1
A mixed bag, all bug fixes or similar small stuff.
1
Patches for rc1: nothing major, just some minor bugfixes and
2
code cleanups.
2
3
3
thanks
4
-- PMM
4
-- PMM
5
5
6
The following changes since commit f7e1914adad8885a5d4c70239ab90d901ed97e9f:
6
7
7
The following changes since commit 19eb2d4e736dc895f31fbd6b520e514f10cc08e0:
8
Merge remote-tracking branch 'remotes/alistair/tags/pull-riscv-to-apply-20201109' into staging (2020-11-10 09:24:56 +0000)
8
9
Merge remote-tracking branch 'remotes/thibault/tags/samuel-thibault' into staging (2019-05-07 10:43:32 +0100)
10
9
11
are available in the Git repository at:
10
are available in the Git repository at:
12
11
13
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20190507
12
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20201110
14
13
15
for you to fetch changes up to 63159601fb3e396b28da14cbb71e50ed3f5a0331:
14
for you to fetch changes up to b6c56c8a9a4064ea783f352f43c5df6231a110fa:
16
15
17
target/arm: Stop using variable length array in dc_zva (2019-05-07 12:55:04 +0100)
16
target/arm/translate-neon.c: Handle VTBL UNDEF case before VFP access check (2020-11-10 11:03:48 +0000)
18
17
19
----------------------------------------------------------------
18
----------------------------------------------------------------
20
target-arm queue:
19
target-arm queue:
21
* Stop using variable length array in dc_zva
20
* hw/arm/Kconfig: ARM_V7M depends on PTIMER
22
* Implement M-profile XPSR GE bits
21
* Minor coding style fixes
23
* Don't enable ARMV7M_EXCP_DEBUG from reset
22
* docs: add some notes on the sbsa-ref machine
24
* armv7m_nvic: NS BFAR and BFSR are RAZ/WI if BFHFNMINS == 0
23
* hw/arm/virt: Remove dependency on Cortex-A15 MPCore peripherals
25
* armv7m_nvic: Check subpriority in nvic_recompute_state_secure()
24
* target/arm: Fix neon VTBL/VTBX for len > 1
26
* fix various minor issues to allow building for Windows-on-ARM64
25
* hw/arm/armsse: Correct expansion MPC interrupt lines
27
* aspeed: Set SDRAM size
26
* hw/misc/stm32f2xx_syscfg: Remove extraneous IRQ
28
* Allow system registers for KVM guests to be changed by QEMU code
27
* hw/arm/nseries: Remove invalid/unnecessary n8x0_uart_setup()
29
* raspi: Diagnose requests for too much RAM
28
* hw/arm/musicpal: Don't connect two qemu_irqs directly to the same input
30
* virt: Support firmware configuration with -blockdev
29
* hw/arm/musicpal: Only use qdev_get_gpio_in() when necessary
30
* hw/arm/nseries: Check return value from load_image_targphys()
31
* tests/qtest/npcm7xx_rng-test: count runs properly
32
* target/arm/translate-neon.c: Handle VTBL UNDEF case before VFP access check
31
33
32
----------------------------------------------------------------
34
----------------------------------------------------------------
33
Cao Jiaxi (4):
35
Alex Bennée (1):
34
QEMU_PACKED: Remove gcc_struct attribute in Windows non x86 targets
36
docs: add some notes on the sbsa-ref machine
35
qga: Fix mingw compilation warnings on enum conversion
36
util/cacheinfo: Use uint64_t on LLP64 model to satisfy Windows ARM64
37
osdep: Fix mingw compilation regarding stdio formats
38
37
39
Joel Stanley (1):
38
AlexChen (1):
40
arm: aspeed: Set SDRAM size
39
ssi: Fix bad printf format specifiers
41
40
42
Markus Armbruster (3):
41
Andrew Jones (1):
43
pc: Rearrange pc_system_firmware_init()'s legacy -drive loop
42
hw/arm/Kconfig: ARM_V7M depends on PTIMER
44
pflash_cfi01: New pflash_cfi01_legacy_drive()
45
hw/arm/virt: Support firmware configuration with -blockdev
46
43
47
Peter Maydell (7):
44
Havard Skinnemoen (1):
48
hw/arm/raspi: Diagnose requests for too much RAM
45
tests/qtest/npcm7xx_rng-test: count runs properly
49
arm: Allow system registers for KVM guests to be changed by QEMU code
50
hw/arm/armv7m_nvic: Check subpriority in nvic_recompute_state_secure()
51
hw/intc/armv7m_nvic: NS BFAR and BFSR are RAZ/WI if BFHFNMINS == 0
52
hw/intc/armv7m_nvic: Don't enable ARMV7M_EXCP_DEBUG from reset
53
target/arm: Implement XPSR GE bits
54
target/arm: Stop using variable length array in dc_zva
55
46
56
contrib/libvhost-user/libvhost-user.h | 2 +-
47
Peter Maydell (2):
57
include/hw/arm/aspeed.h | 1 +
48
hw/arm/nseries: Check return value from load_image_targphys()
58
include/hw/arm/virt.h | 2 +
49
target/arm/translate-neon.c: Handle VTBL UNDEF case before VFP access check
59
include/hw/block/flash.h | 1 +
60
include/qemu/compiler.h | 2 +-
61
include/qemu/osdep.h | 10 +-
62
scripts/cocci-macro-file.h | 7 +-
63
target/arm/cpu.h | 13 ++-
64
hw/arm/aspeed.c | 8 ++
65
hw/arm/raspi.c | 7 ++
66
hw/arm/virt.c | 202 ++++++++++++++++++++++------------
67
hw/block/pflash_cfi01.c | 28 +++++
68
hw/i386/pc_sysfw.c | 18 +--
69
hw/intc/armv7m_nvic.c | 40 ++++++-
70
qga/commands-win32.c | 2 +-
71
target/arm/helper.c | 47 +++++++-
72
target/arm/kvm.c | 8 ++
73
target/arm/kvm32.c | 20 +---
74
target/arm/kvm64.c | 2 +
75
target/arm/machine.c | 2 +-
76
util/cacheinfo.c | 2 +-
77
21 files changed, 294 insertions(+), 130 deletions(-)
78
50
51
Philippe Mathieu-Daudé (6):
52
hw/arm/virt: Remove dependency on Cortex-A15 MPCore peripherals
53
hw/arm/armsse: Correct expansion MPC interrupt lines
54
hw/misc/stm32f2xx_syscfg: Remove extraneous IRQ
55
hw/arm/nseries: Remove invalid/unnecessary n8x0_uart_setup()
56
hw/arm/musicpal: Don't connect two qemu_irqs directly to the same input
57
hw/arm/musicpal: Only use qdev_get_gpio_in() when necessary
58
59
Richard Henderson (1):
60
target/arm: Fix neon VTBL/VTBX for len > 1
61
62
Xinhao Zhang (3):
63
target/arm: add spaces around operator
64
target/arm: Don't use '#' flag of printf format
65
target/arm: add space before the open parenthesis '('
66
67
docs/system/arm/sbsa.rst | 32 ++++++++++++++++++++++
68
docs/system/target-arm.rst | 1 +
69
include/hw/misc/stm32f2xx_syscfg.h | 2 --
70
target/arm/helper.h | 2 +-
71
hw/arm/armsse.c | 3 +-
72
hw/arm/musicpal.c | 40 +++++++++++++++++----------
73
hw/arm/nseries.c | 26 ++++++++----------
74
hw/arm/stm32f205_soc.c | 1 -
75
hw/misc/stm32f2xx_syscfg.c | 2 --
76
hw/ssi/imx_spi.c | 2 +-
77
hw/ssi/xilinx_spi.c | 2 +-
78
target/arm/arch_dump.c | 8 +++---
79
target/arm/arm-semi.c | 8 +++---
80
target/arm/helper.c | 2 +-
81
target/arm/op_helper.c | 23 +++++++++-------
82
target/arm/translate-a64.c | 4 +--
83
target/arm/translate.c | 2 +-
84
tests/qtest/npcm7xx_rng-test.c | 2 +-
85
hw/arm/Kconfig | 3 +-
86
target/arm/translate-neon.c.inc | 56 ++++++++++++++------------------------
87
20 files changed, 123 insertions(+), 98 deletions(-)
88
create mode 100644 docs/system/arm/sbsa.rst
89
diff view generated by jsdifflib
1
From: Cao Jiaxi <driver1998@foxmail.com>
1
From: Andrew Jones <drjones@redhat.com>
2
2
3
Windows ARM64 uses LLP64 model, which breaks current assumptions.
3
commit 32bd322a0134 ("hw/timer/armv7m_systick: Rewrite to use ptimers")
4
changed armv7m_systick to build on ptimers. Make sure we have ptimers
5
in the build when building armv7m_systick.
4
6
5
Signed-off-by: Cao Jiaxi <driver1998@foxmail.com>
7
Signed-off-by: Andrew Jones <drjones@redhat.com>
6
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
7
Reviewed-by: Thomas Huth <thuth@redhat.com>
8
Message-id: 20190503003707.10185-1-driver1998@foxmail.com
9
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
8
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
10
Tested-by: Philippe Mathieu-Daudé <philmd@redhat.com>
9
Message-id: 20201104103343.30392-1-drjones@redhat.com
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
11
---
13
util/cacheinfo.c | 2 +-
12
hw/arm/Kconfig | 1 +
14
1 file changed, 1 insertion(+), 1 deletion(-)
13
1 file changed, 1 insertion(+)
15
14
16
diff --git a/util/cacheinfo.c b/util/cacheinfo.c
15
diff --git a/hw/arm/Kconfig b/hw/arm/Kconfig
17
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
18
--- a/util/cacheinfo.c
17
--- a/hw/arm/Kconfig
19
+++ b/util/cacheinfo.c
18
+++ b/hw/arm/Kconfig
20
@@ -XXX,XX +XXX,XX @@ static void sys_cache_info(int *isize, int *dsize)
19
@@ -XXX,XX +XXX,XX @@ config ZYNQ
21
static void arch_cache_info(int *isize, int *dsize)
20
22
{
21
config ARM_V7M
23
if (*isize == 0 || *dsize == 0) {
22
bool
24
- unsigned long ctr;
23
+ select PTIMER
25
+ uint64_t ctr;
24
26
25
config ALLWINNER_A10
27
/* The real cache geometry is in CCSIDR_EL1/CLIDR_EL1/CSSELR_EL1,
26
bool
28
but (at least under Linux) these are marked protected by the
29
--
27
--
30
2.20.1
28
2.20.1
31
29
32
30
diff view generated by jsdifflib
New patch
1
From: AlexChen <alex.chen@huawei.com>
1
2
3
We should use printf format specifier "%u" instead of "%d" for
4
argument of type "unsigned int".
5
6
Reported-by: Euler Robot <euler.robot@huawei.com>
7
Signed-off-by: Alex Chen <alex.chen@huawei.com>
8
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
9
Message-id: 5FA280F5.8060902@huawei.com
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
12
hw/ssi/imx_spi.c | 2 +-
13
hw/ssi/xilinx_spi.c | 2 +-
14
2 files changed, 2 insertions(+), 2 deletions(-)
15
16
diff --git a/hw/ssi/imx_spi.c b/hw/ssi/imx_spi.c
17
index XXXXXXX..XXXXXXX 100644
18
--- a/hw/ssi/imx_spi.c
19
+++ b/hw/ssi/imx_spi.c
20
@@ -XXX,XX +XXX,XX @@ static const char *imx_spi_reg_name(uint32_t reg)
21
case ECSPI_MSGDATA:
22
return "ECSPI_MSGDATA";
23
default:
24
- sprintf(unknown, "%d ?", reg);
25
+ sprintf(unknown, "%u ?", reg);
26
return unknown;
27
}
28
}
29
diff --git a/hw/ssi/xilinx_spi.c b/hw/ssi/xilinx_spi.c
30
index XXXXXXX..XXXXXXX 100644
31
--- a/hw/ssi/xilinx_spi.c
32
+++ b/hw/ssi/xilinx_spi.c
33
@@ -XXX,XX +XXX,XX @@ static void xlx_spi_update_irq(XilinxSPI *s)
34
irq chain unless things really changed. */
35
if (pending != s->irqline) {
36
s->irqline = pending;
37
- DB_PRINT("irq_change of state %d ISR:%x IER:%X\n",
38
+ DB_PRINT("irq_change of state %u ISR:%x IER:%X\n",
39
pending, s->regs[R_IPISR], s->regs[R_IPIER]);
40
qemu_set_irq(s->irq, pending);
41
}
42
--
43
2.20.1
44
45
diff view generated by jsdifflib
1
Currently the dc_zva helper function uses a variable length
1
From: Xinhao Zhang <zhangxinhao1@huawei.com>
2
array. In fact we know (as the comment above remarks) that
3
the length of this array is bounded because the architecture
4
limits the block size and QEMU limits the target page size.
5
Use a fixed array size and assert that we don't run off it.
6
2
3
Fix code style. Operator needs spaces both sides.
4
5
Signed-off-by: Xinhao Zhang <zhangxinhao1@huawei.com>
6
Signed-off-by: Kai Deng <dengkai1@huawei.com>
7
Message-id: 20201103114529.638233-1-zhangxinhao1@huawei.com
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
9
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
10
Tested-by: Philippe Mathieu-Daudé <philmd@redhat.com>
11
Message-id: 20190503120448.13385-1-peter.maydell@linaro.org
12
---
10
---
13
target/arm/helper.c | 8 ++++++--
11
target/arm/arch_dump.c | 8 ++++----
14
1 file changed, 6 insertions(+), 2 deletions(-)
12
target/arm/arm-semi.c | 8 ++++----
13
target/arm/helper.c | 2 +-
14
3 files changed, 9 insertions(+), 9 deletions(-)
15
15
16
diff --git a/target/arm/arch_dump.c b/target/arm/arch_dump.c
17
index XXXXXXX..XXXXXXX 100644
18
--- a/target/arm/arch_dump.c
19
+++ b/target/arm/arch_dump.c
20
@@ -XXX,XX +XXX,XX @@ static int aarch64_write_elf64_prfpreg(WriteCoreDumpFunction f,
21
22
for (i = 0; i < 32; ++i) {
23
uint64_t *q = aa64_vfp_qreg(env, i);
24
- note.vfp.vregs[2*i + 0] = cpu_to_dump64(s, q[0]);
25
- note.vfp.vregs[2*i + 1] = cpu_to_dump64(s, q[1]);
26
+ note.vfp.vregs[2 * i + 0] = cpu_to_dump64(s, q[0]);
27
+ note.vfp.vregs[2 * i + 1] = cpu_to_dump64(s, q[1]);
28
}
29
30
if (s->dump_info.d_endian == ELFDATA2MSB) {
31
@@ -XXX,XX +XXX,XX @@ static int aarch64_write_elf64_prfpreg(WriteCoreDumpFunction f,
32
*/
33
for (i = 0; i < 32; ++i) {
34
uint64_t tmp = note.vfp.vregs[2*i];
35
- note.vfp.vregs[2*i] = note.vfp.vregs[2*i+1];
36
- note.vfp.vregs[2*i+1] = tmp;
37
+ note.vfp.vregs[2 * i] = note.vfp.vregs[2 * i + 1];
38
+ note.vfp.vregs[2 * i + 1] = tmp;
39
}
40
}
41
42
diff --git a/target/arm/arm-semi.c b/target/arm/arm-semi.c
43
index XXXXXXX..XXXXXXX 100644
44
--- a/target/arm/arm-semi.c
45
+++ b/target/arm/arm-semi.c
46
@@ -XXX,XX +XXX,XX @@ target_ulong do_arm_semihosting(CPUARMState *env)
47
if (use_gdb_syscalls()) {
48
arm_semi_open_guestfd = guestfd;
49
ret = arm_gdb_syscall(cpu, arm_semi_open_cb, "open,%s,%x,1a4", arg0,
50
- (int)arg2+1, gdb_open_modeflags[arg1]);
51
+ (int)arg2 + 1, gdb_open_modeflags[arg1]);
52
} else {
53
ret = set_swi_errno(env, open(s, open_modeflags[arg1], 0644));
54
if (ret == (uint32_t)-1) {
55
@@ -XXX,XX +XXX,XX @@ target_ulong do_arm_semihosting(CPUARMState *env)
56
GET_ARG(1);
57
if (use_gdb_syscalls()) {
58
ret = arm_gdb_syscall(cpu, arm_semi_cb, "unlink,%s",
59
- arg0, (int)arg1+1);
60
+ arg0, (int)arg1 + 1);
61
} else {
62
s = lock_user_string(arg0);
63
if (!s) {
64
@@ -XXX,XX +XXX,XX @@ target_ulong do_arm_semihosting(CPUARMState *env)
65
GET_ARG(3);
66
if (use_gdb_syscalls()) {
67
return arm_gdb_syscall(cpu, arm_semi_cb, "rename,%s,%s",
68
- arg0, (int)arg1+1, arg2, (int)arg3+1);
69
+ arg0, (int)arg1 + 1, arg2, (int)arg3 + 1);
70
} else {
71
char *s2;
72
s = lock_user_string(arg0);
73
@@ -XXX,XX +XXX,XX @@ target_ulong do_arm_semihosting(CPUARMState *env)
74
GET_ARG(1);
75
if (use_gdb_syscalls()) {
76
return arm_gdb_syscall(cpu, arm_semi_cb, "system,%s",
77
- arg0, (int)arg1+1);
78
+ arg0, (int)arg1 + 1);
79
} else {
80
s = lock_user_string(arg0);
81
if (!s) {
16
diff --git a/target/arm/helper.c b/target/arm/helper.c
82
diff --git a/target/arm/helper.c b/target/arm/helper.c
17
index XXXXXXX..XXXXXXX 100644
83
index XXXXXXX..XXXXXXX 100644
18
--- a/target/arm/helper.c
84
--- a/target/arm/helper.c
19
+++ b/target/arm/helper.c
85
+++ b/target/arm/helper.c
20
@@ -XXX,XX +XXX,XX @@
86
@@ -XXX,XX +XXX,XX @@ uint32_t HELPER(usad8)(uint32_t a, uint32_t b)
21
#include "qemu/osdep.h"
87
uint32_t sum;
22
+#include "qemu/units.h"
88
sum = do_usad(a, b);
23
#include "target/arm/idau.h"
89
sum += do_usad(a >> 8, b >> 8);
24
#include "trace.h"
90
- sum += do_usad(a >> 16, b >>16);
25
#include "cpu.h"
91
+ sum += do_usad(a >> 16, b >> 16);
26
@@ -XXX,XX +XXX,XX @@ void HELPER(dc_zva)(CPUARMState *env, uint64_t vaddr_in)
92
sum += do_usad(a >> 24, b >> 24);
27
* We know that in fact for any v8 CPU the page size is at least 4K
93
return sum;
28
* and the block size must be 2K or less, but TARGET_PAGE_SIZE is only
94
}
29
* 1K as an artefact of legacy v5 subpage support being present in the
30
- * same QEMU executable.
31
+ * same QEMU executable. So in practice the hostaddr[] array has
32
+ * two entries, given the current setting of TARGET_PAGE_BITS_MIN.
33
*/
34
int maxidx = DIV_ROUND_UP(blocklen, TARGET_PAGE_SIZE);
35
- void *hostaddr[maxidx];
36
+ void *hostaddr[DIV_ROUND_UP(2 * KiB, 1 << TARGET_PAGE_BITS_MIN)];
37
int try, i;
38
unsigned mmu_idx = cpu_mmu_index(env, false);
39
TCGMemOpIdx oi = make_memop_idx(MO_UB, mmu_idx);
40
41
+ assert(maxidx <= ARRAY_SIZE(hostaddr));
42
+
43
for (try = 0; try < 2; try++) {
44
45
for (i = 0; i < maxidx; i++) {
46
--
95
--
47
2.20.1
96
2.20.1
48
97
49
98
diff view generated by jsdifflib
1
From: Markus Armbruster <armbru@redhat.com>
1
From: Xinhao Zhang <zhangxinhao1@huawei.com>
2
2
3
Factored out of pc_system_firmware_init() so the next commit can reuse
3
Fix code style. Don't use '#' flag of printf format ('%#') in
4
it in hw/arm/virt.c.
4
format strings, use '0x' prefix instead
5
5
6
Signed-off-by: Markus Armbruster <armbru@redhat.com>
6
Signed-off-by: Xinhao Zhang <zhangxinhao1@huawei.com>
7
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
7
Signed-off-by: Kai Deng <dengkai1@huawei.com>
8
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
8
Message-id: 20201103114529.638233-2-zhangxinhao1@huawei.com
9
Message-id: 20190416091348.26075-3-armbru@redhat.com
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
11
---
12
include/hw/block/flash.h | 1 +
12
target/arm/translate-a64.c | 4 ++--
13
hw/block/pflash_cfi01.c | 28 ++++++++++++++++++++++++++++
13
1 file changed, 2 insertions(+), 2 deletions(-)
14
hw/i386/pc_sysfw.c | 16 ++--------------
15
3 files changed, 31 insertions(+), 14 deletions(-)
16
14
17
diff --git a/include/hw/block/flash.h b/include/hw/block/flash.h
15
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
18
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
19
--- a/include/hw/block/flash.h
17
--- a/target/arm/translate-a64.c
20
+++ b/include/hw/block/flash.h
18
+++ b/target/arm/translate-a64.c
21
@@ -XXX,XX +XXX,XX @@ PFlashCFI01 *pflash_cfi01_register(hwaddr base,
19
@@ -XXX,XX +XXX,XX @@ static void disas_simd_three_reg_same_fp16(DisasContext *s, uint32_t insn)
22
int be);
20
gen_helper_advsimd_acgt_f16(tcg_res, tcg_op1, tcg_op2, fpst);
23
BlockBackend *pflash_cfi01_get_blk(PFlashCFI01 *fl);
21
break;
24
MemoryRegion *pflash_cfi01_get_memory(PFlashCFI01 *fl);
22
default:
25
+void pflash_cfi01_legacy_drive(PFlashCFI01 *dev, DriveInfo *dinfo);
23
- fprintf(stderr, "%s: insn %#04x, fpop %#2x @ %#" PRIx64 "\n",
26
24
+ fprintf(stderr, "%s: insn 0x%04x, fpop 0x%2x @ 0x%" PRIx64 "\n",
27
/* pflash_cfi02.c */
25
__func__, insn, fpopcode, s->pc_curr);
28
26
g_assert_not_reached();
29
diff --git a/hw/block/pflash_cfi01.c b/hw/block/pflash_cfi01.c
27
}
30
index XXXXXXX..XXXXXXX 100644
28
@@ -XXX,XX +XXX,XX @@ static void disas_simd_two_reg_misc_fp16(DisasContext *s, uint32_t insn)
31
--- a/hw/block/pflash_cfi01.c
29
case 0x7f: /* FSQRT (vector) */
32
+++ b/hw/block/pflash_cfi01.c
30
break;
33
@@ -XXX,XX +XXX,XX @@
31
default:
34
#include "qapi/error.h"
32
- fprintf(stderr, "%s: insn %#04x fpop %#2x\n", __func__, insn, fpop);
35
#include "qemu/timer.h"
33
+ fprintf(stderr, "%s: insn 0x%04x fpop 0x%2x\n", __func__, insn, fpop);
36
#include "qemu/bitops.h"
34
g_assert_not_reached();
37
+#include "qemu/error-report.h"
38
#include "qemu/host-utils.h"
39
#include "qemu/log.h"
40
+#include "qemu/option.h"
41
#include "hw/sysbus.h"
42
+#include "sysemu/blockdev.h"
43
#include "sysemu/sysemu.h"
44
#include "trace.h"
45
46
@@ -XXX,XX +XXX,XX @@ MemoryRegion *pflash_cfi01_get_memory(PFlashCFI01 *fl)
47
return &fl->mem;
48
}
49
50
+/*
51
+ * Handle -drive if=pflash for machines that use properties.
52
+ * If @dinfo is null, do nothing.
53
+ * Else if @fl's property "drive" is already set, fatal error.
54
+ * Else set it to the BlockBackend with @dinfo.
55
+ */
56
+void pflash_cfi01_legacy_drive(PFlashCFI01 *fl, DriveInfo *dinfo)
57
+{
58
+ Location loc;
59
+
60
+ if (!dinfo) {
61
+ return;
62
+ }
63
+
64
+ loc_push_none(&loc);
65
+ qemu_opts_loc_restore(dinfo->opts);
66
+ if (fl->blk) {
67
+ error_report("clashes with -machine");
68
+ exit(1);
69
+ }
70
+ qdev_prop_set_drive(DEVICE(fl), "drive",
71
+ blk_by_legacy_dinfo(dinfo), &error_fatal);
72
+ loc_pop(&loc);
73
+}
74
+
75
static void postload_update_cb(void *opaque, int running, RunState state)
76
{
77
PFlashCFI01 *pfl = opaque;
78
diff --git a/hw/i386/pc_sysfw.c b/hw/i386/pc_sysfw.c
79
index XXXXXXX..XXXXXXX 100644
80
--- a/hw/i386/pc_sysfw.c
81
+++ b/hw/i386/pc_sysfw.c
82
@@ -XXX,XX +XXX,XX @@ void pc_system_firmware_init(PCMachineState *pcms,
83
{
84
PCMachineClass *pcmc = PC_MACHINE_GET_CLASS(pcms);
85
int i;
86
- DriveInfo *pflash_drv;
87
BlockBackend *pflash_blk[ARRAY_SIZE(pcms->flash)];
88
- Location loc;
89
90
if (!pcmc->pci_enabled) {
91
old_pc_system_rom_init(rom_memory, true);
92
@@ -XXX,XX +XXX,XX @@ void pc_system_firmware_init(PCMachineState *pcms,
93
94
/* Map legacy -drive if=pflash to machine properties */
95
for (i = 0; i < ARRAY_SIZE(pcms->flash); i++) {
96
- pflash_drv = drive_get(IF_PFLASH, 0, i);
97
- if (pflash_drv) {
98
- loc_push_none(&loc);
99
- qemu_opts_loc_restore(pflash_drv->opts);
100
- if (pflash_cfi01_get_blk(pcms->flash[i])) {
101
- error_report("clashes with -machine");
102
- exit(1);
103
- }
104
- qdev_prop_set_drive(DEVICE(pcms->flash[i]), "drive",
105
- blk_by_legacy_dinfo(pflash_drv), &error_fatal);
106
- loc_pop(&loc);
107
- }
108
+ pflash_cfi01_legacy_drive(pcms->flash[i],
109
+ drive_get(IF_PFLASH, 0, i));
110
pflash_blk[i] = pflash_cfi01_get_blk(pcms->flash[i]);
111
}
35
}
112
36
113
--
37
--
114
2.20.1
38
2.20.1
115
39
116
40
diff view generated by jsdifflib
1
From: Cao Jiaxi <driver1998@foxmail.com>
1
From: Xinhao Zhang <zhangxinhao1@huawei.com>
2
2
3
The win2qemu[] is supposed to be the conversion table to convert between
3
Fix code style. Space required before the open parenthesis '('.
4
STORAGE_BUS_TYPE in Windows SDK and GuestDiskBusType in qga.
5
4
6
But it was incorrectly written that it forces to set a GuestDiskBusType
5
Signed-off-by: Xinhao Zhang <zhangxinhao1@huawei.com>
7
value to STORAGE_BUS_TYPE, which generates an enum conversion warning in clang.
6
Signed-off-by: Kai Deng <dengkai1@huawei.com>
8
7
Message-id: 20201103114529.638233-3-zhangxinhao1@huawei.com
9
Suggested-by: Eric Blake <eblake@redhat.com>
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Cao Jiaxi <driver1998@foxmail.com>
11
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
12
Reviewed-by: Thomas Huth <thuth@redhat.com>
13
Message-id: 20190503003650.10137-1-driver1998@foxmail.com
14
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
15
Tested-by: Philippe Mathieu-Daudé <philmd@redhat.com>
16
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
---
10
---
18
qga/commands-win32.c | 2 +-
11
target/arm/translate.c | 2 +-
19
1 file changed, 1 insertion(+), 1 deletion(-)
12
1 file changed, 1 insertion(+), 1 deletion(-)
20
13
21
diff --git a/qga/commands-win32.c b/qga/commands-win32.c
14
diff --git a/target/arm/translate.c b/target/arm/translate.c
22
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
23
--- a/qga/commands-win32.c
16
--- a/target/arm/translate.c
24
+++ b/qga/commands-win32.c
17
+++ b/target/arm/translate.c
25
@@ -XXX,XX +XXX,XX @@ void qmp_guest_file_flush(int64_t handle, Error **errp)
18
@@ -XXX,XX +XXX,XX @@ static void arm_tr_tb_stop(DisasContextBase *dcbase, CPUState *cpu)
26
19
- Hardware watchpoints.
27
#ifdef CONFIG_QGA_NTDDSCSI
20
Hardware breakpoints have already been handled and skip this code.
28
21
*/
29
-static STORAGE_BUS_TYPE win2qemu[] = {
22
- switch(dc->base.is_jmp) {
30
+static GuestDiskBusType win2qemu[] = {
23
+ switch (dc->base.is_jmp) {
31
[BusTypeUnknown] = GUEST_DISK_BUS_TYPE_UNKNOWN,
24
case DISAS_NEXT:
32
[BusTypeScsi] = GUEST_DISK_BUS_TYPE_SCSI,
25
case DISAS_TOO_MANY:
33
[BusTypeAtapi] = GUEST_DISK_BUS_TYPE_IDE,
26
gen_goto_tb(dc, 1, dc->base.pc_next);
34
--
27
--
35
2.20.1
28
2.20.1
36
29
37
30
diff view generated by jsdifflib
1
The M-profile architecture specifies that the DebugMonitor exception
1
From: Alex Bennée <alex.bennee@linaro.org>
2
should be initially disabled, not enabled. It should be controlled
3
by the DEMCR register's MON_EN bit, but we don't implement that
4
register yet (like most of the debug architecture for M-profile).
5
2
6
Note that BKPT instructions will still work, because they
3
We should at least document what this machine is about.
7
will be escalated to HardFault.
8
4
5
Reviewed-by: Graeme Gregory <graeme@nuviainc.com>
6
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
7
Message-id: 20201104165254.24822-1-alex.bennee@linaro.org
8
Cc: Leif Lindholm <leif@nuviainc.com>
9
Cc: Shashi Mallela <shashi.mallela@linaro.org>
10
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
11
[PMM: fixed filename mismatch]
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
11
Message-id: 20190430131439.25251-4-peter.maydell@linaro.org
12
---
13
---
13
hw/intc/armv7m_nvic.c | 4 +++-
14
docs/system/arm/sbsa.rst | 32 ++++++++++++++++++++++++++++++++
14
1 file changed, 3 insertions(+), 1 deletion(-)
15
docs/system/target-arm.rst | 1 +
16
2 files changed, 33 insertions(+)
17
create mode 100644 docs/system/arm/sbsa.rst
15
18
16
diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c
19
diff --git a/docs/system/arm/sbsa.rst b/docs/system/arm/sbsa.rst
20
new file mode 100644
21
index XXXXXXX..XXXXXXX
22
--- /dev/null
23
+++ b/docs/system/arm/sbsa.rst
24
@@ -XXX,XX +XXX,XX @@
25
+Arm Server Base System Architecture Reference board (``sbsa-ref``)
26
+==================================================================
27
+
28
+While the `virt` board is a generic board platform that doesn't match
29
+any real hardware the `sbsa-ref` board intends to look like real
30
+hardware. The `Server Base System Architecture
31
+<https://developer.arm.com/documentation/den0029/latest>` defines a
32
+minimum base line of hardware support and importantly how the firmware
33
+reports that to any operating system. It is a static system that
34
+reports a very minimal DT to the firmware for non-discoverable
35
+information about components affected by the qemu command line (i.e.
36
+cpus and memory). As a result it must have a firmware specifically
37
+built to expect a certain hardware layout (as you would in a real
38
+machine).
39
+
40
+It is intended to be a machine for developing firmware and testing
41
+standards compliance with operating systems.
42
+
43
+Supported devices
44
+"""""""""""""""""
45
+
46
+The sbsa-ref board supports:
47
+
48
+ - A configurable number of AArch64 CPUs
49
+ - GIC version 3
50
+ - System bus AHCI controller
51
+ - System bus EHCI controller
52
+ - CDROM and hard disc on AHCI bus
53
+ - E1000E ethernet card on PCIe bus
54
+ - VGA display adaptor on PCIe bus
55
+ - A generic SBSA watchdog device
56
+
57
diff --git a/docs/system/target-arm.rst b/docs/system/target-arm.rst
17
index XXXXXXX..XXXXXXX 100644
58
index XXXXXXX..XXXXXXX 100644
18
--- a/hw/intc/armv7m_nvic.c
59
--- a/docs/system/target-arm.rst
19
+++ b/hw/intc/armv7m_nvic.c
60
+++ b/docs/system/target-arm.rst
20
@@ -XXX,XX +XXX,XX @@ static void armv7m_nvic_reset(DeviceState *dev)
61
@@ -XXX,XX +XXX,XX @@ undocumented; you can get a complete list by running
21
* the System Handler Control register
62
arm/mps2
22
*/
63
arm/musca
23
s->vectors[ARMV7M_EXCP_SVC].enabled = 1;
64
arm/realview
24
- s->vectors[ARMV7M_EXCP_DEBUG].enabled = 1;
65
+ arm/sbsa
25
s->vectors[ARMV7M_EXCP_PENDSV].enabled = 1;
66
arm/versatile
26
s->vectors[ARMV7M_EXCP_SYSTICK].enabled = 1;
67
arm/vexpress
27
68
arm/aspeed
28
+ /* DebugMonitor is enabled via DEMCR.MON_EN */
29
+ s->vectors[ARMV7M_EXCP_DEBUG].enabled = 0;
30
+
31
resetprio = arm_feature(&s->cpu->env, ARM_FEATURE_V8) ? -4 : -3;
32
s->vectors[ARMV7M_EXCP_RESET].prio = resetprio;
33
s->vectors[ARMV7M_EXCP_NMI].prio = -2;
34
--
69
--
35
2.20.1
70
2.20.1
36
71
37
72
diff view generated by jsdifflib
1
The non-secure versions of the BFAR and BFSR registers are
1
From: Philippe Mathieu-Daudé <philmd@redhat.com>
2
supposed to be RAZ/WI if AICR.BFHFNMINS == 0; we were
3
incorrectly allowing NS code to access the real values.
4
2
3
When using a Cortex-A15, the Virt machine does not use any
4
MPCore peripherals. Remove the dependency.
5
6
Fixes: 7951c7b7c05 ("hw/arm: Express dependencies of the virt machine with Kconfig")
7
Reported-by: Miroslav Rezanina <mrezanin@redhat.com>
8
Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com>
9
Message-id: 20201107114852.271922-1-philmd@redhat.com
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 20190430131439.25251-3-peter.maydell@linaro.org
8
---
12
---
9
hw/intc/armv7m_nvic.c | 27 ++++++++++++++++++++++++---
13
hw/arm/Kconfig | 1 -
10
1 file changed, 24 insertions(+), 3 deletions(-)
14
1 file changed, 1 deletion(-)
11
15
12
diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c
16
diff --git a/hw/arm/Kconfig b/hw/arm/Kconfig
13
index XXXXXXX..XXXXXXX 100644
17
index XXXXXXX..XXXXXXX 100644
14
--- a/hw/intc/armv7m_nvic.c
18
--- a/hw/arm/Kconfig
15
+++ b/hw/intc/armv7m_nvic.c
19
+++ b/hw/arm/Kconfig
16
@@ -XXX,XX +XXX,XX @@ static uint32_t nvic_readl(NVICState *s, uint32_t offset, MemTxAttrs attrs)
20
@@ -XXX,XX +XXX,XX @@ config ARM_VIRT
17
if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) {
21
imply VFIO_PLATFORM
18
goto bad_offset;
22
imply VFIO_XGMAC
19
}
23
imply TPM_TIS_SYSBUS
20
+ if (!attrs.secure &&
24
- select A15MPCORE
21
+ !(s->cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK)) {
25
select ACPI
22
+ return 0;
26
select ARM_SMMUV3
23
+ }
27
select GPIO_KEY
24
return cpu->env.v7m.bfar;
25
case 0xd3c: /* Aux Fault Status. */
26
/* TODO: Implement fault status registers. */
27
@@ -XXX,XX +XXX,XX @@ static void nvic_writel(NVICState *s, uint32_t offset, uint32_t value,
28
if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) {
29
goto bad_offset;
30
}
31
+ if (!attrs.secure &&
32
+ !(s->cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK)) {
33
+ return;
34
+ }
35
cpu->env.v7m.bfar = value;
36
return;
37
case 0xd3c: /* Aux Fault Status. */
38
@@ -XXX,XX +XXX,XX @@ static MemTxResult nvic_sysreg_read(void *opaque, hwaddr addr,
39
val = 0;
40
break;
41
};
42
- /* The BFSR bits [15:8] are shared between security states
43
- * and we store them in the NS copy
44
+ /*
45
+ * The BFSR bits [15:8] are shared between security states
46
+ * and we store them in the NS copy. They are RAZ/WI for
47
+ * NS code if AIRCR.BFHFNMINS is 0.
48
*/
49
val = s->cpu->env.v7m.cfsr[attrs.secure];
50
- val |= s->cpu->env.v7m.cfsr[M_REG_NS] & R_V7M_CFSR_BFSR_MASK;
51
+ if (!attrs.secure &&
52
+ !(s->cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK)) {
53
+ val &= ~R_V7M_CFSR_BFSR_MASK;
54
+ } else {
55
+ val |= s->cpu->env.v7m.cfsr[M_REG_NS] & R_V7M_CFSR_BFSR_MASK;
56
+ }
57
val = extract32(val, (offset - 0xd28) * 8, size * 8);
58
break;
59
case 0xfe0 ... 0xfff: /* ID. */
60
@@ -XXX,XX +XXX,XX @@ static MemTxResult nvic_sysreg_write(void *opaque, hwaddr addr,
61
*/
62
value <<= ((offset - 0xd28) * 8);
63
64
+ if (!attrs.secure &&
65
+ !(s->cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK)) {
66
+ /* BFSR bits are RAZ/WI for NS if BFHFNMINS is set */
67
+ value &= ~R_V7M_CFSR_BFSR_MASK;
68
+ }
69
+
70
s->cpu->env.v7m.cfsr[attrs.secure] &= ~value;
71
if (attrs.secure) {
72
/* The BFSR bits [15:8] are shared between security states
73
--
28
--
74
2.20.1
29
2.20.1
75
30
76
31
diff view generated by jsdifflib
1
At the moment the Arm implementations of kvm_arch_{get,put}_registers()
1
From: Richard Henderson <richard.henderson@linaro.org>
2
don't support having QEMU change the values of system registers
3
(aka coprocessor registers for AArch32). This is because although
4
kvm_arch_get_registers() calls write_list_to_cpustate() to
5
update the CPU state struct fields (so QEMU code can read the
6
values in the usual way), kvm_arch_put_registers() does not
7
call write_cpustate_to_list(), meaning that any changes to
8
the CPU state struct fields will not be passed back to KVM.
9
2
10
The rationale for this design is documented in a comment in the
3
The helper function did not get updated when we reorganized
11
AArch32 kvm_arch_put_registers() -- writing the values in the
4
the vector register file for SVE. Since then, the neon dregs
12
cpregs list into the CPU state struct is "lossy" because the
5
are non-sequential and cannot be simply indexed.
13
write of a register might not succeed, and so if we blindly
14
copy the CPU state values back again we will incorrectly
15
change register values for the guest. The assumption was that
16
no QEMU code would need to write to the registers.
17
6
18
However, when we implemented debug support for KVM guests, we
7
At the same time, make the helper function operate on 64-bit
19
broke that assumption: the code to handle "set the guest up
8
quantities so that we do not have to call it twice.
20
to take a breakpoint exception" does so by updating various
21
guest registers including ESR_EL1.
22
9
23
Support this by making kvm_arch_put_registers() synchronize
10
Fixes: c39c2b9043e
24
CPU state back into the list. We sync only those registers
11
Reported-by: Ard Biesheuvel <ardb@kernel.org>
25
where the initial write succeeds, which should be sufficient.
12
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
13
[PMM: use aa32_vfp_dreg() rather than opencoding]
14
Message-id: 20201105171126.88014-1-richard.henderson@linaro.org
15
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
16
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
---
18
target/arm/helper.h | 2 +-
19
target/arm/op_helper.c | 23 +++++++++--------
20
target/arm/translate-neon.c.inc | 44 +++++++++++----------------------
21
3 files changed, 29 insertions(+), 40 deletions(-)
26
22
27
This commit is the same as commit 823e1b3818f9b10b824ddc which we
23
diff --git a/target/arm/helper.h b/target/arm/helper.h
28
had to revert in commit 942f99c825fc94c8b1a4, except that the bug
29
which was preventing EDK2 guest firmware running has been fixed:
30
kvm_arm_reset_vcpu() now calls write_list_to_cpustate().
31
32
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
33
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
34
Tested-by: Eric Auger <eric.auger@redhat.com>
35
---
36
target/arm/cpu.h | 9 ++++++++-
37
target/arm/helper.c | 27 +++++++++++++++++++++++++--
38
target/arm/kvm.c | 8 ++++++++
39
target/arm/kvm32.c | 20 ++------------------
40
target/arm/kvm64.c | 2 ++
41
target/arm/machine.c | 2 +-
42
6 files changed, 46 insertions(+), 22 deletions(-)
43
44
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
45
index XXXXXXX..XXXXXXX 100644
24
index XXXXXXX..XXXXXXX 100644
46
--- a/target/arm/cpu.h
25
--- a/target/arm/helper.h
47
+++ b/target/arm/cpu.h
26
+++ b/target/arm/helper.h
48
@@ -XXX,XX +XXX,XX @@ bool write_list_to_cpustate(ARMCPU *cpu);
27
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_2(rsqrte_f32, TCG_CALL_NO_RWG, f32, f32, ptr)
49
/**
28
DEF_HELPER_FLAGS_2(rsqrte_f64, TCG_CALL_NO_RWG, f64, f64, ptr)
50
* write_cpustate_to_list:
29
DEF_HELPER_FLAGS_1(recpe_u32, TCG_CALL_NO_RWG, i32, i32)
51
* @cpu: ARMCPU
30
DEF_HELPER_FLAGS_1(rsqrte_u32, TCG_CALL_NO_RWG, i32, i32)
52
+ * @kvm_sync: true if this is for syncing back to KVM
31
-DEF_HELPER_FLAGS_4(neon_tbl, TCG_CALL_NO_RWG, i32, i32, i32, ptr, i32)
53
*
32
+DEF_HELPER_FLAGS_4(neon_tbl, TCG_CALL_NO_RWG, i64, env, i32, i64, i64)
54
* For each register listed in the ARMCPU cpreg_indexes list, write
33
55
* its value from the ARMCPUState structure into the cpreg_values list.
34
DEF_HELPER_3(shl_cc, i32, env, i32, i32)
56
* This is used to copy info from TCG's working data structures into
35
DEF_HELPER_3(shr_cc, i32, env, i32, i32)
57
* KVM or for outbound migration.
36
diff --git a/target/arm/op_helper.c b/target/arm/op_helper.c
58
*
59
+ * @kvm_sync is true if we are doing this in order to sync the
60
+ * register state back to KVM. In this case we will only update
61
+ * values in the list if the previous list->cpustate sync actually
62
+ * successfully wrote the CPU state. Otherwise we will keep the value
63
+ * that is in the list.
64
+ *
65
* Returns: true if all register values were read correctly,
66
* false if some register was unknown or could not be read.
67
* Note that we do not stop early on failure -- we will attempt
68
* reading all registers in the list.
69
*/
70
-bool write_cpustate_to_list(ARMCPU *cpu);
71
+bool write_cpustate_to_list(ARMCPU *cpu, bool kvm_sync);
72
73
#define ARM_CPUID_TI915T 0x54029152
74
#define ARM_CPUID_TI925T 0x54029252
75
diff --git a/target/arm/helper.c b/target/arm/helper.c
76
index XXXXXXX..XXXXXXX 100644
37
index XXXXXXX..XXXXXXX 100644
77
--- a/target/arm/helper.c
38
--- a/target/arm/op_helper.c
78
+++ b/target/arm/helper.c
39
+++ b/target/arm/op_helper.c
79
@@ -XXX,XX +XXX,XX @@ static bool raw_accessors_invalid(const ARMCPRegInfo *ri)
40
@@ -XXX,XX +XXX,XX @@ void raise_exception_ra(CPUARMState *env, uint32_t excp, uint32_t syndrome,
41
cpu_loop_exit_restore(cs, ra);
42
}
43
44
-uint32_t HELPER(neon_tbl)(uint32_t ireg, uint32_t def, void *vn,
45
- uint32_t maxindex)
46
+uint64_t HELPER(neon_tbl)(CPUARMState *env, uint32_t desc,
47
+ uint64_t ireg, uint64_t def)
48
{
49
- uint32_t val, shift;
50
- uint64_t *table = vn;
51
+ uint64_t tmp, val = 0;
52
+ uint32_t maxindex = ((desc & 3) + 1) * 8;
53
+ uint32_t base_reg = desc >> 2;
54
+ uint32_t shift, index, reg;
55
56
- val = 0;
57
- for (shift = 0; shift < 32; shift += 8) {
58
- uint32_t index = (ireg >> shift) & 0xff;
59
+ for (shift = 0; shift < 64; shift += 8) {
60
+ index = (ireg >> shift) & 0xff;
61
if (index < maxindex) {
62
- uint32_t tmp = (table[index >> 3] >> ((index & 7) << 3)) & 0xff;
63
- val |= tmp << shift;
64
+ reg = base_reg + (index >> 3);
65
+ tmp = *aa32_vfp_dreg(env, reg);
66
+ tmp = ((tmp >> ((index & 7) << 3)) & 0xff) << shift;
67
} else {
68
- val |= def & (0xff << shift);
69
+ tmp = def & (0xffull << shift);
70
}
71
+ val |= tmp;
72
}
73
return val;
74
}
75
diff --git a/target/arm/translate-neon.c.inc b/target/arm/translate-neon.c.inc
76
index XXXXXXX..XXXXXXX 100644
77
--- a/target/arm/translate-neon.c.inc
78
+++ b/target/arm/translate-neon.c.inc
79
@@ -XXX,XX +XXX,XX @@ static bool trans_VEXT(DisasContext *s, arg_VEXT *a)
80
81
static bool trans_VTBL(DisasContext *s, arg_VTBL *a)
82
{
83
- int n;
84
- TCGv_i32 tmp, tmp2, tmp3, tmp4;
85
- TCGv_ptr ptr1;
86
+ TCGv_i64 val, def;
87
+ TCGv_i32 desc;
88
89
if (!arm_dc_feature(s, ARM_FEATURE_NEON)) {
90
return false;
91
@@ -XXX,XX +XXX,XX @@ static bool trans_VTBL(DisasContext *s, arg_VTBL *a)
92
return true;
93
}
94
95
- n = a->len + 1;
96
- if ((a->vn + n) > 32) {
97
+ if ((a->vn + a->len + 1) > 32) {
98
/*
99
* This is UNPREDICTABLE; we choose to UNDEF to avoid the
100
* helper function running off the end of the register file.
101
*/
102
return false;
103
}
104
- n <<= 3;
105
- tmp = tcg_temp_new_i32();
106
- if (a->op) {
107
- read_neon_element32(tmp, a->vd, 0, MO_32);
108
- } else {
109
- tcg_gen_movi_i32(tmp, 0);
110
- }
111
- tmp2 = tcg_temp_new_i32();
112
- read_neon_element32(tmp2, a->vm, 0, MO_32);
113
- ptr1 = vfp_reg_ptr(true, a->vn);
114
- tmp4 = tcg_const_i32(n);
115
- gen_helper_neon_tbl(tmp2, tmp2, tmp, ptr1, tmp4);
116
117
+ desc = tcg_const_i32((a->vn << 2) | a->len);
118
+ def = tcg_temp_new_i64();
119
if (a->op) {
120
- read_neon_element32(tmp, a->vd, 1, MO_32);
121
+ read_neon_element64(def, a->vd, 0, MO_64);
122
} else {
123
- tcg_gen_movi_i32(tmp, 0);
124
+ tcg_gen_movi_i64(def, 0);
125
}
126
- tmp3 = tcg_temp_new_i32();
127
- read_neon_element32(tmp3, a->vm, 1, MO_32);
128
- gen_helper_neon_tbl(tmp3, tmp3, tmp, ptr1, tmp4);
129
- tcg_temp_free_i32(tmp);
130
- tcg_temp_free_i32(tmp4);
131
- tcg_temp_free_ptr(ptr1);
132
+ val = tcg_temp_new_i64();
133
+ read_neon_element64(val, a->vm, 0, MO_64);
134
135
- write_neon_element32(tmp2, a->vd, 0, MO_32);
136
- write_neon_element32(tmp3, a->vd, 1, MO_32);
137
- tcg_temp_free_i32(tmp2);
138
- tcg_temp_free_i32(tmp3);
139
+ gen_helper_neon_tbl(val, cpu_env, desc, val, def);
140
+ write_neon_element64(val, a->vd, 0, MO_64);
141
+
142
+ tcg_temp_free_i64(def);
143
+ tcg_temp_free_i64(val);
144
+ tcg_temp_free_i32(desc);
80
return true;
145
return true;
81
}
146
}
82
147
83
-bool write_cpustate_to_list(ARMCPU *cpu)
84
+bool write_cpustate_to_list(ARMCPU *cpu, bool kvm_sync)
85
{
86
/* Write the coprocessor state from cpu->env to the (index,value) list. */
87
int i;
88
@@ -XXX,XX +XXX,XX @@ bool write_cpustate_to_list(ARMCPU *cpu)
89
for (i = 0; i < cpu->cpreg_array_len; i++) {
90
uint32_t regidx = kvm_to_cpreg_id(cpu->cpreg_indexes[i]);
91
const ARMCPRegInfo *ri;
92
+ uint64_t newval;
93
94
ri = get_arm_cp_reginfo(cpu->cp_regs, regidx);
95
if (!ri) {
96
@@ -XXX,XX +XXX,XX @@ bool write_cpustate_to_list(ARMCPU *cpu)
97
if (ri->type & ARM_CP_NO_RAW) {
98
continue;
99
}
100
- cpu->cpreg_values[i] = read_raw_cp_reg(&cpu->env, ri);
101
+
102
+ newval = read_raw_cp_reg(&cpu->env, ri);
103
+ if (kvm_sync) {
104
+ /*
105
+ * Only sync if the previous list->cpustate sync succeeded.
106
+ * Rather than tracking the success/failure state for every
107
+ * item in the list, we just recheck "does the raw write we must
108
+ * have made in write_list_to_cpustate() read back OK" here.
109
+ */
110
+ uint64_t oldval = cpu->cpreg_values[i];
111
+
112
+ if (oldval == newval) {
113
+ continue;
114
+ }
115
+
116
+ write_raw_cp_reg(&cpu->env, ri, oldval);
117
+ if (read_raw_cp_reg(&cpu->env, ri) != oldval) {
118
+ continue;
119
+ }
120
+
121
+ write_raw_cp_reg(&cpu->env, ri, newval);
122
+ }
123
+ cpu->cpreg_values[i] = newval;
124
}
125
return ok;
126
}
127
diff --git a/target/arm/kvm.c b/target/arm/kvm.c
128
index XXXXXXX..XXXXXXX 100644
129
--- a/target/arm/kvm.c
130
+++ b/target/arm/kvm.c
131
@@ -XXX,XX +XXX,XX @@ void kvm_arm_reset_vcpu(ARMCPU *cpu)
132
fprintf(stderr, "write_kvmstate_to_list failed\n");
133
abort();
134
}
135
+ /*
136
+ * Sync the reset values also into the CPUState. This is necessary
137
+ * because the next thing we do will be a kvm_arch_put_registers()
138
+ * which will update the list values from the CPUState before copying
139
+ * the list values back to KVM. It's OK to ignore failure returns here
140
+ * for the same reason we do so in kvm_arch_get_registers().
141
+ */
142
+ write_list_to_cpustate(cpu);
143
}
144
145
/*
146
diff --git a/target/arm/kvm32.c b/target/arm/kvm32.c
147
index XXXXXXX..XXXXXXX 100644
148
--- a/target/arm/kvm32.c
149
+++ b/target/arm/kvm32.c
150
@@ -XXX,XX +XXX,XX @@ int kvm_arch_put_registers(CPUState *cs, int level)
151
return ret;
152
}
153
154
- /* Note that we do not call write_cpustate_to_list()
155
- * here, so we are only writing the tuple list back to
156
- * KVM. This is safe because nothing can change the
157
- * CPUARMState cp15 fields (in particular gdb accesses cannot)
158
- * and so there are no changes to sync. In fact syncing would
159
- * be wrong at this point: for a constant register where TCG and
160
- * KVM disagree about its value, the preceding write_list_to_cpustate()
161
- * would not have had any effect on the CPUARMState value (since the
162
- * register is read-only), and a write_cpustate_to_list() here would
163
- * then try to write the TCG value back into KVM -- this would either
164
- * fail or incorrectly change the value the guest sees.
165
- *
166
- * If we ever want to allow the user to modify cp15 registers via
167
- * the gdb stub, we would need to be more clever here (for instance
168
- * tracking the set of registers kvm_arch_get_registers() successfully
169
- * managed to update the CPUARMState with, and only allowing those
170
- * to be written back up into the kernel).
171
- */
172
+ write_cpustate_to_list(cpu, true);
173
+
174
if (!write_list_to_kvmstate(cpu, level)) {
175
return EINVAL;
176
}
177
diff --git a/target/arm/kvm64.c b/target/arm/kvm64.c
178
index XXXXXXX..XXXXXXX 100644
179
--- a/target/arm/kvm64.c
180
+++ b/target/arm/kvm64.c
181
@@ -XXX,XX +XXX,XX @@ int kvm_arch_put_registers(CPUState *cs, int level)
182
return ret;
183
}
184
185
+ write_cpustate_to_list(cpu, true);
186
+
187
if (!write_list_to_kvmstate(cpu, level)) {
188
return EINVAL;
189
}
190
diff --git a/target/arm/machine.c b/target/arm/machine.c
191
index XXXXXXX..XXXXXXX 100644
192
--- a/target/arm/machine.c
193
+++ b/target/arm/machine.c
194
@@ -XXX,XX +XXX,XX @@ static int cpu_pre_save(void *opaque)
195
abort();
196
}
197
} else {
198
- if (!write_cpustate_to_list(cpu)) {
199
+ if (!write_cpustate_to_list(cpu, false)) {
200
/* This should never fail. */
201
abort();
202
}
203
--
148
--
204
2.20.1
149
2.20.1
205
150
206
151
diff view generated by jsdifflib
1
From: Cao Jiaxi <driver1998@foxmail.com>
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
2
2
3
I encountered the following compilation error on mingw:
3
We can use one MPC per SRAM bank, but we currently only wire the
4
IRQ from the first expansion MPC to the IRQ splitter. Fix that.
4
5
5
/mnt/d/qemu/include/qemu/osdep.h:97:9: error: '__USE_MINGW_ANSI_STDIO' macro redefined [-Werror,-Wmacro-redefined]
6
Fixes: bb75e16d5e6 ("hw/arm/iotkit: Wire up MPC interrupt lines")
6
#define __USE_MINGW_ANSI_STDIO 1
7
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
7
^
8
Message-id: 20201107193403.436146-2-f4bug@amsat.org
8
/mnt/d/llvm-mingw/aarch64-w64-mingw32/include/_mingw.h:433:9: note: previous definition is here
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
#define __USE_MINGW_ANSI_STDIO 0 /* was not defined so it should be 0 */
10
11
It turns out that __USE_MINGW_ANSI_STDIO must be set before any
12
system headers are included, not just before stdio.h.
13
14
Signed-off-by: Cao Jiaxi <driver1998@foxmail.com>
15
Reviewed-by: Thomas Huth <thuth@redhat.com>
16
Reviewed-by: Stefan Weil <sw@weilnetz.de>
17
Message-id: 20190503003719.10233-1-driver1998@foxmail.com
18
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
19
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
20
---
11
---
21
include/qemu/osdep.h | 10 +++++-----
12
hw/arm/armsse.c | 3 ++-
22
1 file changed, 5 insertions(+), 5 deletions(-)
13
1 file changed, 2 insertions(+), 1 deletion(-)
23
14
24
diff --git a/include/qemu/osdep.h b/include/qemu/osdep.h
15
diff --git a/hw/arm/armsse.c b/hw/arm/armsse.c
25
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
26
--- a/include/qemu/osdep.h
17
--- a/hw/arm/armsse.c
27
+++ b/include/qemu/osdep.h
18
+++ b/hw/arm/armsse.c
28
@@ -XXX,XX +XXX,XX @@ extern int daemon(int, int);
19
@@ -XXX,XX +XXX,XX @@ static void armsse_realize(DeviceState *dev, Error **errp)
29
#endif
20
qdev_get_gpio_in(dev_splitter, 0));
30
#endif
21
qdev_connect_gpio_out(dev_splitter, 0,
31
22
qdev_get_gpio_in_named(dev_secctl,
32
+/* enable C99/POSIX format strings (needs mingw32-runtime 3.15 or later) */
23
- "mpc_status", 0));
33
+#ifdef __MINGW32__
24
+ "mpc_status",
34
+#define __USE_MINGW_ANSI_STDIO 1
25
+ i - IOTS_NUM_EXP_MPC));
35
+#endif
26
}
36
+
27
37
#include <stdarg.h>
28
qdev_connect_gpio_out(dev_splitter, 1,
38
#include <stddef.h>
39
#include <stdbool.h>
40
#include <stdint.h>
41
#include <sys/types.h>
42
#include <stdlib.h>
43
-
44
-/* enable C99/POSIX format strings (needs mingw32-runtime 3.15 or later) */
45
-#ifdef __MINGW32__
46
-#define __USE_MINGW_ANSI_STDIO 1
47
-#endif
48
#include <stdio.h>
49
50
#include <string.h>
51
--
29
--
52
2.20.1
30
2.20.1
53
31
54
32
diff view generated by jsdifflib
1
From: Cao Jiaxi <driver1998@foxmail.com>
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
2
2
3
gcc_struct is for x86 only, and it generates an warning on ARM64 Clang/MinGW targets.
3
The system configuration controller (SYSCFG) doesn't have
4
any output IRQ (and the INTC input #71 belongs to the UART6).
5
Remove the invalid code.
4
6
5
Signed-off-by: Cao Jiaxi <driver1998@foxmail.com>
7
Fixes: db635521a02 ("stm32f205: Add the stm32f205 SoC")
6
Reviewed-by: Thomas Huth <thuth@redhat.com>
8
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
7
Message-id: 20190503003618.10089-1-driver1998@foxmail.com
9
Message-id: 20201107193403.436146-3-f4bug@amsat.org
8
[PMM: dropped the slirp change as slirp is now a submodule]
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
12
---
11
contrib/libvhost-user/libvhost-user.h | 2 +-
13
include/hw/misc/stm32f2xx_syscfg.h | 2 --
12
include/qemu/compiler.h | 2 +-
14
hw/arm/stm32f205_soc.c | 1 -
13
scripts/cocci-macro-file.h | 7 ++++++-
15
hw/misc/stm32f2xx_syscfg.c | 2 --
14
3 files changed, 8 insertions(+), 3 deletions(-)
16
3 files changed, 5 deletions(-)
15
17
16
diff --git a/contrib/libvhost-user/libvhost-user.h b/contrib/libvhost-user/libvhost-user.h
18
diff --git a/include/hw/misc/stm32f2xx_syscfg.h b/include/hw/misc/stm32f2xx_syscfg.h
17
index XXXXXXX..XXXXXXX 100644
19
index XXXXXXX..XXXXXXX 100644
18
--- a/contrib/libvhost-user/libvhost-user.h
20
--- a/include/hw/misc/stm32f2xx_syscfg.h
19
+++ b/contrib/libvhost-user/libvhost-user.h
21
+++ b/include/hw/misc/stm32f2xx_syscfg.h
20
@@ -XXX,XX +XXX,XX @@ typedef struct VhostUserInflight {
22
@@ -XXX,XX +XXX,XX @@ struct STM32F2XXSyscfgState {
21
uint16_t queue_size;
23
uint32_t syscfg_exticr3;
22
} VhostUserInflight;
24
uint32_t syscfg_exticr4;
23
25
uint32_t syscfg_cmpcr;
24
-#if defined(_WIN32)
26
-
25
+#if defined(_WIN32) && (defined(__x86_64__) || defined(__i386__))
27
- qemu_irq irq;
26
# define VU_PACKED __attribute__((gcc_struct, packed))
28
};
27
#else
29
28
# define VU_PACKED __attribute__((packed))
30
#endif /* HW_STM32F2XX_SYSCFG_H */
29
diff --git a/include/qemu/compiler.h b/include/qemu/compiler.h
31
diff --git a/hw/arm/stm32f205_soc.c b/hw/arm/stm32f205_soc.c
30
index XXXXXXX..XXXXXXX 100644
32
index XXXXXXX..XXXXXXX 100644
31
--- a/include/qemu/compiler.h
33
--- a/hw/arm/stm32f205_soc.c
32
+++ b/include/qemu/compiler.h
34
+++ b/hw/arm/stm32f205_soc.c
33
@@ -XXX,XX +XXX,XX @@
35
@@ -XXX,XX +XXX,XX @@ static void stm32f205_soc_realize(DeviceState *dev_soc, Error **errp)
34
36
}
35
#define QEMU_SENTINEL __attribute__((sentinel))
37
busdev = SYS_BUS_DEVICE(dev);
36
38
sysbus_mmio_map(busdev, 0, 0x40013800);
37
-#if defined(_WIN32)
39
- sysbus_connect_irq(busdev, 0, qdev_get_gpio_in(armv7m, 71));
38
+#if defined(_WIN32) && (defined(__x86_64__) || defined(__i386__))
40
39
# define QEMU_PACKED __attribute__((gcc_struct, packed))
41
/* Attach UART (uses USART registers) and USART controllers */
40
#else
42
for (i = 0; i < STM_NUM_USARTS; i++) {
41
# define QEMU_PACKED __attribute__((packed))
43
diff --git a/hw/misc/stm32f2xx_syscfg.c b/hw/misc/stm32f2xx_syscfg.c
42
diff --git a/scripts/cocci-macro-file.h b/scripts/cocci-macro-file.h
43
index XXXXXXX..XXXXXXX 100644
44
index XXXXXXX..XXXXXXX 100644
44
--- a/scripts/cocci-macro-file.h
45
--- a/hw/misc/stm32f2xx_syscfg.c
45
+++ b/scripts/cocci-macro-file.h
46
+++ b/hw/misc/stm32f2xx_syscfg.c
46
@@ -XXX,XX +XXX,XX @@
47
@@ -XXX,XX +XXX,XX @@ static void stm32f2xx_syscfg_init(Object *obj)
47
#define QEMU_NORETURN __attribute__ ((__noreturn__))
48
{
48
#define QEMU_WARN_UNUSED_RESULT __attribute__((warn_unused_result))
49
STM32F2XXSyscfgState *s = STM32F2XX_SYSCFG(obj);
49
#define QEMU_SENTINEL __attribute__((sentinel))
50
50
-#define QEMU_PACKED __attribute__((gcc_struct, packed))
51
- sysbus_init_irq(SYS_BUS_DEVICE(obj), &s->irq);
51
+
52
-
52
+#if defined(_WIN32) && (defined(__x86_64__) || defined(__i386__))
53
memory_region_init_io(&s->mmio, obj, &stm32f2xx_syscfg_ops, s,
53
+# define QEMU_PACKED __attribute__((gcc_struct, packed))
54
TYPE_STM32F2XX_SYSCFG, 0x400);
54
+#else
55
sysbus_init_mmio(SYS_BUS_DEVICE(obj), &s->mmio);
55
+# define QEMU_PACKED __attribute__((packed))
56
+#endif
57
58
#define cat(x,y) x ## y
59
#define cat2(x,y) cat(x,y)
60
--
56
--
61
2.20.1
57
2.20.1
62
58
63
59
diff view generated by jsdifflib
1
In the M-profile architecture, if the CPU implements the DSP extension
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
2
then the XPSR has GE bits, in the same way as the A-profile CPSR. When
3
we added DSP extension support we forgot to add support for reading
4
and writing the GE bits, which are stored in env->GE. We did put in
5
the code to add XPSR_GE to the mask of bits to update in the v7m_msr
6
helper, but forgot it in v7m_mrs. We also must not allow the XPSR we
7
pull off the stack on exception return to set the nonexistent GE bits.
8
Correct these errors:
9
* read and write env->GE in xpsr_read() and xpsr_write()
10
* only set GE bits on exception return if DSP present
11
* read GE bits for MRS if DSP present
12
2
3
omap2420_mpu_init() introduced in commit 827df9f3c5f ("Add basic
4
OMAP2 chip support") takes care of creating the 3 UARTs.
5
6
Then commit 58a26b477e9 ("Emulate a serial bluetooth HCI with H4+
7
extensions and attach to n8x0's UART") added n8x0_uart_setup()
8
which create the UART and connects it to an IRQ output,
9
overwritting the existing peripheral and its IRQ connection.
10
This is incorrect.
11
12
Fortunately we don't need to fix this, because commit 6da68df7f9b
13
("hw/arm/nseries: Replace the bluetooth chardev with a "null"
14
chardev") removed the use of this peripheral. We can simply
15
remove the code.
16
17
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
18
Message-id: 20201107193403.436146-4-f4bug@amsat.org
19
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
20
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
15
Message-id: 20190430131439.25251-5-peter.maydell@linaro.org
16
---
21
---
17
target/arm/cpu.h | 4 ++++
22
hw/arm/nseries.c | 11 -----------
18
target/arm/helper.c | 12 ++++++++++--
23
1 file changed, 11 deletions(-)
19
2 files changed, 14 insertions(+), 2 deletions(-)
20
24
21
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
25
diff --git a/hw/arm/nseries.c b/hw/arm/nseries.c
22
index XXXXXXX..XXXXXXX 100644
26
index XXXXXXX..XXXXXXX 100644
23
--- a/target/arm/cpu.h
27
--- a/hw/arm/nseries.c
24
+++ b/target/arm/cpu.h
28
+++ b/hw/arm/nseries.c
25
@@ -XXX,XX +XXX,XX @@ static inline uint32_t xpsr_read(CPUARMState *env)
29
@@ -XXX,XX +XXX,XX @@ static void n8x0_cbus_setup(struct n800_s *s)
26
| (env->CF << 29) | ((env->VF & 0x80000000) >> 3) | (env->QF << 27)
30
cbus_attach(cbus, s->tahvo = tahvo_init(tahvo_irq, 1));
27
| (env->thumb << 24) | ((env->condexec_bits & 3) << 25)
28
| ((env->condexec_bits & 0xfc) << 8)
29
+ | (env->GE << 16)
30
| env->v7m.exception;
31
}
31
}
32
32
33
@@ -XXX,XX +XXX,XX @@ static inline void xpsr_write(CPUARMState *env, uint32_t val, uint32_t mask)
33
-static void n8x0_uart_setup(struct n800_s *s)
34
if (mask & XPSR_Q) {
34
-{
35
env->QF = ((val & XPSR_Q) != 0);
35
- Chardev *radio = qemu_chr_new("bt-dummy-uart", "null", NULL);
36
- /*
37
- * Note: We used to connect N8X0_BT_RESET_GPIO and N8X0_BT_WKUP_GPIO
38
- * here, but this code has been removed with the bluetooth backend.
39
- */
40
- omap_uart_attach(s->mpu->uart[BT_UART], radio);
41
-}
42
-
43
static void n8x0_usb_setup(struct n800_s *s)
44
{
45
SysBusDevice *dev;
46
@@ -XXX,XX +XXX,XX @@ static void n8x0_init(MachineState *machine,
47
n8x0_spi_setup(s);
48
n8x0_dss_setup(s);
49
n8x0_cbus_setup(s);
50
- n8x0_uart_setup(s);
51
if (machine_usb(machine)) {
52
n8x0_usb_setup(s);
36
}
53
}
37
+ if (mask & XPSR_GE) {
38
+ env->GE = (val & XPSR_GE) >> 16;
39
+ }
40
if (mask & XPSR_T) {
41
env->thumb = ((val & XPSR_T) != 0);
42
}
43
diff --git a/target/arm/helper.c b/target/arm/helper.c
44
index XXXXXXX..XXXXXXX 100644
45
--- a/target/arm/helper.c
46
+++ b/target/arm/helper.c
47
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
48
{
49
CPUARMState *env = &cpu->env;
50
uint32_t excret;
51
- uint32_t xpsr;
52
+ uint32_t xpsr, xpsr_mask;
53
bool ufault = false;
54
bool sfault = false;
55
bool return_to_sp_process;
56
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
57
}
58
*frame_sp_p = frameptr;
59
}
60
+
61
+ xpsr_mask = ~(XPSR_SPREALIGN | XPSR_SFPA);
62
+ if (!arm_feature(env, ARM_FEATURE_THUMB_DSP)) {
63
+ xpsr_mask &= ~XPSR_GE;
64
+ }
65
/* This xpsr_write() will invalidate frame_sp_p as it may switch stack */
66
- xpsr_write(env, xpsr, ~(XPSR_SPREALIGN | XPSR_SFPA));
67
+ xpsr_write(env, xpsr, xpsr_mask);
68
69
if (env->v7m.secure) {
70
bool sfpa = xpsr & XPSR_SFPA;
71
@@ -XXX,XX +XXX,XX @@ uint32_t HELPER(v7m_mrs)(CPUARMState *env, uint32_t reg)
72
}
73
if (!(reg & 4)) {
74
mask |= XPSR_NZCV | XPSR_Q; /* APSR */
75
+ if (arm_feature(env, ARM_FEATURE_THUMB_DSP)) {
76
+ mask |= XPSR_GE;
77
+ }
78
}
79
/* EPSR reads as zero */
80
return xpsr_read(env) & mask;
81
--
54
--
82
2.20.1
55
2.20.1
83
56
84
57
diff view generated by jsdifflib
1
From: Markus Armbruster <armbru@redhat.com>
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
2
2
3
The ARM virt machines put firmware in flash memory. To configure it,
3
The MusicPal board code connects both of the IRQ outputs of the UART
4
you use -drive if=pflash,unit=0,... and optionally -drive
4
to the same INTC qemu_irq. Connecting two qemu_irqs outputs directly
5
if=pflash,unit=1,...
5
to the same input is not valid as it produces subtly wrong behaviour
6
(for instance if both the IRQ lines are high, and then one goes
7
low, the INTC input will see this as a high-to-low transition
8
even though the second IRQ line should still be holding it high).
6
9
7
Why two -drive? This permits setting up one part of the flash memory
10
This kind of wiring needs an explicitly created OR gate; add one.
8
read-only, and the other part read/write. It also makes upgrading
9
firmware on the host easier. Below the hood, we get two separate
10
flash devices, because we were too lazy to improve our flash device
11
models to support sector protection.
12
11
13
The problem at hand is to do the same with -blockdev somehow, as one
12
Inspired-by: Peter Maydell <peter.maydell@linaro.org>
14
more step towards deprecating -drive.
13
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
15
14
Message-id: 20201107193403.436146-5-f4bug@amsat.org
16
We recently solved this problem for x86 PC machines, in commit
17
ebc29e1beab. See the commit message for design rationale.
18
19
This commit solves it for ARM virt basically the same way: new machine
20
properties pflash0, pflash1 forward to the onboard flash devices'
21
properties. Requires creating the onboard devices in the
22
.instance_init() method virt_instance_init(). The existing code to
23
pick up drives defined with -drive if=pflash is replaced by code to
24
desugar into the machine properties.
25
26
There are a few behavioral differences, though:
27
28
* The flash devices are always present (x86: only present if
29
configured)
30
31
* Flash base addresses and sizes are fixed (x86: sizes depend on
32
images, mapped back to back below a fixed address)
33
34
* -bios configures contents of first pflash (x86: -bios configures ROM
35
contents)
36
37
* -bios is rejected when first pflash is also configured with -machine
38
pflash0=... (x86: bios is silently ignored then)
39
40
* -machine pflash1=... does not require -machine pflash0=... (x86: it
41
does).
42
43
The actual code is a bit simpler than for x86 mostly due to the first
44
two differences.
45
46
Before the patch, all the action is in create_flash(), called from the
47
machine's .init() method machvirt_init():
48
49
main()
50
machine_run_board_init()
51
machvirt_init()
52
create_flash()
53
create_one_flash() for flash[0]
54
create
55
configure
56
includes obeying -drive if=pflash,unit=0
57
realize
58
map
59
fall back to -bios
60
create_one_flash() for flash[1]
61
create
62
configure
63
includes obeying -drive if=pflash,unit=1
64
realize
65
map
66
update FDT
67
68
To make the machine properties work, we need to move device creation
69
to its .instance_init() method virt_instance_init().
70
71
Another complication is machvirt_init()'s computation of
72
@firmware_loaded: it predicts what create_flash() will do. Instead of
73
predicting what create_flash()'s replacement virt_firmware_init() will
74
do, I decided to have virt_firmware_init() return what it did.
75
Requires calling it a bit earlier.
76
77
Resulting call tree:
78
79
main()
80
current_machine = object_new()
81
...
82
virt_instance_init()
83
virt_flash_create()
84
virt_flash_create1() for flash[0]
85
create
86
configure: set defaults
87
become child of machine [NEW]
88
add machine prop pflash0 as alias for drive [NEW]
89
virt_flash_create1() for flash[1]
90
create
91
configure: set defaults
92
become child of machine [NEW]
93
add machine prop pflash1 as alias for drive [NEW]
94
for all machine props from the command line: machine_set_property()
95
...
96
property_set_alias() for machine props pflash0, pflash1
97
...
98
set_drive() for cfi.pflash01 prop drive
99
this is how -machine pflash0=... etc set
100
machine_run_board_init(current_machine);
101
virt_firmware_init()
102
pflash_cfi01_legacy_drive()
103
legacy -drive if=pflash,unit=0 and =1 [NEW]
104
virt_flash_map()
105
virt_flash_map1() for flash[0]
106
configure: num-blocks
107
realize
108
map
109
virt_flash_map1() for flash[1]
110
configure: num-blocks
111
realize
112
map
113
fall back to -bios
114
virt_flash_fdt()
115
update FDT
116
117
You have László to thank for making me explain this in detail.
118
119
Signed-off-by: Markus Armbruster <armbru@redhat.com>
120
Acked-by: Laszlo Ersek <lersek@redhat.com>
121
Message-id: 20190416091348.26075-4-armbru@redhat.com
122
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
15
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
123
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
124
---
17
---
125
include/hw/arm/virt.h | 2 +
18
hw/arm/musicpal.c | 17 +++++++++++++----
126
hw/arm/virt.c | 202 +++++++++++++++++++++++++++---------------
19
hw/arm/Kconfig | 1 +
127
2 files changed, 132 insertions(+), 72 deletions(-)
20
2 files changed, 14 insertions(+), 4 deletions(-)
128
21
129
diff --git a/include/hw/arm/virt.h b/include/hw/arm/virt.h
22
diff --git a/hw/arm/musicpal.c b/hw/arm/musicpal.c
130
index XXXXXXX..XXXXXXX 100644
23
index XXXXXXX..XXXXXXX 100644
131
--- a/include/hw/arm/virt.h
24
--- a/hw/arm/musicpal.c
132
+++ b/include/hw/arm/virt.h
25
+++ b/hw/arm/musicpal.c
133
@@ -XXX,XX +XXX,XX @@
26
@@ -XXX,XX +XXX,XX @@
134
#include "qemu/notify.h"
27
#include "ui/console.h"
135
#include "hw/boards.h"
28
#include "hw/i2c/i2c.h"
136
#include "hw/arm/arm.h"
29
#include "hw/irq.h"
137
+#include "hw/block/flash.h"
30
+#include "hw/or-irq.h"
138
#include "sysemu/kvm.h"
31
#include "hw/audio/wm8750.h"
139
#include "hw/intc/arm_gicv3_common.h"
32
#include "sysemu/block-backend.h"
140
33
#include "sysemu/runstate.h"
141
@@ -XXX,XX +XXX,XX @@ typedef struct {
34
@@ -XXX,XX +XXX,XX @@
142
Notifier machine_done;
35
#define MP_TIMER4_IRQ 7
143
DeviceState *platform_bus_dev;
36
#define MP_EHCI_IRQ 8
144
FWCfgState *fw_cfg;
37
#define MP_ETH_IRQ 9
145
+ PFlashCFI01 *flash[2];
38
-#define MP_UART1_IRQ 11
146
bool secure;
39
-#define MP_UART2_IRQ 11
147
bool highmem;
40
+#define MP_UART_SHARED_IRQ 11
148
bool highmem_ecam;
41
#define MP_GPIO_IRQ 12
149
diff --git a/hw/arm/virt.c b/hw/arm/virt.c
42
#define MP_RTC_IRQ 28
43
#define MP_AUDIO_IRQ 30
44
@@ -XXX,XX +XXX,XX @@ static void musicpal_init(MachineState *machine)
45
ARMCPU *cpu;
46
qemu_irq pic[32];
47
DeviceState *dev;
48
+ DeviceState *uart_orgate;
49
DeviceState *i2c_dev;
50
DeviceState *lcd_dev;
51
DeviceState *key_dev;
52
@@ -XXX,XX +XXX,XX @@ static void musicpal_init(MachineState *machine)
53
pic[MP_TIMER2_IRQ], pic[MP_TIMER3_IRQ],
54
pic[MP_TIMER4_IRQ], NULL);
55
56
- serial_mm_init(address_space_mem, MP_UART1_BASE, 2, pic[MP_UART1_IRQ],
57
+ /* Logically OR both UART IRQs together */
58
+ uart_orgate = DEVICE(object_new(TYPE_OR_IRQ));
59
+ object_property_set_int(OBJECT(uart_orgate), "num-lines", 2, &error_fatal);
60
+ qdev_realize_and_unref(uart_orgate, NULL, &error_fatal);
61
+ qdev_connect_gpio_out(DEVICE(uart_orgate), 0, pic[MP_UART_SHARED_IRQ]);
62
+
63
+ serial_mm_init(address_space_mem, MP_UART1_BASE, 2,
64
+ qdev_get_gpio_in(uart_orgate, 0),
65
1825000, serial_hd(0), DEVICE_NATIVE_ENDIAN);
66
- serial_mm_init(address_space_mem, MP_UART2_BASE, 2, pic[MP_UART2_IRQ],
67
+ serial_mm_init(address_space_mem, MP_UART2_BASE, 2,
68
+ qdev_get_gpio_in(uart_orgate, 1),
69
1825000, serial_hd(1), DEVICE_NATIVE_ENDIAN);
70
71
/* Register flash */
72
diff --git a/hw/arm/Kconfig b/hw/arm/Kconfig
150
index XXXXXXX..XXXXXXX 100644
73
index XXXXXXX..XXXXXXX 100644
151
--- a/hw/arm/virt.c
74
--- a/hw/arm/Kconfig
152
+++ b/hw/arm/virt.c
75
+++ b/hw/arm/Kconfig
153
@@ -XXX,XX +XXX,XX @@
76
@@ -XXX,XX +XXX,XX @@ config MUSCA
154
77
155
#include "qemu/osdep.h"
78
config MUSICPAL
156
#include "qemu/units.h"
79
bool
157
+#include "qemu/option.h"
80
+ select OR_IRQ
158
#include "qapi/error.h"
81
select BITBANG_I2C
159
#include "hw/sysbus.h"
82
select MARVELL_88W8618
160
#include "hw/arm/arm.h"
83
select PTIMER
161
@@ -XXX,XX +XXX,XX @@ static void create_virtio_devices(const VirtMachineState *vms, qemu_irq *pic)
162
}
163
}
164
165
-static void create_one_flash(const char *name, hwaddr flashbase,
166
- hwaddr flashsize, const char *file,
167
- MemoryRegion *sysmem)
168
+#define VIRT_FLASH_SECTOR_SIZE (256 * KiB)
169
+
170
+static PFlashCFI01 *virt_flash_create1(VirtMachineState *vms,
171
+ const char *name,
172
+ const char *alias_prop_name)
173
{
174
- /* Create and map a single flash device. We use the same
175
- * parameters as the flash devices on the Versatile Express board.
176
+ /*
177
+ * Create a single flash device. We use the same parameters as
178
+ * the flash devices on the Versatile Express board.
179
*/
180
- DriveInfo *dinfo = drive_get_next(IF_PFLASH);
181
DeviceState *dev = qdev_create(NULL, TYPE_PFLASH_CFI01);
182
- SysBusDevice *sbd = SYS_BUS_DEVICE(dev);
183
- const uint64_t sectorlength = 256 * 1024;
184
185
- if (dinfo) {
186
- qdev_prop_set_drive(dev, "drive", blk_by_legacy_dinfo(dinfo),
187
- &error_abort);
188
- }
189
-
190
- qdev_prop_set_uint32(dev, "num-blocks", flashsize / sectorlength);
191
- qdev_prop_set_uint64(dev, "sector-length", sectorlength);
192
+ qdev_prop_set_uint64(dev, "sector-length", VIRT_FLASH_SECTOR_SIZE);
193
qdev_prop_set_uint8(dev, "width", 4);
194
qdev_prop_set_uint8(dev, "device-width", 2);
195
qdev_prop_set_bit(dev, "big-endian", false);
196
@@ -XXX,XX +XXX,XX @@ static void create_one_flash(const char *name, hwaddr flashbase,
197
qdev_prop_set_uint16(dev, "id2", 0x00);
198
qdev_prop_set_uint16(dev, "id3", 0x00);
199
qdev_prop_set_string(dev, "name", name);
200
- qdev_init_nofail(dev);
201
-
202
- memory_region_add_subregion(sysmem, flashbase,
203
- sysbus_mmio_get_region(SYS_BUS_DEVICE(dev), 0));
204
-
205
- if (file) {
206
- char *fn;
207
- int image_size;
208
-
209
- if (drive_get(IF_PFLASH, 0, 0)) {
210
- error_report("The contents of the first flash device may be "
211
- "specified with -bios or with -drive if=pflash... "
212
- "but you cannot use both options at once");
213
- exit(1);
214
- }
215
- fn = qemu_find_file(QEMU_FILE_TYPE_BIOS, file);
216
- if (!fn) {
217
- error_report("Could not find ROM image '%s'", file);
218
- exit(1);
219
- }
220
- image_size = load_image_mr(fn, sysbus_mmio_get_region(sbd, 0));
221
- g_free(fn);
222
- if (image_size < 0) {
223
- error_report("Could not load ROM image '%s'", file);
224
- exit(1);
225
- }
226
- }
227
+ object_property_add_child(OBJECT(vms), name, OBJECT(dev),
228
+ &error_abort);
229
+ object_property_add_alias(OBJECT(vms), alias_prop_name,
230
+ OBJECT(dev), "drive", &error_abort);
231
+ return PFLASH_CFI01(dev);
232
}
233
234
-static void create_flash(const VirtMachineState *vms,
235
- MemoryRegion *sysmem,
236
- MemoryRegion *secure_sysmem)
237
+static void virt_flash_create(VirtMachineState *vms)
238
{
239
- /* Create two flash devices to fill the VIRT_FLASH space in the memmap.
240
- * Any file passed via -bios goes in the first of these.
241
+ vms->flash[0] = virt_flash_create1(vms, "virt.flash0", "pflash0");
242
+ vms->flash[1] = virt_flash_create1(vms, "virt.flash1", "pflash1");
243
+}
244
+
245
+static void virt_flash_map1(PFlashCFI01 *flash,
246
+ hwaddr base, hwaddr size,
247
+ MemoryRegion *sysmem)
248
+{
249
+ DeviceState *dev = DEVICE(flash);
250
+
251
+ assert(size % VIRT_FLASH_SECTOR_SIZE == 0);
252
+ assert(size / VIRT_FLASH_SECTOR_SIZE <= UINT32_MAX);
253
+ qdev_prop_set_uint32(dev, "num-blocks", size / VIRT_FLASH_SECTOR_SIZE);
254
+ qdev_init_nofail(dev);
255
+
256
+ memory_region_add_subregion(sysmem, base,
257
+ sysbus_mmio_get_region(SYS_BUS_DEVICE(dev),
258
+ 0));
259
+}
260
+
261
+static void virt_flash_map(VirtMachineState *vms,
262
+ MemoryRegion *sysmem,
263
+ MemoryRegion *secure_sysmem)
264
+{
265
+ /*
266
+ * Map two flash devices to fill the VIRT_FLASH space in the memmap.
267
* sysmem is the system memory space. secure_sysmem is the secure view
268
* of the system, and the first flash device should be made visible only
269
* there. The second flash device is visible to both secure and nonsecure.
270
@@ -XXX,XX +XXX,XX @@ static void create_flash(const VirtMachineState *vms,
271
*/
272
hwaddr flashsize = vms->memmap[VIRT_FLASH].size / 2;
273
hwaddr flashbase = vms->memmap[VIRT_FLASH].base;
274
- char *nodename;
275
276
- create_one_flash("virt.flash0", flashbase, flashsize,
277
- bios_name, secure_sysmem);
278
- create_one_flash("virt.flash1", flashbase + flashsize, flashsize,
279
- NULL, sysmem);
280
+ virt_flash_map1(vms->flash[0], flashbase, flashsize,
281
+ secure_sysmem);
282
+ virt_flash_map1(vms->flash[1], flashbase + flashsize, flashsize,
283
+ sysmem);
284
+}
285
+
286
+static void virt_flash_fdt(VirtMachineState *vms,
287
+ MemoryRegion *sysmem,
288
+ MemoryRegion *secure_sysmem)
289
+{
290
+ hwaddr flashsize = vms->memmap[VIRT_FLASH].size / 2;
291
+ hwaddr flashbase = vms->memmap[VIRT_FLASH].base;
292
+ char *nodename;
293
294
if (sysmem == secure_sysmem) {
295
/* Report both flash devices as a single node in the DT */
296
@@ -XXX,XX +XXX,XX @@ static void create_flash(const VirtMachineState *vms,
297
qemu_fdt_setprop_cell(vms->fdt, nodename, "bank-width", 4);
298
g_free(nodename);
299
} else {
300
- /* Report the devices as separate nodes so we can mark one as
301
+ /*
302
+ * Report the devices as separate nodes so we can mark one as
303
* only visible to the secure world.
304
*/
305
nodename = g_strdup_printf("/secflash@%" PRIx64, flashbase);
306
@@ -XXX,XX +XXX,XX @@ static void create_flash(const VirtMachineState *vms,
307
}
308
}
309
310
+static bool virt_firmware_init(VirtMachineState *vms,
311
+ MemoryRegion *sysmem,
312
+ MemoryRegion *secure_sysmem)
313
+{
314
+ int i;
315
+ BlockBackend *pflash_blk0;
316
+
317
+ /* Map legacy -drive if=pflash to machine properties */
318
+ for (i = 0; i < ARRAY_SIZE(vms->flash); i++) {
319
+ pflash_cfi01_legacy_drive(vms->flash[i],
320
+ drive_get(IF_PFLASH, 0, i));
321
+ }
322
+
323
+ virt_flash_map(vms, sysmem, secure_sysmem);
324
+
325
+ pflash_blk0 = pflash_cfi01_get_blk(vms->flash[0]);
326
+
327
+ if (bios_name) {
328
+ char *fname;
329
+ MemoryRegion *mr;
330
+ int image_size;
331
+
332
+ if (pflash_blk0) {
333
+ error_report("The contents of the first flash device may be "
334
+ "specified with -bios or with -drive if=pflash... "
335
+ "but you cannot use both options at once");
336
+ exit(1);
337
+ }
338
+
339
+ /* Fall back to -bios */
340
+
341
+ fname = qemu_find_file(QEMU_FILE_TYPE_BIOS, bios_name);
342
+ if (!fname) {
343
+ error_report("Could not find ROM image '%s'", bios_name);
344
+ exit(1);
345
+ }
346
+ mr = sysbus_mmio_get_region(SYS_BUS_DEVICE(vms->flash[0]), 0);
347
+ image_size = load_image_mr(fname, mr);
348
+ g_free(fname);
349
+ if (image_size < 0) {
350
+ error_report("Could not load ROM image '%s'", bios_name);
351
+ exit(1);
352
+ }
353
+ }
354
+
355
+ return pflash_blk0 || bios_name;
356
+}
357
+
358
static FWCfgState *create_fw_cfg(const VirtMachineState *vms, AddressSpace *as)
359
{
360
hwaddr base = vms->memmap[VIRT_FW_CFG].base;
361
@@ -XXX,XX +XXX,XX @@ static void machvirt_init(MachineState *machine)
362
MemoryRegion *secure_sysmem = NULL;
363
int n, virt_max_cpus;
364
MemoryRegion *ram = g_new(MemoryRegion, 1);
365
- bool firmware_loaded = bios_name || drive_get(IF_PFLASH, 0, 0);
366
+ bool firmware_loaded;
367
bool aarch64 = true;
368
369
/*
370
@@ -XXX,XX +XXX,XX @@ static void machvirt_init(MachineState *machine)
371
exit(1);
372
}
373
374
+ if (vms->secure) {
375
+ if (kvm_enabled()) {
376
+ error_report("mach-virt: KVM does not support Security extensions");
377
+ exit(1);
378
+ }
379
+
380
+ /*
381
+ * The Secure view of the world is the same as the NonSecure,
382
+ * but with a few extra devices. Create it as a container region
383
+ * containing the system memory at low priority; any secure-only
384
+ * devices go in at higher priority and take precedence.
385
+ */
386
+ secure_sysmem = g_new(MemoryRegion, 1);
387
+ memory_region_init(secure_sysmem, OBJECT(machine), "secure-memory",
388
+ UINT64_MAX);
389
+ memory_region_add_subregion_overlap(secure_sysmem, 0, sysmem, -1);
390
+ }
391
+
392
+ firmware_loaded = virt_firmware_init(vms, sysmem,
393
+ secure_sysmem ?: sysmem);
394
+
395
/* If we have an EL3 boot ROM then the assumption is that it will
396
* implement PSCI itself, so disable QEMU's internal implementation
397
* so it doesn't get in the way. Instead of starting secondary
398
@@ -XXX,XX +XXX,XX @@ static void machvirt_init(MachineState *machine)
399
exit(1);
400
}
401
402
- if (vms->secure) {
403
- if (kvm_enabled()) {
404
- error_report("mach-virt: KVM does not support Security extensions");
405
- exit(1);
406
- }
407
-
408
- /* The Secure view of the world is the same as the NonSecure,
409
- * but with a few extra devices. Create it as a container region
410
- * containing the system memory at low priority; any secure-only
411
- * devices go in at higher priority and take precedence.
412
- */
413
- secure_sysmem = g_new(MemoryRegion, 1);
414
- memory_region_init(secure_sysmem, OBJECT(machine), "secure-memory",
415
- UINT64_MAX);
416
- memory_region_add_subregion_overlap(secure_sysmem, 0, sysmem, -1);
417
- }
418
-
419
create_fdt(vms);
420
421
possible_cpus = mc->possible_cpu_arch_ids(machine);
422
@@ -XXX,XX +XXX,XX @@ static void machvirt_init(MachineState *machine)
423
&machine->device_memory->mr);
424
}
425
426
- create_flash(vms, sysmem, secure_sysmem ? secure_sysmem : sysmem);
427
+ virt_flash_fdt(vms, sysmem, secure_sysmem);
428
429
create_gic(vms, pic);
430
431
@@ -XXX,XX +XXX,XX @@ static void virt_instance_init(Object *obj)
432
NULL);
433
434
vms->irqmap = a15irqmap;
435
+
436
+ virt_flash_create(vms);
437
}
438
439
static const TypeInfo virt_machine_info = {
440
--
84
--
441
2.20.1
85
2.20.1
442
86
443
87
diff view generated by jsdifflib
1
From: Markus Armbruster <armbru@redhat.com>
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
2
2
3
The loop does two things: map legacy -drive to properties, and collect
3
We don't need to fill the full pic[] array if we only use
4
all the backends for use after the loop. The next patch will factor
4
few of the interrupt lines. Directly call qdev_get_gpio_in()
5
out the former for reuse in hw/arm/virt.c. To make that easier,
5
when necessary.
6
rearrange the loop so it does the first thing first, and the second
7
thing second.
8
6
9
Signed-off-by: Markus Armbruster <armbru@redhat.com>
7
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
10
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
8
Message-id: 20201107193403.436146-6-f4bug@amsat.org
11
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
12
Message-id: 20190416091348.26075-2-armbru@redhat.com
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
---
11
---
15
hw/i386/pc_sysfw.c | 24 +++++++++++-------------
12
hw/arm/musicpal.c | 25 +++++++++++++------------
16
1 file changed, 11 insertions(+), 13 deletions(-)
13
1 file changed, 13 insertions(+), 12 deletions(-)
17
14
18
diff --git a/hw/i386/pc_sysfw.c b/hw/i386/pc_sysfw.c
15
diff --git a/hw/arm/musicpal.c b/hw/arm/musicpal.c
19
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
20
--- a/hw/i386/pc_sysfw.c
17
--- a/hw/arm/musicpal.c
21
+++ b/hw/i386/pc_sysfw.c
18
+++ b/hw/arm/musicpal.c
22
@@ -XXX,XX +XXX,XX @@ void pc_system_firmware_init(PCMachineState *pcms,
19
@@ -XXX,XX +XXX,XX @@ static struct arm_boot_info musicpal_binfo = {
23
20
static void musicpal_init(MachineState *machine)
24
/* Map legacy -drive if=pflash to machine properties */
21
{
25
for (i = 0; i < ARRAY_SIZE(pcms->flash); i++) {
22
ARMCPU *cpu;
26
- pflash_blk[i] = pflash_cfi01_get_blk(pcms->flash[i]);
23
- qemu_irq pic[32];
27
pflash_drv = drive_get(IF_PFLASH, 0, i);
24
DeviceState *dev;
28
- if (!pflash_drv) {
25
+ DeviceState *pic;
29
- continue;
26
DeviceState *uart_orgate;
30
+ if (pflash_drv) {
27
DeviceState *i2c_dev;
31
+ loc_push_none(&loc);
28
DeviceState *lcd_dev;
32
+ qemu_opts_loc_restore(pflash_drv->opts);
29
@@ -XXX,XX +XXX,XX @@ static void musicpal_init(MachineState *machine)
33
+ if (pflash_cfi01_get_blk(pcms->flash[i])) {
30
&error_fatal);
34
+ error_report("clashes with -machine");
31
memory_region_add_subregion(address_space_mem, MP_SRAM_BASE, sram);
35
+ exit(1);
32
36
+ }
33
- dev = sysbus_create_simple(TYPE_MV88W8618_PIC, MP_PIC_BASE,
37
+ qdev_prop_set_drive(DEVICE(pcms->flash[i]), "drive",
34
+ pic = sysbus_create_simple(TYPE_MV88W8618_PIC, MP_PIC_BASE,
38
+ blk_by_legacy_dinfo(pflash_drv), &error_fatal);
35
qdev_get_gpio_in(DEVICE(cpu), ARM_CPU_IRQ));
39
+ loc_pop(&loc);
36
- for (i = 0; i < 32; i++) {
40
}
37
- pic[i] = qdev_get_gpio_in(dev, i);
41
- loc_push_none(&loc);
38
- }
42
- qemu_opts_loc_restore(pflash_drv->opts);
39
- sysbus_create_varargs(TYPE_MV88W8618_PIT, MP_PIT_BASE, pic[MP_TIMER1_IRQ],
43
- if (pflash_blk[i]) {
40
- pic[MP_TIMER2_IRQ], pic[MP_TIMER3_IRQ],
44
- error_report("clashes with -machine");
41
- pic[MP_TIMER4_IRQ], NULL);
45
- exit(1);
42
+ sysbus_create_varargs(TYPE_MV88W8618_PIT, MP_PIT_BASE,
46
- }
43
+ qdev_get_gpio_in(pic, MP_TIMER1_IRQ),
47
- pflash_blk[i] = blk_by_legacy_dinfo(pflash_drv);
44
+ qdev_get_gpio_in(pic, MP_TIMER2_IRQ),
48
- qdev_prop_set_drive(DEVICE(pcms->flash[i]),
45
+ qdev_get_gpio_in(pic, MP_TIMER3_IRQ),
49
- "drive", pflash_blk[i], &error_fatal);
46
+ qdev_get_gpio_in(pic, MP_TIMER4_IRQ), NULL);
50
- loc_pop(&loc);
47
51
+ pflash_blk[i] = pflash_cfi01_get_blk(pcms->flash[i]);
48
/* Logically OR both UART IRQs together */
52
}
49
uart_orgate = DEVICE(object_new(TYPE_OR_IRQ));
53
50
object_property_set_int(OBJECT(uart_orgate), "num-lines", 2, &error_fatal);
54
/* Reject gaps */
51
qdev_realize_and_unref(uart_orgate, NULL, &error_fatal);
52
- qdev_connect_gpio_out(DEVICE(uart_orgate), 0, pic[MP_UART_SHARED_IRQ]);
53
+ qdev_connect_gpio_out(DEVICE(uart_orgate), 0,
54
+ qdev_get_gpio_in(pic, MP_UART_SHARED_IRQ));
55
56
serial_mm_init(address_space_mem, MP_UART1_BASE, 2,
57
qdev_get_gpio_in(uart_orgate, 0),
58
@@ -XXX,XX +XXX,XX @@ static void musicpal_init(MachineState *machine)
59
OBJECT(get_system_memory()), &error_fatal);
60
sysbus_realize_and_unref(SYS_BUS_DEVICE(dev), &error_fatal);
61
sysbus_mmio_map(SYS_BUS_DEVICE(dev), 0, MP_ETH_BASE);
62
- sysbus_connect_irq(SYS_BUS_DEVICE(dev), 0, pic[MP_ETH_IRQ]);
63
+ sysbus_connect_irq(SYS_BUS_DEVICE(dev), 0,
64
+ qdev_get_gpio_in(pic, MP_ETH_IRQ));
65
66
sysbus_create_simple("mv88w8618_wlan", MP_WLAN_BASE, NULL);
67
68
sysbus_create_simple(TYPE_MUSICPAL_MISC, MP_MISC_BASE, NULL);
69
70
dev = sysbus_create_simple(TYPE_MUSICPAL_GPIO, MP_GPIO_BASE,
71
- pic[MP_GPIO_IRQ]);
72
+ qdev_get_gpio_in(pic, MP_GPIO_IRQ));
73
i2c_dev = sysbus_create_simple("gpio_i2c", -1, NULL);
74
i2c = (I2CBus *)qdev_get_child_bus(i2c_dev, "i2c");
75
76
@@ -XXX,XX +XXX,XX @@ static void musicpal_init(MachineState *machine)
77
NULL);
78
sysbus_realize_and_unref(s, &error_fatal);
79
sysbus_mmio_map(s, 0, MP_AUDIO_BASE);
80
- sysbus_connect_irq(s, 0, pic[MP_AUDIO_IRQ]);
81
+ sysbus_connect_irq(s, 0, qdev_get_gpio_in(pic, MP_AUDIO_IRQ));
82
83
musicpal_binfo.ram_size = MP_RAM_DEFAULT_SIZE;
84
arm_load_kernel(cpu, machine, &musicpal_binfo);
55
--
85
--
56
2.20.1
86
2.20.1
57
87
58
88
diff view generated by jsdifflib
1
The Raspberry Pi boards have a physical memory map which does
1
The nseries machines have a codepath that allows them to load a
2
not allow for more than 1GB of RAM. Currently if the user tries
2
secondary bootloader. This code wasn't checking that the
3
to ask for more then we fail in a confusing way:
3
load_image_targphys() succeeded. Check the return value and report
4
the error to the user.
4
5
5
$ qemu-system-aarch64 --machine raspi3 -m 8G
6
While we're in the vicinity, fix the comment style of the
6
Unexpected error in visit_type_uintN() at qapi/qapi-visit-core.c:164:
7
comment documenting what this image load is doing.
7
qemu-system-aarch64: Parameter 'vcram-base' expects uint32_t
8
Aborted (core dumped)
9
8
10
Catch this earlier and diagnose it with a more friendly message:
9
Fixes: Coverity CID 1192904
11
$ qemu-system-aarch64 --machine raspi3 -m 8G
12
qemu-system-aarch64: Requested ram size is too large for this machine: maximum is 1GB
13
14
Fixes: https://bugs.launchpad.net/qemu/+bug/1794187
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
11
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
17
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
12
Message-id: 20201103114918.11807-1-peter.maydell@linaro.org
18
Reviewed-by: Wainer dos Santos Moschetta <wainersm@redhat.com>
19
---
13
---
20
hw/arm/raspi.c | 7 +++++++
14
hw/arm/nseries.c | 15 +++++++++++----
21
1 file changed, 7 insertions(+)
15
1 file changed, 11 insertions(+), 4 deletions(-)
22
16
23
diff --git a/hw/arm/raspi.c b/hw/arm/raspi.c
17
diff --git a/hw/arm/nseries.c b/hw/arm/nseries.c
24
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
25
--- a/hw/arm/raspi.c
19
--- a/hw/arm/nseries.c
26
+++ b/hw/arm/raspi.c
20
+++ b/hw/arm/nseries.c
27
@@ -XXX,XX +XXX,XX @@
21
@@ -XXX,XX +XXX,XX @@ static void n8x0_init(MachineState *machine,
28
*/
22
/* No, wait, better start at the ROM. */
29
23
s->mpu->cpu->env.regs[15] = OMAP2_Q2_BASE + 0x400000;
30
#include "qemu/osdep.h"
24
31
+#include "qemu/units.h"
25
- /* This is intended for loading the `secondary.bin' program from
32
#include "qapi/error.h"
26
+ /*
33
#include "qemu-common.h"
27
+ * This is intended for loading the `secondary.bin' program from
34
#include "cpu.h"
28
* Nokia images (the NOLO bootloader). The entry point seems
35
@@ -XXX,XX +XXX,XX @@ static void raspi_init(MachineState *machine, int version)
29
* to be at OMAP2_Q2_BASE + 0x400000.
36
BusState *bus;
30
*
37
DeviceState *carddev;
31
@@ -XXX,XX +XXX,XX @@ static void n8x0_init(MachineState *machine,
38
32
* for them the entry point needs to be set to OMAP2_SRAM_BASE.
39
+ if (machine->ram_size > 1 * GiB) {
33
*
40
+ error_report("Requested ram size is too large for this machine: "
34
* The code above is for loading the `zImage' file from Nokia
41
+ "maximum is 1GB");
35
- * images. */
42
+ exit(1);
36
- load_image_targphys(option_rom[0].name, OMAP2_Q2_BASE + 0x400000,
43
+ }
37
- machine->ram_size - 0x400000);
44
+
38
+ * images.
45
object_initialize(&s->soc, sizeof(s->soc),
39
+ */
46
version == 3 ? TYPE_BCM2837 : TYPE_BCM2836);
40
+ if (load_image_targphys(option_rom[0].name,
47
object_property_add_child(OBJECT(machine), "soc", OBJECT(&s->soc),
41
+ OMAP2_Q2_BASE + 0x400000,
42
+ machine->ram_size - 0x400000) < 0) {
43
+ error_report("Failed to load secondary bootloader %s",
44
+ option_rom[0].name);
45
+ exit(EXIT_FAILURE);
46
+ }
47
48
n800_setup_nolo_tags(nolo_tags);
49
cpu_physical_memory_write(OMAP2_SRAM_BASE, nolo_tags, 0x10000);
48
--
50
--
49
2.20.1
51
2.20.1
50
52
51
53
diff view generated by jsdifflib
1
From: Joel Stanley <joel@jms.id.au>
1
From: Havard Skinnemoen <hskinnemoen@google.com>
2
2
3
We currently use Qemu's default of 128MB. As we know how much ram each
3
The number of runs is equal to the number of 0-1 and 1-0 transitions,
4
machine ships with, make it easier on users by setting a default.
4
plus one. Currently, it's counting the number of times these transitions
5
do _not_ happen, plus one.
5
6
6
It can still be overridden with -m on the command line.
7
Source:
8
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-22r1a.pdf
9
section 2.3.4 point (3).
7
10
8
Signed-off-by: Joel Stanley <joel@jms.id.au>
11
Signed-off-by: Havard Skinnemoen <hskinnemoen@google.com>
9
Reviewed-by: Andrew Jeffery <andrew@aj.id.au>
12
Message-id: 20201103011457.2959989-2-hskinnemoen@google.com
10
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
13
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
Message-id: 20190503022958.1394-1-joel@jms.id.au
12
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
---
15
---
15
include/hw/arm/aspeed.h | 1 +
16
tests/qtest/npcm7xx_rng-test.c | 2 +-
16
hw/arm/aspeed.c | 8 ++++++++
17
1 file changed, 1 insertion(+), 1 deletion(-)
17
2 files changed, 9 insertions(+)
18
18
19
diff --git a/include/hw/arm/aspeed.h b/include/hw/arm/aspeed.h
19
diff --git a/tests/qtest/npcm7xx_rng-test.c b/tests/qtest/npcm7xx_rng-test.c
20
index XXXXXXX..XXXXXXX 100644
20
index XXXXXXX..XXXXXXX 100644
21
--- a/include/hw/arm/aspeed.h
21
--- a/tests/qtest/npcm7xx_rng-test.c
22
+++ b/include/hw/arm/aspeed.h
22
+++ b/tests/qtest/npcm7xx_rng-test.c
23
@@ -XXX,XX +XXX,XX @@ typedef struct AspeedBoardConfig {
23
@@ -XXX,XX +XXX,XX @@ static double calc_runs_p(const unsigned long *buf, unsigned int nr_bits)
24
const char *spi_model;
24
pi = (double)nr_ones / nr_bits;
25
uint32_t num_cs;
25
26
void (*i2c_init)(AspeedBoardState *bmc);
26
for (k = 0; k < nr_bits - 1; k++) {
27
+ uint32_t ram;
27
- vn_obs += !(test_bit(k, buf) ^ test_bit(k + 1, buf));
28
} AspeedBoardConfig;
28
+ vn_obs += (test_bit(k, buf) ^ test_bit(k + 1, buf));
29
29
}
30
#define TYPE_ASPEED_MACHINE MACHINE_TYPE_NAME("aspeed")
30
vn_obs += 1;
31
diff --git a/hw/arm/aspeed.c b/hw/arm/aspeed.c
32
index XXXXXXX..XXXXXXX 100644
33
--- a/hw/arm/aspeed.c
34
+++ b/hw/arm/aspeed.c
35
@@ -XXX,XX +XXX,XX @@
36
#include "sysemu/block-backend.h"
37
#include "hw/loader.h"
38
#include "qemu/error-report.h"
39
+#include "qemu/units.h"
40
41
static struct arm_boot_info aspeed_board_binfo = {
42
.board_id = -1, /* device-tree-only board */
43
@@ -XXX,XX +XXX,XX @@ static void aspeed_machine_class_init(ObjectClass *oc, void *data)
44
mc->no_floppy = 1;
45
mc->no_cdrom = 1;
46
mc->no_parallel = 1;
47
+ if (board->ram) {
48
+ mc->default_ram_size = board->ram;
49
+ }
50
amc->board = board;
51
}
52
53
@@ -XXX,XX +XXX,XX @@ static const AspeedBoardConfig aspeed_boards[] = {
54
.spi_model = "mx25l25635e",
55
.num_cs = 1,
56
.i2c_init = palmetto_bmc_i2c_init,
57
+ .ram = 256 * MiB,
58
}, {
59
.name = MACHINE_TYPE_NAME("ast2500-evb"),
60
.desc = "Aspeed AST2500 EVB (ARM1176)",
61
@@ -XXX,XX +XXX,XX @@ static const AspeedBoardConfig aspeed_boards[] = {
62
.spi_model = "mx25l25635e",
63
.num_cs = 1,
64
.i2c_init = ast2500_evb_i2c_init,
65
+ .ram = 512 * MiB,
66
}, {
67
.name = MACHINE_TYPE_NAME("romulus-bmc"),
68
.desc = "OpenPOWER Romulus BMC (ARM1176)",
69
@@ -XXX,XX +XXX,XX @@ static const AspeedBoardConfig aspeed_boards[] = {
70
.spi_model = "mx66l1g45g",
71
.num_cs = 2,
72
.i2c_init = romulus_bmc_i2c_init,
73
+ .ram = 512 * MiB,
74
}, {
75
.name = MACHINE_TYPE_NAME("witherspoon-bmc"),
76
.desc = "OpenPOWER Witherspoon BMC (ARM1176)",
77
@@ -XXX,XX +XXX,XX @@ static const AspeedBoardConfig aspeed_boards[] = {
78
.spi_model = "mx66l1g45g",
79
.num_cs = 2,
80
.i2c_init = witherspoon_bmc_i2c_init,
81
+ .ram = 512 * MiB,
82
},
83
};
84
31
85
--
32
--
86
2.20.1
33
2.20.1
87
34
88
35
diff view generated by jsdifflib
1
Rule R_CQRV says that if two pending interrupts have the same
1
Checks for UNDEF cases should go before the "is VFP enabled?" access
2
group priority then ties are broken by looking at the subpriority.
2
check, except in special cases. Move a stray UNDEF check in the VTBL
3
We had a comment describing this but had forgotten to actually
3
trans function up above the access check.
4
implement the subpriority comparison. Correct the omission.
5
6
(The further tie break rules of "lowest exception number" and
7
"secure before non-secure" are handled implicitly by the order
8
in which we iterate through the exceptions in the loops.)
9
4
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
6
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
12
Message-id: 20190430131439.25251-2-peter.maydell@linaro.org
7
Message-id: 20201109145324.2859-1-peter.maydell@linaro.org
13
---
8
---
14
hw/intc/armv7m_nvic.c | 9 +++++++--
9
target/arm/translate-neon.c.inc | 8 ++++----
15
1 file changed, 7 insertions(+), 2 deletions(-)
10
1 file changed, 4 insertions(+), 4 deletions(-)
16
11
17
diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c
12
diff --git a/target/arm/translate-neon.c.inc b/target/arm/translate-neon.c.inc
18
index XXXXXXX..XXXXXXX 100644
13
index XXXXXXX..XXXXXXX 100644
19
--- a/hw/intc/armv7m_nvic.c
14
--- a/target/arm/translate-neon.c.inc
20
+++ b/hw/intc/armv7m_nvic.c
15
+++ b/target/arm/translate-neon.c.inc
21
@@ -XXX,XX +XXX,XX @@ static void nvic_recompute_state_secure(NVICState *s)
16
@@ -XXX,XX +XXX,XX @@ static bool trans_VTBL(DisasContext *s, arg_VTBL *a)
22
int active_prio = NVIC_NOEXC_PRIO;
17
return false;
23
int pend_irq = 0;
18
}
24
bool pending_is_s_banked = false;
19
25
+ int pend_subprio = 0;
20
- if (!vfp_access_check(s)) {
26
21
- return true;
27
/* R_CQRV: precedence is by:
22
- }
28
* - lowest group priority; if both the same then
23
-
29
@@ -XXX,XX +XXX,XX @@ static void nvic_recompute_state_secure(NVICState *s)
24
if ((a->vn + a->len + 1) > 32) {
30
for (i = 1; i < s->num_irq; i++) {
25
/*
31
for (bank = M_REG_S; bank >= M_REG_NS; bank--) {
26
* This is UNPREDICTABLE; we choose to UNDEF to avoid the
32
VecInfo *vec;
27
@@ -XXX,XX +XXX,XX @@ static bool trans_VTBL(DisasContext *s, arg_VTBL *a)
33
- int prio;
28
return false;
34
+ int prio, subprio;
29
}
35
bool targets_secure;
30
36
31
+ if (!vfp_access_check(s)) {
37
if (bank == M_REG_S) {
32
+ return true;
38
@@ -XXX,XX +XXX,XX @@ static void nvic_recompute_state_secure(NVICState *s)
33
+ }
39
}
34
+
40
35
desc = tcg_const_i32((a->vn << 2) | a->len);
41
prio = exc_group_prio(s, vec->prio, targets_secure);
36
def = tcg_temp_new_i64();
42
- if (vec->enabled && vec->pending && prio < pend_prio) {
37
if (a->op) {
43
+ subprio = vec->prio & ~nvic_gprio_mask(s, targets_secure);
44
+ if (vec->enabled && vec->pending &&
45
+ ((prio < pend_prio) ||
46
+ (prio == pend_prio && prio >= 0 && subprio < pend_subprio))) {
47
pend_prio = prio;
48
+ pend_subprio = subprio;
49
pend_irq = i;
50
pending_is_s_banked = (bank == M_REG_S);
51
}
52
--
38
--
53
2.20.1
39
2.20.1
54
40
55
41
diff view generated by jsdifflib