1
Handful of bugfix patches for arm for rc0; also
1
A last small test of bug fixes before rc1.
2
one milkymist patch, thrown in since I was putting
3
the pullreq together anyway.
4
2
5
thanks
3
thanks
6
-- PMM
4
-- PMM
7
5
8
The following changes since commit 03c1ca1c51783603d42eb0f91d35961f0f4b4947:
6
The following changes since commit ed8ad9728a9c0eec34db9dff61dfa2f1dd625637:
9
7
10
Merge remote-tracking branch 'remotes/cohuck/tags/s390x-20181105' into staging (2018-11-06 09:10:46 +0000)
8
Merge tag 'pull-tpm-2023-07-14-1' of https://github.com/stefanberger/qemu-tpm into staging (2023-07-15 14:54:04 +0100)
11
9
12
are available in the Git repository at:
10
are available in the Git repository at:
13
11
14
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20181106
12
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20230717
15
13
16
for you to fetch changes up to 23463e0e4aeb2f0a9c60549a2c163f4adc0b8512:
14
for you to fetch changes up to c2c1c4a35c7c2b1a4140b0942b9797c857e476a4:
17
15
18
target/arm: Fix ATS1Hx instructions (2018-11-06 11:32:14 +0000)
16
hw/nvram: Avoid unnecessary Xilinx eFuse backstore write (2023-07-17 11:05:52 +0100)
19
17
20
----------------------------------------------------------------
18
----------------------------------------------------------------
21
target-arm queue:
19
target-arm queue:
22
* Remove can't-happen if() from handle_vec_simd_shli()
20
* hw/arm/sbsa-ref: set 'slots' property of xhci
23
* hw/arm/exynos4210: Zero memory allocated for Exynos4210State
21
* linux-user: Remove pointless NULL check in clock_adjtime handling
24
* Set S and PTW in 64-bit PAR format
22
* ptw: Fix S1_ptw_translate() debug path
25
* Fix ATS1Hx instructions
23
* ptw: Account for FEAT_RME when applying {N}SW, SA bits
26
* milkymist: Check for failure trying to load BIOS image
24
* accel/tcg: Zero-pad PC in TCG CPU exec trace lines
25
* hw/nvram: Avoid unnecessary Xilinx eFuse backstore write
27
26
28
----------------------------------------------------------------
27
----------------------------------------------------------------
29
Peter Maydell (5):
28
Peter Maydell (5):
30
target/arm: Remove can't-happen if() from handle_vec_simd_shli()
29
linux-user: Remove pointless NULL check in clock_adjtime handling
31
milkymist: Check for failure trying to load BIOS image
30
target/arm/ptw.c: Add comments to S1Translate struct fields
32
hw/arm/exynos4210: Zero memory allocated for Exynos4210State
31
target/arm: Fix S1_ptw_translate() debug path
33
target/arm: Set S and PTW in 64-bit PAR format
32
target/arm/ptw.c: Account for FEAT_RME when applying {N}SW, SA bits
34
target/arm: Fix ATS1Hx instructions
33
accel/tcg: Zero-pad PC in TCG CPU exec trace lines
35
34
36
hw/arm/exynos4210.c | 2 +-
35
Tong Ho (1):
37
hw/lm32/milkymist.c | 5 ++++-
36
hw/nvram: Avoid unnecessary Xilinx eFuse backstore write
38
target/arm/helper.c | 14 ++++++++------
39
target/arm/translate-a64.c | 8 +++-----
40
4 files changed, 16 insertions(+), 13 deletions(-)
41
37
38
Yuquan Wang (1):
39
hw/arm/sbsa-ref: set 'slots' property of xhci
40
41
accel/tcg/cpu-exec.c | 4 +--
42
accel/tcg/translate-all.c | 2 +-
43
hw/arm/sbsa-ref.c | 1 +
44
hw/nvram/xlnx-efuse.c | 11 ++++--
45
linux-user/syscall.c | 12 +++----
46
target/arm/ptw.c | 90 +++++++++++++++++++++++++++++++++++++++++------
47
6 files changed, 98 insertions(+), 22 deletions(-)
diff view generated by jsdifflib
New patch
1
From: Yuquan Wang <wangyuquan1236@phytium.com.cn>
1
2
3
This extends the slots of xhci to 64, since the default xhci_sysbus
4
just supports one slot.
5
6
Signed-off-by: Wang Yuquan <wangyuquan1236@phytium.com.cn>
7
Signed-off-by: Chen Baozi <chenbaozi@phytium.com.cn>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
9
Reviewed-by: Marcin Juszkiewicz <marcin.juszkiewicz@linaro.org>
10
Tested-by: Marcin Juszkiewicz <marcin.juszkiewicz@linaro.org>
11
Message-id: 20230710063750.473510-2-wangyuquan1236@phytium.com.cn
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
---
14
hw/arm/sbsa-ref.c | 1 +
15
1 file changed, 1 insertion(+)
16
17
diff --git a/hw/arm/sbsa-ref.c b/hw/arm/sbsa-ref.c
18
index XXXXXXX..XXXXXXX 100644
19
--- a/hw/arm/sbsa-ref.c
20
+++ b/hw/arm/sbsa-ref.c
21
@@ -XXX,XX +XXX,XX @@ static void create_xhci(const SBSAMachineState *sms)
22
hwaddr base = sbsa_ref_memmap[SBSA_XHCI].base;
23
int irq = sbsa_ref_irqmap[SBSA_XHCI];
24
DeviceState *dev = qdev_new(TYPE_XHCI_SYSBUS);
25
+ qdev_prop_set_uint32(dev, "slots", XHCI_MAXSLOTS);
26
27
sysbus_realize_and_unref(SYS_BUS_DEVICE(dev), &error_fatal);
28
sysbus_mmio_map(SYS_BUS_DEVICE(dev), 0, base);
29
--
30
2.34.1
diff view generated by jsdifflib
1
In do_ats_write() we construct a PAR value based on the result
1
In the code for TARGET_NR_clock_adjtime, we set the pointer phtx to
2
of the translation. A comment says "S2WLK and FSTAGE are always
2
the address of the local variable htx. This means it can never be
3
zero, because we don't implement virtualization".
3
NULL, but later in the code we check it for NULL anyway. Coverity
4
Since we do in fact now implement virtualization, add the missing
4
complains about this (CID 1507683) because the NULL check comes after
5
code that sets these bits based on the reported ARMMMUFaultInfo.
5
a call to clock_adjtime() that assumes it is non-NULL.
6
6
7
(These bits are named PTW and S in ARMv8, so we follow that
7
Since phtx is always &htx, and is used only in three places, it's not
8
convention in the new comments in this patch.)
8
really necessary. Remove it, bringing the code structure in to line
9
with that for TARGET_NR_clock_adjtime64, which already uses a simple
10
'&htx' when it wants a pointer to 'htx'.
9
11
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com>
13
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
12
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
14
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
13
Message-id: 20181016093703.10637-2-peter.maydell@linaro.org
15
Message-id: 20230623144410.1837261-1-peter.maydell@linaro.org
14
---
16
---
15
target/arm/helper.c | 10 ++++++----
17
linux-user/syscall.c | 12 +++++-------
16
1 file changed, 6 insertions(+), 4 deletions(-)
18
1 file changed, 5 insertions(+), 7 deletions(-)
17
19
18
diff --git a/target/arm/helper.c b/target/arm/helper.c
20
diff --git a/linux-user/syscall.c b/linux-user/syscall.c
19
index XXXXXXX..XXXXXXX 100644
21
index XXXXXXX..XXXXXXX 100644
20
--- a/target/arm/helper.c
22
--- a/linux-user/syscall.c
21
+++ b/target/arm/helper.c
23
+++ b/linux-user/syscall.c
22
@@ -XXX,XX +XXX,XX @@ static uint64_t do_ats_write(CPUARMState *env, uint64_t value,
24
@@ -XXX,XX +XXX,XX @@ static abi_long do_syscall1(CPUArchState *cpu_env, int num, abi_long arg1,
23
25
#if defined(TARGET_NR_clock_adjtime) && defined(CONFIG_CLOCK_ADJTIME)
24
par64 |= 1; /* F */
26
case TARGET_NR_clock_adjtime:
25
par64 |= (fsr & 0x3f) << 1; /* FS */
27
{
26
- /* Note that S2WLK and FSTAGE are always zero, because we don't
28
- struct timex htx, *phtx = &htx;
27
- * implement virtualization and therefore there can't be a stage 2
29
+ struct timex htx;
28
- * fault.
30
29
- */
31
- if (target_to_host_timex(phtx, arg2) != 0) {
30
+ if (fi.stage2) {
32
+ if (target_to_host_timex(&htx, arg2) != 0) {
31
+ par64 |= (1 << 9); /* S */
33
return -TARGET_EFAULT;
32
+ }
34
}
33
+ if (fi.s1ptw) {
35
- ret = get_errno(clock_adjtime(arg1, phtx));
34
+ par64 |= (1 << 8); /* PTW */
36
- if (!is_error(ret) && phtx) {
35
+ }
37
- if (host_to_target_timex(arg2, phtx) != 0) {
38
- return -TARGET_EFAULT;
39
- }
40
+ ret = get_errno(clock_adjtime(arg1, &htx));
41
+ if (!is_error(ret) && host_to_target_timex(arg2, &htx)) {
42
+ return -TARGET_EFAULT;
43
}
36
}
44
}
37
} else {
45
return ret;
38
/* fsr is a DFSR/IFSR value for the short descriptor
39
--
46
--
40
2.19.1
47
2.34.1
41
48
42
49
diff view generated by jsdifflib
1
In exynos4210_init() we allocate memory for an Exynos4210State
1
Add comments to the in_* fields in the S1Translate struct
2
struct. Generally devices can assume that the memory allocated
2
that explain what they're doing.
3
for their state struct is zero-initialized; we broke that
4
assumption here by using g_new(). Use g_new0() instead.
5
(In particular, some code assumes that the various irq arrays
6
in the Exynos4210Irq sub-struct are zero-initialized.)
7
8
In the longer term, this code should be QOMified, and then
9
the struct memory will be allocated elsewhere and by functions
10
which always zero-initalize it; but for 3.1 this is a
11
simple fix.
12
3
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
4
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
5
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
15
Tested-by: Philippe Mathieu-Daudé <philmd@redhat.com>
6
Message-id: 20230710152130.3928330-2-peter.maydell@linaro.org
16
Message-id: 20181105151132.13884-1-peter.maydell@linaro.org
17
---
7
---
18
hw/arm/exynos4210.c | 2 +-
8
target/arm/ptw.c | 40 ++++++++++++++++++++++++++++++++++++++++
19
1 file changed, 1 insertion(+), 1 deletion(-)
9
1 file changed, 40 insertions(+)
20
10
21
diff --git a/hw/arm/exynos4210.c b/hw/arm/exynos4210.c
11
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
22
index XXXXXXX..XXXXXXX 100644
12
index XXXXXXX..XXXXXXX 100644
23
--- a/hw/arm/exynos4210.c
13
--- a/target/arm/ptw.c
24
+++ b/hw/arm/exynos4210.c
14
+++ b/target/arm/ptw.c
25
@@ -XXX,XX +XXX,XX @@ static uint64_t exynos4210_calc_affinity(int cpu)
15
@@ -XXX,XX +XXX,XX @@
26
16
#endif
27
Exynos4210State *exynos4210_init(MemoryRegion *system_mem)
17
28
{
18
typedef struct S1Translate {
29
- Exynos4210State *s = g_new(Exynos4210State, 1);
19
+ /*
30
+ Exynos4210State *s = g_new0(Exynos4210State, 1);
20
+ * in_mmu_idx : specifies which TTBR, TCR, etc to use for the walk.
31
qemu_irq gate_irq[EXYNOS4210_NCPUS][EXYNOS4210_IRQ_GATE_NINPUTS];
21
+ * Together with in_space, specifies the architectural translation regime.
32
SysBusDevice *busdev;
22
+ */
33
DeviceState *dev;
23
ARMMMUIdx in_mmu_idx;
24
+ /*
25
+ * in_ptw_idx: specifies which mmuidx to use for the actual
26
+ * page table descriptor load operations. This will be one of the
27
+ * ARMMMUIdx_Stage2* or one of the ARMMMUIdx_Phys_* indexes.
28
+ * If a Secure ptw is "downgraded" to NonSecure by an NSTable bit,
29
+ * this field is updated accordingly.
30
+ */
31
ARMMMUIdx in_ptw_idx;
32
+ /*
33
+ * in_space: the security space for this walk. This plus
34
+ * the in_mmu_idx specify the architectural translation regime.
35
+ * If a Secure ptw is "downgraded" to NonSecure by an NSTable bit,
36
+ * this field is updated accordingly.
37
+ *
38
+ * Note that the security space for the in_ptw_idx may be different
39
+ * from that for the in_mmu_idx. We do not need to explicitly track
40
+ * the in_ptw_idx security space because:
41
+ * - if the in_ptw_idx is an ARMMMUIdx_Phys_* then the mmuidx
42
+ * itself specifies the security space
43
+ * - if the in_ptw_idx is an ARMMMUIdx_Stage2* then the security
44
+ * space used for ptw reads is the same as that of the security
45
+ * space of the stage 1 translation for all cases except where
46
+ * stage 1 is Secure; in that case the only possibilities for
47
+ * the ptw read are Secure and NonSecure, and the in_ptw_idx
48
+ * value being Stage2 vs Stage2_S distinguishes those.
49
+ */
50
ARMSecuritySpace in_space;
51
+ /*
52
+ * in_secure: whether the translation regime is a Secure one.
53
+ * This is always equal to arm_space_is_secure(in_space).
54
+ * If a Secure ptw is "downgraded" to NonSecure by an NSTable bit,
55
+ * this field is updated accordingly.
56
+ */
57
bool in_secure;
58
+ /*
59
+ * in_debug: is this a QEMU debug access (gdbstub, etc)? Debug
60
+ * accesses will not update the guest page table access flags
61
+ * and will not change the state of the softmmu TLBs.
62
+ */
63
bool in_debug;
64
/*
65
* If this is stage 2 of a stage 1+2 page table walk, then this must
34
--
66
--
35
2.19.1
67
2.34.1
36
37
diff view generated by jsdifflib
New patch
1
In commit fe4a5472ccd6 we rearranged the logic in S1_ptw_translate()
2
so that the debug-access "call get_phys_addr_*" codepath is used both
3
when S1 is doing ptw reads from stage 2 and when it is doing ptw
4
reads from physical memory. However, we didn't update the
5
calculation of s2ptw->in_space and s2ptw->in_secure to account for
6
the "ptw reads from physical memory" case. This meant that debug
7
accesses when in Secure state broke.
1
8
9
Create a new function S2_security_space() which returns the
10
correct security space to use for the ptw load, and use it to
11
determine the correct .in_secure and .in_space fields for the
12
stage 2 lookup for the ptw load.
13
14
Reported-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
Tested-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
17
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
18
Message-id: 20230710152130.3928330-3-peter.maydell@linaro.org
19
Fixes: fe4a5472ccd6 ("target/arm: Use get_phys_addr_with_struct in S1_ptw_translate")
20
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
21
---
22
target/arm/ptw.c | 37 ++++++++++++++++++++++++++++++++-----
23
1 file changed, 32 insertions(+), 5 deletions(-)
24
25
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
26
index XXXXXXX..XXXXXXX 100644
27
--- a/target/arm/ptw.c
28
+++ b/target/arm/ptw.c
29
@@ -XXX,XX +XXX,XX @@ static bool S2_attrs_are_device(uint64_t hcr, uint8_t attrs)
30
}
31
}
32
33
+static ARMSecuritySpace S2_security_space(ARMSecuritySpace s1_space,
34
+ ARMMMUIdx s2_mmu_idx)
35
+{
36
+ /*
37
+ * Return the security space to use for stage 2 when doing
38
+ * the S1 page table descriptor load.
39
+ */
40
+ if (regime_is_stage2(s2_mmu_idx)) {
41
+ /*
42
+ * The security space for ptw reads is almost always the same
43
+ * as that of the security space of the stage 1 translation.
44
+ * The only exception is when stage 1 is Secure; in that case
45
+ * the ptw read might be to the Secure or the NonSecure space
46
+ * (but never Realm or Root), and the s2_mmu_idx tells us which.
47
+ * Root translations are always single-stage.
48
+ */
49
+ if (s1_space == ARMSS_Secure) {
50
+ return arm_secure_to_space(s2_mmu_idx == ARMMMUIdx_Stage2_S);
51
+ } else {
52
+ assert(s2_mmu_idx != ARMMMUIdx_Stage2_S);
53
+ assert(s1_space != ARMSS_Root);
54
+ return s1_space;
55
+ }
56
+ } else {
57
+ /* ptw loads are from phys: the mmu idx itself says which space */
58
+ return arm_phys_to_space(s2_mmu_idx);
59
+ }
60
+}
61
+
62
/* Translate a S1 pagetable walk through S2 if needed. */
63
static bool S1_ptw_translate(CPUARMState *env, S1Translate *ptw,
64
hwaddr addr, ARMMMUFaultInfo *fi)
65
{
66
- ARMSecuritySpace space = ptw->in_space;
67
bool is_secure = ptw->in_secure;
68
ARMMMUIdx mmu_idx = ptw->in_mmu_idx;
69
ARMMMUIdx s2_mmu_idx = ptw->in_ptw_idx;
70
@@ -XXX,XX +XXX,XX @@ static bool S1_ptw_translate(CPUARMState *env, S1Translate *ptw,
71
* From gdbstub, do not use softmmu so that we don't modify the
72
* state of the cpu at all, including softmmu tlb contents.
73
*/
74
+ ARMSecuritySpace s2_space = S2_security_space(ptw->in_space, s2_mmu_idx);
75
S1Translate s2ptw = {
76
.in_mmu_idx = s2_mmu_idx,
77
.in_ptw_idx = ptw_idx_for_stage_2(env, s2_mmu_idx),
78
- .in_secure = s2_mmu_idx == ARMMMUIdx_Stage2_S,
79
- .in_space = (s2_mmu_idx == ARMMMUIdx_Stage2_S ? ARMSS_Secure
80
- : space == ARMSS_Realm ? ARMSS_Realm
81
- : ARMSS_NonSecure),
82
+ .in_secure = arm_space_is_secure(s2_space),
83
+ .in_space = s2_space,
84
.in_debug = true,
85
};
86
GetPhysAddrResult s2 = { };
87
--
88
2.34.1
diff view generated by jsdifflib
1
ATS1HR and ATS1HW (which allow AArch32 EL2 to do address translations
1
In get_phys_addr_twostage() the code that applies the effects of
2
on the EL2 translation regime) were implemented in commit 14db7fe09a2c8.
2
VSTCR.{SA,SW} and VTCR.{NSA,NSW} only updates result->f.attrs.secure.
3
However, we got them wrong: these should do stage 1 address translations
3
Now we also have f.attrs.space for FEAT_RME, we need to keep the two
4
as defined for NS-EL2, which is ARMMMUIdx_S1E2. We were incorrectly
4
in sync.
5
making them perform stage 2 translations.
6
5
7
A few years later in commit 1313e2d7e2cd we forgot entirely that
6
These bits only have an effect for Secure space translations, not
8
we'd implemented ATS1Hx, and added a comment that ATS1Hx were
7
for Root, so use the input in_space field to determine whether to
9
"not supported yet". Remove the comment; there is no extra code
8
apply them rather than the input is_secure. This doesn't actually
10
needed to handle these operations in do_ats_write(), because
9
make a difference because Root translations are never two-stage,
11
arm_s1_regime_using_lpae_format() returns true for ARMMMUIdx_S1E2,
10
but it's a little clearer.
12
which forces 64-bit PAR format.
13
11
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
15
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
13
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
16
Message-id: 20181016093703.10637-3-peter.maydell@linaro.org
14
Message-id: 20230710152130.3928330-4-peter.maydell@linaro.org
17
Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com>
18
---
15
---
19
target/arm/helper.c | 4 ++--
16
target/arm/ptw.c | 13 ++++++++-----
20
1 file changed, 2 insertions(+), 2 deletions(-)
17
1 file changed, 8 insertions(+), 5 deletions(-)
21
18
22
diff --git a/target/arm/helper.c b/target/arm/helper.c
19
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
23
index XXXXXXX..XXXXXXX 100644
20
index XXXXXXX..XXXXXXX 100644
24
--- a/target/arm/helper.c
21
--- a/target/arm/ptw.c
25
+++ b/target/arm/helper.c
22
+++ b/target/arm/ptw.c
26
@@ -XXX,XX +XXX,XX @@ static uint64_t do_ats_write(CPUARMState *env, uint64_t value,
23
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_twostage(CPUARMState *env, S1Translate *ptw,
27
*
24
hwaddr ipa;
28
* (Note that HCR.DC makes HCR.VM behave as if it is 1.)
25
int s1_prot, s1_lgpgsz;
29
*
26
bool is_secure = ptw->in_secure;
30
- * ATS1Hx always uses the 64bit format (not supported yet).
27
+ ARMSecuritySpace in_space = ptw->in_space;
31
+ * ATS1Hx always uses the 64bit format.
28
bool ret, ipa_secure;
32
*/
29
ARMCacheAttrs cacheattrs1;
33
format64 = arm_s1_regime_using_lpae_format(env, mmu_idx);
30
ARMSecuritySpace ipa_space;
34
31
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_twostage(CPUARMState *env, S1Translate *ptw,
35
@@ -XXX,XX +XXX,XX @@ static void ats1h_write(CPUARMState *env, const ARMCPRegInfo *ri,
32
* Check if IPA translates to secure or non-secure PA space.
36
MMUAccessType access_type = ri->opc2 & 1 ? MMU_DATA_STORE : MMU_DATA_LOAD;
33
* Note that VSTCR overrides VTCR and {N}SW overrides {N}SA.
37
uint64_t par64;
34
*/
38
35
- result->f.attrs.secure =
39
- par64 = do_ats_write(env, value, access_type, ARMMMUIdx_S2NS);
36
- (is_secure
40
+ par64 = do_ats_write(env, value, access_type, ARMMMUIdx_S1E2);
37
- && !(env->cp15.vstcr_el2 & (VSTCR_SA | VSTCR_SW))
41
38
- && (ipa_secure
42
A32_BANKED_CURRENT_REG_SET(env, par, par64);
39
- || !(env->cp15.vtcr_el2 & (VTCR_NSA | VTCR_NSW))));
40
+ if (in_space == ARMSS_Secure) {
41
+ result->f.attrs.secure =
42
+ !(env->cp15.vstcr_el2 & (VSTCR_SA | VSTCR_SW))
43
+ && (ipa_secure
44
+ || !(env->cp15.vtcr_el2 & (VTCR_NSA | VTCR_NSW)));
45
+ result->f.attrs.space = arm_secure_to_space(result->f.attrs.secure);
46
+ }
47
48
return false;
43
}
49
}
44
--
50
--
45
2.19.1
51
2.34.1
46
47
diff view generated by jsdifflib
1
In handle_vec_simd_shli() we have a check:
1
In commit f0a08b0913befbd we changed the type of the PC from
2
if (size > 3 && !is_q) {
2
target_ulong to vaddr. In doing so we inadvertently dropped the
3
unallocated_encoding(s);
3
zero-padding on the PC in trace lines (the second item inside the []
4
return;
4
in these lines). They used to look like this on AArch64, for
5
}
5
instance:
6
However this can never be true, because we calculate
7
int size = 32 - clz32(immh) - 1;
8
where immh is a 4 bit field which we know cannot be all-zeroes.
9
So the clz32() return must be in {28,29,30,31} and the resulting
10
size is in {0,1,2,3}, and "size > 3" is never true.
11
6
12
This unnecessary code confuses Coverity's analysis:
7
Trace 0: 0x7f2260000100 [00000000/0000000040000000/00000061/ff200000]
13
in CID 1396476 it thinks we might later index off the
14
end of an array because the condition implies that we
15
might have a size > 3.
16
8
17
Remove the code, and instead assert that the size is in [0..3],
9
and now they look like this:
18
since the decode that enforces that is somewhat distant from
10
Trace 0: 0x7f4f50000100 [00000000/40000000/00000061/ff200000]
19
this function.
20
11
12
and if the PC happens to be somewhere low like 0x5000
13
then the field is shown as /5000/.
14
15
This is because TARGET_FMT_lx is a "%08x" or "%016x" specifier,
16
depending on TARGET_LONG_SIZE, whereas VADDR_PRIx is just PRIx64
17
with no width specifier.
18
19
Restore the zero-padding by adding an 016 width specifier to
20
this tracing and a couple of others that were similarly recently
21
changed to use VADDR_PRIx without a width specifier.
22
23
We can't unfortunately restore the "32-bit guests are padded to
24
8 hex digits and 64-bit guests to 16 hex digits" behaviour so
25
easily.
26
27
Fixes: f0a08b0913befbd ("accel/tcg/cpu-exec.c: Widen pc to vaddr")
21
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
28
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
22
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
29
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
23
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
30
Reviewed-by: Anton Johansson <anjo@rev.ng>
24
Tested-by: Alex Bennée <alex.bennee@linaro.org>
31
Message-id: 20230711165434.4123674-1-peter.maydell@linaro.org
25
Message-id: 20181030162517.21816-1-peter.maydell@linaro.org
26
---
32
---
27
target/arm/translate-a64.c | 8 +++-----
33
accel/tcg/cpu-exec.c | 4 ++--
28
1 file changed, 3 insertions(+), 5 deletions(-)
34
accel/tcg/translate-all.c | 2 +-
35
2 files changed, 3 insertions(+), 3 deletions(-)
29
36
30
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
37
diff --git a/accel/tcg/cpu-exec.c b/accel/tcg/cpu-exec.c
31
index XXXXXXX..XXXXXXX 100644
38
index XXXXXXX..XXXXXXX 100644
32
--- a/target/arm/translate-a64.c
39
--- a/accel/tcg/cpu-exec.c
33
+++ b/target/arm/translate-a64.c
40
+++ b/accel/tcg/cpu-exec.c
34
@@ -XXX,XX +XXX,XX @@ static void handle_vec_simd_shli(DisasContext *s, bool is_q, bool insert,
41
@@ -XXX,XX +XXX,XX @@ static void log_cpu_exec(vaddr pc, CPUState *cpu,
35
int immhb = immh << 3 | immb;
42
if (qemu_log_in_addr_range(pc)) {
36
int shift = immhb - (8 << size);
43
qemu_log_mask(CPU_LOG_EXEC,
37
44
"Trace %d: %p [%08" PRIx64
38
- if (extract32(immh, 3, 1) && !is_q) {
45
- "/%" VADDR_PRIx "/%08x/%08x] %s\n",
39
- unallocated_encoding(s);
46
+ "/%016" VADDR_PRIx "/%08x/%08x] %s\n",
40
- return;
47
cpu->cpu_index, tb->tc.ptr, tb->cs_base, pc,
41
- }
48
tb->flags, tb->cflags, lookup_symbol(pc));
42
+ /* Range of size is limited by decode: immh is a non-zero 4 bit field */
49
43
+ assert(size >= 0 && size <= 3);
50
@@ -XXX,XX +XXX,XX @@ cpu_tb_exec(CPUState *cpu, TranslationBlock *itb, int *tb_exit)
44
51
if (qemu_loglevel_mask(CPU_LOG_EXEC)) {
45
- if (size > 3 && !is_q) {
52
vaddr pc = log_pc(cpu, last_tb);
46
+ if (extract32(immh, 3, 1) && !is_q) {
53
if (qemu_log_in_addr_range(pc)) {
47
unallocated_encoding(s);
54
- qemu_log("Stopped execution of TB chain before %p [%"
48
return;
55
+ qemu_log("Stopped execution of TB chain before %p [%016"
56
VADDR_PRIx "] %s\n",
57
last_tb->tc.ptr, pc, lookup_symbol(pc));
58
}
59
diff --git a/accel/tcg/translate-all.c b/accel/tcg/translate-all.c
60
index XXXXXXX..XXXXXXX 100644
61
--- a/accel/tcg/translate-all.c
62
+++ b/accel/tcg/translate-all.c
63
@@ -XXX,XX +XXX,XX @@ void cpu_io_recompile(CPUState *cpu, uintptr_t retaddr)
64
if (qemu_loglevel_mask(CPU_LOG_EXEC)) {
65
vaddr pc = log_pc(cpu, tb);
66
if (qemu_log_in_addr_range(pc)) {
67
- qemu_log("cpu_io_recompile: rewound execution of TB to %"
68
+ qemu_log("cpu_io_recompile: rewound execution of TB to %016"
69
VADDR_PRIx "\n", pc);
70
}
49
}
71
}
50
--
72
--
51
2.19.1
73
2.34.1
52
74
53
75
diff view generated by jsdifflib
1
Check the return value from load_image_targphys(), which tells us
1
From: Tong Ho <tong.ho@amd.com>
2
whether our attempt to load the BIOS image into RAM failed.
3
(Spotted by Coverity, CID 1190305.)
4
2
3
Add a check in the bit-set operation to write the backstore
4
only if the affected bit is 0 before.
5
6
With this in place, there will be no need for callers to
7
do the checking in order to avoid unnecessary writes.
8
9
Signed-off-by: Tong Ho <tong.ho@amd.com>
10
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
11
Reviewed-by: Francisco Iglesias <frasse.iglesias@gmail.com>
12
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
7
Acked-by: Michael Walle <michael@walle.cc>
8
Message-id: 20181030170032.1844-1-peter.maydell@linaro.org
9
---
14
---
10
hw/lm32/milkymist.c | 5 ++++-
15
hw/nvram/xlnx-efuse.c | 11 +++++++++--
11
1 file changed, 4 insertions(+), 1 deletion(-)
16
1 file changed, 9 insertions(+), 2 deletions(-)
12
17
13
diff --git a/hw/lm32/milkymist.c b/hw/lm32/milkymist.c
18
diff --git a/hw/nvram/xlnx-efuse.c b/hw/nvram/xlnx-efuse.c
14
index XXXXXXX..XXXXXXX 100644
19
index XXXXXXX..XXXXXXX 100644
15
--- a/hw/lm32/milkymist.c
20
--- a/hw/nvram/xlnx-efuse.c
16
+++ b/hw/lm32/milkymist.c
21
+++ b/hw/nvram/xlnx-efuse.c
17
@@ -XXX,XX +XXX,XX @@ milkymist_init(MachineState *machine)
22
@@ -XXX,XX +XXX,XX @@ static bool efuse_ro_bits_find(XlnxEFuse *s, uint32_t k)
18
bios_filename = qemu_find_file(QEMU_FILE_TYPE_BIOS, bios_name);
23
19
24
bool xlnx_efuse_set_bit(XlnxEFuse *s, unsigned int bit)
20
if (bios_filename) {
25
{
21
- load_image_targphys(bios_filename, BIOS_OFFSET, BIOS_SIZE);
26
+ uint32_t set, *row;
22
+ if (load_image_targphys(bios_filename, BIOS_OFFSET, BIOS_SIZE) < 0) {
27
+
23
+ error_report("could not load bios '%s'", bios_filename);
28
if (efuse_ro_bits_find(s, bit)) {
24
+ exit(1);
29
g_autofree char *path = object_get_canonical_path(OBJECT(s));
25
+ }
30
31
@@ -XXX,XX +XXX,XX @@ bool xlnx_efuse_set_bit(XlnxEFuse *s, unsigned int bit)
32
return false;
26
}
33
}
27
34
28
reset_info->bootstrap_pc = BIOS_OFFSET;
35
- s->fuse32[bit / 32] |= 1 << (bit % 32);
36
- efuse_bdrv_sync(s, bit);
37
+ /* Avoid back-end write unless there is a real update */
38
+ row = &s->fuse32[bit / 32];
39
+ set = 1 << (bit % 32);
40
+ if (!(set & *row)) {
41
+ *row |= set;
42
+ efuse_bdrv_sync(s, bit);
43
+ }
44
return true;
45
}
46
29
--
47
--
30
2.19.1
48
2.34.1
31
49
32
50
diff view generated by jsdifflib