1 | Latest set of arm patches. I may end up doing another pullreq at the | 1 | target-arm queue for softfreeze: this is quite big as I |
---|---|---|---|
2 | end of the week, but this is big enough to send out, plus it has | 2 | was on holiday last week, so this is all just sneaking in |
3 | several instances of "let me take the first N patches in your series" | 3 | under the wire. I particularly wanted to get Philippe's |
4 | in it, so getting those into master makes patch respins for those | 4 | patches in before freeze as that sort of code-movement |
5 | submitters easier. | 5 | patchset is painful to have to rebase. |
6 | 6 | ||
7 | thanks | 7 | thanks |
8 | -- PMM | 8 | -- PMM |
9 | 9 | ||
10 | The following changes since commit dddb37495b844270088e68e3bf30b764d48d863f: | 10 | The following changes since commit ae9108f8f0746ce64d02afb1a216153a50926132: |
11 | 11 | ||
12 | Merge remote-tracking branch 'remotes/awilliam/tags/vfio-updates-20181015.0' into staging (2018-10-15 18:44:04 +0100) | 12 | Merge remote-tracking branch 'remotes/vivier2/tags/linux-user-for-4.1-pull-request' into staging (2019-07-01 15:55:40 +0100) |
13 | 13 | ||
14 | are available in the Git repository at: | 14 | are available in the Git repository at: |
15 | 15 | ||
16 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20181016 | 16 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20190701 |
17 | 17 | ||
18 | for you to fetch changes up to bdaffef4bb0729a74c7a325dba5c61d8cd8f464f: | 18 | for you to fetch changes up to 787a7e76c2e93a48c47b324fea592c9910a70483: |
19 | 19 | ||
20 | coccinelle: new inplace-byteswaps.cocci to remove inplace-byteswapping calls (2018-10-16 16:16:42 +0100) | 20 | target/arm: Declare some M-profile functions publicly (2019-07-01 17:29:01 +0100) |
21 | 21 | ||
22 | ---------------------------------------------------------------- | 22 | ---------------------------------------------------------------- |
23 | target-arm queue: | 23 | target-arm queue: |
24 | * hw/arm/virt: add DT property /secure-chosen/stdout-path indicating secure UART | 24 | * hw/arm/boot: fix direct kernel boot with initrd |
25 | * target/arm: Fix aarch64_sve_change_el wrt EL0 | 25 | * hw/arm/msf2-som: Exit when the cpu is not the expected one |
26 | * target/arm: Define fields of ISAR registers | 26 | * i.mx7: fix bugs in PCI controller needed to boot recent kernels |
27 | * target/arm: Align cortex-r5 id_isar0 | 27 | * aspeed: add RTC device |
28 | * target/arm: Fix cortex-a7 id_isar0 | 28 | * aspeed: fix some timer device bugs |
29 | * net/cadence_gem: Fix various bugs, add support for new | 29 | * aspeed: add swift-bmc board |
30 | features that will be used by the Xilinx Versal board | 30 | * aspeed: vic: Add support for legacy register interface |
31 | * target-arm: powerctl: Enable HVC when starting CPUs to EL2 | 31 | * aspeed: add aspeed-xdma device |
32 | * target/arm: Add the Cortex-A72 | 32 | * Add new sbsa-ref board for aarch64 |
33 | * target/arm: Mark PMINTENCLR and PMINTENCLR_EL1 accesses as possibly doing IO | 33 | * target/arm: code refactoring in preparation for support of |
34 | * target/arm: Mask PMOVSR writes based on supported counters | 34 | compilation with TCG disabled |
35 | * target/arm: Initialize ARMMMUFaultInfo in v7m_stack_read/write | ||
36 | * coccinelle: new inplace-byteswaps.cocci to remove inplace-byteswapping calls | ||
37 | 35 | ||
38 | ---------------------------------------------------------------- | 36 | ---------------------------------------------------------------- |
39 | Aaron Lindsay (2): | 37 | Adriana Kobylak (1): |
40 | target/arm: Mark PMINTENCLR and PMINTENCLR_EL1 accesses as possibly doing IO | 38 | aspeed: Add support for the swift-bmc board |
41 | target/arm: Mask PMOVSR writes based on supported counters | ||
42 | 39 | ||
43 | Edgar E. Iglesias (10): | 40 | Andrew Jeffery (3): |
44 | net: cadence_gem: Disable TSU feature bit | 41 | aspeed/timer: Status register contains reload for stopped timer |
45 | net: cadence_gem: Announce availability of priority queues | 42 | aspeed/timer: Fix match calculations |
46 | net: cadence_gem: Use uint32_t for 32bit descriptor words | 43 | aspeed: vic: Add support for legacy register interface |
47 | net: cadence_gem: Add macro with max number of descriptor words | ||
48 | net: cadence_gem: Add support for extended descriptors | ||
49 | net: cadence_gem: Add support for selecting the DMA MemoryRegion | ||
50 | net: cadence_gem: Implement support for 64bit descriptor addresses | ||
51 | net: cadence_gem: Announce 64bit addressing support | ||
52 | target-arm: powerctl: Enable HVC when starting CPUs to EL2 | ||
53 | target/arm: Add the Cortex-A72 | ||
54 | 44 | ||
55 | Jerome Forissier (1): | 45 | Andrew Jones (1): |
56 | hw/arm/virt: add DT property /secure-chosen/stdout-path indicating secure UART | 46 | hw/arm/boot: fix direct kernel boot with initrd |
57 | 47 | ||
58 | Peter Maydell (2): | 48 | Andrey Smirnov (5): |
59 | target/arm: Initialize ARMMMUFaultInfo in v7m_stack_read/write | 49 | i.mx7d: Add no-op/unimplemented APBH DMA module |
60 | coccinelle: new inplace-byteswaps.cocci to remove inplace-byteswapping calls | 50 | i.mx7d: Add no-op/unimplemented PCIE PHY IP block |
51 | pci: designware: Update MSI mapping unconditionally | ||
52 | pci: designware: Update MSI mapping when MSI address changes | ||
53 | i.mx7d: pci: Update PCI IRQ mapping to match HW | ||
61 | 54 | ||
62 | Richard Henderson (4): | 55 | Christian Svensson (1): |
63 | target/arm: Fix aarch64_sve_change_el wrt EL0 | 56 | aspeed/timer: Ensure positive muldiv delta |
64 | target/arm: Define fields of ISAR registers | ||
65 | target/arm: Align cortex-r5 id_isar0 | ||
66 | target/arm: Fix cortex-a7 id_isar0 | ||
67 | 57 | ||
68 | include/hw/net/cadence_gem.h | 7 +- | 58 | Cédric Le Goater (7): |
69 | target/arm/cpu.h | 95 +++++++++++++- | 59 | aspeed: add a per SoC mapping for the interrupt space |
70 | hw/arm/virt.c | 4 + | 60 | aspeed: add a per SoC mapping for the memory space |
71 | hw/net/cadence_gem.c | 192 +++++++++++++++++++++-------- | 61 | aspeed: introduce a configurable number of CPU per machine |
72 | target/arm/arm-powerctl.c | 10 ++ | 62 | aspeed: add support for multiple NICs |
73 | target/arm/cpu.c | 7 +- | 63 | aspeed: remove the "ram" link |
74 | target/arm/cpu64.c | 66 +++++++++- | 64 | aspeed: add a RAM memory region container |
75 | target/arm/helper.c | 27 ++-- | 65 | aspeed/smc: add a 'sdram_base' property |
76 | target/arm/op_helper.c | 6 +- | ||
77 | scripts/coccinelle/inplace-byteswaps.cocci | 65 ++++++++++ | ||
78 | 10 files changed, 408 insertions(+), 71 deletions(-) | ||
79 | create mode 100644 scripts/coccinelle/inplace-byteswaps.cocci | ||
80 | 66 | ||
67 | Eddie James (1): | ||
68 | hw/misc/aspeed_xdma: New device | ||
69 | |||
70 | Hongbo Zhang (2): | ||
71 | hw/arm: Add arm SBSA reference machine, skeleton part | ||
72 | hw/arm: Add arm SBSA reference machine, devices part | ||
73 | |||
74 | Jan Kiszka (1): | ||
75 | hw/arm/virt: Add support for Cortex-A7 | ||
76 | |||
77 | Joel Stanley (4): | ||
78 | hw: timer: Add ASPEED RTC device | ||
79 | hw/arm/aspeed: Add RTC to SoC | ||
80 | aspeed/timer: Fix behaviour running Linux | ||
81 | aspeed: Link SCU to the watchdog | ||
82 | |||
83 | Philippe Mathieu-Daudé (19): | ||
84 | hw/arm/msf2-som: Exit when the cpu is not the expected one | ||
85 | target/arm: Makefile cleanup (Aarch64) | ||
86 | target/arm: Makefile cleanup (ARM) | ||
87 | target/arm: Makefile cleanup (KVM) | ||
88 | target/arm: Makefile cleanup (softmmu) | ||
89 | target/arm: Add copyright boilerplate | ||
90 | target/arm/helper: Remove unused include | ||
91 | target/arm: Fix multiline comment syntax | ||
92 | target/arm: Fix coding style issues | ||
93 | target/arm: Move CPU state dumping routines to cpu.c | ||
94 | target/arm: Declare get_phys_addr() function publicly | ||
95 | target/arm: Move TLB related routines to tlb_helper.c | ||
96 | target/arm/vfp_helper: Move code around | ||
97 | target/arm/vfp_helper: Extract vfp_set_fpscr_to_host() | ||
98 | target/arm/vfp_helper: Extract vfp_set_fpscr_from_host() | ||
99 | target/arm/vfp_helper: Restrict the SoftFloat use to TCG | ||
100 | target/arm: Restrict PSCI to TCG | ||
101 | target/arm: Declare arm_log_exception() function publicly | ||
102 | target/arm: Declare some M-profile functions publicly | ||
103 | |||
104 | Samuel Ortiz (1): | ||
105 | target/arm: Move the DC ZVA helper into op_helper | ||
106 | |||
107 | hw/arm/Makefile.objs | 1 + | ||
108 | hw/misc/Makefile.objs | 1 + | ||
109 | hw/timer/Makefile.objs | 2 +- | ||
110 | target/arm/Makefile.objs | 24 +- | ||
111 | include/hw/arm/aspeed_soc.h | 53 ++- | ||
112 | include/hw/arm/fsl-imx7.h | 14 +- | ||
113 | include/hw/misc/aspeed_xdma.h | 30 ++ | ||
114 | include/hw/ssi/aspeed_smc.h | 3 + | ||
115 | include/hw/timer/aspeed_rtc.h | 31 ++ | ||
116 | include/hw/watchdog/wdt_aspeed.h | 1 + | ||
117 | target/arm/cpu.h | 2 - | ||
118 | target/arm/internals.h | 69 ++- | ||
119 | target/arm/translate.h | 5 - | ||
120 | hw/arm/aspeed.c | 76 +++- | ||
121 | hw/arm/aspeed_soc.c | 262 +++++++++--- | ||
122 | hw/arm/boot.c | 3 +- | ||
123 | hw/arm/fsl-imx7.c | 11 + | ||
124 | hw/arm/msf2-som.c | 1 + | ||
125 | hw/arm/sbsa-ref.c | 806 ++++++++++++++++++++++++++++++++++++ | ||
126 | hw/arm/virt.c | 1 + | ||
127 | hw/intc/aspeed_vic.c | 105 +++-- | ||
128 | hw/misc/aspeed_xdma.c | 165 ++++++++ | ||
129 | hw/pci-host/designware.c | 18 +- | ||
130 | hw/ssi/aspeed_smc.c | 1 + | ||
131 | hw/timer/aspeed_rtc.c | 180 ++++++++ | ||
132 | hw/timer/aspeed_timer.c | 76 ++-- | ||
133 | hw/watchdog/wdt_aspeed.c | 20 + | ||
134 | target/arm/cpu.c | 232 ++++++++++- | ||
135 | target/arm/helper.c | 498 +++++++++------------- | ||
136 | target/arm/op_helper.c | 262 ++++++------ | ||
137 | target/arm/tlb_helper.c | 200 +++++++++ | ||
138 | target/arm/translate-a64.c | 128 ------ | ||
139 | target/arm/translate.c | 91 +--- | ||
140 | target/arm/vfp_helper.c | 199 +++++---- | ||
141 | MAINTAINERS | 8 + | ||
142 | default-configs/aarch64-softmmu.mak | 1 + | ||
143 | hw/arm/Kconfig | 14 + | ||
144 | hw/misc/trace-events | 3 + | ||
145 | hw/timer/trace-events | 4 + | ||
146 | 39 files changed, 2675 insertions(+), 926 deletions(-) | ||
147 | create mode 100644 include/hw/misc/aspeed_xdma.h | ||
148 | create mode 100644 include/hw/timer/aspeed_rtc.h | ||
149 | create mode 100644 hw/arm/sbsa-ref.c | ||
150 | create mode 100644 hw/misc/aspeed_xdma.c | ||
151 | create mode 100644 hw/timer/aspeed_rtc.c | ||
152 | create mode 100644 target/arm/tlb_helper.c | ||
153 | diff view generated by jsdifflib |
1 | From: "Edgar E. Iglesias" <edgar.iglesias@xilinx.com> | 1 | From: Andrew Jones <drjones@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | Announce 64bit addressing support. | 3 | Fix the condition used to check whether the initrd fits |
4 | into RAM; in some cases if an initrd was also passed on | ||
5 | the command line we would get an error stating that it | ||
6 | was too big to fit into RAM after the kernel. Despite the | ||
7 | error the loader continued anyway, though, so also add an | ||
8 | exit(1) when the initrd is actually too big. | ||
4 | 9 | ||
5 | Reviewed-by: Alistair Francis <alistair.francis@wdc.com> | 10 | Fixes: 852dc64d665f ("hw/arm/boot: Diagnose layouts that put initrd or |
6 | Signed-off-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | 11 | DTB off the end of RAM") |
7 | Message-id: 20181011021931.4249-9-edgar.iglesias@gmail.com | 12 | Signed-off-by: Andrew Jones <drjones@redhat.com> |
13 | Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
14 | Message-id: 20190618125844.4863-1-drjones@redhat.com | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 15 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | --- | 16 | --- |
10 | hw/net/cadence_gem.c | 3 ++- | 17 | hw/arm/boot.c | 3 ++- |
11 | 1 file changed, 2 insertions(+), 1 deletion(-) | 18 | 1 file changed, 2 insertions(+), 1 deletion(-) |
12 | 19 | ||
13 | diff --git a/hw/net/cadence_gem.c b/hw/net/cadence_gem.c | 20 | diff --git a/hw/arm/boot.c b/hw/arm/boot.c |
14 | index XXXXXXX..XXXXXXX 100644 | 21 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/hw/net/cadence_gem.c | 22 | --- a/hw/arm/boot.c |
16 | +++ b/hw/net/cadence_gem.c | 23 | +++ b/hw/arm/boot.c |
17 | @@ -XXX,XX +XXX,XX @@ | 24 | @@ -XXX,XX +XXX,XX @@ static void arm_setup_direct_kernel_boot(ARMCPU *cpu, |
18 | #define GEM_DESCONF4 (0x0000028C/4) | 25 | info->initrd_filename); |
19 | #define GEM_DESCONF5 (0x00000290/4) | 26 | exit(1); |
20 | #define GEM_DESCONF6 (0x00000294/4) | 27 | } |
21 | +#define GEM_DESCONF6_64B_MASK (1U << 23) | 28 | - if (info->initrd_start + initrd_size > info->ram_size) { |
22 | #define GEM_DESCONF7 (0x00000298/4) | 29 | + if (info->initrd_start + initrd_size > ram_end) { |
23 | 30 | error_report("could not load initrd '%s': " | |
24 | #define GEM_INT_Q1_STATUS (0x00000400 / 4) | 31 | "too big to fit into RAM after the kernel", |
25 | @@ -XXX,XX +XXX,XX @@ static void gem_reset(DeviceState *d) | 32 | info->initrd_filename); |
26 | s->regs[GEM_DESCONF] = 0x02500111; | 33 | + exit(1); |
27 | s->regs[GEM_DESCONF2] = 0x2ab13fff; | 34 | } |
28 | s->regs[GEM_DESCONF5] = 0x002f2045; | 35 | } else { |
29 | - s->regs[GEM_DESCONF6] = 0x0; | 36 | initrd_size = 0; |
30 | + s->regs[GEM_DESCONF6] = GEM_DESCONF6_64B_MASK; | ||
31 | |||
32 | queues_mask = MAKE_64BIT_MASK(1, s->num_priority_queues - 1); | ||
33 | s->regs[GEM_DESCONF6] |= queues_mask; | ||
34 | -- | 37 | -- |
35 | 2.19.0 | 38 | 2.20.1 |
36 | 39 | ||
37 | 40 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
1 | 2 | ||
3 | This machine correctly defines its default_cpu_type to cortex-m3 | ||
4 | and report an error if the user requested another cpu_type, | ||
5 | however it does not exit, and this can confuse users trying | ||
6 | to use another core: | ||
7 | |||
8 | $ qemu-system-arm -M emcraft-sf2 -cpu cortex-m4 -kernel test-m4.elf | ||
9 | qemu-system-arm: This board can only be used with CPU cortex-m3-arm-cpu | ||
10 | [output related to M3 core ...] | ||
11 | |||
12 | The CPU is indeed a M3 core: | ||
13 | |||
14 | (qemu) info qom-tree | ||
15 | /machine (emcraft-sf2-machine) | ||
16 | /unattached (container) | ||
17 | /device[0] (msf2-soc) | ||
18 | /armv7m (armv7m) | ||
19 | /cpu (cortex-m3-arm-cpu) | ||
20 | |||
21 | Add the missing exit() call to return to the shell. | ||
22 | |||
23 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
24 | Reviewed-by: Alistair Francis <alistair.francis@wdc.com> | ||
25 | Reviewed-by: Eduardo Habkost <ehabkost@redhat.com> | ||
26 | Message-id: 20190617160136.29930-1-philmd@redhat.com | ||
27 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
28 | --- | ||
29 | hw/arm/msf2-som.c | 1 + | ||
30 | 1 file changed, 1 insertion(+) | ||
31 | |||
32 | diff --git a/hw/arm/msf2-som.c b/hw/arm/msf2-som.c | ||
33 | index XXXXXXX..XXXXXXX 100644 | ||
34 | --- a/hw/arm/msf2-som.c | ||
35 | +++ b/hw/arm/msf2-som.c | ||
36 | @@ -XXX,XX +XXX,XX @@ static void emcraft_sf2_s2s010_init(MachineState *machine) | ||
37 | if (strcmp(machine->cpu_type, mc->default_cpu_type) != 0) { | ||
38 | error_report("This board can only be used with CPU %s", | ||
39 | mc->default_cpu_type); | ||
40 | + exit(1); | ||
41 | } | ||
42 | |||
43 | memory_region_init_ram(ddr, NULL, "ddr-ram", DDR_SIZE, | ||
44 | -- | ||
45 | 2.20.1 | ||
46 | |||
47 | diff view generated by jsdifflib |
1 | From: Jerome Forissier <jerome.forissier@linaro.org> | 1 | From: Jan Kiszka <jan.kiszka@siemens.com> |
---|---|---|---|
2 | 2 | ||
3 | Bindings for /secure-chosen and /secure-chosen/stdout-path have been | 3 | Allow cortex-a7 to be used with the virt board; it supports |
4 | proposed 1.5 years ago [1] and implemented in OP-TEE at the same time [2]. | 4 | the v7VE features and there is no reason to deny this type. |
5 | They've now been officially agreed on, so we can implement them | ||
6 | in QEMU. | ||
7 | 5 | ||
8 | This patch creates the property when the machine is secure. | 6 | Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com> |
9 | 7 | Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> | |
10 | [1] https://patchwork.kernel.org/patch/9602401/ | 8 | Message-id: fc5404f7-4d1d-c28f-6e48-d8799c82acc0@web.de |
11 | [2] https://github.com/OP-TEE/optee_os/commit/4dc31c52544a | ||
12 | |||
13 | Signed-off-by: Jerome Forissier <jerome.forissier@linaro.org> | ||
14 | Message-id: 20181005080729.6480-1-jerome.forissier@linaro.org | ||
15 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
16 | [PMM: commit message tweak] | ||
17 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
18 | --- | 11 | --- |
19 | hw/arm/virt.c | 4 ++++ | 12 | hw/arm/virt.c | 1 + |
20 | 1 file changed, 4 insertions(+) | 13 | 1 file changed, 1 insertion(+) |
21 | 14 | ||
22 | diff --git a/hw/arm/virt.c b/hw/arm/virt.c | 15 | diff --git a/hw/arm/virt.c b/hw/arm/virt.c |
23 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
24 | --- a/hw/arm/virt.c | 17 | --- a/hw/arm/virt.c |
25 | +++ b/hw/arm/virt.c | 18 | +++ b/hw/arm/virt.c |
26 | @@ -XXX,XX +XXX,XX @@ static void create_uart(const VirtMachineState *vms, qemu_irq *pic, int uart, | 19 | @@ -XXX,XX +XXX,XX @@ static const int a15irqmap[] = { |
27 | /* Mark as not usable by the normal world */ | 20 | }; |
28 | qemu_fdt_setprop_string(vms->fdt, nodename, "status", "disabled"); | 21 | |
29 | qemu_fdt_setprop_string(vms->fdt, nodename, "secure-status", "okay"); | 22 | static const char *valid_cpus[] = { |
30 | + | 23 | + ARM_CPU_TYPE_NAME("cortex-a7"), |
31 | + qemu_fdt_add_subnode(vms->fdt, "/secure-chosen"); | 24 | ARM_CPU_TYPE_NAME("cortex-a15"), |
32 | + qemu_fdt_setprop_string(vms->fdt, "/secure-chosen", "stdout-path", | 25 | ARM_CPU_TYPE_NAME("cortex-a53"), |
33 | + nodename); | 26 | ARM_CPU_TYPE_NAME("cortex-a57"), |
34 | } | ||
35 | |||
36 | g_free(nodename); | ||
37 | -- | 27 | -- |
38 | 2.19.0 | 28 | 2.20.1 |
39 | 29 | ||
40 | 30 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Andrey Smirnov <andrew.smirnov@gmail.com> | ||
1 | 2 | ||
3 | Instantiate no-op APBH DMA module. Needed to boot latest Linux kernel. | ||
4 | |||
5 | Signed-off-by: Andrey Smirnov <andrew.smirnov@gmail.com> | ||
6 | Cc: Peter Maydell <peter.maydell@linaro.org> | ||
7 | Cc: Michael S. Tsirkin <mst@redhat.com> | ||
8 | Cc: qemu-devel@nongnu.org | ||
9 | Cc: qemu-arm@nongnu.org | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | --- | ||
13 | include/hw/arm/fsl-imx7.h | 3 +++ | ||
14 | hw/arm/fsl-imx7.c | 6 ++++++ | ||
15 | 2 files changed, 9 insertions(+) | ||
16 | |||
17 | diff --git a/include/hw/arm/fsl-imx7.h b/include/hw/arm/fsl-imx7.h | ||
18 | index XXXXXXX..XXXXXXX 100644 | ||
19 | --- a/include/hw/arm/fsl-imx7.h | ||
20 | +++ b/include/hw/arm/fsl-imx7.h | ||
21 | @@ -XXX,XX +XXX,XX @@ enum FslIMX7MemoryMap { | ||
22 | FSL_IMX7_PCIE_REG_SIZE = 16 * 1024, | ||
23 | |||
24 | FSL_IMX7_GPR_ADDR = 0x30340000, | ||
25 | + | ||
26 | + FSL_IMX7_DMA_APBH_ADDR = 0x33000000, | ||
27 | + FSL_IMX7_DMA_APBH_SIZE = 0x2000, | ||
28 | }; | ||
29 | |||
30 | enum FslIMX7IRQs { | ||
31 | diff --git a/hw/arm/fsl-imx7.c b/hw/arm/fsl-imx7.c | ||
32 | index XXXXXXX..XXXXXXX 100644 | ||
33 | --- a/hw/arm/fsl-imx7.c | ||
34 | +++ b/hw/arm/fsl-imx7.c | ||
35 | @@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp) | ||
36 | */ | ||
37 | create_unimplemented_device("lcdif", FSL_IMX7_LCDIF_ADDR, | ||
38 | FSL_IMX7_LCDIF_SIZE); | ||
39 | + | ||
40 | + /* | ||
41 | + * DMA APBH | ||
42 | + */ | ||
43 | + create_unimplemented_device("dma-apbh", FSL_IMX7_DMA_APBH_ADDR, | ||
44 | + FSL_IMX7_DMA_APBH_SIZE); | ||
45 | } | ||
46 | |||
47 | static void fsl_imx7_class_init(ObjectClass *oc, void *data) | ||
48 | -- | ||
49 | 2.20.1 | ||
50 | |||
51 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Andrey Smirnov <andrew.smirnov@gmail.com> | ||
1 | 2 | ||
3 | Add no-op/unimplemented PCIE PHY IP block. Needed by new kernels to | ||
4 | use PCIE. | ||
5 | |||
6 | Signed-off-by: Andrey Smirnov <andrew.smirnov@gmail.com> | ||
7 | Cc: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Cc: Michael S. Tsirkin <mst@redhat.com> | ||
9 | Cc: qemu-devel@nongnu.org | ||
10 | Cc: qemu-arm@nongnu.org | ||
11 | Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
13 | --- | ||
14 | include/hw/arm/fsl-imx7.h | 3 +++ | ||
15 | hw/arm/fsl-imx7.c | 5 +++++ | ||
16 | 2 files changed, 8 insertions(+) | ||
17 | |||
18 | diff --git a/include/hw/arm/fsl-imx7.h b/include/hw/arm/fsl-imx7.h | ||
19 | index XXXXXXX..XXXXXXX 100644 | ||
20 | --- a/include/hw/arm/fsl-imx7.h | ||
21 | +++ b/include/hw/arm/fsl-imx7.h | ||
22 | @@ -XXX,XX +XXX,XX @@ enum FslIMX7MemoryMap { | ||
23 | FSL_IMX7_ADC2_ADDR = 0x30620000, | ||
24 | FSL_IMX7_ADCn_SIZE = 0x1000, | ||
25 | |||
26 | + FSL_IMX7_PCIE_PHY_ADDR = 0x306D0000, | ||
27 | + FSL_IMX7_PCIE_PHY_SIZE = 0x10000, | ||
28 | + | ||
29 | FSL_IMX7_GPC_ADDR = 0x303A0000, | ||
30 | |||
31 | FSL_IMX7_I2C1_ADDR = 0x30A20000, | ||
32 | diff --git a/hw/arm/fsl-imx7.c b/hw/arm/fsl-imx7.c | ||
33 | index XXXXXXX..XXXXXXX 100644 | ||
34 | --- a/hw/arm/fsl-imx7.c | ||
35 | +++ b/hw/arm/fsl-imx7.c | ||
36 | @@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp) | ||
37 | */ | ||
38 | create_unimplemented_device("dma-apbh", FSL_IMX7_DMA_APBH_ADDR, | ||
39 | FSL_IMX7_DMA_APBH_SIZE); | ||
40 | + /* | ||
41 | + * PCIe PHY | ||
42 | + */ | ||
43 | + create_unimplemented_device("pcie-phy", FSL_IMX7_PCIE_PHY_ADDR, | ||
44 | + FSL_IMX7_PCIE_PHY_SIZE); | ||
45 | } | ||
46 | |||
47 | static void fsl_imx7_class_init(ObjectClass *oc, void *data) | ||
48 | -- | ||
49 | 2.20.1 | ||
50 | |||
51 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Andrey Smirnov <andrew.smirnov@gmail.com> | ||
1 | 2 | ||
3 | Expression to calculate update_msi_mapping in code handling writes to | ||
4 | DESIGNWARE_PCIE_MSI_INTR0_ENABLE is missing an ! operator and should | ||
5 | be: | ||
6 | |||
7 | !!root->msi.intr[0].enable ^ !!val; | ||
8 | |||
9 | so that MSI mapping is updated when enabled transitions from either | ||
10 | "none" -> "any" or "any" -> "none". Since that register shouldn't be | ||
11 | written to very often, change the code to update MSI mapping | ||
12 | unconditionally instead of trying to fix the update_msi_mapping logic. | ||
13 | |||
14 | Signed-off-by: Andrey Smirnov <andrew.smirnov@gmail.com> | ||
15 | Cc: Peter Maydell <peter.maydell@linaro.org> | ||
16 | Cc: Michael S. Tsirkin <mst@redhat.com> | ||
17 | Cc: qemu-devel@nongnu.org | ||
18 | Cc: qemu-arm@nongnu.org | ||
19 | Acked-by: Michael S. Tsirkin <mst@redhat.com> | ||
20 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
21 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
22 | --- | ||
23 | hw/pci-host/designware.c | 10 ++-------- | ||
24 | 1 file changed, 2 insertions(+), 8 deletions(-) | ||
25 | |||
26 | diff --git a/hw/pci-host/designware.c b/hw/pci-host/designware.c | ||
27 | index XXXXXXX..XXXXXXX 100644 | ||
28 | --- a/hw/pci-host/designware.c | ||
29 | +++ b/hw/pci-host/designware.c | ||
30 | @@ -XXX,XX +XXX,XX @@ static void designware_pcie_root_config_write(PCIDevice *d, uint32_t address, | ||
31 | root->msi.base |= (uint64_t)val << 32; | ||
32 | break; | ||
33 | |||
34 | - case DESIGNWARE_PCIE_MSI_INTR0_ENABLE: { | ||
35 | - const bool update_msi_mapping = !root->msi.intr[0].enable ^ !!val; | ||
36 | - | ||
37 | + case DESIGNWARE_PCIE_MSI_INTR0_ENABLE: | ||
38 | root->msi.intr[0].enable = val; | ||
39 | - | ||
40 | - if (update_msi_mapping) { | ||
41 | - designware_pcie_root_update_msi_mapping(root); | ||
42 | - } | ||
43 | + designware_pcie_root_update_msi_mapping(root); | ||
44 | break; | ||
45 | - } | ||
46 | |||
47 | case DESIGNWARE_PCIE_MSI_INTR0_MASK: | ||
48 | root->msi.intr[0].mask = val; | ||
49 | -- | ||
50 | 2.20.1 | ||
51 | |||
52 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Andrey Smirnov <andrew.smirnov@gmail.com> | ||
1 | 2 | ||
3 | MSI mapping needs to be update when MSI address changes, so add the | ||
4 | code to do so. | ||
5 | |||
6 | Signed-off-by: Andrey Smirnov <andrew.smirnov@gmail.com> | ||
7 | Cc: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Cc: Michael S. Tsirkin <mst@redhat.com> | ||
9 | Cc: qemu-devel@nongnu.org | ||
10 | Cc: qemu-arm@nongnu.org | ||
11 | Acked-by: Michael S. Tsirkin <mst@redhat.com> | ||
12 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
14 | --- | ||
15 | hw/pci-host/designware.c | 2 ++ | ||
16 | 1 file changed, 2 insertions(+) | ||
17 | |||
18 | diff --git a/hw/pci-host/designware.c b/hw/pci-host/designware.c | ||
19 | index XXXXXXX..XXXXXXX 100644 | ||
20 | --- a/hw/pci-host/designware.c | ||
21 | +++ b/hw/pci-host/designware.c | ||
22 | @@ -XXX,XX +XXX,XX @@ static void designware_pcie_root_config_write(PCIDevice *d, uint32_t address, | ||
23 | case DESIGNWARE_PCIE_MSI_ADDR_LO: | ||
24 | root->msi.base &= 0xFFFFFFFF00000000ULL; | ||
25 | root->msi.base |= val; | ||
26 | + designware_pcie_root_update_msi_mapping(root); | ||
27 | break; | ||
28 | |||
29 | case DESIGNWARE_PCIE_MSI_ADDR_HI: | ||
30 | root->msi.base &= 0x00000000FFFFFFFFULL; | ||
31 | root->msi.base |= (uint64_t)val << 32; | ||
32 | + designware_pcie_root_update_msi_mapping(root); | ||
33 | break; | ||
34 | |||
35 | case DESIGNWARE_PCIE_MSI_INTR0_ENABLE: | ||
36 | -- | ||
37 | 2.20.1 | ||
38 | |||
39 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Andrey Smirnov <andrew.smirnov@gmail.com> | ||
1 | 2 | ||
3 | Datasheet for i.MX7 is incorrect and i.MX7's PCI IRQ mapping matches | ||
4 | that of i.MX6: | ||
5 | |||
6 | * INTD/MSI 122 | ||
7 | * INTC 123 | ||
8 | * INTB 124 | ||
9 | * INTA 125 | ||
10 | |||
11 | Fix all of the relevant code to reflect that fact. Needed by latest | ||
12 | Linux kernels. | ||
13 | |||
14 | (Reference: Linux kernel commit 538d6e9d597584e80 from an | ||
15 | NXP employee confirming that the datasheet is incorrect and | ||
16 | with a report of a test against hardware.) | ||
17 | |||
18 | Signed-off-by: Andrey Smirnov <andrew.smirnov@gmail.com> | ||
19 | Cc: Peter Maydell <peter.maydell@linaro.org> | ||
20 | Cc: Michael S. Tsirkin <mst@redhat.com> | ||
21 | Cc: qemu-devel@nongnu.org | ||
22 | Cc: qemu-arm@nongnu.org | ||
23 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
24 | [PMM: added ref to kernel commit confirming the datasheet error] | ||
25 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
26 | --- | ||
27 | include/hw/arm/fsl-imx7.h | 8 ++++---- | ||
28 | hw/pci-host/designware.c | 6 ++++-- | ||
29 | 2 files changed, 8 insertions(+), 6 deletions(-) | ||
30 | |||
31 | diff --git a/include/hw/arm/fsl-imx7.h b/include/hw/arm/fsl-imx7.h | ||
32 | index XXXXXXX..XXXXXXX 100644 | ||
33 | --- a/include/hw/arm/fsl-imx7.h | ||
34 | +++ b/include/hw/arm/fsl-imx7.h | ||
35 | @@ -XXX,XX +XXX,XX @@ enum FslIMX7IRQs { | ||
36 | FSL_IMX7_USB2_IRQ = 42, | ||
37 | FSL_IMX7_USB3_IRQ = 40, | ||
38 | |||
39 | - FSL_IMX7_PCI_INTA_IRQ = 122, | ||
40 | - FSL_IMX7_PCI_INTB_IRQ = 123, | ||
41 | - FSL_IMX7_PCI_INTC_IRQ = 124, | ||
42 | - FSL_IMX7_PCI_INTD_IRQ = 125, | ||
43 | + FSL_IMX7_PCI_INTA_IRQ = 125, | ||
44 | + FSL_IMX7_PCI_INTB_IRQ = 124, | ||
45 | + FSL_IMX7_PCI_INTC_IRQ = 123, | ||
46 | + FSL_IMX7_PCI_INTD_IRQ = 122, | ||
47 | |||
48 | FSL_IMX7_UART7_IRQ = 126, | ||
49 | |||
50 | diff --git a/hw/pci-host/designware.c b/hw/pci-host/designware.c | ||
51 | index XXXXXXX..XXXXXXX 100644 | ||
52 | --- a/hw/pci-host/designware.c | ||
53 | +++ b/hw/pci-host/designware.c | ||
54 | @@ -XXX,XX +XXX,XX @@ | ||
55 | #define DESIGNWARE_PCIE_ATU_DEVFN(x) (((x) >> 16) & 0xff) | ||
56 | #define DESIGNWARE_PCIE_ATU_UPPER_TARGET 0x91C | ||
57 | |||
58 | +#define DESIGNWARE_PCIE_IRQ_MSI 3 | ||
59 | + | ||
60 | static DesignwarePCIEHost * | ||
61 | designware_pcie_root_to_host(DesignwarePCIERoot *root) | ||
62 | { | ||
63 | @@ -XXX,XX +XXX,XX @@ static void designware_pcie_root_msi_write(void *opaque, hwaddr addr, | ||
64 | root->msi.intr[0].status |= BIT(val) & root->msi.intr[0].enable; | ||
65 | |||
66 | if (root->msi.intr[0].status & ~root->msi.intr[0].mask) { | ||
67 | - qemu_set_irq(host->pci.irqs[0], 1); | ||
68 | + qemu_set_irq(host->pci.irqs[DESIGNWARE_PCIE_IRQ_MSI], 1); | ||
69 | } | ||
70 | } | ||
71 | |||
72 | @@ -XXX,XX +XXX,XX @@ static void designware_pcie_root_config_write(PCIDevice *d, uint32_t address, | ||
73 | case DESIGNWARE_PCIE_MSI_INTR0_STATUS: | ||
74 | root->msi.intr[0].status ^= val; | ||
75 | if (!root->msi.intr[0].status) { | ||
76 | - qemu_set_irq(host->pci.irqs[0], 0); | ||
77 | + qemu_set_irq(host->pci.irqs[DESIGNWARE_PCIE_IRQ_MSI], 0); | ||
78 | } | ||
79 | break; | ||
80 | |||
81 | -- | ||
82 | 2.20.1 | ||
83 | |||
84 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | 1 | From: Cédric Le Goater <clg@kaod.org> | |
2 | |||
3 | This will simplify the definition of new SoCs, like the AST2600 which | ||
4 | should use a different CPU and a different IRQ number layout. | ||
5 | |||
6 | Signed-off-by: Cédric Le Goater <clg@kaod.org> | ||
7 | Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
8 | Reviewed-by: Joel Stanley <joel@jms.id.au> | ||
9 | Message-id: 20190618165311.27066-2-clg@kaod.org | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | --- | ||
12 | include/hw/arm/aspeed_soc.h | 36 +++++++++++++++++++++++ | ||
13 | hw/arm/aspeed_soc.c | 57 +++++++++++++++++++++++++++++++------ | ||
14 | 2 files changed, 85 insertions(+), 8 deletions(-) | ||
15 | |||
16 | diff --git a/include/hw/arm/aspeed_soc.h b/include/hw/arm/aspeed_soc.h | ||
17 | index XXXXXXX..XXXXXXX 100644 | ||
18 | --- a/include/hw/arm/aspeed_soc.h | ||
19 | +++ b/include/hw/arm/aspeed_soc.h | ||
20 | @@ -XXX,XX +XXX,XX @@ typedef struct AspeedSoCInfo { | ||
21 | const char *fmc_typename; | ||
22 | const char **spi_typename; | ||
23 | int wdts_num; | ||
24 | + const int *irqmap; | ||
25 | } AspeedSoCInfo; | ||
26 | |||
27 | typedef struct AspeedSoCClass { | ||
28 | @@ -XXX,XX +XXX,XX @@ typedef struct AspeedSoCClass { | ||
29 | #define ASPEED_SOC_GET_CLASS(obj) \ | ||
30 | OBJECT_GET_CLASS(AspeedSoCClass, (obj), TYPE_ASPEED_SOC) | ||
31 | |||
32 | +enum { | ||
33 | + ASPEED_IOMEM, | ||
34 | + ASPEED_UART1, | ||
35 | + ASPEED_UART2, | ||
36 | + ASPEED_UART3, | ||
37 | + ASPEED_UART4, | ||
38 | + ASPEED_UART5, | ||
39 | + ASPEED_VUART, | ||
40 | + ASPEED_FMC, | ||
41 | + ASPEED_SPI1, | ||
42 | + ASPEED_SPI2, | ||
43 | + ASPEED_VIC, | ||
44 | + ASPEED_SDMC, | ||
45 | + ASPEED_SCU, | ||
46 | + ASPEED_ADC, | ||
47 | + ASPEED_SRAM, | ||
48 | + ASPEED_GPIO, | ||
49 | + ASPEED_RTC, | ||
50 | + ASPEED_TIMER1, | ||
51 | + ASPEED_TIMER2, | ||
52 | + ASPEED_TIMER3, | ||
53 | + ASPEED_TIMER4, | ||
54 | + ASPEED_TIMER5, | ||
55 | + ASPEED_TIMER6, | ||
56 | + ASPEED_TIMER7, | ||
57 | + ASPEED_TIMER8, | ||
58 | + ASPEED_WDT, | ||
59 | + ASPEED_PWM, | ||
60 | + ASPEED_LPC, | ||
61 | + ASPEED_IBT, | ||
62 | + ASPEED_I2C, | ||
63 | + ASPEED_ETH1, | ||
64 | + ASPEED_ETH2, | ||
65 | +}; | ||
66 | + | ||
67 | #endif /* ASPEED_SOC_H */ | ||
68 | diff --git a/hw/arm/aspeed_soc.c b/hw/arm/aspeed_soc.c | ||
69 | index XXXXXXX..XXXXXXX 100644 | ||
70 | --- a/hw/arm/aspeed_soc.c | ||
71 | +++ b/hw/arm/aspeed_soc.c | ||
72 | @@ -XXX,XX +XXX,XX @@ | ||
73 | #define ASPEED_SOC_ETH1_BASE 0x1E660000 | ||
74 | #define ASPEED_SOC_ETH2_BASE 0x1E680000 | ||
75 | |||
76 | -static const int uart_irqs[] = { 9, 32, 33, 34, 10 }; | ||
77 | -static const int timer_irqs[] = { 16, 17, 18, 35, 36, 37, 38, 39, }; | ||
78 | +static const int aspeed_soc_ast2400_irqmap[] = { | ||
79 | + [ASPEED_UART1] = 9, | ||
80 | + [ASPEED_UART2] = 32, | ||
81 | + [ASPEED_UART3] = 33, | ||
82 | + [ASPEED_UART4] = 34, | ||
83 | + [ASPEED_UART5] = 10, | ||
84 | + [ASPEED_VUART] = 8, | ||
85 | + [ASPEED_FMC] = 19, | ||
86 | + [ASPEED_SDMC] = 0, | ||
87 | + [ASPEED_SCU] = 21, | ||
88 | + [ASPEED_ADC] = 31, | ||
89 | + [ASPEED_GPIO] = 20, | ||
90 | + [ASPEED_RTC] = 22, | ||
91 | + [ASPEED_TIMER1] = 16, | ||
92 | + [ASPEED_TIMER2] = 17, | ||
93 | + [ASPEED_TIMER3] = 18, | ||
94 | + [ASPEED_TIMER4] = 35, | ||
95 | + [ASPEED_TIMER5] = 36, | ||
96 | + [ASPEED_TIMER6] = 37, | ||
97 | + [ASPEED_TIMER7] = 38, | ||
98 | + [ASPEED_TIMER8] = 39, | ||
99 | + [ASPEED_WDT] = 27, | ||
100 | + [ASPEED_PWM] = 28, | ||
101 | + [ASPEED_LPC] = 8, | ||
102 | + [ASPEED_IBT] = 8, /* LPC */ | ||
103 | + [ASPEED_I2C] = 12, | ||
104 | + [ASPEED_ETH1] = 2, | ||
105 | + [ASPEED_ETH2] = 3, | ||
106 | +}; | ||
107 | |||
108 | #define AST2400_SDRAM_BASE 0x40000000 | ||
109 | #define AST2500_SDRAM_BASE 0x80000000 | ||
110 | |||
111 | +/* AST2500 uses the same IRQs as the AST2400 */ | ||
112 | +#define aspeed_soc_ast2500_irqmap aspeed_soc_ast2400_irqmap | ||
113 | + | ||
114 | static const hwaddr aspeed_soc_ast2400_spi_bases[] = { ASPEED_SOC_SPI_BASE }; | ||
115 | static const char *aspeed_soc_ast2400_typenames[] = { "aspeed.smc.spi" }; | ||
116 | |||
117 | @@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = { | ||
118 | .fmc_typename = "aspeed.smc.fmc", | ||
119 | .spi_typename = aspeed_soc_ast2400_typenames, | ||
120 | .wdts_num = 2, | ||
121 | + .irqmap = aspeed_soc_ast2400_irqmap, | ||
122 | }, { | ||
123 | .name = "ast2400-a1", | ||
124 | .cpu_type = ARM_CPU_TYPE_NAME("arm926"), | ||
125 | @@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = { | ||
126 | .fmc_typename = "aspeed.smc.fmc", | ||
127 | .spi_typename = aspeed_soc_ast2400_typenames, | ||
128 | .wdts_num = 2, | ||
129 | + .irqmap = aspeed_soc_ast2400_irqmap, | ||
130 | }, { | ||
131 | .name = "ast2400", | ||
132 | .cpu_type = ARM_CPU_TYPE_NAME("arm926"), | ||
133 | @@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = { | ||
134 | .fmc_typename = "aspeed.smc.fmc", | ||
135 | .spi_typename = aspeed_soc_ast2400_typenames, | ||
136 | .wdts_num = 2, | ||
137 | + .irqmap = aspeed_soc_ast2400_irqmap, | ||
138 | }, { | ||
139 | .name = "ast2500-a1", | ||
140 | .cpu_type = ARM_CPU_TYPE_NAME("arm1176"), | ||
141 | @@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = { | ||
142 | .fmc_typename = "aspeed.smc.ast2500-fmc", | ||
143 | .spi_typename = aspeed_soc_ast2500_typenames, | ||
144 | .wdts_num = 3, | ||
145 | + .irqmap = aspeed_soc_ast2500_irqmap, | ||
146 | }, | ||
147 | }; | ||
148 | |||
149 | +static qemu_irq aspeed_soc_get_irq(AspeedSoCState *s, int ctrl) | ||
150 | +{ | ||
151 | + AspeedSoCClass *sc = ASPEED_SOC_GET_CLASS(s); | ||
152 | + | ||
153 | + return qdev_get_gpio_in(DEVICE(&s->vic), sc->info->irqmap[ctrl]); | ||
154 | +} | ||
155 | + | ||
156 | static void aspeed_soc_init(Object *obj) | ||
157 | { | ||
158 | AspeedSoCState *s = ASPEED_SOC(obj); | ||
159 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
160 | return; | ||
161 | } | ||
162 | sysbus_mmio_map(SYS_BUS_DEVICE(&s->timerctrl), 0, ASPEED_SOC_TIMER_BASE); | ||
163 | - for (i = 0; i < ARRAY_SIZE(timer_irqs); i++) { | ||
164 | - qemu_irq irq = qdev_get_gpio_in(DEVICE(&s->vic), timer_irqs[i]); | ||
165 | + for (i = 0; i < ASPEED_TIMER_NR_TIMERS; i++) { | ||
166 | + qemu_irq irq = aspeed_soc_get_irq(s, ASPEED_TIMER1 + i); | ||
167 | sysbus_connect_irq(SYS_BUS_DEVICE(&s->timerctrl), i, irq); | ||
168 | } | ||
169 | |||
170 | /* UART - attach an 8250 to the IO space as our UART5 */ | ||
171 | if (serial_hd(0)) { | ||
172 | - qemu_irq uart5 = qdev_get_gpio_in(DEVICE(&s->vic), uart_irqs[4]); | ||
173 | + qemu_irq uart5 = aspeed_soc_get_irq(s, ASPEED_UART5); | ||
174 | serial_mm_init(get_system_memory(), | ||
175 | ASPEED_SOC_IOMEM_BASE + ASPEED_SOC_UART_5_BASE, 2, | ||
176 | uart5, 38400, serial_hd(0), DEVICE_LITTLE_ENDIAN); | ||
177 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
178 | } | ||
179 | sysbus_mmio_map(SYS_BUS_DEVICE(&s->i2c), 0, ASPEED_SOC_I2C_BASE); | ||
180 | sysbus_connect_irq(SYS_BUS_DEVICE(&s->i2c), 0, | ||
181 | - qdev_get_gpio_in(DEVICE(&s->vic), 12)); | ||
182 | + aspeed_soc_get_irq(s, ASPEED_I2C)); | ||
183 | |||
184 | /* FMC, The number of CS is set at the board level */ | ||
185 | object_property_set_bool(OBJECT(&s->fmc), true, "realized", &err); | ||
186 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
187 | sysbus_mmio_map(SYS_BUS_DEVICE(&s->fmc), 1, | ||
188 | s->fmc.ctrl->flash_window_base); | ||
189 | sysbus_connect_irq(SYS_BUS_DEVICE(&s->fmc), 0, | ||
190 | - qdev_get_gpio_in(DEVICE(&s->vic), 19)); | ||
191 | + aspeed_soc_get_irq(s, ASPEED_FMC)); | ||
192 | |||
193 | /* SPI */ | ||
194 | for (i = 0; i < sc->info->spis_num; i++) { | ||
195 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
196 | } | ||
197 | sysbus_mmio_map(SYS_BUS_DEVICE(&s->ftgmac100), 0, ASPEED_SOC_ETH1_BASE); | ||
198 | sysbus_connect_irq(SYS_BUS_DEVICE(&s->ftgmac100), 0, | ||
199 | - qdev_get_gpio_in(DEVICE(&s->vic), 2)); | ||
200 | + aspeed_soc_get_irq(s, ASPEED_ETH1)); | ||
201 | } | ||
202 | |||
203 | static void aspeed_soc_class_init(ObjectClass *oc, void *data) | ||
204 | -- | ||
205 | 2.20.1 | ||
206 | |||
207 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | 1 | From: Cédric Le Goater <clg@kaod.org> | |
2 | |||
3 | This will simplify the definition of new SoCs, like the AST2600 which | ||
4 | should use a slightly different address space and have a different set | ||
5 | of controllers. | ||
6 | |||
7 | Signed-off-by: Cédric Le Goater <clg@kaod.org> | ||
8 | Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
9 | Reviewed-by: Joel Stanley <joel@jms.id.au> | ||
10 | Message-id: 20190618165311.27066-3-clg@kaod.org | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | --- | ||
13 | include/hw/arm/aspeed_soc.h | 4 +- | ||
14 | hw/arm/aspeed.c | 8 +-- | ||
15 | hw/arm/aspeed_soc.c | 117 ++++++++++++++++++++++-------------- | ||
16 | 3 files changed, 78 insertions(+), 51 deletions(-) | ||
17 | |||
18 | diff --git a/include/hw/arm/aspeed_soc.h b/include/hw/arm/aspeed_soc.h | ||
19 | index XXXXXXX..XXXXXXX 100644 | ||
20 | --- a/include/hw/arm/aspeed_soc.h | ||
21 | +++ b/include/hw/arm/aspeed_soc.h | ||
22 | @@ -XXX,XX +XXX,XX @@ typedef struct AspeedSoCInfo { | ||
23 | const char *name; | ||
24 | const char *cpu_type; | ||
25 | uint32_t silicon_rev; | ||
26 | - hwaddr sdram_base; | ||
27 | uint64_t sram_size; | ||
28 | int spis_num; | ||
29 | - const hwaddr *spi_bases; | ||
30 | const char *fmc_typename; | ||
31 | const char **spi_typename; | ||
32 | int wdts_num; | ||
33 | const int *irqmap; | ||
34 | + const hwaddr *memmap; | ||
35 | } AspeedSoCInfo; | ||
36 | |||
37 | typedef struct AspeedSoCClass { | ||
38 | @@ -XXX,XX +XXX,XX @@ enum { | ||
39 | ASPEED_I2C, | ||
40 | ASPEED_ETH1, | ||
41 | ASPEED_ETH2, | ||
42 | + ASPEED_SDRAM, | ||
43 | }; | ||
44 | |||
45 | #endif /* ASPEED_SOC_H */ | ||
46 | diff --git a/hw/arm/aspeed.c b/hw/arm/aspeed.c | ||
47 | index XXXXXXX..XXXXXXX 100644 | ||
48 | --- a/hw/arm/aspeed.c | ||
49 | +++ b/hw/arm/aspeed.c | ||
50 | @@ -XXX,XX +XXX,XX @@ static void aspeed_board_init(MachineState *machine, | ||
51 | &error_abort); | ||
52 | |||
53 | memory_region_allocate_system_memory(&bmc->ram, NULL, "ram", ram_size); | ||
54 | - memory_region_add_subregion(get_system_memory(), sc->info->sdram_base, | ||
55 | - &bmc->ram); | ||
56 | + memory_region_add_subregion(get_system_memory(), | ||
57 | + sc->info->memmap[ASPEED_SDRAM], &bmc->ram); | ||
58 | object_property_add_const_link(OBJECT(&bmc->soc), "ram", OBJECT(&bmc->ram), | ||
59 | &error_abort); | ||
60 | |||
61 | @@ -XXX,XX +XXX,XX @@ static void aspeed_board_init(MachineState *machine, | ||
62 | memory_region_init_io(&bmc->max_ram, NULL, &max_ram_ops, NULL, | ||
63 | "max_ram", max_ram_size - ram_size); | ||
64 | memory_region_add_subregion(get_system_memory(), | ||
65 | - sc->info->sdram_base + ram_size, | ||
66 | + sc->info->memmap[ASPEED_SDRAM] + ram_size, | ||
67 | &bmc->max_ram); | ||
68 | |||
69 | aspeed_board_init_flashes(&bmc->soc.fmc, cfg->fmc_model, &error_abort); | ||
70 | @@ -XXX,XX +XXX,XX @@ static void aspeed_board_init(MachineState *machine, | ||
71 | aspeed_board_binfo.initrd_filename = machine->initrd_filename; | ||
72 | aspeed_board_binfo.kernel_cmdline = machine->kernel_cmdline; | ||
73 | aspeed_board_binfo.ram_size = ram_size; | ||
74 | - aspeed_board_binfo.loader_start = sc->info->sdram_base; | ||
75 | + aspeed_board_binfo.loader_start = sc->info->memmap[ASPEED_SDRAM]; | ||
76 | |||
77 | if (cfg->i2c_init) { | ||
78 | cfg->i2c_init(bmc); | ||
79 | diff --git a/hw/arm/aspeed_soc.c b/hw/arm/aspeed_soc.c | ||
80 | index XXXXXXX..XXXXXXX 100644 | ||
81 | --- a/hw/arm/aspeed_soc.c | ||
82 | +++ b/hw/arm/aspeed_soc.c | ||
83 | @@ -XXX,XX +XXX,XX @@ | ||
84 | #include "hw/i2c/aspeed_i2c.h" | ||
85 | #include "net/net.h" | ||
86 | |||
87 | -#define ASPEED_SOC_UART_5_BASE 0x00184000 | ||
88 | #define ASPEED_SOC_IOMEM_SIZE 0x00200000 | ||
89 | -#define ASPEED_SOC_IOMEM_BASE 0x1E600000 | ||
90 | -#define ASPEED_SOC_FMC_BASE 0x1E620000 | ||
91 | -#define ASPEED_SOC_SPI_BASE 0x1E630000 | ||
92 | -#define ASPEED_SOC_SPI2_BASE 0x1E631000 | ||
93 | -#define ASPEED_SOC_VIC_BASE 0x1E6C0000 | ||
94 | -#define ASPEED_SOC_SDMC_BASE 0x1E6E0000 | ||
95 | -#define ASPEED_SOC_SCU_BASE 0x1E6E2000 | ||
96 | -#define ASPEED_SOC_SRAM_BASE 0x1E720000 | ||
97 | -#define ASPEED_SOC_TIMER_BASE 0x1E782000 | ||
98 | -#define ASPEED_SOC_WDT_BASE 0x1E785000 | ||
99 | -#define ASPEED_SOC_I2C_BASE 0x1E78A000 | ||
100 | -#define ASPEED_SOC_ETH1_BASE 0x1E660000 | ||
101 | -#define ASPEED_SOC_ETH2_BASE 0x1E680000 | ||
102 | + | ||
103 | +static const hwaddr aspeed_soc_ast2400_memmap[] = { | ||
104 | + [ASPEED_IOMEM] = 0x1E600000, | ||
105 | + [ASPEED_FMC] = 0x1E620000, | ||
106 | + [ASPEED_SPI1] = 0x1E630000, | ||
107 | + [ASPEED_VIC] = 0x1E6C0000, | ||
108 | + [ASPEED_SDMC] = 0x1E6E0000, | ||
109 | + [ASPEED_SCU] = 0x1E6E2000, | ||
110 | + [ASPEED_ADC] = 0x1E6E9000, | ||
111 | + [ASPEED_SRAM] = 0x1E720000, | ||
112 | + [ASPEED_GPIO] = 0x1E780000, | ||
113 | + [ASPEED_RTC] = 0x1E781000, | ||
114 | + [ASPEED_TIMER1] = 0x1E782000, | ||
115 | + [ASPEED_WDT] = 0x1E785000, | ||
116 | + [ASPEED_PWM] = 0x1E786000, | ||
117 | + [ASPEED_LPC] = 0x1E789000, | ||
118 | + [ASPEED_IBT] = 0x1E789140, | ||
119 | + [ASPEED_I2C] = 0x1E78A000, | ||
120 | + [ASPEED_ETH1] = 0x1E660000, | ||
121 | + [ASPEED_ETH2] = 0x1E680000, | ||
122 | + [ASPEED_UART1] = 0x1E783000, | ||
123 | + [ASPEED_UART5] = 0x1E784000, | ||
124 | + [ASPEED_VUART] = 0x1E787000, | ||
125 | + [ASPEED_SDRAM] = 0x40000000, | ||
126 | +}; | ||
127 | + | ||
128 | +static const hwaddr aspeed_soc_ast2500_memmap[] = { | ||
129 | + [ASPEED_IOMEM] = 0x1E600000, | ||
130 | + [ASPEED_FMC] = 0x1E620000, | ||
131 | + [ASPEED_SPI1] = 0x1E630000, | ||
132 | + [ASPEED_SPI2] = 0x1E631000, | ||
133 | + [ASPEED_VIC] = 0x1E6C0000, | ||
134 | + [ASPEED_SDMC] = 0x1E6E0000, | ||
135 | + [ASPEED_SCU] = 0x1E6E2000, | ||
136 | + [ASPEED_ADC] = 0x1E6E9000, | ||
137 | + [ASPEED_SRAM] = 0x1E720000, | ||
138 | + [ASPEED_GPIO] = 0x1E780000, | ||
139 | + [ASPEED_RTC] = 0x1E781000, | ||
140 | + [ASPEED_TIMER1] = 0x1E782000, | ||
141 | + [ASPEED_WDT] = 0x1E785000, | ||
142 | + [ASPEED_PWM] = 0x1E786000, | ||
143 | + [ASPEED_LPC] = 0x1E789000, | ||
144 | + [ASPEED_IBT] = 0x1E789140, | ||
145 | + [ASPEED_I2C] = 0x1E78A000, | ||
146 | + [ASPEED_ETH1] = 0x1E660000, | ||
147 | + [ASPEED_ETH2] = 0x1E680000, | ||
148 | + [ASPEED_UART1] = 0x1E783000, | ||
149 | + [ASPEED_UART5] = 0x1E784000, | ||
150 | + [ASPEED_VUART] = 0x1E787000, | ||
151 | + [ASPEED_SDRAM] = 0x80000000, | ||
152 | +}; | ||
153 | |||
154 | static const int aspeed_soc_ast2400_irqmap[] = { | ||
155 | [ASPEED_UART1] = 9, | ||
156 | @@ -XXX,XX +XXX,XX @@ static const int aspeed_soc_ast2400_irqmap[] = { | ||
157 | [ASPEED_ETH2] = 3, | ||
158 | }; | ||
159 | |||
160 | -#define AST2400_SDRAM_BASE 0x40000000 | ||
161 | -#define AST2500_SDRAM_BASE 0x80000000 | ||
162 | - | ||
163 | -/* AST2500 uses the same IRQs as the AST2400 */ | ||
164 | #define aspeed_soc_ast2500_irqmap aspeed_soc_ast2400_irqmap | ||
165 | |||
166 | -static const hwaddr aspeed_soc_ast2400_spi_bases[] = { ASPEED_SOC_SPI_BASE }; | ||
167 | static const char *aspeed_soc_ast2400_typenames[] = { "aspeed.smc.spi" }; | ||
168 | - | ||
169 | -static const hwaddr aspeed_soc_ast2500_spi_bases[] = { ASPEED_SOC_SPI_BASE, | ||
170 | - ASPEED_SOC_SPI2_BASE}; | ||
171 | static const char *aspeed_soc_ast2500_typenames[] = { | ||
172 | "aspeed.smc.ast2500-spi1", "aspeed.smc.ast2500-spi2" }; | ||
173 | |||
174 | @@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = { | ||
175 | .name = "ast2400-a0", | ||
176 | .cpu_type = ARM_CPU_TYPE_NAME("arm926"), | ||
177 | .silicon_rev = AST2400_A0_SILICON_REV, | ||
178 | - .sdram_base = AST2400_SDRAM_BASE, | ||
179 | .sram_size = 0x8000, | ||
180 | .spis_num = 1, | ||
181 | - .spi_bases = aspeed_soc_ast2400_spi_bases, | ||
182 | .fmc_typename = "aspeed.smc.fmc", | ||
183 | .spi_typename = aspeed_soc_ast2400_typenames, | ||
184 | .wdts_num = 2, | ||
185 | .irqmap = aspeed_soc_ast2400_irqmap, | ||
186 | + .memmap = aspeed_soc_ast2400_memmap, | ||
187 | }, { | ||
188 | .name = "ast2400-a1", | ||
189 | .cpu_type = ARM_CPU_TYPE_NAME("arm926"), | ||
190 | .silicon_rev = AST2400_A1_SILICON_REV, | ||
191 | - .sdram_base = AST2400_SDRAM_BASE, | ||
192 | .sram_size = 0x8000, | ||
193 | .spis_num = 1, | ||
194 | - .spi_bases = aspeed_soc_ast2400_spi_bases, | ||
195 | .fmc_typename = "aspeed.smc.fmc", | ||
196 | .spi_typename = aspeed_soc_ast2400_typenames, | ||
197 | .wdts_num = 2, | ||
198 | .irqmap = aspeed_soc_ast2400_irqmap, | ||
199 | + .memmap = aspeed_soc_ast2400_memmap, | ||
200 | }, { | ||
201 | .name = "ast2400", | ||
202 | .cpu_type = ARM_CPU_TYPE_NAME("arm926"), | ||
203 | .silicon_rev = AST2400_A0_SILICON_REV, | ||
204 | - .sdram_base = AST2400_SDRAM_BASE, | ||
205 | .sram_size = 0x8000, | ||
206 | .spis_num = 1, | ||
207 | - .spi_bases = aspeed_soc_ast2400_spi_bases, | ||
208 | .fmc_typename = "aspeed.smc.fmc", | ||
209 | .spi_typename = aspeed_soc_ast2400_typenames, | ||
210 | .wdts_num = 2, | ||
211 | .irqmap = aspeed_soc_ast2400_irqmap, | ||
212 | + .memmap = aspeed_soc_ast2400_memmap, | ||
213 | }, { | ||
214 | .name = "ast2500-a1", | ||
215 | .cpu_type = ARM_CPU_TYPE_NAME("arm1176"), | ||
216 | .silicon_rev = AST2500_A1_SILICON_REV, | ||
217 | - .sdram_base = AST2500_SDRAM_BASE, | ||
218 | .sram_size = 0x9000, | ||
219 | .spis_num = 2, | ||
220 | - .spi_bases = aspeed_soc_ast2500_spi_bases, | ||
221 | .fmc_typename = "aspeed.smc.ast2500-fmc", | ||
222 | .spi_typename = aspeed_soc_ast2500_typenames, | ||
223 | .wdts_num = 3, | ||
224 | .irqmap = aspeed_soc_ast2500_irqmap, | ||
225 | + .memmap = aspeed_soc_ast2500_memmap, | ||
226 | }, | ||
227 | }; | ||
228 | |||
229 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
230 | Error *err = NULL, *local_err = NULL; | ||
231 | |||
232 | /* IO space */ | ||
233 | - create_unimplemented_device("aspeed_soc.io", | ||
234 | - ASPEED_SOC_IOMEM_BASE, ASPEED_SOC_IOMEM_SIZE); | ||
235 | + create_unimplemented_device("aspeed_soc.io", sc->info->memmap[ASPEED_IOMEM], | ||
236 | + ASPEED_SOC_IOMEM_SIZE); | ||
237 | |||
238 | /* CPU */ | ||
239 | object_property_set_bool(OBJECT(&s->cpu), true, "realized", &err); | ||
240 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
241 | error_propagate(errp, err); | ||
242 | return; | ||
243 | } | ||
244 | - memory_region_add_subregion(get_system_memory(), ASPEED_SOC_SRAM_BASE, | ||
245 | - &s->sram); | ||
246 | + memory_region_add_subregion(get_system_memory(), | ||
247 | + sc->info->memmap[ASPEED_SRAM], &s->sram); | ||
248 | |||
249 | /* SCU */ | ||
250 | object_property_set_bool(OBJECT(&s->scu), true, "realized", &err); | ||
251 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
252 | error_propagate(errp, err); | ||
253 | return; | ||
254 | } | ||
255 | - sysbus_mmio_map(SYS_BUS_DEVICE(&s->scu), 0, ASPEED_SOC_SCU_BASE); | ||
256 | + sysbus_mmio_map(SYS_BUS_DEVICE(&s->scu), 0, sc->info->memmap[ASPEED_SCU]); | ||
257 | |||
258 | /* VIC */ | ||
259 | object_property_set_bool(OBJECT(&s->vic), true, "realized", &err); | ||
260 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
261 | error_propagate(errp, err); | ||
262 | return; | ||
263 | } | ||
264 | - sysbus_mmio_map(SYS_BUS_DEVICE(&s->vic), 0, ASPEED_SOC_VIC_BASE); | ||
265 | + sysbus_mmio_map(SYS_BUS_DEVICE(&s->vic), 0, sc->info->memmap[ASPEED_VIC]); | ||
266 | sysbus_connect_irq(SYS_BUS_DEVICE(&s->vic), 0, | ||
267 | qdev_get_gpio_in(DEVICE(&s->cpu), ARM_CPU_IRQ)); | ||
268 | sysbus_connect_irq(SYS_BUS_DEVICE(&s->vic), 1, | ||
269 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
270 | error_propagate(errp, err); | ||
271 | return; | ||
272 | } | ||
273 | - sysbus_mmio_map(SYS_BUS_DEVICE(&s->timerctrl), 0, ASPEED_SOC_TIMER_BASE); | ||
274 | + sysbus_mmio_map(SYS_BUS_DEVICE(&s->timerctrl), 0, | ||
275 | + sc->info->memmap[ASPEED_TIMER1]); | ||
276 | for (i = 0; i < ASPEED_TIMER_NR_TIMERS; i++) { | ||
277 | qemu_irq irq = aspeed_soc_get_irq(s, ASPEED_TIMER1 + i); | ||
278 | sysbus_connect_irq(SYS_BUS_DEVICE(&s->timerctrl), i, irq); | ||
279 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
280 | /* UART - attach an 8250 to the IO space as our UART5 */ | ||
281 | if (serial_hd(0)) { | ||
282 | qemu_irq uart5 = aspeed_soc_get_irq(s, ASPEED_UART5); | ||
283 | - serial_mm_init(get_system_memory(), | ||
284 | - ASPEED_SOC_IOMEM_BASE + ASPEED_SOC_UART_5_BASE, 2, | ||
285 | + serial_mm_init(get_system_memory(), sc->info->memmap[ASPEED_UART5], 2, | ||
286 | uart5, 38400, serial_hd(0), DEVICE_LITTLE_ENDIAN); | ||
287 | } | ||
288 | |||
289 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
290 | error_propagate(errp, err); | ||
291 | return; | ||
292 | } | ||
293 | - sysbus_mmio_map(SYS_BUS_DEVICE(&s->i2c), 0, ASPEED_SOC_I2C_BASE); | ||
294 | + sysbus_mmio_map(SYS_BUS_DEVICE(&s->i2c), 0, sc->info->memmap[ASPEED_I2C]); | ||
295 | sysbus_connect_irq(SYS_BUS_DEVICE(&s->i2c), 0, | ||
296 | aspeed_soc_get_irq(s, ASPEED_I2C)); | ||
297 | |||
298 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
299 | error_propagate(errp, err); | ||
300 | return; | ||
301 | } | ||
302 | - sysbus_mmio_map(SYS_BUS_DEVICE(&s->fmc), 0, ASPEED_SOC_FMC_BASE); | ||
303 | + sysbus_mmio_map(SYS_BUS_DEVICE(&s->fmc), 0, sc->info->memmap[ASPEED_FMC]); | ||
304 | sysbus_mmio_map(SYS_BUS_DEVICE(&s->fmc), 1, | ||
305 | s->fmc.ctrl->flash_window_base); | ||
306 | sysbus_connect_irq(SYS_BUS_DEVICE(&s->fmc), 0, | ||
307 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
308 | error_propagate(errp, err); | ||
309 | return; | ||
310 | } | ||
311 | - sysbus_mmio_map(SYS_BUS_DEVICE(&s->spi[i]), 0, sc->info->spi_bases[i]); | ||
312 | + sysbus_mmio_map(SYS_BUS_DEVICE(&s->spi[i]), 0, | ||
313 | + sc->info->memmap[ASPEED_SPI1 + i]); | ||
314 | sysbus_mmio_map(SYS_BUS_DEVICE(&s->spi[i]), 1, | ||
315 | s->spi[i].ctrl->flash_window_base); | ||
316 | } | ||
317 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
318 | error_propagate(errp, err); | ||
319 | return; | ||
320 | } | ||
321 | - sysbus_mmio_map(SYS_BUS_DEVICE(&s->sdmc), 0, ASPEED_SOC_SDMC_BASE); | ||
322 | + sysbus_mmio_map(SYS_BUS_DEVICE(&s->sdmc), 0, sc->info->memmap[ASPEED_SDMC]); | ||
323 | |||
324 | /* Watch dog */ | ||
325 | for (i = 0; i < sc->info->wdts_num; i++) { | ||
326 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
327 | return; | ||
328 | } | ||
329 | sysbus_mmio_map(SYS_BUS_DEVICE(&s->wdt[i]), 0, | ||
330 | - ASPEED_SOC_WDT_BASE + i * 0x20); | ||
331 | + sc->info->memmap[ASPEED_WDT] + i * 0x20); | ||
332 | } | ||
333 | |||
334 | /* Net */ | ||
335 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
336 | error_propagate(errp, err); | ||
337 | return; | ||
338 | } | ||
339 | - sysbus_mmio_map(SYS_BUS_DEVICE(&s->ftgmac100), 0, ASPEED_SOC_ETH1_BASE); | ||
340 | + sysbus_mmio_map(SYS_BUS_DEVICE(&s->ftgmac100), 0, | ||
341 | + sc->info->memmap[ASPEED_ETH1]); | ||
342 | sysbus_connect_irq(SYS_BUS_DEVICE(&s->ftgmac100), 0, | ||
343 | aspeed_soc_get_irq(s, ASPEED_ETH1)); | ||
344 | } | ||
345 | -- | ||
346 | 2.20.1 | ||
347 | |||
348 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | 1 | From: Joel Stanley <joel@jms.id.au> | |
2 | |||
3 | The RTC is modeled to provide time and date functionality. It is | ||
4 | initialised at zero to match the hardware. | ||
5 | |||
6 | There is no modelling of the alarm functionality, which includes the IRQ | ||
7 | line. As there is no guest code to exercise this function that is | ||
8 | acceptable for now. | ||
9 | |||
10 | Signed-off-by: Joel Stanley <joel@jms.id.au> | ||
11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | Message-id: 20190618165311.27066-4-clg@kaod.org | ||
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
14 | --- | ||
15 | hw/timer/Makefile.objs | 2 +- | ||
16 | include/hw/timer/aspeed_rtc.h | 31 ++++++ | ||
17 | hw/timer/aspeed_rtc.c | 180 ++++++++++++++++++++++++++++++++++ | ||
18 | hw/timer/trace-events | 4 + | ||
19 | 4 files changed, 216 insertions(+), 1 deletion(-) | ||
20 | create mode 100644 include/hw/timer/aspeed_rtc.h | ||
21 | create mode 100644 hw/timer/aspeed_rtc.c | ||
22 | |||
23 | diff --git a/hw/timer/Makefile.objs b/hw/timer/Makefile.objs | ||
24 | index XXXXXXX..XXXXXXX 100644 | ||
25 | --- a/hw/timer/Makefile.objs | ||
26 | +++ b/hw/timer/Makefile.objs | ||
27 | @@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_MC146818RTC) += mc146818rtc.o | ||
28 | obj-$(CONFIG_ALLWINNER_A10_PIT) += allwinner-a10-pit.o | ||
29 | |||
30 | common-obj-$(CONFIG_STM32F2XX_TIMER) += stm32f2xx_timer.o | ||
31 | -common-obj-$(CONFIG_ASPEED_SOC) += aspeed_timer.o | ||
32 | +common-obj-$(CONFIG_ASPEED_SOC) += aspeed_timer.o aspeed_rtc.o | ||
33 | |||
34 | common-obj-$(CONFIG_SUN4V_RTC) += sun4v-rtc.o | ||
35 | common-obj-$(CONFIG_CMSDK_APB_TIMER) += cmsdk-apb-timer.o | ||
36 | diff --git a/include/hw/timer/aspeed_rtc.h b/include/hw/timer/aspeed_rtc.h | ||
37 | new file mode 100644 | ||
38 | index XXXXXXX..XXXXXXX | ||
39 | --- /dev/null | ||
40 | +++ b/include/hw/timer/aspeed_rtc.h | ||
41 | @@ -XXX,XX +XXX,XX @@ | ||
42 | +/* | ||
43 | + * ASPEED Real Time Clock | ||
44 | + * Joel Stanley <joel@jms.id.au> | ||
45 | + * | ||
46 | + * Copyright 2019 IBM Corp | ||
47 | + * SPDX-License-Identifier: GPL-2.0-or-later | ||
48 | + */ | ||
49 | +#ifndef ASPEED_RTC_H | ||
50 | +#define ASPEED_RTC_H | ||
51 | + | ||
52 | +#include <stdint.h> | ||
53 | + | ||
54 | +#include "hw/hw.h" | ||
55 | +#include "hw/irq.h" | ||
56 | +#include "hw/sysbus.h" | ||
57 | + | ||
58 | +typedef struct AspeedRtcState { | ||
59 | + SysBusDevice parent_obj; | ||
60 | + | ||
61 | + MemoryRegion iomem; | ||
62 | + qemu_irq irq; | ||
63 | + | ||
64 | + uint32_t reg[0x18]; | ||
65 | + int offset; | ||
66 | + | ||
67 | +} AspeedRtcState; | ||
68 | + | ||
69 | +#define TYPE_ASPEED_RTC "aspeed.rtc" | ||
70 | +#define ASPEED_RTC(obj) OBJECT_CHECK(AspeedRtcState, (obj), TYPE_ASPEED_RTC) | ||
71 | + | ||
72 | +#endif /* ASPEED_RTC_H */ | ||
73 | diff --git a/hw/timer/aspeed_rtc.c b/hw/timer/aspeed_rtc.c | ||
74 | new file mode 100644 | ||
75 | index XXXXXXX..XXXXXXX | ||
76 | --- /dev/null | ||
77 | +++ b/hw/timer/aspeed_rtc.c | ||
78 | @@ -XXX,XX +XXX,XX @@ | ||
79 | +/* | ||
80 | + * ASPEED Real Time Clock | ||
81 | + * Joel Stanley <joel@jms.id.au> | ||
82 | + * | ||
83 | + * Copyright 2019 IBM Corp | ||
84 | + * SPDX-License-Identifier: GPL-2.0-or-later | ||
85 | + */ | ||
86 | + | ||
87 | +#include "qemu/osdep.h" | ||
88 | +#include "qemu-common.h" | ||
89 | +#include "hw/timer/aspeed_rtc.h" | ||
90 | +#include "qemu/log.h" | ||
91 | +#include "qemu/timer.h" | ||
92 | + | ||
93 | +#include "trace.h" | ||
94 | + | ||
95 | +#define COUNTER1 (0x00 / 4) | ||
96 | +#define COUNTER2 (0x04 / 4) | ||
97 | +#define ALARM (0x08 / 4) | ||
98 | +#define CONTROL (0x10 / 4) | ||
99 | +#define ALARM_STATUS (0x14 / 4) | ||
100 | + | ||
101 | +#define RTC_UNLOCKED BIT(1) | ||
102 | +#define RTC_ENABLED BIT(0) | ||
103 | + | ||
104 | +static void aspeed_rtc_calc_offset(AspeedRtcState *rtc) | ||
105 | +{ | ||
106 | + struct tm tm; | ||
107 | + uint32_t year, cent; | ||
108 | + uint32_t reg1 = rtc->reg[COUNTER1]; | ||
109 | + uint32_t reg2 = rtc->reg[COUNTER2]; | ||
110 | + | ||
111 | + tm.tm_mday = (reg1 >> 24) & 0x1f; | ||
112 | + tm.tm_hour = (reg1 >> 16) & 0x1f; | ||
113 | + tm.tm_min = (reg1 >> 8) & 0x3f; | ||
114 | + tm.tm_sec = (reg1 >> 0) & 0x3f; | ||
115 | + | ||
116 | + cent = (reg2 >> 16) & 0x1f; | ||
117 | + year = (reg2 >> 8) & 0x7f; | ||
118 | + tm.tm_mon = ((reg2 >> 0) & 0x0f) - 1; | ||
119 | + tm.tm_year = year + (cent * 100) - 1900; | ||
120 | + | ||
121 | + rtc->offset = qemu_timedate_diff(&tm); | ||
122 | +} | ||
123 | + | ||
124 | +static uint32_t aspeed_rtc_get_counter(AspeedRtcState *rtc, int r) | ||
125 | +{ | ||
126 | + uint32_t year, cent; | ||
127 | + struct tm now; | ||
128 | + | ||
129 | + qemu_get_timedate(&now, rtc->offset); | ||
130 | + | ||
131 | + switch (r) { | ||
132 | + case COUNTER1: | ||
133 | + return (now.tm_mday << 24) | (now.tm_hour << 16) | | ||
134 | + (now.tm_min << 8) | now.tm_sec; | ||
135 | + case COUNTER2: | ||
136 | + cent = (now.tm_year + 1900) / 100; | ||
137 | + year = now.tm_year % 100; | ||
138 | + return ((cent & 0x1f) << 16) | ((year & 0x7f) << 8) | | ||
139 | + ((now.tm_mon + 1) & 0xf); | ||
140 | + default: | ||
141 | + g_assert_not_reached(); | ||
142 | + } | ||
143 | +} | ||
144 | + | ||
145 | +static uint64_t aspeed_rtc_read(void *opaque, hwaddr addr, | ||
146 | + unsigned size) | ||
147 | +{ | ||
148 | + AspeedRtcState *rtc = opaque; | ||
149 | + uint64_t val; | ||
150 | + uint32_t r = addr >> 2; | ||
151 | + | ||
152 | + switch (r) { | ||
153 | + case COUNTER1: | ||
154 | + case COUNTER2: | ||
155 | + if (rtc->reg[CONTROL] & RTC_ENABLED) { | ||
156 | + rtc->reg[r] = aspeed_rtc_get_counter(rtc, r); | ||
157 | + } | ||
158 | + /* fall through */ | ||
159 | + case CONTROL: | ||
160 | + val = rtc->reg[r]; | ||
161 | + break; | ||
162 | + case ALARM: | ||
163 | + case ALARM_STATUS: | ||
164 | + default: | ||
165 | + qemu_log_mask(LOG_UNIMP, "%s: 0x%" HWADDR_PRIx "\n", __func__, addr); | ||
166 | + return 0; | ||
167 | + } | ||
168 | + | ||
169 | + trace_aspeed_rtc_read(addr, val); | ||
170 | + | ||
171 | + return val; | ||
172 | +} | ||
173 | + | ||
174 | +static void aspeed_rtc_write(void *opaque, hwaddr addr, | ||
175 | + uint64_t val, unsigned size) | ||
176 | +{ | ||
177 | + AspeedRtcState *rtc = opaque; | ||
178 | + uint32_t r = addr >> 2; | ||
179 | + | ||
180 | + switch (r) { | ||
181 | + case COUNTER1: | ||
182 | + case COUNTER2: | ||
183 | + if (!(rtc->reg[CONTROL] & RTC_UNLOCKED)) { | ||
184 | + break; | ||
185 | + } | ||
186 | + /* fall through */ | ||
187 | + case CONTROL: | ||
188 | + rtc->reg[r] = val; | ||
189 | + aspeed_rtc_calc_offset(rtc); | ||
190 | + break; | ||
191 | + case ALARM: | ||
192 | + case ALARM_STATUS: | ||
193 | + default: | ||
194 | + qemu_log_mask(LOG_UNIMP, "%s: 0x%" HWADDR_PRIx "\n", __func__, addr); | ||
195 | + break; | ||
196 | + } | ||
197 | + trace_aspeed_rtc_write(addr, val); | ||
198 | +} | ||
199 | + | ||
200 | +static void aspeed_rtc_reset(DeviceState *d) | ||
201 | +{ | ||
202 | + AspeedRtcState *rtc = ASPEED_RTC(d); | ||
203 | + | ||
204 | + rtc->offset = 0; | ||
205 | + memset(rtc->reg, 0, sizeof(rtc->reg)); | ||
206 | +} | ||
207 | + | ||
208 | +static const MemoryRegionOps aspeed_rtc_ops = { | ||
209 | + .read = aspeed_rtc_read, | ||
210 | + .write = aspeed_rtc_write, | ||
211 | + .endianness = DEVICE_NATIVE_ENDIAN, | ||
212 | +}; | ||
213 | + | ||
214 | +static const VMStateDescription vmstate_aspeed_rtc = { | ||
215 | + .name = TYPE_ASPEED_RTC, | ||
216 | + .version_id = 1, | ||
217 | + .fields = (VMStateField[]) { | ||
218 | + VMSTATE_UINT32_ARRAY(reg, AspeedRtcState, 0x18), | ||
219 | + VMSTATE_INT32(offset, AspeedRtcState), | ||
220 | + VMSTATE_INT32(offset, AspeedRtcState), | ||
221 | + VMSTATE_END_OF_LIST() | ||
222 | + } | ||
223 | +}; | ||
224 | + | ||
225 | +static void aspeed_rtc_realize(DeviceState *dev, Error **errp) | ||
226 | +{ | ||
227 | + SysBusDevice *sbd = SYS_BUS_DEVICE(dev); | ||
228 | + AspeedRtcState *s = ASPEED_RTC(dev); | ||
229 | + | ||
230 | + sysbus_init_irq(sbd, &s->irq); | ||
231 | + | ||
232 | + memory_region_init_io(&s->iomem, OBJECT(s), &aspeed_rtc_ops, s, | ||
233 | + "aspeed-rtc", 0x18ULL); | ||
234 | + sysbus_init_mmio(sbd, &s->iomem); | ||
235 | +} | ||
236 | + | ||
237 | +static void aspeed_rtc_class_init(ObjectClass *klass, void *data) | ||
238 | +{ | ||
239 | + DeviceClass *dc = DEVICE_CLASS(klass); | ||
240 | + | ||
241 | + dc->realize = aspeed_rtc_realize; | ||
242 | + dc->vmsd = &vmstate_aspeed_rtc; | ||
243 | + dc->reset = aspeed_rtc_reset; | ||
244 | +} | ||
245 | + | ||
246 | +static const TypeInfo aspeed_rtc_info = { | ||
247 | + .name = TYPE_ASPEED_RTC, | ||
248 | + .parent = TYPE_SYS_BUS_DEVICE, | ||
249 | + .instance_size = sizeof(AspeedRtcState), | ||
250 | + .class_init = aspeed_rtc_class_init, | ||
251 | +}; | ||
252 | + | ||
253 | +static void aspeed_rtc_register_types(void) | ||
254 | +{ | ||
255 | + type_register_static(&aspeed_rtc_info); | ||
256 | +} | ||
257 | + | ||
258 | +type_init(aspeed_rtc_register_types) | ||
259 | diff --git a/hw/timer/trace-events b/hw/timer/trace-events | ||
260 | index XXXXXXX..XXXXXXX 100644 | ||
261 | --- a/hw/timer/trace-events | ||
262 | +++ b/hw/timer/trace-events | ||
263 | @@ -XXX,XX +XXX,XX @@ cmsdk_apb_dualtimer_read(uint64_t offset, uint64_t data, unsigned size) "CMSDK A | ||
264 | cmsdk_apb_dualtimer_write(uint64_t offset, uint64_t data, unsigned size) "CMSDK APB dualtimer write: offset 0x%" PRIx64 " data 0x%" PRIx64 " size %u" | ||
265 | cmsdk_apb_dualtimer_reset(void) "CMSDK APB dualtimer: reset" | ||
266 | |||
267 | +# hw/timer/aspeed-rtc.c | ||
268 | +aspeed_rtc_read(uint64_t addr, uint64_t value) "addr 0x%02" PRIx64 " value 0x%08" PRIx64 | ||
269 | +aspeed_rtc_write(uint64_t addr, uint64_t value) "addr 0x%02" PRIx64 " value 0x%08" PRIx64 | ||
270 | + | ||
271 | # sun4v-rtc.c | ||
272 | sun4v_rtc_read(uint64_t addr, uint64_t value) "read: addr 0x%" PRIx64 " value 0x%" PRIx64 | ||
273 | sun4v_rtc_write(uint64_t addr, uint64_t value) "write: addr 0x%" PRIx64 " value 0x%" PRIx64 | ||
274 | -- | ||
275 | 2.20.1 | ||
276 | |||
277 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Joel Stanley <joel@jms.id.au> | ||
1 | 2 | ||
3 | All systems have an RTC. | ||
4 | |||
5 | The IRQ is hooked up but the model does not use it at this stage. There | ||
6 | is no guest code that uses it, so this limitation is acceptable. | ||
7 | |||
8 | Signed-off-by: Joel Stanley <joel@jms.id.au> | ||
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | Message-id: 20190618165311.27066-5-clg@kaod.org | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | --- | ||
13 | include/hw/arm/aspeed_soc.h | 2 ++ | ||
14 | hw/arm/aspeed_soc.c | 13 +++++++++++++ | ||
15 | 2 files changed, 15 insertions(+) | ||
16 | |||
17 | diff --git a/include/hw/arm/aspeed_soc.h b/include/hw/arm/aspeed_soc.h | ||
18 | index XXXXXXX..XXXXXXX 100644 | ||
19 | --- a/include/hw/arm/aspeed_soc.h | ||
20 | +++ b/include/hw/arm/aspeed_soc.h | ||
21 | @@ -XXX,XX +XXX,XX @@ | ||
22 | #include "hw/misc/aspeed_scu.h" | ||
23 | #include "hw/misc/aspeed_sdmc.h" | ||
24 | #include "hw/timer/aspeed_timer.h" | ||
25 | +#include "hw/timer/aspeed_rtc.h" | ||
26 | #include "hw/i2c/aspeed_i2c.h" | ||
27 | #include "hw/ssi/aspeed_smc.h" | ||
28 | #include "hw/watchdog/wdt_aspeed.h" | ||
29 | @@ -XXX,XX +XXX,XX @@ typedef struct AspeedSoCState { | ||
30 | ARMCPU cpu; | ||
31 | MemoryRegion sram; | ||
32 | AspeedVICState vic; | ||
33 | + AspeedRtcState rtc; | ||
34 | AspeedTimerCtrlState timerctrl; | ||
35 | AspeedI2CState i2c; | ||
36 | AspeedSCUState scu; | ||
37 | diff --git a/hw/arm/aspeed_soc.c b/hw/arm/aspeed_soc.c | ||
38 | index XXXXXXX..XXXXXXX 100644 | ||
39 | --- a/hw/arm/aspeed_soc.c | ||
40 | +++ b/hw/arm/aspeed_soc.c | ||
41 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_init(Object *obj) | ||
42 | sysbus_init_child_obj(obj, "vic", OBJECT(&s->vic), sizeof(s->vic), | ||
43 | TYPE_ASPEED_VIC); | ||
44 | |||
45 | + sysbus_init_child_obj(obj, "rtc", OBJECT(&s->rtc), sizeof(s->rtc), | ||
46 | + TYPE_ASPEED_RTC); | ||
47 | + | ||
48 | sysbus_init_child_obj(obj, "timerctrl", OBJECT(&s->timerctrl), | ||
49 | sizeof(s->timerctrl), TYPE_ASPEED_TIMER); | ||
50 | object_property_add_const_link(OBJECT(&s->timerctrl), "scu", | ||
51 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
52 | sysbus_connect_irq(SYS_BUS_DEVICE(&s->vic), 1, | ||
53 | qdev_get_gpio_in(DEVICE(&s->cpu), ARM_CPU_FIQ)); | ||
54 | |||
55 | + /* RTC */ | ||
56 | + object_property_set_bool(OBJECT(&s->rtc), true, "realized", &err); | ||
57 | + if (err) { | ||
58 | + error_propagate(errp, err); | ||
59 | + return; | ||
60 | + } | ||
61 | + sysbus_mmio_map(SYS_BUS_DEVICE(&s->rtc), 0, sc->info->memmap[ASPEED_RTC]); | ||
62 | + sysbus_connect_irq(SYS_BUS_DEVICE(&s->rtc), 0, | ||
63 | + aspeed_soc_get_irq(s, ASPEED_RTC)); | ||
64 | + | ||
65 | /* Timer */ | ||
66 | object_property_set_bool(OBJECT(&s->timerctrl), true, "realized", &err); | ||
67 | if (err) { | ||
68 | -- | ||
69 | 2.20.1 | ||
70 | |||
71 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | 1 | From: Cédric Le Goater <clg@kaod.org> | |
2 | |||
3 | The current models of the Aspeed SoCs only have one CPU but future | ||
4 | ones will support SMP. Introduce a new num_cpus field at the SoC class | ||
5 | level to define the number of available CPUs per SoC and also | ||
6 | introduce a 'num-cpus' property to activate the CPUs configured for | ||
7 | the machine. | ||
8 | |||
9 | The max_cpus limit of the machine should depend on the SoC definition | ||
10 | but, unfortunately, these values are not available when the machine | ||
11 | class is initialized. This is the reason why we add a check on | ||
12 | num_cpus in the AspeedSoC realize handler. | ||
13 | |||
14 | SMP support will be activated when models for such SoCs are implemented. | ||
15 | |||
16 | Signed-off-by: Cédric Le Goater <clg@kaod.org> | ||
17 | Reviewed-by: Joel Stanley <joel@jms.id.au> | ||
18 | Message-id: 20190618165311.27066-6-clg@kaod.org | ||
19 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
20 | --- | ||
21 | include/hw/arm/aspeed_soc.h | 5 ++++- | ||
22 | hw/arm/aspeed.c | 7 +++++-- | ||
23 | hw/arm/aspeed_soc.c | 33 +++++++++++++++++++++++++++------ | ||
24 | 3 files changed, 36 insertions(+), 9 deletions(-) | ||
25 | |||
26 | diff --git a/include/hw/arm/aspeed_soc.h b/include/hw/arm/aspeed_soc.h | ||
27 | index XXXXXXX..XXXXXXX 100644 | ||
28 | --- a/include/hw/arm/aspeed_soc.h | ||
29 | +++ b/include/hw/arm/aspeed_soc.h | ||
30 | @@ -XXX,XX +XXX,XX @@ | ||
31 | |||
32 | #define ASPEED_SPIS_NUM 2 | ||
33 | #define ASPEED_WDTS_NUM 3 | ||
34 | +#define ASPEED_CPUS_NUM 2 | ||
35 | |||
36 | typedef struct AspeedSoCState { | ||
37 | /*< private >*/ | ||
38 | DeviceState parent; | ||
39 | |||
40 | /*< public >*/ | ||
41 | - ARMCPU cpu; | ||
42 | + ARMCPU cpu[ASPEED_CPUS_NUM]; | ||
43 | + uint32_t num_cpus; | ||
44 | MemoryRegion sram; | ||
45 | AspeedVICState vic; | ||
46 | AspeedRtcState rtc; | ||
47 | @@ -XXX,XX +XXX,XX @@ typedef struct AspeedSoCInfo { | ||
48 | int wdts_num; | ||
49 | const int *irqmap; | ||
50 | const hwaddr *memmap; | ||
51 | + uint32_t num_cpus; | ||
52 | } AspeedSoCInfo; | ||
53 | |||
54 | typedef struct AspeedSoCClass { | ||
55 | diff --git a/hw/arm/aspeed.c b/hw/arm/aspeed.c | ||
56 | index XXXXXXX..XXXXXXX 100644 | ||
57 | --- a/hw/arm/aspeed.c | ||
58 | +++ b/hw/arm/aspeed.c | ||
59 | @@ -XXX,XX +XXX,XX @@ | ||
60 | #include "hw/misc/tmp105.h" | ||
61 | #include "qemu/log.h" | ||
62 | #include "sysemu/block-backend.h" | ||
63 | +#include "sysemu/sysemu.h" | ||
64 | #include "hw/loader.h" | ||
65 | #include "qemu/error-report.h" | ||
66 | #include "qemu/units.h" | ||
67 | |||
68 | static struct arm_boot_info aspeed_board_binfo = { | ||
69 | .board_id = -1, /* device-tree-only board */ | ||
70 | - .nb_cpus = 1, | ||
71 | }; | ||
72 | |||
73 | struct AspeedBoardState { | ||
74 | @@ -XXX,XX +XXX,XX @@ static void aspeed_board_init(MachineState *machine, | ||
75 | &error_abort); | ||
76 | object_property_set_int(OBJECT(&bmc->soc), cfg->num_cs, "num-cs", | ||
77 | &error_abort); | ||
78 | + object_property_set_int(OBJECT(&bmc->soc), smp_cpus, "num-cpus", | ||
79 | + &error_abort); | ||
80 | if (machine->kernel_filename) { | ||
81 | /* | ||
82 | * When booting with a -kernel command line there is no u-boot | ||
83 | @@ -XXX,XX +XXX,XX @@ static void aspeed_board_init(MachineState *machine, | ||
84 | aspeed_board_binfo.kernel_cmdline = machine->kernel_cmdline; | ||
85 | aspeed_board_binfo.ram_size = ram_size; | ||
86 | aspeed_board_binfo.loader_start = sc->info->memmap[ASPEED_SDRAM]; | ||
87 | + aspeed_board_binfo.nb_cpus = bmc->soc.num_cpus; | ||
88 | |||
89 | if (cfg->i2c_init) { | ||
90 | cfg->i2c_init(bmc); | ||
91 | @@ -XXX,XX +XXX,XX @@ static void aspeed_machine_class_init(ObjectClass *oc, void *data) | ||
92 | |||
93 | mc->desc = board->desc; | ||
94 | mc->init = aspeed_machine_init; | ||
95 | - mc->max_cpus = 1; | ||
96 | + mc->max_cpus = ASPEED_CPUS_NUM; | ||
97 | mc->no_sdcard = 1; | ||
98 | mc->no_floppy = 1; | ||
99 | mc->no_cdrom = 1; | ||
100 | diff --git a/hw/arm/aspeed_soc.c b/hw/arm/aspeed_soc.c | ||
101 | index XXXXXXX..XXXXXXX 100644 | ||
102 | --- a/hw/arm/aspeed_soc.c | ||
103 | +++ b/hw/arm/aspeed_soc.c | ||
104 | @@ -XXX,XX +XXX,XX @@ | ||
105 | #include "hw/char/serial.h" | ||
106 | #include "qemu/log.h" | ||
107 | #include "qemu/module.h" | ||
108 | +#include "qemu/error-report.h" | ||
109 | #include "hw/i2c/aspeed_i2c.h" | ||
110 | #include "net/net.h" | ||
111 | |||
112 | @@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = { | ||
113 | .wdts_num = 2, | ||
114 | .irqmap = aspeed_soc_ast2400_irqmap, | ||
115 | .memmap = aspeed_soc_ast2400_memmap, | ||
116 | + .num_cpus = 1, | ||
117 | }, { | ||
118 | .name = "ast2400-a1", | ||
119 | .cpu_type = ARM_CPU_TYPE_NAME("arm926"), | ||
120 | @@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = { | ||
121 | .wdts_num = 2, | ||
122 | .irqmap = aspeed_soc_ast2400_irqmap, | ||
123 | .memmap = aspeed_soc_ast2400_memmap, | ||
124 | + .num_cpus = 1, | ||
125 | }, { | ||
126 | .name = "ast2400", | ||
127 | .cpu_type = ARM_CPU_TYPE_NAME("arm926"), | ||
128 | @@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = { | ||
129 | .wdts_num = 2, | ||
130 | .irqmap = aspeed_soc_ast2400_irqmap, | ||
131 | .memmap = aspeed_soc_ast2400_memmap, | ||
132 | + .num_cpus = 1, | ||
133 | }, { | ||
134 | .name = "ast2500-a1", | ||
135 | .cpu_type = ARM_CPU_TYPE_NAME("arm1176"), | ||
136 | @@ -XXX,XX +XXX,XX @@ static const AspeedSoCInfo aspeed_socs[] = { | ||
137 | .wdts_num = 3, | ||
138 | .irqmap = aspeed_soc_ast2500_irqmap, | ||
139 | .memmap = aspeed_soc_ast2500_memmap, | ||
140 | + .num_cpus = 1, | ||
141 | }, | ||
142 | }; | ||
143 | |||
144 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_init(Object *obj) | ||
145 | AspeedSoCClass *sc = ASPEED_SOC_GET_CLASS(s); | ||
146 | int i; | ||
147 | |||
148 | - object_initialize_child(obj, "cpu", OBJECT(&s->cpu), sizeof(s->cpu), | ||
149 | - sc->info->cpu_type, &error_abort, NULL); | ||
150 | + for (i = 0; i < sc->info->num_cpus; i++) { | ||
151 | + object_initialize_child(obj, "cpu[*]", OBJECT(&s->cpu[i]), | ||
152 | + sizeof(s->cpu[i]), sc->info->cpu_type, | ||
153 | + &error_abort, NULL); | ||
154 | + } | ||
155 | |||
156 | sysbus_init_child_obj(obj, "scu", OBJECT(&s->scu), sizeof(s->scu), | ||
157 | TYPE_ASPEED_SCU); | ||
158 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
159 | create_unimplemented_device("aspeed_soc.io", sc->info->memmap[ASPEED_IOMEM], | ||
160 | ASPEED_SOC_IOMEM_SIZE); | ||
161 | |||
162 | + if (s->num_cpus > sc->info->num_cpus) { | ||
163 | + warn_report("%s: invalid number of CPUs %d, using default %d", | ||
164 | + sc->info->name, s->num_cpus, sc->info->num_cpus); | ||
165 | + s->num_cpus = sc->info->num_cpus; | ||
166 | + } | ||
167 | + | ||
168 | /* CPU */ | ||
169 | - object_property_set_bool(OBJECT(&s->cpu), true, "realized", &err); | ||
170 | - if (err) { | ||
171 | - error_propagate(errp, err); | ||
172 | - return; | ||
173 | + for (i = 0; i < s->num_cpus; i++) { | ||
174 | + object_property_set_bool(OBJECT(&s->cpu[i]), true, "realized", &err); | ||
175 | + if (err) { | ||
176 | + error_propagate(errp, err); | ||
177 | + return; | ||
178 | + } | ||
179 | } | ||
180 | |||
181 | /* SRAM */ | ||
182 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
183 | sysbus_connect_irq(SYS_BUS_DEVICE(&s->ftgmac100), 0, | ||
184 | aspeed_soc_get_irq(s, ASPEED_ETH1)); | ||
185 | } | ||
186 | +static Property aspeed_soc_properties[] = { | ||
187 | + DEFINE_PROP_UINT32("num-cpus", AspeedSoCState, num_cpus, 0), | ||
188 | + DEFINE_PROP_END_OF_LIST(), | ||
189 | +}; | ||
190 | |||
191 | static void aspeed_soc_class_init(ObjectClass *oc, void *data) | ||
192 | { | ||
193 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_class_init(ObjectClass *oc, void *data) | ||
194 | dc->realize = aspeed_soc_realize; | ||
195 | /* Reason: Uses serial_hds and nd_table in realize() directly */ | ||
196 | dc->user_creatable = false; | ||
197 | + dc->props = aspeed_soc_properties; | ||
198 | } | ||
199 | |||
200 | static const TypeInfo aspeed_soc_type_info = { | ||
201 | -- | ||
202 | 2.20.1 | ||
203 | |||
204 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Cédric Le Goater <clg@kaod.org> | ||
1 | 2 | ||
3 | The Aspeed SoCs have two MACs. Extend the Aspeed model to support a | ||
4 | second NIC. | ||
5 | |||
6 | Signed-off-by: Cédric Le Goater <clg@kaod.org> | ||
7 | Reviewed-by: Joel Stanley <joel@jms.id.au> | ||
8 | Message-id: 20190618165311.27066-7-clg@kaod.org | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | --- | ||
11 | include/hw/arm/aspeed_soc.h | 3 ++- | ||
12 | hw/arm/aspeed_soc.c | 33 +++++++++++++++++++-------------- | ||
13 | 2 files changed, 21 insertions(+), 15 deletions(-) | ||
14 | |||
15 | diff --git a/include/hw/arm/aspeed_soc.h b/include/hw/arm/aspeed_soc.h | ||
16 | index XXXXXXX..XXXXXXX 100644 | ||
17 | --- a/include/hw/arm/aspeed_soc.h | ||
18 | +++ b/include/hw/arm/aspeed_soc.h | ||
19 | @@ -XXX,XX +XXX,XX @@ | ||
20 | #define ASPEED_SPIS_NUM 2 | ||
21 | #define ASPEED_WDTS_NUM 3 | ||
22 | #define ASPEED_CPUS_NUM 2 | ||
23 | +#define ASPEED_MACS_NUM 2 | ||
24 | |||
25 | typedef struct AspeedSoCState { | ||
26 | /*< private >*/ | ||
27 | @@ -XXX,XX +XXX,XX @@ typedef struct AspeedSoCState { | ||
28 | AspeedSMCState spi[ASPEED_SPIS_NUM]; | ||
29 | AspeedSDMCState sdmc; | ||
30 | AspeedWDTState wdt[ASPEED_WDTS_NUM]; | ||
31 | - FTGMAC100State ftgmac100; | ||
32 | + FTGMAC100State ftgmac100[ASPEED_MACS_NUM]; | ||
33 | } AspeedSoCState; | ||
34 | |||
35 | #define TYPE_ASPEED_SOC "aspeed-soc" | ||
36 | diff --git a/hw/arm/aspeed_soc.c b/hw/arm/aspeed_soc.c | ||
37 | index XXXXXXX..XXXXXXX 100644 | ||
38 | --- a/hw/arm/aspeed_soc.c | ||
39 | +++ b/hw/arm/aspeed_soc.c | ||
40 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_init(Object *obj) | ||
41 | sc->info->silicon_rev); | ||
42 | } | ||
43 | |||
44 | - sysbus_init_child_obj(obj, "ftgmac100", OBJECT(&s->ftgmac100), | ||
45 | - sizeof(s->ftgmac100), TYPE_FTGMAC100); | ||
46 | + for (i = 0; i < ASPEED_MACS_NUM; i++) { | ||
47 | + sysbus_init_child_obj(obj, "ftgmac100[*]", OBJECT(&s->ftgmac100[i]), | ||
48 | + sizeof(s->ftgmac100[i]), TYPE_FTGMAC100); | ||
49 | + } | ||
50 | } | ||
51 | |||
52 | static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
53 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
54 | } | ||
55 | |||
56 | /* Net */ | ||
57 | - qdev_set_nic_properties(DEVICE(&s->ftgmac100), &nd_table[0]); | ||
58 | - object_property_set_bool(OBJECT(&s->ftgmac100), true, "aspeed", &err); | ||
59 | - object_property_set_bool(OBJECT(&s->ftgmac100), true, "realized", | ||
60 | - &local_err); | ||
61 | - error_propagate(&err, local_err); | ||
62 | - if (err) { | ||
63 | - error_propagate(errp, err); | ||
64 | - return; | ||
65 | + for (i = 0; i < nb_nics; i++) { | ||
66 | + qdev_set_nic_properties(DEVICE(&s->ftgmac100[i]), &nd_table[i]); | ||
67 | + object_property_set_bool(OBJECT(&s->ftgmac100[i]), true, "aspeed", | ||
68 | + &err); | ||
69 | + object_property_set_bool(OBJECT(&s->ftgmac100[i]), true, "realized", | ||
70 | + &local_err); | ||
71 | + error_propagate(&err, local_err); | ||
72 | + if (err) { | ||
73 | + error_propagate(errp, err); | ||
74 | + return; | ||
75 | + } | ||
76 | + sysbus_mmio_map(SYS_BUS_DEVICE(&s->ftgmac100[i]), 0, | ||
77 | + sc->info->memmap[ASPEED_ETH1 + i]); | ||
78 | + sysbus_connect_irq(SYS_BUS_DEVICE(&s->ftgmac100[i]), 0, | ||
79 | + aspeed_soc_get_irq(s, ASPEED_ETH1 + i)); | ||
80 | } | ||
81 | - sysbus_mmio_map(SYS_BUS_DEVICE(&s->ftgmac100), 0, | ||
82 | - sc->info->memmap[ASPEED_ETH1]); | ||
83 | - sysbus_connect_irq(SYS_BUS_DEVICE(&s->ftgmac100), 0, | ||
84 | - aspeed_soc_get_irq(s, ASPEED_ETH1)); | ||
85 | } | ||
86 | static Property aspeed_soc_properties[] = { | ||
87 | DEFINE_PROP_UINT32("num-cpus", AspeedSoCState, num_cpus, 0), | ||
88 | -- | ||
89 | 2.20.1 | ||
90 | |||
91 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Joel Stanley <joel@jms.id.au> | ||
1 | 2 | ||
3 | The Linux kernel driver was updated in commit 4451d3f59f2a | ||
4 | ("clocksource/drivers/fttmr010: Fix set_next_event handler) to fix an | ||
5 | issue observed on hardware: | ||
6 | |||
7 | > RELOAD register is loaded into COUNT register when the aspeed timer | ||
8 | > is enabled, which means the next event may be delayed because timer | ||
9 | > interrupt won't be generated until <0xFFFFFFFF - current_count + | ||
10 | > cycles>. | ||
11 | |||
12 | When running under Qemu, the system appeared "laggy". The guest is now | ||
13 | scheduling timer events too regularly, starving the host of CPU time. | ||
14 | |||
15 | This patch modifies the timer model to attempt to schedule the timer | ||
16 | expiry as the guest requests, but if we have missed the deadline we | ||
17 | re interrupt and try again, which allows the guest to catch up. | ||
18 | |||
19 | Provides expected behaviour with old and new guest code. | ||
20 | |||
21 | Fixes: c04bd47db6b9 ("hw/timer: Add ASPEED timer device model") | ||
22 | Signed-off-by: Joel Stanley <joel@jms.id.au> | ||
23 | Signed-off-by: Cédric Le Goater <clg@kaod.org> | ||
24 | Message-id: 20190618165311.27066-8-clg@kaod.org | ||
25 | [clg: - merged a fix from Andrew Jeffery <andrew@aj.id.au> | ||
26 | "Fire interrupt on failure to meet deadline" | ||
27 | https://lists.ozlabs.org/pipermail/openbmc/2019-January/014641.html | ||
28 | - adapted commit log | ||
29 | - checkpatch fixes ] | ||
30 | Signed-off-by: Cédric Le Goater <clg@kaod.org> | ||
31 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
32 | --- | ||
33 | hw/timer/aspeed_timer.c | 57 ++++++++++++++++++++++------------------- | ||
34 | 1 file changed, 30 insertions(+), 27 deletions(-) | ||
35 | |||
36 | diff --git a/hw/timer/aspeed_timer.c b/hw/timer/aspeed_timer.c | ||
37 | index XXXXXXX..XXXXXXX 100644 | ||
38 | --- a/hw/timer/aspeed_timer.c | ||
39 | +++ b/hw/timer/aspeed_timer.c | ||
40 | @@ -XXX,XX +XXX,XX @@ static inline uint64_t calculate_time(struct AspeedTimer *t, uint32_t ticks) | ||
41 | |||
42 | static uint64_t calculate_next(struct AspeedTimer *t) | ||
43 | { | ||
44 | - uint64_t next = 0; | ||
45 | - uint32_t rate = calculate_rate(t); | ||
46 | + uint64_t now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); | ||
47 | + uint64_t next; | ||
48 | |||
49 | - while (!next) { | ||
50 | - /* We don't know the relationship between the values in the match | ||
51 | - * registers, so sort using MAX/MIN/zero. We sort in that order as the | ||
52 | - * timer counts down to zero. */ | ||
53 | - uint64_t seq[] = { | ||
54 | - calculate_time(t, MAX(t->match[0], t->match[1])), | ||
55 | - calculate_time(t, MIN(t->match[0], t->match[1])), | ||
56 | - calculate_time(t, 0), | ||
57 | - }; | ||
58 | - uint64_t reload_ns; | ||
59 | - uint64_t now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); | ||
60 | + /* | ||
61 | + * We don't know the relationship between the values in the match | ||
62 | + * registers, so sort using MAX/MIN/zero. We sort in that order as | ||
63 | + * the timer counts down to zero. | ||
64 | + */ | ||
65 | |||
66 | - if (now < seq[0]) { | ||
67 | - next = seq[0]; | ||
68 | - } else if (now < seq[1]) { | ||
69 | - next = seq[1]; | ||
70 | - } else if (now < seq[2]) { | ||
71 | - next = seq[2]; | ||
72 | - } else if (t->reload) { | ||
73 | - reload_ns = muldiv64(t->reload, NANOSECONDS_PER_SECOND, rate); | ||
74 | - t->start = now - ((now - t->start) % reload_ns); | ||
75 | - } else { | ||
76 | - /* no reload value, return 0 */ | ||
77 | - break; | ||
78 | - } | ||
79 | + next = calculate_time(t, MAX(t->match[0], t->match[1])); | ||
80 | + if (now < next) { | ||
81 | + return next; | ||
82 | } | ||
83 | |||
84 | - return next; | ||
85 | + next = calculate_time(t, MIN(t->match[0], t->match[1])); | ||
86 | + if (now < next) { | ||
87 | + return next; | ||
88 | + } | ||
89 | + | ||
90 | + next = calculate_time(t, 0); | ||
91 | + if (now < next) { | ||
92 | + return next; | ||
93 | + } | ||
94 | + | ||
95 | + /* We've missed all deadlines, fire interrupt and try again */ | ||
96 | + timer_del(&t->timer); | ||
97 | + | ||
98 | + if (timer_overflow_interrupt(t)) { | ||
99 | + t->level = !t->level; | ||
100 | + qemu_set_irq(t->irq, t->level); | ||
101 | + } | ||
102 | + | ||
103 | + t->start = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); | ||
104 | + return calculate_time(t, MAX(MAX(t->match[0], t->match[1]), 0)); | ||
105 | } | ||
106 | |||
107 | static void aspeed_timer_mod(AspeedTimer *t) | ||
108 | -- | ||
109 | 2.20.1 | ||
110 | |||
111 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Andrew Jeffery <andrew@aj.id.au> | ||
1 | 2 | ||
3 | From the datasheet: | ||
4 | |||
5 | This register stores the current status of counter #N. When timer | ||
6 | enable bit TMC30[N * b] is disabled, the reload register will be | ||
7 | loaded into this counter. When timer bit TMC30[N * b] is set, the | ||
8 | counter will start to decrement. CPU can update this register value | ||
9 | when enable bit is set. | ||
10 | |||
11 | Signed-off-by: Andrew Jeffery <andrew@aj.id.au> | ||
12 | Signed-off-by: Cédric Le Goater <clg@kaod.org> | ||
13 | Reviewed-by: Joel Stanley <joel@jms.id.au> | ||
14 | Message-id: 20190618165311.27066-9-clg@kaod.org | ||
15 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
16 | --- | ||
17 | hw/timer/aspeed_timer.c | 6 +++++- | ||
18 | 1 file changed, 5 insertions(+), 1 deletion(-) | ||
19 | |||
20 | diff --git a/hw/timer/aspeed_timer.c b/hw/timer/aspeed_timer.c | ||
21 | index XXXXXXX..XXXXXXX 100644 | ||
22 | --- a/hw/timer/aspeed_timer.c | ||
23 | +++ b/hw/timer/aspeed_timer.c | ||
24 | @@ -XXX,XX +XXX,XX @@ static uint64_t aspeed_timer_get_value(AspeedTimer *t, int reg) | ||
25 | |||
26 | switch (reg) { | ||
27 | case TIMER_REG_STATUS: | ||
28 | - value = calculate_ticks(t, qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL)); | ||
29 | + if (timer_enabled(t)) { | ||
30 | + value = calculate_ticks(t, qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL)); | ||
31 | + } else { | ||
32 | + value = t->reload; | ||
33 | + } | ||
34 | break; | ||
35 | case TIMER_REG_RELOAD: | ||
36 | value = t->reload; | ||
37 | -- | ||
38 | 2.20.1 | ||
39 | |||
40 | diff view generated by jsdifflib |
1 | From: "Edgar E. Iglesias" <edgar.iglesias@xilinx.com> | 1 | From: Andrew Jeffery <andrew@aj.id.au> |
---|---|---|---|
2 | 2 | ||
3 | Add support for extended descriptors with optional 64bit | 3 | If the match value exceeds reload then we don't want to include it in |
4 | addressing and timestamping. QEMU will not yet provide | 4 | calculations for the next event. |
5 | timestamps (always leaving the valid timestamp bit as zero). | ||
6 | 5 | ||
7 | Reviewed-by: Alistair Francis <alistair.francis@wdc.com> | 6 | Signed-off-by: Andrew Jeffery <andrew@aj.id.au> |
8 | Signed-off-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | 7 | Signed-off-by: Cédric Le Goater <clg@kaod.org> |
9 | Message-id: 20181011021931.4249-6-edgar.iglesias@gmail.com | 8 | Message-id: 20190618165311.27066-10-clg@kaod.org |
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 10 | --- |
12 | include/hw/net/cadence_gem.h | 2 +- | 11 | hw/timer/aspeed_timer.c | 13 ++++++++++--- |
13 | hw/net/cadence_gem.c | 69 ++++++++++++++++++++++++++---------- | 12 | 1 file changed, 10 insertions(+), 3 deletions(-) |
14 | 2 files changed, 52 insertions(+), 19 deletions(-) | ||
15 | 13 | ||
16 | diff --git a/include/hw/net/cadence_gem.h b/include/hw/net/cadence_gem.h | 14 | diff --git a/hw/timer/aspeed_timer.c b/hw/timer/aspeed_timer.c |
17 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/include/hw/net/cadence_gem.h | 16 | --- a/hw/timer/aspeed_timer.c |
19 | +++ b/include/hw/net/cadence_gem.h | 17 | +++ b/hw/timer/aspeed_timer.c |
20 | @@ -XXX,XX +XXX,XX @@ | 18 | @@ -XXX,XX +XXX,XX @@ static inline uint64_t calculate_time(struct AspeedTimer *t, uint32_t ticks) |
21 | #define CADENCE_GEM_MAXREG (0x00000800 / 4) /* Last valid GEM address */ | 19 | return t->start + delta_ns; |
22 | |||
23 | /* Max number of words in a DMA descriptor. */ | ||
24 | -#define DESC_MAX_NUM_WORDS 2 | ||
25 | +#define DESC_MAX_NUM_WORDS 6 | ||
26 | |||
27 | #define MAX_PRIORITY_QUEUES 8 | ||
28 | #define MAX_TYPE1_SCREENERS 16 | ||
29 | diff --git a/hw/net/cadence_gem.c b/hw/net/cadence_gem.c | ||
30 | index XXXXXXX..XXXXXXX 100644 | ||
31 | --- a/hw/net/cadence_gem.c | ||
32 | +++ b/hw/net/cadence_gem.c | ||
33 | @@ -XXX,XX +XXX,XX @@ | ||
34 | #define GEM_NWCFG_BCAST_REJ 0x00000020 /* Reject broadcast packets */ | ||
35 | #define GEM_NWCFG_PROMISC 0x00000010 /* Accept all packets */ | ||
36 | |||
37 | +#define GEM_DMACFG_ADDR_64B (1U << 30) | ||
38 | +#define GEM_DMACFG_TX_BD_EXT (1U << 29) | ||
39 | +#define GEM_DMACFG_RX_BD_EXT (1U << 28) | ||
40 | #define GEM_DMACFG_RBUFSZ_M 0x00FF0000 /* DMA RX Buffer Size mask */ | ||
41 | #define GEM_DMACFG_RBUFSZ_S 16 /* DMA RX Buffer Size shift */ | ||
42 | #define GEM_DMACFG_RBUFSZ_MUL 64 /* DMA RX Buffer Size multiplier */ | ||
43 | @@ -XXX,XX +XXX,XX @@ | ||
44 | |||
45 | #define GEM_MODID_VALUE 0x00020118 | ||
46 | |||
47 | -static inline unsigned tx_desc_get_buffer(uint32_t *desc) | ||
48 | +static inline uint64_t tx_desc_get_buffer(CadenceGEMState *s, uint32_t *desc) | ||
49 | { | ||
50 | - return desc[0]; | ||
51 | + uint64_t ret = desc[0]; | ||
52 | + | ||
53 | + if (s->regs[GEM_DMACFG] & GEM_DMACFG_ADDR_64B) { | ||
54 | + ret |= (uint64_t)desc[2] << 32; | ||
55 | + } | ||
56 | + return ret; | ||
57 | } | 20 | } |
58 | 21 | ||
59 | static inline unsigned tx_desc_get_used(uint32_t *desc) | 22 | +static inline uint32_t calculate_match(struct AspeedTimer *t, int i) |
60 | @@ -XXX,XX +XXX,XX @@ static inline void print_gem_tx_desc(uint32_t *desc, uint8_t queue) | 23 | +{ |
61 | DB_PRINT("length: %d\n", tx_desc_get_length(desc)); | 24 | + return t->match[i] < t->reload ? t->match[i] : 0; |
62 | } | ||
63 | |||
64 | -static inline unsigned rx_desc_get_buffer(uint32_t *desc) | ||
65 | +static inline uint64_t rx_desc_get_buffer(CadenceGEMState *s, uint32_t *desc) | ||
66 | { | ||
67 | - return desc[0] & ~0x3UL; | ||
68 | + uint64_t ret = desc[0] & ~0x3UL; | ||
69 | + | ||
70 | + if (s->regs[GEM_DMACFG] & GEM_DMACFG_ADDR_64B) { | ||
71 | + ret |= (uint64_t)desc[2] << 32; | ||
72 | + } | ||
73 | + return ret; | ||
74 | +} | 25 | +} |
75 | + | 26 | + |
76 | +static inline int gem_get_desc_len(CadenceGEMState *s, bool rx_n_tx) | 27 | static uint64_t calculate_next(struct AspeedTimer *t) |
77 | +{ | 28 | { |
78 | + int ret = 2; | 29 | uint64_t now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); |
30 | @@ -XXX,XX +XXX,XX @@ static uint64_t calculate_next(struct AspeedTimer *t) | ||
31 | * the timer counts down to zero. | ||
32 | */ | ||
33 | |||
34 | - next = calculate_time(t, MAX(t->match[0], t->match[1])); | ||
35 | + next = calculate_time(t, MAX(calculate_match(t, 0), calculate_match(t, 1))); | ||
36 | if (now < next) { | ||
37 | return next; | ||
38 | } | ||
39 | |||
40 | - next = calculate_time(t, MIN(t->match[0], t->match[1])); | ||
41 | + next = calculate_time(t, MIN(calculate_match(t, 0), calculate_match(t, 1))); | ||
42 | if (now < next) { | ||
43 | return next; | ||
44 | } | ||
45 | @@ -XXX,XX +XXX,XX @@ static uint64_t calculate_next(struct AspeedTimer *t) | ||
46 | qemu_set_irq(t->irq, t->level); | ||
47 | } | ||
48 | |||
49 | + next = MAX(MAX(calculate_match(t, 0), calculate_match(t, 1)), 0); | ||
50 | t->start = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); | ||
51 | - return calculate_time(t, MAX(MAX(t->match[0], t->match[1]), 0)); | ||
79 | + | 52 | + |
80 | + if (s->regs[GEM_DMACFG] & GEM_DMACFG_ADDR_64B) { | 53 | + return calculate_time(t, next); |
81 | + ret += 2; | ||
82 | + } | ||
83 | + if (s->regs[GEM_DMACFG] & (rx_n_tx ? GEM_DMACFG_RX_BD_EXT | ||
84 | + : GEM_DMACFG_TX_BD_EXT)) { | ||
85 | + ret += 2; | ||
86 | + } | ||
87 | + | ||
88 | + assert(ret <= DESC_MAX_NUM_WORDS); | ||
89 | + return ret; | ||
90 | } | 54 | } |
91 | 55 | ||
92 | static inline unsigned rx_desc_get_wrap(uint32_t *desc) | 56 | static void aspeed_timer_mod(AspeedTimer *t) |
93 | @@ -XXX,XX +XXX,XX @@ static void gem_init_register_masks(CadenceGEMState *s) | ||
94 | memset(&s->regs_ro[0], 0, sizeof(s->regs_ro)); | ||
95 | s->regs_ro[GEM_NWCTRL] = 0xFFF80000; | ||
96 | s->regs_ro[GEM_NWSTATUS] = 0xFFFFFFFF; | ||
97 | - s->regs_ro[GEM_DMACFG] = 0xFE00F000; | ||
98 | + s->regs_ro[GEM_DMACFG] = 0x8E00F000; | ||
99 | s->regs_ro[GEM_TXSTATUS] = 0xFFFFFE08; | ||
100 | s->regs_ro[GEM_RXQBASE] = 0x00000003; | ||
101 | s->regs_ro[GEM_TXQBASE] = 0x00000003; | ||
102 | @@ -XXX,XX +XXX,XX @@ static void gem_get_rx_desc(CadenceGEMState *s, int q) | ||
103 | DB_PRINT("read descriptor 0x%x\n", (unsigned)s->rx_desc_addr[q]); | ||
104 | /* read current descriptor */ | ||
105 | cpu_physical_memory_read(s->rx_desc_addr[q], | ||
106 | - (uint8_t *)s->rx_desc[q], sizeof(s->rx_desc[q])); | ||
107 | + (uint8_t *)s->rx_desc[q], | ||
108 | + sizeof(uint32_t) * gem_get_desc_len(s, true)); | ||
109 | |||
110 | /* Descriptor owned by software ? */ | ||
111 | if (rx_desc_get_ownership(s->rx_desc[q]) == 1) { | ||
112 | @@ -XXX,XX +XXX,XX @@ static ssize_t gem_receive(NetClientState *nc, const uint8_t *buf, size_t size) | ||
113 | rx_desc_get_buffer(s->rx_desc[q])); | ||
114 | |||
115 | /* Copy packet data to emulated DMA buffer */ | ||
116 | - cpu_physical_memory_write(rx_desc_get_buffer(s->rx_desc[q]) + | ||
117 | - rxbuf_offset, | ||
118 | - rxbuf_ptr, MIN(bytes_to_copy, rxbufsize)); | ||
119 | + cpu_physical_memory_write(rx_desc_get_buffer(s, s->rx_desc[q]) + | ||
120 | + rxbuf_offset, | ||
121 | + rxbuf_ptr, | ||
122 | + MIN(bytes_to_copy, rxbufsize)); | ||
123 | rxbuf_ptr += MIN(bytes_to_copy, rxbufsize); | ||
124 | bytes_to_copy -= MIN(bytes_to_copy, rxbufsize); | ||
125 | |||
126 | @@ -XXX,XX +XXX,XX @@ static ssize_t gem_receive(NetClientState *nc, const uint8_t *buf, size_t size) | ||
127 | /* Descriptor write-back. */ | ||
128 | cpu_physical_memory_write(s->rx_desc_addr[q], | ||
129 | (uint8_t *)s->rx_desc[q], | ||
130 | - sizeof(s->rx_desc[q])); | ||
131 | + sizeof(uint32_t) * gem_get_desc_len(s, true)); | ||
132 | |||
133 | /* Next descriptor */ | ||
134 | if (rx_desc_get_wrap(s->rx_desc[q])) { | ||
135 | @@ -XXX,XX +XXX,XX @@ static ssize_t gem_receive(NetClientState *nc, const uint8_t *buf, size_t size) | ||
136 | s->rx_desc_addr[q] = s->regs[GEM_RXQBASE]; | ||
137 | } else { | ||
138 | DB_PRINT("incrementing RX descriptor list\n"); | ||
139 | - s->rx_desc_addr[q] += 8; | ||
140 | + s->rx_desc_addr[q] += 4 * gem_get_desc_len(s, true); | ||
141 | } | ||
142 | |||
143 | gem_get_rx_desc(s, q); | ||
144 | @@ -XXX,XX +XXX,XX @@ static void gem_transmit(CadenceGEMState *s) | ||
145 | |||
146 | DB_PRINT("read descriptor 0x%" HWADDR_PRIx "\n", packet_desc_addr); | ||
147 | cpu_physical_memory_read(packet_desc_addr, | ||
148 | - (uint8_t *)desc, sizeof(desc)); | ||
149 | + (uint8_t *)desc, | ||
150 | + sizeof(uint32_t) * gem_get_desc_len(s, false)); | ||
151 | /* Handle all descriptors owned by hardware */ | ||
152 | while (tx_desc_get_used(desc) == 0) { | ||
153 | |||
154 | @@ -XXX,XX +XXX,XX @@ static void gem_transmit(CadenceGEMState *s) | ||
155 | /* The real hardware would eat this (and possibly crash). | ||
156 | * For QEMU let's lend a helping hand. | ||
157 | */ | ||
158 | - if ((tx_desc_get_buffer(desc) == 0) || | ||
159 | + if ((tx_desc_get_buffer(s, desc) == 0) || | ||
160 | (tx_desc_get_length(desc) == 0)) { | ||
161 | DB_PRINT("Invalid TX descriptor @ 0x%x\n", | ||
162 | (unsigned)packet_desc_addr); | ||
163 | @@ -XXX,XX +XXX,XX @@ static void gem_transmit(CadenceGEMState *s) | ||
164 | /* Gather this fragment of the packet from "dma memory" to our | ||
165 | * contig buffer. | ||
166 | */ | ||
167 | - cpu_physical_memory_read(tx_desc_get_buffer(desc), p, | ||
168 | + cpu_physical_memory_read(tx_desc_get_buffer(s, desc), p, | ||
169 | tx_desc_get_length(desc)); | ||
170 | p += tx_desc_get_length(desc); | ||
171 | total_bytes += tx_desc_get_length(desc); | ||
172 | @@ -XXX,XX +XXX,XX @@ static void gem_transmit(CadenceGEMState *s) | ||
173 | if (tx_desc_get_wrap(desc)) { | ||
174 | s->tx_desc_addr[q] = s->regs[GEM_TXQBASE]; | ||
175 | } else { | ||
176 | - s->tx_desc_addr[q] = packet_desc_addr + 8; | ||
177 | + s->tx_desc_addr[q] = packet_desc_addr + | ||
178 | + 4 * gem_get_desc_len(s, false); | ||
179 | } | ||
180 | DB_PRINT("TX descriptor next: 0x%08x\n", s->tx_desc_addr[q]); | ||
181 | |||
182 | @@ -XXX,XX +XXX,XX @@ static void gem_transmit(CadenceGEMState *s) | ||
183 | tx_desc_set_last(desc); | ||
184 | packet_desc_addr = s->regs[GEM_TXQBASE]; | ||
185 | } else { | ||
186 | - packet_desc_addr += 8; | ||
187 | + packet_desc_addr += 4 * gem_get_desc_len(s, false); | ||
188 | } | ||
189 | DB_PRINT("read descriptor 0x%" HWADDR_PRIx "\n", packet_desc_addr); | ||
190 | - cpu_physical_memory_read(packet_desc_addr, | ||
191 | - (uint8_t *)desc, sizeof(desc)); | ||
192 | + cpu_physical_memory_read(packet_desc_addr, (uint8_t *)desc, | ||
193 | + sizeof(uint32_t) * gem_get_desc_len(s, false)); | ||
194 | } | ||
195 | |||
196 | if (tx_desc_get_used(desc)) { | ||
197 | -- | 57 | -- |
198 | 2.19.0 | 58 | 2.20.1 |
199 | 59 | ||
200 | 60 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Christian Svensson <bluecmd@google.com> | ||
1 | 2 | ||
3 | If the host decrements the counter register that results in a negative | ||
4 | delta. This is then passed to muldiv64 which only handles unsigned | ||
5 | numbers resulting in bogus results. | ||
6 | |||
7 | This fix ensures the delta being operated on is positive. | ||
8 | |||
9 | Test case: kexec a kernel using aspeed_timer and it will freeze on the | ||
10 | second bootup when the kernel initializes the timer. With this patch | ||
11 | that no longer happens and the timer appears to run OK. | ||
12 | |||
13 | Signed-off-by: Christian Svensson <bluecmd@google.com> | ||
14 | Signed-off-by: Cédric Le Goater <clg@kaod.org> | ||
15 | Reviewed-by: Joel Stanley <joel@jms.id.au> | ||
16 | Reviewed-by: Andrew Jeffery <andrew@aj.id.au> | ||
17 | Message-id: 20190618165311.27066-12-clg@kaod.org | ||
18 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
19 | --- | ||
20 | hw/timer/aspeed_timer.c | 6 +++++- | ||
21 | 1 file changed, 5 insertions(+), 1 deletion(-) | ||
22 | |||
23 | diff --git a/hw/timer/aspeed_timer.c b/hw/timer/aspeed_timer.c | ||
24 | index XXXXXXX..XXXXXXX 100644 | ||
25 | --- a/hw/timer/aspeed_timer.c | ||
26 | +++ b/hw/timer/aspeed_timer.c | ||
27 | @@ -XXX,XX +XXX,XX @@ static void aspeed_timer_set_value(AspeedTimerCtrlState *s, int timer, int reg, | ||
28 | int64_t delta = (int64_t) value - (int64_t) calculate_ticks(t, now); | ||
29 | uint32_t rate = calculate_rate(t); | ||
30 | |||
31 | - t->start += muldiv64(delta, NANOSECONDS_PER_SECOND, rate); | ||
32 | + if (delta >= 0) { | ||
33 | + t->start += muldiv64(delta, NANOSECONDS_PER_SECOND, rate); | ||
34 | + } else { | ||
35 | + t->start -= muldiv64(-delta, NANOSECONDS_PER_SECOND, rate); | ||
36 | + } | ||
37 | aspeed_timer_mod(t); | ||
38 | } | ||
39 | break; | ||
40 | -- | ||
41 | 2.20.1 | ||
42 | |||
43 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Cédric Le Goater <clg@kaod.org> | ||
1 | 2 | ||
3 | It has never been used as far as I can tell from the git history. | ||
4 | |||
5 | Signed-off-by: Cédric Le Goater <clg@kaod.org> | ||
6 | Reviewed-by: Joel Stanley <joel@jms.id.au> | ||
7 | Message-id: 20190618165311.27066-13-clg@kaod.org | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | --- | ||
10 | hw/arm/aspeed.c | 2 -- | ||
11 | 1 file changed, 2 deletions(-) | ||
12 | |||
13 | diff --git a/hw/arm/aspeed.c b/hw/arm/aspeed.c | ||
14 | index XXXXXXX..XXXXXXX 100644 | ||
15 | --- a/hw/arm/aspeed.c | ||
16 | +++ b/hw/arm/aspeed.c | ||
17 | @@ -XXX,XX +XXX,XX @@ static void aspeed_board_init(MachineState *machine, | ||
18 | memory_region_allocate_system_memory(&bmc->ram, NULL, "ram", ram_size); | ||
19 | memory_region_add_subregion(get_system_memory(), | ||
20 | sc->info->memmap[ASPEED_SDRAM], &bmc->ram); | ||
21 | - object_property_add_const_link(OBJECT(&bmc->soc), "ram", OBJECT(&bmc->ram), | ||
22 | - &error_abort); | ||
23 | |||
24 | max_ram_size = object_property_get_uint(OBJECT(&bmc->soc), "max-ram-size", | ||
25 | &error_abort); | ||
26 | -- | ||
27 | 2.20.1 | ||
28 | |||
29 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Cédric Le Goater <clg@kaod.org> | ||
1 | 2 | ||
3 | The RAM memory region is defined after the SoC is realized when the | ||
4 | SDMC controller has checked that the defined RAM size for the machine | ||
5 | is correct. This is problematic for controller models requiring a link | ||
6 | on the RAM region, for DMA support in the SMC controller for instance. | ||
7 | |||
8 | Introduce a container memory region for the RAM that we can link into | ||
9 | the controllers early, before the SoC is realized. It will be | ||
10 | populated with the RAM region after the checks have be done. | ||
11 | |||
12 | Signed-off-by: Cédric Le Goater <clg@kaod.org> | ||
13 | Reviewed-by: Joel Stanley <joel@jms.id.au> | ||
14 | Message-id: 20190618165311.27066-14-clg@kaod.org | ||
15 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
16 | --- | ||
17 | hw/arm/aspeed.c | 13 +++++++++---- | ||
18 | 1 file changed, 9 insertions(+), 4 deletions(-) | ||
19 | |||
20 | diff --git a/hw/arm/aspeed.c b/hw/arm/aspeed.c | ||
21 | index XXXXXXX..XXXXXXX 100644 | ||
22 | --- a/hw/arm/aspeed.c | ||
23 | +++ b/hw/arm/aspeed.c | ||
24 | @@ -XXX,XX +XXX,XX @@ static struct arm_boot_info aspeed_board_binfo = { | ||
25 | |||
26 | struct AspeedBoardState { | ||
27 | AspeedSoCState soc; | ||
28 | + MemoryRegion ram_container; | ||
29 | MemoryRegion ram; | ||
30 | MemoryRegion max_ram; | ||
31 | }; | ||
32 | @@ -XXX,XX +XXX,XX @@ static void aspeed_board_init(MachineState *machine, | ||
33 | ram_addr_t max_ram_size; | ||
34 | |||
35 | bmc = g_new0(AspeedBoardState, 1); | ||
36 | + | ||
37 | + memory_region_init(&bmc->ram_container, NULL, "aspeed-ram-container", | ||
38 | + UINT32_MAX); | ||
39 | + | ||
40 | object_initialize_child(OBJECT(machine), "soc", &bmc->soc, | ||
41 | (sizeof(bmc->soc)), cfg->soc_name, &error_abort, | ||
42 | NULL); | ||
43 | @@ -XXX,XX +XXX,XX @@ static void aspeed_board_init(MachineState *machine, | ||
44 | &error_abort); | ||
45 | |||
46 | memory_region_allocate_system_memory(&bmc->ram, NULL, "ram", ram_size); | ||
47 | + memory_region_add_subregion(&bmc->ram_container, 0, &bmc->ram); | ||
48 | memory_region_add_subregion(get_system_memory(), | ||
49 | - sc->info->memmap[ASPEED_SDRAM], &bmc->ram); | ||
50 | + sc->info->memmap[ASPEED_SDRAM], | ||
51 | + &bmc->ram_container); | ||
52 | |||
53 | max_ram_size = object_property_get_uint(OBJECT(&bmc->soc), "max-ram-size", | ||
54 | &error_abort); | ||
55 | memory_region_init_io(&bmc->max_ram, NULL, &max_ram_ops, NULL, | ||
56 | "max_ram", max_ram_size - ram_size); | ||
57 | - memory_region_add_subregion(get_system_memory(), | ||
58 | - sc->info->memmap[ASPEED_SDRAM] + ram_size, | ||
59 | - &bmc->max_ram); | ||
60 | + memory_region_add_subregion(&bmc->ram_container, ram_size, &bmc->max_ram); | ||
61 | |||
62 | aspeed_board_init_flashes(&bmc->soc.fmc, cfg->fmc_model, &error_abort); | ||
63 | aspeed_board_init_flashes(&bmc->soc.spi[0], cfg->spi_model, &error_abort); | ||
64 | -- | ||
65 | 2.20.1 | ||
66 | |||
67 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Cédric Le Goater <clg@kaod.org> | ||
1 | 2 | ||
3 | The DRAM address of a DMA transaction depends on the DRAM base address | ||
4 | of the SoC. Inform the SMC controller model with this value. | ||
5 | |||
6 | Signed-off-by: Cédric Le Goater <clg@kaod.org> | ||
7 | Reviewed-by: Joel Stanley <joel@jms.id.au> | ||
8 | Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
9 | Message-id: 20190618165311.27066-15-clg@kaod.org | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | --- | ||
12 | include/hw/ssi/aspeed_smc.h | 3 +++ | ||
13 | hw/arm/aspeed_soc.c | 6 ++++++ | ||
14 | hw/ssi/aspeed_smc.c | 1 + | ||
15 | 3 files changed, 10 insertions(+) | ||
16 | |||
17 | diff --git a/include/hw/ssi/aspeed_smc.h b/include/hw/ssi/aspeed_smc.h | ||
18 | index XXXXXXX..XXXXXXX 100644 | ||
19 | --- a/include/hw/ssi/aspeed_smc.h | ||
20 | +++ b/include/hw/ssi/aspeed_smc.h | ||
21 | @@ -XXX,XX +XXX,XX @@ typedef struct AspeedSMCState { | ||
22 | uint8_t r_timings; | ||
23 | uint8_t conf_enable_w0; | ||
24 | |||
25 | + /* for DMA support */ | ||
26 | + uint64_t sdram_base; | ||
27 | + | ||
28 | AspeedSMCFlash *flashes; | ||
29 | |||
30 | uint8_t snoop_index; | ||
31 | diff --git a/hw/arm/aspeed_soc.c b/hw/arm/aspeed_soc.c | ||
32 | index XXXXXXX..XXXXXXX 100644 | ||
33 | --- a/hw/arm/aspeed_soc.c | ||
34 | +++ b/hw/arm/aspeed_soc.c | ||
35 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
36 | aspeed_soc_get_irq(s, ASPEED_I2C)); | ||
37 | |||
38 | /* FMC, The number of CS is set at the board level */ | ||
39 | + object_property_set_int(OBJECT(&s->fmc), sc->info->memmap[ASPEED_SDRAM], | ||
40 | + "sdram-base", &err); | ||
41 | + if (err) { | ||
42 | + error_propagate(errp, err); | ||
43 | + return; | ||
44 | + } | ||
45 | object_property_set_bool(OBJECT(&s->fmc), true, "realized", &err); | ||
46 | if (err) { | ||
47 | error_propagate(errp, err); | ||
48 | diff --git a/hw/ssi/aspeed_smc.c b/hw/ssi/aspeed_smc.c | ||
49 | index XXXXXXX..XXXXXXX 100644 | ||
50 | --- a/hw/ssi/aspeed_smc.c | ||
51 | +++ b/hw/ssi/aspeed_smc.c | ||
52 | @@ -XXX,XX +XXX,XX @@ static const VMStateDescription vmstate_aspeed_smc = { | ||
53 | |||
54 | static Property aspeed_smc_properties[] = { | ||
55 | DEFINE_PROP_UINT32("num-cs", AspeedSMCState, num_cs, 1), | ||
56 | + DEFINE_PROP_UINT64("sdram-base", AspeedSMCState, sdram_base, 0), | ||
57 | DEFINE_PROP_END_OF_LIST(), | ||
58 | }; | ||
59 | |||
60 | -- | ||
61 | 2.20.1 | ||
62 | |||
63 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Adriana Kobylak <anoo@us.ibm.com> | ||
1 | 2 | ||
3 | The Swift board is an OpenPOWER system hosting POWER processors. | ||
4 | Add support for their BMC including the I2C devices as found on HW. | ||
5 | |||
6 | Signed-off-by: Adriana Kobylak <anoo@us.ibm.com> | ||
7 | Reviewed-by: Cédric Le Goater <clg@kaod.org> | ||
8 | Reviewed-by: Joel Stanley <joel@jms.id.au> | ||
9 | Message-id: 20190618165311.27066-20-clg@kaod.org | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | --- | ||
12 | hw/arm/aspeed.c | 50 +++++++++++++++++++++++++++++++++++++++++++++++++ | ||
13 | 1 file changed, 50 insertions(+) | ||
14 | |||
15 | diff --git a/hw/arm/aspeed.c b/hw/arm/aspeed.c | ||
16 | index XXXXXXX..XXXXXXX 100644 | ||
17 | --- a/hw/arm/aspeed.c | ||
18 | +++ b/hw/arm/aspeed.c | ||
19 | @@ -XXX,XX +XXX,XX @@ struct AspeedBoardState { | ||
20 | SCU_AST2500_HW_STRAP_ACPI_ENABLE | \ | ||
21 | SCU_HW_STRAP_SPI_MODE(SCU_HW_STRAP_SPI_MASTER)) | ||
22 | |||
23 | +/* Swift hardware value: 0xF11AD206 */ | ||
24 | +#define SWIFT_BMC_HW_STRAP1 ( \ | ||
25 | + AST2500_HW_STRAP1_DEFAULTS | \ | ||
26 | + SCU_AST2500_HW_STRAP_SPI_AUTOFETCH_ENABLE | \ | ||
27 | + SCU_AST2500_HW_STRAP_GPIO_STRAP_ENABLE | \ | ||
28 | + SCU_AST2500_HW_STRAP_UART_DEBUG | \ | ||
29 | + SCU_AST2500_HW_STRAP_DDR4_ENABLE | \ | ||
30 | + SCU_H_PLL_BYPASS_EN | \ | ||
31 | + SCU_AST2500_HW_STRAP_ACPI_ENABLE | \ | ||
32 | + SCU_HW_STRAP_SPI_MODE(SCU_HW_STRAP_SPI_MASTER)) | ||
33 | + | ||
34 | /* Witherspoon hardware value: 0xF10AD216 (but use romulus definition) */ | ||
35 | #define WITHERSPOON_BMC_HW_STRAP1 ROMULUS_BMC_HW_STRAP1 | ||
36 | |||
37 | @@ -XXX,XX +XXX,XX @@ static void romulus_bmc_i2c_init(AspeedBoardState *bmc) | ||
38 | i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 11), "ds1338", 0x32); | ||
39 | } | ||
40 | |||
41 | +static void swift_bmc_i2c_init(AspeedBoardState *bmc) | ||
42 | +{ | ||
43 | + AspeedSoCState *soc = &bmc->soc; | ||
44 | + | ||
45 | + i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 3), "pca9552", 0x60); | ||
46 | + | ||
47 | + /* The swift board expects a TMP275 but a TMP105 is compatible */ | ||
48 | + i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 7), "tmp105", 0x48); | ||
49 | + /* The swift board expects a pca9551 but a pca9552 is compatible */ | ||
50 | + i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 7), "pca9552", 0x60); | ||
51 | + | ||
52 | + /* The swift board expects an Epson RX8900 RTC but a ds1338 is compatible */ | ||
53 | + i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 8), "ds1338", 0x32); | ||
54 | + i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 8), "pca9552", 0x60); | ||
55 | + | ||
56 | + i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 9), "tmp423", 0x4c); | ||
57 | + /* The swift board expects a pca9539 but a pca9552 is compatible */ | ||
58 | + i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 9), "pca9552", 0x74); | ||
59 | + | ||
60 | + i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 10), "tmp423", 0x4c); | ||
61 | + /* The swift board expects a pca9539 but a pca9552 is compatible */ | ||
62 | + i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 10), "pca9552", | ||
63 | + 0x74); | ||
64 | + | ||
65 | + /* The swift board expects a TMP275 but a TMP105 is compatible */ | ||
66 | + i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 12), "tmp105", 0x48); | ||
67 | + i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 12), "tmp105", 0x4a); | ||
68 | +} | ||
69 | + | ||
70 | static void witherspoon_bmc_i2c_init(AspeedBoardState *bmc) | ||
71 | { | ||
72 | AspeedSoCState *soc = &bmc->soc; | ||
73 | @@ -XXX,XX +XXX,XX @@ static const AspeedBoardConfig aspeed_boards[] = { | ||
74 | .num_cs = 2, | ||
75 | .i2c_init = romulus_bmc_i2c_init, | ||
76 | .ram = 512 * MiB, | ||
77 | + }, { | ||
78 | + .name = MACHINE_TYPE_NAME("swift-bmc"), | ||
79 | + .desc = "OpenPOWER Swift BMC (ARM1176)", | ||
80 | + .soc_name = "ast2500-a1", | ||
81 | + .hw_strap1 = SWIFT_BMC_HW_STRAP1, | ||
82 | + .fmc_model = "mx66l1g45g", | ||
83 | + .spi_model = "mx66l1g45g", | ||
84 | + .num_cs = 2, | ||
85 | + .i2c_init = swift_bmc_i2c_init, | ||
86 | + .ram = 512 * MiB, | ||
87 | }, { | ||
88 | .name = MACHINE_TYPE_NAME("witherspoon-bmc"), | ||
89 | .desc = "OpenPOWER Witherspoon BMC (ARM1176)", | ||
90 | -- | ||
91 | 2.20.1 | ||
92 | |||
93 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | 1 | From: Eddie James <eajames@linux.ibm.com> | |
2 | |||
3 | The XDMA engine embedded in the Aspeed SOCs performs PCI DMA operations | ||
4 | between the SOC (acting as a BMC) and a host processor in a server. | ||
5 | |||
6 | The XDMA engine exists on the AST2400, AST2500, and AST2600 SOCs, so | ||
7 | enable it for all of those. Add trace events on the important register | ||
8 | writes in the XDMA engine. | ||
9 | |||
10 | Signed-off-by: Eddie James <eajames@linux.ibm.com> | ||
11 | Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
12 | Signed-off-by: Cédric Le Goater <clg@kaod.org> | ||
13 | Message-id: 20190618165311.27066-21-clg@kaod.org | ||
14 | [clg: - changed title ] | ||
15 | Signed-off-by: Cédric Le Goater <clg@kaod.org> | ||
16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
17 | --- | ||
18 | hw/misc/Makefile.objs | 1 + | ||
19 | include/hw/arm/aspeed_soc.h | 3 + | ||
20 | include/hw/misc/aspeed_xdma.h | 30 +++++++ | ||
21 | hw/arm/aspeed_soc.c | 17 ++++ | ||
22 | hw/misc/aspeed_xdma.c | 165 ++++++++++++++++++++++++++++++++++ | ||
23 | hw/misc/trace-events | 3 + | ||
24 | 6 files changed, 219 insertions(+) | ||
25 | create mode 100644 include/hw/misc/aspeed_xdma.h | ||
26 | create mode 100644 hw/misc/aspeed_xdma.c | ||
27 | |||
28 | diff --git a/hw/misc/Makefile.objs b/hw/misc/Makefile.objs | ||
29 | index XXXXXXX..XXXXXXX 100644 | ||
30 | --- a/hw/misc/Makefile.objs | ||
31 | +++ b/hw/misc/Makefile.objs | ||
32 | @@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_ARMSSE_MHU) += armsse-mhu.o | ||
33 | |||
34 | obj-$(CONFIG_PVPANIC) += pvpanic.o | ||
35 | obj-$(CONFIG_AUX) += auxbus.o | ||
36 | +obj-$(CONFIG_ASPEED_SOC) += aspeed_xdma.o | ||
37 | obj-$(CONFIG_ASPEED_SOC) += aspeed_scu.o aspeed_sdmc.o | ||
38 | obj-$(CONFIG_MSF2) += msf2-sysreg.o | ||
39 | obj-$(CONFIG_NRF51_SOC) += nrf51_rng.o | ||
40 | diff --git a/include/hw/arm/aspeed_soc.h b/include/hw/arm/aspeed_soc.h | ||
41 | index XXXXXXX..XXXXXXX 100644 | ||
42 | --- a/include/hw/arm/aspeed_soc.h | ||
43 | +++ b/include/hw/arm/aspeed_soc.h | ||
44 | @@ -XXX,XX +XXX,XX @@ | ||
45 | #include "hw/intc/aspeed_vic.h" | ||
46 | #include "hw/misc/aspeed_scu.h" | ||
47 | #include "hw/misc/aspeed_sdmc.h" | ||
48 | +#include "hw/misc/aspeed_xdma.h" | ||
49 | #include "hw/timer/aspeed_timer.h" | ||
50 | #include "hw/timer/aspeed_rtc.h" | ||
51 | #include "hw/i2c/aspeed_i2c.h" | ||
52 | @@ -XXX,XX +XXX,XX @@ typedef struct AspeedSoCState { | ||
53 | AspeedTimerCtrlState timerctrl; | ||
54 | AspeedI2CState i2c; | ||
55 | AspeedSCUState scu; | ||
56 | + AspeedXDMAState xdma; | ||
57 | AspeedSMCState fmc; | ||
58 | AspeedSMCState spi[ASPEED_SPIS_NUM]; | ||
59 | AspeedSDMCState sdmc; | ||
60 | @@ -XXX,XX +XXX,XX @@ enum { | ||
61 | ASPEED_ETH1, | ||
62 | ASPEED_ETH2, | ||
63 | ASPEED_SDRAM, | ||
64 | + ASPEED_XDMA, | ||
65 | }; | ||
66 | |||
67 | #endif /* ASPEED_SOC_H */ | ||
68 | diff --git a/include/hw/misc/aspeed_xdma.h b/include/hw/misc/aspeed_xdma.h | ||
69 | new file mode 100644 | ||
70 | index XXXXXXX..XXXXXXX | ||
71 | --- /dev/null | ||
72 | +++ b/include/hw/misc/aspeed_xdma.h | ||
73 | @@ -XXX,XX +XXX,XX @@ | ||
74 | +/* | ||
75 | + * ASPEED XDMA Controller | ||
76 | + * Eddie James <eajames@linux.ibm.com> | ||
77 | + * | ||
78 | + * Copyright (C) 2019 IBM Corp. | ||
79 | + * SPDX-License-Identifer: GPL-2.0-or-later | ||
80 | + */ | ||
81 | + | ||
82 | +#ifndef ASPEED_XDMA_H | ||
83 | +#define ASPEED_XDMA_H | ||
84 | + | ||
85 | +#include "hw/sysbus.h" | ||
86 | + | ||
87 | +#define TYPE_ASPEED_XDMA "aspeed.xdma" | ||
88 | +#define ASPEED_XDMA(obj) OBJECT_CHECK(AspeedXDMAState, (obj), TYPE_ASPEED_XDMA) | ||
89 | + | ||
90 | +#define ASPEED_XDMA_NUM_REGS (ASPEED_XDMA_REG_SIZE / sizeof(uint32_t)) | ||
91 | +#define ASPEED_XDMA_REG_SIZE 0x7C | ||
92 | + | ||
93 | +typedef struct AspeedXDMAState { | ||
94 | + SysBusDevice parent; | ||
95 | + | ||
96 | + MemoryRegion iomem; | ||
97 | + qemu_irq irq; | ||
98 | + | ||
99 | + char bmc_cmdq_readp_set; | ||
100 | + uint32_t regs[ASPEED_XDMA_NUM_REGS]; | ||
101 | +} AspeedXDMAState; | ||
102 | + | ||
103 | +#endif /* ASPEED_XDMA_H */ | ||
104 | diff --git a/hw/arm/aspeed_soc.c b/hw/arm/aspeed_soc.c | ||
105 | index XXXXXXX..XXXXXXX 100644 | ||
106 | --- a/hw/arm/aspeed_soc.c | ||
107 | +++ b/hw/arm/aspeed_soc.c | ||
108 | @@ -XXX,XX +XXX,XX @@ static const hwaddr aspeed_soc_ast2400_memmap[] = { | ||
109 | [ASPEED_VIC] = 0x1E6C0000, | ||
110 | [ASPEED_SDMC] = 0x1E6E0000, | ||
111 | [ASPEED_SCU] = 0x1E6E2000, | ||
112 | + [ASPEED_XDMA] = 0x1E6E7000, | ||
113 | [ASPEED_ADC] = 0x1E6E9000, | ||
114 | [ASPEED_SRAM] = 0x1E720000, | ||
115 | [ASPEED_GPIO] = 0x1E780000, | ||
116 | @@ -XXX,XX +XXX,XX @@ static const hwaddr aspeed_soc_ast2500_memmap[] = { | ||
117 | [ASPEED_VIC] = 0x1E6C0000, | ||
118 | [ASPEED_SDMC] = 0x1E6E0000, | ||
119 | [ASPEED_SCU] = 0x1E6E2000, | ||
120 | + [ASPEED_XDMA] = 0x1E6E7000, | ||
121 | [ASPEED_ADC] = 0x1E6E9000, | ||
122 | [ASPEED_SRAM] = 0x1E720000, | ||
123 | [ASPEED_GPIO] = 0x1E780000, | ||
124 | @@ -XXX,XX +XXX,XX @@ static const int aspeed_soc_ast2400_irqmap[] = { | ||
125 | [ASPEED_I2C] = 12, | ||
126 | [ASPEED_ETH1] = 2, | ||
127 | [ASPEED_ETH2] = 3, | ||
128 | + [ASPEED_XDMA] = 6, | ||
129 | }; | ||
130 | |||
131 | #define aspeed_soc_ast2500_irqmap aspeed_soc_ast2400_irqmap | ||
132 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_init(Object *obj) | ||
133 | sysbus_init_child_obj(obj, "ftgmac100[*]", OBJECT(&s->ftgmac100[i]), | ||
134 | sizeof(s->ftgmac100[i]), TYPE_FTGMAC100); | ||
135 | } | ||
136 | + | ||
137 | + sysbus_init_child_obj(obj, "xdma", OBJECT(&s->xdma), sizeof(s->xdma), | ||
138 | + TYPE_ASPEED_XDMA); | ||
139 | } | ||
140 | |||
141 | static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
142 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_realize(DeviceState *dev, Error **errp) | ||
143 | sysbus_connect_irq(SYS_BUS_DEVICE(&s->ftgmac100[i]), 0, | ||
144 | aspeed_soc_get_irq(s, ASPEED_ETH1 + i)); | ||
145 | } | ||
146 | + | ||
147 | + /* XDMA */ | ||
148 | + object_property_set_bool(OBJECT(&s->xdma), true, "realized", &err); | ||
149 | + if (err) { | ||
150 | + error_propagate(errp, err); | ||
151 | + return; | ||
152 | + } | ||
153 | + sysbus_mmio_map(SYS_BUS_DEVICE(&s->xdma), 0, | ||
154 | + sc->info->memmap[ASPEED_XDMA]); | ||
155 | + sysbus_connect_irq(SYS_BUS_DEVICE(&s->xdma), 0, | ||
156 | + aspeed_soc_get_irq(s, ASPEED_XDMA)); | ||
157 | } | ||
158 | static Property aspeed_soc_properties[] = { | ||
159 | DEFINE_PROP_UINT32("num-cpus", AspeedSoCState, num_cpus, 0), | ||
160 | diff --git a/hw/misc/aspeed_xdma.c b/hw/misc/aspeed_xdma.c | ||
161 | new file mode 100644 | ||
162 | index XXXXXXX..XXXXXXX | ||
163 | --- /dev/null | ||
164 | +++ b/hw/misc/aspeed_xdma.c | ||
165 | @@ -XXX,XX +XXX,XX @@ | ||
166 | +/* | ||
167 | + * ASPEED XDMA Controller | ||
168 | + * Eddie James <eajames@linux.ibm.com> | ||
169 | + * | ||
170 | + * Copyright (C) 2019 IBM Corp | ||
171 | + * SPDX-License-Identifer: GPL-2.0-or-later | ||
172 | + */ | ||
173 | + | ||
174 | +#include "qemu/osdep.h" | ||
175 | +#include "qemu/log.h" | ||
176 | +#include "qemu/error-report.h" | ||
177 | +#include "hw/misc/aspeed_xdma.h" | ||
178 | +#include "qapi/error.h" | ||
179 | + | ||
180 | +#include "trace.h" | ||
181 | + | ||
182 | +#define XDMA_BMC_CMDQ_ADDR 0x10 | ||
183 | +#define XDMA_BMC_CMDQ_ENDP 0x14 | ||
184 | +#define XDMA_BMC_CMDQ_WRP 0x18 | ||
185 | +#define XDMA_BMC_CMDQ_W_MASK 0x0003FFFF | ||
186 | +#define XDMA_BMC_CMDQ_RDP 0x1C | ||
187 | +#define XDMA_BMC_CMDQ_RDP_MAGIC 0xEE882266 | ||
188 | +#define XDMA_IRQ_ENG_CTRL 0x20 | ||
189 | +#define XDMA_IRQ_ENG_CTRL_US_COMP BIT(4) | ||
190 | +#define XDMA_IRQ_ENG_CTRL_DS_COMP BIT(5) | ||
191 | +#define XDMA_IRQ_ENG_CTRL_W_MASK 0xBFEFF07F | ||
192 | +#define XDMA_IRQ_ENG_STAT 0x24 | ||
193 | +#define XDMA_IRQ_ENG_STAT_US_COMP BIT(4) | ||
194 | +#define XDMA_IRQ_ENG_STAT_DS_COMP BIT(5) | ||
195 | +#define XDMA_IRQ_ENG_STAT_RESET 0xF8000000 | ||
196 | +#define XDMA_MEM_SIZE 0x1000 | ||
197 | + | ||
198 | +#define TO_REG(addr) ((addr) / sizeof(uint32_t)) | ||
199 | + | ||
200 | +static uint64_t aspeed_xdma_read(void *opaque, hwaddr addr, unsigned int size) | ||
201 | +{ | ||
202 | + uint32_t val = 0; | ||
203 | + AspeedXDMAState *xdma = opaque; | ||
204 | + | ||
205 | + if (addr < ASPEED_XDMA_REG_SIZE) { | ||
206 | + val = xdma->regs[TO_REG(addr)]; | ||
207 | + } | ||
208 | + | ||
209 | + return (uint64_t)val; | ||
210 | +} | ||
211 | + | ||
212 | +static void aspeed_xdma_write(void *opaque, hwaddr addr, uint64_t val, | ||
213 | + unsigned int size) | ||
214 | +{ | ||
215 | + unsigned int idx; | ||
216 | + uint32_t val32 = (uint32_t)val; | ||
217 | + AspeedXDMAState *xdma = opaque; | ||
218 | + | ||
219 | + if (addr >= ASPEED_XDMA_REG_SIZE) { | ||
220 | + return; | ||
221 | + } | ||
222 | + | ||
223 | + switch (addr) { | ||
224 | + case XDMA_BMC_CMDQ_ENDP: | ||
225 | + xdma->regs[TO_REG(addr)] = val32 & XDMA_BMC_CMDQ_W_MASK; | ||
226 | + break; | ||
227 | + case XDMA_BMC_CMDQ_WRP: | ||
228 | + idx = TO_REG(addr); | ||
229 | + xdma->regs[idx] = val32 & XDMA_BMC_CMDQ_W_MASK; | ||
230 | + xdma->regs[TO_REG(XDMA_BMC_CMDQ_RDP)] = xdma->regs[idx]; | ||
231 | + | ||
232 | + trace_aspeed_xdma_write(addr, val); | ||
233 | + | ||
234 | + if (xdma->bmc_cmdq_readp_set) { | ||
235 | + xdma->bmc_cmdq_readp_set = 0; | ||
236 | + } else { | ||
237 | + xdma->regs[TO_REG(XDMA_IRQ_ENG_STAT)] |= | ||
238 | + XDMA_IRQ_ENG_STAT_US_COMP | XDMA_IRQ_ENG_STAT_DS_COMP; | ||
239 | + | ||
240 | + if (xdma->regs[TO_REG(XDMA_IRQ_ENG_CTRL)] & | ||
241 | + (XDMA_IRQ_ENG_CTRL_US_COMP | XDMA_IRQ_ENG_CTRL_DS_COMP)) | ||
242 | + qemu_irq_raise(xdma->irq); | ||
243 | + } | ||
244 | + break; | ||
245 | + case XDMA_BMC_CMDQ_RDP: | ||
246 | + trace_aspeed_xdma_write(addr, val); | ||
247 | + | ||
248 | + if (val32 == XDMA_BMC_CMDQ_RDP_MAGIC) { | ||
249 | + xdma->bmc_cmdq_readp_set = 1; | ||
250 | + } | ||
251 | + break; | ||
252 | + case XDMA_IRQ_ENG_CTRL: | ||
253 | + xdma->regs[TO_REG(addr)] = val32 & XDMA_IRQ_ENG_CTRL_W_MASK; | ||
254 | + break; | ||
255 | + case XDMA_IRQ_ENG_STAT: | ||
256 | + trace_aspeed_xdma_write(addr, val); | ||
257 | + | ||
258 | + idx = TO_REG(addr); | ||
259 | + if (val32 & (XDMA_IRQ_ENG_STAT_US_COMP | XDMA_IRQ_ENG_STAT_DS_COMP)) { | ||
260 | + xdma->regs[idx] &= | ||
261 | + ~(XDMA_IRQ_ENG_STAT_US_COMP | XDMA_IRQ_ENG_STAT_DS_COMP); | ||
262 | + qemu_irq_lower(xdma->irq); | ||
263 | + } | ||
264 | + break; | ||
265 | + default: | ||
266 | + xdma->regs[TO_REG(addr)] = val32; | ||
267 | + break; | ||
268 | + } | ||
269 | +} | ||
270 | + | ||
271 | +static const MemoryRegionOps aspeed_xdma_ops = { | ||
272 | + .read = aspeed_xdma_read, | ||
273 | + .write = aspeed_xdma_write, | ||
274 | + .endianness = DEVICE_NATIVE_ENDIAN, | ||
275 | + .valid.min_access_size = 4, | ||
276 | + .valid.max_access_size = 4, | ||
277 | +}; | ||
278 | + | ||
279 | +static void aspeed_xdma_realize(DeviceState *dev, Error **errp) | ||
280 | +{ | ||
281 | + SysBusDevice *sbd = SYS_BUS_DEVICE(dev); | ||
282 | + AspeedXDMAState *xdma = ASPEED_XDMA(dev); | ||
283 | + | ||
284 | + sysbus_init_irq(sbd, &xdma->irq); | ||
285 | + memory_region_init_io(&xdma->iomem, OBJECT(xdma), &aspeed_xdma_ops, xdma, | ||
286 | + TYPE_ASPEED_XDMA, XDMA_MEM_SIZE); | ||
287 | + sysbus_init_mmio(sbd, &xdma->iomem); | ||
288 | +} | ||
289 | + | ||
290 | +static void aspeed_xdma_reset(DeviceState *dev) | ||
291 | +{ | ||
292 | + AspeedXDMAState *xdma = ASPEED_XDMA(dev); | ||
293 | + | ||
294 | + xdma->bmc_cmdq_readp_set = 0; | ||
295 | + memset(xdma->regs, 0, ASPEED_XDMA_REG_SIZE); | ||
296 | + xdma->regs[TO_REG(XDMA_IRQ_ENG_STAT)] = XDMA_IRQ_ENG_STAT_RESET; | ||
297 | + | ||
298 | + qemu_irq_lower(xdma->irq); | ||
299 | +} | ||
300 | + | ||
301 | +static const VMStateDescription aspeed_xdma_vmstate = { | ||
302 | + .name = TYPE_ASPEED_XDMA, | ||
303 | + .version_id = 1, | ||
304 | + .fields = (VMStateField[]) { | ||
305 | + VMSTATE_UINT32_ARRAY(regs, AspeedXDMAState, ASPEED_XDMA_NUM_REGS), | ||
306 | + VMSTATE_END_OF_LIST(), | ||
307 | + }, | ||
308 | +}; | ||
309 | + | ||
310 | +static void aspeed_xdma_class_init(ObjectClass *classp, void *data) | ||
311 | +{ | ||
312 | + DeviceClass *dc = DEVICE_CLASS(classp); | ||
313 | + | ||
314 | + dc->realize = aspeed_xdma_realize; | ||
315 | + dc->reset = aspeed_xdma_reset; | ||
316 | + dc->vmsd = &aspeed_xdma_vmstate; | ||
317 | +} | ||
318 | + | ||
319 | +static const TypeInfo aspeed_xdma_info = { | ||
320 | + .name = TYPE_ASPEED_XDMA, | ||
321 | + .parent = TYPE_SYS_BUS_DEVICE, | ||
322 | + .instance_size = sizeof(AspeedXDMAState), | ||
323 | + .class_init = aspeed_xdma_class_init, | ||
324 | +}; | ||
325 | + | ||
326 | +static void aspeed_xdma_register_type(void) | ||
327 | +{ | ||
328 | + type_register_static(&aspeed_xdma_info); | ||
329 | +} | ||
330 | +type_init(aspeed_xdma_register_type); | ||
331 | diff --git a/hw/misc/trace-events b/hw/misc/trace-events | ||
332 | index XXXXXXX..XXXXXXX 100644 | ||
333 | --- a/hw/misc/trace-events | ||
334 | +++ b/hw/misc/trace-events | ||
335 | @@ -XXX,XX +XXX,XX @@ armsse_cpuid_write(uint64_t offset, uint64_t data, unsigned size) "SSE-200 CPU_I | ||
336 | # armsse-mhu.c | ||
337 | armsse_mhu_read(uint64_t offset, uint64_t data, unsigned size) "SSE-200 MHU read: offset 0x%" PRIx64 " data 0x%" PRIx64 " size %u" | ||
338 | armsse_mhu_write(uint64_t offset, uint64_t data, unsigned size) "SSE-200 MHU write: offset 0x%" PRIx64 " data 0x%" PRIx64 " size %u" | ||
339 | + | ||
340 | +# aspeed_xdma.c | ||
341 | +aspeed_xdma_write(uint64_t offset, uint64_t data) "XDMA write: offset 0x%" PRIx64 " data 0x%" PRIx64 | ||
342 | -- | ||
343 | 2.20.1 | ||
344 | |||
345 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | 1 | From: Andrew Jeffery <andrew@aj.id.au> | |
2 | |||
3 | The legacy interface only supported up to 32 IRQs, which became | ||
4 | restrictive around the AST2400 generation. QEMU support for the SoCs | ||
5 | started with the AST2400 along with an effort to reimplement and | ||
6 | upstream drivers for Linux, so up until this point the consumers of the | ||
7 | QEMU ASPEED support only required the 64 IRQ register interface. | ||
8 | |||
9 | In an effort to support older BMC firmware, add support for the 32 IRQ | ||
10 | interface. | ||
11 | |||
12 | Signed-off-by: Andrew Jeffery <andrew@aj.id.au> | ||
13 | Signed-off-by: Cédric Le Goater <clg@kaod.org> | ||
14 | Reviewed-by: Joel Stanley <joel@jms.id.au> | ||
15 | Message-id: 20190618165311.27066-22-clg@kaod.org | ||
16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
17 | --- | ||
18 | hw/intc/aspeed_vic.c | 105 ++++++++++++++++++++++++++----------------- | ||
19 | 1 file changed, 63 insertions(+), 42 deletions(-) | ||
20 | |||
21 | diff --git a/hw/intc/aspeed_vic.c b/hw/intc/aspeed_vic.c | ||
22 | index XXXXXXX..XXXXXXX 100644 | ||
23 | --- a/hw/intc/aspeed_vic.c | ||
24 | +++ b/hw/intc/aspeed_vic.c | ||
25 | @@ -XXX,XX +XXX,XX @@ static void aspeed_vic_set_irq(void *opaque, int irq, int level) | ||
26 | |||
27 | static uint64_t aspeed_vic_read(void *opaque, hwaddr offset, unsigned size) | ||
28 | { | ||
29 | - uint64_t val; | ||
30 | - const bool high = !!(offset & 0x4); | ||
31 | - hwaddr n_offset = (offset & ~0x4); | ||
32 | AspeedVICState *s = (AspeedVICState *)opaque; | ||
33 | + hwaddr n_offset; | ||
34 | + uint64_t val; | ||
35 | + bool high; | ||
36 | |||
37 | if (offset < AVIC_NEW_BASE_OFFSET) { | ||
38 | - qemu_log_mask(LOG_UNIMP, "%s: Ignoring read from legacy registers " | ||
39 | - "at 0x%" HWADDR_PRIx "[%u]\n", __func__, offset, size); | ||
40 | - return 0; | ||
41 | + high = false; | ||
42 | + n_offset = offset; | ||
43 | + } else { | ||
44 | + high = !!(offset & 0x4); | ||
45 | + n_offset = (offset & ~0x4); | ||
46 | } | ||
47 | |||
48 | - n_offset -= AVIC_NEW_BASE_OFFSET; | ||
49 | - | ||
50 | switch (n_offset) { | ||
51 | - case 0x0: /* IRQ Status */ | ||
52 | + case 0x80: /* IRQ Status */ | ||
53 | + case 0x00: | ||
54 | val = s->raw & ~s->select & s->enable; | ||
55 | break; | ||
56 | - case 0x08: /* FIQ Status */ | ||
57 | + case 0x88: /* FIQ Status */ | ||
58 | + case 0x04: | ||
59 | val = s->raw & s->select & s->enable; | ||
60 | break; | ||
61 | - case 0x10: /* Raw Interrupt Status */ | ||
62 | + case 0x90: /* Raw Interrupt Status */ | ||
63 | + case 0x08: | ||
64 | val = s->raw; | ||
65 | break; | ||
66 | - case 0x18: /* Interrupt Selection */ | ||
67 | + case 0x98: /* Interrupt Selection */ | ||
68 | + case 0x0c: | ||
69 | val = s->select; | ||
70 | break; | ||
71 | - case 0x20: /* Interrupt Enable */ | ||
72 | + case 0xa0: /* Interrupt Enable */ | ||
73 | + case 0x10: | ||
74 | val = s->enable; | ||
75 | break; | ||
76 | - case 0x30: /* Software Interrupt */ | ||
77 | + case 0xb0: /* Software Interrupt */ | ||
78 | + case 0x18: | ||
79 | val = s->trigger; | ||
80 | break; | ||
81 | - case 0x40: /* Interrupt Sensitivity */ | ||
82 | + case 0xc0: /* Interrupt Sensitivity */ | ||
83 | + case 0x24: | ||
84 | val = s->sense; | ||
85 | break; | ||
86 | - case 0x48: /* Interrupt Both Edge Trigger Control */ | ||
87 | + case 0xc8: /* Interrupt Both Edge Trigger Control */ | ||
88 | + case 0x28: | ||
89 | val = s->dual_edge; | ||
90 | break; | ||
91 | - case 0x50: /* Interrupt Event */ | ||
92 | + case 0xd0: /* Interrupt Event */ | ||
93 | + case 0x2c: | ||
94 | val = s->event; | ||
95 | break; | ||
96 | - case 0x60: /* Edge Triggered Interrupt Status */ | ||
97 | + case 0xe0: /* Edge Triggered Interrupt Status */ | ||
98 | val = s->raw & ~s->sense; | ||
99 | break; | ||
100 | /* Illegal */ | ||
101 | - case 0x28: /* Interrupt Enable Clear */ | ||
102 | - case 0x38: /* Software Interrupt Clear */ | ||
103 | - case 0x58: /* Edge Triggered Interrupt Clear */ | ||
104 | + case 0xa8: /* Interrupt Enable Clear */ | ||
105 | + case 0xb8: /* Software Interrupt Clear */ | ||
106 | + case 0xd8: /* Edge Triggered Interrupt Clear */ | ||
107 | qemu_log_mask(LOG_GUEST_ERROR, | ||
108 | "%s: Read of write-only register with offset 0x%" | ||
109 | HWADDR_PRIx "\n", __func__, offset); | ||
110 | @@ -XXX,XX +XXX,XX @@ static uint64_t aspeed_vic_read(void *opaque, hwaddr offset, unsigned size) | ||
111 | } | ||
112 | if (high) { | ||
113 | val = extract64(val, 32, 19); | ||
114 | + } else { | ||
115 | + val = extract64(val, 0, 32); | ||
116 | } | ||
117 | trace_aspeed_vic_read(offset, size, val); | ||
118 | return val; | ||
119 | @@ -XXX,XX +XXX,XX @@ static uint64_t aspeed_vic_read(void *opaque, hwaddr offset, unsigned size) | ||
120 | static void aspeed_vic_write(void *opaque, hwaddr offset, uint64_t data, | ||
121 | unsigned size) | ||
122 | { | ||
123 | - const bool high = !!(offset & 0x4); | ||
124 | - hwaddr n_offset = (offset & ~0x4); | ||
125 | AspeedVICState *s = (AspeedVICState *)opaque; | ||
126 | + hwaddr n_offset; | ||
127 | + bool high; | ||
128 | |||
129 | if (offset < AVIC_NEW_BASE_OFFSET) { | ||
130 | - qemu_log_mask(LOG_UNIMP, | ||
131 | - "%s: Ignoring write to legacy registers at 0x%" | ||
132 | - HWADDR_PRIx "[%u] <- 0x%" PRIx64 "\n", __func__, offset, | ||
133 | - size, data); | ||
134 | - return; | ||
135 | + high = false; | ||
136 | + n_offset = offset; | ||
137 | + } else { | ||
138 | + high = !!(offset & 0x4); | ||
139 | + n_offset = (offset & ~0x4); | ||
140 | } | ||
141 | |||
142 | - n_offset -= AVIC_NEW_BASE_OFFSET; | ||
143 | trace_aspeed_vic_write(offset, size, data); | ||
144 | |||
145 | /* Given we have members using separate enable/clear registers, deposit64() | ||
146 | @@ -XXX,XX +XXX,XX @@ static void aspeed_vic_write(void *opaque, hwaddr offset, uint64_t data, | ||
147 | } | ||
148 | |||
149 | switch (n_offset) { | ||
150 | - case 0x18: /* Interrupt Selection */ | ||
151 | + case 0x98: /* Interrupt Selection */ | ||
152 | + case 0x0c: | ||
153 | /* Register has deposit64() semantics - overwrite requested 32 bits */ | ||
154 | if (high) { | ||
155 | s->select &= AVIC_L_MASK; | ||
156 | @@ -XXX,XX +XXX,XX @@ static void aspeed_vic_write(void *opaque, hwaddr offset, uint64_t data, | ||
157 | } | ||
158 | s->select |= data; | ||
159 | break; | ||
160 | - case 0x20: /* Interrupt Enable */ | ||
161 | + case 0xa0: /* Interrupt Enable */ | ||
162 | + case 0x10: | ||
163 | s->enable |= data; | ||
164 | break; | ||
165 | - case 0x28: /* Interrupt Enable Clear */ | ||
166 | + case 0xa8: /* Interrupt Enable Clear */ | ||
167 | + case 0x14: | ||
168 | s->enable &= ~data; | ||
169 | break; | ||
170 | - case 0x30: /* Software Interrupt */ | ||
171 | + case 0xb0: /* Software Interrupt */ | ||
172 | + case 0x18: | ||
173 | qemu_log_mask(LOG_UNIMP, "%s: Software interrupts unavailable. " | ||
174 | "IRQs requested: 0x%016" PRIx64 "\n", __func__, data); | ||
175 | break; | ||
176 | - case 0x38: /* Software Interrupt Clear */ | ||
177 | + case 0xb8: /* Software Interrupt Clear */ | ||
178 | + case 0x1c: | ||
179 | qemu_log_mask(LOG_UNIMP, "%s: Software interrupts unavailable. " | ||
180 | "IRQs to be cleared: 0x%016" PRIx64 "\n", __func__, data); | ||
181 | break; | ||
182 | - case 0x50: /* Interrupt Event */ | ||
183 | + case 0xd0: /* Interrupt Event */ | ||
184 | /* Register has deposit64() semantics - overwrite the top four valid | ||
185 | * IRQ bits, as only the top four IRQs (GPIOs) can change their event | ||
186 | * type */ | ||
187 | @@ -XXX,XX +XXX,XX @@ static void aspeed_vic_write(void *opaque, hwaddr offset, uint64_t data, | ||
188 | "Ignoring invalid write to interrupt event register"); | ||
189 | } | ||
190 | break; | ||
191 | - case 0x58: /* Edge Triggered Interrupt Clear */ | ||
192 | + case 0xd8: /* Edge Triggered Interrupt Clear */ | ||
193 | + case 0x38: | ||
194 | s->raw &= ~(data & ~s->sense); | ||
195 | break; | ||
196 | - case 0x00: /* IRQ Status */ | ||
197 | - case 0x08: /* FIQ Status */ | ||
198 | - case 0x10: /* Raw Interrupt Status */ | ||
199 | - case 0x40: /* Interrupt Sensitivity */ | ||
200 | - case 0x48: /* Interrupt Both Edge Trigger Control */ | ||
201 | - case 0x60: /* Edge Triggered Interrupt Status */ | ||
202 | + case 0x80: /* IRQ Status */ | ||
203 | + case 0x00: | ||
204 | + case 0x88: /* FIQ Status */ | ||
205 | + case 0x04: | ||
206 | + case 0x90: /* Raw Interrupt Status */ | ||
207 | + case 0x08: | ||
208 | + case 0xc0: /* Interrupt Sensitivity */ | ||
209 | + case 0x24: | ||
210 | + case 0xc8: /* Interrupt Both Edge Trigger Control */ | ||
211 | + case 0x28: | ||
212 | + case 0xe0: /* Edge Triggered Interrupt Status */ | ||
213 | qemu_log_mask(LOG_GUEST_ERROR, | ||
214 | "%s: Write of read-only register with offset 0x%" | ||
215 | HWADDR_PRIx "\n", __func__, offset); | ||
216 | -- | ||
217 | 2.20.1 | ||
218 | |||
219 | diff view generated by jsdifflib |
1 | From: "Edgar E. Iglesias" <edgar.iglesias@xilinx.com> | 1 | From: Joel Stanley <joel@jms.id.au> |
---|---|---|---|
2 | 2 | ||
3 | Add macro with max number of DMA descriptor words. | 3 | The ast2500 uses the watchdog to reset the SDRAM controller. This |
4 | No functional change. | 4 | operation is usually performed by u-boot's memory training procedure, |
5 | and it is enabled by setting a bit in the SCU and then causing the | ||
6 | watchdog to expire. Therefore, we need the watchdog to be able to | ||
7 | access the SCU's register space. | ||
5 | 8 | ||
6 | Reviewed-by: Alistair Francis <alistair.francis@wdc.com> | 9 | This causes the watchdog to not perform a system reset when the bit is |
10 | set. In the future it could perform a reset of the SDMC model. | ||
11 | |||
12 | Signed-off-by: Joel Stanley <joel@jms.id.au> | ||
13 | Signed-off-by: Cédric Le Goater <clg@kaod.org> | ||
14 | Reviewed-by: Cédric Le Goater <clg@kaod.org> | ||
7 | Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> | 15 | Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
8 | Signed-off-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | 16 | Message-id: 20190621065242.32535-1-joel@jms.id.au |
9 | Message-id: 20181011021931.4249-5-edgar.iglesias@gmail.com | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 17 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 18 | --- |
12 | include/hw/net/cadence_gem.h | 5 ++++- | 19 | include/hw/watchdog/wdt_aspeed.h | 1 + |
13 | hw/net/cadence_gem.c | 4 ++-- | 20 | hw/arm/aspeed_soc.c | 2 ++ |
14 | 2 files changed, 6 insertions(+), 3 deletions(-) | 21 | hw/watchdog/wdt_aspeed.c | 20 ++++++++++++++++++++ |
22 | 3 files changed, 23 insertions(+) | ||
15 | 23 | ||
16 | diff --git a/include/hw/net/cadence_gem.h b/include/hw/net/cadence_gem.h | 24 | diff --git a/include/hw/watchdog/wdt_aspeed.h b/include/hw/watchdog/wdt_aspeed.h |
17 | index XXXXXXX..XXXXXXX 100644 | 25 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/include/hw/net/cadence_gem.h | 26 | --- a/include/hw/watchdog/wdt_aspeed.h |
19 | +++ b/include/hw/net/cadence_gem.h | 27 | +++ b/include/hw/watchdog/wdt_aspeed.h |
28 | @@ -XXX,XX +XXX,XX @@ typedef struct AspeedWDTState { | ||
29 | MemoryRegion iomem; | ||
30 | uint32_t regs[ASPEED_WDT_REGS_MAX]; | ||
31 | |||
32 | + AspeedSCUState *scu; | ||
33 | uint32_t pclk_freq; | ||
34 | uint32_t silicon_rev; | ||
35 | uint32_t ext_pulse_width_mask; | ||
36 | diff --git a/hw/arm/aspeed_soc.c b/hw/arm/aspeed_soc.c | ||
37 | index XXXXXXX..XXXXXXX 100644 | ||
38 | --- a/hw/arm/aspeed_soc.c | ||
39 | +++ b/hw/arm/aspeed_soc.c | ||
40 | @@ -XXX,XX +XXX,XX @@ static void aspeed_soc_init(Object *obj) | ||
41 | sizeof(s->wdt[i]), TYPE_ASPEED_WDT); | ||
42 | qdev_prop_set_uint32(DEVICE(&s->wdt[i]), "silicon-rev", | ||
43 | sc->info->silicon_rev); | ||
44 | + object_property_add_const_link(OBJECT(&s->wdt[i]), "scu", | ||
45 | + OBJECT(&s->scu), &error_abort); | ||
46 | } | ||
47 | |||
48 | for (i = 0; i < ASPEED_MACS_NUM; i++) { | ||
49 | diff --git a/hw/watchdog/wdt_aspeed.c b/hw/watchdog/wdt_aspeed.c | ||
50 | index XXXXXXX..XXXXXXX 100644 | ||
51 | --- a/hw/watchdog/wdt_aspeed.c | ||
52 | +++ b/hw/watchdog/wdt_aspeed.c | ||
20 | @@ -XXX,XX +XXX,XX @@ | 53 | @@ -XXX,XX +XXX,XX @@ |
21 | 54 | ||
22 | #define CADENCE_GEM_MAXREG (0x00000800 / 4) /* Last valid GEM address */ | 55 | #define WDT_RESTART_MAGIC 0x4755 |
23 | 56 | ||
24 | +/* Max number of words in a DMA descriptor. */ | 57 | +#define SCU_RESET_CONTROL1 (0x04 / 4) |
25 | +#define DESC_MAX_NUM_WORDS 2 | 58 | +#define SCU_RESET_SDRAM BIT(0) |
26 | + | 59 | + |
27 | #define MAX_PRIORITY_QUEUES 8 | 60 | static bool aspeed_wdt_is_enabled(const AspeedWDTState *s) |
28 | #define MAX_TYPE1_SCREENERS 16 | ||
29 | #define MAX_TYPE2_SCREENERS 16 | ||
30 | @@ -XXX,XX +XXX,XX @@ typedef struct CadenceGEMState { | ||
31 | |||
32 | uint8_t can_rx_state; /* Debug only */ | ||
33 | |||
34 | - uint32_t rx_desc[MAX_PRIORITY_QUEUES][2]; | ||
35 | + uint32_t rx_desc[MAX_PRIORITY_QUEUES][DESC_MAX_NUM_WORDS]; | ||
36 | |||
37 | bool sar_active[4]; | ||
38 | } CadenceGEMState; | ||
39 | diff --git a/hw/net/cadence_gem.c b/hw/net/cadence_gem.c | ||
40 | index XXXXXXX..XXXXXXX 100644 | ||
41 | --- a/hw/net/cadence_gem.c | ||
42 | +++ b/hw/net/cadence_gem.c | ||
43 | @@ -XXX,XX +XXX,XX @@ static void gem_transmit_updatestats(CadenceGEMState *s, const uint8_t *packet, | ||
44 | */ | ||
45 | static void gem_transmit(CadenceGEMState *s) | ||
46 | { | 61 | { |
47 | - uint32_t desc[2]; | 62 | return s->regs[WDT_CTRL] & WDT_CTRL_ENABLE; |
48 | + uint32_t desc[DESC_MAX_NUM_WORDS]; | 63 | @@ -XXX,XX +XXX,XX @@ static void aspeed_wdt_timer_expired(void *dev) |
49 | hwaddr packet_desc_addr; | 64 | { |
50 | uint8_t tx_packet[2048]; | 65 | AspeedWDTState *s = ASPEED_WDT(dev); |
51 | uint8_t *p; | 66 | |
52 | @@ -XXX,XX +XXX,XX @@ static void gem_transmit(CadenceGEMState *s) | 67 | + /* Do not reset on SDRAM controller reset */ |
53 | 68 | + if (s->scu->regs[SCU_RESET_CONTROL1] & SCU_RESET_SDRAM) { | |
54 | /* Last descriptor for this packet; hand the whole thing off */ | 69 | + timer_del(s->timer); |
55 | if (tx_desc_get_last(desc)) { | 70 | + s->regs[WDT_CTRL] = 0; |
56 | - uint32_t desc_first[2]; | 71 | + return; |
57 | + uint32_t desc_first[DESC_MAX_NUM_WORDS]; | 72 | + } |
58 | 73 | + | |
59 | /* Modify the 1st descriptor of this packet to be owned by | 74 | qemu_log_mask(CPU_LOG_RESET, "Watchdog timer expired.\n"); |
60 | * the processor. | 75 | watchdog_perform_action(); |
76 | timer_del(s->timer); | ||
77 | @@ -XXX,XX +XXX,XX @@ static void aspeed_wdt_realize(DeviceState *dev, Error **errp) | ||
78 | { | ||
79 | SysBusDevice *sbd = SYS_BUS_DEVICE(dev); | ||
80 | AspeedWDTState *s = ASPEED_WDT(dev); | ||
81 | + Error *err = NULL; | ||
82 | + Object *obj; | ||
83 | + | ||
84 | + obj = object_property_get_link(OBJECT(dev), "scu", &err); | ||
85 | + if (!obj) { | ||
86 | + error_propagate(errp, err); | ||
87 | + error_prepend(errp, "required link 'scu' not found: "); | ||
88 | + return; | ||
89 | + } | ||
90 | + s->scu = ASPEED_SCU(obj); | ||
91 | |||
92 | if (!is_supported_silicon_rev(s->silicon_rev)) { | ||
93 | error_setg(errp, "Unknown silicon revision: 0x%" PRIx32, | ||
61 | -- | 94 | -- |
62 | 2.19.0 | 95 | 2.20.1 |
63 | 96 | ||
64 | 97 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | 1 | From: Hongbo Zhang <hongbo.zhang@linaro.org> | |
2 | |||
3 | For AArch64, the existing "virt" machine is primarily meant to | ||
4 | run on KVM and execute virtualization workloads, but we need an | ||
5 | environment as faithful as possible to physical hardware, for supporting | ||
6 | firmware and OS development for physical Aarch64 machines. | ||
7 | |||
8 | This patch introduces new machine type 'sbsa-ref' with main features: | ||
9 | - Based on 'virt' machine type. | ||
10 | - A new memory map. | ||
11 | - CPU type cortex-a57. | ||
12 | - EL2 and EL3 are enabled. | ||
13 | - GIC version 3. | ||
14 | - System bus AHCI controller. | ||
15 | - System bus EHCI controller. | ||
16 | - CDROM and hard disc on AHCI bus. | ||
17 | - E1000E ethernet card on PCIE bus. | ||
18 | - VGA display adaptor on PCIE bus. | ||
19 | - No virtio devices. | ||
20 | - No fw_cfg device. | ||
21 | - No ACPI table supplied. | ||
22 | - Only minimal device tree nodes. | ||
23 | |||
24 | Arm Trusted Firmware and UEFI porting to this are done accordingly, | ||
25 | and the firmware should supply ACPI tables to the guest OS. The | ||
26 | minimal device tree nodes supplied by QEMU for this platform are only | ||
27 | to pass the dynamic info reflecting command line input to firmware, | ||
28 | not for loading the guest OS. | ||
29 | |||
30 | To make the review easier, this task is split into two patches, the | ||
31 | fundamental skeleton part and the peripheral devices part; this patch is | ||
32 | the first part. | ||
33 | |||
34 | Signed-off-by: Hongbo Zhang <hongbo.zhang@linaro.org> | ||
35 | Message-id: 1561890034-15921-2-git-send-email-hongbo.zhang@linaro.org | ||
36 | [PMM: commit message tweaks; moved some bits between patch 1 and 2 | ||
37 | to ensure patch 1 builds cleanly; removed unneeded lines from | ||
38 | Kconfig stanza; only provide board for qemu-system-aarch64, not | ||
39 | qemu-system-arm; added MAINTAINERS entry] | ||
40 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
41 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
42 | --- | ||
43 | hw/arm/Makefile.objs | 1 + | ||
44 | hw/arm/sbsa-ref.c | 271 ++++++++++++++++++++++++++++ | ||
45 | MAINTAINERS | 8 + | ||
46 | default-configs/aarch64-softmmu.mak | 1 + | ||
47 | hw/arm/Kconfig | 14 ++ | ||
48 | 5 files changed, 295 insertions(+) | ||
49 | create mode 100644 hw/arm/sbsa-ref.c | ||
50 | |||
51 | diff --git a/hw/arm/Makefile.objs b/hw/arm/Makefile.objs | ||
52 | index XXXXXXX..XXXXXXX 100644 | ||
53 | --- a/hw/arm/Makefile.objs | ||
54 | +++ b/hw/arm/Makefile.objs | ||
55 | @@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_SPITZ) += spitz.o | ||
56 | obj-$(CONFIG_TOSA) += tosa.o | ||
57 | obj-$(CONFIG_Z2) += z2.o | ||
58 | obj-$(CONFIG_REALVIEW) += realview.o | ||
59 | +obj-$(CONFIG_SBSA_REF) += sbsa-ref.o | ||
60 | obj-$(CONFIG_STELLARIS) += stellaris.o | ||
61 | obj-$(CONFIG_COLLIE) += collie.o | ||
62 | obj-$(CONFIG_VERSATILE) += versatilepb.o | ||
63 | diff --git a/hw/arm/sbsa-ref.c b/hw/arm/sbsa-ref.c | ||
64 | new file mode 100644 | ||
65 | index XXXXXXX..XXXXXXX | ||
66 | --- /dev/null | ||
67 | +++ b/hw/arm/sbsa-ref.c | ||
68 | @@ -XXX,XX +XXX,XX @@ | ||
69 | +/* | ||
70 | + * ARM SBSA Reference Platform emulation | ||
71 | + * | ||
72 | + * Copyright (c) 2018 Linaro Limited | ||
73 | + * Written by Hongbo Zhang <hongbo.zhang@linaro.org> | ||
74 | + * | ||
75 | + * This program is free software; you can redistribute it and/or modify it | ||
76 | + * under the terms and conditions of the GNU General Public License, | ||
77 | + * version 2 or later, as published by the Free Software Foundation. | ||
78 | + * | ||
79 | + * This program is distributed in the hope it will be useful, but WITHOUT | ||
80 | + * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or | ||
81 | + * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for | ||
82 | + * more details. | ||
83 | + * | ||
84 | + * You should have received a copy of the GNU General Public License along with | ||
85 | + * this program. If not, see <http://www.gnu.org/licenses/>. | ||
86 | + */ | ||
87 | + | ||
88 | +#include "qemu/osdep.h" | ||
89 | +#include "qapi/error.h" | ||
90 | +#include "qemu/error-report.h" | ||
91 | +#include "qemu/units.h" | ||
92 | +#include "sysemu/numa.h" | ||
93 | +#include "sysemu/sysemu.h" | ||
94 | +#include "exec/address-spaces.h" | ||
95 | +#include "exec/hwaddr.h" | ||
96 | +#include "kvm_arm.h" | ||
97 | +#include "hw/arm/boot.h" | ||
98 | +#include "hw/boards.h" | ||
99 | +#include "hw/intc/arm_gicv3_common.h" | ||
100 | + | ||
101 | +#define RAMLIMIT_GB 8192 | ||
102 | +#define RAMLIMIT_BYTES (RAMLIMIT_GB * GiB) | ||
103 | + | ||
104 | +enum { | ||
105 | + SBSA_FLASH, | ||
106 | + SBSA_MEM, | ||
107 | + SBSA_CPUPERIPHS, | ||
108 | + SBSA_GIC_DIST, | ||
109 | + SBSA_GIC_REDIST, | ||
110 | + SBSA_SMMU, | ||
111 | + SBSA_UART, | ||
112 | + SBSA_RTC, | ||
113 | + SBSA_PCIE, | ||
114 | + SBSA_PCIE_MMIO, | ||
115 | + SBSA_PCIE_MMIO_HIGH, | ||
116 | + SBSA_PCIE_PIO, | ||
117 | + SBSA_PCIE_ECAM, | ||
118 | + SBSA_GPIO, | ||
119 | + SBSA_SECURE_UART, | ||
120 | + SBSA_SECURE_UART_MM, | ||
121 | + SBSA_SECURE_MEM, | ||
122 | + SBSA_AHCI, | ||
123 | + SBSA_EHCI, | ||
124 | +}; | ||
125 | + | ||
126 | +typedef struct MemMapEntry { | ||
127 | + hwaddr base; | ||
128 | + hwaddr size; | ||
129 | +} MemMapEntry; | ||
130 | + | ||
131 | +typedef struct { | ||
132 | + MachineState parent; | ||
133 | + struct arm_boot_info bootinfo; | ||
134 | + int smp_cpus; | ||
135 | + void *fdt; | ||
136 | + int fdt_size; | ||
137 | + int psci_conduit; | ||
138 | +} SBSAMachineState; | ||
139 | + | ||
140 | +#define TYPE_SBSA_MACHINE MACHINE_TYPE_NAME("sbsa-ref") | ||
141 | +#define SBSA_MACHINE(obj) \ | ||
142 | + OBJECT_CHECK(SBSAMachineState, (obj), TYPE_SBSA_MACHINE) | ||
143 | + | ||
144 | +static const MemMapEntry sbsa_ref_memmap[] = { | ||
145 | + /* 512M boot ROM */ | ||
146 | + [SBSA_FLASH] = { 0, 0x20000000 }, | ||
147 | + /* 512M secure memory */ | ||
148 | + [SBSA_SECURE_MEM] = { 0x20000000, 0x20000000 }, | ||
149 | + /* Space reserved for CPU peripheral devices */ | ||
150 | + [SBSA_CPUPERIPHS] = { 0x40000000, 0x00040000 }, | ||
151 | + [SBSA_GIC_DIST] = { 0x40060000, 0x00010000 }, | ||
152 | + [SBSA_GIC_REDIST] = { 0x40080000, 0x04000000 }, | ||
153 | + [SBSA_UART] = { 0x60000000, 0x00001000 }, | ||
154 | + [SBSA_RTC] = { 0x60010000, 0x00001000 }, | ||
155 | + [SBSA_GPIO] = { 0x60020000, 0x00001000 }, | ||
156 | + [SBSA_SECURE_UART] = { 0x60030000, 0x00001000 }, | ||
157 | + [SBSA_SECURE_UART_MM] = { 0x60040000, 0x00001000 }, | ||
158 | + [SBSA_SMMU] = { 0x60050000, 0x00020000 }, | ||
159 | + /* Space here reserved for more SMMUs */ | ||
160 | + [SBSA_AHCI] = { 0x60100000, 0x00010000 }, | ||
161 | + [SBSA_EHCI] = { 0x60110000, 0x00010000 }, | ||
162 | + /* Space here reserved for other devices */ | ||
163 | + [SBSA_PCIE_PIO] = { 0x7fff0000, 0x00010000 }, | ||
164 | + /* 32-bit address PCIE MMIO space */ | ||
165 | + [SBSA_PCIE_MMIO] = { 0x80000000, 0x70000000 }, | ||
166 | + /* 256M PCIE ECAM space */ | ||
167 | + [SBSA_PCIE_ECAM] = { 0xf0000000, 0x10000000 }, | ||
168 | + /* ~1TB PCIE MMIO space (4GB to 1024GB boundary) */ | ||
169 | + [SBSA_PCIE_MMIO_HIGH] = { 0x100000000ULL, 0xFF00000000ULL }, | ||
170 | + [SBSA_MEM] = { 0x10000000000ULL, RAMLIMIT_BYTES }, | ||
171 | +}; | ||
172 | + | ||
173 | +static void sbsa_ref_init(MachineState *machine) | ||
174 | +{ | ||
175 | + SBSAMachineState *sms = SBSA_MACHINE(machine); | ||
176 | + MachineClass *mc = MACHINE_GET_CLASS(machine); | ||
177 | + MemoryRegion *sysmem = get_system_memory(); | ||
178 | + MemoryRegion *secure_sysmem = NULL; | ||
179 | + MemoryRegion *ram = g_new(MemoryRegion, 1); | ||
180 | + const CPUArchIdList *possible_cpus; | ||
181 | + int n, sbsa_max_cpus; | ||
182 | + | ||
183 | + if (strcmp(machine->cpu_type, ARM_CPU_TYPE_NAME("cortex-a57"))) { | ||
184 | + error_report("sbsa-ref: CPU type other than the built-in " | ||
185 | + "cortex-a57 not supported"); | ||
186 | + exit(1); | ||
187 | + } | ||
188 | + | ||
189 | + if (kvm_enabled()) { | ||
190 | + error_report("sbsa-ref: KVM is not supported for this machine"); | ||
191 | + exit(1); | ||
192 | + } | ||
193 | + | ||
194 | + /* | ||
195 | + * This machine has EL3 enabled, external firmware should supply PSCI | ||
196 | + * implementation, so the QEMU's internal PSCI is disabled. | ||
197 | + */ | ||
198 | + sms->psci_conduit = QEMU_PSCI_CONDUIT_DISABLED; | ||
199 | + | ||
200 | + sbsa_max_cpus = sbsa_ref_memmap[SBSA_GIC_REDIST].size / GICV3_REDIST_SIZE; | ||
201 | + | ||
202 | + if (max_cpus > sbsa_max_cpus) { | ||
203 | + error_report("Number of SMP CPUs requested (%d) exceeds max CPUs " | ||
204 | + "supported by machine 'sbsa-ref' (%d)", | ||
205 | + max_cpus, sbsa_max_cpus); | ||
206 | + exit(1); | ||
207 | + } | ||
208 | + | ||
209 | + sms->smp_cpus = smp_cpus; | ||
210 | + | ||
211 | + if (machine->ram_size > sbsa_ref_memmap[SBSA_MEM].size) { | ||
212 | + error_report("sbsa-ref: cannot model more than %dGB RAM", RAMLIMIT_GB); | ||
213 | + exit(1); | ||
214 | + } | ||
215 | + | ||
216 | + possible_cpus = mc->possible_cpu_arch_ids(machine); | ||
217 | + for (n = 0; n < possible_cpus->len; n++) { | ||
218 | + Object *cpuobj; | ||
219 | + CPUState *cs; | ||
220 | + | ||
221 | + if (n >= smp_cpus) { | ||
222 | + break; | ||
223 | + } | ||
224 | + | ||
225 | + cpuobj = object_new(possible_cpus->cpus[n].type); | ||
226 | + object_property_set_int(cpuobj, possible_cpus->cpus[n].arch_id, | ||
227 | + "mp-affinity", NULL); | ||
228 | + | ||
229 | + cs = CPU(cpuobj); | ||
230 | + cs->cpu_index = n; | ||
231 | + | ||
232 | + numa_cpu_pre_plug(&possible_cpus->cpus[cs->cpu_index], DEVICE(cpuobj), | ||
233 | + &error_fatal); | ||
234 | + | ||
235 | + if (object_property_find(cpuobj, "reset-cbar", NULL)) { | ||
236 | + object_property_set_int(cpuobj, | ||
237 | + sbsa_ref_memmap[SBSA_CPUPERIPHS].base, | ||
238 | + "reset-cbar", &error_abort); | ||
239 | + } | ||
240 | + | ||
241 | + object_property_set_link(cpuobj, OBJECT(sysmem), "memory", | ||
242 | + &error_abort); | ||
243 | + | ||
244 | + object_property_set_link(cpuobj, OBJECT(secure_sysmem), | ||
245 | + "secure-memory", &error_abort); | ||
246 | + | ||
247 | + object_property_set_bool(cpuobj, true, "realized", &error_fatal); | ||
248 | + object_unref(cpuobj); | ||
249 | + } | ||
250 | + | ||
251 | + memory_region_allocate_system_memory(ram, NULL, "sbsa-ref.ram", | ||
252 | + machine->ram_size); | ||
253 | + memory_region_add_subregion(sysmem, sbsa_ref_memmap[SBSA_MEM].base, ram); | ||
254 | + | ||
255 | + sms->bootinfo.ram_size = machine->ram_size; | ||
256 | + sms->bootinfo.kernel_filename = machine->kernel_filename; | ||
257 | + sms->bootinfo.nb_cpus = smp_cpus; | ||
258 | + sms->bootinfo.board_id = -1; | ||
259 | + sms->bootinfo.loader_start = sbsa_ref_memmap[SBSA_MEM].base; | ||
260 | + arm_load_kernel(ARM_CPU(first_cpu), &sms->bootinfo); | ||
261 | +} | ||
262 | + | ||
263 | +static uint64_t sbsa_ref_cpu_mp_affinity(SBSAMachineState *sms, int idx) | ||
264 | +{ | ||
265 | + uint8_t clustersz = ARM_DEFAULT_CPUS_PER_CLUSTER; | ||
266 | + return arm_cpu_mp_affinity(idx, clustersz); | ||
267 | +} | ||
268 | + | ||
269 | +static const CPUArchIdList *sbsa_ref_possible_cpu_arch_ids(MachineState *ms) | ||
270 | +{ | ||
271 | + SBSAMachineState *sms = SBSA_MACHINE(ms); | ||
272 | + int n; | ||
273 | + | ||
274 | + if (ms->possible_cpus) { | ||
275 | + assert(ms->possible_cpus->len == max_cpus); | ||
276 | + return ms->possible_cpus; | ||
277 | + } | ||
278 | + | ||
279 | + ms->possible_cpus = g_malloc0(sizeof(CPUArchIdList) + | ||
280 | + sizeof(CPUArchId) * max_cpus); | ||
281 | + ms->possible_cpus->len = max_cpus; | ||
282 | + for (n = 0; n < ms->possible_cpus->len; n++) { | ||
283 | + ms->possible_cpus->cpus[n].type = ms->cpu_type; | ||
284 | + ms->possible_cpus->cpus[n].arch_id = | ||
285 | + sbsa_ref_cpu_mp_affinity(sms, n); | ||
286 | + ms->possible_cpus->cpus[n].props.has_thread_id = true; | ||
287 | + ms->possible_cpus->cpus[n].props.thread_id = n; | ||
288 | + } | ||
289 | + return ms->possible_cpus; | ||
290 | +} | ||
291 | + | ||
292 | +static CpuInstanceProperties | ||
293 | +sbsa_ref_cpu_index_to_props(MachineState *ms, unsigned cpu_index) | ||
294 | +{ | ||
295 | + MachineClass *mc = MACHINE_GET_CLASS(ms); | ||
296 | + const CPUArchIdList *possible_cpus = mc->possible_cpu_arch_ids(ms); | ||
297 | + | ||
298 | + assert(cpu_index < possible_cpus->len); | ||
299 | + return possible_cpus->cpus[cpu_index].props; | ||
300 | +} | ||
301 | + | ||
302 | +static int64_t | ||
303 | +sbsa_ref_get_default_cpu_node_id(const MachineState *ms, int idx) | ||
304 | +{ | ||
305 | + return idx % nb_numa_nodes; | ||
306 | +} | ||
307 | + | ||
308 | +static void sbsa_ref_class_init(ObjectClass *oc, void *data) | ||
309 | +{ | ||
310 | + MachineClass *mc = MACHINE_CLASS(oc); | ||
311 | + | ||
312 | + mc->init = sbsa_ref_init; | ||
313 | + mc->desc = "QEMU 'SBSA Reference' ARM Virtual Machine"; | ||
314 | + mc->default_cpu_type = ARM_CPU_TYPE_NAME("cortex-a57"); | ||
315 | + mc->max_cpus = 512; | ||
316 | + mc->pci_allow_0_address = true; | ||
317 | + mc->minimum_page_bits = 12; | ||
318 | + mc->block_default_type = IF_IDE; | ||
319 | + mc->no_cdrom = 1; | ||
320 | + mc->default_ram_size = 1 * GiB; | ||
321 | + mc->default_cpus = 4; | ||
322 | + mc->possible_cpu_arch_ids = sbsa_ref_possible_cpu_arch_ids; | ||
323 | + mc->cpu_index_to_instance_props = sbsa_ref_cpu_index_to_props; | ||
324 | + mc->get_default_cpu_node_id = sbsa_ref_get_default_cpu_node_id; | ||
325 | +} | ||
326 | + | ||
327 | +static const TypeInfo sbsa_ref_info = { | ||
328 | + .name = TYPE_SBSA_MACHINE, | ||
329 | + .parent = TYPE_MACHINE, | ||
330 | + .class_init = sbsa_ref_class_init, | ||
331 | + .instance_size = sizeof(SBSAMachineState), | ||
332 | +}; | ||
333 | + | ||
334 | +static void sbsa_ref_machine_init(void) | ||
335 | +{ | ||
336 | + type_register_static(&sbsa_ref_info); | ||
337 | +} | ||
338 | + | ||
339 | +type_init(sbsa_ref_machine_init); | ||
340 | diff --git a/MAINTAINERS b/MAINTAINERS | ||
341 | index XXXXXXX..XXXXXXX 100644 | ||
342 | --- a/MAINTAINERS | ||
343 | +++ b/MAINTAINERS | ||
344 | @@ -XXX,XX +XXX,XX @@ F: include/hw/arm/fsl-imx6.h | ||
345 | F: include/hw/misc/imx6_*.h | ||
346 | F: include/hw/ssi/imx_spi.h | ||
347 | |||
348 | +SBSA-REF | ||
349 | +M: Radoslaw Biernacki <radoslaw.biernacki@linaro.org> | ||
350 | +M: Peter Maydell <peter.maydell@linaro.org> | ||
351 | +R: Leif Lindholm <leif.lindholm@linaro.org> | ||
352 | +L: qemu-arm@nongnu.org | ||
353 | +S: Maintained | ||
354 | +F: hw/arm/sbsa-ref.c | ||
355 | + | ||
356 | Sharp SL-5500 (Collie) PDA | ||
357 | M: Peter Maydell <peter.maydell@linaro.org> | ||
358 | L: qemu-arm@nongnu.org | ||
359 | diff --git a/default-configs/aarch64-softmmu.mak b/default-configs/aarch64-softmmu.mak | ||
360 | index XXXXXXX..XXXXXXX 100644 | ||
361 | --- a/default-configs/aarch64-softmmu.mak | ||
362 | +++ b/default-configs/aarch64-softmmu.mak | ||
363 | @@ -XXX,XX +XXX,XX @@ include arm-softmmu.mak | ||
364 | |||
365 | CONFIG_XLNX_ZYNQMP_ARM=y | ||
366 | CONFIG_XLNX_VERSAL=y | ||
367 | +CONFIG_SBSA_REF=y | ||
368 | diff --git a/hw/arm/Kconfig b/hw/arm/Kconfig | ||
369 | index XXXXXXX..XXXXXXX 100644 | ||
370 | --- a/hw/arm/Kconfig | ||
371 | +++ b/hw/arm/Kconfig | ||
372 | @@ -XXX,XX +XXX,XX @@ config REALVIEW | ||
373 | select DS1338 # I2C RTC+NVRAM | ||
374 | select USB_OHCI | ||
375 | |||
376 | +config SBSA_REF | ||
377 | + bool | ||
378 | + imply PCI_DEVICES | ||
379 | + select AHCI | ||
380 | + select ARM_SMMUV3 | ||
381 | + select GPIO_KEY | ||
382 | + select PCI_EXPRESS | ||
383 | + select PCI_EXPRESS_GENERIC_BRIDGE | ||
384 | + select PFLASH_CFI01 | ||
385 | + select PL011 # UART | ||
386 | + select PL031 # RTC | ||
387 | + select PL061 # GPIO | ||
388 | + select USB_EHCI_SYSBUS | ||
389 | + | ||
390 | config SABRELITE | ||
391 | bool | ||
392 | select FSL_IMX6 | ||
393 | -- | ||
394 | 2.20.1 | ||
395 | |||
396 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Hongbo Zhang <hongbo.zhang@linaro.org> | ||
1 | 2 | ||
3 | Following the previous patch, this patch adds peripheral devices to the | ||
4 | newly introduced SBSA-ref machine. | ||
5 | |||
6 | Signed-off-by: Hongbo Zhang <hongbo.zhang@linaro.org> | ||
7 | Message-id: 1561890034-15921-3-git-send-email-hongbo.zhang@linaro.org | ||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | --- | ||
11 | hw/arm/sbsa-ref.c | 535 ++++++++++++++++++++++++++++++++++++++++++++++ | ||
12 | 1 file changed, 535 insertions(+) | ||
13 | |||
14 | diff --git a/hw/arm/sbsa-ref.c b/hw/arm/sbsa-ref.c | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/hw/arm/sbsa-ref.c | ||
17 | +++ b/hw/arm/sbsa-ref.c | ||
18 | @@ -XXX,XX +XXX,XX @@ | ||
19 | */ | ||
20 | |||
21 | #include "qemu/osdep.h" | ||
22 | +#include "qemu-common.h" | ||
23 | #include "qapi/error.h" | ||
24 | #include "qemu/error-report.h" | ||
25 | #include "qemu/units.h" | ||
26 | +#include "sysemu/device_tree.h" | ||
27 | #include "sysemu/numa.h" | ||
28 | #include "sysemu/sysemu.h" | ||
29 | #include "exec/address-spaces.h" | ||
30 | #include "exec/hwaddr.h" | ||
31 | #include "kvm_arm.h" | ||
32 | #include "hw/arm/boot.h" | ||
33 | +#include "hw/block/flash.h" | ||
34 | #include "hw/boards.h" | ||
35 | +#include "hw/ide/internal.h" | ||
36 | +#include "hw/ide/ahci_internal.h" | ||
37 | #include "hw/intc/arm_gicv3_common.h" | ||
38 | +#include "hw/loader.h" | ||
39 | +#include "hw/pci-host/gpex.h" | ||
40 | +#include "hw/usb.h" | ||
41 | +#include "net/net.h" | ||
42 | |||
43 | #define RAMLIMIT_GB 8192 | ||
44 | #define RAMLIMIT_BYTES (RAMLIMIT_GB * GiB) | ||
45 | |||
46 | +#define NUM_IRQS 256 | ||
47 | +#define NUM_SMMU_IRQS 4 | ||
48 | +#define NUM_SATA_PORTS 6 | ||
49 | + | ||
50 | +#define VIRTUAL_PMU_IRQ 7 | ||
51 | +#define ARCH_GIC_MAINT_IRQ 9 | ||
52 | +#define ARCH_TIMER_VIRT_IRQ 11 | ||
53 | +#define ARCH_TIMER_S_EL1_IRQ 13 | ||
54 | +#define ARCH_TIMER_NS_EL1_IRQ 14 | ||
55 | +#define ARCH_TIMER_NS_EL2_IRQ 10 | ||
56 | + | ||
57 | enum { | ||
58 | SBSA_FLASH, | ||
59 | SBSA_MEM, | ||
60 | @@ -XXX,XX +XXX,XX @@ typedef struct { | ||
61 | void *fdt; | ||
62 | int fdt_size; | ||
63 | int psci_conduit; | ||
64 | + PFlashCFI01 *flash[2]; | ||
65 | } SBSAMachineState; | ||
66 | |||
67 | #define TYPE_SBSA_MACHINE MACHINE_TYPE_NAME("sbsa-ref") | ||
68 | @@ -XXX,XX +XXX,XX @@ static const MemMapEntry sbsa_ref_memmap[] = { | ||
69 | [SBSA_MEM] = { 0x10000000000ULL, RAMLIMIT_BYTES }, | ||
70 | }; | ||
71 | |||
72 | +static const int sbsa_ref_irqmap[] = { | ||
73 | + [SBSA_UART] = 1, | ||
74 | + [SBSA_RTC] = 2, | ||
75 | + [SBSA_PCIE] = 3, /* ... to 6 */ | ||
76 | + [SBSA_GPIO] = 7, | ||
77 | + [SBSA_SECURE_UART] = 8, | ||
78 | + [SBSA_SECURE_UART_MM] = 9, | ||
79 | + [SBSA_AHCI] = 10, | ||
80 | + [SBSA_EHCI] = 11, | ||
81 | +}; | ||
82 | + | ||
83 | +/* | ||
84 | + * Firmware on this machine only uses ACPI table to load OS, these limited | ||
85 | + * device tree nodes are just to let firmware know the info which varies from | ||
86 | + * command line parameters, so it is not necessary to be fully compatible | ||
87 | + * with the kernel CPU and NUMA binding rules. | ||
88 | + */ | ||
89 | +static void create_fdt(SBSAMachineState *sms) | ||
90 | +{ | ||
91 | + void *fdt = create_device_tree(&sms->fdt_size); | ||
92 | + const MachineState *ms = MACHINE(sms); | ||
93 | + int cpu; | ||
94 | + | ||
95 | + if (!fdt) { | ||
96 | + error_report("create_device_tree() failed"); | ||
97 | + exit(1); | ||
98 | + } | ||
99 | + | ||
100 | + sms->fdt = fdt; | ||
101 | + | ||
102 | + qemu_fdt_setprop_string(fdt, "/", "compatible", "linux,sbsa-ref"); | ||
103 | + qemu_fdt_setprop_cell(fdt, "/", "#address-cells", 0x2); | ||
104 | + qemu_fdt_setprop_cell(fdt, "/", "#size-cells", 0x2); | ||
105 | + | ||
106 | + if (have_numa_distance) { | ||
107 | + int size = nb_numa_nodes * nb_numa_nodes * 3 * sizeof(uint32_t); | ||
108 | + uint32_t *matrix = g_malloc0(size); | ||
109 | + int idx, i, j; | ||
110 | + | ||
111 | + for (i = 0; i < nb_numa_nodes; i++) { | ||
112 | + for (j = 0; j < nb_numa_nodes; j++) { | ||
113 | + idx = (i * nb_numa_nodes + j) * 3; | ||
114 | + matrix[idx + 0] = cpu_to_be32(i); | ||
115 | + matrix[idx + 1] = cpu_to_be32(j); | ||
116 | + matrix[idx + 2] = cpu_to_be32(numa_info[i].distance[j]); | ||
117 | + } | ||
118 | + } | ||
119 | + | ||
120 | + qemu_fdt_add_subnode(fdt, "/distance-map"); | ||
121 | + qemu_fdt_setprop(fdt, "/distance-map", "distance-matrix", | ||
122 | + matrix, size); | ||
123 | + g_free(matrix); | ||
124 | + } | ||
125 | + | ||
126 | + qemu_fdt_add_subnode(sms->fdt, "/cpus"); | ||
127 | + | ||
128 | + for (cpu = sms->smp_cpus - 1; cpu >= 0; cpu--) { | ||
129 | + char *nodename = g_strdup_printf("/cpus/cpu@%d", cpu); | ||
130 | + ARMCPU *armcpu = ARM_CPU(qemu_get_cpu(cpu)); | ||
131 | + CPUState *cs = CPU(armcpu); | ||
132 | + | ||
133 | + qemu_fdt_add_subnode(sms->fdt, nodename); | ||
134 | + | ||
135 | + if (ms->possible_cpus->cpus[cs->cpu_index].props.has_node_id) { | ||
136 | + qemu_fdt_setprop_cell(sms->fdt, nodename, "numa-node-id", | ||
137 | + ms->possible_cpus->cpus[cs->cpu_index].props.node_id); | ||
138 | + } | ||
139 | + | ||
140 | + g_free(nodename); | ||
141 | + } | ||
142 | +} | ||
143 | + | ||
144 | +#define SBSA_FLASH_SECTOR_SIZE (256 * KiB) | ||
145 | + | ||
146 | +static PFlashCFI01 *sbsa_flash_create1(SBSAMachineState *sms, | ||
147 | + const char *name, | ||
148 | + const char *alias_prop_name) | ||
149 | +{ | ||
150 | + /* | ||
151 | + * Create a single flash device. We use the same parameters as | ||
152 | + * the flash devices on the Versatile Express board. | ||
153 | + */ | ||
154 | + DeviceState *dev = qdev_create(NULL, TYPE_PFLASH_CFI01); | ||
155 | + | ||
156 | + qdev_prop_set_uint64(dev, "sector-length", SBSA_FLASH_SECTOR_SIZE); | ||
157 | + qdev_prop_set_uint8(dev, "width", 4); | ||
158 | + qdev_prop_set_uint8(dev, "device-width", 2); | ||
159 | + qdev_prop_set_bit(dev, "big-endian", false); | ||
160 | + qdev_prop_set_uint16(dev, "id0", 0x89); | ||
161 | + qdev_prop_set_uint16(dev, "id1", 0x18); | ||
162 | + qdev_prop_set_uint16(dev, "id2", 0x00); | ||
163 | + qdev_prop_set_uint16(dev, "id3", 0x00); | ||
164 | + qdev_prop_set_string(dev, "name", name); | ||
165 | + object_property_add_child(OBJECT(sms), name, OBJECT(dev), | ||
166 | + &error_abort); | ||
167 | + object_property_add_alias(OBJECT(sms), alias_prop_name, | ||
168 | + OBJECT(dev), "drive", &error_abort); | ||
169 | + return PFLASH_CFI01(dev); | ||
170 | +} | ||
171 | + | ||
172 | +static void sbsa_flash_create(SBSAMachineState *sms) | ||
173 | +{ | ||
174 | + sms->flash[0] = sbsa_flash_create1(sms, "sbsa.flash0", "pflash0"); | ||
175 | + sms->flash[1] = sbsa_flash_create1(sms, "sbsa.flash1", "pflash1"); | ||
176 | +} | ||
177 | + | ||
178 | +static void sbsa_flash_map1(PFlashCFI01 *flash, | ||
179 | + hwaddr base, hwaddr size, | ||
180 | + MemoryRegion *sysmem) | ||
181 | +{ | ||
182 | + DeviceState *dev = DEVICE(flash); | ||
183 | + | ||
184 | + assert(size % SBSA_FLASH_SECTOR_SIZE == 0); | ||
185 | + assert(size / SBSA_FLASH_SECTOR_SIZE <= UINT32_MAX); | ||
186 | + qdev_prop_set_uint32(dev, "num-blocks", size / SBSA_FLASH_SECTOR_SIZE); | ||
187 | + qdev_init_nofail(dev); | ||
188 | + | ||
189 | + memory_region_add_subregion(sysmem, base, | ||
190 | + sysbus_mmio_get_region(SYS_BUS_DEVICE(dev), | ||
191 | + 0)); | ||
192 | +} | ||
193 | + | ||
194 | +static void sbsa_flash_map(SBSAMachineState *sms, | ||
195 | + MemoryRegion *sysmem, | ||
196 | + MemoryRegion *secure_sysmem) | ||
197 | +{ | ||
198 | + /* | ||
199 | + * Map two flash devices to fill the SBSA_FLASH space in the memmap. | ||
200 | + * sysmem is the system memory space. secure_sysmem is the secure view | ||
201 | + * of the system, and the first flash device should be made visible only | ||
202 | + * there. The second flash device is visible to both secure and nonsecure. | ||
203 | + * If sysmem == secure_sysmem this means there is no separate Secure | ||
204 | + * address space and both flash devices are generally visible. | ||
205 | + */ | ||
206 | + hwaddr flashsize = sbsa_ref_memmap[SBSA_FLASH].size / 2; | ||
207 | + hwaddr flashbase = sbsa_ref_memmap[SBSA_FLASH].base; | ||
208 | + | ||
209 | + sbsa_flash_map1(sms->flash[0], flashbase, flashsize, | ||
210 | + secure_sysmem); | ||
211 | + sbsa_flash_map1(sms->flash[1], flashbase + flashsize, flashsize, | ||
212 | + sysmem); | ||
213 | +} | ||
214 | + | ||
215 | +static bool sbsa_firmware_init(SBSAMachineState *sms, | ||
216 | + MemoryRegion *sysmem, | ||
217 | + MemoryRegion *secure_sysmem) | ||
218 | +{ | ||
219 | + int i; | ||
220 | + BlockBackend *pflash_blk0; | ||
221 | + | ||
222 | + /* Map legacy -drive if=pflash to machine properties */ | ||
223 | + for (i = 0; i < ARRAY_SIZE(sms->flash); i++) { | ||
224 | + pflash_cfi01_legacy_drive(sms->flash[i], | ||
225 | + drive_get(IF_PFLASH, 0, i)); | ||
226 | + } | ||
227 | + | ||
228 | + sbsa_flash_map(sms, sysmem, secure_sysmem); | ||
229 | + | ||
230 | + pflash_blk0 = pflash_cfi01_get_blk(sms->flash[0]); | ||
231 | + | ||
232 | + if (bios_name) { | ||
233 | + char *fname; | ||
234 | + MemoryRegion *mr; | ||
235 | + int image_size; | ||
236 | + | ||
237 | + if (pflash_blk0) { | ||
238 | + error_report("The contents of the first flash device may be " | ||
239 | + "specified with -bios or with -drive if=pflash... " | ||
240 | + "but you cannot use both options at once"); | ||
241 | + exit(1); | ||
242 | + } | ||
243 | + | ||
244 | + /* Fall back to -bios */ | ||
245 | + | ||
246 | + fname = qemu_find_file(QEMU_FILE_TYPE_BIOS, bios_name); | ||
247 | + if (!fname) { | ||
248 | + error_report("Could not find ROM image '%s'", bios_name); | ||
249 | + exit(1); | ||
250 | + } | ||
251 | + mr = sysbus_mmio_get_region(SYS_BUS_DEVICE(sms->flash[0]), 0); | ||
252 | + image_size = load_image_mr(fname, mr); | ||
253 | + g_free(fname); | ||
254 | + if (image_size < 0) { | ||
255 | + error_report("Could not load ROM image '%s'", bios_name); | ||
256 | + exit(1); | ||
257 | + } | ||
258 | + } | ||
259 | + | ||
260 | + return pflash_blk0 || bios_name; | ||
261 | +} | ||
262 | + | ||
263 | +static void create_secure_ram(SBSAMachineState *sms, | ||
264 | + MemoryRegion *secure_sysmem) | ||
265 | +{ | ||
266 | + MemoryRegion *secram = g_new(MemoryRegion, 1); | ||
267 | + hwaddr base = sbsa_ref_memmap[SBSA_SECURE_MEM].base; | ||
268 | + hwaddr size = sbsa_ref_memmap[SBSA_SECURE_MEM].size; | ||
269 | + | ||
270 | + memory_region_init_ram(secram, NULL, "sbsa-ref.secure-ram", size, | ||
271 | + &error_fatal); | ||
272 | + memory_region_add_subregion(secure_sysmem, base, secram); | ||
273 | +} | ||
274 | + | ||
275 | +static void create_gic(SBSAMachineState *sms, qemu_irq *pic) | ||
276 | +{ | ||
277 | + DeviceState *gicdev; | ||
278 | + SysBusDevice *gicbusdev; | ||
279 | + const char *gictype; | ||
280 | + uint32_t redist0_capacity, redist0_count; | ||
281 | + int i; | ||
282 | + | ||
283 | + gictype = gicv3_class_name(); | ||
284 | + | ||
285 | + gicdev = qdev_create(NULL, gictype); | ||
286 | + qdev_prop_set_uint32(gicdev, "revision", 3); | ||
287 | + qdev_prop_set_uint32(gicdev, "num-cpu", smp_cpus); | ||
288 | + /* | ||
289 | + * Note that the num-irq property counts both internal and external | ||
290 | + * interrupts; there are always 32 of the former (mandated by GIC spec). | ||
291 | + */ | ||
292 | + qdev_prop_set_uint32(gicdev, "num-irq", NUM_IRQS + 32); | ||
293 | + qdev_prop_set_bit(gicdev, "has-security-extensions", true); | ||
294 | + | ||
295 | + redist0_capacity = | ||
296 | + sbsa_ref_memmap[SBSA_GIC_REDIST].size / GICV3_REDIST_SIZE; | ||
297 | + redist0_count = MIN(smp_cpus, redist0_capacity); | ||
298 | + | ||
299 | + qdev_prop_set_uint32(gicdev, "len-redist-region-count", 1); | ||
300 | + qdev_prop_set_uint32(gicdev, "redist-region-count[0]", redist0_count); | ||
301 | + | ||
302 | + qdev_init_nofail(gicdev); | ||
303 | + gicbusdev = SYS_BUS_DEVICE(gicdev); | ||
304 | + sysbus_mmio_map(gicbusdev, 0, sbsa_ref_memmap[SBSA_GIC_DIST].base); | ||
305 | + sysbus_mmio_map(gicbusdev, 1, sbsa_ref_memmap[SBSA_GIC_REDIST].base); | ||
306 | + | ||
307 | + /* | ||
308 | + * Wire the outputs from each CPU's generic timer and the GICv3 | ||
309 | + * maintenance interrupt signal to the appropriate GIC PPI inputs, | ||
310 | + * and the GIC's IRQ/FIQ/VIRQ/VFIQ interrupt outputs to the CPU's inputs. | ||
311 | + */ | ||
312 | + for (i = 0; i < smp_cpus; i++) { | ||
313 | + DeviceState *cpudev = DEVICE(qemu_get_cpu(i)); | ||
314 | + int ppibase = NUM_IRQS + i * GIC_INTERNAL + GIC_NR_SGIS; | ||
315 | + int irq; | ||
316 | + /* | ||
317 | + * Mapping from the output timer irq lines from the CPU to the | ||
318 | + * GIC PPI inputs used for this board. | ||
319 | + */ | ||
320 | + const int timer_irq[] = { | ||
321 | + [GTIMER_PHYS] = ARCH_TIMER_NS_EL1_IRQ, | ||
322 | + [GTIMER_VIRT] = ARCH_TIMER_VIRT_IRQ, | ||
323 | + [GTIMER_HYP] = ARCH_TIMER_NS_EL2_IRQ, | ||
324 | + [GTIMER_SEC] = ARCH_TIMER_S_EL1_IRQ, | ||
325 | + }; | ||
326 | + | ||
327 | + for (irq = 0; irq < ARRAY_SIZE(timer_irq); irq++) { | ||
328 | + qdev_connect_gpio_out(cpudev, irq, | ||
329 | + qdev_get_gpio_in(gicdev, | ||
330 | + ppibase + timer_irq[irq])); | ||
331 | + } | ||
332 | + | ||
333 | + qdev_connect_gpio_out_named(cpudev, "gicv3-maintenance-interrupt", 0, | ||
334 | + qdev_get_gpio_in(gicdev, ppibase | ||
335 | + + ARCH_GIC_MAINT_IRQ)); | ||
336 | + qdev_connect_gpio_out_named(cpudev, "pmu-interrupt", 0, | ||
337 | + qdev_get_gpio_in(gicdev, ppibase | ||
338 | + + VIRTUAL_PMU_IRQ)); | ||
339 | + | ||
340 | + sysbus_connect_irq(gicbusdev, i, qdev_get_gpio_in(cpudev, ARM_CPU_IRQ)); | ||
341 | + sysbus_connect_irq(gicbusdev, i + smp_cpus, | ||
342 | + qdev_get_gpio_in(cpudev, ARM_CPU_FIQ)); | ||
343 | + sysbus_connect_irq(gicbusdev, i + 2 * smp_cpus, | ||
344 | + qdev_get_gpio_in(cpudev, ARM_CPU_VIRQ)); | ||
345 | + sysbus_connect_irq(gicbusdev, i + 3 * smp_cpus, | ||
346 | + qdev_get_gpio_in(cpudev, ARM_CPU_VFIQ)); | ||
347 | + } | ||
348 | + | ||
349 | + for (i = 0; i < NUM_IRQS; i++) { | ||
350 | + pic[i] = qdev_get_gpio_in(gicdev, i); | ||
351 | + } | ||
352 | +} | ||
353 | + | ||
354 | +static void create_uart(const SBSAMachineState *sms, qemu_irq *pic, int uart, | ||
355 | + MemoryRegion *mem, Chardev *chr) | ||
356 | +{ | ||
357 | + hwaddr base = sbsa_ref_memmap[uart].base; | ||
358 | + int irq = sbsa_ref_irqmap[uart]; | ||
359 | + DeviceState *dev = qdev_create(NULL, "pl011"); | ||
360 | + SysBusDevice *s = SYS_BUS_DEVICE(dev); | ||
361 | + | ||
362 | + qdev_prop_set_chr(dev, "chardev", chr); | ||
363 | + qdev_init_nofail(dev); | ||
364 | + memory_region_add_subregion(mem, base, | ||
365 | + sysbus_mmio_get_region(s, 0)); | ||
366 | + sysbus_connect_irq(s, 0, pic[irq]); | ||
367 | +} | ||
368 | + | ||
369 | +static void create_rtc(const SBSAMachineState *sms, qemu_irq *pic) | ||
370 | +{ | ||
371 | + hwaddr base = sbsa_ref_memmap[SBSA_RTC].base; | ||
372 | + int irq = sbsa_ref_irqmap[SBSA_RTC]; | ||
373 | + | ||
374 | + sysbus_create_simple("pl031", base, pic[irq]); | ||
375 | +} | ||
376 | + | ||
377 | +static DeviceState *gpio_key_dev; | ||
378 | +static void sbsa_ref_powerdown_req(Notifier *n, void *opaque) | ||
379 | +{ | ||
380 | + /* use gpio Pin 3 for power button event */ | ||
381 | + qemu_set_irq(qdev_get_gpio_in(gpio_key_dev, 0), 1); | ||
382 | +} | ||
383 | + | ||
384 | +static Notifier sbsa_ref_powerdown_notifier = { | ||
385 | + .notify = sbsa_ref_powerdown_req | ||
386 | +}; | ||
387 | + | ||
388 | +static void create_gpio(const SBSAMachineState *sms, qemu_irq *pic) | ||
389 | +{ | ||
390 | + DeviceState *pl061_dev; | ||
391 | + hwaddr base = sbsa_ref_memmap[SBSA_GPIO].base; | ||
392 | + int irq = sbsa_ref_irqmap[SBSA_GPIO]; | ||
393 | + | ||
394 | + pl061_dev = sysbus_create_simple("pl061", base, pic[irq]); | ||
395 | + | ||
396 | + gpio_key_dev = sysbus_create_simple("gpio-key", -1, | ||
397 | + qdev_get_gpio_in(pl061_dev, 3)); | ||
398 | + | ||
399 | + /* connect powerdown request */ | ||
400 | + qemu_register_powerdown_notifier(&sbsa_ref_powerdown_notifier); | ||
401 | +} | ||
402 | + | ||
403 | +static void create_ahci(const SBSAMachineState *sms, qemu_irq *pic) | ||
404 | +{ | ||
405 | + hwaddr base = sbsa_ref_memmap[SBSA_AHCI].base; | ||
406 | + int irq = sbsa_ref_irqmap[SBSA_AHCI]; | ||
407 | + DeviceState *dev; | ||
408 | + DriveInfo *hd[NUM_SATA_PORTS]; | ||
409 | + SysbusAHCIState *sysahci; | ||
410 | + AHCIState *ahci; | ||
411 | + int i; | ||
412 | + | ||
413 | + dev = qdev_create(NULL, "sysbus-ahci"); | ||
414 | + qdev_prop_set_uint32(dev, "num-ports", NUM_SATA_PORTS); | ||
415 | + qdev_init_nofail(dev); | ||
416 | + sysbus_mmio_map(SYS_BUS_DEVICE(dev), 0, base); | ||
417 | + sysbus_connect_irq(SYS_BUS_DEVICE(dev), 0, pic[irq]); | ||
418 | + | ||
419 | + sysahci = SYSBUS_AHCI(dev); | ||
420 | + ahci = &sysahci->ahci; | ||
421 | + ide_drive_get(hd, ARRAY_SIZE(hd)); | ||
422 | + for (i = 0; i < ahci->ports; i++) { | ||
423 | + if (hd[i] == NULL) { | ||
424 | + continue; | ||
425 | + } | ||
426 | + ide_create_drive(&ahci->dev[i].port, 0, hd[i]); | ||
427 | + } | ||
428 | +} | ||
429 | + | ||
430 | +static void create_ehci(const SBSAMachineState *sms, qemu_irq *pic) | ||
431 | +{ | ||
432 | + hwaddr base = sbsa_ref_memmap[SBSA_EHCI].base; | ||
433 | + int irq = sbsa_ref_irqmap[SBSA_EHCI]; | ||
434 | + | ||
435 | + sysbus_create_simple("platform-ehci-usb", base, pic[irq]); | ||
436 | +} | ||
437 | + | ||
438 | +static void create_smmu(const SBSAMachineState *sms, qemu_irq *pic, | ||
439 | + PCIBus *bus) | ||
440 | +{ | ||
441 | + hwaddr base = sbsa_ref_memmap[SBSA_SMMU].base; | ||
442 | + int irq = sbsa_ref_irqmap[SBSA_SMMU]; | ||
443 | + DeviceState *dev; | ||
444 | + int i; | ||
445 | + | ||
446 | + dev = qdev_create(NULL, "arm-smmuv3"); | ||
447 | + | ||
448 | + object_property_set_link(OBJECT(dev), OBJECT(bus), "primary-bus", | ||
449 | + &error_abort); | ||
450 | + qdev_init_nofail(dev); | ||
451 | + sysbus_mmio_map(SYS_BUS_DEVICE(dev), 0, base); | ||
452 | + for (i = 0; i < NUM_SMMU_IRQS; i++) { | ||
453 | + sysbus_connect_irq(SYS_BUS_DEVICE(dev), i, pic[irq + i]); | ||
454 | + } | ||
455 | +} | ||
456 | + | ||
457 | +static void create_pcie(SBSAMachineState *sms, qemu_irq *pic) | ||
458 | +{ | ||
459 | + hwaddr base_ecam = sbsa_ref_memmap[SBSA_PCIE_ECAM].base; | ||
460 | + hwaddr size_ecam = sbsa_ref_memmap[SBSA_PCIE_ECAM].size; | ||
461 | + hwaddr base_mmio = sbsa_ref_memmap[SBSA_PCIE_MMIO].base; | ||
462 | + hwaddr size_mmio = sbsa_ref_memmap[SBSA_PCIE_MMIO].size; | ||
463 | + hwaddr base_mmio_high = sbsa_ref_memmap[SBSA_PCIE_MMIO_HIGH].base; | ||
464 | + hwaddr size_mmio_high = sbsa_ref_memmap[SBSA_PCIE_MMIO_HIGH].size; | ||
465 | + hwaddr base_pio = sbsa_ref_memmap[SBSA_PCIE_PIO].base; | ||
466 | + int irq = sbsa_ref_irqmap[SBSA_PCIE]; | ||
467 | + MemoryRegion *mmio_alias, *mmio_alias_high, *mmio_reg; | ||
468 | + MemoryRegion *ecam_alias, *ecam_reg; | ||
469 | + DeviceState *dev; | ||
470 | + PCIHostState *pci; | ||
471 | + int i; | ||
472 | + | ||
473 | + dev = qdev_create(NULL, TYPE_GPEX_HOST); | ||
474 | + qdev_init_nofail(dev); | ||
475 | + | ||
476 | + /* Map ECAM space */ | ||
477 | + ecam_alias = g_new0(MemoryRegion, 1); | ||
478 | + ecam_reg = sysbus_mmio_get_region(SYS_BUS_DEVICE(dev), 0); | ||
479 | + memory_region_init_alias(ecam_alias, OBJECT(dev), "pcie-ecam", | ||
480 | + ecam_reg, 0, size_ecam); | ||
481 | + memory_region_add_subregion(get_system_memory(), base_ecam, ecam_alias); | ||
482 | + | ||
483 | + /* Map the MMIO space */ | ||
484 | + mmio_alias = g_new0(MemoryRegion, 1); | ||
485 | + mmio_reg = sysbus_mmio_get_region(SYS_BUS_DEVICE(dev), 1); | ||
486 | + memory_region_init_alias(mmio_alias, OBJECT(dev), "pcie-mmio", | ||
487 | + mmio_reg, base_mmio, size_mmio); | ||
488 | + memory_region_add_subregion(get_system_memory(), base_mmio, mmio_alias); | ||
489 | + | ||
490 | + /* Map the MMIO_HIGH space */ | ||
491 | + mmio_alias_high = g_new0(MemoryRegion, 1); | ||
492 | + memory_region_init_alias(mmio_alias_high, OBJECT(dev), "pcie-mmio-high", | ||
493 | + mmio_reg, base_mmio_high, size_mmio_high); | ||
494 | + memory_region_add_subregion(get_system_memory(), base_mmio_high, | ||
495 | + mmio_alias_high); | ||
496 | + | ||
497 | + /* Map IO port space */ | ||
498 | + sysbus_mmio_map(SYS_BUS_DEVICE(dev), 2, base_pio); | ||
499 | + | ||
500 | + for (i = 0; i < GPEX_NUM_IRQS; i++) { | ||
501 | + sysbus_connect_irq(SYS_BUS_DEVICE(dev), i, pic[irq + i]); | ||
502 | + gpex_set_irq_num(GPEX_HOST(dev), i, irq + i); | ||
503 | + } | ||
504 | + | ||
505 | + pci = PCI_HOST_BRIDGE(dev); | ||
506 | + if (pci->bus) { | ||
507 | + for (i = 0; i < nb_nics; i++) { | ||
508 | + NICInfo *nd = &nd_table[i]; | ||
509 | + | ||
510 | + if (!nd->model) { | ||
511 | + nd->model = g_strdup("e1000e"); | ||
512 | + } | ||
513 | + | ||
514 | + pci_nic_init_nofail(nd, pci->bus, nd->model, NULL); | ||
515 | + } | ||
516 | + } | ||
517 | + | ||
518 | + pci_create_simple(pci->bus, -1, "VGA"); | ||
519 | + | ||
520 | + create_smmu(sms, pic, pci->bus); | ||
521 | +} | ||
522 | + | ||
523 | +static void *sbsa_ref_dtb(const struct arm_boot_info *binfo, int *fdt_size) | ||
524 | +{ | ||
525 | + const SBSAMachineState *board = container_of(binfo, SBSAMachineState, | ||
526 | + bootinfo); | ||
527 | + | ||
528 | + *fdt_size = board->fdt_size; | ||
529 | + return board->fdt; | ||
530 | +} | ||
531 | + | ||
532 | static void sbsa_ref_init(MachineState *machine) | ||
533 | { | ||
534 | SBSAMachineState *sms = SBSA_MACHINE(machine); | ||
535 | @@ -XXX,XX +XXX,XX @@ static void sbsa_ref_init(MachineState *machine) | ||
536 | MemoryRegion *sysmem = get_system_memory(); | ||
537 | MemoryRegion *secure_sysmem = NULL; | ||
538 | MemoryRegion *ram = g_new(MemoryRegion, 1); | ||
539 | + bool firmware_loaded; | ||
540 | const CPUArchIdList *possible_cpus; | ||
541 | int n, sbsa_max_cpus; | ||
542 | + qemu_irq pic[NUM_IRQS]; | ||
543 | |||
544 | if (strcmp(machine->cpu_type, ARM_CPU_TYPE_NAME("cortex-a57"))) { | ||
545 | error_report("sbsa-ref: CPU type other than the built-in " | ||
546 | @@ -XXX,XX +XXX,XX @@ static void sbsa_ref_init(MachineState *machine) | ||
547 | exit(1); | ||
548 | } | ||
549 | |||
550 | + /* | ||
551 | + * The Secure view of the world is the same as the NonSecure, | ||
552 | + * but with a few extra devices. Create it as a container region | ||
553 | + * containing the system memory at low priority; any secure-only | ||
554 | + * devices go in at higher priority and take precedence. | ||
555 | + */ | ||
556 | + secure_sysmem = g_new(MemoryRegion, 1); | ||
557 | + memory_region_init(secure_sysmem, OBJECT(machine), "secure-memory", | ||
558 | + UINT64_MAX); | ||
559 | + memory_region_add_subregion_overlap(secure_sysmem, 0, sysmem, -1); | ||
560 | + | ||
561 | + firmware_loaded = sbsa_firmware_init(sms, sysmem, | ||
562 | + secure_sysmem ?: sysmem); | ||
563 | + | ||
564 | + if (machine->kernel_filename && firmware_loaded) { | ||
565 | + error_report("sbsa-ref: No fw_cfg device on this machine, " | ||
566 | + "so -kernel option is not supported when firmware loaded, " | ||
567 | + "please load OS from hard disk instead"); | ||
568 | + exit(1); | ||
569 | + } | ||
570 | + | ||
571 | /* | ||
572 | * This machine has EL3 enabled, external firmware should supply PSCI | ||
573 | * implementation, so the QEMU's internal PSCI is disabled. | ||
574 | @@ -XXX,XX +XXX,XX @@ static void sbsa_ref_init(MachineState *machine) | ||
575 | machine->ram_size); | ||
576 | memory_region_add_subregion(sysmem, sbsa_ref_memmap[SBSA_MEM].base, ram); | ||
577 | |||
578 | + create_fdt(sms); | ||
579 | + | ||
580 | + create_secure_ram(sms, secure_sysmem); | ||
581 | + | ||
582 | + create_gic(sms, pic); | ||
583 | + | ||
584 | + create_uart(sms, pic, SBSA_UART, sysmem, serial_hd(0)); | ||
585 | + create_uart(sms, pic, SBSA_SECURE_UART, secure_sysmem, serial_hd(1)); | ||
586 | + /* Second secure UART for RAS and MM from EL0 */ | ||
587 | + create_uart(sms, pic, SBSA_SECURE_UART_MM, secure_sysmem, serial_hd(2)); | ||
588 | + | ||
589 | + create_rtc(sms, pic); | ||
590 | + | ||
591 | + create_gpio(sms, pic); | ||
592 | + | ||
593 | + create_ahci(sms, pic); | ||
594 | + | ||
595 | + create_ehci(sms, pic); | ||
596 | + | ||
597 | + create_pcie(sms, pic); | ||
598 | + | ||
599 | sms->bootinfo.ram_size = machine->ram_size; | ||
600 | sms->bootinfo.kernel_filename = machine->kernel_filename; | ||
601 | sms->bootinfo.nb_cpus = smp_cpus; | ||
602 | sms->bootinfo.board_id = -1; | ||
603 | sms->bootinfo.loader_start = sbsa_ref_memmap[SBSA_MEM].base; | ||
604 | + sms->bootinfo.get_dtb = sbsa_ref_dtb; | ||
605 | + sms->bootinfo.firmware_loaded = firmware_loaded; | ||
606 | arm_load_kernel(ARM_CPU(first_cpu), &sms->bootinfo); | ||
607 | } | ||
608 | |||
609 | @@ -XXX,XX +XXX,XX @@ sbsa_ref_get_default_cpu_node_id(const MachineState *ms, int idx) | ||
610 | return idx % nb_numa_nodes; | ||
611 | } | ||
612 | |||
613 | +static void sbsa_ref_instance_init(Object *obj) | ||
614 | +{ | ||
615 | + SBSAMachineState *sms = SBSA_MACHINE(obj); | ||
616 | + | ||
617 | + sbsa_flash_create(sms); | ||
618 | +} | ||
619 | + | ||
620 | static void sbsa_ref_class_init(ObjectClass *oc, void *data) | ||
621 | { | ||
622 | MachineClass *mc = MACHINE_CLASS(oc); | ||
623 | @@ -XXX,XX +XXX,XX @@ static void sbsa_ref_class_init(ObjectClass *oc, void *data) | ||
624 | static const TypeInfo sbsa_ref_info = { | ||
625 | .name = TYPE_SBSA_MACHINE, | ||
626 | .parent = TYPE_MACHINE, | ||
627 | + .instance_init = sbsa_ref_instance_init, | ||
628 | .class_init = sbsa_ref_class_init, | ||
629 | .instance_size = sizeof(SBSAMachineState), | ||
630 | }; | ||
631 | -- | ||
632 | 2.20.1 | ||
633 | |||
634 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
1 | 2 | ||
3 | Group Aarch64 rules together, TCG related ones at the bottom. | ||
4 | This will help when restricting TCG-only objects. | ||
5 | |||
6 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | ||
7 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
8 | Message-id: 20190701132516.26392-2-philmd@redhat.com | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | --- | ||
11 | target/arm/Makefile.objs | 5 +++-- | ||
12 | 1 file changed, 3 insertions(+), 2 deletions(-) | ||
13 | |||
14 | diff --git a/target/arm/Makefile.objs b/target/arm/Makefile.objs | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/target/arm/Makefile.objs | ||
17 | +++ b/target/arm/Makefile.objs | ||
18 | @@ -XXX,XX +XXX,XX @@ obj-$(call lnot,$(CONFIG_KVM)) += kvm-stub.o | ||
19 | obj-y += translate.o op_helper.o helper.o cpu.o | ||
20 | obj-y += neon_helper.o iwmmxt_helper.o vec_helper.o vfp_helper.o | ||
21 | obj-y += gdbstub.o | ||
22 | -obj-$(TARGET_AARCH64) += cpu64.o translate-a64.o helper-a64.o gdbstub64.o | ||
23 | -obj-$(TARGET_AARCH64) += pauth_helper.o | ||
24 | +obj-$(TARGET_AARCH64) += cpu64.o gdbstub64.o | ||
25 | obj-y += crypto_helper.o | ||
26 | obj-$(CONFIG_SOFTMMU) += arm-powerctl.o | ||
27 | |||
28 | @@ -XXX,XX +XXX,XX @@ target/arm/translate-sve.o: target/arm/decode-sve.inc.c | ||
29 | target/arm/translate.o: target/arm/decode-vfp.inc.c | ||
30 | target/arm/translate.o: target/arm/decode-vfp-uncond.inc.c | ||
31 | |||
32 | +obj-$(TARGET_AARCH64) += translate-a64.o helper-a64.o | ||
33 | obj-$(TARGET_AARCH64) += translate-sve.o sve_helper.o | ||
34 | +obj-$(TARGET_AARCH64) += pauth_helper.o | ||
35 | -- | ||
36 | 2.20.1 | ||
37 | |||
38 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
1 | 2 | ||
3 | Group ARM objects together, TCG related ones at the bottom. | ||
4 | This will help when restricting TCG-only objects. | ||
5 | |||
6 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | ||
7 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
8 | Message-id: 20190701132516.26392-3-philmd@redhat.com | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | --- | ||
11 | target/arm/Makefile.objs | 10 ++++++---- | ||
12 | 1 file changed, 6 insertions(+), 4 deletions(-) | ||
13 | |||
14 | diff --git a/target/arm/Makefile.objs b/target/arm/Makefile.objs | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/target/arm/Makefile.objs | ||
17 | +++ b/target/arm/Makefile.objs | ||
18 | @@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_KVM) += kvm.o | ||
19 | obj-$(call land,$(CONFIG_KVM),$(call lnot,$(TARGET_AARCH64))) += kvm32.o | ||
20 | obj-$(call land,$(CONFIG_KVM),$(TARGET_AARCH64)) += kvm64.o | ||
21 | obj-$(call lnot,$(CONFIG_KVM)) += kvm-stub.o | ||
22 | -obj-y += translate.o op_helper.o helper.o cpu.o | ||
23 | -obj-y += neon_helper.o iwmmxt_helper.o vec_helper.o vfp_helper.o | ||
24 | -obj-y += gdbstub.o | ||
25 | +obj-y += helper.o vfp_helper.o | ||
26 | +obj-y += cpu.o gdbstub.o | ||
27 | obj-$(TARGET_AARCH64) += cpu64.o gdbstub64.o | ||
28 | -obj-y += crypto_helper.o | ||
29 | obj-$(CONFIG_SOFTMMU) += arm-powerctl.o | ||
30 | |||
31 | DECODETREE = $(SRC_PATH)/scripts/decodetree.py | ||
32 | @@ -XXX,XX +XXX,XX @@ target/arm/translate-sve.o: target/arm/decode-sve.inc.c | ||
33 | target/arm/translate.o: target/arm/decode-vfp.inc.c | ||
34 | target/arm/translate.o: target/arm/decode-vfp-uncond.inc.c | ||
35 | |||
36 | +obj-y += translate.o op_helper.o | ||
37 | +obj-y += crypto_helper.o | ||
38 | +obj-y += iwmmxt_helper.o vec_helper.o neon_helper.o | ||
39 | + | ||
40 | obj-$(TARGET_AARCH64) += translate-a64.o helper-a64.o | ||
41 | obj-$(TARGET_AARCH64) += translate-sve.o sve_helper.o | ||
42 | obj-$(TARGET_AARCH64) += pauth_helper.o | ||
43 | -- | ||
44 | 2.20.1 | ||
45 | |||
46 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
1 | 2 | ||
3 | Group KVM rules together. | ||
4 | |||
5 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | ||
6 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
7 | Message-id: 20190701132516.26392-4-philmd@redhat.com | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | --- | ||
10 | target/arm/Makefile.objs | 9 +++++---- | ||
11 | 1 file changed, 5 insertions(+), 4 deletions(-) | ||
12 | |||
13 | diff --git a/target/arm/Makefile.objs b/target/arm/Makefile.objs | ||
14 | index XXXXXXX..XXXXXXX 100644 | ||
15 | --- a/target/arm/Makefile.objs | ||
16 | +++ b/target/arm/Makefile.objs | ||
17 | @@ -XXX,XX +XXX,XX @@ | ||
18 | obj-y += arm-semi.o | ||
19 | obj-$(CONFIG_SOFTMMU) += machine.o psci.o arch_dump.o monitor.o | ||
20 | -obj-$(CONFIG_KVM) += kvm.o | ||
21 | -obj-$(call land,$(CONFIG_KVM),$(call lnot,$(TARGET_AARCH64))) += kvm32.o | ||
22 | -obj-$(call land,$(CONFIG_KVM),$(TARGET_AARCH64)) += kvm64.o | ||
23 | -obj-$(call lnot,$(CONFIG_KVM)) += kvm-stub.o | ||
24 | obj-y += helper.o vfp_helper.o | ||
25 | obj-y += cpu.o gdbstub.o | ||
26 | obj-$(TARGET_AARCH64) += cpu64.o gdbstub64.o | ||
27 | obj-$(CONFIG_SOFTMMU) += arm-powerctl.o | ||
28 | |||
29 | +obj-$(CONFIG_KVM) += kvm.o | ||
30 | +obj-$(call land,$(CONFIG_KVM),$(call lnot,$(TARGET_AARCH64))) += kvm32.o | ||
31 | +obj-$(call land,$(CONFIG_KVM),$(TARGET_AARCH64)) += kvm64.o | ||
32 | +obj-$(call lnot,$(CONFIG_KVM)) += kvm-stub.o | ||
33 | + | ||
34 | DECODETREE = $(SRC_PATH)/scripts/decodetree.py | ||
35 | |||
36 | target/arm/decode-sve.inc.c: $(SRC_PATH)/target/arm/sve.decode $(DECODETREE) | ||
37 | -- | ||
38 | 2.20.1 | ||
39 | |||
40 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | The incorrect value advertised only thumb2 div without arm div. | 3 | Group SOFTMMU objects together. |
4 | Since PSCI is TCG specific, keep it separate. | ||
4 | 5 | ||
5 | Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> | 6 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> |
6 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 7 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
7 | Message-id: 20181008212205.17752-6-richard.henderson@linaro.org | 8 | Message-id: 20190701132516.26392-5-philmd@redhat.com |
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | --- | 10 | --- |
10 | target/arm/cpu.c | 5 ++++- | 11 | target/arm/Makefile.objs | 5 ++++- |
11 | 1 file changed, 4 insertions(+), 1 deletion(-) | 12 | 1 file changed, 4 insertions(+), 1 deletion(-) |
12 | 13 | ||
13 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | 14 | diff --git a/target/arm/Makefile.objs b/target/arm/Makefile.objs |
14 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/target/arm/cpu.c | 16 | --- a/target/arm/Makefile.objs |
16 | +++ b/target/arm/cpu.c | 17 | +++ b/target/arm/Makefile.objs |
17 | @@ -XXX,XX +XXX,XX @@ static void cortex_a7_initfn(Object *obj) | 18 | @@ -XXX,XX +XXX,XX @@ |
18 | cpu->id_mmfr1 = 0x40000000; | 19 | obj-y += arm-semi.o |
19 | cpu->id_mmfr2 = 0x01240000; | 20 | -obj-$(CONFIG_SOFTMMU) += machine.o psci.o arch_dump.o monitor.o |
20 | cpu->id_mmfr3 = 0x02102211; | 21 | obj-y += helper.o vfp_helper.o |
21 | - cpu->id_isar0 = 0x01101110; | 22 | obj-y += cpu.o gdbstub.o |
22 | + /* a7_mpcore_r0p5_trm, page 4-4 gives 0x01101110; but | 23 | obj-$(TARGET_AARCH64) += cpu64.o gdbstub64.o |
23 | + * table 4-41 gives 0x02101110, which includes the arm div insns. | 24 | + |
24 | + */ | 25 | +obj-$(CONFIG_SOFTMMU) += machine.o arch_dump.o monitor.o |
25 | + cpu->id_isar0 = 0x02101110; | 26 | obj-$(CONFIG_SOFTMMU) += arm-powerctl.o |
26 | cpu->id_isar1 = 0x13112111; | 27 | |
27 | cpu->id_isar2 = 0x21232041; | 28 | obj-$(CONFIG_KVM) += kvm.o |
28 | cpu->id_isar3 = 0x11112131; | 29 | @@ -XXX,XX +XXX,XX @@ obj-y += translate.o op_helper.o |
30 | obj-y += crypto_helper.o | ||
31 | obj-y += iwmmxt_helper.o vec_helper.o neon_helper.o | ||
32 | |||
33 | +obj-$(CONFIG_SOFTMMU) += psci.o | ||
34 | + | ||
35 | obj-$(TARGET_AARCH64) += translate-a64.o helper-a64.o | ||
36 | obj-$(TARGET_AARCH64) += translate-sve.o sve_helper.o | ||
37 | obj-$(TARGET_AARCH64) += pauth_helper.o | ||
29 | -- | 38 | -- |
30 | 2.19.0 | 39 | 2.20.1 |
31 | 40 | ||
32 | 41 | diff view generated by jsdifflib |
1 | The get_phys_addr() functions take a pointer to an ARMMMUFaultInfo | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | struct, which they fill in only if a fault occurs. This means that | ||
3 | the caller must always zero-initialize the struct before passing | ||
4 | it in. We forgot to do this in v7m_stack_read() and v7m_stack_write(). | ||
5 | Correct the error. | ||
6 | 2 | ||
3 | Reviewed-by: Robert Bradford <robert.bradford@intel.com> | ||
4 | Reviewed-by: Samuel Ortiz <sameo@linux.intel.com> | ||
5 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | ||
6 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
7 | Message-id: 20190701132516.26392-6-philmd@redhat.com | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Message-id: 20181011172057.9466-1-peter.maydell@linaro.org | ||
10 | --- | 9 | --- |
11 | target/arm/helper.c | 4 ++-- | 10 | target/arm/helper.c | 7 +++++++ |
12 | 1 file changed, 2 insertions(+), 2 deletions(-) | 11 | 1 file changed, 7 insertions(+) |
13 | 12 | ||
14 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 13 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
15 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/target/arm/helper.c | 15 | --- a/target/arm/helper.c |
17 | +++ b/target/arm/helper.c | 16 | +++ b/target/arm/helper.c |
18 | @@ -XXX,XX +XXX,XX @@ static bool v7m_stack_write(ARMCPU *cpu, uint32_t addr, uint32_t value, | 17 | @@ -XXX,XX +XXX,XX @@ |
19 | target_ulong page_size; | 18 | +/* |
20 | hwaddr physaddr; | 19 | + * ARM generic helpers. |
21 | int prot; | 20 | + * |
22 | - ARMMMUFaultInfo fi; | 21 | + * This code is licensed under the GNU GPL v2 or later. |
23 | + ARMMMUFaultInfo fi = {}; | 22 | + * |
24 | bool secure = mmu_idx & ARM_MMU_IDX_M_S; | 23 | + * SPDX-License-Identifier: GPL-2.0-or-later |
25 | int exc; | 24 | + */ |
26 | bool exc_secure; | 25 | #include "qemu/osdep.h" |
27 | @@ -XXX,XX +XXX,XX @@ static bool v7m_stack_read(ARMCPU *cpu, uint32_t *dest, uint32_t addr, | 26 | #include "qemu/units.h" |
28 | target_ulong page_size; | 27 | #include "target/arm/idau.h" |
29 | hwaddr physaddr; | ||
30 | int prot; | ||
31 | - ARMMMUFaultInfo fi; | ||
32 | + ARMMMUFaultInfo fi = {}; | ||
33 | bool secure = mmu_idx & ARM_MMU_IDX_M_S; | ||
34 | int exc; | ||
35 | bool exc_secure; | ||
36 | -- | 28 | -- |
37 | 2.19.0 | 29 | 2.20.1 |
38 | 30 | ||
39 | 31 | diff view generated by jsdifflib |
1 | From: Aaron Lindsay <aclindsa@gmail.com> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | I previously fixed this for PMINTENSET_EL1, but missed these. | 3 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
4 | 4 | Message-id: 20190701132516.26392-7-philmd@redhat.com | |
5 | Signed-off-by: Aaron Lindsay <alindsay@codeaurora.org> | 5 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
6 | Signed-off-by: Aaron Lindsay <aclindsa@gmail.com> | ||
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20181010203735.27918-2-aclindsa@gmail.com | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | --- | 7 | --- |
11 | target/arm/helper.c | 6 ++++-- | 8 | target/arm/helper.c | 2 -- |
12 | 1 file changed, 4 insertions(+), 2 deletions(-) | 9 | 1 file changed, 2 deletions(-) |
13 | 10 | ||
14 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 11 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
15 | index XXXXXXX..XXXXXXX 100644 | 12 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/target/arm/helper.c | 13 | --- a/target/arm/helper.c |
17 | +++ b/target/arm/helper.c | 14 | +++ b/target/arm/helper.c |
18 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v7_cp_reginfo[] = { | 15 | @@ -XXX,XX +XXX,XX @@ |
19 | .writefn = pmintenset_write, .raw_writefn = raw_write, | 16 | #include "exec/gdbstub.h" |
20 | .resetvalue = 0x0 }, | 17 | #include "exec/helper-proto.h" |
21 | { .name = "PMINTENCLR", .cp = 15, .crn = 9, .crm = 14, .opc1 = 0, .opc2 = 2, | 18 | #include "qemu/host-utils.h" |
22 | - .access = PL1_RW, .accessfn = access_tpm, .type = ARM_CP_ALIAS, | 19 | -#include "sysemu/arch_init.h" |
23 | + .access = PL1_RW, .accessfn = access_tpm, | 20 | #include "sysemu/sysemu.h" |
24 | + .type = ARM_CP_ALIAS | ARM_CP_IO, | 21 | #include "qemu/bitops.h" |
25 | .fieldoffset = offsetof(CPUARMState, cp15.c9_pminten), | 22 | #include "qemu/crc32c.h" |
26 | .writefn = pmintenclr_write, }, | 23 | @@ -XXX,XX +XXX,XX @@ |
27 | { .name = "PMINTENCLR_EL1", .state = ARM_CP_STATE_AA64, | 24 | #include "hw/semihosting/semihost.h" |
28 | .opc0 = 3, .opc1 = 0, .crn = 9, .crm = 14, .opc2 = 2, | 25 | #include "sysemu/cpus.h" |
29 | - .access = PL1_RW, .accessfn = access_tpm, .type = ARM_CP_ALIAS, | 26 | #include "sysemu/kvm.h" |
30 | + .access = PL1_RW, .accessfn = access_tpm, | 27 | -#include "fpu/softfloat.h" |
31 | + .type = ARM_CP_ALIAS | ARM_CP_IO, | 28 | #include "qemu/range.h" |
32 | .fieldoffset = offsetof(CPUARMState, cp15.c9_pminten), | 29 | #include "qapi/qapi-commands-target.h" |
33 | .writefn = pmintenclr_write }, | 30 | #include "qapi/error.h" |
34 | { .name = "CCSIDR", .state = ARM_CP_STATE_BOTH, | ||
35 | -- | 31 | -- |
36 | 2.19.0 | 32 | 2.20.1 |
37 | 33 | ||
38 | 34 | diff view generated by jsdifflib |
1 | From: Aaron Lindsay <aclindsa@gmail.com> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | This is an amendment to my earlier patch: | 3 | Since commit 8c06fbdf36b checkpatch.pl enforce a new multiline |
4 | commit 7ece99b17e832065236c07a158dfac62619ef99b | 4 | comment syntax. Since we'll move this code around, fix its style |
5 | Author: Aaron Lindsay <alindsay@codeaurora.org> | 5 | first. |
6 | Date: Thu Apr 26 11:04:39 2018 +0100 | ||
7 | 6 | ||
8 | target/arm: Mask PMU register writes based on PMCR_EL0.N | 7 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> |
9 | 8 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | |
10 | Signed-off-by: Aaron Lindsay <alindsay@codeaurora.org> | 9 | Message-id: 20190701132516.26392-8-philmd@redhat.com |
11 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
12 | Message-id: 20181010203735.27918-3-aclindsa@gmail.com | ||
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
14 | --- | 11 | --- |
15 | target/arm/helper.c | 1 + | 12 | target/arm/helper.c | 237 ++++++++++++++++++++++++++-------------- |
16 | 1 file changed, 1 insertion(+) | 13 | target/arm/op_helper.c | 54 ++++++--- |
14 | target/arm/vfp_helper.c | 3 +- | ||
15 | 3 files changed, 196 insertions(+), 98 deletions(-) | ||
17 | 16 | ||
18 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 17 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
19 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
20 | --- a/target/arm/helper.c | 19 | --- a/target/arm/helper.c |
21 | +++ b/target/arm/helper.c | 20 | +++ b/target/arm/helper.c |
22 | @@ -XXX,XX +XXX,XX @@ static void pmcntenclr_write(CPUARMState *env, const ARMCPRegInfo *ri, | 21 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_vlldm)(CPUARMState *env, uint32_t fptr) |
23 | static void pmovsr_write(CPUARMState *env, const ARMCPRegInfo *ri, | 22 | |
24 | uint64_t value) | 23 | uint32_t HELPER(v7m_tt)(CPUARMState *env, uint32_t addr, uint32_t op) |
25 | { | 24 | { |
26 | + value &= pmu_counter_mask(env); | 25 | - /* The TT instructions can be used by unprivileged code, but in |
27 | env->cp15.c9_pmovsr &= ~value; | 26 | + /* |
27 | + * The TT instructions can be used by unprivileged code, but in | ||
28 | * user-only emulation we don't have the MPU. | ||
29 | * Luckily since we know we are NonSecure unprivileged (and that in | ||
30 | * turn means that the A flag wasn't specified), all the bits in the | ||
31 | @@ -XXX,XX +XXX,XX @@ static bool v7m_stack_write(ARMCPU *cpu, uint32_t addr, uint32_t value, | ||
32 | return true; | ||
33 | |||
34 | pend_fault: | ||
35 | - /* By pending the exception at this point we are making | ||
36 | + /* | ||
37 | + * By pending the exception at this point we are making | ||
38 | * the IMPDEF choice "overridden exceptions pended" (see the | ||
39 | * MergeExcInfo() pseudocode). The other choice would be to not | ||
40 | * pend them now and then make a choice about which to throw away | ||
41 | @@ -XXX,XX +XXX,XX @@ static bool v7m_stack_read(ARMCPU *cpu, uint32_t *dest, uint32_t addr, | ||
42 | return true; | ||
43 | |||
44 | pend_fault: | ||
45 | - /* By pending the exception at this point we are making | ||
46 | + /* | ||
47 | + * By pending the exception at this point we are making | ||
48 | * the IMPDEF choice "overridden exceptions pended" (see the | ||
49 | * MergeExcInfo() pseudocode). The other choice would be to not | ||
50 | * pend them now and then make a choice about which to throw away | ||
51 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_preserve_fp_state)(CPUARMState *env) | ||
52 | */ | ||
28 | } | 53 | } |
29 | 54 | ||
55 | -/* Write to v7M CONTROL.SPSEL bit for the specified security bank. | ||
56 | +/* | ||
57 | + * Write to v7M CONTROL.SPSEL bit for the specified security bank. | ||
58 | * This may change the current stack pointer between Main and Process | ||
59 | * stack pointers if it is done for the CONTROL register for the current | ||
60 | * security state. | ||
61 | @@ -XXX,XX +XXX,XX @@ static void write_v7m_control_spsel_for_secstate(CPUARMState *env, | ||
62 | } | ||
63 | } | ||
64 | |||
65 | -/* Write to v7M CONTROL.SPSEL bit. This may change the current | ||
66 | +/* | ||
67 | + * Write to v7M CONTROL.SPSEL bit. This may change the current | ||
68 | * stack pointer between Main and Process stack pointers. | ||
69 | */ | ||
70 | static void write_v7m_control_spsel(CPUARMState *env, bool new_spsel) | ||
71 | @@ -XXX,XX +XXX,XX @@ static void write_v7m_control_spsel(CPUARMState *env, bool new_spsel) | ||
72 | |||
73 | void write_v7m_exception(CPUARMState *env, uint32_t new_exc) | ||
74 | { | ||
75 | - /* Write a new value to v7m.exception, thus transitioning into or out | ||
76 | + /* | ||
77 | + * Write a new value to v7m.exception, thus transitioning into or out | ||
78 | * of Handler mode; this may result in a change of active stack pointer. | ||
79 | */ | ||
80 | bool new_is_psp, old_is_psp = v7m_using_psp(env); | ||
81 | @@ -XXX,XX +XXX,XX @@ static void switch_v7m_security_state(CPUARMState *env, bool new_secstate) | ||
82 | return; | ||
83 | } | ||
84 | |||
85 | - /* All the banked state is accessed by looking at env->v7m.secure | ||
86 | + /* | ||
87 | + * All the banked state is accessed by looking at env->v7m.secure | ||
88 | * except for the stack pointer; rearrange the SP appropriately. | ||
89 | */ | ||
90 | new_ss_msp = env->v7m.other_ss_msp; | ||
91 | @@ -XXX,XX +XXX,XX @@ static void switch_v7m_security_state(CPUARMState *env, bool new_secstate) | ||
92 | |||
93 | void HELPER(v7m_bxns)(CPUARMState *env, uint32_t dest) | ||
94 | { | ||
95 | - /* Handle v7M BXNS: | ||
96 | + /* | ||
97 | + * Handle v7M BXNS: | ||
98 | * - if the return value is a magic value, do exception return (like BX) | ||
99 | * - otherwise bit 0 of the return value is the target security state | ||
100 | */ | ||
101 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_bxns)(CPUARMState *env, uint32_t dest) | ||
102 | } | ||
103 | |||
104 | if (dest >= min_magic) { | ||
105 | - /* This is an exception return magic value; put it where | ||
106 | + /* | ||
107 | + * This is an exception return magic value; put it where | ||
108 | * do_v7m_exception_exit() expects and raise EXCEPTION_EXIT. | ||
109 | * Note that if we ever add gen_ss_advance() singlestep support to | ||
110 | * M profile this should count as an "instruction execution complete" | ||
111 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_bxns)(CPUARMState *env, uint32_t dest) | ||
112 | |||
113 | void HELPER(v7m_blxns)(CPUARMState *env, uint32_t dest) | ||
114 | { | ||
115 | - /* Handle v7M BLXNS: | ||
116 | + /* | ||
117 | + * Handle v7M BLXNS: | ||
118 | * - bit 0 of the destination address is the target security state | ||
119 | */ | ||
120 | |||
121 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_blxns)(CPUARMState *env, uint32_t dest) | ||
122 | assert(env->v7m.secure); | ||
123 | |||
124 | if (dest & 1) { | ||
125 | - /* target is Secure, so this is just a normal BLX, | ||
126 | + /* | ||
127 | + * Target is Secure, so this is just a normal BLX, | ||
128 | * except that the low bit doesn't indicate Thumb/not. | ||
129 | */ | ||
130 | env->regs[14] = nextinst; | ||
131 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_blxns)(CPUARMState *env, uint32_t dest) | ||
132 | env->regs[13] = sp; | ||
133 | env->regs[14] = 0xfeffffff; | ||
134 | if (arm_v7m_is_handler_mode(env)) { | ||
135 | - /* Write a dummy value to IPSR, to avoid leaking the current secure | ||
136 | + /* | ||
137 | + * Write a dummy value to IPSR, to avoid leaking the current secure | ||
138 | * exception number to non-secure code. This is guaranteed not | ||
139 | * to cause write_v7m_exception() to actually change stacks. | ||
140 | */ | ||
141 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_blxns)(CPUARMState *env, uint32_t dest) | ||
142 | static uint32_t *get_v7m_sp_ptr(CPUARMState *env, bool secure, bool threadmode, | ||
143 | bool spsel) | ||
144 | { | ||
145 | - /* Return a pointer to the location where we currently store the | ||
146 | + /* | ||
147 | + * Return a pointer to the location where we currently store the | ||
148 | * stack pointer for the requested security state and thread mode. | ||
149 | * This pointer will become invalid if the CPU state is updated | ||
150 | * such that the stack pointers are switched around (eg changing | ||
151 | @@ -XXX,XX +XXX,XX @@ static bool arm_v7m_load_vector(ARMCPU *cpu, int exc, bool targets_secure, | ||
152 | |||
153 | mmu_idx = arm_v7m_mmu_idx_for_secstate_and_priv(env, targets_secure, true); | ||
154 | |||
155 | - /* We don't do a get_phys_addr() here because the rules for vector | ||
156 | + /* | ||
157 | + * We don't do a get_phys_addr() here because the rules for vector | ||
158 | * loads are special: they always use the default memory map, and | ||
159 | * the default memory map permits reads from all addresses. | ||
160 | * Since there's no easy way to pass through to pmsav8_mpu_lookup() | ||
161 | @@ -XXX,XX +XXX,XX @@ static bool arm_v7m_load_vector(ARMCPU *cpu, int exc, bool targets_secure, | ||
162 | return true; | ||
163 | |||
164 | load_fail: | ||
165 | - /* All vector table fetch fails are reported as HardFault, with | ||
166 | + /* | ||
167 | + * All vector table fetch fails are reported as HardFault, with | ||
168 | * HFSR.VECTTBL and .FORCED set. (FORCED is set because | ||
169 | * technically the underlying exception is a MemManage or BusFault | ||
170 | * that is escalated to HardFault.) This is a terminal exception, | ||
171 | @@ -XXX,XX +XXX,XX @@ static uint32_t v7m_integrity_sig(CPUARMState *env, uint32_t lr) | ||
172 | static bool v7m_push_callee_stack(ARMCPU *cpu, uint32_t lr, bool dotailchain, | ||
173 | bool ignore_faults) | ||
174 | { | ||
175 | - /* For v8M, push the callee-saves register part of the stack frame. | ||
176 | + /* | ||
177 | + * For v8M, push the callee-saves register part of the stack frame. | ||
178 | * Compare the v8M pseudocode PushCalleeStack(). | ||
179 | * In the tailchaining case this may not be the current stack. | ||
180 | */ | ||
181 | @@ -XXX,XX +XXX,XX @@ static bool v7m_push_callee_stack(ARMCPU *cpu, uint32_t lr, bool dotailchain, | ||
182 | return true; | ||
183 | } | ||
184 | |||
185 | - /* Write as much of the stack frame as we can. A write failure may | ||
186 | + /* | ||
187 | + * Write as much of the stack frame as we can. A write failure may | ||
188 | * cause us to pend a derived exception. | ||
189 | */ | ||
190 | sig = v7m_integrity_sig(env, lr); | ||
191 | @@ -XXX,XX +XXX,XX @@ static bool v7m_push_callee_stack(ARMCPU *cpu, uint32_t lr, bool dotailchain, | ||
192 | static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain, | ||
193 | bool ignore_stackfaults) | ||
194 | { | ||
195 | - /* Do the "take the exception" parts of exception entry, | ||
196 | + /* | ||
197 | + * Do the "take the exception" parts of exception entry, | ||
198 | * but not the pushing of state to the stack. This is | ||
199 | * similar to the pseudocode ExceptionTaken() function. | ||
200 | */ | ||
201 | @@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain, | ||
202 | if (arm_feature(env, ARM_FEATURE_V8)) { | ||
203 | if (arm_feature(env, ARM_FEATURE_M_SECURITY) && | ||
204 | (lr & R_V7M_EXCRET_S_MASK)) { | ||
205 | - /* The background code (the owner of the registers in the | ||
206 | + /* | ||
207 | + * The background code (the owner of the registers in the | ||
208 | * exception frame) is Secure. This means it may either already | ||
209 | * have or now needs to push callee-saves registers. | ||
210 | */ | ||
211 | if (targets_secure) { | ||
212 | if (dotailchain && !(lr & R_V7M_EXCRET_ES_MASK)) { | ||
213 | - /* We took an exception from Secure to NonSecure | ||
214 | + /* | ||
215 | + * We took an exception from Secure to NonSecure | ||
216 | * (which means the callee-saved registers got stacked) | ||
217 | * and are now tailchaining to a Secure exception. | ||
218 | * Clear DCRS so eventual return from this Secure | ||
219 | @@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain, | ||
220 | lr &= ~R_V7M_EXCRET_DCRS_MASK; | ||
221 | } | ||
222 | } else { | ||
223 | - /* We're going to a non-secure exception; push the | ||
224 | + /* | ||
225 | + * We're going to a non-secure exception; push the | ||
226 | * callee-saves registers to the stack now, if they're | ||
227 | * not already saved. | ||
228 | */ | ||
229 | @@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain, | ||
230 | lr |= R_V7M_EXCRET_SPSEL_MASK; | ||
231 | } | ||
232 | |||
233 | - /* Clear registers if necessary to prevent non-secure exception | ||
234 | + /* | ||
235 | + * Clear registers if necessary to prevent non-secure exception | ||
236 | * code being able to see register values from secure code. | ||
237 | * Where register values become architecturally UNKNOWN we leave | ||
238 | * them with their previous values. | ||
239 | */ | ||
240 | if (arm_feature(env, ARM_FEATURE_M_SECURITY)) { | ||
241 | if (!targets_secure) { | ||
242 | - /* Always clear the caller-saved registers (they have been | ||
243 | + /* | ||
244 | + * Always clear the caller-saved registers (they have been | ||
245 | * pushed to the stack earlier in v7m_push_stack()). | ||
246 | * Clear callee-saved registers if the background code is | ||
247 | * Secure (in which case these regs were saved in | ||
248 | @@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain, | ||
249 | } | ||
250 | |||
251 | if (push_failed && !ignore_stackfaults) { | ||
252 | - /* Derived exception on callee-saves register stacking: | ||
253 | + /* | ||
254 | + * Derived exception on callee-saves register stacking: | ||
255 | * we might now want to take a different exception which | ||
256 | * targets a different security state, so try again from the top. | ||
257 | */ | ||
258 | @@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain, | ||
259 | return; | ||
260 | } | ||
261 | |||
262 | - /* Now we've done everything that might cause a derived exception | ||
263 | + /* | ||
264 | + * Now we've done everything that might cause a derived exception | ||
265 | * we can go ahead and activate whichever exception we're going to | ||
266 | * take (which might now be the derived exception). | ||
267 | */ | ||
268 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_vlldm)(CPUARMState *env, uint32_t fptr) | ||
269 | |||
270 | static bool v7m_push_stack(ARMCPU *cpu) | ||
271 | { | ||
272 | - /* Do the "set up stack frame" part of exception entry, | ||
273 | + /* | ||
274 | + * Do the "set up stack frame" part of exception entry, | ||
275 | * similar to pseudocode PushStack(). | ||
276 | * Return true if we generate a derived exception (and so | ||
277 | * should ignore further stack faults trying to process | ||
278 | @@ -XXX,XX +XXX,XX @@ static bool v7m_push_stack(ARMCPU *cpu) | ||
279 | } | ||
280 | } | ||
281 | |||
282 | - /* Write as much of the stack frame as we can. If we fail a stack | ||
283 | + /* | ||
284 | + * Write as much of the stack frame as we can. If we fail a stack | ||
285 | * write this will result in a derived exception being pended | ||
286 | * (which may be taken in preference to the one we started with | ||
287 | * if it has higher priority). | ||
288 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
289 | bool ftype; | ||
290 | bool restore_s16_s31; | ||
291 | |||
292 | - /* If we're not in Handler mode then jumps to magic exception-exit | ||
293 | + /* | ||
294 | + * If we're not in Handler mode then jumps to magic exception-exit | ||
295 | * addresses don't have magic behaviour. However for the v8M | ||
296 | * security extensions the magic secure-function-return has to | ||
297 | * work in thread mode too, so to avoid doing an extra check in | ||
298 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
299 | return; | ||
300 | } | ||
301 | |||
302 | - /* In the spec pseudocode ExceptionReturn() is called directly | ||
303 | + /* | ||
304 | + * In the spec pseudocode ExceptionReturn() is called directly | ||
305 | * from BXWritePC() and gets the full target PC value including | ||
306 | * bit zero. In QEMU's implementation we treat it as a normal | ||
307 | * jump-to-register (which is then caught later on), and so split | ||
308 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
309 | } | ||
310 | |||
311 | if (arm_feature(env, ARM_FEATURE_M_SECURITY)) { | ||
312 | - /* EXC_RETURN.ES validation check (R_SMFL). We must do this before | ||
313 | + /* | ||
314 | + * EXC_RETURN.ES validation check (R_SMFL). We must do this before | ||
315 | * we pick which FAULTMASK to clear. | ||
316 | */ | ||
317 | if (!env->v7m.secure && | ||
318 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
319 | } | ||
320 | |||
321 | if (env->v7m.exception != ARMV7M_EXCP_NMI) { | ||
322 | - /* Auto-clear FAULTMASK on return from other than NMI. | ||
323 | + /* | ||
324 | + * Auto-clear FAULTMASK on return from other than NMI. | ||
325 | * If the security extension is implemented then this only | ||
326 | * happens if the raw execution priority is >= 0; the | ||
327 | * value of the ES bit in the exception return value indicates | ||
328 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
329 | /* still an irq active now */ | ||
330 | break; | ||
331 | case 1: | ||
332 | - /* we returned to base exception level, no nesting. | ||
333 | + /* | ||
334 | + * We returned to base exception level, no nesting. | ||
335 | * (In the pseudocode this is written using "NestedActivation != 1" | ||
336 | * where we have 'rettobase == false'.) | ||
337 | */ | ||
338 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
339 | |||
340 | if (arm_feature(env, ARM_FEATURE_V8)) { | ||
341 | if (!arm_feature(env, ARM_FEATURE_M_SECURITY)) { | ||
342 | - /* UNPREDICTABLE if S == 1 or DCRS == 0 or ES == 1 (R_XLCP); | ||
343 | + /* | ||
344 | + * UNPREDICTABLE if S == 1 or DCRS == 0 or ES == 1 (R_XLCP); | ||
345 | * we choose to take the UsageFault. | ||
346 | */ | ||
347 | if ((excret & R_V7M_EXCRET_S_MASK) || | ||
348 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
349 | break; | ||
350 | case 13: /* Return to Thread using Process stack */ | ||
351 | case 9: /* Return to Thread using Main stack */ | ||
352 | - /* We only need to check NONBASETHRDENA for v7M, because in | ||
353 | + /* | ||
354 | + * We only need to check NONBASETHRDENA for v7M, because in | ||
355 | * v8M this bit does not exist (it is RES1). | ||
356 | */ | ||
357 | if (!rettobase && | ||
358 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
359 | } | ||
360 | |||
361 | if (ufault) { | ||
362 | - /* Bad exception return: instead of popping the exception | ||
363 | + /* | ||
364 | + * Bad exception return: instead of popping the exception | ||
365 | * stack, directly take a usage fault on the current stack. | ||
366 | */ | ||
367 | env->v7m.cfsr[env->v7m.secure] |= R_V7M_CFSR_INVPC_MASK; | ||
368 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
369 | switch_v7m_security_state(env, return_to_secure); | ||
370 | |||
371 | { | ||
372 | - /* The stack pointer we should be reading the exception frame from | ||
373 | + /* | ||
374 | + * The stack pointer we should be reading the exception frame from | ||
375 | * depends on bits in the magic exception return type value (and | ||
376 | * for v8M isn't necessarily the stack pointer we will eventually | ||
377 | * end up resuming execution with). Get a pointer to the location | ||
378 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
379 | v7m_stack_read(cpu, &xpsr, frameptr + 0x1c, mmu_idx); | ||
380 | |||
381 | if (!pop_ok) { | ||
382 | - /* v7m_stack_read() pended a fault, so take it (as a tail | ||
383 | + /* | ||
384 | + * v7m_stack_read() pended a fault, so take it (as a tail | ||
385 | * chained exception on the same stack frame) | ||
386 | */ | ||
387 | qemu_log_mask(CPU_LOG_INT, "...derived exception on unstacking\n"); | ||
388 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
389 | return; | ||
390 | } | ||
391 | |||
392 | - /* Returning from an exception with a PC with bit 0 set is defined | ||
393 | + /* | ||
394 | + * Returning from an exception with a PC with bit 0 set is defined | ||
395 | * behaviour on v8M (bit 0 is ignored), but for v7M it was specified | ||
396 | * to be UNPREDICTABLE. In practice actual v7M hardware seems to ignore | ||
397 | * the lsbit, and there are several RTOSes out there which incorrectly | ||
398 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
399 | } | ||
400 | |||
401 | if (arm_feature(env, ARM_FEATURE_V8)) { | ||
402 | - /* For v8M we have to check whether the xPSR exception field | ||
403 | + /* | ||
404 | + * For v8M we have to check whether the xPSR exception field | ||
405 | * matches the EXCRET value for return to handler/thread | ||
406 | * before we commit to changing the SP and xPSR. | ||
407 | */ | ||
408 | bool will_be_handler = (xpsr & XPSR_EXCP) != 0; | ||
409 | if (return_to_handler != will_be_handler) { | ||
410 | - /* Take an INVPC UsageFault on the current stack. | ||
411 | + /* | ||
412 | + * Take an INVPC UsageFault on the current stack. | ||
413 | * By this point we will have switched to the security state | ||
414 | * for the background state, so this UsageFault will target | ||
415 | * that state. | ||
416 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
417 | frameptr += 0x40; | ||
418 | } | ||
419 | } | ||
420 | - /* Undo stack alignment (the SPREALIGN bit indicates that the original | ||
421 | + /* | ||
422 | + * Undo stack alignment (the SPREALIGN bit indicates that the original | ||
423 | * pre-exception SP was not 8-aligned and we added a padding word to | ||
424 | * align it, so we undo this by ORing in the bit that increases it | ||
425 | * from the current 8-aligned value to the 8-unaligned value. (Adding 4 | ||
426 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
427 | V7M_CONTROL, SFPA, sfpa); | ||
428 | } | ||
429 | |||
430 | - /* The restored xPSR exception field will be zero if we're | ||
431 | + /* | ||
432 | + * The restored xPSR exception field will be zero if we're | ||
433 | * resuming in Thread mode. If that doesn't match what the | ||
434 | * exception return excret specified then this is a UsageFault. | ||
435 | * v7M requires we make this check here; v8M did it earlier. | ||
436 | */ | ||
437 | if (return_to_handler != arm_v7m_is_handler_mode(env)) { | ||
438 | - /* Take an INVPC UsageFault by pushing the stack again; | ||
439 | + /* | ||
440 | + * Take an INVPC UsageFault by pushing the stack again; | ||
441 | * we know we're v7M so this is never a Secure UsageFault. | ||
442 | */ | ||
443 | bool ignore_stackfaults; | ||
444 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
445 | |||
446 | static bool do_v7m_function_return(ARMCPU *cpu) | ||
447 | { | ||
448 | - /* v8M security extensions magic function return. | ||
449 | + /* | ||
450 | + * v8M security extensions magic function return. | ||
451 | * We may either: | ||
452 | * (1) throw an exception (longjump) | ||
453 | * (2) return true if we successfully handled the function return | ||
454 | @@ -XXX,XX +XXX,XX @@ static bool do_v7m_function_return(ARMCPU *cpu) | ||
455 | frame_sp_p = get_v7m_sp_ptr(env, true, threadmode, spsel); | ||
456 | frameptr = *frame_sp_p; | ||
457 | |||
458 | - /* These loads may throw an exception (for MPU faults). We want to | ||
459 | + /* | ||
460 | + * These loads may throw an exception (for MPU faults). We want to | ||
461 | * do them as secure, so work out what MMU index that is. | ||
462 | */ | ||
463 | mmu_idx = arm_v7m_mmu_idx_for_secstate(env, true); | ||
464 | @@ -XXX,XX +XXX,XX @@ static void arm_log_exception(int idx) | ||
465 | static bool v7m_read_half_insn(ARMCPU *cpu, ARMMMUIdx mmu_idx, | ||
466 | uint32_t addr, uint16_t *insn) | ||
467 | { | ||
468 | - /* Load a 16-bit portion of a v7M instruction, returning true on success, | ||
469 | + /* | ||
470 | + * Load a 16-bit portion of a v7M instruction, returning true on success, | ||
471 | * or false on failure (in which case we will have pended the appropriate | ||
472 | * exception). | ||
473 | * We need to do the instruction fetch's MPU and SAU checks | ||
474 | @@ -XXX,XX +XXX,XX @@ static bool v7m_read_half_insn(ARMCPU *cpu, ARMMMUIdx mmu_idx, | ||
475 | |||
476 | v8m_security_lookup(env, addr, MMU_INST_FETCH, mmu_idx, &sattrs); | ||
477 | if (!sattrs.nsc || sattrs.ns) { | ||
478 | - /* This must be the second half of the insn, and it straddles a | ||
479 | + /* | ||
480 | + * This must be the second half of the insn, and it straddles a | ||
481 | * region boundary with the second half not being S&NSC. | ||
482 | */ | ||
483 | env->v7m.sfsr |= R_V7M_SFSR_INVEP_MASK; | ||
484 | @@ -XXX,XX +XXX,XX @@ static bool v7m_read_half_insn(ARMCPU *cpu, ARMMMUIdx mmu_idx, | ||
485 | |||
486 | static bool v7m_handle_execute_nsc(ARMCPU *cpu) | ||
487 | { | ||
488 | - /* Check whether this attempt to execute code in a Secure & NS-Callable | ||
489 | + /* | ||
490 | + * Check whether this attempt to execute code in a Secure & NS-Callable | ||
491 | * memory region is for an SG instruction; if so, then emulate the | ||
492 | * effect of the SG instruction and return true. Otherwise pend | ||
493 | * the correct kind of exception and return false. | ||
494 | @@ -XXX,XX +XXX,XX @@ static bool v7m_handle_execute_nsc(ARMCPU *cpu) | ||
495 | ARMMMUIdx mmu_idx; | ||
496 | uint16_t insn; | ||
497 | |||
498 | - /* We should never get here unless get_phys_addr_pmsav8() caused | ||
499 | + /* | ||
500 | + * We should never get here unless get_phys_addr_pmsav8() caused | ||
501 | * an exception for NS executing in S&NSC memory. | ||
502 | */ | ||
503 | assert(!env->v7m.secure); | ||
504 | @@ -XXX,XX +XXX,XX @@ static bool v7m_handle_execute_nsc(ARMCPU *cpu) | ||
505 | } | ||
506 | |||
507 | if (insn != 0xe97f) { | ||
508 | - /* Not an SG instruction first half (we choose the IMPDEF | ||
509 | + /* | ||
510 | + * Not an SG instruction first half (we choose the IMPDEF | ||
511 | * early-SG-check option). | ||
512 | */ | ||
513 | goto gen_invep; | ||
514 | @@ -XXX,XX +XXX,XX @@ static bool v7m_handle_execute_nsc(ARMCPU *cpu) | ||
515 | } | ||
516 | |||
517 | if (insn != 0xe97f) { | ||
518 | - /* Not an SG instruction second half (yes, both halves of the SG | ||
519 | + /* | ||
520 | + * Not an SG instruction second half (yes, both halves of the SG | ||
521 | * insn have the same hex value) | ||
522 | */ | ||
523 | goto gen_invep; | ||
524 | } | ||
525 | |||
526 | - /* OK, we have confirmed that we really have an SG instruction. | ||
527 | + /* | ||
528 | + * OK, we have confirmed that we really have an SG instruction. | ||
529 | * We know we're NS in S memory so don't need to repeat those checks. | ||
530 | */ | ||
531 | qemu_log_mask(CPU_LOG_INT, "...really an SG instruction at 0x%08" PRIx32 | ||
532 | @@ -XXX,XX +XXX,XX @@ void arm_v7m_cpu_do_interrupt(CPUState *cs) | ||
533 | |||
534 | arm_log_exception(cs->exception_index); | ||
535 | |||
536 | - /* For exceptions we just mark as pending on the NVIC, and let that | ||
537 | - handle it. */ | ||
538 | + /* | ||
539 | + * For exceptions we just mark as pending on the NVIC, and let that | ||
540 | + * handle it. | ||
541 | + */ | ||
542 | switch (cs->exception_index) { | ||
543 | case EXCP_UDEF: | ||
544 | armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE, env->v7m.secure); | ||
545 | @@ -XXX,XX +XXX,XX @@ void arm_v7m_cpu_do_interrupt(CPUState *cs) | ||
546 | break; | ||
547 | case EXCP_PREFETCH_ABORT: | ||
548 | case EXCP_DATA_ABORT: | ||
549 | - /* Note that for M profile we don't have a guest facing FSR, but | ||
550 | + /* | ||
551 | + * Note that for M profile we don't have a guest facing FSR, but | ||
552 | * the env->exception.fsr will be populated by the code that | ||
553 | * raises the fault, in the A profile short-descriptor format. | ||
554 | */ | ||
555 | switch (env->exception.fsr & 0xf) { | ||
556 | case M_FAKE_FSR_NSC_EXEC: | ||
557 | - /* Exception generated when we try to execute code at an address | ||
558 | + /* | ||
559 | + * Exception generated when we try to execute code at an address | ||
560 | * which is marked as Secure & Non-Secure Callable and the CPU | ||
561 | * is in the Non-Secure state. The only instruction which can | ||
562 | * be executed like this is SG (and that only if both halves of | ||
563 | @@ -XXX,XX +XXX,XX @@ void arm_v7m_cpu_do_interrupt(CPUState *cs) | ||
564 | } | ||
565 | break; | ||
566 | case M_FAKE_FSR_SFAULT: | ||
567 | - /* Various flavours of SecureFault for attempts to execute or | ||
568 | + /* | ||
569 | + * Various flavours of SecureFault for attempts to execute or | ||
570 | * access data in the wrong security state. | ||
571 | */ | ||
572 | switch (cs->exception_index) { | ||
573 | @@ -XXX,XX +XXX,XX @@ void arm_v7m_cpu_do_interrupt(CPUState *cs) | ||
574 | armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_BUS, false); | ||
575 | break; | ||
576 | default: | ||
577 | - /* All other FSR values are either MPU faults or "can't happen | ||
578 | + /* | ||
579 | + * All other FSR values are either MPU faults or "can't happen | ||
580 | * for M profile" cases. | ||
581 | */ | ||
582 | switch (cs->exception_index) { | ||
583 | @@ -XXX,XX +XXX,XX @@ void arm_v7m_cpu_do_interrupt(CPUState *cs) | ||
584 | if (arm_feature(env, ARM_FEATURE_V8)) { | ||
585 | lr = R_V7M_EXCRET_RES1_MASK | | ||
586 | R_V7M_EXCRET_DCRS_MASK; | ||
587 | - /* The S bit indicates whether we should return to Secure | ||
588 | + /* | ||
589 | + * The S bit indicates whether we should return to Secure | ||
590 | * or NonSecure (ie our current state). | ||
591 | * The ES bit indicates whether we're taking this exception | ||
592 | * to Secure or NonSecure (ie our target state). We set it | ||
593 | @@ -XXX,XX +XXX,XX @@ void arm_v7m_cpu_do_interrupt(CPUState *cs) | ||
594 | v7m_exception_taken(cpu, lr, false, ignore_stackfaults); | ||
595 | } | ||
596 | |||
597 | -/* Function used to synchronize QEMU's AArch64 register set with AArch32 | ||
598 | +/* | ||
599 | + * Function used to synchronize QEMU's AArch64 register set with AArch32 | ||
600 | * register set. This is necessary when switching between AArch32 and AArch64 | ||
601 | * execution state. | ||
602 | */ | ||
603 | @@ -XXX,XX +XXX,XX @@ void aarch64_sync_32_to_64(CPUARMState *env) | ||
604 | env->xregs[i] = env->regs[i]; | ||
605 | } | ||
606 | |||
607 | - /* Unless we are in FIQ mode, x8-x12 come from the user registers r8-r12. | ||
608 | + /* | ||
609 | + * Unless we are in FIQ mode, x8-x12 come from the user registers r8-r12. | ||
610 | * Otherwise, they come from the banked user regs. | ||
611 | */ | ||
612 | if (mode == ARM_CPU_MODE_FIQ) { | ||
613 | @@ -XXX,XX +XXX,XX @@ void aarch64_sync_32_to_64(CPUARMState *env) | ||
614 | } | ||
615 | } | ||
616 | |||
617 | - /* Registers x13-x23 are the various mode SP and FP registers. Registers | ||
618 | + /* | ||
619 | + * Registers x13-x23 are the various mode SP and FP registers. Registers | ||
620 | * r13 and r14 are only copied if we are in that mode, otherwise we copy | ||
621 | * from the mode banked register. | ||
622 | */ | ||
623 | @@ -XXX,XX +XXX,XX @@ void aarch64_sync_32_to_64(CPUARMState *env) | ||
624 | env->xregs[23] = env->banked_r13[bank_number(ARM_CPU_MODE_UND)]; | ||
625 | } | ||
626 | |||
627 | - /* Registers x24-x30 are mapped to r8-r14 in FIQ mode. If we are in FIQ | ||
628 | + /* | ||
629 | + * Registers x24-x30 are mapped to r8-r14 in FIQ mode. If we are in FIQ | ||
630 | * mode, then we can copy from r8-r14. Otherwise, we copy from the | ||
631 | * FIQ bank for r8-r14. | ||
632 | */ | ||
633 | @@ -XXX,XX +XXX,XX @@ void aarch64_sync_32_to_64(CPUARMState *env) | ||
634 | env->pc = env->regs[15]; | ||
635 | } | ||
636 | |||
637 | -/* Function used to synchronize QEMU's AArch32 register set with AArch64 | ||
638 | +/* | ||
639 | + * Function used to synchronize QEMU's AArch32 register set with AArch64 | ||
640 | * register set. This is necessary when switching between AArch32 and AArch64 | ||
641 | * execution state. | ||
642 | */ | ||
643 | @@ -XXX,XX +XXX,XX @@ void aarch64_sync_64_to_32(CPUARMState *env) | ||
644 | env->regs[i] = env->xregs[i]; | ||
645 | } | ||
646 | |||
647 | - /* Unless we are in FIQ mode, r8-r12 come from the user registers x8-x12. | ||
648 | + /* | ||
649 | + * Unless we are in FIQ mode, r8-r12 come from the user registers x8-x12. | ||
650 | * Otherwise, we copy x8-x12 into the banked user regs. | ||
651 | */ | ||
652 | if (mode == ARM_CPU_MODE_FIQ) { | ||
653 | @@ -XXX,XX +XXX,XX @@ void aarch64_sync_64_to_32(CPUARMState *env) | ||
654 | } | ||
655 | } | ||
656 | |||
657 | - /* Registers r13 & r14 depend on the current mode. | ||
658 | + /* | ||
659 | + * Registers r13 & r14 depend on the current mode. | ||
660 | * If we are in a given mode, we copy the corresponding x registers to r13 | ||
661 | * and r14. Otherwise, we copy the x register to the banked r13 and r14 | ||
662 | * for the mode. | ||
663 | @@ -XXX,XX +XXX,XX @@ void aarch64_sync_64_to_32(CPUARMState *env) | ||
664 | } else { | ||
665 | env->banked_r13[bank_number(ARM_CPU_MODE_USR)] = env->xregs[13]; | ||
666 | |||
667 | - /* HYP is an exception in that it does not have its own banked r14 but | ||
668 | + /* | ||
669 | + * HYP is an exception in that it does not have its own banked r14 but | ||
670 | * shares the USR r14 | ||
671 | */ | ||
672 | if (mode == ARM_CPU_MODE_HYP) { | ||
673 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(v7m_mrs)(CPUARMState *env, uint32_t reg) | ||
674 | return value; | ||
675 | } | ||
676 | case 0x94: /* CONTROL_NS */ | ||
677 | - /* We have to handle this here because unprivileged Secure code | ||
678 | + /* | ||
679 | + * We have to handle this here because unprivileged Secure code | ||
680 | * can read the NS CONTROL register. | ||
681 | */ | ||
682 | if (!env->v7m.secure) { | ||
683 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(v7m_mrs)(CPUARMState *env, uint32_t reg) | ||
684 | return env->v7m.faultmask[M_REG_NS]; | ||
685 | case 0x98: /* SP_NS */ | ||
686 | { | ||
687 | - /* This gives the non-secure SP selected based on whether we're | ||
688 | + /* | ||
689 | + * This gives the non-secure SP selected based on whether we're | ||
690 | * currently in handler mode or not, using the NS CONTROL.SPSEL. | ||
691 | */ | ||
692 | bool spsel = env->v7m.control[M_REG_NS] & R_V7M_CONTROL_SPSEL_MASK; | ||
693 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(v7m_mrs)(CPUARMState *env, uint32_t reg) | ||
694 | |||
695 | void HELPER(v7m_msr)(CPUARMState *env, uint32_t maskreg, uint32_t val) | ||
696 | { | ||
697 | - /* We're passed bits [11..0] of the instruction; extract | ||
698 | + /* | ||
699 | + * We're passed bits [11..0] of the instruction; extract | ||
700 | * SYSm and the mask bits. | ||
701 | * Invalid combinations of SYSm and mask are UNPREDICTABLE; | ||
702 | * we choose to treat them as if the mask bits were valid. | ||
703 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_msr)(CPUARMState *env, uint32_t maskreg, uint32_t val) | ||
704 | return; | ||
705 | case 0x98: /* SP_NS */ | ||
706 | { | ||
707 | - /* This gives the non-secure SP selected based on whether we're | ||
708 | + /* | ||
709 | + * This gives the non-secure SP selected based on whether we're | ||
710 | * currently in handler mode or not, using the NS CONTROL.SPSEL. | ||
711 | */ | ||
712 | bool spsel = env->v7m.control[M_REG_NS] & R_V7M_CONTROL_SPSEL_MASK; | ||
713 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(v7m_tt)(CPUARMState *env, uint32_t addr, uint32_t op) | ||
714 | bool targetsec = env->v7m.secure; | ||
715 | bool is_subpage; | ||
716 | |||
717 | - /* Work out what the security state and privilege level we're | ||
718 | + /* | ||
719 | + * Work out what the security state and privilege level we're | ||
720 | * interested in is... | ||
721 | */ | ||
722 | if (alt) { | ||
723 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(v7m_tt)(CPUARMState *env, uint32_t addr, uint32_t op) | ||
724 | /* ...and then figure out which MMU index this is */ | ||
725 | mmu_idx = arm_v7m_mmu_idx_for_secstate_and_priv(env, targetsec, targetpriv); | ||
726 | |||
727 | - /* We know that the MPU and SAU don't care about the access type | ||
728 | + /* | ||
729 | + * We know that the MPU and SAU don't care about the access type | ||
730 | * for our purposes beyond that we don't want to claim to be | ||
731 | * an insn fetch, so we arbitrarily call this a read. | ||
732 | */ | ||
733 | |||
734 | - /* MPU region info only available for privileged or if | ||
735 | + /* | ||
736 | + * MPU region info only available for privileged or if | ||
737 | * inspecting the other MPU state. | ||
738 | */ | ||
739 | if (arm_current_el(env) != 0 || alt) { | ||
740 | @@ -XXX,XX +XXX,XX @@ bool arm_cpu_tlb_fill(CPUState *cs, vaddr address, int size, | ||
741 | |||
742 | void HELPER(dc_zva)(CPUARMState *env, uint64_t vaddr_in) | ||
743 | { | ||
744 | - /* Implement DC ZVA, which zeroes a fixed-length block of memory. | ||
745 | + /* | ||
746 | + * Implement DC ZVA, which zeroes a fixed-length block of memory. | ||
747 | * Note that we do not implement the (architecturally mandated) | ||
748 | * alignment fault for attempts to use this on Device memory | ||
749 | * (which matches the usual QEMU behaviour of not implementing either | ||
750 | @@ -XXX,XX +XXX,XX @@ void HELPER(dc_zva)(CPUARMState *env, uint64_t vaddr_in) | ||
751 | |||
752 | #ifndef CONFIG_USER_ONLY | ||
753 | { | ||
754 | - /* Slightly awkwardly, QEMU's TARGET_PAGE_SIZE may be less than | ||
755 | + /* | ||
756 | + * Slightly awkwardly, QEMU's TARGET_PAGE_SIZE may be less than | ||
757 | * the block size so we might have to do more than one TLB lookup. | ||
758 | * We know that in fact for any v8 CPU the page size is at least 4K | ||
759 | * and the block size must be 2K or less, but TARGET_PAGE_SIZE is only | ||
760 | @@ -XXX,XX +XXX,XX @@ void HELPER(dc_zva)(CPUARMState *env, uint64_t vaddr_in) | ||
761 | } | ||
762 | } | ||
763 | if (i == maxidx) { | ||
764 | - /* If it's all in the TLB it's fair game for just writing to; | ||
765 | + /* | ||
766 | + * If it's all in the TLB it's fair game for just writing to; | ||
767 | * we know we don't need to update dirty status, etc. | ||
768 | */ | ||
769 | for (i = 0; i < maxidx - 1; i++) { | ||
770 | @@ -XXX,XX +XXX,XX @@ void HELPER(dc_zva)(CPUARMState *env, uint64_t vaddr_in) | ||
771 | memset(hostaddr[i], 0, blocklen - (i * TARGET_PAGE_SIZE)); | ||
772 | return; | ||
773 | } | ||
774 | - /* OK, try a store and see if we can populate the tlb. This | ||
775 | + /* | ||
776 | + * OK, try a store and see if we can populate the tlb. This | ||
777 | * might cause an exception if the memory isn't writable, | ||
778 | * in which case we will longjmp out of here. We must for | ||
779 | * this purpose use the actual register value passed to us | ||
780 | @@ -XXX,XX +XXX,XX @@ void HELPER(dc_zva)(CPUARMState *env, uint64_t vaddr_in) | ||
781 | } | ||
782 | } | ||
783 | |||
784 | - /* Slow path (probably attempt to do this to an I/O device or | ||
785 | + /* | ||
786 | + * Slow path (probably attempt to do this to an I/O device or | ||
787 | * similar, or clearing of a block of code we have translations | ||
788 | * cached for). Just do a series of byte writes as the architecture | ||
789 | * demands. It's not worth trying to use a cpu_physical_memory_map(), | ||
790 | diff --git a/target/arm/op_helper.c b/target/arm/op_helper.c | ||
791 | index XXXXXXX..XXXXXXX 100644 | ||
792 | --- a/target/arm/op_helper.c | ||
793 | +++ b/target/arm/op_helper.c | ||
794 | @@ -XXX,XX +XXX,XX @@ static inline uint32_t merge_syn_data_abort(uint32_t template_syn, | ||
795 | { | ||
796 | uint32_t syn; | ||
797 | |||
798 | - /* ISV is only set for data aborts routed to EL2 and | ||
799 | + /* | ||
800 | + * ISV is only set for data aborts routed to EL2 and | ||
801 | * never for stage-1 page table walks faulting on stage 2. | ||
802 | * | ||
803 | * Furthermore, ISV is only set for certain kinds of load/stores. | ||
804 | @@ -XXX,XX +XXX,XX @@ static inline uint32_t merge_syn_data_abort(uint32_t template_syn, | ||
805 | syn = syn_data_abort_no_iss(same_el, | ||
806 | ea, 0, s1ptw, is_write, fsc); | ||
807 | } else { | ||
808 | - /* Fields: IL, ISV, SAS, SSE, SRT, SF and AR come from the template | ||
809 | + /* | ||
810 | + * Fields: IL, ISV, SAS, SSE, SRT, SF and AR come from the template | ||
811 | * syndrome created at translation time. | ||
812 | * Now we create the runtime syndrome with the remaining fields. | ||
813 | */ | ||
814 | @@ -XXX,XX +XXX,XX @@ void arm_deliver_fault(ARMCPU *cpu, vaddr addr, MMUAccessType access_type, | ||
815 | |||
816 | if (target_el == 2 || arm_el_is_aa64(env, target_el) || | ||
817 | arm_s1_regime_using_lpae_format(env, arm_mmu_idx)) { | ||
818 | - /* LPAE format fault status register : bottom 6 bits are | ||
819 | + /* | ||
820 | + * LPAE format fault status register : bottom 6 bits are | ||
821 | * status code in the same form as needed for syndrome | ||
822 | */ | ||
823 | fsr = arm_fi_to_lfsc(fi); | ||
824 | fsc = extract32(fsr, 0, 6); | ||
825 | } else { | ||
826 | fsr = arm_fi_to_sfsc(fi); | ||
827 | - /* Short format FSR : this fault will never actually be reported | ||
828 | + /* | ||
829 | + * Short format FSR : this fault will never actually be reported | ||
830 | * to an EL that uses a syndrome register. Use a (currently) | ||
831 | * reserved FSR code in case the constructed syndrome does leak | ||
832 | * into the guest somehow. | ||
833 | @@ -XXX,XX +XXX,XX @@ void arm_cpu_do_unaligned_access(CPUState *cs, vaddr vaddr, | ||
834 | arm_deliver_fault(cpu, vaddr, access_type, mmu_idx, &fi); | ||
835 | } | ||
836 | |||
837 | -/* arm_cpu_do_transaction_failed: handle a memory system error response | ||
838 | +/* | ||
839 | + * arm_cpu_do_transaction_failed: handle a memory system error response | ||
840 | * (eg "no device/memory present at address") by raising an external abort | ||
841 | * exception | ||
842 | */ | ||
843 | @@ -XXX,XX +XXX,XX @@ static bool linked_bp_matches(ARMCPU *cpu, int lbn) | ||
844 | int bt; | ||
845 | uint32_t contextidr; | ||
846 | |||
847 | - /* Links to unimplemented or non-context aware breakpoints are | ||
848 | + /* | ||
849 | + * Links to unimplemented or non-context aware breakpoints are | ||
850 | * CONSTRAINED UNPREDICTABLE: either behave as if disabled, or | ||
851 | * as if linked to an UNKNOWN context-aware breakpoint (in which | ||
852 | * case DBGWCR<n>_EL1.LBN must indicate that breakpoint). | ||
853 | @@ -XXX,XX +XXX,XX @@ static bool linked_bp_matches(ARMCPU *cpu, int lbn) | ||
854 | |||
855 | bt = extract64(bcr, 20, 4); | ||
856 | |||
857 | - /* We match the whole register even if this is AArch32 using the | ||
858 | + /* | ||
859 | + * We match the whole register even if this is AArch32 using the | ||
860 | * short descriptor format (in which case it holds both PROCID and ASID), | ||
861 | * since we don't implement the optional v7 context ID masking. | ||
862 | */ | ||
863 | @@ -XXX,XX +XXX,XX @@ static bool linked_bp_matches(ARMCPU *cpu, int lbn) | ||
864 | case 9: /* linked VMID match (reserved if no EL2) */ | ||
865 | case 11: /* linked context ID and VMID match (reserved if no EL2) */ | ||
866 | default: | ||
867 | - /* Links to Unlinked context breakpoints must generate no | ||
868 | + /* | ||
869 | + * Links to Unlinked context breakpoints must generate no | ||
870 | * events; we choose to do the same for reserved values too. | ||
871 | */ | ||
872 | return false; | ||
873 | @@ -XXX,XX +XXX,XX @@ static bool bp_wp_matches(ARMCPU *cpu, int n, bool is_wp) | ||
874 | CPUARMState *env = &cpu->env; | ||
875 | uint64_t cr; | ||
876 | int pac, hmc, ssc, wt, lbn; | ||
877 | - /* Note that for watchpoints the check is against the CPU security | ||
878 | + /* | ||
879 | + * Note that for watchpoints the check is against the CPU security | ||
880 | * state, not the S/NS attribute on the offending data access. | ||
881 | */ | ||
882 | bool is_secure = arm_is_secure(env); | ||
883 | @@ -XXX,XX +XXX,XX @@ static bool bp_wp_matches(ARMCPU *cpu, int n, bool is_wp) | ||
884 | } | ||
885 | cr = env->cp15.dbgwcr[n]; | ||
886 | if (wp->hitattrs.user) { | ||
887 | - /* The LDRT/STRT/LDT/STT "unprivileged access" instructions should | ||
888 | + /* | ||
889 | + * The LDRT/STRT/LDT/STT "unprivileged access" instructions should | ||
890 | * match watchpoints as if they were accesses done at EL0, even if | ||
891 | * the CPU is at EL1 or higher. | ||
892 | */ | ||
893 | @@ -XXX,XX +XXX,XX @@ static bool bp_wp_matches(ARMCPU *cpu, int n, bool is_wp) | ||
894 | } | ||
895 | cr = env->cp15.dbgbcr[n]; | ||
896 | } | ||
897 | - /* The WATCHPOINT_HIT flag guarantees us that the watchpoint is | ||
898 | + /* | ||
899 | + * The WATCHPOINT_HIT flag guarantees us that the watchpoint is | ||
900 | * enabled and that the address and access type match; for breakpoints | ||
901 | * we know the address matched; check the remaining fields, including | ||
902 | * linked breakpoints. We rely on WCR and BCR having the same layout | ||
903 | @@ -XXX,XX +XXX,XX @@ static bool check_watchpoints(ARMCPU *cpu) | ||
904 | CPUARMState *env = &cpu->env; | ||
905 | int n; | ||
906 | |||
907 | - /* If watchpoints are disabled globally or we can't take debug | ||
908 | + /* | ||
909 | + * If watchpoints are disabled globally or we can't take debug | ||
910 | * exceptions here then watchpoint firings are ignored. | ||
911 | */ | ||
912 | if (extract32(env->cp15.mdscr_el1, 15, 1) == 0 | ||
913 | @@ -XXX,XX +XXX,XX @@ static bool check_breakpoints(ARMCPU *cpu) | ||
914 | CPUARMState *env = &cpu->env; | ||
915 | int n; | ||
916 | |||
917 | - /* If breakpoints are disabled globally or we can't take debug | ||
918 | + /* | ||
919 | + * If breakpoints are disabled globally or we can't take debug | ||
920 | * exceptions here then breakpoint firings are ignored. | ||
921 | */ | ||
922 | if (extract32(env->cp15.mdscr_el1, 15, 1) == 0 | ||
923 | @@ -XXX,XX +XXX,XX @@ void HELPER(check_breakpoints)(CPUARMState *env) | ||
924 | |||
925 | bool arm_debug_check_watchpoint(CPUState *cs, CPUWatchpoint *wp) | ||
926 | { | ||
927 | - /* Called by core code when a CPU watchpoint fires; need to check if this | ||
928 | + /* | ||
929 | + * Called by core code when a CPU watchpoint fires; need to check if this | ||
930 | * is also an architectural watchpoint match. | ||
931 | */ | ||
932 | ARMCPU *cpu = ARM_CPU(cs); | ||
933 | @@ -XXX,XX +XXX,XX @@ vaddr arm_adjust_watchpoint_address(CPUState *cs, vaddr addr, int len) | ||
934 | ARMCPU *cpu = ARM_CPU(cs); | ||
935 | CPUARMState *env = &cpu->env; | ||
936 | |||
937 | - /* In BE32 system mode, target memory is stored byteswapped (on a | ||
938 | + /* | ||
939 | + * In BE32 system mode, target memory is stored byteswapped (on a | ||
940 | * little-endian host system), and by the time we reach here (via an | ||
941 | * opcode helper) the addresses of subword accesses have been adjusted | ||
942 | * to account for that, which means that watchpoints will not match. | ||
943 | @@ -XXX,XX +XXX,XX @@ vaddr arm_adjust_watchpoint_address(CPUState *cs, vaddr addr, int len) | ||
944 | |||
945 | void arm_debug_excp_handler(CPUState *cs) | ||
946 | { | ||
947 | - /* Called by core code when a watchpoint or breakpoint fires; | ||
948 | + /* | ||
949 | + * Called by core code when a watchpoint or breakpoint fires; | ||
950 | * need to check which one and raise the appropriate exception. | ||
951 | */ | ||
952 | ARMCPU *cpu = ARM_CPU(cs); | ||
953 | @@ -XXX,XX +XXX,XX @@ void arm_debug_excp_handler(CPUState *cs) | ||
954 | uint64_t pc = is_a64(env) ? env->pc : env->regs[15]; | ||
955 | bool same_el = (arm_debug_target_el(env) == arm_current_el(env)); | ||
956 | |||
957 | - /* (1) GDB breakpoints should be handled first. | ||
958 | + /* | ||
959 | + * (1) GDB breakpoints should be handled first. | ||
960 | * (2) Do not raise a CPU exception if no CPU breakpoint has fired, | ||
961 | * since singlestep is also done by generating a debug internal | ||
962 | * exception. | ||
963 | @@ -XXX,XX +XXX,XX @@ void arm_debug_excp_handler(CPUState *cs) | ||
964 | } | ||
965 | |||
966 | env->exception.fsr = arm_debug_exception_fsr(env); | ||
967 | - /* FAR is UNKNOWN: clear vaddress to avoid potentially exposing | ||
968 | + /* | ||
969 | + * FAR is UNKNOWN: clear vaddress to avoid potentially exposing | ||
970 | * values to the guest that it shouldn't be able to see at its | ||
971 | * exception/security level. | ||
972 | */ | ||
973 | diff --git a/target/arm/vfp_helper.c b/target/arm/vfp_helper.c | ||
974 | index XXXXXXX..XXXXXXX 100644 | ||
975 | --- a/target/arm/vfp_helper.c | ||
976 | +++ b/target/arm/vfp_helper.c | ||
977 | @@ -XXX,XX +XXX,XX @@ void HELPER(vfp_set_fpscr)(CPUARMState *env, uint32_t val) | ||
978 | set_default_nan_mode(dnan_enabled, &env->vfp.fp_status_f16); | ||
979 | } | ||
980 | |||
981 | - /* The exception flags are ORed together when we read fpscr so we | ||
982 | + /* | ||
983 | + * The exception flags are ORed together when we read fpscr so we | ||
984 | * only need to preserve the current state in one of our | ||
985 | * float_status values. | ||
986 | */ | ||
30 | -- | 987 | -- |
31 | 2.19.0 | 988 | 2.20.1 |
32 | 989 | ||
33 | 990 | diff view generated by jsdifflib |
1 | From: "Edgar E. Iglesias" <edgar.iglesias@xilinx.com> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | When QEMU provides the equivalent of the EL3 firmware, we | 3 | Since we'll move this code around, fix its style first. |
4 | need to enable HVCs in scr_el3 when turning on CPUs that | ||
5 | target EL2. | ||
6 | 4 | ||
7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> |
8 | Signed-off-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | 6 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
9 | Message-id: 20181011021931.4249-10-edgar.iglesias@gmail.com | 7 | Message-id: 20190701132516.26392-9-philmd@redhat.com |
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 9 | --- |
12 | target/arm/arm-powerctl.c | 10 ++++++++++ | 10 | target/arm/translate.c | 11 ++++++----- |
13 | 1 file changed, 10 insertions(+) | 11 | target/arm/vfp_helper.c | 36 ++++++++++++++++++++++++------------ |
12 | 2 files changed, 30 insertions(+), 17 deletions(-) | ||
14 | 13 | ||
15 | diff --git a/target/arm/arm-powerctl.c b/target/arm/arm-powerctl.c | 14 | diff --git a/target/arm/translate.c b/target/arm/translate.c |
16 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/target/arm/arm-powerctl.c | 16 | --- a/target/arm/translate.c |
18 | +++ b/target/arm/arm-powerctl.c | 17 | +++ b/target/arm/translate.c |
19 | @@ -XXX,XX +XXX,XX @@ static void arm_set_cpu_on_async_work(CPUState *target_cpu_state, | 18 | @@ -XXX,XX +XXX,XX @@ static void disas_arm_insn(DisasContext *s, unsigned int insn) |
20 | } else { | 19 | loaded_base = 0; |
21 | /* Processor is not in secure mode */ | 20 | loaded_var = NULL; |
22 | target_cpu->env.cp15.scr_el3 |= SCR_NS; | 21 | n = 0; |
23 | + | 22 | - for(i=0;i<16;i++) { |
24 | + /* | 23 | + for (i = 0; i < 16; i++) { |
25 | + * If QEMU is providing the equivalent of EL3 firmware, then we need | 24 | if (insn & (1 << i)) |
26 | + * to make sure a CPU targeting EL2 comes out of reset with a | 25 | n++; |
27 | + * functional HVC insn. | 26 | } |
28 | + */ | 27 | @@ -XXX,XX +XXX,XX @@ static void disas_arm_insn(DisasContext *s, unsigned int insn) |
29 | + if (arm_feature(&target_cpu->env, ARM_FEATURE_EL3) | 28 | } |
30 | + && info->target_el == 2) { | 29 | } |
31 | + target_cpu->env.cp15.scr_el3 |= SCR_HCE; | 30 | j = 0; |
31 | - for(i=0;i<16;i++) { | ||
32 | + for (i = 0; i < 16; i++) { | ||
33 | if (insn & (1 << i)) { | ||
34 | if (is_load) { | ||
35 | /* load */ | ||
36 | @@ -XXX,XX +XXX,XX @@ void arm_cpu_dump_state(CPUState *cs, FILE *f, int flags) | ||
37 | return; | ||
38 | } | ||
39 | |||
40 | - for(i=0;i<16;i++) { | ||
41 | + for (i = 0; i < 16; i++) { | ||
42 | qemu_fprintf(f, "R%02d=%08x", i, env->regs[i]); | ||
43 | - if ((i % 4) == 3) | ||
44 | + if ((i % 4) == 3) { | ||
45 | qemu_fprintf(f, "\n"); | ||
46 | - else | ||
47 | + } else { | ||
48 | qemu_fprintf(f, " "); | ||
32 | + } | 49 | + } |
33 | } | 50 | } |
34 | 51 | ||
35 | /* We check if the started CPU is now at the correct level */ | 52 | if (arm_feature(env, ARM_FEATURE_M)) { |
53 | diff --git a/target/arm/vfp_helper.c b/target/arm/vfp_helper.c | ||
54 | index XXXXXXX..XXXXXXX 100644 | ||
55 | --- a/target/arm/vfp_helper.c | ||
56 | +++ b/target/arm/vfp_helper.c | ||
57 | @@ -XXX,XX +XXX,XX @@ static inline int vfp_exceptbits_from_host(int host_bits) | ||
58 | { | ||
59 | int target_bits = 0; | ||
60 | |||
61 | - if (host_bits & float_flag_invalid) | ||
62 | + if (host_bits & float_flag_invalid) { | ||
63 | target_bits |= 1; | ||
64 | - if (host_bits & float_flag_divbyzero) | ||
65 | + } | ||
66 | + if (host_bits & float_flag_divbyzero) { | ||
67 | target_bits |= 2; | ||
68 | - if (host_bits & float_flag_overflow) | ||
69 | + } | ||
70 | + if (host_bits & float_flag_overflow) { | ||
71 | target_bits |= 4; | ||
72 | - if (host_bits & (float_flag_underflow | float_flag_output_denormal)) | ||
73 | + } | ||
74 | + if (host_bits & (float_flag_underflow | float_flag_output_denormal)) { | ||
75 | target_bits |= 8; | ||
76 | - if (host_bits & float_flag_inexact) | ||
77 | + } | ||
78 | + if (host_bits & float_flag_inexact) { | ||
79 | target_bits |= 0x10; | ||
80 | - if (host_bits & float_flag_input_denormal) | ||
81 | + } | ||
82 | + if (host_bits & float_flag_input_denormal) { | ||
83 | target_bits |= 0x80; | ||
84 | + } | ||
85 | return target_bits; | ||
86 | } | ||
87 | |||
88 | @@ -XXX,XX +XXX,XX @@ static inline int vfp_exceptbits_to_host(int target_bits) | ||
89 | { | ||
90 | int host_bits = 0; | ||
91 | |||
92 | - if (target_bits & 1) | ||
93 | + if (target_bits & 1) { | ||
94 | host_bits |= float_flag_invalid; | ||
95 | - if (target_bits & 2) | ||
96 | + } | ||
97 | + if (target_bits & 2) { | ||
98 | host_bits |= float_flag_divbyzero; | ||
99 | - if (target_bits & 4) | ||
100 | + } | ||
101 | + if (target_bits & 4) { | ||
102 | host_bits |= float_flag_overflow; | ||
103 | - if (target_bits & 8) | ||
104 | + } | ||
105 | + if (target_bits & 8) { | ||
106 | host_bits |= float_flag_underflow; | ||
107 | - if (target_bits & 0x10) | ||
108 | + } | ||
109 | + if (target_bits & 0x10) { | ||
110 | host_bits |= float_flag_inexact; | ||
111 | - if (target_bits & 0x80) | ||
112 | + } | ||
113 | + if (target_bits & 0x80) { | ||
114 | host_bits |= float_flag_input_denormal; | ||
115 | + } | ||
116 | return host_bits; | ||
117 | } | ||
118 | |||
36 | -- | 119 | -- |
37 | 2.19.0 | 120 | 2.20.1 |
38 | 121 | ||
39 | 122 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Samuel Ortiz <sameo@linux.intel.com> |
---|---|---|---|
2 | 2 | ||
3 | At present we assert: | 3 | Those helpers are a software implementation of the ARM v8 memory zeroing |
4 | 4 | op code. They should be moved to the op helper file, which is going to | |
5 | arm_el_is_aa64: Assertion `el >= 1 && el <= 3' failed. | 5 | eventually be built only when TCG is enabled. |
6 | 6 | ||
7 | The comment in arm_el_is_aa64 explains why asking about EL0 without | 7 | Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
8 | extra information is impossible. Add an extra argument to provide | 8 | Reviewed-by: Robert Bradford <robert.bradford@intel.com> |
9 | it from the surrounding context. | 9 | Signed-off-by: Samuel Ortiz <sameo@linux.intel.com> |
10 | 10 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | |
11 | Fixes: 0ab5953b00b3 | 11 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
12 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 12 | Message-id: 20190701132516.26392-10-philmd@redhat.com |
13 | Message-id: 20181008212205.17752-2-richard.henderson@linaro.org | 13 | [PMD: Rebased] |
14 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
14 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 15 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
15 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
16 | --- | 17 | --- |
17 | target/arm/cpu.h | 7 +++++-- | 18 | target/arm/helper.c | 92 ----------------------------------------- |
18 | target/arm/helper.c | 16 ++++++++++++---- | 19 | target/arm/op_helper.c | 93 ++++++++++++++++++++++++++++++++++++++++++ |
19 | target/arm/op_helper.c | 6 +++++- | 20 | 2 files changed, 93 insertions(+), 92 deletions(-) |
20 | 3 files changed, 22 insertions(+), 7 deletions(-) | 21 | |
21 | |||
22 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
23 | index XXXXXXX..XXXXXXX 100644 | ||
24 | --- a/target/arm/cpu.h | ||
25 | +++ b/target/arm/cpu.h | ||
26 | @@ -XXX,XX +XXX,XX @@ int arm_cpu_write_elf32_note(WriteCoreDumpFunction f, CPUState *cs, | ||
27 | int aarch64_cpu_gdb_read_register(CPUState *cpu, uint8_t *buf, int reg); | ||
28 | int aarch64_cpu_gdb_write_register(CPUState *cpu, uint8_t *buf, int reg); | ||
29 | void aarch64_sve_narrow_vq(CPUARMState *env, unsigned vq); | ||
30 | -void aarch64_sve_change_el(CPUARMState *env, int old_el, int new_el); | ||
31 | +void aarch64_sve_change_el(CPUARMState *env, int old_el, | ||
32 | + int new_el, bool el0_a64); | ||
33 | #else | ||
34 | static inline void aarch64_sve_narrow_vq(CPUARMState *env, unsigned vq) { } | ||
35 | -static inline void aarch64_sve_change_el(CPUARMState *env, int o, int n) { } | ||
36 | +static inline void aarch64_sve_change_el(CPUARMState *env, int o, | ||
37 | + int n, bool a) | ||
38 | +{ } | ||
39 | #endif | ||
40 | |||
41 | target_ulong do_arm_semihosting(CPUARMState *env); | ||
42 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 22 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
43 | index XXXXXXX..XXXXXXX 100644 | 23 | index XXXXXXX..XXXXXXX 100644 |
44 | --- a/target/arm/helper.c | 24 | --- a/target/arm/helper.c |
45 | +++ b/target/arm/helper.c | 25 | +++ b/target/arm/helper.c |
46 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_do_interrupt_aarch64(CPUState *cs) | 26 | @@ -XXX,XX +XXX,XX @@ bool arm_cpu_tlb_fill(CPUState *cs, vaddr address, int size, |
47 | unsigned int new_mode = aarch64_pstate_mode(new_el, true); | 27 | #endif |
48 | unsigned int cur_el = arm_current_el(env); | 28 | } |
49 | 29 | ||
50 | - aarch64_sve_change_el(env, cur_el, new_el); | 30 | -void HELPER(dc_zva)(CPUARMState *env, uint64_t vaddr_in) |
51 | + /* | 31 | -{ |
52 | + * Note that new_el can never be 0. If cur_el is 0, then | 32 | - /* |
53 | + * el0_a64 is is_a64(), else el0_a64 is ignored. | 33 | - * Implement DC ZVA, which zeroes a fixed-length block of memory. |
54 | + */ | 34 | - * Note that we do not implement the (architecturally mandated) |
55 | + aarch64_sve_change_el(env, cur_el, new_el, is_a64(env)); | 35 | - * alignment fault for attempts to use this on Device memory |
56 | 36 | - * (which matches the usual QEMU behaviour of not implementing either | |
57 | if (cur_el < new_el) { | 37 | - * alignment faults or any memory attribute handling). |
58 | /* Entry vector offset depends on whether the implemented EL | 38 | - */ |
59 | @@ -XXX,XX +XXX,XX @@ void aarch64_sve_narrow_vq(CPUARMState *env, unsigned vq) | 39 | - |
60 | /* | 40 | - ARMCPU *cpu = env_archcpu(env); |
61 | * Notice a change in SVE vector size when changing EL. | 41 | - uint64_t blocklen = 4 << cpu->dcz_blocksize; |
62 | */ | 42 | - uint64_t vaddr = vaddr_in & ~(blocklen - 1); |
63 | -void aarch64_sve_change_el(CPUARMState *env, int old_el, int new_el) | 43 | - |
64 | +void aarch64_sve_change_el(CPUARMState *env, int old_el, | 44 | -#ifndef CONFIG_USER_ONLY |
65 | + int new_el, bool el0_a64) | 45 | - { |
66 | { | 46 | - /* |
67 | int old_len, new_len; | 47 | - * Slightly awkwardly, QEMU's TARGET_PAGE_SIZE may be less than |
68 | + bool old_a64, new_a64; | 48 | - * the block size so we might have to do more than one TLB lookup. |
69 | 49 | - * We know that in fact for any v8 CPU the page size is at least 4K | |
70 | /* Nothing to do if no SVE. */ | 50 | - * and the block size must be 2K or less, but TARGET_PAGE_SIZE is only |
71 | if (!arm_feature(env, ARM_FEATURE_SVE)) { | 51 | - * 1K as an artefact of legacy v5 subpage support being present in the |
72 | @@ -XXX,XX +XXX,XX @@ void aarch64_sve_change_el(CPUARMState *env, int old_el, int new_el) | 52 | - * same QEMU executable. So in practice the hostaddr[] array has |
73 | * we already have the correct register contents when encountering the | 53 | - * two entries, given the current setting of TARGET_PAGE_BITS_MIN. |
74 | * vq0->vq0 transition between EL0->EL1. | 54 | - */ |
75 | */ | 55 | - int maxidx = DIV_ROUND_UP(blocklen, TARGET_PAGE_SIZE); |
76 | - old_len = (arm_el_is_aa64(env, old_el) && !sve_exception_el(env, old_el) | 56 | - void *hostaddr[DIV_ROUND_UP(2 * KiB, 1 << TARGET_PAGE_BITS_MIN)]; |
77 | + old_a64 = old_el ? arm_el_is_aa64(env, old_el) : el0_a64; | 57 | - int try, i; |
78 | + old_len = (old_a64 && !sve_exception_el(env, old_el) | 58 | - unsigned mmu_idx = cpu_mmu_index(env, false); |
79 | ? sve_zcr_len_for_el(env, old_el) : 0); | 59 | - TCGMemOpIdx oi = make_memop_idx(MO_UB, mmu_idx); |
80 | - new_len = (arm_el_is_aa64(env, new_el) && !sve_exception_el(env, new_el) | 60 | - |
81 | + new_a64 = new_el ? arm_el_is_aa64(env, new_el) : el0_a64; | 61 | - assert(maxidx <= ARRAY_SIZE(hostaddr)); |
82 | + new_len = (new_a64 && !sve_exception_el(env, new_el) | 62 | - |
83 | ? sve_zcr_len_for_el(env, new_el) : 0); | 63 | - for (try = 0; try < 2; try++) { |
84 | 64 | - | |
85 | /* When changing vector length, clear inaccessible state. */ | 65 | - for (i = 0; i < maxidx; i++) { |
66 | - hostaddr[i] = tlb_vaddr_to_host(env, | ||
67 | - vaddr + TARGET_PAGE_SIZE * i, | ||
68 | - 1, mmu_idx); | ||
69 | - if (!hostaddr[i]) { | ||
70 | - break; | ||
71 | - } | ||
72 | - } | ||
73 | - if (i == maxidx) { | ||
74 | - /* | ||
75 | - * If it's all in the TLB it's fair game for just writing to; | ||
76 | - * we know we don't need to update dirty status, etc. | ||
77 | - */ | ||
78 | - for (i = 0; i < maxidx - 1; i++) { | ||
79 | - memset(hostaddr[i], 0, TARGET_PAGE_SIZE); | ||
80 | - } | ||
81 | - memset(hostaddr[i], 0, blocklen - (i * TARGET_PAGE_SIZE)); | ||
82 | - return; | ||
83 | - } | ||
84 | - /* | ||
85 | - * OK, try a store and see if we can populate the tlb. This | ||
86 | - * might cause an exception if the memory isn't writable, | ||
87 | - * in which case we will longjmp out of here. We must for | ||
88 | - * this purpose use the actual register value passed to us | ||
89 | - * so that we get the fault address right. | ||
90 | - */ | ||
91 | - helper_ret_stb_mmu(env, vaddr_in, 0, oi, GETPC()); | ||
92 | - /* Now we can populate the other TLB entries, if any */ | ||
93 | - for (i = 0; i < maxidx; i++) { | ||
94 | - uint64_t va = vaddr + TARGET_PAGE_SIZE * i; | ||
95 | - if (va != (vaddr_in & TARGET_PAGE_MASK)) { | ||
96 | - helper_ret_stb_mmu(env, va, 0, oi, GETPC()); | ||
97 | - } | ||
98 | - } | ||
99 | - } | ||
100 | - | ||
101 | - /* | ||
102 | - * Slow path (probably attempt to do this to an I/O device or | ||
103 | - * similar, or clearing of a block of code we have translations | ||
104 | - * cached for). Just do a series of byte writes as the architecture | ||
105 | - * demands. It's not worth trying to use a cpu_physical_memory_map(), | ||
106 | - * memset(), unmap() sequence here because: | ||
107 | - * + we'd need to account for the blocksize being larger than a page | ||
108 | - * + the direct-RAM access case is almost always going to be dealt | ||
109 | - * with in the fastpath code above, so there's no speed benefit | ||
110 | - * + we would have to deal with the map returning NULL because the | ||
111 | - * bounce buffer was in use | ||
112 | - */ | ||
113 | - for (i = 0; i < blocklen; i++) { | ||
114 | - helper_ret_stb_mmu(env, vaddr + i, 0, oi, GETPC()); | ||
115 | - } | ||
116 | - } | ||
117 | -#else | ||
118 | - memset(g2h(vaddr), 0, blocklen); | ||
119 | -#endif | ||
120 | -} | ||
121 | - | ||
122 | /* Note that signed overflow is undefined in C. The following routines are | ||
123 | careful to use unsigned types where modulo arithmetic is required. | ||
124 | Failure to do so _will_ break on newer gcc. */ | ||
86 | diff --git a/target/arm/op_helper.c b/target/arm/op_helper.c | 125 | diff --git a/target/arm/op_helper.c b/target/arm/op_helper.c |
87 | index XXXXXXX..XXXXXXX 100644 | 126 | index XXXXXXX..XXXXXXX 100644 |
88 | --- a/target/arm/op_helper.c | 127 | --- a/target/arm/op_helper.c |
89 | +++ b/target/arm/op_helper.c | 128 | +++ b/target/arm/op_helper.c |
90 | @@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env) | 129 | @@ -XXX,XX +XXX,XX @@ |
91 | "AArch64 EL%d PC 0x%" PRIx64 "\n", | 130 | * License along with this library; if not, see <http://www.gnu.org/licenses/>. |
92 | cur_el, new_el, env->pc); | 131 | */ |
132 | #include "qemu/osdep.h" | ||
133 | +#include "qemu/units.h" | ||
134 | #include "qemu/log.h" | ||
135 | #include "qemu/main-loop.h" | ||
136 | #include "cpu.h" | ||
137 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(ror_cc)(CPUARMState *env, uint32_t x, uint32_t i) | ||
138 | return ((uint32_t)x >> shift) | (x << (32 - shift)); | ||
93 | } | 139 | } |
94 | - aarch64_sve_change_el(env, cur_el, new_el); | 140 | } |
141 | + | ||
142 | +void HELPER(dc_zva)(CPUARMState *env, uint64_t vaddr_in) | ||
143 | +{ | ||
95 | + /* | 144 | + /* |
96 | + * Note that cur_el can never be 0. If new_el is 0, then | 145 | + * Implement DC ZVA, which zeroes a fixed-length block of memory. |
97 | + * el0_a64 is return_to_aa64, else el0_a64 is ignored. | 146 | + * Note that we do not implement the (architecturally mandated) |
147 | + * alignment fault for attempts to use this on Device memory | ||
148 | + * (which matches the usual QEMU behaviour of not implementing either | ||
149 | + * alignment faults or any memory attribute handling). | ||
98 | + */ | 150 | + */ |
99 | + aarch64_sve_change_el(env, cur_el, new_el, return_to_aa64); | 151 | + |
100 | 152 | + ARMCPU *cpu = env_archcpu(env); | |
101 | qemu_mutex_lock_iothread(); | 153 | + uint64_t blocklen = 4 << cpu->dcz_blocksize; |
102 | arm_call_el_change_hook(arm_env_get_cpu(env)); | 154 | + uint64_t vaddr = vaddr_in & ~(blocklen - 1); |
155 | + | ||
156 | +#ifndef CONFIG_USER_ONLY | ||
157 | + { | ||
158 | + /* | ||
159 | + * Slightly awkwardly, QEMU's TARGET_PAGE_SIZE may be less than | ||
160 | + * the block size so we might have to do more than one TLB lookup. | ||
161 | + * We know that in fact for any v8 CPU the page size is at least 4K | ||
162 | + * and the block size must be 2K or less, but TARGET_PAGE_SIZE is only | ||
163 | + * 1K as an artefact of legacy v5 subpage support being present in the | ||
164 | + * same QEMU executable. So in practice the hostaddr[] array has | ||
165 | + * two entries, given the current setting of TARGET_PAGE_BITS_MIN. | ||
166 | + */ | ||
167 | + int maxidx = DIV_ROUND_UP(blocklen, TARGET_PAGE_SIZE); | ||
168 | + void *hostaddr[DIV_ROUND_UP(2 * KiB, 1 << TARGET_PAGE_BITS_MIN)]; | ||
169 | + int try, i; | ||
170 | + unsigned mmu_idx = cpu_mmu_index(env, false); | ||
171 | + TCGMemOpIdx oi = make_memop_idx(MO_UB, mmu_idx); | ||
172 | + | ||
173 | + assert(maxidx <= ARRAY_SIZE(hostaddr)); | ||
174 | + | ||
175 | + for (try = 0; try < 2; try++) { | ||
176 | + | ||
177 | + for (i = 0; i < maxidx; i++) { | ||
178 | + hostaddr[i] = tlb_vaddr_to_host(env, | ||
179 | + vaddr + TARGET_PAGE_SIZE * i, | ||
180 | + 1, mmu_idx); | ||
181 | + if (!hostaddr[i]) { | ||
182 | + break; | ||
183 | + } | ||
184 | + } | ||
185 | + if (i == maxidx) { | ||
186 | + /* | ||
187 | + * If it's all in the TLB it's fair game for just writing to; | ||
188 | + * we know we don't need to update dirty status, etc. | ||
189 | + */ | ||
190 | + for (i = 0; i < maxidx - 1; i++) { | ||
191 | + memset(hostaddr[i], 0, TARGET_PAGE_SIZE); | ||
192 | + } | ||
193 | + memset(hostaddr[i], 0, blocklen - (i * TARGET_PAGE_SIZE)); | ||
194 | + return; | ||
195 | + } | ||
196 | + /* | ||
197 | + * OK, try a store and see if we can populate the tlb. This | ||
198 | + * might cause an exception if the memory isn't writable, | ||
199 | + * in which case we will longjmp out of here. We must for | ||
200 | + * this purpose use the actual register value passed to us | ||
201 | + * so that we get the fault address right. | ||
202 | + */ | ||
203 | + helper_ret_stb_mmu(env, vaddr_in, 0, oi, GETPC()); | ||
204 | + /* Now we can populate the other TLB entries, if any */ | ||
205 | + for (i = 0; i < maxidx; i++) { | ||
206 | + uint64_t va = vaddr + TARGET_PAGE_SIZE * i; | ||
207 | + if (va != (vaddr_in & TARGET_PAGE_MASK)) { | ||
208 | + helper_ret_stb_mmu(env, va, 0, oi, GETPC()); | ||
209 | + } | ||
210 | + } | ||
211 | + } | ||
212 | + | ||
213 | + /* | ||
214 | + * Slow path (probably attempt to do this to an I/O device or | ||
215 | + * similar, or clearing of a block of code we have translations | ||
216 | + * cached for). Just do a series of byte writes as the architecture | ||
217 | + * demands. It's not worth trying to use a cpu_physical_memory_map(), | ||
218 | + * memset(), unmap() sequence here because: | ||
219 | + * + we'd need to account for the blocksize being larger than a page | ||
220 | + * + the direct-RAM access case is almost always going to be dealt | ||
221 | + * with in the fastpath code above, so there's no speed benefit | ||
222 | + * + we would have to deal with the map returning NULL because the | ||
223 | + * bounce buffer was in use | ||
224 | + */ | ||
225 | + for (i = 0; i < blocklen; i++) { | ||
226 | + helper_ret_stb_mmu(env, vaddr + i, 0, oi, GETPC()); | ||
227 | + } | ||
228 | + } | ||
229 | +#else | ||
230 | + memset(g2h(vaddr), 0, blocklen); | ||
231 | +#endif | ||
232 | +} | ||
103 | -- | 233 | -- |
104 | 2.19.0 | 234 | 2.20.1 |
105 | 235 | ||
106 | 236 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> | 3 | Suggested-by: Samuel Ortiz <sameo@linux.intel.com> |
4 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 4 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
5 | Message-id: 20181008212205.17752-3-richard.henderson@linaro.org | 5 | Message-id: 20190701132516.26392-11-philmd@redhat.com |
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
8 | --- | 8 | --- |
9 | target/arm/cpu.h | 88 ++++++++++++++++++++++++++++++++++++++++++++++++ | 9 | target/arm/cpu.h | 2 - |
10 | 1 file changed, 88 insertions(+) | 10 | target/arm/translate.h | 5 - |
11 | target/arm/cpu.c | 226 +++++++++++++++++++++++++++++++++++++ | ||
12 | target/arm/translate-a64.c | 128 --------------------- | ||
13 | target/arm/translate.c | 88 --------------- | ||
14 | 5 files changed, 226 insertions(+), 223 deletions(-) | ||
11 | 15 | ||
12 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 16 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
13 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
14 | --- a/target/arm/cpu.h | 18 | --- a/target/arm/cpu.h |
15 | +++ b/target/arm/cpu.h | 19 | +++ b/target/arm/cpu.h |
16 | @@ -XXX,XX +XXX,XX @@ FIELD(V7M_CSSELR, LEVEL, 1, 3) | 20 | @@ -XXX,XX +XXX,XX @@ void arm_cpu_do_interrupt(CPUState *cpu); |
21 | void arm_v7m_cpu_do_interrupt(CPUState *cpu); | ||
22 | bool arm_cpu_exec_interrupt(CPUState *cpu, int int_req); | ||
23 | |||
24 | -void arm_cpu_dump_state(CPUState *cs, FILE *f, int flags); | ||
25 | - | ||
26 | hwaddr arm_cpu_get_phys_page_attrs_debug(CPUState *cpu, vaddr addr, | ||
27 | MemTxAttrs *attrs); | ||
28 | |||
29 | diff --git a/target/arm/translate.h b/target/arm/translate.h | ||
30 | index XXXXXXX..XXXXXXX 100644 | ||
31 | --- a/target/arm/translate.h | ||
32 | +++ b/target/arm/translate.h | ||
33 | @@ -XXX,XX +XXX,XX @@ static inline void disas_set_insn_syndrome(DisasContext *s, uint32_t syn) | ||
34 | #ifdef TARGET_AARCH64 | ||
35 | void a64_translate_init(void); | ||
36 | void gen_a64_set_pc_im(uint64_t val); | ||
37 | -void aarch64_cpu_dump_state(CPUState *cs, FILE *f, int flags); | ||
38 | extern const TranslatorOps aarch64_translator_ops; | ||
39 | #else | ||
40 | static inline void a64_translate_init(void) | ||
41 | @@ -XXX,XX +XXX,XX @@ static inline void a64_translate_init(void) | ||
42 | static inline void gen_a64_set_pc_im(uint64_t val) | ||
43 | { | ||
44 | } | ||
45 | - | ||
46 | -static inline void aarch64_cpu_dump_state(CPUState *cs, FILE *f, int flags) | ||
47 | -{ | ||
48 | -} | ||
49 | #endif | ||
50 | |||
51 | void arm_test_cc(DisasCompare *cmp, int cc); | ||
52 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | ||
53 | index XXXXXXX..XXXXXXX 100644 | ||
54 | --- a/target/arm/cpu.c | ||
55 | +++ b/target/arm/cpu.c | ||
56 | @@ -XXX,XX +XXX,XX @@ | ||
17 | */ | 57 | */ |
18 | FIELD(V7M_CSSELR, INDEX, 0, 4) | 58 | |
19 | 59 | #include "qemu/osdep.h" | |
20 | +/* | 60 | +#include "qemu/qemu-print.h" |
21 | + * System register ID fields. | 61 | #include "qemu-common.h" |
22 | + */ | 62 | #include "target/arm/idau.h" |
23 | +FIELD(ID_ISAR0, SWAP, 0, 4) | 63 | #include "qemu/module.h" |
24 | +FIELD(ID_ISAR0, BITCOUNT, 4, 4) | 64 | @@ -XXX,XX +XXX,XX @@ static void arm_disas_set_info(CPUState *cpu, disassemble_info *info) |
25 | +FIELD(ID_ISAR0, BITFIELD, 8, 4) | 65 | #endif |
26 | +FIELD(ID_ISAR0, CMPBRANCH, 12, 4) | 66 | } |
27 | +FIELD(ID_ISAR0, COPROC, 16, 4) | 67 | |
28 | +FIELD(ID_ISAR0, DEBUG, 20, 4) | 68 | +#ifdef TARGET_AARCH64 |
29 | +FIELD(ID_ISAR0, DIVIDE, 24, 4) | 69 | + |
30 | + | 70 | +static void aarch64_cpu_dump_state(CPUState *cs, FILE *f, int flags) |
31 | +FIELD(ID_ISAR1, ENDIAN, 0, 4) | 71 | +{ |
32 | +FIELD(ID_ISAR1, EXCEPT, 4, 4) | 72 | + ARMCPU *cpu = ARM_CPU(cs); |
33 | +FIELD(ID_ISAR1, EXCEPT_AR, 8, 4) | 73 | + CPUARMState *env = &cpu->env; |
34 | +FIELD(ID_ISAR1, EXTEND, 12, 4) | 74 | + uint32_t psr = pstate_read(env); |
35 | +FIELD(ID_ISAR1, IFTHEN, 16, 4) | 75 | + int i; |
36 | +FIELD(ID_ISAR1, IMMEDIATE, 20, 4) | 76 | + int el = arm_current_el(env); |
37 | +FIELD(ID_ISAR1, INTERWORK, 24, 4) | 77 | + const char *ns_status; |
38 | +FIELD(ID_ISAR1, JAZELLE, 28, 4) | 78 | + |
39 | + | 79 | + qemu_fprintf(f, " PC=%016" PRIx64 " ", env->pc); |
40 | +FIELD(ID_ISAR2, LOADSTORE, 0, 4) | 80 | + for (i = 0; i < 32; i++) { |
41 | +FIELD(ID_ISAR2, MEMHINT, 4, 4) | 81 | + if (i == 31) { |
42 | +FIELD(ID_ISAR2, MULTIACCESSINT, 8, 4) | 82 | + qemu_fprintf(f, " SP=%016" PRIx64 "\n", env->xregs[i]); |
43 | +FIELD(ID_ISAR2, MULT, 12, 4) | 83 | + } else { |
44 | +FIELD(ID_ISAR2, MULTS, 16, 4) | 84 | + qemu_fprintf(f, "X%02d=%016" PRIx64 "%s", i, env->xregs[i], |
45 | +FIELD(ID_ISAR2, MULTU, 20, 4) | 85 | + (i + 2) % 3 ? " " : "\n"); |
46 | +FIELD(ID_ISAR2, PSR_AR, 24, 4) | 86 | + } |
47 | +FIELD(ID_ISAR2, REVERSAL, 28, 4) | 87 | + } |
48 | + | 88 | + |
49 | +FIELD(ID_ISAR3, SATURATE, 0, 4) | 89 | + if (arm_feature(env, ARM_FEATURE_EL3) && el != 3) { |
50 | +FIELD(ID_ISAR3, SIMD, 4, 4) | 90 | + ns_status = env->cp15.scr_el3 & SCR_NS ? "NS " : "S "; |
51 | +FIELD(ID_ISAR3, SVC, 8, 4) | 91 | + } else { |
52 | +FIELD(ID_ISAR3, SYNCHPRIM, 12, 4) | 92 | + ns_status = ""; |
53 | +FIELD(ID_ISAR3, TABBRANCH, 16, 4) | 93 | + } |
54 | +FIELD(ID_ISAR3, T32COPY, 20, 4) | 94 | + qemu_fprintf(f, "PSTATE=%08x %c%c%c%c %sEL%d%c", |
55 | +FIELD(ID_ISAR3, TRUENOP, 24, 4) | 95 | + psr, |
56 | +FIELD(ID_ISAR3, T32EE, 28, 4) | 96 | + psr & PSTATE_N ? 'N' : '-', |
57 | + | 97 | + psr & PSTATE_Z ? 'Z' : '-', |
58 | +FIELD(ID_ISAR4, UNPRIV, 0, 4) | 98 | + psr & PSTATE_C ? 'C' : '-', |
59 | +FIELD(ID_ISAR4, WITHSHIFTS, 4, 4) | 99 | + psr & PSTATE_V ? 'V' : '-', |
60 | +FIELD(ID_ISAR4, WRITEBACK, 8, 4) | 100 | + ns_status, |
61 | +FIELD(ID_ISAR4, SMC, 12, 4) | 101 | + el, |
62 | +FIELD(ID_ISAR4, BARRIER, 16, 4) | 102 | + psr & PSTATE_SP ? 'h' : 't'); |
63 | +FIELD(ID_ISAR4, SYNCHPRIM_FRAC, 20, 4) | 103 | + |
64 | +FIELD(ID_ISAR4, PSR_M, 24, 4) | 104 | + if (cpu_isar_feature(aa64_bti, cpu)) { |
65 | +FIELD(ID_ISAR4, SWP_FRAC, 28, 4) | 105 | + qemu_fprintf(f, " BTYPE=%d", (psr & PSTATE_BTYPE) >> 10); |
66 | + | 106 | + } |
67 | +FIELD(ID_ISAR5, SEVL, 0, 4) | 107 | + if (!(flags & CPU_DUMP_FPU)) { |
68 | +FIELD(ID_ISAR5, AES, 4, 4) | 108 | + qemu_fprintf(f, "\n"); |
69 | +FIELD(ID_ISAR5, SHA1, 8, 4) | 109 | + return; |
70 | +FIELD(ID_ISAR5, SHA2, 12, 4) | 110 | + } |
71 | +FIELD(ID_ISAR5, CRC32, 16, 4) | 111 | + if (fp_exception_el(env, el) != 0) { |
72 | +FIELD(ID_ISAR5, RDM, 24, 4) | 112 | + qemu_fprintf(f, " FPU disabled\n"); |
73 | +FIELD(ID_ISAR5, VCMA, 28, 4) | 113 | + return; |
74 | + | 114 | + } |
75 | +FIELD(ID_ISAR6, JSCVT, 0, 4) | 115 | + qemu_fprintf(f, " FPCR=%08x FPSR=%08x\n", |
76 | +FIELD(ID_ISAR6, DP, 4, 4) | 116 | + vfp_get_fpcr(env), vfp_get_fpsr(env)); |
77 | +FIELD(ID_ISAR6, FHM, 8, 4) | 117 | + |
78 | +FIELD(ID_ISAR6, SB, 12, 4) | 118 | + if (cpu_isar_feature(aa64_sve, cpu) && sve_exception_el(env, el) == 0) { |
79 | +FIELD(ID_ISAR6, SPECRES, 16, 4) | 119 | + int j, zcr_len = sve_zcr_len_for_el(env, el); |
80 | + | 120 | + |
81 | +FIELD(ID_AA64ISAR0, AES, 4, 4) | 121 | + for (i = 0; i <= FFR_PRED_NUM; i++) { |
82 | +FIELD(ID_AA64ISAR0, SHA1, 8, 4) | 122 | + bool eol; |
83 | +FIELD(ID_AA64ISAR0, SHA2, 12, 4) | 123 | + if (i == FFR_PRED_NUM) { |
84 | +FIELD(ID_AA64ISAR0, CRC32, 16, 4) | 124 | + qemu_fprintf(f, "FFR="); |
85 | +FIELD(ID_AA64ISAR0, ATOMIC, 20, 4) | 125 | + /* It's last, so end the line. */ |
86 | +FIELD(ID_AA64ISAR0, RDM, 28, 4) | 126 | + eol = true; |
87 | +FIELD(ID_AA64ISAR0, SHA3, 32, 4) | 127 | + } else { |
88 | +FIELD(ID_AA64ISAR0, SM3, 36, 4) | 128 | + qemu_fprintf(f, "P%02d=", i); |
89 | +FIELD(ID_AA64ISAR0, SM4, 40, 4) | 129 | + switch (zcr_len) { |
90 | +FIELD(ID_AA64ISAR0, DP, 44, 4) | 130 | + case 0: |
91 | +FIELD(ID_AA64ISAR0, FHM, 48, 4) | 131 | + eol = i % 8 == 7; |
92 | +FIELD(ID_AA64ISAR0, TS, 52, 4) | 132 | + break; |
93 | +FIELD(ID_AA64ISAR0, TLB, 56, 4) | 133 | + case 1: |
94 | +FIELD(ID_AA64ISAR0, RNDR, 60, 4) | 134 | + eol = i % 6 == 5; |
95 | + | 135 | + break; |
96 | +FIELD(ID_AA64ISAR1, DPB, 0, 4) | 136 | + case 2: |
97 | +FIELD(ID_AA64ISAR1, APA, 4, 4) | 137 | + case 3: |
98 | +FIELD(ID_AA64ISAR1, API, 8, 4) | 138 | + eol = i % 3 == 2; |
99 | +FIELD(ID_AA64ISAR1, JSCVT, 12, 4) | 139 | + break; |
100 | +FIELD(ID_AA64ISAR1, FCMA, 16, 4) | 140 | + default: |
101 | +FIELD(ID_AA64ISAR1, LRCPC, 20, 4) | 141 | + /* More than one quadword per predicate. */ |
102 | +FIELD(ID_AA64ISAR1, GPA, 24, 4) | 142 | + eol = true; |
103 | +FIELD(ID_AA64ISAR1, GPI, 28, 4) | 143 | + break; |
104 | +FIELD(ID_AA64ISAR1, FRINTTS, 32, 4) | 144 | + } |
105 | +FIELD(ID_AA64ISAR1, SB, 36, 4) | 145 | + } |
106 | +FIELD(ID_AA64ISAR1, SPECRES, 40, 4) | 146 | + for (j = zcr_len / 4; j >= 0; j--) { |
107 | + | 147 | + int digits; |
108 | QEMU_BUILD_BUG_ON(ARRAY_SIZE(((ARMCPU *)0)->ccsidr) <= R_V7M_CSSELR_INDEX_MASK); | 148 | + if (j * 4 + 4 <= zcr_len + 1) { |
109 | 149 | + digits = 16; | |
110 | /* If adding a feature bit which corresponds to a Linux ELF | 150 | + } else { |
151 | + digits = (zcr_len % 4 + 1) * 4; | ||
152 | + } | ||
153 | + qemu_fprintf(f, "%0*" PRIx64 "%s", digits, | ||
154 | + env->vfp.pregs[i].p[j], | ||
155 | + j ? ":" : eol ? "\n" : " "); | ||
156 | + } | ||
157 | + } | ||
158 | + | ||
159 | + for (i = 0; i < 32; i++) { | ||
160 | + if (zcr_len == 0) { | ||
161 | + qemu_fprintf(f, "Z%02d=%016" PRIx64 ":%016" PRIx64 "%s", | ||
162 | + i, env->vfp.zregs[i].d[1], | ||
163 | + env->vfp.zregs[i].d[0], i & 1 ? "\n" : " "); | ||
164 | + } else if (zcr_len == 1) { | ||
165 | + qemu_fprintf(f, "Z%02d=%016" PRIx64 ":%016" PRIx64 | ||
166 | + ":%016" PRIx64 ":%016" PRIx64 "\n", | ||
167 | + i, env->vfp.zregs[i].d[3], env->vfp.zregs[i].d[2], | ||
168 | + env->vfp.zregs[i].d[1], env->vfp.zregs[i].d[0]); | ||
169 | + } else { | ||
170 | + for (j = zcr_len; j >= 0; j--) { | ||
171 | + bool odd = (zcr_len - j) % 2 != 0; | ||
172 | + if (j == zcr_len) { | ||
173 | + qemu_fprintf(f, "Z%02d[%x-%x]=", i, j, j - 1); | ||
174 | + } else if (!odd) { | ||
175 | + if (j > 0) { | ||
176 | + qemu_fprintf(f, " [%x-%x]=", j, j - 1); | ||
177 | + } else { | ||
178 | + qemu_fprintf(f, " [%x]=", j); | ||
179 | + } | ||
180 | + } | ||
181 | + qemu_fprintf(f, "%016" PRIx64 ":%016" PRIx64 "%s", | ||
182 | + env->vfp.zregs[i].d[j * 2 + 1], | ||
183 | + env->vfp.zregs[i].d[j * 2], | ||
184 | + odd || j == 0 ? "\n" : ":"); | ||
185 | + } | ||
186 | + } | ||
187 | + } | ||
188 | + } else { | ||
189 | + for (i = 0; i < 32; i++) { | ||
190 | + uint64_t *q = aa64_vfp_qreg(env, i); | ||
191 | + qemu_fprintf(f, "Q%02d=%016" PRIx64 ":%016" PRIx64 "%s", | ||
192 | + i, q[1], q[0], (i & 1 ? "\n" : " ")); | ||
193 | + } | ||
194 | + } | ||
195 | +} | ||
196 | + | ||
197 | +#else | ||
198 | + | ||
199 | +static inline void aarch64_cpu_dump_state(CPUState *cs, FILE *f, int flags) | ||
200 | +{ | ||
201 | + g_assert_not_reached(); | ||
202 | +} | ||
203 | + | ||
204 | +#endif | ||
205 | + | ||
206 | +static void arm_cpu_dump_state(CPUState *cs, FILE *f, int flags) | ||
207 | +{ | ||
208 | + ARMCPU *cpu = ARM_CPU(cs); | ||
209 | + CPUARMState *env = &cpu->env; | ||
210 | + int i; | ||
211 | + | ||
212 | + if (is_a64(env)) { | ||
213 | + aarch64_cpu_dump_state(cs, f, flags); | ||
214 | + return; | ||
215 | + } | ||
216 | + | ||
217 | + for (i = 0; i < 16; i++) { | ||
218 | + qemu_fprintf(f, "R%02d=%08x", i, env->regs[i]); | ||
219 | + if ((i % 4) == 3) { | ||
220 | + qemu_fprintf(f, "\n"); | ||
221 | + } else { | ||
222 | + qemu_fprintf(f, " "); | ||
223 | + } | ||
224 | + } | ||
225 | + | ||
226 | + if (arm_feature(env, ARM_FEATURE_M)) { | ||
227 | + uint32_t xpsr = xpsr_read(env); | ||
228 | + const char *mode; | ||
229 | + const char *ns_status = ""; | ||
230 | + | ||
231 | + if (arm_feature(env, ARM_FEATURE_M_SECURITY)) { | ||
232 | + ns_status = env->v7m.secure ? "S " : "NS "; | ||
233 | + } | ||
234 | + | ||
235 | + if (xpsr & XPSR_EXCP) { | ||
236 | + mode = "handler"; | ||
237 | + } else { | ||
238 | + if (env->v7m.control[env->v7m.secure] & R_V7M_CONTROL_NPRIV_MASK) { | ||
239 | + mode = "unpriv-thread"; | ||
240 | + } else { | ||
241 | + mode = "priv-thread"; | ||
242 | + } | ||
243 | + } | ||
244 | + | ||
245 | + qemu_fprintf(f, "XPSR=%08x %c%c%c%c %c %s%s\n", | ||
246 | + xpsr, | ||
247 | + xpsr & XPSR_N ? 'N' : '-', | ||
248 | + xpsr & XPSR_Z ? 'Z' : '-', | ||
249 | + xpsr & XPSR_C ? 'C' : '-', | ||
250 | + xpsr & XPSR_V ? 'V' : '-', | ||
251 | + xpsr & XPSR_T ? 'T' : 'A', | ||
252 | + ns_status, | ||
253 | + mode); | ||
254 | + } else { | ||
255 | + uint32_t psr = cpsr_read(env); | ||
256 | + const char *ns_status = ""; | ||
257 | + | ||
258 | + if (arm_feature(env, ARM_FEATURE_EL3) && | ||
259 | + (psr & CPSR_M) != ARM_CPU_MODE_MON) { | ||
260 | + ns_status = env->cp15.scr_el3 & SCR_NS ? "NS " : "S "; | ||
261 | + } | ||
262 | + | ||
263 | + qemu_fprintf(f, "PSR=%08x %c%c%c%c %c %s%s%d\n", | ||
264 | + psr, | ||
265 | + psr & CPSR_N ? 'N' : '-', | ||
266 | + psr & CPSR_Z ? 'Z' : '-', | ||
267 | + psr & CPSR_C ? 'C' : '-', | ||
268 | + psr & CPSR_V ? 'V' : '-', | ||
269 | + psr & CPSR_T ? 'T' : 'A', | ||
270 | + ns_status, | ||
271 | + aarch32_mode_name(psr), (psr & 0x10) ? 32 : 26); | ||
272 | + } | ||
273 | + | ||
274 | + if (flags & CPU_DUMP_FPU) { | ||
275 | + int numvfpregs = 0; | ||
276 | + if (arm_feature(env, ARM_FEATURE_VFP)) { | ||
277 | + numvfpregs += 16; | ||
278 | + } | ||
279 | + if (arm_feature(env, ARM_FEATURE_VFP3)) { | ||
280 | + numvfpregs += 16; | ||
281 | + } | ||
282 | + for (i = 0; i < numvfpregs; i++) { | ||
283 | + uint64_t v = *aa32_vfp_dreg(env, i); | ||
284 | + qemu_fprintf(f, "s%02d=%08x s%02d=%08x d%02d=%016" PRIx64 "\n", | ||
285 | + i * 2, (uint32_t)v, | ||
286 | + i * 2 + 1, (uint32_t)(v >> 32), | ||
287 | + i, v); | ||
288 | + } | ||
289 | + qemu_fprintf(f, "FPSCR: %08x\n", vfp_get_fpscr(env)); | ||
290 | + } | ||
291 | +} | ||
292 | + | ||
293 | uint64_t arm_cpu_mp_affinity(int idx, uint8_t clustersz) | ||
294 | { | ||
295 | uint32_t Aff1 = idx / clustersz; | ||
296 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c | ||
297 | index XXXXXXX..XXXXXXX 100644 | ||
298 | --- a/target/arm/translate-a64.c | ||
299 | +++ b/target/arm/translate-a64.c | ||
300 | @@ -XXX,XX +XXX,XX @@ | ||
301 | #include "translate.h" | ||
302 | #include "internals.h" | ||
303 | #include "qemu/host-utils.h" | ||
304 | -#include "qemu/qemu-print.h" | ||
305 | |||
306 | #include "hw/semihosting/semihost.h" | ||
307 | #include "exec/gen-icount.h" | ||
308 | @@ -XXX,XX +XXX,XX @@ static void set_btype(DisasContext *s, int val) | ||
309 | s->btype = -1; | ||
310 | } | ||
311 | |||
312 | -void aarch64_cpu_dump_state(CPUState *cs, FILE *f, int flags) | ||
313 | -{ | ||
314 | - ARMCPU *cpu = ARM_CPU(cs); | ||
315 | - CPUARMState *env = &cpu->env; | ||
316 | - uint32_t psr = pstate_read(env); | ||
317 | - int i; | ||
318 | - int el = arm_current_el(env); | ||
319 | - const char *ns_status; | ||
320 | - | ||
321 | - qemu_fprintf(f, " PC=%016" PRIx64 " ", env->pc); | ||
322 | - for (i = 0; i < 32; i++) { | ||
323 | - if (i == 31) { | ||
324 | - qemu_fprintf(f, " SP=%016" PRIx64 "\n", env->xregs[i]); | ||
325 | - } else { | ||
326 | - qemu_fprintf(f, "X%02d=%016" PRIx64 "%s", i, env->xregs[i], | ||
327 | - (i + 2) % 3 ? " " : "\n"); | ||
328 | - } | ||
329 | - } | ||
330 | - | ||
331 | - if (arm_feature(env, ARM_FEATURE_EL3) && el != 3) { | ||
332 | - ns_status = env->cp15.scr_el3 & SCR_NS ? "NS " : "S "; | ||
333 | - } else { | ||
334 | - ns_status = ""; | ||
335 | - } | ||
336 | - qemu_fprintf(f, "PSTATE=%08x %c%c%c%c %sEL%d%c", | ||
337 | - psr, | ||
338 | - psr & PSTATE_N ? 'N' : '-', | ||
339 | - psr & PSTATE_Z ? 'Z' : '-', | ||
340 | - psr & PSTATE_C ? 'C' : '-', | ||
341 | - psr & PSTATE_V ? 'V' : '-', | ||
342 | - ns_status, | ||
343 | - el, | ||
344 | - psr & PSTATE_SP ? 'h' : 't'); | ||
345 | - | ||
346 | - if (cpu_isar_feature(aa64_bti, cpu)) { | ||
347 | - qemu_fprintf(f, " BTYPE=%d", (psr & PSTATE_BTYPE) >> 10); | ||
348 | - } | ||
349 | - if (!(flags & CPU_DUMP_FPU)) { | ||
350 | - qemu_fprintf(f, "\n"); | ||
351 | - return; | ||
352 | - } | ||
353 | - if (fp_exception_el(env, el) != 0) { | ||
354 | - qemu_fprintf(f, " FPU disabled\n"); | ||
355 | - return; | ||
356 | - } | ||
357 | - qemu_fprintf(f, " FPCR=%08x FPSR=%08x\n", | ||
358 | - vfp_get_fpcr(env), vfp_get_fpsr(env)); | ||
359 | - | ||
360 | - if (cpu_isar_feature(aa64_sve, cpu) && sve_exception_el(env, el) == 0) { | ||
361 | - int j, zcr_len = sve_zcr_len_for_el(env, el); | ||
362 | - | ||
363 | - for (i = 0; i <= FFR_PRED_NUM; i++) { | ||
364 | - bool eol; | ||
365 | - if (i == FFR_PRED_NUM) { | ||
366 | - qemu_fprintf(f, "FFR="); | ||
367 | - /* It's last, so end the line. */ | ||
368 | - eol = true; | ||
369 | - } else { | ||
370 | - qemu_fprintf(f, "P%02d=", i); | ||
371 | - switch (zcr_len) { | ||
372 | - case 0: | ||
373 | - eol = i % 8 == 7; | ||
374 | - break; | ||
375 | - case 1: | ||
376 | - eol = i % 6 == 5; | ||
377 | - break; | ||
378 | - case 2: | ||
379 | - case 3: | ||
380 | - eol = i % 3 == 2; | ||
381 | - break; | ||
382 | - default: | ||
383 | - /* More than one quadword per predicate. */ | ||
384 | - eol = true; | ||
385 | - break; | ||
386 | - } | ||
387 | - } | ||
388 | - for (j = zcr_len / 4; j >= 0; j--) { | ||
389 | - int digits; | ||
390 | - if (j * 4 + 4 <= zcr_len + 1) { | ||
391 | - digits = 16; | ||
392 | - } else { | ||
393 | - digits = (zcr_len % 4 + 1) * 4; | ||
394 | - } | ||
395 | - qemu_fprintf(f, "%0*" PRIx64 "%s", digits, | ||
396 | - env->vfp.pregs[i].p[j], | ||
397 | - j ? ":" : eol ? "\n" : " "); | ||
398 | - } | ||
399 | - } | ||
400 | - | ||
401 | - for (i = 0; i < 32; i++) { | ||
402 | - if (zcr_len == 0) { | ||
403 | - qemu_fprintf(f, "Z%02d=%016" PRIx64 ":%016" PRIx64 "%s", | ||
404 | - i, env->vfp.zregs[i].d[1], | ||
405 | - env->vfp.zregs[i].d[0], i & 1 ? "\n" : " "); | ||
406 | - } else if (zcr_len == 1) { | ||
407 | - qemu_fprintf(f, "Z%02d=%016" PRIx64 ":%016" PRIx64 | ||
408 | - ":%016" PRIx64 ":%016" PRIx64 "\n", | ||
409 | - i, env->vfp.zregs[i].d[3], env->vfp.zregs[i].d[2], | ||
410 | - env->vfp.zregs[i].d[1], env->vfp.zregs[i].d[0]); | ||
411 | - } else { | ||
412 | - for (j = zcr_len; j >= 0; j--) { | ||
413 | - bool odd = (zcr_len - j) % 2 != 0; | ||
414 | - if (j == zcr_len) { | ||
415 | - qemu_fprintf(f, "Z%02d[%x-%x]=", i, j, j - 1); | ||
416 | - } else if (!odd) { | ||
417 | - if (j > 0) { | ||
418 | - qemu_fprintf(f, " [%x-%x]=", j, j - 1); | ||
419 | - } else { | ||
420 | - qemu_fprintf(f, " [%x]=", j); | ||
421 | - } | ||
422 | - } | ||
423 | - qemu_fprintf(f, "%016" PRIx64 ":%016" PRIx64 "%s", | ||
424 | - env->vfp.zregs[i].d[j * 2 + 1], | ||
425 | - env->vfp.zregs[i].d[j * 2], | ||
426 | - odd || j == 0 ? "\n" : ":"); | ||
427 | - } | ||
428 | - } | ||
429 | - } | ||
430 | - } else { | ||
431 | - for (i = 0; i < 32; i++) { | ||
432 | - uint64_t *q = aa64_vfp_qreg(env, i); | ||
433 | - qemu_fprintf(f, "Q%02d=%016" PRIx64 ":%016" PRIx64 "%s", | ||
434 | - i, q[1], q[0], (i & 1 ? "\n" : " ")); | ||
435 | - } | ||
436 | - } | ||
437 | -} | ||
438 | - | ||
439 | void gen_a64_set_pc_im(uint64_t val) | ||
440 | { | ||
441 | tcg_gen_movi_i64(cpu_pc, val); | ||
442 | diff --git a/target/arm/translate.c b/target/arm/translate.c | ||
443 | index XXXXXXX..XXXXXXX 100644 | ||
444 | --- a/target/arm/translate.c | ||
445 | +++ b/target/arm/translate.c | ||
446 | @@ -XXX,XX +XXX,XX @@ | ||
447 | #include "tcg-op-gvec.h" | ||
448 | #include "qemu/log.h" | ||
449 | #include "qemu/bitops.h" | ||
450 | -#include "qemu/qemu-print.h" | ||
451 | #include "arm_ldst.h" | ||
452 | #include "hw/semihosting/semihost.h" | ||
453 | |||
454 | @@ -XXX,XX +XXX,XX @@ void gen_intermediate_code(CPUState *cpu, TranslationBlock *tb, int max_insns) | ||
455 | translator_loop(ops, &dc.base, cpu, tb, max_insns); | ||
456 | } | ||
457 | |||
458 | -void arm_cpu_dump_state(CPUState *cs, FILE *f, int flags) | ||
459 | -{ | ||
460 | - ARMCPU *cpu = ARM_CPU(cs); | ||
461 | - CPUARMState *env = &cpu->env; | ||
462 | - int i; | ||
463 | - | ||
464 | - if (is_a64(env)) { | ||
465 | - aarch64_cpu_dump_state(cs, f, flags); | ||
466 | - return; | ||
467 | - } | ||
468 | - | ||
469 | - for (i = 0; i < 16; i++) { | ||
470 | - qemu_fprintf(f, "R%02d=%08x", i, env->regs[i]); | ||
471 | - if ((i % 4) == 3) { | ||
472 | - qemu_fprintf(f, "\n"); | ||
473 | - } else { | ||
474 | - qemu_fprintf(f, " "); | ||
475 | - } | ||
476 | - } | ||
477 | - | ||
478 | - if (arm_feature(env, ARM_FEATURE_M)) { | ||
479 | - uint32_t xpsr = xpsr_read(env); | ||
480 | - const char *mode; | ||
481 | - const char *ns_status = ""; | ||
482 | - | ||
483 | - if (arm_feature(env, ARM_FEATURE_M_SECURITY)) { | ||
484 | - ns_status = env->v7m.secure ? "S " : "NS "; | ||
485 | - } | ||
486 | - | ||
487 | - if (xpsr & XPSR_EXCP) { | ||
488 | - mode = "handler"; | ||
489 | - } else { | ||
490 | - if (env->v7m.control[env->v7m.secure] & R_V7M_CONTROL_NPRIV_MASK) { | ||
491 | - mode = "unpriv-thread"; | ||
492 | - } else { | ||
493 | - mode = "priv-thread"; | ||
494 | - } | ||
495 | - } | ||
496 | - | ||
497 | - qemu_fprintf(f, "XPSR=%08x %c%c%c%c %c %s%s\n", | ||
498 | - xpsr, | ||
499 | - xpsr & XPSR_N ? 'N' : '-', | ||
500 | - xpsr & XPSR_Z ? 'Z' : '-', | ||
501 | - xpsr & XPSR_C ? 'C' : '-', | ||
502 | - xpsr & XPSR_V ? 'V' : '-', | ||
503 | - xpsr & XPSR_T ? 'T' : 'A', | ||
504 | - ns_status, | ||
505 | - mode); | ||
506 | - } else { | ||
507 | - uint32_t psr = cpsr_read(env); | ||
508 | - const char *ns_status = ""; | ||
509 | - | ||
510 | - if (arm_feature(env, ARM_FEATURE_EL3) && | ||
511 | - (psr & CPSR_M) != ARM_CPU_MODE_MON) { | ||
512 | - ns_status = env->cp15.scr_el3 & SCR_NS ? "NS " : "S "; | ||
513 | - } | ||
514 | - | ||
515 | - qemu_fprintf(f, "PSR=%08x %c%c%c%c %c %s%s%d\n", | ||
516 | - psr, | ||
517 | - psr & CPSR_N ? 'N' : '-', | ||
518 | - psr & CPSR_Z ? 'Z' : '-', | ||
519 | - psr & CPSR_C ? 'C' : '-', | ||
520 | - psr & CPSR_V ? 'V' : '-', | ||
521 | - psr & CPSR_T ? 'T' : 'A', | ||
522 | - ns_status, | ||
523 | - aarch32_mode_name(psr), (psr & 0x10) ? 32 : 26); | ||
524 | - } | ||
525 | - | ||
526 | - if (flags & CPU_DUMP_FPU) { | ||
527 | - int numvfpregs = 0; | ||
528 | - if (arm_feature(env, ARM_FEATURE_VFP)) { | ||
529 | - numvfpregs += 16; | ||
530 | - } | ||
531 | - if (arm_feature(env, ARM_FEATURE_VFP3)) { | ||
532 | - numvfpregs += 16; | ||
533 | - } | ||
534 | - for (i = 0; i < numvfpregs; i++) { | ||
535 | - uint64_t v = *aa32_vfp_dreg(env, i); | ||
536 | - qemu_fprintf(f, "s%02d=%08x s%02d=%08x d%02d=%016" PRIx64 "\n", | ||
537 | - i * 2, (uint32_t)v, | ||
538 | - i * 2 + 1, (uint32_t)(v >> 32), | ||
539 | - i, v); | ||
540 | - } | ||
541 | - qemu_fprintf(f, "FPSCR: %08x\n", vfp_get_fpscr(env)); | ||
542 | - } | ||
543 | -} | ||
544 | - | ||
545 | void restore_state_to_opc(CPUARMState *env, TranslationBlock *tb, | ||
546 | target_ulong *data) | ||
547 | { | ||
111 | -- | 548 | -- |
112 | 2.19.0 | 549 | 2.20.1 |
113 | 550 | ||
114 | 551 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
1 | 2 | ||
3 | In the next commit we will split the TLB related routines of | ||
4 | this file, and this function will also be called in the new | ||
5 | file. Declare it in the "internals.h" header. | ||
6 | |||
7 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
8 | Message-id: 20190701132516.26392-12-philmd@redhat.com | ||
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | --- | ||
12 | target/arm/internals.h | 16 ++++++++++++++++ | ||
13 | target/arm/helper.c | 21 +++++---------------- | ||
14 | 2 files changed, 21 insertions(+), 16 deletions(-) | ||
15 | |||
16 | diff --git a/target/arm/internals.h b/target/arm/internals.h | ||
17 | index XXXXXXX..XXXXXXX 100644 | ||
18 | --- a/target/arm/internals.h | ||
19 | +++ b/target/arm/internals.h | ||
20 | @@ -XXX,XX +XXX,XX @@ static inline int exception_target_el(CPUARMState *env) | ||
21 | return target_el; | ||
22 | } | ||
23 | |||
24 | +#ifndef CONFIG_USER_ONLY | ||
25 | + | ||
26 | +/* Cacheability and shareability attributes for a memory access */ | ||
27 | +typedef struct ARMCacheAttrs { | ||
28 | + unsigned int attrs:8; /* as in the MAIR register encoding */ | ||
29 | + unsigned int shareability:2; /* as in the SH field of the VMSAv8-64 PTEs */ | ||
30 | +} ARMCacheAttrs; | ||
31 | + | ||
32 | +bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
33 | + MMUAccessType access_type, ARMMMUIdx mmu_idx, | ||
34 | + hwaddr *phys_ptr, MemTxAttrs *attrs, int *prot, | ||
35 | + target_ulong *page_size, | ||
36 | + ARMMMUFaultInfo *fi, ARMCacheAttrs *cacheattrs); | ||
37 | + | ||
38 | +#endif /* !CONFIG_USER_ONLY */ | ||
39 | + | ||
40 | #endif | ||
41 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
42 | index XXXXXXX..XXXXXXX 100644 | ||
43 | --- a/target/arm/helper.c | ||
44 | +++ b/target/arm/helper.c | ||
45 | @@ -XXX,XX +XXX,XX @@ | ||
46 | #define ARM_CPU_FREQ 1000000000 /* FIXME: 1 GHz, should be configurable */ | ||
47 | |||
48 | #ifndef CONFIG_USER_ONLY | ||
49 | -/* Cacheability and shareability attributes for a memory access */ | ||
50 | -typedef struct ARMCacheAttrs { | ||
51 | - unsigned int attrs:8; /* as in the MAIR register encoding */ | ||
52 | - unsigned int shareability:2; /* as in the SH field of the VMSAv8-64 PTEs */ | ||
53 | -} ARMCacheAttrs; | ||
54 | - | ||
55 | -static bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
56 | - MMUAccessType access_type, ARMMMUIdx mmu_idx, | ||
57 | - hwaddr *phys_ptr, MemTxAttrs *attrs, int *prot, | ||
58 | - target_ulong *page_size, | ||
59 | - ARMMMUFaultInfo *fi, ARMCacheAttrs *cacheattrs); | ||
60 | |||
61 | static bool get_phys_addr_lpae(CPUARMState *env, target_ulong address, | ||
62 | MMUAccessType access_type, ARMMMUIdx mmu_idx, | ||
63 | @@ -XXX,XX +XXX,XX @@ static ARMCacheAttrs combine_cacheattrs(ARMCacheAttrs s1, ARMCacheAttrs s2) | ||
64 | * @fi: set to fault info if the translation fails | ||
65 | * @cacheattrs: (if non-NULL) set to the cacheability/shareability attributes | ||
66 | */ | ||
67 | -static bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
68 | - MMUAccessType access_type, ARMMMUIdx mmu_idx, | ||
69 | - hwaddr *phys_ptr, MemTxAttrs *attrs, int *prot, | ||
70 | - target_ulong *page_size, | ||
71 | - ARMMMUFaultInfo *fi, ARMCacheAttrs *cacheattrs) | ||
72 | +bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
73 | + MMUAccessType access_type, ARMMMUIdx mmu_idx, | ||
74 | + hwaddr *phys_ptr, MemTxAttrs *attrs, int *prot, | ||
75 | + target_ulong *page_size, | ||
76 | + ARMMMUFaultInfo *fi, ARMCacheAttrs *cacheattrs) | ||
77 | { | ||
78 | if (mmu_idx == ARMMMUIdx_S12NSE0 || mmu_idx == ARMMMUIdx_S12NSE1) { | ||
79 | /* Call ourselves recursively to do the stage 1 and then stage 2 | ||
80 | -- | ||
81 | 2.20.1 | ||
82 | |||
83 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | The missing nibble made it more difficult to read. | 3 | These routines are TCG specific. |
4 | The arm_deliver_fault() function is only used within the new | ||
5 | helper. Make it static. | ||
4 | 6 | ||
5 | Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> | 7 | Suggested-by: Alex Bennée <alex.bennee@linaro.org> |
6 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 8 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
7 | Message-id: 20181008212205.17752-5-richard.henderson@linaro.org | 9 | Message-id: 20190701132516.26392-13-philmd@redhat.com |
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | --- | 12 | --- |
10 | target/arm/cpu.c | 2 +- | 13 | target/arm/Makefile.objs | 1 + |
11 | 1 file changed, 1 insertion(+), 1 deletion(-) | 14 | target/arm/internals.h | 3 - |
15 | target/arm/cpu.c | 6 +- | ||
16 | target/arm/helper.c | 53 ----------- | ||
17 | target/arm/op_helper.c | 135 -------------------------- | ||
18 | target/arm/tlb_helper.c | 200 +++++++++++++++++++++++++++++++++++++++ | ||
19 | 6 files changed, 205 insertions(+), 193 deletions(-) | ||
20 | create mode 100644 target/arm/tlb_helper.c | ||
12 | 21 | ||
22 | diff --git a/target/arm/Makefile.objs b/target/arm/Makefile.objs | ||
23 | index XXXXXXX..XXXXXXX 100644 | ||
24 | --- a/target/arm/Makefile.objs | ||
25 | +++ b/target/arm/Makefile.objs | ||
26 | @@ -XXX,XX +XXX,XX @@ target/arm/translate-sve.o: target/arm/decode-sve.inc.c | ||
27 | target/arm/translate.o: target/arm/decode-vfp.inc.c | ||
28 | target/arm/translate.o: target/arm/decode-vfp-uncond.inc.c | ||
29 | |||
30 | +obj-y += tlb_helper.o | ||
31 | obj-y += translate.o op_helper.o | ||
32 | obj-y += crypto_helper.o | ||
33 | obj-y += iwmmxt_helper.o vec_helper.o neon_helper.o | ||
34 | diff --git a/target/arm/internals.h b/target/arm/internals.h | ||
35 | index XXXXXXX..XXXXXXX 100644 | ||
36 | --- a/target/arm/internals.h | ||
37 | +++ b/target/arm/internals.h | ||
38 | @@ -XXX,XX +XXX,XX @@ bool arm_cpu_tlb_fill(CPUState *cs, vaddr address, int size, | ||
39 | MMUAccessType access_type, int mmu_idx, | ||
40 | bool probe, uintptr_t retaddr); | ||
41 | |||
42 | -void arm_deliver_fault(ARMCPU *cpu, vaddr addr, MMUAccessType access_type, | ||
43 | - int mmu_idx, ARMMMUFaultInfo *fi) QEMU_NORETURN; | ||
44 | - | ||
45 | /* Return true if the stage 1 translation regime is using LPAE format page | ||
46 | * tables */ | ||
47 | bool arm_s1_regime_using_lpae_format(CPUARMState *env, ARMMMUIdx mmu_idx); | ||
13 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | 48 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c |
14 | index XXXXXXX..XXXXXXX 100644 | 49 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/target/arm/cpu.c | 50 | --- a/target/arm/cpu.c |
16 | +++ b/target/arm/cpu.c | 51 | +++ b/target/arm/cpu.c |
17 | @@ -XXX,XX +XXX,XX @@ static void cortex_r5_initfn(Object *obj) | 52 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_class_init(ObjectClass *oc, void *data) |
18 | cpu->id_mmfr1 = 0x00000000; | 53 | cc->gdb_write_register = arm_cpu_gdb_write_register; |
19 | cpu->id_mmfr2 = 0x01200000; | 54 | #ifndef CONFIG_USER_ONLY |
20 | cpu->id_mmfr3 = 0x0211; | 55 | cc->do_interrupt = arm_cpu_do_interrupt; |
21 | - cpu->id_isar0 = 0x2101111; | 56 | - cc->do_unaligned_access = arm_cpu_do_unaligned_access; |
22 | + cpu->id_isar0 = 0x02101111; | 57 | - cc->do_transaction_failed = arm_cpu_do_transaction_failed; |
23 | cpu->id_isar1 = 0x13112111; | 58 | cc->get_phys_page_attrs_debug = arm_cpu_get_phys_page_attrs_debug; |
24 | cpu->id_isar2 = 0x21232141; | 59 | cc->asidx_from_attrs = arm_asidx_from_attrs; |
25 | cpu->id_isar3 = 0x01112131; | 60 | cc->vmsd = &vmstate_arm_cpu; |
61 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_class_init(ObjectClass *oc, void *data) | ||
62 | #ifdef CONFIG_TCG | ||
63 | cc->tcg_initialize = arm_translate_init; | ||
64 | cc->tlb_fill = arm_cpu_tlb_fill; | ||
65 | +#if !defined(CONFIG_USER_ONLY) | ||
66 | + cc->do_unaligned_access = arm_cpu_do_unaligned_access; | ||
67 | + cc->do_transaction_failed = arm_cpu_do_transaction_failed; | ||
68 | +#endif /* CONFIG_TCG && !CONFIG_USER_ONLY */ | ||
69 | #endif | ||
70 | } | ||
71 | |||
72 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
73 | index XXXXXXX..XXXXXXX 100644 | ||
74 | --- a/target/arm/helper.c | ||
75 | +++ b/target/arm/helper.c | ||
76 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(v7m_tt)(CPUARMState *env, uint32_t addr, uint32_t op) | ||
77 | |||
78 | #endif | ||
79 | |||
80 | -bool arm_cpu_tlb_fill(CPUState *cs, vaddr address, int size, | ||
81 | - MMUAccessType access_type, int mmu_idx, | ||
82 | - bool probe, uintptr_t retaddr) | ||
83 | -{ | ||
84 | - ARMCPU *cpu = ARM_CPU(cs); | ||
85 | - | ||
86 | -#ifdef CONFIG_USER_ONLY | ||
87 | - cpu->env.exception.vaddress = address; | ||
88 | - if (access_type == MMU_INST_FETCH) { | ||
89 | - cs->exception_index = EXCP_PREFETCH_ABORT; | ||
90 | - } else { | ||
91 | - cs->exception_index = EXCP_DATA_ABORT; | ||
92 | - } | ||
93 | - cpu_loop_exit_restore(cs, retaddr); | ||
94 | -#else | ||
95 | - hwaddr phys_addr; | ||
96 | - target_ulong page_size; | ||
97 | - int prot, ret; | ||
98 | - MemTxAttrs attrs = {}; | ||
99 | - ARMMMUFaultInfo fi = {}; | ||
100 | - | ||
101 | - /* | ||
102 | - * Walk the page table and (if the mapping exists) add the page | ||
103 | - * to the TLB. On success, return true. Otherwise, if probing, | ||
104 | - * return false. Otherwise populate fsr with ARM DFSR/IFSR fault | ||
105 | - * register format, and signal the fault. | ||
106 | - */ | ||
107 | - ret = get_phys_addr(&cpu->env, address, access_type, | ||
108 | - core_to_arm_mmu_idx(&cpu->env, mmu_idx), | ||
109 | - &phys_addr, &attrs, &prot, &page_size, &fi, NULL); | ||
110 | - if (likely(!ret)) { | ||
111 | - /* | ||
112 | - * Map a single [sub]page. Regions smaller than our declared | ||
113 | - * target page size are handled specially, so for those we | ||
114 | - * pass in the exact addresses. | ||
115 | - */ | ||
116 | - if (page_size >= TARGET_PAGE_SIZE) { | ||
117 | - phys_addr &= TARGET_PAGE_MASK; | ||
118 | - address &= TARGET_PAGE_MASK; | ||
119 | - } | ||
120 | - tlb_set_page_with_attrs(cs, address, phys_addr, attrs, | ||
121 | - prot, mmu_idx, page_size); | ||
122 | - return true; | ||
123 | - } else if (probe) { | ||
124 | - return false; | ||
125 | - } else { | ||
126 | - /* now we have a real cpu fault */ | ||
127 | - cpu_restore_state(cs, retaddr, true); | ||
128 | - arm_deliver_fault(cpu, address, access_type, mmu_idx, &fi); | ||
129 | - } | ||
130 | -#endif | ||
131 | -} | ||
132 | - | ||
133 | /* Note that signed overflow is undefined in C. The following routines are | ||
134 | careful to use unsigned types where modulo arithmetic is required. | ||
135 | Failure to do so _will_ break on newer gcc. */ | ||
136 | diff --git a/target/arm/op_helper.c b/target/arm/op_helper.c | ||
137 | index XXXXXXX..XXXXXXX 100644 | ||
138 | --- a/target/arm/op_helper.c | ||
139 | +++ b/target/arm/op_helper.c | ||
140 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(neon_tbl)(uint32_t ireg, uint32_t def, void *vn, | ||
141 | return val; | ||
142 | } | ||
143 | |||
144 | -#if !defined(CONFIG_USER_ONLY) | ||
145 | - | ||
146 | -static inline uint32_t merge_syn_data_abort(uint32_t template_syn, | ||
147 | - unsigned int target_el, | ||
148 | - bool same_el, bool ea, | ||
149 | - bool s1ptw, bool is_write, | ||
150 | - int fsc) | ||
151 | -{ | ||
152 | - uint32_t syn; | ||
153 | - | ||
154 | - /* | ||
155 | - * ISV is only set for data aborts routed to EL2 and | ||
156 | - * never for stage-1 page table walks faulting on stage 2. | ||
157 | - * | ||
158 | - * Furthermore, ISV is only set for certain kinds of load/stores. | ||
159 | - * If the template syndrome does not have ISV set, we should leave | ||
160 | - * it cleared. | ||
161 | - * | ||
162 | - * See ARMv8 specs, D7-1974: | ||
163 | - * ISS encoding for an exception from a Data Abort, the | ||
164 | - * ISV field. | ||
165 | - */ | ||
166 | - if (!(template_syn & ARM_EL_ISV) || target_el != 2 || s1ptw) { | ||
167 | - syn = syn_data_abort_no_iss(same_el, | ||
168 | - ea, 0, s1ptw, is_write, fsc); | ||
169 | - } else { | ||
170 | - /* | ||
171 | - * Fields: IL, ISV, SAS, SSE, SRT, SF and AR come from the template | ||
172 | - * syndrome created at translation time. | ||
173 | - * Now we create the runtime syndrome with the remaining fields. | ||
174 | - */ | ||
175 | - syn = syn_data_abort_with_iss(same_el, | ||
176 | - 0, 0, 0, 0, 0, | ||
177 | - ea, 0, s1ptw, is_write, fsc, | ||
178 | - false); | ||
179 | - /* Merge the runtime syndrome with the template syndrome. */ | ||
180 | - syn |= template_syn; | ||
181 | - } | ||
182 | - return syn; | ||
183 | -} | ||
184 | - | ||
185 | -void arm_deliver_fault(ARMCPU *cpu, vaddr addr, MMUAccessType access_type, | ||
186 | - int mmu_idx, ARMMMUFaultInfo *fi) | ||
187 | -{ | ||
188 | - CPUARMState *env = &cpu->env; | ||
189 | - int target_el; | ||
190 | - bool same_el; | ||
191 | - uint32_t syn, exc, fsr, fsc; | ||
192 | - ARMMMUIdx arm_mmu_idx = core_to_arm_mmu_idx(env, mmu_idx); | ||
193 | - | ||
194 | - target_el = exception_target_el(env); | ||
195 | - if (fi->stage2) { | ||
196 | - target_el = 2; | ||
197 | - env->cp15.hpfar_el2 = extract64(fi->s2addr, 12, 47) << 4; | ||
198 | - } | ||
199 | - same_el = (arm_current_el(env) == target_el); | ||
200 | - | ||
201 | - if (target_el == 2 || arm_el_is_aa64(env, target_el) || | ||
202 | - arm_s1_regime_using_lpae_format(env, arm_mmu_idx)) { | ||
203 | - /* | ||
204 | - * LPAE format fault status register : bottom 6 bits are | ||
205 | - * status code in the same form as needed for syndrome | ||
206 | - */ | ||
207 | - fsr = arm_fi_to_lfsc(fi); | ||
208 | - fsc = extract32(fsr, 0, 6); | ||
209 | - } else { | ||
210 | - fsr = arm_fi_to_sfsc(fi); | ||
211 | - /* | ||
212 | - * Short format FSR : this fault will never actually be reported | ||
213 | - * to an EL that uses a syndrome register. Use a (currently) | ||
214 | - * reserved FSR code in case the constructed syndrome does leak | ||
215 | - * into the guest somehow. | ||
216 | - */ | ||
217 | - fsc = 0x3f; | ||
218 | - } | ||
219 | - | ||
220 | - if (access_type == MMU_INST_FETCH) { | ||
221 | - syn = syn_insn_abort(same_el, fi->ea, fi->s1ptw, fsc); | ||
222 | - exc = EXCP_PREFETCH_ABORT; | ||
223 | - } else { | ||
224 | - syn = merge_syn_data_abort(env->exception.syndrome, target_el, | ||
225 | - same_el, fi->ea, fi->s1ptw, | ||
226 | - access_type == MMU_DATA_STORE, | ||
227 | - fsc); | ||
228 | - if (access_type == MMU_DATA_STORE | ||
229 | - && arm_feature(env, ARM_FEATURE_V6)) { | ||
230 | - fsr |= (1 << 11); | ||
231 | - } | ||
232 | - exc = EXCP_DATA_ABORT; | ||
233 | - } | ||
234 | - | ||
235 | - env->exception.vaddress = addr; | ||
236 | - env->exception.fsr = fsr; | ||
237 | - raise_exception(env, exc, syn, target_el); | ||
238 | -} | ||
239 | - | ||
240 | -/* Raise a data fault alignment exception for the specified virtual address */ | ||
241 | -void arm_cpu_do_unaligned_access(CPUState *cs, vaddr vaddr, | ||
242 | - MMUAccessType access_type, | ||
243 | - int mmu_idx, uintptr_t retaddr) | ||
244 | -{ | ||
245 | - ARMCPU *cpu = ARM_CPU(cs); | ||
246 | - ARMMMUFaultInfo fi = {}; | ||
247 | - | ||
248 | - /* now we have a real cpu fault */ | ||
249 | - cpu_restore_state(cs, retaddr, true); | ||
250 | - | ||
251 | - fi.type = ARMFault_Alignment; | ||
252 | - arm_deliver_fault(cpu, vaddr, access_type, mmu_idx, &fi); | ||
253 | -} | ||
254 | - | ||
255 | -/* | ||
256 | - * arm_cpu_do_transaction_failed: handle a memory system error response | ||
257 | - * (eg "no device/memory present at address") by raising an external abort | ||
258 | - * exception | ||
259 | - */ | ||
260 | -void arm_cpu_do_transaction_failed(CPUState *cs, hwaddr physaddr, | ||
261 | - vaddr addr, unsigned size, | ||
262 | - MMUAccessType access_type, | ||
263 | - int mmu_idx, MemTxAttrs attrs, | ||
264 | - MemTxResult response, uintptr_t retaddr) | ||
265 | -{ | ||
266 | - ARMCPU *cpu = ARM_CPU(cs); | ||
267 | - ARMMMUFaultInfo fi = {}; | ||
268 | - | ||
269 | - /* now we have a real cpu fault */ | ||
270 | - cpu_restore_state(cs, retaddr, true); | ||
271 | - | ||
272 | - fi.ea = arm_extabort_type(response); | ||
273 | - fi.type = ARMFault_SyncExternal; | ||
274 | - arm_deliver_fault(cpu, addr, access_type, mmu_idx, &fi); | ||
275 | -} | ||
276 | - | ||
277 | -#endif /* !defined(CONFIG_USER_ONLY) */ | ||
278 | - | ||
279 | void HELPER(v8m_stackcheck)(CPUARMState *env, uint32_t newvalue) | ||
280 | { | ||
281 | /* | ||
282 | diff --git a/target/arm/tlb_helper.c b/target/arm/tlb_helper.c | ||
283 | new file mode 100644 | ||
284 | index XXXXXXX..XXXXXXX | ||
285 | --- /dev/null | ||
286 | +++ b/target/arm/tlb_helper.c | ||
287 | @@ -XXX,XX +XXX,XX @@ | ||
288 | +/* | ||
289 | + * ARM TLB (Translation lookaside buffer) helpers. | ||
290 | + * | ||
291 | + * This code is licensed under the GNU GPL v2 or later. | ||
292 | + * | ||
293 | + * SPDX-License-Identifier: GPL-2.0-or-later | ||
294 | + */ | ||
295 | +#include "qemu/osdep.h" | ||
296 | +#include "cpu.h" | ||
297 | +#include "internals.h" | ||
298 | +#include "exec/exec-all.h" | ||
299 | + | ||
300 | +#if !defined(CONFIG_USER_ONLY) | ||
301 | + | ||
302 | +static inline uint32_t merge_syn_data_abort(uint32_t template_syn, | ||
303 | + unsigned int target_el, | ||
304 | + bool same_el, bool ea, | ||
305 | + bool s1ptw, bool is_write, | ||
306 | + int fsc) | ||
307 | +{ | ||
308 | + uint32_t syn; | ||
309 | + | ||
310 | + /* | ||
311 | + * ISV is only set for data aborts routed to EL2 and | ||
312 | + * never for stage-1 page table walks faulting on stage 2. | ||
313 | + * | ||
314 | + * Furthermore, ISV is only set for certain kinds of load/stores. | ||
315 | + * If the template syndrome does not have ISV set, we should leave | ||
316 | + * it cleared. | ||
317 | + * | ||
318 | + * See ARMv8 specs, D7-1974: | ||
319 | + * ISS encoding for an exception from a Data Abort, the | ||
320 | + * ISV field. | ||
321 | + */ | ||
322 | + if (!(template_syn & ARM_EL_ISV) || target_el != 2 || s1ptw) { | ||
323 | + syn = syn_data_abort_no_iss(same_el, | ||
324 | + ea, 0, s1ptw, is_write, fsc); | ||
325 | + } else { | ||
326 | + /* | ||
327 | + * Fields: IL, ISV, SAS, SSE, SRT, SF and AR come from the template | ||
328 | + * syndrome created at translation time. | ||
329 | + * Now we create the runtime syndrome with the remaining fields. | ||
330 | + */ | ||
331 | + syn = syn_data_abort_with_iss(same_el, | ||
332 | + 0, 0, 0, 0, 0, | ||
333 | + ea, 0, s1ptw, is_write, fsc, | ||
334 | + false); | ||
335 | + /* Merge the runtime syndrome with the template syndrome. */ | ||
336 | + syn |= template_syn; | ||
337 | + } | ||
338 | + return syn; | ||
339 | +} | ||
340 | + | ||
341 | +static void QEMU_NORETURN arm_deliver_fault(ARMCPU *cpu, vaddr addr, | ||
342 | + MMUAccessType access_type, | ||
343 | + int mmu_idx, ARMMMUFaultInfo *fi) | ||
344 | +{ | ||
345 | + CPUARMState *env = &cpu->env; | ||
346 | + int target_el; | ||
347 | + bool same_el; | ||
348 | + uint32_t syn, exc, fsr, fsc; | ||
349 | + ARMMMUIdx arm_mmu_idx = core_to_arm_mmu_idx(env, mmu_idx); | ||
350 | + | ||
351 | + target_el = exception_target_el(env); | ||
352 | + if (fi->stage2) { | ||
353 | + target_el = 2; | ||
354 | + env->cp15.hpfar_el2 = extract64(fi->s2addr, 12, 47) << 4; | ||
355 | + } | ||
356 | + same_el = (arm_current_el(env) == target_el); | ||
357 | + | ||
358 | + if (target_el == 2 || arm_el_is_aa64(env, target_el) || | ||
359 | + arm_s1_regime_using_lpae_format(env, arm_mmu_idx)) { | ||
360 | + /* | ||
361 | + * LPAE format fault status register : bottom 6 bits are | ||
362 | + * status code in the same form as needed for syndrome | ||
363 | + */ | ||
364 | + fsr = arm_fi_to_lfsc(fi); | ||
365 | + fsc = extract32(fsr, 0, 6); | ||
366 | + } else { | ||
367 | + fsr = arm_fi_to_sfsc(fi); | ||
368 | + /* | ||
369 | + * Short format FSR : this fault will never actually be reported | ||
370 | + * to an EL that uses a syndrome register. Use a (currently) | ||
371 | + * reserved FSR code in case the constructed syndrome does leak | ||
372 | + * into the guest somehow. | ||
373 | + */ | ||
374 | + fsc = 0x3f; | ||
375 | + } | ||
376 | + | ||
377 | + if (access_type == MMU_INST_FETCH) { | ||
378 | + syn = syn_insn_abort(same_el, fi->ea, fi->s1ptw, fsc); | ||
379 | + exc = EXCP_PREFETCH_ABORT; | ||
380 | + } else { | ||
381 | + syn = merge_syn_data_abort(env->exception.syndrome, target_el, | ||
382 | + same_el, fi->ea, fi->s1ptw, | ||
383 | + access_type == MMU_DATA_STORE, | ||
384 | + fsc); | ||
385 | + if (access_type == MMU_DATA_STORE | ||
386 | + && arm_feature(env, ARM_FEATURE_V6)) { | ||
387 | + fsr |= (1 << 11); | ||
388 | + } | ||
389 | + exc = EXCP_DATA_ABORT; | ||
390 | + } | ||
391 | + | ||
392 | + env->exception.vaddress = addr; | ||
393 | + env->exception.fsr = fsr; | ||
394 | + raise_exception(env, exc, syn, target_el); | ||
395 | +} | ||
396 | + | ||
397 | +/* Raise a data fault alignment exception for the specified virtual address */ | ||
398 | +void arm_cpu_do_unaligned_access(CPUState *cs, vaddr vaddr, | ||
399 | + MMUAccessType access_type, | ||
400 | + int mmu_idx, uintptr_t retaddr) | ||
401 | +{ | ||
402 | + ARMCPU *cpu = ARM_CPU(cs); | ||
403 | + ARMMMUFaultInfo fi = {}; | ||
404 | + | ||
405 | + /* now we have a real cpu fault */ | ||
406 | + cpu_restore_state(cs, retaddr, true); | ||
407 | + | ||
408 | + fi.type = ARMFault_Alignment; | ||
409 | + arm_deliver_fault(cpu, vaddr, access_type, mmu_idx, &fi); | ||
410 | +} | ||
411 | + | ||
412 | +/* | ||
413 | + * arm_cpu_do_transaction_failed: handle a memory system error response | ||
414 | + * (eg "no device/memory present at address") by raising an external abort | ||
415 | + * exception | ||
416 | + */ | ||
417 | +void arm_cpu_do_transaction_failed(CPUState *cs, hwaddr physaddr, | ||
418 | + vaddr addr, unsigned size, | ||
419 | + MMUAccessType access_type, | ||
420 | + int mmu_idx, MemTxAttrs attrs, | ||
421 | + MemTxResult response, uintptr_t retaddr) | ||
422 | +{ | ||
423 | + ARMCPU *cpu = ARM_CPU(cs); | ||
424 | + ARMMMUFaultInfo fi = {}; | ||
425 | + | ||
426 | + /* now we have a real cpu fault */ | ||
427 | + cpu_restore_state(cs, retaddr, true); | ||
428 | + | ||
429 | + fi.ea = arm_extabort_type(response); | ||
430 | + fi.type = ARMFault_SyncExternal; | ||
431 | + arm_deliver_fault(cpu, addr, access_type, mmu_idx, &fi); | ||
432 | +} | ||
433 | + | ||
434 | +#endif /* !defined(CONFIG_USER_ONLY) */ | ||
435 | + | ||
436 | +bool arm_cpu_tlb_fill(CPUState *cs, vaddr address, int size, | ||
437 | + MMUAccessType access_type, int mmu_idx, | ||
438 | + bool probe, uintptr_t retaddr) | ||
439 | +{ | ||
440 | + ARMCPU *cpu = ARM_CPU(cs); | ||
441 | + | ||
442 | +#ifdef CONFIG_USER_ONLY | ||
443 | + cpu->env.exception.vaddress = address; | ||
444 | + if (access_type == MMU_INST_FETCH) { | ||
445 | + cs->exception_index = EXCP_PREFETCH_ABORT; | ||
446 | + } else { | ||
447 | + cs->exception_index = EXCP_DATA_ABORT; | ||
448 | + } | ||
449 | + cpu_loop_exit_restore(cs, retaddr); | ||
450 | +#else | ||
451 | + hwaddr phys_addr; | ||
452 | + target_ulong page_size; | ||
453 | + int prot, ret; | ||
454 | + MemTxAttrs attrs = {}; | ||
455 | + ARMMMUFaultInfo fi = {}; | ||
456 | + | ||
457 | + /* | ||
458 | + * Walk the page table and (if the mapping exists) add the page | ||
459 | + * to the TLB. On success, return true. Otherwise, if probing, | ||
460 | + * return false. Otherwise populate fsr with ARM DFSR/IFSR fault | ||
461 | + * register format, and signal the fault. | ||
462 | + */ | ||
463 | + ret = get_phys_addr(&cpu->env, address, access_type, | ||
464 | + core_to_arm_mmu_idx(&cpu->env, mmu_idx), | ||
465 | + &phys_addr, &attrs, &prot, &page_size, &fi, NULL); | ||
466 | + if (likely(!ret)) { | ||
467 | + /* | ||
468 | + * Map a single [sub]page. Regions smaller than our declared | ||
469 | + * target page size are handled specially, so for those we | ||
470 | + * pass in the exact addresses. | ||
471 | + */ | ||
472 | + if (page_size >= TARGET_PAGE_SIZE) { | ||
473 | + phys_addr &= TARGET_PAGE_MASK; | ||
474 | + address &= TARGET_PAGE_MASK; | ||
475 | + } | ||
476 | + tlb_set_page_with_attrs(cs, address, phys_addr, attrs, | ||
477 | + prot, mmu_idx, page_size); | ||
478 | + return true; | ||
479 | + } else if (probe) { | ||
480 | + return false; | ||
481 | + } else { | ||
482 | + /* now we have a real cpu fault */ | ||
483 | + cpu_restore_state(cs, retaddr, true); | ||
484 | + arm_deliver_fault(cpu, address, access_type, mmu_idx, &fi); | ||
485 | + } | ||
486 | +#endif | ||
487 | +} | ||
26 | -- | 488 | -- |
27 | 2.19.0 | 489 | 2.20.1 |
28 | 490 | ||
29 | 491 | diff view generated by jsdifflib |
1 | Add a new Coccinelle script which replaces uses of the inplace | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | byteswapping functions *_to_cpus() and cpu_to_*s() with their | ||
3 | not-in-place equivalents. This is useful for where the swapping | ||
4 | is done on members of a packed struct -- taking the address | ||
5 | of the member to pass it to an inplace function is undefined | ||
6 | behaviour in C. | ||
7 | 2 | ||
3 | To ease the review of the next commit, | ||
4 | move the vfp_exceptbits_to_host() function directly after | ||
5 | vfp_exceptbits_from_host(). Amusingly the diff shows we | ||
6 | are moving vfp_get_fpscr(). | ||
7 | |||
8 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
9 | Message-id: 20190701132516.26392-15-philmd@redhat.com | ||
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | Reviewed-by: Eric Blake <eblake@redhat.com> | ||
10 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
11 | Message-id: 20181009181612.10633-1-peter.maydell@linaro.org | ||
12 | --- | 12 | --- |
13 | scripts/coccinelle/inplace-byteswaps.cocci | 65 ++++++++++++++++++++++ | 13 | target/arm/vfp_helper.c | 52 ++++++++++++++++++++--------------------- |
14 | 1 file changed, 65 insertions(+) | 14 | 1 file changed, 26 insertions(+), 26 deletions(-) |
15 | create mode 100644 scripts/coccinelle/inplace-byteswaps.cocci | ||
16 | 15 | ||
17 | diff --git a/scripts/coccinelle/inplace-byteswaps.cocci b/scripts/coccinelle/inplace-byteswaps.cocci | 16 | diff --git a/target/arm/vfp_helper.c b/target/arm/vfp_helper.c |
18 | new file mode 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
19 | index XXXXXXX..XXXXXXX | 18 | --- a/target/arm/vfp_helper.c |
20 | --- /dev/null | 19 | +++ b/target/arm/vfp_helper.c |
21 | +++ b/scripts/coccinelle/inplace-byteswaps.cocci | 20 | @@ -XXX,XX +XXX,XX @@ static inline int vfp_exceptbits_from_host(int host_bits) |
22 | @@ -XXX,XX +XXX,XX @@ | 21 | return target_bits; |
23 | +// Replace uses of in-place byteswapping functions with calls to the | 22 | } |
24 | +// equivalent not-in-place functions. This is necessary to avoid | 23 | |
25 | +// undefined behaviour if the expression being swapped is a field in a | 24 | -uint32_t HELPER(vfp_get_fpscr)(CPUARMState *env) |
26 | +// packed struct. | 25 | -{ |
26 | - uint32_t i, fpscr; | ||
27 | - | ||
28 | - fpscr = env->vfp.xregs[ARM_VFP_FPSCR] | ||
29 | - | (env->vfp.vec_len << 16) | ||
30 | - | (env->vfp.vec_stride << 20); | ||
31 | - | ||
32 | - i = get_float_exception_flags(&env->vfp.fp_status); | ||
33 | - i |= get_float_exception_flags(&env->vfp.standard_fp_status); | ||
34 | - /* FZ16 does not generate an input denormal exception. */ | ||
35 | - i |= (get_float_exception_flags(&env->vfp.fp_status_f16) | ||
36 | - & ~float_flag_input_denormal); | ||
37 | - fpscr |= vfp_exceptbits_from_host(i); | ||
38 | - | ||
39 | - i = env->vfp.qc[0] | env->vfp.qc[1] | env->vfp.qc[2] | env->vfp.qc[3]; | ||
40 | - fpscr |= i ? FPCR_QC : 0; | ||
41 | - | ||
42 | - return fpscr; | ||
43 | -} | ||
44 | - | ||
45 | -uint32_t vfp_get_fpscr(CPUARMState *env) | ||
46 | -{ | ||
47 | - return HELPER(vfp_get_fpscr)(env); | ||
48 | -} | ||
49 | - | ||
50 | /* Convert vfp exception flags to target form. */ | ||
51 | static inline int vfp_exceptbits_to_host(int target_bits) | ||
52 | { | ||
53 | @@ -XXX,XX +XXX,XX @@ static inline int vfp_exceptbits_to_host(int target_bits) | ||
54 | return host_bits; | ||
55 | } | ||
56 | |||
57 | +uint32_t HELPER(vfp_get_fpscr)(CPUARMState *env) | ||
58 | +{ | ||
59 | + uint32_t i, fpscr; | ||
27 | + | 60 | + |
28 | +@@ | 61 | + fpscr = env->vfp.xregs[ARM_VFP_FPSCR] |
29 | +expression E; | 62 | + | (env->vfp.vec_len << 16) |
30 | +@@ | 63 | + | (env->vfp.vec_stride << 20); |
31 | +-be16_to_cpus(&E); | 64 | + |
32 | ++E = be16_to_cpu(E); | 65 | + i = get_float_exception_flags(&env->vfp.fp_status); |
33 | +@@ | 66 | + i |= get_float_exception_flags(&env->vfp.standard_fp_status); |
34 | +expression E; | 67 | + /* FZ16 does not generate an input denormal exception. */ |
35 | +@@ | 68 | + i |= (get_float_exception_flags(&env->vfp.fp_status_f16) |
36 | +-be32_to_cpus(&E); | 69 | + & ~float_flag_input_denormal); |
37 | ++E = be32_to_cpu(E); | 70 | + fpscr |= vfp_exceptbits_from_host(i); |
38 | +@@ | 71 | + |
39 | +expression E; | 72 | + i = env->vfp.qc[0] | env->vfp.qc[1] | env->vfp.qc[2] | env->vfp.qc[3]; |
40 | +@@ | 73 | + fpscr |= i ? FPCR_QC : 0; |
41 | +-be64_to_cpus(&E); | 74 | + |
42 | ++E = be64_to_cpu(E); | 75 | + return fpscr; |
43 | +@@ | 76 | +} |
44 | +expression E; | 77 | + |
45 | +@@ | 78 | +uint32_t vfp_get_fpscr(CPUARMState *env) |
46 | +-cpu_to_be16s(&E); | 79 | +{ |
47 | ++E = cpu_to_be16(E); | 80 | + return HELPER(vfp_get_fpscr)(env); |
48 | +@@ | 81 | +} |
49 | +expression E; | 82 | + |
50 | +@@ | 83 | void HELPER(vfp_set_fpscr)(CPUARMState *env, uint32_t val) |
51 | +-cpu_to_be32s(&E); | 84 | { |
52 | ++E = cpu_to_be32(E); | 85 | int i; |
53 | +@@ | ||
54 | +expression E; | ||
55 | +@@ | ||
56 | +-cpu_to_be64s(&E); | ||
57 | ++E = cpu_to_be64(E); | ||
58 | +@@ | ||
59 | +expression E; | ||
60 | +@@ | ||
61 | +-le16_to_cpus(&E); | ||
62 | ++E = le16_to_cpu(E); | ||
63 | +@@ | ||
64 | +expression E; | ||
65 | +@@ | ||
66 | +-le32_to_cpus(&E); | ||
67 | ++E = le32_to_cpu(E); | ||
68 | +@@ | ||
69 | +expression E; | ||
70 | +@@ | ||
71 | +-le64_to_cpus(&E); | ||
72 | ++E = le64_to_cpu(E); | ||
73 | +@@ | ||
74 | +expression E; | ||
75 | +@@ | ||
76 | +-cpu_to_le16s(&E); | ||
77 | ++E = cpu_to_le16(E); | ||
78 | +@@ | ||
79 | +expression E; | ||
80 | +@@ | ||
81 | +-cpu_to_le32s(&E); | ||
82 | ++E = cpu_to_le32(E); | ||
83 | +@@ | ||
84 | +expression E; | ||
85 | +@@ | ||
86 | +-cpu_to_le64s(&E); | ||
87 | ++E = cpu_to_le64(E); | ||
88 | -- | 86 | -- |
89 | 2.19.0 | 87 | 2.20.1 |
90 | 88 | ||
91 | 89 | diff view generated by jsdifflib |
1 | From: "Edgar E. Iglesias" <edgar.iglesias@xilinx.com> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | Implement support for 64bit descriptor addresses. | 3 | The vfp_set_fpscr() helper contains code specific to the host |
4 | floating point implementation (here the SoftFloat library). | ||
5 | Extract this code to vfp_set_fpscr_to_host(). | ||
4 | 6 | ||
5 | Reviewed-by: Alistair Francis <alistair.francis@wdc.com> | 7 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
6 | Signed-off-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | 8 | Message-id: 20190701132516.26392-16-philmd@redhat.com |
7 | Message-id: 20181011021931.4249-8-edgar.iglesias@gmail.com | 9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | --- | 11 | --- |
10 | hw/net/cadence_gem.c | 47 ++++++++++++++++++++++++++++++++++++-------- | 12 | target/arm/vfp_helper.c | 127 +++++++++++++++++++++------------------- |
11 | 1 file changed, 39 insertions(+), 8 deletions(-) | 13 | 1 file changed, 66 insertions(+), 61 deletions(-) |
12 | 14 | ||
13 | diff --git a/hw/net/cadence_gem.c b/hw/net/cadence_gem.c | 15 | diff --git a/target/arm/vfp_helper.c b/target/arm/vfp_helper.c |
14 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/hw/net/cadence_gem.c | 17 | --- a/target/arm/vfp_helper.c |
16 | +++ b/hw/net/cadence_gem.c | 18 | +++ b/target/arm/vfp_helper.c |
17 | @@ -XXX,XX +XXX,XX @@ | 19 | @@ -XXX,XX +XXX,XX @@ static inline int vfp_exceptbits_to_host(int target_bits) |
18 | #define GEM_RECEIVE_Q1_PTR (0x00000480 / 4) | 20 | return host_bits; |
19 | #define GEM_RECEIVE_Q7_PTR (GEM_RECEIVE_Q1_PTR + 6) | 21 | } |
20 | 22 | ||
21 | +#define GEM_TBQPH (0x000004C8 / 4) | 23 | -uint32_t HELPER(vfp_get_fpscr)(CPUARMState *env) |
22 | +#define GEM_RBQPH (0x000004D4 / 4) | 24 | -{ |
25 | - uint32_t i, fpscr; | ||
26 | - | ||
27 | - fpscr = env->vfp.xregs[ARM_VFP_FPSCR] | ||
28 | - | (env->vfp.vec_len << 16) | ||
29 | - | (env->vfp.vec_stride << 20); | ||
30 | - | ||
31 | - i = get_float_exception_flags(&env->vfp.fp_status); | ||
32 | - i |= get_float_exception_flags(&env->vfp.standard_fp_status); | ||
33 | - /* FZ16 does not generate an input denormal exception. */ | ||
34 | - i |= (get_float_exception_flags(&env->vfp.fp_status_f16) | ||
35 | - & ~float_flag_input_denormal); | ||
36 | - fpscr |= vfp_exceptbits_from_host(i); | ||
37 | - | ||
38 | - i = env->vfp.qc[0] | env->vfp.qc[1] | env->vfp.qc[2] | env->vfp.qc[3]; | ||
39 | - fpscr |= i ? FPCR_QC : 0; | ||
40 | - | ||
41 | - return fpscr; | ||
42 | -} | ||
43 | - | ||
44 | -uint32_t vfp_get_fpscr(CPUARMState *env) | ||
45 | -{ | ||
46 | - return HELPER(vfp_get_fpscr)(env); | ||
47 | -} | ||
48 | - | ||
49 | -void HELPER(vfp_set_fpscr)(CPUARMState *env, uint32_t val) | ||
50 | +static void vfp_set_fpscr_to_host(CPUARMState *env, uint32_t val) | ||
51 | { | ||
52 | int i; | ||
53 | uint32_t changed = env->vfp.xregs[ARM_VFP_FPSCR]; | ||
54 | |||
55 | - /* When ARMv8.2-FP16 is not supported, FZ16 is RES0. */ | ||
56 | - if (!cpu_isar_feature(aa64_fp16, env_archcpu(env))) { | ||
57 | - val &= ~FPCR_FZ16; | ||
58 | - } | ||
59 | - | ||
60 | - if (arm_feature(env, ARM_FEATURE_M)) { | ||
61 | - /* | ||
62 | - * M profile FPSCR is RES0 for the QC, STRIDE, FZ16, LEN bits | ||
63 | - * and also for the trapped-exception-handling bits IxE. | ||
64 | - */ | ||
65 | - val &= 0xf7c0009f; | ||
66 | - } | ||
67 | - | ||
68 | - /* | ||
69 | - * We don't implement trapped exception handling, so the | ||
70 | - * trap enable bits, IDE|IXE|UFE|OFE|DZE|IOE are all RAZ/WI (not RES0!) | ||
71 | - * | ||
72 | - * If we exclude the exception flags, IOC|DZC|OFC|UFC|IXC|IDC | ||
73 | - * (which are stored in fp_status), and the other RES0 bits | ||
74 | - * in between, then we clear all of the low 16 bits. | ||
75 | - */ | ||
76 | - env->vfp.xregs[ARM_VFP_FPSCR] = val & 0xf7c80000; | ||
77 | - env->vfp.vec_len = (val >> 16) & 7; | ||
78 | - env->vfp.vec_stride = (val >> 20) & 3; | ||
79 | - | ||
80 | - /* | ||
81 | - * The bit we set within fpscr_q is arbitrary; the register as a | ||
82 | - * whole being zero/non-zero is what counts. | ||
83 | - */ | ||
84 | - env->vfp.qc[0] = val & FPCR_QC; | ||
85 | - env->vfp.qc[1] = 0; | ||
86 | - env->vfp.qc[2] = 0; | ||
87 | - env->vfp.qc[3] = 0; | ||
88 | - | ||
89 | changed ^= val; | ||
90 | if (changed & (3 << 22)) { | ||
91 | i = (val >> 22) & 3; | ||
92 | @@ -XXX,XX +XXX,XX @@ void HELPER(vfp_set_fpscr)(CPUARMState *env, uint32_t val) | ||
93 | set_float_exception_flags(0, &env->vfp.standard_fp_status); | ||
94 | } | ||
95 | |||
96 | +uint32_t HELPER(vfp_get_fpscr)(CPUARMState *env) | ||
97 | +{ | ||
98 | + uint32_t i, fpscr; | ||
23 | + | 99 | + |
24 | #define GEM_INT_Q1_ENABLE (0x00000600 / 4) | 100 | + fpscr = env->vfp.xregs[ARM_VFP_FPSCR] |
25 | #define GEM_INT_Q7_ENABLE (GEM_INT_Q1_ENABLE + 6) | 101 | + | (env->vfp.vec_len << 16) |
26 | 102 | + | (env->vfp.vec_stride << 20); | |
27 | @@ -XXX,XX +XXX,XX @@ static int get_queue_from_screen(CadenceGEMState *s, uint8_t *rxbuf_ptr, | ||
28 | return 0; | ||
29 | } | ||
30 | |||
31 | +static hwaddr gem_get_desc_addr(CadenceGEMState *s, bool tx, int q) | ||
32 | +{ | ||
33 | + hwaddr desc_addr = 0; | ||
34 | + | 103 | + |
35 | + if (s->regs[GEM_DMACFG] & GEM_DMACFG_ADDR_64B) { | 104 | + i = get_float_exception_flags(&env->vfp.fp_status); |
36 | + desc_addr = s->regs[tx ? GEM_TBQPH : GEM_RBQPH]; | 105 | + i |= get_float_exception_flags(&env->vfp.standard_fp_status); |
37 | + } | 106 | + /* FZ16 does not generate an input denormal exception. */ |
38 | + desc_addr <<= 32; | 107 | + i |= (get_float_exception_flags(&env->vfp.fp_status_f16) |
39 | + desc_addr |= tx ? s->tx_desc_addr[q] : s->rx_desc_addr[q]; | 108 | + & ~float_flag_input_denormal); |
40 | + return desc_addr; | 109 | + fpscr |= vfp_exceptbits_from_host(i); |
110 | + | ||
111 | + i = env->vfp.qc[0] | env->vfp.qc[1] | env->vfp.qc[2] | env->vfp.qc[3]; | ||
112 | + fpscr |= i ? FPCR_QC : 0; | ||
113 | + | ||
114 | + return fpscr; | ||
41 | +} | 115 | +} |
42 | + | 116 | + |
43 | +static hwaddr gem_get_tx_desc_addr(CadenceGEMState *s, int q) | 117 | +uint32_t vfp_get_fpscr(CPUARMState *env) |
44 | +{ | 118 | +{ |
45 | + return gem_get_desc_addr(s, true, q); | 119 | + return HELPER(vfp_get_fpscr)(env); |
46 | +} | 120 | +} |
47 | + | 121 | + |
48 | +static hwaddr gem_get_rx_desc_addr(CadenceGEMState *s, int q) | 122 | +void HELPER(vfp_set_fpscr)(CPUARMState *env, uint32_t val) |
49 | +{ | 123 | +{ |
50 | + return gem_get_desc_addr(s, false, q); | 124 | + /* When ARMv8.2-FP16 is not supported, FZ16 is RES0. */ |
125 | + if (!cpu_isar_feature(aa64_fp16, env_archcpu(env))) { | ||
126 | + val &= ~FPCR_FZ16; | ||
127 | + } | ||
128 | + | ||
129 | + if (arm_feature(env, ARM_FEATURE_M)) { | ||
130 | + /* | ||
131 | + * M profile FPSCR is RES0 for the QC, STRIDE, FZ16, LEN bits | ||
132 | + * and also for the trapped-exception-handling bits IxE. | ||
133 | + */ | ||
134 | + val &= 0xf7c0009f; | ||
135 | + } | ||
136 | + | ||
137 | + /* | ||
138 | + * We don't implement trapped exception handling, so the | ||
139 | + * trap enable bits, IDE|IXE|UFE|OFE|DZE|IOE are all RAZ/WI (not RES0!) | ||
140 | + * | ||
141 | + * If we exclude the exception flags, IOC|DZC|OFC|UFC|IXC|IDC | ||
142 | + * (which are stored in fp_status), and the other RES0 bits | ||
143 | + * in between, then we clear all of the low 16 bits. | ||
144 | + */ | ||
145 | + env->vfp.xregs[ARM_VFP_FPSCR] = val & 0xf7c80000; | ||
146 | + env->vfp.vec_len = (val >> 16) & 7; | ||
147 | + env->vfp.vec_stride = (val >> 20) & 3; | ||
148 | + | ||
149 | + /* | ||
150 | + * The bit we set within fpscr_q is arbitrary; the register as a | ||
151 | + * whole being zero/non-zero is what counts. | ||
152 | + */ | ||
153 | + env->vfp.qc[0] = val & FPCR_QC; | ||
154 | + env->vfp.qc[1] = 0; | ||
155 | + env->vfp.qc[2] = 0; | ||
156 | + env->vfp.qc[3] = 0; | ||
157 | + | ||
158 | + vfp_set_fpscr_to_host(env, val); | ||
51 | +} | 159 | +} |
52 | + | 160 | + |
53 | static void gem_get_rx_desc(CadenceGEMState *s, int q) | 161 | void vfp_set_fpscr(CPUARMState *env, uint32_t val) |
54 | { | 162 | { |
55 | - DB_PRINT("read descriptor 0x%x\n", (unsigned)s->rx_desc_addr[q]); | 163 | HELPER(vfp_set_fpscr)(env, val); |
56 | + hwaddr desc_addr = gem_get_rx_desc_addr(s, q); | ||
57 | + | ||
58 | + DB_PRINT("read descriptor 0x%" HWADDR_PRIx "\n", desc_addr); | ||
59 | + | ||
60 | /* read current descriptor */ | ||
61 | - address_space_read(&s->dma_as, s->rx_desc_addr[q], MEMTXATTRS_UNSPECIFIED, | ||
62 | + address_space_read(&s->dma_as, desc_addr, MEMTXATTRS_UNSPECIFIED, | ||
63 | (uint8_t *)s->rx_desc[q], | ||
64 | sizeof(uint32_t) * gem_get_desc_len(s, true)); | ||
65 | |||
66 | /* Descriptor owned by software ? */ | ||
67 | if (rx_desc_get_ownership(s->rx_desc[q]) == 1) { | ||
68 | - DB_PRINT("descriptor 0x%x owned by sw.\n", | ||
69 | - (unsigned)s->rx_desc_addr[q]); | ||
70 | + DB_PRINT("descriptor 0x%" HWADDR_PRIx " owned by sw.\n", desc_addr); | ||
71 | s->regs[GEM_RXSTATUS] |= GEM_RXSTATUS_NOBUF; | ||
72 | s->regs[GEM_ISR] |= GEM_INT_RXUSED & ~(s->regs[GEM_IMR]); | ||
73 | /* Handle interrupt consequences */ | ||
74 | @@ -XXX,XX +XXX,XX @@ static ssize_t gem_receive(NetClientState *nc, const uint8_t *buf, size_t size) | ||
75 | q = get_queue_from_screen(s, rxbuf_ptr, rxbufsize); | ||
76 | |||
77 | while (bytes_to_copy) { | ||
78 | + hwaddr desc_addr; | ||
79 | + | ||
80 | /* Do nothing if receive is not enabled. */ | ||
81 | if (!gem_can_receive(nc)) { | ||
82 | assert(!first_desc); | ||
83 | @@ -XXX,XX +XXX,XX @@ static ssize_t gem_receive(NetClientState *nc, const uint8_t *buf, size_t size) | ||
84 | } | ||
85 | |||
86 | /* Descriptor write-back. */ | ||
87 | - address_space_write(&s->dma_as, s->rx_desc_addr[q], | ||
88 | + desc_addr = gem_get_rx_desc_addr(s, q); | ||
89 | + address_space_write(&s->dma_as, desc_addr, | ||
90 | MEMTXATTRS_UNSPECIFIED, | ||
91 | (uint8_t *)s->rx_desc[q], | ||
92 | sizeof(uint32_t) * gem_get_desc_len(s, true)); | ||
93 | @@ -XXX,XX +XXX,XX @@ static void gem_transmit(CadenceGEMState *s) | ||
94 | |||
95 | for (q = s->num_priority_queues - 1; q >= 0; q--) { | ||
96 | /* read current descriptor */ | ||
97 | - packet_desc_addr = s->tx_desc_addr[q]; | ||
98 | + packet_desc_addr = gem_get_tx_desc_addr(s, q); | ||
99 | |||
100 | DB_PRINT("read descriptor 0x%" HWADDR_PRIx "\n", packet_desc_addr); | ||
101 | address_space_read(&s->dma_as, packet_desc_addr, | ||
102 | @@ -XXX,XX +XXX,XX @@ static void gem_transmit(CadenceGEMState *s) | ||
103 | /* Last descriptor for this packet; hand the whole thing off */ | ||
104 | if (tx_desc_get_last(desc)) { | ||
105 | uint32_t desc_first[DESC_MAX_NUM_WORDS]; | ||
106 | + hwaddr desc_addr = gem_get_tx_desc_addr(s, q); | ||
107 | |||
108 | /* Modify the 1st descriptor of this packet to be owned by | ||
109 | * the processor. | ||
110 | */ | ||
111 | - address_space_read(&s->dma_as, s->tx_desc_addr[q], | ||
112 | + address_space_read(&s->dma_as, desc_addr, | ||
113 | MEMTXATTRS_UNSPECIFIED, | ||
114 | (uint8_t *)desc_first, | ||
115 | sizeof(desc_first)); | ||
116 | tx_desc_set_used(desc_first); | ||
117 | - address_space_write(&s->dma_as, s->tx_desc_addr[q], | ||
118 | + address_space_write(&s->dma_as, desc_addr, | ||
119 | MEMTXATTRS_UNSPECIFIED, | ||
120 | (uint8_t *)desc_first, | ||
121 | sizeof(desc_first)); | ||
122 | -- | 164 | -- |
123 | 2.19.0 | 165 | 2.20.1 |
124 | 166 | ||
125 | 167 | diff view generated by jsdifflib |
1 | From: "Edgar E. Iglesias" <edgar.iglesias@xilinx.com> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | Disable the Timestamping Unit feature bit since QEMU does not | 3 | The vfp_set_fpscr() helper contains code specific to the host |
4 | yet support it. This allows guest SW to correctly probe for | 4 | floating point implementation (here the SoftFloat library). |
5 | its existance. | 5 | Extract this code to vfp_set_fpscr_from_host(). |
6 | 6 | ||
7 | Reviewed-by: Alistair Francis <alistair.francis@wdc.com> | 7 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
8 | Signed-off-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | 8 | Message-id: 20190701132516.26392-17-philmd@redhat.com |
9 | Message-id: 20181011021931.4249-2-edgar.iglesias@gmail.com | 9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 11 | --- |
12 | hw/net/cadence_gem.c | 2 +- | 12 | target/arm/vfp_helper.c | 19 +++++++++++++------ |
13 | 1 file changed, 1 insertion(+), 1 deletion(-) | 13 | 1 file changed, 13 insertions(+), 6 deletions(-) |
14 | 14 | ||
15 | diff --git a/hw/net/cadence_gem.c b/hw/net/cadence_gem.c | 15 | diff --git a/target/arm/vfp_helper.c b/target/arm/vfp_helper.c |
16 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/hw/net/cadence_gem.c | 17 | --- a/target/arm/vfp_helper.c |
18 | +++ b/hw/net/cadence_gem.c | 18 | +++ b/target/arm/vfp_helper.c |
19 | @@ -XXX,XX +XXX,XX @@ static void gem_reset(DeviceState *d) | 19 | @@ -XXX,XX +XXX,XX @@ static inline int vfp_exceptbits_to_host(int target_bits) |
20 | s->regs[GEM_MODID] = s->revision; | 20 | return host_bits; |
21 | s->regs[GEM_DESCONF] = 0x02500111; | 21 | } |
22 | s->regs[GEM_DESCONF2] = 0x2ab13fff; | 22 | |
23 | - s->regs[GEM_DESCONF5] = 0x002f2145; | 23 | +static uint32_t vfp_get_fpscr_from_host(CPUARMState *env) |
24 | + s->regs[GEM_DESCONF5] = 0x002f2045; | 24 | +{ |
25 | s->regs[GEM_DESCONF6] = 0x00000200; | 25 | + uint32_t i; |
26 | 26 | + | |
27 | /* Set MAC address */ | 27 | + i = get_float_exception_flags(&env->vfp.fp_status); |
28 | + i |= get_float_exception_flags(&env->vfp.standard_fp_status); | ||
29 | + /* FZ16 does not generate an input denormal exception. */ | ||
30 | + i |= (get_float_exception_flags(&env->vfp.fp_status_f16) | ||
31 | + & ~float_flag_input_denormal); | ||
32 | + return vfp_exceptbits_from_host(i); | ||
33 | +} | ||
34 | + | ||
35 | static void vfp_set_fpscr_to_host(CPUARMState *env, uint32_t val) | ||
36 | { | ||
37 | int i; | ||
38 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(vfp_get_fpscr)(CPUARMState *env) | ||
39 | | (env->vfp.vec_len << 16) | ||
40 | | (env->vfp.vec_stride << 20); | ||
41 | |||
42 | - i = get_float_exception_flags(&env->vfp.fp_status); | ||
43 | - i |= get_float_exception_flags(&env->vfp.standard_fp_status); | ||
44 | - /* FZ16 does not generate an input denormal exception. */ | ||
45 | - i |= (get_float_exception_flags(&env->vfp.fp_status_f16) | ||
46 | - & ~float_flag_input_denormal); | ||
47 | - fpscr |= vfp_exceptbits_from_host(i); | ||
48 | + fpscr |= vfp_get_fpscr_from_host(env); | ||
49 | |||
50 | i = env->vfp.qc[0] | env->vfp.qc[1] | env->vfp.qc[2] | env->vfp.qc[3]; | ||
51 | fpscr |= i ? FPCR_QC : 0; | ||
28 | -- | 52 | -- |
29 | 2.19.0 | 53 | 2.20.1 |
30 | 54 | ||
31 | 55 | diff view generated by jsdifflib |
1 | From: "Edgar E. Iglesias" <edgar.iglesias@xilinx.com> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | Use uint32_t instead of unsigned to describe 32bit descriptor words. | 3 | This code is specific to the SoftFloat floating-point |
4 | implementation, which is only used by TCG. | ||
4 | 5 | ||
5 | Reviewed-by: Alistair Francis <alistair.francis@wdc.com> | 6 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
6 | Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> | 7 | Message-id: 20190701132516.26392-18-philmd@redhat.com |
7 | Signed-off-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | 8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
8 | Message-id: 20181011021931.4249-4-edgar.iglesias@gmail.com | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | --- | 10 | --- |
11 | include/hw/net/cadence_gem.h | 2 +- | 11 | target/arm/vfp_helper.c | 26 +++++++++++++++++++++++--- |
12 | hw/net/cadence_gem.c | 42 ++++++++++++++++++------------------ | 12 | 1 file changed, 23 insertions(+), 3 deletions(-) |
13 | 2 files changed, 22 insertions(+), 22 deletions(-) | ||
14 | 13 | ||
15 | diff --git a/include/hw/net/cadence_gem.h b/include/hw/net/cadence_gem.h | 14 | diff --git a/target/arm/vfp_helper.c b/target/arm/vfp_helper.c |
16 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/include/hw/net/cadence_gem.h | 16 | --- a/target/arm/vfp_helper.c |
18 | +++ b/include/hw/net/cadence_gem.h | 17 | +++ b/target/arm/vfp_helper.c |
19 | @@ -XXX,XX +XXX,XX @@ typedef struct CadenceGEMState { | ||
20 | |||
21 | uint8_t can_rx_state; /* Debug only */ | ||
22 | |||
23 | - unsigned rx_desc[MAX_PRIORITY_QUEUES][2]; | ||
24 | + uint32_t rx_desc[MAX_PRIORITY_QUEUES][2]; | ||
25 | |||
26 | bool sar_active[4]; | ||
27 | } CadenceGEMState; | ||
28 | diff --git a/hw/net/cadence_gem.c b/hw/net/cadence_gem.c | ||
29 | index XXXXXXX..XXXXXXX 100644 | ||
30 | --- a/hw/net/cadence_gem.c | ||
31 | +++ b/hw/net/cadence_gem.c | ||
32 | @@ -XXX,XX +XXX,XX @@ | 18 | @@ -XXX,XX +XXX,XX @@ |
33 | 19 | */ | |
34 | #define GEM_MODID_VALUE 0x00020118 | 20 | |
35 | 21 | #include "qemu/osdep.h" | |
36 | -static inline unsigned tx_desc_get_buffer(unsigned *desc) | 22 | -#include "qemu/log.h" |
37 | +static inline unsigned tx_desc_get_buffer(uint32_t *desc) | 23 | #include "cpu.h" |
24 | #include "exec/helper-proto.h" | ||
25 | -#include "fpu/softfloat.h" | ||
26 | #include "internals.h" | ||
27 | - | ||
28 | +#ifdef CONFIG_TCG | ||
29 | +#include "qemu/log.h" | ||
30 | +#include "fpu/softfloat.h" | ||
31 | +#endif | ||
32 | |||
33 | /* VFP support. We follow the convention used for VFP instructions: | ||
34 | Single precision routines have a "s" suffix, double precision a | ||
35 | "d" suffix. */ | ||
36 | |||
37 | +#ifdef CONFIG_TCG | ||
38 | + | ||
39 | /* Convert host exception flags to vfp form. */ | ||
40 | static inline int vfp_exceptbits_from_host(int host_bits) | ||
38 | { | 41 | { |
39 | return desc[0]; | 42 | @@ -XXX,XX +XXX,XX @@ static void vfp_set_fpscr_to_host(CPUARMState *env, uint32_t val) |
43 | set_float_exception_flags(0, &env->vfp.standard_fp_status); | ||
40 | } | 44 | } |
41 | 45 | ||
42 | -static inline unsigned tx_desc_get_used(unsigned *desc) | 46 | +#else |
43 | +static inline unsigned tx_desc_get_used(uint32_t *desc) | 47 | + |
48 | +static uint32_t vfp_get_fpscr_from_host(CPUARMState *env) | ||
49 | +{ | ||
50 | + return 0; | ||
51 | +} | ||
52 | + | ||
53 | +static void vfp_set_fpscr_to_host(CPUARMState *env, uint32_t val) | ||
54 | +{ | ||
55 | +} | ||
56 | + | ||
57 | +#endif | ||
58 | + | ||
59 | uint32_t HELPER(vfp_get_fpscr)(CPUARMState *env) | ||
44 | { | 60 | { |
45 | return (desc[1] & DESC_1_USED) ? 1 : 0; | 61 | uint32_t i, fpscr; |
62 | @@ -XXX,XX +XXX,XX @@ void vfp_set_fpscr(CPUARMState *env, uint32_t val) | ||
63 | HELPER(vfp_set_fpscr)(env, val); | ||
46 | } | 64 | } |
47 | 65 | ||
48 | -static inline void tx_desc_set_used(unsigned *desc) | 66 | +#ifdef CONFIG_TCG |
49 | +static inline void tx_desc_set_used(uint32_t *desc) | 67 | + |
68 | #define VFP_HELPER(name, p) HELPER(glue(glue(vfp_,name),p)) | ||
69 | |||
70 | #define VFP_BINOP(name) \ | ||
71 | @@ -XXX,XX +XXX,XX @@ float64 HELPER(frint64_d)(float64 f, void *fpst) | ||
50 | { | 72 | { |
51 | desc[1] |= DESC_1_USED; | 73 | return frint_d(f, fpst, 64); |
52 | } | 74 | } |
53 | 75 | + | |
54 | -static inline unsigned tx_desc_get_wrap(unsigned *desc) | 76 | +#endif |
55 | +static inline unsigned tx_desc_get_wrap(uint32_t *desc) | ||
56 | { | ||
57 | return (desc[1] & DESC_1_TX_WRAP) ? 1 : 0; | ||
58 | } | ||
59 | |||
60 | -static inline unsigned tx_desc_get_last(unsigned *desc) | ||
61 | +static inline unsigned tx_desc_get_last(uint32_t *desc) | ||
62 | { | ||
63 | return (desc[1] & DESC_1_TX_LAST) ? 1 : 0; | ||
64 | } | ||
65 | |||
66 | -static inline void tx_desc_set_last(unsigned *desc) | ||
67 | +static inline void tx_desc_set_last(uint32_t *desc) | ||
68 | { | ||
69 | desc[1] |= DESC_1_TX_LAST; | ||
70 | } | ||
71 | |||
72 | -static inline unsigned tx_desc_get_length(unsigned *desc) | ||
73 | +static inline unsigned tx_desc_get_length(uint32_t *desc) | ||
74 | { | ||
75 | return desc[1] & DESC_1_LENGTH; | ||
76 | } | ||
77 | |||
78 | -static inline void print_gem_tx_desc(unsigned *desc, uint8_t queue) | ||
79 | +static inline void print_gem_tx_desc(uint32_t *desc, uint8_t queue) | ||
80 | { | ||
81 | DB_PRINT("TXDESC (queue %" PRId8 "):\n", queue); | ||
82 | DB_PRINT("bufaddr: 0x%08x\n", *desc); | ||
83 | @@ -XXX,XX +XXX,XX @@ static inline void print_gem_tx_desc(unsigned *desc, uint8_t queue) | ||
84 | DB_PRINT("length: %d\n", tx_desc_get_length(desc)); | ||
85 | } | ||
86 | |||
87 | -static inline unsigned rx_desc_get_buffer(unsigned *desc) | ||
88 | +static inline unsigned rx_desc_get_buffer(uint32_t *desc) | ||
89 | { | ||
90 | return desc[0] & ~0x3UL; | ||
91 | } | ||
92 | |||
93 | -static inline unsigned rx_desc_get_wrap(unsigned *desc) | ||
94 | +static inline unsigned rx_desc_get_wrap(uint32_t *desc) | ||
95 | { | ||
96 | return desc[0] & DESC_0_RX_WRAP ? 1 : 0; | ||
97 | } | ||
98 | |||
99 | -static inline unsigned rx_desc_get_ownership(unsigned *desc) | ||
100 | +static inline unsigned rx_desc_get_ownership(uint32_t *desc) | ||
101 | { | ||
102 | return desc[0] & DESC_0_RX_OWNERSHIP ? 1 : 0; | ||
103 | } | ||
104 | |||
105 | -static inline void rx_desc_set_ownership(unsigned *desc) | ||
106 | +static inline void rx_desc_set_ownership(uint32_t *desc) | ||
107 | { | ||
108 | desc[0] |= DESC_0_RX_OWNERSHIP; | ||
109 | } | ||
110 | |||
111 | -static inline void rx_desc_set_sof(unsigned *desc) | ||
112 | +static inline void rx_desc_set_sof(uint32_t *desc) | ||
113 | { | ||
114 | desc[1] |= DESC_1_RX_SOF; | ||
115 | } | ||
116 | |||
117 | -static inline void rx_desc_set_eof(unsigned *desc) | ||
118 | +static inline void rx_desc_set_eof(uint32_t *desc) | ||
119 | { | ||
120 | desc[1] |= DESC_1_RX_EOF; | ||
121 | } | ||
122 | |||
123 | -static inline void rx_desc_set_length(unsigned *desc, unsigned len) | ||
124 | +static inline void rx_desc_set_length(uint32_t *desc, unsigned len) | ||
125 | { | ||
126 | desc[1] &= ~DESC_1_LENGTH; | ||
127 | desc[1] |= len; | ||
128 | } | ||
129 | |||
130 | -static inline void rx_desc_set_broadcast(unsigned *desc) | ||
131 | +static inline void rx_desc_set_broadcast(uint32_t *desc) | ||
132 | { | ||
133 | desc[1] |= R_DESC_1_RX_BROADCAST; | ||
134 | } | ||
135 | |||
136 | -static inline void rx_desc_set_unicast_hash(unsigned *desc) | ||
137 | +static inline void rx_desc_set_unicast_hash(uint32_t *desc) | ||
138 | { | ||
139 | desc[1] |= R_DESC_1_RX_UNICAST_HASH; | ||
140 | } | ||
141 | |||
142 | -static inline void rx_desc_set_multicast_hash(unsigned *desc) | ||
143 | +static inline void rx_desc_set_multicast_hash(uint32_t *desc) | ||
144 | { | ||
145 | desc[1] |= R_DESC_1_RX_MULTICAST_HASH; | ||
146 | } | ||
147 | |||
148 | -static inline void rx_desc_set_sar(unsigned *desc, int sar_idx) | ||
149 | +static inline void rx_desc_set_sar(uint32_t *desc, int sar_idx) | ||
150 | { | ||
151 | desc[1] = deposit32(desc[1], R_DESC_1_RX_SAR_SHIFT, R_DESC_1_RX_SAR_LENGTH, | ||
152 | sar_idx); | ||
153 | @@ -XXX,XX +XXX,XX @@ static void gem_transmit_updatestats(CadenceGEMState *s, const uint8_t *packet, | ||
154 | */ | ||
155 | static void gem_transmit(CadenceGEMState *s) | ||
156 | { | ||
157 | - unsigned desc[2]; | ||
158 | + uint32_t desc[2]; | ||
159 | hwaddr packet_desc_addr; | ||
160 | uint8_t tx_packet[2048]; | ||
161 | uint8_t *p; | ||
162 | @@ -XXX,XX +XXX,XX @@ static void gem_transmit(CadenceGEMState *s) | ||
163 | |||
164 | /* Last descriptor for this packet; hand the whole thing off */ | ||
165 | if (tx_desc_get_last(desc)) { | ||
166 | - unsigned desc_first[2]; | ||
167 | + uint32_t desc_first[2]; | ||
168 | |||
169 | /* Modify the 1st descriptor of this packet to be owned by | ||
170 | * the processor. | ||
171 | -- | 77 | -- |
172 | 2.19.0 | 78 | 2.20.1 |
173 | 79 | ||
174 | 80 | diff view generated by jsdifflib |
1 | From: "Edgar E. Iglesias" <edgar.iglesias@xilinx.com> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | Announce the availability of the various priority queues. | 3 | Under KVM, the kernel gets the HVC call and handle the PSCI requests. |
4 | This fixes an issue where guest kernels would miss to | ||
5 | configure secondary queues due to inproper feature bits. | ||
6 | 4 | ||
7 | Reviewed-by: Alistair Francis <alistair.francis@wdc.com> | 5 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
8 | Signed-off-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | 6 | Message-id: 20190701132516.26392-20-philmd@redhat.com |
9 | Message-id: 20181011021931.4249-3-edgar.iglesias@gmail.com | 7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 9 | --- |
12 | hw/net/cadence_gem.c | 6 +++++- | 10 | target/arm/internals.h | 6 +++++- |
13 | 1 file changed, 5 insertions(+), 1 deletion(-) | 11 | 1 file changed, 5 insertions(+), 1 deletion(-) |
14 | 12 | ||
15 | diff --git a/hw/net/cadence_gem.c b/hw/net/cadence_gem.c | 13 | diff --git a/target/arm/internals.h b/target/arm/internals.h |
16 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/hw/net/cadence_gem.c | 15 | --- a/target/arm/internals.h |
18 | +++ b/hw/net/cadence_gem.c | 16 | +++ b/target/arm/internals.h |
19 | @@ -XXX,XX +XXX,XX @@ static void gem_reset(DeviceState *d) | 17 | @@ -XXX,XX +XXX,XX @@ vaddr arm_adjust_watchpoint_address(CPUState *cs, vaddr addr, int len); |
20 | int i; | 18 | /* Callback function for when a watchpoint or breakpoint triggers. */ |
21 | CadenceGEMState *s = CADENCE_GEM(d); | 19 | void arm_debug_excp_handler(CPUState *cs); |
22 | const uint8_t *a; | 20 | |
23 | + uint32_t queues_mask; | 21 | -#ifdef CONFIG_USER_ONLY |
24 | 22 | +#if defined(CONFIG_USER_ONLY) || !defined(CONFIG_TCG) | |
25 | DB_PRINT("\n"); | 23 | static inline bool arm_is_psci_call(ARMCPU *cpu, int excp_type) |
26 | 24 | { | |
27 | @@ -XXX,XX +XXX,XX @@ static void gem_reset(DeviceState *d) | 25 | return false; |
28 | s->regs[GEM_DESCONF] = 0x02500111; | 26 | } |
29 | s->regs[GEM_DESCONF2] = 0x2ab13fff; | 27 | +static inline void arm_handle_psci_call(ARMCPU *cpu) |
30 | s->regs[GEM_DESCONF5] = 0x002f2045; | 28 | +{ |
31 | - s->regs[GEM_DESCONF6] = 0x00000200; | 29 | + g_assert_not_reached(); |
32 | + s->regs[GEM_DESCONF6] = 0x0; | 30 | +} |
33 | + | 31 | #else |
34 | + queues_mask = MAKE_64BIT_MASK(1, s->num_priority_queues - 1); | 32 | /* Return true if the r0/x0 value indicates that this SMC/HVC is a PSCI call. */ |
35 | + s->regs[GEM_DESCONF6] |= queues_mask; | 33 | bool arm_is_psci_call(ARMCPU *cpu, int excp_type); |
36 | |||
37 | /* Set MAC address */ | ||
38 | a = &s->conf.macaddr.a[0]; | ||
39 | -- | 34 | -- |
40 | 2.19.0 | 35 | 2.20.1 |
41 | 36 | ||
42 | 37 | diff view generated by jsdifflib |
1 | From: "Edgar E. Iglesias" <edgar.iglesias@xilinx.com> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | Add the ARM Cortex-A72. | 3 | In few commits we will split the M-profile functions from this |
4 | file, and this function will also be called in the new file. | ||
5 | Declare it in the "internals.h" header. | ||
6 | Since it is in the middle of a block of M profile functions, | ||
7 | move it previous to this block to ease the later refactor. | ||
4 | 8 | ||
5 | Signed-off-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | 9 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
6 | Message-id: 20181011021931.4249-11-edgar.iglesias@gmail.com | 10 | Message-id: 20190701132516.26392-21-philmd@redhat.com |
11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
8 | --- | 13 | --- |
9 | target/arm/cpu64.c | 66 +++++++++++++++++++++++++++++++++++++++++++--- | 14 | target/arm/internals.h | 2 ++ |
10 | 1 file changed, 63 insertions(+), 3 deletions(-) | 15 | target/arm/helper.c | 76 +++++++++++++++++++++--------------------- |
16 | 2 files changed, 40 insertions(+), 38 deletions(-) | ||
11 | 17 | ||
12 | diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c | 18 | diff --git a/target/arm/internals.h b/target/arm/internals.h |
13 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
14 | --- a/target/arm/cpu64.c | 20 | --- a/target/arm/internals.h |
15 | +++ b/target/arm/cpu64.c | 21 | +++ b/target/arm/internals.h |
16 | @@ -XXX,XX +XXX,XX @@ static uint64_t a57_a53_l2ctlr_read(CPUARMState *env, const ARMCPRegInfo *ri) | 22 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, |
23 | target_ulong *page_size, | ||
24 | ARMMMUFaultInfo *fi, ARMCacheAttrs *cacheattrs); | ||
25 | |||
26 | +void arm_log_exception(int idx); | ||
27 | + | ||
28 | #endif /* !CONFIG_USER_ONLY */ | ||
29 | |||
30 | #endif | ||
31 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
32 | index XXXXXXX..XXXXXXX 100644 | ||
33 | --- a/target/arm/helper.c | ||
34 | +++ b/target/arm/helper.c | ||
35 | @@ -XXX,XX +XXX,XX @@ uint32_t arm_phys_excp_target_el(CPUState *cs, uint32_t excp_idx, | ||
36 | return target_el; | ||
17 | } | 37 | } |
18 | #endif | 38 | |
19 | 39 | +void arm_log_exception(int idx) | |
20 | -static const ARMCPRegInfo cortex_a57_a53_cp_reginfo[] = { | 40 | +{ |
21 | +static const ARMCPRegInfo cortex_a72_a57_a53_cp_reginfo[] = { | 41 | + if (qemu_loglevel_mask(CPU_LOG_INT)) { |
22 | #ifndef CONFIG_USER_ONLY | 42 | + const char *exc = NULL; |
23 | { .name = "L2CTLR_EL1", .state = ARM_CP_STATE_AA64, | 43 | + static const char * const excnames[] = { |
24 | .opc0 = 3, .opc1 = 1, .crn = 11, .crm = 0, .opc2 = 2, | 44 | + [EXCP_UDEF] = "Undefined Instruction", |
25 | @@ -XXX,XX +XXX,XX @@ static void aarch64_a57_initfn(Object *obj) | 45 | + [EXCP_SWI] = "SVC", |
26 | cpu->gic_num_lrs = 4; | 46 | + [EXCP_PREFETCH_ABORT] = "Prefetch Abort", |
27 | cpu->gic_vpribits = 5; | 47 | + [EXCP_DATA_ABORT] = "Data Abort", |
28 | cpu->gic_vprebits = 5; | 48 | + [EXCP_IRQ] = "IRQ", |
29 | - define_arm_cp_regs(cpu, cortex_a57_a53_cp_reginfo); | 49 | + [EXCP_FIQ] = "FIQ", |
30 | + define_arm_cp_regs(cpu, cortex_a72_a57_a53_cp_reginfo); | 50 | + [EXCP_BKPT] = "Breakpoint", |
31 | } | 51 | + [EXCP_EXCEPTION_EXIT] = "QEMU v7M exception exit", |
32 | 52 | + [EXCP_KERNEL_TRAP] = "QEMU intercept of kernel commpage", | |
33 | static void aarch64_a53_initfn(Object *obj) | 53 | + [EXCP_HVC] = "Hypervisor Call", |
34 | @@ -XXX,XX +XXX,XX @@ static void aarch64_a53_initfn(Object *obj) | 54 | + [EXCP_HYP_TRAP] = "Hypervisor Trap", |
35 | cpu->gic_num_lrs = 4; | 55 | + [EXCP_SMC] = "Secure Monitor Call", |
36 | cpu->gic_vpribits = 5; | 56 | + [EXCP_VIRQ] = "Virtual IRQ", |
37 | cpu->gic_vprebits = 5; | 57 | + [EXCP_VFIQ] = "Virtual FIQ", |
38 | - define_arm_cp_regs(cpu, cortex_a57_a53_cp_reginfo); | 58 | + [EXCP_SEMIHOST] = "Semihosting call", |
39 | + define_arm_cp_regs(cpu, cortex_a72_a57_a53_cp_reginfo); | 59 | + [EXCP_NOCP] = "v7M NOCP UsageFault", |
60 | + [EXCP_INVSTATE] = "v7M INVSTATE UsageFault", | ||
61 | + [EXCP_STKOF] = "v8M STKOF UsageFault", | ||
62 | + [EXCP_LAZYFP] = "v7M exception during lazy FP stacking", | ||
63 | + [EXCP_LSERR] = "v8M LSERR UsageFault", | ||
64 | + [EXCP_UNALIGNED] = "v7M UNALIGNED UsageFault", | ||
65 | + }; | ||
66 | + | ||
67 | + if (idx >= 0 && idx < ARRAY_SIZE(excnames)) { | ||
68 | + exc = excnames[idx]; | ||
69 | + } | ||
70 | + if (!exc) { | ||
71 | + exc = "unknown"; | ||
72 | + } | ||
73 | + qemu_log_mask(CPU_LOG_INT, "Taking exception %d [%s]\n", idx, exc); | ||
74 | + } | ||
40 | +} | 75 | +} |
41 | + | 76 | + |
42 | +static void aarch64_a72_initfn(Object *obj) | 77 | /* |
43 | +{ | 78 | * Return true if the v7M CPACR permits access to the FPU for the specified |
44 | + ARMCPU *cpu = ARM_CPU(obj); | 79 | * security state and privilege level. |
45 | + | 80 | @@ -XXX,XX +XXX,XX @@ static bool do_v7m_function_return(ARMCPU *cpu) |
46 | + cpu->dtb_compatible = "arm,cortex-a72"; | 81 | return true; |
47 | + set_feature(&cpu->env, ARM_FEATURE_V8); | ||
48 | + set_feature(&cpu->env, ARM_FEATURE_VFP4); | ||
49 | + set_feature(&cpu->env, ARM_FEATURE_NEON); | ||
50 | + set_feature(&cpu->env, ARM_FEATURE_GENERIC_TIMER); | ||
51 | + set_feature(&cpu->env, ARM_FEATURE_AARCH64); | ||
52 | + set_feature(&cpu->env, ARM_FEATURE_CBAR_RO); | ||
53 | + set_feature(&cpu->env, ARM_FEATURE_V8_AES); | ||
54 | + set_feature(&cpu->env, ARM_FEATURE_V8_SHA1); | ||
55 | + set_feature(&cpu->env, ARM_FEATURE_V8_SHA256); | ||
56 | + set_feature(&cpu->env, ARM_FEATURE_V8_PMULL); | ||
57 | + set_feature(&cpu->env, ARM_FEATURE_CRC); | ||
58 | + set_feature(&cpu->env, ARM_FEATURE_EL2); | ||
59 | + set_feature(&cpu->env, ARM_FEATURE_EL3); | ||
60 | + set_feature(&cpu->env, ARM_FEATURE_PMU); | ||
61 | + cpu->midr = 0x410fd083; | ||
62 | + cpu->revidr = 0x00000000; | ||
63 | + cpu->reset_fpsid = 0x41034080; | ||
64 | + cpu->mvfr0 = 0x10110222; | ||
65 | + cpu->mvfr1 = 0x12111111; | ||
66 | + cpu->mvfr2 = 0x00000043; | ||
67 | + cpu->ctr = 0x8444c004; | ||
68 | + cpu->reset_sctlr = 0x00c50838; | ||
69 | + cpu->id_pfr0 = 0x00000131; | ||
70 | + cpu->id_pfr1 = 0x00011011; | ||
71 | + cpu->id_dfr0 = 0x03010066; | ||
72 | + cpu->id_afr0 = 0x00000000; | ||
73 | + cpu->id_mmfr0 = 0x10201105; | ||
74 | + cpu->id_mmfr1 = 0x40000000; | ||
75 | + cpu->id_mmfr2 = 0x01260000; | ||
76 | + cpu->id_mmfr3 = 0x02102211; | ||
77 | + cpu->id_isar0 = 0x02101110; | ||
78 | + cpu->id_isar1 = 0x13112111; | ||
79 | + cpu->id_isar2 = 0x21232042; | ||
80 | + cpu->id_isar3 = 0x01112131; | ||
81 | + cpu->id_isar4 = 0x00011142; | ||
82 | + cpu->id_isar5 = 0x00011121; | ||
83 | + cpu->id_aa64pfr0 = 0x00002222; | ||
84 | + cpu->id_aa64dfr0 = 0x10305106; | ||
85 | + cpu->pmceid0 = 0x00000000; | ||
86 | + cpu->pmceid1 = 0x00000000; | ||
87 | + cpu->id_aa64isar0 = 0x00011120; | ||
88 | + cpu->id_aa64mmfr0 = 0x00001124; | ||
89 | + cpu->dbgdidr = 0x3516d000; | ||
90 | + cpu->clidr = 0x0a200023; | ||
91 | + cpu->ccsidr[0] = 0x701fe00a; /* 32KB L1 dcache */ | ||
92 | + cpu->ccsidr[1] = 0x201fe012; /* 48KB L1 icache */ | ||
93 | + cpu->ccsidr[2] = 0x707fe07a; /* 1MB L2 cache */ | ||
94 | + cpu->dcz_blocksize = 4; /* 64 bytes */ | ||
95 | + cpu->gic_num_lrs = 4; | ||
96 | + cpu->gic_vpribits = 5; | ||
97 | + cpu->gic_vprebits = 5; | ||
98 | + define_arm_cp_regs(cpu, cortex_a72_a57_a53_cp_reginfo); | ||
99 | } | 82 | } |
100 | 83 | ||
101 | static void cpu_max_get_sve_vq(Object *obj, Visitor *v, const char *name, | 84 | -static void arm_log_exception(int idx) |
102 | @@ -XXX,XX +XXX,XX @@ typedef struct ARMCPUInfo { | 85 | -{ |
103 | static const ARMCPUInfo aarch64_cpus[] = { | 86 | - if (qemu_loglevel_mask(CPU_LOG_INT)) { |
104 | { .name = "cortex-a57", .initfn = aarch64_a57_initfn }, | 87 | - const char *exc = NULL; |
105 | { .name = "cortex-a53", .initfn = aarch64_a53_initfn }, | 88 | - static const char * const excnames[] = { |
106 | + { .name = "cortex-a72", .initfn = aarch64_a72_initfn }, | 89 | - [EXCP_UDEF] = "Undefined Instruction", |
107 | { .name = "max", .initfn = aarch64_max_initfn }, | 90 | - [EXCP_SWI] = "SVC", |
108 | { .name = NULL } | 91 | - [EXCP_PREFETCH_ABORT] = "Prefetch Abort", |
109 | }; | 92 | - [EXCP_DATA_ABORT] = "Data Abort", |
93 | - [EXCP_IRQ] = "IRQ", | ||
94 | - [EXCP_FIQ] = "FIQ", | ||
95 | - [EXCP_BKPT] = "Breakpoint", | ||
96 | - [EXCP_EXCEPTION_EXIT] = "QEMU v7M exception exit", | ||
97 | - [EXCP_KERNEL_TRAP] = "QEMU intercept of kernel commpage", | ||
98 | - [EXCP_HVC] = "Hypervisor Call", | ||
99 | - [EXCP_HYP_TRAP] = "Hypervisor Trap", | ||
100 | - [EXCP_SMC] = "Secure Monitor Call", | ||
101 | - [EXCP_VIRQ] = "Virtual IRQ", | ||
102 | - [EXCP_VFIQ] = "Virtual FIQ", | ||
103 | - [EXCP_SEMIHOST] = "Semihosting call", | ||
104 | - [EXCP_NOCP] = "v7M NOCP UsageFault", | ||
105 | - [EXCP_INVSTATE] = "v7M INVSTATE UsageFault", | ||
106 | - [EXCP_STKOF] = "v8M STKOF UsageFault", | ||
107 | - [EXCP_LAZYFP] = "v7M exception during lazy FP stacking", | ||
108 | - [EXCP_LSERR] = "v8M LSERR UsageFault", | ||
109 | - [EXCP_UNALIGNED] = "v7M UNALIGNED UsageFault", | ||
110 | - }; | ||
111 | - | ||
112 | - if (idx >= 0 && idx < ARRAY_SIZE(excnames)) { | ||
113 | - exc = excnames[idx]; | ||
114 | - } | ||
115 | - if (!exc) { | ||
116 | - exc = "unknown"; | ||
117 | - } | ||
118 | - qemu_log_mask(CPU_LOG_INT, "Taking exception %d [%s]\n", idx, exc); | ||
119 | - } | ||
120 | -} | ||
121 | - | ||
122 | static bool v7m_read_half_insn(ARMCPU *cpu, ARMMMUIdx mmu_idx, | ||
123 | uint32_t addr, uint16_t *insn) | ||
124 | { | ||
110 | -- | 125 | -- |
111 | 2.19.0 | 126 | 2.20.1 |
112 | 127 | ||
113 | 128 | diff view generated by jsdifflib |
1 | From: "Edgar E. Iglesias" <edgar.iglesias@xilinx.com> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | Add support for selecting the Memory Region that the GEM | 3 | In the next commit we will split the M-profile functions from this |
4 | will do DMA to. | 4 | file. Some function will be called out of helper.c. Declare them in |
5 | the "internals.h" header. | ||
5 | 6 | ||
6 | Signed-off-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | 7 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> |
7 | Reviewed-by: Alistair Francis <alistair.francis@wdc.com> | 8 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
8 | Message-id: 20181011021931.4249-7-edgar.iglesias@gmail.com | 9 | Message-id: 20190701132516.26392-22-philmd@redhat.com |
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | --- | 11 | --- |
11 | include/hw/net/cadence_gem.h | 2 ++ | 12 | target/arm/internals.h | 42 ++++++++++++++++++++++++++++++++++++++++++ |
12 | hw/net/cadence_gem.c | 59 ++++++++++++++++++++++-------------- | 13 | target/arm/helper.c | 38 ++------------------------------------ |
13 | 2 files changed, 39 insertions(+), 22 deletions(-) | 14 | 2 files changed, 44 insertions(+), 36 deletions(-) |
14 | 15 | ||
15 | diff --git a/include/hw/net/cadence_gem.h b/include/hw/net/cadence_gem.h | 16 | diff --git a/target/arm/internals.h b/target/arm/internals.h |
16 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/include/hw/net/cadence_gem.h | 18 | --- a/target/arm/internals.h |
18 | +++ b/include/hw/net/cadence_gem.h | 19 | +++ b/target/arm/internals.h |
19 | @@ -XXX,XX +XXX,XX @@ typedef struct CadenceGEMState { | 20 | @@ -XXX,XX +XXX,XX @@ static inline uint32_t v7m_sp_limit(CPUARMState *env) |
20 | 21 | } | |
21 | /*< public >*/ | 22 | } |
22 | MemoryRegion iomem; | 23 | |
23 | + MemoryRegion *dma_mr; | 24 | +/** |
24 | + AddressSpace dma_as; | 25 | + * v7m_cpacr_pass: |
25 | NICState *nic; | 26 | + * Return true if the v7M CPACR permits access to the FPU for the specified |
26 | NICConf conf; | 27 | + * security state and privilege level. |
27 | qemu_irq irq[MAX_PRIORITY_QUEUES]; | 28 | + */ |
28 | diff --git a/hw/net/cadence_gem.c b/hw/net/cadence_gem.c | 29 | +static inline bool v7m_cpacr_pass(CPUARMState *env, |
30 | + bool is_secure, bool is_priv) | ||
31 | +{ | ||
32 | + switch (extract32(env->v7m.cpacr[is_secure], 20, 2)) { | ||
33 | + case 0: | ||
34 | + case 2: /* UNPREDICTABLE: we treat like 0 */ | ||
35 | + return false; | ||
36 | + case 1: | ||
37 | + return is_priv; | ||
38 | + case 3: | ||
39 | + return true; | ||
40 | + default: | ||
41 | + g_assert_not_reached(); | ||
42 | + } | ||
43 | +} | ||
44 | + | ||
45 | /** | ||
46 | * aarch32_mode_name(): Return name of the AArch32 CPU mode | ||
47 | * @psr: Program Status Register indicating CPU mode | ||
48 | @@ -XXX,XX +XXX,XX @@ static inline int exception_target_el(CPUARMState *env) | ||
49 | |||
50 | #ifndef CONFIG_USER_ONLY | ||
51 | |||
52 | +/* Security attributes for an address, as returned by v8m_security_lookup. */ | ||
53 | +typedef struct V8M_SAttributes { | ||
54 | + bool subpage; /* true if these attrs don't cover the whole TARGET_PAGE */ | ||
55 | + bool ns; | ||
56 | + bool nsc; | ||
57 | + uint8_t sregion; | ||
58 | + bool srvalid; | ||
59 | + uint8_t iregion; | ||
60 | + bool irvalid; | ||
61 | +} V8M_SAttributes; | ||
62 | + | ||
63 | +void v8m_security_lookup(CPUARMState *env, uint32_t address, | ||
64 | + MMUAccessType access_type, ARMMMUIdx mmu_idx, | ||
65 | + V8M_SAttributes *sattrs); | ||
66 | + | ||
67 | +bool pmsav8_mpu_lookup(CPUARMState *env, uint32_t address, | ||
68 | + MMUAccessType access_type, ARMMMUIdx mmu_idx, | ||
69 | + hwaddr *phys_ptr, MemTxAttrs *txattrs, | ||
70 | + int *prot, bool *is_subpage, | ||
71 | + ARMMMUFaultInfo *fi, uint32_t *mregion); | ||
72 | + | ||
73 | /* Cacheability and shareability attributes for a memory access */ | ||
74 | typedef struct ARMCacheAttrs { | ||
75 | unsigned int attrs:8; /* as in the MAIR register encoding */ | ||
76 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
29 | index XXXXXXX..XXXXXXX 100644 | 77 | index XXXXXXX..XXXXXXX 100644 |
30 | --- a/hw/net/cadence_gem.c | 78 | --- a/target/arm/helper.c |
31 | +++ b/hw/net/cadence_gem.c | 79 | +++ b/target/arm/helper.c |
32 | @@ -XXX,XX +XXX,XX @@ | 80 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, target_ulong address, |
33 | #include "hw/net/cadence_gem.h" | 81 | hwaddr *phys_ptr, MemTxAttrs *txattrs, int *prot, |
34 | #include "qapi/error.h" | 82 | target_ulong *page_size_ptr, |
35 | #include "qemu/log.h" | 83 | ARMMMUFaultInfo *fi, ARMCacheAttrs *cacheattrs); |
36 | +#include "sysemu/dma.h" | 84 | - |
37 | #include "net/checksum.h" | 85 | -/* Security attributes for an address, as returned by v8m_security_lookup. */ |
38 | 86 | -typedef struct V8M_SAttributes { | |
39 | #ifdef CADENCE_GEM_ERR_DEBUG | 87 | - bool subpage; /* true if these attrs don't cover the whole TARGET_PAGE */ |
40 | @@ -XXX,XX +XXX,XX @@ static void gem_get_rx_desc(CadenceGEMState *s, int q) | 88 | - bool ns; |
89 | - bool nsc; | ||
90 | - uint8_t sregion; | ||
91 | - bool srvalid; | ||
92 | - uint8_t iregion; | ||
93 | - bool irvalid; | ||
94 | -} V8M_SAttributes; | ||
95 | - | ||
96 | -static void v8m_security_lookup(CPUARMState *env, uint32_t address, | ||
97 | - MMUAccessType access_type, ARMMMUIdx mmu_idx, | ||
98 | - V8M_SAttributes *sattrs); | ||
99 | #endif | ||
100 | |||
101 | static void switch_mode(CPUARMState *env, int mode); | ||
102 | @@ -XXX,XX +XXX,XX @@ void arm_log_exception(int idx) | ||
103 | } | ||
104 | } | ||
105 | |||
106 | -/* | ||
107 | - * Return true if the v7M CPACR permits access to the FPU for the specified | ||
108 | - * security state and privilege level. | ||
109 | - */ | ||
110 | -static bool v7m_cpacr_pass(CPUARMState *env, bool is_secure, bool is_priv) | ||
111 | -{ | ||
112 | - switch (extract32(env->v7m.cpacr[is_secure], 20, 2)) { | ||
113 | - case 0: | ||
114 | - case 2: /* UNPREDICTABLE: we treat like 0 */ | ||
115 | - return false; | ||
116 | - case 1: | ||
117 | - return is_priv; | ||
118 | - case 3: | ||
119 | - return true; | ||
120 | - default: | ||
121 | - g_assert_not_reached(); | ||
122 | - } | ||
123 | -} | ||
124 | - | ||
125 | /* | ||
126 | * What kind of stack write are we doing? This affects how exceptions | ||
127 | * generated during the stacking are treated. | ||
128 | @@ -XXX,XX +XXX,XX @@ static bool v8m_is_sau_exempt(CPUARMState *env, | ||
129 | (address >= 0xe00ff000 && address <= 0xe00fffff); | ||
130 | } | ||
131 | |||
132 | -static void v8m_security_lookup(CPUARMState *env, uint32_t address, | ||
133 | +void v8m_security_lookup(CPUARMState *env, uint32_t address, | ||
134 | MMUAccessType access_type, ARMMMUIdx mmu_idx, | ||
135 | V8M_SAttributes *sattrs) | ||
41 | { | 136 | { |
42 | DB_PRINT("read descriptor 0x%x\n", (unsigned)s->rx_desc_addr[q]); | 137 | @@ -XXX,XX +XXX,XX @@ static void v8m_security_lookup(CPUARMState *env, uint32_t address, |
43 | /* read current descriptor */ | 138 | } |
44 | - cpu_physical_memory_read(s->rx_desc_addr[q], | ||
45 | - (uint8_t *)s->rx_desc[q], | ||
46 | - sizeof(uint32_t) * gem_get_desc_len(s, true)); | ||
47 | + address_space_read(&s->dma_as, s->rx_desc_addr[q], MEMTXATTRS_UNSPECIFIED, | ||
48 | + (uint8_t *)s->rx_desc[q], | ||
49 | + sizeof(uint32_t) * gem_get_desc_len(s, true)); | ||
50 | |||
51 | /* Descriptor owned by software ? */ | ||
52 | if (rx_desc_get_ownership(s->rx_desc[q]) == 1) { | ||
53 | @@ -XXX,XX +XXX,XX @@ static ssize_t gem_receive(NetClientState *nc, const uint8_t *buf, size_t size) | ||
54 | rx_desc_get_buffer(s->rx_desc[q])); | ||
55 | |||
56 | /* Copy packet data to emulated DMA buffer */ | ||
57 | - cpu_physical_memory_write(rx_desc_get_buffer(s, s->rx_desc[q]) + | ||
58 | + address_space_write(&s->dma_as, rx_desc_get_buffer(s, s->rx_desc[q]) + | ||
59 | rxbuf_offset, | ||
60 | - rxbuf_ptr, | ||
61 | - MIN(bytes_to_copy, rxbufsize)); | ||
62 | + MEMTXATTRS_UNSPECIFIED, rxbuf_ptr, | ||
63 | + MIN(bytes_to_copy, rxbufsize)); | ||
64 | rxbuf_ptr += MIN(bytes_to_copy, rxbufsize); | ||
65 | bytes_to_copy -= MIN(bytes_to_copy, rxbufsize); | ||
66 | |||
67 | @@ -XXX,XX +XXX,XX @@ static ssize_t gem_receive(NetClientState *nc, const uint8_t *buf, size_t size) | ||
68 | } | ||
69 | |||
70 | /* Descriptor write-back. */ | ||
71 | - cpu_physical_memory_write(s->rx_desc_addr[q], | ||
72 | - (uint8_t *)s->rx_desc[q], | ||
73 | - sizeof(uint32_t) * gem_get_desc_len(s, true)); | ||
74 | + address_space_write(&s->dma_as, s->rx_desc_addr[q], | ||
75 | + MEMTXATTRS_UNSPECIFIED, | ||
76 | + (uint8_t *)s->rx_desc[q], | ||
77 | + sizeof(uint32_t) * gem_get_desc_len(s, true)); | ||
78 | |||
79 | /* Next descriptor */ | ||
80 | if (rx_desc_get_wrap(s->rx_desc[q])) { | ||
81 | @@ -XXX,XX +XXX,XX @@ static void gem_transmit(CadenceGEMState *s) | ||
82 | packet_desc_addr = s->tx_desc_addr[q]; | ||
83 | |||
84 | DB_PRINT("read descriptor 0x%" HWADDR_PRIx "\n", packet_desc_addr); | ||
85 | - cpu_physical_memory_read(packet_desc_addr, | ||
86 | - (uint8_t *)desc, | ||
87 | - sizeof(uint32_t) * gem_get_desc_len(s, false)); | ||
88 | + address_space_read(&s->dma_as, packet_desc_addr, | ||
89 | + MEMTXATTRS_UNSPECIFIED, (uint8_t *)desc, | ||
90 | + sizeof(uint32_t) * gem_get_desc_len(s, false)); | ||
91 | /* Handle all descriptors owned by hardware */ | ||
92 | while (tx_desc_get_used(desc) == 0) { | ||
93 | |||
94 | @@ -XXX,XX +XXX,XX @@ static void gem_transmit(CadenceGEMState *s) | ||
95 | /* Gather this fragment of the packet from "dma memory" to our | ||
96 | * contig buffer. | ||
97 | */ | ||
98 | - cpu_physical_memory_read(tx_desc_get_buffer(s, desc), p, | ||
99 | - tx_desc_get_length(desc)); | ||
100 | + address_space_read(&s->dma_as, tx_desc_get_buffer(s, desc), | ||
101 | + MEMTXATTRS_UNSPECIFIED, | ||
102 | + p, tx_desc_get_length(desc)); | ||
103 | p += tx_desc_get_length(desc); | ||
104 | total_bytes += tx_desc_get_length(desc); | ||
105 | |||
106 | @@ -XXX,XX +XXX,XX @@ static void gem_transmit(CadenceGEMState *s) | ||
107 | /* Modify the 1st descriptor of this packet to be owned by | ||
108 | * the processor. | ||
109 | */ | ||
110 | - cpu_physical_memory_read(s->tx_desc_addr[q], | ||
111 | - (uint8_t *)desc_first, | ||
112 | - sizeof(desc_first)); | ||
113 | + address_space_read(&s->dma_as, s->tx_desc_addr[q], | ||
114 | + MEMTXATTRS_UNSPECIFIED, | ||
115 | + (uint8_t *)desc_first, | ||
116 | + sizeof(desc_first)); | ||
117 | tx_desc_set_used(desc_first); | ||
118 | - cpu_physical_memory_write(s->tx_desc_addr[q], | ||
119 | - (uint8_t *)desc_first, | ||
120 | - sizeof(desc_first)); | ||
121 | + address_space_write(&s->dma_as, s->tx_desc_addr[q], | ||
122 | + MEMTXATTRS_UNSPECIFIED, | ||
123 | + (uint8_t *)desc_first, | ||
124 | + sizeof(desc_first)); | ||
125 | /* Advance the hardware current descriptor past this packet */ | ||
126 | if (tx_desc_get_wrap(desc)) { | ||
127 | s->tx_desc_addr[q] = s->regs[GEM_TXQBASE]; | ||
128 | @@ -XXX,XX +XXX,XX @@ static void gem_transmit(CadenceGEMState *s) | ||
129 | packet_desc_addr += 4 * gem_get_desc_len(s, false); | ||
130 | } | ||
131 | DB_PRINT("read descriptor 0x%" HWADDR_PRIx "\n", packet_desc_addr); | ||
132 | - cpu_physical_memory_read(packet_desc_addr, (uint8_t *)desc, | ||
133 | - sizeof(uint32_t) * gem_get_desc_len(s, false)); | ||
134 | + address_space_read(&s->dma_as, packet_desc_addr, | ||
135 | + MEMTXATTRS_UNSPECIFIED, (uint8_t *)desc, | ||
136 | + sizeof(uint32_t) * gem_get_desc_len(s, false)); | ||
137 | } | ||
138 | |||
139 | if (tx_desc_get_used(desc)) { | ||
140 | @@ -XXX,XX +XXX,XX @@ static void gem_realize(DeviceState *dev, Error **errp) | ||
141 | CadenceGEMState *s = CADENCE_GEM(dev); | ||
142 | int i; | ||
143 | |||
144 | + address_space_init(&s->dma_as, | ||
145 | + s->dma_mr ? s->dma_mr : get_system_memory(), "dma"); | ||
146 | + | ||
147 | if (s->num_priority_queues == 0 || | ||
148 | s->num_priority_queues > MAX_PRIORITY_QUEUES) { | ||
149 | error_setg(errp, "Invalid num-priority-queues value: %" PRIx8, | ||
150 | @@ -XXX,XX +XXX,XX @@ static void gem_init(Object *obj) | ||
151 | "enet", sizeof(s->regs)); | ||
152 | |||
153 | sysbus_init_mmio(SYS_BUS_DEVICE(dev), &s->iomem); | ||
154 | + | ||
155 | + object_property_add_link(obj, "dma", TYPE_MEMORY_REGION, | ||
156 | + (Object **)&s->dma_mr, | ||
157 | + qdev_prop_allow_set_link_before_realize, | ||
158 | + OBJ_PROP_LINK_STRONG, | ||
159 | + &error_abort); | ||
160 | } | 139 | } |
161 | 140 | ||
162 | static const VMStateDescription vmstate_cadence_gem = { | 141 | -static bool pmsav8_mpu_lookup(CPUARMState *env, uint32_t address, |
142 | +bool pmsav8_mpu_lookup(CPUARMState *env, uint32_t address, | ||
143 | MMUAccessType access_type, ARMMMUIdx mmu_idx, | ||
144 | hwaddr *phys_ptr, MemTxAttrs *txattrs, | ||
145 | int *prot, bool *is_subpage, | ||
163 | -- | 146 | -- |
164 | 2.19.0 | 147 | 2.20.1 |
165 | 148 | ||
166 | 149 | diff view generated by jsdifflib |