1 | target-arm queue for rc1 -- these are all bug fixes. | 1 | Small pullreq with some bug fixes to go into rc1. |
---|---|---|---|
2 | 2 | ||
3 | thanks | ||
4 | -- PMM | 3 | -- PMM |
5 | 4 | ||
6 | The following changes since commit b9404bf592e7ba74180e1a54ed7a266ec6ee67f2: | 5 | The following changes since commit 5ca634afcf83215a9a54ca6e66032325b5ffb5f6: |
7 | 6 | ||
8 | Merge remote-tracking branch 'remotes/dgilbert/tags/pull-hmp-20190715' into staging (2019-07-15 12:22:07 +0100) | 7 | Merge remote-tracking branch 'remotes/philmd/tags/sdmmc-20210322' into staging (2021-03-22 18:50:25 +0000) |
9 | 8 | ||
10 | are available in the Git repository at: | 9 | are available in the Git repository at: |
11 | 10 | ||
12 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20190715 | 11 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20210323 |
13 | 12 | ||
14 | for you to fetch changes up to 51c9122e92b776a3f16af0b9282f1dc5012e2a19: | 13 | for you to fetch changes up to dad90de78e9e9d47cefcbcd30115706b98e6ec87: |
15 | 14 | ||
16 | target/arm: NS BusFault on vector table fetch escalates to NS HardFault (2019-07-15 14:17:04 +0100) | 15 | target/arm: Set ARMMMUFaultInfo.level in user-only arm_cpu_tlb_fill (2021-03-23 14:07:55 +0000) |
17 | 16 | ||
18 | ---------------------------------------------------------------- | 17 | ---------------------------------------------------------------- |
19 | target-arm queue: | 18 | target-arm queue: |
20 | * report ARMv8-A FP support for AArch32 -cpu max | 19 | * hw/arm/virt: Disable pl011 clock migration if needed |
21 | * hw/ssi/xilinx_spips: Avoid AXI writes to the LQSPI linear memory | 20 | * target/arm: Make M-profile VTOR loads on reset handle memory aliasing |
22 | * hw/ssi/xilinx_spips: Avoid out-of-bound access to lqspi_buf[] | 21 | * target/arm: Set ARMMMUFaultInfo.level in user-only arm_cpu_tlb_fill |
23 | * hw/ssi/mss-spi: Avoid crash when reading empty RX FIFO | ||
24 | * hw/display/xlnx_dp: Avoid crash when reading empty RX FIFO | ||
25 | * hw/arm/virt: Fix non-secure flash mode | ||
26 | * pl031: Correctly migrate state when using -rtc clock=host | ||
27 | * fix regression that meant arm926 and arm1026 lost VFP | ||
28 | double-precision support | ||
29 | * v8M: NS BusFault on vector table fetch escalates to NS HardFault | ||
30 | 22 | ||
31 | ---------------------------------------------------------------- | 23 | ---------------------------------------------------------------- |
32 | Alex Bennée (1): | 24 | Gavin Shan (1): |
33 | target/arm: report ARMv8-A FP support for AArch32 -cpu max | 25 | hw/arm/virt: Disable pl011 clock migration if needed |
34 | 26 | ||
35 | David Engraf (1): | 27 | Peter Maydell (5): |
36 | hw/arm/virt: Fix non-secure flash mode | 28 | memory: Make flatview_cb return bool, not int |
29 | memory: Document flatview_for_each_range() | ||
30 | memory: Add offset_in_region to flatview_cb arguments | ||
31 | hw/core/loader: Add new function rom_ptr_for_as() | ||
32 | target/arm: Make M-profile VTOR loads on reset handle memory aliasing | ||
37 | 33 | ||
38 | Peter Maydell (3): | 34 | Richard Henderson (1): |
39 | pl031: Correctly migrate state when using -rtc clock=host | 35 | target/arm: Set ARMMMUFaultInfo.level in user-only arm_cpu_tlb_fill |
40 | target/arm: Set VFP-related MVFR0 fields for arm926 and arm1026 | ||
41 | target/arm: NS BusFault on vector table fetch escalates to NS HardFault | ||
42 | 36 | ||
43 | Philippe Mathieu-Daudé (5): | 37 | include/exec/memory.h | 32 +++++++++++++++--- |
44 | hw/ssi/xilinx_spips: Convert lqspi_read() to read_with_attrs | 38 | include/hw/char/pl011.h | 1 + |
45 | hw/ssi/xilinx_spips: Avoid AXI writes to the LQSPI linear memory | 39 | include/hw/loader.h | 31 +++++++++++++++++ |
46 | hw/ssi/xilinx_spips: Avoid out-of-bound access to lqspi_buf[] | 40 | hw/char/pl011.c | 9 +++++ |
47 | hw/ssi/mss-spi: Avoid crash when reading empty RX FIFO | 41 | hw/core/loader.c | 75 +++++++++++++++++++++++++++++++++++++++++ |
48 | hw/display/xlnx_dp: Avoid crash when reading empty RX FIFO | 42 | hw/core/machine.c | 1 + |
43 | softmmu/memory.c | 4 ++- | ||
44 | target/arm/cpu.c | 2 +- | ||
45 | target/arm/tlb_helper.c | 1 + | ||
46 | tests/qtest/fuzz/generic_fuzz.c | 11 +++--- | ||
47 | 10 files changed, 157 insertions(+), 10 deletions(-) | ||
49 | 48 | ||
50 | include/hw/timer/pl031.h | 2 ++ | ||
51 | hw/arm/virt.c | 2 +- | ||
52 | hw/core/machine.c | 1 + | ||
53 | hw/display/xlnx_dp.c | 15 +++++--- | ||
54 | hw/ssi/mss-spi.c | 8 ++++- | ||
55 | hw/ssi/xilinx_spips.c | 43 +++++++++++++++------- | ||
56 | hw/timer/pl031.c | 92 +++++++++++++++++++++++++++++++++++++++++++++--- | ||
57 | target/arm/cpu.c | 16 +++++++++ | ||
58 | target/arm/m_helper.c | 21 ++++++++--- | ||
59 | 9 files changed, 174 insertions(+), 26 deletions(-) | ||
60 | diff view generated by jsdifflib |
1 | The PL031 RTC tracks the difference between the guest RTC | 1 | From: Gavin Shan <gshan@redhat.com> |
---|---|---|---|
2 | and the host RTC using a tick_offset field. For migration, | ||
3 | however, we currently always migrate the offset between | ||
4 | the guest and the vm_clock, even if the RTC clock is not | ||
5 | the same as the vm_clock; this was an attempt to retain | ||
6 | migration backwards compatibility. | ||
7 | 2 | ||
8 | Unfortunately this results in the RTC behaving oddly across | 3 | A clock is added by commit aac63e0e6ea3 ("hw/char/pl011: add a clock |
9 | a VM state save and restore -- since the VM clock stands still | 4 | input") since v5.2.0 which corresponds to virt-5.2 machine type. It |
10 | across save-then-restore, regardless of how much real world | 5 | causes backwards migration failure from upstream to downstream (v5.1.0) |
11 | time has elapsed, the guest RTC ends up out of sync with the | 6 | when the machine type is specified with virt-5.1. |
12 | host RTC in the restored VM. | ||
13 | 7 | ||
14 | Fix this by migrating the raw tick_offset. To retain migration | 8 | This fixes the issue by following instructions from section "Connecting |
15 | compatibility as far as possible, we have a new property | 9 | subsections to properties" in docs/devel/migration.rst. With this applied, |
16 | migrate-tick-offset; by default this is 'true' and we will | 10 | the PL011 clock is migrated based on the machine type. |
17 | migrate the true tick offset in a new subsection; if the | ||
18 | incoming data has no subsection we fall back to the old | ||
19 | vm_clock-based offset information, so old->new migration | ||
20 | compatibility is preserved. For complete new->old migration | ||
21 | compatibility, the property is set to 'false' for 4.0 and | ||
22 | earlier machine types (this will only affect 'virt-4.0' | ||
23 | and below, as none of the other pl031-using machines are | ||
24 | versioned). | ||
25 | 11 | ||
26 | Reported-by: Russell King <rmk@armlinux.org.uk> | 12 | virt-5.2 or newer: migration |
13 | virt-5.1 or older: non-migration | ||
14 | |||
15 | Cc: qemu-stable@nongnu.org # v5.2.0+ | ||
16 | Fixes: aac63e0e6ea3 ("hw/char/pl011: add a clock input") | ||
17 | Suggested-by: Andrew Jones <drjones@redhat.com> | ||
18 | Signed-off-by: Gavin Shan <gshan@redhat.com> | ||
19 | Reviewed-by: Andrew Jones <drjones@redhat.com> | ||
20 | Message-id: 20210318023801.18287-1-gshan@redhat.com | ||
27 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 21 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
28 | Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com> | ||
29 | Message-id: 20190709143912.28905-1-peter.maydell@linaro.org | ||
30 | --- | 22 | --- |
31 | include/hw/timer/pl031.h | 2 + | 23 | include/hw/char/pl011.h | 1 + |
32 | hw/core/machine.c | 1 + | 24 | hw/char/pl011.c | 9 +++++++++ |
33 | hw/timer/pl031.c | 92 ++++++++++++++++++++++++++++++++++++++-- | 25 | hw/core/machine.c | 1 + |
34 | 3 files changed, 91 insertions(+), 4 deletions(-) | 26 | 3 files changed, 11 insertions(+) |
35 | 27 | ||
36 | diff --git a/include/hw/timer/pl031.h b/include/hw/timer/pl031.h | 28 | diff --git a/include/hw/char/pl011.h b/include/hw/char/pl011.h |
37 | index XXXXXXX..XXXXXXX 100644 | 29 | index XXXXXXX..XXXXXXX 100644 |
38 | --- a/include/hw/timer/pl031.h | 30 | --- a/include/hw/char/pl011.h |
39 | +++ b/include/hw/timer/pl031.h | 31 | +++ b/include/hw/char/pl011.h |
40 | @@ -XXX,XX +XXX,XX @@ typedef struct PL031State { | 32 | @@ -XXX,XX +XXX,XX @@ struct PL011State { |
41 | */ | 33 | CharBackend chr; |
42 | uint32_t tick_offset_vmstate; | 34 | qemu_irq irq[6]; |
43 | uint32_t tick_offset; | 35 | Clock *clk; |
44 | + bool tick_offset_migrated; | 36 | + bool migrate_clk; |
45 | + bool migrate_tick_offset; | 37 | const unsigned char *id; |
46 | 38 | }; | |
47 | uint32_t mr; | 39 | |
48 | uint32_t lr; | 40 | diff --git a/hw/char/pl011.c b/hw/char/pl011.c |
41 | index XXXXXXX..XXXXXXX 100644 | ||
42 | --- a/hw/char/pl011.c | ||
43 | +++ b/hw/char/pl011.c | ||
44 | @@ -XXX,XX +XXX,XX @@ static const MemoryRegionOps pl011_ops = { | ||
45 | .endianness = DEVICE_NATIVE_ENDIAN, | ||
46 | }; | ||
47 | |||
48 | +static bool pl011_clock_needed(void *opaque) | ||
49 | +{ | ||
50 | + PL011State *s = PL011(opaque); | ||
51 | + | ||
52 | + return s->migrate_clk; | ||
53 | +} | ||
54 | + | ||
55 | static const VMStateDescription vmstate_pl011_clock = { | ||
56 | .name = "pl011/clock", | ||
57 | .version_id = 1, | ||
58 | .minimum_version_id = 1, | ||
59 | + .needed = pl011_clock_needed, | ||
60 | .fields = (VMStateField[]) { | ||
61 | VMSTATE_CLOCK(clk, PL011State), | ||
62 | VMSTATE_END_OF_LIST() | ||
63 | @@ -XXX,XX +XXX,XX @@ static const VMStateDescription vmstate_pl011 = { | ||
64 | |||
65 | static Property pl011_properties[] = { | ||
66 | DEFINE_PROP_CHR("chardev", PL011State, chr), | ||
67 | + DEFINE_PROP_BOOL("migrate-clk", PL011State, migrate_clk, true), | ||
68 | DEFINE_PROP_END_OF_LIST(), | ||
69 | }; | ||
70 | |||
49 | diff --git a/hw/core/machine.c b/hw/core/machine.c | 71 | diff --git a/hw/core/machine.c b/hw/core/machine.c |
50 | index XXXXXXX..XXXXXXX 100644 | 72 | index XXXXXXX..XXXXXXX 100644 |
51 | --- a/hw/core/machine.c | 73 | --- a/hw/core/machine.c |
52 | +++ b/hw/core/machine.c | 74 | +++ b/hw/core/machine.c |
53 | @@ -XXX,XX +XXX,XX @@ GlobalProperty hw_compat_4_0[] = { | 75 | @@ -XXX,XX +XXX,XX @@ GlobalProperty hw_compat_5_1[] = { |
54 | { "virtio-gpu-pci", "edid", "false" }, | 76 | { "virtio-scsi-device", "num_queues", "1"}, |
55 | { "virtio-device", "use-started", "false" }, | 77 | { "nvme", "use-intel-id", "on"}, |
56 | { "virtio-balloon-device", "qemu-4-0-config-size", "true" }, | 78 | { "pvpanic", "events", "1"}, /* PVPANIC_PANICKED */ |
57 | + { "pl031", "migrate-tick-offset", "false" }, | 79 | + { "pl011", "migrate-clk", "off" }, |
58 | }; | 80 | }; |
59 | const size_t hw_compat_4_0_len = G_N_ELEMENTS(hw_compat_4_0); | 81 | const size_t hw_compat_5_1_len = G_N_ELEMENTS(hw_compat_5_1); |
60 | 82 | ||
61 | diff --git a/hw/timer/pl031.c b/hw/timer/pl031.c | ||
62 | index XXXXXXX..XXXXXXX 100644 | ||
63 | --- a/hw/timer/pl031.c | ||
64 | +++ b/hw/timer/pl031.c | ||
65 | @@ -XXX,XX +XXX,XX @@ static int pl031_pre_save(void *opaque) | ||
66 | { | ||
67 | PL031State *s = opaque; | ||
68 | |||
69 | - /* tick_offset is base_time - rtc_clock base time. Instead, we want to | ||
70 | - * store the base time relative to the QEMU_CLOCK_VIRTUAL for backwards-compatibility. */ | ||
71 | + /* | ||
72 | + * The PL031 device model code uses the tick_offset field, which is | ||
73 | + * the offset between what the guest RTC should read and what the | ||
74 | + * QEMU rtc_clock reads: | ||
75 | + * guest_rtc = rtc_clock + tick_offset | ||
76 | + * and so | ||
77 | + * tick_offset = guest_rtc - rtc_clock | ||
78 | + * | ||
79 | + * We want to migrate this offset, which sounds straightforward. | ||
80 | + * Unfortunately older versions of QEMU migrated a conversion of this | ||
81 | + * offset into an offset from the vm_clock. (This was in turn an | ||
82 | + * attempt to be compatible with even older QEMU versions, but it | ||
83 | + * has incorrect behaviour if the rtc_clock is not the same as the | ||
84 | + * vm_clock.) So we put the actual tick_offset into a migration | ||
85 | + * subsection, and the backwards-compatible time-relative-to-vm_clock | ||
86 | + * in the main migration state. | ||
87 | + * | ||
88 | + * Calculate base time relative to QEMU_CLOCK_VIRTUAL: | ||
89 | + */ | ||
90 | int64_t delta = qemu_clock_get_ns(rtc_clock) - qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); | ||
91 | s->tick_offset_vmstate = s->tick_offset + delta / NANOSECONDS_PER_SECOND; | ||
92 | |||
93 | return 0; | ||
94 | } | ||
95 | |||
96 | +static int pl031_pre_load(void *opaque) | ||
97 | +{ | ||
98 | + PL031State *s = opaque; | ||
99 | + | ||
100 | + s->tick_offset_migrated = false; | ||
101 | + return 0; | ||
102 | +} | ||
103 | + | ||
104 | static int pl031_post_load(void *opaque, int version_id) | ||
105 | { | ||
106 | PL031State *s = opaque; | ||
107 | |||
108 | - int64_t delta = qemu_clock_get_ns(rtc_clock) - qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); | ||
109 | - s->tick_offset = s->tick_offset_vmstate - delta / NANOSECONDS_PER_SECOND; | ||
110 | + /* | ||
111 | + * If we got the tick_offset subsection, then we can just use | ||
112 | + * the value in that. Otherwise the source is an older QEMU and | ||
113 | + * has given us the offset from the vm_clock; convert it back to | ||
114 | + * an offset from the rtc_clock. This will cause time to incorrectly | ||
115 | + * go backwards compared to the host RTC, but this is unavoidable. | ||
116 | + */ | ||
117 | + | ||
118 | + if (!s->tick_offset_migrated) { | ||
119 | + int64_t delta = qemu_clock_get_ns(rtc_clock) - | ||
120 | + qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); | ||
121 | + s->tick_offset = s->tick_offset_vmstate - | ||
122 | + delta / NANOSECONDS_PER_SECOND; | ||
123 | + } | ||
124 | pl031_set_alarm(s); | ||
125 | return 0; | ||
126 | } | ||
127 | |||
128 | +static int pl031_tick_offset_post_load(void *opaque, int version_id) | ||
129 | +{ | ||
130 | + PL031State *s = opaque; | ||
131 | + | ||
132 | + s->tick_offset_migrated = true; | ||
133 | + return 0; | ||
134 | +} | ||
135 | + | ||
136 | +static bool pl031_tick_offset_needed(void *opaque) | ||
137 | +{ | ||
138 | + PL031State *s = opaque; | ||
139 | + | ||
140 | + return s->migrate_tick_offset; | ||
141 | +} | ||
142 | + | ||
143 | +static const VMStateDescription vmstate_pl031_tick_offset = { | ||
144 | + .name = "pl031/tick-offset", | ||
145 | + .version_id = 1, | ||
146 | + .minimum_version_id = 1, | ||
147 | + .needed = pl031_tick_offset_needed, | ||
148 | + .post_load = pl031_tick_offset_post_load, | ||
149 | + .fields = (VMStateField[]) { | ||
150 | + VMSTATE_UINT32(tick_offset, PL031State), | ||
151 | + VMSTATE_END_OF_LIST() | ||
152 | + } | ||
153 | +}; | ||
154 | + | ||
155 | static const VMStateDescription vmstate_pl031 = { | ||
156 | .name = "pl031", | ||
157 | .version_id = 1, | ||
158 | .minimum_version_id = 1, | ||
159 | .pre_save = pl031_pre_save, | ||
160 | + .pre_load = pl031_pre_load, | ||
161 | .post_load = pl031_post_load, | ||
162 | .fields = (VMStateField[]) { | ||
163 | VMSTATE_UINT32(tick_offset_vmstate, PL031State), | ||
164 | @@ -XXX,XX +XXX,XX @@ static const VMStateDescription vmstate_pl031 = { | ||
165 | VMSTATE_UINT32(im, PL031State), | ||
166 | VMSTATE_UINT32(is, PL031State), | ||
167 | VMSTATE_END_OF_LIST() | ||
168 | + }, | ||
169 | + .subsections = (const VMStateDescription*[]) { | ||
170 | + &vmstate_pl031_tick_offset, | ||
171 | + NULL | ||
172 | } | ||
173 | }; | ||
174 | |||
175 | +static Property pl031_properties[] = { | ||
176 | + /* | ||
177 | + * True to correctly migrate the tick offset of the RTC. False to | ||
178 | + * obtain backward migration compatibility with older QEMU versions, | ||
179 | + * at the expense of the guest RTC going backwards compared with the | ||
180 | + * host RTC when the VM is saved/restored if using -rtc host. | ||
181 | + * (Even if set to 'true' older QEMU can migrate forward to newer QEMU; | ||
182 | + * 'false' also permits newer QEMU to migrate to older QEMU.) | ||
183 | + */ | ||
184 | + DEFINE_PROP_BOOL("migrate-tick-offset", | ||
185 | + PL031State, migrate_tick_offset, true), | ||
186 | + DEFINE_PROP_END_OF_LIST() | ||
187 | +}; | ||
188 | + | ||
189 | static void pl031_class_init(ObjectClass *klass, void *data) | ||
190 | { | ||
191 | DeviceClass *dc = DEVICE_CLASS(klass); | ||
192 | |||
193 | dc->vmsd = &vmstate_pl031; | ||
194 | + dc->props = pl031_properties; | ||
195 | } | ||
196 | |||
197 | static const TypeInfo pl031_info = { | ||
198 | -- | 83 | -- |
199 | 2.20.1 | 84 | 2.20.1 |
200 | 85 | ||
201 | 86 | diff view generated by jsdifflib |
1 | In the M-profile architecture, when we do a vector table fetch and it | 1 | The return value of the flatview_cb callback passed to the |
---|---|---|---|
2 | fails, we need to report a HardFault. Whether this is a Secure HF or | 2 | flatview_for_each_range() function is zero if the iteration through |
3 | a NonSecure HF depends on several things. If AIRCR.BFHFNMINS is 0 | 3 | the ranges should continue, or non-zero to break out of it. Use a |
4 | then HF is always Secure, because there is no NonSecure HardFault. | 4 | bool for this rather than int. |
5 | Otherwise, the answer depends on whether the 'underlying exception' | ||
6 | (MemManage, BusFault, SecureFault) targets Secure or NonSecure. (In | ||
7 | the pseudocode, this is handled in the Vector() function: the final | ||
8 | exc.isSecure is calculated by looking at the exc.isSecure from the | ||
9 | exception returned from the memory access, not the isSecure input | ||
10 | argument.) | ||
11 | |||
12 | We weren't doing this correctly, because we were looking at | ||
13 | the target security domain of the exception we were trying to | ||
14 | load the vector table entry for. This produces errors of two kinds: | ||
15 | * a load from the NS vector table which hits the "NS access | ||
16 | to S memory" SecureFault should end up as a Secure HardFault, | ||
17 | but we were raising an NS HardFault | ||
18 | * a load from the S vector table which causes a BusFault | ||
19 | should raise an NS HardFault if BFHFNMINS == 1 (because | ||
20 | in that case all BusFaults are NonSecure), but we were raising | ||
21 | a Secure HardFault | ||
22 | |||
23 | Correct the logic. | ||
24 | |||
25 | We also fix a comment error where we claimed that we might | ||
26 | be escalating MemManage to HardFault, and forgot about SecureFault. | ||
27 | (Vector loads can never hit MPU access faults, because they're | ||
28 | always aligned and always use the default address map.) | ||
29 | 5 | ||
30 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
31 | Message-id: 20190705094823.28905-1-peter.maydell@linaro.org | 7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
8 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
9 | Message-id: 20210318174823.18066-2-peter.maydell@linaro.org | ||
32 | --- | 10 | --- |
33 | target/arm/m_helper.c | 21 +++++++++++++++++---- | 11 | include/exec/memory.h | 6 +++--- |
34 | 1 file changed, 17 insertions(+), 4 deletions(-) | 12 | tests/qtest/fuzz/generic_fuzz.c | 8 ++++---- |
13 | 2 files changed, 7 insertions(+), 7 deletions(-) | ||
35 | 14 | ||
36 | diff --git a/target/arm/m_helper.c b/target/arm/m_helper.c | 15 | diff --git a/include/exec/memory.h b/include/exec/memory.h |
37 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
38 | --- a/target/arm/m_helper.c | 17 | --- a/include/exec/memory.h |
39 | +++ b/target/arm/m_helper.c | 18 | +++ b/include/exec/memory.h |
40 | @@ -XXX,XX +XXX,XX @@ static bool arm_v7m_load_vector(ARMCPU *cpu, int exc, bool targets_secure, | 19 | @@ -XXX,XX +XXX,XX @@ static inline FlatView *address_space_to_flatview(AddressSpace *as) |
41 | if (sattrs.ns) { | 20 | return qatomic_rcu_read(&as->current_map); |
42 | attrs.secure = false; | 21 | } |
43 | } else if (!targets_secure) { | 22 | |
44 | - /* NS access to S memory */ | 23 | -typedef int (*flatview_cb)(Int128 start, |
45 | + /* | 24 | - Int128 len, |
46 | + * NS access to S memory: the underlying exception which we escalate | 25 | - const MemoryRegion*, void*); |
47 | + * to HardFault is SecureFault, which always targets Secure. | 26 | +typedef bool (*flatview_cb)(Int128 start, |
48 | + */ | 27 | + Int128 len, |
49 | + exc_secure = true; | 28 | + const MemoryRegion*, void*); |
50 | goto load_fail; | 29 | |
30 | void flatview_for_each_range(FlatView *fv, flatview_cb cb , void *opaque); | ||
31 | |||
32 | diff --git a/tests/qtest/fuzz/generic_fuzz.c b/tests/qtest/fuzz/generic_fuzz.c | ||
33 | index XXXXXXX..XXXXXXX 100644 | ||
34 | --- a/tests/qtest/fuzz/generic_fuzz.c | ||
35 | +++ b/tests/qtest/fuzz/generic_fuzz.c | ||
36 | @@ -XXX,XX +XXX,XX @@ struct get_io_cb_info { | ||
37 | address_range result; | ||
38 | }; | ||
39 | |||
40 | -static int get_io_address_cb(Int128 start, Int128 size, | ||
41 | - const MemoryRegion *mr, void *opaque) { | ||
42 | +static bool get_io_address_cb(Int128 start, Int128 size, | ||
43 | + const MemoryRegion *mr, void *opaque) { | ||
44 | struct get_io_cb_info *info = opaque; | ||
45 | if (g_hash_table_lookup(fuzzable_memoryregions, mr)) { | ||
46 | if (info->index == 0) { | ||
47 | info->result.addr = (ram_addr_t)start; | ||
48 | info->result.size = (ram_addr_t)size; | ||
49 | info->found = 1; | ||
50 | - return 1; | ||
51 | + return true; | ||
51 | } | 52 | } |
53 | info->index--; | ||
52 | } | 54 | } |
53 | @@ -XXX,XX +XXX,XX @@ static bool arm_v7m_load_vector(ARMCPU *cpu, int exc, bool targets_secure, | 55 | - return 0; |
54 | vector_entry = address_space_ldl(arm_addressspace(cs, attrs), addr, | 56 | + return false; |
55 | attrs, &result); | 57 | } |
56 | if (result != MEMTX_OK) { | 58 | |
57 | + /* | 59 | /* |
58 | + * Underlying exception is BusFault: its target security state | ||
59 | + * depends on BFHFNMINS. | ||
60 | + */ | ||
61 | + exc_secure = !(cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK); | ||
62 | goto load_fail; | ||
63 | } | ||
64 | *pvec = vector_entry; | ||
65 | @@ -XXX,XX +XXX,XX @@ load_fail: | ||
66 | /* | ||
67 | * All vector table fetch fails are reported as HardFault, with | ||
68 | * HFSR.VECTTBL and .FORCED set. (FORCED is set because | ||
69 | - * technically the underlying exception is a MemManage or BusFault | ||
70 | + * technically the underlying exception is a SecureFault or BusFault | ||
71 | * that is escalated to HardFault.) This is a terminal exception, | ||
72 | * so we will either take the HardFault immediately or else enter | ||
73 | * lockup (the latter case is handled in armv7m_nvic_set_pending_derived()). | ||
74 | + * The HardFault is Secure if BFHFNMINS is 0 (meaning that all HFs are | ||
75 | + * secure); otherwise it targets the same security state as the | ||
76 | + * underlying exception. | ||
77 | */ | ||
78 | - exc_secure = targets_secure || | ||
79 | - !(cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK); | ||
80 | + if (!(cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK)) { | ||
81 | + exc_secure = true; | ||
82 | + } | ||
83 | env->v7m.hfsr |= R_V7M_HFSR_VECTTBL_MASK | R_V7M_HFSR_FORCED_MASK; | ||
84 | armv7m_nvic_set_pending_derived(env->nvic, ARMV7M_EXCP_HARD, exc_secure); | ||
85 | return false; | ||
86 | -- | 60 | -- |
87 | 2.20.1 | 61 | 2.20.1 |
88 | 62 | ||
89 | 63 | diff view generated by jsdifflib |
1 | The ARMv5 architecture didn't specify detailed per-feature ID | 1 | Add a documentation comment describing flatview_for_each_range(). |
---|---|---|---|
2 | registers. Now that we're using the MVFR0 register fields to | ||
3 | gate the existence of VFP instructions, we need to set up | ||
4 | the correct values in the cpu->isar structure so that we still | ||
5 | provide an FPU to the guest. | ||
6 | 2 | ||
7 | This fixes a regression in the arm926 and arm1026 CPUs, which | ||
8 | are the only ones that both have VFP and are ARMv5 or earlier. | ||
9 | This regression was introduced by the VFP refactoring, and more | ||
10 | specifically by commits 1120827fa182f0e76 and 266bd25c485597c, | ||
11 | which accidentally disabled VFP short-vector support and | ||
12 | double-precision support on these CPUs. | ||
13 | |||
14 | Fixes: 1120827fa182f0e | ||
15 | Fixes: 266bd25c485597c | ||
16 | Fixes: https://bugs.launchpad.net/qemu/+bug/1836192 | ||
17 | Reported-by: Christophe Lyon <christophe.lyon@linaro.org> | ||
18 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 3 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
19 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
20 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | 5 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
21 | Tested-by: Christophe Lyon <christophe.lyon@linaro.org> | 6 | Message-id: 20210318174823.18066-3-peter.maydell@linaro.org |
22 | Message-id: 20190711131241.22231-1-peter.maydell@linaro.org | ||
23 | --- | 7 | --- |
24 | target/arm/cpu.c | 12 ++++++++++++ | 8 | include/exec/memory.h | 26 ++++++++++++++++++++++++-- |
25 | 1 file changed, 12 insertions(+) | 9 | 1 file changed, 24 insertions(+), 2 deletions(-) |
26 | 10 | ||
27 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | 11 | diff --git a/include/exec/memory.h b/include/exec/memory.h |
28 | index XXXXXXX..XXXXXXX 100644 | 12 | index XXXXXXX..XXXXXXX 100644 |
29 | --- a/target/arm/cpu.c | 13 | --- a/include/exec/memory.h |
30 | +++ b/target/arm/cpu.c | 14 | +++ b/include/exec/memory.h |
31 | @@ -XXX,XX +XXX,XX @@ static void arm926_initfn(Object *obj) | 15 | @@ -XXX,XX +XXX,XX @@ static inline FlatView *address_space_to_flatview(AddressSpace *as) |
32 | * set the field to indicate Jazelle support within QEMU. | 16 | return qatomic_rcu_read(&as->current_map); |
33 | */ | ||
34 | cpu->isar.id_isar1 = FIELD_DP32(cpu->isar.id_isar1, ID_ISAR1, JAZELLE, 1); | ||
35 | + /* | ||
36 | + * Similarly, we need to set MVFR0 fields to enable double precision | ||
37 | + * and short vector support even though ARMv5 doesn't have this register. | ||
38 | + */ | ||
39 | + cpu->isar.mvfr0 = FIELD_DP32(cpu->isar.mvfr0, MVFR0, FPSHVEC, 1); | ||
40 | + cpu->isar.mvfr0 = FIELD_DP32(cpu->isar.mvfr0, MVFR0, FPDP, 1); | ||
41 | } | 17 | } |
42 | 18 | ||
43 | static void arm946_initfn(Object *obj) | 19 | +/** |
44 | @@ -XXX,XX +XXX,XX @@ static void arm1026_initfn(Object *obj) | 20 | + * typedef flatview_cb: callback for flatview_for_each_range() |
45 | * set the field to indicate Jazelle support within QEMU. | 21 | + * |
46 | */ | 22 | + * @start: start address of the range within the FlatView |
47 | cpu->isar.id_isar1 = FIELD_DP32(cpu->isar.id_isar1, ID_ISAR1, JAZELLE, 1); | 23 | + * @len: length of the range in bytes |
48 | + /* | 24 | + * @mr: MemoryRegion covering this range |
49 | + * Similarly, we need to set MVFR0 fields to enable double precision | 25 | + * @opaque: data pointer passed to flatview_for_each_range() |
50 | + * and short vector support even though ARMv5 doesn't have this register. | 26 | + * |
51 | + */ | 27 | + * Returns: true to stop the iteration, false to keep going. |
52 | + cpu->isar.mvfr0 = FIELD_DP32(cpu->isar.mvfr0, MVFR0, FPSHVEC, 1); | 28 | + */ |
53 | + cpu->isar.mvfr0 = FIELD_DP32(cpu->isar.mvfr0, MVFR0, FPDP, 1); | 29 | typedef bool (*flatview_cb)(Int128 start, |
54 | 30 | Int128 len, | |
55 | { | 31 | - const MemoryRegion*, void*); |
56 | /* The 1026 had an IFAR at c6,c0,0,1 rather than the ARMv6 c6,c0,0,2 */ | 32 | + const MemoryRegion *mr, |
33 | + void *opaque); | ||
34 | |||
35 | -void flatview_for_each_range(FlatView *fv, flatview_cb cb , void *opaque); | ||
36 | +/** | ||
37 | + * flatview_for_each_range: Iterate through a FlatView | ||
38 | + * @fv: the FlatView to iterate through | ||
39 | + * @cb: function to call for each range | ||
40 | + * @opaque: opaque data pointer to pass to @cb | ||
41 | + * | ||
42 | + * A FlatView is made up of a list of non-overlapping ranges, each of | ||
43 | + * which is a slice of a MemoryRegion. This function iterates through | ||
44 | + * each range in @fv, calling @cb. The callback function can terminate | ||
45 | + * iteration early by returning 'true'. | ||
46 | + */ | ||
47 | +void flatview_for_each_range(FlatView *fv, flatview_cb cb, void *opaque); | ||
48 | |||
49 | /** | ||
50 | * struct MemoryRegionSection: describes a fragment of a #MemoryRegion | ||
57 | -- | 51 | -- |
58 | 2.20.1 | 52 | 2.20.1 |
59 | 53 | ||
60 | 54 | diff view generated by jsdifflib |
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | 1 | The function flatview_for_each_range() calls a callback for each |
---|---|---|---|
2 | range in a FlatView. Currently the callback gets the start and | ||
3 | length of the range and the MemoryRegion involved, but not the offset | ||
4 | within the MemoryRegion. Add this to the callback's arguments; we're | ||
5 | going to want it for a new use in the next commit. | ||
2 | 6 | ||
3 | In the next commit we will implement the write_with_attrs() | 7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
4 | handler. To avoid using different APIs, convert the read() | 8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
5 | handler first. | 9 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
10 | Message-id: 20210318174823.18066-4-peter.maydell@linaro.org | ||
11 | --- | ||
12 | include/exec/memory.h | 2 ++ | ||
13 | softmmu/memory.c | 4 +++- | ||
14 | tests/qtest/fuzz/generic_fuzz.c | 5 ++++- | ||
15 | 3 files changed, 9 insertions(+), 2 deletions(-) | ||
6 | 16 | ||
7 | Reviewed-by: Francisco Iglesias <frasse.iglesias@gmail.com> | 17 | diff --git a/include/exec/memory.h b/include/exec/memory.h |
8 | Tested-by: Francisco Iglesias <frasse.iglesias@gmail.com> | ||
9 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | --- | ||
12 | hw/ssi/xilinx_spips.c | 23 +++++++++++------------ | ||
13 | 1 file changed, 11 insertions(+), 12 deletions(-) | ||
14 | |||
15 | diff --git a/hw/ssi/xilinx_spips.c b/hw/ssi/xilinx_spips.c | ||
16 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/hw/ssi/xilinx_spips.c | 19 | --- a/include/exec/memory.h |
18 | +++ b/hw/ssi/xilinx_spips.c | 20 | +++ b/include/exec/memory.h |
19 | @@ -XXX,XX +XXX,XX @@ static void lqspi_load_cache(void *opaque, hwaddr addr) | 21 | @@ -XXX,XX +XXX,XX @@ static inline FlatView *address_space_to_flatview(AddressSpace *as) |
22 | * @start: start address of the range within the FlatView | ||
23 | * @len: length of the range in bytes | ||
24 | * @mr: MemoryRegion covering this range | ||
25 | + * @offset_in_region: offset of the first byte of the range within @mr | ||
26 | * @opaque: data pointer passed to flatview_for_each_range() | ||
27 | * | ||
28 | * Returns: true to stop the iteration, false to keep going. | ||
29 | @@ -XXX,XX +XXX,XX @@ static inline FlatView *address_space_to_flatview(AddressSpace *as) | ||
30 | typedef bool (*flatview_cb)(Int128 start, | ||
31 | Int128 len, | ||
32 | const MemoryRegion *mr, | ||
33 | + hwaddr offset_in_region, | ||
34 | void *opaque); | ||
35 | |||
36 | /** | ||
37 | diff --git a/softmmu/memory.c b/softmmu/memory.c | ||
38 | index XXXXXXX..XXXXXXX 100644 | ||
39 | --- a/softmmu/memory.c | ||
40 | +++ b/softmmu/memory.c | ||
41 | @@ -XXX,XX +XXX,XX @@ void flatview_for_each_range(FlatView *fv, flatview_cb cb , void *opaque) | ||
42 | assert(cb); | ||
43 | |||
44 | FOR_EACH_FLAT_RANGE(fr, fv) { | ||
45 | - if (cb(fr->addr.start, fr->addr.size, fr->mr, opaque)) | ||
46 | + if (cb(fr->addr.start, fr->addr.size, fr->mr, | ||
47 | + fr->offset_in_region, opaque)) { | ||
48 | break; | ||
49 | + } | ||
20 | } | 50 | } |
21 | } | 51 | } |
22 | 52 | ||
23 | -static uint64_t | 53 | diff --git a/tests/qtest/fuzz/generic_fuzz.c b/tests/qtest/fuzz/generic_fuzz.c |
24 | -lqspi_read(void *opaque, hwaddr addr, unsigned int size) | 54 | index XXXXXXX..XXXXXXX 100644 |
25 | +static MemTxResult lqspi_read(void *opaque, hwaddr addr, uint64_t *value, | 55 | --- a/tests/qtest/fuzz/generic_fuzz.c |
26 | + unsigned size, MemTxAttrs attrs) | 56 | +++ b/tests/qtest/fuzz/generic_fuzz.c |
27 | { | 57 | @@ -XXX,XX +XXX,XX @@ struct get_io_cb_info { |
28 | - XilinxQSPIPS *q = opaque; | 58 | }; |
29 | - uint32_t ret; | 59 | |
30 | + XilinxQSPIPS *q = XILINX_QSPIPS(opaque); | 60 | static bool get_io_address_cb(Int128 start, Int128 size, |
31 | 61 | - const MemoryRegion *mr, void *opaque) { | |
32 | if (addr >= q->lqspi_cached_addr && | 62 | + const MemoryRegion *mr, |
33 | addr <= q->lqspi_cached_addr + LQSPI_CACHE_SIZE - 4) { | 63 | + hwaddr offset_in_region, |
34 | uint8_t *retp = &q->lqspi_buf[addr - q->lqspi_cached_addr]; | 64 | + void *opaque) |
35 | - ret = cpu_to_le32(*(uint32_t *)retp); | 65 | +{ |
36 | - DB_PRINT_L(1, "addr: %08x, data: %08x\n", (unsigned)addr, | 66 | struct get_io_cb_info *info = opaque; |
37 | - (unsigned)ret); | 67 | if (g_hash_table_lookup(fuzzable_memoryregions, mr)) { |
38 | - return ret; | 68 | if (info->index == 0) { |
39 | - } else { | ||
40 | - lqspi_load_cache(opaque, addr); | ||
41 | - return lqspi_read(opaque, addr, size); | ||
42 | + *value = cpu_to_le32(*(uint32_t *)retp); | ||
43 | + DB_PRINT_L(1, "addr: %08" HWADDR_PRIx ", data: %08" PRIx64 "\n", | ||
44 | + addr, *value); | ||
45 | + return MEMTX_OK; | ||
46 | } | ||
47 | + | ||
48 | + lqspi_load_cache(opaque, addr); | ||
49 | + return lqspi_read(opaque, addr, value, size, attrs); | ||
50 | } | ||
51 | |||
52 | static const MemoryRegionOps lqspi_ops = { | ||
53 | - .read = lqspi_read, | ||
54 | + .read_with_attrs = lqspi_read, | ||
55 | .endianness = DEVICE_NATIVE_ENDIAN, | ||
56 | .valid = { | ||
57 | .min_access_size = 1, | ||
58 | -- | 69 | -- |
59 | 2.20.1 | 70 | 2.20.1 |
60 | 71 | ||
61 | 72 | diff view generated by jsdifflib |
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | 1 | For accesses to rom blob data before or during reset, we have a |
---|---|---|---|
2 | function rom_ptr() which looks for a rom blob that would be loaded to | ||
3 | the specified address, and returns a pointer into the rom blob data | ||
4 | corresponding to that address. This allows board or CPU code to say | ||
5 | "what is the data that is going to be loaded to this address?". | ||
2 | 6 | ||
3 | Lei Sun found while auditing the code that a CPU write would | 7 | However, this function does not take account of memory region |
4 | trigger a NULL pointer dereference. | 8 | aliases. If for instance a machine model has RAM at address |
9 | 0x0000_0000 which is aliased to also appear at 0x1000_0000, a | ||
10 | rom_ptr() query for address 0x0000_0000 will only return a match if | ||
11 | the guest image provided by the user was loaded at 0x0000_0000 and | ||
12 | not if it was loaded at 0x1000_0000, even though they are the same | ||
13 | RAM and a run-time guest CPU read of 0x0000_0000 will read the data | ||
14 | loaded to 0x1000_0000. | ||
5 | 15 | ||
6 | >From UG1085 datasheet [*] AXI writes in this region are ignored | 16 | Provide a new function rom_ptr_for_as() which takes an AddressSpace |
7 | and generates an AXI Slave Error (SLVERR). | 17 | argument, so that it can check whether the MemoryRegion corresponding |
18 | to the address is also mapped anywhere else in the AddressSpace and | ||
19 | look for rom blobs that loaded to that alias. | ||
8 | 20 | ||
9 | Fix by implementing the write_with_attrs() handler. | 21 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Return MEMTX_ERROR when the region is accessed (this error maps | 22 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
11 | to an AXI slave error). | 23 | Message-id: 20210318174823.18066-5-peter.maydell@linaro.org |
24 | --- | ||
25 | include/hw/loader.h | 31 +++++++++++++++++++ | ||
26 | hw/core/loader.c | 75 +++++++++++++++++++++++++++++++++++++++++++++ | ||
27 | 2 files changed, 106 insertions(+) | ||
12 | 28 | ||
13 | [*] https://www.xilinx.com/support/documentation/user_guides/ug1085-zynq-ultrascale-trm.pdf | 29 | diff --git a/include/hw/loader.h b/include/hw/loader.h |
14 | |||
15 | Reported-by: Lei Sun <slei.casper@gmail.com> | ||
16 | Reviewed-by: Francisco Iglesias <frasse.iglesias@gmail.com> | ||
17 | Tested-by: Francisco Iglesias <frasse.iglesias@gmail.com> | ||
18 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
19 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
20 | --- | ||
21 | hw/ssi/xilinx_spips.c | 16 ++++++++++++++++ | ||
22 | 1 file changed, 16 insertions(+) | ||
23 | |||
24 | diff --git a/hw/ssi/xilinx_spips.c b/hw/ssi/xilinx_spips.c | ||
25 | index XXXXXXX..XXXXXXX 100644 | 30 | index XXXXXXX..XXXXXXX 100644 |
26 | --- a/hw/ssi/xilinx_spips.c | 31 | --- a/include/hw/loader.h |
27 | +++ b/hw/ssi/xilinx_spips.c | 32 | +++ b/include/hw/loader.h |
28 | @@ -XXX,XX +XXX,XX @@ static MemTxResult lqspi_read(void *opaque, hwaddr addr, uint64_t *value, | 33 | @@ -XXX,XX +XXX,XX @@ void rom_transaction_end(bool commit); |
29 | return lqspi_read(opaque, addr, value, size, attrs); | 34 | |
35 | int rom_copy(uint8_t *dest, hwaddr addr, size_t size); | ||
36 | void *rom_ptr(hwaddr addr, size_t size); | ||
37 | +/** | ||
38 | + * rom_ptr_for_as: Return a pointer to ROM blob data for the address | ||
39 | + * @as: AddressSpace to look for the ROM blob in | ||
40 | + * @addr: Address within @as | ||
41 | + * @size: size of data required in bytes | ||
42 | + * | ||
43 | + * Returns: pointer into the data which backs the matching ROM blob, | ||
44 | + * or NULL if no blob covers the address range. | ||
45 | + * | ||
46 | + * This function looks for a ROM blob which covers the specified range | ||
47 | + * of bytes of length @size starting at @addr within the address space | ||
48 | + * @as. This is useful for code which runs as part of board | ||
49 | + * initialization or CPU reset which wants to read data that is part | ||
50 | + * of a user-supplied guest image or other guest memory contents, but | ||
51 | + * which runs before the ROM loader's reset function has copied the | ||
52 | + * blobs into guest memory. | ||
53 | + * | ||
54 | + * rom_ptr_for_as() will look not just for blobs loaded directly to | ||
55 | + * the specified address, but also for blobs which were loaded to an | ||
56 | + * alias of the region at a different location in the AddressSpace. | ||
57 | + * In other words, if a machine model has RAM at address 0x0000_0000 | ||
58 | + * which is aliased to also appear at 0x1000_0000, rom_ptr_for_as() | ||
59 | + * will return the correct data whether the guest image was linked and | ||
60 | + * loaded at 0x0000_0000 or 0x1000_0000. Contrast rom_ptr(), which | ||
61 | + * will only return data if the image load address is an exact match | ||
62 | + * with the queried address. | ||
63 | + * | ||
64 | + * New code should prefer to use rom_ptr_for_as() instead of | ||
65 | + * rom_ptr(). | ||
66 | + */ | ||
67 | +void *rom_ptr_for_as(AddressSpace *as, hwaddr addr, size_t size); | ||
68 | void hmp_info_roms(Monitor *mon, const QDict *qdict); | ||
69 | |||
70 | #define rom_add_file_fixed(_f, _a, _i) \ | ||
71 | diff --git a/hw/core/loader.c b/hw/core/loader.c | ||
72 | index XXXXXXX..XXXXXXX 100644 | ||
73 | --- a/hw/core/loader.c | ||
74 | +++ b/hw/core/loader.c | ||
75 | @@ -XXX,XX +XXX,XX @@ void *rom_ptr(hwaddr addr, size_t size) | ||
76 | return rom->data + (addr - rom->addr); | ||
30 | } | 77 | } |
31 | 78 | ||
32 | +static MemTxResult lqspi_write(void *opaque, hwaddr offset, uint64_t value, | 79 | +typedef struct FindRomCBData { |
33 | + unsigned size, MemTxAttrs attrs) | 80 | + size_t size; /* Amount of data we want from ROM, in bytes */ |
81 | + MemoryRegion *mr; /* MR at the unaliased guest addr */ | ||
82 | + hwaddr xlat; /* Offset of addr within mr */ | ||
83 | + void *rom; /* Output: rom data pointer, if found */ | ||
84 | +} FindRomCBData; | ||
85 | + | ||
86 | +static bool find_rom_cb(Int128 start, Int128 len, const MemoryRegion *mr, | ||
87 | + hwaddr offset_in_region, void *opaque) | ||
88 | +{ | ||
89 | + FindRomCBData *cbdata = opaque; | ||
90 | + hwaddr alias_addr; | ||
91 | + | ||
92 | + if (mr != cbdata->mr) { | ||
93 | + return false; | ||
94 | + } | ||
95 | + | ||
96 | + alias_addr = int128_get64(start) + cbdata->xlat - offset_in_region; | ||
97 | + cbdata->rom = rom_ptr(alias_addr, cbdata->size); | ||
98 | + if (!cbdata->rom) { | ||
99 | + return false; | ||
100 | + } | ||
101 | + /* Found a match, stop iterating */ | ||
102 | + return true; | ||
103 | +} | ||
104 | + | ||
105 | +void *rom_ptr_for_as(AddressSpace *as, hwaddr addr, size_t size) | ||
34 | +{ | 106 | +{ |
35 | + /* | 107 | + /* |
36 | + * From UG1085, Chapter 24 (Quad-SPI controllers): | 108 | + * Find any ROM data for the given guest address range. If there |
37 | + * - Writes are ignored | 109 | + * is a ROM blob then return a pointer to the host memory |
38 | + * - AXI writes generate an external AXI slave error (SLVERR) | 110 | + * corresponding to 'addr'; otherwise return NULL. |
111 | + * | ||
112 | + * We look not only for ROM blobs that were loaded directly to | ||
113 | + * addr, but also for ROM blobs that were loaded to aliases of | ||
114 | + * that memory at other addresses within the AddressSpace. | ||
115 | + * | ||
116 | + * Note that we do not check @as against the 'as' member in the | ||
117 | + * 'struct Rom' returned by rom_ptr(). The Rom::as is the | ||
118 | + * AddressSpace which the rom blob should be written to, whereas | ||
119 | + * our @as argument is the AddressSpace which we are (effectively) | ||
120 | + * reading from, and the same underlying RAM will often be visible | ||
121 | + * in multiple AddressSpaces. (A common example is a ROM blob | ||
122 | + * written to the 'system' address space but then read back via a | ||
123 | + * CPU's cpu->as pointer.) This does mean we might potentially | ||
124 | + * return a false-positive match if a ROM blob was loaded into an | ||
125 | + * AS which is entirely separate and distinct from the one we're | ||
126 | + * querying, but this issue exists also for rom_ptr() and hasn't | ||
127 | + * caused any problems in practice. | ||
39 | + */ | 128 | + */ |
40 | + qemu_log_mask(LOG_GUEST_ERROR, "%s Unexpected %u-bit access to 0x%" PRIx64 | 129 | + FlatView *fv; |
41 | + " (value: 0x%" PRIx64 "\n", | 130 | + void *rom; |
42 | + __func__, size << 3, offset, value); | 131 | + hwaddr len_unused; |
132 | + FindRomCBData cbdata = {}; | ||
43 | + | 133 | + |
44 | + return MEMTX_ERROR; | 134 | + /* Easy case: there's data at the actual address */ |
135 | + rom = rom_ptr(addr, size); | ||
136 | + if (rom) { | ||
137 | + return rom; | ||
138 | + } | ||
139 | + | ||
140 | + RCU_READ_LOCK_GUARD(); | ||
141 | + | ||
142 | + fv = address_space_to_flatview(as); | ||
143 | + cbdata.mr = flatview_translate(fv, addr, &cbdata.xlat, &len_unused, | ||
144 | + false, MEMTXATTRS_UNSPECIFIED); | ||
145 | + if (!cbdata.mr) { | ||
146 | + /* Nothing at this address, so there can't be any aliasing */ | ||
147 | + return NULL; | ||
148 | + } | ||
149 | + cbdata.size = size; | ||
150 | + flatview_for_each_range(fv, find_rom_cb, &cbdata); | ||
151 | + return cbdata.rom; | ||
45 | +} | 152 | +} |
46 | + | 153 | + |
47 | static const MemoryRegionOps lqspi_ops = { | 154 | void hmp_info_roms(Monitor *mon, const QDict *qdict) |
48 | .read_with_attrs = lqspi_read, | 155 | { |
49 | + .write_with_attrs = lqspi_write, | 156 | Rom *rom; |
50 | .endianness = DEVICE_NATIVE_ENDIAN, | ||
51 | .valid = { | ||
52 | .min_access_size = 1, | ||
53 | -- | 157 | -- |
54 | 2.20.1 | 158 | 2.20.1 |
55 | 159 | ||
56 | 160 | diff view generated by jsdifflib |
1 | From: Alex Bennée <alex.bennee@linaro.org> | 1 | For Arm M-profile CPUs, on reset the CPU must load its initial PC and |
---|---|---|---|
2 | SP from a vector table in guest memory. Because we can't guarantee | ||
3 | reset ordering, we have to handle the possibility that the ROM blob | ||
4 | loader's reset function has not yet run when the CPU resets, in which | ||
5 | case the data in an ELF file specified by the user won't be in guest | ||
6 | memory to be read yet. | ||
2 | 7 | ||
3 | When we converted to using feature bits in 602f6e42cfbf we missed out | 8 | We work around the reset ordering problem by checking whether the ROM |
4 | the fact (dp && arm_dc_feature(s, ARM_FEATURE_V8)) was supported for | 9 | blob loader has any data for the address where the vector table is, |
5 | -cpu max configurations. This caused a regression in the GCC test | 10 | using rom_ptr(). Unfortunately this does not handle the possibility |
6 | suite. Fix this by setting the appropriate bits in mvfr1.FPHP to | 11 | of memory aliasing. For many M-profile boards, memory can be |
7 | report ARMv8-A with FP support (but not ARMv8.2-FP16). | 12 | accessed via multiple possible physical addresses; if the board has |
13 | the vector table at address X but the user's ELF file loads data via | ||
14 | a different address Y which is an alias to the same underlying guest | ||
15 | RAM then rom_ptr() will not find it. | ||
8 | 16 | ||
9 | Fixes: https://bugs.launchpad.net/qemu/+bug/1836078 | 17 | Use the new rom_ptr_for_as() function, which deals with memory |
10 | Signed-off-by: Alex Bennée <alex.bennee@linaro.org> | 18 | aliasing when locating a relevant ROM blob. |
19 | |||
20 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 21 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
12 | Message-id: 20190711103737.10017-1-alex.bennee@linaro.org | 22 | Message-id: 20210318174823.18066-6-peter.maydell@linaro.org |
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
14 | --- | 23 | --- |
15 | target/arm/cpu.c | 4 ++++ | 24 | target/arm/cpu.c | 2 +- |
16 | 1 file changed, 4 insertions(+) | 25 | 1 file changed, 1 insertion(+), 1 deletion(-) |
17 | 26 | ||
18 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | 27 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c |
19 | index XXXXXXX..XXXXXXX 100644 | 28 | index XXXXXXX..XXXXXXX 100644 |
20 | --- a/target/arm/cpu.c | 29 | --- a/target/arm/cpu.c |
21 | +++ b/target/arm/cpu.c | 30 | +++ b/target/arm/cpu.c |
22 | @@ -XXX,XX +XXX,XX @@ static void arm_max_initfn(Object *obj) | 31 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(DeviceState *dev) |
23 | t = FIELD_DP32(t, ID_ISAR6, SPECRES, 1); | 32 | |
24 | cpu->isar.id_isar6 = t; | 33 | /* Load the initial SP and PC from offset 0 and 4 in the vector table */ |
25 | 34 | vecbase = env->v7m.vecbase[env->v7m.secure]; | |
26 | + t = cpu->isar.mvfr1; | 35 | - rom = rom_ptr(vecbase, 8); |
27 | + t = FIELD_DP32(t, MVFR1, FPHP, 2); /* v8.0 FP support */ | 36 | + rom = rom_ptr_for_as(s->as, vecbase, 8); |
28 | + cpu->isar.mvfr1 = t; | 37 | if (rom) { |
29 | + | 38 | /* Address zero is covered by ROM which hasn't yet been |
30 | t = cpu->isar.mvfr2; | 39 | * copied into physical memory. |
31 | t = FIELD_DP32(t, MVFR2, SIMDMISC, 3); /* SIMD MaxNum */ | ||
32 | t = FIELD_DP32(t, MVFR2, FPMISC, 4); /* FP MaxNum */ | ||
33 | -- | 40 | -- |
34 | 2.20.1 | 41 | 2.20.1 |
35 | 42 | ||
36 | 43 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
2 | 1 | ||
3 | Both lqspi_read() and lqspi_load_cache() expect a 32-bit | ||
4 | aligned address. | ||
5 | |||
6 | >From UG1085 datasheet [*] chapter on 'Quad-SPI Controller': | ||
7 | |||
8 | Transfer Size Limitations | ||
9 | |||
10 | Because of the 32-bit wide TX, RX, and generic FIFO, all | ||
11 | APB/AXI transfers must be an integer multiple of 4-bytes. | ||
12 | Shorter transfers are not possible. | ||
13 | |||
14 | Set MemoryRegionOps.impl values to force 32-bit accesses, | ||
15 | this way we are sure we do not access the lqspi_buf[] array | ||
16 | out of bound. | ||
17 | |||
18 | [*] https://www.xilinx.com/support/documentation/user_guides/ug1085-zynq-ultrascale-trm.pdf | ||
19 | |||
20 | Reviewed-by: Francisco Iglesias <frasse.iglesias@gmail.com> | ||
21 | Tested-by: Francisco Iglesias <frasse.iglesias@gmail.com> | ||
22 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
23 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
24 | --- | ||
25 | hw/ssi/xilinx_spips.c | 4 ++++ | ||
26 | 1 file changed, 4 insertions(+) | ||
27 | |||
28 | diff --git a/hw/ssi/xilinx_spips.c b/hw/ssi/xilinx_spips.c | ||
29 | index XXXXXXX..XXXXXXX 100644 | ||
30 | --- a/hw/ssi/xilinx_spips.c | ||
31 | +++ b/hw/ssi/xilinx_spips.c | ||
32 | @@ -XXX,XX +XXX,XX @@ static const MemoryRegionOps lqspi_ops = { | ||
33 | .read_with_attrs = lqspi_read, | ||
34 | .write_with_attrs = lqspi_write, | ||
35 | .endianness = DEVICE_NATIVE_ENDIAN, | ||
36 | + .impl = { | ||
37 | + .min_access_size = 4, | ||
38 | + .max_access_size = 4, | ||
39 | + }, | ||
40 | .valid = { | ||
41 | .min_access_size = 1, | ||
42 | .max_access_size = 4 | ||
43 | -- | ||
44 | 2.20.1 | ||
45 | |||
46 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
2 | 1 | ||
3 | Reading the RX_DATA register when the RX_FIFO is empty triggers | ||
4 | an abort. This can be easily reproduced: | ||
5 | |||
6 | $ qemu-system-arm -M emcraft-sf2 -monitor stdio -S | ||
7 | QEMU 4.0.50 monitor - type 'help' for more information | ||
8 | (qemu) x 0x40001010 | ||
9 | Aborted (core dumped) | ||
10 | |||
11 | (gdb) bt | ||
12 | #1 0x00007f035874f895 in abort () at /lib64/libc.so.6 | ||
13 | #2 0x00005628686591ff in fifo8_pop (fifo=0x56286a9a4c68) at util/fifo8.c:66 | ||
14 | #3 0x00005628683e0b8e in fifo32_pop (fifo=0x56286a9a4c68) at include/qemu/fifo32.h:137 | ||
15 | #4 0x00005628683e0efb in spi_read (opaque=0x56286a9a4850, addr=4, size=4) at hw/ssi/mss-spi.c:168 | ||
16 | #5 0x0000562867f96801 in memory_region_read_accessor (mr=0x56286a9a4b60, addr=16, value=0x7ffeecb0c5c8, size=4, shift=0, mask=4294967295, attrs=...) at memory.c:439 | ||
17 | #6 0x0000562867f96cdb in access_with_adjusted_size (addr=16, value=0x7ffeecb0c5c8, size=4, access_size_min=1, access_size_max=4, access_fn=0x562867f967c3 <memory_region_read_accessor>, mr=0x56286a9a4b60, attrs=...) at memory.c:569 | ||
18 | #7 0x0000562867f99940 in memory_region_dispatch_read1 (mr=0x56286a9a4b60, addr=16, pval=0x7ffeecb0c5c8, size=4, attrs=...) at memory.c:1420 | ||
19 | #8 0x0000562867f99a08 in memory_region_dispatch_read (mr=0x56286a9a4b60, addr=16, pval=0x7ffeecb0c5c8, size=4, attrs=...) at memory.c:1447 | ||
20 | #9 0x0000562867f38721 in flatview_read_continue (fv=0x56286aec6360, addr=1073745936, attrs=..., buf=0x7ffeecb0c7c0 "\340ǰ\354\376\177", len=4, addr1=16, l=4, mr=0x56286a9a4b60) at exec.c:3385 | ||
21 | #10 0x0000562867f38874 in flatview_read (fv=0x56286aec6360, addr=1073745936, attrs=..., buf=0x7ffeecb0c7c0 "\340ǰ\354\376\177", len=4) at exec.c:3423 | ||
22 | #11 0x0000562867f388ea in address_space_read_full (as=0x56286aa3e890, addr=1073745936, attrs=..., buf=0x7ffeecb0c7c0 "\340ǰ\354\376\177", len=4) at exec.c:3436 | ||
23 | #12 0x0000562867f389c5 in address_space_rw (as=0x56286aa3e890, addr=1073745936, attrs=..., buf=0x7ffeecb0c7c0 "\340ǰ\354\376\177", len=4, is_write=false) at exec.c:3466 | ||
24 | #13 0x0000562867f3bdd7 in cpu_memory_rw_debug (cpu=0x56286aa19d00, addr=1073745936, buf=0x7ffeecb0c7c0 "\340ǰ\354\376\177", len=4, is_write=0) at exec.c:3976 | ||
25 | #14 0x000056286811ed51 in memory_dump (mon=0x56286a8c32d0, count=1, format=120, wsize=4, addr=1073745936, is_physical=0) at monitor/misc.c:730 | ||
26 | #15 0x000056286811eff1 in hmp_memory_dump (mon=0x56286a8c32d0, qdict=0x56286b15c400) at monitor/misc.c:785 | ||
27 | #16 0x00005628684740ee in handle_hmp_command (mon=0x56286a8c32d0, cmdline=0x56286a8caeb2 "0x40001010") at monitor/hmp.c:1082 | ||
28 | |||
29 | From the datasheet "Actel SmartFusion Microcontroller Subsystem | ||
30 | User's Guide" Rev.1, Table 13-3 "SPI Register Summary", this | ||
31 | register has a reset value of 0. | ||
32 | |||
33 | Check the FIFO is not empty before accessing it, else log an | ||
34 | error message. | ||
35 | |||
36 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
37 | Reviewed-by: Alistair Francis <alistair.francis@wdc.com> | ||
38 | Message-id: 20190709113715.7761-3-philmd@redhat.com | ||
39 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
40 | --- | ||
41 | hw/ssi/mss-spi.c | 8 +++++++- | ||
42 | 1 file changed, 7 insertions(+), 1 deletion(-) | ||
43 | |||
44 | diff --git a/hw/ssi/mss-spi.c b/hw/ssi/mss-spi.c | ||
45 | index XXXXXXX..XXXXXXX 100644 | ||
46 | --- a/hw/ssi/mss-spi.c | ||
47 | +++ b/hw/ssi/mss-spi.c | ||
48 | @@ -XXX,XX +XXX,XX @@ spi_read(void *opaque, hwaddr addr, unsigned int size) | ||
49 | case R_SPI_RX: | ||
50 | s->regs[R_SPI_STATUS] &= ~S_RXFIFOFUL; | ||
51 | s->regs[R_SPI_STATUS] &= ~S_RXCHOVRF; | ||
52 | - ret = fifo32_pop(&s->rx_fifo); | ||
53 | + if (fifo32_is_empty(&s->rx_fifo)) { | ||
54 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
55 | + "%s: Reading empty RX_FIFO\n", | ||
56 | + __func__); | ||
57 | + } else { | ||
58 | + ret = fifo32_pop(&s->rx_fifo); | ||
59 | + } | ||
60 | if (fifo32_is_empty(&s->rx_fifo)) { | ||
61 | s->regs[R_SPI_STATUS] |= S_RXFIFOEMP; | ||
62 | } | ||
63 | -- | ||
64 | 2.20.1 | ||
65 | |||
66 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
2 | 1 | ||
3 | In the previous commit we fixed a crash when the guest read a | ||
4 | register that pop from an empty FIFO. | ||
5 | By auditing the repository, we found another similar use with | ||
6 | an easy way to reproduce: | ||
7 | |||
8 | $ qemu-system-aarch64 -M xlnx-zcu102 -monitor stdio -S | ||
9 | QEMU 4.0.50 monitor - type 'help' for more information | ||
10 | (qemu) xp/b 0xfd4a0134 | ||
11 | Aborted (core dumped) | ||
12 | |||
13 | (gdb) bt | ||
14 | #0 0x00007f6936dea57f in raise () at /lib64/libc.so.6 | ||
15 | #1 0x00007f6936dd4895 in abort () at /lib64/libc.so.6 | ||
16 | #2 0x0000561ad32975ec in xlnx_dp_aux_pop_rx_fifo (s=0x7f692babee70) at hw/display/xlnx_dp.c:431 | ||
17 | #3 0x0000561ad3297dc0 in xlnx_dp_read (opaque=0x7f692babee70, offset=77, size=4) at hw/display/xlnx_dp.c:667 | ||
18 | #4 0x0000561ad321b896 in memory_region_read_accessor (mr=0x7f692babf620, addr=308, value=0x7ffe05c1db88, size=4, shift=0, mask=4294967295, attrs=...) at memory.c:439 | ||
19 | #5 0x0000561ad321bd70 in access_with_adjusted_size (addr=308, value=0x7ffe05c1db88, size=1, access_size_min=4, access_size_max=4, access_fn=0x561ad321b858 <memory_region_read_accessor>, mr=0x7f692babf620, attrs=...) at memory.c:569 | ||
20 | #6 0x0000561ad321e9d5 in memory_region_dispatch_read1 (mr=0x7f692babf620, addr=308, pval=0x7ffe05c1db88, size=1, attrs=...) at memory.c:1420 | ||
21 | #7 0x0000561ad321ea9d in memory_region_dispatch_read (mr=0x7f692babf620, addr=308, pval=0x7ffe05c1db88, size=1, attrs=...) at memory.c:1447 | ||
22 | #8 0x0000561ad31bd742 in flatview_read_continue (fv=0x561ad69c04f0, addr=4249485620, attrs=..., buf=0x7ffe05c1dcf0 "\020\335\301\005\376\177", len=1, addr1=308, l=1, mr=0x7f692babf620) at exec.c:3385 | ||
23 | #9 0x0000561ad31bd895 in flatview_read (fv=0x561ad69c04f0, addr=4249485620, attrs=..., buf=0x7ffe05c1dcf0 "\020\335\301\005\376\177", len=1) at exec.c:3423 | ||
24 | #10 0x0000561ad31bd90b in address_space_read_full (as=0x561ad5bb3020, addr=4249485620, attrs=..., buf=0x7ffe05c1dcf0 "\020\335\301\005\376\177", len=1) at exec.c:3436 | ||
25 | #11 0x0000561ad33b1c42 in address_space_read (len=1, buf=0x7ffe05c1dcf0 "\020\335\301\005\376\177", attrs=..., addr=4249485620, as=0x561ad5bb3020) at include/exec/memory.h:2131 | ||
26 | #12 0x0000561ad33b1c42 in memory_dump (mon=0x561ad59c4530, count=1, format=120, wsize=1, addr=4249485620, is_physical=1) at monitor/misc.c:723 | ||
27 | #13 0x0000561ad33b1fc1 in hmp_physical_memory_dump (mon=0x561ad59c4530, qdict=0x561ad6c6fd00) at monitor/misc.c:795 | ||
28 | #14 0x0000561ad37b4a9f in handle_hmp_command (mon=0x561ad59c4530, cmdline=0x561ad59d0f22 "/b 0x00000000fd4a0134") at monitor/hmp.c:1082 | ||
29 | |||
30 | Fix by checking the FIFO is not empty before popping from it. | ||
31 | |||
32 | The datasheet is not clear about the reset value of this register, | ||
33 | we choose to return '0'. | ||
34 | |||
35 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
36 | Reviewed-by: Alistair Francis <alistair.francis@wdc.com> | ||
37 | Message-id: 20190709113715.7761-4-philmd@redhat.com | ||
38 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
39 | --- | ||
40 | hw/display/xlnx_dp.c | 15 +++++++++++---- | ||
41 | 1 file changed, 11 insertions(+), 4 deletions(-) | ||
42 | |||
43 | diff --git a/hw/display/xlnx_dp.c b/hw/display/xlnx_dp.c | ||
44 | index XXXXXXX..XXXXXXX 100644 | ||
45 | --- a/hw/display/xlnx_dp.c | ||
46 | +++ b/hw/display/xlnx_dp.c | ||
47 | @@ -XXX,XX +XXX,XX @@ static uint8_t xlnx_dp_aux_pop_rx_fifo(XlnxDPState *s) | ||
48 | uint8_t ret; | ||
49 | |||
50 | if (fifo8_is_empty(&s->rx_fifo)) { | ||
51 | - DPRINTF("rx_fifo underflow..\n"); | ||
52 | - abort(); | ||
53 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
54 | + "%s: Reading empty RX_FIFO\n", | ||
55 | + __func__); | ||
56 | + /* | ||
57 | + * The datasheet is not clear about the reset value, it seems | ||
58 | + * to be unspecified. We choose to return '0'. | ||
59 | + */ | ||
60 | + ret = 0; | ||
61 | + } else { | ||
62 | + ret = fifo8_pop(&s->rx_fifo); | ||
63 | + DPRINTF("pop 0x%" PRIX8 " from rx_fifo.\n", ret); | ||
64 | } | ||
65 | - ret = fifo8_pop(&s->rx_fifo); | ||
66 | - DPRINTF("pop 0x%" PRIX8 " from rx_fifo.\n", ret); | ||
67 | return ret; | ||
68 | } | ||
69 | |||
70 | -- | ||
71 | 2.20.1 | ||
72 | |||
73 | diff view generated by jsdifflib |
1 | From: David Engraf <david.engraf@sysgo.com> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Using the whole 128 MiB flash in non-secure mode is not working because | 3 | Pretend the fault always happens at page table level 3. |
4 | virt_flash_fdt() expects the same address for secure_sysmem and sysmem. | ||
5 | This is not correctly handled by caller because it forwards NULL for | ||
6 | secure_sysmem in non-secure flash mode. | ||
7 | 4 | ||
8 | Fixed by using sysmem when secure_sysmem is NULL. | 5 | Failure to set this leaves level = 0, which is impossible for |
6 | ARMFault_Permission, and produces an invalid syndrome, which | ||
7 | reaches g_assert_not_reached in cpu_loop. | ||
9 | 8 | ||
10 | Signed-off-by: David Engraf <david.engraf@sysgo.com> | 9 | Fixes: 8db94ab4e5db ("linux-user/aarch64: Pass syndrome to EXC_*_ABORT") |
11 | Message-id: 20190712075002.14326-1-david.engraf@sysgo.com | 10 | Reported-by: Laurent Vivier <laurent@vivier.eu> |
11 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
12 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
13 | Message-id: 20210320000606.1788699-1-richard.henderson@linaro.org | ||
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
14 | --- | 15 | --- |
15 | hw/arm/virt.c | 2 +- | 16 | target/arm/tlb_helper.c | 1 + |
16 | 1 file changed, 1 insertion(+), 1 deletion(-) | 17 | 1 file changed, 1 insertion(+) |
17 | 18 | ||
18 | diff --git a/hw/arm/virt.c b/hw/arm/virt.c | 19 | diff --git a/target/arm/tlb_helper.c b/target/arm/tlb_helper.c |
19 | index XXXXXXX..XXXXXXX 100644 | 20 | index XXXXXXX..XXXXXXX 100644 |
20 | --- a/hw/arm/virt.c | 21 | --- a/target/arm/tlb_helper.c |
21 | +++ b/hw/arm/virt.c | 22 | +++ b/target/arm/tlb_helper.c |
22 | @@ -XXX,XX +XXX,XX @@ static void machvirt_init(MachineState *machine) | 23 | @@ -XXX,XX +XXX,XX @@ bool arm_cpu_tlb_fill(CPUState *cs, vaddr address, int size, |
23 | &machine->device_memory->mr); | 24 | } else { |
25 | fi.type = ARMFault_Translation; | ||
24 | } | 26 | } |
25 | 27 | + fi.level = 3; | |
26 | - virt_flash_fdt(vms, sysmem, secure_sysmem); | 28 | |
27 | + virt_flash_fdt(vms, sysmem, secure_sysmem ?: sysmem); | 29 | /* now we have a real cpu fault */ |
28 | 30 | cpu_restore_state(cs, retaddr, true); | |
29 | create_gic(vms, pic); | ||
30 | |||
31 | -- | 31 | -- |
32 | 2.20.1 | 32 | 2.20.1 |
33 | 33 | ||
34 | 34 | diff view generated by jsdifflib |