1 | target-arm queue for rc1 -- these are all bug fixes. | 1 | The following changes since commit 64ada298b98a51eb2512607f6e6180cb330c47b1: |
---|---|---|---|
2 | 2 | ||
3 | thanks | 3 | Merge remote-tracking branch 'remotes/legoater/tags/pull-ppc-20220302' into staging (2022-03-02 12:38:46 +0000) |
4 | -- PMM | ||
5 | |||
6 | The following changes since commit b9404bf592e7ba74180e1a54ed7a266ec6ee67f2: | ||
7 | |||
8 | Merge remote-tracking branch 'remotes/dgilbert/tags/pull-hmp-20190715' into staging (2019-07-15 12:22:07 +0100) | ||
9 | 4 | ||
10 | are available in the Git repository at: | 5 | are available in the Git repository at: |
11 | 6 | ||
12 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20190715 | 7 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20220302 |
13 | 8 | ||
14 | for you to fetch changes up to 51c9122e92b776a3f16af0b9282f1dc5012e2a19: | 9 | for you to fetch changes up to 268c11984e67867c22f53beb3c7f8b98900d66b2: |
15 | 10 | ||
16 | target/arm: NS BusFault on vector table fetch escalates to NS HardFault (2019-07-15 14:17:04 +0100) | 11 | ui/cocoa.m: Remove unnecessary NSAutoreleasePools (2022-03-02 19:27:37 +0000) |
17 | 12 | ||
18 | ---------------------------------------------------------------- | 13 | ---------------------------------------------------------------- |
19 | target-arm queue: | 14 | target-arm queue: |
20 | * report ARMv8-A FP support for AArch32 -cpu max | 15 | * mps3-an547: Add missing user ahb interfaces |
21 | * hw/ssi/xilinx_spips: Avoid AXI writes to the LQSPI linear memory | 16 | * hw/arm/mps2-tz.c: Update AN547 documentation URL |
22 | * hw/ssi/xilinx_spips: Avoid out-of-bound access to lqspi_buf[] | 17 | * hw/input/tsc210x: Don't abort on bad SPI word widths |
23 | * hw/ssi/mss-spi: Avoid crash when reading empty RX FIFO | 18 | * hw/i2c: flatten pca954x mux device |
24 | * hw/display/xlnx_dp: Avoid crash when reading empty RX FIFO | 19 | * target/arm: Support PSCI 1.1 and SMCCC 1.0 |
25 | * hw/arm/virt: Fix non-secure flash mode | 20 | * target/arm: Fix early free of TCG temp in handle_simd_shift_fpint_conv() |
26 | * pl031: Correctly migrate state when using -rtc clock=host | 21 | * tests/qtest: add qtests for npcm7xx sdhci |
27 | * fix regression that meant arm926 and arm1026 lost VFP | 22 | * Implement FEAT_LVA |
28 | double-precision support | 23 | * Implement FEAT_LPA |
29 | * v8M: NS BusFault on vector table fetch escalates to NS HardFault | 24 | * Implement FEAT_LPA2 (but do not enable it yet) |
25 | * Report KVM's actual PSCI version to guest in dtb | ||
26 | * ui/cocoa.m: Fix updateUIInfo threading issues | ||
27 | * ui/cocoa.m: Remove unnecessary NSAutoreleasePools | ||
30 | 28 | ||
31 | ---------------------------------------------------------------- | 29 | ---------------------------------------------------------------- |
32 | Alex Bennée (1): | 30 | Akihiko Odaki (1): |
33 | target/arm: report ARMv8-A FP support for AArch32 -cpu max | 31 | target/arm: Support PSCI 1.1 and SMCCC 1.0 |
34 | 32 | ||
35 | David Engraf (1): | 33 | Jimmy Brisson (1): |
36 | hw/arm/virt: Fix non-secure flash mode | 34 | mps3-an547: Add missing user ahb interfaces |
37 | 35 | ||
38 | Peter Maydell (3): | 36 | Patrick Venture (1): |
39 | pl031: Correctly migrate state when using -rtc clock=host | 37 | hw/i2c: flatten pca954x mux device |
40 | target/arm: Set VFP-related MVFR0 fields for arm926 and arm1026 | ||
41 | target/arm: NS BusFault on vector table fetch escalates to NS HardFault | ||
42 | 38 | ||
43 | Philippe Mathieu-Daudé (5): | 39 | Peter Maydell (5): |
44 | hw/ssi/xilinx_spips: Convert lqspi_read() to read_with_attrs | 40 | hw/arm/mps2-tz.c: Update AN547 documentation URL |
45 | hw/ssi/xilinx_spips: Avoid AXI writes to the LQSPI linear memory | 41 | hw/input/tsc210x: Don't abort on bad SPI word widths |
46 | hw/ssi/xilinx_spips: Avoid out-of-bound access to lqspi_buf[] | 42 | target/arm: Report KVM's actual PSCI version to guest in dtb |
47 | hw/ssi/mss-spi: Avoid crash when reading empty RX FIFO | 43 | ui/cocoa.m: Fix updateUIInfo threading issues |
48 | hw/display/xlnx_dp: Avoid crash when reading empty RX FIFO | 44 | ui/cocoa.m: Remove unnecessary NSAutoreleasePools |
49 | 45 | ||
50 | include/hw/timer/pl031.h | 2 ++ | 46 | Richard Henderson (16): |
51 | hw/arm/virt.c | 2 +- | 47 | hw/registerfields: Add FIELD_SEX<N> and FIELD_SDP<N> |
52 | hw/core/machine.c | 1 + | 48 | target/arm: Set TCR_EL1.TSZ for user-only |
53 | hw/display/xlnx_dp.c | 15 +++++--- | 49 | target/arm: Fault on invalid TCR_ELx.TxSZ |
54 | hw/ssi/mss-spi.c | 8 ++++- | 50 | target/arm: Move arm_pamax out of line |
55 | hw/ssi/xilinx_spips.c | 43 +++++++++++++++------- | 51 | target/arm: Pass outputsize down to check_s2_mmu_setup |
56 | hw/timer/pl031.c | 92 +++++++++++++++++++++++++++++++++++++++++++++--- | 52 | target/arm: Use MAKE_64BIT_MASK to compute indexmask |
57 | target/arm/cpu.c | 16 +++++++++ | 53 | target/arm: Honor TCR_ELx.{I}PS |
58 | target/arm/m_helper.c | 21 ++++++++--- | 54 | target/arm: Prepare DBGBVR and DBGWVR for FEAT_LVA |
59 | 9 files changed, 174 insertions(+), 26 deletions(-) | 55 | target/arm: Implement FEAT_LVA |
56 | target/arm: Implement FEAT_LPA | ||
57 | target/arm: Extend arm_fi_to_lfsc to level -1 | ||
58 | target/arm: Introduce tlbi_aa64_get_range | ||
59 | target/arm: Fix TLBIRange.base for 16k and 64k pages | ||
60 | target/arm: Validate tlbi TG matches translation granule in use | ||
61 | target/arm: Advertise all page sizes for -cpu max | ||
62 | target/arm: Implement FEAT_LPA2 | ||
60 | 63 | ||
64 | Shengtan Mao (1): | ||
65 | tests/qtest: add qtests for npcm7xx sdhci | ||
66 | |||
67 | Wentao_Liang (1): | ||
68 | target/arm: Fix early free of TCG temp in handle_simd_shift_fpint_conv() | ||
69 | |||
70 | docs/system/arm/emulation.rst | 3 + | ||
71 | include/hw/registerfields.h | 48 +++++- | ||
72 | target/arm/cpu-param.h | 4 +- | ||
73 | target/arm/cpu.h | 27 ++++ | ||
74 | target/arm/internals.h | 58 ++++--- | ||
75 | target/arm/kvm-consts.h | 14 +- | ||
76 | hw/arm/boot.c | 11 +- | ||
77 | hw/arm/mps2-tz.c | 6 +- | ||
78 | hw/i2c/i2c_mux_pca954x.c | 77 ++------- | ||
79 | hw/input/tsc210x.c | 8 +- | ||
80 | target/arm/cpu.c | 8 +- | ||
81 | target/arm/cpu64.c | 7 +- | ||
82 | target/arm/helper.c | 332 ++++++++++++++++++++++++++++++--------- | ||
83 | target/arm/hvf/hvf.c | 27 +++- | ||
84 | target/arm/kvm64.c | 14 +- | ||
85 | target/arm/psci.c | 35 ++++- | ||
86 | target/arm/translate-a64.c | 2 +- | ||
87 | tests/qtest/npcm7xx_sdhci-test.c | 215 +++++++++++++++++++++++++ | ||
88 | tests/qtest/meson.build | 1 + | ||
89 | ui/cocoa.m | 31 ++-- | ||
90 | 20 files changed, 736 insertions(+), 192 deletions(-) | ||
91 | create mode 100644 tests/qtest/npcm7xx_sdhci-test.c | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Jimmy Brisson <jimmy.brisson@linaro.org> | ||
1 | 2 | ||
3 | With these interfaces missing, TFM would delegate peripherals 0, 1, | ||
4 | 2, 3 and 8, and qemu would ignore the delegation of interface 8, as | ||
5 | it thought interface 4 was eth & USB. | ||
6 | |||
7 | This patch corrects this behavior and allows TFM to delegate the | ||
8 | eth & USB peripheral to NS mode. | ||
9 | |||
10 | (The old QEMU behaviour was based on revision B of the AN547 | ||
11 | appnote; revision C corrects this error in the documentation, | ||
12 | and this commit brings QEMU in to line with how the FPGA | ||
13 | image really behaves.) | ||
14 | |||
15 | Signed-off-by: Jimmy Brisson <jimmy.brisson@linaro.org> | ||
16 | Message-id: 20220210210227.3203883-1-jimmy.brisson@linaro.org | ||
17 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
18 | [PMM: added commit message note clarifying that the old behaviour | ||
19 | was a docs issue, not because there were two different versions | ||
20 | of the FPGA image] | ||
21 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
22 | --- | ||
23 | hw/arm/mps2-tz.c | 4 ++++ | ||
24 | 1 file changed, 4 insertions(+) | ||
25 | |||
26 | diff --git a/hw/arm/mps2-tz.c b/hw/arm/mps2-tz.c | ||
27 | index XXXXXXX..XXXXXXX 100644 | ||
28 | --- a/hw/arm/mps2-tz.c | ||
29 | +++ b/hw/arm/mps2-tz.c | ||
30 | @@ -XXX,XX +XXX,XX @@ static void mps2tz_common_init(MachineState *machine) | ||
31 | { "gpio1", make_unimp_dev, &mms->gpio[1], 0x41101000, 0x1000 }, | ||
32 | { "gpio2", make_unimp_dev, &mms->gpio[2], 0x41102000, 0x1000 }, | ||
33 | { "gpio3", make_unimp_dev, &mms->gpio[3], 0x41103000, 0x1000 }, | ||
34 | + { /* port 4 USER AHB interface 0 */ }, | ||
35 | + { /* port 5 USER AHB interface 1 */ }, | ||
36 | + { /* port 6 USER AHB interface 2 */ }, | ||
37 | + { /* port 7 USER AHB interface 3 */ }, | ||
38 | { "eth-usb", make_eth_usb, NULL, 0x41400000, 0x200000, { 49 } }, | ||
39 | }, | ||
40 | }, | ||
41 | -- | ||
42 | 2.25.1 | diff view generated by jsdifflib |
1 | In the M-profile architecture, when we do a vector table fetch and it | 1 | The AN547 application note URL has changed: update our comment |
---|---|---|---|
2 | fails, we need to report a HardFault. Whether this is a Secure HF or | 2 | accordingly. (Rev B is still downloadable from the old URL, |
3 | a NonSecure HF depends on several things. If AIRCR.BFHFNMINS is 0 | 3 | but there is a new Rev C of the document now.) |
4 | then HF is always Secure, because there is no NonSecure HardFault. | ||
5 | Otherwise, the answer depends on whether the 'underlying exception' | ||
6 | (MemManage, BusFault, SecureFault) targets Secure or NonSecure. (In | ||
7 | the pseudocode, this is handled in the Vector() function: the final | ||
8 | exc.isSecure is calculated by looking at the exc.isSecure from the | ||
9 | exception returned from the memory access, not the isSecure input | ||
10 | argument.) | ||
11 | |||
12 | We weren't doing this correctly, because we were looking at | ||
13 | the target security domain of the exception we were trying to | ||
14 | load the vector table entry for. This produces errors of two kinds: | ||
15 | * a load from the NS vector table which hits the "NS access | ||
16 | to S memory" SecureFault should end up as a Secure HardFault, | ||
17 | but we were raising an NS HardFault | ||
18 | * a load from the S vector table which causes a BusFault | ||
19 | should raise an NS HardFault if BFHFNMINS == 1 (because | ||
20 | in that case all BusFaults are NonSecure), but we were raising | ||
21 | a Secure HardFault | ||
22 | |||
23 | Correct the logic. | ||
24 | |||
25 | We also fix a comment error where we claimed that we might | ||
26 | be escalating MemManage to HardFault, and forgot about SecureFault. | ||
27 | (Vector loads can never hit MPU access faults, because they're | ||
28 | always aligned and always use the default address map.) | ||
29 | 4 | ||
30 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
31 | Message-id: 20190705094823.28905-1-peter.maydell@linaro.org | 6 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
7 | Tested-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
8 | Message-id: 20220221094144.426191-1-peter.maydell@linaro.org | ||
32 | --- | 9 | --- |
33 | target/arm/m_helper.c | 21 +++++++++++++++++---- | 10 | hw/arm/mps2-tz.c | 2 +- |
34 | 1 file changed, 17 insertions(+), 4 deletions(-) | 11 | 1 file changed, 1 insertion(+), 1 deletion(-) |
35 | 12 | ||
36 | diff --git a/target/arm/m_helper.c b/target/arm/m_helper.c | 13 | diff --git a/hw/arm/mps2-tz.c b/hw/arm/mps2-tz.c |
37 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
38 | --- a/target/arm/m_helper.c | 15 | --- a/hw/arm/mps2-tz.c |
39 | +++ b/target/arm/m_helper.c | 16 | +++ b/hw/arm/mps2-tz.c |
40 | @@ -XXX,XX +XXX,XX @@ static bool arm_v7m_load_vector(ARMCPU *cpu, int exc, bool targets_secure, | 17 | @@ -XXX,XX +XXX,XX @@ |
41 | if (sattrs.ns) { | 18 | * Application Note AN524: |
42 | attrs.secure = false; | 19 | * https://developer.arm.com/documentation/dai0524/latest/ |
43 | } else if (!targets_secure) { | 20 | * Application Note AN547: |
44 | - /* NS access to S memory */ | 21 | - * https://developer.arm.com/-/media/Arm%20Developer%20Community/PDF/DAI0547B_SSE300_PLUS_U55_FPGA_for_mps3.pdf |
45 | + /* | 22 | + * https://developer.arm.com/documentation/dai0547/latest/ |
46 | + * NS access to S memory: the underlying exception which we escalate | 23 | * |
47 | + * to HardFault is SecureFault, which always targets Secure. | 24 | * The AN505 defers to the Cortex-M33 processor ARMv8M IoT Kit FVP User Guide |
48 | + */ | 25 | * (ARM ECM0601256) for the details of some of the device layout: |
49 | + exc_secure = true; | ||
50 | goto load_fail; | ||
51 | } | ||
52 | } | ||
53 | @@ -XXX,XX +XXX,XX @@ static bool arm_v7m_load_vector(ARMCPU *cpu, int exc, bool targets_secure, | ||
54 | vector_entry = address_space_ldl(arm_addressspace(cs, attrs), addr, | ||
55 | attrs, &result); | ||
56 | if (result != MEMTX_OK) { | ||
57 | + /* | ||
58 | + * Underlying exception is BusFault: its target security state | ||
59 | + * depends on BFHFNMINS. | ||
60 | + */ | ||
61 | + exc_secure = !(cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK); | ||
62 | goto load_fail; | ||
63 | } | ||
64 | *pvec = vector_entry; | ||
65 | @@ -XXX,XX +XXX,XX @@ load_fail: | ||
66 | /* | ||
67 | * All vector table fetch fails are reported as HardFault, with | ||
68 | * HFSR.VECTTBL and .FORCED set. (FORCED is set because | ||
69 | - * technically the underlying exception is a MemManage or BusFault | ||
70 | + * technically the underlying exception is a SecureFault or BusFault | ||
71 | * that is escalated to HardFault.) This is a terminal exception, | ||
72 | * so we will either take the HardFault immediately or else enter | ||
73 | * lockup (the latter case is handled in armv7m_nvic_set_pending_derived()). | ||
74 | + * The HardFault is Secure if BFHFNMINS is 0 (meaning that all HFs are | ||
75 | + * secure); otherwise it targets the same security state as the | ||
76 | + * underlying exception. | ||
77 | */ | ||
78 | - exc_secure = targets_secure || | ||
79 | - !(cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK); | ||
80 | + if (!(cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK)) { | ||
81 | + exc_secure = true; | ||
82 | + } | ||
83 | env->v7m.hfsr |= R_V7M_HFSR_VECTTBL_MASK | R_V7M_HFSR_FORCED_MASK; | ||
84 | armv7m_nvic_set_pending_derived(env->nvic, ARMV7M_EXCP_HARD, exc_secure); | ||
85 | return false; | ||
86 | -- | 26 | -- |
87 | 2.20.1 | 27 | 2.25.1 |
88 | 28 | ||
89 | 29 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | The tsc210x doesn't support anything other than 16-bit reads on the | ||
2 | SPI bus, but the guest can program the SPI controller to attempt | ||
3 | them anyway. If this happens, don't abort QEMU, just log this as | ||
4 | a guest error. | ||
1 | 5 | ||
6 | This fixes our machine_arm_n8x0.py:N8x0Machine.test_n800 | ||
7 | acceptance test, which hits this assertion. | ||
8 | |||
9 | The reason we hit the assertion is because the guest kernel thinks | ||
10 | there is a TSC2005 on this SPI bus address, not a TSC210x. (The n810 | ||
11 | *does* have a TSC2005 at this address.) The TSC2005 supports the | ||
12 | 24-bit accesses which the guest driver makes, and the TSC210x does | ||
13 | not (that is, our TSC210x emulation is not missing support for a word | ||
14 | width the hardware can handle). It's not clear whether the problem | ||
15 | here is that the guest kernel incorrectly thinks the n800 has the | ||
16 | same device at this SPI bus address as the n810, or that QEMU's n810 | ||
17 | board model doesn't get the SPI devices right. At this late date | ||
18 | there no longer appears to be any reliable information on the web | ||
19 | about the hardware behaviour, but I am inclined to think this is a | ||
20 | guest kernel bug. In any case, we prefer not to abort QEMU for | ||
21 | guest-triggerable conditions, so logging the error is the right thing | ||
22 | to do. | ||
23 | |||
24 | Resolves: https://gitlab.com/qemu-project/qemu/-/issues/736 | ||
25 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
26 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | ||
27 | Message-id: 20220221140750.514557-1-peter.maydell@linaro.org | ||
28 | --- | ||
29 | hw/input/tsc210x.c | 8 ++++++-- | ||
30 | 1 file changed, 6 insertions(+), 2 deletions(-) | ||
31 | |||
32 | diff --git a/hw/input/tsc210x.c b/hw/input/tsc210x.c | ||
33 | index XXXXXXX..XXXXXXX 100644 | ||
34 | --- a/hw/input/tsc210x.c | ||
35 | +++ b/hw/input/tsc210x.c | ||
36 | @@ -XXX,XX +XXX,XX @@ | ||
37 | #include "hw/hw.h" | ||
38 | #include "audio/audio.h" | ||
39 | #include "qemu/timer.h" | ||
40 | +#include "qemu/log.h" | ||
41 | #include "sysemu/reset.h" | ||
42 | #include "ui/console.h" | ||
43 | #include "hw/arm/omap.h" /* For I2SCodec */ | ||
44 | @@ -XXX,XX +XXX,XX @@ uint32_t tsc210x_txrx(void *opaque, uint32_t value, int len) | ||
45 | TSC210xState *s = opaque; | ||
46 | uint32_t ret = 0; | ||
47 | |||
48 | - if (len != 16) | ||
49 | - hw_error("%s: FIXME: bad SPI word width %i\n", __func__, len); | ||
50 | + if (len != 16) { | ||
51 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
52 | + "%s: bad SPI word width %i\n", __func__, len); | ||
53 | + return 0; | ||
54 | + } | ||
55 | |||
56 | /* TODO: sequential reads etc - how do we make sure the host doesn't | ||
57 | * unintentionally read out a conversion result from a register while | ||
58 | -- | ||
59 | 2.25.1 | ||
60 | |||
61 | diff view generated by jsdifflib |
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | 1 | From: Patrick Venture <venture@google.com> |
---|---|---|---|
2 | 2 | ||
3 | In the next commit we will implement the write_with_attrs() | 3 | Previously this device created N subdevices which each owned an i2c bus. |
4 | handler. To avoid using different APIs, convert the read() | 4 | Now this device simply owns the N i2c busses directly. |
5 | handler first. | ||
6 | 5 | ||
7 | Reviewed-by: Francisco Iglesias <frasse.iglesias@gmail.com> | 6 | Tested: Verified devices behind mux are still accessible via qmp and i2c |
8 | Tested-by: Francisco Iglesias <frasse.iglesias@gmail.com> | 7 | from within an arm32 SoC. |
9 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | 8 | |
9 | Reviewed-by: Hao Wu <wuhaotsh@google.com> | ||
10 | Signed-off-by: Patrick Venture <venture@google.com> | ||
11 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
12 | Tested-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
13 | Message-id: 20220202164533.1283668-1-venture@google.com | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 15 | --- |
12 | hw/ssi/xilinx_spips.c | 23 +++++++++++------------ | 16 | hw/i2c/i2c_mux_pca954x.c | 77 +++++++--------------------------------- |
13 | 1 file changed, 11 insertions(+), 12 deletions(-) | 17 | 1 file changed, 13 insertions(+), 64 deletions(-) |
14 | 18 | ||
15 | diff --git a/hw/ssi/xilinx_spips.c b/hw/ssi/xilinx_spips.c | 19 | diff --git a/hw/i2c/i2c_mux_pca954x.c b/hw/i2c/i2c_mux_pca954x.c |
16 | index XXXXXXX..XXXXXXX 100644 | 20 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/hw/ssi/xilinx_spips.c | 21 | --- a/hw/i2c/i2c_mux_pca954x.c |
18 | +++ b/hw/ssi/xilinx_spips.c | 22 | +++ b/hw/i2c/i2c_mux_pca954x.c |
19 | @@ -XXX,XX +XXX,XX @@ static void lqspi_load_cache(void *opaque, hwaddr addr) | 23 | @@ -XXX,XX +XXX,XX @@ |
24 | #define PCA9548_CHANNEL_COUNT 8 | ||
25 | #define PCA9546_CHANNEL_COUNT 4 | ||
26 | |||
27 | -/* | ||
28 | - * struct Pca954xChannel - The i2c mux device will have N of these states | ||
29 | - * that own the i2c channel bus. | ||
30 | - * @bus: The owned channel bus. | ||
31 | - * @enabled: Is this channel active? | ||
32 | - */ | ||
33 | -typedef struct Pca954xChannel { | ||
34 | - SysBusDevice parent; | ||
35 | - | ||
36 | - I2CBus *bus; | ||
37 | - | ||
38 | - bool enabled; | ||
39 | -} Pca954xChannel; | ||
40 | - | ||
41 | -#define TYPE_PCA954X_CHANNEL "pca954x-channel" | ||
42 | -#define PCA954X_CHANNEL(obj) \ | ||
43 | - OBJECT_CHECK(Pca954xChannel, (obj), TYPE_PCA954X_CHANNEL) | ||
44 | - | ||
45 | /* | ||
46 | * struct Pca954xState - The pca954x state object. | ||
47 | * @control: The value written to the mux control. | ||
48 | @@ -XXX,XX +XXX,XX @@ typedef struct Pca954xState { | ||
49 | |||
50 | uint8_t control; | ||
51 | |||
52 | - /* The channel i2c buses. */ | ||
53 | - Pca954xChannel channel[PCA9548_CHANNEL_COUNT]; | ||
54 | + bool enabled[PCA9548_CHANNEL_COUNT]; | ||
55 | + I2CBus *bus[PCA9548_CHANNEL_COUNT]; | ||
56 | } Pca954xState; | ||
57 | |||
58 | /* | ||
59 | @@ -XXX,XX +XXX,XX @@ static bool pca954x_match(I2CSlave *candidate, uint8_t address, | ||
60 | } | ||
61 | |||
62 | for (i = 0; i < mc->nchans; i++) { | ||
63 | - if (!mux->channel[i].enabled) { | ||
64 | + if (!mux->enabled[i]) { | ||
65 | continue; | ||
66 | } | ||
67 | |||
68 | - if (i2c_scan_bus(mux->channel[i].bus, address, broadcast, | ||
69 | + if (i2c_scan_bus(mux->bus[i], address, broadcast, | ||
70 | current_devs)) { | ||
71 | if (!broadcast) { | ||
72 | return true; | ||
73 | @@ -XXX,XX +XXX,XX @@ static void pca954x_enable_channel(Pca954xState *s, uint8_t enable_mask) | ||
74 | */ | ||
75 | for (i = 0; i < mc->nchans; i++) { | ||
76 | if (enable_mask & (1 << i)) { | ||
77 | - s->channel[i].enabled = true; | ||
78 | + s->enabled[i] = true; | ||
79 | } else { | ||
80 | - s->channel[i].enabled = false; | ||
81 | + s->enabled[i] = false; | ||
82 | } | ||
20 | } | 83 | } |
21 | } | 84 | } |
22 | 85 | @@ -XXX,XX +XXX,XX @@ I2CBus *pca954x_i2c_get_bus(I2CSlave *mux, uint8_t channel) | |
23 | -static uint64_t | 86 | Pca954xState *pca954x = PCA954X(mux); |
24 | -lqspi_read(void *opaque, hwaddr addr, unsigned int size) | 87 | |
25 | +static MemTxResult lqspi_read(void *opaque, hwaddr addr, uint64_t *value, | 88 | g_assert(channel < pc->nchans); |
26 | + unsigned size, MemTxAttrs attrs) | 89 | - return I2C_BUS(qdev_get_child_bus(DEVICE(&pca954x->channel[channel]), |
90 | - "i2c-bus")); | ||
91 | -} | ||
92 | - | ||
93 | -static void pca954x_channel_init(Object *obj) | ||
94 | -{ | ||
95 | - Pca954xChannel *s = PCA954X_CHANNEL(obj); | ||
96 | - s->bus = i2c_init_bus(DEVICE(s), "i2c-bus"); | ||
97 | - | ||
98 | - /* Start all channels as disabled. */ | ||
99 | - s->enabled = false; | ||
100 | -} | ||
101 | - | ||
102 | -static void pca954x_channel_class_init(ObjectClass *klass, void *data) | ||
103 | -{ | ||
104 | - DeviceClass *dc = DEVICE_CLASS(klass); | ||
105 | - dc->desc = "Pca954x Channel"; | ||
106 | + return pca954x->bus[channel]; | ||
107 | } | ||
108 | |||
109 | static void pca9546_class_init(ObjectClass *klass, void *data) | ||
110 | @@ -XXX,XX +XXX,XX @@ static void pca9548_class_init(ObjectClass *klass, void *data) | ||
111 | s->nchans = PCA9548_CHANNEL_COUNT; | ||
112 | } | ||
113 | |||
114 | -static void pca954x_realize(DeviceState *dev, Error **errp) | ||
115 | -{ | ||
116 | - Pca954xState *s = PCA954X(dev); | ||
117 | - Pca954xClass *c = PCA954X_GET_CLASS(s); | ||
118 | - int i; | ||
119 | - | ||
120 | - /* SMBus modules. Cannot fail. */ | ||
121 | - for (i = 0; i < c->nchans; i++) { | ||
122 | - sysbus_realize(SYS_BUS_DEVICE(&s->channel[i]), &error_abort); | ||
123 | - } | ||
124 | -} | ||
125 | - | ||
126 | static void pca954x_init(Object *obj) | ||
27 | { | 127 | { |
28 | - XilinxQSPIPS *q = opaque; | 128 | Pca954xState *s = PCA954X(obj); |
29 | - uint32_t ret; | 129 | Pca954xClass *c = PCA954X_GET_CLASS(obj); |
30 | + XilinxQSPIPS *q = XILINX_QSPIPS(opaque); | 130 | int i; |
31 | 131 | ||
32 | if (addr >= q->lqspi_cached_addr && | 132 | - /* Only initialize the children we expect. */ |
33 | addr <= q->lqspi_cached_addr + LQSPI_CACHE_SIZE - 4) { | 133 | + /* SMBus modules. Cannot fail. */ |
34 | uint8_t *retp = &q->lqspi_buf[addr - q->lqspi_cached_addr]; | 134 | for (i = 0; i < c->nchans; i++) { |
35 | - ret = cpu_to_le32(*(uint32_t *)retp); | 135 | - object_initialize_child(obj, "channel[*]", &s->channel[i], |
36 | - DB_PRINT_L(1, "addr: %08x, data: %08x\n", (unsigned)addr, | 136 | - TYPE_PCA954X_CHANNEL); |
37 | - (unsigned)ret); | 137 | + g_autofree gchar *bus_name = g_strdup_printf("i2c.%d", i); |
38 | - return ret; | 138 | + |
39 | - } else { | 139 | + /* start all channels as disabled. */ |
40 | - lqspi_load_cache(opaque, addr); | 140 | + s->enabled[i] = false; |
41 | - return lqspi_read(opaque, addr, size); | 141 | + s->bus[i] = i2c_init_bus(DEVICE(s), bus_name); |
42 | + *value = cpu_to_le32(*(uint32_t *)retp); | ||
43 | + DB_PRINT_L(1, "addr: %08" HWADDR_PRIx ", data: %08" PRIx64 "\n", | ||
44 | + addr, *value); | ||
45 | + return MEMTX_OK; | ||
46 | } | 142 | } |
47 | + | ||
48 | + lqspi_load_cache(opaque, addr); | ||
49 | + return lqspi_read(opaque, addr, value, size, attrs); | ||
50 | } | 143 | } |
51 | 144 | ||
52 | static const MemoryRegionOps lqspi_ops = { | 145 | @@ -XXX,XX +XXX,XX @@ static void pca954x_class_init(ObjectClass *klass, void *data) |
53 | - .read = lqspi_read, | 146 | rc->phases.enter = pca954x_enter_reset; |
54 | + .read_with_attrs = lqspi_read, | 147 | |
55 | .endianness = DEVICE_NATIVE_ENDIAN, | 148 | dc->desc = "Pca954x i2c-mux"; |
56 | .valid = { | 149 | - dc->realize = pca954x_realize; |
57 | .min_access_size = 1, | 150 | |
151 | k->write_data = pca954x_write_data; | ||
152 | k->receive_byte = pca954x_read_byte; | ||
153 | @@ -XXX,XX +XXX,XX @@ static const TypeInfo pca954x_info[] = { | ||
154 | .parent = TYPE_PCA954X, | ||
155 | .class_init = pca9548_class_init, | ||
156 | }, | ||
157 | - { | ||
158 | - .name = TYPE_PCA954X_CHANNEL, | ||
159 | - .parent = TYPE_SYS_BUS_DEVICE, | ||
160 | - .class_init = pca954x_channel_class_init, | ||
161 | - .instance_size = sizeof(Pca954xChannel), | ||
162 | - .instance_init = pca954x_channel_init, | ||
163 | - } | ||
164 | }; | ||
165 | |||
166 | DEFINE_TYPES(pca954x_info) | ||
58 | -- | 167 | -- |
59 | 2.20.1 | 168 | 2.25.1 |
60 | 169 | ||
61 | 170 | diff view generated by jsdifflib |
1 | The ARMv5 architecture didn't specify detailed per-feature ID | 1 | From: Akihiko Odaki <akihiko.odaki@gmail.com> |
---|---|---|---|
2 | registers. Now that we're using the MVFR0 register fields to | ||
3 | gate the existence of VFP instructions, we need to set up | ||
4 | the correct values in the cpu->isar structure so that we still | ||
5 | provide an FPU to the guest. | ||
6 | 2 | ||
7 | This fixes a regression in the arm926 and arm1026 CPUs, which | 3 | Support the latest PSCI on TCG and HVF. A 64-bit function called from |
8 | are the only ones that both have VFP and are ARMv5 or earlier. | 4 | AArch32 now returns NOT_SUPPORTED, which is necessary to adhere to SMC |
9 | This regression was introduced by the VFP refactoring, and more | 5 | Calling Convention 1.0. It is still not compliant with SMCCC 1.3 since |
10 | specifically by commits 1120827fa182f0e76 and 266bd25c485597c, | 6 | they do not implement mandatory functions. |
11 | which accidentally disabled VFP short-vector support and | ||
12 | double-precision support on these CPUs. | ||
13 | 7 | ||
14 | Fixes: 1120827fa182f0e | 8 | Signed-off-by: Akihiko Odaki <akihiko.odaki@gmail.com> |
15 | Fixes: 266bd25c485597c | 9 | Message-id: 20220213035753.34577-1-akihiko.odaki@gmail.com |
16 | Fixes: https://bugs.launchpad.net/qemu/+bug/1836192 | 10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
17 | Reported-by: Christophe Lyon <christophe.lyon@linaro.org> | 11 | [PMM: update MISMATCH_CHECK checks on PSCI_VERSION macros to match] |
18 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
19 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
20 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | ||
21 | Tested-by: Christophe Lyon <christophe.lyon@linaro.org> | ||
22 | Message-id: 20190711131241.22231-1-peter.maydell@linaro.org | ||
23 | --- | 13 | --- |
24 | target/arm/cpu.c | 12 ++++++++++++ | 14 | target/arm/kvm-consts.h | 13 +++++++++---- |
25 | 1 file changed, 12 insertions(+) | 15 | hw/arm/boot.c | 12 +++++++++--- |
16 | target/arm/cpu.c | 5 +++-- | ||
17 | target/arm/hvf/hvf.c | 27 ++++++++++++++++++++++++++- | ||
18 | target/arm/kvm64.c | 2 +- | ||
19 | target/arm/psci.c | 35 ++++++++++++++++++++++++++++++++--- | ||
20 | 6 files changed, 80 insertions(+), 14 deletions(-) | ||
26 | 21 | ||
22 | diff --git a/target/arm/kvm-consts.h b/target/arm/kvm-consts.h | ||
23 | index XXXXXXX..XXXXXXX 100644 | ||
24 | --- a/target/arm/kvm-consts.h | ||
25 | +++ b/target/arm/kvm-consts.h | ||
26 | @@ -XXX,XX +XXX,XX @@ MISMATCH_CHECK(QEMU_PSCI_0_1_FN_MIGRATE, KVM_PSCI_FN_MIGRATE); | ||
27 | #define QEMU_PSCI_0_2_FN64_AFFINITY_INFO QEMU_PSCI_0_2_FN64(4) | ||
28 | #define QEMU_PSCI_0_2_FN64_MIGRATE QEMU_PSCI_0_2_FN64(5) | ||
29 | |||
30 | +#define QEMU_PSCI_1_0_FN_PSCI_FEATURES QEMU_PSCI_0_2_FN(10) | ||
31 | + | ||
32 | MISMATCH_CHECK(QEMU_PSCI_0_2_FN_CPU_SUSPEND, PSCI_0_2_FN_CPU_SUSPEND); | ||
33 | MISMATCH_CHECK(QEMU_PSCI_0_2_FN_CPU_OFF, PSCI_0_2_FN_CPU_OFF); | ||
34 | MISMATCH_CHECK(QEMU_PSCI_0_2_FN_CPU_ON, PSCI_0_2_FN_CPU_ON); | ||
35 | @@ -XXX,XX +XXX,XX @@ MISMATCH_CHECK(QEMU_PSCI_0_2_FN_MIGRATE, PSCI_0_2_FN_MIGRATE); | ||
36 | MISMATCH_CHECK(QEMU_PSCI_0_2_FN64_CPU_SUSPEND, PSCI_0_2_FN64_CPU_SUSPEND); | ||
37 | MISMATCH_CHECK(QEMU_PSCI_0_2_FN64_CPU_ON, PSCI_0_2_FN64_CPU_ON); | ||
38 | MISMATCH_CHECK(QEMU_PSCI_0_2_FN64_MIGRATE, PSCI_0_2_FN64_MIGRATE); | ||
39 | +MISMATCH_CHECK(QEMU_PSCI_1_0_FN_PSCI_FEATURES, PSCI_1_0_FN_PSCI_FEATURES); | ||
40 | |||
41 | /* PSCI v0.2 return values used by TCG emulation of PSCI */ | ||
42 | |||
43 | /* No Trusted OS migration to worry about when offlining CPUs */ | ||
44 | #define QEMU_PSCI_0_2_RET_TOS_MIGRATION_NOT_REQUIRED 2 | ||
45 | |||
46 | -/* We implement version 0.2 only */ | ||
47 | -#define QEMU_PSCI_0_2_RET_VERSION_0_2 2 | ||
48 | +#define QEMU_PSCI_VERSION_0_1 0x00001 | ||
49 | +#define QEMU_PSCI_VERSION_0_2 0x00002 | ||
50 | +#define QEMU_PSCI_VERSION_1_1 0x10001 | ||
51 | |||
52 | MISMATCH_CHECK(QEMU_PSCI_0_2_RET_TOS_MIGRATION_NOT_REQUIRED, PSCI_0_2_TOS_MP); | ||
53 | -MISMATCH_CHECK(QEMU_PSCI_0_2_RET_VERSION_0_2, | ||
54 | - (PSCI_VERSION_MAJOR(0) | PSCI_VERSION_MINOR(2))); | ||
55 | +/* We don't bother to check every possible version value */ | ||
56 | +MISMATCH_CHECK(QEMU_PSCI_VERSION_0_2, PSCI_VERSION(0, 2)); | ||
57 | +MISMATCH_CHECK(QEMU_PSCI_VERSION_1_1, PSCI_VERSION(1, 1)); | ||
58 | |||
59 | /* PSCI return values (inclusive of all PSCI versions) */ | ||
60 | #define QEMU_PSCI_RET_SUCCESS 0 | ||
61 | diff --git a/hw/arm/boot.c b/hw/arm/boot.c | ||
62 | index XXXXXXX..XXXXXXX 100644 | ||
63 | --- a/hw/arm/boot.c | ||
64 | +++ b/hw/arm/boot.c | ||
65 | @@ -XXX,XX +XXX,XX @@ static void fdt_add_psci_node(void *fdt) | ||
66 | } | ||
67 | |||
68 | qemu_fdt_add_subnode(fdt, "/psci"); | ||
69 | - if (armcpu->psci_version == 2) { | ||
70 | - const char comp[] = "arm,psci-0.2\0arm,psci"; | ||
71 | - qemu_fdt_setprop(fdt, "/psci", "compatible", comp, sizeof(comp)); | ||
72 | + if (armcpu->psci_version == QEMU_PSCI_VERSION_0_2 || | ||
73 | + armcpu->psci_version == QEMU_PSCI_VERSION_1_1) { | ||
74 | + if (armcpu->psci_version == QEMU_PSCI_VERSION_0_2) { | ||
75 | + const char comp[] = "arm,psci-0.2\0arm,psci"; | ||
76 | + qemu_fdt_setprop(fdt, "/psci", "compatible", comp, sizeof(comp)); | ||
77 | + } else { | ||
78 | + const char comp[] = "arm,psci-1.0\0arm,psci-0.2\0arm,psci"; | ||
79 | + qemu_fdt_setprop(fdt, "/psci", "compatible", comp, sizeof(comp)); | ||
80 | + } | ||
81 | |||
82 | cpu_off_fn = QEMU_PSCI_0_2_FN_CPU_OFF; | ||
83 | if (arm_feature(&armcpu->env, ARM_FEATURE_AARCH64)) { | ||
27 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | 84 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c |
28 | index XXXXXXX..XXXXXXX 100644 | 85 | index XXXXXXX..XXXXXXX 100644 |
29 | --- a/target/arm/cpu.c | 86 | --- a/target/arm/cpu.c |
30 | +++ b/target/arm/cpu.c | 87 | +++ b/target/arm/cpu.c |
31 | @@ -XXX,XX +XXX,XX @@ static void arm926_initfn(Object *obj) | 88 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_initfn(Object *obj) |
32 | * set the field to indicate Jazelle support within QEMU. | 89 | * picky DTB consumer will also provide a helpful error message. |
33 | */ | 90 | */ |
34 | cpu->isar.id_isar1 = FIELD_DP32(cpu->isar.id_isar1, ID_ISAR1, JAZELLE, 1); | 91 | cpu->dtb_compatible = "qemu,unknown"; |
35 | + /* | 92 | - cpu->psci_version = 1; /* By default assume PSCI v0.1 */ |
36 | + * Similarly, we need to set MVFR0 fields to enable double precision | 93 | + cpu->psci_version = QEMU_PSCI_VERSION_0_1; /* By default assume PSCI v0.1 */ |
37 | + * and short vector support even though ARMv5 doesn't have this register. | 94 | cpu->kvm_target = QEMU_KVM_ARM_TARGET_NONE; |
38 | + */ | 95 | |
39 | + cpu->isar.mvfr0 = FIELD_DP32(cpu->isar.mvfr0, MVFR0, FPSHVEC, 1); | 96 | if (tcg_enabled() || hvf_enabled()) { |
40 | + cpu->isar.mvfr0 = FIELD_DP32(cpu->isar.mvfr0, MVFR0, FPDP, 1); | 97 | - cpu->psci_version = 2; /* TCG and HVF implement PSCI 0.2 */ |
98 | + /* TCG and HVF implement PSCI 1.1 */ | ||
99 | + cpu->psci_version = QEMU_PSCI_VERSION_1_1; | ||
100 | } | ||
41 | } | 101 | } |
42 | 102 | ||
43 | static void arm946_initfn(Object *obj) | 103 | diff --git a/target/arm/hvf/hvf.c b/target/arm/hvf/hvf.c |
44 | @@ -XXX,XX +XXX,XX @@ static void arm1026_initfn(Object *obj) | 104 | index XXXXXXX..XXXXXXX 100644 |
45 | * set the field to indicate Jazelle support within QEMU. | 105 | --- a/target/arm/hvf/hvf.c |
46 | */ | 106 | +++ b/target/arm/hvf/hvf.c |
47 | cpu->isar.id_isar1 = FIELD_DP32(cpu->isar.id_isar1, ID_ISAR1, JAZELLE, 1); | 107 | @@ -XXX,XX +XXX,XX @@ static bool hvf_handle_psci_call(CPUState *cpu) |
48 | + /* | 108 | |
49 | + * Similarly, we need to set MVFR0 fields to enable double precision | 109 | switch (param[0]) { |
50 | + * and short vector support even though ARMv5 doesn't have this register. | 110 | case QEMU_PSCI_0_2_FN_PSCI_VERSION: |
51 | + */ | 111 | - ret = QEMU_PSCI_0_2_RET_VERSION_0_2; |
52 | + cpu->isar.mvfr0 = FIELD_DP32(cpu->isar.mvfr0, MVFR0, FPSHVEC, 1); | 112 | + ret = QEMU_PSCI_VERSION_1_1; |
53 | + cpu->isar.mvfr0 = FIELD_DP32(cpu->isar.mvfr0, MVFR0, FPDP, 1); | 113 | break; |
54 | 114 | case QEMU_PSCI_0_2_FN_MIGRATE_INFO_TYPE: | |
55 | { | 115 | ret = QEMU_PSCI_0_2_RET_TOS_MIGRATION_NOT_REQUIRED; /* No trusted OS */ |
56 | /* The 1026 had an IFAR at c6,c0,0,1 rather than the ARMv6 c6,c0,0,2 */ | 116 | @@ -XXX,XX +XXX,XX @@ static bool hvf_handle_psci_call(CPUState *cpu) |
117 | case QEMU_PSCI_0_2_FN_MIGRATE: | ||
118 | ret = QEMU_PSCI_RET_NOT_SUPPORTED; | ||
119 | break; | ||
120 | + case QEMU_PSCI_1_0_FN_PSCI_FEATURES: | ||
121 | + switch (param[1]) { | ||
122 | + case QEMU_PSCI_0_2_FN_PSCI_VERSION: | ||
123 | + case QEMU_PSCI_0_2_FN_MIGRATE_INFO_TYPE: | ||
124 | + case QEMU_PSCI_0_2_FN_AFFINITY_INFO: | ||
125 | + case QEMU_PSCI_0_2_FN64_AFFINITY_INFO: | ||
126 | + case QEMU_PSCI_0_2_FN_SYSTEM_RESET: | ||
127 | + case QEMU_PSCI_0_2_FN_SYSTEM_OFF: | ||
128 | + case QEMU_PSCI_0_1_FN_CPU_ON: | ||
129 | + case QEMU_PSCI_0_2_FN_CPU_ON: | ||
130 | + case QEMU_PSCI_0_2_FN64_CPU_ON: | ||
131 | + case QEMU_PSCI_0_1_FN_CPU_OFF: | ||
132 | + case QEMU_PSCI_0_2_FN_CPU_OFF: | ||
133 | + case QEMU_PSCI_0_1_FN_CPU_SUSPEND: | ||
134 | + case QEMU_PSCI_0_2_FN_CPU_SUSPEND: | ||
135 | + case QEMU_PSCI_0_2_FN64_CPU_SUSPEND: | ||
136 | + case QEMU_PSCI_1_0_FN_PSCI_FEATURES: | ||
137 | + ret = 0; | ||
138 | + break; | ||
139 | + case QEMU_PSCI_0_1_FN_MIGRATE: | ||
140 | + case QEMU_PSCI_0_2_FN_MIGRATE: | ||
141 | + default: | ||
142 | + ret = QEMU_PSCI_RET_NOT_SUPPORTED; | ||
143 | + } | ||
144 | + break; | ||
145 | default: | ||
146 | return false; | ||
147 | } | ||
148 | diff --git a/target/arm/kvm64.c b/target/arm/kvm64.c | ||
149 | index XXXXXXX..XXXXXXX 100644 | ||
150 | --- a/target/arm/kvm64.c | ||
151 | +++ b/target/arm/kvm64.c | ||
152 | @@ -XXX,XX +XXX,XX @@ int kvm_arch_init_vcpu(CPUState *cs) | ||
153 | cpu->kvm_init_features[0] |= 1 << KVM_ARM_VCPU_POWER_OFF; | ||
154 | } | ||
155 | if (kvm_check_extension(cs->kvm_state, KVM_CAP_ARM_PSCI_0_2)) { | ||
156 | - cpu->psci_version = 2; | ||
157 | + cpu->psci_version = QEMU_PSCI_VERSION_0_2; | ||
158 | cpu->kvm_init_features[0] |= 1 << KVM_ARM_VCPU_PSCI_0_2; | ||
159 | } | ||
160 | if (!arm_feature(&cpu->env, ARM_FEATURE_AARCH64)) { | ||
161 | diff --git a/target/arm/psci.c b/target/arm/psci.c | ||
162 | index XXXXXXX..XXXXXXX 100644 | ||
163 | --- a/target/arm/psci.c | ||
164 | +++ b/target/arm/psci.c | ||
165 | @@ -XXX,XX +XXX,XX @@ void arm_handle_psci_call(ARMCPU *cpu) | ||
166 | { | ||
167 | /* | ||
168 | * This function partially implements the logic for dispatching Power State | ||
169 | - * Coordination Interface (PSCI) calls (as described in ARM DEN 0022B.b), | ||
170 | + * Coordination Interface (PSCI) calls (as described in ARM DEN 0022D.b), | ||
171 | * to the extent required for bringing up and taking down secondary cores, | ||
172 | * and for handling reset and poweroff requests. | ||
173 | * Additional information about the calling convention used is available in | ||
174 | @@ -XXX,XX +XXX,XX @@ void arm_handle_psci_call(ARMCPU *cpu) | ||
175 | } | ||
176 | |||
177 | if ((param[0] & QEMU_PSCI_0_2_64BIT) && !is_a64(env)) { | ||
178 | - ret = QEMU_PSCI_RET_INVALID_PARAMS; | ||
179 | + ret = QEMU_PSCI_RET_NOT_SUPPORTED; | ||
180 | goto err; | ||
181 | } | ||
182 | |||
183 | @@ -XXX,XX +XXX,XX @@ void arm_handle_psci_call(ARMCPU *cpu) | ||
184 | ARMCPU *target_cpu; | ||
185 | |||
186 | case QEMU_PSCI_0_2_FN_PSCI_VERSION: | ||
187 | - ret = QEMU_PSCI_0_2_RET_VERSION_0_2; | ||
188 | + ret = QEMU_PSCI_VERSION_1_1; | ||
189 | break; | ||
190 | case QEMU_PSCI_0_2_FN_MIGRATE_INFO_TYPE: | ||
191 | ret = QEMU_PSCI_0_2_RET_TOS_MIGRATION_NOT_REQUIRED; /* No trusted OS */ | ||
192 | @@ -XXX,XX +XXX,XX @@ void arm_handle_psci_call(ARMCPU *cpu) | ||
193 | } | ||
194 | helper_wfi(env, 4); | ||
195 | break; | ||
196 | + case QEMU_PSCI_1_0_FN_PSCI_FEATURES: | ||
197 | + switch (param[1]) { | ||
198 | + case QEMU_PSCI_0_2_FN_PSCI_VERSION: | ||
199 | + case QEMU_PSCI_0_2_FN_MIGRATE_INFO_TYPE: | ||
200 | + case QEMU_PSCI_0_2_FN_AFFINITY_INFO: | ||
201 | + case QEMU_PSCI_0_2_FN64_AFFINITY_INFO: | ||
202 | + case QEMU_PSCI_0_2_FN_SYSTEM_RESET: | ||
203 | + case QEMU_PSCI_0_2_FN_SYSTEM_OFF: | ||
204 | + case QEMU_PSCI_0_1_FN_CPU_ON: | ||
205 | + case QEMU_PSCI_0_2_FN_CPU_ON: | ||
206 | + case QEMU_PSCI_0_2_FN64_CPU_ON: | ||
207 | + case QEMU_PSCI_0_1_FN_CPU_OFF: | ||
208 | + case QEMU_PSCI_0_2_FN_CPU_OFF: | ||
209 | + case QEMU_PSCI_0_1_FN_CPU_SUSPEND: | ||
210 | + case QEMU_PSCI_0_2_FN_CPU_SUSPEND: | ||
211 | + case QEMU_PSCI_0_2_FN64_CPU_SUSPEND: | ||
212 | + case QEMU_PSCI_1_0_FN_PSCI_FEATURES: | ||
213 | + if (!(param[1] & QEMU_PSCI_0_2_64BIT) || is_a64(env)) { | ||
214 | + ret = 0; | ||
215 | + break; | ||
216 | + } | ||
217 | + /* fallthrough */ | ||
218 | + case QEMU_PSCI_0_1_FN_MIGRATE: | ||
219 | + case QEMU_PSCI_0_2_FN_MIGRATE: | ||
220 | + default: | ||
221 | + ret = QEMU_PSCI_RET_NOT_SUPPORTED; | ||
222 | + break; | ||
223 | + } | ||
224 | + break; | ||
225 | case QEMU_PSCI_0_1_FN_MIGRATE: | ||
226 | case QEMU_PSCI_0_2_FN_MIGRATE: | ||
227 | default: | ||
57 | -- | 228 | -- |
58 | 2.20.1 | 229 | 2.25.1 |
59 | |||
60 | diff view generated by jsdifflib |
1 | From: David Engraf <david.engraf@sysgo.com> | 1 | From: Wentao_Liang <Wentao_Liang_g@163.com> |
---|---|---|---|
2 | 2 | ||
3 | Using the whole 128 MiB flash in non-secure mode is not working because | 3 | handle_simd_shift_fpint_conv() was accidentally freeing the TCG |
4 | virt_flash_fdt() expects the same address for secure_sysmem and sysmem. | 4 | temporary tcg_fpstatus too early, before the last use of it. Move |
5 | This is not correctly handled by caller because it forwards NULL for | 5 | the free down to where it belongs. |
6 | secure_sysmem in non-secure flash mode. | ||
7 | 6 | ||
8 | Fixed by using sysmem when secure_sysmem is NULL. | 7 | Signed-off-by: Wentao_Liang <Wentao_Liang_g@163.com> |
9 | 8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | |
10 | Signed-off-by: David Engraf <david.engraf@sysgo.com> | 9 | [PMM: cleaned up commit message] |
11 | Message-id: 20190712075002.14326-1-david.engraf@sysgo.com | ||
12 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
14 | --- | 11 | --- |
15 | hw/arm/virt.c | 2 +- | 12 | target/arm/translate-a64.c | 2 +- |
16 | 1 file changed, 1 insertion(+), 1 deletion(-) | 13 | 1 file changed, 1 insertion(+), 1 deletion(-) |
17 | 14 | ||
18 | diff --git a/hw/arm/virt.c b/hw/arm/virt.c | 15 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c |
19 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
20 | --- a/hw/arm/virt.c | 17 | --- a/target/arm/translate-a64.c |
21 | +++ b/hw/arm/virt.c | 18 | +++ b/target/arm/translate-a64.c |
22 | @@ -XXX,XX +XXX,XX @@ static void machvirt_init(MachineState *machine) | 19 | @@ -XXX,XX +XXX,XX @@ static void handle_simd_shift_fpint_conv(DisasContext *s, bool is_scalar, |
23 | &machine->device_memory->mr); | 20 | } |
24 | } | 21 | } |
25 | 22 | ||
26 | - virt_flash_fdt(vms, sysmem, secure_sysmem); | 23 | - tcg_temp_free_ptr(tcg_fpstatus); |
27 | + virt_flash_fdt(vms, sysmem, secure_sysmem ?: sysmem); | 24 | tcg_temp_free_i32(tcg_shift); |
28 | 25 | gen_helper_set_rmode(tcg_rmode, tcg_rmode, tcg_fpstatus); | |
29 | create_gic(vms, pic); | 26 | + tcg_temp_free_ptr(tcg_fpstatus); |
27 | tcg_temp_free_i32(tcg_rmode); | ||
28 | } | ||
30 | 29 | ||
31 | -- | 30 | -- |
32 | 2.20.1 | 31 | 2.25.1 |
33 | |||
34 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Shengtan Mao <stmao@google.com> | ||
1 | 2 | ||
3 | Reviewed-by: Hao Wu <wuhaotsh@google.com> | ||
4 | Reviewed-by: Chris Rauer <crauer@google.com> | ||
5 | Signed-off-by: Shengtan Mao <stmao@google.com> | ||
6 | Signed-off-by: Patrick Venture <venture@google.com> | ||
7 | Message-id: 20220225174451.192304-1-wuhaotsh@google.com | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | --- | ||
10 | tests/qtest/npcm7xx_sdhci-test.c | 215 +++++++++++++++++++++++++++++++ | ||
11 | tests/qtest/meson.build | 1 + | ||
12 | 2 files changed, 216 insertions(+) | ||
13 | create mode 100644 tests/qtest/npcm7xx_sdhci-test.c | ||
14 | |||
15 | diff --git a/tests/qtest/npcm7xx_sdhci-test.c b/tests/qtest/npcm7xx_sdhci-test.c | ||
16 | new file mode 100644 | ||
17 | index XXXXXXX..XXXXXXX | ||
18 | --- /dev/null | ||
19 | +++ b/tests/qtest/npcm7xx_sdhci-test.c | ||
20 | @@ -XXX,XX +XXX,XX @@ | ||
21 | +/* | ||
22 | + * QTests for NPCM7xx SD-3.0 / MMC-4.51 Host Controller | ||
23 | + * | ||
24 | + * Copyright (c) 2022 Google LLC | ||
25 | + * | ||
26 | + * This program is free software; you can redistribute it and/or modify it | ||
27 | + * under the terms of the GNU General Public License as published by the | ||
28 | + * Free Software Foundation; either version 2 of the License, or | ||
29 | + * (at your option) any later version. | ||
30 | + * | ||
31 | + * This program is distributed in the hope that it will be useful, but WITHOUT | ||
32 | + * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or | ||
33 | + * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License | ||
34 | + * for more details. | ||
35 | + */ | ||
36 | + | ||
37 | +#include "qemu/osdep.h" | ||
38 | +#include "hw/sd/npcm7xx_sdhci.h" | ||
39 | + | ||
40 | +#include "libqos/libqtest.h" | ||
41 | +#include "libqtest-single.h" | ||
42 | +#include "libqos/sdhci-cmd.h" | ||
43 | + | ||
44 | +#define NPCM7XX_REG_SIZE 0x100 | ||
45 | +#define NPCM7XX_MMC_BA 0xF0842000 | ||
46 | +#define NPCM7XX_BLK_SIZE 512 | ||
47 | +#define NPCM7XX_TEST_IMAGE_SIZE (1 << 30) | ||
48 | + | ||
49 | +char *sd_path; | ||
50 | + | ||
51 | +static QTestState *setup_sd_card(void) | ||
52 | +{ | ||
53 | + QTestState *qts = qtest_initf( | ||
54 | + "-machine kudo-bmc " | ||
55 | + "-device sd-card,drive=drive0 " | ||
56 | + "-drive id=drive0,if=none,file=%s,format=raw,auto-read-only=off", | ||
57 | + sd_path); | ||
58 | + | ||
59 | + qtest_writew(qts, NPCM7XX_MMC_BA + SDHC_SWRST, SDHC_RESET_ALL); | ||
60 | + qtest_writew(qts, NPCM7XX_MMC_BA + SDHC_CLKCON, | ||
61 | + SDHC_CLOCK_SDCLK_EN | SDHC_CLOCK_INT_STABLE | | ||
62 | + SDHC_CLOCK_INT_EN); | ||
63 | + sdhci_cmd_regs(qts, NPCM7XX_MMC_BA, 0, 0, 0, 0, SDHC_APP_CMD); | ||
64 | + sdhci_cmd_regs(qts, NPCM7XX_MMC_BA, 0, 0, 0x41200000, 0, (41 << 8)); | ||
65 | + sdhci_cmd_regs(qts, NPCM7XX_MMC_BA, 0, 0, 0, 0, SDHC_ALL_SEND_CID); | ||
66 | + sdhci_cmd_regs(qts, NPCM7XX_MMC_BA, 0, 0, 0, 0, SDHC_SEND_RELATIVE_ADDR); | ||
67 | + sdhci_cmd_regs(qts, NPCM7XX_MMC_BA, 0, 0, 0x45670000, 0, | ||
68 | + SDHC_SELECT_DESELECT_CARD); | ||
69 | + | ||
70 | + return qts; | ||
71 | +} | ||
72 | + | ||
73 | +static void write_sdread(QTestState *qts, const char *msg) | ||
74 | +{ | ||
75 | + int fd, ret; | ||
76 | + size_t len = strlen(msg); | ||
77 | + char *rmsg = g_malloc(len); | ||
78 | + | ||
79 | + /* write message to sd */ | ||
80 | + fd = open(sd_path, O_WRONLY); | ||
81 | + g_assert(fd >= 0); | ||
82 | + ret = write(fd, msg, len); | ||
83 | + close(fd); | ||
84 | + g_assert(ret == len); | ||
85 | + | ||
86 | + /* read message using sdhci */ | ||
87 | + ret = sdhci_read_cmd(qts, NPCM7XX_MMC_BA, rmsg, len); | ||
88 | + g_assert(ret == len); | ||
89 | + g_assert(!memcmp(rmsg, msg, len)); | ||
90 | + | ||
91 | + g_free(rmsg); | ||
92 | +} | ||
93 | + | ||
94 | +/* Check MMC can read values from sd */ | ||
95 | +static void test_read_sd(void) | ||
96 | +{ | ||
97 | + QTestState *qts = setup_sd_card(); | ||
98 | + | ||
99 | + write_sdread(qts, "hello world"); | ||
100 | + write_sdread(qts, "goodbye"); | ||
101 | + | ||
102 | + qtest_quit(qts); | ||
103 | +} | ||
104 | + | ||
105 | +static void sdwrite_read(QTestState *qts, const char *msg) | ||
106 | +{ | ||
107 | + int fd, ret; | ||
108 | + size_t len = strlen(msg); | ||
109 | + char *rmsg = g_malloc(len); | ||
110 | + | ||
111 | + /* write message using sdhci */ | ||
112 | + sdhci_write_cmd(qts, NPCM7XX_MMC_BA, msg, len, NPCM7XX_BLK_SIZE); | ||
113 | + | ||
114 | + /* read message from sd */ | ||
115 | + fd = open(sd_path, O_RDONLY); | ||
116 | + g_assert(fd >= 0); | ||
117 | + ret = read(fd, rmsg, len); | ||
118 | + close(fd); | ||
119 | + g_assert(ret == len); | ||
120 | + | ||
121 | + g_assert(!memcmp(rmsg, msg, len)); | ||
122 | + | ||
123 | + g_free(rmsg); | ||
124 | +} | ||
125 | + | ||
126 | +/* Check MMC can write values to sd */ | ||
127 | +static void test_write_sd(void) | ||
128 | +{ | ||
129 | + QTestState *qts = setup_sd_card(); | ||
130 | + | ||
131 | + sdwrite_read(qts, "hello world"); | ||
132 | + sdwrite_read(qts, "goodbye"); | ||
133 | + | ||
134 | + qtest_quit(qts); | ||
135 | +} | ||
136 | + | ||
137 | +/* Check SDHCI has correct default values. */ | ||
138 | +static void test_reset(void) | ||
139 | +{ | ||
140 | + QTestState *qts = qtest_init("-machine kudo-bmc"); | ||
141 | + uint64_t addr = NPCM7XX_MMC_BA; | ||
142 | + uint64_t end_addr = addr + NPCM7XX_REG_SIZE; | ||
143 | + uint16_t prstvals_resets[] = {NPCM7XX_PRSTVALS_0_RESET, | ||
144 | + NPCM7XX_PRSTVALS_1_RESET, | ||
145 | + 0, | ||
146 | + NPCM7XX_PRSTVALS_3_RESET, | ||
147 | + 0, | ||
148 | + 0}; | ||
149 | + int i; | ||
150 | + uint32_t mask; | ||
151 | + | ||
152 | + while (addr < end_addr) { | ||
153 | + switch (addr - NPCM7XX_MMC_BA) { | ||
154 | + case SDHC_PRNSTS: | ||
155 | + /* | ||
156 | + * ignores bits 20 to 24: they are changed when reading registers | ||
157 | + */ | ||
158 | + mask = 0x1f00000; | ||
159 | + g_assert_cmphex(qtest_readl(qts, addr) | mask, ==, | ||
160 | + NPCM7XX_PRSNTS_RESET | mask); | ||
161 | + addr += 4; | ||
162 | + break; | ||
163 | + case SDHC_BLKGAP: | ||
164 | + g_assert_cmphex(qtest_readb(qts, addr), ==, NPCM7XX_BLKGAP_RESET); | ||
165 | + addr += 1; | ||
166 | + break; | ||
167 | + case SDHC_CAPAB: | ||
168 | + g_assert_cmphex(qtest_readq(qts, addr), ==, NPCM7XX_CAPAB_RESET); | ||
169 | + addr += 8; | ||
170 | + break; | ||
171 | + case SDHC_MAXCURR: | ||
172 | + g_assert_cmphex(qtest_readq(qts, addr), ==, NPCM7XX_MAXCURR_RESET); | ||
173 | + addr += 8; | ||
174 | + break; | ||
175 | + case SDHC_HCVER: | ||
176 | + g_assert_cmphex(qtest_readw(qts, addr), ==, NPCM7XX_HCVER_RESET); | ||
177 | + addr += 2; | ||
178 | + break; | ||
179 | + case NPCM7XX_PRSTVALS: | ||
180 | + for (i = 0; i < NPCM7XX_PRSTVALS_SIZE; ++i) { | ||
181 | + g_assert_cmphex(qtest_readw(qts, addr + 2 * i), ==, | ||
182 | + prstvals_resets[i]); | ||
183 | + } | ||
184 | + addr += NPCM7XX_PRSTVALS_SIZE * 2; | ||
185 | + break; | ||
186 | + default: | ||
187 | + g_assert_cmphex(qtest_readb(qts, addr), ==, 0); | ||
188 | + addr += 1; | ||
189 | + } | ||
190 | + } | ||
191 | + | ||
192 | + qtest_quit(qts); | ||
193 | +} | ||
194 | + | ||
195 | +static void drive_destroy(void) | ||
196 | +{ | ||
197 | + unlink(sd_path); | ||
198 | + g_free(sd_path); | ||
199 | +} | ||
200 | + | ||
201 | +static void drive_create(void) | ||
202 | +{ | ||
203 | + int fd, ret; | ||
204 | + GError *error = NULL; | ||
205 | + | ||
206 | + /* Create a temporary raw image */ | ||
207 | + fd = g_file_open_tmp("sdhci_XXXXXX", &sd_path, &error); | ||
208 | + if (fd == -1) { | ||
209 | + fprintf(stderr, "unable to create sdhci file: %s\n", error->message); | ||
210 | + g_error_free(error); | ||
211 | + } | ||
212 | + g_assert(sd_path != NULL); | ||
213 | + | ||
214 | + ret = ftruncate(fd, NPCM7XX_TEST_IMAGE_SIZE); | ||
215 | + g_assert_cmpint(ret, ==, 0); | ||
216 | + g_message("%s", sd_path); | ||
217 | + close(fd); | ||
218 | +} | ||
219 | + | ||
220 | +int main(int argc, char **argv) | ||
221 | +{ | ||
222 | + int ret; | ||
223 | + | ||
224 | + drive_create(); | ||
225 | + | ||
226 | + g_test_init(&argc, &argv, NULL); | ||
227 | + | ||
228 | + qtest_add_func("npcm7xx_sdhci/reset", test_reset); | ||
229 | + qtest_add_func("npcm7xx_sdhci/write_sd", test_write_sd); | ||
230 | + qtest_add_func("npcm7xx_sdhci/read_sd", test_read_sd); | ||
231 | + | ||
232 | + ret = g_test_run(); | ||
233 | + drive_destroy(); | ||
234 | + return ret; | ||
235 | +} | ||
236 | diff --git a/tests/qtest/meson.build b/tests/qtest/meson.build | ||
237 | index XXXXXXX..XXXXXXX 100644 | ||
238 | --- a/tests/qtest/meson.build | ||
239 | +++ b/tests/qtest/meson.build | ||
240 | @@ -XXX,XX +XXX,XX @@ qtests_npcm7xx = \ | ||
241 | 'npcm7xx_gpio-test', | ||
242 | 'npcm7xx_pwm-test', | ||
243 | 'npcm7xx_rng-test', | ||
244 | + 'npcm7xx_sdhci-test', | ||
245 | 'npcm7xx_smbus-test', | ||
246 | 'npcm7xx_timer-test', | ||
247 | 'npcm7xx_watchdog_timer-test'] + \ | ||
248 | -- | ||
249 | 2.25.1 | diff view generated by jsdifflib |
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | In the previous commit we fixed a crash when the guest read a | 3 | Add new macros to manipulate signed fields within the register. |
4 | register that pop from an empty FIFO. | ||
5 | By auditing the repository, we found another similar use with | ||
6 | an easy way to reproduce: | ||
7 | 4 | ||
8 | $ qemu-system-aarch64 -M xlnx-zcu102 -monitor stdio -S | 5 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
9 | QEMU 4.0.50 monitor - type 'help' for more information | 6 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
10 | (qemu) xp/b 0xfd4a0134 | 7 | Message-id: 20220301215958.157011-2-richard.henderson@linaro.org |
11 | Aborted (core dumped) | 8 | Suggested-by: Peter Maydell <peter.maydell@linaro.org> |
12 | 9 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | |
13 | (gdb) bt | ||
14 | #0 0x00007f6936dea57f in raise () at /lib64/libc.so.6 | ||
15 | #1 0x00007f6936dd4895 in abort () at /lib64/libc.so.6 | ||
16 | #2 0x0000561ad32975ec in xlnx_dp_aux_pop_rx_fifo (s=0x7f692babee70) at hw/display/xlnx_dp.c:431 | ||
17 | #3 0x0000561ad3297dc0 in xlnx_dp_read (opaque=0x7f692babee70, offset=77, size=4) at hw/display/xlnx_dp.c:667 | ||
18 | #4 0x0000561ad321b896 in memory_region_read_accessor (mr=0x7f692babf620, addr=308, value=0x7ffe05c1db88, size=4, shift=0, mask=4294967295, attrs=...) at memory.c:439 | ||
19 | #5 0x0000561ad321bd70 in access_with_adjusted_size (addr=308, value=0x7ffe05c1db88, size=1, access_size_min=4, access_size_max=4, access_fn=0x561ad321b858 <memory_region_read_accessor>, mr=0x7f692babf620, attrs=...) at memory.c:569 | ||
20 | #6 0x0000561ad321e9d5 in memory_region_dispatch_read1 (mr=0x7f692babf620, addr=308, pval=0x7ffe05c1db88, size=1, attrs=...) at memory.c:1420 | ||
21 | #7 0x0000561ad321ea9d in memory_region_dispatch_read (mr=0x7f692babf620, addr=308, pval=0x7ffe05c1db88, size=1, attrs=...) at memory.c:1447 | ||
22 | #8 0x0000561ad31bd742 in flatview_read_continue (fv=0x561ad69c04f0, addr=4249485620, attrs=..., buf=0x7ffe05c1dcf0 "\020\335\301\005\376\177", len=1, addr1=308, l=1, mr=0x7f692babf620) at exec.c:3385 | ||
23 | #9 0x0000561ad31bd895 in flatview_read (fv=0x561ad69c04f0, addr=4249485620, attrs=..., buf=0x7ffe05c1dcf0 "\020\335\301\005\376\177", len=1) at exec.c:3423 | ||
24 | #10 0x0000561ad31bd90b in address_space_read_full (as=0x561ad5bb3020, addr=4249485620, attrs=..., buf=0x7ffe05c1dcf0 "\020\335\301\005\376\177", len=1) at exec.c:3436 | ||
25 | #11 0x0000561ad33b1c42 in address_space_read (len=1, buf=0x7ffe05c1dcf0 "\020\335\301\005\376\177", attrs=..., addr=4249485620, as=0x561ad5bb3020) at include/exec/memory.h:2131 | ||
26 | #12 0x0000561ad33b1c42 in memory_dump (mon=0x561ad59c4530, count=1, format=120, wsize=1, addr=4249485620, is_physical=1) at monitor/misc.c:723 | ||
27 | #13 0x0000561ad33b1fc1 in hmp_physical_memory_dump (mon=0x561ad59c4530, qdict=0x561ad6c6fd00) at monitor/misc.c:795 | ||
28 | #14 0x0000561ad37b4a9f in handle_hmp_command (mon=0x561ad59c4530, cmdline=0x561ad59d0f22 "/b 0x00000000fd4a0134") at monitor/hmp.c:1082 | ||
29 | |||
30 | Fix by checking the FIFO is not empty before popping from it. | ||
31 | |||
32 | The datasheet is not clear about the reset value of this register, | ||
33 | we choose to return '0'. | ||
34 | |||
35 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
36 | Reviewed-by: Alistair Francis <alistair.francis@wdc.com> | ||
37 | Message-id: 20190709113715.7761-4-philmd@redhat.com | ||
38 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
39 | --- | 11 | --- |
40 | hw/display/xlnx_dp.c | 15 +++++++++++---- | 12 | include/hw/registerfields.h | 48 ++++++++++++++++++++++++++++++++++++- |
41 | 1 file changed, 11 insertions(+), 4 deletions(-) | 13 | 1 file changed, 47 insertions(+), 1 deletion(-) |
42 | 14 | ||
43 | diff --git a/hw/display/xlnx_dp.c b/hw/display/xlnx_dp.c | 15 | diff --git a/include/hw/registerfields.h b/include/hw/registerfields.h |
44 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
45 | --- a/hw/display/xlnx_dp.c | 17 | --- a/include/hw/registerfields.h |
46 | +++ b/hw/display/xlnx_dp.c | 18 | +++ b/include/hw/registerfields.h |
47 | @@ -XXX,XX +XXX,XX @@ static uint8_t xlnx_dp_aux_pop_rx_fifo(XlnxDPState *s) | 19 | @@ -XXX,XX +XXX,XX @@ |
48 | uint8_t ret; | 20 | extract64((storage), R_ ## reg ## _ ## field ## _SHIFT, \ |
49 | 21 | R_ ## reg ## _ ## field ## _LENGTH) | |
50 | if (fifo8_is_empty(&s->rx_fifo)) { | 22 | |
51 | - DPRINTF("rx_fifo underflow..\n"); | 23 | +#define FIELD_SEX8(storage, reg, field) \ |
52 | - abort(); | 24 | + sextract8((storage), R_ ## reg ## _ ## field ## _SHIFT, \ |
53 | + qemu_log_mask(LOG_GUEST_ERROR, | 25 | + R_ ## reg ## _ ## field ## _LENGTH) |
54 | + "%s: Reading empty RX_FIFO\n", | 26 | +#define FIELD_SEX16(storage, reg, field) \ |
55 | + __func__); | 27 | + sextract16((storage), R_ ## reg ## _ ## field ## _SHIFT, \ |
56 | + /* | 28 | + R_ ## reg ## _ ## field ## _LENGTH) |
57 | + * The datasheet is not clear about the reset value, it seems | 29 | +#define FIELD_SEX32(storage, reg, field) \ |
58 | + * to be unspecified. We choose to return '0'. | 30 | + sextract32((storage), R_ ## reg ## _ ## field ## _SHIFT, \ |
59 | + */ | 31 | + R_ ## reg ## _ ## field ## _LENGTH) |
60 | + ret = 0; | 32 | +#define FIELD_SEX64(storage, reg, field) \ |
61 | + } else { | 33 | + sextract64((storage), R_ ## reg ## _ ## field ## _SHIFT, \ |
62 | + ret = fifo8_pop(&s->rx_fifo); | 34 | + R_ ## reg ## _ ## field ## _LENGTH) |
63 | + DPRINTF("pop 0x%" PRIX8 " from rx_fifo.\n", ret); | 35 | + |
64 | } | 36 | /* Extract a field from an array of registers */ |
65 | - ret = fifo8_pop(&s->rx_fifo); | 37 | #define ARRAY_FIELD_EX32(regs, reg, field) \ |
66 | - DPRINTF("pop 0x%" PRIX8 " from rx_fifo.\n", ret); | 38 | FIELD_EX32((regs)[R_ ## reg], reg, field) |
67 | return ret; | 39 | @@ -XXX,XX +XXX,XX @@ |
68 | } | 40 | _d; }) |
69 | 41 | #define FIELD_DP64(storage, reg, field, val) ({ \ | |
42 | struct { \ | ||
43 | - uint64_t v:R_ ## reg ## _ ## field ## _LENGTH; \ | ||
44 | + uint64_t v:R_ ## reg ## _ ## field ## _LENGTH; \ | ||
45 | + } _v = { .v = val }; \ | ||
46 | + uint64_t _d; \ | ||
47 | + _d = deposit64((storage), R_ ## reg ## _ ## field ## _SHIFT, \ | ||
48 | + R_ ## reg ## _ ## field ## _LENGTH, _v.v); \ | ||
49 | + _d; }) | ||
50 | + | ||
51 | +#define FIELD_SDP8(storage, reg, field, val) ({ \ | ||
52 | + struct { \ | ||
53 | + signed int v:R_ ## reg ## _ ## field ## _LENGTH; \ | ||
54 | + } _v = { .v = val }; \ | ||
55 | + uint8_t _d; \ | ||
56 | + _d = deposit32((storage), R_ ## reg ## _ ## field ## _SHIFT, \ | ||
57 | + R_ ## reg ## _ ## field ## _LENGTH, _v.v); \ | ||
58 | + _d; }) | ||
59 | +#define FIELD_SDP16(storage, reg, field, val) ({ \ | ||
60 | + struct { \ | ||
61 | + signed int v:R_ ## reg ## _ ## field ## _LENGTH; \ | ||
62 | + } _v = { .v = val }; \ | ||
63 | + uint16_t _d; \ | ||
64 | + _d = deposit32((storage), R_ ## reg ## _ ## field ## _SHIFT, \ | ||
65 | + R_ ## reg ## _ ## field ## _LENGTH, _v.v); \ | ||
66 | + _d; }) | ||
67 | +#define FIELD_SDP32(storage, reg, field, val) ({ \ | ||
68 | + struct { \ | ||
69 | + signed int v:R_ ## reg ## _ ## field ## _LENGTH; \ | ||
70 | + } _v = { .v = val }; \ | ||
71 | + uint32_t _d; \ | ||
72 | + _d = deposit32((storage), R_ ## reg ## _ ## field ## _SHIFT, \ | ||
73 | + R_ ## reg ## _ ## field ## _LENGTH, _v.v); \ | ||
74 | + _d; }) | ||
75 | +#define FIELD_SDP64(storage, reg, field, val) ({ \ | ||
76 | + struct { \ | ||
77 | + int64_t v:R_ ## reg ## _ ## field ## _LENGTH; \ | ||
78 | } _v = { .v = val }; \ | ||
79 | uint64_t _d; \ | ||
80 | _d = deposit64((storage), R_ ## reg ## _ ## field ## _SHIFT, \ | ||
70 | -- | 81 | -- |
71 | 2.20.1 | 82 | 2.25.1 |
72 | 83 | ||
73 | 84 | diff view generated by jsdifflib |
1 | From: Alex Bennée <alex.bennee@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | When we converted to using feature bits in 602f6e42cfbf we missed out | 3 | Set this as the kernel would, to 48 bits, to keep the computation |
4 | the fact (dp && arm_dc_feature(s, ARM_FEATURE_V8)) was supported for | 4 | of the address space correct for PAuth. |
5 | -cpu max configurations. This caused a regression in the GCC test | ||
6 | suite. Fix this by setting the appropriate bits in mvfr1.FPHP to | ||
7 | report ARMv8-A with FP support (but not ARMv8.2-FP16). | ||
8 | 5 | ||
9 | Fixes: https://bugs.launchpad.net/qemu/+bug/1836078 | 6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Signed-off-by: Alex Bennée <alex.bennee@linaro.org> | 7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
11 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 8 | Message-id: 20220301215958.157011-3-richard.henderson@linaro.org |
12 | Message-id: 20190711103737.10017-1-alex.bennee@linaro.org | ||
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
14 | --- | 10 | --- |
15 | target/arm/cpu.c | 4 ++++ | 11 | target/arm/cpu.c | 3 ++- |
16 | 1 file changed, 4 insertions(+) | 12 | 1 file changed, 2 insertions(+), 1 deletion(-) |
17 | 13 | ||
18 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | 14 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c |
19 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
20 | --- a/target/arm/cpu.c | 16 | --- a/target/arm/cpu.c |
21 | +++ b/target/arm/cpu.c | 17 | +++ b/target/arm/cpu.c |
22 | @@ -XXX,XX +XXX,XX @@ static void arm_max_initfn(Object *obj) | 18 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(DeviceState *dev) |
23 | t = FIELD_DP32(t, ID_ISAR6, SPECRES, 1); | 19 | aarch64_sve_zcr_get_valid_len(cpu, cpu->sve_default_vq - 1); |
24 | cpu->isar.id_isar6 = t; | 20 | } |
25 | 21 | /* | |
26 | + t = cpu->isar.mvfr1; | 22 | + * Enable 48-bit address space (TODO: take reserved_va into account). |
27 | + t = FIELD_DP32(t, MVFR1, FPHP, 2); /* v8.0 FP support */ | 23 | * Enable TBI0 but not TBI1. |
28 | + cpu->isar.mvfr1 = t; | 24 | * Note that this must match useronly_clean_ptr. |
29 | + | 25 | */ |
30 | t = cpu->isar.mvfr2; | 26 | - env->cp15.tcr_el[1].raw_tcr = (1ULL << 37); |
31 | t = FIELD_DP32(t, MVFR2, SIMDMISC, 3); /* SIMD MaxNum */ | 27 | + env->cp15.tcr_el[1].raw_tcr = 5 | (1ULL << 37); |
32 | t = FIELD_DP32(t, MVFR2, FPMISC, 4); /* FP MaxNum */ | 28 | |
29 | /* Enable MTE */ | ||
30 | if (cpu_isar_feature(aa64_mte, cpu)) { | ||
33 | -- | 31 | -- |
34 | 2.20.1 | 32 | 2.25.1 |
35 | |||
36 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Richard Henderson <richard.henderson@linaro.org> | ||
1 | 2 | ||
3 | Without FEAT_LVA, the behaviour of programming an invalid value | ||
4 | is IMPLEMENTATION DEFINED. With FEAT_LVA, programming an invalid | ||
5 | minimum value requires a Translation fault. | ||
6 | |||
7 | It is most self-consistent to choose to generate the fault always. | ||
8 | |||
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
11 | Message-id: 20220301215958.157011-4-richard.henderson@linaro.org | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
13 | --- | ||
14 | target/arm/internals.h | 1 + | ||
15 | target/arm/helper.c | 32 ++++++++++++++++++++++++++++---- | ||
16 | 2 files changed, 29 insertions(+), 4 deletions(-) | ||
17 | |||
18 | diff --git a/target/arm/internals.h b/target/arm/internals.h | ||
19 | index XXXXXXX..XXXXXXX 100644 | ||
20 | --- a/target/arm/internals.h | ||
21 | +++ b/target/arm/internals.h | ||
22 | @@ -XXX,XX +XXX,XX @@ typedef struct ARMVAParameters { | ||
23 | bool hpd : 1; | ||
24 | bool using16k : 1; | ||
25 | bool using64k : 1; | ||
26 | + bool tsz_oob : 1; /* tsz has been clamped to legal range */ | ||
27 | } ARMVAParameters; | ||
28 | |||
29 | ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
30 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
31 | index XXXXXXX..XXXXXXX 100644 | ||
32 | --- a/target/arm/helper.c | ||
33 | +++ b/target/arm/helper.c | ||
34 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
35 | ARMMMUIdx mmu_idx, bool data) | ||
36 | { | ||
37 | uint64_t tcr = regime_tcr(env, mmu_idx)->raw_tcr; | ||
38 | - bool epd, hpd, using16k, using64k; | ||
39 | - int select, tsz, tbi, max_tsz; | ||
40 | + bool epd, hpd, using16k, using64k, tsz_oob; | ||
41 | + int select, tsz, tbi, max_tsz, min_tsz; | ||
42 | |||
43 | if (!regime_has_2_ranges(mmu_idx)) { | ||
44 | select = 0; | ||
45 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
46 | } else { | ||
47 | max_tsz = 39; | ||
48 | } | ||
49 | + min_tsz = 16; /* TODO: ARMv8.2-LVA */ | ||
50 | |||
51 | - tsz = MIN(tsz, max_tsz); | ||
52 | - tsz = MAX(tsz, 16); /* TODO: ARMv8.2-LVA */ | ||
53 | + if (tsz > max_tsz) { | ||
54 | + tsz = max_tsz; | ||
55 | + tsz_oob = true; | ||
56 | + } else if (tsz < min_tsz) { | ||
57 | + tsz = min_tsz; | ||
58 | + tsz_oob = true; | ||
59 | + } else { | ||
60 | + tsz_oob = false; | ||
61 | + } | ||
62 | |||
63 | /* Present TBI as a composite with TBID. */ | ||
64 | tbi = aa64_va_parameter_tbi(tcr, mmu_idx); | ||
65 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
66 | .hpd = hpd, | ||
67 | .using16k = using16k, | ||
68 | .using64k = using64k, | ||
69 | + .tsz_oob = tsz_oob, | ||
70 | }; | ||
71 | } | ||
72 | |||
73 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
74 | param = aa64_va_parameters(env, address, mmu_idx, | ||
75 | access_type != MMU_INST_FETCH); | ||
76 | level = 0; | ||
77 | + | ||
78 | + /* | ||
79 | + * If TxSZ is programmed to a value larger than the maximum, | ||
80 | + * or smaller than the effective minimum, it is IMPLEMENTATION | ||
81 | + * DEFINED whether we behave as if the field were programmed | ||
82 | + * within bounds, or if a level 0 Translation fault is generated. | ||
83 | + * | ||
84 | + * With FEAT_LVA, fault on less than minimum becomes required, | ||
85 | + * so our choice is to always raise the fault. | ||
86 | + */ | ||
87 | + if (param.tsz_oob) { | ||
88 | + fault_type = ARMFault_Translation; | ||
89 | + goto do_fault; | ||
90 | + } | ||
91 | + | ||
92 | addrsize = 64 - 8 * param.tbi; | ||
93 | inputsize = 64 - param.tsz; | ||
94 | } else { | ||
95 | -- | ||
96 | 2.25.1 | diff view generated by jsdifflib |
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Lei Sun found while auditing the code that a CPU write would | 3 | We will shortly share parts of this function with other portions |
4 | trigger a NULL pointer dereference. | 4 | of address translation. |
5 | 5 | ||
6 | >From UG1085 datasheet [*] AXI writes in this region are ignored | 6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
7 | and generates an AXI Slave Error (SLVERR). | 7 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> |
8 | 8 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | |
9 | Fix by implementing the write_with_attrs() handler. | 9 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
10 | Return MEMTX_ERROR when the region is accessed (this error maps | 10 | Message-id: 20220301215958.157011-5-richard.henderson@linaro.org |
11 | to an AXI slave error). | ||
12 | |||
13 | [*] https://www.xilinx.com/support/documentation/user_guides/ug1085-zynq-ultrascale-trm.pdf | ||
14 | |||
15 | Reported-by: Lei Sun <slei.casper@gmail.com> | ||
16 | Reviewed-by: Francisco Iglesias <frasse.iglesias@gmail.com> | ||
17 | Tested-by: Francisco Iglesias <frasse.iglesias@gmail.com> | ||
18 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
19 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
20 | --- | 12 | --- |
21 | hw/ssi/xilinx_spips.c | 16 ++++++++++++++++ | 13 | target/arm/internals.h | 19 +------------------ |
22 | 1 file changed, 16 insertions(+) | 14 | target/arm/helper.c | 22 ++++++++++++++++++++++ |
15 | 2 files changed, 23 insertions(+), 18 deletions(-) | ||
23 | 16 | ||
24 | diff --git a/hw/ssi/xilinx_spips.c b/hw/ssi/xilinx_spips.c | 17 | diff --git a/target/arm/internals.h b/target/arm/internals.h |
25 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
26 | --- a/hw/ssi/xilinx_spips.c | 19 | --- a/target/arm/internals.h |
27 | +++ b/hw/ssi/xilinx_spips.c | 20 | +++ b/target/arm/internals.h |
28 | @@ -XXX,XX +XXX,XX @@ static MemTxResult lqspi_read(void *opaque, hwaddr addr, uint64_t *value, | 21 | @@ -XXX,XX +XXX,XX @@ static inline void update_spsel(CPUARMState *env, uint32_t imm) |
29 | return lqspi_read(opaque, addr, value, size, attrs); | 22 | * Returns the implementation defined bit-width of physical addresses. |
23 | * The ARMv8 reference manuals refer to this as PAMax(). | ||
24 | */ | ||
25 | -static inline unsigned int arm_pamax(ARMCPU *cpu) | ||
26 | -{ | ||
27 | - static const unsigned int pamax_map[] = { | ||
28 | - [0] = 32, | ||
29 | - [1] = 36, | ||
30 | - [2] = 40, | ||
31 | - [3] = 42, | ||
32 | - [4] = 44, | ||
33 | - [5] = 48, | ||
34 | - }; | ||
35 | - unsigned int parange = | ||
36 | - FIELD_EX64(cpu->isar.id_aa64mmfr0, ID_AA64MMFR0, PARANGE); | ||
37 | - | ||
38 | - /* id_aa64mmfr0 is a read-only register so values outside of the | ||
39 | - * supported mappings can be considered an implementation error. */ | ||
40 | - assert(parange < ARRAY_SIZE(pamax_map)); | ||
41 | - return pamax_map[parange]; | ||
42 | -} | ||
43 | +unsigned int arm_pamax(ARMCPU *cpu); | ||
44 | |||
45 | /* Return true if extended addresses are enabled. | ||
46 | * This is always the case if our translation regime is 64 bit, | ||
47 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
48 | index XXXXXXX..XXXXXXX 100644 | ||
49 | --- a/target/arm/helper.c | ||
50 | +++ b/target/arm/helper.c | ||
51 | @@ -XXX,XX +XXX,XX @@ static uint8_t convert_stage2_attrs(CPUARMState *env, uint8_t s2attrs) | ||
30 | } | 52 | } |
31 | 53 | #endif /* !CONFIG_USER_ONLY */ | |
32 | +static MemTxResult lqspi_write(void *opaque, hwaddr offset, uint64_t value, | 54 | |
33 | + unsigned size, MemTxAttrs attrs) | 55 | +/* The cpu-specific constant value of PAMax; also used by hw/arm/virt. */ |
56 | +unsigned int arm_pamax(ARMCPU *cpu) | ||
34 | +{ | 57 | +{ |
58 | + static const unsigned int pamax_map[] = { | ||
59 | + [0] = 32, | ||
60 | + [1] = 36, | ||
61 | + [2] = 40, | ||
62 | + [3] = 42, | ||
63 | + [4] = 44, | ||
64 | + [5] = 48, | ||
65 | + }; | ||
66 | + unsigned int parange = | ||
67 | + FIELD_EX64(cpu->isar.id_aa64mmfr0, ID_AA64MMFR0, PARANGE); | ||
68 | + | ||
35 | + /* | 69 | + /* |
36 | + * From UG1085, Chapter 24 (Quad-SPI controllers): | 70 | + * id_aa64mmfr0 is a read-only register so values outside of the |
37 | + * - Writes are ignored | 71 | + * supported mappings can be considered an implementation error. |
38 | + * - AXI writes generate an external AXI slave error (SLVERR) | ||
39 | + */ | 72 | + */ |
40 | + qemu_log_mask(LOG_GUEST_ERROR, "%s Unexpected %u-bit access to 0x%" PRIx64 | 73 | + assert(parange < ARRAY_SIZE(pamax_map)); |
41 | + " (value: 0x%" PRIx64 "\n", | 74 | + return pamax_map[parange]; |
42 | + __func__, size << 3, offset, value); | ||
43 | + | ||
44 | + return MEMTX_ERROR; | ||
45 | +} | 75 | +} |
46 | + | 76 | + |
47 | static const MemoryRegionOps lqspi_ops = { | 77 | static int aa64_va_parameter_tbi(uint64_t tcr, ARMMMUIdx mmu_idx) |
48 | .read_with_attrs = lqspi_read, | 78 | { |
49 | + .write_with_attrs = lqspi_write, | 79 | if (regime_has_2_ranges(mmu_idx)) { |
50 | .endianness = DEVICE_NATIVE_ENDIAN, | ||
51 | .valid = { | ||
52 | .min_access_size = 1, | ||
53 | -- | 80 | -- |
54 | 2.20.1 | 81 | 2.25.1 |
55 | 82 | ||
56 | 83 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Richard Henderson <richard.henderson@linaro.org> | ||
1 | 2 | ||
3 | Pass down the width of the output address from translation. | ||
4 | For now this is still just PAMax, but a subsequent patch will | ||
5 | compute the correct value from TCR_ELx.{I}PS. | ||
6 | |||
7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Message-id: 20220301215958.157011-6-richard.henderson@linaro.org | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | --- | ||
12 | target/arm/helper.c | 21 ++++++++++----------- | ||
13 | 1 file changed, 10 insertions(+), 11 deletions(-) | ||
14 | |||
15 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
16 | index XXXXXXX..XXXXXXX 100644 | ||
17 | --- a/target/arm/helper.c | ||
18 | +++ b/target/arm/helper.c | ||
19 | @@ -XXX,XX +XXX,XX @@ do_fault: | ||
20 | * false otherwise. | ||
21 | */ | ||
22 | static bool check_s2_mmu_setup(ARMCPU *cpu, bool is_aa64, int level, | ||
23 | - int inputsize, int stride) | ||
24 | + int inputsize, int stride, int outputsize) | ||
25 | { | ||
26 | const int grainsize = stride + 3; | ||
27 | int startsizecheck; | ||
28 | @@ -XXX,XX +XXX,XX @@ static bool check_s2_mmu_setup(ARMCPU *cpu, bool is_aa64, int level, | ||
29 | } | ||
30 | |||
31 | if (is_aa64) { | ||
32 | - CPUARMState *env = &cpu->env; | ||
33 | - unsigned int pamax = arm_pamax(cpu); | ||
34 | - | ||
35 | switch (stride) { | ||
36 | case 13: /* 64KB Pages. */ | ||
37 | - if (level == 0 || (level == 1 && pamax <= 42)) { | ||
38 | + if (level == 0 || (level == 1 && outputsize <= 42)) { | ||
39 | return false; | ||
40 | } | ||
41 | break; | ||
42 | case 11: /* 16KB Pages. */ | ||
43 | - if (level == 0 || (level == 1 && pamax <= 40)) { | ||
44 | + if (level == 0 || (level == 1 && outputsize <= 40)) { | ||
45 | return false; | ||
46 | } | ||
47 | break; | ||
48 | case 9: /* 4KB Pages. */ | ||
49 | - if (level == 0 && pamax <= 42) { | ||
50 | + if (level == 0 && outputsize <= 42) { | ||
51 | return false; | ||
52 | } | ||
53 | break; | ||
54 | @@ -XXX,XX +XXX,XX @@ static bool check_s2_mmu_setup(ARMCPU *cpu, bool is_aa64, int level, | ||
55 | } | ||
56 | |||
57 | /* Inputsize checks. */ | ||
58 | - if (inputsize > pamax && | ||
59 | - (arm_el_is_aa64(env, 1) || inputsize > 40)) { | ||
60 | + if (inputsize > outputsize && | ||
61 | + (arm_el_is_aa64(&cpu->env, 1) || inputsize > 40)) { | ||
62 | /* This is CONSTRAINED UNPREDICTABLE and we choose to fault. */ | ||
63 | return false; | ||
64 | } | ||
65 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
66 | target_ulong page_size; | ||
67 | uint32_t attrs; | ||
68 | int32_t stride; | ||
69 | - int addrsize, inputsize; | ||
70 | + int addrsize, inputsize, outputsize; | ||
71 | TCR *tcr = regime_tcr(env, mmu_idx); | ||
72 | int ap, ns, xn, pxn; | ||
73 | uint32_t el = regime_el(env, mmu_idx); | ||
74 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
75 | |||
76 | addrsize = 64 - 8 * param.tbi; | ||
77 | inputsize = 64 - param.tsz; | ||
78 | + outputsize = arm_pamax(cpu); | ||
79 | } else { | ||
80 | param = aa32_va_parameters(env, address, mmu_idx); | ||
81 | level = 1; | ||
82 | addrsize = (mmu_idx == ARMMMUIdx_Stage2 ? 40 : 32); | ||
83 | inputsize = addrsize - param.tsz; | ||
84 | + outputsize = 40; | ||
85 | } | ||
86 | |||
87 | /* | ||
88 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
89 | |||
90 | /* Check that the starting level is valid. */ | ||
91 | ok = check_s2_mmu_setup(cpu, aarch64, startlevel, | ||
92 | - inputsize, stride); | ||
93 | + inputsize, stride, outputsize); | ||
94 | if (!ok) { | ||
95 | fault_type = ARMFault_Translation; | ||
96 | goto do_fault; | ||
97 | -- | ||
98 | 2.25.1 | diff view generated by jsdifflib |
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Reading the RX_DATA register when the RX_FIFO is empty triggers | 3 | The macro is a bit more readable than the inlined computation. |
4 | an abort. This can be easily reproduced: | ||
5 | 4 | ||
6 | $ qemu-system-arm -M emcraft-sf2 -monitor stdio -S | 5 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
7 | QEMU 4.0.50 monitor - type 'help' for more information | 6 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
8 | (qemu) x 0x40001010 | 7 | Message-id: 20220301215958.157011-7-richard.henderson@linaro.org |
9 | Aborted (core dumped) | ||
10 | |||
11 | (gdb) bt | ||
12 | #1 0x00007f035874f895 in abort () at /lib64/libc.so.6 | ||
13 | #2 0x00005628686591ff in fifo8_pop (fifo=0x56286a9a4c68) at util/fifo8.c:66 | ||
14 | #3 0x00005628683e0b8e in fifo32_pop (fifo=0x56286a9a4c68) at include/qemu/fifo32.h:137 | ||
15 | #4 0x00005628683e0efb in spi_read (opaque=0x56286a9a4850, addr=4, size=4) at hw/ssi/mss-spi.c:168 | ||
16 | #5 0x0000562867f96801 in memory_region_read_accessor (mr=0x56286a9a4b60, addr=16, value=0x7ffeecb0c5c8, size=4, shift=0, mask=4294967295, attrs=...) at memory.c:439 | ||
17 | #6 0x0000562867f96cdb in access_with_adjusted_size (addr=16, value=0x7ffeecb0c5c8, size=4, access_size_min=1, access_size_max=4, access_fn=0x562867f967c3 <memory_region_read_accessor>, mr=0x56286a9a4b60, attrs=...) at memory.c:569 | ||
18 | #7 0x0000562867f99940 in memory_region_dispatch_read1 (mr=0x56286a9a4b60, addr=16, pval=0x7ffeecb0c5c8, size=4, attrs=...) at memory.c:1420 | ||
19 | #8 0x0000562867f99a08 in memory_region_dispatch_read (mr=0x56286a9a4b60, addr=16, pval=0x7ffeecb0c5c8, size=4, attrs=...) at memory.c:1447 | ||
20 | #9 0x0000562867f38721 in flatview_read_continue (fv=0x56286aec6360, addr=1073745936, attrs=..., buf=0x7ffeecb0c7c0 "\340ǰ\354\376\177", len=4, addr1=16, l=4, mr=0x56286a9a4b60) at exec.c:3385 | ||
21 | #10 0x0000562867f38874 in flatview_read (fv=0x56286aec6360, addr=1073745936, attrs=..., buf=0x7ffeecb0c7c0 "\340ǰ\354\376\177", len=4) at exec.c:3423 | ||
22 | #11 0x0000562867f388ea in address_space_read_full (as=0x56286aa3e890, addr=1073745936, attrs=..., buf=0x7ffeecb0c7c0 "\340ǰ\354\376\177", len=4) at exec.c:3436 | ||
23 | #12 0x0000562867f389c5 in address_space_rw (as=0x56286aa3e890, addr=1073745936, attrs=..., buf=0x7ffeecb0c7c0 "\340ǰ\354\376\177", len=4, is_write=false) at exec.c:3466 | ||
24 | #13 0x0000562867f3bdd7 in cpu_memory_rw_debug (cpu=0x56286aa19d00, addr=1073745936, buf=0x7ffeecb0c7c0 "\340ǰ\354\376\177", len=4, is_write=0) at exec.c:3976 | ||
25 | #14 0x000056286811ed51 in memory_dump (mon=0x56286a8c32d0, count=1, format=120, wsize=4, addr=1073745936, is_physical=0) at monitor/misc.c:730 | ||
26 | #15 0x000056286811eff1 in hmp_memory_dump (mon=0x56286a8c32d0, qdict=0x56286b15c400) at monitor/misc.c:785 | ||
27 | #16 0x00005628684740ee in handle_hmp_command (mon=0x56286a8c32d0, cmdline=0x56286a8caeb2 "0x40001010") at monitor/hmp.c:1082 | ||
28 | |||
29 | From the datasheet "Actel SmartFusion Microcontroller Subsystem | ||
30 | User's Guide" Rev.1, Table 13-3 "SPI Register Summary", this | ||
31 | register has a reset value of 0. | ||
32 | |||
33 | Check the FIFO is not empty before accessing it, else log an | ||
34 | error message. | ||
35 | |||
36 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
37 | Reviewed-by: Alistair Francis <alistair.francis@wdc.com> | ||
38 | Message-id: 20190709113715.7761-3-philmd@redhat.com | ||
39 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
40 | --- | 9 | --- |
41 | hw/ssi/mss-spi.c | 8 +++++++- | 10 | target/arm/helper.c | 4 ++-- |
42 | 1 file changed, 7 insertions(+), 1 deletion(-) | 11 | 1 file changed, 2 insertions(+), 2 deletions(-) |
43 | 12 | ||
44 | diff --git a/hw/ssi/mss-spi.c b/hw/ssi/mss-spi.c | 13 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
45 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
46 | --- a/hw/ssi/mss-spi.c | 15 | --- a/target/arm/helper.c |
47 | +++ b/hw/ssi/mss-spi.c | 16 | +++ b/target/arm/helper.c |
48 | @@ -XXX,XX +XXX,XX @@ spi_read(void *opaque, hwaddr addr, unsigned int size) | 17 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, |
49 | case R_SPI_RX: | 18 | level = startlevel; |
50 | s->regs[R_SPI_STATUS] &= ~S_RXFIFOFUL; | 19 | } |
51 | s->regs[R_SPI_STATUS] &= ~S_RXCHOVRF; | 20 | |
52 | - ret = fifo32_pop(&s->rx_fifo); | 21 | - indexmask_grainsize = (1ULL << (stride + 3)) - 1; |
53 | + if (fifo32_is_empty(&s->rx_fifo)) { | 22 | - indexmask = (1ULL << (inputsize - (stride * (4 - level)))) - 1; |
54 | + qemu_log_mask(LOG_GUEST_ERROR, | 23 | + indexmask_grainsize = MAKE_64BIT_MASK(0, stride + 3); |
55 | + "%s: Reading empty RX_FIFO\n", | 24 | + indexmask = MAKE_64BIT_MASK(0, inputsize - (stride * (4 - level))); |
56 | + __func__); | 25 | |
57 | + } else { | 26 | /* Now we can extract the actual base address from the TTBR */ |
58 | + ret = fifo32_pop(&s->rx_fifo); | 27 | descaddr = extract64(ttbr, 0, 48); |
59 | + } | ||
60 | if (fifo32_is_empty(&s->rx_fifo)) { | ||
61 | s->regs[R_SPI_STATUS] |= S_RXFIFOEMP; | ||
62 | } | ||
63 | -- | 28 | -- |
64 | 2.20.1 | 29 | 2.25.1 |
65 | 30 | ||
66 | 31 | diff view generated by jsdifflib |
1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Both lqspi_read() and lqspi_load_cache() expect a 32-bit | 3 | This field controls the output (intermediate) physical address size |
4 | aligned address. | 4 | of the translation process. V8 requires to raise an AddressSize |
5 | fault if the page tables are programmed incorrectly, such that any | ||
6 | intermediate descriptor address, or the final translated address, | ||
7 | is out of range. | ||
5 | 8 | ||
6 | >From UG1085 datasheet [*] chapter on 'Quad-SPI Controller': | 9 | Add a PS field to ARMVAParameters, and properly compute outputsize |
10 | in get_phys_addr_lpae. Test the descaddr as extracted from TTBR | ||
11 | and from page table entries. | ||
7 | 12 | ||
8 | Transfer Size Limitations | 13 | Restrict descaddrmask so that we won't raise the fault for v7. |
9 | 14 | ||
10 | Because of the 32-bit wide TX, RX, and generic FIFO, all | 15 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
11 | APB/AXI transfers must be an integer multiple of 4-bytes. | 16 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> |
12 | Shorter transfers are not possible. | 17 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
13 | 18 | Message-id: 20220301215958.157011-8-richard.henderson@linaro.org | |
14 | Set MemoryRegionOps.impl values to force 32-bit accesses, | ||
15 | this way we are sure we do not access the lqspi_buf[] array | ||
16 | out of bound. | ||
17 | |||
18 | [*] https://www.xilinx.com/support/documentation/user_guides/ug1085-zynq-ultrascale-trm.pdf | ||
19 | |||
20 | Reviewed-by: Francisco Iglesias <frasse.iglesias@gmail.com> | ||
21 | Tested-by: Francisco Iglesias <frasse.iglesias@gmail.com> | ||
22 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
23 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 19 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
24 | --- | 20 | --- |
25 | hw/ssi/xilinx_spips.c | 4 ++++ | 21 | target/arm/internals.h | 1 + |
26 | 1 file changed, 4 insertions(+) | 22 | target/arm/helper.c | 72 ++++++++++++++++++++++++++++++++---------- |
23 | 2 files changed, 57 insertions(+), 16 deletions(-) | ||
27 | 24 | ||
28 | diff --git a/hw/ssi/xilinx_spips.c b/hw/ssi/xilinx_spips.c | 25 | diff --git a/target/arm/internals.h b/target/arm/internals.h |
29 | index XXXXXXX..XXXXXXX 100644 | 26 | index XXXXXXX..XXXXXXX 100644 |
30 | --- a/hw/ssi/xilinx_spips.c | 27 | --- a/target/arm/internals.h |
31 | +++ b/hw/ssi/xilinx_spips.c | 28 | +++ b/target/arm/internals.h |
32 | @@ -XXX,XX +XXX,XX @@ static const MemoryRegionOps lqspi_ops = { | 29 | @@ -XXX,XX +XXX,XX @@ static inline uint32_t aarch64_pstate_valid_mask(const ARMISARegisters *id) |
33 | .read_with_attrs = lqspi_read, | 30 | */ |
34 | .write_with_attrs = lqspi_write, | 31 | typedef struct ARMVAParameters { |
35 | .endianness = DEVICE_NATIVE_ENDIAN, | 32 | unsigned tsz : 8; |
36 | + .impl = { | 33 | + unsigned ps : 3; |
37 | + .min_access_size = 4, | 34 | unsigned select : 1; |
38 | + .max_access_size = 4, | 35 | bool tbi : 1; |
39 | + }, | 36 | bool epd : 1; |
40 | .valid = { | 37 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
41 | .min_access_size = 1, | 38 | index XXXXXXX..XXXXXXX 100644 |
42 | .max_access_size = 4 | 39 | --- a/target/arm/helper.c |
40 | +++ b/target/arm/helper.c | ||
41 | @@ -XXX,XX +XXX,XX @@ static uint8_t convert_stage2_attrs(CPUARMState *env, uint8_t s2attrs) | ||
42 | } | ||
43 | #endif /* !CONFIG_USER_ONLY */ | ||
44 | |||
45 | +/* This mapping is common between ID_AA64MMFR0.PARANGE and TCR_ELx.{I}PS. */ | ||
46 | +static const uint8_t pamax_map[] = { | ||
47 | + [0] = 32, | ||
48 | + [1] = 36, | ||
49 | + [2] = 40, | ||
50 | + [3] = 42, | ||
51 | + [4] = 44, | ||
52 | + [5] = 48, | ||
53 | +}; | ||
54 | + | ||
55 | /* The cpu-specific constant value of PAMax; also used by hw/arm/virt. */ | ||
56 | unsigned int arm_pamax(ARMCPU *cpu) | ||
57 | { | ||
58 | - static const unsigned int pamax_map[] = { | ||
59 | - [0] = 32, | ||
60 | - [1] = 36, | ||
61 | - [2] = 40, | ||
62 | - [3] = 42, | ||
63 | - [4] = 44, | ||
64 | - [5] = 48, | ||
65 | - }; | ||
66 | unsigned int parange = | ||
67 | FIELD_EX64(cpu->isar.id_aa64mmfr0, ID_AA64MMFR0, PARANGE); | ||
68 | |||
69 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
70 | { | ||
71 | uint64_t tcr = regime_tcr(env, mmu_idx)->raw_tcr; | ||
72 | bool epd, hpd, using16k, using64k, tsz_oob; | ||
73 | - int select, tsz, tbi, max_tsz, min_tsz; | ||
74 | + int select, tsz, tbi, max_tsz, min_tsz, ps; | ||
75 | |||
76 | if (!regime_has_2_ranges(mmu_idx)) { | ||
77 | select = 0; | ||
78 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
79 | hpd = extract32(tcr, 24, 1); | ||
80 | } | ||
81 | epd = false; | ||
82 | + ps = extract32(tcr, 16, 3); | ||
83 | } else { | ||
84 | /* | ||
85 | * Bit 55 is always between the two regions, and is canonical for | ||
86 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
87 | epd = extract32(tcr, 23, 1); | ||
88 | hpd = extract64(tcr, 42, 1); | ||
89 | } | ||
90 | + ps = extract64(tcr, 32, 3); | ||
91 | } | ||
92 | |||
93 | if (cpu_isar_feature(aa64_st, env_archcpu(env))) { | ||
94 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
95 | |||
96 | return (ARMVAParameters) { | ||
97 | .tsz = tsz, | ||
98 | + .ps = ps, | ||
99 | .select = select, | ||
100 | .tbi = tbi, | ||
101 | .epd = epd, | ||
102 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
103 | |||
104 | /* TODO: This code does not support shareability levels. */ | ||
105 | if (aarch64) { | ||
106 | + int ps; | ||
107 | + | ||
108 | param = aa64_va_parameters(env, address, mmu_idx, | ||
109 | access_type != MMU_INST_FETCH); | ||
110 | level = 0; | ||
111 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
112 | |||
113 | addrsize = 64 - 8 * param.tbi; | ||
114 | inputsize = 64 - param.tsz; | ||
115 | - outputsize = arm_pamax(cpu); | ||
116 | + | ||
117 | + /* | ||
118 | + * Bound PS by PARANGE to find the effective output address size. | ||
119 | + * ID_AA64MMFR0 is a read-only register so values outside of the | ||
120 | + * supported mappings can be considered an implementation error. | ||
121 | + */ | ||
122 | + ps = FIELD_EX64(cpu->isar.id_aa64mmfr0, ID_AA64MMFR0, PARANGE); | ||
123 | + ps = MIN(ps, param.ps); | ||
124 | + assert(ps < ARRAY_SIZE(pamax_map)); | ||
125 | + outputsize = pamax_map[ps]; | ||
126 | } else { | ||
127 | param = aa32_va_parameters(env, address, mmu_idx); | ||
128 | level = 1; | ||
129 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
130 | |||
131 | /* Now we can extract the actual base address from the TTBR */ | ||
132 | descaddr = extract64(ttbr, 0, 48); | ||
133 | + | ||
134 | + /* | ||
135 | + * If the base address is out of range, raise AddressSizeFault. | ||
136 | + * In the pseudocode, this is !IsZero(baseregister<47:outputsize>), | ||
137 | + * but we've just cleared the bits above 47, so simplify the test. | ||
138 | + */ | ||
139 | + if (descaddr >> outputsize) { | ||
140 | + level = 0; | ||
141 | + fault_type = ARMFault_AddressSize; | ||
142 | + goto do_fault; | ||
143 | + } | ||
144 | + | ||
145 | /* | ||
146 | * We rely on this masking to clear the RES0 bits at the bottom of the TTBR | ||
147 | * and also to mask out CnP (bit 0) which could validly be non-zero. | ||
148 | */ | ||
149 | descaddr &= ~indexmask; | ||
150 | |||
151 | - /* The address field in the descriptor goes up to bit 39 for ARMv7 | ||
152 | - * but up to bit 47 for ARMv8, but we use the descaddrmask | ||
153 | - * up to bit 39 for AArch32, because we don't need other bits in that case | ||
154 | - * to construct next descriptor address (anyway they should be all zeroes). | ||
155 | + /* | ||
156 | + * For AArch32, the address field in the descriptor goes up to bit 39 | ||
157 | + * for both v7 and v8. However, for v8 the SBZ bits [47:40] must be 0 | ||
158 | + * or an AddressSize fault is raised. So for v8 we extract those SBZ | ||
159 | + * bits as part of the address, which will be checked via outputsize. | ||
160 | + * For AArch64, the address field always goes up to bit 47 (with extra | ||
161 | + * bits for FEAT_LPA placed elsewhere). AArch64 implies v8. | ||
162 | */ | ||
163 | - descaddrmask = ((1ull << (aarch64 ? 48 : 40)) - 1) & | ||
164 | - ~indexmask_grainsize; | ||
165 | + if (arm_feature(env, ARM_FEATURE_V8)) { | ||
166 | + descaddrmask = MAKE_64BIT_MASK(0, 48); | ||
167 | + } else { | ||
168 | + descaddrmask = MAKE_64BIT_MASK(0, 40); | ||
169 | + } | ||
170 | + descaddrmask &= ~indexmask_grainsize; | ||
171 | |||
172 | /* Secure accesses start with the page table in secure memory and | ||
173 | * can be downgraded to non-secure at any step. Non-secure accesses | ||
174 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
175 | /* Invalid, or the Reserved level 3 encoding */ | ||
176 | goto do_fault; | ||
177 | } | ||
178 | + | ||
179 | descaddr = descriptor & descaddrmask; | ||
180 | + if (descaddr >> outputsize) { | ||
181 | + fault_type = ARMFault_AddressSize; | ||
182 | + goto do_fault; | ||
183 | + } | ||
184 | |||
185 | if ((descriptor & 2) && (level < 3)) { | ||
186 | /* Table entry. The top five bits are attributes which may | ||
43 | -- | 187 | -- |
44 | 2.20.1 | 188 | 2.25.1 |
45 | 189 | ||
46 | 190 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Richard Henderson <richard.henderson@linaro.org> | ||
1 | 2 | ||
3 | The original A.a revision of the AArch64 ARM required that we | ||
4 | force-extend the addresses in these registers from 49 bits. | ||
5 | This language has been loosened via a combination of IMPLEMENTATION | ||
6 | DEFINED and CONSTRAINTED UNPREDICTABLE to allow consideration of | ||
7 | the entire aligned address. | ||
8 | |||
9 | This means that we do not have to consider whether or not FEAT_LVA | ||
10 | is enabled, and decide from which bit an address might need to be | ||
11 | extended. | ||
12 | |||
13 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
14 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
15 | Message-id: 20220301215958.157011-9-richard.henderson@linaro.org | ||
16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
17 | --- | ||
18 | target/arm/helper.c | 32 ++++++++++++++++++++++++-------- | ||
19 | 1 file changed, 24 insertions(+), 8 deletions(-) | ||
20 | |||
21 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
22 | index XXXXXXX..XXXXXXX 100644 | ||
23 | --- a/target/arm/helper.c | ||
24 | +++ b/target/arm/helper.c | ||
25 | @@ -XXX,XX +XXX,XX @@ static void dbgwvr_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
26 | ARMCPU *cpu = env_archcpu(env); | ||
27 | int i = ri->crm; | ||
28 | |||
29 | - /* Bits [63:49] are hardwired to the value of bit [48]; that is, the | ||
30 | - * register reads and behaves as if values written are sign extended. | ||
31 | + /* | ||
32 | * Bits [1:0] are RES0. | ||
33 | + * | ||
34 | + * It is IMPLEMENTATION DEFINED whether [63:49] ([63:53] with FEAT_LVA) | ||
35 | + * are hardwired to the value of bit [48] ([52] with FEAT_LVA), or if | ||
36 | + * they contain the value written. It is CONSTRAINED UNPREDICTABLE | ||
37 | + * whether the RESS bits are ignored when comparing an address. | ||
38 | + * | ||
39 | + * Therefore we are allowed to compare the entire register, which lets | ||
40 | + * us avoid considering whether or not FEAT_LVA is actually enabled. | ||
41 | */ | ||
42 | - value = sextract64(value, 0, 49) & ~3ULL; | ||
43 | + value &= ~3ULL; | ||
44 | |||
45 | raw_write(env, ri, value); | ||
46 | hw_watchpoint_update(cpu, i); | ||
47 | @@ -XXX,XX +XXX,XX @@ void hw_breakpoint_update(ARMCPU *cpu, int n) | ||
48 | case 0: /* unlinked address match */ | ||
49 | case 1: /* linked address match */ | ||
50 | { | ||
51 | - /* Bits [63:49] are hardwired to the value of bit [48]; that is, | ||
52 | - * we behave as if the register was sign extended. Bits [1:0] are | ||
53 | - * RES0. The BAS field is used to allow setting breakpoints on 16 | ||
54 | - * bit wide instructions; it is CONSTRAINED UNPREDICTABLE whether | ||
55 | + /* | ||
56 | + * Bits [1:0] are RES0. | ||
57 | + * | ||
58 | + * It is IMPLEMENTATION DEFINED whether bits [63:49] | ||
59 | + * ([63:53] for FEAT_LVA) are hardwired to a copy of the sign bit | ||
60 | + * of the VA field ([48] or [52] for FEAT_LVA), or whether the | ||
61 | + * value is read as written. It is CONSTRAINED UNPREDICTABLE | ||
62 | + * whether the RESS bits are ignored when comparing an address. | ||
63 | + * Therefore we are allowed to compare the entire register, which | ||
64 | + * lets us avoid considering whether FEAT_LVA is actually enabled. | ||
65 | + * | ||
66 | + * The BAS field is used to allow setting breakpoints on 16-bit | ||
67 | + * wide instructions; it is CONSTRAINED UNPREDICTABLE whether | ||
68 | * a bp will fire if the addresses covered by the bp and the addresses | ||
69 | * covered by the insn overlap but the insn doesn't start at the | ||
70 | * start of the bp address range. We choose to require the insn and | ||
71 | @@ -XXX,XX +XXX,XX @@ void hw_breakpoint_update(ARMCPU *cpu, int n) | ||
72 | * See also figure D2-3 in the v8 ARM ARM (DDI0487A.c). | ||
73 | */ | ||
74 | int bas = extract64(bcr, 5, 4); | ||
75 | - addr = sextract64(bvr, 0, 49) & ~3ULL; | ||
76 | + addr = bvr & ~3ULL; | ||
77 | if (bas == 0) { | ||
78 | return; | ||
79 | } | ||
80 | -- | ||
81 | 2.25.1 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Richard Henderson <richard.henderson@linaro.org> | ||
1 | 2 | ||
3 | This feature is relatively small, as it applies only to | ||
4 | 64k pages and thus requires no additional changes to the | ||
5 | table descriptor walking algorithm, only a change to the | ||
6 | minimum TSZ (which is the inverse of the maximum virtual | ||
7 | address space size). | ||
8 | |||
9 | Note that this feature widens VBAR_ELx, but we already | ||
10 | treat the register as being 64 bits wide. | ||
11 | |||
12 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
13 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
14 | Message-id: 20220301215958.157011-10-richard.henderson@linaro.org | ||
15 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
16 | --- | ||
17 | docs/system/arm/emulation.rst | 1 + | ||
18 | target/arm/cpu-param.h | 2 +- | ||
19 | target/arm/cpu.h | 5 +++++ | ||
20 | target/arm/cpu64.c | 1 + | ||
21 | target/arm/helper.c | 9 ++++++++- | ||
22 | 5 files changed, 16 insertions(+), 2 deletions(-) | ||
23 | |||
24 | diff --git a/docs/system/arm/emulation.rst b/docs/system/arm/emulation.rst | ||
25 | index XXXXXXX..XXXXXXX 100644 | ||
26 | --- a/docs/system/arm/emulation.rst | ||
27 | +++ b/docs/system/arm/emulation.rst | ||
28 | @@ -XXX,XX +XXX,XX @@ the following architecture extensions: | ||
29 | - FEAT_LRCPC (Load-acquire RCpc instructions) | ||
30 | - FEAT_LRCPC2 (Load-acquire RCpc instructions v2) | ||
31 | - FEAT_LSE (Large System Extensions) | ||
32 | +- FEAT_LVA (Large Virtual Address space) | ||
33 | - FEAT_MTE (Memory Tagging Extension) | ||
34 | - FEAT_MTE2 (Memory Tagging Extension) | ||
35 | - FEAT_MTE3 (MTE Asymmetric Fault Handling) | ||
36 | diff --git a/target/arm/cpu-param.h b/target/arm/cpu-param.h | ||
37 | index XXXXXXX..XXXXXXX 100644 | ||
38 | --- a/target/arm/cpu-param.h | ||
39 | +++ b/target/arm/cpu-param.h | ||
40 | @@ -XXX,XX +XXX,XX @@ | ||
41 | #ifdef TARGET_AARCH64 | ||
42 | # define TARGET_LONG_BITS 64 | ||
43 | # define TARGET_PHYS_ADDR_SPACE_BITS 48 | ||
44 | -# define TARGET_VIRT_ADDR_SPACE_BITS 48 | ||
45 | +# define TARGET_VIRT_ADDR_SPACE_BITS 52 | ||
46 | #else | ||
47 | # define TARGET_LONG_BITS 32 | ||
48 | # define TARGET_PHYS_ADDR_SPACE_BITS 40 | ||
49 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
50 | index XXXXXXX..XXXXXXX 100644 | ||
51 | --- a/target/arm/cpu.h | ||
52 | +++ b/target/arm/cpu.h | ||
53 | @@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_ccidx(const ARMISARegisters *id) | ||
54 | return FIELD_EX64(id->id_aa64mmfr2, ID_AA64MMFR2, CCIDX) != 0; | ||
55 | } | ||
56 | |||
57 | +static inline bool isar_feature_aa64_lva(const ARMISARegisters *id) | ||
58 | +{ | ||
59 | + return FIELD_EX64(id->id_aa64mmfr2, ID_AA64MMFR2, VARANGE) != 0; | ||
60 | +} | ||
61 | + | ||
62 | static inline bool isar_feature_aa64_tts2uxn(const ARMISARegisters *id) | ||
63 | { | ||
64 | return FIELD_EX64(id->id_aa64mmfr1, ID_AA64MMFR1, XNX) != 0; | ||
65 | diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c | ||
66 | index XXXXXXX..XXXXXXX 100644 | ||
67 | --- a/target/arm/cpu64.c | ||
68 | +++ b/target/arm/cpu64.c | ||
69 | @@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj) | ||
70 | t = FIELD_DP64(t, ID_AA64MMFR2, UAO, 1); | ||
71 | t = FIELD_DP64(t, ID_AA64MMFR2, CNP, 1); /* TTCNP */ | ||
72 | t = FIELD_DP64(t, ID_AA64MMFR2, ST, 1); /* TTST */ | ||
73 | + t = FIELD_DP64(t, ID_AA64MMFR2, VARANGE, 1); /* FEAT_LVA */ | ||
74 | cpu->isar.id_aa64mmfr2 = t; | ||
75 | |||
76 | t = cpu->isar.id_aa64zfr0; | ||
77 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
78 | index XXXXXXX..XXXXXXX 100644 | ||
79 | --- a/target/arm/helper.c | ||
80 | +++ b/target/arm/helper.c | ||
81 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
82 | } else { | ||
83 | max_tsz = 39; | ||
84 | } | ||
85 | - min_tsz = 16; /* TODO: ARMv8.2-LVA */ | ||
86 | + | ||
87 | + min_tsz = 16; | ||
88 | + if (using64k) { | ||
89 | + if (cpu_isar_feature(aa64_lva, env_archcpu(env))) { | ||
90 | + min_tsz = 12; | ||
91 | + } | ||
92 | + } | ||
93 | + /* TODO: FEAT_LPA2 */ | ||
94 | |||
95 | if (tsz > max_tsz) { | ||
96 | tsz = max_tsz; | ||
97 | -- | ||
98 | 2.25.1 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Richard Henderson <richard.henderson@linaro.org> | ||
1 | 2 | ||
3 | This feature widens physical addresses (and intermediate physical | ||
4 | addresses for 2-stage translation) from 48 to 52 bits, when using | ||
5 | 64k pages. The only thing left at this point is to handle the | ||
6 | extra bits in the TTBR and in the table descriptors. | ||
7 | |||
8 | Note that PAR_EL1 and HPFAR_EL2 are nominally extended, but we don't | ||
9 | mask out the high bits when writing to those registers, so no changes | ||
10 | are required there. | ||
11 | |||
12 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
13 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
14 | Message-id: 20220301215958.157011-11-richard.henderson@linaro.org | ||
15 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
16 | --- | ||
17 | docs/system/arm/emulation.rst | 1 + | ||
18 | target/arm/cpu-param.h | 2 +- | ||
19 | target/arm/cpu64.c | 2 +- | ||
20 | target/arm/helper.c | 19 ++++++++++++++++--- | ||
21 | 4 files changed, 19 insertions(+), 5 deletions(-) | ||
22 | |||
23 | diff --git a/docs/system/arm/emulation.rst b/docs/system/arm/emulation.rst | ||
24 | index XXXXXXX..XXXXXXX 100644 | ||
25 | --- a/docs/system/arm/emulation.rst | ||
26 | +++ b/docs/system/arm/emulation.rst | ||
27 | @@ -XXX,XX +XXX,XX @@ the following architecture extensions: | ||
28 | - FEAT_I8MM (AArch64 Int8 matrix multiplication instructions) | ||
29 | - FEAT_JSCVT (JavaScript conversion instructions) | ||
30 | - FEAT_LOR (Limited ordering regions) | ||
31 | +- FEAT_LPA (Large Physical Address space) | ||
32 | - FEAT_LRCPC (Load-acquire RCpc instructions) | ||
33 | - FEAT_LRCPC2 (Load-acquire RCpc instructions v2) | ||
34 | - FEAT_LSE (Large System Extensions) | ||
35 | diff --git a/target/arm/cpu-param.h b/target/arm/cpu-param.h | ||
36 | index XXXXXXX..XXXXXXX 100644 | ||
37 | --- a/target/arm/cpu-param.h | ||
38 | +++ b/target/arm/cpu-param.h | ||
39 | @@ -XXX,XX +XXX,XX @@ | ||
40 | |||
41 | #ifdef TARGET_AARCH64 | ||
42 | # define TARGET_LONG_BITS 64 | ||
43 | -# define TARGET_PHYS_ADDR_SPACE_BITS 48 | ||
44 | +# define TARGET_PHYS_ADDR_SPACE_BITS 52 | ||
45 | # define TARGET_VIRT_ADDR_SPACE_BITS 52 | ||
46 | #else | ||
47 | # define TARGET_LONG_BITS 32 | ||
48 | diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c | ||
49 | index XXXXXXX..XXXXXXX 100644 | ||
50 | --- a/target/arm/cpu64.c | ||
51 | +++ b/target/arm/cpu64.c | ||
52 | @@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj) | ||
53 | cpu->isar.id_aa64pfr1 = t; | ||
54 | |||
55 | t = cpu->isar.id_aa64mmfr0; | ||
56 | - t = FIELD_DP64(t, ID_AA64MMFR0, PARANGE, 5); /* PARange: 48 bits */ | ||
57 | + t = FIELD_DP64(t, ID_AA64MMFR0, PARANGE, 6); /* FEAT_LPA: 52 bits */ | ||
58 | cpu->isar.id_aa64mmfr0 = t; | ||
59 | |||
60 | t = cpu->isar.id_aa64mmfr1; | ||
61 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
62 | index XXXXXXX..XXXXXXX 100644 | ||
63 | --- a/target/arm/helper.c | ||
64 | +++ b/target/arm/helper.c | ||
65 | @@ -XXX,XX +XXX,XX @@ static const uint8_t pamax_map[] = { | ||
66 | [3] = 42, | ||
67 | [4] = 44, | ||
68 | [5] = 48, | ||
69 | + [6] = 52, | ||
70 | }; | ||
71 | |||
72 | /* The cpu-specific constant value of PAMax; also used by hw/arm/virt. */ | ||
73 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
74 | descaddr = extract64(ttbr, 0, 48); | ||
75 | |||
76 | /* | ||
77 | - * If the base address is out of range, raise AddressSizeFault. | ||
78 | + * For FEAT_LPA and PS=6, bits [51:48] of descaddr are in [5:2] of TTBR. | ||
79 | + * | ||
80 | + * Otherwise, if the base address is out of range, raise AddressSizeFault. | ||
81 | * In the pseudocode, this is !IsZero(baseregister<47:outputsize>), | ||
82 | * but we've just cleared the bits above 47, so simplify the test. | ||
83 | */ | ||
84 | - if (descaddr >> outputsize) { | ||
85 | + if (outputsize > 48) { | ||
86 | + descaddr |= extract64(ttbr, 2, 4) << 48; | ||
87 | + } else if (descaddr >> outputsize) { | ||
88 | level = 0; | ||
89 | fault_type = ARMFault_AddressSize; | ||
90 | goto do_fault; | ||
91 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
92 | } | ||
93 | |||
94 | descaddr = descriptor & descaddrmask; | ||
95 | - if (descaddr >> outputsize) { | ||
96 | + | ||
97 | + /* | ||
98 | + * For FEAT_LPA and PS=6, bits [51:48] of descaddr are in [15:12] | ||
99 | + * of descriptor. Otherwise, if descaddr is out of range, raise | ||
100 | + * AddressSizeFault. | ||
101 | + */ | ||
102 | + if (outputsize > 48) { | ||
103 | + descaddr |= extract64(descriptor, 12, 4) << 48; | ||
104 | + } else if (descaddr >> outputsize) { | ||
105 | fault_type = ARMFault_AddressSize; | ||
106 | goto do_fault; | ||
107 | } | ||
108 | -- | ||
109 | 2.25.1 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Richard Henderson <richard.henderson@linaro.org> | ||
1 | 2 | ||
3 | With FEAT_LPA2, rather than introducing translation level 4, | ||
4 | we introduce level -1, below the current level 0. Extend | ||
5 | arm_fi_to_lfsc to handle these faults. | ||
6 | |||
7 | Assert that this new translation level does not leak into | ||
8 | fault types for which it is not defined, which allows some | ||
9 | masking of fi->level to be removed. | ||
10 | |||
11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
13 | Message-id: 20220301215958.157011-12-richard.henderson@linaro.org | ||
14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
15 | --- | ||
16 | target/arm/internals.h | 35 +++++++++++++++++++++++++++++------ | ||
17 | 1 file changed, 29 insertions(+), 6 deletions(-) | ||
18 | |||
19 | diff --git a/target/arm/internals.h b/target/arm/internals.h | ||
20 | index XXXXXXX..XXXXXXX 100644 | ||
21 | --- a/target/arm/internals.h | ||
22 | +++ b/target/arm/internals.h | ||
23 | @@ -XXX,XX +XXX,XX @@ static inline uint32_t arm_fi_to_lfsc(ARMMMUFaultInfo *fi) | ||
24 | case ARMFault_None: | ||
25 | return 0; | ||
26 | case ARMFault_AddressSize: | ||
27 | - fsc = fi->level & 3; | ||
28 | + assert(fi->level >= -1 && fi->level <= 3); | ||
29 | + if (fi->level < 0) { | ||
30 | + fsc = 0b101001; | ||
31 | + } else { | ||
32 | + fsc = fi->level; | ||
33 | + } | ||
34 | break; | ||
35 | case ARMFault_AccessFlag: | ||
36 | - fsc = (fi->level & 3) | (0x2 << 2); | ||
37 | + assert(fi->level >= 0 && fi->level <= 3); | ||
38 | + fsc = 0b001000 | fi->level; | ||
39 | break; | ||
40 | case ARMFault_Permission: | ||
41 | - fsc = (fi->level & 3) | (0x3 << 2); | ||
42 | + assert(fi->level >= 0 && fi->level <= 3); | ||
43 | + fsc = 0b001100 | fi->level; | ||
44 | break; | ||
45 | case ARMFault_Translation: | ||
46 | - fsc = (fi->level & 3) | (0x1 << 2); | ||
47 | + assert(fi->level >= -1 && fi->level <= 3); | ||
48 | + if (fi->level < 0) { | ||
49 | + fsc = 0b101011; | ||
50 | + } else { | ||
51 | + fsc = 0b000100 | fi->level; | ||
52 | + } | ||
53 | break; | ||
54 | case ARMFault_SyncExternal: | ||
55 | fsc = 0x10 | (fi->ea << 12); | ||
56 | break; | ||
57 | case ARMFault_SyncExternalOnWalk: | ||
58 | - fsc = (fi->level & 3) | (0x5 << 2) | (fi->ea << 12); | ||
59 | + assert(fi->level >= -1 && fi->level <= 3); | ||
60 | + if (fi->level < 0) { | ||
61 | + fsc = 0b010011; | ||
62 | + } else { | ||
63 | + fsc = 0b010100 | fi->level; | ||
64 | + } | ||
65 | + fsc |= fi->ea << 12; | ||
66 | break; | ||
67 | case ARMFault_SyncParity: | ||
68 | fsc = 0x18; | ||
69 | break; | ||
70 | case ARMFault_SyncParityOnWalk: | ||
71 | - fsc = (fi->level & 3) | (0x7 << 2); | ||
72 | + assert(fi->level >= -1 && fi->level <= 3); | ||
73 | + if (fi->level < 0) { | ||
74 | + fsc = 0b011011; | ||
75 | + } else { | ||
76 | + fsc = 0b011100 | fi->level; | ||
77 | + } | ||
78 | break; | ||
79 | case ARMFault_AsyncParity: | ||
80 | fsc = 0x19; | ||
81 | -- | ||
82 | 2.25.1 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Richard Henderson <richard.henderson@linaro.org> | ||
1 | 2 | ||
3 | Merge tlbi_aa64_range_get_length and tlbi_aa64_range_get_base, | ||
4 | returning a structure containing both results. Pass in the | ||
5 | ARMMMUIdx, rather than the digested two_ranges boolean. | ||
6 | |||
7 | This is in preparation for FEAT_LPA2, where the interpretation | ||
8 | of 'value' depends on the effective value of DS for the regime. | ||
9 | |||
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
12 | Message-id: 20220301215958.157011-13-richard.henderson@linaro.org | ||
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
14 | --- | ||
15 | target/arm/helper.c | 58 +++++++++++++++++++-------------------------- | ||
16 | 1 file changed, 24 insertions(+), 34 deletions(-) | ||
17 | |||
18 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
19 | index XXXXXXX..XXXXXXX 100644 | ||
20 | --- a/target/arm/helper.c | ||
21 | +++ b/target/arm/helper.c | ||
22 | @@ -XXX,XX +XXX,XX @@ static void tlbi_aa64_vae3is_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
23 | } | ||
24 | |||
25 | #ifdef TARGET_AARCH64 | ||
26 | -static uint64_t tlbi_aa64_range_get_length(CPUARMState *env, | ||
27 | - uint64_t value) | ||
28 | -{ | ||
29 | - unsigned int page_shift; | ||
30 | - unsigned int page_size_granule; | ||
31 | - uint64_t num; | ||
32 | - uint64_t scale; | ||
33 | - uint64_t exponent; | ||
34 | +typedef struct { | ||
35 | + uint64_t base; | ||
36 | uint64_t length; | ||
37 | +} TLBIRange; | ||
38 | + | ||
39 | +static TLBIRange tlbi_aa64_get_range(CPUARMState *env, ARMMMUIdx mmuidx, | ||
40 | + uint64_t value) | ||
41 | +{ | ||
42 | + unsigned int page_size_granule, page_shift, num, scale, exponent; | ||
43 | + TLBIRange ret = { }; | ||
44 | |||
45 | - num = extract64(value, 39, 5); | ||
46 | - scale = extract64(value, 44, 2); | ||
47 | page_size_granule = extract64(value, 46, 2); | ||
48 | |||
49 | if (page_size_granule == 0) { | ||
50 | qemu_log_mask(LOG_GUEST_ERROR, "Invalid page size granule %d\n", | ||
51 | page_size_granule); | ||
52 | - return 0; | ||
53 | + return ret; | ||
54 | } | ||
55 | |||
56 | page_shift = (page_size_granule - 1) * 2 + 12; | ||
57 | - | ||
58 | + num = extract64(value, 39, 5); | ||
59 | + scale = extract64(value, 44, 2); | ||
60 | exponent = (5 * scale) + 1; | ||
61 | - length = (num + 1) << (exponent + page_shift); | ||
62 | |||
63 | - return length; | ||
64 | -} | ||
65 | + ret.length = (num + 1) << (exponent + page_shift); | ||
66 | |||
67 | -static uint64_t tlbi_aa64_range_get_base(CPUARMState *env, uint64_t value, | ||
68 | - bool two_ranges) | ||
69 | -{ | ||
70 | - /* TODO: ARMv8.7 FEAT_LPA2 */ | ||
71 | - uint64_t pageaddr; | ||
72 | - | ||
73 | - if (two_ranges) { | ||
74 | - pageaddr = sextract64(value, 0, 37) << TARGET_PAGE_BITS; | ||
75 | + if (regime_has_2_ranges(mmuidx)) { | ||
76 | + ret.base = sextract64(value, 0, 37) << TARGET_PAGE_BITS; | ||
77 | } else { | ||
78 | - pageaddr = extract64(value, 0, 37) << TARGET_PAGE_BITS; | ||
79 | + ret.base = extract64(value, 0, 37) << TARGET_PAGE_BITS; | ||
80 | } | ||
81 | |||
82 | - return pageaddr; | ||
83 | + return ret; | ||
84 | } | ||
85 | |||
86 | static void do_rvae_write(CPUARMState *env, uint64_t value, | ||
87 | int idxmap, bool synced) | ||
88 | { | ||
89 | ARMMMUIdx one_idx = ARM_MMU_IDX_A | ctz32(idxmap); | ||
90 | - bool two_ranges = regime_has_2_ranges(one_idx); | ||
91 | - uint64_t baseaddr, length; | ||
92 | + TLBIRange range; | ||
93 | int bits; | ||
94 | |||
95 | - baseaddr = tlbi_aa64_range_get_base(env, value, two_ranges); | ||
96 | - length = tlbi_aa64_range_get_length(env, value); | ||
97 | - bits = tlbbits_for_regime(env, one_idx, baseaddr); | ||
98 | + range = tlbi_aa64_get_range(env, one_idx, value); | ||
99 | + bits = tlbbits_for_regime(env, one_idx, range.base); | ||
100 | |||
101 | if (synced) { | ||
102 | tlb_flush_range_by_mmuidx_all_cpus_synced(env_cpu(env), | ||
103 | - baseaddr, | ||
104 | - length, | ||
105 | + range.base, | ||
106 | + range.length, | ||
107 | idxmap, | ||
108 | bits); | ||
109 | } else { | ||
110 | - tlb_flush_range_by_mmuidx(env_cpu(env), baseaddr, | ||
111 | - length, idxmap, bits); | ||
112 | + tlb_flush_range_by_mmuidx(env_cpu(env), range.base, | ||
113 | + range.length, idxmap, bits); | ||
114 | } | ||
115 | } | ||
116 | |||
117 | -- | ||
118 | 2.25.1 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Richard Henderson <richard.henderson@linaro.org> | ||
1 | 2 | ||
3 | The shift of the BaseADDR field depends on the translation | ||
4 | granule in use. | ||
5 | |||
6 | Fixes: 84940ed8255 ("target/arm: Add support for FEAT_TLBIRANGE") | ||
7 | Reported-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
10 | Message-id: 20220301215958.157011-14-richard.henderson@linaro.org | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | --- | ||
13 | target/arm/helper.c | 5 +++-- | ||
14 | 1 file changed, 3 insertions(+), 2 deletions(-) | ||
15 | |||
16 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
17 | index XXXXXXX..XXXXXXX 100644 | ||
18 | --- a/target/arm/helper.c | ||
19 | +++ b/target/arm/helper.c | ||
20 | @@ -XXX,XX +XXX,XX @@ static TLBIRange tlbi_aa64_get_range(CPUARMState *env, ARMMMUIdx mmuidx, | ||
21 | ret.length = (num + 1) << (exponent + page_shift); | ||
22 | |||
23 | if (regime_has_2_ranges(mmuidx)) { | ||
24 | - ret.base = sextract64(value, 0, 37) << TARGET_PAGE_BITS; | ||
25 | + ret.base = sextract64(value, 0, 37); | ||
26 | } else { | ||
27 | - ret.base = extract64(value, 0, 37) << TARGET_PAGE_BITS; | ||
28 | + ret.base = extract64(value, 0, 37); | ||
29 | } | ||
30 | + ret.base <<= page_shift; | ||
31 | |||
32 | return ret; | ||
33 | } | ||
34 | -- | ||
35 | 2.25.1 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Richard Henderson <richard.henderson@linaro.org> | ||
1 | 2 | ||
3 | For FEAT_LPA2, we will need other ARMVAParameters, which themselves | ||
4 | depend on the translation granule in use. We might as well validate | ||
5 | that the given TG matches; the architecture "does not require that | ||
6 | the instruction invalidates any entries" if this is not true. | ||
7 | |||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
10 | Message-id: 20220301215958.157011-15-richard.henderson@linaro.org | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | --- | ||
13 | target/arm/helper.c | 10 +++++++--- | ||
14 | 1 file changed, 7 insertions(+), 3 deletions(-) | ||
15 | |||
16 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
17 | index XXXXXXX..XXXXXXX 100644 | ||
18 | --- a/target/arm/helper.c | ||
19 | +++ b/target/arm/helper.c | ||
20 | @@ -XXX,XX +XXX,XX @@ static TLBIRange tlbi_aa64_get_range(CPUARMState *env, ARMMMUIdx mmuidx, | ||
21 | uint64_t value) | ||
22 | { | ||
23 | unsigned int page_size_granule, page_shift, num, scale, exponent; | ||
24 | + /* Extract one bit to represent the va selector in use. */ | ||
25 | + uint64_t select = sextract64(value, 36, 1); | ||
26 | + ARMVAParameters param = aa64_va_parameters(env, select, mmuidx, true); | ||
27 | TLBIRange ret = { }; | ||
28 | |||
29 | page_size_granule = extract64(value, 46, 2); | ||
30 | |||
31 | - if (page_size_granule == 0) { | ||
32 | - qemu_log_mask(LOG_GUEST_ERROR, "Invalid page size granule %d\n", | ||
33 | + /* The granule encoded in value must match the granule in use. */ | ||
34 | + if (page_size_granule != (param.using64k ? 3 : param.using16k ? 2 : 1)) { | ||
35 | + qemu_log_mask(LOG_GUEST_ERROR, "Invalid tlbi page size granule %d\n", | ||
36 | page_size_granule); | ||
37 | return ret; | ||
38 | } | ||
39 | @@ -XXX,XX +XXX,XX @@ static TLBIRange tlbi_aa64_get_range(CPUARMState *env, ARMMMUIdx mmuidx, | ||
40 | |||
41 | ret.length = (num + 1) << (exponent + page_shift); | ||
42 | |||
43 | - if (regime_has_2_ranges(mmuidx)) { | ||
44 | + if (param.select) { | ||
45 | ret.base = sextract64(value, 0, 37); | ||
46 | } else { | ||
47 | ret.base = extract64(value, 0, 37); | ||
48 | -- | ||
49 | 2.25.1 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | From: Richard Henderson <richard.henderson@linaro.org> | ||
1 | 2 | ||
3 | We support 16k pages, but do not advertize that in ID_AA64MMFR0. | ||
4 | |||
5 | The value 0 in the TGRAN*_2 fields indicates that stage2 lookups defer | ||
6 | to the same support as stage1 lookups. This setting is deprecated, so | ||
7 | indicate support for all stage2 page sizes directly. | ||
8 | |||
9 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | Message-id: 20220301215958.157011-16-richard.henderson@linaro.org | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
13 | --- | ||
14 | target/arm/cpu64.c | 4 ++++ | ||
15 | 1 file changed, 4 insertions(+) | ||
16 | |||
17 | diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c | ||
18 | index XXXXXXX..XXXXXXX 100644 | ||
19 | --- a/target/arm/cpu64.c | ||
20 | +++ b/target/arm/cpu64.c | ||
21 | @@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj) | ||
22 | |||
23 | t = cpu->isar.id_aa64mmfr0; | ||
24 | t = FIELD_DP64(t, ID_AA64MMFR0, PARANGE, 6); /* FEAT_LPA: 52 bits */ | ||
25 | + t = FIELD_DP64(t, ID_AA64MMFR0, TGRAN16, 1); /* 16k pages supported */ | ||
26 | + t = FIELD_DP64(t, ID_AA64MMFR0, TGRAN16_2, 2); /* 16k stage2 supported */ | ||
27 | + t = FIELD_DP64(t, ID_AA64MMFR0, TGRAN64_2, 2); /* 64k stage2 supported */ | ||
28 | + t = FIELD_DP64(t, ID_AA64MMFR0, TGRAN4_2, 2); /* 4k stage2 supported */ | ||
29 | cpu->isar.id_aa64mmfr0 = t; | ||
30 | |||
31 | t = cpu->isar.id_aa64mmfr1; | ||
32 | -- | ||
33 | 2.25.1 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | 1 | From: Richard Henderson <richard.henderson@linaro.org> | |
2 | |||
3 | This feature widens physical addresses (and intermediate physical | ||
4 | addresses for 2-stage translation) from 48 to 52 bits, when using | ||
5 | 4k or 16k pages. | ||
6 | |||
7 | This introduces the DS bit to TCR_ELx, which is RES0 unless the | ||
8 | page size is enabled and supports LPA2, resulting in the effective | ||
9 | value of DS for a given table walk. The DS bit changes the format | ||
10 | of the page table descriptor slightly, moving the PS field out to | ||
11 | TCR so that all pages have the same sharability and repurposing | ||
12 | those bits of the page table descriptor for the highest bits of | ||
13 | the output address. | ||
14 | |||
15 | Do not yet enable FEAT_LPA2; we need extra plumbing to avoid | ||
16 | tickling an old kernel bug. | ||
17 | |||
18 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
19 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
20 | Message-id: 20220301215958.157011-17-richard.henderson@linaro.org | ||
21 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
22 | --- | ||
23 | docs/system/arm/emulation.rst | 1 + | ||
24 | target/arm/cpu.h | 22 ++++++++ | ||
25 | target/arm/internals.h | 2 + | ||
26 | target/arm/helper.c | 102 +++++++++++++++++++++++++++++----- | ||
27 | 4 files changed, 112 insertions(+), 15 deletions(-) | ||
28 | |||
29 | diff --git a/docs/system/arm/emulation.rst b/docs/system/arm/emulation.rst | ||
30 | index XXXXXXX..XXXXXXX 100644 | ||
31 | --- a/docs/system/arm/emulation.rst | ||
32 | +++ b/docs/system/arm/emulation.rst | ||
33 | @@ -XXX,XX +XXX,XX @@ the following architecture extensions: | ||
34 | - FEAT_JSCVT (JavaScript conversion instructions) | ||
35 | - FEAT_LOR (Limited ordering regions) | ||
36 | - FEAT_LPA (Large Physical Address space) | ||
37 | +- FEAT_LPA2 (Large Physical and virtual Address space v2) | ||
38 | - FEAT_LRCPC (Load-acquire RCpc instructions) | ||
39 | - FEAT_LRCPC2 (Load-acquire RCpc instructions v2) | ||
40 | - FEAT_LSE (Large System Extensions) | ||
41 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
42 | index XXXXXXX..XXXXXXX 100644 | ||
43 | --- a/target/arm/cpu.h | ||
44 | +++ b/target/arm/cpu.h | ||
45 | @@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_i8mm(const ARMISARegisters *id) | ||
46 | return FIELD_EX64(id->id_aa64isar1, ID_AA64ISAR1, I8MM) != 0; | ||
47 | } | ||
48 | |||
49 | +static inline bool isar_feature_aa64_tgran4_lpa2(const ARMISARegisters *id) | ||
50 | +{ | ||
51 | + return FIELD_SEX64(id->id_aa64mmfr0, ID_AA64MMFR0, TGRAN4) >= 1; | ||
52 | +} | ||
53 | + | ||
54 | +static inline bool isar_feature_aa64_tgran4_2_lpa2(const ARMISARegisters *id) | ||
55 | +{ | ||
56 | + unsigned t = FIELD_EX64(id->id_aa64mmfr0, ID_AA64MMFR0, TGRAN4_2); | ||
57 | + return t >= 3 || (t == 0 && isar_feature_aa64_tgran4_lpa2(id)); | ||
58 | +} | ||
59 | + | ||
60 | +static inline bool isar_feature_aa64_tgran16_lpa2(const ARMISARegisters *id) | ||
61 | +{ | ||
62 | + return FIELD_EX64(id->id_aa64mmfr0, ID_AA64MMFR0, TGRAN16) >= 2; | ||
63 | +} | ||
64 | + | ||
65 | +static inline bool isar_feature_aa64_tgran16_2_lpa2(const ARMISARegisters *id) | ||
66 | +{ | ||
67 | + unsigned t = FIELD_EX64(id->id_aa64mmfr0, ID_AA64MMFR0, TGRAN16_2); | ||
68 | + return t >= 3 || (t == 0 && isar_feature_aa64_tgran16_lpa2(id)); | ||
69 | +} | ||
70 | + | ||
71 | static inline bool isar_feature_aa64_ccidx(const ARMISARegisters *id) | ||
72 | { | ||
73 | return FIELD_EX64(id->id_aa64mmfr2, ID_AA64MMFR2, CCIDX) != 0; | ||
74 | diff --git a/target/arm/internals.h b/target/arm/internals.h | ||
75 | index XXXXXXX..XXXXXXX 100644 | ||
76 | --- a/target/arm/internals.h | ||
77 | +++ b/target/arm/internals.h | ||
78 | @@ -XXX,XX +XXX,XX @@ static inline uint32_t aarch64_pstate_valid_mask(const ARMISARegisters *id) | ||
79 | typedef struct ARMVAParameters { | ||
80 | unsigned tsz : 8; | ||
81 | unsigned ps : 3; | ||
82 | + unsigned sh : 2; | ||
83 | unsigned select : 1; | ||
84 | bool tbi : 1; | ||
85 | bool epd : 1; | ||
86 | @@ -XXX,XX +XXX,XX @@ typedef struct ARMVAParameters { | ||
87 | bool using16k : 1; | ||
88 | bool using64k : 1; | ||
89 | bool tsz_oob : 1; /* tsz has been clamped to legal range */ | ||
90 | + bool ds : 1; | ||
91 | } ARMVAParameters; | ||
92 | |||
93 | ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
94 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
95 | index XXXXXXX..XXXXXXX 100644 | ||
96 | --- a/target/arm/helper.c | ||
97 | +++ b/target/arm/helper.c | ||
98 | @@ -XXX,XX +XXX,XX @@ static TLBIRange tlbi_aa64_get_range(CPUARMState *env, ARMMMUIdx mmuidx, | ||
99 | } else { | ||
100 | ret.base = extract64(value, 0, 37); | ||
101 | } | ||
102 | + if (param.ds) { | ||
103 | + /* | ||
104 | + * With DS=1, BaseADDR is always shifted 16 so that it is able | ||
105 | + * to address all 52 va bits. The input address is perforce | ||
106 | + * aligned on a 64k boundary regardless of translation granule. | ||
107 | + */ | ||
108 | + page_shift = 16; | ||
109 | + } | ||
110 | ret.base <<= page_shift; | ||
111 | |||
112 | return ret; | ||
113 | @@ -XXX,XX +XXX,XX @@ static bool check_s2_mmu_setup(ARMCPU *cpu, bool is_aa64, int level, | ||
114 | const int grainsize = stride + 3; | ||
115 | int startsizecheck; | ||
116 | |||
117 | - /* Negative levels are never allowed. */ | ||
118 | - if (level < 0) { | ||
119 | + /* | ||
120 | + * Negative levels are usually not allowed... | ||
121 | + * Except for FEAT_LPA2, 4k page table, 52-bit address space, which | ||
122 | + * begins with level -1. Note that previous feature tests will have | ||
123 | + * eliminated this combination if it is not enabled. | ||
124 | + */ | ||
125 | + if (level < (inputsize == 52 && stride == 9 ? -1 : 0)) { | ||
126 | return false; | ||
127 | } | ||
128 | |||
129 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
130 | ARMMMUIdx mmu_idx, bool data) | ||
131 | { | ||
132 | uint64_t tcr = regime_tcr(env, mmu_idx)->raw_tcr; | ||
133 | - bool epd, hpd, using16k, using64k, tsz_oob; | ||
134 | - int select, tsz, tbi, max_tsz, min_tsz, ps; | ||
135 | + bool epd, hpd, using16k, using64k, tsz_oob, ds; | ||
136 | + int select, tsz, tbi, max_tsz, min_tsz, ps, sh; | ||
137 | + ARMCPU *cpu = env_archcpu(env); | ||
138 | |||
139 | if (!regime_has_2_ranges(mmu_idx)) { | ||
140 | select = 0; | ||
141 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
142 | hpd = extract32(tcr, 24, 1); | ||
143 | } | ||
144 | epd = false; | ||
145 | + sh = extract32(tcr, 12, 2); | ||
146 | ps = extract32(tcr, 16, 3); | ||
147 | + ds = extract64(tcr, 32, 1); | ||
148 | } else { | ||
149 | /* | ||
150 | * Bit 55 is always between the two regions, and is canonical for | ||
151 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
152 | if (!select) { | ||
153 | tsz = extract32(tcr, 0, 6); | ||
154 | epd = extract32(tcr, 7, 1); | ||
155 | + sh = extract32(tcr, 12, 2); | ||
156 | using64k = extract32(tcr, 14, 1); | ||
157 | using16k = extract32(tcr, 15, 1); | ||
158 | hpd = extract64(tcr, 41, 1); | ||
159 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
160 | using64k = tg == 3; | ||
161 | tsz = extract32(tcr, 16, 6); | ||
162 | epd = extract32(tcr, 23, 1); | ||
163 | + sh = extract32(tcr, 28, 2); | ||
164 | hpd = extract64(tcr, 42, 1); | ||
165 | } | ||
166 | ps = extract64(tcr, 32, 3); | ||
167 | + ds = extract64(tcr, 59, 1); | ||
168 | } | ||
169 | |||
170 | - if (cpu_isar_feature(aa64_st, env_archcpu(env))) { | ||
171 | + if (cpu_isar_feature(aa64_st, cpu)) { | ||
172 | max_tsz = 48 - using64k; | ||
173 | } else { | ||
174 | max_tsz = 39; | ||
175 | } | ||
176 | |||
177 | + /* | ||
178 | + * DS is RES0 unless FEAT_LPA2 is supported for the given page size; | ||
179 | + * adjust the effective value of DS, as documented. | ||
180 | + */ | ||
181 | min_tsz = 16; | ||
182 | if (using64k) { | ||
183 | - if (cpu_isar_feature(aa64_lva, env_archcpu(env))) { | ||
184 | + if (cpu_isar_feature(aa64_lva, cpu)) { | ||
185 | + min_tsz = 12; | ||
186 | + } | ||
187 | + ds = false; | ||
188 | + } else if (ds) { | ||
189 | + switch (mmu_idx) { | ||
190 | + case ARMMMUIdx_Stage2: | ||
191 | + case ARMMMUIdx_Stage2_S: | ||
192 | + if (using16k) { | ||
193 | + ds = cpu_isar_feature(aa64_tgran16_2_lpa2, cpu); | ||
194 | + } else { | ||
195 | + ds = cpu_isar_feature(aa64_tgran4_2_lpa2, cpu); | ||
196 | + } | ||
197 | + break; | ||
198 | + default: | ||
199 | + if (using16k) { | ||
200 | + ds = cpu_isar_feature(aa64_tgran16_lpa2, cpu); | ||
201 | + } else { | ||
202 | + ds = cpu_isar_feature(aa64_tgran4_lpa2, cpu); | ||
203 | + } | ||
204 | + break; | ||
205 | + } | ||
206 | + if (ds) { | ||
207 | min_tsz = 12; | ||
208 | } | ||
209 | } | ||
210 | - /* TODO: FEAT_LPA2 */ | ||
211 | |||
212 | if (tsz > max_tsz) { | ||
213 | tsz = max_tsz; | ||
214 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
215 | return (ARMVAParameters) { | ||
216 | .tsz = tsz, | ||
217 | .ps = ps, | ||
218 | + .sh = sh, | ||
219 | .select = select, | ||
220 | .tbi = tbi, | ||
221 | .epd = epd, | ||
222 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
223 | .using16k = using16k, | ||
224 | .using64k = using64k, | ||
225 | .tsz_oob = tsz_oob, | ||
226 | + .ds = ds, | ||
227 | }; | ||
228 | } | ||
229 | |||
230 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
231 | * VTCR_EL2.SL0 field (whose interpretation depends on the page size) | ||
232 | */ | ||
233 | uint32_t sl0 = extract32(tcr->raw_tcr, 6, 2); | ||
234 | + uint32_t sl2 = extract64(tcr->raw_tcr, 33, 1); | ||
235 | uint32_t startlevel; | ||
236 | bool ok; | ||
237 | |||
238 | - if (!aarch64 || stride == 9) { | ||
239 | + /* SL2 is RES0 unless DS=1 & 4kb granule. */ | ||
240 | + if (param.ds && stride == 9 && sl2) { | ||
241 | + if (sl0 != 0) { | ||
242 | + level = 0; | ||
243 | + fault_type = ARMFault_Translation; | ||
244 | + goto do_fault; | ||
245 | + } | ||
246 | + startlevel = -1; | ||
247 | + } else if (!aarch64 || stride == 9) { | ||
248 | /* AArch32 or 4KB pages */ | ||
249 | startlevel = 2 - sl0; | ||
250 | |||
251 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
252 | * for both v7 and v8. However, for v8 the SBZ bits [47:40] must be 0 | ||
253 | * or an AddressSize fault is raised. So for v8 we extract those SBZ | ||
254 | * bits as part of the address, which will be checked via outputsize. | ||
255 | - * For AArch64, the address field always goes up to bit 47 (with extra | ||
256 | - * bits for FEAT_LPA placed elsewhere). AArch64 implies v8. | ||
257 | + * For AArch64, the address field goes up to bit 47, or 49 with FEAT_LPA2; | ||
258 | + * the highest bits of a 52-bit output are placed elsewhere. | ||
259 | */ | ||
260 | - if (arm_feature(env, ARM_FEATURE_V8)) { | ||
261 | + if (param.ds) { | ||
262 | + descaddrmask = MAKE_64BIT_MASK(0, 50); | ||
263 | + } else if (arm_feature(env, ARM_FEATURE_V8)) { | ||
264 | descaddrmask = MAKE_64BIT_MASK(0, 48); | ||
265 | } else { | ||
266 | descaddrmask = MAKE_64BIT_MASK(0, 40); | ||
267 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
268 | |||
269 | /* | ||
270 | * For FEAT_LPA and PS=6, bits [51:48] of descaddr are in [15:12] | ||
271 | - * of descriptor. Otherwise, if descaddr is out of range, raise | ||
272 | - * AddressSizeFault. | ||
273 | + * of descriptor. For FEAT_LPA2 and effective DS, bits [51:50] of | ||
274 | + * descaddr are in [9:8]. Otherwise, if descaddr is out of range, | ||
275 | + * raise AddressSizeFault. | ||
276 | */ | ||
277 | if (outputsize > 48) { | ||
278 | - descaddr |= extract64(descriptor, 12, 4) << 48; | ||
279 | + if (param.ds) { | ||
280 | + descaddr |= extract64(descriptor, 8, 2) << 50; | ||
281 | + } else { | ||
282 | + descaddr |= extract64(descriptor, 12, 4) << 48; | ||
283 | + } | ||
284 | } else if (descaddr >> outputsize) { | ||
285 | fault_type = ARMFault_AddressSize; | ||
286 | goto do_fault; | ||
287 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
288 | assert(attrindx <= 7); | ||
289 | cacheattrs->attrs = extract64(mair, attrindx * 8, 8); | ||
290 | } | ||
291 | - cacheattrs->shareability = extract32(attrs, 6, 2); | ||
292 | + | ||
293 | + /* | ||
294 | + * For FEAT_LPA2 and effective DS, the SH field in the attributes | ||
295 | + * was re-purposed for output address bits. The SH attribute in | ||
296 | + * that case comes from TCR_ELx, which we extracted earlier. | ||
297 | + */ | ||
298 | + if (param.ds) { | ||
299 | + cacheattrs->shareability = param.sh; | ||
300 | + } else { | ||
301 | + cacheattrs->shareability = extract32(attrs, 6, 2); | ||
302 | + } | ||
303 | |||
304 | *phys_ptr = descaddr; | ||
305 | *page_size_ptr = page_size; | ||
306 | -- | ||
307 | 2.25.1 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | When we're using KVM, the PSCI implementation is provided by the | ||
2 | kernel, but QEMU has to tell the guest about it via the device tree. | ||
3 | Currently we look at the KVM_CAP_ARM_PSCI_0_2 capability to determine | ||
4 | if the kernel is providing at least PSCI 0.2, but if the kernel | ||
5 | provides a newer version than that we will still only tell the guest | ||
6 | it has PSCI 0.2. (This is fairly harmless; it just means the guest | ||
7 | won't use newer parts of the PSCI API.) | ||
1 | 8 | ||
9 | The kernel exposes the specific PSCI version it is implementing via | ||
10 | the ONE_REG API; use this to report in the dtb that the PSCI | ||
11 | implementation is 1.0-compatible if appropriate. (The device tree | ||
12 | binding currently only distinguishes "pre-0.2", "0.2-compatible" and | ||
13 | "1.0-compatible".) | ||
14 | |||
15 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
16 | Reviewed-by: Marc Zyngier <maz@kernel.org> | ||
17 | Reviewed-by: Akihiko Odaki <akihiko.odaki@gmail.com> | ||
18 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
19 | Reviewed-by: Andrew Jones <drjones@redhat.com> | ||
20 | Message-id: 20220224134655.1207865-1-peter.maydell@linaro.org | ||
21 | --- | ||
22 | target/arm/kvm-consts.h | 1 + | ||
23 | hw/arm/boot.c | 5 ++--- | ||
24 | target/arm/kvm64.c | 12 ++++++++++++ | ||
25 | 3 files changed, 15 insertions(+), 3 deletions(-) | ||
26 | |||
27 | diff --git a/target/arm/kvm-consts.h b/target/arm/kvm-consts.h | ||
28 | index XXXXXXX..XXXXXXX 100644 | ||
29 | --- a/target/arm/kvm-consts.h | ||
30 | +++ b/target/arm/kvm-consts.h | ||
31 | @@ -XXX,XX +XXX,XX @@ MISMATCH_CHECK(QEMU_PSCI_1_0_FN_PSCI_FEATURES, PSCI_1_0_FN_PSCI_FEATURES); | ||
32 | |||
33 | #define QEMU_PSCI_VERSION_0_1 0x00001 | ||
34 | #define QEMU_PSCI_VERSION_0_2 0x00002 | ||
35 | +#define QEMU_PSCI_VERSION_1_0 0x10000 | ||
36 | #define QEMU_PSCI_VERSION_1_1 0x10001 | ||
37 | |||
38 | MISMATCH_CHECK(QEMU_PSCI_0_2_RET_TOS_MIGRATION_NOT_REQUIRED, PSCI_0_2_TOS_MP); | ||
39 | diff --git a/hw/arm/boot.c b/hw/arm/boot.c | ||
40 | index XXXXXXX..XXXXXXX 100644 | ||
41 | --- a/hw/arm/boot.c | ||
42 | +++ b/hw/arm/boot.c | ||
43 | @@ -XXX,XX +XXX,XX @@ static void fdt_add_psci_node(void *fdt) | ||
44 | } | ||
45 | |||
46 | qemu_fdt_add_subnode(fdt, "/psci"); | ||
47 | - if (armcpu->psci_version == QEMU_PSCI_VERSION_0_2 || | ||
48 | - armcpu->psci_version == QEMU_PSCI_VERSION_1_1) { | ||
49 | - if (armcpu->psci_version == QEMU_PSCI_VERSION_0_2) { | ||
50 | + if (armcpu->psci_version >= QEMU_PSCI_VERSION_0_2) { | ||
51 | + if (armcpu->psci_version < QEMU_PSCI_VERSION_1_0) { | ||
52 | const char comp[] = "arm,psci-0.2\0arm,psci"; | ||
53 | qemu_fdt_setprop(fdt, "/psci", "compatible", comp, sizeof(comp)); | ||
54 | } else { | ||
55 | diff --git a/target/arm/kvm64.c b/target/arm/kvm64.c | ||
56 | index XXXXXXX..XXXXXXX 100644 | ||
57 | --- a/target/arm/kvm64.c | ||
58 | +++ b/target/arm/kvm64.c | ||
59 | @@ -XXX,XX +XXX,XX @@ int kvm_arch_init_vcpu(CPUState *cs) | ||
60 | uint64_t mpidr; | ||
61 | ARMCPU *cpu = ARM_CPU(cs); | ||
62 | CPUARMState *env = &cpu->env; | ||
63 | + uint64_t psciver; | ||
64 | |||
65 | if (cpu->kvm_target == QEMU_KVM_ARM_TARGET_NONE || | ||
66 | !object_dynamic_cast(OBJECT(cpu), TYPE_AARCH64_CPU)) { | ||
67 | @@ -XXX,XX +XXX,XX @@ int kvm_arch_init_vcpu(CPUState *cs) | ||
68 | } | ||
69 | } | ||
70 | |||
71 | + /* | ||
72 | + * KVM reports the exact PSCI version it is implementing via a | ||
73 | + * special sysreg. If it is present, use its contents to determine | ||
74 | + * what to report to the guest in the dtb (it is the PSCI version, | ||
75 | + * in the same 15-bits major 16-bits minor format that PSCI_VERSION | ||
76 | + * returns). | ||
77 | + */ | ||
78 | + if (!kvm_get_one_reg(cs, KVM_REG_ARM_PSCI_VERSION, &psciver)) { | ||
79 | + cpu->psci_version = psciver; | ||
80 | + } | ||
81 | + | ||
82 | /* | ||
83 | * When KVM is in use, PSCI is emulated in-kernel and not by qemu. | ||
84 | * Currently KVM has its own idea about MPIDR assignment, so we | ||
85 | -- | ||
86 | 2.25.1 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | The updateUIInfo method makes Cocoa API calls. It also calls back | ||
2 | into QEMU functions like dpy_set_ui_info(). To do this safely, we | ||
3 | need to follow two rules: | ||
4 | * Cocoa API calls are made on the Cocoa UI thread | ||
5 | * When calling back into QEMU we must hold the iothread lock | ||
1 | 6 | ||
7 | Fix the places where we got this wrong, by taking the iothread lock | ||
8 | while executing updateUIInfo, and moving the call in cocoa_switch() | ||
9 | inside the dispatch_async block. | ||
10 | |||
11 | Some of the Cocoa UI methods which call updateUIInfo are invoked as | ||
12 | part of the initial application startup, while we're still doing the | ||
13 | little cross-thread dance described in the comment just above | ||
14 | call_qemu_main(). This meant they were calling back into the QEMU UI | ||
15 | layer before we'd actually finished initializing our display and | ||
16 | registered the DisplayChangeListener, which isn't really valid. Once | ||
17 | updateUIInfo takes the iothread lock, we no longer get away with | ||
18 | this, because during this startup phase the iothread lock is held by | ||
19 | the QEMU main-loop thread which is waiting for us to finish our | ||
20 | display initialization. So we must suppress updateUIInfo until | ||
21 | applicationDidFinishLaunching allows the QEMU main-loop thread to | ||
22 | continue. | ||
23 | |||
24 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
25 | Reviewed-by: Akihiko Odaki <akihiko.odaki@gmail.com> | ||
26 | Tested-by: Akihiko Odaki <akihiko.odaki@gmail.com> | ||
27 | Message-id: 20220224101330.967429-2-peter.maydell@linaro.org | ||
28 | --- | ||
29 | ui/cocoa.m | 25 ++++++++++++++++++++++--- | ||
30 | 1 file changed, 22 insertions(+), 3 deletions(-) | ||
31 | |||
32 | diff --git a/ui/cocoa.m b/ui/cocoa.m | ||
33 | index XXXXXXX..XXXXXXX 100644 | ||
34 | --- a/ui/cocoa.m | ||
35 | +++ b/ui/cocoa.m | ||
36 | @@ -XXX,XX +XXX,XX @@ QemuCocoaView *cocoaView; | ||
37 | } | ||
38 | } | ||
39 | |||
40 | -- (void) updateUIInfo | ||
41 | +- (void) updateUIInfoLocked | ||
42 | { | ||
43 | + /* Must be called with the iothread lock, i.e. via updateUIInfo */ | ||
44 | NSSize frameSize; | ||
45 | QemuUIInfo info; | ||
46 | |||
47 | @@ -XXX,XX +XXX,XX @@ QemuCocoaView *cocoaView; | ||
48 | dpy_set_ui_info(dcl.con, &info, TRUE); | ||
49 | } | ||
50 | |||
51 | +- (void) updateUIInfo | ||
52 | +{ | ||
53 | + if (!allow_events) { | ||
54 | + /* | ||
55 | + * Don't try to tell QEMU about UI information in the application | ||
56 | + * startup phase -- we haven't yet registered dcl with the QEMU UI | ||
57 | + * layer, and also trying to take the iothread lock would deadlock. | ||
58 | + * When cocoa_display_init() does register the dcl, the UI layer | ||
59 | + * will call cocoa_switch(), which will call updateUIInfo, so | ||
60 | + * we don't lose any information here. | ||
61 | + */ | ||
62 | + return; | ||
63 | + } | ||
64 | + | ||
65 | + with_iothread_lock(^{ | ||
66 | + [self updateUIInfoLocked]; | ||
67 | + }); | ||
68 | +} | ||
69 | + | ||
70 | - (void)viewDidMoveToWindow | ||
71 | { | ||
72 | [self updateUIInfo]; | ||
73 | @@ -XXX,XX +XXX,XX @@ static void cocoa_switch(DisplayChangeListener *dcl, | ||
74 | |||
75 | COCOA_DEBUG("qemu_cocoa: cocoa_switch\n"); | ||
76 | |||
77 | - [cocoaView updateUIInfo]; | ||
78 | - | ||
79 | // The DisplaySurface will be freed as soon as this callback returns. | ||
80 | // We take a reference to the underlying pixman image here so it does | ||
81 | // not disappear from under our feet; the switchSurface method will | ||
82 | @@ -XXX,XX +XXX,XX @@ static void cocoa_switch(DisplayChangeListener *dcl, | ||
83 | pixman_image_ref(image); | ||
84 | |||
85 | dispatch_async(dispatch_get_main_queue(), ^{ | ||
86 | + [cocoaView updateUIInfo]; | ||
87 | [cocoaView switchSurface:image]; | ||
88 | }); | ||
89 | [pool release]; | ||
90 | -- | ||
91 | 2.25.1 | diff view generated by jsdifflib |
1 | The PL031 RTC tracks the difference between the guest RTC | 1 | In commit 6e657e64cdc478 in 2013 we added some autorelease pools to |
---|---|---|---|
2 | and the host RTC using a tick_offset field. For migration, | 2 | deal with complaints from macOS when we made calls into Cocoa from |
3 | however, we currently always migrate the offset between | 3 | threads that didn't have automatically created autorelease pools. |
4 | the guest and the vm_clock, even if the RTC clock is not | 4 | Later on, macOS got stricter about forbidding cross-thread Cocoa |
5 | the same as the vm_clock; this was an attempt to retain | 5 | calls, and in commit 5588840ff77800e839d8 we restructured the code to |
6 | migration backwards compatibility. | 6 | avoid them. This left the autorelease pool creation in several |
7 | functions without any purpose; delete it. | ||
7 | 8 | ||
8 | Unfortunately this results in the RTC behaving oddly across | 9 | We still need the pool in cocoa_refresh() for the clipboard related |
9 | a VM state save and restore -- since the VM clock stands still | 10 | code which is called directly there. |
10 | across save-then-restore, regardless of how much real world | ||
11 | time has elapsed, the guest RTC ends up out of sync with the | ||
12 | host RTC in the restored VM. | ||
13 | 11 | ||
14 | Fix this by migrating the raw tick_offset. To retain migration | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
15 | compatibility as far as possible, we have a new property | 13 | Reviewed-by: Akihiko Odaki <akihiko.odaki@gmail.com> |
16 | migrate-tick-offset; by default this is 'true' and we will | 14 | Tested-by: Akihiko Odaki <akihiko.odaki@gmail.com> |
17 | migrate the true tick offset in a new subsection; if the | 15 | Message-id: 20220224101330.967429-3-peter.maydell@linaro.org |
18 | incoming data has no subsection we fall back to the old | 16 | --- |
19 | vm_clock-based offset information, so old->new migration | 17 | ui/cocoa.m | 6 ------ |
20 | compatibility is preserved. For complete new->old migration | 18 | 1 file changed, 6 deletions(-) |
21 | compatibility, the property is set to 'false' for 4.0 and | ||
22 | earlier machine types (this will only affect 'virt-4.0' | ||
23 | and below, as none of the other pl031-using machines are | ||
24 | versioned). | ||
25 | 19 | ||
26 | Reported-by: Russell King <rmk@armlinux.org.uk> | 20 | diff --git a/ui/cocoa.m b/ui/cocoa.m |
27 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
28 | Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com> | ||
29 | Message-id: 20190709143912.28905-1-peter.maydell@linaro.org | ||
30 | --- | ||
31 | include/hw/timer/pl031.h | 2 + | ||
32 | hw/core/machine.c | 1 + | ||
33 | hw/timer/pl031.c | 92 ++++++++++++++++++++++++++++++++++++++-- | ||
34 | 3 files changed, 91 insertions(+), 4 deletions(-) | ||
35 | |||
36 | diff --git a/include/hw/timer/pl031.h b/include/hw/timer/pl031.h | ||
37 | index XXXXXXX..XXXXXXX 100644 | 21 | index XXXXXXX..XXXXXXX 100644 |
38 | --- a/include/hw/timer/pl031.h | 22 | --- a/ui/cocoa.m |
39 | +++ b/include/hw/timer/pl031.h | 23 | +++ b/ui/cocoa.m |
40 | @@ -XXX,XX +XXX,XX @@ typedef struct PL031State { | 24 | @@ -XXX,XX +XXX,XX @@ int main (int argc, char **argv) { |
41 | */ | 25 | static void cocoa_update(DisplayChangeListener *dcl, |
42 | uint32_t tick_offset_vmstate; | 26 | int x, int y, int w, int h) |
43 | uint32_t tick_offset; | ||
44 | + bool tick_offset_migrated; | ||
45 | + bool migrate_tick_offset; | ||
46 | |||
47 | uint32_t mr; | ||
48 | uint32_t lr; | ||
49 | diff --git a/hw/core/machine.c b/hw/core/machine.c | ||
50 | index XXXXXXX..XXXXXXX 100644 | ||
51 | --- a/hw/core/machine.c | ||
52 | +++ b/hw/core/machine.c | ||
53 | @@ -XXX,XX +XXX,XX @@ GlobalProperty hw_compat_4_0[] = { | ||
54 | { "virtio-gpu-pci", "edid", "false" }, | ||
55 | { "virtio-device", "use-started", "false" }, | ||
56 | { "virtio-balloon-device", "qemu-4-0-config-size", "true" }, | ||
57 | + { "pl031", "migrate-tick-offset", "false" }, | ||
58 | }; | ||
59 | const size_t hw_compat_4_0_len = G_N_ELEMENTS(hw_compat_4_0); | ||
60 | |||
61 | diff --git a/hw/timer/pl031.c b/hw/timer/pl031.c | ||
62 | index XXXXXXX..XXXXXXX 100644 | ||
63 | --- a/hw/timer/pl031.c | ||
64 | +++ b/hw/timer/pl031.c | ||
65 | @@ -XXX,XX +XXX,XX @@ static int pl031_pre_save(void *opaque) | ||
66 | { | 27 | { |
67 | PL031State *s = opaque; | 28 | - NSAutoreleasePool * pool = [[NSAutoreleasePool alloc] init]; |
68 | 29 | - | |
69 | - /* tick_offset is base_time - rtc_clock base time. Instead, we want to | 30 | COCOA_DEBUG("qemu_cocoa: cocoa_update\n"); |
70 | - * store the base time relative to the QEMU_CLOCK_VIRTUAL for backwards-compatibility. */ | 31 | |
71 | + /* | 32 | dispatch_async(dispatch_get_main_queue(), ^{ |
72 | + * The PL031 device model code uses the tick_offset field, which is | 33 | @@ -XXX,XX +XXX,XX @@ static void cocoa_update(DisplayChangeListener *dcl, |
73 | + * the offset between what the guest RTC should read and what the | 34 | } |
74 | + * QEMU rtc_clock reads: | 35 | [cocoaView setNeedsDisplayInRect:rect]; |
75 | + * guest_rtc = rtc_clock + tick_offset | 36 | }); |
76 | + * and so | 37 | - |
77 | + * tick_offset = guest_rtc - rtc_clock | 38 | - [pool release]; |
78 | + * | ||
79 | + * We want to migrate this offset, which sounds straightforward. | ||
80 | + * Unfortunately older versions of QEMU migrated a conversion of this | ||
81 | + * offset into an offset from the vm_clock. (This was in turn an | ||
82 | + * attempt to be compatible with even older QEMU versions, but it | ||
83 | + * has incorrect behaviour if the rtc_clock is not the same as the | ||
84 | + * vm_clock.) So we put the actual tick_offset into a migration | ||
85 | + * subsection, and the backwards-compatible time-relative-to-vm_clock | ||
86 | + * in the main migration state. | ||
87 | + * | ||
88 | + * Calculate base time relative to QEMU_CLOCK_VIRTUAL: | ||
89 | + */ | ||
90 | int64_t delta = qemu_clock_get_ns(rtc_clock) - qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); | ||
91 | s->tick_offset_vmstate = s->tick_offset + delta / NANOSECONDS_PER_SECOND; | ||
92 | |||
93 | return 0; | ||
94 | } | 39 | } |
95 | 40 | ||
96 | +static int pl031_pre_load(void *opaque) | 41 | static void cocoa_switch(DisplayChangeListener *dcl, |
97 | +{ | 42 | DisplaySurface *surface) |
98 | + PL031State *s = opaque; | ||
99 | + | ||
100 | + s->tick_offset_migrated = false; | ||
101 | + return 0; | ||
102 | +} | ||
103 | + | ||
104 | static int pl031_post_load(void *opaque, int version_id) | ||
105 | { | 43 | { |
106 | PL031State *s = opaque; | 44 | - NSAutoreleasePool * pool = [[NSAutoreleasePool alloc] init]; |
107 | 45 | pixman_image_t *image = surface->image; | |
108 | - int64_t delta = qemu_clock_get_ns(rtc_clock) - qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); | 46 | |
109 | - s->tick_offset = s->tick_offset_vmstate - delta / NANOSECONDS_PER_SECOND; | 47 | COCOA_DEBUG("qemu_cocoa: cocoa_switch\n"); |
110 | + /* | 48 | @@ -XXX,XX +XXX,XX @@ static void cocoa_switch(DisplayChangeListener *dcl, |
111 | + * If we got the tick_offset subsection, then we can just use | 49 | [cocoaView updateUIInfo]; |
112 | + * the value in that. Otherwise the source is an older QEMU and | 50 | [cocoaView switchSurface:image]; |
113 | + * has given us the offset from the vm_clock; convert it back to | 51 | }); |
114 | + * an offset from the rtc_clock. This will cause time to incorrectly | 52 | - [pool release]; |
115 | + * go backwards compared to the host RTC, but this is unavoidable. | ||
116 | + */ | ||
117 | + | ||
118 | + if (!s->tick_offset_migrated) { | ||
119 | + int64_t delta = qemu_clock_get_ns(rtc_clock) - | ||
120 | + qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); | ||
121 | + s->tick_offset = s->tick_offset_vmstate - | ||
122 | + delta / NANOSECONDS_PER_SECOND; | ||
123 | + } | ||
124 | pl031_set_alarm(s); | ||
125 | return 0; | ||
126 | } | 53 | } |
127 | 54 | ||
128 | +static int pl031_tick_offset_post_load(void *opaque, int version_id) | 55 | static void cocoa_refresh(DisplayChangeListener *dcl) |
129 | +{ | ||
130 | + PL031State *s = opaque; | ||
131 | + | ||
132 | + s->tick_offset_migrated = true; | ||
133 | + return 0; | ||
134 | +} | ||
135 | + | ||
136 | +static bool pl031_tick_offset_needed(void *opaque) | ||
137 | +{ | ||
138 | + PL031State *s = opaque; | ||
139 | + | ||
140 | + return s->migrate_tick_offset; | ||
141 | +} | ||
142 | + | ||
143 | +static const VMStateDescription vmstate_pl031_tick_offset = { | ||
144 | + .name = "pl031/tick-offset", | ||
145 | + .version_id = 1, | ||
146 | + .minimum_version_id = 1, | ||
147 | + .needed = pl031_tick_offset_needed, | ||
148 | + .post_load = pl031_tick_offset_post_load, | ||
149 | + .fields = (VMStateField[]) { | ||
150 | + VMSTATE_UINT32(tick_offset, PL031State), | ||
151 | + VMSTATE_END_OF_LIST() | ||
152 | + } | ||
153 | +}; | ||
154 | + | ||
155 | static const VMStateDescription vmstate_pl031 = { | ||
156 | .name = "pl031", | ||
157 | .version_id = 1, | ||
158 | .minimum_version_id = 1, | ||
159 | .pre_save = pl031_pre_save, | ||
160 | + .pre_load = pl031_pre_load, | ||
161 | .post_load = pl031_post_load, | ||
162 | .fields = (VMStateField[]) { | ||
163 | VMSTATE_UINT32(tick_offset_vmstate, PL031State), | ||
164 | @@ -XXX,XX +XXX,XX @@ static const VMStateDescription vmstate_pl031 = { | ||
165 | VMSTATE_UINT32(im, PL031State), | ||
166 | VMSTATE_UINT32(is, PL031State), | ||
167 | VMSTATE_END_OF_LIST() | ||
168 | + }, | ||
169 | + .subsections = (const VMStateDescription*[]) { | ||
170 | + &vmstate_pl031_tick_offset, | ||
171 | + NULL | ||
172 | } | ||
173 | }; | ||
174 | |||
175 | +static Property pl031_properties[] = { | ||
176 | + /* | ||
177 | + * True to correctly migrate the tick offset of the RTC. False to | ||
178 | + * obtain backward migration compatibility with older QEMU versions, | ||
179 | + * at the expense of the guest RTC going backwards compared with the | ||
180 | + * host RTC when the VM is saved/restored if using -rtc host. | ||
181 | + * (Even if set to 'true' older QEMU can migrate forward to newer QEMU; | ||
182 | + * 'false' also permits newer QEMU to migrate to older QEMU.) | ||
183 | + */ | ||
184 | + DEFINE_PROP_BOOL("migrate-tick-offset", | ||
185 | + PL031State, migrate_tick_offset, true), | ||
186 | + DEFINE_PROP_END_OF_LIST() | ||
187 | +}; | ||
188 | + | ||
189 | static void pl031_class_init(ObjectClass *klass, void *data) | ||
190 | { | ||
191 | DeviceClass *dc = DEVICE_CLASS(klass); | ||
192 | |||
193 | dc->vmsd = &vmstate_pl031; | ||
194 | + dc->props = pl031_properties; | ||
195 | } | ||
196 | |||
197 | static const TypeInfo pl031_info = { | ||
198 | -- | 56 | -- |
199 | 2.20.1 | 57 | 2.25.1 |
200 | |||
201 | diff view generated by jsdifflib |