1 | First pullreq for arm of the 4.1 series, since I'm back from | 1 | arm queue: big stuff here is my MVE codegen optimisation, |
---|---|---|---|
2 | holiday now. This is mostly my M-profile FPU series and Philippe's | 2 | and Alex's Apple Silicon hvf support. |
3 | devices.h cleanup. I have a pile of other patchsets to work through | ||
4 | in my to-review folder, but 42 patches is definitely quite | ||
5 | big enough to send now... | ||
6 | 3 | ||
7 | thanks | ||
8 | -- PMM | 4 | -- PMM |
9 | 5 | ||
10 | The following changes since commit 413a99a92c13ec408dcf2adaa87918dc81e890c8: | 6 | The following changes since commit 7adb961995a3744f51396502b33ad04a56a317c3: |
11 | 7 | ||
12 | Add Nios II semihosting support. (2019-04-29 16:09:51 +0100) | 8 | Merge remote-tracking branch 'remotes/dgilbert-gitlab/tags/pull-virtiofs-20210916' into staging (2021-09-19 18:53:29 +0100) |
13 | 9 | ||
14 | are available in the Git repository at: | 10 | are available in the Git repository at: |
15 | 11 | ||
16 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20190429 | 12 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20210920 |
17 | 13 | ||
18 | for you to fetch changes up to 437cc27ddfded3bbab6afd5ac1761e0e195edba7: | 14 | for you to fetch changes up to 1dc5a60bfe406bc1122d68cbdefda38d23134b27: |
19 | 15 | ||
20 | hw/devices: Move SMSC 91C111 declaration into a new header (2019-04-29 17:57:21 +0100) | 16 | target/arm: Optimize MVE 1op-immediate insns (2021-09-20 14:18:01 +0100) |
21 | 17 | ||
22 | ---------------------------------------------------------------- | 18 | ---------------------------------------------------------------- |
23 | target-arm queue: | 19 | target-arm queue: |
24 | * remove "bag of random stuff" hw/devices.h header | 20 | * Optimize codegen for MVE when predication not active |
25 | * implement FPU for Cortex-M and enable it for Cortex-M4 and -M33 | 21 | * hvf: Add Apple Silicon support |
26 | * hw/dma: Compile the bcm2835_dma device as common object | 22 | * hw/intc: Set GIC maintenance interrupt level to only 0 or 1 |
27 | * configure: Remove --source-path option | 23 | * Fix mishandling of MVE FPSCR.LTPSIZE reset for usermode emulator |
28 | * hw/ssi/xilinx_spips: Avoid variable length array | 24 | * elf2dmp: Fix coverity nits |
29 | * hw/arm/smmuv3: Remove SMMUNotifierNode | ||
30 | 25 | ||
31 | ---------------------------------------------------------------- | 26 | ---------------------------------------------------------------- |
32 | Eric Auger (1): | 27 | Alexander Graf (7): |
33 | hw/arm/smmuv3: Remove SMMUNotifierNode | 28 | arm: Move PMC register definitions to internals.h |
29 | hvf: Add execute to dirty log permission bitmap | ||
30 | hvf: Introduce hvf_arch_init() callback | ||
31 | hvf: Add Apple Silicon support | ||
32 | hvf: arm: Implement PSCI handling | ||
33 | arm: Add Hypervisor.framework build target | ||
34 | hvf: arm: Add rudimentary PMC support | ||
34 | 35 | ||
35 | Peter Maydell (28): | 36 | Peter Collingbourne (1): |
36 | hw/ssi/xilinx_spips: Avoid variable length array | 37 | arm/hvf: Add a WFI handler |
37 | configure: Remove --source-path option | ||
38 | target/arm: Make sure M-profile FPSCR RES0 bits are not settable | ||
39 | hw/intc/armv7m_nvic: Allow reading of M-profile MVFR* registers | ||
40 | target/arm: Implement dummy versions of M-profile FP-related registers | ||
41 | target/arm: Disable most VFP sysregs for M-profile | ||
42 | target/arm: Honour M-profile FP enable bits | ||
43 | target/arm: Decode FP instructions for M profile | ||
44 | target/arm: Clear CONTROL_S.SFPA in SG insn if FPU present | ||
45 | target/arm: Handle SFPA and FPCA bits in reads and writes of CONTROL | ||
46 | target/arm/helper: don't return early for STKOF faults during stacking | ||
47 | target/arm: Handle floating point registers in exception entry | ||
48 | target/arm: Implement v7m_update_fpccr() | ||
49 | target/arm: Clear CONTROL.SFPA in BXNS and BLXNS | ||
50 | target/arm: Clean excReturn bits when tail chaining | ||
51 | target/arm: Allow for floating point in callee stack integrity check | ||
52 | target/arm: Handle floating point registers in exception return | ||
53 | target/arm: Move NS TBFLAG from bit 19 to bit 6 | ||
54 | target/arm: Overlap VECSTRIDE and XSCALE_CPAR TB flags | ||
55 | target/arm: Set FPCCR.S when executing M-profile floating point insns | ||
56 | target/arm: Activate M-profile floating point context when FPCCR.ASPEN is set | ||
57 | target/arm: New helper function arm_v7m_mmu_idx_all() | ||
58 | target/arm: New function armv7m_nvic_set_pending_lazyfp() | ||
59 | target/arm: Add lazy-FP-stacking support to v7m_stack_write() | ||
60 | target/arm: Implement M-profile lazy FP state preservation | ||
61 | target/arm: Implement VLSTM for v7M CPUs with an FPU | ||
62 | target/arm: Implement VLLDM for v7M CPUs with an FPU | ||
63 | target/arm: Enable FPU for Cortex-M4 and Cortex-M33 | ||
64 | 38 | ||
65 | Philippe Mathieu-Daudé (13): | 39 | Peter Maydell (18): |
66 | hw/dma: Compile the bcm2835_dma device as common object | 40 | elf2dmp: Check curl_easy_setopt() return value |
67 | hw/arm/aspeed: Use TYPE_TMP105/TYPE_PCA9552 instead of hardcoded string | 41 | elf2dmp: Fail cleanly if PDB file specifies zero block_size |
68 | hw/arm/nseries: Use TYPE_TMP105 instead of hardcoded string | 42 | target/arm: Don't skip M-profile reset entirely in user mode |
69 | hw/display/tc6393xb: Remove unused functions | 43 | target/arm: Always clear exclusive monitor on reset |
70 | hw/devices: Move TC6393XB declarations into a new header | 44 | target/arm: Consolidate ifdef blocks in reset |
71 | hw/devices: Move Blizzard declarations into a new header | 45 | hvf: arm: Implement -cpu host |
72 | hw/devices: Move CBus declarations into a new header | 46 | target/arm: Avoid goto_tb if we're trying to exit to the main loop |
73 | hw/devices: Move Gamepad declarations into a new header | 47 | target/arm: Enforce that FPDSCR.LTPSIZE is 4 on inbound migration |
74 | hw/devices: Move TI touchscreen declarations into a new header | 48 | target/arm: Add TB flag for "MVE insns not predicated" |
75 | hw/devices: Move LAN9118 declarations into a new header | 49 | target/arm: Optimize MVE logic ops |
76 | hw/net/ne2000-isa: Add guards to the header | 50 | target/arm: Optimize MVE arithmetic ops |
77 | hw/net/lan9118: Export TYPE_LAN9118 and use it instead of hardcoded string | 51 | target/arm: Optimize MVE VNEG, VABS |
78 | hw/devices: Move SMSC 91C111 declaration into a new header | 52 | target/arm: Optimize MVE VDUP |
53 | target/arm: Optimize MVE VMVN | ||
54 | target/arm: Optimize MVE VSHL, VSHR immediate forms | ||
55 | target/arm: Optimize MVE VSHLL and VMOVL | ||
56 | target/arm: Optimize MVE VSLI and VSRI | ||
57 | target/arm: Optimize MVE 1op-immediate insns | ||
79 | 58 | ||
80 | configure | 10 +- | 59 | Shashi Mallela (1): |
81 | hw/dma/Makefile.objs | 2 +- | 60 | hw/intc: Set GIC maintenance interrupt level to only 0 or 1 |
82 | include/hw/arm/omap.h | 6 +- | ||
83 | include/hw/arm/smmu-common.h | 8 +- | ||
84 | include/hw/devices.h | 62 --- | ||
85 | include/hw/display/blizzard.h | 22 ++ | ||
86 | include/hw/display/tc6393xb.h | 24 ++ | ||
87 | include/hw/input/gamepad.h | 19 + | ||
88 | include/hw/input/tsc2xxx.h | 36 ++ | ||
89 | include/hw/misc/cbus.h | 32 ++ | ||
90 | include/hw/net/lan9118.h | 21 + | ||
91 | include/hw/net/ne2000-isa.h | 6 + | ||
92 | include/hw/net/smc91c111.h | 19 + | ||
93 | include/qemu/typedefs.h | 1 - | ||
94 | target/arm/cpu.h | 95 ++++- | ||
95 | target/arm/helper.h | 5 + | ||
96 | target/arm/translate.h | 3 + | ||
97 | hw/arm/aspeed.c | 13 +- | ||
98 | hw/arm/exynos4_boards.c | 3 +- | ||
99 | hw/arm/gumstix.c | 2 +- | ||
100 | hw/arm/integratorcp.c | 2 +- | ||
101 | hw/arm/kzm.c | 2 +- | ||
102 | hw/arm/mainstone.c | 2 +- | ||
103 | hw/arm/mps2-tz.c | 3 +- | ||
104 | hw/arm/mps2.c | 2 +- | ||
105 | hw/arm/nseries.c | 7 +- | ||
106 | hw/arm/palm.c | 2 +- | ||
107 | hw/arm/realview.c | 3 +- | ||
108 | hw/arm/smmu-common.c | 6 +- | ||
109 | hw/arm/smmuv3.c | 28 +- | ||
110 | hw/arm/stellaris.c | 2 +- | ||
111 | hw/arm/tosa.c | 2 +- | ||
112 | hw/arm/versatilepb.c | 2 +- | ||
113 | hw/arm/vexpress.c | 2 +- | ||
114 | hw/display/blizzard.c | 2 +- | ||
115 | hw/display/tc6393xb.c | 18 +- | ||
116 | hw/input/stellaris_input.c | 2 +- | ||
117 | hw/input/tsc2005.c | 2 +- | ||
118 | hw/input/tsc210x.c | 4 +- | ||
119 | hw/intc/armv7m_nvic.c | 261 +++++++++++++ | ||
120 | hw/misc/cbus.c | 2 +- | ||
121 | hw/net/lan9118.c | 3 +- | ||
122 | hw/net/smc91c111.c | 2 +- | ||
123 | hw/ssi/xilinx_spips.c | 6 +- | ||
124 | target/arm/cpu.c | 20 + | ||
125 | target/arm/helper.c | 873 +++++++++++++++++++++++++++++++++++++++--- | ||
126 | target/arm/machine.c | 16 + | ||
127 | target/arm/translate.c | 150 +++++++- | ||
128 | target/arm/vfp_helper.c | 8 + | ||
129 | MAINTAINERS | 7 + | ||
130 | 50 files changed, 1595 insertions(+), 235 deletions(-) | ||
131 | delete mode 100644 include/hw/devices.h | ||
132 | create mode 100644 include/hw/display/blizzard.h | ||
133 | create mode 100644 include/hw/display/tc6393xb.h | ||
134 | create mode 100644 include/hw/input/gamepad.h | ||
135 | create mode 100644 include/hw/input/tsc2xxx.h | ||
136 | create mode 100644 include/hw/misc/cbus.h | ||
137 | create mode 100644 include/hw/net/lan9118.h | ||
138 | create mode 100644 include/hw/net/smc91c111.h | ||
139 | 61 | ||
62 | meson.build | 8 + | ||
63 | include/sysemu/hvf_int.h | 12 +- | ||
64 | target/arm/cpu.h | 6 +- | ||
65 | target/arm/hvf_arm.h | 18 + | ||
66 | target/arm/internals.h | 44 ++ | ||
67 | target/arm/kvm_arm.h | 2 - | ||
68 | target/arm/translate.h | 2 + | ||
69 | accel/hvf/hvf-accel-ops.c | 21 +- | ||
70 | contrib/elf2dmp/download.c | 22 +- | ||
71 | contrib/elf2dmp/pdb.c | 4 + | ||
72 | hw/intc/arm_gicv3_cpuif.c | 5 +- | ||
73 | target/arm/cpu.c | 56 +- | ||
74 | target/arm/helper.c | 77 ++- | ||
75 | target/arm/hvf/hvf.c | 1278 +++++++++++++++++++++++++++++++++++++++++ | ||
76 | target/arm/machine.c | 13 + | ||
77 | target/arm/translate-m-nocp.c | 8 +- | ||
78 | target/arm/translate-mve.c | 310 +++++++--- | ||
79 | target/arm/translate-vfp.c | 33 +- | ||
80 | target/arm/translate.c | 42 +- | ||
81 | target/i386/hvf/hvf.c | 10 + | ||
82 | MAINTAINERS | 5 + | ||
83 | target/arm/hvf/meson.build | 3 + | ||
84 | target/arm/hvf/trace-events | 11 + | ||
85 | target/arm/meson.build | 2 + | ||
86 | 24 files changed, 1824 insertions(+), 168 deletions(-) | ||
87 | create mode 100644 target/arm/hvf_arm.h | ||
88 | create mode 100644 target/arm/hvf/hvf.c | ||
89 | create mode 100644 target/arm/hvf/meson.build | ||
90 | create mode 100644 target/arm/hvf/trace-events | ||
91 | diff view generated by jsdifflib |
1 | The M-profile FPCCR.ASPEN bit indicates that automatic floating-point | 1 | Coverity points out that we aren't checking the return value |
---|---|---|---|
2 | context preservation is enabled. Before executing any floating-point | 2 | from curl_easy_setopt(). |
3 | instruction, if FPCCR.ASPEN is set and the CONTROL FPCA/SFPA bits | ||
4 | indicate that there is no active floating point context then we | ||
5 | must create a new context (by initializing FPSCR and setting | ||
6 | FPCA/SFPA to indicate that the context is now active). In the | ||
7 | pseudocode this is handled by ExecuteFPCheck(). | ||
8 | 3 | ||
9 | Implement this with a new TB flag which tracks whether we | 4 | Fixes: Coverity CID 1458895 |
10 | need to create a new FP context. | 5 | Inspired-by: Peter Maydell <peter.maydell@linaro.org> |
6 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
7 | Reviewed-by: Viktor Prutyanov <viktor.prutyanov@phystech.edu> | ||
8 | Tested-by: Viktor Prutyanov <viktor.prutyanov@phystech.edu> | ||
9 | Message-id: 20210910170656.366592-2-philmd@redhat.com | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | --- | ||
12 | contrib/elf2dmp/download.c | 22 ++++++++++------------ | ||
13 | 1 file changed, 10 insertions(+), 12 deletions(-) | ||
11 | 14 | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 15 | diff --git a/contrib/elf2dmp/download.c b/contrib/elf2dmp/download.c |
13 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
14 | Message-id: 20190416125744.27770-20-peter.maydell@linaro.org | ||
15 | --- | ||
16 | target/arm/cpu.h | 2 ++ | ||
17 | target/arm/translate.h | 1 + | ||
18 | target/arm/helper.c | 13 +++++++++++++ | ||
19 | target/arm/translate.c | 29 +++++++++++++++++++++++++++++ | ||
20 | 4 files changed, 45 insertions(+) | ||
21 | |||
22 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
23 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
24 | --- a/target/arm/cpu.h | 17 | --- a/contrib/elf2dmp/download.c |
25 | +++ b/target/arm/cpu.h | 18 | +++ b/contrib/elf2dmp/download.c |
26 | @@ -XXX,XX +XXX,XX @@ FIELD(TBFLAG_A32, NS, 6, 1) | 19 | @@ -XXX,XX +XXX,XX @@ int download_url(const char *name, const char *url) |
27 | FIELD(TBFLAG_A32, VFPEN, 7, 1) | 20 | goto out_curl; |
28 | FIELD(TBFLAG_A32, CONDEXEC, 8, 8) | ||
29 | FIELD(TBFLAG_A32, SCTLR_B, 16, 1) | ||
30 | +/* For M profile only, set if we must create a new FP context */ | ||
31 | +FIELD(TBFLAG_A32, NEW_FP_CTXT_NEEDED, 19, 1) | ||
32 | /* For M profile only, set if FPCCR.S does not match current security state */ | ||
33 | FIELD(TBFLAG_A32, FPCCR_S_WRONG, 20, 1) | ||
34 | /* For M profile only, Handler (ie not Thread) mode */ | ||
35 | diff --git a/target/arm/translate.h b/target/arm/translate.h | ||
36 | index XXXXXXX..XXXXXXX 100644 | ||
37 | --- a/target/arm/translate.h | ||
38 | +++ b/target/arm/translate.h | ||
39 | @@ -XXX,XX +XXX,XX @@ typedef struct DisasContext { | ||
40 | bool v8m_secure; /* true if v8M and we're in Secure mode */ | ||
41 | bool v8m_stackcheck; /* true if we need to perform v8M stack limit checks */ | ||
42 | bool v8m_fpccr_s_wrong; /* true if v8M FPCCR.S != v8m_secure */ | ||
43 | + bool v7m_new_fp_ctxt_needed; /* ASPEN set but no active FP context */ | ||
44 | /* Immediate value in AArch32 SVC insn; must be set if is_jmp == DISAS_SWI | ||
45 | * so that top level loop can generate correct syndrome information. | ||
46 | */ | ||
47 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
48 | index XXXXXXX..XXXXXXX 100644 | ||
49 | --- a/target/arm/helper.c | ||
50 | +++ b/target/arm/helper.c | ||
51 | @@ -XXX,XX +XXX,XX @@ void cpu_get_tb_cpu_state(CPUARMState *env, target_ulong *pc, | ||
52 | flags = FIELD_DP32(flags, TBFLAG_A32, FPCCR_S_WRONG, 1); | ||
53 | } | 21 | } |
54 | 22 | ||
55 | + if (arm_feature(env, ARM_FEATURE_M) && | 23 | - curl_easy_setopt(curl, CURLOPT_URL, url); |
56 | + (env->v7m.fpccr[env->v7m.secure] & R_V7M_FPCCR_ASPEN_MASK) && | 24 | - curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, NULL); |
57 | + (!(env->v7m.control[M_REG_S] & R_V7M_CONTROL_FPCA_MASK) || | 25 | - curl_easy_setopt(curl, CURLOPT_WRITEDATA, file); |
58 | + (env->v7m.secure && | 26 | - curl_easy_setopt(curl, CURLOPT_FOLLOWLOCATION, 1); |
59 | + !(env->v7m.control[M_REG_S] & R_V7M_CONTROL_SFPA_MASK)))) { | 27 | - curl_easy_setopt(curl, CURLOPT_NOPROGRESS, 0); |
60 | + /* | 28 | - |
61 | + * ASPEN is set, but FPCA/SFPA indicate that there is no active | 29 | - if (curl_easy_perform(curl) != CURLE_OK) { |
62 | + * FP context; we must create a new FP context before executing | 30 | - err = 1; |
63 | + * any FP insn. | 31 | - fclose(file); |
64 | + */ | 32 | + if (curl_easy_setopt(curl, CURLOPT_URL, url) != CURLE_OK |
65 | + flags = FIELD_DP32(flags, TBFLAG_A32, NEW_FP_CTXT_NEEDED, 1); | 33 | + || curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, NULL) != CURLE_OK |
66 | + } | 34 | + || curl_easy_setopt(curl, CURLOPT_WRITEDATA, file) != CURLE_OK |
67 | + | 35 | + || curl_easy_setopt(curl, CURLOPT_FOLLOWLOCATION, 1) != CURLE_OK |
68 | *pflags = flags; | 36 | + || curl_easy_setopt(curl, CURLOPT_NOPROGRESS, 0) != CURLE_OK |
69 | *cs_base = 0; | 37 | + || curl_easy_perform(curl) != CURLE_OK) { |
70 | } | 38 | unlink(name); |
71 | diff --git a/target/arm/translate.c b/target/arm/translate.c | 39 | - goto out_curl; |
72 | index XXXXXXX..XXXXXXX 100644 | 40 | + fclose(file); |
73 | --- a/target/arm/translate.c | 41 | + err = 1; |
74 | +++ b/target/arm/translate.c | 42 | + } else { |
75 | @@ -XXX,XX +XXX,XX @@ static int disas_vfp_insn(DisasContext *s, uint32_t insn) | 43 | + err = fclose(file); |
76 | /* Don't need to do this for any further FP insns in this TB */ | ||
77 | s->v8m_fpccr_s_wrong = false; | ||
78 | } | ||
79 | + | ||
80 | + if (s->v7m_new_fp_ctxt_needed) { | ||
81 | + /* | ||
82 | + * Create new FP context by updating CONTROL.FPCA, CONTROL.SFPA | ||
83 | + * and the FPSCR. | ||
84 | + */ | ||
85 | + TCGv_i32 control, fpscr; | ||
86 | + uint32_t bits = R_V7M_CONTROL_FPCA_MASK; | ||
87 | + | ||
88 | + fpscr = load_cpu_field(v7m.fpdscr[s->v8m_secure]); | ||
89 | + gen_helper_vfp_set_fpscr(cpu_env, fpscr); | ||
90 | + tcg_temp_free_i32(fpscr); | ||
91 | + /* | ||
92 | + * We don't need to arrange to end the TB, because the only | ||
93 | + * parts of FPSCR which we cache in the TB flags are the VECLEN | ||
94 | + * and VECSTRIDE, and those don't exist for M-profile. | ||
95 | + */ | ||
96 | + | ||
97 | + if (s->v8m_secure) { | ||
98 | + bits |= R_V7M_CONTROL_SFPA_MASK; | ||
99 | + } | ||
100 | + control = load_cpu_field(v7m.control[M_REG_S]); | ||
101 | + tcg_gen_ori_i32(control, control, bits); | ||
102 | + store_cpu_field(control, v7m.control[M_REG_S]); | ||
103 | + /* Don't need to do this for any further FP insns in this TB */ | ||
104 | + s->v7m_new_fp_ctxt_needed = false; | ||
105 | + } | ||
106 | } | 44 | } |
107 | 45 | ||
108 | if (extract32(insn, 28, 4) == 0xf) { | 46 | - err = fclose(file); |
109 | @@ -XXX,XX +XXX,XX @@ static void arm_tr_init_disas_context(DisasContextBase *dcbase, CPUState *cs) | 47 | - |
110 | regime_is_secure(env, dc->mmu_idx); | 48 | out_curl: |
111 | dc->v8m_stackcheck = FIELD_EX32(tb_flags, TBFLAG_A32, STACKCHECK); | 49 | curl_easy_cleanup(curl); |
112 | dc->v8m_fpccr_s_wrong = FIELD_EX32(tb_flags, TBFLAG_A32, FPCCR_S_WRONG); | ||
113 | + dc->v7m_new_fp_ctxt_needed = | ||
114 | + FIELD_EX32(tb_flags, TBFLAG_A32, NEW_FP_CTXT_NEEDED); | ||
115 | dc->cp_regs = cpu->cp_regs; | ||
116 | dc->features = env->features; | ||
117 | 50 | ||
118 | -- | 51 | -- |
119 | 2.20.1 | 52 | 2.20.1 |
120 | 53 | ||
121 | 54 | diff view generated by jsdifflib |
1 | The TailChain() pseudocode specifies that a tail chaining | 1 | Coverity points out that if the PDB file we're trying to read |
---|---|---|---|
2 | exception should sanitize the excReturn all-ones bits and | 2 | has a header specifying a block_size of zero then we will |
3 | (if there is no FPU) the excReturn FType bits; we weren't | 3 | end up trying to divide by zero in pdb_ds_read_file(). |
4 | doing this. | 4 | Check for this and fail cleanly instead. |
5 | 5 | ||
6 | Fixes: Coverity CID 1458869 | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 8 | Reviewed-by: Viktor Prutyanov <viktor.prutyanov@phystech.edu> |
8 | Message-id: 20190416125744.27770-14-peter.maydell@linaro.org | 9 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
10 | Tested-by: Viktor Prutyanov <viktor.prutyanov@phystech.edu> | ||
11 | Message-id: 20210910170656.366592-3-philmd@redhat.com | ||
12 | Message-Id: <20210901143910.17112-3-peter.maydell@linaro.org> | ||
13 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
9 | --- | 14 | --- |
10 | target/arm/helper.c | 8 ++++++++ | 15 | contrib/elf2dmp/pdb.c | 4 ++++ |
11 | 1 file changed, 8 insertions(+) | 16 | 1 file changed, 4 insertions(+) |
12 | 17 | ||
13 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 18 | diff --git a/contrib/elf2dmp/pdb.c b/contrib/elf2dmp/pdb.c |
14 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/target/arm/helper.c | 20 | --- a/contrib/elf2dmp/pdb.c |
16 | +++ b/target/arm/helper.c | 21 | +++ b/contrib/elf2dmp/pdb.c |
17 | @@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain, | 22 | @@ -XXX,XX +XXX,XX @@ out_symbols: |
18 | qemu_log_mask(CPU_LOG_INT, "...taking pending %s exception %d\n", | 23 | |
19 | targets_secure ? "secure" : "nonsecure", exc); | 24 | static int pdb_reader_ds_init(struct pdb_reader *r, PDB_DS_HEADER *hdr) |
20 | 25 | { | |
21 | + if (dotailchain) { | 26 | + if (hdr->block_size == 0) { |
22 | + /* Sanitize LR FType and PREFIX bits */ | 27 | + return 1; |
23 | + if (!arm_feature(env, ARM_FEATURE_VFP)) { | ||
24 | + lr |= R_V7M_EXCRET_FTYPE_MASK; | ||
25 | + } | ||
26 | + lr = deposit32(lr, 24, 8, 0xff); | ||
27 | + } | 28 | + } |
28 | + | 29 | + |
29 | if (arm_feature(env, ARM_FEATURE_V8)) { | 30 | memset(r->file_used, 0, sizeof(r->file_used)); |
30 | if (arm_feature(env, ARM_FEATURE_M_SECURITY) && | 31 | r->ds.header = hdr; |
31 | (lr & R_V7M_EXCRET_S_MASK)) { | 32 | r->ds.toc = pdb_ds_read(hdr, (uint32_t *)((uint8_t *)hdr + |
32 | -- | 33 | -- |
33 | 2.20.1 | 34 | 2.20.1 |
34 | 35 | ||
35 | 36 | diff view generated by jsdifflib |
1 | The M-profile floating point support has three associated config | 1 | Currently all of the M-profile specific code in arm_cpu_reset() is |
---|---|---|---|
2 | registers: FPCAR, FPCCR and FPDSCR. It also makes the registers | 2 | inside a !defined(CONFIG_USER_ONLY) ifdef block. This is |
3 | CPACR and NSACR have behaviour other than reads-as-zero. | 3 | unintentional: it happened because originally the only |
4 | Add support for all of these as simple reads-as-written registers. | 4 | M-profile-specific handling was the setup of the initial SP and PC |
5 | We will hook up actual functionality later. | 5 | from the vector table, which is system-emulation only. But then we |
6 | added a lot of other M-profile setup to the same "if (ARM_FEATURE_M)" | ||
7 | code block without noticing that it was all inside a not-user-mode | ||
8 | ifdef. This has generally been harmless, but with the addition of | ||
9 | v8.1M low-overhead-loop support we ran into a problem: the reset of | ||
10 | FPSCR.LTPSIZE to 4 was only being done for system emulation mode, so | ||
11 | if a user-mode guest tried to execute the LE instruction it would | ||
12 | incorrectly take a UsageFault. | ||
6 | 13 | ||
7 | The main complexity here is handling the FPCCR register, which | 14 | Adjust the ifdefs so only the really system-emulation specific parts |
8 | has a mix of banked and unbanked bits. | 15 | are covered. Because this means we now run some reset code that sets |
16 | up initial values in the FPCCR and similar FPU related registers, | ||
17 | explicitly set up the registers controlling FPU context handling in | ||
18 | user-emulation mode so that the FPU works by design and not by | ||
19 | chance. | ||
9 | 20 | ||
10 | Note that we don't share storage with the A-profile | 21 | Resolves: https://gitlab.com/qemu-project/qemu/-/issues/613 |
11 | cpu->cp15.nsacr and cpu->cp15.cpacr_el1, though the behaviour | 22 | Cc: qemu-stable@nongnu.org |
12 | is quite similar, for two reasons: | ||
13 | * the M profile CPACR is banked between security states | ||
14 | * it preserves the invariant that M profile uses no state | ||
15 | inside the cp15 substruct | ||
16 | |||
17 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 23 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
18 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 24 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
19 | Message-id: 20190416125744.27770-4-peter.maydell@linaro.org | 25 | Message-id: 20210914120725.24992-2-peter.maydell@linaro.org |
20 | --- | 26 | --- |
21 | target/arm/cpu.h | 34 ++++++++++++ | 27 | target/arm/cpu.c | 19 +++++++++++++++++++ |
22 | hw/intc/armv7m_nvic.c | 125 ++++++++++++++++++++++++++++++++++++++++++ | 28 | 1 file changed, 19 insertions(+) |
23 | target/arm/cpu.c | 5 ++ | ||
24 | target/arm/machine.c | 16 ++++++ | ||
25 | 4 files changed, 180 insertions(+) | ||
26 | 29 | ||
27 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
28 | index XXXXXXX..XXXXXXX 100644 | ||
29 | --- a/target/arm/cpu.h | ||
30 | +++ b/target/arm/cpu.h | ||
31 | @@ -XXX,XX +XXX,XX @@ typedef struct CPUARMState { | ||
32 | uint32_t scr[M_REG_NUM_BANKS]; | ||
33 | uint32_t msplim[M_REG_NUM_BANKS]; | ||
34 | uint32_t psplim[M_REG_NUM_BANKS]; | ||
35 | + uint32_t fpcar[M_REG_NUM_BANKS]; | ||
36 | + uint32_t fpccr[M_REG_NUM_BANKS]; | ||
37 | + uint32_t fpdscr[M_REG_NUM_BANKS]; | ||
38 | + uint32_t cpacr[M_REG_NUM_BANKS]; | ||
39 | + uint32_t nsacr; | ||
40 | } v7m; | ||
41 | |||
42 | /* Information associated with an exception about to be taken: | ||
43 | @@ -XXX,XX +XXX,XX @@ FIELD(V7M_CSSELR, LEVEL, 1, 3) | ||
44 | */ | ||
45 | FIELD(V7M_CSSELR, INDEX, 0, 4) | ||
46 | |||
47 | +/* v7M FPCCR bits */ | ||
48 | +FIELD(V7M_FPCCR, LSPACT, 0, 1) | ||
49 | +FIELD(V7M_FPCCR, USER, 1, 1) | ||
50 | +FIELD(V7M_FPCCR, S, 2, 1) | ||
51 | +FIELD(V7M_FPCCR, THREAD, 3, 1) | ||
52 | +FIELD(V7M_FPCCR, HFRDY, 4, 1) | ||
53 | +FIELD(V7M_FPCCR, MMRDY, 5, 1) | ||
54 | +FIELD(V7M_FPCCR, BFRDY, 6, 1) | ||
55 | +FIELD(V7M_FPCCR, SFRDY, 7, 1) | ||
56 | +FIELD(V7M_FPCCR, MONRDY, 8, 1) | ||
57 | +FIELD(V7M_FPCCR, SPLIMVIOL, 9, 1) | ||
58 | +FIELD(V7M_FPCCR, UFRDY, 10, 1) | ||
59 | +FIELD(V7M_FPCCR, RES0, 11, 15) | ||
60 | +FIELD(V7M_FPCCR, TS, 26, 1) | ||
61 | +FIELD(V7M_FPCCR, CLRONRETS, 27, 1) | ||
62 | +FIELD(V7M_FPCCR, CLRONRET, 28, 1) | ||
63 | +FIELD(V7M_FPCCR, LSPENS, 29, 1) | ||
64 | +FIELD(V7M_FPCCR, LSPEN, 30, 1) | ||
65 | +FIELD(V7M_FPCCR, ASPEN, 31, 1) | ||
66 | +/* These bits are banked. Others are non-banked and live in the M_REG_S bank */ | ||
67 | +#define R_V7M_FPCCR_BANKED_MASK \ | ||
68 | + (R_V7M_FPCCR_LSPACT_MASK | \ | ||
69 | + R_V7M_FPCCR_USER_MASK | \ | ||
70 | + R_V7M_FPCCR_THREAD_MASK | \ | ||
71 | + R_V7M_FPCCR_MMRDY_MASK | \ | ||
72 | + R_V7M_FPCCR_SPLIMVIOL_MASK | \ | ||
73 | + R_V7M_FPCCR_UFRDY_MASK | \ | ||
74 | + R_V7M_FPCCR_ASPEN_MASK) | ||
75 | + | ||
76 | /* | ||
77 | * System register ID fields. | ||
78 | */ | ||
79 | diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c | ||
80 | index XXXXXXX..XXXXXXX 100644 | ||
81 | --- a/hw/intc/armv7m_nvic.c | ||
82 | +++ b/hw/intc/armv7m_nvic.c | ||
83 | @@ -XXX,XX +XXX,XX @@ static uint32_t nvic_readl(NVICState *s, uint32_t offset, MemTxAttrs attrs) | ||
84 | } | ||
85 | case 0xd84: /* CSSELR */ | ||
86 | return cpu->env.v7m.csselr[attrs.secure]; | ||
87 | + case 0xd88: /* CPACR */ | ||
88 | + if (!arm_feature(&cpu->env, ARM_FEATURE_VFP)) { | ||
89 | + return 0; | ||
90 | + } | ||
91 | + return cpu->env.v7m.cpacr[attrs.secure]; | ||
92 | + case 0xd8c: /* NSACR */ | ||
93 | + if (!attrs.secure || !arm_feature(&cpu->env, ARM_FEATURE_VFP)) { | ||
94 | + return 0; | ||
95 | + } | ||
96 | + return cpu->env.v7m.nsacr; | ||
97 | /* TODO: Implement debug registers. */ | ||
98 | case 0xd90: /* MPU_TYPE */ | ||
99 | /* Unified MPU; if the MPU is not present this value is zero */ | ||
100 | @@ -XXX,XX +XXX,XX @@ static uint32_t nvic_readl(NVICState *s, uint32_t offset, MemTxAttrs attrs) | ||
101 | return 0; | ||
102 | } | ||
103 | return cpu->env.v7m.sfar; | ||
104 | + case 0xf34: /* FPCCR */ | ||
105 | + if (!arm_feature(&cpu->env, ARM_FEATURE_VFP)) { | ||
106 | + return 0; | ||
107 | + } | ||
108 | + if (attrs.secure) { | ||
109 | + return cpu->env.v7m.fpccr[M_REG_S]; | ||
110 | + } else { | ||
111 | + /* | ||
112 | + * NS can read LSPEN, CLRONRET and MONRDY. It can read | ||
113 | + * BFRDY and HFRDY if AIRCR.BFHFNMINS != 0; | ||
114 | + * other non-banked bits RAZ. | ||
115 | + * TODO: MONRDY should RAZ/WI if DEMCR.SDME is set. | ||
116 | + */ | ||
117 | + uint32_t value = cpu->env.v7m.fpccr[M_REG_S]; | ||
118 | + uint32_t mask = R_V7M_FPCCR_LSPEN_MASK | | ||
119 | + R_V7M_FPCCR_CLRONRET_MASK | | ||
120 | + R_V7M_FPCCR_MONRDY_MASK; | ||
121 | + | ||
122 | + if (s->cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK) { | ||
123 | + mask |= R_V7M_FPCCR_BFRDY_MASK | R_V7M_FPCCR_HFRDY_MASK; | ||
124 | + } | ||
125 | + | ||
126 | + value &= mask; | ||
127 | + | ||
128 | + value |= cpu->env.v7m.fpccr[M_REG_NS]; | ||
129 | + return value; | ||
130 | + } | ||
131 | + case 0xf38: /* FPCAR */ | ||
132 | + if (!arm_feature(&cpu->env, ARM_FEATURE_VFP)) { | ||
133 | + return 0; | ||
134 | + } | ||
135 | + return cpu->env.v7m.fpcar[attrs.secure]; | ||
136 | + case 0xf3c: /* FPDSCR */ | ||
137 | + if (!arm_feature(&cpu->env, ARM_FEATURE_VFP)) { | ||
138 | + return 0; | ||
139 | + } | ||
140 | + return cpu->env.v7m.fpdscr[attrs.secure]; | ||
141 | case 0xf40: /* MVFR0 */ | ||
142 | return cpu->isar.mvfr0; | ||
143 | case 0xf44: /* MVFR1 */ | ||
144 | @@ -XXX,XX +XXX,XX @@ static void nvic_writel(NVICState *s, uint32_t offset, uint32_t value, | ||
145 | cpu->env.v7m.csselr[attrs.secure] = value & R_V7M_CSSELR_INDEX_MASK; | ||
146 | } | ||
147 | break; | ||
148 | + case 0xd88: /* CPACR */ | ||
149 | + if (arm_feature(&cpu->env, ARM_FEATURE_VFP)) { | ||
150 | + /* We implement only the Floating Point extension's CP10/CP11 */ | ||
151 | + cpu->env.v7m.cpacr[attrs.secure] = value & (0xf << 20); | ||
152 | + } | ||
153 | + break; | ||
154 | + case 0xd8c: /* NSACR */ | ||
155 | + if (attrs.secure && arm_feature(&cpu->env, ARM_FEATURE_VFP)) { | ||
156 | + /* We implement only the Floating Point extension's CP10/CP11 */ | ||
157 | + cpu->env.v7m.nsacr = value & (3 << 10); | ||
158 | + } | ||
159 | + break; | ||
160 | case 0xd90: /* MPU_TYPE */ | ||
161 | return; /* RO */ | ||
162 | case 0xd94: /* MPU_CTRL */ | ||
163 | @@ -XXX,XX +XXX,XX @@ static void nvic_writel(NVICState *s, uint32_t offset, uint32_t value, | ||
164 | } | ||
165 | break; | ||
166 | } | ||
167 | + case 0xf34: /* FPCCR */ | ||
168 | + if (arm_feature(&cpu->env, ARM_FEATURE_VFP)) { | ||
169 | + /* Not all bits here are banked. */ | ||
170 | + uint32_t fpccr_s; | ||
171 | + | ||
172 | + if (!arm_feature(&cpu->env, ARM_FEATURE_V8)) { | ||
173 | + /* Don't allow setting of bits not present in v7M */ | ||
174 | + value &= (R_V7M_FPCCR_LSPACT_MASK | | ||
175 | + R_V7M_FPCCR_USER_MASK | | ||
176 | + R_V7M_FPCCR_THREAD_MASK | | ||
177 | + R_V7M_FPCCR_HFRDY_MASK | | ||
178 | + R_V7M_FPCCR_MMRDY_MASK | | ||
179 | + R_V7M_FPCCR_BFRDY_MASK | | ||
180 | + R_V7M_FPCCR_MONRDY_MASK | | ||
181 | + R_V7M_FPCCR_LSPEN_MASK | | ||
182 | + R_V7M_FPCCR_ASPEN_MASK); | ||
183 | + } | ||
184 | + value &= ~R_V7M_FPCCR_RES0_MASK; | ||
185 | + | ||
186 | + if (!attrs.secure) { | ||
187 | + /* Some non-banked bits are configurably writable by NS */ | ||
188 | + fpccr_s = cpu->env.v7m.fpccr[M_REG_S]; | ||
189 | + if (!(fpccr_s & R_V7M_FPCCR_LSPENS_MASK)) { | ||
190 | + uint32_t lspen = FIELD_EX32(value, V7M_FPCCR, LSPEN); | ||
191 | + fpccr_s = FIELD_DP32(fpccr_s, V7M_FPCCR, LSPEN, lspen); | ||
192 | + } | ||
193 | + if (!(fpccr_s & R_V7M_FPCCR_CLRONRETS_MASK)) { | ||
194 | + uint32_t cor = FIELD_EX32(value, V7M_FPCCR, CLRONRET); | ||
195 | + fpccr_s = FIELD_DP32(fpccr_s, V7M_FPCCR, CLRONRET, cor); | ||
196 | + } | ||
197 | + if ((s->cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK)) { | ||
198 | + uint32_t hfrdy = FIELD_EX32(value, V7M_FPCCR, HFRDY); | ||
199 | + uint32_t bfrdy = FIELD_EX32(value, V7M_FPCCR, BFRDY); | ||
200 | + fpccr_s = FIELD_DP32(fpccr_s, V7M_FPCCR, HFRDY, hfrdy); | ||
201 | + fpccr_s = FIELD_DP32(fpccr_s, V7M_FPCCR, BFRDY, bfrdy); | ||
202 | + } | ||
203 | + /* TODO MONRDY should RAZ/WI if DEMCR.SDME is set */ | ||
204 | + { | ||
205 | + uint32_t monrdy = FIELD_EX32(value, V7M_FPCCR, MONRDY); | ||
206 | + fpccr_s = FIELD_DP32(fpccr_s, V7M_FPCCR, MONRDY, monrdy); | ||
207 | + } | ||
208 | + | ||
209 | + /* | ||
210 | + * All other non-banked bits are RAZ/WI from NS; write | ||
211 | + * just the banked bits to fpccr[M_REG_NS]. | ||
212 | + */ | ||
213 | + value &= R_V7M_FPCCR_BANKED_MASK; | ||
214 | + cpu->env.v7m.fpccr[M_REG_NS] = value; | ||
215 | + } else { | ||
216 | + fpccr_s = value; | ||
217 | + } | ||
218 | + cpu->env.v7m.fpccr[M_REG_S] = fpccr_s; | ||
219 | + } | ||
220 | + break; | ||
221 | + case 0xf38: /* FPCAR */ | ||
222 | + if (arm_feature(&cpu->env, ARM_FEATURE_VFP)) { | ||
223 | + value &= ~7; | ||
224 | + cpu->env.v7m.fpcar[attrs.secure] = value; | ||
225 | + } | ||
226 | + break; | ||
227 | + case 0xf3c: /* FPDSCR */ | ||
228 | + if (arm_feature(&cpu->env, ARM_FEATURE_VFP)) { | ||
229 | + value &= 0x07c00000; | ||
230 | + cpu->env.v7m.fpdscr[attrs.secure] = value; | ||
231 | + } | ||
232 | + break; | ||
233 | case 0xf50: /* ICIALLU */ | ||
234 | case 0xf58: /* ICIMVAU */ | ||
235 | case 0xf5c: /* DCIMVAC */ | ||
236 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | 30 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c |
237 | index XXXXXXX..XXXXXXX 100644 | 31 | index XXXXXXX..XXXXXXX 100644 |
238 | --- a/target/arm/cpu.c | 32 | --- a/target/arm/cpu.c |
239 | +++ b/target/arm/cpu.c | 33 | +++ b/target/arm/cpu.c |
240 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(CPUState *s) | 34 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(DeviceState *dev) |
241 | env->v7m.ccr[M_REG_S] |= R_V7M_CCR_UNALIGN_TRP_MASK; | 35 | env->uncached_cpsr = ARM_CPU_MODE_SVC; |
36 | } | ||
37 | env->daif = PSTATE_D | PSTATE_A | PSTATE_I | PSTATE_F; | ||
38 | +#endif | ||
39 | |||
40 | if (arm_feature(env, ARM_FEATURE_M)) { | ||
41 | +#ifndef CONFIG_USER_ONLY | ||
42 | uint32_t initial_msp; /* Loaded from 0x0 */ | ||
43 | uint32_t initial_pc; /* Loaded from 0x4 */ | ||
44 | uint8_t *rom; | ||
45 | uint32_t vecbase; | ||
46 | +#endif | ||
47 | |||
48 | if (cpu_isar_feature(aa32_lob, cpu)) { | ||
49 | /* | ||
50 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(DeviceState *dev) | ||
51 | env->v7m.fpccr[M_REG_S] = R_V7M_FPCCR_ASPEN_MASK | | ||
52 | R_V7M_FPCCR_LSPEN_MASK | R_V7M_FPCCR_S_MASK; | ||
242 | } | 53 | } |
243 | 54 | + | |
244 | + if (arm_feature(env, ARM_FEATURE_VFP)) { | 55 | +#ifndef CONFIG_USER_ONLY |
245 | + env->v7m.fpccr[M_REG_NS] = R_V7M_FPCCR_ASPEN_MASK; | ||
246 | + env->v7m.fpccr[M_REG_S] = R_V7M_FPCCR_ASPEN_MASK | | ||
247 | + R_V7M_FPCCR_LSPEN_MASK | R_V7M_FPCCR_S_MASK; | ||
248 | + } | ||
249 | /* Unlike A/R profile, M profile defines the reset LR value */ | 56 | /* Unlike A/R profile, M profile defines the reset LR value */ |
250 | env->regs[14] = 0xffffffff; | 57 | env->regs[14] = 0xffffffff; |
251 | 58 | ||
252 | diff --git a/target/arm/machine.c b/target/arm/machine.c | 59 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(DeviceState *dev) |
253 | index XXXXXXX..XXXXXXX 100644 | 60 | env->regs[13] = initial_msp & 0xFFFFFFFC; |
254 | --- a/target/arm/machine.c | 61 | env->regs[15] = initial_pc & ~1; |
255 | +++ b/target/arm/machine.c | 62 | env->thumb = initial_pc & 1; |
256 | @@ -XXX,XX +XXX,XX @@ static const VMStateDescription vmstate_m_v8m = { | 63 | +#else |
64 | + /* | ||
65 | + * For user mode we run non-secure and with access to the FPU. | ||
66 | + * The FPU context is active (ie does not need further setup) | ||
67 | + * and is owned by non-secure. | ||
68 | + */ | ||
69 | + env->v7m.secure = false; | ||
70 | + env->v7m.nsacr = 0xcff; | ||
71 | + env->v7m.cpacr[M_REG_NS] = 0xf0ffff; | ||
72 | + env->v7m.fpccr[M_REG_S] &= | ||
73 | + ~(R_V7M_FPCCR_LSPEN_MASK | R_V7M_FPCCR_S_MASK); | ||
74 | + env->v7m.control[M_REG_S] |= R_V7M_CONTROL_FPCA_MASK; | ||
75 | +#endif | ||
257 | } | 76 | } |
258 | }; | 77 | |
259 | 78 | +#ifndef CONFIG_USER_ONLY | |
260 | +static const VMStateDescription vmstate_m_fp = { | 79 | /* AArch32 has a hard highvec setting of 0xFFFF0000. If we are currently |
261 | + .name = "cpu/m/fp", | 80 | * executing as AArch32 then check if highvecs are enabled and |
262 | + .version_id = 1, | 81 | * adjust the PC accordingly. |
263 | + .minimum_version_id = 1, | ||
264 | + .needed = vfp_needed, | ||
265 | + .fields = (VMStateField[]) { | ||
266 | + VMSTATE_UINT32_ARRAY(env.v7m.fpcar, ARMCPU, M_REG_NUM_BANKS), | ||
267 | + VMSTATE_UINT32_ARRAY(env.v7m.fpccr, ARMCPU, M_REG_NUM_BANKS), | ||
268 | + VMSTATE_UINT32_ARRAY(env.v7m.fpdscr, ARMCPU, M_REG_NUM_BANKS), | ||
269 | + VMSTATE_UINT32_ARRAY(env.v7m.cpacr, ARMCPU, M_REG_NUM_BANKS), | ||
270 | + VMSTATE_UINT32(env.v7m.nsacr, ARMCPU), | ||
271 | + VMSTATE_END_OF_LIST() | ||
272 | + } | ||
273 | +}; | ||
274 | + | ||
275 | static const VMStateDescription vmstate_m = { | ||
276 | .name = "cpu/m", | ||
277 | .version_id = 4, | ||
278 | @@ -XXX,XX +XXX,XX @@ static const VMStateDescription vmstate_m = { | ||
279 | &vmstate_m_scr, | ||
280 | &vmstate_m_other_sp, | ||
281 | &vmstate_m_v8m, | ||
282 | + &vmstate_m_fp, | ||
283 | NULL | ||
284 | } | ||
285 | }; | ||
286 | -- | 82 | -- |
287 | 2.20.1 | 83 | 2.20.1 |
288 | 84 | ||
289 | 85 | diff view generated by jsdifflib |
1 | Enable the FPU by default for the Cortex-M4 and Cortex-M33. | 1 | There's no particular reason why the exclusive monitor should |
---|---|---|---|
2 | be only cleared on reset in system emulation mode. It doesn't | ||
3 | hurt if it isn't cleared in user mode, but we might as well | ||
4 | reduce the amount of code we have that's inside an ifdef. | ||
2 | 5 | ||
3 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
5 | Message-id: 20190416125744.27770-27-peter.maydell@linaro.org | 8 | Message-id: 20210914120725.24992-3-peter.maydell@linaro.org |
6 | --- | 9 | --- |
7 | target/arm/cpu.c | 8 ++++++++ | 10 | target/arm/cpu.c | 6 +++--- |
8 | 1 file changed, 8 insertions(+) | 11 | 1 file changed, 3 insertions(+), 3 deletions(-) |
9 | 12 | ||
10 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | 13 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c |
11 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
12 | --- a/target/arm/cpu.c | 15 | --- a/target/arm/cpu.c |
13 | +++ b/target/arm/cpu.c | 16 | +++ b/target/arm/cpu.c |
14 | @@ -XXX,XX +XXX,XX @@ static void cortex_m4_initfn(Object *obj) | 17 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(DeviceState *dev) |
15 | set_feature(&cpu->env, ARM_FEATURE_M); | 18 | env->regs[15] = 0xFFFF0000; |
16 | set_feature(&cpu->env, ARM_FEATURE_M_MAIN); | 19 | } |
17 | set_feature(&cpu->env, ARM_FEATURE_THUMB_DSP); | 20 | |
18 | + set_feature(&cpu->env, ARM_FEATURE_VFP4); | 21 | + env->vfp.xregs[ARM_VFP_FPEXC] = 0; |
19 | cpu->midr = 0x410fc240; /* r0p0 */ | 22 | +#endif |
20 | cpu->pmsav7_dregion = 8; | 23 | + |
21 | + cpu->isar.mvfr0 = 0x10110021; | 24 | /* M profile requires that reset clears the exclusive monitor; |
22 | + cpu->isar.mvfr1 = 0x11000011; | 25 | * A profile does not, but clearing it makes more sense than having it |
23 | + cpu->isar.mvfr2 = 0x00000000; | 26 | * set with an exclusive access on address zero. |
24 | cpu->id_pfr0 = 0x00000030; | 27 | */ |
25 | cpu->id_pfr1 = 0x00000200; | 28 | arm_clear_exclusive(env); |
26 | cpu->id_dfr0 = 0x00100000; | 29 | |
27 | @@ -XXX,XX +XXX,XX @@ static void cortex_m33_initfn(Object *obj) | 30 | - env->vfp.xregs[ARM_VFP_FPEXC] = 0; |
28 | set_feature(&cpu->env, ARM_FEATURE_M_MAIN); | 31 | -#endif |
29 | set_feature(&cpu->env, ARM_FEATURE_M_SECURITY); | 32 | - |
30 | set_feature(&cpu->env, ARM_FEATURE_THUMB_DSP); | 33 | if (arm_feature(env, ARM_FEATURE_PMSA)) { |
31 | + set_feature(&cpu->env, ARM_FEATURE_VFP4); | 34 | if (cpu->pmsav7_dregion > 0) { |
32 | cpu->midr = 0x410fd213; /* r0p3 */ | 35 | if (arm_feature(env, ARM_FEATURE_V8)) { |
33 | cpu->pmsav7_dregion = 16; | ||
34 | cpu->sau_sregion = 8; | ||
35 | + cpu->isar.mvfr0 = 0x10110021; | ||
36 | + cpu->isar.mvfr1 = 0x11000011; | ||
37 | + cpu->isar.mvfr2 = 0x00000040; | ||
38 | cpu->id_pfr0 = 0x00000030; | ||
39 | cpu->id_pfr1 = 0x00000210; | ||
40 | cpu->id_dfr0 = 0x00200000; | ||
41 | -- | 36 | -- |
42 | 2.20.1 | 37 | 2.20.1 |
43 | 38 | ||
44 | 39 | diff view generated by jsdifflib |
1 | We are close to running out of TB flags for AArch32; we could | 1 | Move an ifndef CONFIG_USER_ONLY code block up in arm_cpu_reset() so |
---|---|---|---|
2 | start using the cs_base word, but before we do that we can | 2 | it can be merged with another earlier one. |
3 | economise on our usage by sharing the same bits for the VFP | ||
4 | VECSTRIDE field and the XScale XSCALE_CPAR field. This | ||
5 | works because no XScale CPU ever had VFP. | ||
6 | 3 | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 5 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
9 | Message-id: 20190416125744.27770-18-peter.maydell@linaro.org | 6 | Message-id: 20210914120725.24992-4-peter.maydell@linaro.org |
10 | --- | 7 | --- |
11 | target/arm/cpu.h | 10 ++++++---- | 8 | target/arm/cpu.c | 22 ++++++++++------------ |
12 | target/arm/cpu.c | 7 +++++++ | 9 | 1 file changed, 10 insertions(+), 12 deletions(-) |
13 | target/arm/helper.c | 6 +++++- | ||
14 | target/arm/translate.c | 9 +++++++-- | ||
15 | 4 files changed, 25 insertions(+), 7 deletions(-) | ||
16 | 10 | ||
17 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
18 | index XXXXXXX..XXXXXXX 100644 | ||
19 | --- a/target/arm/cpu.h | ||
20 | +++ b/target/arm/cpu.h | ||
21 | @@ -XXX,XX +XXX,XX @@ FIELD(TBFLAG_ANY, BE_DATA, 23, 1) | ||
22 | FIELD(TBFLAG_A32, THUMB, 0, 1) | ||
23 | FIELD(TBFLAG_A32, VECLEN, 1, 3) | ||
24 | FIELD(TBFLAG_A32, VECSTRIDE, 4, 2) | ||
25 | +/* | ||
26 | + * We store the bottom two bits of the CPAR as TB flags and handle | ||
27 | + * checks on the other bits at runtime. This shares the same bits as | ||
28 | + * VECSTRIDE, which is OK as no XScale CPU has VFP. | ||
29 | + */ | ||
30 | +FIELD(TBFLAG_A32, XSCALE_CPAR, 4, 2) | ||
31 | /* | ||
32 | * Indicates whether cp register reads and writes by guest code should access | ||
33 | * the secure or nonsecure bank of banked registers; note that this is not | ||
34 | @@ -XXX,XX +XXX,XX @@ FIELD(TBFLAG_A32, NS, 6, 1) | ||
35 | FIELD(TBFLAG_A32, VFPEN, 7, 1) | ||
36 | FIELD(TBFLAG_A32, CONDEXEC, 8, 8) | ||
37 | FIELD(TBFLAG_A32, SCTLR_B, 16, 1) | ||
38 | -/* We store the bottom two bits of the CPAR as TB flags and handle | ||
39 | - * checks on the other bits at runtime | ||
40 | - */ | ||
41 | -FIELD(TBFLAG_A32, XSCALE_CPAR, 17, 2) | ||
42 | /* For M profile only, Handler (ie not Thread) mode */ | ||
43 | FIELD(TBFLAG_A32, HANDLER, 21, 1) | ||
44 | /* For M profile only, whether we should generate stack-limit checks */ | ||
45 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | 11 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c |
46 | index XXXXXXX..XXXXXXX 100644 | 12 | index XXXXXXX..XXXXXXX 100644 |
47 | --- a/target/arm/cpu.c | 13 | --- a/target/arm/cpu.c |
48 | +++ b/target/arm/cpu.c | 14 | +++ b/target/arm/cpu.c |
49 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_realizefn(DeviceState *dev, Error **errp) | 15 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(DeviceState *dev) |
50 | set_feature(env, ARM_FEATURE_THUMB_DSP); | 16 | env->uncached_cpsr = ARM_CPU_MODE_SVC; |
51 | } | 17 | } |
52 | 18 | env->daif = PSTATE_D | PSTATE_A | PSTATE_I | PSTATE_F; | |
53 | + /* | 19 | + |
54 | + * We rely on no XScale CPU having VFP so we can use the same bits in the | 20 | + /* AArch32 has a hard highvec setting of 0xFFFF0000. If we are currently |
55 | + * TB flags field for VECSTRIDE and XSCALE_CPAR. | 21 | + * executing as AArch32 then check if highvecs are enabled and |
22 | + * adjust the PC accordingly. | ||
56 | + */ | 23 | + */ |
57 | + assert(!(arm_feature(env, ARM_FEATURE_VFP) && | 24 | + if (A32_BANKED_CURRENT_REG_GET(env, sctlr) & SCTLR_V) { |
58 | + arm_feature(env, ARM_FEATURE_XSCALE))); | 25 | + env->regs[15] = 0xFFFF0000; |
26 | + } | ||
59 | + | 27 | + |
60 | if (arm_feature(env, ARM_FEATURE_V7) && | 28 | + env->vfp.xregs[ARM_VFP_FPEXC] = 0; |
61 | !arm_feature(env, ARM_FEATURE_M) && | 29 | #endif |
62 | !arm_feature(env, ARM_FEATURE_PMSA)) { | 30 | |
63 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 31 | if (arm_feature(env, ARM_FEATURE_M)) { |
64 | index XXXXXXX..XXXXXXX 100644 | 32 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(DeviceState *dev) |
65 | --- a/target/arm/helper.c | 33 | #endif |
66 | +++ b/target/arm/helper.c | ||
67 | @@ -XXX,XX +XXX,XX @@ void cpu_get_tb_cpu_state(CPUARMState *env, target_ulong *pc, | ||
68 | || arm_el_is_aa64(env, 1) || arm_feature(env, ARM_FEATURE_M)) { | ||
69 | flags = FIELD_DP32(flags, TBFLAG_A32, VFPEN, 1); | ||
70 | } | ||
71 | - flags = FIELD_DP32(flags, TBFLAG_A32, XSCALE_CPAR, env->cp15.c15_cpar); | ||
72 | + /* Note that XSCALE_CPAR shares bits with VECSTRIDE */ | ||
73 | + if (arm_feature(env, ARM_FEATURE_XSCALE)) { | ||
74 | + flags = FIELD_DP32(flags, TBFLAG_A32, | ||
75 | + XSCALE_CPAR, env->cp15.c15_cpar); | ||
76 | + } | ||
77 | } | 34 | } |
78 | 35 | ||
79 | flags = FIELD_DP32(flags, TBFLAG_ANY, MMUIDX, arm_to_core_mmu_idx(mmu_idx)); | 36 | -#ifndef CONFIG_USER_ONLY |
80 | diff --git a/target/arm/translate.c b/target/arm/translate.c | 37 | - /* AArch32 has a hard highvec setting of 0xFFFF0000. If we are currently |
81 | index XXXXXXX..XXXXXXX 100644 | 38 | - * executing as AArch32 then check if highvecs are enabled and |
82 | --- a/target/arm/translate.c | 39 | - * adjust the PC accordingly. |
83 | +++ b/target/arm/translate.c | 40 | - */ |
84 | @@ -XXX,XX +XXX,XX @@ static void arm_tr_init_disas_context(DisasContextBase *dcbase, CPUState *cs) | 41 | - if (A32_BANKED_CURRENT_REG_GET(env, sctlr) & SCTLR_V) { |
85 | dc->fp_excp_el = FIELD_EX32(tb_flags, TBFLAG_ANY, FPEXC_EL); | 42 | - env->regs[15] = 0xFFFF0000; |
86 | dc->vfp_enabled = FIELD_EX32(tb_flags, TBFLAG_A32, VFPEN); | 43 | - } |
87 | dc->vec_len = FIELD_EX32(tb_flags, TBFLAG_A32, VECLEN); | 44 | - |
88 | - dc->vec_stride = FIELD_EX32(tb_flags, TBFLAG_A32, VECSTRIDE); | 45 | - env->vfp.xregs[ARM_VFP_FPEXC] = 0; |
89 | - dc->c15_cpar = FIELD_EX32(tb_flags, TBFLAG_A32, XSCALE_CPAR); | 46 | -#endif |
90 | + if (arm_feature(env, ARM_FEATURE_XSCALE)) { | 47 | - |
91 | + dc->c15_cpar = FIELD_EX32(tb_flags, TBFLAG_A32, XSCALE_CPAR); | 48 | /* M profile requires that reset clears the exclusive monitor; |
92 | + dc->vec_stride = 0; | 49 | * A profile does not, but clearing it makes more sense than having it |
93 | + } else { | 50 | * set with an exclusive access on address zero. |
94 | + dc->vec_stride = FIELD_EX32(tb_flags, TBFLAG_A32, VECSTRIDE); | ||
95 | + dc->c15_cpar = 0; | ||
96 | + } | ||
97 | dc->v7m_handler_mode = FIELD_EX32(tb_flags, TBFLAG_A32, HANDLER); | ||
98 | dc->v8m_secure = arm_feature(env, ARM_FEATURE_M_SECURITY) && | ||
99 | regime_is_secure(env, dc->mmu_idx); | ||
100 | -- | 51 | -- |
101 | 2.20.1 | 52 | 2.20.1 |
102 | 53 | ||
103 | 54 | diff view generated by jsdifflib |
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | 1 | From: Shashi Mallela <shashi.mallela@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | This device is used by both ARM (BCM2836, for raspi2) and AArch64 | 3 | During sbsa acs level 3 testing, it is seen that the GIC maintenance |
4 | (BCM2837, for raspi3) targets, and is not CPU-specific. | 4 | interrupts are not triggered and the related test cases fail. This |
5 | Move it to common object, so we build it once for all targets. | 5 | is because we were incorrectly passing the value of the MISR register |
6 | (from maintenance_interrupt_state()) to qemu_set_irq() as the level | ||
7 | argument, whereas the device on the other end of this irq line | ||
8 | expects a 0/1 value. | ||
6 | 9 | ||
7 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | 10 | Fix the logic to pass a 0/1 level indication, rather than a |
8 | Message-id: 20190427133028.12874-1-philmd@redhat.com | 11 | 0/not-0 value. |
12 | |||
13 | Fixes: c5fc89b36c0 ("hw/intc/arm_gicv3: Implement gicv3_cpuif_virt_update()") | ||
14 | Signed-off-by: Shashi Mallela <shashi.mallela@linaro.org> | ||
15 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
16 | Message-id: 20210915205809.59068-1-shashi.mallela@linaro.org | ||
17 | [PMM: tweaked commit message; collapsed nested if()s into one] | ||
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 18 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 19 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 20 | --- |
12 | hw/dma/Makefile.objs | 2 +- | 21 | hw/intc/arm_gicv3_cpuif.c | 5 +++-- |
13 | 1 file changed, 1 insertion(+), 1 deletion(-) | 22 | 1 file changed, 3 insertions(+), 2 deletions(-) |
14 | 23 | ||
15 | diff --git a/hw/dma/Makefile.objs b/hw/dma/Makefile.objs | 24 | diff --git a/hw/intc/arm_gicv3_cpuif.c b/hw/intc/arm_gicv3_cpuif.c |
16 | index XXXXXXX..XXXXXXX 100644 | 25 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/hw/dma/Makefile.objs | 26 | --- a/hw/intc/arm_gicv3_cpuif.c |
18 | +++ b/hw/dma/Makefile.objs | 27 | +++ b/hw/intc/arm_gicv3_cpuif.c |
19 | @@ -XXX,XX +XXX,XX @@ common-obj-$(CONFIG_XLNX_ZYNQMP_ARM) += xlnx-zdma.o | 28 | @@ -XXX,XX +XXX,XX @@ static void gicv3_cpuif_virt_update(GICv3CPUState *cs) |
20 | 29 | } | |
21 | obj-$(CONFIG_OMAP) += omap_dma.o soc_dma.o | 30 | } |
22 | obj-$(CONFIG_PXA2XX) += pxa2xx_dma.o | 31 | |
23 | -obj-$(CONFIG_RASPI) += bcm2835_dma.o | 32 | - if (cs->ich_hcr_el2 & ICH_HCR_EL2_EN) { |
24 | +common-obj-$(CONFIG_RASPI) += bcm2835_dma.o | 33 | - maintlevel = maintenance_interrupt_state(cs); |
34 | + if ((cs->ich_hcr_el2 & ICH_HCR_EL2_EN) && | ||
35 | + maintenance_interrupt_state(cs) != 0) { | ||
36 | + maintlevel = 1; | ||
37 | } | ||
38 | |||
39 | trace_gicv3_cpuif_virt_set_irqs(gicv3_redist_affid(cs), fiqlevel, | ||
25 | -- | 40 | -- |
26 | 2.20.1 | 41 | 2.20.1 |
27 | 42 | ||
28 | 43 | diff view generated by jsdifflib |
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | 1 | From: Alexander Graf <agraf@csgraf.de> |
---|---|---|---|
2 | 2 | ||
3 | No code used the tc6393xb_gpio_in_get() and tc6393xb_gpio_out_set() | 3 | We will need PMC register definitions in accel specific code later. |
4 | functions since their introduction in commit 88d2c950b002. Time to | 4 | Move all constant definitions to common arm headers so we can reuse |
5 | remove them. | 5 | them. |
6 | 6 | ||
7 | Suggested-by: Markus Armbruster <armbru@redhat.com> | 7 | Signed-off-by: Alexander Graf <agraf@csgraf.de> |
8 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
9 | Message-id: 20190412165416.7977-4-philmd@redhat.com | ||
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
9 | Message-id: 20210916155404.86958-2-agraf@csgraf.de | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | --- | 11 | --- |
13 | include/hw/devices.h | 3 --- | 12 | target/arm/internals.h | 44 ++++++++++++++++++++++++++++++++++++++++++ |
14 | hw/display/tc6393xb.c | 16 ---------------- | 13 | target/arm/helper.c | 44 ------------------------------------------ |
15 | 2 files changed, 19 deletions(-) | 14 | 2 files changed, 44 insertions(+), 44 deletions(-) |
16 | 15 | ||
17 | diff --git a/include/hw/devices.h b/include/hw/devices.h | 16 | diff --git a/target/arm/internals.h b/target/arm/internals.h |
18 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
19 | --- a/include/hw/devices.h | 18 | --- a/target/arm/internals.h |
20 | +++ b/include/hw/devices.h | 19 | +++ b/target/arm/internals.h |
21 | @@ -XXX,XX +XXX,XX @@ void retu_key_event(void *retu, int state); | 20 | @@ -XXX,XX +XXX,XX @@ enum MVEECIState { |
22 | typedef struct TC6393xbState TC6393xbState; | 21 | /* All other values reserved */ |
23 | TC6393xbState *tc6393xb_init(struct MemoryRegion *sysmem, | 22 | }; |
24 | uint32_t base, qemu_irq irq); | 23 | |
25 | -void tc6393xb_gpio_out_set(TC6393xbState *s, int line, | 24 | +/* Definitions for the PMU registers */ |
26 | - qemu_irq handler); | 25 | +#define PMCRN_MASK 0xf800 |
27 | -qemu_irq *tc6393xb_gpio_in_get(TC6393xbState *s); | 26 | +#define PMCRN_SHIFT 11 |
28 | qemu_irq tc6393xb_l3v_get(TC6393xbState *s); | 27 | +#define PMCRLC 0x40 |
29 | 28 | +#define PMCRDP 0x20 | |
29 | +#define PMCRX 0x10 | ||
30 | +#define PMCRD 0x8 | ||
31 | +#define PMCRC 0x4 | ||
32 | +#define PMCRP 0x2 | ||
33 | +#define PMCRE 0x1 | ||
34 | +/* | ||
35 | + * Mask of PMCR bits writeable by guest (not including WO bits like C, P, | ||
36 | + * which can be written as 1 to trigger behaviour but which stay RAZ). | ||
37 | + */ | ||
38 | +#define PMCR_WRITEABLE_MASK (PMCRLC | PMCRDP | PMCRX | PMCRD | PMCRE) | ||
39 | + | ||
40 | +#define PMXEVTYPER_P 0x80000000 | ||
41 | +#define PMXEVTYPER_U 0x40000000 | ||
42 | +#define PMXEVTYPER_NSK 0x20000000 | ||
43 | +#define PMXEVTYPER_NSU 0x10000000 | ||
44 | +#define PMXEVTYPER_NSH 0x08000000 | ||
45 | +#define PMXEVTYPER_M 0x04000000 | ||
46 | +#define PMXEVTYPER_MT 0x02000000 | ||
47 | +#define PMXEVTYPER_EVTCOUNT 0x0000ffff | ||
48 | +#define PMXEVTYPER_MASK (PMXEVTYPER_P | PMXEVTYPER_U | PMXEVTYPER_NSK | \ | ||
49 | + PMXEVTYPER_NSU | PMXEVTYPER_NSH | \ | ||
50 | + PMXEVTYPER_M | PMXEVTYPER_MT | \ | ||
51 | + PMXEVTYPER_EVTCOUNT) | ||
52 | + | ||
53 | +#define PMCCFILTR 0xf8000000 | ||
54 | +#define PMCCFILTR_M PMXEVTYPER_M | ||
55 | +#define PMCCFILTR_EL0 (PMCCFILTR | PMCCFILTR_M) | ||
56 | + | ||
57 | +static inline uint32_t pmu_num_counters(CPUARMState *env) | ||
58 | +{ | ||
59 | + return (env->cp15.c9_pmcr & PMCRN_MASK) >> PMCRN_SHIFT; | ||
60 | +} | ||
61 | + | ||
62 | +/* Bits allowed to be set/cleared for PMCNTEN* and PMINTEN* */ | ||
63 | +static inline uint64_t pmu_counter_mask(CPUARMState *env) | ||
64 | +{ | ||
65 | + return (1 << 31) | ((1 << pmu_num_counters(env)) - 1); | ||
66 | +} | ||
67 | + | ||
30 | #endif | 68 | #endif |
31 | diff --git a/hw/display/tc6393xb.c b/hw/display/tc6393xb.c | 69 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
32 | index XXXXXXX..XXXXXXX 100644 | 70 | index XXXXXXX..XXXXXXX 100644 |
33 | --- a/hw/display/tc6393xb.c | 71 | --- a/target/arm/helper.c |
34 | +++ b/hw/display/tc6393xb.c | 72 | +++ b/target/arm/helper.c |
35 | @@ -XXX,XX +XXX,XX @@ struct TC6393xbState { | 73 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo v6_cp_reginfo[] = { |
36 | blanked : 1; | 74 | REGINFO_SENTINEL |
37 | }; | 75 | }; |
38 | 76 | ||
39 | -qemu_irq *tc6393xb_gpio_in_get(TC6393xbState *s) | 77 | -/* Definitions for the PMU registers */ |
78 | -#define PMCRN_MASK 0xf800 | ||
79 | -#define PMCRN_SHIFT 11 | ||
80 | -#define PMCRLC 0x40 | ||
81 | -#define PMCRDP 0x20 | ||
82 | -#define PMCRX 0x10 | ||
83 | -#define PMCRD 0x8 | ||
84 | -#define PMCRC 0x4 | ||
85 | -#define PMCRP 0x2 | ||
86 | -#define PMCRE 0x1 | ||
87 | -/* | ||
88 | - * Mask of PMCR bits writeable by guest (not including WO bits like C, P, | ||
89 | - * which can be written as 1 to trigger behaviour but which stay RAZ). | ||
90 | - */ | ||
91 | -#define PMCR_WRITEABLE_MASK (PMCRLC | PMCRDP | PMCRX | PMCRD | PMCRE) | ||
92 | - | ||
93 | -#define PMXEVTYPER_P 0x80000000 | ||
94 | -#define PMXEVTYPER_U 0x40000000 | ||
95 | -#define PMXEVTYPER_NSK 0x20000000 | ||
96 | -#define PMXEVTYPER_NSU 0x10000000 | ||
97 | -#define PMXEVTYPER_NSH 0x08000000 | ||
98 | -#define PMXEVTYPER_M 0x04000000 | ||
99 | -#define PMXEVTYPER_MT 0x02000000 | ||
100 | -#define PMXEVTYPER_EVTCOUNT 0x0000ffff | ||
101 | -#define PMXEVTYPER_MASK (PMXEVTYPER_P | PMXEVTYPER_U | PMXEVTYPER_NSK | \ | ||
102 | - PMXEVTYPER_NSU | PMXEVTYPER_NSH | \ | ||
103 | - PMXEVTYPER_M | PMXEVTYPER_MT | \ | ||
104 | - PMXEVTYPER_EVTCOUNT) | ||
105 | - | ||
106 | -#define PMCCFILTR 0xf8000000 | ||
107 | -#define PMCCFILTR_M PMXEVTYPER_M | ||
108 | -#define PMCCFILTR_EL0 (PMCCFILTR | PMCCFILTR_M) | ||
109 | - | ||
110 | -static inline uint32_t pmu_num_counters(CPUARMState *env) | ||
40 | -{ | 111 | -{ |
41 | - return s->gpio_in; | 112 | - return (env->cp15.c9_pmcr & PMCRN_MASK) >> PMCRN_SHIFT; |
42 | -} | 113 | -} |
43 | - | 114 | - |
44 | static void tc6393xb_gpio_set(void *opaque, int line, int level) | 115 | -/* Bits allowed to be set/cleared for PMCNTEN* and PMINTEN* */ |
45 | { | 116 | -static inline uint64_t pmu_counter_mask(CPUARMState *env) |
46 | // TC6393xbState *s = opaque; | ||
47 | @@ -XXX,XX +XXX,XX @@ static void tc6393xb_gpio_set(void *opaque, int line, int level) | ||
48 | // FIXME: how does the chip reflect the GPIO input level change? | ||
49 | } | ||
50 | |||
51 | -void tc6393xb_gpio_out_set(TC6393xbState *s, int line, | ||
52 | - qemu_irq handler) | ||
53 | -{ | 117 | -{ |
54 | - if (line >= TC6393XB_GPIOS) { | 118 | - return (1 << 31) | ((1 << pmu_num_counters(env)) - 1); |
55 | - fprintf(stderr, "TC6393xb: no GPIO pin %d\n", line); | ||
56 | - return; | ||
57 | - } | ||
58 | - | ||
59 | - s->handler[line] = handler; | ||
60 | -} | 119 | -} |
61 | - | 120 | - |
62 | static void tc6393xb_gpio_handler_update(TC6393xbState *s) | 121 | typedef struct pm_event { |
63 | { | 122 | uint16_t number; /* PMEVTYPER.evtCount is 16 bits wide */ |
64 | uint32_t level, diff; | 123 | /* If the event is supported on this CPU (used to generate PMCEID[01]) */ |
65 | -- | 124 | -- |
66 | 2.20.1 | 125 | 2.20.1 |
67 | 126 | ||
68 | 127 | diff view generated by jsdifflib |
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | 1 | From: Alexander Graf <agraf@csgraf.de> |
---|---|---|---|
2 | 2 | ||
3 | Suggested-by: Markus Armbruster <armbru@redhat.com> | 3 | Hvf's permission bitmap during and after dirty logging does not include |
4 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | 4 | the HV_MEMORY_EXEC permission. At least on Apple Silicon, this leads to |
5 | Message-id: 20190412165416.7977-3-philmd@redhat.com | 5 | instruction faults once dirty logging was enabled. |
6 | |||
7 | Add the bit to make it work properly. | ||
8 | |||
9 | Signed-off-by: Alexander Graf <agraf@csgraf.de> | ||
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
11 | Message-id: 20210916155404.86958-3-agraf@csgraf.de | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
8 | --- | 13 | --- |
9 | hw/arm/nseries.c | 3 ++- | 14 | accel/hvf/hvf-accel-ops.c | 4 ++-- |
10 | 1 file changed, 2 insertions(+), 1 deletion(-) | 15 | 1 file changed, 2 insertions(+), 2 deletions(-) |
11 | 16 | ||
12 | diff --git a/hw/arm/nseries.c b/hw/arm/nseries.c | 17 | diff --git a/accel/hvf/hvf-accel-ops.c b/accel/hvf/hvf-accel-ops.c |
13 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
14 | --- a/hw/arm/nseries.c | 19 | --- a/accel/hvf/hvf-accel-ops.c |
15 | +++ b/hw/arm/nseries.c | 20 | +++ b/accel/hvf/hvf-accel-ops.c |
16 | @@ -XXX,XX +XXX,XX @@ | 21 | @@ -XXX,XX +XXX,XX @@ static void hvf_set_dirty_tracking(MemoryRegionSection *section, bool on) |
17 | #include "hw/boards.h" | 22 | if (on) { |
18 | #include "hw/i2c/i2c.h" | 23 | slot->flags |= HVF_SLOT_LOG; |
19 | #include "hw/devices.h" | 24 | hv_vm_protect((uintptr_t)slot->start, (size_t)slot->size, |
20 | +#include "hw/misc/tmp105.h" | 25 | - HV_MEMORY_READ); |
21 | #include "hw/block/flash.h" | 26 | + HV_MEMORY_READ | HV_MEMORY_EXEC); |
22 | #include "hw/hw.h" | 27 | /* stop tracking region*/ |
23 | #include "hw/bt.h" | 28 | } else { |
24 | @@ -XXX,XX +XXX,XX @@ static void n8x0_i2c_setup(struct n800_s *s) | 29 | slot->flags &= ~HVF_SLOT_LOG; |
25 | qemu_register_powerdown_notifier(&n8x0_system_powerdown_notifier); | 30 | hv_vm_protect((uintptr_t)slot->start, (size_t)slot->size, |
26 | 31 | - HV_MEMORY_READ | HV_MEMORY_WRITE); | |
27 | /* Attach a TMP105 PM chip (A0 wired to ground) */ | 32 | + HV_MEMORY_READ | HV_MEMORY_WRITE | HV_MEMORY_EXEC); |
28 | - dev = i2c_create_slave(i2c, "tmp105", N8X0_TMP105_ADDR); | 33 | } |
29 | + dev = i2c_create_slave(i2c, TYPE_TMP105, N8X0_TMP105_ADDR); | ||
30 | qdev_connect_gpio_out(dev, 0, tmp_irq); | ||
31 | } | 34 | } |
32 | 35 | ||
33 | -- | 36 | -- |
34 | 2.20.1 | 37 | 2.20.1 |
35 | 38 | ||
36 | 39 | diff view generated by jsdifflib |
1 | Add a new helper function which returns the MMU index to use | 1 | From: Alexander Graf <agraf@csgraf.de> |
---|---|---|---|
2 | for v7M, where the caller specifies all of the security | ||
3 | state, privilege level and whether the execution priority | ||
4 | is negative, and reimplement the existing | ||
5 | arm_v7m_mmu_idx_for_secstate_and_priv() in terms of it. | ||
6 | 2 | ||
7 | We are going to need this for the lazy-FP-stacking code. | 3 | We will need to install a migration helper for the ARM hvf backend. |
4 | Let's introduce an arch callback for the overall hvf init chain to | ||
5 | do so. | ||
8 | 6 | ||
7 | Signed-off-by: Alexander Graf <agraf@csgraf.de> | ||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | Message-id: 20210916155404.86958-4-agraf@csgraf.de | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
11 | Message-id: 20190416125744.27770-21-peter.maydell@linaro.org | ||
12 | --- | 11 | --- |
13 | target/arm/cpu.h | 7 +++++++ | 12 | include/sysemu/hvf_int.h | 1 + |
14 | target/arm/helper.c | 14 +++++++++++--- | 13 | accel/hvf/hvf-accel-ops.c | 3 ++- |
15 | 2 files changed, 18 insertions(+), 3 deletions(-) | 14 | target/i386/hvf/hvf.c | 5 +++++ |
15 | 3 files changed, 8 insertions(+), 1 deletion(-) | ||
16 | 16 | ||
17 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 17 | diff --git a/include/sysemu/hvf_int.h b/include/sysemu/hvf_int.h |
18 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
19 | --- a/target/arm/cpu.h | 19 | --- a/include/sysemu/hvf_int.h |
20 | +++ b/target/arm/cpu.h | 20 | +++ b/include/sysemu/hvf_int.h |
21 | @@ -XXX,XX +XXX,XX @@ static inline int arm_mmu_idx_to_el(ARMMMUIdx mmu_idx) | 21 | @@ -XXX,XX +XXX,XX @@ struct hvf_vcpu_state { |
22 | } | 22 | }; |
23 | |||
24 | void assert_hvf_ok(hv_return_t ret); | ||
25 | +int hvf_arch_init(void); | ||
26 | int hvf_arch_init_vcpu(CPUState *cpu); | ||
27 | void hvf_arch_vcpu_destroy(CPUState *cpu); | ||
28 | int hvf_vcpu_exec(CPUState *); | ||
29 | diff --git a/accel/hvf/hvf-accel-ops.c b/accel/hvf/hvf-accel-ops.c | ||
30 | index XXXXXXX..XXXXXXX 100644 | ||
31 | --- a/accel/hvf/hvf-accel-ops.c | ||
32 | +++ b/accel/hvf/hvf-accel-ops.c | ||
33 | @@ -XXX,XX +XXX,XX @@ static int hvf_accel_init(MachineState *ms) | ||
34 | |||
35 | hvf_state = s; | ||
36 | memory_listener_register(&hvf_memory_listener, &address_space_memory); | ||
37 | - return 0; | ||
38 | + | ||
39 | + return hvf_arch_init(); | ||
23 | } | 40 | } |
24 | 41 | ||
25 | +/* | 42 | static void hvf_accel_class_init(ObjectClass *oc, void *data) |
26 | + * Return the MMU index for a v7M CPU with all relevant information | 43 | diff --git a/target/i386/hvf/hvf.c b/target/i386/hvf/hvf.c |
27 | + * manually specified. | ||
28 | + */ | ||
29 | +ARMMMUIdx arm_v7m_mmu_idx_all(CPUARMState *env, | ||
30 | + bool secstate, bool priv, bool negpri); | ||
31 | + | ||
32 | /* Return the MMU index for a v7M CPU in the specified security and | ||
33 | * privilege state. | ||
34 | */ | ||
35 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
36 | index XXXXXXX..XXXXXXX 100644 | 44 | index XXXXXXX..XXXXXXX 100644 |
37 | --- a/target/arm/helper.c | 45 | --- a/target/i386/hvf/hvf.c |
38 | +++ b/target/arm/helper.c | 46 | +++ b/target/i386/hvf/hvf.c |
39 | @@ -XXX,XX +XXX,XX @@ int fp_exception_el(CPUARMState *env, int cur_el) | 47 | @@ -XXX,XX +XXX,XX @@ static inline bool apic_bus_freq_is_known(CPUX86State *env) |
40 | return 0; | 48 | return env->apic_bus_freq != 0; |
41 | } | 49 | } |
42 | 50 | ||
43 | -ARMMMUIdx arm_v7m_mmu_idx_for_secstate_and_priv(CPUARMState *env, | 51 | +int hvf_arch_init(void) |
44 | - bool secstate, bool priv) | ||
45 | +ARMMMUIdx arm_v7m_mmu_idx_all(CPUARMState *env, | ||
46 | + bool secstate, bool priv, bool negpri) | ||
47 | { | ||
48 | ARMMMUIdx mmu_idx = ARM_MMU_IDX_M; | ||
49 | |||
50 | @@ -XXX,XX +XXX,XX @@ ARMMMUIdx arm_v7m_mmu_idx_for_secstate_and_priv(CPUARMState *env, | ||
51 | mmu_idx |= ARM_MMU_IDX_M_PRIV; | ||
52 | } | ||
53 | |||
54 | - if (armv7m_nvic_neg_prio_requested(env->nvic, secstate)) { | ||
55 | + if (negpri) { | ||
56 | mmu_idx |= ARM_MMU_IDX_M_NEGPRI; | ||
57 | } | ||
58 | |||
59 | @@ -XXX,XX +XXX,XX @@ ARMMMUIdx arm_v7m_mmu_idx_for_secstate_and_priv(CPUARMState *env, | ||
60 | return mmu_idx; | ||
61 | } | ||
62 | |||
63 | +ARMMMUIdx arm_v7m_mmu_idx_for_secstate_and_priv(CPUARMState *env, | ||
64 | + bool secstate, bool priv) | ||
65 | +{ | 52 | +{ |
66 | + bool negpri = armv7m_nvic_neg_prio_requested(env->nvic, secstate); | 53 | + return 0; |
67 | + | ||
68 | + return arm_v7m_mmu_idx_all(env, secstate, priv, negpri); | ||
69 | +} | 54 | +} |
70 | + | 55 | + |
71 | /* Return the MMU index for a v7M CPU in the specified security state */ | 56 | int hvf_arch_init_vcpu(CPUState *cpu) |
72 | ARMMMUIdx arm_v7m_mmu_idx_for_secstate(CPUARMState *env, bool secstate) | ||
73 | { | 57 | { |
58 | X86CPU *x86cpu = X86_CPU(cpu); | ||
74 | -- | 59 | -- |
75 | 2.20.1 | 60 | 2.20.1 |
76 | 61 | ||
77 | 62 | diff view generated by jsdifflib |
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | 1 | From: Alexander Graf <agraf@csgraf.de> |
---|---|---|---|
2 | 2 | ||
3 | Since uWireSlave is only used in this new header, there is no | 3 | With Apple Silicon available to the masses, it's a good time to add support |
4 | need to expose it via "qemu/typedefs.h". | 4 | for driving its virtualization extensions from QEMU. |
5 | 5 | ||
6 | Reviewed-by: Markus Armbruster <armbru@redhat.com> | 6 | This patch adds all necessary architecture specific code to get basic VMs |
7 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | 7 | working, including save/restore. |
8 | Message-id: 20190412165416.7977-9-philmd@redhat.com | 8 | |
9 | Known limitations: | ||
10 | |||
11 | - WFI handling is missing (follows in later patch) | ||
12 | - No watchpoint/breakpoint support | ||
13 | |||
14 | Signed-off-by: Alexander Graf <agraf@csgraf.de> | ||
15 | Reviewed-by: Roman Bolshakov <r.bolshakov@yadro.com> | ||
16 | Reviewed-by: Sergio Lopez <slp@redhat.com> | ||
17 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
18 | Message-id: 20210916155404.86958-5-agraf@csgraf.de | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 19 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | --- | 20 | --- |
11 | include/hw/arm/omap.h | 6 +----- | 21 | meson.build | 1 + |
12 | include/hw/devices.h | 15 --------------- | 22 | include/sysemu/hvf_int.h | 10 +- |
13 | include/hw/input/tsc2xxx.h | 36 ++++++++++++++++++++++++++++++++++++ | 23 | accel/hvf/hvf-accel-ops.c | 9 + |
14 | include/qemu/typedefs.h | 1 - | 24 | target/arm/hvf/hvf.c | 794 ++++++++++++++++++++++++++++++++++++ |
15 | hw/arm/nseries.c | 2 +- | 25 | target/i386/hvf/hvf.c | 5 + |
16 | hw/arm/palm.c | 2 +- | 26 | MAINTAINERS | 5 + |
17 | hw/input/tsc2005.c | 2 +- | 27 | target/arm/hvf/trace-events | 10 + |
18 | hw/input/tsc210x.c | 4 ++-- | 28 | 7 files changed, 833 insertions(+), 1 deletion(-) |
19 | MAINTAINERS | 2 ++ | 29 | create mode 100644 target/arm/hvf/hvf.c |
20 | 9 files changed, 44 insertions(+), 26 deletions(-) | 30 | create mode 100644 target/arm/hvf/trace-events |
21 | create mode 100644 include/hw/input/tsc2xxx.h | ||
22 | 31 | ||
23 | diff --git a/include/hw/arm/omap.h b/include/hw/arm/omap.h | 32 | diff --git a/meson.build b/meson.build |
24 | index XXXXXXX..XXXXXXX 100644 | 33 | index XXXXXXX..XXXXXXX 100644 |
25 | --- a/include/hw/arm/omap.h | 34 | --- a/meson.build |
26 | +++ b/include/hw/arm/omap.h | 35 | +++ b/meson.build |
36 | @@ -XXX,XX +XXX,XX @@ if have_system or have_user | ||
37 | 'accel/tcg', | ||
38 | 'hw/core', | ||
39 | 'target/arm', | ||
40 | + 'target/arm/hvf', | ||
41 | 'target/hppa', | ||
42 | 'target/i386', | ||
43 | 'target/i386/kvm', | ||
44 | diff --git a/include/sysemu/hvf_int.h b/include/sysemu/hvf_int.h | ||
45 | index XXXXXXX..XXXXXXX 100644 | ||
46 | --- a/include/sysemu/hvf_int.h | ||
47 | +++ b/include/sysemu/hvf_int.h | ||
27 | @@ -XXX,XX +XXX,XX @@ | 48 | @@ -XXX,XX +XXX,XX @@ |
28 | #include "exec/memory.h" | 49 | #ifndef HVF_INT_H |
29 | # define hw_omap_h "omap.h" | 50 | #define HVF_INT_H |
30 | #include "hw/irq.h" | 51 | |
31 | +#include "hw/input/tsc2xxx.h" | 52 | +#ifdef __aarch64__ |
32 | #include "target/arm/cpu-qom.h" | 53 | +#include <Hypervisor/Hypervisor.h> |
33 | #include "qemu/log.h" | 54 | +#else |
34 | 55 | #include <Hypervisor/hv.h> | |
35 | @@ -XXX,XX +XXX,XX @@ qemu_irq *omap_mpuio_in_get(struct omap_mpuio_s *s); | 56 | +#endif |
36 | void omap_mpuio_out_set(struct omap_mpuio_s *s, int line, qemu_irq handler); | 57 | |
37 | void omap_mpuio_key(struct omap_mpuio_s *s, int row, int col, int down); | 58 | /* hvf_slot flags */ |
38 | 59 | #define HVF_SLOT_LOG (1 << 0) | |
39 | -struct uWireSlave { | 60 | @@ -XXX,XX +XXX,XX @@ struct HVFState { |
40 | - uint16_t (*receive)(void *opaque); | 61 | int num_slots; |
41 | - void (*send)(void *opaque, uint16_t data); | 62 | |
42 | - void *opaque; | 63 | hvf_vcpu_caps *hvf_caps; |
43 | -}; | 64 | + uint64_t vtimer_offset; |
44 | struct omap_uwire_s; | 65 | }; |
45 | void omap_uwire_attach(struct omap_uwire_s *s, | 66 | extern HVFState *hvf_state; |
46 | uWireSlave *slave, int chipselect); | 67 | |
47 | diff --git a/include/hw/devices.h b/include/hw/devices.h | 68 | struct hvf_vcpu_state { |
69 | - int fd; | ||
70 | + uint64_t fd; | ||
71 | + void *exit; | ||
72 | + bool vtimer_masked; | ||
73 | }; | ||
74 | |||
75 | void assert_hvf_ok(hv_return_t ret); | ||
76 | @@ -XXX,XX +XXX,XX @@ int hvf_vcpu_exec(CPUState *); | ||
77 | hvf_slot *hvf_find_overlap_slot(uint64_t, uint64_t); | ||
78 | int hvf_put_registers(CPUState *); | ||
79 | int hvf_get_registers(CPUState *); | ||
80 | +void hvf_kick_vcpu_thread(CPUState *cpu); | ||
81 | |||
82 | #endif | ||
83 | diff --git a/accel/hvf/hvf-accel-ops.c b/accel/hvf/hvf-accel-ops.c | ||
48 | index XXXXXXX..XXXXXXX 100644 | 84 | index XXXXXXX..XXXXXXX 100644 |
49 | --- a/include/hw/devices.h | 85 | --- a/accel/hvf/hvf-accel-ops.c |
50 | +++ b/include/hw/devices.h | 86 | +++ b/accel/hvf/hvf-accel-ops.c |
51 | @@ -XXX,XX +XXX,XX @@ | 87 | @@ -XXX,XX +XXX,XX @@ |
52 | /* Devices that have nowhere better to go. */ | 88 | |
53 | 89 | HVFState *hvf_state; | |
54 | #include "hw/hw.h" | 90 | |
55 | -#include "ui/console.h" | 91 | +#ifdef __aarch64__ |
56 | 92 | +#define HV_VM_DEFAULT NULL | |
57 | /* smc91c111.c */ | 93 | +#endif |
58 | void smc91c111_init(NICInfo *, uint32_t, qemu_irq); | 94 | + |
59 | @@ -XXX,XX +XXX,XX @@ void smc91c111_init(NICInfo *, uint32_t, qemu_irq); | 95 | /* Memory slots */ |
60 | /* lan9118.c */ | 96 | |
61 | void lan9118_init(NICInfo *, uint32_t, qemu_irq); | 97 | hvf_slot *hvf_find_overlap_slot(uint64_t start, uint64_t size) |
62 | 98 | @@ -XXX,XX +XXX,XX @@ static int hvf_init_vcpu(CPUState *cpu) | |
63 | -/* tsc210x.c */ | 99 | pthread_sigmask(SIG_BLOCK, NULL, &set); |
64 | -uWireSlave *tsc2102_init(qemu_irq pint); | 100 | sigdelset(&set, SIG_IPI); |
65 | -uWireSlave *tsc2301_init(qemu_irq penirq, qemu_irq kbirq, qemu_irq dav); | 101 | |
66 | -I2SCodec *tsc210x_codec(uWireSlave *chip); | 102 | +#ifdef __aarch64__ |
67 | -uint32_t tsc210x_txrx(void *opaque, uint32_t value, int len); | 103 | + r = hv_vcpu_create(&cpu->hvf->fd, (hv_vcpu_exit_t **)&cpu->hvf->exit, NULL); |
68 | -void tsc210x_set_transform(uWireSlave *chip, | 104 | +#else |
69 | - MouseTransformInfo *info); | 105 | r = hv_vcpu_create((hv_vcpuid_t *)&cpu->hvf->fd, HV_VCPU_DEFAULT); |
70 | -void tsc210x_key_event(uWireSlave *chip, int key, int down); | 106 | +#endif |
71 | - | 107 | cpu->vcpu_dirty = 1; |
72 | -/* tsc2005.c */ | 108 | assert_hvf_ok(r); |
73 | -void *tsc2005_init(qemu_irq pintdav); | 109 | |
74 | -uint32_t tsc2005_txrx(void *opaque, uint32_t value, int len); | 110 | @@ -XXX,XX +XXX,XX @@ static void hvf_accel_ops_class_init(ObjectClass *oc, void *data) |
75 | -void tsc2005_set_transform(void *opaque, MouseTransformInfo *info); | 111 | AccelOpsClass *ops = ACCEL_OPS_CLASS(oc); |
76 | - | 112 | |
77 | #endif | 113 | ops->create_vcpu_thread = hvf_start_vcpu_thread; |
78 | diff --git a/include/hw/input/tsc2xxx.h b/include/hw/input/tsc2xxx.h | 114 | + ops->kick_vcpu_thread = hvf_kick_vcpu_thread; |
115 | |||
116 | ops->synchronize_post_reset = hvf_cpu_synchronize_post_reset; | ||
117 | ops->synchronize_post_init = hvf_cpu_synchronize_post_init; | ||
118 | diff --git a/target/arm/hvf/hvf.c b/target/arm/hvf/hvf.c | ||
79 | new file mode 100644 | 119 | new file mode 100644 |
80 | index XXXXXXX..XXXXXXX | 120 | index XXXXXXX..XXXXXXX |
81 | --- /dev/null | 121 | --- /dev/null |
82 | +++ b/include/hw/input/tsc2xxx.h | 122 | +++ b/target/arm/hvf/hvf.c |
83 | @@ -XXX,XX +XXX,XX @@ | 123 | @@ -XXX,XX +XXX,XX @@ |
84 | +/* | 124 | +/* |
85 | + * TI touchscreen controller | 125 | + * QEMU Hypervisor.framework support for Apple Silicon |
86 | + * | 126 | + |
87 | + * Copyright (c) 2006 Andrzej Zaborowski | 127 | + * Copyright 2020 Alexander Graf <agraf@csgraf.de> |
88 | + * Copyright (C) 2008 Nokia Corporation | ||
89 | + * | 128 | + * |
90 | + * This work is licensed under the terms of the GNU GPL, version 2 or later. | 129 | + * This work is licensed under the terms of the GNU GPL, version 2 or later. |
91 | + * See the COPYING file in the top-level directory. | 130 | + * See the COPYING file in the top-level directory. |
131 | + * | ||
92 | + */ | 132 | + */ |
93 | + | 133 | + |
94 | +#ifndef HW_INPUT_TSC2XXX_H | 134 | +#include "qemu/osdep.h" |
95 | +#define HW_INPUT_TSC2XXX_H | 135 | +#include "qemu-common.h" |
96 | + | 136 | +#include "qemu/error-report.h" |
137 | + | ||
138 | +#include "sysemu/runstate.h" | ||
139 | +#include "sysemu/hvf.h" | ||
140 | +#include "sysemu/hvf_int.h" | ||
141 | +#include "sysemu/hw_accel.h" | ||
142 | + | ||
143 | +#include <mach/mach_time.h> | ||
144 | + | ||
145 | +#include "exec/address-spaces.h" | ||
97 | +#include "hw/irq.h" | 146 | +#include "hw/irq.h" |
98 | +#include "ui/console.h" | 147 | +#include "qemu/main-loop.h" |
99 | + | 148 | +#include "sysemu/cpus.h" |
100 | +typedef struct uWireSlave { | 149 | +#include "target/arm/cpu.h" |
101 | + uint16_t (*receive)(void *opaque); | 150 | +#include "target/arm/internals.h" |
102 | + void (*send)(void *opaque, uint16_t data); | 151 | +#include "trace/trace-target_arm_hvf.h" |
103 | + void *opaque; | 152 | +#include "migration/vmstate.h" |
104 | +} uWireSlave; | 153 | + |
105 | + | 154 | +#define HVF_SYSREG(crn, crm, op0, op1, op2) \ |
106 | +/* tsc210x.c */ | 155 | + ENCODE_AA64_CP_REG(CP_REG_ARM64_SYSREG_CP, crn, crm, op0, op1, op2) |
107 | +uWireSlave *tsc2102_init(qemu_irq pint); | 156 | +#define PL1_WRITE_MASK 0x4 |
108 | +uWireSlave *tsc2301_init(qemu_irq penirq, qemu_irq kbirq, qemu_irq dav); | 157 | + |
109 | +I2SCodec *tsc210x_codec(uWireSlave *chip); | 158 | +#define SYSREG(op0, op1, crn, crm, op2) \ |
110 | +uint32_t tsc210x_txrx(void *opaque, uint32_t value, int len); | 159 | + ((op0 << 20) | (op2 << 17) | (op1 << 14) | (crn << 10) | (crm << 1)) |
111 | +void tsc210x_set_transform(uWireSlave *chip, MouseTransformInfo *info); | 160 | +#define SYSREG_MASK SYSREG(0x3, 0x7, 0xf, 0xf, 0x7) |
112 | +void tsc210x_key_event(uWireSlave *chip, int key, int down); | 161 | +#define SYSREG_OSLAR_EL1 SYSREG(2, 0, 1, 0, 4) |
113 | + | 162 | +#define SYSREG_OSLSR_EL1 SYSREG(2, 0, 1, 1, 4) |
114 | +/* tsc2005.c */ | 163 | +#define SYSREG_OSDLR_EL1 SYSREG(2, 0, 1, 3, 4) |
115 | +void *tsc2005_init(qemu_irq pintdav); | 164 | +#define SYSREG_CNTPCT_EL0 SYSREG(3, 3, 14, 0, 1) |
116 | +uint32_t tsc2005_txrx(void *opaque, uint32_t value, int len); | 165 | + |
117 | +void tsc2005_set_transform(void *opaque, MouseTransformInfo *info); | 166 | +#define WFX_IS_WFE (1 << 0) |
118 | + | 167 | + |
168 | +#define TMR_CTL_ENABLE (1 << 0) | ||
169 | +#define TMR_CTL_IMASK (1 << 1) | ||
170 | +#define TMR_CTL_ISTATUS (1 << 2) | ||
171 | + | ||
172 | +typedef struct HVFVTimer { | ||
173 | + /* Vtimer value during migration and paused state */ | ||
174 | + uint64_t vtimer_val; | ||
175 | +} HVFVTimer; | ||
176 | + | ||
177 | +static HVFVTimer vtimer; | ||
178 | + | ||
179 | +struct hvf_reg_match { | ||
180 | + int reg; | ||
181 | + uint64_t offset; | ||
182 | +}; | ||
183 | + | ||
184 | +static const struct hvf_reg_match hvf_reg_match[] = { | ||
185 | + { HV_REG_X0, offsetof(CPUARMState, xregs[0]) }, | ||
186 | + { HV_REG_X1, offsetof(CPUARMState, xregs[1]) }, | ||
187 | + { HV_REG_X2, offsetof(CPUARMState, xregs[2]) }, | ||
188 | + { HV_REG_X3, offsetof(CPUARMState, xregs[3]) }, | ||
189 | + { HV_REG_X4, offsetof(CPUARMState, xregs[4]) }, | ||
190 | + { HV_REG_X5, offsetof(CPUARMState, xregs[5]) }, | ||
191 | + { HV_REG_X6, offsetof(CPUARMState, xregs[6]) }, | ||
192 | + { HV_REG_X7, offsetof(CPUARMState, xregs[7]) }, | ||
193 | + { HV_REG_X8, offsetof(CPUARMState, xregs[8]) }, | ||
194 | + { HV_REG_X9, offsetof(CPUARMState, xregs[9]) }, | ||
195 | + { HV_REG_X10, offsetof(CPUARMState, xregs[10]) }, | ||
196 | + { HV_REG_X11, offsetof(CPUARMState, xregs[11]) }, | ||
197 | + { HV_REG_X12, offsetof(CPUARMState, xregs[12]) }, | ||
198 | + { HV_REG_X13, offsetof(CPUARMState, xregs[13]) }, | ||
199 | + { HV_REG_X14, offsetof(CPUARMState, xregs[14]) }, | ||
200 | + { HV_REG_X15, offsetof(CPUARMState, xregs[15]) }, | ||
201 | + { HV_REG_X16, offsetof(CPUARMState, xregs[16]) }, | ||
202 | + { HV_REG_X17, offsetof(CPUARMState, xregs[17]) }, | ||
203 | + { HV_REG_X18, offsetof(CPUARMState, xregs[18]) }, | ||
204 | + { HV_REG_X19, offsetof(CPUARMState, xregs[19]) }, | ||
205 | + { HV_REG_X20, offsetof(CPUARMState, xregs[20]) }, | ||
206 | + { HV_REG_X21, offsetof(CPUARMState, xregs[21]) }, | ||
207 | + { HV_REG_X22, offsetof(CPUARMState, xregs[22]) }, | ||
208 | + { HV_REG_X23, offsetof(CPUARMState, xregs[23]) }, | ||
209 | + { HV_REG_X24, offsetof(CPUARMState, xregs[24]) }, | ||
210 | + { HV_REG_X25, offsetof(CPUARMState, xregs[25]) }, | ||
211 | + { HV_REG_X26, offsetof(CPUARMState, xregs[26]) }, | ||
212 | + { HV_REG_X27, offsetof(CPUARMState, xregs[27]) }, | ||
213 | + { HV_REG_X28, offsetof(CPUARMState, xregs[28]) }, | ||
214 | + { HV_REG_X29, offsetof(CPUARMState, xregs[29]) }, | ||
215 | + { HV_REG_X30, offsetof(CPUARMState, xregs[30]) }, | ||
216 | + { HV_REG_PC, offsetof(CPUARMState, pc) }, | ||
217 | +}; | ||
218 | + | ||
219 | +static const struct hvf_reg_match hvf_fpreg_match[] = { | ||
220 | + { HV_SIMD_FP_REG_Q0, offsetof(CPUARMState, vfp.zregs[0]) }, | ||
221 | + { HV_SIMD_FP_REG_Q1, offsetof(CPUARMState, vfp.zregs[1]) }, | ||
222 | + { HV_SIMD_FP_REG_Q2, offsetof(CPUARMState, vfp.zregs[2]) }, | ||
223 | + { HV_SIMD_FP_REG_Q3, offsetof(CPUARMState, vfp.zregs[3]) }, | ||
224 | + { HV_SIMD_FP_REG_Q4, offsetof(CPUARMState, vfp.zregs[4]) }, | ||
225 | + { HV_SIMD_FP_REG_Q5, offsetof(CPUARMState, vfp.zregs[5]) }, | ||
226 | + { HV_SIMD_FP_REG_Q6, offsetof(CPUARMState, vfp.zregs[6]) }, | ||
227 | + { HV_SIMD_FP_REG_Q7, offsetof(CPUARMState, vfp.zregs[7]) }, | ||
228 | + { HV_SIMD_FP_REG_Q8, offsetof(CPUARMState, vfp.zregs[8]) }, | ||
229 | + { HV_SIMD_FP_REG_Q9, offsetof(CPUARMState, vfp.zregs[9]) }, | ||
230 | + { HV_SIMD_FP_REG_Q10, offsetof(CPUARMState, vfp.zregs[10]) }, | ||
231 | + { HV_SIMD_FP_REG_Q11, offsetof(CPUARMState, vfp.zregs[11]) }, | ||
232 | + { HV_SIMD_FP_REG_Q12, offsetof(CPUARMState, vfp.zregs[12]) }, | ||
233 | + { HV_SIMD_FP_REG_Q13, offsetof(CPUARMState, vfp.zregs[13]) }, | ||
234 | + { HV_SIMD_FP_REG_Q14, offsetof(CPUARMState, vfp.zregs[14]) }, | ||
235 | + { HV_SIMD_FP_REG_Q15, offsetof(CPUARMState, vfp.zregs[15]) }, | ||
236 | + { HV_SIMD_FP_REG_Q16, offsetof(CPUARMState, vfp.zregs[16]) }, | ||
237 | + { HV_SIMD_FP_REG_Q17, offsetof(CPUARMState, vfp.zregs[17]) }, | ||
238 | + { HV_SIMD_FP_REG_Q18, offsetof(CPUARMState, vfp.zregs[18]) }, | ||
239 | + { HV_SIMD_FP_REG_Q19, offsetof(CPUARMState, vfp.zregs[19]) }, | ||
240 | + { HV_SIMD_FP_REG_Q20, offsetof(CPUARMState, vfp.zregs[20]) }, | ||
241 | + { HV_SIMD_FP_REG_Q21, offsetof(CPUARMState, vfp.zregs[21]) }, | ||
242 | + { HV_SIMD_FP_REG_Q22, offsetof(CPUARMState, vfp.zregs[22]) }, | ||
243 | + { HV_SIMD_FP_REG_Q23, offsetof(CPUARMState, vfp.zregs[23]) }, | ||
244 | + { HV_SIMD_FP_REG_Q24, offsetof(CPUARMState, vfp.zregs[24]) }, | ||
245 | + { HV_SIMD_FP_REG_Q25, offsetof(CPUARMState, vfp.zregs[25]) }, | ||
246 | + { HV_SIMD_FP_REG_Q26, offsetof(CPUARMState, vfp.zregs[26]) }, | ||
247 | + { HV_SIMD_FP_REG_Q27, offsetof(CPUARMState, vfp.zregs[27]) }, | ||
248 | + { HV_SIMD_FP_REG_Q28, offsetof(CPUARMState, vfp.zregs[28]) }, | ||
249 | + { HV_SIMD_FP_REG_Q29, offsetof(CPUARMState, vfp.zregs[29]) }, | ||
250 | + { HV_SIMD_FP_REG_Q30, offsetof(CPUARMState, vfp.zregs[30]) }, | ||
251 | + { HV_SIMD_FP_REG_Q31, offsetof(CPUARMState, vfp.zregs[31]) }, | ||
252 | +}; | ||
253 | + | ||
254 | +struct hvf_sreg_match { | ||
255 | + int reg; | ||
256 | + uint32_t key; | ||
257 | + uint32_t cp_idx; | ||
258 | +}; | ||
259 | + | ||
260 | +static struct hvf_sreg_match hvf_sreg_match[] = { | ||
261 | + { HV_SYS_REG_DBGBVR0_EL1, HVF_SYSREG(0, 0, 14, 0, 4) }, | ||
262 | + { HV_SYS_REG_DBGBCR0_EL1, HVF_SYSREG(0, 0, 14, 0, 5) }, | ||
263 | + { HV_SYS_REG_DBGWVR0_EL1, HVF_SYSREG(0, 0, 14, 0, 6) }, | ||
264 | + { HV_SYS_REG_DBGWCR0_EL1, HVF_SYSREG(0, 0, 14, 0, 7) }, | ||
265 | + | ||
266 | + { HV_SYS_REG_DBGBVR1_EL1, HVF_SYSREG(0, 1, 14, 0, 4) }, | ||
267 | + { HV_SYS_REG_DBGBCR1_EL1, HVF_SYSREG(0, 1, 14, 0, 5) }, | ||
268 | + { HV_SYS_REG_DBGWVR1_EL1, HVF_SYSREG(0, 1, 14, 0, 6) }, | ||
269 | + { HV_SYS_REG_DBGWCR1_EL1, HVF_SYSREG(0, 1, 14, 0, 7) }, | ||
270 | + | ||
271 | + { HV_SYS_REG_DBGBVR2_EL1, HVF_SYSREG(0, 2, 14, 0, 4) }, | ||
272 | + { HV_SYS_REG_DBGBCR2_EL1, HVF_SYSREG(0, 2, 14, 0, 5) }, | ||
273 | + { HV_SYS_REG_DBGWVR2_EL1, HVF_SYSREG(0, 2, 14, 0, 6) }, | ||
274 | + { HV_SYS_REG_DBGWCR2_EL1, HVF_SYSREG(0, 2, 14, 0, 7) }, | ||
275 | + | ||
276 | + { HV_SYS_REG_DBGBVR3_EL1, HVF_SYSREG(0, 3, 14, 0, 4) }, | ||
277 | + { HV_SYS_REG_DBGBCR3_EL1, HVF_SYSREG(0, 3, 14, 0, 5) }, | ||
278 | + { HV_SYS_REG_DBGWVR3_EL1, HVF_SYSREG(0, 3, 14, 0, 6) }, | ||
279 | + { HV_SYS_REG_DBGWCR3_EL1, HVF_SYSREG(0, 3, 14, 0, 7) }, | ||
280 | + | ||
281 | + { HV_SYS_REG_DBGBVR4_EL1, HVF_SYSREG(0, 4, 14, 0, 4) }, | ||
282 | + { HV_SYS_REG_DBGBCR4_EL1, HVF_SYSREG(0, 4, 14, 0, 5) }, | ||
283 | + { HV_SYS_REG_DBGWVR4_EL1, HVF_SYSREG(0, 4, 14, 0, 6) }, | ||
284 | + { HV_SYS_REG_DBGWCR4_EL1, HVF_SYSREG(0, 4, 14, 0, 7) }, | ||
285 | + | ||
286 | + { HV_SYS_REG_DBGBVR5_EL1, HVF_SYSREG(0, 5, 14, 0, 4) }, | ||
287 | + { HV_SYS_REG_DBGBCR5_EL1, HVF_SYSREG(0, 5, 14, 0, 5) }, | ||
288 | + { HV_SYS_REG_DBGWVR5_EL1, HVF_SYSREG(0, 5, 14, 0, 6) }, | ||
289 | + { HV_SYS_REG_DBGWCR5_EL1, HVF_SYSREG(0, 5, 14, 0, 7) }, | ||
290 | + | ||
291 | + { HV_SYS_REG_DBGBVR6_EL1, HVF_SYSREG(0, 6, 14, 0, 4) }, | ||
292 | + { HV_SYS_REG_DBGBCR6_EL1, HVF_SYSREG(0, 6, 14, 0, 5) }, | ||
293 | + { HV_SYS_REG_DBGWVR6_EL1, HVF_SYSREG(0, 6, 14, 0, 6) }, | ||
294 | + { HV_SYS_REG_DBGWCR6_EL1, HVF_SYSREG(0, 6, 14, 0, 7) }, | ||
295 | + | ||
296 | + { HV_SYS_REG_DBGBVR7_EL1, HVF_SYSREG(0, 7, 14, 0, 4) }, | ||
297 | + { HV_SYS_REG_DBGBCR7_EL1, HVF_SYSREG(0, 7, 14, 0, 5) }, | ||
298 | + { HV_SYS_REG_DBGWVR7_EL1, HVF_SYSREG(0, 7, 14, 0, 6) }, | ||
299 | + { HV_SYS_REG_DBGWCR7_EL1, HVF_SYSREG(0, 7, 14, 0, 7) }, | ||
300 | + | ||
301 | + { HV_SYS_REG_DBGBVR8_EL1, HVF_SYSREG(0, 8, 14, 0, 4) }, | ||
302 | + { HV_SYS_REG_DBGBCR8_EL1, HVF_SYSREG(0, 8, 14, 0, 5) }, | ||
303 | + { HV_SYS_REG_DBGWVR8_EL1, HVF_SYSREG(0, 8, 14, 0, 6) }, | ||
304 | + { HV_SYS_REG_DBGWCR8_EL1, HVF_SYSREG(0, 8, 14, 0, 7) }, | ||
305 | + | ||
306 | + { HV_SYS_REG_DBGBVR9_EL1, HVF_SYSREG(0, 9, 14, 0, 4) }, | ||
307 | + { HV_SYS_REG_DBGBCR9_EL1, HVF_SYSREG(0, 9, 14, 0, 5) }, | ||
308 | + { HV_SYS_REG_DBGWVR9_EL1, HVF_SYSREG(0, 9, 14, 0, 6) }, | ||
309 | + { HV_SYS_REG_DBGWCR9_EL1, HVF_SYSREG(0, 9, 14, 0, 7) }, | ||
310 | + | ||
311 | + { HV_SYS_REG_DBGBVR10_EL1, HVF_SYSREG(0, 10, 14, 0, 4) }, | ||
312 | + { HV_SYS_REG_DBGBCR10_EL1, HVF_SYSREG(0, 10, 14, 0, 5) }, | ||
313 | + { HV_SYS_REG_DBGWVR10_EL1, HVF_SYSREG(0, 10, 14, 0, 6) }, | ||
314 | + { HV_SYS_REG_DBGWCR10_EL1, HVF_SYSREG(0, 10, 14, 0, 7) }, | ||
315 | + | ||
316 | + { HV_SYS_REG_DBGBVR11_EL1, HVF_SYSREG(0, 11, 14, 0, 4) }, | ||
317 | + { HV_SYS_REG_DBGBCR11_EL1, HVF_SYSREG(0, 11, 14, 0, 5) }, | ||
318 | + { HV_SYS_REG_DBGWVR11_EL1, HVF_SYSREG(0, 11, 14, 0, 6) }, | ||
319 | + { HV_SYS_REG_DBGWCR11_EL1, HVF_SYSREG(0, 11, 14, 0, 7) }, | ||
320 | + | ||
321 | + { HV_SYS_REG_DBGBVR12_EL1, HVF_SYSREG(0, 12, 14, 0, 4) }, | ||
322 | + { HV_SYS_REG_DBGBCR12_EL1, HVF_SYSREG(0, 12, 14, 0, 5) }, | ||
323 | + { HV_SYS_REG_DBGWVR12_EL1, HVF_SYSREG(0, 12, 14, 0, 6) }, | ||
324 | + { HV_SYS_REG_DBGWCR12_EL1, HVF_SYSREG(0, 12, 14, 0, 7) }, | ||
325 | + | ||
326 | + { HV_SYS_REG_DBGBVR13_EL1, HVF_SYSREG(0, 13, 14, 0, 4) }, | ||
327 | + { HV_SYS_REG_DBGBCR13_EL1, HVF_SYSREG(0, 13, 14, 0, 5) }, | ||
328 | + { HV_SYS_REG_DBGWVR13_EL1, HVF_SYSREG(0, 13, 14, 0, 6) }, | ||
329 | + { HV_SYS_REG_DBGWCR13_EL1, HVF_SYSREG(0, 13, 14, 0, 7) }, | ||
330 | + | ||
331 | + { HV_SYS_REG_DBGBVR14_EL1, HVF_SYSREG(0, 14, 14, 0, 4) }, | ||
332 | + { HV_SYS_REG_DBGBCR14_EL1, HVF_SYSREG(0, 14, 14, 0, 5) }, | ||
333 | + { HV_SYS_REG_DBGWVR14_EL1, HVF_SYSREG(0, 14, 14, 0, 6) }, | ||
334 | + { HV_SYS_REG_DBGWCR14_EL1, HVF_SYSREG(0, 14, 14, 0, 7) }, | ||
335 | + | ||
336 | + { HV_SYS_REG_DBGBVR15_EL1, HVF_SYSREG(0, 15, 14, 0, 4) }, | ||
337 | + { HV_SYS_REG_DBGBCR15_EL1, HVF_SYSREG(0, 15, 14, 0, 5) }, | ||
338 | + { HV_SYS_REG_DBGWVR15_EL1, HVF_SYSREG(0, 15, 14, 0, 6) }, | ||
339 | + { HV_SYS_REG_DBGWCR15_EL1, HVF_SYSREG(0, 15, 14, 0, 7) }, | ||
340 | + | ||
341 | +#ifdef SYNC_NO_RAW_REGS | ||
342 | + /* | ||
343 | + * The registers below are manually synced on init because they are | ||
344 | + * marked as NO_RAW. We still list them to make number space sync easier. | ||
345 | + */ | ||
346 | + { HV_SYS_REG_MDCCINT_EL1, HVF_SYSREG(0, 2, 2, 0, 0) }, | ||
347 | + { HV_SYS_REG_MIDR_EL1, HVF_SYSREG(0, 0, 3, 0, 0) }, | ||
348 | + { HV_SYS_REG_MPIDR_EL1, HVF_SYSREG(0, 0, 3, 0, 5) }, | ||
349 | + { HV_SYS_REG_ID_AA64PFR0_EL1, HVF_SYSREG(0, 4, 3, 0, 0) }, | ||
119 | +#endif | 350 | +#endif |
120 | diff --git a/include/qemu/typedefs.h b/include/qemu/typedefs.h | 351 | + { HV_SYS_REG_ID_AA64PFR1_EL1, HVF_SYSREG(0, 4, 3, 0, 2) }, |
352 | + { HV_SYS_REG_ID_AA64DFR0_EL1, HVF_SYSREG(0, 5, 3, 0, 0) }, | ||
353 | + { HV_SYS_REG_ID_AA64DFR1_EL1, HVF_SYSREG(0, 5, 3, 0, 1) }, | ||
354 | + { HV_SYS_REG_ID_AA64ISAR0_EL1, HVF_SYSREG(0, 6, 3, 0, 0) }, | ||
355 | + { HV_SYS_REG_ID_AA64ISAR1_EL1, HVF_SYSREG(0, 6, 3, 0, 1) }, | ||
356 | +#ifdef SYNC_NO_MMFR0 | ||
357 | + /* We keep the hardware MMFR0 around. HW limits are there anyway */ | ||
358 | + { HV_SYS_REG_ID_AA64MMFR0_EL1, HVF_SYSREG(0, 7, 3, 0, 0) }, | ||
359 | +#endif | ||
360 | + { HV_SYS_REG_ID_AA64MMFR1_EL1, HVF_SYSREG(0, 7, 3, 0, 1) }, | ||
361 | + { HV_SYS_REG_ID_AA64MMFR2_EL1, HVF_SYSREG(0, 7, 3, 0, 2) }, | ||
362 | + | ||
363 | + { HV_SYS_REG_MDSCR_EL1, HVF_SYSREG(0, 2, 2, 0, 2) }, | ||
364 | + { HV_SYS_REG_SCTLR_EL1, HVF_SYSREG(1, 0, 3, 0, 0) }, | ||
365 | + { HV_SYS_REG_CPACR_EL1, HVF_SYSREG(1, 0, 3, 0, 2) }, | ||
366 | + { HV_SYS_REG_TTBR0_EL1, HVF_SYSREG(2, 0, 3, 0, 0) }, | ||
367 | + { HV_SYS_REG_TTBR1_EL1, HVF_SYSREG(2, 0, 3, 0, 1) }, | ||
368 | + { HV_SYS_REG_TCR_EL1, HVF_SYSREG(2, 0, 3, 0, 2) }, | ||
369 | + | ||
370 | + { HV_SYS_REG_APIAKEYLO_EL1, HVF_SYSREG(2, 1, 3, 0, 0) }, | ||
371 | + { HV_SYS_REG_APIAKEYHI_EL1, HVF_SYSREG(2, 1, 3, 0, 1) }, | ||
372 | + { HV_SYS_REG_APIBKEYLO_EL1, HVF_SYSREG(2, 1, 3, 0, 2) }, | ||
373 | + { HV_SYS_REG_APIBKEYHI_EL1, HVF_SYSREG(2, 1, 3, 0, 3) }, | ||
374 | + { HV_SYS_REG_APDAKEYLO_EL1, HVF_SYSREG(2, 2, 3, 0, 0) }, | ||
375 | + { HV_SYS_REG_APDAKEYHI_EL1, HVF_SYSREG(2, 2, 3, 0, 1) }, | ||
376 | + { HV_SYS_REG_APDBKEYLO_EL1, HVF_SYSREG(2, 2, 3, 0, 2) }, | ||
377 | + { HV_SYS_REG_APDBKEYHI_EL1, HVF_SYSREG(2, 2, 3, 0, 3) }, | ||
378 | + { HV_SYS_REG_APGAKEYLO_EL1, HVF_SYSREG(2, 3, 3, 0, 0) }, | ||
379 | + { HV_SYS_REG_APGAKEYHI_EL1, HVF_SYSREG(2, 3, 3, 0, 1) }, | ||
380 | + | ||
381 | + { HV_SYS_REG_SPSR_EL1, HVF_SYSREG(4, 0, 3, 0, 0) }, | ||
382 | + { HV_SYS_REG_ELR_EL1, HVF_SYSREG(4, 0, 3, 0, 1) }, | ||
383 | + { HV_SYS_REG_SP_EL0, HVF_SYSREG(4, 1, 3, 0, 0) }, | ||
384 | + { HV_SYS_REG_AFSR0_EL1, HVF_SYSREG(5, 1, 3, 0, 0) }, | ||
385 | + { HV_SYS_REG_AFSR1_EL1, HVF_SYSREG(5, 1, 3, 0, 1) }, | ||
386 | + { HV_SYS_REG_ESR_EL1, HVF_SYSREG(5, 2, 3, 0, 0) }, | ||
387 | + { HV_SYS_REG_FAR_EL1, HVF_SYSREG(6, 0, 3, 0, 0) }, | ||
388 | + { HV_SYS_REG_PAR_EL1, HVF_SYSREG(7, 4, 3, 0, 0) }, | ||
389 | + { HV_SYS_REG_MAIR_EL1, HVF_SYSREG(10, 2, 3, 0, 0) }, | ||
390 | + { HV_SYS_REG_AMAIR_EL1, HVF_SYSREG(10, 3, 3, 0, 0) }, | ||
391 | + { HV_SYS_REG_VBAR_EL1, HVF_SYSREG(12, 0, 3, 0, 0) }, | ||
392 | + { HV_SYS_REG_CONTEXTIDR_EL1, HVF_SYSREG(13, 0, 3, 0, 1) }, | ||
393 | + { HV_SYS_REG_TPIDR_EL1, HVF_SYSREG(13, 0, 3, 0, 4) }, | ||
394 | + { HV_SYS_REG_CNTKCTL_EL1, HVF_SYSREG(14, 1, 3, 0, 0) }, | ||
395 | + { HV_SYS_REG_CSSELR_EL1, HVF_SYSREG(0, 0, 3, 2, 0) }, | ||
396 | + { HV_SYS_REG_TPIDR_EL0, HVF_SYSREG(13, 0, 3, 3, 2) }, | ||
397 | + { HV_SYS_REG_TPIDRRO_EL0, HVF_SYSREG(13, 0, 3, 3, 3) }, | ||
398 | + { HV_SYS_REG_CNTV_CTL_EL0, HVF_SYSREG(14, 3, 3, 3, 1) }, | ||
399 | + { HV_SYS_REG_CNTV_CVAL_EL0, HVF_SYSREG(14, 3, 3, 3, 2) }, | ||
400 | + { HV_SYS_REG_SP_EL1, HVF_SYSREG(4, 1, 3, 4, 0) }, | ||
401 | +}; | ||
402 | + | ||
403 | +int hvf_get_registers(CPUState *cpu) | ||
404 | +{ | ||
405 | + ARMCPU *arm_cpu = ARM_CPU(cpu); | ||
406 | + CPUARMState *env = &arm_cpu->env; | ||
407 | + hv_return_t ret; | ||
408 | + uint64_t val; | ||
409 | + hv_simd_fp_uchar16_t fpval; | ||
410 | + int i; | ||
411 | + | ||
412 | + for (i = 0; i < ARRAY_SIZE(hvf_reg_match); i++) { | ||
413 | + ret = hv_vcpu_get_reg(cpu->hvf->fd, hvf_reg_match[i].reg, &val); | ||
414 | + *(uint64_t *)((void *)env + hvf_reg_match[i].offset) = val; | ||
415 | + assert_hvf_ok(ret); | ||
416 | + } | ||
417 | + | ||
418 | + for (i = 0; i < ARRAY_SIZE(hvf_fpreg_match); i++) { | ||
419 | + ret = hv_vcpu_get_simd_fp_reg(cpu->hvf->fd, hvf_fpreg_match[i].reg, | ||
420 | + &fpval); | ||
421 | + memcpy((void *)env + hvf_fpreg_match[i].offset, &fpval, sizeof(fpval)); | ||
422 | + assert_hvf_ok(ret); | ||
423 | + } | ||
424 | + | ||
425 | + val = 0; | ||
426 | + ret = hv_vcpu_get_reg(cpu->hvf->fd, HV_REG_FPCR, &val); | ||
427 | + assert_hvf_ok(ret); | ||
428 | + vfp_set_fpcr(env, val); | ||
429 | + | ||
430 | + val = 0; | ||
431 | + ret = hv_vcpu_get_reg(cpu->hvf->fd, HV_REG_FPSR, &val); | ||
432 | + assert_hvf_ok(ret); | ||
433 | + vfp_set_fpsr(env, val); | ||
434 | + | ||
435 | + ret = hv_vcpu_get_reg(cpu->hvf->fd, HV_REG_CPSR, &val); | ||
436 | + assert_hvf_ok(ret); | ||
437 | + pstate_write(env, val); | ||
438 | + | ||
439 | + for (i = 0; i < ARRAY_SIZE(hvf_sreg_match); i++) { | ||
440 | + if (hvf_sreg_match[i].cp_idx == -1) { | ||
441 | + continue; | ||
442 | + } | ||
443 | + | ||
444 | + ret = hv_vcpu_get_sys_reg(cpu->hvf->fd, hvf_sreg_match[i].reg, &val); | ||
445 | + assert_hvf_ok(ret); | ||
446 | + | ||
447 | + arm_cpu->cpreg_values[hvf_sreg_match[i].cp_idx] = val; | ||
448 | + } | ||
449 | + assert(write_list_to_cpustate(arm_cpu)); | ||
450 | + | ||
451 | + aarch64_restore_sp(env, arm_current_el(env)); | ||
452 | + | ||
453 | + return 0; | ||
454 | +} | ||
455 | + | ||
456 | +int hvf_put_registers(CPUState *cpu) | ||
457 | +{ | ||
458 | + ARMCPU *arm_cpu = ARM_CPU(cpu); | ||
459 | + CPUARMState *env = &arm_cpu->env; | ||
460 | + hv_return_t ret; | ||
461 | + uint64_t val; | ||
462 | + hv_simd_fp_uchar16_t fpval; | ||
463 | + int i; | ||
464 | + | ||
465 | + for (i = 0; i < ARRAY_SIZE(hvf_reg_match); i++) { | ||
466 | + val = *(uint64_t *)((void *)env + hvf_reg_match[i].offset); | ||
467 | + ret = hv_vcpu_set_reg(cpu->hvf->fd, hvf_reg_match[i].reg, val); | ||
468 | + assert_hvf_ok(ret); | ||
469 | + } | ||
470 | + | ||
471 | + for (i = 0; i < ARRAY_SIZE(hvf_fpreg_match); i++) { | ||
472 | + memcpy(&fpval, (void *)env + hvf_fpreg_match[i].offset, sizeof(fpval)); | ||
473 | + ret = hv_vcpu_set_simd_fp_reg(cpu->hvf->fd, hvf_fpreg_match[i].reg, | ||
474 | + fpval); | ||
475 | + assert_hvf_ok(ret); | ||
476 | + } | ||
477 | + | ||
478 | + ret = hv_vcpu_set_reg(cpu->hvf->fd, HV_REG_FPCR, vfp_get_fpcr(env)); | ||
479 | + assert_hvf_ok(ret); | ||
480 | + | ||
481 | + ret = hv_vcpu_set_reg(cpu->hvf->fd, HV_REG_FPSR, vfp_get_fpsr(env)); | ||
482 | + assert_hvf_ok(ret); | ||
483 | + | ||
484 | + ret = hv_vcpu_set_reg(cpu->hvf->fd, HV_REG_CPSR, pstate_read(env)); | ||
485 | + assert_hvf_ok(ret); | ||
486 | + | ||
487 | + aarch64_save_sp(env, arm_current_el(env)); | ||
488 | + | ||
489 | + assert(write_cpustate_to_list(arm_cpu, false)); | ||
490 | + for (i = 0; i < ARRAY_SIZE(hvf_sreg_match); i++) { | ||
491 | + if (hvf_sreg_match[i].cp_idx == -1) { | ||
492 | + continue; | ||
493 | + } | ||
494 | + | ||
495 | + val = arm_cpu->cpreg_values[hvf_sreg_match[i].cp_idx]; | ||
496 | + ret = hv_vcpu_set_sys_reg(cpu->hvf->fd, hvf_sreg_match[i].reg, val); | ||
497 | + assert_hvf_ok(ret); | ||
498 | + } | ||
499 | + | ||
500 | + ret = hv_vcpu_set_vtimer_offset(cpu->hvf->fd, hvf_state->vtimer_offset); | ||
501 | + assert_hvf_ok(ret); | ||
502 | + | ||
503 | + return 0; | ||
504 | +} | ||
505 | + | ||
506 | +static void flush_cpu_state(CPUState *cpu) | ||
507 | +{ | ||
508 | + if (cpu->vcpu_dirty) { | ||
509 | + hvf_put_registers(cpu); | ||
510 | + cpu->vcpu_dirty = false; | ||
511 | + } | ||
512 | +} | ||
513 | + | ||
514 | +static void hvf_set_reg(CPUState *cpu, int rt, uint64_t val) | ||
515 | +{ | ||
516 | + hv_return_t r; | ||
517 | + | ||
518 | + flush_cpu_state(cpu); | ||
519 | + | ||
520 | + if (rt < 31) { | ||
521 | + r = hv_vcpu_set_reg(cpu->hvf->fd, HV_REG_X0 + rt, val); | ||
522 | + assert_hvf_ok(r); | ||
523 | + } | ||
524 | +} | ||
525 | + | ||
526 | +static uint64_t hvf_get_reg(CPUState *cpu, int rt) | ||
527 | +{ | ||
528 | + uint64_t val = 0; | ||
529 | + hv_return_t r; | ||
530 | + | ||
531 | + flush_cpu_state(cpu); | ||
532 | + | ||
533 | + if (rt < 31) { | ||
534 | + r = hv_vcpu_get_reg(cpu->hvf->fd, HV_REG_X0 + rt, &val); | ||
535 | + assert_hvf_ok(r); | ||
536 | + } | ||
537 | + | ||
538 | + return val; | ||
539 | +} | ||
540 | + | ||
541 | +void hvf_arch_vcpu_destroy(CPUState *cpu) | ||
542 | +{ | ||
543 | +} | ||
544 | + | ||
545 | +int hvf_arch_init_vcpu(CPUState *cpu) | ||
546 | +{ | ||
547 | + ARMCPU *arm_cpu = ARM_CPU(cpu); | ||
548 | + CPUARMState *env = &arm_cpu->env; | ||
549 | + uint32_t sregs_match_len = ARRAY_SIZE(hvf_sreg_match); | ||
550 | + uint32_t sregs_cnt = 0; | ||
551 | + uint64_t pfr; | ||
552 | + hv_return_t ret; | ||
553 | + int i; | ||
554 | + | ||
555 | + env->aarch64 = 1; | ||
556 | + asm volatile("mrs %0, cntfrq_el0" : "=r"(arm_cpu->gt_cntfrq_hz)); | ||
557 | + | ||
558 | + /* Allocate enough space for our sysreg sync */ | ||
559 | + arm_cpu->cpreg_indexes = g_renew(uint64_t, arm_cpu->cpreg_indexes, | ||
560 | + sregs_match_len); | ||
561 | + arm_cpu->cpreg_values = g_renew(uint64_t, arm_cpu->cpreg_values, | ||
562 | + sregs_match_len); | ||
563 | + arm_cpu->cpreg_vmstate_indexes = g_renew(uint64_t, | ||
564 | + arm_cpu->cpreg_vmstate_indexes, | ||
565 | + sregs_match_len); | ||
566 | + arm_cpu->cpreg_vmstate_values = g_renew(uint64_t, | ||
567 | + arm_cpu->cpreg_vmstate_values, | ||
568 | + sregs_match_len); | ||
569 | + | ||
570 | + memset(arm_cpu->cpreg_values, 0, sregs_match_len * sizeof(uint64_t)); | ||
571 | + | ||
572 | + /* Populate cp list for all known sysregs */ | ||
573 | + for (i = 0; i < sregs_match_len; i++) { | ||
574 | + const ARMCPRegInfo *ri; | ||
575 | + uint32_t key = hvf_sreg_match[i].key; | ||
576 | + | ||
577 | + ri = get_arm_cp_reginfo(arm_cpu->cp_regs, key); | ||
578 | + if (ri) { | ||
579 | + assert(!(ri->type & ARM_CP_NO_RAW)); | ||
580 | + hvf_sreg_match[i].cp_idx = sregs_cnt; | ||
581 | + arm_cpu->cpreg_indexes[sregs_cnt++] = cpreg_to_kvm_id(key); | ||
582 | + } else { | ||
583 | + hvf_sreg_match[i].cp_idx = -1; | ||
584 | + } | ||
585 | + } | ||
586 | + arm_cpu->cpreg_array_len = sregs_cnt; | ||
587 | + arm_cpu->cpreg_vmstate_array_len = sregs_cnt; | ||
588 | + | ||
589 | + assert(write_cpustate_to_list(arm_cpu, false)); | ||
590 | + | ||
591 | + /* Set CP_NO_RAW system registers on init */ | ||
592 | + ret = hv_vcpu_set_sys_reg(cpu->hvf->fd, HV_SYS_REG_MIDR_EL1, | ||
593 | + arm_cpu->midr); | ||
594 | + assert_hvf_ok(ret); | ||
595 | + | ||
596 | + ret = hv_vcpu_set_sys_reg(cpu->hvf->fd, HV_SYS_REG_MPIDR_EL1, | ||
597 | + arm_cpu->mp_affinity); | ||
598 | + assert_hvf_ok(ret); | ||
599 | + | ||
600 | + ret = hv_vcpu_get_sys_reg(cpu->hvf->fd, HV_SYS_REG_ID_AA64PFR0_EL1, &pfr); | ||
601 | + assert_hvf_ok(ret); | ||
602 | + pfr |= env->gicv3state ? (1 << 24) : 0; | ||
603 | + ret = hv_vcpu_set_sys_reg(cpu->hvf->fd, HV_SYS_REG_ID_AA64PFR0_EL1, pfr); | ||
604 | + assert_hvf_ok(ret); | ||
605 | + | ||
606 | + /* We're limited to underlying hardware caps, override internal versions */ | ||
607 | + ret = hv_vcpu_get_sys_reg(cpu->hvf->fd, HV_SYS_REG_ID_AA64MMFR0_EL1, | ||
608 | + &arm_cpu->isar.id_aa64mmfr0); | ||
609 | + assert_hvf_ok(ret); | ||
610 | + | ||
611 | + return 0; | ||
612 | +} | ||
613 | + | ||
614 | +void hvf_kick_vcpu_thread(CPUState *cpu) | ||
615 | +{ | ||
616 | + hv_vcpus_exit(&cpu->hvf->fd, 1); | ||
617 | +} | ||
618 | + | ||
619 | +static void hvf_raise_exception(CPUState *cpu, uint32_t excp, | ||
620 | + uint32_t syndrome) | ||
621 | +{ | ||
622 | + ARMCPU *arm_cpu = ARM_CPU(cpu); | ||
623 | + CPUARMState *env = &arm_cpu->env; | ||
624 | + | ||
625 | + cpu->exception_index = excp; | ||
626 | + env->exception.target_el = 1; | ||
627 | + env->exception.syndrome = syndrome; | ||
628 | + | ||
629 | + arm_cpu_do_interrupt(cpu); | ||
630 | +} | ||
631 | + | ||
632 | +static int hvf_sysreg_read(CPUState *cpu, uint32_t reg, uint32_t rt) | ||
633 | +{ | ||
634 | + ARMCPU *arm_cpu = ARM_CPU(cpu); | ||
635 | + CPUARMState *env = &arm_cpu->env; | ||
636 | + uint64_t val = 0; | ||
637 | + | ||
638 | + switch (reg) { | ||
639 | + case SYSREG_CNTPCT_EL0: | ||
640 | + val = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL) / | ||
641 | + gt_cntfrq_period_ns(arm_cpu); | ||
642 | + break; | ||
643 | + case SYSREG_OSLSR_EL1: | ||
644 | + val = env->cp15.oslsr_el1; | ||
645 | + break; | ||
646 | + case SYSREG_OSDLR_EL1: | ||
647 | + /* Dummy register */ | ||
648 | + break; | ||
649 | + default: | ||
650 | + cpu_synchronize_state(cpu); | ||
651 | + trace_hvf_unhandled_sysreg_read(env->pc, reg, | ||
652 | + (reg >> 20) & 0x3, | ||
653 | + (reg >> 14) & 0x7, | ||
654 | + (reg >> 10) & 0xf, | ||
655 | + (reg >> 1) & 0xf, | ||
656 | + (reg >> 17) & 0x7); | ||
657 | + hvf_raise_exception(cpu, EXCP_UDEF, syn_uncategorized()); | ||
658 | + return 1; | ||
659 | + } | ||
660 | + | ||
661 | + trace_hvf_sysreg_read(reg, | ||
662 | + (reg >> 20) & 0x3, | ||
663 | + (reg >> 14) & 0x7, | ||
664 | + (reg >> 10) & 0xf, | ||
665 | + (reg >> 1) & 0xf, | ||
666 | + (reg >> 17) & 0x7, | ||
667 | + val); | ||
668 | + hvf_set_reg(cpu, rt, val); | ||
669 | + | ||
670 | + return 0; | ||
671 | +} | ||
672 | + | ||
673 | +static int hvf_sysreg_write(CPUState *cpu, uint32_t reg, uint64_t val) | ||
674 | +{ | ||
675 | + ARMCPU *arm_cpu = ARM_CPU(cpu); | ||
676 | + CPUARMState *env = &arm_cpu->env; | ||
677 | + | ||
678 | + trace_hvf_sysreg_write(reg, | ||
679 | + (reg >> 20) & 0x3, | ||
680 | + (reg >> 14) & 0x7, | ||
681 | + (reg >> 10) & 0xf, | ||
682 | + (reg >> 1) & 0xf, | ||
683 | + (reg >> 17) & 0x7, | ||
684 | + val); | ||
685 | + | ||
686 | + switch (reg) { | ||
687 | + case SYSREG_OSLAR_EL1: | ||
688 | + env->cp15.oslsr_el1 = val & 1; | ||
689 | + break; | ||
690 | + case SYSREG_OSDLR_EL1: | ||
691 | + /* Dummy register */ | ||
692 | + break; | ||
693 | + default: | ||
694 | + cpu_synchronize_state(cpu); | ||
695 | + trace_hvf_unhandled_sysreg_write(env->pc, reg, | ||
696 | + (reg >> 20) & 0x3, | ||
697 | + (reg >> 14) & 0x7, | ||
698 | + (reg >> 10) & 0xf, | ||
699 | + (reg >> 1) & 0xf, | ||
700 | + (reg >> 17) & 0x7); | ||
701 | + hvf_raise_exception(cpu, EXCP_UDEF, syn_uncategorized()); | ||
702 | + return 1; | ||
703 | + } | ||
704 | + | ||
705 | + return 0; | ||
706 | +} | ||
707 | + | ||
708 | +static int hvf_inject_interrupts(CPUState *cpu) | ||
709 | +{ | ||
710 | + if (cpu->interrupt_request & CPU_INTERRUPT_FIQ) { | ||
711 | + trace_hvf_inject_fiq(); | ||
712 | + hv_vcpu_set_pending_interrupt(cpu->hvf->fd, HV_INTERRUPT_TYPE_FIQ, | ||
713 | + true); | ||
714 | + } | ||
715 | + | ||
716 | + if (cpu->interrupt_request & CPU_INTERRUPT_HARD) { | ||
717 | + trace_hvf_inject_irq(); | ||
718 | + hv_vcpu_set_pending_interrupt(cpu->hvf->fd, HV_INTERRUPT_TYPE_IRQ, | ||
719 | + true); | ||
720 | + } | ||
721 | + | ||
722 | + return 0; | ||
723 | +} | ||
724 | + | ||
725 | +static uint64_t hvf_vtimer_val_raw(void) | ||
726 | +{ | ||
727 | + /* | ||
728 | + * mach_absolute_time() returns the vtimer value without the VM | ||
729 | + * offset that we define. Add our own offset on top. | ||
730 | + */ | ||
731 | + return mach_absolute_time() - hvf_state->vtimer_offset; | ||
732 | +} | ||
733 | + | ||
734 | +static void hvf_sync_vtimer(CPUState *cpu) | ||
735 | +{ | ||
736 | + ARMCPU *arm_cpu = ARM_CPU(cpu); | ||
737 | + hv_return_t r; | ||
738 | + uint64_t ctl; | ||
739 | + bool irq_state; | ||
740 | + | ||
741 | + if (!cpu->hvf->vtimer_masked) { | ||
742 | + /* We will get notified on vtimer changes by hvf, nothing to do */ | ||
743 | + return; | ||
744 | + } | ||
745 | + | ||
746 | + r = hv_vcpu_get_sys_reg(cpu->hvf->fd, HV_SYS_REG_CNTV_CTL_EL0, &ctl); | ||
747 | + assert_hvf_ok(r); | ||
748 | + | ||
749 | + irq_state = (ctl & (TMR_CTL_ENABLE | TMR_CTL_IMASK | TMR_CTL_ISTATUS)) == | ||
750 | + (TMR_CTL_ENABLE | TMR_CTL_ISTATUS); | ||
751 | + qemu_set_irq(arm_cpu->gt_timer_outputs[GTIMER_VIRT], irq_state); | ||
752 | + | ||
753 | + if (!irq_state) { | ||
754 | + /* Timer no longer asserting, we can unmask it */ | ||
755 | + hv_vcpu_set_vtimer_mask(cpu->hvf->fd, false); | ||
756 | + cpu->hvf->vtimer_masked = false; | ||
757 | + } | ||
758 | +} | ||
759 | + | ||
760 | +int hvf_vcpu_exec(CPUState *cpu) | ||
761 | +{ | ||
762 | + ARMCPU *arm_cpu = ARM_CPU(cpu); | ||
763 | + CPUARMState *env = &arm_cpu->env; | ||
764 | + hv_vcpu_exit_t *hvf_exit = cpu->hvf->exit; | ||
765 | + hv_return_t r; | ||
766 | + bool advance_pc = false; | ||
767 | + | ||
768 | + if (hvf_inject_interrupts(cpu)) { | ||
769 | + return EXCP_INTERRUPT; | ||
770 | + } | ||
771 | + | ||
772 | + if (cpu->halted) { | ||
773 | + return EXCP_HLT; | ||
774 | + } | ||
775 | + | ||
776 | + flush_cpu_state(cpu); | ||
777 | + | ||
778 | + qemu_mutex_unlock_iothread(); | ||
779 | + assert_hvf_ok(hv_vcpu_run(cpu->hvf->fd)); | ||
780 | + | ||
781 | + /* handle VMEXIT */ | ||
782 | + uint64_t exit_reason = hvf_exit->reason; | ||
783 | + uint64_t syndrome = hvf_exit->exception.syndrome; | ||
784 | + uint32_t ec = syn_get_ec(syndrome); | ||
785 | + | ||
786 | + qemu_mutex_lock_iothread(); | ||
787 | + switch (exit_reason) { | ||
788 | + case HV_EXIT_REASON_EXCEPTION: | ||
789 | + /* This is the main one, handle below. */ | ||
790 | + break; | ||
791 | + case HV_EXIT_REASON_VTIMER_ACTIVATED: | ||
792 | + qemu_set_irq(arm_cpu->gt_timer_outputs[GTIMER_VIRT], 1); | ||
793 | + cpu->hvf->vtimer_masked = true; | ||
794 | + return 0; | ||
795 | + case HV_EXIT_REASON_CANCELED: | ||
796 | + /* we got kicked, no exit to process */ | ||
797 | + return 0; | ||
798 | + default: | ||
799 | + assert(0); | ||
800 | + } | ||
801 | + | ||
802 | + hvf_sync_vtimer(cpu); | ||
803 | + | ||
804 | + switch (ec) { | ||
805 | + case EC_DATAABORT: { | ||
806 | + bool isv = syndrome & ARM_EL_ISV; | ||
807 | + bool iswrite = (syndrome >> 6) & 1; | ||
808 | + bool s1ptw = (syndrome >> 7) & 1; | ||
809 | + uint32_t sas = (syndrome >> 22) & 3; | ||
810 | + uint32_t len = 1 << sas; | ||
811 | + uint32_t srt = (syndrome >> 16) & 0x1f; | ||
812 | + uint64_t val = 0; | ||
813 | + | ||
814 | + trace_hvf_data_abort(env->pc, hvf_exit->exception.virtual_address, | ||
815 | + hvf_exit->exception.physical_address, isv, | ||
816 | + iswrite, s1ptw, len, srt); | ||
817 | + | ||
818 | + assert(isv); | ||
819 | + | ||
820 | + if (iswrite) { | ||
821 | + val = hvf_get_reg(cpu, srt); | ||
822 | + address_space_write(&address_space_memory, | ||
823 | + hvf_exit->exception.physical_address, | ||
824 | + MEMTXATTRS_UNSPECIFIED, &val, len); | ||
825 | + } else { | ||
826 | + address_space_read(&address_space_memory, | ||
827 | + hvf_exit->exception.physical_address, | ||
828 | + MEMTXATTRS_UNSPECIFIED, &val, len); | ||
829 | + hvf_set_reg(cpu, srt, val); | ||
830 | + } | ||
831 | + | ||
832 | + advance_pc = true; | ||
833 | + break; | ||
834 | + } | ||
835 | + case EC_SYSTEMREGISTERTRAP: { | ||
836 | + bool isread = (syndrome >> 0) & 1; | ||
837 | + uint32_t rt = (syndrome >> 5) & 0x1f; | ||
838 | + uint32_t reg = syndrome & SYSREG_MASK; | ||
839 | + uint64_t val; | ||
840 | + int ret = 0; | ||
841 | + | ||
842 | + if (isread) { | ||
843 | + ret = hvf_sysreg_read(cpu, reg, rt); | ||
844 | + } else { | ||
845 | + val = hvf_get_reg(cpu, rt); | ||
846 | + ret = hvf_sysreg_write(cpu, reg, val); | ||
847 | + } | ||
848 | + | ||
849 | + advance_pc = !ret; | ||
850 | + break; | ||
851 | + } | ||
852 | + case EC_WFX_TRAP: | ||
853 | + advance_pc = true; | ||
854 | + break; | ||
855 | + case EC_AA64_HVC: | ||
856 | + cpu_synchronize_state(cpu); | ||
857 | + trace_hvf_unknown_hvc(env->xregs[0]); | ||
858 | + /* SMCCC 1.3 section 5.2 says every unknown SMCCC call returns -1 */ | ||
859 | + env->xregs[0] = -1; | ||
860 | + break; | ||
861 | + case EC_AA64_SMC: | ||
862 | + cpu_synchronize_state(cpu); | ||
863 | + trace_hvf_unknown_smc(env->xregs[0]); | ||
864 | + hvf_raise_exception(cpu, EXCP_UDEF, syn_uncategorized()); | ||
865 | + break; | ||
866 | + default: | ||
867 | + cpu_synchronize_state(cpu); | ||
868 | + trace_hvf_exit(syndrome, ec, env->pc); | ||
869 | + error_report("0x%llx: unhandled exception ec=0x%x", env->pc, ec); | ||
870 | + } | ||
871 | + | ||
872 | + if (advance_pc) { | ||
873 | + uint64_t pc; | ||
874 | + | ||
875 | + flush_cpu_state(cpu); | ||
876 | + | ||
877 | + r = hv_vcpu_get_reg(cpu->hvf->fd, HV_REG_PC, &pc); | ||
878 | + assert_hvf_ok(r); | ||
879 | + pc += 4; | ||
880 | + r = hv_vcpu_set_reg(cpu->hvf->fd, HV_REG_PC, pc); | ||
881 | + assert_hvf_ok(r); | ||
882 | + } | ||
883 | + | ||
884 | + return 0; | ||
885 | +} | ||
886 | + | ||
887 | +static const VMStateDescription vmstate_hvf_vtimer = { | ||
888 | + .name = "hvf-vtimer", | ||
889 | + .version_id = 1, | ||
890 | + .minimum_version_id = 1, | ||
891 | + .fields = (VMStateField[]) { | ||
892 | + VMSTATE_UINT64(vtimer_val, HVFVTimer), | ||
893 | + VMSTATE_END_OF_LIST() | ||
894 | + }, | ||
895 | +}; | ||
896 | + | ||
897 | +static void hvf_vm_state_change(void *opaque, bool running, RunState state) | ||
898 | +{ | ||
899 | + HVFVTimer *s = opaque; | ||
900 | + | ||
901 | + if (running) { | ||
902 | + /* Update vtimer offset on all CPUs */ | ||
903 | + hvf_state->vtimer_offset = mach_absolute_time() - s->vtimer_val; | ||
904 | + cpu_synchronize_all_states(); | ||
905 | + } else { | ||
906 | + /* Remember vtimer value on every pause */ | ||
907 | + s->vtimer_val = hvf_vtimer_val_raw(); | ||
908 | + } | ||
909 | +} | ||
910 | + | ||
911 | +int hvf_arch_init(void) | ||
912 | +{ | ||
913 | + hvf_state->vtimer_offset = mach_absolute_time(); | ||
914 | + vmstate_register(NULL, 0, &vmstate_hvf_vtimer, &vtimer); | ||
915 | + qemu_add_vm_change_state_handler(hvf_vm_state_change, &vtimer); | ||
916 | + return 0; | ||
917 | +} | ||
918 | diff --git a/target/i386/hvf/hvf.c b/target/i386/hvf/hvf.c | ||
121 | index XXXXXXX..XXXXXXX 100644 | 919 | index XXXXXXX..XXXXXXX 100644 |
122 | --- a/include/qemu/typedefs.h | 920 | --- a/target/i386/hvf/hvf.c |
123 | +++ b/include/qemu/typedefs.h | 921 | +++ b/target/i386/hvf/hvf.c |
124 | @@ -XXX,XX +XXX,XX @@ typedef struct RAMBlock RAMBlock; | 922 | @@ -XXX,XX +XXX,XX @@ static inline bool apic_bus_freq_is_known(CPUX86State *env) |
125 | typedef struct Range Range; | 923 | return env->apic_bus_freq != 0; |
126 | typedef struct SHPCDevice SHPCDevice; | 924 | } |
127 | typedef struct SSIBus SSIBus; | 925 | |
128 | -typedef struct uWireSlave uWireSlave; | 926 | +void hvf_kick_vcpu_thread(CPUState *cpu) |
129 | typedef struct VirtIODevice VirtIODevice; | 927 | +{ |
130 | typedef struct Visitor Visitor; | 928 | + cpus_kick_thread(cpu); |
131 | typedef void SaveStateHandler(QEMUFile *f, void *opaque); | 929 | +} |
132 | diff --git a/hw/arm/nseries.c b/hw/arm/nseries.c | 930 | + |
133 | index XXXXXXX..XXXXXXX 100644 | 931 | int hvf_arch_init(void) |
134 | --- a/hw/arm/nseries.c | 932 | { |
135 | +++ b/hw/arm/nseries.c | 933 | return 0; |
136 | @@ -XXX,XX +XXX,XX @@ | ||
137 | #include "ui/console.h" | ||
138 | #include "hw/boards.h" | ||
139 | #include "hw/i2c/i2c.h" | ||
140 | -#include "hw/devices.h" | ||
141 | #include "hw/display/blizzard.h" | ||
142 | +#include "hw/input/tsc2xxx.h" | ||
143 | #include "hw/misc/cbus.h" | ||
144 | #include "hw/misc/tmp105.h" | ||
145 | #include "hw/block/flash.h" | ||
146 | diff --git a/hw/arm/palm.c b/hw/arm/palm.c | ||
147 | index XXXXXXX..XXXXXXX 100644 | ||
148 | --- a/hw/arm/palm.c | ||
149 | +++ b/hw/arm/palm.c | ||
150 | @@ -XXX,XX +XXX,XX @@ | ||
151 | #include "hw/arm/omap.h" | ||
152 | #include "hw/boards.h" | ||
153 | #include "hw/arm/arm.h" | ||
154 | -#include "hw/devices.h" | ||
155 | +#include "hw/input/tsc2xxx.h" | ||
156 | #include "hw/loader.h" | ||
157 | #include "exec/address-spaces.h" | ||
158 | #include "cpu.h" | ||
159 | diff --git a/hw/input/tsc2005.c b/hw/input/tsc2005.c | ||
160 | index XXXXXXX..XXXXXXX 100644 | ||
161 | --- a/hw/input/tsc2005.c | ||
162 | +++ b/hw/input/tsc2005.c | ||
163 | @@ -XXX,XX +XXX,XX @@ | ||
164 | #include "hw/hw.h" | ||
165 | #include "qemu/timer.h" | ||
166 | #include "ui/console.h" | ||
167 | -#include "hw/devices.h" | ||
168 | +#include "hw/input/tsc2xxx.h" | ||
169 | #include "trace.h" | ||
170 | |||
171 | #define TSC_CUT_RESOLUTION(value, p) ((value) >> (16 - (p ? 12 : 10))) | ||
172 | diff --git a/hw/input/tsc210x.c b/hw/input/tsc210x.c | ||
173 | index XXXXXXX..XXXXXXX 100644 | ||
174 | --- a/hw/input/tsc210x.c | ||
175 | +++ b/hw/input/tsc210x.c | ||
176 | @@ -XXX,XX +XXX,XX @@ | ||
177 | #include "audio/audio.h" | ||
178 | #include "qemu/timer.h" | ||
179 | #include "ui/console.h" | ||
180 | -#include "hw/arm/omap.h" /* For I2SCodec and uWireSlave */ | ||
181 | -#include "hw/devices.h" | ||
182 | +#include "hw/arm/omap.h" /* For I2SCodec */ | ||
183 | +#include "hw/input/tsc2xxx.h" | ||
184 | |||
185 | #define TSC_DATA_REGISTERS_PAGE 0x0 | ||
186 | #define TSC_CONTROL_REGISTERS_PAGE 0x1 | ||
187 | diff --git a/MAINTAINERS b/MAINTAINERS | 934 | diff --git a/MAINTAINERS b/MAINTAINERS |
188 | index XXXXXXX..XXXXXXX 100644 | 935 | index XXXXXXX..XXXXXXX 100644 |
189 | --- a/MAINTAINERS | 936 | --- a/MAINTAINERS |
190 | +++ b/MAINTAINERS | 937 | +++ b/MAINTAINERS |
191 | @@ -XXX,XX +XXX,XX @@ F: hw/input/tsc2005.c | 938 | @@ -XXX,XX +XXX,XX @@ F: accel/accel-*.c |
192 | F: hw/misc/cbus.c | 939 | F: accel/Makefile.objs |
193 | F: hw/timer/twl92230.c | 940 | F: accel/stubs/Makefile.objs |
194 | F: include/hw/display/blizzard.h | 941 | |
195 | +F: include/hw/input/tsc2xxx.h | 942 | +Apple Silicon HVF CPUs |
196 | F: include/hw/misc/cbus.h | 943 | +M: Alexander Graf <agraf@csgraf.de> |
197 | 944 | +S: Maintained | |
198 | Palm | 945 | +F: target/arm/hvf/ |
199 | @@ -XXX,XX +XXX,XX @@ L: qemu-arm@nongnu.org | 946 | + |
200 | S: Odd Fixes | 947 | X86 HVF CPUs |
201 | F: hw/arm/palm.c | 948 | M: Cameron Esfahani <dirty@apple.com> |
202 | F: hw/input/tsc210x.c | 949 | M: Roman Bolshakov <r.bolshakov@yadro.com> |
203 | +F: include/hw/input/tsc2xxx.h | 950 | diff --git a/target/arm/hvf/trace-events b/target/arm/hvf/trace-events |
204 | 951 | new file mode 100644 | |
205 | Raspberry Pi | 952 | index XXXXXXX..XXXXXXX |
206 | M: Peter Maydell <peter.maydell@linaro.org> | 953 | --- /dev/null |
954 | +++ b/target/arm/hvf/trace-events | ||
955 | @@ -XXX,XX +XXX,XX @@ | ||
956 | +hvf_unhandled_sysreg_read(uint64_t pc, uint32_t reg, uint32_t op0, uint32_t op1, uint32_t crn, uint32_t crm, uint32_t op2) "unhandled sysreg read at pc=0x%"PRIx64": 0x%08x (op0=%d op1=%d crn=%d crm=%d op2=%d)" | ||
957 | +hvf_unhandled_sysreg_write(uint64_t pc, uint32_t reg, uint32_t op0, uint32_t op1, uint32_t crn, uint32_t crm, uint32_t op2) "unhandled sysreg write at pc=0x%"PRIx64": 0x%08x (op0=%d op1=%d crn=%d crm=%d op2=%d)" | ||
958 | +hvf_inject_fiq(void) "injecting FIQ" | ||
959 | +hvf_inject_irq(void) "injecting IRQ" | ||
960 | +hvf_data_abort(uint64_t pc, uint64_t va, uint64_t pa, bool isv, bool iswrite, bool s1ptw, uint32_t len, uint32_t srt) "data abort: [pc=0x%"PRIx64" va=0x%016"PRIx64" pa=0x%016"PRIx64" isv=%d iswrite=%d s1ptw=%d len=%d srt=%d]" | ||
961 | +hvf_sysreg_read(uint32_t reg, uint32_t op0, uint32_t op1, uint32_t crn, uint32_t crm, uint32_t op2, uint64_t val) "sysreg read 0x%08x (op0=%d op1=%d crn=%d crm=%d op2=%d) = 0x%016"PRIx64 | ||
962 | +hvf_sysreg_write(uint32_t reg, uint32_t op0, uint32_t op1, uint32_t crn, uint32_t crm, uint32_t op2, uint64_t val) "sysreg write 0x%08x (op0=%d op1=%d crn=%d crm=%d op2=%d, val=0x%016"PRIx64")" | ||
963 | +hvf_unknown_hvc(uint64_t x0) "unknown HVC! 0x%016"PRIx64 | ||
964 | +hvf_unknown_smc(uint64_t x0) "unknown SMC! 0x%016"PRIx64 | ||
965 | +hvf_exit(uint64_t syndrome, uint32_t ec, uint64_t pc) "exit: 0x%"PRIx64" [ec=0x%x pc=0x%"PRIx64"]" | ||
207 | -- | 966 | -- |
208 | 2.20.1 | 967 | 2.20.1 |
209 | 968 | ||
210 | 969 | diff view generated by jsdifflib |
1 | Implement the VLLDM instruction for v7M for the FPU present cas. | 1 | From: Peter Collingbourne <pcc@google.com> |
---|---|---|---|
2 | 2 | ||
3 | Sleep on WFI until the VTIMER is due but allow ourselves to be woken | ||
4 | up on IPI. | ||
5 | |||
6 | In this implementation IPI is blocked on the CPU thread at startup and | ||
7 | pselect() is used to atomically unblock the signal and begin sleeping. | ||
8 | The signal is sent unconditionally so there's no need to worry about | ||
9 | races between actually sleeping and the "we think we're sleeping" | ||
10 | state. It may lead to an extra wakeup but that's better than missing | ||
11 | it entirely. | ||
12 | |||
13 | Signed-off-by: Peter Collingbourne <pcc@google.com> | ||
14 | Signed-off-by: Alexander Graf <agraf@csgraf.de> | ||
15 | Acked-by: Roman Bolshakov <r.bolshakov@yadro.com> | ||
16 | Reviewed-by: Sergio Lopez <slp@redhat.com> | ||
17 | Message-id: 20210916155404.86958-6-agraf@csgraf.de | ||
18 | [agraf: Remove unused 'set' variable, always advance PC on WFX trap, | ||
19 | support vm stop / continue operations and cntv offsets] | ||
20 | Signed-off-by: Alexander Graf <agraf@csgraf.de> | ||
21 | Acked-by: Roman Bolshakov <r.bolshakov@yadro.com> | ||
22 | Reviewed-by: Sergio Lopez <slp@redhat.com> | ||
3 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 23 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
5 | Message-id: 20190416125744.27770-26-peter.maydell@linaro.org | ||
6 | --- | 24 | --- |
7 | target/arm/helper.h | 1 + | 25 | include/sysemu/hvf_int.h | 1 + |
8 | target/arm/helper.c | 54 ++++++++++++++++++++++++++++++++++++++++++ | 26 | accel/hvf/hvf-accel-ops.c | 5 +-- |
9 | target/arm/translate.c | 2 +- | 27 | target/arm/hvf/hvf.c | 79 +++++++++++++++++++++++++++++++++++++++ |
10 | 3 files changed, 56 insertions(+), 1 deletion(-) | 28 | 3 files changed, 82 insertions(+), 3 deletions(-) |
11 | 29 | ||
12 | diff --git a/target/arm/helper.h b/target/arm/helper.h | 30 | diff --git a/include/sysemu/hvf_int.h b/include/sysemu/hvf_int.h |
13 | index XXXXXXX..XXXXXXX 100644 | 31 | index XXXXXXX..XXXXXXX 100644 |
14 | --- a/target/arm/helper.h | 32 | --- a/include/sysemu/hvf_int.h |
15 | +++ b/target/arm/helper.h | 33 | +++ b/include/sysemu/hvf_int.h |
16 | @@ -XXX,XX +XXX,XX @@ DEF_HELPER_3(v7m_tt, i32, env, i32, i32) | 34 | @@ -XXX,XX +XXX,XX @@ struct hvf_vcpu_state { |
17 | DEF_HELPER_1(v7m_preserve_fp_state, void, env) | 35 | uint64_t fd; |
18 | 36 | void *exit; | |
19 | DEF_HELPER_2(v7m_vlstm, void, env, i32) | 37 | bool vtimer_masked; |
20 | +DEF_HELPER_2(v7m_vlldm, void, env, i32) | 38 | + sigset_t unblock_ipi_mask; |
21 | 39 | }; | |
22 | DEF_HELPER_2(v8m_stackcheck, void, env, i32) | 40 | |
23 | 41 | void assert_hvf_ok(hv_return_t ret); | |
24 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 42 | diff --git a/accel/hvf/hvf-accel-ops.c b/accel/hvf/hvf-accel-ops.c |
25 | index XXXXXXX..XXXXXXX 100644 | 43 | index XXXXXXX..XXXXXXX 100644 |
26 | --- a/target/arm/helper.c | 44 | --- a/accel/hvf/hvf-accel-ops.c |
27 | +++ b/target/arm/helper.c | 45 | +++ b/accel/hvf/hvf-accel-ops.c |
28 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_vlstm)(CPUARMState *env, uint32_t fptr) | 46 | @@ -XXX,XX +XXX,XX @@ static int hvf_init_vcpu(CPUState *cpu) |
29 | g_assert_not_reached(); | 47 | cpu->hvf = g_malloc0(sizeof(*cpu->hvf)); |
48 | |||
49 | /* init cpu signals */ | ||
50 | - sigset_t set; | ||
51 | struct sigaction sigact; | ||
52 | |||
53 | memset(&sigact, 0, sizeof(sigact)); | ||
54 | sigact.sa_handler = dummy_signal; | ||
55 | sigaction(SIG_IPI, &sigact, NULL); | ||
56 | |||
57 | - pthread_sigmask(SIG_BLOCK, NULL, &set); | ||
58 | - sigdelset(&set, SIG_IPI); | ||
59 | + pthread_sigmask(SIG_BLOCK, NULL, &cpu->hvf->unblock_ipi_mask); | ||
60 | + sigdelset(&cpu->hvf->unblock_ipi_mask, SIG_IPI); | ||
61 | |||
62 | #ifdef __aarch64__ | ||
63 | r = hv_vcpu_create(&cpu->hvf->fd, (hv_vcpu_exit_t **)&cpu->hvf->exit, NULL); | ||
64 | diff --git a/target/arm/hvf/hvf.c b/target/arm/hvf/hvf.c | ||
65 | index XXXXXXX..XXXXXXX 100644 | ||
66 | --- a/target/arm/hvf/hvf.c | ||
67 | +++ b/target/arm/hvf/hvf.c | ||
68 | @@ -XXX,XX +XXX,XX @@ | ||
69 | * QEMU Hypervisor.framework support for Apple Silicon | ||
70 | |||
71 | * Copyright 2020 Alexander Graf <agraf@csgraf.de> | ||
72 | + * Copyright 2020 Google LLC | ||
73 | * | ||
74 | * This work is licensed under the terms of the GNU GPL, version 2 or later. | ||
75 | * See the COPYING file in the top-level directory. | ||
76 | @@ -XXX,XX +XXX,XX @@ int hvf_arch_init_vcpu(CPUState *cpu) | ||
77 | |||
78 | void hvf_kick_vcpu_thread(CPUState *cpu) | ||
79 | { | ||
80 | + cpus_kick_thread(cpu); | ||
81 | hv_vcpus_exit(&cpu->hvf->fd, 1); | ||
30 | } | 82 | } |
31 | 83 | ||
32 | +void HELPER(v7m_vlldm)(CPUARMState *env, uint32_t fptr) | 84 | @@ -XXX,XX +XXX,XX @@ static uint64_t hvf_vtimer_val_raw(void) |
85 | return mach_absolute_time() - hvf_state->vtimer_offset; | ||
86 | } | ||
87 | |||
88 | +static uint64_t hvf_vtimer_val(void) | ||
33 | +{ | 89 | +{ |
34 | + /* translate.c should never generate calls here in user-only mode */ | 90 | + if (!runstate_is_running()) { |
35 | + g_assert_not_reached(); | 91 | + /* VM is paused, the vtimer value is in vtimer.vtimer_val */ |
92 | + return vtimer.vtimer_val; | ||
93 | + } | ||
94 | + | ||
95 | + return hvf_vtimer_val_raw(); | ||
36 | +} | 96 | +} |
37 | + | 97 | + |
38 | uint32_t HELPER(v7m_tt)(CPUARMState *env, uint32_t addr, uint32_t op) | 98 | +static void hvf_wait_for_ipi(CPUState *cpu, struct timespec *ts) |
39 | { | ||
40 | /* The TT instructions can be used by unprivileged code, but in | ||
41 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_vlstm)(CPUARMState *env, uint32_t fptr) | ||
42 | env->v7m.control[M_REG_S] &= ~R_V7M_CONTROL_FPCA_MASK; | ||
43 | } | ||
44 | |||
45 | +void HELPER(v7m_vlldm)(CPUARMState *env, uint32_t fptr) | ||
46 | +{ | 99 | +{ |
47 | + /* fptr is the value of Rn, the frame pointer we load the FP regs from */ | 100 | + /* |
48 | + assert(env->v7m.secure); | 101 | + * Use pselect to sleep so that other threads can IPI us while we're |
102 | + * sleeping. | ||
103 | + */ | ||
104 | + qatomic_mb_set(&cpu->thread_kicked, false); | ||
105 | + qemu_mutex_unlock_iothread(); | ||
106 | + pselect(0, 0, 0, 0, ts, &cpu->hvf->unblock_ipi_mask); | ||
107 | + qemu_mutex_lock_iothread(); | ||
108 | +} | ||
49 | + | 109 | + |
50 | + if (!(env->v7m.control[M_REG_S] & R_V7M_CONTROL_SFPA_MASK)) { | 110 | +static void hvf_wfi(CPUState *cpu) |
111 | +{ | ||
112 | + ARMCPU *arm_cpu = ARM_CPU(cpu); | ||
113 | + struct timespec ts; | ||
114 | + hv_return_t r; | ||
115 | + uint64_t ctl; | ||
116 | + uint64_t cval; | ||
117 | + int64_t ticks_to_sleep; | ||
118 | + uint64_t seconds; | ||
119 | + uint64_t nanos; | ||
120 | + uint32_t cntfrq; | ||
121 | + | ||
122 | + if (cpu->interrupt_request & (CPU_INTERRUPT_HARD | CPU_INTERRUPT_FIQ)) { | ||
123 | + /* Interrupt pending, no need to wait */ | ||
51 | + return; | 124 | + return; |
52 | + } | 125 | + } |
53 | + | 126 | + |
54 | + /* Check access to the coprocessor is permitted */ | 127 | + r = hv_vcpu_get_sys_reg(cpu->hvf->fd, HV_SYS_REG_CNTV_CTL_EL0, &ctl); |
55 | + if (!v7m_cpacr_pass(env, true, arm_current_el(env) != 0)) { | 128 | + assert_hvf_ok(r); |
56 | + raise_exception_ra(env, EXCP_NOCP, 0, 1, GETPC()); | 129 | + |
130 | + if (!(ctl & 1) || (ctl & 2)) { | ||
131 | + /* Timer disabled or masked, just wait for an IPI. */ | ||
132 | + hvf_wait_for_ipi(cpu, NULL); | ||
133 | + return; | ||
57 | + } | 134 | + } |
58 | + | 135 | + |
59 | + if (env->v7m.fpccr[M_REG_S] & R_V7M_FPCCR_LSPACT_MASK) { | 136 | + r = hv_vcpu_get_sys_reg(cpu->hvf->fd, HV_SYS_REG_CNTV_CVAL_EL0, &cval); |
60 | + /* State in FP is still valid */ | 137 | + assert_hvf_ok(r); |
61 | + env->v7m.fpccr[M_REG_S] &= ~R_V7M_FPCCR_LSPACT_MASK; | ||
62 | + } else { | ||
63 | + bool ts = env->v7m.fpccr[M_REG_S] & R_V7M_FPCCR_TS_MASK; | ||
64 | + int i; | ||
65 | + uint32_t fpscr; | ||
66 | + | 138 | + |
67 | + if (fptr & 7) { | 139 | + ticks_to_sleep = cval - hvf_vtimer_val(); |
68 | + raise_exception_ra(env, EXCP_UNALIGNED, 0, 1, GETPC()); | 140 | + if (ticks_to_sleep < 0) { |
69 | + } | 141 | + return; |
70 | + | ||
71 | + for (i = 0; i < (ts ? 32 : 16); i += 2) { | ||
72 | + uint32_t slo, shi; | ||
73 | + uint64_t dn; | ||
74 | + uint32_t faddr = fptr + 4 * i; | ||
75 | + | ||
76 | + if (i >= 16) { | ||
77 | + faddr += 8; /* skip the slot for the FPSCR */ | ||
78 | + } | ||
79 | + | ||
80 | + slo = cpu_ldl_data(env, faddr); | ||
81 | + shi = cpu_ldl_data(env, faddr + 4); | ||
82 | + | ||
83 | + dn = (uint64_t) shi << 32 | slo; | ||
84 | + *aa32_vfp_dreg(env, i / 2) = dn; | ||
85 | + } | ||
86 | + fpscr = cpu_ldl_data(env, fptr + 0x40); | ||
87 | + vfp_set_fpscr(env, fpscr); | ||
88 | + } | 142 | + } |
89 | + | 143 | + |
90 | + env->v7m.control[M_REG_S] |= R_V7M_CONTROL_FPCA_MASK; | 144 | + cntfrq = gt_cntfrq_period_ns(arm_cpu); |
145 | + seconds = muldiv64(ticks_to_sleep, cntfrq, NANOSECONDS_PER_SECOND); | ||
146 | + ticks_to_sleep -= muldiv64(seconds, NANOSECONDS_PER_SECOND, cntfrq); | ||
147 | + nanos = ticks_to_sleep * cntfrq; | ||
148 | + | ||
149 | + /* | ||
150 | + * Don't sleep for less than the time a context switch would take, | ||
151 | + * so that we can satisfy fast timer requests on the same CPU. | ||
152 | + * Measurements on M1 show the sweet spot to be ~2ms. | ||
153 | + */ | ||
154 | + if (!seconds && nanos < (2 * SCALE_MS)) { | ||
155 | + return; | ||
156 | + } | ||
157 | + | ||
158 | + ts = (struct timespec) { seconds, nanos }; | ||
159 | + hvf_wait_for_ipi(cpu, &ts); | ||
91 | +} | 160 | +} |
92 | + | 161 | + |
93 | static bool v7m_push_stack(ARMCPU *cpu) | 162 | static void hvf_sync_vtimer(CPUState *cpu) |
94 | { | 163 | { |
95 | /* Do the "set up stack frame" part of exception entry, | 164 | ARMCPU *arm_cpu = ARM_CPU(cpu); |
96 | diff --git a/target/arm/translate.c b/target/arm/translate.c | 165 | @@ -XXX,XX +XXX,XX @@ int hvf_vcpu_exec(CPUState *cpu) |
97 | index XXXXXXX..XXXXXXX 100644 | 166 | } |
98 | --- a/target/arm/translate.c | 167 | case EC_WFX_TRAP: |
99 | +++ b/target/arm/translate.c | 168 | advance_pc = true; |
100 | @@ -XXX,XX +XXX,XX @@ static void disas_thumb2_insn(DisasContext *s, uint32_t insn) | 169 | + if (!(syndrome & WFX_IS_WFE)) { |
101 | TCGv_i32 fptr = load_reg(s, rn); | 170 | + hvf_wfi(cpu); |
102 | 171 | + } | |
103 | if (extract32(insn, 20, 1)) { | 172 | break; |
104 | - /* VLLDM */ | 173 | case EC_AA64_HVC: |
105 | + gen_helper_v7m_vlldm(cpu_env, fptr); | 174 | cpu_synchronize_state(cpu); |
106 | } else { | ||
107 | gen_helper_v7m_vlstm(cpu_env, fptr); | ||
108 | } | ||
109 | -- | 175 | -- |
110 | 2.20.1 | 176 | 2.20.1 |
111 | 177 | ||
112 | 178 | diff view generated by jsdifflib |
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | 1 | Now that we have working system register sync, we push more target CPU |
---|---|---|---|
2 | 2 | properties into the virtual machine. That might be useful in some | |
3 | This commit finally deletes "hw/devices.h". | 3 | situations, but is not the typical case that users want. |
4 | 4 | ||
5 | Reviewed-by: Markus Armbruster <armbru@redhat.com> | 5 | So let's add a -cpu host option that allows them to explicitly pass all |
6 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | 6 | CPU capabilities of their host CPU into the guest. |
7 | Message-id: 20190412165416.7977-13-philmd@redhat.com | 7 | |
8 | Signed-off-by: Alexander Graf <agraf@csgraf.de> | ||
9 | Acked-by: Roman Bolshakov <r.bolshakov@yadro.com> | ||
10 | Reviewed-by: Sergio Lopez <slp@redhat.com> | ||
11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | Message-id: 20210916155404.86958-7-agraf@csgraf.de | ||
13 | [PMM: drop unnecessary #include line from .h file] | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | --- | 15 | --- |
10 | include/hw/devices.h | 11 ----------- | 16 | target/arm/cpu.h | 2 + |
11 | include/hw/net/smc91c111.h | 19 +++++++++++++++++++ | 17 | target/arm/hvf_arm.h | 18 +++++++++ |
12 | hw/arm/gumstix.c | 2 +- | 18 | target/arm/kvm_arm.h | 2 - |
13 | hw/arm/integratorcp.c | 2 +- | 19 | target/arm/cpu.c | 13 ++++-- |
14 | hw/arm/mainstone.c | 2 +- | 20 | target/arm/hvf/hvf.c | 95 ++++++++++++++++++++++++++++++++++++++++++++ |
15 | hw/arm/realview.c | 2 +- | 21 | 5 files changed, 124 insertions(+), 6 deletions(-) |
16 | hw/arm/versatilepb.c | 2 +- | 22 | create mode 100644 target/arm/hvf_arm.h |
17 | hw/net/smc91c111.c | 2 +- | 23 | |
18 | 8 files changed, 25 insertions(+), 17 deletions(-) | 24 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
19 | delete mode 100644 include/hw/devices.h | 25 | index XXXXXXX..XXXXXXX 100644 |
20 | create mode 100644 include/hw/net/smc91c111.h | 26 | --- a/target/arm/cpu.h |
21 | 27 | +++ b/target/arm/cpu.h | |
22 | diff --git a/include/hw/devices.h b/include/hw/devices.h | 28 | @@ -XXX,XX +XXX,XX @@ bool write_cpustate_to_list(ARMCPU *cpu, bool kvm_sync); |
23 | deleted file mode 100644 | 29 | #define ARM_CPU_TYPE_NAME(name) (name ARM_CPU_TYPE_SUFFIX) |
24 | index XXXXXXX..XXXXXXX | 30 | #define CPU_RESOLVING_TYPE TYPE_ARM_CPU |
25 | --- a/include/hw/devices.h | 31 | |
26 | +++ /dev/null | 32 | +#define TYPE_ARM_HOST_CPU "host-" TYPE_ARM_CPU |
27 | @@ -XXX,XX +XXX,XX @@ | 33 | + |
28 | -#ifndef QEMU_DEVICES_H | 34 | #define cpu_signal_handler cpu_arm_signal_handler |
29 | -#define QEMU_DEVICES_H | 35 | #define cpu_list arm_cpu_list |
30 | - | 36 | |
31 | -/* Devices that have nowhere better to go. */ | 37 | diff --git a/target/arm/hvf_arm.h b/target/arm/hvf_arm.h |
32 | - | ||
33 | -#include "hw/hw.h" | ||
34 | - | ||
35 | -/* smc91c111.c */ | ||
36 | -void smc91c111_init(NICInfo *, uint32_t, qemu_irq); | ||
37 | - | ||
38 | -#endif | ||
39 | diff --git a/include/hw/net/smc91c111.h b/include/hw/net/smc91c111.h | ||
40 | new file mode 100644 | 38 | new file mode 100644 |
41 | index XXXXXXX..XXXXXXX | 39 | index XXXXXXX..XXXXXXX |
42 | --- /dev/null | 40 | --- /dev/null |
43 | +++ b/include/hw/net/smc91c111.h | 41 | +++ b/target/arm/hvf_arm.h |
44 | @@ -XXX,XX +XXX,XX @@ | 42 | @@ -XXX,XX +XXX,XX @@ |
45 | +/* | 43 | +/* |
46 | + * SMSC 91C111 Ethernet interface emulation | 44 | + * QEMU Hypervisor.framework (HVF) support -- ARM specifics |
47 | + * | 45 | + * |
48 | + * Copyright (c) 2005 CodeSourcery, LLC. | 46 | + * Copyright (c) 2021 Alexander Graf |
49 | + * Written by Paul Brook | ||
50 | + * | 47 | + * |
51 | + * This work is licensed under the terms of the GNU GPL, version 2 or later. | 48 | + * This work is licensed under the terms of the GNU GPL, version 2 or later. |
52 | + * See the COPYING file in the top-level directory. | 49 | + * See the COPYING file in the top-level directory. |
50 | + * | ||
53 | + */ | 51 | + */ |
54 | + | 52 | + |
55 | +#ifndef HW_NET_SMC91C111_H | 53 | +#ifndef QEMU_HVF_ARM_H |
56 | +#define HW_NET_SMC91C111_H | 54 | +#define QEMU_HVF_ARM_H |
57 | + | 55 | + |
58 | +#include "hw/irq.h" | 56 | +#include "cpu.h" |
59 | +#include "net/net.h" | 57 | + |
60 | + | 58 | +void hvf_arm_set_cpu_features_from_host(struct ARMCPU *cpu); |
61 | +void smc91c111_init(NICInfo *, uint32_t, qemu_irq); | ||
62 | + | 59 | + |
63 | +#endif | 60 | +#endif |
64 | diff --git a/hw/arm/gumstix.c b/hw/arm/gumstix.c | 61 | diff --git a/target/arm/kvm_arm.h b/target/arm/kvm_arm.h |
65 | index XXXXXXX..XXXXXXX 100644 | 62 | index XXXXXXX..XXXXXXX 100644 |
66 | --- a/hw/arm/gumstix.c | 63 | --- a/target/arm/kvm_arm.h |
67 | +++ b/hw/arm/gumstix.c | 64 | +++ b/target/arm/kvm_arm.h |
65 | @@ -XXX,XX +XXX,XX @@ bool kvm_arm_create_scratch_host_vcpu(const uint32_t *cpus_to_try, | ||
66 | */ | ||
67 | void kvm_arm_destroy_scratch_host_vcpu(int *fdarray); | ||
68 | |||
69 | -#define TYPE_ARM_HOST_CPU "host-" TYPE_ARM_CPU | ||
70 | - | ||
71 | /** | ||
72 | * ARMHostCPUFeatures: information about the host CPU (identified | ||
73 | * by asking the host kernel) | ||
74 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | ||
75 | index XXXXXXX..XXXXXXX 100644 | ||
76 | --- a/target/arm/cpu.c | ||
77 | +++ b/target/arm/cpu.c | ||
68 | @@ -XXX,XX +XXX,XX @@ | 78 | @@ -XXX,XX +XXX,XX @@ |
69 | #include "hw/arm/pxa.h" | 79 | #include "sysemu/tcg.h" |
70 | #include "net/net.h" | 80 | #include "sysemu/hw_accel.h" |
71 | #include "hw/block/flash.h" | 81 | #include "kvm_arm.h" |
72 | -#include "hw/devices.h" | 82 | +#include "hvf_arm.h" |
73 | +#include "hw/net/smc91c111.h" | 83 | #include "disas/capstone.h" |
74 | #include "hw/boards.h" | 84 | #include "fpu/softfloat.h" |
75 | #include "exec/address-spaces.h" | 85 | |
76 | #include "sysemu/qtest.h" | 86 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_realizefn(DeviceState *dev, Error **errp) |
77 | diff --git a/hw/arm/integratorcp.c b/hw/arm/integratorcp.c | 87 | * this is the first point where we can report it. |
78 | index XXXXXXX..XXXXXXX 100644 | 88 | */ |
79 | --- a/hw/arm/integratorcp.c | 89 | if (cpu->host_cpu_probe_failed) { |
80 | +++ b/hw/arm/integratorcp.c | 90 | - if (!kvm_enabled()) { |
91 | - error_setg(errp, "The 'host' CPU type can only be used with KVM"); | ||
92 | + if (!kvm_enabled() && !hvf_enabled()) { | ||
93 | + error_setg(errp, "The 'host' CPU type can only be used with KVM or HVF"); | ||
94 | } else { | ||
95 | error_setg(errp, "Failed to retrieve host CPU features"); | ||
96 | } | ||
97 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_class_init(ObjectClass *oc, void *data) | ||
98 | #endif /* CONFIG_TCG */ | ||
99 | } | ||
100 | |||
101 | -#ifdef CONFIG_KVM | ||
102 | +#if defined(CONFIG_KVM) || defined(CONFIG_HVF) | ||
103 | static void arm_host_initfn(Object *obj) | ||
104 | { | ||
105 | ARMCPU *cpu = ARM_CPU(obj); | ||
106 | |||
107 | +#ifdef CONFIG_KVM | ||
108 | kvm_arm_set_cpu_features_from_host(cpu); | ||
109 | if (arm_feature(&cpu->env, ARM_FEATURE_AARCH64)) { | ||
110 | aarch64_add_sve_properties(obj); | ||
111 | } | ||
112 | +#else | ||
113 | + hvf_arm_set_cpu_features_from_host(cpu); | ||
114 | +#endif | ||
115 | arm_cpu_post_init(obj); | ||
116 | } | ||
117 | |||
118 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_register_types(void) | ||
119 | { | ||
120 | type_register_static(&arm_cpu_type_info); | ||
121 | |||
122 | -#ifdef CONFIG_KVM | ||
123 | +#if defined(CONFIG_KVM) || defined(CONFIG_HVF) | ||
124 | type_register_static(&host_arm_cpu_type_info); | ||
125 | #endif | ||
126 | } | ||
127 | diff --git a/target/arm/hvf/hvf.c b/target/arm/hvf/hvf.c | ||
128 | index XXXXXXX..XXXXXXX 100644 | ||
129 | --- a/target/arm/hvf/hvf.c | ||
130 | +++ b/target/arm/hvf/hvf.c | ||
81 | @@ -XXX,XX +XXX,XX @@ | 131 | @@ -XXX,XX +XXX,XX @@ |
82 | #include "qemu-common.h" | 132 | #include "sysemu/hvf.h" |
83 | #include "cpu.h" | 133 | #include "sysemu/hvf_int.h" |
84 | #include "hw/sysbus.h" | 134 | #include "sysemu/hw_accel.h" |
85 | -#include "hw/devices.h" | 135 | +#include "hvf_arm.h" |
86 | #include "hw/boards.h" | 136 | |
87 | #include "hw/arm/arm.h" | 137 | #include <mach/mach_time.h> |
88 | #include "hw/misc/arm_integrator_debug.h" | 138 | |
89 | +#include "hw/net/smc91c111.h" | 139 | @@ -XXX,XX +XXX,XX @@ typedef struct HVFVTimer { |
90 | #include "net/net.h" | 140 | |
91 | #include "exec/address-spaces.h" | 141 | static HVFVTimer vtimer; |
92 | #include "sysemu/sysemu.h" | 142 | |
93 | diff --git a/hw/arm/mainstone.c b/hw/arm/mainstone.c | 143 | +typedef struct ARMHostCPUFeatures { |
94 | index XXXXXXX..XXXXXXX 100644 | 144 | + ARMISARegisters isar; |
95 | --- a/hw/arm/mainstone.c | 145 | + uint64_t features; |
96 | +++ b/hw/arm/mainstone.c | 146 | + uint64_t midr; |
97 | @@ -XXX,XX +XXX,XX @@ | 147 | + uint32_t reset_sctlr; |
98 | #include "hw/arm/pxa.h" | 148 | + const char *dtb_compatible; |
99 | #include "hw/arm/arm.h" | 149 | +} ARMHostCPUFeatures; |
100 | #include "net/net.h" | 150 | + |
101 | -#include "hw/devices.h" | 151 | +static ARMHostCPUFeatures arm_host_cpu_features; |
102 | +#include "hw/net/smc91c111.h" | 152 | + |
103 | #include "hw/boards.h" | 153 | struct hvf_reg_match { |
104 | #include "hw/block/flash.h" | 154 | int reg; |
105 | #include "hw/sysbus.h" | 155 | uint64_t offset; |
106 | diff --git a/hw/arm/realview.c b/hw/arm/realview.c | 156 | @@ -XXX,XX +XXX,XX @@ static uint64_t hvf_get_reg(CPUState *cpu, int rt) |
107 | index XXXXXXX..XXXXXXX 100644 | 157 | return val; |
108 | --- a/hw/arm/realview.c | 158 | } |
109 | +++ b/hw/arm/realview.c | 159 | |
110 | @@ -XXX,XX +XXX,XX @@ | 160 | +static bool hvf_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf) |
111 | #include "hw/sysbus.h" | 161 | +{ |
112 | #include "hw/arm/arm.h" | 162 | + ARMISARegisters host_isar = {}; |
113 | #include "hw/arm/primecell.h" | 163 | + const struct isar_regs { |
114 | -#include "hw/devices.h" | 164 | + int reg; |
115 | #include "hw/net/lan9118.h" | 165 | + uint64_t *val; |
116 | +#include "hw/net/smc91c111.h" | 166 | + } regs[] = { |
117 | #include "hw/pci/pci.h" | 167 | + { HV_SYS_REG_ID_AA64PFR0_EL1, &host_isar.id_aa64pfr0 }, |
118 | #include "net/net.h" | 168 | + { HV_SYS_REG_ID_AA64PFR1_EL1, &host_isar.id_aa64pfr1 }, |
119 | #include "sysemu/sysemu.h" | 169 | + { HV_SYS_REG_ID_AA64DFR0_EL1, &host_isar.id_aa64dfr0 }, |
120 | diff --git a/hw/arm/versatilepb.c b/hw/arm/versatilepb.c | 170 | + { HV_SYS_REG_ID_AA64DFR1_EL1, &host_isar.id_aa64dfr1 }, |
121 | index XXXXXXX..XXXXXXX 100644 | 171 | + { HV_SYS_REG_ID_AA64ISAR0_EL1, &host_isar.id_aa64isar0 }, |
122 | --- a/hw/arm/versatilepb.c | 172 | + { HV_SYS_REG_ID_AA64ISAR1_EL1, &host_isar.id_aa64isar1 }, |
123 | +++ b/hw/arm/versatilepb.c | 173 | + { HV_SYS_REG_ID_AA64MMFR0_EL1, &host_isar.id_aa64mmfr0 }, |
124 | @@ -XXX,XX +XXX,XX @@ | 174 | + { HV_SYS_REG_ID_AA64MMFR1_EL1, &host_isar.id_aa64mmfr1 }, |
125 | #include "cpu.h" | 175 | + { HV_SYS_REG_ID_AA64MMFR2_EL1, &host_isar.id_aa64mmfr2 }, |
126 | #include "hw/sysbus.h" | 176 | + }; |
127 | #include "hw/arm/arm.h" | 177 | + hv_vcpu_t fd; |
128 | -#include "hw/devices.h" | 178 | + hv_return_t r = HV_SUCCESS; |
129 | +#include "hw/net/smc91c111.h" | 179 | + hv_vcpu_exit_t *exit; |
130 | #include "net/net.h" | 180 | + int i; |
131 | #include "sysemu/sysemu.h" | 181 | + |
132 | #include "hw/pci/pci.h" | 182 | + ahcf->dtb_compatible = "arm,arm-v8"; |
133 | diff --git a/hw/net/smc91c111.c b/hw/net/smc91c111.c | 183 | + ahcf->features = (1ULL << ARM_FEATURE_V8) | |
134 | index XXXXXXX..XXXXXXX 100644 | 184 | + (1ULL << ARM_FEATURE_NEON) | |
135 | --- a/hw/net/smc91c111.c | 185 | + (1ULL << ARM_FEATURE_AARCH64) | |
136 | +++ b/hw/net/smc91c111.c | 186 | + (1ULL << ARM_FEATURE_PMU) | |
137 | @@ -XXX,XX +XXX,XX @@ | 187 | + (1ULL << ARM_FEATURE_GENERIC_TIMER); |
138 | #include "qemu/osdep.h" | 188 | + |
139 | #include "hw/sysbus.h" | 189 | + /* We set up a small vcpu to extract host registers */ |
140 | #include "net/net.h" | 190 | + |
141 | -#include "hw/devices.h" | 191 | + if (hv_vcpu_create(&fd, &exit, NULL) != HV_SUCCESS) { |
142 | +#include "hw/net/smc91c111.h" | 192 | + return false; |
143 | #include "qemu/log.h" | 193 | + } |
144 | /* For crc32 */ | 194 | + |
145 | #include <zlib.h> | 195 | + for (i = 0; i < ARRAY_SIZE(regs); i++) { |
196 | + r |= hv_vcpu_get_sys_reg(fd, regs[i].reg, regs[i].val); | ||
197 | + } | ||
198 | + r |= hv_vcpu_get_sys_reg(fd, HV_SYS_REG_MIDR_EL1, &ahcf->midr); | ||
199 | + r |= hv_vcpu_destroy(fd); | ||
200 | + | ||
201 | + ahcf->isar = host_isar; | ||
202 | + | ||
203 | + /* | ||
204 | + * A scratch vCPU returns SCTLR 0, so let's fill our default with the M1 | ||
205 | + * boot SCTLR from https://github.com/AsahiLinux/m1n1/issues/97 | ||
206 | + */ | ||
207 | + ahcf->reset_sctlr = 0x30100180; | ||
208 | + /* | ||
209 | + * SPAN is disabled by default when SCTLR.SPAN=1. To improve compatibility, | ||
210 | + * let's disable it on boot and then allow guest software to turn it on by | ||
211 | + * setting it to 0. | ||
212 | + */ | ||
213 | + ahcf->reset_sctlr |= 0x00800000; | ||
214 | + | ||
215 | + /* Make sure we don't advertise AArch32 support for EL0/EL1 */ | ||
216 | + if ((host_isar.id_aa64pfr0 & 0xff) != 0x11) { | ||
217 | + return false; | ||
218 | + } | ||
219 | + | ||
220 | + return r == HV_SUCCESS; | ||
221 | +} | ||
222 | + | ||
223 | +void hvf_arm_set_cpu_features_from_host(ARMCPU *cpu) | ||
224 | +{ | ||
225 | + if (!arm_host_cpu_features.dtb_compatible) { | ||
226 | + if (!hvf_enabled() || | ||
227 | + !hvf_arm_get_host_cpu_features(&arm_host_cpu_features)) { | ||
228 | + /* | ||
229 | + * We can't report this error yet, so flag that we need to | ||
230 | + * in arm_cpu_realizefn(). | ||
231 | + */ | ||
232 | + cpu->host_cpu_probe_failed = true; | ||
233 | + return; | ||
234 | + } | ||
235 | + } | ||
236 | + | ||
237 | + cpu->dtb_compatible = arm_host_cpu_features.dtb_compatible; | ||
238 | + cpu->isar = arm_host_cpu_features.isar; | ||
239 | + cpu->env.features = arm_host_cpu_features.features; | ||
240 | + cpu->midr = arm_host_cpu_features.midr; | ||
241 | + cpu->reset_sctlr = arm_host_cpu_features.reset_sctlr; | ||
242 | +} | ||
243 | + | ||
244 | void hvf_arch_vcpu_destroy(CPUState *cpu) | ||
245 | { | ||
246 | } | ||
146 | -- | 247 | -- |
147 | 2.20.1 | 248 | 2.20.1 |
148 | 249 | ||
149 | 250 | diff view generated by jsdifflib |
1 | From: Eric Auger <eric.auger@redhat.com> | 1 | From: Alexander Graf <agraf@csgraf.de> |
---|---|---|---|
2 | 2 | ||
3 | The SMMUNotifierNode struct is not necessary and brings extra | 3 | We need to handle PSCI calls. Most of the TCG code works for us, |
4 | complexity so let's remove it. We now directly track the SMMUDevices | 4 | but we can simplify it to only handle aa64 mode and we need to |
5 | which have registered IOMMU MR notifiers. | 5 | handle SUSPEND differently. |
6 | 6 | ||
7 | This is inspired from the same transformation on intel-iommu | 7 | This patch takes the TCG code as template and duplicates it in HVF. |
8 | done in commit b4a4ba0d68f50f218ee3957b6638dbee32a5eeef | 8 | |
9 | ("intel-iommu: remove IntelIOMMUNotifierNode") | 9 | To tell the guest that we support PSCI 0.2 now, update the check in |
10 | 10 | arm_cpu_initfn() as well. | |
11 | Signed-off-by: Eric Auger <eric.auger@redhat.com> | 11 | |
12 | Reviewed-by: Peter Xu <peterx@redhat.com> | 12 | Signed-off-by: Alexander Graf <agraf@csgraf.de> |
13 | Message-id: 20190409160219.19026-1-eric.auger@redhat.com | 13 | Reviewed-by: Sergio Lopez <slp@redhat.com> |
14 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
15 | Message-id: 20210916155404.86958-8-agraf@csgraf.de | ||
14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
15 | --- | 17 | --- |
16 | include/hw/arm/smmu-common.h | 8 ++------ | 18 | target/arm/cpu.c | 4 +- |
17 | hw/arm/smmu-common.c | 6 +++--- | 19 | target/arm/hvf/hvf.c | 141 ++++++++++++++++++++++++++++++++++-- |
18 | hw/arm/smmuv3.c | 28 +++++++--------------------- | 20 | target/arm/hvf/trace-events | 1 + |
19 | 3 files changed, 12 insertions(+), 30 deletions(-) | 21 | 3 files changed, 139 insertions(+), 7 deletions(-) |
20 | 22 | ||
21 | diff --git a/include/hw/arm/smmu-common.h b/include/hw/arm/smmu-common.h | 23 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c |
22 | index XXXXXXX..XXXXXXX 100644 | 24 | index XXXXXXX..XXXXXXX 100644 |
23 | --- a/include/hw/arm/smmu-common.h | 25 | --- a/target/arm/cpu.c |
24 | +++ b/include/hw/arm/smmu-common.h | 26 | +++ b/target/arm/cpu.c |
25 | @@ -XXX,XX +XXX,XX @@ typedef struct SMMUDevice { | 27 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_initfn(Object *obj) |
26 | AddressSpace as; | 28 | cpu->psci_version = 1; /* By default assume PSCI v0.1 */ |
27 | uint32_t cfg_cache_hits; | 29 | cpu->kvm_target = QEMU_KVM_ARM_TARGET_NONE; |
28 | uint32_t cfg_cache_misses; | 30 | |
29 | + QLIST_ENTRY(SMMUDevice) next; | 31 | - if (tcg_enabled()) { |
30 | } SMMUDevice; | 32 | - cpu->psci_version = 2; /* TCG implements PSCI 0.2 */ |
31 | 33 | + if (tcg_enabled() || hvf_enabled()) { | |
32 | -typedef struct SMMUNotifierNode { | 34 | + cpu->psci_version = 2; /* TCG and HVF implement PSCI 0.2 */ |
33 | - SMMUDevice *sdev; | ||
34 | - QLIST_ENTRY(SMMUNotifierNode) next; | ||
35 | -} SMMUNotifierNode; | ||
36 | - | ||
37 | typedef struct SMMUPciBus { | ||
38 | PCIBus *bus; | ||
39 | SMMUDevice *pbdev[0]; /* Parent array is sparse, so dynamically alloc */ | ||
40 | @@ -XXX,XX +XXX,XX @@ typedef struct SMMUState { | ||
41 | GHashTable *iotlb; | ||
42 | SMMUPciBus *smmu_pcibus_by_bus_num[SMMU_PCI_BUS_MAX]; | ||
43 | PCIBus *pci_bus; | ||
44 | - QLIST_HEAD(, SMMUNotifierNode) notifiers_list; | ||
45 | + QLIST_HEAD(, SMMUDevice) devices_with_notifiers; | ||
46 | uint8_t bus_num; | ||
47 | PCIBus *primary_bus; | ||
48 | } SMMUState; | ||
49 | diff --git a/hw/arm/smmu-common.c b/hw/arm/smmu-common.c | ||
50 | index XXXXXXX..XXXXXXX 100644 | ||
51 | --- a/hw/arm/smmu-common.c | ||
52 | +++ b/hw/arm/smmu-common.c | ||
53 | @@ -XXX,XX +XXX,XX @@ inline void smmu_inv_notifiers_mr(IOMMUMemoryRegion *mr) | ||
54 | /* Unmap all notifiers of all mr's */ | ||
55 | void smmu_inv_notifiers_all(SMMUState *s) | ||
56 | { | ||
57 | - SMMUNotifierNode *node; | ||
58 | + SMMUDevice *sdev; | ||
59 | |||
60 | - QLIST_FOREACH(node, &s->notifiers_list, next) { | ||
61 | - smmu_inv_notifiers_mr(&node->sdev->iommu); | ||
62 | + QLIST_FOREACH(sdev, &s->devices_with_notifiers, next) { | ||
63 | + smmu_inv_notifiers_mr(&sdev->iommu); | ||
64 | } | 35 | } |
65 | } | 36 | } |
66 | 37 | ||
67 | diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c | 38 | diff --git a/target/arm/hvf/hvf.c b/target/arm/hvf/hvf.c |
68 | index XXXXXXX..XXXXXXX 100644 | 39 | index XXXXXXX..XXXXXXX 100644 |
69 | --- a/hw/arm/smmuv3.c | 40 | --- a/target/arm/hvf/hvf.c |
70 | +++ b/hw/arm/smmuv3.c | 41 | +++ b/target/arm/hvf/hvf.c |
71 | @@ -XXX,XX +XXX,XX @@ static void smmuv3_notify_iova(IOMMUMemoryRegion *mr, | 42 | @@ -XXX,XX +XXX,XX @@ |
72 | /* invalidate an asid/iova tuple in all mr's */ | 43 | #include "hw/irq.h" |
73 | static void smmuv3_inv_notifiers_iova(SMMUState *s, int asid, dma_addr_t iova) | 44 | #include "qemu/main-loop.h" |
45 | #include "sysemu/cpus.h" | ||
46 | +#include "arm-powerctl.h" | ||
47 | #include "target/arm/cpu.h" | ||
48 | #include "target/arm/internals.h" | ||
49 | #include "trace/trace-target_arm_hvf.h" | ||
50 | @@ -XXX,XX +XXX,XX @@ | ||
51 | #define TMR_CTL_IMASK (1 << 1) | ||
52 | #define TMR_CTL_ISTATUS (1 << 2) | ||
53 | |||
54 | +static void hvf_wfi(CPUState *cpu); | ||
55 | + | ||
56 | typedef struct HVFVTimer { | ||
57 | /* Vtimer value during migration and paused state */ | ||
58 | uint64_t vtimer_val; | ||
59 | @@ -XXX,XX +XXX,XX @@ static void hvf_raise_exception(CPUState *cpu, uint32_t excp, | ||
60 | arm_cpu_do_interrupt(cpu); | ||
61 | } | ||
62 | |||
63 | +static void hvf_psci_cpu_off(ARMCPU *arm_cpu) | ||
64 | +{ | ||
65 | + int32_t ret = arm_set_cpu_off(arm_cpu->mp_affinity); | ||
66 | + assert(ret == QEMU_ARM_POWERCTL_RET_SUCCESS); | ||
67 | +} | ||
68 | + | ||
69 | +/* | ||
70 | + * Handle a PSCI call. | ||
71 | + * | ||
72 | + * Returns 0 on success | ||
73 | + * -1 when the PSCI call is unknown, | ||
74 | + */ | ||
75 | +static bool hvf_handle_psci_call(CPUState *cpu) | ||
76 | +{ | ||
77 | + ARMCPU *arm_cpu = ARM_CPU(cpu); | ||
78 | + CPUARMState *env = &arm_cpu->env; | ||
79 | + uint64_t param[4] = { | ||
80 | + env->xregs[0], | ||
81 | + env->xregs[1], | ||
82 | + env->xregs[2], | ||
83 | + env->xregs[3] | ||
84 | + }; | ||
85 | + uint64_t context_id, mpidr; | ||
86 | + bool target_aarch64 = true; | ||
87 | + CPUState *target_cpu_state; | ||
88 | + ARMCPU *target_cpu; | ||
89 | + target_ulong entry; | ||
90 | + int target_el = 1; | ||
91 | + int32_t ret = 0; | ||
92 | + | ||
93 | + trace_hvf_psci_call(param[0], param[1], param[2], param[3], | ||
94 | + arm_cpu->mp_affinity); | ||
95 | + | ||
96 | + switch (param[0]) { | ||
97 | + case QEMU_PSCI_0_2_FN_PSCI_VERSION: | ||
98 | + ret = QEMU_PSCI_0_2_RET_VERSION_0_2; | ||
99 | + break; | ||
100 | + case QEMU_PSCI_0_2_FN_MIGRATE_INFO_TYPE: | ||
101 | + ret = QEMU_PSCI_0_2_RET_TOS_MIGRATION_NOT_REQUIRED; /* No trusted OS */ | ||
102 | + break; | ||
103 | + case QEMU_PSCI_0_2_FN_AFFINITY_INFO: | ||
104 | + case QEMU_PSCI_0_2_FN64_AFFINITY_INFO: | ||
105 | + mpidr = param[1]; | ||
106 | + | ||
107 | + switch (param[2]) { | ||
108 | + case 0: | ||
109 | + target_cpu_state = arm_get_cpu_by_id(mpidr); | ||
110 | + if (!target_cpu_state) { | ||
111 | + ret = QEMU_PSCI_RET_INVALID_PARAMS; | ||
112 | + break; | ||
113 | + } | ||
114 | + target_cpu = ARM_CPU(target_cpu_state); | ||
115 | + | ||
116 | + ret = target_cpu->power_state; | ||
117 | + break; | ||
118 | + default: | ||
119 | + /* Everything above affinity level 0 is always on. */ | ||
120 | + ret = 0; | ||
121 | + } | ||
122 | + break; | ||
123 | + case QEMU_PSCI_0_2_FN_SYSTEM_RESET: | ||
124 | + qemu_system_reset_request(SHUTDOWN_CAUSE_GUEST_RESET); | ||
125 | + /* | ||
126 | + * QEMU reset and shutdown are async requests, but PSCI | ||
127 | + * mandates that we never return from the reset/shutdown | ||
128 | + * call, so power the CPU off now so it doesn't execute | ||
129 | + * anything further. | ||
130 | + */ | ||
131 | + hvf_psci_cpu_off(arm_cpu); | ||
132 | + break; | ||
133 | + case QEMU_PSCI_0_2_FN_SYSTEM_OFF: | ||
134 | + qemu_system_shutdown_request(SHUTDOWN_CAUSE_GUEST_SHUTDOWN); | ||
135 | + hvf_psci_cpu_off(arm_cpu); | ||
136 | + break; | ||
137 | + case QEMU_PSCI_0_1_FN_CPU_ON: | ||
138 | + case QEMU_PSCI_0_2_FN_CPU_ON: | ||
139 | + case QEMU_PSCI_0_2_FN64_CPU_ON: | ||
140 | + mpidr = param[1]; | ||
141 | + entry = param[2]; | ||
142 | + context_id = param[3]; | ||
143 | + ret = arm_set_cpu_on(mpidr, entry, context_id, | ||
144 | + target_el, target_aarch64); | ||
145 | + break; | ||
146 | + case QEMU_PSCI_0_1_FN_CPU_OFF: | ||
147 | + case QEMU_PSCI_0_2_FN_CPU_OFF: | ||
148 | + hvf_psci_cpu_off(arm_cpu); | ||
149 | + break; | ||
150 | + case QEMU_PSCI_0_1_FN_CPU_SUSPEND: | ||
151 | + case QEMU_PSCI_0_2_FN_CPU_SUSPEND: | ||
152 | + case QEMU_PSCI_0_2_FN64_CPU_SUSPEND: | ||
153 | + /* Affinity levels are not supported in QEMU */ | ||
154 | + if (param[1] & 0xfffe0000) { | ||
155 | + ret = QEMU_PSCI_RET_INVALID_PARAMS; | ||
156 | + break; | ||
157 | + } | ||
158 | + /* Powerdown is not supported, we always go into WFI */ | ||
159 | + env->xregs[0] = 0; | ||
160 | + hvf_wfi(cpu); | ||
161 | + break; | ||
162 | + case QEMU_PSCI_0_1_FN_MIGRATE: | ||
163 | + case QEMU_PSCI_0_2_FN_MIGRATE: | ||
164 | + ret = QEMU_PSCI_RET_NOT_SUPPORTED; | ||
165 | + break; | ||
166 | + default: | ||
167 | + return false; | ||
168 | + } | ||
169 | + | ||
170 | + env->xregs[0] = ret; | ||
171 | + return true; | ||
172 | +} | ||
173 | + | ||
174 | static int hvf_sysreg_read(CPUState *cpu, uint32_t reg, uint32_t rt) | ||
74 | { | 175 | { |
75 | - SMMUNotifierNode *node; | 176 | ARMCPU *arm_cpu = ARM_CPU(cpu); |
76 | + SMMUDevice *sdev; | 177 | @@ -XXX,XX +XXX,XX @@ int hvf_vcpu_exec(CPUState *cpu) |
77 | 178 | break; | |
78 | - QLIST_FOREACH(node, &s->notifiers_list, next) { | 179 | case EC_AA64_HVC: |
79 | - IOMMUMemoryRegion *mr = &node->sdev->iommu; | 180 | cpu_synchronize_state(cpu); |
80 | + QLIST_FOREACH(sdev, &s->devices_with_notifiers, next) { | 181 | - trace_hvf_unknown_hvc(env->xregs[0]); |
81 | + IOMMUMemoryRegion *mr = &sdev->iommu; | 182 | - /* SMCCC 1.3 section 5.2 says every unknown SMCCC call returns -1 */ |
82 | IOMMUNotifier *n; | 183 | - env->xregs[0] = -1; |
83 | 184 | + if (arm_cpu->psci_conduit == QEMU_PSCI_CONDUIT_HVC) { | |
84 | trace_smmuv3_inv_notifiers_iova(mr->parent_obj.name, asid, iova); | 185 | + if (!hvf_handle_psci_call(cpu)) { |
85 | @@ -XXX,XX +XXX,XX @@ static void smmuv3_notify_flag_changed(IOMMUMemoryRegion *iommu, | 186 | + trace_hvf_unknown_hvc(env->xregs[0]); |
86 | SMMUDevice *sdev = container_of(iommu, SMMUDevice, iommu); | 187 | + /* SMCCC 1.3 section 5.2 says every unknown SMCCC call returns -1 */ |
87 | SMMUv3State *s3 = sdev->smmu; | 188 | + env->xregs[0] = -1; |
88 | SMMUState *s = &(s3->smmu_state); | 189 | + } |
89 | - SMMUNotifierNode *node = NULL; | 190 | + } else { |
90 | - SMMUNotifierNode *next_node = NULL; | 191 | + trace_hvf_unknown_hvc(env->xregs[0]); |
91 | 192 | + hvf_raise_exception(cpu, EXCP_UDEF, syn_uncategorized()); | |
92 | if (new & IOMMU_NOTIFIER_MAP) { | 193 | + } |
93 | int bus_num = pci_bus_num(sdev->bus); | 194 | break; |
94 | @@ -XXX,XX +XXX,XX @@ static void smmuv3_notify_flag_changed(IOMMUMemoryRegion *iommu, | 195 | case EC_AA64_SMC: |
95 | 196 | cpu_synchronize_state(cpu); | |
96 | if (old == IOMMU_NOTIFIER_NONE) { | 197 | - trace_hvf_unknown_smc(env->xregs[0]); |
97 | trace_smmuv3_notify_flag_add(iommu->parent_obj.name); | 198 | - hvf_raise_exception(cpu, EXCP_UDEF, syn_uncategorized()); |
98 | - node = g_malloc0(sizeof(*node)); | 199 | + if (arm_cpu->psci_conduit == QEMU_PSCI_CONDUIT_SMC) { |
99 | - node->sdev = sdev; | 200 | + advance_pc = true; |
100 | - QLIST_INSERT_HEAD(&s->notifiers_list, node, next); | 201 | + |
101 | - return; | 202 | + if (!hvf_handle_psci_call(cpu)) { |
102 | - } | 203 | + trace_hvf_unknown_smc(env->xregs[0]); |
103 | - | 204 | + /* SMCCC 1.3 section 5.2 says every unknown SMCCC call returns -1 */ |
104 | - /* update notifier node with new flags */ | 205 | + env->xregs[0] = -1; |
105 | - QLIST_FOREACH_SAFE(node, &s->notifiers_list, next, next_node) { | 206 | + } |
106 | - if (node->sdev == sdev) { | 207 | + } else { |
107 | - if (new == IOMMU_NOTIFIER_NONE) { | 208 | + trace_hvf_unknown_smc(env->xregs[0]); |
108 | - trace_smmuv3_notify_flag_del(iommu->parent_obj.name); | 209 | + hvf_raise_exception(cpu, EXCP_UDEF, syn_uncategorized()); |
109 | - QLIST_REMOVE(node, next); | 210 | + } |
110 | - g_free(node); | 211 | break; |
111 | - } | 212 | default: |
112 | - return; | 213 | cpu_synchronize_state(cpu); |
113 | - } | 214 | diff --git a/target/arm/hvf/trace-events b/target/arm/hvf/trace-events |
114 | + QLIST_INSERT_HEAD(&s->devices_with_notifiers, sdev, next); | 215 | index XXXXXXX..XXXXXXX 100644 |
115 | + } else if (new == IOMMU_NOTIFIER_NONE) { | 216 | --- a/target/arm/hvf/trace-events |
116 | + trace_smmuv3_notify_flag_del(iommu->parent_obj.name); | 217 | +++ b/target/arm/hvf/trace-events |
117 | + QLIST_REMOVE(sdev, next); | 218 | @@ -XXX,XX +XXX,XX @@ hvf_sysreg_write(uint32_t reg, uint32_t op0, uint32_t op1, uint32_t crn, uint32_ |
118 | } | 219 | hvf_unknown_hvc(uint64_t x0) "unknown HVC! 0x%016"PRIx64 |
119 | } | 220 | hvf_unknown_smc(uint64_t x0) "unknown SMC! 0x%016"PRIx64 |
120 | 221 | hvf_exit(uint64_t syndrome, uint32_t ec, uint64_t pc) "exit: 0x%"PRIx64" [ec=0x%x pc=0x%"PRIx64"]" | |
222 | +hvf_psci_call(uint64_t x0, uint64_t x1, uint64_t x2, uint64_t x3, uint32_t cpuid) "PSCI Call x0=0x%016"PRIx64" x1=0x%016"PRIx64" x2=0x%016"PRIx64" x3=0x%016"PRIx64" cpu=0x%x" | ||
121 | -- | 223 | -- |
122 | 2.20.1 | 224 | 2.20.1 |
123 | 225 | ||
124 | 226 | diff view generated by jsdifflib |
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | 1 | From: Alexander Graf <agraf@csgraf.de> |
---|---|---|---|
2 | 2 | ||
3 | Reviewed-by: Markus Armbruster <armbru@redhat.com> | 3 | Now that we have all logic in place that we need to handle Hypervisor.framework |
4 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | 4 | on Apple Silicon systems, let's add CONFIG_HVF for aarch64 as well so that we |
5 | Message-id: 20190412165416.7977-10-philmd@redhat.com | 5 | can build it. |
6 | |||
7 | Signed-off-by: Alexander Graf <agraf@csgraf.de> | ||
8 | Reviewed-by: Roman Bolshakov <r.bolshakov@yadro.com> | ||
9 | Tested-by: Roman Bolshakov <r.bolshakov@yadro.com> (x86 only) | ||
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | Reviewed-by: Sergio Lopez <slp@redhat.com> | ||
12 | Message-id: 20210916155404.86958-9-agraf@csgraf.de | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | --- | 14 | --- |
8 | include/hw/devices.h | 3 --- | 15 | meson.build | 7 +++++++ |
9 | include/hw/net/lan9118.h | 19 +++++++++++++++++++ | 16 | target/arm/hvf/meson.build | 3 +++ |
10 | hw/arm/kzm.c | 2 +- | 17 | target/arm/meson.build | 2 ++ |
11 | hw/arm/mps2.c | 2 +- | 18 | 3 files changed, 12 insertions(+) |
12 | hw/arm/realview.c | 1 + | 19 | create mode 100644 target/arm/hvf/meson.build |
13 | hw/arm/vexpress.c | 2 +- | ||
14 | hw/net/lan9118.c | 2 +- | ||
15 | 7 files changed, 24 insertions(+), 7 deletions(-) | ||
16 | create mode 100644 include/hw/net/lan9118.h | ||
17 | 20 | ||
18 | diff --git a/include/hw/devices.h b/include/hw/devices.h | 21 | diff --git a/meson.build b/meson.build |
19 | index XXXXXXX..XXXXXXX 100644 | 22 | index XXXXXXX..XXXXXXX 100644 |
20 | --- a/include/hw/devices.h | 23 | --- a/meson.build |
21 | +++ b/include/hw/devices.h | 24 | +++ b/meson.build |
22 | @@ -XXX,XX +XXX,XX @@ | 25 | @@ -XXX,XX +XXX,XX @@ else |
23 | /* smc91c111.c */ | 26 | endif |
24 | void smc91c111_init(NICInfo *, uint32_t, qemu_irq); | 27 | |
25 | 28 | accelerator_targets = { 'CONFIG_KVM': kvm_targets } | |
26 | -/* lan9118.c */ | 29 | + |
27 | -void lan9118_init(NICInfo *, uint32_t, qemu_irq); | 30 | +if cpu in ['aarch64'] |
28 | - | 31 | + accelerator_targets += { |
29 | #endif | 32 | + 'CONFIG_HVF': ['aarch64-softmmu'] |
30 | diff --git a/include/hw/net/lan9118.h b/include/hw/net/lan9118.h | 33 | + } |
34 | +endif | ||
35 | + | ||
36 | if cpu in ['x86', 'x86_64', 'arm', 'aarch64'] | ||
37 | # i386 emulator provides xenpv machine type for multiple architectures | ||
38 | accelerator_targets += { | ||
39 | diff --git a/target/arm/hvf/meson.build b/target/arm/hvf/meson.build | ||
31 | new file mode 100644 | 40 | new file mode 100644 |
32 | index XXXXXXX..XXXXXXX | 41 | index XXXXXXX..XXXXXXX |
33 | --- /dev/null | 42 | --- /dev/null |
34 | +++ b/include/hw/net/lan9118.h | 43 | +++ b/target/arm/hvf/meson.build |
35 | @@ -XXX,XX +XXX,XX @@ | 44 | @@ -XXX,XX +XXX,XX @@ |
36 | +/* | 45 | +arm_softmmu_ss.add(when: [hvf, 'CONFIG_HVF'], if_true: files( |
37 | + * SMSC LAN9118 Ethernet interface emulation | 46 | + 'hvf.c', |
38 | + * | 47 | +)) |
39 | + * Copyright (c) 2009 CodeSourcery, LLC. | 48 | diff --git a/target/arm/meson.build b/target/arm/meson.build |
40 | + * Written by Paul Brook | 49 | index XXXXXXX..XXXXXXX 100644 |
41 | + * | 50 | --- a/target/arm/meson.build |
42 | + * This work is licensed under the terms of the GNU GPL, version 2 or later. | 51 | +++ b/target/arm/meson.build |
43 | + * See the COPYING file in the top-level directory. | 52 | @@ -XXX,XX +XXX,XX @@ arm_softmmu_ss.add(files( |
44 | + */ | 53 | 'psci.c', |
54 | )) | ||
55 | |||
56 | +subdir('hvf') | ||
45 | + | 57 | + |
46 | +#ifndef HW_NET_LAN9118_H | 58 | target_arch += {'arm': arm_ss} |
47 | +#define HW_NET_LAN9118_H | 59 | target_softmmu_arch += {'arm': arm_softmmu_ss} |
48 | + | ||
49 | +#include "hw/irq.h" | ||
50 | +#include "net/net.h" | ||
51 | + | ||
52 | +void lan9118_init(NICInfo *, uint32_t, qemu_irq); | ||
53 | + | ||
54 | +#endif | ||
55 | diff --git a/hw/arm/kzm.c b/hw/arm/kzm.c | ||
56 | index XXXXXXX..XXXXXXX 100644 | ||
57 | --- a/hw/arm/kzm.c | ||
58 | +++ b/hw/arm/kzm.c | ||
59 | @@ -XXX,XX +XXX,XX @@ | ||
60 | #include "qemu/error-report.h" | ||
61 | #include "exec/address-spaces.h" | ||
62 | #include "net/net.h" | ||
63 | -#include "hw/devices.h" | ||
64 | +#include "hw/net/lan9118.h" | ||
65 | #include "hw/char/serial.h" | ||
66 | #include "sysemu/qtest.h" | ||
67 | |||
68 | diff --git a/hw/arm/mps2.c b/hw/arm/mps2.c | ||
69 | index XXXXXXX..XXXXXXX 100644 | ||
70 | --- a/hw/arm/mps2.c | ||
71 | +++ b/hw/arm/mps2.c | ||
72 | @@ -XXX,XX +XXX,XX @@ | ||
73 | #include "hw/timer/cmsdk-apb-timer.h" | ||
74 | #include "hw/timer/cmsdk-apb-dualtimer.h" | ||
75 | #include "hw/misc/mps2-scc.h" | ||
76 | -#include "hw/devices.h" | ||
77 | +#include "hw/net/lan9118.h" | ||
78 | #include "net/net.h" | ||
79 | |||
80 | typedef enum MPS2FPGAType { | ||
81 | diff --git a/hw/arm/realview.c b/hw/arm/realview.c | ||
82 | index XXXXXXX..XXXXXXX 100644 | ||
83 | --- a/hw/arm/realview.c | ||
84 | +++ b/hw/arm/realview.c | ||
85 | @@ -XXX,XX +XXX,XX @@ | ||
86 | #include "hw/arm/arm.h" | ||
87 | #include "hw/arm/primecell.h" | ||
88 | #include "hw/devices.h" | ||
89 | +#include "hw/net/lan9118.h" | ||
90 | #include "hw/pci/pci.h" | ||
91 | #include "net/net.h" | ||
92 | #include "sysemu/sysemu.h" | ||
93 | diff --git a/hw/arm/vexpress.c b/hw/arm/vexpress.c | ||
94 | index XXXXXXX..XXXXXXX 100644 | ||
95 | --- a/hw/arm/vexpress.c | ||
96 | +++ b/hw/arm/vexpress.c | ||
97 | @@ -XXX,XX +XXX,XX @@ | ||
98 | #include "hw/sysbus.h" | ||
99 | #include "hw/arm/arm.h" | ||
100 | #include "hw/arm/primecell.h" | ||
101 | -#include "hw/devices.h" | ||
102 | +#include "hw/net/lan9118.h" | ||
103 | #include "hw/i2c/i2c.h" | ||
104 | #include "net/net.h" | ||
105 | #include "sysemu/sysemu.h" | ||
106 | diff --git a/hw/net/lan9118.c b/hw/net/lan9118.c | ||
107 | index XXXXXXX..XXXXXXX 100644 | ||
108 | --- a/hw/net/lan9118.c | ||
109 | +++ b/hw/net/lan9118.c | ||
110 | @@ -XXX,XX +XXX,XX @@ | ||
111 | #include "hw/sysbus.h" | ||
112 | #include "net/net.h" | ||
113 | #include "net/eth.h" | ||
114 | -#include "hw/devices.h" | ||
115 | +#include "hw/net/lan9118.h" | ||
116 | #include "sysemu/sysemu.h" | ||
117 | #include "hw/ptimer.h" | ||
118 | #include "qemu/log.h" | ||
119 | -- | 60 | -- |
120 | 2.20.1 | 61 | 2.20.1 |
121 | 62 | ||
122 | 63 | diff view generated by jsdifflib |
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | 1 | From: Alexander Graf <agraf@csgraf.de> |
---|---|---|---|
2 | 2 | ||
3 | Reviewed-by: Thomas Huth <thuth@redhat.com> | 3 | We can expose cycle counters on the PMU easily. To be as compatible as |
4 | Reviewed-by: Cédric Le Goater <clg@kaod.org> | 4 | possible, let's do so, but make sure we don't expose any other architectural |
5 | Reviewed-by: Markus Armbruster <armbru@redhat.com> | 5 | counters that we can not model yet. |
6 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | 6 | |
7 | Message-id: 20190412165416.7977-2-philmd@redhat.com | 7 | This allows OSs to work that require PMU support. |
8 | |||
9 | Signed-off-by: Alexander Graf <agraf@csgraf.de> | ||
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | Message-id: 20210916155404.86958-10-agraf@csgraf.de | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | --- | 13 | --- |
10 | hw/arm/aspeed.c | 13 +++++++++---- | 14 | target/arm/hvf/hvf.c | 179 +++++++++++++++++++++++++++++++++++++++++++ |
11 | 1 file changed, 9 insertions(+), 4 deletions(-) | 15 | 1 file changed, 179 insertions(+) |
12 | 16 | ||
13 | diff --git a/hw/arm/aspeed.c b/hw/arm/aspeed.c | 17 | diff --git a/target/arm/hvf/hvf.c b/target/arm/hvf/hvf.c |
14 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/hw/arm/aspeed.c | 19 | --- a/target/arm/hvf/hvf.c |
16 | +++ b/hw/arm/aspeed.c | 20 | +++ b/target/arm/hvf/hvf.c |
17 | @@ -XXX,XX +XXX,XX @@ | 21 | @@ -XXX,XX +XXX,XX @@ |
18 | #include "hw/arm/aspeed_soc.h" | 22 | #define SYSREG_OSLSR_EL1 SYSREG(2, 0, 1, 1, 4) |
19 | #include "hw/boards.h" | 23 | #define SYSREG_OSDLR_EL1 SYSREG(2, 0, 1, 3, 4) |
20 | #include "hw/i2c/smbus_eeprom.h" | 24 | #define SYSREG_CNTPCT_EL0 SYSREG(3, 3, 14, 0, 1) |
21 | +#include "hw/misc/pca9552.h" | 25 | +#define SYSREG_PMCR_EL0 SYSREG(3, 3, 9, 12, 0) |
22 | +#include "hw/misc/tmp105.h" | 26 | +#define SYSREG_PMUSERENR_EL0 SYSREG(3, 3, 9, 14, 0) |
23 | #include "qemu/log.h" | 27 | +#define SYSREG_PMCNTENSET_EL0 SYSREG(3, 3, 9, 12, 1) |
24 | #include "sysemu/block-backend.h" | 28 | +#define SYSREG_PMCNTENCLR_EL0 SYSREG(3, 3, 9, 12, 2) |
25 | #include "hw/loader.h" | 29 | +#define SYSREG_PMINTENCLR_EL1 SYSREG(3, 0, 9, 14, 2) |
26 | @@ -XXX,XX +XXX,XX @@ static void ast2500_evb_i2c_init(AspeedBoardState *bmc) | 30 | +#define SYSREG_PMOVSCLR_EL0 SYSREG(3, 3, 9, 12, 3) |
27 | eeprom_buf); | 31 | +#define SYSREG_PMSWINC_EL0 SYSREG(3, 3, 9, 12, 4) |
28 | 32 | +#define SYSREG_PMSELR_EL0 SYSREG(3, 3, 9, 12, 5) | |
29 | /* The AST2500 EVB expects a LM75 but a TMP105 is compatible */ | 33 | +#define SYSREG_PMCEID0_EL0 SYSREG(3, 3, 9, 12, 6) |
30 | - i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 7), "tmp105", 0x4d); | 34 | +#define SYSREG_PMCEID1_EL0 SYSREG(3, 3, 9, 12, 7) |
31 | + i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 7), | 35 | +#define SYSREG_PMCCNTR_EL0 SYSREG(3, 3, 9, 13, 0) |
32 | + TYPE_TMP105, 0x4d); | 36 | +#define SYSREG_PMCCFILTR_EL0 SYSREG(3, 3, 14, 15, 7) |
33 | 37 | ||
34 | /* The AST2500 EVB does not have an RTC. Let's pretend that one is | 38 | #define WFX_IS_WFE (1 << 0) |
35 | * plugged on the I2C bus header */ | 39 | |
36 | @@ -XXX,XX +XXX,XX @@ static void witherspoon_bmc_i2c_init(AspeedBoardState *bmc) | 40 | @@ -XXX,XX +XXX,XX @@ static int hvf_sysreg_read(CPUState *cpu, uint32_t reg, uint32_t rt) |
37 | AspeedSoCState *soc = &bmc->soc; | 41 | val = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL) / |
38 | uint8_t *eeprom_buf = g_malloc0(8 * 1024); | 42 | gt_cntfrq_period_ns(arm_cpu); |
39 | 43 | break; | |
40 | - i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 3), "pca9552", 0x60); | 44 | + case SYSREG_PMCR_EL0: |
41 | + i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 3), TYPE_PCA9552, | 45 | + val = env->cp15.c9_pmcr; |
42 | + 0x60); | 46 | + break; |
43 | 47 | + case SYSREG_PMCCNTR_EL0: | |
44 | i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 4), "tmp423", 0x4c); | 48 | + pmu_op_start(env); |
45 | i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 5), "tmp423", 0x4c); | 49 | + val = env->cp15.c15_ccnt; |
46 | 50 | + pmu_op_finish(env); | |
47 | /* The Witherspoon expects a TMP275 but a TMP105 is compatible */ | 51 | + break; |
48 | - i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 9), "tmp105", 0x4a); | 52 | + case SYSREG_PMCNTENCLR_EL0: |
49 | + i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 9), TYPE_TMP105, | 53 | + val = env->cp15.c9_pmcnten; |
50 | + 0x4a); | 54 | + break; |
51 | 55 | + case SYSREG_PMOVSCLR_EL0: | |
52 | /* The witherspoon board expects Epson RX8900 I2C RTC but a ds1338 is | 56 | + val = env->cp15.c9_pmovsr; |
53 | * good enough */ | 57 | + break; |
54 | @@ -XXX,XX +XXX,XX @@ static void witherspoon_bmc_i2c_init(AspeedBoardState *bmc) | 58 | + case SYSREG_PMSELR_EL0: |
55 | 59 | + val = env->cp15.c9_pmselr; | |
56 | smbus_eeprom_init_one(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 11), 0x51, | 60 | + break; |
57 | eeprom_buf); | 61 | + case SYSREG_PMINTENCLR_EL1: |
58 | - i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 11), "pca9552", | 62 | + val = env->cp15.c9_pminten; |
59 | + i2c_create_slave(aspeed_i2c_get_bus(DEVICE(&soc->i2c), 11), TYPE_PCA9552, | 63 | + break; |
60 | 0x60); | 64 | + case SYSREG_PMCCFILTR_EL0: |
65 | + val = env->cp15.pmccfiltr_el0; | ||
66 | + break; | ||
67 | + case SYSREG_PMCNTENSET_EL0: | ||
68 | + val = env->cp15.c9_pmcnten; | ||
69 | + break; | ||
70 | + case SYSREG_PMUSERENR_EL0: | ||
71 | + val = env->cp15.c9_pmuserenr; | ||
72 | + break; | ||
73 | + case SYSREG_PMCEID0_EL0: | ||
74 | + case SYSREG_PMCEID1_EL0: | ||
75 | + /* We can't really count anything yet, declare all events invalid */ | ||
76 | + val = 0; | ||
77 | + break; | ||
78 | case SYSREG_OSLSR_EL1: | ||
79 | val = env->cp15.oslsr_el1; | ||
80 | break; | ||
81 | @@ -XXX,XX +XXX,XX @@ static int hvf_sysreg_read(CPUState *cpu, uint32_t reg, uint32_t rt) | ||
82 | return 0; | ||
61 | } | 83 | } |
62 | 84 | ||
85 | +static void pmu_update_irq(CPUARMState *env) | ||
86 | +{ | ||
87 | + ARMCPU *cpu = env_archcpu(env); | ||
88 | + qemu_set_irq(cpu->pmu_interrupt, (env->cp15.c9_pmcr & PMCRE) && | ||
89 | + (env->cp15.c9_pminten & env->cp15.c9_pmovsr)); | ||
90 | +} | ||
91 | + | ||
92 | +static bool pmu_event_supported(uint16_t number) | ||
93 | +{ | ||
94 | + return false; | ||
95 | +} | ||
96 | + | ||
97 | +/* Returns true if the counter (pass 31 for PMCCNTR) should count events using | ||
98 | + * the current EL, security state, and register configuration. | ||
99 | + */ | ||
100 | +static bool pmu_counter_enabled(CPUARMState *env, uint8_t counter) | ||
101 | +{ | ||
102 | + uint64_t filter; | ||
103 | + bool enabled, filtered = true; | ||
104 | + int el = arm_current_el(env); | ||
105 | + | ||
106 | + enabled = (env->cp15.c9_pmcr & PMCRE) && | ||
107 | + (env->cp15.c9_pmcnten & (1 << counter)); | ||
108 | + | ||
109 | + if (counter == 31) { | ||
110 | + filter = env->cp15.pmccfiltr_el0; | ||
111 | + } else { | ||
112 | + filter = env->cp15.c14_pmevtyper[counter]; | ||
113 | + } | ||
114 | + | ||
115 | + if (el == 0) { | ||
116 | + filtered = filter & PMXEVTYPER_U; | ||
117 | + } else if (el == 1) { | ||
118 | + filtered = filter & PMXEVTYPER_P; | ||
119 | + } | ||
120 | + | ||
121 | + if (counter != 31) { | ||
122 | + /* | ||
123 | + * If not checking PMCCNTR, ensure the counter is setup to an event we | ||
124 | + * support | ||
125 | + */ | ||
126 | + uint16_t event = filter & PMXEVTYPER_EVTCOUNT; | ||
127 | + if (!pmu_event_supported(event)) { | ||
128 | + return false; | ||
129 | + } | ||
130 | + } | ||
131 | + | ||
132 | + return enabled && !filtered; | ||
133 | +} | ||
134 | + | ||
135 | +static void pmswinc_write(CPUARMState *env, uint64_t value) | ||
136 | +{ | ||
137 | + unsigned int i; | ||
138 | + for (i = 0; i < pmu_num_counters(env); i++) { | ||
139 | + /* Increment a counter's count iff: */ | ||
140 | + if ((value & (1 << i)) && /* counter's bit is set */ | ||
141 | + /* counter is enabled and not filtered */ | ||
142 | + pmu_counter_enabled(env, i) && | ||
143 | + /* counter is SW_INCR */ | ||
144 | + (env->cp15.c14_pmevtyper[i] & PMXEVTYPER_EVTCOUNT) == 0x0) { | ||
145 | + /* | ||
146 | + * Detect if this write causes an overflow since we can't predict | ||
147 | + * PMSWINC overflows like we can for other events | ||
148 | + */ | ||
149 | + uint32_t new_pmswinc = env->cp15.c14_pmevcntr[i] + 1; | ||
150 | + | ||
151 | + if (env->cp15.c14_pmevcntr[i] & ~new_pmswinc & INT32_MIN) { | ||
152 | + env->cp15.c9_pmovsr |= (1 << i); | ||
153 | + pmu_update_irq(env); | ||
154 | + } | ||
155 | + | ||
156 | + env->cp15.c14_pmevcntr[i] = new_pmswinc; | ||
157 | + } | ||
158 | + } | ||
159 | +} | ||
160 | + | ||
161 | static int hvf_sysreg_write(CPUState *cpu, uint32_t reg, uint64_t val) | ||
162 | { | ||
163 | ARMCPU *arm_cpu = ARM_CPU(cpu); | ||
164 | @@ -XXX,XX +XXX,XX @@ static int hvf_sysreg_write(CPUState *cpu, uint32_t reg, uint64_t val) | ||
165 | val); | ||
166 | |||
167 | switch (reg) { | ||
168 | + case SYSREG_PMCCNTR_EL0: | ||
169 | + pmu_op_start(env); | ||
170 | + env->cp15.c15_ccnt = val; | ||
171 | + pmu_op_finish(env); | ||
172 | + break; | ||
173 | + case SYSREG_PMCR_EL0: | ||
174 | + pmu_op_start(env); | ||
175 | + | ||
176 | + if (val & PMCRC) { | ||
177 | + /* The counter has been reset */ | ||
178 | + env->cp15.c15_ccnt = 0; | ||
179 | + } | ||
180 | + | ||
181 | + if (val & PMCRP) { | ||
182 | + unsigned int i; | ||
183 | + for (i = 0; i < pmu_num_counters(env); i++) { | ||
184 | + env->cp15.c14_pmevcntr[i] = 0; | ||
185 | + } | ||
186 | + } | ||
187 | + | ||
188 | + env->cp15.c9_pmcr &= ~PMCR_WRITEABLE_MASK; | ||
189 | + env->cp15.c9_pmcr |= (val & PMCR_WRITEABLE_MASK); | ||
190 | + | ||
191 | + pmu_op_finish(env); | ||
192 | + break; | ||
193 | + case SYSREG_PMUSERENR_EL0: | ||
194 | + env->cp15.c9_pmuserenr = val & 0xf; | ||
195 | + break; | ||
196 | + case SYSREG_PMCNTENSET_EL0: | ||
197 | + env->cp15.c9_pmcnten |= (val & pmu_counter_mask(env)); | ||
198 | + break; | ||
199 | + case SYSREG_PMCNTENCLR_EL0: | ||
200 | + env->cp15.c9_pmcnten &= ~(val & pmu_counter_mask(env)); | ||
201 | + break; | ||
202 | + case SYSREG_PMINTENCLR_EL1: | ||
203 | + pmu_op_start(env); | ||
204 | + env->cp15.c9_pminten |= val; | ||
205 | + pmu_op_finish(env); | ||
206 | + break; | ||
207 | + case SYSREG_PMOVSCLR_EL0: | ||
208 | + pmu_op_start(env); | ||
209 | + env->cp15.c9_pmovsr &= ~val; | ||
210 | + pmu_op_finish(env); | ||
211 | + break; | ||
212 | + case SYSREG_PMSWINC_EL0: | ||
213 | + pmu_op_start(env); | ||
214 | + pmswinc_write(env, val); | ||
215 | + pmu_op_finish(env); | ||
216 | + break; | ||
217 | + case SYSREG_PMSELR_EL0: | ||
218 | + env->cp15.c9_pmselr = val & 0x1f; | ||
219 | + break; | ||
220 | + case SYSREG_PMCCFILTR_EL0: | ||
221 | + pmu_op_start(env); | ||
222 | + env->cp15.pmccfiltr_el0 = val & PMCCFILTR_EL0; | ||
223 | + pmu_op_finish(env); | ||
224 | + break; | ||
225 | case SYSREG_OSLAR_EL1: | ||
226 | env->cp15.oslsr_el1 = val & 1; | ||
227 | break; | ||
63 | -- | 228 | -- |
64 | 2.20.1 | 229 | 2.20.1 |
65 | 230 | ||
66 | 231 | diff view generated by jsdifflib |
1 | The only "system register" that M-profile floating point exposes | 1 | Currently gen_jmp_tb() assumes that if it is called then the jump it |
---|---|---|---|
2 | via the VMRS/VMRS instructions is FPSCR, and it does not have | 2 | is handling is the only reason that we might be trying to end the TB, |
3 | the odd special case for rd==15. Add a check to ensure we only | 3 | so it will use goto_tb if it can. This is usually the case: mostly |
4 | expose FPSCR. | 4 | "we did something that means we must end the TB" happens on a |
5 | non-branch instruction. However, there are cases where we decide | ||
6 | early in handling an instruction that we need to end the TB and | ||
7 | return to the main loop, and then the insn is a complex one that | ||
8 | involves gen_jmp_tb(). For instance, for M-profile FP instructions, | ||
9 | in gen_preserve_fp_state() which is called from vfp_access_check() we | ||
10 | want to force an exit to the main loop if lazy state preservation is | ||
11 | active and we are in icount mode. | ||
12 | |||
13 | Make gen_jmp_tb() look at the current value of is_jmp, and only use | ||
14 | goto_tb if the previous is_jmp was DISAS_NEXT or DISAS_TOO_MANY. | ||
5 | 15 | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 17 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
8 | Message-id: 20190416125744.27770-5-peter.maydell@linaro.org | 18 | Message-id: 20210913095440.13462-2-peter.maydell@linaro.org |
9 | --- | 19 | --- |
10 | target/arm/translate.c | 19 +++++++++++++++++-- | 20 | target/arm/translate.c | 34 +++++++++++++++++++++++++++++++++- |
11 | 1 file changed, 17 insertions(+), 2 deletions(-) | 21 | 1 file changed, 33 insertions(+), 1 deletion(-) |
12 | 22 | ||
13 | diff --git a/target/arm/translate.c b/target/arm/translate.c | 23 | diff --git a/target/arm/translate.c b/target/arm/translate.c |
14 | index XXXXXXX..XXXXXXX 100644 | 24 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/target/arm/translate.c | 25 | --- a/target/arm/translate.c |
16 | +++ b/target/arm/translate.c | 26 | +++ b/target/arm/translate.c |
17 | @@ -XXX,XX +XXX,XX @@ static int disas_vfp_insn(DisasContext *s, uint32_t insn) | 27 | @@ -XXX,XX +XXX,XX @@ static inline void gen_jmp_tb(DisasContext *s, uint32_t dest, int tbno) |
18 | } | 28 | /* An indirect jump so that we still trigger the debug exception. */ |
19 | } | 29 | gen_set_pc_im(s, dest); |
20 | } else { /* !dp */ | 30 | s->base.is_jmp = DISAS_JUMP; |
21 | + bool is_sysreg; | 31 | - } else { |
22 | + | 32 | + return; |
23 | if ((insn & 0x6f) != 0x00) | 33 | + } |
24 | return 1; | 34 | + switch (s->base.is_jmp) { |
25 | rn = VFP_SREG_N(insn); | 35 | + case DISAS_NEXT: |
26 | + | 36 | + case DISAS_TOO_MANY: |
27 | + is_sysreg = extract32(insn, 21, 1); | 37 | + case DISAS_NORETURN: |
28 | + | 38 | + /* |
29 | + if (arm_dc_feature(s, ARM_FEATURE_M)) { | 39 | + * The normal case: just go to the destination TB. |
30 | + /* | 40 | + * NB: NORETURN happens if we generate code like |
31 | + * The only M-profile VFP vmrs/vmsr sysreg is FPSCR. | 41 | + * gen_brcondi(l); |
32 | + * Writes to R15 are UNPREDICTABLE; we choose to undef. | 42 | + * gen_jmp(); |
33 | + */ | 43 | + * gen_set_label(l); |
34 | + if (is_sysreg && (rd == 15 || (rn >> 1) != ARM_VFP_FPSCR)) { | 44 | + * gen_jmp(); |
35 | + return 1; | 45 | + * on the second call to gen_jmp(). |
36 | + } | 46 | + */ |
37 | + } | 47 | gen_goto_tb(s, tbno, dest); |
38 | + | 48 | + break; |
39 | if (insn & ARM_CP_RW_BIT) { | 49 | + case DISAS_UPDATE_NOCHAIN: |
40 | /* vfp->arm */ | 50 | + case DISAS_UPDATE_EXIT: |
41 | - if (insn & (1 << 21)) { | 51 | + /* |
42 | + if (is_sysreg) { | 52 | + * We already decided we're leaving the TB for some other reason. |
43 | /* system register */ | 53 | + * Avoid using goto_tb so we really do exit back to the main loop |
44 | rn >>= 1; | 54 | + * and don't chain to another TB. |
45 | 55 | + */ | |
46 | @@ -XXX,XX +XXX,XX @@ static int disas_vfp_insn(DisasContext *s, uint32_t insn) | 56 | + gen_set_pc_im(s, dest); |
47 | } | 57 | + gen_goto_ptr(); |
48 | } else { | 58 | + s->base.is_jmp = DISAS_NORETURN; |
49 | /* arm->vfp */ | 59 | + break; |
50 | - if (insn & (1 << 21)) { | 60 | + default: |
51 | + if (is_sysreg) { | 61 | + /* |
52 | rn >>= 1; | 62 | + * We shouldn't be emitting code for a jump and also have |
53 | /* system register */ | 63 | + * is_jmp set to one of the special cases like DISAS_SWI. |
54 | switch (rn) { | 64 | + */ |
65 | + g_assert_not_reached(); | ||
66 | } | ||
67 | } | ||
68 | |||
55 | -- | 69 | -- |
56 | 2.20.1 | 70 | 2.20.1 |
57 | 71 | ||
58 | 72 | diff view generated by jsdifflib |
1 | Handle floating point registers in exception return. | 1 | Architecturally, for an M-profile CPU with the LOB feature the |
---|---|---|---|
2 | This corresponds to pseudocode functions ValidateExceptionReturn(), | 2 | LTPSIZE field in FPDSCR is always constant 4. QEMU's implementation |
3 | ExceptionReturn(), PopStack() and ConsumeExcStackFrame(). | 3 | enforces this everywhere, except that we don't check that it is true |
4 | in incoming migration data. | ||
5 | |||
6 | We're going to add come in gen_update_fp_context() which relies on | ||
7 | the "always 4" property. Since this is TCG-only, we don't actually | ||
8 | need to be robust to bogus incoming migration data, and the effect of | ||
9 | it being wrong would be wrong code generation rather than a QEMU | ||
10 | crash; but if it did ever happen somehow it would be very difficult | ||
11 | to track down the cause. Add a check so that we fail the inbound | ||
12 | migration if the FPDSCR.LTPSIZE value is incorrect. | ||
4 | 13 | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 15 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
7 | Message-id: 20190416125744.27770-16-peter.maydell@linaro.org | 16 | Message-id: 20210913095440.13462-3-peter.maydell@linaro.org |
8 | --- | 17 | --- |
9 | target/arm/helper.c | 142 +++++++++++++++++++++++++++++++++++++++++++- | 18 | target/arm/machine.c | 13 +++++++++++++ |
10 | 1 file changed, 141 insertions(+), 1 deletion(-) | 19 | 1 file changed, 13 insertions(+) |
11 | 20 | ||
12 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 21 | diff --git a/target/arm/machine.c b/target/arm/machine.c |
13 | index XXXXXXX..XXXXXXX 100644 | 22 | index XXXXXXX..XXXXXXX 100644 |
14 | --- a/target/arm/helper.c | 23 | --- a/target/arm/machine.c |
15 | +++ b/target/arm/helper.c | 24 | +++ b/target/arm/machine.c |
16 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | 25 | @@ -XXX,XX +XXX,XX @@ static int cpu_post_load(void *opaque, int version_id) |
17 | bool rettobase = false; | 26 | hw_breakpoint_update_all(cpu); |
18 | bool exc_secure = false; | 27 | hw_watchpoint_update_all(cpu); |
19 | bool return_to_secure; | ||
20 | + bool ftype; | ||
21 | + bool restore_s16_s31; | ||
22 | |||
23 | /* If we're not in Handler mode then jumps to magic exception-exit | ||
24 | * addresses don't have magic behaviour. However for the v8M | ||
25 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
26 | excret); | ||
27 | } | ||
28 | |||
29 | + ftype = excret & R_V7M_EXCRET_FTYPE_MASK; | ||
30 | + | ||
31 | + if (!arm_feature(env, ARM_FEATURE_VFP) && !ftype) { | ||
32 | + qemu_log_mask(LOG_GUEST_ERROR, "M profile: zero FTYPE in exception " | ||
33 | + "exit PC value 0x%" PRIx32 " is UNPREDICTABLE " | ||
34 | + "if FPU not present\n", | ||
35 | + excret); | ||
36 | + ftype = true; | ||
37 | + } | ||
38 | + | ||
39 | if (arm_feature(env, ARM_FEATURE_M_SECURITY)) { | ||
40 | /* EXC_RETURN.ES validation check (R_SMFL). We must do this before | ||
41 | * we pick which FAULTMASK to clear. | ||
42 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
43 | */ | ||
44 | write_v7m_control_spsel_for_secstate(env, return_to_sp_process, exc_secure); | ||
45 | 28 | ||
46 | + /* | 29 | + /* |
47 | + * Clear scratch FP values left in caller saved registers; this | 30 | + * TCG gen_update_fp_context() relies on the invariant that |
48 | + * must happen before any kind of tail chaining. | 31 | + * FPDSCR.LTPSIZE is constant 4 for M-profile with the LOB extension; |
32 | + * forbid bogus incoming data with some other value. | ||
49 | + */ | 33 | + */ |
50 | + if ((env->v7m.fpccr[M_REG_S] & R_V7M_FPCCR_CLRONRET_MASK) && | 34 | + if (arm_feature(env, ARM_FEATURE_M) && cpu_isar_feature(aa32_lob, cpu)) { |
51 | + (env->v7m.control[M_REG_S] & R_V7M_CONTROL_FPCA_MASK)) { | 35 | + if (extract32(env->v7m.fpdscr[M_REG_NS], |
52 | + if (env->v7m.fpccr[M_REG_S] & R_V7M_FPCCR_LSPACT_MASK) { | 36 | + FPCR_LTPSIZE_SHIFT, FPCR_LTPSIZE_LENGTH) != 4 || |
53 | + env->v7m.sfsr |= R_V7M_SFSR_LSERR_MASK; | 37 | + extract32(env->v7m.fpdscr[M_REG_S], |
54 | + armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_SECURE, false); | 38 | + FPCR_LTPSIZE_SHIFT, FPCR_LTPSIZE_LENGTH) != 4) { |
55 | + qemu_log_mask(CPU_LOG_INT, "...taking SecureFault on existing " | 39 | + return -1; |
56 | + "stackframe: error during lazy state deactivation\n"); | ||
57 | + v7m_exception_taken(cpu, excret, true, false); | ||
58 | + return; | ||
59 | + } else { | ||
60 | + /* Clear s0..s15 and FPSCR */ | ||
61 | + int i; | ||
62 | + | ||
63 | + for (i = 0; i < 16; i += 2) { | ||
64 | + *aa32_vfp_dreg(env, i / 2) = 0; | ||
65 | + } | ||
66 | + vfp_set_fpscr(env, 0); | ||
67 | + } | 40 | + } |
68 | + } | 41 | + } |
69 | + | 42 | if (!kvm_enabled()) { |
70 | if (sfault) { | 43 | pmu_op_finish(&cpu->env); |
71 | env->v7m.sfsr |= R_V7M_SFSR_INVER_MASK; | ||
72 | armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_SECURE, false); | ||
73 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
74 | } | ||
75 | } | ||
76 | |||
77 | + if (!ftype) { | ||
78 | + /* FP present and we need to handle it */ | ||
79 | + if (!return_to_secure && | ||
80 | + (env->v7m.fpccr[M_REG_S] & R_V7M_FPCCR_LSPACT_MASK)) { | ||
81 | + armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_SECURE, false); | ||
82 | + env->v7m.sfsr |= R_V7M_SFSR_LSERR_MASK; | ||
83 | + qemu_log_mask(CPU_LOG_INT, | ||
84 | + "...taking SecureFault on existing stackframe: " | ||
85 | + "Secure LSPACT set but exception return is " | ||
86 | + "not to secure state\n"); | ||
87 | + v7m_exception_taken(cpu, excret, true, false); | ||
88 | + return; | ||
89 | + } | ||
90 | + | ||
91 | + restore_s16_s31 = return_to_secure && | ||
92 | + (env->v7m.fpccr[M_REG_S] & R_V7M_FPCCR_TS_MASK); | ||
93 | + | ||
94 | + if (env->v7m.fpccr[return_to_secure] & R_V7M_FPCCR_LSPACT_MASK) { | ||
95 | + /* State in FPU is still valid, just clear LSPACT */ | ||
96 | + env->v7m.fpccr[return_to_secure] &= ~R_V7M_FPCCR_LSPACT_MASK; | ||
97 | + } else { | ||
98 | + int i; | ||
99 | + uint32_t fpscr; | ||
100 | + bool cpacr_pass, nsacr_pass; | ||
101 | + | ||
102 | + cpacr_pass = v7m_cpacr_pass(env, return_to_secure, | ||
103 | + return_to_priv); | ||
104 | + nsacr_pass = return_to_secure || | ||
105 | + extract32(env->v7m.nsacr, 10, 1); | ||
106 | + | ||
107 | + if (!cpacr_pass) { | ||
108 | + armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE, | ||
109 | + return_to_secure); | ||
110 | + env->v7m.cfsr[return_to_secure] |= R_V7M_CFSR_NOCP_MASK; | ||
111 | + qemu_log_mask(CPU_LOG_INT, | ||
112 | + "...taking UsageFault on existing " | ||
113 | + "stackframe: CPACR.CP10 prevents unstacking " | ||
114 | + "FP regs\n"); | ||
115 | + v7m_exception_taken(cpu, excret, true, false); | ||
116 | + return; | ||
117 | + } else if (!nsacr_pass) { | ||
118 | + armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE, true); | ||
119 | + env->v7m.cfsr[M_REG_S] |= R_V7M_CFSR_INVPC_MASK; | ||
120 | + qemu_log_mask(CPU_LOG_INT, | ||
121 | + "...taking Secure UsageFault on existing " | ||
122 | + "stackframe: NSACR.CP10 prevents unstacking " | ||
123 | + "FP regs\n"); | ||
124 | + v7m_exception_taken(cpu, excret, true, false); | ||
125 | + return; | ||
126 | + } | ||
127 | + | ||
128 | + for (i = 0; i < (restore_s16_s31 ? 32 : 16); i += 2) { | ||
129 | + uint32_t slo, shi; | ||
130 | + uint64_t dn; | ||
131 | + uint32_t faddr = frameptr + 0x20 + 4 * i; | ||
132 | + | ||
133 | + if (i >= 16) { | ||
134 | + faddr += 8; /* Skip the slot for the FPSCR */ | ||
135 | + } | ||
136 | + | ||
137 | + pop_ok = pop_ok && | ||
138 | + v7m_stack_read(cpu, &slo, faddr, mmu_idx) && | ||
139 | + v7m_stack_read(cpu, &shi, faddr + 4, mmu_idx); | ||
140 | + | ||
141 | + if (!pop_ok) { | ||
142 | + break; | ||
143 | + } | ||
144 | + | ||
145 | + dn = (uint64_t)shi << 32 | slo; | ||
146 | + *aa32_vfp_dreg(env, i / 2) = dn; | ||
147 | + } | ||
148 | + pop_ok = pop_ok && | ||
149 | + v7m_stack_read(cpu, &fpscr, frameptr + 0x60, mmu_idx); | ||
150 | + if (pop_ok) { | ||
151 | + vfp_set_fpscr(env, fpscr); | ||
152 | + } | ||
153 | + if (!pop_ok) { | ||
154 | + /* | ||
155 | + * These regs are 0 if security extension present; | ||
156 | + * otherwise merely UNKNOWN. We zero always. | ||
157 | + */ | ||
158 | + for (i = 0; i < (restore_s16_s31 ? 32 : 16); i += 2) { | ||
159 | + *aa32_vfp_dreg(env, i / 2) = 0; | ||
160 | + } | ||
161 | + vfp_set_fpscr(env, 0); | ||
162 | + } | ||
163 | + } | ||
164 | + } | ||
165 | + env->v7m.control[M_REG_S] = FIELD_DP32(env->v7m.control[M_REG_S], | ||
166 | + V7M_CONTROL, FPCA, !ftype); | ||
167 | + | ||
168 | /* Commit to consuming the stack frame */ | ||
169 | frameptr += 0x20; | ||
170 | + if (!ftype) { | ||
171 | + frameptr += 0x48; | ||
172 | + if (restore_s16_s31) { | ||
173 | + frameptr += 0x40; | ||
174 | + } | ||
175 | + } | ||
176 | /* Undo stack alignment (the SPREALIGN bit indicates that the original | ||
177 | * pre-exception SP was not 8-aligned and we added a padding word to | ||
178 | * align it, so we undo this by ORing in the bit that increases it | ||
179 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
180 | *frame_sp_p = frameptr; | ||
181 | } | 44 | } |
182 | /* This xpsr_write() will invalidate frame_sp_p as it may switch stack */ | ||
183 | - xpsr_write(env, xpsr, ~XPSR_SPREALIGN); | ||
184 | + xpsr_write(env, xpsr, ~(XPSR_SPREALIGN | XPSR_SFPA)); | ||
185 | + | ||
186 | + if (env->v7m.secure) { | ||
187 | + bool sfpa = xpsr & XPSR_SFPA; | ||
188 | + | ||
189 | + env->v7m.control[M_REG_S] = FIELD_DP32(env->v7m.control[M_REG_S], | ||
190 | + V7M_CONTROL, SFPA, sfpa); | ||
191 | + } | ||
192 | |||
193 | /* The restored xPSR exception field will be zero if we're | ||
194 | * resuming in Thread mode. If that doesn't match what the | ||
195 | -- | 45 | -- |
196 | 2.20.1 | 46 | 2.20.1 |
197 | 47 | ||
198 | 48 | diff view generated by jsdifflib |
1 | The M-profile FPCCR.S bit indicates the security status of | 1 | Our current codegen for MVE always calls out to helper functions, |
---|---|---|---|
2 | the floating point context. In the pseudocode ExecuteFPCheck() | 2 | because some byte lanes might be predicated. The common case is that |
3 | function it is unconditionally set to match the current | 3 | in fact there is no predication active and all lanes should be |
4 | security state whenever a floating point instruction is | 4 | updated together, so we can produce better code by detecting that and |
5 | executed. | 5 | using the TCG generic vector infrastructure. |
6 | 6 | ||
7 | Implement this by adding a new TB flag which tracks whether | 7 | Add a TB flag that is set when we can guarantee that there is no |
8 | FPCCR.S is different from the current security state, so | 8 | active MVE predication, and a bool in the DisasContext. Subsequent |
9 | that we only need to emit the code to update it in the | 9 | patches will use this flag to generate improved code for some |
10 | less-common case when it is not already set correctly. | 10 | instructions. |
11 | 11 | ||
12 | Note that we will add the handling for the other work done | 12 | In most cases when the predication state changes we simply end the TB |
13 | by ExecuteFPCheck() in later commits. | 13 | after that instruction. For the code called from vfp_access_check() |
14 | that handles lazy state preservation and creating a new FP context, | ||
15 | we can usually avoid having to try to end the TB because luckily the | ||
16 | new value of the flag following the register changes in those | ||
17 | sequences doesn't depend on any runtime decisions. We do have to end | ||
18 | the TB if the guest has enabled lazy FP state preservation but not | ||
19 | automatic state preservation, but this is an odd corner case that is | ||
20 | not going to be common in real-world code. | ||
14 | 21 | ||
15 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 22 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
16 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 23 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
17 | Message-id: 20190416125744.27770-19-peter.maydell@linaro.org | 24 | Message-id: 20210913095440.13462-4-peter.maydell@linaro.org |
18 | --- | 25 | --- |
19 | target/arm/cpu.h | 2 ++ | 26 | target/arm/cpu.h | 4 +++- |
20 | target/arm/translate.h | 1 + | 27 | target/arm/translate.h | 2 ++ |
21 | target/arm/helper.c | 5 +++++ | 28 | target/arm/helper.c | 33 +++++++++++++++++++++++++++++++++ |
22 | target/arm/translate.c | 20 ++++++++++++++++++++ | 29 | target/arm/translate-m-nocp.c | 8 +++++++- |
23 | 4 files changed, 28 insertions(+) | 30 | target/arm/translate-mve.c | 13 ++++++++++++- |
31 | target/arm/translate-vfp.c | 33 +++++++++++++++++++++++++++------ | ||
32 | target/arm/translate.c | 8 ++++++++ | ||
33 | 7 files changed, 92 insertions(+), 9 deletions(-) | ||
24 | 34 | ||
25 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 35 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
26 | index XXXXXXX..XXXXXXX 100644 | 36 | index XXXXXXX..XXXXXXX 100644 |
27 | --- a/target/arm/cpu.h | 37 | --- a/target/arm/cpu.h |
28 | +++ b/target/arm/cpu.h | 38 | +++ b/target/arm/cpu.h |
29 | @@ -XXX,XX +XXX,XX @@ FIELD(TBFLAG_A32, NS, 6, 1) | 39 | @@ -XXX,XX +XXX,XX @@ typedef ARMCPU ArchCPU; |
30 | FIELD(TBFLAG_A32, VFPEN, 7, 1) | 40 | * | TBFLAG_AM32 | +-----+----------+ |
31 | FIELD(TBFLAG_A32, CONDEXEC, 8, 8) | 41 | * | | |TBFLAG_M32| |
32 | FIELD(TBFLAG_A32, SCTLR_B, 16, 1) | 42 | * +-------------+----------------+----------+ |
33 | +/* For M profile only, set if FPCCR.S does not match current security state */ | 43 | - * 31 23 5 4 0 |
34 | +FIELD(TBFLAG_A32, FPCCR_S_WRONG, 20, 1) | 44 | + * 31 23 6 5 0 |
35 | /* For M profile only, Handler (ie not Thread) mode */ | 45 | * |
36 | FIELD(TBFLAG_A32, HANDLER, 21, 1) | 46 | * Unless otherwise noted, these bits are cached in env->hflags. |
37 | /* For M profile only, whether we should generate stack-limit checks */ | 47 | */ |
48 | @@ -XXX,XX +XXX,XX @@ FIELD(TBFLAG_M32, LSPACT, 2, 1) /* Not cached. */ | ||
49 | FIELD(TBFLAG_M32, NEW_FP_CTXT_NEEDED, 3, 1) /* Not cached. */ | ||
50 | /* Set if FPCCR.S does not match current security state */ | ||
51 | FIELD(TBFLAG_M32, FPCCR_S_WRONG, 4, 1) /* Not cached. */ | ||
52 | +/* Set if MVE insns are definitely not predicated by VPR or LTPSIZE */ | ||
53 | +FIELD(TBFLAG_M32, MVE_NO_PRED, 5, 1) /* Not cached. */ | ||
54 | |||
55 | /* | ||
56 | * Bit usage when in AArch64 state | ||
38 | diff --git a/target/arm/translate.h b/target/arm/translate.h | 57 | diff --git a/target/arm/translate.h b/target/arm/translate.h |
39 | index XXXXXXX..XXXXXXX 100644 | 58 | index XXXXXXX..XXXXXXX 100644 |
40 | --- a/target/arm/translate.h | 59 | --- a/target/arm/translate.h |
41 | +++ b/target/arm/translate.h | 60 | +++ b/target/arm/translate.h |
42 | @@ -XXX,XX +XXX,XX @@ typedef struct DisasContext { | 61 | @@ -XXX,XX +XXX,XX @@ typedef struct DisasContext { |
43 | bool v7m_handler_mode; | 62 | bool align_mem; |
44 | bool v8m_secure; /* true if v8M and we're in Secure mode */ | 63 | /* True if PSTATE.IL is set */ |
45 | bool v8m_stackcheck; /* true if we need to perform v8M stack limit checks */ | 64 | bool pstate_il; |
46 | + bool v8m_fpccr_s_wrong; /* true if v8M FPCCR.S != v8m_secure */ | 65 | + /* True if MVE insns are definitely not predicated by VPR or LTPSIZE */ |
47 | /* Immediate value in AArch32 SVC insn; must be set if is_jmp == DISAS_SWI | 66 | + bool mve_no_pred; |
48 | * so that top level loop can generate correct syndrome information. | 67 | /* |
49 | */ | 68 | * >= 0, a copy of PSTATE.BTYPE, which will be 0 without v8.5-BTI. |
69 | * < 0, set by the current instruction. | ||
50 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 70 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
51 | index XXXXXXX..XXXXXXX 100644 | 71 | index XXXXXXX..XXXXXXX 100644 |
52 | --- a/target/arm/helper.c | 72 | --- a/target/arm/helper.c |
53 | +++ b/target/arm/helper.c | 73 | +++ b/target/arm/helper.c |
74 | @@ -XXX,XX +XXX,XX @@ static inline void assert_hflags_rebuild_correctly(CPUARMState *env) | ||
75 | #endif | ||
76 | } | ||
77 | |||
78 | +static bool mve_no_pred(CPUARMState *env) | ||
79 | +{ | ||
80 | + /* | ||
81 | + * Return true if there is definitely no predication of MVE | ||
82 | + * instructions by VPR or LTPSIZE. (Returning false even if there | ||
83 | + * isn't any predication is OK; generated code will just be | ||
84 | + * a little worse.) | ||
85 | + * If the CPU does not implement MVE then this TB flag is always 0. | ||
86 | + * | ||
87 | + * NOTE: if you change this logic, the "recalculate s->mve_no_pred" | ||
88 | + * logic in gen_update_fp_context() needs to be updated to match. | ||
89 | + * | ||
90 | + * We do not include the effect of the ECI bits here -- they are | ||
91 | + * tracked in other TB flags. This simplifies the logic for | ||
92 | + * "when did we emit code that changes the MVE_NO_PRED TB flag | ||
93 | + * and thus need to end the TB?". | ||
94 | + */ | ||
95 | + if (cpu_isar_feature(aa32_mve, env_archcpu(env))) { | ||
96 | + return false; | ||
97 | + } | ||
98 | + if (env->v7m.vpr) { | ||
99 | + return false; | ||
100 | + } | ||
101 | + if (env->v7m.ltpsize < 4) { | ||
102 | + return false; | ||
103 | + } | ||
104 | + return true; | ||
105 | +} | ||
106 | + | ||
107 | void cpu_get_tb_cpu_state(CPUARMState *env, target_ulong *pc, | ||
108 | target_ulong *cs_base, uint32_t *pflags) | ||
109 | { | ||
54 | @@ -XXX,XX +XXX,XX @@ void cpu_get_tb_cpu_state(CPUARMState *env, target_ulong *pc, | 110 | @@ -XXX,XX +XXX,XX @@ void cpu_get_tb_cpu_state(CPUARMState *env, target_ulong *pc, |
55 | flags = FIELD_DP32(flags, TBFLAG_A32, STACKCHECK, 1); | 111 | if (env->v7m.fpccr[is_secure] & R_V7M_FPCCR_LSPACT_MASK) { |
56 | } | 112 | DP_TBFLAG_M32(flags, LSPACT, 1); |
57 | 113 | } | |
58 | + if (arm_feature(env, ARM_FEATURE_M_SECURITY) && | ||
59 | + FIELD_EX32(env->v7m.fpccr[M_REG_S], V7M_FPCCR, S) != env->v7m.secure) { | ||
60 | + flags = FIELD_DP32(flags, TBFLAG_A32, FPCCR_S_WRONG, 1); | ||
61 | + } | ||
62 | + | 114 | + |
63 | *pflags = flags; | 115 | + if (mve_no_pred(env)) { |
64 | *cs_base = 0; | 116 | + DP_TBFLAG_M32(flags, MVE_NO_PRED, 1); |
65 | } | 117 | + } |
118 | } else { | ||
119 | /* | ||
120 | * Note that XSCALE_CPAR shares bits with VECSTRIDE. | ||
121 | diff --git a/target/arm/translate-m-nocp.c b/target/arm/translate-m-nocp.c | ||
122 | index XXXXXXX..XXXXXXX 100644 | ||
123 | --- a/target/arm/translate-m-nocp.c | ||
124 | +++ b/target/arm/translate-m-nocp.c | ||
125 | @@ -XXX,XX +XXX,XX @@ static bool trans_VLLDM_VLSTM(DisasContext *s, arg_VLLDM_VLSTM *a) | ||
126 | |||
127 | clear_eci_state(s); | ||
128 | |||
129 | - /* End the TB, because we have updated FP control bits */ | ||
130 | + /* | ||
131 | + * End the TB, because we have updated FP control bits, | ||
132 | + * and possibly VPR or LTPSIZE. | ||
133 | + */ | ||
134 | s->base.is_jmp = DISAS_UPDATE_EXIT; | ||
135 | return true; | ||
136 | } | ||
137 | @@ -XXX,XX +XXX,XX @@ static bool gen_M_fp_sysreg_write(DisasContext *s, int regno, | ||
138 | store_cpu_field(control, v7m.control[M_REG_S]); | ||
139 | tcg_gen_andi_i32(tmp, tmp, ~FPCR_NZCV_MASK); | ||
140 | gen_helper_vfp_set_fpscr(cpu_env, tmp); | ||
141 | + s->base.is_jmp = DISAS_UPDATE_NOCHAIN; | ||
142 | tcg_temp_free_i32(tmp); | ||
143 | tcg_temp_free_i32(sfpa); | ||
144 | break; | ||
145 | @@ -XXX,XX +XXX,XX @@ static bool gen_M_fp_sysreg_write(DisasContext *s, int regno, | ||
146 | } | ||
147 | tmp = loadfn(s, opaque, true); | ||
148 | store_cpu_field(tmp, v7m.vpr); | ||
149 | + s->base.is_jmp = DISAS_UPDATE_NOCHAIN; | ||
150 | break; | ||
151 | case ARM_VFP_P0: | ||
152 | { | ||
153 | @@ -XXX,XX +XXX,XX @@ static bool gen_M_fp_sysreg_write(DisasContext *s, int regno, | ||
154 | tcg_gen_deposit_i32(vpr, vpr, tmp, | ||
155 | R_V7M_VPR_P0_SHIFT, R_V7M_VPR_P0_LENGTH); | ||
156 | store_cpu_field(vpr, v7m.vpr); | ||
157 | + s->base.is_jmp = DISAS_UPDATE_NOCHAIN; | ||
158 | tcg_temp_free_i32(tmp); | ||
159 | break; | ||
160 | } | ||
161 | diff --git a/target/arm/translate-mve.c b/target/arm/translate-mve.c | ||
162 | index XXXXXXX..XXXXXXX 100644 | ||
163 | --- a/target/arm/translate-mve.c | ||
164 | +++ b/target/arm/translate-mve.c | ||
165 | @@ -XXX,XX +XXX,XX @@ DO_LOGIC(VORR, gen_helper_mve_vorr) | ||
166 | DO_LOGIC(VORN, gen_helper_mve_vorn) | ||
167 | DO_LOGIC(VEOR, gen_helper_mve_veor) | ||
168 | |||
169 | -DO_LOGIC(VPSEL, gen_helper_mve_vpsel) | ||
170 | +static bool trans_VPSEL(DisasContext *s, arg_2op *a) | ||
171 | +{ | ||
172 | + /* This insn updates predication bits */ | ||
173 | + s->base.is_jmp = DISAS_UPDATE_NOCHAIN; | ||
174 | + return do_2op(s, a, gen_helper_mve_vpsel); | ||
175 | +} | ||
176 | |||
177 | #define DO_2OP(INSN, FN) \ | ||
178 | static bool trans_##INSN(DisasContext *s, arg_2op *a) \ | ||
179 | @@ -XXX,XX +XXX,XX @@ static bool trans_VPNOT(DisasContext *s, arg_VPNOT *a) | ||
180 | } | ||
181 | |||
182 | gen_helper_mve_vpnot(cpu_env); | ||
183 | + /* This insn updates predication bits */ | ||
184 | + s->base.is_jmp = DISAS_UPDATE_NOCHAIN; | ||
185 | mve_update_eci(s); | ||
186 | return true; | ||
187 | } | ||
188 | @@ -XXX,XX +XXX,XX @@ static bool do_vcmp(DisasContext *s, arg_vcmp *a, MVEGenCmpFn *fn) | ||
189 | /* VPT */ | ||
190 | gen_vpst(s, a->mask); | ||
191 | } | ||
192 | + /* This insn updates predication bits */ | ||
193 | + s->base.is_jmp = DISAS_UPDATE_NOCHAIN; | ||
194 | mve_update_eci(s); | ||
195 | return true; | ||
196 | } | ||
197 | @@ -XXX,XX +XXX,XX @@ static bool do_vcmp_scalar(DisasContext *s, arg_vcmp_scalar *a, | ||
198 | /* VPT */ | ||
199 | gen_vpst(s, a->mask); | ||
200 | } | ||
201 | + /* This insn updates predication bits */ | ||
202 | + s->base.is_jmp = DISAS_UPDATE_NOCHAIN; | ||
203 | mve_update_eci(s); | ||
204 | return true; | ||
205 | } | ||
206 | diff --git a/target/arm/translate-vfp.c b/target/arm/translate-vfp.c | ||
207 | index XXXXXXX..XXXXXXX 100644 | ||
208 | --- a/target/arm/translate-vfp.c | ||
209 | +++ b/target/arm/translate-vfp.c | ||
210 | @@ -XXX,XX +XXX,XX @@ static inline long vfp_f16_offset(unsigned reg, bool top) | ||
211 | * Generate code for M-profile lazy FP state preservation if needed; | ||
212 | * this corresponds to the pseudocode PreserveFPState() function. | ||
213 | */ | ||
214 | -static void gen_preserve_fp_state(DisasContext *s) | ||
215 | +static void gen_preserve_fp_state(DisasContext *s, bool skip_context_update) | ||
216 | { | ||
217 | if (s->v7m_lspact) { | ||
218 | /* | ||
219 | @@ -XXX,XX +XXX,XX @@ static void gen_preserve_fp_state(DisasContext *s) | ||
220 | * any further FP insns in this TB. | ||
221 | */ | ||
222 | s->v7m_lspact = false; | ||
223 | + /* | ||
224 | + * The helper might have zeroed VPR, so we do not know the | ||
225 | + * correct value for the MVE_NO_PRED TB flag any more. | ||
226 | + * If we're about to create a new fp context then that | ||
227 | + * will precisely determine the MVE_NO_PRED value (see | ||
228 | + * gen_update_fp_context()). Otherwise, we must: | ||
229 | + * - set s->mve_no_pred to false, so this instruction | ||
230 | + * is generated to use helper functions | ||
231 | + * - end the TB now, without chaining to the next TB | ||
232 | + */ | ||
233 | + if (skip_context_update || !s->v7m_new_fp_ctxt_needed) { | ||
234 | + s->mve_no_pred = false; | ||
235 | + s->base.is_jmp = DISAS_UPDATE_NOCHAIN; | ||
236 | + } | ||
237 | } | ||
238 | } | ||
239 | |||
240 | @@ -XXX,XX +XXX,XX @@ static void gen_update_fp_context(DisasContext *s) | ||
241 | TCGv_i32 z32 = tcg_const_i32(0); | ||
242 | store_cpu_field(z32, v7m.vpr); | ||
243 | } | ||
244 | - | ||
245 | /* | ||
246 | - * We don't need to arrange to end the TB, because the only | ||
247 | - * parts of FPSCR which we cache in the TB flags are the VECLEN | ||
248 | - * and VECSTRIDE, and those don't exist for M-profile. | ||
249 | + * We just updated the FPSCR and VPR. Some of this state is cached | ||
250 | + * in the MVE_NO_PRED TB flag. We want to avoid having to end the | ||
251 | + * TB here, which means we need the new value of the MVE_NO_PRED | ||
252 | + * flag to be exactly known here and the same for all executions. | ||
253 | + * Luckily FPDSCR.LTPSIZE is always constant 4 and the VPR is | ||
254 | + * always set to 0, so the new MVE_NO_PRED flag is always 1 | ||
255 | + * if and only if we have MVE. | ||
256 | + * | ||
257 | + * (The other FPSCR state cached in TB flags is VECLEN and VECSTRIDE, | ||
258 | + * but those do not exist for M-profile, so are not relevant here.) | ||
259 | */ | ||
260 | + s->mve_no_pred = dc_isar_feature(aa32_mve, s); | ||
261 | |||
262 | if (s->v8m_secure) { | ||
263 | bits |= R_V7M_CONTROL_SFPA_MASK; | ||
264 | @@ -XXX,XX +XXX,XX @@ bool vfp_access_check_m(DisasContext *s, bool skip_context_update) | ||
265 | /* Handle M-profile lazy FP state mechanics */ | ||
266 | |||
267 | /* Trigger lazy-state preservation if necessary */ | ||
268 | - gen_preserve_fp_state(s); | ||
269 | + gen_preserve_fp_state(s, skip_context_update); | ||
270 | |||
271 | if (!skip_context_update) { | ||
272 | /* Update ownership of FP context and create new FP context if needed */ | ||
66 | diff --git a/target/arm/translate.c b/target/arm/translate.c | 273 | diff --git a/target/arm/translate.c b/target/arm/translate.c |
67 | index XXXXXXX..XXXXXXX 100644 | 274 | index XXXXXXX..XXXXXXX 100644 |
68 | --- a/target/arm/translate.c | 275 | --- a/target/arm/translate.c |
69 | +++ b/target/arm/translate.c | 276 | +++ b/target/arm/translate.c |
70 | @@ -XXX,XX +XXX,XX @@ static int disas_vfp_insn(DisasContext *s, uint32_t insn) | 277 | @@ -XXX,XX +XXX,XX @@ static bool trans_DLS(DisasContext *s, arg_DLS *a) |
71 | } | 278 | /* DLSTP: set FPSCR.LTPSIZE */ |
72 | } | 279 | tmp = tcg_const_i32(a->size); |
73 | 280 | store_cpu_field(tmp, v7m.ltpsize); | |
74 | + if (arm_dc_feature(s, ARM_FEATURE_M)) { | 281 | + s->base.is_jmp = DISAS_UPDATE_NOCHAIN; |
75 | + /* Handle M-profile lazy FP state mechanics */ | 282 | } |
76 | + | 283 | return true; |
77 | + /* Update ownership of FP context: set FPCCR.S to match current state */ | 284 | } |
78 | + if (s->v8m_fpccr_s_wrong) { | 285 | @@ -XXX,XX +XXX,XX @@ static bool trans_WLS(DisasContext *s, arg_WLS *a) |
79 | + TCGv_i32 tmp; | 286 | assert(ok); |
80 | + | 287 | tmp = tcg_const_i32(a->size); |
81 | + tmp = load_cpu_field(v7m.fpccr[M_REG_S]); | 288 | store_cpu_field(tmp, v7m.ltpsize); |
82 | + if (s->v8m_secure) { | 289 | + /* |
83 | + tcg_gen_ori_i32(tmp, tmp, R_V7M_FPCCR_S_MASK); | 290 | + * LTPSIZE updated, but MVE_NO_PRED will always be the same thing (0) |
84 | + } else { | 291 | + * when we take this upcoming exit from this TB, so gen_jmp_tb() is OK. |
85 | + tcg_gen_andi_i32(tmp, tmp, ~R_V7M_FPCCR_S_MASK); | 292 | + */ |
86 | + } | 293 | } |
87 | + store_cpu_field(tmp, v7m.fpccr[M_REG_S]); | 294 | gen_jmp_tb(s, s->base.pc_next, 1); |
88 | + /* Don't need to do this for any further FP insns in this TB */ | 295 | |
89 | + s->v8m_fpccr_s_wrong = false; | 296 | @@ -XXX,XX +XXX,XX @@ static bool trans_VCTP(DisasContext *s, arg_VCTP *a) |
90 | + } | 297 | gen_helper_mve_vctp(cpu_env, masklen); |
91 | + } | 298 | tcg_temp_free_i32(masklen); |
92 | + | 299 | tcg_temp_free_i32(rn_shifted); |
93 | if (extract32(insn, 28, 4) == 0xf) { | 300 | + /* This insn updates predication bits */ |
94 | /* | 301 | + s->base.is_jmp = DISAS_UPDATE_NOCHAIN; |
95 | * Encodings with T=1 (Thumb) or unconditional (ARM): | 302 | mve_update_eci(s); |
303 | return true; | ||
304 | } | ||
96 | @@ -XXX,XX +XXX,XX @@ static void arm_tr_init_disas_context(DisasContextBase *dcbase, CPUState *cs) | 305 | @@ -XXX,XX +XXX,XX @@ static void arm_tr_init_disas_context(DisasContextBase *dcbase, CPUState *cs) |
97 | dc->v8m_secure = arm_feature(env, ARM_FEATURE_M_SECURITY) && | 306 | dc->v7m_new_fp_ctxt_needed = |
98 | regime_is_secure(env, dc->mmu_idx); | 307 | EX_TBFLAG_M32(tb_flags, NEW_FP_CTXT_NEEDED); |
99 | dc->v8m_stackcheck = FIELD_EX32(tb_flags, TBFLAG_A32, STACKCHECK); | 308 | dc->v7m_lspact = EX_TBFLAG_M32(tb_flags, LSPACT); |
100 | + dc->v8m_fpccr_s_wrong = FIELD_EX32(tb_flags, TBFLAG_A32, FPCCR_S_WRONG); | 309 | + dc->mve_no_pred = EX_TBFLAG_M32(tb_flags, MVE_NO_PRED); |
101 | dc->cp_regs = cpu->cp_regs; | 310 | } else { |
102 | dc->features = env->features; | 311 | dc->debug_target_el = EX_TBFLAG_ANY(tb_flags, DEBUG_TARGET_EL); |
103 | 312 | dc->sctlr_b = EX_TBFLAG_A32(tb_flags, SCTLR__B); | |
104 | -- | 313 | -- |
105 | 2.20.1 | 314 | 2.20.1 |
106 | 315 | ||
107 | 316 | diff view generated by jsdifflib |
1 | Implement the code which updates the FPCCR register on an | 1 | When not predicating, implement the MVE bitwise logical insns |
---|---|---|---|
2 | exception entry where we are going to use lazy FP stacking. | 2 | directly using TCG vector operations. |
3 | We have to defer to the NVIC to determine whether the | ||
4 | various exceptions are currently ready or not. | ||
5 | 3 | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Message-id: 20190416125744.27770-12-peter.maydell@linaro.org | 5 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
7 | Message-id: 20210913095440.13462-5-peter.maydell@linaro.org | ||
8 | --- | 8 | --- |
9 | target/arm/cpu.h | 14 +++++++++ | 9 | target/arm/translate-mve.c | 51 +++++++++++++++++++++++++++----------- |
10 | hw/intc/armv7m_nvic.c | 34 ++++++++++++++++++++++ | 10 | 1 file changed, 36 insertions(+), 15 deletions(-) |
11 | target/arm/helper.c | 67 ++++++++++++++++++++++++++++++++++++++++++- | ||
12 | 3 files changed, 114 insertions(+), 1 deletion(-) | ||
13 | 11 | ||
14 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 12 | diff --git a/target/arm/translate-mve.c b/target/arm/translate-mve.c |
15 | index XXXXXXX..XXXXXXX 100644 | 13 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/target/arm/cpu.h | 14 | --- a/target/arm/translate-mve.c |
17 | +++ b/target/arm/cpu.h | 15 | +++ b/target/arm/translate-mve.c |
18 | @@ -XXX,XX +XXX,XX @@ void armv7m_nvic_acknowledge_irq(void *opaque); | 16 | @@ -XXX,XX +XXX,XX @@ static TCGv_ptr mve_qreg_ptr(unsigned reg) |
19 | * (Ignoring -1, this is the same as the RETTOBASE value before completion.) | ||
20 | */ | ||
21 | int armv7m_nvic_complete_irq(void *opaque, int irq, bool secure); | ||
22 | +/** | ||
23 | + * armv7m_nvic_get_ready_status(void *opaque, int irq, bool secure) | ||
24 | + * @opaque: the NVIC | ||
25 | + * @irq: the exception number to mark pending | ||
26 | + * @secure: false for non-banked exceptions or for the nonsecure | ||
27 | + * version of a banked exception, true for the secure version of a banked | ||
28 | + * exception. | ||
29 | + * | ||
30 | + * Return whether an exception is "ready", i.e. whether the exception is | ||
31 | + * enabled and is configured at a priority which would allow it to | ||
32 | + * interrupt the current execution priority. This controls whether the | ||
33 | + * RDY bit for it in the FPCCR is set. | ||
34 | + */ | ||
35 | +bool armv7m_nvic_get_ready_status(void *opaque, int irq, bool secure); | ||
36 | /** | ||
37 | * armv7m_nvic_raw_execution_priority: return the raw execution priority | ||
38 | * @opaque: the NVIC | ||
39 | diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c | ||
40 | index XXXXXXX..XXXXXXX 100644 | ||
41 | --- a/hw/intc/armv7m_nvic.c | ||
42 | +++ b/hw/intc/armv7m_nvic.c | ||
43 | @@ -XXX,XX +XXX,XX @@ int armv7m_nvic_complete_irq(void *opaque, int irq, bool secure) | ||
44 | return ret; | 17 | return ret; |
45 | } | 18 | } |
46 | 19 | ||
47 | +bool armv7m_nvic_get_ready_status(void *opaque, int irq, bool secure) | 20 | +static bool mve_no_predication(DisasContext *s) |
48 | +{ | 21 | +{ |
49 | + /* | 22 | + /* |
50 | + * Return whether an exception is "ready", i.e. it is enabled and is | 23 | + * Return true if we are executing the entire MVE instruction |
51 | + * configured at a priority which would allow it to interrupt the | 24 | + * with no predication or partial-execution, and so we can safely |
52 | + * current execution priority. | 25 | + * use an inline TCG vector implementation. |
53 | + * | ||
54 | + * irq and secure have the same semantics as for armv7m_nvic_set_pending(): | ||
55 | + * for non-banked exceptions secure is always false; for banked exceptions | ||
56 | + * it indicates which of the exceptions is required. | ||
57 | + */ | 26 | + */ |
58 | + NVICState *s = (NVICState *)opaque; | 27 | + return s->eci == 0 && s->mve_no_pred; |
59 | + bool banked = exc_is_banked(irq); | ||
60 | + VecInfo *vec; | ||
61 | + int running = nvic_exec_prio(s); | ||
62 | + | ||
63 | + assert(irq > ARMV7M_EXCP_RESET && irq < s->num_irq); | ||
64 | + assert(!secure || banked); | ||
65 | + | ||
66 | + /* | ||
67 | + * HardFault is an odd special case: we always check against -1, | ||
68 | + * even if we're secure and HardFault has priority -3; we never | ||
69 | + * need to check for enabled state. | ||
70 | + */ | ||
71 | + if (irq == ARMV7M_EXCP_HARD) { | ||
72 | + return running > -1; | ||
73 | + } | ||
74 | + | ||
75 | + vec = (banked && secure) ? &s->sec_vectors[irq] : &s->vectors[irq]; | ||
76 | + | ||
77 | + return vec->enabled && | ||
78 | + exc_group_prio(s, vec->prio, secure) < running; | ||
79 | +} | 28 | +} |
80 | + | 29 | + |
81 | /* callback when external interrupt line is changed */ | 30 | static bool mve_check_qreg_bank(DisasContext *s, int qmask) |
82 | static void set_irq_level(void *opaque, int n, int level) | ||
83 | { | 31 | { |
84 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 32 | /* |
85 | index XXXXXXX..XXXXXXX 100644 | 33 | @@ -XXX,XX +XXX,XX @@ static bool trans_VNEG_fp(DisasContext *s, arg_1op *a) |
86 | --- a/target/arm/helper.c | 34 | return do_1op(s, a, fns[a->size]); |
87 | +++ b/target/arm/helper.c | ||
88 | @@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain, | ||
89 | env->thumb = addr & 1; | ||
90 | } | 35 | } |
91 | 36 | ||
92 | +static void v7m_update_fpccr(CPUARMState *env, uint32_t frameptr, | 37 | -static bool do_2op(DisasContext *s, arg_2op *a, MVEGenTwoOpFn fn) |
93 | + bool apply_splim) | 38 | +static bool do_2op_vec(DisasContext *s, arg_2op *a, MVEGenTwoOpFn fn, |
39 | + GVecGen3Fn *vecfn) | ||
40 | { | ||
41 | TCGv_ptr qd, qn, qm; | ||
42 | |||
43 | @@ -XXX,XX +XXX,XX @@ static bool do_2op(DisasContext *s, arg_2op *a, MVEGenTwoOpFn fn) | ||
44 | return true; | ||
45 | } | ||
46 | |||
47 | - qd = mve_qreg_ptr(a->qd); | ||
48 | - qn = mve_qreg_ptr(a->qn); | ||
49 | - qm = mve_qreg_ptr(a->qm); | ||
50 | - fn(cpu_env, qd, qn, qm); | ||
51 | - tcg_temp_free_ptr(qd); | ||
52 | - tcg_temp_free_ptr(qn); | ||
53 | - tcg_temp_free_ptr(qm); | ||
54 | + if (vecfn && mve_no_predication(s)) { | ||
55 | + vecfn(a->size, mve_qreg_offset(a->qd), mve_qreg_offset(a->qn), | ||
56 | + mve_qreg_offset(a->qm), 16, 16); | ||
57 | + } else { | ||
58 | + qd = mve_qreg_ptr(a->qd); | ||
59 | + qn = mve_qreg_ptr(a->qn); | ||
60 | + qm = mve_qreg_ptr(a->qm); | ||
61 | + fn(cpu_env, qd, qn, qm); | ||
62 | + tcg_temp_free_ptr(qd); | ||
63 | + tcg_temp_free_ptr(qn); | ||
64 | + tcg_temp_free_ptr(qm); | ||
65 | + } | ||
66 | mve_update_eci(s); | ||
67 | return true; | ||
68 | } | ||
69 | |||
70 | -#define DO_LOGIC(INSN, HELPER) \ | ||
71 | +static bool do_2op(DisasContext *s, arg_2op *a, MVEGenTwoOpFn *fn) | ||
94 | +{ | 72 | +{ |
95 | + /* | 73 | + return do_2op_vec(s, a, fn, NULL); |
96 | + * Like the pseudocode UpdateFPCCR: save state in FPCAR and FPCCR | ||
97 | + * that we will need later in order to do lazy FP reg stacking. | ||
98 | + */ | ||
99 | + bool is_secure = env->v7m.secure; | ||
100 | + void *nvic = env->nvic; | ||
101 | + /* | ||
102 | + * Some bits are unbanked and live always in fpccr[M_REG_S]; some bits | ||
103 | + * are banked and we want to update the bit in the bank for the | ||
104 | + * current security state; and in one case we want to specifically | ||
105 | + * update the NS banked version of a bit even if we are secure. | ||
106 | + */ | ||
107 | + uint32_t *fpccr_s = &env->v7m.fpccr[M_REG_S]; | ||
108 | + uint32_t *fpccr_ns = &env->v7m.fpccr[M_REG_NS]; | ||
109 | + uint32_t *fpccr = &env->v7m.fpccr[is_secure]; | ||
110 | + bool hfrdy, bfrdy, mmrdy, ns_ufrdy, s_ufrdy, sfrdy, monrdy; | ||
111 | + | ||
112 | + env->v7m.fpcar[is_secure] = frameptr & ~0x7; | ||
113 | + | ||
114 | + if (apply_splim && arm_feature(env, ARM_FEATURE_V8)) { | ||
115 | + bool splimviol; | ||
116 | + uint32_t splim = v7m_sp_limit(env); | ||
117 | + bool ign = armv7m_nvic_neg_prio_requested(nvic, is_secure) && | ||
118 | + (env->v7m.ccr[is_secure] & R_V7M_CCR_STKOFHFNMIGN_MASK); | ||
119 | + | ||
120 | + splimviol = !ign && frameptr < splim; | ||
121 | + *fpccr = FIELD_DP32(*fpccr, V7M_FPCCR, SPLIMVIOL, splimviol); | ||
122 | + } | ||
123 | + | ||
124 | + *fpccr = FIELD_DP32(*fpccr, V7M_FPCCR, LSPACT, 1); | ||
125 | + | ||
126 | + *fpccr_s = FIELD_DP32(*fpccr_s, V7M_FPCCR, S, is_secure); | ||
127 | + | ||
128 | + *fpccr = FIELD_DP32(*fpccr, V7M_FPCCR, USER, arm_current_el(env) == 0); | ||
129 | + | ||
130 | + *fpccr = FIELD_DP32(*fpccr, V7M_FPCCR, THREAD, | ||
131 | + !arm_v7m_is_handler_mode(env)); | ||
132 | + | ||
133 | + hfrdy = armv7m_nvic_get_ready_status(nvic, ARMV7M_EXCP_HARD, false); | ||
134 | + *fpccr_s = FIELD_DP32(*fpccr_s, V7M_FPCCR, HFRDY, hfrdy); | ||
135 | + | ||
136 | + bfrdy = armv7m_nvic_get_ready_status(nvic, ARMV7M_EXCP_BUS, false); | ||
137 | + *fpccr_s = FIELD_DP32(*fpccr_s, V7M_FPCCR, BFRDY, bfrdy); | ||
138 | + | ||
139 | + mmrdy = armv7m_nvic_get_ready_status(nvic, ARMV7M_EXCP_MEM, is_secure); | ||
140 | + *fpccr = FIELD_DP32(*fpccr, V7M_FPCCR, MMRDY, mmrdy); | ||
141 | + | ||
142 | + ns_ufrdy = armv7m_nvic_get_ready_status(nvic, ARMV7M_EXCP_USAGE, false); | ||
143 | + *fpccr_ns = FIELD_DP32(*fpccr_ns, V7M_FPCCR, UFRDY, ns_ufrdy); | ||
144 | + | ||
145 | + monrdy = armv7m_nvic_get_ready_status(nvic, ARMV7M_EXCP_DEBUG, false); | ||
146 | + *fpccr_s = FIELD_DP32(*fpccr_s, V7M_FPCCR, MONRDY, monrdy); | ||
147 | + | ||
148 | + if (arm_feature(env, ARM_FEATURE_M_SECURITY)) { | ||
149 | + s_ufrdy = armv7m_nvic_get_ready_status(nvic, ARMV7M_EXCP_USAGE, true); | ||
150 | + *fpccr_s = FIELD_DP32(*fpccr_s, V7M_FPCCR, UFRDY, s_ufrdy); | ||
151 | + | ||
152 | + sfrdy = armv7m_nvic_get_ready_status(nvic, ARMV7M_EXCP_SECURE, false); | ||
153 | + *fpccr_s = FIELD_DP32(*fpccr_s, V7M_FPCCR, SFRDY, sfrdy); | ||
154 | + } | ||
155 | +} | 74 | +} |
156 | + | 75 | + |
157 | static bool v7m_push_stack(ARMCPU *cpu) | 76 | +#define DO_LOGIC(INSN, HELPER, VECFN) \ |
77 | static bool trans_##INSN(DisasContext *s, arg_2op *a) \ | ||
78 | { \ | ||
79 | - return do_2op(s, a, HELPER); \ | ||
80 | + return do_2op_vec(s, a, HELPER, VECFN); \ | ||
81 | } | ||
82 | |||
83 | -DO_LOGIC(VAND, gen_helper_mve_vand) | ||
84 | -DO_LOGIC(VBIC, gen_helper_mve_vbic) | ||
85 | -DO_LOGIC(VORR, gen_helper_mve_vorr) | ||
86 | -DO_LOGIC(VORN, gen_helper_mve_vorn) | ||
87 | -DO_LOGIC(VEOR, gen_helper_mve_veor) | ||
88 | +DO_LOGIC(VAND, gen_helper_mve_vand, tcg_gen_gvec_and) | ||
89 | +DO_LOGIC(VBIC, gen_helper_mve_vbic, tcg_gen_gvec_andc) | ||
90 | +DO_LOGIC(VORR, gen_helper_mve_vorr, tcg_gen_gvec_or) | ||
91 | +DO_LOGIC(VORN, gen_helper_mve_vorn, tcg_gen_gvec_orc) | ||
92 | +DO_LOGIC(VEOR, gen_helper_mve_veor, tcg_gen_gvec_xor) | ||
93 | |||
94 | static bool trans_VPSEL(DisasContext *s, arg_2op *a) | ||
158 | { | 95 | { |
159 | /* Do the "set up stack frame" part of exception entry, | ||
160 | @@ -XXX,XX +XXX,XX @@ static bool v7m_push_stack(ARMCPU *cpu) | ||
161 | } | ||
162 | } else { | ||
163 | /* Lazy stacking enabled, save necessary info to stack later */ | ||
164 | - /* TODO : equivalent of UpdateFPCCR() pseudocode */ | ||
165 | + v7m_update_fpccr(env, frameptr + 0x20, true); | ||
166 | } | ||
167 | } | ||
168 | } | ||
169 | -- | 96 | -- |
170 | 2.20.1 | 97 | 2.20.1 |
171 | 98 | ||
172 | 99 | diff view generated by jsdifflib |
1 | In the stripe8() function we use a variable length array; however | 1 | Optimize MVE arithmetic ops when we have a TCG |
---|---|---|---|
2 | we know that the maximum length required is MAX_NUM_BUSSES. Use | 2 | vector operation we can use. |
3 | a fixed-length array and an assert instead. | ||
4 | 3 | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
6 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 5 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
7 | Reviewed-by: Francisco Iglesias <frasse.iglesias@gmail.com> | 6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
8 | Reviewed-by: Alistair Francis <alistair.francis@wdc.com> | 7 | Message-id: 20210913095440.13462-6-peter.maydell@linaro.org |
9 | Reviewed-by: Stefano Garzarella <sgarzare@redhat.com> | ||
10 | Message-id: 20190328152635.2794-1-peter.maydell@linaro.org | ||
11 | --- | 8 | --- |
12 | hw/ssi/xilinx_spips.c | 6 ++++-- | 9 | target/arm/translate-mve.c | 20 +++++++++++--------- |
13 | 1 file changed, 4 insertions(+), 2 deletions(-) | 10 | 1 file changed, 11 insertions(+), 9 deletions(-) |
14 | 11 | ||
15 | diff --git a/hw/ssi/xilinx_spips.c b/hw/ssi/xilinx_spips.c | 12 | diff --git a/target/arm/translate-mve.c b/target/arm/translate-mve.c |
16 | index XXXXXXX..XXXXXXX 100644 | 13 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/hw/ssi/xilinx_spips.c | 14 | --- a/target/arm/translate-mve.c |
18 | +++ b/hw/ssi/xilinx_spips.c | 15 | +++ b/target/arm/translate-mve.c |
19 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_qspips_reset(DeviceState *d) | 16 | @@ -XXX,XX +XXX,XX @@ static bool trans_VPSEL(DisasContext *s, arg_2op *a) |
20 | 17 | return do_2op(s, a, gen_helper_mve_vpsel); | |
21 | static inline void stripe8(uint8_t *x, int num, bool dir) | 18 | } |
22 | { | 19 | |
23 | - uint8_t r[num]; | 20 | -#define DO_2OP(INSN, FN) \ |
24 | - memset(r, 0, sizeof(uint8_t) * num); | 21 | +#define DO_2OP_VEC(INSN, FN, VECFN) \ |
25 | + uint8_t r[MAX_NUM_BUSSES]; | 22 | static bool trans_##INSN(DisasContext *s, arg_2op *a) \ |
26 | int idx[2] = {0, 0}; | 23 | { \ |
27 | int bit[2] = {0, 7}; | 24 | static MVEGenTwoOpFn * const fns[] = { \ |
28 | int d = dir; | 25 | @@ -XXX,XX +XXX,XX @@ static bool trans_VPSEL(DisasContext *s, arg_2op *a) |
29 | 26 | gen_helper_mve_##FN##w, \ | |
30 | + assert(num <= MAX_NUM_BUSSES); | 27 | NULL, \ |
31 | + memset(r, 0, sizeof(uint8_t) * num); | 28 | }; \ |
29 | - return do_2op(s, a, fns[a->size]); \ | ||
30 | + return do_2op_vec(s, a, fns[a->size], VECFN); \ | ||
31 | } | ||
32 | |||
33 | -DO_2OP(VADD, vadd) | ||
34 | -DO_2OP(VSUB, vsub) | ||
35 | -DO_2OP(VMUL, vmul) | ||
36 | +#define DO_2OP(INSN, FN) DO_2OP_VEC(INSN, FN, NULL) | ||
32 | + | 37 | + |
33 | for (idx[0] = 0; idx[0] < num; ++idx[0]) { | 38 | +DO_2OP_VEC(VADD, vadd, tcg_gen_gvec_add) |
34 | for (bit[0] = 7; bit[0] >= 0; bit[0]--) { | 39 | +DO_2OP_VEC(VSUB, vsub, tcg_gen_gvec_sub) |
35 | r[idx[!d]] |= x[idx[d]] & 1 << bit[d] ? 1 << bit[!d] : 0; | 40 | +DO_2OP_VEC(VMUL, vmul, tcg_gen_gvec_mul) |
41 | DO_2OP(VMULH_S, vmulhs) | ||
42 | DO_2OP(VMULH_U, vmulhu) | ||
43 | DO_2OP(VRMULH_S, vrmulhs) | ||
44 | DO_2OP(VRMULH_U, vrmulhu) | ||
45 | -DO_2OP(VMAX_S, vmaxs) | ||
46 | -DO_2OP(VMAX_U, vmaxu) | ||
47 | -DO_2OP(VMIN_S, vmins) | ||
48 | -DO_2OP(VMIN_U, vminu) | ||
49 | +DO_2OP_VEC(VMAX_S, vmaxs, tcg_gen_gvec_smax) | ||
50 | +DO_2OP_VEC(VMAX_U, vmaxu, tcg_gen_gvec_umax) | ||
51 | +DO_2OP_VEC(VMIN_S, vmins, tcg_gen_gvec_smin) | ||
52 | +DO_2OP_VEC(VMIN_U, vminu, tcg_gen_gvec_umin) | ||
53 | DO_2OP(VABD_S, vabds) | ||
54 | DO_2OP(VABD_U, vabdu) | ||
55 | DO_2OP(VHADD_S, vhadds) | ||
36 | -- | 56 | -- |
37 | 2.20.1 | 57 | 2.20.1 |
38 | 58 | ||
39 | 59 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Normally configure identifies the source path by looking | ||
2 | at the location where the configure script itself exists. | ||
3 | We also provide a --source-path option which lets the user | ||
4 | manually override this. | ||
5 | 1 | ||
6 | There isn't really an obvious use case for the --source-path | ||
7 | option, and in commit 927128222b0a91f56c13a in 2017 we | ||
8 | accidentally added some logic that looks at $source_path | ||
9 | before the command line option that overrides it has been | ||
10 | processed. | ||
11 | |||
12 | The fact that nobody complained suggests that there isn't | ||
13 | any use of this option and we aren't testing it either; | ||
14 | remove it. This allows us to move the "make $source_path | ||
15 | absolute" logic up so that there is no window in the script | ||
16 | where $source_path is set but not yet absolute. | ||
17 | |||
18 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
19 | Reviewed-by: Daniel P. Berrangé <berrange@redhat.com> | ||
20 | Message-id: 20190318134019.23729-1-peter.maydell@linaro.org | ||
21 | --- | ||
22 | configure | 10 ++-------- | ||
23 | 1 file changed, 2 insertions(+), 8 deletions(-) | ||
24 | |||
25 | diff --git a/configure b/configure | ||
26 | index XXXXXXX..XXXXXXX 100755 | ||
27 | --- a/configure | ||
28 | +++ b/configure | ||
29 | @@ -XXX,XX +XXX,XX @@ ld_has() { | ||
30 | |||
31 | # default parameters | ||
32 | source_path=$(dirname "$0") | ||
33 | +# make source path absolute | ||
34 | +source_path=$(cd "$source_path"; pwd) | ||
35 | cpu="" | ||
36 | iasl="iasl" | ||
37 | interp_prefix="/usr/gnemul/qemu-%M" | ||
38 | @@ -XXX,XX +XXX,XX @@ for opt do | ||
39 | ;; | ||
40 | --cxx=*) CXX="$optarg" | ||
41 | ;; | ||
42 | - --source-path=*) source_path="$optarg" | ||
43 | - ;; | ||
44 | --cpu=*) cpu="$optarg" | ||
45 | ;; | ||
46 | --extra-cflags=*) QEMU_CFLAGS="$QEMU_CFLAGS $optarg" | ||
47 | @@ -XXX,XX +XXX,XX @@ if test "$debug_info" = "yes"; then | ||
48 | LDFLAGS="-g $LDFLAGS" | ||
49 | fi | ||
50 | |||
51 | -# make source path absolute | ||
52 | -source_path=$(cd "$source_path"; pwd) | ||
53 | - | ||
54 | # running configure in the source tree? | ||
55 | # we know that's the case if configure is there. | ||
56 | if test -f "./configure"; then | ||
57 | @@ -XXX,XX +XXX,XX @@ for opt do | ||
58 | ;; | ||
59 | --interp-prefix=*) interp_prefix="$optarg" | ||
60 | ;; | ||
61 | - --source-path=*) | ||
62 | - ;; | ||
63 | --cross-prefix=*) | ||
64 | ;; | ||
65 | --cc=*) | ||
66 | @@ -XXX,XX +XXX,XX @@ $(echo Available targets: $default_target_list | \ | ||
67 | --target-list-exclude=LIST exclude a set of targets from the default target-list | ||
68 | |||
69 | Advanced options (experts only): | ||
70 | - --source-path=PATH path of source code [$source_path] | ||
71 | --cross-prefix=PREFIX use PREFIX for compile tools [$cross_prefix] | ||
72 | --cc=CC use C compiler CC [$cc] | ||
73 | --iasl=IASL use ACPI compiler IASL [$iasl] | ||
74 | -- | ||
75 | 2.20.1 | ||
76 | |||
77 | diff view generated by jsdifflib |
1 | In the v7M architecture, if an exception is generated in the process | 1 | Optimize the MVE VNEG and VABS insns by using TCG |
---|---|---|---|
2 | of doing the lazy stacking of FP registers, the handling of | 2 | vector ops when possible. |
3 | possible escalation to HardFault is treated differently to the normal | ||
4 | approach: it works based on the saved information about exception | ||
5 | readiness that was stored in the FPCCR when the stack frame was | ||
6 | created. Provide a new function armv7m_nvic_set_pending_lazyfp() | ||
7 | which pends exceptions during lazy stacking, and implements | ||
8 | this logic. | ||
9 | |||
10 | This corresponds to the pseudocode TakePreserveFPException(). | ||
11 | 3 | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
5 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
13 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
14 | Message-id: 20190416125744.27770-22-peter.maydell@linaro.org | 7 | Message-id: 20210913095440.13462-7-peter.maydell@linaro.org |
15 | --- | 8 | --- |
16 | target/arm/cpu.h | 12 ++++++ | 9 | target/arm/translate-mve.c | 32 ++++++++++++++++++++++---------- |
17 | hw/intc/armv7m_nvic.c | 96 +++++++++++++++++++++++++++++++++++++++++++ | 10 | 1 file changed, 22 insertions(+), 10 deletions(-) |
18 | 2 files changed, 108 insertions(+) | ||
19 | 11 | ||
20 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 12 | diff --git a/target/arm/translate-mve.c b/target/arm/translate-mve.c |
21 | index XXXXXXX..XXXXXXX 100644 | 13 | index XXXXXXX..XXXXXXX 100644 |
22 | --- a/target/arm/cpu.h | 14 | --- a/target/arm/translate-mve.c |
23 | +++ b/target/arm/cpu.h | 15 | +++ b/target/arm/translate-mve.c |
24 | @@ -XXX,XX +XXX,XX @@ void armv7m_nvic_set_pending(void *opaque, int irq, bool secure); | 16 | @@ -XXX,XX +XXX,XX @@ static bool trans_VDUP(DisasContext *s, arg_VDUP *a) |
25 | * a different exception). | 17 | return true; |
26 | */ | ||
27 | void armv7m_nvic_set_pending_derived(void *opaque, int irq, bool secure); | ||
28 | +/** | ||
29 | + * armv7m_nvic_set_pending_lazyfp: mark this lazy FP exception as pending | ||
30 | + * @opaque: the NVIC | ||
31 | + * @irq: the exception number to mark pending | ||
32 | + * @secure: false for non-banked exceptions or for the nonsecure | ||
33 | + * version of a banked exception, true for the secure version of a banked | ||
34 | + * exception. | ||
35 | + * | ||
36 | + * Similar to armv7m_nvic_set_pending(), but specifically for exceptions | ||
37 | + * generated in the course of lazy stacking of FP registers. | ||
38 | + */ | ||
39 | +void armv7m_nvic_set_pending_lazyfp(void *opaque, int irq, bool secure); | ||
40 | /** | ||
41 | * armv7m_nvic_get_pending_irq_info: return highest priority pending | ||
42 | * exception, and whether it targets Secure state | ||
43 | diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c | ||
44 | index XXXXXXX..XXXXXXX 100644 | ||
45 | --- a/hw/intc/armv7m_nvic.c | ||
46 | +++ b/hw/intc/armv7m_nvic.c | ||
47 | @@ -XXX,XX +XXX,XX @@ void armv7m_nvic_set_pending_derived(void *opaque, int irq, bool secure) | ||
48 | do_armv7m_nvic_set_pending(opaque, irq, secure, true); | ||
49 | } | 18 | } |
50 | 19 | ||
51 | +void armv7m_nvic_set_pending_lazyfp(void *opaque, int irq, bool secure) | 20 | -static bool do_1op(DisasContext *s, arg_1op *a, MVEGenOneOpFn fn) |
21 | +static bool do_1op_vec(DisasContext *s, arg_1op *a, MVEGenOneOpFn fn, | ||
22 | + GVecGen2Fn vecfn) | ||
23 | { | ||
24 | TCGv_ptr qd, qm; | ||
25 | |||
26 | @@ -XXX,XX +XXX,XX @@ static bool do_1op(DisasContext *s, arg_1op *a, MVEGenOneOpFn fn) | ||
27 | return true; | ||
28 | } | ||
29 | |||
30 | - qd = mve_qreg_ptr(a->qd); | ||
31 | - qm = mve_qreg_ptr(a->qm); | ||
32 | - fn(cpu_env, qd, qm); | ||
33 | - tcg_temp_free_ptr(qd); | ||
34 | - tcg_temp_free_ptr(qm); | ||
35 | + if (vecfn && mve_no_predication(s)) { | ||
36 | + vecfn(a->size, mve_qreg_offset(a->qd), mve_qreg_offset(a->qm), 16, 16); | ||
37 | + } else { | ||
38 | + qd = mve_qreg_ptr(a->qd); | ||
39 | + qm = mve_qreg_ptr(a->qm); | ||
40 | + fn(cpu_env, qd, qm); | ||
41 | + tcg_temp_free_ptr(qd); | ||
42 | + tcg_temp_free_ptr(qm); | ||
43 | + } | ||
44 | mve_update_eci(s); | ||
45 | return true; | ||
46 | } | ||
47 | |||
48 | -#define DO_1OP(INSN, FN) \ | ||
49 | +static bool do_1op(DisasContext *s, arg_1op *a, MVEGenOneOpFn fn) | ||
52 | +{ | 50 | +{ |
53 | + /* | 51 | + return do_1op_vec(s, a, fn, NULL); |
54 | + * Pend an exception during lazy FP stacking. This differs | ||
55 | + * from the usual exception pending because the logic for | ||
56 | + * whether we should escalate depends on the saved context | ||
57 | + * in the FPCCR register, not on the current state of the CPU/NVIC. | ||
58 | + */ | ||
59 | + NVICState *s = (NVICState *)opaque; | ||
60 | + bool banked = exc_is_banked(irq); | ||
61 | + VecInfo *vec; | ||
62 | + bool targets_secure; | ||
63 | + bool escalate = false; | ||
64 | + /* | ||
65 | + * We will only look at bits in fpccr if this is a banked exception | ||
66 | + * (in which case 'secure' tells us whether it is the S or NS version). | ||
67 | + * All the bits for the non-banked exceptions are in fpccr_s. | ||
68 | + */ | ||
69 | + uint32_t fpccr_s = s->cpu->env.v7m.fpccr[M_REG_S]; | ||
70 | + uint32_t fpccr = s->cpu->env.v7m.fpccr[secure]; | ||
71 | + | ||
72 | + assert(irq > ARMV7M_EXCP_RESET && irq < s->num_irq); | ||
73 | + assert(!secure || banked); | ||
74 | + | ||
75 | + vec = (banked && secure) ? &s->sec_vectors[irq] : &s->vectors[irq]; | ||
76 | + | ||
77 | + targets_secure = banked ? secure : exc_targets_secure(s, irq); | ||
78 | + | ||
79 | + switch (irq) { | ||
80 | + case ARMV7M_EXCP_DEBUG: | ||
81 | + if (!(fpccr_s & R_V7M_FPCCR_MONRDY_MASK)) { | ||
82 | + /* Ignore DebugMonitor exception */ | ||
83 | + return; | ||
84 | + } | ||
85 | + break; | ||
86 | + case ARMV7M_EXCP_MEM: | ||
87 | + escalate = !(fpccr & R_V7M_FPCCR_MMRDY_MASK); | ||
88 | + break; | ||
89 | + case ARMV7M_EXCP_USAGE: | ||
90 | + escalate = !(fpccr & R_V7M_FPCCR_UFRDY_MASK); | ||
91 | + break; | ||
92 | + case ARMV7M_EXCP_BUS: | ||
93 | + escalate = !(fpccr_s & R_V7M_FPCCR_BFRDY_MASK); | ||
94 | + break; | ||
95 | + case ARMV7M_EXCP_SECURE: | ||
96 | + escalate = !(fpccr_s & R_V7M_FPCCR_SFRDY_MASK); | ||
97 | + break; | ||
98 | + default: | ||
99 | + g_assert_not_reached(); | ||
100 | + } | ||
101 | + | ||
102 | + if (escalate) { | ||
103 | + /* | ||
104 | + * Escalate to HardFault: faults that initially targeted Secure | ||
105 | + * continue to do so, even if HF normally targets NonSecure. | ||
106 | + */ | ||
107 | + irq = ARMV7M_EXCP_HARD; | ||
108 | + if (arm_feature(&s->cpu->env, ARM_FEATURE_M_SECURITY) && | ||
109 | + (targets_secure || | ||
110 | + !(s->cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK))) { | ||
111 | + vec = &s->sec_vectors[irq]; | ||
112 | + } else { | ||
113 | + vec = &s->vectors[irq]; | ||
114 | + } | ||
115 | + } | ||
116 | + | ||
117 | + if (!vec->enabled || | ||
118 | + nvic_exec_prio(s) <= exc_group_prio(s, vec->prio, secure)) { | ||
119 | + if (!(fpccr_s & R_V7M_FPCCR_HFRDY_MASK)) { | ||
120 | + /* | ||
121 | + * We want to escalate to HardFault but the context the | ||
122 | + * FP state belongs to prevents the exception pre-empting. | ||
123 | + */ | ||
124 | + cpu_abort(&s->cpu->parent_obj, | ||
125 | + "Lockup: can't escalate to HardFault during " | ||
126 | + "lazy FP register stacking\n"); | ||
127 | + } | ||
128 | + } | ||
129 | + | ||
130 | + if (escalate) { | ||
131 | + s->cpu->env.v7m.hfsr |= R_V7M_HFSR_FORCED_MASK; | ||
132 | + } | ||
133 | + if (!vec->pending) { | ||
134 | + vec->pending = 1; | ||
135 | + /* | ||
136 | + * We do not call nvic_irq_update(), because we know our caller | ||
137 | + * is going to handle causing us to take the exception by | ||
138 | + * raising EXCP_LAZYFP, so raising the IRQ line would be | ||
139 | + * pointless extra work. We just need to recompute the | ||
140 | + * priorities so that armv7m_nvic_can_take_pending_exception() | ||
141 | + * returns the right answer. | ||
142 | + */ | ||
143 | + nvic_recompute_state(s); | ||
144 | + } | ||
145 | +} | 52 | +} |
146 | + | 53 | + |
147 | /* Make pending IRQ active. */ | 54 | +#define DO_1OP_VEC(INSN, FN, VECFN) \ |
148 | void armv7m_nvic_acknowledge_irq(void *opaque) | 55 | static bool trans_##INSN(DisasContext *s, arg_1op *a) \ |
149 | { | 56 | { \ |
57 | static MVEGenOneOpFn * const fns[] = { \ | ||
58 | @@ -XXX,XX +XXX,XX @@ static bool do_1op(DisasContext *s, arg_1op *a, MVEGenOneOpFn fn) | ||
59 | gen_helper_mve_##FN##w, \ | ||
60 | NULL, \ | ||
61 | }; \ | ||
62 | - return do_1op(s, a, fns[a->size]); \ | ||
63 | + return do_1op_vec(s, a, fns[a->size], VECFN); \ | ||
64 | } | ||
65 | |||
66 | +#define DO_1OP(INSN, FN) DO_1OP_VEC(INSN, FN, NULL) | ||
67 | + | ||
68 | DO_1OP(VCLZ, vclz) | ||
69 | DO_1OP(VCLS, vcls) | ||
70 | -DO_1OP(VABS, vabs) | ||
71 | -DO_1OP(VNEG, vneg) | ||
72 | +DO_1OP_VEC(VABS, vabs, tcg_gen_gvec_abs) | ||
73 | +DO_1OP_VEC(VNEG, vneg, tcg_gen_gvec_neg) | ||
74 | DO_1OP(VQABS, vqabs) | ||
75 | DO_1OP(VQNEG, vqneg) | ||
76 | DO_1OP(VMAXA, vmaxa) | ||
150 | -- | 77 | -- |
151 | 2.20.1 | 78 | 2.20.1 |
152 | 79 | ||
153 | 80 | diff view generated by jsdifflib |
1 | Enforce that for M-profile various FPSCR bits which are RES0 there | 1 | Optimize the MVE VDUP insns by using TCG vector ops when possible. |
---|---|---|---|
2 | but have defined meanings on A-profile are never settable. This | ||
3 | ensures that M-profile code can't enable the A-profile behaviour | ||
4 | (notably vector length/stride handling) by accident. | ||
5 | 2 | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 3 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
8 | Message-id: 20190416125744.27770-2-peter.maydell@linaro.org | 5 | Message-id: 20210913095440.13462-8-peter.maydell@linaro.org |
9 | --- | 6 | --- |
10 | target/arm/vfp_helper.c | 8 ++++++++ | 7 | target/arm/translate-mve.c | 12 ++++++++---- |
11 | 1 file changed, 8 insertions(+) | 8 | 1 file changed, 8 insertions(+), 4 deletions(-) |
12 | 9 | ||
13 | diff --git a/target/arm/vfp_helper.c b/target/arm/vfp_helper.c | 10 | diff --git a/target/arm/translate-mve.c b/target/arm/translate-mve.c |
14 | index XXXXXXX..XXXXXXX 100644 | 11 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/target/arm/vfp_helper.c | 12 | --- a/target/arm/translate-mve.c |
16 | +++ b/target/arm/vfp_helper.c | 13 | +++ b/target/arm/translate-mve.c |
17 | @@ -XXX,XX +XXX,XX @@ void HELPER(vfp_set_fpscr)(CPUARMState *env, uint32_t val) | 14 | @@ -XXX,XX +XXX,XX @@ static bool trans_VDUP(DisasContext *s, arg_VDUP *a) |
18 | val &= ~FPCR_FZ16; | 15 | return true; |
19 | } | 16 | } |
20 | 17 | ||
21 | + if (arm_feature(env, ARM_FEATURE_M)) { | 18 | - qd = mve_qreg_ptr(a->qd); |
22 | + /* | 19 | rt = load_reg(s, a->rt); |
23 | + * M profile FPSCR is RES0 for the QC, STRIDE, FZ16, LEN bits | 20 | - tcg_gen_dup_i32(a->size, rt, rt); |
24 | + * and also for the trapped-exception-handling bits IxE. | 21 | - gen_helper_mve_vdup(cpu_env, qd, rt); |
25 | + */ | 22 | - tcg_temp_free_ptr(qd); |
26 | + val &= 0xf7c0009f; | 23 | + if (mve_no_predication(s)) { |
24 | + tcg_gen_gvec_dup_i32(a->size, mve_qreg_offset(a->qd), 16, 16, rt); | ||
25 | + } else { | ||
26 | + qd = mve_qreg_ptr(a->qd); | ||
27 | + tcg_gen_dup_i32(a->size, rt, rt); | ||
28 | + gen_helper_mve_vdup(cpu_env, qd, rt); | ||
29 | + tcg_temp_free_ptr(qd); | ||
27 | + } | 30 | + } |
28 | + | 31 | tcg_temp_free_i32(rt); |
29 | /* | 32 | mve_update_eci(s); |
30 | * We don't implement trapped exception handling, so the | 33 | return true; |
31 | * trap enable bits, IDE|IXE|UFE|OFE|DZE|IOE are all RAZ/WI (not RES0!) | ||
32 | -- | 34 | -- |
33 | 2.20.1 | 35 | 2.20.1 |
34 | 36 | ||
35 | 37 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | For M-profile the MVFR* ID registers are memory mapped, in the | ||
2 | range we implement via the NVIC. Allow them to be read. | ||
3 | (If the CPU has no FPU, these registers are defined to be RAZ.) | ||
4 | 1 | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
7 | Message-id: 20190416125744.27770-3-peter.maydell@linaro.org | ||
8 | --- | ||
9 | hw/intc/armv7m_nvic.c | 6 ++++++ | ||
10 | 1 file changed, 6 insertions(+) | ||
11 | |||
12 | diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c | ||
13 | index XXXXXXX..XXXXXXX 100644 | ||
14 | --- a/hw/intc/armv7m_nvic.c | ||
15 | +++ b/hw/intc/armv7m_nvic.c | ||
16 | @@ -XXX,XX +XXX,XX @@ static uint32_t nvic_readl(NVICState *s, uint32_t offset, MemTxAttrs attrs) | ||
17 | return 0; | ||
18 | } | ||
19 | return cpu->env.v7m.sfar; | ||
20 | + case 0xf40: /* MVFR0 */ | ||
21 | + return cpu->isar.mvfr0; | ||
22 | + case 0xf44: /* MVFR1 */ | ||
23 | + return cpu->isar.mvfr1; | ||
24 | + case 0xf48: /* MVFR2 */ | ||
25 | + return cpu->isar.mvfr2; | ||
26 | default: | ||
27 | bad_offset: | ||
28 | qemu_log_mask(LOG_GUEST_ERROR, "NVIC: Bad read offset 0x%x\n", offset); | ||
29 | -- | ||
30 | 2.20.1 | ||
31 | |||
32 | diff view generated by jsdifflib |
1 | The magic value pushed onto the callee stack as an integrity | 1 | Optimize the MVE VMVN insn by using TCG vector ops when possible. |
---|---|---|---|
2 | check is different if floating point is present. | ||
3 | 2 | ||
4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 3 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
5 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
6 | Message-id: 20190416125744.27770-15-peter.maydell@linaro.org | 5 | Message-id: 20210913095440.13462-9-peter.maydell@linaro.org |
7 | --- | 6 | --- |
8 | target/arm/helper.c | 22 +++++++++++++++++++--- | 7 | target/arm/translate-mve.c | 2 +- |
9 | 1 file changed, 19 insertions(+), 3 deletions(-) | 8 | 1 file changed, 1 insertion(+), 1 deletion(-) |
10 | 9 | ||
11 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 10 | diff --git a/target/arm/translate-mve.c b/target/arm/translate-mve.c |
12 | index XXXXXXX..XXXXXXX 100644 | 11 | index XXXXXXX..XXXXXXX 100644 |
13 | --- a/target/arm/helper.c | 12 | --- a/target/arm/translate-mve.c |
14 | +++ b/target/arm/helper.c | 13 | +++ b/target/arm/translate-mve.c |
15 | @@ -XXX,XX +XXX,XX @@ load_fail: | 14 | @@ -XXX,XX +XXX,XX @@ static bool trans_VREV64(DisasContext *s, arg_1op *a) |
16 | return false; | 15 | |
16 | static bool trans_VMVN(DisasContext *s, arg_1op *a) | ||
17 | { | ||
18 | - return do_1op(s, a, gen_helper_mve_vmvn); | ||
19 | + return do_1op_vec(s, a, gen_helper_mve_vmvn, tcg_gen_gvec_not); | ||
17 | } | 20 | } |
18 | 21 | ||
19 | +static uint32_t v7m_integrity_sig(CPUARMState *env, uint32_t lr) | 22 | static bool trans_VABS_fp(DisasContext *s, arg_1op *a) |
20 | +{ | ||
21 | + /* | ||
22 | + * Return the integrity signature value for the callee-saves | ||
23 | + * stack frame section. @lr is the exception return payload/LR value | ||
24 | + * whose FType bit forms bit 0 of the signature if FP is present. | ||
25 | + */ | ||
26 | + uint32_t sig = 0xfefa125a; | ||
27 | + | ||
28 | + if (!arm_feature(env, ARM_FEATURE_VFP) || (lr & R_V7M_EXCRET_FTYPE_MASK)) { | ||
29 | + sig |= 1; | ||
30 | + } | ||
31 | + return sig; | ||
32 | +} | ||
33 | + | ||
34 | static bool v7m_push_callee_stack(ARMCPU *cpu, uint32_t lr, bool dotailchain, | ||
35 | bool ignore_faults) | ||
36 | { | ||
37 | @@ -XXX,XX +XXX,XX @@ static bool v7m_push_callee_stack(ARMCPU *cpu, uint32_t lr, bool dotailchain, | ||
38 | bool stacked_ok; | ||
39 | uint32_t limit; | ||
40 | bool want_psp; | ||
41 | + uint32_t sig; | ||
42 | |||
43 | if (dotailchain) { | ||
44 | bool mode = lr & R_V7M_EXCRET_MODE_MASK; | ||
45 | @@ -XXX,XX +XXX,XX @@ static bool v7m_push_callee_stack(ARMCPU *cpu, uint32_t lr, bool dotailchain, | ||
46 | /* Write as much of the stack frame as we can. A write failure may | ||
47 | * cause us to pend a derived exception. | ||
48 | */ | ||
49 | + sig = v7m_integrity_sig(env, lr); | ||
50 | stacked_ok = | ||
51 | - v7m_stack_write(cpu, frameptr, 0xfefa125b, mmu_idx, ignore_faults) && | ||
52 | + v7m_stack_write(cpu, frameptr, sig, mmu_idx, ignore_faults) && | ||
53 | v7m_stack_write(cpu, frameptr + 0x8, env->regs[4], mmu_idx, | ||
54 | ignore_faults) && | ||
55 | v7m_stack_write(cpu, frameptr + 0xc, env->regs[5], mmu_idx, | ||
56 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
57 | if (return_to_secure && | ||
58 | ((excret & R_V7M_EXCRET_ES_MASK) == 0 || | ||
59 | (excret & R_V7M_EXCRET_DCRS_MASK) == 0)) { | ||
60 | - uint32_t expected_sig = 0xfefa125b; | ||
61 | uint32_t actual_sig; | ||
62 | |||
63 | pop_ok = v7m_stack_read(cpu, &actual_sig, frameptr, mmu_idx); | ||
64 | |||
65 | - if (pop_ok && expected_sig != actual_sig) { | ||
66 | + if (pop_ok && v7m_integrity_sig(env, excret) != actual_sig) { | ||
67 | /* Take a SecureFault on the current stack */ | ||
68 | env->v7m.sfsr |= R_V7M_SFSR_INVIS_MASK; | ||
69 | armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_SECURE, false); | ||
70 | -- | 23 | -- |
71 | 2.20.1 | 24 | 2.20.1 |
72 | 25 | ||
73 | 26 | diff view generated by jsdifflib |
1 | The M-profile architecture floating point system supports | 1 | Optimize the MVE VSHL and VSHR immediate forms by using TCG vector |
---|---|---|---|
2 | lazy FP state preservation, where FP registers are not | 2 | ops when possible. |
3 | pushed to the stack when an exception occurs but are instead | ||
4 | only saved if and when the first FP instruction in the exception | ||
5 | handler is executed. Implement this in QEMU, corresponding | ||
6 | to the check of LSPACT in the pseudocode ExecuteFPCheck(). | ||
7 | 3 | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 5 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
10 | Message-id: 20190416125744.27770-24-peter.maydell@linaro.org | 6 | Message-id: 20210913095440.13462-10-peter.maydell@linaro.org |
11 | --- | 7 | --- |
12 | target/arm/cpu.h | 3 ++ | 8 | target/arm/translate-mve.c | 83 +++++++++++++++++++++++++++++--------- |
13 | target/arm/helper.h | 2 + | 9 | 1 file changed, 63 insertions(+), 20 deletions(-) |
14 | target/arm/translate.h | 1 + | ||
15 | target/arm/helper.c | 112 +++++++++++++++++++++++++++++++++++++++++ | ||
16 | target/arm/translate.c | 22 ++++++++ | ||
17 | 5 files changed, 140 insertions(+) | ||
18 | 10 | ||
19 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 11 | diff --git a/target/arm/translate-mve.c b/target/arm/translate-mve.c |
20 | index XXXXXXX..XXXXXXX 100644 | 12 | index XXXXXXX..XXXXXXX 100644 |
21 | --- a/target/arm/cpu.h | 13 | --- a/target/arm/translate-mve.c |
22 | +++ b/target/arm/cpu.h | 14 | +++ b/target/arm/translate-mve.c |
23 | @@ -XXX,XX +XXX,XX @@ | 15 | @@ -XXX,XX +XXX,XX @@ static bool trans_Vimm_1r(DisasContext *s, arg_1imm *a) |
24 | #define EXCP_NOCP 17 /* v7M NOCP UsageFault */ | 16 | return do_1imm(s, a, fn); |
25 | #define EXCP_INVSTATE 18 /* v7M INVSTATE UsageFault */ | ||
26 | #define EXCP_STKOF 19 /* v8M STKOF UsageFault */ | ||
27 | +#define EXCP_LAZYFP 20 /* v7M fault during lazy FP stacking */ | ||
28 | /* NB: add new EXCP_ defines to the array in arm_log_exception() too */ | ||
29 | |||
30 | #define ARMV7M_EXCP_RESET 1 | ||
31 | @@ -XXX,XX +XXX,XX @@ FIELD(TBFLAG_A32, NS, 6, 1) | ||
32 | FIELD(TBFLAG_A32, VFPEN, 7, 1) | ||
33 | FIELD(TBFLAG_A32, CONDEXEC, 8, 8) | ||
34 | FIELD(TBFLAG_A32, SCTLR_B, 16, 1) | ||
35 | +/* For M profile only, set if FPCCR.LSPACT is set */ | ||
36 | +FIELD(TBFLAG_A32, LSPACT, 18, 1) | ||
37 | /* For M profile only, set if we must create a new FP context */ | ||
38 | FIELD(TBFLAG_A32, NEW_FP_CTXT_NEEDED, 19, 1) | ||
39 | /* For M profile only, set if FPCCR.S does not match current security state */ | ||
40 | diff --git a/target/arm/helper.h b/target/arm/helper.h | ||
41 | index XXXXXXX..XXXXXXX 100644 | ||
42 | --- a/target/arm/helper.h | ||
43 | +++ b/target/arm/helper.h | ||
44 | @@ -XXX,XX +XXX,XX @@ DEF_HELPER_2(v7m_blxns, void, env, i32) | ||
45 | |||
46 | DEF_HELPER_3(v7m_tt, i32, env, i32, i32) | ||
47 | |||
48 | +DEF_HELPER_1(v7m_preserve_fp_state, void, env) | ||
49 | + | ||
50 | DEF_HELPER_2(v8m_stackcheck, void, env, i32) | ||
51 | |||
52 | DEF_HELPER_4(access_check_cp_reg, void, env, ptr, i32, i32) | ||
53 | diff --git a/target/arm/translate.h b/target/arm/translate.h | ||
54 | index XXXXXXX..XXXXXXX 100644 | ||
55 | --- a/target/arm/translate.h | ||
56 | +++ b/target/arm/translate.h | ||
57 | @@ -XXX,XX +XXX,XX @@ typedef struct DisasContext { | ||
58 | bool v8m_stackcheck; /* true if we need to perform v8M stack limit checks */ | ||
59 | bool v8m_fpccr_s_wrong; /* true if v8M FPCCR.S != v8m_secure */ | ||
60 | bool v7m_new_fp_ctxt_needed; /* ASPEN set but no active FP context */ | ||
61 | + bool v7m_lspact; /* FPCCR.LSPACT set */ | ||
62 | /* Immediate value in AArch32 SVC insn; must be set if is_jmp == DISAS_SWI | ||
63 | * so that top level loop can generate correct syndrome information. | ||
64 | */ | ||
65 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
66 | index XXXXXXX..XXXXXXX 100644 | ||
67 | --- a/target/arm/helper.c | ||
68 | +++ b/target/arm/helper.c | ||
69 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_blxns)(CPUARMState *env, uint32_t dest) | ||
70 | g_assert_not_reached(); | ||
71 | } | 17 | } |
72 | 18 | ||
73 | +void HELPER(v7m_preserve_fp_state)(CPUARMState *env) | 19 | -static bool do_2shift(DisasContext *s, arg_2shift *a, MVEGenTwoOpShiftFn fn, |
20 | - bool negateshift) | ||
21 | +static bool do_2shift_vec(DisasContext *s, arg_2shift *a, MVEGenTwoOpShiftFn fn, | ||
22 | + bool negateshift, GVecGen2iFn vecfn) | ||
23 | { | ||
24 | TCGv_ptr qd, qm; | ||
25 | int shift = a->shift; | ||
26 | @@ -XXX,XX +XXX,XX @@ static bool do_2shift(DisasContext *s, arg_2shift *a, MVEGenTwoOpShiftFn fn, | ||
27 | shift = -shift; | ||
28 | } | ||
29 | |||
30 | - qd = mve_qreg_ptr(a->qd); | ||
31 | - qm = mve_qreg_ptr(a->qm); | ||
32 | - fn(cpu_env, qd, qm, tcg_constant_i32(shift)); | ||
33 | - tcg_temp_free_ptr(qd); | ||
34 | - tcg_temp_free_ptr(qm); | ||
35 | + if (vecfn && mve_no_predication(s)) { | ||
36 | + vecfn(a->size, mve_qreg_offset(a->qd), mve_qreg_offset(a->qm), | ||
37 | + shift, 16, 16); | ||
38 | + } else { | ||
39 | + qd = mve_qreg_ptr(a->qd); | ||
40 | + qm = mve_qreg_ptr(a->qm); | ||
41 | + fn(cpu_env, qd, qm, tcg_constant_i32(shift)); | ||
42 | + tcg_temp_free_ptr(qd); | ||
43 | + tcg_temp_free_ptr(qm); | ||
44 | + } | ||
45 | mve_update_eci(s); | ||
46 | return true; | ||
47 | } | ||
48 | |||
49 | -#define DO_2SHIFT(INSN, FN, NEGATESHIFT) \ | ||
50 | - static bool trans_##INSN(DisasContext *s, arg_2shift *a) \ | ||
51 | - { \ | ||
52 | - static MVEGenTwoOpShiftFn * const fns[] = { \ | ||
53 | - gen_helper_mve_##FN##b, \ | ||
54 | - gen_helper_mve_##FN##h, \ | ||
55 | - gen_helper_mve_##FN##w, \ | ||
56 | - NULL, \ | ||
57 | - }; \ | ||
58 | - return do_2shift(s, a, fns[a->size], NEGATESHIFT); \ | ||
59 | +static bool do_2shift(DisasContext *s, arg_2shift *a, MVEGenTwoOpShiftFn fn, | ||
60 | + bool negateshift) | ||
74 | +{ | 61 | +{ |
75 | + /* translate.c should never generate calls here in user-only mode */ | 62 | + return do_2shift_vec(s, a, fn, negateshift, NULL); |
76 | + g_assert_not_reached(); | ||
77 | +} | 63 | +} |
78 | + | 64 | + |
79 | uint32_t HELPER(v7m_tt)(CPUARMState *env, uint32_t addr, uint32_t op) | 65 | +#define DO_2SHIFT_VEC(INSN, FN, NEGATESHIFT, VECFN) \ |
80 | { | 66 | + static bool trans_##INSN(DisasContext *s, arg_2shift *a) \ |
81 | /* The TT instructions can be used by unprivileged code, but in | 67 | + { \ |
82 | @@ -XXX,XX +XXX,XX @@ pend_fault: | 68 | + static MVEGenTwoOpShiftFn * const fns[] = { \ |
83 | return false; | 69 | + gen_helper_mve_##FN##b, \ |
84 | } | 70 | + gen_helper_mve_##FN##h, \ |
85 | 71 | + gen_helper_mve_##FN##w, \ | |
86 | +void HELPER(v7m_preserve_fp_state)(CPUARMState *env) | 72 | + NULL, \ |
73 | + }; \ | ||
74 | + return do_2shift_vec(s, a, fns[a->size], NEGATESHIFT, VECFN); \ | ||
75 | } | ||
76 | |||
77 | -DO_2SHIFT(VSHLI, vshli_u, false) | ||
78 | +#define DO_2SHIFT(INSN, FN, NEGATESHIFT) \ | ||
79 | + DO_2SHIFT_VEC(INSN, FN, NEGATESHIFT, NULL) | ||
80 | + | ||
81 | +static void do_gvec_shri_s(unsigned vece, uint32_t dofs, uint32_t aofs, | ||
82 | + int64_t shift, uint32_t oprsz, uint32_t maxsz) | ||
87 | +{ | 83 | +{ |
88 | + /* | 84 | + /* |
89 | + * Preserve FP state (because LSPACT was set and we are about | 85 | + * We get here with a negated shift count, and we must handle |
90 | + * to execute an FP instruction). This corresponds to the | 86 | + * shifts by the element size, which tcg_gen_gvec_sari() does not do. |
91 | + * PreserveFPState() pseudocode. | ||
92 | + * We may throw an exception if the stacking fails. | ||
93 | + */ | 87 | + */ |
94 | + ARMCPU *cpu = arm_env_get_cpu(env); | 88 | + shift = -shift; |
95 | + bool is_secure = env->v7m.fpccr[M_REG_S] & R_V7M_FPCCR_S_MASK; | 89 | + if (shift == (8 << vece)) { |
96 | + bool negpri = !(env->v7m.fpccr[M_REG_S] & R_V7M_FPCCR_HFRDY_MASK); | 90 | + shift--; |
97 | + bool is_priv = !(env->v7m.fpccr[is_secure] & R_V7M_FPCCR_USER_MASK); | ||
98 | + bool splimviol = env->v7m.fpccr[is_secure] & R_V7M_FPCCR_SPLIMVIOL_MASK; | ||
99 | + uint32_t fpcar = env->v7m.fpcar[is_secure]; | ||
100 | + bool stacked_ok = true; | ||
101 | + bool ts = is_secure && (env->v7m.fpccr[M_REG_S] & R_V7M_FPCCR_TS_MASK); | ||
102 | + bool take_exception; | ||
103 | + | ||
104 | + /* Take the iothread lock as we are going to touch the NVIC */ | ||
105 | + qemu_mutex_lock_iothread(); | ||
106 | + | ||
107 | + /* Check the background context had access to the FPU */ | ||
108 | + if (!v7m_cpacr_pass(env, is_secure, is_priv)) { | ||
109 | + armv7m_nvic_set_pending_lazyfp(env->nvic, ARMV7M_EXCP_USAGE, is_secure); | ||
110 | + env->v7m.cfsr[is_secure] |= R_V7M_CFSR_NOCP_MASK; | ||
111 | + stacked_ok = false; | ||
112 | + } else if (!is_secure && !extract32(env->v7m.nsacr, 10, 1)) { | ||
113 | + armv7m_nvic_set_pending_lazyfp(env->nvic, ARMV7M_EXCP_USAGE, M_REG_S); | ||
114 | + env->v7m.cfsr[M_REG_S] |= R_V7M_CFSR_NOCP_MASK; | ||
115 | + stacked_ok = false; | ||
116 | + } | 91 | + } |
117 | + | 92 | + tcg_gen_gvec_sari(vece, dofs, aofs, shift, oprsz, maxsz); |
118 | + if (!splimviol && stacked_ok) { | ||
119 | + /* We only stack if the stack limit wasn't violated */ | ||
120 | + int i; | ||
121 | + ARMMMUIdx mmu_idx; | ||
122 | + | ||
123 | + mmu_idx = arm_v7m_mmu_idx_all(env, is_secure, is_priv, negpri); | ||
124 | + for (i = 0; i < (ts ? 32 : 16); i += 2) { | ||
125 | + uint64_t dn = *aa32_vfp_dreg(env, i / 2); | ||
126 | + uint32_t faddr = fpcar + 4 * i; | ||
127 | + uint32_t slo = extract64(dn, 0, 32); | ||
128 | + uint32_t shi = extract64(dn, 32, 32); | ||
129 | + | ||
130 | + if (i >= 16) { | ||
131 | + faddr += 8; /* skip the slot for the FPSCR */ | ||
132 | + } | ||
133 | + stacked_ok = stacked_ok && | ||
134 | + v7m_stack_write(cpu, faddr, slo, mmu_idx, STACK_LAZYFP) && | ||
135 | + v7m_stack_write(cpu, faddr + 4, shi, mmu_idx, STACK_LAZYFP); | ||
136 | + } | ||
137 | + | ||
138 | + stacked_ok = stacked_ok && | ||
139 | + v7m_stack_write(cpu, fpcar + 0x40, | ||
140 | + vfp_get_fpscr(env), mmu_idx, STACK_LAZYFP); | ||
141 | + } | ||
142 | + | ||
143 | + /* | ||
144 | + * We definitely pended an exception, but it's possible that it | ||
145 | + * might not be able to be taken now. If its priority permits us | ||
146 | + * to take it now, then we must not update the LSPACT or FP regs, | ||
147 | + * but instead jump out to take the exception immediately. | ||
148 | + * If it's just pending and won't be taken until the current | ||
149 | + * handler exits, then we do update LSPACT and the FP regs. | ||
150 | + */ | ||
151 | + take_exception = !stacked_ok && | ||
152 | + armv7m_nvic_can_take_pending_exception(env->nvic); | ||
153 | + | ||
154 | + qemu_mutex_unlock_iothread(); | ||
155 | + | ||
156 | + if (take_exception) { | ||
157 | + raise_exception_ra(env, EXCP_LAZYFP, 0, 1, GETPC()); | ||
158 | + } | ||
159 | + | ||
160 | + env->v7m.fpccr[is_secure] &= ~R_V7M_FPCCR_LSPACT_MASK; | ||
161 | + | ||
162 | + if (ts) { | ||
163 | + /* Clear s0 to s31 and the FPSCR */ | ||
164 | + int i; | ||
165 | + | ||
166 | + for (i = 0; i < 32; i += 2) { | ||
167 | + *aa32_vfp_dreg(env, i / 2) = 0; | ||
168 | + } | ||
169 | + vfp_set_fpscr(env, 0); | ||
170 | + } | ||
171 | + /* | ||
172 | + * Otherwise s0 to s15 and FPSCR are UNKNOWN; we choose to leave them | ||
173 | + * unchanged. | ||
174 | + */ | ||
175 | +} | 93 | +} |
176 | + | 94 | + |
177 | /* Write to v7M CONTROL.SPSEL bit for the specified security bank. | 95 | +static void do_gvec_shri_u(unsigned vece, uint32_t dofs, uint32_t aofs, |
178 | * This may change the current stack pointer between Main and Process | 96 | + int64_t shift, uint32_t oprsz, uint32_t maxsz) |
179 | * stack pointers if it is done for the CONTROL register for the current | 97 | +{ |
180 | @@ -XXX,XX +XXX,XX @@ static void arm_log_exception(int idx) | 98 | + /* |
181 | [EXCP_NOCP] = "v7M NOCP UsageFault", | 99 | + * We get here with a negated shift count, and we must handle |
182 | [EXCP_INVSTATE] = "v7M INVSTATE UsageFault", | 100 | + * shifts by the element size, which tcg_gen_gvec_shri() does not do. |
183 | [EXCP_STKOF] = "v8M STKOF UsageFault", | 101 | + */ |
184 | + [EXCP_LAZYFP] = "v7M exception during lazy FP stacking", | 102 | + shift = -shift; |
185 | }; | 103 | + if (shift == (8 << vece)) { |
186 | 104 | + tcg_gen_gvec_dup_imm(vece, dofs, oprsz, maxsz, 0); | |
187 | if (idx >= 0 && idx < ARRAY_SIZE(excnames)) { | 105 | + } else { |
188 | @@ -XXX,XX +XXX,XX @@ void arm_v7m_cpu_do_interrupt(CPUState *cs) | 106 | + tcg_gen_gvec_shri(vece, dofs, aofs, shift, oprsz, maxsz); |
189 | return; | 107 | + } |
190 | } | 108 | +} |
191 | break; | ||
192 | + case EXCP_LAZYFP: | ||
193 | + /* | ||
194 | + * We already pended the specific exception in the NVIC in the | ||
195 | + * v7m_preserve_fp_state() helper function. | ||
196 | + */ | ||
197 | + break; | ||
198 | default: | ||
199 | cpu_abort(cs, "Unhandled exception 0x%x\n", cs->exception_index); | ||
200 | return; /* Never happens. Keep compiler happy. */ | ||
201 | @@ -XXX,XX +XXX,XX @@ void cpu_get_tb_cpu_state(CPUARMState *env, target_ulong *pc, | ||
202 | flags = FIELD_DP32(flags, TBFLAG_A32, NEW_FP_CTXT_NEEDED, 1); | ||
203 | } | ||
204 | |||
205 | + if (arm_feature(env, ARM_FEATURE_M)) { | ||
206 | + bool is_secure = env->v7m.fpccr[M_REG_S] & R_V7M_FPCCR_S_MASK; | ||
207 | + | 109 | + |
208 | + if (env->v7m.fpccr[is_secure] & R_V7M_FPCCR_LSPACT_MASK) { | 110 | +DO_2SHIFT_VEC(VSHLI, vshli_u, false, tcg_gen_gvec_shli) |
209 | + flags = FIELD_DP32(flags, TBFLAG_A32, LSPACT, 1); | 111 | DO_2SHIFT(VQSHLI_S, vqshli_s, false) |
210 | + } | 112 | DO_2SHIFT(VQSHLI_U, vqshli_u, false) |
211 | + } | 113 | DO_2SHIFT(VQSHLUI, vqshlui_s, false) |
212 | + | 114 | /* These right shifts use a left-shift helper with negated shift count */ |
213 | *pflags = flags; | 115 | -DO_2SHIFT(VSHRI_S, vshli_s, true) |
214 | *cs_base = 0; | 116 | -DO_2SHIFT(VSHRI_U, vshli_u, true) |
215 | } | 117 | +DO_2SHIFT_VEC(VSHRI_S, vshli_s, true, do_gvec_shri_s) |
216 | diff --git a/target/arm/translate.c b/target/arm/translate.c | 118 | +DO_2SHIFT_VEC(VSHRI_U, vshli_u, true, do_gvec_shri_u) |
217 | index XXXXXXX..XXXXXXX 100644 | 119 | DO_2SHIFT(VRSHRI_S, vrshli_s, true) |
218 | --- a/target/arm/translate.c | 120 | DO_2SHIFT(VRSHRI_U, vrshli_u, true) |
219 | +++ b/target/arm/translate.c | ||
220 | @@ -XXX,XX +XXX,XX @@ static int disas_vfp_insn(DisasContext *s, uint32_t insn) | ||
221 | if (arm_dc_feature(s, ARM_FEATURE_M)) { | ||
222 | /* Handle M-profile lazy FP state mechanics */ | ||
223 | |||
224 | + /* Trigger lazy-state preservation if necessary */ | ||
225 | + if (s->v7m_lspact) { | ||
226 | + /* | ||
227 | + * Lazy state saving affects external memory and also the NVIC, | ||
228 | + * so we must mark it as an IO operation for icount. | ||
229 | + */ | ||
230 | + if (tb_cflags(s->base.tb) & CF_USE_ICOUNT) { | ||
231 | + gen_io_start(); | ||
232 | + } | ||
233 | + gen_helper_v7m_preserve_fp_state(cpu_env); | ||
234 | + if (tb_cflags(s->base.tb) & CF_USE_ICOUNT) { | ||
235 | + gen_io_end(); | ||
236 | + } | ||
237 | + /* | ||
238 | + * If the preserve_fp_state helper doesn't throw an exception | ||
239 | + * then it will clear LSPACT; we don't need to repeat this for | ||
240 | + * any further FP insns in this TB. | ||
241 | + */ | ||
242 | + s->v7m_lspact = false; | ||
243 | + } | ||
244 | + | ||
245 | /* Update ownership of FP context: set FPCCR.S to match current state */ | ||
246 | if (s->v8m_fpccr_s_wrong) { | ||
247 | TCGv_i32 tmp; | ||
248 | @@ -XXX,XX +XXX,XX @@ static void arm_tr_init_disas_context(DisasContextBase *dcbase, CPUState *cs) | ||
249 | dc->v8m_fpccr_s_wrong = FIELD_EX32(tb_flags, TBFLAG_A32, FPCCR_S_WRONG); | ||
250 | dc->v7m_new_fp_ctxt_needed = | ||
251 | FIELD_EX32(tb_flags, TBFLAG_A32, NEW_FP_CTXT_NEEDED); | ||
252 | + dc->v7m_lspact = FIELD_EX32(tb_flags, TBFLAG_A32, LSPACT); | ||
253 | dc->cp_regs = cpu->cp_regs; | ||
254 | dc->features = env->features; | ||
255 | 121 | ||
256 | -- | 122 | -- |
257 | 2.20.1 | 123 | 2.20.1 |
258 | 124 | ||
259 | 125 | diff view generated by jsdifflib |
1 | Like AArch64, M-profile floating point has no FPEXC enable | 1 | Optimize the MVE VSHLL insns by using TCG vector ops when possible. |
---|---|---|---|
2 | bit to gate floating point; so always set the VFPEN TB flag. | 2 | This includes the VMOVL insn, which we handle in mve.decode as "VSHLL |
3 | 3 | with zero shift count". | |
4 | M-profile also has CPACR and NSACR similar to A-profile; | ||
5 | they behave slightly differently: | ||
6 | * the CPACR is banked between Secure and Non-Secure | ||
7 | * if the NSACR forces a trap then this is taken to | ||
8 | the Secure state, not the Non-Secure state | ||
9 | |||
10 | Honour the CPACR and NSACR settings. The NSACR handling | ||
11 | requires us to borrow the exception.target_el field | ||
12 | (usually meaningless for M profile) to distinguish the | ||
13 | NOCP UsageFault taken to Secure state from the more | ||
14 | usual fault taken to the current security state. | ||
15 | 4 | ||
16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
17 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
18 | Message-id: 20190416125744.27770-6-peter.maydell@linaro.org | 7 | Message-id: 20210913095440.13462-11-peter.maydell@linaro.org |
19 | --- | 8 | --- |
20 | target/arm/helper.c | 55 +++++++++++++++++++++++++++++++++++++++--- | 9 | target/arm/translate-mve.c | 67 +++++++++++++++++++++++++++++++++----- |
21 | target/arm/translate.c | 10 ++++++-- | 10 | 1 file changed, 59 insertions(+), 8 deletions(-) |
22 | 2 files changed, 60 insertions(+), 5 deletions(-) | ||
23 | 11 | ||
24 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 12 | diff --git a/target/arm/translate-mve.c b/target/arm/translate-mve.c |
25 | index XXXXXXX..XXXXXXX 100644 | 13 | index XXXXXXX..XXXXXXX 100644 |
26 | --- a/target/arm/helper.c | 14 | --- a/target/arm/translate-mve.c |
27 | +++ b/target/arm/helper.c | 15 | +++ b/target/arm/translate-mve.c |
28 | @@ -XXX,XX +XXX,XX @@ uint32_t arm_phys_excp_target_el(CPUState *cs, uint32_t excp_idx, | 16 | @@ -XXX,XX +XXX,XX @@ DO_2SHIFT_SCALAR(VQSHL_U_scalar, vqshli_u) |
29 | return target_el; | 17 | DO_2SHIFT_SCALAR(VQRSHL_S_scalar, vqrshli_s) |
30 | } | 18 | DO_2SHIFT_SCALAR(VQRSHL_U_scalar, vqrshli_u) |
19 | |||
20 | -#define DO_VSHLL(INSN, FN) \ | ||
21 | - static bool trans_##INSN(DisasContext *s, arg_2shift *a) \ | ||
22 | - { \ | ||
23 | - static MVEGenTwoOpShiftFn * const fns[] = { \ | ||
24 | - gen_helper_mve_##FN##b, \ | ||
25 | - gen_helper_mve_##FN##h, \ | ||
26 | - }; \ | ||
27 | - return do_2shift(s, a, fns[a->size], false); \ | ||
28 | +#define DO_VSHLL(INSN, FN) \ | ||
29 | + static bool trans_##INSN(DisasContext *s, arg_2shift *a) \ | ||
30 | + { \ | ||
31 | + static MVEGenTwoOpShiftFn * const fns[] = { \ | ||
32 | + gen_helper_mve_##FN##b, \ | ||
33 | + gen_helper_mve_##FN##h, \ | ||
34 | + }; \ | ||
35 | + return do_2shift_vec(s, a, fns[a->size], false, do_gvec_##FN); \ | ||
36 | } | ||
31 | 37 | ||
32 | +/* | 38 | +/* |
33 | + * Return true if the v7M CPACR permits access to the FPU for the specified | 39 | + * For the VSHLL vector helpers, the vece is the size of the input |
34 | + * security state and privilege level. | 40 | + * (ie MO_8 or MO_16); the helpers want to work in the output size. |
41 | + * The shift count can be 0..<input size>, inclusive. (0 is VMOVL.) | ||
35 | + */ | 42 | + */ |
36 | +static bool v7m_cpacr_pass(CPUARMState *env, bool is_secure, bool is_priv) | 43 | +static void do_gvec_vshllbs(unsigned vece, uint32_t dofs, uint32_t aofs, |
44 | + int64_t shift, uint32_t oprsz, uint32_t maxsz) | ||
37 | +{ | 45 | +{ |
38 | + switch (extract32(env->v7m.cpacr[is_secure], 20, 2)) { | 46 | + unsigned ovece = vece + 1; |
39 | + case 0: | 47 | + unsigned ibits = vece == MO_8 ? 8 : 16; |
40 | + case 2: /* UNPREDICTABLE: we treat like 0 */ | 48 | + tcg_gen_gvec_shli(ovece, dofs, aofs, ibits, oprsz, maxsz); |
41 | + return false; | 49 | + tcg_gen_gvec_sari(ovece, dofs, dofs, ibits - shift, oprsz, maxsz); |
42 | + case 1: | 50 | +} |
43 | + return is_priv; | 51 | + |
44 | + case 3: | 52 | +static void do_gvec_vshllbu(unsigned vece, uint32_t dofs, uint32_t aofs, |
45 | + return true; | 53 | + int64_t shift, uint32_t oprsz, uint32_t maxsz) |
46 | + default: | 54 | +{ |
47 | + g_assert_not_reached(); | 55 | + unsigned ovece = vece + 1; |
56 | + tcg_gen_gvec_andi(ovece, dofs, aofs, | ||
57 | + ovece == MO_16 ? 0xff : 0xffff, oprsz, maxsz); | ||
58 | + tcg_gen_gvec_shli(ovece, dofs, dofs, shift, oprsz, maxsz); | ||
59 | +} | ||
60 | + | ||
61 | +static void do_gvec_vshllts(unsigned vece, uint32_t dofs, uint32_t aofs, | ||
62 | + int64_t shift, uint32_t oprsz, uint32_t maxsz) | ||
63 | +{ | ||
64 | + unsigned ovece = vece + 1; | ||
65 | + unsigned ibits = vece == MO_8 ? 8 : 16; | ||
66 | + if (shift == 0) { | ||
67 | + tcg_gen_gvec_sari(ovece, dofs, aofs, ibits, oprsz, maxsz); | ||
68 | + } else { | ||
69 | + tcg_gen_gvec_andi(ovece, dofs, aofs, | ||
70 | + ovece == MO_16 ? 0xff00 : 0xffff0000, oprsz, maxsz); | ||
71 | + tcg_gen_gvec_sari(ovece, dofs, dofs, ibits - shift, oprsz, maxsz); | ||
48 | + } | 72 | + } |
49 | +} | 73 | +} |
50 | + | 74 | + |
51 | static bool v7m_stack_write(ARMCPU *cpu, uint32_t addr, uint32_t value, | 75 | +static void do_gvec_vshlltu(unsigned vece, uint32_t dofs, uint32_t aofs, |
52 | ARMMMUIdx mmu_idx, bool ignfault) | 76 | + int64_t shift, uint32_t oprsz, uint32_t maxsz) |
53 | { | 77 | +{ |
54 | @@ -XXX,XX +XXX,XX @@ void arm_v7m_cpu_do_interrupt(CPUState *cs) | 78 | + unsigned ovece = vece + 1; |
55 | env->v7m.cfsr[env->v7m.secure] |= R_V7M_CFSR_UNDEFINSTR_MASK; | 79 | + unsigned ibits = vece == MO_8 ? 8 : 16; |
56 | break; | 80 | + if (shift == 0) { |
57 | case EXCP_NOCP: | 81 | + tcg_gen_gvec_shri(ovece, dofs, aofs, ibits, oprsz, maxsz); |
58 | - armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE, env->v7m.secure); | 82 | + } else { |
59 | - env->v7m.cfsr[env->v7m.secure] |= R_V7M_CFSR_NOCP_MASK; | 83 | + tcg_gen_gvec_andi(ovece, dofs, aofs, |
60 | + { | 84 | + ovece == MO_16 ? 0xff00 : 0xffff0000, oprsz, maxsz); |
61 | + /* | 85 | + tcg_gen_gvec_shri(ovece, dofs, dofs, ibits - shift, oprsz, maxsz); |
62 | + * NOCP might be directed to something other than the current | 86 | + } |
63 | + * security state if this fault is because of NSACR; we indicate | 87 | +} |
64 | + * the target security state using exception.target_el. | ||
65 | + */ | ||
66 | + int target_secstate; | ||
67 | + | 88 | + |
68 | + if (env->exception.target_el == 3) { | 89 | DO_VSHLL(VSHLL_BS, vshllbs) |
69 | + target_secstate = M_REG_S; | 90 | DO_VSHLL(VSHLL_BU, vshllbu) |
70 | + } else { | 91 | DO_VSHLL(VSHLL_TS, vshllts) |
71 | + target_secstate = env->v7m.secure; | ||
72 | + } | ||
73 | + armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE, target_secstate); | ||
74 | + env->v7m.cfsr[target_secstate] |= R_V7M_CFSR_NOCP_MASK; | ||
75 | break; | ||
76 | + } | ||
77 | case EXCP_INVSTATE: | ||
78 | armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE, env->v7m.secure); | ||
79 | env->v7m.cfsr[env->v7m.secure] |= R_V7M_CFSR_INVSTATE_MASK; | ||
80 | @@ -XXX,XX +XXX,XX @@ int fp_exception_el(CPUARMState *env, int cur_el) | ||
81 | return 0; | ||
82 | } | ||
83 | |||
84 | + if (arm_feature(env, ARM_FEATURE_M)) { | ||
85 | + /* CPACR can cause a NOCP UsageFault taken to current security state */ | ||
86 | + if (!v7m_cpacr_pass(env, env->v7m.secure, cur_el != 0)) { | ||
87 | + return 1; | ||
88 | + } | ||
89 | + | ||
90 | + if (arm_feature(env, ARM_FEATURE_M_SECURITY) && !env->v7m.secure) { | ||
91 | + if (!extract32(env->v7m.nsacr, 10, 1)) { | ||
92 | + /* FP insns cause a NOCP UsageFault taken to Secure */ | ||
93 | + return 3; | ||
94 | + } | ||
95 | + } | ||
96 | + | ||
97 | + return 0; | ||
98 | + } | ||
99 | + | ||
100 | /* The CPACR controls traps to EL1, or PL1 if we're 32 bit: | ||
101 | * 0, 2 : trap EL0 and EL1/PL1 accesses | ||
102 | * 1 : trap only EL0 accesses | ||
103 | @@ -XXX,XX +XXX,XX @@ void cpu_get_tb_cpu_state(CPUARMState *env, target_ulong *pc, | ||
104 | flags = FIELD_DP32(flags, TBFLAG_A32, SCTLR_B, arm_sctlr_b(env)); | ||
105 | flags = FIELD_DP32(flags, TBFLAG_A32, NS, !access_secure_reg(env)); | ||
106 | if (env->vfp.xregs[ARM_VFP_FPEXC] & (1 << 30) | ||
107 | - || arm_el_is_aa64(env, 1)) { | ||
108 | + || arm_el_is_aa64(env, 1) || arm_feature(env, ARM_FEATURE_M)) { | ||
109 | flags = FIELD_DP32(flags, TBFLAG_A32, VFPEN, 1); | ||
110 | } | ||
111 | flags = FIELD_DP32(flags, TBFLAG_A32, XSCALE_CPAR, env->cp15.c15_cpar); | ||
112 | diff --git a/target/arm/translate.c b/target/arm/translate.c | ||
113 | index XXXXXXX..XXXXXXX 100644 | ||
114 | --- a/target/arm/translate.c | ||
115 | +++ b/target/arm/translate.c | ||
116 | @@ -XXX,XX +XXX,XX @@ static int disas_vfp_insn(DisasContext *s, uint32_t insn) | ||
117 | * for attempts to execute invalid vfp/neon encodings with FP disabled. | ||
118 | */ | ||
119 | if (s->fp_excp_el) { | ||
120 | - gen_exception_insn(s, 4, EXCP_UDEF, | ||
121 | - syn_fp_access_trap(1, 0xe, false), s->fp_excp_el); | ||
122 | + if (arm_dc_feature(s, ARM_FEATURE_M)) { | ||
123 | + gen_exception_insn(s, 4, EXCP_NOCP, syn_uncategorized(), | ||
124 | + s->fp_excp_el); | ||
125 | + } else { | ||
126 | + gen_exception_insn(s, 4, EXCP_UDEF, | ||
127 | + syn_fp_access_trap(1, 0xe, false), | ||
128 | + s->fp_excp_el); | ||
129 | + } | ||
130 | return 0; | ||
131 | } | ||
132 | |||
133 | -- | 92 | -- |
134 | 2.20.1 | 93 | 2.20.1 |
135 | 94 | ||
136 | 95 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Correct the decode of the M-profile "coprocessor and | ||
2 | floating-point instructions" space: | ||
3 | * op0 == 0b11 is always unallocated | ||
4 | * if the CPU has an FPU then all insns with op1 == 0b101 | ||
5 | are floating point and go to disas_vfp_insn() | ||
6 | 1 | ||
7 | For the moment we leave VLLDM and VLSTM as NOPs; in | ||
8 | a later commit we will fill in the proper implementation | ||
9 | for the case where an FPU is present. | ||
10 | |||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
13 | Message-id: 20190416125744.27770-7-peter.maydell@linaro.org | ||
14 | --- | ||
15 | target/arm/translate.c | 26 ++++++++++++++++++++++---- | ||
16 | 1 file changed, 22 insertions(+), 4 deletions(-) | ||
17 | |||
18 | diff --git a/target/arm/translate.c b/target/arm/translate.c | ||
19 | index XXXXXXX..XXXXXXX 100644 | ||
20 | --- a/target/arm/translate.c | ||
21 | +++ b/target/arm/translate.c | ||
22 | @@ -XXX,XX +XXX,XX @@ static void disas_thumb2_insn(DisasContext *s, uint32_t insn) | ||
23 | case 6: case 7: case 14: case 15: | ||
24 | /* Coprocessor. */ | ||
25 | if (arm_dc_feature(s, ARM_FEATURE_M)) { | ||
26 | - /* We don't currently implement M profile FP support, | ||
27 | - * so this entire space should give a NOCP fault, with | ||
28 | - * the exception of the v8M VLLDM and VLSTM insns, which | ||
29 | - * must be NOPs in Secure state and UNDEF in Nonsecure state. | ||
30 | + /* 0b111x_11xx_xxxx_xxxx_xxxx_xxxx_xxxx_xxxx */ | ||
31 | + if (extract32(insn, 24, 2) == 3) { | ||
32 | + goto illegal_op; /* op0 = 0b11 : unallocated */ | ||
33 | + } | ||
34 | + | ||
35 | + /* | ||
36 | + * Decode VLLDM and VLSTM first: these are nonstandard because: | ||
37 | + * * if there is no FPU then these insns must NOP in | ||
38 | + * Secure state and UNDEF in Nonsecure state | ||
39 | + * * if there is an FPU then these insns do not have | ||
40 | + * the usual behaviour that disas_vfp_insn() provides of | ||
41 | + * being controlled by CPACR/NSACR enable bits or the | ||
42 | + * lazy-stacking logic. | ||
43 | */ | ||
44 | if (arm_dc_feature(s, ARM_FEATURE_V8) && | ||
45 | (insn & 0xffa00f00) == 0xec200a00) { | ||
46 | @@ -XXX,XX +XXX,XX @@ static void disas_thumb2_insn(DisasContext *s, uint32_t insn) | ||
47 | /* Just NOP since FP support is not implemented */ | ||
48 | break; | ||
49 | } | ||
50 | + if (arm_dc_feature(s, ARM_FEATURE_VFP) && | ||
51 | + ((insn >> 8) & 0xe) == 10) { | ||
52 | + /* FP, and the CPU supports it */ | ||
53 | + if (disas_vfp_insn(s, insn)) { | ||
54 | + goto illegal_op; | ||
55 | + } | ||
56 | + break; | ||
57 | + } | ||
58 | + | ||
59 | /* All other insns: NOCP */ | ||
60 | gen_exception_insn(s, 4, EXCP_NOCP, syn_uncategorized(), | ||
61 | default_exception_el(s)); | ||
62 | -- | ||
63 | 2.20.1 | ||
64 | |||
65 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | If the floating point extension is present, then the SG instruction | ||
2 | must clear the CONTROL_S.SFPA bit. Implement this. | ||
3 | 1 | ||
4 | (On a no-FPU system the bit will always be zero, so we don't need | ||
5 | to make the clearing of the bit conditional on ARM_FEATURE_VFP.) | ||
6 | |||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Message-id: 20190416125744.27770-8-peter.maydell@linaro.org | ||
10 | --- | ||
11 | target/arm/helper.c | 1 + | ||
12 | 1 file changed, 1 insertion(+) | ||
13 | |||
14 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/target/arm/helper.c | ||
17 | +++ b/target/arm/helper.c | ||
18 | @@ -XXX,XX +XXX,XX @@ static bool v7m_handle_execute_nsc(ARMCPU *cpu) | ||
19 | qemu_log_mask(CPU_LOG_INT, "...really an SG instruction at 0x%08" PRIx32 | ||
20 | ", executing it\n", env->regs[15]); | ||
21 | env->regs[14] &= ~1; | ||
22 | + env->v7m.control[M_REG_S] &= ~R_V7M_CONTROL_SFPA_MASK; | ||
23 | switch_v7m_security_state(env, true); | ||
24 | xpsr_write(env, 0, XPSR_IT); | ||
25 | env->regs[15] += 4; | ||
26 | -- | ||
27 | 2.20.1 | ||
28 | |||
29 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | The M-profile CONTROL register has two bits -- SFPA and FPCA -- | ||
2 | which relate to floating-point support, and should be RES0 otherwise. | ||
3 | Handle them correctly in the MSR/MRS register access code. | ||
4 | Neither is banked between security states, so they are stored | ||
5 | in v7m.control[M_REG_S] regardless of current security state. | ||
6 | 1 | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Message-id: 20190416125744.27770-9-peter.maydell@linaro.org | ||
10 | --- | ||
11 | target/arm/helper.c | 57 ++++++++++++++++++++++++++++++++++++++------- | ||
12 | 1 file changed, 49 insertions(+), 8 deletions(-) | ||
13 | |||
14 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/target/arm/helper.c | ||
17 | +++ b/target/arm/helper.c | ||
18 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(v7m_mrs)(CPUARMState *env, uint32_t reg) | ||
19 | return xpsr_read(env) & mask; | ||
20 | break; | ||
21 | case 20: /* CONTROL */ | ||
22 | - return env->v7m.control[env->v7m.secure]; | ||
23 | + { | ||
24 | + uint32_t value = env->v7m.control[env->v7m.secure]; | ||
25 | + if (!env->v7m.secure) { | ||
26 | + /* SFPA is RAZ/WI from NS; FPCA is stored in the M_REG_S bank */ | ||
27 | + value |= env->v7m.control[M_REG_S] & R_V7M_CONTROL_FPCA_MASK; | ||
28 | + } | ||
29 | + return value; | ||
30 | + } | ||
31 | case 0x94: /* CONTROL_NS */ | ||
32 | /* We have to handle this here because unprivileged Secure code | ||
33 | * can read the NS CONTROL register. | ||
34 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(v7m_mrs)(CPUARMState *env, uint32_t reg) | ||
35 | if (!env->v7m.secure) { | ||
36 | return 0; | ||
37 | } | ||
38 | - return env->v7m.control[M_REG_NS]; | ||
39 | + return env->v7m.control[M_REG_NS] | | ||
40 | + (env->v7m.control[M_REG_S] & R_V7M_CONTROL_FPCA_MASK); | ||
41 | } | ||
42 | |||
43 | if (el == 0) { | ||
44 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_msr)(CPUARMState *env, uint32_t maskreg, uint32_t val) | ||
45 | */ | ||
46 | uint32_t mask = extract32(maskreg, 8, 4); | ||
47 | uint32_t reg = extract32(maskreg, 0, 8); | ||
48 | + int cur_el = arm_current_el(env); | ||
49 | |||
50 | - if (arm_current_el(env) == 0 && reg > 7) { | ||
51 | - /* only xPSR sub-fields may be written by unprivileged */ | ||
52 | + if (cur_el == 0 && reg > 7 && reg != 20) { | ||
53 | + /* | ||
54 | + * only xPSR sub-fields and CONTROL.SFPA may be written by | ||
55 | + * unprivileged code | ||
56 | + */ | ||
57 | return; | ||
58 | } | ||
59 | |||
60 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_msr)(CPUARMState *env, uint32_t maskreg, uint32_t val) | ||
61 | env->v7m.control[M_REG_NS] &= ~R_V7M_CONTROL_NPRIV_MASK; | ||
62 | env->v7m.control[M_REG_NS] |= val & R_V7M_CONTROL_NPRIV_MASK; | ||
63 | } | ||
64 | + /* | ||
65 | + * SFPA is RAZ/WI from NS. FPCA is RO if NSACR.CP10 == 0, | ||
66 | + * RES0 if the FPU is not present, and is stored in the S bank | ||
67 | + */ | ||
68 | + if (arm_feature(env, ARM_FEATURE_VFP) && | ||
69 | + extract32(env->v7m.nsacr, 10, 1)) { | ||
70 | + env->v7m.control[M_REG_S] &= ~R_V7M_CONTROL_FPCA_MASK; | ||
71 | + env->v7m.control[M_REG_S] |= val & R_V7M_CONTROL_FPCA_MASK; | ||
72 | + } | ||
73 | return; | ||
74 | case 0x98: /* SP_NS */ | ||
75 | { | ||
76 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_msr)(CPUARMState *env, uint32_t maskreg, uint32_t val) | ||
77 | env->v7m.faultmask[env->v7m.secure] = val & 1; | ||
78 | break; | ||
79 | case 20: /* CONTROL */ | ||
80 | - /* Writing to the SPSEL bit only has an effect if we are in | ||
81 | + /* | ||
82 | + * Writing to the SPSEL bit only has an effect if we are in | ||
83 | * thread mode; other bits can be updated by any privileged code. | ||
84 | * write_v7m_control_spsel() deals with updating the SPSEL bit in | ||
85 | * env->v7m.control, so we only need update the others. | ||
86 | * For v7M, we must just ignore explicit writes to SPSEL in handler | ||
87 | * mode; for v8M the write is permitted but will have no effect. | ||
88 | + * All these bits are writes-ignored from non-privileged code, | ||
89 | + * except for SFPA. | ||
90 | */ | ||
91 | - if (arm_feature(env, ARM_FEATURE_V8) || | ||
92 | - !arm_v7m_is_handler_mode(env)) { | ||
93 | + if (cur_el > 0 && (arm_feature(env, ARM_FEATURE_V8) || | ||
94 | + !arm_v7m_is_handler_mode(env))) { | ||
95 | write_v7m_control_spsel(env, (val & R_V7M_CONTROL_SPSEL_MASK) != 0); | ||
96 | } | ||
97 | - if (arm_feature(env, ARM_FEATURE_M_MAIN)) { | ||
98 | + if (cur_el > 0 && arm_feature(env, ARM_FEATURE_M_MAIN)) { | ||
99 | env->v7m.control[env->v7m.secure] &= ~R_V7M_CONTROL_NPRIV_MASK; | ||
100 | env->v7m.control[env->v7m.secure] |= val & R_V7M_CONTROL_NPRIV_MASK; | ||
101 | } | ||
102 | + if (arm_feature(env, ARM_FEATURE_VFP)) { | ||
103 | + /* | ||
104 | + * SFPA is RAZ/WI from NS or if no FPU. | ||
105 | + * FPCA is RO if NSACR.CP10 == 0, RES0 if the FPU is not present. | ||
106 | + * Both are stored in the S bank. | ||
107 | + */ | ||
108 | + if (env->v7m.secure) { | ||
109 | + env->v7m.control[M_REG_S] &= ~R_V7M_CONTROL_SFPA_MASK; | ||
110 | + env->v7m.control[M_REG_S] |= val & R_V7M_CONTROL_SFPA_MASK; | ||
111 | + } | ||
112 | + if (cur_el > 0 && | ||
113 | + (env->v7m.secure || !arm_feature(env, ARM_FEATURE_M_SECURITY) || | ||
114 | + extract32(env->v7m.nsacr, 10, 1))) { | ||
115 | + env->v7m.control[M_REG_S] &= ~R_V7M_CONTROL_FPCA_MASK; | ||
116 | + env->v7m.control[M_REG_S] |= val & R_V7M_CONTROL_FPCA_MASK; | ||
117 | + } | ||
118 | + } | ||
119 | break; | ||
120 | default: | ||
121 | bad_reg: | ||
122 | -- | ||
123 | 2.20.1 | ||
124 | |||
125 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Currently the code in v7m_push_stack() which detects a violation | ||
2 | of the v8M stack limit simply returns early if it does so. This | ||
3 | is OK for the current integer-only code, but won't work for the | ||
4 | floating point handling we're about to add. We need to continue | ||
5 | executing the rest of the function so that we check for other | ||
6 | exceptions like not having permission to use the FPU and so | ||
7 | that we correctly set the FPCCR state if we are doing lazy | ||
8 | stacking. Refactor to avoid the early return. | ||
9 | 1 | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
12 | Message-id: 20190416125744.27770-10-peter.maydell@linaro.org | ||
13 | --- | ||
14 | target/arm/helper.c | 23 ++++++++++++++++++----- | ||
15 | 1 file changed, 18 insertions(+), 5 deletions(-) | ||
16 | |||
17 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
18 | index XXXXXXX..XXXXXXX 100644 | ||
19 | --- a/target/arm/helper.c | ||
20 | +++ b/target/arm/helper.c | ||
21 | @@ -XXX,XX +XXX,XX @@ static bool v7m_push_stack(ARMCPU *cpu) | ||
22 | * should ignore further stack faults trying to process | ||
23 | * that derived exception.) | ||
24 | */ | ||
25 | - bool stacked_ok; | ||
26 | + bool stacked_ok = true, limitviol = false; | ||
27 | CPUARMState *env = &cpu->env; | ||
28 | uint32_t xpsr = xpsr_read(env); | ||
29 | uint32_t frameptr = env->regs[13]; | ||
30 | @@ -XXX,XX +XXX,XX @@ static bool v7m_push_stack(ARMCPU *cpu) | ||
31 | armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE, | ||
32 | env->v7m.secure); | ||
33 | env->regs[13] = limit; | ||
34 | - return true; | ||
35 | + /* | ||
36 | + * We won't try to perform any further memory accesses but | ||
37 | + * we must continue through the following code to check for | ||
38 | + * permission faults during FPU state preservation, and we | ||
39 | + * must update FPCCR if lazy stacking is enabled. | ||
40 | + */ | ||
41 | + limitviol = true; | ||
42 | + stacked_ok = false; | ||
43 | } | ||
44 | } | ||
45 | |||
46 | @@ -XXX,XX +XXX,XX @@ static bool v7m_push_stack(ARMCPU *cpu) | ||
47 | * (which may be taken in preference to the one we started with | ||
48 | * if it has higher priority). | ||
49 | */ | ||
50 | - stacked_ok = | ||
51 | + stacked_ok = stacked_ok && | ||
52 | v7m_stack_write(cpu, frameptr, env->regs[0], mmu_idx, false) && | ||
53 | v7m_stack_write(cpu, frameptr + 4, env->regs[1], mmu_idx, false) && | ||
54 | v7m_stack_write(cpu, frameptr + 8, env->regs[2], mmu_idx, false) && | ||
55 | @@ -XXX,XX +XXX,XX @@ static bool v7m_push_stack(ARMCPU *cpu) | ||
56 | v7m_stack_write(cpu, frameptr + 24, env->regs[15], mmu_idx, false) && | ||
57 | v7m_stack_write(cpu, frameptr + 28, xpsr, mmu_idx, false); | ||
58 | |||
59 | - /* Update SP regardless of whether any of the stack accesses failed. */ | ||
60 | - env->regs[13] = frameptr; | ||
61 | + /* | ||
62 | + * If we broke a stack limit then SP was already updated earlier; | ||
63 | + * otherwise we update SP regardless of whether any of the stack | ||
64 | + * accesses failed or we took some other kind of fault. | ||
65 | + */ | ||
66 | + if (!limitviol) { | ||
67 | + env->regs[13] = frameptr; | ||
68 | + } | ||
69 | |||
70 | return !stacked_ok; | ||
71 | } | ||
72 | -- | ||
73 | 2.20.1 | ||
74 | |||
75 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Handle floating point registers in exception entry. | ||
2 | This corresponds to the FP-specific parts of the pseudocode | ||
3 | functions ActivateException() and PushStack(). | ||
4 | 1 | ||
5 | We defer the code corresponding to UpdateFPCCR() to a later patch. | ||
6 | |||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Message-id: 20190416125744.27770-11-peter.maydell@linaro.org | ||
10 | --- | ||
11 | target/arm/helper.c | 98 +++++++++++++++++++++++++++++++++++++++++++-- | ||
12 | 1 file changed, 95 insertions(+), 3 deletions(-) | ||
13 | |||
14 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/target/arm/helper.c | ||
17 | +++ b/target/arm/helper.c | ||
18 | @@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain, | ||
19 | switch_v7m_security_state(env, targets_secure); | ||
20 | write_v7m_control_spsel(env, 0); | ||
21 | arm_clear_exclusive(env); | ||
22 | + /* Clear SFPA and FPCA (has no effect if no FPU) */ | ||
23 | + env->v7m.control[M_REG_S] &= | ||
24 | + ~(R_V7M_CONTROL_FPCA_MASK | R_V7M_CONTROL_SFPA_MASK); | ||
25 | /* Clear IT bits */ | ||
26 | env->condexec_bits = 0; | ||
27 | env->regs[14] = lr; | ||
28 | @@ -XXX,XX +XXX,XX @@ static bool v7m_push_stack(ARMCPU *cpu) | ||
29 | uint32_t xpsr = xpsr_read(env); | ||
30 | uint32_t frameptr = env->regs[13]; | ||
31 | ARMMMUIdx mmu_idx = arm_mmu_idx(env); | ||
32 | + uint32_t framesize; | ||
33 | + bool nsacr_cp10 = extract32(env->v7m.nsacr, 10, 1); | ||
34 | + | ||
35 | + if ((env->v7m.control[M_REG_S] & R_V7M_CONTROL_FPCA_MASK) && | ||
36 | + (env->v7m.secure || nsacr_cp10)) { | ||
37 | + if (env->v7m.secure && | ||
38 | + env->v7m.fpccr[M_REG_S] & R_V7M_FPCCR_TS_MASK) { | ||
39 | + framesize = 0xa8; | ||
40 | + } else { | ||
41 | + framesize = 0x68; | ||
42 | + } | ||
43 | + } else { | ||
44 | + framesize = 0x20; | ||
45 | + } | ||
46 | |||
47 | /* Align stack pointer if the guest wants that */ | ||
48 | if ((frameptr & 4) && | ||
49 | @@ -XXX,XX +XXX,XX @@ static bool v7m_push_stack(ARMCPU *cpu) | ||
50 | xpsr |= XPSR_SPREALIGN; | ||
51 | } | ||
52 | |||
53 | - frameptr -= 0x20; | ||
54 | + xpsr &= ~XPSR_SFPA; | ||
55 | + if (env->v7m.secure && | ||
56 | + (env->v7m.control[M_REG_S] & R_V7M_CONTROL_SFPA_MASK)) { | ||
57 | + xpsr |= XPSR_SFPA; | ||
58 | + } | ||
59 | + | ||
60 | + frameptr -= framesize; | ||
61 | |||
62 | if (arm_feature(env, ARM_FEATURE_V8)) { | ||
63 | uint32_t limit = v7m_sp_limit(env); | ||
64 | @@ -XXX,XX +XXX,XX @@ static bool v7m_push_stack(ARMCPU *cpu) | ||
65 | v7m_stack_write(cpu, frameptr + 24, env->regs[15], mmu_idx, false) && | ||
66 | v7m_stack_write(cpu, frameptr + 28, xpsr, mmu_idx, false); | ||
67 | |||
68 | + if (env->v7m.control[M_REG_S] & R_V7M_CONTROL_FPCA_MASK) { | ||
69 | + /* FPU is active, try to save its registers */ | ||
70 | + bool fpccr_s = env->v7m.fpccr[M_REG_S] & R_V7M_FPCCR_S_MASK; | ||
71 | + bool lspact = env->v7m.fpccr[fpccr_s] & R_V7M_FPCCR_LSPACT_MASK; | ||
72 | + | ||
73 | + if (lspact && arm_feature(env, ARM_FEATURE_M_SECURITY)) { | ||
74 | + qemu_log_mask(CPU_LOG_INT, | ||
75 | + "...SecureFault because LSPACT and FPCA both set\n"); | ||
76 | + env->v7m.sfsr |= R_V7M_SFSR_LSERR_MASK; | ||
77 | + armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_SECURE, false); | ||
78 | + } else if (!env->v7m.secure && !nsacr_cp10) { | ||
79 | + qemu_log_mask(CPU_LOG_INT, | ||
80 | + "...Secure UsageFault with CFSR.NOCP because " | ||
81 | + "NSACR.CP10 prevents stacking FP regs\n"); | ||
82 | + armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE, M_REG_S); | ||
83 | + env->v7m.cfsr[M_REG_S] |= R_V7M_CFSR_NOCP_MASK; | ||
84 | + } else { | ||
85 | + if (!(env->v7m.fpccr[M_REG_S] & R_V7M_FPCCR_LSPEN_MASK)) { | ||
86 | + /* Lazy stacking disabled, save registers now */ | ||
87 | + int i; | ||
88 | + bool cpacr_pass = v7m_cpacr_pass(env, env->v7m.secure, | ||
89 | + arm_current_el(env) != 0); | ||
90 | + | ||
91 | + if (stacked_ok && !cpacr_pass) { | ||
92 | + /* | ||
93 | + * Take UsageFault if CPACR forbids access. The pseudocode | ||
94 | + * here does a full CheckCPEnabled() but we know the NSACR | ||
95 | + * check can never fail as we have already handled that. | ||
96 | + */ | ||
97 | + qemu_log_mask(CPU_LOG_INT, | ||
98 | + "...UsageFault with CFSR.NOCP because " | ||
99 | + "CPACR.CP10 prevents stacking FP regs\n"); | ||
100 | + armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE, | ||
101 | + env->v7m.secure); | ||
102 | + env->v7m.cfsr[env->v7m.secure] |= R_V7M_CFSR_NOCP_MASK; | ||
103 | + stacked_ok = false; | ||
104 | + } | ||
105 | + | ||
106 | + for (i = 0; i < ((framesize == 0xa8) ? 32 : 16); i += 2) { | ||
107 | + uint64_t dn = *aa32_vfp_dreg(env, i / 2); | ||
108 | + uint32_t faddr = frameptr + 0x20 + 4 * i; | ||
109 | + uint32_t slo = extract64(dn, 0, 32); | ||
110 | + uint32_t shi = extract64(dn, 32, 32); | ||
111 | + | ||
112 | + if (i >= 16) { | ||
113 | + faddr += 8; /* skip the slot for the FPSCR */ | ||
114 | + } | ||
115 | + stacked_ok = stacked_ok && | ||
116 | + v7m_stack_write(cpu, faddr, slo, mmu_idx, false) && | ||
117 | + v7m_stack_write(cpu, faddr + 4, shi, mmu_idx, false); | ||
118 | + } | ||
119 | + stacked_ok = stacked_ok && | ||
120 | + v7m_stack_write(cpu, frameptr + 0x60, | ||
121 | + vfp_get_fpscr(env), mmu_idx, false); | ||
122 | + if (cpacr_pass) { | ||
123 | + for (i = 0; i < ((framesize == 0xa8) ? 32 : 16); i += 2) { | ||
124 | + *aa32_vfp_dreg(env, i / 2) = 0; | ||
125 | + } | ||
126 | + vfp_set_fpscr(env, 0); | ||
127 | + } | ||
128 | + } else { | ||
129 | + /* Lazy stacking enabled, save necessary info to stack later */ | ||
130 | + /* TODO : equivalent of UpdateFPCCR() pseudocode */ | ||
131 | + } | ||
132 | + } | ||
133 | + } | ||
134 | + | ||
135 | /* | ||
136 | * If we broke a stack limit then SP was already updated earlier; | ||
137 | * otherwise we update SP regardless of whether any of the stack | ||
138 | @@ -XXX,XX +XXX,XX @@ void arm_v7m_cpu_do_interrupt(CPUState *cs) | ||
139 | |||
140 | if (arm_feature(env, ARM_FEATURE_V8)) { | ||
141 | lr = R_V7M_EXCRET_RES1_MASK | | ||
142 | - R_V7M_EXCRET_DCRS_MASK | | ||
143 | - R_V7M_EXCRET_FTYPE_MASK; | ||
144 | + R_V7M_EXCRET_DCRS_MASK; | ||
145 | /* The S bit indicates whether we should return to Secure | ||
146 | * or NonSecure (ie our current state). | ||
147 | * The ES bit indicates whether we're taking this exception | ||
148 | @@ -XXX,XX +XXX,XX @@ void arm_v7m_cpu_do_interrupt(CPUState *cs) | ||
149 | if (env->v7m.secure) { | ||
150 | lr |= R_V7M_EXCRET_S_MASK; | ||
151 | } | ||
152 | + if (!(env->v7m.control[M_REG_S] & R_V7M_CONTROL_FPCA_MASK)) { | ||
153 | + lr |= R_V7M_EXCRET_FTYPE_MASK; | ||
154 | + } | ||
155 | } else { | ||
156 | lr = R_V7M_EXCRET_RES1_MASK | | ||
157 | R_V7M_EXCRET_S_MASK | | ||
158 | -- | ||
159 | 2.20.1 | ||
160 | |||
161 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | For v8M floating point support, transitions from Secure | ||
2 | to Non-secure state via BLNS and BLXNS must clear the | ||
3 | CONTROL.SFPA bit. (This corresponds to the pseudocode | ||
4 | BranchToNS() function.) | ||
5 | 1 | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20190416125744.27770-13-peter.maydell@linaro.org | ||
9 | --- | ||
10 | target/arm/helper.c | 4 ++++ | ||
11 | 1 file changed, 4 insertions(+) | ||
12 | |||
13 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
14 | index XXXXXXX..XXXXXXX 100644 | ||
15 | --- a/target/arm/helper.c | ||
16 | +++ b/target/arm/helper.c | ||
17 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_bxns)(CPUARMState *env, uint32_t dest) | ||
18 | /* translate.c should have made BXNS UNDEF unless we're secure */ | ||
19 | assert(env->v7m.secure); | ||
20 | |||
21 | + if (!(dest & 1)) { | ||
22 | + env->v7m.control[M_REG_S] &= ~R_V7M_CONTROL_SFPA_MASK; | ||
23 | + } | ||
24 | switch_v7m_security_state(env, dest & 1); | ||
25 | env->thumb = 1; | ||
26 | env->regs[15] = dest & ~1; | ||
27 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_blxns)(CPUARMState *env, uint32_t dest) | ||
28 | */ | ||
29 | write_v7m_exception(env, 1); | ||
30 | } | ||
31 | + env->v7m.control[M_REG_S] &= ~R_V7M_CONTROL_SFPA_MASK; | ||
32 | switch_v7m_security_state(env, 0); | ||
33 | env->thumb = 1; | ||
34 | env->regs[15] = dest; | ||
35 | -- | ||
36 | 2.20.1 | ||
37 | |||
38 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Move the NS TBFLAG down from bit 19 to bit 6, which has not | ||
2 | been used since commit c1e3781090b9d36c60 in 2015, when we | ||
3 | started passing the entire MMU index in the TB flags rather | ||
4 | than just a 'privilege level' bit. | ||
5 | 1 | ||
6 | This rearrangement is not strictly necessary, but means that | ||
7 | we can put M-profile-only bits next to each other rather | ||
8 | than scattered across the flag word. | ||
9 | |||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
12 | Message-id: 20190416125744.27770-17-peter.maydell@linaro.org | ||
13 | --- | ||
14 | target/arm/cpu.h | 11 ++++++----- | ||
15 | 1 file changed, 6 insertions(+), 5 deletions(-) | ||
16 | |||
17 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
18 | index XXXXXXX..XXXXXXX 100644 | ||
19 | --- a/target/arm/cpu.h | ||
20 | +++ b/target/arm/cpu.h | ||
21 | @@ -XXX,XX +XXX,XX @@ FIELD(TBFLAG_ANY, BE_DATA, 23, 1) | ||
22 | FIELD(TBFLAG_A32, THUMB, 0, 1) | ||
23 | FIELD(TBFLAG_A32, VECLEN, 1, 3) | ||
24 | FIELD(TBFLAG_A32, VECSTRIDE, 4, 2) | ||
25 | +/* | ||
26 | + * Indicates whether cp register reads and writes by guest code should access | ||
27 | + * the secure or nonsecure bank of banked registers; note that this is not | ||
28 | + * the same thing as the current security state of the processor! | ||
29 | + */ | ||
30 | +FIELD(TBFLAG_A32, NS, 6, 1) | ||
31 | FIELD(TBFLAG_A32, VFPEN, 7, 1) | ||
32 | FIELD(TBFLAG_A32, CONDEXEC, 8, 8) | ||
33 | FIELD(TBFLAG_A32, SCTLR_B, 16, 1) | ||
34 | @@ -XXX,XX +XXX,XX @@ FIELD(TBFLAG_A32, SCTLR_B, 16, 1) | ||
35 | * checks on the other bits at runtime | ||
36 | */ | ||
37 | FIELD(TBFLAG_A32, XSCALE_CPAR, 17, 2) | ||
38 | -/* Indicates whether cp register reads and writes by guest code should access | ||
39 | - * the secure or nonsecure bank of banked registers; note that this is not | ||
40 | - * the same thing as the current security state of the processor! | ||
41 | - */ | ||
42 | -FIELD(TBFLAG_A32, NS, 19, 1) | ||
43 | /* For M profile only, Handler (ie not Thread) mode */ | ||
44 | FIELD(TBFLAG_A32, HANDLER, 21, 1) | ||
45 | /* For M profile only, whether we should generate stack-limit checks */ | ||
46 | -- | ||
47 | 2.20.1 | ||
48 | |||
49 | diff view generated by jsdifflib |
1 | Pushing registers to the stack for v7M needs to handle three cases: | 1 | Optimize the MVE shift-and-insert insns by using TCG |
---|---|---|---|
2 | * the "normal" case where we pend exceptions | 2 | vector ops when possible. |
3 | * an "ignore faults" case where we set FSR bits but | ||
4 | do not pend exceptions (this is used when we are | ||
5 | handling some kinds of derived exception on exception entry) | ||
6 | * a "lazy FP stacking" case, where different FSR bits | ||
7 | are set and the exception is pended differently | ||
8 | |||
9 | Implement this by changing the existing flag argument that | ||
10 | tells us whether to ignore faults or not into an enum that | ||
11 | specifies which of the 3 modes we should handle. | ||
12 | 3 | ||
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
14 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 5 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
15 | Message-id: 20190416125744.27770-23-peter.maydell@linaro.org | 6 | Message-id: 20210913095440.13462-12-peter.maydell@linaro.org |
16 | --- | 7 | --- |
17 | target/arm/helper.c | 118 +++++++++++++++++++++++++++++--------------- | 8 | target/arm/translate-mve.c | 4 ++-- |
18 | 1 file changed, 79 insertions(+), 39 deletions(-) | 9 | 1 file changed, 2 insertions(+), 2 deletions(-) |
19 | 10 | ||
20 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 11 | diff --git a/target/arm/translate-mve.c b/target/arm/translate-mve.c |
21 | index XXXXXXX..XXXXXXX 100644 | 12 | index XXXXXXX..XXXXXXX 100644 |
22 | --- a/target/arm/helper.c | 13 | --- a/target/arm/translate-mve.c |
23 | +++ b/target/arm/helper.c | 14 | +++ b/target/arm/translate-mve.c |
24 | @@ -XXX,XX +XXX,XX @@ static bool v7m_cpacr_pass(CPUARMState *env, bool is_secure, bool is_priv) | 15 | @@ -XXX,XX +XXX,XX @@ DO_2SHIFT_VEC(VSHRI_U, vshli_u, true, do_gvec_shri_u) |
25 | } | 16 | DO_2SHIFT(VRSHRI_S, vrshli_s, true) |
26 | } | 17 | DO_2SHIFT(VRSHRI_U, vrshli_u, true) |
27 | 18 | ||
28 | +/* | 19 | -DO_2SHIFT(VSRI, vsri, false) |
29 | + * What kind of stack write are we doing? This affects how exceptions | 20 | -DO_2SHIFT(VSLI, vsli, false) |
30 | + * generated during the stacking are treated. | 21 | +DO_2SHIFT_VEC(VSRI, vsri, false, gen_gvec_sri) |
31 | + */ | 22 | +DO_2SHIFT_VEC(VSLI, vsli, false, gen_gvec_sli) |
32 | +typedef enum StackingMode { | 23 | |
33 | + STACK_NORMAL, | 24 | #define DO_2SHIFT_FP(INSN, FN) \ |
34 | + STACK_IGNFAULTS, | 25 | static bool trans_##INSN(DisasContext *s, arg_2shift *a) \ |
35 | + STACK_LAZYFP, | ||
36 | +} StackingMode; | ||
37 | + | ||
38 | static bool v7m_stack_write(ARMCPU *cpu, uint32_t addr, uint32_t value, | ||
39 | - ARMMMUIdx mmu_idx, bool ignfault) | ||
40 | + ARMMMUIdx mmu_idx, StackingMode mode) | ||
41 | { | ||
42 | CPUState *cs = CPU(cpu); | ||
43 | CPUARMState *env = &cpu->env; | ||
44 | @@ -XXX,XX +XXX,XX @@ static bool v7m_stack_write(ARMCPU *cpu, uint32_t addr, uint32_t value, | ||
45 | &attrs, &prot, &page_size, &fi, NULL)) { | ||
46 | /* MPU/SAU lookup failed */ | ||
47 | if (fi.type == ARMFault_QEMU_SFault) { | ||
48 | - qemu_log_mask(CPU_LOG_INT, | ||
49 | - "...SecureFault with SFSR.AUVIOL during stacking\n"); | ||
50 | - env->v7m.sfsr |= R_V7M_SFSR_AUVIOL_MASK | R_V7M_SFSR_SFARVALID_MASK; | ||
51 | + if (mode == STACK_LAZYFP) { | ||
52 | + qemu_log_mask(CPU_LOG_INT, | ||
53 | + "...SecureFault with SFSR.LSPERR " | ||
54 | + "during lazy stacking\n"); | ||
55 | + env->v7m.sfsr |= R_V7M_SFSR_LSPERR_MASK; | ||
56 | + } else { | ||
57 | + qemu_log_mask(CPU_LOG_INT, | ||
58 | + "...SecureFault with SFSR.AUVIOL " | ||
59 | + "during stacking\n"); | ||
60 | + env->v7m.sfsr |= R_V7M_SFSR_AUVIOL_MASK; | ||
61 | + } | ||
62 | + env->v7m.sfsr |= R_V7M_SFSR_SFARVALID_MASK; | ||
63 | env->v7m.sfar = addr; | ||
64 | exc = ARMV7M_EXCP_SECURE; | ||
65 | exc_secure = false; | ||
66 | } else { | ||
67 | - qemu_log_mask(CPU_LOG_INT, "...MemManageFault with CFSR.MSTKERR\n"); | ||
68 | - env->v7m.cfsr[secure] |= R_V7M_CFSR_MSTKERR_MASK; | ||
69 | + if (mode == STACK_LAZYFP) { | ||
70 | + qemu_log_mask(CPU_LOG_INT, | ||
71 | + "...MemManageFault with CFSR.MLSPERR\n"); | ||
72 | + env->v7m.cfsr[secure] |= R_V7M_CFSR_MLSPERR_MASK; | ||
73 | + } else { | ||
74 | + qemu_log_mask(CPU_LOG_INT, | ||
75 | + "...MemManageFault with CFSR.MSTKERR\n"); | ||
76 | + env->v7m.cfsr[secure] |= R_V7M_CFSR_MSTKERR_MASK; | ||
77 | + } | ||
78 | exc = ARMV7M_EXCP_MEM; | ||
79 | exc_secure = secure; | ||
80 | } | ||
81 | @@ -XXX,XX +XXX,XX @@ static bool v7m_stack_write(ARMCPU *cpu, uint32_t addr, uint32_t value, | ||
82 | attrs, &txres); | ||
83 | if (txres != MEMTX_OK) { | ||
84 | /* BusFault trying to write the data */ | ||
85 | - qemu_log_mask(CPU_LOG_INT, "...BusFault with BFSR.STKERR\n"); | ||
86 | - env->v7m.cfsr[M_REG_NS] |= R_V7M_CFSR_STKERR_MASK; | ||
87 | + if (mode == STACK_LAZYFP) { | ||
88 | + qemu_log_mask(CPU_LOG_INT, "...BusFault with BFSR.LSPERR\n"); | ||
89 | + env->v7m.cfsr[M_REG_NS] |= R_V7M_CFSR_LSPERR_MASK; | ||
90 | + } else { | ||
91 | + qemu_log_mask(CPU_LOG_INT, "...BusFault with BFSR.STKERR\n"); | ||
92 | + env->v7m.cfsr[M_REG_NS] |= R_V7M_CFSR_STKERR_MASK; | ||
93 | + } | ||
94 | exc = ARMV7M_EXCP_BUS; | ||
95 | exc_secure = false; | ||
96 | goto pend_fault; | ||
97 | @@ -XXX,XX +XXX,XX @@ pend_fault: | ||
98 | * later if we have two derived exceptions. | ||
99 | * The only case when we must not pend the exception but instead | ||
100 | * throw it away is if we are doing the push of the callee registers | ||
101 | - * and we've already generated a derived exception. Even in this | ||
102 | - * case we will still update the fault status registers. | ||
103 | + * and we've already generated a derived exception (this is indicated | ||
104 | + * by the caller passing STACK_IGNFAULTS). Even in this case we will | ||
105 | + * still update the fault status registers. | ||
106 | */ | ||
107 | - if (!ignfault) { | ||
108 | + switch (mode) { | ||
109 | + case STACK_NORMAL: | ||
110 | armv7m_nvic_set_pending_derived(env->nvic, exc, exc_secure); | ||
111 | + break; | ||
112 | + case STACK_LAZYFP: | ||
113 | + armv7m_nvic_set_pending_lazyfp(env->nvic, exc, exc_secure); | ||
114 | + break; | ||
115 | + case STACK_IGNFAULTS: | ||
116 | + break; | ||
117 | } | ||
118 | return false; | ||
119 | } | ||
120 | @@ -XXX,XX +XXX,XX @@ static bool v7m_push_callee_stack(ARMCPU *cpu, uint32_t lr, bool dotailchain, | ||
121 | uint32_t limit; | ||
122 | bool want_psp; | ||
123 | uint32_t sig; | ||
124 | + StackingMode smode = ignore_faults ? STACK_IGNFAULTS : STACK_NORMAL; | ||
125 | |||
126 | if (dotailchain) { | ||
127 | bool mode = lr & R_V7M_EXCRET_MODE_MASK; | ||
128 | @@ -XXX,XX +XXX,XX @@ static bool v7m_push_callee_stack(ARMCPU *cpu, uint32_t lr, bool dotailchain, | ||
129 | */ | ||
130 | sig = v7m_integrity_sig(env, lr); | ||
131 | stacked_ok = | ||
132 | - v7m_stack_write(cpu, frameptr, sig, mmu_idx, ignore_faults) && | ||
133 | - v7m_stack_write(cpu, frameptr + 0x8, env->regs[4], mmu_idx, | ||
134 | - ignore_faults) && | ||
135 | - v7m_stack_write(cpu, frameptr + 0xc, env->regs[5], mmu_idx, | ||
136 | - ignore_faults) && | ||
137 | - v7m_stack_write(cpu, frameptr + 0x10, env->regs[6], mmu_idx, | ||
138 | - ignore_faults) && | ||
139 | - v7m_stack_write(cpu, frameptr + 0x14, env->regs[7], mmu_idx, | ||
140 | - ignore_faults) && | ||
141 | - v7m_stack_write(cpu, frameptr + 0x18, env->regs[8], mmu_idx, | ||
142 | - ignore_faults) && | ||
143 | - v7m_stack_write(cpu, frameptr + 0x1c, env->regs[9], mmu_idx, | ||
144 | - ignore_faults) && | ||
145 | - v7m_stack_write(cpu, frameptr + 0x20, env->regs[10], mmu_idx, | ||
146 | - ignore_faults) && | ||
147 | - v7m_stack_write(cpu, frameptr + 0x24, env->regs[11], mmu_idx, | ||
148 | - ignore_faults); | ||
149 | + v7m_stack_write(cpu, frameptr, sig, mmu_idx, smode) && | ||
150 | + v7m_stack_write(cpu, frameptr + 0x8, env->regs[4], mmu_idx, smode) && | ||
151 | + v7m_stack_write(cpu, frameptr + 0xc, env->regs[5], mmu_idx, smode) && | ||
152 | + v7m_stack_write(cpu, frameptr + 0x10, env->regs[6], mmu_idx, smode) && | ||
153 | + v7m_stack_write(cpu, frameptr + 0x14, env->regs[7], mmu_idx, smode) && | ||
154 | + v7m_stack_write(cpu, frameptr + 0x18, env->regs[8], mmu_idx, smode) && | ||
155 | + v7m_stack_write(cpu, frameptr + 0x1c, env->regs[9], mmu_idx, smode) && | ||
156 | + v7m_stack_write(cpu, frameptr + 0x20, env->regs[10], mmu_idx, smode) && | ||
157 | + v7m_stack_write(cpu, frameptr + 0x24, env->regs[11], mmu_idx, smode); | ||
158 | |||
159 | /* Update SP regardless of whether any of the stack accesses failed. */ | ||
160 | *frame_sp_p = frameptr; | ||
161 | @@ -XXX,XX +XXX,XX @@ static bool v7m_push_stack(ARMCPU *cpu) | ||
162 | * if it has higher priority). | ||
163 | */ | ||
164 | stacked_ok = stacked_ok && | ||
165 | - v7m_stack_write(cpu, frameptr, env->regs[0], mmu_idx, false) && | ||
166 | - v7m_stack_write(cpu, frameptr + 4, env->regs[1], mmu_idx, false) && | ||
167 | - v7m_stack_write(cpu, frameptr + 8, env->regs[2], mmu_idx, false) && | ||
168 | - v7m_stack_write(cpu, frameptr + 12, env->regs[3], mmu_idx, false) && | ||
169 | - v7m_stack_write(cpu, frameptr + 16, env->regs[12], mmu_idx, false) && | ||
170 | - v7m_stack_write(cpu, frameptr + 20, env->regs[14], mmu_idx, false) && | ||
171 | - v7m_stack_write(cpu, frameptr + 24, env->regs[15], mmu_idx, false) && | ||
172 | - v7m_stack_write(cpu, frameptr + 28, xpsr, mmu_idx, false); | ||
173 | + v7m_stack_write(cpu, frameptr, env->regs[0], mmu_idx, STACK_NORMAL) && | ||
174 | + v7m_stack_write(cpu, frameptr + 4, env->regs[1], | ||
175 | + mmu_idx, STACK_NORMAL) && | ||
176 | + v7m_stack_write(cpu, frameptr + 8, env->regs[2], | ||
177 | + mmu_idx, STACK_NORMAL) && | ||
178 | + v7m_stack_write(cpu, frameptr + 12, env->regs[3], | ||
179 | + mmu_idx, STACK_NORMAL) && | ||
180 | + v7m_stack_write(cpu, frameptr + 16, env->regs[12], | ||
181 | + mmu_idx, STACK_NORMAL) && | ||
182 | + v7m_stack_write(cpu, frameptr + 20, env->regs[14], | ||
183 | + mmu_idx, STACK_NORMAL) && | ||
184 | + v7m_stack_write(cpu, frameptr + 24, env->regs[15], | ||
185 | + mmu_idx, STACK_NORMAL) && | ||
186 | + v7m_stack_write(cpu, frameptr + 28, xpsr, mmu_idx, STACK_NORMAL); | ||
187 | |||
188 | if (env->v7m.control[M_REG_S] & R_V7M_CONTROL_FPCA_MASK) { | ||
189 | /* FPU is active, try to save its registers */ | ||
190 | @@ -XXX,XX +XXX,XX @@ static bool v7m_push_stack(ARMCPU *cpu) | ||
191 | faddr += 8; /* skip the slot for the FPSCR */ | ||
192 | } | ||
193 | stacked_ok = stacked_ok && | ||
194 | - v7m_stack_write(cpu, faddr, slo, mmu_idx, false) && | ||
195 | - v7m_stack_write(cpu, faddr + 4, shi, mmu_idx, false); | ||
196 | + v7m_stack_write(cpu, faddr, slo, | ||
197 | + mmu_idx, STACK_NORMAL) && | ||
198 | + v7m_stack_write(cpu, faddr + 4, shi, | ||
199 | + mmu_idx, STACK_NORMAL); | ||
200 | } | ||
201 | stacked_ok = stacked_ok && | ||
202 | v7m_stack_write(cpu, frameptr + 0x60, | ||
203 | - vfp_get_fpscr(env), mmu_idx, false); | ||
204 | + vfp_get_fpscr(env), mmu_idx, STACK_NORMAL); | ||
205 | if (cpacr_pass) { | ||
206 | for (i = 0; i < ((framesize == 0xa8) ? 32 : 16); i += 2) { | ||
207 | *aa32_vfp_dreg(env, i / 2) = 0; | ||
208 | -- | 26 | -- |
209 | 2.20.1 | 27 | 2.20.1 |
210 | 28 | ||
211 | 29 | diff view generated by jsdifflib |
1 | Implement the VLSTM instruction for v7M for the FPU present case. | 1 | Optimize the MVE 1op-immediate insns (VORR, VBIC, VMOV) to |
---|---|---|---|
2 | use TCG vector ops when possible. | ||
2 | 3 | ||
3 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 5 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
5 | Message-id: 20190416125744.27770-25-peter.maydell@linaro.org | 6 | Message-id: 20210913095440.13462-13-peter.maydell@linaro.org |
6 | --- | 7 | --- |
7 | target/arm/cpu.h | 2 + | 8 | target/arm/translate-mve.c | 26 +++++++++++++++++++++----- |
8 | target/arm/helper.h | 2 + | 9 | 1 file changed, 21 insertions(+), 5 deletions(-) |
9 | target/arm/helper.c | 84 ++++++++++++++++++++++++++++++++++++++++++ | ||
10 | target/arm/translate.c | 15 +++++++- | ||
11 | 4 files changed, 102 insertions(+), 1 deletion(-) | ||
12 | 10 | ||
13 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 11 | diff --git a/target/arm/translate-mve.c b/target/arm/translate-mve.c |
14 | index XXXXXXX..XXXXXXX 100644 | 12 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/target/arm/cpu.h | 13 | --- a/target/arm/translate-mve.c |
16 | +++ b/target/arm/cpu.h | 14 | +++ b/target/arm/translate-mve.c |
17 | @@ -XXX,XX +XXX,XX @@ | 15 | @@ -XXX,XX +XXX,XX @@ static bool trans_VADDLV(DisasContext *s, arg_VADDLV *a) |
18 | #define EXCP_INVSTATE 18 /* v7M INVSTATE UsageFault */ | 16 | return true; |
19 | #define EXCP_STKOF 19 /* v8M STKOF UsageFault */ | ||
20 | #define EXCP_LAZYFP 20 /* v7M fault during lazy FP stacking */ | ||
21 | +#define EXCP_LSERR 21 /* v8M LSERR SecureFault */ | ||
22 | +#define EXCP_UNALIGNED 22 /* v7M UNALIGNED UsageFault */ | ||
23 | /* NB: add new EXCP_ defines to the array in arm_log_exception() too */ | ||
24 | |||
25 | #define ARMV7M_EXCP_RESET 1 | ||
26 | diff --git a/target/arm/helper.h b/target/arm/helper.h | ||
27 | index XXXXXXX..XXXXXXX 100644 | ||
28 | --- a/target/arm/helper.h | ||
29 | +++ b/target/arm/helper.h | ||
30 | @@ -XXX,XX +XXX,XX @@ DEF_HELPER_3(v7m_tt, i32, env, i32, i32) | ||
31 | |||
32 | DEF_HELPER_1(v7m_preserve_fp_state, void, env) | ||
33 | |||
34 | +DEF_HELPER_2(v7m_vlstm, void, env, i32) | ||
35 | + | ||
36 | DEF_HELPER_2(v8m_stackcheck, void, env, i32) | ||
37 | |||
38 | DEF_HELPER_4(access_check_cp_reg, void, env, ptr, i32, i32) | ||
39 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
40 | index XXXXXXX..XXXXXXX 100644 | ||
41 | --- a/target/arm/helper.c | ||
42 | +++ b/target/arm/helper.c | ||
43 | @@ -XXX,XX +XXX,XX @@ void HELPER(v7m_preserve_fp_state)(CPUARMState *env) | ||
44 | g_assert_not_reached(); | ||
45 | } | 17 | } |
46 | 18 | ||
47 | +void HELPER(v7m_vlstm)(CPUARMState *env, uint32_t fptr) | 19 | -static bool do_1imm(DisasContext *s, arg_1imm *a, MVEGenOneOpImmFn *fn) |
20 | +static bool do_1imm(DisasContext *s, arg_1imm *a, MVEGenOneOpImmFn *fn, | ||
21 | + GVecGen2iFn *vecfn) | ||
22 | { | ||
23 | TCGv_ptr qd; | ||
24 | uint64_t imm; | ||
25 | @@ -XXX,XX +XXX,XX @@ static bool do_1imm(DisasContext *s, arg_1imm *a, MVEGenOneOpImmFn *fn) | ||
26 | |||
27 | imm = asimd_imm_const(a->imm, a->cmode, a->op); | ||
28 | |||
29 | - qd = mve_qreg_ptr(a->qd); | ||
30 | - fn(cpu_env, qd, tcg_constant_i64(imm)); | ||
31 | - tcg_temp_free_ptr(qd); | ||
32 | + if (vecfn && mve_no_predication(s)) { | ||
33 | + vecfn(MO_64, mve_qreg_offset(a->qd), mve_qreg_offset(a->qd), | ||
34 | + imm, 16, 16); | ||
35 | + } else { | ||
36 | + qd = mve_qreg_ptr(a->qd); | ||
37 | + fn(cpu_env, qd, tcg_constant_i64(imm)); | ||
38 | + tcg_temp_free_ptr(qd); | ||
39 | + } | ||
40 | mve_update_eci(s); | ||
41 | return true; | ||
42 | } | ||
43 | |||
44 | +static void gen_gvec_vmovi(unsigned vece, uint32_t dofs, uint32_t aofs, | ||
45 | + int64_t c, uint32_t oprsz, uint32_t maxsz) | ||
48 | +{ | 46 | +{ |
49 | + /* translate.c should never generate calls here in user-only mode */ | 47 | + tcg_gen_gvec_dup_imm(vece, dofs, oprsz, maxsz, c); |
50 | + g_assert_not_reached(); | ||
51 | +} | 48 | +} |
52 | + | 49 | + |
53 | uint32_t HELPER(v7m_tt)(CPUARMState *env, uint32_t addr, uint32_t op) | 50 | static bool trans_Vimm_1r(DisasContext *s, arg_1imm *a) |
54 | { | 51 | { |
55 | /* The TT instructions can be used by unprivileged code, but in | 52 | /* Handle decode of cmode/op here between VORR/VBIC/VMOV */ |
56 | @@ -XXX,XX +XXX,XX @@ static void v7m_update_fpccr(CPUARMState *env, uint32_t frameptr, | 53 | MVEGenOneOpImmFn *fn; |
54 | + GVecGen2iFn *vecfn; | ||
55 | |||
56 | if ((a->cmode & 1) && a->cmode < 12) { | ||
57 | if (a->op) { | ||
58 | @@ -XXX,XX +XXX,XX @@ static bool trans_Vimm_1r(DisasContext *s, arg_1imm *a) | ||
59 | * so the VBIC becomes a logical AND operation. | ||
60 | */ | ||
61 | fn = gen_helper_mve_vandi; | ||
62 | + vecfn = tcg_gen_gvec_andi; | ||
63 | } else { | ||
64 | fn = gen_helper_mve_vorri; | ||
65 | + vecfn = tcg_gen_gvec_ori; | ||
66 | } | ||
67 | } else { | ||
68 | /* There is one unallocated cmode/op combination in this space */ | ||
69 | @@ -XXX,XX +XXX,XX @@ static bool trans_Vimm_1r(DisasContext *s, arg_1imm *a) | ||
70 | } | ||
71 | /* asimd_imm_const() sorts out VMVNI vs VMOVI for us */ | ||
72 | fn = gen_helper_mve_vmovi; | ||
73 | + vecfn = gen_gvec_vmovi; | ||
57 | } | 74 | } |
75 | - return do_1imm(s, a, fn); | ||
76 | + return do_1imm(s, a, fn, vecfn); | ||
58 | } | 77 | } |
59 | 78 | ||
60 | +void HELPER(v7m_vlstm)(CPUARMState *env, uint32_t fptr) | 79 | static bool do_2shift_vec(DisasContext *s, arg_2shift *a, MVEGenTwoOpShiftFn fn, |
61 | +{ | ||
62 | + /* fptr is the value of Rn, the frame pointer we store the FP regs to */ | ||
63 | + bool s = env->v7m.fpccr[M_REG_S] & R_V7M_FPCCR_S_MASK; | ||
64 | + bool lspact = env->v7m.fpccr[s] & R_V7M_FPCCR_LSPACT_MASK; | ||
65 | + | ||
66 | + assert(env->v7m.secure); | ||
67 | + | ||
68 | + if (!(env->v7m.control[M_REG_S] & R_V7M_CONTROL_SFPA_MASK)) { | ||
69 | + return; | ||
70 | + } | ||
71 | + | ||
72 | + /* Check access to the coprocessor is permitted */ | ||
73 | + if (!v7m_cpacr_pass(env, true, arm_current_el(env) != 0)) { | ||
74 | + raise_exception_ra(env, EXCP_NOCP, 0, 1, GETPC()); | ||
75 | + } | ||
76 | + | ||
77 | + if (lspact) { | ||
78 | + /* LSPACT should not be active when there is active FP state */ | ||
79 | + raise_exception_ra(env, EXCP_LSERR, 0, 1, GETPC()); | ||
80 | + } | ||
81 | + | ||
82 | + if (fptr & 7) { | ||
83 | + raise_exception_ra(env, EXCP_UNALIGNED, 0, 1, GETPC()); | ||
84 | + } | ||
85 | + | ||
86 | + /* | ||
87 | + * Note that we do not use v7m_stack_write() here, because the | ||
88 | + * accesses should not set the FSR bits for stacking errors if they | ||
89 | + * fail. (In pseudocode terms, they are AccType_NORMAL, not AccType_STACK | ||
90 | + * or AccType_LAZYFP). Faults in cpu_stl_data() will throw exceptions | ||
91 | + * and longjmp out. | ||
92 | + */ | ||
93 | + if (!(env->v7m.fpccr[M_REG_S] & R_V7M_FPCCR_LSPEN_MASK)) { | ||
94 | + bool ts = env->v7m.fpccr[M_REG_S] & R_V7M_FPCCR_TS_MASK; | ||
95 | + int i; | ||
96 | + | ||
97 | + for (i = 0; i < (ts ? 32 : 16); i += 2) { | ||
98 | + uint64_t dn = *aa32_vfp_dreg(env, i / 2); | ||
99 | + uint32_t faddr = fptr + 4 * i; | ||
100 | + uint32_t slo = extract64(dn, 0, 32); | ||
101 | + uint32_t shi = extract64(dn, 32, 32); | ||
102 | + | ||
103 | + if (i >= 16) { | ||
104 | + faddr += 8; /* skip the slot for the FPSCR */ | ||
105 | + } | ||
106 | + cpu_stl_data(env, faddr, slo); | ||
107 | + cpu_stl_data(env, faddr + 4, shi); | ||
108 | + } | ||
109 | + cpu_stl_data(env, fptr + 0x40, vfp_get_fpscr(env)); | ||
110 | + | ||
111 | + /* | ||
112 | + * If TS is 0 then s0 to s15 and FPSCR are UNKNOWN; we choose to | ||
113 | + * leave them unchanged, matching our choice in v7m_preserve_fp_state. | ||
114 | + */ | ||
115 | + if (ts) { | ||
116 | + for (i = 0; i < 32; i += 2) { | ||
117 | + *aa32_vfp_dreg(env, i / 2) = 0; | ||
118 | + } | ||
119 | + vfp_set_fpscr(env, 0); | ||
120 | + } | ||
121 | + } else { | ||
122 | + v7m_update_fpccr(env, fptr, false); | ||
123 | + } | ||
124 | + | ||
125 | + env->v7m.control[M_REG_S] &= ~R_V7M_CONTROL_FPCA_MASK; | ||
126 | +} | ||
127 | + | ||
128 | static bool v7m_push_stack(ARMCPU *cpu) | ||
129 | { | ||
130 | /* Do the "set up stack frame" part of exception entry, | ||
131 | @@ -XXX,XX +XXX,XX @@ static void arm_log_exception(int idx) | ||
132 | [EXCP_INVSTATE] = "v7M INVSTATE UsageFault", | ||
133 | [EXCP_STKOF] = "v8M STKOF UsageFault", | ||
134 | [EXCP_LAZYFP] = "v7M exception during lazy FP stacking", | ||
135 | + [EXCP_LSERR] = "v8M LSERR UsageFault", | ||
136 | + [EXCP_UNALIGNED] = "v7M UNALIGNED UsageFault", | ||
137 | }; | ||
138 | |||
139 | if (idx >= 0 && idx < ARRAY_SIZE(excnames)) { | ||
140 | @@ -XXX,XX +XXX,XX @@ void arm_v7m_cpu_do_interrupt(CPUState *cs) | ||
141 | armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE, env->v7m.secure); | ||
142 | env->v7m.cfsr[env->v7m.secure] |= R_V7M_CFSR_STKOF_MASK; | ||
143 | break; | ||
144 | + case EXCP_LSERR: | ||
145 | + armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_SECURE, false); | ||
146 | + env->v7m.sfsr |= R_V7M_SFSR_LSERR_MASK; | ||
147 | + break; | ||
148 | + case EXCP_UNALIGNED: | ||
149 | + armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE, env->v7m.secure); | ||
150 | + env->v7m.cfsr[env->v7m.secure] |= R_V7M_CFSR_UNALIGNED_MASK; | ||
151 | + break; | ||
152 | case EXCP_SWI: | ||
153 | /* The PC already points to the next instruction. */ | ||
154 | armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_SVC, env->v7m.secure); | ||
155 | diff --git a/target/arm/translate.c b/target/arm/translate.c | ||
156 | index XXXXXXX..XXXXXXX 100644 | ||
157 | --- a/target/arm/translate.c | ||
158 | +++ b/target/arm/translate.c | ||
159 | @@ -XXX,XX +XXX,XX @@ static void disas_thumb2_insn(DisasContext *s, uint32_t insn) | ||
160 | if (!s->v8m_secure || (insn & 0x0040f0ff)) { | ||
161 | goto illegal_op; | ||
162 | } | ||
163 | - /* Just NOP since FP support is not implemented */ | ||
164 | + | ||
165 | + if (arm_dc_feature(s, ARM_FEATURE_VFP)) { | ||
166 | + TCGv_i32 fptr = load_reg(s, rn); | ||
167 | + | ||
168 | + if (extract32(insn, 20, 1)) { | ||
169 | + /* VLLDM */ | ||
170 | + } else { | ||
171 | + gen_helper_v7m_vlstm(cpu_env, fptr); | ||
172 | + } | ||
173 | + tcg_temp_free_i32(fptr); | ||
174 | + | ||
175 | + /* End the TB, because we have updated FP control bits */ | ||
176 | + s->base.is_jmp = DISAS_UPDATE; | ||
177 | + } | ||
178 | break; | ||
179 | } | ||
180 | if (arm_dc_feature(s, ARM_FEATURE_VFP) && | ||
181 | -- | 80 | -- |
182 | 2.20.1 | 81 | 2.20.1 |
183 | 82 | ||
184 | 83 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
2 | 1 | ||
3 | Reviewed-by: Markus Armbruster <armbru@redhat.com> | ||
4 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
5 | Message-id: 20190412165416.7977-5-philmd@redhat.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | --- | ||
8 | include/hw/devices.h | 6 ------ | ||
9 | include/hw/display/tc6393xb.h | 24 ++++++++++++++++++++++++ | ||
10 | hw/arm/tosa.c | 2 +- | ||
11 | hw/display/tc6393xb.c | 2 +- | ||
12 | MAINTAINERS | 1 + | ||
13 | 5 files changed, 27 insertions(+), 8 deletions(-) | ||
14 | create mode 100644 include/hw/display/tc6393xb.h | ||
15 | |||
16 | diff --git a/include/hw/devices.h b/include/hw/devices.h | ||
17 | index XXXXXXX..XXXXXXX 100644 | ||
18 | --- a/include/hw/devices.h | ||
19 | +++ b/include/hw/devices.h | ||
20 | @@ -XXX,XX +XXX,XX @@ void *tahvo_init(qemu_irq irq, int betty); | ||
21 | |||
22 | void retu_key_event(void *retu, int state); | ||
23 | |||
24 | -/* tc6393xb.c */ | ||
25 | -typedef struct TC6393xbState TC6393xbState; | ||
26 | -TC6393xbState *tc6393xb_init(struct MemoryRegion *sysmem, | ||
27 | - uint32_t base, qemu_irq irq); | ||
28 | -qemu_irq tc6393xb_l3v_get(TC6393xbState *s); | ||
29 | - | ||
30 | #endif | ||
31 | diff --git a/include/hw/display/tc6393xb.h b/include/hw/display/tc6393xb.h | ||
32 | new file mode 100644 | ||
33 | index XXXXXXX..XXXXXXX | ||
34 | --- /dev/null | ||
35 | +++ b/include/hw/display/tc6393xb.h | ||
36 | @@ -XXX,XX +XXX,XX @@ | ||
37 | +/* | ||
38 | + * Toshiba TC6393XB I/O Controller. | ||
39 | + * Found in Sharp Zaurus SL-6000 (tosa) or some | ||
40 | + * Toshiba e-Series PDAs. | ||
41 | + * | ||
42 | + * Copyright (c) 2007 Hervé Poussineau | ||
43 | + * | ||
44 | + * This work is licensed under the terms of the GNU GPL, version 2 or later. | ||
45 | + * See the COPYING file in the top-level directory. | ||
46 | + */ | ||
47 | + | ||
48 | +#ifndef HW_DISPLAY_TC6393XB_H | ||
49 | +#define HW_DISPLAY_TC6393XB_H | ||
50 | + | ||
51 | +#include "exec/memory.h" | ||
52 | +#include "hw/irq.h" | ||
53 | + | ||
54 | +typedef struct TC6393xbState TC6393xbState; | ||
55 | + | ||
56 | +TC6393xbState *tc6393xb_init(struct MemoryRegion *sysmem, | ||
57 | + uint32_t base, qemu_irq irq); | ||
58 | +qemu_irq tc6393xb_l3v_get(TC6393xbState *s); | ||
59 | + | ||
60 | +#endif | ||
61 | diff --git a/hw/arm/tosa.c b/hw/arm/tosa.c | ||
62 | index XXXXXXX..XXXXXXX 100644 | ||
63 | --- a/hw/arm/tosa.c | ||
64 | +++ b/hw/arm/tosa.c | ||
65 | @@ -XXX,XX +XXX,XX @@ | ||
66 | #include "hw/hw.h" | ||
67 | #include "hw/arm/pxa.h" | ||
68 | #include "hw/arm/arm.h" | ||
69 | -#include "hw/devices.h" | ||
70 | #include "hw/arm/sharpsl.h" | ||
71 | #include "hw/pcmcia.h" | ||
72 | #include "hw/boards.h" | ||
73 | +#include "hw/display/tc6393xb.h" | ||
74 | #include "hw/i2c/i2c.h" | ||
75 | #include "hw/ssi/ssi.h" | ||
76 | #include "hw/sysbus.h" | ||
77 | diff --git a/hw/display/tc6393xb.c b/hw/display/tc6393xb.c | ||
78 | index XXXXXXX..XXXXXXX 100644 | ||
79 | --- a/hw/display/tc6393xb.c | ||
80 | +++ b/hw/display/tc6393xb.c | ||
81 | @@ -XXX,XX +XXX,XX @@ | ||
82 | #include "qapi/error.h" | ||
83 | #include "qemu/host-utils.h" | ||
84 | #include "hw/hw.h" | ||
85 | -#include "hw/devices.h" | ||
86 | +#include "hw/display/tc6393xb.h" | ||
87 | #include "hw/block/flash.h" | ||
88 | #include "ui/console.h" | ||
89 | #include "ui/pixel_ops.h" | ||
90 | diff --git a/MAINTAINERS b/MAINTAINERS | ||
91 | index XXXXXXX..XXXXXXX 100644 | ||
92 | --- a/MAINTAINERS | ||
93 | +++ b/MAINTAINERS | ||
94 | @@ -XXX,XX +XXX,XX @@ F: hw/misc/mst_fpga.c | ||
95 | F: hw/misc/max111x.c | ||
96 | F: include/hw/arm/pxa.h | ||
97 | F: include/hw/arm/sharpsl.h | ||
98 | +F: include/hw/display/tc6393xb.h | ||
99 | |||
100 | SABRELITE / i.MX6 | ||
101 | M: Peter Maydell <peter.maydell@linaro.org> | ||
102 | -- | ||
103 | 2.20.1 | ||
104 | |||
105 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
2 | 1 | ||
3 | Add an entries the Blizzard device in MAINTAINERS. | ||
4 | |||
5 | Reviewed-by: Thomas Huth <thuth@redhat.com> | ||
6 | Reviewed-by: Markus Armbruster <armbru@redhat.com> | ||
7 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
8 | Message-id: 20190412165416.7977-6-philmd@redhat.com | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | --- | ||
11 | include/hw/devices.h | 7 ------- | ||
12 | include/hw/display/blizzard.h | 22 ++++++++++++++++++++++ | ||
13 | hw/arm/nseries.c | 1 + | ||
14 | hw/display/blizzard.c | 2 +- | ||
15 | MAINTAINERS | 2 ++ | ||
16 | 5 files changed, 26 insertions(+), 8 deletions(-) | ||
17 | create mode 100644 include/hw/display/blizzard.h | ||
18 | |||
19 | diff --git a/include/hw/devices.h b/include/hw/devices.h | ||
20 | index XXXXXXX..XXXXXXX 100644 | ||
21 | --- a/include/hw/devices.h | ||
22 | +++ b/include/hw/devices.h | ||
23 | @@ -XXX,XX +XXX,XX @@ void tsc2005_set_transform(void *opaque, MouseTransformInfo *info); | ||
24 | /* stellaris_input.c */ | ||
25 | void stellaris_gamepad_init(int n, qemu_irq *irq, const int *keycode); | ||
26 | |||
27 | -/* blizzard.c */ | ||
28 | -void *s1d13745_init(qemu_irq gpio_int); | ||
29 | -void s1d13745_write(void *opaque, int dc, uint16_t value); | ||
30 | -void s1d13745_write_block(void *opaque, int dc, | ||
31 | - void *buf, size_t len, int pitch); | ||
32 | -uint16_t s1d13745_read(void *opaque, int dc); | ||
33 | - | ||
34 | /* cbus.c */ | ||
35 | typedef struct { | ||
36 | qemu_irq clk; | ||
37 | diff --git a/include/hw/display/blizzard.h b/include/hw/display/blizzard.h | ||
38 | new file mode 100644 | ||
39 | index XXXXXXX..XXXXXXX | ||
40 | --- /dev/null | ||
41 | +++ b/include/hw/display/blizzard.h | ||
42 | @@ -XXX,XX +XXX,XX @@ | ||
43 | +/* | ||
44 | + * Epson S1D13744/S1D13745 (Blizzard/Hailstorm/Tornado) LCD/TV controller. | ||
45 | + * | ||
46 | + * Copyright (C) 2008 Nokia Corporation | ||
47 | + * Written by Andrzej Zaborowski | ||
48 | + * | ||
49 | + * This work is licensed under the terms of the GNU GPL, version 2 or later. | ||
50 | + * See the COPYING file in the top-level directory. | ||
51 | + */ | ||
52 | + | ||
53 | +#ifndef HW_DISPLAY_BLIZZARD_H | ||
54 | +#define HW_DISPLAY_BLIZZARD_H | ||
55 | + | ||
56 | +#include "hw/irq.h" | ||
57 | + | ||
58 | +void *s1d13745_init(qemu_irq gpio_int); | ||
59 | +void s1d13745_write(void *opaque, int dc, uint16_t value); | ||
60 | +void s1d13745_write_block(void *opaque, int dc, | ||
61 | + void *buf, size_t len, int pitch); | ||
62 | +uint16_t s1d13745_read(void *opaque, int dc); | ||
63 | + | ||
64 | +#endif | ||
65 | diff --git a/hw/arm/nseries.c b/hw/arm/nseries.c | ||
66 | index XXXXXXX..XXXXXXX 100644 | ||
67 | --- a/hw/arm/nseries.c | ||
68 | +++ b/hw/arm/nseries.c | ||
69 | @@ -XXX,XX +XXX,XX @@ | ||
70 | #include "hw/boards.h" | ||
71 | #include "hw/i2c/i2c.h" | ||
72 | #include "hw/devices.h" | ||
73 | +#include "hw/display/blizzard.h" | ||
74 | #include "hw/misc/tmp105.h" | ||
75 | #include "hw/block/flash.h" | ||
76 | #include "hw/hw.h" | ||
77 | diff --git a/hw/display/blizzard.c b/hw/display/blizzard.c | ||
78 | index XXXXXXX..XXXXXXX 100644 | ||
79 | --- a/hw/display/blizzard.c | ||
80 | +++ b/hw/display/blizzard.c | ||
81 | @@ -XXX,XX +XXX,XX @@ | ||
82 | #include "qemu/osdep.h" | ||
83 | #include "qemu-common.h" | ||
84 | #include "ui/console.h" | ||
85 | -#include "hw/devices.h" | ||
86 | +#include "hw/display/blizzard.h" | ||
87 | #include "ui/pixel_ops.h" | ||
88 | |||
89 | typedef void (*blizzard_fn_t)(uint8_t *, const uint8_t *, unsigned int); | ||
90 | diff --git a/MAINTAINERS b/MAINTAINERS | ||
91 | index XXXXXXX..XXXXXXX 100644 | ||
92 | --- a/MAINTAINERS | ||
93 | +++ b/MAINTAINERS | ||
94 | @@ -XXX,XX +XXX,XX @@ M: Peter Maydell <peter.maydell@linaro.org> | ||
95 | L: qemu-arm@nongnu.org | ||
96 | S: Odd Fixes | ||
97 | F: hw/arm/nseries.c | ||
98 | +F: hw/display/blizzard.c | ||
99 | F: hw/input/lm832x.c | ||
100 | F: hw/input/tsc2005.c | ||
101 | F: hw/misc/cbus.c | ||
102 | F: hw/timer/twl92230.c | ||
103 | +F: include/hw/display/blizzard.h | ||
104 | |||
105 | Palm | ||
106 | M: Andrzej Zaborowski <balrogg@gmail.com> | ||
107 | -- | ||
108 | 2.20.1 | ||
109 | |||
110 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
2 | 1 | ||
3 | Reviewed-by: Thomas Huth <thuth@redhat.com> | ||
4 | Reviewed-by: Markus Armbruster <armbru@redhat.com> | ||
5 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
6 | Message-id: 20190412165416.7977-7-philmd@redhat.com | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | --- | ||
9 | include/hw/devices.h | 14 -------------- | ||
10 | include/hw/misc/cbus.h | 32 ++++++++++++++++++++++++++++++++ | ||
11 | hw/arm/nseries.c | 1 + | ||
12 | hw/misc/cbus.c | 2 +- | ||
13 | MAINTAINERS | 1 + | ||
14 | 5 files changed, 35 insertions(+), 15 deletions(-) | ||
15 | create mode 100644 include/hw/misc/cbus.h | ||
16 | |||
17 | diff --git a/include/hw/devices.h b/include/hw/devices.h | ||
18 | index XXXXXXX..XXXXXXX 100644 | ||
19 | --- a/include/hw/devices.h | ||
20 | +++ b/include/hw/devices.h | ||
21 | @@ -XXX,XX +XXX,XX @@ void tsc2005_set_transform(void *opaque, MouseTransformInfo *info); | ||
22 | /* stellaris_input.c */ | ||
23 | void stellaris_gamepad_init(int n, qemu_irq *irq, const int *keycode); | ||
24 | |||
25 | -/* cbus.c */ | ||
26 | -typedef struct { | ||
27 | - qemu_irq clk; | ||
28 | - qemu_irq dat; | ||
29 | - qemu_irq sel; | ||
30 | -} CBus; | ||
31 | -CBus *cbus_init(qemu_irq dat_out); | ||
32 | -void cbus_attach(CBus *bus, void *slave_opaque); | ||
33 | - | ||
34 | -void *retu_init(qemu_irq irq, int vilma); | ||
35 | -void *tahvo_init(qemu_irq irq, int betty); | ||
36 | - | ||
37 | -void retu_key_event(void *retu, int state); | ||
38 | - | ||
39 | #endif | ||
40 | diff --git a/include/hw/misc/cbus.h b/include/hw/misc/cbus.h | ||
41 | new file mode 100644 | ||
42 | index XXXXXXX..XXXXXXX | ||
43 | --- /dev/null | ||
44 | +++ b/include/hw/misc/cbus.h | ||
45 | @@ -XXX,XX +XXX,XX @@ | ||
46 | +/* | ||
47 | + * CBUS three-pin bus and the Retu / Betty / Tahvo / Vilma / Avilma / | ||
48 | + * Hinku / Vinku / Ahne / Pihi chips used in various Nokia platforms. | ||
49 | + * Based on reverse-engineering of a linux driver. | ||
50 | + * | ||
51 | + * Copyright (C) 2008 Nokia Corporation | ||
52 | + * Written by Andrzej Zaborowski | ||
53 | + * | ||
54 | + * This work is licensed under the terms of the GNU GPL, version 2 or later. | ||
55 | + * See the COPYING file in the top-level directory. | ||
56 | + */ | ||
57 | + | ||
58 | +#ifndef HW_MISC_CBUS_H | ||
59 | +#define HW_MISC_CBUS_H | ||
60 | + | ||
61 | +#include "hw/irq.h" | ||
62 | + | ||
63 | +typedef struct { | ||
64 | + qemu_irq clk; | ||
65 | + qemu_irq dat; | ||
66 | + qemu_irq sel; | ||
67 | +} CBus; | ||
68 | + | ||
69 | +CBus *cbus_init(qemu_irq dat_out); | ||
70 | +void cbus_attach(CBus *bus, void *slave_opaque); | ||
71 | + | ||
72 | +void *retu_init(qemu_irq irq, int vilma); | ||
73 | +void *tahvo_init(qemu_irq irq, int betty); | ||
74 | + | ||
75 | +void retu_key_event(void *retu, int state); | ||
76 | + | ||
77 | +#endif | ||
78 | diff --git a/hw/arm/nseries.c b/hw/arm/nseries.c | ||
79 | index XXXXXXX..XXXXXXX 100644 | ||
80 | --- a/hw/arm/nseries.c | ||
81 | +++ b/hw/arm/nseries.c | ||
82 | @@ -XXX,XX +XXX,XX @@ | ||
83 | #include "hw/i2c/i2c.h" | ||
84 | #include "hw/devices.h" | ||
85 | #include "hw/display/blizzard.h" | ||
86 | +#include "hw/misc/cbus.h" | ||
87 | #include "hw/misc/tmp105.h" | ||
88 | #include "hw/block/flash.h" | ||
89 | #include "hw/hw.h" | ||
90 | diff --git a/hw/misc/cbus.c b/hw/misc/cbus.c | ||
91 | index XXXXXXX..XXXXXXX 100644 | ||
92 | --- a/hw/misc/cbus.c | ||
93 | +++ b/hw/misc/cbus.c | ||
94 | @@ -XXX,XX +XXX,XX @@ | ||
95 | #include "qemu/osdep.h" | ||
96 | #include "hw/hw.h" | ||
97 | #include "hw/irq.h" | ||
98 | -#include "hw/devices.h" | ||
99 | +#include "hw/misc/cbus.h" | ||
100 | #include "sysemu/sysemu.h" | ||
101 | |||
102 | //#define DEBUG | ||
103 | diff --git a/MAINTAINERS b/MAINTAINERS | ||
104 | index XXXXXXX..XXXXXXX 100644 | ||
105 | --- a/MAINTAINERS | ||
106 | +++ b/MAINTAINERS | ||
107 | @@ -XXX,XX +XXX,XX @@ F: hw/input/tsc2005.c | ||
108 | F: hw/misc/cbus.c | ||
109 | F: hw/timer/twl92230.c | ||
110 | F: include/hw/display/blizzard.h | ||
111 | +F: include/hw/misc/cbus.h | ||
112 | |||
113 | Palm | ||
114 | M: Andrzej Zaborowski <balrogg@gmail.com> | ||
115 | -- | ||
116 | 2.20.1 | ||
117 | |||
118 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
2 | 1 | ||
3 | Reviewed-by: Markus Armbruster <armbru@redhat.com> | ||
4 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
5 | Message-id: 20190412165416.7977-8-philmd@redhat.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | --- | ||
8 | include/hw/devices.h | 3 --- | ||
9 | include/hw/input/gamepad.h | 19 +++++++++++++++++++ | ||
10 | hw/arm/stellaris.c | 2 +- | ||
11 | hw/input/stellaris_input.c | 2 +- | ||
12 | MAINTAINERS | 1 + | ||
13 | 5 files changed, 22 insertions(+), 5 deletions(-) | ||
14 | create mode 100644 include/hw/input/gamepad.h | ||
15 | |||
16 | diff --git a/include/hw/devices.h b/include/hw/devices.h | ||
17 | index XXXXXXX..XXXXXXX 100644 | ||
18 | --- a/include/hw/devices.h | ||
19 | +++ b/include/hw/devices.h | ||
20 | @@ -XXX,XX +XXX,XX @@ void *tsc2005_init(qemu_irq pintdav); | ||
21 | uint32_t tsc2005_txrx(void *opaque, uint32_t value, int len); | ||
22 | void tsc2005_set_transform(void *opaque, MouseTransformInfo *info); | ||
23 | |||
24 | -/* stellaris_input.c */ | ||
25 | -void stellaris_gamepad_init(int n, qemu_irq *irq, const int *keycode); | ||
26 | - | ||
27 | #endif | ||
28 | diff --git a/include/hw/input/gamepad.h b/include/hw/input/gamepad.h | ||
29 | new file mode 100644 | ||
30 | index XXXXXXX..XXXXXXX | ||
31 | --- /dev/null | ||
32 | +++ b/include/hw/input/gamepad.h | ||
33 | @@ -XXX,XX +XXX,XX @@ | ||
34 | +/* | ||
35 | + * Gamepad style buttons connected to IRQ/GPIO lines | ||
36 | + * | ||
37 | + * Copyright (c) 2007 CodeSourcery. | ||
38 | + * Written by Paul Brook | ||
39 | + * | ||
40 | + * This work is licensed under the terms of the GNU GPL, version 2 or later. | ||
41 | + * See the COPYING file in the top-level directory. | ||
42 | + */ | ||
43 | + | ||
44 | +#ifndef HW_INPUT_GAMEPAD_H | ||
45 | +#define HW_INPUT_GAMEPAD_H | ||
46 | + | ||
47 | +#include "hw/irq.h" | ||
48 | + | ||
49 | +/* stellaris_input.c */ | ||
50 | +void stellaris_gamepad_init(int n, qemu_irq *irq, const int *keycode); | ||
51 | + | ||
52 | +#endif | ||
53 | diff --git a/hw/arm/stellaris.c b/hw/arm/stellaris.c | ||
54 | index XXXXXXX..XXXXXXX 100644 | ||
55 | --- a/hw/arm/stellaris.c | ||
56 | +++ b/hw/arm/stellaris.c | ||
57 | @@ -XXX,XX +XXX,XX @@ | ||
58 | #include "hw/sysbus.h" | ||
59 | #include "hw/ssi/ssi.h" | ||
60 | #include "hw/arm/arm.h" | ||
61 | -#include "hw/devices.h" | ||
62 | #include "qemu/timer.h" | ||
63 | #include "hw/i2c/i2c.h" | ||
64 | #include "net/net.h" | ||
65 | @@ -XXX,XX +XXX,XX @@ | ||
66 | #include "sysemu/sysemu.h" | ||
67 | #include "hw/arm/armv7m.h" | ||
68 | #include "hw/char/pl011.h" | ||
69 | +#include "hw/input/gamepad.h" | ||
70 | #include "hw/watchdog/cmsdk-apb-watchdog.h" | ||
71 | #include "hw/misc/unimp.h" | ||
72 | #include "cpu.h" | ||
73 | diff --git a/hw/input/stellaris_input.c b/hw/input/stellaris_input.c | ||
74 | index XXXXXXX..XXXXXXX 100644 | ||
75 | --- a/hw/input/stellaris_input.c | ||
76 | +++ b/hw/input/stellaris_input.c | ||
77 | @@ -XXX,XX +XXX,XX @@ | ||
78 | */ | ||
79 | #include "qemu/osdep.h" | ||
80 | #include "hw/hw.h" | ||
81 | -#include "hw/devices.h" | ||
82 | +#include "hw/input/gamepad.h" | ||
83 | #include "ui/console.h" | ||
84 | |||
85 | typedef struct { | ||
86 | diff --git a/MAINTAINERS b/MAINTAINERS | ||
87 | index XXXXXXX..XXXXXXX 100644 | ||
88 | --- a/MAINTAINERS | ||
89 | +++ b/MAINTAINERS | ||
90 | @@ -XXX,XX +XXX,XX @@ M: Peter Maydell <peter.maydell@linaro.org> | ||
91 | L: qemu-arm@nongnu.org | ||
92 | S: Maintained | ||
93 | F: hw/*/stellaris* | ||
94 | +F: include/hw/input/gamepad.h | ||
95 | |||
96 | Versatile Express | ||
97 | M: Peter Maydell <peter.maydell@linaro.org> | ||
98 | -- | ||
99 | 2.20.1 | ||
100 | |||
101 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
2 | 1 | ||
3 | Reviewed-by: Thomas Huth <thuth@redhat.com> | ||
4 | Reviewed-by: Markus Armbruster <armbru@redhat.com> | ||
5 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
6 | Message-id: 20190412165416.7977-11-philmd@redhat.com | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | --- | ||
9 | include/hw/net/ne2000-isa.h | 6 ++++++ | ||
10 | 1 file changed, 6 insertions(+) | ||
11 | |||
12 | diff --git a/include/hw/net/ne2000-isa.h b/include/hw/net/ne2000-isa.h | ||
13 | index XXXXXXX..XXXXXXX 100644 | ||
14 | --- a/include/hw/net/ne2000-isa.h | ||
15 | +++ b/include/hw/net/ne2000-isa.h | ||
16 | @@ -XXX,XX +XXX,XX @@ | ||
17 | * This work is licensed under the terms of the GNU GPL, version 2 or later. | ||
18 | * See the COPYING file in the top-level directory. | ||
19 | */ | ||
20 | + | ||
21 | +#ifndef HW_NET_NE2K_ISA_H | ||
22 | +#define HW_NET_NE2K_ISA_H | ||
23 | + | ||
24 | #include "hw/hw.h" | ||
25 | #include "hw/qdev.h" | ||
26 | #include "hw/isa/isa.h" | ||
27 | @@ -XXX,XX +XXX,XX @@ static inline ISADevice *isa_ne2000_init(ISABus *bus, int base, int irq, | ||
28 | } | ||
29 | return d; | ||
30 | } | ||
31 | + | ||
32 | +#endif | ||
33 | -- | ||
34 | 2.20.1 | ||
35 | |||
36 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
2 | 1 | ||
3 | Reviewed-by: Markus Armbruster <armbru@redhat.com> | ||
4 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
5 | Message-id: 20190412165416.7977-12-philmd@redhat.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | --- | ||
8 | include/hw/net/lan9118.h | 2 ++ | ||
9 | hw/arm/exynos4_boards.c | 3 ++- | ||
10 | hw/arm/mps2-tz.c | 3 ++- | ||
11 | hw/net/lan9118.c | 1 - | ||
12 | 4 files changed, 6 insertions(+), 3 deletions(-) | ||
13 | |||
14 | diff --git a/include/hw/net/lan9118.h b/include/hw/net/lan9118.h | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/include/hw/net/lan9118.h | ||
17 | +++ b/include/hw/net/lan9118.h | ||
18 | @@ -XXX,XX +XXX,XX @@ | ||
19 | #include "hw/irq.h" | ||
20 | #include "net/net.h" | ||
21 | |||
22 | +#define TYPE_LAN9118 "lan9118" | ||
23 | + | ||
24 | void lan9118_init(NICInfo *, uint32_t, qemu_irq); | ||
25 | |||
26 | #endif | ||
27 | diff --git a/hw/arm/exynos4_boards.c b/hw/arm/exynos4_boards.c | ||
28 | index XXXXXXX..XXXXXXX 100644 | ||
29 | --- a/hw/arm/exynos4_boards.c | ||
30 | +++ b/hw/arm/exynos4_boards.c | ||
31 | @@ -XXX,XX +XXX,XX @@ | ||
32 | #include "hw/arm/arm.h" | ||
33 | #include "exec/address-spaces.h" | ||
34 | #include "hw/arm/exynos4210.h" | ||
35 | +#include "hw/net/lan9118.h" | ||
36 | #include "hw/boards.h" | ||
37 | |||
38 | #undef DEBUG | ||
39 | @@ -XXX,XX +XXX,XX @@ static void lan9215_init(uint32_t base, qemu_irq irq) | ||
40 | /* This should be a 9215 but the 9118 is close enough */ | ||
41 | if (nd_table[0].used) { | ||
42 | qemu_check_nic_model(&nd_table[0], "lan9118"); | ||
43 | - dev = qdev_create(NULL, "lan9118"); | ||
44 | + dev = qdev_create(NULL, TYPE_LAN9118); | ||
45 | qdev_set_nic_properties(dev, &nd_table[0]); | ||
46 | qdev_prop_set_uint32(dev, "mode_16bit", 1); | ||
47 | qdev_init_nofail(dev); | ||
48 | diff --git a/hw/arm/mps2-tz.c b/hw/arm/mps2-tz.c | ||
49 | index XXXXXXX..XXXXXXX 100644 | ||
50 | --- a/hw/arm/mps2-tz.c | ||
51 | +++ b/hw/arm/mps2-tz.c | ||
52 | @@ -XXX,XX +XXX,XX @@ | ||
53 | #include "hw/arm/armsse.h" | ||
54 | #include "hw/dma/pl080.h" | ||
55 | #include "hw/ssi/pl022.h" | ||
56 | +#include "hw/net/lan9118.h" | ||
57 | #include "net/net.h" | ||
58 | #include "hw/core/split-irq.h" | ||
59 | |||
60 | @@ -XXX,XX +XXX,XX @@ static MemoryRegion *make_eth_dev(MPS2TZMachineState *mms, void *opaque, | ||
61 | * except that it doesn't support the checksum-offload feature. | ||
62 | */ | ||
63 | qemu_check_nic_model(nd, "lan9118"); | ||
64 | - mms->lan9118 = qdev_create(NULL, "lan9118"); | ||
65 | + mms->lan9118 = qdev_create(NULL, TYPE_LAN9118); | ||
66 | qdev_set_nic_properties(mms->lan9118, nd); | ||
67 | qdev_init_nofail(mms->lan9118); | ||
68 | |||
69 | diff --git a/hw/net/lan9118.c b/hw/net/lan9118.c | ||
70 | index XXXXXXX..XXXXXXX 100644 | ||
71 | --- a/hw/net/lan9118.c | ||
72 | +++ b/hw/net/lan9118.c | ||
73 | @@ -XXX,XX +XXX,XX @@ static const VMStateDescription vmstate_lan9118_packet = { | ||
74 | } | ||
75 | }; | ||
76 | |||
77 | -#define TYPE_LAN9118 "lan9118" | ||
78 | #define LAN9118(obj) OBJECT_CHECK(lan9118_state, (obj), TYPE_LAN9118) | ||
79 | |||
80 | typedef struct { | ||
81 | -- | ||
82 | 2.20.1 | ||
83 | |||
84 | diff view generated by jsdifflib |