1 | First pullreq of the 3.1 release cycle, with lots of | 1 | A big pullreq by number of patches, but most of them are just docs |
---|---|---|---|
2 | Arm related patches accumulated during freeze. Most | 2 | updates or MAINTAINERS file fixes. The actual code changes are pretty |
3 | notable here is Luc's GICv2 virtualization support and | 3 | minimal bugfixes. |
4 | my execute-from-MMIO patches. | ||
5 | |||
6 | I stopped looking at my to-review queue towards the | ||
7 | end of freeze, since 45 patches is already pushing what | ||
8 | I consider a reasonable sized pullreq; once this goes into | ||
9 | master I'll start working through it again. | ||
10 | 4 | ||
11 | thanks | 5 | thanks |
12 | -- PMM | 6 | -- PMM |
13 | 7 | ||
14 | The following changes since commit 38441756b70eec5807b5f60dad11a93a91199866: | 8 | The following changes since commit 8cc30eb1400fc01f2b139cdd3dc524f8b84dbe07: |
15 | 9 | ||
16 | Update version for v3.0.0 release (2018-08-14 16:38:43 +0100) | 10 | Merge remote-tracking branch 'remotes/mcayland/tags/qemu-sparc-20201122' into staging (2020-11-22 15:02:52 +0000) |
17 | 11 | ||
18 | are available in the Git repository at: | 12 | are available in the Git repository at: |
19 | 13 | ||
20 | git://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20180814 | 14 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20201123 |
21 | 15 | ||
22 | for you to fetch changes up to 054e7adf4e64e4acb3b033348ebf7cc871baa34f: | 16 | for you to fetch changes up to c6ff78563ad2971f289168c7cae6ecb0b4359516: |
23 | 17 | ||
24 | target/arm: Fix typo in helper_sve_movz_d (2018-08-14 17:17:22 +0100) | 18 | docs/system/pr-manager.rst: Fix minor docs nits (2020-11-23 11:10:04 +0000) |
25 | 19 | ||
26 | ---------------------------------------------------------------- | 20 | ---------------------------------------------------------------- |
27 | target-arm queue: | 21 | target-arm queue: |
28 | * Implement more of ARMv6-M support | 22 | * incorporate 'orphan' rST docs into manuals |
29 | * Support direct execution from non-RAM regions; | 23 | * linux-user/arm: Deliver SIGTRAP for UDF patterns used as breakpoints |
30 | use this to implmeent execution from small (<1K) MPU regions | 24 | * target/arm: Make SYS_HEAPINFO work with RAM that doesn't start at 0 |
31 | * GICv2: implement the virtualization extensions | 25 | * document raspi boards and tosa |
32 | * support a virtualization-capable GICv2 in the virt and | 26 | * docs/system: Deprecate raspi2/raspi3 machine aliases |
33 | xlnx-zynqmp boards | 27 | * docs/system/arm: Document OpenPOWER Witherspoon BMC model Front LEDs |
34 | * arm: Fix return code of arm_load_elf() so we can detect | 28 | * MAINTAINERS: add lines for docs files for Arm boards |
35 | failure to load the file correctly | 29 | * hw/intc: fix heap-buffer-overflow in rxicu_realize() |
36 | * Implement HCR_EL2.TGE ("trap general exceptions") bit | 30 | * hw/arm: Fix bad print format specifiers |
37 | * Implement tailchaining for M profile cores | 31 | * target/arm: fix stage 2 page-walks in 32-bit emulation |
38 | * Fix bugs in SVE compare, saturating add/sub, WHILE, MOVZ | ||
39 | 32 | ||
40 | ---------------------------------------------------------------- | 33 | ---------------------------------------------------------------- |
41 | Adam Lackorzynski (1): | 34 | AlexChen (1): |
42 | arm: Fix return code of arm_load_elf | 35 | hw/arm: Fix bad print format specifiers |
43 | 36 | ||
44 | Julia Suvorova (4): | 37 | Chen Qun (1): |
45 | target/arm: Forbid unprivileged mode for M Baseline | 38 | hw/intc: fix heap-buffer-overflow in rxicu_realize() |
46 | nvic: Handle ARMv6-M SCS reserved registers | ||
47 | arm: Add ARMv6-M programmer's model support | ||
48 | nvic: Change NVIC to support ARMv6-M | ||
49 | 39 | ||
50 | Luc Michel (20): | 40 | Peter Maydell (11): |
51 | intc/arm_gic: Refactor operations on the distributor | 41 | target/arm: Make SYS_HEAPINFO work with RAM that doesn't start at 0 |
52 | intc/arm_gic: Implement GICD_ISACTIVERn and GICD_ICACTIVERn registers | 42 | linux-user/arm: Deliver SIGTRAP for UDF patterns used as breakpoints |
53 | intc/arm_gic: Remove some dead code and put some functions static | 43 | docs: Move virtio-net-failover.rst into the system manual |
54 | vmstate.h: Provide VMSTATE_UINT16_SUB_ARRAY | 44 | docs: Move cpu-hotplug.rst into the system manual |
55 | intc/arm_gic: Add the virtualization extensions to the GIC state | 45 | docs: Move virtio-pmem.rst into the system manual |
56 | intc/arm_gic: Add virtual interface register definitions | 46 | docs/system/virtio-pmem.rst: Fix minor style issues |
57 | intc/arm_gic: Add virtualization extensions helper macros and functions | 47 | docs: Split out 'pc' machine model docs into their own file |
58 | intc/arm_gic: Refactor secure/ns access check in the CPU interface | 48 | docs: Move microvm.rst into the system manual |
59 | intc/arm_gic: Add virtualization enabled IRQ helper functions | 49 | docs: Move pr-manager.rst into the system manual |
60 | intc/arm_gic: Implement virtualization extensions in gic_(activate_irq|drop_prio) | 50 | docs: Split qemu-pr-helper documentation into tools manual |
61 | intc/arm_gic: Implement virtualization extensions in gic_acknowledge_irq | 51 | docs/system/pr-manager.rst: Fix minor docs nits |
62 | intc/arm_gic: Implement virtualization extensions in gic_(deactivate|complete_irq) | ||
63 | intc/arm_gic: Implement virtualization extensions in gic_cpu_(read|write) | ||
64 | intc/arm_gic: Wire the vCPU interface | ||
65 | intc/arm_gic: Implement the virtual interface registers | ||
66 | intc/arm_gic: Implement gic_update_virt() function | ||
67 | intc/arm_gic: Implement maintenance interrupt generation | ||
68 | intc/arm_gic: Improve traces | ||
69 | xlnx-zynqmp: Improve GIC wiring and MMIO mapping | ||
70 | arm/virt: Add support for GICv2 virtualization extensions | ||
71 | 52 | ||
72 | Peter Maydell (16): | 53 | Philippe Mathieu-Daudé (10): |
73 | accel/tcg: Pass read access type through to io_readx() | 54 | MAINTAINERS: Cover system/arm/cpu-features.rst with ARM TCG CPUs |
74 | accel/tcg: Handle get_page_addr_code() returning -1 in hashtable lookups | 55 | MAINTAINERS: Cover system/arm/aspeed.rst with ASPEED BMC machines |
75 | accel/tcg: Handle get_page_addr_code() returning -1 in tb_check_watchpoint() | 56 | MAINTAINERS: Cover system/arm/nuvoton.rst with Nuvoton NPCM7xx |
76 | accel/tcg: tb_gen_code(): Create single-insn TB for execution from non-RAM | 57 | MAINTAINERS: Fix system/arm/orangepi.rst path |
77 | accel/tcg: Return -1 for execution from MMIO regions in get_page_addr_code() | 58 | MAINTAINERS: Cover system/arm/sbsa.rst with SBSA-REF machine |
78 | target/arm: Allow execution from small regions | 59 | MAINTAINERS: Cover system/arm/sx1.rst with OMAP machines |
79 | accel/tcg: Check whether TLB entry is RAM consistently with how we set it up | 60 | docs/system: Deprecate raspi2/raspi3 machine aliases |
80 | target/arm: Mask virtual interrupts if HCR_EL2.TGE is set | 61 | docs/system/arm: Document the various raspi boards |
81 | target/arm: Honour HCR_EL2.TGE and MDCR_EL2.TDE in debug register access checks | 62 | docs/system/arm: Document OpenPOWER Witherspoon BMC model Front LEDs |
82 | target/arm: Honour HCR_EL2.TGE when raising synchronous exceptions | 63 | docs/system/arm: Document the Sharp Zaurus SL-6000 |
83 | target/arm: Provide accessor functions for HCR_EL2.{IMO, FMO, AMO} | ||
84 | target/arm: Treat SCTLR_EL1.M as if it were zero when HCR_EL2.TGE is set | ||
85 | target/arm: Improve exception-taken logging | ||
86 | target/arm: Initialize exc_secure correctly in do_v7m_exception_exit() | ||
87 | target/arm: Restore M-profile CONTROL.SPSEL before any tailchaining | ||
88 | target/arm: Implement tailchaining for M profile cores | ||
89 | 64 | ||
90 | Richard Henderson (4): | 65 | Rémi Denis-Courmont (1): |
91 | target/arm: Fix sign of sve_cmpeq_ppzw/sve_cmpne_ppzw | 66 | target/arm: fix stage 2 page-walks in 32-bit emulation |
92 | target/arm: Fix typo in do_sat_addsub_64 | ||
93 | target/arm: Reorganize SVE WHILE | ||
94 | target/arm: Fix typo in helper_sve_movz_d | ||
95 | 67 | ||
96 | accel/tcg/softmmu_template.h | 11 +- | 68 | docs/meson.build | 1 + |
97 | hw/intc/gic_internal.h | 282 +++++++++-- | 69 | docs/system/arm/aspeed.rst | 1 + |
98 | include/exec/exec-all.h | 2 - | 70 | docs/system/arm/raspi.rst | 43 +++++++++++++++ |
99 | include/hw/arm/virt.h | 4 +- | 71 | docs/system/arm/xscale.rst | 20 ++++--- |
100 | include/hw/arm/xlnx-zynqmp.h | 4 +- | 72 | docs/{ => system}/cpu-hotplug.rst | 0 |
101 | include/hw/intc/arm_gic_common.h | 43 +- | 73 | docs/system/deprecated.rst | 7 +++ |
102 | include/hw/intc/armv7m_nvic.h | 1 + | 74 | docs/{ => system/i386}/microvm.rst | 5 +- |
103 | include/migration/vmstate.h | 3 + | 75 | docs/system/i386/pc.rst | 7 +++ |
104 | include/qom/cpu.h | 6 + | 76 | docs/system/index.rst | 4 ++ |
105 | target/arm/cpu.h | 62 ++- | 77 | docs/{ => system}/pr-manager.rst | 44 +++------------ |
106 | accel/tcg/cpu-exec.c | 3 + | 78 | docs/system/target-arm.rst | 1 + |
107 | accel/tcg/cputlb.c | 111 +---- | 79 | docs/system/target-i386.rst | 19 +++++-- |
108 | accel/tcg/translate-all.c | 23 +- | 80 | docs/{ => system}/virtio-net-failover.rst | 0 |
109 | exec.c | 6 - | 81 | docs/system/virtio-pmem.rst | 76 ++++++++++++++++++++++++++ |
110 | hw/arm/boot.c | 8 +- | 82 | docs/tools/conf.py | 2 + |
111 | hw/arm/virt-acpi-build.c | 6 +- | 83 | docs/tools/index.rst | 1 + |
112 | hw/arm/virt.c | 52 ++- | 84 | docs/tools/qemu-pr-helper.rst | 90 +++++++++++++++++++++++++++++++ |
113 | hw/arm/xlnx-zynqmp.c | 92 +++- | 85 | docs/virtio-pmem.rst | 76 -------------------------- |
114 | hw/intc/arm_gic.c | 987 +++++++++++++++++++++++++++++++-------- | 86 | hw/arm/pxa2xx.c | 2 +- |
115 | hw/intc/arm_gic_common.c | 154 ++++-- | 87 | hw/arm/spitz.c | 2 +- |
116 | hw/intc/arm_gic_kvm.c | 31 +- | 88 | hw/arm/tosa.c | 2 +- |
117 | hw/intc/arm_gicv3_cpuif.c | 19 +- | 89 | hw/intc/rx_icu.c | 18 +++---- |
118 | hw/intc/armv7m_nvic.c | 82 +++- | 90 | linux-user/arm/cpu_loop.c | 28 ++++++++++ |
119 | memory.c | 3 +- | 91 | target/arm/arm-semi.c | 12 +++-- |
120 | target/arm/cpu.c | 4 + | 92 | target/arm/helper.c | 4 +- |
121 | target/arm/helper.c | 127 +++-- | 93 | MAINTAINERS | 8 ++- |
122 | target/arm/op_helper.c | 14 + | 94 | 26 files changed, 326 insertions(+), 147 deletions(-) |
123 | target/arm/sve_helper.c | 19 +- | 95 | create mode 100644 docs/system/arm/raspi.rst |
124 | target/arm/translate-sve.c | 51 +- | 96 | rename docs/{ => system}/cpu-hotplug.rst (100%) |
125 | hw/intc/trace-events | 12 +- | 97 | rename docs/{ => system/i386}/microvm.rst (98%) |
126 | 30 files changed, 1724 insertions(+), 498 deletions(-) | 98 | create mode 100644 docs/system/i386/pc.rst |
99 | rename docs/{ => system}/pr-manager.rst (68%) | ||
100 | rename docs/{ => system}/virtio-net-failover.rst (100%) | ||
101 | create mode 100644 docs/system/virtio-pmem.rst | ||
102 | create mode 100644 docs/tools/qemu-pr-helper.rst | ||
103 | delete mode 100644 docs/virtio-pmem.rst | ||
127 | 104 | diff view generated by jsdifflib |
1 | From: Julia Suvorova <jusual@mail.ru> | 1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
---|---|---|---|
2 | 2 | ||
3 | MSR handling is the only place where CONTROL.nPRIV is modified. | 3 | Using a target unsigned long would limit the Input Address to a LPAE |
4 | page-walk to 32 bits on AArch32 and 64 bits on AArch64. This is okay | ||
5 | for stage 1 or on AArch64, but it is insufficient for stage 2 on | ||
6 | AArch32. In that later case, the Input Address can have up to 40 bits. | ||
4 | 7 | ||
5 | Signed-off-by: Julia Suvorova <jusual@mail.ru> | 8 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> |
6 | Message-id: 20180705222622.17139-1-jusual@mail.ru | 9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Message-id: 20201118150414.18360-1-remi@remlab.net |
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | --- | 12 | --- |
10 | target/arm/helper.c | 12 ++++++++---- | 13 | target/arm/helper.c | 4 ++-- |
11 | 1 file changed, 8 insertions(+), 4 deletions(-) | 14 | 1 file changed, 2 insertions(+), 2 deletions(-) |
12 | 15 | ||
13 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 16 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
14 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/target/arm/helper.c | 18 | --- a/target/arm/helper.c |
16 | +++ b/target/arm/helper.c | 19 | +++ b/target/arm/helper.c |
17 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_msr)(CPUARMState *env, uint32_t maskreg, uint32_t val) | 20 | @@ -XXX,XX +XXX,XX @@ |
18 | write_v7m_control_spsel_for_secstate(env, | 21 | |
19 | val & R_V7M_CONTROL_SPSEL_MASK, | 22 | #ifndef CONFIG_USER_ONLY |
20 | M_REG_NS); | 23 | |
21 | - env->v7m.control[M_REG_NS] &= ~R_V7M_CONTROL_NPRIV_MASK; | 24 | -static bool get_phys_addr_lpae(CPUARMState *env, target_ulong address, |
22 | - env->v7m.control[M_REG_NS] |= val & R_V7M_CONTROL_NPRIV_MASK; | 25 | +static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, |
23 | + if (arm_feature(env, ARM_FEATURE_M_MAIN)) { | 26 | MMUAccessType access_type, ARMMMUIdx mmu_idx, |
24 | + env->v7m.control[M_REG_NS] &= ~R_V7M_CONTROL_NPRIV_MASK; | 27 | bool s1_is_el0, |
25 | + env->v7m.control[M_REG_NS] |= val & R_V7M_CONTROL_NPRIV_MASK; | 28 | hwaddr *phys_ptr, MemTxAttrs *txattrs, int *prot, |
26 | + } | 29 | @@ -XXX,XX +XXX,XX @@ static ARMVAParameters aa32_va_parameters(CPUARMState *env, uint32_t va, |
27 | return; | 30 | * @fi: set to fault info if the translation fails |
28 | case 0x98: /* SP_NS */ | 31 | * @cacheattrs: (if non-NULL) set to the cacheability/shareability attributes |
29 | { | 32 | */ |
30 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_msr)(CPUARMState *env, uint32_t maskreg, uint32_t val) | 33 | -static bool get_phys_addr_lpae(CPUARMState *env, target_ulong address, |
31 | !arm_v7m_is_handler_mode(env)) { | 34 | +static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, |
32 | write_v7m_control_spsel(env, (val & R_V7M_CONTROL_SPSEL_MASK) != 0); | 35 | MMUAccessType access_type, ARMMMUIdx mmu_idx, |
33 | } | 36 | bool s1_is_el0, |
34 | - env->v7m.control[env->v7m.secure] &= ~R_V7M_CONTROL_NPRIV_MASK; | 37 | hwaddr *phys_ptr, MemTxAttrs *txattrs, int *prot, |
35 | - env->v7m.control[env->v7m.secure] |= val & R_V7M_CONTROL_NPRIV_MASK; | ||
36 | + if (arm_feature(env, ARM_FEATURE_M_MAIN)) { | ||
37 | + env->v7m.control[env->v7m.secure] &= ~R_V7M_CONTROL_NPRIV_MASK; | ||
38 | + env->v7m.control[env->v7m.secure] |= val & R_V7M_CONTROL_NPRIV_MASK; | ||
39 | + } | ||
40 | break; | ||
41 | default: | ||
42 | bad_reg: | ||
43 | -- | 38 | -- |
44 | 2.18.0 | 39 | 2.20.1 |
45 | 40 | ||
46 | 41 | diff view generated by jsdifflib |
1 | From: Adam Lackorzynski <adam@l4re.org> | 1 | From: AlexChen <alex.chen@huawei.com> |
---|---|---|---|
2 | 2 | ||
3 | Use an int64_t as a return type to restore | 3 | We should use printf format specifier "%u" instead of "%i" for |
4 | the negative check for arm_load_as. | 4 | argument of type "unsigned int". |
5 | 5 | ||
6 | Signed-off-by: Adam Lackorzynski <adam@l4re.org> | 6 | Reported-by: Euler Robot <euler.robot@huawei.com> |
7 | Message-id: 20180730173712.GG4987@os.inf.tu-dresden.de | 7 | Signed-off-by: Alex Chen <alex.chen@huawei.com> |
8 | Message-id: 5F9FD78B.8000300@huawei.com | ||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | --- | 11 | --- |
11 | hw/arm/boot.c | 8 ++++---- | 12 | hw/arm/pxa2xx.c | 2 +- |
12 | 1 file changed, 4 insertions(+), 4 deletions(-) | 13 | hw/arm/spitz.c | 2 +- |
14 | hw/arm/tosa.c | 2 +- | ||
15 | 3 files changed, 3 insertions(+), 3 deletions(-) | ||
13 | 16 | ||
14 | diff --git a/hw/arm/boot.c b/hw/arm/boot.c | 17 | diff --git a/hw/arm/pxa2xx.c b/hw/arm/pxa2xx.c |
15 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/hw/arm/boot.c | 19 | --- a/hw/arm/pxa2xx.c |
17 | +++ b/hw/arm/boot.c | 20 | +++ b/hw/arm/pxa2xx.c |
18 | @@ -XXX,XX +XXX,XX @@ static int do_arm_linux_init(Object *obj, void *opaque) | 21 | @@ -XXX,XX +XXX,XX @@ static void pxa2xx_ssp_write(void *opaque, hwaddr addr, |
22 | if (value & SSCR0_MOD) | ||
23 | printf("%s: Attempt to use network mode\n", __func__); | ||
24 | if (s->enable && SSCR0_DSS(value) < 4) | ||
25 | - printf("%s: Wrong data size: %i bits\n", __func__, | ||
26 | + printf("%s: Wrong data size: %u bits\n", __func__, | ||
27 | SSCR0_DSS(value)); | ||
28 | if (!(value & SSCR0_SSE)) { | ||
29 | s->sssr = 0; | ||
30 | diff --git a/hw/arm/spitz.c b/hw/arm/spitz.c | ||
31 | index XXXXXXX..XXXXXXX 100644 | ||
32 | --- a/hw/arm/spitz.c | ||
33 | +++ b/hw/arm/spitz.c | ||
34 | @@ -XXX,XX +XXX,XX @@ struct SpitzLCDTG { | ||
35 | static void spitz_bl_update(SpitzLCDTG *s) | ||
36 | { | ||
37 | if (s->bl_power && s->bl_intensity) | ||
38 | - zaurus_printf("LCD Backlight now at %i/63\n", s->bl_intensity); | ||
39 | + zaurus_printf("LCD Backlight now at %u/63\n", s->bl_intensity); | ||
40 | else | ||
41 | zaurus_printf("LCD Backlight now off\n"); | ||
42 | } | ||
43 | diff --git a/hw/arm/tosa.c b/hw/arm/tosa.c | ||
44 | index XXXXXXX..XXXXXXX 100644 | ||
45 | --- a/hw/arm/tosa.c | ||
46 | +++ b/hw/arm/tosa.c | ||
47 | @@ -XXX,XX +XXX,XX @@ static void tosa_gpio_setup(PXA2xxState *cpu, | ||
48 | |||
49 | static uint32_t tosa_ssp_tansfer(SSISlave *dev, uint32_t value) | ||
50 | { | ||
51 | - fprintf(stderr, "TG: %d %02x\n", value >> 5, value & 0x1f); | ||
52 | + fprintf(stderr, "TG: %u %02x\n", value >> 5, value & 0x1f); | ||
19 | return 0; | 53 | return 0; |
20 | } | 54 | } |
21 | 55 | ||
22 | -static uint64_t arm_load_elf(struct arm_boot_info *info, uint64_t *pentry, | ||
23 | - uint64_t *lowaddr, uint64_t *highaddr, | ||
24 | - int elf_machine, AddressSpace *as) | ||
25 | +static int64_t arm_load_elf(struct arm_boot_info *info, uint64_t *pentry, | ||
26 | + uint64_t *lowaddr, uint64_t *highaddr, | ||
27 | + int elf_machine, AddressSpace *as) | ||
28 | { | ||
29 | bool elf_is64; | ||
30 | union { | ||
31 | @@ -XXX,XX +XXX,XX @@ static uint64_t arm_load_elf(struct arm_boot_info *info, uint64_t *pentry, | ||
32 | } elf_header; | ||
33 | int data_swab = 0; | ||
34 | bool big_endian; | ||
35 | - uint64_t ret = -1; | ||
36 | + int64_t ret = -1; | ||
37 | Error *err = NULL; | ||
38 | |||
39 | |||
40 | -- | 56 | -- |
41 | 2.18.0 | 57 | 2.20.1 |
42 | 58 | ||
43 | 59 | diff view generated by jsdifflib |
1 | From: Luc Michel <luc.michel@greensocs.com> | 1 | From: Chen Qun <kuhn.chenqun@huawei.com> |
---|---|---|---|
2 | 2 | ||
3 | Add some helper functions to gic_internal.h to get or change the state | 3 | When 'j = icu->nr_sense – 1', the 'j < icu->nr_sense' condition is true, |
4 | of an IRQ. When the current CPU is not a vCPU, the call is forwarded to | 4 | then 'j = icu->nr_sense', the'icu->init_sense[j]' has out-of-bounds access. |
5 | the GIC distributor. Otherwise, it acts on the list register matching | ||
6 | the IRQ in the current CPU virtual interface. | ||
7 | 5 | ||
8 | gic_clear_active can have a side effect on the distributor, even in the | 6 | The asan showed stack: |
9 | vCPU case, when the correponding LR has the HW field set. | 7 | ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000004d7d at pc 0x55852cd26a76 bp 0x7ffe39f26200 sp 0x7ffe39f261f0 |
8 | READ of size 1 at 0x604000004d7d thread T0 | ||
9 | #0 0x55852cd26a75 in rxicu_realize ../hw/intc/rx_icu.c:311 | ||
10 | #1 0x55852cf075f7 in device_set_realized ../hw/core/qdev.c:886 | ||
11 | #2 0x55852cd4a32f in property_set_bool ../qom/object.c:2251 | ||
12 | #3 0x55852cd4f9bb in object_property_set ../qom/object.c:1398 | ||
13 | #4 0x55852cd54f3f in object_property_set_qobject ../qom/qom-qobject.c:28 | ||
14 | #5 0x55852cd4fc3f in object_property_set_bool ../qom/object.c:1465 | ||
15 | #6 0x55852cbf0b27 in register_icu ../hw/rx/rx62n.c:156 | ||
16 | #7 0x55852cbf12a6 in rx62n_realize ../hw/rx/rx62n.c:261 | ||
17 | #8 0x55852cf075f7 in device_set_realized ../hw/core/qdev.c:886 | ||
18 | #9 0x55852cd4a32f in property_set_bool ../qom/object.c:2251 | ||
19 | #10 0x55852cd4f9bb in object_property_set ../qom/object.c:1398 | ||
20 | #11 0x55852cd54f3f in object_property_set_qobject ../qom/qom-qobject.c:28 | ||
21 | #12 0x55852cd4fc3f in object_property_set_bool ../qom/object.c:1465 | ||
22 | #13 0x55852cbf1a85 in rx_gdbsim_init ../hw/rx/rx-gdbsim.c:109 | ||
23 | #14 0x55852cd22de0 in qemu_init ../softmmu/vl.c:4380 | ||
24 | #15 0x55852ca57088 in main ../softmmu/main.c:49 | ||
25 | #16 0x7feefafa5d42 in __libc_start_main (/lib64/libc.so.6+0x26d42) | ||
10 | 26 | ||
11 | Use those functions in the CPU interface code path to prepare for the | 27 | Add the 'ice->src[i].sense' initialize to the default value, and then |
12 | vCPU interface implementation. | 28 | process init_sense array to identify which irqs should be level-triggered. |
13 | 29 | ||
14 | Signed-off-by: Luc Michel <luc.michel@greensocs.com> | 30 | Suggested-by: Peter Maydell <peter.maydell@linaro.org> |
31 | Reported-by: Euler Robot <euler.robot@huawei.com> | ||
32 | Signed-off-by: Chen Qun <kuhn.chenqun@huawei.com> | ||
15 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 33 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
16 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 34 | Message-id: 20201111141733.2358800-1-kuhn.chenqun@huawei.com |
17 | Message-id: 20180727095421.386-10-luc.michel@greensocs.com | ||
18 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 35 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
19 | --- | 36 | --- |
20 | hw/intc/gic_internal.h | 83 ++++++++++++++++++++++++++++++++++++++++++ | 37 | hw/intc/rx_icu.c | 18 ++++++++---------- |
21 | hw/intc/arm_gic.c | 32 +++++++--------- | 38 | 1 file changed, 8 insertions(+), 10 deletions(-) |
22 | 2 files changed, 97 insertions(+), 18 deletions(-) | ||
23 | 39 | ||
24 | diff --git a/hw/intc/gic_internal.h b/hw/intc/gic_internal.h | 40 | diff --git a/hw/intc/rx_icu.c b/hw/intc/rx_icu.c |
25 | index XXXXXXX..XXXXXXX 100644 | 41 | index XXXXXXX..XXXXXXX 100644 |
26 | --- a/hw/intc/gic_internal.h | 42 | --- a/hw/intc/rx_icu.c |
27 | +++ b/hw/intc/gic_internal.h | 43 | +++ b/hw/intc/rx_icu.c |
28 | @@ -XXX,XX +XXX,XX @@ REG32(GICH_LR63, 0x1fc) | 44 | @@ -XXX,XX +XXX,XX @@ static const MemoryRegionOps icu_ops = { |
29 | #define GICH_LR_GROUP(entry) (FIELD_EX32(entry, GICH_LR0, Grp1)) | 45 | static void rxicu_realize(DeviceState *dev, Error **errp) |
30 | #define GICH_LR_HW(entry) (FIELD_EX32(entry, GICH_LR0, HW)) | ||
31 | |||
32 | +#define GICH_LR_CLEAR_PENDING(entry) \ | ||
33 | + ((entry) &= ~(GICH_LR_STATE_PENDING << R_GICH_LR0_State_SHIFT)) | ||
34 | +#define GICH_LR_SET_ACTIVE(entry) \ | ||
35 | + ((entry) |= (GICH_LR_STATE_ACTIVE << R_GICH_LR0_State_SHIFT)) | ||
36 | +#define GICH_LR_CLEAR_ACTIVE(entry) \ | ||
37 | + ((entry) &= ~(GICH_LR_STATE_ACTIVE << R_GICH_LR0_State_SHIFT)) | ||
38 | + | ||
39 | /* Valid bits for GICC_CTLR for GICv1, v1 with security extensions, | ||
40 | * GICv2 and GICv2 with security extensions: | ||
41 | */ | ||
42 | @@ -XXX,XX +XXX,XX @@ static inline uint32_t *gic_get_lr_entry(GICState *s, int irq, int vcpu) | ||
43 | g_assert_not_reached(); | ||
44 | } | ||
45 | |||
46 | +static inline bool gic_test_group(GICState *s, int irq, int cpu) | ||
47 | +{ | ||
48 | + if (gic_is_vcpu(cpu)) { | ||
49 | + uint32_t *entry = gic_get_lr_entry(s, irq, cpu); | ||
50 | + return GICH_LR_GROUP(*entry); | ||
51 | + } else { | ||
52 | + return GIC_DIST_TEST_GROUP(irq, 1 << cpu); | ||
53 | + } | ||
54 | +} | ||
55 | + | ||
56 | +static inline void gic_clear_pending(GICState *s, int irq, int cpu) | ||
57 | +{ | ||
58 | + if (gic_is_vcpu(cpu)) { | ||
59 | + uint32_t *entry = gic_get_lr_entry(s, irq, cpu); | ||
60 | + GICH_LR_CLEAR_PENDING(*entry); | ||
61 | + } else { | ||
62 | + /* Clear pending state for both level and edge triggered | ||
63 | + * interrupts. (level triggered interrupts with an active line | ||
64 | + * remain pending, see gic_test_pending) | ||
65 | + */ | ||
66 | + GIC_DIST_CLEAR_PENDING(irq, GIC_DIST_TEST_MODEL(irq) ? ALL_CPU_MASK | ||
67 | + : (1 << cpu)); | ||
68 | + } | ||
69 | +} | ||
70 | + | ||
71 | +static inline void gic_set_active(GICState *s, int irq, int cpu) | ||
72 | +{ | ||
73 | + if (gic_is_vcpu(cpu)) { | ||
74 | + uint32_t *entry = gic_get_lr_entry(s, irq, cpu); | ||
75 | + GICH_LR_SET_ACTIVE(*entry); | ||
76 | + } else { | ||
77 | + GIC_DIST_SET_ACTIVE(irq, 1 << cpu); | ||
78 | + } | ||
79 | +} | ||
80 | + | ||
81 | +static inline void gic_clear_active(GICState *s, int irq, int cpu) | ||
82 | +{ | ||
83 | + if (gic_is_vcpu(cpu)) { | ||
84 | + uint32_t *entry = gic_get_lr_entry(s, irq, cpu); | ||
85 | + GICH_LR_CLEAR_ACTIVE(*entry); | ||
86 | + | ||
87 | + if (GICH_LR_HW(*entry)) { | ||
88 | + /* Hardware interrupt. We must forward the deactivation request to | ||
89 | + * the distributor. | ||
90 | + */ | ||
91 | + int phys_irq = GICH_LR_PHYS_ID(*entry); | ||
92 | + int rcpu = gic_get_vcpu_real_id(cpu); | ||
93 | + | ||
94 | + if (phys_irq < GIC_NR_SGIS || phys_irq >= GIC_MAXIRQ) { | ||
95 | + /* UNPREDICTABLE behaviour, we choose to ignore the request */ | ||
96 | + return; | ||
97 | + } | ||
98 | + | ||
99 | + /* This is equivalent to a NS write to DIR on the physical CPU | ||
100 | + * interface. Hence group0 interrupt deactivation is ignored if | ||
101 | + * the GIC is secure. | ||
102 | + */ | ||
103 | + if (!s->security_extn || GIC_DIST_TEST_GROUP(phys_irq, 1 << rcpu)) { | ||
104 | + GIC_DIST_CLEAR_ACTIVE(phys_irq, 1 << rcpu); | ||
105 | + } | ||
106 | + } | ||
107 | + } else { | ||
108 | + GIC_DIST_CLEAR_ACTIVE(irq, 1 << cpu); | ||
109 | + } | ||
110 | +} | ||
111 | + | ||
112 | +static inline int gic_get_priority(GICState *s, int irq, int cpu) | ||
113 | +{ | ||
114 | + if (gic_is_vcpu(cpu)) { | ||
115 | + uint32_t *entry = gic_get_lr_entry(s, irq, cpu); | ||
116 | + return GICH_LR_PRIORITY(*entry); | ||
117 | + } else { | ||
118 | + return GIC_DIST_GET_PRIORITY(irq, cpu); | ||
119 | + } | ||
120 | +} | ||
121 | + | ||
122 | #endif /* QEMU_ARM_GIC_INTERNAL_H */ | ||
123 | diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c | ||
124 | index XXXXXXX..XXXXXXX 100644 | ||
125 | --- a/hw/intc/arm_gic.c | ||
126 | +++ b/hw/intc/arm_gic.c | ||
127 | @@ -XXX,XX +XXX,XX @@ static uint16_t gic_get_current_pending_irq(GICState *s, int cpu, | ||
128 | uint16_t pending_irq = s->current_pending[cpu]; | ||
129 | |||
130 | if (pending_irq < GIC_MAXIRQ && gic_has_groups(s)) { | ||
131 | - int group = GIC_DIST_TEST_GROUP(pending_irq, (1 << cpu)); | ||
132 | + int group = gic_test_group(s, pending_irq, cpu); | ||
133 | + | ||
134 | /* On a GIC without the security extensions, reading this register | ||
135 | * behaves in the same way as a secure access to a GIC with them. | ||
136 | */ | ||
137 | @@ -XXX,XX +XXX,XX @@ static int gic_get_group_priority(GICState *s, int cpu, int irq) | ||
138 | |||
139 | if (gic_has_groups(s) && | ||
140 | !(s->cpu_ctlr[cpu] & GICC_CTLR_CBPR) && | ||
141 | - GIC_DIST_TEST_GROUP(irq, (1 << cpu))) { | ||
142 | + gic_test_group(s, irq, cpu)) { | ||
143 | bpr = s->abpr[cpu] - 1; | ||
144 | assert(bpr >= 0); | ||
145 | } else { | ||
146 | @@ -XXX,XX +XXX,XX @@ static int gic_get_group_priority(GICState *s, int cpu, int irq) | ||
147 | */ | ||
148 | mask = ~0U << ((bpr & 7) + 1); | ||
149 | |||
150 | - return GIC_DIST_GET_PRIORITY(irq, cpu) & mask; | ||
151 | + return gic_get_priority(s, irq, cpu) & mask; | ||
152 | } | ||
153 | |||
154 | static void gic_activate_irq(GICState *s, int cpu, int irq) | ||
155 | @@ -XXX,XX +XXX,XX @@ static void gic_activate_irq(GICState *s, int cpu, int irq) | ||
156 | int regno = preemption_level / 32; | ||
157 | int bitno = preemption_level % 32; | ||
158 | |||
159 | - if (gic_has_groups(s) && GIC_DIST_TEST_GROUP(irq, (1 << cpu))) { | ||
160 | + if (gic_has_groups(s) && gic_test_group(s, irq, cpu)) { | ||
161 | s->nsapr[regno][cpu] |= (1 << bitno); | ||
162 | } else { | ||
163 | s->apr[regno][cpu] |= (1 << bitno); | ||
164 | } | ||
165 | |||
166 | s->running_priority[cpu] = prio; | ||
167 | - GIC_DIST_SET_ACTIVE(irq, 1 << cpu); | ||
168 | + gic_set_active(s, irq, cpu); | ||
169 | } | ||
170 | |||
171 | static int gic_get_prio_from_apr_bits(GICState *s, int cpu) | ||
172 | @@ -XXX,XX +XXX,XX @@ uint32_t gic_acknowledge_irq(GICState *s, int cpu, MemTxAttrs attrs) | ||
173 | return irq; | ||
174 | } | ||
175 | |||
176 | - if (GIC_DIST_GET_PRIORITY(irq, cpu) >= s->running_priority[cpu]) { | ||
177 | + if (gic_get_priority(s, irq, cpu) >= s->running_priority[cpu]) { | ||
178 | DPRINTF("ACK, pending interrupt (%d) has insufficient priority\n", irq); | ||
179 | return 1023; | ||
180 | } | ||
181 | @@ -XXX,XX +XXX,XX @@ uint32_t gic_acknowledge_irq(GICState *s, int cpu, MemTxAttrs attrs) | ||
182 | /* Clear pending flags for both level and edge triggered interrupts. | ||
183 | * Level triggered IRQs will be reasserted once they become inactive. | ||
184 | */ | ||
185 | - GIC_DIST_CLEAR_PENDING(irq, GIC_DIST_TEST_MODEL(irq) ? ALL_CPU_MASK | ||
186 | - : cm); | ||
187 | + gic_clear_pending(s, irq, cpu); | ||
188 | ret = irq; | ||
189 | } else { | ||
190 | if (irq < GIC_NR_SGIS) { | ||
191 | @@ -XXX,XX +XXX,XX @@ uint32_t gic_acknowledge_irq(GICState *s, int cpu, MemTxAttrs attrs) | ||
192 | src = ctz32(s->sgi_pending[irq][cpu]); | ||
193 | s->sgi_pending[irq][cpu] &= ~(1 << src); | ||
194 | if (s->sgi_pending[irq][cpu] == 0) { | ||
195 | - GIC_DIST_CLEAR_PENDING(irq, | ||
196 | - GIC_DIST_TEST_MODEL(irq) ? ALL_CPU_MASK | ||
197 | - : cm); | ||
198 | + gic_clear_pending(s, irq, cpu); | ||
199 | } | ||
200 | ret = irq | ((src & 0x7) << 10); | ||
201 | } else { | ||
202 | @@ -XXX,XX +XXX,XX @@ uint32_t gic_acknowledge_irq(GICState *s, int cpu, MemTxAttrs attrs) | ||
203 | * interrupts. (level triggered interrupts with an active line | ||
204 | * remain pending, see gic_test_pending) | ||
205 | */ | ||
206 | - GIC_DIST_CLEAR_PENDING(irq, GIC_DIST_TEST_MODEL(irq) ? ALL_CPU_MASK | ||
207 | - : cm); | ||
208 | + gic_clear_pending(s, irq, cpu); | ||
209 | ret = irq; | ||
210 | } | ||
211 | } | ||
212 | @@ -XXX,XX +XXX,XX @@ static bool gic_eoi_split(GICState *s, int cpu, MemTxAttrs attrs) | ||
213 | |||
214 | static void gic_deactivate_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs) | ||
215 | { | 46 | { |
216 | - int cm = 1 << cpu; | 47 | RXICUState *icu = RX_ICU(dev); |
217 | int group; | 48 | - int i, j; |
218 | 49 | + int i; | |
219 | if (irq >= s->num_irq) { | 50 | |
220 | @@ -XXX,XX +XXX,XX @@ static void gic_deactivate_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs) | 51 | if (icu->init_sense == NULL) { |
52 | qemu_log_mask(LOG_GUEST_ERROR, | ||
53 | "rx_icu: trigger-level property must be set."); | ||
221 | return; | 54 | return; |
222 | } | 55 | } |
223 | 56 | - for (i = j = 0; i < NR_IRQS; i++) { | |
224 | - group = gic_has_groups(s) && GIC_DIST_TEST_GROUP(irq, cm); | 57 | - if (icu->init_sense[j] == i) { |
225 | + group = gic_has_groups(s) && gic_test_group(s, irq, cpu); | 58 | - icu->src[i].sense = TRG_LEVEL; |
226 | 59 | - if (j < icu->nr_sense) { | |
227 | if (!gic_eoi_split(s, cpu, attrs)) { | 60 | - j++; |
228 | /* This is UNPREDICTABLE; we choose to ignore it */ | 61 | - } |
229 | @@ -XXX,XX +XXX,XX @@ static void gic_deactivate_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs) | 62 | - } else { |
230 | return; | 63 | - icu->src[i].sense = TRG_PEDGE; |
64 | - } | ||
65 | + | ||
66 | + for (i = 0; i < NR_IRQS; i++) { | ||
67 | + icu->src[i].sense = TRG_PEDGE; | ||
68 | + } | ||
69 | + for (i = 0; i < icu->nr_sense; i++) { | ||
70 | + uint8_t irqno = icu->init_sense[i]; | ||
71 | + icu->src[irqno].sense = TRG_LEVEL; | ||
231 | } | 72 | } |
232 | 73 | icu->req_irq = -1; | |
233 | - GIC_DIST_CLEAR_ACTIVE(irq, cm); | ||
234 | + gic_clear_active(s, irq, cpu); | ||
235 | } | ||
236 | |||
237 | static void gic_complete_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs) | ||
238 | @@ -XXX,XX +XXX,XX @@ static void gic_complete_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs) | ||
239 | } | ||
240 | } | ||
241 | |||
242 | - group = gic_has_groups(s) && GIC_DIST_TEST_GROUP(irq, cm); | ||
243 | + group = gic_has_groups(s) && gic_test_group(s, irq, cpu); | ||
244 | |||
245 | if (gic_cpu_ns_access(s, cpu, attrs) && !group) { | ||
246 | DPRINTF("Non-secure EOI for Group0 interrupt %d ignored\n", irq); | ||
247 | @@ -XXX,XX +XXX,XX @@ static void gic_complete_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs) | ||
248 | |||
249 | /* In GICv2 the guest can choose to split priority-drop and deactivate */ | ||
250 | if (!gic_eoi_split(s, cpu, attrs)) { | ||
251 | - GIC_DIST_CLEAR_ACTIVE(irq, cm); | ||
252 | + gic_clear_active(s, irq, cpu); | ||
253 | } | ||
254 | gic_update(s); | ||
255 | } | 74 | } |
256 | -- | 75 | -- |
257 | 2.18.0 | 76 | 2.20.1 |
258 | 77 | ||
259 | 78 | diff view generated by jsdifflib |
1 | From: Julia Suvorova <jusual@mail.ru> | 1 | From: Philippe Mathieu-Daudé <f4bug@amsat.org> |
---|---|---|---|
2 | 2 | ||
3 | The differences from ARMv7-M NVIC are: | 3 | Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
4 | * ARMv6-M only supports up to 32 external interrupts | 4 | Message-id: 20201120154545.2504625-2-f4bug@amsat.org |
5 | (configurable feature already). The ICTR is reserved. | ||
6 | * Active Bit Register is reserved. | ||
7 | * ARMv6-M supports 4 priority levels against 256 in ARMv7-M. | ||
8 | |||
9 | Signed-off-by: Julia Suvorova <jusual@mail.ru> | ||
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | --- | 7 | --- |
13 | include/hw/intc/armv7m_nvic.h | 1 + | 8 | MAINTAINERS | 1 + |
14 | hw/intc/armv7m_nvic.c | 21 ++++++++++++++++++--- | 9 | 1 file changed, 1 insertion(+) |
15 | 2 files changed, 19 insertions(+), 3 deletions(-) | ||
16 | 10 | ||
17 | diff --git a/include/hw/intc/armv7m_nvic.h b/include/hw/intc/armv7m_nvic.h | 11 | diff --git a/MAINTAINERS b/MAINTAINERS |
18 | index XXXXXXX..XXXXXXX 100644 | 12 | index XXXXXXX..XXXXXXX 100644 |
19 | --- a/include/hw/intc/armv7m_nvic.h | 13 | --- a/MAINTAINERS |
20 | +++ b/include/hw/intc/armv7m_nvic.h | 14 | +++ b/MAINTAINERS |
21 | @@ -XXX,XX +XXX,XX @@ typedef struct NVICState { | 15 | @@ -XXX,XX +XXX,XX @@ F: disas/arm.c |
22 | VecInfo sec_vectors[NVIC_INTERNAL_VECTORS]; | 16 | F: disas/arm-a64.cc |
23 | /* The PRIGROUP field in AIRCR is banked */ | 17 | F: disas/libvixl/ |
24 | uint32_t prigroup[M_REG_NUM_BANKS]; | 18 | F: docs/system/target-arm.rst |
25 | + uint8_t num_prio_bits; | 19 | +F: docs/system/arm/cpu-features.rst |
26 | 20 | ||
27 | /* v8M NVIC_ITNS state (stored as a bool per bit) */ | 21 | ARM SMMU |
28 | bool itns[NVIC_MAX_VECTORS]; | 22 | M: Eric Auger <eric.auger@redhat.com> |
29 | diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c | ||
30 | index XXXXXXX..XXXXXXX 100644 | ||
31 | --- a/hw/intc/armv7m_nvic.c | ||
32 | +++ b/hw/intc/armv7m_nvic.c | ||
33 | @@ -XXX,XX +XXX,XX @@ static void set_prio(NVICState *s, unsigned irq, bool secure, uint8_t prio) | ||
34 | assert(irq > ARMV7M_EXCP_NMI); /* only use for configurable prios */ | ||
35 | assert(irq < s->num_irq); | ||
36 | |||
37 | + prio &= MAKE_64BIT_MASK(8 - s->num_prio_bits, s->num_prio_bits); | ||
38 | + | ||
39 | if (secure) { | ||
40 | assert(exc_is_banked(irq)); | ||
41 | s->sec_vectors[irq].prio = prio; | ||
42 | @@ -XXX,XX +XXX,XX @@ static uint32_t nvic_readl(NVICState *s, uint32_t offset, MemTxAttrs attrs) | ||
43 | |||
44 | switch (offset) { | ||
45 | case 4: /* Interrupt Control Type. */ | ||
46 | + if (!arm_feature(&cpu->env, ARM_FEATURE_V7)) { | ||
47 | + goto bad_offset; | ||
48 | + } | ||
49 | return ((s->num_irq - NVIC_FIRST_IRQ) / 32) - 1; | ||
50 | case 0xc: /* CPPWR */ | ||
51 | if (!arm_feature(&cpu->env, ARM_FEATURE_V8)) { | ||
52 | @@ -XXX,XX +XXX,XX @@ static void nvic_writel(NVICState *s, uint32_t offset, uint32_t value, | ||
53 | "Setting VECTRESET when not in DEBUG mode " | ||
54 | "is UNPREDICTABLE\n"); | ||
55 | } | ||
56 | - s->prigroup[attrs.secure] = extract32(value, | ||
57 | - R_V7M_AIRCR_PRIGROUP_SHIFT, | ||
58 | - R_V7M_AIRCR_PRIGROUP_LENGTH); | ||
59 | + if (arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) { | ||
60 | + s->prigroup[attrs.secure] = | ||
61 | + extract32(value, | ||
62 | + R_V7M_AIRCR_PRIGROUP_SHIFT, | ||
63 | + R_V7M_AIRCR_PRIGROUP_LENGTH); | ||
64 | + } | ||
65 | if (attrs.secure) { | ||
66 | /* These bits are only writable by secure */ | ||
67 | cpu->env.v7m.aircr = value & | ||
68 | @@ -XXX,XX +XXX,XX @@ static MemTxResult nvic_sysreg_read(void *opaque, hwaddr addr, | ||
69 | break; | ||
70 | case 0x300 ... 0x33f: /* NVIC Active */ | ||
71 | val = 0; | ||
72 | + | ||
73 | + if (!arm_feature(&s->cpu->env, ARM_FEATURE_V7)) { | ||
74 | + break; | ||
75 | + } | ||
76 | + | ||
77 | startvec = 8 * (offset - 0x300) + NVIC_FIRST_IRQ; /* vector # */ | ||
78 | |||
79 | for (i = 0, end = size * 8; i < end && startvec + i < s->num_irq; i++) { | ||
80 | @@ -XXX,XX +XXX,XX @@ static void armv7m_nvic_realize(DeviceState *dev, Error **errp) | ||
81 | /* include space for internal exception vectors */ | ||
82 | s->num_irq += NVIC_FIRST_IRQ; | ||
83 | |||
84 | + s->num_prio_bits = arm_feature(&s->cpu->env, ARM_FEATURE_V7) ? 8 : 2; | ||
85 | + | ||
86 | object_property_set_bool(OBJECT(&s->systick[M_REG_NS]), true, | ||
87 | "realized", &err); | ||
88 | if (err != NULL) { | ||
89 | -- | 23 | -- |
90 | 2.18.0 | 24 | 2.20.1 |
91 | 25 | ||
92 | 26 | diff view generated by jsdifflib |
1 | From: Luc Michel <luc.michel@greensocs.com> | 1 | From: Philippe Mathieu-Daudé <f4bug@amsat.org> |
---|---|---|---|
2 | 2 | ||
3 | Add the read/write functions to handle accesses to the vCPU interface. | 3 | Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
4 | Those accesses are forwarded to the real CPU interface, with the CPU id | 4 | Reviewed-by: Cédric Le Goater <clg@kaod.org> |
5 | being converted to the corresponding vCPU id (vCPU id = CPU id + | 5 | Message-id: 20201120154545.2504625-3-f4bug@amsat.org |
6 | GIC_NCPU). | ||
7 | |||
8 | Signed-off-by: Luc Michel <luc.michel@greensocs.com> | ||
9 | Message-id: 20180727095421.386-15-luc.michel@greensocs.com | ||
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | --- | 8 | --- |
13 | hw/intc/arm_gic.c | 37 +++++++++++++++++++++++++++++++++++-- | 9 | MAINTAINERS | 1 + |
14 | 1 file changed, 35 insertions(+), 2 deletions(-) | 10 | 1 file changed, 1 insertion(+) |
15 | 11 | ||
16 | diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c | 12 | diff --git a/MAINTAINERS b/MAINTAINERS |
17 | index XXXXXXX..XXXXXXX 100644 | 13 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/hw/intc/arm_gic.c | 14 | --- a/MAINTAINERS |
19 | +++ b/hw/intc/arm_gic.c | 15 | +++ b/MAINTAINERS |
20 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_do_cpu_write(void *opaque, hwaddr addr, | 16 | @@ -XXX,XX +XXX,XX @@ F: include/hw/*/*aspeed* |
21 | return gic_cpu_write(s, id, addr, value, attrs); | 17 | F: include/hw/misc/pca9552*.h |
22 | } | 18 | F: hw/net/ftgmac100.c |
23 | 19 | F: include/hw/net/ftgmac100.h | |
24 | +static MemTxResult gic_thisvcpu_read(void *opaque, hwaddr addr, uint64_t *data, | 20 | +F: docs/system/arm/aspeed.rst |
25 | + unsigned size, MemTxAttrs attrs) | 21 | |
26 | +{ | 22 | NRF51 |
27 | + GICState *s = (GICState *)opaque; | 23 | M: Joel Stanley <joel@jms.id.au> |
28 | + | ||
29 | + return gic_cpu_read(s, gic_get_current_vcpu(s), addr, data, attrs); | ||
30 | +} | ||
31 | + | ||
32 | +static MemTxResult gic_thisvcpu_write(void *opaque, hwaddr addr, | ||
33 | + uint64_t value, unsigned size, | ||
34 | + MemTxAttrs attrs) | ||
35 | +{ | ||
36 | + GICState *s = (GICState *)opaque; | ||
37 | + | ||
38 | + return gic_cpu_write(s, gic_get_current_vcpu(s), addr, value, attrs); | ||
39 | +} | ||
40 | + | ||
41 | static const MemoryRegionOps gic_ops[2] = { | ||
42 | { | ||
43 | .read_with_attrs = gic_dist_read, | ||
44 | @@ -XXX,XX +XXX,XX @@ static const MemoryRegionOps gic_cpu_ops = { | ||
45 | .endianness = DEVICE_NATIVE_ENDIAN, | ||
46 | }; | ||
47 | |||
48 | +static const MemoryRegionOps gic_virt_ops[2] = { | ||
49 | + { | ||
50 | + .read_with_attrs = NULL, | ||
51 | + .write_with_attrs = NULL, | ||
52 | + .endianness = DEVICE_NATIVE_ENDIAN, | ||
53 | + }, | ||
54 | + { | ||
55 | + .read_with_attrs = gic_thisvcpu_read, | ||
56 | + .write_with_attrs = gic_thisvcpu_write, | ||
57 | + .endianness = DEVICE_NATIVE_ENDIAN, | ||
58 | + } | ||
59 | +}; | ||
60 | + | ||
61 | static void arm_gic_realize(DeviceState *dev, Error **errp) | ||
62 | { | ||
63 | /* Device instance realize function for the GIC sysbus device */ | ||
64 | @@ -XXX,XX +XXX,XX @@ static void arm_gic_realize(DeviceState *dev, Error **errp) | ||
65 | return; | ||
66 | } | ||
67 | |||
68 | - /* This creates distributor and main CPU interface (s->cpuiomem[0]) */ | ||
69 | - gic_init_irqs_and_mmio(s, gic_set_irq, gic_ops, NULL); | ||
70 | + /* This creates distributor, main CPU interface (s->cpuiomem[0]) and if | ||
71 | + * enabled, virtualization extensions related interfaces (main virtual | ||
72 | + * interface (s->vifaceiomem[0]) and virtual CPU interface). | ||
73 | + */ | ||
74 | + gic_init_irqs_and_mmio(s, gic_set_irq, gic_ops, gic_virt_ops); | ||
75 | |||
76 | /* Extra core-specific regions for the CPU interfaces. This is | ||
77 | * necessary for "franken-GIC" implementations, for example on | ||
78 | -- | 24 | -- |
79 | 2.18.0 | 25 | 2.20.1 |
80 | 26 | ||
81 | 27 | diff view generated by jsdifflib |
1 | From: Luc Michel <luc.michel@greensocs.com> | 1 | From: Philippe Mathieu-Daudé <f4bug@amsat.org> |
---|---|---|---|
2 | 2 | ||
3 | Implement virtualization extensions in the gic_deactivate_irq() and | 3 | Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
4 | gic_complete_irq() functions. | 4 | Message-id: 20201120154545.2504625-4-f4bug@amsat.org |
5 | |||
6 | When the guest writes an invalid vIRQ to V_EOIR or V_DIR, since the | ||
7 | GICv2 specification is not entirely clear here, we adopt the behaviour | ||
8 | observed on real hardware: | ||
9 | * When V_CTRL.EOIMode is false (EOI split is disabled): | ||
10 | - In case of an invalid vIRQ write to V_EOIR: | ||
11 | -> If some bits are set in H_APR, an invalid vIRQ write to V_EOIR | ||
12 | triggers a priority drop, and increments V_HCR.EOICount. | ||
13 | -> If V_APR is already cleared, nothing happen | ||
14 | |||
15 | - An invalid vIRQ write to V_DIR is ignored. | ||
16 | |||
17 | * When V_CTRL.EOIMode is true: | ||
18 | - In case of an invalid vIRQ write to V_EOIR: | ||
19 | -> If some bits are set in H_APR, an invalid vIRQ write to V_EOIR | ||
20 | triggers a priority drop. | ||
21 | -> If V_APR is already cleared, nothing happen | ||
22 | |||
23 | - An invalid vIRQ write to V_DIR increments V_HCR.EOICount. | ||
24 | |||
25 | Signed-off-by: Luc Michel <luc.michel@greensocs.com> | ||
26 | Message-id: 20180727095421.386-13-luc.michel@greensocs.com | ||
27 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
28 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
29 | --- | 7 | --- |
30 | hw/intc/arm_gic.c | 51 +++++++++++++++++++++++++++++++++++++++++++---- | 8 | MAINTAINERS | 1 + |
31 | 1 file changed, 47 insertions(+), 4 deletions(-) | 9 | 1 file changed, 1 insertion(+) |
32 | 10 | ||
33 | diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c | 11 | diff --git a/MAINTAINERS b/MAINTAINERS |
34 | index XXXXXXX..XXXXXXX 100644 | 12 | index XXXXXXX..XXXXXXX 100644 |
35 | --- a/hw/intc/arm_gic.c | 13 | --- a/MAINTAINERS |
36 | +++ b/hw/intc/arm_gic.c | 14 | +++ b/MAINTAINERS |
37 | @@ -XXX,XX +XXX,XX @@ static void gic_deactivate_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs) | 15 | @@ -XXX,XX +XXX,XX @@ F: include/hw/*/npcm7xx* |
38 | { | 16 | F: tests/qtest/npcm7xx* |
39 | int group; | 17 | F: pc-bios/npcm7xx_bootrom.bin |
40 | 18 | F: roms/vbootrom | |
41 | - if (irq >= s->num_irq) { | 19 | +F: docs/system/arm/nuvoton.rst |
42 | + if (irq >= GIC_MAXIRQ || (!gic_is_vcpu(cpu) && irq >= s->num_irq)) { | 20 | |
43 | /* | 21 | nSeries |
44 | * This handles two cases: | 22 | M: Andrzej Zaborowski <balrogg@gmail.com> |
45 | * 1. If software writes the ID of a spurious interrupt [ie 1023] | ||
46 | * to the GICC_DIR, the GIC ignores that write. | ||
47 | * 2. If software writes the number of a non-existent interrupt | ||
48 | * this must be a subcase of "value written is not an active interrupt" | ||
49 | - * and so this is UNPREDICTABLE. We choose to ignore it. | ||
50 | + * and so this is UNPREDICTABLE. We choose to ignore it. For vCPUs, | ||
51 | + * all IRQs potentially exist, so this limit does not apply. | ||
52 | */ | ||
53 | return; | ||
54 | } | ||
55 | |||
56 | - group = gic_has_groups(s) && gic_test_group(s, irq, cpu); | ||
57 | - | ||
58 | if (!gic_eoi_split(s, cpu, attrs)) { | ||
59 | /* This is UNPREDICTABLE; we choose to ignore it */ | ||
60 | qemu_log_mask(LOG_GUEST_ERROR, | ||
61 | @@ -XXX,XX +XXX,XX @@ static void gic_deactivate_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs) | ||
62 | return; | ||
63 | } | ||
64 | |||
65 | + if (gic_is_vcpu(cpu) && !gic_virq_is_valid(s, irq, cpu)) { | ||
66 | + /* This vIRQ does not have an LR entry which is either active or | ||
67 | + * pending and active. Increment EOICount and ignore the write. | ||
68 | + */ | ||
69 | + int rcpu = gic_get_vcpu_real_id(cpu); | ||
70 | + s->h_hcr[rcpu] += 1 << R_GICH_HCR_EOICount_SHIFT; | ||
71 | + return; | ||
72 | + } | ||
73 | + | ||
74 | + group = gic_has_groups(s) && gic_test_group(s, irq, cpu); | ||
75 | + | ||
76 | if (gic_cpu_ns_access(s, cpu, attrs) && !group) { | ||
77 | DPRINTF("Non-secure DI for Group0 interrupt %d ignored\n", irq); | ||
78 | return; | ||
79 | @@ -XXX,XX +XXX,XX @@ static void gic_complete_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs) | ||
80 | int group; | ||
81 | |||
82 | DPRINTF("EOI %d\n", irq); | ||
83 | + if (gic_is_vcpu(cpu)) { | ||
84 | + /* The call to gic_prio_drop() will clear a bit in GICH_APR iff the | ||
85 | + * running prio is < 0x100. | ||
86 | + */ | ||
87 | + bool prio_drop = s->running_priority[cpu] < 0x100; | ||
88 | + | ||
89 | + if (irq >= GIC_MAXIRQ) { | ||
90 | + /* Ignore spurious interrupt */ | ||
91 | + return; | ||
92 | + } | ||
93 | + | ||
94 | + gic_drop_prio(s, cpu, 0); | ||
95 | + | ||
96 | + if (!gic_eoi_split(s, cpu, attrs)) { | ||
97 | + bool valid = gic_virq_is_valid(s, irq, cpu); | ||
98 | + if (prio_drop && !valid) { | ||
99 | + /* We are in a situation where: | ||
100 | + * - V_CTRL.EOIMode is false (no EOI split), | ||
101 | + * - The call to gic_drop_prio() cleared a bit in GICH_APR, | ||
102 | + * - This vIRQ does not have an LR entry which is either | ||
103 | + * active or pending and active. | ||
104 | + * In that case, we must increment EOICount. | ||
105 | + */ | ||
106 | + int rcpu = gic_get_vcpu_real_id(cpu); | ||
107 | + s->h_hcr[rcpu] += 1 << R_GICH_HCR_EOICount_SHIFT; | ||
108 | + } else if (valid) { | ||
109 | + gic_clear_active(s, irq, cpu); | ||
110 | + } | ||
111 | + } | ||
112 | + | ||
113 | + return; | ||
114 | + } | ||
115 | + | ||
116 | if (irq >= s->num_irq) { | ||
117 | /* This handles two cases: | ||
118 | * 1. If software writes the ID of a spurious interrupt [ie 1023] | ||
119 | -- | 23 | -- |
120 | 2.18.0 | 24 | 2.20.1 |
121 | 25 | ||
122 | 26 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Philippe Mathieu-Daudé <f4bug@amsat.org> |
---|---|---|---|
2 | 2 | ||
3 | Reported-by: Laurent Desnogues <laurent.desnogues@gmail.com> | 3 | Fixes: 0553ef42571 ("docs: add Orange Pi PC document") |
4 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 4 | Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
5 | Reviewed-by: Laurent Desnogues <laurent.desnogues@gmail.com> | 5 | Reviewed-by: Niek Linnenbank <nieklinnenbank@gmail.com> |
6 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | 6 | Message-id: 20201120154545.2504625-5-f4bug@amsat.org |
7 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
8 | Tested-by: Alex Bennée <alex.bennee@linaro.org> | ||
9 | Tested-by: Laurent Desnogues <laurent.desnogues@gmail.com> | ||
10 | Message-id: 20180801123111.3595-5-richard.henderson@linaro.org | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | --- | 9 | --- |
13 | target/arm/sve_helper.c | 2 +- | 10 | MAINTAINERS | 2 +- |
14 | 1 file changed, 1 insertion(+), 1 deletion(-) | 11 | 1 file changed, 1 insertion(+), 1 deletion(-) |
15 | 12 | ||
16 | diff --git a/target/arm/sve_helper.c b/target/arm/sve_helper.c | 13 | diff --git a/MAINTAINERS b/MAINTAINERS |
17 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/target/arm/sve_helper.c | 15 | --- a/MAINTAINERS |
19 | +++ b/target/arm/sve_helper.c | 16 | +++ b/MAINTAINERS |
20 | @@ -XXX,XX +XXX,XX @@ void HELPER(sve_movz_d)(void *vd, void *vn, void *vg, uint32_t desc) | 17 | @@ -XXX,XX +XXX,XX @@ S: Maintained |
21 | uint64_t *d = vd, *n = vn; | 18 | F: hw/*/allwinner-h3* |
22 | uint8_t *pg = vg; | 19 | F: include/hw/*/allwinner-h3* |
23 | for (i = 0; i < opr_sz; i += 1) { | 20 | F: hw/arm/orangepi.c |
24 | - d[i] = n[1] & -(uint64_t)(pg[H1(i)] & 1); | 21 | -F: docs/system/orangepi.rst |
25 | + d[i] = n[i] & -(uint64_t)(pg[H1(i)] & 1); | 22 | +F: docs/system/arm/orangepi.rst |
26 | } | 23 | |
27 | } | 24 | ARM PrimeCell and CMSDK devices |
28 | 25 | M: Peter Maydell <peter.maydell@linaro.org> | |
29 | -- | 26 | -- |
30 | 2.18.0 | 27 | 2.20.1 |
31 | 28 | ||
32 | 29 | diff view generated by jsdifflib |
1 | From: Julia Suvorova <jusual@mail.ru> | 1 | From: Philippe Mathieu-Daudé <f4bug@amsat.org> |
---|---|---|---|
2 | 2 | ||
3 | Forbid stack alignment change. (CCR) | 3 | Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
4 | Reserve FAULTMASK, BASEPRI registers. | 4 | Message-id: 20201120154545.2504625-6-f4bug@amsat.org |
5 | Report any fault as a HardFault. Disable MemManage, BusFault and | ||
6 | UsageFault, so they always escalated to HardFault. (SHCSR) | ||
7 | |||
8 | Signed-off-by: Julia Suvorova <jusual@mail.ru> | ||
9 | Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com> | ||
10 | Message-id: 20180718095628.26442-1-jusual@mail.ru | ||
11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
13 | --- | 7 | --- |
14 | hw/intc/armv7m_nvic.c | 10 ++++++++++ | 8 | MAINTAINERS | 1 + |
15 | target/arm/cpu.c | 4 ++++ | 9 | 1 file changed, 1 insertion(+) |
16 | target/arm/helper.c | 13 +++++++++++-- | ||
17 | 3 files changed, 25 insertions(+), 2 deletions(-) | ||
18 | 10 | ||
19 | diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c | 11 | diff --git a/MAINTAINERS b/MAINTAINERS |
20 | index XXXXXXX..XXXXXXX 100644 | 12 | index XXXXXXX..XXXXXXX 100644 |
21 | --- a/hw/intc/armv7m_nvic.c | 13 | --- a/MAINTAINERS |
22 | +++ b/hw/intc/armv7m_nvic.c | 14 | +++ b/MAINTAINERS |
23 | @@ -XXX,XX +XXX,XX @@ static uint32_t nvic_readl(NVICState *s, uint32_t offset, MemTxAttrs attrs) | 15 | @@ -XXX,XX +XXX,XX @@ R: Leif Lindholm <leif@nuviainc.com> |
24 | val |= cpu->env.v7m.ccr[M_REG_NS] & R_V7M_CCR_BFHFNMIGN_MASK; | 16 | L: qemu-arm@nongnu.org |
25 | return val; | 17 | S: Maintained |
26 | case 0xd24: /* System Handler Control and State (SHCSR) */ | 18 | F: hw/arm/sbsa-ref.c |
27 | + if (!arm_feature(&cpu->env, ARM_FEATURE_V7)) { | 19 | +F: docs/system/arm/sbsa.rst |
28 | + goto bad_offset; | 20 | |
29 | + } | 21 | Sharp SL-5500 (Collie) PDA |
30 | val = 0; | 22 | M: Peter Maydell <peter.maydell@linaro.org> |
31 | if (attrs.secure) { | ||
32 | if (s->sec_vectors[ARMV7M_EXCP_MEM].active) { | ||
33 | @@ -XXX,XX +XXX,XX @@ static void nvic_writel(NVICState *s, uint32_t offset, uint32_t value, | ||
34 | cpu->env.v7m.scr[attrs.secure] = value; | ||
35 | break; | ||
36 | case 0xd14: /* Configuration Control. */ | ||
37 | + if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) { | ||
38 | + goto bad_offset; | ||
39 | + } | ||
40 | + | ||
41 | /* Enforce RAZ/WI on reserved and must-RAZ/WI bits */ | ||
42 | value &= (R_V7M_CCR_STKALIGN_MASK | | ||
43 | R_V7M_CCR_BFHFNMIGN_MASK | | ||
44 | @@ -XXX,XX +XXX,XX @@ static void nvic_writel(NVICState *s, uint32_t offset, uint32_t value, | ||
45 | cpu->env.v7m.ccr[attrs.secure] = value; | ||
46 | break; | ||
47 | case 0xd24: /* System Handler Control and State (SHCSR) */ | ||
48 | + if (!arm_feature(&cpu->env, ARM_FEATURE_V7)) { | ||
49 | + goto bad_offset; | ||
50 | + } | ||
51 | if (attrs.secure) { | ||
52 | s->sec_vectors[ARMV7M_EXCP_MEM].active = (value & (1 << 0)) != 0; | ||
53 | /* Secure HardFault active bit cannot be written */ | ||
54 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | ||
55 | index XXXXXXX..XXXXXXX 100644 | ||
56 | --- a/target/arm/cpu.c | ||
57 | +++ b/target/arm/cpu.c | ||
58 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(CPUState *s) | ||
59 | env->v7m.ccr[M_REG_NS] |= R_V7M_CCR_NONBASETHRDENA_MASK; | ||
60 | env->v7m.ccr[M_REG_S] |= R_V7M_CCR_NONBASETHRDENA_MASK; | ||
61 | } | ||
62 | + if (!arm_feature(env, ARM_FEATURE_M_MAIN)) { | ||
63 | + env->v7m.ccr[M_REG_NS] |= R_V7M_CCR_UNALIGN_TRP_MASK; | ||
64 | + env->v7m.ccr[M_REG_S] |= R_V7M_CCR_UNALIGN_TRP_MASK; | ||
65 | + } | ||
66 | |||
67 | /* Unlike A/R profile, M profile defines the reset LR value */ | ||
68 | env->regs[14] = 0xffffffff; | ||
69 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
70 | index XXXXXXX..XXXXXXX 100644 | ||
71 | --- a/target/arm/helper.c | ||
72 | +++ b/target/arm/helper.c | ||
73 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_msr)(CPUARMState *env, uint32_t maskreg, uint32_t val) | ||
74 | env->v7m.primask[M_REG_NS] = val & 1; | ||
75 | return; | ||
76 | case 0x91: /* BASEPRI_NS */ | ||
77 | - if (!env->v7m.secure) { | ||
78 | + if (!env->v7m.secure || !arm_feature(env, ARM_FEATURE_M_MAIN)) { | ||
79 | return; | ||
80 | } | ||
81 | env->v7m.basepri[M_REG_NS] = val & 0xff; | ||
82 | return; | ||
83 | case 0x93: /* FAULTMASK_NS */ | ||
84 | - if (!env->v7m.secure) { | ||
85 | + if (!env->v7m.secure || !arm_feature(env, ARM_FEATURE_M_MAIN)) { | ||
86 | return; | ||
87 | } | ||
88 | env->v7m.faultmask[M_REG_NS] = val & 1; | ||
89 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_msr)(CPUARMState *env, uint32_t maskreg, uint32_t val) | ||
90 | env->v7m.primask[env->v7m.secure] = val & 1; | ||
91 | break; | ||
92 | case 17: /* BASEPRI */ | ||
93 | + if (!arm_feature(env, ARM_FEATURE_M_MAIN)) { | ||
94 | + goto bad_reg; | ||
95 | + } | ||
96 | env->v7m.basepri[env->v7m.secure] = val & 0xff; | ||
97 | break; | ||
98 | case 18: /* BASEPRI_MAX */ | ||
99 | + if (!arm_feature(env, ARM_FEATURE_M_MAIN)) { | ||
100 | + goto bad_reg; | ||
101 | + } | ||
102 | val &= 0xff; | ||
103 | if (val != 0 && (val < env->v7m.basepri[env->v7m.secure] | ||
104 | || env->v7m.basepri[env->v7m.secure] == 0)) { | ||
105 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_msr)(CPUARMState *env, uint32_t maskreg, uint32_t val) | ||
106 | } | ||
107 | break; | ||
108 | case 19: /* FAULTMASK */ | ||
109 | + if (!arm_feature(env, ARM_FEATURE_M_MAIN)) { | ||
110 | + goto bad_reg; | ||
111 | + } | ||
112 | env->v7m.faultmask[env->v7m.secure] = val & 1; | ||
113 | break; | ||
114 | case 20: /* CONTROL */ | ||
115 | -- | 23 | -- |
116 | 2.18.0 | 24 | 2.20.1 |
117 | 25 | ||
118 | 26 | diff view generated by jsdifflib |
1 | From: Julia Suvorova <jusual@mail.ru> | 1 | From: Philippe Mathieu-Daudé <f4bug@amsat.org> |
---|---|---|---|
2 | 2 | ||
3 | Handle SCS reserved registers listed in ARMv6-M ARM D3.6.1. | 3 | Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
4 | All reserved registers are RAZ/WI. ARM_FEATURE_M_MAIN is used for the | 4 | Message-id: 20201120154545.2504625-7-f4bug@amsat.org |
5 | checks, because these registers are reserved in ARMv8-M Baseline too. | ||
6 | |||
7 | Signed-off-by: Julia Suvorova <jusual@mail.ru> | ||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | --- | 7 | --- |
11 | hw/intc/armv7m_nvic.c | 51 +++++++++++++++++++++++++++++++++++++++++-- | 8 | MAINTAINERS | 1 + |
12 | 1 file changed, 49 insertions(+), 2 deletions(-) | 9 | 1 file changed, 1 insertion(+) |
13 | 10 | ||
14 | diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c | 11 | diff --git a/MAINTAINERS b/MAINTAINERS |
15 | index XXXXXXX..XXXXXXX 100644 | 12 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/hw/intc/armv7m_nvic.c | 13 | --- a/MAINTAINERS |
17 | +++ b/hw/intc/armv7m_nvic.c | 14 | +++ b/MAINTAINERS |
18 | @@ -XXX,XX +XXX,XX @@ static uint32_t nvic_readl(NVICState *s, uint32_t offset, MemTxAttrs attrs) | 15 | @@ -XXX,XX +XXX,XX @@ L: qemu-arm@nongnu.org |
19 | } | 16 | S: Maintained |
20 | return val; | 17 | F: hw/*/omap* |
21 | case 0xd10: /* System Control. */ | 18 | F: include/hw/arm/omap.h |
22 | + if (!arm_feature(&cpu->env, ARM_FEATURE_V7)) { | 19 | +F: docs/system/arm/sx1.rst |
23 | + goto bad_offset; | 20 | |
24 | + } | 21 | IPack |
25 | return cpu->env.v7m.scr[attrs.secure]; | 22 | M: Alberto Garcia <berto@igalia.com> |
26 | case 0xd14: /* Configuration Control. */ | ||
27 | /* The BFHFNMIGN bit is the only non-banked bit; we | ||
28 | @@ -XXX,XX +XXX,XX @@ static uint32_t nvic_readl(NVICState *s, uint32_t offset, MemTxAttrs attrs) | ||
29 | } | ||
30 | return val; | ||
31 | case 0xd2c: /* Hard Fault Status. */ | ||
32 | + if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) { | ||
33 | + goto bad_offset; | ||
34 | + } | ||
35 | return cpu->env.v7m.hfsr; | ||
36 | case 0xd30: /* Debug Fault Status. */ | ||
37 | return cpu->env.v7m.dfsr; | ||
38 | case 0xd34: /* MMFAR MemManage Fault Address */ | ||
39 | + if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) { | ||
40 | + goto bad_offset; | ||
41 | + } | ||
42 | return cpu->env.v7m.mmfar[attrs.secure]; | ||
43 | case 0xd38: /* Bus Fault Address. */ | ||
44 | + if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) { | ||
45 | + goto bad_offset; | ||
46 | + } | ||
47 | return cpu->env.v7m.bfar; | ||
48 | case 0xd3c: /* Aux Fault Status. */ | ||
49 | /* TODO: Implement fault status registers. */ | ||
50 | @@ -XXX,XX +XXX,XX @@ static void nvic_writel(NVICState *s, uint32_t offset, uint32_t value, | ||
51 | } | ||
52 | break; | ||
53 | case 0xd10: /* System Control. */ | ||
54 | + if (!arm_feature(&cpu->env, ARM_FEATURE_V7)) { | ||
55 | + goto bad_offset; | ||
56 | + } | ||
57 | /* We don't implement deep-sleep so these bits are RAZ/WI. | ||
58 | * The other bits in the register are banked. | ||
59 | * QEMU's implementation ignores SEVONPEND and SLEEPONEXIT, which | ||
60 | @@ -XXX,XX +XXX,XX @@ static void nvic_writel(NVICState *s, uint32_t offset, uint32_t value, | ||
61 | nvic_irq_update(s); | ||
62 | break; | ||
63 | case 0xd2c: /* Hard Fault Status. */ | ||
64 | + if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) { | ||
65 | + goto bad_offset; | ||
66 | + } | ||
67 | cpu->env.v7m.hfsr &= ~value; /* W1C */ | ||
68 | break; | ||
69 | case 0xd30: /* Debug Fault Status. */ | ||
70 | cpu->env.v7m.dfsr &= ~value; /* W1C */ | ||
71 | break; | ||
72 | case 0xd34: /* Mem Manage Address. */ | ||
73 | + if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) { | ||
74 | + goto bad_offset; | ||
75 | + } | ||
76 | cpu->env.v7m.mmfar[attrs.secure] = value; | ||
77 | return; | ||
78 | case 0xd38: /* Bus Fault Address. */ | ||
79 | + if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) { | ||
80 | + goto bad_offset; | ||
81 | + } | ||
82 | cpu->env.v7m.bfar = value; | ||
83 | return; | ||
84 | case 0xd3c: /* Aux Fault Status. */ | ||
85 | @@ -XXX,XX +XXX,XX @@ static void nvic_writel(NVICState *s, uint32_t offset, uint32_t value, | ||
86 | case 0xf00: /* Software Triggered Interrupt Register */ | ||
87 | { | ||
88 | int excnum = (value & 0x1ff) + NVIC_FIRST_IRQ; | ||
89 | + | ||
90 | + if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) { | ||
91 | + goto bad_offset; | ||
92 | + } | ||
93 | + | ||
94 | if (excnum < s->num_irq) { | ||
95 | armv7m_nvic_set_pending(s, excnum, false); | ||
96 | } | ||
97 | @@ -XXX,XX +XXX,XX @@ static MemTxResult nvic_sysreg_read(void *opaque, hwaddr addr, | ||
98 | } | ||
99 | } | ||
100 | break; | ||
101 | - case 0xd18 ... 0xd23: /* System Handler Priority (SHPR1, SHPR2, SHPR3) */ | ||
102 | + case 0xd18: /* System Handler Priority (SHPR1) */ | ||
103 | + if (!arm_feature(&s->cpu->env, ARM_FEATURE_M_MAIN)) { | ||
104 | + val = 0; | ||
105 | + break; | ||
106 | + } | ||
107 | + /* fall through */ | ||
108 | + case 0xd1c ... 0xd23: /* System Handler Priority (SHPR2, SHPR3) */ | ||
109 | val = 0; | ||
110 | for (i = 0; i < size; i++) { | ||
111 | unsigned hdlidx = (offset - 0xd14) + i; | ||
112 | @@ -XXX,XX +XXX,XX @@ static MemTxResult nvic_sysreg_read(void *opaque, hwaddr addr, | ||
113 | } | ||
114 | break; | ||
115 | case 0xd28 ... 0xd2b: /* Configurable Fault Status (CFSR) */ | ||
116 | + if (!arm_feature(&s->cpu->env, ARM_FEATURE_M_MAIN)) { | ||
117 | + val = 0; | ||
118 | + break; | ||
119 | + }; | ||
120 | /* The BFSR bits [15:8] are shared between security states | ||
121 | * and we store them in the NS copy | ||
122 | */ | ||
123 | @@ -XXX,XX +XXX,XX @@ static MemTxResult nvic_sysreg_write(void *opaque, hwaddr addr, | ||
124 | } | ||
125 | nvic_irq_update(s); | ||
126 | return MEMTX_OK; | ||
127 | - case 0xd18 ... 0xd23: /* System Handler Priority (SHPR1, SHPR2, SHPR3) */ | ||
128 | + case 0xd18: /* System Handler Priority (SHPR1) */ | ||
129 | + if (!arm_feature(&s->cpu->env, ARM_FEATURE_M_MAIN)) { | ||
130 | + return MEMTX_OK; | ||
131 | + } | ||
132 | + /* fall through */ | ||
133 | + case 0xd1c ... 0xd23: /* System Handler Priority (SHPR2, SHPR3) */ | ||
134 | for (i = 0; i < size; i++) { | ||
135 | unsigned hdlidx = (offset - 0xd14) + i; | ||
136 | int newprio = extract32(value, i * 8, 8); | ||
137 | @@ -XXX,XX +XXX,XX @@ static MemTxResult nvic_sysreg_write(void *opaque, hwaddr addr, | ||
138 | nvic_irq_update(s); | ||
139 | return MEMTX_OK; | ||
140 | case 0xd28 ... 0xd2b: /* Configurable Fault Status (CFSR) */ | ||
141 | + if (!arm_feature(&s->cpu->env, ARM_FEATURE_M_MAIN)) { | ||
142 | + return MEMTX_OK; | ||
143 | + } | ||
144 | /* All bits are W1C, so construct 32 bit value with 0s in | ||
145 | * the parts not written by the access size | ||
146 | */ | ||
147 | -- | 23 | -- |
148 | 2.18.0 | 24 | 2.20.1 |
149 | 25 | ||
150 | 26 | diff view generated by jsdifflib |
1 | From: Luc Michel <luc.michel@greensocs.com> | 1 | From: Philippe Mathieu-Daudé <f4bug@amsat.org> |
---|---|---|---|
2 | 2 | ||
3 | Add the gic_update_virt() function to update the vCPU interface states | 3 | Since commit aa35ec2213b ("hw/arm/raspi: Use more specific |
4 | and raise vIRQ and vFIQ as needed. This commit renames gic_update() to | 4 | machine names") the raspi2/raspi3 machines have been renamed |
5 | gic_update_internal() and generalizes it to handle both cases, with a | 5 | as raspi2b/raspi3b. |
6 | `virt' parameter to track whether we are updating the CPU or vCPU | ||
7 | interfaces. | ||
8 | 6 | ||
9 | The main difference between CPU and vCPU is the way we select the best | 7 | Note, rather than the raspi3b, the raspi3ap introduced in |
10 | IRQ. This part has been split into the gic_get_best_(v)irq functions. | 8 | commit 5be94252d34 ("hw/arm/raspi: Add the Raspberry Pi 3 |
11 | For the virt case, the LRs are iterated to find the best candidate. | 9 | model A+") is a closer match to what QEMU models, but only |
10 | provides 512 MB of RAM. | ||
12 | 11 | ||
13 | Signed-off-by: Luc Michel <luc.michel@greensocs.com> | 12 | As more Raspberry Pi 2/3 models are emulated, in order |
13 | to avoid confusion, deprecate the raspi2/raspi3 machine | ||
14 | aliases. | ||
15 | |||
16 | ACKed-by: Peter Krempa <pkrempa@redhat.com> | ||
14 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 17 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
15 | Message-id: 20180727095421.386-17-luc.michel@greensocs.com | 18 | Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
19 | Message-id: 20201120173953.2539469-2-f4bug@amsat.org | ||
16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 20 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
17 | --- | 21 | --- |
18 | hw/intc/arm_gic.c | 175 +++++++++++++++++++++++++++++++++++----------- | 22 | docs/system/deprecated.rst | 7 +++++++ |
19 | 1 file changed, 136 insertions(+), 39 deletions(-) | 23 | 1 file changed, 7 insertions(+) |
20 | 24 | ||
21 | diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c | 25 | diff --git a/docs/system/deprecated.rst b/docs/system/deprecated.rst |
22 | index XXXXXXX..XXXXXXX 100644 | 26 | index XXXXXXX..XXXXXXX 100644 |
23 | --- a/hw/intc/arm_gic.c | 27 | --- a/docs/system/deprecated.rst |
24 | +++ b/hw/intc/arm_gic.c | 28 | +++ b/docs/system/deprecated.rst |
25 | @@ -XXX,XX +XXX,XX @@ static inline bool gic_cpu_ns_access(GICState *s, int cpu, MemTxAttrs attrs) | 29 | @@ -XXX,XX +XXX,XX @@ This machine has been renamed ``fuloong2e``. |
26 | return !gic_is_vcpu(cpu) && s->security_extn && !attrs.secure; | 30 | These machine types are very old and likely can not be used for live migration |
27 | } | 31 | from old QEMU versions anymore. A newer machine type should be used instead. |
28 | 32 | ||
29 | +static inline void gic_get_best_irq(GICState *s, int cpu, | 33 | +Raspberry Pi ``raspi2`` and ``raspi3`` machines (since 5.2) |
30 | + int *best_irq, int *best_prio, int *group) | 34 | +''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' |
31 | +{ | ||
32 | + int irq; | ||
33 | + int cm = 1 << cpu; | ||
34 | + | 35 | + |
35 | + *best_irq = 1023; | 36 | +The Raspberry Pi machines come in various models (A, A+, B, B+). To be able |
36 | + *best_prio = 0x100; | 37 | +to distinguish which model QEMU is implementing, the ``raspi2`` and ``raspi3`` |
38 | +machines have been renamed ``raspi2b`` and ``raspi3b``. | ||
37 | + | 39 | + |
38 | + for (irq = 0; irq < s->num_irq; irq++) { | 40 | Device options |
39 | + if (GIC_DIST_TEST_ENABLED(irq, cm) && gic_test_pending(s, irq, cm) && | 41 | -------------- |
40 | + (!GIC_DIST_TEST_ACTIVE(irq, cm)) && | ||
41 | + (irq < GIC_INTERNAL || GIC_DIST_TARGET(irq) & cm)) { | ||
42 | + if (GIC_DIST_GET_PRIORITY(irq, cpu) < *best_prio) { | ||
43 | + *best_prio = GIC_DIST_GET_PRIORITY(irq, cpu); | ||
44 | + *best_irq = irq; | ||
45 | + } | ||
46 | + } | ||
47 | + } | ||
48 | + | ||
49 | + if (*best_irq < 1023) { | ||
50 | + *group = GIC_DIST_TEST_GROUP(*best_irq, cm); | ||
51 | + } | ||
52 | +} | ||
53 | + | ||
54 | +static inline void gic_get_best_virq(GICState *s, int cpu, | ||
55 | + int *best_irq, int *best_prio, int *group) | ||
56 | +{ | ||
57 | + int lr_idx = 0; | ||
58 | + | ||
59 | + *best_irq = 1023; | ||
60 | + *best_prio = 0x100; | ||
61 | + | ||
62 | + for (lr_idx = 0; lr_idx < s->num_lrs; lr_idx++) { | ||
63 | + uint32_t lr_entry = s->h_lr[lr_idx][cpu]; | ||
64 | + int state = GICH_LR_STATE(lr_entry); | ||
65 | + | ||
66 | + if (state == GICH_LR_STATE_PENDING) { | ||
67 | + int prio = GICH_LR_PRIORITY(lr_entry); | ||
68 | + | ||
69 | + if (prio < *best_prio) { | ||
70 | + *best_prio = prio; | ||
71 | + *best_irq = GICH_LR_VIRT_ID(lr_entry); | ||
72 | + *group = GICH_LR_GROUP(lr_entry); | ||
73 | + } | ||
74 | + } | ||
75 | + } | ||
76 | +} | ||
77 | + | ||
78 | +/* Return true if IRQ signaling is enabled for the given cpu and at least one | ||
79 | + * of the given groups: | ||
80 | + * - in the non-virt case, the distributor must be enabled for one of the | ||
81 | + * given groups | ||
82 | + * - in the virt case, the virtual interface must be enabled. | ||
83 | + * - in all cases, the (v)CPU interface must be enabled for one of the given | ||
84 | + * groups. | ||
85 | + */ | ||
86 | +static inline bool gic_irq_signaling_enabled(GICState *s, int cpu, bool virt, | ||
87 | + int group_mask) | ||
88 | +{ | ||
89 | + if (!virt && !(s->ctlr & group_mask)) { | ||
90 | + return false; | ||
91 | + } | ||
92 | + | ||
93 | + if (virt && !(s->h_hcr[cpu] & R_GICH_HCR_EN_MASK)) { | ||
94 | + return false; | ||
95 | + } | ||
96 | + | ||
97 | + if (!(s->cpu_ctlr[cpu] & group_mask)) { | ||
98 | + return false; | ||
99 | + } | ||
100 | + | ||
101 | + return true; | ||
102 | +} | ||
103 | + | ||
104 | /* TODO: Many places that call this routine could be optimized. */ | ||
105 | /* Update interrupt status after enabled or pending bits have been changed. */ | ||
106 | -static void gic_update(GICState *s) | ||
107 | +static inline void gic_update_internal(GICState *s, bool virt) | ||
108 | { | ||
109 | int best_irq; | ||
110 | int best_prio; | ||
111 | - int irq; | ||
112 | int irq_level, fiq_level; | ||
113 | - int cpu; | ||
114 | - int cm; | ||
115 | + int cpu, cpu_iface; | ||
116 | + int group = 0; | ||
117 | + qemu_irq *irq_lines = virt ? s->parent_virq : s->parent_irq; | ||
118 | + qemu_irq *fiq_lines = virt ? s->parent_vfiq : s->parent_fiq; | ||
119 | |||
120 | for (cpu = 0; cpu < s->num_cpu; cpu++) { | ||
121 | - cm = 1 << cpu; | ||
122 | - s->current_pending[cpu] = 1023; | ||
123 | - if (!(s->ctlr & (GICD_CTLR_EN_GRP0 | GICD_CTLR_EN_GRP1)) | ||
124 | - || !(s->cpu_ctlr[cpu] & (GICC_CTLR_EN_GRP0 | GICC_CTLR_EN_GRP1))) { | ||
125 | - qemu_irq_lower(s->parent_irq[cpu]); | ||
126 | - qemu_irq_lower(s->parent_fiq[cpu]); | ||
127 | + cpu_iface = virt ? (cpu + GIC_NCPU) : cpu; | ||
128 | + | ||
129 | + s->current_pending[cpu_iface] = 1023; | ||
130 | + if (!gic_irq_signaling_enabled(s, cpu, virt, | ||
131 | + GICD_CTLR_EN_GRP0 | GICD_CTLR_EN_GRP1)) { | ||
132 | + qemu_irq_lower(irq_lines[cpu]); | ||
133 | + qemu_irq_lower(fiq_lines[cpu]); | ||
134 | continue; | ||
135 | } | ||
136 | - best_prio = 0x100; | ||
137 | - best_irq = 1023; | ||
138 | - for (irq = 0; irq < s->num_irq; irq++) { | ||
139 | - if (GIC_DIST_TEST_ENABLED(irq, cm) && | ||
140 | - gic_test_pending(s, irq, cm) && | ||
141 | - (!GIC_DIST_TEST_ACTIVE(irq, cm)) && | ||
142 | - (irq < GIC_INTERNAL || GIC_DIST_TARGET(irq) & cm)) { | ||
143 | - if (GIC_DIST_GET_PRIORITY(irq, cpu) < best_prio) { | ||
144 | - best_prio = GIC_DIST_GET_PRIORITY(irq, cpu); | ||
145 | - best_irq = irq; | ||
146 | - } | ||
147 | - } | ||
148 | + | ||
149 | + if (virt) { | ||
150 | + gic_get_best_virq(s, cpu, &best_irq, &best_prio, &group); | ||
151 | + } else { | ||
152 | + gic_get_best_irq(s, cpu, &best_irq, &best_prio, &group); | ||
153 | } | ||
154 | |||
155 | if (best_irq != 1023) { | ||
156 | trace_gic_update_bestirq(cpu, best_irq, best_prio, | ||
157 | - s->priority_mask[cpu], s->running_priority[cpu]); | ||
158 | + s->priority_mask[cpu_iface], s->running_priority[cpu_iface]); | ||
159 | } | ||
160 | |||
161 | irq_level = fiq_level = 0; | ||
162 | |||
163 | - if (best_prio < s->priority_mask[cpu]) { | ||
164 | - s->current_pending[cpu] = best_irq; | ||
165 | - if (best_prio < s->running_priority[cpu]) { | ||
166 | - int group = GIC_DIST_TEST_GROUP(best_irq, cm); | ||
167 | - | ||
168 | - if (extract32(s->ctlr, group, 1) && | ||
169 | - extract32(s->cpu_ctlr[cpu], group, 1)) { | ||
170 | - if (group == 0 && s->cpu_ctlr[cpu] & GICC_CTLR_FIQ_EN) { | ||
171 | + if (best_prio < s->priority_mask[cpu_iface]) { | ||
172 | + s->current_pending[cpu_iface] = best_irq; | ||
173 | + if (best_prio < s->running_priority[cpu_iface]) { | ||
174 | + if (gic_irq_signaling_enabled(s, cpu, virt, 1 << group)) { | ||
175 | + if (group == 0 && | ||
176 | + s->cpu_ctlr[cpu_iface] & GICC_CTLR_FIQ_EN) { | ||
177 | DPRINTF("Raised pending FIQ %d (cpu %d)\n", | ||
178 | - best_irq, cpu); | ||
179 | + best_irq, cpu_iface); | ||
180 | fiq_level = 1; | ||
181 | - trace_gic_update_set_irq(cpu, "fiq", fiq_level); | ||
182 | + trace_gic_update_set_irq(cpu, virt ? "vfiq" : "fiq", | ||
183 | + fiq_level); | ||
184 | } else { | ||
185 | DPRINTF("Raised pending IRQ %d (cpu %d)\n", | ||
186 | - best_irq, cpu); | ||
187 | + best_irq, cpu_iface); | ||
188 | irq_level = 1; | ||
189 | - trace_gic_update_set_irq(cpu, "irq", irq_level); | ||
190 | + trace_gic_update_set_irq(cpu, virt ? "virq" : "irq", | ||
191 | + irq_level); | ||
192 | } | ||
193 | } | ||
194 | } | ||
195 | } | ||
196 | |||
197 | - qemu_set_irq(s->parent_irq[cpu], irq_level); | ||
198 | - qemu_set_irq(s->parent_fiq[cpu], fiq_level); | ||
199 | + qemu_set_irq(irq_lines[cpu], irq_level); | ||
200 | + qemu_set_irq(fiq_lines[cpu], fiq_level); | ||
201 | } | ||
202 | } | ||
203 | |||
204 | +static void gic_update(GICState *s) | ||
205 | +{ | ||
206 | + gic_update_internal(s, false); | ||
207 | +} | ||
208 | + | ||
209 | /* Return true if this LR is empty, i.e. the corresponding bit | ||
210 | * in ELRSR is set. | ||
211 | */ | ||
212 | @@ -XXX,XX +XXX,XX @@ static inline bool gic_lr_entry_is_eoi(uint32_t entry) | ||
213 | && !GICH_LR_HW(entry) && GICH_LR_EOI(entry); | ||
214 | } | ||
215 | |||
216 | +static void gic_update_virt(GICState *s) | ||
217 | +{ | ||
218 | + gic_update_internal(s, true); | ||
219 | +} | ||
220 | + | ||
221 | static void gic_set_irq_11mpcore(GICState *s, int irq, int level, | ||
222 | int cm, int target) | ||
223 | { | ||
224 | @@ -XXX,XX +XXX,XX @@ uint32_t gic_acknowledge_irq(GICState *s, int cpu, MemTxAttrs attrs) | ||
225 | } | ||
226 | } | ||
227 | |||
228 | - gic_update(s); | ||
229 | + if (gic_is_vcpu(cpu)) { | ||
230 | + gic_update_virt(s); | ||
231 | + } else { | ||
232 | + gic_update(s); | ||
233 | + } | ||
234 | DPRINTF("ACK %d\n", irq); | ||
235 | return ret; | ||
236 | } | ||
237 | @@ -XXX,XX +XXX,XX @@ static void gic_deactivate_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs) | ||
238 | */ | ||
239 | int rcpu = gic_get_vcpu_real_id(cpu); | ||
240 | s->h_hcr[rcpu] += 1 << R_GICH_HCR_EOICount_SHIFT; | ||
241 | + | ||
242 | + /* Update the virtual interface in case a maintenance interrupt should | ||
243 | + * be raised. | ||
244 | + */ | ||
245 | + gic_update_virt(s); | ||
246 | return; | ||
247 | } | ||
248 | |||
249 | @@ -XXX,XX +XXX,XX @@ static void gic_complete_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs) | ||
250 | } | ||
251 | } | ||
252 | |||
253 | + gic_update_virt(s); | ||
254 | return; | ||
255 | } | ||
256 | |||
257 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_cpu_write(GICState *s, int cpu, int offset, | ||
258 | "gic_cpu_write: Bad offset %x\n", (int)offset); | ||
259 | return MEMTX_OK; | ||
260 | } | ||
261 | - gic_update(s); | ||
262 | + | ||
263 | + if (gic_is_vcpu(cpu)) { | ||
264 | + gic_update_virt(s); | ||
265 | + } else { | ||
266 | + gic_update(s); | ||
267 | + } | ||
268 | + | ||
269 | return MEMTX_OK; | ||
270 | } | ||
271 | |||
272 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_hyp_write(void *opaque, int cpu, hwaddr addr, | ||
273 | return MEMTX_OK; | ||
274 | } | ||
275 | |||
276 | + gic_update_virt(s); | ||
277 | return MEMTX_OK; | ||
278 | } | ||
279 | 42 | ||
280 | -- | 43 | -- |
281 | 2.18.0 | 44 | 2.20.1 |
282 | 45 | ||
283 | 46 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Philippe Mathieu-Daudé <f4bug@amsat.org> |
---|---|---|---|
2 | 2 | ||
3 | The pseudocode for this operation is an increment + compare loop, | 3 | Document the following Raspberry Pi models: |
4 | so comparing <= the maximum integer produces an all-true predicate. | ||
5 | 4 | ||
6 | Rather than bound in both the inline code and the helper, pass the | 5 | - raspi0 Raspberry Pi Zero (revision 1.2) |
7 | helper the number of predicate bits to set instead of the number | 6 | - raspi1ap Raspberry Pi A+ (revision 1.1) |
8 | of predicate elements to set. | 7 | - raspi2b Raspberry Pi 2B (revision 1.1) |
8 | - raspi3ap Raspberry Pi 3A+ (revision 1.0) | ||
9 | - raspi3b Raspberry Pi 3B (revision 1.2) | ||
9 | 10 | ||
10 | Reported-by: Laurent Desnogues <laurent.desnogues@gmail.com> | 11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
11 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 12 | Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
12 | Reviewed-by: Laurent Desnogues <laurent.desnogues@gmail.com> | 13 | Message-id: 20201120173953.2539469-3-f4bug@amsat.org |
13 | Tested-by: Alex Bennée <alex.bennee@linaro.org> | ||
14 | Tested-by: Laurent Desnogues <laurent.desnogues@gmail.com> | ||
15 | Message-id: 20180801123111.3595-4-richard.henderson@linaro.org | ||
16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
17 | --- | 15 | --- |
18 | target/arm/sve_helper.c | 5 ---- | 16 | docs/system/arm/raspi.rst | 43 ++++++++++++++++++++++++++++++++++++++ |
19 | target/arm/translate-sve.c | 49 +++++++++++++++++++++++++------------- | 17 | docs/system/target-arm.rst | 1 + |
20 | 2 files changed, 32 insertions(+), 22 deletions(-) | 18 | MAINTAINERS | 1 + |
19 | 3 files changed, 45 insertions(+) | ||
20 | create mode 100644 docs/system/arm/raspi.rst | ||
21 | 21 | ||
22 | diff --git a/target/arm/sve_helper.c b/target/arm/sve_helper.c | 22 | diff --git a/docs/system/arm/raspi.rst b/docs/system/arm/raspi.rst |
23 | new file mode 100644 | ||
24 | index XXXXXXX..XXXXXXX | ||
25 | --- /dev/null | ||
26 | +++ b/docs/system/arm/raspi.rst | ||
27 | @@ -XXX,XX +XXX,XX @@ | ||
28 | +Raspberry Pi boards (``raspi0``, ``raspi1ap``, ``raspi2b``, ``raspi3ap``, ``raspi3b``) | ||
29 | +====================================================================================== | ||
30 | + | ||
31 | + | ||
32 | +QEMU provides models of the following Raspberry Pi boards: | ||
33 | + | ||
34 | +``raspi0`` and ``raspi1ap`` | ||
35 | + ARM1176JZF-S core, 512 MiB of RAM | ||
36 | +``raspi2b`` | ||
37 | + Cortex-A7 (4 cores), 1 GiB of RAM | ||
38 | +``raspi3ap`` | ||
39 | + Cortex-A53 (4 cores), 512 MiB of RAM | ||
40 | +``raspi3b`` | ||
41 | + Cortex-A53 (4 cores), 1 GiB of RAM | ||
42 | + | ||
43 | + | ||
44 | +Implemented devices | ||
45 | +------------------- | ||
46 | + | ||
47 | + * ARM1176JZF-S, Cortex-A7 or Cortex-A53 CPU | ||
48 | + * Interrupt controller | ||
49 | + * DMA controller | ||
50 | + * Clock and reset controller (CPRMAN) | ||
51 | + * System Timer | ||
52 | + * GPIO controller | ||
53 | + * Serial ports (BCM2835 AUX - 16550 based - and PL011) | ||
54 | + * Random Number Generator (RNG) | ||
55 | + * Frame Buffer | ||
56 | + * USB host (USBH) | ||
57 | + * GPIO controller | ||
58 | + * SD/MMC host controller | ||
59 | + * SoC thermal sensor | ||
60 | + * USB2 host controller (DWC2 and MPHI) | ||
61 | + * MailBox controller (MBOX) | ||
62 | + * VideoCore firmware (property) | ||
63 | + | ||
64 | + | ||
65 | +Missing devices | ||
66 | +--------------- | ||
67 | + | ||
68 | + * Peripheral SPI controller (SPI) | ||
69 | + * Analog to Digital Converter (ADC) | ||
70 | + * Pulse Width Modulation (PWM) | ||
71 | diff --git a/docs/system/target-arm.rst b/docs/system/target-arm.rst | ||
23 | index XXXXXXX..XXXXXXX 100644 | 72 | index XXXXXXX..XXXXXXX 100644 |
24 | --- a/target/arm/sve_helper.c | 73 | --- a/docs/system/target-arm.rst |
25 | +++ b/target/arm/sve_helper.c | 74 | +++ b/docs/system/target-arm.rst |
26 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(sve_while)(void *vd, uint32_t count, uint32_t pred_desc) | 75 | @@ -XXX,XX +XXX,XX @@ undocumented; you can get a complete list by running |
27 | return flags; | 76 | arm/nuvoton |
28 | } | 77 | arm/orangepi |
29 | 78 | arm/palm | |
30 | - /* Scale from predicate element count to bits. */ | 79 | + arm/raspi |
31 | - count <<= esz; | 80 | arm/xscale |
32 | - /* Bound to the bits in the predicate. */ | 81 | arm/collie |
33 | - count = MIN(count, oprsz * 8); | 82 | arm/sx1 |
34 | - | 83 | diff --git a/MAINTAINERS b/MAINTAINERS |
35 | /* Set all of the requested bits. */ | ||
36 | for (i = 0; i < count / 64; ++i) { | ||
37 | d->p[i] = esz_mask; | ||
38 | diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c | ||
39 | index XXXXXXX..XXXXXXX 100644 | 84 | index XXXXXXX..XXXXXXX 100644 |
40 | --- a/target/arm/translate-sve.c | 85 | --- a/MAINTAINERS |
41 | +++ b/target/arm/translate-sve.c | 86 | +++ b/MAINTAINERS |
42 | @@ -XXX,XX +XXX,XX @@ static bool trans_CTERM(DisasContext *s, arg_CTERM *a, uint32_t insn) | 87 | @@ -XXX,XX +XXX,XX @@ F: hw/arm/raspi_platform.h |
43 | 88 | F: hw/*/bcm283* | |
44 | static bool trans_WHILE(DisasContext *s, arg_WHILE *a, uint32_t insn) | 89 | F: include/hw/arm/raspi* |
45 | { | 90 | F: include/hw/*/bcm283* |
46 | - if (!sve_access_check(s)) { | 91 | +F: docs/system/arm/raspi.rst |
47 | - return true; | 92 | |
48 | - } | 93 | Real View |
49 | - | 94 | M: Peter Maydell <peter.maydell@linaro.org> |
50 | - TCGv_i64 op0 = read_cpu_reg(s, a->rn, 1); | ||
51 | - TCGv_i64 op1 = read_cpu_reg(s, a->rm, 1); | ||
52 | - TCGv_i64 t0 = tcg_temp_new_i64(); | ||
53 | - TCGv_i64 t1 = tcg_temp_new_i64(); | ||
54 | + TCGv_i64 op0, op1, t0, t1, tmax; | ||
55 | TCGv_i32 t2, t3; | ||
56 | TCGv_ptr ptr; | ||
57 | unsigned desc, vsz = vec_full_reg_size(s); | ||
58 | TCGCond cond; | ||
59 | |||
60 | + if (!sve_access_check(s)) { | ||
61 | + return true; | ||
62 | + } | ||
63 | + | ||
64 | + op0 = read_cpu_reg(s, a->rn, 1); | ||
65 | + op1 = read_cpu_reg(s, a->rm, 1); | ||
66 | + | ||
67 | if (!a->sf) { | ||
68 | if (a->u) { | ||
69 | tcg_gen_ext32u_i64(op0, op0); | ||
70 | @@ -XXX,XX +XXX,XX @@ static bool trans_WHILE(DisasContext *s, arg_WHILE *a, uint32_t insn) | ||
71 | |||
72 | /* For the helper, compress the different conditions into a computation | ||
73 | * of how many iterations for which the condition is true. | ||
74 | - * | ||
75 | - * This is slightly complicated by 0 <= UINT64_MAX, which is nominally | ||
76 | - * 2**64 iterations, overflowing to 0. Of course, predicate registers | ||
77 | - * aren't that large, so any value >= predicate size is sufficient. | ||
78 | */ | ||
79 | + t0 = tcg_temp_new_i64(); | ||
80 | + t1 = tcg_temp_new_i64(); | ||
81 | tcg_gen_sub_i64(t0, op1, op0); | ||
82 | |||
83 | - /* t0 = MIN(op1 - op0, vsz). */ | ||
84 | - tcg_gen_movi_i64(t1, vsz); | ||
85 | - tcg_gen_umin_i64(t0, t0, t1); | ||
86 | + tmax = tcg_const_i64(vsz >> a->esz); | ||
87 | if (a->eq) { | ||
88 | /* Equality means one more iteration. */ | ||
89 | tcg_gen_addi_i64(t0, t0, 1); | ||
90 | + | ||
91 | + /* If op1 is max (un)signed integer (and the only time the addition | ||
92 | + * above could overflow), then we produce an all-true predicate by | ||
93 | + * setting the count to the vector length. This is because the | ||
94 | + * pseudocode is described as an increment + compare loop, and the | ||
95 | + * max integer would always compare true. | ||
96 | + */ | ||
97 | + tcg_gen_movi_i64(t1, (a->sf | ||
98 | + ? (a->u ? UINT64_MAX : INT64_MAX) | ||
99 | + : (a->u ? UINT32_MAX : INT32_MAX))); | ||
100 | + tcg_gen_movcond_i64(TCG_COND_EQ, t0, op1, t1, tmax, t0); | ||
101 | } | ||
102 | |||
103 | - /* t0 = (condition true ? t0 : 0). */ | ||
104 | + /* Bound to the maximum. */ | ||
105 | + tcg_gen_umin_i64(t0, t0, tmax); | ||
106 | + tcg_temp_free_i64(tmax); | ||
107 | + | ||
108 | + /* Set the count to zero if the condition is false. */ | ||
109 | cond = (a->u | ||
110 | ? (a->eq ? TCG_COND_LEU : TCG_COND_LTU) | ||
111 | : (a->eq ? TCG_COND_LE : TCG_COND_LT)); | ||
112 | tcg_gen_movi_i64(t1, 0); | ||
113 | tcg_gen_movcond_i64(cond, t0, op0, op1, t0, t1); | ||
114 | + tcg_temp_free_i64(t1); | ||
115 | |||
116 | + /* Since we're bounded, pass as a 32-bit type. */ | ||
117 | t2 = tcg_temp_new_i32(); | ||
118 | tcg_gen_extrl_i64_i32(t2, t0); | ||
119 | tcg_temp_free_i64(t0); | ||
120 | - tcg_temp_free_i64(t1); | ||
121 | + | ||
122 | + /* Scale elements to bits. */ | ||
123 | + tcg_gen_shli_i32(t2, t2, a->esz); | ||
124 | |||
125 | desc = (vsz / 8) - 2; | ||
126 | desc = deposit32(desc, SIMD_DATA_SHIFT, 2, a->esz); | ||
127 | -- | 95 | -- |
128 | 2.18.0 | 96 | 2.20.1 |
129 | 97 | ||
130 | 98 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Philippe Mathieu-Daudé <f4bug@amsat.org> |
---|---|---|---|
2 | 2 | ||
3 | Used the wrong temporary in the computation of subtractive overflow. | 3 | Document the 3 front LEDs modeled on the OpenPOWER Witherspoon BMC |
4 | (see commit 7cfbde5ea1c "hw/arm/aspeed: Add the 3 front LEDs drived | ||
5 | by the PCA9552 #1"). | ||
4 | 6 | ||
5 | Reported-by: Laurent Desnogues <laurent.desnogues@gmail.com> | 7 | Reviewed-by: Cédric Le Goater <clg@kaod.org> |
6 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 8 | Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
7 | Reviewed-by: Laurent Desnogues <laurent.desnogues@gmail.com> | 9 | Message-id: 20201120173953.2539469-4-f4bug@amsat.org |
8 | Tested-by: Alex Bennée <alex.bennee@linaro.org> | ||
9 | Tested-by: Laurent Desnogues <laurent.desnogues@gmail.com> | ||
10 | Message-id: 20180801123111.3595-3-richard.henderson@linaro.org | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | --- | 11 | --- |
13 | target/arm/translate-sve.c | 2 +- | 12 | docs/system/arm/aspeed.rst | 1 + |
14 | 1 file changed, 1 insertion(+), 1 deletion(-) | 13 | 1 file changed, 1 insertion(+) |
15 | 14 | ||
16 | diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c | 15 | diff --git a/docs/system/arm/aspeed.rst b/docs/system/arm/aspeed.rst |
17 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/target/arm/translate-sve.c | 17 | --- a/docs/system/arm/aspeed.rst |
19 | +++ b/target/arm/translate-sve.c | 18 | +++ b/docs/system/arm/aspeed.rst |
20 | @@ -XXX,XX +XXX,XX @@ static void do_sat_addsub_64(TCGv_i64 reg, TCGv_i64 val, bool u, bool d) | 19 | @@ -XXX,XX +XXX,XX @@ Supported devices |
21 | /* Detect signed overflow for subtraction. */ | 20 | * GPIO Controller (Master only) |
22 | tcg_gen_xor_i64(t0, reg, val); | 21 | * UART |
23 | tcg_gen_sub_i64(t1, reg, val); | 22 | * Ethernet controllers |
24 | - tcg_gen_xor_i64(reg, reg, t0); | 23 | + * Front LEDs (PCA9552 on I2C bus) |
25 | + tcg_gen_xor_i64(reg, reg, t1); | 24 | |
26 | tcg_gen_and_i64(t0, t0, reg); | 25 | |
27 | 26 | Missing devices | |
28 | /* Bound the result. */ | ||
29 | -- | 27 | -- |
30 | 2.18.0 | 28 | 2.20.1 |
31 | 29 | ||
32 | 30 | diff view generated by jsdifflib |
1 | From: Luc Michel <luc.michel@greensocs.com> | 1 | From: Philippe Mathieu-Daudé <f4bug@amsat.org> |
---|---|---|---|
2 | 2 | ||
3 | In preparation for the virtualization extensions implementation, | 3 | List the 'tosa' machine with the XScale-based PDAs models. |
4 | refactor the name of the functions and macros that act on the GIC | ||
5 | distributor to make that fact explicit. It will be useful to | ||
6 | differentiate them from the ones that will act on the virtual | ||
7 | interfaces. | ||
8 | 4 | ||
9 | Signed-off-by: Luc Michel <luc.michel@greensocs.com> | 5 | Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
10 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 6 | Message-id: 20201120173953.2539469-5-f4bug@amsat.org |
11 | Reviewed-by: Sai Pavan Boddu <sai.pavan.boddu@xilinx.com> | ||
12 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
13 | Message-id: 20180727095421.386-2-luc.michel@greensocs.com | ||
14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
15 | --- | 9 | --- |
16 | hw/intc/gic_internal.h | 51 ++++++------ | 10 | docs/system/arm/xscale.rst | 20 +++++++++++++------- |
17 | hw/intc/arm_gic.c | 163 +++++++++++++++++++++------------------ | 11 | 1 file changed, 13 insertions(+), 7 deletions(-) |
18 | hw/intc/arm_gic_common.c | 6 +- | ||
19 | hw/intc/arm_gic_kvm.c | 23 +++--- | ||
20 | 4 files changed, 127 insertions(+), 116 deletions(-) | ||
21 | 12 | ||
22 | diff --git a/hw/intc/gic_internal.h b/hw/intc/gic_internal.h | 13 | diff --git a/docs/system/arm/xscale.rst b/docs/system/arm/xscale.rst |
23 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
24 | --- a/hw/intc/gic_internal.h | 15 | --- a/docs/system/arm/xscale.rst |
25 | +++ b/hw/intc/gic_internal.h | 16 | +++ b/docs/system/arm/xscale.rst |
26 | @@ -XXX,XX +XXX,XX @@ | 17 | @@ -XXX,XX +XXX,XX @@ |
27 | 18 | -Sharp XScale-based PDA models (``akita``, ``borzoi``, ``spitz``, ``terrier``) | |
28 | #define GIC_BASE_IRQ 0 | 19 | -============================================================================= |
29 | 20 | +Sharp XScale-based PDA models (``akita``, ``borzoi``, ``spitz``, ``terrier``, ``tosa``) | |
30 | -#define GIC_SET_ENABLED(irq, cm) s->irq_state[irq].enabled |= (cm) | 21 | +======================================================================================= |
31 | -#define GIC_CLEAR_ENABLED(irq, cm) s->irq_state[irq].enabled &= ~(cm) | 22 | |
32 | -#define GIC_TEST_ENABLED(irq, cm) ((s->irq_state[irq].enabled & (cm)) != 0) | 23 | -The XScale-based clamshell PDA models (\"Spitz\", \"Akita\", \"Borzoi\" |
33 | -#define GIC_SET_PENDING(irq, cm) s->irq_state[irq].pending |= (cm) | 24 | -and \"Terrier\") emulation includes the following peripherals: |
34 | -#define GIC_CLEAR_PENDING(irq, cm) s->irq_state[irq].pending &= ~(cm) | 25 | +The Sharp Zaurus are PDAs based on XScale, able to run Linux ('SL series'). |
35 | -#define GIC_SET_ACTIVE(irq, cm) s->irq_state[irq].active |= (cm) | 26 | |
36 | -#define GIC_CLEAR_ACTIVE(irq, cm) s->irq_state[irq].active &= ~(cm) | 27 | -- Intel PXA270 System-on-chip (ARMv5TE core) |
37 | -#define GIC_TEST_ACTIVE(irq, cm) ((s->irq_state[irq].active & (cm)) != 0) | 28 | +The SL-6000 (\"Tosa\"), released in 2005, uses a PXA255 System-on-chip. |
38 | -#define GIC_SET_MODEL(irq) s->irq_state[irq].model = true | 29 | |
39 | -#define GIC_CLEAR_MODEL(irq) s->irq_state[irq].model = false | 30 | -- NAND Flash memory |
40 | -#define GIC_TEST_MODEL(irq) s->irq_state[irq].model | 31 | +The SL-C3000 (\"Spitz\"), SL-C1000 (\"Akita\"), SL-C3100 (\"Borzoi\") and |
41 | -#define GIC_SET_LEVEL(irq, cm) s->irq_state[irq].level |= (cm) | 32 | +SL-C3200 (\"Terrier\") use a PXA270. |
42 | -#define GIC_CLEAR_LEVEL(irq, cm) s->irq_state[irq].level &= ~(cm) | 33 | + |
43 | -#define GIC_TEST_LEVEL(irq, cm) ((s->irq_state[irq].level & (cm)) != 0) | 34 | +The clamshell PDA models emulation includes the following peripherals: |
44 | -#define GIC_SET_EDGE_TRIGGER(irq) s->irq_state[irq].edge_trigger = true | 35 | + |
45 | -#define GIC_CLEAR_EDGE_TRIGGER(irq) s->irq_state[irq].edge_trigger = false | 36 | +- Intel PXA255/PXA270 System-on-chip (ARMv5TE core) |
46 | -#define GIC_TEST_EDGE_TRIGGER(irq) (s->irq_state[irq].edge_trigger) | 37 | + |
47 | -#define GIC_GET_PRIORITY(irq, cpu) (((irq) < GIC_INTERNAL) ? \ | 38 | +- NAND Flash memory - not in \"Tosa\" |
48 | +#define GIC_DIST_SET_ENABLED(irq, cm) (s->irq_state[irq].enabled |= (cm)) | 39 | |
49 | +#define GIC_DIST_CLEAR_ENABLED(irq, cm) (s->irq_state[irq].enabled &= ~(cm)) | 40 | - IBM/Hitachi DSCM microdrive in a PXA PCMCIA slot - not in \"Akita\" |
50 | +#define GIC_DIST_TEST_ENABLED(irq, cm) ((s->irq_state[irq].enabled & (cm)) != 0) | 41 | |
51 | +#define GIC_DIST_SET_PENDING(irq, cm) (s->irq_state[irq].pending |= (cm)) | 42 | -- On-chip OHCI USB controller |
52 | +#define GIC_DIST_CLEAR_PENDING(irq, cm) (s->irq_state[irq].pending &= ~(cm)) | 43 | +- On-chip OHCI USB controller - not in \"Tosa\" |
53 | +#define GIC_DIST_SET_ACTIVE(irq, cm) (s->irq_state[irq].active |= (cm)) | 44 | |
54 | +#define GIC_DIST_CLEAR_ACTIVE(irq, cm) (s->irq_state[irq].active &= ~(cm)) | 45 | - On-chip LCD controller |
55 | +#define GIC_DIST_TEST_ACTIVE(irq, cm) ((s->irq_state[irq].active & (cm)) != 0) | ||
56 | +#define GIC_DIST_SET_MODEL(irq) (s->irq_state[irq].model = true) | ||
57 | +#define GIC_DIST_CLEAR_MODEL(irq) (s->irq_state[irq].model = false) | ||
58 | +#define GIC_DIST_TEST_MODEL(irq) (s->irq_state[irq].model) | ||
59 | +#define GIC_DIST_SET_LEVEL(irq, cm) (s->irq_state[irq].level |= (cm)) | ||
60 | +#define GIC_DIST_CLEAR_LEVEL(irq, cm) (s->irq_state[irq].level &= ~(cm)) | ||
61 | +#define GIC_DIST_TEST_LEVEL(irq, cm) ((s->irq_state[irq].level & (cm)) != 0) | ||
62 | +#define GIC_DIST_SET_EDGE_TRIGGER(irq) (s->irq_state[irq].edge_trigger = true) | ||
63 | +#define GIC_DIST_CLEAR_EDGE_TRIGGER(irq) \ | ||
64 | + (s->irq_state[irq].edge_trigger = false) | ||
65 | +#define GIC_DIST_TEST_EDGE_TRIGGER(irq) (s->irq_state[irq].edge_trigger) | ||
66 | +#define GIC_DIST_GET_PRIORITY(irq, cpu) (((irq) < GIC_INTERNAL) ? \ | ||
67 | s->priority1[irq][cpu] : \ | ||
68 | s->priority2[(irq) - GIC_INTERNAL]) | ||
69 | -#define GIC_TARGET(irq) s->irq_target[irq] | ||
70 | -#define GIC_CLEAR_GROUP(irq, cm) (s->irq_state[irq].group &= ~(cm)) | ||
71 | -#define GIC_SET_GROUP(irq, cm) (s->irq_state[irq].group |= (cm)) | ||
72 | -#define GIC_TEST_GROUP(irq, cm) ((s->irq_state[irq].group & (cm)) != 0) | ||
73 | +#define GIC_DIST_TARGET(irq) (s->irq_target[irq]) | ||
74 | +#define GIC_DIST_CLEAR_GROUP(irq, cm) (s->irq_state[irq].group &= ~(cm)) | ||
75 | +#define GIC_DIST_SET_GROUP(irq, cm) (s->irq_state[irq].group |= (cm)) | ||
76 | +#define GIC_DIST_TEST_GROUP(irq, cm) ((s->irq_state[irq].group & (cm)) != 0) | ||
77 | |||
78 | #define GICD_CTLR_EN_GRP0 (1U << 0) | ||
79 | #define GICD_CTLR_EN_GRP1 (1U << 1) | ||
80 | @@ -XXX,XX +XXX,XX @@ uint32_t gic_acknowledge_irq(GICState *s, int cpu, MemTxAttrs attrs); | ||
81 | void gic_complete_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs); | ||
82 | void gic_update(GICState *s); | ||
83 | void gic_init_irqs_and_distributor(GICState *s); | ||
84 | -void gic_set_priority(GICState *s, int cpu, int irq, uint8_t val, | ||
85 | - MemTxAttrs attrs); | ||
86 | +void gic_dist_set_priority(GICState *s, int cpu, int irq, uint8_t val, | ||
87 | + MemTxAttrs attrs); | ||
88 | |||
89 | static inline bool gic_test_pending(GICState *s, int irq, int cm) | ||
90 | { | ||
91 | @@ -XXX,XX +XXX,XX @@ static inline bool gic_test_pending(GICState *s, int irq, int cm) | ||
92 | * GICD_ISPENDR to set the state pending. | ||
93 | */ | ||
94 | return (s->irq_state[irq].pending & cm) || | ||
95 | - (!GIC_TEST_EDGE_TRIGGER(irq) && GIC_TEST_LEVEL(irq, cm)); | ||
96 | + (!GIC_DIST_TEST_EDGE_TRIGGER(irq) && GIC_DIST_TEST_LEVEL(irq, cm)); | ||
97 | } | ||
98 | } | ||
99 | |||
100 | diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c | ||
101 | index XXXXXXX..XXXXXXX 100644 | ||
102 | --- a/hw/intc/arm_gic.c | ||
103 | +++ b/hw/intc/arm_gic.c | ||
104 | @@ -XXX,XX +XXX,XX @@ void gic_update(GICState *s) | ||
105 | best_prio = 0x100; | ||
106 | best_irq = 1023; | ||
107 | for (irq = 0; irq < s->num_irq; irq++) { | ||
108 | - if (GIC_TEST_ENABLED(irq, cm) && gic_test_pending(s, irq, cm) && | ||
109 | - (!GIC_TEST_ACTIVE(irq, cm)) && | ||
110 | - (irq < GIC_INTERNAL || GIC_TARGET(irq) & cm)) { | ||
111 | - if (GIC_GET_PRIORITY(irq, cpu) < best_prio) { | ||
112 | - best_prio = GIC_GET_PRIORITY(irq, cpu); | ||
113 | + if (GIC_DIST_TEST_ENABLED(irq, cm) && | ||
114 | + gic_test_pending(s, irq, cm) && | ||
115 | + (!GIC_DIST_TEST_ACTIVE(irq, cm)) && | ||
116 | + (irq < GIC_INTERNAL || GIC_DIST_TARGET(irq) & cm)) { | ||
117 | + if (GIC_DIST_GET_PRIORITY(irq, cpu) < best_prio) { | ||
118 | + best_prio = GIC_DIST_GET_PRIORITY(irq, cpu); | ||
119 | best_irq = irq; | ||
120 | } | ||
121 | } | ||
122 | @@ -XXX,XX +XXX,XX @@ void gic_update(GICState *s) | ||
123 | if (best_prio < s->priority_mask[cpu]) { | ||
124 | s->current_pending[cpu] = best_irq; | ||
125 | if (best_prio < s->running_priority[cpu]) { | ||
126 | - int group = GIC_TEST_GROUP(best_irq, cm); | ||
127 | + int group = GIC_DIST_TEST_GROUP(best_irq, cm); | ||
128 | |||
129 | if (extract32(s->ctlr, group, 1) && | ||
130 | extract32(s->cpu_ctlr[cpu], group, 1)) { | ||
131 | @@ -XXX,XX +XXX,XX @@ void gic_set_pending_private(GICState *s, int cpu, int irq) | ||
132 | } | ||
133 | |||
134 | DPRINTF("Set %d pending cpu %d\n", irq, cpu); | ||
135 | - GIC_SET_PENDING(irq, cm); | ||
136 | + GIC_DIST_SET_PENDING(irq, cm); | ||
137 | gic_update(s); | ||
138 | } | ||
139 | |||
140 | @@ -XXX,XX +XXX,XX @@ static void gic_set_irq_11mpcore(GICState *s, int irq, int level, | ||
141 | int cm, int target) | ||
142 | { | ||
143 | if (level) { | ||
144 | - GIC_SET_LEVEL(irq, cm); | ||
145 | - if (GIC_TEST_EDGE_TRIGGER(irq) || GIC_TEST_ENABLED(irq, cm)) { | ||
146 | + GIC_DIST_SET_LEVEL(irq, cm); | ||
147 | + if (GIC_DIST_TEST_EDGE_TRIGGER(irq) || GIC_DIST_TEST_ENABLED(irq, cm)) { | ||
148 | DPRINTF("Set %d pending mask %x\n", irq, target); | ||
149 | - GIC_SET_PENDING(irq, target); | ||
150 | + GIC_DIST_SET_PENDING(irq, target); | ||
151 | } | ||
152 | } else { | ||
153 | - GIC_CLEAR_LEVEL(irq, cm); | ||
154 | + GIC_DIST_CLEAR_LEVEL(irq, cm); | ||
155 | } | ||
156 | } | ||
157 | |||
158 | @@ -XXX,XX +XXX,XX @@ static void gic_set_irq_generic(GICState *s, int irq, int level, | ||
159 | int cm, int target) | ||
160 | { | ||
161 | if (level) { | ||
162 | - GIC_SET_LEVEL(irq, cm); | ||
163 | + GIC_DIST_SET_LEVEL(irq, cm); | ||
164 | DPRINTF("Set %d pending mask %x\n", irq, target); | ||
165 | - if (GIC_TEST_EDGE_TRIGGER(irq)) { | ||
166 | - GIC_SET_PENDING(irq, target); | ||
167 | + if (GIC_DIST_TEST_EDGE_TRIGGER(irq)) { | ||
168 | + GIC_DIST_SET_PENDING(irq, target); | ||
169 | } | ||
170 | } else { | ||
171 | - GIC_CLEAR_LEVEL(irq, cm); | ||
172 | + GIC_DIST_CLEAR_LEVEL(irq, cm); | ||
173 | } | ||
174 | } | ||
175 | |||
176 | @@ -XXX,XX +XXX,XX @@ static void gic_set_irq(void *opaque, int irq, int level) | ||
177 | /* The first external input line is internal interrupt 32. */ | ||
178 | cm = ALL_CPU_MASK; | ||
179 | irq += GIC_INTERNAL; | ||
180 | - target = GIC_TARGET(irq); | ||
181 | + target = GIC_DIST_TARGET(irq); | ||
182 | } else { | ||
183 | int cpu; | ||
184 | irq -= (s->num_irq - GIC_INTERNAL); | ||
185 | @@ -XXX,XX +XXX,XX @@ static void gic_set_irq(void *opaque, int irq, int level) | ||
186 | |||
187 | assert(irq >= GIC_NR_SGIS); | ||
188 | |||
189 | - if (level == GIC_TEST_LEVEL(irq, cm)) { | ||
190 | + if (level == GIC_DIST_TEST_LEVEL(irq, cm)) { | ||
191 | return; | ||
192 | } | ||
193 | |||
194 | @@ -XXX,XX +XXX,XX @@ static uint16_t gic_get_current_pending_irq(GICState *s, int cpu, | ||
195 | uint16_t pending_irq = s->current_pending[cpu]; | ||
196 | |||
197 | if (pending_irq < GIC_MAXIRQ && gic_has_groups(s)) { | ||
198 | - int group = GIC_TEST_GROUP(pending_irq, (1 << cpu)); | ||
199 | + int group = GIC_DIST_TEST_GROUP(pending_irq, (1 << cpu)); | ||
200 | /* On a GIC without the security extensions, reading this register | ||
201 | * behaves in the same way as a secure access to a GIC with them. | ||
202 | */ | ||
203 | @@ -XXX,XX +XXX,XX @@ static int gic_get_group_priority(GICState *s, int cpu, int irq) | ||
204 | |||
205 | if (gic_has_groups(s) && | ||
206 | !(s->cpu_ctlr[cpu] & GICC_CTLR_CBPR) && | ||
207 | - GIC_TEST_GROUP(irq, (1 << cpu))) { | ||
208 | + GIC_DIST_TEST_GROUP(irq, (1 << cpu))) { | ||
209 | bpr = s->abpr[cpu] - 1; | ||
210 | assert(bpr >= 0); | ||
211 | } else { | ||
212 | @@ -XXX,XX +XXX,XX @@ static int gic_get_group_priority(GICState *s, int cpu, int irq) | ||
213 | */ | ||
214 | mask = ~0U << ((bpr & 7) + 1); | ||
215 | |||
216 | - return GIC_GET_PRIORITY(irq, cpu) & mask; | ||
217 | + return GIC_DIST_GET_PRIORITY(irq, cpu) & mask; | ||
218 | } | ||
219 | |||
220 | static void gic_activate_irq(GICState *s, int cpu, int irq) | ||
221 | @@ -XXX,XX +XXX,XX @@ static void gic_activate_irq(GICState *s, int cpu, int irq) | ||
222 | int regno = preemption_level / 32; | ||
223 | int bitno = preemption_level % 32; | ||
224 | |||
225 | - if (gic_has_groups(s) && GIC_TEST_GROUP(irq, (1 << cpu))) { | ||
226 | + if (gic_has_groups(s) && GIC_DIST_TEST_GROUP(irq, (1 << cpu))) { | ||
227 | s->nsapr[regno][cpu] |= (1 << bitno); | ||
228 | } else { | ||
229 | s->apr[regno][cpu] |= (1 << bitno); | ||
230 | } | ||
231 | |||
232 | s->running_priority[cpu] = prio; | ||
233 | - GIC_SET_ACTIVE(irq, 1 << cpu); | ||
234 | + GIC_DIST_SET_ACTIVE(irq, 1 << cpu); | ||
235 | } | ||
236 | |||
237 | static int gic_get_prio_from_apr_bits(GICState *s, int cpu) | ||
238 | @@ -XXX,XX +XXX,XX @@ uint32_t gic_acknowledge_irq(GICState *s, int cpu, MemTxAttrs attrs) | ||
239 | return irq; | ||
240 | } | ||
241 | |||
242 | - if (GIC_GET_PRIORITY(irq, cpu) >= s->running_priority[cpu]) { | ||
243 | + if (GIC_DIST_GET_PRIORITY(irq, cpu) >= s->running_priority[cpu]) { | ||
244 | DPRINTF("ACK, pending interrupt (%d) has insufficient priority\n", irq); | ||
245 | return 1023; | ||
246 | } | ||
247 | @@ -XXX,XX +XXX,XX @@ uint32_t gic_acknowledge_irq(GICState *s, int cpu, MemTxAttrs attrs) | ||
248 | /* Clear pending flags for both level and edge triggered interrupts. | ||
249 | * Level triggered IRQs will be reasserted once they become inactive. | ||
250 | */ | ||
251 | - GIC_CLEAR_PENDING(irq, GIC_TEST_MODEL(irq) ? ALL_CPU_MASK : cm); | ||
252 | + GIC_DIST_CLEAR_PENDING(irq, GIC_DIST_TEST_MODEL(irq) ? ALL_CPU_MASK | ||
253 | + : cm); | ||
254 | ret = irq; | ||
255 | } else { | ||
256 | if (irq < GIC_NR_SGIS) { | ||
257 | @@ -XXX,XX +XXX,XX @@ uint32_t gic_acknowledge_irq(GICState *s, int cpu, MemTxAttrs attrs) | ||
258 | src = ctz32(s->sgi_pending[irq][cpu]); | ||
259 | s->sgi_pending[irq][cpu] &= ~(1 << src); | ||
260 | if (s->sgi_pending[irq][cpu] == 0) { | ||
261 | - GIC_CLEAR_PENDING(irq, GIC_TEST_MODEL(irq) ? ALL_CPU_MASK : cm); | ||
262 | + GIC_DIST_CLEAR_PENDING(irq, | ||
263 | + GIC_DIST_TEST_MODEL(irq) ? ALL_CPU_MASK | ||
264 | + : cm); | ||
265 | } | ||
266 | ret = irq | ((src & 0x7) << 10); | ||
267 | } else { | ||
268 | @@ -XXX,XX +XXX,XX @@ uint32_t gic_acknowledge_irq(GICState *s, int cpu, MemTxAttrs attrs) | ||
269 | * interrupts. (level triggered interrupts with an active line | ||
270 | * remain pending, see gic_test_pending) | ||
271 | */ | ||
272 | - GIC_CLEAR_PENDING(irq, GIC_TEST_MODEL(irq) ? ALL_CPU_MASK : cm); | ||
273 | + GIC_DIST_CLEAR_PENDING(irq, GIC_DIST_TEST_MODEL(irq) ? ALL_CPU_MASK | ||
274 | + : cm); | ||
275 | ret = irq; | ||
276 | } | ||
277 | } | ||
278 | @@ -XXX,XX +XXX,XX @@ uint32_t gic_acknowledge_irq(GICState *s, int cpu, MemTxAttrs attrs) | ||
279 | return ret; | ||
280 | } | ||
281 | |||
282 | -void gic_set_priority(GICState *s, int cpu, int irq, uint8_t val, | ||
283 | +void gic_dist_set_priority(GICState *s, int cpu, int irq, uint8_t val, | ||
284 | MemTxAttrs attrs) | ||
285 | { | ||
286 | if (s->security_extn && !attrs.secure) { | ||
287 | - if (!GIC_TEST_GROUP(irq, (1 << cpu))) { | ||
288 | + if (!GIC_DIST_TEST_GROUP(irq, (1 << cpu))) { | ||
289 | return; /* Ignore Non-secure access of Group0 IRQ */ | ||
290 | } | ||
291 | val = 0x80 | (val >> 1); /* Non-secure view */ | ||
292 | @@ -XXX,XX +XXX,XX @@ void gic_set_priority(GICState *s, int cpu, int irq, uint8_t val, | ||
293 | } | ||
294 | } | ||
295 | |||
296 | -static uint32_t gic_get_priority(GICState *s, int cpu, int irq, | ||
297 | +static uint32_t gic_dist_get_priority(GICState *s, int cpu, int irq, | ||
298 | MemTxAttrs attrs) | ||
299 | { | ||
300 | - uint32_t prio = GIC_GET_PRIORITY(irq, cpu); | ||
301 | + uint32_t prio = GIC_DIST_GET_PRIORITY(irq, cpu); | ||
302 | |||
303 | if (s->security_extn && !attrs.secure) { | ||
304 | - if (!GIC_TEST_GROUP(irq, (1 << cpu))) { | ||
305 | + if (!GIC_DIST_TEST_GROUP(irq, (1 << cpu))) { | ||
306 | return 0; /* Non-secure access cannot read priority of Group0 IRQ */ | ||
307 | } | ||
308 | prio = (prio << 1) & 0xff; /* Non-secure view */ | ||
309 | @@ -XXX,XX +XXX,XX @@ static void gic_deactivate_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs) | ||
310 | return; | ||
311 | } | ||
312 | |||
313 | - group = gic_has_groups(s) && GIC_TEST_GROUP(irq, cm); | ||
314 | + group = gic_has_groups(s) && GIC_DIST_TEST_GROUP(irq, cm); | ||
315 | |||
316 | if (!gic_eoi_split(s, cpu, attrs)) { | ||
317 | /* This is UNPREDICTABLE; we choose to ignore it */ | ||
318 | @@ -XXX,XX +XXX,XX @@ static void gic_deactivate_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs) | ||
319 | return; | ||
320 | } | ||
321 | |||
322 | - GIC_CLEAR_ACTIVE(irq, cm); | ||
323 | + GIC_DIST_CLEAR_ACTIVE(irq, cm); | ||
324 | } | ||
325 | |||
326 | void gic_complete_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs) | ||
327 | @@ -XXX,XX +XXX,XX @@ void gic_complete_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs) | ||
328 | if (s->revision == REV_11MPCORE) { | ||
329 | /* Mark level triggered interrupts as pending if they are still | ||
330 | raised. */ | ||
331 | - if (!GIC_TEST_EDGE_TRIGGER(irq) && GIC_TEST_ENABLED(irq, cm) | ||
332 | - && GIC_TEST_LEVEL(irq, cm) && (GIC_TARGET(irq) & cm) != 0) { | ||
333 | + if (!GIC_DIST_TEST_EDGE_TRIGGER(irq) && GIC_DIST_TEST_ENABLED(irq, cm) | ||
334 | + && GIC_DIST_TEST_LEVEL(irq, cm) | ||
335 | + && (GIC_DIST_TARGET(irq) & cm) != 0) { | ||
336 | DPRINTF("Set %d pending mask %x\n", irq, cm); | ||
337 | - GIC_SET_PENDING(irq, cm); | ||
338 | + GIC_DIST_SET_PENDING(irq, cm); | ||
339 | } | ||
340 | } | ||
341 | |||
342 | - group = gic_has_groups(s) && GIC_TEST_GROUP(irq, cm); | ||
343 | + group = gic_has_groups(s) && GIC_DIST_TEST_GROUP(irq, cm); | ||
344 | |||
345 | if (s->security_extn && !attrs.secure && !group) { | ||
346 | DPRINTF("Non-secure EOI for Group0 interrupt %d ignored\n", irq); | ||
347 | @@ -XXX,XX +XXX,XX @@ void gic_complete_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs) | ||
348 | |||
349 | /* In GICv2 the guest can choose to split priority-drop and deactivate */ | ||
350 | if (!gic_eoi_split(s, cpu, attrs)) { | ||
351 | - GIC_CLEAR_ACTIVE(irq, cm); | ||
352 | + GIC_DIST_CLEAR_ACTIVE(irq, cm); | ||
353 | } | ||
354 | gic_update(s); | ||
355 | } | ||
356 | @@ -XXX,XX +XXX,XX @@ static uint32_t gic_dist_readb(void *opaque, hwaddr offset, MemTxAttrs attrs) | ||
357 | goto bad_reg; | ||
358 | } | ||
359 | for (i = 0; i < 8; i++) { | ||
360 | - if (GIC_TEST_GROUP(irq + i, cm)) { | ||
361 | + if (GIC_DIST_TEST_GROUP(irq + i, cm)) { | ||
362 | res |= (1 << i); | ||
363 | } | ||
364 | } | ||
365 | @@ -XXX,XX +XXX,XX @@ static uint32_t gic_dist_readb(void *opaque, hwaddr offset, MemTxAttrs attrs) | ||
366 | res = 0; | ||
367 | for (i = 0; i < 8; i++) { | ||
368 | if (s->security_extn && !attrs.secure && | ||
369 | - !GIC_TEST_GROUP(irq + i, 1 << cpu)) { | ||
370 | + !GIC_DIST_TEST_GROUP(irq + i, 1 << cpu)) { | ||
371 | continue; /* Ignore Non-secure access of Group0 IRQ */ | ||
372 | } | ||
373 | |||
374 | - if (GIC_TEST_ENABLED(irq + i, cm)) { | ||
375 | + if (GIC_DIST_TEST_ENABLED(irq + i, cm)) { | ||
376 | res |= (1 << i); | ||
377 | } | ||
378 | } | ||
379 | @@ -XXX,XX +XXX,XX @@ static uint32_t gic_dist_readb(void *opaque, hwaddr offset, MemTxAttrs attrs) | ||
380 | mask = (irq < GIC_INTERNAL) ? cm : ALL_CPU_MASK; | ||
381 | for (i = 0; i < 8; i++) { | ||
382 | if (s->security_extn && !attrs.secure && | ||
383 | - !GIC_TEST_GROUP(irq + i, 1 << cpu)) { | ||
384 | + !GIC_DIST_TEST_GROUP(irq + i, 1 << cpu)) { | ||
385 | continue; /* Ignore Non-secure access of Group0 IRQ */ | ||
386 | } | ||
387 | |||
388 | @@ -XXX,XX +XXX,XX @@ static uint32_t gic_dist_readb(void *opaque, hwaddr offset, MemTxAttrs attrs) | ||
389 | mask = (irq < GIC_INTERNAL) ? cm : ALL_CPU_MASK; | ||
390 | for (i = 0; i < 8; i++) { | ||
391 | if (s->security_extn && !attrs.secure && | ||
392 | - !GIC_TEST_GROUP(irq + i, 1 << cpu)) { | ||
393 | + !GIC_DIST_TEST_GROUP(irq + i, 1 << cpu)) { | ||
394 | continue; /* Ignore Non-secure access of Group0 IRQ */ | ||
395 | } | ||
396 | |||
397 | - if (GIC_TEST_ACTIVE(irq + i, mask)) { | ||
398 | + if (GIC_DIST_TEST_ACTIVE(irq + i, mask)) { | ||
399 | res |= (1 << i); | ||
400 | } | ||
401 | } | ||
402 | @@ -XXX,XX +XXX,XX @@ static uint32_t gic_dist_readb(void *opaque, hwaddr offset, MemTxAttrs attrs) | ||
403 | irq = (offset - 0x400) + GIC_BASE_IRQ; | ||
404 | if (irq >= s->num_irq) | ||
405 | goto bad_reg; | ||
406 | - res = gic_get_priority(s, cpu, irq, attrs); | ||
407 | + res = gic_dist_get_priority(s, cpu, irq, attrs); | ||
408 | } else if (offset < 0xc00) { | ||
409 | /* Interrupt CPU Target. */ | ||
410 | if (s->num_cpu == 1 && s->revision != REV_11MPCORE) { | ||
411 | @@ -XXX,XX +XXX,XX @@ static uint32_t gic_dist_readb(void *opaque, hwaddr offset, MemTxAttrs attrs) | ||
412 | } else if (irq < GIC_INTERNAL) { | ||
413 | res = cm; | ||
414 | } else { | ||
415 | - res = GIC_TARGET(irq); | ||
416 | + res = GIC_DIST_TARGET(irq); | ||
417 | } | ||
418 | } | ||
419 | } else if (offset < 0xf00) { | ||
420 | @@ -XXX,XX +XXX,XX @@ static uint32_t gic_dist_readb(void *opaque, hwaddr offset, MemTxAttrs attrs) | ||
421 | res = 0; | ||
422 | for (i = 0; i < 4; i++) { | ||
423 | if (s->security_extn && !attrs.secure && | ||
424 | - !GIC_TEST_GROUP(irq + i, 1 << cpu)) { | ||
425 | + !GIC_DIST_TEST_GROUP(irq + i, 1 << cpu)) { | ||
426 | continue; /* Ignore Non-secure access of Group0 IRQ */ | ||
427 | } | ||
428 | |||
429 | - if (GIC_TEST_MODEL(irq + i)) | ||
430 | + if (GIC_DIST_TEST_MODEL(irq + i)) { | ||
431 | res |= (1 << (i * 2)); | ||
432 | - if (GIC_TEST_EDGE_TRIGGER(irq + i)) | ||
433 | + } | ||
434 | + if (GIC_DIST_TEST_EDGE_TRIGGER(irq + i)) { | ||
435 | res |= (2 << (i * 2)); | ||
436 | + } | ||
437 | } | ||
438 | } else if (offset < 0xf10) { | ||
439 | goto bad_reg; | ||
440 | @@ -XXX,XX +XXX,XX @@ static uint32_t gic_dist_readb(void *opaque, hwaddr offset, MemTxAttrs attrs) | ||
441 | } | ||
442 | |||
443 | if (s->security_extn && !attrs.secure && | ||
444 | - !GIC_TEST_GROUP(irq, 1 << cpu)) { | ||
445 | + !GIC_DIST_TEST_GROUP(irq, 1 << cpu)) { | ||
446 | res = 0; /* Ignore Non-secure access of Group0 IRQ */ | ||
447 | } else { | ||
448 | res = s->sgi_pending[irq][cpu]; | ||
449 | @@ -XXX,XX +XXX,XX @@ static void gic_dist_writeb(void *opaque, hwaddr offset, | ||
450 | int cm = (irq < GIC_INTERNAL) ? (1 << cpu) : ALL_CPU_MASK; | ||
451 | if (value & (1 << i)) { | ||
452 | /* Group1 (Non-secure) */ | ||
453 | - GIC_SET_GROUP(irq + i, cm); | ||
454 | + GIC_DIST_SET_GROUP(irq + i, cm); | ||
455 | } else { | ||
456 | /* Group0 (Secure) */ | ||
457 | - GIC_CLEAR_GROUP(irq + i, cm); | ||
458 | + GIC_DIST_CLEAR_GROUP(irq + i, cm); | ||
459 | } | ||
460 | } | ||
461 | } | ||
462 | @@ -XXX,XX +XXX,XX @@ static void gic_dist_writeb(void *opaque, hwaddr offset, | ||
463 | for (i = 0; i < 8; i++) { | ||
464 | if (value & (1 << i)) { | ||
465 | int mask = | ||
466 | - (irq < GIC_INTERNAL) ? (1 << cpu) : GIC_TARGET(irq + i); | ||
467 | + (irq < GIC_INTERNAL) ? (1 << cpu) | ||
468 | + : GIC_DIST_TARGET(irq + i); | ||
469 | int cm = (irq < GIC_INTERNAL) ? (1 << cpu) : ALL_CPU_MASK; | ||
470 | |||
471 | if (s->security_extn && !attrs.secure && | ||
472 | - !GIC_TEST_GROUP(irq + i, 1 << cpu)) { | ||
473 | + !GIC_DIST_TEST_GROUP(irq + i, 1 << cpu)) { | ||
474 | continue; /* Ignore Non-secure access of Group0 IRQ */ | ||
475 | } | ||
476 | |||
477 | - if (!GIC_TEST_ENABLED(irq + i, cm)) { | ||
478 | + if (!GIC_DIST_TEST_ENABLED(irq + i, cm)) { | ||
479 | DPRINTF("Enabled IRQ %d\n", irq + i); | ||
480 | trace_gic_enable_irq(irq + i); | ||
481 | } | ||
482 | - GIC_SET_ENABLED(irq + i, cm); | ||
483 | + GIC_DIST_SET_ENABLED(irq + i, cm); | ||
484 | /* If a raised level triggered IRQ enabled then mark | ||
485 | is as pending. */ | ||
486 | - if (GIC_TEST_LEVEL(irq + i, mask) | ||
487 | - && !GIC_TEST_EDGE_TRIGGER(irq + i)) { | ||
488 | + if (GIC_DIST_TEST_LEVEL(irq + i, mask) | ||
489 | + && !GIC_DIST_TEST_EDGE_TRIGGER(irq + i)) { | ||
490 | DPRINTF("Set %d pending mask %x\n", irq + i, mask); | ||
491 | - GIC_SET_PENDING(irq + i, mask); | ||
492 | + GIC_DIST_SET_PENDING(irq + i, mask); | ||
493 | } | ||
494 | } | ||
495 | } | ||
496 | @@ -XXX,XX +XXX,XX @@ static void gic_dist_writeb(void *opaque, hwaddr offset, | ||
497 | int cm = (irq < GIC_INTERNAL) ? (1 << cpu) : ALL_CPU_MASK; | ||
498 | |||
499 | if (s->security_extn && !attrs.secure && | ||
500 | - !GIC_TEST_GROUP(irq + i, 1 << cpu)) { | ||
501 | + !GIC_DIST_TEST_GROUP(irq + i, 1 << cpu)) { | ||
502 | continue; /* Ignore Non-secure access of Group0 IRQ */ | ||
503 | } | ||
504 | |||
505 | - if (GIC_TEST_ENABLED(irq + i, cm)) { | ||
506 | + if (GIC_DIST_TEST_ENABLED(irq + i, cm)) { | ||
507 | DPRINTF("Disabled IRQ %d\n", irq + i); | ||
508 | trace_gic_disable_irq(irq + i); | ||
509 | } | ||
510 | - GIC_CLEAR_ENABLED(irq + i, cm); | ||
511 | + GIC_DIST_CLEAR_ENABLED(irq + i, cm); | ||
512 | } | ||
513 | } | ||
514 | } else if (offset < 0x280) { | ||
515 | @@ -XXX,XX +XXX,XX @@ static void gic_dist_writeb(void *opaque, hwaddr offset, | ||
516 | for (i = 0; i < 8; i++) { | ||
517 | if (value & (1 << i)) { | ||
518 | if (s->security_extn && !attrs.secure && | ||
519 | - !GIC_TEST_GROUP(irq + i, 1 << cpu)) { | ||
520 | + !GIC_DIST_TEST_GROUP(irq + i, 1 << cpu)) { | ||
521 | continue; /* Ignore Non-secure access of Group0 IRQ */ | ||
522 | } | ||
523 | |||
524 | - GIC_SET_PENDING(irq + i, GIC_TARGET(irq + i)); | ||
525 | + GIC_DIST_SET_PENDING(irq + i, GIC_DIST_TARGET(irq + i)); | ||
526 | } | ||
527 | } | ||
528 | } else if (offset < 0x300) { | ||
529 | @@ -XXX,XX +XXX,XX @@ static void gic_dist_writeb(void *opaque, hwaddr offset, | ||
530 | |||
531 | for (i = 0; i < 8; i++) { | ||
532 | if (s->security_extn && !attrs.secure && | ||
533 | - !GIC_TEST_GROUP(irq + i, 1 << cpu)) { | ||
534 | + !GIC_DIST_TEST_GROUP(irq + i, 1 << cpu)) { | ||
535 | continue; /* Ignore Non-secure access of Group0 IRQ */ | ||
536 | } | ||
537 | |||
538 | @@ -XXX,XX +XXX,XX @@ static void gic_dist_writeb(void *opaque, hwaddr offset, | ||
539 | for per-CPU interrupts. It's unclear whether this is the | ||
540 | corect behavior. */ | ||
541 | if (value & (1 << i)) { | ||
542 | - GIC_CLEAR_PENDING(irq + i, ALL_CPU_MASK); | ||
543 | + GIC_DIST_CLEAR_PENDING(irq + i, ALL_CPU_MASK); | ||
544 | } | ||
545 | } | ||
546 | } else if (offset < 0x400) { | ||
547 | @@ -XXX,XX +XXX,XX @@ static void gic_dist_writeb(void *opaque, hwaddr offset, | ||
548 | irq = (offset - 0x400) + GIC_BASE_IRQ; | ||
549 | if (irq >= s->num_irq) | ||
550 | goto bad_reg; | ||
551 | - gic_set_priority(s, cpu, irq, value, attrs); | ||
552 | + gic_dist_set_priority(s, cpu, irq, value, attrs); | ||
553 | } else if (offset < 0xc00) { | ||
554 | /* Interrupt CPU Target. RAZ/WI on uniprocessor GICs, with the | ||
555 | * annoying exception of the 11MPCore's GIC. | ||
556 | @@ -XXX,XX +XXX,XX @@ static void gic_dist_writeb(void *opaque, hwaddr offset, | ||
557 | value |= 0xaa; | ||
558 | for (i = 0; i < 4; i++) { | ||
559 | if (s->security_extn && !attrs.secure && | ||
560 | - !GIC_TEST_GROUP(irq + i, 1 << cpu)) { | ||
561 | + !GIC_DIST_TEST_GROUP(irq + i, 1 << cpu)) { | ||
562 | continue; /* Ignore Non-secure access of Group0 IRQ */ | ||
563 | } | ||
564 | |||
565 | if (s->revision == REV_11MPCORE) { | ||
566 | if (value & (1 << (i * 2))) { | ||
567 | - GIC_SET_MODEL(irq + i); | ||
568 | + GIC_DIST_SET_MODEL(irq + i); | ||
569 | } else { | ||
570 | - GIC_CLEAR_MODEL(irq + i); | ||
571 | + GIC_DIST_CLEAR_MODEL(irq + i); | ||
572 | } | ||
573 | } | ||
574 | if (value & (2 << (i * 2))) { | ||
575 | - GIC_SET_EDGE_TRIGGER(irq + i); | ||
576 | + GIC_DIST_SET_EDGE_TRIGGER(irq + i); | ||
577 | } else { | ||
578 | - GIC_CLEAR_EDGE_TRIGGER(irq + i); | ||
579 | + GIC_DIST_CLEAR_EDGE_TRIGGER(irq + i); | ||
580 | } | ||
581 | } | ||
582 | } else if (offset < 0xf10) { | ||
583 | @@ -XXX,XX +XXX,XX @@ static void gic_dist_writeb(void *opaque, hwaddr offset, | ||
584 | irq = (offset - 0xf10); | ||
585 | |||
586 | if (!s->security_extn || attrs.secure || | ||
587 | - GIC_TEST_GROUP(irq, 1 << cpu)) { | ||
588 | + GIC_DIST_TEST_GROUP(irq, 1 << cpu)) { | ||
589 | s->sgi_pending[irq][cpu] &= ~value; | ||
590 | if (s->sgi_pending[irq][cpu] == 0) { | ||
591 | - GIC_CLEAR_PENDING(irq, 1 << cpu); | ||
592 | + GIC_DIST_CLEAR_PENDING(irq, 1 << cpu); | ||
593 | } | ||
594 | } | ||
595 | } else if (offset < 0xf30) { | ||
596 | @@ -XXX,XX +XXX,XX @@ static void gic_dist_writeb(void *opaque, hwaddr offset, | ||
597 | irq = (offset - 0xf20); | ||
598 | |||
599 | if (!s->security_extn || attrs.secure || | ||
600 | - GIC_TEST_GROUP(irq, 1 << cpu)) { | ||
601 | - GIC_SET_PENDING(irq, 1 << cpu); | ||
602 | + GIC_DIST_TEST_GROUP(irq, 1 << cpu)) { | ||
603 | + GIC_DIST_SET_PENDING(irq, 1 << cpu); | ||
604 | s->sgi_pending[irq][cpu] |= value; | ||
605 | } | ||
606 | } else { | ||
607 | @@ -XXX,XX +XXX,XX @@ static void gic_dist_writel(void *opaque, hwaddr offset, | ||
608 | mask = ALL_CPU_MASK; | ||
609 | break; | ||
610 | } | ||
611 | - GIC_SET_PENDING(irq, mask); | ||
612 | + GIC_DIST_SET_PENDING(irq, mask); | ||
613 | target_cpu = ctz32(mask); | ||
614 | while (target_cpu < GIC_NCPU) { | ||
615 | s->sgi_pending[irq][target_cpu] |= (1 << cpu); | ||
616 | diff --git a/hw/intc/arm_gic_common.c b/hw/intc/arm_gic_common.c | ||
617 | index XXXXXXX..XXXXXXX 100644 | ||
618 | --- a/hw/intc/arm_gic_common.c | ||
619 | +++ b/hw/intc/arm_gic_common.c | ||
620 | @@ -XXX,XX +XXX,XX @@ static void arm_gic_common_reset(DeviceState *dev) | ||
621 | } | ||
622 | } | ||
623 | for (i = 0; i < GIC_NR_SGIS; i++) { | ||
624 | - GIC_SET_ENABLED(i, ALL_CPU_MASK); | ||
625 | - GIC_SET_EDGE_TRIGGER(i); | ||
626 | + GIC_DIST_SET_ENABLED(i, ALL_CPU_MASK); | ||
627 | + GIC_DIST_SET_EDGE_TRIGGER(i); | ||
628 | } | ||
629 | |||
630 | for (i = 0; i < ARRAY_SIZE(s->priority2); i++) { | ||
631 | @@ -XXX,XX +XXX,XX @@ static void arm_gic_common_reset(DeviceState *dev) | ||
632 | } | ||
633 | if (s->security_extn && s->irq_reset_nonsecure) { | ||
634 | for (i = 0; i < GIC_MAXIRQ; i++) { | ||
635 | - GIC_SET_GROUP(i, ALL_CPU_MASK); | ||
636 | + GIC_DIST_SET_GROUP(i, ALL_CPU_MASK); | ||
637 | } | ||
638 | } | ||
639 | |||
640 | diff --git a/hw/intc/arm_gic_kvm.c b/hw/intc/arm_gic_kvm.c | ||
641 | index XXXXXXX..XXXXXXX 100644 | ||
642 | --- a/hw/intc/arm_gic_kvm.c | ||
643 | +++ b/hw/intc/arm_gic_kvm.c | ||
644 | @@ -XXX,XX +XXX,XX @@ static void translate_group(GICState *s, int irq, int cpu, | ||
645 | int cm = (irq < GIC_INTERNAL) ? (1 << cpu) : ALL_CPU_MASK; | ||
646 | |||
647 | if (to_kernel) { | ||
648 | - *field = GIC_TEST_GROUP(irq, cm); | ||
649 | + *field = GIC_DIST_TEST_GROUP(irq, cm); | ||
650 | } else { | ||
651 | if (*field & 1) { | ||
652 | - GIC_SET_GROUP(irq, cm); | ||
653 | + GIC_DIST_SET_GROUP(irq, cm); | ||
654 | } | ||
655 | } | ||
656 | } | ||
657 | @@ -XXX,XX +XXX,XX @@ static void translate_enabled(GICState *s, int irq, int cpu, | ||
658 | int cm = (irq < GIC_INTERNAL) ? (1 << cpu) : ALL_CPU_MASK; | ||
659 | |||
660 | if (to_kernel) { | ||
661 | - *field = GIC_TEST_ENABLED(irq, cm); | ||
662 | + *field = GIC_DIST_TEST_ENABLED(irq, cm); | ||
663 | } else { | ||
664 | if (*field & 1) { | ||
665 | - GIC_SET_ENABLED(irq, cm); | ||
666 | + GIC_DIST_SET_ENABLED(irq, cm); | ||
667 | } | ||
668 | } | ||
669 | } | ||
670 | @@ -XXX,XX +XXX,XX @@ static void translate_pending(GICState *s, int irq, int cpu, | ||
671 | *field = gic_test_pending(s, irq, cm); | ||
672 | } else { | ||
673 | if (*field & 1) { | ||
674 | - GIC_SET_PENDING(irq, cm); | ||
675 | + GIC_DIST_SET_PENDING(irq, cm); | ||
676 | /* TODO: Capture is level-line is held high in the kernel */ | ||
677 | } | ||
678 | } | ||
679 | @@ -XXX,XX +XXX,XX @@ static void translate_active(GICState *s, int irq, int cpu, | ||
680 | int cm = (irq < GIC_INTERNAL) ? (1 << cpu) : ALL_CPU_MASK; | ||
681 | |||
682 | if (to_kernel) { | ||
683 | - *field = GIC_TEST_ACTIVE(irq, cm); | ||
684 | + *field = GIC_DIST_TEST_ACTIVE(irq, cm); | ||
685 | } else { | ||
686 | if (*field & 1) { | ||
687 | - GIC_SET_ACTIVE(irq, cm); | ||
688 | + GIC_DIST_SET_ACTIVE(irq, cm); | ||
689 | } | ||
690 | } | ||
691 | } | ||
692 | @@ -XXX,XX +XXX,XX @@ static void translate_trigger(GICState *s, int irq, int cpu, | ||
693 | uint32_t *field, bool to_kernel) | ||
694 | { | ||
695 | if (to_kernel) { | ||
696 | - *field = (GIC_TEST_EDGE_TRIGGER(irq)) ? 0x2 : 0x0; | ||
697 | + *field = (GIC_DIST_TEST_EDGE_TRIGGER(irq)) ? 0x2 : 0x0; | ||
698 | } else { | ||
699 | if (*field & 0x2) { | ||
700 | - GIC_SET_EDGE_TRIGGER(irq); | ||
701 | + GIC_DIST_SET_EDGE_TRIGGER(irq); | ||
702 | } | ||
703 | } | ||
704 | } | ||
705 | @@ -XXX,XX +XXX,XX @@ static void translate_priority(GICState *s, int irq, int cpu, | ||
706 | uint32_t *field, bool to_kernel) | ||
707 | { | ||
708 | if (to_kernel) { | ||
709 | - *field = GIC_GET_PRIORITY(irq, cpu) & 0xff; | ||
710 | + *field = GIC_DIST_GET_PRIORITY(irq, cpu) & 0xff; | ||
711 | } else { | ||
712 | - gic_set_priority(s, cpu, irq, *field & 0xff, MEMTXATTRS_UNSPECIFIED); | ||
713 | + gic_dist_set_priority(s, cpu, irq, | ||
714 | + *field & 0xff, MEMTXATTRS_UNSPECIFIED); | ||
715 | } | ||
716 | } | ||
717 | 46 | ||
718 | -- | 47 | -- |
719 | 2.18.0 | 48 | 2.20.1 |
720 | 49 | ||
721 | 50 | diff view generated by jsdifflib |
1 | The io_readx() function needs to know whether the load it is | 1 | The semihosting SYS_HEAPINFO call is supposed to return an array |
---|---|---|---|
2 | doing is an MMU_DATA_LOAD or an MMU_INST_FETCH, so that it | 2 | of four guest addresses: |
3 | can pass the right value to the cpu_transaction_failed() | 3 | * base of heap memory |
4 | function. Plumb this information through from the softmmu | 4 | * limit of heap memory |
5 | code. | 5 | * base of stack memory |
6 | * limit of stack memory | ||
6 | 7 | ||
7 | This is currently not often going to give the wrong answer, | 8 | Some semihosting programs (including those compiled to use the |
8 | because usually instruction fetches go via get_page_addr_code(). | 9 | 'newlib' embedded C library) use this call to work out where they |
9 | However once we switch over to handling execution from non-RAM by | 10 | should initialize themselves to. |
10 | creating single-insn TBs, the path for an insn fetch to generate | ||
11 | a bus error will be through cpu_ld*_code() and io_readx(), | ||
12 | so without this change we will generate a d-side fault when we | ||
13 | should generate an i-side fault. | ||
14 | 11 | ||
15 | We also have to pass the access type via a CPU struct global | 12 | QEMU's implementation when in system emulation mode is very |
16 | down to unassigned_mem_read(), for the benefit of the targets | 13 | simplistic: we say that the heap starts halfway into RAM and |
17 | which still use the cpu_unassigned_access() hook (m68k, mips, | 14 | continues to the end of RAM, and the stack starts at the top of RAM |
18 | sparc, xtensa). | 15 | and works down to the bottom. Unfortunately the code assumes that |
16 | the base address of RAM is at address 0, so on boards like 'virt' | ||
17 | where this is not true the addresses returned will all be wrong and | ||
18 | the guest application will usually crash. | ||
19 | |||
20 | Conveniently since all Arm boards call arm_load_kernel() we have the | ||
21 | base address of the main RAM block in the arm_boot_info struct which | ||
22 | is accessible via the CPU object. Use this to return sensible values | ||
23 | from SYS_HEAPINFO. | ||
19 | 24 | ||
20 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 25 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
21 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 26 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> |
22 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 27 | Message-id: 20201119092346.32356-1-peter.maydell@linaro.org |
23 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
24 | Message-id: 20180710160013.26559-2-peter.maydell@linaro.org | ||
25 | --- | 28 | --- |
26 | accel/tcg/softmmu_template.h | 11 +++++++---- | 29 | target/arm/arm-semi.c | 12 ++++++++---- |
27 | include/qom/cpu.h | 6 ++++++ | 30 | 1 file changed, 8 insertions(+), 4 deletions(-) |
28 | accel/tcg/cputlb.c | 5 +++-- | ||
29 | memory.c | 3 ++- | ||
30 | 4 files changed, 18 insertions(+), 7 deletions(-) | ||
31 | 31 | ||
32 | diff --git a/accel/tcg/softmmu_template.h b/accel/tcg/softmmu_template.h | 32 | diff --git a/target/arm/arm-semi.c b/target/arm/arm-semi.c |
33 | index XXXXXXX..XXXXXXX 100644 | 33 | index XXXXXXX..XXXXXXX 100644 |
34 | --- a/accel/tcg/softmmu_template.h | 34 | --- a/target/arm/arm-semi.c |
35 | +++ b/accel/tcg/softmmu_template.h | 35 | +++ b/target/arm/arm-semi.c |
36 | @@ -XXX,XX +XXX,XX @@ static inline DATA_TYPE glue(io_read, SUFFIX)(CPUArchState *env, | 36 | @@ -XXX,XX +XXX,XX @@ |
37 | size_t mmu_idx, size_t index, | 37 | #else |
38 | target_ulong addr, | 38 | #include "exec/gdbstub.h" |
39 | uintptr_t retaddr, | 39 | #include "qemu/cutils.h" |
40 | - bool recheck) | 40 | +#include "hw/arm/boot.h" |
41 | + bool recheck, | ||
42 | + MMUAccessType access_type) | ||
43 | { | ||
44 | CPUIOTLBEntry *iotlbentry = &env->iotlb[mmu_idx][index]; | ||
45 | return io_readx(env, iotlbentry, mmu_idx, addr, retaddr, recheck, | ||
46 | - DATA_SIZE); | ||
47 | + access_type, DATA_SIZE); | ||
48 | } | ||
49 | #endif | 41 | #endif |
50 | 42 | ||
51 | @@ -XXX,XX +XXX,XX @@ WORD_TYPE helper_le_ld_name(CPUArchState *env, target_ulong addr, | 43 | #define TARGET_SYS_OPEN 0x01 |
52 | /* ??? Note that the io helpers always read data in the target | 44 | @@ -XXX,XX +XXX,XX @@ target_ulong do_arm_semihosting(CPUARMState *env) |
53 | byte ordering. We should push the LE/BE request down into io. */ | 45 | int i; |
54 | res = glue(io_read, SUFFIX)(env, mmu_idx, index, addr, retaddr, | 46 | #ifdef CONFIG_USER_ONLY |
55 | - tlb_addr & TLB_RECHECK); | 47 | TaskState *ts = cs->opaque; |
56 | + tlb_addr & TLB_RECHECK, | 48 | +#else |
57 | + READ_ACCESS_TYPE); | 49 | + const struct arm_boot_info *info = env->boot_info; |
58 | res = TGT_LE(res); | 50 | + target_ulong rambase = info->loader_start; |
59 | return res; | ||
60 | } | ||
61 | @@ -XXX,XX +XXX,XX @@ WORD_TYPE helper_be_ld_name(CPUArchState *env, target_ulong addr, | ||
62 | /* ??? Note that the io helpers always read data in the target | ||
63 | byte ordering. We should push the LE/BE request down into io. */ | ||
64 | res = glue(io_read, SUFFIX)(env, mmu_idx, index, addr, retaddr, | ||
65 | - tlb_addr & TLB_RECHECK); | ||
66 | + tlb_addr & TLB_RECHECK, | ||
67 | + READ_ACCESS_TYPE); | ||
68 | res = TGT_BE(res); | ||
69 | return res; | ||
70 | } | ||
71 | diff --git a/include/qom/cpu.h b/include/qom/cpu.h | ||
72 | index XXXXXXX..XXXXXXX 100644 | ||
73 | --- a/include/qom/cpu.h | ||
74 | +++ b/include/qom/cpu.h | ||
75 | @@ -XXX,XX +XXX,XX @@ struct CPUState { | ||
76 | */ | ||
77 | uintptr_t mem_io_pc; | ||
78 | vaddr mem_io_vaddr; | ||
79 | + /* | ||
80 | + * This is only needed for the legacy cpu_unassigned_access() hook; | ||
81 | + * when all targets using it have been converted to use | ||
82 | + * cpu_transaction_failed() instead it can be removed. | ||
83 | + */ | ||
84 | + MMUAccessType mem_io_access_type; | ||
85 | |||
86 | int kvm_fd; | ||
87 | struct KVMState *kvm_state; | ||
88 | diff --git a/accel/tcg/cputlb.c b/accel/tcg/cputlb.c | ||
89 | index XXXXXXX..XXXXXXX 100644 | ||
90 | --- a/accel/tcg/cputlb.c | ||
91 | +++ b/accel/tcg/cputlb.c | ||
92 | @@ -XXX,XX +XXX,XX @@ static inline ram_addr_t qemu_ram_addr_from_host_nofail(void *ptr) | ||
93 | static uint64_t io_readx(CPUArchState *env, CPUIOTLBEntry *iotlbentry, | ||
94 | int mmu_idx, | ||
95 | target_ulong addr, uintptr_t retaddr, | ||
96 | - bool recheck, int size) | ||
97 | + bool recheck, MMUAccessType access_type, int size) | ||
98 | { | ||
99 | CPUState *cpu = ENV_GET_CPU(env); | ||
100 | hwaddr mr_offset; | ||
101 | @@ -XXX,XX +XXX,XX @@ static uint64_t io_readx(CPUArchState *env, CPUIOTLBEntry *iotlbentry, | ||
102 | } | ||
103 | |||
104 | cpu->mem_io_vaddr = addr; | ||
105 | + cpu->mem_io_access_type = access_type; | ||
106 | |||
107 | if (mr->global_locking && !qemu_mutex_iothread_locked()) { | ||
108 | qemu_mutex_lock_iothread(); | ||
109 | @@ -XXX,XX +XXX,XX @@ static uint64_t io_readx(CPUArchState *env, CPUIOTLBEntry *iotlbentry, | ||
110 | section->offset_within_address_space - | ||
111 | section->offset_within_region; | ||
112 | |||
113 | - cpu_transaction_failed(cpu, physaddr, addr, size, MMU_DATA_LOAD, | ||
114 | + cpu_transaction_failed(cpu, physaddr, addr, size, access_type, | ||
115 | mmu_idx, iotlbentry->attrs, r, retaddr); | ||
116 | } | ||
117 | if (locked) { | ||
118 | diff --git a/memory.c b/memory.c | ||
119 | index XXXXXXX..XXXXXXX 100644 | ||
120 | --- a/memory.c | ||
121 | +++ b/memory.c | ||
122 | @@ -XXX,XX +XXX,XX @@ static uint64_t unassigned_mem_read(void *opaque, hwaddr addr, | ||
123 | printf("Unassigned mem read " TARGET_FMT_plx "\n", addr); | ||
124 | #endif | 51 | #endif |
125 | if (current_cpu != NULL) { | 52 | |
126 | - cpu_unassigned_access(current_cpu, addr, false, false, 0, size); | 53 | GET_ARG(0); |
127 | + bool is_exec = current_cpu->mem_io_access_type == MMU_INST_FETCH; | 54 | @@ -XXX,XX +XXX,XX @@ target_ulong do_arm_semihosting(CPUARMState *env) |
128 | + cpu_unassigned_access(current_cpu, addr, false, is_exec, 0, size); | 55 | #else |
129 | } | 56 | limit = ram_size; |
130 | return 0; | 57 | /* TODO: Make this use the limit of the loaded application. */ |
131 | } | 58 | - retvals[0] = limit / 2; |
59 | - retvals[1] = limit; | ||
60 | - retvals[2] = limit; /* Stack base */ | ||
61 | - retvals[3] = 0; /* Stack limit. */ | ||
62 | + retvals[0] = rambase + limit / 2; | ||
63 | + retvals[1] = rambase + limit; | ||
64 | + retvals[2] = rambase + limit; /* Stack base */ | ||
65 | + retvals[3] = rambase; /* Stack limit. */ | ||
66 | #endif | ||
67 | |||
68 | for (i = 0; i < ARRAY_SIZE(retvals); i++) { | ||
132 | -- | 69 | -- |
133 | 2.18.0 | 70 | 2.20.1 |
134 | 71 | ||
135 | 72 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | When we support execution from non-RAM MMIO regions, get_page_addr_code() | ||
2 | will return -1 to indicate that there is no RAM at the requested address. | ||
3 | Handle this in the cpu-exec TB hashtable lookup code, treating it as | ||
4 | "no match found". | ||
5 | 1 | ||
6 | Note that the call to get_page_addr_code() in tb_lookup_cmp() needs | ||
7 | no changes -- a return of -1 will already correctly result in the | ||
8 | function returning false. | ||
9 | |||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
12 | Reviewed-by: Emilio G. Cota <cota@braap.org> | ||
13 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
14 | Message-id: 20180710160013.26559-3-peter.maydell@linaro.org | ||
15 | --- | ||
16 | accel/tcg/cpu-exec.c | 3 +++ | ||
17 | 1 file changed, 3 insertions(+) | ||
18 | |||
19 | diff --git a/accel/tcg/cpu-exec.c b/accel/tcg/cpu-exec.c | ||
20 | index XXXXXXX..XXXXXXX 100644 | ||
21 | --- a/accel/tcg/cpu-exec.c | ||
22 | +++ b/accel/tcg/cpu-exec.c | ||
23 | @@ -XXX,XX +XXX,XX @@ TranslationBlock *tb_htable_lookup(CPUState *cpu, target_ulong pc, | ||
24 | desc.trace_vcpu_dstate = *cpu->trace_dstate; | ||
25 | desc.pc = pc; | ||
26 | phys_pc = get_page_addr_code(desc.env, pc); | ||
27 | + if (phys_pc == -1) { | ||
28 | + return NULL; | ||
29 | + } | ||
30 | desc.phys_page1 = phys_pc & TARGET_PAGE_MASK; | ||
31 | h = tb_hash_func(phys_pc, pc, flags, cf_mask, *cpu->trace_dstate); | ||
32 | return qht_lookup_custom(&tb_ctx.htable, &desc, h, tb_lookup_cmp); | ||
33 | -- | ||
34 | 2.18.0 | ||
35 | |||
36 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | When we support execution from non-RAM MMIO regions, get_page_addr_code() | ||
2 | will return -1 to indicate that there is no RAM at the requested address. | ||
3 | Handle this in tb_check_watchpoint() -- if the exception happened for a | ||
4 | PC which doesn't correspond to RAM then there is no need to invalidate | ||
5 | any TBs, because the one-instruction TB will not have been cached. | ||
6 | 1 | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
10 | Message-id: 20180710160013.26559-4-peter.maydell@linaro.org | ||
11 | --- | ||
12 | accel/tcg/translate-all.c | 4 +++- | ||
13 | 1 file changed, 3 insertions(+), 1 deletion(-) | ||
14 | |||
15 | diff --git a/accel/tcg/translate-all.c b/accel/tcg/translate-all.c | ||
16 | index XXXXXXX..XXXXXXX 100644 | ||
17 | --- a/accel/tcg/translate-all.c | ||
18 | +++ b/accel/tcg/translate-all.c | ||
19 | @@ -XXX,XX +XXX,XX @@ void tb_check_watchpoint(CPUState *cpu) | ||
20 | |||
21 | cpu_get_tb_cpu_state(env, &pc, &cs_base, &flags); | ||
22 | addr = get_page_addr_code(env, pc); | ||
23 | - tb_invalidate_phys_range(addr, addr + 1); | ||
24 | + if (addr != -1) { | ||
25 | + tb_invalidate_phys_range(addr, addr + 1); | ||
26 | + } | ||
27 | } | ||
28 | } | ||
29 | |||
30 | -- | ||
31 | 2.18.0 | ||
32 | |||
33 | diff view generated by jsdifflib |
1 | The IMO, FMO and AMO bits in HCR_EL2 are defined to "behave as | 1 | The Linux kernel doesn't use the official bkpt insn for breakpoints; |
---|---|---|---|
2 | 1 for all purposes other than direct reads" if HCR_EL2.TGE | 2 | instead it uses three instructions in the guaranteed-to-UNDEF space, |
3 | is set and HCR_EL2.E2H is 0, and to "behave as 0 for all | 3 | and generates SIGTRAP for these rather than the SIGILL that most |
4 | purposes other than direct reads" if HCR_EL2.TGE is set | 4 | UNDEF insns generate: |
5 | and HRC_EL2.E2H is 1. | ||
6 | 5 | ||
7 | To avoid having to check E2H and TGE everywhere where we test IMO and | 6 | https://elixir.bootlin.com/linux/v5.9.8/source/arch/arm/kernel/ptrace.c#L197 |
8 | FMO, provide accessors arm_hcr_el2_imo(), arm_hcr_el2_fmo()and | ||
9 | arm_hcr_el2_amo(). We don't implement ARMv8.1-VHE yet, so the E2H | ||
10 | case will never be true, but we include the logic to save effort when | ||
11 | we eventually do get to that. | ||
12 | 7 | ||
13 | (Note that in several of these callsites the change doesn't | 8 | Make QEMU treat these insns specially too. The main benefit of this |
14 | actually make a difference as either the callsite is handling | 9 | is that if you're running a debugger on a guest program that runs |
15 | TGE specially anyway, or the CPU can't get into that situation | 10 | into a GCC __builtin_trap() or LLVM "trap because execution should |
16 | with TGE set; we change everywhere for consistency.) | 11 | never reach here" then you'll get the expected signal rather than a |
12 | SIGILL. | ||
17 | 13 | ||
18 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
19 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 15 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
20 | Message-id: 20180724115950.17316-5-peter.maydell@linaro.org | 16 | Message-id: 20201117155634.6924-1-peter.maydell@linaro.org |
21 | --- | 17 | --- |
22 | target/arm/cpu.h | 64 +++++++++++++++++++++++++++++++++++---- | 18 | linux-user/arm/cpu_loop.c | 28 ++++++++++++++++++++++++++++ |
23 | hw/intc/arm_gicv3_cpuif.c | 19 ++++++------ | 19 | 1 file changed, 28 insertions(+) |
24 | target/arm/helper.c | 6 ++-- | ||
25 | 3 files changed, 71 insertions(+), 18 deletions(-) | ||
26 | 20 | ||
27 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 21 | diff --git a/linux-user/arm/cpu_loop.c b/linux-user/arm/cpu_loop.c |
28 | index XXXXXXX..XXXXXXX 100644 | 22 | index XXXXXXX..XXXXXXX 100644 |
29 | --- a/target/arm/cpu.h | 23 | --- a/linux-user/arm/cpu_loop.c |
30 | +++ b/target/arm/cpu.h | 24 | +++ b/linux-user/arm/cpu_loop.c |
31 | @@ -XXX,XX +XXX,XX @@ static inline void xpsr_write(CPUARMState *env, uint32_t val, uint32_t mask) | 25 | @@ -XXX,XX +XXX,XX @@ do_kernel_trap(CPUARMState *env) |
32 | #define HCR_RW (1ULL << 31) | 26 | return 0; |
33 | #define HCR_CD (1ULL << 32) | 27 | } |
34 | #define HCR_ID (1ULL << 33) | 28 | |
35 | +#define HCR_E2H (1ULL << 34) | 29 | +static bool insn_is_linux_bkpt(uint32_t opcode, bool is_thumb) |
36 | +/* | ||
37 | + * When we actually implement ARMv8.1-VHE we should add HCR_E2H to | ||
38 | + * HCR_MASK and then clear it again if the feature bit is not set in | ||
39 | + * hcr_write(). | ||
40 | + */ | ||
41 | #define HCR_MASK ((1ULL << 34) - 1) | ||
42 | |||
43 | #define SCR_NS (1U << 0) | ||
44 | @@ -XXX,XX +XXX,XX @@ bool write_cpustate_to_list(ARMCPU *cpu); | ||
45 | # define TARGET_VIRT_ADDR_SPACE_BITS 32 | ||
46 | #endif | ||
47 | |||
48 | +/** | ||
49 | + * arm_hcr_el2_imo(): Return the effective value of HCR_EL2.IMO. | ||
50 | + * Depending on the values of HCR_EL2.E2H and TGE, this may be | ||
51 | + * "behaves as 1 for all purposes other than direct read/write" or | ||
52 | + * "behaves as 0 for all purposes other than direct read/write" | ||
53 | + */ | ||
54 | +static inline bool arm_hcr_el2_imo(CPUARMState *env) | ||
55 | +{ | 30 | +{ |
56 | + switch (env->cp15.hcr_el2 & (HCR_TGE | HCR_E2H)) { | 31 | + /* |
57 | + case HCR_TGE: | 32 | + * Return true if this insn is one of the three magic UDF insns |
58 | + return true; | 33 | + * which the kernel treats as breakpoint insns. |
59 | + case HCR_TGE | HCR_E2H: | 34 | + */ |
60 | + return false; | 35 | + if (!is_thumb) { |
61 | + default: | 36 | + return (opcode & 0x0fffffff) == 0x07f001f0; |
62 | + return env->cp15.hcr_el2 & HCR_IMO; | 37 | + } else { |
38 | + /* | ||
39 | + * Note that we get the two halves of the 32-bit T32 insn | ||
40 | + * in the opposite order to the value the kernel uses in | ||
41 | + * its undef_hook struct. | ||
42 | + */ | ||
43 | + return ((opcode & 0xffff) == 0xde01) || (opcode == 0xa000f7f0); | ||
63 | + } | 44 | + } |
64 | +} | 45 | +} |
65 | + | 46 | + |
66 | +/** | 47 | void cpu_loop(CPUARMState *env) |
67 | + * arm_hcr_el2_fmo(): Return the effective value of HCR_EL2.FMO. | 48 | { |
68 | + */ | 49 | CPUState *cs = env_cpu(env); |
69 | +static inline bool arm_hcr_el2_fmo(CPUARMState *env) | 50 | @@ -XXX,XX +XXX,XX @@ void cpu_loop(CPUARMState *env) |
70 | +{ | 51 | /* FIXME - what to do if get_user() fails? */ |
71 | + switch (env->cp15.hcr_el2 & (HCR_TGE | HCR_E2H)) { | 52 | get_user_code_u32(opcode, env->regs[15], env); |
72 | + case HCR_TGE: | 53 | |
73 | + return true; | 54 | + /* |
74 | + case HCR_TGE | HCR_E2H: | 55 | + * The Linux kernel treats some UDF patterns specially |
75 | + return false; | 56 | + * to use as breakpoints (instead of the architectural |
76 | + default: | 57 | + * bkpt insn). These should trigger a SIGTRAP rather |
77 | + return env->cp15.hcr_el2 & HCR_FMO; | 58 | + * than SIGILL. |
78 | + } | 59 | + */ |
79 | +} | 60 | + if (insn_is_linux_bkpt(opcode, env->thumb)) { |
61 | + goto excp_debug; | ||
62 | + } | ||
80 | + | 63 | + |
81 | +/** | 64 | rc = EmulateAll(opcode, &ts->fpa, env); |
82 | + * arm_hcr_el2_amo(): Return the effective value of HCR_EL2.AMO. | 65 | if (rc == 0) { /* illegal instruction */ |
83 | + */ | 66 | info.si_signo = TARGET_SIGILL; |
84 | +static inline bool arm_hcr_el2_amo(CPUARMState *env) | ||
85 | +{ | ||
86 | + switch (env->cp15.hcr_el2 & (HCR_TGE | HCR_E2H)) { | ||
87 | + case HCR_TGE: | ||
88 | + return true; | ||
89 | + case HCR_TGE | HCR_E2H: | ||
90 | + return false; | ||
91 | + default: | ||
92 | + return env->cp15.hcr_el2 & HCR_AMO; | ||
93 | + } | ||
94 | +} | ||
95 | + | ||
96 | static inline bool arm_excp_unmasked(CPUState *cs, unsigned int excp_idx, | ||
97 | unsigned int target_el) | ||
98 | { | ||
99 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_excp_unmasked(CPUState *cs, unsigned int excp_idx, | ||
100 | break; | ||
101 | |||
102 | case EXCP_VFIQ: | ||
103 | - if (secure || !(env->cp15.hcr_el2 & HCR_FMO) | ||
104 | - || (env->cp15.hcr_el2 & HCR_TGE)) { | ||
105 | + if (secure || !arm_hcr_el2_fmo(env) || (env->cp15.hcr_el2 & HCR_TGE)) { | ||
106 | /* VFIQs are only taken when hypervized and non-secure. */ | ||
107 | return false; | ||
108 | } | ||
109 | return !(env->daif & PSTATE_F); | ||
110 | case EXCP_VIRQ: | ||
111 | - if (secure || !(env->cp15.hcr_el2 & HCR_IMO) | ||
112 | - || (env->cp15.hcr_el2 & HCR_TGE)) { | ||
113 | + if (secure || !arm_hcr_el2_imo(env) || (env->cp15.hcr_el2 & HCR_TGE)) { | ||
114 | /* VIRQs are only taken when hypervized and non-secure. */ | ||
115 | return false; | ||
116 | } | ||
117 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_excp_unmasked(CPUState *cs, unsigned int excp_idx, | ||
118 | * to the CPSR.F setting otherwise we further assess the state | ||
119 | * below. | ||
120 | */ | ||
121 | - hcr = (env->cp15.hcr_el2 & HCR_FMO); | ||
122 | + hcr = arm_hcr_el2_fmo(env); | ||
123 | scr = (env->cp15.scr_el3 & SCR_FIQ); | ||
124 | |||
125 | /* When EL3 is 32-bit, the SCR.FW bit controls whether the | ||
126 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_excp_unmasked(CPUState *cs, unsigned int excp_idx, | ||
127 | * when setting the target EL, so it does not have a further | ||
128 | * affect here. | ||
129 | */ | ||
130 | - hcr = (env->cp15.hcr_el2 & HCR_IMO); | ||
131 | + hcr = arm_hcr_el2_imo(env); | ||
132 | scr = false; | ||
133 | break; | ||
134 | default: | ||
135 | diff --git a/hw/intc/arm_gicv3_cpuif.c b/hw/intc/arm_gicv3_cpuif.c | ||
136 | index XXXXXXX..XXXXXXX 100644 | ||
137 | --- a/hw/intc/arm_gicv3_cpuif.c | ||
138 | +++ b/hw/intc/arm_gicv3_cpuif.c | ||
139 | @@ -XXX,XX +XXX,XX @@ static bool icv_access(CPUARMState *env, int hcr_flags) | ||
140 | * * access if NS EL1 and either IMO or FMO == 1: | ||
141 | * CTLR, DIR, PMR, RPR | ||
142 | */ | ||
143 | - return (env->cp15.hcr_el2 & hcr_flags) && arm_current_el(env) == 1 | ||
144 | + bool flagmatch = ((hcr_flags & HCR_IMO) && arm_hcr_el2_imo(env)) || | ||
145 | + ((hcr_flags & HCR_FMO) && arm_hcr_el2_fmo(env)); | ||
146 | + | ||
147 | + return flagmatch && arm_current_el(env) == 1 | ||
148 | && !arm_is_secure_below_el3(env); | ||
149 | } | ||
150 | |||
151 | @@ -XXX,XX +XXX,XX @@ static void icc_dir_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
152 | /* No need to include !IsSecure in route_*_to_el2 as it's only | ||
153 | * tested in cases where we know !IsSecure is true. | ||
154 | */ | ||
155 | - route_fiq_to_el2 = env->cp15.hcr_el2 & HCR_FMO; | ||
156 | - route_irq_to_el2 = env->cp15.hcr_el2 & HCR_IMO; | ||
157 | + route_fiq_to_el2 = arm_hcr_el2_fmo(env); | ||
158 | + route_irq_to_el2 = arm_hcr_el2_imo(env); | ||
159 | |||
160 | switch (arm_current_el(env)) { | ||
161 | case 3: | ||
162 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult gicv3_irqfiq_access(CPUARMState *env, | ||
163 | switch (el) { | ||
164 | case 1: | ||
165 | if (arm_is_secure_below_el3(env) || | ||
166 | - ((env->cp15.hcr_el2 & (HCR_IMO | HCR_FMO)) == 0)) { | ||
167 | + (arm_hcr_el2_imo(env) == 0 && arm_hcr_el2_fmo(env) == 0)) { | ||
168 | r = CP_ACCESS_TRAP_EL3; | ||
169 | } | ||
170 | break; | ||
171 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult gicv3_dir_access(CPUARMState *env, | ||
172 | static CPAccessResult gicv3_sgi_access(CPUARMState *env, | ||
173 | const ARMCPRegInfo *ri, bool isread) | ||
174 | { | ||
175 | - if ((env->cp15.hcr_el2 & (HCR_IMO | HCR_FMO)) && | ||
176 | + if ((arm_hcr_el2_imo(env) || arm_hcr_el2_fmo(env)) && | ||
177 | arm_current_el(env) == 1 && !arm_is_secure_below_el3(env)) { | ||
178 | /* Takes priority over a possible EL3 trap */ | ||
179 | return CP_ACCESS_TRAP_EL2; | ||
180 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult gicv3_fiq_access(CPUARMState *env, | ||
181 | if (env->cp15.scr_el3 & SCR_FIQ) { | ||
182 | switch (el) { | ||
183 | case 1: | ||
184 | - if (arm_is_secure_below_el3(env) || | ||
185 | - ((env->cp15.hcr_el2 & HCR_FMO) == 0)) { | ||
186 | + if (arm_is_secure_below_el3(env) || !arm_hcr_el2_fmo(env)) { | ||
187 | r = CP_ACCESS_TRAP_EL3; | ||
188 | } | ||
189 | break; | ||
190 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult gicv3_irq_access(CPUARMState *env, | ||
191 | if (env->cp15.scr_el3 & SCR_IRQ) { | ||
192 | switch (el) { | ||
193 | case 1: | ||
194 | - if (arm_is_secure_below_el3(env) || | ||
195 | - ((env->cp15.hcr_el2 & HCR_IMO) == 0)) { | ||
196 | + if (arm_is_secure_below_el3(env) || !arm_hcr_el2_imo(env)) { | ||
197 | r = CP_ACCESS_TRAP_EL3; | ||
198 | } | ||
199 | break; | ||
200 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
201 | index XXXXXXX..XXXXXXX 100644 | ||
202 | --- a/target/arm/helper.c | ||
203 | +++ b/target/arm/helper.c | ||
204 | @@ -XXX,XX +XXX,XX @@ uint32_t arm_phys_excp_target_el(CPUState *cs, uint32_t excp_idx, | ||
205 | switch (excp_idx) { | ||
206 | case EXCP_IRQ: | ||
207 | scr = ((env->cp15.scr_el3 & SCR_IRQ) == SCR_IRQ); | ||
208 | - hcr = ((env->cp15.hcr_el2 & HCR_IMO) == HCR_IMO); | ||
209 | + hcr = arm_hcr_el2_imo(env); | ||
210 | break; | ||
211 | case EXCP_FIQ: | ||
212 | scr = ((env->cp15.scr_el3 & SCR_FIQ) == SCR_FIQ); | ||
213 | - hcr = ((env->cp15.hcr_el2 & HCR_FMO) == HCR_FMO); | ||
214 | + hcr = arm_hcr_el2_fmo(env); | ||
215 | break; | ||
216 | default: | ||
217 | scr = ((env->cp15.scr_el3 & SCR_EA) == SCR_EA); | ||
218 | - hcr = ((env->cp15.hcr_el2 & HCR_AMO) == HCR_AMO); | ||
219 | + hcr = arm_hcr_el2_amo(env); | ||
220 | break; | ||
221 | }; | ||
222 | |||
223 | -- | 67 | -- |
224 | 2.18.0 | 68 | 2.20.1 |
225 | 69 | ||
226 | 70 | diff view generated by jsdifflib |
1 | Tailchaining is an optimization in handling of exception return | 1 | The virtio-net-failover documentation is currently orphan and |
---|---|---|---|
2 | for M-profile cores: if we are about to pop the exception stack | 2 | not included in any manual; move it into the system manual, |
3 | for an exception return, but there is a pending exception which | 3 | immediately following the general network emulation section. |
4 | is higher priority than the priority we are returning to, then | ||
5 | instead of unstacking and then immediately taking the exception | ||
6 | and stacking registers again, we can chain to the pending | ||
7 | exception without unstacking and stacking. | ||
8 | |||
9 | For v6M and v7M it is IMPDEF whether tailchaining happens for pending | ||
10 | exceptions; for v8M this is architecturally required. Implement it | ||
11 | in QEMU for all M-profile cores, since in practice v6M and v7M | ||
12 | hardware implementations generally do have it. | ||
13 | |||
14 | (We were already doing tailchaining for derived exceptions which | ||
15 | happened during exception return, like the validity checks and | ||
16 | stack access failures; these have always been required to be | ||
17 | tailchained for all versions of the architecture.) | ||
18 | 4 | ||
19 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
20 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 6 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> |
21 | Message-id: 20180720145647.8810-5-peter.maydell@linaro.org | ||
22 | --- | 7 | --- |
23 | target/arm/helper.c | 16 ++++++++++++++++ | 8 | docs/system/index.rst | 1 + |
24 | 1 file changed, 16 insertions(+) | 9 | docs/{ => system}/virtio-net-failover.rst | 0 |
10 | 2 files changed, 1 insertion(+) | ||
11 | rename docs/{ => system}/virtio-net-failover.rst (100%) | ||
25 | 12 | ||
26 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 13 | diff --git a/docs/system/index.rst b/docs/system/index.rst |
27 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
28 | --- a/target/arm/helper.c | 15 | --- a/docs/system/index.rst |
29 | +++ b/target/arm/helper.c | 16 | +++ b/docs/system/index.rst |
30 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | 17 | @@ -XXX,XX +XXX,XX @@ Contents: |
31 | return; | 18 | monitor |
32 | } | 19 | images |
33 | 20 | net | |
34 | + /* | 21 | + virtio-net-failover |
35 | + * Tailchaining: if there is currently a pending exception that | 22 | usb |
36 | + * is high enough priority to preempt execution at the level we're | 23 | ivshmem |
37 | + * about to return to, then just directly take that exception now, | 24 | linuxboot |
38 | + * avoiding an unstack-and-then-stack. Note that now we have | 25 | diff --git a/docs/virtio-net-failover.rst b/docs/system/virtio-net-failover.rst |
39 | + * deactivated the previous exception by calling armv7m_nvic_complete_irq() | 26 | similarity index 100% |
40 | + * our current execution priority is already the execution priority we are | 27 | rename from docs/virtio-net-failover.rst |
41 | + * returning to -- none of the state we would unstack or set based on | 28 | rename to docs/system/virtio-net-failover.rst |
42 | + * the EXCRET value affects it. | ||
43 | + */ | ||
44 | + if (armv7m_nvic_can_take_pending_exception(env->nvic)) { | ||
45 | + qemu_log_mask(CPU_LOG_INT, "...tailchaining to pending exception\n"); | ||
46 | + v7m_exception_taken(cpu, excret, true, false); | ||
47 | + return; | ||
48 | + } | ||
49 | + | ||
50 | switch_v7m_security_state(env, return_to_secure); | ||
51 | |||
52 | { | ||
53 | -- | 29 | -- |
54 | 2.18.0 | 30 | 2.20.1 |
55 | 31 | ||
56 | 32 | diff view generated by jsdifflib |
1 | On exception return for M-profile, we must restore the CONTROL.SPSEL | 1 | The cpu-hotplug.rst documentation is currently orphan and not |
---|---|---|---|
2 | bit from the EXCRET value before we do any kind of tailchaining, | 2 | included in any manual; move it into the system manual. |
3 | including for the derived exceptions on integrity check failures. | ||
4 | Otherwise we will give the guest an incorrect EXCRET.SPSEL value on | ||
5 | exception entry for the tailchained exception. | ||
6 | 3 | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 5 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> |
9 | Message-id: 20180720145647.8810-4-peter.maydell@linaro.org | ||
10 | --- | 6 | --- |
11 | target/arm/helper.c | 16 ++++++++++------ | 7 | docs/{ => system}/cpu-hotplug.rst | 0 |
12 | 1 file changed, 10 insertions(+), 6 deletions(-) | 8 | docs/system/index.rst | 1 + |
9 | 2 files changed, 1 insertion(+) | ||
10 | rename docs/{ => system}/cpu-hotplug.rst (100%) | ||
13 | 11 | ||
14 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 12 | diff --git a/docs/cpu-hotplug.rst b/docs/system/cpu-hotplug.rst |
13 | similarity index 100% | ||
14 | rename from docs/cpu-hotplug.rst | ||
15 | rename to docs/system/cpu-hotplug.rst | ||
16 | diff --git a/docs/system/index.rst b/docs/system/index.rst | ||
15 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/target/arm/helper.c | 18 | --- a/docs/system/index.rst |
17 | +++ b/target/arm/helper.c | 19 | +++ b/docs/system/index.rst |
18 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | 20 | @@ -XXX,XX +XXX,XX @@ Contents: |
19 | } | 21 | tls |
20 | } | 22 | gdb |
21 | 23 | managed-startup | |
22 | + /* | 24 | + cpu-hotplug |
23 | + * Set CONTROL.SPSEL from excret.SPSEL. Since we're still in | 25 | targets |
24 | + * Handler mode (and will be until we write the new XPSR.Interrupt | 26 | security |
25 | + * field) this does not switch around the current stack pointer. | 27 | deprecated |
26 | + * We must do this before we do any kind of tailchaining, including | ||
27 | + * for the derived exceptions on integrity check failures, or we will | ||
28 | + * give the guest an incorrect EXCRET.SPSEL value on exception entry. | ||
29 | + */ | ||
30 | + write_v7m_control_spsel_for_secstate(env, return_to_sp_process, exc_secure); | ||
31 | + | ||
32 | if (sfault) { | ||
33 | env->v7m.sfsr |= R_V7M_SFSR_INVER_MASK; | ||
34 | armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_SECURE, false); | ||
35 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
36 | return; | ||
37 | } | ||
38 | |||
39 | - /* Set CONTROL.SPSEL from excret.SPSEL. Since we're still in | ||
40 | - * Handler mode (and will be until we write the new XPSR.Interrupt | ||
41 | - * field) this does not switch around the current stack pointer. | ||
42 | - */ | ||
43 | - write_v7m_control_spsel_for_secstate(env, return_to_sp_process, exc_secure); | ||
44 | - | ||
45 | switch_v7m_security_state(env, return_to_secure); | ||
46 | |||
47 | { | ||
48 | -- | 28 | -- |
49 | 2.18.0 | 29 | 2.20.1 |
50 | 30 | ||
51 | 31 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
---|---|---|---|
2 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | ||
3 | --- | ||
4 | docs/system/index.rst | 1 + | ||
5 | docs/{ => system}/virtio-pmem.rst | 0 | ||
6 | 2 files changed, 1 insertion(+) | ||
7 | rename docs/{ => system}/virtio-pmem.rst (100%) | ||
2 | 8 | ||
3 | The normal vector element is sign-extended before | 9 | diff --git a/docs/system/index.rst b/docs/system/index.rst |
4 | comparing with the wide vector element. | ||
5 | |||
6 | Reported-by: Laurent Desnogues <laurent.desnogues@gmail.com> | ||
7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Reviewed-by: Laurent Desnogues <laurent.desnogues@gmail.com> | ||
9 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | ||
10 | Tested-by: Alex Bennée <alex.bennee@linaro.org> | ||
11 | Tested-by: Laurent Desnogues <laurent.desnogues@gmail.com> | ||
12 | Message-id: 20180801123111.3595-2-richard.henderson@linaro.org | ||
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
14 | --- | ||
15 | target/arm/sve_helper.c | 12 ++++++------ | ||
16 | 1 file changed, 6 insertions(+), 6 deletions(-) | ||
17 | |||
18 | diff --git a/target/arm/sve_helper.c b/target/arm/sve_helper.c | ||
19 | index XXXXXXX..XXXXXXX 100644 | 10 | index XXXXXXX..XXXXXXX 100644 |
20 | --- a/target/arm/sve_helper.c | 11 | --- a/docs/system/index.rst |
21 | +++ b/target/arm/sve_helper.c | 12 | +++ b/docs/system/index.rst |
22 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(NAME)(void *vd, void *vn, void *vm, void *vg, uint32_t desc) \ | 13 | @@ -XXX,XX +XXX,XX @@ Contents: |
23 | #define DO_CMP_PPZW_S(NAME, TYPE, TYPEW, OP) \ | 14 | gdb |
24 | DO_CMP_PPZW(NAME, TYPE, TYPEW, OP, H1_4, 0x1111111111111111ull) | 15 | managed-startup |
25 | 16 | cpu-hotplug | |
26 | -DO_CMP_PPZW_B(sve_cmpeq_ppzw_b, uint8_t, uint64_t, ==) | 17 | + virtio-pmem |
27 | -DO_CMP_PPZW_H(sve_cmpeq_ppzw_h, uint16_t, uint64_t, ==) | 18 | targets |
28 | -DO_CMP_PPZW_S(sve_cmpeq_ppzw_s, uint32_t, uint64_t, ==) | 19 | security |
29 | +DO_CMP_PPZW_B(sve_cmpeq_ppzw_b, int8_t, uint64_t, ==) | 20 | deprecated |
30 | +DO_CMP_PPZW_H(sve_cmpeq_ppzw_h, int16_t, uint64_t, ==) | 21 | diff --git a/docs/virtio-pmem.rst b/docs/system/virtio-pmem.rst |
31 | +DO_CMP_PPZW_S(sve_cmpeq_ppzw_s, int32_t, uint64_t, ==) | 22 | similarity index 100% |
32 | 23 | rename from docs/virtio-pmem.rst | |
33 | -DO_CMP_PPZW_B(sve_cmpne_ppzw_b, uint8_t, uint64_t, !=) | 24 | rename to docs/system/virtio-pmem.rst |
34 | -DO_CMP_PPZW_H(sve_cmpne_ppzw_h, uint16_t, uint64_t, !=) | ||
35 | -DO_CMP_PPZW_S(sve_cmpne_ppzw_s, uint32_t, uint64_t, !=) | ||
36 | +DO_CMP_PPZW_B(sve_cmpne_ppzw_b, int8_t, uint64_t, !=) | ||
37 | +DO_CMP_PPZW_H(sve_cmpne_ppzw_h, int16_t, uint64_t, !=) | ||
38 | +DO_CMP_PPZW_S(sve_cmpne_ppzw_s, int32_t, uint64_t, !=) | ||
39 | |||
40 | DO_CMP_PPZW_B(sve_cmpgt_ppzw_b, int8_t, int64_t, >) | ||
41 | DO_CMP_PPZW_H(sve_cmpgt_ppzw_h, int16_t, int64_t, >) | ||
42 | -- | 25 | -- |
43 | 2.18.0 | 26 | 2.20.1 |
44 | 27 | ||
45 | 28 | diff view generated by jsdifflib |
1 | In do_v7m_exception_exit(), we use the exc_secure variable to track | 1 | The virtio-pmem documentation has some minor style issues we hadn't |
---|---|---|---|
2 | whether the exception we're returning from is secure or non-secure. | 2 | noticed since we weren't rendering it in our docs: |
3 | Unfortunately the statement initializing this was accidentally | 3 | |
4 | inside an "if (env->v7m.exception != ARMV7M_EXCP_NMI)" conditional, | 4 | * Sphinx doesn't complain about overlong title-underlining the |
5 | which meant that we were using the wrong value for NMI handlers. | 5 | way it complains about too-short underlining, but it looks odd; |
6 | Move the initialization out to the right place. | 6 | make the underlines of section headers the right length |
7 | |||
8 | * Indent of paragraphs makes them render as blockquotes; | ||
9 | remove the indent so they just render as normal text | ||
10 | |||
11 | * Leading 'o' isn't rst markup, so it just renders as a literal | ||
12 | "o"; reformat as a subsection heading instead | ||
13 | |||
14 | * "QEMU" in the document title and section headings are a bit | ||
15 | odd and unnecessary since this is the QEMU manual; delete | ||
16 | or rephrase them | ||
17 | |||
18 | * There's no need to specify what QEMU version the device first | ||
19 | appeared in. | ||
7 | 20 | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 21 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 22 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> |
10 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 23 | Reviewed-by: Pankaj Gupta <pankaj.gupta@cloud.ionos.com> |
11 | Message-id: 20180720145647.8810-3-peter.maydell@linaro.org | ||
12 | --- | 24 | --- |
13 | target/arm/helper.c | 2 +- | 25 | docs/system/virtio-pmem.rst | 60 ++++++++++++++++++------------------- |
14 | 1 file changed, 1 insertion(+), 1 deletion(-) | 26 | 1 file changed, 30 insertions(+), 30 deletions(-) |
15 | 27 | ||
16 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 28 | diff --git a/docs/system/virtio-pmem.rst b/docs/system/virtio-pmem.rst |
17 | index XXXXXXX..XXXXXXX 100644 | 29 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/target/arm/helper.c | 30 | --- a/docs/system/virtio-pmem.rst |
19 | +++ b/target/arm/helper.c | 31 | +++ b/docs/system/virtio-pmem.rst |
20 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | 32 | @@ -XXX,XX +XXX,XX @@ |
21 | /* For all other purposes, treat ES as 0 (R_HXSR) */ | 33 | |
22 | excret &= ~R_V7M_EXCRET_ES_MASK; | 34 | -======================== |
23 | } | 35 | -QEMU virtio pmem |
24 | + exc_secure = excret & R_V7M_EXCRET_ES_MASK; | 36 | -======================== |
25 | } | 37 | +=========== |
26 | 38 | +virtio pmem | |
27 | if (env->v7m.exception != ARMV7M_EXCP_NMI) { | 39 | +=========== |
28 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | 40 | |
29 | * which security state's faultmask to clear. (v8M ARM ARM R_KBNF.) | 41 | - This document explains the setup and usage of the virtio pmem device |
30 | */ | 42 | - which is available since QEMU v4.1.0. |
31 | if (arm_feature(env, ARM_FEATURE_M_SECURITY)) { | 43 | - |
32 | - exc_secure = excret & R_V7M_EXCRET_ES_MASK; | 44 | - The virtio pmem device is a paravirtualized persistent memory device |
33 | if (armv7m_nvic_raw_execution_priority(env->nvic) >= 0) { | 45 | - on regular (i.e non-NVDIMM) storage. |
34 | env->v7m.faultmask[exc_secure] = 0; | 46 | +This document explains the setup and usage of the virtio pmem device. |
35 | } | 47 | +The virtio pmem device is a paravirtualized persistent memory device |
48 | +on regular (i.e non-NVDIMM) storage. | ||
49 | |||
50 | Usecase | ||
51 | --------- | ||
52 | +------- | ||
53 | |||
54 | - Virtio pmem allows to bypass the guest page cache and directly use | ||
55 | - host page cache. This reduces guest memory footprint as the host can | ||
56 | - make efficient memory reclaim decisions under memory pressure. | ||
57 | +Virtio pmem allows to bypass the guest page cache and directly use | ||
58 | +host page cache. This reduces guest memory footprint as the host can | ||
59 | +make efficient memory reclaim decisions under memory pressure. | ||
60 | |||
61 | -o How does virtio-pmem compare to the nvdimm emulation supported by QEMU? | ||
62 | +How does virtio-pmem compare to the nvdimm emulation? | ||
63 | +----------------------------------------------------- | ||
64 | |||
65 | - NVDIMM emulation on regular (i.e. non-NVDIMM) host storage does not | ||
66 | - persist the guest writes as there are no defined semantics in the device | ||
67 | - specification. The virtio pmem device provides guest write persistence | ||
68 | - on non-NVDIMM host storage. | ||
69 | +NVDIMM emulation on regular (i.e. non-NVDIMM) host storage does not | ||
70 | +persist the guest writes as there are no defined semantics in the device | ||
71 | +specification. The virtio pmem device provides guest write persistence | ||
72 | +on non-NVDIMM host storage. | ||
73 | |||
74 | virtio pmem usage | ||
75 | ----------------- | ||
76 | |||
77 | - A virtio pmem device backed by a memory-backend-file can be created on | ||
78 | - the QEMU command line as in the following example:: | ||
79 | +A virtio pmem device backed by a memory-backend-file can be created on | ||
80 | +the QEMU command line as in the following example:: | ||
81 | |||
82 | -object memory-backend-file,id=mem1,share,mem-path=./virtio_pmem.img,size=4G | ||
83 | -device virtio-pmem-pci,memdev=mem1,id=nv1 | ||
84 | |||
85 | - where: | ||
86 | +where: | ||
87 | |||
88 | - "object memory-backend-file,id=mem1,share,mem-path=<image>, size=<image size>" | ||
89 | creates a backend file with the specified size. | ||
90 | @@ -XXX,XX +XXX,XX @@ virtio pmem usage | ||
91 | - "device virtio-pmem-pci,id=nvdimm1,memdev=mem1" creates a virtio pmem | ||
92 | pci device whose storage is provided by above memory backend device. | ||
93 | |||
94 | - Multiple virtio pmem devices can be created if multiple pairs of "-object" | ||
95 | - and "-device" are provided. | ||
96 | +Multiple virtio pmem devices can be created if multiple pairs of "-object" | ||
97 | +and "-device" are provided. | ||
98 | |||
99 | Hotplug | ||
100 | ------- | ||
101 | @@ -XXX,XX +XXX,XX @@ the guest:: | ||
102 | Guest Data Persistence | ||
103 | ---------------------- | ||
104 | |||
105 | - Guest data persistence on non-NVDIMM requires guest userspace applications | ||
106 | - to perform fsync/msync. This is different from a real nvdimm backend where | ||
107 | - no additional fsync/msync is required. This is to persist guest writes in | ||
108 | - host backing file which otherwise remains in host page cache and there is | ||
109 | - risk of losing the data in case of power failure. | ||
110 | +Guest data persistence on non-NVDIMM requires guest userspace applications | ||
111 | +to perform fsync/msync. This is different from a real nvdimm backend where | ||
112 | +no additional fsync/msync is required. This is to persist guest writes in | ||
113 | +host backing file which otherwise remains in host page cache and there is | ||
114 | +risk of losing the data in case of power failure. | ||
115 | |||
116 | - With virtio pmem device, MAP_SYNC mmap flag is not supported. This provides | ||
117 | - a hint to application to perform fsync for write persistence. | ||
118 | +With virtio pmem device, MAP_SYNC mmap flag is not supported. This provides | ||
119 | +a hint to application to perform fsync for write persistence. | ||
120 | |||
121 | Limitations | ||
122 | ------------- | ||
123 | +----------- | ||
124 | + | ||
125 | - Real nvdimm device backend is not supported. | ||
126 | - virtio pmem hotunplug is not supported. | ||
127 | - ACPI NVDIMM features like regions/namespaces are not supported. | ||
36 | -- | 128 | -- |
37 | 2.18.0 | 129 | 2.20.1 |
38 | 130 | ||
39 | 131 | diff view generated by jsdifflib |
1 | One of the required effects of setting HCR_EL2.TGE is that when | 1 | Currently target-i386.rst includes the documentation of the 'pc' |
---|---|---|---|
2 | SCR_EL3.NS is 1 then SCTLR_EL1.M must behave as if it is zero for | 2 | machine model inline. Split it out into its own file, in a |
3 | all purposes except direct reads. That is, it effectively disables | 3 | similar way to target-i386.rst; this gives us a place to put |
4 | the MMU for the NS EL0/EL1 translation regime. | 4 | documentation of other i386 machine models, such as 'microvm'. |
5 | 5 | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 7 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> |
8 | Message-id: 20180724115950.17316-6-peter.maydell@linaro.org | ||
9 | --- | 8 | --- |
10 | target/arm/helper.c | 8 ++++++++ | 9 | docs/system/i386/pc.rst | 7 +++++++ |
11 | 1 file changed, 8 insertions(+) | 10 | docs/system/target-i386.rst | 18 +++++++++++++----- |
11 | 2 files changed, 20 insertions(+), 5 deletions(-) | ||
12 | create mode 100644 docs/system/i386/pc.rst | ||
12 | 13 | ||
13 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 14 | diff --git a/docs/system/i386/pc.rst b/docs/system/i386/pc.rst |
15 | new file mode 100644 | ||
16 | index XXXXXXX..XXXXXXX | ||
17 | --- /dev/null | ||
18 | +++ b/docs/system/i386/pc.rst | ||
19 | @@ -XXX,XX +XXX,XX @@ | ||
20 | +i440fx PC (``pc-i440fx``, ``pc``) | ||
21 | +================================= | ||
22 | + | ||
23 | +Peripherals | ||
24 | +~~~~~~~~~~~ | ||
25 | + | ||
26 | +.. include:: ../target-i386-desc.rst.inc | ||
27 | diff --git a/docs/system/target-i386.rst b/docs/system/target-i386.rst | ||
14 | index XXXXXXX..XXXXXXX 100644 | 28 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/target/arm/helper.c | 29 | --- a/docs/system/target-i386.rst |
16 | +++ b/target/arm/helper.c | 30 | +++ b/docs/system/target-i386.rst |
17 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_translation_disabled(CPUARMState *env, | 31 | @@ -XXX,XX +XXX,XX @@ |
18 | if (mmu_idx == ARMMMUIdx_S2NS) { | 32 | .. _QEMU-PC-System-emulator: |
19 | return (env->cp15.hcr_el2 & HCR_VM) == 0; | 33 | |
20 | } | 34 | -x86 (PC) System emulator |
35 | ------------------------- | ||
36 | +x86 System emulator | ||
37 | +------------------- | ||
38 | |||
39 | .. _pcsys_005fdevices: | ||
40 | |||
41 | -Peripherals | ||
42 | -~~~~~~~~~~~ | ||
43 | +Board-specific documentation | ||
44 | +~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
45 | |||
46 | -.. include:: target-i386-desc.rst.inc | ||
47 | +.. | ||
48 | + This table of contents should be kept sorted alphabetically | ||
49 | + by the title text of each file, which isn't the same ordering | ||
50 | + as an alphabetical sort by filename. | ||
21 | + | 51 | + |
22 | + if (env->cp15.hcr_el2 & HCR_TGE) { | 52 | +.. toctree:: |
23 | + /* TGE means that NS EL0/1 act as if SCTLR_EL1.M is zero */ | 53 | + :maxdepth: 1 |
24 | + if (!regime_is_secure(env, mmu_idx) && regime_el(env, mmu_idx) == 1) { | ||
25 | + return true; | ||
26 | + } | ||
27 | + } | ||
28 | + | 54 | + |
29 | return (regime_sctlr(env, mmu_idx) & SCTLR_M) == 0; | 55 | + i386/pc |
30 | } | 56 | |
57 | .. include:: cpu-models-x86.rst.inc | ||
31 | 58 | ||
32 | -- | 59 | -- |
33 | 2.18.0 | 60 | 2.20.1 |
34 | 61 | ||
35 | 62 | diff view generated by jsdifflib |
1 | Improve the exception-taken logging by logging in | 1 | Now that target-i386.rst has a place to list documentation of |
---|---|---|---|
2 | v7m_exception_taken() the exception we're going to take | 2 | machines other than the 'pc' machine, we have a place we can |
3 | and whether it is secure/nonsecure. | 3 | move the microvm documentation to. |
4 | |||
5 | This requires us to move logging at many callsites from after the | ||
6 | call to before it, so that the logging appears in a sensible order. | ||
7 | |||
8 | (This will make tail-chaining produce more useful logs; for the | ||
9 | current callers of v7m_exception_taken() we know which exception | ||
10 | we're going to take, so custom log messages at the callsite sufficed; | ||
11 | for tail-chaining only v7m_exception_taken() knows the exception | ||
12 | number that we're going to tail-chain to.) | ||
13 | 4 | ||
14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
15 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 6 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> |
16 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
17 | Message-id: 20180720145647.8810-2-peter.maydell@linaro.org | ||
18 | --- | 7 | --- |
19 | target/arm/helper.c | 17 +++++++++++------ | 8 | docs/{ => system/i386}/microvm.rst | 5 ++--- |
20 | 1 file changed, 11 insertions(+), 6 deletions(-) | 9 | docs/system/target-i386.rst | 1 + |
10 | 2 files changed, 3 insertions(+), 3 deletions(-) | ||
11 | rename docs/{ => system/i386}/microvm.rst (98%) | ||
21 | 12 | ||
22 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 13 | diff --git a/docs/microvm.rst b/docs/system/i386/microvm.rst |
14 | similarity index 98% | ||
15 | rename from docs/microvm.rst | ||
16 | rename to docs/system/i386/microvm.rst | ||
23 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
24 | --- a/target/arm/helper.c | 18 | --- a/docs/microvm.rst |
25 | +++ b/target/arm/helper.c | 19 | +++ b/docs/system/i386/microvm.rst |
26 | @@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain, | 20 | @@ -XXX,XX +XXX,XX @@ |
27 | bool push_failed = false; | 21 | -==================== |
28 | 22 | -microvm Machine Type | |
29 | armv7m_nvic_get_pending_irq_info(env->nvic, &exc, &targets_secure); | 23 | -==================== |
30 | + qemu_log_mask(CPU_LOG_INT, "...taking pending %s exception %d\n", | 24 | +'microvm' virtual platform (``microvm``) |
31 | + targets_secure ? "secure" : "nonsecure", exc); | 25 | +======================================== |
32 | 26 | ||
33 | if (arm_feature(env, ARM_FEATURE_V8)) { | 27 | ``microvm`` is a machine type inspired by ``Firecracker`` and |
34 | if (arm_feature(env, ARM_FEATURE_M_SECURITY) && | 28 | constructed after its machine model. |
35 | @@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain, | 29 | diff --git a/docs/system/target-i386.rst b/docs/system/target-i386.rst |
36 | * we might now want to take a different exception which | 30 | index XXXXXXX..XXXXXXX 100644 |
37 | * targets a different security state, so try again from the top. | 31 | --- a/docs/system/target-i386.rst |
38 | */ | 32 | +++ b/docs/system/target-i386.rst |
39 | + qemu_log_mask(CPU_LOG_INT, | 33 | @@ -XXX,XX +XXX,XX @@ Board-specific documentation |
40 | + "...derived exception on callee-saves register stacking"); | 34 | .. toctree:: |
41 | v7m_exception_taken(cpu, lr, true, true); | 35 | :maxdepth: 1 |
42 | return; | 36 | |
43 | } | 37 | + i386/microvm |
44 | 38 | i386/pc | |
45 | if (!arm_v7m_load_vector(cpu, exc, targets_secure, &addr)) { | 39 | |
46 | /* Vector load failed: derived exception */ | 40 | .. include:: cpu-models-x86.rst.inc |
47 | + qemu_log_mask(CPU_LOG_INT, "...derived exception on vector table load"); | ||
48 | v7m_exception_taken(cpu, lr, true, true); | ||
49 | return; | ||
50 | } | ||
51 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
52 | if (sfault) { | ||
53 | env->v7m.sfsr |= R_V7M_SFSR_INVER_MASK; | ||
54 | armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_SECURE, false); | ||
55 | - v7m_exception_taken(cpu, excret, true, false); | ||
56 | qemu_log_mask(CPU_LOG_INT, "...taking SecureFault on existing " | ||
57 | "stackframe: failed EXC_RETURN.ES validity check\n"); | ||
58 | + v7m_exception_taken(cpu, excret, true, false); | ||
59 | return; | ||
60 | } | ||
61 | |||
62 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
63 | */ | ||
64 | env->v7m.cfsr[env->v7m.secure] |= R_V7M_CFSR_INVPC_MASK; | ||
65 | armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE, env->v7m.secure); | ||
66 | - v7m_exception_taken(cpu, excret, true, false); | ||
67 | qemu_log_mask(CPU_LOG_INT, "...taking UsageFault on existing " | ||
68 | "stackframe: failed exception return integrity check\n"); | ||
69 | + v7m_exception_taken(cpu, excret, true, false); | ||
70 | return; | ||
71 | } | ||
72 | |||
73 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
74 | /* Take a SecureFault on the current stack */ | ||
75 | env->v7m.sfsr |= R_V7M_SFSR_INVIS_MASK; | ||
76 | armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_SECURE, false); | ||
77 | - v7m_exception_taken(cpu, excret, true, false); | ||
78 | qemu_log_mask(CPU_LOG_INT, "...taking SecureFault on existing " | ||
79 | "stackframe: failed exception return integrity " | ||
80 | "signature check\n"); | ||
81 | + v7m_exception_taken(cpu, excret, true, false); | ||
82 | return; | ||
83 | } | ||
84 | |||
85 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
86 | /* v7m_stack_read() pended a fault, so take it (as a tail | ||
87 | * chained exception on the same stack frame) | ||
88 | */ | ||
89 | + qemu_log_mask(CPU_LOG_INT, "...derived exception on unstacking\n"); | ||
90 | v7m_exception_taken(cpu, excret, true, false); | ||
91 | return; | ||
92 | } | ||
93 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
94 | armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE, | ||
95 | env->v7m.secure); | ||
96 | env->v7m.cfsr[env->v7m.secure] |= R_V7M_CFSR_INVPC_MASK; | ||
97 | - v7m_exception_taken(cpu, excret, true, false); | ||
98 | qemu_log_mask(CPU_LOG_INT, "...taking UsageFault on existing " | ||
99 | "stackframe: failed exception return integrity " | ||
100 | "check\n"); | ||
101 | + v7m_exception_taken(cpu, excret, true, false); | ||
102 | return; | ||
103 | } | ||
104 | } | ||
105 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
106 | armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE, false); | ||
107 | env->v7m.cfsr[env->v7m.secure] |= R_V7M_CFSR_INVPC_MASK; | ||
108 | ignore_stackfaults = v7m_push_stack(cpu); | ||
109 | - v7m_exception_taken(cpu, excret, false, ignore_stackfaults); | ||
110 | qemu_log_mask(CPU_LOG_INT, "...taking UsageFault on new stackframe: " | ||
111 | "failed exception return integrity check\n"); | ||
112 | + v7m_exception_taken(cpu, excret, false, ignore_stackfaults); | ||
113 | return; | ||
114 | } | ||
115 | |||
116 | @@ -XXX,XX +XXX,XX @@ void arm_v7m_cpu_do_interrupt(CPUState *cs) | ||
117 | |||
118 | ignore_stackfaults = v7m_push_stack(cpu); | ||
119 | v7m_exception_taken(cpu, lr, false, ignore_stackfaults); | ||
120 | - qemu_log_mask(CPU_LOG_INT, "... as %d\n", env->v7m.exception); | ||
121 | } | ||
122 | |||
123 | /* Function used to synchronize QEMU's AArch64 register set with AArch32 | ||
124 | -- | 41 | -- |
125 | 2.18.0 | 42 | 2.20.1 |
126 | 43 | ||
127 | 44 | diff view generated by jsdifflib |
1 | Whene we raise a synchronous exception, if HCR_EL2.TGE is set then | 1 | Move the pr-manager documentation into the system manual. |
---|---|---|---|
2 | exceptions targeting NS EL1 must be redirected to EL2. Implement | 2 | Some of it (the documentation of the pr-manager-helper tool) |
3 | this in raise_exception() -- all synchronous exceptions go through | 3 | should be in tools, but we will split it up after moving it. |
4 | this function. | ||
5 | |||
6 | (Asynchronous exceptions go via arm_cpu_exec_interrupt(), which | ||
7 | already honours HCR_EL2.TGE when it determines the target EL | ||
8 | in arm_phys_excp_target_el().) | ||
9 | 4 | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 6 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> |
12 | Message-id: 20180724115950.17316-4-peter.maydell@linaro.org | ||
13 | --- | 7 | --- |
14 | target/arm/op_helper.c | 14 ++++++++++++++ | 8 | docs/system/index.rst | 1 + |
15 | 1 file changed, 14 insertions(+) | 9 | docs/{ => system}/pr-manager.rst | 0 |
10 | 2 files changed, 1 insertion(+) | ||
11 | rename docs/{ => system}/pr-manager.rst (100%) | ||
16 | 12 | ||
17 | diff --git a/target/arm/op_helper.c b/target/arm/op_helper.c | 13 | diff --git a/docs/system/index.rst b/docs/system/index.rst |
18 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
19 | --- a/target/arm/op_helper.c | 15 | --- a/docs/system/index.rst |
20 | +++ b/target/arm/op_helper.c | 16 | +++ b/docs/system/index.rst |
21 | @@ -XXX,XX +XXX,XX @@ static void raise_exception(CPUARMState *env, uint32_t excp, | 17 | @@ -XXX,XX +XXX,XX @@ Contents: |
22 | { | 18 | managed-startup |
23 | CPUState *cs = CPU(arm_env_get_cpu(env)); | 19 | cpu-hotplug |
24 | 20 | virtio-pmem | |
25 | + if ((env->cp15.hcr_el2 & HCR_TGE) && | 21 | + pr-manager |
26 | + target_el == 1 && !arm_is_secure(env)) { | 22 | targets |
27 | + /* | 23 | security |
28 | + * Redirect NS EL1 exceptions to NS EL2. These are reported with | 24 | deprecated |
29 | + * their original syndrome register value, with the exception of | 25 | diff --git a/docs/pr-manager.rst b/docs/system/pr-manager.rst |
30 | + * SIMD/FP access traps, which are reported as uncategorized | 26 | similarity index 100% |
31 | + * (see DDI0478C.a D1.10.4) | 27 | rename from docs/pr-manager.rst |
32 | + */ | 28 | rename to docs/system/pr-manager.rst |
33 | + target_el = 2; | ||
34 | + if (syndrome >> ARM_EL_EC_SHIFT == EC_ADVSIMDFPACCESSTRAP) { | ||
35 | + syndrome = syn_uncategorized(); | ||
36 | + } | ||
37 | + } | ||
38 | + | ||
39 | assert(!excp_is_internal(excp)); | ||
40 | cs->exception_index = excp; | ||
41 | env->exception.syndrome = syndrome; | ||
42 | -- | 29 | -- |
43 | 2.18.0 | 30 | 2.20.1 |
44 | 31 | ||
45 | 32 | diff view generated by jsdifflib |
1 | If get_page_addr_code() returns -1, this indicates that there is no RAM | 1 | Split the documentation of the qemu-pr-helper binary into the tools |
---|---|---|---|
2 | page we can read a full TB from. Instead we must create a TB which | 2 | manual, and give it a manpage like our other standalone executables. |
3 | contains a single instruction and which we do not cache, so it is | ||
4 | executed only once. | ||
5 | |||
6 | Since this means we can now have TBs which are not in any page list, | ||
7 | we also need to make tb_phys_invalidate() handle them (by not trying | ||
8 | to remove them from a nonexistent page list). | ||
9 | 3 | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 5 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> |
12 | Reviewed-by: Emilio G. Cota <cota@braap.org> | ||
13 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
14 | Message-id: 20180710160013.26559-5-peter.maydell@linaro.org | ||
15 | --- | 6 | --- |
16 | accel/tcg/translate-all.c | 19 ++++++++++++++++++- | 7 | docs/meson.build | 1 + |
17 | 1 file changed, 18 insertions(+), 1 deletion(-) | 8 | docs/system/pr-manager.rst | 38 ++------------- |
18 | 9 | docs/tools/conf.py | 2 + | |
19 | diff --git a/accel/tcg/translate-all.c b/accel/tcg/translate-all.c | 10 | docs/tools/index.rst | 1 + |
20 | index XXXXXXX..XXXXXXX 100644 | 11 | docs/tools/qemu-pr-helper.rst | 90 +++++++++++++++++++++++++++++++++++ |
21 | --- a/accel/tcg/translate-all.c | 12 | 5 files changed, 99 insertions(+), 33 deletions(-) |
22 | +++ b/accel/tcg/translate-all.c | 13 | create mode 100644 docs/tools/qemu-pr-helper.rst |
23 | @@ -XXX,XX +XXX,XX @@ static void tb_phys_invalidate__locked(TranslationBlock *tb) | 14 | |
24 | */ | 15 | diff --git a/docs/meson.build b/docs/meson.build |
25 | void tb_phys_invalidate(TranslationBlock *tb, tb_page_addr_t page_addr) | 16 | index XXXXXXX..XXXXXXX 100644 |
26 | { | 17 | --- a/docs/meson.build |
27 | - if (page_addr == -1) { | 18 | +++ b/docs/meson.build |
28 | + if (page_addr == -1 && tb->page_addr[0] != -1) { | 19 | @@ -XXX,XX +XXX,XX @@ if build_docs |
29 | page_lock_tb(tb); | 20 | 'tools': { |
30 | do_tb_phys_invalidate(tb, true); | 21 | 'qemu-img.1': (have_tools ? 'man1' : ''), |
31 | page_unlock_tb(tb); | 22 | 'qemu-nbd.8': (have_tools ? 'man8' : ''), |
32 | @@ -XXX,XX +XXX,XX @@ tb_link_page(TranslationBlock *tb, tb_page_addr_t phys_pc, | 23 | + 'qemu-pr-helper.8': (have_tools ? 'man8' : ''), |
33 | 24 | 'qemu-trace-stap.1': (config_host.has_key('CONFIG_TRACE_SYSTEMTAP') ? 'man1' : ''), | |
34 | assert_memory_lock(); | 25 | 'virtfs-proxy-helper.1': (have_virtfs_proxy_helper ? 'man1' : ''), |
35 | 26 | 'virtiofsd.1': (have_virtiofsd ? 'man1' : ''), | |
36 | + if (phys_pc == -1) { | 27 | diff --git a/docs/system/pr-manager.rst b/docs/system/pr-manager.rst |
37 | + /* | 28 | index XXXXXXX..XXXXXXX 100644 |
38 | + * If the TB is not associated with a physical RAM page then | 29 | --- a/docs/system/pr-manager.rst |
39 | + * it must be a temporary one-insn TB, and we have nothing to do | 30 | +++ b/docs/system/pr-manager.rst |
40 | + * except fill in the page_addr[] fields. | 31 | @@ -XXX,XX +XXX,XX @@ Alternatively, using ``-blockdev``:: |
41 | + */ | 32 | -blockdev node-name=hd,driver=raw,file.driver=host_device,file.filename=/dev/sdb,file.pr-manager=helper0 |
42 | + assert(tb->cflags & CF_NOCACHE); | 33 | -device scsi-block,drive=hd |
43 | + tb->page_addr[0] = tb->page_addr[1] = -1; | 34 | |
44 | + return tb; | 35 | ----------------------------------- |
45 | + } | 36 | -Invoking :program:`qemu-pr-helper` |
46 | + | 37 | ----------------------------------- |
47 | /* | 38 | - |
48 | * Add the TB to the page list, acquiring first the pages's locks. | 39 | -QEMU provides an implementation of the persistent reservation helper, |
49 | * We keep the locks held until after inserting the TB in the hash table, | 40 | -called :program:`qemu-pr-helper`. The helper should be started as a |
50 | @@ -XXX,XX +XXX,XX @@ TranslationBlock *tb_gen_code(CPUState *cpu, | 41 | -system service and supports the following option: |
51 | 42 | - | |
52 | phys_pc = get_page_addr_code(env, pc); | 43 | --d, --daemon run in the background |
53 | 44 | --q, --quiet decrease verbosity | |
54 | + if (phys_pc == -1) { | 45 | --v, --verbose increase verbosity |
55 | + /* Generate a temporary TB with 1 insn in it */ | 46 | --f, --pidfile=path PID file when running as a daemon |
56 | + cflags &= ~CF_COUNT_MASK; | 47 | --k, --socket=path path to the socket |
57 | + cflags |= CF_NOCACHE | 1; | 48 | --T, --trace=trace-opts tracing options |
58 | + } | 49 | - |
59 | + | 50 | -By default, the socket and PID file are placed in the runtime state |
60 | buffer_overflow: | 51 | -directory, for example :file:`/var/run/qemu-pr-helper.sock` and |
61 | tb = tb_alloc(pc); | 52 | -:file:`/var/run/qemu-pr-helper.pid`. The PID file is not created |
62 | if (unlikely(!tb)) { | 53 | -unless :option:`-d` is passed too. |
54 | - | ||
55 | -:program:`qemu-pr-helper` can also use the systemd socket activation | ||
56 | -protocol. In this case, the systemd socket unit should specify a | ||
57 | -Unix stream socket, like this:: | ||
58 | - | ||
59 | - [Socket] | ||
60 | - ListenStream=/var/run/qemu-pr-helper.sock | ||
61 | - | ||
62 | -After connecting to the socket, :program:`qemu-pr-helper`` can optionally drop | ||
63 | -root privileges, except for those capabilities that are needed for | ||
64 | -its operation. To do this, add the following options: | ||
65 | - | ||
66 | --u, --user=user user to drop privileges to | ||
67 | --g, --group=group group to drop privileges to | ||
68 | +You will also need to ensure that the helper program | ||
69 | +:command:`qemu-pr-helper` is running, and that it has been | ||
70 | +set up to use the same socket filename as your QEMU commandline | ||
71 | +specifies. See the qemu-pr-helper documentation or manpage for | ||
72 | +further details. | ||
73 | |||
74 | --------------------------------------------- | ||
75 | Multipath devices and persistent reservations | ||
76 | diff --git a/docs/tools/conf.py b/docs/tools/conf.py | ||
77 | index XXXXXXX..XXXXXXX 100644 | ||
78 | --- a/docs/tools/conf.py | ||
79 | +++ b/docs/tools/conf.py | ||
80 | @@ -XXX,XX +XXX,XX @@ man_pages = [ | ||
81 | ['Fabrice Bellard'], 1), | ||
82 | ('qemu-nbd', 'qemu-nbd', u'QEMU Disk Network Block Device Server', | ||
83 | ['Anthony Liguori <anthony@codemonkey.ws>'], 8), | ||
84 | + ('qemu-pr-helper', 'qemu-pr-helper', 'QEMU persistent reservation helper', | ||
85 | + [], 8), | ||
86 | ('qemu-trace-stap', 'qemu-trace-stap', u'QEMU SystemTap trace tool', | ||
87 | [], 1), | ||
88 | ('virtfs-proxy-helper', 'virtfs-proxy-helper', | ||
89 | diff --git a/docs/tools/index.rst b/docs/tools/index.rst | ||
90 | index XXXXXXX..XXXXXXX 100644 | ||
91 | --- a/docs/tools/index.rst | ||
92 | +++ b/docs/tools/index.rst | ||
93 | @@ -XXX,XX +XXX,XX @@ Contents: | ||
94 | |||
95 | qemu-img | ||
96 | qemu-nbd | ||
97 | + qemu-pr-helper | ||
98 | qemu-trace-stap | ||
99 | virtfs-proxy-helper | ||
100 | virtiofsd | ||
101 | diff --git a/docs/tools/qemu-pr-helper.rst b/docs/tools/qemu-pr-helper.rst | ||
102 | new file mode 100644 | ||
103 | index XXXXXXX..XXXXXXX | ||
104 | --- /dev/null | ||
105 | +++ b/docs/tools/qemu-pr-helper.rst | ||
106 | @@ -XXX,XX +XXX,XX @@ | ||
107 | +QEMU persistent reservation helper | ||
108 | +================================== | ||
109 | + | ||
110 | +Synopsis | ||
111 | +-------- | ||
112 | + | ||
113 | +**qemu-pr-helper** [*OPTION*] | ||
114 | + | ||
115 | +Description | ||
116 | +----------- | ||
117 | + | ||
118 | +Implements the persistent reservation helper for QEMU. | ||
119 | + | ||
120 | +SCSI persistent reservations allow restricting access to block devices | ||
121 | +to specific initiators in a shared storage setup. When implementing | ||
122 | +clustering of virtual machines, it is a common requirement for virtual | ||
123 | +machines to send persistent reservation SCSI commands. However, | ||
124 | +the operating system restricts sending these commands to unprivileged | ||
125 | +programs because incorrect usage can disrupt regular operation of the | ||
126 | +storage fabric. QEMU's SCSI passthrough devices ``scsi-block`` | ||
127 | +and ``scsi-generic`` support passing guest persistent reservation | ||
128 | +requests to a privileged external helper program. :program:`qemu-pr-helper` | ||
129 | +is that external helper; it creates a socket which QEMU can | ||
130 | +connect to to communicate with it. | ||
131 | + | ||
132 | +If you want to run VMs in a setup like this, this helper should be | ||
133 | +started as a system service, and you should read the QEMU manual | ||
134 | +section on "persistent reservation managers" to find out how to | ||
135 | +configure QEMU to connect to the socket created by | ||
136 | +:program:`qemu-pr-helper`. | ||
137 | + | ||
138 | +After connecting to the socket, :program:`qemu-pr-helper` can | ||
139 | +optionally drop root privileges, except for those capabilities that | ||
140 | +are needed for its operation. | ||
141 | + | ||
142 | +:program:`qemu-pr-helper` can also use the systemd socket activation | ||
143 | +protocol. In this case, the systemd socket unit should specify a | ||
144 | +Unix stream socket, like this:: | ||
145 | + | ||
146 | + [Socket] | ||
147 | + ListenStream=/var/run/qemu-pr-helper.sock | ||
148 | + | ||
149 | +Options | ||
150 | +------- | ||
151 | + | ||
152 | +.. program:: qemu-pr-helper | ||
153 | + | ||
154 | +.. option:: -d, --daemon | ||
155 | + | ||
156 | + run in the background (and create a PID file) | ||
157 | + | ||
158 | +.. option:: -q, --quiet | ||
159 | + | ||
160 | + decrease verbosity | ||
161 | + | ||
162 | +.. option:: -v, --verbose | ||
163 | + | ||
164 | + increase verbosity | ||
165 | + | ||
166 | +.. option:: -f, --pidfile=PATH | ||
167 | + | ||
168 | + PID file when running as a daemon. By default the PID file | ||
169 | + is created in the system runtime state directory, for example | ||
170 | + :file:`/var/run/qemu-pr-helper.pid`. | ||
171 | + | ||
172 | +.. option:: -k, --socket=PATH | ||
173 | + | ||
174 | + path to the socket. By default the socket is created in | ||
175 | + the system runtime state directory, for example | ||
176 | + :file:`/var/run/qemu-pr-helper.sock`. | ||
177 | + | ||
178 | +.. option:: -T, --trace [[enable=]PATTERN][,events=FILE][,file=FILE] | ||
179 | + | ||
180 | + .. include:: ../qemu-option-trace.rst.inc | ||
181 | + | ||
182 | +.. option:: -u, --user=USER | ||
183 | + | ||
184 | + user to drop privileges to | ||
185 | + | ||
186 | +.. option:: -g, --group=GROUP | ||
187 | + | ||
188 | + group to drop privileges to | ||
189 | + | ||
190 | +.. option:: -h, --help | ||
191 | + | ||
192 | + Display a help message and exit. | ||
193 | + | ||
194 | +.. option:: -V, --version | ||
195 | + | ||
196 | + Display version information and exit. | ||
63 | -- | 197 | -- |
64 | 2.18.0 | 198 | 2.20.1 |
65 | 199 | ||
66 | 200 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Now that all the callers can handle get_page_addr_code() returning -1, | ||
2 | remove all the code which tries to handle execution from MMIO regions | ||
3 | or small-MMU-region RAM areas. This will mean that we can correctly | ||
4 | execute from these areas, rather than ending up either aborting QEMU | ||
5 | or delivering an incorrect guest exception. | ||
6 | 1 | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
10 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
11 | Tested-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
12 | Message-id: 20180710160013.26559-6-peter.maydell@linaro.org | ||
13 | --- | ||
14 | accel/tcg/cputlb.c | 95 +++++----------------------------------------- | ||
15 | 1 file changed, 10 insertions(+), 85 deletions(-) | ||
16 | |||
17 | diff --git a/accel/tcg/cputlb.c b/accel/tcg/cputlb.c | ||
18 | index XXXXXXX..XXXXXXX 100644 | ||
19 | --- a/accel/tcg/cputlb.c | ||
20 | +++ b/accel/tcg/cputlb.c | ||
21 | @@ -XXX,XX +XXX,XX @@ void tlb_set_page(CPUState *cpu, target_ulong vaddr, | ||
22 | prot, mmu_idx, size); | ||
23 | } | ||
24 | |||
25 | -static void report_bad_exec(CPUState *cpu, target_ulong addr) | ||
26 | -{ | ||
27 | - /* Accidentally executing outside RAM or ROM is quite common for | ||
28 | - * several user-error situations, so report it in a way that | ||
29 | - * makes it clear that this isn't a QEMU bug and provide suggestions | ||
30 | - * about what a user could do to fix things. | ||
31 | - */ | ||
32 | - error_report("Trying to execute code outside RAM or ROM at 0x" | ||
33 | - TARGET_FMT_lx, addr); | ||
34 | - error_printf("This usually means one of the following happened:\n\n" | ||
35 | - "(1) You told QEMU to execute a kernel for the wrong machine " | ||
36 | - "type, and it crashed on startup (eg trying to run a " | ||
37 | - "raspberry pi kernel on a versatilepb QEMU machine)\n" | ||
38 | - "(2) You didn't give QEMU a kernel or BIOS filename at all, " | ||
39 | - "and QEMU executed a ROM full of no-op instructions until " | ||
40 | - "it fell off the end\n" | ||
41 | - "(3) Your guest kernel has a bug and crashed by jumping " | ||
42 | - "off into nowhere\n\n" | ||
43 | - "This is almost always one of the first two, so check your " | ||
44 | - "command line and that you are using the right type of kernel " | ||
45 | - "for this machine.\n" | ||
46 | - "If you think option (3) is likely then you can try debugging " | ||
47 | - "your guest with the -d debug options; in particular " | ||
48 | - "-d guest_errors will cause the log to include a dump of the " | ||
49 | - "guest register state at this point.\n\n" | ||
50 | - "Execution cannot continue; stopping here.\n\n"); | ||
51 | - | ||
52 | - /* Report also to the logs, with more detail including register dump */ | ||
53 | - qemu_log_mask(LOG_GUEST_ERROR, "qemu: fatal: Trying to execute code " | ||
54 | - "outside RAM or ROM at 0x" TARGET_FMT_lx "\n", addr); | ||
55 | - log_cpu_state_mask(LOG_GUEST_ERROR, cpu, CPU_DUMP_FPU | CPU_DUMP_CCOP); | ||
56 | -} | ||
57 | - | ||
58 | static inline ram_addr_t qemu_ram_addr_from_host_nofail(void *ptr) | ||
59 | { | ||
60 | ram_addr_t ram_addr; | ||
61 | @@ -XXX,XX +XXX,XX @@ tb_page_addr_t get_page_addr_code(CPUArchState *env, target_ulong addr) | ||
62 | MemoryRegionSection *section; | ||
63 | CPUState *cpu = ENV_GET_CPU(env); | ||
64 | CPUIOTLBEntry *iotlbentry; | ||
65 | - hwaddr physaddr, mr_offset; | ||
66 | |||
67 | index = (addr >> TARGET_PAGE_BITS) & (CPU_TLB_SIZE - 1); | ||
68 | mmu_idx = cpu_mmu_index(env, true); | ||
69 | @@ -XXX,XX +XXX,XX @@ tb_page_addr_t get_page_addr_code(CPUArchState *env, target_ulong addr) | ||
70 | if (unlikely(env->tlb_table[mmu_idx][index].addr_code & TLB_RECHECK)) { | ||
71 | /* | ||
72 | * This is a TLB_RECHECK access, where the MMU protection | ||
73 | - * covers a smaller range than a target page, and we must | ||
74 | - * repeat the MMU check here. This tlb_fill() call might | ||
75 | - * longjump out if this access should cause a guest exception. | ||
76 | - */ | ||
77 | - int index; | ||
78 | - target_ulong tlb_addr; | ||
79 | - | ||
80 | - tlb_fill(cpu, addr, 0, MMU_INST_FETCH, mmu_idx, 0); | ||
81 | - | ||
82 | - index = (addr >> TARGET_PAGE_BITS) & (CPU_TLB_SIZE - 1); | ||
83 | - tlb_addr = env->tlb_table[mmu_idx][index].addr_code; | ||
84 | - if (!(tlb_addr & ~(TARGET_PAGE_MASK | TLB_RECHECK))) { | ||
85 | - /* RAM access. We can't handle this, so for now just stop */ | ||
86 | - cpu_abort(cpu, "Unable to handle guest executing from RAM within " | ||
87 | - "a small MPU region at 0x" TARGET_FMT_lx, addr); | ||
88 | - } | ||
89 | - /* | ||
90 | - * Fall through to handle IO accesses (which will almost certainly | ||
91 | - * also result in failure) | ||
92 | + * covers a smaller range than a target page. Return -1 to | ||
93 | + * indicate that we cannot simply execute from RAM here; | ||
94 | + * we will perform the necessary repeat of the MMU check | ||
95 | + * when the "execute a single insn" code performs the | ||
96 | + * load of the guest insn. | ||
97 | */ | ||
98 | + return -1; | ||
99 | } | ||
100 | |||
101 | iotlbentry = &env->iotlb[mmu_idx][index]; | ||
102 | section = iotlb_to_section(cpu, iotlbentry->addr, iotlbentry->attrs); | ||
103 | mr = section->mr; | ||
104 | if (memory_region_is_unassigned(mr)) { | ||
105 | - qemu_mutex_lock_iothread(); | ||
106 | - if (memory_region_request_mmio_ptr(mr, addr)) { | ||
107 | - qemu_mutex_unlock_iothread(); | ||
108 | - /* A MemoryRegion is potentially added so re-run the | ||
109 | - * get_page_addr_code. | ||
110 | - */ | ||
111 | - return get_page_addr_code(env, addr); | ||
112 | - } | ||
113 | - qemu_mutex_unlock_iothread(); | ||
114 | - | ||
115 | - /* Give the new-style cpu_transaction_failed() hook first chance | ||
116 | - * to handle this. | ||
117 | - * This is not the ideal place to detect and generate CPU | ||
118 | - * exceptions for instruction fetch failure (for instance | ||
119 | - * we don't know the length of the access that the CPU would | ||
120 | - * use, and it would be better to go ahead and try the access | ||
121 | - * and use the MemTXResult it produced). However it is the | ||
122 | - * simplest place we have currently available for the check. | ||
123 | + /* | ||
124 | + * Not guest RAM, so there is no ram_addr_t for it. Return -1, | ||
125 | + * and we will execute a single insn from this device. | ||
126 | */ | ||
127 | - mr_offset = (iotlbentry->addr & TARGET_PAGE_MASK) + addr; | ||
128 | - physaddr = mr_offset + | ||
129 | - section->offset_within_address_space - | ||
130 | - section->offset_within_region; | ||
131 | - cpu_transaction_failed(cpu, physaddr, addr, 0, MMU_INST_FETCH, mmu_idx, | ||
132 | - iotlbentry->attrs, MEMTX_DECODE_ERROR, 0); | ||
133 | - | ||
134 | - cpu_unassigned_access(cpu, addr, false, true, 0, 4); | ||
135 | - /* The CPU's unassigned access hook might have longjumped out | ||
136 | - * with an exception. If it didn't (or there was no hook) then | ||
137 | - * we can't proceed further. | ||
138 | - */ | ||
139 | - report_bad_exec(cpu, addr); | ||
140 | - exit(1); | ||
141 | + return -1; | ||
142 | } | ||
143 | p = (void *)((uintptr_t)addr + env->tlb_table[mmu_idx][index].addend); | ||
144 | return qemu_ram_addr_from_host_nofail(p); | ||
145 | -- | ||
146 | 2.18.0 | ||
147 | |||
148 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Now that we have full support for small regions, including execution, | ||
2 | we can remove the workarounds where we marked all small regions as | ||
3 | non-executable for the M-profile MPU and SAU. | ||
4 | 1 | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
7 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
8 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
9 | Tested-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
10 | Message-id: 20180710160013.26559-7-peter.maydell@linaro.org | ||
11 | --- | ||
12 | target/arm/helper.c | 23 ----------------------- | ||
13 | 1 file changed, 23 deletions(-) | ||
14 | |||
15 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
16 | index XXXXXXX..XXXXXXX 100644 | ||
17 | --- a/target/arm/helper.c | ||
18 | +++ b/target/arm/helper.c | ||
19 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav7(CPUARMState *env, uint32_t address, | ||
20 | |||
21 | fi->type = ARMFault_Permission; | ||
22 | fi->level = 1; | ||
23 | - /* | ||
24 | - * Core QEMU code can't handle execution from small pages yet, so | ||
25 | - * don't try it. This way we'll get an MPU exception, rather than | ||
26 | - * eventually causing QEMU to exit in get_page_addr_code(). | ||
27 | - */ | ||
28 | - if (*page_size < TARGET_PAGE_SIZE && (*prot & PAGE_EXEC)) { | ||
29 | - qemu_log_mask(LOG_UNIMP, | ||
30 | - "MPU: No support for execution from regions " | ||
31 | - "smaller than 1K\n"); | ||
32 | - *prot &= ~PAGE_EXEC; | ||
33 | - } | ||
34 | return !(*prot & (1 << access_type)); | ||
35 | } | ||
36 | |||
37 | @@ -XXX,XX +XXX,XX @@ static bool pmsav8_mpu_lookup(CPUARMState *env, uint32_t address, | ||
38 | |||
39 | fi->type = ARMFault_Permission; | ||
40 | fi->level = 1; | ||
41 | - /* | ||
42 | - * Core QEMU code can't handle execution from small pages yet, so | ||
43 | - * don't try it. This means any attempted execution will generate | ||
44 | - * an MPU exception, rather than eventually causing QEMU to exit in | ||
45 | - * get_page_addr_code(). | ||
46 | - */ | ||
47 | - if (*is_subpage && (*prot & PAGE_EXEC)) { | ||
48 | - qemu_log_mask(LOG_UNIMP, | ||
49 | - "MPU: No support for execution from regions " | ||
50 | - "smaller than 1K\n"); | ||
51 | - *prot &= ~PAGE_EXEC; | ||
52 | - } | ||
53 | return !(*prot & (1 << access_type)); | ||
54 | } | ||
55 | |||
56 | -- | ||
57 | 2.18.0 | ||
58 | |||
59 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | We set up TLB entries in tlb_set_page_with_attrs(), where we have | ||
2 | some logic for determining whether the TLB entry is considered | ||
3 | to be RAM-backed, and thus has a valid addend field. When we | ||
4 | look at the TLB entry in get_page_addr_code(), we use different | ||
5 | logic for determining whether to treat the page as RAM-backed | ||
6 | and use the addend field. This is confusing, and in fact buggy, | ||
7 | because the code in tlb_set_page_with_attrs() correctly decides | ||
8 | that rom_device memory regions not in romd mode are not RAM-backed, | ||
9 | but the code in get_page_addr_code() thinks they are RAM-backed. | ||
10 | This typically results in "Bad ram pointer" assertion if the | ||
11 | guest tries to execute from such a memory region. | ||
12 | 1 | ||
13 | Fix this by making get_page_addr_code() just look at the | ||
14 | TLB_MMIO bit in the code_address field of the TLB, which | ||
15 | tlb_set_page_with_attrs() sets if and only if the addend | ||
16 | field is not valid for code execution. | ||
17 | |||
18 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
19 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
20 | Tested-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
21 | Message-id: 20180713150945.12348-1-peter.maydell@linaro.org | ||
22 | --- | ||
23 | include/exec/exec-all.h | 2 -- | ||
24 | accel/tcg/cputlb.c | 29 ++++++++--------------------- | ||
25 | exec.c | 6 ------ | ||
26 | 3 files changed, 8 insertions(+), 29 deletions(-) | ||
27 | |||
28 | diff --git a/include/exec/exec-all.h b/include/exec/exec-all.h | ||
29 | index XXXXXXX..XXXXXXX 100644 | ||
30 | --- a/include/exec/exec-all.h | ||
31 | +++ b/include/exec/exec-all.h | ||
32 | @@ -XXX,XX +XXX,XX @@ hwaddr memory_region_section_get_iotlb(CPUState *cpu, | ||
33 | hwaddr paddr, hwaddr xlat, | ||
34 | int prot, | ||
35 | target_ulong *address); | ||
36 | -bool memory_region_is_unassigned(MemoryRegion *mr); | ||
37 | - | ||
38 | #endif | ||
39 | |||
40 | /* vl.c */ | ||
41 | diff --git a/accel/tcg/cputlb.c b/accel/tcg/cputlb.c | ||
42 | index XXXXXXX..XXXXXXX 100644 | ||
43 | --- a/accel/tcg/cputlb.c | ||
44 | +++ b/accel/tcg/cputlb.c | ||
45 | @@ -XXX,XX +XXX,XX @@ tb_page_addr_t get_page_addr_code(CPUArchState *env, target_ulong addr) | ||
46 | { | ||
47 | int mmu_idx, index; | ||
48 | void *p; | ||
49 | - MemoryRegion *mr; | ||
50 | - MemoryRegionSection *section; | ||
51 | - CPUState *cpu = ENV_GET_CPU(env); | ||
52 | - CPUIOTLBEntry *iotlbentry; | ||
53 | |||
54 | index = (addr >> TARGET_PAGE_BITS) & (CPU_TLB_SIZE - 1); | ||
55 | mmu_idx = cpu_mmu_index(env, true); | ||
56 | @@ -XXX,XX +XXX,XX @@ tb_page_addr_t get_page_addr_code(CPUArchState *env, target_ulong addr) | ||
57 | assert(tlb_hit(env->tlb_table[mmu_idx][index].addr_code, addr)); | ||
58 | } | ||
59 | |||
60 | - if (unlikely(env->tlb_table[mmu_idx][index].addr_code & TLB_RECHECK)) { | ||
61 | + if (unlikely(env->tlb_table[mmu_idx][index].addr_code & | ||
62 | + (TLB_RECHECK | TLB_MMIO))) { | ||
63 | /* | ||
64 | - * This is a TLB_RECHECK access, where the MMU protection | ||
65 | - * covers a smaller range than a target page. Return -1 to | ||
66 | - * indicate that we cannot simply execute from RAM here; | ||
67 | - * we will perform the necessary repeat of the MMU check | ||
68 | - * when the "execute a single insn" code performs the | ||
69 | - * load of the guest insn. | ||
70 | + * Return -1 if we can't translate and execute from an entire | ||
71 | + * page of RAM here, which will cause us to execute by loading | ||
72 | + * and translating one insn at a time, without caching: | ||
73 | + * - TLB_RECHECK: means the MMU protection covers a smaller range | ||
74 | + * than a target page, so we must redo the MMU check every insn | ||
75 | + * - TLB_MMIO: region is not backed by RAM | ||
76 | */ | ||
77 | return -1; | ||
78 | } | ||
79 | |||
80 | - iotlbentry = &env->iotlb[mmu_idx][index]; | ||
81 | - section = iotlb_to_section(cpu, iotlbentry->addr, iotlbentry->attrs); | ||
82 | - mr = section->mr; | ||
83 | - if (memory_region_is_unassigned(mr)) { | ||
84 | - /* | ||
85 | - * Not guest RAM, so there is no ram_addr_t for it. Return -1, | ||
86 | - * and we will execute a single insn from this device. | ||
87 | - */ | ||
88 | - return -1; | ||
89 | - } | ||
90 | p = (void *)((uintptr_t)addr + env->tlb_table[mmu_idx][index].addend); | ||
91 | return qemu_ram_addr_from_host_nofail(p); | ||
92 | } | ||
93 | diff --git a/exec.c b/exec.c | ||
94 | index XXXXXXX..XXXXXXX 100644 | ||
95 | --- a/exec.c | ||
96 | +++ b/exec.c | ||
97 | @@ -XXX,XX +XXX,XX @@ static MemoryRegionSection *phys_page_find(AddressSpaceDispatch *d, hwaddr addr) | ||
98 | } | ||
99 | } | ||
100 | |||
101 | -bool memory_region_is_unassigned(MemoryRegion *mr) | ||
102 | -{ | ||
103 | - return mr != &io_mem_rom && mr != &io_mem_notdirty && !mr->rom_device | ||
104 | - && mr != &io_mem_watch; | ||
105 | -} | ||
106 | - | ||
107 | /* Called from RCU critical section */ | ||
108 | static MemoryRegionSection *address_space_lookup_region(AddressSpaceDispatch *d, | ||
109 | hwaddr addr, | ||
110 | -- | ||
111 | 2.18.0 | ||
112 | |||
113 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Luc Michel <luc.michel@greensocs.com> | ||
2 | 1 | ||
3 | Implement GICD_ISACTIVERn and GICD_ICACTIVERn registers in the GICv2. | ||
4 | Those registers allow to set or clear the active state of an IRQ in the | ||
5 | distributor. | ||
6 | |||
7 | Signed-off-by: Luc Michel <luc.michel@greensocs.com> | ||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | Message-id: 20180727095421.386-3-luc.michel@greensocs.com | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | --- | ||
12 | hw/intc/arm_gic.c | 61 +++++++++++++++++++++++++++++++++++++++++++---- | ||
13 | 1 file changed, 57 insertions(+), 4 deletions(-) | ||
14 | |||
15 | diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c | ||
16 | index XXXXXXX..XXXXXXX 100644 | ||
17 | --- a/hw/intc/arm_gic.c | ||
18 | +++ b/hw/intc/arm_gic.c | ||
19 | @@ -XXX,XX +XXX,XX @@ static uint32_t gic_dist_readb(void *opaque, hwaddr offset, MemTxAttrs attrs) | ||
20 | } | ||
21 | } | ||
22 | } else if (offset < 0x400) { | ||
23 | - /* Interrupt Active. */ | ||
24 | - irq = (offset - 0x300) * 8 + GIC_BASE_IRQ; | ||
25 | + /* Interrupt Set/Clear Active. */ | ||
26 | + if (offset < 0x380) { | ||
27 | + irq = (offset - 0x300) * 8; | ||
28 | + } else if (s->revision == 2) { | ||
29 | + irq = (offset - 0x380) * 8; | ||
30 | + } else { | ||
31 | + goto bad_reg; | ||
32 | + } | ||
33 | + | ||
34 | + irq += GIC_BASE_IRQ; | ||
35 | if (irq >= s->num_irq) | ||
36 | goto bad_reg; | ||
37 | res = 0; | ||
38 | @@ -XXX,XX +XXX,XX @@ static void gic_dist_writeb(void *opaque, hwaddr offset, | ||
39 | GIC_DIST_CLEAR_PENDING(irq + i, ALL_CPU_MASK); | ||
40 | } | ||
41 | } | ||
42 | + } else if (offset < 0x380) { | ||
43 | + /* Interrupt Set Active. */ | ||
44 | + if (s->revision != 2) { | ||
45 | + goto bad_reg; | ||
46 | + } | ||
47 | + | ||
48 | + irq = (offset - 0x300) * 8 + GIC_BASE_IRQ; | ||
49 | + if (irq >= s->num_irq) { | ||
50 | + goto bad_reg; | ||
51 | + } | ||
52 | + | ||
53 | + /* This register is banked per-cpu for PPIs */ | ||
54 | + int cm = irq < GIC_INTERNAL ? (1 << cpu) : ALL_CPU_MASK; | ||
55 | + | ||
56 | + for (i = 0; i < 8; i++) { | ||
57 | + if (s->security_extn && !attrs.secure && | ||
58 | + !GIC_DIST_TEST_GROUP(irq + i, 1 << cpu)) { | ||
59 | + continue; /* Ignore Non-secure access of Group0 IRQ */ | ||
60 | + } | ||
61 | + | ||
62 | + if (value & (1 << i)) { | ||
63 | + GIC_DIST_SET_ACTIVE(irq + i, cm); | ||
64 | + } | ||
65 | + } | ||
66 | } else if (offset < 0x400) { | ||
67 | - /* Interrupt Active. */ | ||
68 | - goto bad_reg; | ||
69 | + /* Interrupt Clear Active. */ | ||
70 | + if (s->revision != 2) { | ||
71 | + goto bad_reg; | ||
72 | + } | ||
73 | + | ||
74 | + irq = (offset - 0x380) * 8 + GIC_BASE_IRQ; | ||
75 | + if (irq >= s->num_irq) { | ||
76 | + goto bad_reg; | ||
77 | + } | ||
78 | + | ||
79 | + /* This register is banked per-cpu for PPIs */ | ||
80 | + int cm = irq < GIC_INTERNAL ? (1 << cpu) : ALL_CPU_MASK; | ||
81 | + | ||
82 | + for (i = 0; i < 8; i++) { | ||
83 | + if (s->security_extn && !attrs.secure && | ||
84 | + !GIC_DIST_TEST_GROUP(irq + i, 1 << cpu)) { | ||
85 | + continue; /* Ignore Non-secure access of Group0 IRQ */ | ||
86 | + } | ||
87 | + | ||
88 | + if (value & (1 << i)) { | ||
89 | + GIC_DIST_CLEAR_ACTIVE(irq + i, cm); | ||
90 | + } | ||
91 | + } | ||
92 | } else if (offset < 0x800) { | ||
93 | /* Interrupt Priority. */ | ||
94 | irq = (offset - 0x400) + GIC_BASE_IRQ; | ||
95 | -- | ||
96 | 2.18.0 | ||
97 | |||
98 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Luc Michel <luc.michel@greensocs.com> | ||
2 | 1 | ||
3 | Some functions are now only used in arm_gic.c, put them static. Some of | ||
4 | them where only used by the NVIC implementation and are not used | ||
5 | anymore, so remove them. | ||
6 | |||
7 | Signed-off-by: Luc Michel <luc.michel@greensocs.com> | ||
8 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | Message-id: 20180727095421.386-4-luc.michel@greensocs.com | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | --- | ||
13 | hw/intc/gic_internal.h | 4 ---- | ||
14 | hw/intc/arm_gic.c | 23 ++--------------------- | ||
15 | 2 files changed, 2 insertions(+), 25 deletions(-) | ||
16 | |||
17 | diff --git a/hw/intc/gic_internal.h b/hw/intc/gic_internal.h | ||
18 | index XXXXXXX..XXXXXXX 100644 | ||
19 | --- a/hw/intc/gic_internal.h | ||
20 | +++ b/hw/intc/gic_internal.h | ||
21 | @@ -XXX,XX +XXX,XX @@ | ||
22 | /* The special cases for the revision property: */ | ||
23 | #define REV_11MPCORE 0 | ||
24 | |||
25 | -void gic_set_pending_private(GICState *s, int cpu, int irq); | ||
26 | uint32_t gic_acknowledge_irq(GICState *s, int cpu, MemTxAttrs attrs); | ||
27 | -void gic_complete_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs); | ||
28 | -void gic_update(GICState *s); | ||
29 | -void gic_init_irqs_and_distributor(GICState *s); | ||
30 | void gic_dist_set_priority(GICState *s, int cpu, int irq, uint8_t val, | ||
31 | MemTxAttrs attrs); | ||
32 | |||
33 | diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c | ||
34 | index XXXXXXX..XXXXXXX 100644 | ||
35 | --- a/hw/intc/arm_gic.c | ||
36 | +++ b/hw/intc/arm_gic.c | ||
37 | @@ -XXX,XX +XXX,XX @@ static inline bool gic_has_groups(GICState *s) | ||
38 | |||
39 | /* TODO: Many places that call this routine could be optimized. */ | ||
40 | /* Update interrupt status after enabled or pending bits have been changed. */ | ||
41 | -void gic_update(GICState *s) | ||
42 | +static void gic_update(GICState *s) | ||
43 | { | ||
44 | int best_irq; | ||
45 | int best_prio; | ||
46 | @@ -XXX,XX +XXX,XX @@ void gic_update(GICState *s) | ||
47 | } | ||
48 | } | ||
49 | |||
50 | -void gic_set_pending_private(GICState *s, int cpu, int irq) | ||
51 | -{ | ||
52 | - int cm = 1 << cpu; | ||
53 | - | ||
54 | - if (gic_test_pending(s, irq, cm)) { | ||
55 | - return; | ||
56 | - } | ||
57 | - | ||
58 | - DPRINTF("Set %d pending cpu %d\n", irq, cpu); | ||
59 | - GIC_DIST_SET_PENDING(irq, cm); | ||
60 | - gic_update(s); | ||
61 | -} | ||
62 | - | ||
63 | static void gic_set_irq_11mpcore(GICState *s, int irq, int level, | ||
64 | int cm, int target) | ||
65 | { | ||
66 | @@ -XXX,XX +XXX,XX @@ static void gic_deactivate_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs) | ||
67 | GIC_DIST_CLEAR_ACTIVE(irq, cm); | ||
68 | } | ||
69 | |||
70 | -void gic_complete_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs) | ||
71 | +static void gic_complete_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs) | ||
72 | { | ||
73 | int cm = 1 << cpu; | ||
74 | int group; | ||
75 | @@ -XXX,XX +XXX,XX @@ static const MemoryRegionOps gic_cpu_ops = { | ||
76 | .endianness = DEVICE_NATIVE_ENDIAN, | ||
77 | }; | ||
78 | |||
79 | -/* This function is used by nvic model */ | ||
80 | -void gic_init_irqs_and_distributor(GICState *s) | ||
81 | -{ | ||
82 | - gic_init_irqs_and_mmio(s, gic_set_irq, gic_ops); | ||
83 | -} | ||
84 | - | ||
85 | static void arm_gic_realize(DeviceState *dev, Error **errp) | ||
86 | { | ||
87 | /* Device instance realize function for the GIC sysbus device */ | ||
88 | -- | ||
89 | 2.18.0 | ||
90 | |||
91 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Luc Michel <luc.michel@greensocs.com> | ||
2 | 1 | ||
3 | Provide a VMSTATE_UINT16_SUB_ARRAY macro to save a uint16_t sub-array in | ||
4 | a VMState. | ||
5 | |||
6 | Signed-off-by: Luc Michel <luc.michel@greensocs.com> | ||
7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
9 | Message-id: 20180727095421.386-5-luc.michel@greensocs.com | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | --- | ||
12 | include/migration/vmstate.h | 3 +++ | ||
13 | 1 file changed, 3 insertions(+) | ||
14 | |||
15 | diff --git a/include/migration/vmstate.h b/include/migration/vmstate.h | ||
16 | index XXXXXXX..XXXXXXX 100644 | ||
17 | --- a/include/migration/vmstate.h | ||
18 | +++ b/include/migration/vmstate.h | ||
19 | @@ -XXX,XX +XXX,XX @@ extern const VMStateInfo vmstate_info_qtailq; | ||
20 | #define VMSTATE_UINT16_ARRAY(_f, _s, _n) \ | ||
21 | VMSTATE_UINT16_ARRAY_V(_f, _s, _n, 0) | ||
22 | |||
23 | +#define VMSTATE_UINT16_SUB_ARRAY(_f, _s, _start, _num) \ | ||
24 | + VMSTATE_SUB_ARRAY(_f, _s, _start, _num, 0, vmstate_info_uint16, uint16_t) | ||
25 | + | ||
26 | #define VMSTATE_UINT16_2DARRAY(_f, _s, _n1, _n2) \ | ||
27 | VMSTATE_UINT16_2DARRAY_V(_f, _s, _n1, _n2, 0) | ||
28 | |||
29 | -- | ||
30 | 2.18.0 | ||
31 | |||
32 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Luc Michel <luc.michel@greensocs.com> | ||
2 | 1 | ||
3 | Add the necessary parts of the virtualization extensions state to the | ||
4 | GIC state. We choose to increase the size of the CPU interfaces state to | ||
5 | add space for the vCPU interfaces (the GIC_NCPU_VCPU macro). This way, | ||
6 | we'll be able to reuse most of the CPU interface code for the vCPUs. | ||
7 | |||
8 | The only exception is the APR value, which is stored in h_apr in the | ||
9 | virtual interface state for vCPUs. This is due to some complications | ||
10 | with the GIC VMState, for which we don't want to break backward | ||
11 | compatibility. APRs being stored in 2D arrays, increasing the second | ||
12 | dimension would lead to some ugly VMState description. To avoid | ||
13 | that, we keep it in h_apr for vCPUs. | ||
14 | |||
15 | The vCPUs are numbered from GIC_NCPU to (GIC_NCPU * 2) - 1. The | ||
16 | `gic_is_vcpu` function help to determine if a given CPU id correspond to | ||
17 | a physical CPU or a virtual one. | ||
18 | |||
19 | For the in-kernel KVM VGIC, since the exposed VGIC does not implement | ||
20 | the virtualization extensions, we report an error if the corresponding | ||
21 | property is set to true. | ||
22 | |||
23 | Signed-off-by: Luc Michel <luc.michel@greensocs.com> | ||
24 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
25 | Message-id: 20180727095421.386-6-luc.michel@greensocs.com | ||
26 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
27 | --- | ||
28 | hw/intc/gic_internal.h | 5 ++ | ||
29 | include/hw/intc/arm_gic_common.h | 43 +++++++-- | ||
30 | hw/intc/arm_gic.c | 2 +- | ||
31 | hw/intc/arm_gic_common.c | 148 ++++++++++++++++++++++++++----- | ||
32 | hw/intc/arm_gic_kvm.c | 8 +- | ||
33 | 5 files changed, 173 insertions(+), 33 deletions(-) | ||
34 | |||
35 | diff --git a/hw/intc/gic_internal.h b/hw/intc/gic_internal.h | ||
36 | index XXXXXXX..XXXXXXX 100644 | ||
37 | --- a/hw/intc/gic_internal.h | ||
38 | +++ b/hw/intc/gic_internal.h | ||
39 | @@ -XXX,XX +XXX,XX @@ static inline bool gic_test_pending(GICState *s, int irq, int cm) | ||
40 | } | ||
41 | } | ||
42 | |||
43 | +static inline bool gic_is_vcpu(int cpu) | ||
44 | +{ | ||
45 | + return cpu >= GIC_NCPU; | ||
46 | +} | ||
47 | + | ||
48 | #endif /* QEMU_ARM_GIC_INTERNAL_H */ | ||
49 | diff --git a/include/hw/intc/arm_gic_common.h b/include/hw/intc/arm_gic_common.h | ||
50 | index XXXXXXX..XXXXXXX 100644 | ||
51 | --- a/include/hw/intc/arm_gic_common.h | ||
52 | +++ b/include/hw/intc/arm_gic_common.h | ||
53 | @@ -XXX,XX +XXX,XX @@ | ||
54 | #define GIC_NR_SGIS 16 | ||
55 | /* Maximum number of possible CPU interfaces, determined by GIC architecture */ | ||
56 | #define GIC_NCPU 8 | ||
57 | +/* Maximum number of possible CPU interfaces with their respective vCPU */ | ||
58 | +#define GIC_NCPU_VCPU (GIC_NCPU * 2) | ||
59 | |||
60 | #define MAX_NR_GROUP_PRIO 128 | ||
61 | #define GIC_NR_APRS (MAX_NR_GROUP_PRIO / 32) | ||
62 | @@ -XXX,XX +XXX,XX @@ | ||
63 | #define GIC_MIN_BPR 0 | ||
64 | #define GIC_MIN_ABPR (GIC_MIN_BPR + 1) | ||
65 | |||
66 | +/* Architectural maximum number of list registers in the virtual interface */ | ||
67 | +#define GIC_MAX_LR 64 | ||
68 | + | ||
69 | +/* Only 32 priority levels and 32 preemption levels in the vCPU interfaces */ | ||
70 | +#define GIC_VIRT_MAX_GROUP_PRIO_BITS 5 | ||
71 | +#define GIC_VIRT_MAX_NR_GROUP_PRIO (1 << GIC_VIRT_MAX_GROUP_PRIO_BITS) | ||
72 | +#define GIC_VIRT_NR_APRS (GIC_VIRT_MAX_NR_GROUP_PRIO / 32) | ||
73 | + | ||
74 | +#define GIC_VIRT_MIN_BPR 2 | ||
75 | +#define GIC_VIRT_MIN_ABPR (GIC_VIRT_MIN_BPR + 1) | ||
76 | + | ||
77 | typedef struct gic_irq_state { | ||
78 | /* The enable bits are only banked for per-cpu interrupts. */ | ||
79 | uint8_t enabled; | ||
80 | @@ -XXX,XX +XXX,XX @@ typedef struct GICState { | ||
81 | qemu_irq parent_fiq[GIC_NCPU]; | ||
82 | qemu_irq parent_virq[GIC_NCPU]; | ||
83 | qemu_irq parent_vfiq[GIC_NCPU]; | ||
84 | + qemu_irq maintenance_irq[GIC_NCPU]; | ||
85 | + | ||
86 | /* GICD_CTLR; for a GIC with the security extensions the NS banked version | ||
87 | * of this register is just an alias of bit 1 of the S banked version. | ||
88 | */ | ||
89 | @@ -XXX,XX +XXX,XX @@ typedef struct GICState { | ||
90 | /* GICC_CTLR; again, the NS banked version is just aliases of bits of | ||
91 | * the S banked register, so our state only needs to store the S version. | ||
92 | */ | ||
93 | - uint32_t cpu_ctlr[GIC_NCPU]; | ||
94 | + uint32_t cpu_ctlr[GIC_NCPU_VCPU]; | ||
95 | |||
96 | gic_irq_state irq_state[GIC_MAXIRQ]; | ||
97 | uint8_t irq_target[GIC_MAXIRQ]; | ||
98 | @@ -XXX,XX +XXX,XX @@ typedef struct GICState { | ||
99 | */ | ||
100 | uint8_t sgi_pending[GIC_NR_SGIS][GIC_NCPU]; | ||
101 | |||
102 | - uint16_t priority_mask[GIC_NCPU]; | ||
103 | - uint16_t running_priority[GIC_NCPU]; | ||
104 | - uint16_t current_pending[GIC_NCPU]; | ||
105 | + uint16_t priority_mask[GIC_NCPU_VCPU]; | ||
106 | + uint16_t running_priority[GIC_NCPU_VCPU]; | ||
107 | + uint16_t current_pending[GIC_NCPU_VCPU]; | ||
108 | |||
109 | /* If we present the GICv2 without security extensions to a guest, | ||
110 | * the guest can configure the GICC_CTLR to configure group 1 binary point | ||
111 | @@ -XXX,XX +XXX,XX @@ typedef struct GICState { | ||
112 | * For a GIC with Security Extensions we use use bpr for the | ||
113 | * secure copy and abpr as storage for the non-secure copy of the register. | ||
114 | */ | ||
115 | - uint8_t bpr[GIC_NCPU]; | ||
116 | - uint8_t abpr[GIC_NCPU]; | ||
117 | + uint8_t bpr[GIC_NCPU_VCPU]; | ||
118 | + uint8_t abpr[GIC_NCPU_VCPU]; | ||
119 | |||
120 | /* The APR is implementation defined, so we choose a layout identical to | ||
121 | * the KVM ABI layout for QEMU's implementation of the gic: | ||
122 | @@ -XXX,XX +XXX,XX @@ typedef struct GICState { | ||
123 | uint32_t apr[GIC_NR_APRS][GIC_NCPU]; | ||
124 | uint32_t nsapr[GIC_NR_APRS][GIC_NCPU]; | ||
125 | |||
126 | + /* Virtual interface control registers */ | ||
127 | + uint32_t h_hcr[GIC_NCPU]; | ||
128 | + uint32_t h_misr[GIC_NCPU]; | ||
129 | + uint32_t h_lr[GIC_MAX_LR][GIC_NCPU]; | ||
130 | + uint32_t h_apr[GIC_NCPU]; | ||
131 | + | ||
132 | + /* Number of LRs implemented in this GIC instance */ | ||
133 | + uint32_t num_lrs; | ||
134 | + | ||
135 | uint32_t num_cpu; | ||
136 | |||
137 | MemoryRegion iomem; /* Distributor */ | ||
138 | @@ -XXX,XX +XXX,XX @@ typedef struct GICState { | ||
139 | */ | ||
140 | struct GICState *backref[GIC_NCPU]; | ||
141 | MemoryRegion cpuiomem[GIC_NCPU + 1]; /* CPU interfaces */ | ||
142 | + MemoryRegion vifaceiomem[GIC_NCPU + 1]; /* Virtual interfaces */ | ||
143 | + MemoryRegion vcpuiomem; /* vCPU interface */ | ||
144 | + | ||
145 | uint32_t num_irq; | ||
146 | uint32_t revision; | ||
147 | bool security_extn; | ||
148 | + bool virt_extn; | ||
149 | bool irq_reset_nonsecure; /* configure IRQs as group 1 (NS) on reset? */ | ||
150 | int dev_fd; /* kvm device fd if backed by kvm vgic support */ | ||
151 | Error *migration_blocker; | ||
152 | @@ -XXX,XX +XXX,XX @@ typedef struct ARMGICCommonClass { | ||
153 | } ARMGICCommonClass; | ||
154 | |||
155 | void gic_init_irqs_and_mmio(GICState *s, qemu_irq_handler handler, | ||
156 | - const MemoryRegionOps *ops); | ||
157 | + const MemoryRegionOps *ops, | ||
158 | + const MemoryRegionOps *virt_ops); | ||
159 | |||
160 | #endif | ||
161 | diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c | ||
162 | index XXXXXXX..XXXXXXX 100644 | ||
163 | --- a/hw/intc/arm_gic.c | ||
164 | +++ b/hw/intc/arm_gic.c | ||
165 | @@ -XXX,XX +XXX,XX @@ static void arm_gic_realize(DeviceState *dev, Error **errp) | ||
166 | } | ||
167 | |||
168 | /* This creates distributor and main CPU interface (s->cpuiomem[0]) */ | ||
169 | - gic_init_irqs_and_mmio(s, gic_set_irq, gic_ops); | ||
170 | + gic_init_irqs_and_mmio(s, gic_set_irq, gic_ops, NULL); | ||
171 | |||
172 | /* Extra core-specific regions for the CPU interfaces. This is | ||
173 | * necessary for "franken-GIC" implementations, for example on | ||
174 | diff --git a/hw/intc/arm_gic_common.c b/hw/intc/arm_gic_common.c | ||
175 | index XXXXXXX..XXXXXXX 100644 | ||
176 | --- a/hw/intc/arm_gic_common.c | ||
177 | +++ b/hw/intc/arm_gic_common.c | ||
178 | @@ -XXX,XX +XXX,XX @@ static int gic_post_load(void *opaque, int version_id) | ||
179 | return 0; | ||
180 | } | ||
181 | |||
182 | +static bool gic_virt_state_needed(void *opaque) | ||
183 | +{ | ||
184 | + GICState *s = (GICState *)opaque; | ||
185 | + | ||
186 | + return s->virt_extn; | ||
187 | +} | ||
188 | + | ||
189 | static const VMStateDescription vmstate_gic_irq_state = { | ||
190 | .name = "arm_gic_irq_state", | ||
191 | .version_id = 1, | ||
192 | @@ -XXX,XX +XXX,XX @@ static const VMStateDescription vmstate_gic_irq_state = { | ||
193 | } | ||
194 | }; | ||
195 | |||
196 | +static const VMStateDescription vmstate_gic_virt_state = { | ||
197 | + .name = "arm_gic_virt_state", | ||
198 | + .version_id = 1, | ||
199 | + .minimum_version_id = 1, | ||
200 | + .needed = gic_virt_state_needed, | ||
201 | + .fields = (VMStateField[]) { | ||
202 | + /* Virtual interface */ | ||
203 | + VMSTATE_UINT32_ARRAY(h_hcr, GICState, GIC_NCPU), | ||
204 | + VMSTATE_UINT32_ARRAY(h_misr, GICState, GIC_NCPU), | ||
205 | + VMSTATE_UINT32_2DARRAY(h_lr, GICState, GIC_MAX_LR, GIC_NCPU), | ||
206 | + VMSTATE_UINT32_ARRAY(h_apr, GICState, GIC_NCPU), | ||
207 | + | ||
208 | + /* Virtual CPU interfaces */ | ||
209 | + VMSTATE_UINT32_SUB_ARRAY(cpu_ctlr, GICState, GIC_NCPU, GIC_NCPU), | ||
210 | + VMSTATE_UINT16_SUB_ARRAY(priority_mask, GICState, GIC_NCPU, GIC_NCPU), | ||
211 | + VMSTATE_UINT16_SUB_ARRAY(running_priority, GICState, GIC_NCPU, GIC_NCPU), | ||
212 | + VMSTATE_UINT16_SUB_ARRAY(current_pending, GICState, GIC_NCPU, GIC_NCPU), | ||
213 | + VMSTATE_UINT8_SUB_ARRAY(bpr, GICState, GIC_NCPU, GIC_NCPU), | ||
214 | + VMSTATE_UINT8_SUB_ARRAY(abpr, GICState, GIC_NCPU, GIC_NCPU), | ||
215 | + | ||
216 | + VMSTATE_END_OF_LIST() | ||
217 | + } | ||
218 | +}; | ||
219 | + | ||
220 | static const VMStateDescription vmstate_gic = { | ||
221 | .name = "arm_gic", | ||
222 | .version_id = 12, | ||
223 | @@ -XXX,XX +XXX,XX @@ static const VMStateDescription vmstate_gic = { | ||
224 | .post_load = gic_post_load, | ||
225 | .fields = (VMStateField[]) { | ||
226 | VMSTATE_UINT32(ctlr, GICState), | ||
227 | - VMSTATE_UINT32_ARRAY(cpu_ctlr, GICState, GIC_NCPU), | ||
228 | + VMSTATE_UINT32_SUB_ARRAY(cpu_ctlr, GICState, 0, GIC_NCPU), | ||
229 | VMSTATE_STRUCT_ARRAY(irq_state, GICState, GIC_MAXIRQ, 1, | ||
230 | vmstate_gic_irq_state, gic_irq_state), | ||
231 | VMSTATE_UINT8_ARRAY(irq_target, GICState, GIC_MAXIRQ), | ||
232 | VMSTATE_UINT8_2DARRAY(priority1, GICState, GIC_INTERNAL, GIC_NCPU), | ||
233 | VMSTATE_UINT8_ARRAY(priority2, GICState, GIC_MAXIRQ - GIC_INTERNAL), | ||
234 | VMSTATE_UINT8_2DARRAY(sgi_pending, GICState, GIC_NR_SGIS, GIC_NCPU), | ||
235 | - VMSTATE_UINT16_ARRAY(priority_mask, GICState, GIC_NCPU), | ||
236 | - VMSTATE_UINT16_ARRAY(running_priority, GICState, GIC_NCPU), | ||
237 | - VMSTATE_UINT16_ARRAY(current_pending, GICState, GIC_NCPU), | ||
238 | - VMSTATE_UINT8_ARRAY(bpr, GICState, GIC_NCPU), | ||
239 | - VMSTATE_UINT8_ARRAY(abpr, GICState, GIC_NCPU), | ||
240 | + VMSTATE_UINT16_SUB_ARRAY(priority_mask, GICState, 0, GIC_NCPU), | ||
241 | + VMSTATE_UINT16_SUB_ARRAY(running_priority, GICState, 0, GIC_NCPU), | ||
242 | + VMSTATE_UINT16_SUB_ARRAY(current_pending, GICState, 0, GIC_NCPU), | ||
243 | + VMSTATE_UINT8_SUB_ARRAY(bpr, GICState, 0, GIC_NCPU), | ||
244 | + VMSTATE_UINT8_SUB_ARRAY(abpr, GICState, 0, GIC_NCPU), | ||
245 | VMSTATE_UINT32_2DARRAY(apr, GICState, GIC_NR_APRS, GIC_NCPU), | ||
246 | VMSTATE_UINT32_2DARRAY(nsapr, GICState, GIC_NR_APRS, GIC_NCPU), | ||
247 | VMSTATE_END_OF_LIST() | ||
248 | + }, | ||
249 | + .subsections = (const VMStateDescription * []) { | ||
250 | + &vmstate_gic_virt_state, | ||
251 | + NULL | ||
252 | } | ||
253 | }; | ||
254 | |||
255 | void gic_init_irqs_and_mmio(GICState *s, qemu_irq_handler handler, | ||
256 | - const MemoryRegionOps *ops) | ||
257 | + const MemoryRegionOps *ops, | ||
258 | + const MemoryRegionOps *virt_ops) | ||
259 | { | ||
260 | SysBusDevice *sbd = SYS_BUS_DEVICE(s); | ||
261 | int i = s->num_irq - GIC_INTERNAL; | ||
262 | @@ -XXX,XX +XXX,XX @@ void gic_init_irqs_and_mmio(GICState *s, qemu_irq_handler handler, | ||
263 | for (i = 0; i < s->num_cpu; i++) { | ||
264 | sysbus_init_irq(sbd, &s->parent_vfiq[i]); | ||
265 | } | ||
266 | + if (s->virt_extn) { | ||
267 | + for (i = 0; i < s->num_cpu; i++) { | ||
268 | + sysbus_init_irq(sbd, &s->maintenance_irq[i]); | ||
269 | + } | ||
270 | + } | ||
271 | |||
272 | /* Distributor */ | ||
273 | memory_region_init_io(&s->iomem, OBJECT(s), ops, s, "gic_dist", 0x1000); | ||
274 | @@ -XXX,XX +XXX,XX @@ void gic_init_irqs_and_mmio(GICState *s, qemu_irq_handler handler, | ||
275 | memory_region_init_io(&s->cpuiomem[0], OBJECT(s), ops ? &ops[1] : NULL, | ||
276 | s, "gic_cpu", s->revision == 2 ? 0x2000 : 0x100); | ||
277 | sysbus_init_mmio(sbd, &s->cpuiomem[0]); | ||
278 | + | ||
279 | + if (s->virt_extn) { | ||
280 | + memory_region_init_io(&s->vifaceiomem[0], OBJECT(s), virt_ops, | ||
281 | + s, "gic_viface", 0x1000); | ||
282 | + sysbus_init_mmio(sbd, &s->vifaceiomem[0]); | ||
283 | + | ||
284 | + memory_region_init_io(&s->vcpuiomem, OBJECT(s), | ||
285 | + virt_ops ? &virt_ops[1] : NULL, | ||
286 | + s, "gic_vcpu", 0x2000); | ||
287 | + sysbus_init_mmio(sbd, &s->vcpuiomem); | ||
288 | + } | ||
289 | } | ||
290 | |||
291 | static void arm_gic_common_realize(DeviceState *dev, Error **errp) | ||
292 | @@ -XXX,XX +XXX,XX @@ static void arm_gic_common_realize(DeviceState *dev, Error **errp) | ||
293 | "the security extensions"); | ||
294 | return; | ||
295 | } | ||
296 | + | ||
297 | + if (s->virt_extn) { | ||
298 | + if (s->revision != 2) { | ||
299 | + error_setg(errp, "GIC virtualization extensions are only " | ||
300 | + "supported by revision 2"); | ||
301 | + return; | ||
302 | + } | ||
303 | + | ||
304 | + /* For now, set the number of implemented LRs to 4, as found in most | ||
305 | + * real GICv2. This could be promoted as a QOM property if we need to | ||
306 | + * emulate a variant with another num_lrs. | ||
307 | + */ | ||
308 | + s->num_lrs = 4; | ||
309 | + } | ||
310 | +} | ||
311 | + | ||
312 | +static inline void arm_gic_common_reset_irq_state(GICState *s, int first_cpu, | ||
313 | + int resetprio) | ||
314 | +{ | ||
315 | + int i, j; | ||
316 | + | ||
317 | + for (i = first_cpu; i < first_cpu + s->num_cpu; i++) { | ||
318 | + if (s->revision == REV_11MPCORE) { | ||
319 | + s->priority_mask[i] = 0xf0; | ||
320 | + } else { | ||
321 | + s->priority_mask[i] = resetprio; | ||
322 | + } | ||
323 | + s->current_pending[i] = 1023; | ||
324 | + s->running_priority[i] = 0x100; | ||
325 | + s->cpu_ctlr[i] = 0; | ||
326 | + s->bpr[i] = gic_is_vcpu(i) ? GIC_VIRT_MIN_BPR : GIC_MIN_BPR; | ||
327 | + s->abpr[i] = gic_is_vcpu(i) ? GIC_VIRT_MIN_ABPR : GIC_MIN_ABPR; | ||
328 | + | ||
329 | + if (!gic_is_vcpu(i)) { | ||
330 | + for (j = 0; j < GIC_INTERNAL; j++) { | ||
331 | + s->priority1[j][i] = resetprio; | ||
332 | + } | ||
333 | + for (j = 0; j < GIC_NR_SGIS; j++) { | ||
334 | + s->sgi_pending[j][i] = 0; | ||
335 | + } | ||
336 | + } | ||
337 | + } | ||
338 | } | ||
339 | |||
340 | static void arm_gic_common_reset(DeviceState *dev) | ||
341 | @@ -XXX,XX +XXX,XX @@ static void arm_gic_common_reset(DeviceState *dev) | ||
342 | } | ||
343 | |||
344 | memset(s->irq_state, 0, GIC_MAXIRQ * sizeof(gic_irq_state)); | ||
345 | - for (i = 0 ; i < s->num_cpu; i++) { | ||
346 | - if (s->revision == REV_11MPCORE) { | ||
347 | - s->priority_mask[i] = 0xf0; | ||
348 | - } else { | ||
349 | - s->priority_mask[i] = resetprio; | ||
350 | - } | ||
351 | - s->current_pending[i] = 1023; | ||
352 | - s->running_priority[i] = 0x100; | ||
353 | - s->cpu_ctlr[i] = 0; | ||
354 | - s->bpr[i] = GIC_MIN_BPR; | ||
355 | - s->abpr[i] = GIC_MIN_ABPR; | ||
356 | - for (j = 0; j < GIC_INTERNAL; j++) { | ||
357 | - s->priority1[j][i] = resetprio; | ||
358 | - } | ||
359 | - for (j = 0; j < GIC_NR_SGIS; j++) { | ||
360 | - s->sgi_pending[j][i] = 0; | ||
361 | - } | ||
362 | + arm_gic_common_reset_irq_state(s, 0, resetprio); | ||
363 | + | ||
364 | + if (s->virt_extn) { | ||
365 | + /* vCPU states are stored at indexes GIC_NCPU .. GIC_NCPU+num_cpu. | ||
366 | + * The exposed vCPU interface does not have security extensions. | ||
367 | + */ | ||
368 | + arm_gic_common_reset_irq_state(s, GIC_NCPU, 0); | ||
369 | } | ||
370 | + | ||
371 | for (i = 0; i < GIC_NR_SGIS; i++) { | ||
372 | GIC_DIST_SET_ENABLED(i, ALL_CPU_MASK); | ||
373 | GIC_DIST_SET_EDGE_TRIGGER(i); | ||
374 | @@ -XXX,XX +XXX,XX @@ static void arm_gic_common_reset(DeviceState *dev) | ||
375 | } | ||
376 | } | ||
377 | |||
378 | + if (s->virt_extn) { | ||
379 | + for (i = 0; i < s->num_lrs; i++) { | ||
380 | + for (j = 0; j < s->num_cpu; j++) { | ||
381 | + s->h_lr[i][j] = 0; | ||
382 | + } | ||
383 | + } | ||
384 | + | ||
385 | + for (i = 0; i < s->num_cpu; i++) { | ||
386 | + s->h_hcr[i] = 0; | ||
387 | + s->h_misr[i] = 0; | ||
388 | + } | ||
389 | + } | ||
390 | + | ||
391 | s->ctlr = 0; | ||
392 | } | ||
393 | |||
394 | @@ -XXX,XX +XXX,XX @@ static Property arm_gic_common_properties[] = { | ||
395 | DEFINE_PROP_UINT32("revision", GICState, revision, 1), | ||
396 | /* True if the GIC should implement the security extensions */ | ||
397 | DEFINE_PROP_BOOL("has-security-extensions", GICState, security_extn, 0), | ||
398 | + /* True if the GIC should implement the virtualization extensions */ | ||
399 | + DEFINE_PROP_BOOL("has-virtualization-extensions", GICState, virt_extn, 0), | ||
400 | DEFINE_PROP_END_OF_LIST(), | ||
401 | }; | ||
402 | |||
403 | diff --git a/hw/intc/arm_gic_kvm.c b/hw/intc/arm_gic_kvm.c | ||
404 | index XXXXXXX..XXXXXXX 100644 | ||
405 | --- a/hw/intc/arm_gic_kvm.c | ||
406 | +++ b/hw/intc/arm_gic_kvm.c | ||
407 | @@ -XXX,XX +XXX,XX @@ static void kvm_arm_gic_realize(DeviceState *dev, Error **errp) | ||
408 | return; | ||
409 | } | ||
410 | |||
411 | + if (s->virt_extn) { | ||
412 | + error_setg(errp, "the in-kernel VGIC does not implement the " | ||
413 | + "virtualization extensions"); | ||
414 | + return; | ||
415 | + } | ||
416 | + | ||
417 | if (!kvm_arm_gic_can_save_restore(s)) { | ||
418 | error_setg(&s->migration_blocker, "This operating system kernel does " | ||
419 | "not support vGICv2 migration"); | ||
420 | @@ -XXX,XX +XXX,XX @@ static void kvm_arm_gic_realize(DeviceState *dev, Error **errp) | ||
421 | } | ||
422 | } | ||
423 | |||
424 | - gic_init_irqs_and_mmio(s, kvm_arm_gicv2_set_irq, NULL); | ||
425 | + gic_init_irqs_and_mmio(s, kvm_arm_gicv2_set_irq, NULL, NULL); | ||
426 | |||
427 | for (i = 0; i < s->num_irq - GIC_INTERNAL; i++) { | ||
428 | qemu_irq irq = qdev_get_gpio_in(dev, i); | ||
429 | -- | ||
430 | 2.18.0 | ||
431 | |||
432 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Luc Michel <luc.michel@greensocs.com> | ||
2 | 1 | ||
3 | Add the register definitions for the virtual interface of the GICv2. | ||
4 | |||
5 | Signed-off-by: Luc Michel <luc.michel@greensocs.com> | ||
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | Message-id: 20180727095421.386-7-luc.michel@greensocs.com | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | --- | ||
10 | hw/intc/gic_internal.h | 65 ++++++++++++++++++++++++++++++++++++++++++ | ||
11 | 1 file changed, 65 insertions(+) | ||
12 | |||
13 | diff --git a/hw/intc/gic_internal.h b/hw/intc/gic_internal.h | ||
14 | index XXXXXXX..XXXXXXX 100644 | ||
15 | --- a/hw/intc/gic_internal.h | ||
16 | +++ b/hw/intc/gic_internal.h | ||
17 | @@ -XXX,XX +XXX,XX @@ | ||
18 | #ifndef QEMU_ARM_GIC_INTERNAL_H | ||
19 | #define QEMU_ARM_GIC_INTERNAL_H | ||
20 | |||
21 | +#include "hw/registerfields.h" | ||
22 | #include "hw/intc/arm_gic.h" | ||
23 | |||
24 | #define ALL_CPU_MASK ((unsigned)(((1 << GIC_NCPU) - 1))) | ||
25 | @@ -XXX,XX +XXX,XX @@ | ||
26 | #define GICC_CTLR_EOIMODE (1U << 9) | ||
27 | #define GICC_CTLR_EOIMODE_NS (1U << 10) | ||
28 | |||
29 | +REG32(GICH_HCR, 0x0) | ||
30 | + FIELD(GICH_HCR, EN, 0, 1) | ||
31 | + FIELD(GICH_HCR, UIE, 1, 1) | ||
32 | + FIELD(GICH_HCR, LRENPIE, 2, 1) | ||
33 | + FIELD(GICH_HCR, NPIE, 3, 1) | ||
34 | + FIELD(GICH_HCR, VGRP0EIE, 4, 1) | ||
35 | + FIELD(GICH_HCR, VGRP0DIE, 5, 1) | ||
36 | + FIELD(GICH_HCR, VGRP1EIE, 6, 1) | ||
37 | + FIELD(GICH_HCR, VGRP1DIE, 7, 1) | ||
38 | + FIELD(GICH_HCR, EOICount, 27, 5) | ||
39 | + | ||
40 | +#define GICH_HCR_MASK \ | ||
41 | + (R_GICH_HCR_EN_MASK | R_GICH_HCR_UIE_MASK | \ | ||
42 | + R_GICH_HCR_LRENPIE_MASK | R_GICH_HCR_NPIE_MASK | \ | ||
43 | + R_GICH_HCR_VGRP0EIE_MASK | R_GICH_HCR_VGRP0DIE_MASK | \ | ||
44 | + R_GICH_HCR_VGRP1EIE_MASK | R_GICH_HCR_VGRP1DIE_MASK | \ | ||
45 | + R_GICH_HCR_EOICount_MASK) | ||
46 | + | ||
47 | +REG32(GICH_VTR, 0x4) | ||
48 | + FIELD(GICH_VTR, ListRegs, 0, 6) | ||
49 | + FIELD(GICH_VTR, PREbits, 26, 3) | ||
50 | + FIELD(GICH_VTR, PRIbits, 29, 3) | ||
51 | + | ||
52 | +REG32(GICH_VMCR, 0x8) | ||
53 | + FIELD(GICH_VMCR, VMCCtlr, 0, 10) | ||
54 | + FIELD(GICH_VMCR, VMABP, 18, 3) | ||
55 | + FIELD(GICH_VMCR, VMBP, 21, 3) | ||
56 | + FIELD(GICH_VMCR, VMPriMask, 27, 5) | ||
57 | + | ||
58 | +REG32(GICH_MISR, 0x10) | ||
59 | + FIELD(GICH_MISR, EOI, 0, 1) | ||
60 | + FIELD(GICH_MISR, U, 1, 1) | ||
61 | + FIELD(GICH_MISR, LRENP, 2, 1) | ||
62 | + FIELD(GICH_MISR, NP, 3, 1) | ||
63 | + FIELD(GICH_MISR, VGrp0E, 4, 1) | ||
64 | + FIELD(GICH_MISR, VGrp0D, 5, 1) | ||
65 | + FIELD(GICH_MISR, VGrp1E, 6, 1) | ||
66 | + FIELD(GICH_MISR, VGrp1D, 7, 1) | ||
67 | + | ||
68 | +REG32(GICH_EISR0, 0x20) | ||
69 | +REG32(GICH_EISR1, 0x24) | ||
70 | +REG32(GICH_ELRSR0, 0x30) | ||
71 | +REG32(GICH_ELRSR1, 0x34) | ||
72 | +REG32(GICH_APR, 0xf0) | ||
73 | + | ||
74 | +REG32(GICH_LR0, 0x100) | ||
75 | + FIELD(GICH_LR0, VirtualID, 0, 10) | ||
76 | + FIELD(GICH_LR0, PhysicalID, 10, 10) | ||
77 | + FIELD(GICH_LR0, CPUID, 10, 3) | ||
78 | + FIELD(GICH_LR0, EOI, 19, 1) | ||
79 | + FIELD(GICH_LR0, Priority, 23, 5) | ||
80 | + FIELD(GICH_LR0, State, 28, 2) | ||
81 | + FIELD(GICH_LR0, Grp1, 30, 1) | ||
82 | + FIELD(GICH_LR0, HW, 31, 1) | ||
83 | + | ||
84 | +/* Last LR register */ | ||
85 | +REG32(GICH_LR63, 0x1fc) | ||
86 | + | ||
87 | +#define GICH_LR_MASK \ | ||
88 | + (R_GICH_LR0_VirtualID_MASK | R_GICH_LR0_PhysicalID_MASK | \ | ||
89 | + R_GICH_LR0_CPUID_MASK | R_GICH_LR0_EOI_MASK | \ | ||
90 | + R_GICH_LR0_Priority_MASK | R_GICH_LR0_State_MASK | \ | ||
91 | + R_GICH_LR0_Grp1_MASK | R_GICH_LR0_HW_MASK) | ||
92 | + | ||
93 | /* Valid bits for GICC_CTLR for GICv1, v1 with security extensions, | ||
94 | * GICv2 and GICv2 with security extensions: | ||
95 | */ | ||
96 | -- | ||
97 | 2.18.0 | ||
98 | |||
99 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Luc Michel <luc.michel@greensocs.com> | ||
2 | 1 | ||
3 | Add some helper macros and functions related to the virtualization | ||
4 | extensions to gic_internal.h. | ||
5 | |||
6 | The GICH_LR_* macros help extracting specific fields of a list register | ||
7 | value. The only tricky one is the priority field as only the MSB are | ||
8 | stored. The value must be shifted accordingly to obtain the correct | ||
9 | priority value. | ||
10 | |||
11 | gic_is_vcpu() and gic_get_vcpu_real_id() help with (v)CPU id manipulation | ||
12 | to abstract the fact that vCPU id are in the range | ||
13 | [ GIC_NCPU; (GIC_NCPU + num_cpu) [. | ||
14 | |||
15 | gic_lr_* and gic_virq_is_valid() help with the list registers. | ||
16 | gic_get_lr_entry() returns the LR entry for a given (vCPU, irq) pair. It | ||
17 | is meant to be used in contexts where we know for sure that the entry | ||
18 | exists, so we assert that entry is actually found, and the caller can | ||
19 | avoid the NULL check on the returned pointer. | ||
20 | |||
21 | Signed-off-by: Luc Michel <luc.michel@greensocs.com> | ||
22 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
23 | Message-id: 20180727095421.386-8-luc.michel@greensocs.com | ||
24 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
25 | --- | ||
26 | hw/intc/gic_internal.h | 74 ++++++++++++++++++++++++++++++++++++++++++ | ||
27 | hw/intc/arm_gic.c | 5 +++ | ||
28 | 2 files changed, 79 insertions(+) | ||
29 | |||
30 | diff --git a/hw/intc/gic_internal.h b/hw/intc/gic_internal.h | ||
31 | index XXXXXXX..XXXXXXX 100644 | ||
32 | --- a/hw/intc/gic_internal.h | ||
33 | +++ b/hw/intc/gic_internal.h | ||
34 | @@ -XXX,XX +XXX,XX @@ REG32(GICH_LR63, 0x1fc) | ||
35 | R_GICH_LR0_Priority_MASK | R_GICH_LR0_State_MASK | \ | ||
36 | R_GICH_LR0_Grp1_MASK | R_GICH_LR0_HW_MASK) | ||
37 | |||
38 | +#define GICH_LR_STATE_INVALID 0 | ||
39 | +#define GICH_LR_STATE_PENDING 1 | ||
40 | +#define GICH_LR_STATE_ACTIVE 2 | ||
41 | +#define GICH_LR_STATE_ACTIVE_PENDING 3 | ||
42 | + | ||
43 | +#define GICH_LR_VIRT_ID(entry) (FIELD_EX32(entry, GICH_LR0, VirtualID)) | ||
44 | +#define GICH_LR_PHYS_ID(entry) (FIELD_EX32(entry, GICH_LR0, PhysicalID)) | ||
45 | +#define GICH_LR_CPUID(entry) (FIELD_EX32(entry, GICH_LR0, CPUID)) | ||
46 | +#define GICH_LR_EOI(entry) (FIELD_EX32(entry, GICH_LR0, EOI)) | ||
47 | +#define GICH_LR_PRIORITY(entry) (FIELD_EX32(entry, GICH_LR0, Priority) << 3) | ||
48 | +#define GICH_LR_STATE(entry) (FIELD_EX32(entry, GICH_LR0, State)) | ||
49 | +#define GICH_LR_GROUP(entry) (FIELD_EX32(entry, GICH_LR0, Grp1)) | ||
50 | +#define GICH_LR_HW(entry) (FIELD_EX32(entry, GICH_LR0, HW)) | ||
51 | + | ||
52 | /* Valid bits for GICC_CTLR for GICv1, v1 with security extensions, | ||
53 | * GICv2 and GICv2 with security extensions: | ||
54 | */ | ||
55 | @@ -XXX,XX +XXX,XX @@ static inline bool gic_is_vcpu(int cpu) | ||
56 | return cpu >= GIC_NCPU; | ||
57 | } | ||
58 | |||
59 | +static inline int gic_get_vcpu_real_id(int cpu) | ||
60 | +{ | ||
61 | + return (cpu >= GIC_NCPU) ? (cpu - GIC_NCPU) : cpu; | ||
62 | +} | ||
63 | + | ||
64 | +/* Return true if the given vIRQ state exists in a LR and is either active or | ||
65 | + * pending and active. | ||
66 | + * | ||
67 | + * This function is used to check that a guest's `end of interrupt' or | ||
68 | + * `interrupts deactivation' request is valid, and matches with a LR of an | ||
69 | + * already acknowledged vIRQ (i.e. has the active bit set in its state). | ||
70 | + */ | ||
71 | +static inline bool gic_virq_is_valid(GICState *s, int irq, int vcpu) | ||
72 | +{ | ||
73 | + int cpu = gic_get_vcpu_real_id(vcpu); | ||
74 | + int lr_idx; | ||
75 | + | ||
76 | + for (lr_idx = 0; lr_idx < s->num_lrs; lr_idx++) { | ||
77 | + uint32_t *entry = &s->h_lr[lr_idx][cpu]; | ||
78 | + | ||
79 | + if ((GICH_LR_VIRT_ID(*entry) == irq) && | ||
80 | + (GICH_LR_STATE(*entry) & GICH_LR_STATE_ACTIVE)) { | ||
81 | + return true; | ||
82 | + } | ||
83 | + } | ||
84 | + | ||
85 | + return false; | ||
86 | +} | ||
87 | + | ||
88 | +/* Return a pointer on the LR entry matching the given vIRQ. | ||
89 | + * | ||
90 | + * This function is used to retrieve an LR for which we know for sure that the | ||
91 | + * corresponding vIRQ exists in the current context (i.e. its current state is | ||
92 | + * not `invalid'): | ||
93 | + * - Either the corresponding vIRQ has been validated with gic_virq_is_valid() | ||
94 | + * so it is `active' or `active and pending', | ||
95 | + * - Or it was pending and has been selected by gic_get_best_virq(). It is now | ||
96 | + * `pending', `active' or `active and pending', depending on what the guest | ||
97 | + * already did with this vIRQ. | ||
98 | + * | ||
99 | + * Having multiple LRs with the same VirtualID leads to UNPREDICTABLE | ||
100 | + * behaviour in the GIC. We choose to return the first one that matches. | ||
101 | + */ | ||
102 | +static inline uint32_t *gic_get_lr_entry(GICState *s, int irq, int vcpu) | ||
103 | +{ | ||
104 | + int cpu = gic_get_vcpu_real_id(vcpu); | ||
105 | + int lr_idx; | ||
106 | + | ||
107 | + for (lr_idx = 0; lr_idx < s->num_lrs; lr_idx++) { | ||
108 | + uint32_t *entry = &s->h_lr[lr_idx][cpu]; | ||
109 | + | ||
110 | + if ((GICH_LR_VIRT_ID(*entry) == irq) && | ||
111 | + (GICH_LR_STATE(*entry) != GICH_LR_STATE_INVALID)) { | ||
112 | + return entry; | ||
113 | + } | ||
114 | + } | ||
115 | + | ||
116 | + g_assert_not_reached(); | ||
117 | +} | ||
118 | + | ||
119 | #endif /* QEMU_ARM_GIC_INTERNAL_H */ | ||
120 | diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c | ||
121 | index XXXXXXX..XXXXXXX 100644 | ||
122 | --- a/hw/intc/arm_gic.c | ||
123 | +++ b/hw/intc/arm_gic.c | ||
124 | @@ -XXX,XX +XXX,XX @@ static inline int gic_get_current_cpu(GICState *s) | ||
125 | return 0; | ||
126 | } | ||
127 | |||
128 | +static inline int gic_get_current_vcpu(GICState *s) | ||
129 | +{ | ||
130 | + return gic_get_current_cpu(s) + GIC_NCPU; | ||
131 | +} | ||
132 | + | ||
133 | /* Return true if this GIC config has interrupt groups, which is | ||
134 | * true if we're a GICv2, or a GICv1 with the security extensions. | ||
135 | */ | ||
136 | -- | ||
137 | 2.18.0 | ||
138 | |||
139 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Luc Michel <luc.michel@greensocs.com> | ||
2 | 1 | ||
3 | An access to the CPU interface is non-secure if the current GIC instance | ||
4 | implements the security extensions, and the memory access is actually | ||
5 | non-secure. Until then, it was checked with tests such as | ||
6 | if (s->security_extn && !attrs.secure) { ... } | ||
7 | in various places of the CPU interface code. | ||
8 | |||
9 | With the implementation of the virtualization extensions, those tests | ||
10 | must be updated to take into account whether we are in a vCPU interface | ||
11 | or not. This is because the exposed vCPU interface does not implement | ||
12 | security extensions. | ||
13 | |||
14 | This commits replaces all those tests with a call to the | ||
15 | gic_cpu_ns_access() function to check if the current access to the CPU | ||
16 | interface is non-secure. This function takes into account whether the | ||
17 | current CPU is a vCPU or not. | ||
18 | |||
19 | Note that this function is used only in the (v)CPU interface code path. | ||
20 | The distributor code path is left unchanged, as the distributor is not | ||
21 | exposed to vCPUs at all. | ||
22 | |||
23 | Signed-off-by: Luc Michel <luc.michel@greensocs.com> | ||
24 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
25 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
26 | Message-id: 20180727095421.386-9-luc.michel@greensocs.com | ||
27 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
28 | --- | ||
29 | hw/intc/arm_gic.c | 39 ++++++++++++++++++++++----------------- | ||
30 | 1 file changed, 22 insertions(+), 17 deletions(-) | ||
31 | |||
32 | diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c | ||
33 | index XXXXXXX..XXXXXXX 100644 | ||
34 | --- a/hw/intc/arm_gic.c | ||
35 | +++ b/hw/intc/arm_gic.c | ||
36 | @@ -XXX,XX +XXX,XX @@ static inline bool gic_has_groups(GICState *s) | ||
37 | return s->revision == 2 || s->security_extn; | ||
38 | } | ||
39 | |||
40 | +static inline bool gic_cpu_ns_access(GICState *s, int cpu, MemTxAttrs attrs) | ||
41 | +{ | ||
42 | + return !gic_is_vcpu(cpu) && s->security_extn && !attrs.secure; | ||
43 | +} | ||
44 | + | ||
45 | /* TODO: Many places that call this routine could be optimized. */ | ||
46 | /* Update interrupt status after enabled or pending bits have been changed. */ | ||
47 | static void gic_update(GICState *s) | ||
48 | @@ -XXX,XX +XXX,XX @@ static uint16_t gic_get_current_pending_irq(GICState *s, int cpu, | ||
49 | /* On a GIC without the security extensions, reading this register | ||
50 | * behaves in the same way as a secure access to a GIC with them. | ||
51 | */ | ||
52 | - bool secure = !s->security_extn || attrs.secure; | ||
53 | + bool secure = !gic_cpu_ns_access(s, cpu, attrs); | ||
54 | |||
55 | if (group == 0 && !secure) { | ||
56 | /* Group0 interrupts hidden from Non-secure access */ | ||
57 | @@ -XXX,XX +XXX,XX @@ static uint32_t gic_dist_get_priority(GICState *s, int cpu, int irq, | ||
58 | static void gic_set_priority_mask(GICState *s, int cpu, uint8_t pmask, | ||
59 | MemTxAttrs attrs) | ||
60 | { | ||
61 | - if (s->security_extn && !attrs.secure) { | ||
62 | + if (gic_cpu_ns_access(s, cpu, attrs)) { | ||
63 | if (s->priority_mask[cpu] & 0x80) { | ||
64 | /* Priority Mask in upper half */ | ||
65 | pmask = 0x80 | (pmask >> 1); | ||
66 | @@ -XXX,XX +XXX,XX @@ static uint32_t gic_get_priority_mask(GICState *s, int cpu, MemTxAttrs attrs) | ||
67 | { | ||
68 | uint32_t pmask = s->priority_mask[cpu]; | ||
69 | |||
70 | - if (s->security_extn && !attrs.secure) { | ||
71 | + if (gic_cpu_ns_access(s, cpu, attrs)) { | ||
72 | if (pmask & 0x80) { | ||
73 | /* Priority Mask in upper half, return Non-secure view */ | ||
74 | pmask = (pmask << 1) & 0xff; | ||
75 | @@ -XXX,XX +XXX,XX @@ static uint32_t gic_get_cpu_control(GICState *s, int cpu, MemTxAttrs attrs) | ||
76 | { | ||
77 | uint32_t ret = s->cpu_ctlr[cpu]; | ||
78 | |||
79 | - if (s->security_extn && !attrs.secure) { | ||
80 | + if (gic_cpu_ns_access(s, cpu, attrs)) { | ||
81 | /* Construct the NS banked view of GICC_CTLR from the correct | ||
82 | * bits of the S banked view. We don't need to move the bypass | ||
83 | * control bits because we don't implement that (IMPDEF) part | ||
84 | @@ -XXX,XX +XXX,XX @@ static void gic_set_cpu_control(GICState *s, int cpu, uint32_t value, | ||
85 | { | ||
86 | uint32_t mask; | ||
87 | |||
88 | - if (s->security_extn && !attrs.secure) { | ||
89 | + if (gic_cpu_ns_access(s, cpu, attrs)) { | ||
90 | /* The NS view can only write certain bits in the register; | ||
91 | * the rest are unchanged | ||
92 | */ | ||
93 | @@ -XXX,XX +XXX,XX @@ static uint8_t gic_get_running_priority(GICState *s, int cpu, MemTxAttrs attrs) | ||
94 | return 0xff; | ||
95 | } | ||
96 | |||
97 | - if (s->security_extn && !attrs.secure) { | ||
98 | + if (gic_cpu_ns_access(s, cpu, attrs)) { | ||
99 | if (s->running_priority[cpu] & 0x80) { | ||
100 | /* Running priority in upper half of range: return the Non-secure | ||
101 | * view of the priority. | ||
102 | @@ -XXX,XX +XXX,XX @@ static bool gic_eoi_split(GICState *s, int cpu, MemTxAttrs attrs) | ||
103 | /* Before GICv2 prio-drop and deactivate are not separable */ | ||
104 | return false; | ||
105 | } | ||
106 | - if (s->security_extn && !attrs.secure) { | ||
107 | + if (gic_cpu_ns_access(s, cpu, attrs)) { | ||
108 | return s->cpu_ctlr[cpu] & GICC_CTLR_EOIMODE_NS; | ||
109 | } | ||
110 | return s->cpu_ctlr[cpu] & GICC_CTLR_EOIMODE; | ||
111 | @@ -XXX,XX +XXX,XX @@ static void gic_deactivate_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs) | ||
112 | return; | ||
113 | } | ||
114 | |||
115 | - if (s->security_extn && !attrs.secure && !group) { | ||
116 | + if (gic_cpu_ns_access(s, cpu, attrs) && !group) { | ||
117 | DPRINTF("Non-secure DI for Group0 interrupt %d ignored\n", irq); | ||
118 | return; | ||
119 | } | ||
120 | @@ -XXX,XX +XXX,XX @@ static void gic_complete_irq(GICState *s, int cpu, int irq, MemTxAttrs attrs) | ||
121 | |||
122 | group = gic_has_groups(s) && GIC_DIST_TEST_GROUP(irq, cm); | ||
123 | |||
124 | - if (s->security_extn && !attrs.secure && !group) { | ||
125 | + if (gic_cpu_ns_access(s, cpu, attrs) && !group) { | ||
126 | DPRINTF("Non-secure EOI for Group0 interrupt %d ignored\n", irq); | ||
127 | return; | ||
128 | } | ||
129 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_cpu_read(GICState *s, int cpu, int offset, | ||
130 | *data = gic_get_priority_mask(s, cpu, attrs); | ||
131 | break; | ||
132 | case 0x08: /* Binary Point */ | ||
133 | - if (s->security_extn && !attrs.secure) { | ||
134 | + if (gic_cpu_ns_access(s, cpu, attrs)) { | ||
135 | if (s->cpu_ctlr[cpu] & GICC_CTLR_CBPR) { | ||
136 | /* NS view of BPR when CBPR is 1 */ | ||
137 | *data = MIN(s->bpr[cpu] + 1, 7); | ||
138 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_cpu_read(GICState *s, int cpu, int offset, | ||
139 | * With security extensions, secure access: ABPR (alias of NS BPR) | ||
140 | * With security extensions, nonsecure access: RAZ/WI | ||
141 | */ | ||
142 | - if (!gic_has_groups(s) || (s->security_extn && !attrs.secure)) { | ||
143 | + if (!gic_has_groups(s) || (gic_cpu_ns_access(s, cpu, attrs))) { | ||
144 | *data = 0; | ||
145 | } else { | ||
146 | *data = s->abpr[cpu]; | ||
147 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_cpu_read(GICState *s, int cpu, int offset, | ||
148 | |||
149 | if (regno >= GIC_NR_APRS || s->revision != 2) { | ||
150 | *data = 0; | ||
151 | - } else if (s->security_extn && !attrs.secure) { | ||
152 | + } else if (gic_cpu_ns_access(s, cpu, attrs)) { | ||
153 | /* NS view of GICC_APR<n> is the top half of GIC_NSAPR<n> */ | ||
154 | *data = gic_apr_ns_view(s, regno, cpu); | ||
155 | } else { | ||
156 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_cpu_read(GICState *s, int cpu, int offset, | ||
157 | int regno = (offset - 0xe0) / 4; | ||
158 | |||
159 | if (regno >= GIC_NR_APRS || s->revision != 2 || !gic_has_groups(s) || | ||
160 | - (s->security_extn && !attrs.secure)) { | ||
161 | + gic_cpu_ns_access(s, cpu, attrs)) { | ||
162 | *data = 0; | ||
163 | } else { | ||
164 | *data = s->nsapr[regno][cpu]; | ||
165 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_cpu_write(GICState *s, int cpu, int offset, | ||
166 | gic_set_priority_mask(s, cpu, value, attrs); | ||
167 | break; | ||
168 | case 0x08: /* Binary Point */ | ||
169 | - if (s->security_extn && !attrs.secure) { | ||
170 | + if (gic_cpu_ns_access(s, cpu, attrs)) { | ||
171 | if (s->cpu_ctlr[cpu] & GICC_CTLR_CBPR) { | ||
172 | /* WI when CBPR is 1 */ | ||
173 | return MEMTX_OK; | ||
174 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_cpu_write(GICState *s, int cpu, int offset, | ||
175 | gic_complete_irq(s, cpu, value & 0x3ff, attrs); | ||
176 | return MEMTX_OK; | ||
177 | case 0x1c: /* Aliased Binary Point */ | ||
178 | - if (!gic_has_groups(s) || (s->security_extn && !attrs.secure)) { | ||
179 | + if (!gic_has_groups(s) || (gic_cpu_ns_access(s, cpu, attrs))) { | ||
180 | /* unimplemented, or NS access: RAZ/WI */ | ||
181 | return MEMTX_OK; | ||
182 | } else { | ||
183 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_cpu_write(GICState *s, int cpu, int offset, | ||
184 | if (regno >= GIC_NR_APRS || s->revision != 2) { | ||
185 | return MEMTX_OK; | ||
186 | } | ||
187 | - if (s->security_extn && !attrs.secure) { | ||
188 | + if (gic_cpu_ns_access(s, cpu, attrs)) { | ||
189 | /* NS view of GICC_APR<n> is the top half of GIC_NSAPR<n> */ | ||
190 | gic_apr_write_ns_view(s, regno, cpu, value); | ||
191 | } else { | ||
192 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_cpu_write(GICState *s, int cpu, int offset, | ||
193 | if (regno >= GIC_NR_APRS || s->revision != 2) { | ||
194 | return MEMTX_OK; | ||
195 | } | ||
196 | - if (!gic_has_groups(s) || (s->security_extn && !attrs.secure)) { | ||
197 | + if (!gic_has_groups(s) || (gic_cpu_ns_access(s, cpu, attrs))) { | ||
198 | return MEMTX_OK; | ||
199 | } | ||
200 | s->nsapr[regno][cpu] = value; | ||
201 | -- | ||
202 | 2.18.0 | ||
203 | |||
204 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Luc Michel <luc.michel@greensocs.com> | ||
2 | 1 | ||
3 | Implement virtualization extensions in gic_activate_irq() and | ||
4 | gic_drop_prio() and in gic_get_prio_from_apr_bits() called by | ||
5 | gic_drop_prio(). | ||
6 | |||
7 | When the current CPU is a vCPU: | ||
8 | - Use GIC_VIRT_MIN_BPR and GIC_VIRT_NR_APRS instead of their non-virt | ||
9 | counterparts, | ||
10 | - the vCPU APR is stored in the virtual interface, in h_apr. | ||
11 | |||
12 | Signed-off-by: Luc Michel <luc.michel@greensocs.com> | ||
13 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
14 | Message-id: 20180727095421.386-11-luc.michel@greensocs.com | ||
15 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
16 | --- | ||
17 | hw/intc/arm_gic.c | 50 +++++++++++++++++++++++++++++++++++------------ | ||
18 | 1 file changed, 38 insertions(+), 12 deletions(-) | ||
19 | |||
20 | diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c | ||
21 | index XXXXXXX..XXXXXXX 100644 | ||
22 | --- a/hw/intc/arm_gic.c | ||
23 | +++ b/hw/intc/arm_gic.c | ||
24 | @@ -XXX,XX +XXX,XX @@ static void gic_activate_irq(GICState *s, int cpu, int irq) | ||
25 | * and update the running priority. | ||
26 | */ | ||
27 | int prio = gic_get_group_priority(s, cpu, irq); | ||
28 | - int preemption_level = prio >> (GIC_MIN_BPR + 1); | ||
29 | + int min_bpr = gic_is_vcpu(cpu) ? GIC_VIRT_MIN_BPR : GIC_MIN_BPR; | ||
30 | + int preemption_level = prio >> (min_bpr + 1); | ||
31 | int regno = preemption_level / 32; | ||
32 | int bitno = preemption_level % 32; | ||
33 | + uint32_t *papr = NULL; | ||
34 | |||
35 | - if (gic_has_groups(s) && gic_test_group(s, irq, cpu)) { | ||
36 | - s->nsapr[regno][cpu] |= (1 << bitno); | ||
37 | + if (gic_is_vcpu(cpu)) { | ||
38 | + assert(regno == 0); | ||
39 | + papr = &s->h_apr[gic_get_vcpu_real_id(cpu)]; | ||
40 | + } else if (gic_has_groups(s) && gic_test_group(s, irq, cpu)) { | ||
41 | + papr = &s->nsapr[regno][cpu]; | ||
42 | } else { | ||
43 | - s->apr[regno][cpu] |= (1 << bitno); | ||
44 | + papr = &s->apr[regno][cpu]; | ||
45 | } | ||
46 | |||
47 | + *papr |= (1 << bitno); | ||
48 | + | ||
49 | s->running_priority[cpu] = prio; | ||
50 | gic_set_active(s, irq, cpu); | ||
51 | } | ||
52 | @@ -XXX,XX +XXX,XX @@ static int gic_get_prio_from_apr_bits(GICState *s, int cpu) | ||
53 | * on the set bits in the Active Priority Registers. | ||
54 | */ | ||
55 | int i; | ||
56 | + | ||
57 | + if (gic_is_vcpu(cpu)) { | ||
58 | + uint32_t apr = s->h_apr[gic_get_vcpu_real_id(cpu)]; | ||
59 | + if (apr) { | ||
60 | + return ctz32(apr) << (GIC_VIRT_MIN_BPR + 1); | ||
61 | + } else { | ||
62 | + return 0x100; | ||
63 | + } | ||
64 | + } | ||
65 | + | ||
66 | for (i = 0; i < GIC_NR_APRS; i++) { | ||
67 | uint32_t apr = s->apr[i][cpu] | s->nsapr[i][cpu]; | ||
68 | if (!apr) { | ||
69 | @@ -XXX,XX +XXX,XX @@ static void gic_drop_prio(GICState *s, int cpu, int group) | ||
70 | * running priority will be wrong, so interrupts that should preempt | ||
71 | * might not do so, and interrupts that should not preempt might do so. | ||
72 | */ | ||
73 | - int i; | ||
74 | + if (gic_is_vcpu(cpu)) { | ||
75 | + int rcpu = gic_get_vcpu_real_id(cpu); | ||
76 | |||
77 | - for (i = 0; i < GIC_NR_APRS; i++) { | ||
78 | - uint32_t *papr = group ? &s->nsapr[i][cpu] : &s->apr[i][cpu]; | ||
79 | - if (!*papr) { | ||
80 | - continue; | ||
81 | + if (s->h_apr[rcpu]) { | ||
82 | + /* Clear lowest set bit */ | ||
83 | + s->h_apr[rcpu] &= s->h_apr[rcpu] - 1; | ||
84 | + } | ||
85 | + } else { | ||
86 | + int i; | ||
87 | + | ||
88 | + for (i = 0; i < GIC_NR_APRS; i++) { | ||
89 | + uint32_t *papr = group ? &s->nsapr[i][cpu] : &s->apr[i][cpu]; | ||
90 | + if (!*papr) { | ||
91 | + continue; | ||
92 | + } | ||
93 | + /* Clear lowest set bit */ | ||
94 | + *papr &= *papr - 1; | ||
95 | + break; | ||
96 | } | ||
97 | - /* Clear lowest set bit */ | ||
98 | - *papr &= *papr - 1; | ||
99 | - break; | ||
100 | } | ||
101 | |||
102 | s->running_priority[cpu] = gic_get_prio_from_apr_bits(s, cpu); | ||
103 | -- | ||
104 | 2.18.0 | ||
105 | |||
106 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Luc Michel <luc.michel@greensocs.com> | ||
2 | 1 | ||
3 | Implement virtualization extensions in the gic_acknowledge_irq() | ||
4 | function. This function changes the state of the highest priority IRQ | ||
5 | from pending to active. | ||
6 | |||
7 | When the current CPU is a vCPU, modifying the state of an IRQ modifies | ||
8 | the corresponding LR entry. However if we clear the pending flag before | ||
9 | setting the active one, we lose track of the LR entry as it becomes | ||
10 | invalid. The next call to gic_get_lr_entry() will fail. | ||
11 | |||
12 | To overcome this issue, we call gic_activate_irq() before | ||
13 | gic_clear_pending(). This does not change the general behaviour of | ||
14 | gic_acknowledge_irq. | ||
15 | |||
16 | We also move the SGI case in gic_clear_pending_sgi() to enhance | ||
17 | code readability as the virtualization extensions support adds a if-else | ||
18 | level. | ||
19 | |||
20 | Signed-off-by: Luc Michel <luc.michel@greensocs.com> | ||
21 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
22 | Message-id: 20180727095421.386-12-luc.michel@greensocs.com | ||
23 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
24 | --- | ||
25 | hw/intc/arm_gic.c | 52 ++++++++++++++++++++++++++++++----------------- | ||
26 | 1 file changed, 33 insertions(+), 19 deletions(-) | ||
27 | |||
28 | diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c | ||
29 | index XXXXXXX..XXXXXXX 100644 | ||
30 | --- a/hw/intc/arm_gic.c | ||
31 | +++ b/hw/intc/arm_gic.c | ||
32 | @@ -XXX,XX +XXX,XX @@ static void gic_drop_prio(GICState *s, int cpu, int group) | ||
33 | s->running_priority[cpu] = gic_get_prio_from_apr_bits(s, cpu); | ||
34 | } | ||
35 | |||
36 | +static inline uint32_t gic_clear_pending_sgi(GICState *s, int irq, int cpu) | ||
37 | +{ | ||
38 | + int src; | ||
39 | + uint32_t ret; | ||
40 | + | ||
41 | + if (!gic_is_vcpu(cpu)) { | ||
42 | + /* Lookup the source CPU for the SGI and clear this in the | ||
43 | + * sgi_pending map. Return the src and clear the overall pending | ||
44 | + * state on this CPU if the SGI is not pending from any CPUs. | ||
45 | + */ | ||
46 | + assert(s->sgi_pending[irq][cpu] != 0); | ||
47 | + src = ctz32(s->sgi_pending[irq][cpu]); | ||
48 | + s->sgi_pending[irq][cpu] &= ~(1 << src); | ||
49 | + if (s->sgi_pending[irq][cpu] == 0) { | ||
50 | + gic_clear_pending(s, irq, cpu); | ||
51 | + } | ||
52 | + ret = irq | ((src & 0x7) << 10); | ||
53 | + } else { | ||
54 | + uint32_t *lr_entry = gic_get_lr_entry(s, irq, cpu); | ||
55 | + src = GICH_LR_CPUID(*lr_entry); | ||
56 | + | ||
57 | + gic_clear_pending(s, irq, cpu); | ||
58 | + ret = irq | (src << 10); | ||
59 | + } | ||
60 | + | ||
61 | + return ret; | ||
62 | +} | ||
63 | + | ||
64 | uint32_t gic_acknowledge_irq(GICState *s, int cpu, MemTxAttrs attrs) | ||
65 | { | ||
66 | - int ret, irq, src; | ||
67 | - int cm = 1 << cpu; | ||
68 | + int ret, irq; | ||
69 | |||
70 | /* gic_get_current_pending_irq() will return 1022 or 1023 appropriately | ||
71 | * for the case where this GIC supports grouping and the pending interrupt | ||
72 | * is in the wrong group. | ||
73 | */ | ||
74 | irq = gic_get_current_pending_irq(s, cpu, attrs); | ||
75 | - trace_gic_acknowledge_irq(cpu, irq); | ||
76 | + trace_gic_acknowledge_irq(gic_get_vcpu_real_id(cpu), irq); | ||
77 | |||
78 | if (irq >= GIC_MAXIRQ) { | ||
79 | DPRINTF("ACK, no pending interrupt or it is hidden: %d\n", irq); | ||
80 | @@ -XXX,XX +XXX,XX @@ uint32_t gic_acknowledge_irq(GICState *s, int cpu, MemTxAttrs attrs) | ||
81 | return 1023; | ||
82 | } | ||
83 | |||
84 | + gic_activate_irq(s, cpu, irq); | ||
85 | + | ||
86 | if (s->revision == REV_11MPCORE) { | ||
87 | /* Clear pending flags for both level and edge triggered interrupts. | ||
88 | * Level triggered IRQs will be reasserted once they become inactive. | ||
89 | @@ -XXX,XX +XXX,XX @@ uint32_t gic_acknowledge_irq(GICState *s, int cpu, MemTxAttrs attrs) | ||
90 | ret = irq; | ||
91 | } else { | ||
92 | if (irq < GIC_NR_SGIS) { | ||
93 | - /* Lookup the source CPU for the SGI and clear this in the | ||
94 | - * sgi_pending map. Return the src and clear the overall pending | ||
95 | - * state on this CPU if the SGI is not pending from any CPUs. | ||
96 | - */ | ||
97 | - assert(s->sgi_pending[irq][cpu] != 0); | ||
98 | - src = ctz32(s->sgi_pending[irq][cpu]); | ||
99 | - s->sgi_pending[irq][cpu] &= ~(1 << src); | ||
100 | - if (s->sgi_pending[irq][cpu] == 0) { | ||
101 | - gic_clear_pending(s, irq, cpu); | ||
102 | - } | ||
103 | - ret = irq | ((src & 0x7) << 10); | ||
104 | + ret = gic_clear_pending_sgi(s, irq, cpu); | ||
105 | } else { | ||
106 | - /* Clear pending state for both level and edge triggered | ||
107 | - * interrupts. (level triggered interrupts with an active line | ||
108 | - * remain pending, see gic_test_pending) | ||
109 | - */ | ||
110 | gic_clear_pending(s, irq, cpu); | ||
111 | ret = irq; | ||
112 | } | ||
113 | } | ||
114 | |||
115 | - gic_activate_irq(s, cpu, irq); | ||
116 | gic_update(s); | ||
117 | DPRINTF("ACK %d\n", irq); | ||
118 | return ret; | ||
119 | -- | ||
120 | 2.18.0 | ||
121 | |||
122 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Luc Michel <luc.michel@greensocs.com> | ||
2 | 1 | ||
3 | Implement virtualization extensions in the gic_cpu_read() and | ||
4 | gic_cpu_write() functions. Those are the last bits missing to fully | ||
5 | support virtualization extensions in the CPU interface path. | ||
6 | |||
7 | Signed-off-by: Luc Michel <luc.michel@greensocs.com> | ||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | Message-id: 20180727095421.386-14-luc.michel@greensocs.com | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | --- | ||
12 | hw/intc/arm_gic.c | 20 +++++++++++++++----- | ||
13 | 1 file changed, 15 insertions(+), 5 deletions(-) | ||
14 | |||
15 | diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c | ||
16 | index XXXXXXX..XXXXXXX 100644 | ||
17 | --- a/hw/intc/arm_gic.c | ||
18 | +++ b/hw/intc/arm_gic.c | ||
19 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_cpu_read(GICState *s, int cpu, int offset, | ||
20 | case 0xd0: case 0xd4: case 0xd8: case 0xdc: | ||
21 | { | ||
22 | int regno = (offset - 0xd0) / 4; | ||
23 | + int nr_aprs = gic_is_vcpu(cpu) ? GIC_VIRT_NR_APRS : GIC_NR_APRS; | ||
24 | |||
25 | - if (regno >= GIC_NR_APRS || s->revision != 2) { | ||
26 | + if (regno >= nr_aprs || s->revision != 2) { | ||
27 | *data = 0; | ||
28 | + } else if (gic_is_vcpu(cpu)) { | ||
29 | + *data = s->h_apr[gic_get_vcpu_real_id(cpu)]; | ||
30 | } else if (gic_cpu_ns_access(s, cpu, attrs)) { | ||
31 | /* NS view of GICC_APR<n> is the top half of GIC_NSAPR<n> */ | ||
32 | *data = gic_apr_ns_view(s, regno, cpu); | ||
33 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_cpu_read(GICState *s, int cpu, int offset, | ||
34 | int regno = (offset - 0xe0) / 4; | ||
35 | |||
36 | if (regno >= GIC_NR_APRS || s->revision != 2 || !gic_has_groups(s) || | ||
37 | - gic_cpu_ns_access(s, cpu, attrs)) { | ||
38 | + gic_cpu_ns_access(s, cpu, attrs) || gic_is_vcpu(cpu)) { | ||
39 | *data = 0; | ||
40 | } else { | ||
41 | *data = s->nsapr[regno][cpu]; | ||
42 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_cpu_write(GICState *s, int cpu, int offset, | ||
43 | s->abpr[cpu] = MAX(value & 0x7, GIC_MIN_ABPR); | ||
44 | } | ||
45 | } else { | ||
46 | - s->bpr[cpu] = MAX(value & 0x7, GIC_MIN_BPR); | ||
47 | + int min_bpr = gic_is_vcpu(cpu) ? GIC_VIRT_MIN_BPR : GIC_MIN_BPR; | ||
48 | + s->bpr[cpu] = MAX(value & 0x7, min_bpr); | ||
49 | } | ||
50 | break; | ||
51 | case 0x10: /* End Of Interrupt */ | ||
52 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_cpu_write(GICState *s, int cpu, int offset, | ||
53 | case 0xd0: case 0xd4: case 0xd8: case 0xdc: | ||
54 | { | ||
55 | int regno = (offset - 0xd0) / 4; | ||
56 | + int nr_aprs = gic_is_vcpu(cpu) ? GIC_VIRT_NR_APRS : GIC_NR_APRS; | ||
57 | |||
58 | - if (regno >= GIC_NR_APRS || s->revision != 2) { | ||
59 | + if (regno >= nr_aprs || s->revision != 2) { | ||
60 | return MEMTX_OK; | ||
61 | } | ||
62 | - if (gic_cpu_ns_access(s, cpu, attrs)) { | ||
63 | + if (gic_is_vcpu(cpu)) { | ||
64 | + s->h_apr[gic_get_vcpu_real_id(cpu)] = value; | ||
65 | + } else if (gic_cpu_ns_access(s, cpu, attrs)) { | ||
66 | /* NS view of GICC_APR<n> is the top half of GIC_NSAPR<n> */ | ||
67 | gic_apr_write_ns_view(s, regno, cpu, value); | ||
68 | } else { | ||
69 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_cpu_write(GICState *s, int cpu, int offset, | ||
70 | if (regno >= GIC_NR_APRS || s->revision != 2) { | ||
71 | return MEMTX_OK; | ||
72 | } | ||
73 | + if (gic_is_vcpu(cpu)) { | ||
74 | + return MEMTX_OK; | ||
75 | + } | ||
76 | if (!gic_has_groups(s) || (gic_cpu_ns_access(s, cpu, attrs))) { | ||
77 | return MEMTX_OK; | ||
78 | } | ||
79 | -- | ||
80 | 2.18.0 | ||
81 | |||
82 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Luc Michel <luc.michel@greensocs.com> | ||
2 | 1 | ||
3 | Implement the read and write functions for the virtual interface of the | ||
4 | virtualization extensions in the GICv2. | ||
5 | |||
6 | One mirror region per CPU is also created, which maps to that specific | ||
7 | CPU id. This is required by the GIC architecture specification. | ||
8 | |||
9 | Signed-off-by: Luc Michel <luc.michel@greensocs.com> | ||
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | Message-id: 20180727095421.386-16-luc.michel@greensocs.com | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
13 | --- | ||
14 | hw/intc/arm_gic.c | 235 +++++++++++++++++++++++++++++++++++++++++++++- | ||
15 | 1 file changed, 233 insertions(+), 2 deletions(-) | ||
16 | |||
17 | diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c | ||
18 | index XXXXXXX..XXXXXXX 100644 | ||
19 | --- a/hw/intc/arm_gic.c | ||
20 | +++ b/hw/intc/arm_gic.c | ||
21 | @@ -XXX,XX +XXX,XX @@ static void gic_update(GICState *s) | ||
22 | } | ||
23 | } | ||
24 | |||
25 | +/* Return true if this LR is empty, i.e. the corresponding bit | ||
26 | + * in ELRSR is set. | ||
27 | + */ | ||
28 | +static inline bool gic_lr_entry_is_free(uint32_t entry) | ||
29 | +{ | ||
30 | + return (GICH_LR_STATE(entry) == GICH_LR_STATE_INVALID) | ||
31 | + && (GICH_LR_HW(entry) || !GICH_LR_EOI(entry)); | ||
32 | +} | ||
33 | + | ||
34 | +/* Return true if this LR should trigger an EOI maintenance interrupt, i.e. the | ||
35 | + * corrsponding bit in EISR is set. | ||
36 | + */ | ||
37 | +static inline bool gic_lr_entry_is_eoi(uint32_t entry) | ||
38 | +{ | ||
39 | + return (GICH_LR_STATE(entry) == GICH_LR_STATE_INVALID) | ||
40 | + && !GICH_LR_HW(entry) && GICH_LR_EOI(entry); | ||
41 | +} | ||
42 | + | ||
43 | static void gic_set_irq_11mpcore(GICState *s, int irq, int level, | ||
44 | int cm, int target) | ||
45 | { | ||
46 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_thisvcpu_write(void *opaque, hwaddr addr, | ||
47 | return gic_cpu_write(s, gic_get_current_vcpu(s), addr, value, attrs); | ||
48 | } | ||
49 | |||
50 | +static uint32_t gic_compute_eisr(GICState *s, int cpu, int lr_start) | ||
51 | +{ | ||
52 | + int lr_idx; | ||
53 | + uint32_t ret = 0; | ||
54 | + | ||
55 | + for (lr_idx = lr_start; lr_idx < s->num_lrs; lr_idx++) { | ||
56 | + uint32_t *entry = &s->h_lr[lr_idx][cpu]; | ||
57 | + ret = deposit32(ret, lr_idx - lr_start, 1, | ||
58 | + gic_lr_entry_is_eoi(*entry)); | ||
59 | + } | ||
60 | + | ||
61 | + return ret; | ||
62 | +} | ||
63 | + | ||
64 | +static uint32_t gic_compute_elrsr(GICState *s, int cpu, int lr_start) | ||
65 | +{ | ||
66 | + int lr_idx; | ||
67 | + uint32_t ret = 0; | ||
68 | + | ||
69 | + for (lr_idx = lr_start; lr_idx < s->num_lrs; lr_idx++) { | ||
70 | + uint32_t *entry = &s->h_lr[lr_idx][cpu]; | ||
71 | + ret = deposit32(ret, lr_idx - lr_start, 1, | ||
72 | + gic_lr_entry_is_free(*entry)); | ||
73 | + } | ||
74 | + | ||
75 | + return ret; | ||
76 | +} | ||
77 | + | ||
78 | +static void gic_vmcr_write(GICState *s, uint32_t value, MemTxAttrs attrs) | ||
79 | +{ | ||
80 | + int vcpu = gic_get_current_vcpu(s); | ||
81 | + uint32_t ctlr; | ||
82 | + uint32_t abpr; | ||
83 | + uint32_t bpr; | ||
84 | + uint32_t prio_mask; | ||
85 | + | ||
86 | + ctlr = FIELD_EX32(value, GICH_VMCR, VMCCtlr); | ||
87 | + abpr = FIELD_EX32(value, GICH_VMCR, VMABP); | ||
88 | + bpr = FIELD_EX32(value, GICH_VMCR, VMBP); | ||
89 | + prio_mask = FIELD_EX32(value, GICH_VMCR, VMPriMask) << 3; | ||
90 | + | ||
91 | + gic_set_cpu_control(s, vcpu, ctlr, attrs); | ||
92 | + s->abpr[vcpu] = MAX(abpr, GIC_VIRT_MIN_ABPR); | ||
93 | + s->bpr[vcpu] = MAX(bpr, GIC_VIRT_MIN_BPR); | ||
94 | + gic_set_priority_mask(s, vcpu, prio_mask, attrs); | ||
95 | +} | ||
96 | + | ||
97 | +static MemTxResult gic_hyp_read(void *opaque, int cpu, hwaddr addr, | ||
98 | + uint64_t *data, MemTxAttrs attrs) | ||
99 | +{ | ||
100 | + GICState *s = ARM_GIC(opaque); | ||
101 | + int vcpu = cpu + GIC_NCPU; | ||
102 | + | ||
103 | + switch (addr) { | ||
104 | + case A_GICH_HCR: /* Hypervisor Control */ | ||
105 | + *data = s->h_hcr[cpu]; | ||
106 | + break; | ||
107 | + | ||
108 | + case A_GICH_VTR: /* VGIC Type */ | ||
109 | + *data = FIELD_DP32(0, GICH_VTR, ListRegs, s->num_lrs - 1); | ||
110 | + *data = FIELD_DP32(*data, GICH_VTR, PREbits, | ||
111 | + GIC_VIRT_MAX_GROUP_PRIO_BITS - 1); | ||
112 | + *data = FIELD_DP32(*data, GICH_VTR, PRIbits, | ||
113 | + (7 - GIC_VIRT_MIN_BPR) - 1); | ||
114 | + break; | ||
115 | + | ||
116 | + case A_GICH_VMCR: /* Virtual Machine Control */ | ||
117 | + *data = FIELD_DP32(0, GICH_VMCR, VMCCtlr, | ||
118 | + extract32(s->cpu_ctlr[vcpu], 0, 10)); | ||
119 | + *data = FIELD_DP32(*data, GICH_VMCR, VMABP, s->abpr[vcpu]); | ||
120 | + *data = FIELD_DP32(*data, GICH_VMCR, VMBP, s->bpr[vcpu]); | ||
121 | + *data = FIELD_DP32(*data, GICH_VMCR, VMPriMask, | ||
122 | + extract32(s->priority_mask[vcpu], 3, 5)); | ||
123 | + break; | ||
124 | + | ||
125 | + case A_GICH_MISR: /* Maintenance Interrupt Status */ | ||
126 | + *data = s->h_misr[cpu]; | ||
127 | + break; | ||
128 | + | ||
129 | + case A_GICH_EISR0: /* End of Interrupt Status 0 and 1 */ | ||
130 | + case A_GICH_EISR1: | ||
131 | + *data = gic_compute_eisr(s, cpu, (addr - A_GICH_EISR0) * 8); | ||
132 | + break; | ||
133 | + | ||
134 | + case A_GICH_ELRSR0: /* Empty List Status 0 and 1 */ | ||
135 | + case A_GICH_ELRSR1: | ||
136 | + *data = gic_compute_elrsr(s, cpu, (addr - A_GICH_ELRSR0) * 8); | ||
137 | + break; | ||
138 | + | ||
139 | + case A_GICH_APR: /* Active Priorities */ | ||
140 | + *data = s->h_apr[cpu]; | ||
141 | + break; | ||
142 | + | ||
143 | + case A_GICH_LR0 ... A_GICH_LR63: /* List Registers */ | ||
144 | + { | ||
145 | + int lr_idx = (addr - A_GICH_LR0) / 4; | ||
146 | + | ||
147 | + if (lr_idx > s->num_lrs) { | ||
148 | + *data = 0; | ||
149 | + } else { | ||
150 | + *data = s->h_lr[lr_idx][cpu]; | ||
151 | + } | ||
152 | + break; | ||
153 | + } | ||
154 | + | ||
155 | + default: | ||
156 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
157 | + "gic_hyp_read: Bad offset %" HWADDR_PRIx "\n", addr); | ||
158 | + return MEMTX_OK; | ||
159 | + } | ||
160 | + | ||
161 | + return MEMTX_OK; | ||
162 | +} | ||
163 | + | ||
164 | +static MemTxResult gic_hyp_write(void *opaque, int cpu, hwaddr addr, | ||
165 | + uint64_t value, MemTxAttrs attrs) | ||
166 | +{ | ||
167 | + GICState *s = ARM_GIC(opaque); | ||
168 | + int vcpu = cpu + GIC_NCPU; | ||
169 | + | ||
170 | + switch (addr) { | ||
171 | + case A_GICH_HCR: /* Hypervisor Control */ | ||
172 | + s->h_hcr[cpu] = value & GICH_HCR_MASK; | ||
173 | + break; | ||
174 | + | ||
175 | + case A_GICH_VMCR: /* Virtual Machine Control */ | ||
176 | + gic_vmcr_write(s, value, attrs); | ||
177 | + break; | ||
178 | + | ||
179 | + case A_GICH_APR: /* Active Priorities */ | ||
180 | + s->h_apr[cpu] = value; | ||
181 | + s->running_priority[vcpu] = gic_get_prio_from_apr_bits(s, vcpu); | ||
182 | + break; | ||
183 | + | ||
184 | + case A_GICH_LR0 ... A_GICH_LR63: /* List Registers */ | ||
185 | + { | ||
186 | + int lr_idx = (addr - A_GICH_LR0) / 4; | ||
187 | + | ||
188 | + if (lr_idx > s->num_lrs) { | ||
189 | + return MEMTX_OK; | ||
190 | + } | ||
191 | + | ||
192 | + s->h_lr[lr_idx][cpu] = value & GICH_LR_MASK; | ||
193 | + break; | ||
194 | + } | ||
195 | + | ||
196 | + default: | ||
197 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
198 | + "gic_hyp_write: Bad offset %" HWADDR_PRIx "\n", addr); | ||
199 | + return MEMTX_OK; | ||
200 | + } | ||
201 | + | ||
202 | + return MEMTX_OK; | ||
203 | +} | ||
204 | + | ||
205 | +static MemTxResult gic_thiscpu_hyp_read(void *opaque, hwaddr addr, uint64_t *data, | ||
206 | + unsigned size, MemTxAttrs attrs) | ||
207 | +{ | ||
208 | + GICState *s = (GICState *)opaque; | ||
209 | + | ||
210 | + return gic_hyp_read(s, gic_get_current_cpu(s), addr, data, attrs); | ||
211 | +} | ||
212 | + | ||
213 | +static MemTxResult gic_thiscpu_hyp_write(void *opaque, hwaddr addr, | ||
214 | + uint64_t value, unsigned size, | ||
215 | + MemTxAttrs attrs) | ||
216 | +{ | ||
217 | + GICState *s = (GICState *)opaque; | ||
218 | + | ||
219 | + return gic_hyp_write(s, gic_get_current_cpu(s), addr, value, attrs); | ||
220 | +} | ||
221 | + | ||
222 | +static MemTxResult gic_do_hyp_read(void *opaque, hwaddr addr, uint64_t *data, | ||
223 | + unsigned size, MemTxAttrs attrs) | ||
224 | +{ | ||
225 | + GICState **backref = (GICState **)opaque; | ||
226 | + GICState *s = *backref; | ||
227 | + int id = (backref - s->backref); | ||
228 | + | ||
229 | + return gic_hyp_read(s, id, addr, data, attrs); | ||
230 | +} | ||
231 | + | ||
232 | +static MemTxResult gic_do_hyp_write(void *opaque, hwaddr addr, | ||
233 | + uint64_t value, unsigned size, | ||
234 | + MemTxAttrs attrs) | ||
235 | +{ | ||
236 | + GICState **backref = (GICState **)opaque; | ||
237 | + GICState *s = *backref; | ||
238 | + int id = (backref - s->backref); | ||
239 | + | ||
240 | + return gic_hyp_write(s, id + GIC_NCPU, addr, value, attrs); | ||
241 | + | ||
242 | +} | ||
243 | + | ||
244 | static const MemoryRegionOps gic_ops[2] = { | ||
245 | { | ||
246 | .read_with_attrs = gic_dist_read, | ||
247 | @@ -XXX,XX +XXX,XX @@ static const MemoryRegionOps gic_cpu_ops = { | ||
248 | |||
249 | static const MemoryRegionOps gic_virt_ops[2] = { | ||
250 | { | ||
251 | - .read_with_attrs = NULL, | ||
252 | - .write_with_attrs = NULL, | ||
253 | + .read_with_attrs = gic_thiscpu_hyp_read, | ||
254 | + .write_with_attrs = gic_thiscpu_hyp_write, | ||
255 | .endianness = DEVICE_NATIVE_ENDIAN, | ||
256 | }, | ||
257 | { | ||
258 | @@ -XXX,XX +XXX,XX @@ static const MemoryRegionOps gic_virt_ops[2] = { | ||
259 | } | ||
260 | }; | ||
261 | |||
262 | +static const MemoryRegionOps gic_viface_ops = { | ||
263 | + .read_with_attrs = gic_do_hyp_read, | ||
264 | + .write_with_attrs = gic_do_hyp_write, | ||
265 | + .endianness = DEVICE_NATIVE_ENDIAN, | ||
266 | +}; | ||
267 | + | ||
268 | static void arm_gic_realize(DeviceState *dev, Error **errp) | ||
269 | { | ||
270 | /* Device instance realize function for the GIC sysbus device */ | ||
271 | @@ -XXX,XX +XXX,XX @@ static void arm_gic_realize(DeviceState *dev, Error **errp) | ||
272 | &s->backref[i], "gic_cpu", 0x100); | ||
273 | sysbus_init_mmio(sbd, &s->cpuiomem[i+1]); | ||
274 | } | ||
275 | + | ||
276 | + /* Extra core-specific regions for virtual interfaces. This is required by | ||
277 | + * the GICv2 specification. | ||
278 | + */ | ||
279 | + if (s->virt_extn) { | ||
280 | + for (i = 0; i < s->num_cpu; i++) { | ||
281 | + memory_region_init_io(&s->vifaceiomem[i + 1], OBJECT(s), | ||
282 | + &gic_viface_ops, &s->backref[i], | ||
283 | + "gic_viface", 0x1000); | ||
284 | + sysbus_init_mmio(sbd, &s->vifaceiomem[i + 1]); | ||
285 | + } | ||
286 | + } | ||
287 | + | ||
288 | } | ||
289 | |||
290 | static void arm_gic_class_init(ObjectClass *klass, void *data) | ||
291 | -- | ||
292 | 2.18.0 | ||
293 | |||
294 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Luc Michel <luc.michel@greensocs.com> | ||
2 | 1 | ||
3 | Implement the maintenance interrupt generation that is part of the GICv2 | ||
4 | virtualization extensions. | ||
5 | |||
6 | Signed-off-by: Luc Michel <luc.michel@greensocs.com> | ||
7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Message-id: 20180727095421.386-18-luc.michel@greensocs.com | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | --- | ||
11 | hw/intc/arm_gic.c | 97 +++++++++++++++++++++++++++++++++++++++++++++++ | ||
12 | 1 file changed, 97 insertions(+) | ||
13 | |||
14 | diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/hw/intc/arm_gic.c | ||
17 | +++ b/hw/intc/arm_gic.c | ||
18 | @@ -XXX,XX +XXX,XX @@ static inline bool gic_lr_entry_is_eoi(uint32_t entry) | ||
19 | && !GICH_LR_HW(entry) && GICH_LR_EOI(entry); | ||
20 | } | ||
21 | |||
22 | +static inline void gic_extract_lr_info(GICState *s, int cpu, | ||
23 | + int *num_eoi, int *num_valid, int *num_pending) | ||
24 | +{ | ||
25 | + int lr_idx; | ||
26 | + | ||
27 | + *num_eoi = 0; | ||
28 | + *num_valid = 0; | ||
29 | + *num_pending = 0; | ||
30 | + | ||
31 | + for (lr_idx = 0; lr_idx < s->num_lrs; lr_idx++) { | ||
32 | + uint32_t *entry = &s->h_lr[lr_idx][cpu]; | ||
33 | + | ||
34 | + if (gic_lr_entry_is_eoi(*entry)) { | ||
35 | + (*num_eoi)++; | ||
36 | + } | ||
37 | + | ||
38 | + if (GICH_LR_STATE(*entry) != GICH_LR_STATE_INVALID) { | ||
39 | + (*num_valid)++; | ||
40 | + } | ||
41 | + | ||
42 | + if (GICH_LR_STATE(*entry) == GICH_LR_STATE_PENDING) { | ||
43 | + (*num_pending)++; | ||
44 | + } | ||
45 | + } | ||
46 | +} | ||
47 | + | ||
48 | +static void gic_compute_misr(GICState *s, int cpu) | ||
49 | +{ | ||
50 | + uint32_t value = 0; | ||
51 | + int vcpu = cpu + GIC_NCPU; | ||
52 | + | ||
53 | + int num_eoi, num_valid, num_pending; | ||
54 | + | ||
55 | + gic_extract_lr_info(s, cpu, &num_eoi, &num_valid, &num_pending); | ||
56 | + | ||
57 | + /* EOI */ | ||
58 | + if (num_eoi) { | ||
59 | + value |= R_GICH_MISR_EOI_MASK; | ||
60 | + } | ||
61 | + | ||
62 | + /* U: true if only 0 or 1 LR entry is valid */ | ||
63 | + if ((s->h_hcr[cpu] & R_GICH_HCR_UIE_MASK) && (num_valid < 2)) { | ||
64 | + value |= R_GICH_MISR_U_MASK; | ||
65 | + } | ||
66 | + | ||
67 | + /* LRENP: EOICount is not 0 */ | ||
68 | + if ((s->h_hcr[cpu] & R_GICH_HCR_LRENPIE_MASK) && | ||
69 | + ((s->h_hcr[cpu] & R_GICH_HCR_EOICount_MASK) != 0)) { | ||
70 | + value |= R_GICH_MISR_LRENP_MASK; | ||
71 | + } | ||
72 | + | ||
73 | + /* NP: no pending interrupts */ | ||
74 | + if ((s->h_hcr[cpu] & R_GICH_HCR_NPIE_MASK) && (num_pending == 0)) { | ||
75 | + value |= R_GICH_MISR_NP_MASK; | ||
76 | + } | ||
77 | + | ||
78 | + /* VGrp0E: group0 virq signaling enabled */ | ||
79 | + if ((s->h_hcr[cpu] & R_GICH_HCR_VGRP0EIE_MASK) && | ||
80 | + (s->cpu_ctlr[vcpu] & GICC_CTLR_EN_GRP0)) { | ||
81 | + value |= R_GICH_MISR_VGrp0E_MASK; | ||
82 | + } | ||
83 | + | ||
84 | + /* VGrp0D: group0 virq signaling disabled */ | ||
85 | + if ((s->h_hcr[cpu] & R_GICH_HCR_VGRP0DIE_MASK) && | ||
86 | + !(s->cpu_ctlr[vcpu] & GICC_CTLR_EN_GRP0)) { | ||
87 | + value |= R_GICH_MISR_VGrp0D_MASK; | ||
88 | + } | ||
89 | + | ||
90 | + /* VGrp1E: group1 virq signaling enabled */ | ||
91 | + if ((s->h_hcr[cpu] & R_GICH_HCR_VGRP1EIE_MASK) && | ||
92 | + (s->cpu_ctlr[vcpu] & GICC_CTLR_EN_GRP1)) { | ||
93 | + value |= R_GICH_MISR_VGrp1E_MASK; | ||
94 | + } | ||
95 | + | ||
96 | + /* VGrp1D: group1 virq signaling disabled */ | ||
97 | + if ((s->h_hcr[cpu] & R_GICH_HCR_VGRP1DIE_MASK) && | ||
98 | + !(s->cpu_ctlr[vcpu] & GICC_CTLR_EN_GRP1)) { | ||
99 | + value |= R_GICH_MISR_VGrp1D_MASK; | ||
100 | + } | ||
101 | + | ||
102 | + s->h_misr[cpu] = value; | ||
103 | +} | ||
104 | + | ||
105 | +static void gic_update_maintenance(GICState *s) | ||
106 | +{ | ||
107 | + int cpu = 0; | ||
108 | + int maint_level; | ||
109 | + | ||
110 | + for (cpu = 0; cpu < s->num_cpu; cpu++) { | ||
111 | + gic_compute_misr(s, cpu); | ||
112 | + maint_level = (s->h_hcr[cpu] & R_GICH_HCR_EN_MASK) && s->h_misr[cpu]; | ||
113 | + | ||
114 | + qemu_set_irq(s->maintenance_irq[cpu], maint_level); | ||
115 | + } | ||
116 | +} | ||
117 | + | ||
118 | static void gic_update_virt(GICState *s) | ||
119 | { | ||
120 | gic_update_internal(s, true); | ||
121 | + gic_update_maintenance(s); | ||
122 | } | ||
123 | |||
124 | static void gic_set_irq_11mpcore(GICState *s, int irq, int level, | ||
125 | -- | ||
126 | 2.18.0 | ||
127 | |||
128 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Luc Michel <luc.michel@greensocs.com> | ||
2 | 1 | ||
3 | Add some traces to the ARM GIC to catch register accesses (distributor, | ||
4 | (v)cpu interface and virtual interface), and to take into account | ||
5 | virtualization extensions (print `vcpu` instead of `cpu` when needed). | ||
6 | |||
7 | Also add some virtualization extensions specific traces: LR updating | ||
8 | and maintenance IRQ generation. | ||
9 | |||
10 | Signed-off-by: Luc Michel <luc.michel@greensocs.com> | ||
11 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
12 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
13 | Message-id: 20180727095421.386-19-luc.michel@greensocs.com | ||
14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
15 | --- | ||
16 | hw/intc/arm_gic.c | 31 +++++++++++++++++++++++++------ | ||
17 | hw/intc/trace-events | 12 ++++++++++-- | ||
18 | 2 files changed, 35 insertions(+), 8 deletions(-) | ||
19 | |||
20 | diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c | ||
21 | index XXXXXXX..XXXXXXX 100644 | ||
22 | --- a/hw/intc/arm_gic.c | ||
23 | +++ b/hw/intc/arm_gic.c | ||
24 | @@ -XXX,XX +XXX,XX @@ static inline void gic_update_internal(GICState *s, bool virt) | ||
25 | } | ||
26 | |||
27 | if (best_irq != 1023) { | ||
28 | - trace_gic_update_bestirq(cpu, best_irq, best_prio, | ||
29 | - s->priority_mask[cpu_iface], s->running_priority[cpu_iface]); | ||
30 | + trace_gic_update_bestirq(virt ? "vcpu" : "cpu", cpu, | ||
31 | + best_irq, best_prio, | ||
32 | + s->priority_mask[cpu_iface], | ||
33 | + s->running_priority[cpu_iface]); | ||
34 | } | ||
35 | |||
36 | irq_level = fiq_level = 0; | ||
37 | @@ -XXX,XX +XXX,XX @@ static void gic_update_maintenance(GICState *s) | ||
38 | gic_compute_misr(s, cpu); | ||
39 | maint_level = (s->h_hcr[cpu] & R_GICH_HCR_EN_MASK) && s->h_misr[cpu]; | ||
40 | |||
41 | + trace_gic_update_maintenance_irq(cpu, maint_level); | ||
42 | qemu_set_irq(s->maintenance_irq[cpu], maint_level); | ||
43 | } | ||
44 | } | ||
45 | @@ -XXX,XX +XXX,XX @@ uint32_t gic_acknowledge_irq(GICState *s, int cpu, MemTxAttrs attrs) | ||
46 | * is in the wrong group. | ||
47 | */ | ||
48 | irq = gic_get_current_pending_irq(s, cpu, attrs); | ||
49 | - trace_gic_acknowledge_irq(gic_get_vcpu_real_id(cpu), irq); | ||
50 | + trace_gic_acknowledge_irq(gic_is_vcpu(cpu) ? "vcpu" : "cpu", | ||
51 | + gic_get_vcpu_real_id(cpu), irq); | ||
52 | |||
53 | if (irq >= GIC_MAXIRQ) { | ||
54 | DPRINTF("ACK, no pending interrupt or it is hidden: %d\n", irq); | ||
55 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_dist_read(void *opaque, hwaddr offset, uint64_t *data, | ||
56 | switch (size) { | ||
57 | case 1: | ||
58 | *data = gic_dist_readb(opaque, offset, attrs); | ||
59 | - return MEMTX_OK; | ||
60 | + break; | ||
61 | case 2: | ||
62 | *data = gic_dist_readb(opaque, offset, attrs); | ||
63 | *data |= gic_dist_readb(opaque, offset + 1, attrs) << 8; | ||
64 | - return MEMTX_OK; | ||
65 | + break; | ||
66 | case 4: | ||
67 | *data = gic_dist_readb(opaque, offset, attrs); | ||
68 | *data |= gic_dist_readb(opaque, offset + 1, attrs) << 8; | ||
69 | *data |= gic_dist_readb(opaque, offset + 2, attrs) << 16; | ||
70 | *data |= gic_dist_readb(opaque, offset + 3, attrs) << 24; | ||
71 | - return MEMTX_OK; | ||
72 | + break; | ||
73 | default: | ||
74 | return MEMTX_ERROR; | ||
75 | } | ||
76 | + | ||
77 | + trace_gic_dist_read(offset, size, *data); | ||
78 | + return MEMTX_OK; | ||
79 | } | ||
80 | |||
81 | static void gic_dist_writeb(void *opaque, hwaddr offset, | ||
82 | @@ -XXX,XX +XXX,XX @@ static void gic_dist_writel(void *opaque, hwaddr offset, | ||
83 | static MemTxResult gic_dist_write(void *opaque, hwaddr offset, uint64_t data, | ||
84 | unsigned size, MemTxAttrs attrs) | ||
85 | { | ||
86 | + trace_gic_dist_write(offset, size, data); | ||
87 | + | ||
88 | switch (size) { | ||
89 | case 1: | ||
90 | gic_dist_writeb(opaque, offset, data, attrs); | ||
91 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_cpu_read(GICState *s, int cpu, int offset, | ||
92 | *data = 0; | ||
93 | break; | ||
94 | } | ||
95 | + | ||
96 | + trace_gic_cpu_read(gic_is_vcpu(cpu) ? "vcpu" : "cpu", | ||
97 | + gic_get_vcpu_real_id(cpu), offset, *data); | ||
98 | return MEMTX_OK; | ||
99 | } | ||
100 | |||
101 | static MemTxResult gic_cpu_write(GICState *s, int cpu, int offset, | ||
102 | uint32_t value, MemTxAttrs attrs) | ||
103 | { | ||
104 | + trace_gic_cpu_write(gic_is_vcpu(cpu) ? "vcpu" : "cpu", | ||
105 | + gic_get_vcpu_real_id(cpu), offset, value); | ||
106 | + | ||
107 | switch (offset) { | ||
108 | case 0x00: /* Control */ | ||
109 | gic_set_cpu_control(s, cpu, value, attrs); | ||
110 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_hyp_read(void *opaque, int cpu, hwaddr addr, | ||
111 | return MEMTX_OK; | ||
112 | } | ||
113 | |||
114 | + trace_gic_hyp_read(addr, *data); | ||
115 | return MEMTX_OK; | ||
116 | } | ||
117 | |||
118 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_hyp_write(void *opaque, int cpu, hwaddr addr, | ||
119 | GICState *s = ARM_GIC(opaque); | ||
120 | int vcpu = cpu + GIC_NCPU; | ||
121 | |||
122 | + trace_gic_hyp_write(addr, value); | ||
123 | + | ||
124 | switch (addr) { | ||
125 | case A_GICH_HCR: /* Hypervisor Control */ | ||
126 | s->h_hcr[cpu] = value & GICH_HCR_MASK; | ||
127 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gic_hyp_write(void *opaque, int cpu, hwaddr addr, | ||
128 | } | ||
129 | |||
130 | s->h_lr[lr_idx][cpu] = value & GICH_LR_MASK; | ||
131 | + trace_gic_lr_entry(cpu, lr_idx, s->h_lr[lr_idx][cpu]); | ||
132 | break; | ||
133 | } | ||
134 | |||
135 | diff --git a/hw/intc/trace-events b/hw/intc/trace-events | ||
136 | index XXXXXXX..XXXXXXX 100644 | ||
137 | --- a/hw/intc/trace-events | ||
138 | +++ b/hw/intc/trace-events | ||
139 | @@ -XXX,XX +XXX,XX @@ aspeed_vic_write(uint64_t offset, unsigned size, uint32_t data) "To 0x%" PRIx64 | ||
140 | gic_enable_irq(int irq) "irq %d enabled" | ||
141 | gic_disable_irq(int irq) "irq %d disabled" | ||
142 | gic_set_irq(int irq, int level, int cpumask, int target) "irq %d level %d cpumask 0x%x target 0x%x" | ||
143 | -gic_update_bestirq(int cpu, int irq, int prio, int priority_mask, int running_priority) "cpu %d irq %d priority %d cpu priority mask %d cpu running priority %d" | ||
144 | +gic_update_bestirq(const char *s, int cpu, int irq, int prio, int priority_mask, int running_priority) "%s %d irq %d priority %d cpu priority mask %d cpu running priority %d" | ||
145 | gic_update_set_irq(int cpu, const char *name, int level) "cpu[%d]: %s = %d" | ||
146 | -gic_acknowledge_irq(int cpu, int irq) "cpu %d acknowledged irq %d" | ||
147 | +gic_acknowledge_irq(const char *s, int cpu, int irq) "%s %d acknowledged irq %d" | ||
148 | +gic_cpu_write(const char *s, int cpu, int addr, uint32_t val) "%s %d iface write at 0x%08x 0x%08" PRIx32 | ||
149 | +gic_cpu_read(const char *s, int cpu, int addr, uint32_t val) "%s %d iface read at 0x%08x: 0x%08" PRIx32 | ||
150 | +gic_hyp_read(int addr, uint32_t val) "hyp read at 0x%08x: 0x%08" PRIx32 | ||
151 | +gic_hyp_write(int addr, uint32_t val) "hyp write at 0x%08x: 0x%08" PRIx32 | ||
152 | +gic_dist_read(int addr, unsigned int size, uint32_t val) "dist read at 0x%08x size %u: 0x%08" PRIx32 | ||
153 | +gic_dist_write(int addr, unsigned int size, uint32_t val) "dist write at 0x%08x size %u: 0x%08" PRIx32 | ||
154 | +gic_lr_entry(int cpu, int entry, uint32_t val) "cpu %d: new lr entry %d: 0x%08" PRIx32 | ||
155 | +gic_update_maintenance_irq(int cpu, int val) "cpu %d: maintenance = %d" | ||
156 | |||
157 | # hw/intc/arm_gicv3_cpuif.c | ||
158 | gicv3_icc_pmr_read(uint32_t cpu, uint64_t val) "GICv3 ICC_PMR read cpu 0x%x value 0x%" PRIx64 | ||
159 | -- | ||
160 | 2.18.0 | ||
161 | |||
162 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Luc Michel <luc.michel@greensocs.com> | ||
2 | 1 | ||
3 | This commit improve the way the GIC is realized and connected in the | ||
4 | ZynqMP SoC. The security extensions are enabled only if requested in the | ||
5 | machine state. The same goes for the virtualization extensions. | ||
6 | |||
7 | All the GIC to APU CPU(s) IRQ lines are now connected, including FIQ, | ||
8 | vIRQ and vFIQ. The missing CPU to GIC timers IRQ connections are also | ||
9 | added (HYP and SEC timers). | ||
10 | |||
11 | The GIC maintenance IRQs are back-wired to the correct GIC PPIs. | ||
12 | |||
13 | Finally, the MMIO mappings are reworked to take into account the ZynqMP | ||
14 | specifics. The GIC (v)CPU interface is aliased 16 times: | ||
15 | * for the first 0x1000 bytes from 0xf9010000 to 0xf901f000 | ||
16 | * for the second 0x1000 bytes from 0xf9020000 to 0xf902f000 | ||
17 | Mappings of the virtual interface and virtual CPU interface are mapped | ||
18 | only when virtualization extensions are requested. The | ||
19 | XlnxZynqMPGICRegion struct has been enhanced to be able to catch all | ||
20 | this information. | ||
21 | |||
22 | Signed-off-by: Luc Michel <luc.michel@greensocs.com> | ||
23 | Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | ||
24 | Message-id: 20180727095421.386-20-luc.michel@greensocs.com | ||
25 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
26 | --- | ||
27 | include/hw/arm/xlnx-zynqmp.h | 4 +- | ||
28 | hw/arm/xlnx-zynqmp.c | 92 ++++++++++++++++++++++++++++++++---- | ||
29 | 2 files changed, 86 insertions(+), 10 deletions(-) | ||
30 | |||
31 | diff --git a/include/hw/arm/xlnx-zynqmp.h b/include/hw/arm/xlnx-zynqmp.h | ||
32 | index XXXXXXX..XXXXXXX 100644 | ||
33 | --- a/include/hw/arm/xlnx-zynqmp.h | ||
34 | +++ b/include/hw/arm/xlnx-zynqmp.h | ||
35 | @@ -XXX,XX +XXX,XX @@ | ||
36 | #define XLNX_ZYNQMP_OCM_RAM_0_ADDRESS 0xFFFC0000 | ||
37 | #define XLNX_ZYNQMP_OCM_RAM_SIZE 0x10000 | ||
38 | |||
39 | -#define XLNX_ZYNQMP_GIC_REGIONS 2 | ||
40 | +#define XLNX_ZYNQMP_GIC_REGIONS 6 | ||
41 | |||
42 | /* ZynqMP maps the ARM GIC regions (GICC, GICD ...) at consecutive 64k offsets | ||
43 | * and under-decodes the 64k region. This mirrors the 4k regions to every 4k | ||
44 | @@ -XXX,XX +XXX,XX @@ | ||
45 | */ | ||
46 | |||
47 | #define XLNX_ZYNQMP_GIC_REGION_SIZE 0x1000 | ||
48 | -#define XLNX_ZYNQMP_GIC_ALIASES (0x10000 / XLNX_ZYNQMP_GIC_REGION_SIZE - 1) | ||
49 | +#define XLNX_ZYNQMP_GIC_ALIASES (0x10000 / XLNX_ZYNQMP_GIC_REGION_SIZE) | ||
50 | |||
51 | #define XLNX_ZYNQMP_MAX_LOW_RAM_SIZE 0x80000000ull | ||
52 | |||
53 | diff --git a/hw/arm/xlnx-zynqmp.c b/hw/arm/xlnx-zynqmp.c | ||
54 | index XXXXXXX..XXXXXXX 100644 | ||
55 | --- a/hw/arm/xlnx-zynqmp.c | ||
56 | +++ b/hw/arm/xlnx-zynqmp.c | ||
57 | @@ -XXX,XX +XXX,XX @@ | ||
58 | |||
59 | #define ARM_PHYS_TIMER_PPI 30 | ||
60 | #define ARM_VIRT_TIMER_PPI 27 | ||
61 | +#define ARM_HYP_TIMER_PPI 26 | ||
62 | +#define ARM_SEC_TIMER_PPI 29 | ||
63 | +#define GIC_MAINTENANCE_PPI 25 | ||
64 | |||
65 | #define GEM_REVISION 0x40070106 | ||
66 | |||
67 | #define GIC_BASE_ADDR 0xf9000000 | ||
68 | #define GIC_DIST_ADDR 0xf9010000 | ||
69 | #define GIC_CPU_ADDR 0xf9020000 | ||
70 | +#define GIC_VIFACE_ADDR 0xf9040000 | ||
71 | +#define GIC_VCPU_ADDR 0xf9060000 | ||
72 | |||
73 | #define SATA_INTR 133 | ||
74 | #define SATA_ADDR 0xFD0C0000 | ||
75 | @@ -XXX,XX +XXX,XX @@ static const int adma_ch_intr[XLNX_ZYNQMP_NUM_ADMA_CH] = { | ||
76 | typedef struct XlnxZynqMPGICRegion { | ||
77 | int region_index; | ||
78 | uint32_t address; | ||
79 | + uint32_t offset; | ||
80 | + bool virt; | ||
81 | } XlnxZynqMPGICRegion; | ||
82 | |||
83 | static const XlnxZynqMPGICRegion xlnx_zynqmp_gic_regions[] = { | ||
84 | - { .region_index = 0, .address = GIC_DIST_ADDR, }, | ||
85 | - { .region_index = 1, .address = GIC_CPU_ADDR, }, | ||
86 | + /* Distributor */ | ||
87 | + { | ||
88 | + .region_index = 0, | ||
89 | + .address = GIC_DIST_ADDR, | ||
90 | + .offset = 0, | ||
91 | + .virt = false | ||
92 | + }, | ||
93 | + | ||
94 | + /* CPU interface */ | ||
95 | + { | ||
96 | + .region_index = 1, | ||
97 | + .address = GIC_CPU_ADDR, | ||
98 | + .offset = 0, | ||
99 | + .virt = false | ||
100 | + }, | ||
101 | + { | ||
102 | + .region_index = 1, | ||
103 | + .address = GIC_CPU_ADDR + 0x10000, | ||
104 | + .offset = 0x1000, | ||
105 | + .virt = false | ||
106 | + }, | ||
107 | + | ||
108 | + /* Virtual interface */ | ||
109 | + { | ||
110 | + .region_index = 2, | ||
111 | + .address = GIC_VIFACE_ADDR, | ||
112 | + .offset = 0, | ||
113 | + .virt = true | ||
114 | + }, | ||
115 | + | ||
116 | + /* Virtual CPU interface */ | ||
117 | + { | ||
118 | + .region_index = 3, | ||
119 | + .address = GIC_VCPU_ADDR, | ||
120 | + .offset = 0, | ||
121 | + .virt = true | ||
122 | + }, | ||
123 | + { | ||
124 | + .region_index = 3, | ||
125 | + .address = GIC_VCPU_ADDR + 0x10000, | ||
126 | + .offset = 0x1000, | ||
127 | + .virt = true | ||
128 | + }, | ||
129 | }; | ||
130 | |||
131 | static inline int arm_gic_ppi_index(int cpu_nr, int ppi_index) | ||
132 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) | ||
133 | qdev_prop_set_uint32(DEVICE(&s->gic), "num-irq", GIC_NUM_SPI_INTR + 32); | ||
134 | qdev_prop_set_uint32(DEVICE(&s->gic), "revision", 2); | ||
135 | qdev_prop_set_uint32(DEVICE(&s->gic), "num-cpu", num_apus); | ||
136 | + qdev_prop_set_bit(DEVICE(&s->gic), "has-security-extensions", s->secure); | ||
137 | + qdev_prop_set_bit(DEVICE(&s->gic), | ||
138 | + "has-virtualization-extensions", s->virt); | ||
139 | |||
140 | /* Realize APUs before realizing the GIC. KVM requires this. */ | ||
141 | for (i = 0; i < num_apus; i++) { | ||
142 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) | ||
143 | for (i = 0; i < XLNX_ZYNQMP_GIC_REGIONS; i++) { | ||
144 | SysBusDevice *gic = SYS_BUS_DEVICE(&s->gic); | ||
145 | const XlnxZynqMPGICRegion *r = &xlnx_zynqmp_gic_regions[i]; | ||
146 | - MemoryRegion *mr = sysbus_mmio_get_region(gic, r->region_index); | ||
147 | + MemoryRegion *mr; | ||
148 | uint32_t addr = r->address; | ||
149 | int j; | ||
150 | |||
151 | - sysbus_mmio_map(gic, r->region_index, addr); | ||
152 | + if (r->virt && !s->virt) { | ||
153 | + continue; | ||
154 | + } | ||
155 | |||
156 | + mr = sysbus_mmio_get_region(gic, r->region_index); | ||
157 | for (j = 0; j < XLNX_ZYNQMP_GIC_ALIASES; j++) { | ||
158 | MemoryRegion *alias = &s->gic_mr[i][j]; | ||
159 | |||
160 | - addr += XLNX_ZYNQMP_GIC_REGION_SIZE; | ||
161 | memory_region_init_alias(alias, OBJECT(s), "zynqmp-gic-alias", mr, | ||
162 | - 0, XLNX_ZYNQMP_GIC_REGION_SIZE); | ||
163 | + r->offset, XLNX_ZYNQMP_GIC_REGION_SIZE); | ||
164 | memory_region_add_subregion(system_memory, addr, alias); | ||
165 | + | ||
166 | + addr += XLNX_ZYNQMP_GIC_REGION_SIZE; | ||
167 | } | ||
168 | } | ||
169 | |||
170 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) | ||
171 | sysbus_connect_irq(SYS_BUS_DEVICE(&s->gic), i, | ||
172 | qdev_get_gpio_in(DEVICE(&s->apu_cpu[i]), | ||
173 | ARM_CPU_IRQ)); | ||
174 | + sysbus_connect_irq(SYS_BUS_DEVICE(&s->gic), i + num_apus, | ||
175 | + qdev_get_gpio_in(DEVICE(&s->apu_cpu[i]), | ||
176 | + ARM_CPU_FIQ)); | ||
177 | + sysbus_connect_irq(SYS_BUS_DEVICE(&s->gic), i + num_apus * 2, | ||
178 | + qdev_get_gpio_in(DEVICE(&s->apu_cpu[i]), | ||
179 | + ARM_CPU_VIRQ)); | ||
180 | + sysbus_connect_irq(SYS_BUS_DEVICE(&s->gic), i + num_apus * 3, | ||
181 | + qdev_get_gpio_in(DEVICE(&s->apu_cpu[i]), | ||
182 | + ARM_CPU_VFIQ)); | ||
183 | irq = qdev_get_gpio_in(DEVICE(&s->gic), | ||
184 | arm_gic_ppi_index(i, ARM_PHYS_TIMER_PPI)); | ||
185 | - qdev_connect_gpio_out(DEVICE(&s->apu_cpu[i]), 0, irq); | ||
186 | + qdev_connect_gpio_out(DEVICE(&s->apu_cpu[i]), GTIMER_PHYS, irq); | ||
187 | irq = qdev_get_gpio_in(DEVICE(&s->gic), | ||
188 | arm_gic_ppi_index(i, ARM_VIRT_TIMER_PPI)); | ||
189 | - qdev_connect_gpio_out(DEVICE(&s->apu_cpu[i]), 1, irq); | ||
190 | + qdev_connect_gpio_out(DEVICE(&s->apu_cpu[i]), GTIMER_VIRT, irq); | ||
191 | + irq = qdev_get_gpio_in(DEVICE(&s->gic), | ||
192 | + arm_gic_ppi_index(i, ARM_HYP_TIMER_PPI)); | ||
193 | + qdev_connect_gpio_out(DEVICE(&s->apu_cpu[i]), GTIMER_HYP, irq); | ||
194 | + irq = qdev_get_gpio_in(DEVICE(&s->gic), | ||
195 | + arm_gic_ppi_index(i, ARM_SEC_TIMER_PPI)); | ||
196 | + qdev_connect_gpio_out(DEVICE(&s->apu_cpu[i]), GTIMER_SEC, irq); | ||
197 | + | ||
198 | + if (s->virt) { | ||
199 | + irq = qdev_get_gpio_in(DEVICE(&s->gic), | ||
200 | + arm_gic_ppi_index(i, GIC_MAINTENANCE_PPI)); | ||
201 | + sysbus_connect_irq(SYS_BUS_DEVICE(&s->gic), i + num_apus * 4, irq); | ||
202 | + } | ||
203 | } | ||
204 | |||
205 | if (s->has_rpu) { | ||
206 | -- | ||
207 | 2.18.0 | ||
208 | |||
209 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Luc Michel <luc.michel@greensocs.com> | ||
2 | 1 | ||
3 | Add support for GICv2 virtualization extensions by mapping the necessary | ||
4 | I/O regions and connecting the maintenance IRQ lines. | ||
5 | |||
6 | Declare those additions in the device tree and in the ACPI tables. | ||
7 | |||
8 | Signed-off-by: Luc Michel <luc.michel@greensocs.com> | ||
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | Message-id: 20180727095421.386-21-luc.michel@greensocs.com | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | --- | ||
13 | include/hw/arm/virt.h | 4 +++- | ||
14 | hw/arm/virt-acpi-build.c | 6 +++-- | ||
15 | hw/arm/virt.c | 52 +++++++++++++++++++++++++++++++++------- | ||
16 | 3 files changed, 50 insertions(+), 12 deletions(-) | ||
17 | |||
18 | diff --git a/include/hw/arm/virt.h b/include/hw/arm/virt.h | ||
19 | index XXXXXXX..XXXXXXX 100644 | ||
20 | --- a/include/hw/arm/virt.h | ||
21 | +++ b/include/hw/arm/virt.h | ||
22 | @@ -XXX,XX +XXX,XX @@ | ||
23 | #define NUM_VIRTIO_TRANSPORTS 32 | ||
24 | #define NUM_SMMU_IRQS 4 | ||
25 | |||
26 | -#define ARCH_GICV3_MAINT_IRQ 9 | ||
27 | +#define ARCH_GIC_MAINT_IRQ 9 | ||
28 | |||
29 | #define ARCH_TIMER_VIRT_IRQ 11 | ||
30 | #define ARCH_TIMER_S_EL1_IRQ 13 | ||
31 | @@ -XXX,XX +XXX,XX @@ enum { | ||
32 | VIRT_GIC_DIST, | ||
33 | VIRT_GIC_CPU, | ||
34 | VIRT_GIC_V2M, | ||
35 | + VIRT_GIC_HYP, | ||
36 | + VIRT_GIC_VCPU, | ||
37 | VIRT_GIC_ITS, | ||
38 | VIRT_GIC_REDIST, | ||
39 | VIRT_GIC_REDIST2, | ||
40 | diff --git a/hw/arm/virt-acpi-build.c b/hw/arm/virt-acpi-build.c | ||
41 | index XXXXXXX..XXXXXXX 100644 | ||
42 | --- a/hw/arm/virt-acpi-build.c | ||
43 | +++ b/hw/arm/virt-acpi-build.c | ||
44 | @@ -XXX,XX +XXX,XX @@ build_madt(GArray *table_data, BIOSLinker *linker, VirtMachineState *vms) | ||
45 | gicc->length = sizeof(*gicc); | ||
46 | if (vms->gic_version == 2) { | ||
47 | gicc->base_address = cpu_to_le64(memmap[VIRT_GIC_CPU].base); | ||
48 | + gicc->gich_base_address = cpu_to_le64(memmap[VIRT_GIC_HYP].base); | ||
49 | + gicc->gicv_base_address = cpu_to_le64(memmap[VIRT_GIC_VCPU].base); | ||
50 | } | ||
51 | gicc->cpu_interface_number = cpu_to_le32(i); | ||
52 | gicc->arm_mpidr = cpu_to_le64(armcpu->mp_affinity); | ||
53 | @@ -XXX,XX +XXX,XX @@ build_madt(GArray *table_data, BIOSLinker *linker, VirtMachineState *vms) | ||
54 | if (arm_feature(&armcpu->env, ARM_FEATURE_PMU)) { | ||
55 | gicc->performance_interrupt = cpu_to_le32(PPI(VIRTUAL_PMU_IRQ)); | ||
56 | } | ||
57 | - if (vms->virt && vms->gic_version == 3) { | ||
58 | - gicc->vgic_interrupt = cpu_to_le32(PPI(ARCH_GICV3_MAINT_IRQ)); | ||
59 | + if (vms->virt) { | ||
60 | + gicc->vgic_interrupt = cpu_to_le32(PPI(ARCH_GIC_MAINT_IRQ)); | ||
61 | } | ||
62 | } | ||
63 | |||
64 | diff --git a/hw/arm/virt.c b/hw/arm/virt.c | ||
65 | index XXXXXXX..XXXXXXX 100644 | ||
66 | --- a/hw/arm/virt.c | ||
67 | +++ b/hw/arm/virt.c | ||
68 | @@ -XXX,XX +XXX,XX @@ static const MemMapEntry a15memmap[] = { | ||
69 | [VIRT_GIC_DIST] = { 0x08000000, 0x00010000 }, | ||
70 | [VIRT_GIC_CPU] = { 0x08010000, 0x00010000 }, | ||
71 | [VIRT_GIC_V2M] = { 0x08020000, 0x00001000 }, | ||
72 | + [VIRT_GIC_HYP] = { 0x08030000, 0x00010000 }, | ||
73 | + [VIRT_GIC_VCPU] = { 0x08040000, 0x00010000 }, | ||
74 | /* The space in between here is reserved for GICv3 CPU/vCPU/HYP */ | ||
75 | [VIRT_GIC_ITS] = { 0x08080000, 0x00020000 }, | ||
76 | /* This redistributor space allows up to 2*64kB*123 CPUs */ | ||
77 | @@ -XXX,XX +XXX,XX @@ static void fdt_add_gic_node(VirtMachineState *vms) | ||
78 | |||
79 | if (vms->virt) { | ||
80 | qemu_fdt_setprop_cells(vms->fdt, nodename, "interrupts", | ||
81 | - GIC_FDT_IRQ_TYPE_PPI, ARCH_GICV3_MAINT_IRQ, | ||
82 | + GIC_FDT_IRQ_TYPE_PPI, ARCH_GIC_MAINT_IRQ, | ||
83 | GIC_FDT_IRQ_FLAGS_LEVEL_HI); | ||
84 | } | ||
85 | } else { | ||
86 | /* 'cortex-a15-gic' means 'GIC v2' */ | ||
87 | qemu_fdt_setprop_string(vms->fdt, nodename, "compatible", | ||
88 | "arm,cortex-a15-gic"); | ||
89 | - qemu_fdt_setprop_sized_cells(vms->fdt, nodename, "reg", | ||
90 | - 2, vms->memmap[VIRT_GIC_DIST].base, | ||
91 | - 2, vms->memmap[VIRT_GIC_DIST].size, | ||
92 | - 2, vms->memmap[VIRT_GIC_CPU].base, | ||
93 | - 2, vms->memmap[VIRT_GIC_CPU].size); | ||
94 | + if (!vms->virt) { | ||
95 | + qemu_fdt_setprop_sized_cells(vms->fdt, nodename, "reg", | ||
96 | + 2, vms->memmap[VIRT_GIC_DIST].base, | ||
97 | + 2, vms->memmap[VIRT_GIC_DIST].size, | ||
98 | + 2, vms->memmap[VIRT_GIC_CPU].base, | ||
99 | + 2, vms->memmap[VIRT_GIC_CPU].size); | ||
100 | + } else { | ||
101 | + qemu_fdt_setprop_sized_cells(vms->fdt, nodename, "reg", | ||
102 | + 2, vms->memmap[VIRT_GIC_DIST].base, | ||
103 | + 2, vms->memmap[VIRT_GIC_DIST].size, | ||
104 | + 2, vms->memmap[VIRT_GIC_CPU].base, | ||
105 | + 2, vms->memmap[VIRT_GIC_CPU].size, | ||
106 | + 2, vms->memmap[VIRT_GIC_HYP].base, | ||
107 | + 2, vms->memmap[VIRT_GIC_HYP].size, | ||
108 | + 2, vms->memmap[VIRT_GIC_VCPU].base, | ||
109 | + 2, vms->memmap[VIRT_GIC_VCPU].size); | ||
110 | + qemu_fdt_setprop_cells(vms->fdt, nodename, "interrupts", | ||
111 | + GIC_FDT_IRQ_TYPE_PPI, ARCH_GIC_MAINT_IRQ, | ||
112 | + GIC_FDT_IRQ_FLAGS_LEVEL_HI); | ||
113 | + } | ||
114 | } | ||
115 | |||
116 | qemu_fdt_setprop_cell(vms->fdt, nodename, "phandle", vms->gic_phandle); | ||
117 | @@ -XXX,XX +XXX,XX @@ static void create_gic(VirtMachineState *vms, qemu_irq *pic) | ||
118 | qdev_prop_set_uint32(gicdev, "redist-region-count[1]", | ||
119 | MIN(smp_cpus - redist0_count, redist1_capacity)); | ||
120 | } | ||
121 | + } else { | ||
122 | + if (!kvm_irqchip_in_kernel()) { | ||
123 | + qdev_prop_set_bit(gicdev, "has-virtualization-extensions", | ||
124 | + vms->virt); | ||
125 | + } | ||
126 | } | ||
127 | qdev_init_nofail(gicdev); | ||
128 | gicbusdev = SYS_BUS_DEVICE(gicdev); | ||
129 | @@ -XXX,XX +XXX,XX @@ static void create_gic(VirtMachineState *vms, qemu_irq *pic) | ||
130 | } | ||
131 | } else { | ||
132 | sysbus_mmio_map(gicbusdev, 1, vms->memmap[VIRT_GIC_CPU].base); | ||
133 | + if (vms->virt) { | ||
134 | + sysbus_mmio_map(gicbusdev, 2, vms->memmap[VIRT_GIC_HYP].base); | ||
135 | + sysbus_mmio_map(gicbusdev, 3, vms->memmap[VIRT_GIC_VCPU].base); | ||
136 | + } | ||
137 | } | ||
138 | |||
139 | /* Wire the outputs from each CPU's generic timer and the GICv3 | ||
140 | @@ -XXX,XX +XXX,XX @@ static void create_gic(VirtMachineState *vms, qemu_irq *pic) | ||
141 | ppibase + timer_irq[irq])); | ||
142 | } | ||
143 | |||
144 | - qdev_connect_gpio_out_named(cpudev, "gicv3-maintenance-interrupt", 0, | ||
145 | - qdev_get_gpio_in(gicdev, ppibase | ||
146 | - + ARCH_GICV3_MAINT_IRQ)); | ||
147 | + if (type == 3) { | ||
148 | + qemu_irq irq = qdev_get_gpio_in(gicdev, | ||
149 | + ppibase + ARCH_GIC_MAINT_IRQ); | ||
150 | + qdev_connect_gpio_out_named(cpudev, "gicv3-maintenance-interrupt", | ||
151 | + 0, irq); | ||
152 | + } else if (vms->virt) { | ||
153 | + qemu_irq irq = qdev_get_gpio_in(gicdev, | ||
154 | + ppibase + ARCH_GIC_MAINT_IRQ); | ||
155 | + sysbus_connect_irq(gicbusdev, i + 4 * smp_cpus, irq); | ||
156 | + } | ||
157 | + | ||
158 | qdev_connect_gpio_out_named(cpudev, "pmu-interrupt", 0, | ||
159 | qdev_get_gpio_in(gicdev, ppibase | ||
160 | + VIRTUAL_PMU_IRQ)); | ||
161 | -- | ||
162 | 2.18.0 | ||
163 | |||
164 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | If the "trap general exceptions" bit HCR_EL2.TGE is set, we | ||
2 | must mask all virtual interrupts (as per DDI0487C.a D1.14.3). | ||
3 | Implement this in arm_excp_unmasked(). | ||
4 | 1 | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
7 | Message-id: 20180724115950.17316-2-peter.maydell@linaro.org | ||
8 | --- | ||
9 | target/arm/cpu.h | 6 ++++-- | ||
10 | 1 file changed, 4 insertions(+), 2 deletions(-) | ||
11 | |||
12 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
13 | index XXXXXXX..XXXXXXX 100644 | ||
14 | --- a/target/arm/cpu.h | ||
15 | +++ b/target/arm/cpu.h | ||
16 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_excp_unmasked(CPUState *cs, unsigned int excp_idx, | ||
17 | break; | ||
18 | |||
19 | case EXCP_VFIQ: | ||
20 | - if (secure || !(env->cp15.hcr_el2 & HCR_FMO)) { | ||
21 | + if (secure || !(env->cp15.hcr_el2 & HCR_FMO) | ||
22 | + || (env->cp15.hcr_el2 & HCR_TGE)) { | ||
23 | /* VFIQs are only taken when hypervized and non-secure. */ | ||
24 | return false; | ||
25 | } | ||
26 | return !(env->daif & PSTATE_F); | ||
27 | case EXCP_VIRQ: | ||
28 | - if (secure || !(env->cp15.hcr_el2 & HCR_IMO)) { | ||
29 | + if (secure || !(env->cp15.hcr_el2 & HCR_IMO) | ||
30 | + || (env->cp15.hcr_el2 & HCR_TGE)) { | ||
31 | /* VIRQs are only taken when hypervized and non-secure. */ | ||
32 | return false; | ||
33 | } | ||
34 | -- | ||
35 | 2.18.0 | ||
36 | |||
37 | diff view generated by jsdifflib |
1 | Some debug registers can be trapped via MDCR_EL2 bits TDRA, TDOSA, | 1 | Fix a couple of nits in pr-manager.rst: |
---|---|---|---|
2 | and TDA, which we implement in the functions access_tdra(), | 2 | * the title marker for the top level heading is overlength |
3 | access_tdosa() and access_tda(). If MDCR_EL2.TDE or HCR_EL2.TGE | 3 | * stray capital 'R' in the middle of a sentence |
4 | are 1, the TDRA, TDOSA and TDA bits should behave as if they were 1. | ||
5 | Implement this by having the access functions check MDCR_EL2.TDE | ||
6 | and HCR_EL2.TGE. | ||
7 | 4 | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 6 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> |
10 | Message-id: 20180724115950.17316-3-peter.maydell@linaro.org | ||
11 | --- | 7 | --- |
12 | target/arm/helper.c | 18 ++++++++++++------ | 8 | docs/system/pr-manager.rst | 6 +++--- |
13 | 1 file changed, 12 insertions(+), 6 deletions(-) | 9 | 1 file changed, 3 insertions(+), 3 deletions(-) |
14 | 10 | ||
15 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 11 | diff --git a/docs/system/pr-manager.rst b/docs/system/pr-manager.rst |
16 | index XXXXXXX..XXXXXXX 100644 | 12 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/target/arm/helper.c | 13 | --- a/docs/system/pr-manager.rst |
18 | +++ b/target/arm/helper.c | 14 | +++ b/docs/system/pr-manager.rst |
19 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tdosa(CPUARMState *env, const ARMCPRegInfo *ri, | 15 | @@ -XXX,XX +XXX,XX @@ |
20 | bool isread) | 16 | -====================================== |
21 | { | 17 | +=============================== |
22 | int el = arm_current_el(env); | 18 | Persistent reservation managers |
23 | + bool mdcr_el2_tdosa = (env->cp15.mdcr_el2 & MDCR_TDOSA) || | 19 | -====================================== |
24 | + (env->cp15.mdcr_el2 & MDCR_TDE) || | 20 | +=============================== |
25 | + (env->cp15.hcr_el2 & HCR_TGE); | 21 | |
26 | 22 | -SCSI persistent Reservations allow restricting access to block devices | |
27 | - if (el < 2 && (env->cp15.mdcr_el2 & MDCR_TDOSA) | 23 | +SCSI persistent reservations allow restricting access to block devices |
28 | - && !arm_is_secure_below_el3(env)) { | 24 | to specific initiators in a shared storage setup. When implementing |
29 | + if (el < 2 && mdcr_el2_tdosa && !arm_is_secure_below_el3(env)) { | 25 | clustering of virtual machines, it is a common requirement for virtual |
30 | return CP_ACCESS_TRAP_EL2; | 26 | machines to send persistent reservation SCSI commands. However, |
31 | } | ||
32 | if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TDOSA)) { | ||
33 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tdra(CPUARMState *env, const ARMCPRegInfo *ri, | ||
34 | bool isread) | ||
35 | { | ||
36 | int el = arm_current_el(env); | ||
37 | + bool mdcr_el2_tdra = (env->cp15.mdcr_el2 & MDCR_TDRA) || | ||
38 | + (env->cp15.mdcr_el2 & MDCR_TDE) || | ||
39 | + (env->cp15.hcr_el2 & HCR_TGE); | ||
40 | |||
41 | - if (el < 2 && (env->cp15.mdcr_el2 & MDCR_TDRA) | ||
42 | - && !arm_is_secure_below_el3(env)) { | ||
43 | + if (el < 2 && mdcr_el2_tdra && !arm_is_secure_below_el3(env)) { | ||
44 | return CP_ACCESS_TRAP_EL2; | ||
45 | } | ||
46 | if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TDA)) { | ||
47 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tda(CPUARMState *env, const ARMCPRegInfo *ri, | ||
48 | bool isread) | ||
49 | { | ||
50 | int el = arm_current_el(env); | ||
51 | + bool mdcr_el2_tda = (env->cp15.mdcr_el2 & MDCR_TDA) || | ||
52 | + (env->cp15.mdcr_el2 & MDCR_TDE) || | ||
53 | + (env->cp15.hcr_el2 & HCR_TGE); | ||
54 | |||
55 | - if (el < 2 && (env->cp15.mdcr_el2 & MDCR_TDA) | ||
56 | - && !arm_is_secure_below_el3(env)) { | ||
57 | + if (el < 2 && mdcr_el2_tda && !arm_is_secure_below_el3(env)) { | ||
58 | return CP_ACCESS_TRAP_EL2; | ||
59 | } | ||
60 | if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TDA)) { | ||
61 | -- | 27 | -- |
62 | 2.18.0 | 28 | 2.20.1 |
63 | 29 | ||
64 | 30 | diff view generated by jsdifflib |