ | 8 | target/arm/cpu.c | 28 +++- |
17 | hw/arm/smmu-common.c | 81 ++++++++++++++++++ | 9 | target/arm/helper.c | 302 +++++++++++++++++++++++++++++++++++++++++++ |
18 | default-configs/aarch64-softmmu.mak | 1 + | 10 | target/arm/machine.c | 28 ++++ |
19 | 4 files changed, 206 insertions(+) | 11 | 4 files changed, 360 insertions(+), 4 deletions(-) |
20 | create mode 100644 include/hw/arm/smmu-common.h | ||
21 | create mode 100644 hw/arm/smmu-common.c | ||
22 | 12 | ||
23 | diff --git a/hw/arm/Makefile.objs b/hw/arm/Makefile.objs | 13 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
24 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
25 | --- a/hw/arm/Makefile.objs | 15 | --- a/target/arm/cpu.h |
26 | +++ b/hw/arm/Makefile.objs | 16 | +++ b/target/arm/cpu.h |
27 | @@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_MPS2) += mps2-tz.o | 17 | @@ -XXX,XX +XXX,XX @@ typedef struct CPUArchState { |
28 | obj-$(CONFIG_MSF2) += msf2-soc.o msf2-som.o | 18 | }; |
29 | obj-$(CONFIG_IOTKIT) += iotkit.o | 19 | uint64_t sctlr_el[4]; |
30 | obj-$(CONFIG_FSL_IMX7) += fsl-imx7.o mcimx7d-sabre.o | 20 | }; |
31 | +obj-$(CONFIG_ARM_SMMUV3) += smmu-common.o | 21 | + uint64_t vsctlr; /* Virtualization System control register. */ |
32 | diff --git a/include/hw/arm/smmu-common.h b/include/hw/arm/smmu-common.h | 22 | uint64_t cpacr_el1; /* Architectural feature access control register */ |
33 | new file mode 100644 | 23 | uint64_t cptr_el[4]; /* ARMv8 feature trap registers */ |
34 | index XXXXXXX..XXXXXXX | 24 | uint32_t c1_xscaleauxcr; /* XScale auxiliary control register. */ |
35 | --- /dev/null | 25 | @@ -XXX,XX +XXX,XX @@ typedef struct CPUArchState { |
36 | +++ b/include/hw/arm/smmu-common.h | 26 | */ |
37 | @@ -XXX,XX +XXX,XX @@ | 27 | uint32_t *rbar[M_REG_NUM_BANKS]; |
38 | +/* | 28 | uint32_t *rlar[M_REG_NUM_BANKS]; |
39 | + * ARM SMMU Support | 29 | + uint32_t *hprbar; |
40 | + * | 30 | + uint32_t *hprlar; |
41 | + * Copyright (C) 2015-2016 Broadcom Corporation | 31 | uint32_t mair0[M_REG_NUM_BANKS]; |
42 | + * Copyright (c) 2017 Red Hat, Inc. | 32 | uint32_t mair1[M_REG_NUM_BANKS]; |
43 | + * Written by Prem Mallappa, Eric Auger | 33 | + uint32_t hprselr; |
44 | + * | 34 | } pmsav8; |
45 | + * This program is free software; you can redistribute it and/or modify | 35 | |
46 | + * it under the terms of the GNU General Public License version 2 as | 36 | /* v8M SAU */ |
47 | + * published by the Free Software Foundation. | 37 | @@ -XXX,XX +XXX,XX @@ struct ArchCPU { |
48 | + * | 38 | bool has_mpu; |
49 | + * This program is distributed in the hope that it will be useful, | 39 | /* PMSAv7 MPU number of supported regions */ |
50 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of | 40 | uint32_t pmsav7_dregion; |
51 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | 41 | + /* PMSAv8 MPU number of supported hyp regions */ |
52 | + * GNU General Public License for more details. | 42 | + uint32_t pmsav8r_hdregion; |
53 | + * | 43 | /* v8M SAU number of supported regions */ |
54 | + */ | 44 | uint32_t sau_sregion; |
55 | + | 45 | |
56 | +#ifndef HW_ARM_SMMU_COMMON_H | 46 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c |
57 | +#define HW_ARM_SMMU_COMMON_H | 47 | index XXXXXXX..XXXXXXX 100644 |
58 | + | 48 | --- a/target/arm/cpu.c |
59 | +#include "hw/sysbus.h" | 49 | +++ b/target/arm/cpu.c |
60 | +#include "hw/pci/pci.h" | 50 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset_hold(Object *obj) |
61 | + | 51 | sizeof(*env->pmsav7.dracr) * cpu->pmsav7_dregion); |
62 | +#define SMMU_PCI_BUS_MAX 256 | 52 | } |
63 | +#define SMMU_PCI_DEVFN_MAX 256 | 53 | } |
64 | + | 54 | + |
65 | +#define SMMU_MAX_VA_BITS 48 | 55 | + if (cpu->pmsav8r_hdregion > 0) { |
66 | + | 56 | + memset(env->pmsav8.hprbar, 0, |
67 | +/* | 57 | + sizeof(*env->pmsav8.hprbar) * cpu->pmsav8r_hdregion); |
68 | + * Page table walk error types | 58 | + memset(env->pmsav8.hprlar, 0, |
69 | + */ | 59 | + sizeof(*env->pmsav8.hprlar) * cpu->pmsav8r_hdregion); |
70 | +typedef enum { | 60 | + } |
71 | + SMMU_PTW_ERR_NONE, | 61 | + |
72 | + SMMU_PTW_ERR_WALK_EABT, /* Translation walk external abort */ | 62 | env->pmsav7.rnr[M_REG_NS] = 0; |
73 | + SMMU_PTW_ERR_TRANSLATION, /* Translation fault */ | 63 | env->pmsav7.rnr[M_REG_S] = 0; |
74 | + SMMU_PTW_ERR_ADDR_SIZE, /* Address Size fault */ | 64 | env->pmsav8.mair0[M_REG_NS] = 0; |
75 | + SMMU_PTW_ERR_ACCESS, /* Access fault */ | 65 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_realizefn(DeviceState *dev, Error **errp) |
76 | + SMMU_PTW_ERR_PERMISSION, /* Permission fault */ | 66 | /* MPU can be configured out of a PMSA CPU either by setting has-mpu |
77 | +} SMMUPTWEventType; | 67 | * to false or by setting pmsav7-dregion to 0. |
78 | + | 68 | */ |
79 | +typedef struct SMMUPTWEventInfo { | 69 | - if (!cpu->has_mpu) { |
80 | + SMMUPTWEventType type; | 70 | - cpu->pmsav7_dregion = 0; |
81 | + dma_addr_t addr; /* fetched address that induced an abort, if any */ | 71 | - } |
82 | +} SMMUPTWEventInfo; | 72 | - if (cpu->pmsav7_dregion == 0) { |
83 | + | 73 | + if (!cpu->has_mpu || cpu->pmsav7_dregion == 0) { |
84 | +typedef struct SMMUTransTableInfo { | 74 | cpu->has_mpu = false; |
85 | + bool disabled; /* is the translation table disabled? */ | 75 | + cpu->pmsav7_dregion = 0; |
86 | + uint64_t ttb; /* TT base address */ | 76 | + cpu->pmsav8r_hdregion = 0; |
87 | + uint8_t tsz; /* input range, ie. 2^(64 -tsz)*/ | 77 | } |
88 | + uint8_t granule_sz; /* granule page shift */ | 78 | |
89 | +} SMMUTransTableInfo; | 79 | if (arm_feature(env, ARM_FEATURE_PMSA) && |
90 | + | 80 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_realizefn(DeviceState *dev, Error **errp) |
91 | +/* | 81 | env->pmsav7.dracr = g_new0(uint32_t, nr); |
92 | + * Generic structure populated by derived SMMU devices | 82 | } |
93 | + * after decoding the configuration information and used as | 83 | } |
94 | + * input to the page table walk | 84 | + |
95 | + */ | 85 | + if (cpu->pmsav8r_hdregion > 0xff) { |
96 | +typedef struct SMMUTransCfg { | 86 | + error_setg(errp, "PMSAv8 MPU EL2 #regions invalid %" PRIu32, |
97 | + int stage; /* translation stage */ | 87 | + cpu->pmsav8r_hdregion); |
98 | + bool aa64; /* arch64 or aarch32 translation table */ | 88 | + return; |
99 | + bool disabled; /* smmu is disabled */ | 89 | + } |
100 | + bool bypassed; /* translation is bypassed */ | 90 | + |
101 | + bool aborted; /* translation is aborted */ | 91 | + if (cpu->pmsav8r_hdregion) { |
102 | + uint64_t ttb; /* TT base address */ | 92 | + env->pmsav8.hprbar = g_new0(uint32_t, |
103 | + uint8_t oas; /* output address width */ | 93 | + cpu->pmsav8r_hdregion); |
104 | + uint8_t tbi; /* Top Byte Ignore */ | 94 | + env->pmsav8.hprlar = g_new0(uint32_t, |
105 | + uint16_t asid; | 95 | + cpu->pmsav8r_hdregion); |
106 | + SMMUTransTableInfo tt[2]; | 96 | + } |
107 | +} SMMUTransCfg; | 97 | } |
108 | + | 98 | |
109 | +typedef struct SMMUDevice { | 99 | if (arm_feature(env, ARM_FEATURE_M_SECURITY)) { |
110 | + void *smmu; | 100 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
111 | + PCIBus *bus; | 101 | index XXXXXXX..XXXXXXX 100644 |
112 | + int devfn; | 102 | --- a/target/arm/helper.c |
113 | + IOMMUMemoryRegion iommu; | 103 | +++ b/target/arm/helper.c |
114 | + AddressSpace as; | 104 | @@ -XXX,XX +XXX,XX @@ static void pmsav7_rgnr_write(CPUARMState *env, const ARMCPRegInfo *ri, |
115 | +} SMMUDevice; | 105 | raw_write(env, ri, value); |
116 | + | 106 | } |
117 | +typedef struct SMMUNotifierNode { | 107 | |
118 | + SMMUDevice *sdev; | 108 | +static void prbar_write(CPUARMState *env, const ARMCPRegInfo *ri, |
119 | + QLIST_ENTRY(SMMUNotifierNode) next; | 109 | + uint64_t value) |
120 | +} SMMUNotifierNode; | 110 | +{ |
121 | + | 111 | + ARMCPU *cpu = env_archcpu(env); |
122 | +typedef struct SMMUPciBus { | 112 | + |
123 | + PCIBus *bus; | 113 | + tlb_flush(CPU(cpu)); /* Mappings may have changed - purge! */ |
124 | + SMMUDevice *pbdev[0]; /* Parent array is sparse, so dynamically alloc */ | 114 | + env->pmsav8.rbar[M_REG_NS][env->pmsav7.rnr[M_REG_NS]] = value; |
125 | +} SMMUPciBus; | 115 | +} |
126 | + | 116 | + |
127 | +typedef struct SMMUState { | 117 | +static uint64_t prbar_read(CPUARMState *env, const ARMCPRegInfo *ri) |
128 | + /* <private> */ | 118 | +{ |
129 | + SysBusDevice dev; | 119 | + return env->pmsav8.rbar[M_REG_NS][env->pmsav7.rnr[M_REG_NS]]; |
130 | + const char *mrtypename; | 120 | +} |
131 | + MemoryRegion iomem; | 121 | + |
132 | + | 122 | +static void prlar_write(CPUARMState *env, const ARMCPRegInfo *ri, |
133 | + GHashTable *smmu_pcibus_by_busptr; | 123 | + uint64_t value) |
134 | + GHashTable *configs; /* cache for configuration data */ | 124 | +{ |
135 | + GHashTable *iotlb; | 125 | + ARMCPU *cpu = env_archcpu(env); |
136 | + SMMUPciBus *smmu_pcibus_by_bus_num[SMMU_PCI_BUS_MAX]; | 126 | + |
137 | + PCIBus *pci_bus; | 127 | + tlb_flush(CPU(cpu)); /* Mappings may have changed - purge! */ |
138 | + QLIST_HEAD(, SMMUNotifierNode) notifiers_list; | 128 | + env->pmsav8.rlar[M_REG_NS][env->pmsav7.rnr[M_REG_NS]] = value; |
139 | + uint8_t bus_num; | 129 | +} |
140 | + PCIBus *primary_bus; | 130 | + |
141 | +} SMMUState; | 131 | +static uint64_t prlar_read(CPUARMState *env, const ARMCPRegInfo *ri) |
142 | + | 132 | +{ |
143 | +typedef struct { | 133 | + return env->pmsav8.rlar[M_REG_NS][env->pmsav7.rnr[M_REG_NS]]; |
144 | + /* <private> */ | 134 | +} |
145 | + SysBusDeviceClass parent_class; | 135 | + |
146 | + | 136 | +static void prselr_write(CPUARMState *env, const ARMCPRegInfo *ri, |
147 | + /*< public >*/ | 137 | + uint64_t value) |
148 | + | 138 | +{ |
149 | + DeviceRealize parent_realize; | 139 | + ARMCPU *cpu = env_archcpu(env); |
150 | + | 140 | + |
151 | +} SMMUBaseClass; | 141 | + /* |
152 | + | 142 | + * Ignore writes that would select not implemented region. |
153 | +#define TYPE_ARM_SMMU "arm-smmu" | 143 | + * This is architecturally UNPREDICTABLE. |
154 | +#define ARM_SMMU(obj) OBJECT_CHECK(SMMUState, (obj), TYPE_ARM_SMMU) | 144 | + */ |
155 | +#define ARM_SMMU_CLASS(klass) \ | 145 | + if (value >= cpu->pmsav7_dregion) { |
156 | + OBJECT_CLASS_CHECK(SMMUBaseClass, (klass), TYPE_ARM_SMMU) | ||
157 | +#define ARM_SMMU_GET_CLASS(obj) \ | ||
158 | + OBJECT_GET_CLASS(SMMUBaseClass, (obj), TYPE_ARM_SMMU) | ||
159 | + | ||
160 | +#endif /* HW_ARM_SMMU_COMMON */ | ||
161 | diff --git a/hw/arm/smmu-common.c b/hw/arm/smmu-common.c | ||
162 | new file mode 100644 | ||
163 | index XXXXXXX..XXXXXXX | ||
164 | --- /dev/null | ||
165 | +++ b/hw/arm/smmu-common.c | ||
166 | @@ -XXX,XX +XXX,XX @@ | ||
167 | +/* | ||
168 | + * Copyright (C) 2014-2016 Broadcom Corporation | ||
169 | + * Copyright (c) 2017 Red Hat, Inc. | ||
170 | + * Written by Prem Mallappa, Eric Auger | ||
171 | + * | ||
172 | + * This program is free software; you can redistribute it and/or modify | ||
173 | + * it under the terms of the GNU General Public License version 2 as | ||
174 | + * published by the Free Software Foundation. | ||
175 | + * | ||
176 | + * This program is distributed in the hope that it will be useful, | ||
177 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
178 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
179 | + * GNU General Public License for more details. | ||
180 | + * | ||
181 | + * Author: Prem Mallappa <pmallapp@broadcom.com> | ||
182 | + * | ||
183 | + */ | ||
184 | + | ||
185 | +#include "qemu/osdep.h" | ||
186 | +#include "sysemu/sysemu.h" | ||
187 | +#include "exec/address-spaces.h" | ||
188 | +#include "trace.h" | ||
189 | +#include "exec/target_page.h" | ||
190 | +#include "qom/cpu.h" | ||
191 | +#include "hw/qdev-properties.h" | ||
192 | +#include "qapi/error.h" | ||
193 | + | ||
194 | +#include "qemu/error-report.h" | ||
195 | +#include "hw/arm/smmu-common.h" | ||
196 | + | ||
197 | +static void smmu_base_realize(DeviceState *dev, Error **errp) | ||
198 | +{ | ||
199 | + SMMUBaseClass *sbc = ARM_SMMU_GET_CLASS(dev); | ||
200 | + Error *local_err = NULL; | ||
201 | + | ||
202 | + sbc->parent_realize(dev, &local_err); | ||
203 | + if (local_err) { | ||
204 | + error_propagate(errp, local_err); | ||
205 | + return; | 146 | + return; |
206 | + } | 147 | + } |
207 | +} | 148 | + |
208 | + | 149 | + env->pmsav7.rnr[M_REG_NS] = value; |
209 | +static void smmu_base_reset(DeviceState *dev) | 150 | +} |
210 | +{ | 151 | + |
211 | + /* will be filled later on */ | 152 | +static void hprbar_write(CPUARMState *env, const ARMCPRegInfo *ri, |
212 | +} | 153 | + uint64_t value) |
213 | + | 154 | +{ |
214 | +static Property smmu_dev_properties[] = { | 155 | + ARMCPU *cpu = env_archcpu(env); |
215 | + DEFINE_PROP_UINT8("bus_num", SMMUState, bus_num, 0), | 156 | + |
216 | + DEFINE_PROP_LINK("primary-bus", SMMUState, primary_bus, "PCI", PCIBus *), | 157 | + tlb_flush(CPU(cpu)); /* Mappings may have changed - purge! */ |
217 | + DEFINE_PROP_END_OF_LIST(), | 158 | + env->pmsav8.hprbar[env->pmsav8.hprselr] = value; |
159 | +} | ||
160 | + | ||
161 | +static uint64_t hprbar_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
162 | +{ | ||
163 | + return env->pmsav8.hprbar[env->pmsav8.hprselr]; | ||
164 | +} | ||
165 | + | ||
166 | +static void hprlar_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
167 | + uint64_t value) | ||
168 | +{ | ||
169 | + ARMCPU *cpu = env_archcpu(env); | ||
170 | + | ||
171 | + tlb_flush(CPU(cpu)); /* Mappings may have changed - purge! */ | ||
172 | + env->pmsav8.hprlar[env->pmsav8.hprselr] = value; | ||
173 | +} | ||
174 | + | ||
175 | +static uint64_t hprlar_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
176 | +{ | ||
177 | + return env->pmsav8.hprlar[env->pmsav8.hprselr]; | ||
178 | +} | ||
179 | + | ||
180 | +static void hprenr_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
181 | + uint64_t value) | ||
182 | +{ | ||
183 | + uint32_t n; | ||
184 | + uint32_t bit; | ||
185 | + ARMCPU *cpu = env_archcpu(env); | ||
186 | + | ||
187 | + /* Ignore writes to unimplemented regions */ | ||
188 | + int rmax = MIN(cpu->pmsav8r_hdregion, 32); | ||
189 | + value &= MAKE_64BIT_MASK(0, rmax); | ||
190 | + | ||
191 | + tlb_flush(CPU(cpu)); /* Mappings may have changed - purge! */ | ||
192 | + | ||
193 | + /* Register alias is only valid for first 32 indexes */ | ||
194 | + for (n = 0; n < rmax; ++n) { | ||
195 | + bit = extract32(value, n, 1); | ||
196 | + env->pmsav8.hprlar[n] = deposit32( | ||
197 | + env->pmsav8.hprlar[n], 0, 1, bit); | ||
198 | + } | ||
199 | +} | ||
200 | + | ||
201 | +static uint64_t hprenr_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
202 | +{ | ||
203 | + uint32_t n; | ||
204 | + uint32_t result = 0x0; | ||
205 | + ARMCPU *cpu = env_archcpu(env); | ||
206 | + | ||
207 | + /* Register alias is only valid for first 32 indexes */ | ||
208 | + for (n = 0; n < MIN(cpu->pmsav8r_hdregion, 32); ++n) { | ||
209 | + if (env->pmsav8.hprlar[n] & 0x1) { | ||
210 | + result |= (0x1 << n); | ||
211 | + } | ||
212 | + } | ||
213 | + return result; | ||
214 | +} | ||
215 | + | ||
216 | +static void hprselr_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
217 | + uint64_t value) | ||
218 | +{ | ||
219 | + ARMCPU *cpu = env_archcpu(env); | ||
220 | + | ||
221 | + /* | ||
222 | + * Ignore writes that would select not implemented region. | ||
223 | + * This is architecturally UNPREDICTABLE. | ||
224 | + */ | ||
225 | + if (value >= cpu->pmsav8r_hdregion) { | ||
226 | + return; | ||
227 | + } | ||
228 | + | ||
229 | + env->pmsav8.hprselr = value; | ||
230 | +} | ||
231 | + | ||
232 | +static void pmsav8r_regn_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
233 | + uint64_t value) | ||
234 | +{ | ||
235 | + ARMCPU *cpu = env_archcpu(env); | ||
236 | + uint8_t index = (extract32(ri->opc0, 0, 1) << 4) | | ||
237 | + (extract32(ri->crm, 0, 3) << 1) | extract32(ri->opc2, 2, 1); | ||
238 | + | ||
239 | + tlb_flush(CPU(cpu)); /* Mappings may have changed - purge! */ | ||
240 | + | ||
241 | + if (ri->opc1 & 4) { | ||
242 | + if (index >= cpu->pmsav8r_hdregion) { | ||
243 | + return; | ||
244 | + } | ||
245 | + if (ri->opc2 & 0x1) { | ||
246 | + env->pmsav8.hprlar[index] = value; | ||
247 | + } else { | ||
248 | + env->pmsav8.hprbar[index] = value; | ||
249 | + } | ||
250 | + } else { | ||
251 | + if (index >= cpu->pmsav7_dregion) { | ||
252 | + return; | ||
253 | + } | ||
254 | + if (ri->opc2 & 0x1) { | ||
255 | + env->pmsav8.rlar[M_REG_NS][index] = value; | ||
256 | + } else { | ||
257 | + env->pmsav8.rbar[M_REG_NS][index] = value; | ||
258 | + } | ||
259 | + } | ||
260 | +} | ||
261 | + | ||
262 | +static uint64_t pmsav8r_regn_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
263 | +{ | ||
264 | + ARMCPU *cpu = env_archcpu(env); | ||
265 | + uint8_t index = (extract32(ri->opc0, 0, 1) << 4) | | ||
266 | + (extract32(ri->crm, 0, 3) << 1) | extract32(ri->opc2, 2, 1); | ||
267 | + | ||
268 | + if (ri->opc1 & 4) { | ||
269 | + if (index >= cpu->pmsav8r_hdregion) { | ||
270 | + return 0x0; | ||
271 | + } | ||
272 | + if (ri->opc2 & 0x1) { | ||
273 | + return env->pmsav8.hprlar[index]; | ||
274 | + } else { | ||
275 | + return env->pmsav8.hprbar[index]; | ||
276 | + } | ||
277 | + } else { | ||
278 | + if (index >= cpu->pmsav7_dregion) { | ||
279 | + return 0x0; | ||
280 | + } | ||
281 | + if (ri->opc2 & 0x1) { | ||
282 | + return env->pmsav8.rlar[M_REG_NS][index]; | ||
283 | + } else { | ||
284 | + return env->pmsav8.rbar[M_REG_NS][index]; | ||
285 | + } | ||
286 | + } | ||
287 | +} | ||
288 | + | ||
289 | +static const ARMCPRegInfo pmsav8r_cp_reginfo[] = { | ||
290 | + { .name = "PRBAR", | ||
291 | + .cp = 15, .opc1 = 0, .crn = 6, .crm = 3, .opc2 = 0, | ||
292 | + .access = PL1_RW, .type = ARM_CP_NO_RAW, | ||
293 | + .accessfn = access_tvm_trvm, | ||
294 | + .readfn = prbar_read, .writefn = prbar_write }, | ||
295 | + { .name = "PRLAR", | ||
296 | + .cp = 15, .opc1 = 0, .crn = 6, .crm = 3, .opc2 = 1, | ||
297 | + .access = PL1_RW, .type = ARM_CP_NO_RAW, | ||
298 | + .accessfn = access_tvm_trvm, | ||
299 | + .readfn = prlar_read, .writefn = prlar_write }, | ||
300 | + { .name = "PRSELR", .resetvalue = 0, | ||
301 | + .cp = 15, .opc1 = 0, .crn = 6, .crm = 2, .opc2 = 1, | ||
302 | + .access = PL1_RW, .accessfn = access_tvm_trvm, | ||
303 | + .writefn = prselr_write, | ||
304 | + .fieldoffset = offsetof(CPUARMState, pmsav7.rnr[M_REG_NS]) }, | ||
305 | + { .name = "HPRBAR", .resetvalue = 0, | ||
306 | + .cp = 15, .opc1 = 4, .crn = 6, .crm = 3, .opc2 = 0, | ||
307 | + .access = PL2_RW, .type = ARM_CP_NO_RAW, | ||
308 | + .readfn = hprbar_read, .writefn = hprbar_write }, | ||
309 | + { .name = "HPRLAR", | ||
310 | + .cp = 15, .opc1 = 4, .crn = 6, .crm = 3, .opc2 = 1, | ||
311 | + .access = PL2_RW, .type = ARM_CP_NO_RAW, | ||
312 | + .readfn = hprlar_read, .writefn = hprlar_write }, | ||
313 | + { .name = "HPRSELR", .resetvalue = 0, | ||
314 | + .cp = 15, .opc1 = 4, .crn = 6, .crm = 2, .opc2 = 1, | ||
315 | + .access = PL2_RW, | ||
316 | + .writefn = hprselr_write, | ||
317 | + .fieldoffset = offsetof(CPUARMState, pmsav8.hprselr) }, | ||
318 | + { .name = "HPRENR", | ||
319 | + .cp = 15, .opc1 = 4, .crn = 6, .crm = 1, .opc2 = 1, | ||
320 | + .access = PL2_RW, .type = ARM_CP_NO_RAW, | ||
321 | + .readfn = hprenr_read, .writefn = hprenr_write }, | ||
218 | +}; | 322 | +}; |
219 | + | 323 | + |
220 | +static void smmu_base_class_init(ObjectClass *klass, void *data) | 324 | static const ARMCPRegInfo pmsav7_cp_reginfo[] = { |
221 | +{ | 325 | /* Reset for all these registers is handled in arm_cpu_reset(), |
222 | + DeviceClass *dc = DEVICE_CLASS(klass); | 326 | * because the PMSAv7 is also used by M-profile CPUs, which do |
223 | + SMMUBaseClass *sbc = ARM_SMMU_CLASS(klass); | 327 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) |
224 | + | 328 | .access = PL1_R, .type = ARM_CP_CONST, |
225 | + dc->props = smmu_dev_properties; | 329 | .resetvalue = cpu->pmsav7_dregion << 8 |
226 | + device_class_set_parent_realize(dc, smmu_base_realize, | 330 | }; |
227 | + &sbc->parent_realize); | 331 | + /* HMPUIR is specific to PMSA V8 */ |
228 | + dc->reset = smmu_base_reset; | 332 | + ARMCPRegInfo id_hmpuir_reginfo = { |
229 | +} | 333 | + .name = "HMPUIR", |
230 | + | 334 | + .cp = 15, .opc1 = 4, .crn = 0, .crm = 0, .opc2 = 4, |
231 | +static const TypeInfo smmu_base_info = { | 335 | + .access = PL2_R, .type = ARM_CP_CONST, |
232 | + .name = TYPE_ARM_SMMU, | 336 | + .resetvalue = cpu->pmsav8r_hdregion |
233 | + .parent = TYPE_SYS_BUS_DEVICE, | 337 | + }; |
234 | + .instance_size = sizeof(SMMUState), | 338 | static const ARMCPRegInfo crn0_wi_reginfo = { |
235 | + .class_data = NULL, | 339 | .name = "CRN0_WI", .cp = 15, .crn = 0, .crm = CP_ANY, |
236 | + .class_size = sizeof(SMMUBaseClass), | 340 | .opc1 = CP_ANY, .opc2 = CP_ANY, .access = PL1_W, |
237 | + .class_init = smmu_base_class_init, | 341 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) |
238 | + .abstract = true, | 342 | define_arm_cp_regs(cpu, id_cp_reginfo); |
343 | if (!arm_feature(env, ARM_FEATURE_PMSA)) { | ||
344 | define_one_arm_cp_reg(cpu, &id_tlbtr_reginfo); | ||
345 | + } else if (arm_feature(env, ARM_FEATURE_PMSA) && | ||
346 | + arm_feature(env, ARM_FEATURE_V8)) { | ||
347 | + uint32_t i = 0; | ||
348 | + char *tmp_string; | ||
349 | + | ||
350 | + define_one_arm_cp_reg(cpu, &id_mpuir_reginfo); | ||
351 | + define_one_arm_cp_reg(cpu, &id_hmpuir_reginfo); | ||
352 | + define_arm_cp_regs(cpu, pmsav8r_cp_reginfo); | ||
353 | + | ||
354 | + /* Register alias is only valid for first 32 indexes */ | ||
355 | + for (i = 0; i < MIN(cpu->pmsav7_dregion, 32); ++i) { | ||
356 | + uint8_t crm = 0b1000 | extract32(i, 1, 3); | ||
357 | + uint8_t opc1 = extract32(i, 4, 1); | ||
358 | + uint8_t opc2 = extract32(i, 0, 1) << 2; | ||
359 | + | ||
360 | + tmp_string = g_strdup_printf("PRBAR%u", i); | ||
361 | + ARMCPRegInfo tmp_prbarn_reginfo = { | ||
362 | + .name = tmp_string, .type = ARM_CP_ALIAS | ARM_CP_NO_RAW, | ||
363 | + .cp = 15, .opc1 = opc1, .crn = 6, .crm = crm, .opc2 = opc2, | ||
364 | + .access = PL1_RW, .resetvalue = 0, | ||
365 | + .accessfn = access_tvm_trvm, | ||
366 | + .writefn = pmsav8r_regn_write, .readfn = pmsav8r_regn_read | ||
367 | + }; | ||
368 | + define_one_arm_cp_reg(cpu, &tmp_prbarn_reginfo); | ||
369 | + g_free(tmp_string); | ||
370 | + | ||
371 | + opc2 = extract32(i, 0, 1) << 2 | 0x1; | ||
372 | + tmp_string = g_strdup_printf("PRLAR%u", i); | ||
373 | + ARMCPRegInfo tmp_prlarn_reginfo = { | ||
374 | + .name = tmp_string, .type = ARM_CP_ALIAS | ARM_CP_NO_RAW, | ||
375 | + .cp = 15, .opc1 = opc1, .crn = 6, .crm = crm, .opc2 = opc2, | ||
376 | + .access = PL1_RW, .resetvalue = 0, | ||
377 | + .accessfn = access_tvm_trvm, | ||
378 | + .writefn = pmsav8r_regn_write, .readfn = pmsav8r_regn_read | ||
379 | + }; | ||
380 | + define_one_arm_cp_reg(cpu, &tmp_prlarn_reginfo); | ||
381 | + g_free(tmp_string); | ||
382 | + } | ||
383 | + | ||
384 | + /* Register alias is only valid for first 32 indexes */ | ||
385 | + for (i = 0; i < MIN(cpu->pmsav8r_hdregion, 32); ++i) { | ||
386 | + uint8_t crm = 0b1000 | extract32(i, 1, 3); | ||
387 | + uint8_t opc1 = 0b100 | extract32(i, 4, 1); | ||
388 | + uint8_t opc2 = extract32(i, 0, 1) << 2; | ||
389 | + | ||
390 | + tmp_string = g_strdup_printf("HPRBAR%u", i); | ||
391 | + ARMCPRegInfo tmp_hprbarn_reginfo = { | ||
392 | + .name = tmp_string, | ||
393 | + .type = ARM_CP_NO_RAW, | ||
394 | + .cp = 15, .opc1 = opc1, .crn = 6, .crm = crm, .opc2 = opc2, | ||
395 | + .access = PL2_RW, .resetvalue = 0, | ||
396 | + .writefn = pmsav8r_regn_write, .readfn = pmsav8r_regn_read | ||
397 | + }; | ||
398 | + define_one_arm_cp_reg(cpu, &tmp_hprbarn_reginfo); | ||
399 | + g_free(tmp_string); | ||
400 | + | ||
401 | + opc2 = extract32(i, 0, 1) << 2 | 0x1; | ||
402 | + tmp_string = g_strdup_printf("HPRLAR%u", i); | ||
403 | + ARMCPRegInfo tmp_hprlarn_reginfo = { | ||
404 | + .name = tmp_string, | ||
405 | + .type = ARM_CP_NO_RAW, | ||
406 | + .cp = 15, .opc1 = opc1, .crn = 6, .crm = crm, .opc2 = opc2, | ||
407 | + .access = PL2_RW, .resetvalue = 0, | ||
408 | + .writefn = pmsav8r_regn_write, .readfn = pmsav8r_regn_read | ||
409 | + }; | ||
410 | + define_one_arm_cp_reg(cpu, &tmp_hprlarn_reginfo); | ||
411 | + g_free(tmp_string); | ||
412 | + } | ||
413 | } else if (arm_feature(env, ARM_FEATURE_V7)) { | ||
414 | define_one_arm_cp_reg(cpu, &id_mpuir_reginfo); | ||
415 | } | ||
416 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) | ||
417 | sctlr.type |= ARM_CP_SUPPRESS_TB_END; | ||
418 | } | ||
419 | define_one_arm_cp_reg(cpu, &sctlr); | ||
420 | + | ||
421 | + if (arm_feature(env, ARM_FEATURE_PMSA) && | ||
422 | + arm_feature(env, ARM_FEATURE_V8)) { | ||
423 | + ARMCPRegInfo vsctlr = { | ||
424 | + .name = "VSCTLR", .state = ARM_CP_STATE_AA32, | ||
425 | + .cp = 15, .opc1 = 4, .crn = 2, .crm = 0, .opc2 = 0, | ||
426 | + .access = PL2_RW, .resetvalue = 0x0, | ||
427 | + .fieldoffset = offsetoflow32(CPUARMState, cp15.vsctlr), | ||
428 | + }; | ||
429 | + define_one_arm_cp_reg(cpu, &vsctlr); | ||
430 | + } | ||
431 | } | ||
432 | |||
433 | if (cpu_isar_feature(aa64_lor, cpu)) { | ||
434 | diff --git a/target/arm/machine.c b/target/arm/machine.c | ||
435 | index XXXXXXX..XXXXXXX 100644 | ||
436 | --- a/target/arm/machine.c | ||
437 | +++ b/target/arm/machine.c | ||
438 | @@ -XXX,XX +XXX,XX @@ static bool pmsav8_needed(void *opaque) | ||
439 | arm_feature(env, ARM_FEATURE_V8); | ||
440 | } | ||
441 | |||
442 | +static bool pmsav8r_needed(void *opaque) | ||
443 | +{ | ||
444 | + ARMCPU *cpu = opaque; | ||
445 | + CPUARMState *env = &cpu->env; | ||
446 | + | ||
447 | + return arm_feature(env, ARM_FEATURE_PMSA) && | ||
448 | + arm_feature(env, ARM_FEATURE_V8) && | ||
449 | + !arm_feature(env, ARM_FEATURE_M); | ||
450 | +} | ||
451 | + | ||
452 | +static const VMStateDescription vmstate_pmsav8r = { | ||
453 | + .name = "cpu/pmsav8/pmsav8r", | ||
454 | + .version_id = 1, | ||
455 | + .minimum_version_id = 1, | ||
456 | + .needed = pmsav8r_needed, | ||
457 | + .fields = (VMStateField[]) { | ||
458 | + VMSTATE_VARRAY_UINT32(env.pmsav8.hprbar, ARMCPU, | ||
459 | + pmsav8r_hdregion, 0, vmstate_info_uint32, uint32_t), | ||
460 | + VMSTATE_VARRAY_UINT32(env.pmsav8.hprlar, ARMCPU, | ||
461 | + pmsav8r_hdregion, 0, vmstate_info_uint32, uint32_t), | ||
462 | + VMSTATE_END_OF_LIST() | ||
463 | + }, | ||
239 | +}; | 464 | +}; |
240 | + | 465 | + |
241 | +static void smmu_base_register_types(void) | 466 | static const VMStateDescription vmstate_pmsav8 = { |
242 | +{ | 467 | .name = "cpu/pmsav8", |
243 | + type_register_static(&smmu_base_info); | 468 | .version_id = 1, |
244 | +} | 469 | @@ -XXX,XX +XXX,XX @@ static const VMStateDescription vmstate_pmsav8 = { |
245 | + | 470 | VMSTATE_UINT32(env.pmsav8.mair0[M_REG_NS], ARMCPU), |
246 | +type_init(smmu_base_register_types) | 471 | VMSTATE_UINT32(env.pmsav8.mair1[M_REG_NS], ARMCPU), |
247 | + | 472 | VMSTATE_END_OF_LIST() |
248 | diff --git a/default-configs/aarch64-softmmu.mak b/default-configs/aarch64-softmmu.mak | 473 | + }, |
249 | index XXXXXXX..XXXXXXX 100644 | 474 | + .subsections = (const VMStateDescription * []) { |
250 | --- a/default-configs/aarch64-softmmu.mak | 475 | + &vmstate_pmsav8r, |
251 | +++ b/default-configs/aarch64-softmmu.mak | 476 | + NULL |
252 | @@ -XXX,XX +XXX,XX @@ CONFIG_DDC=y | 477 | } |
253 | CONFIG_DPCD=y | 478 | }; |
254 | CONFIG_XLNX_ZYNQMP=y | 479 | |
255 | CONFIG_XLNX_ZYNQMP_ARM=y | ||
256 | +CONFIG_ARM_SMMUV3=y | ||
257 | -- | 480 | -- |
258 | 2.17.0 | 481 | 2.25.1 |
259 | 482 | ||
260 | 483 | diff view generated by jsdifflib |
1 | From: Eric Auger <eric.auger@redhat.com> | 1 | From: Tobias Röhmel <tobias.roehmel@rwth-aachen.de> |
---|---|---|---|
2 | 2 | ||
3 | At the moment, the SMMUv3 does not support notification on | 3 | Add PMSAv8r translation. |
4 | TLB invalidation. So let's log an error as soon as such notifier | 4 | |
5 | gets enabled. | 5 | Signed-off-by: Tobias Röhmel <tobias.roehmel@rwth-aachen.de> |
6 | |||
7 | Signed-off-by: Eric Auger <eric.auger@redhat.com> | ||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
9 | Message-id: 1524665762-31355-11-git-send-email-eric.auger@redhat.com | 7 | Message-id: 20221206102504.165775-7-tobias.roehmel@rwth-aachen.de |
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 9 | --- |
12 | hw/arm/smmuv3.c | 11 +++++++++++ | 10 | target/arm/ptw.c | 126 ++++++++++++++++++++++++++++++++++++++--------- |
13 | 1 file changed, 11 insertions(+) | 11 | 1 file changed, 104 insertions(+), 22 deletions(-) |
14 | 12 | ||
15 | diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c | 13 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c |
16 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/hw/arm/smmuv3.c | 15 | --- a/target/arm/ptw.c |
18 | +++ b/hw/arm/smmuv3.c | 16 | +++ b/target/arm/ptw.c |
19 | @@ -XXX,XX +XXX,XX @@ static void smmuv3_class_init(ObjectClass *klass, void *data) | 17 | @@ -XXX,XX +XXX,XX @@ static bool pmsav7_use_background_region(ARMCPU *cpu, ARMMMUIdx mmu_idx, |
20 | dc->realize = smmu_realize; | 18 | |
19 | if (arm_feature(env, ARM_FEATURE_M)) { | ||
20 | return env->v7m.mpu_ctrl[is_secure] & R_V7M_MPU_CTRL_PRIVDEFENA_MASK; | ||
21 | - } else { | ||
22 | - return regime_sctlr(env, mmu_idx) & SCTLR_BR; | ||
23 | } | ||
24 | + | ||
25 | + if (mmu_idx == ARMMMUIdx_Stage2) { | ||
26 | + return false; | ||
27 | + } | ||
28 | + | ||
29 | + return regime_sctlr(env, mmu_idx) & SCTLR_BR; | ||
21 | } | 30 | } |
22 | 31 | ||
23 | +static void smmuv3_notify_flag_changed(IOMMUMemoryRegion *iommu, | 32 | static bool get_phys_addr_pmsav7(CPUARMState *env, uint32_t address, |
24 | + IOMMUNotifierFlag old, | 33 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav7(CPUARMState *env, uint32_t address, |
25 | + IOMMUNotifierFlag new) | 34 | return !(result->f.prot & (1 << access_type)); |
35 | } | ||
36 | |||
37 | +static uint32_t *regime_rbar(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
38 | + uint32_t secure) | ||
26 | +{ | 39 | +{ |
27 | + if (old == IOMMU_NOTIFIER_NONE) { | 40 | + if (regime_el(env, mmu_idx) == 2) { |
28 | + warn_report("SMMUV3 does not support vhost/vfio integration yet: " | 41 | + return env->pmsav8.hprbar; |
29 | + "devices of those types will not function properly"); | 42 | + } else { |
43 | + return env->pmsav8.rbar[secure]; | ||
30 | + } | 44 | + } |
31 | +} | 45 | +} |
32 | + | 46 | + |
33 | static void smmuv3_iommu_memory_region_class_init(ObjectClass *klass, | 47 | +static uint32_t *regime_rlar(CPUARMState *env, ARMMMUIdx mmu_idx, |
34 | void *data) | 48 | + uint32_t secure) |
35 | { | 49 | +{ |
36 | IOMMUMemoryRegionClass *imrc = IOMMU_MEMORY_REGION_CLASS(klass); | 50 | + if (regime_el(env, mmu_idx) == 2) { |
37 | 51 | + return env->pmsav8.hprlar; | |
38 | imrc->translate = smmuv3_translate; | 52 | + } else { |
39 | + imrc->notify_flag_changed = smmuv3_notify_flag_changed; | 53 | + return env->pmsav8.rlar[secure]; |
54 | + } | ||
55 | +} | ||
56 | + | ||
57 | bool pmsav8_mpu_lookup(CPUARMState *env, uint32_t address, | ||
58 | MMUAccessType access_type, ARMMMUIdx mmu_idx, | ||
59 | bool secure, GetPhysAddrResult *result, | ||
60 | @@ -XXX,XX +XXX,XX @@ bool pmsav8_mpu_lookup(CPUARMState *env, uint32_t address, | ||
61 | bool hit = false; | ||
62 | uint32_t addr_page_base = address & TARGET_PAGE_MASK; | ||
63 | uint32_t addr_page_limit = addr_page_base + (TARGET_PAGE_SIZE - 1); | ||
64 | + int region_counter; | ||
65 | + | ||
66 | + if (regime_el(env, mmu_idx) == 2) { | ||
67 | + region_counter = cpu->pmsav8r_hdregion; | ||
68 | + } else { | ||
69 | + region_counter = cpu->pmsav7_dregion; | ||
70 | + } | ||
71 | |||
72 | result->f.lg_page_size = TARGET_PAGE_BITS; | ||
73 | result->f.phys_addr = address; | ||
74 | @@ -XXX,XX +XXX,XX @@ bool pmsav8_mpu_lookup(CPUARMState *env, uint32_t address, | ||
75 | *mregion = -1; | ||
76 | } | ||
77 | |||
78 | + if (mmu_idx == ARMMMUIdx_Stage2) { | ||
79 | + fi->stage2 = true; | ||
80 | + } | ||
81 | + | ||
82 | /* | ||
83 | * Unlike the ARM ARM pseudocode, we don't need to check whether this | ||
84 | * was an exception vector read from the vector table (which is always | ||
85 | @@ -XXX,XX +XXX,XX @@ bool pmsav8_mpu_lookup(CPUARMState *env, uint32_t address, | ||
86 | hit = true; | ||
87 | } | ||
88 | |||
89 | - for (n = (int)cpu->pmsav7_dregion - 1; n >= 0; n--) { | ||
90 | + uint32_t bitmask; | ||
91 | + if (arm_feature(env, ARM_FEATURE_M)) { | ||
92 | + bitmask = 0x1f; | ||
93 | + } else { | ||
94 | + bitmask = 0x3f; | ||
95 | + fi->level = 0; | ||
96 | + } | ||
97 | + | ||
98 | + for (n = region_counter - 1; n >= 0; n--) { | ||
99 | /* region search */ | ||
100 | /* | ||
101 | - * Note that the base address is bits [31:5] from the register | ||
102 | - * with bits [4:0] all zeroes, but the limit address is bits | ||
103 | - * [31:5] from the register with bits [4:0] all ones. | ||
104 | + * Note that the base address is bits [31:x] from the register | ||
105 | + * with bits [x-1:0] all zeroes, but the limit address is bits | ||
106 | + * [31:x] from the register with bits [x:0] all ones. Where x is | ||
107 | + * 5 for Cortex-M and 6 for Cortex-R | ||
108 | */ | ||
109 | - uint32_t base = env->pmsav8.rbar[secure][n] & ~0x1f; | ||
110 | - uint32_t limit = env->pmsav8.rlar[secure][n] | 0x1f; | ||
111 | + uint32_t base = regime_rbar(env, mmu_idx, secure)[n] & ~bitmask; | ||
112 | + uint32_t limit = regime_rlar(env, mmu_idx, secure)[n] | bitmask; | ||
113 | |||
114 | - if (!(env->pmsav8.rlar[secure][n] & 0x1)) { | ||
115 | + if (!(regime_rlar(env, mmu_idx, secure)[n] & 0x1)) { | ||
116 | /* Region disabled */ | ||
117 | continue; | ||
118 | } | ||
119 | @@ -XXX,XX +XXX,XX @@ bool pmsav8_mpu_lookup(CPUARMState *env, uint32_t address, | ||
120 | * PMSAv7 where highest-numbered-region wins) | ||
121 | */ | ||
122 | fi->type = ARMFault_Permission; | ||
123 | - fi->level = 1; | ||
124 | + if (arm_feature(env, ARM_FEATURE_M)) { | ||
125 | + fi->level = 1; | ||
126 | + } | ||
127 | return true; | ||
128 | } | ||
129 | |||
130 | @@ -XXX,XX +XXX,XX @@ bool pmsav8_mpu_lookup(CPUARMState *env, uint32_t address, | ||
131 | } | ||
132 | |||
133 | if (!hit) { | ||
134 | - /* background fault */ | ||
135 | - fi->type = ARMFault_Background; | ||
136 | + if (arm_feature(env, ARM_FEATURE_M)) { | ||
137 | + fi->type = ARMFault_Background; | ||
138 | + } else { | ||
139 | + fi->type = ARMFault_Permission; | ||
140 | + } | ||
141 | return true; | ||
142 | } | ||
143 | |||
144 | @@ -XXX,XX +XXX,XX @@ bool pmsav8_mpu_lookup(CPUARMState *env, uint32_t address, | ||
145 | /* hit using the background region */ | ||
146 | get_phys_addr_pmsav7_default(env, mmu_idx, address, &result->f.prot); | ||
147 | } else { | ||
148 | - uint32_t ap = extract32(env->pmsav8.rbar[secure][matchregion], 1, 2); | ||
149 | - uint32_t xn = extract32(env->pmsav8.rbar[secure][matchregion], 0, 1); | ||
150 | + uint32_t matched_rbar = regime_rbar(env, mmu_idx, secure)[matchregion]; | ||
151 | + uint32_t matched_rlar = regime_rlar(env, mmu_idx, secure)[matchregion]; | ||
152 | + uint32_t ap = extract32(matched_rbar, 1, 2); | ||
153 | + uint32_t xn = extract32(matched_rbar, 0, 1); | ||
154 | bool pxn = false; | ||
155 | |||
156 | if (arm_feature(env, ARM_FEATURE_V8_1M)) { | ||
157 | - pxn = extract32(env->pmsav8.rlar[secure][matchregion], 4, 1); | ||
158 | + pxn = extract32(matched_rlar, 4, 1); | ||
159 | } | ||
160 | |||
161 | if (m_is_system_region(env, address)) { | ||
162 | @@ -XXX,XX +XXX,XX @@ bool pmsav8_mpu_lookup(CPUARMState *env, uint32_t address, | ||
163 | xn = 1; | ||
164 | } | ||
165 | |||
166 | - result->f.prot = simple_ap_to_rw_prot(env, mmu_idx, ap); | ||
167 | + if (regime_el(env, mmu_idx) == 2) { | ||
168 | + result->f.prot = simple_ap_to_rw_prot_is_user(ap, | ||
169 | + mmu_idx != ARMMMUIdx_E2); | ||
170 | + } else { | ||
171 | + result->f.prot = simple_ap_to_rw_prot(env, mmu_idx, ap); | ||
172 | + } | ||
173 | + | ||
174 | + if (!arm_feature(env, ARM_FEATURE_M)) { | ||
175 | + uint8_t attrindx = extract32(matched_rlar, 1, 3); | ||
176 | + uint64_t mair = env->cp15.mair_el[regime_el(env, mmu_idx)]; | ||
177 | + uint8_t sh = extract32(matched_rlar, 3, 2); | ||
178 | + | ||
179 | + if (regime_sctlr(env, mmu_idx) & SCTLR_WXN && | ||
180 | + result->f.prot & PAGE_WRITE && mmu_idx != ARMMMUIdx_Stage2) { | ||
181 | + xn = 0x1; | ||
182 | + } | ||
183 | + | ||
184 | + if ((regime_el(env, mmu_idx) == 1) && | ||
185 | + regime_sctlr(env, mmu_idx) & SCTLR_UWXN && ap == 0x1) { | ||
186 | + pxn = 0x1; | ||
187 | + } | ||
188 | + | ||
189 | + result->cacheattrs.is_s2_format = false; | ||
190 | + result->cacheattrs.attrs = extract64(mair, attrindx * 8, 8); | ||
191 | + result->cacheattrs.shareability = sh; | ||
192 | + } | ||
193 | + | ||
194 | if (result->f.prot && !xn && !(pxn && !is_user)) { | ||
195 | result->f.prot |= PAGE_EXEC; | ||
196 | } | ||
197 | - /* | ||
198 | - * We don't need to look the attribute up in the MAIR0/MAIR1 | ||
199 | - * registers because that only tells us about cacheability. | ||
200 | - */ | ||
201 | + | ||
202 | if (mregion) { | ||
203 | *mregion = matchregion; | ||
204 | } | ||
205 | } | ||
206 | |||
207 | fi->type = ARMFault_Permission; | ||
208 | - fi->level = 1; | ||
209 | + if (arm_feature(env, ARM_FEATURE_M)) { | ||
210 | + fi->level = 1; | ||
211 | + } | ||
212 | return !(result->f.prot & (1 << access_type)); | ||
40 | } | 213 | } |
41 | 214 | ||
42 | static const TypeInfo smmuv3_type_info = { | 215 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_twostage(CPUARMState *env, S1Translate *ptw, |
216 | cacheattrs1 = result->cacheattrs; | ||
217 | memset(result, 0, sizeof(*result)); | ||
218 | |||
219 | - ret = get_phys_addr_lpae(env, ptw, ipa, access_type, is_el0, result, fi); | ||
220 | + if (arm_feature(env, ARM_FEATURE_PMSA)) { | ||
221 | + ret = get_phys_addr_pmsav8(env, ipa, access_type, | ||
222 | + ptw->in_mmu_idx, is_secure, result, fi); | ||
223 | + } else { | ||
224 | + ret = get_phys_addr_lpae(env, ptw, ipa, access_type, | ||
225 | + is_el0, result, fi); | ||
226 | + } | ||
227 | fi->s2addr = ipa; | ||
228 | |||
229 | /* Combine the S1 and S2 perms. */ | ||
43 | -- | 230 | -- |
44 | 2.17.0 | 231 | 2.25.1 |
45 | 232 | ||
46 | 233 | diff view generated by jsdifflib |
1 | From: Eric Auger <eric.auger@redhat.com> | 1 | From: Tobias Röhmel <tobias.roehmel@rwth-aachen.de> |
---|---|---|---|
2 | 2 | ||
3 | We introduce some helpers to handle wired IRQs and especially | 3 | All constants are taken from the ARM Cortex-R52 Processor TRM Revision: r1p3 |
4 | GERROR interrupt. SMMU writes GERROR register on GERROR event | ||
5 | and SW acks GERROR interrupts by setting GERRORn. | ||
6 | 4 | ||
7 | The Wired interrupts are edge sensitive hence the pulse usage. | 5 | Signed-off-by: Tobias Röhmel <tobias.roehmel@rwth-aachen.de> |
8 | |||
9 | Signed-off-by: Eric Auger <eric.auger@redhat.com> | ||
10 | Signed-off-by: Prem Mallappa <prem.mallappa@broadcom.com> | ||
11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
12 | Message-id: 1524665762-31355-6-git-send-email-eric.auger@redhat.com | 7 | Message-id: 20221206102504.165775-8-tobias.roehmel@rwth-aachen.de |
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
14 | --- | 9 | --- |
15 | hw/arm/smmuv3-internal.h | 14 +++++++++ | 10 | target/arm/cpu_tcg.c | 42 ++++++++++++++++++++++++++++++++++++++++++ |
16 | hw/arm/smmuv3.c | 64 ++++++++++++++++++++++++++++++++++++++++ | 11 | 1 file changed, 42 insertions(+) |
17 | hw/arm/trace-events | 3 ++ | ||
18 | 3 files changed, 81 insertions(+) | ||
19 | 12 | ||
20 | diff --git a/hw/arm/smmuv3-internal.h b/hw/arm/smmuv3-internal.h | 13 | diff --git a/target/arm/cpu_tcg.c b/target/arm/cpu_tcg.c |
21 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
22 | --- a/hw/arm/smmuv3-internal.h | 15 | --- a/target/arm/cpu_tcg.c |
23 | +++ b/hw/arm/smmuv3-internal.h | 16 | +++ b/target/arm/cpu_tcg.c |
24 | @@ -XXX,XX +XXX,XX @@ static inline uint32_t smmuv3_idreg(int regoffset) | 17 | @@ -XXX,XX +XXX,XX @@ static void cortex_r5_initfn(Object *obj) |
25 | return smmuv3_ids[regoffset / 4]; | 18 | define_arm_cp_regs(cpu, cortexr5_cp_reginfo); |
26 | } | 19 | } |
27 | 20 | ||
28 | +static inline bool smmuv3_eventq_irq_enabled(SMMUv3State *s) | 21 | +static void cortex_r52_initfn(Object *obj) |
29 | +{ | 22 | +{ |
30 | + return FIELD_EX32(s->irq_ctrl, IRQ_CTRL, EVENTQ_IRQEN); | 23 | + ARMCPU *cpu = ARM_CPU(obj); |
24 | + | ||
25 | + set_feature(&cpu->env, ARM_FEATURE_V8); | ||
26 | + set_feature(&cpu->env, ARM_FEATURE_EL2); | ||
27 | + set_feature(&cpu->env, ARM_FEATURE_PMSA); | ||
28 | + set_feature(&cpu->env, ARM_FEATURE_NEON); | ||
29 | + set_feature(&cpu->env, ARM_FEATURE_GENERIC_TIMER); | ||
30 | + cpu->midr = 0x411fd133; /* r1p3 */ | ||
31 | + cpu->revidr = 0x00000000; | ||
32 | + cpu->reset_fpsid = 0x41034023; | ||
33 | + cpu->isar.mvfr0 = 0x10110222; | ||
34 | + cpu->isar.mvfr1 = 0x12111111; | ||
35 | + cpu->isar.mvfr2 = 0x00000043; | ||
36 | + cpu->ctr = 0x8144c004; | ||
37 | + cpu->reset_sctlr = 0x30c50838; | ||
38 | + cpu->isar.id_pfr0 = 0x00000131; | ||
39 | + cpu->isar.id_pfr1 = 0x10111001; | ||
40 | + cpu->isar.id_dfr0 = 0x03010006; | ||
41 | + cpu->id_afr0 = 0x00000000; | ||
42 | + cpu->isar.id_mmfr0 = 0x00211040; | ||
43 | + cpu->isar.id_mmfr1 = 0x40000000; | ||
44 | + cpu->isar.id_mmfr2 = 0x01200000; | ||
45 | + cpu->isar.id_mmfr3 = 0xf0102211; | ||
46 | + cpu->isar.id_mmfr4 = 0x00000010; | ||
47 | + cpu->isar.id_isar0 = 0x02101110; | ||
48 | + cpu->isar.id_isar1 = 0x13112111; | ||
49 | + cpu->isar.id_isar2 = 0x21232142; | ||
50 | + cpu->isar.id_isar3 = 0x01112131; | ||
51 | + cpu->isar.id_isar4 = 0x00010142; | ||
52 | + cpu->isar.id_isar5 = 0x00010001; | ||
53 | + cpu->isar.dbgdidr = 0x77168000; | ||
54 | + cpu->clidr = (1 << 27) | (1 << 24) | 0x3; | ||
55 | + cpu->ccsidr[0] = 0x700fe01a; /* 32KB L1 dcache */ | ||
56 | + cpu->ccsidr[1] = 0x201fe00a; /* 32KB L1 icache */ | ||
57 | + | ||
58 | + cpu->pmsav7_dregion = 16; | ||
59 | + cpu->pmsav8r_hdregion = 16; | ||
31 | +} | 60 | +} |
32 | + | 61 | + |
33 | +static inline bool smmuv3_gerror_irq_enabled(SMMUv3State *s) | 62 | static void cortex_r5f_initfn(Object *obj) |
34 | +{ | ||
35 | + return FIELD_EX32(s->irq_ctrl, IRQ_CTRL, GERROR_IRQEN); | ||
36 | +} | ||
37 | + | ||
38 | +/* public until callers get introduced */ | ||
39 | +void smmuv3_trigger_irq(SMMUv3State *s, SMMUIrq irq, uint32_t gerror_mask); | ||
40 | +void smmuv3_write_gerrorn(SMMUv3State *s, uint32_t gerrorn); | ||
41 | + | ||
42 | #endif | ||
43 | diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c | ||
44 | index XXXXXXX..XXXXXXX 100644 | ||
45 | --- a/hw/arm/smmuv3.c | ||
46 | +++ b/hw/arm/smmuv3.c | ||
47 | @@ -XXX,XX +XXX,XX @@ | ||
48 | #include "hw/arm/smmuv3.h" | ||
49 | #include "smmuv3-internal.h" | ||
50 | |||
51 | +/** | ||
52 | + * smmuv3_trigger_irq - pulse @irq if enabled and update | ||
53 | + * GERROR register in case of GERROR interrupt | ||
54 | + * | ||
55 | + * @irq: irq type | ||
56 | + * @gerror_mask: mask of gerrors to toggle (relevant if @irq is GERROR) | ||
57 | + */ | ||
58 | +void smmuv3_trigger_irq(SMMUv3State *s, SMMUIrq irq, uint32_t gerror_mask) | ||
59 | +{ | ||
60 | + | ||
61 | + bool pulse = false; | ||
62 | + | ||
63 | + switch (irq) { | ||
64 | + case SMMU_IRQ_EVTQ: | ||
65 | + pulse = smmuv3_eventq_irq_enabled(s); | ||
66 | + break; | ||
67 | + case SMMU_IRQ_PRIQ: | ||
68 | + qemu_log_mask(LOG_UNIMP, "PRI not yet supported\n"); | ||
69 | + break; | ||
70 | + case SMMU_IRQ_CMD_SYNC: | ||
71 | + pulse = true; | ||
72 | + break; | ||
73 | + case SMMU_IRQ_GERROR: | ||
74 | + { | ||
75 | + uint32_t pending = s->gerror ^ s->gerrorn; | ||
76 | + uint32_t new_gerrors = ~pending & gerror_mask; | ||
77 | + | ||
78 | + if (!new_gerrors) { | ||
79 | + /* only toggle non pending errors */ | ||
80 | + return; | ||
81 | + } | ||
82 | + s->gerror ^= new_gerrors; | ||
83 | + trace_smmuv3_write_gerror(new_gerrors, s->gerror); | ||
84 | + | ||
85 | + pulse = smmuv3_gerror_irq_enabled(s); | ||
86 | + break; | ||
87 | + } | ||
88 | + } | ||
89 | + if (pulse) { | ||
90 | + trace_smmuv3_trigger_irq(irq); | ||
91 | + qemu_irq_pulse(s->irq[irq]); | ||
92 | + } | ||
93 | +} | ||
94 | + | ||
95 | +void smmuv3_write_gerrorn(SMMUv3State *s, uint32_t new_gerrorn) | ||
96 | +{ | ||
97 | + uint32_t pending = s->gerror ^ s->gerrorn; | ||
98 | + uint32_t toggled = s->gerrorn ^ new_gerrorn; | ||
99 | + | ||
100 | + if (toggled & ~pending) { | ||
101 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
102 | + "guest toggles non pending errors = 0x%x\n", | ||
103 | + toggled & ~pending); | ||
104 | + } | ||
105 | + | ||
106 | + /* | ||
107 | + * We do not raise any error in case guest toggles bits corresponding | ||
108 | + * to not active IRQs (CONSTRAINED UNPREDICTABLE) | ||
109 | + */ | ||
110 | + s->gerrorn = new_gerrorn; | ||
111 | + | ||
112 | + trace_smmuv3_write_gerrorn(toggled & pending, s->gerrorn); | ||
113 | +} | ||
114 | + | ||
115 | static void smmuv3_init_regs(SMMUv3State *s) | ||
116 | { | 63 | { |
117 | /** | 64 | ARMCPU *cpu = ARM_CPU(obj); |
118 | diff --git a/hw/arm/trace-events b/hw/arm/trace-events | 65 | @@ -XXX,XX +XXX,XX @@ static const ARMCPUInfo arm_tcg_cpus[] = { |
119 | index XXXXXXX..XXXXXXX 100644 | 66 | .class_init = arm_v7m_class_init }, |
120 | --- a/hw/arm/trace-events | 67 | { .name = "cortex-r5", .initfn = cortex_r5_initfn }, |
121 | +++ b/hw/arm/trace-events | 68 | { .name = "cortex-r5f", .initfn = cortex_r5f_initfn }, |
122 | @@ -XXX,XX +XXX,XX @@ smmu_get_pte(uint64_t baseaddr, int index, uint64_t pteaddr, uint64_t pte) "base | 69 | + { .name = "cortex-r52", .initfn = cortex_r52_initfn }, |
123 | 70 | { .name = "ti925t", .initfn = ti925t_initfn }, | |
124 | #hw/arm/smmuv3.c | 71 | { .name = "sa1100", .initfn = sa1100_initfn }, |
125 | smmuv3_read_mmio(uint64_t addr, uint64_t val, unsigned size, uint32_t r) "addr: 0x%"PRIx64" val:0x%"PRIx64" size: 0x%x(%d)" | 72 | { .name = "sa1110", .initfn = sa1110_initfn }, |
126 | +smmuv3_trigger_irq(int irq) "irq=%d" | ||
127 | +smmuv3_write_gerror(uint32_t toggled, uint32_t gerror) "toggled=0x%x, new GERROR=0x%x" | ||
128 | +smmuv3_write_gerrorn(uint32_t acked, uint32_t gerrorn) "acked=0x%x, new GERRORN=0x%x" | ||
129 | -- | 73 | -- |
130 | 2.17.0 | 74 | 2.25.1 |
131 | 75 | ||
132 | 76 | diff view generated by jsdifflib |
1 | For v8M the instructions VLLDM and VLSTM support lazy saving | 1 | From: Alex Bennée <alex.bennee@linaro.org> |
---|---|---|---|
2 | and restoring of the secure floating-point registers. Even | ||
3 | if the floating point extension is not implemented, these | ||
4 | instructions must act as NOPs in Secure state, so they can | ||
5 | be used as part of the secure-to-nonsecure call sequence. | ||
6 | 2 | ||
7 | Fixes: https://bugs.launchpad.net/qemu/+bug/1768295 | 3 | The check semihosting_enabled() wants to know if the guest is |
4 | currently in user mode. Unlike the other cases the test was inverted | ||
5 | causing us to block semihosting calls in non-EL0 modes. | ||
6 | |||
8 | Cc: qemu-stable@nongnu.org | 7 | Cc: qemu-stable@nongnu.org |
8 | Fixes: 19b26317e9 (target/arm: Honour -semihosting-config userspace=on) | ||
9 | Signed-off-by: Alex Bennée <alex.bennee@linaro.org> | ||
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
11 | Message-id: 20180503105730.5958-1-peter.maydell@linaro.org | ||
12 | --- | 12 | --- |
13 | target/arm/translate.c | 17 ++++++++++++++++- | 13 | target/arm/translate.c | 2 +- |
14 | 1 file changed, 16 insertions(+), 1 deletion(-) | 14 | 1 file changed, 1 insertion(+), 1 deletion(-) |
15 | 15 | ||
16 | diff --git a/target/arm/translate.c b/target/arm/translate.c | 16 | diff --git a/target/arm/translate.c b/target/arm/translate.c |
17 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/target/arm/translate.c | 18 | --- a/target/arm/translate.c |
19 | +++ b/target/arm/translate.c | 19 | +++ b/target/arm/translate.c |
20 | @@ -XXX,XX +XXX,XX @@ static void disas_thumb2_insn(DisasContext *s, uint32_t insn) | 20 | @@ -XXX,XX +XXX,XX @@ static inline void gen_hlt(DisasContext *s, int imm) |
21 | /* Coprocessor. */ | 21 | * semihosting, to provide some semblance of security |
22 | if (arm_dc_feature(s, ARM_FEATURE_M)) { | 22 | * (and for consistency with our 32-bit semihosting). |
23 | /* We don't currently implement M profile FP support, | 23 | */ |
24 | - * so this entire space should give a NOCP fault. | 24 | - if (semihosting_enabled(s->current_el != 0) && |
25 | + * so this entire space should give a NOCP fault, with | 25 | + if (semihosting_enabled(s->current_el == 0) && |
26 | + * the exception of the v8M VLLDM and VLSTM insns, which | 26 | (imm == (s->thumb ? 0x3c : 0xf000))) { |
27 | + * must be NOPs in Secure state and UNDEF in Nonsecure state. | 27 | gen_exception_internal_insn(s, EXCP_SEMIHOST); |
28 | */ | 28 | return; |
29 | + if (arm_dc_feature(s, ARM_FEATURE_V8) && | ||
30 | + (insn & 0xffa00f00) == 0xec200a00) { | ||
31 | + /* 0b1110_1100_0x1x_xxxx_xxxx_1010_xxxx_xxxx | ||
32 | + * - VLLDM, VLSTM | ||
33 | + * We choose to UNDEF if the RAZ bits are non-zero. | ||
34 | + */ | ||
35 | + if (!s->v8m_secure || (insn & 0x0040f0ff)) { | ||
36 | + goto illegal_op; | ||
37 | + } | ||
38 | + /* Just NOP since FP support is not implemented */ | ||
39 | + break; | ||
40 | + } | ||
41 | + /* All other insns: NOCP */ | ||
42 | gen_exception_insn(s, 4, EXCP_NOCP, syn_uncategorized(), | ||
43 | default_exception_el(s)); | ||
44 | break; | ||
45 | -- | 29 | -- |
46 | 2.17.0 | 30 | 2.25.1 |
47 | 31 | ||
48 | 32 | diff view generated by jsdifflib |
1 | From: Eric Auger <eric.auger@redhat.com> | 1 | From: Axel Heider <axel.heider@hensoldt.net> |
---|---|---|---|
2 | 2 | ||
3 | Now we have relevant helpers for queue and irq | 3 | Fix typos, add background information |
4 | management, let's implement MMIO write operations. | ||
5 | 4 | ||
6 | Signed-off-by: Eric Auger <eric.auger@redhat.com> | 5 | Signed-off-by: Axel Heider <axel.heider@hensoldt.net> |
7 | Signed-off-by: Prem Mallappa <prem.mallappa@broadcom.com> | ||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
9 | Message-id: 1524665762-31355-8-git-send-email-eric.auger@redhat.com | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 8 | --- |
12 | hw/arm/smmuv3-internal.h | 8 +- | 9 | hw/timer/imx_epit.c | 20 ++++++++++++++++---- |
13 | hw/arm/smmuv3.c | 170 +++++++++++++++++++++++++++++++++++++-- | 10 | 1 file changed, 16 insertions(+), 4 deletions(-) |
14 | hw/arm/trace-events | 6 ++ | ||
15 | 3 files changed, 174 insertions(+), 10 deletions(-) | ||
16 | 11 | ||
17 | diff --git a/hw/arm/smmuv3-internal.h b/hw/arm/smmuv3-internal.h | 12 | diff --git a/hw/timer/imx_epit.c b/hw/timer/imx_epit.c |
18 | index XXXXXXX..XXXXXXX 100644 | 13 | index XXXXXXX..XXXXXXX 100644 |
19 | --- a/hw/arm/smmuv3-internal.h | 14 | --- a/hw/timer/imx_epit.c |
20 | +++ b/hw/arm/smmuv3-internal.h | 15 | +++ b/hw/timer/imx_epit.c |
21 | @@ -XXX,XX +XXX,XX @@ REG32(CR0, 0x20) | 16 | @@ -XXX,XX +XXX,XX @@ static void imx_epit_set_freq(IMXEPITState *s) |
22 | FIELD(CR0, EVENTQEN, 2, 1) | ||
23 | FIELD(CR0, CMDQEN, 3, 1) | ||
24 | |||
25 | +#define SMMU_CR0_RESERVED 0xFFFFFC20 | ||
26 | + | ||
27 | REG32(CR0ACK, 0x24) | ||
28 | REG32(CR1, 0x28) | ||
29 | REG32(CR2, 0x2c) | ||
30 | @@ -XXX,XX +XXX,XX @@ static inline bool smmuv3_gerror_irq_enabled(SMMUv3State *s) | ||
31 | return FIELD_EX32(s->irq_ctrl, IRQ_CTRL, GERROR_IRQEN); | ||
32 | } | ||
33 | |||
34 | -/* public until callers get introduced */ | ||
35 | -void smmuv3_trigger_irq(SMMUv3State *s, SMMUIrq irq, uint32_t gerror_mask); | ||
36 | -void smmuv3_write_gerrorn(SMMUv3State *s, uint32_t gerrorn); | ||
37 | - | ||
38 | /* Queue Handling */ | ||
39 | |||
40 | #define Q_BASE(q) ((q)->base & SMMU_BASE_ADDR_MASK) | ||
41 | @@ -XXX,XX +XXX,XX @@ enum { /* Command completion notification */ | ||
42 | addr; \ | ||
43 | }) | ||
44 | |||
45 | -int smmuv3_cmdq_consume(SMMUv3State *s); | ||
46 | +#define SMMU_FEATURE_2LVL_STE (1 << 0) | ||
47 | |||
48 | #endif | ||
49 | diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c | ||
50 | index XXXXXXX..XXXXXXX 100644 | ||
51 | --- a/hw/arm/smmuv3.c | ||
52 | +++ b/hw/arm/smmuv3.c | ||
53 | @@ -XXX,XX +XXX,XX @@ | ||
54 | * @irq: irq type | ||
55 | * @gerror_mask: mask of gerrors to toggle (relevant if @irq is GERROR) | ||
56 | */ | ||
57 | -void smmuv3_trigger_irq(SMMUv3State *s, SMMUIrq irq, uint32_t gerror_mask) | ||
58 | +static void smmuv3_trigger_irq(SMMUv3State *s, SMMUIrq irq, | ||
59 | + uint32_t gerror_mask) | ||
60 | { | ||
61 | |||
62 | bool pulse = false; | ||
63 | @@ -XXX,XX +XXX,XX @@ void smmuv3_trigger_irq(SMMUv3State *s, SMMUIrq irq, uint32_t gerror_mask) | ||
64 | } | 17 | } |
65 | } | 18 | } |
66 | 19 | ||
67 | -void smmuv3_write_gerrorn(SMMUv3State *s, uint32_t new_gerrorn) | 20 | +/* |
68 | +static void smmuv3_write_gerrorn(SMMUv3State *s, uint32_t new_gerrorn) | 21 | + * This is called both on hardware (device) reset and software reset. |
22 | + */ | ||
23 | static void imx_epit_reset(DeviceState *dev) | ||
69 | { | 24 | { |
70 | uint32_t pending = s->gerror ^ s->gerrorn; | 25 | IMXEPITState *s = IMX_EPIT(dev); |
71 | uint32_t toggled = s->gerrorn ^ new_gerrorn; | 26 | |
72 | @@ -XXX,XX +XXX,XX @@ static void smmuv3_init_regs(SMMUv3State *s) | 27 | - /* |
73 | s->sid_split = 0; | 28 | - * Soft reset doesn't touch some bits; hard reset clears them |
29 | - */ | ||
30 | + /* Soft reset doesn't touch some bits; hard reset clears them */ | ||
31 | s->cr &= (CR_EN|CR_ENMOD|CR_STOPEN|CR_DOZEN|CR_WAITEN|CR_DBGEN); | ||
32 | s->sr = 0; | ||
33 | s->lr = EPIT_TIMER_MAX; | ||
34 | @@ -XXX,XX +XXX,XX @@ static void imx_epit_write(void *opaque, hwaddr offset, uint64_t value, | ||
35 | ptimer_transaction_begin(s->timer_cmp); | ||
36 | ptimer_transaction_begin(s->timer_reload); | ||
37 | |||
38 | + /* Update the frequency. Has been done already in case of a reset. */ | ||
39 | if (!(s->cr & CR_SWR)) { | ||
40 | imx_epit_set_freq(s); | ||
41 | } | ||
42 | @@ -XXX,XX +XXX,XX @@ static void imx_epit_write(void *opaque, hwaddr offset, uint64_t value, | ||
43 | break; | ||
44 | |||
45 | case 1: /* SR - ACK*/ | ||
46 | - /* writing 1 to OCIF clear the OCIF bit */ | ||
47 | + /* writing 1 to OCIF clears the OCIF bit */ | ||
48 | if (value & 0x01) { | ||
49 | s->sr = 0; | ||
50 | imx_epit_update_int(s); | ||
51 | @@ -XXX,XX +XXX,XX @@ static void imx_epit_realize(DeviceState *dev, Error **errp) | ||
52 | 0x00001000); | ||
53 | sysbus_init_mmio(sbd, &s->iomem); | ||
54 | |||
55 | + /* | ||
56 | + * The reload timer keeps running when the peripheral is enabled. It is a | ||
57 | + * kind of wall clock that does not generate any interrupts. The callback | ||
58 | + * needs to be provided, but it does nothing as the ptimer already supports | ||
59 | + * all necessary reloading functionality. | ||
60 | + */ | ||
61 | s->timer_reload = ptimer_init(imx_epit_reload, s, PTIMER_POLICY_LEGACY); | ||
62 | |||
63 | + /* | ||
64 | + * The compare timer is running only when the peripheral configuration is | ||
65 | + * in a state that will generate compare interrupts. | ||
66 | + */ | ||
67 | s->timer_cmp = ptimer_init(imx_epit_cmp, s, PTIMER_POLICY_LEGACY); | ||
74 | } | 68 | } |
75 | 69 | ||
76 | -int smmuv3_cmdq_consume(SMMUv3State *s) | ||
77 | +static int smmuv3_cmdq_consume(SMMUv3State *s) | ||
78 | { | ||
79 | SMMUCmdError cmd_error = SMMU_CERROR_NONE; | ||
80 | SMMUQueue *q = &s->cmdq; | ||
81 | @@ -XXX,XX +XXX,XX @@ int smmuv3_cmdq_consume(SMMUv3State *s) | ||
82 | return 0; | ||
83 | } | ||
84 | |||
85 | +static MemTxResult smmu_writell(SMMUv3State *s, hwaddr offset, | ||
86 | + uint64_t data, MemTxAttrs attrs) | ||
87 | +{ | ||
88 | + switch (offset) { | ||
89 | + case A_GERROR_IRQ_CFG0: | ||
90 | + s->gerror_irq_cfg0 = data; | ||
91 | + return MEMTX_OK; | ||
92 | + case A_STRTAB_BASE: | ||
93 | + s->strtab_base = data; | ||
94 | + return MEMTX_OK; | ||
95 | + case A_CMDQ_BASE: | ||
96 | + s->cmdq.base = data; | ||
97 | + s->cmdq.log2size = extract64(s->cmdq.base, 0, 5); | ||
98 | + if (s->cmdq.log2size > SMMU_CMDQS) { | ||
99 | + s->cmdq.log2size = SMMU_CMDQS; | ||
100 | + } | ||
101 | + return MEMTX_OK; | ||
102 | + case A_EVENTQ_BASE: | ||
103 | + s->eventq.base = data; | ||
104 | + s->eventq.log2size = extract64(s->eventq.base, 0, 5); | ||
105 | + if (s->eventq.log2size > SMMU_EVENTQS) { | ||
106 | + s->eventq.log2size = SMMU_EVENTQS; | ||
107 | + } | ||
108 | + return MEMTX_OK; | ||
109 | + case A_EVENTQ_IRQ_CFG0: | ||
110 | + s->eventq_irq_cfg0 = data; | ||
111 | + return MEMTX_OK; | ||
112 | + default: | ||
113 | + qemu_log_mask(LOG_UNIMP, | ||
114 | + "%s Unexpected 64-bit access to 0x%"PRIx64" (WI)\n", | ||
115 | + __func__, offset); | ||
116 | + return MEMTX_OK; | ||
117 | + } | ||
118 | +} | ||
119 | + | ||
120 | +static MemTxResult smmu_writel(SMMUv3State *s, hwaddr offset, | ||
121 | + uint64_t data, MemTxAttrs attrs) | ||
122 | +{ | ||
123 | + switch (offset) { | ||
124 | + case A_CR0: | ||
125 | + s->cr[0] = data; | ||
126 | + s->cr0ack = data & ~SMMU_CR0_RESERVED; | ||
127 | + /* in case the command queue has been enabled */ | ||
128 | + smmuv3_cmdq_consume(s); | ||
129 | + return MEMTX_OK; | ||
130 | + case A_CR1: | ||
131 | + s->cr[1] = data; | ||
132 | + return MEMTX_OK; | ||
133 | + case A_CR2: | ||
134 | + s->cr[2] = data; | ||
135 | + return MEMTX_OK; | ||
136 | + case A_IRQ_CTRL: | ||
137 | + s->irq_ctrl = data; | ||
138 | + return MEMTX_OK; | ||
139 | + case A_GERRORN: | ||
140 | + smmuv3_write_gerrorn(s, data); | ||
141 | + /* | ||
142 | + * By acknowledging the CMDQ_ERR, SW may notify cmds can | ||
143 | + * be processed again | ||
144 | + */ | ||
145 | + smmuv3_cmdq_consume(s); | ||
146 | + return MEMTX_OK; | ||
147 | + case A_GERROR_IRQ_CFG0: /* 64b */ | ||
148 | + s->gerror_irq_cfg0 = deposit64(s->gerror_irq_cfg0, 0, 32, data); | ||
149 | + return MEMTX_OK; | ||
150 | + case A_GERROR_IRQ_CFG0 + 4: | ||
151 | + s->gerror_irq_cfg0 = deposit64(s->gerror_irq_cfg0, 32, 32, data); | ||
152 | + return MEMTX_OK; | ||
153 | + case A_GERROR_IRQ_CFG1: | ||
154 | + s->gerror_irq_cfg1 = data; | ||
155 | + return MEMTX_OK; | ||
156 | + case A_GERROR_IRQ_CFG2: | ||
157 | + s->gerror_irq_cfg2 = data; | ||
158 | + return MEMTX_OK; | ||
159 | + case A_STRTAB_BASE: /* 64b */ | ||
160 | + s->strtab_base = deposit64(s->strtab_base, 0, 32, data); | ||
161 | + return MEMTX_OK; | ||
162 | + case A_STRTAB_BASE + 4: | ||
163 | + s->strtab_base = deposit64(s->strtab_base, 32, 32, data); | ||
164 | + return MEMTX_OK; | ||
165 | + case A_STRTAB_BASE_CFG: | ||
166 | + s->strtab_base_cfg = data; | ||
167 | + if (FIELD_EX32(data, STRTAB_BASE_CFG, FMT) == 1) { | ||
168 | + s->sid_split = FIELD_EX32(data, STRTAB_BASE_CFG, SPLIT); | ||
169 | + s->features |= SMMU_FEATURE_2LVL_STE; | ||
170 | + } | ||
171 | + return MEMTX_OK; | ||
172 | + case A_CMDQ_BASE: /* 64b */ | ||
173 | + s->cmdq.base = deposit64(s->cmdq.base, 0, 32, data); | ||
174 | + s->cmdq.log2size = extract64(s->cmdq.base, 0, 5); | ||
175 | + if (s->cmdq.log2size > SMMU_CMDQS) { | ||
176 | + s->cmdq.log2size = SMMU_CMDQS; | ||
177 | + } | ||
178 | + return MEMTX_OK; | ||
179 | + case A_CMDQ_BASE + 4: /* 64b */ | ||
180 | + s->cmdq.base = deposit64(s->cmdq.base, 32, 32, data); | ||
181 | + return MEMTX_OK; | ||
182 | + case A_CMDQ_PROD: | ||
183 | + s->cmdq.prod = data; | ||
184 | + smmuv3_cmdq_consume(s); | ||
185 | + return MEMTX_OK; | ||
186 | + case A_CMDQ_CONS: | ||
187 | + s->cmdq.cons = data; | ||
188 | + return MEMTX_OK; | ||
189 | + case A_EVENTQ_BASE: /* 64b */ | ||
190 | + s->eventq.base = deposit64(s->eventq.base, 0, 32, data); | ||
191 | + s->eventq.log2size = extract64(s->eventq.base, 0, 5); | ||
192 | + if (s->eventq.log2size > SMMU_EVENTQS) { | ||
193 | + s->eventq.log2size = SMMU_EVENTQS; | ||
194 | + } | ||
195 | + return MEMTX_OK; | ||
196 | + case A_EVENTQ_BASE + 4: | ||
197 | + s->eventq.base = deposit64(s->eventq.base, 32, 32, data); | ||
198 | + return MEMTX_OK; | ||
199 | + case A_EVENTQ_PROD: | ||
200 | + s->eventq.prod = data; | ||
201 | + return MEMTX_OK; | ||
202 | + case A_EVENTQ_CONS: | ||
203 | + s->eventq.cons = data; | ||
204 | + return MEMTX_OK; | ||
205 | + case A_EVENTQ_IRQ_CFG0: /* 64b */ | ||
206 | + s->eventq_irq_cfg0 = deposit64(s->eventq_irq_cfg0, 0, 32, data); | ||
207 | + return MEMTX_OK; | ||
208 | + case A_EVENTQ_IRQ_CFG0 + 4: | ||
209 | + s->eventq_irq_cfg0 = deposit64(s->eventq_irq_cfg0, 32, 32, data); | ||
210 | + return MEMTX_OK; | ||
211 | + case A_EVENTQ_IRQ_CFG1: | ||
212 | + s->eventq_irq_cfg1 = data; | ||
213 | + return MEMTX_OK; | ||
214 | + case A_EVENTQ_IRQ_CFG2: | ||
215 | + s->eventq_irq_cfg2 = data; | ||
216 | + return MEMTX_OK; | ||
217 | + default: | ||
218 | + qemu_log_mask(LOG_UNIMP, | ||
219 | + "%s Unexpected 32-bit access to 0x%"PRIx64" (WI)\n", | ||
220 | + __func__, offset); | ||
221 | + return MEMTX_OK; | ||
222 | + } | ||
223 | +} | ||
224 | + | ||
225 | static MemTxResult smmu_write_mmio(void *opaque, hwaddr offset, uint64_t data, | ||
226 | unsigned size, MemTxAttrs attrs) | ||
227 | { | ||
228 | - /* not yet implemented */ | ||
229 | - return MEMTX_ERROR; | ||
230 | + SMMUState *sys = opaque; | ||
231 | + SMMUv3State *s = ARM_SMMUV3(sys); | ||
232 | + MemTxResult r; | ||
233 | + | ||
234 | + /* CONSTRAINED UNPREDICTABLE choice to have page0/1 be exact aliases */ | ||
235 | + offset &= ~0x10000; | ||
236 | + | ||
237 | + switch (size) { | ||
238 | + case 8: | ||
239 | + r = smmu_writell(s, offset, data, attrs); | ||
240 | + break; | ||
241 | + case 4: | ||
242 | + r = smmu_writel(s, offset, data, attrs); | ||
243 | + break; | ||
244 | + default: | ||
245 | + r = MEMTX_ERROR; | ||
246 | + break; | ||
247 | + } | ||
248 | + | ||
249 | + trace_smmuv3_write_mmio(offset, data, size, r); | ||
250 | + return r; | ||
251 | } | ||
252 | |||
253 | static MemTxResult smmu_readll(SMMUv3State *s, hwaddr offset, | ||
254 | diff --git a/hw/arm/trace-events b/hw/arm/trace-events | ||
255 | index XXXXXXX..XXXXXXX 100644 | ||
256 | --- a/hw/arm/trace-events | ||
257 | +++ b/hw/arm/trace-events | ||
258 | @@ -XXX,XX +XXX,XX @@ smmuv3_cmdq_consume(uint32_t prod, uint32_t cons, uint8_t prod_wrap, uint8_t con | ||
259 | smmuv3_cmdq_opcode(const char *opcode) "<--- %s" | ||
260 | smmuv3_cmdq_consume_out(uint32_t prod, uint32_t cons, uint8_t prod_wrap, uint8_t cons_wrap) "prod:%d, cons:%d, prod_wrap:%d, cons_wrap:%d " | ||
261 | smmuv3_cmdq_consume_error(const char *cmd_name, uint8_t cmd_error) "Error on %s command execution: %d" | ||
262 | +smmuv3_update(bool is_empty, uint32_t prod, uint32_t cons, uint8_t prod_wrap, uint8_t cons_wrap) "q empty:%d prod:%d cons:%d p.wrap:%d p.cons:%d" | ||
263 | +smmuv3_update_check_cmd(int error) "cmdq not enabled or error :0x%x" | ||
264 | +smmuv3_write_mmio(uint64_t addr, uint64_t val, unsigned size, uint32_t r) "addr: 0x%"PRIx64" val:0x%"PRIx64" size: 0x%x(%d)" | ||
265 | +smmuv3_write_mmio_idr(uint64_t addr, uint64_t val) "write to RO/Unimpl reg 0x%lx val64:0x%lx" | ||
266 | +smmuv3_write_mmio_evtq_cons_bef_clear(uint32_t prod, uint32_t cons, uint8_t prod_wrap, uint8_t cons_wrap) "Before clearing interrupt prod:0x%x cons:0x%x prod.w:%d cons.w:%d" | ||
267 | +smmuv3_write_mmio_evtq_cons_after_clear(uint32_t prod, uint32_t cons, uint8_t prod_wrap, uint8_t cons_wrap) "after clearing interrupt prod:0x%x cons:0x%x prod.w:%d cons.w:%d" | ||
268 | -- | 70 | -- |
269 | 2.17.0 | 71 | 2.25.1 |
270 | |||
271 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Axel Heider <axel.heider@hensoldt.net> | ||
1 | 2 | ||
3 | remove unused defines, add needed defines | ||
4 | |||
5 | Signed-off-by: Axel Heider <axel.heider@hensoldt.net> | ||
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | --- | ||
9 | include/hw/timer/imx_epit.h | 4 ++-- | ||
10 | hw/timer/imx_epit.c | 4 ++-- | ||
11 | 2 files changed, 4 insertions(+), 4 deletions(-) | ||
12 | |||
13 | diff --git a/include/hw/timer/imx_epit.h b/include/hw/timer/imx_epit.h | ||
14 | index XXXXXXX..XXXXXXX 100644 | ||
15 | --- a/include/hw/timer/imx_epit.h | ||
16 | +++ b/include/hw/timer/imx_epit.h | ||
17 | @@ -XXX,XX +XXX,XX @@ | ||
18 | #define CR_OCIEN (1 << 2) | ||
19 | #define CR_RLD (1 << 3) | ||
20 | #define CR_PRESCALE_SHIFT (4) | ||
21 | -#define CR_PRESCALE_MASK (0xfff) | ||
22 | +#define CR_PRESCALE_BITS (12) | ||
23 | #define CR_SWR (1 << 16) | ||
24 | #define CR_IOVW (1 << 17) | ||
25 | #define CR_DBGEN (1 << 18) | ||
26 | @@ -XXX,XX +XXX,XX @@ | ||
27 | #define CR_DOZEN (1 << 20) | ||
28 | #define CR_STOPEN (1 << 21) | ||
29 | #define CR_CLKSRC_SHIFT (24) | ||
30 | -#define CR_CLKSRC_MASK (0x3 << CR_CLKSRC_SHIFT) | ||
31 | +#define CR_CLKSRC_BITS (2) | ||
32 | |||
33 | #define EPIT_TIMER_MAX 0XFFFFFFFFUL | ||
34 | |||
35 | diff --git a/hw/timer/imx_epit.c b/hw/timer/imx_epit.c | ||
36 | index XXXXXXX..XXXXXXX 100644 | ||
37 | --- a/hw/timer/imx_epit.c | ||
38 | +++ b/hw/timer/imx_epit.c | ||
39 | @@ -XXX,XX +XXX,XX @@ static void imx_epit_set_freq(IMXEPITState *s) | ||
40 | uint32_t clksrc; | ||
41 | uint32_t prescaler; | ||
42 | |||
43 | - clksrc = extract32(s->cr, CR_CLKSRC_SHIFT, 2); | ||
44 | - prescaler = 1 + extract32(s->cr, CR_PRESCALE_SHIFT, 12); | ||
45 | + clksrc = extract32(s->cr, CR_CLKSRC_SHIFT, CR_CLKSRC_BITS); | ||
46 | + prescaler = 1 + extract32(s->cr, CR_PRESCALE_SHIFT, CR_PRESCALE_BITS); | ||
47 | |||
48 | s->freq = imx_ccm_get_clock_frequency(s->ccm, | ||
49 | imx_epit_clocks[clksrc]) / prescaler; | ||
50 | -- | ||
51 | 2.25.1 | diff view generated by jsdifflib |
1 | From: Eric Auger <eric.auger@redhat.com> | 1 | From: Axel Heider <axel.heider@hensoldt.net> |
---|---|---|---|
2 | 2 | ||
3 | In case the MSI is translated by an IOMMU we need to fixup the | ||
4 | MSI route with the translated address. | ||
5 | |||
6 | Signed-off-by: Eric Auger <eric.auger@redhat.com> | ||
7 | Signed-off-by: Bharat Bhushan <Bharat.Bhushan@nxp.com> | ||
8 | Message-id: 1524665762-31355-12-git-send-email-eric.auger@redhat.com | ||
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 3 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 5 | --- |
12 | target/arm/kvm.c | 38 +++++++++++++++++++++++++++++++++++++- | 6 | include/hw/timer/imx_epit.h | 2 ++ |
13 | target/arm/trace-events | 3 +++ | 7 | hw/timer/imx_epit.c | 12 ++++++------ |
14 | 2 files changed, 40 insertions(+), 1 deletion(-) | 8 | 2 files changed, 8 insertions(+), 6 deletions(-) |
15 | 9 | ||
16 | diff --git a/target/arm/kvm.c b/target/arm/kvm.c | 10 | diff --git a/include/hw/timer/imx_epit.h b/include/hw/timer/imx_epit.h |
17 | index XXXXXXX..XXXXXXX 100644 | 11 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/target/arm/kvm.c | 12 | --- a/include/hw/timer/imx_epit.h |
19 | +++ b/target/arm/kvm.c | 13 | +++ b/include/hw/timer/imx_epit.h |
20 | @@ -XXX,XX +XXX,XX @@ | 14 | @@ -XXX,XX +XXX,XX @@ |
21 | #include "sysemu/kvm.h" | 15 | #define CR_CLKSRC_SHIFT (24) |
22 | #include "kvm_arm.h" | 16 | #define CR_CLKSRC_BITS (2) |
23 | #include "cpu.h" | 17 | |
24 | +#include "trace.h" | 18 | +#define SR_OCIF (1 << 0) |
25 | #include "internals.h" | 19 | + |
26 | #include "hw/arm/arm.h" | 20 | #define EPIT_TIMER_MAX 0XFFFFFFFFUL |
27 | +#include "hw/pci/pci.h" | 21 | |
28 | #include "exec/memattrs.h" | 22 | #define TYPE_IMX_EPIT "imx.epit" |
29 | #include "exec/address-spaces.h" | 23 | diff --git a/hw/timer/imx_epit.c b/hw/timer/imx_epit.c |
30 | #include "hw/boards.h" | 24 | index XXXXXXX..XXXXXXX 100644 |
31 | @@ -XXX,XX +XXX,XX @@ int kvm_arm_vgic_probe(void) | 25 | --- a/hw/timer/imx_epit.c |
32 | int kvm_arch_fixup_msi_route(struct kvm_irq_routing_entry *route, | 26 | +++ b/hw/timer/imx_epit.c |
33 | uint64_t address, uint32_t data, PCIDevice *dev) | 27 | @@ -XXX,XX +XXX,XX @@ static const IMXClk imx_epit_clocks[] = { |
28 | */ | ||
29 | static void imx_epit_update_int(IMXEPITState *s) | ||
34 | { | 30 | { |
35 | - return 0; | 31 | - if (s->sr && (s->cr & CR_OCIEN) && (s->cr & CR_EN)) { |
36 | + AddressSpace *as = pci_device_iommu_address_space(dev); | 32 | + if ((s->sr & SR_OCIF) && (s->cr & CR_OCIEN) && (s->cr & CR_EN)) { |
37 | + hwaddr xlat, len, doorbell_gpa; | 33 | qemu_irq_raise(s->irq); |
38 | + MemoryRegionSection mrs; | 34 | } else { |
39 | + MemoryRegion *mr; | 35 | qemu_irq_lower(s->irq); |
40 | + int ret = 1; | 36 | @@ -XXX,XX +XXX,XX @@ static void imx_epit_write(void *opaque, hwaddr offset, uint64_t value, |
41 | + | 37 | break; |
42 | + if (as == &address_space_memory) { | 38 | |
43 | + return 0; | 39 | case 1: /* SR - ACK*/ |
44 | + } | 40 | - /* writing 1 to OCIF clears the OCIF bit */ |
45 | + | 41 | - if (value & 0x01) { |
46 | + /* MSI doorbell address is translated by an IOMMU */ | 42 | - s->sr = 0; |
47 | + | 43 | + /* writing 1 to SR.OCIF clears this bit and turns the interrupt off */ |
48 | + rcu_read_lock(); | 44 | + if (value & SR_OCIF) { |
49 | + mr = address_space_translate(as, address, &xlat, &len, true); | 45 | + s->sr = 0; /* SR.OCIF is the only bit in this register anyway */ |
50 | + if (!mr) { | 46 | imx_epit_update_int(s); |
51 | + goto unlock; | 47 | } |
52 | + } | 48 | break; |
53 | + mrs = memory_region_find(mr, xlat, 1); | 49 | @@ -XXX,XX +XXX,XX @@ static void imx_epit_cmp(void *opaque) |
54 | + if (!mrs.mr) { | 50 | IMXEPITState *s = IMX_EPIT(opaque); |
55 | + goto unlock; | 51 | |
56 | + } | 52 | DPRINTF("sr was %d\n", s->sr); |
57 | + | 53 | - |
58 | + doorbell_gpa = mrs.offset_within_address_space; | 54 | - s->sr = 1; |
59 | + memory_region_unref(mrs.mr); | 55 | + /* Set interrupt status bit SR.OCIF and update the interrupt state */ |
60 | + | 56 | + s->sr |= SR_OCIF; |
61 | + route->u.msi.address_lo = doorbell_gpa; | 57 | imx_epit_update_int(s); |
62 | + route->u.msi.address_hi = doorbell_gpa >> 32; | ||
63 | + | ||
64 | + trace_kvm_arm_fixup_msi_route(address, doorbell_gpa); | ||
65 | + | ||
66 | + ret = 0; | ||
67 | + | ||
68 | +unlock: | ||
69 | + rcu_read_unlock(); | ||
70 | + return ret; | ||
71 | } | 58 | } |
72 | 59 | ||
73 | int kvm_arch_add_msi_route_post(struct kvm_irq_routing_entry *route, | ||
74 | diff --git a/target/arm/trace-events b/target/arm/trace-events | ||
75 | index XXXXXXX..XXXXXXX 100644 | ||
76 | --- a/target/arm/trace-events | ||
77 | +++ b/target/arm/trace-events | ||
78 | @@ -XXX,XX +XXX,XX @@ arm_gt_tval_write(int timer, uint64_t value) "gt_tval_write: timer %d value 0x%" | ||
79 | arm_gt_ctl_write(int timer, uint64_t value) "gt_ctl_write: timer %d value 0x%" PRIx64 | ||
80 | arm_gt_imask_toggle(int timer, int irqstate) "gt_ctl_write: timer %d IMASK toggle, new irqstate %d" | ||
81 | arm_gt_cntvoff_write(uint64_t value) "gt_cntvoff_write: value 0x%" PRIx64 | ||
82 | + | ||
83 | +# target/arm/kvm.c | ||
84 | +kvm_arm_fixup_msi_route(uint64_t iova, uint64_t gpa) "MSI iova = 0x%"PRIx64" is translated into 0x%"PRIx64 | ||
85 | -- | 60 | -- |
86 | 2.17.0 | 61 | 2.25.1 |
87 | |||
88 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Axel Heider <axel.heider@hensoldt.net> | ||
1 | 2 | ||
3 | The interrupt state can change due to: | ||
4 | - reset clears both SR.OCIF and CR.OCIE | ||
5 | - write to CR.EN or CR.OCIE | ||
6 | |||
7 | Signed-off-by: Axel Heider <axel.heider@hensoldt.net> | ||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | --- | ||
11 | hw/timer/imx_epit.c | 16 ++++++++++++---- | ||
12 | 1 file changed, 12 insertions(+), 4 deletions(-) | ||
13 | |||
14 | diff --git a/hw/timer/imx_epit.c b/hw/timer/imx_epit.c | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/hw/timer/imx_epit.c | ||
17 | +++ b/hw/timer/imx_epit.c | ||
18 | @@ -XXX,XX +XXX,XX @@ static void imx_epit_write(void *opaque, hwaddr offset, uint64_t value, | ||
19 | if (s->cr & CR_SWR) { | ||
20 | /* handle the reset */ | ||
21 | imx_epit_reset(DEVICE(s)); | ||
22 | - /* | ||
23 | - * TODO: could we 'break' here? following operations appear | ||
24 | - * to duplicate the work imx_epit_reset() already did. | ||
25 | - */ | ||
26 | } | ||
27 | |||
28 | + /* | ||
29 | + * The interrupt state can change due to: | ||
30 | + * - reset clears both SR.OCIF and CR.OCIE | ||
31 | + * - write to CR.EN or CR.OCIE | ||
32 | + */ | ||
33 | + imx_epit_update_int(s); | ||
34 | + | ||
35 | + /* | ||
36 | + * TODO: could we 'break' here for reset? following operations appear | ||
37 | + * to duplicate the work imx_epit_reset() already did. | ||
38 | + */ | ||
39 | + | ||
40 | ptimer_transaction_begin(s->timer_cmp); | ||
41 | ptimer_transaction_begin(s->timer_reload); | ||
42 | |||
43 | -- | ||
44 | 2.25.1 | diff view generated by jsdifflib |
1 | From: Eric Auger <eric.auger@redhat.com> | 1 | From: Axel Heider <axel.heider@hensoldt.net> |
---|---|---|---|
2 | 2 | ||
3 | ARM virt machine now exposes a new "iommu" option. | 3 | Signed-off-by: Axel Heider <axel.heider@hensoldt.net> |
4 | The SMMUv3 IOMMU is instantiated using -machine virt,iommu=smmuv3. | ||
5 | |||
6 | Signed-off-by: Eric Auger <eric.auger@redhat.com> | ||
7 | Signed-off-by: Prem Mallappa <prem.mallappa@broadcom.com> | ||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 4 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
9 | Message-id: 1524665762-31355-15-git-send-email-eric.auger@redhat.com | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 6 | --- |
12 | hw/arm/virt.c | 36 ++++++++++++++++++++++++++++++++++++ | 7 | hw/timer/imx_epit.c | 20 ++++++++++++++------ |
13 | 1 file changed, 36 insertions(+) | 8 | 1 file changed, 14 insertions(+), 6 deletions(-) |
14 | 9 | ||
15 | diff --git a/hw/arm/virt.c b/hw/arm/virt.c | 10 | diff --git a/hw/timer/imx_epit.c b/hw/timer/imx_epit.c |
16 | index XXXXXXX..XXXXXXX 100644 | 11 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/hw/arm/virt.c | 12 | --- a/hw/timer/imx_epit.c |
18 | +++ b/hw/arm/virt.c | 13 | +++ b/hw/timer/imx_epit.c |
19 | @@ -XXX,XX +XXX,XX @@ static void virt_set_gic_version(Object *obj, const char *value, Error **errp) | 14 | @@ -XXX,XX +XXX,XX @@ static void imx_epit_set_freq(IMXEPITState *s) |
20 | } | 15 | /* |
16 | * This is called both on hardware (device) reset and software reset. | ||
17 | */ | ||
18 | -static void imx_epit_reset(DeviceState *dev) | ||
19 | +static void imx_epit_reset(IMXEPITState *s, bool is_hard_reset) | ||
20 | { | ||
21 | - IMXEPITState *s = IMX_EPIT(dev); | ||
22 | - | ||
23 | /* Soft reset doesn't touch some bits; hard reset clears them */ | ||
24 | - s->cr &= (CR_EN|CR_ENMOD|CR_STOPEN|CR_DOZEN|CR_WAITEN|CR_DBGEN); | ||
25 | + if (is_hard_reset) { | ||
26 | + s->cr = 0; | ||
27 | + } else { | ||
28 | + s->cr &= (CR_EN|CR_ENMOD|CR_STOPEN|CR_DOZEN|CR_WAITEN|CR_DBGEN); | ||
29 | + } | ||
30 | s->sr = 0; | ||
31 | s->lr = EPIT_TIMER_MAX; | ||
32 | s->cmp = 0; | ||
33 | @@ -XXX,XX +XXX,XX @@ static void imx_epit_write(void *opaque, hwaddr offset, uint64_t value, | ||
34 | s->cr = value & 0x03ffffff; | ||
35 | if (s->cr & CR_SWR) { | ||
36 | /* handle the reset */ | ||
37 | - imx_epit_reset(DEVICE(s)); | ||
38 | + imx_epit_reset(s, false); | ||
39 | } | ||
40 | |||
41 | /* | ||
42 | @@ -XXX,XX +XXX,XX @@ static void imx_epit_realize(DeviceState *dev, Error **errp) | ||
43 | s->timer_cmp = ptimer_init(imx_epit_cmp, s, PTIMER_POLICY_LEGACY); | ||
21 | } | 44 | } |
22 | 45 | ||
23 | +static char *virt_get_iommu(Object *obj, Error **errp) | 46 | +static void imx_epit_dev_reset(DeviceState *dev) |
24 | +{ | 47 | +{ |
25 | + VirtMachineState *vms = VIRT_MACHINE(obj); | 48 | + IMXEPITState *s = IMX_EPIT(dev); |
26 | + | 49 | + imx_epit_reset(s, true); |
27 | + switch (vms->iommu) { | ||
28 | + case VIRT_IOMMU_NONE: | ||
29 | + return g_strdup("none"); | ||
30 | + case VIRT_IOMMU_SMMUV3: | ||
31 | + return g_strdup("smmuv3"); | ||
32 | + default: | ||
33 | + g_assert_not_reached(); | ||
34 | + } | ||
35 | +} | 50 | +} |
36 | + | 51 | + |
37 | +static void virt_set_iommu(Object *obj, const char *value, Error **errp) | 52 | static void imx_epit_class_init(ObjectClass *klass, void *data) |
38 | +{ | ||
39 | + VirtMachineState *vms = VIRT_MACHINE(obj); | ||
40 | + | ||
41 | + if (!strcmp(value, "smmuv3")) { | ||
42 | + vms->iommu = VIRT_IOMMU_SMMUV3; | ||
43 | + } else if (!strcmp(value, "none")) { | ||
44 | + vms->iommu = VIRT_IOMMU_NONE; | ||
45 | + } else { | ||
46 | + error_setg(errp, "Invalid iommu value"); | ||
47 | + error_append_hint(errp, "Valid values are none, smmuv3.\n"); | ||
48 | + } | ||
49 | +} | ||
50 | + | ||
51 | static CpuInstanceProperties | ||
52 | virt_cpu_index_to_props(MachineState *ms, unsigned cpu_index) | ||
53 | { | 53 | { |
54 | @@ -XXX,XX +XXX,XX @@ static void virt_2_12_instance_init(Object *obj) | 54 | DeviceClass *dc = DEVICE_CLASS(klass); |
55 | NULL); | 55 | |
56 | } | 56 | dc->realize = imx_epit_realize; |
57 | 57 | - dc->reset = imx_epit_reset; | |
58 | + /* Default disallows iommu instantiation */ | 58 | + dc->reset = imx_epit_dev_reset; |
59 | + vms->iommu = VIRT_IOMMU_NONE; | 59 | dc->vmsd = &vmstate_imx_timer_epit; |
60 | + object_property_add_str(obj, "iommu", virt_get_iommu, virt_set_iommu, NULL); | 60 | dc->desc = "i.MX periodic timer"; |
61 | + object_property_set_description(obj, "iommu", | ||
62 | + "Set the IOMMU type. " | ||
63 | + "Valid values are none and smmuv3", | ||
64 | + NULL); | ||
65 | + | ||
66 | vms->memmap = a15memmap; | ||
67 | vms->irqmap = a15irqmap; | ||
68 | } | 61 | } |
69 | -- | 62 | -- |
70 | 2.17.0 | 63 | 2.25.1 |
71 | |||
72 | diff view generated by jsdifflib |
1 | From: Eric Auger <eric.auger@redhat.com> | 1 | From: Axel Heider <axel.heider@hensoldt.net> |
---|---|---|---|
2 | 2 | ||
3 | This patch implements the IOMMU Memory Region translate() | 3 | Signed-off-by: Axel Heider <axel.heider@hensoldt.net> |
4 | callback. Most of the code relates to the translation | ||
5 | configuration decoding and check (STE, CD). | ||
6 | |||
7 | Signed-off-by: Eric Auger <eric.auger@redhat.com> | ||
8 | Signed-off-by: Prem Mallappa <prem.mallappa@broadcom.com> | ||
9 | Message-id: 1524665762-31355-10-git-send-email-eric.auger@redhat.com | ||
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 4 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | --- | 6 | --- |
13 | hw/arm/smmuv3-internal.h | 160 +++++++++++++++++ | 7 | hw/timer/imx_epit.c | 215 ++++++++++++++++++++++++-------------------- |
14 | hw/arm/smmuv3.c | 358 +++++++++++++++++++++++++++++++++++++++ | 8 | 1 file changed, 117 insertions(+), 98 deletions(-) |
15 | hw/arm/trace-events | 9 + | ||
16 | 3 files changed, 527 insertions(+) | ||
17 | 9 | ||
18 | diff --git a/hw/arm/smmuv3-internal.h b/hw/arm/smmuv3-internal.h | 10 | diff --git a/hw/timer/imx_epit.c b/hw/timer/imx_epit.c |
19 | index XXXXXXX..XXXXXXX 100644 | 11 | index XXXXXXX..XXXXXXX 100644 |
20 | --- a/hw/arm/smmuv3-internal.h | 12 | --- a/hw/timer/imx_epit.c |
21 | +++ b/hw/arm/smmuv3-internal.h | 13 | +++ b/hw/timer/imx_epit.c |
22 | @@ -XXX,XX +XXX,XX @@ typedef struct SMMUEventInfo { | 14 | @@ -XXX,XX +XXX,XX @@ static void imx_epit_reload_compare_timer(IMXEPITState *s) |
23 | 15 | } | |
24 | void smmuv3_record_event(SMMUv3State *s, SMMUEventInfo *event); | ||
25 | |||
26 | +/* Configuration Data */ | ||
27 | + | ||
28 | +/* STE Level 1 Descriptor */ | ||
29 | +typedef struct STEDesc { | ||
30 | + uint32_t word[2]; | ||
31 | +} STEDesc; | ||
32 | + | ||
33 | +/* CD Level 1 Descriptor */ | ||
34 | +typedef struct CDDesc { | ||
35 | + uint32_t word[2]; | ||
36 | +} CDDesc; | ||
37 | + | ||
38 | +/* Stream Table Entry(STE) */ | ||
39 | +typedef struct STE { | ||
40 | + uint32_t word[16]; | ||
41 | +} STE; | ||
42 | + | ||
43 | +/* Context Descriptor(CD) */ | ||
44 | +typedef struct CD { | ||
45 | + uint32_t word[16]; | ||
46 | +} CD; | ||
47 | + | ||
48 | +/* STE fields */ | ||
49 | + | ||
50 | +#define STE_VALID(x) extract32((x)->word[0], 0, 1) | ||
51 | + | ||
52 | +#define STE_CONFIG(x) extract32((x)->word[0], 1, 3) | ||
53 | +#define STE_CFG_S1_ENABLED(config) (config & 0x1) | ||
54 | +#define STE_CFG_S2_ENABLED(config) (config & 0x2) | ||
55 | +#define STE_CFG_ABORT(config) (!(config & 0x4)) | ||
56 | +#define STE_CFG_BYPASS(config) (config == 0x4) | ||
57 | + | ||
58 | +#define STE_S1FMT(x) extract32((x)->word[0], 4 , 2) | ||
59 | +#define STE_S1CDMAX(x) extract32((x)->word[1], 27, 5) | ||
60 | +#define STE_S1STALLD(x) extract32((x)->word[2], 27, 1) | ||
61 | +#define STE_EATS(x) extract32((x)->word[2], 28, 2) | ||
62 | +#define STE_STRW(x) extract32((x)->word[2], 30, 2) | ||
63 | +#define STE_S2VMID(x) extract32((x)->word[4], 0 , 16) | ||
64 | +#define STE_S2T0SZ(x) extract32((x)->word[5], 0 , 6) | ||
65 | +#define STE_S2SL0(x) extract32((x)->word[5], 6 , 2) | ||
66 | +#define STE_S2TG(x) extract32((x)->word[5], 14, 2) | ||
67 | +#define STE_S2PS(x) extract32((x)->word[5], 16, 3) | ||
68 | +#define STE_S2AA64(x) extract32((x)->word[5], 19, 1) | ||
69 | +#define STE_S2HD(x) extract32((x)->word[5], 24, 1) | ||
70 | +#define STE_S2HA(x) extract32((x)->word[5], 25, 1) | ||
71 | +#define STE_S2S(x) extract32((x)->word[5], 26, 1) | ||
72 | +#define STE_CTXPTR(x) \ | ||
73 | + ({ \ | ||
74 | + unsigned long addr; \ | ||
75 | + addr = (uint64_t)extract32((x)->word[1], 0, 16) << 32; \ | ||
76 | + addr |= (uint64_t)((x)->word[0] & 0xffffffc0); \ | ||
77 | + addr; \ | ||
78 | + }) | ||
79 | + | ||
80 | +#define STE_S2TTB(x) \ | ||
81 | + ({ \ | ||
82 | + unsigned long addr; \ | ||
83 | + addr = (uint64_t)extract32((x)->word[7], 0, 16) << 32; \ | ||
84 | + addr |= (uint64_t)((x)->word[6] & 0xfffffff0); \ | ||
85 | + addr; \ | ||
86 | + }) | ||
87 | + | ||
88 | +static inline int oas2bits(int oas_field) | ||
89 | +{ | ||
90 | + switch (oas_field) { | ||
91 | + case 0: | ||
92 | + return 32; | ||
93 | + case 1: | ||
94 | + return 36; | ||
95 | + case 2: | ||
96 | + return 40; | ||
97 | + case 3: | ||
98 | + return 42; | ||
99 | + case 4: | ||
100 | + return 44; | ||
101 | + case 5: | ||
102 | + return 48; | ||
103 | + } | ||
104 | + return -1; | ||
105 | +} | ||
106 | + | ||
107 | +static inline int pa_range(STE *ste) | ||
108 | +{ | ||
109 | + int oas_field = MIN(STE_S2PS(ste), SMMU_IDR5_OAS); | ||
110 | + | ||
111 | + if (!STE_S2AA64(ste)) { | ||
112 | + return 40; | ||
113 | + } | ||
114 | + | ||
115 | + return oas2bits(oas_field); | ||
116 | +} | ||
117 | + | ||
118 | +#define MAX_PA(ste) ((1 << pa_range(ste)) - 1) | ||
119 | + | ||
120 | +/* CD fields */ | ||
121 | + | ||
122 | +#define CD_VALID(x) extract32((x)->word[0], 30, 1) | ||
123 | +#define CD_ASID(x) extract32((x)->word[1], 16, 16) | ||
124 | +#define CD_TTB(x, sel) \ | ||
125 | + ({ \ | ||
126 | + uint64_t hi, lo; \ | ||
127 | + hi = extract32((x)->word[(sel) * 2 + 3], 0, 19); \ | ||
128 | + hi <<= 32; \ | ||
129 | + lo = (x)->word[(sel) * 2 + 2] & ~0xfULL; \ | ||
130 | + hi | lo; \ | ||
131 | + }) | ||
132 | + | ||
133 | +#define CD_TSZ(x, sel) extract32((x)->word[0], (16 * (sel)) + 0, 6) | ||
134 | +#define CD_TG(x, sel) extract32((x)->word[0], (16 * (sel)) + 6, 2) | ||
135 | +#define CD_EPD(x, sel) extract32((x)->word[0], (16 * (sel)) + 14, 1) | ||
136 | +#define CD_ENDI(x) extract32((x)->word[0], 15, 1) | ||
137 | +#define CD_IPS(x) extract32((x)->word[1], 0 , 3) | ||
138 | +#define CD_TBI(x) extract32((x)->word[1], 6 , 2) | ||
139 | +#define CD_HD(x) extract32((x)->word[1], 10 , 1) | ||
140 | +#define CD_HA(x) extract32((x)->word[1], 11 , 1) | ||
141 | +#define CD_S(x) extract32((x)->word[1], 12, 1) | ||
142 | +#define CD_R(x) extract32((x)->word[1], 13, 1) | ||
143 | +#define CD_A(x) extract32((x)->word[1], 14, 1) | ||
144 | +#define CD_AARCH64(x) extract32((x)->word[1], 9 , 1) | ||
145 | + | ||
146 | +#define CDM_VALID(x) ((x)->word[0] & 0x1) | ||
147 | + | ||
148 | +static inline int is_cd_valid(SMMUv3State *s, STE *ste, CD *cd) | ||
149 | +{ | ||
150 | + return CD_VALID(cd); | ||
151 | +} | ||
152 | + | ||
153 | +/** | ||
154 | + * tg2granule - Decodes the CD translation granule size field according | ||
155 | + * to the ttbr in use | ||
156 | + * @bits: TG0/1 fields | ||
157 | + * @ttbr: ttbr index in use | ||
158 | + */ | ||
159 | +static inline int tg2granule(int bits, int ttbr) | ||
160 | +{ | ||
161 | + switch (bits) { | ||
162 | + case 0: | ||
163 | + return ttbr ? 0 : 12; | ||
164 | + case 1: | ||
165 | + return ttbr ? 14 : 16; | ||
166 | + case 2: | ||
167 | + return ttbr ? 12 : 14; | ||
168 | + case 3: | ||
169 | + return ttbr ? 16 : 0; | ||
170 | + default: | ||
171 | + return 0; | ||
172 | + } | ||
173 | +} | ||
174 | + | ||
175 | +static inline uint64_t l1std_l2ptr(STEDesc *desc) | ||
176 | +{ | ||
177 | + uint64_t hi, lo; | ||
178 | + | ||
179 | + hi = desc->word[1]; | ||
180 | + lo = desc->word[0] & ~0x1fULL; | ||
181 | + return hi << 32 | lo; | ||
182 | +} | ||
183 | + | ||
184 | +#define L1STD_SPAN(stm) (extract32((stm)->word[0], 0, 4)) | ||
185 | + | ||
186 | #endif | ||
187 | diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c | ||
188 | index XXXXXXX..XXXXXXX 100644 | ||
189 | --- a/hw/arm/smmuv3.c | ||
190 | +++ b/hw/arm/smmuv3.c | ||
191 | @@ -XXX,XX +XXX,XX @@ static void smmuv3_init_regs(SMMUv3State *s) | ||
192 | s->sid_split = 0; | ||
193 | } | 16 | } |
194 | 17 | ||
195 | +static int smmu_get_ste(SMMUv3State *s, dma_addr_t addr, STE *buf, | 18 | +static void imx_epit_write_cr(IMXEPITState *s, uint32_t value) |
196 | + SMMUEventInfo *event) | 19 | +{ |
197 | +{ | 20 | + uint32_t oldcr = s->cr; |
198 | + int ret; | 21 | + |
199 | + | 22 | + s->cr = value & 0x03ffffff; |
200 | + trace_smmuv3_get_ste(addr); | 23 | + |
201 | + /* TODO: guarantee 64-bit single-copy atomicity */ | 24 | + if (s->cr & CR_SWR) { |
202 | + ret = dma_memory_read(&address_space_memory, addr, | 25 | + /* handle the reset */ |
203 | + (void *)buf, sizeof(*buf)); | 26 | + imx_epit_reset(s, false); |
204 | + if (ret != MEMTX_OK) { | 27 | + } |
205 | + qemu_log_mask(LOG_GUEST_ERROR, | 28 | + |
206 | + "Cannot fetch pte at address=0x%"PRIx64"\n", addr); | 29 | + /* |
207 | + event->type = SMMU_EVT_F_STE_FETCH; | 30 | + * The interrupt state can change due to: |
208 | + event->u.f_ste_fetch.addr = addr; | 31 | + * - reset clears both SR.OCIF and CR.OCIE |
209 | + return -EINVAL; | 32 | + * - write to CR.EN or CR.OCIE |
210 | + } | 33 | + */ |
211 | + return 0; | 34 | + imx_epit_update_int(s); |
212 | + | 35 | + |
213 | +} | 36 | + /* |
214 | + | 37 | + * TODO: could we 'break' here for reset? following operations appear |
215 | +/* @ssid > 0 not supported yet */ | 38 | + * to duplicate the work imx_epit_reset() already did. |
216 | +static int smmu_get_cd(SMMUv3State *s, STE *ste, uint32_t ssid, | 39 | + */ |
217 | + CD *buf, SMMUEventInfo *event) | 40 | + |
218 | +{ | 41 | + ptimer_transaction_begin(s->timer_cmp); |
219 | + dma_addr_t addr = STE_CTXPTR(ste); | 42 | + ptimer_transaction_begin(s->timer_reload); |
220 | + int ret; | 43 | + |
221 | + | 44 | + /* Update the frequency. Has been done already in case of a reset. */ |
222 | + trace_smmuv3_get_cd(addr); | 45 | + if (!(s->cr & CR_SWR)) { |
223 | + /* TODO: guarantee 64-bit single-copy atomicity */ | 46 | + imx_epit_set_freq(s); |
224 | + ret = dma_memory_read(&address_space_memory, addr, | 47 | + } |
225 | + (void *)buf, sizeof(*buf)); | 48 | + |
226 | + if (ret != MEMTX_OK) { | 49 | + if (s->freq && (s->cr & CR_EN) && !(oldcr & CR_EN)) { |
227 | + qemu_log_mask(LOG_GUEST_ERROR, | 50 | + if (s->cr & CR_ENMOD) { |
228 | + "Cannot fetch pte at address=0x%"PRIx64"\n", addr); | 51 | + if (s->cr & CR_RLD) { |
229 | + event->type = SMMU_EVT_F_CD_FETCH; | 52 | + ptimer_set_limit(s->timer_reload, s->lr, 1); |
230 | + event->u.f_ste_fetch.addr = addr; | 53 | + ptimer_set_limit(s->timer_cmp, s->lr, 1); |
231 | + return -EINVAL; | 54 | + } else { |
232 | + } | 55 | + ptimer_set_limit(s->timer_reload, EPIT_TIMER_MAX, 1); |
233 | + return 0; | 56 | + ptimer_set_limit(s->timer_cmp, EPIT_TIMER_MAX, 1); |
234 | +} | 57 | + } |
235 | + | ||
236 | +/* Returns <0 if the caller has no need to continue the translation */ | ||
237 | +static int decode_ste(SMMUv3State *s, SMMUTransCfg *cfg, | ||
238 | + STE *ste, SMMUEventInfo *event) | ||
239 | +{ | ||
240 | + uint32_t config; | ||
241 | + int ret = -EINVAL; | ||
242 | + | ||
243 | + if (!STE_VALID(ste)) { | ||
244 | + goto bad_ste; | ||
245 | + } | ||
246 | + | ||
247 | + config = STE_CONFIG(ste); | ||
248 | + | ||
249 | + if (STE_CFG_ABORT(config)) { | ||
250 | + cfg->aborted = true; /* abort but don't record any event */ | ||
251 | + return ret; | ||
252 | + } | ||
253 | + | ||
254 | + if (STE_CFG_BYPASS(config)) { | ||
255 | + cfg->bypassed = true; | ||
256 | + return ret; | ||
257 | + } | ||
258 | + | ||
259 | + if (STE_CFG_S2_ENABLED(config)) { | ||
260 | + qemu_log_mask(LOG_UNIMP, "SMMUv3 does not support stage 2 yet\n"); | ||
261 | + goto bad_ste; | ||
262 | + } | ||
263 | + | ||
264 | + if (STE_S1CDMAX(ste) != 0) { | ||
265 | + qemu_log_mask(LOG_UNIMP, | ||
266 | + "SMMUv3 does not support multiple context descriptors yet\n"); | ||
267 | + goto bad_ste; | ||
268 | + } | ||
269 | + | ||
270 | + if (STE_S1STALLD(ste)) { | ||
271 | + qemu_log_mask(LOG_UNIMP, | ||
272 | + "SMMUv3 S1 stalling fault model not allowed yet\n"); | ||
273 | + goto bad_ste; | ||
274 | + } | ||
275 | + return 0; | ||
276 | + | ||
277 | +bad_ste: | ||
278 | + event->type = SMMU_EVT_C_BAD_STE; | ||
279 | + return -EINVAL; | ||
280 | +} | ||
281 | + | ||
282 | +/** | ||
283 | + * smmu_find_ste - Return the stream table entry associated | ||
284 | + * to the sid | ||
285 | + * | ||
286 | + * @s: smmuv3 handle | ||
287 | + * @sid: stream ID | ||
288 | + * @ste: returned stream table entry | ||
289 | + * @event: handle to an event info | ||
290 | + * | ||
291 | + * Supports linear and 2-level stream table | ||
292 | + * Return 0 on success, -EINVAL otherwise | ||
293 | + */ | ||
294 | +static int smmu_find_ste(SMMUv3State *s, uint32_t sid, STE *ste, | ||
295 | + SMMUEventInfo *event) | ||
296 | +{ | ||
297 | + dma_addr_t addr; | ||
298 | + int ret; | ||
299 | + | ||
300 | + trace_smmuv3_find_ste(sid, s->features, s->sid_split); | ||
301 | + /* Check SID range */ | ||
302 | + if (sid > (1 << SMMU_IDR1_SIDSIZE)) { | ||
303 | + event->type = SMMU_EVT_C_BAD_STREAMID; | ||
304 | + return -EINVAL; | ||
305 | + } | ||
306 | + if (s->features & SMMU_FEATURE_2LVL_STE) { | ||
307 | + int l1_ste_offset, l2_ste_offset, max_l2_ste, span; | ||
308 | + dma_addr_t strtab_base, l1ptr, l2ptr; | ||
309 | + STEDesc l1std; | ||
310 | + | ||
311 | + strtab_base = s->strtab_base & SMMU_BASE_ADDR_MASK; | ||
312 | + l1_ste_offset = sid >> s->sid_split; | ||
313 | + l2_ste_offset = sid & ((1 << s->sid_split) - 1); | ||
314 | + l1ptr = (dma_addr_t)(strtab_base + l1_ste_offset * sizeof(l1std)); | ||
315 | + /* TODO: guarantee 64-bit single-copy atomicity */ | ||
316 | + ret = dma_memory_read(&address_space_memory, l1ptr, | ||
317 | + (uint8_t *)&l1std, sizeof(l1std)); | ||
318 | + if (ret != MEMTX_OK) { | ||
319 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
320 | + "Could not read L1PTR at 0X%"PRIx64"\n", l1ptr); | ||
321 | + event->type = SMMU_EVT_F_STE_FETCH; | ||
322 | + event->u.f_ste_fetch.addr = l1ptr; | ||
323 | + return -EINVAL; | ||
324 | + } | 58 | + } |
325 | + | 59 | + |
326 | + span = L1STD_SPAN(&l1std); | 60 | + imx_epit_reload_compare_timer(s); |
327 | + | 61 | + ptimer_run(s->timer_reload, 0); |
328 | + if (!span) { | 62 | + if (s->cr & CR_OCIEN) { |
329 | + /* l2ptr is not valid */ | 63 | + ptimer_run(s->timer_cmp, 0); |
330 | + qemu_log_mask(LOG_GUEST_ERROR, | 64 | + } else { |
331 | + "invalid sid=%d (L1STD span=0)\n", sid); | 65 | + ptimer_stop(s->timer_cmp); |
332 | + event->type = SMMU_EVT_C_BAD_STREAMID; | ||
333 | + return -EINVAL; | ||
334 | + } | 66 | + } |
335 | + max_l2_ste = (1 << span) - 1; | 67 | + } else if (!(s->cr & CR_EN)) { |
336 | + l2ptr = l1std_l2ptr(&l1std); | 68 | + /* stop both timers */ |
337 | + trace_smmuv3_find_ste_2lvl(s->strtab_base, l1ptr, l1_ste_offset, | 69 | + ptimer_stop(s->timer_reload); |
338 | + l2ptr, l2_ste_offset, max_l2_ste); | 70 | + ptimer_stop(s->timer_cmp); |
339 | + if (l2_ste_offset > max_l2_ste) { | 71 | + } else if (s->cr & CR_OCIEN) { |
340 | + qemu_log_mask(LOG_GUEST_ERROR, | 72 | + if (!(oldcr & CR_OCIEN)) { |
341 | + "l2_ste_offset=%d > max_l2_ste=%d\n", | 73 | + imx_epit_reload_compare_timer(s); |
342 | + l2_ste_offset, max_l2_ste); | 74 | + ptimer_run(s->timer_cmp, 0); |
343 | + event->type = SMMU_EVT_C_BAD_STE; | ||
344 | + return -EINVAL; | ||
345 | + } | 75 | + } |
346 | + addr = l2ptr + l2_ste_offset * sizeof(*ste); | ||
347 | + } else { | 76 | + } else { |
348 | + addr = s->strtab_base + sid * sizeof(*ste); | 77 | + ptimer_stop(s->timer_cmp); |
349 | + } | 78 | + } |
350 | + | 79 | + |
351 | + if (smmu_get_ste(s, addr, ste, event)) { | 80 | + ptimer_transaction_commit(s->timer_cmp); |
352 | + return -EINVAL; | 81 | + ptimer_transaction_commit(s->timer_reload); |
353 | + } | 82 | +} |
354 | + | 83 | + |
355 | + return 0; | 84 | +static void imx_epit_write_sr(IMXEPITState *s, uint32_t value) |
356 | +} | 85 | +{ |
357 | + | 86 | + /* writing 1 to SR.OCIF clears this bit and turns the interrupt off */ |
358 | +static int decode_cd(SMMUTransCfg *cfg, CD *cd, SMMUEventInfo *event) | 87 | + if (value & SR_OCIF) { |
359 | +{ | 88 | + s->sr = 0; /* SR.OCIF is the only bit in this register anyway */ |
360 | + int ret = -EINVAL; | 89 | + imx_epit_update_int(s); |
361 | + int i; | 90 | + } |
362 | + | 91 | +} |
363 | + if (!CD_VALID(cd) || !CD_AARCH64(cd)) { | 92 | + |
364 | + goto bad_cd; | 93 | +static void imx_epit_write_lr(IMXEPITState *s, uint32_t value) |
365 | + } | 94 | +{ |
366 | + if (!CD_A(cd)) { | 95 | + s->lr = value; |
367 | + goto bad_cd; /* SMMU_IDR0.TERM_MODEL == 1 */ | 96 | + |
368 | + } | 97 | + ptimer_transaction_begin(s->timer_cmp); |
369 | + if (CD_S(cd)) { | 98 | + ptimer_transaction_begin(s->timer_reload); |
370 | + goto bad_cd; /* !STE_SECURE && SMMU_IDR0.STALL_MODEL == 1 */ | 99 | + if (s->cr & CR_RLD) { |
371 | + } | 100 | + /* Also set the limit if the LRD bit is set */ |
372 | + if (CD_HA(cd) || CD_HD(cd)) { | 101 | + /* If IOVW bit is set then set the timer value */ |
373 | + goto bad_cd; /* HTTU = 0 */ | 102 | + ptimer_set_limit(s->timer_reload, s->lr, s->cr & CR_IOVW); |
374 | + } | 103 | + ptimer_set_limit(s->timer_cmp, s->lr, 0); |
375 | + | 104 | + } else if (s->cr & CR_IOVW) { |
376 | + /* we support only those at the moment */ | 105 | + /* If IOVW bit is set then set the timer value */ |
377 | + cfg->aa64 = true; | 106 | + ptimer_set_count(s->timer_reload, s->lr); |
378 | + cfg->stage = 1; | 107 | + } |
379 | + | 108 | + /* |
380 | + cfg->oas = oas2bits(CD_IPS(cd)); | 109 | + * Commit the change to s->timer_reload, so it can propagate. Otherwise |
381 | + cfg->oas = MIN(oas2bits(SMMU_IDR5_OAS), cfg->oas); | 110 | + * the timer interrupt may not fire properly. The commit must happen |
382 | + cfg->tbi = CD_TBI(cd); | 111 | + * before calling imx_epit_reload_compare_timer(), which reads |
383 | + cfg->asid = CD_ASID(cd); | 112 | + * s->timer_reload internally again. |
384 | + | 113 | + */ |
385 | + trace_smmuv3_decode_cd(cfg->oas); | 114 | + ptimer_transaction_commit(s->timer_reload); |
386 | + | 115 | + imx_epit_reload_compare_timer(s); |
387 | + /* decode data dependent on TT */ | 116 | + ptimer_transaction_commit(s->timer_cmp); |
388 | + for (i = 0; i <= 1; i++) { | 117 | +} |
389 | + int tg, tsz; | 118 | + |
390 | + SMMUTransTableInfo *tt = &cfg->tt[i]; | 119 | +static void imx_epit_write_cmp(IMXEPITState *s, uint32_t value) |
391 | + | 120 | +{ |
392 | + cfg->tt[i].disabled = CD_EPD(cd, i); | 121 | + s->cmp = value; |
393 | + if (cfg->tt[i].disabled) { | 122 | + |
394 | + continue; | 123 | + ptimer_transaction_begin(s->timer_cmp); |
395 | + } | 124 | + imx_epit_reload_compare_timer(s); |
396 | + | 125 | + ptimer_transaction_commit(s->timer_cmp); |
397 | + tsz = CD_TSZ(cd, i); | 126 | +} |
398 | + if (tsz < 16 || tsz > 39) { | 127 | + |
399 | + goto bad_cd; | 128 | static void imx_epit_write(void *opaque, hwaddr offset, uint64_t value, |
400 | + } | 129 | unsigned size) |
401 | + | ||
402 | + tg = CD_TG(cd, i); | ||
403 | + tt->granule_sz = tg2granule(tg, i); | ||
404 | + if ((tt->granule_sz != 12 && tt->granule_sz != 16) || CD_ENDI(cd)) { | ||
405 | + goto bad_cd; | ||
406 | + } | ||
407 | + | ||
408 | + tt->tsz = tsz; | ||
409 | + tt->ttb = CD_TTB(cd, i); | ||
410 | + if (tt->ttb & ~(MAKE_64BIT_MASK(0, cfg->oas))) { | ||
411 | + goto bad_cd; | ||
412 | + } | ||
413 | + trace_smmuv3_decode_cd_tt(i, tt->tsz, tt->ttb, tt->granule_sz); | ||
414 | + } | ||
415 | + | ||
416 | + event->record_trans_faults = CD_R(cd); | ||
417 | + | ||
418 | + return 0; | ||
419 | + | ||
420 | +bad_cd: | ||
421 | + event->type = SMMU_EVT_C_BAD_CD; | ||
422 | + return ret; | ||
423 | +} | ||
424 | + | ||
425 | +/** | ||
426 | + * smmuv3_decode_config - Prepare the translation configuration | ||
427 | + * for the @mr iommu region | ||
428 | + * @mr: iommu memory region the translation config must be prepared for | ||
429 | + * @cfg: output translation configuration which is populated through | ||
430 | + * the different configuration decoding steps | ||
431 | + * @event: must be zero'ed by the caller | ||
432 | + * | ||
433 | + * return < 0 if the translation needs to be aborted (@event is filled | ||
434 | + * accordingly). Return 0 otherwise. | ||
435 | + */ | ||
436 | +static int smmuv3_decode_config(IOMMUMemoryRegion *mr, SMMUTransCfg *cfg, | ||
437 | + SMMUEventInfo *event) | ||
438 | +{ | ||
439 | + SMMUDevice *sdev = container_of(mr, SMMUDevice, iommu); | ||
440 | + uint32_t sid = smmu_get_sid(sdev); | ||
441 | + SMMUv3State *s = sdev->smmu; | ||
442 | + int ret = -EINVAL; | ||
443 | + STE ste; | ||
444 | + CD cd; | ||
445 | + | ||
446 | + if (smmu_find_ste(s, sid, &ste, event)) { | ||
447 | + return ret; | ||
448 | + } | ||
449 | + | ||
450 | + if (decode_ste(s, cfg, &ste, event)) { | ||
451 | + return ret; | ||
452 | + } | ||
453 | + | ||
454 | + if (smmu_get_cd(s, &ste, 0 /* ssid */, &cd, event)) { | ||
455 | + return ret; | ||
456 | + } | ||
457 | + | ||
458 | + return decode_cd(cfg, &cd, event); | ||
459 | +} | ||
460 | + | ||
461 | +static IOMMUTLBEntry smmuv3_translate(IOMMUMemoryRegion *mr, hwaddr addr, | ||
462 | + IOMMUAccessFlags flag) | ||
463 | +{ | ||
464 | + SMMUDevice *sdev = container_of(mr, SMMUDevice, iommu); | ||
465 | + SMMUv3State *s = sdev->smmu; | ||
466 | + uint32_t sid = smmu_get_sid(sdev); | ||
467 | + SMMUEventInfo event = {.type = SMMU_EVT_OK, .sid = sid}; | ||
468 | + SMMUPTWEventInfo ptw_info = {}; | ||
469 | + SMMUTransCfg cfg = {}; | ||
470 | + IOMMUTLBEntry entry = { | ||
471 | + .target_as = &address_space_memory, | ||
472 | + .iova = addr, | ||
473 | + .translated_addr = addr, | ||
474 | + .addr_mask = ~(hwaddr)0, | ||
475 | + .perm = IOMMU_NONE, | ||
476 | + }; | ||
477 | + int ret = 0; | ||
478 | + | ||
479 | + if (!smmu_enabled(s)) { | ||
480 | + goto out; | ||
481 | + } | ||
482 | + | ||
483 | + ret = smmuv3_decode_config(mr, &cfg, &event); | ||
484 | + if (ret) { | ||
485 | + goto out; | ||
486 | + } | ||
487 | + | ||
488 | + if (cfg.aborted) { | ||
489 | + goto out; | ||
490 | + } | ||
491 | + | ||
492 | + ret = smmu_ptw(&cfg, addr, flag, &entry, &ptw_info); | ||
493 | + if (ret) { | ||
494 | + switch (ptw_info.type) { | ||
495 | + case SMMU_PTW_ERR_WALK_EABT: | ||
496 | + event.type = SMMU_EVT_F_WALK_EABT; | ||
497 | + event.u.f_walk_eabt.addr = addr; | ||
498 | + event.u.f_walk_eabt.rnw = flag & 0x1; | ||
499 | + event.u.f_walk_eabt.class = 0x1; | ||
500 | + event.u.f_walk_eabt.addr2 = ptw_info.addr; | ||
501 | + break; | ||
502 | + case SMMU_PTW_ERR_TRANSLATION: | ||
503 | + if (event.record_trans_faults) { | ||
504 | + event.type = SMMU_EVT_F_TRANSLATION; | ||
505 | + event.u.f_translation.addr = addr; | ||
506 | + event.u.f_translation.rnw = flag & 0x1; | ||
507 | + } | ||
508 | + break; | ||
509 | + case SMMU_PTW_ERR_ADDR_SIZE: | ||
510 | + if (event.record_trans_faults) { | ||
511 | + event.type = SMMU_EVT_F_ADDR_SIZE; | ||
512 | + event.u.f_addr_size.addr = addr; | ||
513 | + event.u.f_addr_size.rnw = flag & 0x1; | ||
514 | + } | ||
515 | + break; | ||
516 | + case SMMU_PTW_ERR_ACCESS: | ||
517 | + if (event.record_trans_faults) { | ||
518 | + event.type = SMMU_EVT_F_ACCESS; | ||
519 | + event.u.f_access.addr = addr; | ||
520 | + event.u.f_access.rnw = flag & 0x1; | ||
521 | + } | ||
522 | + break; | ||
523 | + case SMMU_PTW_ERR_PERMISSION: | ||
524 | + if (event.record_trans_faults) { | ||
525 | + event.type = SMMU_EVT_F_PERMISSION; | ||
526 | + event.u.f_permission.addr = addr; | ||
527 | + event.u.f_permission.rnw = flag & 0x1; | ||
528 | + } | ||
529 | + break; | ||
530 | + default: | ||
531 | + g_assert_not_reached(); | ||
532 | + } | ||
533 | + } | ||
534 | +out: | ||
535 | + if (ret) { | ||
536 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
537 | + "%s translation failed for iova=0x%"PRIx64"(%d)\n", | ||
538 | + mr->parent_obj.name, addr, ret); | ||
539 | + entry.perm = IOMMU_NONE; | ||
540 | + smmuv3_record_event(s, &event); | ||
541 | + } else if (!cfg.aborted) { | ||
542 | + entry.perm = flag; | ||
543 | + trace_smmuv3_translate(mr->parent_obj.name, sid, addr, | ||
544 | + entry.translated_addr, entry.perm); | ||
545 | + } | ||
546 | + | ||
547 | + return entry; | ||
548 | +} | ||
549 | + | ||
550 | static int smmuv3_cmdq_consume(SMMUv3State *s) | ||
551 | { | 130 | { |
552 | SMMUCmdError cmd_error = SMMU_CERROR_NONE; | 131 | IMXEPITState *s = IMX_EPIT(opaque); |
553 | @@ -XXX,XX +XXX,XX @@ static void smmuv3_class_init(ObjectClass *klass, void *data) | 132 | - uint64_t oldcr; |
554 | static void smmuv3_iommu_memory_region_class_init(ObjectClass *klass, | 133 | |
555 | void *data) | 134 | DPRINTF("(%s, value = 0x%08x)\n", imx_epit_reg_name(offset >> 2), |
135 | (uint32_t)value); | ||
136 | |||
137 | switch (offset >> 2) { | ||
138 | case 0: /* CR */ | ||
139 | - | ||
140 | - oldcr = s->cr; | ||
141 | - s->cr = value & 0x03ffffff; | ||
142 | - if (s->cr & CR_SWR) { | ||
143 | - /* handle the reset */ | ||
144 | - imx_epit_reset(s, false); | ||
145 | - } | ||
146 | - | ||
147 | - /* | ||
148 | - * The interrupt state can change due to: | ||
149 | - * - reset clears both SR.OCIF and CR.OCIE | ||
150 | - * - write to CR.EN or CR.OCIE | ||
151 | - */ | ||
152 | - imx_epit_update_int(s); | ||
153 | - | ||
154 | - /* | ||
155 | - * TODO: could we 'break' here for reset? following operations appear | ||
156 | - * to duplicate the work imx_epit_reset() already did. | ||
157 | - */ | ||
158 | - | ||
159 | - ptimer_transaction_begin(s->timer_cmp); | ||
160 | - ptimer_transaction_begin(s->timer_reload); | ||
161 | - | ||
162 | - /* Update the frequency. Has been done already in case of a reset. */ | ||
163 | - if (!(s->cr & CR_SWR)) { | ||
164 | - imx_epit_set_freq(s); | ||
165 | - } | ||
166 | - | ||
167 | - if (s->freq && (s->cr & CR_EN) && !(oldcr & CR_EN)) { | ||
168 | - if (s->cr & CR_ENMOD) { | ||
169 | - if (s->cr & CR_RLD) { | ||
170 | - ptimer_set_limit(s->timer_reload, s->lr, 1); | ||
171 | - ptimer_set_limit(s->timer_cmp, s->lr, 1); | ||
172 | - } else { | ||
173 | - ptimer_set_limit(s->timer_reload, EPIT_TIMER_MAX, 1); | ||
174 | - ptimer_set_limit(s->timer_cmp, EPIT_TIMER_MAX, 1); | ||
175 | - } | ||
176 | - } | ||
177 | - | ||
178 | - imx_epit_reload_compare_timer(s); | ||
179 | - ptimer_run(s->timer_reload, 0); | ||
180 | - if (s->cr & CR_OCIEN) { | ||
181 | - ptimer_run(s->timer_cmp, 0); | ||
182 | - } else { | ||
183 | - ptimer_stop(s->timer_cmp); | ||
184 | - } | ||
185 | - } else if (!(s->cr & CR_EN)) { | ||
186 | - /* stop both timers */ | ||
187 | - ptimer_stop(s->timer_reload); | ||
188 | - ptimer_stop(s->timer_cmp); | ||
189 | - } else if (s->cr & CR_OCIEN) { | ||
190 | - if (!(oldcr & CR_OCIEN)) { | ||
191 | - imx_epit_reload_compare_timer(s); | ||
192 | - ptimer_run(s->timer_cmp, 0); | ||
193 | - } | ||
194 | - } else { | ||
195 | - ptimer_stop(s->timer_cmp); | ||
196 | - } | ||
197 | - | ||
198 | - ptimer_transaction_commit(s->timer_cmp); | ||
199 | - ptimer_transaction_commit(s->timer_reload); | ||
200 | + imx_epit_write_cr(s, (uint32_t)value); | ||
201 | break; | ||
202 | |||
203 | - case 1: /* SR - ACK*/ | ||
204 | - /* writing 1 to SR.OCIF clears this bit and turns the interrupt off */ | ||
205 | - if (value & SR_OCIF) { | ||
206 | - s->sr = 0; /* SR.OCIF is the only bit in this register anyway */ | ||
207 | - imx_epit_update_int(s); | ||
208 | - } | ||
209 | + case 1: /* SR */ | ||
210 | + imx_epit_write_sr(s, (uint32_t)value); | ||
211 | break; | ||
212 | |||
213 | - case 2: /* LR - set ticks */ | ||
214 | - s->lr = value; | ||
215 | - | ||
216 | - ptimer_transaction_begin(s->timer_cmp); | ||
217 | - ptimer_transaction_begin(s->timer_reload); | ||
218 | - if (s->cr & CR_RLD) { | ||
219 | - /* Also set the limit if the LRD bit is set */ | ||
220 | - /* If IOVW bit is set then set the timer value */ | ||
221 | - ptimer_set_limit(s->timer_reload, s->lr, s->cr & CR_IOVW); | ||
222 | - ptimer_set_limit(s->timer_cmp, s->lr, 0); | ||
223 | - } else if (s->cr & CR_IOVW) { | ||
224 | - /* If IOVW bit is set then set the timer value */ | ||
225 | - ptimer_set_count(s->timer_reload, s->lr); | ||
226 | - } | ||
227 | - /* | ||
228 | - * Commit the change to s->timer_reload, so it can propagate. Otherwise | ||
229 | - * the timer interrupt may not fire properly. The commit must happen | ||
230 | - * before calling imx_epit_reload_compare_timer(), which reads | ||
231 | - * s->timer_reload internally again. | ||
232 | - */ | ||
233 | - ptimer_transaction_commit(s->timer_reload); | ||
234 | - imx_epit_reload_compare_timer(s); | ||
235 | - ptimer_transaction_commit(s->timer_cmp); | ||
236 | + case 2: /* LR */ | ||
237 | + imx_epit_write_lr(s, (uint32_t)value); | ||
238 | break; | ||
239 | |||
240 | case 3: /* CMP */ | ||
241 | - s->cmp = value; | ||
242 | - | ||
243 | - ptimer_transaction_begin(s->timer_cmp); | ||
244 | - imx_epit_reload_compare_timer(s); | ||
245 | - ptimer_transaction_commit(s->timer_cmp); | ||
246 | - | ||
247 | + imx_epit_write_cmp(s, (uint32_t)value); | ||
248 | break; | ||
249 | |||
250 | default: | ||
251 | qemu_log_mask(LOG_GUEST_ERROR, "[%s]%s: Bad register at offset 0x%" | ||
252 | HWADDR_PRIx "\n", TYPE_IMX_EPIT, __func__, offset); | ||
253 | - | ||
254 | break; | ||
255 | } | ||
256 | } | ||
257 | + | ||
258 | static void imx_epit_cmp(void *opaque) | ||
556 | { | 259 | { |
557 | + IOMMUMemoryRegionClass *imrc = IOMMU_MEMORY_REGION_CLASS(klass); | 260 | IMXEPITState *s = IMX_EPIT(opaque); |
558 | + | ||
559 | + imrc->translate = smmuv3_translate; | ||
560 | } | ||
561 | |||
562 | static const TypeInfo smmuv3_type_info = { | ||
563 | diff --git a/hw/arm/trace-events b/hw/arm/trace-events | ||
564 | index XXXXXXX..XXXXXXX 100644 | ||
565 | --- a/hw/arm/trace-events | ||
566 | +++ b/hw/arm/trace-events | ||
567 | @@ -XXX,XX +XXX,XX @@ smmuv3_write_mmio_idr(uint64_t addr, uint64_t val) "write to RO/Unimpl reg 0x%lx | ||
568 | smmuv3_write_mmio_evtq_cons_bef_clear(uint32_t prod, uint32_t cons, uint8_t prod_wrap, uint8_t cons_wrap) "Before clearing interrupt prod:0x%x cons:0x%x prod.w:%d cons.w:%d" | ||
569 | smmuv3_write_mmio_evtq_cons_after_clear(uint32_t prod, uint32_t cons, uint8_t prod_wrap, uint8_t cons_wrap) "after clearing interrupt prod:0x%x cons:0x%x prod.w:%d cons.w:%d" | ||
570 | smmuv3_record_event(const char *type, uint32_t sid) "%s sid=%d" | ||
571 | +smmuv3_find_ste(uint16_t sid, uint32_t features, uint16_t sid_split) "SID:0x%x features:0x%x, sid_split:0x%x" | ||
572 | +smmuv3_find_ste_2lvl(uint64_t strtab_base, uint64_t l1ptr, int l1_ste_offset, uint64_t l2ptr, int l2_ste_offset, int max_l2_ste) "strtab_base:0x%lx l1ptr:0x%"PRIx64" l1_off:0x%x, l2ptr:0x%"PRIx64" l2_off:0x%x max_l2_ste:%d" | ||
573 | +smmuv3_get_ste(uint64_t addr) "STE addr: 0x%"PRIx64 | ||
574 | +smmuv3_translate_bypass(const char *n, uint16_t sid, uint64_t addr, bool is_write) "%s sid=%d bypass iova:0x%"PRIx64" is_write=%d" | ||
575 | +smmuv3_translate_in(uint16_t sid, int pci_bus_num, uint64_t strtab_base) "SID:0x%x bus:%d strtab_base:0x%"PRIx64 | ||
576 | +smmuv3_get_cd(uint64_t addr) "CD addr: 0x%"PRIx64 | ||
577 | +smmuv3_translate(const char *n, uint16_t sid, uint64_t iova, uint64_t translated, int perm) "%s sid=%d iova=0x%"PRIx64" translated=0x%"PRIx64" perm=0x%x" | ||
578 | +smmuv3_decode_cd(uint32_t oas) "oas=%d" | ||
579 | +smmuv3_decode_cd_tt(int i, uint32_t tsz, uint64_t ttb, uint32_t granule_sz) "TT[%d]:tsz:%d ttb:0x%"PRIx64" granule_sz:%d" | ||
580 | -- | 261 | -- |
581 | 2.17.0 | 262 | 2.25.1 |
582 | |||
583 | diff view generated by jsdifflib |
1 | From: Eric Auger <eric.auger@redhat.com> | 1 | From: Axel Heider <axel.heider@hensoldt.net> |
---|---|---|---|
2 | 2 | ||
3 | Let's introduce a helper function aiming at recording an | 3 | The CNT register is a read-only register. There is no need to |
4 | event in the event queue. | 4 | store it's value, it can be calculated on demand. |
5 | The calculated frequency is needed temporarily only. | ||
5 | 6 | ||
6 | Signed-off-by: Eric Auger <eric.auger@redhat.com> | 7 | Note that this is a migration compatibility break for all boards |
8 | types that use the EPIT peripheral. | ||
9 | |||
10 | Signed-off-by: Axel Heider <axel.heider@hensoldt.net> | ||
7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
8 | Message-id: 1524665762-31355-9-git-send-email-eric.auger@redhat.com | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | --- | 13 | --- |
11 | hw/arm/smmuv3-internal.h | 148 ++++++++++++++++++++++++++++++++++++++- | 14 | include/hw/timer/imx_epit.h | 2 - |
12 | hw/arm/smmuv3.c | 108 ++++++++++++++++++++++++++-- | 15 | hw/timer/imx_epit.c | 73 ++++++++++++++----------------------- |
13 | hw/arm/trace-events | 1 + | 16 | 2 files changed, 28 insertions(+), 47 deletions(-) |
14 | 3 files changed, 249 insertions(+), 8 deletions(-) | ||
15 | 17 | ||
16 | diff --git a/hw/arm/smmuv3-internal.h b/hw/arm/smmuv3-internal.h | 18 | diff --git a/include/hw/timer/imx_epit.h b/include/hw/timer/imx_epit.h |
17 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/hw/arm/smmuv3-internal.h | 20 | --- a/include/hw/timer/imx_epit.h |
19 | +++ b/hw/arm/smmuv3-internal.h | 21 | +++ b/include/hw/timer/imx_epit.h |
20 | @@ -XXX,XX +XXX,XX @@ static inline void smmu_write_cmdq_err(SMMUv3State *s, uint32_t err_type) | 22 | @@ -XXX,XX +XXX,XX @@ struct IMXEPITState { |
21 | s->cmdq.cons = FIELD_DP32(s->cmdq.cons, CMDQ_CONS, ERR, err_type); | 23 | uint32_t sr; |
24 | uint32_t lr; | ||
25 | uint32_t cmp; | ||
26 | - uint32_t cnt; | ||
27 | |||
28 | - uint32_t freq; | ||
29 | qemu_irq irq; | ||
30 | }; | ||
31 | |||
32 | diff --git a/hw/timer/imx_epit.c b/hw/timer/imx_epit.c | ||
33 | index XXXXXXX..XXXXXXX 100644 | ||
34 | --- a/hw/timer/imx_epit.c | ||
35 | +++ b/hw/timer/imx_epit.c | ||
36 | @@ -XXX,XX +XXX,XX @@ static void imx_epit_update_int(IMXEPITState *s) | ||
37 | } | ||
22 | } | 38 | } |
23 | 39 | ||
24 | -void smmuv3_write_eventq(SMMUv3State *s, Evt *evt); | 40 | -/* |
41 | - * Must be called from within a ptimer_transaction_begin/commit block | ||
42 | - * for both s->timer_cmp and s->timer_reload. | ||
43 | - */ | ||
44 | -static void imx_epit_set_freq(IMXEPITState *s) | ||
45 | +static uint32_t imx_epit_get_freq(IMXEPITState *s) | ||
46 | { | ||
47 | - uint32_t clksrc; | ||
48 | - uint32_t prescaler; | ||
25 | - | 49 | - |
26 | /* Commands */ | 50 | - clksrc = extract32(s->cr, CR_CLKSRC_SHIFT, CR_CLKSRC_BITS); |
27 | 51 | - prescaler = 1 + extract32(s->cr, CR_PRESCALE_SHIFT, CR_PRESCALE_BITS); | |
28 | typedef enum SMMUCommandType { | 52 | - |
29 | @@ -XXX,XX +XXX,XX @@ enum { /* Command completion notification */ | 53 | - s->freq = imx_ccm_get_clock_frequency(s->ccm, |
30 | 54 | - imx_epit_clocks[clksrc]) / prescaler; | |
31 | #define SMMU_FEATURE_2LVL_STE (1 << 0) | 55 | - |
32 | 56 | - DPRINTF("Setting ptimer frequency to %u\n", s->freq); | |
33 | +/* Events */ | 57 | - |
58 | - if (s->freq) { | ||
59 | - ptimer_set_freq(s->timer_reload, s->freq); | ||
60 | - ptimer_set_freq(s->timer_cmp, s->freq); | ||
61 | - } | ||
62 | + uint32_t clksrc = extract32(s->cr, CR_CLKSRC_SHIFT, CR_CLKSRC_BITS); | ||
63 | + uint32_t prescaler = 1 + extract32(s->cr, CR_PRESCALE_SHIFT, CR_PRESCALE_BITS); | ||
64 | + uint32_t f_in = imx_ccm_get_clock_frequency(s->ccm, imx_epit_clocks[clksrc]); | ||
65 | + uint32_t freq = f_in / prescaler; | ||
66 | + DPRINTF("ptimer frequency is %u\n", freq); | ||
67 | + return freq; | ||
68 | } | ||
69 | |||
70 | /* | ||
71 | @@ -XXX,XX +XXX,XX @@ static void imx_epit_reset(IMXEPITState *s, bool is_hard_reset) | ||
72 | s->sr = 0; | ||
73 | s->lr = EPIT_TIMER_MAX; | ||
74 | s->cmp = 0; | ||
75 | - s->cnt = 0; | ||
76 | ptimer_transaction_begin(s->timer_cmp); | ||
77 | ptimer_transaction_begin(s->timer_reload); | ||
78 | - /* stop both timers */ | ||
34 | + | 79 | + |
35 | +typedef enum SMMUEventType { | 80 | + /* |
36 | + SMMU_EVT_OK = 0x00, | 81 | + * The reset switches off the input clock, so even if the CR.EN is still |
37 | + SMMU_EVT_F_UUT , | 82 | + * set, the timers are no longer running. |
38 | + SMMU_EVT_C_BAD_STREAMID , | 83 | + */ |
39 | + SMMU_EVT_F_STE_FETCH , | 84 | + assert(imx_epit_get_freq(s) == 0); |
40 | + SMMU_EVT_C_BAD_STE , | 85 | ptimer_stop(s->timer_cmp); |
41 | + SMMU_EVT_F_BAD_ATS_TREQ , | 86 | ptimer_stop(s->timer_reload); |
42 | + SMMU_EVT_F_STREAM_DISABLED , | 87 | - /* compute new frequency */ |
43 | + SMMU_EVT_F_TRANS_FORBIDDEN , | 88 | - imx_epit_set_freq(s); |
44 | + SMMU_EVT_C_BAD_SUBSTREAMID , | 89 | /* init both timers to EPIT_TIMER_MAX */ |
45 | + SMMU_EVT_F_CD_FETCH , | 90 | ptimer_set_limit(s->timer_cmp, EPIT_TIMER_MAX, 1); |
46 | + SMMU_EVT_C_BAD_CD , | 91 | ptimer_set_limit(s->timer_reload, EPIT_TIMER_MAX, 1); |
47 | + SMMU_EVT_F_WALK_EABT , | 92 | - if (s->freq && (s->cr & CR_EN)) { |
48 | + SMMU_EVT_F_TRANSLATION = 0x10, | 93 | - /* if the timer is still enabled, restart it */ |
49 | + SMMU_EVT_F_ADDR_SIZE , | 94 | - ptimer_run(s->timer_reload, 0); |
50 | + SMMU_EVT_F_ACCESS , | 95 | - } |
51 | + SMMU_EVT_F_PERMISSION , | 96 | ptimer_transaction_commit(s->timer_cmp); |
52 | + SMMU_EVT_F_TLB_CONFLICT = 0x20, | 97 | ptimer_transaction_commit(s->timer_reload); |
53 | + SMMU_EVT_F_CFG_CONFLICT , | ||
54 | + SMMU_EVT_E_PAGE_REQ = 0x24, | ||
55 | +} SMMUEventType; | ||
56 | + | ||
57 | +static const char *event_stringify[] = { | ||
58 | + [SMMU_EVT_OK] = "SMMU_EVT_OK", | ||
59 | + [SMMU_EVT_F_UUT] = "SMMU_EVT_F_UUT", | ||
60 | + [SMMU_EVT_C_BAD_STREAMID] = "SMMU_EVT_C_BAD_STREAMID", | ||
61 | + [SMMU_EVT_F_STE_FETCH] = "SMMU_EVT_F_STE_FETCH", | ||
62 | + [SMMU_EVT_C_BAD_STE] = "SMMU_EVT_C_BAD_STE", | ||
63 | + [SMMU_EVT_F_BAD_ATS_TREQ] = "SMMU_EVT_F_BAD_ATS_TREQ", | ||
64 | + [SMMU_EVT_F_STREAM_DISABLED] = "SMMU_EVT_F_STREAM_DISABLED", | ||
65 | + [SMMU_EVT_F_TRANS_FORBIDDEN] = "SMMU_EVT_F_TRANS_FORBIDDEN", | ||
66 | + [SMMU_EVT_C_BAD_SUBSTREAMID] = "SMMU_EVT_C_BAD_SUBSTREAMID", | ||
67 | + [SMMU_EVT_F_CD_FETCH] = "SMMU_EVT_F_CD_FETCH", | ||
68 | + [SMMU_EVT_C_BAD_CD] = "SMMU_EVT_C_BAD_CD", | ||
69 | + [SMMU_EVT_F_WALK_EABT] = "SMMU_EVT_F_WALK_EABT", | ||
70 | + [SMMU_EVT_F_TRANSLATION] = "SMMU_EVT_F_TRANSLATION", | ||
71 | + [SMMU_EVT_F_ADDR_SIZE] = "SMMU_EVT_F_ADDR_SIZE", | ||
72 | + [SMMU_EVT_F_ACCESS] = "SMMU_EVT_F_ACCESS", | ||
73 | + [SMMU_EVT_F_PERMISSION] = "SMMU_EVT_F_PERMISSION", | ||
74 | + [SMMU_EVT_F_TLB_CONFLICT] = "SMMU_EVT_F_TLB_CONFLICT", | ||
75 | + [SMMU_EVT_F_CFG_CONFLICT] = "SMMU_EVT_F_CFG_CONFLICT", | ||
76 | + [SMMU_EVT_E_PAGE_REQ] = "SMMU_EVT_E_PAGE_REQ", | ||
77 | +}; | ||
78 | + | ||
79 | +static inline const char *smmu_event_string(SMMUEventType type) | ||
80 | +{ | ||
81 | + if (type < ARRAY_SIZE(event_stringify)) { | ||
82 | + return event_stringify[type] ? event_stringify[type] : "UNKNOWN"; | ||
83 | + } else { | ||
84 | + return "INVALID"; | ||
85 | + } | ||
86 | +} | ||
87 | + | ||
88 | +/* Encode an event record */ | ||
89 | +typedef struct SMMUEventInfo { | ||
90 | + SMMUEventType type; | ||
91 | + uint32_t sid; | ||
92 | + bool recorded; | ||
93 | + bool record_trans_faults; | ||
94 | + union { | ||
95 | + struct { | ||
96 | + uint32_t ssid; | ||
97 | + bool ssv; | ||
98 | + dma_addr_t addr; | ||
99 | + bool rnw; | ||
100 | + bool pnu; | ||
101 | + bool ind; | ||
102 | + } f_uut; | ||
103 | + struct SSIDInfo { | ||
104 | + uint32_t ssid; | ||
105 | + bool ssv; | ||
106 | + } c_bad_streamid; | ||
107 | + struct SSIDAddrInfo { | ||
108 | + uint32_t ssid; | ||
109 | + bool ssv; | ||
110 | + dma_addr_t addr; | ||
111 | + } f_ste_fetch; | ||
112 | + struct SSIDInfo c_bad_ste; | ||
113 | + struct { | ||
114 | + dma_addr_t addr; | ||
115 | + bool rnw; | ||
116 | + } f_transl_forbidden; | ||
117 | + struct { | ||
118 | + uint32_t ssid; | ||
119 | + } c_bad_substream; | ||
120 | + struct SSIDAddrInfo f_cd_fetch; | ||
121 | + struct SSIDInfo c_bad_cd; | ||
122 | + struct FullInfo { | ||
123 | + bool stall; | ||
124 | + uint16_t stag; | ||
125 | + uint32_t ssid; | ||
126 | + bool ssv; | ||
127 | + bool s2; | ||
128 | + dma_addr_t addr; | ||
129 | + bool rnw; | ||
130 | + bool pnu; | ||
131 | + bool ind; | ||
132 | + uint8_t class; | ||
133 | + dma_addr_t addr2; | ||
134 | + } f_walk_eabt; | ||
135 | + struct FullInfo f_translation; | ||
136 | + struct FullInfo f_addr_size; | ||
137 | + struct FullInfo f_access; | ||
138 | + struct FullInfo f_permission; | ||
139 | + struct SSIDInfo f_cfg_conflict; | ||
140 | + /** | ||
141 | + * not supported yet: | ||
142 | + * F_BAD_ATS_TREQ | ||
143 | + * F_BAD_ATS_TREQ | ||
144 | + * F_TLB_CONFLICT | ||
145 | + * E_PAGE_REQUEST | ||
146 | + * IMPDEF_EVENTn | ||
147 | + */ | ||
148 | + } u; | ||
149 | +} SMMUEventInfo; | ||
150 | + | ||
151 | +/* EVTQ fields */ | ||
152 | + | ||
153 | +#define EVT_Q_OVERFLOW (1 << 31) | ||
154 | + | ||
155 | +#define EVT_SET_TYPE(x, v) deposit32((x)->word[0], 0 , 8 , v) | ||
156 | +#define EVT_SET_SSV(x, v) deposit32((x)->word[0], 11, 1 , v) | ||
157 | +#define EVT_SET_SSID(x, v) deposit32((x)->word[0], 12, 20, v) | ||
158 | +#define EVT_SET_SID(x, v) ((x)->word[1] = v) | ||
159 | +#define EVT_SET_STAG(x, v) deposit32((x)->word[2], 0 , 16, v) | ||
160 | +#define EVT_SET_STALL(x, v) deposit32((x)->word[2], 31, 1 , v) | ||
161 | +#define EVT_SET_PNU(x, v) deposit32((x)->word[3], 1 , 1 , v) | ||
162 | +#define EVT_SET_IND(x, v) deposit32((x)->word[3], 2 , 1 , v) | ||
163 | +#define EVT_SET_RNW(x, v) deposit32((x)->word[3], 3 , 1 , v) | ||
164 | +#define EVT_SET_S2(x, v) deposit32((x)->word[3], 7 , 1 , v) | ||
165 | +#define EVT_SET_CLASS(x, v) deposit32((x)->word[3], 8 , 2 , v) | ||
166 | +#define EVT_SET_ADDR(x, addr) \ | ||
167 | + do { \ | ||
168 | + (x)->word[5] = (uint32_t)(addr >> 32); \ | ||
169 | + (x)->word[4] = (uint32_t)(addr & 0xffffffff); \ | ||
170 | + } while (0) | ||
171 | +#define EVT_SET_ADDR2(x, addr) \ | ||
172 | + do { \ | ||
173 | + deposit32((x)->word[7], 3, 29, addr >> 16); \ | ||
174 | + deposit32((x)->word[7], 0, 16, addr & 0xffff);\ | ||
175 | + } while (0) | ||
176 | + | ||
177 | +void smmuv3_record_event(SMMUv3State *s, SMMUEventInfo *event); | ||
178 | + | ||
179 | #endif | ||
180 | diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c | ||
181 | index XXXXXXX..XXXXXXX 100644 | ||
182 | --- a/hw/arm/smmuv3.c | ||
183 | +++ b/hw/arm/smmuv3.c | ||
184 | @@ -XXX,XX +XXX,XX @@ static MemTxResult queue_write(SMMUQueue *q, void *data) | ||
185 | return MEMTX_OK; | ||
186 | } | 98 | } |
187 | 99 | ||
188 | -void smmuv3_write_eventq(SMMUv3State *s, Evt *evt) | 100 | -static uint32_t imx_epit_update_count(IMXEPITState *s) |
189 | +static MemTxResult smmuv3_write_eventq(SMMUv3State *s, Evt *evt) | 101 | -{ |
102 | - s->cnt = ptimer_get_count(s->timer_reload); | ||
103 | - | ||
104 | - return s->cnt; | ||
105 | -} | ||
106 | - | ||
107 | static uint64_t imx_epit_read(void *opaque, hwaddr offset, unsigned size) | ||
190 | { | 108 | { |
191 | SMMUQueue *q = &s->eventq; | 109 | IMXEPITState *s = IMX_EPIT(opaque); |
192 | + MemTxResult r; | 110 | @@ -XXX,XX +XXX,XX @@ static uint64_t imx_epit_read(void *opaque, hwaddr offset, unsigned size) |
193 | + | 111 | break; |
194 | + if (!smmuv3_eventq_enabled(s)) { | 112 | |
195 | + return MEMTX_ERROR; | 113 | case 4: /* CNT */ |
196 | + } | 114 | - imx_epit_update_count(s); |
197 | + | 115 | - reg_value = s->cnt; |
198 | + if (smmuv3_q_full(q)) { | 116 | + reg_value = ptimer_get_count(s->timer_reload); |
199 | + return MEMTX_ERROR; | 117 | break; |
200 | + } | 118 | |
201 | + | 119 | default: |
202 | + r = queue_write(q, evt); | 120 | @@ -XXX,XX +XXX,XX @@ static void imx_epit_reload_compare_timer(IMXEPITState *s) |
203 | + if (r != MEMTX_OK) { | 121 | { |
204 | + return r; | 122 | if ((s->cr & (CR_EN | CR_OCIEN)) == (CR_EN | CR_OCIEN)) { |
205 | + } | 123 | /* if the compare feature is on and timers are running */ |
206 | + | 124 | - uint32_t tmp = imx_epit_update_count(s); |
207 | + if (smmuv3_q_empty(q)) { | 125 | + uint32_t tmp = ptimer_get_count(s->timer_reload); |
208 | + smmuv3_trigger_irq(s, SMMU_IRQ_EVTQ, 0); | 126 | uint64_t next; |
209 | + } | 127 | if (tmp > s->cmp) { |
210 | + return MEMTX_OK; | 128 | /* It'll fire in this round of the timer */ |
211 | +} | 129 | @@ -XXX,XX +XXX,XX @@ static void imx_epit_reload_compare_timer(IMXEPITState *s) |
212 | + | 130 | |
213 | +void smmuv3_record_event(SMMUv3State *s, SMMUEventInfo *info) | 131 | static void imx_epit_write_cr(IMXEPITState *s, uint32_t value) |
214 | +{ | 132 | { |
215 | + Evt evt; | 133 | + uint32_t freq = 0; |
216 | + MemTxResult r; | 134 | uint32_t oldcr = s->cr; |
217 | 135 | ||
218 | if (!smmuv3_eventq_enabled(s)) { | 136 | s->cr = value & 0x03ffffff; |
219 | return; | 137 | @@ -XXX,XX +XXX,XX @@ static void imx_epit_write_cr(IMXEPITState *s, uint32_t value) |
138 | ptimer_transaction_begin(s->timer_cmp); | ||
139 | ptimer_transaction_begin(s->timer_reload); | ||
140 | |||
141 | - /* Update the frequency. Has been done already in case of a reset. */ | ||
142 | + /* | ||
143 | + * Update the frequency. In case of a reset the input clock was | ||
144 | + * switched off, so this can be skipped. | ||
145 | + */ | ||
146 | if (!(s->cr & CR_SWR)) { | ||
147 | - imx_epit_set_freq(s); | ||
148 | + freq = imx_epit_get_freq(s); | ||
149 | + if (freq) { | ||
150 | + ptimer_set_freq(s->timer_reload, freq); | ||
151 | + ptimer_set_freq(s->timer_cmp, freq); | ||
152 | + } | ||
220 | } | 153 | } |
221 | 154 | ||
222 | - if (smmuv3_q_full(q)) { | 155 | - if (s->freq && (s->cr & CR_EN) && !(oldcr & CR_EN)) { |
223 | + EVT_SET_TYPE(&evt, info->type); | 156 | + if (freq && (s->cr & CR_EN) && !(oldcr & CR_EN)) { |
224 | + EVT_SET_SID(&evt, info->sid); | 157 | if (s->cr & CR_ENMOD) { |
225 | + | 158 | if (s->cr & CR_RLD) { |
226 | + switch (info->type) { | 159 | ptimer_set_limit(s->timer_reload, s->lr, 1); |
227 | + case SMMU_EVT_OK: | 160 | @@ -XXX,XX +XXX,XX @@ static const MemoryRegionOps imx_epit_ops = { |
228 | return; | 161 | |
229 | + case SMMU_EVT_F_UUT: | 162 | static const VMStateDescription vmstate_imx_timer_epit = { |
230 | + EVT_SET_SSID(&evt, info->u.f_uut.ssid); | 163 | .name = TYPE_IMX_EPIT, |
231 | + EVT_SET_SSV(&evt, info->u.f_uut.ssv); | 164 | - .version_id = 2, |
232 | + EVT_SET_ADDR(&evt, info->u.f_uut.addr); | 165 | - .minimum_version_id = 2, |
233 | + EVT_SET_RNW(&evt, info->u.f_uut.rnw); | 166 | + .version_id = 3, |
234 | + EVT_SET_PNU(&evt, info->u.f_uut.pnu); | 167 | + .minimum_version_id = 3, |
235 | + EVT_SET_IND(&evt, info->u.f_uut.ind); | 168 | .fields = (VMStateField[]) { |
236 | + break; | 169 | VMSTATE_UINT32(cr, IMXEPITState), |
237 | + case SMMU_EVT_C_BAD_STREAMID: | 170 | VMSTATE_UINT32(sr, IMXEPITState), |
238 | + EVT_SET_SSID(&evt, info->u.c_bad_streamid.ssid); | 171 | VMSTATE_UINT32(lr, IMXEPITState), |
239 | + EVT_SET_SSV(&evt, info->u.c_bad_streamid.ssv); | 172 | VMSTATE_UINT32(cmp, IMXEPITState), |
240 | + break; | 173 | - VMSTATE_UINT32(cnt, IMXEPITState), |
241 | + case SMMU_EVT_F_STE_FETCH: | 174 | - VMSTATE_UINT32(freq, IMXEPITState), |
242 | + EVT_SET_SSID(&evt, info->u.f_ste_fetch.ssid); | 175 | VMSTATE_PTIMER(timer_reload, IMXEPITState), |
243 | + EVT_SET_SSV(&evt, info->u.f_ste_fetch.ssv); | 176 | VMSTATE_PTIMER(timer_cmp, IMXEPITState), |
244 | + EVT_SET_ADDR(&evt, info->u.f_ste_fetch.addr); | 177 | VMSTATE_END_OF_LIST() |
245 | + break; | ||
246 | + case SMMU_EVT_C_BAD_STE: | ||
247 | + EVT_SET_SSID(&evt, info->u.c_bad_ste.ssid); | ||
248 | + EVT_SET_SSV(&evt, info->u.c_bad_ste.ssv); | ||
249 | + break; | ||
250 | + case SMMU_EVT_F_STREAM_DISABLED: | ||
251 | + break; | ||
252 | + case SMMU_EVT_F_TRANS_FORBIDDEN: | ||
253 | + EVT_SET_ADDR(&evt, info->u.f_transl_forbidden.addr); | ||
254 | + EVT_SET_RNW(&evt, info->u.f_transl_forbidden.rnw); | ||
255 | + break; | ||
256 | + case SMMU_EVT_C_BAD_SUBSTREAMID: | ||
257 | + EVT_SET_SSID(&evt, info->u.c_bad_substream.ssid); | ||
258 | + break; | ||
259 | + case SMMU_EVT_F_CD_FETCH: | ||
260 | + EVT_SET_SSID(&evt, info->u.f_cd_fetch.ssid); | ||
261 | + EVT_SET_SSV(&evt, info->u.f_cd_fetch.ssv); | ||
262 | + EVT_SET_ADDR(&evt, info->u.f_cd_fetch.addr); | ||
263 | + break; | ||
264 | + case SMMU_EVT_C_BAD_CD: | ||
265 | + EVT_SET_SSID(&evt, info->u.c_bad_cd.ssid); | ||
266 | + EVT_SET_SSV(&evt, info->u.c_bad_cd.ssv); | ||
267 | + break; | ||
268 | + case SMMU_EVT_F_WALK_EABT: | ||
269 | + case SMMU_EVT_F_TRANSLATION: | ||
270 | + case SMMU_EVT_F_ADDR_SIZE: | ||
271 | + case SMMU_EVT_F_ACCESS: | ||
272 | + case SMMU_EVT_F_PERMISSION: | ||
273 | + EVT_SET_STALL(&evt, info->u.f_walk_eabt.stall); | ||
274 | + EVT_SET_STAG(&evt, info->u.f_walk_eabt.stag); | ||
275 | + EVT_SET_SSID(&evt, info->u.f_walk_eabt.ssid); | ||
276 | + EVT_SET_SSV(&evt, info->u.f_walk_eabt.ssv); | ||
277 | + EVT_SET_S2(&evt, info->u.f_walk_eabt.s2); | ||
278 | + EVT_SET_ADDR(&evt, info->u.f_walk_eabt.addr); | ||
279 | + EVT_SET_RNW(&evt, info->u.f_walk_eabt.rnw); | ||
280 | + EVT_SET_PNU(&evt, info->u.f_walk_eabt.pnu); | ||
281 | + EVT_SET_IND(&evt, info->u.f_walk_eabt.ind); | ||
282 | + EVT_SET_CLASS(&evt, info->u.f_walk_eabt.class); | ||
283 | + EVT_SET_ADDR2(&evt, info->u.f_walk_eabt.addr2); | ||
284 | + break; | ||
285 | + case SMMU_EVT_F_CFG_CONFLICT: | ||
286 | + EVT_SET_SSID(&evt, info->u.f_cfg_conflict.ssid); | ||
287 | + EVT_SET_SSV(&evt, info->u.f_cfg_conflict.ssv); | ||
288 | + break; | ||
289 | + /* rest is not implemented */ | ||
290 | + case SMMU_EVT_F_BAD_ATS_TREQ: | ||
291 | + case SMMU_EVT_F_TLB_CONFLICT: | ||
292 | + case SMMU_EVT_E_PAGE_REQ: | ||
293 | + default: | ||
294 | + g_assert_not_reached(); | ||
295 | } | ||
296 | |||
297 | - queue_write(q, evt); | ||
298 | - | ||
299 | - if (smmuv3_q_empty(q)) { | ||
300 | - smmuv3_trigger_irq(s, SMMU_IRQ_EVTQ, 0); | ||
301 | + trace_smmuv3_record_event(smmu_event_string(info->type), info->sid); | ||
302 | + r = smmuv3_write_eventq(s, &evt); | ||
303 | + if (r != MEMTX_OK) { | ||
304 | + smmuv3_trigger_irq(s, SMMU_IRQ_GERROR, R_GERROR_EVENTQ_ABT_ERR_MASK); | ||
305 | } | ||
306 | + info->recorded = true; | ||
307 | } | ||
308 | |||
309 | static void smmuv3_init_regs(SMMUv3State *s) | ||
310 | diff --git a/hw/arm/trace-events b/hw/arm/trace-events | ||
311 | index XXXXXXX..XXXXXXX 100644 | ||
312 | --- a/hw/arm/trace-events | ||
313 | +++ b/hw/arm/trace-events | ||
314 | @@ -XXX,XX +XXX,XX @@ smmuv3_write_mmio(uint64_t addr, uint64_t val, unsigned size, uint32_t r) "addr: | ||
315 | smmuv3_write_mmio_idr(uint64_t addr, uint64_t val) "write to RO/Unimpl reg 0x%lx val64:0x%lx" | ||
316 | smmuv3_write_mmio_evtq_cons_bef_clear(uint32_t prod, uint32_t cons, uint8_t prod_wrap, uint8_t cons_wrap) "Before clearing interrupt prod:0x%x cons:0x%x prod.w:%d cons.w:%d" | ||
317 | smmuv3_write_mmio_evtq_cons_after_clear(uint32_t prod, uint32_t cons, uint8_t prod_wrap, uint8_t cons_wrap) "after clearing interrupt prod:0x%x cons:0x%x prod.w:%d cons.w:%d" | ||
318 | +smmuv3_record_event(const char *type, uint32_t sid) "%s sid=%d" | ||
319 | -- | 178 | -- |
320 | 2.17.0 | 179 | 2.25.1 |
321 | |||
322 | diff view generated by jsdifflib |
1 | From: Prem Mallappa <prem.mallappa@broadcom.com> | 1 | From: Axel Heider <axel.heider@hensoldt.net> |
---|---|---|---|
2 | 2 | ||
3 | This patch builds the smmuv3 node in the ACPI IORT table. | 3 | - fix #1263 for CR writes |
4 | - rework compare time handling | ||
5 | - The compare timer has to run even if CR.OCIEN is not set, | ||
6 | as SR.OCIF must be updated. | ||
7 | - The compare timer fires exactly once when the | ||
8 | compare value is less than the current value, but the | ||
9 | reload values is less than the compare value. | ||
10 | - The compare timer will never fire if the reload value is | ||
11 | less than the compare value. Disable it in this case. | ||
4 | 12 | ||
5 | The RID space of the root complex, which spans 0x0-0x10000 | 13 | Signed-off-by: Axel Heider <axel.heider@hensoldt.net> |
6 | maps to streamid space 0x0-0x10000 in smmuv3, which in turn | 14 | [PMM: fixed minor style nits] |
7 | maps to deviceid space 0x0-0x10000 in the ITS group. | 15 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
8 | |||
9 | The guest must feature the IOMMU probe deferral series | ||
10 | (https://lkml.org/lkml/2017/4/10/214) which fixes streamid | ||
11 | multiple lookup. This bug is not related to the SMMU emulation. | ||
12 | |||
13 | Signed-off-by: Prem Mallappa <prem.mallappa@broadcom.com> | ||
14 | Signed-off-by: Eric Auger <eric.auger@redhat.com> | ||
15 | Reviewed-by: Shannon Zhao <zhaoshenglong@huawei.com> | ||
16 | Message-id: 1524665762-31355-14-git-send-email-eric.auger@redhat.com | ||
17 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
18 | --- | 17 | --- |
19 | include/hw/acpi/acpi-defs.h | 15 ++++++++++ | 18 | hw/timer/imx_epit.c | 192 ++++++++++++++++++++++++++------------------ |
20 | hw/arm/virt-acpi-build.c | 55 ++++++++++++++++++++++++++++++++----- | 19 | 1 file changed, 116 insertions(+), 76 deletions(-) |
21 | 2 files changed, 63 insertions(+), 7 deletions(-) | ||
22 | 20 | ||
23 | diff --git a/include/hw/acpi/acpi-defs.h b/include/hw/acpi/acpi-defs.h | 21 | diff --git a/hw/timer/imx_epit.c b/hw/timer/imx_epit.c |
24 | index XXXXXXX..XXXXXXX 100644 | 22 | index XXXXXXX..XXXXXXX 100644 |
25 | --- a/include/hw/acpi/acpi-defs.h | 23 | --- a/hw/timer/imx_epit.c |
26 | +++ b/include/hw/acpi/acpi-defs.h | 24 | +++ b/hw/timer/imx_epit.c |
27 | @@ -XXX,XX +XXX,XX @@ struct AcpiIortItsGroup { | 25 | @@ -XXX,XX +XXX,XX @@ |
28 | } QEMU_PACKED; | 26 | * Originally written by Hans Jiang |
29 | typedef struct AcpiIortItsGroup AcpiIortItsGroup; | 27 | * Updated by Peter Chubb |
30 | 28 | * Updated by Jean-Christophe Dubois <jcd@tribudubois.net> | |
31 | +struct AcpiIortSmmu3 { | 29 | + * Updated by Axel Heider |
32 | + ACPI_IORT_NODE_HEADER_DEF | 30 | * |
33 | + uint64_t base_address; | 31 | * This code is licensed under GPL version 2 or later. See |
34 | + uint32_t flags; | 32 | * the COPYING file in the top-level directory. |
35 | + uint32_t reserved2; | 33 | @@ -XXX,XX +XXX,XX @@ static uint64_t imx_epit_read(void *opaque, hwaddr offset, unsigned size) |
36 | + uint64_t vatos_address; | 34 | return reg_value; |
37 | + uint32_t model; | 35 | } |
38 | + uint32_t event_gsiv; | 36 | |
39 | + uint32_t pri_gsiv; | 37 | -/* Must be called from ptimer_transaction_begin/commit block for s->timer_cmp */ |
40 | + uint32_t gerr_gsiv; | 38 | -static void imx_epit_reload_compare_timer(IMXEPITState *s) |
41 | + uint32_t sync_gsiv; | 39 | +/* |
42 | + AcpiIortIdMapping id_mapping_array[0]; | 40 | + * Must be called from a ptimer_transaction_begin/commit block for |
43 | +} QEMU_PACKED; | 41 | + * s->timer_cmp, but outside of a transaction block of s->timer_reload, |
44 | +typedef struct AcpiIortSmmu3 AcpiIortSmmu3; | 42 | + * so the proper counter value is read. |
45 | + | 43 | + */ |
46 | struct AcpiIortRC { | 44 | +static void imx_epit_update_compare_timer(IMXEPITState *s) |
47 | ACPI_IORT_NODE_HEADER_DEF | 45 | { |
48 | AcpiIortMemoryAccess memory_properties; | 46 | - if ((s->cr & (CR_EN | CR_OCIEN)) == (CR_EN | CR_OCIEN)) { |
49 | diff --git a/hw/arm/virt-acpi-build.c b/hw/arm/virt-acpi-build.c | 47 | - /* if the compare feature is on and timers are running */ |
50 | index XXXXXXX..XXXXXXX 100644 | 48 | - uint32_t tmp = ptimer_get_count(s->timer_reload); |
51 | --- a/hw/arm/virt-acpi-build.c | 49 | - uint64_t next; |
52 | +++ b/hw/arm/virt-acpi-build.c | 50 | - if (tmp > s->cmp) { |
53 | @@ -XXX,XX +XXX,XX @@ build_rsdp(GArray *rsdp_table, BIOSLinker *linker, unsigned xsdt_tbl_offset) | 51 | - /* It'll fire in this round of the timer */ |
54 | } | 52 | - next = tmp - s->cmp; |
55 | 53 | - } else { /* catch it next time around */ | |
56 | static void | 54 | - next = tmp - s->cmp + ((s->cr & CR_RLD) ? EPIT_TIMER_MAX : s->lr); |
57 | -build_iort(GArray *table_data, BIOSLinker *linker) | 55 | + uint64_t counter = 0; |
58 | +build_iort(GArray *table_data, BIOSLinker *linker, VirtMachineState *vms) | 56 | + bool is_oneshot = false; |
59 | { | 57 | + /* |
60 | - int iort_start = table_data->len; | 58 | + * The compare timer only has to run if the timer peripheral is active |
61 | + int nb_nodes, iort_start = table_data->len; | 59 | + * and there is an input clock, Otherwise it can be switched off. |
62 | AcpiIortIdMapping *idmap; | 60 | + */ |
63 | AcpiIortItsGroup *its; | 61 | + bool is_active = (s->cr & CR_EN) && imx_epit_get_freq(s); |
64 | AcpiIortTable *iort; | 62 | + if (is_active) { |
65 | - size_t node_size, iort_length; | 63 | + /* |
66 | + AcpiIortSmmu3 *smmu; | 64 | + * Calculate next timeout for compare timer. Reading the reload |
67 | + size_t node_size, iort_length, smmu_offset = 0; | 65 | + * counter returns proper results only if pending transactions |
68 | AcpiIortRC *rc; | 66 | + * on it are committed here. Otherwise stale values are be read. |
69 | 67 | + */ | |
70 | iort = acpi_data_push(table_data, sizeof(*iort)); | 68 | + counter = ptimer_get_count(s->timer_reload); |
71 | 69 | + uint64_t limit = ptimer_get_limit(s->timer_cmp); | |
72 | + if (vms->iommu == VIRT_IOMMU_SMMUV3) { | 70 | + /* |
73 | + nb_nodes = 3; /* RC, ITS, SMMUv3 */ | 71 | + * The compare timer is a periodic timer if the limit is at least |
72 | + * the compare value. Otherwise it may fire at most once in the | ||
73 | + * current round. | ||
74 | + */ | ||
75 | + bool is_oneshot = (limit >= s->cmp); | ||
76 | + if (counter >= s->cmp) { | ||
77 | + /* The compare timer fires in the current round. */ | ||
78 | + counter -= s->cmp; | ||
79 | + } else if (!is_oneshot) { | ||
80 | + /* | ||
81 | + * The compare timer fires after a reload, as it is below the | ||
82 | + * compare value already in this round. Note that the counter | ||
83 | + * value calculated below can be above the 32-bit limit, which | ||
84 | + * is legal here because the compare timer is an internal | ||
85 | + * helper ptimer only. | ||
86 | + */ | ||
87 | + counter += limit - s->cmp; | ||
88 | + } else { | ||
89 | + /* | ||
90 | + * The compare timer won't fire in this round, and the limit is | ||
91 | + * set to a value below the compare value. This practically means | ||
92 | + * it will never fire, so it can be switched off. | ||
93 | + */ | ||
94 | + is_active = false; | ||
95 | } | ||
96 | - ptimer_set_count(s->timer_cmp, next); | ||
97 | } | ||
98 | + | ||
99 | + /* | ||
100 | + * Set the compare timer and let it run, or stop it. This is agnostic | ||
101 | + * of CR.OCIEN bit, as this bit affects interrupt generation only. The | ||
102 | + * compare timer needs to run even if no interrupts are to be generated, | ||
103 | + * because the SR.OCIF bit must be updated also. | ||
104 | + * Note that the timer might already be stopped or be running with | ||
105 | + * counter values. However, finding out when an update is needed and | ||
106 | + * when not is not trivial. It's much easier applying the setting again, | ||
107 | + * as this does not harm either and the overhead is negligible. | ||
108 | + */ | ||
109 | + if (is_active) { | ||
110 | + ptimer_set_count(s->timer_cmp, counter); | ||
111 | + ptimer_run(s->timer_cmp, is_oneshot ? 1 : 0); | ||
74 | + } else { | 112 | + } else { |
75 | + nb_nodes = 2; /* RC, ITS */ | 113 | + ptimer_stop(s->timer_cmp); |
76 | + } | 114 | + } |
77 | + | 115 | + |
78 | iort_length = sizeof(*iort); | 116 | } |
79 | - iort->node_count = cpu_to_le32(2); /* RC and ITS nodes */ | 117 | |
80 | + iort->node_count = cpu_to_le32(nb_nodes); | 118 | static void imx_epit_write_cr(IMXEPITState *s, uint32_t value) |
81 | iort->node_offset = cpu_to_le32(sizeof(*iort)); | 119 | { |
82 | 120 | - uint32_t freq = 0; | |
83 | /* ITS group node */ | 121 | uint32_t oldcr = s->cr; |
84 | @@ -XXX,XX +XXX,XX @@ build_iort(GArray *table_data, BIOSLinker *linker) | 122 | |
85 | its->its_count = cpu_to_le32(1); | 123 | s->cr = value & 0x03ffffff; |
86 | its->identifiers[0] = 0; /* MADT translation_id */ | 124 | |
87 | 125 | if (s->cr & CR_SWR) { | |
88 | + if (vms->iommu == VIRT_IOMMU_SMMUV3) { | 126 | - /* handle the reset */ |
89 | + int irq = vms->irqmap[VIRT_SMMU]; | 127 | + /* |
90 | + | 128 | + * Reset clears CR.SWR again. It does not touch CR.EN, but the timers |
91 | + /* SMMUv3 node */ | 129 | + * are still stopped because the input clock is disabled. |
92 | + smmu_offset = iort->node_offset + node_size; | 130 | + */ |
93 | + node_size = sizeof(*smmu) + sizeof(*idmap); | 131 | imx_epit_reset(s, false); |
94 | + iort_length += node_size; | ||
95 | + smmu = acpi_data_push(table_data, node_size); | ||
96 | + | ||
97 | + smmu->type = ACPI_IORT_NODE_SMMU_V3; | ||
98 | + smmu->length = cpu_to_le16(node_size); | ||
99 | + smmu->mapping_count = cpu_to_le32(1); | ||
100 | + smmu->mapping_offset = cpu_to_le32(sizeof(*smmu)); | ||
101 | + smmu->base_address = cpu_to_le64(vms->memmap[VIRT_SMMU].base); | ||
102 | + smmu->event_gsiv = cpu_to_le32(irq); | ||
103 | + smmu->pri_gsiv = cpu_to_le32(irq + 1); | ||
104 | + smmu->gerr_gsiv = cpu_to_le32(irq + 2); | ||
105 | + smmu->sync_gsiv = cpu_to_le32(irq + 3); | ||
106 | + | ||
107 | + /* Identity RID mapping covering the whole input RID range */ | ||
108 | + idmap = &smmu->id_mapping_array[0]; | ||
109 | + idmap->input_base = 0; | ||
110 | + idmap->id_count = cpu_to_le32(0xFFFF); | ||
111 | + idmap->output_base = 0; | ||
112 | + /* output IORT node is the ITS group node (the first node) */ | ||
113 | + idmap->output_reference = cpu_to_le32(iort->node_offset); | ||
114 | + } | ||
115 | + | ||
116 | /* Root Complex Node */ | ||
117 | node_size = sizeof(*rc) + sizeof(*idmap); | ||
118 | iort_length += node_size; | ||
119 | @@ -XXX,XX +XXX,XX @@ build_iort(GArray *table_data, BIOSLinker *linker) | ||
120 | idmap->input_base = 0; | ||
121 | idmap->id_count = cpu_to_le32(0xFFFF); | ||
122 | idmap->output_base = 0; | ||
123 | - /* output IORT node is the ITS group node (the first node) */ | ||
124 | - idmap->output_reference = cpu_to_le32(iort->node_offset); | ||
125 | + | ||
126 | + if (vms->iommu == VIRT_IOMMU_SMMUV3) { | ||
127 | + /* output IORT node is the smmuv3 node */ | ||
128 | + idmap->output_reference = cpu_to_le32(smmu_offset); | ||
129 | + } else { | 132 | + } else { |
130 | + /* output IORT node is the ITS group node (the first node) */ | 133 | + uint32_t freq; |
131 | + idmap->output_reference = cpu_to_le32(iort->node_offset); | 134 | + uint32_t toggled_cr_bits = oldcr ^ s->cr; |
132 | + } | 135 | + /* re-initialize the limits if CR.RLD has changed */ |
133 | 136 | + bool set_limit = toggled_cr_bits & CR_RLD; | |
134 | iort->length = cpu_to_le32(iort_length); | 137 | + /* set the counter if the timer got just enabled and CR.ENMOD is set */ |
135 | 138 | + bool is_switched_on = (toggled_cr_bits & s->cr) & CR_EN; | |
136 | @@ -XXX,XX +XXX,XX @@ void virt_acpi_build(VirtMachineState *vms, AcpiBuildTables *tables) | 139 | + bool set_counter = is_switched_on && (s->cr & CR_ENMOD); |
137 | 140 | + | |
138 | if (its_class_name() && !vmc->no_its) { | 141 | + ptimer_transaction_begin(s->timer_cmp); |
139 | acpi_add_table(table_offsets, tables_blob); | 142 | + ptimer_transaction_begin(s->timer_reload); |
140 | - build_iort(tables_blob, tables->linker); | 143 | + freq = imx_epit_get_freq(s); |
141 | + build_iort(tables_blob, tables->linker, vms); | 144 | + if (freq) { |
145 | + ptimer_set_freq(s->timer_reload, freq); | ||
146 | + ptimer_set_freq(s->timer_cmp, freq); | ||
147 | + } | ||
148 | + | ||
149 | + if (set_limit || set_counter) { | ||
150 | + uint64_t limit = (s->cr & CR_RLD) ? s->lr : EPIT_TIMER_MAX; | ||
151 | + ptimer_set_limit(s->timer_reload, limit, set_counter ? 1 : 0); | ||
152 | + if (set_limit) { | ||
153 | + ptimer_set_limit(s->timer_cmp, limit, 0); | ||
154 | + } | ||
155 | + } | ||
156 | + /* | ||
157 | + * If there is an input clock and the peripheral is enabled, then | ||
158 | + * ensure the wall clock timer is ticking. Otherwise stop the timers. | ||
159 | + * The compare timer will be updated later. | ||
160 | + */ | ||
161 | + if (freq && (s->cr & CR_EN)) { | ||
162 | + ptimer_run(s->timer_reload, 0); | ||
163 | + } else { | ||
164 | + ptimer_stop(s->timer_reload); | ||
165 | + } | ||
166 | + /* Commit changes to reload timer, so they can propagate. */ | ||
167 | + ptimer_transaction_commit(s->timer_reload); | ||
168 | + /* Update compare timer based on the committed reload timer value. */ | ||
169 | + imx_epit_update_compare_timer(s); | ||
170 | + ptimer_transaction_commit(s->timer_cmp); | ||
142 | } | 171 | } |
143 | 172 | ||
144 | /* XSDT is pointed to by RSDP */ | 173 | /* |
174 | @@ -XXX,XX +XXX,XX @@ static void imx_epit_write_cr(IMXEPITState *s, uint32_t value) | ||
175 | * - write to CR.EN or CR.OCIE | ||
176 | */ | ||
177 | imx_epit_update_int(s); | ||
178 | - | ||
179 | - /* | ||
180 | - * TODO: could we 'break' here for reset? following operations appear | ||
181 | - * to duplicate the work imx_epit_reset() already did. | ||
182 | - */ | ||
183 | - | ||
184 | - ptimer_transaction_begin(s->timer_cmp); | ||
185 | - ptimer_transaction_begin(s->timer_reload); | ||
186 | - | ||
187 | - /* | ||
188 | - * Update the frequency. In case of a reset the input clock was | ||
189 | - * switched off, so this can be skipped. | ||
190 | - */ | ||
191 | - if (!(s->cr & CR_SWR)) { | ||
192 | - freq = imx_epit_get_freq(s); | ||
193 | - if (freq) { | ||
194 | - ptimer_set_freq(s->timer_reload, freq); | ||
195 | - ptimer_set_freq(s->timer_cmp, freq); | ||
196 | - } | ||
197 | - } | ||
198 | - | ||
199 | - if (freq && (s->cr & CR_EN) && !(oldcr & CR_EN)) { | ||
200 | - if (s->cr & CR_ENMOD) { | ||
201 | - if (s->cr & CR_RLD) { | ||
202 | - ptimer_set_limit(s->timer_reload, s->lr, 1); | ||
203 | - ptimer_set_limit(s->timer_cmp, s->lr, 1); | ||
204 | - } else { | ||
205 | - ptimer_set_limit(s->timer_reload, EPIT_TIMER_MAX, 1); | ||
206 | - ptimer_set_limit(s->timer_cmp, EPIT_TIMER_MAX, 1); | ||
207 | - } | ||
208 | - } | ||
209 | - | ||
210 | - imx_epit_reload_compare_timer(s); | ||
211 | - ptimer_run(s->timer_reload, 0); | ||
212 | - if (s->cr & CR_OCIEN) { | ||
213 | - ptimer_run(s->timer_cmp, 0); | ||
214 | - } else { | ||
215 | - ptimer_stop(s->timer_cmp); | ||
216 | - } | ||
217 | - } else if (!(s->cr & CR_EN)) { | ||
218 | - /* stop both timers */ | ||
219 | - ptimer_stop(s->timer_reload); | ||
220 | - ptimer_stop(s->timer_cmp); | ||
221 | - } else if (s->cr & CR_OCIEN) { | ||
222 | - if (!(oldcr & CR_OCIEN)) { | ||
223 | - imx_epit_reload_compare_timer(s); | ||
224 | - ptimer_run(s->timer_cmp, 0); | ||
225 | - } | ||
226 | - } else { | ||
227 | - ptimer_stop(s->timer_cmp); | ||
228 | - } | ||
229 | - | ||
230 | - ptimer_transaction_commit(s->timer_cmp); | ||
231 | - ptimer_transaction_commit(s->timer_reload); | ||
232 | } | ||
233 | |||
234 | static void imx_epit_write_sr(IMXEPITState *s, uint32_t value) | ||
235 | @@ -XXX,XX +XXX,XX @@ static void imx_epit_write_lr(IMXEPITState *s, uint32_t value) | ||
236 | /* If IOVW bit is set then set the timer value */ | ||
237 | ptimer_set_count(s->timer_reload, s->lr); | ||
238 | } | ||
239 | - /* | ||
240 | - * Commit the change to s->timer_reload, so it can propagate. Otherwise | ||
241 | - * the timer interrupt may not fire properly. The commit must happen | ||
242 | - * before calling imx_epit_reload_compare_timer(), which reads | ||
243 | - * s->timer_reload internally again. | ||
244 | - */ | ||
245 | + /* Commit the changes to s->timer_reload, so they can propagate. */ | ||
246 | ptimer_transaction_commit(s->timer_reload); | ||
247 | - imx_epit_reload_compare_timer(s); | ||
248 | + /* Update the compare timer based on the committed reload timer value. */ | ||
249 | + imx_epit_update_compare_timer(s); | ||
250 | ptimer_transaction_commit(s->timer_cmp); | ||
251 | } | ||
252 | |||
253 | @@ -XXX,XX +XXX,XX @@ static void imx_epit_write_cmp(IMXEPITState *s, uint32_t value) | ||
254 | { | ||
255 | s->cmp = value; | ||
256 | |||
257 | + /* Update the compare timer based on the committed reload timer value. */ | ||
258 | ptimer_transaction_begin(s->timer_cmp); | ||
259 | - imx_epit_reload_compare_timer(s); | ||
260 | + imx_epit_update_compare_timer(s); | ||
261 | ptimer_transaction_commit(s->timer_cmp); | ||
262 | } | ||
263 | |||
264 | @@ -XXX,XX +XXX,XX @@ static void imx_epit_cmp(void *opaque) | ||
265 | { | ||
266 | IMXEPITState *s = IMX_EPIT(opaque); | ||
267 | |||
268 | + /* The cmp ptimer can't be running when the peripheral is disabled */ | ||
269 | + assert(s->cr & CR_EN); | ||
270 | + | ||
271 | DPRINTF("sr was %d\n", s->sr); | ||
272 | /* Set interrupt status bit SR.OCIF and update the interrupt state */ | ||
273 | s->sr |= SR_OCIF; | ||
145 | -- | 274 | -- |
146 | 2.17.0 | 275 | 2.25.1 |
147 | |||
148 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Fabiano Rosas <farosas@suse.de> | ||
1 | 2 | ||
3 | Fix these: | ||
4 | |||
5 | WARNING: Block comments use a leading /* on a separate line | ||
6 | WARNING: Block comments use * on subsequent lines | ||
7 | WARNING: Block comments use a trailing */ on a separate line | ||
8 | |||
9 | Signed-off-by: Fabiano Rosas <farosas@suse.de> | ||
10 | Reviewed-by: Claudio Fontana <cfontana@suse.de> | ||
11 | Reviewed-by: Cornelia Huck <cohuck@redhat.com> | ||
12 | Message-id: 20221213190537.511-2-farosas@suse.de | ||
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
14 | --- | ||
15 | target/arm/helper.c | 323 +++++++++++++++++++++++++++++--------------- | ||
16 | 1 file changed, 215 insertions(+), 108 deletions(-) | ||
17 | |||
18 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
19 | index XXXXXXX..XXXXXXX 100644 | ||
20 | --- a/target/arm/helper.c | ||
21 | +++ b/target/arm/helper.c | ||
22 | @@ -XXX,XX +XXX,XX @@ uint64_t read_raw_cp_reg(CPUARMState *env, const ARMCPRegInfo *ri) | ||
23 | static void write_raw_cp_reg(CPUARMState *env, const ARMCPRegInfo *ri, | ||
24 | uint64_t v) | ||
25 | { | ||
26 | - /* Raw write of a coprocessor register (as needed for migration, etc). | ||
27 | + /* | ||
28 | + * Raw write of a coprocessor register (as needed for migration, etc). | ||
29 | * Note that constant registers are treated as write-ignored; the | ||
30 | * caller should check for success by whether a readback gives the | ||
31 | * value written. | ||
32 | @@ -XXX,XX +XXX,XX @@ static void write_raw_cp_reg(CPUARMState *env, const ARMCPRegInfo *ri, | ||
33 | |||
34 | static bool raw_accessors_invalid(const ARMCPRegInfo *ri) | ||
35 | { | ||
36 | - /* Return true if the regdef would cause an assertion if you called | ||
37 | + /* | ||
38 | + * Return true if the regdef would cause an assertion if you called | ||
39 | * read_raw_cp_reg() or write_raw_cp_reg() on it (ie if it is a | ||
40 | * program bug for it not to have the NO_RAW flag). | ||
41 | * NB that returning false here doesn't necessarily mean that calling | ||
42 | @@ -XXX,XX +XXX,XX @@ bool write_list_to_cpustate(ARMCPU *cpu) | ||
43 | if (ri->type & ARM_CP_NO_RAW) { | ||
44 | continue; | ||
45 | } | ||
46 | - /* Write value and confirm it reads back as written | ||
47 | + /* | ||
48 | + * Write value and confirm it reads back as written | ||
49 | * (to catch read-only registers and partially read-only | ||
50 | * registers where the incoming migration value doesn't match) | ||
51 | */ | ||
52 | @@ -XXX,XX +XXX,XX @@ static gint cpreg_key_compare(gconstpointer a, gconstpointer b) | ||
53 | |||
54 | void init_cpreg_list(ARMCPU *cpu) | ||
55 | { | ||
56 | - /* Initialise the cpreg_tuples[] array based on the cp_regs hash. | ||
57 | + /* | ||
58 | + * Initialise the cpreg_tuples[] array based on the cp_regs hash. | ||
59 | * Note that we require cpreg_tuples[] to be sorted by key ID. | ||
60 | */ | ||
61 | GList *keys; | ||
62 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_el3_aa32ns(CPUARMState *env, | ||
63 | return CP_ACCESS_OK; | ||
64 | } | ||
65 | |||
66 | -/* Some secure-only AArch32 registers trap to EL3 if used from | ||
67 | +/* | ||
68 | + * Some secure-only AArch32 registers trap to EL3 if used from | ||
69 | * Secure EL1 (but are just ordinary UNDEF in other non-EL3 contexts). | ||
70 | * Note that an access from Secure EL1 can only happen if EL3 is AArch64. | ||
71 | * We assume that the .access field is set to PL1_RW. | ||
72 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_trap_aa32s_el1(CPUARMState *env, | ||
73 | return CP_ACCESS_TRAP_UNCATEGORIZED; | ||
74 | } | ||
75 | |||
76 | -/* Check for traps to performance monitor registers, which are controlled | ||
77 | +/* | ||
78 | + * Check for traps to performance monitor registers, which are controlled | ||
79 | * by MDCR_EL2.TPM for EL2 and MDCR_EL3.TPM for EL3. | ||
80 | */ | ||
81 | static CPAccessResult access_tpm(CPUARMState *env, const ARMCPRegInfo *ri, | ||
82 | @@ -XXX,XX +XXX,XX @@ static void fcse_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
83 | ARMCPU *cpu = env_archcpu(env); | ||
84 | |||
85 | if (raw_read(env, ri) != value) { | ||
86 | - /* Unlike real hardware the qemu TLB uses virtual addresses, | ||
87 | + /* | ||
88 | + * Unlike real hardware the qemu TLB uses virtual addresses, | ||
89 | * not modified virtual addresses, so this causes a TLB flush. | ||
90 | */ | ||
91 | tlb_flush(CPU(cpu)); | ||
92 | @@ -XXX,XX +XXX,XX @@ static void contextidr_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
93 | |||
94 | if (raw_read(env, ri) != value && !arm_feature(env, ARM_FEATURE_PMSA) | ||
95 | && !extended_addresses_enabled(env)) { | ||
96 | - /* For VMSA (when not using the LPAE long descriptor page table | ||
97 | + /* | ||
98 | + * For VMSA (when not using the LPAE long descriptor page table | ||
99 | * format) this register includes the ASID, so do a TLB flush. | ||
100 | * For PMSA it is purely a process ID and no action is needed. | ||
101 | */ | ||
102 | @@ -XXX,XX +XXX,XX @@ static void tlbiipas2is_hyp_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
103 | } | ||
104 | |||
105 | static const ARMCPRegInfo cp_reginfo[] = { | ||
106 | - /* Define the secure and non-secure FCSE identifier CP registers | ||
107 | + /* | ||
108 | + * Define the secure and non-secure FCSE identifier CP registers | ||
109 | * separately because there is no secure bank in V8 (no _EL3). This allows | ||
110 | * the secure register to be properly reset and migrated. There is also no | ||
111 | * v8 EL1 version of the register so the non-secure instance stands alone. | ||
112 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo cp_reginfo[] = { | ||
113 | .access = PL1_RW, .secure = ARM_CP_SECSTATE_S, | ||
114 | .fieldoffset = offsetof(CPUARMState, cp15.fcseidr_s), | ||
115 | .resetvalue = 0, .writefn = fcse_write, .raw_writefn = raw_write, }, | ||
116 | - /* Define the secure and non-secure context identifier CP registers | ||
117 | + /* | ||
118 | + * Define the secure and non-secure context identifier CP registers | ||
119 | * separately because there is no secure bank in V8 (no _EL3). This allows | ||
120 | * the secure register to be properly reset and migrated. In the | ||
121 | * non-secure case, the 32-bit register will have reset and migration | ||
122 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo cp_reginfo[] = { | ||
123 | }; | ||
124 | |||
125 | static const ARMCPRegInfo not_v8_cp_reginfo[] = { | ||
126 | - /* NB: Some of these registers exist in v8 but with more precise | ||
127 | + /* | ||
128 | + * NB: Some of these registers exist in v8 but with more precise | ||
129 | * definitions that don't use CP_ANY wildcards (mostly in v8_cp_reginfo[]). | ||
130 | */ | ||
131 | /* MMU Domain access control / MPU write buffer control */ | ||
132 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo not_v8_cp_reginfo[] = { | ||
133 | .writefn = dacr_write, .raw_writefn = raw_write, | ||
134 | .bank_fieldoffsets = { offsetoflow32(CPUARMState, cp15.dacr_s), | ||
135 | offsetoflow32(CPUARMState, cp15.dacr_ns) } }, | ||
136 | - /* ARMv7 allocates a range of implementation defined TLB LOCKDOWN regs. | ||
137 | + /* | ||
138 | + * ARMv7 allocates a range of implementation defined TLB LOCKDOWN regs. | ||
139 | * For v6 and v5, these mappings are overly broad. | ||
140 | */ | ||
141 | { .name = "TLB_LOCKDOWN", .cp = 15, .crn = 10, .crm = 0, | ||
142 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo not_v8_cp_reginfo[] = { | ||
143 | }; | ||
144 | |||
145 | static const ARMCPRegInfo not_v6_cp_reginfo[] = { | ||
146 | - /* Not all pre-v6 cores implemented this WFI, so this is slightly | ||
147 | + /* | ||
148 | + * Not all pre-v6 cores implemented this WFI, so this is slightly | ||
149 | * over-broad. | ||
150 | */ | ||
151 | { .name = "WFI_v5", .cp = 15, .crn = 7, .crm = 8, .opc1 = 0, .opc2 = 2, | ||
152 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo not_v6_cp_reginfo[] = { | ||
153 | }; | ||
154 | |||
155 | static const ARMCPRegInfo not_v7_cp_reginfo[] = { | ||
156 | - /* Standard v6 WFI (also used in some pre-v6 cores); not in v7 (which | ||
157 | + /* | ||
158 | + * Standard v6 WFI (also used in some pre-v6 cores); not in v7 (which | ||
159 | * is UNPREDICTABLE; we choose to NOP as most implementations do). | ||
160 | */ | ||
161 | { .name = "WFI_v6", .cp = 15, .crn = 7, .crm = 0, .opc1 = 0, .opc2 = 4, | ||
162 | .access = PL1_W, .type = ARM_CP_WFI }, | ||
163 | - /* L1 cache lockdown. Not architectural in v6 and earlier but in practice | ||
164 | + /* | ||
165 | + * L1 cache lockdown. Not architectural in v6 and earlier but in practice | ||
166 | * implemented in 926, 946, 1026, 1136, 1176 and 11MPCore. StrongARM and | ||
167 | * OMAPCP will override this space. | ||
168 | */ | ||
169 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo not_v7_cp_reginfo[] = { | ||
170 | { .name = "DUMMY", .cp = 15, .crn = 0, .crm = 0, .opc1 = 1, .opc2 = CP_ANY, | ||
171 | .access = PL1_R, .type = ARM_CP_CONST | ARM_CP_NO_RAW, | ||
172 | .resetvalue = 0 }, | ||
173 | - /* We don't implement pre-v7 debug but most CPUs had at least a DBGDIDR; | ||
174 | + /* | ||
175 | + * We don't implement pre-v7 debug but most CPUs had at least a DBGDIDR; | ||
176 | * implementing it as RAZ means the "debug architecture version" bits | ||
177 | * will read as a reserved value, which should cause Linux to not try | ||
178 | * to use the debug hardware. | ||
179 | */ | ||
180 | { .name = "DBGDIDR", .cp = 14, .crn = 0, .crm = 0, .opc1 = 0, .opc2 = 0, | ||
181 | .access = PL0_R, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
182 | - /* MMU TLB control. Note that the wildcarding means we cover not just | ||
183 | + /* | ||
184 | + * MMU TLB control. Note that the wildcarding means we cover not just | ||
185 | * the unified TLB ops but also the dside/iside/inner-shareable variants. | ||
186 | */ | ||
187 | { .name = "TLBIALL", .cp = 15, .crn = 8, .crm = CP_ANY, | ||
188 | @@ -XXX,XX +XXX,XX @@ static void cpacr_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
189 | |||
190 | /* In ARMv8 most bits of CPACR_EL1 are RES0. */ | ||
191 | if (!arm_feature(env, ARM_FEATURE_V8)) { | ||
192 | - /* ARMv7 defines bits for unimplemented coprocessors as RAZ/WI. | ||
193 | + /* | ||
194 | + * ARMv7 defines bits for unimplemented coprocessors as RAZ/WI. | ||
195 | * ASEDIS [31] and D32DIS [30] are both UNK/SBZP without VFP. | ||
196 | * TRCDIS [28] is RAZ/WI since we do not implement a trace macrocell. | ||
197 | */ | ||
198 | @@ -XXX,XX +XXX,XX @@ static void cpacr_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
199 | value |= R_CPACR_ASEDIS_MASK; | ||
200 | } | ||
201 | |||
202 | - /* VFPv3 and upwards with NEON implement 32 double precision | ||
203 | + /* | ||
204 | + * VFPv3 and upwards with NEON implement 32 double precision | ||
205 | * registers (D0-D31). | ||
206 | */ | ||
207 | if (!cpu_isar_feature(aa32_simd_r32, env_archcpu(env))) { | ||
208 | @@ -XXX,XX +XXX,XX @@ static uint64_t cpacr_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
209 | |||
210 | static void cpacr_reset(CPUARMState *env, const ARMCPRegInfo *ri) | ||
211 | { | ||
212 | - /* Call cpacr_write() so that we reset with the correct RAO bits set | ||
213 | + /* | ||
214 | + * Call cpacr_write() so that we reset with the correct RAO bits set | ||
215 | * for our CPU features. | ||
216 | */ | ||
217 | cpacr_write(env, ri, 0); | ||
218 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v6_cp_reginfo[] = { | ||
219 | { .name = "MVA_prefetch", | ||
220 | .cp = 15, .crn = 7, .crm = 13, .opc1 = 0, .opc2 = 1, | ||
221 | .access = PL1_W, .type = ARM_CP_NOP }, | ||
222 | - /* We need to break the TB after ISB to execute self-modifying code | ||
223 | + /* | ||
224 | + * We need to break the TB after ISB to execute self-modifying code | ||
225 | * correctly and also to take any pending interrupts immediately. | ||
226 | * So use arm_cp_write_ignore() function instead of ARM_CP_NOP flag. | ||
227 | */ | ||
228 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v6_cp_reginfo[] = { | ||
229 | .bank_fieldoffsets = { offsetof(CPUARMState, cp15.ifar_s), | ||
230 | offsetof(CPUARMState, cp15.ifar_ns) }, | ||
231 | .resetvalue = 0, }, | ||
232 | - /* Watchpoint Fault Address Register : should actually only be present | ||
233 | + /* | ||
234 | + * Watchpoint Fault Address Register : should actually only be present | ||
235 | * for 1136, 1176, 11MPCore. | ||
236 | */ | ||
237 | { .name = "WFAR", .cp = 15, .crn = 6, .crm = 0, .opc1 = 0, .opc2 = 1, | ||
238 | @@ -XXX,XX +XXX,XX @@ static bool event_supported(uint16_t number) | ||
239 | static CPAccessResult pmreg_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
240 | bool isread) | ||
241 | { | ||
242 | - /* Performance monitor registers user accessibility is controlled | ||
243 | + /* | ||
244 | + * Performance monitor registers user accessibility is controlled | ||
245 | * by PMUSERENR. MDCR_EL2.TPM and MDCR_EL3.TPM allow configurable | ||
246 | * trapping to EL2 or EL3 for other accesses. | ||
247 | */ | ||
248 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult pmreg_access_ccntr(CPUARMState *env, | ||
249 | (MDCR_HPME | MDCR_HPMD | MDCR_HPMN | MDCR_HCCD | MDCR_HLP) | ||
250 | #define MDCR_EL3_PMU_ENABLE_BITS (MDCR_SPME | MDCR_SCCD) | ||
251 | |||
252 | -/* Returns true if the counter (pass 31 for PMCCNTR) should count events using | ||
253 | +/* | ||
254 | + * Returns true if the counter (pass 31 for PMCCNTR) should count events using | ||
255 | * the current EL, security state, and register configuration. | ||
256 | */ | ||
257 | static bool pmu_counter_enabled(CPUARMState *env, uint8_t counter) | ||
258 | @@ -XXX,XX +XXX,XX @@ static uint64_t pmccntr_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
259 | static void pmselr_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
260 | uint64_t value) | ||
261 | { | ||
262 | - /* The value of PMSELR.SEL affects the behavior of PMXEVTYPER and | ||
263 | + /* | ||
264 | + * The value of PMSELR.SEL affects the behavior of PMXEVTYPER and | ||
265 | * PMXEVCNTR. We allow [0..31] to be written to PMSELR here; in the | ||
266 | * meanwhile, we check PMSELR.SEL when PMXEVTYPER and PMXEVCNTR are | ||
267 | * accessed. | ||
268 | @@ -XXX,XX +XXX,XX @@ static void pmevtyper_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
269 | env->cp15.c14_pmevtyper[counter] = value & PMXEVTYPER_MASK; | ||
270 | pmevcntr_op_finish(env, counter); | ||
271 | } | ||
272 | - /* Attempts to access PMXEVTYPER are CONSTRAINED UNPREDICTABLE when | ||
273 | + /* | ||
274 | + * Attempts to access PMXEVTYPER are CONSTRAINED UNPREDICTABLE when | ||
275 | * PMSELR value is equal to or greater than the number of implemented | ||
276 | * counters, but not equal to 0x1f. We opt to behave as a RAZ/WI. | ||
277 | */ | ||
278 | @@ -XXX,XX +XXX,XX @@ static uint64_t pmevcntr_read(CPUARMState *env, const ARMCPRegInfo *ri, | ||
279 | } | ||
280 | return ret; | ||
281 | } else { | ||
282 | - /* We opt to behave as a RAZ/WI when attempts to access PM[X]EVCNTR | ||
283 | - * are CONSTRAINED UNPREDICTABLE. */ | ||
284 | + /* | ||
285 | + * We opt to behave as a RAZ/WI when attempts to access PM[X]EVCNTR | ||
286 | + * are CONSTRAINED UNPREDICTABLE. | ||
287 | + */ | ||
288 | return 0; | ||
289 | } | ||
290 | } | ||
291 | @@ -XXX,XX +XXX,XX @@ static void pmintenclr_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
292 | static void vbar_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
293 | uint64_t value) | ||
294 | { | ||
295 | - /* Note that even though the AArch64 view of this register has bits | ||
296 | + /* | ||
297 | + * Note that even though the AArch64 view of this register has bits | ||
298 | * [10:0] all RES0 we can only mask the bottom 5, to comply with the | ||
299 | * architectural requirements for bits which are RES0 only in some | ||
300 | * contexts. (ARMv8 would permit us to do no masking at all, but ARMv7 | ||
301 | @@ -XXX,XX +XXX,XX @@ static void scr_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
302 | if (!arm_feature(env, ARM_FEATURE_EL2)) { | ||
303 | valid_mask &= ~SCR_HCE; | ||
304 | |||
305 | - /* On ARMv7, SMD (or SCD as it is called in v7) is only | ||
306 | + /* | ||
307 | + * On ARMv7, SMD (or SCD as it is called in v7) is only | ||
308 | * supported if EL2 exists. The bit is UNK/SBZP when | ||
309 | * EL2 is unavailable. In QEMU ARMv7, we force it to always zero | ||
310 | * when EL2 is unavailable. | ||
311 | @@ -XXX,XX +XXX,XX @@ static uint64_t ccsidr_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
312 | { | ||
313 | ARMCPU *cpu = env_archcpu(env); | ||
314 | |||
315 | - /* Acquire the CSSELR index from the bank corresponding to the CCSIDR | ||
316 | + /* | ||
317 | + * Acquire the CSSELR index from the bank corresponding to the CCSIDR | ||
318 | * bank | ||
319 | */ | ||
320 | uint32_t index = A32_BANKED_REG_GET(env, csselr, | ||
321 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v7_cp_reginfo[] = { | ||
322 | /* the old v6 WFI, UNPREDICTABLE in v7 but we choose to NOP */ | ||
323 | { .name = "NOP", .cp = 15, .crn = 7, .crm = 0, .opc1 = 0, .opc2 = 4, | ||
324 | .access = PL1_W, .type = ARM_CP_NOP }, | ||
325 | - /* Performance monitors are implementation defined in v7, | ||
326 | + /* | ||
327 | + * Performance monitors are implementation defined in v7, | ||
328 | * but with an ARM recommended set of registers, which we | ||
329 | * follow. | ||
330 | * | ||
331 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v7_cp_reginfo[] = { | ||
332 | .writefn = csselr_write, .resetvalue = 0, | ||
333 | .bank_fieldoffsets = { offsetof(CPUARMState, cp15.csselr_s), | ||
334 | offsetof(CPUARMState, cp15.csselr_ns) } }, | ||
335 | - /* Auxiliary ID register: this actually has an IMPDEF value but for now | ||
336 | + /* | ||
337 | + * Auxiliary ID register: this actually has an IMPDEF value but for now | ||
338 | * just RAZ for all cores: | ||
339 | */ | ||
340 | { .name = "AIDR", .state = ARM_CP_STATE_BOTH, | ||
341 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v7_cp_reginfo[] = { | ||
342 | .access = PL1_R, .type = ARM_CP_CONST, | ||
343 | .accessfn = access_aa64_tid1, | ||
344 | .resetvalue = 0 }, | ||
345 | - /* Auxiliary fault status registers: these also are IMPDEF, and we | ||
346 | + /* | ||
347 | + * Auxiliary fault status registers: these also are IMPDEF, and we | ||
348 | * choose to RAZ/WI for all cores. | ||
349 | */ | ||
350 | { .name = "AFSR0_EL1", .state = ARM_CP_STATE_BOTH, | ||
351 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v7_cp_reginfo[] = { | ||
352 | .opc0 = 3, .opc1 = 0, .crn = 5, .crm = 1, .opc2 = 1, | ||
353 | .access = PL1_RW, .accessfn = access_tvm_trvm, | ||
354 | .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
355 | - /* MAIR can just read-as-written because we don't implement caches | ||
356 | + /* | ||
357 | + * MAIR can just read-as-written because we don't implement caches | ||
358 | * and so don't need to care about memory attributes. | ||
359 | */ | ||
360 | { .name = "MAIR_EL1", .state = ARM_CP_STATE_AA64, | ||
361 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v7_cp_reginfo[] = { | ||
362 | .opc0 = 3, .opc1 = 6, .crn = 10, .crm = 2, .opc2 = 0, | ||
363 | .access = PL3_RW, .fieldoffset = offsetof(CPUARMState, cp15.mair_el[3]), | ||
364 | .resetvalue = 0 }, | ||
365 | - /* For non-long-descriptor page tables these are PRRR and NMRR; | ||
366 | + /* | ||
367 | + * For non-long-descriptor page tables these are PRRR and NMRR; | ||
368 | * regardless they still act as reads-as-written for QEMU. | ||
369 | */ | ||
370 | - /* MAIR0/1 are defined separately from their 64-bit counterpart which | ||
371 | + /* | ||
372 | + * MAIR0/1 are defined separately from their 64-bit counterpart which | ||
373 | * allows them to assign the correct fieldoffset based on the endianness | ||
374 | * handled in the field definitions. | ||
375 | */ | ||
376 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v6k_cp_reginfo[] = { | ||
377 | static CPAccessResult gt_cntfrq_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
378 | bool isread) | ||
379 | { | ||
380 | - /* CNTFRQ: not visible from PL0 if both PL0PCTEN and PL0VCTEN are zero. | ||
381 | + /* | ||
382 | + * CNTFRQ: not visible from PL0 if both PL0PCTEN and PL0VCTEN are zero. | ||
383 | * Writable only at the highest implemented exception level. | ||
384 | */ | ||
385 | int el = arm_current_el(env); | ||
386 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult gt_stimer_access(CPUARMState *env, | ||
387 | const ARMCPRegInfo *ri, | ||
388 | bool isread) | ||
389 | { | ||
390 | - /* The AArch64 register view of the secure physical timer is | ||
391 | + /* | ||
392 | + * The AArch64 register view of the secure physical timer is | ||
393 | * always accessible from EL3, and configurably accessible from | ||
394 | * Secure EL1. | ||
395 | */ | ||
396 | @@ -XXX,XX +XXX,XX @@ static void gt_recalc_timer(ARMCPU *cpu, int timeridx) | ||
397 | ARMGenericTimer *gt = &cpu->env.cp15.c14_timer[timeridx]; | ||
398 | |||
399 | if (gt->ctl & 1) { | ||
400 | - /* Timer enabled: calculate and set current ISTATUS, irq, and | ||
401 | + /* | ||
402 | + * Timer enabled: calculate and set current ISTATUS, irq, and | ||
403 | * reset timer to when ISTATUS next has to change | ||
404 | */ | ||
405 | uint64_t offset = timeridx == GTIMER_VIRT ? | ||
406 | @@ -XXX,XX +XXX,XX @@ static void gt_recalc_timer(ARMCPU *cpu, int timeridx) | ||
407 | /* Next transition is when we hit cval */ | ||
408 | nexttick = gt->cval + offset; | ||
409 | } | ||
410 | - /* Note that the desired next expiry time might be beyond the | ||
411 | + /* | ||
412 | + * Note that the desired next expiry time might be beyond the | ||
413 | * signed-64-bit range of a QEMUTimer -- in this case we just | ||
414 | * set the timer for as far in the future as possible. When the | ||
415 | * timer expires we will reset the timer for any remaining period. | ||
416 | @@ -XXX,XX +XXX,XX @@ static void gt_ctl_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
417 | /* Enable toggled */ | ||
418 | gt_recalc_timer(cpu, timeridx); | ||
419 | } else if ((oldval ^ value) & 2) { | ||
420 | - /* IMASK toggled: don't need to recalculate, | ||
421 | + /* | ||
422 | + * IMASK toggled: don't need to recalculate, | ||
423 | * just set the interrupt line based on ISTATUS | ||
424 | */ | ||
425 | int irqstate = (oldval & 4) && !(value & 2); | ||
426 | @@ -XXX,XX +XXX,XX @@ static void arm_gt_cntfrq_reset(CPUARMState *env, const ARMCPRegInfo *opaque) | ||
427 | } | ||
428 | |||
429 | static const ARMCPRegInfo generic_timer_cp_reginfo[] = { | ||
430 | - /* Note that CNTFRQ is purely reads-as-written for the benefit | ||
431 | + /* | ||
432 | + * Note that CNTFRQ is purely reads-as-written for the benefit | ||
433 | * of software; writing it doesn't actually change the timer frequency. | ||
434 | * Our reset value matches the fixed frequency we implement the timer at. | ||
435 | */ | ||
436 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo generic_timer_cp_reginfo[] = { | ||
437 | .readfn = gt_virt_redir_cval_read, .raw_readfn = raw_read, | ||
438 | .writefn = gt_virt_redir_cval_write, .raw_writefn = raw_write, | ||
439 | }, | ||
440 | - /* Secure timer -- this is actually restricted to only EL3 | ||
441 | + /* | ||
442 | + * Secure timer -- this is actually restricted to only EL3 | ||
443 | * and configurably Secure-EL1 via the accessfn. | ||
444 | */ | ||
445 | { .name = "CNTPS_TVAL_EL1", .state = ARM_CP_STATE_AA64, | ||
446 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult e2h_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
447 | |||
448 | #else | ||
449 | |||
450 | -/* In user-mode most of the generic timer registers are inaccessible | ||
451 | +/* | ||
452 | + * In user-mode most of the generic timer registers are inaccessible | ||
453 | * however modern kernels (4.12+) allow access to cntvct_el0 | ||
454 | */ | ||
455 | |||
456 | @@ -XXX,XX +XXX,XX @@ static uint64_t gt_virt_cnt_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
457 | { | ||
458 | ARMCPU *cpu = env_archcpu(env); | ||
459 | |||
460 | - /* Currently we have no support for QEMUTimer in linux-user so we | ||
461 | + /* | ||
462 | + * Currently we have no support for QEMUTimer in linux-user so we | ||
463 | * can't call gt_get_countervalue(env), instead we directly | ||
464 | * call the lower level functions. | ||
465 | */ | ||
466 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult ats_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
467 | bool isread) | ||
468 | { | ||
469 | if (ri->opc2 & 4) { | ||
470 | - /* The ATS12NSO* operations must trap to EL3 or EL2 if executed in | ||
471 | + /* | ||
472 | + * The ATS12NSO* operations must trap to EL3 or EL2 if executed in | ||
473 | * Secure EL1 (which can only happen if EL3 is AArch64). | ||
474 | * They are simply UNDEF if executed from NS EL1. | ||
475 | * They function normally from EL2 or EL3. | ||
476 | @@ -XXX,XX +XXX,XX @@ static uint64_t do_ats_write(CPUARMState *env, uint64_t value, | ||
477 | } | ||
478 | } | ||
479 | } else { | ||
480 | - /* fsr is a DFSR/IFSR value for the short descriptor | ||
481 | + /* | ||
482 | + * fsr is a DFSR/IFSR value for the short descriptor | ||
483 | * translation table format (with WnR always clear). | ||
484 | * Convert it to a 32-bit PAR. | ||
485 | */ | ||
486 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo pmsav8r_cp_reginfo[] = { | ||
487 | }; | ||
488 | |||
489 | static const ARMCPRegInfo pmsav7_cp_reginfo[] = { | ||
490 | - /* Reset for all these registers is handled in arm_cpu_reset(), | ||
491 | + /* | ||
492 | + * Reset for all these registers is handled in arm_cpu_reset(), | ||
493 | * because the PMSAv7 is also used by M-profile CPUs, which do | ||
494 | * not register cpregs but still need the state to be reset. | ||
495 | */ | ||
496 | @@ -XXX,XX +XXX,XX @@ static void vmsa_ttbcr_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
497 | } | ||
498 | |||
499 | if (arm_feature(env, ARM_FEATURE_LPAE)) { | ||
500 | - /* With LPAE the TTBCR could result in a change of ASID | ||
501 | + /* | ||
502 | + * With LPAE the TTBCR could result in a change of ASID | ||
503 | * via the TTBCR.A1 bit, so do a TLB flush. | ||
504 | */ | ||
505 | tlb_flush(CPU(cpu)); | ||
506 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo vmsa_cp_reginfo[] = { | ||
507 | offsetoflow32(CPUARMState, cp15.tcr_el[1])} }, | ||
508 | }; | ||
509 | |||
510 | -/* Note that unlike TTBCR, writing to TTBCR2 does not require flushing | ||
511 | +/* | ||
512 | + * Note that unlike TTBCR, writing to TTBCR2 does not require flushing | ||
513 | * qemu tlbs nor adjusting cached masks. | ||
514 | */ | ||
515 | static const ARMCPRegInfo ttbcr2_reginfo = { | ||
516 | @@ -XXX,XX +XXX,XX @@ static void omap_wfi_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
517 | static void omap_cachemaint_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
518 | uint64_t value) | ||
519 | { | ||
520 | - /* On OMAP there are registers indicating the max/min index of dcache lines | ||
521 | + /* | ||
522 | + * On OMAP there are registers indicating the max/min index of dcache lines | ||
523 | * containing a dirty line; cache flush operations have to reset these. | ||
524 | */ | ||
525 | env->cp15.c15_i_max = 0x000; | ||
526 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo omap_cp_reginfo[] = { | ||
527 | .crm = 8, .opc1 = 0, .opc2 = 0, .access = PL1_RW, | ||
528 | .type = ARM_CP_NO_RAW, | ||
529 | .readfn = arm_cp_read_zero, .writefn = omap_wfi_write, }, | ||
530 | - /* TODO: Peripheral port remap register: | ||
531 | + /* | ||
532 | + * TODO: Peripheral port remap register: | ||
533 | * On OMAP2 mcr p15, 0, rn, c15, c2, 4 sets up the interrupt controller | ||
534 | * base address at $rn & ~0xfff and map size of 0x200 << ($rn & 0xfff), | ||
535 | * when MMU is off. | ||
536 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo xscale_cp_reginfo[] = { | ||
537 | .cp = 15, .crn = 1, .crm = 0, .opc1 = 0, .opc2 = 1, .access = PL1_RW, | ||
538 | .fieldoffset = offsetof(CPUARMState, cp15.c1_xscaleauxcr), | ||
539 | .resetvalue = 0, }, | ||
540 | - /* XScale specific cache-lockdown: since we have no cache we NOP these | ||
541 | + /* | ||
542 | + * XScale specific cache-lockdown: since we have no cache we NOP these | ||
543 | * and hope the guest does not really rely on cache behaviour. | ||
544 | */ | ||
545 | { .name = "XSCALE_LOCK_ICACHE_LINE", | ||
546 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo xscale_cp_reginfo[] = { | ||
547 | }; | ||
548 | |||
549 | static const ARMCPRegInfo dummy_c15_cp_reginfo[] = { | ||
550 | - /* RAZ/WI the whole crn=15 space, when we don't have a more specific | ||
551 | + /* | ||
552 | + * RAZ/WI the whole crn=15 space, when we don't have a more specific | ||
553 | * implementation of this implementation-defined space. | ||
554 | * Ideally this should eventually disappear in favour of actually | ||
555 | * implementing the correct behaviour for all cores. | ||
556 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo cache_block_ops_cp_reginfo[] = { | ||
557 | }; | ||
558 | |||
559 | static const ARMCPRegInfo cache_test_clean_cp_reginfo[] = { | ||
560 | - /* The cache test-and-clean instructions always return (1 << 30) | ||
561 | + /* | ||
562 | + * The cache test-and-clean instructions always return (1 << 30) | ||
563 | * to indicate that there are no dirty cache lines. | ||
564 | */ | ||
565 | { .name = "TC_DCACHE", .cp = 15, .crn = 7, .crm = 10, .opc1 = 0, .opc2 = 3, | ||
566 | @@ -XXX,XX +XXX,XX @@ static uint64_t mpidr_read_val(CPUARMState *env) | ||
567 | |||
568 | if (arm_feature(env, ARM_FEATURE_V7MP)) { | ||
569 | mpidr |= (1U << 31); | ||
570 | - /* Cores which are uniprocessor (non-coherent) | ||
571 | + /* | ||
572 | + * Cores which are uniprocessor (non-coherent) | ||
573 | * but still implement the MP extensions set | ||
574 | * bit 30. (For instance, Cortex-R5). | ||
575 | */ | ||
576 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tocu(CPUARMState *env, const ARMCPRegInfo *ri, | ||
577 | return do_cacheop_pou_access(env, HCR_TOCU | HCR_TPU); | ||
578 | } | ||
579 | |||
580 | -/* See: D4.7.2 TLB maintenance requirements and the TLB maintenance instructions | ||
581 | +/* | ||
582 | + * See: D4.7.2 TLB maintenance requirements and the TLB maintenance instructions | ||
583 | * Page D4-1736 (DDI0487A.b) | ||
584 | */ | ||
585 | |||
586 | @@ -XXX,XX +XXX,XX @@ static void tlbi_aa64_alle3is_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
587 | static void tlbi_aa64_vae2_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
588 | uint64_t value) | ||
589 | { | ||
590 | - /* Invalidate by VA, EL2 | ||
591 | + /* | ||
592 | + * Invalidate by VA, EL2 | ||
593 | * Currently handles both VAE2 and VALE2, since we don't support | ||
594 | * flush-last-level-only. | ||
595 | */ | ||
596 | @@ -XXX,XX +XXX,XX @@ static void tlbi_aa64_vae2_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
597 | static void tlbi_aa64_vae3_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
598 | uint64_t value) | ||
599 | { | ||
600 | - /* Invalidate by VA, EL3 | ||
601 | + /* | ||
602 | + * Invalidate by VA, EL3 | ||
603 | * Currently handles both VAE3 and VALE3, since we don't support | ||
604 | * flush-last-level-only. | ||
605 | */ | ||
606 | @@ -XXX,XX +XXX,XX @@ static void tlbi_aa64_vae1is_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
607 | static void tlbi_aa64_vae1_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
608 | uint64_t value) | ||
609 | { | ||
610 | - /* Invalidate by VA, EL1&0 (AArch64 version). | ||
611 | + /* | ||
612 | + * Invalidate by VA, EL1&0 (AArch64 version). | ||
613 | * Currently handles all of VAE1, VAAE1, VAALE1 and VALE1, | ||
614 | * since we don't support flush-for-specific-ASID-only or | ||
615 | * flush-last-level-only. | ||
616 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult sp_el0_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
617 | bool isread) | ||
618 | { | ||
619 | if (!(env->pstate & PSTATE_SP)) { | ||
620 | - /* Access to SP_EL0 is undefined if it's being used as | ||
621 | + /* | ||
622 | + * Access to SP_EL0 is undefined if it's being used as | ||
623 | * the stack pointer. | ||
624 | */ | ||
625 | return CP_ACCESS_TRAP_UNCATEGORIZED; | ||
626 | @@ -XXX,XX +XXX,XX @@ static void sctlr_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
627 | } | ||
628 | |||
629 | if (raw_read(env, ri) == value) { | ||
630 | - /* Skip the TLB flush if nothing actually changed; Linux likes | ||
631 | + /* | ||
632 | + * Skip the TLB flush if nothing actually changed; Linux likes | ||
633 | * to do a lot of pointless SCTLR writes. | ||
634 | */ | ||
635 | return; | ||
636 | @@ -XXX,XX +XXX,XX @@ static void mdcr_el2_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
637 | } | ||
638 | |||
639 | static const ARMCPRegInfo v8_cp_reginfo[] = { | ||
640 | - /* Minimal set of EL0-visible registers. This will need to be expanded | ||
641 | + /* | ||
642 | + * Minimal set of EL0-visible registers. This will need to be expanded | ||
643 | * significantly for system emulation of AArch64 CPUs. | ||
644 | */ | ||
645 | { .name = "NZCV", .state = ARM_CP_STATE_AA64, | ||
646 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v8_cp_reginfo[] = { | ||
647 | .opc0 = 3, .opc1 = 0, .crn = 4, .crm = 0, .opc2 = 0, | ||
648 | .access = PL1_RW, | ||
649 | .fieldoffset = offsetof(CPUARMState, banked_spsr[BANK_SVC]) }, | ||
650 | - /* We rely on the access checks not allowing the guest to write to the | ||
651 | + /* | ||
652 | + * We rely on the access checks not allowing the guest to write to the | ||
653 | * state field when SPSel indicates that it's being used as the stack | ||
654 | * pointer. | ||
655 | */ | ||
656 | @@ -XXX,XX +XXX,XX @@ static void do_hcr_write(CPUARMState *env, uint64_t value, uint64_t valid_mask) | ||
657 | if (arm_feature(env, ARM_FEATURE_EL3)) { | ||
658 | valid_mask &= ~HCR_HCD; | ||
659 | } else if (cpu->psci_conduit != QEMU_PSCI_CONDUIT_SMC) { | ||
660 | - /* Architecturally HCR.TSC is RES0 if EL3 is not implemented. | ||
661 | + /* | ||
662 | + * Architecturally HCR.TSC is RES0 if EL3 is not implemented. | ||
663 | * However, if we're using the SMC PSCI conduit then QEMU is | ||
664 | * effectively acting like EL3 firmware and so the guest at | ||
665 | * EL2 should retain the ability to prevent EL1 from being | ||
666 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo el2_cp_reginfo[] = { | ||
667 | .access = PL2_W, .type = ARM_CP_NO_RAW | ARM_CP_EL3_NO_EL2_UNDEF, | ||
668 | .writefn = tlbi_aa64_vae2is_write }, | ||
669 | #ifndef CONFIG_USER_ONLY | ||
670 | - /* Unlike the other EL2-related AT operations, these must | ||
671 | + /* | ||
672 | + * Unlike the other EL2-related AT operations, these must | ||
673 | * UNDEF from EL3 if EL2 is not implemented, which is why we | ||
674 | * define them here rather than with the rest of the AT ops. | ||
675 | */ | ||
676 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo el2_cp_reginfo[] = { | ||
677 | .access = PL2_W, .accessfn = at_s1e2_access, | ||
678 | .type = ARM_CP_NO_RAW | ARM_CP_RAISES_EXC | ARM_CP_EL3_NO_EL2_UNDEF, | ||
679 | .writefn = ats_write64 }, | ||
680 | - /* The AArch32 ATS1H* operations are CONSTRAINED UNPREDICTABLE | ||
681 | + /* | ||
682 | + * The AArch32 ATS1H* operations are CONSTRAINED UNPREDICTABLE | ||
683 | * if EL2 is not implemented; we choose to UNDEF. Behaviour at EL3 | ||
684 | * with SCR.NS == 0 outside Monitor mode is UNPREDICTABLE; we choose | ||
685 | * to behave as if SCR.NS was 1. | ||
686 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo el2_cp_reginfo[] = { | ||
687 | .writefn = ats1h_write, .type = ARM_CP_NO_RAW | ARM_CP_RAISES_EXC }, | ||
688 | { .name = "CNTHCTL_EL2", .state = ARM_CP_STATE_BOTH, | ||
689 | .opc0 = 3, .opc1 = 4, .crn = 14, .crm = 1, .opc2 = 0, | ||
690 | - /* ARMv7 requires bit 0 and 1 to reset to 1. ARMv8 defines the | ||
691 | + /* | ||
692 | + * ARMv7 requires bit 0 and 1 to reset to 1. ARMv8 defines the | ||
693 | * reset values as IMPDEF. We choose to reset to 3 to comply with | ||
694 | * both ARMv7 and ARMv8. | ||
695 | */ | ||
696 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo el2_sec_cp_reginfo[] = { | ||
697 | static CPAccessResult nsacr_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
698 | bool isread) | ||
699 | { | ||
700 | - /* The NSACR is RW at EL3, and RO for NS EL1 and NS EL2. | ||
701 | + /* | ||
702 | + * The NSACR is RW at EL3, and RO for NS EL1 and NS EL2. | ||
703 | * At Secure EL1 it traps to EL3 or EL2. | ||
704 | */ | ||
705 | if (arm_current_el(env) == 3) { | ||
706 | @@ -XXX,XX +XXX,XX @@ static void define_pmu_regs(ARMCPU *cpu) | ||
707 | } | ||
708 | } | ||
709 | |||
710 | -/* We don't know until after realize whether there's a GICv3 | ||
711 | +/* | ||
712 | + * We don't know until after realize whether there's a GICv3 | ||
713 | * attached, and that is what registers the gicv3 sysregs. | ||
714 | * So we have to fill in the GIC fields in ID_PFR/ID_PFR1_EL1/ID_AA64PFR0_EL1 | ||
715 | * at runtime. | ||
716 | @@ -XXX,XX +XXX,XX @@ static uint64_t id_aa64pfr0_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
717 | } | ||
718 | #endif | ||
719 | |||
720 | -/* Shared logic between LORID and the rest of the LOR* registers. | ||
721 | +/* | ||
722 | + * Shared logic between LORID and the rest of the LOR* registers. | ||
723 | * Secure state exclusion has already been dealt with. | ||
724 | */ | ||
725 | static CPAccessResult access_lor_ns(CPUARMState *env, | ||
726 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) | ||
727 | |||
728 | define_arm_cp_regs(cpu, cp_reginfo); | ||
729 | if (!arm_feature(env, ARM_FEATURE_V8)) { | ||
730 | - /* Must go early as it is full of wildcards that may be | ||
731 | + /* | ||
732 | + * Must go early as it is full of wildcards that may be | ||
733 | * overridden by later definitions. | ||
734 | */ | ||
735 | define_arm_cp_regs(cpu, not_v8_cp_reginfo); | ||
736 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) | ||
737 | .access = PL1_R, .type = ARM_CP_CONST, | ||
738 | .accessfn = access_aa32_tid3, | ||
739 | .resetvalue = cpu->isar.id_pfr0 }, | ||
740 | - /* ID_PFR1 is not a plain ARM_CP_CONST because we don't know | ||
741 | + /* | ||
742 | + * ID_PFR1 is not a plain ARM_CP_CONST because we don't know | ||
743 | * the value of the GIC field until after we define these regs. | ||
744 | */ | ||
745 | { .name = "ID_PFR1", .state = ARM_CP_STATE_BOTH, | ||
746 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) | ||
747 | |||
748 | define_arm_cp_regs(cpu, el3_regs); | ||
749 | } | ||
750 | - /* The behaviour of NSACR is sufficiently various that we don't | ||
751 | + /* | ||
752 | + * The behaviour of NSACR is sufficiently various that we don't | ||
753 | * try to describe it in a single reginfo: | ||
754 | * if EL3 is 64 bit, then trap to EL3 from S EL1, | ||
755 | * reads as constant 0xc00 from NS EL1 and NS EL2 | ||
756 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) | ||
757 | if (cpu_isar_feature(aa32_jazelle, cpu)) { | ||
758 | define_arm_cp_regs(cpu, jazelle_regs); | ||
759 | } | ||
760 | - /* Slightly awkwardly, the OMAP and StrongARM cores need all of | ||
761 | + /* | ||
762 | + * Slightly awkwardly, the OMAP and StrongARM cores need all of | ||
763 | * cp15 crn=0 to be writes-ignored, whereas for other cores they should | ||
764 | * be read-only (ie write causes UNDEF exception). | ||
765 | */ | ||
766 | { | ||
767 | ARMCPRegInfo id_pre_v8_midr_cp_reginfo[] = { | ||
768 | - /* Pre-v8 MIDR space. | ||
769 | + /* | ||
770 | + * Pre-v8 MIDR space. | ||
771 | * Note that the MIDR isn't a simple constant register because | ||
772 | * of the TI925 behaviour where writes to another register can | ||
773 | * cause the MIDR value to change. | ||
774 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) | ||
775 | if (arm_feature(env, ARM_FEATURE_OMAPCP) || | ||
776 | arm_feature(env, ARM_FEATURE_STRONGARM)) { | ||
777 | size_t i; | ||
778 | - /* Register the blanket "writes ignored" value first to cover the | ||
779 | + /* | ||
780 | + * Register the blanket "writes ignored" value first to cover the | ||
781 | * whole space. Then update the specific ID registers to allow write | ||
782 | * access, so that they ignore writes rather than causing them to | ||
783 | * UNDEF. | ||
784 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) | ||
785 | .raw_writefn = raw_write, | ||
786 | }; | ||
787 | if (arm_feature(env, ARM_FEATURE_XSCALE)) { | ||
788 | - /* Normally we would always end the TB on an SCTLR write, but Linux | ||
789 | + /* | ||
790 | + * Normally we would always end the TB on an SCTLR write, but Linux | ||
791 | * arch/arm/mach-pxa/sleep.S expects two instructions following | ||
792 | * an MMU enable to execute from cache. Imitate this behaviour. | ||
793 | */ | ||
794 | @@ -XXX,XX +XXX,XX @@ static void add_cpreg_to_hashtable(ARMCPU *cpu, const ARMCPRegInfo *r, | ||
795 | void define_one_arm_cp_reg_with_opaque(ARMCPU *cpu, | ||
796 | const ARMCPRegInfo *r, void *opaque) | ||
797 | { | ||
798 | - /* Define implementations of coprocessor registers. | ||
799 | + /* | ||
800 | + * Define implementations of coprocessor registers. | ||
801 | * We store these in a hashtable because typically | ||
802 | * there are less than 150 registers in a space which | ||
803 | * is 16*16*16*8*8 = 262144 in size. | ||
804 | @@ -XXX,XX +XXX,XX @@ void define_one_arm_cp_reg_with_opaque(ARMCPU *cpu, | ||
805 | default: | ||
806 | g_assert_not_reached(); | ||
807 | } | ||
808 | - /* The AArch64 pseudocode CheckSystemAccess() specifies that op1 | ||
809 | + /* | ||
810 | + * The AArch64 pseudocode CheckSystemAccess() specifies that op1 | ||
811 | * encodes a minimum access level for the register. We roll this | ||
812 | * runtime check into our general permission check code, so check | ||
813 | * here that the reginfo's specified permissions are strict enough | ||
814 | @@ -XXX,XX +XXX,XX @@ void define_one_arm_cp_reg_with_opaque(ARMCPU *cpu, | ||
815 | assert((r->access & ~mask) == 0); | ||
816 | } | ||
817 | |||
818 | - /* Check that the register definition has enough info to handle | ||
819 | + /* | ||
820 | + * Check that the register definition has enough info to handle | ||
821 | * reads and writes if they are permitted. | ||
822 | */ | ||
823 | if (!(r->type & (ARM_CP_SPECIAL_MASK | ARM_CP_CONST))) { | ||
824 | @@ -XXX,XX +XXX,XX @@ void define_one_arm_cp_reg_with_opaque(ARMCPU *cpu, | ||
825 | continue; | ||
826 | } | ||
827 | if (state == ARM_CP_STATE_AA32) { | ||
828 | - /* Under AArch32 CP registers can be common | ||
829 | + /* | ||
830 | + * Under AArch32 CP registers can be common | ||
831 | * (same for secure and non-secure world) or banked. | ||
832 | */ | ||
833 | char *name; | ||
834 | @@ -XXX,XX +XXX,XX @@ void define_one_arm_cp_reg_with_opaque(ARMCPU *cpu, | ||
835 | g_assert_not_reached(); | ||
836 | } | ||
837 | } else { | ||
838 | - /* AArch64 registers get mapped to non-secure instance | ||
839 | - * of AArch32 */ | ||
840 | + /* | ||
841 | + * AArch64 registers get mapped to non-secure instance | ||
842 | + * of AArch32 | ||
843 | + */ | ||
844 | add_cpreg_to_hashtable(cpu, r, opaque, state, | ||
845 | ARM_CP_SECSTATE_NS, | ||
846 | crm, opc1, opc2, r->name); | ||
847 | @@ -XXX,XX +XXX,XX @@ void arm_cp_reset_ignore(CPUARMState *env, const ARMCPRegInfo *opaque) | ||
848 | |||
849 | static int bad_mode_switch(CPUARMState *env, int mode, CPSRWriteType write_type) | ||
850 | { | ||
851 | - /* Return true if it is not valid for us to switch to | ||
852 | + /* | ||
853 | + * Return true if it is not valid for us to switch to | ||
854 | * this CPU mode (ie all the UNPREDICTABLE cases in | ||
855 | * the ARM ARM CPSRWriteByInstr pseudocode). | ||
856 | */ | ||
857 | @@ -XXX,XX +XXX,XX @@ static int bad_mode_switch(CPUARMState *env, int mode, CPSRWriteType write_type) | ||
858 | case ARM_CPU_MODE_UND: | ||
859 | case ARM_CPU_MODE_IRQ: | ||
860 | case ARM_CPU_MODE_FIQ: | ||
861 | - /* Note that we don't implement the IMPDEF NSACR.RFR which in v7 | ||
862 | + /* | ||
863 | + * Note that we don't implement the IMPDEF NSACR.RFR which in v7 | ||
864 | * allows FIQ mode to be Secure-only. (In v8 this doesn't exist.) | ||
865 | */ | ||
866 | - /* If HCR.TGE is set then changes from Monitor to NS PL1 via MSR | ||
867 | + /* | ||
868 | + * If HCR.TGE is set then changes from Monitor to NS PL1 via MSR | ||
869 | * and CPS are treated as illegal mode changes. | ||
870 | */ | ||
871 | if (write_type == CPSRWriteByInstr && | ||
872 | @@ -XXX,XX +XXX,XX @@ void cpsr_write(CPUARMState *env, uint32_t val, uint32_t mask, | ||
873 | env->GE = (val >> 16) & 0xf; | ||
874 | } | ||
875 | |||
876 | - /* In a V7 implementation that includes the security extensions but does | ||
877 | + /* | ||
878 | + * In a V7 implementation that includes the security extensions but does | ||
879 | * not include Virtualization Extensions the SCR.FW and SCR.AW bits control | ||
880 | * whether non-secure software is allowed to change the CPSR_F and CPSR_A | ||
881 | * bits respectively. | ||
882 | @@ -XXX,XX +XXX,XX @@ void cpsr_write(CPUARMState *env, uint32_t val, uint32_t mask, | ||
883 | changed_daif = (env->daif ^ val) & mask; | ||
884 | |||
885 | if (changed_daif & CPSR_A) { | ||
886 | - /* Check to see if we are allowed to change the masking of async | ||
887 | + /* | ||
888 | + * Check to see if we are allowed to change the masking of async | ||
889 | * abort exceptions from a non-secure state. | ||
890 | */ | ||
891 | if (!(env->cp15.scr_el3 & SCR_AW)) { | ||
892 | @@ -XXX,XX +XXX,XX @@ void cpsr_write(CPUARMState *env, uint32_t val, uint32_t mask, | ||
893 | } | ||
894 | |||
895 | if (changed_daif & CPSR_F) { | ||
896 | - /* Check to see if we are allowed to change the masking of FIQ | ||
897 | + /* | ||
898 | + * Check to see if we are allowed to change the masking of FIQ | ||
899 | * exceptions from a non-secure state. | ||
900 | */ | ||
901 | if (!(env->cp15.scr_el3 & SCR_FW)) { | ||
902 | @@ -XXX,XX +XXX,XX @@ void cpsr_write(CPUARMState *env, uint32_t val, uint32_t mask, | ||
903 | mask &= ~CPSR_F; | ||
904 | } | ||
905 | |||
906 | - /* Check whether non-maskable FIQ (NMFI) support is enabled. | ||
907 | + /* | ||
908 | + * Check whether non-maskable FIQ (NMFI) support is enabled. | ||
909 | * If this bit is set software is not allowed to mask | ||
910 | * FIQs, but is allowed to set CPSR_F to 0. | ||
911 | */ | ||
912 | @@ -XXX,XX +XXX,XX @@ void cpsr_write(CPUARMState *env, uint32_t val, uint32_t mask, | ||
913 | if (write_type != CPSRWriteRaw && | ||
914 | ((env->uncached_cpsr ^ val) & mask & CPSR_M)) { | ||
915 | if ((env->uncached_cpsr & CPSR_M) == ARM_CPU_MODE_USR) { | ||
916 | - /* Note that we can only get here in USR mode if this is a | ||
917 | + /* | ||
918 | + * Note that we can only get here in USR mode if this is a | ||
919 | * gdb stub write; for this case we follow the architectural | ||
920 | * behaviour for guest writes in USR mode of ignoring an attempt | ||
921 | * to switch mode. (Those are caught by translate.c for writes | ||
922 | @@ -XXX,XX +XXX,XX @@ void cpsr_write(CPUARMState *env, uint32_t val, uint32_t mask, | ||
923 | */ | ||
924 | mask &= ~CPSR_M; | ||
925 | } else if (bad_mode_switch(env, val & CPSR_M, write_type)) { | ||
926 | - /* Attempt to switch to an invalid mode: this is UNPREDICTABLE in | ||
927 | + /* | ||
928 | + * Attempt to switch to an invalid mode: this is UNPREDICTABLE in | ||
929 | * v7, and has defined behaviour in v8: | ||
930 | * + leave CPSR.M untouched | ||
931 | * + allow changes to the other CPSR fields | ||
932 | @@ -XXX,XX +XXX,XX @@ static void switch_mode(CPUARMState *env, int mode) | ||
933 | env->regs[14] = env->banked_r14[r14_bank_number(mode)]; | ||
934 | } | ||
935 | |||
936 | -/* Physical Interrupt Target EL Lookup Table | ||
937 | +/* | ||
938 | + * Physical Interrupt Target EL Lookup Table | ||
939 | * | ||
940 | * [ From ARM ARM section G1.13.4 (Table G1-15) ] | ||
941 | * | ||
942 | @@ -XXX,XX +XXX,XX @@ uint32_t arm_phys_excp_target_el(CPUState *cs, uint32_t excp_idx, | ||
943 | if (arm_feature(env, ARM_FEATURE_EL3)) { | ||
944 | rw = ((env->cp15.scr_el3 & SCR_RW) == SCR_RW); | ||
945 | } else { | ||
946 | - /* Either EL2 is the highest EL (and so the EL2 register width | ||
947 | + /* | ||
948 | + * Either EL2 is the highest EL (and so the EL2 register width | ||
949 | * is given by is64); or there is no EL2 or EL3, in which case | ||
950 | * the value of 'rw' does not affect the table lookup anyway. | ||
951 | */ | ||
952 | @@ -XXX,XX +XXX,XX @@ void aarch64_sync_64_to_32(CPUARMState *env) | ||
953 | env->banked_r13[bank_number(ARM_CPU_MODE_UND)] = env->xregs[23]; | ||
954 | } | ||
955 | |||
956 | - /* Registers x24-x30 are mapped to r8-r14 in FIQ mode. If we are in FIQ | ||
957 | + /* | ||
958 | + * Registers x24-x30 are mapped to r8-r14 in FIQ mode. If we are in FIQ | ||
959 | * mode, then we can copy to r8-r14. Otherwise, we copy to the | ||
960 | * FIQ bank for r8-r14. | ||
961 | */ | ||
962 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_do_interrupt_aarch32(CPUState *cs) | ||
963 | /* High vectors. When enabled, base address cannot be remapped. */ | ||
964 | addr += 0xffff0000; | ||
965 | } else { | ||
966 | - /* ARM v7 architectures provide a vector base address register to remap | ||
967 | + /* | ||
968 | + * ARM v7 architectures provide a vector base address register to remap | ||
969 | * the interrupt vector table. | ||
970 | * This register is only followed in non-monitor mode, and is banked. | ||
971 | * Note: only bits 31:5 are valid. | ||
972 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_do_interrupt_aarch64(CPUState *cs) | ||
973 | aarch64_sve_change_el(env, cur_el, new_el, is_a64(env)); | ||
974 | |||
975 | if (cur_el < new_el) { | ||
976 | - /* Entry vector offset depends on whether the implemented EL | ||
977 | + /* | ||
978 | + * Entry vector offset depends on whether the implemented EL | ||
979 | * immediately lower than the target level is using AArch32 or AArch64 | ||
980 | */ | ||
981 | bool is_aa64; | ||
982 | @@ -XXX,XX +XXX,XX @@ static void handle_semihosting(CPUState *cs) | ||
983 | } | ||
984 | #endif | ||
985 | |||
986 | -/* Handle a CPU exception for A and R profile CPUs. | ||
987 | +/* | ||
988 | + * Handle a CPU exception for A and R profile CPUs. | ||
989 | * Do any appropriate logging, handle PSCI calls, and then hand off | ||
990 | * to the AArch64-entry or AArch32-entry function depending on the | ||
991 | * target exception level's register width. | ||
992 | @@ -XXX,XX +XXX,XX @@ void arm_cpu_do_interrupt(CPUState *cs) | ||
993 | } | ||
994 | #endif | ||
995 | |||
996 | - /* Hooks may change global state so BQL should be held, also the | ||
997 | + /* | ||
998 | + * Hooks may change global state so BQL should be held, also the | ||
999 | * BQL needs to be held for any modification of | ||
1000 | * cs->interrupt_request. | ||
1001 | */ | ||
1002 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
1003 | }; | ||
1004 | } | ||
1005 | |||
1006 | -/* Note that signed overflow is undefined in C. The following routines are | ||
1007 | - careful to use unsigned types where modulo arithmetic is required. | ||
1008 | - Failure to do so _will_ break on newer gcc. */ | ||
1009 | +/* | ||
1010 | + * Note that signed overflow is undefined in C. The following routines are | ||
1011 | + * careful to use unsigned types where modulo arithmetic is required. | ||
1012 | + * Failure to do so _will_ break on newer gcc. | ||
1013 | + */ | ||
1014 | |||
1015 | /* Signed saturating arithmetic. */ | ||
1016 | |||
1017 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(sel_flags)(uint32_t flags, uint32_t a, uint32_t b) | ||
1018 | return (a & mask) | (b & ~mask); | ||
1019 | } | ||
1020 | |||
1021 | -/* CRC helpers. | ||
1022 | +/* | ||
1023 | + * CRC helpers. | ||
1024 | * The upper bytes of val (above the number specified by 'bytes') must have | ||
1025 | * been zeroed out by the caller. | ||
1026 | */ | ||
1027 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(crc32c)(uint32_t acc, uint32_t val, uint32_t bytes) | ||
1028 | return crc32c(acc, buf, bytes) ^ 0xffffffff; | ||
1029 | } | ||
1030 | |||
1031 | -/* Return the exception level to which FP-disabled exceptions should | ||
1032 | +/* | ||
1033 | + * Return the exception level to which FP-disabled exceptions should | ||
1034 | * be taken, or 0 if FP is enabled. | ||
1035 | */ | ||
1036 | int fp_exception_el(CPUARMState *env, int cur_el) | ||
1037 | @@ -XXX,XX +XXX,XX @@ int fp_exception_el(CPUARMState *env, int cur_el) | ||
1038 | #ifndef CONFIG_USER_ONLY | ||
1039 | uint64_t hcr_el2; | ||
1040 | |||
1041 | - /* CPACR and the CPTR registers don't exist before v6, so FP is | ||
1042 | + /* | ||
1043 | + * CPACR and the CPTR registers don't exist before v6, so FP is | ||
1044 | * always accessible | ||
1045 | */ | ||
1046 | if (!arm_feature(env, ARM_FEATURE_V6)) { | ||
1047 | @@ -XXX,XX +XXX,XX @@ int fp_exception_el(CPUARMState *env, int cur_el) | ||
1048 | |||
1049 | hcr_el2 = arm_hcr_el2_eff(env); | ||
1050 | |||
1051 | - /* The CPACR controls traps to EL1, or PL1 if we're 32 bit: | ||
1052 | + /* | ||
1053 | + * The CPACR controls traps to EL1, or PL1 if we're 32 bit: | ||
1054 | * 0, 2 : trap EL0 and EL1/PL1 accesses | ||
1055 | * 1 : trap only EL0 accesses | ||
1056 | * 3 : trap no accesses | ||
1057 | -- | ||
1058 | 2.25.1 | diff view generated by jsdifflib |
1 | From: Igor Mammedov <imammedo@redhat.com> | 1 | From: Fabiano Rosas <farosas@suse.de> |
---|---|---|---|
2 | 2 | ||
3 | Even though nothing is currently broken (since all boards | 3 | Fix the following: |
4 | use first_cpu as boot cpu), make sure that boot_info is set | ||
5 | on all CPUs. | ||
6 | If some board would like support heterogenuos setup (i.e. | ||
7 | init boot_info on subset of CPUs) in future, it should add | ||
8 | a reasonable API to do it, instead of starting assigning | ||
9 | boot_info from some CPU and till the end of present CPUs | ||
10 | list. | ||
11 | 4 | ||
12 | Ref: | 5 | ERROR: spaces required around that '|' (ctx:VxV) |
13 | "Message-ID: <CAFEAcA_NMWuA8WSs3cNeY6xX1kerO_uAcN_3=fK02BEhHJW86g@mail.gmail.com>" | 6 | ERROR: space required before the open parenthesis '(' |
7 | ERROR: spaces required around that '+' (ctx:VxB) | ||
8 | ERROR: space prohibited between function name and open parenthesis '(' | ||
14 | 9 | ||
15 | Signed-off-by: Igor Mammedov <imammedo@redhat.com> | 10 | (the last two still have some occurrences in macros which I left |
16 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 11 | behind because it might impact readability) |
17 | Message-id: 1525176522-200354-5-git-send-email-imammedo@redhat.com | 12 | |
13 | Signed-off-by: Fabiano Rosas <farosas@suse.de> | ||
14 | Reviewed-by: Claudio Fontana <cfontana@suse.de> | ||
15 | Reviewed-by: Cornelia Huck <cohuck@redhat.com> | ||
16 | Message-id: 20221213190537.511-3-farosas@suse.de | ||
18 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 17 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
19 | --- | 18 | --- |
20 | hw/arm/boot.c | 2 +- | 19 | target/arm/helper.c | 42 +++++++++++++++++++++--------------------- |
21 | 1 file changed, 1 insertion(+), 1 deletion(-) | 20 | 1 file changed, 21 insertions(+), 21 deletions(-) |
22 | 21 | ||
23 | diff --git a/hw/arm/boot.c b/hw/arm/boot.c | 22 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
24 | index XXXXXXX..XXXXXXX 100644 | 23 | index XXXXXXX..XXXXXXX 100644 |
25 | --- a/hw/arm/boot.c | 24 | --- a/target/arm/helper.c |
26 | +++ b/hw/arm/boot.c | 25 | +++ b/target/arm/helper.c |
27 | @@ -XXX,XX +XXX,XX @@ static void arm_load_kernel_notify(Notifier *notifier, void *data) | 26 | @@ -XXX,XX +XXX,XX @@ static void add_cpreg_to_list(gpointer key, gpointer opaque) |
28 | } | 27 | uint32_t regidx = (uintptr_t)key; |
29 | info->is_linux = is_linux; | 28 | const ARMCPRegInfo *ri = get_arm_cp_reginfo(cpu->cp_regs, regidx); |
30 | 29 | ||
31 | - for (cs = CPU(cpu); cs; cs = CPU_NEXT(cs)) { | 30 | - if (!(ri->type & (ARM_CP_NO_RAW|ARM_CP_ALIAS))) { |
32 | + for (cs = first_cpu; cs; cs = CPU_NEXT(cs)) { | 31 | + if (!(ri->type & (ARM_CP_NO_RAW | ARM_CP_ALIAS))) { |
33 | ARM_CPU(cs)->env.boot_info = info; | 32 | cpu->cpreg_indexes[cpu->cpreg_array_len] = cpreg_to_kvm_id(regidx); |
33 | /* The value array need not be initialized at this point */ | ||
34 | cpu->cpreg_array_len++; | ||
35 | @@ -XXX,XX +XXX,XX @@ static void count_cpreg(gpointer key, gpointer opaque) | ||
36 | |||
37 | ri = g_hash_table_lookup(cpu->cp_regs, key); | ||
38 | |||
39 | - if (!(ri->type & (ARM_CP_NO_RAW|ARM_CP_ALIAS))) { | ||
40 | + if (!(ri->type & (ARM_CP_NO_RAW | ARM_CP_ALIAS))) { | ||
41 | cpu->cpreg_array_len++; | ||
34 | } | 42 | } |
35 | } | 43 | } |
44 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v6k_cp_reginfo[] = { | ||
45 | .resetfn = arm_cp_reset_ignore }, | ||
46 | { .name = "TPIDRRO_EL0", .state = ARM_CP_STATE_AA64, | ||
47 | .opc0 = 3, .opc1 = 3, .opc2 = 3, .crn = 13, .crm = 0, | ||
48 | - .access = PL0_R|PL1_W, | ||
49 | + .access = PL0_R | PL1_W, | ||
50 | .fieldoffset = offsetof(CPUARMState, cp15.tpidrro_el[0]), | ||
51 | .resetvalue = 0}, | ||
52 | { .name = "TPIDRURO", .cp = 15, .crn = 13, .crm = 0, .opc1 = 0, .opc2 = 3, | ||
53 | - .access = PL0_R|PL1_W, | ||
54 | + .access = PL0_R | PL1_W, | ||
55 | .bank_fieldoffsets = { offsetoflow32(CPUARMState, cp15.tpidruro_s), | ||
56 | offsetoflow32(CPUARMState, cp15.tpidruro_ns) }, | ||
57 | .resetfn = arm_cp_reset_ignore }, | ||
58 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo cache_block_ops_cp_reginfo[] = { | ||
59 | .resetvalue = 0 }, | ||
60 | /* The cache ops themselves: these all NOP for QEMU */ | ||
61 | { .name = "IICR", .cp = 15, .crm = 5, .opc1 = 0, | ||
62 | - .access = PL1_W, .type = ARM_CP_NOP|ARM_CP_64BIT }, | ||
63 | + .access = PL1_W, .type = ARM_CP_NOP | ARM_CP_64BIT }, | ||
64 | { .name = "IDCR", .cp = 15, .crm = 6, .opc1 = 0, | ||
65 | - .access = PL1_W, .type = ARM_CP_NOP|ARM_CP_64BIT }, | ||
66 | + .access = PL1_W, .type = ARM_CP_NOP | ARM_CP_64BIT }, | ||
67 | { .name = "CDCR", .cp = 15, .crm = 12, .opc1 = 0, | ||
68 | - .access = PL0_W, .type = ARM_CP_NOP|ARM_CP_64BIT }, | ||
69 | + .access = PL0_W, .type = ARM_CP_NOP | ARM_CP_64BIT }, | ||
70 | { .name = "PIR", .cp = 15, .crm = 12, .opc1 = 1, | ||
71 | - .access = PL0_W, .type = ARM_CP_NOP|ARM_CP_64BIT }, | ||
72 | + .access = PL0_W, .type = ARM_CP_NOP | ARM_CP_64BIT }, | ||
73 | { .name = "PDR", .cp = 15, .crm = 12, .opc1 = 2, | ||
74 | - .access = PL0_W, .type = ARM_CP_NOP|ARM_CP_64BIT }, | ||
75 | + .access = PL0_W, .type = ARM_CP_NOP | ARM_CP_64BIT }, | ||
76 | { .name = "CIDCR", .cp = 15, .crm = 14, .opc1 = 0, | ||
77 | - .access = PL1_W, .type = ARM_CP_NOP|ARM_CP_64BIT }, | ||
78 | + .access = PL1_W, .type = ARM_CP_NOP | ARM_CP_64BIT }, | ||
79 | }; | ||
80 | |||
81 | static const ARMCPRegInfo cache_test_clean_cp_reginfo[] = { | ||
82 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) | ||
83 | ARMCPRegInfo cbar = { | ||
84 | .name = "CBAR", | ||
85 | .cp = 15, .crn = 15, .crm = 0, .opc1 = 4, .opc2 = 0, | ||
86 | - .access = PL1_R|PL3_W, .resetvalue = cpu->reset_cbar, | ||
87 | + .access = PL1_R | PL3_W, .resetvalue = cpu->reset_cbar, | ||
88 | .fieldoffset = offsetof(CPUARMState, | ||
89 | cp15.c15_config_base_address) | ||
90 | }; | ||
91 | @@ -XXX,XX +XXX,XX @@ static void switch_mode(CPUARMState *env, int mode) | ||
92 | return; | ||
93 | |||
94 | if (old_mode == ARM_CPU_MODE_FIQ) { | ||
95 | - memcpy (env->fiq_regs, env->regs + 8, 5 * sizeof(uint32_t)); | ||
96 | - memcpy (env->regs + 8, env->usr_regs, 5 * sizeof(uint32_t)); | ||
97 | + memcpy(env->fiq_regs, env->regs + 8, 5 * sizeof(uint32_t)); | ||
98 | + memcpy(env->regs + 8, env->usr_regs, 5 * sizeof(uint32_t)); | ||
99 | } else if (mode == ARM_CPU_MODE_FIQ) { | ||
100 | - memcpy (env->usr_regs, env->regs + 8, 5 * sizeof(uint32_t)); | ||
101 | - memcpy (env->regs + 8, env->fiq_regs, 5 * sizeof(uint32_t)); | ||
102 | + memcpy(env->usr_regs, env->regs + 8, 5 * sizeof(uint32_t)); | ||
103 | + memcpy(env->regs + 8, env->fiq_regs, 5 * sizeof(uint32_t)); | ||
104 | } | ||
105 | |||
106 | i = bank_number(old_mode); | ||
107 | @@ -XXX,XX +XXX,XX @@ static inline uint8_t sub8_usat(uint8_t a, uint8_t b) | ||
108 | RESULT(sum, n, 16); \ | ||
109 | if (sum >= 0) \ | ||
110 | ge |= 3 << (n * 2); \ | ||
111 | - } while(0) | ||
112 | + } while (0) | ||
113 | |||
114 | #define SARITH8(a, b, n, op) do { \ | ||
115 | int32_t sum; \ | ||
116 | @@ -XXX,XX +XXX,XX @@ static inline uint8_t sub8_usat(uint8_t a, uint8_t b) | ||
117 | RESULT(sum, n, 8); \ | ||
118 | if (sum >= 0) \ | ||
119 | ge |= 1 << n; \ | ||
120 | - } while(0) | ||
121 | + } while (0) | ||
122 | |||
123 | |||
124 | #define ADD16(a, b, n) SARITH16(a, b, n, +) | ||
125 | @@ -XXX,XX +XXX,XX @@ static inline uint8_t sub8_usat(uint8_t a, uint8_t b) | ||
126 | RESULT(sum, n, 16); \ | ||
127 | if ((sum >> 16) == 1) \ | ||
128 | ge |= 3 << (n * 2); \ | ||
129 | - } while(0) | ||
130 | + } while (0) | ||
131 | |||
132 | #define ADD8(a, b, n) do { \ | ||
133 | uint32_t sum; \ | ||
134 | @@ -XXX,XX +XXX,XX @@ static inline uint8_t sub8_usat(uint8_t a, uint8_t b) | ||
135 | RESULT(sum, n, 8); \ | ||
136 | if ((sum >> 8) == 1) \ | ||
137 | ge |= 1 << n; \ | ||
138 | - } while(0) | ||
139 | + } while (0) | ||
140 | |||
141 | #define SUB16(a, b, n) do { \ | ||
142 | uint32_t sum; \ | ||
143 | @@ -XXX,XX +XXX,XX @@ static inline uint8_t sub8_usat(uint8_t a, uint8_t b) | ||
144 | RESULT(sum, n, 16); \ | ||
145 | if ((sum >> 16) == 0) \ | ||
146 | ge |= 3 << (n * 2); \ | ||
147 | - } while(0) | ||
148 | + } while (0) | ||
149 | |||
150 | #define SUB8(a, b, n) do { \ | ||
151 | uint32_t sum; \ | ||
152 | @@ -XXX,XX +XXX,XX @@ static inline uint8_t sub8_usat(uint8_t a, uint8_t b) | ||
153 | RESULT(sum, n, 8); \ | ||
154 | if ((sum >> 8) == 0) \ | ||
155 | ge |= 1 << n; \ | ||
156 | - } while(0) | ||
157 | + } while (0) | ||
158 | |||
159 | #define PFX u | ||
160 | #define ARITH_GE | ||
36 | -- | 161 | -- |
37 | 2.17.0 | 162 | 2.25.1 |
38 | |||
39 | diff view generated by jsdifflib |
1 | Convert the smc91c111 device away from using the old_mmio field of | 1 | From: Fabiano Rosas <farosas@suse.de> |
---|---|---|---|
2 | MemoryRegionOps. This device is used by several Arm board models. | ||
3 | 2 | ||
3 | Fix this: | ||
4 | ERROR: braces {} are necessary for all arms of this statement | ||
5 | |||
6 | Signed-off-by: Fabiano Rosas <farosas@suse.de> | ||
7 | Reviewed-by: Claudio Fontana <cfontana@suse.de> | ||
8 | Reviewed-by: Cornelia Huck <cohuck@redhat.com> | ||
9 | Message-id: 20221213190537.511-4-farosas@suse.de | ||
4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
5 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
6 | Message-id: 20180427173611.10281-3-peter.maydell@linaro.org | ||
7 | --- | 11 | --- |
8 | hw/net/smc91c111.c | 54 +++++++++++++++++++++------------------------- | 12 | target/arm/helper.c | 67 ++++++++++++++++++++++++++++----------------- |
9 | 1 file changed, 25 insertions(+), 29 deletions(-) | 13 | 1 file changed, 42 insertions(+), 25 deletions(-) |
10 | 14 | ||
11 | diff --git a/hw/net/smc91c111.c b/hw/net/smc91c111.c | 15 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
12 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
13 | --- a/hw/net/smc91c111.c | 17 | --- a/target/arm/helper.c |
14 | +++ b/hw/net/smc91c111.c | 18 | +++ b/target/arm/helper.c |
15 | @@ -XXX,XX +XXX,XX @@ static uint32_t smc91c111_readb(void *opaque, hwaddr offset) | 19 | @@ -XXX,XX +XXX,XX @@ void cpsr_write(CPUARMState *env, uint32_t val, uint32_t mask, |
16 | return 0; | 20 | env->CF = (val >> 29) & 1; |
21 | env->VF = (val << 3) & 0x80000000; | ||
22 | } | ||
23 | - if (mask & CPSR_Q) | ||
24 | + if (mask & CPSR_Q) { | ||
25 | env->QF = ((val & CPSR_Q) != 0); | ||
26 | - if (mask & CPSR_T) | ||
27 | + } | ||
28 | + if (mask & CPSR_T) { | ||
29 | env->thumb = ((val & CPSR_T) != 0); | ||
30 | + } | ||
31 | if (mask & CPSR_IT_0_1) { | ||
32 | env->condexec_bits &= ~3; | ||
33 | env->condexec_bits |= (val >> 25) & 3; | ||
34 | @@ -XXX,XX +XXX,XX @@ static void switch_mode(CPUARMState *env, int mode) | ||
35 | int i; | ||
36 | |||
37 | old_mode = env->uncached_cpsr & CPSR_M; | ||
38 | - if (mode == old_mode) | ||
39 | + if (mode == old_mode) { | ||
40 | return; | ||
41 | + } | ||
42 | |||
43 | if (old_mode == ARM_CPU_MODE_FIQ) { | ||
44 | memcpy(env->fiq_regs, env->regs + 8, 5 * sizeof(uint32_t)); | ||
45 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_do_interrupt_aarch32(CPUState *cs) | ||
46 | new_mode = ARM_CPU_MODE_UND; | ||
47 | addr = 0x04; | ||
48 | mask = CPSR_I; | ||
49 | - if (env->thumb) | ||
50 | + if (env->thumb) { | ||
51 | offset = 2; | ||
52 | - else | ||
53 | + } else { | ||
54 | offset = 4; | ||
55 | + } | ||
56 | break; | ||
57 | case EXCP_SWI: | ||
58 | new_mode = ARM_CPU_MODE_SVC; | ||
59 | @@ -XXX,XX +XXX,XX @@ static inline uint16_t add16_sat(uint16_t a, uint16_t b) | ||
60 | |||
61 | res = a + b; | ||
62 | if (((res ^ a) & 0x8000) && !((a ^ b) & 0x8000)) { | ||
63 | - if (a & 0x8000) | ||
64 | + if (a & 0x8000) { | ||
65 | res = 0x8000; | ||
66 | - else | ||
67 | + } else { | ||
68 | res = 0x7fff; | ||
69 | + } | ||
70 | } | ||
71 | return res; | ||
17 | } | 72 | } |
18 | 73 | @@ -XXX,XX +XXX,XX @@ static inline uint8_t add8_sat(uint8_t a, uint8_t b) | |
19 | -static void smc91c111_writew(void *opaque, hwaddr offset, | 74 | |
20 | - uint32_t value) | 75 | res = a + b; |
21 | +static uint64_t smc91c111_readfn(void *opaque, hwaddr addr, unsigned size) | 76 | if (((res ^ a) & 0x80) && !((a ^ b) & 0x80)) { |
77 | - if (a & 0x80) | ||
78 | + if (a & 0x80) { | ||
79 | res = 0x80; | ||
80 | - else | ||
81 | + } else { | ||
82 | res = 0x7f; | ||
83 | + } | ||
84 | } | ||
85 | return res; | ||
86 | } | ||
87 | @@ -XXX,XX +XXX,XX @@ static inline uint16_t sub16_sat(uint16_t a, uint16_t b) | ||
88 | |||
89 | res = a - b; | ||
90 | if (((res ^ a) & 0x8000) && ((a ^ b) & 0x8000)) { | ||
91 | - if (a & 0x8000) | ||
92 | + if (a & 0x8000) { | ||
93 | res = 0x8000; | ||
94 | - else | ||
95 | + } else { | ||
96 | res = 0x7fff; | ||
97 | + } | ||
98 | } | ||
99 | return res; | ||
100 | } | ||
101 | @@ -XXX,XX +XXX,XX @@ static inline uint8_t sub8_sat(uint8_t a, uint8_t b) | ||
102 | |||
103 | res = a - b; | ||
104 | if (((res ^ a) & 0x80) && ((a ^ b) & 0x80)) { | ||
105 | - if (a & 0x80) | ||
106 | + if (a & 0x80) { | ||
107 | res = 0x80; | ||
108 | - else | ||
109 | + } else { | ||
110 | res = 0x7f; | ||
111 | + } | ||
112 | } | ||
113 | return res; | ||
114 | } | ||
115 | @@ -XXX,XX +XXX,XX @@ static inline uint16_t add16_usat(uint16_t a, uint16_t b) | ||
22 | { | 116 | { |
23 | - smc91c111_writeb(opaque, offset, value & 0xff); | 117 | uint16_t res; |
24 | - smc91c111_writeb(opaque, offset + 1, value >> 8); | 118 | res = a + b; |
25 | + int i; | 119 | - if (res < a) |
26 | + uint32_t val = 0; | 120 | + if (res < a) { |
27 | + | 121 | res = 0xffff; |
28 | + for (i = 0; i < size; i++) { | ||
29 | + val |= smc91c111_readb(opaque, addr + i) << (i * 8); | ||
30 | + } | 122 | + } |
31 | + return val; | 123 | return res; |
32 | } | 124 | } |
33 | 125 | ||
34 | -static void smc91c111_writel(void *opaque, hwaddr offset, | 126 | static inline uint16_t sub16_usat(uint16_t a, uint16_t b) |
35 | - uint32_t value) | ||
36 | +static void smc91c111_writefn(void *opaque, hwaddr addr, | ||
37 | + uint64_t value, unsigned size) | ||
38 | { | 127 | { |
39 | + int i = 0; | 128 | - if (a > b) |
40 | + | 129 | + if (a > b) { |
41 | /* 32-bit writes to offset 0xc only actually write to the bank select | 130 | return a - b; |
42 | - register (offset 0xe) */ | 131 | - else |
43 | - if (offset != 0xc) | 132 | + } else { |
44 | - smc91c111_writew(opaque, offset, value & 0xffff); | 133 | return 0; |
45 | - smc91c111_writew(opaque, offset + 2, value >> 16); | ||
46 | -} | ||
47 | + * register (offset 0xe), so skip the first two bytes we would write. | ||
48 | + */ | ||
49 | + if (addr == 0xc && size == 4) { | ||
50 | + i += 2; | ||
51 | + } | ||
52 | |||
53 | -static uint32_t smc91c111_readw(void *opaque, hwaddr offset) | ||
54 | -{ | ||
55 | - uint32_t val; | ||
56 | - val = smc91c111_readb(opaque, offset); | ||
57 | - val |= smc91c111_readb(opaque, offset + 1) << 8; | ||
58 | - return val; | ||
59 | -} | ||
60 | - | ||
61 | -static uint32_t smc91c111_readl(void *opaque, hwaddr offset) | ||
62 | -{ | ||
63 | - uint32_t val; | ||
64 | - val = smc91c111_readw(opaque, offset); | ||
65 | - val |= smc91c111_readw(opaque, offset + 2) << 16; | ||
66 | - return val; | ||
67 | + for (; i < size; i++) { | ||
68 | + smc91c111_writeb(opaque, addr + i, | ||
69 | + extract32(value, i * 8, 8)); | ||
70 | + } | 134 | + } |
71 | } | 135 | } |
72 | 136 | ||
73 | static int smc91c111_can_receive_nc(NetClientState *nc) | 137 | static inline uint8_t add8_usat(uint8_t a, uint8_t b) |
74 | @@ -XXX,XX +XXX,XX @@ static const MemoryRegionOps smc91c111_mem_ops = { | 138 | { |
75 | /* The special case for 32 bit writes to 0xc means we can't just | 139 | uint8_t res; |
76 | * set .impl.min/max_access_size to 1, unfortunately | 140 | res = a + b; |
77 | */ | 141 | - if (res < a) |
78 | - .old_mmio = { | 142 | + if (res < a) { |
79 | - .read = { smc91c111_readb, smc91c111_readw, smc91c111_readl, }, | 143 | res = 0xff; |
80 | - .write = { smc91c111_writeb, smc91c111_writew, smc91c111_writel, }, | 144 | + } |
81 | - }, | 145 | return res; |
82 | + .read = smc91c111_readfn, | 146 | } |
83 | + .write = smc91c111_writefn, | 147 | |
84 | + .valid.min_access_size = 1, | 148 | static inline uint8_t sub8_usat(uint8_t a, uint8_t b) |
85 | + .valid.max_access_size = 4, | 149 | { |
86 | .endianness = DEVICE_NATIVE_ENDIAN, | 150 | - if (a > b) |
87 | }; | 151 | + if (a > b) { |
152 | return a - b; | ||
153 | - else | ||
154 | + } else { | ||
155 | return 0; | ||
156 | + } | ||
157 | } | ||
158 | |||
159 | #define ADD16(a, b, n) RESULT(add16_usat(a, b), n, 16); | ||
160 | @@ -XXX,XX +XXX,XX @@ static inline uint8_t sub8_usat(uint8_t a, uint8_t b) | ||
161 | |||
162 | static inline uint8_t do_usad(uint8_t a, uint8_t b) | ||
163 | { | ||
164 | - if (a > b) | ||
165 | + if (a > b) { | ||
166 | return a - b; | ||
167 | - else | ||
168 | + } else { | ||
169 | return b - a; | ||
170 | + } | ||
171 | } | ||
172 | |||
173 | /* Unsigned sum of absolute byte differences. */ | ||
174 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(sel_flags)(uint32_t flags, uint32_t a, uint32_t b) | ||
175 | uint32_t mask; | ||
176 | |||
177 | mask = 0; | ||
178 | - if (flags & 1) | ||
179 | + if (flags & 1) { | ||
180 | mask |= 0xff; | ||
181 | - if (flags & 2) | ||
182 | + } | ||
183 | + if (flags & 2) { | ||
184 | mask |= 0xff00; | ||
185 | - if (flags & 4) | ||
186 | + } | ||
187 | + if (flags & 4) { | ||
188 | mask |= 0xff0000; | ||
189 | - if (flags & 8) | ||
190 | + } | ||
191 | + if (flags & 8) { | ||
192 | mask |= 0xff000000; | ||
193 | + } | ||
194 | return (a & mask) | (b & ~mask); | ||
195 | } | ||
88 | 196 | ||
89 | -- | 197 | -- |
90 | 2.17.0 | 198 | 2.25.1 |
91 | |||
92 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Fabiano Rosas <farosas@suse.de> | ||
1 | 2 | ||
3 | Signed-off-by: Fabiano Rosas <farosas@suse.de> | ||
4 | Reviewed-by: Claudio Fontana <cfontana@suse.de> | ||
5 | Reviewed-by: Cornelia Huck <cohuck@redhat.com> | ||
6 | Message-id: 20221213190537.511-5-farosas@suse.de | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | --- | ||
9 | target/arm/m_helper.c | 16 ---------------- | ||
10 | 1 file changed, 16 deletions(-) | ||
11 | |||
12 | diff --git a/target/arm/m_helper.c b/target/arm/m_helper.c | ||
13 | index XXXXXXX..XXXXXXX 100644 | ||
14 | --- a/target/arm/m_helper.c | ||
15 | +++ b/target/arm/m_helper.c | ||
16 | @@ -XXX,XX +XXX,XX @@ | ||
17 | */ | ||
18 | |||
19 | #include "qemu/osdep.h" | ||
20 | -#include "qemu/units.h" | ||
21 | -#include "target/arm/idau.h" | ||
22 | -#include "trace.h" | ||
23 | #include "cpu.h" | ||
24 | #include "internals.h" | ||
25 | -#include "exec/gdbstub.h" | ||
26 | #include "exec/helper-proto.h" | ||
27 | -#include "qemu/host-utils.h" | ||
28 | #include "qemu/main-loop.h" | ||
29 | #include "qemu/bitops.h" | ||
30 | -#include "qemu/crc32c.h" | ||
31 | -#include "qemu/qemu-print.h" | ||
32 | #include "qemu/log.h" | ||
33 | #include "exec/exec-all.h" | ||
34 | -#include <zlib.h> /* For crc32 */ | ||
35 | -#include "semihosting/semihost.h" | ||
36 | -#include "sysemu/cpus.h" | ||
37 | -#include "sysemu/kvm.h" | ||
38 | -#include "qemu/range.h" | ||
39 | -#include "qapi/qapi-commands-machine-target.h" | ||
40 | -#include "qapi/error.h" | ||
41 | -#include "qemu/guest-random.h" | ||
42 | #ifdef CONFIG_TCG | ||
43 | -#include "arm_ldst.h" | ||
44 | #include "exec/cpu_ldst.h" | ||
45 | #include "semihosting/common-semi.h" | ||
46 | #endif | ||
47 | -- | ||
48 | 2.25.1 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Fabiano Rosas <farosas@suse.de> | ||
1 | 2 | ||
3 | Signed-off-by: Fabiano Rosas <farosas@suse.de> | ||
4 | Reviewed-by: Claudio Fontana <cfontana@suse.de> | ||
5 | Reviewed-by: Cornelia Huck <cohuck@redhat.com> | ||
6 | Message-id: 20221213190537.511-6-farosas@suse.de | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | --- | ||
9 | target/arm/helper.c | 7 ------- | ||
10 | 1 file changed, 7 deletions(-) | ||
11 | |||
12 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
13 | index XXXXXXX..XXXXXXX 100644 | ||
14 | --- a/target/arm/helper.c | ||
15 | +++ b/target/arm/helper.c | ||
16 | @@ -XXX,XX +XXX,XX @@ | ||
17 | */ | ||
18 | |||
19 | #include "qemu/osdep.h" | ||
20 | -#include "qemu/units.h" | ||
21 | #include "qemu/log.h" | ||
22 | #include "trace.h" | ||
23 | #include "cpu.h" | ||
24 | #include "internals.h" | ||
25 | #include "exec/helper-proto.h" | ||
26 | -#include "qemu/host-utils.h" | ||
27 | #include "qemu/main-loop.h" | ||
28 | #include "qemu/timer.h" | ||
29 | #include "qemu/bitops.h" | ||
30 | @@ -XXX,XX +XXX,XX @@ | ||
31 | #include "exec/exec-all.h" | ||
32 | #include <zlib.h> /* For crc32 */ | ||
33 | #include "hw/irq.h" | ||
34 | -#include "semihosting/semihost.h" | ||
35 | -#include "sysemu/cpus.h" | ||
36 | #include "sysemu/cpu-timers.h" | ||
37 | #include "sysemu/kvm.h" | ||
38 | -#include "qemu/range.h" | ||
39 | #include "qapi/qapi-commands-machine-target.h" | ||
40 | #include "qapi/error.h" | ||
41 | #include "qemu/guest-random.h" | ||
42 | #ifdef CONFIG_TCG | ||
43 | -#include "arm_ldst.h" | ||
44 | -#include "exec/cpu_ldst.h" | ||
45 | #include "semihosting/common-semi.h" | ||
46 | #endif | ||
47 | #include "cpregs.h" | ||
48 | -- | ||
49 | 2.25.1 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Claudio Fontana <cfontana@suse.de> | ||
1 | 2 | ||
3 | Remove some unused headers. | ||
4 | |||
5 | Signed-off-by: Claudio Fontana <cfontana@suse.de> | ||
6 | Acked-by: Richard Henderson <richard.henderson@linaro.org> | ||
7 | Reviewed-by: Claudio Fontana <cfontana@suse.de> | ||
8 | Reviewed-by: Cornelia Huck <cohuck@redhat.com> | ||
9 | Signed-off-by: Fabiano Rosas <farosas@suse.de> | ||
10 | Message-id: 20221213190537.511-7-farosas@suse.de | ||
11 | [added back some includes that are still needed at this point] | ||
12 | Signed-off-by: Fabiano Rosas <farosas@suse.de> | ||
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
14 | --- | ||
15 | target/arm/cpu.c | 1 - | ||
16 | target/arm/cpu64.c | 6 ------ | ||
17 | 2 files changed, 7 deletions(-) | ||
18 | |||
19 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | ||
20 | index XXXXXXX..XXXXXXX 100644 | ||
21 | --- a/target/arm/cpu.c | ||
22 | +++ b/target/arm/cpu.c | ||
23 | @@ -XXX,XX +XXX,XX @@ | ||
24 | #include "target/arm/idau.h" | ||
25 | #include "qemu/module.h" | ||
26 | #include "qapi/error.h" | ||
27 | -#include "qapi/visitor.h" | ||
28 | #include "cpu.h" | ||
29 | #ifdef CONFIG_TCG | ||
30 | #include "hw/core/tcg-cpu-ops.h" | ||
31 | diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c | ||
32 | index XXXXXXX..XXXXXXX 100644 | ||
33 | --- a/target/arm/cpu64.c | ||
34 | +++ b/target/arm/cpu64.c | ||
35 | @@ -XXX,XX +XXX,XX @@ | ||
36 | #include "qemu/osdep.h" | ||
37 | #include "qapi/error.h" | ||
38 | #include "cpu.h" | ||
39 | -#ifdef CONFIG_TCG | ||
40 | -#include "hw/core/tcg-cpu-ops.h" | ||
41 | -#endif /* CONFIG_TCG */ | ||
42 | #include "qemu/module.h" | ||
43 | -#if !defined(CONFIG_USER_ONLY) | ||
44 | -#include "hw/loader.h" | ||
45 | -#endif | ||
46 | #include "sysemu/kvm.h" | ||
47 | #include "sysemu/hvf.h" | ||
48 | #include "kvm_arm.h" | ||
49 | -- | ||
50 | 2.25.1 | diff view generated by jsdifflib |
1 | From: Patrick Oppenlander <patrick.oppenlander@gmail.com> | 1 | From: Philippe Mathieu-Daudé <philmd@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | The character frontend needs to be notified that the uart receive buffer | 3 | The pointed MouseTransformInfo structure is accessed read-only. |
4 | is empty and ready to handle another character. | ||
5 | 4 | ||
6 | Previously, the uart only worked correctly when receiving one character | 5 | Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org> |
7 | at a time. | 6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
8 | 7 | Message-id: 20221220142520.24094-2-philmd@linaro.org | |
9 | Signed-off-by: Patrick Oppenlander <patrick.oppenlander@gmail.com> | ||
10 | Message-id: CAEg67GkRTw=cXei3o9hvpxG_L4zSrNzR0bFyAgny+sSEUb_kPw@mail.gmail.com | ||
11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
13 | --- | 9 | --- |
14 | hw/char/cmsdk-apb-uart.c | 1 + | 10 | include/hw/input/tsc2xxx.h | 4 ++-- |
15 | 1 file changed, 1 insertion(+) | 11 | hw/input/tsc2005.c | 2 +- |
12 | hw/input/tsc210x.c | 3 +-- | ||
13 | 3 files changed, 4 insertions(+), 5 deletions(-) | ||
16 | 14 | ||
17 | diff --git a/hw/char/cmsdk-apb-uart.c b/hw/char/cmsdk-apb-uart.c | 15 | diff --git a/include/hw/input/tsc2xxx.h b/include/hw/input/tsc2xxx.h |
18 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
19 | --- a/hw/char/cmsdk-apb-uart.c | 17 | --- a/include/hw/input/tsc2xxx.h |
20 | +++ b/hw/char/cmsdk-apb-uart.c | 18 | +++ b/include/hw/input/tsc2xxx.h |
21 | @@ -XXX,XX +XXX,XX @@ static uint64_t uart_read(void *opaque, hwaddr offset, unsigned size) | 19 | @@ -XXX,XX +XXX,XX @@ uWireSlave *tsc2102_init(qemu_irq pint); |
22 | r = s->rxbuf; | 20 | uWireSlave *tsc2301_init(qemu_irq penirq, qemu_irq kbirq, qemu_irq dav); |
23 | s->state &= ~R_STATE_RXFULL_MASK; | 21 | I2SCodec *tsc210x_codec(uWireSlave *chip); |
24 | cmsdk_apb_uart_update(s); | 22 | uint32_t tsc210x_txrx(void *opaque, uint32_t value, int len); |
25 | + qemu_chr_fe_accept_input(&s->chr); | 23 | -void tsc210x_set_transform(uWireSlave *chip, MouseTransformInfo *info); |
26 | break; | 24 | +void tsc210x_set_transform(uWireSlave *chip, const MouseTransformInfo *info); |
27 | case A_STATE: | 25 | void tsc210x_key_event(uWireSlave *chip, int key, int down); |
28 | r = s->state; | 26 | |
27 | /* tsc2005.c */ | ||
28 | void *tsc2005_init(qemu_irq pintdav); | ||
29 | uint32_t tsc2005_txrx(void *opaque, uint32_t value, int len); | ||
30 | -void tsc2005_set_transform(void *opaque, MouseTransformInfo *info); | ||
31 | +void tsc2005_set_transform(void *opaque, const MouseTransformInfo *info); | ||
32 | |||
33 | #endif | ||
34 | diff --git a/hw/input/tsc2005.c b/hw/input/tsc2005.c | ||
35 | index XXXXXXX..XXXXXXX 100644 | ||
36 | --- a/hw/input/tsc2005.c | ||
37 | +++ b/hw/input/tsc2005.c | ||
38 | @@ -XXX,XX +XXX,XX @@ void *tsc2005_init(qemu_irq pintdav) | ||
39 | * from the touchscreen. Assuming 12-bit precision was used during | ||
40 | * tslib calibration. | ||
41 | */ | ||
42 | -void tsc2005_set_transform(void *opaque, MouseTransformInfo *info) | ||
43 | +void tsc2005_set_transform(void *opaque, const MouseTransformInfo *info) | ||
44 | { | ||
45 | TSC2005State *s = (TSC2005State *) opaque; | ||
46 | |||
47 | diff --git a/hw/input/tsc210x.c b/hw/input/tsc210x.c | ||
48 | index XXXXXXX..XXXXXXX 100644 | ||
49 | --- a/hw/input/tsc210x.c | ||
50 | +++ b/hw/input/tsc210x.c | ||
51 | @@ -XXX,XX +XXX,XX @@ I2SCodec *tsc210x_codec(uWireSlave *chip) | ||
52 | * from the touchscreen. Assuming 12-bit precision was used during | ||
53 | * tslib calibration. | ||
54 | */ | ||
55 | -void tsc210x_set_transform(uWireSlave *chip, | ||
56 | - MouseTransformInfo *info) | ||
57 | +void tsc210x_set_transform(uWireSlave *chip, const MouseTransformInfo *info) | ||
58 | { | ||
59 | TSC210xState *s = (TSC210xState *) chip->opaque; | ||
60 | #if 0 | ||
29 | -- | 61 | -- |
30 | 2.17.0 | 62 | 2.25.1 |
31 | 63 | ||
32 | 64 | diff view generated by jsdifflib |
1 | From: Eric Auger <eric.auger@redhat.com> | 1 | From: Philippe Mathieu-Daudé <philmd@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | We introduce helpers to read/write into the command and event | 3 | Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org> |
4 | circular queues. | 4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
5 | 5 | Message-id: 20221220142520.24094-3-philmd@linaro.org | |
6 | smmuv3_write_eventq and smmuv3_cmq_consume will become static | ||
7 | in subsequent patches. | ||
8 | |||
9 | Invalidation commands are not yet dealt with. We do not cache | ||
10 | data that need to be invalidated. This will change with vhost | ||
11 | integration. | ||
12 | |||
13 | Signed-off-by: Eric Auger <eric.auger@redhat.com> | ||
14 | Signed-off-by: Prem Mallappa <prem.mallappa@broadcom.com> | ||
15 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
16 | Message-id: 1524665762-31355-7-git-send-email-eric.auger@redhat.com | ||
17 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
18 | --- | 7 | --- |
19 | hw/arm/smmuv3-internal.h | 163 +++++++++++++++++++++++++++++++++++++++ | 8 | hw/arm/nseries.c | 18 +++++++++--------- |
20 | hw/arm/smmuv3.c | 136 ++++++++++++++++++++++++++++++++ | 9 | 1 file changed, 9 insertions(+), 9 deletions(-) |
21 | hw/arm/trace-events | 5 ++ | ||
22 | 3 files changed, 304 insertions(+) | ||
23 | 10 | ||
24 | diff --git a/hw/arm/smmuv3-internal.h b/hw/arm/smmuv3-internal.h | 11 | diff --git a/hw/arm/nseries.c b/hw/arm/nseries.c |
25 | index XXXXXXX..XXXXXXX 100644 | 12 | index XXXXXXX..XXXXXXX 100644 |
26 | --- a/hw/arm/smmuv3-internal.h | 13 | --- a/hw/arm/nseries.c |
27 | +++ b/hw/arm/smmuv3-internal.h | 14 | +++ b/hw/arm/nseries.c |
28 | @@ -XXX,XX +XXX,XX @@ static inline bool smmuv3_gerror_irq_enabled(SMMUv3State *s) | 15 | @@ -XXX,XX +XXX,XX @@ static void n8x0_i2c_setup(struct n800_s *s) |
29 | void smmuv3_trigger_irq(SMMUv3State *s, SMMUIrq irq, uint32_t gerror_mask); | ||
30 | void smmuv3_write_gerrorn(SMMUv3State *s, uint32_t gerrorn); | ||
31 | |||
32 | +/* Queue Handling */ | ||
33 | + | ||
34 | +#define Q_BASE(q) ((q)->base & SMMU_BASE_ADDR_MASK) | ||
35 | +#define WRAP_MASK(q) (1 << (q)->log2size) | ||
36 | +#define INDEX_MASK(q) (((1 << (q)->log2size)) - 1) | ||
37 | +#define WRAP_INDEX_MASK(q) ((1 << ((q)->log2size + 1)) - 1) | ||
38 | + | ||
39 | +#define Q_CONS(q) ((q)->cons & INDEX_MASK(q)) | ||
40 | +#define Q_PROD(q) ((q)->prod & INDEX_MASK(q)) | ||
41 | + | ||
42 | +#define Q_CONS_ENTRY(q) (Q_BASE(q) + (q)->entry_size * Q_CONS(q)) | ||
43 | +#define Q_PROD_ENTRY(q) (Q_BASE(q) + (q)->entry_size * Q_PROD(q)) | ||
44 | + | ||
45 | +#define Q_CONS_WRAP(q) (((q)->cons & WRAP_MASK(q)) >> (q)->log2size) | ||
46 | +#define Q_PROD_WRAP(q) (((q)->prod & WRAP_MASK(q)) >> (q)->log2size) | ||
47 | + | ||
48 | +static inline bool smmuv3_q_full(SMMUQueue *q) | ||
49 | +{ | ||
50 | + return ((q->cons ^ q->prod) & WRAP_INDEX_MASK(q)) == WRAP_MASK(q); | ||
51 | +} | ||
52 | + | ||
53 | +static inline bool smmuv3_q_empty(SMMUQueue *q) | ||
54 | +{ | ||
55 | + return (q->cons & WRAP_INDEX_MASK(q)) == (q->prod & WRAP_INDEX_MASK(q)); | ||
56 | +} | ||
57 | + | ||
58 | +static inline void queue_prod_incr(SMMUQueue *q) | ||
59 | +{ | ||
60 | + q->prod = (q->prod + 1) & WRAP_INDEX_MASK(q); | ||
61 | +} | ||
62 | + | ||
63 | +static inline void queue_cons_incr(SMMUQueue *q) | ||
64 | +{ | ||
65 | + /* | ||
66 | + * We have to use deposit for the CONS registers to preserve | ||
67 | + * the ERR field in the high bits. | ||
68 | + */ | ||
69 | + q->cons = deposit32(q->cons, 0, q->log2size + 1, q->cons + 1); | ||
70 | +} | ||
71 | + | ||
72 | +static inline bool smmuv3_cmdq_enabled(SMMUv3State *s) | ||
73 | +{ | ||
74 | + return FIELD_EX32(s->cr[0], CR0, CMDQEN); | ||
75 | +} | ||
76 | + | ||
77 | +static inline bool smmuv3_eventq_enabled(SMMUv3State *s) | ||
78 | +{ | ||
79 | + return FIELD_EX32(s->cr[0], CR0, EVENTQEN); | ||
80 | +} | ||
81 | + | ||
82 | +static inline void smmu_write_cmdq_err(SMMUv3State *s, uint32_t err_type) | ||
83 | +{ | ||
84 | + s->cmdq.cons = FIELD_DP32(s->cmdq.cons, CMDQ_CONS, ERR, err_type); | ||
85 | +} | ||
86 | + | ||
87 | +void smmuv3_write_eventq(SMMUv3State *s, Evt *evt); | ||
88 | + | ||
89 | +/* Commands */ | ||
90 | + | ||
91 | +typedef enum SMMUCommandType { | ||
92 | + SMMU_CMD_NONE = 0x00, | ||
93 | + SMMU_CMD_PREFETCH_CONFIG , | ||
94 | + SMMU_CMD_PREFETCH_ADDR, | ||
95 | + SMMU_CMD_CFGI_STE, | ||
96 | + SMMU_CMD_CFGI_STE_RANGE, | ||
97 | + SMMU_CMD_CFGI_CD, | ||
98 | + SMMU_CMD_CFGI_CD_ALL, | ||
99 | + SMMU_CMD_CFGI_ALL, | ||
100 | + SMMU_CMD_TLBI_NH_ALL = 0x10, | ||
101 | + SMMU_CMD_TLBI_NH_ASID, | ||
102 | + SMMU_CMD_TLBI_NH_VA, | ||
103 | + SMMU_CMD_TLBI_NH_VAA, | ||
104 | + SMMU_CMD_TLBI_EL3_ALL = 0x18, | ||
105 | + SMMU_CMD_TLBI_EL3_VA = 0x1a, | ||
106 | + SMMU_CMD_TLBI_EL2_ALL = 0x20, | ||
107 | + SMMU_CMD_TLBI_EL2_ASID, | ||
108 | + SMMU_CMD_TLBI_EL2_VA, | ||
109 | + SMMU_CMD_TLBI_EL2_VAA, | ||
110 | + SMMU_CMD_TLBI_S12_VMALL = 0x28, | ||
111 | + SMMU_CMD_TLBI_S2_IPA = 0x2a, | ||
112 | + SMMU_CMD_TLBI_NSNH_ALL = 0x30, | ||
113 | + SMMU_CMD_ATC_INV = 0x40, | ||
114 | + SMMU_CMD_PRI_RESP, | ||
115 | + SMMU_CMD_RESUME = 0x44, | ||
116 | + SMMU_CMD_STALL_TERM, | ||
117 | + SMMU_CMD_SYNC, | ||
118 | +} SMMUCommandType; | ||
119 | + | ||
120 | +static const char *cmd_stringify[] = { | ||
121 | + [SMMU_CMD_PREFETCH_CONFIG] = "SMMU_CMD_PREFETCH_CONFIG", | ||
122 | + [SMMU_CMD_PREFETCH_ADDR] = "SMMU_CMD_PREFETCH_ADDR", | ||
123 | + [SMMU_CMD_CFGI_STE] = "SMMU_CMD_CFGI_STE", | ||
124 | + [SMMU_CMD_CFGI_STE_RANGE] = "SMMU_CMD_CFGI_STE_RANGE", | ||
125 | + [SMMU_CMD_CFGI_CD] = "SMMU_CMD_CFGI_CD", | ||
126 | + [SMMU_CMD_CFGI_CD_ALL] = "SMMU_CMD_CFGI_CD_ALL", | ||
127 | + [SMMU_CMD_CFGI_ALL] = "SMMU_CMD_CFGI_ALL", | ||
128 | + [SMMU_CMD_TLBI_NH_ALL] = "SMMU_CMD_TLBI_NH_ALL", | ||
129 | + [SMMU_CMD_TLBI_NH_ASID] = "SMMU_CMD_TLBI_NH_ASID", | ||
130 | + [SMMU_CMD_TLBI_NH_VA] = "SMMU_CMD_TLBI_NH_VA", | ||
131 | + [SMMU_CMD_TLBI_NH_VAA] = "SMMU_CMD_TLBI_NH_VAA", | ||
132 | + [SMMU_CMD_TLBI_EL3_ALL] = "SMMU_CMD_TLBI_EL3_ALL", | ||
133 | + [SMMU_CMD_TLBI_EL3_VA] = "SMMU_CMD_TLBI_EL3_VA", | ||
134 | + [SMMU_CMD_TLBI_EL2_ALL] = "SMMU_CMD_TLBI_EL2_ALL", | ||
135 | + [SMMU_CMD_TLBI_EL2_ASID] = "SMMU_CMD_TLBI_EL2_ASID", | ||
136 | + [SMMU_CMD_TLBI_EL2_VA] = "SMMU_CMD_TLBI_EL2_VA", | ||
137 | + [SMMU_CMD_TLBI_EL2_VAA] = "SMMU_CMD_TLBI_EL2_VAA", | ||
138 | + [SMMU_CMD_TLBI_S12_VMALL] = "SMMU_CMD_TLBI_S12_VMALL", | ||
139 | + [SMMU_CMD_TLBI_S2_IPA] = "SMMU_CMD_TLBI_S2_IPA", | ||
140 | + [SMMU_CMD_TLBI_NSNH_ALL] = "SMMU_CMD_TLBI_NSNH_ALL", | ||
141 | + [SMMU_CMD_ATC_INV] = "SMMU_CMD_ATC_INV", | ||
142 | + [SMMU_CMD_PRI_RESP] = "SMMU_CMD_PRI_RESP", | ||
143 | + [SMMU_CMD_RESUME] = "SMMU_CMD_RESUME", | ||
144 | + [SMMU_CMD_STALL_TERM] = "SMMU_CMD_STALL_TERM", | ||
145 | + [SMMU_CMD_SYNC] = "SMMU_CMD_SYNC", | ||
146 | +}; | ||
147 | + | ||
148 | +static inline const char *smmu_cmd_string(SMMUCommandType type) | ||
149 | +{ | ||
150 | + if (type > SMMU_CMD_NONE && type < ARRAY_SIZE(cmd_stringify)) { | ||
151 | + return cmd_stringify[type] ? cmd_stringify[type] : "UNKNOWN"; | ||
152 | + } else { | ||
153 | + return "INVALID"; | ||
154 | + } | ||
155 | +} | ||
156 | + | ||
157 | +/* CMDQ fields */ | ||
158 | + | ||
159 | +typedef enum { | ||
160 | + SMMU_CERROR_NONE = 0, | ||
161 | + SMMU_CERROR_ILL, | ||
162 | + SMMU_CERROR_ABT, | ||
163 | + SMMU_CERROR_ATC_INV_SYNC, | ||
164 | +} SMMUCmdError; | ||
165 | + | ||
166 | +enum { /* Command completion notification */ | ||
167 | + CMD_SYNC_SIG_NONE, | ||
168 | + CMD_SYNC_SIG_IRQ, | ||
169 | + CMD_SYNC_SIG_SEV, | ||
170 | +}; | ||
171 | + | ||
172 | +#define CMD_TYPE(x) extract32((x)->word[0], 0 , 8) | ||
173 | +#define CMD_SSEC(x) extract32((x)->word[0], 10, 1) | ||
174 | +#define CMD_SSV(x) extract32((x)->word[0], 11, 1) | ||
175 | +#define CMD_RESUME_AC(x) extract32((x)->word[0], 12, 1) | ||
176 | +#define CMD_RESUME_AB(x) extract32((x)->word[0], 13, 1) | ||
177 | +#define CMD_SYNC_CS(x) extract32((x)->word[0], 12, 2) | ||
178 | +#define CMD_SSID(x) extract32((x)->word[0], 12, 20) | ||
179 | +#define CMD_SID(x) ((x)->word[1]) | ||
180 | +#define CMD_VMID(x) extract32((x)->word[1], 0 , 16) | ||
181 | +#define CMD_ASID(x) extract32((x)->word[1], 16, 16) | ||
182 | +#define CMD_RESUME_STAG(x) extract32((x)->word[2], 0 , 16) | ||
183 | +#define CMD_RESP(x) extract32((x)->word[2], 11, 2) | ||
184 | +#define CMD_LEAF(x) extract32((x)->word[2], 0 , 1) | ||
185 | +#define CMD_STE_RANGE(x) extract32((x)->word[2], 0 , 5) | ||
186 | +#define CMD_ADDR(x) ({ \ | ||
187 | + uint64_t high = (uint64_t)(x)->word[3]; \ | ||
188 | + uint64_t low = extract32((x)->word[2], 12, 20); \ | ||
189 | + uint64_t addr = high << 32 | (low << 12); \ | ||
190 | + addr; \ | ||
191 | + }) | ||
192 | + | ||
193 | +int smmuv3_cmdq_consume(SMMUv3State *s); | ||
194 | + | ||
195 | #endif | ||
196 | diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c | ||
197 | index XXXXXXX..XXXXXXX 100644 | ||
198 | --- a/hw/arm/smmuv3.c | ||
199 | +++ b/hw/arm/smmuv3.c | ||
200 | @@ -XXX,XX +XXX,XX @@ void smmuv3_write_gerrorn(SMMUv3State *s, uint32_t new_gerrorn) | ||
201 | trace_smmuv3_write_gerrorn(toggled & pending, s->gerrorn); | ||
202 | } | 16 | } |
203 | 17 | ||
204 | +static inline MemTxResult queue_read(SMMUQueue *q, void *data) | 18 | /* Touchscreen and keypad controller */ |
205 | +{ | 19 | -static MouseTransformInfo n800_pointercal = { |
206 | + dma_addr_t addr = Q_CONS_ENTRY(q); | 20 | +static const MouseTransformInfo n800_pointercal = { |
207 | + | 21 | .x = 800, |
208 | + return dma_memory_read(&address_space_memory, addr, data, q->entry_size); | 22 | .y = 480, |
209 | +} | 23 | .a = { 14560, -68, -3455208, -39, -9621, 35152972, 65536 }, |
210 | + | 24 | }; |
211 | +static MemTxResult queue_write(SMMUQueue *q, void *data) | 25 | |
212 | +{ | 26 | -static MouseTransformInfo n810_pointercal = { |
213 | + dma_addr_t addr = Q_PROD_ENTRY(q); | 27 | +static const MouseTransformInfo n810_pointercal = { |
214 | + MemTxResult ret; | 28 | .x = 800, |
215 | + | 29 | .y = 480, |
216 | + ret = dma_memory_write(&address_space_memory, addr, data, q->entry_size); | 30 | .a = { 15041, 148, -4731056, 171, -10238, 35933380, 65536 }, |
217 | + if (ret != MEMTX_OK) { | 31 | @@ -XXX,XX +XXX,XX @@ static void n810_key_event(void *opaque, int keycode) |
218 | + return ret; | 32 | |
219 | + } | 33 | #define M 0 |
220 | + | 34 | |
221 | + queue_prod_incr(q); | 35 | -static int n810_keys[0x80] = { |
222 | + return MEMTX_OK; | 36 | +static const int n810_keys[0x80] = { |
223 | +} | 37 | [0x01] = 16, /* Q */ |
224 | + | 38 | [0x02] = 37, /* K */ |
225 | +void smmuv3_write_eventq(SMMUv3State *s, Evt *evt) | 39 | [0x03] = 24, /* O */ |
226 | +{ | 40 | @@ -XXX,XX +XXX,XX @@ static void n8x0_usb_setup(struct n800_s *s) |
227 | + SMMUQueue *q = &s->eventq; | 41 | /* Setup done before the main bootloader starts by some early setup code |
228 | + | 42 | * - used when we want to run the main bootloader in emulation. This |
229 | + if (!smmuv3_eventq_enabled(s)) { | 43 | * isn't documented. */ |
230 | + return; | 44 | -static uint32_t n800_pinout[104] = { |
231 | + } | 45 | +static const uint32_t n800_pinout[104] = { |
232 | + | 46 | 0x080f00d8, 0x00d40808, 0x03080808, 0x080800d0, |
233 | + if (smmuv3_q_full(q)) { | 47 | 0x00dc0808, 0x0b0f0f00, 0x080800b4, 0x00c00808, |
234 | + return; | 48 | 0x08080808, 0x180800c4, 0x00b80000, 0x08080808, |
235 | + } | 49 | @@ -XXX,XX +XXX,XX @@ static void n8x0_boot_init(void *opaque) |
236 | + | 50 | #define OMAP_TAG_CBUS 0x4e03 |
237 | + queue_write(q, evt); | 51 | #define OMAP_TAG_EM_ASIC_BB5 0x4e04 |
238 | + | 52 | |
239 | + if (smmuv3_q_empty(q)) { | 53 | -static struct omap_gpiosw_info_s { |
240 | + smmuv3_trigger_irq(s, SMMU_IRQ_EVTQ, 0); | 54 | +static const struct omap_gpiosw_info_s { |
241 | + } | 55 | const char *name; |
242 | +} | 56 | int line; |
243 | + | 57 | int type; |
244 | static void smmuv3_init_regs(SMMUv3State *s) | 58 | @@ -XXX,XX +XXX,XX @@ static struct omap_gpiosw_info_s { |
59 | { NULL } | ||
60 | }; | ||
61 | |||
62 | -static struct omap_partition_info_s { | ||
63 | +static const struct omap_partition_info_s { | ||
64 | uint32_t offset; | ||
65 | uint32_t size; | ||
66 | int mask; | ||
67 | @@ -XXX,XX +XXX,XX @@ static struct omap_partition_info_s { | ||
68 | { 0, 0, 0, NULL } | ||
69 | }; | ||
70 | |||
71 | -static uint8_t n8x0_bd_addr[6] = { N8X0_BD_ADDR }; | ||
72 | +static const uint8_t n8x0_bd_addr[6] = { N8X0_BD_ADDR }; | ||
73 | |||
74 | static int n8x0_atag_setup(void *p, int model) | ||
245 | { | 75 | { |
246 | /** | 76 | uint8_t *b; |
247 | @@ -XXX,XX +XXX,XX @@ static void smmuv3_init_regs(SMMUv3State *s) | 77 | uint16_t *w; |
248 | s->sid_split = 0; | 78 | uint32_t *l; |
249 | } | 79 | - struct omap_gpiosw_info_s *gpiosw; |
250 | 80 | - struct omap_partition_info_s *partition; | |
251 | +int smmuv3_cmdq_consume(SMMUv3State *s) | 81 | + const struct omap_gpiosw_info_s *gpiosw; |
252 | +{ | 82 | + const struct omap_partition_info_s *partition; |
253 | + SMMUCmdError cmd_error = SMMU_CERROR_NONE; | 83 | const char *tag; |
254 | + SMMUQueue *q = &s->cmdq; | 84 | |
255 | + SMMUCommandType type = 0; | 85 | w = p; |
256 | + | ||
257 | + if (!smmuv3_cmdq_enabled(s)) { | ||
258 | + return 0; | ||
259 | + } | ||
260 | + /* | ||
261 | + * some commands depend on register values, typically CR0. In case those | ||
262 | + * register values change while handling the command, spec says it | ||
263 | + * is UNPREDICTABLE whether the command is interpreted under the new | ||
264 | + * or old value. | ||
265 | + */ | ||
266 | + | ||
267 | + while (!smmuv3_q_empty(q)) { | ||
268 | + uint32_t pending = s->gerror ^ s->gerrorn; | ||
269 | + Cmd cmd; | ||
270 | + | ||
271 | + trace_smmuv3_cmdq_consume(Q_PROD(q), Q_CONS(q), | ||
272 | + Q_PROD_WRAP(q), Q_CONS_WRAP(q)); | ||
273 | + | ||
274 | + if (FIELD_EX32(pending, GERROR, CMDQ_ERR)) { | ||
275 | + break; | ||
276 | + } | ||
277 | + | ||
278 | + if (queue_read(q, &cmd) != MEMTX_OK) { | ||
279 | + cmd_error = SMMU_CERROR_ABT; | ||
280 | + break; | ||
281 | + } | ||
282 | + | ||
283 | + type = CMD_TYPE(&cmd); | ||
284 | + | ||
285 | + trace_smmuv3_cmdq_opcode(smmu_cmd_string(type)); | ||
286 | + | ||
287 | + switch (type) { | ||
288 | + case SMMU_CMD_SYNC: | ||
289 | + if (CMD_SYNC_CS(&cmd) & CMD_SYNC_SIG_IRQ) { | ||
290 | + smmuv3_trigger_irq(s, SMMU_IRQ_CMD_SYNC, 0); | ||
291 | + } | ||
292 | + break; | ||
293 | + case SMMU_CMD_PREFETCH_CONFIG: | ||
294 | + case SMMU_CMD_PREFETCH_ADDR: | ||
295 | + case SMMU_CMD_CFGI_STE: | ||
296 | + case SMMU_CMD_CFGI_STE_RANGE: /* same as SMMU_CMD_CFGI_ALL */ | ||
297 | + case SMMU_CMD_CFGI_CD: | ||
298 | + case SMMU_CMD_CFGI_CD_ALL: | ||
299 | + case SMMU_CMD_TLBI_NH_ALL: | ||
300 | + case SMMU_CMD_TLBI_NH_ASID: | ||
301 | + case SMMU_CMD_TLBI_NH_VA: | ||
302 | + case SMMU_CMD_TLBI_NH_VAA: | ||
303 | + case SMMU_CMD_TLBI_EL3_ALL: | ||
304 | + case SMMU_CMD_TLBI_EL3_VA: | ||
305 | + case SMMU_CMD_TLBI_EL2_ALL: | ||
306 | + case SMMU_CMD_TLBI_EL2_ASID: | ||
307 | + case SMMU_CMD_TLBI_EL2_VA: | ||
308 | + case SMMU_CMD_TLBI_EL2_VAA: | ||
309 | + case SMMU_CMD_TLBI_S12_VMALL: | ||
310 | + case SMMU_CMD_TLBI_S2_IPA: | ||
311 | + case SMMU_CMD_TLBI_NSNH_ALL: | ||
312 | + case SMMU_CMD_ATC_INV: | ||
313 | + case SMMU_CMD_PRI_RESP: | ||
314 | + case SMMU_CMD_RESUME: | ||
315 | + case SMMU_CMD_STALL_TERM: | ||
316 | + trace_smmuv3_unhandled_cmd(type); | ||
317 | + break; | ||
318 | + default: | ||
319 | + cmd_error = SMMU_CERROR_ILL; | ||
320 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
321 | + "Illegal command type: %d\n", CMD_TYPE(&cmd)); | ||
322 | + break; | ||
323 | + } | ||
324 | + if (cmd_error) { | ||
325 | + break; | ||
326 | + } | ||
327 | + /* | ||
328 | + * We only increment the cons index after the completion of | ||
329 | + * the command. We do that because the SYNC returns immediately | ||
330 | + * and does not check the completion of previous commands | ||
331 | + */ | ||
332 | + queue_cons_incr(q); | ||
333 | + } | ||
334 | + | ||
335 | + if (cmd_error) { | ||
336 | + trace_smmuv3_cmdq_consume_error(smmu_cmd_string(type), cmd_error); | ||
337 | + smmu_write_cmdq_err(s, cmd_error); | ||
338 | + smmuv3_trigger_irq(s, SMMU_IRQ_GERROR, R_GERROR_CMDQ_ERR_MASK); | ||
339 | + } | ||
340 | + | ||
341 | + trace_smmuv3_cmdq_consume_out(Q_PROD(q), Q_CONS(q), | ||
342 | + Q_PROD_WRAP(q), Q_CONS_WRAP(q)); | ||
343 | + | ||
344 | + return 0; | ||
345 | +} | ||
346 | + | ||
347 | static MemTxResult smmu_write_mmio(void *opaque, hwaddr offset, uint64_t data, | ||
348 | unsigned size, MemTxAttrs attrs) | ||
349 | { | ||
350 | diff --git a/hw/arm/trace-events b/hw/arm/trace-events | ||
351 | index XXXXXXX..XXXXXXX 100644 | ||
352 | --- a/hw/arm/trace-events | ||
353 | +++ b/hw/arm/trace-events | ||
354 | @@ -XXX,XX +XXX,XX @@ smmuv3_read_mmio(uint64_t addr, uint64_t val, unsigned size, uint32_t r) "addr: | ||
355 | smmuv3_trigger_irq(int irq) "irq=%d" | ||
356 | smmuv3_write_gerror(uint32_t toggled, uint32_t gerror) "toggled=0x%x, new GERROR=0x%x" | ||
357 | smmuv3_write_gerrorn(uint32_t acked, uint32_t gerrorn) "acked=0x%x, new GERRORN=0x%x" | ||
358 | +smmuv3_unhandled_cmd(uint32_t type) "Unhandled command type=%d" | ||
359 | +smmuv3_cmdq_consume(uint32_t prod, uint32_t cons, uint8_t prod_wrap, uint8_t cons_wrap) "prod=%d cons=%d prod.wrap=%d cons.wrap=%d" | ||
360 | +smmuv3_cmdq_opcode(const char *opcode) "<--- %s" | ||
361 | +smmuv3_cmdq_consume_out(uint32_t prod, uint32_t cons, uint8_t prod_wrap, uint8_t cons_wrap) "prod:%d, cons:%d, prod_wrap:%d, cons_wrap:%d " | ||
362 | +smmuv3_cmdq_consume_error(const char *cmd_name, uint8_t cmd_error) "Error on %s command execution: %d" | ||
363 | -- | 86 | -- |
364 | 2.17.0 | 87 | 2.25.1 |
365 | 88 | ||
366 | 89 | diff view generated by jsdifflib |
1 | From: Jan Kiszka <jan.kiszka@siemens.com> | 1 | From: Philippe Mathieu-Daudé <philmd@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | This allows to pin the host controller in the Linux PCI domain space. | 3 | Silent when compiling with -Wextra: |
4 | Linux requires that property to be available consistently or not at all, | ||
5 | in which case the domain number becomes unstable on additions/removals. | ||
6 | Adding it here won't make a difference in practice for most setups as we | ||
7 | only expose one controller. | ||
8 | 4 | ||
9 | However, enabling Jailhouse on top may introduce another controller, and | 5 | ../hw/arm/nseries.c:1081:12: warning: missing field 'line' initializer [-Wmissing-field-initializers] |
10 | that one would like to have stable address as well. So the property is | 6 | { NULL } |
11 | needed for the first controller as well. | 7 | ^ |
12 | 8 | ||
13 | Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com> | 9 | Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org> |
14 | Message-id: 3301c5bc-7b47-1b0e-8ce4-30435057a276@web.de | 10 | Message-id: 20221220142520.24094-4-philmd@linaro.org |
15 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
17 | --- | 13 | --- |
18 | hw/arm/virt.c | 1 + | 14 | hw/arm/nseries.c | 10 ++++------ |
19 | 1 file changed, 1 insertion(+) | 15 | 1 file changed, 4 insertions(+), 6 deletions(-) |
20 | 16 | ||
21 | diff --git a/hw/arm/virt.c b/hw/arm/virt.c | 17 | diff --git a/hw/arm/nseries.c b/hw/arm/nseries.c |
22 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
23 | --- a/hw/arm/virt.c | 19 | --- a/hw/arm/nseries.c |
24 | +++ b/hw/arm/virt.c | 20 | +++ b/hw/arm/nseries.c |
25 | @@ -XXX,XX +XXX,XX @@ static void create_pcie(const VirtMachineState *vms, qemu_irq *pic) | 21 | @@ -XXX,XX +XXX,XX @@ static const struct omap_gpiosw_info_s { |
26 | qemu_fdt_setprop_string(vms->fdt, nodename, "device_type", "pci"); | 22 | "headphone", N8X0_HEADPHONE_GPIO, |
27 | qemu_fdt_setprop_cell(vms->fdt, nodename, "#address-cells", 3); | 23 | OMAP_GPIOSW_TYPE_CONNECTION | OMAP_GPIOSW_INVERTED, |
28 | qemu_fdt_setprop_cell(vms->fdt, nodename, "#size-cells", 2); | 24 | }, |
29 | + qemu_fdt_setprop_cell(vms->fdt, nodename, "linux,pci-domain", 0); | 25 | - { NULL } |
30 | qemu_fdt_setprop_cells(vms->fdt, nodename, "bus-range", 0, | 26 | + { /* end of list */ } |
31 | nr_pcie_buses - 1); | 27 | }, n810_gpiosw_info[] = { |
32 | qemu_fdt_setprop(vms->fdt, nodename, "dma-coherent", NULL, 0); | 28 | { |
29 | "gps_reset", N810_GPS_RESET_GPIO, | ||
30 | @@ -XXX,XX +XXX,XX @@ static const struct omap_gpiosw_info_s { | ||
31 | "slide", N810_SLIDE_GPIO, | ||
32 | OMAP_GPIOSW_TYPE_COVER | OMAP_GPIOSW_INVERTED, | ||
33 | }, | ||
34 | - { NULL } | ||
35 | + { /* end of list */ } | ||
36 | }; | ||
37 | |||
38 | static const struct omap_partition_info_s { | ||
39 | @@ -XXX,XX +XXX,XX @@ static const struct omap_partition_info_s { | ||
40 | { 0x00080000, 0x00200000, 0x0, "kernel" }, | ||
41 | { 0x00280000, 0x00200000, 0x3, "initfs" }, | ||
42 | { 0x00480000, 0x0fb80000, 0x3, "rootfs" }, | ||
43 | - | ||
44 | - { 0, 0, 0, NULL } | ||
45 | + { /* end of list */ } | ||
46 | }, n810_part_info[] = { | ||
47 | { 0x00000000, 0x00020000, 0x3, "bootloader" }, | ||
48 | { 0x00020000, 0x00060000, 0x0, "config" }, | ||
49 | { 0x00080000, 0x00220000, 0x0, "kernel" }, | ||
50 | { 0x002a0000, 0x00400000, 0x0, "initfs" }, | ||
51 | { 0x006a0000, 0x0f960000, 0x0, "rootfs" }, | ||
52 | - | ||
53 | - { 0, 0, 0, NULL } | ||
54 | + { /* end of list */ } | ||
55 | }; | ||
56 | |||
57 | static const uint8_t n8x0_bd_addr[6] = { N8X0_BD_ADDR }; | ||
33 | -- | 58 | -- |
34 | 2.17.0 | 59 | 2.25.1 |
35 | 60 | ||
36 | 61 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | 1 | From: Zhuojia Shen <chaosdefinition@hotmail.com> | |
2 | |||
3 | In CPUID registers exposed to userspace, some registers were missing | ||
4 | and some fields were not exposed. This patch aligns exposed ID | ||
5 | registers and their fields with what the upstream kernel currently | ||
6 | exposes. | ||
7 | |||
8 | Specifically, the following new ID registers/fields are exposed to | ||
9 | userspace: | ||
10 | |||
11 | ID_AA64PFR1_EL1.BT: bits 3-0 | ||
12 | ID_AA64PFR1_EL1.MTE: bits 11-8 | ||
13 | ID_AA64PFR1_EL1.SME: bits 27-24 | ||
14 | |||
15 | ID_AA64ZFR0_EL1.SVEver: bits 3-0 | ||
16 | ID_AA64ZFR0_EL1.AES: bits 7-4 | ||
17 | ID_AA64ZFR0_EL1.BitPerm: bits 19-16 | ||
18 | ID_AA64ZFR0_EL1.BF16: bits 23-20 | ||
19 | ID_AA64ZFR0_EL1.SHA3: bits 35-32 | ||
20 | ID_AA64ZFR0_EL1.SM4: bits 43-40 | ||
21 | ID_AA64ZFR0_EL1.I8MM: bits 47-44 | ||
22 | ID_AA64ZFR0_EL1.F32MM: bits 55-52 | ||
23 | ID_AA64ZFR0_EL1.F64MM: bits 59-56 | ||
24 | |||
25 | ID_AA64SMFR0_EL1.F32F32: bit 32 | ||
26 | ID_AA64SMFR0_EL1.B16F32: bit 34 | ||
27 | ID_AA64SMFR0_EL1.F16F32: bit 35 | ||
28 | ID_AA64SMFR0_EL1.I8I32: bits 39-36 | ||
29 | ID_AA64SMFR0_EL1.F64F64: bit 48 | ||
30 | ID_AA64SMFR0_EL1.I16I64: bits 55-52 | ||
31 | ID_AA64SMFR0_EL1.FA64: bit 63 | ||
32 | |||
33 | ID_AA64MMFR0_EL1.ECV: bits 63-60 | ||
34 | |||
35 | ID_AA64MMFR1_EL1.AFP: bits 47-44 | ||
36 | |||
37 | ID_AA64MMFR2_EL1.AT: bits 35-32 | ||
38 | |||
39 | ID_AA64ISAR0_EL1.RNDR: bits 63-60 | ||
40 | |||
41 | ID_AA64ISAR1_EL1.FRINTTS: bits 35-32 | ||
42 | ID_AA64ISAR1_EL1.BF16: bits 47-44 | ||
43 | ID_AA64ISAR1_EL1.DGH: bits 51-48 | ||
44 | ID_AA64ISAR1_EL1.I8MM: bits 55-52 | ||
45 | |||
46 | ID_AA64ISAR2_EL1.WFxT: bits 3-0 | ||
47 | ID_AA64ISAR2_EL1.RPRES: bits 7-4 | ||
48 | ID_AA64ISAR2_EL1.GPA3: bits 11-8 | ||
49 | ID_AA64ISAR2_EL1.APA3: bits 15-12 | ||
50 | |||
51 | The code is also refactored to use symbolic names for ID register fields | ||
52 | for better readability and maintainability. | ||
53 | |||
54 | The test case in tests/tcg/aarch64/sysregs.c is also updated to match | ||
55 | the intended behavior. | ||
56 | |||
57 | Signed-off-by: Zhuojia Shen <chaosdefinition@hotmail.com> | ||
58 | Message-id: DS7PR12MB6309FB585E10772928F14271ACE79@DS7PR12MB6309.namprd12.prod.outlook.com | ||
59 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
60 | [PMM: use Sn_n_Cn_Cn_n syntax to work with older assemblers | ||
61 | that don't recognize id_aa64isar2_el1 and id_aa64mmfr2_el1] | ||
62 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
63 | --- | ||
64 | target/arm/helper.c | 96 +++++++++++++++++++++++++------ | ||
65 | tests/tcg/aarch64/sysregs.c | 24 ++++++-- | ||
66 | tests/tcg/aarch64/Makefile.target | 7 ++- | ||
67 | 3 files changed, 103 insertions(+), 24 deletions(-) | ||
68 | |||
69 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
70 | index XXXXXXX..XXXXXXX 100644 | ||
71 | --- a/target/arm/helper.c | ||
72 | +++ b/target/arm/helper.c | ||
73 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) | ||
74 | #ifdef CONFIG_USER_ONLY | ||
75 | static const ARMCPRegUserSpaceInfo v8_user_idregs[] = { | ||
76 | { .name = "ID_AA64PFR0_EL1", | ||
77 | - .exported_bits = 0x000f000f00ff0000, | ||
78 | - .fixed_bits = 0x0000000000000011 }, | ||
79 | + .exported_bits = R_ID_AA64PFR0_FP_MASK | | ||
80 | + R_ID_AA64PFR0_ADVSIMD_MASK | | ||
81 | + R_ID_AA64PFR0_SVE_MASK | | ||
82 | + R_ID_AA64PFR0_DIT_MASK, | ||
83 | + .fixed_bits = (0x1u << R_ID_AA64PFR0_EL0_SHIFT) | | ||
84 | + (0x1u << R_ID_AA64PFR0_EL1_SHIFT) }, | ||
85 | { .name = "ID_AA64PFR1_EL1", | ||
86 | - .exported_bits = 0x00000000000000f0 }, | ||
87 | + .exported_bits = R_ID_AA64PFR1_BT_MASK | | ||
88 | + R_ID_AA64PFR1_SSBS_MASK | | ||
89 | + R_ID_AA64PFR1_MTE_MASK | | ||
90 | + R_ID_AA64PFR1_SME_MASK }, | ||
91 | { .name = "ID_AA64PFR*_EL1_RESERVED", | ||
92 | - .is_glob = true }, | ||
93 | - { .name = "ID_AA64ZFR0_EL1" }, | ||
94 | + .is_glob = true }, | ||
95 | + { .name = "ID_AA64ZFR0_EL1", | ||
96 | + .exported_bits = R_ID_AA64ZFR0_SVEVER_MASK | | ||
97 | + R_ID_AA64ZFR0_AES_MASK | | ||
98 | + R_ID_AA64ZFR0_BITPERM_MASK | | ||
99 | + R_ID_AA64ZFR0_BFLOAT16_MASK | | ||
100 | + R_ID_AA64ZFR0_SHA3_MASK | | ||
101 | + R_ID_AA64ZFR0_SM4_MASK | | ||
102 | + R_ID_AA64ZFR0_I8MM_MASK | | ||
103 | + R_ID_AA64ZFR0_F32MM_MASK | | ||
104 | + R_ID_AA64ZFR0_F64MM_MASK }, | ||
105 | + { .name = "ID_AA64SMFR0_EL1", | ||
106 | + .exported_bits = R_ID_AA64SMFR0_F32F32_MASK | | ||
107 | + R_ID_AA64SMFR0_B16F32_MASK | | ||
108 | + R_ID_AA64SMFR0_F16F32_MASK | | ||
109 | + R_ID_AA64SMFR0_I8I32_MASK | | ||
110 | + R_ID_AA64SMFR0_F64F64_MASK | | ||
111 | + R_ID_AA64SMFR0_I16I64_MASK | | ||
112 | + R_ID_AA64SMFR0_FA64_MASK }, | ||
113 | { .name = "ID_AA64MMFR0_EL1", | ||
114 | - .fixed_bits = 0x00000000ff000000 }, | ||
115 | - { .name = "ID_AA64MMFR1_EL1" }, | ||
116 | + .exported_bits = R_ID_AA64MMFR0_ECV_MASK, | ||
117 | + .fixed_bits = (0xfu << R_ID_AA64MMFR0_TGRAN64_SHIFT) | | ||
118 | + (0xfu << R_ID_AA64MMFR0_TGRAN4_SHIFT) }, | ||
119 | + { .name = "ID_AA64MMFR1_EL1", | ||
120 | + .exported_bits = R_ID_AA64MMFR1_AFP_MASK }, | ||
121 | + { .name = "ID_AA64MMFR2_EL1", | ||
122 | + .exported_bits = R_ID_AA64MMFR2_AT_MASK }, | ||
123 | { .name = "ID_AA64MMFR*_EL1_RESERVED", | ||
124 | - .is_glob = true }, | ||
125 | + .is_glob = true }, | ||
126 | { .name = "ID_AA64DFR0_EL1", | ||
127 | - .fixed_bits = 0x0000000000000006 }, | ||
128 | - { .name = "ID_AA64DFR1_EL1" }, | ||
129 | + .fixed_bits = (0x6u << R_ID_AA64DFR0_DEBUGVER_SHIFT) }, | ||
130 | + { .name = "ID_AA64DFR1_EL1" }, | ||
131 | { .name = "ID_AA64DFR*_EL1_RESERVED", | ||
132 | - .is_glob = true }, | ||
133 | + .is_glob = true }, | ||
134 | { .name = "ID_AA64AFR*", | ||
135 | - .is_glob = true }, | ||
136 | + .is_glob = true }, | ||
137 | { .name = "ID_AA64ISAR0_EL1", | ||
138 | - .exported_bits = 0x00fffffff0fffff0 }, | ||
139 | + .exported_bits = R_ID_AA64ISAR0_AES_MASK | | ||
140 | + R_ID_AA64ISAR0_SHA1_MASK | | ||
141 | + R_ID_AA64ISAR0_SHA2_MASK | | ||
142 | + R_ID_AA64ISAR0_CRC32_MASK | | ||
143 | + R_ID_AA64ISAR0_ATOMIC_MASK | | ||
144 | + R_ID_AA64ISAR0_RDM_MASK | | ||
145 | + R_ID_AA64ISAR0_SHA3_MASK | | ||
146 | + R_ID_AA64ISAR0_SM3_MASK | | ||
147 | + R_ID_AA64ISAR0_SM4_MASK | | ||
148 | + R_ID_AA64ISAR0_DP_MASK | | ||
149 | + R_ID_AA64ISAR0_FHM_MASK | | ||
150 | + R_ID_AA64ISAR0_TS_MASK | | ||
151 | + R_ID_AA64ISAR0_RNDR_MASK }, | ||
152 | { .name = "ID_AA64ISAR1_EL1", | ||
153 | - .exported_bits = 0x000000f0ffffffff }, | ||
154 | + .exported_bits = R_ID_AA64ISAR1_DPB_MASK | | ||
155 | + R_ID_AA64ISAR1_APA_MASK | | ||
156 | + R_ID_AA64ISAR1_API_MASK | | ||
157 | + R_ID_AA64ISAR1_JSCVT_MASK | | ||
158 | + R_ID_AA64ISAR1_FCMA_MASK | | ||
159 | + R_ID_AA64ISAR1_LRCPC_MASK | | ||
160 | + R_ID_AA64ISAR1_GPA_MASK | | ||
161 | + R_ID_AA64ISAR1_GPI_MASK | | ||
162 | + R_ID_AA64ISAR1_FRINTTS_MASK | | ||
163 | + R_ID_AA64ISAR1_SB_MASK | | ||
164 | + R_ID_AA64ISAR1_BF16_MASK | | ||
165 | + R_ID_AA64ISAR1_DGH_MASK | | ||
166 | + R_ID_AA64ISAR1_I8MM_MASK }, | ||
167 | + { .name = "ID_AA64ISAR2_EL1", | ||
168 | + .exported_bits = R_ID_AA64ISAR2_WFXT_MASK | | ||
169 | + R_ID_AA64ISAR2_RPRES_MASK | | ||
170 | + R_ID_AA64ISAR2_GPA3_MASK | | ||
171 | + R_ID_AA64ISAR2_APA3_MASK }, | ||
172 | { .name = "ID_AA64ISAR*_EL1_RESERVED", | ||
173 | - .is_glob = true }, | ||
174 | + .is_glob = true }, | ||
175 | }; | ||
176 | modify_arm_cp_regs(v8_idregs, v8_user_idregs); | ||
177 | #endif | ||
178 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) | ||
179 | #ifdef CONFIG_USER_ONLY | ||
180 | static const ARMCPRegUserSpaceInfo id_v8_user_midr_cp_reginfo[] = { | ||
181 | { .name = "MIDR_EL1", | ||
182 | - .exported_bits = 0x00000000ffffffff }, | ||
183 | - { .name = "REVIDR_EL1" }, | ||
184 | + .exported_bits = R_MIDR_EL1_REVISION_MASK | | ||
185 | + R_MIDR_EL1_PARTNUM_MASK | | ||
186 | + R_MIDR_EL1_ARCHITECTURE_MASK | | ||
187 | + R_MIDR_EL1_VARIANT_MASK | | ||
188 | + R_MIDR_EL1_IMPLEMENTER_MASK }, | ||
189 | + { .name = "REVIDR_EL1" }, | ||
190 | }; | ||
191 | modify_arm_cp_regs(id_v8_midr_cp_reginfo, id_v8_user_midr_cp_reginfo); | ||
192 | #endif | ||
193 | diff --git a/tests/tcg/aarch64/sysregs.c b/tests/tcg/aarch64/sysregs.c | ||
194 | index XXXXXXX..XXXXXXX 100644 | ||
195 | --- a/tests/tcg/aarch64/sysregs.c | ||
196 | +++ b/tests/tcg/aarch64/sysregs.c | ||
197 | @@ -XXX,XX +XXX,XX @@ | ||
198 | #define HWCAP_CPUID (1 << 11) | ||
199 | #endif | ||
200 | |||
201 | +/* | ||
202 | + * Older assemblers don't recognize newer system register names, | ||
203 | + * but we can still access them by the Sn_n_Cn_Cn_n syntax. | ||
204 | + */ | ||
205 | +#define SYS_ID_AA64ISAR2_EL1 S3_0_C0_C6_2 | ||
206 | +#define SYS_ID_AA64MMFR2_EL1 S3_0_C0_C7_2 | ||
207 | + | ||
208 | int failed_bit_count; | ||
209 | |||
210 | /* Read and print system register `id' value */ | ||
211 | @@ -XXX,XX +XXX,XX @@ int main(void) | ||
212 | * minimum valid fields - for the purposes of this check allowed | ||
213 | * to have non-zero values. | ||
214 | */ | ||
215 | - get_cpu_reg_check_mask(id_aa64isar0_el1, _m(00ff,ffff,f0ff,fff0)); | ||
216 | - get_cpu_reg_check_mask(id_aa64isar1_el1, _m(0000,00f0,ffff,ffff)); | ||
217 | + get_cpu_reg_check_mask(id_aa64isar0_el1, _m(f0ff,ffff,f0ff,fff0)); | ||
218 | + get_cpu_reg_check_mask(id_aa64isar1_el1, _m(00ff,f0ff,ffff,ffff)); | ||
219 | + get_cpu_reg_check_mask(SYS_ID_AA64ISAR2_EL1, _m(0000,0000,0000,ffff)); | ||
220 | /* TGran4 & TGran64 as pegged to -1 */ | ||
221 | - get_cpu_reg_check_mask(id_aa64mmfr0_el1, _m(0000,0000,ff00,0000)); | ||
222 | - get_cpu_reg_check_zero(id_aa64mmfr1_el1); | ||
223 | + get_cpu_reg_check_mask(id_aa64mmfr0_el1, _m(f000,0000,ff00,0000)); | ||
224 | + get_cpu_reg_check_mask(id_aa64mmfr1_el1, _m(0000,f000,0000,0000)); | ||
225 | + get_cpu_reg_check_mask(SYS_ID_AA64MMFR2_EL1, _m(0000,000f,0000,0000)); | ||
226 | /* EL1/EL0 reported as AA64 only */ | ||
227 | get_cpu_reg_check_mask(id_aa64pfr0_el1, _m(000f,000f,00ff,0011)); | ||
228 | - get_cpu_reg_check_mask(id_aa64pfr1_el1, _m(0000,0000,0000,00f0)); | ||
229 | + get_cpu_reg_check_mask(id_aa64pfr1_el1, _m(0000,0000,0f00,0fff)); | ||
230 | /* all hidden, DebugVer fixed to 0x6 (ARMv8 debug architecture) */ | ||
231 | get_cpu_reg_check_mask(id_aa64dfr0_el1, _m(0000,0000,0000,0006)); | ||
232 | get_cpu_reg_check_zero(id_aa64dfr1_el1); | ||
233 | - get_cpu_reg_check_zero(id_aa64zfr0_el1); | ||
234 | + get_cpu_reg_check_mask(id_aa64zfr0_el1, _m(0ff0,ff0f,00ff,00ff)); | ||
235 | +#ifdef HAS_ARMV9_SME | ||
236 | + get_cpu_reg_check_mask(id_aa64smfr0_el1, _m(80f1,00fd,0000,0000)); | ||
237 | +#endif | ||
238 | |||
239 | get_cpu_reg_check_zero(id_aa64afr0_el1); | ||
240 | get_cpu_reg_check_zero(id_aa64afr1_el1); | ||
241 | diff --git a/tests/tcg/aarch64/Makefile.target b/tests/tcg/aarch64/Makefile.target | ||
242 | index XXXXXXX..XXXXXXX 100644 | ||
243 | --- a/tests/tcg/aarch64/Makefile.target | ||
244 | +++ b/tests/tcg/aarch64/Makefile.target | ||
245 | @@ -XXX,XX +XXX,XX @@ config-cc.mak: Makefile | ||
246 | $(call cc-option,-march=armv8.1-a+sve2, CROSS_CC_HAS_SVE2); \ | ||
247 | $(call cc-option,-march=armv8.3-a, CROSS_CC_HAS_ARMV8_3); \ | ||
248 | $(call cc-option,-mbranch-protection=standard, CROSS_CC_HAS_ARMV8_BTI); \ | ||
249 | - $(call cc-option,-march=armv8.5-a+memtag, CROSS_CC_HAS_ARMV8_MTE)) 3> config-cc.mak | ||
250 | + $(call cc-option,-march=armv8.5-a+memtag, CROSS_CC_HAS_ARMV8_MTE); \ | ||
251 | + $(call cc-option,-march=armv9-a+sme, CROSS_CC_HAS_ARMV9_SME)) 3> config-cc.mak | ||
252 | -include config-cc.mak | ||
253 | |||
254 | # Pauth Tests | ||
255 | @@ -XXX,XX +XXX,XX @@ endif | ||
256 | ifneq ($(CROSS_CC_HAS_SVE),) | ||
257 | # System Registers Tests | ||
258 | AARCH64_TESTS += sysregs | ||
259 | +ifneq ($(CROSS_CC_HAS_ARMV9_SME),) | ||
260 | +sysregs: CFLAGS+=-march=armv9-a+sme -DHAS_ARMV9_SME | ||
261 | +else | ||
262 | sysregs: CFLAGS+=-march=armv8.1-a+sve | ||
263 | +endif | ||
264 | |||
265 | # SVE ioctl test | ||
266 | AARCH64_TESTS += sve-ioctls | ||
267 | -- | ||
268 | 2.25.1 | diff view generated by jsdifflib |
1 | From: Eric Auger <eric.auger@redhat.com> | 1 | From: Philippe Mathieu-Daudé <philmd@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | This patch implements the page table walk for VMSAv8-64. | 3 | This function is not used anywhere outside this file, |
4 | so we can make the function "static void". | ||
4 | 5 | ||
5 | Signed-off-by: Eric Auger <eric.auger@redhat.com> | 6 | Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org> |
6 | Signed-off-by: Prem Mallappa <prem.mallappa@broadcom.com> | 7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
7 | Message-id: 1524665762-31355-4-git-send-email-eric.auger@redhat.com | 8 | Reviewed-by: Eric Auger <eric.auger@redhat.com> |
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Message-id: 20221216214924.4711-2-philmd@linaro.org |
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | --- | 11 | --- |
11 | hw/arm/smmu-internal.h | 99 ++++++++++++++++ | 12 | include/hw/arm/smmu-common.h | 3 --- |
12 | include/hw/arm/smmu-common.h | 14 +++ | 13 | hw/arm/smmu-common.c | 2 +- |
13 | hw/arm/smmu-common.c | 222 +++++++++++++++++++++++++++++++++++ | 14 | 2 files changed, 1 insertion(+), 4 deletions(-) |
14 | hw/arm/trace-events | 9 +- | ||
15 | 4 files changed, 343 insertions(+), 1 deletion(-) | ||
16 | create mode 100644 hw/arm/smmu-internal.h | ||
17 | 15 | ||
18 | diff --git a/hw/arm/smmu-internal.h b/hw/arm/smmu-internal.h | ||
19 | new file mode 100644 | ||
20 | index XXXXXXX..XXXXXXX | ||
21 | --- /dev/null | ||
22 | +++ b/hw/arm/smmu-internal.h | ||
23 | @@ -XXX,XX +XXX,XX @@ | ||
24 | +/* | ||
25 | + * ARM SMMU support - Internal API | ||
26 | + * | ||
27 | + * Copyright (c) 2017 Red Hat, Inc. | ||
28 | + * Copyright (C) 2014-2016 Broadcom Corporation | ||
29 | + * Written by Prem Mallappa, Eric Auger | ||
30 | + * | ||
31 | + * This program is free software; you can redistribute it and/or modify | ||
32 | + * it under the terms of the GNU General Public License version 2 as | ||
33 | + * published by the Free Software Foundation. | ||
34 | + * | ||
35 | + * This program is distributed in the hope that it will be useful, | ||
36 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
37 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
38 | + * General Public License for more details. | ||
39 | + * | ||
40 | + * You should have received a copy of the GNU General Public License along | ||
41 | + * with this program; if not, see <http://www.gnu.org/licenses/>. | ||
42 | + */ | ||
43 | + | ||
44 | +#ifndef HW_ARM_SMMU_INTERNAL_H | ||
45 | +#define HW_ARM_SMMU_INTERNAL_H | ||
46 | + | ||
47 | +#define TBI0(tbi) ((tbi) & 0x1) | ||
48 | +#define TBI1(tbi) ((tbi) & 0x2 >> 1) | ||
49 | + | ||
50 | +/* PTE Manipulation */ | ||
51 | + | ||
52 | +#define ARM_LPAE_PTE_TYPE_SHIFT 0 | ||
53 | +#define ARM_LPAE_PTE_TYPE_MASK 0x3 | ||
54 | + | ||
55 | +#define ARM_LPAE_PTE_TYPE_BLOCK 1 | ||
56 | +#define ARM_LPAE_PTE_TYPE_TABLE 3 | ||
57 | + | ||
58 | +#define ARM_LPAE_L3_PTE_TYPE_RESERVED 1 | ||
59 | +#define ARM_LPAE_L3_PTE_TYPE_PAGE 3 | ||
60 | + | ||
61 | +#define ARM_LPAE_PTE_VALID (1 << 0) | ||
62 | + | ||
63 | +#define PTE_ADDRESS(pte, shift) \ | ||
64 | + (extract64(pte, shift, 47 - shift + 1) << shift) | ||
65 | + | ||
66 | +#define is_invalid_pte(pte) (!(pte & ARM_LPAE_PTE_VALID)) | ||
67 | + | ||
68 | +#define is_reserved_pte(pte, level) \ | ||
69 | + ((level == 3) && \ | ||
70 | + ((pte & ARM_LPAE_PTE_TYPE_MASK) == ARM_LPAE_L3_PTE_TYPE_RESERVED)) | ||
71 | + | ||
72 | +#define is_block_pte(pte, level) \ | ||
73 | + ((level < 3) && \ | ||
74 | + ((pte & ARM_LPAE_PTE_TYPE_MASK) == ARM_LPAE_PTE_TYPE_BLOCK)) | ||
75 | + | ||
76 | +#define is_table_pte(pte, level) \ | ||
77 | + ((level < 3) && \ | ||
78 | + ((pte & ARM_LPAE_PTE_TYPE_MASK) == ARM_LPAE_PTE_TYPE_TABLE)) | ||
79 | + | ||
80 | +#define is_page_pte(pte, level) \ | ||
81 | + ((level == 3) && \ | ||
82 | + ((pte & ARM_LPAE_PTE_TYPE_MASK) == ARM_LPAE_L3_PTE_TYPE_PAGE)) | ||
83 | + | ||
84 | +/* access permissions */ | ||
85 | + | ||
86 | +#define PTE_AP(pte) \ | ||
87 | + (extract64(pte, 6, 2)) | ||
88 | + | ||
89 | +#define PTE_APTABLE(pte) \ | ||
90 | + (extract64(pte, 61, 2)) | ||
91 | + | ||
92 | +/* | ||
93 | + * TODO: At the moment all transactions are considered as privileged (EL1) | ||
94 | + * as IOMMU translation callback does not pass user/priv attributes. | ||
95 | + */ | ||
96 | +#define is_permission_fault(ap, perm) \ | ||
97 | + (((perm) & IOMMU_WO) && ((ap) & 0x2)) | ||
98 | + | ||
99 | +#define PTE_AP_TO_PERM(ap) \ | ||
100 | + (IOMMU_ACCESS_FLAG(true, !((ap) & 0x2))) | ||
101 | + | ||
102 | +/* Level Indexing */ | ||
103 | + | ||
104 | +static inline int level_shift(int level, int granule_sz) | ||
105 | +{ | ||
106 | + return granule_sz + (3 - level) * (granule_sz - 3); | ||
107 | +} | ||
108 | + | ||
109 | +static inline uint64_t level_page_mask(int level, int granule_sz) | ||
110 | +{ | ||
111 | + return ~(MAKE_64BIT_MASK(0, level_shift(level, granule_sz))); | ||
112 | +} | ||
113 | + | ||
114 | +static inline | ||
115 | +uint64_t iova_level_offset(uint64_t iova, int inputsize, | ||
116 | + int level, int gsz) | ||
117 | +{ | ||
118 | + return ((iova & MAKE_64BIT_MASK(0, inputsize)) >> level_shift(level, gsz)) & | ||
119 | + MAKE_64BIT_MASK(0, gsz - 3); | ||
120 | +} | ||
121 | + | ||
122 | +#endif | ||
123 | diff --git a/include/hw/arm/smmu-common.h b/include/hw/arm/smmu-common.h | 16 | diff --git a/include/hw/arm/smmu-common.h b/include/hw/arm/smmu-common.h |
124 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
125 | --- a/include/hw/arm/smmu-common.h | 18 | --- a/include/hw/arm/smmu-common.h |
126 | +++ b/include/hw/arm/smmu-common.h | 19 | +++ b/include/hw/arm/smmu-common.h |
127 | @@ -XXX,XX +XXX,XX @@ static inline uint16_t smmu_get_sid(SMMUDevice *sdev) | 20 | @@ -XXX,XX +XXX,XX @@ void smmu_iotlb_inv_iova(SMMUState *s, int asid, dma_addr_t iova, |
128 | { | 21 | /* Unmap the range of all the notifiers registered to any IOMMU mr */ |
129 | return PCI_BUILD_BDF(pci_bus_num(sdev->bus), sdev->devfn); | 22 | void smmu_inv_notifiers_all(SMMUState *s); |
130 | } | 23 | |
131 | + | 24 | -/* Unmap the range of all the notifiers registered to @mr */ |
132 | +/** | 25 | -void smmu_inv_notifiers_mr(IOMMUMemoryRegion *mr); |
133 | + * smmu_ptw - Perform the page table walk for a given iova / access flags | 26 | - |
134 | + * pair, according to @cfg translation config | 27 | #endif /* HW_ARM_SMMU_COMMON_H */ |
135 | + */ | ||
136 | +int smmu_ptw(SMMUTransCfg *cfg, dma_addr_t iova, IOMMUAccessFlags perm, | ||
137 | + IOMMUTLBEntry *tlbe, SMMUPTWEventInfo *info); | ||
138 | + | ||
139 | +/** | ||
140 | + * select_tt - compute which translation table shall be used according to | ||
141 | + * the input iova and translation config and return the TT specific info | ||
142 | + */ | ||
143 | +SMMUTransTableInfo *select_tt(SMMUTransCfg *cfg, dma_addr_t iova); | ||
144 | + | ||
145 | #endif /* HW_ARM_SMMU_COMMON */ | ||
146 | diff --git a/hw/arm/smmu-common.c b/hw/arm/smmu-common.c | 28 | diff --git a/hw/arm/smmu-common.c b/hw/arm/smmu-common.c |
147 | index XXXXXXX..XXXXXXX 100644 | 29 | index XXXXXXX..XXXXXXX 100644 |
148 | --- a/hw/arm/smmu-common.c | 30 | --- a/hw/arm/smmu-common.c |
149 | +++ b/hw/arm/smmu-common.c | 31 | +++ b/hw/arm/smmu-common.c |
150 | @@ -XXX,XX +XXX,XX @@ | 32 | @@ -XXX,XX +XXX,XX @@ static void smmu_unmap_notifier_range(IOMMUNotifier *n) |
151 | 33 | } | |
152 | #include "qemu/error-report.h" | 34 | |
153 | #include "hw/arm/smmu-common.h" | 35 | /* Unmap all notifiers attached to @mr */ |
154 | +#include "smmu-internal.h" | 36 | -inline void smmu_inv_notifiers_mr(IOMMUMemoryRegion *mr) |
155 | + | 37 | +static void smmu_inv_notifiers_mr(IOMMUMemoryRegion *mr) |
156 | +/* VMSAv8-64 Translation */ | 38 | { |
157 | + | 39 | IOMMUNotifier *n; |
158 | +/** | 40 | |
159 | + * get_pte - Get the content of a page table entry located at | ||
160 | + * @base_addr[@index] | ||
161 | + */ | ||
162 | +static int get_pte(dma_addr_t baseaddr, uint32_t index, uint64_t *pte, | ||
163 | + SMMUPTWEventInfo *info) | ||
164 | +{ | ||
165 | + int ret; | ||
166 | + dma_addr_t addr = baseaddr + index * sizeof(*pte); | ||
167 | + | ||
168 | + /* TODO: guarantee 64-bit single-copy atomicity */ | ||
169 | + ret = dma_memory_read(&address_space_memory, addr, | ||
170 | + (uint8_t *)pte, sizeof(*pte)); | ||
171 | + | ||
172 | + if (ret != MEMTX_OK) { | ||
173 | + info->type = SMMU_PTW_ERR_WALK_EABT; | ||
174 | + info->addr = addr; | ||
175 | + return -EINVAL; | ||
176 | + } | ||
177 | + trace_smmu_get_pte(baseaddr, index, addr, *pte); | ||
178 | + return 0; | ||
179 | +} | ||
180 | + | ||
181 | +/* VMSAv8-64 Translation Table Format Descriptor Decoding */ | ||
182 | + | ||
183 | +/** | ||
184 | + * get_page_pte_address - returns the L3 descriptor output address, | ||
185 | + * ie. the page frame | ||
186 | + * ARM ARM spec: Figure D4-17 VMSAv8-64 level 3 descriptor format | ||
187 | + */ | ||
188 | +static inline hwaddr get_page_pte_address(uint64_t pte, int granule_sz) | ||
189 | +{ | ||
190 | + return PTE_ADDRESS(pte, granule_sz); | ||
191 | +} | ||
192 | + | ||
193 | +/** | ||
194 | + * get_table_pte_address - return table descriptor output address, | ||
195 | + * ie. address of next level table | ||
196 | + * ARM ARM Figure D4-16 VMSAv8-64 level0, level1, and level 2 descriptor formats | ||
197 | + */ | ||
198 | +static inline hwaddr get_table_pte_address(uint64_t pte, int granule_sz) | ||
199 | +{ | ||
200 | + return PTE_ADDRESS(pte, granule_sz); | ||
201 | +} | ||
202 | + | ||
203 | +/** | ||
204 | + * get_block_pte_address - return block descriptor output address and block size | ||
205 | + * ARM ARM Figure D4-16 VMSAv8-64 level0, level1, and level 2 descriptor formats | ||
206 | + */ | ||
207 | +static inline hwaddr get_block_pte_address(uint64_t pte, int level, | ||
208 | + int granule_sz, uint64_t *bsz) | ||
209 | +{ | ||
210 | + int n = (granule_sz - 3) * (4 - level) + 3; | ||
211 | + | ||
212 | + *bsz = 1 << n; | ||
213 | + return PTE_ADDRESS(pte, n); | ||
214 | +} | ||
215 | + | ||
216 | +SMMUTransTableInfo *select_tt(SMMUTransCfg *cfg, dma_addr_t iova) | ||
217 | +{ | ||
218 | + bool tbi = extract64(iova, 55, 1) ? TBI1(cfg->tbi) : TBI0(cfg->tbi); | ||
219 | + uint8_t tbi_byte = tbi * 8; | ||
220 | + | ||
221 | + if (cfg->tt[0].tsz && | ||
222 | + !extract64(iova, 64 - cfg->tt[0].tsz, cfg->tt[0].tsz - tbi_byte)) { | ||
223 | + /* there is a ttbr0 region and we are in it (high bits all zero) */ | ||
224 | + return &cfg->tt[0]; | ||
225 | + } else if (cfg->tt[1].tsz && | ||
226 | + !extract64(iova, 64 - cfg->tt[1].tsz, cfg->tt[1].tsz - tbi_byte)) { | ||
227 | + /* there is a ttbr1 region and we are in it (high bits all one) */ | ||
228 | + return &cfg->tt[1]; | ||
229 | + } else if (!cfg->tt[0].tsz) { | ||
230 | + /* ttbr0 region is "everything not in the ttbr1 region" */ | ||
231 | + return &cfg->tt[0]; | ||
232 | + } else if (!cfg->tt[1].tsz) { | ||
233 | + /* ttbr1 region is "everything not in the ttbr0 region" */ | ||
234 | + return &cfg->tt[1]; | ||
235 | + } | ||
236 | + /* in the gap between the two regions, this is a Translation fault */ | ||
237 | + return NULL; | ||
238 | +} | ||
239 | + | ||
240 | +/** | ||
241 | + * smmu_ptw_64 - VMSAv8-64 Walk of the page tables for a given IOVA | ||
242 | + * @cfg: translation config | ||
243 | + * @iova: iova to translate | ||
244 | + * @perm: access type | ||
245 | + * @tlbe: IOMMUTLBEntry (out) | ||
246 | + * @info: handle to an error info | ||
247 | + * | ||
248 | + * Return 0 on success, < 0 on error. In case of error, @info is filled | ||
249 | + * and tlbe->perm is set to IOMMU_NONE. | ||
250 | + * Upon success, @tlbe is filled with translated_addr and entry | ||
251 | + * permission rights. | ||
252 | + */ | ||
253 | +static int smmu_ptw_64(SMMUTransCfg *cfg, | ||
254 | + dma_addr_t iova, IOMMUAccessFlags perm, | ||
255 | + IOMMUTLBEntry *tlbe, SMMUPTWEventInfo *info) | ||
256 | +{ | ||
257 | + dma_addr_t baseaddr, indexmask; | ||
258 | + int stage = cfg->stage; | ||
259 | + SMMUTransTableInfo *tt = select_tt(cfg, iova); | ||
260 | + uint8_t level, granule_sz, inputsize, stride; | ||
261 | + | ||
262 | + if (!tt || tt->disabled) { | ||
263 | + info->type = SMMU_PTW_ERR_TRANSLATION; | ||
264 | + goto error; | ||
265 | + } | ||
266 | + | ||
267 | + granule_sz = tt->granule_sz; | ||
268 | + stride = granule_sz - 3; | ||
269 | + inputsize = 64 - tt->tsz; | ||
270 | + level = 4 - (inputsize - 4) / stride; | ||
271 | + indexmask = (1ULL << (inputsize - (stride * (4 - level)))) - 1; | ||
272 | + baseaddr = extract64(tt->ttb, 0, 48); | ||
273 | + baseaddr &= ~indexmask; | ||
274 | + | ||
275 | + tlbe->iova = iova; | ||
276 | + tlbe->addr_mask = (1 << granule_sz) - 1; | ||
277 | + | ||
278 | + while (level <= 3) { | ||
279 | + uint64_t subpage_size = 1ULL << level_shift(level, granule_sz); | ||
280 | + uint64_t mask = subpage_size - 1; | ||
281 | + uint32_t offset = iova_level_offset(iova, inputsize, level, granule_sz); | ||
282 | + uint64_t pte; | ||
283 | + dma_addr_t pte_addr = baseaddr + offset * sizeof(pte); | ||
284 | + uint8_t ap; | ||
285 | + | ||
286 | + if (get_pte(baseaddr, offset, &pte, info)) { | ||
287 | + goto error; | ||
288 | + } | ||
289 | + trace_smmu_ptw_level(level, iova, subpage_size, | ||
290 | + baseaddr, offset, pte); | ||
291 | + | ||
292 | + if (is_invalid_pte(pte) || is_reserved_pte(pte, level)) { | ||
293 | + trace_smmu_ptw_invalid_pte(stage, level, baseaddr, | ||
294 | + pte_addr, offset, pte); | ||
295 | + info->type = SMMU_PTW_ERR_TRANSLATION; | ||
296 | + goto error; | ||
297 | + } | ||
298 | + | ||
299 | + if (is_page_pte(pte, level)) { | ||
300 | + uint64_t gpa = get_page_pte_address(pte, granule_sz); | ||
301 | + | ||
302 | + ap = PTE_AP(pte); | ||
303 | + if (is_permission_fault(ap, perm)) { | ||
304 | + info->type = SMMU_PTW_ERR_PERMISSION; | ||
305 | + goto error; | ||
306 | + } | ||
307 | + | ||
308 | + tlbe->translated_addr = gpa + (iova & mask); | ||
309 | + tlbe->perm = PTE_AP_TO_PERM(ap); | ||
310 | + trace_smmu_ptw_page_pte(stage, level, iova, | ||
311 | + baseaddr, pte_addr, pte, gpa); | ||
312 | + return 0; | ||
313 | + } | ||
314 | + if (is_block_pte(pte, level)) { | ||
315 | + uint64_t block_size; | ||
316 | + hwaddr gpa = get_block_pte_address(pte, level, granule_sz, | ||
317 | + &block_size); | ||
318 | + | ||
319 | + ap = PTE_AP(pte); | ||
320 | + if (is_permission_fault(ap, perm)) { | ||
321 | + info->type = SMMU_PTW_ERR_PERMISSION; | ||
322 | + goto error; | ||
323 | + } | ||
324 | + | ||
325 | + trace_smmu_ptw_block_pte(stage, level, baseaddr, | ||
326 | + pte_addr, pte, iova, gpa, | ||
327 | + block_size >> 20); | ||
328 | + | ||
329 | + tlbe->translated_addr = gpa + (iova & mask); | ||
330 | + tlbe->perm = PTE_AP_TO_PERM(ap); | ||
331 | + return 0; | ||
332 | + } | ||
333 | + | ||
334 | + /* table pte */ | ||
335 | + ap = PTE_APTABLE(pte); | ||
336 | + | ||
337 | + if (is_permission_fault(ap, perm)) { | ||
338 | + info->type = SMMU_PTW_ERR_PERMISSION; | ||
339 | + goto error; | ||
340 | + } | ||
341 | + baseaddr = get_table_pte_address(pte, granule_sz); | ||
342 | + level++; | ||
343 | + } | ||
344 | + | ||
345 | + info->type = SMMU_PTW_ERR_TRANSLATION; | ||
346 | + | ||
347 | +error: | ||
348 | + tlbe->perm = IOMMU_NONE; | ||
349 | + return -EINVAL; | ||
350 | +} | ||
351 | + | ||
352 | +/** | ||
353 | + * smmu_ptw - Walk the page tables for an IOVA, according to @cfg | ||
354 | + * | ||
355 | + * @cfg: translation configuration | ||
356 | + * @iova: iova to translate | ||
357 | + * @perm: tentative access type | ||
358 | + * @tlbe: returned entry | ||
359 | + * @info: ptw event handle | ||
360 | + * | ||
361 | + * return 0 on success | ||
362 | + */ | ||
363 | +inline int smmu_ptw(SMMUTransCfg *cfg, dma_addr_t iova, IOMMUAccessFlags perm, | ||
364 | + IOMMUTLBEntry *tlbe, SMMUPTWEventInfo *info) | ||
365 | +{ | ||
366 | + if (!cfg->aa64) { | ||
367 | + /* | ||
368 | + * This code path is not entered as we check this while decoding | ||
369 | + * the configuration data in the derived SMMU model. | ||
370 | + */ | ||
371 | + g_assert_not_reached(); | ||
372 | + } | ||
373 | + | ||
374 | + return smmu_ptw_64(cfg, iova, perm, tlbe, info); | ||
375 | +} | ||
376 | |||
377 | /** | ||
378 | * The bus number is used for lookup when SID based invalidation occurs. | ||
379 | diff --git a/hw/arm/trace-events b/hw/arm/trace-events | ||
380 | index XXXXXXX..XXXXXXX 100644 | ||
381 | --- a/hw/arm/trace-events | ||
382 | +++ b/hw/arm/trace-events | ||
383 | @@ -XXX,XX +XXX,XX @@ | ||
384 | virt_acpi_setup(void) "No fw cfg or ACPI disabled. Bailing out." | ||
385 | |||
386 | # hw/arm/smmu-common.c | ||
387 | -smmu_add_mr(const char *name) "%s" | ||
388 | \ No newline at end of file | ||
389 | +smmu_add_mr(const char *name) "%s" | ||
390 | +smmu_page_walk(int stage, uint64_t baseaddr, int first_level, uint64_t start, uint64_t end) "stage=%d, baseaddr=0x%"PRIx64", first level=%d, start=0x%"PRIx64", end=0x%"PRIx64 | ||
391 | +smmu_lookup_table(int level, uint64_t baseaddr, int granule_sz, uint64_t start, uint64_t end, int flags, uint64_t subpage_size) "level=%d baseaddr=0x%"PRIx64" granule=%d, start=0x%"PRIx64" end=0x%"PRIx64" flags=%d subpage_size=0x%"PRIx64 | ||
392 | +smmu_ptw_level(int level, uint64_t iova, size_t subpage_size, uint64_t baseaddr, uint32_t offset, uint64_t pte) "level=%d iova=0x%"PRIx64" subpage_sz=0x%lx baseaddr=0x%"PRIx64" offset=%d => pte=0x%"PRIx64 | ||
393 | +smmu_ptw_invalid_pte(int stage, int level, uint64_t baseaddr, uint64_t pteaddr, uint32_t offset, uint64_t pte) "stage=%d level=%d base@=0x%"PRIx64" pte@=0x%"PRIx64" offset=%d pte=0x%"PRIx64 | ||
394 | +smmu_ptw_page_pte(int stage, int level, uint64_t iova, uint64_t baseaddr, uint64_t pteaddr, uint64_t pte, uint64_t address) "stage=%d level=%d iova=0x%"PRIx64" base@=0x%"PRIx64" pte@=0x%"PRIx64" pte=0x%"PRIx64" page address = 0x%"PRIx64 | ||
395 | +smmu_ptw_block_pte(int stage, int level, uint64_t baseaddr, uint64_t pteaddr, uint64_t pte, uint64_t iova, uint64_t gpa, int bsize_mb) "stage=%d level=%d base@=0x%"PRIx64" pte@=0x%"PRIx64" pte=0x%"PRIx64" iova=0x%"PRIx64" block address = 0x%"PRIx64" block size = %d MiB" | ||
396 | +smmu_get_pte(uint64_t baseaddr, int index, uint64_t pteaddr, uint64_t pte) "baseaddr=0x%"PRIx64" index=0x%x, pteaddr=0x%"PRIx64", pte=0x%"PRIx64 | ||
397 | -- | 41 | -- |
398 | 2.17.0 | 42 | 2.25.1 |
399 | 43 | ||
400 | 44 | diff view generated by jsdifflib |
1 | From: Eric Auger <eric.auger@redhat.com> | 1 | From: Philippe Mathieu-Daudé <philmd@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | We set up the infrastructure to enumerate all the PCI devices | 3 | When using Clang ("Apple clang version 14.0.0 (clang-1400.0.29.202)") |
4 | attached to the SMMU and create an associated IOMMU memory | 4 | and building with -Wall we get: |
5 | region and address space. | ||
6 | 5 | ||
7 | Those info are stored in SMMUDevice objects. The devices are | 6 | hw/arm/smmu-common.c:173:33: warning: static function 'smmu_hash_remove_by_asid_iova' is used in an inline function with external linkage [-Wstatic-in-inline] |
8 | grouped according to the PCIBus they belong to. A hash table | 7 | hw/arm/smmu-common.h:170:1: note: use 'static' to give inline function 'smmu_iotlb_inv_iova' internal linkage |
9 | indexed by the PCIBus pointer is used. Also an array indexed by | 8 | void smmu_iotlb_inv_iova(SMMUState *s, int asid, dma_addr_t iova, |
10 | the bus number allows to find the list of SMMUDevices. | 9 | ^ |
10 | static | ||
11 | 11 | ||
12 | Signed-off-by: Eric Auger <eric.auger@redhat.com> | 12 | None of our code base require / use inlined functions with external |
13 | Signed-off-by: Prem Mallappa <prem.mallappa@broadcom.com> | 13 | linkage. Some places use internal inlining in the hot path. These |
14 | two functions are certainly not in any hot path and don't justify | ||
15 | any inlining, so these are likely oversights rather than intentional. | ||
16 | |||
17 | Reported-by: Stefan Weil <sw@weilnetz.de> | ||
14 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 18 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
15 | Message-id: 1524665762-31355-3-git-send-email-eric.auger@redhat.com | 19 | Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org> |
20 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
21 | Reviewed-by: Eric Auger <eric.auger@redhat.com> | ||
22 | Message-id: 20221216214924.4711-3-philmd@linaro.org | ||
16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 23 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
17 | --- | 24 | --- |
18 | include/hw/arm/smmu-common.h | 8 +++++ | 25 | hw/arm/smmu-common.c | 13 ++++++------- |
19 | hw/arm/smmu-common.c | 69 ++++++++++++++++++++++++++++++++++++ | 26 | 1 file changed, 6 insertions(+), 7 deletions(-) |
20 | hw/arm/trace-events | 3 ++ | ||
21 | 3 files changed, 80 insertions(+) | ||
22 | 27 | ||
23 | diff --git a/include/hw/arm/smmu-common.h b/include/hw/arm/smmu-common.h | ||
24 | index XXXXXXX..XXXXXXX 100644 | ||
25 | --- a/include/hw/arm/smmu-common.h | ||
26 | +++ b/include/hw/arm/smmu-common.h | ||
27 | @@ -XXX,XX +XXX,XX @@ typedef struct { | ||
28 | #define ARM_SMMU_GET_CLASS(obj) \ | ||
29 | OBJECT_GET_CLASS(SMMUBaseClass, (obj), TYPE_ARM_SMMU) | ||
30 | |||
31 | +/* Return the SMMUPciBus handle associated to a PCI bus number */ | ||
32 | +SMMUPciBus *smmu_find_smmu_pcibus(SMMUState *s, uint8_t bus_num); | ||
33 | + | ||
34 | +/* Return the stream ID of an SMMU device */ | ||
35 | +static inline uint16_t smmu_get_sid(SMMUDevice *sdev) | ||
36 | +{ | ||
37 | + return PCI_BUILD_BDF(pci_bus_num(sdev->bus), sdev->devfn); | ||
38 | +} | ||
39 | #endif /* HW_ARM_SMMU_COMMON */ | ||
40 | diff --git a/hw/arm/smmu-common.c b/hw/arm/smmu-common.c | 28 | diff --git a/hw/arm/smmu-common.c b/hw/arm/smmu-common.c |
41 | index XXXXXXX..XXXXXXX 100644 | 29 | index XXXXXXX..XXXXXXX 100644 |
42 | --- a/hw/arm/smmu-common.c | 30 | --- a/hw/arm/smmu-common.c |
43 | +++ b/hw/arm/smmu-common.c | 31 | +++ b/hw/arm/smmu-common.c |
44 | @@ -XXX,XX +XXX,XX @@ | 32 | @@ -XXX,XX +XXX,XX @@ void smmu_iotlb_insert(SMMUState *bs, SMMUTransCfg *cfg, SMMUTLBEntry *new) |
45 | #include "qemu/error-report.h" | 33 | g_hash_table_insert(bs->iotlb, key, new); |
46 | #include "hw/arm/smmu-common.h" | 34 | } |
47 | 35 | ||
48 | +/** | 36 | -inline void smmu_iotlb_inv_all(SMMUState *s) |
49 | + * The bus number is used for lookup when SID based invalidation occurs. | 37 | +void smmu_iotlb_inv_all(SMMUState *s) |
50 | + * In that case we lazily populate the SMMUPciBus array from the bus hash | ||
51 | + * table. At the time the SMMUPciBus is created (smmu_find_add_as), the bus | ||
52 | + * numbers may not be always initialized yet. | ||
53 | + */ | ||
54 | +SMMUPciBus *smmu_find_smmu_pcibus(SMMUState *s, uint8_t bus_num) | ||
55 | +{ | ||
56 | + SMMUPciBus *smmu_pci_bus = s->smmu_pcibus_by_bus_num[bus_num]; | ||
57 | + | ||
58 | + if (!smmu_pci_bus) { | ||
59 | + GHashTableIter iter; | ||
60 | + | ||
61 | + g_hash_table_iter_init(&iter, s->smmu_pcibus_by_busptr); | ||
62 | + while (g_hash_table_iter_next(&iter, NULL, (void **)&smmu_pci_bus)) { | ||
63 | + if (pci_bus_num(smmu_pci_bus->bus) == bus_num) { | ||
64 | + s->smmu_pcibus_by_bus_num[bus_num] = smmu_pci_bus; | ||
65 | + return smmu_pci_bus; | ||
66 | + } | ||
67 | + } | ||
68 | + } | ||
69 | + return smmu_pci_bus; | ||
70 | +} | ||
71 | + | ||
72 | +static AddressSpace *smmu_find_add_as(PCIBus *bus, void *opaque, int devfn) | ||
73 | +{ | ||
74 | + SMMUState *s = opaque; | ||
75 | + SMMUPciBus *sbus = g_hash_table_lookup(s->smmu_pcibus_by_busptr, bus); | ||
76 | + SMMUDevice *sdev; | ||
77 | + | ||
78 | + if (!sbus) { | ||
79 | + sbus = g_malloc0(sizeof(SMMUPciBus) + | ||
80 | + sizeof(SMMUDevice *) * SMMU_PCI_DEVFN_MAX); | ||
81 | + sbus->bus = bus; | ||
82 | + g_hash_table_insert(s->smmu_pcibus_by_busptr, bus, sbus); | ||
83 | + } | ||
84 | + | ||
85 | + sdev = sbus->pbdev[devfn]; | ||
86 | + if (!sdev) { | ||
87 | + char *name = g_strdup_printf("%s-%d-%d", | ||
88 | + s->mrtypename, | ||
89 | + pci_bus_num(bus), devfn); | ||
90 | + sdev = sbus->pbdev[devfn] = g_new0(SMMUDevice, 1); | ||
91 | + | ||
92 | + sdev->smmu = s; | ||
93 | + sdev->bus = bus; | ||
94 | + sdev->devfn = devfn; | ||
95 | + | ||
96 | + memory_region_init_iommu(&sdev->iommu, sizeof(sdev->iommu), | ||
97 | + s->mrtypename, | ||
98 | + OBJECT(s), name, 1ULL << SMMU_MAX_VA_BITS); | ||
99 | + address_space_init(&sdev->as, | ||
100 | + MEMORY_REGION(&sdev->iommu), name); | ||
101 | + trace_smmu_add_mr(name); | ||
102 | + g_free(name); | ||
103 | + } | ||
104 | + | ||
105 | + return &sdev->as; | ||
106 | +} | ||
107 | + | ||
108 | static void smmu_base_realize(DeviceState *dev, Error **errp) | ||
109 | { | 38 | { |
110 | + SMMUState *s = ARM_SMMU(dev); | 39 | trace_smmu_iotlb_inv_all(); |
111 | SMMUBaseClass *sbc = ARM_SMMU_GET_CLASS(dev); | 40 | g_hash_table_remove_all(s->iotlb); |
112 | Error *local_err = NULL; | 41 | @@ -XXX,XX +XXX,XX @@ static gboolean smmu_hash_remove_by_asid_iova(gpointer key, gpointer value, |
113 | 42 | ((entry->iova & ~info->mask) == info->iova); | |
114 | @@ -XXX,XX +XXX,XX @@ static void smmu_base_realize(DeviceState *dev, Error **errp) | ||
115 | error_propagate(errp, local_err); | ||
116 | return; | ||
117 | } | ||
118 | + | ||
119 | + s->smmu_pcibus_by_busptr = g_hash_table_new(NULL, NULL); | ||
120 | + | ||
121 | + if (s->primary_bus) { | ||
122 | + pci_setup_iommu(s->primary_bus, smmu_find_add_as, s); | ||
123 | + } else { | ||
124 | + error_setg(errp, "SMMU is not attached to any PCI bus!"); | ||
125 | + } | ||
126 | } | 43 | } |
127 | 44 | ||
128 | static void smmu_base_reset(DeviceState *dev) | 45 | -inline void |
129 | diff --git a/hw/arm/trace-events b/hw/arm/trace-events | 46 | -smmu_iotlb_inv_iova(SMMUState *s, int asid, dma_addr_t iova, |
130 | index XXXXXXX..XXXXXXX 100644 | 47 | - uint8_t tg, uint64_t num_pages, uint8_t ttl) |
131 | --- a/hw/arm/trace-events | 48 | +void smmu_iotlb_inv_iova(SMMUState *s, int asid, dma_addr_t iova, |
132 | +++ b/hw/arm/trace-events | 49 | + uint8_t tg, uint64_t num_pages, uint8_t ttl) |
133 | @@ -XXX,XX +XXX,XX @@ | 50 | { |
134 | 51 | /* if tg is not set we use 4KB range invalidation */ | |
135 | # hw/arm/virt-acpi-build.c | 52 | uint8_t granule = tg ? tg * 2 + 10 : 12; |
136 | virt_acpi_setup(void) "No fw cfg or ACPI disabled. Bailing out." | 53 | @@ -XXX,XX +XXX,XX @@ smmu_iotlb_inv_iova(SMMUState *s, int asid, dma_addr_t iova, |
137 | + | 54 | &info); |
138 | +# hw/arm/smmu-common.c | 55 | } |
139 | +smmu_add_mr(const char *name) "%s" | 56 | |
140 | \ No newline at end of file | 57 | -inline void smmu_iotlb_inv_asid(SMMUState *s, uint16_t asid) |
58 | +void smmu_iotlb_inv_asid(SMMUState *s, uint16_t asid) | ||
59 | { | ||
60 | trace_smmu_iotlb_inv_asid(asid); | ||
61 | g_hash_table_foreach_remove(s->iotlb, smmu_hash_remove_by_asid, &asid); | ||
62 | @@ -XXX,XX +XXX,XX @@ error: | ||
63 | * | ||
64 | * return 0 on success | ||
65 | */ | ||
66 | -inline int smmu_ptw(SMMUTransCfg *cfg, dma_addr_t iova, IOMMUAccessFlags perm, | ||
67 | - SMMUTLBEntry *tlbe, SMMUPTWEventInfo *info) | ||
68 | +int smmu_ptw(SMMUTransCfg *cfg, dma_addr_t iova, IOMMUAccessFlags perm, | ||
69 | + SMMUTLBEntry *tlbe, SMMUPTWEventInfo *info) | ||
70 | { | ||
71 | if (!cfg->aa64) { | ||
72 | /* | ||
141 | -- | 73 | -- |
142 | 2.17.0 | 74 | 2.25.1 |
143 | 75 | ||
144 | 76 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Jean-Christophe Dubois <jcd@tribudubois.net> | ||
1 | 2 | ||
3 | So far the GPT timers were unable to raise IRQs to the processor. | ||
4 | |||
5 | Signed-off-by: Jean-Christophe Dubois <jcd@tribudubois.net> | ||
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | --- | ||
9 | include/hw/arm/fsl-imx7.h | 5 +++++ | ||
10 | hw/arm/fsl-imx7.c | 10 ++++++++++ | ||
11 | 2 files changed, 15 insertions(+) | ||
12 | |||
13 | diff --git a/include/hw/arm/fsl-imx7.h b/include/hw/arm/fsl-imx7.h | ||
14 | index XXXXXXX..XXXXXXX 100644 | ||
15 | --- a/include/hw/arm/fsl-imx7.h | ||
16 | +++ b/include/hw/arm/fsl-imx7.h | ||
17 | @@ -XXX,XX +XXX,XX @@ enum FslIMX7IRQs { | ||
18 | FSL_IMX7_USB2_IRQ = 42, | ||
19 | FSL_IMX7_USB3_IRQ = 40, | ||
20 | |||
21 | + FSL_IMX7_GPT1_IRQ = 55, | ||
22 | + FSL_IMX7_GPT2_IRQ = 54, | ||
23 | + FSL_IMX7_GPT3_IRQ = 53, | ||
24 | + FSL_IMX7_GPT4_IRQ = 52, | ||
25 | + | ||
26 | FSL_IMX7_WDOG1_IRQ = 78, | ||
27 | FSL_IMX7_WDOG2_IRQ = 79, | ||
28 | FSL_IMX7_WDOG3_IRQ = 10, | ||
29 | diff --git a/hw/arm/fsl-imx7.c b/hw/arm/fsl-imx7.c | ||
30 | index XXXXXXX..XXXXXXX 100644 | ||
31 | --- a/hw/arm/fsl-imx7.c | ||
32 | +++ b/hw/arm/fsl-imx7.c | ||
33 | @@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp) | ||
34 | FSL_IMX7_GPT4_ADDR, | ||
35 | }; | ||
36 | |||
37 | + static const int FSL_IMX7_GPTn_IRQ[FSL_IMX7_NUM_GPTS] = { | ||
38 | + FSL_IMX7_GPT1_IRQ, | ||
39 | + FSL_IMX7_GPT2_IRQ, | ||
40 | + FSL_IMX7_GPT3_IRQ, | ||
41 | + FSL_IMX7_GPT4_IRQ, | ||
42 | + }; | ||
43 | + | ||
44 | s->gpt[i].ccm = IMX_CCM(&s->ccm); | ||
45 | sysbus_realize(SYS_BUS_DEVICE(&s->gpt[i]), &error_abort); | ||
46 | sysbus_mmio_map(SYS_BUS_DEVICE(&s->gpt[i]), 0, FSL_IMX7_GPTn_ADDR[i]); | ||
47 | + sysbus_connect_irq(SYS_BUS_DEVICE(&s->gpt[i]), 0, | ||
48 | + qdev_get_gpio_in(DEVICE(&s->a7mpcore), | ||
49 | + FSL_IMX7_GPTn_IRQ[i])); | ||
50 | } | ||
51 | |||
52 | for (i = 0; i < FSL_IMX7_NUM_GPIOS; i++) { | ||
53 | -- | ||
54 | 2.25.1 | diff view generated by jsdifflib |
1 | From: Prem Mallappa <prem.mallappa@broadcom.com> | 1 | From: Jean-Christophe Dubois <jcd@tribudubois.net> |
---|---|---|---|
2 | 2 | ||
3 | This patch implements a skeleton for the smmuv3 device. | 3 | CCM derived clocks will have to be added later. |
4 | Datatypes and register definitions are introduced. The MMIO | ||
5 | region, the interrupts and the queue are initialized. | ||
6 | 4 | ||
7 | Only the MMIO read operation is implemented here. | 5 | Signed-off-by: Jean-Christophe Dubois <jcd@tribudubois.net> |
8 | |||
9 | Signed-off-by: Prem Mallappa <prem.mallappa@broadcom.com> | ||
10 | Signed-off-by: Eric Auger <eric.auger@redhat.com> | ||
11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
12 | Message-id: 1524665762-31355-5-git-send-email-eric.auger@redhat.com | ||
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
14 | --- | 8 | --- |
15 | hw/arm/Makefile.objs | 2 +- | 9 | hw/misc/imx7_ccm.c | 49 +++++++++++++++++++++++++++++++++++++--------- |
16 | hw/arm/smmuv3-internal.h | 142 +++++++++++++++ | 10 | 1 file changed, 40 insertions(+), 9 deletions(-) |
17 | include/hw/arm/smmuv3.h | 87 ++++++++++ | ||
18 | hw/arm/smmuv3.c | 366 +++++++++++++++++++++++++++++++++++++++ | ||
19 | hw/arm/trace-events | 3 + | ||
20 | 5 files changed, 599 insertions(+), 1 deletion(-) | ||
21 | create mode 100644 hw/arm/smmuv3-internal.h | ||
22 | create mode 100644 include/hw/arm/smmuv3.h | ||
23 | create mode 100644 hw/arm/smmuv3.c | ||
24 | 11 | ||
25 | diff --git a/hw/arm/Makefile.objs b/hw/arm/Makefile.objs | 12 | diff --git a/hw/misc/imx7_ccm.c b/hw/misc/imx7_ccm.c |
26 | index XXXXXXX..XXXXXXX 100644 | 13 | index XXXXXXX..XXXXXXX 100644 |
27 | --- a/hw/arm/Makefile.objs | 14 | --- a/hw/misc/imx7_ccm.c |
28 | +++ b/hw/arm/Makefile.objs | 15 | +++ b/hw/misc/imx7_ccm.c |
29 | @@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_MPS2) += mps2-tz.o | ||
30 | obj-$(CONFIG_MSF2) += msf2-soc.o msf2-som.o | ||
31 | obj-$(CONFIG_IOTKIT) += iotkit.o | ||
32 | obj-$(CONFIG_FSL_IMX7) += fsl-imx7.o mcimx7d-sabre.o | ||
33 | -obj-$(CONFIG_ARM_SMMUV3) += smmu-common.o | ||
34 | +obj-$(CONFIG_ARM_SMMUV3) += smmu-common.o smmuv3.o | ||
35 | diff --git a/hw/arm/smmuv3-internal.h b/hw/arm/smmuv3-internal.h | ||
36 | new file mode 100644 | ||
37 | index XXXXXXX..XXXXXXX | ||
38 | --- /dev/null | ||
39 | +++ b/hw/arm/smmuv3-internal.h | ||
40 | @@ -XXX,XX +XXX,XX @@ | 16 | @@ -XXX,XX +XXX,XX @@ |
41 | +/* | 17 | #include "hw/misc/imx7_ccm.h" |
42 | + * ARM SMMUv3 support - Internal API | 18 | #include "migration/vmstate.h" |
43 | + * | 19 | |
44 | + * Copyright (C) 2014-2016 Broadcom Corporation | 20 | +#include "trace.h" |
45 | + * Copyright (c) 2017 Red Hat, Inc. | ||
46 | + * Written by Prem Mallappa, Eric Auger | ||
47 | + * | ||
48 | + * This program is free software; you can redistribute it and/or modify | ||
49 | + * it under the terms of the GNU General Public License version 2 as | ||
50 | + * published by the Free Software Foundation. | ||
51 | + * | ||
52 | + * This program is distributed in the hope that it will be useful, | ||
53 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
54 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
55 | + * GNU General Public License for more details. | ||
56 | + * | ||
57 | + * You should have received a copy of the GNU General Public License along | ||
58 | + * with this program; if not, see <http://www.gnu.org/licenses/>. | ||
59 | + */ | ||
60 | + | 21 | + |
61 | +#ifndef HW_ARM_SMMU_V3_INTERNAL_H | 22 | +#define CKIH_FREQ 24000000 /* 24MHz crystal input */ |
62 | +#define HW_ARM_SMMU_V3_INTERNAL_H | ||
63 | + | 23 | + |
64 | +#include "hw/arm/smmu-common.h" | 24 | static void imx7_analog_reset(DeviceState *dev) |
25 | { | ||
26 | IMX7AnalogState *s = IMX7_ANALOG(dev); | ||
27 | @@ -XXX,XX +XXX,XX @@ static const VMStateDescription vmstate_imx7_ccm = { | ||
28 | static uint32_t imx7_ccm_get_clock_frequency(IMXCCMState *dev, IMXClk clock) | ||
29 | { | ||
30 | /* | ||
31 | - * This function is "consumed" by GPT emulation code, however on | ||
32 | - * i.MX7 each GPT block can have their own clock root. This means | ||
33 | - * that this functions needs somehow to know requester's identity | ||
34 | - * and the way to pass it: be it via additional IMXClk constants | ||
35 | - * or by adding another argument to this method needs to be | ||
36 | - * figured out | ||
37 | + * This function is "consumed" by GPT emulation code. Some clocks | ||
38 | + * have fixed frequencies and we can provide requested frequency | ||
39 | + * easily. However for CCM provided clocks (like IPG) each GPT | ||
40 | + * timer can have its own clock root. | ||
41 | + * This means we need additionnal information when calling this | ||
42 | + * function to know the requester's identity. | ||
43 | */ | ||
44 | - qemu_log_mask(LOG_GUEST_ERROR, "[%s]%s: Not implemented\n", | ||
45 | - TYPE_IMX7_CCM, __func__); | ||
46 | - return 0; | ||
47 | + uint32_t freq = 0; | ||
65 | + | 48 | + |
66 | +/* MMIO Registers */ | 49 | + switch (clock) { |
67 | + | 50 | + case CLK_NONE: |
68 | +REG32(IDR0, 0x0) | ||
69 | + FIELD(IDR0, S1P, 1 , 1) | ||
70 | + FIELD(IDR0, TTF, 2 , 2) | ||
71 | + FIELD(IDR0, COHACC, 4 , 1) | ||
72 | + FIELD(IDR0, ASID16, 12, 1) | ||
73 | + FIELD(IDR0, TTENDIAN, 21, 2) | ||
74 | + FIELD(IDR0, STALL_MODEL, 24, 2) | ||
75 | + FIELD(IDR0, TERM_MODEL, 26, 1) | ||
76 | + FIELD(IDR0, STLEVEL, 27, 2) | ||
77 | + | ||
78 | +REG32(IDR1, 0x4) | ||
79 | + FIELD(IDR1, SIDSIZE, 0 , 6) | ||
80 | + FIELD(IDR1, EVENTQS, 16, 5) | ||
81 | + FIELD(IDR1, CMDQS, 21, 5) | ||
82 | + | ||
83 | +#define SMMU_IDR1_SIDSIZE 16 | ||
84 | +#define SMMU_CMDQS 19 | ||
85 | +#define SMMU_EVENTQS 19 | ||
86 | + | ||
87 | +REG32(IDR2, 0x8) | ||
88 | +REG32(IDR3, 0xc) | ||
89 | +REG32(IDR4, 0x10) | ||
90 | +REG32(IDR5, 0x14) | ||
91 | + FIELD(IDR5, OAS, 0, 3); | ||
92 | + FIELD(IDR5, GRAN4K, 4, 1); | ||
93 | + FIELD(IDR5, GRAN16K, 5, 1); | ||
94 | + FIELD(IDR5, GRAN64K, 6, 1); | ||
95 | + | ||
96 | +#define SMMU_IDR5_OAS 4 | ||
97 | + | ||
98 | +REG32(IIDR, 0x1c) | ||
99 | +REG32(CR0, 0x20) | ||
100 | + FIELD(CR0, SMMU_ENABLE, 0, 1) | ||
101 | + FIELD(CR0, EVENTQEN, 2, 1) | ||
102 | + FIELD(CR0, CMDQEN, 3, 1) | ||
103 | + | ||
104 | +REG32(CR0ACK, 0x24) | ||
105 | +REG32(CR1, 0x28) | ||
106 | +REG32(CR2, 0x2c) | ||
107 | +REG32(STATUSR, 0x40) | ||
108 | +REG32(IRQ_CTRL, 0x50) | ||
109 | + FIELD(IRQ_CTRL, GERROR_IRQEN, 0, 1) | ||
110 | + FIELD(IRQ_CTRL, PRI_IRQEN, 1, 1) | ||
111 | + FIELD(IRQ_CTRL, EVENTQ_IRQEN, 2, 1) | ||
112 | + | ||
113 | +REG32(IRQ_CTRL_ACK, 0x54) | ||
114 | +REG32(GERROR, 0x60) | ||
115 | + FIELD(GERROR, CMDQ_ERR, 0, 1) | ||
116 | + FIELD(GERROR, EVENTQ_ABT_ERR, 2, 1) | ||
117 | + FIELD(GERROR, PRIQ_ABT_ERR, 3, 1) | ||
118 | + FIELD(GERROR, MSI_CMDQ_ABT_ERR, 4, 1) | ||
119 | + FIELD(GERROR, MSI_EVENTQ_ABT_ERR, 5, 1) | ||
120 | + FIELD(GERROR, MSI_PRIQ_ABT_ERR, 6, 1) | ||
121 | + FIELD(GERROR, MSI_GERROR_ABT_ERR, 7, 1) | ||
122 | + FIELD(GERROR, MSI_SFM_ERR, 8, 1) | ||
123 | + | ||
124 | +REG32(GERRORN, 0x64) | ||
125 | + | ||
126 | +#define A_GERROR_IRQ_CFG0 0x68 /* 64b */ | ||
127 | +REG32(GERROR_IRQ_CFG1, 0x70) | ||
128 | +REG32(GERROR_IRQ_CFG2, 0x74) | ||
129 | + | ||
130 | +#define A_STRTAB_BASE 0x80 /* 64b */ | ||
131 | + | ||
132 | +#define SMMU_BASE_ADDR_MASK 0xffffffffffe0 | ||
133 | + | ||
134 | +REG32(STRTAB_BASE_CFG, 0x88) | ||
135 | + FIELD(STRTAB_BASE_CFG, FMT, 16, 2) | ||
136 | + FIELD(STRTAB_BASE_CFG, SPLIT, 6 , 5) | ||
137 | + FIELD(STRTAB_BASE_CFG, LOG2SIZE, 0 , 6) | ||
138 | + | ||
139 | +#define A_CMDQ_BASE 0x90 /* 64b */ | ||
140 | +REG32(CMDQ_PROD, 0x98) | ||
141 | +REG32(CMDQ_CONS, 0x9c) | ||
142 | + FIELD(CMDQ_CONS, ERR, 24, 7) | ||
143 | + | ||
144 | +#define A_EVENTQ_BASE 0xa0 /* 64b */ | ||
145 | +REG32(EVENTQ_PROD, 0xa8) | ||
146 | +REG32(EVENTQ_CONS, 0xac) | ||
147 | + | ||
148 | +#define A_EVENTQ_IRQ_CFG0 0xb0 /* 64b */ | ||
149 | +REG32(EVENTQ_IRQ_CFG1, 0xb8) | ||
150 | +REG32(EVENTQ_IRQ_CFG2, 0xbc) | ||
151 | + | ||
152 | +#define A_IDREGS 0xfd0 | ||
153 | + | ||
154 | +static inline int smmu_enabled(SMMUv3State *s) | ||
155 | +{ | ||
156 | + return FIELD_EX32(s->cr[0], CR0, SMMU_ENABLE); | ||
157 | +} | ||
158 | + | ||
159 | +/* Command Queue Entry */ | ||
160 | +typedef struct Cmd { | ||
161 | + uint32_t word[4]; | ||
162 | +} Cmd; | ||
163 | + | ||
164 | +/* Event Queue Entry */ | ||
165 | +typedef struct Evt { | ||
166 | + uint32_t word[8]; | ||
167 | +} Evt; | ||
168 | + | ||
169 | +static inline uint32_t smmuv3_idreg(int regoffset) | ||
170 | +{ | ||
171 | + /* | ||
172 | + * Return the value of the Primecell/Corelink ID registers at the | ||
173 | + * specified offset from the first ID register. | ||
174 | + * These value indicate an ARM implementation of MMU600 p1 | ||
175 | + */ | ||
176 | + static const uint8_t smmuv3_ids[] = { | ||
177 | + 0x04, 0, 0, 0, 0x84, 0xB4, 0xF0, 0x10, 0x0D, 0xF0, 0x05, 0xB1 | ||
178 | + }; | ||
179 | + return smmuv3_ids[regoffset / 4]; | ||
180 | +} | ||
181 | + | ||
182 | +#endif | ||
183 | diff --git a/include/hw/arm/smmuv3.h b/include/hw/arm/smmuv3.h | ||
184 | new file mode 100644 | ||
185 | index XXXXXXX..XXXXXXX | ||
186 | --- /dev/null | ||
187 | +++ b/include/hw/arm/smmuv3.h | ||
188 | @@ -XXX,XX +XXX,XX @@ | ||
189 | +/* | ||
190 | + * Copyright (C) 2014-2016 Broadcom Corporation | ||
191 | + * Copyright (c) 2017 Red Hat, Inc. | ||
192 | + * Written by Prem Mallappa, Eric Auger | ||
193 | + * | ||
194 | + * This program is free software; you can redistribute it and/or modify | ||
195 | + * it under the terms of the GNU General Public License version 2 as | ||
196 | + * published by the Free Software Foundation. | ||
197 | + * | ||
198 | + * This program is distributed in the hope that it will be useful, | ||
199 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
200 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
201 | + * GNU General Public License for more details. | ||
202 | + * | ||
203 | + * You should have received a copy of the GNU General Public License along | ||
204 | + * with this program; if not, see <http://www.gnu.org/licenses/>. | ||
205 | + */ | ||
206 | + | ||
207 | +#ifndef HW_ARM_SMMUV3_H | ||
208 | +#define HW_ARM_SMMUV3_H | ||
209 | + | ||
210 | +#include "hw/arm/smmu-common.h" | ||
211 | +#include "hw/registerfields.h" | ||
212 | + | ||
213 | +#define TYPE_SMMUV3_IOMMU_MEMORY_REGION "smmuv3-iommu-memory-region" | ||
214 | + | ||
215 | +typedef struct SMMUQueue { | ||
216 | + uint64_t base; /* base register */ | ||
217 | + uint32_t prod; | ||
218 | + uint32_t cons; | ||
219 | + uint8_t entry_size; | ||
220 | + uint8_t log2size; | ||
221 | +} SMMUQueue; | ||
222 | + | ||
223 | +typedef struct SMMUv3State { | ||
224 | + SMMUState smmu_state; | ||
225 | + | ||
226 | + uint32_t features; | ||
227 | + uint8_t sid_size; | ||
228 | + uint8_t sid_split; | ||
229 | + | ||
230 | + uint32_t idr[6]; | ||
231 | + uint32_t iidr; | ||
232 | + uint32_t cr[3]; | ||
233 | + uint32_t cr0ack; | ||
234 | + uint32_t statusr; | ||
235 | + uint32_t irq_ctrl; | ||
236 | + uint32_t gerror; | ||
237 | + uint32_t gerrorn; | ||
238 | + uint64_t gerror_irq_cfg0; | ||
239 | + uint32_t gerror_irq_cfg1; | ||
240 | + uint32_t gerror_irq_cfg2; | ||
241 | + uint64_t strtab_base; | ||
242 | + uint32_t strtab_base_cfg; | ||
243 | + uint64_t eventq_irq_cfg0; | ||
244 | + uint32_t eventq_irq_cfg1; | ||
245 | + uint32_t eventq_irq_cfg2; | ||
246 | + | ||
247 | + SMMUQueue eventq, cmdq; | ||
248 | + | ||
249 | + qemu_irq irq[4]; | ||
250 | +} SMMUv3State; | ||
251 | + | ||
252 | +typedef enum { | ||
253 | + SMMU_IRQ_EVTQ, | ||
254 | + SMMU_IRQ_PRIQ, | ||
255 | + SMMU_IRQ_CMD_SYNC, | ||
256 | + SMMU_IRQ_GERROR, | ||
257 | +} SMMUIrq; | ||
258 | + | ||
259 | +typedef struct { | ||
260 | + /*< private >*/ | ||
261 | + SMMUBaseClass smmu_base_class; | ||
262 | + /*< public >*/ | ||
263 | + | ||
264 | + DeviceRealize parent_realize; | ||
265 | + DeviceReset parent_reset; | ||
266 | +} SMMUv3Class; | ||
267 | + | ||
268 | +#define TYPE_ARM_SMMUV3 "arm-smmuv3" | ||
269 | +#define ARM_SMMUV3(obj) OBJECT_CHECK(SMMUv3State, (obj), TYPE_ARM_SMMUV3) | ||
270 | +#define ARM_SMMUV3_CLASS(klass) \ | ||
271 | + OBJECT_CLASS_CHECK(SMMUv3Class, (klass), TYPE_ARM_SMMUV3) | ||
272 | +#define ARM_SMMUV3_GET_CLASS(obj) \ | ||
273 | + OBJECT_GET_CLASS(SMMUv3Class, (obj), TYPE_ARM_SMMUV3) | ||
274 | + | ||
275 | +#endif | ||
276 | diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c | ||
277 | new file mode 100644 | ||
278 | index XXXXXXX..XXXXXXX | ||
279 | --- /dev/null | ||
280 | +++ b/hw/arm/smmuv3.c | ||
281 | @@ -XXX,XX +XXX,XX @@ | ||
282 | +/* | ||
283 | + * Copyright (C) 2014-2016 Broadcom Corporation | ||
284 | + * Copyright (c) 2017 Red Hat, Inc. | ||
285 | + * Written by Prem Mallappa, Eric Auger | ||
286 | + * | ||
287 | + * This program is free software; you can redistribute it and/or modify | ||
288 | + * it under the terms of the GNU General Public License version 2 as | ||
289 | + * published by the Free Software Foundation. | ||
290 | + * | ||
291 | + * This program is distributed in the hope that it will be useful, | ||
292 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
293 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
294 | + * GNU General Public License for more details. | ||
295 | + * | ||
296 | + * You should have received a copy of the GNU General Public License along | ||
297 | + * with this program; if not, see <http://www.gnu.org/licenses/>. | ||
298 | + */ | ||
299 | + | ||
300 | +#include "qemu/osdep.h" | ||
301 | +#include "hw/boards.h" | ||
302 | +#include "sysemu/sysemu.h" | ||
303 | +#include "hw/sysbus.h" | ||
304 | +#include "hw/qdev-core.h" | ||
305 | +#include "hw/pci/pci.h" | ||
306 | +#include "exec/address-spaces.h" | ||
307 | +#include "trace.h" | ||
308 | +#include "qemu/log.h" | ||
309 | +#include "qemu/error-report.h" | ||
310 | +#include "qapi/error.h" | ||
311 | + | ||
312 | +#include "hw/arm/smmuv3.h" | ||
313 | +#include "smmuv3-internal.h" | ||
314 | + | ||
315 | +static void smmuv3_init_regs(SMMUv3State *s) | ||
316 | +{ | ||
317 | + /** | ||
318 | + * IDR0: stage1 only, AArch64 only, coherent access, 16b ASID, | ||
319 | + * multi-level stream table | ||
320 | + */ | ||
321 | + s->idr[0] = FIELD_DP32(s->idr[0], IDR0, S1P, 1); /* stage 1 supported */ | ||
322 | + s->idr[0] = FIELD_DP32(s->idr[0], IDR0, TTF, 2); /* AArch64 PTW only */ | ||
323 | + s->idr[0] = FIELD_DP32(s->idr[0], IDR0, COHACC, 1); /* IO coherent */ | ||
324 | + s->idr[0] = FIELD_DP32(s->idr[0], IDR0, ASID16, 1); /* 16-bit ASID */ | ||
325 | + s->idr[0] = FIELD_DP32(s->idr[0], IDR0, TTENDIAN, 2); /* little endian */ | ||
326 | + s->idr[0] = FIELD_DP32(s->idr[0], IDR0, STALL_MODEL, 1); /* No stall */ | ||
327 | + /* terminated transaction will always be aborted/error returned */ | ||
328 | + s->idr[0] = FIELD_DP32(s->idr[0], IDR0, TERM_MODEL, 1); | ||
329 | + /* 2-level stream table supported */ | ||
330 | + s->idr[0] = FIELD_DP32(s->idr[0], IDR0, STLEVEL, 1); | ||
331 | + | ||
332 | + s->idr[1] = FIELD_DP32(s->idr[1], IDR1, SIDSIZE, SMMU_IDR1_SIDSIZE); | ||
333 | + s->idr[1] = FIELD_DP32(s->idr[1], IDR1, EVENTQS, SMMU_EVENTQS); | ||
334 | + s->idr[1] = FIELD_DP32(s->idr[1], IDR1, CMDQS, SMMU_CMDQS); | ||
335 | + | ||
336 | + /* 4K and 64K granule support */ | ||
337 | + s->idr[5] = FIELD_DP32(s->idr[5], IDR5, GRAN4K, 1); | ||
338 | + s->idr[5] = FIELD_DP32(s->idr[5], IDR5, GRAN64K, 1); | ||
339 | + s->idr[5] = FIELD_DP32(s->idr[5], IDR5, OAS, SMMU_IDR5_OAS); /* 44 bits */ | ||
340 | + | ||
341 | + s->cmdq.base = deposit64(s->cmdq.base, 0, 5, SMMU_CMDQS); | ||
342 | + s->cmdq.prod = 0; | ||
343 | + s->cmdq.cons = 0; | ||
344 | + s->cmdq.entry_size = sizeof(struct Cmd); | ||
345 | + s->eventq.base = deposit64(s->eventq.base, 0, 5, SMMU_EVENTQS); | ||
346 | + s->eventq.prod = 0; | ||
347 | + s->eventq.cons = 0; | ||
348 | + s->eventq.entry_size = sizeof(struct Evt); | ||
349 | + | ||
350 | + s->features = 0; | ||
351 | + s->sid_split = 0; | ||
352 | +} | ||
353 | + | ||
354 | +static MemTxResult smmu_write_mmio(void *opaque, hwaddr offset, uint64_t data, | ||
355 | + unsigned size, MemTxAttrs attrs) | ||
356 | +{ | ||
357 | + /* not yet implemented */ | ||
358 | + return MEMTX_ERROR; | ||
359 | +} | ||
360 | + | ||
361 | +static MemTxResult smmu_readll(SMMUv3State *s, hwaddr offset, | ||
362 | + uint64_t *data, MemTxAttrs attrs) | ||
363 | +{ | ||
364 | + switch (offset) { | ||
365 | + case A_GERROR_IRQ_CFG0: | ||
366 | + *data = s->gerror_irq_cfg0; | ||
367 | + return MEMTX_OK; | ||
368 | + case A_STRTAB_BASE: | ||
369 | + *data = s->strtab_base; | ||
370 | + return MEMTX_OK; | ||
371 | + case A_CMDQ_BASE: | ||
372 | + *data = s->cmdq.base; | ||
373 | + return MEMTX_OK; | ||
374 | + case A_EVENTQ_BASE: | ||
375 | + *data = s->eventq.base; | ||
376 | + return MEMTX_OK; | ||
377 | + default: | ||
378 | + *data = 0; | ||
379 | + qemu_log_mask(LOG_UNIMP, | ||
380 | + "%s Unexpected 64-bit access to 0x%"PRIx64" (RAZ)\n", | ||
381 | + __func__, offset); | ||
382 | + return MEMTX_OK; | ||
383 | + } | ||
384 | +} | ||
385 | + | ||
386 | +static MemTxResult smmu_readl(SMMUv3State *s, hwaddr offset, | ||
387 | + uint64_t *data, MemTxAttrs attrs) | ||
388 | +{ | ||
389 | + switch (offset) { | ||
390 | + case A_IDREGS ... A_IDREGS + 0x1f: | ||
391 | + *data = smmuv3_idreg(offset - A_IDREGS); | ||
392 | + return MEMTX_OK; | ||
393 | + case A_IDR0 ... A_IDR5: | ||
394 | + *data = s->idr[(offset - A_IDR0) / 4]; | ||
395 | + return MEMTX_OK; | ||
396 | + case A_IIDR: | ||
397 | + *data = s->iidr; | ||
398 | + return MEMTX_OK; | ||
399 | + case A_CR0: | ||
400 | + *data = s->cr[0]; | ||
401 | + return MEMTX_OK; | ||
402 | + case A_CR0ACK: | ||
403 | + *data = s->cr0ack; | ||
404 | + return MEMTX_OK; | ||
405 | + case A_CR1: | ||
406 | + *data = s->cr[1]; | ||
407 | + return MEMTX_OK; | ||
408 | + case A_CR2: | ||
409 | + *data = s->cr[2]; | ||
410 | + return MEMTX_OK; | ||
411 | + case A_STATUSR: | ||
412 | + *data = s->statusr; | ||
413 | + return MEMTX_OK; | ||
414 | + case A_IRQ_CTRL: | ||
415 | + case A_IRQ_CTRL_ACK: | ||
416 | + *data = s->irq_ctrl; | ||
417 | + return MEMTX_OK; | ||
418 | + case A_GERROR: | ||
419 | + *data = s->gerror; | ||
420 | + return MEMTX_OK; | ||
421 | + case A_GERRORN: | ||
422 | + *data = s->gerrorn; | ||
423 | + return MEMTX_OK; | ||
424 | + case A_GERROR_IRQ_CFG0: /* 64b */ | ||
425 | + *data = extract64(s->gerror_irq_cfg0, 0, 32); | ||
426 | + return MEMTX_OK; | ||
427 | + case A_GERROR_IRQ_CFG0 + 4: | ||
428 | + *data = extract64(s->gerror_irq_cfg0, 32, 32); | ||
429 | + return MEMTX_OK; | ||
430 | + case A_GERROR_IRQ_CFG1: | ||
431 | + *data = s->gerror_irq_cfg1; | ||
432 | + return MEMTX_OK; | ||
433 | + case A_GERROR_IRQ_CFG2: | ||
434 | + *data = s->gerror_irq_cfg2; | ||
435 | + return MEMTX_OK; | ||
436 | + case A_STRTAB_BASE: /* 64b */ | ||
437 | + *data = extract64(s->strtab_base, 0, 32); | ||
438 | + return MEMTX_OK; | ||
439 | + case A_STRTAB_BASE + 4: /* 64b */ | ||
440 | + *data = extract64(s->strtab_base, 32, 32); | ||
441 | + return MEMTX_OK; | ||
442 | + case A_STRTAB_BASE_CFG: | ||
443 | + *data = s->strtab_base_cfg; | ||
444 | + return MEMTX_OK; | ||
445 | + case A_CMDQ_BASE: /* 64b */ | ||
446 | + *data = extract64(s->cmdq.base, 0, 32); | ||
447 | + return MEMTX_OK; | ||
448 | + case A_CMDQ_BASE + 4: | ||
449 | + *data = extract64(s->cmdq.base, 32, 32); | ||
450 | + return MEMTX_OK; | ||
451 | + case A_CMDQ_PROD: | ||
452 | + *data = s->cmdq.prod; | ||
453 | + return MEMTX_OK; | ||
454 | + case A_CMDQ_CONS: | ||
455 | + *data = s->cmdq.cons; | ||
456 | + return MEMTX_OK; | ||
457 | + case A_EVENTQ_BASE: /* 64b */ | ||
458 | + *data = extract64(s->eventq.base, 0, 32); | ||
459 | + return MEMTX_OK; | ||
460 | + case A_EVENTQ_BASE + 4: /* 64b */ | ||
461 | + *data = extract64(s->eventq.base, 32, 32); | ||
462 | + return MEMTX_OK; | ||
463 | + case A_EVENTQ_PROD: | ||
464 | + *data = s->eventq.prod; | ||
465 | + return MEMTX_OK; | ||
466 | + case A_EVENTQ_CONS: | ||
467 | + *data = s->eventq.cons; | ||
468 | + return MEMTX_OK; | ||
469 | + default: | ||
470 | + *data = 0; | ||
471 | + qemu_log_mask(LOG_UNIMP, | ||
472 | + "%s unhandled 32-bit access at 0x%"PRIx64" (RAZ)\n", | ||
473 | + __func__, offset); | ||
474 | + return MEMTX_OK; | ||
475 | + } | ||
476 | +} | ||
477 | + | ||
478 | +static MemTxResult smmu_read_mmio(void *opaque, hwaddr offset, uint64_t *data, | ||
479 | + unsigned size, MemTxAttrs attrs) | ||
480 | +{ | ||
481 | + SMMUState *sys = opaque; | ||
482 | + SMMUv3State *s = ARM_SMMUV3(sys); | ||
483 | + MemTxResult r; | ||
484 | + | ||
485 | + /* CONSTRAINED UNPREDICTABLE choice to have page0/1 be exact aliases */ | ||
486 | + offset &= ~0x10000; | ||
487 | + | ||
488 | + switch (size) { | ||
489 | + case 8: | ||
490 | + r = smmu_readll(s, offset, data, attrs); | ||
491 | + break; | 51 | + break; |
492 | + case 4: | 52 | + case CLK_32k: |
493 | + r = smmu_readl(s, offset, data, attrs); | 53 | + freq = CKIL_FREQ; |
54 | + break; | ||
55 | + case CLK_HIGH: | ||
56 | + freq = CKIH_FREQ; | ||
57 | + break; | ||
58 | + case CLK_IPG: | ||
59 | + case CLK_IPG_HIGH: | ||
60 | + /* | ||
61 | + * For now we don't have a way to figure out the device this | ||
62 | + * function is called for. Until then the IPG derived clocks | ||
63 | + * are left unimplemented. | ||
64 | + */ | ||
65 | + qemu_log_mask(LOG_GUEST_ERROR, "[%s]%s: Clock %d Not implemented\n", | ||
66 | + TYPE_IMX7_CCM, __func__, clock); | ||
494 | + break; | 67 | + break; |
495 | + default: | 68 | + default: |
496 | + r = MEMTX_ERROR; | 69 | + qemu_log_mask(LOG_GUEST_ERROR, "[%s]%s: unsupported clock %d\n", |
70 | + TYPE_IMX7_CCM, __func__, clock); | ||
497 | + break; | 71 | + break; |
498 | + } | 72 | + } |
499 | + | 73 | + |
500 | + trace_smmuv3_read_mmio(offset, *data, size, r); | 74 | + trace_ccm_clock_freq(clock, freq); |
501 | + return r; | ||
502 | +} | ||
503 | + | 75 | + |
504 | +static const MemoryRegionOps smmu_mem_ops = { | 76 | + return freq; |
505 | + .read_with_attrs = smmu_read_mmio, | 77 | } |
506 | + .write_with_attrs = smmu_write_mmio, | 78 | |
507 | + .endianness = DEVICE_LITTLE_ENDIAN, | 79 | static void imx7_ccm_class_init(ObjectClass *klass, void *data) |
508 | + .valid = { | ||
509 | + .min_access_size = 4, | ||
510 | + .max_access_size = 8, | ||
511 | + }, | ||
512 | + .impl = { | ||
513 | + .min_access_size = 4, | ||
514 | + .max_access_size = 8, | ||
515 | + }, | ||
516 | +}; | ||
517 | + | ||
518 | +static void smmu_init_irq(SMMUv3State *s, SysBusDevice *dev) | ||
519 | +{ | ||
520 | + int i; | ||
521 | + | ||
522 | + for (i = 0; i < ARRAY_SIZE(s->irq); i++) { | ||
523 | + sysbus_init_irq(dev, &s->irq[i]); | ||
524 | + } | ||
525 | +} | ||
526 | + | ||
527 | +static void smmu_reset(DeviceState *dev) | ||
528 | +{ | ||
529 | + SMMUv3State *s = ARM_SMMUV3(dev); | ||
530 | + SMMUv3Class *c = ARM_SMMUV3_GET_CLASS(s); | ||
531 | + | ||
532 | + c->parent_reset(dev); | ||
533 | + | ||
534 | + smmuv3_init_regs(s); | ||
535 | +} | ||
536 | + | ||
537 | +static void smmu_realize(DeviceState *d, Error **errp) | ||
538 | +{ | ||
539 | + SMMUState *sys = ARM_SMMU(d); | ||
540 | + SMMUv3State *s = ARM_SMMUV3(sys); | ||
541 | + SMMUv3Class *c = ARM_SMMUV3_GET_CLASS(s); | ||
542 | + SysBusDevice *dev = SYS_BUS_DEVICE(d); | ||
543 | + Error *local_err = NULL; | ||
544 | + | ||
545 | + c->parent_realize(d, &local_err); | ||
546 | + if (local_err) { | ||
547 | + error_propagate(errp, local_err); | ||
548 | + return; | ||
549 | + } | ||
550 | + | ||
551 | + memory_region_init_io(&sys->iomem, OBJECT(s), | ||
552 | + &smmu_mem_ops, sys, TYPE_ARM_SMMUV3, 0x20000); | ||
553 | + | ||
554 | + sys->mrtypename = TYPE_SMMUV3_IOMMU_MEMORY_REGION; | ||
555 | + | ||
556 | + sysbus_init_mmio(dev, &sys->iomem); | ||
557 | + | ||
558 | + smmu_init_irq(s, dev); | ||
559 | +} | ||
560 | + | ||
561 | +static const VMStateDescription vmstate_smmuv3_queue = { | ||
562 | + .name = "smmuv3_queue", | ||
563 | + .version_id = 1, | ||
564 | + .minimum_version_id = 1, | ||
565 | + .fields = (VMStateField[]) { | ||
566 | + VMSTATE_UINT64(base, SMMUQueue), | ||
567 | + VMSTATE_UINT32(prod, SMMUQueue), | ||
568 | + VMSTATE_UINT32(cons, SMMUQueue), | ||
569 | + VMSTATE_UINT8(log2size, SMMUQueue), | ||
570 | + }, | ||
571 | +}; | ||
572 | + | ||
573 | +static const VMStateDescription vmstate_smmuv3 = { | ||
574 | + .name = "smmuv3", | ||
575 | + .version_id = 1, | ||
576 | + .minimum_version_id = 1, | ||
577 | + .fields = (VMStateField[]) { | ||
578 | + VMSTATE_UINT32(features, SMMUv3State), | ||
579 | + VMSTATE_UINT8(sid_size, SMMUv3State), | ||
580 | + VMSTATE_UINT8(sid_split, SMMUv3State), | ||
581 | + | ||
582 | + VMSTATE_UINT32_ARRAY(cr, SMMUv3State, 3), | ||
583 | + VMSTATE_UINT32(cr0ack, SMMUv3State), | ||
584 | + VMSTATE_UINT32(statusr, SMMUv3State), | ||
585 | + VMSTATE_UINT32(irq_ctrl, SMMUv3State), | ||
586 | + VMSTATE_UINT32(gerror, SMMUv3State), | ||
587 | + VMSTATE_UINT32(gerrorn, SMMUv3State), | ||
588 | + VMSTATE_UINT64(gerror_irq_cfg0, SMMUv3State), | ||
589 | + VMSTATE_UINT32(gerror_irq_cfg1, SMMUv3State), | ||
590 | + VMSTATE_UINT32(gerror_irq_cfg2, SMMUv3State), | ||
591 | + VMSTATE_UINT64(strtab_base, SMMUv3State), | ||
592 | + VMSTATE_UINT32(strtab_base_cfg, SMMUv3State), | ||
593 | + VMSTATE_UINT64(eventq_irq_cfg0, SMMUv3State), | ||
594 | + VMSTATE_UINT32(eventq_irq_cfg1, SMMUv3State), | ||
595 | + VMSTATE_UINT32(eventq_irq_cfg2, SMMUv3State), | ||
596 | + | ||
597 | + VMSTATE_STRUCT(cmdq, SMMUv3State, 0, vmstate_smmuv3_queue, SMMUQueue), | ||
598 | + VMSTATE_STRUCT(eventq, SMMUv3State, 0, vmstate_smmuv3_queue, SMMUQueue), | ||
599 | + | ||
600 | + VMSTATE_END_OF_LIST(), | ||
601 | + }, | ||
602 | +}; | ||
603 | + | ||
604 | +static void smmuv3_instance_init(Object *obj) | ||
605 | +{ | ||
606 | + /* Nothing much to do here as of now */ | ||
607 | +} | ||
608 | + | ||
609 | +static void smmuv3_class_init(ObjectClass *klass, void *data) | ||
610 | +{ | ||
611 | + DeviceClass *dc = DEVICE_CLASS(klass); | ||
612 | + SMMUv3Class *c = ARM_SMMUV3_CLASS(klass); | ||
613 | + | ||
614 | + dc->vmsd = &vmstate_smmuv3; | ||
615 | + device_class_set_parent_reset(dc, smmu_reset, &c->parent_reset); | ||
616 | + c->parent_realize = dc->realize; | ||
617 | + dc->realize = smmu_realize; | ||
618 | +} | ||
619 | + | ||
620 | +static void smmuv3_iommu_memory_region_class_init(ObjectClass *klass, | ||
621 | + void *data) | ||
622 | +{ | ||
623 | +} | ||
624 | + | ||
625 | +static const TypeInfo smmuv3_type_info = { | ||
626 | + .name = TYPE_ARM_SMMUV3, | ||
627 | + .parent = TYPE_ARM_SMMU, | ||
628 | + .instance_size = sizeof(SMMUv3State), | ||
629 | + .instance_init = smmuv3_instance_init, | ||
630 | + .class_size = sizeof(SMMUv3Class), | ||
631 | + .class_init = smmuv3_class_init, | ||
632 | +}; | ||
633 | + | ||
634 | +static const TypeInfo smmuv3_iommu_memory_region_info = { | ||
635 | + .parent = TYPE_IOMMU_MEMORY_REGION, | ||
636 | + .name = TYPE_SMMUV3_IOMMU_MEMORY_REGION, | ||
637 | + .class_init = smmuv3_iommu_memory_region_class_init, | ||
638 | +}; | ||
639 | + | ||
640 | +static void smmuv3_register_types(void) | ||
641 | +{ | ||
642 | + type_register(&smmuv3_type_info); | ||
643 | + type_register(&smmuv3_iommu_memory_region_info); | ||
644 | +} | ||
645 | + | ||
646 | +type_init(smmuv3_register_types) | ||
647 | + | ||
648 | diff --git a/hw/arm/trace-events b/hw/arm/trace-events | ||
649 | index XXXXXXX..XXXXXXX 100644 | ||
650 | --- a/hw/arm/trace-events | ||
651 | +++ b/hw/arm/trace-events | ||
652 | @@ -XXX,XX +XXX,XX @@ smmu_ptw_invalid_pte(int stage, int level, uint64_t baseaddr, uint64_t pteaddr, | ||
653 | smmu_ptw_page_pte(int stage, int level, uint64_t iova, uint64_t baseaddr, uint64_t pteaddr, uint64_t pte, uint64_t address) "stage=%d level=%d iova=0x%"PRIx64" base@=0x%"PRIx64" pte@=0x%"PRIx64" pte=0x%"PRIx64" page address = 0x%"PRIx64 | ||
654 | smmu_ptw_block_pte(int stage, int level, uint64_t baseaddr, uint64_t pteaddr, uint64_t pte, uint64_t iova, uint64_t gpa, int bsize_mb) "stage=%d level=%d base@=0x%"PRIx64" pte@=0x%"PRIx64" pte=0x%"PRIx64" iova=0x%"PRIx64" block address = 0x%"PRIx64" block size = %d MiB" | ||
655 | smmu_get_pte(uint64_t baseaddr, int index, uint64_t pteaddr, uint64_t pte) "baseaddr=0x%"PRIx64" index=0x%x, pteaddr=0x%"PRIx64", pte=0x%"PRIx64 | ||
656 | + | ||
657 | +#hw/arm/smmuv3.c | ||
658 | +smmuv3_read_mmio(uint64_t addr, uint64_t val, unsigned size, uint32_t r) "addr: 0x%"PRIx64" val:0x%"PRIx64" size: 0x%x(%d)" | ||
659 | -- | 80 | -- |
660 | 2.17.0 | 81 | 2.25.1 |
661 | |||
662 | diff view generated by jsdifflib |
1 | From: Prem Mallappa <prem.mallappa@broadcom.com> | 1 | From: Jean-Christophe Dubois <jcd@tribudubois.net> |
---|---|---|---|
2 | 2 | ||
3 | Add code to instantiate an smmuv3 in virt machine. A new iommu | 3 | The i.MX6UL doesn't support CLK_HIGH ou CLK_HIGH_DIV clock source. |
4 | integer member is introduced in VirtMachineState to store the type | ||
5 | of the iommu in use. | ||
6 | 4 | ||
7 | Signed-off-by: Prem Mallappa <prem.mallappa@broadcom.com> | 5 | Signed-off-by: Jean-Christophe Dubois <jcd@tribudubois.net> |
8 | Signed-off-by: Eric Auger <eric.auger@redhat.com> | ||
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Message-id: 1524665762-31355-13-git-send-email-eric.auger@redhat.com | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | --- | 8 | --- |
13 | include/hw/arm/virt.h | 10 +++++++ | 9 | include/hw/timer/imx_gpt.h | 1 + |
14 | hw/arm/virt.c | 64 ++++++++++++++++++++++++++++++++++++++++++- | 10 | hw/arm/fsl-imx6ul.c | 2 +- |
15 | 2 files changed, 73 insertions(+), 1 deletion(-) | 11 | hw/misc/imx6ul_ccm.c | 6 ------ |
12 | hw/timer/imx_gpt.c | 25 +++++++++++++++++++++++++ | ||
13 | 4 files changed, 27 insertions(+), 7 deletions(-) | ||
16 | 14 | ||
17 | diff --git a/include/hw/arm/virt.h b/include/hw/arm/virt.h | 15 | diff --git a/include/hw/timer/imx_gpt.h b/include/hw/timer/imx_gpt.h |
18 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
19 | --- a/include/hw/arm/virt.h | 17 | --- a/include/hw/timer/imx_gpt.h |
20 | +++ b/include/hw/arm/virt.h | 18 | +++ b/include/hw/timer/imx_gpt.h |
21 | @@ -XXX,XX +XXX,XX @@ | 19 | @@ -XXX,XX +XXX,XX @@ |
22 | 20 | #define TYPE_IMX25_GPT "imx25.gpt" | |
23 | #define NUM_GICV2M_SPIS 64 | 21 | #define TYPE_IMX31_GPT "imx31.gpt" |
24 | #define NUM_VIRTIO_TRANSPORTS 32 | 22 | #define TYPE_IMX6_GPT "imx6.gpt" |
25 | +#define NUM_SMMU_IRQS 4 | 23 | +#define TYPE_IMX6UL_GPT "imx6ul.gpt" |
26 | 24 | #define TYPE_IMX7_GPT "imx7.gpt" | |
27 | #define ARCH_GICV3_MAINT_IRQ 9 | 25 | |
28 | 26 | #define TYPE_IMX_GPT TYPE_IMX25_GPT | |
29 | @@ -XXX,XX +XXX,XX @@ enum { | 27 | diff --git a/hw/arm/fsl-imx6ul.c b/hw/arm/fsl-imx6ul.c |
30 | VIRT_GIC_V2M, | 28 | index XXXXXXX..XXXXXXX 100644 |
31 | VIRT_GIC_ITS, | 29 | --- a/hw/arm/fsl-imx6ul.c |
32 | VIRT_GIC_REDIST, | 30 | +++ b/hw/arm/fsl-imx6ul.c |
33 | + VIRT_SMMU, | 31 | @@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_init(Object *obj) |
34 | VIRT_UART, | 32 | */ |
35 | VIRT_MMIO, | 33 | for (i = 0; i < FSL_IMX6UL_NUM_GPTS; i++) { |
36 | VIRT_RTC, | 34 | snprintf(name, NAME_SIZE, "gpt%d", i); |
37 | @@ -XXX,XX +XXX,XX @@ enum { | 35 | - object_initialize_child(obj, name, &s->gpt[i], TYPE_IMX7_GPT); |
38 | VIRT_SECURE_MEM, | 36 | + object_initialize_child(obj, name, &s->gpt[i], TYPE_IMX6UL_GPT); |
37 | } | ||
38 | |||
39 | /* | ||
40 | diff --git a/hw/misc/imx6ul_ccm.c b/hw/misc/imx6ul_ccm.c | ||
41 | index XXXXXXX..XXXXXXX 100644 | ||
42 | --- a/hw/misc/imx6ul_ccm.c | ||
43 | +++ b/hw/misc/imx6ul_ccm.c | ||
44 | @@ -XXX,XX +XXX,XX @@ static uint32_t imx6ul_ccm_get_clock_frequency(IMXCCMState *dev, IMXClk clock) | ||
45 | case CLK_32k: | ||
46 | freq = CKIL_FREQ; | ||
47 | break; | ||
48 | - case CLK_HIGH: | ||
49 | - freq = CKIH_FREQ; | ||
50 | - break; | ||
51 | - case CLK_HIGH_DIV: | ||
52 | - freq = CKIH_FREQ / 8; | ||
53 | - break; | ||
54 | default: | ||
55 | qemu_log_mask(LOG_GUEST_ERROR, "[%s]%s: unsupported clock %d\n", | ||
56 | TYPE_IMX6UL_CCM, __func__, clock); | ||
57 | diff --git a/hw/timer/imx_gpt.c b/hw/timer/imx_gpt.c | ||
58 | index XXXXXXX..XXXXXXX 100644 | ||
59 | --- a/hw/timer/imx_gpt.c | ||
60 | +++ b/hw/timer/imx_gpt.c | ||
61 | @@ -XXX,XX +XXX,XX @@ static const IMXClk imx6_gpt_clocks[] = { | ||
62 | CLK_HIGH, /* 111 reference clock */ | ||
39 | }; | 63 | }; |
40 | 64 | ||
41 | +typedef enum VirtIOMMUType { | 65 | +static const IMXClk imx6ul_gpt_clocks[] = { |
42 | + VIRT_IOMMU_NONE, | 66 | + CLK_NONE, /* 000 No clock source */ |
43 | + VIRT_IOMMU_SMMUV3, | 67 | + CLK_IPG, /* 001 ipg_clk, 532MHz*/ |
44 | + VIRT_IOMMU_VIRTIO, | 68 | + CLK_IPG_HIGH, /* 010 ipg_clk_highfreq */ |
45 | +} VirtIOMMUType; | 69 | + CLK_EXT, /* 011 External clock */ |
70 | + CLK_32k, /* 100 ipg_clk_32k */ | ||
71 | + CLK_NONE, /* 101 not defined */ | ||
72 | + CLK_NONE, /* 110 not defined */ | ||
73 | + CLK_NONE, /* 111 not defined */ | ||
74 | +}; | ||
46 | + | 75 | + |
47 | typedef struct MemMapEntry { | 76 | static const IMXClk imx7_gpt_clocks[] = { |
48 | hwaddr base; | 77 | CLK_NONE, /* 000 No clock source */ |
49 | hwaddr size; | 78 | CLK_IPG, /* 001 ipg_clk, 532MHz*/ |
50 | @@ -XXX,XX +XXX,XX @@ typedef struct { | 79 | @@ -XXX,XX +XXX,XX @@ static void imx6_gpt_init(Object *obj) |
51 | bool its; | 80 | s->clocks = imx6_gpt_clocks; |
52 | bool virt; | ||
53 | int32_t gic_version; | ||
54 | + VirtIOMMUType iommu; | ||
55 | struct arm_boot_info bootinfo; | ||
56 | const MemMapEntry *memmap; | ||
57 | const int *irqmap; | ||
58 | @@ -XXX,XX +XXX,XX @@ typedef struct { | ||
59 | uint32_t clock_phandle; | ||
60 | uint32_t gic_phandle; | ||
61 | uint32_t msi_phandle; | ||
62 | + uint32_t iommu_phandle; | ||
63 | int psci_conduit; | ||
64 | } VirtMachineState; | ||
65 | |||
66 | diff --git a/hw/arm/virt.c b/hw/arm/virt.c | ||
67 | index XXXXXXX..XXXXXXX 100644 | ||
68 | --- a/hw/arm/virt.c | ||
69 | +++ b/hw/arm/virt.c | ||
70 | @@ -XXX,XX +XXX,XX @@ | ||
71 | #include "hw/smbios/smbios.h" | ||
72 | #include "qapi/visitor.h" | ||
73 | #include "standard-headers/linux/input.h" | ||
74 | +#include "hw/arm/smmuv3.h" | ||
75 | |||
76 | #define DEFINE_VIRT_MACHINE_LATEST(major, minor, latest) \ | ||
77 | static void virt_##major##_##minor##_class_init(ObjectClass *oc, \ | ||
78 | @@ -XXX,XX +XXX,XX @@ static const MemMapEntry a15memmap[] = { | ||
79 | [VIRT_FW_CFG] = { 0x09020000, 0x00000018 }, | ||
80 | [VIRT_GPIO] = { 0x09030000, 0x00001000 }, | ||
81 | [VIRT_SECURE_UART] = { 0x09040000, 0x00001000 }, | ||
82 | + [VIRT_SMMU] = { 0x09050000, 0x00020000 }, | ||
83 | [VIRT_MMIO] = { 0x0a000000, 0x00000200 }, | ||
84 | /* ...repeating for a total of NUM_VIRTIO_TRANSPORTS, each of that size */ | ||
85 | [VIRT_PLATFORM_BUS] = { 0x0c000000, 0x02000000 }, | ||
86 | @@ -XXX,XX +XXX,XX @@ static const int a15irqmap[] = { | ||
87 | [VIRT_SECURE_UART] = 8, | ||
88 | [VIRT_MMIO] = 16, /* ...to 16 + NUM_VIRTIO_TRANSPORTS - 1 */ | ||
89 | [VIRT_GIC_V2M] = 48, /* ...to 48 + NUM_GICV2M_SPIS - 1 */ | ||
90 | + [VIRT_SMMU] = 74, /* ...to 74 + NUM_SMMU_IRQS - 1 */ | ||
91 | [VIRT_PLATFORM_BUS] = 112, /* ...to 112 + PLATFORM_BUS_NUM_IRQS -1 */ | ||
92 | }; | ||
93 | |||
94 | @@ -XXX,XX +XXX,XX @@ static void create_pcie_irq_map(const VirtMachineState *vms, | ||
95 | 0x7 /* PCI irq */); | ||
96 | } | 81 | } |
97 | 82 | ||
98 | -static void create_pcie(const VirtMachineState *vms, qemu_irq *pic) | 83 | +static void imx6ul_gpt_init(Object *obj) |
99 | +static void create_smmu(const VirtMachineState *vms, qemu_irq *pic, | ||
100 | + PCIBus *bus) | ||
101 | +{ | 84 | +{ |
102 | + char *node; | 85 | + IMXGPTState *s = IMX_GPT(obj); |
103 | + const char compat[] = "arm,smmu-v3"; | ||
104 | + int irq = vms->irqmap[VIRT_SMMU]; | ||
105 | + int i; | ||
106 | + hwaddr base = vms->memmap[VIRT_SMMU].base; | ||
107 | + hwaddr size = vms->memmap[VIRT_SMMU].size; | ||
108 | + const char irq_names[] = "eventq\0priq\0cmdq-sync\0gerror"; | ||
109 | + DeviceState *dev; | ||
110 | + | 86 | + |
111 | + if (vms->iommu != VIRT_IOMMU_SMMUV3 || !vms->iommu_phandle) { | 87 | + s->clocks = imx6ul_gpt_clocks; |
112 | + return; | ||
113 | + } | ||
114 | + | ||
115 | + dev = qdev_create(NULL, "arm-smmuv3"); | ||
116 | + | ||
117 | + object_property_set_link(OBJECT(dev), OBJECT(bus), "primary-bus", | ||
118 | + &error_abort); | ||
119 | + qdev_init_nofail(dev); | ||
120 | + sysbus_mmio_map(SYS_BUS_DEVICE(dev), 0, base); | ||
121 | + for (i = 0; i < NUM_SMMU_IRQS; i++) { | ||
122 | + sysbus_connect_irq(SYS_BUS_DEVICE(dev), i, pic[irq + i]); | ||
123 | + } | ||
124 | + | ||
125 | + node = g_strdup_printf("/smmuv3@%" PRIx64, base); | ||
126 | + qemu_fdt_add_subnode(vms->fdt, node); | ||
127 | + qemu_fdt_setprop(vms->fdt, node, "compatible", compat, sizeof(compat)); | ||
128 | + qemu_fdt_setprop_sized_cells(vms->fdt, node, "reg", 2, base, 2, size); | ||
129 | + | ||
130 | + qemu_fdt_setprop_cells(vms->fdt, node, "interrupts", | ||
131 | + GIC_FDT_IRQ_TYPE_SPI, irq , GIC_FDT_IRQ_FLAGS_EDGE_LO_HI, | ||
132 | + GIC_FDT_IRQ_TYPE_SPI, irq + 1, GIC_FDT_IRQ_FLAGS_EDGE_LO_HI, | ||
133 | + GIC_FDT_IRQ_TYPE_SPI, irq + 2, GIC_FDT_IRQ_FLAGS_EDGE_LO_HI, | ||
134 | + GIC_FDT_IRQ_TYPE_SPI, irq + 3, GIC_FDT_IRQ_FLAGS_EDGE_LO_HI); | ||
135 | + | ||
136 | + qemu_fdt_setprop(vms->fdt, node, "interrupt-names", irq_names, | ||
137 | + sizeof(irq_names)); | ||
138 | + | ||
139 | + qemu_fdt_setprop_cell(vms->fdt, node, "clocks", vms->clock_phandle); | ||
140 | + qemu_fdt_setprop_string(vms->fdt, node, "clock-names", "apb_pclk"); | ||
141 | + qemu_fdt_setprop(vms->fdt, node, "dma-coherent", NULL, 0); | ||
142 | + | ||
143 | + qemu_fdt_setprop_cell(vms->fdt, node, "#iommu-cells", 1); | ||
144 | + | ||
145 | + qemu_fdt_setprop_cell(vms->fdt, node, "phandle", vms->iommu_phandle); | ||
146 | + g_free(node); | ||
147 | +} | 88 | +} |
148 | + | 89 | + |
149 | +static void create_pcie(VirtMachineState *vms, qemu_irq *pic) | 90 | static void imx7_gpt_init(Object *obj) |
150 | { | 91 | { |
151 | hwaddr base_mmio = vms->memmap[VIRT_PCIE_MMIO].base; | 92 | IMXGPTState *s = IMX_GPT(obj); |
152 | hwaddr size_mmio = vms->memmap[VIRT_PCIE_MMIO].size; | 93 | @@ -XXX,XX +XXX,XX @@ static const TypeInfo imx6_gpt_info = { |
153 | @@ -XXX,XX +XXX,XX @@ static void create_pcie(const VirtMachineState *vms, qemu_irq *pic) | 94 | .instance_init = imx6_gpt_init, |
154 | qemu_fdt_setprop_cell(vms->fdt, nodename, "#interrupt-cells", 1); | 95 | }; |
155 | create_pcie_irq_map(vms, vms->gic_phandle, irq, nodename); | 96 | |
156 | 97 | +static const TypeInfo imx6ul_gpt_info = { | |
157 | + if (vms->iommu) { | 98 | + .name = TYPE_IMX6UL_GPT, |
158 | + vms->iommu_phandle = qemu_fdt_alloc_phandle(vms->fdt); | 99 | + .parent = TYPE_IMX25_GPT, |
100 | + .instance_init = imx6ul_gpt_init, | ||
101 | +}; | ||
159 | + | 102 | + |
160 | + create_smmu(vms, pic, pci->bus); | 103 | static const TypeInfo imx7_gpt_info = { |
161 | + | 104 | .name = TYPE_IMX7_GPT, |
162 | + qemu_fdt_setprop_cells(vms->fdt, nodename, "iommu-map", | 105 | .parent = TYPE_IMX25_GPT, |
163 | + 0x0, vms->iommu_phandle, 0x0, 0x10000); | 106 | @@ -XXX,XX +XXX,XX @@ static void imx_gpt_register_types(void) |
164 | + } | 107 | type_register_static(&imx25_gpt_info); |
165 | + | 108 | type_register_static(&imx31_gpt_info); |
166 | g_free(nodename); | 109 | type_register_static(&imx6_gpt_info); |
110 | + type_register_static(&imx6ul_gpt_info); | ||
111 | type_register_static(&imx7_gpt_info); | ||
167 | } | 112 | } |
168 | 113 | ||
169 | -- | 114 | -- |
170 | 2.17.0 | 115 | 2.25.1 |
171 | |||
172 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Jean-Christophe Dubois <jcd@tribudubois.net> | ||
1 | 2 | ||
3 | IRQs were not associated to the various GPIO devices inside i.MX7D. | ||
4 | This patch brings the i.MX7D on par with i.MX6. | ||
5 | |||
6 | Signed-off-by: Jean-Christophe Dubois <jcd@tribudubois.net> | ||
7 | Message-id: 20221226101418.415170-1-jcd@tribudubois.net | ||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | --- | ||
11 | include/hw/arm/fsl-imx7.h | 15 +++++++++++++++ | ||
12 | hw/arm/fsl-imx7.c | 31 ++++++++++++++++++++++++++++++- | ||
13 | 2 files changed, 45 insertions(+), 1 deletion(-) | ||
14 | |||
15 | diff --git a/include/hw/arm/fsl-imx7.h b/include/hw/arm/fsl-imx7.h | ||
16 | index XXXXXXX..XXXXXXX 100644 | ||
17 | --- a/include/hw/arm/fsl-imx7.h | ||
18 | +++ b/include/hw/arm/fsl-imx7.h | ||
19 | @@ -XXX,XX +XXX,XX @@ enum FslIMX7IRQs { | ||
20 | FSL_IMX7_GPT3_IRQ = 53, | ||
21 | FSL_IMX7_GPT4_IRQ = 52, | ||
22 | |||
23 | + FSL_IMX7_GPIO1_LOW_IRQ = 64, | ||
24 | + FSL_IMX7_GPIO1_HIGH_IRQ = 65, | ||
25 | + FSL_IMX7_GPIO2_LOW_IRQ = 66, | ||
26 | + FSL_IMX7_GPIO2_HIGH_IRQ = 67, | ||
27 | + FSL_IMX7_GPIO3_LOW_IRQ = 68, | ||
28 | + FSL_IMX7_GPIO3_HIGH_IRQ = 69, | ||
29 | + FSL_IMX7_GPIO4_LOW_IRQ = 70, | ||
30 | + FSL_IMX7_GPIO4_HIGH_IRQ = 71, | ||
31 | + FSL_IMX7_GPIO5_LOW_IRQ = 72, | ||
32 | + FSL_IMX7_GPIO5_HIGH_IRQ = 73, | ||
33 | + FSL_IMX7_GPIO6_LOW_IRQ = 74, | ||
34 | + FSL_IMX7_GPIO6_HIGH_IRQ = 75, | ||
35 | + FSL_IMX7_GPIO7_LOW_IRQ = 76, | ||
36 | + FSL_IMX7_GPIO7_HIGH_IRQ = 77, | ||
37 | + | ||
38 | FSL_IMX7_WDOG1_IRQ = 78, | ||
39 | FSL_IMX7_WDOG2_IRQ = 79, | ||
40 | FSL_IMX7_WDOG3_IRQ = 10, | ||
41 | diff --git a/hw/arm/fsl-imx7.c b/hw/arm/fsl-imx7.c | ||
42 | index XXXXXXX..XXXXXXX 100644 | ||
43 | --- a/hw/arm/fsl-imx7.c | ||
44 | +++ b/hw/arm/fsl-imx7.c | ||
45 | @@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp) | ||
46 | FSL_IMX7_GPIO7_ADDR, | ||
47 | }; | ||
48 | |||
49 | + static const int FSL_IMX7_GPIOn_LOW_IRQ[FSL_IMX7_NUM_GPIOS] = { | ||
50 | + FSL_IMX7_GPIO1_LOW_IRQ, | ||
51 | + FSL_IMX7_GPIO2_LOW_IRQ, | ||
52 | + FSL_IMX7_GPIO3_LOW_IRQ, | ||
53 | + FSL_IMX7_GPIO4_LOW_IRQ, | ||
54 | + FSL_IMX7_GPIO5_LOW_IRQ, | ||
55 | + FSL_IMX7_GPIO6_LOW_IRQ, | ||
56 | + FSL_IMX7_GPIO7_LOW_IRQ, | ||
57 | + }; | ||
58 | + | ||
59 | + static const int FSL_IMX7_GPIOn_HIGH_IRQ[FSL_IMX7_NUM_GPIOS] = { | ||
60 | + FSL_IMX7_GPIO1_HIGH_IRQ, | ||
61 | + FSL_IMX7_GPIO2_HIGH_IRQ, | ||
62 | + FSL_IMX7_GPIO3_HIGH_IRQ, | ||
63 | + FSL_IMX7_GPIO4_HIGH_IRQ, | ||
64 | + FSL_IMX7_GPIO5_HIGH_IRQ, | ||
65 | + FSL_IMX7_GPIO6_HIGH_IRQ, | ||
66 | + FSL_IMX7_GPIO7_HIGH_IRQ, | ||
67 | + }; | ||
68 | + | ||
69 | sysbus_realize(SYS_BUS_DEVICE(&s->gpio[i]), &error_abort); | ||
70 | - sysbus_mmio_map(SYS_BUS_DEVICE(&s->gpio[i]), 0, FSL_IMX7_GPIOn_ADDR[i]); | ||
71 | + sysbus_mmio_map(SYS_BUS_DEVICE(&s->gpio[i]), 0, | ||
72 | + FSL_IMX7_GPIOn_ADDR[i]); | ||
73 | + | ||
74 | + sysbus_connect_irq(SYS_BUS_DEVICE(&s->gpio[i]), 0, | ||
75 | + qdev_get_gpio_in(DEVICE(&s->a7mpcore), | ||
76 | + FSL_IMX7_GPIOn_LOW_IRQ[i])); | ||
77 | + | ||
78 | + sysbus_connect_irq(SYS_BUS_DEVICE(&s->gpio[i]), 1, | ||
79 | + qdev_get_gpio_in(DEVICE(&s->a7mpcore), | ||
80 | + FSL_IMX7_GPIOn_HIGH_IRQ[i])); | ||
81 | } | ||
82 | |||
83 | /* | ||
84 | -- | ||
85 | 2.25.1 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Stephen Longfield <slongfield@google.com> | ||
1 | 2 | ||
3 | Size is used at lines 1088/1188 for the loop, which reads the last 4 | ||
4 | bytes from the crc_ptr so it does need to get increased, however it | ||
5 | shouldn't be increased before the buffer is passed to CRC computation, | ||
6 | or the crc32 function will access uninitialized memory. | ||
7 | |||
8 | This was pointed out to me by clg@kaod.org during the code review of | ||
9 | a similar patch to hw/net/ftgmac100.c | ||
10 | |||
11 | Change-Id: Ib0464303b191af1e28abeb2f5105eb25aadb5e9b | ||
12 | Signed-off-by: Stephen Longfield <slongfield@google.com> | ||
13 | Reviewed-by: Patrick Venture <venture@google.com> | ||
14 | Message-id: 20221221183202.3788132-1-slongfield@google.com | ||
15 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
17 | --- | ||
18 | hw/net/imx_fec.c | 8 ++++---- | ||
19 | 1 file changed, 4 insertions(+), 4 deletions(-) | ||
20 | |||
21 | diff --git a/hw/net/imx_fec.c b/hw/net/imx_fec.c | ||
22 | index XXXXXXX..XXXXXXX 100644 | ||
23 | --- a/hw/net/imx_fec.c | ||
24 | +++ b/hw/net/imx_fec.c | ||
25 | @@ -XXX,XX +XXX,XX @@ static ssize_t imx_fec_receive(NetClientState *nc, const uint8_t *buf, | ||
26 | return 0; | ||
27 | } | ||
28 | |||
29 | - /* 4 bytes for the CRC. */ | ||
30 | - size += 4; | ||
31 | crc = cpu_to_be32(crc32(~0, buf, size)); | ||
32 | + /* Increase size by 4, loop below reads the last 4 bytes from crc_ptr. */ | ||
33 | + size += 4; | ||
34 | crc_ptr = (uint8_t *) &crc; | ||
35 | |||
36 | /* Huge frames are truncated. */ | ||
37 | @@ -XXX,XX +XXX,XX @@ static ssize_t imx_enet_receive(NetClientState *nc, const uint8_t *buf, | ||
38 | return 0; | ||
39 | } | ||
40 | |||
41 | - /* 4 bytes for the CRC. */ | ||
42 | - size += 4; | ||
43 | crc = cpu_to_be32(crc32(~0, buf, size)); | ||
44 | + /* Increase size by 4, loop below reads the last 4 bytes from crc_ptr. */ | ||
45 | + size += 4; | ||
46 | crc_ptr = (uint8_t *) &crc; | ||
47 | |||
48 | if (shift16) { | ||
49 | -- | ||
50 | 2.25.1 | diff view generated by jsdifflib |