1
The following changes since commit adf2e451f357e993f173ba9b4176dbf3e65fee7e:
1
Handful of bug fixes to sneak in before rc3.
2
2
3
Merge remote-tracking branch 'remotes/kevin/tags/for-upstream' into staging (2019-02-26 19:04:47 +0000)
3
thanks
4
-- PMM
5
6
The following changes since commit c985266ea5b50e46e07b3568c1346e10064205c9:
7
8
Merge remote-tracking branch 'remotes/cohuck/tags/s390x-20190726' into staging (2019-07-26 13:52:06 +0100)
4
9
5
are available in the Git repository at:
10
are available in the Git repository at:
6
11
7
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20190228-1
12
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20190726
8
13
9
for you to fetch changes up to 1c9af3a9e05c1607a36df4943f8f5393d7621a91:
14
for you to fetch changes up to 67505c114e6acc26f3a1a2b74833c61b6a34ff95:
10
15
11
linux-user: Enable HWCAP_ASIMDFHM, HWCAP_JSCVT (2019-02-28 11:03:05 +0000)
16
hw/arm/boot: Further improve initrd positioning code (2019-07-26 16:17:56 +0100)
12
17
13
----------------------------------------------------------------
18
----------------------------------------------------------------
14
target-arm queue:
19
target-arm queue:
15
* add MHU and dual-core support to Musca boards
20
* Fix broken migration on pl330 device
16
* refactor some VFP insns to be gated by ID registers
21
* Fix broken migration on stellaris-input device
17
* Revert "arm: Allow system registers for KVM guests to be changed by QEMU code"
22
* Add type checks to vmstate varry macros to avoid this class of bugs
18
* Implement ARMv8.2-FHM extension
23
* hw/arm/boot: Fix some remaining cases where we would put the
19
* Advertise JSCVT via HWCAP for linux-user
24
initrd on top of the kernel image
20
25
21
----------------------------------------------------------------
26
----------------------------------------------------------------
22
Peter Maydell (11):
27
Damien Hedde (1):
23
hw/misc/armsse-mhu.c: Model the SSE-200 Message Handling Unit
28
pl330: fix vmstate description
24
hw/arm/armsse: Wire up the MHUs
25
target/arm/cpu: Allow init-svtor property to be set after realize
26
target/arm/arm-powerctl: Add new arm_set_cpu_on_and_reset()
27
hw/misc/iotkit-sysctl: Correct typo in INITSVTOR0 register name
28
hw/arm/iotkit-sysctl: Add SSE-200 registers
29
hw/arm/iotkit-sysctl: Implement CPUWAIT and INITSVTOR*
30
hw/arm/armsse: Unify init-svtor and cpuwait handling
31
target/arm: Use MVFR1 feature bits to gate A32/T32 FP16 instructions
32
target/arm: Gate "miscellaneous FP" insns by ID register field
33
Revert "arm: Allow system registers for KVM guests to be changed by QEMU code"
34
29
35
Richard Henderson (5):
30
Peter Maydell (4):
36
target/arm: Add helpers for FMLAL
31
stellaris_input: Fix vmstate description of buttons field
37
target/arm: Implement FMLAL and FMLSL for aarch64
32
vmstate.h: Type check VMSTATE_STRUCT_VARRAY macros
38
target/arm: Implement VFMAL and VFMSL for aarch32
33
hw/arm/boot: Rename elf_{low, high}_addr to image_{low, high}_addr
39
target/arm: Enable ARMv8.2-FHM for -cpu max
34
hw/arm/boot: Further improve initrd positioning code
40
linux-user: Enable HWCAP_ASIMDFHM, HWCAP_JSCVT
41
35
42
hw/misc/Makefile.objs | 1 +
36
include/migration/vmstate.h | 30 ++++++++++++++++++++++++------
43
include/hw/arm/armsse.h | 3 +-
37
hw/arm/boot.c | 37 +++++++++++++++++++++++++++----------
44
include/hw/misc/armsse-mhu.h | 44 ++++++
38
hw/dma/pl330.c | 17 +++++++++--------
45
include/hw/misc/iotkit-sysctl.h | 25 +++-
39
hw/input/stellaris_input.c | 10 ++++++----
46
target/arm/arm-powerctl.h | 16 +++
40
4 files changed, 66 insertions(+), 28 deletions(-)
47
target/arm/cpu.h | 76 +++++++++--
48
target/arm/helper.h | 9 ++
49
hw/arm/armsse.c | 91 +++++++++----
50
hw/misc/armsse-mhu.c | 198 +++++++++++++++++++++++++++
51
hw/misc/iotkit-sysctl.c | 294 ++++++++++++++++++++++++++++++++++++++--
52
linux-user/elfload.c | 2 +
53
target/arm/arm-powerctl.c | 56 ++++++++
54
target/arm/cpu.c | 32 ++++-
55
target/arm/cpu64.c | 2 +
56
target/arm/helper.c | 27 +---
57
target/arm/kvm32.c | 23 +++-
58
target/arm/kvm64.c | 2 -
59
target/arm/machine.c | 2 +-
60
target/arm/translate-a64.c | 49 ++++++-
61
target/arm/translate.c | 180 ++++++++++++++++--------
62
target/arm/vec_helper.c | 148 ++++++++++++++++++++
63
MAINTAINERS | 2 +
64
default-configs/arm-softmmu.mak | 1 +
65
hw/misc/trace-events | 4 +
66
24 files changed, 1139 insertions(+), 148 deletions(-)
67
create mode 100644 include/hw/misc/armsse-mhu.h
68
create mode 100644 hw/misc/armsse-mhu.c
69
41
diff view generated by jsdifflib
Deleted patch
1
Implement a model of the Message Handling Unit (MHU) found in
2
the Arm SSE-200. This is a simple device which just contains
3
some registers which allow the two cores of the SSE-200
4
to raise interrupts on each other.
5
1
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20190219125808.25174-2-peter.maydell@linaro.org
9
---
10
hw/misc/Makefile.objs | 1 +
11
include/hw/misc/armsse-mhu.h | 44 +++++++
12
hw/misc/armsse-mhu.c | 198 ++++++++++++++++++++++++++++++++
13
MAINTAINERS | 2 +
14
default-configs/arm-softmmu.mak | 1 +
15
hw/misc/trace-events | 4 +
16
6 files changed, 250 insertions(+)
17
create mode 100644 include/hw/misc/armsse-mhu.h
18
create mode 100644 hw/misc/armsse-mhu.c
19
20
diff --git a/hw/misc/Makefile.objs b/hw/misc/Makefile.objs
21
index XXXXXXX..XXXXXXX 100644
22
--- a/hw/misc/Makefile.objs
23
+++ b/hw/misc/Makefile.objs
24
@@ -XXX,XX +XXX,XX @@ obj-$(CONFIG_IOTKIT_SECCTL) += iotkit-secctl.o
25
obj-$(CONFIG_IOTKIT_SYSCTL) += iotkit-sysctl.o
26
obj-$(CONFIG_IOTKIT_SYSINFO) += iotkit-sysinfo.o
27
obj-$(CONFIG_ARMSSE_CPUID) += armsse-cpuid.o
28
+obj-$(CONFIG_ARMSSE_MHU) += armsse-mhu.o
29
30
obj-$(CONFIG_PVPANIC) += pvpanic.o
31
obj-$(CONFIG_AUX) += auxbus.o
32
diff --git a/include/hw/misc/armsse-mhu.h b/include/hw/misc/armsse-mhu.h
33
new file mode 100644
34
index XXXXXXX..XXXXXXX
35
--- /dev/null
36
+++ b/include/hw/misc/armsse-mhu.h
37
@@ -XXX,XX +XXX,XX @@
38
+/*
39
+ * ARM SSE-200 Message Handling Unit (MHU)
40
+ *
41
+ * Copyright (c) 2019 Linaro Limited
42
+ * Written by Peter Maydell
43
+ *
44
+ * This program is free software; you can redistribute it and/or modify
45
+ * it under the terms of the GNU General Public License version 2 or
46
+ * (at your option) any later version.
47
+ */
48
+
49
+/*
50
+ * This is a model of the Message Handling Unit (MHU) which is part of the
51
+ * Arm SSE-200 and documented in
52
+ * http://infocenter.arm.com/help/topic/com.arm.doc.101104_0100_00_en/corelink_sse200_subsystem_for_embedded_technical_reference_manual_101104_0100_00_en.pdf
53
+ *
54
+ * QEMU interface:
55
+ * + sysbus MMIO region 0: the system information register bank
56
+ * + sysbus IRQ 0: interrupt for CPU 0
57
+ * + sysbus IRQ 1: interrupt for CPU 1
58
+ */
59
+
60
+#ifndef HW_MISC_SSE_MHU_H
61
+#define HW_MISC_SSE_MHU_H
62
+
63
+#include "hw/sysbus.h"
64
+
65
+#define TYPE_ARMSSE_MHU "armsse-mhu"
66
+#define ARMSSE_MHU(obj) OBJECT_CHECK(ARMSSEMHU, (obj), TYPE_ARMSSE_MHU)
67
+
68
+typedef struct ARMSSEMHU {
69
+ /*< private >*/
70
+ SysBusDevice parent_obj;
71
+
72
+ /*< public >*/
73
+ MemoryRegion iomem;
74
+ qemu_irq cpu0irq;
75
+ qemu_irq cpu1irq;
76
+
77
+ uint32_t cpu0intr;
78
+ uint32_t cpu1intr;
79
+} ARMSSEMHU;
80
+
81
+#endif
82
diff --git a/hw/misc/armsse-mhu.c b/hw/misc/armsse-mhu.c
83
new file mode 100644
84
index XXXXXXX..XXXXXXX
85
--- /dev/null
86
+++ b/hw/misc/armsse-mhu.c
87
@@ -XXX,XX +XXX,XX @@
88
+/*
89
+ * ARM SSE-200 Message Handling Unit (MHU)
90
+ *
91
+ * Copyright (c) 2019 Linaro Limited
92
+ * Written by Peter Maydell
93
+ *
94
+ * This program is free software; you can redistribute it and/or modify
95
+ * it under the terms of the GNU General Public License version 2 or
96
+ * (at your option) any later version.
97
+ */
98
+
99
+/*
100
+ * This is a model of the Message Handling Unit (MHU) which is part of the
101
+ * Arm SSE-200 and documented in
102
+ * http://infocenter.arm.com/help/topic/com.arm.doc.101104_0100_00_en/corelink_sse200_subsystem_for_embedded_technical_reference_manual_101104_0100_00_en.pdf
103
+ */
104
+
105
+#include "qemu/osdep.h"
106
+#include "qemu/log.h"
107
+#include "trace.h"
108
+#include "qapi/error.h"
109
+#include "sysemu/sysemu.h"
110
+#include "hw/sysbus.h"
111
+#include "hw/registerfields.h"
112
+#include "hw/misc/armsse-mhu.h"
113
+
114
+REG32(CPU0INTR_STAT, 0x0)
115
+REG32(CPU0INTR_SET, 0x4)
116
+REG32(CPU0INTR_CLR, 0x8)
117
+REG32(CPU1INTR_STAT, 0x10)
118
+REG32(CPU1INTR_SET, 0x14)
119
+REG32(CPU1INTR_CLR, 0x18)
120
+REG32(PID4, 0xfd0)
121
+REG32(PID5, 0xfd4)
122
+REG32(PID6, 0xfd8)
123
+REG32(PID7, 0xfdc)
124
+REG32(PID0, 0xfe0)
125
+REG32(PID1, 0xfe4)
126
+REG32(PID2, 0xfe8)
127
+REG32(PID3, 0xfec)
128
+REG32(CID0, 0xff0)
129
+REG32(CID1, 0xff4)
130
+REG32(CID2, 0xff8)
131
+REG32(CID3, 0xffc)
132
+
133
+/* Valid bits in the interrupt registers. If any are set the IRQ is raised */
134
+#define INTR_MASK 0xf
135
+
136
+/* PID/CID values */
137
+static const int armsse_mhu_id[] = {
138
+ 0x04, 0x00, 0x00, 0x00, /* PID4..PID7 */
139
+ 0x56, 0xb8, 0x0b, 0x00, /* PID0..PID3 */
140
+ 0x0d, 0xf0, 0x05, 0xb1, /* CID0..CID3 */
141
+};
142
+
143
+static void armsse_mhu_update(ARMSSEMHU *s)
144
+{
145
+ qemu_set_irq(s->cpu0irq, s->cpu0intr != 0);
146
+ qemu_set_irq(s->cpu1irq, s->cpu1intr != 0);
147
+}
148
+
149
+static uint64_t armsse_mhu_read(void *opaque, hwaddr offset, unsigned size)
150
+{
151
+ ARMSSEMHU *s = ARMSSE_MHU(opaque);
152
+ uint64_t r;
153
+
154
+ switch (offset) {
155
+ case A_CPU0INTR_STAT:
156
+ r = s->cpu0intr;
157
+ break;
158
+
159
+ case A_CPU1INTR_STAT:
160
+ r = s->cpu1intr;
161
+ break;
162
+
163
+ case A_PID4 ... A_CID3:
164
+ r = armsse_mhu_id[(offset - A_PID4) / 4];
165
+ break;
166
+
167
+ case A_CPU0INTR_SET:
168
+ case A_CPU0INTR_CLR:
169
+ case A_CPU1INTR_SET:
170
+ case A_CPU1INTR_CLR:
171
+ qemu_log_mask(LOG_GUEST_ERROR,
172
+ "SSE MHU: read of write-only register at offset 0x%x\n",
173
+ (int)offset);
174
+ r = 0;
175
+ break;
176
+
177
+ default:
178
+ qemu_log_mask(LOG_GUEST_ERROR,
179
+ "SSE MHU read: bad offset 0x%x\n", (int)offset);
180
+ r = 0;
181
+ break;
182
+ }
183
+ trace_armsse_mhu_read(offset, r, size);
184
+ return r;
185
+}
186
+
187
+static void armsse_mhu_write(void *opaque, hwaddr offset,
188
+ uint64_t value, unsigned size)
189
+{
190
+ ARMSSEMHU *s = ARMSSE_MHU(opaque);
191
+
192
+ trace_armsse_mhu_write(offset, value, size);
193
+
194
+ switch (offset) {
195
+ case A_CPU0INTR_SET:
196
+ s->cpu0intr |= (value & INTR_MASK);
197
+ break;
198
+ case A_CPU0INTR_CLR:
199
+ s->cpu0intr &= ~(value & INTR_MASK);
200
+ break;
201
+ case A_CPU1INTR_SET:
202
+ s->cpu1intr |= (value & INTR_MASK);
203
+ break;
204
+ case A_CPU1INTR_CLR:
205
+ s->cpu1intr &= ~(value & INTR_MASK);
206
+ break;
207
+
208
+ case A_CPU0INTR_STAT:
209
+ case A_CPU1INTR_STAT:
210
+ case A_PID4 ... A_CID3:
211
+ qemu_log_mask(LOG_GUEST_ERROR,
212
+ "SSE MHU: write to read-only register at offset 0x%x\n",
213
+ (int)offset);
214
+ break;
215
+
216
+ default:
217
+ qemu_log_mask(LOG_GUEST_ERROR,
218
+ "SSE MHU write: bad offset 0x%x\n", (int)offset);
219
+ break;
220
+ }
221
+
222
+ armsse_mhu_update(s);
223
+}
224
+
225
+static const MemoryRegionOps armsse_mhu_ops = {
226
+ .read = armsse_mhu_read,
227
+ .write = armsse_mhu_write,
228
+ .endianness = DEVICE_LITTLE_ENDIAN,
229
+ .valid.min_access_size = 4,
230
+ .valid.max_access_size = 4,
231
+};
232
+
233
+static void armsse_mhu_reset(DeviceState *dev)
234
+{
235
+ ARMSSEMHU *s = ARMSSE_MHU(dev);
236
+
237
+ s->cpu0intr = 0;
238
+ s->cpu1intr = 0;
239
+}
240
+
241
+static const VMStateDescription armsse_mhu_vmstate = {
242
+ .name = "armsse-mhu",
243
+ .version_id = 1,
244
+ .minimum_version_id = 1,
245
+ .fields = (VMStateField[]) {
246
+ VMSTATE_UINT32(cpu0intr, ARMSSEMHU),
247
+ VMSTATE_UINT32(cpu1intr, ARMSSEMHU),
248
+ VMSTATE_END_OF_LIST()
249
+ },
250
+};
251
+
252
+static void armsse_mhu_init(Object *obj)
253
+{
254
+ SysBusDevice *sbd = SYS_BUS_DEVICE(obj);
255
+ ARMSSEMHU *s = ARMSSE_MHU(obj);
256
+
257
+ memory_region_init_io(&s->iomem, obj, &armsse_mhu_ops,
258
+ s, "armsse-mhu", 0x1000);
259
+ sysbus_init_mmio(sbd, &s->iomem);
260
+ sysbus_init_irq(sbd, &s->cpu0irq);
261
+ sysbus_init_irq(sbd, &s->cpu1irq);
262
+}
263
+
264
+static void armsse_mhu_class_init(ObjectClass *klass, void *data)
265
+{
266
+ DeviceClass *dc = DEVICE_CLASS(klass);
267
+
268
+ dc->reset = armsse_mhu_reset;
269
+ dc->vmsd = &armsse_mhu_vmstate;
270
+}
271
+
272
+static const TypeInfo armsse_mhu_info = {
273
+ .name = TYPE_ARMSSE_MHU,
274
+ .parent = TYPE_SYS_BUS_DEVICE,
275
+ .instance_size = sizeof(ARMSSEMHU),
276
+ .instance_init = armsse_mhu_init,
277
+ .class_init = armsse_mhu_class_init,
278
+};
279
+
280
+static void armsse_mhu_register_types(void)
281
+{
282
+ type_register_static(&armsse_mhu_info);
283
+}
284
+
285
+type_init(armsse_mhu_register_types);
286
diff --git a/MAINTAINERS b/MAINTAINERS
287
index XXXXXXX..XXXXXXX 100644
288
--- a/MAINTAINERS
289
+++ b/MAINTAINERS
290
@@ -XXX,XX +XXX,XX @@ F: hw/misc/iotkit-sysinfo.c
291
F: include/hw/misc/iotkit-sysinfo.h
292
F: hw/misc/armsse-cpuid.c
293
F: include/hw/misc/armsse-cpuid.h
294
+F: hw/misc/armsse-mhu.c
295
+F: include/hw/misc/armsse-mhu.h
296
297
Musca
298
M: Peter Maydell <peter.maydell@linaro.org>
299
diff --git a/default-configs/arm-softmmu.mak b/default-configs/arm-softmmu.mak
300
index XXXXXXX..XXXXXXX 100644
301
--- a/default-configs/arm-softmmu.mak
302
+++ b/default-configs/arm-softmmu.mak
303
@@ -XXX,XX +XXX,XX @@ CONFIG_IOTKIT_SECCTL=y
304
CONFIG_IOTKIT_SYSCTL=y
305
CONFIG_IOTKIT_SYSINFO=y
306
CONFIG_ARMSSE_CPUID=y
307
+CONFIG_ARMSSE_MHU=y
308
309
CONFIG_VERSATILE=y
310
CONFIG_VERSATILE_PCI=y
311
diff --git a/hw/misc/trace-events b/hw/misc/trace-events
312
index XXXXXXX..XXXXXXX 100644
313
--- a/hw/misc/trace-events
314
+++ b/hw/misc/trace-events
315
@@ -XXX,XX +XXX,XX @@ iotkit_sysctl_reset(void) "IoTKit SysCtl: reset"
316
# hw/misc/armsse-cpuid.c
317
armsse_cpuid_read(uint64_t offset, uint64_t data, unsigned size) "SSE-200 CPU_IDENTITY read: offset 0x%" PRIx64 " data 0x%" PRIx64 " size %u"
318
armsse_cpuid_write(uint64_t offset, uint64_t data, unsigned size) "SSE-200 CPU_IDENTITY write: offset 0x%" PRIx64 " data 0x%" PRIx64 " size %u"
319
+
320
+# hw/misc/armsse-mhu.c
321
+armsse_mhu_read(uint64_t offset, uint64_t data, unsigned size) "SSE-200 MHU read: offset 0x%" PRIx64 " data 0x%" PRIx64 " size %u"
322
+armsse_mhu_write(uint64_t offset, uint64_t data, unsigned size) "SSE-200 MHU write: offset 0x%" PRIx64 " data 0x%" PRIx64 " size %u"
323
--
324
2.20.1
325
326
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Damien Hedde <damien.hedde@greensocs.com>
2
2
3
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
3
Fix the pl330 main and queue vmstate description.
4
Message-id: 20190219222952.22183-6-richard.henderson@linaro.org
4
There were missing POINTER flags causing crashes during
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
5
incoming migration because:
6
+ PL330State chan field is a pointer to an array
7
+ PL330Queue queue field is a pointer to an array
8
9
Also bump corresponding vmsd version numbers.
10
11
Signed-off-by: Damien Hedde <damien.hedde@greensocs.com>
12
Reviewed-by: Philippe Mathieu-Daude <philmd@redhat.com>
13
Acked-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
14
Message-id: 20190724143553.21557-1-damien.hedde@greensocs.com
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
---
16
---
8
linux-user/elfload.c | 2 ++
17
hw/dma/pl330.c | 17 +++++++++--------
9
1 file changed, 2 insertions(+)
18
1 file changed, 9 insertions(+), 8 deletions(-)
10
19
11
diff --git a/linux-user/elfload.c b/linux-user/elfload.c
20
diff --git a/hw/dma/pl330.c b/hw/dma/pl330.c
12
index XXXXXXX..XXXXXXX 100644
21
index XXXXXXX..XXXXXXX 100644
13
--- a/linux-user/elfload.c
22
--- a/hw/dma/pl330.c
14
+++ b/linux-user/elfload.c
23
+++ b/hw/dma/pl330.c
15
@@ -XXX,XX +XXX,XX @@ static uint32_t get_elf_hwcap(void)
24
@@ -XXX,XX +XXX,XX @@ typedef struct PL330Queue {
16
GET_FEATURE_ID(aa64_fcma, ARM_HWCAP_A64_FCMA);
25
17
GET_FEATURE_ID(aa64_sve, ARM_HWCAP_A64_SVE);
26
static const VMStateDescription vmstate_pl330_queue = {
18
GET_FEATURE_ID(aa64_pauth, ARM_HWCAP_A64_PACA | ARM_HWCAP_A64_PACG);
27
.name = "pl330_queue",
19
+ GET_FEATURE_ID(aa64_fhm, ARM_HWCAP_A64_ASIMDFHM);
28
- .version_id = 1,
20
+ GET_FEATURE_ID(aa64_jscvt, ARM_HWCAP_A64_JSCVT);
29
- .minimum_version_id = 1,
21
30
+ .version_id = 2,
22
#undef GET_FEATURE_ID
31
+ .minimum_version_id = 2,
23
32
.fields = (VMStateField[]) {
33
- VMSTATE_STRUCT_VARRAY_UINT32(queue, PL330Queue, queue_size, 1,
34
- vmstate_pl330_queue_entry, PL330QueueEntry),
35
+ VMSTATE_STRUCT_VARRAY_POINTER_UINT32(queue, PL330Queue, queue_size,
36
+ vmstate_pl330_queue_entry,
37
+ PL330QueueEntry),
38
VMSTATE_END_OF_LIST()
39
}
40
};
41
@@ -XXX,XX +XXX,XX @@ struct PL330State {
42
43
static const VMStateDescription vmstate_pl330 = {
44
.name = "pl330",
45
- .version_id = 1,
46
- .minimum_version_id = 1,
47
+ .version_id = 2,
48
+ .minimum_version_id = 2,
49
.fields = (VMStateField[]) {
50
VMSTATE_STRUCT(manager, PL330State, 0, vmstate_pl330_chan, PL330Chan),
51
- VMSTATE_STRUCT_VARRAY_UINT32(chan, PL330State, num_chnls, 0,
52
- vmstate_pl330_chan, PL330Chan),
53
+ VMSTATE_STRUCT_VARRAY_POINTER_UINT32(chan, PL330State, num_chnls,
54
+ vmstate_pl330_chan, PL330Chan),
55
VMSTATE_VBUFFER_UINT32(lo_seqn, PL330State, 1, NULL, num_chnls),
56
VMSTATE_VBUFFER_UINT32(hi_seqn, PL330State, 1, NULL, num_chnls),
57
VMSTATE_STRUCT(fifo, PL330State, 0, vmstate_pl330_fifo, PL330Fifo),
24
--
58
--
25
2.20.1
59
2.20.1
26
60
27
61
diff view generated by jsdifflib
1
Make the M-profile "init-svtor" property be settable after realize.
1
gamepad_state::buttons is a pointer to an array of structs,
2
This matches the hardware, where this is a config signal which
2
not an array of structs, so should be declared in the vmstate
3
is sampled on CPU reset and can thus be changed between one
3
with VMSTATE_STRUCT_VARRAY_POINTER_INT32; otherwise we
4
reset and another. To do this we have to change the API we
4
corrupt memory on incoming migration.
5
use to add the property.
6
5
7
(We will need this capability for the SSE-200.)
6
We bump the vmstate version field as the easiest way to
7
deal with the migration break, since migration wouldn't have
8
worked reliably before anyway.
8
9
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
11
Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
11
Message-id: 20190219125808.25174-4-peter.maydell@linaro.org
12
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
13
Reviewed-by: Damien Hedde <damien.hedde@greensocs.com>
14
Message-id: 20190725163710.11703-2-peter.maydell@linaro.org
12
---
15
---
13
target/arm/cpu.c | 29 ++++++++++++++++++++++++-----
16
hw/input/stellaris_input.c | 10 ++++++----
14
1 file changed, 24 insertions(+), 5 deletions(-)
17
1 file changed, 6 insertions(+), 4 deletions(-)
15
18
16
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
19
diff --git a/hw/input/stellaris_input.c b/hw/input/stellaris_input.c
17
index XXXXXXX..XXXXXXX 100644
20
index XXXXXXX..XXXXXXX 100644
18
--- a/target/arm/cpu.c
21
--- a/hw/input/stellaris_input.c
19
+++ b/target/arm/cpu.c
22
+++ b/hw/input/stellaris_input.c
20
@@ -XXX,XX +XXX,XX @@
23
@@ -XXX,XX +XXX,XX @@ static const VMStateDescription vmstate_stellaris_button = {
21
#include "target/arm/idau.h"
24
22
#include "qemu/error-report.h"
25
static const VMStateDescription vmstate_stellaris_gamepad = {
23
#include "qapi/error.h"
26
.name = "stellaris_gamepad",
24
+#include "qapi/visitor.h"
27
- .version_id = 1,
25
#include "cpu.h"
28
- .minimum_version_id = 1,
26
#include "internals.h"
29
+ .version_id = 2,
27
#include "qemu-common.h"
30
+ .minimum_version_id = 2,
28
@@ -XXX,XX +XXX,XX @@ static Property arm_cpu_pmsav7_dregion_property =
31
.fields = (VMStateField[]) {
29
pmsav7_dregion,
32
VMSTATE_INT32(extension, gamepad_state),
30
qdev_prop_uint32, uint32_t);
33
- VMSTATE_STRUCT_VARRAY_INT32(buttons, gamepad_state, num_buttons, 0,
31
34
- vmstate_stellaris_button, gamepad_button),
32
-/* M profile: initial value of the Secure VTOR */
35
+ VMSTATE_STRUCT_VARRAY_POINTER_INT32(buttons, gamepad_state,
33
-static Property arm_cpu_initsvtor_property =
36
+ num_buttons,
34
- DEFINE_PROP_UINT32("init-svtor", ARMCPU, init_svtor, 0);
37
+ vmstate_stellaris_button,
35
+static void arm_get_init_svtor(Object *obj, Visitor *v, const char *name,
38
+ gamepad_button),
36
+ void *opaque, Error **errp)
39
VMSTATE_END_OF_LIST()
37
+{
38
+ ARMCPU *cpu = ARM_CPU(obj);
39
+
40
+ visit_type_uint32(v, name, &cpu->init_svtor, errp);
41
+}
42
+
43
+static void arm_set_init_svtor(Object *obj, Visitor *v, const char *name,
44
+ void *opaque, Error **errp)
45
+{
46
+ ARMCPU *cpu = ARM_CPU(obj);
47
+
48
+ visit_type_uint32(v, name, &cpu->init_svtor, errp);
49
+}
50
51
void arm_cpu_post_init(Object *obj)
52
{
53
@@ -XXX,XX +XXX,XX @@ void arm_cpu_post_init(Object *obj)
54
qdev_prop_allow_set_link_before_realize,
55
OBJ_PROP_LINK_STRONG,
56
&error_abort);
57
- qdev_property_add_static(DEVICE(obj), &arm_cpu_initsvtor_property,
58
- &error_abort);
59
+ /*
60
+ * M profile: initial value of the Secure VTOR. We can't just use
61
+ * a simple DEFINE_PROP_UINT32 for this because we want to permit
62
+ * the property to be set after realize.
63
+ */
64
+ object_property_add(obj, "init-svtor", "uint32",
65
+ arm_get_init_svtor, arm_set_init_svtor,
66
+ NULL, NULL, &error_abort);
67
}
40
}
68
41
};
69
qdev_property_add_static(DEVICE(obj), &arm_cpu_cfgend_property,
70
--
42
--
71
2.20.1
43
2.20.1
72
44
73
45
diff view generated by jsdifflib
1
The SYSCTL block in the SSE-200 has some extra registers that
1
The VMSTATE_STRUCT_VARRAY_UINT32 macro is intended to handle
2
are not present in the IoTKit version. Add these registers
2
migrating a field which is an array of structs, but where instead of
3
(as reads-as-written stubs), enabled by a new QOM property.
3
migrating the entire array we only migrate a variable number of
4
elements of it.
5
6
The VMSTATE_STRUCT_VARRAY_POINTER_UINT32 macro is intended to handle
7
migrating a field which is of pointer type, and points to a
8
dynamically allocated array of structs of variable size.
9
10
We weren't actually checking that the field passed to
11
VMSTATE_STRUCT_VARRAY_UINT32 really is an array, with the result that
12
accidentally using it where the _POINTER_ macro was intended would
13
compile but silently corrupt memory on migration.
14
15
Add type-checking that enforces that the field passed in is
16
really of the right array type. This applies to all the VMSTATE
17
macros which use flags including VMS_VARRAY_* but not VMS_POINTER.
4
18
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
19
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
20
Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
7
Message-id: 20190219125808.25174-7-peter.maydell@linaro.org
21
Reviewed-by: Damien Hedde <damien.hedde@greensocs.com>
22
Tested-by: Damien Hedde <damien.hedde@greensocs.com>
23
Message-id: 20190725163710.11703-3-peter.maydell@linaro.org
8
---
24
---
9
include/hw/misc/iotkit-sysctl.h | 20 +++
25
include/migration/vmstate.h | 30 ++++++++++++++++++++++++------
10
hw/arm/armsse.c | 2 +
26
1 file changed, 24 insertions(+), 6 deletions(-)
11
hw/misc/iotkit-sysctl.c | 245 +++++++++++++++++++++++++++++++-
12
3 files changed, 262 insertions(+), 5 deletions(-)
13
27
14
diff --git a/include/hw/misc/iotkit-sysctl.h b/include/hw/misc/iotkit-sysctl.h
28
diff --git a/include/migration/vmstate.h b/include/migration/vmstate.h
15
index XXXXXXX..XXXXXXX 100644
29
index XXXXXXX..XXXXXXX 100644
16
--- a/include/hw/misc/iotkit-sysctl.h
30
--- a/include/migration/vmstate.h
17
+++ b/include/hw/misc/iotkit-sysctl.h
31
+++ b/include/migration/vmstate.h
18
@@ -XXX,XX +XXX,XX @@
32
@@ -XXX,XX +XXX,XX @@ extern const VMStateInfo vmstate_info_bitmap;
19
* "system control register" blocks.
33
extern const VMStateInfo vmstate_info_qtailq;
20
*
34
21
* QEMU interface:
35
#define type_check_2darray(t1,t2,n,m) ((t1(*)[n][m])0 - (t2*)0)
22
+ * + QOM property "SYS_VERSION": value of the SYS_VERSION register of the
36
+/*
23
+ * system information block of the SSE
37
+ * Check that type t2 is an array of type t1 of size n,
24
+ * (used to identify whether to provide SSE-200-only registers)
38
+ * e.g. if t1 is 'foo' and n is 32 then t2 must be 'foo[32]'
25
* + sysbus MMIO region 0: the system information register bank
39
+ */
26
* + sysbus MMIO region 1: the system control register bank
40
#define type_check_array(t1,t2,n) ((t1(*)[n])0 - (t2*)0)
27
*/
41
#define type_check_pointer(t1,t2) ((t1**)0 - (t2*)0)
28
@@ -XXX,XX +XXX,XX @@ typedef struct IoTKitSysCtl {
42
+/*
29
uint32_t initsvtor0;
43
+ * type of element 0 of the specified (array) field of the type.
30
uint32_t cpuwait;
44
+ * Note that if the field is a pointer then this will return the
31
uint32_t wicctrl;
45
+ * pointed-to type rather than complaining.
32
+ uint32_t scsecctrl;
46
+ */
33
+ uint32_t fclk_div;
47
+#define typeof_elt_of_field(type, field) typeof(((type *)0)->field[0])
34
+ uint32_t sysclk_div;
48
+/* Check that field f in struct type t2 is an array of t1, of any size */
35
+ uint32_t clock_force;
49
+#define type_check_varray(t1, t2, f) \
36
+ uint32_t initsvtor1;
50
+ (type_check(t1, typeof_elt_of_field(t2, f)) \
37
+ uint32_t nmi_enable;
51
+ + QEMU_BUILD_BUG_ON_ZERO(!QEMU_IS_ARRAY(((t2 *)0)->f)))
38
+ uint32_t ewctrl;
52
39
+ uint32_t pdcm_pd_sys_sense;
53
#define vmstate_offset_value(_state, _field, _type) \
40
+ uint32_t pdcm_pd_sram0_sense;
54
(offsetof(_state, _field) + \
41
+ uint32_t pdcm_pd_sram1_sense;
55
@@ -XXX,XX +XXX,XX @@ extern const VMStateInfo vmstate_info_qtailq;
42
+ uint32_t pdcm_pd_sram2_sense;
56
vmstate_offset_array(_state, _field, uint8_t, \
43
+ uint32_t pdcm_pd_sram3_sense;
57
sizeof(typeof_field(_state, _field)))
58
59
+#define vmstate_offset_varray(_state, _field, _type) \
60
+ (offsetof(_state, _field) + \
61
+ type_check_varray(_type, _state, _field))
44
+
62
+
45
+ /* Properties */
63
/* In the macros below, if there is a _version, that means the macro's
46
+ uint32_t sys_version;
64
* field will be processed only if the version being received is >=
47
+
65
* the _version specified. In general, if you add a new field, you
48
+ bool is_sse200;
66
@@ -XXX,XX +XXX,XX @@ extern const VMStateInfo vmstate_info_qtailq;
49
} IoTKitSysCtl;
67
.info = &(_info), \
50
68
.size = sizeof(_type), \
51
#endif
69
.flags = VMS_VARRAY_UINT32|VMS_MULTIPLY_ELEMENTS, \
52
diff --git a/hw/arm/armsse.c b/hw/arm/armsse.c
70
- .offset = offsetof(_state, _field), \
53
index XXXXXXX..XXXXXXX 100644
71
+ .offset = vmstate_offset_varray(_state, _field, _type), \
54
--- a/hw/arm/armsse.c
55
+++ b/hw/arm/armsse.c
56
@@ -XXX,XX +XXX,XX @@ static void armsse_realize(DeviceState *dev, Error **errp)
57
/* System information registers */
58
sysbus_mmio_map(SYS_BUS_DEVICE(&s->sysinfo), 0, 0x40020000);
59
/* System control registers */
60
+ object_property_set_int(OBJECT(&s->sysctl), info->sys_version,
61
+ "SYS_VERSION", &err);
62
object_property_set_bool(OBJECT(&s->sysctl), true, "realized", &err);
63
if (err) {
64
error_propagate(errp, err);
65
diff --git a/hw/misc/iotkit-sysctl.c b/hw/misc/iotkit-sysctl.c
66
index XXXXXXX..XXXXXXX 100644
67
--- a/hw/misc/iotkit-sysctl.c
68
+++ b/hw/misc/iotkit-sysctl.c
69
@@ -XXX,XX +XXX,XX @@
70
*/
71
72
#include "qemu/osdep.h"
73
+#include "qemu/bitops.h"
74
#include "qemu/log.h"
75
#include "trace.h"
76
#include "qapi/error.h"
77
@@ -XXX,XX +XXX,XX @@
78
REG32(SECDBGSTAT, 0x0)
79
REG32(SECDBGSET, 0x4)
80
REG32(SECDBGCLR, 0x8)
81
+REG32(SCSECCTRL, 0xc)
82
+REG32(FCLK_DIV, 0x10)
83
+REG32(SYSCLK_DIV, 0x14)
84
+REG32(CLOCK_FORCE, 0x18)
85
REG32(RESET_SYNDROME, 0x100)
86
REG32(RESET_MASK, 0x104)
87
REG32(SWRESET, 0x108)
88
FIELD(SWRESET, SWRESETREQ, 9, 1)
89
REG32(GRETREG, 0x10c)
90
REG32(INITSVTOR0, 0x110)
91
+REG32(INITSVTOR1, 0x114)
92
REG32(CPUWAIT, 0x118)
93
-REG32(BUSWAIT, 0x11c)
94
+REG32(NMI_ENABLE, 0x11c) /* BUSWAIT in IoTKit */
95
REG32(WICCTRL, 0x120)
96
+REG32(EWCTRL, 0x124)
97
+REG32(PDCM_PD_SYS_SENSE, 0x200)
98
+REG32(PDCM_PD_SRAM0_SENSE, 0x20c)
99
+REG32(PDCM_PD_SRAM1_SENSE, 0x210)
100
+REG32(PDCM_PD_SRAM2_SENSE, 0x214)
101
+REG32(PDCM_PD_SRAM3_SENSE, 0x218)
102
REG32(PID4, 0xfd0)
103
REG32(PID5, 0xfd4)
104
REG32(PID6, 0xfd8)
105
@@ -XXX,XX +XXX,XX @@ static uint64_t iotkit_sysctl_read(void *opaque, hwaddr offset,
106
case A_SECDBGSTAT:
107
r = s->secure_debug;
108
break;
109
+ case A_SCSECCTRL:
110
+ if (!s->is_sse200) {
111
+ goto bad_offset;
112
+ }
113
+ r = s->scsecctrl;
114
+ break;
115
+ case A_FCLK_DIV:
116
+ if (!s->is_sse200) {
117
+ goto bad_offset;
118
+ }
119
+ r = s->fclk_div;
120
+ break;
121
+ case A_SYSCLK_DIV:
122
+ if (!s->is_sse200) {
123
+ goto bad_offset;
124
+ }
125
+ r = s->sysclk_div;
126
+ break;
127
+ case A_CLOCK_FORCE:
128
+ if (!s->is_sse200) {
129
+ goto bad_offset;
130
+ }
131
+ r = s->clock_force;
132
+ break;
133
case A_RESET_SYNDROME:
134
r = s->reset_syndrome;
135
break;
136
@@ -XXX,XX +XXX,XX @@ static uint64_t iotkit_sysctl_read(void *opaque, hwaddr offset,
137
case A_INITSVTOR0:
138
r = s->initsvtor0;
139
break;
140
+ case A_INITSVTOR1:
141
+ if (!s->is_sse200) {
142
+ goto bad_offset;
143
+ }
144
+ r = s->initsvtor1;
145
+ break;
146
case A_CPUWAIT:
147
r = s->cpuwait;
148
break;
149
- case A_BUSWAIT:
150
- /* In IoTKit BUSWAIT is reserved, R/O, zero */
151
- r = 0;
152
+ case A_NMI_ENABLE:
153
+ /* In IoTKit this is named BUSWAIT but is marked reserved, R/O, zero */
154
+ if (!s->is_sse200) {
155
+ r = 0;
156
+ break;
157
+ }
158
+ r = s->nmi_enable;
159
break;
160
case A_WICCTRL:
161
r = s->wicctrl;
162
break;
163
+ case A_EWCTRL:
164
+ if (!s->is_sse200) {
165
+ goto bad_offset;
166
+ }
167
+ r = s->ewctrl;
168
+ break;
169
+ case A_PDCM_PD_SYS_SENSE:
170
+ if (!s->is_sse200) {
171
+ goto bad_offset;
172
+ }
173
+ r = s->pdcm_pd_sys_sense;
174
+ break;
175
+ case A_PDCM_PD_SRAM0_SENSE:
176
+ if (!s->is_sse200) {
177
+ goto bad_offset;
178
+ }
179
+ r = s->pdcm_pd_sram0_sense;
180
+ break;
181
+ case A_PDCM_PD_SRAM1_SENSE:
182
+ if (!s->is_sse200) {
183
+ goto bad_offset;
184
+ }
185
+ r = s->pdcm_pd_sram1_sense;
186
+ break;
187
+ case A_PDCM_PD_SRAM2_SENSE:
188
+ if (!s->is_sse200) {
189
+ goto bad_offset;
190
+ }
191
+ r = s->pdcm_pd_sram2_sense;
192
+ break;
193
+ case A_PDCM_PD_SRAM3_SENSE:
194
+ if (!s->is_sse200) {
195
+ goto bad_offset;
196
+ }
197
+ r = s->pdcm_pd_sram3_sense;
198
+ break;
199
case A_PID4 ... A_CID3:
200
r = sysctl_id[(offset - A_PID4) / 4];
201
break;
202
@@ -XXX,XX +XXX,XX @@ static uint64_t iotkit_sysctl_read(void *opaque, hwaddr offset,
203
r = 0;
204
break;
205
default:
206
+ bad_offset:
207
qemu_log_mask(LOG_GUEST_ERROR,
208
"IoTKit SysCtl read: bad offset %x\n", (int)offset);
209
r = 0;
210
@@ -XXX,XX +XXX,XX @@ static void iotkit_sysctl_write(void *opaque, hwaddr offset,
211
qemu_system_reset_request(SHUTDOWN_CAUSE_GUEST_RESET);
212
}
213
break;
214
- case A_BUSWAIT: /* In IoTKit BUSWAIT is reserved, R/O, zero */
215
+ case A_SCSECCTRL:
216
+ if (!s->is_sse200) {
217
+ goto bad_offset;
218
+ }
219
+ qemu_log_mask(LOG_UNIMP, "IoTKit SysCtl SCSECCTRL unimplemented\n");
220
+ s->scsecctrl = value;
221
+ break;
222
+ case A_FCLK_DIV:
223
+ if (!s->is_sse200) {
224
+ goto bad_offset;
225
+ }
226
+ qemu_log_mask(LOG_UNIMP, "IoTKit SysCtl FCLK_DIV unimplemented\n");
227
+ s->fclk_div = value;
228
+ break;
229
+ case A_SYSCLK_DIV:
230
+ if (!s->is_sse200) {
231
+ goto bad_offset;
232
+ }
233
+ qemu_log_mask(LOG_UNIMP, "IoTKit SysCtl SYSCLK_DIV unimplemented\n");
234
+ s->sysclk_div = value;
235
+ break;
236
+ case A_CLOCK_FORCE:
237
+ if (!s->is_sse200) {
238
+ goto bad_offset;
239
+ }
240
+ qemu_log_mask(LOG_UNIMP, "IoTKit SysCtl CLOCK_FORCE unimplemented\n");
241
+ s->clock_force = value;
242
+ break;
243
+ case A_INITSVTOR1:
244
+ if (!s->is_sse200) {
245
+ goto bad_offset;
246
+ }
247
+ qemu_log_mask(LOG_UNIMP, "IoTKit SysCtl INITSVTOR1 unimplemented\n");
248
+ s->initsvtor1 = value;
249
+ break;
250
+ case A_EWCTRL:
251
+ if (!s->is_sse200) {
252
+ goto bad_offset;
253
+ }
254
+ qemu_log_mask(LOG_UNIMP, "IoTKit SysCtl EWCTRL unimplemented\n");
255
+ s->ewctrl = value;
256
+ break;
257
+ case A_PDCM_PD_SYS_SENSE:
258
+ if (!s->is_sse200) {
259
+ goto bad_offset;
260
+ }
261
+ qemu_log_mask(LOG_UNIMP,
262
+ "IoTKit SysCtl PDCM_PD_SYS_SENSE unimplemented\n");
263
+ s->pdcm_pd_sys_sense = value;
264
+ break;
265
+ case A_PDCM_PD_SRAM0_SENSE:
266
+ if (!s->is_sse200) {
267
+ goto bad_offset;
268
+ }
269
+ qemu_log_mask(LOG_UNIMP,
270
+ "IoTKit SysCtl PDCM_PD_SRAM0_SENSE unimplemented\n");
271
+ s->pdcm_pd_sram0_sense = value;
272
+ break;
273
+ case A_PDCM_PD_SRAM1_SENSE:
274
+ if (!s->is_sse200) {
275
+ goto bad_offset;
276
+ }
277
+ qemu_log_mask(LOG_UNIMP,
278
+ "IoTKit SysCtl PDCM_PD_SRAM1_SENSE unimplemented\n");
279
+ s->pdcm_pd_sram1_sense = value;
280
+ break;
281
+ case A_PDCM_PD_SRAM2_SENSE:
282
+ if (!s->is_sse200) {
283
+ goto bad_offset;
284
+ }
285
+ qemu_log_mask(LOG_UNIMP,
286
+ "IoTKit SysCtl PDCM_PD_SRAM2_SENSE unimplemented\n");
287
+ s->pdcm_pd_sram2_sense = value;
288
+ break;
289
+ case A_PDCM_PD_SRAM3_SENSE:
290
+ if (!s->is_sse200) {
291
+ goto bad_offset;
292
+ }
293
+ qemu_log_mask(LOG_UNIMP,
294
+ "IoTKit SysCtl PDCM_PD_SRAM3_SENSE unimplemented\n");
295
+ s->pdcm_pd_sram3_sense = value;
296
+ break;
297
+ case A_NMI_ENABLE:
298
+ /* In IoTKit this is BUSWAIT: reserved, R/O, zero */
299
+ if (!s->is_sse200) {
300
+ goto ro_offset;
301
+ }
302
+ qemu_log_mask(LOG_UNIMP, "IoTKit SysCtl NMI_ENABLE unimplemented\n");
303
+ s->nmi_enable = value;
304
+ break;
305
case A_SECDBGSTAT:
306
case A_PID4 ... A_CID3:
307
+ ro_offset:
308
qemu_log_mask(LOG_GUEST_ERROR,
309
"IoTKit SysCtl write: write of RO offset %x\n",
310
(int)offset);
311
break;
312
default:
313
+ bad_offset:
314
qemu_log_mask(LOG_GUEST_ERROR,
315
"IoTKit SysCtl write: bad offset %x\n", (int)offset);
316
break;
317
@@ -XXX,XX +XXX,XX @@ static void iotkit_sysctl_reset(DeviceState *dev)
318
s->reset_mask = 0;
319
s->gretreg = 0;
320
s->initsvtor0 = 0x10000000;
321
+ s->initsvtor1 = 0x10000000;
322
s->cpuwait = 0;
323
s->wicctrl = 0;
324
+ s->scsecctrl = 0;
325
+ s->fclk_div = 0;
326
+ s->sysclk_div = 0;
327
+ s->clock_force = 0;
328
+ s->nmi_enable = 0;
329
+ s->ewctrl = 0;
330
+ s->pdcm_pd_sys_sense = 0x7f;
331
+ s->pdcm_pd_sram0_sense = 0;
332
+ s->pdcm_pd_sram1_sense = 0;
333
+ s->pdcm_pd_sram2_sense = 0;
334
+ s->pdcm_pd_sram3_sense = 0;
335
}
72
}
336
73
337
static void iotkit_sysctl_init(Object *obj)
74
#define VMSTATE_ARRAY_TEST(_field, _state, _num, _test, _info, _type) {\
338
@@ -XXX,XX +XXX,XX @@ static void iotkit_sysctl_init(Object *obj)
75
@@ -XXX,XX +XXX,XX @@ extern const VMStateInfo vmstate_info_qtailq;
339
sysbus_init_mmio(sbd, &s->iomem);
76
.info = &(_info), \
77
.size = sizeof(_type), \
78
.flags = VMS_VARRAY_INT32, \
79
- .offset = offsetof(_state, _field), \
80
+ .offset = vmstate_offset_varray(_state, _field, _type), \
340
}
81
}
341
82
342
+static void iotkit_sysctl_realize(DeviceState *dev, Error **errp)
83
#define VMSTATE_VARRAY_INT32(_field, _state, _field_num, _version, _info, _type) {\
343
+{
84
@@ -XXX,XX +XXX,XX @@ extern const VMStateInfo vmstate_info_qtailq;
344
+ IoTKitSysCtl *s = IOTKIT_SYSCTL(dev);
85
.info = &(_info), \
345
+
86
.size = sizeof(_type), \
346
+ /* The top 4 bits of the SYS_VERSION register tell us if we're an SSE-200 */
87
.flags = VMS_VARRAY_UINT16, \
347
+ if (extract32(s->sys_version, 28, 4) == 2) {
88
- .offset = offsetof(_state, _field), \
348
+ s->is_sse200 = true;
89
+ .offset = vmstate_offset_varray(_state, _field, _type), \
349
+ }
350
+}
351
+
352
+static bool sse200_needed(void *opaque)
353
+{
354
+ IoTKitSysCtl *s = IOTKIT_SYSCTL(opaque);
355
+
356
+ return s->is_sse200;
357
+}
358
+
359
+static const VMStateDescription iotkit_sysctl_sse200_vmstate = {
360
+ .name = "iotkit-sysctl/sse-200",
361
+ .version_id = 1,
362
+ .minimum_version_id = 1,
363
+ .needed = sse200_needed,
364
+ .fields = (VMStateField[]) {
365
+ VMSTATE_UINT32(scsecctrl, IoTKitSysCtl),
366
+ VMSTATE_UINT32(fclk_div, IoTKitSysCtl),
367
+ VMSTATE_UINT32(sysclk_div, IoTKitSysCtl),
368
+ VMSTATE_UINT32(clock_force, IoTKitSysCtl),
369
+ VMSTATE_UINT32(initsvtor1, IoTKitSysCtl),
370
+ VMSTATE_UINT32(nmi_enable, IoTKitSysCtl),
371
+ VMSTATE_UINT32(pdcm_pd_sys_sense, IoTKitSysCtl),
372
+ VMSTATE_UINT32(pdcm_pd_sram0_sense, IoTKitSysCtl),
373
+ VMSTATE_UINT32(pdcm_pd_sram1_sense, IoTKitSysCtl),
374
+ VMSTATE_UINT32(pdcm_pd_sram2_sense, IoTKitSysCtl),
375
+ VMSTATE_UINT32(pdcm_pd_sram3_sense, IoTKitSysCtl),
376
+ VMSTATE_END_OF_LIST()
377
+ }
378
+};
379
+
380
static const VMStateDescription iotkit_sysctl_vmstate = {
381
.name = "iotkit-sysctl",
382
.version_id = 1,
383
@@ -XXX,XX +XXX,XX @@ static const VMStateDescription iotkit_sysctl_vmstate = {
384
VMSTATE_UINT32(cpuwait, IoTKitSysCtl),
385
VMSTATE_UINT32(wicctrl, IoTKitSysCtl),
386
VMSTATE_END_OF_LIST()
387
+ },
388
+ .subsections = (const VMStateDescription*[]) {
389
+ &iotkit_sysctl_sse200_vmstate,
390
+ NULL
391
}
392
};
393
394
+static Property iotkit_sysctl_props[] = {
395
+ DEFINE_PROP_UINT32("SYS_VERSION", IoTKitSysCtl, sys_version, 0),
396
+ DEFINE_PROP_END_OF_LIST()
397
+};
398
+
399
static void iotkit_sysctl_class_init(ObjectClass *klass, void *data)
400
{
401
DeviceClass *dc = DEVICE_CLASS(klass);
402
403
dc->vmsd = &iotkit_sysctl_vmstate;
404
dc->reset = iotkit_sysctl_reset;
405
+ dc->props = iotkit_sysctl_props;
406
+ dc->realize = iotkit_sysctl_realize;
407
}
90
}
408
91
409
static const TypeInfo iotkit_sysctl_info = {
92
#define VMSTATE_VSTRUCT_TEST(_field, _state, _test, _version, _vmsd, _type, _struct_version) { \
93
@@ -XXX,XX +XXX,XX @@ extern const VMStateInfo vmstate_info_qtailq;
94
.vmsd = &(_vmsd), \
95
.size = sizeof(_type), \
96
.flags = VMS_STRUCT|VMS_VARRAY_UINT8, \
97
- .offset = offsetof(_state, _field), \
98
+ .offset = vmstate_offset_varray(_state, _field, _type), \
99
}
100
101
/* a variable length array (i.e. _type *_field) but we know the
102
@@ -XXX,XX +XXX,XX @@ extern const VMStateInfo vmstate_info_qtailq;
103
.vmsd = &(_vmsd), \
104
.size = sizeof(_type), \
105
.flags = VMS_STRUCT|VMS_VARRAY_INT32, \
106
- .offset = offsetof(_state, _field), \
107
+ .offset = vmstate_offset_varray(_state, _field, _type), \
108
}
109
110
#define VMSTATE_STRUCT_VARRAY_UINT32(_field, _state, _field_num, _version, _vmsd, _type) { \
111
@@ -XXX,XX +XXX,XX @@ extern const VMStateInfo vmstate_info_qtailq;
112
.vmsd = &(_vmsd), \
113
.size = sizeof(_type), \
114
.flags = VMS_STRUCT|VMS_VARRAY_UINT32, \
115
- .offset = offsetof(_state, _field), \
116
+ .offset = vmstate_offset_varray(_state, _field, _type), \
117
}
118
119
#define VMSTATE_STRUCT_VARRAY_ALLOC(_field, _state, _field_num, _version, _vmsd, _type) {\
410
--
120
--
411
2.20.1
121
2.20.1
412
122
413
123
diff view generated by jsdifflib
1
Create and connect the MHUs in the SSE-200.
1
Rename the elf_low_addr and elf_high_addr variables to image_low_addr
2
and image_high_addr -- in the next commit we will extend them to
3
be set for other kinds of image file and not just ELF files.
2
4
3
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
4
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
6
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
5
Message-id: 20190219125808.25174-3-peter.maydell@linaro.org
7
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
8
Tested-by: Mark Rutland <mark.rutland@arm.com>
9
Message-id: 20190722151804.25467-2-peter.maydell@linaro.org
6
---
10
---
7
include/hw/arm/armsse.h | 3 ++-
11
hw/arm/boot.c | 20 +++++++++++---------
8
hw/arm/armsse.c | 40 ++++++++++++++++++++++++++++++----------
12
1 file changed, 11 insertions(+), 9 deletions(-)
9
2 files changed, 32 insertions(+), 11 deletions(-)
10
13
11
diff --git a/include/hw/arm/armsse.h b/include/hw/arm/armsse.h
14
diff --git a/hw/arm/boot.c b/hw/arm/boot.c
12
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
13
--- a/include/hw/arm/armsse.h
16
--- a/hw/arm/boot.c
14
+++ b/include/hw/arm/armsse.h
17
+++ b/hw/arm/boot.c
15
@@ -XXX,XX +XXX,XX @@
18
@@ -XXX,XX +XXX,XX @@ static void arm_setup_direct_kernel_boot(ARMCPU *cpu,
16
#include "hw/misc/iotkit-sysctl.h"
19
int kernel_size;
17
#include "hw/misc/iotkit-sysinfo.h"
20
int initrd_size;
18
#include "hw/misc/armsse-cpuid.h"
21
int is_linux = 0;
19
+#include "hw/misc/armsse-mhu.h"
22
- uint64_t elf_entry, elf_low_addr, elf_high_addr;
20
#include "hw/misc/unimp.h"
23
+ uint64_t elf_entry;
21
#include "hw/or-irq.h"
24
+ /* Addresses of first byte used and first byte not used by the image */
22
#include "hw/core/split-irq.h"
25
+ uint64_t image_low_addr, image_high_addr;
23
@@ -XXX,XX +XXX,XX @@ typedef struct ARMSSE {
26
int elf_machine;
24
IoTKitSysCtl sysctl;
27
hwaddr entry;
25
IoTKitSysCtl sysinfo;
28
static const ARMInsnFixup *primary_loader;
26
29
@@ -XXX,XX +XXX,XX @@ static void arm_setup_direct_kernel_boot(ARMCPU *cpu,
27
- UnimplementedDeviceState mhu[2];
30
info->nb_cpus = 1;
28
+ ARMSSEMHU mhu[2];
31
29
UnimplementedDeviceState ppu[NUM_PPUS];
32
/* Assume that raw images are linux kernels, and ELF images are not. */
30
UnimplementedDeviceState cachectrl[SSE_MAX_CPUS];
33
- kernel_size = arm_load_elf(info, &elf_entry, &elf_low_addr,
31
UnimplementedDeviceState cpusecctrl[SSE_MAX_CPUS];
34
- &elf_high_addr, elf_machine, as);
32
diff --git a/hw/arm/armsse.c b/hw/arm/armsse.c
35
+ kernel_size = arm_load_elf(info, &elf_entry, &image_low_addr,
33
index XXXXXXX..XXXXXXX 100644
36
+ &image_high_addr, elf_machine, as);
34
--- a/hw/arm/armsse.c
37
if (kernel_size > 0 && have_dtb(info)) {
35
+++ b/hw/arm/armsse.c
38
/*
36
@@ -XXX,XX +XXX,XX @@ static void armsse_init(Object *obj)
39
* If there is still some room left at the base of RAM, try and put
37
sizeof(s->sysinfo), TYPE_IOTKIT_SYSINFO);
40
* the DTB there like we do for images loaded with -bios or -pflash.
38
if (info->has_mhus) {
41
*/
39
sysbus_init_child_obj(obj, "mhu0", &s->mhu[0], sizeof(s->mhu[0]),
42
- if (elf_low_addr > info->loader_start
40
- TYPE_UNIMPLEMENTED_DEVICE);
43
- || elf_high_addr < info->loader_start) {
41
+ TYPE_ARMSSE_MHU);
44
+ if (image_low_addr > info->loader_start
42
sysbus_init_child_obj(obj, "mhu1", &s->mhu[1], sizeof(s->mhu[1]),
45
+ || image_high_addr < info->loader_start) {
43
- TYPE_UNIMPLEMENTED_DEVICE);
46
/*
44
+ TYPE_ARMSSE_MHU);
47
- * Set elf_low_addr as address limit for arm_load_dtb if it may be
45
}
48
+ * Set image_low_addr as address limit for arm_load_dtb if it may be
46
if (info->has_ppus) {
49
* pointing into RAM, otherwise pass '0' (no limit)
47
for (i = 0; i < info->num_cpus; i++) {
50
*/
48
@@ -XXX,XX +XXX,XX @@ static void armsse_realize(DeviceState *dev, Error **errp)
51
- if (elf_low_addr < info->loader_start) {
49
}
52
- elf_low_addr = 0;
50
53
+ if (image_low_addr < info->loader_start) {
51
if (info->has_mhus) {
54
+ image_low_addr = 0;
52
- for (i = 0; i < ARRAY_SIZE(s->mhu); i++) {
53
- char *name;
54
- char *port;
55
+ /*
56
+ * An SSE-200 with only one CPU should have only one MHU created,
57
+ * with the region where the second MHU usually is being RAZ/WI.
58
+ * We don't implement that SSE-200 config; if we want to support
59
+ * it then this code needs to be enhanced to handle creating the
60
+ * RAZ/WI region instead of the second MHU.
61
+ */
62
+ assert(info->num_cpus == ARRAY_SIZE(s->mhu));
63
+
64
+ for (i = 0; i < ARRAY_SIZE(s->mhu); i++) {
65
+ char *port;
66
+ int cpunum;
67
+ SysBusDevice *mhu_sbd = SYS_BUS_DEVICE(&s->mhu[i]);
68
69
- name = g_strdup_printf("MHU%d", i);
70
- qdev_prop_set_string(DEVICE(&s->mhu[i]), "name", name);
71
- qdev_prop_set_uint64(DEVICE(&s->mhu[i]), "size", 0x1000);
72
object_property_set_bool(OBJECT(&s->mhu[i]), true,
73
"realized", &err);
74
- g_free(name);
75
if (err) {
76
error_propagate(errp, err);
77
return;
78
}
55
}
79
port = g_strdup_printf("port[%d]", i + 3);
56
info->dtb_start = info->loader_start;
80
- mr = sysbus_mmio_get_region(SYS_BUS_DEVICE(&s->mhu[i]), 0);
57
- info->dtb_limit = elf_low_addr;
81
+ mr = sysbus_mmio_get_region(mhu_sbd, 0);
58
+ info->dtb_limit = image_low_addr;
82
object_property_set_link(OBJECT(&s->apb_ppc0), OBJECT(mr),
83
port, &err);
84
g_free(port);
85
@@ -XXX,XX +XXX,XX @@ static void armsse_realize(DeviceState *dev, Error **errp)
86
error_propagate(errp, err);
87
return;
88
}
89
+
90
+ /*
91
+ * Each MHU has an irq line for each CPU:
92
+ * MHU 0 irq line 0 -> CPU 0 IRQ 6
93
+ * MHU 0 irq line 1 -> CPU 1 IRQ 6
94
+ * MHU 1 irq line 0 -> CPU 0 IRQ 7
95
+ * MHU 1 irq line 1 -> CPU 1 IRQ 7
96
+ */
97
+ for (cpunum = 0; cpunum < info->num_cpus; cpunum++) {
98
+ DeviceState *cpudev = DEVICE(&s->armv7m[cpunum]);
99
+
100
+ sysbus_connect_irq(mhu_sbd, cpunum,
101
+ qdev_get_gpio_in(cpudev, 6 + i));
102
+ }
103
}
59
}
104
}
60
}
105
61
entry = elf_entry;
106
--
62
--
107
2.20.1
63
2.20.1
108
64
109
65
diff view generated by jsdifflib
Deleted patch
1
Currently the Arm arm-powerctl.h APIs allow:
2
* arm_set_cpu_on(), which powers on a CPU and sets its
3
initial PC and other startup state
4
* arm_reset_cpu(), which resets a CPU which is already on
5
(and fails if the CPU is powered off)
6
1
7
but there is no way to say "power on a CPU as if it had
8
just come out of reset and don't do anything else to it".
9
10
Add a new function arm_set_cpu_on_and_reset(), which does this.
11
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
14
Message-id: 20190219125808.25174-5-peter.maydell@linaro.org
15
---
16
target/arm/arm-powerctl.h | 16 +++++++++++
17
target/arm/arm-powerctl.c | 56 +++++++++++++++++++++++++++++++++++++++
18
2 files changed, 72 insertions(+)
19
20
diff --git a/target/arm/arm-powerctl.h b/target/arm/arm-powerctl.h
21
index XXXXXXX..XXXXXXX 100644
22
--- a/target/arm/arm-powerctl.h
23
+++ b/target/arm/arm-powerctl.h
24
@@ -XXX,XX +XXX,XX @@ int arm_set_cpu_off(uint64_t cpuid);
25
*/
26
int arm_reset_cpu(uint64_t cpuid);
27
28
+/*
29
+ * arm_set_cpu_on_and_reset:
30
+ * @cpuid: the id of the CPU we want to star
31
+ *
32
+ * Start the cpu designated by @cpuid and put it through its normal
33
+ * CPU reset process. The CPU will start in the way it is architected
34
+ * to start after a power-on reset.
35
+ *
36
+ * Returns: QEMU_ARM_POWERCTL_RET_SUCCESS on success.
37
+ * QEMU_ARM_POWERCTL_INVALID_PARAM if there is no CPU with that ID.
38
+ * QEMU_ARM_POWERCTL_ALREADY_ON if the CPU is already on.
39
+ * QEMU_ARM_POWERCTL_ON_PENDING if the CPU is already partway through
40
+ * powering on.
41
+ */
42
+int arm_set_cpu_on_and_reset(uint64_t cpuid);
43
+
44
#endif
45
diff --git a/target/arm/arm-powerctl.c b/target/arm/arm-powerctl.c
46
index XXXXXXX..XXXXXXX 100644
47
--- a/target/arm/arm-powerctl.c
48
+++ b/target/arm/arm-powerctl.c
49
@@ -XXX,XX +XXX,XX @@ int arm_set_cpu_on(uint64_t cpuid, uint64_t entry, uint64_t context_id,
50
return QEMU_ARM_POWERCTL_RET_SUCCESS;
51
}
52
53
+static void arm_set_cpu_on_and_reset_async_work(CPUState *target_cpu_state,
54
+ run_on_cpu_data data)
55
+{
56
+ ARMCPU *target_cpu = ARM_CPU(target_cpu_state);
57
+
58
+ /* Initialize the cpu we are turning on */
59
+ cpu_reset(target_cpu_state);
60
+ target_cpu_state->halted = 0;
61
+
62
+ /* Finally set the power status */
63
+ assert(qemu_mutex_iothread_locked());
64
+ target_cpu->power_state = PSCI_ON;
65
+}
66
+
67
+int arm_set_cpu_on_and_reset(uint64_t cpuid)
68
+{
69
+ CPUState *target_cpu_state;
70
+ ARMCPU *target_cpu;
71
+
72
+ assert(qemu_mutex_iothread_locked());
73
+
74
+ /* Retrieve the cpu we are powering up */
75
+ target_cpu_state = arm_get_cpu_by_id(cpuid);
76
+ if (!target_cpu_state) {
77
+ /* The cpu was not found */
78
+ return QEMU_ARM_POWERCTL_INVALID_PARAM;
79
+ }
80
+
81
+ target_cpu = ARM_CPU(target_cpu_state);
82
+ if (target_cpu->power_state == PSCI_ON) {
83
+ qemu_log_mask(LOG_GUEST_ERROR,
84
+ "[ARM]%s: CPU %" PRId64 " is already on\n",
85
+ __func__, cpuid);
86
+ return QEMU_ARM_POWERCTL_ALREADY_ON;
87
+ }
88
+
89
+ /*
90
+ * If another CPU has powered the target on we are in the state
91
+ * ON_PENDING and additional attempts to power on the CPU should
92
+ * fail (see 6.6 Implementation CPU_ON/CPU_OFF races in the PSCI
93
+ * spec)
94
+ */
95
+ if (target_cpu->power_state == PSCI_ON_PENDING) {
96
+ qemu_log_mask(LOG_GUEST_ERROR,
97
+ "[ARM]%s: CPU %" PRId64 " is already powering on\n",
98
+ __func__, cpuid);
99
+ return QEMU_ARM_POWERCTL_ON_PENDING;
100
+ }
101
+
102
+ async_run_on_cpu(target_cpu_state, arm_set_cpu_on_and_reset_async_work,
103
+ RUN_ON_CPU_NULL);
104
+
105
+ /* We are good to go */
106
+ return QEMU_ARM_POWERCTL_RET_SUCCESS;
107
+}
108
+
109
static void arm_set_cpu_off_async_work(CPUState *target_cpu_state,
110
run_on_cpu_data data)
111
{
112
--
113
2.20.1
114
115
diff view generated by jsdifflib
Deleted patch
1
The iotkit-sysctl device has a register it names INITSVRTOR0.
2
This is actually a typo present in the IoTKit documentation
3
and also in part of the SSE-200 documentation: it should be
4
INITSVTOR0 because it is specifying the initial value of the
5
Secure VTOR register in the CPU. Correct the typo.
6
1
7
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20190219125808.25174-6-peter.maydell@linaro.org
10
---
11
include/hw/misc/iotkit-sysctl.h | 2 +-
12
hw/misc/iotkit-sysctl.c | 16 ++++++++--------
13
2 files changed, 9 insertions(+), 9 deletions(-)
14
15
diff --git a/include/hw/misc/iotkit-sysctl.h b/include/hw/misc/iotkit-sysctl.h
16
index XXXXXXX..XXXXXXX 100644
17
--- a/include/hw/misc/iotkit-sysctl.h
18
+++ b/include/hw/misc/iotkit-sysctl.h
19
@@ -XXX,XX +XXX,XX @@ typedef struct IoTKitSysCtl {
20
uint32_t reset_syndrome;
21
uint32_t reset_mask;
22
uint32_t gretreg;
23
- uint32_t initsvrtor0;
24
+ uint32_t initsvtor0;
25
uint32_t cpuwait;
26
uint32_t wicctrl;
27
} IoTKitSysCtl;
28
diff --git a/hw/misc/iotkit-sysctl.c b/hw/misc/iotkit-sysctl.c
29
index XXXXXXX..XXXXXXX 100644
30
--- a/hw/misc/iotkit-sysctl.c
31
+++ b/hw/misc/iotkit-sysctl.c
32
@@ -XXX,XX +XXX,XX @@ REG32(RESET_MASK, 0x104)
33
REG32(SWRESET, 0x108)
34
FIELD(SWRESET, SWRESETREQ, 9, 1)
35
REG32(GRETREG, 0x10c)
36
-REG32(INITSVRTOR0, 0x110)
37
+REG32(INITSVTOR0, 0x110)
38
REG32(CPUWAIT, 0x118)
39
REG32(BUSWAIT, 0x11c)
40
REG32(WICCTRL, 0x120)
41
@@ -XXX,XX +XXX,XX @@ static uint64_t iotkit_sysctl_read(void *opaque, hwaddr offset,
42
case A_GRETREG:
43
r = s->gretreg;
44
break;
45
- case A_INITSVRTOR0:
46
- r = s->initsvrtor0;
47
+ case A_INITSVTOR0:
48
+ r = s->initsvtor0;
49
break;
50
case A_CPUWAIT:
51
r = s->cpuwait;
52
@@ -XXX,XX +XXX,XX @@ static void iotkit_sysctl_write(void *opaque, hwaddr offset,
53
*/
54
s->gretreg = value;
55
break;
56
- case A_INITSVRTOR0:
57
- qemu_log_mask(LOG_UNIMP, "IoTKit SysCtl INITSVRTOR0 unimplemented\n");
58
- s->initsvrtor0 = value;
59
+ case A_INITSVTOR0:
60
+ qemu_log_mask(LOG_UNIMP, "IoTKit SysCtl INITSVTOR0 unimplemented\n");
61
+ s->initsvtor0 = value;
62
break;
63
case A_CPUWAIT:
64
qemu_log_mask(LOG_UNIMP, "IoTKit SysCtl CPUWAIT unimplemented\n");
65
@@ -XXX,XX +XXX,XX @@ static void iotkit_sysctl_reset(DeviceState *dev)
66
s->reset_syndrome = 1;
67
s->reset_mask = 0;
68
s->gretreg = 0;
69
- s->initsvrtor0 = 0x10000000;
70
+ s->initsvtor0 = 0x10000000;
71
s->cpuwait = 0;
72
s->wicctrl = 0;
73
}
74
@@ -XXX,XX +XXX,XX @@ static const VMStateDescription iotkit_sysctl_vmstate = {
75
VMSTATE_UINT32(reset_syndrome, IoTKitSysCtl),
76
VMSTATE_UINT32(reset_mask, IoTKitSysCtl),
77
VMSTATE_UINT32(gretreg, IoTKitSysCtl),
78
- VMSTATE_UINT32(initsvrtor0, IoTKitSysCtl),
79
+ VMSTATE_UINT32(initsvtor0, IoTKitSysCtl),
80
VMSTATE_UINT32(cpuwait, IoTKitSysCtl),
81
VMSTATE_UINT32(wicctrl, IoTKitSysCtl),
82
VMSTATE_END_OF_LIST()
83
--
84
2.20.1
85
86
diff view generated by jsdifflib
Deleted patch
1
The CPUWAIT register acts as a sort of power-control: if a bit
2
in it is 1 then the CPU will have been forced into waiting
3
when the system was reset (which in QEMU we model as the
4
CPU starting powered off). Writing a 0 to the register will
5
allow the CPU to boot (for QEMU, we model this as powering
6
it on). Note that writing 0 to the register does not power
7
off a CPU.
8
1
9
For this to work correctly we need to also honour the
10
INITSVTOR* registers, which let the guest control where the
11
CPU will load its SP and PC from when it comes out of reset.
12
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
15
Message-id: 20190219125808.25174-8-peter.maydell@linaro.org
16
---
17
hw/misc/iotkit-sysctl.c | 41 +++++++++++++++++++++++++++++++++++++----
18
1 file changed, 37 insertions(+), 4 deletions(-)
19
20
diff --git a/hw/misc/iotkit-sysctl.c b/hw/misc/iotkit-sysctl.c
21
index XXXXXXX..XXXXXXX 100644
22
--- a/hw/misc/iotkit-sysctl.c
23
+++ b/hw/misc/iotkit-sysctl.c
24
@@ -XXX,XX +XXX,XX @@
25
#include "hw/sysbus.h"
26
#include "hw/registerfields.h"
27
#include "hw/misc/iotkit-sysctl.h"
28
+#include "target/arm/arm-powerctl.h"
29
+#include "target/arm/cpu.h"
30
31
REG32(SECDBGSTAT, 0x0)
32
REG32(SECDBGSET, 0x4)
33
@@ -XXX,XX +XXX,XX @@ static const int sysctl_id[] = {
34
0x0d, 0xf0, 0x05, 0xb1, /* CID0..CID3 */
35
};
36
37
+/*
38
+ * Set the initial secure vector table offset address for the core.
39
+ * This will take effect when the CPU next resets.
40
+ */
41
+static void set_init_vtor(uint64_t cpuid, uint32_t vtor)
42
+{
43
+ Object *cpuobj = OBJECT(arm_get_cpu_by_id(cpuid));
44
+
45
+ if (cpuobj) {
46
+ if (object_property_find(cpuobj, "init-svtor", NULL)) {
47
+ object_property_set_uint(cpuobj, vtor, "init-svtor", &error_abort);
48
+ }
49
+ }
50
+}
51
+
52
static uint64_t iotkit_sysctl_read(void *opaque, hwaddr offset,
53
unsigned size)
54
{
55
@@ -XXX,XX +XXX,XX @@ static void iotkit_sysctl_write(void *opaque, hwaddr offset,
56
s->gretreg = value;
57
break;
58
case A_INITSVTOR0:
59
- qemu_log_mask(LOG_UNIMP, "IoTKit SysCtl INITSVTOR0 unimplemented\n");
60
s->initsvtor0 = value;
61
+ set_init_vtor(0, s->initsvtor0);
62
break;
63
case A_CPUWAIT:
64
- qemu_log_mask(LOG_UNIMP, "IoTKit SysCtl CPUWAIT unimplemented\n");
65
+ if ((s->cpuwait & 1) && !(value & 1)) {
66
+ /* Powering up CPU 0 */
67
+ arm_set_cpu_on_and_reset(0);
68
+ }
69
+ if ((s->cpuwait & 2) && !(value & 2)) {
70
+ /* Powering up CPU 1 */
71
+ arm_set_cpu_on_and_reset(1);
72
+ }
73
s->cpuwait = value;
74
break;
75
case A_WICCTRL:
76
@@ -XXX,XX +XXX,XX @@ static void iotkit_sysctl_write(void *opaque, hwaddr offset,
77
if (!s->is_sse200) {
78
goto bad_offset;
79
}
80
- qemu_log_mask(LOG_UNIMP, "IoTKit SysCtl INITSVTOR1 unimplemented\n");
81
s->initsvtor1 = value;
82
+ set_init_vtor(1, s->initsvtor1);
83
break;
84
case A_EWCTRL:
85
if (!s->is_sse200) {
86
@@ -XXX,XX +XXX,XX @@ static void iotkit_sysctl_reset(DeviceState *dev)
87
s->gretreg = 0;
88
s->initsvtor0 = 0x10000000;
89
s->initsvtor1 = 0x10000000;
90
- s->cpuwait = 0;
91
+ if (s->is_sse200) {
92
+ /*
93
+ * CPU 0 starts on, CPU 1 starts off. In real hardware this is
94
+ * configurable by the SoC integrator as a verilog parameter.
95
+ */
96
+ s->cpuwait = 2;
97
+ } else {
98
+ /* CPU 0 starts on */
99
+ s->cpuwait = 0;
100
+ }
101
s->wicctrl = 0;
102
s->scsecctrl = 0;
103
s->fclk_div = 0;
104
--
105
2.20.1
106
107
diff view generated by jsdifflib
Deleted patch
1
At the moment the handling of init-svtor and cpuwait initial
2
values is split between armsse.c and iotkit-sysctl.c:
3
the code in armsse.c sets the initial state of the CPU
4
object by setting the init-svtor and start-powered-off
5
properties, but the iotkit-sysctl.c code has its own
6
code setting the reset values of its registers (which are
7
then used when updating the CPU when the guest makes
8
runtime changes).
9
1
10
Clean this up by making the armsse.c code set properties on the
11
iotkit-sysctl object to define the initial values of the
12
registers, so they always match the initial CPU state,
13
and update the comments in armsse.c accordingly.
14
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
17
Message-id: 20190219125808.25174-9-peter.maydell@linaro.org
18
---
19
include/hw/misc/iotkit-sysctl.h | 3 ++
20
hw/arm/armsse.c | 49 +++++++++++++++++++++------------
21
hw/misc/iotkit-sysctl.c | 20 ++++++--------
22
3 files changed, 42 insertions(+), 30 deletions(-)
23
24
diff --git a/include/hw/misc/iotkit-sysctl.h b/include/hw/misc/iotkit-sysctl.h
25
index XXXXXXX..XXXXXXX 100644
26
--- a/include/hw/misc/iotkit-sysctl.h
27
+++ b/include/hw/misc/iotkit-sysctl.h
28
@@ -XXX,XX +XXX,XX @@ typedef struct IoTKitSysCtl {
29
30
/* Properties */
31
uint32_t sys_version;
32
+ uint32_t cpuwait_rst;
33
+ uint32_t initsvtor0_rst;
34
+ uint32_t initsvtor1_rst;
35
36
bool is_sse200;
37
} IoTKitSysCtl;
38
diff --git a/hw/arm/armsse.c b/hw/arm/armsse.c
39
index XXXXXXX..XXXXXXX 100644
40
--- a/hw/arm/armsse.c
41
+++ b/hw/arm/armsse.c
42
@@ -XXX,XX +XXX,XX @@
43
44
#include "qemu/osdep.h"
45
#include "qemu/log.h"
46
+#include "qemu/bitops.h"
47
#include "qapi/error.h"
48
#include "trace.h"
49
#include "hw/sysbus.h"
50
@@ -XXX,XX +XXX,XX @@ struct ARMSSEInfo {
51
int sram_banks;
52
int num_cpus;
53
uint32_t sys_version;
54
+ uint32_t cpuwait_rst;
55
SysConfigFormat sys_config_format;
56
bool has_mhus;
57
bool has_ppus;
58
@@ -XXX,XX +XXX,XX @@ static const ARMSSEInfo armsse_variants[] = {
59
.sram_banks = 1,
60
.num_cpus = 1,
61
.sys_version = 0x41743,
62
+ .cpuwait_rst = 0,
63
.sys_config_format = IoTKitFormat,
64
.has_mhus = false,
65
.has_ppus = false,
66
@@ -XXX,XX +XXX,XX @@ static const ARMSSEInfo armsse_variants[] = {
67
.sram_banks = 4,
68
.num_cpus = 2,
69
.sys_version = 0x22041743,
70
+ .cpuwait_rst = 2,
71
.sys_config_format = SSE200Format,
72
.has_mhus = true,
73
.has_ppus = true,
74
@@ -XXX,XX +XXX,XX @@ static void armsse_realize(DeviceState *dev, Error **errp)
75
76
qdev_prop_set_uint32(cpudev, "num-irq", s->exp_numirq + 32);
77
/*
78
- * In real hardware the initial Secure VTOR is set from the INITSVTOR0
79
- * register in the IoT Kit System Control Register block, and the
80
- * initial value of that is in turn specifiable by the FPGA that
81
- * instantiates the IoT Kit. In QEMU we don't implement this wrinkle,
82
- * and simply set the CPU's init-svtor to the IoT Kit default value.
83
- * In SSE-200 the situation is similar, except that the default value
84
- * is a reset-time signal input. Typically a board using the SSE-200
85
- * will have a system control processor whose boot firmware initializes
86
- * the INITSVTOR* registers before powering up the CPUs in any case,
87
- * so the hardware's default value doesn't matter. QEMU doesn't emulate
88
+ * In real hardware the initial Secure VTOR is set from the INITSVTOR*
89
+ * registers in the IoT Kit System Control Register block. In QEMU
90
+ * we set the initial value here, and also the reset value of the
91
+ * sysctl register, from this object's QOM init-svtor property.
92
+ * If the guest changes the INITSVTOR* registers at runtime then the
93
+ * code in iotkit-sysctl.c will update the CPU init-svtor property
94
+ * (which will then take effect on the next CPU warm-reset).
95
+ *
96
+ * Note that typically a board using the SSE-200 will have a system
97
+ * control processor whose boot firmware initializes the INITSVTOR*
98
+ * registers before powering up the CPUs. QEMU doesn't emulate
99
* the control processor, so instead we behave in the way that the
100
- * firmware does. The initial value is configurable by the board code
101
- * to match whatever its firmware does.
102
+ * firmware does: the initial value should be set by the board code
103
+ * (using the init-svtor property on the ARMSSE object) to match
104
+ * whatever its firmware does.
105
*/
106
qdev_prop_set_uint32(cpudev, "init-svtor", s->init_svtor);
107
/*
108
- * Start all CPUs except CPU0 powered down. In real hardware it is
109
- * a configurable property of the SSE-200 which CPUs start powered up
110
- * (via the CPUWAIT0_RST and CPUWAIT1_RST parameters), but since all
111
- * the boards we care about start CPU0 and leave CPU1 powered off,
112
- * we hard-code that for now. We can add QOM properties for this
113
+ * CPUs start powered down if the corresponding bit in the CPUWAIT
114
+ * register is 1. In real hardware the CPUWAIT register reset value is
115
+ * a configurable property of the SSE-200 (via the CPUWAIT0_RST and
116
+ * CPUWAIT1_RST parameters), but since all the boards we care about
117
+ * start CPU0 and leave CPU1 powered off, we hard-code that in
118
+ * info->cpuwait_rst for now. We can add QOM properties for this
119
* later if necessary.
120
*/
121
- if (i > 0) {
122
+ if (extract32(info->cpuwait_rst, i, 1)) {
123
object_property_set_bool(cpuobj, true, "start-powered-off", &err);
124
if (err) {
125
error_propagate(errp, err);
126
@@ -XXX,XX +XXX,XX @@ static void armsse_realize(DeviceState *dev, Error **errp)
127
/* System control registers */
128
object_property_set_int(OBJECT(&s->sysctl), info->sys_version,
129
"SYS_VERSION", &err);
130
+ object_property_set_int(OBJECT(&s->sysctl), info->cpuwait_rst,
131
+ "CPUWAIT_RST", &err);
132
+ object_property_set_int(OBJECT(&s->sysctl), s->init_svtor,
133
+ "INITSVTOR0_RST", &err);
134
+ object_property_set_int(OBJECT(&s->sysctl), s->init_svtor,
135
+ "INITSVTOR1_RST", &err);
136
object_property_set_bool(OBJECT(&s->sysctl), true, "realized", &err);
137
if (err) {
138
error_propagate(errp, err);
139
diff --git a/hw/misc/iotkit-sysctl.c b/hw/misc/iotkit-sysctl.c
140
index XXXXXXX..XXXXXXX 100644
141
--- a/hw/misc/iotkit-sysctl.c
142
+++ b/hw/misc/iotkit-sysctl.c
143
@@ -XXX,XX +XXX,XX @@ static void iotkit_sysctl_reset(DeviceState *dev)
144
s->reset_syndrome = 1;
145
s->reset_mask = 0;
146
s->gretreg = 0;
147
- s->initsvtor0 = 0x10000000;
148
- s->initsvtor1 = 0x10000000;
149
- if (s->is_sse200) {
150
- /*
151
- * CPU 0 starts on, CPU 1 starts off. In real hardware this is
152
- * configurable by the SoC integrator as a verilog parameter.
153
- */
154
- s->cpuwait = 2;
155
- } else {
156
- /* CPU 0 starts on */
157
- s->cpuwait = 0;
158
- }
159
+ s->initsvtor0 = s->initsvtor0_rst;
160
+ s->initsvtor1 = s->initsvtor1_rst;
161
+ s->cpuwait = s->cpuwait_rst;
162
s->wicctrl = 0;
163
s->scsecctrl = 0;
164
s->fclk_div = 0;
165
@@ -XXX,XX +XXX,XX @@ static const VMStateDescription iotkit_sysctl_vmstate = {
166
167
static Property iotkit_sysctl_props[] = {
168
DEFINE_PROP_UINT32("SYS_VERSION", IoTKitSysCtl, sys_version, 0),
169
+ DEFINE_PROP_UINT32("CPUWAIT_RST", IoTKitSysCtl, cpuwait_rst, 0),
170
+ DEFINE_PROP_UINT32("INITSVTOR0_RST", IoTKitSysCtl, initsvtor0_rst,
171
+ 0x10000000),
172
+ DEFINE_PROP_UINT32("INITSVTOR1_RST", IoTKitSysCtl, initsvtor1_rst,
173
+ 0x10000000),
174
DEFINE_PROP_END_OF_LIST()
175
};
176
177
--
178
2.20.1
179
180
diff view generated by jsdifflib
Deleted patch
1
Instead of gating the A32/T32 FP16 conversion instructions on
2
the ARM_FEATURE_VFP_FP16 flag, switch to our new approach of
3
looking at ID register bits. In this case MVFR1 fields FPHP
4
and SIMDHP indicate the presence of these insns.
5
1
6
This change doesn't alter behaviour for any of our CPUs.
7
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
10
Message-id: 20190222170936.13268-2-peter.maydell@linaro.org
11
---
12
target/arm/cpu.h | 37 ++++++++++++++++++++++++++++++++++++-
13
target/arm/cpu.c | 2 --
14
target/arm/kvm32.c | 3 ---
15
target/arm/translate.c | 26 ++++++++++++++++++--------
16
4 files changed, 54 insertions(+), 14 deletions(-)
17
18
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
19
index XXXXXXX..XXXXXXX 100644
20
--- a/target/arm/cpu.h
21
+++ b/target/arm/cpu.h
22
@@ -XXX,XX +XXX,XX @@ FIELD(ID_DFR0, MPROFDBG, 20, 4)
23
FIELD(ID_DFR0, PERFMON, 24, 4)
24
FIELD(ID_DFR0, TRACEFILT, 28, 4)
25
26
+FIELD(MVFR0, SIMDREG, 0, 4)
27
+FIELD(MVFR0, FPSP, 4, 4)
28
+FIELD(MVFR0, FPDP, 8, 4)
29
+FIELD(MVFR0, FPTRAP, 12, 4)
30
+FIELD(MVFR0, FPDIVIDE, 16, 4)
31
+FIELD(MVFR0, FPSQRT, 20, 4)
32
+FIELD(MVFR0, FPSHVEC, 24, 4)
33
+FIELD(MVFR0, FPROUND, 28, 4)
34
+
35
+FIELD(MVFR1, FPFTZ, 0, 4)
36
+FIELD(MVFR1, FPDNAN, 4, 4)
37
+FIELD(MVFR1, SIMDLS, 8, 4)
38
+FIELD(MVFR1, SIMDINT, 12, 4)
39
+FIELD(MVFR1, SIMDSP, 16, 4)
40
+FIELD(MVFR1, SIMDHP, 20, 4)
41
+FIELD(MVFR1, FPHP, 24, 4)
42
+FIELD(MVFR1, SIMDFMAC, 28, 4)
43
+
44
+FIELD(MVFR2, SIMDMISC, 0, 4)
45
+FIELD(MVFR2, FPMISC, 4, 4)
46
+
47
QEMU_BUILD_BUG_ON(ARRAY_SIZE(((ARMCPU *)0)->ccsidr) <= R_V7M_CSSELR_INDEX_MASK);
48
49
/* If adding a feature bit which corresponds to a Linux ELF
50
@@ -XXX,XX +XXX,XX @@ enum arm_features {
51
ARM_FEATURE_THUMB2,
52
ARM_FEATURE_PMSA, /* no MMU; may have Memory Protection Unit */
53
ARM_FEATURE_VFP3,
54
- ARM_FEATURE_VFP_FP16,
55
ARM_FEATURE_NEON,
56
ARM_FEATURE_M, /* Microcontroller profile. */
57
ARM_FEATURE_OMAPCP, /* OMAP specific CP15 ops handling. */
58
@@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa32_fp16_arith(const ARMISARegisters *id)
59
return FIELD_EX64(id->id_aa64pfr0, ID_AA64PFR0, FP) == 1;
60
}
61
62
+/*
63
+ * We always set the FP and SIMD FP16 fields to indicate identical
64
+ * levels of support (assuming SIMD is implemented at all), so
65
+ * we only need one set of accessors.
66
+ */
67
+static inline bool isar_feature_aa32_fp16_spconv(const ARMISARegisters *id)
68
+{
69
+ return FIELD_EX64(id->mvfr1, MVFR1, FPHP) > 0;
70
+}
71
+
72
+static inline bool isar_feature_aa32_fp16_dpconv(const ARMISARegisters *id)
73
+{
74
+ return FIELD_EX64(id->mvfr1, MVFR1, FPHP) > 1;
75
+}
76
+
77
/*
78
* 64-bit feature tests via id registers.
79
*/
80
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
81
index XXXXXXX..XXXXXXX 100644
82
--- a/target/arm/cpu.c
83
+++ b/target/arm/cpu.c
84
@@ -XXX,XX +XXX,XX @@ static void arm_cpu_realizefn(DeviceState *dev, Error **errp)
85
}
86
if (arm_feature(env, ARM_FEATURE_VFP4)) {
87
set_feature(env, ARM_FEATURE_VFP3);
88
- set_feature(env, ARM_FEATURE_VFP_FP16);
89
}
90
if (arm_feature(env, ARM_FEATURE_VFP3)) {
91
set_feature(env, ARM_FEATURE_VFP);
92
@@ -XXX,XX +XXX,XX @@ static void cortex_a9_initfn(Object *obj)
93
cpu->dtb_compatible = "arm,cortex-a9";
94
set_feature(&cpu->env, ARM_FEATURE_V7);
95
set_feature(&cpu->env, ARM_FEATURE_VFP3);
96
- set_feature(&cpu->env, ARM_FEATURE_VFP_FP16);
97
set_feature(&cpu->env, ARM_FEATURE_NEON);
98
set_feature(&cpu->env, ARM_FEATURE_THUMB2EE);
99
set_feature(&cpu->env, ARM_FEATURE_EL3);
100
diff --git a/target/arm/kvm32.c b/target/arm/kvm32.c
101
index XXXXXXX..XXXXXXX 100644
102
--- a/target/arm/kvm32.c
103
+++ b/target/arm/kvm32.c
104
@@ -XXX,XX +XXX,XX @@ bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)
105
if (extract32(id_pfr0, 12, 4) == 1) {
106
set_feature(&features, ARM_FEATURE_THUMB2EE);
107
}
108
- if (extract32(ahcf->isar.mvfr1, 20, 4) == 1) {
109
- set_feature(&features, ARM_FEATURE_VFP_FP16);
110
- }
111
if (extract32(ahcf->isar.mvfr1, 12, 4) == 1) {
112
set_feature(&features, ARM_FEATURE_NEON);
113
}
114
diff --git a/target/arm/translate.c b/target/arm/translate.c
115
index XXXXXXX..XXXXXXX 100644
116
--- a/target/arm/translate.c
117
+++ b/target/arm/translate.c
118
@@ -XXX,XX +XXX,XX @@ static int disas_vfp_insn(DisasContext *s, uint32_t insn)
119
* UNPREDICTABLE if bit 8 is set prior to ARMv8
120
* (we choose to UNDEF)
121
*/
122
- if ((dp && !arm_dc_feature(s, ARM_FEATURE_V8)) ||
123
- !arm_dc_feature(s, ARM_FEATURE_VFP_FP16)) {
124
- return 1;
125
+ if (dp) {
126
+ if (!dc_isar_feature(aa32_fp16_dpconv, s)) {
127
+ return 1;
128
+ }
129
+ } else {
130
+ if (!dc_isar_feature(aa32_fp16_spconv, s)) {
131
+ return 1;
132
+ }
133
}
134
rm_is_dp = false;
135
break;
136
case 0x06: /* vcvtb.f16.f32, vcvtb.f16.f64 */
137
case 0x07: /* vcvtt.f16.f32, vcvtt.f16.f64 */
138
- if ((dp && !arm_dc_feature(s, ARM_FEATURE_V8)) ||
139
- !arm_dc_feature(s, ARM_FEATURE_VFP_FP16)) {
140
- return 1;
141
+ if (dp) {
142
+ if (!dc_isar_feature(aa32_fp16_dpconv, s)) {
143
+ return 1;
144
+ }
145
+ } else {
146
+ if (!dc_isar_feature(aa32_fp16_spconv, s)) {
147
+ return 1;
148
+ }
149
}
150
rd_is_dp = false;
151
break;
152
@@ -XXX,XX +XXX,XX @@ static int disas_neon_data_insn(DisasContext *s, uint32_t insn)
153
TCGv_ptr fpst;
154
TCGv_i32 ahp;
155
156
- if (!arm_dc_feature(s, ARM_FEATURE_VFP_FP16) ||
157
+ if (!dc_isar_feature(aa32_fp16_spconv, s) ||
158
q || (rm & 1)) {
159
return 1;
160
}
161
@@ -XXX,XX +XXX,XX @@ static int disas_neon_data_insn(DisasContext *s, uint32_t insn)
162
{
163
TCGv_ptr fpst;
164
TCGv_i32 ahp;
165
- if (!arm_dc_feature(s, ARM_FEATURE_VFP_FP16) ||
166
+ if (!dc_isar_feature(aa32_fp16_spconv, s) ||
167
q || (rd & 1)) {
168
return 1;
169
}
170
--
171
2.20.1
172
173
diff view generated by jsdifflib
Deleted patch
1
There is a set of VFP instructions which we implement in
2
disas_vfp_v8_insn() and gate on the ARM_FEATURE_V8 bit.
3
These were all first introduced in v8 for A-profile, but in
4
M-profile they appeared in v7M. Gate them on the MVFR2
5
FPMisc field instead, and rename the function appropriately.
6
1
7
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20190222170936.13268-3-peter.maydell@linaro.org
10
---
11
target/arm/cpu.h | 20 ++++++++++++++++++++
12
target/arm/translate.c | 25 +++++++++++++------------
13
2 files changed, 33 insertions(+), 12 deletions(-)
14
15
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
16
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/cpu.h
18
+++ b/target/arm/cpu.h
19
@@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa32_fp16_dpconv(const ARMISARegisters *id)
20
return FIELD_EX64(id->mvfr1, MVFR1, FPHP) > 1;
21
}
22
23
+static inline bool isar_feature_aa32_vsel(const ARMISARegisters *id)
24
+{
25
+ return FIELD_EX64(id->mvfr2, MVFR2, FPMISC) >= 1;
26
+}
27
+
28
+static inline bool isar_feature_aa32_vcvt_dr(const ARMISARegisters *id)
29
+{
30
+ return FIELD_EX64(id->mvfr2, MVFR2, FPMISC) >= 2;
31
+}
32
+
33
+static inline bool isar_feature_aa32_vrint(const ARMISARegisters *id)
34
+{
35
+ return FIELD_EX64(id->mvfr2, MVFR2, FPMISC) >= 3;
36
+}
37
+
38
+static inline bool isar_feature_aa32_vminmaxnm(const ARMISARegisters *id)
39
+{
40
+ return FIELD_EX64(id->mvfr2, MVFR2, FPMISC) >= 4;
41
+}
42
+
43
/*
44
* 64-bit feature tests via id registers.
45
*/
46
diff --git a/target/arm/translate.c b/target/arm/translate.c
47
index XXXXXXX..XXXXXXX 100644
48
--- a/target/arm/translate.c
49
+++ b/target/arm/translate.c
50
@@ -XXX,XX +XXX,XX @@ static const uint8_t fp_decode_rm[] = {
51
FPROUNDING_NEGINF,
52
};
53
54
-static int disas_vfp_v8_insn(DisasContext *s, uint32_t insn)
55
+static int disas_vfp_misc_insn(DisasContext *s, uint32_t insn)
56
{
57
uint32_t rd, rn, rm, dp = extract32(insn, 8, 1);
58
59
- if (!arm_dc_feature(s, ARM_FEATURE_V8)) {
60
- return 1;
61
- }
62
-
63
if (dp) {
64
VFP_DREG_D(rd, insn);
65
VFP_DREG_N(rn, insn);
66
@@ -XXX,XX +XXX,XX @@ static int disas_vfp_v8_insn(DisasContext *s, uint32_t insn)
67
rm = VFP_SREG_M(insn);
68
}
69
70
- if ((insn & 0x0f800e50) == 0x0e000a00) {
71
+ if ((insn & 0x0f800e50) == 0x0e000a00 && dc_isar_feature(aa32_vsel, s)) {
72
return handle_vsel(insn, rd, rn, rm, dp);
73
- } else if ((insn & 0x0fb00e10) == 0x0e800a00) {
74
+ } else if ((insn & 0x0fb00e10) == 0x0e800a00 &&
75
+ dc_isar_feature(aa32_vminmaxnm, s)) {
76
return handle_vminmaxnm(insn, rd, rn, rm, dp);
77
- } else if ((insn & 0x0fbc0ed0) == 0x0eb80a40) {
78
+ } else if ((insn & 0x0fbc0ed0) == 0x0eb80a40 &&
79
+ dc_isar_feature(aa32_vrint, s)) {
80
/* VRINTA, VRINTN, VRINTP, VRINTM */
81
int rounding = fp_decode_rm[extract32(insn, 16, 2)];
82
return handle_vrint(insn, rd, rm, dp, rounding);
83
- } else if ((insn & 0x0fbc0e50) == 0x0ebc0a40) {
84
+ } else if ((insn & 0x0fbc0e50) == 0x0ebc0a40 &&
85
+ dc_isar_feature(aa32_vcvt_dr, s)) {
86
/* VCVTA, VCVTN, VCVTP, VCVTM */
87
int rounding = fp_decode_rm[extract32(insn, 16, 2)];
88
return handle_vcvt(insn, rd, rm, dp, rounding);
89
@@ -XXX,XX +XXX,XX @@ static int disas_vfp_insn(DisasContext *s, uint32_t insn)
90
}
91
92
if (extract32(insn, 28, 4) == 0xf) {
93
- /* Encodings with T=1 (Thumb) or unconditional (ARM):
94
- * only used in v8 and above.
95
+ /*
96
+ * Encodings with T=1 (Thumb) or unconditional (ARM):
97
+ * only used for the "miscellaneous VFP features" added in v8A
98
+ * and v7M (and gated on the MVFR2.FPMisc field).
99
*/
100
- return disas_vfp_v8_insn(s, insn);
101
+ return disas_vfp_misc_insn(s, insn);
102
}
103
104
dp = ((insn & 0xf00) == 0xb00);
105
--
106
2.20.1
107
108
diff view generated by jsdifflib
Deleted patch
1
This reverts commit 823e1b3818f9b10b824ddcd756983b6e2fa68730,
2
which introduces a regression running EDK2 guest firmware
3
under KVM:
4
1
5
error: kvm run failed Function not implemented
6
PC=000000013f5a6208 X00=00000000404003c4 X01=000000000000003a
7
X02=0000000000000000 X03=00000000404003c4 X04=0000000000000000
8
X05=0000000096000046 X06=000000013d2ef270 X07=000000013e3d1710
9
X08=09010755ffaf8ba8 X09=ffaf8b9cfeeb5468 X10=feeb546409010756
10
X11=09010757ffaf8b90 X12=feeb50680903068b X13=090306a1ffaf8bc0
11
X14=0000000000000000 X15=0000000000000000 X16=000000013f872da0
12
X17=00000000ffffa6ab X18=0000000000000000 X19=000000013f5a92d0
13
X20=000000013f5a7a78 X21=000000000000003a X22=000000013f5a7ab2
14
X23=000000013f5a92e8 X24=000000013f631090 X25=0000000000000010
15
X26=0000000000000100 X27=000000013f89501b X28=000000013e3d14e0
16
X29=000000013e3d12a0 X30=000000013f5a2518 SP=000000013b7be0b0
17
PSTATE=404003c4 -Z-- EL1t
18
19
with
20
[ 3507.926571] kvm [35042]: load/store instruction decoding not implemented
21
in the host dmesg.
22
23
Revert the change for the moment until we can investigate the
24
cause of the regression.
25
26
Reported-by: Eric Auger <eric.auger@redhat.com>
27
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
28
---
29
target/arm/cpu.h | 9 +--------
30
target/arm/helper.c | 27 ++-------------------------
31
target/arm/kvm32.c | 20 ++++++++++++++++++--
32
target/arm/kvm64.c | 2 --
33
target/arm/machine.c | 2 +-
34
5 files changed, 22 insertions(+), 38 deletions(-)
35
36
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
37
index XXXXXXX..XXXXXXX 100644
38
--- a/target/arm/cpu.h
39
+++ b/target/arm/cpu.h
40
@@ -XXX,XX +XXX,XX @@ bool write_list_to_cpustate(ARMCPU *cpu);
41
/**
42
* write_cpustate_to_list:
43
* @cpu: ARMCPU
44
- * @kvm_sync: true if this is for syncing back to KVM
45
*
46
* For each register listed in the ARMCPU cpreg_indexes list, write
47
* its value from the ARMCPUState structure into the cpreg_values list.
48
* This is used to copy info from TCG's working data structures into
49
* KVM or for outbound migration.
50
*
51
- * @kvm_sync is true if we are doing this in order to sync the
52
- * register state back to KVM. In this case we will only update
53
- * values in the list if the previous list->cpustate sync actually
54
- * successfully wrote the CPU state. Otherwise we will keep the value
55
- * that is in the list.
56
- *
57
* Returns: true if all register values were read correctly,
58
* false if some register was unknown or could not be read.
59
* Note that we do not stop early on failure -- we will attempt
60
* reading all registers in the list.
61
*/
62
-bool write_cpustate_to_list(ARMCPU *cpu, bool kvm_sync);
63
+bool write_cpustate_to_list(ARMCPU *cpu);
64
65
#define ARM_CPUID_TI915T 0x54029152
66
#define ARM_CPUID_TI925T 0x54029252
67
diff --git a/target/arm/helper.c b/target/arm/helper.c
68
index XXXXXXX..XXXXXXX 100644
69
--- a/target/arm/helper.c
70
+++ b/target/arm/helper.c
71
@@ -XXX,XX +XXX,XX @@ static bool raw_accessors_invalid(const ARMCPRegInfo *ri)
72
return true;
73
}
74
75
-bool write_cpustate_to_list(ARMCPU *cpu, bool kvm_sync)
76
+bool write_cpustate_to_list(ARMCPU *cpu)
77
{
78
/* Write the coprocessor state from cpu->env to the (index,value) list. */
79
int i;
80
@@ -XXX,XX +XXX,XX @@ bool write_cpustate_to_list(ARMCPU *cpu, bool kvm_sync)
81
for (i = 0; i < cpu->cpreg_array_len; i++) {
82
uint32_t regidx = kvm_to_cpreg_id(cpu->cpreg_indexes[i]);
83
const ARMCPRegInfo *ri;
84
- uint64_t newval;
85
86
ri = get_arm_cp_reginfo(cpu->cp_regs, regidx);
87
if (!ri) {
88
@@ -XXX,XX +XXX,XX @@ bool write_cpustate_to_list(ARMCPU *cpu, bool kvm_sync)
89
if (ri->type & ARM_CP_NO_RAW) {
90
continue;
91
}
92
-
93
- newval = read_raw_cp_reg(&cpu->env, ri);
94
- if (kvm_sync) {
95
- /*
96
- * Only sync if the previous list->cpustate sync succeeded.
97
- * Rather than tracking the success/failure state for every
98
- * item in the list, we just recheck "does the raw write we must
99
- * have made in write_list_to_cpustate() read back OK" here.
100
- */
101
- uint64_t oldval = cpu->cpreg_values[i];
102
-
103
- if (oldval == newval) {
104
- continue;
105
- }
106
-
107
- write_raw_cp_reg(&cpu->env, ri, oldval);
108
- if (read_raw_cp_reg(&cpu->env, ri) != oldval) {
109
- continue;
110
- }
111
-
112
- write_raw_cp_reg(&cpu->env, ri, newval);
113
- }
114
- cpu->cpreg_values[i] = newval;
115
+ cpu->cpreg_values[i] = read_raw_cp_reg(&cpu->env, ri);
116
}
117
return ok;
118
}
119
diff --git a/target/arm/kvm32.c b/target/arm/kvm32.c
120
index XXXXXXX..XXXXXXX 100644
121
--- a/target/arm/kvm32.c
122
+++ b/target/arm/kvm32.c
123
@@ -XXX,XX +XXX,XX @@ int kvm_arch_put_registers(CPUState *cs, int level)
124
return ret;
125
}
126
127
- write_cpustate_to_list(cpu, true);
128
-
129
+ /* Note that we do not call write_cpustate_to_list()
130
+ * here, so we are only writing the tuple list back to
131
+ * KVM. This is safe because nothing can change the
132
+ * CPUARMState cp15 fields (in particular gdb accesses cannot)
133
+ * and so there are no changes to sync. In fact syncing would
134
+ * be wrong at this point: for a constant register where TCG and
135
+ * KVM disagree about its value, the preceding write_list_to_cpustate()
136
+ * would not have had any effect on the CPUARMState value (since the
137
+ * register is read-only), and a write_cpustate_to_list() here would
138
+ * then try to write the TCG value back into KVM -- this would either
139
+ * fail or incorrectly change the value the guest sees.
140
+ *
141
+ * If we ever want to allow the user to modify cp15 registers via
142
+ * the gdb stub, we would need to be more clever here (for instance
143
+ * tracking the set of registers kvm_arch_get_registers() successfully
144
+ * managed to update the CPUARMState with, and only allowing those
145
+ * to be written back up into the kernel).
146
+ */
147
if (!write_list_to_kvmstate(cpu, level)) {
148
return EINVAL;
149
}
150
diff --git a/target/arm/kvm64.c b/target/arm/kvm64.c
151
index XXXXXXX..XXXXXXX 100644
152
--- a/target/arm/kvm64.c
153
+++ b/target/arm/kvm64.c
154
@@ -XXX,XX +XXX,XX @@ int kvm_arch_put_registers(CPUState *cs, int level)
155
return ret;
156
}
157
158
- write_cpustate_to_list(cpu, true);
159
-
160
if (!write_list_to_kvmstate(cpu, level)) {
161
return EINVAL;
162
}
163
diff --git a/target/arm/machine.c b/target/arm/machine.c
164
index XXXXXXX..XXXXXXX 100644
165
--- a/target/arm/machine.c
166
+++ b/target/arm/machine.c
167
@@ -XXX,XX +XXX,XX @@ static int cpu_pre_save(void *opaque)
168
abort();
169
}
170
} else {
171
- if (!write_cpustate_to_list(cpu, false)) {
172
+ if (!write_cpustate_to_list(cpu)) {
173
/* This should never fail. */
174
abort();
175
}
176
--
177
2.20.1
178
179
diff view generated by jsdifflib
Deleted patch
1
From: Richard Henderson <richard.henderson@linaro.org>
2
1
3
Note that float16_to_float32 rightly squashes SNaN to QNaN.
4
But of course pickNaNMulAdd, for ARM, selects SNaNs first.
5
So we have to preserve SNaN long enough for the correct NaN
6
to be selected. Thus float16_to_float32_by_bits.
7
8
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20190219222952.22183-2-richard.henderson@linaro.org
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
13
target/arm/helper.h | 9 +++
14
target/arm/vec_helper.c | 148 ++++++++++++++++++++++++++++++++++++++++
15
2 files changed, 157 insertions(+)
16
17
diff --git a/target/arm/helper.h b/target/arm/helper.h
18
index XXXXXXX..XXXXXXX 100644
19
--- a/target/arm/helper.h
20
+++ b/target/arm/helper.h
21
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_5(gvec_sqsub_s, TCG_CALL_NO_RWG,
22
DEF_HELPER_FLAGS_5(gvec_sqsub_d, TCG_CALL_NO_RWG,
23
void, ptr, ptr, ptr, ptr, i32)
24
25
+DEF_HELPER_FLAGS_5(gvec_fmlal_a32, TCG_CALL_NO_RWG,
26
+ void, ptr, ptr, ptr, ptr, i32)
27
+DEF_HELPER_FLAGS_5(gvec_fmlal_a64, TCG_CALL_NO_RWG,
28
+ void, ptr, ptr, ptr, ptr, i32)
29
+DEF_HELPER_FLAGS_5(gvec_fmlal_idx_a32, TCG_CALL_NO_RWG,
30
+ void, ptr, ptr, ptr, ptr, i32)
31
+DEF_HELPER_FLAGS_5(gvec_fmlal_idx_a64, TCG_CALL_NO_RWG,
32
+ void, ptr, ptr, ptr, ptr, i32)
33
+
34
#ifdef TARGET_AARCH64
35
#include "helper-a64.h"
36
#include "helper-sve.h"
37
diff --git a/target/arm/vec_helper.c b/target/arm/vec_helper.c
38
index XXXXXXX..XXXXXXX 100644
39
--- a/target/arm/vec_helper.c
40
+++ b/target/arm/vec_helper.c
41
@@ -XXX,XX +XXX,XX @@ void HELPER(gvec_sqsub_d)(void *vd, void *vq, void *vn,
42
}
43
clear_tail(d, oprsz, simd_maxsz(desc));
44
}
45
+
46
+/*
47
+ * Convert float16 to float32, raising no exceptions and
48
+ * preserving exceptional values, including SNaN.
49
+ * This is effectively an unpack+repack operation.
50
+ */
51
+static float32 float16_to_float32_by_bits(uint32_t f16, bool fz16)
52
+{
53
+ const int f16_bias = 15;
54
+ const int f32_bias = 127;
55
+ uint32_t sign = extract32(f16, 15, 1);
56
+ uint32_t exp = extract32(f16, 10, 5);
57
+ uint32_t frac = extract32(f16, 0, 10);
58
+
59
+ if (exp == 0x1f) {
60
+ /* Inf or NaN */
61
+ exp = 0xff;
62
+ } else if (exp == 0) {
63
+ /* Zero or denormal. */
64
+ if (frac != 0) {
65
+ if (fz16) {
66
+ frac = 0;
67
+ } else {
68
+ /*
69
+ * Denormal; these are all normal float32.
70
+ * Shift the fraction so that the msb is at bit 11,
71
+ * then remove bit 11 as the implicit bit of the
72
+ * normalized float32. Note that we still go through
73
+ * the shift for normal numbers below, to put the
74
+ * float32 fraction at the right place.
75
+ */
76
+ int shift = clz32(frac) - 21;
77
+ frac = (frac << shift) & 0x3ff;
78
+ exp = f32_bias - f16_bias - shift + 1;
79
+ }
80
+ }
81
+ } else {
82
+ /* Normal number; adjust the bias. */
83
+ exp += f32_bias - f16_bias;
84
+ }
85
+ sign <<= 31;
86
+ exp <<= 23;
87
+ frac <<= 23 - 10;
88
+
89
+ return sign | exp | frac;
90
+}
91
+
92
+static uint64_t load4_f16(uint64_t *ptr, int is_q, int is_2)
93
+{
94
+ /*
95
+ * Branchless load of u32[0], u64[0], u32[1], or u64[1].
96
+ * Load the 2nd qword iff is_q & is_2.
97
+ * Shift to the 2nd dword iff !is_q & is_2.
98
+ * For !is_q & !is_2, the upper bits of the result are garbage.
99
+ */
100
+ return ptr[is_q & is_2] >> ((is_2 & ~is_q) << 5);
101
+}
102
+
103
+/*
104
+ * Note that FMLAL requires oprsz == 8 or oprsz == 16,
105
+ * as there is not yet SVE versions that might use blocking.
106
+ */
107
+
108
+static void do_fmlal(float32 *d, void *vn, void *vm, float_status *fpst,
109
+ uint32_t desc, bool fz16)
110
+{
111
+ intptr_t i, oprsz = simd_oprsz(desc);
112
+ int is_s = extract32(desc, SIMD_DATA_SHIFT, 1);
113
+ int is_2 = extract32(desc, SIMD_DATA_SHIFT + 1, 1);
114
+ int is_q = oprsz == 16;
115
+ uint64_t n_4, m_4;
116
+
117
+ /* Pre-load all of the f16 data, avoiding overlap issues. */
118
+ n_4 = load4_f16(vn, is_q, is_2);
119
+ m_4 = load4_f16(vm, is_q, is_2);
120
+
121
+ /* Negate all inputs for FMLSL at once. */
122
+ if (is_s) {
123
+ n_4 ^= 0x8000800080008000ull;
124
+ }
125
+
126
+ for (i = 0; i < oprsz / 4; i++) {
127
+ float32 n_1 = float16_to_float32_by_bits(n_4 >> (i * 16), fz16);
128
+ float32 m_1 = float16_to_float32_by_bits(m_4 >> (i * 16), fz16);
129
+ d[H4(i)] = float32_muladd(n_1, m_1, d[H4(i)], 0, fpst);
130
+ }
131
+ clear_tail(d, oprsz, simd_maxsz(desc));
132
+}
133
+
134
+void HELPER(gvec_fmlal_a32)(void *vd, void *vn, void *vm,
135
+ void *venv, uint32_t desc)
136
+{
137
+ CPUARMState *env = venv;
138
+ do_fmlal(vd, vn, vm, &env->vfp.standard_fp_status, desc,
139
+ get_flush_inputs_to_zero(&env->vfp.fp_status_f16));
140
+}
141
+
142
+void HELPER(gvec_fmlal_a64)(void *vd, void *vn, void *vm,
143
+ void *venv, uint32_t desc)
144
+{
145
+ CPUARMState *env = venv;
146
+ do_fmlal(vd, vn, vm, &env->vfp.fp_status, desc,
147
+ get_flush_inputs_to_zero(&env->vfp.fp_status_f16));
148
+}
149
+
150
+static void do_fmlal_idx(float32 *d, void *vn, void *vm, float_status *fpst,
151
+ uint32_t desc, bool fz16)
152
+{
153
+ intptr_t i, oprsz = simd_oprsz(desc);
154
+ int is_s = extract32(desc, SIMD_DATA_SHIFT, 1);
155
+ int is_2 = extract32(desc, SIMD_DATA_SHIFT + 1, 1);
156
+ int index = extract32(desc, SIMD_DATA_SHIFT + 2, 3);
157
+ int is_q = oprsz == 16;
158
+ uint64_t n_4;
159
+ float32 m_1;
160
+
161
+ /* Pre-load all of the f16 data, avoiding overlap issues. */
162
+ n_4 = load4_f16(vn, is_q, is_2);
163
+
164
+ /* Negate all inputs for FMLSL at once. */
165
+ if (is_s) {
166
+ n_4 ^= 0x8000800080008000ull;
167
+ }
168
+
169
+ m_1 = float16_to_float32_by_bits(((float16 *)vm)[H2(index)], fz16);
170
+
171
+ for (i = 0; i < oprsz / 4; i++) {
172
+ float32 n_1 = float16_to_float32_by_bits(n_4 >> (i * 16), fz16);
173
+ d[H4(i)] = float32_muladd(n_1, m_1, d[H4(i)], 0, fpst);
174
+ }
175
+ clear_tail(d, oprsz, simd_maxsz(desc));
176
+}
177
+
178
+void HELPER(gvec_fmlal_idx_a32)(void *vd, void *vn, void *vm,
179
+ void *venv, uint32_t desc)
180
+{
181
+ CPUARMState *env = venv;
182
+ do_fmlal_idx(vd, vn, vm, &env->vfp.standard_fp_status, desc,
183
+ get_flush_inputs_to_zero(&env->vfp.fp_status_f16));
184
+}
185
+
186
+void HELPER(gvec_fmlal_idx_a64)(void *vd, void *vn, void *vm,
187
+ void *venv, uint32_t desc)
188
+{
189
+ CPUARMState *env = venv;
190
+ do_fmlal_idx(vd, vn, vm, &env->vfp.fp_status, desc,
191
+ get_flush_inputs_to_zero(&env->vfp.fp_status_f16));
192
+}
193
--
194
2.20.1
195
196
diff view generated by jsdifflib
Deleted patch
1
From: Richard Henderson <richard.henderson@linaro.org>
2
1
3
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
4
Message-id: 20190219222952.22183-3-richard.henderson@linaro.org
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
---
8
target/arm/cpu.h | 5 ++++
9
target/arm/translate-a64.c | 49 +++++++++++++++++++++++++++++++++++++-
10
2 files changed, 53 insertions(+), 1 deletion(-)
11
12
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
13
index XXXXXXX..XXXXXXX 100644
14
--- a/target/arm/cpu.h
15
+++ b/target/arm/cpu.h
16
@@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_dp(const ARMISARegisters *id)
17
return FIELD_EX64(id->id_aa64isar0, ID_AA64ISAR0, DP) != 0;
18
}
19
20
+static inline bool isar_feature_aa64_fhm(const ARMISARegisters *id)
21
+{
22
+ return FIELD_EX64(id->id_aa64isar0, ID_AA64ISAR0, FHM) != 0;
23
+}
24
+
25
static inline bool isar_feature_aa64_jscvt(const ARMISARegisters *id)
26
{
27
return FIELD_EX64(id->id_aa64isar1, ID_AA64ISAR1, JSCVT) != 0;
28
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
29
index XXXXXXX..XXXXXXX 100644
30
--- a/target/arm/translate-a64.c
31
+++ b/target/arm/translate-a64.c
32
@@ -XXX,XX +XXX,XX @@ static void disas_simd_3same_float(DisasContext *s, uint32_t insn)
33
if (!fp_access_check(s)) {
34
return;
35
}
36
-
37
handle_3same_float(s, size, elements, fpopcode, rd, rn, rm);
38
return;
39
+
40
+ case 0x1d: /* FMLAL */
41
+ case 0x3d: /* FMLSL */
42
+ case 0x59: /* FMLAL2 */
43
+ case 0x79: /* FMLSL2 */
44
+ if (size & 1 || !dc_isar_feature(aa64_fhm, s)) {
45
+ unallocated_encoding(s);
46
+ return;
47
+ }
48
+ if (fp_access_check(s)) {
49
+ int is_s = extract32(insn, 23, 1);
50
+ int is_2 = extract32(insn, 29, 1);
51
+ int data = (is_2 << 1) | is_s;
52
+ tcg_gen_gvec_3_ptr(vec_full_reg_offset(s, rd),
53
+ vec_full_reg_offset(s, rn),
54
+ vec_full_reg_offset(s, rm), cpu_env,
55
+ is_q ? 16 : 8, vec_full_reg_size(s),
56
+ data, gen_helper_gvec_fmlal_a64);
57
+ }
58
+ return;
59
+
60
default:
61
unallocated_encoding(s);
62
return;
63
@@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn)
64
}
65
is_fp = 2;
66
break;
67
+ case 0x00: /* FMLAL */
68
+ case 0x04: /* FMLSL */
69
+ case 0x18: /* FMLAL2 */
70
+ case 0x1c: /* FMLSL2 */
71
+ if (is_scalar || size != MO_32 || !dc_isar_feature(aa64_fhm, s)) {
72
+ unallocated_encoding(s);
73
+ return;
74
+ }
75
+ size = MO_16;
76
+ /* is_fp, but we pass cpu_env not fp_status. */
77
+ break;
78
default:
79
unallocated_encoding(s);
80
return;
81
@@ -XXX,XX +XXX,XX @@ static void disas_simd_indexed(DisasContext *s, uint32_t insn)
82
tcg_temp_free_ptr(fpst);
83
}
84
return;
85
+
86
+ case 0x00: /* FMLAL */
87
+ case 0x04: /* FMLSL */
88
+ case 0x18: /* FMLAL2 */
89
+ case 0x1c: /* FMLSL2 */
90
+ {
91
+ int is_s = extract32(opcode, 2, 1);
92
+ int is_2 = u;
93
+ int data = (index << 2) | (is_2 << 1) | is_s;
94
+ tcg_gen_gvec_3_ptr(vec_full_reg_offset(s, rd),
95
+ vec_full_reg_offset(s, rn),
96
+ vec_full_reg_offset(s, rm), cpu_env,
97
+ is_q ? 16 : 8, vec_full_reg_size(s),
98
+ data, gen_helper_gvec_fmlal_idx_a64);
99
+ }
100
+ return;
101
}
102
103
if (size == 3) {
104
--
105
2.20.1
106
107
diff view generated by jsdifflib
Deleted patch
1
From: Richard Henderson <richard.henderson@linaro.org>
2
1
3
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
4
Message-id: 20190219222952.22183-4-richard.henderson@linaro.org
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
---
8
target/arm/cpu.h | 5 ++
9
target/arm/translate.c | 129 ++++++++++++++++++++++++++++++-----------
10
2 files changed, 101 insertions(+), 33 deletions(-)
11
12
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
13
index XXXXXXX..XXXXXXX 100644
14
--- a/target/arm/cpu.h
15
+++ b/target/arm/cpu.h
16
@@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa32_dp(const ARMISARegisters *id)
17
return FIELD_EX32(id->id_isar6, ID_ISAR6, DP) != 0;
18
}
19
20
+static inline bool isar_feature_aa32_fhm(const ARMISARegisters *id)
21
+{
22
+ return FIELD_EX32(id->id_isar6, ID_ISAR6, FHM) != 0;
23
+}
24
+
25
static inline bool isar_feature_aa32_fp16_arith(const ARMISARegisters *id)
26
{
27
/*
28
diff --git a/target/arm/translate.c b/target/arm/translate.c
29
index XXXXXXX..XXXXXXX 100644
30
--- a/target/arm/translate.c
31
+++ b/target/arm/translate.c
32
@@ -XXX,XX +XXX,XX @@ static int disas_neon_insn_3same_ext(DisasContext *s, uint32_t insn)
33
gen_helper_gvec_3_ptr *fn_gvec_ptr = NULL;
34
int rd, rn, rm, opr_sz;
35
int data = 0;
36
- bool q;
37
-
38
- q = extract32(insn, 6, 1);
39
- VFP_DREG_D(rd, insn);
40
- VFP_DREG_N(rn, insn);
41
- VFP_DREG_M(rm, insn);
42
- if ((rd | rn | rm) & q) {
43
- return 1;
44
- }
45
+ int off_rn, off_rm;
46
+ bool is_long = false, q = extract32(insn, 6, 1);
47
+ bool ptr_is_env = false;
48
49
if ((insn & 0xfe200f10) == 0xfc200800) {
50
/* VCMLA -- 1111 110R R.1S .... .... 1000 ...0 .... */
51
@@ -XXX,XX +XXX,XX @@ static int disas_neon_insn_3same_ext(DisasContext *s, uint32_t insn)
52
return 1;
53
}
54
fn_gvec = u ? gen_helper_gvec_udot_b : gen_helper_gvec_sdot_b;
55
+ } else if ((insn & 0xff300f10) == 0xfc200810) {
56
+ /* VFM[AS]L -- 1111 1100 S.10 .... .... 1000 .Q.1 .... */
57
+ int is_s = extract32(insn, 23, 1);
58
+ if (!dc_isar_feature(aa32_fhm, s)) {
59
+ return 1;
60
+ }
61
+ is_long = true;
62
+ data = is_s; /* is_2 == 0 */
63
+ fn_gvec_ptr = gen_helper_gvec_fmlal_a32;
64
+ ptr_is_env = true;
65
} else {
66
return 1;
67
}
68
69
+ VFP_DREG_D(rd, insn);
70
+ if (rd & q) {
71
+ return 1;
72
+ }
73
+ if (q || !is_long) {
74
+ VFP_DREG_N(rn, insn);
75
+ VFP_DREG_M(rm, insn);
76
+ if ((rn | rm) & q & !is_long) {
77
+ return 1;
78
+ }
79
+ off_rn = vfp_reg_offset(1, rn);
80
+ off_rm = vfp_reg_offset(1, rm);
81
+ } else {
82
+ rn = VFP_SREG_N(insn);
83
+ rm = VFP_SREG_M(insn);
84
+ off_rn = vfp_reg_offset(0, rn);
85
+ off_rm = vfp_reg_offset(0, rm);
86
+ }
87
+
88
if (s->fp_excp_el) {
89
gen_exception_insn(s, 4, EXCP_UDEF,
90
syn_simd_access_trap(1, 0xe, false), s->fp_excp_el);
91
@@ -XXX,XX +XXX,XX @@ static int disas_neon_insn_3same_ext(DisasContext *s, uint32_t insn)
92
93
opr_sz = (1 + q) * 8;
94
if (fn_gvec_ptr) {
95
- TCGv_ptr fpst = get_fpstatus_ptr(1);
96
- tcg_gen_gvec_3_ptr(vfp_reg_offset(1, rd),
97
- vfp_reg_offset(1, rn),
98
- vfp_reg_offset(1, rm), fpst,
99
+ TCGv_ptr ptr;
100
+ if (ptr_is_env) {
101
+ ptr = cpu_env;
102
+ } else {
103
+ ptr = get_fpstatus_ptr(1);
104
+ }
105
+ tcg_gen_gvec_3_ptr(vfp_reg_offset(1, rd), off_rn, off_rm, ptr,
106
opr_sz, opr_sz, data, fn_gvec_ptr);
107
- tcg_temp_free_ptr(fpst);
108
+ if (!ptr_is_env) {
109
+ tcg_temp_free_ptr(ptr);
110
+ }
111
} else {
112
- tcg_gen_gvec_3_ool(vfp_reg_offset(1, rd),
113
- vfp_reg_offset(1, rn),
114
- vfp_reg_offset(1, rm),
115
+ tcg_gen_gvec_3_ool(vfp_reg_offset(1, rd), off_rn, off_rm,
116
opr_sz, opr_sz, data, fn_gvec);
117
}
118
return 0;
119
@@ -XXX,XX +XXX,XX @@ static int disas_neon_insn_2reg_scalar_ext(DisasContext *s, uint32_t insn)
120
gen_helper_gvec_3 *fn_gvec = NULL;
121
gen_helper_gvec_3_ptr *fn_gvec_ptr = NULL;
122
int rd, rn, rm, opr_sz, data;
123
- bool q;
124
-
125
- q = extract32(insn, 6, 1);
126
- VFP_DREG_D(rd, insn);
127
- VFP_DREG_N(rn, insn);
128
- if ((rd | rn) & q) {
129
- return 1;
130
- }
131
+ int off_rn, off_rm;
132
+ bool is_long = false, q = extract32(insn, 6, 1);
133
+ bool ptr_is_env = false;
134
135
if ((insn & 0xff000f10) == 0xfe000800) {
136
/* VCMLA (indexed) -- 1111 1110 S.RR .... .... 1000 ...0 .... */
137
@@ -XXX,XX +XXX,XX @@ static int disas_neon_insn_2reg_scalar_ext(DisasContext *s, uint32_t insn)
138
} else if ((insn & 0xffb00f00) == 0xfe200d00) {
139
/* V[US]DOT -- 1111 1110 0.10 .... .... 1101 .Q.U .... */
140
int u = extract32(insn, 4, 1);
141
+
142
if (!dc_isar_feature(aa32_dp, s)) {
143
return 1;
144
}
145
@@ -XXX,XX +XXX,XX @@ static int disas_neon_insn_2reg_scalar_ext(DisasContext *s, uint32_t insn)
146
/* rm is just Vm, and index is M. */
147
data = extract32(insn, 5, 1); /* index */
148
rm = extract32(insn, 0, 4);
149
+ } else if ((insn & 0xffa00f10) == 0xfe000810) {
150
+ /* VFM[AS]L -- 1111 1110 0.0S .... .... 1000 .Q.1 .... */
151
+ int is_s = extract32(insn, 20, 1);
152
+ int vm20 = extract32(insn, 0, 3);
153
+ int vm3 = extract32(insn, 3, 1);
154
+ int m = extract32(insn, 5, 1);
155
+ int index;
156
+
157
+ if (!dc_isar_feature(aa32_fhm, s)) {
158
+ return 1;
159
+ }
160
+ if (q) {
161
+ rm = vm20;
162
+ index = m * 2 + vm3;
163
+ } else {
164
+ rm = vm20 * 2 + m;
165
+ index = vm3;
166
+ }
167
+ is_long = true;
168
+ data = (index << 2) | is_s; /* is_2 == 0 */
169
+ fn_gvec_ptr = gen_helper_gvec_fmlal_idx_a32;
170
+ ptr_is_env = true;
171
} else {
172
return 1;
173
}
174
175
+ VFP_DREG_D(rd, insn);
176
+ if (rd & q) {
177
+ return 1;
178
+ }
179
+ if (q || !is_long) {
180
+ VFP_DREG_N(rn, insn);
181
+ if (rn & q & !is_long) {
182
+ return 1;
183
+ }
184
+ off_rn = vfp_reg_offset(1, rn);
185
+ off_rm = vfp_reg_offset(1, rm);
186
+ } else {
187
+ rn = VFP_SREG_N(insn);
188
+ off_rn = vfp_reg_offset(0, rn);
189
+ off_rm = vfp_reg_offset(0, rm);
190
+ }
191
if (s->fp_excp_el) {
192
gen_exception_insn(s, 4, EXCP_UDEF,
193
syn_simd_access_trap(1, 0xe, false), s->fp_excp_el);
194
@@ -XXX,XX +XXX,XX @@ static int disas_neon_insn_2reg_scalar_ext(DisasContext *s, uint32_t insn)
195
196
opr_sz = (1 + q) * 8;
197
if (fn_gvec_ptr) {
198
- TCGv_ptr fpst = get_fpstatus_ptr(1);
199
- tcg_gen_gvec_3_ptr(vfp_reg_offset(1, rd),
200
- vfp_reg_offset(1, rn),
201
- vfp_reg_offset(1, rm), fpst,
202
+ TCGv_ptr ptr;
203
+ if (ptr_is_env) {
204
+ ptr = cpu_env;
205
+ } else {
206
+ ptr = get_fpstatus_ptr(1);
207
+ }
208
+ tcg_gen_gvec_3_ptr(vfp_reg_offset(1, rd), off_rn, off_rm, ptr,
209
opr_sz, opr_sz, data, fn_gvec_ptr);
210
- tcg_temp_free_ptr(fpst);
211
+ if (!ptr_is_env) {
212
+ tcg_temp_free_ptr(ptr);
213
+ }
214
} else {
215
- tcg_gen_gvec_3_ool(vfp_reg_offset(1, rd),
216
- vfp_reg_offset(1, rn),
217
- vfp_reg_offset(1, rm),
218
+ tcg_gen_gvec_3_ool(vfp_reg_offset(1, rd), off_rn, off_rm,
219
opr_sz, opr_sz, data, fn_gvec);
220
}
221
return 0;
222
--
223
2.20.1
224
225
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
In commit e6b2b20d9735d4ef we made the boot loader code try to avoid
2
putting the initrd on top of the kernel. However the expression used
3
to calculate the start of the initrd:
2
4
3
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
5
info->initrd_start = info->loader_start +
4
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
6
MAX(MIN(info->ram_size / 2, 128 * 1024 * 1024), kernel_size);
5
Message-id: 20190219222952.22183-5-richard.henderson@linaro.org
7
8
incorrectly uses 'kernel_size' as the offset within RAM of the
9
highest address to avoid. This is incorrect because the kernel
10
doesn't start at address 0, but slightly higher than that. This
11
means that we can still incorrectly end up overlaying the initrd on
12
the kernel in some cases, for example:
13
14
* The kernel's image_size is 0x0a7a8000
15
* The kernel was loaded at 0x40080000
16
* The end of the kernel is 0x4A828000
17
* The DTB was loaded at 0x4a800000
18
19
To get this right we need to track the actual highest address used
20
by the kernel and use that rather than kernel_size. We already
21
set image_low_addr and image_high_addr for ELF images; set them
22
also for the various other image types we support, and then use
23
image_high_addr as the lowest allowed address for the initrd.
24
(We don't use image_low_addr, but we set it for consistency
25
with the existing code path for ELF files.)
26
27
Fixes: e6b2b20d9735d4ef
28
Reported-by: Mark Rutland <mark.rutland@arm.com>
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
29
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
30
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
31
Tested-by: Mark Rutland <mark.rutland@arm.com>
32
Message-id: 20190722151804.25467-3-peter.maydell@linaro.org
7
---
33
---
8
target/arm/cpu.c | 1 +
34
hw/arm/boot.c | 19 +++++++++++++++++--
9
target/arm/cpu64.c | 2 ++
35
1 file changed, 17 insertions(+), 2 deletions(-)
10
2 files changed, 3 insertions(+)
11
36
12
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
37
diff --git a/hw/arm/boot.c b/hw/arm/boot.c
13
index XXXXXXX..XXXXXXX 100644
38
index XXXXXXX..XXXXXXX 100644
14
--- a/target/arm/cpu.c
39
--- a/hw/arm/boot.c
15
+++ b/target/arm/cpu.c
40
+++ b/hw/arm/boot.c
16
@@ -XXX,XX +XXX,XX @@ static void arm_max_initfn(Object *obj)
41
@@ -XXX,XX +XXX,XX @@ static void arm_setup_direct_kernel_boot(ARMCPU *cpu,
17
t = cpu->isar.id_isar6;
42
int is_linux = 0;
18
t = FIELD_DP32(t, ID_ISAR6, JSCVT, 1);
43
uint64_t elf_entry;
19
t = FIELD_DP32(t, ID_ISAR6, DP, 1);
44
/* Addresses of first byte used and first byte not used by the image */
20
+ t = FIELD_DP32(t, ID_ISAR6, FHM, 1);
45
- uint64_t image_low_addr, image_high_addr;
21
cpu->isar.id_isar6 = t;
46
+ uint64_t image_low_addr = 0, image_high_addr = 0;
22
47
int elf_machine;
23
t = cpu->id_mmfr4;
48
hwaddr entry;
24
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
49
static const ARMInsnFixup *primary_loader;
25
index XXXXXXX..XXXXXXX 100644
50
@@ -XXX,XX +XXX,XX @@ static void arm_setup_direct_kernel_boot(ARMCPU *cpu,
26
--- a/target/arm/cpu64.c
51
uint64_t loadaddr = info->loader_start + KERNEL_NOLOAD_ADDR;
27
+++ b/target/arm/cpu64.c
52
kernel_size = load_uimage_as(info->kernel_filename, &entry, &loadaddr,
28
@@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj)
53
&is_linux, NULL, NULL, as);
29
t = FIELD_DP64(t, ID_AA64ISAR0, SM3, 1);
54
+ if (kernel_size >= 0) {
30
t = FIELD_DP64(t, ID_AA64ISAR0, SM4, 1);
55
+ image_low_addr = loadaddr;
31
t = FIELD_DP64(t, ID_AA64ISAR0, DP, 1);
56
+ image_high_addr = image_low_addr + kernel_size;
32
+ t = FIELD_DP64(t, ID_AA64ISAR0, FHM, 1);
57
+ }
33
cpu->isar.id_aa64isar0 = t;
58
}
34
59
if (arm_feature(&cpu->env, ARM_FEATURE_AARCH64) && kernel_size < 0) {
35
t = cpu->isar.id_aa64isar1;
60
kernel_size = load_aarch64_image(info->kernel_filename,
36
@@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj)
61
info->loader_start, &entry, as);
37
u = cpu->isar.id_isar6;
62
is_linux = 1;
38
u = FIELD_DP32(u, ID_ISAR6, JSCVT, 1);
63
+ if (kernel_size >= 0) {
39
u = FIELD_DP32(u, ID_ISAR6, DP, 1);
64
+ image_low_addr = entry;
40
+ u = FIELD_DP32(u, ID_ISAR6, FHM, 1);
65
+ image_high_addr = image_low_addr + kernel_size;
41
cpu->isar.id_isar6 = u;
66
+ }
42
67
} else if (kernel_size < 0) {
43
/*
68
/* 32-bit ARM */
69
entry = info->loader_start + KERNEL_LOAD_ADDR;
70
kernel_size = load_image_targphys_as(info->kernel_filename, entry,
71
ram_end - KERNEL_LOAD_ADDR, as);
72
is_linux = 1;
73
+ if (kernel_size >= 0) {
74
+ image_low_addr = entry;
75
+ image_high_addr = image_low_addr + kernel_size;
76
+ }
77
}
78
if (kernel_size < 0) {
79
error_report("could not load kernel '%s'", info->kernel_filename);
80
@@ -XXX,XX +XXX,XX @@ static void arm_setup_direct_kernel_boot(ARMCPU *cpu,
81
* we might still make a bad choice here.
82
*/
83
info->initrd_start = info->loader_start +
84
- MAX(MIN(info->ram_size / 2, 128 * 1024 * 1024), kernel_size);
85
+ MIN(info->ram_size / 2, 128 * 1024 * 1024);
86
+ if (image_high_addr) {
87
+ info->initrd_start = MAX(info->initrd_start, image_high_addr);
88
+ }
89
info->initrd_start = TARGET_PAGE_ALIGN(info->initrd_start);
90
91
if (is_linux) {
44
--
92
--
45
2.20.1
93
2.20.1
46
94
47
95
diff view generated by jsdifflib