1
target-arm queue for rc1 -- these are all bug fixes.
1
Nothing very exciting this time around...
2
2
3
thanks
4
-- PMM
3
-- PMM
5
4
6
The following changes since commit b9404bf592e7ba74180e1a54ed7a266ec6ee67f2:
5
The following changes since commit 37a712a0f969ca2df7f01182409a6c4825cebfb5:
7
6
8
Merge remote-tracking branch 'remotes/dgilbert/tags/pull-hmp-20190715' into staging (2019-07-15 12:22:07 +0100)
7
Merge remote-tracking branch 'remotes/bonzini-gitlab/tags/for-upstream' into staging (2020-10-01 12:23:19 +0100)
9
8
10
are available in the Git repository at:
9
are available in the Git repository at:
11
10
12
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20190715
11
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20201001
13
12
14
for you to fetch changes up to 51c9122e92b776a3f16af0b9282f1dc5012e2a19:
13
for you to fetch changes up to cdfaa57dcb53ba012439765a1462247dfda8595d:
15
14
16
target/arm: NS BusFault on vector table fetch escalates to NS HardFault (2019-07-15 14:17:04 +0100)
15
hw/arm/raspi: Remove use of the 'version' value in the board code (2020-10-01 15:31:01 +0100)
17
16
18
----------------------------------------------------------------
17
----------------------------------------------------------------
19
target-arm queue:
18
target-arm queue:
20
* report ARMv8-A FP support for AArch32 -cpu max
19
* Make isar_feature_aa32_fp16_arith() handle M-profile
21
* hw/ssi/xilinx_spips: Avoid AXI writes to the LQSPI linear memory
20
* Fix SVE splice
22
* hw/ssi/xilinx_spips: Avoid out-of-bound access to lqspi_buf[]
21
* Fix SVE LDR/STR
23
* hw/ssi/mss-spi: Avoid crash when reading empty RX FIFO
22
* Remove ignore_memory_transaction_failures on the raspi2
24
* hw/display/xlnx_dp: Avoid crash when reading empty RX FIFO
23
* raspi: Various cleanup/refactoring
25
* hw/arm/virt: Fix non-secure flash mode
26
* pl031: Correctly migrate state when using -rtc clock=host
27
* fix regression that meant arm926 and arm1026 lost VFP
28
double-precision support
29
* v8M: NS BusFault on vector table fetch escalates to NS HardFault
30
24
31
----------------------------------------------------------------
25
----------------------------------------------------------------
32
Alex Bennée (1):
26
Peter Maydell (5):
33
target/arm: report ARMv8-A FP support for AArch32 -cpu max
27
target/arm: Replace ARM_FEATURE_PXN with ID_MMFR0.VMSA check
28
target/arm: Move id_pfr0, id_pfr1 into ARMISARegisters
29
hw/intc/armv7m_nvic: Only show ID register values for Main Extension CPUs
30
target/arm: Add ID register values for Cortex-M0
31
target/arm: Make isar_feature_aa32_fp16_arith() handle M-profile
34
32
35
David Engraf (1):
33
Philippe Mathieu-Daudé (11):
36
hw/arm/virt: Fix non-secure flash mode
34
hw/arm/raspi: Define various blocks base addresses
35
hw/arm/bcm2835: Add more unimplemented peripherals
36
hw/arm/raspi: Remove ignore_memory_transaction_failures on the raspi2
37
hw/arm/raspi: Display the board revision in the machine description
38
hw/arm/raspi: Load the firmware on the first core
39
hw/arm/raspi: Move arm_boot_info structure to RaspiMachineState
40
hw/arm/raspi: Avoid using TypeInfo::class_data pointer
41
hw/arm/raspi: Use more specific machine names
42
hw/arm/raspi: Introduce RaspiProcessorId enum
43
hw/arm/raspi: Use RaspiProcessorId to set the firmware load address
44
hw/arm/raspi: Remove use of the 'version' value in the board code
37
45
38
Peter Maydell (3):
46
Richard Henderson (2):
39
pl031: Correctly migrate state when using -rtc clock=host
47
target/arm: Fix sve ldr/str
40
target/arm: Set VFP-related MVFR0 fields for arm926 and arm1026
48
target/arm: Fix SVE splice
41
target/arm: NS BusFault on vector table fetch escalates to NS HardFault
42
49
43
Philippe Mathieu-Daudé (5):
50
include/hw/arm/bcm2835_peripherals.h | 2 +
44
hw/ssi/xilinx_spips: Convert lqspi_read() to read_with_attrs
51
include/hw/arm/raspi_platform.h | 51 ++++++++++--
45
hw/ssi/xilinx_spips: Avoid AXI writes to the LQSPI linear memory
52
target/arm/cpu.h | 50 +++++++++--
46
hw/ssi/xilinx_spips: Avoid out-of-bound access to lqspi_buf[]
53
hw/arm/bcm2835_peripherals.c | 2 +
47
hw/ssi/mss-spi: Avoid crash when reading empty RX FIFO
54
hw/arm/raspi.c | 155 +++++++++++++++++++----------------
48
hw/display/xlnx_dp: Avoid crash when reading empty RX FIFO
55
hw/intc/armv7m_nvic.c | 46 ++++++++++-
56
target/arm/cpu.c | 21 +++--
57
target/arm/cpu64.c | 12 +--
58
target/arm/cpu_tcg.c | 60 ++++++++++----
59
target/arm/helper.c | 9 +-
60
target/arm/kvm64.c | 4 +
61
target/arm/translate-sve.c | 6 +-
62
12 files changed, 286 insertions(+), 132 deletions(-)
49
63
50
include/hw/timer/pl031.h | 2 ++
51
hw/arm/virt.c | 2 +-
52
hw/core/machine.c | 1 +
53
hw/display/xlnx_dp.c | 15 +++++---
54
hw/ssi/mss-spi.c | 8 ++++-
55
hw/ssi/xilinx_spips.c | 43 +++++++++++++++-------
56
hw/timer/pl031.c | 92 +++++++++++++++++++++++++++++++++++++++++++++---
57
target/arm/cpu.c | 16 +++++++++
58
target/arm/m_helper.c | 21 ++++++++---
59
9 files changed, 174 insertions(+), 26 deletions(-)
60
diff view generated by jsdifflib
1
The ARMv5 architecture didn't specify detailed per-feature ID
1
The ARM_FEATURE_PXN bit indicates whether the CPU supports the PXN
2
registers. Now that we're using the MVFR0 register fields to
2
bit in short-descriptor translation table format descriptors. This
3
gate the existence of VFP instructions, we need to set up
3
is indicated by ID_MMFR0.VMSA being at least 0b0100. Replace the
4
the correct values in the cpu->isar structure so that we still
4
feature bit with an ID register check, in line with our preference
5
provide an FPU to the guest.
5
for ID register checks over feature bits.
6
6
7
This fixes a regression in the arm926 and arm1026 CPUs, which
8
are the only ones that both have VFP and are ARMv5 or earlier.
9
This regression was introduced by the VFP refactoring, and more
10
specifically by commits 1120827fa182f0e76 and 266bd25c485597c,
11
which accidentally disabled VFP short-vector support and
12
double-precision support on these CPUs.
13
14
Fixes: 1120827fa182f0e
15
Fixes: 266bd25c485597c
16
Fixes: https://bugs.launchpad.net/qemu/+bug/1836192
17
Reported-by: Christophe Lyon <christophe.lyon@linaro.org>
18
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
19
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
20
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
9
Message-id: 20200910173855.4068-2-peter.maydell@linaro.org
21
Tested-by: Christophe Lyon <christophe.lyon@linaro.org>
22
Message-id: 20190711131241.22231-1-peter.maydell@linaro.org
23
---
10
---
24
target/arm/cpu.c | 12 ++++++++++++
11
target/arm/cpu.h | 15 ++++++++++++++-
25
1 file changed, 12 insertions(+)
12
target/arm/cpu.c | 1 -
13
target/arm/helper.c | 5 +++--
14
3 files changed, 17 insertions(+), 4 deletions(-)
26
15
16
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
17
index XXXXXXX..XXXXXXX 100644
18
--- a/target/arm/cpu.h
19
+++ b/target/arm/cpu.h
20
@@ -XXX,XX +XXX,XX @@ FIELD(ID_ISAR6, FHM, 8, 4)
21
FIELD(ID_ISAR6, SB, 12, 4)
22
FIELD(ID_ISAR6, SPECRES, 16, 4)
23
24
+FIELD(ID_MMFR0, VMSA, 0, 4)
25
+FIELD(ID_MMFR0, PMSA, 4, 4)
26
+FIELD(ID_MMFR0, OUTERSHR, 8, 4)
27
+FIELD(ID_MMFR0, SHARELVL, 12, 4)
28
+FIELD(ID_MMFR0, TCM, 16, 4)
29
+FIELD(ID_MMFR0, AUXREG, 20, 4)
30
+FIELD(ID_MMFR0, FCSE, 24, 4)
31
+FIELD(ID_MMFR0, INNERSHR, 28, 4)
32
+
33
FIELD(ID_MMFR3, CMAINTVA, 0, 4)
34
FIELD(ID_MMFR3, CMAINTSW, 4, 4)
35
FIELD(ID_MMFR3, BPMAINT, 8, 4)
36
@@ -XXX,XX +XXX,XX @@ enum arm_features {
37
ARM_FEATURE_CACHE_DIRTY_REG, /* 1136/1176 cache dirty status register */
38
ARM_FEATURE_CACHE_BLOCK_OPS, /* v6 optional cache block operations */
39
ARM_FEATURE_MPIDR, /* has cp15 MPIDR */
40
- ARM_FEATURE_PXN, /* has Privileged Execute Never bit */
41
ARM_FEATURE_LPAE, /* has Large Physical Address Extension */
42
ARM_FEATURE_V8,
43
ARM_FEATURE_AARCH64, /* supports 64 bit mode */
44
@@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa32_vminmaxnm(const ARMISARegisters *id)
45
return FIELD_EX32(id->mvfr2, MVFR2, FPMISC) >= 4;
46
}
47
48
+static inline bool isar_feature_aa32_pxn(const ARMISARegisters *id)
49
+{
50
+ return FIELD_EX32(id->id_mmfr0, ID_MMFR0, VMSA) >= 4;
51
+}
52
+
53
static inline bool isar_feature_aa32_pan(const ARMISARegisters *id)
54
{
55
return FIELD_EX32(id->id_mmfr3, ID_MMFR3, PAN) != 0;
27
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
56
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
28
index XXXXXXX..XXXXXXX 100644
57
index XXXXXXX..XXXXXXX 100644
29
--- a/target/arm/cpu.c
58
--- a/target/arm/cpu.c
30
+++ b/target/arm/cpu.c
59
+++ b/target/arm/cpu.c
31
@@ -XXX,XX +XXX,XX @@ static void arm926_initfn(Object *obj)
60
@@ -XXX,XX +XXX,XX @@ static void arm_cpu_realizefn(DeviceState *dev, Error **errp)
32
* set the field to indicate Jazelle support within QEMU.
61
}
33
*/
62
if (arm_feature(env, ARM_FEATURE_LPAE)) {
34
cpu->isar.id_isar1 = FIELD_DP32(cpu->isar.id_isar1, ID_ISAR1, JAZELLE, 1);
63
set_feature(env, ARM_FEATURE_V7MP);
35
+ /*
64
- set_feature(env, ARM_FEATURE_PXN);
36
+ * Similarly, we need to set MVFR0 fields to enable double precision
65
}
37
+ * and short vector support even though ARMv5 doesn't have this register.
66
if (arm_feature(env, ARM_FEATURE_CBAR_RO)) {
38
+ */
67
set_feature(env, ARM_FEATURE_CBAR);
39
+ cpu->isar.mvfr0 = FIELD_DP32(cpu->isar.mvfr0, MVFR0, FPSHVEC, 1);
68
diff --git a/target/arm/helper.c b/target/arm/helper.c
40
+ cpu->isar.mvfr0 = FIELD_DP32(cpu->isar.mvfr0, MVFR0, FPDP, 1);
69
index XXXXXXX..XXXXXXX 100644
41
}
70
--- a/target/arm/helper.c
42
71
+++ b/target/arm/helper.c
43
static void arm946_initfn(Object *obj)
72
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v6(CPUARMState *env, uint32_t address,
44
@@ -XXX,XX +XXX,XX @@ static void arm1026_initfn(Object *obj)
73
target_ulong *page_size, ARMMMUFaultInfo *fi)
45
* set the field to indicate Jazelle support within QEMU.
74
{
46
*/
75
CPUState *cs = env_cpu(env);
47
cpu->isar.id_isar1 = FIELD_DP32(cpu->isar.id_isar1, ID_ISAR1, JAZELLE, 1);
76
+ ARMCPU *cpu = env_archcpu(env);
48
+ /*
77
int level = 1;
49
+ * Similarly, we need to set MVFR0 fields to enable double precision
78
uint32_t table;
50
+ * and short vector support even though ARMv5 doesn't have this register.
79
uint32_t desc;
51
+ */
80
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v6(CPUARMState *env, uint32_t address,
52
+ cpu->isar.mvfr0 = FIELD_DP32(cpu->isar.mvfr0, MVFR0, FPSHVEC, 1);
81
goto do_fault;
53
+ cpu->isar.mvfr0 = FIELD_DP32(cpu->isar.mvfr0, MVFR0, FPDP, 1);
82
}
54
83
type = (desc & 3);
55
{
84
- if (type == 0 || (type == 3 && !arm_feature(env, ARM_FEATURE_PXN))) {
56
/* The 1026 had an IFAR at c6,c0,0,1 rather than the ARMv6 c6,c0,0,2 */
85
+ if (type == 0 || (type == 3 && !cpu_isar_feature(aa32_pxn, cpu))) {
86
/* Section translation fault, or attempt to use the encoding
87
* which is Reserved on implementations without PXN.
88
*/
89
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v6(CPUARMState *env, uint32_t address,
90
pxn = desc & 1;
91
ns = extract32(desc, 19, 1);
92
} else {
93
- if (arm_feature(env, ARM_FEATURE_PXN)) {
94
+ if (cpu_isar_feature(aa32_pxn, cpu)) {
95
pxn = (desc >> 2) & 1;
96
}
97
ns = extract32(desc, 3, 1);
57
--
98
--
58
2.20.1
99
2.20.1
59
100
60
101
diff view generated by jsdifflib
1
From: Alex Bennée <alex.bennee@linaro.org>
1
Move the id_pfr0 and id_pfr1 fields into the ARMISARegisters
2
2
sub-struct. We're going to want id_pfr1 for an isar_features
3
When we converted to using feature bits in 602f6e42cfbf we missed out
3
check, and moving both at the same time avoids an odd
4
the fact (dp && arm_dc_feature(s, ARM_FEATURE_V8)) was supported for
4
inconsistency.
5
-cpu max configurations. This caused a regression in the GCC test
5
6
suite. Fix this by setting the appropriate bits in mvfr1.FPHP to
6
Changes other than the ones to cpu.h and kvm64.c made
7
report ARMv8-A with FP support (but not ARMv8.2-FP16).
7
automatically with:
8
8
perl -p -i -e 's/cpu->id_pfr/cpu->isar.id_pfr/' target/arm/*.c hw/intc/armv7m_nvic.c
9
Fixes: https://bugs.launchpad.net/qemu/+bug/1836078
9
10
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
11
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
12
Message-id: 20190711103737.10017-1-alex.bennee@linaro.org
12
Message-id: 20200910173855.4068-3-peter.maydell@linaro.org
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
---
13
---
15
target/arm/cpu.c | 4 ++++
14
target/arm/cpu.h | 4 ++--
16
1 file changed, 4 insertions(+)
15
hw/intc/armv7m_nvic.c | 4 ++--
17
16
target/arm/cpu.c | 20 ++++++++++----------
17
target/arm/cpu64.c | 12 ++++++------
18
target/arm/cpu_tcg.c | 36 ++++++++++++++++++------------------
19
target/arm/helper.c | 4 ++--
20
target/arm/kvm64.c | 4 ++++
21
7 files changed, 44 insertions(+), 40 deletions(-)
22
23
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
24
index XXXXXXX..XXXXXXX 100644
25
--- a/target/arm/cpu.h
26
+++ b/target/arm/cpu.h
27
@@ -XXX,XX +XXX,XX @@ struct ARMCPU {
28
uint32_t id_mmfr2;
29
uint32_t id_mmfr3;
30
uint32_t id_mmfr4;
31
+ uint32_t id_pfr0;
32
+ uint32_t id_pfr1;
33
uint32_t mvfr0;
34
uint32_t mvfr1;
35
uint32_t mvfr2;
36
@@ -XXX,XX +XXX,XX @@ struct ARMCPU {
37
uint32_t reset_fpsid;
38
uint32_t ctr;
39
uint32_t reset_sctlr;
40
- uint32_t id_pfr0;
41
- uint32_t id_pfr1;
42
uint64_t pmceid0;
43
uint64_t pmceid1;
44
uint32_t id_afr0;
45
diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c
46
index XXXXXXX..XXXXXXX 100644
47
--- a/hw/intc/armv7m_nvic.c
48
+++ b/hw/intc/armv7m_nvic.c
49
@@ -XXX,XX +XXX,XX @@ static uint32_t nvic_readl(NVICState *s, uint32_t offset, MemTxAttrs attrs)
50
"Aux Fault status registers unimplemented\n");
51
return 0;
52
case 0xd40: /* PFR0. */
53
- return cpu->id_pfr0;
54
+ return cpu->isar.id_pfr0;
55
case 0xd44: /* PFR1. */
56
- return cpu->id_pfr1;
57
+ return cpu->isar.id_pfr1;
58
case 0xd48: /* DFR0. */
59
return cpu->isar.id_dfr0;
60
case 0xd4c: /* AFR0. */
18
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
61
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
19
index XXXXXXX..XXXXXXX 100644
62
index XXXXXXX..XXXXXXX 100644
20
--- a/target/arm/cpu.c
63
--- a/target/arm/cpu.c
21
+++ b/target/arm/cpu.c
64
+++ b/target/arm/cpu.c
22
@@ -XXX,XX +XXX,XX @@ static void arm_max_initfn(Object *obj)
65
@@ -XXX,XX +XXX,XX @@ static void arm_cpu_realizefn(DeviceState *dev, Error **errp)
23
t = FIELD_DP32(t, ID_ISAR6, SPECRES, 1);
66
/* Disable the security extension feature bits in the processor feature
24
cpu->isar.id_isar6 = t;
67
* registers as well. These are id_pfr1[7:4] and id_aa64pfr0[15:12].
25
68
*/
26
+ t = cpu->isar.mvfr1;
69
- cpu->id_pfr1 &= ~0xf0;
27
+ t = FIELD_DP32(t, MVFR1, FPHP, 2); /* v8.0 FP support */
70
+ cpu->isar.id_pfr1 &= ~0xf0;
28
+ cpu->isar.mvfr1 = t;
71
cpu->isar.id_aa64pfr0 &= ~0xf000;
29
+
72
}
30
t = cpu->isar.mvfr2;
73
31
t = FIELD_DP32(t, MVFR2, SIMDMISC, 3); /* SIMD MaxNum */
74
@@ -XXX,XX +XXX,XX @@ static void arm_cpu_realizefn(DeviceState *dev, Error **errp)
32
t = FIELD_DP32(t, MVFR2, FPMISC, 4); /* FP MaxNum */
75
* id_aa64pfr0_el1[11:8].
76
*/
77
cpu->isar.id_aa64pfr0 &= ~0xf00;
78
- cpu->id_pfr1 &= ~0xf000;
79
+ cpu->isar.id_pfr1 &= ~0xf000;
80
}
81
82
#ifndef CONFIG_USER_ONLY
83
@@ -XXX,XX +XXX,XX @@ static void cortex_a8_initfn(Object *obj)
84
cpu->isar.mvfr1 = 0x00011111;
85
cpu->ctr = 0x82048004;
86
cpu->reset_sctlr = 0x00c50078;
87
- cpu->id_pfr0 = 0x1031;
88
- cpu->id_pfr1 = 0x11;
89
+ cpu->isar.id_pfr0 = 0x1031;
90
+ cpu->isar.id_pfr1 = 0x11;
91
cpu->isar.id_dfr0 = 0x400;
92
cpu->id_afr0 = 0;
93
cpu->isar.id_mmfr0 = 0x31100003;
94
@@ -XXX,XX +XXX,XX @@ static void cortex_a9_initfn(Object *obj)
95
cpu->isar.mvfr1 = 0x01111111;
96
cpu->ctr = 0x80038003;
97
cpu->reset_sctlr = 0x00c50078;
98
- cpu->id_pfr0 = 0x1031;
99
- cpu->id_pfr1 = 0x11;
100
+ cpu->isar.id_pfr0 = 0x1031;
101
+ cpu->isar.id_pfr1 = 0x11;
102
cpu->isar.id_dfr0 = 0x000;
103
cpu->id_afr0 = 0;
104
cpu->isar.id_mmfr0 = 0x00100103;
105
@@ -XXX,XX +XXX,XX @@ static void cortex_a7_initfn(Object *obj)
106
cpu->isar.mvfr1 = 0x11111111;
107
cpu->ctr = 0x84448003;
108
cpu->reset_sctlr = 0x00c50078;
109
- cpu->id_pfr0 = 0x00001131;
110
- cpu->id_pfr1 = 0x00011011;
111
+ cpu->isar.id_pfr0 = 0x00001131;
112
+ cpu->isar.id_pfr1 = 0x00011011;
113
cpu->isar.id_dfr0 = 0x02010555;
114
cpu->id_afr0 = 0x00000000;
115
cpu->isar.id_mmfr0 = 0x10101105;
116
@@ -XXX,XX +XXX,XX @@ static void cortex_a15_initfn(Object *obj)
117
cpu->isar.mvfr1 = 0x11111111;
118
cpu->ctr = 0x8444c004;
119
cpu->reset_sctlr = 0x00c50078;
120
- cpu->id_pfr0 = 0x00001131;
121
- cpu->id_pfr1 = 0x00011011;
122
+ cpu->isar.id_pfr0 = 0x00001131;
123
+ cpu->isar.id_pfr1 = 0x00011011;
124
cpu->isar.id_dfr0 = 0x02010555;
125
cpu->id_afr0 = 0x00000000;
126
cpu->isar.id_mmfr0 = 0x10201105;
127
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
128
index XXXXXXX..XXXXXXX 100644
129
--- a/target/arm/cpu64.c
130
+++ b/target/arm/cpu64.c
131
@@ -XXX,XX +XXX,XX @@ static void aarch64_a57_initfn(Object *obj)
132
cpu->isar.mvfr2 = 0x00000043;
133
cpu->ctr = 0x8444c004;
134
cpu->reset_sctlr = 0x00c50838;
135
- cpu->id_pfr0 = 0x00000131;
136
- cpu->id_pfr1 = 0x00011011;
137
+ cpu->isar.id_pfr0 = 0x00000131;
138
+ cpu->isar.id_pfr1 = 0x00011011;
139
cpu->isar.id_dfr0 = 0x03010066;
140
cpu->id_afr0 = 0x00000000;
141
cpu->isar.id_mmfr0 = 0x10101105;
142
@@ -XXX,XX +XXX,XX @@ static void aarch64_a53_initfn(Object *obj)
143
cpu->isar.mvfr2 = 0x00000043;
144
cpu->ctr = 0x84448004; /* L1Ip = VIPT */
145
cpu->reset_sctlr = 0x00c50838;
146
- cpu->id_pfr0 = 0x00000131;
147
- cpu->id_pfr1 = 0x00011011;
148
+ cpu->isar.id_pfr0 = 0x00000131;
149
+ cpu->isar.id_pfr1 = 0x00011011;
150
cpu->isar.id_dfr0 = 0x03010066;
151
cpu->id_afr0 = 0x00000000;
152
cpu->isar.id_mmfr0 = 0x10101105;
153
@@ -XXX,XX +XXX,XX @@ static void aarch64_a72_initfn(Object *obj)
154
cpu->isar.mvfr2 = 0x00000043;
155
cpu->ctr = 0x8444c004;
156
cpu->reset_sctlr = 0x00c50838;
157
- cpu->id_pfr0 = 0x00000131;
158
- cpu->id_pfr1 = 0x00011011;
159
+ cpu->isar.id_pfr0 = 0x00000131;
160
+ cpu->isar.id_pfr1 = 0x00011011;
161
cpu->isar.id_dfr0 = 0x03010066;
162
cpu->id_afr0 = 0x00000000;
163
cpu->isar.id_mmfr0 = 0x10201105;
164
diff --git a/target/arm/cpu_tcg.c b/target/arm/cpu_tcg.c
165
index XXXXXXX..XXXXXXX 100644
166
--- a/target/arm/cpu_tcg.c
167
+++ b/target/arm/cpu_tcg.c
168
@@ -XXX,XX +XXX,XX @@ static void arm1136_r2_initfn(Object *obj)
169
cpu->isar.mvfr1 = 0x00000000;
170
cpu->ctr = 0x1dd20d2;
171
cpu->reset_sctlr = 0x00050078;
172
- cpu->id_pfr0 = 0x111;
173
- cpu->id_pfr1 = 0x1;
174
+ cpu->isar.id_pfr0 = 0x111;
175
+ cpu->isar.id_pfr1 = 0x1;
176
cpu->isar.id_dfr0 = 0x2;
177
cpu->id_afr0 = 0x3;
178
cpu->isar.id_mmfr0 = 0x01130003;
179
@@ -XXX,XX +XXX,XX @@ static void arm1136_initfn(Object *obj)
180
cpu->isar.mvfr1 = 0x00000000;
181
cpu->ctr = 0x1dd20d2;
182
cpu->reset_sctlr = 0x00050078;
183
- cpu->id_pfr0 = 0x111;
184
- cpu->id_pfr1 = 0x1;
185
+ cpu->isar.id_pfr0 = 0x111;
186
+ cpu->isar.id_pfr1 = 0x1;
187
cpu->isar.id_dfr0 = 0x2;
188
cpu->id_afr0 = 0x3;
189
cpu->isar.id_mmfr0 = 0x01130003;
190
@@ -XXX,XX +XXX,XX @@ static void arm1176_initfn(Object *obj)
191
cpu->isar.mvfr1 = 0x00000000;
192
cpu->ctr = 0x1dd20d2;
193
cpu->reset_sctlr = 0x00050078;
194
- cpu->id_pfr0 = 0x111;
195
- cpu->id_pfr1 = 0x11;
196
+ cpu->isar.id_pfr0 = 0x111;
197
+ cpu->isar.id_pfr1 = 0x11;
198
cpu->isar.id_dfr0 = 0x33;
199
cpu->id_afr0 = 0;
200
cpu->isar.id_mmfr0 = 0x01130003;
201
@@ -XXX,XX +XXX,XX @@ static void arm11mpcore_initfn(Object *obj)
202
cpu->isar.mvfr0 = 0x11111111;
203
cpu->isar.mvfr1 = 0x00000000;
204
cpu->ctr = 0x1d192992; /* 32K icache 32K dcache */
205
- cpu->id_pfr0 = 0x111;
206
- cpu->id_pfr1 = 0x1;
207
+ cpu->isar.id_pfr0 = 0x111;
208
+ cpu->isar.id_pfr1 = 0x1;
209
cpu->isar.id_dfr0 = 0;
210
cpu->id_afr0 = 0x2;
211
cpu->isar.id_mmfr0 = 0x01100103;
212
@@ -XXX,XX +XXX,XX @@ static void cortex_m3_initfn(Object *obj)
213
set_feature(&cpu->env, ARM_FEATURE_M_MAIN);
214
cpu->midr = 0x410fc231;
215
cpu->pmsav7_dregion = 8;
216
- cpu->id_pfr0 = 0x00000030;
217
- cpu->id_pfr1 = 0x00000200;
218
+ cpu->isar.id_pfr0 = 0x00000030;
219
+ cpu->isar.id_pfr1 = 0x00000200;
220
cpu->isar.id_dfr0 = 0x00100000;
221
cpu->id_afr0 = 0x00000000;
222
cpu->isar.id_mmfr0 = 0x00000030;
223
@@ -XXX,XX +XXX,XX @@ static void cortex_m4_initfn(Object *obj)
224
cpu->isar.mvfr0 = 0x10110021;
225
cpu->isar.mvfr1 = 0x11000011;
226
cpu->isar.mvfr2 = 0x00000000;
227
- cpu->id_pfr0 = 0x00000030;
228
- cpu->id_pfr1 = 0x00000200;
229
+ cpu->isar.id_pfr0 = 0x00000030;
230
+ cpu->isar.id_pfr1 = 0x00000200;
231
cpu->isar.id_dfr0 = 0x00100000;
232
cpu->id_afr0 = 0x00000000;
233
cpu->isar.id_mmfr0 = 0x00000030;
234
@@ -XXX,XX +XXX,XX @@ static void cortex_m7_initfn(Object *obj)
235
cpu->isar.mvfr0 = 0x10110221;
236
cpu->isar.mvfr1 = 0x12000011;
237
cpu->isar.mvfr2 = 0x00000040;
238
- cpu->id_pfr0 = 0x00000030;
239
- cpu->id_pfr1 = 0x00000200;
240
+ cpu->isar.id_pfr0 = 0x00000030;
241
+ cpu->isar.id_pfr1 = 0x00000200;
242
cpu->isar.id_dfr0 = 0x00100000;
243
cpu->id_afr0 = 0x00000000;
244
cpu->isar.id_mmfr0 = 0x00100030;
245
@@ -XXX,XX +XXX,XX @@ static void cortex_m33_initfn(Object *obj)
246
cpu->isar.mvfr0 = 0x10110021;
247
cpu->isar.mvfr1 = 0x11000011;
248
cpu->isar.mvfr2 = 0x00000040;
249
- cpu->id_pfr0 = 0x00000030;
250
- cpu->id_pfr1 = 0x00000210;
251
+ cpu->isar.id_pfr0 = 0x00000030;
252
+ cpu->isar.id_pfr1 = 0x00000210;
253
cpu->isar.id_dfr0 = 0x00200000;
254
cpu->id_afr0 = 0x00000000;
255
cpu->isar.id_mmfr0 = 0x00101F40;
256
@@ -XXX,XX +XXX,XX @@ static void cortex_r5_initfn(Object *obj)
257
set_feature(&cpu->env, ARM_FEATURE_PMSA);
258
set_feature(&cpu->env, ARM_FEATURE_PMU);
259
cpu->midr = 0x411fc153; /* r1p3 */
260
- cpu->id_pfr0 = 0x0131;
261
- cpu->id_pfr1 = 0x001;
262
+ cpu->isar.id_pfr0 = 0x0131;
263
+ cpu->isar.id_pfr1 = 0x001;
264
cpu->isar.id_dfr0 = 0x010400;
265
cpu->id_afr0 = 0x0;
266
cpu->isar.id_mmfr0 = 0x0210030;
267
diff --git a/target/arm/helper.c b/target/arm/helper.c
268
index XXXXXXX..XXXXXXX 100644
269
--- a/target/arm/helper.c
270
+++ b/target/arm/helper.c
271
@@ -XXX,XX +XXX,XX @@ static void define_pmu_regs(ARMCPU *cpu)
272
static uint64_t id_pfr1_read(CPUARMState *env, const ARMCPRegInfo *ri)
273
{
274
ARMCPU *cpu = env_archcpu(env);
275
- uint64_t pfr1 = cpu->id_pfr1;
276
+ uint64_t pfr1 = cpu->isar.id_pfr1;
277
278
if (env->gicv3state) {
279
pfr1 |= 1 << 28;
280
@@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu)
281
.opc0 = 3, .opc1 = 0, .crn = 0, .crm = 1, .opc2 = 0,
282
.access = PL1_R, .type = ARM_CP_CONST,
283
.accessfn = access_aa32_tid3,
284
- .resetvalue = cpu->id_pfr0 },
285
+ .resetvalue = cpu->isar.id_pfr0 },
286
/* ID_PFR1 is not a plain ARM_CP_CONST because we don't know
287
* the value of the GIC field until after we define these regs.
288
*/
289
diff --git a/target/arm/kvm64.c b/target/arm/kvm64.c
290
index XXXXXXX..XXXXXXX 100644
291
--- a/target/arm/kvm64.c
292
+++ b/target/arm/kvm64.c
293
@@ -XXX,XX +XXX,XX @@ bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)
294
* than skipping the reads and leaving 0, as we must avoid
295
* considering the values in every case.
296
*/
297
+ err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_pfr0,
298
+ ARM64_SYS_REG(3, 0, 0, 1, 0));
299
+ err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_pfr1,
300
+ ARM64_SYS_REG(3, 0, 0, 1, 1));
301
err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_dfr0,
302
ARM64_SYS_REG(3, 0, 0, 1, 2));
303
err |= read_sys_reg32(fdarray[2], &ahcf->isar.id_mmfr0,
33
--
304
--
34
2.20.1
305
2.20.1
35
306
36
307
diff view generated by jsdifflib
New patch
1
M-profile CPUs only implement the ID registers as guest-visible if
2
the CPU implements the Main Extension (all our current CPUs except
3
the Cortex-M0 do).
1
4
5
Currently we handle this by having the Cortex-M0 leave the ID
6
register values in the ARMCPU struct as zero, but this conflicts with
7
our design decision to make QEMU behaviour be keyed off ID register
8
fields wherever possible.
9
10
Explicitly code the ID registers in the NVIC to return 0 if the Main
11
Extension is not implemented, so we can make the M0 model set the
12
ARMCPU struct fields to obtain the correct behaviour without those
13
values becoming guest-visible.
14
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
17
Message-id: 20200910173855.4068-4-peter.maydell@linaro.org
18
---
19
hw/intc/armv7m_nvic.c | 42 ++++++++++++++++++++++++++++++++++++++++++
20
1 file changed, 42 insertions(+)
21
22
diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c
23
index XXXXXXX..XXXXXXX 100644
24
--- a/hw/intc/armv7m_nvic.c
25
+++ b/hw/intc/armv7m_nvic.c
26
@@ -XXX,XX +XXX,XX @@ static uint32_t nvic_readl(NVICState *s, uint32_t offset, MemTxAttrs attrs)
27
"Aux Fault status registers unimplemented\n");
28
return 0;
29
case 0xd40: /* PFR0. */
30
+ if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) {
31
+ goto bad_offset;
32
+ }
33
return cpu->isar.id_pfr0;
34
case 0xd44: /* PFR1. */
35
+ if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) {
36
+ goto bad_offset;
37
+ }
38
return cpu->isar.id_pfr1;
39
case 0xd48: /* DFR0. */
40
+ if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) {
41
+ goto bad_offset;
42
+ }
43
return cpu->isar.id_dfr0;
44
case 0xd4c: /* AFR0. */
45
+ if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) {
46
+ goto bad_offset;
47
+ }
48
return cpu->id_afr0;
49
case 0xd50: /* MMFR0. */
50
+ if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) {
51
+ goto bad_offset;
52
+ }
53
return cpu->isar.id_mmfr0;
54
case 0xd54: /* MMFR1. */
55
+ if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) {
56
+ goto bad_offset;
57
+ }
58
return cpu->isar.id_mmfr1;
59
case 0xd58: /* MMFR2. */
60
+ if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) {
61
+ goto bad_offset;
62
+ }
63
return cpu->isar.id_mmfr2;
64
case 0xd5c: /* MMFR3. */
65
+ if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) {
66
+ goto bad_offset;
67
+ }
68
return cpu->isar.id_mmfr3;
69
case 0xd60: /* ISAR0. */
70
+ if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) {
71
+ goto bad_offset;
72
+ }
73
return cpu->isar.id_isar0;
74
case 0xd64: /* ISAR1. */
75
+ if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) {
76
+ goto bad_offset;
77
+ }
78
return cpu->isar.id_isar1;
79
case 0xd68: /* ISAR2. */
80
+ if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) {
81
+ goto bad_offset;
82
+ }
83
return cpu->isar.id_isar2;
84
case 0xd6c: /* ISAR3. */
85
+ if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) {
86
+ goto bad_offset;
87
+ }
88
return cpu->isar.id_isar3;
89
case 0xd70: /* ISAR4. */
90
+ if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) {
91
+ goto bad_offset;
92
+ }
93
return cpu->isar.id_isar4;
94
case 0xd74: /* ISAR5. */
95
+ if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) {
96
+ goto bad_offset;
97
+ }
98
return cpu->isar.id_isar5;
99
case 0xd78: /* CLIDR */
100
return cpu->clidr;
101
--
102
2.20.1
103
104
diff view generated by jsdifflib
1
In the M-profile architecture, when we do a vector table fetch and it
1
Give the Cortex-M0 ID register values corresponding to its
2
fails, we need to report a HardFault. Whether this is a Secure HF or
2
implemented behaviour. These will not be guest-visible but will be
3
a NonSecure HF depends on several things. If AIRCR.BFHFNMINS is 0
3
used to govern the behaviour of QEMU's emulation. We use the same
4
then HF is always Secure, because there is no NonSecure HardFault.
4
values that the Cortex-M3 does.
5
Otherwise, the answer depends on whether the 'underlying exception'
6
(MemManage, BusFault, SecureFault) targets Secure or NonSecure. (In
7
the pseudocode, this is handled in the Vector() function: the final
8
exc.isSecure is calculated by looking at the exc.isSecure from the
9
exception returned from the memory access, not the isSecure input
10
argument.)
11
12
We weren't doing this correctly, because we were looking at
13
the target security domain of the exception we were trying to
14
load the vector table entry for. This produces errors of two kinds:
15
* a load from the NS vector table which hits the "NS access
16
to S memory" SecureFault should end up as a Secure HardFault,
17
but we were raising an NS HardFault
18
* a load from the S vector table which causes a BusFault
19
should raise an NS HardFault if BFHFNMINS == 1 (because
20
in that case all BusFaults are NonSecure), but we were raising
21
a Secure HardFault
22
23
Correct the logic.
24
25
We also fix a comment error where we claimed that we might
26
be escalating MemManage to HardFault, and forgot about SecureFault.
27
(Vector loads can never hit MPU access faults, because they're
28
always aligned and always use the default address map.)
29
5
30
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
31
Message-id: 20190705094823.28905-1-peter.maydell@linaro.org
7
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20200910173855.4068-5-peter.maydell@linaro.org
32
---
9
---
33
target/arm/m_helper.c | 21 +++++++++++++++++----
10
target/arm/cpu_tcg.c | 24 ++++++++++++++++++++++++
34
1 file changed, 17 insertions(+), 4 deletions(-)
11
1 file changed, 24 insertions(+)
35
12
36
diff --git a/target/arm/m_helper.c b/target/arm/m_helper.c
13
diff --git a/target/arm/cpu_tcg.c b/target/arm/cpu_tcg.c
37
index XXXXXXX..XXXXXXX 100644
14
index XXXXXXX..XXXXXXX 100644
38
--- a/target/arm/m_helper.c
15
--- a/target/arm/cpu_tcg.c
39
+++ b/target/arm/m_helper.c
16
+++ b/target/arm/cpu_tcg.c
40
@@ -XXX,XX +XXX,XX @@ static bool arm_v7m_load_vector(ARMCPU *cpu, int exc, bool targets_secure,
17
@@ -XXX,XX +XXX,XX @@ static void cortex_m0_initfn(Object *obj)
41
if (sattrs.ns) {
18
set_feature(&cpu->env, ARM_FEATURE_M);
42
attrs.secure = false;
19
43
} else if (!targets_secure) {
20
cpu->midr = 0x410cc200;
44
- /* NS access to S memory */
21
+
45
+ /*
22
+ /*
46
+ * NS access to S memory: the underlying exception which we escalate
23
+ * These ID register values are not guest visible, because
47
+ * to HardFault is SecureFault, which always targets Secure.
24
+ * we do not implement the Main Extension. They must be set
48
+ */
25
+ * to values corresponding to the Cortex-M0's implemented
49
+ exc_secure = true;
26
+ * features, because QEMU generally controls its emulation
50
goto load_fail;
27
+ * by looking at ID register fields. We use the same values as
51
}
28
+ * for the M3.
52
}
29
+ */
53
@@ -XXX,XX +XXX,XX @@ static bool arm_v7m_load_vector(ARMCPU *cpu, int exc, bool targets_secure,
30
+ cpu->isar.id_pfr0 = 0x00000030;
54
vector_entry = address_space_ldl(arm_addressspace(cs, attrs), addr,
31
+ cpu->isar.id_pfr1 = 0x00000200;
55
attrs, &result);
32
+ cpu->isar.id_dfr0 = 0x00100000;
56
if (result != MEMTX_OK) {
33
+ cpu->id_afr0 = 0x00000000;
57
+ /*
34
+ cpu->isar.id_mmfr0 = 0x00000030;
58
+ * Underlying exception is BusFault: its target security state
35
+ cpu->isar.id_mmfr1 = 0x00000000;
59
+ * depends on BFHFNMINS.
36
+ cpu->isar.id_mmfr2 = 0x00000000;
60
+ */
37
+ cpu->isar.id_mmfr3 = 0x00000000;
61
+ exc_secure = !(cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK);
38
+ cpu->isar.id_isar0 = 0x01141110;
62
goto load_fail;
39
+ cpu->isar.id_isar1 = 0x02111000;
63
}
40
+ cpu->isar.id_isar2 = 0x21112231;
64
*pvec = vector_entry;
41
+ cpu->isar.id_isar3 = 0x01111110;
65
@@ -XXX,XX +XXX,XX @@ load_fail:
42
+ cpu->isar.id_isar4 = 0x01310102;
66
/*
43
+ cpu->isar.id_isar5 = 0x00000000;
67
* All vector table fetch fails are reported as HardFault, with
44
+ cpu->isar.id_isar6 = 0x00000000;
68
* HFSR.VECTTBL and .FORCED set. (FORCED is set because
45
}
69
- * technically the underlying exception is a MemManage or BusFault
46
70
+ * technically the underlying exception is a SecureFault or BusFault
47
static void cortex_m3_initfn(Object *obj)
71
* that is escalated to HardFault.) This is a terminal exception,
72
* so we will either take the HardFault immediately or else enter
73
* lockup (the latter case is handled in armv7m_nvic_set_pending_derived()).
74
+ * The HardFault is Secure if BFHFNMINS is 0 (meaning that all HFs are
75
+ * secure); otherwise it targets the same security state as the
76
+ * underlying exception.
77
*/
78
- exc_secure = targets_secure ||
79
- !(cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK);
80
+ if (!(cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK)) {
81
+ exc_secure = true;
82
+ }
83
env->v7m.hfsr |= R_V7M_HFSR_VECTTBL_MASK | R_V7M_HFSR_FORCED_MASK;
84
armv7m_nvic_set_pending_derived(env->nvic, ARMV7M_EXCP_HARD, exc_secure);
85
return false;
86
--
48
--
87
2.20.1
49
2.20.1
88
50
89
51
diff view generated by jsdifflib
1
The PL031 RTC tracks the difference between the guest RTC
1
The M-profile definition of the MVFR1 ID register differs slightly
2
and the host RTC using a tick_offset field. For migration,
2
from the A-profile one, and in particular the check for "does the CPU
3
however, we currently always migrate the offset between
3
support fp16 arithmetic" is not the same.
4
the guest and the vm_clock, even if the RTC clock is not
5
the same as the vm_clock; this was an attempt to retain
6
migration backwards compatibility.
7
4
8
Unfortunately this results in the RTC behaving oddly across
5
We don't currently implement any M-profile CPUs with fp16 arithmetic,
9
a VM state save and restore -- since the VM clock stands still
6
so this is not yet a visible bug, but correcting the logic now
10
across save-then-restore, regardless of how much real world
7
disarms this beartrap for when we eventually do.
11
time has elapsed, the guest RTC ends up out of sync with the
12
host RTC in the restored VM.
13
8
14
Fix this by migrating the raw tick_offset. To retain migration
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
15
compatibility as far as possible, we have a new property
10
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
16
migrate-tick-offset; by default this is 'true' and we will
11
Message-id: 20200910173855.4068-6-peter.maydell@linaro.org
17
migrate the true tick offset in a new subsection; if the
12
---
18
incoming data has no subsection we fall back to the old
13
target/arm/cpu.h | 31 ++++++++++++++++++++++++++-----
19
vm_clock-based offset information, so old->new migration
14
1 file changed, 26 insertions(+), 5 deletions(-)
20
compatibility is preserved. For complete new->old migration
21
compatibility, the property is set to 'false' for 4.0 and
22
earlier machine types (this will only affect 'virt-4.0'
23
and below, as none of the other pl031-using machines are
24
versioned).
25
15
26
Reported-by: Russell King <rmk@armlinux.org.uk>
16
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
27
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
28
Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
29
Message-id: 20190709143912.28905-1-peter.maydell@linaro.org
30
---
31
include/hw/timer/pl031.h | 2 +
32
hw/core/machine.c | 1 +
33
hw/timer/pl031.c | 92 ++++++++++++++++++++++++++++++++++++++--
34
3 files changed, 91 insertions(+), 4 deletions(-)
35
36
diff --git a/include/hw/timer/pl031.h b/include/hw/timer/pl031.h
37
index XXXXXXX..XXXXXXX 100644
17
index XXXXXXX..XXXXXXX 100644
38
--- a/include/hw/timer/pl031.h
18
--- a/target/arm/cpu.h
39
+++ b/include/hw/timer/pl031.h
19
+++ b/target/arm/cpu.h
40
@@ -XXX,XX +XXX,XX @@ typedef struct PL031State {
20
@@ -XXX,XX +XXX,XX @@ FIELD(ID_MMFR4, LSM, 20, 4)
41
*/
21
FIELD(ID_MMFR4, CCIDX, 24, 4)
42
uint32_t tick_offset_vmstate;
22
FIELD(ID_MMFR4, EVT, 28, 4)
43
uint32_t tick_offset;
23
44
+ bool tick_offset_migrated;
24
+FIELD(ID_PFR1, PROGMOD, 0, 4)
45
+ bool migrate_tick_offset;
25
+FIELD(ID_PFR1, SECURITY, 4, 4)
46
26
+FIELD(ID_PFR1, MPROGMOD, 8, 4)
47
uint32_t mr;
27
+FIELD(ID_PFR1, VIRTUALIZATION, 12, 4)
48
uint32_t lr;
28
+FIELD(ID_PFR1, GENTIMER, 16, 4)
49
diff --git a/hw/core/machine.c b/hw/core/machine.c
29
+FIELD(ID_PFR1, SEC_FRAC, 20, 4)
50
index XXXXXXX..XXXXXXX 100644
30
+FIELD(ID_PFR1, VIRT_FRAC, 24, 4)
51
--- a/hw/core/machine.c
31
+FIELD(ID_PFR1, GIC, 28, 4)
52
+++ b/hw/core/machine.c
32
+
53
@@ -XXX,XX +XXX,XX @@ GlobalProperty hw_compat_4_0[] = {
33
FIELD(ID_AA64ISAR0, AES, 4, 4)
54
{ "virtio-gpu-pci", "edid", "false" },
34
FIELD(ID_AA64ISAR0, SHA1, 8, 4)
55
{ "virtio-device", "use-started", "false" },
35
FIELD(ID_AA64ISAR0, SHA2, 12, 4)
56
{ "virtio-balloon-device", "qemu-4-0-config-size", "true" },
36
@@ -XXX,XX +XXX,XX @@ FIELD(MVFR0, FPROUND, 28, 4)
57
+ { "pl031", "migrate-tick-offset", "false" },
37
58
};
38
FIELD(MVFR1, FPFTZ, 0, 4)
59
const size_t hw_compat_4_0_len = G_N_ELEMENTS(hw_compat_4_0);
39
FIELD(MVFR1, FPDNAN, 4, 4)
60
40
-FIELD(MVFR1, SIMDLS, 8, 4)
61
diff --git a/hw/timer/pl031.c b/hw/timer/pl031.c
41
-FIELD(MVFR1, SIMDINT, 12, 4)
62
index XXXXXXX..XXXXXXX 100644
42
-FIELD(MVFR1, SIMDSP, 16, 4)
63
--- a/hw/timer/pl031.c
43
-FIELD(MVFR1, SIMDHP, 20, 4)
64
+++ b/hw/timer/pl031.c
44
+FIELD(MVFR1, SIMDLS, 8, 4) /* A-profile only */
65
@@ -XXX,XX +XXX,XX @@ static int pl031_pre_save(void *opaque)
45
+FIELD(MVFR1, SIMDINT, 12, 4) /* A-profile only */
66
{
46
+FIELD(MVFR1, SIMDSP, 16, 4) /* A-profile only */
67
PL031State *s = opaque;
47
+FIELD(MVFR1, SIMDHP, 20, 4) /* A-profile only */
68
48
+FIELD(MVFR1, MVE, 8, 4) /* M-profile only */
69
- /* tick_offset is base_time - rtc_clock base time. Instead, we want to
49
+FIELD(MVFR1, FP16, 20, 4) /* M-profile only */
70
- * store the base time relative to the QEMU_CLOCK_VIRTUAL for backwards-compatibility. */
50
FIELD(MVFR1, FPHP, 24, 4)
71
+ /*
51
FIELD(MVFR1, SIMDFMAC, 28, 4)
72
+ * The PL031 device model code uses the tick_offset field, which is
52
73
+ * the offset between what the guest RTC should read and what the
53
@@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa32_predinv(const ARMISARegisters *id)
74
+ * QEMU rtc_clock reads:
54
return FIELD_EX32(id->id_isar6, ID_ISAR6, SPECRES) != 0;
75
+ * guest_rtc = rtc_clock + tick_offset
76
+ * and so
77
+ * tick_offset = guest_rtc - rtc_clock
78
+ *
79
+ * We want to migrate this offset, which sounds straightforward.
80
+ * Unfortunately older versions of QEMU migrated a conversion of this
81
+ * offset into an offset from the vm_clock. (This was in turn an
82
+ * attempt to be compatible with even older QEMU versions, but it
83
+ * has incorrect behaviour if the rtc_clock is not the same as the
84
+ * vm_clock.) So we put the actual tick_offset into a migration
85
+ * subsection, and the backwards-compatible time-relative-to-vm_clock
86
+ * in the main migration state.
87
+ *
88
+ * Calculate base time relative to QEMU_CLOCK_VIRTUAL:
89
+ */
90
int64_t delta = qemu_clock_get_ns(rtc_clock) - qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL);
91
s->tick_offset_vmstate = s->tick_offset + delta / NANOSECONDS_PER_SECOND;
92
93
return 0;
94
}
55
}
95
56
96
+static int pl031_pre_load(void *opaque)
57
+static inline bool isar_feature_aa32_mprofile(const ARMISARegisters *id)
97
+{
58
+{
98
+ PL031State *s = opaque;
59
+ return FIELD_EX32(id->id_pfr1, ID_PFR1, MPROGMOD) != 0;
99
+
100
+ s->tick_offset_migrated = false;
101
+ return 0;
102
+}
60
+}
103
+
61
+
104
static int pl031_post_load(void *opaque, int version_id)
62
static inline bool isar_feature_aa32_fp16_arith(const ARMISARegisters *id)
105
{
63
{
106
PL031State *s = opaque;
64
- return FIELD_EX32(id->mvfr1, MVFR1, FPHP) >= 3;
107
65
+ /* Sadly this is encoded differently for A-profile and M-profile */
108
- int64_t delta = qemu_clock_get_ns(rtc_clock) - qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL);
66
+ if (isar_feature_aa32_mprofile(id)) {
109
- s->tick_offset = s->tick_offset_vmstate - delta / NANOSECONDS_PER_SECOND;
67
+ return FIELD_EX32(id->mvfr1, MVFR1, FP16) > 0;
110
+ /*
68
+ } else {
111
+ * If we got the tick_offset subsection, then we can just use
69
+ return FIELD_EX32(id->mvfr1, MVFR1, FPHP) >= 3;
112
+ * the value in that. Otherwise the source is an older QEMU and
113
+ * has given us the offset from the vm_clock; convert it back to
114
+ * an offset from the rtc_clock. This will cause time to incorrectly
115
+ * go backwards compared to the host RTC, but this is unavoidable.
116
+ */
117
+
118
+ if (!s->tick_offset_migrated) {
119
+ int64_t delta = qemu_clock_get_ns(rtc_clock) -
120
+ qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL);
121
+ s->tick_offset = s->tick_offset_vmstate -
122
+ delta / NANOSECONDS_PER_SECOND;
123
+ }
70
+ }
124
pl031_set_alarm(s);
125
return 0;
126
}
71
}
127
72
128
+static int pl031_tick_offset_post_load(void *opaque, int version_id)
73
static inline bool isar_feature_aa32_vfp_simd(const ARMISARegisters *id)
129
+{
130
+ PL031State *s = opaque;
131
+
132
+ s->tick_offset_migrated = true;
133
+ return 0;
134
+}
135
+
136
+static bool pl031_tick_offset_needed(void *opaque)
137
+{
138
+ PL031State *s = opaque;
139
+
140
+ return s->migrate_tick_offset;
141
+}
142
+
143
+static const VMStateDescription vmstate_pl031_tick_offset = {
144
+ .name = "pl031/tick-offset",
145
+ .version_id = 1,
146
+ .minimum_version_id = 1,
147
+ .needed = pl031_tick_offset_needed,
148
+ .post_load = pl031_tick_offset_post_load,
149
+ .fields = (VMStateField[]) {
150
+ VMSTATE_UINT32(tick_offset, PL031State),
151
+ VMSTATE_END_OF_LIST()
152
+ }
153
+};
154
+
155
static const VMStateDescription vmstate_pl031 = {
156
.name = "pl031",
157
.version_id = 1,
158
.minimum_version_id = 1,
159
.pre_save = pl031_pre_save,
160
+ .pre_load = pl031_pre_load,
161
.post_load = pl031_post_load,
162
.fields = (VMStateField[]) {
163
VMSTATE_UINT32(tick_offset_vmstate, PL031State),
164
@@ -XXX,XX +XXX,XX @@ static const VMStateDescription vmstate_pl031 = {
165
VMSTATE_UINT32(im, PL031State),
166
VMSTATE_UINT32(is, PL031State),
167
VMSTATE_END_OF_LIST()
168
+ },
169
+ .subsections = (const VMStateDescription*[]) {
170
+ &vmstate_pl031_tick_offset,
171
+ NULL
172
}
173
};
174
175
+static Property pl031_properties[] = {
176
+ /*
177
+ * True to correctly migrate the tick offset of the RTC. False to
178
+ * obtain backward migration compatibility with older QEMU versions,
179
+ * at the expense of the guest RTC going backwards compared with the
180
+ * host RTC when the VM is saved/restored if using -rtc host.
181
+ * (Even if set to 'true' older QEMU can migrate forward to newer QEMU;
182
+ * 'false' also permits newer QEMU to migrate to older QEMU.)
183
+ */
184
+ DEFINE_PROP_BOOL("migrate-tick-offset",
185
+ PL031State, migrate_tick_offset, true),
186
+ DEFINE_PROP_END_OF_LIST()
187
+};
188
+
189
static void pl031_class_init(ObjectClass *klass, void *data)
190
{
191
DeviceClass *dc = DEVICE_CLASS(klass);
192
193
dc->vmsd = &vmstate_pl031;
194
+ dc->props = pl031_properties;
195
}
196
197
static const TypeInfo pl031_info = {
198
--
74
--
199
2.20.1
75
2.20.1
200
76
201
77
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
The mte update missed a bit when producing clean addresses.
4
5
Fixes: b2aa8879b88
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 20200916014102.2446323-1-richard.henderson@linaro.org
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/translate-sve.c | 4 ++--
12
1 file changed, 2 insertions(+), 2 deletions(-)
13
14
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
15
index XXXXXXX..XXXXXXX 100644
16
--- a/target/arm/translate-sve.c
17
+++ b/target/arm/translate-sve.c
18
@@ -XXX,XX +XXX,XX @@ static void do_ldr(DisasContext *s, uint32_t vofs, int len, int rn, int imm)
19
for (i = 0; i < len_align; i += 8) {
20
tcg_gen_qemu_ld_i64(t0, clean_addr, midx, MO_LEQ);
21
tcg_gen_st_i64(t0, cpu_env, vofs + i);
22
- tcg_gen_addi_i64(clean_addr, cpu_reg_sp(s, rn), 8);
23
+ tcg_gen_addi_i64(clean_addr, clean_addr, 8);
24
}
25
tcg_temp_free_i64(t0);
26
} else {
27
@@ -XXX,XX +XXX,XX @@ static void do_str(DisasContext *s, uint32_t vofs, int len, int rn, int imm)
28
for (i = 0; i < len_align; i += 8) {
29
tcg_gen_ld_i64(t0, cpu_env, vofs + i);
30
tcg_gen_qemu_st_i64(t0, clean_addr, midx, MO_LEQ);
31
- tcg_gen_addi_i64(clean_addr, cpu_reg_sp(s, rn), 8);
32
+ tcg_gen_addi_i64(clean_addr, clean_addr, 8);
33
}
34
tcg_temp_free_i64(t0);
35
} else {
36
--
37
2.20.1
38
39
diff view generated by jsdifflib
1
From: David Engraf <david.engraf@sysgo.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Using the whole 128 MiB flash in non-secure mode is not working because
3
While converting to gen_gvec_ool_zzzp, we lost passing
4
virt_flash_fdt() expects the same address for secure_sysmem and sysmem.
4
a->esz as the data argument to the function.
5
This is not correctly handled by caller because it forwards NULL for
6
secure_sysmem in non-secure flash mode.
7
5
8
Fixed by using sysmem when secure_sysmem is NULL.
6
Fixes: 36cbb7a8e71
9
7
Cc: qemu-stable@nongnu.org
10
Signed-off-by: David Engraf <david.engraf@sysgo.com>
8
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
11
Message-id: 20190712075002.14326-1-david.engraf@sysgo.com
9
Message-id: 20200918000500.2690937-1-richard.henderson@linaro.org
12
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
---
12
---
15
hw/arm/virt.c | 2 +-
13
target/arm/translate-sve.c | 2 +-
16
1 file changed, 1 insertion(+), 1 deletion(-)
14
1 file changed, 1 insertion(+), 1 deletion(-)
17
15
18
diff --git a/hw/arm/virt.c b/hw/arm/virt.c
16
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
19
index XXXXXXX..XXXXXXX 100644
17
index XXXXXXX..XXXXXXX 100644
20
--- a/hw/arm/virt.c
18
--- a/target/arm/translate-sve.c
21
+++ b/hw/arm/virt.c
19
+++ b/target/arm/translate-sve.c
22
@@ -XXX,XX +XXX,XX @@ static void machvirt_init(MachineState *machine)
20
@@ -XXX,XX +XXX,XX @@ static bool trans_SPLICE(DisasContext *s, arg_rprr_esz *a)
23
&machine->device_memory->mr);
21
{
22
if (sve_access_check(s)) {
23
gen_gvec_ool_zzzp(s, gen_helper_sve_splice,
24
- a->rd, a->rn, a->rm, a->pg, 0);
25
+ a->rd, a->rn, a->rm, a->pg, a->esz);
24
}
26
}
25
27
return true;
26
- virt_flash_fdt(vms, sysmem, secure_sysmem);
28
}
27
+ virt_flash_fdt(vms, sysmem, secure_sysmem ?: sysmem);
28
29
create_gic(vms, pic);
30
31
--
29
--
32
2.20.1
30
2.20.1
33
31
34
32
diff view generated by jsdifflib
New patch
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
1
2
3
The Raspberry firmware is closed-source. While running it, it
4
accesses various I/O registers. Logging these accesses as UNIMP
5
(unimplemented) help to understand what the firmware is doing
6
(ideally we want it able to boot a Linux kernel).
7
8
Document various blocks we might use later.
9
10
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
11
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
12
Reviewed-by: Luc Michel <luc.michel@greensocs.com>
13
Message-id: 20200921034729.432931-2-f4bug@amsat.org
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
15
---
16
include/hw/arm/raspi_platform.h | 51 +++++++++++++++++++++++++++------
17
1 file changed, 43 insertions(+), 8 deletions(-)
18
19
diff --git a/include/hw/arm/raspi_platform.h b/include/hw/arm/raspi_platform.h
20
index XXXXXXX..XXXXXXX 100644
21
--- a/include/hw/arm/raspi_platform.h
22
+++ b/include/hw/arm/raspi_platform.h
23
@@ -XXX,XX +XXX,XX @@
24
* You should have received a copy of the GNU General Public License
25
* along with this program; if not, write to the Free Software
26
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
27
+ *
28
+ * Various undocumented addresses and names come from Herman Hermitage's VC4
29
+ * documentation:
30
+ * https://github.com/hermanhermitage/videocoreiv/wiki/MMIO-Register-map
31
*/
32
33
#ifndef HW_ARM_RASPI_PLATFORM_H
34
#define HW_ARM_RASPI_PLATFORM_H
35
36
#define MSYNC_OFFSET 0x0000 /* Multicore Sync Block */
37
-#define IC0_OFFSET 0x2000
38
+#define CCPT_OFFSET 0x1000 /* Compact Camera Port 2 TX */
39
+#define INTE_OFFSET 0x2000 /* VC Interrupt controller */
40
#define ST_OFFSET 0x3000 /* System Timer */
41
+#define TXP_OFFSET 0x4000 /* Transposer */
42
+#define JPEG_OFFSET 0x5000
43
#define MPHI_OFFSET 0x6000 /* Message-based Parallel Host Intf. */
44
#define DMA_OFFSET 0x7000 /* DMA controller, channels 0-14 */
45
-#define ARM_OFFSET 0xB000 /* BCM2708 ARM control block */
46
+#define ARBA_OFFSET 0x9000
47
+#define BRDG_OFFSET 0xa000
48
+#define ARM_OFFSET 0xB000 /* ARM control block */
49
#define ARMCTRL_OFFSET (ARM_OFFSET + 0x000)
50
#define ARMCTRL_IC_OFFSET (ARM_OFFSET + 0x200) /* Interrupt controller */
51
-#define ARMCTRL_TIMER0_1_OFFSET (ARM_OFFSET + 0x400) /* Timer 0 and 1 */
52
+#define ARMCTRL_TIMER0_1_OFFSET (ARM_OFFSET + 0x400) /* Timer 0 and 1 (SP804) */
53
#define ARMCTRL_0_SBM_OFFSET (ARM_OFFSET + 0x800) /* User 0 (ARM) Semaphores
54
* Doorbells & Mailboxes */
55
#define CPRMAN_OFFSET 0x100000 /* Power Management, Watchdog */
56
@@ -XXX,XX +XXX,XX @@
57
#define AVS_OFFSET 0x103000 /* Audio Video Standard */
58
#define RNG_OFFSET 0x104000
59
#define GPIO_OFFSET 0x200000
60
-#define UART0_OFFSET 0x201000
61
-#define MMCI0_OFFSET 0x202000
62
-#define I2S_OFFSET 0x203000
63
-#define SPI0_OFFSET 0x204000
64
+#define UART0_OFFSET 0x201000 /* PL011 */
65
+#define MMCI0_OFFSET 0x202000 /* Legacy MMC */
66
+#define I2S_OFFSET 0x203000 /* PCM */
67
+#define SPI0_OFFSET 0x204000 /* SPI master */
68
#define BSC0_OFFSET 0x205000 /* BSC0 I2C/TWI */
69
+#define PIXV0_OFFSET 0x206000
70
+#define PIXV1_OFFSET 0x207000
71
+#define DPI_OFFSET 0x208000
72
+#define DSI0_OFFSET 0x209000 /* Display Serial Interface */
73
+#define PWM_OFFSET 0x20c000
74
+#define PERM_OFFSET 0x20d000
75
+#define TEC_OFFSET 0x20e000
76
#define OTP_OFFSET 0x20f000
77
+#define SLIM_OFFSET 0x210000 /* SLIMbus */
78
+#define CPG_OFFSET 0x211000
79
#define THERMAL_OFFSET 0x212000
80
-#define BSC_SL_OFFSET 0x214000 /* SPI slave */
81
+#define AVSP_OFFSET 0x213000
82
+#define BSC_SL_OFFSET 0x214000 /* SPI slave (bootrom) */
83
#define AUX_OFFSET 0x215000 /* AUX: UART1/SPI1/SPI2 */
84
#define EMMC1_OFFSET 0x300000
85
+#define EMMC2_OFFSET 0x340000
86
+#define HVS_OFFSET 0x400000
87
#define SMI_OFFSET 0x600000
88
+#define DSI1_OFFSET 0x700000
89
+#define UCAM_OFFSET 0x800000
90
+#define CMI_OFFSET 0x802000
91
#define BSC1_OFFSET 0x804000 /* BSC1 I2C/TWI */
92
#define BSC2_OFFSET 0x805000 /* BSC2 I2C/TWI */
93
+#define VECA_OFFSET 0x806000
94
+#define PIXV2_OFFSET 0x807000
95
+#define HDMI_OFFSET 0x808000
96
+#define HDCP_OFFSET 0x809000
97
+#define ARBR0_OFFSET 0x80a000
98
#define DBUS_OFFSET 0x900000
99
#define AVE0_OFFSET 0x910000
100
#define USB_OTG_OFFSET 0x980000 /* DTC_OTG USB controller */
101
+#define V3D_OFFSET 0xc00000
102
#define SDRAMC_OFFSET 0xe00000
103
+#define L2CC_OFFSET 0xe01000 /* Level 2 Cache controller */
104
+#define L1CC_OFFSET 0xe02000 /* Level 1 Cache controller */
105
+#define ARBR1_OFFSET 0xe04000
106
#define DMA15_OFFSET 0xE05000 /* DMA controller, channel 15 */
107
+#define DCRC_OFFSET 0xe07000
108
+#define AXIP_OFFSET 0xe08000
109
110
/* GPU interrupts */
111
#define INTERRUPT_TIMER0 0
112
--
113
2.20.1
114
115
diff view generated by jsdifflib
1
From: Philippe Mathieu-Daudé <philmd@redhat.com>
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
2
2
3
In the previous commit we fixed a crash when the guest read a
3
The bcm2835-v3d is used since Linux 4.7, see commit
4
register that pop from an empty FIFO.
4
49ac67e0c39c ("ARM: bcm2835: Add VC4 to the device tree"),
5
By auditing the repository, we found another similar use with
5
and the bcm2835-txp since Linux 4.19, see commit
6
an easy way to reproduce:
6
b7dd29b401f5 ("ARM: dts: bcm283x: Add Transposer block").
7
7
8
$ qemu-system-aarch64 -M xlnx-zcu102 -monitor stdio -S
8
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
9
QEMU 4.0.50 monitor - type 'help' for more information
9
Reviewed-by: Luc Michel <luc.michel@greensocs.com>
10
(qemu) xp/b 0xfd4a0134
10
Message-id: 20200921034729.432931-3-f4bug@amsat.org
11
Aborted (core dumped)
12
13
(gdb) bt
14
#0 0x00007f6936dea57f in raise () at /lib64/libc.so.6
15
#1 0x00007f6936dd4895 in abort () at /lib64/libc.so.6
16
#2 0x0000561ad32975ec in xlnx_dp_aux_pop_rx_fifo (s=0x7f692babee70) at hw/display/xlnx_dp.c:431
17
#3 0x0000561ad3297dc0 in xlnx_dp_read (opaque=0x7f692babee70, offset=77, size=4) at hw/display/xlnx_dp.c:667
18
#4 0x0000561ad321b896 in memory_region_read_accessor (mr=0x7f692babf620, addr=308, value=0x7ffe05c1db88, size=4, shift=0, mask=4294967295, attrs=...) at memory.c:439
19
#5 0x0000561ad321bd70 in access_with_adjusted_size (addr=308, value=0x7ffe05c1db88, size=1, access_size_min=4, access_size_max=4, access_fn=0x561ad321b858 <memory_region_read_accessor>, mr=0x7f692babf620, attrs=...) at memory.c:569
20
#6 0x0000561ad321e9d5 in memory_region_dispatch_read1 (mr=0x7f692babf620, addr=308, pval=0x7ffe05c1db88, size=1, attrs=...) at memory.c:1420
21
#7 0x0000561ad321ea9d in memory_region_dispatch_read (mr=0x7f692babf620, addr=308, pval=0x7ffe05c1db88, size=1, attrs=...) at memory.c:1447
22
#8 0x0000561ad31bd742 in flatview_read_continue (fv=0x561ad69c04f0, addr=4249485620, attrs=..., buf=0x7ffe05c1dcf0 "\020\335\301\005\376\177", len=1, addr1=308, l=1, mr=0x7f692babf620) at exec.c:3385
23
#9 0x0000561ad31bd895 in flatview_read (fv=0x561ad69c04f0, addr=4249485620, attrs=..., buf=0x7ffe05c1dcf0 "\020\335\301\005\376\177", len=1) at exec.c:3423
24
#10 0x0000561ad31bd90b in address_space_read_full (as=0x561ad5bb3020, addr=4249485620, attrs=..., buf=0x7ffe05c1dcf0 "\020\335\301\005\376\177", len=1) at exec.c:3436
25
#11 0x0000561ad33b1c42 in address_space_read (len=1, buf=0x7ffe05c1dcf0 "\020\335\301\005\376\177", attrs=..., addr=4249485620, as=0x561ad5bb3020) at include/exec/memory.h:2131
26
#12 0x0000561ad33b1c42 in memory_dump (mon=0x561ad59c4530, count=1, format=120, wsize=1, addr=4249485620, is_physical=1) at monitor/misc.c:723
27
#13 0x0000561ad33b1fc1 in hmp_physical_memory_dump (mon=0x561ad59c4530, qdict=0x561ad6c6fd00) at monitor/misc.c:795
28
#14 0x0000561ad37b4a9f in handle_hmp_command (mon=0x561ad59c4530, cmdline=0x561ad59d0f22 "/b 0x00000000fd4a0134") at monitor/hmp.c:1082
29
30
Fix by checking the FIFO is not empty before popping from it.
31
32
The datasheet is not clear about the reset value of this register,
33
we choose to return '0'.
34
35
Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com>
36
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
37
Message-id: 20190709113715.7761-4-philmd@redhat.com
38
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
39
---
12
---
40
hw/display/xlnx_dp.c | 15 +++++++++++----
13
include/hw/arm/bcm2835_peripherals.h | 2 ++
41
1 file changed, 11 insertions(+), 4 deletions(-)
14
hw/arm/bcm2835_peripherals.c | 2 ++
15
2 files changed, 4 insertions(+)
42
16
43
diff --git a/hw/display/xlnx_dp.c b/hw/display/xlnx_dp.c
17
diff --git a/include/hw/arm/bcm2835_peripherals.h b/include/hw/arm/bcm2835_peripherals.h
44
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
45
--- a/hw/display/xlnx_dp.c
19
--- a/include/hw/arm/bcm2835_peripherals.h
46
+++ b/hw/display/xlnx_dp.c
20
+++ b/include/hw/arm/bcm2835_peripherals.h
47
@@ -XXX,XX +XXX,XX @@ static uint8_t xlnx_dp_aux_pop_rx_fifo(XlnxDPState *s)
21
@@ -XXX,XX +XXX,XX @@ struct BCM2835PeripheralState {
48
uint8_t ret;
22
49
23
BCM2835SystemTimerState systmr;
50
if (fifo8_is_empty(&s->rx_fifo)) {
24
BCM2835MphiState mphi;
51
- DPRINTF("rx_fifo underflow..\n");
25
+ UnimplementedDeviceState txp;
52
- abort();
26
UnimplementedDeviceState armtmr;
53
+ qemu_log_mask(LOG_GUEST_ERROR,
27
UnimplementedDeviceState cprman;
54
+ "%s: Reading empty RX_FIFO\n",
28
UnimplementedDeviceState a2w;
55
+ __func__);
29
@@ -XXX,XX +XXX,XX @@ struct BCM2835PeripheralState {
56
+ /*
30
UnimplementedDeviceState otp;
57
+ * The datasheet is not clear about the reset value, it seems
31
UnimplementedDeviceState dbus;
58
+ * to be unspecified. We choose to return '0'.
32
UnimplementedDeviceState ave0;
59
+ */
33
+ UnimplementedDeviceState v3d;
60
+ ret = 0;
34
UnimplementedDeviceState bscsl;
61
+ } else {
35
UnimplementedDeviceState smi;
62
+ ret = fifo8_pop(&s->rx_fifo);
36
DWC2State dwc2;
63
+ DPRINTF("pop 0x%" PRIX8 " from rx_fifo.\n", ret);
37
diff --git a/hw/arm/bcm2835_peripherals.c b/hw/arm/bcm2835_peripherals.c
64
}
38
index XXXXXXX..XXXXXXX 100644
65
- ret = fifo8_pop(&s->rx_fifo);
39
--- a/hw/arm/bcm2835_peripherals.c
66
- DPRINTF("pop 0x%" PRIX8 " from rx_fifo.\n", ret);
40
+++ b/hw/arm/bcm2835_peripherals.c
67
return ret;
41
@@ -XXX,XX +XXX,XX @@ static void bcm2835_peripherals_realize(DeviceState *dev, Error **errp)
42
qdev_get_gpio_in_named(DEVICE(&s->ic), BCM2835_IC_GPU_IRQ,
43
INTERRUPT_USB));
44
45
+ create_unimp(s, &s->txp, "bcm2835-txp", TXP_OFFSET, 0x1000);
46
create_unimp(s, &s->armtmr, "bcm2835-sp804", ARMCTRL_TIMER0_1_OFFSET, 0x40);
47
create_unimp(s, &s->cprman, "bcm2835-cprman", CPRMAN_OFFSET, 0x1000);
48
create_unimp(s, &s->a2w, "bcm2835-a2w", A2W_OFFSET, 0x1000);
49
@@ -XXX,XX +XXX,XX @@ static void bcm2835_peripherals_realize(DeviceState *dev, Error **errp)
50
create_unimp(s, &s->otp, "bcm2835-otp", OTP_OFFSET, 0x80);
51
create_unimp(s, &s->dbus, "bcm2835-dbus", DBUS_OFFSET, 0x8000);
52
create_unimp(s, &s->ave0, "bcm2835-ave0", AVE0_OFFSET, 0x8000);
53
+ create_unimp(s, &s->v3d, "bcm2835-v3d", V3D_OFFSET, 0x1000);
54
create_unimp(s, &s->sdramc, "bcm2835-sdramc", SDRAMC_OFFSET, 0x100);
68
}
55
}
69
56
70
--
57
--
71
2.20.1
58
2.20.1
72
59
73
60
diff view generated by jsdifflib
New patch
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
1
2
3
Commit 1c3db49d39 added the raspi3, which uses the same peripherals
4
than the raspi2 (but with different ARM cores). The raspi3 was
5
introduced without the ignore_memory_transaction_failures flag.
6
Almost 2 years later, the machine is usable running U-Boot and
7
Linux.
8
In commit 00cbd5bd74 we mapped a lot of unimplemented devices,
9
commit d442d95f added thermal block and commit 0e5bbd7406 the
10
system timer.
11
As we are happy with the raspi3, let's remove this flag on the
12
raspi2.
13
14
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
15
Reviewed-by: Luc Michel <luc.michel@greensocs.com>
16
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
17
Message-id: 20200921034729.432931-4-f4bug@amsat.org
18
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
19
---
20
hw/arm/raspi.c | 3 ---
21
1 file changed, 3 deletions(-)
22
23
diff --git a/hw/arm/raspi.c b/hw/arm/raspi.c
24
index XXXXXXX..XXXXXXX 100644
25
--- a/hw/arm/raspi.c
26
+++ b/hw/arm/raspi.c
27
@@ -XXX,XX +XXX,XX @@ static void raspi_machine_class_init(ObjectClass *oc, void *data)
28
mc->default_cpus = mc->min_cpus = mc->max_cpus = cores_count(board_rev);
29
mc->default_ram_size = board_ram_size(board_rev);
30
mc->default_ram_id = "ram";
31
- if (board_version(board_rev) == 2) {
32
- mc->ignore_memory_transaction_failures = true;
33
- }
34
};
35
36
static const TypeInfo raspi_machine_types[] = {
37
--
38
2.20.1
39
40
diff view generated by jsdifflib
New patch
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
1
2
3
Display the board revision in the machine description.
4
5
Before:
6
7
$ qemu-system-aarch64 -M help | fgrep raspi
8
raspi2 Raspberry Pi 2B
9
raspi3 Raspberry Pi 3B
10
11
After:
12
13
raspi2 Raspberry Pi 2B (revision 1.1)
14
raspi3 Raspberry Pi 3B (revision 1.2)
15
16
Reviewed-by: Luc Michel <luc.michel@greensocs.com>
17
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
18
Message-id: 20200924111808.77168-2-f4bug@amsat.org
19
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
20
---
21
hw/arm/raspi.c | 4 +++-
22
1 file changed, 3 insertions(+), 1 deletion(-)
23
24
diff --git a/hw/arm/raspi.c b/hw/arm/raspi.c
25
index XXXXXXX..XXXXXXX 100644
26
--- a/hw/arm/raspi.c
27
+++ b/hw/arm/raspi.c
28
@@ -XXX,XX +XXX,XX @@ static void raspi_machine_class_init(ObjectClass *oc, void *data)
29
uint32_t board_rev = (uint32_t)(uintptr_t)data;
30
31
rmc->board_rev = board_rev;
32
- mc->desc = g_strdup_printf("Raspberry Pi %s", board_type(board_rev));
33
+ mc->desc = g_strdup_printf("Raspberry Pi %s (revision 1.%u)",
34
+ board_type(board_rev),
35
+ FIELD_EX32(board_rev, REV_CODE, REVISION));
36
mc->init = raspi_machine_init;
37
mc->block_default_type = IF_SD;
38
mc->no_parallel = 1;
39
--
40
2.20.1
41
42
diff view generated by jsdifflib
New patch
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
1
2
3
The 'first_cpu' is more a QEMU accelerator-related concept
4
than a variable the machine requires to use.
5
Since the machine is aware of its CPUs, directly use the
6
first one to load the firmware.
7
8
Reviewed-by: Luc Michel <luc.michel@greensocs.com>
9
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
10
Message-id: 20200924111808.77168-3-f4bug@amsat.org
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
13
hw/arm/raspi.c | 3 ++-
14
1 file changed, 2 insertions(+), 1 deletion(-)
15
16
diff --git a/hw/arm/raspi.c b/hw/arm/raspi.c
17
index XXXXXXX..XXXXXXX 100644
18
--- a/hw/arm/raspi.c
19
+++ b/hw/arm/raspi.c
20
@@ -XXX,XX +XXX,XX @@ static void reset_secondary(ARMCPU *cpu, const struct arm_boot_info *info)
21
22
static void setup_boot(MachineState *machine, int version, size_t ram_size)
23
{
24
+ RaspiMachineState *s = RASPI_MACHINE(machine);
25
static struct arm_boot_info binfo;
26
int r;
27
28
@@ -XXX,XX +XXX,XX @@ static void setup_boot(MachineState *machine, int version, size_t ram_size)
29
binfo.firmware_loaded = true;
30
}
31
32
- arm_load_kernel(ARM_CPU(first_cpu), machine, &binfo);
33
+ arm_load_kernel(&s->soc.cpu[0].core, machine, &binfo);
34
}
35
36
static void raspi_machine_init(MachineState *machine)
37
--
38
2.20.1
39
40
diff view generated by jsdifflib
New patch
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
1
2
3
The arm_boot_info structure belong to the machine,
4
move it to RaspiMachineState.
5
6
Reviewed-by: Luc Michel <luc.michel@greensocs.com>
7
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
8
Message-id: 20200924111808.77168-4-f4bug@amsat.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
hw/arm/raspi.c | 30 +++++++++++++++---------------
12
1 file changed, 15 insertions(+), 15 deletions(-)
13
14
diff --git a/hw/arm/raspi.c b/hw/arm/raspi.c
15
index XXXXXXX..XXXXXXX 100644
16
--- a/hw/arm/raspi.c
17
+++ b/hw/arm/raspi.c
18
@@ -XXX,XX +XXX,XX @@ struct RaspiMachineState {
19
MachineState parent_obj;
20
/*< public >*/
21
BCM283XState soc;
22
+ struct arm_boot_info binfo;
23
};
24
typedef struct RaspiMachineState RaspiMachineState;
25
26
@@ -XXX,XX +XXX,XX @@ static void reset_secondary(ARMCPU *cpu, const struct arm_boot_info *info)
27
static void setup_boot(MachineState *machine, int version, size_t ram_size)
28
{
29
RaspiMachineState *s = RASPI_MACHINE(machine);
30
- static struct arm_boot_info binfo;
31
int r;
32
33
- binfo.board_id = MACH_TYPE_BCM2708;
34
- binfo.ram_size = ram_size;
35
- binfo.nb_cpus = machine->smp.cpus;
36
+ s->binfo.board_id = MACH_TYPE_BCM2708;
37
+ s->binfo.ram_size = ram_size;
38
+ s->binfo.nb_cpus = machine->smp.cpus;
39
40
if (version <= 2) {
41
/* The rpi1 and 2 require some custom setup code to run in Secure
42
@@ -XXX,XX +XXX,XX @@ static void setup_boot(MachineState *machine, int version, size_t ram_size)
43
* firmware for some cache maintenance operations.
44
* The rpi3 doesn't need this.
45
*/
46
- binfo.board_setup_addr = BOARDSETUP_ADDR;
47
- binfo.write_board_setup = write_board_setup;
48
- binfo.secure_board_setup = true;
49
- binfo.secure_boot = true;
50
+ s->binfo.board_setup_addr = BOARDSETUP_ADDR;
51
+ s->binfo.write_board_setup = write_board_setup;
52
+ s->binfo.secure_board_setup = true;
53
+ s->binfo.secure_boot = true;
54
}
55
56
/* Pi2 and Pi3 requires SMP setup */
57
if (version >= 2) {
58
- binfo.smp_loader_start = SMPBOOT_ADDR;
59
+ s->binfo.smp_loader_start = SMPBOOT_ADDR;
60
if (version == 2) {
61
- binfo.write_secondary_boot = write_smpboot;
62
+ s->binfo.write_secondary_boot = write_smpboot;
63
} else {
64
- binfo.write_secondary_boot = write_smpboot64;
65
+ s->binfo.write_secondary_boot = write_smpboot64;
66
}
67
- binfo.secondary_cpu_reset_hook = reset_secondary;
68
+ s->binfo.secondary_cpu_reset_hook = reset_secondary;
69
}
70
71
/* If the user specified a "firmware" image (e.g. UEFI), we bypass
72
@@ -XXX,XX +XXX,XX @@ static void setup_boot(MachineState *machine, int version, size_t ram_size)
73
exit(1);
74
}
75
76
- binfo.entry = firmware_addr;
77
- binfo.firmware_loaded = true;
78
+ s->binfo.entry = firmware_addr;
79
+ s->binfo.firmware_loaded = true;
80
}
81
82
- arm_load_kernel(&s->soc.cpu[0].core, machine, &binfo);
83
+ arm_load_kernel(&s->soc.cpu[0].core, machine, &s->binfo);
84
}
85
86
static void raspi_machine_init(MachineState *machine)
87
--
88
2.20.1
89
90
diff view generated by jsdifflib
New patch
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
1
2
3
Using class_data pointer to create a MachineClass is not
4
the recommended way anymore. The correct way is to open-code
5
the MachineClass::fields in the class_init() method.
6
7
We can not use TYPE_RASPI_MACHINE::class_base_init() because
8
it is called *before* each machine class_init(), therefore the
9
board_rev field is not populated. We have to manually call
10
raspi_machine_class_common_init() for each machine.
11
12
This partly reverts commit a03bde3674e.
13
14
Suggested-by: Igor Mammedov <imammedo@redhat.com>
15
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
16
Reviewed-by: Igor Mammedov <imammedo@redhat.com>
17
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
18
Message-id: 20200924111808.77168-5-f4bug@amsat.org
19
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
20
---
21
hw/arm/raspi.c | 34 ++++++++++++++++++++++++----------
22
1 file changed, 24 insertions(+), 10 deletions(-)
23
24
diff --git a/hw/arm/raspi.c b/hw/arm/raspi.c
25
index XXXXXXX..XXXXXXX 100644
26
--- a/hw/arm/raspi.c
27
+++ b/hw/arm/raspi.c
28
@@ -XXX,XX +XXX,XX @@ static void raspi_machine_init(MachineState *machine)
29
setup_boot(machine, version, machine->ram_size - vcram_size);
30
}
31
32
-static void raspi_machine_class_init(ObjectClass *oc, void *data)
33
+static void raspi_machine_class_common_init(MachineClass *mc,
34
+ uint32_t board_rev)
35
{
36
- MachineClass *mc = MACHINE_CLASS(oc);
37
- RaspiMachineClass *rmc = RASPI_MACHINE_CLASS(oc);
38
- uint32_t board_rev = (uint32_t)(uintptr_t)data;
39
-
40
- rmc->board_rev = board_rev;
41
mc->desc = g_strdup_printf("Raspberry Pi %s (revision 1.%u)",
42
board_type(board_rev),
43
FIELD_EX32(board_rev, REV_CODE, REVISION));
44
@@ -XXX,XX +XXX,XX @@ static void raspi_machine_class_init(ObjectClass *oc, void *data)
45
mc->default_ram_id = "ram";
46
};
47
48
+static void raspi2b_machine_class_init(ObjectClass *oc, void *data)
49
+{
50
+ MachineClass *mc = MACHINE_CLASS(oc);
51
+ RaspiMachineClass *rmc = RASPI_MACHINE_CLASS(oc);
52
+
53
+ rmc->board_rev = 0xa21041;
54
+ raspi_machine_class_common_init(mc, rmc->board_rev);
55
+};
56
+
57
+#ifdef TARGET_AARCH64
58
+static void raspi3b_machine_class_init(ObjectClass *oc, void *data)
59
+{
60
+ MachineClass *mc = MACHINE_CLASS(oc);
61
+ RaspiMachineClass *rmc = RASPI_MACHINE_CLASS(oc);
62
+
63
+ rmc->board_rev = 0xa02082;
64
+ raspi_machine_class_common_init(mc, rmc->board_rev);
65
+};
66
+#endif /* TARGET_AARCH64 */
67
+
68
static const TypeInfo raspi_machine_types[] = {
69
{
70
.name = MACHINE_TYPE_NAME("raspi2"),
71
.parent = TYPE_RASPI_MACHINE,
72
- .class_init = raspi_machine_class_init,
73
- .class_data = (void *)0xa21041,
74
+ .class_init = raspi2b_machine_class_init,
75
#ifdef TARGET_AARCH64
76
}, {
77
.name = MACHINE_TYPE_NAME("raspi3"),
78
.parent = TYPE_RASPI_MACHINE,
79
- .class_init = raspi_machine_class_init,
80
- .class_data = (void *)0xa02082,
81
+ .class_init = raspi3b_machine_class_init,
82
#endif
83
}, {
84
.name = TYPE_RASPI_MACHINE,
85
--
86
2.20.1
87
88
diff view generated by jsdifflib
1
From: Philippe Mathieu-Daudé <philmd@redhat.com>
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
2
2
3
Reading the RX_DATA register when the RX_FIFO is empty triggers
3
Now that we can instantiate different machines based on their
4
an abort. This can be easily reproduced:
4
board_rev register value, we can have various raspi2 and raspi3.
5
5
6
$ qemu-system-arm -M emcraft-sf2 -monitor stdio -S
6
In commit fc78a990ec103 we corrected the machine description.
7
QEMU 4.0.50 monitor - type 'help' for more information
7
Correct the machine names too. For backward compatibility, add
8
(qemu) x 0x40001010
8
an alias to the previous generic name.
9
Aborted (core dumped)
10
9
11
(gdb) bt
10
Reviewed-by: Luc Michel <luc.michel@greensocs.com>
12
#1 0x00007f035874f895 in abort () at /lib64/libc.so.6
11
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
13
#2 0x00005628686591ff in fifo8_pop (fifo=0x56286a9a4c68) at util/fifo8.c:66
12
Message-id: 20200924111808.77168-6-f4bug@amsat.org
14
#3 0x00005628683e0b8e in fifo32_pop (fifo=0x56286a9a4c68) at include/qemu/fifo32.h:137
15
#4 0x00005628683e0efb in spi_read (opaque=0x56286a9a4850, addr=4, size=4) at hw/ssi/mss-spi.c:168
16
#5 0x0000562867f96801 in memory_region_read_accessor (mr=0x56286a9a4b60, addr=16, value=0x7ffeecb0c5c8, size=4, shift=0, mask=4294967295, attrs=...) at memory.c:439
17
#6 0x0000562867f96cdb in access_with_adjusted_size (addr=16, value=0x7ffeecb0c5c8, size=4, access_size_min=1, access_size_max=4, access_fn=0x562867f967c3 <memory_region_read_accessor>, mr=0x56286a9a4b60, attrs=...) at memory.c:569
18
#7 0x0000562867f99940 in memory_region_dispatch_read1 (mr=0x56286a9a4b60, addr=16, pval=0x7ffeecb0c5c8, size=4, attrs=...) at memory.c:1420
19
#8 0x0000562867f99a08 in memory_region_dispatch_read (mr=0x56286a9a4b60, addr=16, pval=0x7ffeecb0c5c8, size=4, attrs=...) at memory.c:1447
20
#9 0x0000562867f38721 in flatview_read_continue (fv=0x56286aec6360, addr=1073745936, attrs=..., buf=0x7ffeecb0c7c0 "\340ǰ\354\376\177", len=4, addr1=16, l=4, mr=0x56286a9a4b60) at exec.c:3385
21
#10 0x0000562867f38874 in flatview_read (fv=0x56286aec6360, addr=1073745936, attrs=..., buf=0x7ffeecb0c7c0 "\340ǰ\354\376\177", len=4) at exec.c:3423
22
#11 0x0000562867f388ea in address_space_read_full (as=0x56286aa3e890, addr=1073745936, attrs=..., buf=0x7ffeecb0c7c0 "\340ǰ\354\376\177", len=4) at exec.c:3436
23
#12 0x0000562867f389c5 in address_space_rw (as=0x56286aa3e890, addr=1073745936, attrs=..., buf=0x7ffeecb0c7c0 "\340ǰ\354\376\177", len=4, is_write=false) at exec.c:3466
24
#13 0x0000562867f3bdd7 in cpu_memory_rw_debug (cpu=0x56286aa19d00, addr=1073745936, buf=0x7ffeecb0c7c0 "\340ǰ\354\376\177", len=4, is_write=0) at exec.c:3976
25
#14 0x000056286811ed51 in memory_dump (mon=0x56286a8c32d0, count=1, format=120, wsize=4, addr=1073745936, is_physical=0) at monitor/misc.c:730
26
#15 0x000056286811eff1 in hmp_memory_dump (mon=0x56286a8c32d0, qdict=0x56286b15c400) at monitor/misc.c:785
27
#16 0x00005628684740ee in handle_hmp_command (mon=0x56286a8c32d0, cmdline=0x56286a8caeb2 "0x40001010") at monitor/hmp.c:1082
28
29
From the datasheet "Actel SmartFusion Microcontroller Subsystem
30
User's Guide" Rev.1, Table 13-3 "SPI Register Summary", this
31
register has a reset value of 0.
32
33
Check the FIFO is not empty before accessing it, else log an
34
error message.
35
36
Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com>
37
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
38
Message-id: 20190709113715.7761-3-philmd@redhat.com
39
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
40
---
14
---
41
hw/ssi/mss-spi.c | 8 +++++++-
15
hw/arm/raspi.c | 6 ++++--
42
1 file changed, 7 insertions(+), 1 deletion(-)
16
1 file changed, 4 insertions(+), 2 deletions(-)
43
17
44
diff --git a/hw/ssi/mss-spi.c b/hw/ssi/mss-spi.c
18
diff --git a/hw/arm/raspi.c b/hw/arm/raspi.c
45
index XXXXXXX..XXXXXXX 100644
19
index XXXXXXX..XXXXXXX 100644
46
--- a/hw/ssi/mss-spi.c
20
--- a/hw/arm/raspi.c
47
+++ b/hw/ssi/mss-spi.c
21
+++ b/hw/arm/raspi.c
48
@@ -XXX,XX +XXX,XX @@ spi_read(void *opaque, hwaddr addr, unsigned int size)
22
@@ -XXX,XX +XXX,XX @@ static void raspi2b_machine_class_init(ObjectClass *oc, void *data)
49
case R_SPI_RX:
23
MachineClass *mc = MACHINE_CLASS(oc);
50
s->regs[R_SPI_STATUS] &= ~S_RXFIFOFUL;
24
RaspiMachineClass *rmc = RASPI_MACHINE_CLASS(oc);
51
s->regs[R_SPI_STATUS] &= ~S_RXCHOVRF;
25
52
- ret = fifo32_pop(&s->rx_fifo);
26
+ mc->alias = "raspi2";
53
+ if (fifo32_is_empty(&s->rx_fifo)) {
27
rmc->board_rev = 0xa21041;
54
+ qemu_log_mask(LOG_GUEST_ERROR,
28
raspi_machine_class_common_init(mc, rmc->board_rev);
55
+ "%s: Reading empty RX_FIFO\n",
29
};
56
+ __func__);
30
@@ -XXX,XX +XXX,XX @@ static void raspi3b_machine_class_init(ObjectClass *oc, void *data)
57
+ } else {
31
MachineClass *mc = MACHINE_CLASS(oc);
58
+ ret = fifo32_pop(&s->rx_fifo);
32
RaspiMachineClass *rmc = RASPI_MACHINE_CLASS(oc);
59
+ }
33
60
if (fifo32_is_empty(&s->rx_fifo)) {
34
+ mc->alias = "raspi3";
61
s->regs[R_SPI_STATUS] |= S_RXFIFOEMP;
35
rmc->board_rev = 0xa02082;
62
}
36
raspi_machine_class_common_init(mc, rmc->board_rev);
37
};
38
@@ -XXX,XX +XXX,XX @@ static void raspi3b_machine_class_init(ObjectClass *oc, void *data)
39
40
static const TypeInfo raspi_machine_types[] = {
41
{
42
- .name = MACHINE_TYPE_NAME("raspi2"),
43
+ .name = MACHINE_TYPE_NAME("raspi2b"),
44
.parent = TYPE_RASPI_MACHINE,
45
.class_init = raspi2b_machine_class_init,
46
#ifdef TARGET_AARCH64
47
}, {
48
- .name = MACHINE_TYPE_NAME("raspi3"),
49
+ .name = MACHINE_TYPE_NAME("raspi3b"),
50
.parent = TYPE_RASPI_MACHINE,
51
.class_init = raspi3b_machine_class_init,
52
#endif
63
--
53
--
64
2.20.1
54
2.20.1
65
55
66
56
diff view generated by jsdifflib
1
From: Philippe Mathieu-Daudé <philmd@redhat.com>
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
2
2
3
In the next commit we will implement the write_with_attrs()
3
As we only support a reduced set of the REV_CODE_PROCESSOR id
4
handler. To avoid using different APIs, convert the read()
4
encoded in the board revision, define the PROCESSOR_ID values
5
handler first.
5
as an enum. We can simplify the board_soc_type and cores_count
6
methods.
6
7
7
Reviewed-by: Francisco Iglesias <frasse.iglesias@gmail.com>
8
Reviewed-by: Luc Michel <luc.michel@greensocs.com>
8
Tested-by: Francisco Iglesias <frasse.iglesias@gmail.com>
9
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
9
Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com>
10
Message-id: 20200924111808.77168-7-f4bug@amsat.org
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
12
---
12
hw/ssi/xilinx_spips.c | 23 +++++++++++------------
13
hw/arm/raspi.c | 45 +++++++++++++++++++++------------------------
13
1 file changed, 11 insertions(+), 12 deletions(-)
14
1 file changed, 21 insertions(+), 24 deletions(-)
14
15
15
diff --git a/hw/ssi/xilinx_spips.c b/hw/ssi/xilinx_spips.c
16
diff --git a/hw/arm/raspi.c b/hw/arm/raspi.c
16
index XXXXXXX..XXXXXXX 100644
17
index XXXXXXX..XXXXXXX 100644
17
--- a/hw/ssi/xilinx_spips.c
18
--- a/hw/arm/raspi.c
18
+++ b/hw/ssi/xilinx_spips.c
19
+++ b/hw/arm/raspi.c
19
@@ -XXX,XX +XXX,XX @@ static void lqspi_load_cache(void *opaque, hwaddr addr)
20
@@ -XXX,XX +XXX,XX @@ FIELD(REV_CODE, MANUFACTURER, 16, 4);
20
}
21
FIELD(REV_CODE, MEMORY_SIZE, 20, 3);
22
FIELD(REV_CODE, STYLE, 23, 1);
23
24
+typedef enum RaspiProcessorId {
25
+ PROCESSOR_ID_BCM2836 = 1,
26
+ PROCESSOR_ID_BCM2837 = 2,
27
+} RaspiProcessorId;
28
+
29
+static const struct {
30
+ const char *type;
31
+ int cores_count;
32
+} soc_property[] = {
33
+ [PROCESSOR_ID_BCM2836] = {TYPE_BCM2836, BCM283X_NCPUS},
34
+ [PROCESSOR_ID_BCM2837] = {TYPE_BCM2837, BCM283X_NCPUS},
35
+};
36
+
37
static uint64_t board_ram_size(uint32_t board_rev)
38
{
39
assert(FIELD_EX32(board_rev, REV_CODE, STYLE)); /* Only new style */
40
return 256 * MiB << FIELD_EX32(board_rev, REV_CODE, MEMORY_SIZE);
21
}
41
}
22
42
23
-static uint64_t
43
-static int board_processor_id(uint32_t board_rev)
24
-lqspi_read(void *opaque, hwaddr addr, unsigned int size)
44
+static RaspiProcessorId board_processor_id(uint32_t board_rev)
25
+static MemTxResult lqspi_read(void *opaque, hwaddr addr, uint64_t *value,
26
+ unsigned size, MemTxAttrs attrs)
27
{
45
{
28
- XilinxQSPIPS *q = opaque;
46
+ int proc_id = FIELD_EX32(board_rev, REV_CODE, PROCESSOR);
29
- uint32_t ret;
30
+ XilinxQSPIPS *q = XILINX_QSPIPS(opaque);
31
32
if (addr >= q->lqspi_cached_addr &&
33
addr <= q->lqspi_cached_addr + LQSPI_CACHE_SIZE - 4) {
34
uint8_t *retp = &q->lqspi_buf[addr - q->lqspi_cached_addr];
35
- ret = cpu_to_le32(*(uint32_t *)retp);
36
- DB_PRINT_L(1, "addr: %08x, data: %08x\n", (unsigned)addr,
37
- (unsigned)ret);
38
- return ret;
39
- } else {
40
- lqspi_load_cache(opaque, addr);
41
- return lqspi_read(opaque, addr, size);
42
+ *value = cpu_to_le32(*(uint32_t *)retp);
43
+ DB_PRINT_L(1, "addr: %08" HWADDR_PRIx ", data: %08" PRIx64 "\n",
44
+ addr, *value);
45
+ return MEMTX_OK;
46
}
47
+
47
+
48
+ lqspi_load_cache(opaque, addr);
48
assert(FIELD_EX32(board_rev, REV_CODE, STYLE)); /* Only new style */
49
+ return lqspi_read(opaque, addr, value, size, attrs);
49
- return FIELD_EX32(board_rev, REV_CODE, PROCESSOR);
50
+ assert(proc_id < ARRAY_SIZE(soc_property) && soc_property[proc_id].type);
51
+
52
+ return proc_id;
50
}
53
}
51
54
52
static const MemoryRegionOps lqspi_ops = {
55
static int board_version(uint32_t board_rev)
53
- .read = lqspi_read,
56
@@ -XXX,XX +XXX,XX @@ static int board_version(uint32_t board_rev)
54
+ .read_with_attrs = lqspi_read,
57
55
.endianness = DEVICE_NATIVE_ENDIAN,
58
static const char *board_soc_type(uint32_t board_rev)
56
.valid = {
59
{
57
.min_access_size = 1,
60
- static const char *soc_types[] = {
61
- NULL, TYPE_BCM2836, TYPE_BCM2837,
62
- };
63
- int proc_id = board_processor_id(board_rev);
64
-
65
- if (proc_id >= ARRAY_SIZE(soc_types) || !soc_types[proc_id]) {
66
- error_report("Unsupported processor id '%d' (board revision: 0x%x)",
67
- proc_id, board_rev);
68
- exit(1);
69
- }
70
- return soc_types[proc_id];
71
+ return soc_property[board_processor_id(board_rev)].type;
72
}
73
74
static int cores_count(uint32_t board_rev)
75
{
76
- static const int soc_cores_count[] = {
77
- 0, BCM283X_NCPUS, BCM283X_NCPUS,
78
- };
79
- int proc_id = board_processor_id(board_rev);
80
-
81
- if (proc_id >= ARRAY_SIZE(soc_cores_count) || !soc_cores_count[proc_id]) {
82
- error_report("Unsupported processor id '%d' (board revision: 0x%x)",
83
- proc_id, board_rev);
84
- exit(1);
85
- }
86
- return soc_cores_count[proc_id];
87
+ return soc_property[board_processor_id(board_rev)].cores_count;
88
}
89
90
static const char *board_type(uint32_t board_rev)
58
--
91
--
59
2.20.1
92
2.20.1
60
93
61
94
diff view generated by jsdifflib
1
From: Philippe Mathieu-Daudé <philmd@redhat.com>
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
2
2
3
Both lqspi_read() and lqspi_load_cache() expect a 32-bit
3
The firmware load address depends on the SoC ("processor id") used,
4
aligned address.
4
not on the version of the board.
5
5
6
>From UG1085 datasheet [*] chapter on 'Quad-SPI Controller':
6
Suggested-by: Luc Michel <luc.michel@greensocs.com>
7
7
Reviewed-by: Luc Michel <luc.michel@greensocs.com>
8
Transfer Size Limitations
8
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
9
9
Message-id: 20200924111808.77168-8-f4bug@amsat.org
10
Because of the 32-bit wide TX, RX, and generic FIFO, all
11
APB/AXI transfers must be an integer multiple of 4-bytes.
12
Shorter transfers are not possible.
13
14
Set MemoryRegionOps.impl values to force 32-bit accesses,
15
this way we are sure we do not access the lqspi_buf[] array
16
out of bound.
17
18
[*] https://www.xilinx.com/support/documentation/user_guides/ug1085-zynq-ultrascale-trm.pdf
19
20
Reviewed-by: Francisco Iglesias <frasse.iglesias@gmail.com>
21
Tested-by: Francisco Iglesias <frasse.iglesias@gmail.com>
22
Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com>
23
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
24
---
11
---
25
hw/ssi/xilinx_spips.c | 4 ++++
12
hw/arm/raspi.c | 3 ++-
26
1 file changed, 4 insertions(+)
13
1 file changed, 2 insertions(+), 1 deletion(-)
27
14
28
diff --git a/hw/ssi/xilinx_spips.c b/hw/ssi/xilinx_spips.c
15
diff --git a/hw/arm/raspi.c b/hw/arm/raspi.c
29
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
30
--- a/hw/ssi/xilinx_spips.c
17
--- a/hw/arm/raspi.c
31
+++ b/hw/ssi/xilinx_spips.c
18
+++ b/hw/arm/raspi.c
32
@@ -XXX,XX +XXX,XX @@ static const MemoryRegionOps lqspi_ops = {
19
@@ -XXX,XX +XXX,XX @@ static void setup_boot(MachineState *machine, int version, size_t ram_size)
33
.read_with_attrs = lqspi_read,
20
* the normal Linux boot process
34
.write_with_attrs = lqspi_write,
21
*/
35
.endianness = DEVICE_NATIVE_ENDIAN,
22
if (machine->firmware) {
36
+ .impl = {
23
- hwaddr firmware_addr = version == 3 ? FIRMWARE_ADDR_3 : FIRMWARE_ADDR_2;
37
+ .min_access_size = 4,
24
+ hwaddr firmware_addr = processor_id <= PROCESSOR_ID_BCM2836
38
+ .max_access_size = 4,
25
+ ? FIRMWARE_ADDR_2 : FIRMWARE_ADDR_3;
39
+ },
26
/* load the firmware image (typically kernel.img) */
40
.valid = {
27
r = load_image_targphys(machine->firmware, firmware_addr,
41
.min_access_size = 1,
28
ram_size - firmware_addr);
42
.max_access_size = 4
43
--
29
--
44
2.20.1
30
2.20.1
45
31
46
32
diff view generated by jsdifflib
1
From: Philippe Mathieu-Daudé <philmd@redhat.com>
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
2
2
3
Lei Sun found while auditing the code that a CPU write would
3
We expected the 'version' ID to match the board processor ID,
4
trigger a NULL pointer dereference.
4
but this is not always true (for example boards with revision
5
id 0xa02042/0xa22042 are Raspberry Pi 2 with a BCM2837 SoC).
6
This was not important because we were not modelling them, but
7
since the recent refactor now allow to model these boards, it
8
is safer to check the processor id directly. Remove the version
9
check.
5
10
6
>From UG1085 datasheet [*] AXI writes in this region are ignored
11
Suggested-by: Peter Maydell <peter.maydell@linaro.org>
7
and generates an AXI Slave Error (SLVERR).
12
Reviewed-by: Luc Michel <luc.michel@greensocs.com>
8
13
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
9
Fix by implementing the write_with_attrs() handler.
14
Message-id: 20200924111808.77168-9-f4bug@amsat.org
10
Return MEMTX_ERROR when the region is accessed (this error maps
11
to an AXI slave error).
12
13
[*] https://www.xilinx.com/support/documentation/user_guides/ug1085-zynq-ultrascale-trm.pdf
14
15
Reported-by: Lei Sun <slei.casper@gmail.com>
16
Reviewed-by: Francisco Iglesias <frasse.iglesias@gmail.com>
17
Tested-by: Francisco Iglesias <frasse.iglesias@gmail.com>
18
Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com>
19
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
20
---
16
---
21
hw/ssi/xilinx_spips.c | 16 ++++++++++++++++
17
hw/arm/raspi.c | 29 +++++++++++++----------------
22
1 file changed, 16 insertions(+)
18
1 file changed, 13 insertions(+), 16 deletions(-)
23
19
24
diff --git a/hw/ssi/xilinx_spips.c b/hw/ssi/xilinx_spips.c
20
diff --git a/hw/arm/raspi.c b/hw/arm/raspi.c
25
index XXXXXXX..XXXXXXX 100644
21
index XXXXXXX..XXXXXXX 100644
26
--- a/hw/ssi/xilinx_spips.c
22
--- a/hw/arm/raspi.c
27
+++ b/hw/ssi/xilinx_spips.c
23
+++ b/hw/arm/raspi.c
28
@@ -XXX,XX +XXX,XX @@ static MemTxResult lqspi_read(void *opaque, hwaddr addr, uint64_t *value,
24
@@ -XXX,XX +XXX,XX @@ static RaspiProcessorId board_processor_id(uint32_t board_rev)
29
return lqspi_read(opaque, addr, value, size, attrs);
25
return proc_id;
30
}
26
}
31
27
32
+static MemTxResult lqspi_write(void *opaque, hwaddr offset, uint64_t value,
28
-static int board_version(uint32_t board_rev)
33
+ unsigned size, MemTxAttrs attrs)
29
-{
34
+{
30
- return board_processor_id(board_rev) + 1;
35
+ /*
31
-}
36
+ * From UG1085, Chapter 24 (Quad-SPI controllers):
32
-
37
+ * - Writes are ignored
33
static const char *board_soc_type(uint32_t board_rev)
38
+ * - AXI writes generate an external AXI slave error (SLVERR)
34
{
39
+ */
35
return soc_property[board_processor_id(board_rev)].type;
40
+ qemu_log_mask(LOG_GUEST_ERROR, "%s Unexpected %u-bit access to 0x%" PRIx64
36
@@ -XXX,XX +XXX,XX @@ static void reset_secondary(ARMCPU *cpu, const struct arm_boot_info *info)
41
+ " (value: 0x%" PRIx64 "\n",
37
cpu_set_pc(cs, info->smp_loader_start);
42
+ __func__, size << 3, offset, value);
38
}
43
+
39
44
+ return MEMTX_ERROR;
40
-static void setup_boot(MachineState *machine, int version, size_t ram_size)
45
+}
41
+static void setup_boot(MachineState *machine, RaspiProcessorId processor_id,
46
+
42
+ size_t ram_size)
47
static const MemoryRegionOps lqspi_ops = {
43
{
48
.read_with_attrs = lqspi_read,
44
RaspiMachineState *s = RASPI_MACHINE(machine);
49
+ .write_with_attrs = lqspi_write,
45
int r;
50
.endianness = DEVICE_NATIVE_ENDIAN,
46
@@ -XXX,XX +XXX,XX @@ static void setup_boot(MachineState *machine, int version, size_t ram_size)
51
.valid = {
47
s->binfo.ram_size = ram_size;
52
.min_access_size = 1,
48
s->binfo.nb_cpus = machine->smp.cpus;
49
50
- if (version <= 2) {
51
- /* The rpi1 and 2 require some custom setup code to run in Secure
52
- * mode before booting a kernel (to set up the SMC vectors so
53
- * that we get a no-op SMC; this is used by Linux to call the
54
+ if (processor_id <= PROCESSOR_ID_BCM2836) {
55
+ /*
56
+ * The BCM2835 and BCM2836 require some custom setup code to run
57
+ * in Secure mode before booting a kernel (to set up the SMC vectors
58
+ * so that we get a no-op SMC; this is used by Linux to call the
59
* firmware for some cache maintenance operations.
60
- * The rpi3 doesn't need this.
61
+ * The BCM2837 doesn't need this.
62
*/
63
s->binfo.board_setup_addr = BOARDSETUP_ADDR;
64
s->binfo.write_board_setup = write_board_setup;
65
@@ -XXX,XX +XXX,XX @@ static void setup_boot(MachineState *machine, int version, size_t ram_size)
66
s->binfo.secure_boot = true;
67
}
68
69
- /* Pi2 and Pi3 requires SMP setup */
70
- if (version >= 2) {
71
+ /* BCM2836 and BCM2837 requires SMP setup */
72
+ if (processor_id >= PROCESSOR_ID_BCM2836) {
73
s->binfo.smp_loader_start = SMPBOOT_ADDR;
74
- if (version == 2) {
75
+ if (processor_id == PROCESSOR_ID_BCM2836) {
76
s->binfo.write_secondary_boot = write_smpboot;
77
} else {
78
s->binfo.write_secondary_boot = write_smpboot64;
79
@@ -XXX,XX +XXX,XX @@ static void raspi_machine_init(MachineState *machine)
80
RaspiMachineClass *mc = RASPI_MACHINE_GET_CLASS(machine);
81
RaspiMachineState *s = RASPI_MACHINE(machine);
82
uint32_t board_rev = mc->board_rev;
83
- int version = board_version(board_rev);
84
uint64_t ram_size = board_ram_size(board_rev);
85
uint32_t vcram_size;
86
DriveInfo *di;
87
@@ -XXX,XX +XXX,XX @@ static void raspi_machine_init(MachineState *machine)
88
89
vcram_size = object_property_get_uint(OBJECT(&s->soc), "vcram-size",
90
&error_abort);
91
- setup_boot(machine, version, machine->ram_size - vcram_size);
92
+ setup_boot(machine, board_processor_id(mc->board_rev),
93
+ machine->ram_size - vcram_size);
94
}
95
96
static void raspi_machine_class_common_init(MachineClass *mc,
53
--
97
--
54
2.20.1
98
2.20.1
55
99
56
100
diff view generated by jsdifflib