1
target-arm queue. This has the "plumb txattrs through various
1
A largish pull request: the big things are Richard's PAuth work
2
bits of exec.c" patches, and a collection of bug fixes from
2
and Aaron's PMU emulation improvements.
3
various people.
4
3
5
thanks
4
thanks
6
-- PMM
5
-- PMM
7
6
8
7
8
The following changes since commit 681d61362d3f766a00806b89d6581869041f73cb:
9
9
10
The following changes since commit a3ac12fba028df90f7b3dbec924995c126c41022:
10
Merge remote-tracking branch 'remotes/jnsnow/tags/bitmaps-pull-request' into staging (2019-01-17 12:48:42 +0000)
11
12
Merge remote-tracking branch 'remotes/ehabkost/tags/numa-next-pull-request' into staging (2018-05-31 11:12:36 +0100)
13
11
14
are available in the Git repository at:
12
are available in the Git repository at:
15
13
16
git://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20180531
14
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20190118
17
15
18
for you to fetch changes up to 49d1dca0520ea71bc21867fab6647f474fcf857b:
16
for you to fetch changes up to 2a0ed2804e2c77a1c4e255f05ab739618e05c85d:
19
17
20
KVM: GIC: Fix memory leak due to calling kvm_init_irq_routing twice (2018-05-31 14:52:53 +0100)
18
tests/libqtest: Introduce qtest_init_with_serial() (2019-01-18 14:17:38 +0000)
21
19
22
----------------------------------------------------------------
20
----------------------------------------------------------------
23
target-arm queue:
21
target-arm queue:
24
* target/arm: Honour FPCR.FZ in FRECPX
22
* hw/char/stm32f2xx_usart: Do not update data register when device is disabled
25
* MAINTAINERS: Add entries for newer MPS2 boards and devices
23
* hw/arm/virt-acpi-build: Set COHACC override flag in IORT SMMUv3 node
26
* hw/intc/arm_gicv3: Fix APxR<n> register dispatching
24
* target/arm: Allow Aarch32 exception return to switch from Mon->Hyp
27
* arm_gicv3_kvm: fix bug in writing zero bits back to the in-kernel
25
* ftgmac100: implement the new MDIO interface on Aspeed SoC
28
GIC state
26
* implement the ARMv8.3-PAuth extension
29
* tcg: Fix helper function vs host abi for float16
27
* improve emulation of the ARM PMU
30
* arm: fix qemu crash on startup with -bios option
31
* arm: fix malloc type mismatch
32
* xlnx-zdma: Correct mem leaks and memset to zero on desc unaligned errors
33
* Correct CPACR reset value for v7 cores
34
* memory.h: Improve IOMMU related documentation
35
* exec: Plumb transaction attributes through various functions in
36
preparation for allowing IOMMUs to see them
37
* vmstate.h: Provide VMSTATE_BOOL_SUB_ARRAY
38
* ARM: ACPI: Fix use-after-free due to memory realloc
39
* KVM: GIC: Fix memory leak due to calling kvm_init_irq_routing twice
40
28
41
----------------------------------------------------------------
29
----------------------------------------------------------------
42
Francisco Iglesias (1):
30
Aaron Lindsay (13):
43
xlnx-zdma: Correct mem leaks and memset to zero on desc unaligned errors
31
migration: Add post_save function to VMStateDescription
32
target/arm: Reorganize PMCCNTR accesses
33
target/arm: Swap PMU values before/after migrations
34
target/arm: Filter cycle counter based on PMCCFILTR_EL0
35
target/arm: Allow AArch32 access for PMCCFILTR
36
target/arm: Implement PMOVSSET
37
target/arm: Define FIELDs for ID_DFR0
38
target/arm: Make PMCEID[01]_EL0 64 bit registers, add PMCEID[23]
39
target/arm: Add array for supported PMU events, generate PMCEID[01]_EL0
40
target/arm: Finish implementation of PM[X]EVCNTR and PM[X]EVTYPER
41
target/arm: PMU: Add instruction and cycle events
42
target/arm: PMU: Set PMCR.N to 4
43
target/arm: Implement PMSWINC
44
44
45
Igor Mammedov (1):
45
Alexander Graf (1):
46
arm: fix qemu crash on startup with -bios option
46
target/arm: Allow Aarch32 exception return to switch from Mon->Hyp
47
47
48
Jan Kiszka (1):
48
Cédric Le Goater (1):
49
hw/intc/arm_gicv3: Fix APxR<n> register dispatching
49
ftgmac100: implement the new MDIO interface on Aspeed SoC
50
50
51
Paolo Bonzini (1):
51
Eric Auger (1):
52
arm: fix malloc type mismatch
52
hw/arm/virt-acpi-build: Set COHACC override flag in IORT SMMUv3 node
53
53
54
Peter Maydell (17):
54
Julia Suvorova (1):
55
target/arm: Honour FPCR.FZ in FRECPX
55
tests/libqtest: Introduce qtest_init_with_serial()
56
MAINTAINERS: Add entries for newer MPS2 boards and devices
57
Correct CPACR reset value for v7 cores
58
memory.h: Improve IOMMU related documentation
59
Make tb_invalidate_phys_addr() take a MemTxAttrs argument
60
Make address_space_translate{, _cached}() take a MemTxAttrs argument
61
Make address_space_map() take a MemTxAttrs argument
62
Make address_space_access_valid() take a MemTxAttrs argument
63
Make flatview_extend_translation() take a MemTxAttrs argument
64
Make memory_region_access_valid() take a MemTxAttrs argument
65
Make MemoryRegion valid.accepts callback take a MemTxAttrs argument
66
Make flatview_access_valid() take a MemTxAttrs argument
67
Make flatview_translate() take a MemTxAttrs argument
68
Make address_space_get_iotlb_entry() take a MemTxAttrs argument
69
Make flatview_do_translate() take a MemTxAttrs argument
70
Make address_space_translate_iommu take a MemTxAttrs argument
71
vmstate.h: Provide VMSTATE_BOOL_SUB_ARRAY
72
56
73
Richard Henderson (1):
57
Philippe Mathieu-Daudé (1):
74
tcg: Fix helper function vs host abi for float16
58
hw/char/stm32f2xx_usart: Do not update data register when device is disabled
75
59
76
Shannon Zhao (3):
60
Richard Henderson (31):
77
arm_gicv3_kvm: increase clroffset accordingly
61
target/arm: Add state for the ARMv8.3-PAuth extension
78
ARM: ACPI: Fix use-after-free due to memory realloc
62
target/arm: Add SCTLR bits through ARMv8.5
79
KVM: GIC: Fix memory leak due to calling kvm_init_irq_routing twice
63
target/arm: Add PAuth active bit to tbflags
64
target/arm: Introduce raise_exception_ra
65
target/arm: Add PAuth helpers
66
target/arm: Decode PAuth within system hint space
67
target/arm: Rearrange decode in disas_data_proc_1src
68
target/arm: Decode PAuth within disas_data_proc_1src
69
target/arm: Decode PAuth within disas_data_proc_2src
70
target/arm: Move helper_exception_return to helper-a64.c
71
target/arm: Add new_pc argument to helper_exception_return
72
target/arm: Rearrange decode in disas_uncond_b_reg
73
target/arm: Decode PAuth within disas_uncond_b_reg
74
target/arm: Decode Load/store register (pac)
75
target/arm: Move cpu_mmu_index out of line
76
target/arm: Introduce arm_mmu_idx
77
target/arm: Introduce arm_stage1_mmu_idx
78
target/arm: Create ARMVAParameters and helpers
79
target/arm: Merge TBFLAG_AA_TB{0, 1} to TBII
80
target/arm: Export aa64_va_parameters to internals.h
81
target/arm: Add aa64_va_parameters_both
82
target/arm: Decode TBID from TCR
83
target/arm: Reuse aa64_va_parameters for setting tbflags
84
target/arm: Implement pauth_strip
85
target/arm: Implement pauth_auth
86
target/arm: Implement pauth_addpac
87
target/arm: Implement pauth_computepac
88
target/arm: Add PAuth system registers
89
target/arm: Enable PAuth for -cpu max
90
target/arm: Enable PAuth for user-only
91
target/arm: Tidy TBI handling in gen_a64_set_pc
80
92
81
include/exec/exec-all.h | 5 +-
93
target/arm/Makefile.objs | 1 +
82
include/exec/helper-head.h | 2 +-
94
include/hw/acpi/acpi-defs.h | 2 +
83
include/exec/memory-internal.h | 3 +-
95
include/migration/vmstate.h | 1 +
84
include/exec/memory.h | 128 +++++++++++++++++++++++++++++++++++------
96
target/arm/cpu.h | 244 +++++----
85
include/migration/vmstate.h | 3 +
97
target/arm/helper-a64.h | 14 +
86
include/sysemu/dma.h | 6 +-
98
target/arm/helper.h | 1 -
87
accel/tcg/translate-all.c | 4 +-
99
target/arm/internals.h | 77 +++
88
exec.c | 95 ++++++++++++++++++------------
100
target/arm/translate.h | 5 +-
89
hw/arm/boot.c | 18 +++---
101
tests/libqtest.h | 11 +
90
hw/arm/virt-acpi-build.c | 20 +++++--
102
hw/arm/virt-acpi-build.c | 1 +
91
hw/dma/xlnx-zdma.c | 10 +++-
103
hw/char/stm32f2xx_usart.c | 3 +-
92
hw/hppa/dino.c | 3 +-
104
hw/net/ftgmac100.c | 80 ++-
93
hw/intc/arm_gic_kvm.c | 1 -
105
migration/vmstate.c | 13 +-
94
hw/intc/arm_gicv3_cpuif.c | 12 ++--
106
target/arm/cpu.c | 19 +-
95
hw/intc/arm_gicv3_kvm.c | 2 +-
107
target/arm/cpu64.c | 68 ++-
96
hw/nvram/fw_cfg.c | 12 ++--
108
target/arm/helper-a64.c | 155 ++++++
97
hw/s390x/s390-pci-inst.c | 3 +-
109
target/arm/helper.c | 1222 +++++++++++++++++++++++++++++++++----------
98
hw/scsi/esp.c | 3 +-
110
target/arm/machine.c | 24 +
99
hw/vfio/common.c | 3 +-
111
target/arm/op_helper.c | 174 +-----
100
hw/virtio/vhost.c | 3 +-
112
target/arm/pauth_helper.c | 497 ++++++++++++++++++
101
hw/xen/xen_pt_msi.c | 3 +-
113
target/arm/translate-a64.c | 537 ++++++++++++++++---
102
memory.c | 12 ++--
114
tests/libqtest.c | 26 +
103
memory_ldst.inc.c | 18 +++---
115
docs/devel/migration.rst | 9 +-
104
target/arm/gdbstub.c | 3 +-
116
23 files changed, 2552 insertions(+), 632 deletions(-)
105
target/arm/helper-a64.c | 41 +++++++------
117
create mode 100644 target/arm/pauth_helper.c
106
target/arm/helper.c | 90 ++++++++++++++++-------------
107
target/ppc/mmu-hash64.c | 3 +-
108
target/riscv/helper.c | 2 +-
109
target/s390x/diag.c | 6 +-
110
target/s390x/excp_helper.c | 3 +-
111
target/s390x/mmu_helper.c | 3 +-
112
target/s390x/sigp.c | 3 +-
113
target/xtensa/op_helper.c | 3 +-
114
MAINTAINERS | 9 ++-
115
34 files changed, 353 insertions(+), 182 deletions(-)
116
118
diff view generated by jsdifflib
1
From: Paolo Bonzini <pbonzini@redhat.com>
1
From: Philippe Mathieu-Daudé <philmd@redhat.com>
2
2
3
cpregs_keys is an uint32_t* so the allocation should use uint32_t.
3
When the device is disabled, the internal circuitry keeps the data
4
g_new is even better because it is type-safe.
4
register loaded and doesn't update it.
5
5
6
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
6
Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com>
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
8
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
8
Message-id: 20190104182057.8778-1-philmd@redhat.com
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
10
---
11
target/arm/gdbstub.c | 3 +--
11
hw/char/stm32f2xx_usart.c | 3 +--
12
1 file changed, 1 insertion(+), 2 deletions(-)
12
1 file changed, 1 insertion(+), 2 deletions(-)
13
13
14
diff --git a/target/arm/gdbstub.c b/target/arm/gdbstub.c
14
diff --git a/hw/char/stm32f2xx_usart.c b/hw/char/stm32f2xx_usart.c
15
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
16
--- a/target/arm/gdbstub.c
16
--- a/hw/char/stm32f2xx_usart.c
17
+++ b/target/arm/gdbstub.c
17
+++ b/hw/char/stm32f2xx_usart.c
18
@@ -XXX,XX +XXX,XX @@ int arm_gen_dynamic_xml(CPUState *cs)
18
@@ -XXX,XX +XXX,XX @@ static void stm32f2xx_usart_receive(void *opaque, const uint8_t *buf, int size)
19
RegisterSysregXmlParam param = {cs, s};
19
{
20
20
STM32F2XXUsartState *s = opaque;
21
cpu->dyn_xml.num_cpregs = 0;
21
22
- cpu->dyn_xml.cpregs_keys = g_malloc(sizeof(uint32_t *) *
22
- s->usart_dr = *buf;
23
- g_hash_table_size(cpu->cp_regs));
23
-
24
+ cpu->dyn_xml.cpregs_keys = g_new(uint32_t, g_hash_table_size(cpu->cp_regs));
24
if (!(s->usart_cr1 & USART_CR1_UE && s->usart_cr1 & USART_CR1_RE)) {
25
g_string_printf(s, "<?xml version=\"1.0\"?>");
25
/* USART not enabled - drop the chars */
26
g_string_append_printf(s, "<!DOCTYPE target SYSTEM \"gdb-target.dtd\">");
26
DB_PRINT("Dropping the chars\n");
27
g_string_append_printf(s, "<feature name=\"org.qemu.gdb.arm.sys.regs\">");
27
return;
28
}
29
30
+ s->usart_dr = *buf;
31
s->usart_sr |= USART_SR_RXNE;
32
33
if (s->usart_cr1 & USART_CR1_RXNEIE) {
28
--
34
--
29
2.17.1
35
2.20.1
30
36
31
37
diff view generated by jsdifflib
1
From: Shannon Zhao <zhaoshenglong@huawei.com>
1
From: Eric Auger <eric.auger@redhat.com>
2
2
3
acpi_data_push uses g_array_set_size to resize the memory size. If there
3
Let's report IO-coherent access is supported for translation
4
is no enough contiguous memory, the address will be changed. So previous
4
table walks, descriptor fetches and queues by setting the COHACC
5
pointer could not be used any more. It must update the pointer and use
5
override flag. Without that, we observe wrong command opcodes.
6
the new one.
6
The DT description also advertises the dma coherency.
7
7
8
Also, previous codes wrongly use le32 conversion of iort->node_offset
8
Fixes a703b4f6c1ee ("hw/arm/virt-acpi-build: Add smmuv3 node in IORT table")
9
for subsequent computations that will result incorrect value if host is
10
not litlle endian. So use the non-converted one instead.
11
9
12
Signed-off-by: Shannon Zhao <zhaoshenglong@huawei.com>
10
Signed-off-by: Eric Auger <eric.auger@redhat.com>
13
Reviewed-by: Eric Auger <eric.auger@redhat.com>
11
Reported-by: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@huawei.com>
14
Message-id: 1527663951-14552-1-git-send-email-zhaoshenglong@huawei.com
12
Tested-by: Shameer Kolothum <shameerali.kolothum.thodi@huawei.com>
13
Reviewed-by: Andrew Jones <drjones@redhat.com>
14
Message-id: 20190107101041.765-1-eric.auger@redhat.com
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
---
16
---
17
hw/arm/virt-acpi-build.c | 20 +++++++++++++++-----
17
include/hw/acpi/acpi-defs.h | 2 ++
18
1 file changed, 15 insertions(+), 5 deletions(-)
18
hw/arm/virt-acpi-build.c | 1 +
19
2 files changed, 3 insertions(+)
19
20
21
diff --git a/include/hw/acpi/acpi-defs.h b/include/hw/acpi/acpi-defs.h
22
index XXXXXXX..XXXXXXX 100644
23
--- a/include/hw/acpi/acpi-defs.h
24
+++ b/include/hw/acpi/acpi-defs.h
25
@@ -XXX,XX +XXX,XX @@ struct AcpiIortItsGroup {
26
} QEMU_PACKED;
27
typedef struct AcpiIortItsGroup AcpiIortItsGroup;
28
29
+#define ACPI_IORT_SMMU_V3_COHACC_OVERRIDE 1
30
+
31
struct AcpiIortSmmu3 {
32
ACPI_IORT_NODE_HEADER_DEF
33
uint64_t base_address;
20
diff --git a/hw/arm/virt-acpi-build.c b/hw/arm/virt-acpi-build.c
34
diff --git a/hw/arm/virt-acpi-build.c b/hw/arm/virt-acpi-build.c
21
index XXXXXXX..XXXXXXX 100644
35
index XXXXXXX..XXXXXXX 100644
22
--- a/hw/arm/virt-acpi-build.c
36
--- a/hw/arm/virt-acpi-build.c
23
+++ b/hw/arm/virt-acpi-build.c
37
+++ b/hw/arm/virt-acpi-build.c
24
@@ -XXX,XX +XXX,XX @@ build_iort(GArray *table_data, BIOSLinker *linker, VirtMachineState *vms)
38
@@ -XXX,XX +XXX,XX @@ build_iort(GArray *table_data, BIOSLinker *linker, VirtMachineState *vms)
25
AcpiIortItsGroup *its;
39
smmu->mapping_count = cpu_to_le32(1);
26
AcpiIortTable *iort;
40
smmu->mapping_offset = cpu_to_le32(sizeof(*smmu));
27
AcpiIortSmmu3 *smmu;
41
smmu->base_address = cpu_to_le64(vms->memmap[VIRT_SMMU].base);
28
- size_t node_size, iort_length, smmu_offset = 0;
42
+ smmu->flags = cpu_to_le32(ACPI_IORT_SMMU_V3_COHACC_OVERRIDE);
29
+ size_t node_size, iort_node_offset, iort_length, smmu_offset = 0;
43
smmu->event_gsiv = cpu_to_le32(irq);
30
AcpiIortRC *rc;
44
smmu->pri_gsiv = cpu_to_le32(irq + 1);
31
45
smmu->gerr_gsiv = cpu_to_le32(irq + 2);
32
iort = acpi_data_push(table_data, sizeof(*iort));
33
@@ -XXX,XX +XXX,XX @@ build_iort(GArray *table_data, BIOSLinker *linker, VirtMachineState *vms)
34
35
iort_length = sizeof(*iort);
36
iort->node_count = cpu_to_le32(nb_nodes);
37
- iort->node_offset = cpu_to_le32(sizeof(*iort));
38
+ /*
39
+ * Use a copy in case table_data->data moves during acpi_data_push
40
+ * operations.
41
+ */
42
+ iort_node_offset = sizeof(*iort);
43
+ iort->node_offset = cpu_to_le32(iort_node_offset);
44
45
/* ITS group node */
46
node_size = sizeof(*its) + sizeof(uint32_t);
47
@@ -XXX,XX +XXX,XX @@ build_iort(GArray *table_data, BIOSLinker *linker, VirtMachineState *vms)
48
int irq = vms->irqmap[VIRT_SMMU];
49
50
/* SMMUv3 node */
51
- smmu_offset = iort->node_offset + node_size;
52
+ smmu_offset = iort_node_offset + node_size;
53
node_size = sizeof(*smmu) + sizeof(*idmap);
54
iort_length += node_size;
55
smmu = acpi_data_push(table_data, node_size);
56
@@ -XXX,XX +XXX,XX @@ build_iort(GArray *table_data, BIOSLinker *linker, VirtMachineState *vms)
57
idmap->id_count = cpu_to_le32(0xFFFF);
58
idmap->output_base = 0;
59
/* output IORT node is the ITS group node (the first node) */
60
- idmap->output_reference = cpu_to_le32(iort->node_offset);
61
+ idmap->output_reference = cpu_to_le32(iort_node_offset);
62
}
63
64
/* Root Complex Node */
65
@@ -XXX,XX +XXX,XX @@ build_iort(GArray *table_data, BIOSLinker *linker, VirtMachineState *vms)
66
idmap->output_reference = cpu_to_le32(smmu_offset);
67
} else {
68
/* output IORT node is the ITS group node (the first node) */
69
- idmap->output_reference = cpu_to_le32(iort->node_offset);
70
+ idmap->output_reference = cpu_to_le32(iort_node_offset);
71
}
72
73
+ /*
74
+ * Update the pointer address in case table_data->data moves during above
75
+ * acpi_data_push operations.
76
+ */
77
+ iort = (AcpiIortTable *)(table_data->data + iort_start);
78
iort->length = cpu_to_le32(iort_length);
79
80
build_header(linker, table_data, (void *)(table_data->data + iort_start),
81
--
46
--
82
2.17.1
47
2.20.1
83
48
84
49
diff view generated by jsdifflib
New patch
1
From: Alexander Graf <agraf@suse.de>
1
2
3
In U-boot, we switch from S-SVC -> Mon -> Hyp mode when we want to
4
enter Hyp mode. The change into Hyp mode is done by doing an
5
exception return from Mon. This doesn't work with current QEMU.
6
7
The problem is that in bad_mode_switch() we refuse to allow
8
the change of mode.
9
10
Note that bad_mode_switch() is used to do validation for two situations:
11
12
(1) changes to mode by instructions writing to CPSR.M
13
(ie not exception take/return) -- this corresponds to the
14
Armv8 Arm ARM pseudocode Arch32.WriteModeByInstr
15
(2) changes to mode by exception return
16
17
Attempting to enter or leave Hyp mode via case (1) is forbidden in
18
v8 and UNPREDICTABLE in v7, and QEMU is correct to disallow it
19
there. However, we're already doing that check at the top of the
20
bad_mode_switch() function, so if that passes then we should allow
21
the case (2) exception return mode changes to switch into Hyp mode.
22
23
We want to test whether we're trying to return to the nonexistent
24
"secure Hyp" mode, so we need to look at arm_is_secure_below_el3()
25
rather than arm_is_secure(), since the latter is always true if
26
we're in Mon (EL3).
27
28
Signed-off-by: Alexander Graf <agraf@suse.de>
29
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
30
Message-id: 20190109152430.32359-1-agraf@suse.de
31
[PMM: rewrote commit message]
32
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
33
---
34
target/arm/helper.c | 2 +-
35
1 file changed, 1 insertion(+), 1 deletion(-)
36
37
diff --git a/target/arm/helper.c b/target/arm/helper.c
38
index XXXXXXX..XXXXXXX 100644
39
--- a/target/arm/helper.c
40
+++ b/target/arm/helper.c
41
@@ -XXX,XX +XXX,XX @@ static int bad_mode_switch(CPUARMState *env, int mode, CPSRWriteType write_type)
42
return 0;
43
case ARM_CPU_MODE_HYP:
44
return !arm_feature(env, ARM_FEATURE_EL2)
45
- || arm_current_el(env) < 2 || arm_is_secure(env);
46
+ || arm_current_el(env) < 2 || arm_is_secure_below_el3(env);
47
case ARM_CPU_MODE_MON:
48
return arm_current_el(env) < 3;
49
default:
50
--
51
2.20.1
52
53
diff view generated by jsdifflib
New patch
1
From: Cédric Le Goater <clg@kaod.org>
1
2
3
The PHY behind the MAC of an Aspeed SoC can be controlled using two
4
different MDC/MDIO interfaces. The same registers PHYCR (MAC60) and
5
PHYDATA (MAC64) are involved but they have a different layout.
6
7
BIT31 of the Feature Register (MAC40) controls which MDC/MDIO
8
interface is active.
9
10
Signed-off-by: Cédric Le Goater <clg@kaod.org>
11
Reviewed-by: Andrew Jeffery <andrew@aj.id.au>
12
Reviewed-by: Joel Stanley <joel@jms.id.au>
13
Message-id: 20190111125759.31577-1-clg@kaod.org
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
15
---
16
hw/net/ftgmac100.c | 80 +++++++++++++++++++++++++++++++++++++++-------
17
1 file changed, 68 insertions(+), 12 deletions(-)
18
19
diff --git a/hw/net/ftgmac100.c b/hw/net/ftgmac100.c
20
index XXXXXXX..XXXXXXX 100644
21
--- a/hw/net/ftgmac100.c
22
+++ b/hw/net/ftgmac100.c
23
@@ -XXX,XX +XXX,XX @@
24
#define FTGMAC100_PHYDATA_MIIWDATA(x) ((x) & 0xffff)
25
#define FTGMAC100_PHYDATA_MIIRDATA(x) (((x) >> 16) & 0xffff)
26
27
+/*
28
+ * PHY control register - New MDC/MDIO interface
29
+ */
30
+#define FTGMAC100_PHYCR_NEW_DATA(x) (((x) >> 16) & 0xffff)
31
+#define FTGMAC100_PHYCR_NEW_FIRE (1 << 15)
32
+#define FTGMAC100_PHYCR_NEW_ST_22 (1 << 12)
33
+#define FTGMAC100_PHYCR_NEW_OP(x) (((x) >> 10) & 3)
34
+#define FTGMAC100_PHYCR_NEW_OP_WRITE 0x1
35
+#define FTGMAC100_PHYCR_NEW_OP_READ 0x2
36
+#define FTGMAC100_PHYCR_NEW_DEV(x) (((x) >> 5) & 0x1f)
37
+#define FTGMAC100_PHYCR_NEW_REG(x) ((x) & 0x1f)
38
+
39
/*
40
* Feature Register
41
*/
42
@@ -XXX,XX +XXX,XX @@ static void phy_reset(FTGMAC100State *s)
43
s->phy_int = 0;
44
}
45
46
-static uint32_t do_phy_read(FTGMAC100State *s, int reg)
47
+static uint16_t do_phy_read(FTGMAC100State *s, uint8_t reg)
48
{
49
- uint32_t val;
50
+ uint16_t val;
51
52
switch (reg) {
53
case MII_BMCR: /* Basic Control */
54
@@ -XXX,XX +XXX,XX @@ static uint32_t do_phy_read(FTGMAC100State *s, int reg)
55
MII_BMCR_FD | MII_BMCR_CTST)
56
#define MII_ANAR_MASK 0x2d7f
57
58
-static void do_phy_write(FTGMAC100State *s, int reg, uint32_t val)
59
+static void do_phy_write(FTGMAC100State *s, uint8_t reg, uint16_t val)
60
{
61
switch (reg) {
62
case MII_BMCR: /* Basic Control */
63
@@ -XXX,XX +XXX,XX @@ static void do_phy_write(FTGMAC100State *s, int reg, uint32_t val)
64
}
65
}
66
67
+static void do_phy_new_ctl(FTGMAC100State *s)
68
+{
69
+ uint8_t reg;
70
+ uint16_t data;
71
+
72
+ if (!(s->phycr & FTGMAC100_PHYCR_NEW_ST_22)) {
73
+ qemu_log_mask(LOG_UNIMP, "%s: unsupported ST code\n", __func__);
74
+ return;
75
+ }
76
+
77
+ /* Nothing to do */
78
+ if (!(s->phycr & FTGMAC100_PHYCR_NEW_FIRE)) {
79
+ return;
80
+ }
81
+
82
+ reg = FTGMAC100_PHYCR_NEW_REG(s->phycr);
83
+ data = FTGMAC100_PHYCR_NEW_DATA(s->phycr);
84
+
85
+ switch (FTGMAC100_PHYCR_NEW_OP(s->phycr)) {
86
+ case FTGMAC100_PHYCR_NEW_OP_WRITE:
87
+ do_phy_write(s, reg, data);
88
+ break;
89
+ case FTGMAC100_PHYCR_NEW_OP_READ:
90
+ s->phydata = do_phy_read(s, reg) & 0xffff;
91
+ break;
92
+ default:
93
+ qemu_log_mask(LOG_GUEST_ERROR, "%s: invalid OP code %08x\n",
94
+ __func__, s->phycr);
95
+ }
96
+
97
+ s->phycr &= ~FTGMAC100_PHYCR_NEW_FIRE;
98
+}
99
+
100
+static void do_phy_ctl(FTGMAC100State *s)
101
+{
102
+ uint8_t reg = FTGMAC100_PHYCR_REG(s->phycr);
103
+
104
+ if (s->phycr & FTGMAC100_PHYCR_MIIWR) {
105
+ do_phy_write(s, reg, s->phydata & 0xffff);
106
+ s->phycr &= ~FTGMAC100_PHYCR_MIIWR;
107
+ } else if (s->phycr & FTGMAC100_PHYCR_MIIRD) {
108
+ s->phydata = do_phy_read(s, reg) << 16;
109
+ s->phycr &= ~FTGMAC100_PHYCR_MIIRD;
110
+ } else {
111
+ qemu_log_mask(LOG_GUEST_ERROR, "%s: no OP code %08x\n",
112
+ __func__, s->phycr);
113
+ }
114
+}
115
+
116
static int ftgmac100_read_bd(FTGMAC100Desc *bd, dma_addr_t addr)
117
{
118
if (dma_memory_read(&address_space_memory, addr, bd, sizeof(*bd))) {
119
@@ -XXX,XX +XXX,XX @@ static void ftgmac100_write(void *opaque, hwaddr addr,
120
uint64_t value, unsigned size)
121
{
122
FTGMAC100State *s = FTGMAC100(opaque);
123
- int reg;
124
125
switch (addr & 0xff) {
126
case FTGMAC100_ISR: /* Interrupt status */
127
@@ -XXX,XX +XXX,XX @@ static void ftgmac100_write(void *opaque, hwaddr addr,
128
break;
129
130
case FTGMAC100_PHYCR: /* PHY Device control */
131
- reg = FTGMAC100_PHYCR_REG(value);
132
s->phycr = value;
133
- if (value & FTGMAC100_PHYCR_MIIWR) {
134
- do_phy_write(s, reg, s->phydata & 0xffff);
135
- s->phycr &= ~FTGMAC100_PHYCR_MIIWR;
136
+ if (s->revr & FTGMAC100_REVR_NEW_MDIO_INTERFACE) {
137
+ do_phy_new_ctl(s);
138
} else {
139
- s->phydata = do_phy_read(s, reg) << 16;
140
- s->phycr &= ~FTGMAC100_PHYCR_MIIRD;
141
+ do_phy_ctl(s);
142
}
143
break;
144
case FTGMAC100_PHYDATA:
145
@@ -XXX,XX +XXX,XX @@ static void ftgmac100_write(void *opaque, hwaddr addr,
146
s->dblac = value;
147
break;
148
case FTGMAC100_REVR: /* Feature Register */
149
- /* TODO: Only Old MDIO interface is supported */
150
- s->revr = value & ~FTGMAC100_REVR_NEW_MDIO_INTERFACE;
151
+ s->revr = value;
152
break;
153
case FTGMAC100_FEAR1: /* Feature Register 1 */
154
s->fear1 = value;
155
--
156
2.20.1
157
158
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Add storage space for the 5 encryption keys.
4
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 20190108223129.5570-2-richard.henderson@linaro.org
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
---
10
target/arm/cpu.h | 30 +++++++++++++++++++++++++++++-
11
1 file changed, 29 insertions(+), 1 deletion(-)
12
13
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
14
index XXXXXXX..XXXXXXX 100644
15
--- a/target/arm/cpu.h
16
+++ b/target/arm/cpu.h
17
@@ -XXX,XX +XXX,XX @@ typedef struct ARMVectorReg {
18
uint64_t d[2 * ARM_MAX_VQ] QEMU_ALIGNED(16);
19
} ARMVectorReg;
20
21
-/* In AArch32 mode, predicate registers do not exist at all. */
22
#ifdef TARGET_AARCH64
23
+/* In AArch32 mode, predicate registers do not exist at all. */
24
typedef struct ARMPredicateReg {
25
uint64_t p[2 * ARM_MAX_VQ / 8] QEMU_ALIGNED(16);
26
} ARMPredicateReg;
27
+
28
+/* In AArch32 mode, PAC keys do not exist at all. */
29
+typedef struct ARMPACKey {
30
+ uint64_t lo, hi;
31
+} ARMPACKey;
32
#endif
33
34
35
@@ -XXX,XX +XXX,XX @@ typedef struct CPUARMState {
36
uint32_t cregs[16];
37
} iwmmxt;
38
39
+#ifdef TARGET_AARCH64
40
+ ARMPACKey apia_key;
41
+ ARMPACKey apib_key;
42
+ ARMPACKey apda_key;
43
+ ARMPACKey apdb_key;
44
+ ARMPACKey apga_key;
45
+#endif
46
+
47
#if defined(CONFIG_USER_ONLY)
48
/* For usermode syscall translation. */
49
int eabi;
50
@@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_fcma(const ARMISARegisters *id)
51
return FIELD_EX64(id->id_aa64isar1, ID_AA64ISAR1, FCMA) != 0;
52
}
53
54
+static inline bool isar_feature_aa64_pauth(const ARMISARegisters *id)
55
+{
56
+ /*
57
+ * Note that while QEMU will only implement the architected algorithm
58
+ * QARMA, and thus APA+GPA, the host cpu for kvm may use implementation
59
+ * defined algorithms, and thus API+GPI, and this predicate controls
60
+ * migration of the 128-bit keys.
61
+ */
62
+ return (id->id_aa64isar1 &
63
+ (FIELD_DP64(0, ID_AA64ISAR1, APA, -1) |
64
+ FIELD_DP64(0, ID_AA64ISAR1, API, -1) |
65
+ FIELD_DP64(0, ID_AA64ISAR1, GPA, -1) |
66
+ FIELD_DP64(0, ID_AA64ISAR1, GPI, -1))) != 0;
67
+}
68
+
69
static inline bool isar_feature_aa64_fp16(const ARMISARegisters *id)
70
{
71
/* We always set the AdvSIMD and FP fields identically wrt FP16. */
72
--
73
2.20.1
74
75
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Post v8.4 bits taken from SysReg_v85_xml-00bet8.
4
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 20190108223129.5570-3-richard.henderson@linaro.org
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
---
10
target/arm/cpu.h | 45 +++++++++++++++++++++++++++++++++------------
11
1 file changed, 33 insertions(+), 12 deletions(-)
12
13
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
14
index XXXXXXX..XXXXXXX 100644
15
--- a/target/arm/cpu.h
16
+++ b/target/arm/cpu.h
17
@@ -XXX,XX +XXX,XX @@ void pmccntr_sync(CPUARMState *env);
18
#define SCTLR_A (1U << 1)
19
#define SCTLR_C (1U << 2)
20
#define SCTLR_W (1U << 3) /* up to v6; RAO in v7 */
21
-#define SCTLR_SA (1U << 3)
22
+#define SCTLR_nTLSMD_32 (1U << 3) /* v8.2-LSMAOC, AArch32 only */
23
+#define SCTLR_SA (1U << 3) /* AArch64 only */
24
#define SCTLR_P (1U << 4) /* up to v5; RAO in v6 and v7 */
25
+#define SCTLR_LSMAOE_32 (1U << 4) /* v8.2-LSMAOC, AArch32 only */
26
#define SCTLR_SA0 (1U << 4) /* v8 onward, AArch64 only */
27
#define SCTLR_D (1U << 5) /* up to v5; RAO in v6 */
28
#define SCTLR_CP15BEN (1U << 5) /* v7 onward */
29
#define SCTLR_L (1U << 6) /* up to v5; RAO in v6 and v7; RAZ in v8 */
30
+#define SCTLR_nAA (1U << 6) /* when v8.4-LSE is implemented */
31
#define SCTLR_B (1U << 7) /* up to v6; RAZ in v7 */
32
#define SCTLR_ITD (1U << 7) /* v8 onward */
33
#define SCTLR_S (1U << 8) /* up to v6; RAZ in v7 */
34
@@ -XXX,XX +XXX,XX @@ void pmccntr_sync(CPUARMState *env);
35
#define SCTLR_R (1U << 9) /* up to v6; RAZ in v7 */
36
#define SCTLR_UMA (1U << 9) /* v8 onward, AArch64 only */
37
#define SCTLR_F (1U << 10) /* up to v6 */
38
-#define SCTLR_SW (1U << 10) /* v7 onward */
39
-#define SCTLR_Z (1U << 11)
40
+#define SCTLR_SW (1U << 10) /* v7, RES0 in v8 */
41
+#define SCTLR_Z (1U << 11) /* in v7, RES1 in v8 */
42
+#define SCTLR_EOS (1U << 11) /* v8.5-ExS */
43
#define SCTLR_I (1U << 12)
44
-#define SCTLR_V (1U << 13)
45
+#define SCTLR_V (1U << 13) /* AArch32 only */
46
+#define SCTLR_EnDB (1U << 13) /* v8.3, AArch64 only */
47
#define SCTLR_RR (1U << 14) /* up to v7 */
48
#define SCTLR_DZE (1U << 14) /* v8 onward, AArch64 only */
49
#define SCTLR_L4 (1U << 15) /* up to v6; RAZ in v7 */
50
#define SCTLR_UCT (1U << 15) /* v8 onward, AArch64 only */
51
#define SCTLR_DT (1U << 16) /* up to ??, RAO in v6 and v7 */
52
#define SCTLR_nTWI (1U << 16) /* v8 onward */
53
-#define SCTLR_HA (1U << 17)
54
+#define SCTLR_HA (1U << 17) /* up to v7, RES0 in v8 */
55
#define SCTLR_BR (1U << 17) /* PMSA only */
56
#define SCTLR_IT (1U << 18) /* up to ??, RAO in v6 and v7 */
57
#define SCTLR_nTWE (1U << 18) /* v8 onward */
58
#define SCTLR_WXN (1U << 19)
59
#define SCTLR_ST (1U << 20) /* up to ??, RAZ in v6 */
60
-#define SCTLR_UWXN (1U << 20) /* v7 onward */
61
-#define SCTLR_FI (1U << 21)
62
-#define SCTLR_U (1U << 22)
63
+#define SCTLR_UWXN (1U << 20) /* v7 onward, AArch32 only */
64
+#define SCTLR_FI (1U << 21) /* up to v7, v8 RES0 */
65
+#define SCTLR_IESB (1U << 21) /* v8.2-IESB, AArch64 only */
66
+#define SCTLR_U (1U << 22) /* up to v6, RAO in v7 */
67
+#define SCTLR_EIS (1U << 22) /* v8.5-ExS */
68
#define SCTLR_XP (1U << 23) /* up to v6; v7 onward RAO */
69
+#define SCTLR_SPAN (1U << 23) /* v8.1-PAN */
70
#define SCTLR_VE (1U << 24) /* up to v7 */
71
#define SCTLR_E0E (1U << 24) /* v8 onward, AArch64 only */
72
#define SCTLR_EE (1U << 25)
73
#define SCTLR_L2 (1U << 26) /* up to v6, RAZ in v7 */
74
#define SCTLR_UCI (1U << 26) /* v8 onward, AArch64 only */
75
-#define SCTLR_NMFI (1U << 27)
76
-#define SCTLR_TRE (1U << 28)
77
-#define SCTLR_AFE (1U << 29)
78
-#define SCTLR_TE (1U << 30)
79
+#define SCTLR_NMFI (1U << 27) /* up to v7, RAZ in v7VE and v8 */
80
+#define SCTLR_EnDA (1U << 27) /* v8.3, AArch64 only */
81
+#define SCTLR_TRE (1U << 28) /* AArch32 only */
82
+#define SCTLR_nTLSMD_64 (1U << 28) /* v8.2-LSMAOC, AArch64 only */
83
+#define SCTLR_AFE (1U << 29) /* AArch32 only */
84
+#define SCTLR_LSMAOE_64 (1U << 29) /* v8.2-LSMAOC, AArch64 only */
85
+#define SCTLR_TE (1U << 30) /* AArch32 only */
86
+#define SCTLR_EnIB (1U << 30) /* v8.3, AArch64 only */
87
+#define SCTLR_EnIA (1U << 31) /* v8.3, AArch64 only */
88
+#define SCTLR_BT0 (1ULL << 35) /* v8.5-BTI */
89
+#define SCTLR_BT1 (1ULL << 36) /* v8.5-BTI */
90
+#define SCTLR_ITFSB (1ULL << 37) /* v8.5-MemTag */
91
+#define SCTLR_TCF0 (3ULL << 38) /* v8.5-MemTag */
92
+#define SCTLR_TCF (3ULL << 40) /* v8.5-MemTag */
93
+#define SCTLR_ATA0 (1ULL << 42) /* v8.5-MemTag */
94
+#define SCTLR_ATA (1ULL << 43) /* v8.5-MemTag */
95
+#define SCTLR_DSSBS (1ULL << 44) /* v8.5 */
96
97
#define CPTR_TCPAC (1U << 31)
98
#define CPTR_TTA (1U << 20)
99
--
100
2.20.1
101
102
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
There are 5 bits of state that could be added, but to save
4
space within tbflags, add only a single enable bit.
5
Helpers will determine the rest of the state at runtime.
6
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20190108223129.5570-4-richard.henderson@linaro.org
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
12
target/arm/cpu.h | 1 +
13
target/arm/translate.h | 2 ++
14
target/arm/helper.c | 19 +++++++++++++++++++
15
target/arm/translate-a64.c | 1 +
16
4 files changed, 23 insertions(+)
17
18
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
19
index XXXXXXX..XXXXXXX 100644
20
--- a/target/arm/cpu.h
21
+++ b/target/arm/cpu.h
22
@@ -XXX,XX +XXX,XX @@ FIELD(TBFLAG_A64, TBI0, 0, 1)
23
FIELD(TBFLAG_A64, TBI1, 1, 1)
24
FIELD(TBFLAG_A64, SVEEXC_EL, 2, 2)
25
FIELD(TBFLAG_A64, ZCR_LEN, 4, 4)
26
+FIELD(TBFLAG_A64, PAUTH_ACTIVE, 8, 1)
27
28
static inline bool bswap_code(bool sctlr_b)
29
{
30
diff --git a/target/arm/translate.h b/target/arm/translate.h
31
index XXXXXXX..XXXXXXX 100644
32
--- a/target/arm/translate.h
33
+++ b/target/arm/translate.h
34
@@ -XXX,XX +XXX,XX @@ typedef struct DisasContext {
35
bool is_ldex;
36
/* True if a single-step exception will be taken to the current EL */
37
bool ss_same_el;
38
+ /* True if v8.3-PAuth is active. */
39
+ bool pauth_active;
40
/* Bottom two bits of XScale c15_cpar coprocessor access control reg */
41
int c15_cpar;
42
/* TCG op of the current insn_start. */
43
diff --git a/target/arm/helper.c b/target/arm/helper.c
44
index XXXXXXX..XXXXXXX 100644
45
--- a/target/arm/helper.c
46
+++ b/target/arm/helper.c
47
@@ -XXX,XX +XXX,XX @@ void cpu_get_tb_cpu_state(CPUARMState *env, target_ulong *pc,
48
flags = FIELD_DP32(flags, TBFLAG_A64, SVEEXC_EL, sve_el);
49
flags = FIELD_DP32(flags, TBFLAG_A64, ZCR_LEN, zcr_len);
50
}
51
+
52
+ if (cpu_isar_feature(aa64_pauth, cpu)) {
53
+ /*
54
+ * In order to save space in flags, we record only whether
55
+ * pauth is "inactive", meaning all insns are implemented as
56
+ * a nop, or "active" when some action must be performed.
57
+ * The decision of which action to take is left to a helper.
58
+ */
59
+ uint64_t sctlr;
60
+ if (current_el == 0) {
61
+ /* FIXME: ARMv8.1-VHE S2 translation regime. */
62
+ sctlr = env->cp15.sctlr_el[1];
63
+ } else {
64
+ sctlr = env->cp15.sctlr_el[current_el];
65
+ }
66
+ if (sctlr & (SCTLR_EnIA | SCTLR_EnIB | SCTLR_EnDA | SCTLR_EnDB)) {
67
+ flags = FIELD_DP32(flags, TBFLAG_A64, PAUTH_ACTIVE, 1);
68
+ }
69
+ }
70
} else {
71
*pc = env->regs[15];
72
flags = FIELD_DP32(flags, TBFLAG_A32, THUMB, env->thumb);
73
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
74
index XXXXXXX..XXXXXXX 100644
75
--- a/target/arm/translate-a64.c
76
+++ b/target/arm/translate-a64.c
77
@@ -XXX,XX +XXX,XX @@ static void aarch64_tr_init_disas_context(DisasContextBase *dcbase,
78
dc->fp_excp_el = FIELD_EX32(tb_flags, TBFLAG_ANY, FPEXC_EL);
79
dc->sve_excp_el = FIELD_EX32(tb_flags, TBFLAG_A64, SVEEXC_EL);
80
dc->sve_len = (FIELD_EX32(tb_flags, TBFLAG_A64, ZCR_LEN) + 1) * 16;
81
+ dc->pauth_active = FIELD_EX32(tb_flags, TBFLAG_A64, PAUTH_ACTIVE);
82
dc->vec_len = 0;
83
dc->vec_stride = 0;
84
dc->cp_regs = arm_cpu->cp_regs;
85
--
86
2.20.1
87
88
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
This path uses cpu_loop_exit_restore to unwind current processor state.
4
5
Suggested-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Message-id: 20190108223129.5570-5-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/internals.h | 7 +++++++
12
target/arm/op_helper.c | 19 +++++++++++++++++--
13
2 files changed, 24 insertions(+), 2 deletions(-)
14
15
diff --git a/target/arm/internals.h b/target/arm/internals.h
16
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/internals.h
18
+++ b/target/arm/internals.h
19
@@ -XXX,XX +XXX,XX @@ FIELD(V7M_EXCRET, RES1, 7, 25) /* including the must-be-1 prefix */
20
void QEMU_NORETURN raise_exception(CPUARMState *env, uint32_t excp,
21
uint32_t syndrome, uint32_t target_el);
22
23
+/*
24
+ * Similarly, but also use unwinding to restore cpu state.
25
+ */
26
+void QEMU_NORETURN raise_exception_ra(CPUARMState *env, uint32_t excp,
27
+ uint32_t syndrome, uint32_t target_el,
28
+ uintptr_t ra);
29
+
30
/*
31
* For AArch64, map a given EL to an index in the banked_spsr array.
32
* Note that this mapping and the AArch32 mapping defined in bank_number()
33
diff --git a/target/arm/op_helper.c b/target/arm/op_helper.c
34
index XXXXXXX..XXXXXXX 100644
35
--- a/target/arm/op_helper.c
36
+++ b/target/arm/op_helper.c
37
@@ -XXX,XX +XXX,XX @@
38
#define SIGNBIT (uint32_t)0x80000000
39
#define SIGNBIT64 ((uint64_t)1 << 63)
40
41
-void raise_exception(CPUARMState *env, uint32_t excp,
42
- uint32_t syndrome, uint32_t target_el)
43
+static CPUState *do_raise_exception(CPUARMState *env, uint32_t excp,
44
+ uint32_t syndrome, uint32_t target_el)
45
{
46
CPUState *cs = CPU(arm_env_get_cpu(env));
47
48
@@ -XXX,XX +XXX,XX @@ void raise_exception(CPUARMState *env, uint32_t excp,
49
cs->exception_index = excp;
50
env->exception.syndrome = syndrome;
51
env->exception.target_el = target_el;
52
+
53
+ return cs;
54
+}
55
+
56
+void raise_exception(CPUARMState *env, uint32_t excp,
57
+ uint32_t syndrome, uint32_t target_el)
58
+{
59
+ CPUState *cs = do_raise_exception(env, excp, syndrome, target_el);
60
cpu_loop_exit(cs);
61
}
62
63
+void raise_exception_ra(CPUARMState *env, uint32_t excp, uint32_t syndrome,
64
+ uint32_t target_el, uintptr_t ra)
65
+{
66
+ CPUState *cs = do_raise_exception(env, excp, syndrome, target_el);
67
+ cpu_loop_exit_restore(cs, ra);
68
+}
69
+
70
static int exception_target_el(CPUARMState *env)
71
{
72
int target_el = MAX(1, arm_current_el(env));
73
--
74
2.20.1
75
76
diff view generated by jsdifflib
New patch
1
1
From: Richard Henderson <richard.henderson@linaro.org>
2
3
The cryptographic internals are stubbed out for now,
4
but the enable and trap bits are checked.
5
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Message-id: 20190108223129.5570-6-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/Makefile.objs | 1 +
12
target/arm/helper-a64.h | 12 +++
13
target/arm/internals.h | 6 ++
14
target/arm/pauth_helper.c | 186 ++++++++++++++++++++++++++++++++++++++
15
4 files changed, 205 insertions(+)
16
create mode 100644 target/arm/pauth_helper.c
17
18
diff --git a/target/arm/Makefile.objs b/target/arm/Makefile.objs
19
index XXXXXXX..XXXXXXX 100644
20
--- a/target/arm/Makefile.objs
21
+++ b/target/arm/Makefile.objs
22
@@ -XXX,XX +XXX,XX @@ obj-y += translate.o op_helper.o helper.o cpu.o
23
obj-y += neon_helper.o iwmmxt_helper.o vec_helper.o
24
obj-y += gdbstub.o
25
obj-$(TARGET_AARCH64) += cpu64.o translate-a64.o helper-a64.o gdbstub64.o
26
+obj-$(TARGET_AARCH64) += pauth_helper.o
27
obj-y += crypto_helper.o
28
obj-$(CONFIG_SOFTMMU) += arm-powerctl.o
29
30
diff --git a/target/arm/helper-a64.h b/target/arm/helper-a64.h
31
index XXXXXXX..XXXXXXX 100644
32
--- a/target/arm/helper-a64.h
33
+++ b/target/arm/helper-a64.h
34
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_2(advsimd_rinth, f16, f16, ptr)
35
DEF_HELPER_2(advsimd_f16tosinth, i32, f16, ptr)
36
DEF_HELPER_2(advsimd_f16touinth, i32, f16, ptr)
37
DEF_HELPER_2(sqrt_f16, f16, f16, ptr)
38
+
39
+DEF_HELPER_FLAGS_3(pacia, TCG_CALL_NO_WG, i64, env, i64, i64)
40
+DEF_HELPER_FLAGS_3(pacib, TCG_CALL_NO_WG, i64, env, i64, i64)
41
+DEF_HELPER_FLAGS_3(pacda, TCG_CALL_NO_WG, i64, env, i64, i64)
42
+DEF_HELPER_FLAGS_3(pacdb, TCG_CALL_NO_WG, i64, env, i64, i64)
43
+DEF_HELPER_FLAGS_3(pacga, TCG_CALL_NO_WG, i64, env, i64, i64)
44
+DEF_HELPER_FLAGS_3(autia, TCG_CALL_NO_WG, i64, env, i64, i64)
45
+DEF_HELPER_FLAGS_3(autib, TCG_CALL_NO_WG, i64, env, i64, i64)
46
+DEF_HELPER_FLAGS_3(autda, TCG_CALL_NO_WG, i64, env, i64, i64)
47
+DEF_HELPER_FLAGS_3(autdb, TCG_CALL_NO_WG, i64, env, i64, i64)
48
+DEF_HELPER_FLAGS_2(xpaci, TCG_CALL_NO_RWG_SE, i64, env, i64)
49
+DEF_HELPER_FLAGS_2(xpacd, TCG_CALL_NO_RWG_SE, i64, env, i64)
50
diff --git a/target/arm/internals.h b/target/arm/internals.h
51
index XXXXXXX..XXXXXXX 100644
52
--- a/target/arm/internals.h
53
+++ b/target/arm/internals.h
54
@@ -XXX,XX +XXX,XX @@ enum arm_exception_class {
55
EC_CP14DTTRAP = 0x06,
56
EC_ADVSIMDFPACCESSTRAP = 0x07,
57
EC_FPIDTRAP = 0x08,
58
+ EC_PACTRAP = 0x09,
59
EC_CP14RRTTRAP = 0x0c,
60
EC_ILLEGALSTATE = 0x0e,
61
EC_AA32_SVC = 0x11,
62
@@ -XXX,XX +XXX,XX @@ static inline uint32_t syn_sve_access_trap(void)
63
return EC_SVEACCESSTRAP << ARM_EL_EC_SHIFT;
64
}
65
66
+static inline uint32_t syn_pactrap(void)
67
+{
68
+ return EC_PACTRAP << ARM_EL_EC_SHIFT;
69
+}
70
+
71
static inline uint32_t syn_insn_abort(int same_el, int ea, int s1ptw, int fsc)
72
{
73
return (EC_INSNABORT << ARM_EL_EC_SHIFT) | (same_el << ARM_EL_EC_SHIFT)
74
diff --git a/target/arm/pauth_helper.c b/target/arm/pauth_helper.c
75
new file mode 100644
76
index XXXXXXX..XXXXXXX
77
--- /dev/null
78
+++ b/target/arm/pauth_helper.c
79
@@ -XXX,XX +XXX,XX @@
80
+/*
81
+ * ARM v8.3-PAuth Operations
82
+ *
83
+ * Copyright (c) 2019 Linaro, Ltd.
84
+ *
85
+ * This library is free software; you can redistribute it and/or
86
+ * modify it under the terms of the GNU Lesser General Public
87
+ * License as published by the Free Software Foundation; either
88
+ * version 2 of the License, or (at your option) any later version.
89
+ *
90
+ * This library is distributed in the hope that it will be useful,
91
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
92
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
93
+ * Lesser General Public License for more details.
94
+ *
95
+ * You should have received a copy of the GNU Lesser General Public
96
+ * License along with this library; if not, see <http://www.gnu.org/licenses/>.
97
+ */
98
+
99
+#include "qemu/osdep.h"
100
+#include "cpu.h"
101
+#include "internals.h"
102
+#include "exec/exec-all.h"
103
+#include "exec/cpu_ldst.h"
104
+#include "exec/helper-proto.h"
105
+#include "tcg/tcg-gvec-desc.h"
106
+
107
+
108
+static uint64_t pauth_computepac(uint64_t data, uint64_t modifier,
109
+ ARMPACKey key)
110
+{
111
+ g_assert_not_reached(); /* FIXME */
112
+}
113
+
114
+static uint64_t pauth_addpac(CPUARMState *env, uint64_t ptr, uint64_t modifier,
115
+ ARMPACKey *key, bool data)
116
+{
117
+ g_assert_not_reached(); /* FIXME */
118
+}
119
+
120
+static uint64_t pauth_auth(CPUARMState *env, uint64_t ptr, uint64_t modifier,
121
+ ARMPACKey *key, bool data, int keynumber)
122
+{
123
+ g_assert_not_reached(); /* FIXME */
124
+}
125
+
126
+static uint64_t pauth_strip(CPUARMState *env, uint64_t ptr, bool data)
127
+{
128
+ g_assert_not_reached(); /* FIXME */
129
+}
130
+
131
+static void QEMU_NORETURN pauth_trap(CPUARMState *env, int target_el,
132
+ uintptr_t ra)
133
+{
134
+ raise_exception_ra(env, EXCP_UDEF, syn_pactrap(), target_el, ra);
135
+}
136
+
137
+static void pauth_check_trap(CPUARMState *env, int el, uintptr_t ra)
138
+{
139
+ if (el < 2 && arm_feature(env, ARM_FEATURE_EL2)) {
140
+ uint64_t hcr = arm_hcr_el2_eff(env);
141
+ bool trap = !(hcr & HCR_API);
142
+ /* FIXME: ARMv8.1-VHE: trap only applies to EL1&0 regime. */
143
+ /* FIXME: ARMv8.3-NV: HCR_NV trap takes precedence for ERETA[AB]. */
144
+ if (trap) {
145
+ pauth_trap(env, 2, ra);
146
+ }
147
+ }
148
+ if (el < 3 && arm_feature(env, ARM_FEATURE_EL3)) {
149
+ if (!(env->cp15.scr_el3 & SCR_API)) {
150
+ pauth_trap(env, 3, ra);
151
+ }
152
+ }
153
+}
154
+
155
+static bool pauth_key_enabled(CPUARMState *env, int el, uint32_t bit)
156
+{
157
+ uint32_t sctlr;
158
+ if (el == 0) {
159
+ /* FIXME: ARMv8.1-VHE S2 translation regime. */
160
+ sctlr = env->cp15.sctlr_el[1];
161
+ } else {
162
+ sctlr = env->cp15.sctlr_el[el];
163
+ }
164
+ return (sctlr & bit) != 0;
165
+}
166
+
167
+uint64_t HELPER(pacia)(CPUARMState *env, uint64_t x, uint64_t y)
168
+{
169
+ int el = arm_current_el(env);
170
+ if (!pauth_key_enabled(env, el, SCTLR_EnIA)) {
171
+ return x;
172
+ }
173
+ pauth_check_trap(env, el, GETPC());
174
+ return pauth_addpac(env, x, y, &env->apia_key, false);
175
+}
176
+
177
+uint64_t HELPER(pacib)(CPUARMState *env, uint64_t x, uint64_t y)
178
+{
179
+ int el = arm_current_el(env);
180
+ if (!pauth_key_enabled(env, el, SCTLR_EnIB)) {
181
+ return x;
182
+ }
183
+ pauth_check_trap(env, el, GETPC());
184
+ return pauth_addpac(env, x, y, &env->apib_key, false);
185
+}
186
+
187
+uint64_t HELPER(pacda)(CPUARMState *env, uint64_t x, uint64_t y)
188
+{
189
+ int el = arm_current_el(env);
190
+ if (!pauth_key_enabled(env, el, SCTLR_EnDA)) {
191
+ return x;
192
+ }
193
+ pauth_check_trap(env, el, GETPC());
194
+ return pauth_addpac(env, x, y, &env->apda_key, true);
195
+}
196
+
197
+uint64_t HELPER(pacdb)(CPUARMState *env, uint64_t x, uint64_t y)
198
+{
199
+ int el = arm_current_el(env);
200
+ if (!pauth_key_enabled(env, el, SCTLR_EnDB)) {
201
+ return x;
202
+ }
203
+ pauth_check_trap(env, el, GETPC());
204
+ return pauth_addpac(env, x, y, &env->apdb_key, true);
205
+}
206
+
207
+uint64_t HELPER(pacga)(CPUARMState *env, uint64_t x, uint64_t y)
208
+{
209
+ uint64_t pac;
210
+
211
+ pauth_check_trap(env, arm_current_el(env), GETPC());
212
+ pac = pauth_computepac(x, y, env->apga_key);
213
+
214
+ return pac & 0xffffffff00000000ull;
215
+}
216
+
217
+uint64_t HELPER(autia)(CPUARMState *env, uint64_t x, uint64_t y)
218
+{
219
+ int el = arm_current_el(env);
220
+ if (!pauth_key_enabled(env, el, SCTLR_EnIA)) {
221
+ return x;
222
+ }
223
+ pauth_check_trap(env, el, GETPC());
224
+ return pauth_auth(env, x, y, &env->apia_key, false, 0);
225
+}
226
+
227
+uint64_t HELPER(autib)(CPUARMState *env, uint64_t x, uint64_t y)
228
+{
229
+ int el = arm_current_el(env);
230
+ if (!pauth_key_enabled(env, el, SCTLR_EnIB)) {
231
+ return x;
232
+ }
233
+ pauth_check_trap(env, el, GETPC());
234
+ return pauth_auth(env, x, y, &env->apib_key, false, 1);
235
+}
236
+
237
+uint64_t HELPER(autda)(CPUARMState *env, uint64_t x, uint64_t y)
238
+{
239
+ int el = arm_current_el(env);
240
+ if (!pauth_key_enabled(env, el, SCTLR_EnDA)) {
241
+ return x;
242
+ }
243
+ pauth_check_trap(env, el, GETPC());
244
+ return pauth_auth(env, x, y, &env->apda_key, true, 0);
245
+}
246
+
247
+uint64_t HELPER(autdb)(CPUARMState *env, uint64_t x, uint64_t y)
248
+{
249
+ int el = arm_current_el(env);
250
+ if (!pauth_key_enabled(env, el, SCTLR_EnDB)) {
251
+ return x;
252
+ }
253
+ pauth_check_trap(env, el, GETPC());
254
+ return pauth_auth(env, x, y, &env->apdb_key, true, 1);
255
+}
256
+
257
+uint64_t HELPER(xpaci)(CPUARMState *env, uint64_t a)
258
+{
259
+ return pauth_strip(env, a, false);
260
+}
261
+
262
+uint64_t HELPER(xpacd)(CPUARMState *env, uint64_t a)
263
+{
264
+ return pauth_strip(env, a, true);
265
+}
266
--
267
2.20.1
268
269
diff view generated by jsdifflib
1
As part of plumbing MemTxAttrs down to the IOMMU translate method,
1
From: Richard Henderson <richard.henderson@linaro.org>
2
add MemTxAttrs as an argument to address_space_translate_iommu().
3
2
3
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
4
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
5
Message-id: 20190108223129.5570-7-richard.henderson@linaro.org
4
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
5
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
6
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 20180521140402.23318-14-peter.maydell@linaro.org
8
---
7
---
9
exec.c | 8 +++++---
8
target/arm/translate-a64.c | 93 +++++++++++++++++++++++++++++++++-----
10
1 file changed, 5 insertions(+), 3 deletions(-)
9
1 file changed, 81 insertions(+), 12 deletions(-)
11
10
12
diff --git a/exec.c b/exec.c
11
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
13
index XXXXXXX..XXXXXXX 100644
12
index XXXXXXX..XXXXXXX 100644
14
--- a/exec.c
13
--- a/target/arm/translate-a64.c
15
+++ b/exec.c
14
+++ b/target/arm/translate-a64.c
16
@@ -XXX,XX +XXX,XX @@ address_space_translate_internal(AddressSpaceDispatch *d, hwaddr addr, hwaddr *x
15
@@ -XXX,XX +XXX,XX @@ static void handle_hint(DisasContext *s, uint32_t insn,
17
* @is_write: whether the translation operation is for write
18
* @is_mmio: whether this can be MMIO, set true if it can
19
* @target_as: the address space targeted by the IOMMU
20
+ * @attrs: transaction attributes
21
*
22
* This function is called from RCU critical section. It is the common
23
* part of flatview_do_translate and address_space_translate_cached.
24
@@ -XXX,XX +XXX,XX @@ static MemoryRegionSection address_space_translate_iommu(IOMMUMemoryRegion *iomm
25
hwaddr *page_mask_out,
26
bool is_write,
27
bool is_mmio,
28
- AddressSpace **target_as)
29
+ AddressSpace **target_as,
30
+ MemTxAttrs attrs)
31
{
32
MemoryRegionSection *section;
33
hwaddr page_mask = (hwaddr)-1;
34
@@ -XXX,XX +XXX,XX @@ static MemoryRegionSection flatview_do_translate(FlatView *fv,
35
return address_space_translate_iommu(iommu_mr, xlat,
36
plen_out, page_mask_out,
37
is_write, is_mmio,
38
- target_as);
39
+ target_as, attrs);
40
}
16
}
41
if (page_mask_out) {
17
42
/* Not behind an IOMMU, use default page size. */
18
switch (selector) {
43
@@ -XXX,XX +XXX,XX @@ static inline MemoryRegion *address_space_translate_cached(
19
- case 0: /* NOP */
44
20
- return;
45
section = address_space_translate_iommu(iommu_mr, xlat, plen,
21
- case 3: /* WFI */
46
NULL, is_write, true,
22
+ case 0b00000: /* NOP */
47
- &target_as);
23
+ break;
48
+ &target_as, attrs);
24
+ case 0b00011: /* WFI */
49
return section.mr;
25
s->base.is_jmp = DISAS_WFI;
26
- return;
27
+ break;
28
+ case 0b00001: /* YIELD */
29
/* When running in MTTCG we don't generate jumps to the yield and
30
* WFE helpers as it won't affect the scheduling of other vCPUs.
31
* If we wanted to more completely model WFE/SEV so we don't busy
32
* spin unnecessarily we would need to do something more involved.
33
*/
34
- case 1: /* YIELD */
35
if (!(tb_cflags(s->base.tb) & CF_PARALLEL)) {
36
s->base.is_jmp = DISAS_YIELD;
37
}
38
- return;
39
- case 2: /* WFE */
40
+ break;
41
+ case 0b00010: /* WFE */
42
if (!(tb_cflags(s->base.tb) & CF_PARALLEL)) {
43
s->base.is_jmp = DISAS_WFE;
44
}
45
- return;
46
- case 4: /* SEV */
47
- case 5: /* SEVL */
48
+ break;
49
+ case 0b00100: /* SEV */
50
+ case 0b00101: /* SEVL */
51
/* we treat all as NOP at least for now */
52
- return;
53
+ break;
54
+ case 0b00111: /* XPACLRI */
55
+ if (s->pauth_active) {
56
+ gen_helper_xpaci(cpu_X[30], cpu_env, cpu_X[30]);
57
+ }
58
+ break;
59
+ case 0b01000: /* PACIA1716 */
60
+ if (s->pauth_active) {
61
+ gen_helper_pacia(cpu_X[17], cpu_env, cpu_X[17], cpu_X[16]);
62
+ }
63
+ break;
64
+ case 0b01010: /* PACIB1716 */
65
+ if (s->pauth_active) {
66
+ gen_helper_pacib(cpu_X[17], cpu_env, cpu_X[17], cpu_X[16]);
67
+ }
68
+ break;
69
+ case 0b01100: /* AUTIA1716 */
70
+ if (s->pauth_active) {
71
+ gen_helper_autia(cpu_X[17], cpu_env, cpu_X[17], cpu_X[16]);
72
+ }
73
+ break;
74
+ case 0b01110: /* AUTIB1716 */
75
+ if (s->pauth_active) {
76
+ gen_helper_autib(cpu_X[17], cpu_env, cpu_X[17], cpu_X[16]);
77
+ }
78
+ break;
79
+ case 0b11000: /* PACIAZ */
80
+ if (s->pauth_active) {
81
+ gen_helper_pacia(cpu_X[30], cpu_env, cpu_X[30],
82
+ new_tmp_a64_zero(s));
83
+ }
84
+ break;
85
+ case 0b11001: /* PACIASP */
86
+ if (s->pauth_active) {
87
+ gen_helper_pacia(cpu_X[30], cpu_env, cpu_X[30], cpu_X[31]);
88
+ }
89
+ break;
90
+ case 0b11010: /* PACIBZ */
91
+ if (s->pauth_active) {
92
+ gen_helper_pacib(cpu_X[30], cpu_env, cpu_X[30],
93
+ new_tmp_a64_zero(s));
94
+ }
95
+ break;
96
+ case 0b11011: /* PACIBSP */
97
+ if (s->pauth_active) {
98
+ gen_helper_pacib(cpu_X[30], cpu_env, cpu_X[30], cpu_X[31]);
99
+ }
100
+ break;
101
+ case 0b11100: /* AUTIAZ */
102
+ if (s->pauth_active) {
103
+ gen_helper_autia(cpu_X[30], cpu_env, cpu_X[30],
104
+ new_tmp_a64_zero(s));
105
+ }
106
+ break;
107
+ case 0b11101: /* AUTIASP */
108
+ if (s->pauth_active) {
109
+ gen_helper_autia(cpu_X[30], cpu_env, cpu_X[30], cpu_X[31]);
110
+ }
111
+ break;
112
+ case 0b11110: /* AUTIBZ */
113
+ if (s->pauth_active) {
114
+ gen_helper_autib(cpu_X[30], cpu_env, cpu_X[30],
115
+ new_tmp_a64_zero(s));
116
+ }
117
+ break;
118
+ case 0b11111: /* AUTIBSP */
119
+ if (s->pauth_active) {
120
+ gen_helper_autib(cpu_X[30], cpu_env, cpu_X[30], cpu_X[31]);
121
+ }
122
+ break;
123
default:
124
/* default specified as NOP equivalent */
125
- return;
126
+ break;
127
}
50
}
128
}
51
129
52
--
130
--
53
2.17.1
131
2.20.1
54
132
55
133
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Now properly signals unallocated for REV64 with SF=0.
4
Allows for the opcode2 field to be decoded shortly.
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20190108223129.5570-8-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/translate-a64.c | 31 ++++++++++++++++++++++---------
12
1 file changed, 22 insertions(+), 9 deletions(-)
13
14
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
15
index XXXXXXX..XXXXXXX 100644
16
--- a/target/arm/translate-a64.c
17
+++ b/target/arm/translate-a64.c
18
@@ -XXX,XX +XXX,XX @@ static void handle_rev16(DisasContext *s, unsigned int sf,
19
*/
20
static void disas_data_proc_1src(DisasContext *s, uint32_t insn)
21
{
22
- unsigned int sf, opcode, rn, rd;
23
+ unsigned int sf, opcode, opcode2, rn, rd;
24
25
- if (extract32(insn, 29, 1) || extract32(insn, 16, 5)) {
26
+ if (extract32(insn, 29, 1)) {
27
unallocated_encoding(s);
28
return;
29
}
30
31
sf = extract32(insn, 31, 1);
32
opcode = extract32(insn, 10, 6);
33
+ opcode2 = extract32(insn, 16, 5);
34
rn = extract32(insn, 5, 5);
35
rd = extract32(insn, 0, 5);
36
37
- switch (opcode) {
38
- case 0: /* RBIT */
39
+#define MAP(SF, O2, O1) ((SF) | (O1 << 1) | (O2 << 7))
40
+
41
+ switch (MAP(sf, opcode2, opcode)) {
42
+ case MAP(0, 0x00, 0x00): /* RBIT */
43
+ case MAP(1, 0x00, 0x00):
44
handle_rbit(s, sf, rn, rd);
45
break;
46
- case 1: /* REV16 */
47
+ case MAP(0, 0x00, 0x01): /* REV16 */
48
+ case MAP(1, 0x00, 0x01):
49
handle_rev16(s, sf, rn, rd);
50
break;
51
- case 2: /* REV32 */
52
+ case MAP(0, 0x00, 0x02): /* REV/REV32 */
53
+ case MAP(1, 0x00, 0x02):
54
handle_rev32(s, sf, rn, rd);
55
break;
56
- case 3: /* REV64 */
57
+ case MAP(1, 0x00, 0x03): /* REV64 */
58
handle_rev64(s, sf, rn, rd);
59
break;
60
- case 4: /* CLZ */
61
+ case MAP(0, 0x00, 0x04): /* CLZ */
62
+ case MAP(1, 0x00, 0x04):
63
handle_clz(s, sf, rn, rd);
64
break;
65
- case 5: /* CLS */
66
+ case MAP(0, 0x00, 0x05): /* CLS */
67
+ case MAP(1, 0x00, 0x05):
68
handle_cls(s, sf, rn, rd);
69
break;
70
+ default:
71
+ unallocated_encoding(s);
72
+ break;
73
}
74
+
75
+#undef MAP
76
}
77
78
static void handle_div(DisasContext *s, bool is_signed, unsigned int sf,
79
--
80
2.20.1
81
82
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
4
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
5
Message-id: 20190108223129.5570-9-richard.henderson@linaro.org
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
---
8
target/arm/translate-a64.c | 146 +++++++++++++++++++++++++++++++++++++
9
1 file changed, 146 insertions(+)
10
11
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
12
index XXXXXXX..XXXXXXX 100644
13
--- a/target/arm/translate-a64.c
14
+++ b/target/arm/translate-a64.c
15
@@ -XXX,XX +XXX,XX @@ static void handle_rev16(DisasContext *s, unsigned int sf,
16
static void disas_data_proc_1src(DisasContext *s, uint32_t insn)
17
{
18
unsigned int sf, opcode, opcode2, rn, rd;
19
+ TCGv_i64 tcg_rd;
20
21
if (extract32(insn, 29, 1)) {
22
unallocated_encoding(s);
23
@@ -XXX,XX +XXX,XX @@ static void disas_data_proc_1src(DisasContext *s, uint32_t insn)
24
case MAP(1, 0x00, 0x05):
25
handle_cls(s, sf, rn, rd);
26
break;
27
+ case MAP(1, 0x01, 0x00): /* PACIA */
28
+ if (s->pauth_active) {
29
+ tcg_rd = cpu_reg(s, rd);
30
+ gen_helper_pacia(tcg_rd, cpu_env, tcg_rd, cpu_reg_sp(s, rn));
31
+ } else if (!dc_isar_feature(aa64_pauth, s)) {
32
+ goto do_unallocated;
33
+ }
34
+ break;
35
+ case MAP(1, 0x01, 0x01): /* PACIB */
36
+ if (s->pauth_active) {
37
+ tcg_rd = cpu_reg(s, rd);
38
+ gen_helper_pacib(tcg_rd, cpu_env, tcg_rd, cpu_reg_sp(s, rn));
39
+ } else if (!dc_isar_feature(aa64_pauth, s)) {
40
+ goto do_unallocated;
41
+ }
42
+ break;
43
+ case MAP(1, 0x01, 0x02): /* PACDA */
44
+ if (s->pauth_active) {
45
+ tcg_rd = cpu_reg(s, rd);
46
+ gen_helper_pacda(tcg_rd, cpu_env, tcg_rd, cpu_reg_sp(s, rn));
47
+ } else if (!dc_isar_feature(aa64_pauth, s)) {
48
+ goto do_unallocated;
49
+ }
50
+ break;
51
+ case MAP(1, 0x01, 0x03): /* PACDB */
52
+ if (s->pauth_active) {
53
+ tcg_rd = cpu_reg(s, rd);
54
+ gen_helper_pacdb(tcg_rd, cpu_env, tcg_rd, cpu_reg_sp(s, rn));
55
+ } else if (!dc_isar_feature(aa64_pauth, s)) {
56
+ goto do_unallocated;
57
+ }
58
+ break;
59
+ case MAP(1, 0x01, 0x04): /* AUTIA */
60
+ if (s->pauth_active) {
61
+ tcg_rd = cpu_reg(s, rd);
62
+ gen_helper_autia(tcg_rd, cpu_env, tcg_rd, cpu_reg_sp(s, rn));
63
+ } else if (!dc_isar_feature(aa64_pauth, s)) {
64
+ goto do_unallocated;
65
+ }
66
+ break;
67
+ case MAP(1, 0x01, 0x05): /* AUTIB */
68
+ if (s->pauth_active) {
69
+ tcg_rd = cpu_reg(s, rd);
70
+ gen_helper_autib(tcg_rd, cpu_env, tcg_rd, cpu_reg_sp(s, rn));
71
+ } else if (!dc_isar_feature(aa64_pauth, s)) {
72
+ goto do_unallocated;
73
+ }
74
+ break;
75
+ case MAP(1, 0x01, 0x06): /* AUTDA */
76
+ if (s->pauth_active) {
77
+ tcg_rd = cpu_reg(s, rd);
78
+ gen_helper_autda(tcg_rd, cpu_env, tcg_rd, cpu_reg_sp(s, rn));
79
+ } else if (!dc_isar_feature(aa64_pauth, s)) {
80
+ goto do_unallocated;
81
+ }
82
+ break;
83
+ case MAP(1, 0x01, 0x07): /* AUTDB */
84
+ if (s->pauth_active) {
85
+ tcg_rd = cpu_reg(s, rd);
86
+ gen_helper_autdb(tcg_rd, cpu_env, tcg_rd, cpu_reg_sp(s, rn));
87
+ } else if (!dc_isar_feature(aa64_pauth, s)) {
88
+ goto do_unallocated;
89
+ }
90
+ break;
91
+ case MAP(1, 0x01, 0x08): /* PACIZA */
92
+ if (!dc_isar_feature(aa64_pauth, s) || rn != 31) {
93
+ goto do_unallocated;
94
+ } else if (s->pauth_active) {
95
+ tcg_rd = cpu_reg(s, rd);
96
+ gen_helper_pacia(tcg_rd, cpu_env, tcg_rd, new_tmp_a64_zero(s));
97
+ }
98
+ break;
99
+ case MAP(1, 0x01, 0x09): /* PACIZB */
100
+ if (!dc_isar_feature(aa64_pauth, s) || rn != 31) {
101
+ goto do_unallocated;
102
+ } else if (s->pauth_active) {
103
+ tcg_rd = cpu_reg(s, rd);
104
+ gen_helper_pacib(tcg_rd, cpu_env, tcg_rd, new_tmp_a64_zero(s));
105
+ }
106
+ break;
107
+ case MAP(1, 0x01, 0x0a): /* PACDZA */
108
+ if (!dc_isar_feature(aa64_pauth, s) || rn != 31) {
109
+ goto do_unallocated;
110
+ } else if (s->pauth_active) {
111
+ tcg_rd = cpu_reg(s, rd);
112
+ gen_helper_pacda(tcg_rd, cpu_env, tcg_rd, new_tmp_a64_zero(s));
113
+ }
114
+ break;
115
+ case MAP(1, 0x01, 0x0b): /* PACDZB */
116
+ if (!dc_isar_feature(aa64_pauth, s) || rn != 31) {
117
+ goto do_unallocated;
118
+ } else if (s->pauth_active) {
119
+ tcg_rd = cpu_reg(s, rd);
120
+ gen_helper_pacdb(tcg_rd, cpu_env, tcg_rd, new_tmp_a64_zero(s));
121
+ }
122
+ break;
123
+ case MAP(1, 0x01, 0x0c): /* AUTIZA */
124
+ if (!dc_isar_feature(aa64_pauth, s) || rn != 31) {
125
+ goto do_unallocated;
126
+ } else if (s->pauth_active) {
127
+ tcg_rd = cpu_reg(s, rd);
128
+ gen_helper_autia(tcg_rd, cpu_env, tcg_rd, new_tmp_a64_zero(s));
129
+ }
130
+ break;
131
+ case MAP(1, 0x01, 0x0d): /* AUTIZB */
132
+ if (!dc_isar_feature(aa64_pauth, s) || rn != 31) {
133
+ goto do_unallocated;
134
+ } else if (s->pauth_active) {
135
+ tcg_rd = cpu_reg(s, rd);
136
+ gen_helper_autib(tcg_rd, cpu_env, tcg_rd, new_tmp_a64_zero(s));
137
+ }
138
+ break;
139
+ case MAP(1, 0x01, 0x0e): /* AUTDZA */
140
+ if (!dc_isar_feature(aa64_pauth, s) || rn != 31) {
141
+ goto do_unallocated;
142
+ } else if (s->pauth_active) {
143
+ tcg_rd = cpu_reg(s, rd);
144
+ gen_helper_autda(tcg_rd, cpu_env, tcg_rd, new_tmp_a64_zero(s));
145
+ }
146
+ break;
147
+ case MAP(1, 0x01, 0x0f): /* AUTDZB */
148
+ if (!dc_isar_feature(aa64_pauth, s) || rn != 31) {
149
+ goto do_unallocated;
150
+ } else if (s->pauth_active) {
151
+ tcg_rd = cpu_reg(s, rd);
152
+ gen_helper_autdb(tcg_rd, cpu_env, tcg_rd, new_tmp_a64_zero(s));
153
+ }
154
+ break;
155
+ case MAP(1, 0x01, 0x10): /* XPACI */
156
+ if (!dc_isar_feature(aa64_pauth, s) || rn != 31) {
157
+ goto do_unallocated;
158
+ } else if (s->pauth_active) {
159
+ tcg_rd = cpu_reg(s, rd);
160
+ gen_helper_xpaci(tcg_rd, cpu_env, tcg_rd);
161
+ }
162
+ break;
163
+ case MAP(1, 0x01, 0x11): /* XPACD */
164
+ if (!dc_isar_feature(aa64_pauth, s) || rn != 31) {
165
+ goto do_unallocated;
166
+ } else if (s->pauth_active) {
167
+ tcg_rd = cpu_reg(s, rd);
168
+ gen_helper_xpacd(tcg_rd, cpu_env, tcg_rd);
169
+ }
170
+ break;
171
default:
172
+ do_unallocated:
173
unallocated_encoding(s);
174
break;
175
}
176
--
177
2.20.1
178
179
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
4
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
5
Message-id: 20190108223129.5570-10-richard.henderson@linaro.org
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
---
8
target/arm/translate-a64.c | 8 ++++++++
9
1 file changed, 8 insertions(+)
10
11
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
12
index XXXXXXX..XXXXXXX 100644
13
--- a/target/arm/translate-a64.c
14
+++ b/target/arm/translate-a64.c
15
@@ -XXX,XX +XXX,XX @@ static void disas_data_proc_2src(DisasContext *s, uint32_t insn)
16
case 11: /* RORV */
17
handle_shift_reg(s, A64_SHIFT_TYPE_ROR, sf, rm, rn, rd);
18
break;
19
+ case 12: /* PACGA */
20
+ if (sf == 0 || !dc_isar_feature(aa64_pauth, s)) {
21
+ goto do_unallocated;
22
+ }
23
+ gen_helper_pacga(cpu_reg(s, rd), cpu_env,
24
+ cpu_reg(s, rn), cpu_reg_sp(s, rm));
25
+ break;
26
case 16:
27
case 17:
28
case 18:
29
@@ -XXX,XX +XXX,XX @@ static void disas_data_proc_2src(DisasContext *s, uint32_t insn)
30
break;
31
}
32
default:
33
+ do_unallocated:
34
unallocated_encoding(s);
35
break;
36
}
37
--
38
2.20.1
39
40
diff view generated by jsdifflib
New patch
1
1
From: Richard Henderson <richard.henderson@linaro.org>
2
3
This function is only used by AArch64. Code movement only.
4
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 20190108223129.5570-11-richard.henderson@linaro.org
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
---
10
target/arm/helper-a64.h | 2 +
11
target/arm/helper.h | 1 -
12
target/arm/helper-a64.c | 155 ++++++++++++++++++++++++++++++++++++++++
13
target/arm/op_helper.c | 155 ----------------------------------------
14
4 files changed, 157 insertions(+), 156 deletions(-)
15
16
diff --git a/target/arm/helper-a64.h b/target/arm/helper-a64.h
17
index XXXXXXX..XXXXXXX 100644
18
--- a/target/arm/helper-a64.h
19
+++ b/target/arm/helper-a64.h
20
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_2(advsimd_f16tosinth, i32, f16, ptr)
21
DEF_HELPER_2(advsimd_f16touinth, i32, f16, ptr)
22
DEF_HELPER_2(sqrt_f16, f16, f16, ptr)
23
24
+DEF_HELPER_1(exception_return, void, env)
25
+
26
DEF_HELPER_FLAGS_3(pacia, TCG_CALL_NO_WG, i64, env, i64, i64)
27
DEF_HELPER_FLAGS_3(pacib, TCG_CALL_NO_WG, i64, env, i64, i64)
28
DEF_HELPER_FLAGS_3(pacda, TCG_CALL_NO_WG, i64, env, i64, i64)
29
diff --git a/target/arm/helper.h b/target/arm/helper.h
30
index XXXXXXX..XXXXXXX 100644
31
--- a/target/arm/helper.h
32
+++ b/target/arm/helper.h
33
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_2(get_cp_reg64, i64, env, ptr)
34
35
DEF_HELPER_3(msr_i_pstate, void, env, i32, i32)
36
DEF_HELPER_1(clear_pstate_ss, void, env)
37
-DEF_HELPER_1(exception_return, void, env)
38
39
DEF_HELPER_2(get_r13_banked, i32, env, i32)
40
DEF_HELPER_3(set_r13_banked, void, env, i32, i32)
41
diff --git a/target/arm/helper-a64.c b/target/arm/helper-a64.c
42
index XXXXXXX..XXXXXXX 100644
43
--- a/target/arm/helper-a64.c
44
+++ b/target/arm/helper-a64.c
45
@@ -XXX,XX +XXX,XX @@ uint32_t HELPER(advsimd_f16touinth)(uint32_t a, void *fpstp)
46
return float16_to_uint16(a, fpst);
47
}
48
49
+static int el_from_spsr(uint32_t spsr)
50
+{
51
+ /* Return the exception level that this SPSR is requesting a return to,
52
+ * or -1 if it is invalid (an illegal return)
53
+ */
54
+ if (spsr & PSTATE_nRW) {
55
+ switch (spsr & CPSR_M) {
56
+ case ARM_CPU_MODE_USR:
57
+ return 0;
58
+ case ARM_CPU_MODE_HYP:
59
+ return 2;
60
+ case ARM_CPU_MODE_FIQ:
61
+ case ARM_CPU_MODE_IRQ:
62
+ case ARM_CPU_MODE_SVC:
63
+ case ARM_CPU_MODE_ABT:
64
+ case ARM_CPU_MODE_UND:
65
+ case ARM_CPU_MODE_SYS:
66
+ return 1;
67
+ case ARM_CPU_MODE_MON:
68
+ /* Returning to Mon from AArch64 is never possible,
69
+ * so this is an illegal return.
70
+ */
71
+ default:
72
+ return -1;
73
+ }
74
+ } else {
75
+ if (extract32(spsr, 1, 1)) {
76
+ /* Return with reserved M[1] bit set */
77
+ return -1;
78
+ }
79
+ if (extract32(spsr, 0, 4) == 1) {
80
+ /* return to EL0 with M[0] bit set */
81
+ return -1;
82
+ }
83
+ return extract32(spsr, 2, 2);
84
+ }
85
+}
86
+
87
+void HELPER(exception_return)(CPUARMState *env)
88
+{
89
+ int cur_el = arm_current_el(env);
90
+ unsigned int spsr_idx = aarch64_banked_spsr_index(cur_el);
91
+ uint32_t spsr = env->banked_spsr[spsr_idx];
92
+ int new_el;
93
+ bool return_to_aa64 = (spsr & PSTATE_nRW) == 0;
94
+
95
+ aarch64_save_sp(env, cur_el);
96
+
97
+ arm_clear_exclusive(env);
98
+
99
+ /* We must squash the PSTATE.SS bit to zero unless both of the
100
+ * following hold:
101
+ * 1. debug exceptions are currently disabled
102
+ * 2. singlestep will be active in the EL we return to
103
+ * We check 1 here and 2 after we've done the pstate/cpsr write() to
104
+ * transition to the EL we're going to.
105
+ */
106
+ if (arm_generate_debug_exceptions(env)) {
107
+ spsr &= ~PSTATE_SS;
108
+ }
109
+
110
+ new_el = el_from_spsr(spsr);
111
+ if (new_el == -1) {
112
+ goto illegal_return;
113
+ }
114
+ if (new_el > cur_el
115
+ || (new_el == 2 && !arm_feature(env, ARM_FEATURE_EL2))) {
116
+ /* Disallow return to an EL which is unimplemented or higher
117
+ * than the current one.
118
+ */
119
+ goto illegal_return;
120
+ }
121
+
122
+ if (new_el != 0 && arm_el_is_aa64(env, new_el) != return_to_aa64) {
123
+ /* Return to an EL which is configured for a different register width */
124
+ goto illegal_return;
125
+ }
126
+
127
+ if (new_el == 2 && arm_is_secure_below_el3(env)) {
128
+ /* Return to the non-existent secure-EL2 */
129
+ goto illegal_return;
130
+ }
131
+
132
+ if (new_el == 1 && (arm_hcr_el2_eff(env) & HCR_TGE)) {
133
+ goto illegal_return;
134
+ }
135
+
136
+ qemu_mutex_lock_iothread();
137
+ arm_call_pre_el_change_hook(arm_env_get_cpu(env));
138
+ qemu_mutex_unlock_iothread();
139
+
140
+ if (!return_to_aa64) {
141
+ env->aarch64 = 0;
142
+ /* We do a raw CPSR write because aarch64_sync_64_to_32()
143
+ * will sort the register banks out for us, and we've already
144
+ * caught all the bad-mode cases in el_from_spsr().
145
+ */
146
+ cpsr_write(env, spsr, ~0, CPSRWriteRaw);
147
+ if (!arm_singlestep_active(env)) {
148
+ env->uncached_cpsr &= ~PSTATE_SS;
149
+ }
150
+ aarch64_sync_64_to_32(env);
151
+
152
+ if (spsr & CPSR_T) {
153
+ env->regs[15] = env->elr_el[cur_el] & ~0x1;
154
+ } else {
155
+ env->regs[15] = env->elr_el[cur_el] & ~0x3;
156
+ }
157
+ qemu_log_mask(CPU_LOG_INT, "Exception return from AArch64 EL%d to "
158
+ "AArch32 EL%d PC 0x%" PRIx32 "\n",
159
+ cur_el, new_el, env->regs[15]);
160
+ } else {
161
+ env->aarch64 = 1;
162
+ pstate_write(env, spsr);
163
+ if (!arm_singlestep_active(env)) {
164
+ env->pstate &= ~PSTATE_SS;
165
+ }
166
+ aarch64_restore_sp(env, new_el);
167
+ env->pc = env->elr_el[cur_el];
168
+ qemu_log_mask(CPU_LOG_INT, "Exception return from AArch64 EL%d to "
169
+ "AArch64 EL%d PC 0x%" PRIx64 "\n",
170
+ cur_el, new_el, env->pc);
171
+ }
172
+ /*
173
+ * Note that cur_el can never be 0. If new_el is 0, then
174
+ * el0_a64 is return_to_aa64, else el0_a64 is ignored.
175
+ */
176
+ aarch64_sve_change_el(env, cur_el, new_el, return_to_aa64);
177
+
178
+ qemu_mutex_lock_iothread();
179
+ arm_call_el_change_hook(arm_env_get_cpu(env));
180
+ qemu_mutex_unlock_iothread();
181
+
182
+ return;
183
+
184
+illegal_return:
185
+ /* Illegal return events of various kinds have architecturally
186
+ * mandated behaviour:
187
+ * restore NZCV and DAIF from SPSR_ELx
188
+ * set PSTATE.IL
189
+ * restore PC from ELR_ELx
190
+ * no change to exception level, execution state or stack pointer
191
+ */
192
+ env->pstate |= PSTATE_IL;
193
+ env->pc = env->elr_el[cur_el];
194
+ spsr &= PSTATE_NZCV | PSTATE_DAIF;
195
+ spsr |= pstate_read(env) & ~(PSTATE_NZCV | PSTATE_DAIF);
196
+ pstate_write(env, spsr);
197
+ if (!arm_singlestep_active(env)) {
198
+ env->pstate &= ~PSTATE_SS;
199
+ }
200
+ qemu_log_mask(LOG_GUEST_ERROR, "Illegal exception return at EL%d: "
201
+ "resuming execution at 0x%" PRIx64 "\n", cur_el, env->pc);
202
+}
203
+
204
/*
205
* Square Root and Reciprocal square root
206
*/
207
diff --git a/target/arm/op_helper.c b/target/arm/op_helper.c
208
index XXXXXXX..XXXXXXX 100644
209
--- a/target/arm/op_helper.c
210
+++ b/target/arm/op_helper.c
211
@@ -XXX,XX +XXX,XX @@ void HELPER(pre_smc)(CPUARMState *env, uint32_t syndrome)
212
}
213
}
214
215
-static int el_from_spsr(uint32_t spsr)
216
-{
217
- /* Return the exception level that this SPSR is requesting a return to,
218
- * or -1 if it is invalid (an illegal return)
219
- */
220
- if (spsr & PSTATE_nRW) {
221
- switch (spsr & CPSR_M) {
222
- case ARM_CPU_MODE_USR:
223
- return 0;
224
- case ARM_CPU_MODE_HYP:
225
- return 2;
226
- case ARM_CPU_MODE_FIQ:
227
- case ARM_CPU_MODE_IRQ:
228
- case ARM_CPU_MODE_SVC:
229
- case ARM_CPU_MODE_ABT:
230
- case ARM_CPU_MODE_UND:
231
- case ARM_CPU_MODE_SYS:
232
- return 1;
233
- case ARM_CPU_MODE_MON:
234
- /* Returning to Mon from AArch64 is never possible,
235
- * so this is an illegal return.
236
- */
237
- default:
238
- return -1;
239
- }
240
- } else {
241
- if (extract32(spsr, 1, 1)) {
242
- /* Return with reserved M[1] bit set */
243
- return -1;
244
- }
245
- if (extract32(spsr, 0, 4) == 1) {
246
- /* return to EL0 with M[0] bit set */
247
- return -1;
248
- }
249
- return extract32(spsr, 2, 2);
250
- }
251
-}
252
-
253
-void HELPER(exception_return)(CPUARMState *env)
254
-{
255
- int cur_el = arm_current_el(env);
256
- unsigned int spsr_idx = aarch64_banked_spsr_index(cur_el);
257
- uint32_t spsr = env->banked_spsr[spsr_idx];
258
- int new_el;
259
- bool return_to_aa64 = (spsr & PSTATE_nRW) == 0;
260
-
261
- aarch64_save_sp(env, cur_el);
262
-
263
- arm_clear_exclusive(env);
264
-
265
- /* We must squash the PSTATE.SS bit to zero unless both of the
266
- * following hold:
267
- * 1. debug exceptions are currently disabled
268
- * 2. singlestep will be active in the EL we return to
269
- * We check 1 here and 2 after we've done the pstate/cpsr write() to
270
- * transition to the EL we're going to.
271
- */
272
- if (arm_generate_debug_exceptions(env)) {
273
- spsr &= ~PSTATE_SS;
274
- }
275
-
276
- new_el = el_from_spsr(spsr);
277
- if (new_el == -1) {
278
- goto illegal_return;
279
- }
280
- if (new_el > cur_el
281
- || (new_el == 2 && !arm_feature(env, ARM_FEATURE_EL2))) {
282
- /* Disallow return to an EL which is unimplemented or higher
283
- * than the current one.
284
- */
285
- goto illegal_return;
286
- }
287
-
288
- if (new_el != 0 && arm_el_is_aa64(env, new_el) != return_to_aa64) {
289
- /* Return to an EL which is configured for a different register width */
290
- goto illegal_return;
291
- }
292
-
293
- if (new_el == 2 && arm_is_secure_below_el3(env)) {
294
- /* Return to the non-existent secure-EL2 */
295
- goto illegal_return;
296
- }
297
-
298
- if (new_el == 1 && (arm_hcr_el2_eff(env) & HCR_TGE)) {
299
- goto illegal_return;
300
- }
301
-
302
- qemu_mutex_lock_iothread();
303
- arm_call_pre_el_change_hook(arm_env_get_cpu(env));
304
- qemu_mutex_unlock_iothread();
305
-
306
- if (!return_to_aa64) {
307
- env->aarch64 = 0;
308
- /* We do a raw CPSR write because aarch64_sync_64_to_32()
309
- * will sort the register banks out for us, and we've already
310
- * caught all the bad-mode cases in el_from_spsr().
311
- */
312
- cpsr_write(env, spsr, ~0, CPSRWriteRaw);
313
- if (!arm_singlestep_active(env)) {
314
- env->uncached_cpsr &= ~PSTATE_SS;
315
- }
316
- aarch64_sync_64_to_32(env);
317
-
318
- if (spsr & CPSR_T) {
319
- env->regs[15] = env->elr_el[cur_el] & ~0x1;
320
- } else {
321
- env->regs[15] = env->elr_el[cur_el] & ~0x3;
322
- }
323
- qemu_log_mask(CPU_LOG_INT, "Exception return from AArch64 EL%d to "
324
- "AArch32 EL%d PC 0x%" PRIx32 "\n",
325
- cur_el, new_el, env->regs[15]);
326
- } else {
327
- env->aarch64 = 1;
328
- pstate_write(env, spsr);
329
- if (!arm_singlestep_active(env)) {
330
- env->pstate &= ~PSTATE_SS;
331
- }
332
- aarch64_restore_sp(env, new_el);
333
- env->pc = env->elr_el[cur_el];
334
- qemu_log_mask(CPU_LOG_INT, "Exception return from AArch64 EL%d to "
335
- "AArch64 EL%d PC 0x%" PRIx64 "\n",
336
- cur_el, new_el, env->pc);
337
- }
338
- /*
339
- * Note that cur_el can never be 0. If new_el is 0, then
340
- * el0_a64 is return_to_aa64, else el0_a64 is ignored.
341
- */
342
- aarch64_sve_change_el(env, cur_el, new_el, return_to_aa64);
343
-
344
- qemu_mutex_lock_iothread();
345
- arm_call_el_change_hook(arm_env_get_cpu(env));
346
- qemu_mutex_unlock_iothread();
347
-
348
- return;
349
-
350
-illegal_return:
351
- /* Illegal return events of various kinds have architecturally
352
- * mandated behaviour:
353
- * restore NZCV and DAIF from SPSR_ELx
354
- * set PSTATE.IL
355
- * restore PC from ELR_ELx
356
- * no change to exception level, execution state or stack pointer
357
- */
358
- env->pstate |= PSTATE_IL;
359
- env->pc = env->elr_el[cur_el];
360
- spsr &= PSTATE_NZCV | PSTATE_DAIF;
361
- spsr |= pstate_read(env) & ~(PSTATE_NZCV | PSTATE_DAIF);
362
- pstate_write(env, spsr);
363
- if (!arm_singlestep_active(env)) {
364
- env->pstate &= ~PSTATE_SS;
365
- }
366
- qemu_log_mask(LOG_GUEST_ERROR, "Illegal exception return at EL%d: "
367
- "resuming execution at 0x%" PRIx64 "\n", cur_el, env->pc);
368
-}
369
-
370
/* Return true if the linked breakpoint entry lbn passes its checks */
371
static bool linked_bp_matches(ARMCPU *cpu, int lbn)
372
{
373
--
374
2.20.1
375
376
diff view generated by jsdifflib
1
The FRECPX instructions should (like most other floating point operations)
1
From: Richard Henderson <richard.henderson@linaro.org>
2
honour the FPCR.FZ bit which specifies whether input denormals should
3
be flushed to zero (or FZ16 for the half-precision version).
4
We forgot to implement this, which doesn't affect the results (since
5
the calculation doesn't actually care about the mantissa bits) but did
6
mean we were failing to set the FPSR.IDC bit.
7
2
3
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
4
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
5
Message-id: 20190108223129.5570-12-richard.henderson@linaro.org
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
10
Message-id: 20180521172712.19930-1-peter.maydell@linaro.org
11
---
7
---
12
target/arm/helper-a64.c | 6 ++++++
8
target/arm/helper-a64.h | 2 +-
13
1 file changed, 6 insertions(+)
9
target/arm/helper-a64.c | 10 +++++-----
10
target/arm/translate-a64.c | 7 ++++++-
11
3 files changed, 12 insertions(+), 7 deletions(-)
14
12
13
diff --git a/target/arm/helper-a64.h b/target/arm/helper-a64.h
14
index XXXXXXX..XXXXXXX 100644
15
--- a/target/arm/helper-a64.h
16
+++ b/target/arm/helper-a64.h
17
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_2(advsimd_f16tosinth, i32, f16, ptr)
18
DEF_HELPER_2(advsimd_f16touinth, i32, f16, ptr)
19
DEF_HELPER_2(sqrt_f16, f16, f16, ptr)
20
21
-DEF_HELPER_1(exception_return, void, env)
22
+DEF_HELPER_2(exception_return, void, env, i64)
23
24
DEF_HELPER_FLAGS_3(pacia, TCG_CALL_NO_WG, i64, env, i64, i64)
25
DEF_HELPER_FLAGS_3(pacib, TCG_CALL_NO_WG, i64, env, i64, i64)
15
diff --git a/target/arm/helper-a64.c b/target/arm/helper-a64.c
26
diff --git a/target/arm/helper-a64.c b/target/arm/helper-a64.c
16
index XXXXXXX..XXXXXXX 100644
27
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/helper-a64.c
28
--- a/target/arm/helper-a64.c
18
+++ b/target/arm/helper-a64.c
29
+++ b/target/arm/helper-a64.c
19
@@ -XXX,XX +XXX,XX @@ float16 HELPER(frecpx_f16)(float16 a, void *fpstp)
30
@@ -XXX,XX +XXX,XX @@ static int el_from_spsr(uint32_t spsr)
20
return nan;
21
}
31
}
22
32
}
23
+ a = float16_squash_input_denormal(a, fpst);
33
24
+
34
-void HELPER(exception_return)(CPUARMState *env)
25
val16 = float16_val(a);
35
+void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc)
26
sbit = 0x8000 & val16;
36
{
27
exp = extract32(val16, 10, 5);
37
int cur_el = arm_current_el(env);
28
@@ -XXX,XX +XXX,XX @@ float32 HELPER(frecpx_f32)(float32 a, void *fpstp)
38
unsigned int spsr_idx = aarch64_banked_spsr_index(cur_el);
29
return nan;
39
@@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env)
30
}
40
aarch64_sync_64_to_32(env);
31
41
32
+ a = float32_squash_input_denormal(a, fpst);
42
if (spsr & CPSR_T) {
33
+
43
- env->regs[15] = env->elr_el[cur_el] & ~0x1;
34
val32 = float32_val(a);
44
+ env->regs[15] = new_pc & ~0x1;
35
sbit = 0x80000000ULL & val32;
45
} else {
36
exp = extract32(val32, 23, 8);
46
- env->regs[15] = env->elr_el[cur_el] & ~0x3;
37
@@ -XXX,XX +XXX,XX @@ float64 HELPER(frecpx_f64)(float64 a, void *fpstp)
47
+ env->regs[15] = new_pc & ~0x3;
38
return nan;
48
}
39
}
49
qemu_log_mask(CPU_LOG_INT, "Exception return from AArch64 EL%d to "
40
50
"AArch32 EL%d PC 0x%" PRIx32 "\n",
41
+ a = float64_squash_input_denormal(a, fpst);
51
@@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env)
42
+
52
env->pstate &= ~PSTATE_SS;
43
val64 = float64_val(a);
53
}
44
sbit = 0x8000000000000000ULL & val64;
54
aarch64_restore_sp(env, new_el);
45
exp = extract64(float64_val(a), 52, 11);
55
- env->pc = env->elr_el[cur_el];
56
+ env->pc = new_pc;
57
qemu_log_mask(CPU_LOG_INT, "Exception return from AArch64 EL%d to "
58
"AArch64 EL%d PC 0x%" PRIx64 "\n",
59
cur_el, new_el, env->pc);
60
@@ -XXX,XX +XXX,XX @@ illegal_return:
61
* no change to exception level, execution state or stack pointer
62
*/
63
env->pstate |= PSTATE_IL;
64
- env->pc = env->elr_el[cur_el];
65
+ env->pc = new_pc;
66
spsr &= PSTATE_NZCV | PSTATE_DAIF;
67
spsr |= pstate_read(env) & ~(PSTATE_NZCV | PSTATE_DAIF);
68
pstate_write(env, spsr);
69
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
70
index XXXXXXX..XXXXXXX 100644
71
--- a/target/arm/translate-a64.c
72
+++ b/target/arm/translate-a64.c
73
@@ -XXX,XX +XXX,XX @@ static void disas_exc(DisasContext *s, uint32_t insn)
74
static void disas_uncond_b_reg(DisasContext *s, uint32_t insn)
75
{
76
unsigned int opc, op2, op3, rn, op4;
77
+ TCGv_i64 dst;
78
79
opc = extract32(insn, 21, 4);
80
op2 = extract32(insn, 16, 5);
81
@@ -XXX,XX +XXX,XX @@ static void disas_uncond_b_reg(DisasContext *s, uint32_t insn)
82
if (tb_cflags(s->base.tb) & CF_USE_ICOUNT) {
83
gen_io_start();
84
}
85
- gen_helper_exception_return(cpu_env);
86
+ dst = tcg_temp_new_i64();
87
+ tcg_gen_ld_i64(dst, cpu_env,
88
+ offsetof(CPUARMState, elr_el[s->current_el]));
89
+ gen_helper_exception_return(cpu_env, dst);
90
+ tcg_temp_free_i64(dst);
91
if (tb_cflags(s->base.tb) & CF_USE_ICOUNT) {
92
gen_io_end();
93
}
46
--
94
--
47
2.17.1
95
2.20.1
48
96
49
97
diff view generated by jsdifflib
1
As part of plumbing MemTxAttrs down to the IOMMU translate method,
1
From: Richard Henderson <richard.henderson@linaro.org>
2
add MemTxAttrs as an argument to address_space_map().
3
Its callers either have an attrs value to hand, or don't care
4
and can use MEMTXATTRS_UNSPECIFIED.
5
2
3
This will enable PAuth decode in a subsequent patch.
4
5
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Message-id: 20190108223129.5570-13-richard.henderson@linaro.org
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20180521140402.23318-5-peter.maydell@linaro.org
10
---
9
---
11
include/exec/memory.h | 3 ++-
10
target/arm/translate-a64.c | 47 +++++++++++++++++++++++++++++---------
12
include/sysemu/dma.h | 3 ++-
11
1 file changed, 36 insertions(+), 11 deletions(-)
13
exec.c | 6 ++++--
14
target/ppc/mmu-hash64.c | 3 ++-
15
4 files changed, 10 insertions(+), 5 deletions(-)
16
12
17
diff --git a/include/exec/memory.h b/include/exec/memory.h
13
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
18
index XXXXXXX..XXXXXXX 100644
14
index XXXXXXX..XXXXXXX 100644
19
--- a/include/exec/memory.h
15
--- a/target/arm/translate-a64.c
20
+++ b/include/exec/memory.h
16
+++ b/target/arm/translate-a64.c
21
@@ -XXX,XX +XXX,XX @@ bool address_space_access_valid(AddressSpace *as, hwaddr addr, int len, bool is_
17
@@ -XXX,XX +XXX,XX @@ static void disas_uncond_b_reg(DisasContext *s, uint32_t insn)
22
* @addr: address within that address space
18
rn = extract32(insn, 5, 5);
23
* @plen: pointer to length of buffer; updated on return
19
op4 = extract32(insn, 0, 5);
24
* @is_write: indicates the transfer direction
20
25
+ * @attrs: memory attributes
21
- if (op4 != 0x0 || op3 != 0x0 || op2 != 0x1f) {
26
*/
22
- unallocated_encoding(s);
27
void *address_space_map(AddressSpace *as, hwaddr addr,
23
- return;
28
- hwaddr *plen, bool is_write);
24
+ if (op2 != 0x1f) {
29
+ hwaddr *plen, bool is_write, MemTxAttrs attrs);
25
+ goto do_unallocated;
30
31
/* address_space_unmap: Unmaps a memory region previously mapped by address_space_map()
32
*
33
diff --git a/include/sysemu/dma.h b/include/sysemu/dma.h
34
index XXXXXXX..XXXXXXX 100644
35
--- a/include/sysemu/dma.h
36
+++ b/include/sysemu/dma.h
37
@@ -XXX,XX +XXX,XX @@ static inline void *dma_memory_map(AddressSpace *as,
38
hwaddr xlen = *len;
39
void *p;
40
41
- p = address_space_map(as, addr, &xlen, dir == DMA_DIRECTION_FROM_DEVICE);
42
+ p = address_space_map(as, addr, &xlen, dir == DMA_DIRECTION_FROM_DEVICE,
43
+ MEMTXATTRS_UNSPECIFIED);
44
*len = xlen;
45
return p;
46
}
47
diff --git a/exec.c b/exec.c
48
index XXXXXXX..XXXXXXX 100644
49
--- a/exec.c
50
+++ b/exec.c
51
@@ -XXX,XX +XXX,XX @@ flatview_extend_translation(FlatView *fv, hwaddr addr,
52
void *address_space_map(AddressSpace *as,
53
hwaddr addr,
54
hwaddr *plen,
55
- bool is_write)
56
+ bool is_write,
57
+ MemTxAttrs attrs)
58
{
59
hwaddr len = *plen;
60
hwaddr l, xlat;
61
@@ -XXX,XX +XXX,XX @@ void *cpu_physical_memory_map(hwaddr addr,
62
hwaddr *plen,
63
int is_write)
64
{
65
- return address_space_map(&address_space_memory, addr, plen, is_write);
66
+ return address_space_map(&address_space_memory, addr, plen, is_write,
67
+ MEMTXATTRS_UNSPECIFIED);
68
}
69
70
void cpu_physical_memory_unmap(void *buffer, hwaddr len,
71
diff --git a/target/ppc/mmu-hash64.c b/target/ppc/mmu-hash64.c
72
index XXXXXXX..XXXXXXX 100644
73
--- a/target/ppc/mmu-hash64.c
74
+++ b/target/ppc/mmu-hash64.c
75
@@ -XXX,XX +XXX,XX @@ const ppc_hash_pte64_t *ppc_hash64_map_hptes(PowerPCCPU *cpu,
76
return NULL;
77
}
26
}
78
27
79
- hptes = address_space_map(CPU(cpu)->as, base + pte_offset, &plen, false);
28
switch (opc) {
80
+ hptes = address_space_map(CPU(cpu)->as, base + pte_offset, &plen, false,
29
case 0: /* BR */
81
+ MEMTXATTRS_UNSPECIFIED);
30
case 1: /* BLR */
82
if (plen < (n * HASH_PTE_SIZE_64)) {
31
case 2: /* RET */
83
hw_error("%s: Unable to map all requested HPTEs\n", __func__);
32
- gen_a64_set_pc(s, cpu_reg(s, rn));
33
+ switch (op3) {
34
+ case 0:
35
+ if (op4 != 0) {
36
+ goto do_unallocated;
37
+ }
38
+ dst = cpu_reg(s, rn);
39
+ break;
40
+
41
+ default:
42
+ goto do_unallocated;
43
+ }
44
+
45
+ gen_a64_set_pc(s, dst);
46
/* BLR also needs to load return address */
47
if (opc == 1) {
48
tcg_gen_movi_i64(cpu_reg(s, 30), s->pc);
49
}
50
break;
51
+
52
case 4: /* ERET */
53
if (s->current_el == 0) {
54
- unallocated_encoding(s);
55
- return;
56
+ goto do_unallocated;
57
+ }
58
+ switch (op3) {
59
+ case 0:
60
+ if (op4 != 0) {
61
+ goto do_unallocated;
62
+ }
63
+ dst = tcg_temp_new_i64();
64
+ tcg_gen_ld_i64(dst, cpu_env,
65
+ offsetof(CPUARMState, elr_el[s->current_el]));
66
+ break;
67
+
68
+ default:
69
+ goto do_unallocated;
70
}
71
if (tb_cflags(s->base.tb) & CF_USE_ICOUNT) {
72
gen_io_start();
73
}
74
- dst = tcg_temp_new_i64();
75
- tcg_gen_ld_i64(dst, cpu_env,
76
- offsetof(CPUARMState, elr_el[s->current_el]));
77
+
78
gen_helper_exception_return(cpu_env, dst);
79
tcg_temp_free_i64(dst);
80
if (tb_cflags(s->base.tb) & CF_USE_ICOUNT) {
81
@@ -XXX,XX +XXX,XX @@ static void disas_uncond_b_reg(DisasContext *s, uint32_t insn)
82
/* Must exit loop to check un-masked IRQs */
83
s->base.is_jmp = DISAS_EXIT;
84
return;
85
+
86
case 5: /* DRPS */
87
- if (rn != 0x1f) {
88
- unallocated_encoding(s);
89
+ if (op3 != 0 || op4 != 0 || rn != 0x1f) {
90
+ goto do_unallocated;
91
} else {
92
unsupported_encoding(s, insn);
93
}
94
return;
95
+
96
default:
97
+ do_unallocated:
98
unallocated_encoding(s);
99
return;
84
}
100
}
85
--
101
--
86
2.17.1
102
2.20.1
87
103
88
104
diff view generated by jsdifflib
1
From: Shannon Zhao <zhaoshenglong@huawei.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
kvm_irqchip_create called by kvm_init will call kvm_init_irq_routing to
3
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
4
initialize global capability variables. If we call kvm_init_irq_routing in
4
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
5
GIC realize function, previous allocated memory will leak.
5
Message-id: 20190108223129.5570-14-richard.henderson@linaro.org
6
7
Fix this by deleting the unnecessary call.
8
9
Signed-off-by: Shannon Zhao <zhaoshenglong@huawei.com>
10
Reviewed-by: Eric Auger <eric.auger@redhat.com>
11
Message-id: 1527750994-14360-1-git-send-email-zhaoshenglong@huawei.com
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
---
7
---
14
hw/intc/arm_gic_kvm.c | 1 -
8
target/arm/translate-a64.c | 82 +++++++++++++++++++++++++++++++++++++-
15
hw/intc/arm_gicv3_kvm.c | 1 -
9
1 file changed, 81 insertions(+), 1 deletion(-)
16
2 files changed, 2 deletions(-)
17
10
18
diff --git a/hw/intc/arm_gic_kvm.c b/hw/intc/arm_gic_kvm.c
11
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
19
index XXXXXXX..XXXXXXX 100644
12
index XXXXXXX..XXXXXXX 100644
20
--- a/hw/intc/arm_gic_kvm.c
13
--- a/target/arm/translate-a64.c
21
+++ b/hw/intc/arm_gic_kvm.c
14
+++ b/target/arm/translate-a64.c
22
@@ -XXX,XX +XXX,XX @@ static void kvm_arm_gic_realize(DeviceState *dev, Error **errp)
15
@@ -XXX,XX +XXX,XX @@ static void disas_uncond_b_reg(DisasContext *s, uint32_t insn)
23
16
{
24
if (kvm_has_gsi_routing()) {
17
unsigned int opc, op2, op3, rn, op4;
25
/* set up irq routing */
18
TCGv_i64 dst;
26
- kvm_init_irq_routing(kvm_state);
19
+ TCGv_i64 modifier;
27
for (i = 0; i < s->num_irq - GIC_INTERNAL; ++i) {
20
28
kvm_irqchip_add_irq_route(kvm_state, i, 0, i);
21
opc = extract32(insn, 21, 4);
22
op2 = extract32(insn, 16, 5);
23
@@ -XXX,XX +XXX,XX @@ static void disas_uncond_b_reg(DisasContext *s, uint32_t insn)
24
case 2: /* RET */
25
switch (op3) {
26
case 0:
27
+ /* BR, BLR, RET */
28
if (op4 != 0) {
29
goto do_unallocated;
30
}
31
dst = cpu_reg(s, rn);
32
break;
33
34
+ case 2:
35
+ case 3:
36
+ if (!dc_isar_feature(aa64_pauth, s)) {
37
+ goto do_unallocated;
38
+ }
39
+ if (opc == 2) {
40
+ /* RETAA, RETAB */
41
+ if (rn != 0x1f || op4 != 0x1f) {
42
+ goto do_unallocated;
43
+ }
44
+ rn = 30;
45
+ modifier = cpu_X[31];
46
+ } else {
47
+ /* BRAAZ, BRABZ, BLRAAZ, BLRABZ */
48
+ if (op4 != 0x1f) {
49
+ goto do_unallocated;
50
+ }
51
+ modifier = new_tmp_a64_zero(s);
52
+ }
53
+ if (s->pauth_active) {
54
+ dst = new_tmp_a64(s);
55
+ if (op3 == 2) {
56
+ gen_helper_autia(dst, cpu_env, cpu_reg(s, rn), modifier);
57
+ } else {
58
+ gen_helper_autib(dst, cpu_env, cpu_reg(s, rn), modifier);
59
+ }
60
+ } else {
61
+ dst = cpu_reg(s, rn);
62
+ }
63
+ break;
64
+
65
default:
66
goto do_unallocated;
29
}
67
}
30
diff --git a/hw/intc/arm_gicv3_kvm.c b/hw/intc/arm_gicv3_kvm.c
68
@@ -XXX,XX +XXX,XX @@ static void disas_uncond_b_reg(DisasContext *s, uint32_t insn)
31
index XXXXXXX..XXXXXXX 100644
69
}
32
--- a/hw/intc/arm_gicv3_kvm.c
70
break;
33
+++ b/hw/intc/arm_gicv3_kvm.c
71
34
@@ -XXX,XX +XXX,XX @@ static void kvm_arm_gicv3_realize(DeviceState *dev, Error **errp)
72
+ case 8: /* BRAA */
35
73
+ case 9: /* BLRAA */
36
if (kvm_has_gsi_routing()) {
74
+ if (!dc_isar_feature(aa64_pauth, s)) {
37
/* set up irq routing */
75
+ goto do_unallocated;
38
- kvm_init_irq_routing(kvm_state);
76
+ }
39
for (i = 0; i < s->num_irq - GIC_INTERNAL; ++i) {
77
+ if (op3 != 2 || op3 != 3) {
40
kvm_irqchip_add_irq_route(kvm_state, i, 0, i);
78
+ goto do_unallocated;
79
+ }
80
+ if (s->pauth_active) {
81
+ dst = new_tmp_a64(s);
82
+ modifier = cpu_reg_sp(s, op4);
83
+ if (op3 == 2) {
84
+ gen_helper_autia(dst, cpu_env, cpu_reg(s, rn), modifier);
85
+ } else {
86
+ gen_helper_autib(dst, cpu_env, cpu_reg(s, rn), modifier);
87
+ }
88
+ } else {
89
+ dst = cpu_reg(s, rn);
90
+ }
91
+ gen_a64_set_pc(s, dst);
92
+ /* BLRAA also needs to load return address */
93
+ if (opc == 9) {
94
+ tcg_gen_movi_i64(cpu_reg(s, 30), s->pc);
95
+ }
96
+ break;
97
+
98
case 4: /* ERET */
99
if (s->current_el == 0) {
100
goto do_unallocated;
101
}
102
switch (op3) {
103
- case 0:
104
+ case 0: /* ERET */
105
if (op4 != 0) {
106
goto do_unallocated;
107
}
108
@@ -XXX,XX +XXX,XX @@ static void disas_uncond_b_reg(DisasContext *s, uint32_t insn)
109
offsetof(CPUARMState, elr_el[s->current_el]));
110
break;
111
112
+ case 2: /* ERETAA */
113
+ case 3: /* ERETAB */
114
+ if (!dc_isar_feature(aa64_pauth, s)) {
115
+ goto do_unallocated;
116
+ }
117
+ if (rn != 0x1f || op4 != 0x1f) {
118
+ goto do_unallocated;
119
+ }
120
+ dst = tcg_temp_new_i64();
121
+ tcg_gen_ld_i64(dst, cpu_env,
122
+ offsetof(CPUARMState, elr_el[s->current_el]));
123
+ if (s->pauth_active) {
124
+ modifier = cpu_X[31];
125
+ if (op3 == 2) {
126
+ gen_helper_autia(dst, cpu_env, dst, modifier);
127
+ } else {
128
+ gen_helper_autib(dst, cpu_env, dst, modifier);
129
+ }
130
+ }
131
+ break;
132
+
133
default:
134
goto do_unallocated;
41
}
135
}
42
--
136
--
43
2.17.1
137
2.20.1
44
138
45
139
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Not that there are any stores involved, but why argue with ARM's
4
naming convention.
5
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Message-id: 20190108223129.5570-15-richard.henderson@linaro.org
9
[fixed trivial comment nit]
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
12
target/arm/translate-a64.c | 61 ++++++++++++++++++++++++++++++++++++++
13
1 file changed, 61 insertions(+)
14
15
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
16
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/translate-a64.c
18
+++ b/target/arm/translate-a64.c
19
@@ -XXX,XX +XXX,XX @@ static void disas_ldst_atomic(DisasContext *s, uint32_t insn,
20
s->be_data | size | MO_ALIGN);
21
}
22
23
+/*
24
+ * PAC memory operations
25
+ *
26
+ * 31 30 27 26 24 22 21 12 11 10 5 0
27
+ * +------+-------+---+-----+-----+---+--------+---+---+----+-----+
28
+ * | size | 1 1 1 | V | 0 0 | M S | 1 | imm9 | W | 1 | Rn | Rt |
29
+ * +------+-------+---+-----+-----+---+--------+---+---+----+-----+
30
+ *
31
+ * Rt: the result register
32
+ * Rn: base address or SP
33
+ * V: vector flag (always 0 as of v8.3)
34
+ * M: clear for key DA, set for key DB
35
+ * W: pre-indexing flag
36
+ * S: sign for imm9.
37
+ */
38
+static void disas_ldst_pac(DisasContext *s, uint32_t insn,
39
+ int size, int rt, bool is_vector)
40
+{
41
+ int rn = extract32(insn, 5, 5);
42
+ bool is_wback = extract32(insn, 11, 1);
43
+ bool use_key_a = !extract32(insn, 23, 1);
44
+ int offset;
45
+ TCGv_i64 tcg_addr, tcg_rt;
46
+
47
+ if (size != 3 || is_vector || !dc_isar_feature(aa64_pauth, s)) {
48
+ unallocated_encoding(s);
49
+ return;
50
+ }
51
+
52
+ if (rn == 31) {
53
+ gen_check_sp_alignment(s);
54
+ }
55
+ tcg_addr = read_cpu_reg_sp(s, rn, 1);
56
+
57
+ if (s->pauth_active) {
58
+ if (use_key_a) {
59
+ gen_helper_autda(tcg_addr, cpu_env, tcg_addr, cpu_X[31]);
60
+ } else {
61
+ gen_helper_autdb(tcg_addr, cpu_env, tcg_addr, cpu_X[31]);
62
+ }
63
+ }
64
+
65
+ /* Form the 10-bit signed, scaled offset. */
66
+ offset = (extract32(insn, 22, 1) << 9) | extract32(insn, 12, 9);
67
+ offset = sextract32(offset << size, 0, 10 + size);
68
+ tcg_gen_addi_i64(tcg_addr, tcg_addr, offset);
69
+
70
+ tcg_rt = cpu_reg(s, rt);
71
+
72
+ do_gpr_ld(s, tcg_rt, tcg_addr, size, /* is_signed */ false,
73
+ /* extend */ false, /* iss_valid */ !is_wback,
74
+ /* iss_srt */ rt, /* iss_sf */ true, /* iss_ar */ false);
75
+
76
+ if (is_wback) {
77
+ tcg_gen_mov_i64(cpu_reg_sp(s, rn), tcg_addr);
78
+ }
79
+}
80
+
81
/* Load/store register (all forms) */
82
static void disas_ldst_reg(DisasContext *s, uint32_t insn)
83
{
84
@@ -XXX,XX +XXX,XX @@ static void disas_ldst_reg(DisasContext *s, uint32_t insn)
85
case 2:
86
disas_ldst_reg_roffset(s, insn, opc, size, rt, is_vector);
87
return;
88
+ default:
89
+ disas_ldst_pac(s, insn, size, rt, is_vector);
90
+ return;
91
}
92
break;
93
case 1:
94
--
95
2.20.1
96
97
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
This function is, or will shortly become, too big to inline.
4
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 20190108223129.5570-16-richard.henderson@linaro.org
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
---
10
target/arm/cpu.h | 48 +++++----------------------------------------
11
target/arm/helper.c | 44 +++++++++++++++++++++++++++++++++++++++++
12
2 files changed, 49 insertions(+), 43 deletions(-)
13
14
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
15
index XXXXXXX..XXXXXXX 100644
16
--- a/target/arm/cpu.h
17
+++ b/target/arm/cpu.h
18
@@ -XXX,XX +XXX,XX @@ static inline int arm_mmu_idx_to_el(ARMMMUIdx mmu_idx)
19
}
20
21
/* Return the MMU index for a v7M CPU in the specified security and
22
- * privilege state
23
+ * privilege state.
24
*/
25
-static inline ARMMMUIdx arm_v7m_mmu_idx_for_secstate_and_priv(CPUARMState *env,
26
- bool secstate,
27
- bool priv)
28
-{
29
- ARMMMUIdx mmu_idx = ARM_MMU_IDX_M;
30
-
31
- if (priv) {
32
- mmu_idx |= ARM_MMU_IDX_M_PRIV;
33
- }
34
-
35
- if (armv7m_nvic_neg_prio_requested(env->nvic, secstate)) {
36
- mmu_idx |= ARM_MMU_IDX_M_NEGPRI;
37
- }
38
-
39
- if (secstate) {
40
- mmu_idx |= ARM_MMU_IDX_M_S;
41
- }
42
-
43
- return mmu_idx;
44
-}
45
+ARMMMUIdx arm_v7m_mmu_idx_for_secstate_and_priv(CPUARMState *env,
46
+ bool secstate, bool priv);
47
48
/* Return the MMU index for a v7M CPU in the specified security state */
49
-static inline ARMMMUIdx arm_v7m_mmu_idx_for_secstate(CPUARMState *env,
50
- bool secstate)
51
-{
52
- bool priv = arm_current_el(env) != 0;
53
-
54
- return arm_v7m_mmu_idx_for_secstate_and_priv(env, secstate, priv);
55
-}
56
+ARMMMUIdx arm_v7m_mmu_idx_for_secstate(CPUARMState *env, bool secstate);
57
58
/* Determine the current mmu_idx to use for normal loads/stores */
59
-static inline int cpu_mmu_index(CPUARMState *env, bool ifetch)
60
-{
61
- int el = arm_current_el(env);
62
-
63
- if (arm_feature(env, ARM_FEATURE_M)) {
64
- ARMMMUIdx mmu_idx = arm_v7m_mmu_idx_for_secstate(env, env->v7m.secure);
65
-
66
- return arm_to_core_mmu_idx(mmu_idx);
67
- }
68
-
69
- if (el < 2 && arm_is_secure_below_el3(env)) {
70
- return arm_to_core_mmu_idx(ARMMMUIdx_S1SE0 + el);
71
- }
72
- return el;
73
-}
74
+int cpu_mmu_index(CPUARMState *env, bool ifetch);
75
76
/* Indexes used when registering address spaces with cpu_address_space_init */
77
typedef enum ARMASIdx {
78
diff --git a/target/arm/helper.c b/target/arm/helper.c
79
index XXXXXXX..XXXXXXX 100644
80
--- a/target/arm/helper.c
81
+++ b/target/arm/helper.c
82
@@ -XXX,XX +XXX,XX @@ int fp_exception_el(CPUARMState *env, int cur_el)
83
return 0;
84
}
85
86
+ARMMMUIdx arm_v7m_mmu_idx_for_secstate_and_priv(CPUARMState *env,
87
+ bool secstate, bool priv)
88
+{
89
+ ARMMMUIdx mmu_idx = ARM_MMU_IDX_M;
90
+
91
+ if (priv) {
92
+ mmu_idx |= ARM_MMU_IDX_M_PRIV;
93
+ }
94
+
95
+ if (armv7m_nvic_neg_prio_requested(env->nvic, secstate)) {
96
+ mmu_idx |= ARM_MMU_IDX_M_NEGPRI;
97
+ }
98
+
99
+ if (secstate) {
100
+ mmu_idx |= ARM_MMU_IDX_M_S;
101
+ }
102
+
103
+ return mmu_idx;
104
+}
105
+
106
+/* Return the MMU index for a v7M CPU in the specified security state */
107
+ARMMMUIdx arm_v7m_mmu_idx_for_secstate(CPUARMState *env, bool secstate)
108
+{
109
+ bool priv = arm_current_el(env) != 0;
110
+
111
+ return arm_v7m_mmu_idx_for_secstate_and_priv(env, secstate, priv);
112
+}
113
+
114
+int cpu_mmu_index(CPUARMState *env, bool ifetch)
115
+{
116
+ int el = arm_current_el(env);
117
+
118
+ if (arm_feature(env, ARM_FEATURE_M)) {
119
+ ARMMMUIdx mmu_idx = arm_v7m_mmu_idx_for_secstate(env, env->v7m.secure);
120
+
121
+ return arm_to_core_mmu_idx(mmu_idx);
122
+ }
123
+
124
+ if (el < 2 && arm_is_secure_below_el3(env)) {
125
+ return arm_to_core_mmu_idx(ARMMMUIdx_S1SE0 + el);
126
+ }
127
+ return el;
128
+}
129
+
130
void cpu_get_tb_cpu_state(CPUARMState *env, target_ulong *pc,
131
target_ulong *cs_base, uint32_t *pflags)
132
{
133
--
134
2.20.1
135
136
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
The pattern
4
5
ARMMMUIdx mmu_idx = core_to_arm_mmu_idx(env, cpu_mmu_index(env, false));
6
7
is computing the full ARMMMUIdx, stripping off the ARM bits,
8
and then putting them back.
9
10
Avoid the extra two steps with the appropriate helper function.
11
12
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
13
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
14
Message-id: 20190108223129.5570-17-richard.henderson@linaro.org
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
---
17
target/arm/cpu.h | 9 ++++++++-
18
target/arm/internals.h | 8 ++++++++
19
target/arm/helper.c | 27 ++++++++++++++++-----------
20
3 files changed, 32 insertions(+), 12 deletions(-)
21
22
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
23
index XXXXXXX..XXXXXXX 100644
24
--- a/target/arm/cpu.h
25
+++ b/target/arm/cpu.h
26
@@ -XXX,XX +XXX,XX @@ ARMMMUIdx arm_v7m_mmu_idx_for_secstate_and_priv(CPUARMState *env,
27
/* Return the MMU index for a v7M CPU in the specified security state */
28
ARMMMUIdx arm_v7m_mmu_idx_for_secstate(CPUARMState *env, bool secstate);
29
30
-/* Determine the current mmu_idx to use for normal loads/stores */
31
+/**
32
+ * cpu_mmu_index:
33
+ * @env: The cpu environment
34
+ * @ifetch: True for code access, false for data access.
35
+ *
36
+ * Return the core mmu index for the current translation regime.
37
+ * This function is used by generic TCG code paths.
38
+ */
39
int cpu_mmu_index(CPUARMState *env, bool ifetch);
40
41
/* Indexes used when registering address spaces with cpu_address_space_init */
42
diff --git a/target/arm/internals.h b/target/arm/internals.h
43
index XXXXXXX..XXXXXXX 100644
44
--- a/target/arm/internals.h
45
+++ b/target/arm/internals.h
46
@@ -XXX,XX +XXX,XX @@ void arm_cpu_update_virq(ARMCPU *cpu);
47
*/
48
void arm_cpu_update_vfiq(ARMCPU *cpu);
49
50
+/**
51
+ * arm_mmu_idx:
52
+ * @env: The cpu environment
53
+ *
54
+ * Return the full ARMMMUIdx for the current translation regime.
55
+ */
56
+ARMMMUIdx arm_mmu_idx(CPUARMState *env);
57
+
58
#endif
59
diff --git a/target/arm/helper.c b/target/arm/helper.c
60
index XXXXXXX..XXXXXXX 100644
61
--- a/target/arm/helper.c
62
+++ b/target/arm/helper.c
63
@@ -XXX,XX +XXX,XX @@ static bool v7m_push_callee_stack(ARMCPU *cpu, uint32_t lr, bool dotailchain,
64
limit = env->v7m.msplim[M_REG_S];
65
}
66
} else {
67
- mmu_idx = core_to_arm_mmu_idx(env, cpu_mmu_index(env, false));
68
+ mmu_idx = arm_mmu_idx(env);
69
frame_sp_p = &env->regs[13];
70
limit = v7m_sp_limit(env);
71
}
72
@@ -XXX,XX +XXX,XX @@ static bool v7m_push_stack(ARMCPU *cpu)
73
CPUARMState *env = &cpu->env;
74
uint32_t xpsr = xpsr_read(env);
75
uint32_t frameptr = env->regs[13];
76
- ARMMMUIdx mmu_idx = core_to_arm_mmu_idx(env, cpu_mmu_index(env, false));
77
+ ARMMMUIdx mmu_idx = arm_mmu_idx(env);
78
79
/* Align stack pointer if the guest wants that */
80
if ((frameptr & 4) &&
81
@@ -XXX,XX +XXX,XX @@ hwaddr arm_cpu_get_phys_page_attrs_debug(CPUState *cs, vaddr addr,
82
int prot;
83
bool ret;
84
ARMMMUFaultInfo fi = {};
85
- ARMMMUIdx mmu_idx = core_to_arm_mmu_idx(env, cpu_mmu_index(env, false));
86
+ ARMMMUIdx mmu_idx = arm_mmu_idx(env);
87
88
*attrs = (MemTxAttrs) {};
89
90
@@ -XXX,XX +XXX,XX @@ ARMMMUIdx arm_v7m_mmu_idx_for_secstate(CPUARMState *env, bool secstate)
91
return arm_v7m_mmu_idx_for_secstate_and_priv(env, secstate, priv);
92
}
93
94
-int cpu_mmu_index(CPUARMState *env, bool ifetch)
95
+ARMMMUIdx arm_mmu_idx(CPUARMState *env)
96
{
97
- int el = arm_current_el(env);
98
+ int el;
99
100
if (arm_feature(env, ARM_FEATURE_M)) {
101
- ARMMMUIdx mmu_idx = arm_v7m_mmu_idx_for_secstate(env, env->v7m.secure);
102
-
103
- return arm_to_core_mmu_idx(mmu_idx);
104
+ return arm_v7m_mmu_idx_for_secstate(env, env->v7m.secure);
105
}
106
107
+ el = arm_current_el(env);
108
if (el < 2 && arm_is_secure_below_el3(env)) {
109
- return arm_to_core_mmu_idx(ARMMMUIdx_S1SE0 + el);
110
+ return ARMMMUIdx_S1SE0 + el;
111
+ } else {
112
+ return ARMMMUIdx_S12NSE0 + el;
113
}
114
- return el;
115
+}
116
+
117
+int cpu_mmu_index(CPUARMState *env, bool ifetch)
118
+{
119
+ return arm_to_core_mmu_idx(arm_mmu_idx(env));
120
}
121
122
void cpu_get_tb_cpu_state(CPUARMState *env, target_ulong *pc,
123
target_ulong *cs_base, uint32_t *pflags)
124
{
125
- ARMMMUIdx mmu_idx = core_to_arm_mmu_idx(env, cpu_mmu_index(env, false));
126
+ ARMMMUIdx mmu_idx = arm_mmu_idx(env);
127
int current_el = arm_current_el(env);
128
int fp_el = fp_exception_el(env, current_el);
129
uint32_t flags = 0;
130
--
131
2.20.1
132
133
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
While we could expose stage_1_mmu_idx, the combination is
4
probably going to be more useful.
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20190108223129.5570-18-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/internals.h | 15 +++++++++++++++
12
target/arm/helper.c | 7 +++++++
13
2 files changed, 22 insertions(+)
14
15
diff --git a/target/arm/internals.h b/target/arm/internals.h
16
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/internals.h
18
+++ b/target/arm/internals.h
19
@@ -XXX,XX +XXX,XX @@ void arm_cpu_update_vfiq(ARMCPU *cpu);
20
*/
21
ARMMMUIdx arm_mmu_idx(CPUARMState *env);
22
23
+/**
24
+ * arm_stage1_mmu_idx:
25
+ * @env: The cpu environment
26
+ *
27
+ * Return the ARMMMUIdx for the stage1 traversal for the current regime.
28
+ */
29
+#ifdef CONFIG_USER_ONLY
30
+static inline ARMMMUIdx arm_stage1_mmu_idx(CPUARMState *env)
31
+{
32
+ return ARMMMUIdx_S1NSE0;
33
+}
34
+#else
35
+ARMMMUIdx arm_stage1_mmu_idx(CPUARMState *env);
36
+#endif
37
+
38
#endif
39
diff --git a/target/arm/helper.c b/target/arm/helper.c
40
index XXXXXXX..XXXXXXX 100644
41
--- a/target/arm/helper.c
42
+++ b/target/arm/helper.c
43
@@ -XXX,XX +XXX,XX @@ int cpu_mmu_index(CPUARMState *env, bool ifetch)
44
return arm_to_core_mmu_idx(arm_mmu_idx(env));
45
}
46
47
+#ifndef CONFIG_USER_ONLY
48
+ARMMMUIdx arm_stage1_mmu_idx(CPUARMState *env)
49
+{
50
+ return stage_1_mmu_idx(arm_mmu_idx(env));
51
+}
52
+#endif
53
+
54
void cpu_get_tb_cpu_state(CPUARMState *env, target_ulong *pc,
55
target_ulong *cs_base, uint32_t *pflags)
56
{
57
--
58
2.20.1
59
60
diff view generated by jsdifflib
New patch
1
1
From: Richard Henderson <richard.henderson@linaro.org>
2
3
Split out functions to extract the virtual address parameters.
4
Let the functions choose T0 or T1 address space half, if present.
5
Extract (most of) the control bits that vary between EL or Tx.
6
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Message-id: 20190108223129.5570-19-richard.henderson@linaro.org
10
[PMM: fixed minor checkpatch comment nits]
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
13
target/arm/internals.h | 14 +++
14
target/arm/helper.c | 278 ++++++++++++++++++++++-------------------
15
2 files changed, 164 insertions(+), 128 deletions(-)
16
17
diff --git a/target/arm/internals.h b/target/arm/internals.h
18
index XXXXXXX..XXXXXXX 100644
19
--- a/target/arm/internals.h
20
+++ b/target/arm/internals.h
21
@@ -XXX,XX +XXX,XX @@ static inline ARMMMUIdx arm_stage1_mmu_idx(CPUARMState *env)
22
ARMMMUIdx arm_stage1_mmu_idx(CPUARMState *env);
23
#endif
24
25
+/*
26
+ * Parameters of a given virtual address, as extracted from the
27
+ * translation control register (TCR) for a given regime.
28
+ */
29
+typedef struct ARMVAParameters {
30
+ unsigned tsz : 8;
31
+ unsigned select : 1;
32
+ bool tbi : 1;
33
+ bool epd : 1;
34
+ bool hpd : 1;
35
+ bool using16k : 1;
36
+ bool using64k : 1;
37
+} ARMVAParameters;
38
+
39
#endif
40
diff --git a/target/arm/helper.c b/target/arm/helper.c
41
index XXXXXXX..XXXXXXX 100644
42
--- a/target/arm/helper.c
43
+++ b/target/arm/helper.c
44
@@ -XXX,XX +XXX,XX @@ static uint8_t convert_stage2_attrs(CPUARMState *env, uint8_t s2attrs)
45
return (hiattr << 6) | (hihint << 4) | (loattr << 2) | lohint;
46
}
47
48
+static ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
49
+ ARMMMUIdx mmu_idx, bool data)
50
+{
51
+ uint64_t tcr = regime_tcr(env, mmu_idx)->raw_tcr;
52
+ uint32_t el = regime_el(env, mmu_idx);
53
+ bool tbi, epd, hpd, using16k, using64k;
54
+ int select, tsz;
55
+
56
+ /*
57
+ * Bit 55 is always between the two regions, and is canonical for
58
+ * determining if address tagging is enabled.
59
+ */
60
+ select = extract64(va, 55, 1);
61
+
62
+ if (el > 1) {
63
+ tsz = extract32(tcr, 0, 6);
64
+ using64k = extract32(tcr, 14, 1);
65
+ using16k = extract32(tcr, 15, 1);
66
+ if (mmu_idx == ARMMMUIdx_S2NS) {
67
+ /* VTCR_EL2 */
68
+ tbi = hpd = false;
69
+ } else {
70
+ tbi = extract32(tcr, 20, 1);
71
+ hpd = extract32(tcr, 24, 1);
72
+ }
73
+ epd = false;
74
+ } else if (!select) {
75
+ tsz = extract32(tcr, 0, 6);
76
+ epd = extract32(tcr, 7, 1);
77
+ using64k = extract32(tcr, 14, 1);
78
+ using16k = extract32(tcr, 15, 1);
79
+ tbi = extract64(tcr, 37, 1);
80
+ hpd = extract64(tcr, 41, 1);
81
+ } else {
82
+ int tg = extract32(tcr, 30, 2);
83
+ using16k = tg == 1;
84
+ using64k = tg == 3;
85
+ tsz = extract32(tcr, 16, 6);
86
+ epd = extract32(tcr, 23, 1);
87
+ tbi = extract64(tcr, 38, 1);
88
+ hpd = extract64(tcr, 42, 1);
89
+ }
90
+ tsz = MIN(tsz, 39); /* TODO: ARMv8.4-TTST */
91
+ tsz = MAX(tsz, 16); /* TODO: ARMv8.2-LVA */
92
+
93
+ return (ARMVAParameters) {
94
+ .tsz = tsz,
95
+ .select = select,
96
+ .tbi = tbi,
97
+ .epd = epd,
98
+ .hpd = hpd,
99
+ .using16k = using16k,
100
+ .using64k = using64k,
101
+ };
102
+}
103
+
104
+static ARMVAParameters aa32_va_parameters(CPUARMState *env, uint32_t va,
105
+ ARMMMUIdx mmu_idx)
106
+{
107
+ uint64_t tcr = regime_tcr(env, mmu_idx)->raw_tcr;
108
+ uint32_t el = regime_el(env, mmu_idx);
109
+ int select, tsz;
110
+ bool epd, hpd;
111
+
112
+ if (mmu_idx == ARMMMUIdx_S2NS) {
113
+ /* VTCR */
114
+ bool sext = extract32(tcr, 4, 1);
115
+ bool sign = extract32(tcr, 3, 1);
116
+
117
+ /*
118
+ * If the sign-extend bit is not the same as t0sz[3], the result
119
+ * is unpredictable. Flag this as a guest error.
120
+ */
121
+ if (sign != sext) {
122
+ qemu_log_mask(LOG_GUEST_ERROR,
123
+ "AArch32: VTCR.S / VTCR.T0SZ[3] mismatch\n");
124
+ }
125
+ tsz = sextract32(tcr, 0, 4) + 8;
126
+ select = 0;
127
+ hpd = false;
128
+ epd = false;
129
+ } else if (el == 2) {
130
+ /* HTCR */
131
+ tsz = extract32(tcr, 0, 3);
132
+ select = 0;
133
+ hpd = extract64(tcr, 24, 1);
134
+ epd = false;
135
+ } else {
136
+ int t0sz = extract32(tcr, 0, 3);
137
+ int t1sz = extract32(tcr, 16, 3);
138
+
139
+ if (t1sz == 0) {
140
+ select = va > (0xffffffffu >> t0sz);
141
+ } else {
142
+ /* Note that we will detect errors later. */
143
+ select = va >= ~(0xffffffffu >> t1sz);
144
+ }
145
+ if (!select) {
146
+ tsz = t0sz;
147
+ epd = extract32(tcr, 7, 1);
148
+ hpd = extract64(tcr, 41, 1);
149
+ } else {
150
+ tsz = t1sz;
151
+ epd = extract32(tcr, 23, 1);
152
+ hpd = extract64(tcr, 42, 1);
153
+ }
154
+ /* For aarch32, hpd0 is not enabled without t2e as well. */
155
+ hpd &= extract32(tcr, 6, 1);
156
+ }
157
+
158
+ return (ARMVAParameters) {
159
+ .tsz = tsz,
160
+ .select = select,
161
+ .epd = epd,
162
+ .hpd = hpd,
163
+ };
164
+}
165
+
166
static bool get_phys_addr_lpae(CPUARMState *env, target_ulong address,
167
MMUAccessType access_type, ARMMMUIdx mmu_idx,
168
hwaddr *phys_ptr, MemTxAttrs *txattrs, int *prot,
169
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, target_ulong address,
170
/* Read an LPAE long-descriptor translation table. */
171
ARMFaultType fault_type = ARMFault_Translation;
172
uint32_t level;
173
- uint32_t epd = 0;
174
- int32_t t0sz, t1sz;
175
- uint32_t tg;
176
+ ARMVAParameters param;
177
uint64_t ttbr;
178
- int ttbr_select;
179
hwaddr descaddr, indexmask, indexmask_grainsize;
180
uint32_t tableattrs;
181
- target_ulong page_size;
182
+ target_ulong page_size, top_bits;
183
uint32_t attrs;
184
- int32_t stride = 9;
185
- int32_t addrsize;
186
- int inputsize;
187
- int32_t tbi = 0;
188
+ int32_t stride;
189
+ int addrsize, inputsize;
190
TCR *tcr = regime_tcr(env, mmu_idx);
191
int ap, ns, xn, pxn;
192
uint32_t el = regime_el(env, mmu_idx);
193
- bool ttbr1_valid = true;
194
+ bool ttbr1_valid;
195
uint64_t descaddrmask;
196
bool aarch64 = arm_el_is_aa64(env, el);
197
- bool hpd = false;
198
199
/* TODO:
200
* This code does not handle the different format TCR for VTCR_EL2.
201
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, target_ulong address,
202
* support for those page table walks.
203
*/
204
if (aarch64) {
205
+ param = aa64_va_parameters(env, address, mmu_idx,
206
+ access_type != MMU_INST_FETCH);
207
level = 0;
208
- addrsize = 64;
209
- if (el > 1) {
210
- if (mmu_idx != ARMMMUIdx_S2NS) {
211
- tbi = extract64(tcr->raw_tcr, 20, 1);
212
- }
213
- } else {
214
- if (extract64(address, 55, 1)) {
215
- tbi = extract64(tcr->raw_tcr, 38, 1);
216
- } else {
217
- tbi = extract64(tcr->raw_tcr, 37, 1);
218
- }
219
- }
220
- tbi *= 8;
221
-
222
/* If we are in 64-bit EL2 or EL3 then there is no TTBR1, so mark it
223
* invalid.
224
*/
225
- if (el > 1) {
226
- ttbr1_valid = false;
227
- }
228
+ ttbr1_valid = (el < 2);
229
+ addrsize = 64 - 8 * param.tbi;
230
+ inputsize = 64 - param.tsz;
231
} else {
232
+ param = aa32_va_parameters(env, address, mmu_idx);
233
level = 1;
234
- addrsize = 32;
235
/* There is no TTBR1 for EL2 */
236
- if (el == 2) {
237
- ttbr1_valid = false;
238
- }
239
+ ttbr1_valid = (el != 2);
240
+ addrsize = (mmu_idx == ARMMMUIdx_S2NS ? 40 : 32);
241
+ inputsize = addrsize - param.tsz;
242
}
243
244
- /* Determine whether this address is in the region controlled by
245
- * TTBR0 or TTBR1 (or if it is in neither region and should fault).
246
- * This is a Non-secure PL0/1 stage 1 translation, so controlled by
247
- * TTBCR/TTBR0/TTBR1 in accordance with ARM ARM DDI0406C table B-32:
248
+ /*
249
+ * We determined the region when collecting the parameters, but we
250
+ * have not yet validated that the address is valid for the region.
251
+ * Extract the top bits and verify that they all match select.
252
*/
253
- if (aarch64) {
254
- /* AArch64 translation. */
255
- t0sz = extract32(tcr->raw_tcr, 0, 6);
256
- t0sz = MIN(t0sz, 39);
257
- t0sz = MAX(t0sz, 16);
258
- } else if (mmu_idx != ARMMMUIdx_S2NS) {
259
- /* AArch32 stage 1 translation. */
260
- t0sz = extract32(tcr->raw_tcr, 0, 3);
261
- } else {
262
- /* AArch32 stage 2 translation. */
263
- bool sext = extract32(tcr->raw_tcr, 4, 1);
264
- bool sign = extract32(tcr->raw_tcr, 3, 1);
265
- /* Address size is 40-bit for a stage 2 translation,
266
- * and t0sz can be negative (from -8 to 7),
267
- * so we need to adjust it to use the TTBR selecting logic below.
268
- */
269
- addrsize = 40;
270
- t0sz = sextract32(tcr->raw_tcr, 0, 4) + 8;
271
-
272
- /* If the sign-extend bit is not the same as t0sz[3], the result
273
- * is unpredictable. Flag this as a guest error. */
274
- if (sign != sext) {
275
- qemu_log_mask(LOG_GUEST_ERROR,
276
- "AArch32: VTCR.S / VTCR.T0SZ[3] mismatch\n");
277
- }
278
- }
279
- t1sz = extract32(tcr->raw_tcr, 16, 6);
280
- if (aarch64) {
281
- t1sz = MIN(t1sz, 39);
282
- t1sz = MAX(t1sz, 16);
283
- }
284
- if (t0sz && !extract64(address, addrsize - t0sz, t0sz - tbi)) {
285
- /* there is a ttbr0 region and we are in it (high bits all zero) */
286
- ttbr_select = 0;
287
- } else if (ttbr1_valid && t1sz &&
288
- !extract64(~address, addrsize - t1sz, t1sz - tbi)) {
289
- /* there is a ttbr1 region and we are in it (high bits all one) */
290
- ttbr_select = 1;
291
- } else if (!t0sz) {
292
- /* ttbr0 region is "everything not in the ttbr1 region" */
293
- ttbr_select = 0;
294
- } else if (!t1sz && ttbr1_valid) {
295
- /* ttbr1 region is "everything not in the ttbr0 region" */
296
- ttbr_select = 1;
297
- } else {
298
- /* in the gap between the two regions, this is a Translation fault */
299
+ top_bits = sextract64(address, inputsize, addrsize - inputsize);
300
+ if (-top_bits != param.select || (param.select && !ttbr1_valid)) {
301
+ /* In the gap between the two regions, this is a Translation fault */
302
fault_type = ARMFault_Translation;
303
goto do_fault;
304
}
305
306
+ if (param.using64k) {
307
+ stride = 13;
308
+ } else if (param.using16k) {
309
+ stride = 11;
310
+ } else {
311
+ stride = 9;
312
+ }
313
+
314
/* Note that QEMU ignores shareability and cacheability attributes,
315
* so we don't need to do anything with the SH, ORGN, IRGN fields
316
* in the TTBCR. Similarly, TTBCR:A1 selects whether we get the
317
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, target_ulong address,
318
* implement any ASID-like capability so we can ignore it (instead
319
* we will always flush the TLB any time the ASID is changed).
320
*/
321
- if (ttbr_select == 0) {
322
- ttbr = regime_ttbr(env, mmu_idx, 0);
323
- if (el < 2) {
324
- epd = extract32(tcr->raw_tcr, 7, 1);
325
- }
326
- inputsize = addrsize - t0sz;
327
-
328
- tg = extract32(tcr->raw_tcr, 14, 2);
329
- if (tg == 1) { /* 64KB pages */
330
- stride = 13;
331
- }
332
- if (tg == 2) { /* 16KB pages */
333
- stride = 11;
334
- }
335
- if (aarch64 && el > 1) {
336
- hpd = extract64(tcr->raw_tcr, 24, 1);
337
- } else {
338
- hpd = extract64(tcr->raw_tcr, 41, 1);
339
- }
340
- if (!aarch64) {
341
- /* For aarch32, hpd0 is not enabled without t2e as well. */
342
- hpd &= extract64(tcr->raw_tcr, 6, 1);
343
- }
344
- } else {
345
- /* We should only be here if TTBR1 is valid */
346
- assert(ttbr1_valid);
347
-
348
- ttbr = regime_ttbr(env, mmu_idx, 1);
349
- epd = extract32(tcr->raw_tcr, 23, 1);
350
- inputsize = addrsize - t1sz;
351
-
352
- tg = extract32(tcr->raw_tcr, 30, 2);
353
- if (tg == 3) { /* 64KB pages */
354
- stride = 13;
355
- }
356
- if (tg == 1) { /* 16KB pages */
357
- stride = 11;
358
- }
359
- hpd = extract64(tcr->raw_tcr, 42, 1);
360
- if (!aarch64) {
361
- /* For aarch32, hpd1 is not enabled without t2e as well. */
362
- hpd &= extract64(tcr->raw_tcr, 6, 1);
363
- }
364
- }
365
+ ttbr = regime_ttbr(env, mmu_idx, param.select);
366
367
/* Here we should have set up all the parameters for the translation:
368
* inputsize, ttbr, epd, stride, tbi
369
*/
370
371
- if (epd) {
372
+ if (param.epd) {
373
/* Translation table walk disabled => Translation fault on TLB miss
374
* Note: This is always 0 on 64-bit EL2 and EL3.
375
*/
376
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, target_ulong address,
377
}
378
/* Merge in attributes from table descriptors */
379
attrs |= nstable << 3; /* NS */
380
- if (hpd) {
381
+ if (param.hpd) {
382
/* HPD disables all the table attributes except NSTable. */
383
break;
384
}
385
--
386
2.20.1
387
388
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
We will shortly want to talk about TBI as it relates to data.
4
Passing around a pair of variables is less convenient than a
5
single variable.
6
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Message-id: 20190108223129.5570-20-richard.henderson@linaro.org
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
12
target/arm/cpu.h | 3 +--
13
target/arm/translate.h | 3 +--
14
target/arm/helper.c | 5 ++---
15
target/arm/translate-a64.c | 13 +++++++------
16
4 files changed, 11 insertions(+), 13 deletions(-)
17
18
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
19
index XXXXXXX..XXXXXXX 100644
20
--- a/target/arm/cpu.h
21
+++ b/target/arm/cpu.h
22
@@ -XXX,XX +XXX,XX @@ FIELD(TBFLAG_A32, HANDLER, 21, 1)
23
FIELD(TBFLAG_A32, STACKCHECK, 22, 1)
24
25
/* Bit usage when in AArch64 state */
26
-FIELD(TBFLAG_A64, TBI0, 0, 1)
27
-FIELD(TBFLAG_A64, TBI1, 1, 1)
28
+FIELD(TBFLAG_A64, TBII, 0, 2)
29
FIELD(TBFLAG_A64, SVEEXC_EL, 2, 2)
30
FIELD(TBFLAG_A64, ZCR_LEN, 4, 4)
31
FIELD(TBFLAG_A64, PAUTH_ACTIVE, 8, 1)
32
diff --git a/target/arm/translate.h b/target/arm/translate.h
33
index XXXXXXX..XXXXXXX 100644
34
--- a/target/arm/translate.h
35
+++ b/target/arm/translate.h
36
@@ -XXX,XX +XXX,XX @@ typedef struct DisasContext {
37
int user;
38
#endif
39
ARMMMUIdx mmu_idx; /* MMU index to use for normal loads/stores */
40
- bool tbi0; /* TBI0 for EL0/1 or TBI for EL2/3 */
41
- bool tbi1; /* TBI1 for EL0/1, not used for EL2/3 */
42
+ uint8_t tbii; /* TBI1|TBI0 for EL0/1 or TBI for EL2/3 */
43
bool ns; /* Use non-secure CPREG bank on access */
44
int fp_excp_el; /* FP exception EL or 0 if enabled */
45
int sve_excp_el; /* SVE exception EL or 0 if enabled */
46
diff --git a/target/arm/helper.c b/target/arm/helper.c
47
index XXXXXXX..XXXXXXX 100644
48
--- a/target/arm/helper.c
49
+++ b/target/arm/helper.c
50
@@ -XXX,XX +XXX,XX @@ void cpu_get_tb_cpu_state(CPUARMState *env, target_ulong *pc,
51
*pc = env->pc;
52
flags = FIELD_DP32(flags, TBFLAG_ANY, AARCH64_STATE, 1);
53
/* Get control bits for tagged addresses */
54
- flags = FIELD_DP32(flags, TBFLAG_A64, TBI0,
55
+ flags = FIELD_DP32(flags, TBFLAG_A64, TBII,
56
+ (arm_regime_tbi1(env, mmu_idx) << 1) |
57
arm_regime_tbi0(env, mmu_idx));
58
- flags = FIELD_DP32(flags, TBFLAG_A64, TBI1,
59
- arm_regime_tbi1(env, mmu_idx));
60
61
if (cpu_isar_feature(aa64_sve, cpu)) {
62
int sve_el = sve_exception_el(env, current_el);
63
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
64
index XXXXXXX..XXXXXXX 100644
65
--- a/target/arm/translate-a64.c
66
+++ b/target/arm/translate-a64.c
67
@@ -XXX,XX +XXX,XX @@ void gen_a64_set_pc_im(uint64_t val)
68
*/
69
static void gen_a64_set_pc(DisasContext *s, TCGv_i64 src)
70
{
71
+ /* Note that TBII is TBI1:TBI0. */
72
+ int tbi = s->tbii;
73
74
if (s->current_el <= 1) {
75
/* Test if NEITHER or BOTH TBI values are set. If so, no need to
76
* examine bit 55 of address, can just generate code.
77
* If mixed, then test via generated code
78
*/
79
- if (s->tbi0 && s->tbi1) {
80
+ if (tbi == 3) {
81
TCGv_i64 tmp_reg = tcg_temp_new_i64();
82
/* Both bits set, sign extension from bit 55 into [63:56] will
83
* cover both cases
84
@@ -XXX,XX +XXX,XX @@ static void gen_a64_set_pc(DisasContext *s, TCGv_i64 src)
85
tcg_gen_shli_i64(tmp_reg, src, 8);
86
tcg_gen_sari_i64(cpu_pc, tmp_reg, 8);
87
tcg_temp_free_i64(tmp_reg);
88
- } else if (!s->tbi0 && !s->tbi1) {
89
+ } else if (tbi == 0) {
90
/* Neither bit set, just load it as-is */
91
tcg_gen_mov_i64(cpu_pc, src);
92
} else {
93
@@ -XXX,XX +XXX,XX @@ static void gen_a64_set_pc(DisasContext *s, TCGv_i64 src)
94
95
tcg_gen_andi_i64(tcg_bit55, src, (1ull << 55));
96
97
- if (s->tbi0) {
98
+ if (tbi == 1) {
99
/* tbi0==1, tbi1==0, so 0-fill upper byte if bit 55 = 0 */
100
tcg_gen_andi_i64(tcg_tmpval, src,
101
0x00FFFFFFFFFFFFFFull);
102
@@ -XXX,XX +XXX,XX @@ static void gen_a64_set_pc(DisasContext *s, TCGv_i64 src)
103
tcg_temp_free_i64(tcg_tmpval);
104
}
105
} else { /* EL > 1 */
106
- if (s->tbi0) {
107
+ if (tbi != 0) {
108
/* Force tag byte to all zero */
109
tcg_gen_andi_i64(cpu_pc, src, 0x00FFFFFFFFFFFFFFull);
110
} else {
111
@@ -XXX,XX +XXX,XX @@ static void aarch64_tr_init_disas_context(DisasContextBase *dcbase,
112
dc->condexec_cond = 0;
113
core_mmu_idx = FIELD_EX32(tb_flags, TBFLAG_ANY, MMUIDX);
114
dc->mmu_idx = core_to_arm_mmu_idx(env, core_mmu_idx);
115
- dc->tbi0 = FIELD_EX32(tb_flags, TBFLAG_A64, TBI0);
116
- dc->tbi1 = FIELD_EX32(tb_flags, TBFLAG_A64, TBI1);
117
+ dc->tbii = FIELD_EX32(tb_flags, TBFLAG_A64, TBII);
118
dc->current_el = arm_mmu_idx_to_el(dc->mmu_idx);
119
#if !defined(CONFIG_USER_ONLY)
120
dc->user = (dc->current_el == 0);
121
--
122
2.20.1
123
124
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
We need to reuse this from helper-a64.c. Provide a stub
4
definition for CONFIG_USER_ONLY. This matches the stub
5
definitions that we removed for arm_regime_tbi{0,1} before.
6
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20190108223129.5570-21-richard.henderson@linaro.org
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
12
target/arm/internals.h | 17 +++++++++++++++++
13
target/arm/helper.c | 4 ++--
14
2 files changed, 19 insertions(+), 2 deletions(-)
15
16
diff --git a/target/arm/internals.h b/target/arm/internals.h
17
index XXXXXXX..XXXXXXX 100644
18
--- a/target/arm/internals.h
19
+++ b/target/arm/internals.h
20
@@ -XXX,XX +XXX,XX @@ typedef struct ARMVAParameters {
21
bool using64k : 1;
22
} ARMVAParameters;
23
24
+#ifdef CONFIG_USER_ONLY
25
+static inline ARMVAParameters aa64_va_parameters(CPUARMState *env,
26
+ uint64_t va,
27
+ ARMMMUIdx mmu_idx, bool data)
28
+{
29
+ return (ARMVAParameters) {
30
+ /* 48-bit address space */
31
+ .tsz = 16,
32
+ /* We can't handle tagged addresses properly in user-only mode */
33
+ .tbi = false,
34
+ };
35
+}
36
+#else
37
+ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
38
+ ARMMMUIdx mmu_idx, bool data);
39
+#endif
40
+
41
#endif
42
diff --git a/target/arm/helper.c b/target/arm/helper.c
43
index XXXXXXX..XXXXXXX 100644
44
--- a/target/arm/helper.c
45
+++ b/target/arm/helper.c
46
@@ -XXX,XX +XXX,XX @@ static uint8_t convert_stage2_attrs(CPUARMState *env, uint8_t s2attrs)
47
return (hiattr << 6) | (hihint << 4) | (loattr << 2) | lohint;
48
}
49
50
-static ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
51
- ARMMMUIdx mmu_idx, bool data)
52
+ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
53
+ ARMMMUIdx mmu_idx, bool data)
54
{
55
uint64_t tcr = regime_tcr(env, mmu_idx)->raw_tcr;
56
uint32_t el = regime_el(env, mmu_idx);
57
--
58
2.20.1
59
60
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Depending on the host abi, float16, aka uint16_t, values are
3
We will want to check TBI for I and D simultaneously.
4
passed and returned either zero-extended in the host register
5
or with garbage at the top of the host register.
6
4
7
The tcg code generator has so far been assuming garbage, as that
8
matches the x86 abi, but this is incorrect for other host abis.
9
Further, target/arm has so far been assuming zero-extended results,
10
so that it may store the 16-bit value into a 32-bit slot with the
11
high 16-bits already clear.
12
13
Rectify both problems by mapping "f16" in the helper definition
14
to uint32_t instead of (a typedef for) uint16_t. This forces
15
the host compiler to assume garbage in the upper 16 bits on input
16
and to zero-extend the result on output.
17
18
Cc: qemu-stable@nongnu.org
19
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
5
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
20
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
21
Tested-by: Laurent Desnogues <laurent.desnogues@gmail.com>
22
Message-id: 20180522175629.24932-1-richard.henderson@linaro.org
23
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Message-id: 20190108223129.5570-22-richard.henderson@linaro.org
24
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
25
---
9
---
26
include/exec/helper-head.h | 2 +-
10
target/arm/internals.h | 15 ++++++++++++---
27
target/arm/helper-a64.c | 35 +++++++++--------
11
target/arm/helper.c | 10 ++++++++--
28
target/arm/helper.c | 80 +++++++++++++++++++-------------------
12
2 files changed, 20 insertions(+), 5 deletions(-)
29
3 files changed, 59 insertions(+), 58 deletions(-)
30
13
31
diff --git a/include/exec/helper-head.h b/include/exec/helper-head.h
14
diff --git a/target/arm/internals.h b/target/arm/internals.h
32
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
33
--- a/include/exec/helper-head.h
16
--- a/target/arm/internals.h
34
+++ b/include/exec/helper-head.h
17
+++ b/target/arm/internals.h
35
@@ -XXX,XX +XXX,XX @@
18
@@ -XXX,XX +XXX,XX @@ typedef struct ARMVAParameters {
36
#define dh_ctype_int int
19
} ARMVAParameters;
37
#define dh_ctype_i64 uint64_t
20
38
#define dh_ctype_s64 int64_t
21
#ifdef CONFIG_USER_ONLY
39
-#define dh_ctype_f16 float16
22
-static inline ARMVAParameters aa64_va_parameters(CPUARMState *env,
40
+#define dh_ctype_f16 uint32_t
23
- uint64_t va,
41
#define dh_ctype_f32 float32
24
- ARMMMUIdx mmu_idx, bool data)
42
#define dh_ctype_f64 float64
25
+static inline ARMVAParameters aa64_va_parameters_both(CPUARMState *env,
43
#define dh_ctype_ptr void *
26
+ uint64_t va,
44
diff --git a/target/arm/helper-a64.c b/target/arm/helper-a64.c
27
+ ARMMMUIdx mmu_idx)
45
index XXXXXXX..XXXXXXX 100644
28
{
46
--- a/target/arm/helper-a64.c
29
return (ARMVAParameters) {
47
+++ b/target/arm/helper-a64.c
30
/* 48-bit address space */
48
@@ -XXX,XX +XXX,XX @@ static inline uint32_t float_rel_to_flags(int res)
31
@@ -XXX,XX +XXX,XX @@ static inline ARMVAParameters aa64_va_parameters(CPUARMState *env,
49
return flags;
32
.tbi = false,
33
};
50
}
34
}
51
35
+
52
-uint64_t HELPER(vfp_cmph_a64)(float16 x, float16 y, void *fp_status)
36
+static inline ARMVAParameters aa64_va_parameters(CPUARMState *env,
53
+uint64_t HELPER(vfp_cmph_a64)(uint32_t x, uint32_t y, void *fp_status)
37
+ uint64_t va,
54
{
38
+ ARMMMUIdx mmu_idx, bool data)
55
return float_rel_to_flags(float16_compare_quiet(x, y, fp_status));
39
+{
56
}
40
+ return aa64_va_parameters_both(env, va, mmu_idx);
57
41
+}
58
-uint64_t HELPER(vfp_cmpeh_a64)(float16 x, float16 y, void *fp_status)
42
#else
59
+uint64_t HELPER(vfp_cmpeh_a64)(uint32_t x, uint32_t y, void *fp_status)
43
+ARMVAParameters aa64_va_parameters_both(CPUARMState *env, uint64_t va,
60
{
44
+ ARMMMUIdx mmu_idx);
61
return float_rel_to_flags(float16_compare(x, y, fp_status));
45
ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
62
}
46
ARMMMUIdx mmu_idx, bool data);
63
@@ -XXX,XX +XXX,XX @@ uint64_t HELPER(neon_cgt_f64)(float64 a, float64 b, void *fpstp)
47
#endif
64
#define float64_three make_float64(0x4008000000000000ULL)
65
#define float64_one_point_five make_float64(0x3FF8000000000000ULL)
66
67
-float16 HELPER(recpsf_f16)(float16 a, float16 b, void *fpstp)
68
+uint32_t HELPER(recpsf_f16)(uint32_t a, uint32_t b, void *fpstp)
69
{
70
float_status *fpst = fpstp;
71
72
@@ -XXX,XX +XXX,XX @@ float64 HELPER(recpsf_f64)(float64 a, float64 b, void *fpstp)
73
return float64_muladd(a, b, float64_two, 0, fpst);
74
}
75
76
-float16 HELPER(rsqrtsf_f16)(float16 a, float16 b, void *fpstp)
77
+uint32_t HELPER(rsqrtsf_f16)(uint32_t a, uint32_t b, void *fpstp)
78
{
79
float_status *fpst = fpstp;
80
81
@@ -XXX,XX +XXX,XX @@ uint64_t HELPER(neon_addlp_u16)(uint64_t a)
82
}
83
84
/* Floating-point reciprocal exponent - see FPRecpX in ARM ARM */
85
-float16 HELPER(frecpx_f16)(float16 a, void *fpstp)
86
+uint32_t HELPER(frecpx_f16)(uint32_t a, void *fpstp)
87
{
88
float_status *fpst = fpstp;
89
uint16_t val16, sbit;
90
@@ -XXX,XX +XXX,XX @@ void HELPER(casp_be_parallel)(CPUARMState *env, uint32_t rs, uint64_t addr,
91
#define ADVSIMD_HELPER(name, suffix) HELPER(glue(glue(advsimd_, name), suffix))
92
93
#define ADVSIMD_HALFOP(name) \
94
-float16 ADVSIMD_HELPER(name, h)(float16 a, float16 b, void *fpstp) \
95
+uint32_t ADVSIMD_HELPER(name, h)(uint32_t a, uint32_t b, void *fpstp) \
96
{ \
97
float_status *fpst = fpstp; \
98
return float16_ ## name(a, b, fpst); \
99
@@ -XXX,XX +XXX,XX @@ ADVSIMD_HALFOP(mulx)
100
ADVSIMD_TWOHALFOP(mulx)
101
102
/* fused multiply-accumulate */
103
-float16 HELPER(advsimd_muladdh)(float16 a, float16 b, float16 c, void *fpstp)
104
+uint32_t HELPER(advsimd_muladdh)(uint32_t a, uint32_t b, uint32_t c,
105
+ void *fpstp)
106
{
107
float_status *fpst = fpstp;
108
return float16_muladd(a, b, c, 0, fpst);
109
@@ -XXX,XX +XXX,XX @@ uint32_t HELPER(advsimd_muladd2h)(uint32_t two_a, uint32_t two_b,
110
111
#define ADVSIMD_CMPRES(test) (test) ? 0xffff : 0
112
113
-uint32_t HELPER(advsimd_ceq_f16)(float16 a, float16 b, void *fpstp)
114
+uint32_t HELPER(advsimd_ceq_f16)(uint32_t a, uint32_t b, void *fpstp)
115
{
116
float_status *fpst = fpstp;
117
int compare = float16_compare_quiet(a, b, fpst);
118
return ADVSIMD_CMPRES(compare == float_relation_equal);
119
}
120
121
-uint32_t HELPER(advsimd_cge_f16)(float16 a, float16 b, void *fpstp)
122
+uint32_t HELPER(advsimd_cge_f16)(uint32_t a, uint32_t b, void *fpstp)
123
{
124
float_status *fpst = fpstp;
125
int compare = float16_compare(a, b, fpst);
126
@@ -XXX,XX +XXX,XX @@ uint32_t HELPER(advsimd_cge_f16)(float16 a, float16 b, void *fpstp)
127
compare == float_relation_equal);
128
}
129
130
-uint32_t HELPER(advsimd_cgt_f16)(float16 a, float16 b, void *fpstp)
131
+uint32_t HELPER(advsimd_cgt_f16)(uint32_t a, uint32_t b, void *fpstp)
132
{
133
float_status *fpst = fpstp;
134
int compare = float16_compare(a, b, fpst);
135
return ADVSIMD_CMPRES(compare == float_relation_greater);
136
}
137
138
-uint32_t HELPER(advsimd_acge_f16)(float16 a, float16 b, void *fpstp)
139
+uint32_t HELPER(advsimd_acge_f16)(uint32_t a, uint32_t b, void *fpstp)
140
{
141
float_status *fpst = fpstp;
142
float16 f0 = float16_abs(a);
143
@@ -XXX,XX +XXX,XX @@ uint32_t HELPER(advsimd_acge_f16)(float16 a, float16 b, void *fpstp)
144
compare == float_relation_equal);
145
}
146
147
-uint32_t HELPER(advsimd_acgt_f16)(float16 a, float16 b, void *fpstp)
148
+uint32_t HELPER(advsimd_acgt_f16)(uint32_t a, uint32_t b, void *fpstp)
149
{
150
float_status *fpst = fpstp;
151
float16 f0 = float16_abs(a);
152
@@ -XXX,XX +XXX,XX @@ uint32_t HELPER(advsimd_acgt_f16)(float16 a, float16 b, void *fpstp)
153
}
154
155
/* round to integral */
156
-float16 HELPER(advsimd_rinth_exact)(float16 x, void *fp_status)
157
+uint32_t HELPER(advsimd_rinth_exact)(uint32_t x, void *fp_status)
158
{
159
return float16_round_to_int(x, fp_status);
160
}
161
162
-float16 HELPER(advsimd_rinth)(float16 x, void *fp_status)
163
+uint32_t HELPER(advsimd_rinth)(uint32_t x, void *fp_status)
164
{
165
int old_flags = get_float_exception_flags(fp_status), new_flags;
166
float16 ret;
167
@@ -XXX,XX +XXX,XX @@ float16 HELPER(advsimd_rinth)(float16 x, void *fp_status)
168
* setting the mode appropriately before calling the helper.
169
*/
170
171
-uint32_t HELPER(advsimd_f16tosinth)(float16 a, void *fpstp)
172
+uint32_t HELPER(advsimd_f16tosinth)(uint32_t a, void *fpstp)
173
{
174
float_status *fpst = fpstp;
175
176
@@ -XXX,XX +XXX,XX @@ uint32_t HELPER(advsimd_f16tosinth)(float16 a, void *fpstp)
177
return float16_to_int16(a, fpst);
178
}
179
180
-uint32_t HELPER(advsimd_f16touinth)(float16 a, void *fpstp)
181
+uint32_t HELPER(advsimd_f16touinth)(uint32_t a, void *fpstp)
182
{
183
float_status *fpst = fpstp;
184
185
@@ -XXX,XX +XXX,XX @@ uint32_t HELPER(advsimd_f16touinth)(float16 a, void *fpstp)
186
* Square Root and Reciprocal square root
187
*/
188
189
-float16 HELPER(sqrt_f16)(float16 a, void *fpstp)
190
+uint32_t HELPER(sqrt_f16)(uint32_t a, void *fpstp)
191
{
192
float_status *s = fpstp;
193
194
diff --git a/target/arm/helper.c b/target/arm/helper.c
48
diff --git a/target/arm/helper.c b/target/arm/helper.c
195
index XXXXXXX..XXXXXXX 100644
49
index XXXXXXX..XXXXXXX 100644
196
--- a/target/arm/helper.c
50
--- a/target/arm/helper.c
197
+++ b/target/arm/helper.c
51
+++ b/target/arm/helper.c
198
@@ -XXX,XX +XXX,XX @@ DO_VFP_cmp(d, float64)
52
@@ -XXX,XX +XXX,XX @@ static uint8_t convert_stage2_attrs(CPUARMState *env, uint8_t s2attrs)
199
53
return (hiattr << 6) | (hihint << 4) | (loattr << 2) | lohint;
200
/* Integer to float and float to integer conversions */
201
202
-#define CONV_ITOF(name, fsz, sign) \
203
- float##fsz HELPER(name)(uint32_t x, void *fpstp) \
204
-{ \
205
- float_status *fpst = fpstp; \
206
- return sign##int32_to_##float##fsz((sign##int32_t)x, fpst); \
207
+#define CONV_ITOF(name, ftype, fsz, sign) \
208
+ftype HELPER(name)(uint32_t x, void *fpstp) \
209
+{ \
210
+ float_status *fpst = fpstp; \
211
+ return sign##int32_to_##float##fsz((sign##int32_t)x, fpst); \
212
}
54
}
213
55
214
-#define CONV_FTOI(name, fsz, sign, round) \
56
-ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
215
-uint32_t HELPER(name)(float##fsz x, void *fpstp) \
57
- ARMMMUIdx mmu_idx, bool data)
216
-{ \
58
+ARMVAParameters aa64_va_parameters_both(CPUARMState *env, uint64_t va,
217
- float_status *fpst = fpstp; \
59
+ ARMMMUIdx mmu_idx)
218
- if (float##fsz##_is_any_nan(x)) { \
60
{
219
- float_raise(float_flag_invalid, fpst); \
61
uint64_t tcr = regime_tcr(env, mmu_idx)->raw_tcr;
220
- return 0; \
62
uint32_t el = regime_el(env, mmu_idx);
221
- } \
63
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
222
- return float##fsz##_to_##sign##int32##round(x, fpst); \
64
};
223
+#define CONV_FTOI(name, ftype, fsz, sign, round) \
224
+uint32_t HELPER(name)(ftype x, void *fpstp) \
225
+{ \
226
+ float_status *fpst = fpstp; \
227
+ if (float##fsz##_is_any_nan(x)) { \
228
+ float_raise(float_flag_invalid, fpst); \
229
+ return 0; \
230
+ } \
231
+ return float##fsz##_to_##sign##int32##round(x, fpst); \
232
}
65
}
233
66
234
-#define FLOAT_CONVS(name, p, fsz, sign) \
67
+ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
235
-CONV_ITOF(vfp_##name##to##p, fsz, sign) \
68
+ ARMMMUIdx mmu_idx, bool data)
236
-CONV_FTOI(vfp_to##name##p, fsz, sign, ) \
69
+{
237
-CONV_FTOI(vfp_to##name##z##p, fsz, sign, _round_to_zero)
70
+ return aa64_va_parameters_both(env, va, mmu_idx);
238
+#define FLOAT_CONVS(name, p, ftype, fsz, sign) \
71
+}
239
+ CONV_ITOF(vfp_##name##to##p, ftype, fsz, sign) \
72
+
240
+ CONV_FTOI(vfp_to##name##p, ftype, fsz, sign, ) \
73
static ARMVAParameters aa32_va_parameters(CPUARMState *env, uint32_t va,
241
+ CONV_FTOI(vfp_to##name##z##p, ftype, fsz, sign, _round_to_zero)
74
ARMMMUIdx mmu_idx)
242
243
-FLOAT_CONVS(si, h, 16, )
244
-FLOAT_CONVS(si, s, 32, )
245
-FLOAT_CONVS(si, d, 64, )
246
-FLOAT_CONVS(ui, h, 16, u)
247
-FLOAT_CONVS(ui, s, 32, u)
248
-FLOAT_CONVS(ui, d, 64, u)
249
+FLOAT_CONVS(si, h, uint32_t, 16, )
250
+FLOAT_CONVS(si, s, float32, 32, )
251
+FLOAT_CONVS(si, d, float64, 64, )
252
+FLOAT_CONVS(ui, h, uint32_t, 16, u)
253
+FLOAT_CONVS(ui, s, float32, 32, u)
254
+FLOAT_CONVS(ui, d, float64, 64, u)
255
256
#undef CONV_ITOF
257
#undef CONV_FTOI
258
@@ -XXX,XX +XXX,XX @@ static float16 do_postscale_fp16(float64 f, int shift, float_status *fpst)
259
return float64_to_float16(float64_scalbn(f, -shift, fpst), true, fpst);
260
}
261
262
-float16 HELPER(vfp_sltoh)(uint32_t x, uint32_t shift, void *fpst)
263
+uint32_t HELPER(vfp_sltoh)(uint32_t x, uint32_t shift, void *fpst)
264
{
75
{
265
return do_postscale_fp16(int32_to_float64(x, fpst), shift, fpst);
266
}
267
268
-float16 HELPER(vfp_ultoh)(uint32_t x, uint32_t shift, void *fpst)
269
+uint32_t HELPER(vfp_ultoh)(uint32_t x, uint32_t shift, void *fpst)
270
{
271
return do_postscale_fp16(uint32_to_float64(x, fpst), shift, fpst);
272
}
273
274
-float16 HELPER(vfp_sqtoh)(uint64_t x, uint32_t shift, void *fpst)
275
+uint32_t HELPER(vfp_sqtoh)(uint64_t x, uint32_t shift, void *fpst)
276
{
277
return do_postscale_fp16(int64_to_float64(x, fpst), shift, fpst);
278
}
279
280
-float16 HELPER(vfp_uqtoh)(uint64_t x, uint32_t shift, void *fpst)
281
+uint32_t HELPER(vfp_uqtoh)(uint64_t x, uint32_t shift, void *fpst)
282
{
283
return do_postscale_fp16(uint64_to_float64(x, fpst), shift, fpst);
284
}
285
@@ -XXX,XX +XXX,XX @@ static float64 do_prescale_fp16(float16 f, int shift, float_status *fpst)
286
}
287
}
288
289
-uint32_t HELPER(vfp_toshh)(float16 x, uint32_t shift, void *fpst)
290
+uint32_t HELPER(vfp_toshh)(uint32_t x, uint32_t shift, void *fpst)
291
{
292
return float64_to_int16(do_prescale_fp16(x, shift, fpst), fpst);
293
}
294
295
-uint32_t HELPER(vfp_touhh)(float16 x, uint32_t shift, void *fpst)
296
+uint32_t HELPER(vfp_touhh)(uint32_t x, uint32_t shift, void *fpst)
297
{
298
return float64_to_uint16(do_prescale_fp16(x, shift, fpst), fpst);
299
}
300
301
-uint32_t HELPER(vfp_toslh)(float16 x, uint32_t shift, void *fpst)
302
+uint32_t HELPER(vfp_toslh)(uint32_t x, uint32_t shift, void *fpst)
303
{
304
return float64_to_int32(do_prescale_fp16(x, shift, fpst), fpst);
305
}
306
307
-uint32_t HELPER(vfp_toulh)(float16 x, uint32_t shift, void *fpst)
308
+uint32_t HELPER(vfp_toulh)(uint32_t x, uint32_t shift, void *fpst)
309
{
310
return float64_to_uint32(do_prescale_fp16(x, shift, fpst), fpst);
311
}
312
313
-uint64_t HELPER(vfp_tosqh)(float16 x, uint32_t shift, void *fpst)
314
+uint64_t HELPER(vfp_tosqh)(uint32_t x, uint32_t shift, void *fpst)
315
{
316
return float64_to_int64(do_prescale_fp16(x, shift, fpst), fpst);
317
}
318
319
-uint64_t HELPER(vfp_touqh)(float16 x, uint32_t shift, void *fpst)
320
+uint64_t HELPER(vfp_touqh)(uint32_t x, uint32_t shift, void *fpst)
321
{
322
return float64_to_uint64(do_prescale_fp16(x, shift, fpst), fpst);
323
}
324
@@ -XXX,XX +XXX,XX @@ uint32_t HELPER(set_neon_rmode)(uint32_t rmode, CPUARMState *env)
325
}
326
327
/* Half precision conversions. */
328
-float32 HELPER(vfp_fcvt_f16_to_f32)(float16 a, void *fpstp, uint32_t ahp_mode)
329
+float32 HELPER(vfp_fcvt_f16_to_f32)(uint32_t a, void *fpstp, uint32_t ahp_mode)
330
{
331
/* Squash FZ16 to 0 for the duration of conversion. In this case,
332
* it would affect flushing input denormals.
333
@@ -XXX,XX +XXX,XX @@ float32 HELPER(vfp_fcvt_f16_to_f32)(float16 a, void *fpstp, uint32_t ahp_mode)
334
return r;
335
}
336
337
-float16 HELPER(vfp_fcvt_f32_to_f16)(float32 a, void *fpstp, uint32_t ahp_mode)
338
+uint32_t HELPER(vfp_fcvt_f32_to_f16)(float32 a, void *fpstp, uint32_t ahp_mode)
339
{
340
/* Squash FZ16 to 0 for the duration of conversion. In this case,
341
* it would affect flushing output denormals.
342
@@ -XXX,XX +XXX,XX @@ float16 HELPER(vfp_fcvt_f32_to_f16)(float32 a, void *fpstp, uint32_t ahp_mode)
343
return r;
344
}
345
346
-float64 HELPER(vfp_fcvt_f16_to_f64)(float16 a, void *fpstp, uint32_t ahp_mode)
347
+float64 HELPER(vfp_fcvt_f16_to_f64)(uint32_t a, void *fpstp, uint32_t ahp_mode)
348
{
349
/* Squash FZ16 to 0 for the duration of conversion. In this case,
350
* it would affect flushing input denormals.
351
@@ -XXX,XX +XXX,XX @@ float64 HELPER(vfp_fcvt_f16_to_f64)(float16 a, void *fpstp, uint32_t ahp_mode)
352
return r;
353
}
354
355
-float16 HELPER(vfp_fcvt_f64_to_f16)(float64 a, void *fpstp, uint32_t ahp_mode)
356
+uint32_t HELPER(vfp_fcvt_f64_to_f16)(float64 a, void *fpstp, uint32_t ahp_mode)
357
{
358
/* Squash FZ16 to 0 for the duration of conversion. In this case,
359
* it would affect flushing output denormals.
360
@@ -XXX,XX +XXX,XX @@ static bool round_to_inf(float_status *fpst, bool sign_bit)
361
g_assert_not_reached();
362
}
363
364
-float16 HELPER(recpe_f16)(float16 input, void *fpstp)
365
+uint32_t HELPER(recpe_f16)(uint32_t input, void *fpstp)
366
{
367
float_status *fpst = fpstp;
368
float16 f16 = float16_squash_input_denormal(input, fpst);
369
@@ -XXX,XX +XXX,XX @@ static uint64_t recip_sqrt_estimate(int *exp , int exp_off, uint64_t frac)
370
return extract64(estimate, 0, 8) << 44;
371
}
372
373
-float16 HELPER(rsqrte_f16)(float16 input, void *fpstp)
374
+uint32_t HELPER(rsqrte_f16)(uint32_t input, void *fpstp)
375
{
376
float_status *s = fpstp;
377
float16 f16 = float16_squash_input_denormal(input, s);
378
--
76
--
379
2.17.1
77
2.20.1
380
78
381
79
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Use TBID in aa64_va_parameters depending on the data parameter.
4
This automatically updates all existing users of the function.
5
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Message-id: 20190108223129.5570-23-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/internals.h | 1 +
12
target/arm/helper.c | 14 +++++++++++---
13
2 files changed, 12 insertions(+), 3 deletions(-)
14
15
diff --git a/target/arm/internals.h b/target/arm/internals.h
16
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/internals.h
18
+++ b/target/arm/internals.h
19
@@ -XXX,XX +XXX,XX @@ typedef struct ARMVAParameters {
20
unsigned tsz : 8;
21
unsigned select : 1;
22
bool tbi : 1;
23
+ bool tbid : 1;
24
bool epd : 1;
25
bool hpd : 1;
26
bool using16k : 1;
27
diff --git a/target/arm/helper.c b/target/arm/helper.c
28
index XXXXXXX..XXXXXXX 100644
29
--- a/target/arm/helper.c
30
+++ b/target/arm/helper.c
31
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters_both(CPUARMState *env, uint64_t va,
32
{
33
uint64_t tcr = regime_tcr(env, mmu_idx)->raw_tcr;
34
uint32_t el = regime_el(env, mmu_idx);
35
- bool tbi, epd, hpd, using16k, using64k;
36
+ bool tbi, tbid, epd, hpd, using16k, using64k;
37
int select, tsz;
38
39
/*
40
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters_both(CPUARMState *env, uint64_t va,
41
using16k = extract32(tcr, 15, 1);
42
if (mmu_idx == ARMMMUIdx_S2NS) {
43
/* VTCR_EL2 */
44
- tbi = hpd = false;
45
+ tbi = tbid = hpd = false;
46
} else {
47
tbi = extract32(tcr, 20, 1);
48
hpd = extract32(tcr, 24, 1);
49
+ tbid = extract32(tcr, 29, 1);
50
}
51
epd = false;
52
} else if (!select) {
53
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters_both(CPUARMState *env, uint64_t va,
54
using16k = extract32(tcr, 15, 1);
55
tbi = extract64(tcr, 37, 1);
56
hpd = extract64(tcr, 41, 1);
57
+ tbid = extract64(tcr, 51, 1);
58
} else {
59
int tg = extract32(tcr, 30, 2);
60
using16k = tg == 1;
61
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters_both(CPUARMState *env, uint64_t va,
62
epd = extract32(tcr, 23, 1);
63
tbi = extract64(tcr, 38, 1);
64
hpd = extract64(tcr, 42, 1);
65
+ tbid = extract64(tcr, 52, 1);
66
}
67
tsz = MIN(tsz, 39); /* TODO: ARMv8.4-TTST */
68
tsz = MAX(tsz, 16); /* TODO: ARMv8.2-LVA */
69
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters_both(CPUARMState *env, uint64_t va,
70
.tsz = tsz,
71
.select = select,
72
.tbi = tbi,
73
+ .tbid = tbid,
74
.epd = epd,
75
.hpd = hpd,
76
.using16k = using16k,
77
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters_both(CPUARMState *env, uint64_t va,
78
ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
79
ARMMMUIdx mmu_idx, bool data)
80
{
81
- return aa64_va_parameters_both(env, va, mmu_idx);
82
+ ARMVAParameters ret = aa64_va_parameters_both(env, va, mmu_idx);
83
+
84
+ /* Present TBI as a composite with TBID. */
85
+ ret.tbi &= (data || !ret.tbid);
86
+ return ret;
87
}
88
89
static ARMVAParameters aa32_va_parameters(CPUARMState *env, uint32_t va,
90
--
91
2.20.1
92
93
diff view generated by jsdifflib
1
As part of plumbing MemTxAttrs down to the IOMMU translate method,
1
From: Richard Henderson <richard.henderson@linaro.org>
2
add MemTxAttrs as an argument to tb_invalidate_phys_addr().
3
Its callers either have an attrs value to hand, or don't care
4
and can use MEMTXATTRS_UNSPECIFIED.
5
2
3
The arm_regime_tbi{0,1} functions are replacable with the new function
4
by giving the lowest and highest address.
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20190108223129.5570-24-richard.henderson@linaro.org
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
8
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
9
Message-id: 20180521140402.23318-3-peter.maydell@linaro.org
10
---
10
---
11
include/exec/exec-all.h | 5 +++--
11
target/arm/cpu.h | 35 -----------------------
12
accel/tcg/translate-all.c | 2 +-
12
target/arm/helper.c | 70 ++++++++++++++++-----------------------------
13
exec.c | 2 +-
13
2 files changed, 24 insertions(+), 81 deletions(-)
14
target/xtensa/op_helper.c | 3 ++-
15
4 files changed, 7 insertions(+), 5 deletions(-)
16
14
17
diff --git a/include/exec/exec-all.h b/include/exec/exec-all.h
15
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
18
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
19
--- a/include/exec/exec-all.h
17
--- a/target/arm/cpu.h
20
+++ b/include/exec/exec-all.h
18
+++ b/target/arm/cpu.h
21
@@ -XXX,XX +XXX,XX @@ void tlb_set_page_with_attrs(CPUState *cpu, target_ulong vaddr,
19
@@ -XXX,XX +XXX,XX @@ static inline bool arm_cpu_bswap_data(CPUARMState *env)
22
void tlb_set_page(CPUState *cpu, target_ulong vaddr,
23
hwaddr paddr, int prot,
24
int mmu_idx, target_ulong size);
25
-void tb_invalidate_phys_addr(AddressSpace *as, hwaddr addr);
26
+void tb_invalidate_phys_addr(AddressSpace *as, hwaddr addr, MemTxAttrs attrs);
27
void probe_write(CPUArchState *env, target_ulong addr, int size, int mmu_idx,
28
uintptr_t retaddr);
29
#else
30
@@ -XXX,XX +XXX,XX @@ static inline void tlb_flush_by_mmuidx_all_cpus_synced(CPUState *cpu,
31
uint16_t idxmap)
32
{
33
}
34
-static inline void tb_invalidate_phys_addr(AddressSpace *as, hwaddr addr)
35
+static inline void tb_invalidate_phys_addr(AddressSpace *as, hwaddr addr,
36
+ MemTxAttrs attrs)
37
{
38
}
20
}
39
#endif
21
#endif
40
diff --git a/accel/tcg/translate-all.c b/accel/tcg/translate-all.c
22
23
-#ifndef CONFIG_USER_ONLY
24
-/**
25
- * arm_regime_tbi0:
26
- * @env: CPUARMState
27
- * @mmu_idx: MMU index indicating required translation regime
28
- *
29
- * Extracts the TBI0 value from the appropriate TCR for the current EL
30
- *
31
- * Returns: the TBI0 value.
32
- */
33
-uint32_t arm_regime_tbi0(CPUARMState *env, ARMMMUIdx mmu_idx);
34
-
35
-/**
36
- * arm_regime_tbi1:
37
- * @env: CPUARMState
38
- * @mmu_idx: MMU index indicating required translation regime
39
- *
40
- * Extracts the TBI1 value from the appropriate TCR for the current EL
41
- *
42
- * Returns: the TBI1 value.
43
- */
44
-uint32_t arm_regime_tbi1(CPUARMState *env, ARMMMUIdx mmu_idx);
45
-#else
46
-/* We can't handle tagged addresses properly in user-only mode */
47
-static inline uint32_t arm_regime_tbi0(CPUARMState *env, ARMMMUIdx mmu_idx)
48
-{
49
- return 0;
50
-}
51
-
52
-static inline uint32_t arm_regime_tbi1(CPUARMState *env, ARMMMUIdx mmu_idx)
53
-{
54
- return 0;
55
-}
56
-#endif
57
-
58
void cpu_get_tb_cpu_state(CPUARMState *env, target_ulong *pc,
59
target_ulong *cs_base, uint32_t *flags);
60
61
diff --git a/target/arm/helper.c b/target/arm/helper.c
41
index XXXXXXX..XXXXXXX 100644
62
index XXXXXXX..XXXXXXX 100644
42
--- a/accel/tcg/translate-all.c
63
--- a/target/arm/helper.c
43
+++ b/accel/tcg/translate-all.c
64
+++ b/target/arm/helper.c
44
@@ -XXX,XX +XXX,XX @@ static TranslationBlock *tb_find_pc(uintptr_t tc_ptr)
65
@@ -XXX,XX +XXX,XX @@ static inline ARMMMUIdx stage_1_mmu_idx(ARMMMUIdx mmu_idx)
66
return mmu_idx;
45
}
67
}
46
68
47
#if !defined(CONFIG_USER_ONLY)
69
-/* Returns TBI0 value for current regime el */
48
-void tb_invalidate_phys_addr(AddressSpace *as, hwaddr addr)
70
-uint32_t arm_regime_tbi0(CPUARMState *env, ARMMMUIdx mmu_idx)
49
+void tb_invalidate_phys_addr(AddressSpace *as, hwaddr addr, MemTxAttrs attrs)
71
-{
50
{
72
- TCR *tcr;
51
ram_addr_t ram_addr;
73
- uint32_t el;
52
MemoryRegion *mr;
74
-
53
diff --git a/exec.c b/exec.c
75
- /* For EL0 and EL1, TBI is controlled by stage 1's TCR, so convert
54
index XXXXXXX..XXXXXXX 100644
76
- * a stage 1+2 mmu index into the appropriate stage 1 mmu index.
55
--- a/exec.c
77
- */
56
+++ b/exec.c
78
- mmu_idx = stage_1_mmu_idx(mmu_idx);
57
@@ -XXX,XX +XXX,XX @@ static void breakpoint_invalidate(CPUState *cpu, target_ulong pc)
79
-
58
if (phys != -1) {
80
- tcr = regime_tcr(env, mmu_idx);
59
/* Locks grabbed by tb_invalidate_phys_addr */
81
- el = regime_el(env, mmu_idx);
60
tb_invalidate_phys_addr(cpu->cpu_ases[asidx].as,
82
-
61
- phys | (pc & ~TARGET_PAGE_MASK));
83
- if (el > 1) {
62
+ phys | (pc & ~TARGET_PAGE_MASK), attrs);
84
- return extract64(tcr->raw_tcr, 20, 1);
63
}
85
- } else {
64
}
86
- return extract64(tcr->raw_tcr, 37, 1);
65
#endif
87
- }
66
diff --git a/target/xtensa/op_helper.c b/target/xtensa/op_helper.c
88
-}
67
index XXXXXXX..XXXXXXX 100644
89
-
68
--- a/target/xtensa/op_helper.c
90
-/* Returns TBI1 value for current regime el */
69
+++ b/target/xtensa/op_helper.c
91
-uint32_t arm_regime_tbi1(CPUARMState *env, ARMMMUIdx mmu_idx)
70
@@ -XXX,XX +XXX,XX @@ static void tb_invalidate_virtual_addr(CPUXtensaState *env, uint32_t vaddr)
92
-{
71
int ret = xtensa_get_physical_addr(env, false, vaddr, 2, 0,
93
- TCR *tcr;
72
&paddr, &page_size, &access);
94
- uint32_t el;
73
if (ret == 0) {
95
-
74
- tb_invalidate_phys_addr(&address_space_memory, paddr);
96
- /* For EL0 and EL1, TBI is controlled by stage 1's TCR, so convert
75
+ tb_invalidate_phys_addr(&address_space_memory, paddr,
97
- * a stage 1+2 mmu index into the appropriate stage 1 mmu index.
76
+ MEMTXATTRS_UNSPECIFIED);
98
- */
77
}
99
- mmu_idx = stage_1_mmu_idx(mmu_idx);
78
}
100
-
79
101
- tcr = regime_tcr(env, mmu_idx);
102
- el = regime_el(env, mmu_idx);
103
-
104
- if (el > 1) {
105
- return 0;
106
- } else {
107
- return extract64(tcr->raw_tcr, 38, 1);
108
- }
109
-}
110
-
111
/* Return the TTBR associated with this translation regime */
112
static inline uint64_t regime_ttbr(CPUARMState *env, ARMMMUIdx mmu_idx,
113
int ttbrn)
114
@@ -XXX,XX +XXX,XX @@ void cpu_get_tb_cpu_state(CPUARMState *env, target_ulong *pc,
115
116
*pc = env->pc;
117
flags = FIELD_DP32(flags, TBFLAG_ANY, AARCH64_STATE, 1);
118
- /* Get control bits for tagged addresses */
119
- flags = FIELD_DP32(flags, TBFLAG_A64, TBII,
120
- (arm_regime_tbi1(env, mmu_idx) << 1) |
121
- arm_regime_tbi0(env, mmu_idx));
122
+
123
+#ifndef CONFIG_USER_ONLY
124
+ /*
125
+ * Get control bits for tagged addresses. Note that the
126
+ * translator only uses this for instruction addresses.
127
+ */
128
+ {
129
+ ARMMMUIdx stage1 = stage_1_mmu_idx(mmu_idx);
130
+ ARMVAParameters p0 = aa64_va_parameters_both(env, 0, stage1);
131
+ int tbii, tbid;
132
+
133
+ /* FIXME: ARMv8.1-VHE S2 translation regime. */
134
+ if (regime_el(env, stage1) < 2) {
135
+ ARMVAParameters p1 = aa64_va_parameters_both(env, -1, stage1);
136
+ tbid = (p1.tbi << 1) | p0.tbi;
137
+ tbii = tbid & ~((p1.tbid << 1) | p0.tbid);
138
+ } else {
139
+ tbid = p0.tbi;
140
+ tbii = tbid & !p0.tbid;
141
+ }
142
+
143
+ flags = FIELD_DP32(flags, TBFLAG_A64, TBII, tbii);
144
+ }
145
+#endif
146
147
if (cpu_isar_feature(aa64_sve, cpu)) {
148
int sve_el = sve_exception_el(env, current_el);
80
--
149
--
81
2.17.1
150
2.20.1
82
151
83
152
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Stripping out the authentication data does not require any crypto,
4
it merely requires the virtual address parameters.
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20190108223129.5570-25-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/pauth_helper.c | 14 +++++++++++++-
12
1 file changed, 13 insertions(+), 1 deletion(-)
13
14
diff --git a/target/arm/pauth_helper.c b/target/arm/pauth_helper.c
15
index XXXXXXX..XXXXXXX 100644
16
--- a/target/arm/pauth_helper.c
17
+++ b/target/arm/pauth_helper.c
18
@@ -XXX,XX +XXX,XX @@ static uint64_t pauth_addpac(CPUARMState *env, uint64_t ptr, uint64_t modifier,
19
g_assert_not_reached(); /* FIXME */
20
}
21
22
+static uint64_t pauth_original_ptr(uint64_t ptr, ARMVAParameters param)
23
+{
24
+ uint64_t extfield = -param.select;
25
+ int bot_pac_bit = 64 - param.tsz;
26
+ int top_pac_bit = 64 - 8 * param.tbi;
27
+
28
+ return deposit64(ptr, bot_pac_bit, top_pac_bit - bot_pac_bit, extfield);
29
+}
30
+
31
static uint64_t pauth_auth(CPUARMState *env, uint64_t ptr, uint64_t modifier,
32
ARMPACKey *key, bool data, int keynumber)
33
{
34
@@ -XXX,XX +XXX,XX @@ static uint64_t pauth_auth(CPUARMState *env, uint64_t ptr, uint64_t modifier,
35
36
static uint64_t pauth_strip(CPUARMState *env, uint64_t ptr, bool data)
37
{
38
- g_assert_not_reached(); /* FIXME */
39
+ ARMMMUIdx mmu_idx = arm_stage1_mmu_idx(env);
40
+ ARMVAParameters param = aa64_va_parameters(env, ptr, mmu_idx, data);
41
+
42
+ return pauth_original_ptr(ptr, param);
43
}
44
45
static void QEMU_NORETURN pauth_trap(CPUARMState *env, int target_el,
46
--
47
2.20.1
48
49
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
This is not really functional yet, because the crypto is not yet
4
implemented. This, however follows the Auth pseudo function.
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20190108223129.5570-26-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/pauth_helper.c | 21 ++++++++++++++++++++-
12
1 file changed, 20 insertions(+), 1 deletion(-)
13
14
diff --git a/target/arm/pauth_helper.c b/target/arm/pauth_helper.c
15
index XXXXXXX..XXXXXXX 100644
16
--- a/target/arm/pauth_helper.c
17
+++ b/target/arm/pauth_helper.c
18
@@ -XXX,XX +XXX,XX @@ static uint64_t pauth_original_ptr(uint64_t ptr, ARMVAParameters param)
19
static uint64_t pauth_auth(CPUARMState *env, uint64_t ptr, uint64_t modifier,
20
ARMPACKey *key, bool data, int keynumber)
21
{
22
- g_assert_not_reached(); /* FIXME */
23
+ ARMMMUIdx mmu_idx = arm_stage1_mmu_idx(env);
24
+ ARMVAParameters param = aa64_va_parameters(env, ptr, mmu_idx, data);
25
+ int bot_bit, top_bit;
26
+ uint64_t pac, orig_ptr, test;
27
+
28
+ orig_ptr = pauth_original_ptr(ptr, param);
29
+ pac = pauth_computepac(orig_ptr, modifier, *key);
30
+ bot_bit = 64 - param.tsz;
31
+ top_bit = 64 - 8 * param.tbi;
32
+
33
+ test = (pac ^ ptr) & ~MAKE_64BIT_MASK(55, 1);
34
+ if (unlikely(extract64(test, bot_bit, top_bit - bot_bit))) {
35
+ int error_code = (keynumber << 1) | (keynumber ^ 1);
36
+ if (param.tbi) {
37
+ return deposit64(ptr, 53, 2, error_code);
38
+ } else {
39
+ return deposit64(ptr, 61, 2, error_code);
40
+ }
41
+ }
42
+ return orig_ptr;
43
}
44
45
static uint64_t pauth_strip(CPUARMState *env, uint64_t ptr, bool data)
46
--
47
2.20.1
48
49
diff view generated by jsdifflib
1
As part of plumbing MemTxAttrs down to the IOMMU translate method,
1
From: Richard Henderson <richard.henderson@linaro.org>
2
add MemTxAttrs as an argument to flatview_do_translate().
3
2
3
This is not really functional yet, because the crypto is not yet
4
implemented. This, however follows the AddPAC pseudo function.
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20190108223129.5570-27-richard.henderson@linaro.org
4
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
5
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
6
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 20180521140402.23318-13-peter.maydell@linaro.org
8
---
10
---
9
exec.c | 9 ++++++---
11
target/arm/pauth_helper.c | 42 ++++++++++++++++++++++++++++++++++++++-
10
1 file changed, 6 insertions(+), 3 deletions(-)
12
1 file changed, 41 insertions(+), 1 deletion(-)
11
13
12
diff --git a/exec.c b/exec.c
14
diff --git a/target/arm/pauth_helper.c b/target/arm/pauth_helper.c
13
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
14
--- a/exec.c
16
--- a/target/arm/pauth_helper.c
15
+++ b/exec.c
17
+++ b/target/arm/pauth_helper.c
16
@@ -XXX,XX +XXX,XX @@ unassigned:
18
@@ -XXX,XX +XXX,XX @@ static uint64_t pauth_computepac(uint64_t data, uint64_t modifier,
17
* @is_write: whether the translation operation is for write
19
static uint64_t pauth_addpac(CPUARMState *env, uint64_t ptr, uint64_t modifier,
18
* @is_mmio: whether this can be MMIO, set true if it can
20
ARMPACKey *key, bool data)
19
* @target_as: the address space targeted by the IOMMU
20
+ * @attrs: memory transaction attributes
21
*
22
* This function is called from RCU critical section
23
*/
24
@@ -XXX,XX +XXX,XX @@ static MemoryRegionSection flatview_do_translate(FlatView *fv,
25
hwaddr *page_mask_out,
26
bool is_write,
27
bool is_mmio,
28
- AddressSpace **target_as)
29
+ AddressSpace **target_as,
30
+ MemTxAttrs attrs)
31
{
21
{
32
MemoryRegionSection *section;
22
- g_assert_not_reached(); /* FIXME */
33
IOMMUMemoryRegion *iommu_mr;
23
+ ARMMMUIdx mmu_idx = arm_stage1_mmu_idx(env);
34
@@ -XXX,XX +XXX,XX @@ IOMMUTLBEntry address_space_get_iotlb_entry(AddressSpace *as, hwaddr addr,
24
+ ARMVAParameters param = aa64_va_parameters(env, ptr, mmu_idx, data);
35
* but page mask.
25
+ uint64_t pac, ext_ptr, ext, test;
36
*/
26
+ int bot_bit, top_bit;
37
section = flatview_do_translate(address_space_to_flatview(as), addr, &xlat,
27
+
38
- NULL, &page_mask, is_write, false, &as);
28
+ /* If tagged pointers are in use, use ptr<55>, otherwise ptr<63>. */
39
+ NULL, &page_mask, is_write, false, &as,
29
+ if (param.tbi) {
40
+ attrs);
30
+ ext = sextract64(ptr, 55, 1);
41
31
+ } else {
42
/* Illegal translation */
32
+ ext = sextract64(ptr, 63, 1);
43
if (section.mr == &io_mem_unassigned) {
33
+ }
44
@@ -XXX,XX +XXX,XX @@ MemoryRegion *flatview_translate(FlatView *fv, hwaddr addr, hwaddr *xlat,
34
+
45
35
+ /* Build a pointer with known good extension bits. */
46
/* This can be MMIO, so setup MMIO bit. */
36
+ top_bit = 64 - 8 * param.tbi;
47
section = flatview_do_translate(fv, addr, xlat, plen, NULL,
37
+ bot_bit = 64 - param.tsz;
48
- is_write, true, &as);
38
+ ext_ptr = deposit64(ptr, bot_bit, top_bit - bot_bit, ext);
49
+ is_write, true, &as, attrs);
39
+
50
mr = section.mr;
40
+ pac = pauth_computepac(ext_ptr, modifier, *key);
51
41
+
52
if (xen_enabled() && memory_access_is_direct(mr, is_write)) {
42
+ /*
43
+ * Check if the ptr has good extension bits and corrupt the
44
+ * pointer authentication code if not.
45
+ */
46
+ test = sextract64(ptr, bot_bit, top_bit - bot_bit);
47
+ if (test != 0 && test != -1) {
48
+ pac ^= MAKE_64BIT_MASK(top_bit - 1, 1);
49
+ }
50
+
51
+ /*
52
+ * Preserve the determination between upper and lower at bit 55,
53
+ * and insert pointer authentication code.
54
+ */
55
+ if (param.tbi) {
56
+ ptr &= ~MAKE_64BIT_MASK(bot_bit, 55 - bot_bit + 1);
57
+ pac &= MAKE_64BIT_MASK(bot_bit, 54 - bot_bit + 1);
58
+ } else {
59
+ ptr &= MAKE_64BIT_MASK(0, bot_bit);
60
+ pac &= ~(MAKE_64BIT_MASK(55, 1) | MAKE_64BIT_MASK(0, bot_bit));
61
+ }
62
+ ext &= MAKE_64BIT_MASK(55, 1);
63
+ return pac | ext | ptr;
64
}
65
66
static uint64_t pauth_original_ptr(uint64_t ptr, ARMVAParameters param)
53
--
67
--
54
2.17.1
68
2.20.1
55
69
56
70
diff view generated by jsdifflib
New patch
1
1
From: Richard Henderson <richard.henderson@linaro.org>
2
3
This is the main crypto routine, an implementation of QARMA.
4
This matches, as much as possible, ARM pseudocode.
5
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Message-id: 20190108223129.5570-28-richard.henderson@linaro.org
9
[PMM: fixed minor checkpatch nits]
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
12
target/arm/pauth_helper.c | 242 +++++++++++++++++++++++++++++++++++++-
13
1 file changed, 241 insertions(+), 1 deletion(-)
14
15
diff --git a/target/arm/pauth_helper.c b/target/arm/pauth_helper.c
16
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/pauth_helper.c
18
+++ b/target/arm/pauth_helper.c
19
@@ -XXX,XX +XXX,XX @@
20
#include "tcg/tcg-gvec-desc.h"
21
22
23
+static uint64_t pac_cell_shuffle(uint64_t i)
24
+{
25
+ uint64_t o = 0;
26
+
27
+ o |= extract64(i, 52, 4);
28
+ o |= extract64(i, 24, 4) << 4;
29
+ o |= extract64(i, 44, 4) << 8;
30
+ o |= extract64(i, 0, 4) << 12;
31
+
32
+ o |= extract64(i, 28, 4) << 16;
33
+ o |= extract64(i, 48, 4) << 20;
34
+ o |= extract64(i, 4, 4) << 24;
35
+ o |= extract64(i, 40, 4) << 28;
36
+
37
+ o |= extract64(i, 32, 4) << 32;
38
+ o |= extract64(i, 12, 4) << 36;
39
+ o |= extract64(i, 56, 4) << 40;
40
+ o |= extract64(i, 20, 4) << 44;
41
+
42
+ o |= extract64(i, 8, 4) << 48;
43
+ o |= extract64(i, 36, 4) << 52;
44
+ o |= extract64(i, 16, 4) << 56;
45
+ o |= extract64(i, 60, 4) << 60;
46
+
47
+ return o;
48
+}
49
+
50
+static uint64_t pac_cell_inv_shuffle(uint64_t i)
51
+{
52
+ uint64_t o = 0;
53
+
54
+ o |= extract64(i, 12, 4);
55
+ o |= extract64(i, 24, 4) << 4;
56
+ o |= extract64(i, 48, 4) << 8;
57
+ o |= extract64(i, 36, 4) << 12;
58
+
59
+ o |= extract64(i, 56, 4) << 16;
60
+ o |= extract64(i, 44, 4) << 20;
61
+ o |= extract64(i, 4, 4) << 24;
62
+ o |= extract64(i, 16, 4) << 28;
63
+
64
+ o |= i & MAKE_64BIT_MASK(32, 4);
65
+ o |= extract64(i, 52, 4) << 36;
66
+ o |= extract64(i, 28, 4) << 40;
67
+ o |= extract64(i, 8, 4) << 44;
68
+
69
+ o |= extract64(i, 20, 4) << 48;
70
+ o |= extract64(i, 0, 4) << 52;
71
+ o |= extract64(i, 40, 4) << 56;
72
+ o |= i & MAKE_64BIT_MASK(60, 4);
73
+
74
+ return o;
75
+}
76
+
77
+static uint64_t pac_sub(uint64_t i)
78
+{
79
+ static const uint8_t sub[16] = {
80
+ 0xb, 0x6, 0x8, 0xf, 0xc, 0x0, 0x9, 0xe,
81
+ 0x3, 0x7, 0x4, 0x5, 0xd, 0x2, 0x1, 0xa,
82
+ };
83
+ uint64_t o = 0;
84
+ int b;
85
+
86
+ for (b = 0; b < 64; b += 16) {
87
+ o |= (uint64_t)sub[(i >> b) & 0xf] << b;
88
+ }
89
+ return o;
90
+}
91
+
92
+static uint64_t pac_inv_sub(uint64_t i)
93
+{
94
+ static const uint8_t inv_sub[16] = {
95
+ 0x5, 0xe, 0xd, 0x8, 0xa, 0xb, 0x1, 0x9,
96
+ 0x2, 0x6, 0xf, 0x0, 0x4, 0xc, 0x7, 0x3,
97
+ };
98
+ uint64_t o = 0;
99
+ int b;
100
+
101
+ for (b = 0; b < 64; b += 16) {
102
+ o |= (uint64_t)inv_sub[(i >> b) & 0xf] << b;
103
+ }
104
+ return o;
105
+}
106
+
107
+static int rot_cell(int cell, int n)
108
+{
109
+ /* 4-bit rotate left by n. */
110
+ cell |= cell << 4;
111
+ return extract32(cell, 4 - n, 4);
112
+}
113
+
114
+static uint64_t pac_mult(uint64_t i)
115
+{
116
+ uint64_t o = 0;
117
+ int b;
118
+
119
+ for (b = 0; b < 4 * 4; b += 4) {
120
+ int i0, i4, i8, ic, t0, t1, t2, t3;
121
+
122
+ i0 = extract64(i, b, 4);
123
+ i4 = extract64(i, b + 4 * 4, 4);
124
+ i8 = extract64(i, b + 8 * 4, 4);
125
+ ic = extract64(i, b + 12 * 4, 4);
126
+
127
+ t0 = rot_cell(i8, 1) ^ rot_cell(i4, 2) ^ rot_cell(i0, 1);
128
+ t1 = rot_cell(ic, 1) ^ rot_cell(i4, 1) ^ rot_cell(i0, 2);
129
+ t2 = rot_cell(ic, 2) ^ rot_cell(i8, 1) ^ rot_cell(i0, 1);
130
+ t3 = rot_cell(ic, 1) ^ rot_cell(i8, 2) ^ rot_cell(i4, 1);
131
+
132
+ o |= (uint64_t)t3 << b;
133
+ o |= (uint64_t)t2 << (b + 4 * 4);
134
+ o |= (uint64_t)t1 << (b + 8 * 4);
135
+ o |= (uint64_t)t0 << (b + 12 * 4);
136
+ }
137
+ return o;
138
+}
139
+
140
+static uint64_t tweak_cell_rot(uint64_t cell)
141
+{
142
+ return (cell >> 1) | (((cell ^ (cell >> 1)) & 1) << 3);
143
+}
144
+
145
+static uint64_t tweak_shuffle(uint64_t i)
146
+{
147
+ uint64_t o = 0;
148
+
149
+ o |= extract64(i, 16, 4) << 0;
150
+ o |= extract64(i, 20, 4) << 4;
151
+ o |= tweak_cell_rot(extract64(i, 24, 4)) << 8;
152
+ o |= extract64(i, 28, 4) << 12;
153
+
154
+ o |= tweak_cell_rot(extract64(i, 44, 4)) << 16;
155
+ o |= extract64(i, 8, 4) << 20;
156
+ o |= extract64(i, 12, 4) << 24;
157
+ o |= tweak_cell_rot(extract64(i, 32, 4)) << 28;
158
+
159
+ o |= extract64(i, 48, 4) << 32;
160
+ o |= extract64(i, 52, 4) << 36;
161
+ o |= extract64(i, 56, 4) << 40;
162
+ o |= tweak_cell_rot(extract64(i, 60, 4)) << 44;
163
+
164
+ o |= tweak_cell_rot(extract64(i, 0, 4)) << 48;
165
+ o |= extract64(i, 4, 4) << 52;
166
+ o |= tweak_cell_rot(extract64(i, 40, 4)) << 56;
167
+ o |= tweak_cell_rot(extract64(i, 36, 4)) << 60;
168
+
169
+ return o;
170
+}
171
+
172
+static uint64_t tweak_cell_inv_rot(uint64_t cell)
173
+{
174
+ return ((cell << 1) & 0xf) | ((cell & 1) ^ (cell >> 3));
175
+}
176
+
177
+static uint64_t tweak_inv_shuffle(uint64_t i)
178
+{
179
+ uint64_t o = 0;
180
+
181
+ o |= tweak_cell_inv_rot(extract64(i, 48, 4));
182
+ o |= extract64(i, 52, 4) << 4;
183
+ o |= extract64(i, 20, 4) << 8;
184
+ o |= extract64(i, 24, 4) << 12;
185
+
186
+ o |= extract64(i, 0, 4) << 16;
187
+ o |= extract64(i, 4, 4) << 20;
188
+ o |= tweak_cell_inv_rot(extract64(i, 8, 4)) << 24;
189
+ o |= extract64(i, 12, 4) << 28;
190
+
191
+ o |= tweak_cell_inv_rot(extract64(i, 28, 4)) << 32;
192
+ o |= tweak_cell_inv_rot(extract64(i, 60, 4)) << 36;
193
+ o |= tweak_cell_inv_rot(extract64(i, 56, 4)) << 40;
194
+ o |= tweak_cell_inv_rot(extract64(i, 16, 4)) << 44;
195
+
196
+ o |= extract64(i, 32, 4) << 48;
197
+ o |= extract64(i, 36, 4) << 52;
198
+ o |= extract64(i, 40, 4) << 56;
199
+ o |= tweak_cell_inv_rot(extract64(i, 44, 4)) << 60;
200
+
201
+ return o;
202
+}
203
+
204
static uint64_t pauth_computepac(uint64_t data, uint64_t modifier,
205
ARMPACKey key)
206
{
207
- g_assert_not_reached(); /* FIXME */
208
+ static const uint64_t RC[5] = {
209
+ 0x0000000000000000ull,
210
+ 0x13198A2E03707344ull,
211
+ 0xA4093822299F31D0ull,
212
+ 0x082EFA98EC4E6C89ull,
213
+ 0x452821E638D01377ull,
214
+ };
215
+ const uint64_t alpha = 0xC0AC29B7C97C50DDull;
216
+ /*
217
+ * Note that in the ARM pseudocode, key0 contains bits <127:64>
218
+ * and key1 contains bits <63:0> of the 128-bit key.
219
+ */
220
+ uint64_t key0 = key.hi, key1 = key.lo;
221
+ uint64_t workingval, runningmod, roundkey, modk0;
222
+ int i;
223
+
224
+ modk0 = (key0 << 63) | ((key0 >> 1) ^ (key0 >> 63));
225
+ runningmod = modifier;
226
+ workingval = data ^ key0;
227
+
228
+ for (i = 0; i <= 4; ++i) {
229
+ roundkey = key1 ^ runningmod;
230
+ workingval ^= roundkey;
231
+ workingval ^= RC[i];
232
+ if (i > 0) {
233
+ workingval = pac_cell_shuffle(workingval);
234
+ workingval = pac_mult(workingval);
235
+ }
236
+ workingval = pac_sub(workingval);
237
+ runningmod = tweak_shuffle(runningmod);
238
+ }
239
+ roundkey = modk0 ^ runningmod;
240
+ workingval ^= roundkey;
241
+ workingval = pac_cell_shuffle(workingval);
242
+ workingval = pac_mult(workingval);
243
+ workingval = pac_sub(workingval);
244
+ workingval = pac_cell_shuffle(workingval);
245
+ workingval = pac_mult(workingval);
246
+ workingval ^= key1;
247
+ workingval = pac_cell_inv_shuffle(workingval);
248
+ workingval = pac_inv_sub(workingval);
249
+ workingval = pac_mult(workingval);
250
+ workingval = pac_cell_inv_shuffle(workingval);
251
+ workingval ^= key0;
252
+ workingval ^= runningmod;
253
+ for (i = 0; i <= 4; ++i) {
254
+ workingval = pac_inv_sub(workingval);
255
+ if (i < 4) {
256
+ workingval = pac_mult(workingval);
257
+ workingval = pac_cell_inv_shuffle(workingval);
258
+ }
259
+ runningmod = tweak_inv_shuffle(runningmod);
260
+ roundkey = key1 ^ runningmod;
261
+ workingval ^= RC[4 - i];
262
+ workingval ^= roundkey;
263
+ workingval ^= alpha;
264
+ }
265
+ workingval ^= modk0;
266
+
267
+ return workingval;
268
}
269
270
static uint64_t pauth_addpac(CPUARMState *env, uint64_t ptr, uint64_t modifier,
271
--
272
2.20.1
273
274
diff view generated by jsdifflib
1
As part of plumbing MemTxAttrs down to the IOMMU translate method,
1
From: Richard Henderson <richard.henderson@linaro.org>
2
add MemTxAttrs as an argument to the MemoryRegion valid.accepts
3
callback. We'll need this for subpage_accepts().
4
2
5
We could take the approach we used with the read and write
3
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
callbacks and add new a new _with_attrs version, but since there
4
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
are so few implementations of the accepts hook we just change
5
Message-id: 20190108223129.5570-29-richard.henderson@linaro.org
8
them all.
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
---
8
target/arm/helper.c | 70 +++++++++++++++++++++++++++++++++++++++++++++
9
1 file changed, 70 insertions(+)
9
10
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
diff --git a/target/arm/helper.c b/target/arm/helper.c
11
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
12
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
13
Message-id: 20180521140402.23318-9-peter.maydell@linaro.org
14
---
15
include/exec/memory.h | 3 ++-
16
exec.c | 9 ++++++---
17
hw/hppa/dino.c | 3 ++-
18
hw/nvram/fw_cfg.c | 12 ++++++++----
19
hw/scsi/esp.c | 3 ++-
20
hw/xen/xen_pt_msi.c | 3 ++-
21
memory.c | 5 +++--
22
7 files changed, 25 insertions(+), 13 deletions(-)
23
24
diff --git a/include/exec/memory.h b/include/exec/memory.h
25
index XXXXXXX..XXXXXXX 100644
12
index XXXXXXX..XXXXXXX 100644
26
--- a/include/exec/memory.h
13
--- a/target/arm/helper.c
27
+++ b/include/exec/memory.h
14
+++ b/target/arm/helper.c
28
@@ -XXX,XX +XXX,XX @@ struct MemoryRegionOps {
15
@@ -XXX,XX +XXX,XX @@ static CPAccessResult access_lor_other(CPUARMState *env,
29
* as a machine check exception).
16
return access_lor_ns(env);
30
*/
31
bool (*accepts)(void *opaque, hwaddr addr,
32
- unsigned size, bool is_write);
33
+ unsigned size, bool is_write,
34
+ MemTxAttrs attrs);
35
} valid;
36
/* Internal implementation constraints: */
37
struct {
38
diff --git a/exec.c b/exec.c
39
index XXXXXXX..XXXXXXX 100644
40
--- a/exec.c
41
+++ b/exec.c
42
@@ -XXX,XX +XXX,XX @@ static void notdirty_mem_write(void *opaque, hwaddr ram_addr,
43
}
17
}
44
18
45
static bool notdirty_mem_accepts(void *opaque, hwaddr addr,
19
+#ifdef TARGET_AARCH64
46
- unsigned size, bool is_write)
20
+static CPAccessResult access_pauth(CPUARMState *env, const ARMCPRegInfo *ri,
47
+ unsigned size, bool is_write,
21
+ bool isread)
48
+ MemTxAttrs attrs)
22
+{
23
+ int el = arm_current_el(env);
24
+
25
+ if (el < 2 &&
26
+ arm_feature(env, ARM_FEATURE_EL2) &&
27
+ !(arm_hcr_el2_eff(env) & HCR_APK)) {
28
+ return CP_ACCESS_TRAP_EL2;
29
+ }
30
+ if (el < 3 &&
31
+ arm_feature(env, ARM_FEATURE_EL3) &&
32
+ !(env->cp15.scr_el3 & SCR_APK)) {
33
+ return CP_ACCESS_TRAP_EL3;
34
+ }
35
+ return CP_ACCESS_OK;
36
+}
37
+
38
+static const ARMCPRegInfo pauth_reginfo[] = {
39
+ { .name = "APDAKEYLO_EL1", .state = ARM_CP_STATE_AA64,
40
+ .opc0 = 3, .opc1 = 0, .crn = 2, .crm = 2, .opc2 = 0,
41
+ .access = PL1_RW, .accessfn = access_pauth,
42
+ .fieldoffset = offsetof(CPUARMState, apda_key.lo) },
43
+ { .name = "APDAKEYHI_EL1", .state = ARM_CP_STATE_AA64,
44
+ .opc0 = 3, .opc1 = 0, .crn = 2, .crm = 2, .opc2 = 1,
45
+ .access = PL1_RW, .accessfn = access_pauth,
46
+ .fieldoffset = offsetof(CPUARMState, apda_key.hi) },
47
+ { .name = "APDBKEYLO_EL1", .state = ARM_CP_STATE_AA64,
48
+ .opc0 = 3, .opc1 = 0, .crn = 2, .crm = 2, .opc2 = 2,
49
+ .access = PL1_RW, .accessfn = access_pauth,
50
+ .fieldoffset = offsetof(CPUARMState, apdb_key.lo) },
51
+ { .name = "APDBKEYHI_EL1", .state = ARM_CP_STATE_AA64,
52
+ .opc0 = 3, .opc1 = 0, .crn = 2, .crm = 2, .opc2 = 3,
53
+ .access = PL1_RW, .accessfn = access_pauth,
54
+ .fieldoffset = offsetof(CPUARMState, apdb_key.hi) },
55
+ { .name = "APGAKEYLO_EL1", .state = ARM_CP_STATE_AA64,
56
+ .opc0 = 3, .opc1 = 0, .crn = 2, .crm = 3, .opc2 = 0,
57
+ .access = PL1_RW, .accessfn = access_pauth,
58
+ .fieldoffset = offsetof(CPUARMState, apga_key.lo) },
59
+ { .name = "APGAKEYHI_EL1", .state = ARM_CP_STATE_AA64,
60
+ .opc0 = 3, .opc1 = 0, .crn = 2, .crm = 3, .opc2 = 1,
61
+ .access = PL1_RW, .accessfn = access_pauth,
62
+ .fieldoffset = offsetof(CPUARMState, apga_key.hi) },
63
+ { .name = "APIAKEYLO_EL1", .state = ARM_CP_STATE_AA64,
64
+ .opc0 = 3, .opc1 = 0, .crn = 2, .crm = 1, .opc2 = 0,
65
+ .access = PL1_RW, .accessfn = access_pauth,
66
+ .fieldoffset = offsetof(CPUARMState, apia_key.lo) },
67
+ { .name = "APIAKEYHI_EL1", .state = ARM_CP_STATE_AA64,
68
+ .opc0 = 3, .opc1 = 0, .crn = 2, .crm = 1, .opc2 = 1,
69
+ .access = PL1_RW, .accessfn = access_pauth,
70
+ .fieldoffset = offsetof(CPUARMState, apia_key.hi) },
71
+ { .name = "APIBKEYLO_EL1", .state = ARM_CP_STATE_AA64,
72
+ .opc0 = 3, .opc1 = 0, .crn = 2, .crm = 1, .opc2 = 2,
73
+ .access = PL1_RW, .accessfn = access_pauth,
74
+ .fieldoffset = offsetof(CPUARMState, apib_key.lo) },
75
+ { .name = "APIBKEYHI_EL1", .state = ARM_CP_STATE_AA64,
76
+ .opc0 = 3, .opc1 = 0, .crn = 2, .crm = 1, .opc2 = 3,
77
+ .access = PL1_RW, .accessfn = access_pauth,
78
+ .fieldoffset = offsetof(CPUARMState, apib_key.hi) },
79
+ REGINFO_SENTINEL
80
+};
81
+#endif
82
+
83
void register_cp_regs_for_features(ARMCPU *cpu)
49
{
84
{
50
return is_write;
85
/* Register all the coprocessor registers based on feature bits */
51
}
86
@@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu)
52
@@ -XXX,XX +XXX,XX @@ static MemTxResult subpage_write(void *opaque, hwaddr addr,
87
define_one_arm_cp_reg(cpu, &zcr_el3_reginfo);
53
}
54
55
static bool subpage_accepts(void *opaque, hwaddr addr,
56
- unsigned len, bool is_write)
57
+ unsigned len, bool is_write,
58
+ MemTxAttrs attrs)
59
{
60
subpage_t *subpage = opaque;
61
#if defined(DEBUG_SUBPAGE)
62
@@ -XXX,XX +XXX,XX @@ static void readonly_mem_write(void *opaque, hwaddr addr,
63
}
64
65
static bool readonly_mem_accepts(void *opaque, hwaddr addr,
66
- unsigned size, bool is_write)
67
+ unsigned size, bool is_write,
68
+ MemTxAttrs attrs)
69
{
70
return is_write;
71
}
72
diff --git a/hw/hppa/dino.c b/hw/hppa/dino.c
73
index XXXXXXX..XXXXXXX 100644
74
--- a/hw/hppa/dino.c
75
+++ b/hw/hppa/dino.c
76
@@ -XXX,XX +XXX,XX @@ static void gsc_to_pci_forwarding(DinoState *s)
77
}
78
79
static bool dino_chip_mem_valid(void *opaque, hwaddr addr,
80
- unsigned size, bool is_write)
81
+ unsigned size, bool is_write,
82
+ MemTxAttrs attrs)
83
{
84
switch (addr) {
85
case DINO_IAR0:
86
diff --git a/hw/nvram/fw_cfg.c b/hw/nvram/fw_cfg.c
87
index XXXXXXX..XXXXXXX 100644
88
--- a/hw/nvram/fw_cfg.c
89
+++ b/hw/nvram/fw_cfg.c
90
@@ -XXX,XX +XXX,XX @@ static void fw_cfg_dma_mem_write(void *opaque, hwaddr addr,
91
}
92
93
static bool fw_cfg_dma_mem_valid(void *opaque, hwaddr addr,
94
- unsigned size, bool is_write)
95
+ unsigned size, bool is_write,
96
+ MemTxAttrs attrs)
97
{
98
return !is_write || ((size == 4 && (addr == 0 || addr == 4)) ||
99
(size == 8 && addr == 0));
100
}
101
102
static bool fw_cfg_data_mem_valid(void *opaque, hwaddr addr,
103
- unsigned size, bool is_write)
104
+ unsigned size, bool is_write,
105
+ MemTxAttrs attrs)
106
{
107
return addr == 0;
108
}
109
@@ -XXX,XX +XXX,XX @@ static void fw_cfg_ctl_mem_write(void *opaque, hwaddr addr,
110
}
111
112
static bool fw_cfg_ctl_mem_valid(void *opaque, hwaddr addr,
113
- unsigned size, bool is_write)
114
+ unsigned size, bool is_write,
115
+ MemTxAttrs attrs)
116
{
117
return is_write && size == 2;
118
}
119
@@ -XXX,XX +XXX,XX @@ static void fw_cfg_comb_write(void *opaque, hwaddr addr,
120
}
121
122
static bool fw_cfg_comb_valid(void *opaque, hwaddr addr,
123
- unsigned size, bool is_write)
124
+ unsigned size, bool is_write,
125
+ MemTxAttrs attrs)
126
{
127
return (size == 1) || (is_write && size == 2);
128
}
129
diff --git a/hw/scsi/esp.c b/hw/scsi/esp.c
130
index XXXXXXX..XXXXXXX 100644
131
--- a/hw/scsi/esp.c
132
+++ b/hw/scsi/esp.c
133
@@ -XXX,XX +XXX,XX @@ void esp_reg_write(ESPState *s, uint32_t saddr, uint64_t val)
134
}
135
136
static bool esp_mem_accepts(void *opaque, hwaddr addr,
137
- unsigned size, bool is_write)
138
+ unsigned size, bool is_write,
139
+ MemTxAttrs attrs)
140
{
141
return (size == 1) || (is_write && size == 4);
142
}
143
diff --git a/hw/xen/xen_pt_msi.c b/hw/xen/xen_pt_msi.c
144
index XXXXXXX..XXXXXXX 100644
145
--- a/hw/xen/xen_pt_msi.c
146
+++ b/hw/xen/xen_pt_msi.c
147
@@ -XXX,XX +XXX,XX @@ static uint64_t pci_msix_read(void *opaque, hwaddr addr,
148
}
149
150
static bool pci_msix_accepts(void *opaque, hwaddr addr,
151
- unsigned size, bool is_write)
152
+ unsigned size, bool is_write,
153
+ MemTxAttrs attrs)
154
{
155
return !(addr & (size - 1));
156
}
157
diff --git a/memory.c b/memory.c
158
index XXXXXXX..XXXXXXX 100644
159
--- a/memory.c
160
+++ b/memory.c
161
@@ -XXX,XX +XXX,XX @@ static void unassigned_mem_write(void *opaque, hwaddr addr,
162
}
163
164
static bool unassigned_mem_accepts(void *opaque, hwaddr addr,
165
- unsigned size, bool is_write)
166
+ unsigned size, bool is_write,
167
+ MemTxAttrs attrs)
168
{
169
return false;
170
}
171
@@ -XXX,XX +XXX,XX @@ bool memory_region_access_valid(MemoryRegion *mr,
172
access_size = MAX(MIN(size, access_size_max), access_size_min);
173
for (i = 0; i < size; i += access_size) {
174
if (!mr->ops->valid.accepts(mr->opaque, addr + i, access_size,
175
- is_write)) {
176
+ is_write, attrs)) {
177
return false;
178
}
88
}
179
}
89
}
90
+
91
+#ifdef TARGET_AARCH64
92
+ if (cpu_isar_feature(aa64_pauth, cpu)) {
93
+ define_arm_cp_regs(cpu, pauth_reginfo);
94
+ }
95
+#endif
96
}
97
98
void arm_cpu_register_gdb_regs_for_features(ARMCPU *cpu)
180
--
99
--
181
2.17.1
100
2.20.1
182
101
183
102
diff view generated by jsdifflib
1
As part of plumbing MemTxAttrs down to the IOMMU translate method,
1
From: Richard Henderson <richard.henderson@linaro.org>
2
add MemTxAttrs as an argument to address_space_get_iotlb_entry().
3
2
3
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
4
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
5
Message-id: 20190108223129.5570-30-richard.henderson@linaro.org
4
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
5
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
6
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 20180521140402.23318-12-peter.maydell@linaro.org
8
---
7
---
9
include/exec/memory.h | 2 +-
8
target/arm/cpu64.c | 4 ++++
10
exec.c | 2 +-
9
1 file changed, 4 insertions(+)
11
hw/virtio/vhost.c | 3 ++-
12
3 files changed, 4 insertions(+), 3 deletions(-)
13
10
14
diff --git a/include/exec/memory.h b/include/exec/memory.h
11
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
15
index XXXXXXX..XXXXXXX 100644
12
index XXXXXXX..XXXXXXX 100644
16
--- a/include/exec/memory.h
13
--- a/target/arm/cpu64.c
17
+++ b/include/exec/memory.h
14
+++ b/target/arm/cpu64.c
18
@@ -XXX,XX +XXX,XX @@ void address_space_cache_destroy(MemoryRegionCache *cache);
15
@@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj)
19
* entry. Should be called from an RCU critical section.
16
20
*/
17
t = cpu->isar.id_aa64isar1;
21
IOMMUTLBEntry address_space_get_iotlb_entry(AddressSpace *as, hwaddr addr,
18
t = FIELD_DP64(t, ID_AA64ISAR1, FCMA, 1);
22
- bool is_write);
19
+ t = FIELD_DP64(t, ID_AA64ISAR1, APA, 1); /* PAuth, architected only */
23
+ bool is_write, MemTxAttrs attrs);
20
+ t = FIELD_DP64(t, ID_AA64ISAR1, API, 0);
24
21
+ t = FIELD_DP64(t, ID_AA64ISAR1, GPA, 1);
25
/* address_space_translate: translate an address range into an address space
22
+ t = FIELD_DP64(t, ID_AA64ISAR1, GPI, 0);
26
* into a MemoryRegion and an address range into that section. Should be
23
cpu->isar.id_aa64isar1 = t;
27
diff --git a/exec.c b/exec.c
24
28
index XXXXXXX..XXXXXXX 100644
25
t = cpu->isar.id_aa64pfr0;
29
--- a/exec.c
30
+++ b/exec.c
31
@@ -XXX,XX +XXX,XX @@ static MemoryRegionSection flatview_do_translate(FlatView *fv,
32
33
/* Called from RCU critical section */
34
IOMMUTLBEntry address_space_get_iotlb_entry(AddressSpace *as, hwaddr addr,
35
- bool is_write)
36
+ bool is_write, MemTxAttrs attrs)
37
{
38
MemoryRegionSection section;
39
hwaddr xlat, page_mask;
40
diff --git a/hw/virtio/vhost.c b/hw/virtio/vhost.c
41
index XXXXXXX..XXXXXXX 100644
42
--- a/hw/virtio/vhost.c
43
+++ b/hw/virtio/vhost.c
44
@@ -XXX,XX +XXX,XX @@ int vhost_device_iotlb_miss(struct vhost_dev *dev, uint64_t iova, int write)
45
trace_vhost_iotlb_miss(dev, 1);
46
47
iotlb = address_space_get_iotlb_entry(dev->vdev->dma_as,
48
- iova, write);
49
+ iova, write,
50
+ MEMTXATTRS_UNSPECIFIED);
51
if (iotlb.target_as != NULL) {
52
ret = vhost_memory_region_lookup(dev, iotlb.translated_addr,
53
&uaddr, &len);
54
--
26
--
55
2.17.1
27
2.20.1
56
28
57
29
diff view generated by jsdifflib
1
As part of plumbing MemTxAttrs down to the IOMMU translate method,
1
From: Richard Henderson <richard.henderson@linaro.org>
2
add MemTxAttrs as an argument to flatview_translate(); all its
3
callers now have attrs available.
4
2
3
Add 4 attributes that controls the EL1 enable bits, as we may not
4
always want to turn on pointer authentication with -cpu max.
5
However, by default they are enabled.
6
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Message-id: 20190108223129.5570-31-richard.henderson@linaro.org
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
7
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20180521140402.23318-11-peter.maydell@linaro.org
9
---
11
---
10
include/exec/memory.h | 7 ++++---
12
target/arm/cpu.c | 3 +++
11
exec.c | 17 +++++++++--------
13
target/arm/cpu64.c | 60 ++++++++++++++++++++++++++++++++++++++++++++++
12
2 files changed, 13 insertions(+), 11 deletions(-)
14
2 files changed, 63 insertions(+)
13
15
14
diff --git a/include/exec/memory.h b/include/exec/memory.h
16
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
15
index XXXXXXX..XXXXXXX 100644
17
index XXXXXXX..XXXXXXX 100644
16
--- a/include/exec/memory.h
18
--- a/target/arm/cpu.c
17
+++ b/include/exec/memory.h
19
+++ b/target/arm/cpu.c
18
@@ -XXX,XX +XXX,XX @@ IOMMUTLBEntry address_space_get_iotlb_entry(AddressSpace *as, hwaddr addr,
20
@@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(CPUState *s)
19
*/
21
env->pstate = PSTATE_MODE_EL0t;
20
MemoryRegion *flatview_translate(FlatView *fv,
22
/* Userspace expects access to DC ZVA, CTL_EL0 and the cache ops */
21
hwaddr addr, hwaddr *xlat,
23
env->cp15.sctlr_el[1] |= SCTLR_UCT | SCTLR_UCI | SCTLR_DZE;
22
- hwaddr *len, bool is_write);
24
+ /* Enable all PAC instructions */
23
+ hwaddr *len, bool is_write,
25
+ env->cp15.hcr_el2 |= HCR_API;
24
+ MemTxAttrs attrs);
26
+ env->cp15.scr_el3 |= SCR_API;
25
27
/* and to the FP/Neon instructions */
26
static inline MemoryRegion *address_space_translate(AddressSpace *as,
28
env->cp15.cpacr_el1 = deposit64(env->cp15.cpacr_el1, 20, 2, 3);
27
hwaddr addr, hwaddr *xlat,
29
/* and to the SVE instructions */
28
@@ -XXX,XX +XXX,XX @@ static inline MemoryRegion *address_space_translate(AddressSpace *as,
30
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
29
MemTxAttrs attrs)
31
index XXXXXXX..XXXXXXX 100644
30
{
32
--- a/target/arm/cpu64.c
31
return flatview_translate(address_space_to_flatview(as),
33
+++ b/target/arm/cpu64.c
32
- addr, xlat, len, is_write);
34
@@ -XXX,XX +XXX,XX @@ static void cpu_max_set_sve_vq(Object *obj, Visitor *v, const char *name,
33
+ addr, xlat, len, is_write, attrs);
35
error_propagate(errp, err);
34
}
36
}
35
37
36
/* address_space_access_valid: check for validity of accessing an address
38
+#ifdef CONFIG_USER_ONLY
37
@@ -XXX,XX +XXX,XX @@ MemTxResult address_space_read(AddressSpace *as, hwaddr addr,
39
+static void cpu_max_get_packey(Object *obj, Visitor *v, const char *name,
38
rcu_read_lock();
40
+ void *opaque, Error **errp)
39
fv = address_space_to_flatview(as);
41
+{
40
l = len;
42
+ ARMCPU *cpu = ARM_CPU(obj);
41
- mr = flatview_translate(fv, addr, &addr1, &l, false);
43
+ const uint64_t *bit = opaque;
42
+ mr = flatview_translate(fv, addr, &addr1, &l, false, attrs);
44
+ bool enabled = (cpu->env.cp15.sctlr_el[1] & *bit) != 0;
43
if (len == l && memory_access_is_direct(mr, false)) {
45
+
44
ptr = qemu_map_ram_ptr(mr->ram_block, addr1);
46
+ visit_type_bool(v, name, &enabled, errp);
45
memcpy(buf, ptr, len);
47
+}
46
diff --git a/exec.c b/exec.c
48
+
47
index XXXXXXX..XXXXXXX 100644
49
+static void cpu_max_set_packey(Object *obj, Visitor *v, const char *name,
48
--- a/exec.c
50
+ void *opaque, Error **errp)
49
+++ b/exec.c
51
+{
50
@@ -XXX,XX +XXX,XX @@ iotlb_fail:
52
+ ARMCPU *cpu = ARM_CPU(obj);
51
53
+ Error *err = NULL;
52
/* Called from RCU critical section */
54
+ const uint64_t *bit = opaque;
53
MemoryRegion *flatview_translate(FlatView *fv, hwaddr addr, hwaddr *xlat,
55
+ bool enabled;
54
- hwaddr *plen, bool is_write)
56
+
55
+ hwaddr *plen, bool is_write,
57
+ visit_type_bool(v, name, &enabled, errp);
56
+ MemTxAttrs attrs)
58
+
57
{
59
+ if (!err) {
58
MemoryRegion *mr;
60
+ if (enabled) {
59
MemoryRegionSection section;
61
+ cpu->env.cp15.sctlr_el[1] |= *bit;
60
@@ -XXX,XX +XXX,XX @@ static MemTxResult flatview_write_continue(FlatView *fv, hwaddr addr,
62
+ } else {
61
}
63
+ cpu->env.cp15.sctlr_el[1] &= ~*bit;
62
64
+ }
63
l = len;
65
+ }
64
- mr = flatview_translate(fv, addr, &addr1, &l, true);
66
+ error_propagate(errp, err);
65
+ mr = flatview_translate(fv, addr, &addr1, &l, true, attrs);
67
+}
66
}
68
+#endif
67
69
+
68
return result;
70
/* -cpu max: if KVM is enabled, like -cpu host (best possible with this host);
69
@@ -XXX,XX +XXX,XX @@ static MemTxResult flatview_write(FlatView *fv, hwaddr addr, MemTxAttrs attrs,
71
* otherwise, a CPU with as many features enabled as our emulation supports.
70
MemTxResult result = MEMTX_OK;
72
* The version of '-cpu max' for qemu-system-arm is defined in cpu.c;
71
73
@@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj)
72
l = len;
74
*/
73
- mr = flatview_translate(fv, addr, &addr1, &l, true);
75
cpu->ctr = 0x80038003; /* 32 byte I and D cacheline size, VIPT icache */
74
+ mr = flatview_translate(fv, addr, &addr1, &l, true, attrs);
76
cpu->dcz_blocksize = 7; /* 512 bytes */
75
result = flatview_write_continue(fv, addr, attrs, buf, len,
77
+
76
addr1, l, mr);
78
+ /*
77
79
+ * Note that Linux will enable enable all of the keys at once.
78
@@ -XXX,XX +XXX,XX @@ MemTxResult flatview_read_continue(FlatView *fv, hwaddr addr,
80
+ * But doing it this way will allow experimentation beyond that.
79
}
81
+ */
80
82
+ {
81
l = len;
83
+ static const uint64_t apia_bit = SCTLR_EnIA;
82
- mr = flatview_translate(fv, addr, &addr1, &l, false);
84
+ static const uint64_t apib_bit = SCTLR_EnIB;
83
+ mr = flatview_translate(fv, addr, &addr1, &l, false, attrs);
85
+ static const uint64_t apda_bit = SCTLR_EnDA;
84
}
86
+ static const uint64_t apdb_bit = SCTLR_EnDB;
85
87
+
86
return result;
88
+ object_property_add(obj, "apia", "bool", cpu_max_get_packey,
87
@@ -XXX,XX +XXX,XX @@ static MemTxResult flatview_read(FlatView *fv, hwaddr addr,
89
+ cpu_max_set_packey, NULL,
88
MemoryRegion *mr;
90
+ (void *)&apia_bit, &error_fatal);
89
91
+ object_property_add(obj, "apib", "bool", cpu_max_get_packey,
90
l = len;
92
+ cpu_max_set_packey, NULL,
91
- mr = flatview_translate(fv, addr, &addr1, &l, false);
93
+ (void *)&apib_bit, &error_fatal);
92
+ mr = flatview_translate(fv, addr, &addr1, &l, false, attrs);
94
+ object_property_add(obj, "apda", "bool", cpu_max_get_packey,
93
return flatview_read_continue(fv, addr, attrs, buf, len,
95
+ cpu_max_set_packey, NULL,
94
addr1, l, mr);
96
+ (void *)&apda_bit, &error_fatal);
95
}
97
+ object_property_add(obj, "apdb", "bool", cpu_max_get_packey,
96
@@ -XXX,XX +XXX,XX @@ static bool flatview_access_valid(FlatView *fv, hwaddr addr, int len,
98
+ cpu_max_set_packey, NULL,
97
99
+ (void *)&apdb_bit, &error_fatal);
98
while (len > 0) {
100
+
99
l = len;
101
+ /* Enable all PAC keys by default. */
100
- mr = flatview_translate(fv, addr, &xlat, &l, is_write);
102
+ cpu->env.cp15.sctlr_el[1] |= SCTLR_EnIA | SCTLR_EnIB;
101
+ mr = flatview_translate(fv, addr, &xlat, &l, is_write, attrs);
103
+ cpu->env.cp15.sctlr_el[1] |= SCTLR_EnDA | SCTLR_EnDB;
102
if (!memory_access_is_direct(mr, is_write)) {
104
+ }
103
l = memory_access_size(mr, l, addr);
105
#endif
104
if (!memory_region_access_valid(mr, xlat, l, is_write, attrs)) {
106
105
@@ -XXX,XX +XXX,XX @@ flatview_extend_translation(FlatView *fv, hwaddr addr,
107
cpu->sve_max_vq = ARM_MAX_VQ;
106
107
len = target_len;
108
this_mr = flatview_translate(fv, addr, &xlat,
109
- &len, is_write);
110
+ &len, is_write, attrs);
111
if (this_mr != mr || xlat != base + done) {
112
return done;
113
}
114
@@ -XXX,XX +XXX,XX @@ void *address_space_map(AddressSpace *as,
115
l = len;
116
rcu_read_lock();
117
fv = address_space_to_flatview(as);
118
- mr = flatview_translate(fv, addr, &xlat, &l, is_write);
119
+ mr = flatview_translate(fv, addr, &xlat, &l, is_write, attrs);
120
121
if (!memory_access_is_direct(mr, is_write)) {
122
if (atomic_xchg(&bounce.in_use, true)) {
123
--
108
--
124
2.17.1
109
2.20.1
125
110
126
111
diff view generated by jsdifflib
1
As part of plumbing MemTxAttrs down to the IOMMU translate method,
1
From: Richard Henderson <richard.henderson@linaro.org>
2
add MemTxAttrs as an argument to flatview_extend_translation().
3
Its callers either have an attrs value to hand, or don't care
4
and can use MEMTXATTRS_UNSPECIFIED.
5
2
3
We can perform this with fewer operations.
4
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 20190108223129.5570-32-richard.henderson@linaro.org
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20180521140402.23318-7-peter.maydell@linaro.org
10
---
9
---
11
exec.c | 15 ++++++++++-----
10
target/arm/translate-a64.c | 62 +++++++++++++-------------------------
12
1 file changed, 10 insertions(+), 5 deletions(-)
11
1 file changed, 21 insertions(+), 41 deletions(-)
13
12
14
diff --git a/exec.c b/exec.c
13
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
15
index XXXXXXX..XXXXXXX 100644
14
index XXXXXXX..XXXXXXX 100644
16
--- a/exec.c
15
--- a/target/arm/translate-a64.c
17
+++ b/exec.c
16
+++ b/target/arm/translate-a64.c
18
@@ -XXX,XX +XXX,XX @@ bool address_space_access_valid(AddressSpace *as, hwaddr addr,
17
@@ -XXX,XX +XXX,XX @@ void gen_a64_set_pc_im(uint64_t val)
19
18
/* Load the PC from a generic TCG variable.
20
static hwaddr
19
*
21
flatview_extend_translation(FlatView *fv, hwaddr addr,
20
* If address tagging is enabled via the TCR TBI bits, then loading
22
- hwaddr target_len,
21
- * an address into the PC will clear out any tag in the it:
23
- MemoryRegion *mr, hwaddr base, hwaddr len,
22
+ * an address into the PC will clear out any tag in it:
24
- bool is_write)
23
* + for EL2 and EL3 there is only one TBI bit, and if it is set
25
+ hwaddr target_len,
24
* then the address is zero-extended, clearing bits [63:56]
26
+ MemoryRegion *mr, hwaddr base, hwaddr len,
25
* + for EL0 and EL1, TBI0 controls addresses with bit 55 == 0
27
+ bool is_write, MemTxAttrs attrs)
26
@@ -XXX,XX +XXX,XX @@ static void gen_a64_set_pc(DisasContext *s, TCGv_i64 src)
28
{
27
int tbi = s->tbii;
29
hwaddr done = 0;
28
30
hwaddr xlat;
29
if (s->current_el <= 1) {
31
@@ -XXX,XX +XXX,XX @@ void *address_space_map(AddressSpace *as,
30
- /* Test if NEITHER or BOTH TBI values are set. If so, no need to
32
31
- * examine bit 55 of address, can just generate code.
33
memory_region_ref(mr);
32
- * If mixed, then test via generated code
34
*plen = flatview_extend_translation(fv, addr, len, mr, xlat,
33
- */
35
- l, is_write);
34
- if (tbi == 3) {
36
+ l, is_write, attrs);
35
- TCGv_i64 tmp_reg = tcg_temp_new_i64();
37
ptr = qemu_ram_ptr_length(mr->ram_block, xlat, plen, true);
36
- /* Both bits set, sign extension from bit 55 into [63:56] will
38
rcu_read_unlock();
37
- * cover both cases
39
38
- */
40
@@ -XXX,XX +XXX,XX @@ int64_t address_space_cache_init(MemoryRegionCache *cache,
39
- tcg_gen_shli_i64(tmp_reg, src, 8);
41
mr = cache->mrs.mr;
40
- tcg_gen_sari_i64(cpu_pc, tmp_reg, 8);
42
memory_region_ref(mr);
41
- tcg_temp_free_i64(tmp_reg);
43
if (memory_access_is_direct(mr, is_write)) {
42
- } else if (tbi == 0) {
44
+ /* We don't care about the memory attributes here as we're only
43
- /* Neither bit set, just load it as-is */
45
+ * doing this if we found actual RAM, which behaves the same
44
- tcg_gen_mov_i64(cpu_pc, src);
46
+ * regardless of attributes; so UNSPECIFIED is fine.
45
- } else {
47
+ */
46
- TCGv_i64 tcg_tmpval = tcg_temp_new_i64();
48
l = flatview_extend_translation(cache->fv, addr, len, mr,
47
- TCGv_i64 tcg_bit55 = tcg_temp_new_i64();
49
- cache->xlat, l, is_write);
48
- TCGv_i64 tcg_zero = tcg_const_i64(0);
50
+ cache->xlat, l, is_write,
49
+ if (tbi != 0) {
51
+ MEMTXATTRS_UNSPECIFIED);
50
+ /* Sign-extend from bit 55. */
52
cache->ptr = qemu_ram_ptr_length(mr->ram_block, cache->xlat, &l, true);
51
+ tcg_gen_sextract_i64(cpu_pc, src, 0, 56);
53
} else {
52
54
cache->ptr = NULL;
53
- tcg_gen_andi_i64(tcg_bit55, src, (1ull << 55));
54
+ if (tbi != 3) {
55
+ TCGv_i64 tcg_zero = tcg_const_i64(0);
56
57
- if (tbi == 1) {
58
- /* tbi0==1, tbi1==0, so 0-fill upper byte if bit 55 = 0 */
59
- tcg_gen_andi_i64(tcg_tmpval, src,
60
- 0x00FFFFFFFFFFFFFFull);
61
- tcg_gen_movcond_i64(TCG_COND_EQ, cpu_pc, tcg_bit55, tcg_zero,
62
- tcg_tmpval, src);
63
- } else {
64
- /* tbi0==0, tbi1==1, so 1-fill upper byte if bit 55 = 1 */
65
- tcg_gen_ori_i64(tcg_tmpval, src,
66
- 0xFF00000000000000ull);
67
- tcg_gen_movcond_i64(TCG_COND_NE, cpu_pc, tcg_bit55, tcg_zero,
68
- tcg_tmpval, src);
69
+ /*
70
+ * The two TBI bits differ.
71
+ * If tbi0, then !tbi1: only use the extension if positive.
72
+ * if !tbi0, then tbi1: only use the extension if negative.
73
+ */
74
+ tcg_gen_movcond_i64(tbi == 1 ? TCG_COND_GE : TCG_COND_LT,
75
+ cpu_pc, cpu_pc, tcg_zero, cpu_pc, src);
76
+ tcg_temp_free_i64(tcg_zero);
77
}
78
- tcg_temp_free_i64(tcg_zero);
79
- tcg_temp_free_i64(tcg_bit55);
80
- tcg_temp_free_i64(tcg_tmpval);
81
+ return;
82
}
83
- } else { /* EL > 1 */
84
+ } else {
85
if (tbi != 0) {
86
/* Force tag byte to all zero */
87
- tcg_gen_andi_i64(cpu_pc, src, 0x00FFFFFFFFFFFFFFull);
88
- } else {
89
- /* Load unmodified address */
90
- tcg_gen_mov_i64(cpu_pc, src);
91
+ tcg_gen_extract_i64(cpu_pc, src, 0, 56);
92
+ return;
93
}
94
}
95
+
96
+ /* Load unmodified address */
97
+ tcg_gen_mov_i64(cpu_pc, src);
98
}
99
100
typedef struct DisasCompare64 {
55
--
101
--
56
2.17.1
102
2.20.1
57
103
58
104
diff view generated by jsdifflib
1
Provide a VMSTATE_BOOL_SUB_ARRAY to go with VMSTATE_UINT8_SUB_ARRAY
1
From: Aaron Lindsay <aaron@os.amperecomputing.com>
2
and friends.
3
2
3
In some cases it may be helpful to modify state before saving it for
4
migration, and then modify the state back after it has been saved. The
5
existing pre_save function provides half of this functionality. This
6
patch adds a post_save function to provide the second half.
7
8
Signed-off-by: Aaron Lindsay <aclindsa@gmail.com>
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
11
Message-id: 20181211151945.29137-2-aaron@os.amperecomputing.com
4
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
5
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
6
Message-id: 20180521140402.23318-23-peter.maydell@linaro.org
7
---
13
---
8
include/migration/vmstate.h | 3 +++
14
include/migration/vmstate.h | 1 +
9
1 file changed, 3 insertions(+)
15
migration/vmstate.c | 13 ++++++++++++-
16
docs/devel/migration.rst | 9 +++++++--
17
3 files changed, 20 insertions(+), 3 deletions(-)
10
18
11
diff --git a/include/migration/vmstate.h b/include/migration/vmstate.h
19
diff --git a/include/migration/vmstate.h b/include/migration/vmstate.h
12
index XXXXXXX..XXXXXXX 100644
20
index XXXXXXX..XXXXXXX 100644
13
--- a/include/migration/vmstate.h
21
--- a/include/migration/vmstate.h
14
+++ b/include/migration/vmstate.h
22
+++ b/include/migration/vmstate.h
15
@@ -XXX,XX +XXX,XX @@ extern const VMStateInfo vmstate_info_qtailq;
23
@@ -XXX,XX +XXX,XX @@ struct VMStateDescription {
16
#define VMSTATE_BOOL_ARRAY(_f, _s, _n) \
24
int (*pre_load)(void *opaque);
17
VMSTATE_BOOL_ARRAY_V(_f, _s, _n, 0)
25
int (*post_load)(void *opaque, int version_id);
18
26
int (*pre_save)(void *opaque);
19
+#define VMSTATE_BOOL_SUB_ARRAY(_f, _s, _start, _num) \
27
+ int (*post_save)(void *opaque);
20
+ VMSTATE_SUB_ARRAY(_f, _s, _start, _num, 0, vmstate_info_bool, bool)
28
bool (*needed)(void *opaque);
29
const VMStateField *fields;
30
const VMStateDescription **subsections;
31
diff --git a/migration/vmstate.c b/migration/vmstate.c
32
index XXXXXXX..XXXXXXX 100644
33
--- a/migration/vmstate.c
34
+++ b/migration/vmstate.c
35
@@ -XXX,XX +XXX,XX @@ int vmstate_save_state_v(QEMUFile *f, const VMStateDescription *vmsd,
36
if (ret) {
37
error_report("Save of field %s/%s failed",
38
vmsd->name, field->name);
39
+ if (vmsd->post_save) {
40
+ vmsd->post_save(opaque);
41
+ }
42
return ret;
43
}
44
45
@@ -XXX,XX +XXX,XX @@ int vmstate_save_state_v(QEMUFile *f, const VMStateDescription *vmsd,
46
json_end_array(vmdesc);
47
}
48
49
- return vmstate_subsection_save(f, vmsd, opaque, vmdesc);
50
+ ret = vmstate_subsection_save(f, vmsd, opaque, vmdesc);
21
+
51
+
22
#define VMSTATE_UINT16_ARRAY_V(_f, _s, _n, _v) \
52
+ if (vmsd->post_save) {
23
VMSTATE_ARRAY(_f, _s, _n, _v, vmstate_info_uint16, uint16_t)
53
+ int ps_ret = vmsd->post_save(opaque);
24
54
+ if (!ret) {
55
+ ret = ps_ret;
56
+ }
57
+ }
58
+ return ret;
59
}
60
61
static const VMStateDescription *
62
diff --git a/docs/devel/migration.rst b/docs/devel/migration.rst
63
index XXXXXXX..XXXXXXX 100644
64
--- a/docs/devel/migration.rst
65
+++ b/docs/devel/migration.rst
66
@@ -XXX,XX +XXX,XX @@ The functions to do that are inside a vmstate definition, and are called:
67
68
This function is called before we save the state of one device.
69
70
-Example: You can look at hpet.c, that uses the three function to
71
-massage the state that is transferred.
72
+- ``int (*post_save)(void *opaque);``
73
+
74
+ This function is called after we save the state of one device
75
+ (even upon failure, unless the call to pre_save returned an error).
76
+
77
+Example: You can look at hpet.c, that uses the first three functions
78
+to massage the state that is transferred.
79
80
The ``VMSTATE_WITH_TMP`` macro may be useful when the migration
81
data doesn't match the stored device data well; it allows an
25
--
82
--
26
2.17.1
83
2.20.1
27
84
28
85
diff view generated by jsdifflib
New patch
1
1
From: Aaron Lindsay <aaron@os.amperecomputing.com>
2
3
pmccntr_read and pmccntr_write contained duplicate code that was already
4
being handled by pmccntr_sync. Consolidate the duplicated code into two
5
functions: pmccntr_op_start and pmccntr_op_finish. Add a companion to
6
c15_ccnt in CPUARMState so that we can simultaneously save both the
7
architectural register value and the last underlying cycle count - this
8
ensures time isn't lost and will also allow us to access the 'old'
9
architectural register value in order to detect overflows in later
10
patches.
11
12
Signed-off-by: Aaron Lindsay <alindsay@codeaurora.org>
13
Signed-off-by: Aaron Lindsay <aclindsa@gmail.com>
14
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
15
Message-id: 20181211151945.29137-3-aaron@os.amperecomputing.com
16
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
---
18
target/arm/cpu.h | 37 +++++++++++---
19
target/arm/helper.c | 118 ++++++++++++++++++++++++++------------------
20
2 files changed, 100 insertions(+), 55 deletions(-)
21
22
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
23
index XXXXXXX..XXXXXXX 100644
24
--- a/target/arm/cpu.h
25
+++ b/target/arm/cpu.h
26
@@ -XXX,XX +XXX,XX @@ typedef struct CPUARMState {
27
uint64_t oslsr_el1; /* OS Lock Status */
28
uint64_t mdcr_el2;
29
uint64_t mdcr_el3;
30
- /* If the counter is enabled, this stores the last time the counter
31
- * was reset. Otherwise it stores the counter value
32
+ /* Stores the architectural value of the counter *the last time it was
33
+ * updated* by pmccntr_op_start. Accesses should always be surrounded
34
+ * by pmccntr_op_start/pmccntr_op_finish to guarantee the latest
35
+ * architecturally-correct value is being read/set.
36
*/
37
uint64_t c15_ccnt;
38
+ /* Stores the delta between the architectural value and the underlying
39
+ * cycle count during normal operation. It is used to update c15_ccnt
40
+ * to be the correct architectural value before accesses. During
41
+ * accesses, c15_ccnt_delta contains the underlying count being used
42
+ * for the access, after which it reverts to the delta value in
43
+ * pmccntr_op_finish.
44
+ */
45
+ uint64_t c15_ccnt_delta;
46
uint64_t pmccfiltr_el0; /* Performance Monitor Filter Register */
47
uint64_t vpidr_el2; /* Virtualization Processor ID Register */
48
uint64_t vmpidr_el2; /* Virtualization Multiprocessor ID Register */
49
@@ -XXX,XX +XXX,XX @@ int cpu_arm_signal_handler(int host_signum, void *pinfo,
50
void *puc);
51
52
/**
53
- * pmccntr_sync
54
+ * pmccntr_op_start/finish
55
* @env: CPUARMState
56
*
57
- * Synchronises the counter in the PMCCNTR. This must always be called twice,
58
- * once before any action that might affect the timer and again afterwards.
59
- * The function is used to swap the state of the register if required.
60
- * This only happens when not in user mode (!CONFIG_USER_ONLY)
61
+ * Convert the counter in the PMCCNTR between its delta form (the typical mode
62
+ * when it's enabled) and the guest-visible value. These two calls must always
63
+ * surround any action which might affect the counter.
64
*/
65
-void pmccntr_sync(CPUARMState *env);
66
+void pmccntr_op_start(CPUARMState *env);
67
+void pmccntr_op_finish(CPUARMState *env);
68
+
69
+/**
70
+ * pmu_op_start/finish
71
+ * @env: CPUARMState
72
+ *
73
+ * Convert all PMU counters between their delta form (the typical mode when
74
+ * they are enabled) and the guest-visible values. These two calls must
75
+ * surround any action which might affect the counters.
76
+ */
77
+void pmu_op_start(CPUARMState *env);
78
+void pmu_op_finish(CPUARMState *env);
79
80
/* SCTLR bit meanings. Several bits have been reused in newer
81
* versions of the architecture; in that case we define constants
82
diff --git a/target/arm/helper.c b/target/arm/helper.c
83
index XXXXXXX..XXXXXXX 100644
84
--- a/target/arm/helper.c
85
+++ b/target/arm/helper.c
86
@@ -XXX,XX +XXX,XX @@ static inline bool arm_ccnt_enabled(CPUARMState *env)
87
88
return true;
89
}
90
-
91
-void pmccntr_sync(CPUARMState *env)
92
+/*
93
+ * Ensure c15_ccnt is the guest-visible count so that operations such as
94
+ * enabling/disabling the counter or filtering, modifying the count itself,
95
+ * etc. can be done logically. This is essentially a no-op if the counter is
96
+ * not enabled at the time of the call.
97
+ */
98
+void pmccntr_op_start(CPUARMState *env)
99
{
100
- uint64_t temp_ticks;
101
-
102
- temp_ticks = muldiv64(qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL),
103
+ uint64_t cycles = 0;
104
+ cycles = muldiv64(qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL),
105
ARM_CPU_FREQ, NANOSECONDS_PER_SECOND);
106
107
- if (env->cp15.c9_pmcr & PMCRD) {
108
- /* Increment once every 64 processor clock cycles */
109
- temp_ticks /= 64;
110
- }
111
-
112
if (arm_ccnt_enabled(env)) {
113
- env->cp15.c15_ccnt = temp_ticks - env->cp15.c15_ccnt;
114
+ uint64_t eff_cycles = cycles;
115
+ if (env->cp15.c9_pmcr & PMCRD) {
116
+ /* Increment once every 64 processor clock cycles */
117
+ eff_cycles /= 64;
118
+ }
119
+
120
+ env->cp15.c15_ccnt = eff_cycles - env->cp15.c15_ccnt_delta;
121
}
122
+ env->cp15.c15_ccnt_delta = cycles;
123
+}
124
+
125
+/*
126
+ * If PMCCNTR is enabled, recalculate the delta between the clock and the
127
+ * guest-visible count. A call to pmccntr_op_finish should follow every call to
128
+ * pmccntr_op_start.
129
+ */
130
+void pmccntr_op_finish(CPUARMState *env)
131
+{
132
+ if (arm_ccnt_enabled(env)) {
133
+ uint64_t prev_cycles = env->cp15.c15_ccnt_delta;
134
+
135
+ if (env->cp15.c9_pmcr & PMCRD) {
136
+ /* Increment once every 64 processor clock cycles */
137
+ prev_cycles /= 64;
138
+ }
139
+
140
+ env->cp15.c15_ccnt_delta = prev_cycles - env->cp15.c15_ccnt;
141
+ }
142
+}
143
+
144
+void pmu_op_start(CPUARMState *env)
145
+{
146
+ pmccntr_op_start(env);
147
+}
148
+
149
+void pmu_op_finish(CPUARMState *env)
150
+{
151
+ pmccntr_op_finish(env);
152
}
153
154
static void pmcr_write(CPUARMState *env, const ARMCPRegInfo *ri,
155
uint64_t value)
156
{
157
- pmccntr_sync(env);
158
+ pmu_op_start(env);
159
160
if (value & PMCRC) {
161
/* The counter has been reset */
162
@@ -XXX,XX +XXX,XX @@ static void pmcr_write(CPUARMState *env, const ARMCPRegInfo *ri,
163
env->cp15.c9_pmcr &= ~0x39;
164
env->cp15.c9_pmcr |= (value & 0x39);
165
166
- pmccntr_sync(env);
167
+ pmu_op_finish(env);
168
}
169
170
static uint64_t pmccntr_read(CPUARMState *env, const ARMCPRegInfo *ri)
171
{
172
- uint64_t total_ticks;
173
-
174
- if (!arm_ccnt_enabled(env)) {
175
- /* Counter is disabled, do not change value */
176
- return env->cp15.c15_ccnt;
177
- }
178
-
179
- total_ticks = muldiv64(qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL),
180
- ARM_CPU_FREQ, NANOSECONDS_PER_SECOND);
181
-
182
- if (env->cp15.c9_pmcr & PMCRD) {
183
- /* Increment once every 64 processor clock cycles */
184
- total_ticks /= 64;
185
- }
186
- return total_ticks - env->cp15.c15_ccnt;
187
+ uint64_t ret;
188
+ pmccntr_op_start(env);
189
+ ret = env->cp15.c15_ccnt;
190
+ pmccntr_op_finish(env);
191
+ return ret;
192
}
193
194
static void pmselr_write(CPUARMState *env, const ARMCPRegInfo *ri,
195
@@ -XXX,XX +XXX,XX @@ static void pmselr_write(CPUARMState *env, const ARMCPRegInfo *ri,
196
static void pmccntr_write(CPUARMState *env, const ARMCPRegInfo *ri,
197
uint64_t value)
198
{
199
- uint64_t total_ticks;
200
-
201
- if (!arm_ccnt_enabled(env)) {
202
- /* Counter is disabled, set the absolute value */
203
- env->cp15.c15_ccnt = value;
204
- return;
205
- }
206
-
207
- total_ticks = muldiv64(qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL),
208
- ARM_CPU_FREQ, NANOSECONDS_PER_SECOND);
209
-
210
- if (env->cp15.c9_pmcr & PMCRD) {
211
- /* Increment once every 64 processor clock cycles */
212
- total_ticks /= 64;
213
- }
214
- env->cp15.c15_ccnt = total_ticks - value;
215
+ pmccntr_op_start(env);
216
+ env->cp15.c15_ccnt = value;
217
+ pmccntr_op_finish(env);
218
}
219
220
static void pmccntr_write32(CPUARMState *env, const ARMCPRegInfo *ri,
221
@@ -XXX,XX +XXX,XX @@ static void pmccntr_write32(CPUARMState *env, const ARMCPRegInfo *ri,
222
223
#else /* CONFIG_USER_ONLY */
224
225
-void pmccntr_sync(CPUARMState *env)
226
+void pmccntr_op_start(CPUARMState *env)
227
+{
228
+}
229
+
230
+void pmccntr_op_finish(CPUARMState *env)
231
+{
232
+}
233
+
234
+void pmu_op_start(CPUARMState *env)
235
+{
236
+}
237
+
238
+void pmu_op_finish(CPUARMState *env)
239
{
240
}
241
242
@@ -XXX,XX +XXX,XX @@ void pmccntr_sync(CPUARMState *env)
243
static void pmccfiltr_write(CPUARMState *env, const ARMCPRegInfo *ri,
244
uint64_t value)
245
{
246
- pmccntr_sync(env);
247
+ pmccntr_op_start(env);
248
env->cp15.pmccfiltr_el0 = value & 0xfc000000;
249
- pmccntr_sync(env);
250
+ pmccntr_op_finish(env);
251
}
252
253
static void pmcntenset_write(CPUARMState *env, const ARMCPRegInfo *ri,
254
--
255
2.20.1
256
257
diff view generated by jsdifflib
1
As part of plumbing MemTxAttrs down to the IOMMU translate method,
1
From: Aaron Lindsay <aaron@os.amperecomputing.com>
2
add MemTxAttrs as an argument to address_space_access_valid().
3
Its callers either have an attrs value to hand, or don't care
4
and can use MEMTXATTRS_UNSPECIFIED.
5
2
3
Because of the PMU's design, many register accesses have side effects
4
which are inter-related, meaning that the normal method of saving CP
5
registers can result in inconsistent state. These side-effects are
6
largely handled in pmu_op_start/finish functions which can be called
7
before and after the state is saved/restored. By doing this and adding
8
raw read/write functions for the affected registers, we avoid
9
migration-related inconsistencies.
10
11
Signed-off-by: Aaron Lindsay <aclindsa@gmail.com>
12
Signed-off-by: Aaron Lindsay <aaron@os.amperecomputing.com>
13
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
14
Message-id: 20181211151945.29137-4-aaron@os.amperecomputing.com
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20180521140402.23318-6-peter.maydell@linaro.org
10
---
16
---
11
include/exec/memory.h | 4 +++-
17
target/arm/helper.c | 6 ++++--
12
include/sysemu/dma.h | 3 ++-
18
target/arm/machine.c | 24 ++++++++++++++++++++++++
13
exec.c | 3 ++-
19
2 files changed, 28 insertions(+), 2 deletions(-)
14
target/s390x/diag.c | 6 ++++--
15
target/s390x/excp_helper.c | 3 ++-
16
target/s390x/mmu_helper.c | 3 ++-
17
target/s390x/sigp.c | 3 ++-
18
7 files changed, 17 insertions(+), 8 deletions(-)
19
20
20
diff --git a/include/exec/memory.h b/include/exec/memory.h
21
diff --git a/target/arm/helper.c b/target/arm/helper.c
21
index XXXXXXX..XXXXXXX 100644
22
index XXXXXXX..XXXXXXX 100644
22
--- a/include/exec/memory.h
23
--- a/target/arm/helper.c
23
+++ b/include/exec/memory.h
24
+++ b/target/arm/helper.c
24
@@ -XXX,XX +XXX,XX @@ static inline MemoryRegion *address_space_translate(AddressSpace *as,
25
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v7_cp_reginfo[] = {
25
* @addr: address within that address space
26
.opc0 = 3, .opc1 = 3, .crn = 9, .crm = 13, .opc2 = 0,
26
* @len: length of the area to be checked
27
.access = PL0_RW, .accessfn = pmreg_access_ccntr,
27
* @is_write: indicates the transfer direction
28
.type = ARM_CP_IO,
28
+ * @attrs: memory attributes
29
- .readfn = pmccntr_read, .writefn = pmccntr_write, },
29
*/
30
+ .fieldoffset = offsetof(CPUARMState, cp15.c15_ccnt),
30
-bool address_space_access_valid(AddressSpace *as, hwaddr addr, int len, bool is_write);
31
+ .readfn = pmccntr_read, .writefn = pmccntr_write,
31
+bool address_space_access_valid(AddressSpace *as, hwaddr addr, int len,
32
+ .raw_readfn = raw_read, .raw_writefn = raw_write, },
32
+ bool is_write, MemTxAttrs attrs);
33
#endif
33
34
{ .name = "PMCCFILTR_EL0", .state = ARM_CP_STATE_AA64,
34
/* address_space_map: map a physical memory region into a host virtual address
35
.opc0 = 3, .opc1 = 3, .crn = 14, .crm = 15, .opc2 = 7,
35
*
36
- .writefn = pmccfiltr_write,
36
diff --git a/include/sysemu/dma.h b/include/sysemu/dma.h
37
+ .writefn = pmccfiltr_write, .raw_writefn = raw_write,
38
.access = PL0_RW, .accessfn = pmreg_access,
39
.type = ARM_CP_IO,
40
.fieldoffset = offsetof(CPUARMState, cp15.pmccfiltr_el0),
41
diff --git a/target/arm/machine.c b/target/arm/machine.c
37
index XXXXXXX..XXXXXXX 100644
42
index XXXXXXX..XXXXXXX 100644
38
--- a/include/sysemu/dma.h
43
--- a/target/arm/machine.c
39
+++ b/include/sysemu/dma.h
44
+++ b/target/arm/machine.c
40
@@ -XXX,XX +XXX,XX @@ static inline bool dma_memory_valid(AddressSpace *as,
45
@@ -XXX,XX +XXX,XX @@ static int cpu_pre_save(void *opaque)
41
DMADirection dir)
42
{
46
{
43
return address_space_access_valid(as, addr, len,
47
ARMCPU *cpu = opaque;
44
- dir == DMA_DIRECTION_FROM_DEVICE);
48
45
+ dir == DMA_DIRECTION_FROM_DEVICE,
49
+ if (!kvm_enabled()) {
46
+ MEMTXATTRS_UNSPECIFIED);
50
+ pmu_op_start(&cpu->env);
51
+ }
52
+
53
if (kvm_enabled()) {
54
if (!write_kvmstate_to_list(cpu)) {
55
/* This should never fail */
56
@@ -XXX,XX +XXX,XX @@ static int cpu_pre_save(void *opaque)
57
return 0;
47
}
58
}
48
59
49
static inline int dma_memory_rw_relaxed(AddressSpace *as, dma_addr_t addr,
60
+static int cpu_post_save(void *opaque)
50
diff --git a/exec.c b/exec.c
61
+{
51
index XXXXXXX..XXXXXXX 100644
62
+ ARMCPU *cpu = opaque;
52
--- a/exec.c
63
+
53
+++ b/exec.c
64
+ if (!kvm_enabled()) {
54
@@ -XXX,XX +XXX,XX @@ static bool flatview_access_valid(FlatView *fv, hwaddr addr, int len,
65
+ pmu_op_finish(&cpu->env);
66
+ }
67
+
68
+ return 0;
69
+}
70
+
71
static int cpu_pre_load(void *opaque)
72
{
73
ARMCPU *cpu = opaque;
74
@@ -XXX,XX +XXX,XX @@ static int cpu_pre_load(void *opaque)
75
*/
76
env->irq_line_state = UINT32_MAX;
77
78
+ if (!kvm_enabled()) {
79
+ pmu_op_start(&cpu->env);
80
+ }
81
+
82
return 0;
55
}
83
}
56
84
57
bool address_space_access_valid(AddressSpace *as, hwaddr addr,
85
@@ -XXX,XX +XXX,XX @@ static int cpu_post_load(void *opaque, int version_id)
58
- int len, bool is_write)
86
hw_breakpoint_update_all(cpu);
59
+ int len, bool is_write,
87
hw_watchpoint_update_all(cpu);
60
+ MemTxAttrs attrs)
88
61
{
89
+ if (!kvm_enabled()) {
62
FlatView *fv;
90
+ pmu_op_finish(&cpu->env);
63
bool result;
91
+ }
64
diff --git a/target/s390x/diag.c b/target/s390x/diag.c
92
+
65
index XXXXXXX..XXXXXXX 100644
93
return 0;
66
--- a/target/s390x/diag.c
94
}
67
+++ b/target/s390x/diag.c
95
68
@@ -XXX,XX +XXX,XX @@ void handle_diag_308(CPUS390XState *env, uint64_t r1, uint64_t r3, uintptr_t ra)
96
@@ -XXX,XX +XXX,XX @@ const VMStateDescription vmstate_arm_cpu = {
69
return;
97
.version_id = 22,
70
}
98
.minimum_version_id = 22,
71
if (!address_space_access_valid(&address_space_memory, addr,
99
.pre_save = cpu_pre_save,
72
- sizeof(IplParameterBlock), false)) {
100
+ .post_save = cpu_post_save,
73
+ sizeof(IplParameterBlock), false,
101
.pre_load = cpu_pre_load,
74
+ MEMTXATTRS_UNSPECIFIED)) {
102
.post_load = cpu_post_load,
75
s390_program_interrupt(env, PGM_ADDRESSING, ILEN_AUTO, ra);
103
.fields = (VMStateField[]) {
76
return;
77
}
78
@@ -XXX,XX +XXX,XX @@ out:
79
return;
80
}
81
if (!address_space_access_valid(&address_space_memory, addr,
82
- sizeof(IplParameterBlock), true)) {
83
+ sizeof(IplParameterBlock), true,
84
+ MEMTXATTRS_UNSPECIFIED)) {
85
s390_program_interrupt(env, PGM_ADDRESSING, ILEN_AUTO, ra);
86
return;
87
}
88
diff --git a/target/s390x/excp_helper.c b/target/s390x/excp_helper.c
89
index XXXXXXX..XXXXXXX 100644
90
--- a/target/s390x/excp_helper.c
91
+++ b/target/s390x/excp_helper.c
92
@@ -XXX,XX +XXX,XX @@ int s390_cpu_handle_mmu_fault(CPUState *cs, vaddr orig_vaddr, int size,
93
94
/* check out of RAM access */
95
if (!address_space_access_valid(&address_space_memory, raddr,
96
- TARGET_PAGE_SIZE, rw)) {
97
+ TARGET_PAGE_SIZE, rw,
98
+ MEMTXATTRS_UNSPECIFIED)) {
99
DPRINTF("%s: raddr %" PRIx64 " > ram_size %" PRIx64 "\n", __func__,
100
(uint64_t)raddr, (uint64_t)ram_size);
101
trigger_pgm_exception(env, PGM_ADDRESSING, ILEN_AUTO);
102
diff --git a/target/s390x/mmu_helper.c b/target/s390x/mmu_helper.c
103
index XXXXXXX..XXXXXXX 100644
104
--- a/target/s390x/mmu_helper.c
105
+++ b/target/s390x/mmu_helper.c
106
@@ -XXX,XX +XXX,XX @@ static int translate_pages(S390CPU *cpu, vaddr addr, int nr_pages,
107
return ret;
108
}
109
if (!address_space_access_valid(&address_space_memory, pages[i],
110
- TARGET_PAGE_SIZE, is_write)) {
111
+ TARGET_PAGE_SIZE, is_write,
112
+ MEMTXATTRS_UNSPECIFIED)) {
113
trigger_access_exception(env, PGM_ADDRESSING, ILEN_AUTO, 0);
114
return -EFAULT;
115
}
116
diff --git a/target/s390x/sigp.c b/target/s390x/sigp.c
117
index XXXXXXX..XXXXXXX 100644
118
--- a/target/s390x/sigp.c
119
+++ b/target/s390x/sigp.c
120
@@ -XXX,XX +XXX,XX @@ static void sigp_set_prefix(CPUState *cs, run_on_cpu_data arg)
121
cpu_synchronize_state(cs);
122
123
if (!address_space_access_valid(&address_space_memory, addr,
124
- sizeof(struct LowCore), false)) {
125
+ sizeof(struct LowCore), false,
126
+ MEMTXATTRS_UNSPECIFIED)) {
127
set_sigp_status(si, SIGP_STAT_INVALID_PARAMETER);
128
return;
129
}
130
--
104
--
131
2.17.1
105
2.20.1
132
106
133
107
diff view generated by jsdifflib
New patch
1
1
From: Aaron Lindsay <aaron@os.amperecomputing.com>
2
3
Rename arm_ccnt_enabled to pmu_counter_enabled, and add logic to only
4
return 'true' if the specified counter is enabled and neither prohibited
5
or filtered.
6
7
Signed-off-by: Aaron Lindsay <alindsay@codeaurora.org>
8
Signed-off-by: Aaron Lindsay <aclindsa@gmail.com>
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
11
Message-id: 20181211151945.29137-5-aaron@os.amperecomputing.com
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
---
14
target/arm/cpu.h | 10 ++++-
15
target/arm/cpu.c | 3 ++
16
target/arm/helper.c | 96 +++++++++++++++++++++++++++++++++++++++++----
17
3 files changed, 101 insertions(+), 8 deletions(-)
18
19
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
20
index XXXXXXX..XXXXXXX 100644
21
--- a/target/arm/cpu.h
22
+++ b/target/arm/cpu.h
23
@@ -XXX,XX +XXX,XX @@ void pmccntr_op_finish(CPUARMState *env);
24
void pmu_op_start(CPUARMState *env);
25
void pmu_op_finish(CPUARMState *env);
26
27
+/**
28
+ * Functions to register as EL change hooks for PMU mode filtering
29
+ */
30
+void pmu_pre_el_change(ARMCPU *cpu, void *ignored);
31
+void pmu_post_el_change(ARMCPU *cpu, void *ignored);
32
+
33
/* SCTLR bit meanings. Several bits have been reused in newer
34
* versions of the architecture; in that case we define constants
35
* for both old and new bit meanings. Code which tests against those
36
@@ -XXX,XX +XXX,XX @@ void pmu_op_finish(CPUARMState *env);
37
38
#define MDCR_EPMAD (1U << 21)
39
#define MDCR_EDAD (1U << 20)
40
-#define MDCR_SPME (1U << 17)
41
+#define MDCR_SPME (1U << 17) /* MDCR_EL3 */
42
+#define MDCR_HPMD (1U << 17) /* MDCR_EL2 */
43
#define MDCR_SDD (1U << 16)
44
#define MDCR_SPD (3U << 14)
45
#define MDCR_TDRA (1U << 11)
46
@@ -XXX,XX +XXX,XX @@ void pmu_op_finish(CPUARMState *env);
47
#define MDCR_HPME (1U << 7)
48
#define MDCR_TPM (1U << 6)
49
#define MDCR_TPMCR (1U << 5)
50
+#define MDCR_HPMN (0x1fU)
51
52
/* Not all of the MDCR_EL3 bits are present in the 32-bit SDCR */
53
#define SDCR_VALID_MASK (MDCR_EPMAD | MDCR_EDAD | MDCR_SPME | MDCR_SPD)
54
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
55
index XXXXXXX..XXXXXXX 100644
56
--- a/target/arm/cpu.c
57
+++ b/target/arm/cpu.c
58
@@ -XXX,XX +XXX,XX @@ static void arm_cpu_realizefn(DeviceState *dev, Error **errp)
59
if (!cpu->has_pmu) {
60
unset_feature(env, ARM_FEATURE_PMU);
61
cpu->id_aa64dfr0 &= ~0xf00;
62
+ } else if (!kvm_enabled()) {
63
+ arm_register_pre_el_change_hook(cpu, &pmu_pre_el_change, 0);
64
+ arm_register_el_change_hook(cpu, &pmu_post_el_change, 0);
65
}
66
67
if (!arm_feature(env, ARM_FEATURE_EL2)) {
68
diff --git a/target/arm/helper.c b/target/arm/helper.c
69
index XXXXXXX..XXXXXXX 100644
70
--- a/target/arm/helper.c
71
+++ b/target/arm/helper.c
72
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v6_cp_reginfo[] = {
73
/* Definitions for the PMU registers */
74
#define PMCRN_MASK 0xf800
75
#define PMCRN_SHIFT 11
76
+#define PMCRDP 0x10
77
#define PMCRD 0x8
78
#define PMCRC 0x4
79
#define PMCRE 0x1
80
81
+#define PMXEVTYPER_P 0x80000000
82
+#define PMXEVTYPER_U 0x40000000
83
+#define PMXEVTYPER_NSK 0x20000000
84
+#define PMXEVTYPER_NSU 0x10000000
85
+#define PMXEVTYPER_NSH 0x08000000
86
+#define PMXEVTYPER_M 0x04000000
87
+#define PMXEVTYPER_MT 0x02000000
88
+#define PMXEVTYPER_EVTCOUNT 0x0000ffff
89
+#define PMXEVTYPER_MASK (PMXEVTYPER_P | PMXEVTYPER_U | PMXEVTYPER_NSK | \
90
+ PMXEVTYPER_NSU | PMXEVTYPER_NSH | \
91
+ PMXEVTYPER_M | PMXEVTYPER_MT | \
92
+ PMXEVTYPER_EVTCOUNT)
93
+
94
static inline uint32_t pmu_num_counters(CPUARMState *env)
95
{
96
return (env->cp15.c9_pmcr & PMCRN_MASK) >> PMCRN_SHIFT;
97
@@ -XXX,XX +XXX,XX @@ static CPAccessResult pmreg_access_ccntr(CPUARMState *env,
98
return pmreg_access(env, ri, isread);
99
}
100
101
-static inline bool arm_ccnt_enabled(CPUARMState *env)
102
+/* Returns true if the counter (pass 31 for PMCCNTR) should count events using
103
+ * the current EL, security state, and register configuration.
104
+ */
105
+static bool pmu_counter_enabled(CPUARMState *env, uint8_t counter)
106
{
107
- /* This does not support checking PMCCFILTR_EL0 register */
108
+ uint64_t filter;
109
+ bool e, p, u, nsk, nsu, nsh, m;
110
+ bool enabled, prohibited, filtered;
111
+ bool secure = arm_is_secure(env);
112
+ int el = arm_current_el(env);
113
+ uint8_t hpmn = env->cp15.mdcr_el2 & MDCR_HPMN;
114
115
- if (!(env->cp15.c9_pmcr & PMCRE) || !(env->cp15.c9_pmcnten & (1 << 31))) {
116
- return false;
117
+ if (!arm_feature(env, ARM_FEATURE_EL2) ||
118
+ (counter < hpmn || counter == 31)) {
119
+ e = env->cp15.c9_pmcr & PMCRE;
120
+ } else {
121
+ e = env->cp15.mdcr_el2 & MDCR_HPME;
122
+ }
123
+ enabled = e && (env->cp15.c9_pmcnten & (1 << counter));
124
+
125
+ if (!secure) {
126
+ if (el == 2 && (counter < hpmn || counter == 31)) {
127
+ prohibited = env->cp15.mdcr_el2 & MDCR_HPMD;
128
+ } else {
129
+ prohibited = false;
130
+ }
131
+ } else {
132
+ prohibited = arm_feature(env, ARM_FEATURE_EL3) &&
133
+ (env->cp15.mdcr_el3 & MDCR_SPME);
134
}
135
136
- return true;
137
+ if (prohibited && counter == 31) {
138
+ prohibited = env->cp15.c9_pmcr & PMCRDP;
139
+ }
140
+
141
+ /* TODO Remove assert, set filter to correct PMEVTYPER */
142
+ assert(counter == 31);
143
+ filter = env->cp15.pmccfiltr_el0;
144
+
145
+ p = filter & PMXEVTYPER_P;
146
+ u = filter & PMXEVTYPER_U;
147
+ nsk = arm_feature(env, ARM_FEATURE_EL3) && (filter & PMXEVTYPER_NSK);
148
+ nsu = arm_feature(env, ARM_FEATURE_EL3) && (filter & PMXEVTYPER_NSU);
149
+ nsh = arm_feature(env, ARM_FEATURE_EL2) && (filter & PMXEVTYPER_NSH);
150
+ m = arm_el_is_aa64(env, 1) &&
151
+ arm_feature(env, ARM_FEATURE_EL3) && (filter & PMXEVTYPER_M);
152
+
153
+ if (el == 0) {
154
+ filtered = secure ? u : u != nsu;
155
+ } else if (el == 1) {
156
+ filtered = secure ? p : p != nsk;
157
+ } else if (el == 2) {
158
+ filtered = !nsh;
159
+ } else { /* EL3 */
160
+ filtered = m != p;
161
+ }
162
+
163
+ return enabled && !prohibited && !filtered;
164
}
165
+
166
/*
167
* Ensure c15_ccnt is the guest-visible count so that operations such as
168
* enabling/disabling the counter or filtering, modifying the count itself,
169
@@ -XXX,XX +XXX,XX @@ void pmccntr_op_start(CPUARMState *env)
170
cycles = muldiv64(qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL),
171
ARM_CPU_FREQ, NANOSECONDS_PER_SECOND);
172
173
- if (arm_ccnt_enabled(env)) {
174
+ if (pmu_counter_enabled(env, 31)) {
175
uint64_t eff_cycles = cycles;
176
if (env->cp15.c9_pmcr & PMCRD) {
177
/* Increment once every 64 processor clock cycles */
178
@@ -XXX,XX +XXX,XX @@ void pmccntr_op_start(CPUARMState *env)
179
*/
180
void pmccntr_op_finish(CPUARMState *env)
181
{
182
- if (arm_ccnt_enabled(env)) {
183
+ if (pmu_counter_enabled(env, 31)) {
184
uint64_t prev_cycles = env->cp15.c15_ccnt_delta;
185
186
if (env->cp15.c9_pmcr & PMCRD) {
187
@@ -XXX,XX +XXX,XX @@ void pmu_op_finish(CPUARMState *env)
188
pmccntr_op_finish(env);
189
}
190
191
+void pmu_pre_el_change(ARMCPU *cpu, void *ignored)
192
+{
193
+ pmu_op_start(&cpu->env);
194
+}
195
+
196
+void pmu_post_el_change(ARMCPU *cpu, void *ignored)
197
+{
198
+ pmu_op_finish(&cpu->env);
199
+}
200
+
201
static void pmcr_write(CPUARMState *env, const ARMCPRegInfo *ri,
202
uint64_t value)
203
{
204
@@ -XXX,XX +XXX,XX @@ void pmu_op_finish(CPUARMState *env)
205
{
206
}
207
208
+void pmu_pre_el_change(ARMCPU *cpu, void *ignored)
209
+{
210
+}
211
+
212
+void pmu_post_el_change(ARMCPU *cpu, void *ignored)
213
+{
214
+}
215
+
216
#endif
217
218
static void pmccfiltr_write(CPUARMState *env, const ARMCPRegInfo *ri,
219
--
220
2.20.1
221
222
diff view generated by jsdifflib
1
As part of plumbing MemTxAttrs down to the IOMMU translate method,
1
From: Aaron Lindsay <aaron@os.amperecomputing.com>
2
add MemTxAttrs as an argument to address_space_translate()
3
and address_space_translate_cached(). Callers either have an
4
attrs value to hand, or don't care and can use MEMTXATTRS_UNSPECIFIED.
5
2
3
Signed-off-by: Aaron Lindsay <alindsay@codeaurora.org>
4
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
5
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
6
Message-id: 20181211151945.29137-6-aaron@os.amperecomputing.com
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20180521140402.23318-4-peter.maydell@linaro.org
10
---
8
---
11
include/exec/memory.h | 4 +++-
9
target/arm/helper.c | 27 ++++++++++++++++++++++++++-
12
accel/tcg/translate-all.c | 2 +-
10
1 file changed, 26 insertions(+), 1 deletion(-)
13
exec.c | 14 +++++++++-----
14
hw/vfio/common.c | 3 ++-
15
memory_ldst.inc.c | 18 +++++++++---------
16
target/riscv/helper.c | 2 +-
17
6 files changed, 25 insertions(+), 18 deletions(-)
18
11
19
diff --git a/include/exec/memory.h b/include/exec/memory.h
12
diff --git a/target/arm/helper.c b/target/arm/helper.c
20
index XXXXXXX..XXXXXXX 100644
13
index XXXXXXX..XXXXXXX 100644
21
--- a/include/exec/memory.h
14
--- a/target/arm/helper.c
22
+++ b/include/exec/memory.h
15
+++ b/target/arm/helper.c
23
@@ -XXX,XX +XXX,XX @@ IOMMUTLBEntry address_space_get_iotlb_entry(AddressSpace *as, hwaddr addr,
16
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v6_cp_reginfo[] = {
24
* #MemoryRegion.
17
PMXEVTYPER_M | PMXEVTYPER_MT | \
25
* @len: pointer to length
18
PMXEVTYPER_EVTCOUNT)
26
* @is_write: indicates the transfer direction
19
27
+ * @attrs: memory attributes
20
+#define PMCCFILTR 0xf8000000
28
*/
21
+#define PMCCFILTR_M PMXEVTYPER_M
29
MemoryRegion *flatview_translate(FlatView *fv,
22
+#define PMCCFILTR_EL0 (PMCCFILTR | PMCCFILTR_M)
30
hwaddr addr, hwaddr *xlat,
23
+
31
@@ -XXX,XX +XXX,XX @@ MemoryRegion *flatview_translate(FlatView *fv,
24
static inline uint32_t pmu_num_counters(CPUARMState *env)
32
33
static inline MemoryRegion *address_space_translate(AddressSpace *as,
34
hwaddr addr, hwaddr *xlat,
35
- hwaddr *len, bool is_write)
36
+ hwaddr *len, bool is_write,
37
+ MemTxAttrs attrs)
38
{
25
{
39
return flatview_translate(address_space_to_flatview(as),
26
return (env->cp15.c9_pmcr & PMCRN_MASK) >> PMCRN_SHIFT;
40
addr, xlat, len, is_write);
27
@@ -XXX,XX +XXX,XX @@ static void pmccfiltr_write(CPUARMState *env, const ARMCPRegInfo *ri,
41
diff --git a/accel/tcg/translate-all.c b/accel/tcg/translate-all.c
28
uint64_t value)
42
index XXXXXXX..XXXXXXX 100644
43
--- a/accel/tcg/translate-all.c
44
+++ b/accel/tcg/translate-all.c
45
@@ -XXX,XX +XXX,XX @@ void tb_invalidate_phys_addr(AddressSpace *as, hwaddr addr, MemTxAttrs attrs)
46
hwaddr l = 1;
47
48
rcu_read_lock();
49
- mr = address_space_translate(as, addr, &addr, &l, false);
50
+ mr = address_space_translate(as, addr, &addr, &l, false, attrs);
51
if (!(memory_region_is_ram(mr)
52
|| memory_region_is_romd(mr))) {
53
rcu_read_unlock();
54
diff --git a/exec.c b/exec.c
55
index XXXXXXX..XXXXXXX 100644
56
--- a/exec.c
57
+++ b/exec.c
58
@@ -XXX,XX +XXX,XX @@ static inline void cpu_physical_memory_write_rom_internal(AddressSpace *as,
59
rcu_read_lock();
60
while (len > 0) {
61
l = len;
62
- mr = address_space_translate(as, addr, &addr1, &l, true);
63
+ mr = address_space_translate(as, addr, &addr1, &l, true,
64
+ MEMTXATTRS_UNSPECIFIED);
65
66
if (!(memory_region_is_ram(mr) ||
67
memory_region_is_romd(mr))) {
68
@@ -XXX,XX +XXX,XX @@ void address_space_cache_destroy(MemoryRegionCache *cache)
69
*/
70
static inline MemoryRegion *address_space_translate_cached(
71
MemoryRegionCache *cache, hwaddr addr, hwaddr *xlat,
72
- hwaddr *plen, bool is_write)
73
+ hwaddr *plen, bool is_write, MemTxAttrs attrs)
74
{
29
{
75
MemoryRegionSection section;
30
pmccntr_op_start(env);
76
MemoryRegion *mr;
31
- env->cp15.pmccfiltr_el0 = value & 0xfc000000;
77
@@ -XXX,XX +XXX,XX @@ address_space_read_cached_slow(MemoryRegionCache *cache, hwaddr addr,
32
+ env->cp15.pmccfiltr_el0 = value & PMCCFILTR_EL0;
78
MemoryRegion *mr;
33
pmccntr_op_finish(env);
79
34
}
80
l = len;
35
81
- mr = address_space_translate_cached(cache, addr, &addr1, &l, false);
36
+static void pmccfiltr_write_a32(CPUARMState *env, const ARMCPRegInfo *ri,
82
+ mr = address_space_translate_cached(cache, addr, &addr1, &l, false,
37
+ uint64_t value)
83
+ MEMTXATTRS_UNSPECIFIED);
38
+{
84
flatview_read_continue(cache->fv,
39
+ pmccntr_op_start(env);
85
addr, MEMTXATTRS_UNSPECIFIED, buf, len,
40
+ /* M is not accessible from AArch32 */
86
addr1, l, mr);
41
+ env->cp15.pmccfiltr_el0 = (env->cp15.pmccfiltr_el0 & PMCCFILTR_M) |
87
@@ -XXX,XX +XXX,XX @@ address_space_write_cached_slow(MemoryRegionCache *cache, hwaddr addr,
42
+ (value & PMCCFILTR);
88
MemoryRegion *mr;
43
+ pmccntr_op_finish(env);
89
44
+}
90
l = len;
45
+
91
- mr = address_space_translate_cached(cache, addr, &addr1, &l, true);
46
+static uint64_t pmccfiltr_read_a32(CPUARMState *env, const ARMCPRegInfo *ri)
92
+ mr = address_space_translate_cached(cache, addr, &addr1, &l, true,
47
+{
93
+ MEMTXATTRS_UNSPECIFIED);
48
+ /* M is not visible in AArch32 */
94
flatview_write_continue(cache->fv,
49
+ return env->cp15.pmccfiltr_el0 & PMCCFILTR;
95
addr, MEMTXATTRS_UNSPECIFIED, buf, len,
50
+}
96
addr1, l, mr);
51
+
97
@@ -XXX,XX +XXX,XX @@ bool cpu_physical_memory_is_io(hwaddr phys_addr)
52
static void pmcntenset_write(CPUARMState *env, const ARMCPRegInfo *ri,
98
53
uint64_t value)
99
rcu_read_lock();
54
{
100
mr = address_space_translate(&address_space_memory,
55
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v7_cp_reginfo[] = {
101
- phys_addr, &phys_addr, &l, false);
56
.readfn = pmccntr_read, .writefn = pmccntr_write,
102
+ phys_addr, &phys_addr, &l, false,
57
.raw_readfn = raw_read, .raw_writefn = raw_write, },
103
+ MEMTXATTRS_UNSPECIFIED);
58
#endif
104
59
+ { .name = "PMCCFILTR", .cp = 15, .opc1 = 0, .crn = 14, .crm = 15, .opc2 = 7,
105
res = !(memory_region_is_ram(mr) || memory_region_is_romd(mr));
60
+ .writefn = pmccfiltr_write_a32, .readfn = pmccfiltr_read_a32,
106
rcu_read_unlock();
61
+ .access = PL0_RW, .accessfn = pmreg_access,
107
diff --git a/hw/vfio/common.c b/hw/vfio/common.c
62
+ .type = ARM_CP_ALIAS | ARM_CP_IO,
108
index XXXXXXX..XXXXXXX 100644
63
+ .resetvalue = 0, },
109
--- a/hw/vfio/common.c
64
{ .name = "PMCCFILTR_EL0", .state = ARM_CP_STATE_AA64,
110
+++ b/hw/vfio/common.c
65
.opc0 = 3, .opc1 = 3, .crn = 14, .crm = 15, .opc2 = 7,
111
@@ -XXX,XX +XXX,XX @@ static bool vfio_get_vaddr(IOMMUTLBEntry *iotlb, void **vaddr,
66
.writefn = pmccfiltr_write, .raw_writefn = raw_write,
112
*/
113
mr = address_space_translate(&address_space_memory,
114
iotlb->translated_addr,
115
- &xlat, &len, writable);
116
+ &xlat, &len, writable,
117
+ MEMTXATTRS_UNSPECIFIED);
118
if (!memory_region_is_ram(mr)) {
119
error_report("iommu map to non memory area %"HWADDR_PRIx"",
120
xlat);
121
diff --git a/memory_ldst.inc.c b/memory_ldst.inc.c
122
index XXXXXXX..XXXXXXX 100644
123
--- a/memory_ldst.inc.c
124
+++ b/memory_ldst.inc.c
125
@@ -XXX,XX +XXX,XX @@ static inline uint32_t glue(address_space_ldl_internal, SUFFIX)(ARG1_DECL,
126
bool release_lock = false;
127
128
RCU_READ_LOCK();
129
- mr = TRANSLATE(addr, &addr1, &l, false);
130
+ mr = TRANSLATE(addr, &addr1, &l, false, attrs);
131
if (l < 4 || !IS_DIRECT(mr, false)) {
132
release_lock |= prepare_mmio_access(mr);
133
134
@@ -XXX,XX +XXX,XX @@ static inline uint64_t glue(address_space_ldq_internal, SUFFIX)(ARG1_DECL,
135
bool release_lock = false;
136
137
RCU_READ_LOCK();
138
- mr = TRANSLATE(addr, &addr1, &l, false);
139
+ mr = TRANSLATE(addr, &addr1, &l, false, attrs);
140
if (l < 8 || !IS_DIRECT(mr, false)) {
141
release_lock |= prepare_mmio_access(mr);
142
143
@@ -XXX,XX +XXX,XX @@ uint32_t glue(address_space_ldub, SUFFIX)(ARG1_DECL,
144
bool release_lock = false;
145
146
RCU_READ_LOCK();
147
- mr = TRANSLATE(addr, &addr1, &l, false);
148
+ mr = TRANSLATE(addr, &addr1, &l, false, attrs);
149
if (!IS_DIRECT(mr, false)) {
150
release_lock |= prepare_mmio_access(mr);
151
152
@@ -XXX,XX +XXX,XX @@ static inline uint32_t glue(address_space_lduw_internal, SUFFIX)(ARG1_DECL,
153
bool release_lock = false;
154
155
RCU_READ_LOCK();
156
- mr = TRANSLATE(addr, &addr1, &l, false);
157
+ mr = TRANSLATE(addr, &addr1, &l, false, attrs);
158
if (l < 2 || !IS_DIRECT(mr, false)) {
159
release_lock |= prepare_mmio_access(mr);
160
161
@@ -XXX,XX +XXX,XX @@ void glue(address_space_stl_notdirty, SUFFIX)(ARG1_DECL,
162
bool release_lock = false;
163
164
RCU_READ_LOCK();
165
- mr = TRANSLATE(addr, &addr1, &l, true);
166
+ mr = TRANSLATE(addr, &addr1, &l, true, attrs);
167
if (l < 4 || !IS_DIRECT(mr, true)) {
168
release_lock |= prepare_mmio_access(mr);
169
170
@@ -XXX,XX +XXX,XX @@ static inline void glue(address_space_stl_internal, SUFFIX)(ARG1_DECL,
171
bool release_lock = false;
172
173
RCU_READ_LOCK();
174
- mr = TRANSLATE(addr, &addr1, &l, true);
175
+ mr = TRANSLATE(addr, &addr1, &l, true, attrs);
176
if (l < 4 || !IS_DIRECT(mr, true)) {
177
release_lock |= prepare_mmio_access(mr);
178
179
@@ -XXX,XX +XXX,XX @@ void glue(address_space_stb, SUFFIX)(ARG1_DECL,
180
bool release_lock = false;
181
182
RCU_READ_LOCK();
183
- mr = TRANSLATE(addr, &addr1, &l, true);
184
+ mr = TRANSLATE(addr, &addr1, &l, true, attrs);
185
if (!IS_DIRECT(mr, true)) {
186
release_lock |= prepare_mmio_access(mr);
187
r = memory_region_dispatch_write(mr, addr1, val, 1, attrs);
188
@@ -XXX,XX +XXX,XX @@ static inline void glue(address_space_stw_internal, SUFFIX)(ARG1_DECL,
189
bool release_lock = false;
190
191
RCU_READ_LOCK();
192
- mr = TRANSLATE(addr, &addr1, &l, true);
193
+ mr = TRANSLATE(addr, &addr1, &l, true, attrs);
194
if (l < 2 || !IS_DIRECT(mr, true)) {
195
release_lock |= prepare_mmio_access(mr);
196
197
@@ -XXX,XX +XXX,XX @@ static void glue(address_space_stq_internal, SUFFIX)(ARG1_DECL,
198
bool release_lock = false;
199
200
RCU_READ_LOCK();
201
- mr = TRANSLATE(addr, &addr1, &l, true);
202
+ mr = TRANSLATE(addr, &addr1, &l, true, attrs);
203
if (l < 8 || !IS_DIRECT(mr, true)) {
204
release_lock |= prepare_mmio_access(mr);
205
206
diff --git a/target/riscv/helper.c b/target/riscv/helper.c
207
index XXXXXXX..XXXXXXX 100644
208
--- a/target/riscv/helper.c
209
+++ b/target/riscv/helper.c
210
@@ -XXX,XX +XXX,XX @@ restart:
211
MemoryRegion *mr;
212
hwaddr l = sizeof(target_ulong), addr1;
213
mr = address_space_translate(cs->as, pte_addr,
214
- &addr1, &l, false);
215
+ &addr1, &l, false, MEMTXATTRS_UNSPECIFIED);
216
if (memory_access_is_direct(mr, true)) {
217
target_ulong *pte_pa =
218
qemu_map_ram_ptr(mr->ram_block, addr1);
219
--
67
--
220
2.17.1
68
2.20.1
221
69
222
70
diff view generated by jsdifflib
1
In commit f0aff255700 we made cpacr_write() enforce that some CPACR
1
From: Aaron Lindsay <aaron@os.amperecomputing.com>
2
bits are RAZ/WI and some are RAO/WI for ARMv7 cores. Unfortunately
3
we forgot to also update the register's reset value. The effect
4
was that (a) a guest that read CPACR on reset would not see ones in
5
the RAO bits, and (b) if you did a migration before the guest did
6
a write to the CPACR then the migration would fail because the
7
destination would enforce the RAO bits and then complain that they
8
didn't match the zero value from the source.
9
2
10
Implement reset for the CPACR using a custom reset function
3
Add an array for PMOVSSET so we only define it for v7ve+ platforms
11
that just calls cpacr_write(), to avoid having to duplicate
12
the logic for which bits are RAO.
13
4
14
This bug would affect migration for TCG CPUs which are ARMv7
5
Signed-off-by: Aaron Lindsay <alindsay@codeaurora.org>
15
with VFP but without one of Neon or VFPv3.
6
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
16
7
Message-id: 20181211151945.29137-7-aaron@os.amperecomputing.com
17
Reported-by: Cédric Le Goater <clg@kaod.org>
18
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
19
Tested-by: Cédric Le Goater <clg@kaod.org>
20
Message-id: 20180522173713.26282-1-peter.maydell@linaro.org
21
---
9
---
22
target/arm/helper.c | 10 +++++++++-
10
target/arm/helper.c | 28 ++++++++++++++++++++++++++++
23
1 file changed, 9 insertions(+), 1 deletion(-)
11
1 file changed, 28 insertions(+)
24
12
25
diff --git a/target/arm/helper.c b/target/arm/helper.c
13
diff --git a/target/arm/helper.c b/target/arm/helper.c
26
index XXXXXXX..XXXXXXX 100644
14
index XXXXXXX..XXXXXXX 100644
27
--- a/target/arm/helper.c
15
--- a/target/arm/helper.c
28
+++ b/target/arm/helper.c
16
+++ b/target/arm/helper.c
29
@@ -XXX,XX +XXX,XX @@ static void cpacr_write(CPUARMState *env, const ARMCPRegInfo *ri,
17
@@ -XXX,XX +XXX,XX @@ static void pmovsr_write(CPUARMState *env, const ARMCPRegInfo *ri,
30
env->cp15.cpacr_el1 = value;
18
env->cp15.c9_pmovsr &= ~value;
31
}
19
}
32
20
33
+static void cpacr_reset(CPUARMState *env, const ARMCPRegInfo *ri)
21
+static void pmovsset_write(CPUARMState *env, const ARMCPRegInfo *ri,
22
+ uint64_t value)
34
+{
23
+{
35
+ /* Call cpacr_write() so that we reset with the correct RAO bits set
24
+ value &= pmu_counter_mask(env);
36
+ * for our CPU features.
25
+ env->cp15.c9_pmovsr |= value;
37
+ */
38
+ cpacr_write(env, ri, 0);
39
+}
26
+}
40
+
27
+
41
static CPAccessResult cpacr_access(CPUARMState *env, const ARMCPRegInfo *ri,
28
static void pmxevtyper_write(CPUARMState *env, const ARMCPRegInfo *ri,
42
bool isread)
29
uint64_t value)
43
{
30
{
44
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v6_cp_reginfo[] = {
31
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v7mp_cp_reginfo[] = {
45
{ .name = "CPACR", .state = ARM_CP_STATE_BOTH, .opc0 = 3,
46
.crn = 1, .crm = 0, .opc1 = 0, .opc2 = 2, .accessfn = cpacr_access,
47
.access = PL1_RW, .fieldoffset = offsetof(CPUARMState, cp15.cpacr_el1),
48
- .resetvalue = 0, .writefn = cpacr_write },
49
+ .resetfn = cpacr_reset, .writefn = cpacr_write },
50
REGINFO_SENTINEL
32
REGINFO_SENTINEL
51
};
33
};
52
34
35
+static const ARMCPRegInfo pmovsset_cp_reginfo[] = {
36
+ /* PMOVSSET is not implemented in v7 before v7ve */
37
+ { .name = "PMOVSSET", .cp = 15, .opc1 = 0, .crn = 9, .crm = 14, .opc2 = 3,
38
+ .access = PL0_RW, .accessfn = pmreg_access,
39
+ .type = ARM_CP_ALIAS,
40
+ .fieldoffset = offsetoflow32(CPUARMState, cp15.c9_pmovsr),
41
+ .writefn = pmovsset_write,
42
+ .raw_writefn = raw_write },
43
+ { .name = "PMOVSSET_EL0", .state = ARM_CP_STATE_AA64,
44
+ .opc0 = 3, .opc1 = 3, .crn = 9, .crm = 14, .opc2 = 3,
45
+ .access = PL0_RW, .accessfn = pmreg_access,
46
+ .type = ARM_CP_ALIAS,
47
+ .fieldoffset = offsetof(CPUARMState, cp15.c9_pmovsr),
48
+ .writefn = pmovsset_write,
49
+ .raw_writefn = raw_write },
50
+ REGINFO_SENTINEL
51
+};
52
+
53
static void teecr_write(CPUARMState *env, const ARMCPRegInfo *ri,
54
uint64_t value)
55
{
56
@@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu)
57
!arm_feature(env, ARM_FEATURE_PMSA)) {
58
define_arm_cp_regs(cpu, v7mp_cp_reginfo);
59
}
60
+ if (arm_feature(env, ARM_FEATURE_V7VE)) {
61
+ define_arm_cp_regs(cpu, pmovsset_cp_reginfo);
62
+ }
63
if (arm_feature(env, ARM_FEATURE_V7)) {
64
/* v7 performance monitor control register: same implementor
65
* field as main ID register, and we implement only the cycle
53
--
66
--
54
2.17.1
67
2.20.1
55
68
56
69
diff view generated by jsdifflib
1
From: Francisco Iglesias <frasse.iglesias@gmail.com>
1
From: Aaron Lindsay <aaron@os.amperecomputing.com>
2
2
3
Coverity found that the string return by 'object_get_canonical_path' was not
3
This is immediately necessary for the PMUv3 implementation to check
4
being freed at two locations in the model (CID 1391294 and CID 1391293) and
4
ID_DFR0.PerfMon to enable/disable specific features, but defines the
5
also that a memset was being called with a value greater than the max of a byte
5
full complement of fields for possible future use elsewhere.
6
on the second argument (CID 1391286). This patch corrects this by adding the
7
freeing of the strings and also changing to memset to zero instead on
8
descriptor unaligned errors.
9
6
10
Signed-off-by: Francisco Iglesias <frasse.iglesias@gmail.com>
7
Signed-off-by: Aaron Lindsay <aaron@os.amperecomputing.com>
11
Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com>
12
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
13
Message-id: 20180528184859.3530-1-frasse.iglesias@gmail.com
14
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Message-id: 20181211151945.29137-8-aaron@os.amperecomputing.com
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
---
11
---
17
hw/dma/xlnx-zdma.c | 10 +++++++---
12
target/arm/cpu.h | 9 +++++++++
18
1 file changed, 7 insertions(+), 3 deletions(-)
13
1 file changed, 9 insertions(+)
19
14
20
diff --git a/hw/dma/xlnx-zdma.c b/hw/dma/xlnx-zdma.c
15
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
21
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
22
--- a/hw/dma/xlnx-zdma.c
17
--- a/target/arm/cpu.h
23
+++ b/hw/dma/xlnx-zdma.c
18
+++ b/target/arm/cpu.h
24
@@ -XXX,XX +XXX,XX @@ static bool zdma_load_descriptor(XlnxZDMA *s, uint64_t addr, void *buf)
19
@@ -XXX,XX +XXX,XX @@ FIELD(ID_AA64MMFR1, PAN, 20, 4)
25
qemu_log_mask(LOG_GUEST_ERROR,
20
FIELD(ID_AA64MMFR1, SPECSEI, 24, 4)
26
"zdma: unaligned descriptor at %" PRIx64,
21
FIELD(ID_AA64MMFR1, XNX, 28, 4)
27
addr);
22
28
- memset(buf, 0xdeadbeef, sizeof(XlnxZDMADescr));
23
+FIELD(ID_DFR0, COPDBG, 0, 4)
29
+ memset(buf, 0x0, sizeof(XlnxZDMADescr));
24
+FIELD(ID_DFR0, COPSDBG, 4, 4)
30
s->error = true;
25
+FIELD(ID_DFR0, MMAPDBG, 8, 4)
31
return false;
26
+FIELD(ID_DFR0, COPTRC, 12, 4)
32
}
27
+FIELD(ID_DFR0, MMAPTRC, 16, 4)
33
@@ -XXX,XX +XXX,XX @@ static uint64_t zdma_read(void *opaque, hwaddr addr, unsigned size)
28
+FIELD(ID_DFR0, MPROFDBG, 20, 4)
34
RegisterInfo *r = &s->regs_info[addr / 4];
29
+FIELD(ID_DFR0, PERFMON, 24, 4)
35
30
+FIELD(ID_DFR0, TRACEFILT, 28, 4)
36
if (!r->data) {
31
+
37
+ gchar *path = object_get_canonical_path(OBJECT(s));
32
QEMU_BUILD_BUG_ON(ARRAY_SIZE(((ARMCPU *)0)->ccsidr) <= R_V7M_CSSELR_INDEX_MASK);
38
qemu_log("%s: Decode error: read from %" HWADDR_PRIx "\n",
33
39
- object_get_canonical_path(OBJECT(s)),
34
/* If adding a feature bit which corresponds to a Linux ELF
40
+ path,
41
addr);
42
+ g_free(path);
43
ARRAY_FIELD_DP32(s->regs, ZDMA_CH_ISR, INV_APB, true);
44
zdma_ch_imr_update_irq(s);
45
return 0;
46
@@ -XXX,XX +XXX,XX @@ static void zdma_write(void *opaque, hwaddr addr, uint64_t value,
47
RegisterInfo *r = &s->regs_info[addr / 4];
48
49
if (!r->data) {
50
+ gchar *path = object_get_canonical_path(OBJECT(s));
51
qemu_log("%s: Decode error: write to %" HWADDR_PRIx "=%" PRIx64 "\n",
52
- object_get_canonical_path(OBJECT(s)),
53
+ path,
54
addr, value);
55
+ g_free(path);
56
ARRAY_FIELD_DP32(s->regs, ZDMA_CH_ISR, INV_APB, true);
57
zdma_ch_imr_update_irq(s);
58
return;
59
--
35
--
60
2.17.1
36
2.20.1
61
37
62
38
diff view generated by jsdifflib
1
From: Shannon Zhao <zhaoshenglong@huawei.com>
1
From: Aaron Lindsay <aaron@os.amperecomputing.com>
2
2
3
It forgot to increase clroffset during the loop. So it only clear the
3
Signed-off-by: Aaron Lindsay <aaron@os.amperecomputing.com>
4
first 4 bytes.
5
6
Fixes: 367b9f527becdd20ddf116e17a3c0c2bbc486920
7
Cc: qemu-stable@nongnu.org
8
Signed-off-by: Shannon Zhao <zhaoshenglong@huawei.com>
9
Reviewed-by: Eric Auger <eric.auger@redhat.com>
10
Message-id: 1527047633-12368-1-git-send-email-zhaoshenglong@huawei.com
11
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
4
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
5
Message-id: 20181211151945.29137-9-aaron@os.amperecomputing.com
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
---
7
---
14
hw/intc/arm_gicv3_kvm.c | 1 +
8
target/arm/cpu.h | 4 ++--
15
1 file changed, 1 insertion(+)
9
target/arm/helper.c | 19 +++++++++++++++++--
10
2 files changed, 19 insertions(+), 4 deletions(-)
16
11
17
diff --git a/hw/intc/arm_gicv3_kvm.c b/hw/intc/arm_gicv3_kvm.c
12
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
18
index XXXXXXX..XXXXXXX 100644
13
index XXXXXXX..XXXXXXX 100644
19
--- a/hw/intc/arm_gicv3_kvm.c
14
--- a/target/arm/cpu.h
20
+++ b/hw/intc/arm_gicv3_kvm.c
15
+++ b/target/arm/cpu.h
21
@@ -XXX,XX +XXX,XX @@ static void kvm_dist_putbmp(GICv3State *s, uint32_t offset,
16
@@ -XXX,XX +XXX,XX @@ struct ARMCPU {
22
if (clroffset != 0) {
17
uint32_t id_pfr0;
23
reg = 0;
18
uint32_t id_pfr1;
24
kvm_gicd_access(s, clroffset, &reg, true);
19
uint32_t id_dfr0;
25
+ clroffset += 4;
20
- uint32_t pmceid0;
26
}
21
- uint32_t pmceid1;
27
reg = *gic_bmp_ptr32(bmp, irq);
22
+ uint64_t pmceid0;
28
kvm_gicd_access(s, offset, &reg, true);
23
+ uint64_t pmceid1;
24
uint32_t id_afr0;
25
uint32_t id_mmfr0;
26
uint32_t id_mmfr1;
27
diff --git a/target/arm/helper.c b/target/arm/helper.c
28
index XXXXXXX..XXXXXXX 100644
29
--- a/target/arm/helper.c
30
+++ b/target/arm/helper.c
31
@@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu)
32
} else {
33
define_arm_cp_regs(cpu, not_v7_cp_reginfo);
34
}
35
+ if (FIELD_EX32(cpu->id_dfr0, ID_DFR0, PERFMON) >= 4 &&
36
+ FIELD_EX32(cpu->id_dfr0, ID_DFR0, PERFMON) != 0xf) {
37
+ ARMCPRegInfo v81_pmu_regs[] = {
38
+ { .name = "PMCEID2", .state = ARM_CP_STATE_AA32,
39
+ .cp = 15, .opc1 = 0, .crn = 9, .crm = 14, .opc2 = 4,
40
+ .access = PL0_R, .accessfn = pmreg_access, .type = ARM_CP_CONST,
41
+ .resetvalue = extract64(cpu->pmceid0, 32, 32) },
42
+ { .name = "PMCEID3", .state = ARM_CP_STATE_AA32,
43
+ .cp = 15, .opc1 = 0, .crn = 9, .crm = 14, .opc2 = 5,
44
+ .access = PL0_R, .accessfn = pmreg_access, .type = ARM_CP_CONST,
45
+ .resetvalue = extract64(cpu->pmceid1, 32, 32) },
46
+ REGINFO_SENTINEL
47
+ };
48
+ define_arm_cp_regs(cpu, v81_pmu_regs);
49
+ }
50
if (arm_feature(env, ARM_FEATURE_V8)) {
51
/* AArch64 ID registers, which all have impdef reset values.
52
* Note that within the ID register ranges the unused slots
53
@@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu)
54
{ .name = "PMCEID0", .state = ARM_CP_STATE_AA32,
55
.cp = 15, .opc1 = 0, .crn = 9, .crm = 12, .opc2 = 6,
56
.access = PL0_R, .accessfn = pmreg_access, .type = ARM_CP_CONST,
57
- .resetvalue = cpu->pmceid0 },
58
+ .resetvalue = extract64(cpu->pmceid0, 0, 32) },
59
{ .name = "PMCEID0_EL0", .state = ARM_CP_STATE_AA64,
60
.opc0 = 3, .opc1 = 3, .crn = 9, .crm = 12, .opc2 = 6,
61
.access = PL0_R, .accessfn = pmreg_access, .type = ARM_CP_CONST,
62
@@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu)
63
{ .name = "PMCEID1", .state = ARM_CP_STATE_AA32,
64
.cp = 15, .opc1 = 0, .crn = 9, .crm = 12, .opc2 = 7,
65
.access = PL0_R, .accessfn = pmreg_access, .type = ARM_CP_CONST,
66
- .resetvalue = cpu->pmceid1 },
67
+ .resetvalue = extract64(cpu->pmceid1, 0, 32) },
68
{ .name = "PMCEID1_EL0", .state = ARM_CP_STATE_AA64,
69
.opc0 = 3, .opc1 = 3, .crn = 9, .crm = 12, .opc2 = 7,
70
.access = PL0_R, .accessfn = pmreg_access, .type = ARM_CP_CONST,
29
--
71
--
30
2.17.1
72
2.20.1
31
73
32
74
diff view generated by jsdifflib
1
From: Igor Mammedov <imammedo@redhat.com>
1
From: Aaron Lindsay <aaron@os.amperecomputing.com>
2
2
3
When QEMU is started with following CLI
3
This commit doesn't add any supported events, but provides the framework
4
-machine virt,gic-version=3,accel=kvm -cpu host -bios AAVMF_CODE.fd
4
for adding them. We store the pm_event structs in a simple array, and
5
it crashes with abort at
5
provide the mapping from the event numbers to array indexes in the
6
accel/kvm/kvm-all.c:2164:
6
supported_event_map array. Because the value of PMCEID[01] depends upon
7
KVM_SET_DEVICE_ATTR failed: Group 6 attr 0x000000000000c665: Invalid argument
7
which events are supported at runtime, generate it dynamically.
8
8
9
Which is caused by implicit dependency of kvm_arm_gicv3_reset() on
9
Signed-off-by: Aaron Lindsay <alindsay@codeaurora.org>
10
arm_gicv3_icc_reset() where the later is called by CPU reset
11
reset callback.
12
13
However commit:
14
3b77f6c arm/boot: split load_dtb() from arm_load_kernel()
15
broke CPU reset callback registration in case
16
17
arm_load_kernel()
18
...
19
if (!info->kernel_filename || info->firmware_loaded)
20
21
branch is taken, i.e. it's sufficient to provide a firmware
22
or do not provide kernel on CLI to skip cpu reset callback
23
registration, where before offending commit the callback
24
has been registered unconditionally.
25
26
Fix it by registering the callback right at the beginning of
27
arm_load_kernel() unconditionally instead of doing it at the end.
28
29
NOTE:
30
we probably should eliminate that dependency anyways as well as
31
separate arch CPU reset parts from arm_load_kernel() into CPU
32
itself, but that refactoring that I probably would have to do
33
anyways later for CPU hotplug to work.
34
35
Reported-by: Auger Eric <eric.auger@redhat.com>
36
Signed-off-by: Igor Mammedov <imammedo@redhat.com>
37
Reviewed-by: Eric Auger <eric.auger@redhat.com>
38
Tested-by: Eric Auger <eric.auger@redhat.com>
39
Message-id: 1527070950-208350-1-git-send-email-imammedo@redhat.com
40
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
Message-id: 20181211151945.29137-10-aaron@os.amperecomputing.com
41
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
42
---
13
---
43
hw/arm/boot.c | 18 +++++++++---------
14
target/arm/cpu.h | 10 ++++++++
44
1 file changed, 9 insertions(+), 9 deletions(-)
15
target/arm/cpu.c | 19 +++++++++------
16
target/arm/cpu64.c | 4 ----
17
target/arm/helper.c | 57 +++++++++++++++++++++++++++++++++++++++++++++
18
4 files changed, 79 insertions(+), 11 deletions(-)
45
19
46
diff --git a/hw/arm/boot.c b/hw/arm/boot.c
20
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
47
index XXXXXXX..XXXXXXX 100644
21
index XXXXXXX..XXXXXXX 100644
48
--- a/hw/arm/boot.c
22
--- a/target/arm/cpu.h
49
+++ b/hw/arm/boot.c
23
+++ b/target/arm/cpu.h
50
@@ -XXX,XX +XXX,XX @@ void arm_load_kernel(ARMCPU *cpu, struct arm_boot_info *info)
24
@@ -XXX,XX +XXX,XX @@ void pmu_op_finish(CPUARMState *env);
51
static const ARMInsnFixup *primary_loader;
25
void pmu_pre_el_change(ARMCPU *cpu, void *ignored);
52
AddressSpace *as = arm_boot_address_space(cpu, info);
26
void pmu_post_el_change(ARMCPU *cpu, void *ignored);
53
27
54
+ /* CPU objects (unlike devices) are not automatically reset on system
28
+/*
55
+ * reset, so we must always register a handler to do so. If we're
29
+ * get_pmceid
56
+ * actually loading a kernel, the handler is also responsible for
30
+ * @env: CPUARMState
57
+ * arranging that we start it correctly.
31
+ * @which: which PMCEID register to return (0 or 1)
32
+ *
33
+ * Return the PMCEID[01]_EL0 register values corresponding to the counters
34
+ * which are supported given the current configuration
35
+ */
36
+uint64_t get_pmceid(CPUARMState *env, unsigned which);
37
+
38
/* SCTLR bit meanings. Several bits have been reused in newer
39
* versions of the architecture; in that case we define constants
40
* for both old and new bit meanings. Code which tests against those
41
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
42
index XXXXXXX..XXXXXXX 100644
43
--- a/target/arm/cpu.c
44
+++ b/target/arm/cpu.c
45
@@ -XXX,XX +XXX,XX @@ static void arm_cpu_realizefn(DeviceState *dev, Error **errp)
46
47
if (!cpu->has_pmu) {
48
unset_feature(env, ARM_FEATURE_PMU);
49
+ }
50
+ if (arm_feature(env, ARM_FEATURE_PMU)) {
51
+ cpu->pmceid0 = get_pmceid(&cpu->env, 0);
52
+ cpu->pmceid1 = get_pmceid(&cpu->env, 1);
53
+
54
+ if (!kvm_enabled()) {
55
+ arm_register_pre_el_change_hook(cpu, &pmu_pre_el_change, 0);
56
+ arm_register_el_change_hook(cpu, &pmu_post_el_change, 0);
57
+ }
58
+ } else {
59
cpu->id_aa64dfr0 &= ~0xf00;
60
- } else if (!kvm_enabled()) {
61
- arm_register_pre_el_change_hook(cpu, &pmu_pre_el_change, 0);
62
- arm_register_el_change_hook(cpu, &pmu_post_el_change, 0);
63
+ cpu->pmceid0 = 0;
64
+ cpu->pmceid1 = 0;
65
}
66
67
if (!arm_feature(env, ARM_FEATURE_EL2)) {
68
@@ -XXX,XX +XXX,XX @@ static void cortex_a7_initfn(Object *obj)
69
cpu->id_pfr0 = 0x00001131;
70
cpu->id_pfr1 = 0x00011011;
71
cpu->id_dfr0 = 0x02010555;
72
- cpu->pmceid0 = 0x00000000;
73
- cpu->pmceid1 = 0x00000000;
74
cpu->id_afr0 = 0x00000000;
75
cpu->id_mmfr0 = 0x10101105;
76
cpu->id_mmfr1 = 0x40000000;
77
@@ -XXX,XX +XXX,XX @@ static void cortex_a15_initfn(Object *obj)
78
cpu->id_pfr0 = 0x00001131;
79
cpu->id_pfr1 = 0x00011011;
80
cpu->id_dfr0 = 0x02010555;
81
- cpu->pmceid0 = 0x0000000;
82
- cpu->pmceid1 = 0x00000000;
83
cpu->id_afr0 = 0x00000000;
84
cpu->id_mmfr0 = 0x10201105;
85
cpu->id_mmfr1 = 0x20000000;
86
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
87
index XXXXXXX..XXXXXXX 100644
88
--- a/target/arm/cpu64.c
89
+++ b/target/arm/cpu64.c
90
@@ -XXX,XX +XXX,XX @@ static void aarch64_a57_initfn(Object *obj)
91
cpu->isar.id_isar6 = 0;
92
cpu->isar.id_aa64pfr0 = 0x00002222;
93
cpu->id_aa64dfr0 = 0x10305106;
94
- cpu->pmceid0 = 0x00000000;
95
- cpu->pmceid1 = 0x00000000;
96
cpu->isar.id_aa64isar0 = 0x00011120;
97
cpu->isar.id_aa64mmfr0 = 0x00001124;
98
cpu->dbgdidr = 0x3516d000;
99
@@ -XXX,XX +XXX,XX @@ static void aarch64_a72_initfn(Object *obj)
100
cpu->isar.id_isar5 = 0x00011121;
101
cpu->isar.id_aa64pfr0 = 0x00002222;
102
cpu->id_aa64dfr0 = 0x10305106;
103
- cpu->pmceid0 = 0x00000000;
104
- cpu->pmceid1 = 0x00000000;
105
cpu->isar.id_aa64isar0 = 0x00011120;
106
cpu->isar.id_aa64mmfr0 = 0x00001124;
107
cpu->dbgdidr = 0x3516d000;
108
diff --git a/target/arm/helper.c b/target/arm/helper.c
109
index XXXXXXX..XXXXXXX 100644
110
--- a/target/arm/helper.c
111
+++ b/target/arm/helper.c
112
@@ -XXX,XX +XXX,XX @@ static inline uint64_t pmu_counter_mask(CPUARMState *env)
113
return (1 << 31) | ((1 << pmu_num_counters(env)) - 1);
114
}
115
116
+typedef struct pm_event {
117
+ uint16_t number; /* PMEVTYPER.evtCount is 16 bits wide */
118
+ /* If the event is supported on this CPU (used to generate PMCEID[01]) */
119
+ bool (*supported)(CPUARMState *);
120
+ /*
121
+ * Retrieve the current count of the underlying event. The programmed
122
+ * counters hold a difference from the return value from this function
58
+ */
123
+ */
59
+ for (cs = first_cpu; cs; cs = CPU_NEXT(cs)) {
124
+ uint64_t (*get_count)(CPUARMState *);
60
+ qemu_register_reset(do_cpu_reset, ARM_CPU(cs));
125
+} pm_event;
126
+
127
+static const pm_event pm_events[] = {
128
+};
129
+
130
+/*
131
+ * Note: Before increasing MAX_EVENT_ID beyond 0x3f into the 0x40xx range of
132
+ * events (i.e. the statistical profiling extension), this implementation
133
+ * should first be updated to something sparse instead of the current
134
+ * supported_event_map[] array.
135
+ */
136
+#define MAX_EVENT_ID 0x0
137
+#define UNSUPPORTED_EVENT UINT16_MAX
138
+static uint16_t supported_event_map[MAX_EVENT_ID + 1];
139
+
140
+/*
141
+ * Called upon initialization to build PMCEID0_EL0 or PMCEID1_EL0 (indicated by
142
+ * 'which'). We also use it to build a map of ARM event numbers to indices in
143
+ * our pm_events array.
144
+ *
145
+ * Note: Events in the 0x40XX range are not currently supported.
146
+ */
147
+uint64_t get_pmceid(CPUARMState *env, unsigned which)
148
+{
149
+ uint64_t pmceid = 0;
150
+ unsigned int i;
151
+
152
+ assert(which <= 1);
153
+
154
+ for (i = 0; i < ARRAY_SIZE(supported_event_map); i++) {
155
+ supported_event_map[i] = UNSUPPORTED_EVENT;
61
+ }
156
+ }
62
+
157
+
63
/* The board code is not supposed to set secure_board_setup unless
158
+ for (i = 0; i < ARRAY_SIZE(pm_events); i++) {
64
* running its code in secure mode is actually possible, and KVM
159
+ const pm_event *cnt = &pm_events[i];
65
* doesn't support secure.
160
+ assert(cnt->number <= MAX_EVENT_ID);
66
@@ -XXX,XX +XXX,XX @@ void arm_load_kernel(ARMCPU *cpu, struct arm_boot_info *info)
161
+ /* We do not currently support events in the 0x40xx range */
67
ARM_CPU(cs)->env.boot_info = info;
162
+ assert(cnt->number <= 0x3f);
68
}
163
+
69
164
+ if ((cnt->number & 0x20) == (which << 6) &&
70
- /* CPU objects (unlike devices) are not automatically reset on system
165
+ cnt->supported(env)) {
71
- * reset, so we must always register a handler to do so. If we're
166
+ pmceid |= (1 << (cnt->number & 0x1f));
72
- * actually loading a kernel, the handler is also responsible for
167
+ supported_event_map[cnt->number] = i;
73
- * arranging that we start it correctly.
168
+ }
74
- */
169
+ }
75
- for (cs = first_cpu; cs; cs = CPU_NEXT(cs)) {
170
+ return pmceid;
76
- qemu_register_reset(do_cpu_reset, ARM_CPU(cs));
171
+}
77
- }
172
+
78
-
173
static CPAccessResult pmreg_access(CPUARMState *env, const ARMCPRegInfo *ri,
79
if (!info->skip_dtb_autoload && have_dtb(info)) {
174
bool isread)
80
if (arm_load_dtb(info->dtb_start, info, info->dtb_limit, as) < 0) {
175
{
81
exit(1);
82
--
176
--
83
2.17.1
177
2.20.1
84
178
85
179
diff view generated by jsdifflib
1
As part of plumbing MemTxAttrs down to the IOMMU translate method,
1
From: Aaron Lindsay <aaron@os.amperecomputing.com>
2
add MemTxAttrs as an argument to memory_region_access_valid().
3
Its callers either have an attrs value to hand, or don't care
4
and can use MEMTXATTRS_UNSPECIFIED.
5
2
6
The callsite in flatview_access_valid() is part of a recursive
3
Add arrays to hold the registers, the definitions themselves, access
7
loop flatview_access_valid() -> memory_region_access_valid() ->
4
functions, and logic to reset counters when PMCR.P is set. Update
8
subpage_accepts() -> flatview_access_valid(); we make it pass
5
filtering code to support counters other than PMCCNTR. Support migration
9
MEMTXATTRS_UNSPECIFIED for now, until the next several commits
6
with raw read/write functions.
10
have plumbed an attrs parameter through the rest of the loop
11
and we can add an attrs parameter to flatview_access_valid().
12
7
8
Signed-off-by: Aaron Lindsay <alindsay@codeaurora.org>
9
Signed-off-by: Aaron Lindsay <aaron@os.amperecomputing.com>
10
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
11
Message-id: 20181211151945.29137-11-aaron@os.amperecomputing.com
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
15
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
16
Message-id: 20180521140402.23318-8-peter.maydell@linaro.org
17
---
13
---
18
include/exec/memory-internal.h | 3 ++-
14
target/arm/cpu.h | 3 +
19
exec.c | 4 +++-
15
target/arm/helper.c | 296 +++++++++++++++++++++++++++++++++++++++++---
20
hw/s390x/s390-pci-inst.c | 3 ++-
16
2 files changed, 282 insertions(+), 17 deletions(-)
21
memory.c | 7 ++++---
22
4 files changed, 11 insertions(+), 6 deletions(-)
23
17
24
diff --git a/include/exec/memory-internal.h b/include/exec/memory-internal.h
18
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
25
index XXXXXXX..XXXXXXX 100644
19
index XXXXXXX..XXXXXXX 100644
26
--- a/include/exec/memory-internal.h
20
--- a/target/arm/cpu.h
27
+++ b/include/exec/memory-internal.h
21
+++ b/target/arm/cpu.h
28
@@ -XXX,XX +XXX,XX @@ void flatview_unref(FlatView *view);
22
@@ -XXX,XX +XXX,XX @@ typedef struct CPUARMState {
29
extern const MemoryRegionOps unassigned_mem_ops;
23
* pmccntr_op_finish.
30
24
*/
31
bool memory_region_access_valid(MemoryRegion *mr, hwaddr addr,
25
uint64_t c15_ccnt_delta;
32
- unsigned size, bool is_write);
26
+ uint64_t c14_pmevcntr[31];
33
+ unsigned size, bool is_write,
27
+ uint64_t c14_pmevcntr_delta[31];
34
+ MemTxAttrs attrs);
28
+ uint64_t c14_pmevtyper[31];
35
29
uint64_t pmccfiltr_el0; /* Performance Monitor Filter Register */
36
void flatview_add_to_dispatch(FlatView *fv, MemoryRegionSection *section);
30
uint64_t vpidr_el2; /* Virtualization Processor ID Register */
37
AddressSpaceDispatch *address_space_dispatch_new(FlatView *fv);
31
uint64_t vmpidr_el2; /* Virtualization Multiprocessor ID Register */
38
diff --git a/exec.c b/exec.c
32
diff --git a/target/arm/helper.c b/target/arm/helper.c
39
index XXXXXXX..XXXXXXX 100644
33
index XXXXXXX..XXXXXXX 100644
40
--- a/exec.c
34
--- a/target/arm/helper.c
41
+++ b/exec.c
35
+++ b/target/arm/helper.c
42
@@ -XXX,XX +XXX,XX @@ static bool flatview_access_valid(FlatView *fv, hwaddr addr, int len,
36
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v6_cp_reginfo[] = {
43
mr = flatview_translate(fv, addr, &xlat, &l, is_write);
37
#define PMCRDP 0x10
44
if (!memory_access_is_direct(mr, is_write)) {
38
#define PMCRD 0x8
45
l = memory_access_size(mr, l, addr);
39
#define PMCRC 0x4
46
- if (!memory_region_access_valid(mr, xlat, l, is_write)) {
40
+#define PMCRP 0x2
47
+ /* When our callers all have attrs we'll pass them through here */
41
#define PMCRE 0x1
48
+ if (!memory_region_access_valid(mr, xlat, l, is_write,
42
49
+ MEMTXATTRS_UNSPECIFIED)) {
43
#define PMXEVTYPER_P 0x80000000
50
return false;
44
@@ -XXX,XX +XXX,XX @@ uint64_t get_pmceid(CPUARMState *env, unsigned which)
51
}
45
return pmceid;
52
}
46
}
53
diff --git a/hw/s390x/s390-pci-inst.c b/hw/s390x/s390-pci-inst.c
47
54
index XXXXXXX..XXXXXXX 100644
48
+/*
55
--- a/hw/s390x/s390-pci-inst.c
49
+ * Check at runtime whether a PMU event is supported for the current machine
56
+++ b/hw/s390x/s390-pci-inst.c
50
+ */
57
@@ -XXX,XX +XXX,XX @@ int pcistb_service_call(S390CPU *cpu, uint8_t r1, uint8_t r3, uint64_t gaddr,
51
+static bool event_supported(uint16_t number)
58
mr = s390_get_subregion(mr, offset, len);
52
+{
59
offset -= mr->addr;
53
+ if (number > MAX_EVENT_ID) {
60
54
+ return false;
61
- if (!memory_region_access_valid(mr, offset, len, true)) {
55
+ }
62
+ if (!memory_region_access_valid(mr, offset, len, true,
56
+ return supported_event_map[number] != UNSUPPORTED_EVENT;
63
+ MEMTXATTRS_UNSPECIFIED)) {
57
+}
64
s390_program_interrupt(env, PGM_OPERAND, 6, ra);
58
+
59
static CPAccessResult pmreg_access(CPUARMState *env, const ARMCPRegInfo *ri,
60
bool isread)
61
{
62
@@ -XXX,XX +XXX,XX @@ static bool pmu_counter_enabled(CPUARMState *env, uint8_t counter)
63
prohibited = env->cp15.c9_pmcr & PMCRDP;
64
}
65
66
- /* TODO Remove assert, set filter to correct PMEVTYPER */
67
- assert(counter == 31);
68
- filter = env->cp15.pmccfiltr_el0;
69
+ if (counter == 31) {
70
+ filter = env->cp15.pmccfiltr_el0;
71
+ } else {
72
+ filter = env->cp15.c14_pmevtyper[counter];
73
+ }
74
75
p = filter & PMXEVTYPER_P;
76
u = filter & PMXEVTYPER_U;
77
@@ -XXX,XX +XXX,XX @@ static bool pmu_counter_enabled(CPUARMState *env, uint8_t counter)
78
filtered = m != p;
79
}
80
81
+ if (counter != 31) {
82
+ /*
83
+ * If not checking PMCCNTR, ensure the counter is setup to an event we
84
+ * support
85
+ */
86
+ uint16_t event = filter & PMXEVTYPER_EVTCOUNT;
87
+ if (!event_supported(event)) {
88
+ return false;
89
+ }
90
+ }
91
+
92
return enabled && !prohibited && !filtered;
93
}
94
95
@@ -XXX,XX +XXX,XX @@ void pmccntr_op_finish(CPUARMState *env)
96
}
97
}
98
99
+static void pmevcntr_op_start(CPUARMState *env, uint8_t counter)
100
+{
101
+
102
+ uint16_t event = env->cp15.c14_pmevtyper[counter] & PMXEVTYPER_EVTCOUNT;
103
+ uint64_t count = 0;
104
+ if (event_supported(event)) {
105
+ uint16_t event_idx = supported_event_map[event];
106
+ count = pm_events[event_idx].get_count(env);
107
+ }
108
+
109
+ if (pmu_counter_enabled(env, counter)) {
110
+ env->cp15.c14_pmevcntr[counter] =
111
+ count - env->cp15.c14_pmevcntr_delta[counter];
112
+ }
113
+ env->cp15.c14_pmevcntr_delta[counter] = count;
114
+}
115
+
116
+static void pmevcntr_op_finish(CPUARMState *env, uint8_t counter)
117
+{
118
+ if (pmu_counter_enabled(env, counter)) {
119
+ env->cp15.c14_pmevcntr_delta[counter] -=
120
+ env->cp15.c14_pmevcntr[counter];
121
+ }
122
+}
123
+
124
void pmu_op_start(CPUARMState *env)
125
{
126
+ unsigned int i;
127
pmccntr_op_start(env);
128
+ for (i = 0; i < pmu_num_counters(env); i++) {
129
+ pmevcntr_op_start(env, i);
130
+ }
131
}
132
133
void pmu_op_finish(CPUARMState *env)
134
{
135
+ unsigned int i;
136
pmccntr_op_finish(env);
137
+ for (i = 0; i < pmu_num_counters(env); i++) {
138
+ pmevcntr_op_finish(env, i);
139
+ }
140
}
141
142
void pmu_pre_el_change(ARMCPU *cpu, void *ignored)
143
@@ -XXX,XX +XXX,XX @@ static void pmcr_write(CPUARMState *env, const ARMCPRegInfo *ri,
144
env->cp15.c15_ccnt = 0;
145
}
146
147
+ if (value & PMCRP) {
148
+ unsigned int i;
149
+ for (i = 0; i < pmu_num_counters(env); i++) {
150
+ env->cp15.c14_pmevcntr[i] = 0;
151
+ }
152
+ }
153
+
154
/* only the DP, X, D and E bits are writable */
155
env->cp15.c9_pmcr &= ~0x39;
156
env->cp15.c9_pmcr |= (value & 0x39);
157
@@ -XXX,XX +XXX,XX @@ void pmccntr_op_finish(CPUARMState *env)
158
{
159
}
160
161
+void pmevcntr_op_start(CPUARMState *env, uint8_t i)
162
+{
163
+}
164
+
165
+void pmevcntr_op_finish(CPUARMState *env, uint8_t i)
166
+{
167
+}
168
+
169
void pmu_op_start(CPUARMState *env)
170
{
171
}
172
@@ -XXX,XX +XXX,XX @@ static void pmovsset_write(CPUARMState *env, const ARMCPRegInfo *ri,
173
env->cp15.c9_pmovsr |= value;
174
}
175
176
-static void pmxevtyper_write(CPUARMState *env, const ARMCPRegInfo *ri,
177
- uint64_t value)
178
+static void pmevtyper_write(CPUARMState *env, const ARMCPRegInfo *ri,
179
+ uint64_t value, const uint8_t counter)
180
{
181
+ if (counter == 31) {
182
+ pmccfiltr_write(env, ri, value);
183
+ } else if (counter < pmu_num_counters(env)) {
184
+ pmevcntr_op_start(env, counter);
185
+
186
+ /*
187
+ * If this counter's event type is changing, store the current
188
+ * underlying count for the new type in c14_pmevcntr_delta[counter] so
189
+ * pmevcntr_op_finish has the correct baseline when it converts back to
190
+ * a delta.
191
+ */
192
+ uint16_t old_event = env->cp15.c14_pmevtyper[counter] &
193
+ PMXEVTYPER_EVTCOUNT;
194
+ uint16_t new_event = value & PMXEVTYPER_EVTCOUNT;
195
+ if (old_event != new_event) {
196
+ uint64_t count = 0;
197
+ if (event_supported(new_event)) {
198
+ uint16_t event_idx = supported_event_map[new_event];
199
+ count = pm_events[event_idx].get_count(env);
200
+ }
201
+ env->cp15.c14_pmevcntr_delta[counter] = count;
202
+ }
203
+
204
+ env->cp15.c14_pmevtyper[counter] = value & PMXEVTYPER_MASK;
205
+ pmevcntr_op_finish(env, counter);
206
+ }
207
/* Attempts to access PMXEVTYPER are CONSTRAINED UNPREDICTABLE when
208
* PMSELR value is equal to or greater than the number of implemented
209
* counters, but not equal to 0x1f. We opt to behave as a RAZ/WI.
210
*/
211
- if (env->cp15.c9_pmselr == 0x1f) {
212
- pmccfiltr_write(env, ri, value);
213
+}
214
+
215
+static uint64_t pmevtyper_read(CPUARMState *env, const ARMCPRegInfo *ri,
216
+ const uint8_t counter)
217
+{
218
+ if (counter == 31) {
219
+ return env->cp15.pmccfiltr_el0;
220
+ } else if (counter < pmu_num_counters(env)) {
221
+ return env->cp15.c14_pmevtyper[counter];
222
+ } else {
223
+ /*
224
+ * We opt to behave as a RAZ/WI when attempts to access PMXEVTYPER
225
+ * are CONSTRAINED UNPREDICTABLE. See comments in pmevtyper_write().
226
+ */
227
+ return 0;
228
}
229
}
230
231
+static void pmevtyper_writefn(CPUARMState *env, const ARMCPRegInfo *ri,
232
+ uint64_t value)
233
+{
234
+ uint8_t counter = ((ri->crm & 3) << 3) | (ri->opc2 & 7);
235
+ pmevtyper_write(env, ri, value, counter);
236
+}
237
+
238
+static void pmevtyper_rawwrite(CPUARMState *env, const ARMCPRegInfo *ri,
239
+ uint64_t value)
240
+{
241
+ uint8_t counter = ((ri->crm & 3) << 3) | (ri->opc2 & 7);
242
+ env->cp15.c14_pmevtyper[counter] = value;
243
+
244
+ /*
245
+ * pmevtyper_rawwrite is called between a pair of pmu_op_start and
246
+ * pmu_op_finish calls when loading saved state for a migration. Because
247
+ * we're potentially updating the type of event here, the value written to
248
+ * c14_pmevcntr_delta by the preceeding pmu_op_start call may be for a
249
+ * different counter type. Therefore, we need to set this value to the
250
+ * current count for the counter type we're writing so that pmu_op_finish
251
+ * has the correct count for its calculation.
252
+ */
253
+ uint16_t event = value & PMXEVTYPER_EVTCOUNT;
254
+ if (event_supported(event)) {
255
+ uint16_t event_idx = supported_event_map[event];
256
+ env->cp15.c14_pmevcntr_delta[counter] =
257
+ pm_events[event_idx].get_count(env);
258
+ }
259
+}
260
+
261
+static uint64_t pmevtyper_readfn(CPUARMState *env, const ARMCPRegInfo *ri)
262
+{
263
+ uint8_t counter = ((ri->crm & 3) << 3) | (ri->opc2 & 7);
264
+ return pmevtyper_read(env, ri, counter);
265
+}
266
+
267
+static void pmxevtyper_write(CPUARMState *env, const ARMCPRegInfo *ri,
268
+ uint64_t value)
269
+{
270
+ pmevtyper_write(env, ri, value, env->cp15.c9_pmselr & 31);
271
+}
272
+
273
static uint64_t pmxevtyper_read(CPUARMState *env, const ARMCPRegInfo *ri)
274
{
275
- /* We opt to behave as a RAZ/WI when attempts to access PMXEVTYPER
276
- * are CONSTRAINED UNPREDICTABLE. See comments in pmxevtyper_write().
277
+ return pmevtyper_read(env, ri, env->cp15.c9_pmselr & 31);
278
+}
279
+
280
+static void pmevcntr_write(CPUARMState *env, const ARMCPRegInfo *ri,
281
+ uint64_t value, uint8_t counter)
282
+{
283
+ if (counter < pmu_num_counters(env)) {
284
+ pmevcntr_op_start(env, counter);
285
+ env->cp15.c14_pmevcntr[counter] = value;
286
+ pmevcntr_op_finish(env, counter);
287
+ }
288
+ /*
289
+ * We opt to behave as a RAZ/WI when attempts to access PM[X]EVCNTR
290
+ * are CONSTRAINED UNPREDICTABLE.
291
*/
292
- if (env->cp15.c9_pmselr == 0x1f) {
293
- return env->cp15.pmccfiltr_el0;
294
+}
295
+
296
+static uint64_t pmevcntr_read(CPUARMState *env, const ARMCPRegInfo *ri,
297
+ uint8_t counter)
298
+{
299
+ if (counter < pmu_num_counters(env)) {
300
+ uint64_t ret;
301
+ pmevcntr_op_start(env, counter);
302
+ ret = env->cp15.c14_pmevcntr[counter];
303
+ pmevcntr_op_finish(env, counter);
304
+ return ret;
305
} else {
306
+ /* We opt to behave as a RAZ/WI when attempts to access PM[X]EVCNTR
307
+ * are CONSTRAINED UNPREDICTABLE. */
65
return 0;
308
return 0;
66
}
309
}
67
diff --git a/memory.c b/memory.c
310
}
68
index XXXXXXX..XXXXXXX 100644
311
69
--- a/memory.c
312
+static void pmevcntr_writefn(CPUARMState *env, const ARMCPRegInfo *ri,
70
+++ b/memory.c
313
+ uint64_t value)
71
@@ -XXX,XX +XXX,XX @@ static const MemoryRegionOps ram_device_mem_ops = {
314
+{
72
bool memory_region_access_valid(MemoryRegion *mr,
315
+ uint8_t counter = ((ri->crm & 3) << 3) | (ri->opc2 & 7);
73
hwaddr addr,
316
+ pmevcntr_write(env, ri, value, counter);
74
unsigned size,
317
+}
75
- bool is_write)
318
+
76
+ bool is_write,
319
+static uint64_t pmevcntr_readfn(CPUARMState *env, const ARMCPRegInfo *ri)
77
+ MemTxAttrs attrs)
320
+{
78
{
321
+ uint8_t counter = ((ri->crm & 3) << 3) | (ri->opc2 & 7);
79
int access_size_min, access_size_max;
322
+ return pmevcntr_read(env, ri, counter);
80
int access_size, i;
323
+}
81
@@ -XXX,XX +XXX,XX @@ MemTxResult memory_region_dispatch_read(MemoryRegion *mr,
324
+
82
{
325
+static void pmevcntr_rawwrite(CPUARMState *env, const ARMCPRegInfo *ri,
83
MemTxResult r;
326
+ uint64_t value)
84
327
+{
85
- if (!memory_region_access_valid(mr, addr, size, false)) {
328
+ uint8_t counter = ((ri->crm & 3) << 3) | (ri->opc2 & 7);
86
+ if (!memory_region_access_valid(mr, addr, size, false, attrs)) {
329
+ assert(counter < pmu_num_counters(env));
87
*pval = unassigned_mem_read(mr, addr, size);
330
+ env->cp15.c14_pmevcntr[counter] = value;
88
return MEMTX_DECODE_ERROR;
331
+ pmevcntr_write(env, ri, value, counter);
89
}
332
+}
90
@@ -XXX,XX +XXX,XX @@ MemTxResult memory_region_dispatch_write(MemoryRegion *mr,
333
+
91
unsigned size,
334
+static uint64_t pmevcntr_rawread(CPUARMState *env, const ARMCPRegInfo *ri)
92
MemTxAttrs attrs)
335
+{
93
{
336
+ uint8_t counter = ((ri->crm & 3) << 3) | (ri->opc2 & 7);
94
- if (!memory_region_access_valid(mr, addr, size, true)) {
337
+ assert(counter < pmu_num_counters(env));
95
+ if (!memory_region_access_valid(mr, addr, size, true, attrs)) {
338
+ return env->cp15.c14_pmevcntr[counter];
96
unassigned_mem_write(mr, addr, data, size);
339
+}
97
return MEMTX_DECODE_ERROR;
340
+
98
}
341
+static void pmxevcntr_write(CPUARMState *env, const ARMCPRegInfo *ri,
342
+ uint64_t value)
343
+{
344
+ pmevcntr_write(env, ri, value, env->cp15.c9_pmselr & 31);
345
+}
346
+
347
+static uint64_t pmxevcntr_read(CPUARMState *env, const ARMCPRegInfo *ri)
348
+{
349
+ return pmevcntr_read(env, ri, env->cp15.c9_pmselr & 31);
350
+}
351
+
352
static void pmuserenr_write(CPUARMState *env, const ARMCPRegInfo *ri,
353
uint64_t value)
354
{
355
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v7_cp_reginfo[] = {
356
.fieldoffset = offsetof(CPUARMState, cp15.pmccfiltr_el0),
357
.resetvalue = 0, },
358
{ .name = "PMXEVTYPER", .cp = 15, .crn = 9, .crm = 13, .opc1 = 0, .opc2 = 1,
359
- .access = PL0_RW, .type = ARM_CP_NO_RAW, .accessfn = pmreg_access,
360
+ .access = PL0_RW, .type = ARM_CP_NO_RAW | ARM_CP_IO,
361
+ .accessfn = pmreg_access,
362
.writefn = pmxevtyper_write, .readfn = pmxevtyper_read },
363
{ .name = "PMXEVTYPER_EL0", .state = ARM_CP_STATE_AA64,
364
.opc0 = 3, .opc1 = 3, .crn = 9, .crm = 13, .opc2 = 1,
365
- .access = PL0_RW, .type = ARM_CP_NO_RAW, .accessfn = pmreg_access,
366
+ .access = PL0_RW, .type = ARM_CP_NO_RAW | ARM_CP_IO,
367
+ .accessfn = pmreg_access,
368
.writefn = pmxevtyper_write, .readfn = pmxevtyper_read },
369
- /* Unimplemented, RAZ/WI. */
370
{ .name = "PMXEVCNTR", .cp = 15, .crn = 9, .crm = 13, .opc1 = 0, .opc2 = 2,
371
- .access = PL0_RW, .type = ARM_CP_CONST, .resetvalue = 0,
372
- .accessfn = pmreg_access_xevcntr },
373
+ .access = PL0_RW, .type = ARM_CP_NO_RAW | ARM_CP_IO,
374
+ .accessfn = pmreg_access_xevcntr,
375
+ .writefn = pmxevcntr_write, .readfn = pmxevcntr_read },
376
+ { .name = "PMXEVCNTR_EL0", .state = ARM_CP_STATE_AA64,
377
+ .opc0 = 3, .opc1 = 3, .crn = 9, .crm = 13, .opc2 = 2,
378
+ .access = PL0_RW, .type = ARM_CP_NO_RAW | ARM_CP_IO,
379
+ .accessfn = pmreg_access_xevcntr,
380
+ .writefn = pmxevcntr_write, .readfn = pmxevcntr_read },
381
{ .name = "PMUSERENR", .cp = 15, .crn = 9, .crm = 14, .opc1 = 0, .opc2 = 0,
382
.access = PL0_R | PL1_RW, .accessfn = access_tpm,
383
.fieldoffset = offsetoflow32(CPUARMState, cp15.c9_pmuserenr),
384
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo el2_cp_reginfo[] = {
385
#endif
386
/* The only field of MDCR_EL2 that has a defined architectural reset value
387
* is MDCR_EL2.HPMN which should reset to the value of PMCR_EL0.N; but we
388
- * don't impelment any PMU event counters, so using zero as a reset
389
+ * don't implement any PMU event counters, so using zero as a reset
390
* value for MDCR_EL2 is okay
391
*/
392
{ .name = "MDCR_EL2", .state = ARM_CP_STATE_BOTH,
393
@@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu)
394
* field as main ID register, and we implement only the cycle
395
* count register.
396
*/
397
+ unsigned int i, pmcrn = 0;
398
#ifndef CONFIG_USER_ONLY
399
ARMCPRegInfo pmcr = {
400
.name = "PMCR", .cp = 15, .crn = 9, .crm = 12, .opc1 = 0, .opc2 = 0,
401
@@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu)
402
};
403
define_one_arm_cp_reg(cpu, &pmcr);
404
define_one_arm_cp_reg(cpu, &pmcr64);
405
+ for (i = 0; i < pmcrn; i++) {
406
+ char *pmevcntr_name = g_strdup_printf("PMEVCNTR%d", i);
407
+ char *pmevcntr_el0_name = g_strdup_printf("PMEVCNTR%d_EL0", i);
408
+ char *pmevtyper_name = g_strdup_printf("PMEVTYPER%d", i);
409
+ char *pmevtyper_el0_name = g_strdup_printf("PMEVTYPER%d_EL0", i);
410
+ ARMCPRegInfo pmev_regs[] = {
411
+ { .name = pmevcntr_name, .cp = 15, .crn = 15,
412
+ .crm = 8 | (3 & (i >> 3)), .opc1 = 0, .opc2 = i & 7,
413
+ .access = PL0_RW, .type = ARM_CP_IO | ARM_CP_ALIAS,
414
+ .readfn = pmevcntr_readfn, .writefn = pmevcntr_writefn,
415
+ .accessfn = pmreg_access },
416
+ { .name = pmevcntr_el0_name, .state = ARM_CP_STATE_AA64,
417
+ .opc0 = 3, .opc1 = 3, .crn = 15, .crm = 8 | (3 & (i >> 3)),
418
+ .opc2 = i & 7, .access = PL0_RW, .accessfn = pmreg_access,
419
+ .type = ARM_CP_IO,
420
+ .readfn = pmevcntr_readfn, .writefn = pmevcntr_writefn,
421
+ .raw_readfn = pmevcntr_rawread,
422
+ .raw_writefn = pmevcntr_rawwrite },
423
+ { .name = pmevtyper_name, .cp = 15, .crn = 15,
424
+ .crm = 12 | (3 & (i >> 3)), .opc1 = 0, .opc2 = i & 7,
425
+ .access = PL0_RW, .type = ARM_CP_IO | ARM_CP_ALIAS,
426
+ .readfn = pmevtyper_readfn, .writefn = pmevtyper_writefn,
427
+ .accessfn = pmreg_access },
428
+ { .name = pmevtyper_el0_name, .state = ARM_CP_STATE_AA64,
429
+ .opc0 = 3, .opc1 = 3, .crn = 15, .crm = 12 | (3 & (i >> 3)),
430
+ .opc2 = i & 7, .access = PL0_RW, .accessfn = pmreg_access,
431
+ .type = ARM_CP_IO,
432
+ .readfn = pmevtyper_readfn, .writefn = pmevtyper_writefn,
433
+ .raw_writefn = pmevtyper_rawwrite },
434
+ REGINFO_SENTINEL
435
+ };
436
+ define_arm_cp_regs(cpu, pmev_regs);
437
+ g_free(pmevcntr_name);
438
+ g_free(pmevcntr_el0_name);
439
+ g_free(pmevtyper_name);
440
+ g_free(pmevtyper_el0_name);
441
+ }
442
#endif
443
ARMCPRegInfo clidr = {
444
.name = "CLIDR", .state = ARM_CP_STATE_BOTH,
99
--
445
--
100
2.17.1
446
2.20.1
101
447
102
448
diff view generated by jsdifflib
1
From: Jan Kiszka <jan.kiszka@siemens.com>
1
From: Aaron Lindsay <aaron@os.amperecomputing.com>
2
2
3
There was a nasty flip in identifying which register group an access is
3
The instruction event is only enabled when icount is used, cycles are
4
targeting. The issue caused spuriously raised priorities of the guest
4
always supported. Always defining get_cycle_count (but altering its
5
when handing CPUs over in the Jailhouse hypervisor.
5
behavior depending on CONFIG_USER_ONLY) allows us to remove some
6
CONFIG_USER_ONLY #defines throughout the rest of the code.
6
7
7
Cc: qemu-stable@nongnu.org
8
Signed-off-by: Aaron Lindsay <alindsay@codeaurora.org>
8
Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
9
Signed-off-by: Aaron Lindsay <aaron@os.amperecomputing.com>
9
Message-id: 28b927d3-da58-bce4-cc13-bfec7f9b1cb9@siemens.com
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
Message-id: 20181211151945.29137-12-aaron@os.amperecomputing.com
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
13
---
13
hw/intc/arm_gicv3_cpuif.c | 12 ++++++------
14
target/arm/helper.c | 90 ++++++++++++++++++++++-----------------------
14
1 file changed, 6 insertions(+), 6 deletions(-)
15
1 file changed, 44 insertions(+), 46 deletions(-)
15
16
16
diff --git a/hw/intc/arm_gicv3_cpuif.c b/hw/intc/arm_gicv3_cpuif.c
17
diff --git a/target/arm/helper.c b/target/arm/helper.c
17
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
18
--- a/hw/intc/arm_gicv3_cpuif.c
19
--- a/target/arm/helper.c
19
+++ b/hw/intc/arm_gicv3_cpuif.c
20
+++ b/target/arm/helper.c
20
@@ -XXX,XX +XXX,XX @@ static uint64_t icv_ap_read(CPUARMState *env, const ARMCPRegInfo *ri)
21
@@ -XXX,XX +XXX,XX @@
22
#include "arm_ldst.h"
23
#include <zlib.h> /* For crc32 */
24
#include "exec/semihost.h"
25
+#include "sysemu/cpus.h"
26
#include "sysemu/kvm.h"
27
#include "fpu/softfloat.h"
28
#include "qemu/range.h"
29
@@ -XXX,XX +XXX,XX @@ typedef struct pm_event {
30
uint64_t (*get_count)(CPUARMState *);
31
} pm_event;
32
33
+static bool event_always_supported(CPUARMState *env)
34
+{
35
+ return true;
36
+}
37
+
38
+/*
39
+ * Return the underlying cycle count for the PMU cycle counters. If we're in
40
+ * usermode, simply return 0.
41
+ */
42
+static uint64_t cycles_get_count(CPUARMState *env)
43
+{
44
+#ifndef CONFIG_USER_ONLY
45
+ return muldiv64(qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL),
46
+ ARM_CPU_FREQ, NANOSECONDS_PER_SECOND);
47
+#else
48
+ return cpu_get_host_ticks();
49
+#endif
50
+}
51
+
52
+#ifndef CONFIG_USER_ONLY
53
+static bool instructions_supported(CPUARMState *env)
54
+{
55
+ return use_icount == 1 /* Precise instruction counting */;
56
+}
57
+
58
+static uint64_t instructions_get_count(CPUARMState *env)
59
+{
60
+ return (uint64_t)cpu_get_icount_raw();
61
+}
62
+#endif
63
+
64
static const pm_event pm_events[] = {
65
+#ifndef CONFIG_USER_ONLY
66
+ { .number = 0x008, /* INST_RETIRED, Instruction architecturally executed */
67
+ .supported = instructions_supported,
68
+ .get_count = instructions_get_count,
69
+ },
70
+ { .number = 0x011, /* CPU_CYCLES, Cycle */
71
+ .supported = event_always_supported,
72
+ .get_count = cycles_get_count,
73
+ }
74
+#endif
75
};
76
77
/*
78
@@ -XXX,XX +XXX,XX @@ static const pm_event pm_events[] = {
79
* should first be updated to something sparse instead of the current
80
* supported_event_map[] array.
81
*/
82
-#define MAX_EVENT_ID 0x0
83
+#define MAX_EVENT_ID 0x11
84
#define UNSUPPORTED_EVENT UINT16_MAX
85
static uint16_t supported_event_map[MAX_EVENT_ID + 1];
86
87
@@ -XXX,XX +XXX,XX @@ static CPAccessResult pmreg_access_swinc(CPUARMState *env,
88
return pmreg_access(env, ri, isread);
89
}
90
91
-#ifndef CONFIG_USER_ONLY
92
-
93
static CPAccessResult pmreg_access_selr(CPUARMState *env,
94
const ARMCPRegInfo *ri,
95
bool isread)
96
@@ -XXX,XX +XXX,XX @@ static bool pmu_counter_enabled(CPUARMState *env, uint8_t counter)
97
*/
98
void pmccntr_op_start(CPUARMState *env)
21
{
99
{
22
GICv3CPUState *cs = icc_cs_from_env(env);
100
- uint64_t cycles = 0;
23
int regno = ri->opc2 & 3;
101
- cycles = muldiv64(qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL),
24
- int grp = ri->crm & 1 ? GICV3_G0 : GICV3_G1NS;
102
- ARM_CPU_FREQ, NANOSECONDS_PER_SECOND);
25
+ int grp = (ri->crm & 1) ? GICV3_G1NS : GICV3_G0;
103
+ uint64_t cycles = cycles_get_count(env);
26
uint64_t value = cs->ich_apr[grp][regno];
104
27
105
if (pmu_counter_enabled(env, 31)) {
28
trace_gicv3_icv_ap_read(ri->crm & 1, regno, gicv3_redist_affid(cs), value);
106
uint64_t eff_cycles = cycles;
29
@@ -XXX,XX +XXX,XX @@ static void icv_ap_write(CPUARMState *env, const ARMCPRegInfo *ri,
107
@@ -XXX,XX +XXX,XX @@ static void pmccntr_write32(CPUARMState *env, const ARMCPRegInfo *ri,
108
pmccntr_write(env, ri, deposit64(cur_val, 0, 32, value));
109
}
110
111
-#else /* CONFIG_USER_ONLY */
112
-
113
-void pmccntr_op_start(CPUARMState *env)
114
-{
115
-}
116
-
117
-void pmccntr_op_finish(CPUARMState *env)
118
-{
119
-}
120
-
121
-void pmevcntr_op_start(CPUARMState *env, uint8_t i)
122
-{
123
-}
124
-
125
-void pmevcntr_op_finish(CPUARMState *env, uint8_t i)
126
-{
127
-}
128
-
129
-void pmu_op_start(CPUARMState *env)
130
-{
131
-}
132
-
133
-void pmu_op_finish(CPUARMState *env)
134
-{
135
-}
136
-
137
-void pmu_pre_el_change(ARMCPU *cpu, void *ignored)
138
-{
139
-}
140
-
141
-void pmu_post_el_change(ARMCPU *cpu, void *ignored)
142
-{
143
-}
144
-
145
-#endif
146
-
147
static void pmccfiltr_write(CPUARMState *env, const ARMCPRegInfo *ri,
148
uint64_t value)
30
{
149
{
31
GICv3CPUState *cs = icc_cs_from_env(env);
150
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v7_cp_reginfo[] = {
32
int regno = ri->opc2 & 3;
151
/* Unimplemented so WI. */
33
- int grp = ri->crm & 1 ? GICV3_G0 : GICV3_G1NS;
152
{ .name = "PMSWINC", .cp = 15, .crn = 9, .crm = 12, .opc1 = 0, .opc2 = 4,
34
+ int grp = (ri->crm & 1) ? GICV3_G1NS : GICV3_G0;
153
.access = PL0_W, .accessfn = pmreg_access_swinc, .type = ARM_CP_NOP },
35
154
-#ifndef CONFIG_USER_ONLY
36
trace_gicv3_icv_ap_write(ri->crm & 1, regno, gicv3_redist_affid(cs), value);
155
{ .name = "PMSELR", .cp = 15, .crn = 9, .crm = 12, .opc1 = 0, .opc2 = 5,
37
156
.access = PL0_RW, .type = ARM_CP_ALIAS,
38
@@ -XXX,XX +XXX,XX @@ static uint64_t icc_ap_read(CPUARMState *env, const ARMCPRegInfo *ri)
157
.fieldoffset = offsetoflow32(CPUARMState, cp15.c9_pmselr),
39
uint64_t value;
158
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v7_cp_reginfo[] = {
40
159
.fieldoffset = offsetof(CPUARMState, cp15.c15_ccnt),
41
int regno = ri->opc2 & 3;
160
.readfn = pmccntr_read, .writefn = pmccntr_write,
42
- int grp = ri->crm & 1 ? GICV3_G0 : GICV3_G1;
161
.raw_readfn = raw_read, .raw_writefn = raw_write, },
43
+ int grp = (ri->crm & 1) ? GICV3_G1 : GICV3_G0;
162
-#endif
44
163
{ .name = "PMCCFILTR", .cp = 15, .opc1 = 0, .crn = 14, .crm = 15, .opc2 = 7,
45
if (icv_access(env, grp == GICV3_G0 ? HCR_FMO : HCR_IMO)) {
164
.writefn = pmccfiltr_write_a32, .readfn = pmccfiltr_read_a32,
46
return icv_ap_read(env, ri);
165
.access = PL0_RW, .accessfn = pmreg_access,
47
@@ -XXX,XX +XXX,XX @@ static void icc_ap_write(CPUARMState *env, const ARMCPRegInfo *ri,
166
@@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu)
48
GICv3CPUState *cs = icc_cs_from_env(env);
167
* count register.
49
168
*/
50
int regno = ri->opc2 & 3;
169
unsigned int i, pmcrn = 0;
51
- int grp = ri->crm & 1 ? GICV3_G0 : GICV3_G1;
170
-#ifndef CONFIG_USER_ONLY
52
+ int grp = (ri->crm & 1) ? GICV3_G1 : GICV3_G0;
171
ARMCPRegInfo pmcr = {
53
172
.name = "PMCR", .cp = 15, .crn = 9, .crm = 12, .opc1 = 0, .opc2 = 0,
54
if (icv_access(env, grp == GICV3_G0 ? HCR_FMO : HCR_IMO)) {
173
.access = PL0_RW,
55
icv_ap_write(env, ri, value);
174
@@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu)
56
@@ -XXX,XX +XXX,XX @@ static uint64_t ich_ap_read(CPUARMState *env, const ARMCPRegInfo *ri)
175
g_free(pmevtyper_name);
57
{
176
g_free(pmevtyper_el0_name);
58
GICv3CPUState *cs = icc_cs_from_env(env);
177
}
59
int regno = ri->opc2 & 3;
178
-#endif
60
- int grp = ri->crm & 1 ? GICV3_G0 : GICV3_G1NS;
179
ARMCPRegInfo clidr = {
61
+ int grp = (ri->crm & 1) ? GICV3_G1NS : GICV3_G0;
180
.name = "CLIDR", .state = ARM_CP_STATE_BOTH,
62
uint64_t value;
181
.opc0 = 3, .crn = 0, .crm = 0, .opc1 = 1, .opc2 = 1,
63
64
value = cs->ich_apr[grp][regno];
65
@@ -XXX,XX +XXX,XX @@ static void ich_ap_write(CPUARMState *env, const ARMCPRegInfo *ri,
66
{
67
GICv3CPUState *cs = icc_cs_from_env(env);
68
int regno = ri->opc2 & 3;
69
- int grp = ri->crm & 1 ? GICV3_G0 : GICV3_G1NS;
70
+ int grp = (ri->crm & 1) ? GICV3_G1NS : GICV3_G0;
71
72
trace_gicv3_ich_ap_write(ri->crm & 1, regno, gicv3_redist_affid(cs), value);
73
74
--
182
--
75
2.17.1
183
2.20.1
76
184
77
185
diff view generated by jsdifflib
1
Add entries to MAINTAINERS to cover the newer MPS2 boards and
1
From: Aaron Lindsay <aaron@os.amperecomputing.com>
2
the new devices they use.
3
2
3
This both advertises that we support four counters and enables them
4
because the pmu_num_counters() reads this value from PMCR.
5
6
Signed-off-by: Aaron Lindsay <alindsay@codeaurora.org>
7
Signed-off-by: Aaron Lindsay <aaron@os.amperecomputing.com>
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Message-id: 20181211151945.29137-13-aaron@os.amperecomputing.com
4
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
5
Message-id: 20180518153157.14899-1-peter.maydell@linaro.org
6
---
11
---
7
MAINTAINERS | 9 +++++++--
12
target/arm/helper.c | 10 +++++-----
8
1 file changed, 7 insertions(+), 2 deletions(-)
13
1 file changed, 5 insertions(+), 5 deletions(-)
9
14
10
diff --git a/MAINTAINERS b/MAINTAINERS
15
diff --git a/target/arm/helper.c b/target/arm/helper.c
11
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
12
--- a/MAINTAINERS
17
--- a/target/arm/helper.c
13
+++ b/MAINTAINERS
18
+++ b/target/arm/helper.c
14
@@ -XXX,XX +XXX,XX @@ F: hw/timer/cmsdk-apb-timer.c
19
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v7_cp_reginfo[] = {
15
F: include/hw/timer/cmsdk-apb-timer.h
20
.access = PL1_W, .type = ARM_CP_NOP },
16
F: hw/char/cmsdk-apb-uart.c
21
/* Performance monitors are implementation defined in v7,
17
F: include/hw/char/cmsdk-apb-uart.h
22
* but with an ARM recommended set of registers, which we
18
+F: hw/misc/tz-ppc.c
23
- * follow (although we don't actually implement any counters)
19
+F: include/hw/misc/tz-ppc.h
24
+ * follow.
20
25
*
21
ARM cores
26
* Performance registers fall into three categories:
22
M: Peter Maydell <peter.maydell@linaro.org>
27
* (a) always UNDEF in PL0, RW in PL1 (PMINTENSET, PMINTENCLR)
23
@@ -XXX,XX +XXX,XX @@ M: Peter Maydell <peter.maydell@linaro.org>
28
@@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu)
24
L: qemu-arm@nongnu.org
29
}
25
S: Maintained
30
if (arm_feature(env, ARM_FEATURE_V7)) {
26
F: hw/arm/mps2.c
31
/* v7 performance monitor control register: same implementor
27
-F: hw/misc/mps2-scc.c
32
- * field as main ID register, and we implement only the cycle
28
-F: include/hw/misc/mps2-scc.h
33
- * count register.
29
+F: hw/arm/mps2-tz.c
34
+ * field as main ID register, and we implement four counters in
30
+F: hw/misc/mps2-*.c
35
+ * addition to the cycle count register.
31
+F: include/hw/misc/mps2-*.h
36
*/
32
+F: hw/arm/iotkit.c
37
- unsigned int i, pmcrn = 0;
33
+F: include/hw/arm/iotkit.h
38
+ unsigned int i, pmcrn = 4;
34
39
ARMCPRegInfo pmcr = {
35
Musicpal
40
.name = "PMCR", .cp = 15, .crn = 9, .crm = 12, .opc1 = 0, .opc2 = 0,
36
M: Jan Kiszka <jan.kiszka@web.de>
41
.access = PL0_RW,
42
@@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu)
43
.access = PL0_RW, .accessfn = pmreg_access,
44
.type = ARM_CP_IO,
45
.fieldoffset = offsetof(CPUARMState, cp15.c9_pmcr),
46
- .resetvalue = cpu->midr & 0xff000000,
47
+ .resetvalue = (cpu->midr & 0xff000000) | (pmcrn << PMCRN_SHIFT),
48
.writefn = pmcr_write, .raw_writefn = raw_write,
49
};
50
define_one_arm_cp_reg(cpu, &pmcr);
37
--
51
--
38
2.17.1
52
2.20.1
39
53
40
54
diff view generated by jsdifflib
1
As part of plumbing MemTxAttrs down to the IOMMU translate method,
1
From: Aaron Lindsay <aaron@os.amperecomputing.com>
2
add MemTxAttrs as an argument to flatview_access_valid().
3
Its callers now all have an attrs value to hand, so we can
4
correct our earlier temporary use of MEMTXATTRS_UNSPECIFIED.
5
2
3
Signed-off-by: Aaron Lindsay <alindsay@codeaurora.org>
4
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
5
Message-id: 20181211151945.29137-14-aaron@os.amperecomputing.com
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20180521140402.23318-10-peter.maydell@linaro.org
10
---
7
---
11
exec.c | 12 +++++-------
8
target/arm/helper.c | 39 +++++++++++++++++++++++++++++++++++++--
12
1 file changed, 5 insertions(+), 7 deletions(-)
9
1 file changed, 37 insertions(+), 2 deletions(-)
13
10
14
diff --git a/exec.c b/exec.c
11
diff --git a/target/arm/helper.c b/target/arm/helper.c
15
index XXXXXXX..XXXXXXX 100644
12
index XXXXXXX..XXXXXXX 100644
16
--- a/exec.c
13
--- a/target/arm/helper.c
17
+++ b/exec.c
14
+++ b/target/arm/helper.c
18
@@ -XXX,XX +XXX,XX @@ static MemTxResult flatview_read(FlatView *fv, hwaddr addr,
15
@@ -XXX,XX +XXX,XX @@ static bool event_always_supported(CPUARMState *env)
19
static MemTxResult flatview_write(FlatView *fv, hwaddr addr, MemTxAttrs attrs,
16
return true;
20
const uint8_t *buf, int len);
17
}
21
static bool flatview_access_valid(FlatView *fv, hwaddr addr, int len,
18
22
- bool is_write);
19
+static uint64_t swinc_get_count(CPUARMState *env)
23
+ bool is_write, MemTxAttrs attrs);
20
+{
24
21
+ /*
25
static MemTxResult subpage_read(void *opaque, hwaddr addr, uint64_t *data,
22
+ * SW_INCR events are written directly to the pmevcntr's by writes to
26
unsigned len, MemTxAttrs attrs)
23
+ * PMSWINC, so there is no underlying count maintained by the PMU itself
27
@@ -XXX,XX +XXX,XX @@ static bool subpage_accepts(void *opaque, hwaddr addr,
24
+ */
25
+ return 0;
26
+}
27
+
28
/*
29
* Return the underlying cycle count for the PMU cycle counters. If we're in
30
* usermode, simply return 0.
31
@@ -XXX,XX +XXX,XX @@ static uint64_t instructions_get_count(CPUARMState *env)
28
#endif
32
#endif
29
33
30
return flatview_access_valid(subpage->fv, addr + subpage->base,
34
static const pm_event pm_events[] = {
31
- len, is_write);
35
+ { .number = 0x000, /* SW_INCR */
32
+ len, is_write, attrs);
36
+ .supported = event_always_supported,
37
+ .get_count = swinc_get_count,
38
+ },
39
#ifndef CONFIG_USER_ONLY
40
{ .number = 0x008, /* INST_RETIRED, Instruction architecturally executed */
41
.supported = instructions_supported,
42
@@ -XXX,XX +XXX,XX @@ static void pmcr_write(CPUARMState *env, const ARMCPRegInfo *ri,
43
pmu_op_finish(env);
33
}
44
}
34
45
35
static const MemoryRegionOps subpage_ops = {
46
+static void pmswinc_write(CPUARMState *env, const ARMCPRegInfo *ri,
36
@@ -XXX,XX +XXX,XX @@ static void cpu_notify_map_clients(void)
47
+ uint64_t value)
37
}
48
+{
38
49
+ unsigned int i;
39
static bool flatview_access_valid(FlatView *fv, hwaddr addr, int len,
50
+ for (i = 0; i < pmu_num_counters(env); i++) {
40
- bool is_write)
51
+ /* Increment a counter's count iff: */
41
+ bool is_write, MemTxAttrs attrs)
52
+ if ((value & (1 << i)) && /* counter's bit is set */
53
+ /* counter is enabled and not filtered */
54
+ pmu_counter_enabled(env, i) &&
55
+ /* counter is SW_INCR */
56
+ (env->cp15.c14_pmevtyper[i] & PMXEVTYPER_EVTCOUNT) == 0x0) {
57
+ pmevcntr_op_start(env, i);
58
+ env->cp15.c14_pmevcntr[i]++;
59
+ pmevcntr_op_finish(env, i);
60
+ }
61
+ }
62
+}
63
+
64
static uint64_t pmccntr_read(CPUARMState *env, const ARMCPRegInfo *ri)
42
{
65
{
43
MemoryRegion *mr;
66
uint64_t ret;
44
hwaddr l, xlat;
67
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v7_cp_reginfo[] = {
45
@@ -XXX,XX +XXX,XX @@ static bool flatview_access_valid(FlatView *fv, hwaddr addr, int len,
68
.fieldoffset = offsetof(CPUARMState, cp15.c9_pmovsr),
46
mr = flatview_translate(fv, addr, &xlat, &l, is_write);
69
.writefn = pmovsr_write,
47
if (!memory_access_is_direct(mr, is_write)) {
70
.raw_writefn = raw_write },
48
l = memory_access_size(mr, l, addr);
71
- /* Unimplemented so WI. */
49
- /* When our callers all have attrs we'll pass them through here */
72
{ .name = "PMSWINC", .cp = 15, .crn = 9, .crm = 12, .opc1 = 0, .opc2 = 4,
50
- if (!memory_region_access_valid(mr, xlat, l, is_write,
73
- .access = PL0_W, .accessfn = pmreg_access_swinc, .type = ARM_CP_NOP },
51
- MEMTXATTRS_UNSPECIFIED)) {
74
+ .access = PL0_W, .accessfn = pmreg_access_swinc, .type = ARM_CP_NO_RAW,
52
+ if (!memory_region_access_valid(mr, xlat, l, is_write, attrs)) {
75
+ .writefn = pmswinc_write },
53
return false;
76
+ { .name = "PMSWINC_EL0", .state = ARM_CP_STATE_AA64,
54
}
77
+ .opc0 = 3, .opc1 = 3, .crn = 9, .crm = 12, .opc2 = 4,
55
}
78
+ .access = PL0_W, .accessfn = pmreg_access_swinc, .type = ARM_CP_NO_RAW,
56
@@ -XXX,XX +XXX,XX @@ bool address_space_access_valid(AddressSpace *as, hwaddr addr,
79
+ .writefn = pmswinc_write },
57
80
{ .name = "PMSELR", .cp = 15, .crn = 9, .crm = 12, .opc1 = 0, .opc2 = 5,
58
rcu_read_lock();
81
.access = PL0_RW, .type = ARM_CP_ALIAS,
59
fv = address_space_to_flatview(as);
82
.fieldoffset = offsetoflow32(CPUARMState, cp15.c9_pmselr),
60
- result = flatview_access_valid(fv, addr, len, is_write);
61
+ result = flatview_access_valid(fv, addr, len, is_write, attrs);
62
rcu_read_unlock();
63
return result;
64
}
65
--
83
--
66
2.17.1
84
2.20.1
67
85
68
86
diff view generated by jsdifflib
1
Add more detail to the documentation for memory_region_init_iommu()
1
From: Julia Suvorova <jusual@mail.ru>
2
and other IOMMU-related functions and data structures.
3
2
3
Run qtest with a socket that connects QEMU chardev and test code.
4
5
Signed-off-by: Julia Suvorova <jusual@mail.ru>
6
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
7
Message-id: 20190117161640.5496-2-jusual@mail.ru
4
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
5
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
6
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
7
Reviewed-by: Eric Auger <eric.auger@redhat.com>
8
Message-id: 20180521140402.23318-2-peter.maydell@linaro.org
9
---
9
---
10
include/exec/memory.h | 105 ++++++++++++++++++++++++++++++++++++++----
10
tests/libqtest.h | 11 +++++++++++
11
1 file changed, 95 insertions(+), 10 deletions(-)
11
tests/libqtest.c | 26 ++++++++++++++++++++++++++
12
2 files changed, 37 insertions(+)
12
13
13
diff --git a/include/exec/memory.h b/include/exec/memory.h
14
diff --git a/tests/libqtest.h b/tests/libqtest.h
14
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
15
--- a/include/exec/memory.h
16
--- a/tests/libqtest.h
16
+++ b/include/exec/memory.h
17
+++ b/tests/libqtest.h
17
@@ -XXX,XX +XXX,XX @@ enum IOMMUMemoryRegionAttr {
18
@@ -XXX,XX +XXX,XX @@ QTestState *qtest_init(const char *extra_args);
18
IOMMU_ATTR_SPAPR_TCE_FD
19
*/
19
};
20
QTestState *qtest_init_without_qmp_handshake(const char *extra_args);
20
21
21
+/**
22
+/**
22
+ * IOMMUMemoryRegionClass:
23
+ * qtest_init_with_serial:
24
+ * @extra_args: other arguments to pass to QEMU. CAUTION: these
25
+ * arguments are subject to word splitting and shell evaluation.
26
+ * @sock_fd: pointer to store the socket file descriptor for
27
+ * connection with serial.
23
+ *
28
+ *
24
+ * All IOMMU implementations need to subclass TYPE_IOMMU_MEMORY_REGION
29
+ * Returns: #QTestState instance.
25
+ * and provide an implementation of at least the @translate method here
26
+ * to handle requests to the memory region. Other methods are optional.
27
+ *
28
+ * The IOMMU implementation must use the IOMMU notifier infrastructure
29
+ * to report whenever mappings are changed, by calling
30
+ * memory_region_notify_iommu() (or, if necessary, by calling
31
+ * memory_region_notify_one() for each registered notifier).
32
+ */
30
+ */
33
typedef struct IOMMUMemoryRegionClass {
31
+QTestState *qtest_init_with_serial(const char *extra_args, int *sock_fd);
34
/* private */
32
+
35
struct DeviceClass parent_class;
33
/**
36
34
* qtest_quit:
37
/*
35
* @s: #QTestState instance to operate on.
38
- * Return a TLB entry that contains a given address. Flag should
36
diff --git a/tests/libqtest.c b/tests/libqtest.c
39
- * be the access permission of this translation operation. We can
37
index XXXXXXX..XXXXXXX 100644
40
- * set flag to IOMMU_NONE to mean that we don't need any
38
--- a/tests/libqtest.c
41
- * read/write permission checks, like, when for region replay.
39
+++ b/tests/libqtest.c
42
+ * Return a TLB entry that contains a given address.
40
@@ -XXX,XX +XXX,XX @@ QTestState *qtest_initf(const char *fmt, ...)
43
+ *
41
return s;
44
+ * The IOMMUAccessFlags indicated via @flag are optional and may
42
}
45
+ * be specified as IOMMU_NONE to indicate that the caller needs
43
46
+ * the full translation information for both reads and writes. If
44
+QTestState *qtest_init_with_serial(const char *extra_args, int *sock_fd)
47
+ * the access flags are specified then the IOMMU implementation
45
+{
48
+ * may use this as an optimization, to stop doing a page table
46
+ int sock_fd_init;
49
+ * walk as soon as it knows that the requested permissions are not
47
+ char *sock_path, sock_dir[] = "/tmp/qtest-serial-XXXXXX";
50
+ * allowed. If IOMMU_NONE is passed then the IOMMU must do the
48
+ QTestState *qts;
51
+ * full page table walk and report the permissions in the returned
49
+
52
+ * IOMMUTLBEntry. (Note that this implies that an IOMMU may not
50
+ g_assert(mkdtemp(sock_dir));
53
+ * return different mappings for reads and writes.)
51
+ sock_path = g_strdup_printf("%s/sock", sock_dir);
54
+ *
52
+
55
+ * The returned information remains valid while the caller is
53
+ sock_fd_init = init_socket(sock_path);
56
+ * holding the big QEMU lock or is inside an RCU critical section;
54
+
57
+ * if the caller wishes to cache the mapping beyond that it must
55
+ qts = qtest_initf("-chardev socket,id=s0,path=%s,nowait "
58
+ * register an IOMMU notifier so it can invalidate its cached
56
+ "-serial chardev:s0 %s",
59
+ * information when the IOMMU mapping changes.
57
+ sock_path, extra_args);
60
+ *
58
+
61
+ * @iommu: the IOMMUMemoryRegion
59
+ *sock_fd = socket_accept(sock_fd_init);
62
+ * @hwaddr: address to be translated within the memory region
60
+
63
+ * @flag: requested access permissions
61
+ unlink(sock_path);
64
*/
62
+ g_free(sock_path);
65
IOMMUTLBEntry (*translate)(IOMMUMemoryRegion *iommu, hwaddr addr,
63
+ rmdir(sock_dir);
66
IOMMUAccessFlags flag);
64
+
67
- /* Returns minimum supported page size */
65
+ g_assert(*sock_fd >= 0);
68
+ /* Returns minimum supported page size in bytes.
66
+
69
+ * If this method is not provided then the minimum is assumed to
67
+ return qts;
70
+ * be TARGET_PAGE_SIZE.
68
+}
71
+ *
69
+
72
+ * @iommu: the IOMMUMemoryRegion
70
void qtest_quit(QTestState *s)
73
+ */
71
{
74
uint64_t (*get_min_page_size)(IOMMUMemoryRegion *iommu);
72
g_hook_destroy_link(&abrt_hooks, g_hook_find_data(&abrt_hooks, TRUE, s));
75
- /* Called when IOMMU Notifier flag changed */
76
+ /* Called when IOMMU Notifier flag changes (ie when the set of
77
+ * events which IOMMU users are requesting notification for changes).
78
+ * Optional method -- need not be provided if the IOMMU does not
79
+ * need to know exactly which events must be notified.
80
+ *
81
+ * @iommu: the IOMMUMemoryRegion
82
+ * @old_flags: events which previously needed to be notified
83
+ * @new_flags: events which now need to be notified
84
+ */
85
void (*notify_flag_changed)(IOMMUMemoryRegion *iommu,
86
IOMMUNotifierFlag old_flags,
87
IOMMUNotifierFlag new_flags);
88
- /* Set this up to provide customized IOMMU replay function */
89
+ /* Called to handle memory_region_iommu_replay().
90
+ *
91
+ * The default implementation of memory_region_iommu_replay() is to
92
+ * call the IOMMU translate method for every page in the address space
93
+ * with flag == IOMMU_NONE and then call the notifier if translate
94
+ * returns a valid mapping. If this method is implemented then it
95
+ * overrides the default behaviour, and must provide the full semantics
96
+ * of memory_region_iommu_replay(), by calling @notifier for every
97
+ * translation present in the IOMMU.
98
+ *
99
+ * Optional method -- an IOMMU only needs to provide this method
100
+ * if the default is inefficient or produces undesirable side effects.
101
+ *
102
+ * Note: this is not related to record-and-replay functionality.
103
+ */
104
void (*replay)(IOMMUMemoryRegion *iommu, IOMMUNotifier *notifier);
105
106
- /* Get IOMMU misc attributes */
107
- int (*get_attr)(IOMMUMemoryRegion *iommu, enum IOMMUMemoryRegionAttr,
108
+ /* Get IOMMU misc attributes. This is an optional method that
109
+ * can be used to allow users of the IOMMU to get implementation-specific
110
+ * information. The IOMMU implements this method to handle calls
111
+ * by IOMMU users to memory_region_iommu_get_attr() by filling in
112
+ * the arbitrary data pointer for any IOMMUMemoryRegionAttr values that
113
+ * the IOMMU supports. If the method is unimplemented then
114
+ * memory_region_iommu_get_attr() will always return -EINVAL.
115
+ *
116
+ * @iommu: the IOMMUMemoryRegion
117
+ * @attr: attribute being queried
118
+ * @data: memory to fill in with the attribute data
119
+ *
120
+ * Returns 0 on success, or a negative errno; in particular
121
+ * returns -EINVAL for unrecognized or unimplemented attribute types.
122
+ */
123
+ int (*get_attr)(IOMMUMemoryRegion *iommu, enum IOMMUMemoryRegionAttr attr,
124
void *data);
125
} IOMMUMemoryRegionClass;
126
127
@@ -XXX,XX +XXX,XX @@ static inline void memory_region_init_reservation(MemoryRegion *mr,
128
* An IOMMU region translates addresses and forwards accesses to a target
129
* memory region.
130
*
131
+ * The IOMMU implementation must define a subclass of TYPE_IOMMU_MEMORY_REGION.
132
+ * @_iommu_mr should be a pointer to enough memory for an instance of
133
+ * that subclass, @instance_size is the size of that subclass, and
134
+ * @mrtypename is its name. This function will initialize @_iommu_mr as an
135
+ * instance of the subclass, and its methods will then be called to handle
136
+ * accesses to the memory region. See the documentation of
137
+ * #IOMMUMemoryRegionClass for further details.
138
+ *
139
* @_iommu_mr: the #IOMMUMemoryRegion to be initialized
140
* @instance_size: the IOMMUMemoryRegion subclass instance size
141
* @mrtypename: the type name of the #IOMMUMemoryRegion
142
@@ -XXX,XX +XXX,XX @@ void memory_region_register_iommu_notifier(MemoryRegion *mr,
143
* a notifier with the minimum page granularity returned by
144
* mr->iommu_ops->get_page_size().
145
*
146
+ * Note: this is not related to record-and-replay functionality.
147
+ *
148
* @iommu_mr: the memory region to observe
149
* @n: the notifier to which to replay iommu mappings
150
*/
151
@@ -XXX,XX +XXX,XX @@ void memory_region_iommu_replay(IOMMUMemoryRegion *iommu_mr, IOMMUNotifier *n);
152
* memory_region_iommu_replay_all: replay existing IOMMU translations
153
* to all the notifiers registered.
154
*
155
+ * Note: this is not related to record-and-replay functionality.
156
+ *
157
* @iommu_mr: the memory region to observe
158
*/
159
void memory_region_iommu_replay_all(IOMMUMemoryRegion *iommu_mr);
160
@@ -XXX,XX +XXX,XX @@ void memory_region_unregister_iommu_notifier(MemoryRegion *mr,
161
* memory_region_iommu_get_attr: return an IOMMU attr if get_attr() is
162
* defined on the IOMMU.
163
*
164
- * Returns 0 if succeded, error code otherwise.
165
+ * Returns 0 on success, or a negative errno otherwise. In particular,
166
+ * -EINVAL indicates that the IOMMU does not support the requested
167
+ * attribute.
168
*
169
* @iommu_mr: the memory region
170
* @attr: the requested attribute
171
--
73
--
172
2.17.1
74
2.20.1
173
75
174
76
diff view generated by jsdifflib