1
Some Arm bugfixes for rc2...
1
A last small test of bug fixes before rc1.
2
2
3
thanks
3
thanks
4
-- PMM
4
-- PMM
5
5
6
The following changes since commit e6ebbd46b6e539f3613136111977721d212c2812:
6
The following changes since commit ed8ad9728a9c0eec34db9dff61dfa2f1dd625637:
7
7
8
Merge remote-tracking branch 'remotes/kevin/tags/for-upstream' into staging (2018-11-19 14:31:48 +0000)
8
Merge tag 'pull-tpm-2023-07-14-1' of https://github.com/stefanberger/qemu-tpm into staging (2023-07-15 14:54:04 +0100)
9
9
10
are available in the Git repository at:
10
are available in the Git repository at:
11
11
12
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20181119
12
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20230717
13
13
14
for you to fetch changes up to a00d7f2048c2a1a6a4487ac195c804c78adcf60e:
14
for you to fetch changes up to c2c1c4a35c7c2b1a4140b0942b9797c857e476a4:
15
15
16
MAINTAINERS: list myself as maintainer for various Arm boards (2018-11-19 15:55:11 +0000)
16
hw/nvram: Avoid unnecessary Xilinx eFuse backstore write (2023-07-17 11:05:52 +0100)
17
17
18
----------------------------------------------------------------
18
----------------------------------------------------------------
19
target-arm queue:
19
target-arm queue:
20
* various MAINTAINERS file updates
20
* hw/arm/sbsa-ref: set 'slots' property of xhci
21
* hw/block/onenand: use qemu_log_mask() for reporting
21
* linux-user: Remove pointless NULL check in clock_adjtime handling
22
* hw/block/onenand: Fix off-by-one error allowing out-of-bounds read
22
* ptw: Fix S1_ptw_translate() debug path
23
on the n800 and n810 machine models
23
* ptw: Account for FEAT_RME when applying {N}SW, SA bits
24
* target/arm: fix smc incorrectly trapping to EL3 when secure is off
24
* accel/tcg: Zero-pad PC in TCG CPU exec trace lines
25
* hw/arm/stm32f205: Fix the UART and Timer region size
25
* hw/nvram: Avoid unnecessary Xilinx eFuse backstore write
26
* target/arm: read ID registers for KVM guests so they can be
27
used to gate "is feature X present" checks
28
26
29
----------------------------------------------------------------
27
----------------------------------------------------------------
30
Luc Michel (1):
28
Peter Maydell (5):
31
target/arm: fix smc incorrectly trapping to EL3 when secure is off
29
linux-user: Remove pointless NULL check in clock_adjtime handling
30
target/arm/ptw.c: Add comments to S1Translate struct fields
31
target/arm: Fix S1_ptw_translate() debug path
32
target/arm/ptw.c: Account for FEAT_RME when applying {N}SW, SA bits
33
accel/tcg: Zero-pad PC in TCG CPU exec trace lines
32
34
33
Peter Maydell (3):
35
Tong Ho (1):
34
hw/block/onenand: Fix off-by-one error allowing out-of-bounds read
36
hw/nvram: Avoid unnecessary Xilinx eFuse backstore write
35
hw/block/onenand: use qemu_log_mask() for reporting
36
MAINTAINERS: list myself as maintainer for various Arm boards
37
37
38
Richard Henderson (4):
38
Yuquan Wang (1):
39
target/arm: Install ARMISARegisters from kvm host
39
hw/arm/sbsa-ref: set 'slots' property of xhci
40
target/arm: Fill in ARMISARegisters for kvm64
41
target/arm: Introduce read_sys_reg32 for kvm32
42
target/arm: Fill in ARMISARegisters for kvm32
43
40
44
Seth Kintigh (1):
41
accel/tcg/cpu-exec.c | 4 +--
45
hw/arm/stm32f205: Fix the UART and Timer region size
42
accel/tcg/translate-all.c | 2 +-
46
43
hw/arm/sbsa-ref.c | 1 +
47
Thomas Huth (1):
44
hw/nvram/xlnx-efuse.c | 11 ++++--
48
MAINTAINERS: Add entries for missing ARM boards
45
linux-user/syscall.c | 12 +++----
49
46
target/arm/ptw.c | 90 +++++++++++++++++++++++++++++++++++++++++------
50
target/arm/kvm_arm.h | 1 +
47
6 files changed, 98 insertions(+), 22 deletions(-)
51
hw/block/onenand.c | 24 +++++-----
52
hw/char/stm32f2xx_usart.c | 2 +-
53
hw/timer/stm32f2xx_timer.c | 2 +-
54
target/arm/kvm.c | 1 +
55
target/arm/kvm32.c | 77 ++++++++++++++++++++------------
56
target/arm/kvm64.c | 90 +++++++++++++++++++++++++++++++++++++-
57
target/arm/op_helper.c | 54 +++++++++++++++++++----
58
MAINTAINERS | 106 +++++++++++++++++++++++++++++++++++++++------
59
9 files changed, 293 insertions(+), 64 deletions(-)
60
diff view generated by jsdifflib
1
An off-by-one error in a switch case in onenand_read() allowed
1
From: Yuquan Wang <wangyuquan1236@phytium.com.cn>
2
a misbehaving guest to read off the end of a block of memory.
3
2
4
NB: the onenand device is used only by the "n800" and "n810"
3
This extends the slots of xhci to 64, since the default xhci_sysbus
5
machines, which are usable only with TCG, not KVM, so this is
4
just supports one slot.
6
not a security issue.
7
5
8
Reported-by: Thomas Huth <thuth@redhat.com>
6
Signed-off-by: Wang Yuquan <wangyuquan1236@phytium.com.cn>
9
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
7
Signed-off-by: Chen Baozi <chenbaozi@phytium.com.cn>
10
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Reviewed-by: Marcin Juszkiewicz <marcin.juszkiewicz@linaro.org>
12
Message-id: 20181115143535.5885-2-peter.maydell@linaro.org
10
Tested-by: Marcin Juszkiewicz <marcin.juszkiewicz@linaro.org>
13
Suggested-by: Richard Henderson <richard.henderson@linaro.org>
11
Message-id: 20230710063750.473510-2-wangyuquan1236@phytium.com.cn
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
15
---
13
---
16
hw/block/onenand.c | 2 +-
14
hw/arm/sbsa-ref.c | 1 +
17
1 file changed, 1 insertion(+), 1 deletion(-)
15
1 file changed, 1 insertion(+)
18
16
19
diff --git a/hw/block/onenand.c b/hw/block/onenand.c
17
diff --git a/hw/arm/sbsa-ref.c b/hw/arm/sbsa-ref.c
20
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
21
--- a/hw/block/onenand.c
19
--- a/hw/arm/sbsa-ref.c
22
+++ b/hw/block/onenand.c
20
+++ b/hw/arm/sbsa-ref.c
23
@@ -XXX,XX +XXX,XX @@ static uint64_t onenand_read(void *opaque, hwaddr addr,
21
@@ -XXX,XX +XXX,XX @@ static void create_xhci(const SBSAMachineState *sms)
24
int offset = addr >> s->shift;
22
hwaddr base = sbsa_ref_memmap[SBSA_XHCI].base;
25
23
int irq = sbsa_ref_irqmap[SBSA_XHCI];
26
switch (offset) {
24
DeviceState *dev = qdev_new(TYPE_XHCI_SYSBUS);
27
- case 0x0000 ... 0xc000:
25
+ qdev_prop_set_uint32(dev, "slots", XHCI_MAXSLOTS);
28
+ case 0x0000 ... 0xbffe:
26
29
return lduw_le_p(s->boot[0] + addr);
27
sysbus_realize_and_unref(SYS_BUS_DEVICE(dev), &error_fatal);
30
28
sysbus_mmio_map(SYS_BUS_DEVICE(dev), 0, base);
31
case 0xf000:    /* Manufacturer ID */
32
--
29
--
33
2.19.1
30
2.34.1
34
35
diff view generated by jsdifflib
1
From: Luc Michel <luc.michel@greensocs.com>
1
In the code for TARGET_NR_clock_adjtime, we set the pointer phtx to
2
the address of the local variable htx. This means it can never be
3
NULL, but later in the code we check it for NULL anyway. Coverity
4
complains about this (CID 1507683) because the NULL check comes after
5
a call to clock_adjtime() that assumes it is non-NULL.
2
6
3
This commit fixes a case where the CPU would try to go to EL3 when
7
Since phtx is always &htx, and is used only in three places, it's not
4
executing an smc instruction, even though ARM_FEATURE_EL3 is false. This
8
really necessary. Remove it, bringing the code structure in to line
5
case is raised when the PSCI conduit is set to smc, but the smc
9
with that for TARGET_NR_clock_adjtime64, which already uses a simple
6
instruction does not lead to a valid PSCI call.
10
'&htx' when it wants a pointer to 'htx'.
7
11
8
QEMU crashes with an assertion failure latter on because of incoherent
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
mmu_idx.
13
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
14
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
15
Message-id: 20230623144410.1837261-1-peter.maydell@linaro.org
16
---
17
linux-user/syscall.c | 12 +++++-------
18
1 file changed, 5 insertions(+), 7 deletions(-)
10
19
11
This commit refactors the pre_smc helper by enumerating all the possible
20
diff --git a/linux-user/syscall.c b/linux-user/syscall.c
12
way of handling an scm instruction, and covering the previously missing
13
case leading to the crash.
14
15
The following minimal test would crash before this commit:
16
17
.global _start
18
.text
19
_start:
20
ldr x0, =0xdeadbeef ; invalid PSCI call
21
smc #0
22
23
run with the following command line:
24
25
aarch64-linux-gnu-gcc -nostdinc -nostdlib -Wl,-Ttext=40000000 \
26
-o test test.s
27
28
qemu-system-aarch64 -M virt,virtualization=on,secure=off \
29
-cpu cortex-a57 -kernel test
30
31
Signed-off-by: Luc Michel <luc.michel@greensocs.com>
32
Message-id: 20181117160213.18995-1-luc.michel@greensocs.com
33
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
34
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
35
---
36
target/arm/op_helper.c | 54 +++++++++++++++++++++++++++++++++++-------
37
1 file changed, 46 insertions(+), 8 deletions(-)
38
39
diff --git a/target/arm/op_helper.c b/target/arm/op_helper.c
40
index XXXXXXX..XXXXXXX 100644
21
index XXXXXXX..XXXXXXX 100644
41
--- a/target/arm/op_helper.c
22
--- a/linux-user/syscall.c
42
+++ b/target/arm/op_helper.c
23
+++ b/linux-user/syscall.c
43
@@ -XXX,XX +XXX,XX @@ void HELPER(pre_smc)(CPUARMState *env, uint32_t syndrome)
24
@@ -XXX,XX +XXX,XX @@ static abi_long do_syscall1(CPUArchState *cpu_env, int num, abi_long arg1,
44
ARMCPU *cpu = arm_env_get_cpu(env);
25
#if defined(TARGET_NR_clock_adjtime) && defined(CONFIG_CLOCK_ADJTIME)
45
int cur_el = arm_current_el(env);
26
case TARGET_NR_clock_adjtime:
46
bool secure = arm_is_secure(env);
27
{
47
- bool smd = env->cp15.scr_el3 & SCR_SMD;
28
- struct timex htx, *phtx = &htx;
48
+ bool smd_flag = env->cp15.scr_el3 & SCR_SMD;
29
+ struct timex htx;
49
+
30
50
+ /*
31
- if (target_to_host_timex(phtx, arg2) != 0) {
51
+ * SMC behaviour is summarized in the following table.
32
+ if (target_to_host_timex(&htx, arg2) != 0) {
52
+ * This helper handles the "Trap to EL2" and "Undef insn" cases.
33
return -TARGET_EFAULT;
53
+ * The "Trap to EL3" and "PSCI call" cases are handled in the exception
34
}
54
+ * helper.
35
- ret = get_errno(clock_adjtime(arg1, phtx));
55
+ *
36
- if (!is_error(ret) && phtx) {
56
+ * -> ARM_FEATURE_EL3 and !SMD
37
- if (host_to_target_timex(arg2, phtx) != 0) {
57
+ * HCR_TSC && NS EL1 !HCR_TSC || !NS EL1
38
- return -TARGET_EFAULT;
58
+ *
39
- }
59
+ * Conduit SMC, valid call Trap to EL2 PSCI Call
40
+ ret = get_errno(clock_adjtime(arg1, &htx));
60
+ * Conduit SMC, inval call Trap to EL2 Trap to EL3
41
+ if (!is_error(ret) && host_to_target_timex(arg2, &htx)) {
61
+ * Conduit not SMC Trap to EL2 Trap to EL3
42
+ return -TARGET_EFAULT;
62
+ *
43
}
63
+ *
44
}
64
+ * -> ARM_FEATURE_EL3 and SMD
45
return ret;
65
+ * HCR_TSC && NS EL1 !HCR_TSC || !NS EL1
66
+ *
67
+ * Conduit SMC, valid call Trap to EL2 PSCI Call
68
+ * Conduit SMC, inval call Trap to EL2 Undef insn
69
+ * Conduit not SMC Trap to EL2 Undef insn
70
+ *
71
+ *
72
+ * -> !ARM_FEATURE_EL3
73
+ * HCR_TSC && NS EL1 !HCR_TSC || !NS EL1
74
+ *
75
+ * Conduit SMC, valid call Trap to EL2 PSCI Call
76
+ * Conduit SMC, inval call Trap to EL2 Undef insn
77
+ * Conduit not SMC Undef insn Undef insn
78
+ */
79
+
80
/* On ARMv8 with EL3 AArch64, SMD applies to both S and NS state.
81
* On ARMv8 with EL3 AArch32, or ARMv7 with the Virtualization
82
* extensions, SMD only applies to NS state.
83
@@ -XXX,XX +XXX,XX @@ void HELPER(pre_smc)(CPUARMState *env, uint32_t syndrome)
84
* doesn't exist, but we forbid the guest to set it to 1 in scr_write(),
85
* so we need not special case this here.
86
*/
87
- bool undef = arm_feature(env, ARM_FEATURE_AARCH64) ? smd : smd && !secure;
88
+ bool smd = arm_feature(env, ARM_FEATURE_AARCH64) ? smd_flag
89
+ : smd_flag && !secure;
90
91
if (!arm_feature(env, ARM_FEATURE_EL3) &&
92
cpu->psci_conduit != QEMU_PSCI_CONDUIT_SMC) {
93
@@ -XXX,XX +XXX,XX @@ void HELPER(pre_smc)(CPUARMState *env, uint32_t syndrome)
94
* to forbid its EL1 from making PSCI calls into QEMU's
95
* "firmware" via HCR.TSC, so for these purposes treat
96
* PSCI-via-SMC as implying an EL3.
97
+ * This handles the very last line of the previous table.
98
*/
99
- undef = true;
100
- } else if (!secure && cur_el == 1 && (env->cp15.hcr_el2 & HCR_TSC)) {
101
+ raise_exception(env, EXCP_UDEF, syn_uncategorized(),
102
+ exception_target_el(env));
103
+ }
104
+
105
+ if (!secure && cur_el == 1 && (env->cp15.hcr_el2 & HCR_TSC)) {
106
/* In NS EL1, HCR controlled routing to EL2 has priority over SMD.
107
* We also want an EL2 guest to be able to forbid its EL1 from
108
* making PSCI calls into QEMU's "firmware" via HCR.TSC.
109
+ * This handles all the "Trap to EL2" cases of the previous table.
110
*/
111
raise_exception(env, EXCP_HYP_TRAP, syndrome, 2);
112
}
113
114
- /* If PSCI is enabled and this looks like a valid PSCI call then
115
- * suppress the UNDEF -- we'll catch the SMC exception and
116
- * implement the PSCI call behaviour there.
117
+ /* Catch the two remaining "Undef insn" cases of the previous table:
118
+ * - PSCI conduit is SMC but we don't have a valid PCSI call,
119
+ * - We don't have EL3 or SMD is set.
120
*/
121
- if (undef && !arm_is_psci_call(cpu, EXCP_SMC)) {
122
+ if (!arm_is_psci_call(cpu, EXCP_SMC) &&
123
+ (smd || !arm_feature(env, ARM_FEATURE_EL3))) {
124
raise_exception(env, EXCP_UDEF, syn_uncategorized(),
125
exception_target_el(env));
126
}
127
--
46
--
128
2.19.1
47
2.34.1
129
48
130
49
diff view generated by jsdifflib
1
In practice for most of the more-or-less orphan Arm board models,
1
Add comments to the in_* fields in the S1Translate struct
2
I will review patches and put them in via the target-arm tree.
2
that explain what they're doing.
3
So list myself as an "Odd Fixes" status maintainer for them.
4
5
This commit downgrades these boards to "Odd Fixes":
6
* Allwinner-A10
7
* Exynos
8
* Calxeda Highbank
9
* Canon DIGIC
10
* Musicpal
11
* nSeries
12
* Palm
13
* PXA2xx
14
15
These boards were already "Odd Fixes":
16
* Gumstix
17
* i.MX31 (kzm)
18
19
Philippe Mathieu-Daudé has requested to be moved to R:
20
status for Gumstix now that I am listed as the M: contact.
21
22
Some boards are maintained, but their patches still go
23
via the target-arm tree, so add myself as a secondary
24
maintainer contact for those:
25
* Xilinx Zynq
26
* Xilinx ZynqMP
27
* STM32F205
28
* Netduino 2
29
* SmartFusion2
30
* Mecraft M2S-FG484
31
* ASPEED BMCs
32
* NRF51
33
3
34
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
4
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
35
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
5
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
36
Reviewed-by: Thomas Huth <thuth@redhat.com>
6
Message-id: 20230710152130.3928330-2-peter.maydell@linaro.org
37
Message-id: 20181108134139.31666-1-peter.maydell@linaro.org
38
---
7
---
39
MAINTAINERS | 36 +++++++++++++++++++++++++++---------
8
target/arm/ptw.c | 40 ++++++++++++++++++++++++++++++++++++++++
40
1 file changed, 27 insertions(+), 9 deletions(-)
9
1 file changed, 40 insertions(+)
41
10
42
diff --git a/MAINTAINERS b/MAINTAINERS
11
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
43
index XXXXXXX..XXXXXXX 100644
12
index XXXXXXX..XXXXXXX 100644
44
--- a/MAINTAINERS
13
--- a/target/arm/ptw.c
45
+++ b/MAINTAINERS
14
+++ b/target/arm/ptw.c
46
@@ -XXX,XX +XXX,XX @@ ARM Machines
15
@@ -XXX,XX +XXX,XX @@
47
------------
16
#endif
48
Allwinner-a10
17
49
M: Beniamino Galvani <b.galvani@gmail.com>
18
typedef struct S1Translate {
50
+M: Peter Maydell <peter.maydell@linaro.org>
19
+ /*
51
L: qemu-arm@nongnu.org
20
+ * in_mmu_idx : specifies which TTBR, TCR, etc to use for the walk.
52
-S: Maintained
21
+ * Together with in_space, specifies the architectural translation regime.
53
+S: Odd Fixes
22
+ */
54
F: hw/*/allwinner*
23
ARMMMUIdx in_mmu_idx;
55
F: include/hw/*/allwinner*
24
+ /*
56
F: hw/arm/cubieboard.c
25
+ * in_ptw_idx: specifies which mmuidx to use for the actual
57
@@ -XXX,XX +XXX,XX @@ F: tests/test-arm-mptimer.c
26
+ * page table descriptor load operations. This will be one of the
58
27
+ * ARMMMUIdx_Stage2* or one of the ARMMMUIdx_Phys_* indexes.
59
Exynos
28
+ * If a Secure ptw is "downgraded" to NonSecure by an NSTable bit,
60
M: Igor Mitsyanko <i.mitsyanko@gmail.com>
29
+ * this field is updated accordingly.
61
+M: Peter Maydell <peter.maydell@linaro.org>
30
+ */
62
L: qemu-arm@nongnu.org
31
ARMMMUIdx in_ptw_idx;
63
-S: Maintained
32
+ /*
64
+S: Odd Fixes
33
+ * in_space: the security space for this walk. This plus
65
F: hw/*/exynos*
34
+ * the in_mmu_idx specify the architectural translation regime.
66
F: include/hw/arm/exynos4210.h
35
+ * If a Secure ptw is "downgraded" to NonSecure by an NSTable bit,
67
36
+ * this field is updated accordingly.
68
Calxeda Highbank
37
+ *
69
M: Rob Herring <robh@kernel.org>
38
+ * Note that the security space for the in_ptw_idx may be different
70
+M: Peter Maydell <peter.maydell@linaro.org>
39
+ * from that for the in_mmu_idx. We do not need to explicitly track
71
L: qemu-arm@nongnu.org
40
+ * the in_ptw_idx security space because:
72
-S: Maintained
41
+ * - if the in_ptw_idx is an ARMMMUIdx_Phys_* then the mmuidx
73
+S: Odd Fixes
42
+ * itself specifies the security space
74
F: hw/arm/highbank.c
43
+ * - if the in_ptw_idx is an ARMMMUIdx_Stage2* then the security
75
F: hw/net/xgmac.c
44
+ * space used for ptw reads is the same as that of the security
76
45
+ * space of the stage 1 translation for all cases except where
77
Canon DIGIC
46
+ * stage 1 is Secure; in that case the only possibilities for
78
M: Antony Pavlov <antonynpavlov@gmail.com>
47
+ * the ptw read are Secure and NonSecure, and the in_ptw_idx
79
+M: Peter Maydell <peter.maydell@linaro.org>
48
+ * value being Stage2 vs Stage2_S distinguishes those.
80
L: qemu-arm@nongnu.org
49
+ */
81
-S: Maintained
50
ARMSecuritySpace in_space;
82
+S: Odd Fixes
51
+ /*
83
F: include/hw/arm/digic.h
52
+ * in_secure: whether the translation regime is a Secure one.
84
F: hw/*/digic*
53
+ * This is always equal to arm_space_is_secure(in_space).
85
54
+ * If a Secure ptw is "downgraded" to NonSecure by an NSTable bit,
86
Gumstix
55
+ * this field is updated accordingly.
87
-M: Philippe Mathieu-Daudé <f4bug@amsat.org>
56
+ */
88
+M: Peter Maydell <peter.maydell@linaro.org>
57
bool in_secure;
89
+R: Philippe Mathieu-Daudé <f4bug@amsat.org>
58
+ /*
90
L: qemu-devel@nongnu.org
59
+ * in_debug: is this a QEMU debug access (gdbstub, etc)? Debug
91
L: qemu-arm@nongnu.org
60
+ * accesses will not update the guest page table access flags
92
S: Odd Fixes
61
+ * and will not change the state of the softmmu TLBs.
93
@@ -XXX,XX +XXX,XX @@ F: hw/arm/gumstix.c
62
+ */
94
63
bool in_debug;
95
i.MX31 (kzm)
64
/*
96
M: Peter Chubb <peter.chubb@nicta.com.au>
65
* If this is stage 2 of a stage 1+2 page table walk, then this must
97
+M: Peter Maydell <peter.maydell@linaro.org>
98
L: qemu-arm@nongnu.org
99
S: Odd Fixes
100
F: hw/arm/kzm.c
101
@@ -XXX,XX +XXX,XX @@ F: include/hw/misc/iotkit-sysinfo.h
102
103
Musicpal
104
M: Jan Kiszka <jan.kiszka@web.de>
105
+M: Peter Maydell <peter.maydell@linaro.org>
106
L: qemu-arm@nongnu.org
107
-S: Maintained
108
+S: Odd Fixes
109
F: hw/arm/musicpal.c
110
111
nSeries
112
M: Andrzej Zaborowski <balrogg@gmail.com>
113
+M: Peter Maydell <peter.maydell@linaro.org>
114
L: qemu-arm@nongnu.org
115
-S: Maintained
116
+S: Odd Fixes
117
F: hw/arm/nseries.c
118
119
Palm
120
M: Andrzej Zaborowski <balrogg@gmail.com>
121
+M: Peter Maydell <peter.maydell@linaro.org>
122
L: qemu-arm@nongnu.org
123
-S: Maintained
124
+S: Odd Fixes
125
F: hw/arm/palm.c
126
127
Raspberry Pi
128
@@ -XXX,XX +XXX,XX @@ F: include/hw/intc/realview_gic.h
129
130
PXA2XX
131
M: Andrzej Zaborowski <balrogg@gmail.com>
132
+M: Peter Maydell <peter.maydell@linaro.org>
133
L: qemu-arm@nongnu.org
134
-S: Maintained
135
+S: Odd Fixes
136
F: hw/arm/mainstone.c
137
F: hw/arm/spitz.c
138
F: hw/arm/tosa.c
139
@@ -XXX,XX +XXX,XX @@ F: include/hw/arm/virt.h
140
Xilinx Zynq
141
M: Edgar E. Iglesias <edgar.iglesias@gmail.com>
142
M: Alistair Francis <alistair@alistair23.me>
143
+M: Peter Maydell <peter.maydell@linaro.org>
144
L: qemu-arm@nongnu.org
145
S: Maintained
146
F: hw/*/xilinx_*
147
@@ -XXX,XX +XXX,XX @@ X: hw/ssi/xilinx_*
148
Xilinx ZynqMP
149
M: Alistair Francis <alistair@alistair23.me>
150
M: Edgar E. Iglesias <edgar.iglesias@gmail.com>
151
+M: Peter Maydell <peter.maydell@linaro.org>
152
L: qemu-arm@nongnu.org
153
S: Maintained
154
F: hw/*/xlnx*.c
155
@@ -XXX,XX +XXX,XX @@ F: hw/arm/virt-acpi-build.c
156
157
STM32F205
158
M: Alistair Francis <alistair@alistair23.me>
159
+M: Peter Maydell <peter.maydell@linaro.org>
160
S: Maintained
161
F: hw/arm/stm32f205_soc.c
162
F: hw/misc/stm32f2xx_syscfg.c
163
@@ -XXX,XX +XXX,XX @@ F: include/hw/*/stm32*.h
164
165
Netduino 2
166
M: Alistair Francis <alistair@alistair23.me>
167
+M: Peter Maydell <peter.maydell@linaro.org>
168
S: Maintained
169
F: hw/arm/netduino2.c
170
171
SmartFusion2
172
M: Subbaraya Sundeep <sundeep.lkml@gmail.com>
173
+M: Peter Maydell <peter.maydell@linaro.org>
174
S: Maintained
175
F: hw/arm/msf2-soc.c
176
F: hw/misc/msf2-sysreg.c
177
@@ -XXX,XX +XXX,XX @@ F: include/hw/ssi/mss-spi.h
178
179
Emcraft M2S-FG484
180
M: Subbaraya Sundeep <sundeep.lkml@gmail.com>
181
+M: Peter Maydell <peter.maydell@linaro.org>
182
S: Maintained
183
F: hw/arm/msf2-som.c
184
185
ASPEED BMCs
186
M: Cédric Le Goater <clg@kaod.org>
187
+M: Peter Maydell <peter.maydell@linaro.org>
188
R: Andrew Jeffery <andrew@aj.id.au>
189
R: Joel Stanley <joel@jms.id.au>
190
L: qemu-arm@nongnu.org
191
@@ -XXX,XX +XXX,XX @@ F: include/hw/net/ftgmac100.h
192
193
NRF51
194
M: Joel Stanley <joel@jms.id.au>
195
+M: Peter Maydell <peter.maydell@linaro.org>
196
L: qemu-arm@nongnu.org
197
S: Maintained
198
F: hw/arm/nrf51_soc.c
199
--
66
--
200
2.19.1
67
2.34.1
201
202
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
In commit fe4a5472ccd6 we rearranged the logic in S1_ptw_translate()
2
so that the debug-access "call get_phys_addr_*" codepath is used both
3
when S1 is doing ptw reads from stage 2 and when it is doing ptw
4
reads from physical memory. However, we didn't update the
5
calculation of s2ptw->in_space and s2ptw->in_secure to account for
6
the "ptw reads from physical memory" case. This meant that debug
7
accesses when in Secure state broke.
2
8
3
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
9
Create a new function S2_security_space() which returns the
4
Message-id: 20181113180154.17903-3-richard.henderson@linaro.org
10
correct security space to use for the ptw load, and use it to
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
determine the correct .in_secure and .in_space fields for the
12
stage 2 lookup for the ptw load.
13
14
Reported-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
Tested-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
17
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
18
Message-id: 20230710152130.3928330-3-peter.maydell@linaro.org
19
Fixes: fe4a5472ccd6 ("target/arm: Use get_phys_addr_with_struct in S1_ptw_translate")
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
20
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
---
21
---
8
target/arm/kvm64.c | 90 ++++++++++++++++++++++++++++++++++++++++++++--
22
target/arm/ptw.c | 37 ++++++++++++++++++++++++++++++++-----
9
1 file changed, 88 insertions(+), 2 deletions(-)
23
1 file changed, 32 insertions(+), 5 deletions(-)
10
24
11
diff --git a/target/arm/kvm64.c b/target/arm/kvm64.c
25
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
12
index XXXXXXX..XXXXXXX 100644
26
index XXXXXXX..XXXXXXX 100644
13
--- a/target/arm/kvm64.c
27
--- a/target/arm/ptw.c
14
+++ b/target/arm/kvm64.c
28
+++ b/target/arm/ptw.c
15
@@ -XXX,XX +XXX,XX @@ static inline void unset_feature(uint64_t *features, int feature)
29
@@ -XXX,XX +XXX,XX @@ static bool S2_attrs_are_device(uint64_t hcr, uint8_t attrs)
16
*features &= ~(1ULL << feature);
30
}
17
}
31
}
18
32
19
+static int read_sys_reg32(int fd, uint32_t *pret, uint64_t id)
33
+static ARMSecuritySpace S2_security_space(ARMSecuritySpace s1_space,
34
+ ARMMMUIdx s2_mmu_idx)
20
+{
35
+{
21
+ uint64_t ret;
36
+ /*
22
+ struct kvm_one_reg idreg = { .id = id, .addr = (uintptr_t)&ret };
37
+ * Return the security space to use for stage 2 when doing
23
+ int err;
38
+ * the S1 page table descriptor load.
24
+
39
+ */
25
+ assert((id & KVM_REG_SIZE_MASK) == KVM_REG_SIZE_U64);
40
+ if (regime_is_stage2(s2_mmu_idx)) {
26
+ err = ioctl(fd, KVM_GET_ONE_REG, &idreg);
41
+ /*
27
+ if (err < 0) {
42
+ * The security space for ptw reads is almost always the same
28
+ return -1;
43
+ * as that of the security space of the stage 1 translation.
44
+ * The only exception is when stage 1 is Secure; in that case
45
+ * the ptw read might be to the Secure or the NonSecure space
46
+ * (but never Realm or Root), and the s2_mmu_idx tells us which.
47
+ * Root translations are always single-stage.
48
+ */
49
+ if (s1_space == ARMSS_Secure) {
50
+ return arm_secure_to_space(s2_mmu_idx == ARMMMUIdx_Stage2_S);
51
+ } else {
52
+ assert(s2_mmu_idx != ARMMMUIdx_Stage2_S);
53
+ assert(s1_space != ARMSS_Root);
54
+ return s1_space;
55
+ }
56
+ } else {
57
+ /* ptw loads are from phys: the mmu idx itself says which space */
58
+ return arm_phys_to_space(s2_mmu_idx);
29
+ }
59
+ }
30
+ *pret = ret;
31
+ return 0;
32
+}
60
+}
33
+
61
+
34
+static int read_sys_reg64(int fd, uint64_t *pret, uint64_t id)
62
/* Translate a S1 pagetable walk through S2 if needed. */
35
+{
63
static bool S1_ptw_translate(CPUARMState *env, S1Translate *ptw,
36
+ struct kvm_one_reg idreg = { .id = id, .addr = (uintptr_t)pret };
64
hwaddr addr, ARMMMUFaultInfo *fi)
37
+
38
+ assert((id & KVM_REG_SIZE_MASK) == KVM_REG_SIZE_U64);
39
+ return ioctl(fd, KVM_GET_ONE_REG, &idreg);
40
+}
41
+
42
bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)
43
{
65
{
44
/* Identify the feature bits corresponding to the host CPU, and
66
- ARMSecuritySpace space = ptw->in_space;
45
* fill out the ARMHostCPUClass fields accordingly. To do this
67
bool is_secure = ptw->in_secure;
46
* we have to create a scratch VM, create a single CPU inside it,
68
ARMMMUIdx mmu_idx = ptw->in_mmu_idx;
47
* and then query that CPU for the relevant ID registers.
69
ARMMMUIdx s2_mmu_idx = ptw->in_ptw_idx;
48
- * For AArch64 we currently don't care about ID registers at
70
@@ -XXX,XX +XXX,XX @@ static bool S1_ptw_translate(CPUARMState *env, S1Translate *ptw,
49
- * all; we just want to know the CPU type.
71
* From gdbstub, do not use softmmu so that we don't modify the
50
*/
72
* state of the cpu at all, including softmmu tlb contents.
51
int fdarray[3];
73
*/
52
uint64_t features = 0;
74
+ ARMSecuritySpace s2_space = S2_security_space(ptw->in_space, s2_mmu_idx);
53
+ int err;
75
S1Translate s2ptw = {
54
+
76
.in_mmu_idx = s2_mmu_idx,
55
/* Old kernels may not know about the PREFERRED_TARGET ioctl: however
77
.in_ptw_idx = ptw_idx_for_stage_2(env, s2_mmu_idx),
56
* we know these will only support creating one kind of guest CPU,
78
- .in_secure = s2_mmu_idx == ARMMMUIdx_Stage2_S,
57
* which is its preferred CPU type. Fortunately these old kernels
79
- .in_space = (s2_mmu_idx == ARMMMUIdx_Stage2_S ? ARMSS_Secure
58
@@ -XXX,XX +XXX,XX @@ bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)
80
- : space == ARMSS_Realm ? ARMSS_Realm
59
ahcf->target = init.target;
81
- : ARMSS_NonSecure),
60
ahcf->dtb_compatible = "arm,arm-v8";
82
+ .in_secure = arm_space_is_secure(s2_space),
61
83
+ .in_space = s2_space,
62
+ err = read_sys_reg64(fdarray[2], &ahcf->isar.id_aa64pfr0,
84
.in_debug = true,
63
+ ARM64_SYS_REG(3, 0, 0, 4, 0));
85
};
64
+ if (unlikely(err < 0)) {
86
GetPhysAddrResult s2 = { };
65
+ /*
66
+ * Before v4.15, the kernel only exposed a limited number of system
67
+ * registers, not including any of the interesting AArch64 ID regs.
68
+ * For the most part we could leave these fields as zero with minimal
69
+ * effect, since this does not affect the values seen by the guest.
70
+ *
71
+ * However, it could cause problems down the line for QEMU,
72
+ * so provide a minimal v8.0 default.
73
+ *
74
+ * ??? Could read MIDR and use knowledge from cpu64.c.
75
+ * ??? Could map a page of memory into our temp guest and
76
+ * run the tiniest of hand-crafted kernels to extract
77
+ * the values seen by the guest.
78
+ * ??? Either of these sounds like too much effort just
79
+ * to work around running a modern host kernel.
80
+ */
81
+ ahcf->isar.id_aa64pfr0 = 0x00000011; /* EL1&0, AArch64 only */
82
+ err = 0;
83
+ } else {
84
+ err |= read_sys_reg64(fdarray[2], &ahcf->isar.id_aa64pfr1,
85
+ ARM64_SYS_REG(3, 0, 0, 4, 1));
86
+ err |= read_sys_reg64(fdarray[2], &ahcf->isar.id_aa64isar0,
87
+ ARM64_SYS_REG(3, 0, 0, 6, 0));
88
+ err |= read_sys_reg64(fdarray[2], &ahcf->isar.id_aa64isar1,
89
+ ARM64_SYS_REG(3, 0, 0, 6, 1));
90
+
91
+ /*
92
+ * Note that if AArch32 support is not present in the host,
93
+ * the AArch32 sysregs are present to be read, but will
94
+ * return UNKNOWN values. This is neither better nor worse
95
+ * than skipping the reads and leaving 0, as we must avoid
96
+ * considering the values in every case.
97
+ */
98
+ err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_isar0,
99
+ ARM64_SYS_REG(3, 0, 0, 2, 0));
100
+ err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_isar1,
101
+ ARM64_SYS_REG(3, 0, 0, 2, 1));
102
+ err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_isar2,
103
+ ARM64_SYS_REG(3, 0, 0, 2, 2));
104
+ err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_isar3,
105
+ ARM64_SYS_REG(3, 0, 0, 2, 3));
106
+ err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_isar4,
107
+ ARM64_SYS_REG(3, 0, 0, 2, 4));
108
+ err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_isar5,
109
+ ARM64_SYS_REG(3, 0, 0, 2, 5));
110
+ err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_isar6,
111
+ ARM64_SYS_REG(3, 0, 0, 2, 7));
112
+
113
+ err |= read_sys_reg32(fdarray[2], &ahcf->isar.mvfr0,
114
+ ARM64_SYS_REG(3, 0, 0, 3, 0));
115
+ err |= read_sys_reg32(fdarray[2], &ahcf->isar.mvfr1,
116
+ ARM64_SYS_REG(3, 0, 0, 3, 1));
117
+ err |= read_sys_reg32(fdarray[2], &ahcf->isar.mvfr2,
118
+ ARM64_SYS_REG(3, 0, 0, 3, 2));
119
+ }
120
+
121
kvm_arm_destroy_scratch_host_vcpu(fdarray);
122
123
+ if (err < 0) {
124
+ return false;
125
+ }
126
+
127
/* We can assume any KVM supporting CPU is at least a v8
128
* with VFPv4+Neon; this in turn implies most of the other
129
* feature bits.
130
--
87
--
131
2.19.1
88
2.34.1
132
133
diff view generated by jsdifflib
1
Update the onenand device to use qemu_log_mask() for reporting
1
In get_phys_addr_twostage() the code that applies the effects of
2
guest errors and unimplemented features, rather than plain
2
VSTCR.{SA,SW} and VTCR.{NSA,NSW} only updates result->f.attrs.secure.
3
fprintf() and hw_error().
3
Now we also have f.attrs.space for FEAT_RME, we need to keep the two
4
in sync.
4
5
5
(We leave the hw_error() in onenand_reset(), as that is
6
These bits only have an effect for Secure space translations, not
6
triggered by a failure to read the underlying block device
7
for Root, so use the input in_space field to determine whether to
7
for the bootRAM, not by guest action.)
8
apply them rather than the input is_secure. This doesn't actually
9
make a difference because Root translations are never two-stage,
10
but it's a little clearer.
8
11
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
11
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
13
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
12
Reviewed-by: Thomas Huth <thuth@redhat.com>
14
Message-id: 20230710152130.3928330-4-peter.maydell@linaro.org
13
Tested-by: Philippe Mathieu-Daudé <philmd@redhat.com>
14
Message-id: 20181115143535.5885-3-peter.maydell@linaro.org
15
---
15
---
16
hw/block/onenand.c | 22 +++++++++++++---------
16
target/arm/ptw.c | 13 ++++++++-----
17
1 file changed, 13 insertions(+), 9 deletions(-)
17
1 file changed, 8 insertions(+), 5 deletions(-)
18
18
19
diff --git a/hw/block/onenand.c b/hw/block/onenand.c
19
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
20
index XXXXXXX..XXXXXXX 100644
20
index XXXXXXX..XXXXXXX 100644
21
--- a/hw/block/onenand.c
21
--- a/target/arm/ptw.c
22
+++ b/hw/block/onenand.c
22
+++ b/target/arm/ptw.c
23
@@ -XXX,XX +XXX,XX @@
23
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_twostage(CPUARMState *env, S1Translate *ptw,
24
#include "exec/memory.h"
24
hwaddr ipa;
25
#include "hw/sysbus.h"
25
int s1_prot, s1_lgpgsz;
26
#include "qemu/error-report.h"
26
bool is_secure = ptw->in_secure;
27
+#include "qemu/log.h"
27
+ ARMSecuritySpace in_space = ptw->in_space;
28
28
bool ret, ipa_secure;
29
/* 11 for 2kB-page OneNAND ("2nd generation") and 10 for 1kB-page chips */
29
ARMCacheAttrs cacheattrs1;
30
#define PAGE_SHIFT    11
30
ARMSecuritySpace ipa_space;
31
@@ -XXX,XX +XXX,XX @@ static void onenand_command(OneNANDState *s)
31
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_twostage(CPUARMState *env, S1Translate *ptw,
32
default:
32
* Check if IPA translates to secure or non-secure PA space.
33
s->status |= ONEN_ERR_CMD;
33
* Note that VSTCR overrides VTCR and {N}SW overrides {N}SA.
34
s->intstatus |= ONEN_INT;
34
*/
35
- fprintf(stderr, "%s: unknown OneNAND command %x\n",
35
- result->f.attrs.secure =
36
- __func__, s->command);
36
- (is_secure
37
+ qemu_log_mask(LOG_GUEST_ERROR, "unknown OneNAND command %x\n",
37
- && !(env->cp15.vstcr_el2 & (VSTCR_SA | VSTCR_SW))
38
+ s->command);
38
- && (ipa_secure
39
}
39
- || !(env->cp15.vtcr_el2 & (VTCR_NSA | VTCR_NSW))));
40
40
+ if (in_space == ARMSS_Secure) {
41
onenand_intr_update(s);
41
+ result->f.attrs.secure =
42
@@ -XXX,XX +XXX,XX @@ static uint64_t onenand_read(void *opaque, hwaddr addr,
42
+ !(env->cp15.vstcr_el2 & (VSTCR_SA | VSTCR_SW))
43
case 0xff02:    /* ECC Result of spare area data */
43
+ && (ipa_secure
44
case 0xff03:    /* ECC Result of main area data */
44
+ || !(env->cp15.vtcr_el2 & (VTCR_NSA | VTCR_NSW)));
45
case 0xff04:    /* ECC Result of spare area data */
45
+ result->f.attrs.space = arm_secure_to_space(result->f.attrs.secure);
46
- hw_error("%s: implement ECC\n", __func__);
46
+ }
47
+ qemu_log_mask(LOG_UNIMP,
47
48
+ "onenand: ECC result registers unimplemented\n");
48
return false;
49
return 0x0000;
50
}
51
52
- fprintf(stderr, "%s: unknown OneNAND register %x\n",
53
- __func__, offset);
54
+ qemu_log_mask(LOG_GUEST_ERROR, "read of unknown OneNAND register 0x%x\n",
55
+ offset);
56
return 0;
57
}
49
}
58
59
@@ -XXX,XX +XXX,XX @@ static void onenand_write(void *opaque, hwaddr addr,
60
break;
61
62
default:
63
- fprintf(stderr, "%s: unknown OneNAND boot command %"PRIx64"\n",
64
- __func__, value);
65
+ qemu_log_mask(LOG_GUEST_ERROR,
66
+ "unknown OneNAND boot command %" PRIx64 "\n",
67
+ value);
68
}
69
break;
70
71
@@ -XXX,XX +XXX,XX @@ static void onenand_write(void *opaque, hwaddr addr,
72
break;
73
74
default:
75
- fprintf(stderr, "%s: unknown OneNAND register %x\n",
76
- __func__, offset);
77
+ qemu_log_mask(LOG_GUEST_ERROR,
78
+ "write to unknown OneNAND register 0x%x\n",
79
+ offset);
80
}
81
}
82
83
--
50
--
84
2.19.1
51
2.34.1
85
86
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
In commit f0a08b0913befbd we changed the type of the PC from
2
target_ulong to vaddr. In doing so we inadvertently dropped the
3
zero-padding on the PC in trace lines (the second item inside the []
4
in these lines). They used to look like this on AArch64, for
5
instance:
2
6
3
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Trace 0: 0x7f2260000100 [00000000/0000000040000000/00000061/ff200000]
4
Message-id: 20181113180154.17903-5-richard.henderson@linaro.org
8
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
and now they look like this:
10
Trace 0: 0x7f4f50000100 [00000000/40000000/00000061/ff200000]
11
12
and if the PC happens to be somewhere low like 0x5000
13
then the field is shown as /5000/.
14
15
This is because TARGET_FMT_lx is a "%08x" or "%016x" specifier,
16
depending on TARGET_LONG_SIZE, whereas VADDR_PRIx is just PRIx64
17
with no width specifier.
18
19
Restore the zero-padding by adding an 016 width specifier to
20
this tracing and a couple of others that were similarly recently
21
changed to use VADDR_PRIx without a width specifier.
22
23
We can't unfortunately restore the "32-bit guests are padded to
24
8 hex digits and 64-bit guests to 16 hex digits" behaviour so
25
easily.
26
27
Fixes: f0a08b0913befbd ("accel/tcg/cpu-exec.c: Widen pc to vaddr")
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
28
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
29
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
30
Reviewed-by: Anton Johansson <anjo@rev.ng>
31
Message-id: 20230711165434.4123674-1-peter.maydell@linaro.org
7
---
32
---
8
target/arm/kvm32.c | 40 +++++++++++++++++++++++++++++++++++-----
33
accel/tcg/cpu-exec.c | 4 ++--
9
1 file changed, 35 insertions(+), 5 deletions(-)
34
accel/tcg/translate-all.c | 2 +-
35
2 files changed, 3 insertions(+), 3 deletions(-)
10
36
11
diff --git a/target/arm/kvm32.c b/target/arm/kvm32.c
37
diff --git a/accel/tcg/cpu-exec.c b/accel/tcg/cpu-exec.c
12
index XXXXXXX..XXXXXXX 100644
38
index XXXXXXX..XXXXXXX 100644
13
--- a/target/arm/kvm32.c
39
--- a/accel/tcg/cpu-exec.c
14
+++ b/target/arm/kvm32.c
40
+++ b/accel/tcg/cpu-exec.c
15
@@ -XXX,XX +XXX,XX @@ bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)
41
@@ -XXX,XX +XXX,XX @@ static void log_cpu_exec(vaddr pc, CPUState *cpu,
16
* and then query that CPU for the relevant ID registers.
42
if (qemu_log_in_addr_range(pc)) {
17
*/
43
qemu_log_mask(CPU_LOG_EXEC,
18
int err = 0, fdarray[3];
44
"Trace %d: %p [%08" PRIx64
19
- uint32_t midr, id_pfr0, mvfr1;
45
- "/%" VADDR_PRIx "/%08x/%08x] %s\n",
20
+ uint32_t midr, id_pfr0;
46
+ "/%016" VADDR_PRIx "/%08x/%08x] %s\n",
21
uint64_t features = 0;
47
cpu->cpu_index, tb->tc.ptr, tb->cs_base, pc,
22
48
tb->flags, tb->cflags, lookup_symbol(pc));
23
/* Old kernels may not know about the PREFERRED_TARGET ioctl: however
49
24
@@ -XXX,XX +XXX,XX @@ bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)
50
@@ -XXX,XX +XXX,XX @@ cpu_tb_exec(CPUState *cpu, TranslationBlock *itb, int *tb_exit)
25
51
if (qemu_loglevel_mask(CPU_LOG_EXEC)) {
26
err |= read_sys_reg32(fdarray[2], &midr, ARM_CP15_REG32(0, 0, 0, 0));
52
vaddr pc = log_pc(cpu, last_tb);
27
err |= read_sys_reg32(fdarray[2], &id_pfr0, ARM_CP15_REG32(0, 0, 1, 0));
53
if (qemu_log_in_addr_range(pc)) {
28
- err |= read_sys_reg32(fdarray[2], &mvfr1,
54
- qemu_log("Stopped execution of TB chain before %p [%"
29
+
55
+ qemu_log("Stopped execution of TB chain before %p [%016"
30
+ err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_isar0,
56
VADDR_PRIx "] %s\n",
31
+ ARM_CP15_REG32(0, 0, 2, 0));
57
last_tb->tc.ptr, pc, lookup_symbol(pc));
32
+ err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_isar1,
58
}
33
+ ARM_CP15_REG32(0, 0, 2, 1));
59
diff --git a/accel/tcg/translate-all.c b/accel/tcg/translate-all.c
34
+ err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_isar2,
60
index XXXXXXX..XXXXXXX 100644
35
+ ARM_CP15_REG32(0, 0, 2, 2));
61
--- a/accel/tcg/translate-all.c
36
+ err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_isar3,
62
+++ b/accel/tcg/translate-all.c
37
+ ARM_CP15_REG32(0, 0, 2, 3));
63
@@ -XXX,XX +XXX,XX @@ void cpu_io_recompile(CPUState *cpu, uintptr_t retaddr)
38
+ err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_isar4,
64
if (qemu_loglevel_mask(CPU_LOG_EXEC)) {
39
+ ARM_CP15_REG32(0, 0, 2, 4));
65
vaddr pc = log_pc(cpu, tb);
40
+ err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_isar5,
66
if (qemu_log_in_addr_range(pc)) {
41
+ ARM_CP15_REG32(0, 0, 2, 5));
67
- qemu_log("cpu_io_recompile: rewound execution of TB to %"
42
+ if (read_sys_reg32(fdarray[2], &ahcf->isar.id_isar6,
68
+ qemu_log("cpu_io_recompile: rewound execution of TB to %016"
43
+ ARM_CP15_REG32(0, 0, 2, 7))) {
69
VADDR_PRIx "\n", pc);
44
+ /*
70
}
45
+ * Older kernels don't support reading ID_ISAR6. This register was
46
+ * only introduced in ARMv8, so we can assume that it is zero on a
47
+ * CPU that a kernel this old is running on.
48
+ */
49
+ ahcf->isar.id_isar6 = 0;
50
+ }
51
+
52
+ err |= read_sys_reg32(fdarray[2], &ahcf->isar.mvfr0,
53
+ KVM_REG_ARM | KVM_REG_SIZE_U32 |
54
+ KVM_REG_ARM_VFP | KVM_REG_ARM_VFP_MVFR0);
55
+ err |= read_sys_reg32(fdarray[2], &ahcf->isar.mvfr1,
56
KVM_REG_ARM | KVM_REG_SIZE_U32 |
57
KVM_REG_ARM_VFP | KVM_REG_ARM_VFP_MVFR1);
58
+ /*
59
+ * FIXME: There is not yet a way to read MVFR2.
60
+ * Fortunately there is not yet anything in there that affects migration.
61
+ */
62
63
kvm_arm_destroy_scratch_host_vcpu(fdarray);
64
65
@@ -XXX,XX +XXX,XX @@ bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)
66
if (extract32(id_pfr0, 12, 4) == 1) {
67
set_feature(&features, ARM_FEATURE_THUMB2EE);
68
}
69
- if (extract32(mvfr1, 20, 4) == 1) {
70
+ if (extract32(ahcf->isar.mvfr1, 20, 4) == 1) {
71
set_feature(&features, ARM_FEATURE_VFP_FP16);
72
}
73
- if (extract32(mvfr1, 12, 4) == 1) {
74
+ if (extract32(ahcf->isar.mvfr1, 12, 4) == 1) {
75
set_feature(&features, ARM_FEATURE_NEON);
76
}
77
- if (extract32(mvfr1, 28, 4) == 1) {
78
+ if (extract32(ahcf->isar.mvfr1, 28, 4) == 1) {
79
/* FMAC support implies VFPv4 */
80
set_feature(&features, ARM_FEATURE_VFP4);
81
}
71
}
82
--
72
--
83
2.19.1
73
2.34.1
84
74
85
75
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Tong Ho <tong.ho@amd.com>
2
2
3
The ID registers are replacing (some of) the feature bits.
3
Add a check in the bit-set operation to write the backstore
4
We need (some of) these values to determine the set of data
4
only if the affected bit is 0 before.
5
to be handled during migration.
6
5
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
6
With this in place, there will be no need for callers to
8
Message-id: 20181113180154.17903-2-richard.henderson@linaro.org
7
do the checking in order to avoid unnecessary writes.
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
9
Signed-off-by: Tong Ho <tong.ho@amd.com>
10
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
11
Reviewed-by: Francisco Iglesias <frasse.iglesias@gmail.com>
12
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
14
---
12
target/arm/kvm_arm.h | 1 +
15
hw/nvram/xlnx-efuse.c | 11 +++++++++--
13
target/arm/kvm.c | 1 +
16
1 file changed, 9 insertions(+), 2 deletions(-)
14
2 files changed, 2 insertions(+)
15
17
16
diff --git a/target/arm/kvm_arm.h b/target/arm/kvm_arm.h
18
diff --git a/hw/nvram/xlnx-efuse.c b/hw/nvram/xlnx-efuse.c
17
index XXXXXXX..XXXXXXX 100644
19
index XXXXXXX..XXXXXXX 100644
18
--- a/target/arm/kvm_arm.h
20
--- a/hw/nvram/xlnx-efuse.c
19
+++ b/target/arm/kvm_arm.h
21
+++ b/hw/nvram/xlnx-efuse.c
20
@@ -XXX,XX +XXX,XX @@ void kvm_arm_destroy_scratch_host_vcpu(int *fdarray);
22
@@ -XXX,XX +XXX,XX @@ static bool efuse_ro_bits_find(XlnxEFuse *s, uint32_t k)
21
* by asking the host kernel)
23
22
*/
24
bool xlnx_efuse_set_bit(XlnxEFuse *s, unsigned int bit)
23
typedef struct ARMHostCPUFeatures {
25
{
24
+ ARMISARegisters isar;
26
+ uint32_t set, *row;
25
uint64_t features;
27
+
26
uint32_t target;
28
if (efuse_ro_bits_find(s, bit)) {
27
const char *dtb_compatible;
29
g_autofree char *path = object_get_canonical_path(OBJECT(s));
28
diff --git a/target/arm/kvm.c b/target/arm/kvm.c
30
29
index XXXXXXX..XXXXXXX 100644
31
@@ -XXX,XX +XXX,XX @@ bool xlnx_efuse_set_bit(XlnxEFuse *s, unsigned int bit)
30
--- a/target/arm/kvm.c
32
return false;
31
+++ b/target/arm/kvm.c
33
}
32
@@ -XXX,XX +XXX,XX @@ void kvm_arm_set_cpu_features_from_host(ARMCPU *cpu)
34
33
35
- s->fuse32[bit / 32] |= 1 << (bit % 32);
34
cpu->kvm_target = arm_host_cpu_features.target;
36
- efuse_bdrv_sync(s, bit);
35
cpu->dtb_compatible = arm_host_cpu_features.dtb_compatible;
37
+ /* Avoid back-end write unless there is a real update */
36
+ cpu->isar = arm_host_cpu_features.isar;
38
+ row = &s->fuse32[bit / 32];
37
env->features = arm_host_cpu_features.features;
39
+ set = 1 << (bit % 32);
40
+ if (!(set & *row)) {
41
+ *row |= set;
42
+ efuse_bdrv_sync(s, bit);
43
+ }
44
return true;
38
}
45
}
39
46
40
--
47
--
41
2.19.1
48
2.34.1
42
49
43
50
diff view generated by jsdifflib
Deleted patch
1
From: Richard Henderson <richard.henderson@linaro.org>
2
1
3
Assert that the value to be written is the correct size.
4
No change in functionality here, just mirroring the same
5
function from kvm64.
6
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20181113180154.17903-4-richard.henderson@linaro.org
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
12
target/arm/kvm32.c | 41 ++++++++++++++++-------------------------
13
1 file changed, 16 insertions(+), 25 deletions(-)
14
15
diff --git a/target/arm/kvm32.c b/target/arm/kvm32.c
16
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/kvm32.c
18
+++ b/target/arm/kvm32.c
19
@@ -XXX,XX +XXX,XX @@ static inline void set_feature(uint64_t *features, int feature)
20
*features |= 1ULL << feature;
21
}
22
23
+static int read_sys_reg32(int fd, uint32_t *pret, uint64_t id)
24
+{
25
+ struct kvm_one_reg idreg = { .id = id, .addr = (uintptr_t)pret };
26
+
27
+ assert((id & KVM_REG_SIZE_MASK) == KVM_REG_SIZE_U32);
28
+ return ioctl(fd, KVM_GET_ONE_REG, &idreg);
29
+}
30
+
31
bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)
32
{
33
/* Identify the feature bits corresponding to the host CPU, and
34
@@ -XXX,XX +XXX,XX @@ bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)
35
* we have to create a scratch VM, create a single CPU inside it,
36
* and then query that CPU for the relevant ID registers.
37
*/
38
- int i, ret, fdarray[3];
39
+ int err = 0, fdarray[3];
40
uint32_t midr, id_pfr0, mvfr1;
41
uint64_t features = 0;
42
+
43
/* Old kernels may not know about the PREFERRED_TARGET ioctl: however
44
* we know these will only support creating one kind of guest CPU,
45
* which is its preferred CPU type.
46
@@ -XXX,XX +XXX,XX @@ bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)
47
QEMU_KVM_ARM_TARGET_NONE
48
};
49
struct kvm_vcpu_init init;
50
- struct kvm_one_reg idregs[] = {
51
- {
52
- .id = KVM_REG_ARM | KVM_REG_SIZE_U32
53
- | ENCODE_CP_REG(15, 0, 0, 0, 0, 0, 0),
54
- .addr = (uintptr_t)&midr,
55
- },
56
- {
57
- .id = KVM_REG_ARM | KVM_REG_SIZE_U32
58
- | ENCODE_CP_REG(15, 0, 0, 0, 1, 0, 0),
59
- .addr = (uintptr_t)&id_pfr0,
60
- },
61
- {
62
- .id = KVM_REG_ARM | KVM_REG_SIZE_U32
63
- | KVM_REG_ARM_VFP | KVM_REG_ARM_VFP_MVFR1,
64
- .addr = (uintptr_t)&mvfr1,
65
- },
66
- };
67
68
if (!kvm_arm_create_scratch_host_vcpu(cpus_to_try, fdarray, &init)) {
69
return false;
70
@@ -XXX,XX +XXX,XX @@ bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)
71
*/
72
ahcf->dtb_compatible = "arm,arm-v7";
73
74
- for (i = 0; i < ARRAY_SIZE(idregs); i++) {
75
- ret = ioctl(fdarray[2], KVM_GET_ONE_REG, &idregs[i]);
76
- if (ret) {
77
- break;
78
- }
79
- }
80
+ err |= read_sys_reg32(fdarray[2], &midr, ARM_CP15_REG32(0, 0, 0, 0));
81
+ err |= read_sys_reg32(fdarray[2], &id_pfr0, ARM_CP15_REG32(0, 0, 1, 0));
82
+ err |= read_sys_reg32(fdarray[2], &mvfr1,
83
+ KVM_REG_ARM | KVM_REG_SIZE_U32 |
84
+ KVM_REG_ARM_VFP | KVM_REG_ARM_VFP_MVFR1);
85
86
kvm_arm_destroy_scratch_host_vcpu(fdarray);
87
88
- if (ret) {
89
+ if (err < 0) {
90
return false;
91
}
92
93
--
94
2.19.1
95
96
diff view generated by jsdifflib
Deleted patch
1
From: Thomas Huth <thuth@redhat.com>
2
1
3
Add entries for the boards "mcimx6ul-evk", "mcimx7d-sabre", "raspi2",
4
"raspi3", "sabrelite", "vexpress-a15", "vexpress-a9" and "virt".
5
While we're at it, also adjust the "i.MX31" section a little bit,
6
so that the wildcards there do not match anymore for unrelated files
7
(e.g. the new hw/misc/imx6ul_ccm.c file).
8
9
Signed-off-by: Thomas Huth <thuth@redhat.com>
10
Message-id: 1542184999-11145-1-git-send-email-thuth@redhat.com
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
13
MAINTAINERS | 70 +++++++++++++++++++++++++++++++++++++++++++++++++----
14
1 file changed, 65 insertions(+), 5 deletions(-)
15
16
diff --git a/MAINTAINERS b/MAINTAINERS
17
index XXXXXXX..XXXXXXX 100644
18
--- a/MAINTAINERS
19
+++ b/MAINTAINERS
20
@@ -XXX,XX +XXX,XX @@ L: qemu-arm@nongnu.org
21
S: Odd Fixes
22
F: hw/arm/gumstix.c
23
24
-i.MX31
25
+i.MX31 (kzm)
26
M: Peter Chubb <peter.chubb@nicta.com.au>
27
L: qemu-arm@nongnu.org
28
-S: Odd fixes
29
-F: hw/*/imx*
30
-F: include/hw/*/imx*
31
+S: Odd Fixes
32
F: hw/arm/kzm.c
33
-F: include/hw/arm/fsl-imx31.h
34
+F: hw/*/imx_*
35
+F: hw/*/*imx31*
36
+F: include/hw/*/imx_*
37
+F: include/hw/*/*imx31*
38
39
Integrator CP
40
M: Peter Maydell <peter.maydell@linaro.org>
41
@@ -XXX,XX +XXX,XX @@ S: Maintained
42
F: hw/arm/integratorcp.c
43
F: hw/misc/arm_integrator_debug.c
44
45
+MCIMX6UL EVK / i.MX6ul
46
+M: Peter Maydell <peter.maydell@linaro.org>
47
+R: Jean-Christophe Dubois <jcd@tribudubois.net>
48
+L: qemu-arm@nongnu.org
49
+S: Odd Fixes
50
+F: hw/arm/mcimx6ul-evk.c
51
+F: hw/arm/fsl-imx6ul.c
52
+F: hw/misc/imx6ul_ccm.c
53
+F: include/hw/arm/fsl-imx6ul.h
54
+F: include/hw/misc/imx6ul_ccm.h
55
+
56
+MCIMX7D SABRE / i.MX7
57
+M: Peter Maydell <peter.maydell@linaro.org>
58
+R: Andrey Smirnov <andrew.smirnov@gmail.com>
59
+L: qemu-arm@nongnu.org
60
+S: Odd Fixes
61
+F: hw/arm/mcimx7d-sabre.c
62
+F: hw/arm/fsl-imx7.c
63
+F: include/hw/arm/fsl-imx7.h
64
+F: hw/pci-host/designware.c
65
+F: include/hw/pci-host/designware.h
66
+
67
MPS2
68
M: Peter Maydell <peter.maydell@linaro.org>
69
L: qemu-arm@nongnu.org
70
@@ -XXX,XX +XXX,XX @@ L: qemu-arm@nongnu.org
71
S: Maintained
72
F: hw/arm/palm.c
73
74
+Raspberry Pi
75
+M: Peter Maydell <peter.maydell@linaro.org>
76
+R: Andrew Baumann <Andrew.Baumann@microsoft.com>
77
+R: Philippe Mathieu-Daudé <f4bug@amsat.org>
78
+L: qemu-arm@nongnu.org
79
+S: Odd Fixes
80
+F: hw/arm/raspi_platform.h
81
+F: hw/*/bcm283*
82
+F: include/hw/arm/raspi*
83
+F: include/hw/*/bcm283*
84
+
85
Real View
86
M: Peter Maydell <peter.maydell@linaro.org>
87
L: qemu-arm@nongnu.org
88
@@ -XXX,XX +XXX,XX @@ F: hw/*/pxa2xx*
89
F: hw/misc/mst_fpga.c
90
F: include/hw/arm/pxa.h
91
92
+SABRELITE / i.MX6
93
+M: Peter Maydell <peter.maydell@linaro.org>
94
+R: Jean-Christophe Dubois <jcd@tribudubois.net>
95
+L: qemu-arm@nongnu.org
96
+S: Odd Fixes
97
+F: hw/arm/sabrelite.c
98
+F: hw/arm/fsl-imx6.c
99
+F: hw/misc/imx6_src.c
100
+F: hw/ssi/imx_spi.c
101
+F: include/hw/arm/fsl-imx6.h
102
+F: include/hw/misc/imx6_src.h
103
+F: include/hw/ssi/imx_spi.h
104
+
105
Sharp SL-5500 (Collie) PDA
106
M: Peter Maydell <peter.maydell@linaro.org>
107
L: qemu-arm@nongnu.org
108
@@ -XXX,XX +XXX,XX @@ L: qemu-arm@nongnu.org
109
S: Maintained
110
F: hw/*/stellaris*
111
112
+Versatile Express
113
+M: Peter Maydell <peter.maydell@linaro.org>
114
+L: qemu-arm@nongnu.org
115
+S: Maintained
116
+F: hw/arm/vexpress.c
117
+
118
Versatile PB
119
M: Peter Maydell <peter.maydell@linaro.org>
120
L: qemu-arm@nongnu.org
121
@@ -XXX,XX +XXX,XX @@ S: Maintained
122
F: hw/*/versatile*
123
F: hw/misc/arm_sysctl.c
124
125
+Virt
126
+M: Peter Maydell <peter.maydell@linaro.org>
127
+L: qemu-arm@nongnu.org
128
+S: Maintained
129
+F: hw/arm/virt*
130
+F: include/hw/arm/virt.h
131
+
132
Xilinx Zynq
133
M: Edgar E. Iglesias <edgar.iglesias@gmail.com>
134
M: Alistair Francis <alistair@alistair23.me>
135
--
136
2.19.1
137
138
diff view generated by jsdifflib
Deleted patch
1
From: Seth Kintigh <skintigh@gmail.com>
2
1
3
The UART and timer devices for the stm32f205 were being created
4
with memory regions that were too large. Use the size specified
5
in the chip datasheet.
6
7
The old sizes were so large that the devices would overlap with
8
each other in the SoC memory map, so this fixes a bug that
9
caused odd behavior and/or crashes when trying to set up multiple
10
UARTs.
11
12
Signed-off-by: Seth Kintigh <skintigh@gmail.com>
13
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
14
[PMM: rephrased commit message to follow our usual standard]
15
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
16
Tested-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
17
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
18
---
19
hw/char/stm32f2xx_usart.c | 2 +-
20
hw/timer/stm32f2xx_timer.c | 2 +-
21
2 files changed, 2 insertions(+), 2 deletions(-)
22
23
diff --git a/hw/char/stm32f2xx_usart.c b/hw/char/stm32f2xx_usart.c
24
index XXXXXXX..XXXXXXX 100644
25
--- a/hw/char/stm32f2xx_usart.c
26
+++ b/hw/char/stm32f2xx_usart.c
27
@@ -XXX,XX +XXX,XX @@ static void stm32f2xx_usart_init(Object *obj)
28
sysbus_init_irq(SYS_BUS_DEVICE(obj), &s->irq);
29
30
memory_region_init_io(&s->mmio, obj, &stm32f2xx_usart_ops, s,
31
- TYPE_STM32F2XX_USART, 0x2000);
32
+ TYPE_STM32F2XX_USART, 0x400);
33
sysbus_init_mmio(SYS_BUS_DEVICE(obj), &s->mmio);
34
}
35
36
diff --git a/hw/timer/stm32f2xx_timer.c b/hw/timer/stm32f2xx_timer.c
37
index XXXXXXX..XXXXXXX 100644
38
--- a/hw/timer/stm32f2xx_timer.c
39
+++ b/hw/timer/stm32f2xx_timer.c
40
@@ -XXX,XX +XXX,XX @@ static void stm32f2xx_timer_init(Object *obj)
41
sysbus_init_irq(SYS_BUS_DEVICE(obj), &s->irq);
42
43
memory_region_init_io(&s->iomem, obj, &stm32f2xx_timer_ops, s,
44
- "stm32f2xx_timer", 0x4000);
45
+ "stm32f2xx_timer", 0x400);
46
sysbus_init_mmio(SYS_BUS_DEVICE(obj), &s->iomem);
47
48
s->timer = timer_new_ns(QEMU_CLOCK_VIRTUAL, stm32f2xx_timer_interrupt, s);
49
--
50
2.19.1
51
52
diff view generated by jsdifflib