1
The following changes since commit b7c359c748a2e3ccb97a184b9739feb2cd48de2f:
1
target-arm queue, mostly SME preliminaries.
2
2
3
Merge remote-tracking branch 'remotes/vivier2/tags/linux-user-for-5.0-pull-request' into staging (2020-01-23 14:38:43 +0000)
3
In the unlikely event we don't land the rest of SME before freeze
4
for 7.1 we can revert the docs/property changes included here.
5
6
-- PMM
7
8
The following changes since commit 097ccbbbaf2681df1e65542e5b7d2b2d0c66e2bc:
9
10
Merge tag 'qemu-sparc-20220626' of https://github.com/mcayland/qemu into staging (2022-06-27 05:21:05 +0530)
4
11
5
are available in the Git repository at:
12
are available in the Git repository at:
6
13
7
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20200123
14
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20220627
8
15
9
for you to fetch changes up to 53c75ad8e72dc3a5102de7ed21e4990969cb0a19:
16
for you to fetch changes up to 59e1b8a22ea9f947d038ccac784de1020f266e14:
10
17
11
hw/arm/exynos4210: Connect serial port DMA busy signals with pl330 (2020-01-23 15:22:42 +0000)
18
target/arm: Check V7VE as well as LPAE in arm_pamax (2022-06-27 11:18:17 +0100)
12
19
13
----------------------------------------------------------------
20
----------------------------------------------------------------
14
target-arm queue:
21
target-arm queue:
15
* fix bug in PAuth emulation
22
* sphinx: change default language to 'en'
16
* add PMU to Cortex-R5, Cortex-R5F
23
* Diagnose attempts to emulate EL3 in hvf as well as kvm
17
* qemu-nbd: Convert documentation to rST
24
* More SME groundwork patches
18
* qemu-block-drivers: Convert documentation to rST
25
* virt: Fix calculation of physical address space size
19
* Fix Exynos4210 UART DMA support
26
for v7VE CPUs (eg cortex-a15)
20
* Various minor code cleanups
21
27
22
----------------------------------------------------------------
28
----------------------------------------------------------------
23
Andrew Jones (1):
29
Alexander Graf (2):
24
target/arm/arch_dump: Add SVE notes
30
accel: Introduce current_accel_name()
31
target/arm: Catch invalid kvm state also for hvf
25
32
26
Clement Deschamps (1):
33
Martin Liška (1):
27
target/arm: add PMU feature to cortex-r5 and cortex-r5f
34
sphinx: change default language to 'en'
28
35
29
Guenter Roeck (8):
36
Richard Henderson (22):
30
dma/pl330: Convert to support tracing
37
target/arm: Implement TPIDR2_EL0
31
hw/core/or-irq: Increase limit of or-lines to 48
38
target/arm: Add SMEEXC_EL to TB flags
32
hw/arm/exynos4210: Fix DMA initialization
39
target/arm: Add syn_smetrap
33
hw/char/exynos4210_uart: Convert to support tracing
40
target/arm: Add ARM_CP_SME
34
hw/char/exynos4210_uart: Implement post_load function
41
target/arm: Add SVCR
35
hw/char/exynos4210_uart: Implement Rx FIFO level triggers and timeouts
42
target/arm: Add SMCR_ELx
36
hw/char/exynos4210_uart: Add receive DMA support
43
target/arm: Add SMIDR_EL1, SMPRI_EL1, SMPRIMAP_EL2
37
hw/arm/exynos4210: Connect serial port DMA busy signals with pl330
44
target/arm: Add PSTATE.{SM,ZA} to TB flags
45
target/arm: Add the SME ZA storage to CPUARMState
46
target/arm: Implement SMSTART, SMSTOP
47
target/arm: Move error for sve%d property to arm_cpu_sve_finalize
48
target/arm: Create ARMVQMap
49
target/arm: Generalize cpu_arm_{get,set}_vq
50
target/arm: Generalize cpu_arm_{get, set}_default_vec_len
51
target/arm: Move arm_cpu_*_finalize to internals.h
52
target/arm: Unexport aarch64_add_*_properties
53
target/arm: Add cpu properties for SME
54
target/arm: Introduce sve_vqm1_for_el_sm
55
target/arm: Add SVL to TB flags
56
target/arm: Move pred_{full, gvec}_reg_{offset, size} to translate-a64.h
57
target/arm: Extend arm_pamax to more than aarch64
58
target/arm: Check V7VE as well as LPAE in arm_pamax
38
59
39
Keqian Zhu (2):
60
docs/conf.py | 2 +-
40
hw/acpi: Remove extra indent in ACPI GED hotplug cb
61
docs/system/arm/cpu-features.rst | 56 ++++++++++
41
hw/arm: Use helper function to trigger hotplug handler plug
62
include/qemu/accel.h | 1 +
63
target/arm/cpregs.h | 5 +
64
target/arm/cpu.h | 103 ++++++++++++++-----
65
target/arm/helper-sme.h | 21 ++++
66
target/arm/helper.h | 1 +
67
target/arm/internals.h | 4 +
68
target/arm/syndrome.h | 14 +++
69
target/arm/translate-a64.h | 38 +++++++
70
target/arm/translate.h | 6 ++
71
accel/accel-common.c | 8 ++
72
hw/arm/virt.c | 10 +-
73
softmmu/vl.c | 3 +-
74
target/arm/cpu.c | 32 ++++--
75
target/arm/cpu64.c | 205 ++++++++++++++++++++++++++++---------
76
target/arm/helper.c | 213 +++++++++++++++++++++++++++++++++++++--
77
target/arm/kvm64.c | 2 +-
78
target/arm/machine.c | 34 +++++++
79
target/arm/ptw.c | 26 +++--
80
target/arm/sme_helper.c | 61 +++++++++++
81
target/arm/translate-a64.c | 46 +++++++++
82
target/arm/translate-sve.c | 36 -------
83
target/arm/meson.build | 1 +
84
24 files changed, 782 insertions(+), 146 deletions(-)
85
create mode 100644 target/arm/helper-sme.h
86
create mode 100644 target/arm/sme_helper.c
42
87
43
Peter Maydell (3):
44
qemu-nbd: Convert invocation documentation to rST
45
docs: Create stub system manual
46
qemu-block-drivers: Convert to rST
47
48
Philippe Mathieu-Daudé (1):
49
hw/misc/stm32f4xx_syscfg: Fix copy/paste error
50
51
Richard Henderson (3):
52
tests/tcg/aarch64: Fix compilation parameters for pauth-%
53
tests/tcg/aarch64: Add pauth-3
54
tests/tcg/aarch64: Add pauth-4
55
56
Vincent Dehors (1):
57
target/arm: Fix PAuth sbox functions
58
59
Makefile | 37 +-
60
tests/tcg/aarch64/Makefile.softmmu-target | 5 +-
61
tests/tcg/aarch64/Makefile.target | 3 +-
62
include/elf.h | 1 +
63
include/hw/arm/exynos4210.h | 4 +
64
include/hw/or-irq.h | 2 +-
65
target/arm/cpu.h | 25 +
66
hw/acpi/generic_event_device.c | 2 +-
67
hw/arm/exynos4210.c | 77 ++-
68
hw/arm/virt.c | 6 +-
69
hw/char/exynos4210_uart.c | 245 +++++---
70
hw/dma/pl330.c | 88 +--
71
hw/misc/stm32f4xx_syscfg.c | 2 +-
72
target/arm/arch_dump.c | 124 +++-
73
target/arm/cpu.c | 1 +
74
target/arm/kvm64.c | 24 -
75
target/arm/pauth_helper.c | 4 +-
76
tests/tcg/aarch64/pauth-1.c | 2 -
77
tests/tcg/aarch64/pauth-2.c | 2 -
78
tests/tcg/aarch64/pauth-4.c | 25 +
79
tests/tcg/aarch64/system/pauth-3.c | 40 ++
80
MAINTAINERS | 1 +
81
docs/index.html.in | 1 +
82
docs/interop/conf.py | 4 +-
83
docs/interop/index.rst | 1 +
84
docs/interop/qemu-nbd.rst | 263 ++++++++
85
docs/interop/qemu-option-trace.rst.inc | 30 +
86
docs/qemu-block-drivers.texi | 889 ---------------------------
87
docs/system/conf.py | 22 +
88
docs/system/index.rst | 17 +
89
docs/system/qemu-block-drivers.rst | 985 ++++++++++++++++++++++++++++++
90
hw/char/trace-events | 20 +
91
hw/dma/trace-events | 24 +
92
qemu-doc.texi | 18 -
93
qemu-nbd.texi | 214 -------
94
qemu-option-trace.texi | 4 +
95
qemu-options.hx | 2 +-
96
37 files changed, 1897 insertions(+), 1317 deletions(-)
97
create mode 100644 tests/tcg/aarch64/pauth-4.c
98
create mode 100644 tests/tcg/aarch64/system/pauth-3.c
99
create mode 100644 docs/interop/qemu-nbd.rst
100
create mode 100644 docs/interop/qemu-option-trace.rst.inc
101
delete mode 100644 docs/qemu-block-drivers.texi
102
create mode 100644 docs/system/conf.py
103
create mode 100644 docs/system/index.rst
104
create mode 100644 docs/system/qemu-block-drivers.rst
105
delete mode 100644 qemu-nbd.texi
106
diff view generated by jsdifflib
1
From: Keqian Zhu <zhukeqian1@huawei.com>
1
From: Martin Liška <mliska@suse.cz>
2
2
3
There is extra indent in ACPI GED hotplug cb that should be
3
Fixes the following Sphinx warning (treated as error) starting
4
deleted.
4
with 5.0 release:
5
5
6
Reviewed-by: Igor Mammedov <imammedo@redhat.com>
6
Warning, treated as error:
7
Signed-off-by: Keqian Zhu <zhukeqian1@huawei.com>
7
Invalid configuration value found: 'language = None'. Update your configuration to a valid langauge code. Falling back to 'en' (English).
8
Message-id: 20200120012755.44581-2-zhukeqian1@huawei.com
8
9
Signed-off-by: Martin Liska <mliska@suse.cz>
10
Message-id: e91e51ee-48ac-437e-6467-98b56ee40042@suse.cz
11
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
13
---
11
hw/acpi/generic_event_device.c | 2 +-
14
docs/conf.py | 2 +-
12
1 file changed, 1 insertion(+), 1 deletion(-)
15
1 file changed, 1 insertion(+), 1 deletion(-)
13
16
14
diff --git a/hw/acpi/generic_event_device.c b/hw/acpi/generic_event_device.c
17
diff --git a/docs/conf.py b/docs/conf.py
15
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
16
--- a/hw/acpi/generic_event_device.c
19
--- a/docs/conf.py
17
+++ b/hw/acpi/generic_event_device.c
20
+++ b/docs/conf.py
18
@@ -XXX,XX +XXX,XX @@ static void acpi_ged_device_plug_cb(HotplugHandler *hotplug_dev,
21
@@ -XXX,XX +XXX,XX @@
19
AcpiGedState *s = ACPI_GED(hotplug_dev);
22
#
20
23
# This is also used if you do content translation via gettext catalogs.
21
if (object_dynamic_cast(OBJECT(dev), TYPE_PC_DIMM)) {
24
# Usually you set "language" from the command line for these cases.
22
- acpi_memory_plug_cb(hotplug_dev, &s->memhp_state, dev, errp);
25
-language = None
23
+ acpi_memory_plug_cb(hotplug_dev, &s->memhp_state, dev, errp);
26
+language = 'en'
24
} else {
27
25
error_setg(errp, "virt: device plug request for unsupported device"
28
# List of patterns, relative to source directory, that match files and
26
" type: %s", object_get_typename(OBJECT(dev)));
29
# directories to ignore when looking for source files.
27
--
30
--
28
2.20.1
31
2.25.1
29
32
30
33
diff view generated by jsdifflib
New patch
1
From: Alexander Graf <agraf@csgraf.de>
1
2
3
We need to fetch the name of the current accelerator in flexible error
4
messages more going forward. Let's create a helper that gives it to us
5
without casting in the target code.
6
7
Signed-off-by: Alexander Graf <agraf@csgraf.de>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20220620192242.70573-1-agraf@csgraf.de
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
12
include/qemu/accel.h | 1 +
13
accel/accel-common.c | 8 ++++++++
14
softmmu/vl.c | 3 +--
15
3 files changed, 10 insertions(+), 2 deletions(-)
16
17
diff --git a/include/qemu/accel.h b/include/qemu/accel.h
18
index XXXXXXX..XXXXXXX 100644
19
--- a/include/qemu/accel.h
20
+++ b/include/qemu/accel.h
21
@@ -XXX,XX +XXX,XX @@ typedef struct AccelClass {
22
23
AccelClass *accel_find(const char *opt_name);
24
AccelState *current_accel(void);
25
+const char *current_accel_name(void);
26
27
void accel_init_interfaces(AccelClass *ac);
28
29
diff --git a/accel/accel-common.c b/accel/accel-common.c
30
index XXXXXXX..XXXXXXX 100644
31
--- a/accel/accel-common.c
32
+++ b/accel/accel-common.c
33
@@ -XXX,XX +XXX,XX @@ AccelClass *accel_find(const char *opt_name)
34
return ac;
35
}
36
37
+/* Return the name of the current accelerator */
38
+const char *current_accel_name(void)
39
+{
40
+ AccelClass *ac = ACCEL_GET_CLASS(current_accel());
41
+
42
+ return ac->name;
43
+}
44
+
45
static void accel_init_cpu_int_aux(ObjectClass *klass, void *opaque)
46
{
47
CPUClass *cc = CPU_CLASS(klass);
48
diff --git a/softmmu/vl.c b/softmmu/vl.c
49
index XXXXXXX..XXXXXXX 100644
50
--- a/softmmu/vl.c
51
+++ b/softmmu/vl.c
52
@@ -XXX,XX +XXX,XX @@ static void configure_accelerators(const char *progname)
53
}
54
55
if (init_failed && !qtest_chrdev) {
56
- AccelClass *ac = ACCEL_GET_CLASS(current_accel());
57
- error_report("falling back to %s", ac->name);
58
+ error_report("falling back to %s", current_accel_name());
59
}
60
61
if (icount_enabled() && !tcg_enabled()) {
62
--
63
2.25.1
diff view generated by jsdifflib
1
From: Clement Deschamps <clement.deschamps@greensocs.com>
1
From: Alexander Graf <agraf@csgraf.de>
2
2
3
The PMU is not optional on cortex-r5 and cortex-r5f (see
3
Some features such as running in EL3 or running M profile code are
4
the "Features" chapter of the Technical Reference Manual).
4
incompatible with virtualization as QEMU implements it today. To prevent
5
users from picking invalid configurations on other virt solutions like
6
Hvf, let's run the same checks there too.
5
7
6
Signed-off-by: Clement Deschamps <clement.deschamps@greensocs.com>
8
Resolves: https://gitlab.com/qemu-project/qemu/-/issues/1073
7
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
9
Signed-off-by: Alexander Graf <agraf@csgraf.de>
8
Message-id: 20200114105918.2366370-1-clement.deschamps@greensocs.com
10
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
11
Message-id: 20220620192242.70573-2-agraf@csgraf.de
12
[PMM: Allow qtest accelerator too; tweak comment]
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
14
---
11
target/arm/cpu.c | 1 +
15
target/arm/cpu.c | 16 ++++++++++++----
12
1 file changed, 1 insertion(+)
16
1 file changed, 12 insertions(+), 4 deletions(-)
13
17
14
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
18
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
15
index XXXXXXX..XXXXXXX 100644
19
index XXXXXXX..XXXXXXX 100644
16
--- a/target/arm/cpu.c
20
--- a/target/arm/cpu.c
17
+++ b/target/arm/cpu.c
21
+++ b/target/arm/cpu.c
18
@@ -XXX,XX +XXX,XX @@ static void cortex_r5_initfn(Object *obj)
22
@@ -XXX,XX +XXX,XX @@
19
set_feature(&cpu->env, ARM_FEATURE_V7);
23
#include "hw/boards.h"
20
set_feature(&cpu->env, ARM_FEATURE_V7MP);
24
#endif
21
set_feature(&cpu->env, ARM_FEATURE_PMSA);
25
#include "sysemu/tcg.h"
22
+ set_feature(&cpu->env, ARM_FEATURE_PMU);
26
+#include "sysemu/qtest.h"
23
cpu->midr = 0x411fc153; /* r1p3 */
27
#include "sysemu/hw_accel.h"
24
cpu->id_pfr0 = 0x0131;
28
#include "kvm_arm.h"
25
cpu->id_pfr1 = 0x001;
29
#include "disas/capstone.h"
30
@@ -XXX,XX +XXX,XX @@ static void arm_cpu_realizefn(DeviceState *dev, Error **errp)
31
}
32
}
33
34
- if (kvm_enabled()) {
35
+ if (!tcg_enabled() && !qtest_enabled()) {
36
/*
37
+ * We assume that no accelerator except TCG (and the "not really an
38
+ * accelerator" qtest) can handle these features, because Arm hardware
39
+ * virtualization can't virtualize them.
40
+ *
41
* Catch all the cases which might cause us to create more than one
42
* address space for the CPU (otherwise we will assert() later in
43
* cpu_address_space_init()).
44
*/
45
if (arm_feature(env, ARM_FEATURE_M)) {
46
error_setg(errp,
47
- "Cannot enable KVM when using an M-profile guest CPU");
48
+ "Cannot enable %s when using an M-profile guest CPU",
49
+ current_accel_name());
50
return;
51
}
52
if (cpu->has_el3) {
53
error_setg(errp,
54
- "Cannot enable KVM when guest CPU has EL3 enabled");
55
+ "Cannot enable %s when guest CPU has EL3 enabled",
56
+ current_accel_name());
57
return;
58
}
59
if (cpu->tag_memory) {
60
error_setg(errp,
61
- "Cannot enable KVM when guest CPUs has MTE enabled");
62
+ "Cannot enable %s when guest CPUs has MTE enabled",
63
+ current_accel_name());
64
return;
65
}
66
}
26
--
67
--
27
2.20.1
68
2.25.1
28
29
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
This register is part of SME, but isn't closely related to the
4
rest of the extension.
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220620175235.60881-2-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/cpu.h | 1 +
12
target/arm/helper.c | 32 ++++++++++++++++++++++++++++++++
13
2 files changed, 33 insertions(+)
14
15
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
16
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/cpu.h
18
+++ b/target/arm/cpu.h
19
@@ -XXX,XX +XXX,XX @@ typedef struct CPUArchState {
20
};
21
uint64_t tpidr_el[4];
22
};
23
+ uint64_t tpidr2_el0;
24
/* The secure banks of these registers don't map anywhere */
25
uint64_t tpidrurw_s;
26
uint64_t tpidrprw_s;
27
diff --git a/target/arm/helper.c b/target/arm/helper.c
28
index XXXXXXX..XXXXXXX 100644
29
--- a/target/arm/helper.c
30
+++ b/target/arm/helper.c
31
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo zcr_reginfo[] = {
32
.writefn = zcr_write, .raw_writefn = raw_write },
33
};
34
35
+#ifdef TARGET_AARCH64
36
+static CPAccessResult access_tpidr2(CPUARMState *env, const ARMCPRegInfo *ri,
37
+ bool isread)
38
+{
39
+ int el = arm_current_el(env);
40
+
41
+ if (el == 0) {
42
+ uint64_t sctlr = arm_sctlr(env, el);
43
+ if (!(sctlr & SCTLR_EnTP2)) {
44
+ return CP_ACCESS_TRAP;
45
+ }
46
+ }
47
+ /* TODO: FEAT_FGT */
48
+ if (el < 3
49
+ && arm_feature(env, ARM_FEATURE_EL3)
50
+ && !(env->cp15.scr_el3 & SCR_ENTP2)) {
51
+ return CP_ACCESS_TRAP_EL3;
52
+ }
53
+ return CP_ACCESS_OK;
54
+}
55
+
56
+static const ARMCPRegInfo sme_reginfo[] = {
57
+ { .name = "TPIDR2_EL0", .state = ARM_CP_STATE_AA64,
58
+ .opc0 = 3, .opc1 = 3, .crn = 13, .crm = 0, .opc2 = 5,
59
+ .access = PL0_RW, .accessfn = access_tpidr2,
60
+ .fieldoffset = offsetof(CPUARMState, cp15.tpidr2_el0) },
61
+};
62
+#endif /* TARGET_AARCH64 */
63
+
64
void hw_watchpoint_update(ARMCPU *cpu, int n)
65
{
66
CPUARMState *env = &cpu->env;
67
@@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu)
68
}
69
70
#ifdef TARGET_AARCH64
71
+ if (cpu_isar_feature(aa64_sme, cpu)) {
72
+ define_arm_cp_regs(cpu, sme_reginfo);
73
+ }
74
if (cpu_isar_feature(aa64_pauth, cpu)) {
75
define_arm_cp_regs(cpu, pauth_reginfo);
76
}
77
--
78
2.25.1
diff view generated by jsdifflib
1
From: Guenter Roeck <linux@roeck-us.net>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Replace debug code with tracing to aid debugging.
3
This is CheckSMEAccess, which is the basis for a set of
4
related tests for various SME cpregs and instructions.
4
5
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Guenter Roeck <linux@roeck-us.net>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 20200123052540.6132-5-linux@roeck-us.net
8
Message-id: 20220620175235.60881-3-richard.henderson@linaro.org
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
---
10
---
10
hw/char/exynos4210_uart.c | 96 ++++++++++++---------------------------
11
target/arm/cpu.h | 2 ++
11
hw/char/trace-events | 17 +++++++
12
target/arm/translate.h | 1 +
12
2 files changed, 47 insertions(+), 66 deletions(-)
13
target/arm/helper.c | 52 ++++++++++++++++++++++++++++++++++++++
14
target/arm/translate-a64.c | 1 +
15
4 files changed, 56 insertions(+)
13
16
14
diff --git a/hw/char/exynos4210_uart.c b/hw/char/exynos4210_uart.c
17
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
15
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
16
--- a/hw/char/exynos4210_uart.c
19
--- a/target/arm/cpu.h
17
+++ b/hw/char/exynos4210_uart.c
20
+++ b/target/arm/cpu.h
18
@@ -XXX,XX +XXX,XX @@
21
@@ -XXX,XX +XXX,XX @@ void aarch64_sync_64_to_32(CPUARMState *env);
19
#include "hw/irq.h"
22
20
#include "hw/qdev-properties.h"
23
int fp_exception_el(CPUARMState *env, int cur_el);
21
24
int sve_exception_el(CPUARMState *env, int cur_el);
22
-#undef DEBUG_UART
25
+int sme_exception_el(CPUARMState *env, int cur_el);
23
-#undef DEBUG_UART_EXTEND
26
24
-#undef DEBUG_IRQ
27
/**
25
-#undef DEBUG_Rx_DATA
28
* sve_vqm1_for_el:
26
-#undef DEBUG_Tx_DATA
29
@@ -XXX,XX +XXX,XX @@ FIELD(TBFLAG_A64, ATA, 15, 1)
27
-
30
FIELD(TBFLAG_A64, TCMA, 16, 2)
28
-#define DEBUG_UART 0
31
FIELD(TBFLAG_A64, MTE_ACTIVE, 18, 1)
29
-#define DEBUG_UART_EXTEND 0
32
FIELD(TBFLAG_A64, MTE0_ACTIVE, 19, 1)
30
-#define DEBUG_IRQ 0
33
+FIELD(TBFLAG_A64, SMEEXC_EL, 20, 2)
31
-#define DEBUG_Rx_DATA 0
32
-#define DEBUG_Tx_DATA 0
33
-
34
-#if DEBUG_UART
35
-#define PRINT_DEBUG(fmt, args...) \
36
- do { \
37
- fprintf(stderr, " [%s:%d] "fmt, __func__, __LINE__, ##args); \
38
- } while (0)
39
-
40
-#if DEBUG_UART_EXTEND
41
-#define PRINT_DEBUG_EXTEND(fmt, args...) \
42
- do { \
43
- fprintf(stderr, " [%s:%d] "fmt, __func__, __LINE__, ##args); \
44
- } while (0)
45
-#else
46
-#define PRINT_DEBUG_EXTEND(fmt, args...) \
47
- do {} while (0)
48
-#endif /* EXTEND */
49
-
50
-#else
51
-#define PRINT_DEBUG(fmt, args...) \
52
- do {} while (0)
53
-#define PRINT_DEBUG_EXTEND(fmt, args...) \
54
- do {} while (0)
55
-#endif
56
-
57
-#define PRINT_ERROR(fmt, args...) \
58
- do { \
59
- fprintf(stderr, " [%s:%d] "fmt, __func__, __LINE__, ##args); \
60
- } while (0)
61
+#include "trace.h"
62
34
63
/*
35
/*
64
* Offsets for UART registers relative to SFR base address
36
* Helpers for using the above.
65
@@ -XXX,XX +XXX,XX @@ typedef struct Exynos4210UartState {
37
diff --git a/target/arm/translate.h b/target/arm/translate.h
66
} Exynos4210UartState;
38
index XXXXXXX..XXXXXXX 100644
67
39
--- a/target/arm/translate.h
68
40
+++ b/target/arm/translate.h
69
-#if DEBUG_UART
41
@@ -XXX,XX +XXX,XX @@ typedef struct DisasContext {
70
-/* Used only for debugging inside PRINT_DEBUG_... macros */
42
bool ns; /* Use non-secure CPREG bank on access */
71
+/* Used only for tracing */
43
int fp_excp_el; /* FP exception EL or 0 if enabled */
72
static const char *exynos4210_uart_regname(hwaddr offset)
44
int sve_excp_el; /* SVE exception EL or 0 if enabled */
73
{
45
+ int sme_excp_el; /* SME exception EL or 0 if enabled */
74
46
int vl; /* current vector length in bytes */
75
@@ -XXX,XX +XXX,XX @@ static const char *exynos4210_uart_regname(hwaddr offset)
47
bool vfp_enabled; /* FP enabled via FPSCR.EN */
76
48
int vec_len;
77
return NULL;
49
diff --git a/target/arm/helper.c b/target/arm/helper.c
78
}
50
index XXXXXXX..XXXXXXX 100644
79
-#endif
51
--- a/target/arm/helper.c
80
52
+++ b/target/arm/helper.c
81
53
@@ -XXX,XX +XXX,XX @@ int sve_exception_el(CPUARMState *env, int el)
82
static void fifo_store(Exynos4210UartFIFO *q, uint8_t ch)
83
@@ -XXX,XX +XXX,XX @@ static uint32_t exynos4210_uart_Tx_FIFO_trigger_level(const Exynos4210UartState
84
break;
85
default:
86
level = 0;
87
- PRINT_ERROR("Wrong UART channel number: %d\n", s->channel);
88
+ trace_exynos_uart_channel_error(s->channel);
89
}
90
91
return level;
92
@@ -XXX,XX +XXX,XX @@ static void exynos4210_uart_update_irq(Exynos4210UartState *s)
93
94
if (s->reg[I_(UINTP)]) {
95
qemu_irq_raise(s->irq);
96
-
97
-#if DEBUG_IRQ
98
- fprintf(stderr, "UART%d: IRQ has been raised: %08x\n",
99
- s->channel, s->reg[I_(UINTP)]);
100
-#endif
101
-
102
+ trace_exynos_uart_irq_raised(s->channel, s->reg[I_(UINTP)]);
103
} else {
104
qemu_irq_lower(s->irq);
105
+ trace_exynos_uart_irq_lowered(s->channel);
106
}
107
}
108
109
@@ -XXX,XX +XXX,XX @@ static void exynos4210_uart_update_parameters(Exynos4210UartState *s)
110
111
qemu_chr_fe_ioctl(&s->chr, CHR_IOCTL_SERIAL_SET_PARAMS, &ssp);
112
113
- PRINT_DEBUG("UART%d: speed: %d, parity: %c, data: %d, stop: %d\n",
114
+ trace_exynos_uart_update_params(
115
s->channel, speed, parity, data_bits, stop_bits);
116
}
117
118
@@ -XXX,XX +XXX,XX @@ static void exynos4210_uart_write(void *opaque, hwaddr offset,
119
Exynos4210UartState *s = (Exynos4210UartState *)opaque;
120
uint8_t ch;
121
122
- PRINT_DEBUG_EXTEND("UART%d: <0x%04x> %s <- 0x%08llx\n", s->channel,
123
- offset, exynos4210_uart_regname(offset), (long long unsigned int)val);
124
+ trace_exynos_uart_write(s->channel, offset,
125
+ exynos4210_uart_regname(offset), val);
126
127
switch (offset) {
128
case ULCON:
129
@@ -XXX,XX +XXX,XX @@ static void exynos4210_uart_write(void *opaque, hwaddr offset,
130
if (val & UFCON_Rx_FIFO_RESET) {
131
fifo_reset(&s->rx);
132
s->reg[I_(UFCON)] &= ~UFCON_Rx_FIFO_RESET;
133
- PRINT_DEBUG("UART%d: Rx FIFO Reset\n", s->channel);
134
+ trace_exynos_uart_rx_fifo_reset(s->channel);
135
}
136
if (val & UFCON_Tx_FIFO_RESET) {
137
fifo_reset(&s->tx);
138
s->reg[I_(UFCON)] &= ~UFCON_Tx_FIFO_RESET;
139
- PRINT_DEBUG("UART%d: Tx FIFO Reset\n", s->channel);
140
+ trace_exynos_uart_tx_fifo_reset(s->channel);
141
}
142
break;
143
144
@@ -XXX,XX +XXX,XX @@ static void exynos4210_uart_write(void *opaque, hwaddr offset,
145
/* XXX this blocks entire thread. Rewrite to use
146
* qemu_chr_fe_write and background I/O callbacks */
147
qemu_chr_fe_write_all(&s->chr, &ch, 1);
148
-#if DEBUG_Tx_DATA
149
- fprintf(stderr, "%c", ch);
150
-#endif
151
+ trace_exynos_uart_tx(s->channel, ch);
152
s->reg[I_(UTRSTAT)] |= UTRSTAT_TRANSMITTER_EMPTY |
153
UTRSTAT_Tx_BUFFER_EMPTY;
154
s->reg[I_(UINTSP)] |= UINTSP_TXD;
155
@@ -XXX,XX +XXX,XX @@ static void exynos4210_uart_write(void *opaque, hwaddr offset,
156
case UINTP:
157
s->reg[I_(UINTP)] &= ~val;
158
s->reg[I_(UINTSP)] &= ~val;
159
- PRINT_DEBUG("UART%d: UINTP [%04x] have been cleared: %08x\n",
160
- s->channel, offset, s->reg[I_(UINTP)]);
161
+ trace_exynos_uart_intclr(s->channel, s->reg[I_(UINTP)]);
162
exynos4210_uart_update_irq(s);
163
break;
164
case UTRSTAT:
165
@@ -XXX,XX +XXX,XX @@ static void exynos4210_uart_write(void *opaque, hwaddr offset,
166
case UFSTAT:
167
case UMSTAT:
168
case URXH:
169
- PRINT_DEBUG("UART%d: Trying to write into RO register: %s [%04x]\n",
170
+ trace_exynos_uart_ro_write(
171
s->channel, exynos4210_uart_regname(offset), offset);
172
break;
173
case UINTSP:
174
@@ -XXX,XX +XXX,XX @@ static uint64_t exynos4210_uart_read(void *opaque, hwaddr offset,
175
case UERSTAT: /* Read Only */
176
res = s->reg[I_(UERSTAT)];
177
s->reg[I_(UERSTAT)] = 0;
178
+ trace_exynos_uart_read(s->channel, offset,
179
+ exynos4210_uart_regname(offset), res);
180
return res;
181
case UFSTAT: /* Read Only */
182
s->reg[I_(UFSTAT)] = fifo_elements_number(&s->rx) & 0xff;
183
@@ -XXX,XX +XXX,XX @@ static uint64_t exynos4210_uart_read(void *opaque, hwaddr offset,
184
s->reg[I_(UFSTAT)] |= UFSTAT_Rx_FIFO_FULL;
185
s->reg[I_(UFSTAT)] &= ~0xff;
186
}
187
+ trace_exynos_uart_read(s->channel, offset,
188
+ exynos4210_uart_regname(offset),
189
+ s->reg[I_(UFSTAT)]);
190
return s->reg[I_(UFSTAT)];
191
case URXH:
192
if (s->reg[I_(UFCON)] & UFCON_FIFO_ENABLE) {
193
if (fifo_elements_number(&s->rx)) {
194
res = fifo_retrieve(&s->rx);
195
-#if DEBUG_Rx_DATA
196
- fprintf(stderr, "%c", res);
197
-#endif
198
+ trace_exynos_uart_rx(s->channel, res);
199
if (!fifo_elements_number(&s->rx)) {
200
s->reg[I_(UTRSTAT)] &= ~UTRSTAT_Rx_BUFFER_DATA_READY;
201
} else {
202
s->reg[I_(UTRSTAT)] |= UTRSTAT_Rx_BUFFER_DATA_READY;
203
}
204
} else {
205
+ trace_exynos_uart_rx_error(s->channel);
206
s->reg[I_(UINTSP)] |= UINTSP_ERROR;
207
exynos4210_uart_update_irq(s);
208
res = 0;
209
@@ -XXX,XX +XXX,XX @@ static uint64_t exynos4210_uart_read(void *opaque, hwaddr offset,
210
s->reg[I_(UTRSTAT)] &= ~UTRSTAT_Rx_BUFFER_DATA_READY;
211
res = s->reg[I_(URXH)];
212
}
213
+ trace_exynos_uart_read(s->channel, offset,
214
+ exynos4210_uart_regname(offset), res);
215
return res;
216
case UTXH:
217
- PRINT_DEBUG("UART%d: Trying to read from WO register: %s [%04x]\n",
218
- s->channel, exynos4210_uart_regname(offset), offset);
219
+ trace_exynos_uart_wo_read(s->channel, exynos4210_uart_regname(offset),
220
+ offset);
221
break;
222
default:
223
+ trace_exynos_uart_read(s->channel, offset,
224
+ exynos4210_uart_regname(offset),
225
+ s->reg[I_(offset)]);
226
return s->reg[I_(offset)];
227
}
228
229
+ trace_exynos_uart_read(s->channel, offset, exynos4210_uart_regname(offset),
230
+ 0);
231
return 0;
54
return 0;
232
}
55
}
233
56
234
@@ -XXX,XX +XXX,XX @@ static void exynos4210_uart_reset(DeviceState *dev)
57
+/*
235
fifo_reset(&s->rx);
58
+ * Return the exception level to which exceptions should be taken for SME.
236
fifo_reset(&s->tx);
59
+ * C.f. the ARM pseudocode function CheckSMEAccess.
237
60
+ */
238
- PRINT_DEBUG("UART%d: Rx FIFO size: %d\n", s->channel, s->rx.size);
61
+int sme_exception_el(CPUARMState *env, int el)
239
+ trace_exynos_uart_rxsize(s->channel, s->rx.size);
62
+{
240
}
63
+#ifndef CONFIG_USER_ONLY
241
64
+ if (el <= 1 && !el_is_in_host(env, el)) {
242
static const VMStateDescription vmstate_exynos4210_uart_fifo = {
65
+ switch (FIELD_EX64(env->cp15.cpacr_el1, CPACR_EL1, SMEN)) {
243
diff --git a/hw/char/trace-events b/hw/char/trace-events
66
+ case 1:
67
+ if (el != 0) {
68
+ break;
69
+ }
70
+ /* fall through */
71
+ case 0:
72
+ case 2:
73
+ return 1;
74
+ }
75
+ }
76
+
77
+ if (el <= 2 && arm_is_el2_enabled(env)) {
78
+ /* CPTR_EL2 changes format with HCR_EL2.E2H (regardless of TGE). */
79
+ if (env->cp15.hcr_el2 & HCR_E2H) {
80
+ switch (FIELD_EX64(env->cp15.cptr_el[2], CPTR_EL2, SMEN)) {
81
+ case 1:
82
+ if (el != 0 || !(env->cp15.hcr_el2 & HCR_TGE)) {
83
+ break;
84
+ }
85
+ /* fall through */
86
+ case 0:
87
+ case 2:
88
+ return 2;
89
+ }
90
+ } else {
91
+ if (FIELD_EX64(env->cp15.cptr_el[2], CPTR_EL2, TSM)) {
92
+ return 2;
93
+ }
94
+ }
95
+ }
96
+
97
+ /* CPTR_EL3. Since ESM is negative we must check for EL3. */
98
+ if (arm_feature(env, ARM_FEATURE_EL3)
99
+ && !FIELD_EX64(env->cp15.cptr_el[3], CPTR_EL3, ESM)) {
100
+ return 3;
101
+ }
102
+#endif
103
+ return 0;
104
+}
105
+
106
/*
107
* Given that SVE is enabled, return the vector length for EL.
108
*/
109
@@ -XXX,XX +XXX,XX @@ static CPUARMTBFlags rebuild_hflags_a64(CPUARMState *env, int el, int fp_el,
110
}
111
DP_TBFLAG_A64(flags, SVEEXC_EL, sve_el);
112
}
113
+ if (cpu_isar_feature(aa64_sme, env_archcpu(env))) {
114
+ DP_TBFLAG_A64(flags, SMEEXC_EL, sme_exception_el(env, el));
115
+ }
116
117
sctlr = regime_sctlr(env, stage1);
118
119
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
244
index XXXXXXX..XXXXXXX 100644
120
index XXXXXXX..XXXXXXX 100644
245
--- a/hw/char/trace-events
121
--- a/target/arm/translate-a64.c
246
+++ b/hw/char/trace-events
122
+++ b/target/arm/translate-a64.c
247
@@ -XXX,XX +XXX,XX @@ cmsdk_apb_uart_set_params(int speed) "CMSDK APB UART: params set to %d 8N1"
123
@@ -XXX,XX +XXX,XX @@ static void aarch64_tr_init_disas_context(DisasContextBase *dcbase,
248
# nrf51_uart.c
124
dc->align_mem = EX_TBFLAG_ANY(tb_flags, ALIGN_MEM);
249
nrf51_uart_read(uint64_t addr, uint64_t r, unsigned int size) "addr 0x%" PRIx64 " value 0x%" PRIx64 " size %u"
125
dc->pstate_il = EX_TBFLAG_ANY(tb_flags, PSTATE__IL);
250
nrf51_uart_write(uint64_t addr, uint64_t value, unsigned int size) "addr 0x%" PRIx64 " value 0x%" PRIx64 " size %u"
126
dc->sve_excp_el = EX_TBFLAG_A64(tb_flags, SVEEXC_EL);
251
+
127
+ dc->sme_excp_el = EX_TBFLAG_A64(tb_flags, SMEEXC_EL);
252
+# exynos4210_uart.c
128
dc->vl = (EX_TBFLAG_A64(tb_flags, VL) + 1) * 16;
253
+exynos_uart_irq_raised(uint32_t channel, uint32_t reg) "UART%d: IRQ raised: 0x%08"PRIx32
129
dc->pauth_active = EX_TBFLAG_A64(tb_flags, PAUTH_ACTIVE);
254
+exynos_uart_irq_lowered(uint32_t channel) "UART%d: IRQ lowered"
130
dc->bt = EX_TBFLAG_A64(tb_flags, BT);
255
+exynos_uart_update_params(uint32_t channel, int speed, uint8_t parity, int data, int stop) "UART%d: speed: %d, parity: %c, data bits: %d, stop bits: %d"
256
+exynos_uart_write(uint32_t channel, uint32_t offset, const char *name, uint64_t val) "UART%d: <0x%04x> %s <- 0x%" PRIx64
257
+exynos_uart_read(uint32_t channel, uint32_t offset, const char *name, uint64_t val) "UART%d: <0x%04x> %s -> 0x%" PRIx64
258
+exynos_uart_rx_fifo_reset(uint32_t channel) "UART%d: Rx FIFO Reset"
259
+exynos_uart_tx_fifo_reset(uint32_t channel) "UART%d: Tx FIFO Reset"
260
+exynos_uart_tx(uint32_t channel, uint8_t ch) "UART%d: Tx 0x%02"PRIx32
261
+exynos_uart_intclr(uint32_t channel, uint32_t reg) "UART%d: interrupts cleared: 0x%08"PRIx32
262
+exynos_uart_ro_write(uint32_t channel, const char *name, uint32_t reg) "UART%d: Trying to write into RO register: %s [0x%04"PRIx32"]"
263
+exynos_uart_rx(uint32_t channel, uint8_t ch) "UART%d: Rx 0x%02"PRIx32
264
+exynos_uart_rx_error(uint32_t channel) "UART%d: Rx error"
265
+exynos_uart_wo_read(uint32_t channel, const char *name, uint32_t reg) "UART%d: Trying to read from WO register: %s [0x%04"PRIx32"]"
266
+exynos_uart_rxsize(uint32_t channel, uint32_t size) "UART%d: Rx FIFO size: %d"
267
+exynos_uart_channel_error(uint32_t channel) "Wrong UART channel number: %d"
268
--
131
--
269
2.20.1
132
2.25.1
270
271
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
This will be used for raising various traps for SME.
4
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 20220620175235.60881-4-richard.henderson@linaro.org
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
---
10
target/arm/syndrome.h | 14 ++++++++++++++
11
1 file changed, 14 insertions(+)
12
13
diff --git a/target/arm/syndrome.h b/target/arm/syndrome.h
14
index XXXXXXX..XXXXXXX 100644
15
--- a/target/arm/syndrome.h
16
+++ b/target/arm/syndrome.h
17
@@ -XXX,XX +XXX,XX @@ enum arm_exception_class {
18
EC_AA64_SMC = 0x17,
19
EC_SYSTEMREGISTERTRAP = 0x18,
20
EC_SVEACCESSTRAP = 0x19,
21
+ EC_SMETRAP = 0x1d,
22
EC_INSNABORT = 0x20,
23
EC_INSNABORT_SAME_EL = 0x21,
24
EC_PCALIGNMENT = 0x22,
25
@@ -XXX,XX +XXX,XX @@ enum arm_exception_class {
26
EC_AA64_BKPT = 0x3c,
27
};
28
29
+typedef enum {
30
+ SME_ET_AccessTrap,
31
+ SME_ET_Streaming,
32
+ SME_ET_NotStreaming,
33
+ SME_ET_InactiveZA,
34
+} SMEExceptionType;
35
+
36
#define ARM_EL_EC_SHIFT 26
37
#define ARM_EL_IL_SHIFT 25
38
#define ARM_EL_ISV_SHIFT 24
39
@@ -XXX,XX +XXX,XX @@ static inline uint32_t syn_sve_access_trap(void)
40
return EC_SVEACCESSTRAP << ARM_EL_EC_SHIFT;
41
}
42
43
+static inline uint32_t syn_smetrap(SMEExceptionType etype, bool is_16bit)
44
+{
45
+ return (EC_SMETRAP << ARM_EL_EC_SHIFT)
46
+ | (is_16bit ? 0 : ARM_EL_IL) | etype;
47
+}
48
+
49
static inline uint32_t syn_pactrap(void)
50
{
51
return EC_PACTRAP << ARM_EL_EC_SHIFT;
52
--
53
2.25.1
diff view generated by jsdifflib
1
From: Guenter Roeck <linux@roeck-us.net>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
To support receive DMA, we need to inform the DMA controller if receive data
3
This will be used for controlling access to SME cpregs.
4
is available. Otherwise the DMA controller keeps requesting data, causing
5
receive errors.
6
7
Implement this using an interrupt line. The instantiating code then needs
8
to connect the interrupt with the matching DMA controller GPIO pin.
9
4
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Guenter Roeck <linux@roeck-us.net>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
12
Message-id: 20200123052540.6132-8-linux@roeck-us.net
7
Message-id: 20220620175235.60881-5-richard.henderson@linaro.org
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
---
9
---
15
hw/char/exynos4210_uart.c | 24 ++++++++++++++++++++++++
10
target/arm/cpregs.h | 5 +++++
16
hw/char/trace-events | 2 ++
11
target/arm/translate-a64.c | 18 ++++++++++++++++++
17
2 files changed, 26 insertions(+)
12
2 files changed, 23 insertions(+)
18
13
19
diff --git a/hw/char/exynos4210_uart.c b/hw/char/exynos4210_uart.c
14
diff --git a/target/arm/cpregs.h b/target/arm/cpregs.h
20
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
21
--- a/hw/char/exynos4210_uart.c
16
--- a/target/arm/cpregs.h
22
+++ b/hw/char/exynos4210_uart.c
17
+++ b/target/arm/cpregs.h
23
@@ -XXX,XX +XXX,XX @@ typedef struct Exynos4210UartState {
18
@@ -XXX,XX +XXX,XX @@ enum {
24
19
ARM_CP_EL3_NO_EL2_UNDEF = 1 << 16,
25
CharBackend chr;
20
ARM_CP_EL3_NO_EL2_KEEP = 1 << 17,
26
qemu_irq irq;
21
ARM_CP_EL3_NO_EL2_C_NZ = 1 << 18,
27
+ qemu_irq dmairq;
22
+ /*
28
23
+ * Flag: Access check for this sysreg is constrained by the
29
uint32_t channel;
24
+ * ARM pseudocode function CheckSMEAccess().
30
25
+ */
31
@@ -XXX,XX +XXX,XX @@ exynos4210_uart_Rx_FIFO_trigger_level(const Exynos4210UartState *s)
26
+ ARM_CP_SME = 1 << 19,
32
return exynos4210_uart_FIFO_trigger_level(s->channel, reg);
27
};
28
29
/*
30
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
31
index XXXXXXX..XXXXXXX 100644
32
--- a/target/arm/translate-a64.c
33
+++ b/target/arm/translate-a64.c
34
@@ -XXX,XX +XXX,XX @@ bool sve_access_check(DisasContext *s)
35
return fp_access_check(s);
33
}
36
}
34
37
35
+/*
38
+/*
36
+ * Update Rx DMA busy signal if Rx DMA is enabled. For simplicity,
39
+ * Check that SME access is enabled, raise an exception if not.
37
+ * mark DMA as busy if DMA is enabled and the receive buffer is empty.
40
+ * Note that this function corresponds to CheckSMEAccess and is
41
+ * only used directly for cpregs.
38
+ */
42
+ */
39
+static void exynos4210_uart_update_dmabusy(Exynos4210UartState *s)
43
+static bool sme_access_check(DisasContext *s)
40
+{
44
+{
41
+ bool rx_dma_enabled = (s->reg[I_(UCON)] & 0x03) == 0x02;
45
+ if (s->sme_excp_el) {
42
+ uint32_t count = fifo_elements_number(&s->rx);
46
+ gen_exception_insn_el(s, s->pc_curr, EXCP_UDEF,
43
+
47
+ syn_smetrap(SME_ET_AccessTrap, false),
44
+ if (rx_dma_enabled && !count) {
48
+ s->sme_excp_el);
45
+ qemu_irq_raise(s->dmairq);
49
+ return false;
46
+ trace_exynos_uart_dmabusy(s->channel);
47
+ } else {
48
+ qemu_irq_lower(s->dmairq);
49
+ trace_exynos_uart_dmaready(s->channel);
50
+ }
50
+ }
51
+ return true;
51
+}
52
+}
52
+
53
+
53
static void exynos4210_uart_update_irq(Exynos4210UartState *s)
54
/*
54
{
55
* This utility function is for doing register extension with an
55
/*
56
* optional shift. You will likely want to pass a temporary for the
56
@@ -XXX,XX +XXX,XX @@ static void exynos4210_uart_update_irq(Exynos4210UartState *s)
57
@@ -XXX,XX +XXX,XX @@ static void handle_sys(DisasContext *s, uint32_t insn, bool isread,
57
count = fifo_elements_number(&s->rx);
58
return;
58
if ((count && !(s->reg[I_(UCON)] & 0x80)) ||
59
} else if ((ri->type & ARM_CP_SVE) && !sve_access_check(s)) {
59
count >= exynos4210_uart_Rx_FIFO_trigger_level(s)) {
60
return;
60
+ exynos4210_uart_update_dmabusy(s);
61
+ } else if ((ri->type & ARM_CP_SME) && !sme_access_check(s)) {
61
s->reg[I_(UINTSP)] |= UINTSP_RXD;
62
+ return;
62
timer_del(s->fifo_timeout_timer);
63
}
64
} else if (s->reg[I_(UTRSTAT)] & UTRSTAT_Rx_BUFFER_DATA_READY) {
65
+ exynos4210_uart_update_dmabusy(s);
66
s->reg[I_(UINTSP)] |= UINTSP_RXD;
67
}
63
}
68
64
69
@@ -XXX,XX +XXX,XX @@ static void exynos4210_uart_timeout_int(void *opaque)
65
if ((tb_cflags(s->base.tb) & CF_USE_ICOUNT) && (ri->type & ARM_CP_IO)) {
70
(s->reg[I_(UCON)] & (1 << 11))) {
71
s->reg[I_(UINTSP)] |= UINTSP_RXD;
72
s->reg[I_(UTRSTAT)] |= UTRSTAT_Rx_TIMEOUT;
73
+ exynos4210_uart_update_dmabusy(s);
74
exynos4210_uart_update_irq(s);
75
}
76
}
77
@@ -XXX,XX +XXX,XX @@ static uint64_t exynos4210_uart_read(void *opaque, hwaddr offset,
78
s->reg[I_(UTRSTAT)] &= ~UTRSTAT_Rx_BUFFER_DATA_READY;
79
res = s->reg[I_(URXH)];
80
}
81
+ exynos4210_uart_update_dmabusy(s);
82
trace_exynos_uart_read(s->channel, offset,
83
exynos4210_uart_regname(offset), res);
84
return res;
85
@@ -XXX,XX +XXX,XX @@ static void exynos4210_uart_init(Object *obj)
86
sysbus_init_mmio(dev, &s->iomem);
87
88
sysbus_init_irq(dev, &s->irq);
89
+ sysbus_init_irq(dev, &s->dmairq);
90
}
91
92
static void exynos4210_uart_realize(DeviceState *dev, Error **errp)
93
diff --git a/hw/char/trace-events b/hw/char/trace-events
94
index XXXXXXX..XXXXXXX 100644
95
--- a/hw/char/trace-events
96
+++ b/hw/char/trace-events
97
@@ -XXX,XX +XXX,XX @@ nrf51_uart_read(uint64_t addr, uint64_t r, unsigned int size) "addr 0x%" PRIx64
98
nrf51_uart_write(uint64_t addr, uint64_t value, unsigned int size) "addr 0x%" PRIx64 " value 0x%" PRIx64 " size %u"
99
100
# exynos4210_uart.c
101
+exynos_uart_dmabusy(uint32_t channel) "UART%d: DMA busy (Rx buffer empty)"
102
+exynos_uart_dmaready(uint32_t channel) "UART%d: DMA ready"
103
exynos_uart_irq_raised(uint32_t channel, uint32_t reg) "UART%d: IRQ raised: 0x%08"PRIx32
104
exynos_uart_irq_lowered(uint32_t channel) "UART%d: IRQ lowered"
105
exynos_uart_update_params(uint32_t channel, int speed, uint8_t parity, int data, int stop, uint64_t wordtime) "UART%d: speed: %d, parity: %c, data bits: %d, stop bits: %d wordtime: %"PRId64"ns"
106
--
66
--
107
2.20.1
67
2.25.1
108
109
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
This cpreg is used to access two new bits of PSTATE
4
that are not visible via any other mechanism.
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220620175235.60881-6-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/cpu.h | 6 ++++++
12
target/arm/helper.c | 13 +++++++++++++
13
2 files changed, 19 insertions(+)
14
15
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
16
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/cpu.h
18
+++ b/target/arm/cpu.h
19
@@ -XXX,XX +XXX,XX @@ typedef struct CPUArchState {
20
* nRW (also known as M[4]) is kept, inverted, in env->aarch64
21
* DAIF (exception masks) are kept in env->daif
22
* BTYPE is kept in env->btype
23
+ * SM and ZA are kept in env->svcr
24
* all other bits are stored in their correct places in env->pstate
25
*/
26
uint32_t pstate;
27
@@ -XXX,XX +XXX,XX @@ typedef struct CPUArchState {
28
uint32_t condexec_bits; /* IT bits. cpsr[15:10,26:25]. */
29
uint32_t btype; /* BTI branch type. spsr[11:10]. */
30
uint64_t daif; /* exception masks, in the bits they are in PSTATE */
31
+ uint64_t svcr; /* PSTATE.{SM,ZA} in the bits they are in SVCR */
32
33
uint64_t elr_el[4]; /* AArch64 exception link regs */
34
uint64_t sp_el[4]; /* AArch64 banked stack pointers */
35
@@ -XXX,XX +XXX,XX @@ FIELD(CPTR_EL3, TCPAC, 31, 1)
36
#define PSTATE_MODE_EL1t 4
37
#define PSTATE_MODE_EL0t 0
38
39
+/* PSTATE bits that are accessed via SVCR and not stored in SPSR_ELx. */
40
+FIELD(SVCR, SM, 0, 1)
41
+FIELD(SVCR, ZA, 1, 1)
42
+
43
/* Write a new value to v7m.exception, thus transitioning into or out
44
* of Handler mode; this may result in a change of active stack pointer.
45
*/
46
diff --git a/target/arm/helper.c b/target/arm/helper.c
47
index XXXXXXX..XXXXXXX 100644
48
--- a/target/arm/helper.c
49
+++ b/target/arm/helper.c
50
@@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tpidr2(CPUARMState *env, const ARMCPRegInfo *ri,
51
return CP_ACCESS_OK;
52
}
53
54
+static void svcr_write(CPUARMState *env, const ARMCPRegInfo *ri,
55
+ uint64_t value)
56
+{
57
+ value &= R_SVCR_SM_MASK | R_SVCR_ZA_MASK;
58
+ /* TODO: Side effects. */
59
+ env->svcr = value;
60
+}
61
+
62
static const ARMCPRegInfo sme_reginfo[] = {
63
{ .name = "TPIDR2_EL0", .state = ARM_CP_STATE_AA64,
64
.opc0 = 3, .opc1 = 3, .crn = 13, .crm = 0, .opc2 = 5,
65
.access = PL0_RW, .accessfn = access_tpidr2,
66
.fieldoffset = offsetof(CPUARMState, cp15.tpidr2_el0) },
67
+ { .name = "SVCR", .state = ARM_CP_STATE_AA64,
68
+ .opc0 = 3, .opc1 = 3, .crn = 4, .crm = 2, .opc2 = 2,
69
+ .access = PL0_RW, .type = ARM_CP_SME,
70
+ .fieldoffset = offsetof(CPUARMState, svcr),
71
+ .writefn = svcr_write, .raw_writefn = raw_write },
72
};
73
#endif /* TARGET_AARCH64 */
74
75
--
76
2.25.1
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
This is the test vector from the QARMA paper, run through PACGA.
3
These cpregs control the streaming vector length and whether the
4
full a64 instruction set is allowed while in streaming mode.
4
5
5
Suggested-by: Vincent Dehors <vincent.dehors@smile.fr>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 20200116230809.19078-4-richard.henderson@linaro.org
8
Message-id: 20220620175235.60881-7-richard.henderson@linaro.org
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
---
10
---
10
tests/tcg/aarch64/Makefile.softmmu-target | 5 ++-
11
target/arm/cpu.h | 8 ++++++--
11
tests/tcg/aarch64/system/pauth-3.c | 40 +++++++++++++++++++++++
12
target/arm/helper.c | 41 +++++++++++++++++++++++++++++++++++++++++
12
2 files changed, 44 insertions(+), 1 deletion(-)
13
2 files changed, 47 insertions(+), 2 deletions(-)
13
create mode 100644 tests/tcg/aarch64/system/pauth-3.c
14
14
15
diff --git a/tests/tcg/aarch64/Makefile.softmmu-target b/tests/tcg/aarch64/Makefile.softmmu-target
15
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
16
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
17
--- a/tests/tcg/aarch64/Makefile.softmmu-target
17
--- a/target/arm/cpu.h
18
+++ b/tests/tcg/aarch64/Makefile.softmmu-target
18
+++ b/target/arm/cpu.h
19
@@ -XXX,XX +XXX,XX @@ run-memory-replay: memory-replay run-memory-record
19
@@ -XXX,XX +XXX,XX @@ typedef struct CPUArchState {
20
          $(QEMU_OPTS) memory, \
20
float_status standard_fp_status;
21
     "$< on $(TARGET_NAME)")
21
float_status standard_fp_status_f16;
22
22
23
-EXTRA_TESTS+=memory-record memory-replay
23
- /* ZCR_EL[1-3] */
24
+run-pauth-3: pauth-3
24
- uint64_t zcr_el[4];
25
+pauth-3: CFLAGS += -march=armv8.3-a
25
+ uint64_t zcr_el[4]; /* ZCR_EL[1-3] */
26
+ uint64_t smcr_el[4]; /* SMCR_EL[1-3] */
27
} vfp;
28
uint64_t exclusive_addr;
29
uint64_t exclusive_val;
30
@@ -XXX,XX +XXX,XX @@ FIELD(CPTR_EL3, TCPAC, 31, 1)
31
FIELD(SVCR, SM, 0, 1)
32
FIELD(SVCR, ZA, 1, 1)
33
34
+/* Fields for SMCR_ELx. */
35
+FIELD(SMCR, LEN, 0, 4)
36
+FIELD(SMCR, FA64, 31, 1)
26
+
37
+
27
+EXTRA_TESTS+=memory-record memory-replay pauth-3
38
/* Write a new value to v7m.exception, thus transitioning into or out
28
diff --git a/tests/tcg/aarch64/system/pauth-3.c b/tests/tcg/aarch64/system/pauth-3.c
39
* of Handler mode; this may result in a change of active stack pointer.
29
new file mode 100644
40
*/
30
index XXXXXXX..XXXXXXX
41
diff --git a/target/arm/helper.c b/target/arm/helper.c
31
--- /dev/null
42
index XXXXXXX..XXXXXXX 100644
32
+++ b/tests/tcg/aarch64/system/pauth-3.c
43
--- a/target/arm/helper.c
33
@@ -XXX,XX +XXX,XX @@
44
+++ b/target/arm/helper.c
34
+#include <inttypes.h>
45
@@ -XXX,XX +XXX,XX @@ static void define_arm_vh_e2h_redirects_aliases(ARMCPU *cpu)
35
+#include <minilib.h>
46
*/
47
{ K(3, 0, 1, 2, 0), K(3, 4, 1, 2, 0), K(3, 5, 1, 2, 0),
48
"ZCR_EL1", "ZCR_EL2", "ZCR_EL12", isar_feature_aa64_sve },
49
+ { K(3, 0, 1, 2, 6), K(3, 4, 1, 2, 6), K(3, 5, 1, 2, 6),
50
+ "SMCR_EL1", "SMCR_EL2", "SMCR_EL12", isar_feature_aa64_sme },
51
52
{ K(3, 0, 5, 6, 0), K(3, 4, 5, 6, 0), K(3, 5, 5, 6, 0),
53
"TFSR_EL1", "TFSR_EL2", "TFSR_EL12", isar_feature_aa64_mte },
54
@@ -XXX,XX +XXX,XX @@ static void svcr_write(CPUARMState *env, const ARMCPRegInfo *ri,
55
env->svcr = value;
56
}
57
58
+static void smcr_write(CPUARMState *env, const ARMCPRegInfo *ri,
59
+ uint64_t value)
60
+{
61
+ int cur_el = arm_current_el(env);
62
+ int old_len = sve_vqm1_for_el(env, cur_el);
63
+ int new_len;
36
+
64
+
37
+int main()
65
+ QEMU_BUILD_BUG_ON(ARM_MAX_VQ > R_SMCR_LEN_MASK + 1);
38
+{
66
+ value &= R_SMCR_LEN_MASK | R_SMCR_FA64_MASK;
67
+ raw_write(env, ri, value);
68
+
39
+ /*
69
+ /*
40
+ * Test vector from QARMA paper (https://eprint.iacr.org/2016/444.pdf)
70
+ * Note that it is CONSTRAINED UNPREDICTABLE what happens to ZA storage
41
+ * to verify one computation of the pauth_computepac() function,
71
+ * when SVL is widened (old values kept, or zeros). Choose to keep the
42
+ * which uses sbox2.
72
+ * current values for simplicity. But for QEMU internals, we must still
43
+ *
73
+ * apply the narrower SVL to the Zregs and Pregs -- see the comment
44
+ * Use PACGA, because it returns the most bits from ComputePAC.
74
+ * above aarch64_sve_narrow_vq.
45
+ * We still only get the most significant 32-bits of the result.
46
+ */
75
+ */
47
+
76
+ new_len = sve_vqm1_for_el(env, cur_el);
48
+ static const uint64_t d[5] = {
77
+ if (new_len < old_len) {
49
+ 0xfb623599da6e8127ull,
78
+ aarch64_sve_narrow_vq(env, new_len + 1);
50
+ 0x477d469dec0b8762ull,
51
+ 0x84be85ce9804e94bull,
52
+ 0xec2802d4e0a488e9ull,
53
+ 0xc003b93999b33765ull & 0xffffffff00000000ull
54
+ };
55
+ uint64_t r;
56
+
57
+ asm("msr apgakeyhi_el1, %[w0]\n\t"
58
+ "msr apgakeylo_el1, %[k0]\n\t"
59
+ "pacga %[r], %[P], %[T]"
60
+ : [r] "=r"(r)
61
+ : [P] "r" (d[0]),
62
+ [T] "r" (d[1]),
63
+ [w0] "r" (d[2]),
64
+ [k0] "r" (d[3]));
65
+
66
+ if (r == d[4]) {
67
+ ml_printf("OK\n");
68
+ return 0;
69
+ } else {
70
+ ml_printf("FAIL: %lx != %lx\n", r, d[4]);
71
+ return 1;
72
+ }
79
+ }
73
+}
80
+}
81
+
82
static const ARMCPRegInfo sme_reginfo[] = {
83
{ .name = "TPIDR2_EL0", .state = ARM_CP_STATE_AA64,
84
.opc0 = 3, .opc1 = 3, .crn = 13, .crm = 0, .opc2 = 5,
85
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo sme_reginfo[] = {
86
.access = PL0_RW, .type = ARM_CP_SME,
87
.fieldoffset = offsetof(CPUARMState, svcr),
88
.writefn = svcr_write, .raw_writefn = raw_write },
89
+ { .name = "SMCR_EL1", .state = ARM_CP_STATE_AA64,
90
+ .opc0 = 3, .opc1 = 0, .crn = 1, .crm = 2, .opc2 = 6,
91
+ .access = PL1_RW, .type = ARM_CP_SME,
92
+ .fieldoffset = offsetof(CPUARMState, vfp.smcr_el[1]),
93
+ .writefn = smcr_write, .raw_writefn = raw_write },
94
+ { .name = "SMCR_EL2", .state = ARM_CP_STATE_AA64,
95
+ .opc0 = 3, .opc1 = 4, .crn = 1, .crm = 2, .opc2 = 6,
96
+ .access = PL2_RW, .type = ARM_CP_SME,
97
+ .fieldoffset = offsetof(CPUARMState, vfp.smcr_el[2]),
98
+ .writefn = smcr_write, .raw_writefn = raw_write },
99
+ { .name = "SMCR_EL3", .state = ARM_CP_STATE_AA64,
100
+ .opc0 = 3, .opc1 = 6, .crn = 1, .crm = 2, .opc2 = 6,
101
+ .access = PL3_RW, .type = ARM_CP_SME,
102
+ .fieldoffset = offsetof(CPUARMState, vfp.smcr_el[3]),
103
+ .writefn = smcr_write, .raw_writefn = raw_write },
104
};
105
#endif /* TARGET_AARCH64 */
106
74
--
107
--
75
2.20.1
108
2.25.1
76
77
diff view generated by jsdifflib
1
From: Guenter Roeck <linux@roeck-us.net>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
First parameter to exynos4210_get_irq() is not the SPI port number,
3
Implement the streaming mode identification register, and the
4
but the interrupt group number. Interrupt groups are 20 for mdma
4
two streaming priority registers. For QEMU, they are all RES0.
5
and 21 for pdma. Interrupts are not inverted. Controllers support 32
6
events (pdma) or 31 events (mdma). Events must all be routed to a single
7
interrupt line. Set other parameters as documented in Exynos4210 datasheet,
8
section 8 (DMA controller).
9
5
10
Fixes: 59520dc65e ("hw/arm/exynos4210: Add DMA support for the Exynos4210")
11
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Guenter Roeck <linux@roeck-us.net>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
13
Message-id: 20200123052540.6132-4-linux@roeck-us.net
8
Message-id: 20220620175235.60881-8-richard.henderson@linaro.org
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
15
---
10
---
16
include/hw/arm/exynos4210.h | 4 +++
11
target/arm/helper.c | 33 +++++++++++++++++++++++++++++++++
17
hw/arm/exynos4210.c | 51 +++++++++++++++++++++++++++++++------
12
1 file changed, 33 insertions(+)
18
2 files changed, 47 insertions(+), 8 deletions(-)
19
13
20
diff --git a/include/hw/arm/exynos4210.h b/include/hw/arm/exynos4210.h
14
diff --git a/target/arm/helper.c b/target/arm/helper.c
21
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
22
--- a/include/hw/arm/exynos4210.h
16
--- a/target/arm/helper.c
23
+++ b/include/hw/arm/exynos4210.h
17
+++ b/target/arm/helper.c
24
@@ -XXX,XX +XXX,XX @@
18
@@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tpidr2(CPUARMState *env, const ARMCPRegInfo *ri,
25
#ifndef EXYNOS4210_H
19
return CP_ACCESS_OK;
26
#define EXYNOS4210_H
27
28
+#include "hw/or-irq.h"
29
#include "hw/sysbus.h"
30
#include "target/arm/cpu-qom.h"
31
32
@@ -XXX,XX +XXX,XX @@
33
34
#define EXYNOS4210_I2C_NUMBER 9
35
36
+#define EXYNOS4210_NUM_DMA 3
37
+
38
typedef struct Exynos4210Irq {
39
qemu_irq int_combiner_irq[EXYNOS4210_MAX_INT_COMBINER_IN_IRQ];
40
qemu_irq ext_combiner_irq[EXYNOS4210_MAX_EXT_COMBINER_IN_IRQ];
41
@@ -XXX,XX +XXX,XX @@ typedef struct Exynos4210State {
42
MemoryRegion boot_secondary;
43
MemoryRegion bootreg_mem;
44
I2CBus *i2c_if[EXYNOS4210_I2C_NUMBER];
45
+ qemu_or_irq pl330_irq_orgate[EXYNOS4210_NUM_DMA];
46
} Exynos4210State;
47
48
#define TYPE_EXYNOS4210_SOC "exynos4210"
49
diff --git a/hw/arm/exynos4210.c b/hw/arm/exynos4210.c
50
index XXXXXXX..XXXXXXX 100644
51
--- a/hw/arm/exynos4210.c
52
+++ b/hw/arm/exynos4210.c
53
@@ -XXX,XX +XXX,XX @@ static uint64_t exynos4210_calc_affinity(int cpu)
54
return (0x9 << ARM_AFF1_SHIFT) | cpu;
55
}
20
}
56
21
57
-static void pl330_create(uint32_t base, qemu_irq irq, int nreq)
22
+static CPAccessResult access_esm(CPUARMState *env, const ARMCPRegInfo *ri,
58
+static void pl330_create(uint32_t base, qemu_or_irq *orgate, qemu_irq irq,
23
+ bool isread)
59
+ int nreq, int nevents, int width)
24
+{
60
{
25
+ /* TODO: FEAT_FGT for SMPRI_EL1 but not SMPRIMAP_EL2 */
61
SysBusDevice *busdev;
26
+ if (arm_current_el(env) < 3
62
DeviceState *dev;
27
+ && arm_feature(env, ARM_FEATURE_EL3)
63
+ int i;
28
+ && !FIELD_EX64(env->cp15.cptr_el[3], CPTR_EL3, ESM)) {
64
29
+ return CP_ACCESS_TRAP_EL3;
65
dev = qdev_create(NULL, "pl330");
66
+ qdev_prop_set_uint8(dev, "num_events", nevents);
67
+ qdev_prop_set_uint8(dev, "num_chnls", 8);
68
qdev_prop_set_uint8(dev, "num_periph_req", nreq);
69
+
70
+ qdev_prop_set_uint8(dev, "wr_cap", 4);
71
+ qdev_prop_set_uint8(dev, "wr_q_dep", 8);
72
+ qdev_prop_set_uint8(dev, "rd_cap", 4);
73
+ qdev_prop_set_uint8(dev, "rd_q_dep", 8);
74
+ qdev_prop_set_uint8(dev, "data_width", width);
75
+ qdev_prop_set_uint16(dev, "data_buffer_dep", width);
76
qdev_init_nofail(dev);
77
busdev = SYS_BUS_DEVICE(dev);
78
sysbus_mmio_map(busdev, 0, base);
79
- sysbus_connect_irq(busdev, 0, irq);
80
+
81
+ object_property_set_int(OBJECT(orgate), nevents + 1, "num-lines",
82
+ &error_abort);
83
+ object_property_set_bool(OBJECT(orgate), true, "realized", &error_abort);
84
+
85
+ for (i = 0; i < nevents + 1; i++) {
86
+ sysbus_connect_irq(busdev, i, qdev_get_gpio_in(DEVICE(orgate), i));
87
+ }
30
+ }
88
+ qdev_connect_gpio_out(DEVICE(orgate), 0, irq);
31
+ return CP_ACCESS_OK;
89
}
90
91
static void exynos4210_realize(DeviceState *socdev, Error **errp)
92
@@ -XXX,XX +XXX,XX @@ static void exynos4210_realize(DeviceState *socdev, Error **errp)
93
s->irq_table[exynos4210_get_irq(28, 3)]);
94
95
/*** DMA controllers ***/
96
- pl330_create(EXYNOS4210_PL330_BASE0_ADDR,
97
- qemu_irq_invert(s->irq_table[exynos4210_get_irq(35, 1)]), 32);
98
- pl330_create(EXYNOS4210_PL330_BASE1_ADDR,
99
- qemu_irq_invert(s->irq_table[exynos4210_get_irq(36, 1)]), 32);
100
- pl330_create(EXYNOS4210_PL330_BASE2_ADDR,
101
- qemu_irq_invert(s->irq_table[exynos4210_get_irq(34, 1)]), 1);
102
+ pl330_create(EXYNOS4210_PL330_BASE0_ADDR, &s->pl330_irq_orgate[0],
103
+ s->irq_table[exynos4210_get_irq(21, 0)], 32, 32, 32);
104
+ pl330_create(EXYNOS4210_PL330_BASE1_ADDR, &s->pl330_irq_orgate[1],
105
+ s->irq_table[exynos4210_get_irq(21, 1)], 32, 32, 32);
106
+ pl330_create(EXYNOS4210_PL330_BASE2_ADDR, &s->pl330_irq_orgate[2],
107
+ s->irq_table[exynos4210_get_irq(20, 1)], 1, 31, 64);
108
+}
32
+}
109
+
33
+
110
+static void exynos4210_init(Object *obj)
34
static void svcr_write(CPUARMState *env, const ARMCPRegInfo *ri,
111
+{
35
uint64_t value)
112
+ Exynos4210State *s = EXYNOS4210_SOC(obj);
36
{
113
+ int i;
37
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo sme_reginfo[] = {
114
+
38
.access = PL3_RW, .type = ARM_CP_SME,
115
+ for (i = 0; i < ARRAY_SIZE(s->pl330_irq_orgate); i++) {
39
.fieldoffset = offsetof(CPUARMState, vfp.smcr_el[3]),
116
+ char *name = g_strdup_printf("pl330-irq-orgate%d", i);
40
.writefn = smcr_write, .raw_writefn = raw_write },
117
+ qemu_or_irq *orgate = &s->pl330_irq_orgate[i];
41
+ { .name = "SMIDR_EL1", .state = ARM_CP_STATE_AA64,
118
+
42
+ .opc0 = 3, .opc1 = 1, .crn = 0, .crm = 0, .opc2 = 6,
119
+ object_initialize_child(obj, name, orgate, sizeof(*orgate),
43
+ .access = PL1_R, .accessfn = access_aa64_tid1,
120
+ TYPE_OR_IRQ, &error_abort, NULL);
44
+ /*
121
+ g_free(name);
45
+ * IMPLEMENTOR = 0 (software)
122
+ }
46
+ * REVISION = 0 (implementation defined)
123
}
47
+ * SMPS = 0 (no streaming execution priority in QEMU)
124
48
+ * AFFINITY = 0 (streaming sve mode not shared with other PEs)
125
static void exynos4210_class_init(ObjectClass *klass, void *data)
49
+ */
126
@@ -XXX,XX +XXX,XX @@ static const TypeInfo exynos4210_info = {
50
+ .type = ARM_CP_CONST, .resetvalue = 0, },
127
.name = TYPE_EXYNOS4210_SOC,
51
+ /*
128
.parent = TYPE_SYS_BUS_DEVICE,
52
+ * Because SMIDR_EL1.SMPS is 0, SMPRI_EL1 and SMPRIMAP_EL2 are RES 0.
129
.instance_size = sizeof(Exynos4210State),
53
+ */
130
+ .instance_init = exynos4210_init,
54
+ { .name = "SMPRI_EL1", .state = ARM_CP_STATE_AA64,
131
.class_init = exynos4210_class_init,
55
+ .opc0 = 3, .opc1 = 0, .crn = 1, .crm = 2, .opc2 = 4,
56
+ .access = PL1_RW, .accessfn = access_esm,
57
+ .type = ARM_CP_CONST, .resetvalue = 0 },
58
+ { .name = "SMPRIMAP_EL2", .state = ARM_CP_STATE_AA64,
59
+ .opc0 = 3, .opc1 = 4, .crn = 1, .crm = 2, .opc2 = 5,
60
+ .access = PL2_RW, .accessfn = access_esm,
61
+ .type = ARM_CP_CONST, .resetvalue = 0 },
132
};
62
};
63
#endif /* TARGET_AARCH64 */
133
64
134
--
65
--
135
2.20.1
66
2.25.1
136
137
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
These are required to determine if various insns
4
are allowed to issue.
5
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220620175235.60881-9-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/cpu.h | 2 ++
12
target/arm/translate.h | 4 ++++
13
target/arm/helper.c | 4 ++++
14
target/arm/translate-a64.c | 2 ++
15
4 files changed, 12 insertions(+)
16
17
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
18
index XXXXXXX..XXXXXXX 100644
19
--- a/target/arm/cpu.h
20
+++ b/target/arm/cpu.h
21
@@ -XXX,XX +XXX,XX @@ FIELD(TBFLAG_A64, TCMA, 16, 2)
22
FIELD(TBFLAG_A64, MTE_ACTIVE, 18, 1)
23
FIELD(TBFLAG_A64, MTE0_ACTIVE, 19, 1)
24
FIELD(TBFLAG_A64, SMEEXC_EL, 20, 2)
25
+FIELD(TBFLAG_A64, PSTATE_SM, 22, 1)
26
+FIELD(TBFLAG_A64, PSTATE_ZA, 23, 1)
27
28
/*
29
* Helpers for using the above.
30
diff --git a/target/arm/translate.h b/target/arm/translate.h
31
index XXXXXXX..XXXXXXX 100644
32
--- a/target/arm/translate.h
33
+++ b/target/arm/translate.h
34
@@ -XXX,XX +XXX,XX @@ typedef struct DisasContext {
35
bool align_mem;
36
/* True if PSTATE.IL is set */
37
bool pstate_il;
38
+ /* True if PSTATE.SM is set. */
39
+ bool pstate_sm;
40
+ /* True if PSTATE.ZA is set. */
41
+ bool pstate_za;
42
/* True if MVE insns are definitely not predicated by VPR or LTPSIZE */
43
bool mve_no_pred;
44
/*
45
diff --git a/target/arm/helper.c b/target/arm/helper.c
46
index XXXXXXX..XXXXXXX 100644
47
--- a/target/arm/helper.c
48
+++ b/target/arm/helper.c
49
@@ -XXX,XX +XXX,XX @@ static CPUARMTBFlags rebuild_hflags_a64(CPUARMState *env, int el, int fp_el,
50
}
51
if (cpu_isar_feature(aa64_sme, env_archcpu(env))) {
52
DP_TBFLAG_A64(flags, SMEEXC_EL, sme_exception_el(env, el));
53
+ if (FIELD_EX64(env->svcr, SVCR, SM)) {
54
+ DP_TBFLAG_A64(flags, PSTATE_SM, 1);
55
+ }
56
+ DP_TBFLAG_A64(flags, PSTATE_ZA, FIELD_EX64(env->svcr, SVCR, ZA));
57
}
58
59
sctlr = regime_sctlr(env, stage1);
60
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
61
index XXXXXXX..XXXXXXX 100644
62
--- a/target/arm/translate-a64.c
63
+++ b/target/arm/translate-a64.c
64
@@ -XXX,XX +XXX,XX @@ static void aarch64_tr_init_disas_context(DisasContextBase *dcbase,
65
dc->ata = EX_TBFLAG_A64(tb_flags, ATA);
66
dc->mte_active[0] = EX_TBFLAG_A64(tb_flags, MTE_ACTIVE);
67
dc->mte_active[1] = EX_TBFLAG_A64(tb_flags, MTE0_ACTIVE);
68
+ dc->pstate_sm = EX_TBFLAG_A64(tb_flags, PSTATE_SM);
69
+ dc->pstate_za = EX_TBFLAG_A64(tb_flags, PSTATE_ZA);
70
dc->vec_len = 0;
71
dc->vec_stride = 0;
72
dc->cp_regs = arm_cpu->cp_regs;
73
--
74
2.25.1
diff view generated by jsdifflib
1
The qemu-block-drivers documentation is currently in
1
From: Richard Henderson <richard.henderson@linaro.org>
2
docs/qemu-block-drivers.texi in Texinfo format, which we present
3
to the user as:
4
* a qemu-block-drivers manpage
5
* a section of the main qemu-doc HTML documentation
6
2
7
Convert the documentation to rST format, and present it to
3
Place this late in the resettable section of the structure,
8
the user as:
4
to keep the most common element offsets from being > 64k.
9
* a qemu-block-drivers manpage
10
* part of the system/ Sphinx manual
11
5
12
This follows the same pattern we've done for qemu-ga and qemu-nbd.
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220620175235.60881-10-richard.henderson@linaro.org
9
[PMM: expanded comment on zarray[] format]
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
12
target/arm/cpu.h | 22 ++++++++++++++++++++++
13
target/arm/machine.c | 34 ++++++++++++++++++++++++++++++++++
14
2 files changed, 56 insertions(+)
13
15
14
We have to drop a cross-reference from the documentation of the
16
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
15
-cdrom option back to the qemu-block-drivers documentation, since
16
they're no longer within the same texinfo document.
17
18
As noted in a comment, the manpage output is slightly compromised
19
due to limitations in Sphinx. In an ideal world, the HTML output
20
would have the various headings like 'Disk image file formats'
21
as top-level section headings (which then appear in the overall
22
system manual's table-of-contents), and it would not have the
23
section headings which make sense only for the manpage like
24
'synopsis', 'description', and 'see also'. Unfortunately, the
25
mechanism Sphinx provides for restricting pieces of documentation
26
is limited to the point of being flawed: the 'only::' directive
27
is implemented as a filter that is applied at a very late stage
28
in the document processing pipeline, rather than as an early
29
equivalent of an #ifdef. This means that Sphinx's process of
30
identifying which section heading markup styles are which levels
31
of heading gets confused if the 'only::' directive contains
32
section headings which would affect the heading-level of a
33
later heading. I have opted to prioritise making the HTML format
34
look better, with the compromise being that in the manpage
35
the 'Disk image file formats' &c headings are top-level headings
36
rather than being sub-headings under the traditional 'Description'
37
top-level section title.
38
39
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
40
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
41
Tested-by: Alex Bennée <alex.bennee@linaro.org>
42
Acked-by: Stefan Hajnoczi <stefanha@redhat.com>
43
Message-id: 20200116141511.16849-4-peter.maydell@linaro.org
44
---
45
Makefile | 11 +-
46
docs/qemu-block-drivers.texi | 889 --------------------------
47
docs/system/conf.py | 7 +
48
docs/system/index.rst | 1 +
49
docs/system/qemu-block-drivers.rst | 985 +++++++++++++++++++++++++++++
50
qemu-doc.texi | 12 -
51
qemu-options.hx | 2 +-
52
7 files changed, 1000 insertions(+), 907 deletions(-)
53
delete mode 100644 docs/qemu-block-drivers.texi
54
create mode 100644 docs/system/qemu-block-drivers.rst
55
56
diff --git a/Makefile b/Makefile
57
index XXXXXXX..XXXXXXX 100644
17
index XXXXXXX..XXXXXXX 100644
58
--- a/Makefile
18
--- a/target/arm/cpu.h
59
+++ b/Makefile
19
+++ b/target/arm/cpu.h
60
@@ -XXX,XX +XXX,XX @@ ifdef BUILD_DOCS
20
@@ -XXX,XX +XXX,XX @@ typedef struct CPUArchState {
61
DOCS=qemu-doc.html qemu-doc.txt qemu.1 qemu-img.1
21
} keys;
62
DOCS+=$(MANUAL_BUILDDIR)/interop/qemu-nbd.8
22
63
DOCS+=$(MANUAL_BUILDDIR)/interop/qemu-ga.8
23
uint64_t scxtnum_el[4];
64
+DOCS+=$(MANUAL_BUILDDIR)/system/qemu-block-drivers.7
65
DOCS+=docs/interop/qemu-qmp-ref.html docs/interop/qemu-qmp-ref.txt docs/interop/qemu-qmp-ref.7
66
DOCS+=docs/interop/qemu-ga-ref.html docs/interop/qemu-ga-ref.txt docs/interop/qemu-ga-ref.7
67
-DOCS+=docs/qemu-block-drivers.7
68
DOCS+=docs/qemu-cpu-models.7
69
DOCS+=$(MANUAL_BUILDDIR)/index.html
70
ifdef CONFIG_VIRTFS
71
@@ -XXX,XX +XXX,XX @@ distclean: clean
72
    rm -f docs/interop/qemu-qmp-ref.txt docs/interop/qemu-ga-ref.txt
73
    rm -f docs/interop/qemu-qmp-ref.pdf docs/interop/qemu-ga-ref.pdf
74
    rm -f docs/interop/qemu-qmp-ref.html docs/interop/qemu-ga-ref.html
75
-    rm -f docs/qemu-block-drivers.7
76
    rm -f docs/qemu-cpu-models.7
77
    rm -rf .doctrees
78
    $(call clean-manual,devel)
79
@@ -XXX,XX +XXX,XX @@ ifdef CONFIG_POSIX
80
    $(INSTALL_DATA) qemu.1 "$(DESTDIR)$(mandir)/man1"
81
    $(INSTALL_DIR) "$(DESTDIR)$(mandir)/man7"
82
    $(INSTALL_DATA) docs/interop/qemu-qmp-ref.7 "$(DESTDIR)$(mandir)/man7"
83
-    $(INSTALL_DATA) docs/qemu-block-drivers.7 "$(DESTDIR)$(mandir)/man7"
84
+    $(INSTALL_DATA) $(MANUAL_BUILDDIR)/system/qemu-block-drivers.7 "$(DESTDIR)$(mandir)/man7"
85
    $(INSTALL_DATA) docs/qemu-cpu-models.7 "$(DESTDIR)$(mandir)/man7"
86
ifeq ($(CONFIG_TOOLS),y)
87
    $(INSTALL_DATA) qemu-img.1 "$(DESTDIR)$(mandir)/man1"
88
@@ -XXX,XX +XXX,XX @@ $(MANUAL_BUILDDIR)/interop/qemu-ga.8: $(call manual-deps,interop)
89
$(MANUAL_BUILDDIR)/interop/qemu-nbd.8: $(call manual-deps,interop)
90
    $(call build-manual,interop,man)
91
92
+$(MANUAL_BUILDDIR)/system/qemu-block-drivers.7: $(call manual-deps,system)
93
+    $(call build-manual,system,man)
94
+
24
+
95
$(MANUAL_BUILDDIR)/index.html: $(SRC_PATH)/docs/index.html.in qemu-version.h
25
+ /*
96
    @mkdir -p "$(MANUAL_BUILDDIR)"
26
+ * SME ZA storage -- 256 x 256 byte array, with bytes in host word order,
97
    $(call quiet-command, sed "s|@@VERSION@@|${VERSION}|g" $< >$@, \
27
+ * as we do with vfp.zregs[]. This corresponds to the architectural ZA
98
@@ -XXX,XX +XXX,XX @@ qemu.1: qemu-doc.texi qemu-options.texi qemu-monitor.texi qemu-monitor-info.texi
28
+ * array, where ZA[N] is in the least-significant bytes of env->zarray[N].
99
qemu.1: qemu-option-trace.texi
29
+ * When SVL is less than the architectural maximum, the accessible
100
qemu-img.1: qemu-img.texi qemu-option-trace.texi qemu-img-cmds.texi
30
+ * storage is restricted, such that if the SVL is X bytes the guest can
101
fsdev/virtfs-proxy-helper.1: fsdev/virtfs-proxy-helper.texi
31
+ * see only the bottom X elements of zarray[], and only the least
102
-docs/qemu-block-drivers.7: docs/qemu-block-drivers.texi
32
+ * significant X bytes of each element of the array. (In other words,
103
docs/qemu-cpu-models.7: docs/qemu-cpu-models.texi
33
+ * the observable part is always square.)
104
scripts/qemu-trace-stap.1: scripts/qemu-trace-stap.texi
34
+ *
105
35
+ * The ZA storage can also be considered as a set of square tiles of
106
@@ -XXX,XX +XXX,XX @@ qemu-doc.html qemu-doc.info qemu-doc.pdf qemu-doc.txt: \
36
+ * elements of different sizes. The mapping from tiles to the ZA array
107
    qemu-img.texi qemu-options.texi \
37
+ * is architecturally defined, such that for tiles of elements of esz
108
    qemu-tech.texi qemu-option-trace.texi \
38
+ * bytes, the Nth row (or "horizontal slice") of tile T is in
109
    qemu-deprecated.texi qemu-monitor.texi qemu-img-cmds.texi \
39
+ * ZA[T + N * esz]. Note that this means that each tile is not contiguous
110
-    qemu-monitor-info.texi docs/qemu-block-drivers.texi \
40
+ * in the ZA storage, because its rows are striped through the ZA array.
111
+    qemu-monitor-info.texi \
41
+ *
112
    docs/qemu-cpu-models.texi docs/security.texi
42
+ * Because this is so large, keep this toward the end of the reset area,
113
43
+ * to keep the offsets into the rest of the structure smaller.
114
docs/interop/qemu-ga-ref.dvi docs/interop/qemu-ga-ref.html \
44
+ */
115
diff --git a/docs/qemu-block-drivers.texi b/docs/qemu-block-drivers.texi
45
+ ARMVectorReg zarray[ARM_MAX_VQ * 16];
116
deleted file mode 100644
46
#endif
117
index XXXXXXX..XXXXXXX
47
118
--- a/docs/qemu-block-drivers.texi
48
#if defined(CONFIG_USER_ONLY)
119
+++ /dev/null
49
diff --git a/target/arm/machine.c b/target/arm/machine.c
120
@@ -XXX,XX +XXX,XX @@
121
-@c man begin SYNOPSIS
122
-QEMU block driver reference manual
123
-@c man end
124
-
125
-@set qemu_system qemu-system-x86_64
126
-
127
-@c man begin DESCRIPTION
128
-
129
-@node disk_images_formats
130
-@subsection Disk image file formats
131
-
132
-QEMU supports many image file formats that can be used with VMs as well as with
133
-any of the tools (like @code{qemu-img}). This includes the preferred formats
134
-raw and qcow2 as well as formats that are supported for compatibility with
135
-older QEMU versions or other hypervisors.
136
-
137
-Depending on the image format, different options can be passed to
138
-@code{qemu-img create} and @code{qemu-img convert} using the @code{-o} option.
139
-This section describes each format and the options that are supported for it.
140
-
141
-@table @option
142
-@item raw
143
-
144
-Raw disk image format. This format has the advantage of
145
-being simple and easily exportable to all other emulators. If your
146
-file system supports @emph{holes} (for example in ext2 or ext3 on
147
-Linux or NTFS on Windows), then only the written sectors will reserve
148
-space. Use @code{qemu-img info} to know the real size used by the
149
-image or @code{ls -ls} on Unix/Linux.
150
-
151
-Supported options:
152
-@table @code
153
-@item preallocation
154
-Preallocation mode (allowed values: @code{off}, @code{falloc}, @code{full}).
155
-@code{falloc} mode preallocates space for image by calling posix_fallocate().
156
-@code{full} mode preallocates space for image by writing data to underlying
157
-storage. This data may or may not be zero, depending on the storage location.
158
-@end table
159
-
160
-@item qcow2
161
-QEMU image format, the most versatile format. Use it to have smaller
162
-images (useful if your filesystem does not supports holes, for example
163
-on Windows), zlib based compression and support of multiple VM
164
-snapshots.
165
-
166
-Supported options:
167
-@table @code
168
-@item compat
169
-Determines the qcow2 version to use. @code{compat=0.10} uses the
170
-traditional image format that can be read by any QEMU since 0.10.
171
-@code{compat=1.1} enables image format extensions that only QEMU 1.1 and
172
-newer understand (this is the default). Amongst others, this includes
173
-zero clusters, which allow efficient copy-on-read for sparse images.
174
-
175
-@item backing_file
176
-File name of a base image (see @option{create} subcommand)
177
-@item backing_fmt
178
-Image format of the base image
179
-@item encryption
180
-This option is deprecated and equivalent to @code{encrypt.format=aes}
181
-
182
-@item encrypt.format
183
-
184
-If this is set to @code{luks}, it requests that the qcow2 payload (not
185
-qcow2 header) be encrypted using the LUKS format. The passphrase to
186
-use to unlock the LUKS key slot is given by the @code{encrypt.key-secret}
187
-parameter. LUKS encryption parameters can be tuned with the other
188
-@code{encrypt.*} parameters.
189
-
190
-If this is set to @code{aes}, the image is encrypted with 128-bit AES-CBC.
191
-The encryption key is given by the @code{encrypt.key-secret} parameter.
192
-This encryption format is considered to be flawed by modern cryptography
193
-standards, suffering from a number of design problems:
194
-
195
-@itemize @minus
196
-@item The AES-CBC cipher is used with predictable initialization vectors based
197
-on the sector number. This makes it vulnerable to chosen plaintext attacks
198
-which can reveal the existence of encrypted data.
199
-@item The user passphrase is directly used as the encryption key. A poorly
200
-chosen or short passphrase will compromise the security of the encryption.
201
-@item In the event of the passphrase being compromised there is no way to
202
-change the passphrase to protect data in any qcow images. The files must
203
-be cloned, using a different encryption passphrase in the new file. The
204
-original file must then be securely erased using a program like shred,
205
-though even this is ineffective with many modern storage technologies.
206
-@end itemize
207
-
208
-The use of this is no longer supported in system emulators. Support only
209
-remains in the command line utilities, for the purposes of data liberation
210
-and interoperability with old versions of QEMU. The @code{luks} format
211
-should be used instead.
212
-
213
-@item encrypt.key-secret
214
-
215
-Provides the ID of a @code{secret} object that contains the passphrase
216
-(@code{encrypt.format=luks}) or encryption key (@code{encrypt.format=aes}).
217
-
218
-@item encrypt.cipher-alg
219
-
220
-Name of the cipher algorithm and key length. Currently defaults
221
-to @code{aes-256}. Only used when @code{encrypt.format=luks}.
222
-
223
-@item encrypt.cipher-mode
224
-
225
-Name of the encryption mode to use. Currently defaults to @code{xts}.
226
-Only used when @code{encrypt.format=luks}.
227
-
228
-@item encrypt.ivgen-alg
229
-
230
-Name of the initialization vector generator algorithm. Currently defaults
231
-to @code{plain64}. Only used when @code{encrypt.format=luks}.
232
-
233
-@item encrypt.ivgen-hash-alg
234
-
235
-Name of the hash algorithm to use with the initialization vector generator
236
-(if required). Defaults to @code{sha256}. Only used when @code{encrypt.format=luks}.
237
-
238
-@item encrypt.hash-alg
239
-
240
-Name of the hash algorithm to use for PBKDF algorithm
241
-Defaults to @code{sha256}. Only used when @code{encrypt.format=luks}.
242
-
243
-@item encrypt.iter-time
244
-
245
-Amount of time, in milliseconds, to use for PBKDF algorithm per key slot.
246
-Defaults to @code{2000}. Only used when @code{encrypt.format=luks}.
247
-
248
-@item cluster_size
249
-Changes the qcow2 cluster size (must be between 512 and 2M). Smaller cluster
250
-sizes can improve the image file size whereas larger cluster sizes generally
251
-provide better performance.
252
-
253
-@item preallocation
254
-Preallocation mode (allowed values: @code{off}, @code{metadata}, @code{falloc},
255
-@code{full}). An image with preallocated metadata is initially larger but can
256
-improve performance when the image needs to grow. @code{falloc} and @code{full}
257
-preallocations are like the same options of @code{raw} format, but sets up
258
-metadata also.
259
-
260
-@item lazy_refcounts
261
-If this option is set to @code{on}, reference count updates are postponed with
262
-the goal of avoiding metadata I/O and improving performance. This is
263
-particularly interesting with @option{cache=writethrough} which doesn't batch
264
-metadata updates. The tradeoff is that after a host crash, the reference count
265
-tables must be rebuilt, i.e. on the next open an (automatic) @code{qemu-img
266
-check -r all} is required, which may take some time.
267
-
268
-This option can only be enabled if @code{compat=1.1} is specified.
269
-
270
-@item nocow
271
-If this option is set to @code{on}, it will turn off COW of the file. It's only
272
-valid on btrfs, no effect on other file systems.
273
-
274
-Btrfs has low performance when hosting a VM image file, even more when the guest
275
-on the VM also using btrfs as file system. Turning off COW is a way to mitigate
276
-this bad performance. Generally there are two ways to turn off COW on btrfs:
277
-a) Disable it by mounting with nodatacow, then all newly created files will be
278
-NOCOW. b) For an empty file, add the NOCOW file attribute. That's what this option
279
-does.
280
-
281
-Note: this option is only valid to new or empty files. If there is an existing
282
-file which is COW and has data blocks already, it couldn't be changed to NOCOW
283
-by setting @code{nocow=on}. One can issue @code{lsattr filename} to check if
284
-the NOCOW flag is set or not (Capital 'C' is NOCOW flag).
285
-
286
-@end table
287
-
288
-@item qed
289
-Old QEMU image format with support for backing files and compact image files
290
-(when your filesystem or transport medium does not support holes).
291
-
292
-When converting QED images to qcow2, you might want to consider using the
293
-@code{lazy_refcounts=on} option to get a more QED-like behaviour.
294
-
295
-Supported options:
296
-@table @code
297
-@item backing_file
298
-File name of a base image (see @option{create} subcommand).
299
-@item backing_fmt
300
-Image file format of backing file (optional). Useful if the format cannot be
301
-autodetected because it has no header, like some vhd/vpc files.
302
-@item cluster_size
303
-Changes the cluster size (must be power-of-2 between 4K and 64K). Smaller
304
-cluster sizes can improve the image file size whereas larger cluster sizes
305
-generally provide better performance.
306
-@item table_size
307
-Changes the number of clusters per L1/L2 table (must be power-of-2 between 1
308
-and 16). There is normally no need to change this value but this option can be
309
-used for performance benchmarking.
310
-@end table
311
-
312
-@item qcow
313
-Old QEMU image format with support for backing files, compact image files,
314
-encryption and compression.
315
-
316
-Supported options:
317
-@table @code
318
-@item backing_file
319
-File name of a base image (see @option{create} subcommand)
320
-@item encryption
321
-This option is deprecated and equivalent to @code{encrypt.format=aes}
322
-
323
-@item encrypt.format
324
-If this is set to @code{aes}, the image is encrypted with 128-bit AES-CBC.
325
-The encryption key is given by the @code{encrypt.key-secret} parameter.
326
-This encryption format is considered to be flawed by modern cryptography
327
-standards, suffering from a number of design problems enumerated previously
328
-against the @code{qcow2} image format.
329
-
330
-The use of this is no longer supported in system emulators. Support only
331
-remains in the command line utilities, for the purposes of data liberation
332
-and interoperability with old versions of QEMU.
333
-
334
-Users requiring native encryption should use the @code{qcow2} format
335
-instead with @code{encrypt.format=luks}.
336
-
337
-@item encrypt.key-secret
338
-
339
-Provides the ID of a @code{secret} object that contains the encryption
340
-key (@code{encrypt.format=aes}).
341
-
342
-@end table
343
-
344
-@item luks
345
-
346
-LUKS v1 encryption format, compatible with Linux dm-crypt/cryptsetup
347
-
348
-Supported options:
349
-@table @code
350
-
351
-@item key-secret
352
-
353
-Provides the ID of a @code{secret} object that contains the passphrase.
354
-
355
-@item cipher-alg
356
-
357
-Name of the cipher algorithm and key length. Currently defaults
358
-to @code{aes-256}.
359
-
360
-@item cipher-mode
361
-
362
-Name of the encryption mode to use. Currently defaults to @code{xts}.
363
-
364
-@item ivgen-alg
365
-
366
-Name of the initialization vector generator algorithm. Currently defaults
367
-to @code{plain64}.
368
-
369
-@item ivgen-hash-alg
370
-
371
-Name of the hash algorithm to use with the initialization vector generator
372
-(if required). Defaults to @code{sha256}.
373
-
374
-@item hash-alg
375
-
376
-Name of the hash algorithm to use for PBKDF algorithm
377
-Defaults to @code{sha256}.
378
-
379
-@item iter-time
380
-
381
-Amount of time, in milliseconds, to use for PBKDF algorithm per key slot.
382
-Defaults to @code{2000}.
383
-
384
-@end table
385
-
386
-@item vdi
387
-VirtualBox 1.1 compatible image format.
388
-Supported options:
389
-@table @code
390
-@item static
391
-If this option is set to @code{on}, the image is created with metadata
392
-preallocation.
393
-@end table
394
-
395
-@item vmdk
396
-VMware 3 and 4 compatible image format.
397
-
398
-Supported options:
399
-@table @code
400
-@item backing_file
401
-File name of a base image (see @option{create} subcommand).
402
-@item compat6
403
-Create a VMDK version 6 image (instead of version 4)
404
-@item hwversion
405
-Specify vmdk virtual hardware version. Compat6 flag cannot be enabled
406
-if hwversion is specified.
407
-@item subformat
408
-Specifies which VMDK subformat to use. Valid options are
409
-@code{monolithicSparse} (default),
410
-@code{monolithicFlat},
411
-@code{twoGbMaxExtentSparse},
412
-@code{twoGbMaxExtentFlat} and
413
-@code{streamOptimized}.
414
-@end table
415
-
416
-@item vpc
417
-VirtualPC compatible image format (VHD).
418
-Supported options:
419
-@table @code
420
-@item subformat
421
-Specifies which VHD subformat to use. Valid options are
422
-@code{dynamic} (default) and @code{fixed}.
423
-@end table
424
-
425
-@item VHDX
426
-Hyper-V compatible image format (VHDX).
427
-Supported options:
428
-@table @code
429
-@item subformat
430
-Specifies which VHDX subformat to use. Valid options are
431
-@code{dynamic} (default) and @code{fixed}.
432
-@item block_state_zero
433
-Force use of payload blocks of type 'ZERO'. Can be set to @code{on} (default)
434
-or @code{off}. When set to @code{off}, new blocks will be created as
435
-@code{PAYLOAD_BLOCK_NOT_PRESENT}, which means parsers are free to return
436
-arbitrary data for those blocks. Do not set to @code{off} when using
437
-@code{qemu-img convert} with @code{subformat=dynamic}.
438
-@item block_size
439
-Block size; min 1 MB, max 256 MB. 0 means auto-calculate based on image size.
440
-@item log_size
441
-Log size; min 1 MB.
442
-@end table
443
-@end table
444
-
445
-@subsubsection Read-only formats
446
-More disk image file formats are supported in a read-only mode.
447
-@table @option
448
-@item bochs
449
-Bochs images of @code{growing} type.
450
-@item cloop
451
-Linux Compressed Loop image, useful only to reuse directly compressed
452
-CD-ROM images present for example in the Knoppix CD-ROMs.
453
-@item dmg
454
-Apple disk image.
455
-@item parallels
456
-Parallels disk image format.
457
-@end table
458
-
459
-
460
-@node host_drives
461
-@subsection Using host drives
462
-
463
-In addition to disk image files, QEMU can directly access host
464
-devices. We describe here the usage for QEMU version >= 0.8.3.
465
-
466
-@subsubsection Linux
467
-
468
-On Linux, you can directly use the host device filename instead of a
469
-disk image filename provided you have enough privileges to access
470
-it. For example, use @file{/dev/cdrom} to access to the CDROM.
471
-
472
-@table @code
473
-@item CD
474
-You can specify a CDROM device even if no CDROM is loaded. QEMU has
475
-specific code to detect CDROM insertion or removal. CDROM ejection by
476
-the guest OS is supported. Currently only data CDs are supported.
477
-@item Floppy
478
-You can specify a floppy device even if no floppy is loaded. Floppy
479
-removal is currently not detected accurately (if you change floppy
480
-without doing floppy access while the floppy is not loaded, the guest
481
-OS will think that the same floppy is loaded).
482
-Use of the host's floppy device is deprecated, and support for it will
483
-be removed in a future release.
484
-@item Hard disks
485
-Hard disks can be used. Normally you must specify the whole disk
486
-(@file{/dev/hdb} instead of @file{/dev/hdb1}) so that the guest OS can
487
-see it as a partitioned disk. WARNING: unless you know what you do, it
488
-is better to only make READ-ONLY accesses to the hard disk otherwise
489
-you may corrupt your host data (use the @option{-snapshot} command
490
-line option or modify the device permissions accordingly).
491
-@end table
492
-
493
-@subsubsection Windows
494
-
495
-@table @code
496
-@item CD
497
-The preferred syntax is the drive letter (e.g. @file{d:}). The
498
-alternate syntax @file{\\.\d:} is supported. @file{/dev/cdrom} is
499
-supported as an alias to the first CDROM drive.
500
-
501
-Currently there is no specific code to handle removable media, so it
502
-is better to use the @code{change} or @code{eject} monitor commands to
503
-change or eject media.
504
-@item Hard disks
505
-Hard disks can be used with the syntax: @file{\\.\PhysicalDrive@var{N}}
506
-where @var{N} is the drive number (0 is the first hard disk).
507
-
508
-WARNING: unless you know what you do, it is better to only make
509
-READ-ONLY accesses to the hard disk otherwise you may corrupt your
510
-host data (use the @option{-snapshot} command line so that the
511
-modifications are written in a temporary file).
512
-@end table
513
-
514
-
515
-@subsubsection Mac OS X
516
-
517
-@file{/dev/cdrom} is an alias to the first CDROM.
518
-
519
-Currently there is no specific code to handle removable media, so it
520
-is better to use the @code{change} or @code{eject} monitor commands to
521
-change or eject media.
522
-
523
-@node disk_images_fat_images
524
-@subsection Virtual FAT disk images
525
-
526
-QEMU can automatically create a virtual FAT disk image from a
527
-directory tree. In order to use it, just type:
528
-
529
-@example
530
-@value{qemu_system} linux.img -hdb fat:/my_directory
531
-@end example
532
-
533
-Then you access access to all the files in the @file{/my_directory}
534
-directory without having to copy them in a disk image or to export
535
-them via SAMBA or NFS. The default access is @emph{read-only}.
536
-
537
-Floppies can be emulated with the @code{:floppy:} option:
538
-
539
-@example
540
-@value{qemu_system} linux.img -fda fat:floppy:/my_directory
541
-@end example
542
-
543
-A read/write support is available for testing (beta stage) with the
544
-@code{:rw:} option:
545
-
546
-@example
547
-@value{qemu_system} linux.img -fda fat:floppy:rw:/my_directory
548
-@end example
549
-
550
-What you should @emph{never} do:
551
-@itemize
552
-@item use non-ASCII filenames ;
553
-@item use "-snapshot" together with ":rw:" ;
554
-@item expect it to work when loadvm'ing ;
555
-@item write to the FAT directory on the host system while accessing it with the guest system.
556
-@end itemize
557
-
558
-@node disk_images_nbd
559
-@subsection NBD access
560
-
561
-QEMU can access directly to block device exported using the Network Block Device
562
-protocol.
563
-
564
-@example
565
-@value{qemu_system} linux.img -hdb nbd://my_nbd_server.mydomain.org:1024/
566
-@end example
567
-
568
-If the NBD server is located on the same host, you can use an unix socket instead
569
-of an inet socket:
570
-
571
-@example
572
-@value{qemu_system} linux.img -hdb nbd+unix://?socket=/tmp/my_socket
573
-@end example
574
-
575
-In this case, the block device must be exported using qemu-nbd:
576
-
577
-@example
578
-qemu-nbd --socket=/tmp/my_socket my_disk.qcow2
579
-@end example
580
-
581
-The use of qemu-nbd allows sharing of a disk between several guests:
582
-@example
583
-qemu-nbd --socket=/tmp/my_socket --share=2 my_disk.qcow2
584
-@end example
585
-
586
-@noindent
587
-and then you can use it with two guests:
588
-@example
589
-@value{qemu_system} linux1.img -hdb nbd+unix://?socket=/tmp/my_socket
590
-@value{qemu_system} linux2.img -hdb nbd+unix://?socket=/tmp/my_socket
591
-@end example
592
-
593
-If the nbd-server uses named exports (supported since NBD 2.9.18, or with QEMU's
594
-own embedded NBD server), you must specify an export name in the URI:
595
-@example
596
-@value{qemu_system} -cdrom nbd://localhost/debian-500-ppc-netinst
597
-@value{qemu_system} -cdrom nbd://localhost/openSUSE-11.1-ppc-netinst
598
-@end example
599
-
600
-The URI syntax for NBD is supported since QEMU 1.3. An alternative syntax is
601
-also available. Here are some example of the older syntax:
602
-@example
603
-@value{qemu_system} linux.img -hdb nbd:my_nbd_server.mydomain.org:1024
604
-@value{qemu_system} linux2.img -hdb nbd:unix:/tmp/my_socket
605
-@value{qemu_system} -cdrom nbd:localhost:10809:exportname=debian-500-ppc-netinst
606
-@end example
607
-
608
-@node disk_images_sheepdog
609
-@subsection Sheepdog disk images
610
-
611
-Sheepdog is a distributed storage system for QEMU. It provides highly
612
-available block level storage volumes that can be attached to
613
-QEMU-based virtual machines.
614
-
615
-You can create a Sheepdog disk image with the command:
616
-@example
617
-qemu-img create sheepdog:///@var{image} @var{size}
618
-@end example
619
-where @var{image} is the Sheepdog image name and @var{size} is its
620
-size.
621
-
622
-To import the existing @var{filename} to Sheepdog, you can use a
623
-convert command.
624
-@example
625
-qemu-img convert @var{filename} sheepdog:///@var{image}
626
-@end example
627
-
628
-You can boot from the Sheepdog disk image with the command:
629
-@example
630
-@value{qemu_system} sheepdog:///@var{image}
631
-@end example
632
-
633
-You can also create a snapshot of the Sheepdog image like qcow2.
634
-@example
635
-qemu-img snapshot -c @var{tag} sheepdog:///@var{image}
636
-@end example
637
-where @var{tag} is a tag name of the newly created snapshot.
638
-
639
-To boot from the Sheepdog snapshot, specify the tag name of the
640
-snapshot.
641
-@example
642
-@value{qemu_system} sheepdog:///@var{image}#@var{tag}
643
-@end example
644
-
645
-You can create a cloned image from the existing snapshot.
646
-@example
647
-qemu-img create -b sheepdog:///@var{base}#@var{tag} sheepdog:///@var{image}
648
-@end example
649
-where @var{base} is an image name of the source snapshot and @var{tag}
650
-is its tag name.
651
-
652
-You can use an unix socket instead of an inet socket:
653
-
654
-@example
655
-@value{qemu_system} sheepdog+unix:///@var{image}?socket=@var{path}
656
-@end example
657
-
658
-If the Sheepdog daemon doesn't run on the local host, you need to
659
-specify one of the Sheepdog servers to connect to.
660
-@example
661
-qemu-img create sheepdog://@var{hostname}:@var{port}/@var{image} @var{size}
662
-@value{qemu_system} sheepdog://@var{hostname}:@var{port}/@var{image}
663
-@end example
664
-
665
-@node disk_images_iscsi
666
-@subsection iSCSI LUNs
667
-
668
-iSCSI is a popular protocol used to access SCSI devices across a computer
669
-network.
670
-
671
-There are two different ways iSCSI devices can be used by QEMU.
672
-
673
-The first method is to mount the iSCSI LUN on the host, and make it appear as
674
-any other ordinary SCSI device on the host and then to access this device as a
675
-/dev/sd device from QEMU. How to do this differs between host OSes.
676
-
677
-The second method involves using the iSCSI initiator that is built into
678
-QEMU. This provides a mechanism that works the same way regardless of which
679
-host OS you are running QEMU on. This section will describe this second method
680
-of using iSCSI together with QEMU.
681
-
682
-In QEMU, iSCSI devices are described using special iSCSI URLs
683
-
684
-@example
685
-URL syntax:
686
-iscsi://[<username>[%<password>]@@]<host>[:<port>]/<target-iqn-name>/<lun>
687
-@end example
688
-
689
-Username and password are optional and only used if your target is set up
690
-using CHAP authentication for access control.
691
-Alternatively the username and password can also be set via environment
692
-variables to have these not show up in the process list
693
-
694
-@example
695
-export LIBISCSI_CHAP_USERNAME=<username>
696
-export LIBISCSI_CHAP_PASSWORD=<password>
697
-iscsi://<host>/<target-iqn-name>/<lun>
698
-@end example
699
-
700
-Various session related parameters can be set via special options, either
701
-in a configuration file provided via '-readconfig' or directly on the
702
-command line.
703
-
704
-If the initiator-name is not specified qemu will use a default name
705
-of 'iqn.2008-11.org.linux-kvm[:<uuid>'] where <uuid> is the UUID of the
706
-virtual machine. If the UUID is not specified qemu will use
707
-'iqn.2008-11.org.linux-kvm[:<name>'] where <name> is the name of the
708
-virtual machine.
709
-
710
-@example
711
-Setting a specific initiator name to use when logging in to the target
712
--iscsi initiator-name=iqn.qemu.test:my-initiator
713
-@end example
714
-
715
-@example
716
-Controlling which type of header digest to negotiate with the target
717
--iscsi header-digest=CRC32C|CRC32C-NONE|NONE-CRC32C|NONE
718
-@end example
719
-
720
-These can also be set via a configuration file
721
-@example
722
-[iscsi]
723
- user = "CHAP username"
724
- password = "CHAP password"
725
- initiator-name = "iqn.qemu.test:my-initiator"
726
- # header digest is one of CRC32C|CRC32C-NONE|NONE-CRC32C|NONE
727
- header-digest = "CRC32C"
728
-@end example
729
-
730
-
731
-Setting the target name allows different options for different targets
732
-@example
733
-[iscsi "iqn.target.name"]
734
- user = "CHAP username"
735
- password = "CHAP password"
736
- initiator-name = "iqn.qemu.test:my-initiator"
737
- # header digest is one of CRC32C|CRC32C-NONE|NONE-CRC32C|NONE
738
- header-digest = "CRC32C"
739
-@end example
740
-
741
-
742
-Howto use a configuration file to set iSCSI configuration options:
743
-@example
744
-cat >iscsi.conf <<EOF
745
-[iscsi]
746
- user = "me"
747
- password = "my password"
748
- initiator-name = "iqn.qemu.test:my-initiator"
749
- header-digest = "CRC32C"
750
-EOF
751
-
752
-@value{qemu_system} -drive file=iscsi://127.0.0.1/iqn.qemu.test/1 \
753
- -readconfig iscsi.conf
754
-@end example
755
-
756
-
757
-How to set up a simple iSCSI target on loopback and access it via QEMU:
758
-@example
759
-This example shows how to set up an iSCSI target with one CDROM and one DISK
760
-using the Linux STGT software target. This target is available on Red Hat based
761
-systems as the package 'scsi-target-utils'.
762
-
763
-tgtd --iscsi portal=127.0.0.1:3260
764
-tgtadm --lld iscsi --op new --mode target --tid 1 -T iqn.qemu.test
765
-tgtadm --lld iscsi --mode logicalunit --op new --tid 1 --lun 1 \
766
- -b /IMAGES/disk.img --device-type=disk
767
-tgtadm --lld iscsi --mode logicalunit --op new --tid 1 --lun 2 \
768
- -b /IMAGES/cd.iso --device-type=cd
769
-tgtadm --lld iscsi --op bind --mode target --tid 1 -I ALL
770
-
771
-@value{qemu_system} -iscsi initiator-name=iqn.qemu.test:my-initiator \
772
- -boot d -drive file=iscsi://127.0.0.1/iqn.qemu.test/1 \
773
- -cdrom iscsi://127.0.0.1/iqn.qemu.test/2
774
-@end example
775
-
776
-@node disk_images_gluster
777
-@subsection GlusterFS disk images
778
-
779
-GlusterFS is a user space distributed file system.
780
-
781
-You can boot from the GlusterFS disk image with the command:
782
-@example
783
-URI:
784
-@value{qemu_system} -drive file=gluster[+@var{type}]://[@var{host}[:@var{port}]]/@var{volume}/@var{path}
785
- [?socket=...][,file.debug=9][,file.logfile=...]
786
-
787
-JSON:
788
-@value{qemu_system} 'json:@{"driver":"qcow2",
789
- "file":@{"driver":"gluster",
790
- "volume":"testvol","path":"a.img","debug":9,"logfile":"...",
791
- "server":[@{"type":"tcp","host":"...","port":"..."@},
792
- @{"type":"unix","socket":"..."@}]@}@}'
793
-@end example
794
-
795
-@var{gluster} is the protocol.
796
-
797
-@var{type} specifies the transport type used to connect to gluster
798
-management daemon (glusterd). Valid transport types are
799
-tcp and unix. In the URI form, if a transport type isn't specified,
800
-then tcp type is assumed.
801
-
802
-@var{host} specifies the server where the volume file specification for
803
-the given volume resides. This can be either a hostname or an ipv4 address.
804
-If transport type is unix, then @var{host} field should not be specified.
805
-Instead @var{socket} field needs to be populated with the path to unix domain
806
-socket.
807
-
808
-@var{port} is the port number on which glusterd is listening. This is optional
809
-and if not specified, it defaults to port 24007. If the transport type is unix,
810
-then @var{port} should not be specified.
811
-
812
-@var{volume} is the name of the gluster volume which contains the disk image.
813
-
814
-@var{path} is the path to the actual disk image that resides on gluster volume.
815
-
816
-@var{debug} is the logging level of the gluster protocol driver. Debug levels
817
-are 0-9, with 9 being the most verbose, and 0 representing no debugging output.
818
-The default level is 4. The current logging levels defined in the gluster source
819
-are 0 - None, 1 - Emergency, 2 - Alert, 3 - Critical, 4 - Error, 5 - Warning,
820
-6 - Notice, 7 - Info, 8 - Debug, 9 - Trace
821
-
822
-@var{logfile} is a commandline option to mention log file path which helps in
823
-logging to the specified file and also help in persisting the gfapi logs. The
824
-default is stderr.
825
-
826
-
827
-
828
-
829
-You can create a GlusterFS disk image with the command:
830
-@example
831
-qemu-img create gluster://@var{host}/@var{volume}/@var{path} @var{size}
832
-@end example
833
-
834
-Examples
835
-@example
836
-@value{qemu_system} -drive file=gluster://1.2.3.4/testvol/a.img
837
-@value{qemu_system} -drive file=gluster+tcp://1.2.3.4/testvol/a.img
838
-@value{qemu_system} -drive file=gluster+tcp://1.2.3.4:24007/testvol/dir/a.img
839
-@value{qemu_system} -drive file=gluster+tcp://[1:2:3:4:5:6:7:8]/testvol/dir/a.img
840
-@value{qemu_system} -drive file=gluster+tcp://[1:2:3:4:5:6:7:8]:24007/testvol/dir/a.img
841
-@value{qemu_system} -drive file=gluster+tcp://server.domain.com:24007/testvol/dir/a.img
842
-@value{qemu_system} -drive file=gluster+unix:///testvol/dir/a.img?socket=/tmp/glusterd.socket
843
-@value{qemu_system} -drive file=gluster+rdma://1.2.3.4:24007/testvol/a.img
844
-@value{qemu_system} -drive file=gluster://1.2.3.4/testvol/a.img,file.debug=9,file.logfile=/var/log/qemu-gluster.log
845
-@value{qemu_system} 'json:@{"driver":"qcow2",
846
- "file":@{"driver":"gluster",
847
- "volume":"testvol","path":"a.img",
848
- "debug":9,"logfile":"/var/log/qemu-gluster.log",
849
- "server":[@{"type":"tcp","host":"1.2.3.4","port":24007@},
850
- @{"type":"unix","socket":"/var/run/glusterd.socket"@}]@}@}'
851
-@value{qemu_system} -drive driver=qcow2,file.driver=gluster,file.volume=testvol,file.path=/path/a.img,
852
- file.debug=9,file.logfile=/var/log/qemu-gluster.log,
853
- file.server.0.type=tcp,file.server.0.host=1.2.3.4,file.server.0.port=24007,
854
- file.server.1.type=unix,file.server.1.socket=/var/run/glusterd.socket
855
-@end example
856
-
857
-@node disk_images_ssh
858
-@subsection Secure Shell (ssh) disk images
859
-
860
-You can access disk images located on a remote ssh server
861
-by using the ssh protocol:
862
-
863
-@example
864
-@value{qemu_system} -drive file=ssh://[@var{user}@@]@var{server}[:@var{port}]/@var{path}[?host_key_check=@var{host_key_check}]
865
-@end example
866
-
867
-Alternative syntax using properties:
868
-
869
-@example
870
-@value{qemu_system} -drive file.driver=ssh[,file.user=@var{user}],file.host=@var{server}[,file.port=@var{port}],file.path=@var{path}[,file.host_key_check=@var{host_key_check}]
871
-@end example
872
-
873
-@var{ssh} is the protocol.
874
-
875
-@var{user} is the remote user. If not specified, then the local
876
-username is tried.
877
-
878
-@var{server} specifies the remote ssh server. Any ssh server can be
879
-used, but it must implement the sftp-server protocol. Most Unix/Linux
880
-systems should work without requiring any extra configuration.
881
-
882
-@var{port} is the port number on which sshd is listening. By default
883
-the standard ssh port (22) is used.
884
-
885
-@var{path} is the path to the disk image.
886
-
887
-The optional @var{host_key_check} parameter controls how the remote
888
-host's key is checked. The default is @code{yes} which means to use
889
-the local @file{.ssh/known_hosts} file. Setting this to @code{no}
890
-turns off known-hosts checking. Or you can check that the host key
891
-matches a specific fingerprint:
892
-@code{host_key_check=md5:78:45:8e:14:57:4f:d5:45:83:0a:0e:f3:49:82:c9:c8}
893
-(@code{sha1:} can also be used as a prefix, but note that OpenSSH
894
-tools only use MD5 to print fingerprints).
895
-
896
-Currently authentication must be done using ssh-agent. Other
897
-authentication methods may be supported in future.
898
-
899
-Note: Many ssh servers do not support an @code{fsync}-style operation.
900
-The ssh driver cannot guarantee that disk flush requests are
901
-obeyed, and this causes a risk of disk corruption if the remote
902
-server or network goes down during writes. The driver will
903
-print a warning when @code{fsync} is not supported:
904
-
905
-warning: ssh server @code{ssh.example.com:22} does not support fsync
906
-
907
-With sufficiently new versions of libssh and OpenSSH, @code{fsync} is
908
-supported.
909
-
910
-@node disk_images_nvme
911
-@subsection NVMe disk images
912
-
913
-NVM Express (NVMe) storage controllers can be accessed directly by a userspace
914
-driver in QEMU. This bypasses the host kernel file system and block layers
915
-while retaining QEMU block layer functionalities, such as block jobs, I/O
916
-throttling, image formats, etc. Disk I/O performance is typically higher than
917
-with @code{-drive file=/dev/sda} using either thread pool or linux-aio.
918
-
919
-The controller will be exclusively used by the QEMU process once started. To be
920
-able to share storage between multiple VMs and other applications on the host,
921
-please use the file based protocols.
922
-
923
-Before starting QEMU, bind the host NVMe controller to the host vfio-pci
924
-driver. For example:
925
-
926
-@example
927
-# modprobe vfio-pci
928
-# lspci -n -s 0000:06:0d.0
929
-06:0d.0 0401: 1102:0002 (rev 08)
930
-# echo 0000:06:0d.0 > /sys/bus/pci/devices/0000:06:0d.0/driver/unbind
931
-# echo 1102 0002 > /sys/bus/pci/drivers/vfio-pci/new_id
932
-
933
-# @value{qemu_system} -drive file=nvme://@var{host}:@var{bus}:@var{slot}.@var{func}/@var{namespace}
934
-@end example
935
-
936
-Alternative syntax using properties:
937
-
938
-@example
939
-@value{qemu_system} -drive file.driver=nvme,file.device=@var{host}:@var{bus}:@var{slot}.@var{func},file.namespace=@var{namespace}
940
-@end example
941
-
942
-@var{host}:@var{bus}:@var{slot}.@var{func} is the NVMe controller's PCI device
943
-address on the host.
944
-
945
-@var{namespace} is the NVMe namespace number, starting from 1.
946
-
947
-@node disk_image_locking
948
-@subsection Disk image file locking
949
-
950
-By default, QEMU tries to protect image files from unexpected concurrent
951
-access, as long as it's supported by the block protocol driver and host
952
-operating system. If multiple QEMU processes (including QEMU emulators and
953
-utilities) try to open the same image with conflicting accessing modes, all but
954
-the first one will get an error.
955
-
956
-This feature is currently supported by the file protocol on Linux with the Open
957
-File Descriptor (OFD) locking API, and can be configured to fall back to POSIX
958
-locking if the POSIX host doesn't support Linux OFD locking.
959
-
960
-To explicitly enable image locking, specify "locking=on" in the file protocol
961
-driver options. If OFD locking is not possible, a warning will be printed and
962
-the POSIX locking API will be used. In this case there is a risk that the lock
963
-will get silently lost when doing hot plugging and block jobs, due to the
964
-shortcomings of the POSIX locking API.
965
-
966
-QEMU transparently handles lock handover during shared storage migration. For
967
-shared virtual disk images between multiple VMs, the "share-rw" device option
968
-should be used.
969
-
970
-By default, the guest has exclusive write access to its disk image. If the
971
-guest can safely share the disk image with other writers the @code{-device
972
-...,share-rw=on} parameter can be used. This is only safe if the guest is
973
-running software, such as a cluster file system, that coordinates disk accesses
974
-to avoid corruption.
975
-
976
-Note that share-rw=on only declares the guest's ability to share the disk.
977
-Some QEMU features, such as image file formats, require exclusive write access
978
-to the disk image and this is unaffected by the share-rw=on option.
979
-
980
-Alternatively, locking can be fully disabled by "locking=off" block device
981
-option. In the command line, the option is usually in the form of
982
-"file.locking=off" as the protocol driver is normally placed as a "file" child
983
-under a format driver. For example:
984
-
985
-@code{-blockdev driver=qcow2,file.filename=/path/to/image,file.locking=off,file.driver=file}
986
-
987
-To check if image locking is active, check the output of the "lslocks" command
988
-on host and see if there are locks held by the QEMU process on the image file.
989
-More than one byte could be locked by the QEMU instance, each byte of which
990
-reflects a particular permission that is acquired or protected by the running
991
-block driver.
992
-
993
-@c man end
994
-
995
-@ignore
996
-
997
-@setfilename qemu-block-drivers
998
-@settitle QEMU block drivers reference
999
-
1000
-@c man begin SEEALSO
1001
-The HTML documentation of QEMU for more precise information and Linux
1002
-user mode emulator invocation.
1003
-@c man end
1004
-
1005
-@c man begin AUTHOR
1006
-Fabrice Bellard and the QEMU Project developers
1007
-@c man end
1008
-
1009
-@end ignore
1010
diff --git a/docs/system/conf.py b/docs/system/conf.py
1011
index XXXXXXX..XXXXXXX 100644
50
index XXXXXXX..XXXXXXX 100644
1012
--- a/docs/system/conf.py
51
--- a/target/arm/machine.c
1013
+++ b/docs/system/conf.py
52
+++ b/target/arm/machine.c
1014
@@ -XXX,XX +XXX,XX @@ exec(compile(open(parent_config, "rb").read(), parent_config, 'exec'))
53
@@ -XXX,XX +XXX,XX @@ static const VMStateDescription vmstate_sve = {
1015
# This slightly misuses the 'description', but is the best way to get
54
VMSTATE_END_OF_LIST()
1016
# the manual title to appear in the sidebar.
55
}
1017
html_theme_options['description'] = u'System Emulation User''s Guide'
56
};
1018
+# One entry per manual page. List of tuples
1019
+# (source start file, name, description, authors, manual section).
1020
+man_pages = [
1021
+ ('qemu-block-drivers', 'qemu-block-drivers',
1022
+ u'QEMU block drivers reference',
1023
+ ['Fabrice Bellard and the QEMU Project developers'], 7)
1024
+]
1025
diff --git a/docs/system/index.rst b/docs/system/index.rst
1026
index XXXXXXX..XXXXXXX 100644
1027
--- a/docs/system/index.rst
1028
+++ b/docs/system/index.rst
1029
@@ -XXX,XX +XXX,XX @@ Contents:
1030
.. toctree::
1031
:maxdepth: 2
1032
1033
+ qemu-block-drivers
1034
diff --git a/docs/system/qemu-block-drivers.rst b/docs/system/qemu-block-drivers.rst
1035
new file mode 100644
1036
index XXXXXXX..XXXXXXX
1037
--- /dev/null
1038
+++ b/docs/system/qemu-block-drivers.rst
1039
@@ -XXX,XX +XXX,XX @@
1040
+QEMU block drivers reference
1041
+============================
1042
+
57
+
1043
+.. |qemu_system| replace:: qemu-system-x86_64
58
+static const VMStateDescription vmstate_vreg = {
59
+ .name = "vreg",
60
+ .version_id = 1,
61
+ .minimum_version_id = 1,
62
+ .fields = (VMStateField[]) {
63
+ VMSTATE_UINT64_ARRAY(d, ARMVectorReg, ARM_MAX_VQ * 2),
64
+ VMSTATE_END_OF_LIST()
65
+ }
66
+};
1044
+
67
+
1045
+..
68
+static bool za_needed(void *opaque)
1046
+ We put the 'Synopsis' and 'See also' sections into the manpage, but not
69
+{
1047
+ the HTML. This makes the HTML docs read better and means the ToC in
70
+ ARMCPU *cpu = opaque;
1048
+ the index has a more useful set of entries. Ideally, the section
1049
+ headings 'Disk image file formats' would be top-level headings for
1050
+ the HTML, but sub-headings of the conventional manpage 'Description'
1051
+ header for the manpage. Unfortunately, due to deficiencies in
1052
+ the Sphinx 'only' directive, this isn't possible: they must be headers
1053
+ at the same level as 'Synopsis' and 'See also', otherwise Sphinx's
1054
+ identification of which header underline style is which gets confused.
1055
+
71
+
1056
+.. only:: man
72
+ /*
73
+ * When ZA storage is disabled, its contents are discarded.
74
+ * It will be zeroed when ZA storage is re-enabled.
75
+ */
76
+ return FIELD_EX64(cpu->env.svcr, SVCR, ZA);
77
+}
1057
+
78
+
1058
+ Synopsis
79
+static const VMStateDescription vmstate_za = {
1059
+ --------
80
+ .name = "cpu/sme",
1060
+
81
+ .version_id = 1,
1061
+ QEMU block driver reference manual
82
+ .minimum_version_id = 1,
1062
+
83
+ .needed = za_needed,
1063
+Disk image file formats
84
+ .fields = (VMStateField[]) {
1064
+-----------------------
85
+ VMSTATE_STRUCT_ARRAY(env.zarray, ARMCPU, ARM_MAX_VQ * 16, 0,
1065
+
86
+ vmstate_vreg, ARMVectorReg),
1066
+QEMU supports many image file formats that can be used with VMs as well as with
87
+ VMSTATE_END_OF_LIST()
1067
+any of the tools (like ``qemu-img``). This includes the preferred formats
88
+ }
1068
+raw and qcow2 as well as formats that are supported for compatibility with
89
+};
1069
+older QEMU versions or other hypervisors.
90
#endif /* AARCH64 */
1070
+
91
1071
+Depending on the image format, different options can be passed to
92
static bool serror_needed(void *opaque)
1072
+``qemu-img create`` and ``qemu-img convert`` using the ``-o`` option.
93
@@ -XXX,XX +XXX,XX @@ const VMStateDescription vmstate_arm_cpu = {
1073
+This section describes each format and the options that are supported for it.
94
&vmstate_m_security,
1074
+
95
#ifdef TARGET_AARCH64
1075
+.. program:: image-formats
96
&vmstate_sve,
1076
+.. option:: raw
97
+ &vmstate_za,
1077
+
98
#endif
1078
+ Raw disk image format. This format has the advantage of
99
&vmstate_serror,
1079
+ being simple and easily exportable to all other emulators. If your
100
&vmstate_irq_line_state,
1080
+ file system supports *holes* (for example in ext2 or ext3 on
1081
+ Linux or NTFS on Windows), then only the written sectors will reserve
1082
+ space. Use ``qemu-img info`` to know the real size used by the
1083
+ image or ``ls -ls`` on Unix/Linux.
1084
+
1085
+ Supported options:
1086
+
1087
+ .. program:: raw
1088
+ .. option:: preallocation
1089
+
1090
+ Preallocation mode (allowed values: ``off``, ``falloc``,
1091
+ ``full``). ``falloc`` mode preallocates space for image by
1092
+ calling ``posix_fallocate()``. ``full`` mode preallocates space
1093
+ for image by writing data to underlying storage. This data may or
1094
+ may not be zero, depending on the storage location.
1095
+
1096
+.. program:: image-formats
1097
+.. option:: qcow2
1098
+
1099
+ QEMU image format, the most versatile format. Use it to have smaller
1100
+ images (useful if your filesystem does not supports holes, for example
1101
+ on Windows), zlib based compression and support of multiple VM
1102
+ snapshots.
1103
+
1104
+ Supported options:
1105
+
1106
+ .. program:: qcow2
1107
+ .. option:: compat
1108
+
1109
+ Determines the qcow2 version to use. ``compat=0.10`` uses the
1110
+ traditional image format that can be read by any QEMU since 0.10.
1111
+ ``compat=1.1`` enables image format extensions that only QEMU 1.1 and
1112
+ newer understand (this is the default). Amongst others, this includes
1113
+ zero clusters, which allow efficient copy-on-read for sparse images.
1114
+
1115
+ .. option:: backing_file
1116
+
1117
+ File name of a base image (see ``create`` subcommand)
1118
+
1119
+ .. option:: backing_fmt
1120
+
1121
+ Image format of the base image
1122
+
1123
+ .. option:: encryption
1124
+
1125
+ This option is deprecated and equivalent to ``encrypt.format=aes``
1126
+
1127
+ .. option:: encrypt.format
1128
+
1129
+ If this is set to ``luks``, it requests that the qcow2 payload (not
1130
+ qcow2 header) be encrypted using the LUKS format. The passphrase to
1131
+ use to unlock the LUKS key slot is given by the ``encrypt.key-secret``
1132
+ parameter. LUKS encryption parameters can be tuned with the other
1133
+ ``encrypt.*`` parameters.
1134
+
1135
+ If this is set to ``aes``, the image is encrypted with 128-bit AES-CBC.
1136
+ The encryption key is given by the ``encrypt.key-secret`` parameter.
1137
+ This encryption format is considered to be flawed by modern cryptography
1138
+ standards, suffering from a number of design problems:
1139
+
1140
+ - The AES-CBC cipher is used with predictable initialization vectors based
1141
+ on the sector number. This makes it vulnerable to chosen plaintext attacks
1142
+ which can reveal the existence of encrypted data.
1143
+ - The user passphrase is directly used as the encryption key. A poorly
1144
+ chosen or short passphrase will compromise the security of the encryption.
1145
+ - In the event of the passphrase being compromised there is no way to
1146
+ change the passphrase to protect data in any qcow images. The files must
1147
+ be cloned, using a different encryption passphrase in the new file. The
1148
+ original file must then be securely erased using a program like shred,
1149
+ though even this is ineffective with many modern storage technologies.
1150
+
1151
+ The use of this is no longer supported in system emulators. Support only
1152
+ remains in the command line utilities, for the purposes of data liberation
1153
+ and interoperability with old versions of QEMU. The ``luks`` format
1154
+ should be used instead.
1155
+
1156
+ .. option:: encrypt.key-secret
1157
+
1158
+ Provides the ID of a ``secret`` object that contains the passphrase
1159
+ (``encrypt.format=luks``) or encryption key (``encrypt.format=aes``).
1160
+
1161
+ .. option:: encrypt.cipher-alg
1162
+
1163
+ Name of the cipher algorithm and key length. Currently defaults
1164
+ to ``aes-256``. Only used when ``encrypt.format=luks``.
1165
+
1166
+ .. option:: encrypt.cipher-mode
1167
+
1168
+ Name of the encryption mode to use. Currently defaults to ``xts``.
1169
+ Only used when ``encrypt.format=luks``.
1170
+
1171
+ .. option:: encrypt.ivgen-alg
1172
+
1173
+ Name of the initialization vector generator algorithm. Currently defaults
1174
+ to ``plain64``. Only used when ``encrypt.format=luks``.
1175
+
1176
+ .. option:: encrypt.ivgen-hash-alg
1177
+
1178
+ Name of the hash algorithm to use with the initialization vector generator
1179
+ (if required). Defaults to ``sha256``. Only used when ``encrypt.format=luks``.
1180
+
1181
+ .. option:: encrypt.hash-alg
1182
+
1183
+ Name of the hash algorithm to use for PBKDF algorithm
1184
+ Defaults to ``sha256``. Only used when ``encrypt.format=luks``.
1185
+
1186
+ .. option:: encrypt.iter-time
1187
+
1188
+ Amount of time, in milliseconds, to use for PBKDF algorithm per key slot.
1189
+ Defaults to ``2000``. Only used when ``encrypt.format=luks``.
1190
+
1191
+ .. option:: cluster_size
1192
+
1193
+ Changes the qcow2 cluster size (must be between 512 and 2M). Smaller cluster
1194
+ sizes can improve the image file size whereas larger cluster sizes generally
1195
+ provide better performance.
1196
+
1197
+ .. option:: preallocation
1198
+
1199
+ Preallocation mode (allowed values: ``off``, ``metadata``, ``falloc``,
1200
+ ``full``). An image with preallocated metadata is initially larger but can
1201
+ improve performance when the image needs to grow. ``falloc`` and ``full``
1202
+ preallocations are like the same options of ``raw`` format, but sets up
1203
+ metadata also.
1204
+
1205
+ .. option:: lazy_refcounts
1206
+
1207
+ If this option is set to ``on``, reference count updates are postponed with
1208
+ the goal of avoiding metadata I/O and improving performance. This is
1209
+ particularly interesting with :option:`cache=writethrough` which doesn't batch
1210
+ metadata updates. The tradeoff is that after a host crash, the reference count
1211
+ tables must be rebuilt, i.e. on the next open an (automatic) ``qemu-img
1212
+ check -r all`` is required, which may take some time.
1213
+
1214
+ This option can only be enabled if ``compat=1.1`` is specified.
1215
+
1216
+ .. option:: nocow
1217
+
1218
+ If this option is set to ``on``, it will turn off COW of the file. It's only
1219
+ valid on btrfs, no effect on other file systems.
1220
+
1221
+ Btrfs has low performance when hosting a VM image file, even more
1222
+ when the guest on the VM also using btrfs as file system. Turning off
1223
+ COW is a way to mitigate this bad performance. Generally there are two
1224
+ ways to turn off COW on btrfs:
1225
+
1226
+ - Disable it by mounting with nodatacow, then all newly created files
1227
+ will be NOCOW.
1228
+ - For an empty file, add the NOCOW file attribute. That's what this
1229
+ option does.
1230
+
1231
+ Note: this option is only valid to new or empty files. If there is
1232
+ an existing file which is COW and has data blocks already, it couldn't
1233
+ be changed to NOCOW by setting ``nocow=on``. One can issue ``lsattr
1234
+ filename`` to check if the NOCOW flag is set or not (Capital 'C' is
1235
+ NOCOW flag).
1236
+
1237
+.. program:: image-formats
1238
+.. option:: qed
1239
+
1240
+ Old QEMU image format with support for backing files and compact image files
1241
+ (when your filesystem or transport medium does not support holes).
1242
+
1243
+ When converting QED images to qcow2, you might want to consider using the
1244
+ ``lazy_refcounts=on`` option to get a more QED-like behaviour.
1245
+
1246
+ Supported options:
1247
+
1248
+ .. program:: qed
1249
+ .. option:: backing_file
1250
+
1251
+ File name of a base image (see ``create`` subcommand).
1252
+
1253
+ .. option:: backing_fmt
1254
+
1255
+ Image file format of backing file (optional). Useful if the format cannot be
1256
+ autodetected because it has no header, like some vhd/vpc files.
1257
+
1258
+ .. option:: cluster_size
1259
+
1260
+ Changes the cluster size (must be power-of-2 between 4K and 64K). Smaller
1261
+ cluster sizes can improve the image file size whereas larger cluster sizes
1262
+ generally provide better performance.
1263
+
1264
+ .. option:: table_size
1265
+
1266
+ Changes the number of clusters per L1/L2 table (must be
1267
+ power-of-2 between 1 and 16). There is normally no need to
1268
+ change this value but this option can between used for
1269
+ performance benchmarking.
1270
+
1271
+.. program:: image-formats
1272
+.. option:: qcow
1273
+
1274
+ Old QEMU image format with support for backing files, compact image files,
1275
+ encryption and compression.
1276
+
1277
+ Supported options:
1278
+
1279
+ .. program:: qcow
1280
+ .. option:: backing_file
1281
+
1282
+ File name of a base image (see ``create`` subcommand)
1283
+
1284
+ .. option:: encryption
1285
+
1286
+ This option is deprecated and equivalent to ``encrypt.format=aes``
1287
+
1288
+ .. option:: encrypt.format
1289
+
1290
+ If this is set to ``aes``, the image is encrypted with 128-bit AES-CBC.
1291
+ The encryption key is given by the ``encrypt.key-secret`` parameter.
1292
+ This encryption format is considered to be flawed by modern cryptography
1293
+ standards, suffering from a number of design problems enumerated previously
1294
+ against the ``qcow2`` image format.
1295
+
1296
+ The use of this is no longer supported in system emulators. Support only
1297
+ remains in the command line utilities, for the purposes of data liberation
1298
+ and interoperability with old versions of QEMU.
1299
+
1300
+ Users requiring native encryption should use the ``qcow2`` format
1301
+ instead with ``encrypt.format=luks``.
1302
+
1303
+ .. option:: encrypt.key-secret
1304
+
1305
+ Provides the ID of a ``secret`` object that contains the encryption
1306
+ key (``encrypt.format=aes``).
1307
+
1308
+.. program:: image-formats
1309
+.. option:: luks
1310
+
1311
+ LUKS v1 encryption format, compatible with Linux dm-crypt/cryptsetup
1312
+
1313
+ Supported options:
1314
+
1315
+ .. program:: luks
1316
+ .. option:: key-secret
1317
+
1318
+ Provides the ID of a ``secret`` object that contains the passphrase.
1319
+
1320
+ .. option:: cipher-alg
1321
+
1322
+ Name of the cipher algorithm and key length. Currently defaults
1323
+ to ``aes-256``.
1324
+
1325
+ .. option:: cipher-mode
1326
+
1327
+ Name of the encryption mode to use. Currently defaults to ``xts``.
1328
+
1329
+ .. option:: ivgen-alg
1330
+
1331
+ Name of the initialization vector generator algorithm. Currently defaults
1332
+ to ``plain64``.
1333
+
1334
+ .. option:: ivgen-hash-alg
1335
+
1336
+ Name of the hash algorithm to use with the initialization vector generator
1337
+ (if required). Defaults to ``sha256``.
1338
+
1339
+ .. option:: hash-alg
1340
+
1341
+ Name of the hash algorithm to use for PBKDF algorithm
1342
+ Defaults to ``sha256``.
1343
+
1344
+ .. option:: iter-time
1345
+
1346
+ Amount of time, in milliseconds, to use for PBKDF algorithm per key slot.
1347
+ Defaults to ``2000``.
1348
+
1349
+.. program:: image-formats
1350
+.. option:: vdi
1351
+
1352
+ VirtualBox 1.1 compatible image format.
1353
+
1354
+ Supported options:
1355
+
1356
+ .. program:: vdi
1357
+ .. option:: static
1358
+
1359
+ If this option is set to ``on``, the image is created with metadata
1360
+ preallocation.
1361
+
1362
+.. program:: image-formats
1363
+.. option:: vmdk
1364
+
1365
+ VMware 3 and 4 compatible image format.
1366
+
1367
+ Supported options:
1368
+
1369
+ .. program: vmdk
1370
+ .. option:: backing_file
1371
+
1372
+ File name of a base image (see ``create`` subcommand).
1373
+
1374
+ .. option:: compat6
1375
+
1376
+ Create a VMDK version 6 image (instead of version 4)
1377
+
1378
+ .. option:: hwversion
1379
+
1380
+ Specify vmdk virtual hardware version. Compat6 flag cannot be enabled
1381
+ if hwversion is specified.
1382
+
1383
+ .. option:: subformat
1384
+
1385
+ Specifies which VMDK subformat to use. Valid options are
1386
+ ``monolithicSparse`` (default),
1387
+ ``monolithicFlat``,
1388
+ ``twoGbMaxExtentSparse``,
1389
+ ``twoGbMaxExtentFlat`` and
1390
+ ``streamOptimized``.
1391
+
1392
+.. program:: image-formats
1393
+.. option:: vpc
1394
+
1395
+ VirtualPC compatible image format (VHD).
1396
+
1397
+ Supported options:
1398
+
1399
+ .. program:: vpc
1400
+ .. option:: subformat
1401
+
1402
+ Specifies which VHD subformat to use. Valid options are
1403
+ ``dynamic`` (default) and ``fixed``.
1404
+
1405
+.. program:: image-formats
1406
+.. option:: VHDX
1407
+
1408
+ Hyper-V compatible image format (VHDX).
1409
+
1410
+ Supported options:
1411
+
1412
+ .. program:: VHDX
1413
+ .. option:: subformat
1414
+
1415
+ Specifies which VHDX subformat to use. Valid options are
1416
+ ``dynamic`` (default) and ``fixed``.
1417
+
1418
+ .. option:: block_state_zero
1419
+
1420
+ Force use of payload blocks of type 'ZERO'. Can be set to ``on`` (default)
1421
+ or ``off``. When set to ``off``, new blocks will be created as
1422
+ ``PAYLOAD_BLOCK_NOT_PRESENT``, which means parsers are free to return
1423
+ arbitrary data for those blocks. Do not set to ``off`` when using
1424
+ ``qemu-img convert`` with ``subformat=dynamic``.
1425
+
1426
+ .. option:: block_size
1427
+
1428
+ Block size; min 1 MB, max 256 MB. 0 means auto-calculate based on
1429
+ image size.
1430
+
1431
+ .. option:: log_size
1432
+
1433
+ Log size; min 1 MB.
1434
+
1435
+Read-only formats
1436
+-----------------
1437
+
1438
+More disk image file formats are supported in a read-only mode.
1439
+
1440
+.. program:: image-formats
1441
+.. option:: bochs
1442
+
1443
+ Bochs images of ``growing`` type.
1444
+
1445
+.. program:: image-formats
1446
+.. option:: cloop
1447
+
1448
+ Linux Compressed Loop image, useful only to reuse directly compressed
1449
+ CD-ROM images present for example in the Knoppix CD-ROMs.
1450
+
1451
+.. program:: image-formats
1452
+.. option:: dmg
1453
+
1454
+ Apple disk image.
1455
+
1456
+.. program:: image-formats
1457
+.. option:: parallels
1458
+
1459
+ Parallels disk image format.
1460
+
1461
+Using host drives
1462
+-----------------
1463
+
1464
+In addition to disk image files, QEMU can directly access host
1465
+devices. We describe here the usage for QEMU version >= 0.8.3.
1466
+
1467
+Linux
1468
+'''''
1469
+
1470
+On Linux, you can directly use the host device filename instead of a
1471
+disk image filename provided you have enough privileges to access
1472
+it. For example, use ``/dev/cdrom`` to access to the CDROM.
1473
+
1474
+CD
1475
+ You can specify a CDROM device even if no CDROM is loaded. QEMU has
1476
+ specific code to detect CDROM insertion or removal. CDROM ejection by
1477
+ the guest OS is supported. Currently only data CDs are supported.
1478
+
1479
+Floppy
1480
+ You can specify a floppy device even if no floppy is loaded. Floppy
1481
+ removal is currently not detected accurately (if you change floppy
1482
+ without doing floppy access while the floppy is not loaded, the guest
1483
+ OS will think that the same floppy is loaded).
1484
+ Use of the host's floppy device is deprecated, and support for it will
1485
+ be removed in a future release.
1486
+
1487
+Hard disks
1488
+ Hard disks can be used. Normally you must specify the whole disk
1489
+ (``/dev/hdb`` instead of ``/dev/hdb1``) so that the guest OS can
1490
+ see it as a partitioned disk. WARNING: unless you know what you do, it
1491
+ is better to only make READ-ONLY accesses to the hard disk otherwise
1492
+ you may corrupt your host data (use the ``-snapshot`` command
1493
+ line option or modify the device permissions accordingly).
1494
+
1495
+Windows
1496
+'''''''
1497
+
1498
+CD
1499
+ The preferred syntax is the drive letter (e.g. ``d:``). The
1500
+ alternate syntax ``\\.\d:`` is supported. ``/dev/cdrom`` is
1501
+ supported as an alias to the first CDROM drive.
1502
+
1503
+ Currently there is no specific code to handle removable media, so it
1504
+ is better to use the ``change`` or ``eject`` monitor commands to
1505
+ change or eject media.
1506
+
1507
+Hard disks
1508
+ Hard disks can be used with the syntax: ``\\.\PhysicalDriveN``
1509
+ where *N* is the drive number (0 is the first hard disk).
1510
+
1511
+ WARNING: unless you know what you do, it is better to only make
1512
+ READ-ONLY accesses to the hard disk otherwise you may corrupt your
1513
+ host data (use the ``-snapshot`` command line so that the
1514
+ modifications are written in a temporary file).
1515
+
1516
+Mac OS X
1517
+''''''''
1518
+
1519
+``/dev/cdrom`` is an alias to the first CDROM.
1520
+
1521
+Currently there is no specific code to handle removable media, so it
1522
+is better to use the ``change`` or ``eject`` monitor commands to
1523
+change or eject media.
1524
+
1525
+Virtual FAT disk images
1526
+-----------------------
1527
+
1528
+QEMU can automatically create a virtual FAT disk image from a
1529
+directory tree. In order to use it, just type:
1530
+
1531
+.. parsed-literal::
1532
+
1533
+ |qemu_system| linux.img -hdb fat:/my_directory
1534
+
1535
+Then you access access to all the files in the ``/my_directory``
1536
+directory without having to copy them in a disk image or to export
1537
+them via SAMBA or NFS. The default access is *read-only*.
1538
+
1539
+Floppies can be emulated with the ``:floppy:`` option:
1540
+
1541
+.. parsed-literal::
1542
+
1543
+ |qemu_system| linux.img -fda fat:floppy:/my_directory
1544
+
1545
+A read/write support is available for testing (beta stage) with the
1546
+``:rw:`` option:
1547
+
1548
+.. parsed-literal::
1549
+
1550
+ |qemu_system| linux.img -fda fat:floppy:rw:/my_directory
1551
+
1552
+What you should *never* do:
1553
+
1554
+- use non-ASCII filenames
1555
+- use "-snapshot" together with ":rw:"
1556
+- expect it to work when loadvm'ing
1557
+- write to the FAT directory on the host system while accessing it with the guest system
1558
+
1559
+NBD access
1560
+----------
1561
+
1562
+QEMU can access directly to block device exported using the Network Block Device
1563
+protocol.
1564
+
1565
+.. parsed-literal::
1566
+
1567
+ |qemu_system| linux.img -hdb nbd://my_nbd_server.mydomain.org:1024/
1568
+
1569
+If the NBD server is located on the same host, you can use an unix socket instead
1570
+of an inet socket:
1571
+
1572
+.. parsed-literal::
1573
+
1574
+ |qemu_system| linux.img -hdb nbd+unix://?socket=/tmp/my_socket
1575
+
1576
+In this case, the block device must be exported using qemu-nbd:
1577
+
1578
+.. parsed-literal::
1579
+
1580
+ qemu-nbd --socket=/tmp/my_socket my_disk.qcow2
1581
+
1582
+The use of qemu-nbd allows sharing of a disk between several guests:
1583
+
1584
+.. parsed-literal::
1585
+
1586
+ qemu-nbd --socket=/tmp/my_socket --share=2 my_disk.qcow2
1587
+
1588
+and then you can use it with two guests:
1589
+
1590
+.. parsed-literal::
1591
+
1592
+ |qemu_system| linux1.img -hdb nbd+unix://?socket=/tmp/my_socket
1593
+ |qemu_system| linux2.img -hdb nbd+unix://?socket=/tmp/my_socket
1594
+
1595
+If the nbd-server uses named exports (supported since NBD 2.9.18, or with QEMU's
1596
+own embedded NBD server), you must specify an export name in the URI:
1597
+
1598
+.. parsed-literal::
1599
+
1600
+ |qemu_system| -cdrom nbd://localhost/debian-500-ppc-netinst
1601
+ |qemu_system| -cdrom nbd://localhost/openSUSE-11.1-ppc-netinst
1602
+
1603
+The URI syntax for NBD is supported since QEMU 1.3. An alternative syntax is
1604
+also available. Here are some example of the older syntax:
1605
+
1606
+.. parsed-literal::
1607
+
1608
+ |qemu_system| linux.img -hdb nbd:my_nbd_server.mydomain.org:1024
1609
+ |qemu_system| linux2.img -hdb nbd:unix:/tmp/my_socket
1610
+ |qemu_system| -cdrom nbd:localhost:10809:exportname=debian-500-ppc-netinst
1611
+
1612
+
1613
+
1614
+Sheepdog disk images
1615
+--------------------
1616
+
1617
+Sheepdog is a distributed storage system for QEMU. It provides highly
1618
+available block level storage volumes that can be attached to
1619
+QEMU-based virtual machines.
1620
+
1621
+You can create a Sheepdog disk image with the command:
1622
+
1623
+.. parsed-literal::
1624
+
1625
+ qemu-img create sheepdog:///IMAGE SIZE
1626
+
1627
+where *IMAGE* is the Sheepdog image name and *SIZE* is its
1628
+size.
1629
+
1630
+To import the existing *FILENAME* to Sheepdog, you can use a
1631
+convert command.
1632
+
1633
+.. parsed-literal::
1634
+
1635
+ qemu-img convert FILENAME sheepdog:///IMAGE
1636
+
1637
+You can boot from the Sheepdog disk image with the command:
1638
+
1639
+.. parsed-literal::
1640
+
1641
+ |qemu_system| sheepdog:///IMAGE
1642
+
1643
+You can also create a snapshot of the Sheepdog image like qcow2.
1644
+
1645
+.. parsed-literal::
1646
+
1647
+ qemu-img snapshot -c TAG sheepdog:///IMAGE
1648
+
1649
+where *TAG* is a tag name of the newly created snapshot.
1650
+
1651
+To boot from the Sheepdog snapshot, specify the tag name of the
1652
+snapshot.
1653
+
1654
+.. parsed-literal::
1655
+
1656
+ |qemu_system| sheepdog:///IMAGE#TAG
1657
+
1658
+You can create a cloned image from the existing snapshot.
1659
+
1660
+.. parsed-literal::
1661
+
1662
+ qemu-img create -b sheepdog:///BASE#TAG sheepdog:///IMAGE
1663
+
1664
+where *BASE* is an image name of the source snapshot and *TAG*
1665
+is its tag name.
1666
+
1667
+You can use an unix socket instead of an inet socket:
1668
+
1669
+.. parsed-literal::
1670
+
1671
+ |qemu_system| sheepdog+unix:///IMAGE?socket=PATH
1672
+
1673
+If the Sheepdog daemon doesn't run on the local host, you need to
1674
+specify one of the Sheepdog servers to connect to.
1675
+
1676
+.. parsed-literal::
1677
+
1678
+ qemu-img create sheepdog://HOSTNAME:PORT/IMAGE SIZE
1679
+ |qemu_system| sheepdog://HOSTNAME:PORT/IMAGE
1680
+
1681
+iSCSI LUNs
1682
+----------
1683
+
1684
+iSCSI is a popular protocol used to access SCSI devices across a computer
1685
+network.
1686
+
1687
+There are two different ways iSCSI devices can be used by QEMU.
1688
+
1689
+The first method is to mount the iSCSI LUN on the host, and make it appear as
1690
+any other ordinary SCSI device on the host and then to access this device as a
1691
+/dev/sd device from QEMU. How to do this differs between host OSes.
1692
+
1693
+The second method involves using the iSCSI initiator that is built into
1694
+QEMU. This provides a mechanism that works the same way regardless of which
1695
+host OS you are running QEMU on. This section will describe this second method
1696
+of using iSCSI together with QEMU.
1697
+
1698
+In QEMU, iSCSI devices are described using special iSCSI URLs. URL syntax:
1699
+
1700
+::
1701
+
1702
+ iscsi://[<username>[%<password>]@]<host>[:<port>]/<target-iqn-name>/<lun>
1703
+
1704
+Username and password are optional and only used if your target is set up
1705
+using CHAP authentication for access control.
1706
+Alternatively the username and password can also be set via environment
1707
+variables to have these not show up in the process list:
1708
+
1709
+::
1710
+
1711
+ export LIBISCSI_CHAP_USERNAME=<username>
1712
+ export LIBISCSI_CHAP_PASSWORD=<password>
1713
+ iscsi://<host>/<target-iqn-name>/<lun>
1714
+
1715
+Various session related parameters can be set via special options, either
1716
+in a configuration file provided via '-readconfig' or directly on the
1717
+command line.
1718
+
1719
+If the initiator-name is not specified qemu will use a default name
1720
+of 'iqn.2008-11.org.linux-kvm[:<uuid>'] where <uuid> is the UUID of the
1721
+virtual machine. If the UUID is not specified qemu will use
1722
+'iqn.2008-11.org.linux-kvm[:<name>'] where <name> is the name of the
1723
+virtual machine.
1724
+
1725
+Setting a specific initiator name to use when logging in to the target:
1726
+
1727
+::
1728
+
1729
+ -iscsi initiator-name=iqn.qemu.test:my-initiator
1730
+
1731
+Controlling which type of header digest to negotiate with the target:
1732
+
1733
+::
1734
+
1735
+ -iscsi header-digest=CRC32C|CRC32C-NONE|NONE-CRC32C|NONE
1736
+
1737
+These can also be set via a configuration file:
1738
+
1739
+::
1740
+
1741
+ [iscsi]
1742
+ user = "CHAP username"
1743
+ password = "CHAP password"
1744
+ initiator-name = "iqn.qemu.test:my-initiator"
1745
+ # header digest is one of CRC32C|CRC32C-NONE|NONE-CRC32C|NONE
1746
+ header-digest = "CRC32C"
1747
+
1748
+Setting the target name allows different options for different targets:
1749
+
1750
+::
1751
+
1752
+ [iscsi "iqn.target.name"]
1753
+ user = "CHAP username"
1754
+ password = "CHAP password"
1755
+ initiator-name = "iqn.qemu.test:my-initiator"
1756
+ # header digest is one of CRC32C|CRC32C-NONE|NONE-CRC32C|NONE
1757
+ header-digest = "CRC32C"
1758
+
1759
+How to use a configuration file to set iSCSI configuration options:
1760
+
1761
+.. parsed-literal::
1762
+
1763
+ cat >iscsi.conf <<EOF
1764
+ [iscsi]
1765
+ user = "me"
1766
+ password = "my password"
1767
+ initiator-name = "iqn.qemu.test:my-initiator"
1768
+ header-digest = "CRC32C"
1769
+ EOF
1770
+
1771
+ |qemu_system| -drive file=iscsi://127.0.0.1/iqn.qemu.test/1 \\
1772
+ -readconfig iscsi.conf
1773
+
1774
+How to set up a simple iSCSI target on loopback and access it via QEMU:
1775
+this example shows how to set up an iSCSI target with one CDROM and one DISK
1776
+using the Linux STGT software target. This target is available on Red Hat based
1777
+systems as the package 'scsi-target-utils'.
1778
+
1779
+.. parsed-literal::
1780
+
1781
+ tgtd --iscsi portal=127.0.0.1:3260
1782
+ tgtadm --lld iscsi --op new --mode target --tid 1 -T iqn.qemu.test
1783
+ tgtadm --lld iscsi --mode logicalunit --op new --tid 1 --lun 1 \\
1784
+ -b /IMAGES/disk.img --device-type=disk
1785
+ tgtadm --lld iscsi --mode logicalunit --op new --tid 1 --lun 2 \\
1786
+ -b /IMAGES/cd.iso --device-type=cd
1787
+ tgtadm --lld iscsi --op bind --mode target --tid 1 -I ALL
1788
+
1789
+ |qemu_system| -iscsi initiator-name=iqn.qemu.test:my-initiator \\
1790
+ -boot d -drive file=iscsi://127.0.0.1/iqn.qemu.test/1 \\
1791
+ -cdrom iscsi://127.0.0.1/iqn.qemu.test/2
1792
+
1793
+GlusterFS disk images
1794
+---------------------
1795
+
1796
+GlusterFS is a user space distributed file system.
1797
+
1798
+You can boot from the GlusterFS disk image with the command:
1799
+
1800
+URI:
1801
+
1802
+.. parsed-literal::
1803
+
1804
+ |qemu_system| -drive file=gluster[+TYPE]://[HOST}[:PORT]]/VOLUME/PATH
1805
+ [?socket=...][,file.debug=9][,file.logfile=...]
1806
+
1807
+JSON:
1808
+
1809
+.. parsed-literal::
1810
+
1811
+ |qemu_system| 'json:{"driver":"qcow2",
1812
+ "file":{"driver":"gluster",
1813
+ "volume":"testvol","path":"a.img","debug":9,"logfile":"...",
1814
+ "server":[{"type":"tcp","host":"...","port":"..."},
1815
+ {"type":"unix","socket":"..."}]}}'
1816
+
1817
+*gluster* is the protocol.
1818
+
1819
+*TYPE* specifies the transport type used to connect to gluster
1820
+management daemon (glusterd). Valid transport types are
1821
+tcp and unix. In the URI form, if a transport type isn't specified,
1822
+then tcp type is assumed.
1823
+
1824
+*HOST* specifies the server where the volume file specification for
1825
+the given volume resides. This can be either a hostname or an ipv4 address.
1826
+If transport type is unix, then *HOST* field should not be specified.
1827
+Instead *socket* field needs to be populated with the path to unix domain
1828
+socket.
1829
+
1830
+*PORT* is the port number on which glusterd is listening. This is optional
1831
+and if not specified, it defaults to port 24007. If the transport type is unix,
1832
+then *PORT* should not be specified.
1833
+
1834
+*VOLUME* is the name of the gluster volume which contains the disk image.
1835
+
1836
+*PATH* is the path to the actual disk image that resides on gluster volume.
1837
+
1838
+*debug* is the logging level of the gluster protocol driver. Debug levels
1839
+are 0-9, with 9 being the most verbose, and 0 representing no debugging output.
1840
+The default level is 4. The current logging levels defined in the gluster source
1841
+are 0 - None, 1 - Emergency, 2 - Alert, 3 - Critical, 4 - Error, 5 - Warning,
1842
+6 - Notice, 7 - Info, 8 - Debug, 9 - Trace
1843
+
1844
+*logfile* is a commandline option to mention log file path which helps in
1845
+logging to the specified file and also help in persisting the gfapi logs. The
1846
+default is stderr.
1847
+
1848
+You can create a GlusterFS disk image with the command:
1849
+
1850
+.. parsed-literal::
1851
+
1852
+ qemu-img create gluster://HOST/VOLUME/PATH SIZE
1853
+
1854
+Examples
1855
+
1856
+.. parsed-literal::
1857
+
1858
+ |qemu_system| -drive file=gluster://1.2.3.4/testvol/a.img
1859
+ |qemu_system| -drive file=gluster+tcp://1.2.3.4/testvol/a.img
1860
+ |qemu_system| -drive file=gluster+tcp://1.2.3.4:24007/testvol/dir/a.img
1861
+ |qemu_system| -drive file=gluster+tcp://[1:2:3:4:5:6:7:8]/testvol/dir/a.img
1862
+ |qemu_system| -drive file=gluster+tcp://[1:2:3:4:5:6:7:8]:24007/testvol/dir/a.img
1863
+ |qemu_system| -drive file=gluster+tcp://server.domain.com:24007/testvol/dir/a.img
1864
+ |qemu_system| -drive file=gluster+unix:///testvol/dir/a.img?socket=/tmp/glusterd.socket
1865
+ |qemu_system| -drive file=gluster+rdma://1.2.3.4:24007/testvol/a.img
1866
+ |qemu_system| -drive file=gluster://1.2.3.4/testvol/a.img,file.debug=9,file.logfile=/var/log/qemu-gluster.log
1867
+ |qemu_system| 'json:{"driver":"qcow2",
1868
+ "file":{"driver":"gluster",
1869
+ "volume":"testvol","path":"a.img",
1870
+ "debug":9,"logfile":"/var/log/qemu-gluster.log",
1871
+ "server":[{"type":"tcp","host":"1.2.3.4","port":24007},
1872
+ {"type":"unix","socket":"/var/run/glusterd.socket"}]}}'
1873
+ |qemu_system| -drive driver=qcow2,file.driver=gluster,file.volume=testvol,file.path=/path/a.img,
1874
+ file.debug=9,file.logfile=/var/log/qemu-gluster.log,
1875
+ file.server.0.type=tcp,file.server.0.host=1.2.3.4,file.server.0.port=24007,
1876
+ file.server.1.type=unix,file.server.1.socket=/var/run/glusterd.socket
1877
+
1878
+Secure Shell (ssh) disk images
1879
+------------------------------
1880
+
1881
+You can access disk images located on a remote ssh server
1882
+by using the ssh protocol:
1883
+
1884
+.. parsed-literal::
1885
+
1886
+ |qemu_system| -drive file=ssh://[USER@]SERVER[:PORT]/PATH[?host_key_check=HOST_KEY_CHECK]
1887
+
1888
+Alternative syntax using properties:
1889
+
1890
+.. parsed-literal::
1891
+
1892
+ |qemu_system| -drive file.driver=ssh[,file.user=USER],file.host=SERVER[,file.port=PORT],file.path=PATH[,file.host_key_check=HOST_KEY_CHECK]
1893
+
1894
+*ssh* is the protocol.
1895
+
1896
+*USER* is the remote user. If not specified, then the local
1897
+username is tried.
1898
+
1899
+*SERVER* specifies the remote ssh server. Any ssh server can be
1900
+used, but it must implement the sftp-server protocol. Most Unix/Linux
1901
+systems should work without requiring any extra configuration.
1902
+
1903
+*PORT* is the port number on which sshd is listening. By default
1904
+the standard ssh port (22) is used.
1905
+
1906
+*PATH* is the path to the disk image.
1907
+
1908
+The optional *HOST_KEY_CHECK* parameter controls how the remote
1909
+host's key is checked. The default is ``yes`` which means to use
1910
+the local ``.ssh/known_hosts`` file. Setting this to ``no``
1911
+turns off known-hosts checking. Or you can check that the host key
1912
+matches a specific fingerprint:
1913
+``host_key_check=md5:78:45:8e:14:57:4f:d5:45:83:0a:0e:f3:49:82:c9:c8``
1914
+(``sha1:`` can also be used as a prefix, but note that OpenSSH
1915
+tools only use MD5 to print fingerprints).
1916
+
1917
+Currently authentication must be done using ssh-agent. Other
1918
+authentication methods may be supported in future.
1919
+
1920
+Note: Many ssh servers do not support an ``fsync``-style operation.
1921
+The ssh driver cannot guarantee that disk flush requests are
1922
+obeyed, and this causes a risk of disk corruption if the remote
1923
+server or network goes down during writes. The driver will
1924
+print a warning when ``fsync`` is not supported:
1925
+
1926
+::
1927
+
1928
+ warning: ssh server ssh.example.com:22 does not support fsync
1929
+
1930
+With sufficiently new versions of libssh and OpenSSH, ``fsync`` is
1931
+supported.
1932
+
1933
+NVMe disk images
1934
+----------------
1935
+
1936
+NVM Express (NVMe) storage controllers can be accessed directly by a userspace
1937
+driver in QEMU. This bypasses the host kernel file system and block layers
1938
+while retaining QEMU block layer functionalities, such as block jobs, I/O
1939
+throttling, image formats, etc. Disk I/O performance is typically higher than
1940
+with ``-drive file=/dev/sda`` using either thread pool or linux-aio.
1941
+
1942
+The controller will be exclusively used by the QEMU process once started. To be
1943
+able to share storage between multiple VMs and other applications on the host,
1944
+please use the file based protocols.
1945
+
1946
+Before starting QEMU, bind the host NVMe controller to the host vfio-pci
1947
+driver. For example:
1948
+
1949
+.. parsed-literal::
1950
+
1951
+ # modprobe vfio-pci
1952
+ # lspci -n -s 0000:06:0d.0
1953
+ 06:0d.0 0401: 1102:0002 (rev 08)
1954
+ # echo 0000:06:0d.0 > /sys/bus/pci/devices/0000:06:0d.0/driver/unbind
1955
+ # echo 1102 0002 > /sys/bus/pci/drivers/vfio-pci/new_id
1956
+
1957
+ # |qemu_system| -drive file=nvme://HOST:BUS:SLOT.FUNC/NAMESPACE
1958
+
1959
+Alternative syntax using properties:
1960
+
1961
+.. parsed-literal::
1962
+
1963
+ |qemu_system| -drive file.driver=nvme,file.device=HOST:BUS:SLOT.FUNC,file.namespace=NAMESPACE
1964
+
1965
+*HOST*:*BUS*:*SLOT*.\ *FUNC* is the NVMe controller's PCI device
1966
+address on the host.
1967
+
1968
+*NAMESPACE* is the NVMe namespace number, starting from 1.
1969
+
1970
+Disk image file locking
1971
+-----------------------
1972
+
1973
+By default, QEMU tries to protect image files from unexpected concurrent
1974
+access, as long as it's supported by the block protocol driver and host
1975
+operating system. If multiple QEMU processes (including QEMU emulators and
1976
+utilities) try to open the same image with conflicting accessing modes, all but
1977
+the first one will get an error.
1978
+
1979
+This feature is currently supported by the file protocol on Linux with the Open
1980
+File Descriptor (OFD) locking API, and can be configured to fall back to POSIX
1981
+locking if the POSIX host doesn't support Linux OFD locking.
1982
+
1983
+To explicitly enable image locking, specify "locking=on" in the file protocol
1984
+driver options. If OFD locking is not possible, a warning will be printed and
1985
+the POSIX locking API will be used. In this case there is a risk that the lock
1986
+will get silently lost when doing hot plugging and block jobs, due to the
1987
+shortcomings of the POSIX locking API.
1988
+
1989
+QEMU transparently handles lock handover during shared storage migration. For
1990
+shared virtual disk images between multiple VMs, the "share-rw" device option
1991
+should be used.
1992
+
1993
+By default, the guest has exclusive write access to its disk image. If the
1994
+guest can safely share the disk image with other writers the
1995
+``-device ...,share-rw=on`` parameter can be used. This is only safe if
1996
+the guest is running software, such as a cluster file system, that
1997
+coordinates disk accesses to avoid corruption.
1998
+
1999
+Note that share-rw=on only declares the guest's ability to share the disk.
2000
+Some QEMU features, such as image file formats, require exclusive write access
2001
+to the disk image and this is unaffected by the share-rw=on option.
2002
+
2003
+Alternatively, locking can be fully disabled by "locking=off" block device
2004
+option. In the command line, the option is usually in the form of
2005
+"file.locking=off" as the protocol driver is normally placed as a "file" child
2006
+under a format driver. For example:
2007
+
2008
+::
2009
+
2010
+ -blockdev driver=qcow2,file.filename=/path/to/image,file.locking=off,file.driver=file
2011
+
2012
+To check if image locking is active, check the output of the "lslocks" command
2013
+on host and see if there are locks held by the QEMU process on the image file.
2014
+More than one byte could be locked by the QEMU instance, each byte of which
2015
+reflects a particular permission that is acquired or protected by the running
2016
+block driver.
2017
+
2018
+.. only:: man
2019
+
2020
+ See also
2021
+ --------
2022
+
2023
+ The HTML documentation of QEMU for more precise information and Linux
2024
+ user mode emulator invocation.
2025
diff --git a/qemu-doc.texi b/qemu-doc.texi
2026
index XXXXXXX..XXXXXXX 100644
2027
--- a/qemu-doc.texi
2028
+++ b/qemu-doc.texi
2029
@@ -XXX,XX +XXX,XX @@ encrypted disk images.
2030
* disk_images_snapshot_mode:: Snapshot mode
2031
* vm_snapshots:: VM snapshots
2032
* qemu_img_invocation:: qemu-img Invocation
2033
-* disk_images_formats:: Disk image file formats
2034
-* host_drives:: Using host drives
2035
-* disk_images_fat_images:: Virtual FAT disk images
2036
-* disk_images_nbd:: NBD access
2037
-* disk_images_sheepdog:: Sheepdog disk images
2038
-* disk_images_iscsi:: iSCSI LUNs
2039
-* disk_images_gluster:: GlusterFS disk images
2040
-* disk_images_ssh:: Secure Shell (ssh) disk images
2041
-* disk_images_nvme:: NVMe userspace driver
2042
-* disk_image_locking:: Disk image file locking
2043
@end menu
2044
2045
@node disk_images_quickstart
2046
@@ -XXX,XX +XXX,XX @@ state is not saved or restored properly (in particular USB).
2047
2048
@include qemu-img.texi
2049
2050
-@include docs/qemu-block-drivers.texi
2051
-
2052
@node pcsys_network
2053
@section Network emulation
2054
2055
diff --git a/qemu-options.hx b/qemu-options.hx
2056
index XXXXXXX..XXXXXXX 100644
2057
--- a/qemu-options.hx
2058
+++ b/qemu-options.hx
2059
@@ -XXX,XX +XXX,XX @@ STEXI
2060
@findex -cdrom
2061
Use @var{file} as CD-ROM image (you cannot use @option{-hdc} and
2062
@option{-cdrom} at the same time). You can use the host CD-ROM by
2063
-using @file{/dev/cdrom} as filename (@pxref{host_drives}).
2064
+using @file{/dev/cdrom} as filename.
2065
ETEXI
2066
2067
DEF("blockdev", HAS_ARG, QEMU_OPTION_blockdev,
2068
--
101
--
2069
2.20.1
102
2.25.1
2070
2071
diff view generated by jsdifflib
1
The qemu-nbd documentation is currently in qemu-nbd.texi in Texinfo
1
From: Richard Henderson <richard.henderson@linaro.org>
2
format, which we present to the user as:
3
* a qemu-nbd manpage
4
* a section of the main qemu-doc HTML documentation
5
2
6
Convert the documentation to rST format, and present it to the user as:
3
These two instructions are aliases of MSR (immediate).
7
* a qemu-nbd manpage
4
Use the two helpers to properly implement svcr_write.
8
* part of the interop/ Sphinx manual
9
5
10
This follows the same pattern as commit 27a296fce982 did for the
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
qemu-ga manpage.
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220620175235.60881-11-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/cpu.h | 1 +
12
target/arm/helper-sme.h | 21 +++++++++++++
13
target/arm/helper.h | 1 +
14
target/arm/helper.c | 6 ++--
15
target/arm/sme_helper.c | 61 ++++++++++++++++++++++++++++++++++++++
16
target/arm/translate-a64.c | 24 +++++++++++++++
17
target/arm/meson.build | 1 +
18
7 files changed, 112 insertions(+), 3 deletions(-)
19
create mode 100644 target/arm/helper-sme.h
20
create mode 100644 target/arm/sme_helper.c
12
21
13
All the content of the old manpage is retained, except that I have
22
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
14
dropped the "This is free software; see the source for copying
23
index XXXXXXX..XXXXXXX 100644
15
conditions. There is NO warranty..." text that was in the old AUTHOR
24
--- a/target/arm/cpu.h
16
section; Sphinx's manpage builder doesn't expect that much text in
25
+++ b/target/arm/cpu.h
17
the AUTHOR section, and since none of our other manpages have it it
26
@@ -XXX,XX +XXX,XX @@ void aarch64_sve_change_el(CPUARMState *env, int old_el,
18
seems easiest to delete it rather than try to figure out where else
27
int new_el, bool el0_a64);
19
in the manpage to put it.
28
void aarch64_add_sve_properties(Object *obj);
20
29
void aarch64_add_pauth_properties(Object *obj);
21
The only other textual change is that I have had to give the
30
+void arm_reset_sve_state(CPUARMState *env);
22
--nocache option its own description ("Equivalent to --cache=none")
31
23
because Sphinx doesn't have an equivalent of using item/itemx
32
/*
24
to share a description between two options.
33
* SVE registers are encoded in KVM's memory in an endianness-invariant format.
25
34
diff --git a/target/arm/helper-sme.h b/target/arm/helper-sme.h
26
Some minor aspects of the formatting have changed, to suit what is
27
easiest for Sphinx to output. (The most notable is that Sphinx
28
option section option syntax doesn't support '--option foo=bar'
29
with bar underlined rather than bold, so we have to switch to
30
'--option foo=BAR' instead.)
31
32
The contents of qemu-option-trace.texi are now duplicated in
33
docs/interop/qemu-option-trace.rst.inc, until such time as we complete
34
the conversion of the other files which use it; since it has had only
35
3 changes in 3 years, this shouldn't be too awkward a burden.
36
(We use .rst.inc because if this file fragment has a .rst extension
37
then Sphinx complains about not seeing it in a toctree.)
38
39
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
40
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
41
Reviewed-by: Eric Blake <eblake@redhat.com>
42
Tested-by: Alex Bennée <alex.bennee@linaro.org>
43
Acked-by: Stefan Hajnoczi <stefanha@redhat.com>
44
Message-id: 20200116141511.16849-2-peter.maydell@linaro.org
45
---
46
Makefile | 16 +-
47
MAINTAINERS | 1 +
48
docs/interop/conf.py | 4 +-
49
docs/interop/index.rst | 1 +
50
docs/interop/qemu-nbd.rst | 263 +++++++++++++++++++++++++
51
docs/interop/qemu-option-trace.rst.inc | 30 +++
52
qemu-doc.texi | 6 -
53
qemu-nbd.texi | 214 --------------------
54
qemu-option-trace.texi | 4 +
55
9 files changed, 313 insertions(+), 226 deletions(-)
56
create mode 100644 docs/interop/qemu-nbd.rst
57
create mode 100644 docs/interop/qemu-option-trace.rst.inc
58
delete mode 100644 qemu-nbd.texi
59
60
diff --git a/Makefile b/Makefile
61
index XXXXXXX..XXXXXXX 100644
62
--- a/Makefile
63
+++ b/Makefile
64
@@ -XXX,XX +XXX,XX @@ MANUAL_BUILDDIR := docs
65
endif
66
67
ifdef BUILD_DOCS
68
-DOCS=qemu-doc.html qemu-doc.txt qemu.1 qemu-img.1 qemu-nbd.8 $(MANUAL_BUILDDIR)/interop/qemu-ga.8
69
+DOCS=qemu-doc.html qemu-doc.txt qemu.1 qemu-img.1
70
+DOCS+=$(MANUAL_BUILDDIR)/interop/qemu-nbd.8
71
+DOCS+=$(MANUAL_BUILDDIR)/interop/qemu-ga.8
72
DOCS+=docs/interop/qemu-qmp-ref.html docs/interop/qemu-qmp-ref.txt docs/interop/qemu-qmp-ref.7
73
DOCS+=docs/interop/qemu-ga-ref.html docs/interop/qemu-ga-ref.txt docs/interop/qemu-ga-ref.7
74
DOCS+=docs/qemu-block-drivers.7
75
@@ -XXX,XX +XXX,XX @@ ifdef CONFIG_POSIX
76
ifeq ($(CONFIG_TOOLS),y)
77
    $(INSTALL_DATA) qemu-img.1 "$(DESTDIR)$(mandir)/man1"
78
    $(INSTALL_DIR) "$(DESTDIR)$(mandir)/man8"
79
-    $(INSTALL_DATA) qemu-nbd.8 "$(DESTDIR)$(mandir)/man8"
80
+    $(INSTALL_DATA) $(MANUAL_BUILDDIR)/interop/qemu-nbd.8 "$(DESTDIR)$(mandir)/man8"
81
endif
82
ifdef CONFIG_TRACE_SYSTEMTAP
83
    $(INSTALL_DATA) scripts/qemu-trace-stap.1 "$(DESTDIR)$(mandir)/man1"
84
@@ -XXX,XX +XXX,XX @@ sphinxdocs: $(MANUAL_BUILDDIR)/devel/index.html $(MANUAL_BUILDDIR)/interop/index
85
# a single doctree: https://github.com/sphinx-doc/sphinx/issues/2946
86
build-manual = $(call quiet-command,CONFDIR="$(qemu_confdir)" sphinx-build $(if $(V),,-q) -W -b $2 -D version=$(VERSION) -D release="$(FULL_VERSION)" -d .doctrees/$1-$2 $(SRC_PATH)/docs/$1 $(MANUAL_BUILDDIR)/$1 ,"SPHINX","$(MANUAL_BUILDDIR)/$1")
87
# We assume all RST files in the manual's directory are used in it
88
-manual-deps = $(wildcard $(SRC_PATH)/docs/$1/*.rst) $(SRC_PATH)/docs/$1/conf.py $(SRC_PATH)/docs/conf.py
89
+manual-deps = $(wildcard $(SRC_PATH)/docs/$1/*.rst) \
90
+ $(wildcard $(SRC_PATH)/docs/$1/*.rst.inc) \
91
+ $(SRC_PATH)/docs/$1/conf.py $(SRC_PATH)/docs/conf.py
92
93
$(MANUAL_BUILDDIR)/devel/index.html: $(call manual-deps,devel)
94
    $(call build-manual,devel,html)
95
@@ -XXX,XX +XXX,XX @@ $(MANUAL_BUILDDIR)/specs/index.html: $(call manual-deps,specs)
96
$(MANUAL_BUILDDIR)/interop/qemu-ga.8: $(call manual-deps,interop)
97
    $(call build-manual,interop,man)
98
99
+$(MANUAL_BUILDDIR)/interop/qemu-nbd.8: $(call manual-deps,interop)
100
+    $(call build-manual,interop,man)
101
+
102
$(MANUAL_BUILDDIR)/index.html: $(SRC_PATH)/docs/index.html.in qemu-version.h
103
    @mkdir -p "$(MANUAL_BUILDDIR)"
104
    $(call quiet-command, sed "s|@@VERSION@@|${VERSION}|g" $< >$@, \
105
@@ -XXX,XX +XXX,XX @@ qemu.1: qemu-doc.texi qemu-options.texi qemu-monitor.texi qemu-monitor-info.texi
106
qemu.1: qemu-option-trace.texi
107
qemu-img.1: qemu-img.texi qemu-option-trace.texi qemu-img-cmds.texi
108
fsdev/virtfs-proxy-helper.1: fsdev/virtfs-proxy-helper.texi
109
-qemu-nbd.8: qemu-nbd.texi qemu-option-trace.texi
110
docs/qemu-block-drivers.7: docs/qemu-block-drivers.texi
111
docs/qemu-cpu-models.7: docs/qemu-cpu-models.texi
112
scripts/qemu-trace-stap.1: scripts/qemu-trace-stap.texi
113
@@ -XXX,XX +XXX,XX @@ pdf: qemu-doc.pdf docs/interop/qemu-qmp-ref.pdf docs/interop/qemu-ga-ref.pdf
114
txt: qemu-doc.txt docs/interop/qemu-qmp-ref.txt docs/interop/qemu-ga-ref.txt
115
116
qemu-doc.html qemu-doc.info qemu-doc.pdf qemu-doc.txt: \
117
-    qemu-img.texi qemu-nbd.texi qemu-options.texi \
118
+    qemu-img.texi qemu-options.texi \
119
    qemu-tech.texi qemu-option-trace.texi \
120
    qemu-deprecated.texi qemu-monitor.texi qemu-img-cmds.texi \
121
    qemu-monitor-info.texi docs/qemu-block-drivers.texi \
122
diff --git a/MAINTAINERS b/MAINTAINERS
123
index XXXXXXX..XXXXXXX 100644
124
--- a/MAINTAINERS
125
+++ b/MAINTAINERS
126
@@ -XXX,XX +XXX,XX @@ F: include/block/nbd*
127
F: qemu-nbd.*
128
F: blockdev-nbd.c
129
F: docs/interop/nbd.txt
130
+F: docs/interop/qemu-nbd.rst
131
T: git https://repo.or.cz/qemu/ericb.git nbd
132
133
NFS
134
diff --git a/docs/interop/conf.py b/docs/interop/conf.py
135
index XXXXXXX..XXXXXXX 100644
136
--- a/docs/interop/conf.py
137
+++ b/docs/interop/conf.py
138
@@ -XXX,XX +XXX,XX @@ html_theme_options['description'] = u'System Emulation Management and Interopera
139
# (source start file, name, description, authors, manual section).
140
man_pages = [
141
('qemu-ga', 'qemu-ga', u'QEMU Guest Agent',
142
- ['Michael Roth <mdroth@linux.vnet.ibm.com>'], 8)
143
+ ['Michael Roth <mdroth@linux.vnet.ibm.com>'], 8),
144
+ ('qemu-nbd', 'qemu-nbd', u'QEMU Disk Network Block Device Server',
145
+ ['Anthony Liguori <anthony@codemonkey.ws>'], 8)
146
]
147
diff --git a/docs/interop/index.rst b/docs/interop/index.rst
148
index XXXXXXX..XXXXXXX 100644
149
--- a/docs/interop/index.rst
150
+++ b/docs/interop/index.rst
151
@@ -XXX,XX +XXX,XX @@ Contents:
152
live-block-operations
153
pr-helper
154
qemu-ga
155
+ qemu-nbd
156
vhost-user
157
vhost-user-gpu
158
diff --git a/docs/interop/qemu-nbd.rst b/docs/interop/qemu-nbd.rst
159
new file mode 100644
35
new file mode 100644
160
index XXXXXXX..XXXXXXX
36
index XXXXXXX..XXXXXXX
161
--- /dev/null
37
--- /dev/null
162
+++ b/docs/interop/qemu-nbd.rst
38
+++ b/target/arm/helper-sme.h
163
@@ -XXX,XX +XXX,XX @@
39
@@ -XXX,XX +XXX,XX @@
164
+QEMU Disk Network Block Device Server
40
+/*
165
+=====================================
41
+ * AArch64 SME specific helper definitions
166
+
42
+ *
167
+Synopsis
43
+ * Copyright (c) 2022 Linaro, Ltd
168
+--------
44
+ *
169
+
45
+ * This library is free software; you can redistribute it and/or
170
+**qemu-nbd** [*OPTION*]... *filename*
46
+ * modify it under the terms of the GNU Lesser General Public
171
+
47
+ * License as published by the Free Software Foundation; either
172
+**qemu-nbd** -L [*OPTION*]...
48
+ * version 2.1 of the License, or (at your option) any later version.
173
+
49
+ *
174
+**qemu-nbd** -d *dev*
50
+ * This library is distributed in the hope that it will be useful,
175
+
51
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
176
+Description
52
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
177
+-----------
53
+ * Lesser General Public License for more details.
178
+
54
+ *
179
+Export a QEMU disk image using the NBD protocol.
55
+ * You should have received a copy of the GNU Lesser General Public
180
+
56
+ * License along with this library; if not, see <http://www.gnu.org/licenses/>.
181
+Other uses:
57
+ */
182
+
58
+
183
+- Bind a /dev/nbdX block device to a QEMU server (on Linux).
59
+DEF_HELPER_FLAGS_2(set_pstate_sm, TCG_CALL_NO_RWG, void, env, i32)
184
+- As a client to query exports of a remote NBD server.
60
+DEF_HELPER_FLAGS_2(set_pstate_za, TCG_CALL_NO_RWG, void, env, i32)
185
+
61
diff --git a/target/arm/helper.h b/target/arm/helper.h
186
+Options
62
index XXXXXXX..XXXXXXX 100644
187
+-------
63
--- a/target/arm/helper.h
188
+
64
+++ b/target/arm/helper.h
189
+.. program:: qemu-nbd
65
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_6(gvec_bfmlal_idx, TCG_CALL_NO_RWG,
190
+
66
#ifdef TARGET_AARCH64
191
+*filename* is a disk image filename, or a set of block
67
#include "helper-a64.h"
192
+driver options if ``--image-opts`` is specified.
68
#include "helper-sve.h"
193
+
69
+#include "helper-sme.h"
194
+*dev* is an NBD device.
70
#endif
195
+
71
196
+.. option:: --object type,id=ID,...props...
72
#include "helper-mve.h"
197
+
73
diff --git a/target/arm/helper.c b/target/arm/helper.c
198
+ Define a new instance of the *type* object class identified by *ID*.
74
index XXXXXXX..XXXXXXX 100644
199
+ See the :manpage:`qemu(1)` manual page for full details of the properties
75
--- a/target/arm/helper.c
200
+ supported. The common object types that it makes sense to define are the
76
+++ b/target/arm/helper.c
201
+ ``secret`` object, which is used to supply passwords and/or encryption
77
@@ -XXX,XX +XXX,XX @@ static CPAccessResult access_esm(CPUARMState *env, const ARMCPRegInfo *ri,
202
+ keys, and the ``tls-creds`` object, which is used to supply TLS
78
static void svcr_write(CPUARMState *env, const ARMCPRegInfo *ri,
203
+ credentials for the qemu-nbd server or client.
79
uint64_t value)
204
+
80
{
205
+.. option:: -p, --port=PORT
81
- value &= R_SVCR_SM_MASK | R_SVCR_ZA_MASK;
206
+
82
- /* TODO: Side effects. */
207
+ TCP port to listen on as a server, or connect to as a client
83
- env->svcr = value;
208
+ (default ``10809``).
84
+ helper_set_pstate_sm(env, FIELD_EX64(value, SVCR, SM));
209
+
85
+ helper_set_pstate_za(env, FIELD_EX64(value, SVCR, ZA));
210
+.. option:: -o, --offset=OFFSET
86
+ arm_rebuild_hflags(env);
211
+
87
}
212
+ The offset into the image.
88
213
+
89
static void smcr_write(CPUARMState *env, const ARMCPRegInfo *ri,
214
+.. option:: -b, --bind=IFACE
90
diff --git a/target/arm/sme_helper.c b/target/arm/sme_helper.c
215
+
216
+ The interface to bind to as a server, or connect to as a client
217
+ (default ``0.0.0.0``).
218
+
219
+.. option:: -k, --socket=PATH
220
+
221
+ Use a unix socket with path *PATH*.
222
+
223
+.. option:: --image-opts
224
+
225
+ Treat *filename* as a set of image options, instead of a plain
226
+ filename. If this flag is specified, the ``-f`` flag should
227
+ not be used, instead the :option:`format=` option should be set.
228
+
229
+.. option:: -f, --format=FMT
230
+
231
+ Force the use of the block driver for format *FMT* instead of
232
+ auto-detecting.
233
+
234
+.. option:: -r, --read-only
235
+
236
+ Export the disk as read-only.
237
+
238
+.. option:: -P, --partition=NUM
239
+
240
+ Deprecated: Only expose MBR partition *NUM*. Understands physical
241
+ partitions 1-4 and logical partition 5. New code should instead use
242
+ :option:`--image-opts` with the raw driver wrapping a subset of the
243
+ original image.
244
+
245
+.. option:: -B, --bitmap=NAME
246
+
247
+ If *filename* has a qcow2 persistent bitmap *NAME*, expose
248
+ that bitmap via the ``qemu:dirty-bitmap:NAME`` context
249
+ accessible through NBD_OPT_SET_META_CONTEXT.
250
+
251
+.. option:: -s, --snapshot
252
+
253
+ Use *filename* as an external snapshot, create a temporary
254
+ file with ``backing_file=``\ *filename*, redirect the write to
255
+ the temporary one.
256
+
257
+.. option:: -l, --load-snapshot=SNAPSHOT_PARAM
258
+
259
+ Load an internal snapshot inside *filename* and export it
260
+ as an read-only device, SNAPSHOT_PARAM format is
261
+ ``snapshot.id=[ID],snapshot.name=[NAME]`` or ``[ID_OR_NAME]``
262
+
263
+.. option:: --cache=CACHE
264
+
265
+ The cache mode to be used with the file. See the documentation of
266
+ the emulator's ``-drive cache=...`` option for allowed values.
267
+
268
+.. option:: -n, --nocache
269
+
270
+ Equivalent to :option:`--cache=none`.
271
+
272
+.. option:: --aio=AIO
273
+
274
+ Set the asynchronous I/O mode between ``threads`` (the default)
275
+ and ``native`` (Linux only).
276
+
277
+.. option:: --discard=DISCARD
278
+
279
+ Control whether ``discard`` (also known as ``trim`` or ``unmap``)
280
+ requests are ignored or passed to the filesystem. *DISCARD* is one of
281
+ ``ignore`` (or ``off``), ``unmap`` (or ``on``). The default is
282
+ ``ignore``.
283
+
284
+.. option:: --detect-zeroes=DETECT_ZEROES
285
+
286
+ Control the automatic conversion of plain zero writes by the OS to
287
+ driver-specific optimized zero write commands. *DETECT_ZEROES* is one of
288
+ ``off``, ``on``, or ``unmap``. ``unmap``
289
+ converts a zero write to an unmap operation and can only be used if
290
+ *DISCARD* is set to ``unmap``. The default is ``off``.
291
+
292
+.. option:: -c, --connect=DEV
293
+
294
+ Connect *filename* to NBD device *DEV* (Linux only).
295
+
296
+.. option:: -d, --disconnect
297
+
298
+ Disconnect the device *DEV* (Linux only).
299
+
300
+.. option:: -e, --shared=NUM
301
+
302
+ Allow up to *NUM* clients to share the device (default
303
+ ``1``). Safe for readers, but for now, consistency is not
304
+ guaranteed between multiple writers.
305
+
306
+.. option:: -t, --persistent
307
+
308
+ Don't exit on the last connection.
309
+
310
+.. option:: -x, --export-name=NAME
311
+
312
+ Set the NBD volume export name (default of a zero-length string).
313
+
314
+.. option:: -D, --description=DESCRIPTION
315
+
316
+ Set the NBD volume export description, as a human-readable
317
+ string.
318
+
319
+.. option:: -L, --list
320
+
321
+ Connect as a client and list all details about the exports exposed by
322
+ a remote NBD server. This enables list mode, and is incompatible
323
+ with options that change behavior related to a specific export (such as
324
+ :option:`--export-name`, :option:`--offset`, ...).
325
+
326
+.. option:: --tls-creds=ID
327
+
328
+ Enable mandatory TLS encryption for the server by setting the ID
329
+ of the TLS credentials object previously created with the --object
330
+ option; or provide the credentials needed for connecting as a client
331
+ in list mode.
332
+
333
+.. option:: --fork
334
+
335
+ Fork off the server process and exit the parent once the server is running.
336
+
337
+.. option:: --pid-file=PATH
338
+
339
+ Store the server's process ID in the given file.
340
+
341
+.. option:: --tls-authz=ID
342
+
343
+ Specify the ID of a qauthz object previously created with the
344
+ :option:`--object` option. This will be used to authorize connecting users
345
+ against their x509 distinguished name.
346
+
347
+.. option:: -v, --verbose
348
+
349
+ Display extra debugging information.
350
+
351
+.. option:: -h, --help
352
+
353
+ Display this help and exit.
354
+
355
+.. option:: -V, --version
356
+
357
+ Display version information and exit.
358
+
359
+.. option:: -T, --trace [[enable=]PATTERN][,events=FILE][,file=FILE]
360
+
361
+ .. include:: qemu-option-trace.rst.inc
362
+
363
+Examples
364
+--------
365
+
366
+Start a server listening on port 10809 that exposes only the
367
+guest-visible contents of a qcow2 file, with no TLS encryption, and
368
+with the default export name (an empty string). The command is
369
+one-shot, and will block until the first successful client
370
+disconnects:
371
+
372
+::
373
+
374
+ qemu-nbd -f qcow2 file.qcow2
375
+
376
+Start a long-running server listening with encryption on port 10810,
377
+and whitelist clients with a specific X.509 certificate to connect to
378
+a 1 megabyte subset of a raw file, using the export name 'subset':
379
+
380
+::
381
+
382
+ qemu-nbd \
383
+ --object tls-creds-x509,id=tls0,endpoint=server,dir=/path/to/qemutls \
384
+ --object 'authz-simple,id=auth0,identity=CN=laptop.example.com,,\
385
+ O=Example Org,,L=London,,ST=London,,C=GB' \
386
+ --tls-creds tls0 --tls-authz auth0 \
387
+ -t -x subset -p 10810 \
388
+ --image-opts driver=raw,offset=1M,size=1M,file.driver=file,file.filename=file.raw
389
+
390
+Serve a read-only copy of just the first MBR partition of a guest
391
+image over a Unix socket with as many as 5 simultaneous readers, with
392
+a persistent process forked as a daemon:
393
+
394
+::
395
+
396
+ qemu-nbd --fork --persistent --shared=5 --socket=/path/to/sock \
397
+ --partition=1 --read-only --format=qcow2 file.qcow2
398
+
399
+Expose the guest-visible contents of a qcow2 file via a block device
400
+/dev/nbd0 (and possibly creating /dev/nbd0p1 and friends for
401
+partitions found within), then disconnect the device when done.
402
+Access to bind qemu-nbd to an /dev/nbd device generally requires root
403
+privileges, and may also require the execution of ``modprobe nbd``
404
+to enable the kernel NBD client module. *CAUTION*: Do not use
405
+this method to mount filesystems from an untrusted guest image - a
406
+malicious guest may have prepared the image to attempt to trigger
407
+kernel bugs in partition probing or file system mounting.
408
+
409
+::
410
+
411
+ qemu-nbd -c /dev/nbd0 -f qcow2 file.qcow2
412
+ qemu-nbd -d /dev/nbd0
413
+
414
+Query a remote server to see details about what export(s) it is
415
+serving on port 10809, and authenticating via PSK:
416
+
417
+::
418
+
419
+ qemu-nbd \
420
+ --object tls-creds-psk,id=tls0,dir=/tmp/keys,username=eblake,endpoint=client \
421
+ --tls-creds tls0 -L -b remote.example.com
422
+
423
+See also
424
+--------
425
+
426
+:manpage:`qemu(1)`, :manpage:`qemu-img(1)`
427
diff --git a/docs/interop/qemu-option-trace.rst.inc b/docs/interop/qemu-option-trace.rst.inc
428
new file mode 100644
91
new file mode 100644
429
index XXXXXXX..XXXXXXX
92
index XXXXXXX..XXXXXXX
430
--- /dev/null
93
--- /dev/null
431
+++ b/docs/interop/qemu-option-trace.rst.inc
94
+++ b/target/arm/sme_helper.c
432
@@ -XXX,XX +XXX,XX @@
95
@@ -XXX,XX +XXX,XX @@
433
+..
96
+/*
434
+ The contents of this file must be kept in sync with qemu-option-trace.texi
97
+ * ARM SME Operations
435
+ until all the users of the texi file have been converted to rst and
98
+ *
436
+ the texi file can be removed.
99
+ * Copyright (c) 2022 Linaro, Ltd.
437
+
100
+ *
438
+Specify tracing options.
101
+ * This library is free software; you can redistribute it and/or
439
+
102
+ * modify it under the terms of the GNU Lesser General Public
440
+.. option:: [enable=]PATTERN
103
+ * License as published by the Free Software Foundation; either
441
+
104
+ * version 2.1 of the License, or (at your option) any later version.
442
+ Immediately enable events matching *PATTERN*
105
+ *
443
+ (either event name or a globbing pattern). This option is only
106
+ * This library is distributed in the hope that it will be useful,
444
+ available if QEMU has been compiled with the ``simple``, ``log``
107
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
445
+ or ``ftrace`` tracing backend. To specify multiple events or patterns,
108
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
446
+ specify the :option:`-trace` option multiple times.
109
+ * Lesser General Public License for more details.
447
+
110
+ *
448
+ Use :option:`-trace help` to print a list of names of trace points.
111
+ * You should have received a copy of the GNU Lesser General Public
449
+
112
+ * License along with this library; if not, see <http://www.gnu.org/licenses/>.
450
+.. option:: events=FILE
113
+ */
451
+
114
+
452
+ Immediately enable events listed in *FILE*.
115
+#include "qemu/osdep.h"
453
+ The file must contain one event name (as listed in the ``trace-events-all``
116
+#include "cpu.h"
454
+ file) per line; globbing patterns are accepted too. This option is only
117
+#include "internals.h"
455
+ available if QEMU has been compiled with the ``simple``, ``log`` or
118
+#include "exec/helper-proto.h"
456
+ ``ftrace`` tracing backend.
119
+
457
+
120
+/* ResetSVEState */
458
+.. option:: file=FILE
121
+void arm_reset_sve_state(CPUARMState *env)
459
+
122
+{
460
+ Log output traces to *FILE*.
123
+ memset(env->vfp.zregs, 0, sizeof(env->vfp.zregs));
461
+ This option is only available if QEMU has been compiled with
124
+ /* Recall that FFR is stored as pregs[16]. */
462
+ the ``simple`` tracing backend.
125
+ memset(env->vfp.pregs, 0, sizeof(env->vfp.pregs));
463
diff --git a/qemu-doc.texi b/qemu-doc.texi
126
+ vfp_set_fpcr(env, 0x0800009f);
464
index XXXXXXX..XXXXXXX 100644
127
+}
465
--- a/qemu-doc.texi
128
+
466
+++ b/qemu-doc.texi
129
+void helper_set_pstate_sm(CPUARMState *env, uint32_t i)
467
@@ -XXX,XX +XXX,XX @@ encrypted disk images.
130
+{
468
* disk_images_snapshot_mode:: Snapshot mode
131
+ if (i == FIELD_EX64(env->svcr, SVCR, SM)) {
469
* vm_snapshots:: VM snapshots
132
+ return;
470
* qemu_img_invocation:: qemu-img Invocation
133
+ }
471
-* qemu_nbd_invocation:: qemu-nbd Invocation
134
+ env->svcr ^= R_SVCR_SM_MASK;
472
* disk_images_formats:: Disk image file formats
135
+ arm_reset_sve_state(env);
473
* host_drives:: Using host drives
136
+}
474
* disk_images_fat_images:: Virtual FAT disk images
137
+
475
@@ -XXX,XX +XXX,XX @@ state is not saved or restored properly (in particular USB).
138
+void helper_set_pstate_za(CPUARMState *env, uint32_t i)
476
139
+{
477
@include qemu-img.texi
140
+ if (i == FIELD_EX64(env->svcr, SVCR, ZA)) {
478
141
+ return;
479
-@node qemu_nbd_invocation
142
+ }
480
-@subsection @code{qemu-nbd} Invocation
143
+ env->svcr ^= R_SVCR_ZA_MASK;
481
-
144
+
482
-@include qemu-nbd.texi
145
+ /*
483
-
146
+ * ResetSMEState.
484
@include docs/qemu-block-drivers.texi
147
+ *
485
148
+ * SetPSTATE_ZA zeros on enable and disable. We can zero this only
486
@node pcsys_network
149
+ * on enable: while disabled, the storage is inaccessible and the
487
diff --git a/qemu-nbd.texi b/qemu-nbd.texi
150
+ * value does not matter. We're not saving the storage in vmstate
488
deleted file mode 100644
151
+ * when disabled either.
489
index XXXXXXX..XXXXXXX
152
+ */
490
--- a/qemu-nbd.texi
153
+ if (i) {
491
+++ /dev/null
154
+ memset(env->zarray, 0, sizeof(env->zarray));
492
@@ -XXX,XX +XXX,XX @@
155
+ }
493
-@example
156
+}
494
-@c man begin SYNOPSIS
157
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
495
-@command{qemu-nbd} [OPTION]... @var{filename}
158
index XXXXXXX..XXXXXXX 100644
496
-
159
--- a/target/arm/translate-a64.c
497
-@command{qemu-nbd} @option{-L} [OPTION]...
160
+++ b/target/arm/translate-a64.c
498
-
161
@@ -XXX,XX +XXX,XX @@ static void handle_msr_i(DisasContext *s, uint32_t insn,
499
-@command{qemu-nbd} @option{-d} @var{dev}
162
}
500
-@c man end
163
break;
501
-@end example
164
502
-
165
+ case 0x1b: /* SVCR* */
503
-@c man begin DESCRIPTION
166
+ if (!dc_isar_feature(aa64_sme, s) || crm < 2 || crm > 7) {
504
-
167
+ goto do_unallocated;
505
-Export a QEMU disk image using the NBD protocol.
168
+ }
506
-
169
+ if (sme_access_check(s)) {
507
-Other uses:
170
+ bool i = crm & 1;
508
-@itemize
171
+ bool changed = false;
509
-@item
172
+
510
-Bind a /dev/nbdX block device to a QEMU server (on Linux).
173
+ if ((crm & 2) && i != s->pstate_sm) {
511
-@item
174
+ gen_helper_set_pstate_sm(cpu_env, tcg_constant_i32(i));
512
-As a client to query exports of a remote NBD server.
175
+ changed = true;
513
-@end itemize
176
+ }
514
-
177
+ if ((crm & 4) && i != s->pstate_za) {
515
-@c man end
178
+ gen_helper_set_pstate_za(cpu_env, tcg_constant_i32(i));
516
-
179
+ changed = true;
517
-@c man begin OPTIONS
180
+ }
518
-@var{filename} is a disk image filename, or a set of block
181
+ if (changed) {
519
-driver options if @option{--image-opts} is specified.
182
+ gen_rebuild_hflags(s);
520
-
183
+ } else {
521
-@var{dev} is an NBD device.
184
+ s->base.is_jmp = DISAS_NEXT;
522
-
185
+ }
523
-@table @option
186
+ }
524
-@item --object type,id=@var{id},...props...
187
+ break;
525
-Define a new instance of the @var{type} object class identified by @var{id}.
188
+
526
-See the @code{qemu(1)} manual page for full details of the properties
189
default:
527
-supported. The common object types that it makes sense to define are the
190
do_unallocated:
528
-@code{secret} object, which is used to supply passwords and/or encryption
191
unallocated_encoding(s);
529
-keys, and the @code{tls-creds} object, which is used to supply TLS
192
diff --git a/target/arm/meson.build b/target/arm/meson.build
530
-credentials for the qemu-nbd server or client.
193
index XXXXXXX..XXXXXXX 100644
531
-@item -p, --port=@var{port}
194
--- a/target/arm/meson.build
532
-The TCP port to listen on as a server, or connect to as a client
195
+++ b/target/arm/meson.build
533
-(default @samp{10809}).
196
@@ -XXX,XX +XXX,XX @@ arm_ss.add(when: 'TARGET_AARCH64', if_true: files(
534
-@item -o, --offset=@var{offset}
197
'mte_helper.c',
535
-The offset into the image.
198
'pauth_helper.c',
536
-@item -b, --bind=@var{iface}
199
'sve_helper.c',
537
-The interface to bind to as a server, or connect to as a client
200
+ 'sme_helper.c',
538
-(default @samp{0.0.0.0}).
201
'translate-a64.c',
539
-@item -k, --socket=@var{path}
202
'translate-sve.c',
540
-Use a unix socket with path @var{path}.
203
))
541
-@item --image-opts
542
-Treat @var{filename} as a set of image options, instead of a plain
543
-filename. If this flag is specified, the @var{-f} flag should
544
-not be used, instead the '@code{format=}' option should be set.
545
-@item -f, --format=@var{fmt}
546
-Force the use of the block driver for format @var{fmt} instead of
547
-auto-detecting.
548
-@item -r, --read-only
549
-Export the disk as read-only.
550
-@item -P, --partition=@var{num}
551
-Deprecated: Only expose MBR partition @var{num}. Understands physical
552
-partitions 1-4 and logical partition 5. New code should instead use
553
-@option{--image-opts} with the raw driver wrapping a subset of the
554
-original image.
555
-@item -B, --bitmap=@var{name}
556
-If @var{filename} has a qcow2 persistent bitmap @var{name}, expose
557
-that bitmap via the ``qemu:dirty-bitmap:@var{name}'' context
558
-accessible through NBD_OPT_SET_META_CONTEXT.
559
-@item -s, --snapshot
560
-Use @var{filename} as an external snapshot, create a temporary
561
-file with backing_file=@var{filename}, redirect the write to
562
-the temporary one.
563
-@item -l, --load-snapshot=@var{snapshot_param}
564
-Load an internal snapshot inside @var{filename} and export it
565
-as an read-only device, @var{snapshot_param} format is
566
-'snapshot.id=[ID],snapshot.name=[NAME]' or '[ID_OR_NAME]'
567
-@item -n, --nocache
568
-@itemx --cache=@var{cache}
569
-The cache mode to be used with the file. See the documentation of
570
-the emulator's @code{-drive cache=...} option for allowed values.
571
-@item --aio=@var{aio}
572
-Set the asynchronous I/O mode between @samp{threads} (the default)
573
-and @samp{native} (Linux only).
574
-@item --discard=@var{discard}
575
-Control whether @dfn{discard} (also known as @dfn{trim} or @dfn{unmap})
576
-requests are ignored or passed to the filesystem. @var{discard} is one of
577
-@samp{ignore} (or @samp{off}), @samp{unmap} (or @samp{on}). The default is
578
-@samp{ignore}.
579
-@item --detect-zeroes=@var{detect-zeroes}
580
-Control the automatic conversion of plain zero writes by the OS to
581
-driver-specific optimized zero write commands. @var{detect-zeroes} is one of
582
-@samp{off}, @samp{on} or @samp{unmap}. @samp{unmap}
583
-converts a zero write to an unmap operation and can only be used if
584
-@var{discard} is set to @samp{unmap}. The default is @samp{off}.
585
-@item -c, --connect=@var{dev}
586
-Connect @var{filename} to NBD device @var{dev} (Linux only).
587
-@item -d, --disconnect
588
-Disconnect the device @var{dev} (Linux only).
589
-@item -e, --shared=@var{num}
590
-Allow up to @var{num} clients to share the device (default
591
-@samp{1}). Safe for readers, but for now, consistency is not
592
-guaranteed between multiple writers.
593
-@item -t, --persistent
594
-Don't exit on the last connection.
595
-@item -x, --export-name=@var{name}
596
-Set the NBD volume export name (default of a zero-length string).
597
-@item -D, --description=@var{description}
598
-Set the NBD volume export description, as a human-readable
599
-string.
600
-@item -L, --list
601
-Connect as a client and list all details about the exports exposed by
602
-a remote NBD server. This enables list mode, and is incompatible
603
-with options that change behavior related to a specific export (such as
604
-@option{--export-name}, @option{--offset}, ...).
605
-@item --tls-creds=ID
606
-Enable mandatory TLS encryption for the server by setting the ID
607
-of the TLS credentials object previously created with the --object
608
-option; or provide the credentials needed for connecting as a client
609
-in list mode.
610
-@item --fork
611
-Fork off the server process and exit the parent once the server is running.
612
-@item --pid-file=PATH
613
-Store the server's process ID in the given file.
614
-@item --tls-authz=ID
615
-Specify the ID of a qauthz object previously created with the
616
---object option. This will be used to authorize connecting users
617
-against their x509 distinguished name.
618
-@item -v, --verbose
619
-Display extra debugging information.
620
-@item -h, --help
621
-Display this help and exit.
622
-@item -V, --version
623
-Display version information and exit.
624
-@item -T, --trace [[enable=]@var{pattern}][,events=@var{file}][,file=@var{file}]
625
-@findex --trace
626
-@include qemu-option-trace.texi
627
-@end table
628
-
629
-@c man end
630
-
631
-@c man begin EXAMPLES
632
-Start a server listening on port 10809 that exposes only the
633
-guest-visible contents of a qcow2 file, with no TLS encryption, and
634
-with the default export name (an empty string). The command is
635
-one-shot, and will block until the first successful client
636
-disconnects:
637
-
638
-@example
639
-qemu-nbd -f qcow2 file.qcow2
640
-@end example
641
-
642
-Start a long-running server listening with encryption on port 10810,
643
-and whitelist clients with a specific X.509 certificate to connect to
644
-a 1 megabyte subset of a raw file, using the export name 'subset':
645
-
646
-@example
647
-qemu-nbd \
648
- --object tls-creds-x509,id=tls0,endpoint=server,dir=/path/to/qemutls \
649
- --object 'authz-simple,id=auth0,identity=CN=laptop.example.com,,\
650
- O=Example Org,,L=London,,ST=London,,C=GB' \
651
- --tls-creds tls0 --tls-authz auth0 \
652
- -t -x subset -p 10810 \
653
- --image-opts driver=raw,offset=1M,size=1M,file.driver=file,file.filename=file.raw
654
-@end example
655
-
656
-Serve a read-only copy of just the first MBR partition of a guest
657
-image over a Unix socket with as many as 5 simultaneous readers, with
658
-a persistent process forked as a daemon:
659
-
660
-@example
661
-qemu-nbd --fork --persistent --shared=5 --socket=/path/to/sock \
662
- --partition=1 --read-only --format=qcow2 file.qcow2
663
-@end example
664
-
665
-Expose the guest-visible contents of a qcow2 file via a block device
666
-/dev/nbd0 (and possibly creating /dev/nbd0p1 and friends for
667
-partitions found within), then disconnect the device when done.
668
-Access to bind qemu-nbd to an /dev/nbd device generally requires root
669
-privileges, and may also require the execution of @code{modprobe nbd}
670
-to enable the kernel NBD client module. @emph{CAUTION}: Do not use
671
-this method to mount filesystems from an untrusted guest image - a
672
-malicious guest may have prepared the image to attempt to trigger
673
-kernel bugs in partition probing or file system mounting.
674
-
675
-@example
676
-qemu-nbd -c /dev/nbd0 -f qcow2 file.qcow2
677
-qemu-nbd -d /dev/nbd0
678
-@end example
679
-
680
-Query a remote server to see details about what export(s) it is
681
-serving on port 10809, and authenticating via PSK:
682
-
683
-@example
684
-qemu-nbd \
685
- --object tls-creds-psk,id=tls0,dir=/tmp/keys,username=eblake,endpoint=client \
686
- --tls-creds tls0 -L -b remote.example.com
687
-@end example
688
-
689
-@c man end
690
-
691
-@ignore
692
-
693
-@setfilename qemu-nbd
694
-@settitle QEMU Disk Network Block Device Server
695
-
696
-@c man begin AUTHOR
697
-Copyright (C) 2006 Anthony Liguori <anthony@codemonkey.ws>.
698
-This is free software; see the source for copying conditions. There is NO
699
-warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
700
-@c man end
701
-
702
-@c man begin SEEALSO
703
-qemu(1), qemu-img(1)
704
-@c man end
705
-
706
-@end ignore
707
diff --git a/qemu-option-trace.texi b/qemu-option-trace.texi
708
index XXXXXXX..XXXXXXX 100644
709
--- a/qemu-option-trace.texi
710
+++ b/qemu-option-trace.texi
711
@@ -XXX,XX +XXX,XX @@
712
+@c The contents of this file must be kept in sync with qemu-option-trace.rst.inc
713
+@c until all the users of the texi file have been converted to rst and
714
+@c the texi file can be removed.
715
+
716
Specify tracing options.
717
718
@table @option
719
--
204
--
720
2.20.1
205
2.25.1
721
722
diff view generated by jsdifflib
1
We want a user-facing manual which contains system emulation
1
From: Richard Henderson <richard.henderson@linaro.org>
2
documentation. Create an empty one which we can populate.
3
2
3
Keep all of the error messages together. This does mean that
4
when setting many sve length properties we'll only generate
5
one error, but we only really need one.
6
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20220620175235.60881-12-richard.henderson@linaro.org
4
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
5
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
6
Acked-by: Stefan Hajnoczi <stefanha@redhat.com>
7
Message-id: 20200116141511.16849-3-peter.maydell@linaro.org
8
---
11
---
9
Makefile | 10 +++++++++-
12
target/arm/cpu64.c | 15 +++++++--------
10
docs/index.html.in | 1 +
13
1 file changed, 7 insertions(+), 8 deletions(-)
11
docs/system/conf.py | 15 +++++++++++++++
12
docs/system/index.rst | 16 ++++++++++++++++
13
4 files changed, 41 insertions(+), 1 deletion(-)
14
create mode 100644 docs/system/conf.py
15
create mode 100644 docs/system/index.rst
16
14
17
diff --git a/Makefile b/Makefile
15
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
18
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
19
--- a/Makefile
17
--- a/target/arm/cpu64.c
20
+++ b/Makefile
18
+++ b/target/arm/cpu64.c
21
@@ -XXX,XX +XXX,XX @@ distclean: clean
19
@@ -XXX,XX +XXX,XX @@ void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp)
22
    $(call clean-manual,devel)
20
"using only sve<N> properties.\n");
23
    $(call clean-manual,interop)
21
} else {
24
    $(call clean-manual,specs)
22
error_setg(errp, "cannot enable sve%d", vq * 128);
25
+    $(call clean-manual,system)
23
- error_append_hint(errp, "This CPU does not support "
26
    for d in $(TARGET_DIRS); do \
24
- "the vector length %d-bits.\n", vq * 128);
27
    rm -rf $$d || exit 1 ; \
25
+ if (vq_supported) {
28
done
26
+ error_append_hint(errp, "This CPU does not support "
29
@@ -XXX,XX +XXX,XX @@ endef
27
+ "the vector length %d-bits.\n", vq * 128);
30
install-sphinxdocs: sphinxdocs
28
+ } else {
31
    $(call install-manual,interop)
29
+ error_append_hint(errp, "SVE not supported by KVM "
32
    $(call install-manual,specs)
30
+ "on this host\n");
33
+    $(call install-manual,system)
31
+ }
34
32
}
35
install-doc: $(DOCS) install-sphinxdocs
33
return;
36
    $(INSTALL_DIR) "$(DESTDIR)$(qemu_docdir)"
34
} else {
37
@@ -XXX,XX +XXX,XX @@ docs/version.texi: $(SRC_PATH)/VERSION config-host.mak
35
@@ -XXX,XX +XXX,XX @@ static void cpu_arm_set_sve_vq(Object *obj, Visitor *v, const char *name,
38
# and handles "don't rebuild things unless necessary" itself.
36
return;
39
# The '.doctrees' files are cached information to speed this up.
37
}
40
.PHONY: sphinxdocs
38
41
-sphinxdocs: $(MANUAL_BUILDDIR)/devel/index.html $(MANUAL_BUILDDIR)/interop/index.html $(MANUAL_BUILDDIR)/specs/index.html
39
- if (value && kvm_enabled() && !kvm_arm_sve_supported()) {
42
+sphinxdocs: $(MANUAL_BUILDDIR)/devel/index.html \
40
- error_setg(errp, "cannot enable %s", name);
43
+ $(MANUAL_BUILDDIR)/interop/index.html \
41
- error_append_hint(errp, "SVE not supported by KVM on this host\n");
44
+ $(MANUAL_BUILDDIR)/specs/index.html \
42
- return;
45
+ $(MANUAL_BUILDDIR)/system/index.html
43
- }
46
44
-
47
# Canned command to build a single manual
45
cpu->sve_vq_map = deposit32(cpu->sve_vq_map, vq - 1, 1, value);
48
# Arguments: $1 = manual name, $2 = Sphinx builder ('html' or 'man')
46
cpu->sve_vq_init |= 1 << (vq - 1);
49
@@ -XXX,XX +XXX,XX @@ $(MANUAL_BUILDDIR)/interop/index.html: $(call manual-deps,interop)
47
}
50
$(MANUAL_BUILDDIR)/specs/index.html: $(call manual-deps,specs)
51
    $(call build-manual,specs,html)
52
53
+$(MANUAL_BUILDDIR)/system/index.html: $(call manual-deps,system)
54
+    $(call build-manual,system,html)
55
+
56
$(MANUAL_BUILDDIR)/interop/qemu-ga.8: $(call manual-deps,interop)
57
    $(call build-manual,interop,man)
58
59
diff --git a/docs/index.html.in b/docs/index.html.in
60
index XXXXXXX..XXXXXXX 100644
61
--- a/docs/index.html.in
62
+++ b/docs/index.html.in
63
@@ -XXX,XX +XXX,XX @@
64
<li><a href="qemu-ga-ref.html">Guest Agent Protocol Reference</a></li>
65
<li><a href="interop/index.html">System Emulation Management and Interoperability Guide</a></li>
66
<li><a href="specs/index.html">System Emulation Guest Hardware Specifications</a></li>
67
+ <li><a href="system/index.html">System Emulation User's Guide</a></li>
68
</ul>
69
</body>
70
</html>
71
diff --git a/docs/system/conf.py b/docs/system/conf.py
72
new file mode 100644
73
index XXXXXXX..XXXXXXX
74
--- /dev/null
75
+++ b/docs/system/conf.py
76
@@ -XXX,XX +XXX,XX @@
77
+# -*- coding: utf-8 -*-
78
+#
79
+# QEMU documentation build configuration file for the 'system' manual.
80
+#
81
+# This includes the top level conf file and then makes any necessary tweaks.
82
+import sys
83
+import os
84
+
85
+qemu_docdir = os.path.abspath("..")
86
+parent_config = os.path.join(qemu_docdir, "conf.py")
87
+exec(compile(open(parent_config, "rb").read(), parent_config, 'exec'))
88
+
89
+# This slightly misuses the 'description', but is the best way to get
90
+# the manual title to appear in the sidebar.
91
+html_theme_options['description'] = u'System Emulation User''s Guide'
92
diff --git a/docs/system/index.rst b/docs/system/index.rst
93
new file mode 100644
94
index XXXXXXX..XXXXXXX
95
--- /dev/null
96
+++ b/docs/system/index.rst
97
@@ -XXX,XX +XXX,XX @@
98
+.. This is the top level page for the 'system' manual.
99
+
100
+
101
+QEMU System Emulation User's Guide
102
+==================================
103
+
104
+This manual is the overall guide for users using QEMU
105
+for full system emulation (as opposed to user-mode emulation).
106
+This includes working with hypervisors such as KVM, Xen, Hax
107
+or Hypervisor.Framework.
108
+
109
+Contents:
110
+
111
+.. toctree::
112
+ :maxdepth: 2
113
+
114
--
48
--
115
2.20.1
49
2.25.1
116
117
diff view generated by jsdifflib
1
From: Andrew Jones <drjones@redhat.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
When dumping a guest with dump-guest-memory also dump the SVE
3
Pull the three sve_vq_* values into a structure.
4
registers if they are in use.
4
This will be reused for SME.
5
5
6
Signed-off-by: Andrew Jones <drjones@redhat.com>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20200120101832.18781-1-drjones@redhat.com
8
Message-id: 20220620175235.60881-13-richard.henderson@linaro.org
9
[PMM: fixed checkpatch nits]
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
10
---
12
include/elf.h | 1 +
11
target/arm/cpu.h | 29 ++++++++++++++---------------
13
target/arm/cpu.h | 25 +++++++++
12
target/arm/cpu64.c | 22 +++++++++++-----------
14
target/arm/arch_dump.c | 124 ++++++++++++++++++++++++++++++++++++++++-
13
target/arm/helper.c | 2 +-
15
target/arm/kvm64.c | 24 --------
14
target/arm/kvm64.c | 2 +-
16
4 files changed, 148 insertions(+), 26 deletions(-)
15
4 files changed, 27 insertions(+), 28 deletions(-)
17
16
18
diff --git a/include/elf.h b/include/elf.h
19
index XXXXXXX..XXXXXXX 100644
20
--- a/include/elf.h
21
+++ b/include/elf.h
22
@@ -XXX,XX +XXX,XX @@ typedef struct elf64_shdr {
23
#define NT_ARM_HW_BREAK 0x402 /* ARM hardware breakpoint registers */
24
#define NT_ARM_HW_WATCH 0x403 /* ARM hardware watchpoint registers */
25
#define NT_ARM_SYSTEM_CALL 0x404 /* ARM system call number */
26
+#define NT_ARM_SVE 0x405 /* ARM Scalable Vector Extension regs */
27
28
/*
29
* Physical entry point into the kernel.
30
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
17
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
31
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
32
--- a/target/arm/cpu.h
19
--- a/target/arm/cpu.h
33
+++ b/target/arm/cpu.h
20
+++ b/target/arm/cpu.h
34
@@ -XXX,XX +XXX,XX @@ void aarch64_sve_narrow_vq(CPUARMState *env, unsigned vq);
21
@@ -XXX,XX +XXX,XX @@ typedef enum ARMPSCIState {
35
void aarch64_sve_change_el(CPUARMState *env, int old_el,
22
36
int new_el, bool el0_a64);
23
typedef struct ARMISARegisters ARMISARegisters;
37
void aarch64_add_sve_properties(Object *obj);
24
25
+/*
26
+ * In map, each set bit is a supported vector length of (bit-number + 1) * 16
27
+ * bytes, i.e. each bit number + 1 is the vector length in quadwords.
28
+ *
29
+ * While processing properties during initialization, corresponding init bits
30
+ * are set for bits in sve_vq_map that have been set by properties.
31
+ *
32
+ * Bits set in supported represent valid vector lengths for the CPU type.
33
+ */
34
+typedef struct {
35
+ uint32_t map, init, supported;
36
+} ARMVQMap;
38
+
37
+
39
+/*
38
/**
40
+ * SVE registers are encoded in KVM's memory in an endianness-invariant format.
39
* ARMCPU:
41
+ * The byte at offset i from the start of the in-memory representation contains
40
* @env: #CPUARMState
42
+ * the bits [(7 + 8 * i) : (8 * i)] of the register value. As this means the
41
@@ -XXX,XX +XXX,XX @@ struct ArchCPU {
43
+ * lowest offsets are stored in the lowest memory addresses, then that nearly
42
uint32_t sve_default_vq;
44
+ * matches QEMU's representation, which is to use an array of host-endian
43
#endif
45
+ * uint64_t's, where the lower offsets are at the lower indices. To complete
44
46
+ * the translation we just need to byte swap the uint64_t's on big-endian hosts.
45
- /*
47
+ */
46
- * In sve_vq_map each set bit is a supported vector length of
48
+static inline uint64_t *sve_bswap64(uint64_t *dst, uint64_t *src, int nr)
47
- * (bit-number + 1) * 16 bytes, i.e. each bit number + 1 is the vector
49
+{
48
- * length in quadwords.
50
+#ifdef HOST_WORDS_BIGENDIAN
49
- *
51
+ int i;
50
- * While processing properties during initialization, corresponding
52
+
51
- * sve_vq_init bits are set for bits in sve_vq_map that have been
53
+ for (i = 0; i < nr; ++i) {
52
- * set by properties.
54
+ dst[i] = bswap64(src[i]);
53
- *
55
+ }
54
- * Bits set in sve_vq_supported represent valid vector lengths for
56
+
55
- * the CPU type.
57
+ return dst;
56
- */
58
+#else
57
- uint32_t sve_vq_map;
59
+ return src;
58
- uint32_t sve_vq_init;
60
+#endif
59
- uint32_t sve_vq_supported;
61
+}
60
+ ARMVQMap sve_vq;
62
+
61
63
#else
62
/* Generic timer counter frequency, in Hz */
64
static inline void aarch64_sve_narrow_vq(CPUARMState *env, unsigned vq) { }
63
uint64_t gt_cntfrq_hz;
65
static inline void aarch64_sve_change_el(CPUARMState *env, int o,
64
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
66
diff --git a/target/arm/arch_dump.c b/target/arm/arch_dump.c
67
index XXXXXXX..XXXXXXX 100644
65
index XXXXXXX..XXXXXXX 100644
68
--- a/target/arm/arch_dump.c
66
--- a/target/arm/cpu64.c
69
+++ b/target/arm/arch_dump.c
67
+++ b/target/arm/cpu64.c
70
@@ -XXX,XX +XXX,XX @@ struct aarch64_user_vfp_state {
68
@@ -XXX,XX +XXX,XX @@ void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp)
71
69
* any of the above. Finally, if SVE is not disabled, then at least one
72
QEMU_BUILD_BUG_ON(sizeof(struct aarch64_user_vfp_state) != 528);
70
* vector length must be enabled.
73
71
*/
74
+/* struct user_sve_header from arch/arm64/include/uapi/asm/ptrace.h */
72
- uint32_t vq_map = cpu->sve_vq_map;
75
+struct aarch64_user_sve_header {
73
- uint32_t vq_init = cpu->sve_vq_init;
76
+ uint32_t size;
74
+ uint32_t vq_map = cpu->sve_vq.map;
77
+ uint32_t max_size;
75
+ uint32_t vq_init = cpu->sve_vq.init;
78
+ uint16_t vl;
76
uint32_t vq_supported;
79
+ uint16_t max_vl;
77
uint32_t vq_mask = 0;
80
+ uint16_t flags;
78
uint32_t tmp, vq, max_vq = 0;
81
+ uint16_t reserved;
79
@@ -XXX,XX +XXX,XX @@ void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp)
82
+} QEMU_PACKED;
80
*/
83
+
81
if (kvm_enabled()) {
84
struct aarch64_note {
82
if (kvm_arm_sve_supported()) {
85
Elf64_Nhdr hdr;
83
- cpu->sve_vq_supported = kvm_arm_sve_get_vls(CPU(cpu));
86
char name[8]; /* align_up(sizeof("CORE"), 4) */
84
- vq_supported = cpu->sve_vq_supported;
87
union {
85
+ cpu->sve_vq.supported = kvm_arm_sve_get_vls(CPU(cpu));
88
struct aarch64_elf_prstatus prstatus;
86
+ vq_supported = cpu->sve_vq.supported;
89
struct aarch64_user_vfp_state vfp;
87
} else {
90
+ struct aarch64_user_sve_header sve;
88
assert(!cpu_isar_feature(aa64_sve, cpu));
91
};
89
vq_supported = 0;
92
} QEMU_PACKED;
90
}
93
91
} else {
94
@@ -XXX,XX +XXX,XX @@ struct aarch64_note {
92
- vq_supported = cpu->sve_vq_supported;
95
(AARCH64_NOTE_HEADER_SIZE + sizeof(struct aarch64_elf_prstatus))
93
+ vq_supported = cpu->sve_vq.supported;
96
#define AARCH64_PRFPREG_NOTE_SIZE \
94
}
97
(AARCH64_NOTE_HEADER_SIZE + sizeof(struct aarch64_user_vfp_state))
95
98
+#define AARCH64_SVE_NOTE_SIZE(env) \
96
/*
99
+ (AARCH64_NOTE_HEADER_SIZE + sve_size(env))
97
@@ -XXX,XX +XXX,XX @@ void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp)
100
98
101
static void aarch64_note_init(struct aarch64_note *note, DumpState *s,
99
/* From now on sve_max_vq is the actual maximum supported length. */
102
const char *name, Elf64_Word namesz,
100
cpu->sve_max_vq = max_vq;
103
@@ -XXX,XX +XXX,XX @@ static int aarch64_write_elf64_prfpreg(WriteCoreDumpFunction f,
101
- cpu->sve_vq_map = vq_map;
104
return 0;
102
+ cpu->sve_vq.map = vq_map;
105
}
103
}
106
104
107
+#ifdef TARGET_AARCH64
105
static void cpu_max_get_sve_max_vq(Object *obj, Visitor *v, const char *name,
108
+static off_t sve_zreg_offset(uint32_t vq, int n)
106
@@ -XXX,XX +XXX,XX @@ static void cpu_arm_get_sve_vq(Object *obj, Visitor *v, const char *name,
109
+{
107
if (!cpu_isar_feature(aa64_sve, cpu)) {
110
+ off_t off = sizeof(struct aarch64_user_sve_header);
108
value = false;
111
+ return ROUND_UP(off, 16) + vq * 16 * n;
109
} else {
112
+}
110
- value = extract32(cpu->sve_vq_map, vq - 1, 1);
113
+
111
+ value = extract32(cpu->sve_vq.map, vq - 1, 1);
114
+static off_t sve_preg_offset(uint32_t vq, int n)
115
+{
116
+ return sve_zreg_offset(vq, 32) + vq * 16 / 8 * n;
117
+}
118
+
119
+static off_t sve_fpsr_offset(uint32_t vq)
120
+{
121
+ off_t off = sve_preg_offset(vq, 17);
122
+ return ROUND_UP(off, 16);
123
+}
124
+
125
+static off_t sve_fpcr_offset(uint32_t vq)
126
+{
127
+ return sve_fpsr_offset(vq) + sizeof(uint32_t);
128
+}
129
+
130
+static uint32_t sve_current_vq(CPUARMState *env)
131
+{
132
+ return sve_zcr_len_for_el(env, arm_current_el(env)) + 1;
133
+}
134
+
135
+static size_t sve_size_vq(uint32_t vq)
136
+{
137
+ off_t off = sve_fpcr_offset(vq) + sizeof(uint32_t);
138
+ return ROUND_UP(off, 16);
139
+}
140
+
141
+static size_t sve_size(CPUARMState *env)
142
+{
143
+ return sve_size_vq(sve_current_vq(env));
144
+}
145
+
146
+static int aarch64_write_elf64_sve(WriteCoreDumpFunction f,
147
+ CPUARMState *env, int cpuid,
148
+ DumpState *s)
149
+{
150
+ struct aarch64_note *note;
151
+ ARMCPU *cpu = env_archcpu(env);
152
+ uint32_t vq = sve_current_vq(env);
153
+ uint64_t tmp[ARM_MAX_VQ * 2], *r;
154
+ uint32_t fpr;
155
+ uint8_t *buf;
156
+ int ret, i;
157
+
158
+ note = g_malloc0(AARCH64_SVE_NOTE_SIZE(env));
159
+ buf = (uint8_t *)&note->sve;
160
+
161
+ aarch64_note_init(note, s, "LINUX", 6, NT_ARM_SVE, sve_size_vq(vq));
162
+
163
+ note->sve.size = cpu_to_dump32(s, sve_size_vq(vq));
164
+ note->sve.max_size = cpu_to_dump32(s, sve_size_vq(cpu->sve_max_vq));
165
+ note->sve.vl = cpu_to_dump16(s, vq * 16);
166
+ note->sve.max_vl = cpu_to_dump16(s, cpu->sve_max_vq * 16);
167
+ note->sve.flags = cpu_to_dump16(s, 1);
168
+
169
+ for (i = 0; i < 32; ++i) {
170
+ r = sve_bswap64(tmp, &env->vfp.zregs[i].d[0], vq * 2);
171
+ memcpy(&buf[sve_zreg_offset(vq, i)], r, vq * 16);
172
+ }
173
+
174
+ for (i = 0; i < 17; ++i) {
175
+ r = sve_bswap64(tmp, r = &env->vfp.pregs[i].p[0],
176
+ DIV_ROUND_UP(vq * 2, 8));
177
+ memcpy(&buf[sve_preg_offset(vq, i)], r, vq * 16 / 8);
178
+ }
179
+
180
+ fpr = cpu_to_dump32(s, vfp_get_fpsr(env));
181
+ memcpy(&buf[sve_fpsr_offset(vq)], &fpr, sizeof(uint32_t));
182
+
183
+ fpr = cpu_to_dump32(s, vfp_get_fpcr(env));
184
+ memcpy(&buf[sve_fpcr_offset(vq)], &fpr, sizeof(uint32_t));
185
+
186
+ ret = f(note, AARCH64_SVE_NOTE_SIZE(env), s);
187
+ g_free(note);
188
+
189
+ if (ret < 0) {
190
+ return -1;
191
+ }
192
+
193
+ return 0;
194
+}
195
+#endif
196
+
197
int arm_cpu_write_elf64_note(WriteCoreDumpFunction f, CPUState *cs,
198
int cpuid, void *opaque)
199
{
200
struct aarch64_note note;
201
- CPUARMState *env = &ARM_CPU(cs)->env;
202
+ ARMCPU *cpu = ARM_CPU(cs);
203
+ CPUARMState *env = &cpu->env;
204
DumpState *s = opaque;
205
uint64_t pstate, sp;
206
int ret, i;
207
@@ -XXX,XX +XXX,XX @@ int arm_cpu_write_elf64_note(WriteCoreDumpFunction f, CPUState *cs,
208
return -1;
209
}
112
}
210
113
visit_type_bool(v, name, &value, errp);
211
- return aarch64_write_elf64_prfpreg(f, env, cpuid, s);
212
+ ret = aarch64_write_elf64_prfpreg(f, env, cpuid, s);
213
+ if (ret) {
214
+ return ret;
215
+ }
216
+
217
+#ifdef TARGET_AARCH64
218
+ if (cpu_isar_feature(aa64_sve, cpu)) {
219
+ ret = aarch64_write_elf64_sve(f, env, cpuid, s);
220
+ }
221
+#endif
222
+
223
+ return ret;
224
}
114
}
225
115
@@ -XXX,XX +XXX,XX @@ static void cpu_arm_set_sve_vq(Object *obj, Visitor *v, const char *name,
226
/* struct pt_regs from arch/arm/include/asm/ptrace.h */
116
return;
227
@@ -XXX,XX +XXX,XX @@ ssize_t cpu_get_note_size(int class, int machine, int nr_cpus)
117
}
228
if (class == ELFCLASS64) {
118
229
note_size = AARCH64_PRSTATUS_NOTE_SIZE;
119
- cpu->sve_vq_map = deposit32(cpu->sve_vq_map, vq - 1, 1, value);
230
note_size += AARCH64_PRFPREG_NOTE_SIZE;
120
- cpu->sve_vq_init |= 1 << (vq - 1);
231
+#ifdef TARGET_AARCH64
121
+ cpu->sve_vq.map = deposit32(cpu->sve_vq.map, vq - 1, 1, value);
232
+ if (cpu_isar_feature(aa64_sve, cpu)) {
122
+ cpu->sve_vq.init |= 1 << (vq - 1);
233
+ note_size += AARCH64_SVE_NOTE_SIZE(env);
123
}
234
+ }
124
235
+#endif
125
static bool cpu_arm_get_sve(Object *obj, Error **errp)
236
} else {
126
@@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj)
237
note_size = ARM_PRSTATUS_NOTE_SIZE;
127
cpu->dcz_blocksize = 7; /* 512 bytes */
238
if (arm_feature(env, ARM_FEATURE_VFP)) {
128
#endif
129
130
- cpu->sve_vq_supported = MAKE_64BIT_MASK(0, ARM_MAX_VQ);
131
+ cpu->sve_vq.supported = MAKE_64BIT_MASK(0, ARM_MAX_VQ);
132
133
aarch64_add_pauth_properties(obj);
134
aarch64_add_sve_properties(obj);
135
@@ -XXX,XX +XXX,XX @@ static void aarch64_a64fx_initfn(Object *obj)
136
137
/* The A64FX supports only 128, 256 and 512 bit vector lengths */
138
aarch64_add_sve_properties(obj);
139
- cpu->sve_vq_supported = (1 << 0) /* 128bit */
140
+ cpu->sve_vq.supported = (1 << 0) /* 128bit */
141
| (1 << 1) /* 256bit */
142
| (1 << 3); /* 512bit */
143
144
diff --git a/target/arm/helper.c b/target/arm/helper.c
145
index XXXXXXX..XXXXXXX 100644
146
--- a/target/arm/helper.c
147
+++ b/target/arm/helper.c
148
@@ -XXX,XX +XXX,XX @@ uint32_t sve_vqm1_for_el(CPUARMState *env, int el)
149
len = MIN(len, 0xf & (uint32_t)env->vfp.zcr_el[3]);
150
}
151
152
- len = 31 - clz32(cpu->sve_vq_map & MAKE_64BIT_MASK(0, len + 1));
153
+ len = 31 - clz32(cpu->sve_vq.map & MAKE_64BIT_MASK(0, len + 1));
154
return len;
155
}
156
239
diff --git a/target/arm/kvm64.c b/target/arm/kvm64.c
157
diff --git a/target/arm/kvm64.c b/target/arm/kvm64.c
240
index XXXXXXX..XXXXXXX 100644
158
index XXXXXXX..XXXXXXX 100644
241
--- a/target/arm/kvm64.c
159
--- a/target/arm/kvm64.c
242
+++ b/target/arm/kvm64.c
160
+++ b/target/arm/kvm64.c
243
@@ -XXX,XX +XXX,XX @@ static int kvm_arch_put_fpsimd(CPUState *cs)
161
@@ -XXX,XX +XXX,XX @@ uint32_t kvm_arm_sve_get_vls(CPUState *cs)
244
return 0;
162
static int kvm_arm_sve_set_vls(CPUState *cs)
245
}
163
{
246
164
ARMCPU *cpu = ARM_CPU(cs);
247
-/*
165
- uint64_t vls[KVM_ARM64_SVE_VLS_WORDS] = { cpu->sve_vq_map };
248
- * SVE registers are encoded in KVM's memory in an endianness-invariant format.
166
+ uint64_t vls[KVM_ARM64_SVE_VLS_WORDS] = { cpu->sve_vq.map };
249
- * The byte at offset i from the start of the in-memory representation contains
167
struct kvm_one_reg reg = {
250
- * the bits [(7 + 8 * i) : (8 * i)] of the register value. As this means the
168
.id = KVM_REG_ARM64_SVE_VLS,
251
- * lowest offsets are stored in the lowest memory addresses, then that nearly
169
.addr = (uint64_t)&vls[0],
252
- * matches QEMU's representation, which is to use an array of host-endian
253
- * uint64_t's, where the lower offsets are at the lower indices. To complete
254
- * the translation we just need to byte swap the uint64_t's on big-endian hosts.
255
- */
256
-static uint64_t *sve_bswap64(uint64_t *dst, uint64_t *src, int nr)
257
-{
258
-#ifdef HOST_WORDS_BIGENDIAN
259
- int i;
260
-
261
- for (i = 0; i < nr; ++i) {
262
- dst[i] = bswap64(src[i]);
263
- }
264
-
265
- return dst;
266
-#else
267
- return src;
268
-#endif
269
-}
270
-
271
/*
272
* KVM SVE registers come in slices where ZREGs have a slice size of 2048 bits
273
* and PREGS and the FFR have a slice size of 256 bits. However we simply hard
274
--
170
--
275
2.20.1
171
2.25.1
276
277
diff view generated by jsdifflib
1
From: Guenter Roeck <linux@roeck-us.net>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
The Exynos4210 serial driver uses an interrupt line to signal if receive
3
Rename from cpu_arm_{get,set}_sve_vq, and take the
4
data is available. Connect that interrupt with the DMA controller's
4
ARMVQMap as the opaque parameter.
5
'peripheral busy' gpio pin to stop the DMA if there is no more receive
6
data available. Without this patch, receive DMA runs wild and fills the
7
entire receive DMA buffer with invalid data.
8
5
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Guenter Roeck <linux@roeck-us.net>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
11
Message-id: 20200123052540.6132-9-linux@roeck-us.net
8
Message-id: 20220620175235.60881-14-richard.henderson@linaro.org
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
---
10
---
14
hw/arm/exynos4210.c | 42 +++++++++++++++++++++++++++++-------------
11
target/arm/cpu64.c | 29 +++++++++++++++--------------
15
1 file changed, 29 insertions(+), 13 deletions(-)
12
1 file changed, 15 insertions(+), 14 deletions(-)
16
13
17
diff --git a/hw/arm/exynos4210.c b/hw/arm/exynos4210.c
14
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
18
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
19
--- a/hw/arm/exynos4210.c
16
--- a/target/arm/cpu64.c
20
+++ b/hw/arm/exynos4210.c
17
+++ b/target/arm/cpu64.c
21
@@ -XXX,XX +XXX,XX @@ static uint64_t exynos4210_calc_affinity(int cpu)
18
@@ -XXX,XX +XXX,XX @@ static void cpu_max_set_sve_max_vq(Object *obj, Visitor *v, const char *name,
22
return (0x9 << ARM_AFF1_SHIFT) | cpu;
23
}
19
}
24
20
25
-static void pl330_create(uint32_t base, qemu_or_irq *orgate, qemu_irq irq,
21
/*
26
- int nreq, int nevents, int width)
22
- * Note that cpu_arm_get/set_sve_vq cannot use the simpler
27
+static DeviceState *pl330_create(uint32_t base, qemu_or_irq *orgate,
23
- * object_property_add_bool interface because they make use
28
+ qemu_irq irq, int nreq, int nevents, int width)
24
- * of the contents of "name" to determine which bit on which
25
- * to operate.
26
+ * Note that cpu_arm_{get,set}_vq cannot use the simpler
27
+ * object_property_add_bool interface because they make use of the
28
+ * contents of "name" to determine which bit on which to operate.
29
*/
30
-static void cpu_arm_get_sve_vq(Object *obj, Visitor *v, const char *name,
31
- void *opaque, Error **errp)
32
+static void cpu_arm_get_vq(Object *obj, Visitor *v, const char *name,
33
+ void *opaque, Error **errp)
29
{
34
{
30
SysBusDevice *busdev;
35
ARMCPU *cpu = ARM_CPU(obj);
31
DeviceState *dev;
36
+ ARMVQMap *vq_map = opaque;
32
@@ -XXX,XX +XXX,XX @@ static void pl330_create(uint32_t base, qemu_or_irq *orgate, qemu_irq irq,
37
uint32_t vq = atoi(&name[3]) / 128;
33
sysbus_connect_irq(busdev, i, qdev_get_gpio_in(DEVICE(orgate), i));
38
bool value;
39
40
@@ -XXX,XX +XXX,XX @@ static void cpu_arm_get_sve_vq(Object *obj, Visitor *v, const char *name,
41
if (!cpu_isar_feature(aa64_sve, cpu)) {
42
value = false;
43
} else {
44
- value = extract32(cpu->sve_vq.map, vq - 1, 1);
45
+ value = extract32(vq_map->map, vq - 1, 1);
34
}
46
}
35
qdev_connect_gpio_out(DEVICE(orgate), 0, irq);
47
visit_type_bool(v, name, &value, errp);
36
+ return dev;
37
}
48
}
38
49
39
static void exynos4210_realize(DeviceState *socdev, Error **errp)
50
-static void cpu_arm_set_sve_vq(Object *obj, Visitor *v, const char *name,
40
@@ -XXX,XX +XXX,XX @@ static void exynos4210_realize(DeviceState *socdev, Error **errp)
51
- void *opaque, Error **errp)
41
MemoryRegion *system_mem = get_system_memory();
52
+static void cpu_arm_set_vq(Object *obj, Visitor *v, const char *name,
42
qemu_irq gate_irq[EXYNOS4210_NCPUS][EXYNOS4210_IRQ_GATE_NINPUTS];
53
+ void *opaque, Error **errp)
43
SysBusDevice *busdev;
54
{
44
- DeviceState *dev;
55
- ARMCPU *cpu = ARM_CPU(obj);
45
+ DeviceState *dev, *uart[4], *pl330[3];
56
+ ARMVQMap *vq_map = opaque;
46
int i, n;
57
uint32_t vq = atoi(&name[3]) / 128;
47
58
bool value;
48
for (n = 0; n < EXYNOS4210_NCPUS; n++) {
59
49
@@ -XXX,XX +XXX,XX @@ static void exynos4210_realize(DeviceState *socdev, Error **errp)
60
@@ -XXX,XX +XXX,XX @@ static void cpu_arm_set_sve_vq(Object *obj, Visitor *v, const char *name,
50
61
return;
51
62
}
52
/*** UARTs ***/
63
53
- exynos4210_uart_create(EXYNOS4210_UART0_BASE_ADDR,
64
- cpu->sve_vq.map = deposit32(cpu->sve_vq.map, vq - 1, 1, value);
54
+ uart[0] = exynos4210_uart_create(EXYNOS4210_UART0_BASE_ADDR,
65
- cpu->sve_vq.init |= 1 << (vq - 1);
55
EXYNOS4210_UART0_FIFO_SIZE, 0, serial_hd(0),
66
+ vq_map->map = deposit32(vq_map->map, vq - 1, 1, value);
56
s->irq_table[exynos4210_get_irq(EXYNOS4210_UART_INT_GRP, 0)]);
67
+ vq_map->init |= 1 << (vq - 1);
57
58
- exynos4210_uart_create(EXYNOS4210_UART1_BASE_ADDR,
59
+ uart[1] = exynos4210_uart_create(EXYNOS4210_UART1_BASE_ADDR,
60
EXYNOS4210_UART1_FIFO_SIZE, 1, serial_hd(1),
61
s->irq_table[exynos4210_get_irq(EXYNOS4210_UART_INT_GRP, 1)]);
62
63
- exynos4210_uart_create(EXYNOS4210_UART2_BASE_ADDR,
64
+ uart[2] = exynos4210_uart_create(EXYNOS4210_UART2_BASE_ADDR,
65
EXYNOS4210_UART2_FIFO_SIZE, 2, serial_hd(2),
66
s->irq_table[exynos4210_get_irq(EXYNOS4210_UART_INT_GRP, 2)]);
67
68
- exynos4210_uart_create(EXYNOS4210_UART3_BASE_ADDR,
69
+ uart[3] = exynos4210_uart_create(EXYNOS4210_UART3_BASE_ADDR,
70
EXYNOS4210_UART3_FIFO_SIZE, 3, serial_hd(3),
71
s->irq_table[exynos4210_get_irq(EXYNOS4210_UART_INT_GRP, 3)]);
72
73
@@ -XXX,XX +XXX,XX @@ static void exynos4210_realize(DeviceState *socdev, Error **errp)
74
s->irq_table[exynos4210_get_irq(28, 3)]);
75
76
/*** DMA controllers ***/
77
- pl330_create(EXYNOS4210_PL330_BASE0_ADDR, &s->pl330_irq_orgate[0],
78
- s->irq_table[exynos4210_get_irq(21, 0)], 32, 32, 32);
79
- pl330_create(EXYNOS4210_PL330_BASE1_ADDR, &s->pl330_irq_orgate[1],
80
- s->irq_table[exynos4210_get_irq(21, 1)], 32, 32, 32);
81
- pl330_create(EXYNOS4210_PL330_BASE2_ADDR, &s->pl330_irq_orgate[2],
82
- s->irq_table[exynos4210_get_irq(20, 1)], 1, 31, 64);
83
+ pl330[0] = pl330_create(EXYNOS4210_PL330_BASE0_ADDR,
84
+ &s->pl330_irq_orgate[0],
85
+ s->irq_table[exynos4210_get_irq(21, 0)],
86
+ 32, 32, 32);
87
+ pl330[1] = pl330_create(EXYNOS4210_PL330_BASE1_ADDR,
88
+ &s->pl330_irq_orgate[1],
89
+ s->irq_table[exynos4210_get_irq(21, 1)],
90
+ 32, 32, 32);
91
+ pl330[2] = pl330_create(EXYNOS4210_PL330_BASE2_ADDR,
92
+ &s->pl330_irq_orgate[2],
93
+ s->irq_table[exynos4210_get_irq(20, 1)],
94
+ 1, 31, 64);
95
+
96
+ sysbus_connect_irq(SYS_BUS_DEVICE(uart[0]), 1,
97
+ qdev_get_gpio_in(pl330[0], 15));
98
+ sysbus_connect_irq(SYS_BUS_DEVICE(uart[1]), 1,
99
+ qdev_get_gpio_in(pl330[1], 15));
100
+ sysbus_connect_irq(SYS_BUS_DEVICE(uart[2]), 1,
101
+ qdev_get_gpio_in(pl330[0], 17));
102
+ sysbus_connect_irq(SYS_BUS_DEVICE(uart[3]), 1,
103
+ qdev_get_gpio_in(pl330[1], 17));
104
}
68
}
105
69
106
static void exynos4210_init(Object *obj)
70
static bool cpu_arm_get_sve(Object *obj, Error **errp)
71
@@ -XXX,XX +XXX,XX @@ static void cpu_arm_get_sve_default_vec_len(Object *obj, Visitor *v,
72
73
void aarch64_add_sve_properties(Object *obj)
74
{
75
+ ARMCPU *cpu = ARM_CPU(obj);
76
uint32_t vq;
77
78
object_property_add_bool(obj, "sve", cpu_arm_get_sve, cpu_arm_set_sve);
79
@@ -XXX,XX +XXX,XX @@ void aarch64_add_sve_properties(Object *obj)
80
for (vq = 1; vq <= ARM_MAX_VQ; ++vq) {
81
char name[8];
82
sprintf(name, "sve%d", vq * 128);
83
- object_property_add(obj, name, "bool", cpu_arm_get_sve_vq,
84
- cpu_arm_set_sve_vq, NULL, NULL);
85
+ object_property_add(obj, name, "bool", cpu_arm_get_vq,
86
+ cpu_arm_set_vq, NULL, &cpu->sve_vq);
87
}
88
89
#ifdef CONFIG_USER_ONLY
107
--
90
--
108
2.20.1
91
2.25.1
109
110
diff view generated by jsdifflib
1
From: Guenter Roeck <linux@roeck-us.net>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Exynos DMA requires up to 33 interrupt lines (32 event interrupts
3
Rename from cpu_arm_{get,set}_sve_default_vec_len,
4
plus abort interrupt), which all need to be wired together. Increase
4
and take the pointer to default_vq from opaque.
5
the maximum number of or-irq lines to 48 to support this configuration.
6
5
7
Signed-off-by: Guenter Roeck <linux@roeck-us.net>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Message-id: 20200123052540.6132-3-linux@roeck-us.net
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20220620175235.60881-15-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
---
10
---
12
include/hw/or-irq.h | 2 +-
11
target/arm/cpu64.c | 27 ++++++++++++++-------------
13
1 file changed, 1 insertion(+), 1 deletion(-)
12
1 file changed, 14 insertions(+), 13 deletions(-)
14
13
15
diff --git a/include/hw/or-irq.h b/include/hw/or-irq.h
14
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
16
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
17
--- a/include/hw/or-irq.h
16
--- a/target/arm/cpu64.c
18
+++ b/include/hw/or-irq.h
17
+++ b/target/arm/cpu64.c
19
@@ -XXX,XX +XXX,XX @@
18
@@ -XXX,XX +XXX,XX @@ static void cpu_arm_set_sve(Object *obj, bool value, Error **errp)
20
/* This can safely be increased if necessary without breaking
19
21
* migration compatibility (as long as it remains greater than 15).
20
#ifdef CONFIG_USER_ONLY
22
*/
21
/* Mirror linux /proc/sys/abi/sve_default_vector_length. */
23
-#define MAX_OR_LINES 32
22
-static void cpu_arm_set_sve_default_vec_len(Object *obj, Visitor *v,
24
+#define MAX_OR_LINES 48
23
- const char *name, void *opaque,
25
24
- Error **errp)
26
typedef struct OrIRQState qemu_or_irq;
25
+static void cpu_arm_set_default_vec_len(Object *obj, Visitor *v,
26
+ const char *name, void *opaque,
27
+ Error **errp)
28
{
29
- ARMCPU *cpu = ARM_CPU(obj);
30
+ uint32_t *ptr_default_vq = opaque;
31
int32_t default_len, default_vq, remainder;
32
33
if (!visit_type_int32(v, name, &default_len, errp)) {
34
@@ -XXX,XX +XXX,XX @@ static void cpu_arm_set_sve_default_vec_len(Object *obj, Visitor *v,
35
36
/* Undocumented, but the kernel allows -1 to indicate "maximum". */
37
if (default_len == -1) {
38
- cpu->sve_default_vq = ARM_MAX_VQ;
39
+ *ptr_default_vq = ARM_MAX_VQ;
40
return;
41
}
42
43
@@ -XXX,XX +XXX,XX @@ static void cpu_arm_set_sve_default_vec_len(Object *obj, Visitor *v,
44
return;
45
}
46
47
- cpu->sve_default_vq = default_vq;
48
+ *ptr_default_vq = default_vq;
49
}
50
51
-static void cpu_arm_get_sve_default_vec_len(Object *obj, Visitor *v,
52
- const char *name, void *opaque,
53
- Error **errp)
54
+static void cpu_arm_get_default_vec_len(Object *obj, Visitor *v,
55
+ const char *name, void *opaque,
56
+ Error **errp)
57
{
58
- ARMCPU *cpu = ARM_CPU(obj);
59
- int32_t value = cpu->sve_default_vq * 16;
60
+ uint32_t *ptr_default_vq = opaque;
61
+ int32_t value = *ptr_default_vq * 16;
62
63
visit_type_int32(v, name, &value, errp);
64
}
65
@@ -XXX,XX +XXX,XX @@ void aarch64_add_sve_properties(Object *obj)
66
#ifdef CONFIG_USER_ONLY
67
/* Mirror linux /proc/sys/abi/sve_default_vector_length. */
68
object_property_add(obj, "sve-default-vector-length", "int32",
69
- cpu_arm_get_sve_default_vec_len,
70
- cpu_arm_set_sve_default_vec_len, NULL, NULL);
71
+ cpu_arm_get_default_vec_len,
72
+ cpu_arm_set_default_vec_len, NULL,
73
+ &cpu->sve_default_vq);
74
#endif
75
}
27
76
28
--
77
--
29
2.20.1
78
2.25.1
30
31
diff view generated by jsdifflib
1
From: Guenter Roeck <linux@roeck-us.net>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Replace debug logging code with tracing.
3
Drop the aa32-only inline fallbacks,
4
and just use a couple of ifdefs.
4
5
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Guenter Roeck <linux@roeck-us.net>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 20200123052540.6132-2-linux@roeck-us.net
8
Message-id: 20220620175235.60881-16-richard.henderson@linaro.org
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
---
10
---
10
hw/dma/pl330.c | 88 ++++++++++++++++++++++++---------------------
11
target/arm/cpu.h | 6 ------
11
hw/dma/trace-events | 24 +++++++++++++
12
target/arm/internals.h | 3 +++
12
2 files changed, 72 insertions(+), 40 deletions(-)
13
target/arm/cpu.c | 2 ++
14
3 files changed, 5 insertions(+), 6 deletions(-)
13
15
14
diff --git a/hw/dma/pl330.c b/hw/dma/pl330.c
16
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
15
index XXXXXXX..XXXXXXX 100644
17
index XXXXXXX..XXXXXXX 100644
16
--- a/hw/dma/pl330.c
18
--- a/target/arm/cpu.h
17
+++ b/hw/dma/pl330.c
19
+++ b/target/arm/cpu.h
18
@@ -XXX,XX +XXX,XX @@
20
@@ -XXX,XX +XXX,XX @@ typedef struct {
19
#include "sysemu/dma.h"
21
20
#include "qemu/log.h"
22
#ifdef TARGET_AARCH64
21
#include "qemu/module.h"
23
# define ARM_MAX_VQ 16
22
+#include "trace.h"
24
-void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp);
23
25
-void arm_cpu_pauth_finalize(ARMCPU *cpu, Error **errp);
24
#ifndef PL330_ERR_DEBUG
26
-void arm_cpu_lpa2_finalize(ARMCPU *cpu, Error **errp);
25
#define PL330_ERR_DEBUG 0
27
#else
28
# define ARM_MAX_VQ 1
29
-static inline void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp) { }
30
-static inline void arm_cpu_pauth_finalize(ARMCPU *cpu, Error **errp) { }
31
-static inline void arm_cpu_lpa2_finalize(ARMCPU *cpu, Error **errp) { }
26
#endif
32
#endif
27
33
28
-#define DB_PRINT_L(lvl, fmt, args...) do {\
34
typedef struct ARMVectorReg {
29
- if (PL330_ERR_DEBUG >= lvl) {\
35
diff --git a/target/arm/internals.h b/target/arm/internals.h
30
- fprintf(stderr, "PL330: %s:" fmt, __func__, ## args);\
36
index XXXXXXX..XXXXXXX 100644
31
- } \
37
--- a/target/arm/internals.h
32
-} while (0)
38
+++ b/target/arm/internals.h
33
-
39
@@ -XXX,XX +XXX,XX @@ int arm_gdb_get_svereg(CPUARMState *env, GByteArray *buf, int reg);
34
-#define DB_PRINT(fmt, args...) DB_PRINT_L(1, fmt, ## args)
40
int arm_gdb_set_svereg(CPUARMState *env, uint8_t *buf, int reg);
35
-
41
int aarch64_fpu_gdb_get_reg(CPUARMState *env, GByteArray *buf, int reg);
36
#define PL330_PERIPH_NUM 32
42
int aarch64_fpu_gdb_set_reg(CPUARMState *env, uint8_t *buf, int reg);
37
#define PL330_MAX_BURST_LEN 128
43
+void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp);
38
#define PL330_INSN_MAXSIZE 6
44
+void arm_cpu_pauth_finalize(ARMCPU *cpu, Error **errp);
39
@@ -XXX,XX +XXX,XX @@ typedef struct PL330InsnDesc {
45
+void arm_cpu_lpa2_finalize(ARMCPU *cpu, Error **errp);
40
void (*exec)(PL330Chan *, uint8_t opcode, uint8_t *args, int len);
46
#endif
41
} PL330InsnDesc;
47
42
48
#ifdef CONFIG_USER_ONLY
43
+static void pl330_hexdump(uint8_t *buf, size_t size)
49
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
44
+{
50
index XXXXXXX..XXXXXXX 100644
45
+ unsigned int b, i, len;
51
--- a/target/arm/cpu.c
46
+ char tmpbuf[80];
52
+++ b/target/arm/cpu.c
47
+
53
@@ -XXX,XX +XXX,XX @@ void arm_cpu_finalize_features(ARMCPU *cpu, Error **errp)
48
+ for (b = 0; b < size; b += 16) {
49
+ len = size - b;
50
+ if (len > 16) {
51
+ len = 16;
52
+ }
53
+ tmpbuf[0] = '\0';
54
+ for (i = 0; i < len; i++) {
55
+ if ((i % 4) == 0) {
56
+ strcat(tmpbuf, " ");
57
+ }
58
+ sprintf(tmpbuf + strlen(tmpbuf), " %02x", buf[b + i]);
59
+ }
60
+ trace_pl330_hexdump(b, tmpbuf);
61
+ }
62
+}
63
64
/* MFIFO Implementation
65
*
66
@@ -XXX,XX +XXX,XX @@ static inline void pl330_queue_remove_tagged(PL330Queue *s, uint8_t tag)
67
68
static inline void pl330_fault(PL330Chan *ch, uint32_t flags)
69
{
54
{
70
- DB_PRINT("ch: %p, flags: %" PRIx32 "\n", ch, flags);
55
Error *local_err = NULL;
71
+ trace_pl330_fault(ch, flags);
56
72
ch->fault_type |= flags;
57
+#ifdef TARGET_AARCH64
73
if (ch->state == pl330_chan_fault) {
58
if (arm_feature(&cpu->env, ARM_FEATURE_AARCH64)) {
74
return;
59
arm_cpu_sve_finalize(cpu, &local_err);
75
@@ -XXX,XX +XXX,XX @@ static inline void pl330_fault(PL330Chan *ch, uint32_t flags)
60
if (local_err != NULL) {
76
ch->state = pl330_chan_fault;
61
@@ -XXX,XX +XXX,XX @@ void arm_cpu_finalize_features(ARMCPU *cpu, Error **errp)
77
ch->parent->num_faulting++;
78
if (ch->parent->num_faulting == 1) {
79
- DB_PRINT("abort interrupt raised\n");
80
+ trace_pl330_fault_abort();
81
qemu_irq_raise(ch->parent->irq_abort);
82
}
83
}
84
@@ -XXX,XX +XXX,XX @@ static void pl330_dmaend(PL330Chan *ch, uint8_t opcode,
85
return;
62
return;
86
}
63
}
87
}
64
}
88
- DB_PRINT("DMA ending!\n");
65
+#endif
89
+ trace_pl330_dmaend();
66
90
pl330_fifo_tagged_remove(&s->fifo, ch->tag);
67
if (kvm_enabled()) {
91
pl330_queue_remove_tagged(&s->read_queue, ch->tag);
68
kvm_arm_steal_time_finalize(cpu, &local_err);
92
pl330_queue_remove_tagged(&s->write_queue, ch->tag);
93
@@ -XXX,XX +XXX,XX @@ static void pl330_dmago(PL330Chan *ch, uint8_t opcode, uint8_t *args, int len)
94
uint32_t pc;
95
PL330Chan *s;
96
97
- DB_PRINT("\n");
98
+ trace_pl330_dmago();
99
100
if (!ch->is_manager) {
101
pl330_fault(ch, PL330_FAULT_UNDEF_INSTR);
102
@@ -XXX,XX +XXX,XX @@ static void pl330_dmald(PL330Chan *ch, uint8_t opcode, uint8_t *args, int len)
103
ch->stall = pl330_queue_put_insn(&ch->parent->read_queue, ch->src,
104
size, num, inc, 0, ch->tag);
105
if (!ch->stall) {
106
- DB_PRINT("channel:%" PRId8 " address:%08" PRIx32 " size:%" PRIx32
107
- " num:%" PRId32 " %c\n",
108
- ch->tag, ch->src, size, num, inc ? 'Y' : 'N');
109
+ trace_pl330_dmald(ch->tag, ch->src, size, num, inc ? 'Y' : 'N');
110
ch->src += inc ? size * num - (ch->src & (size - 1)) : 0;
111
}
112
}
113
@@ -XXX,XX +XXX,XX @@ static void pl330_dmakill(PL330Chan *ch, uint8_t opcode, uint8_t *args, int len)
114
ch->fault_type = 0;
115
ch->parent->num_faulting--;
116
if (ch->parent->num_faulting == 0) {
117
- DB_PRINT("abort interrupt lowered\n");
118
+ trace_pl330_dmakill();
119
qemu_irq_lower(ch->parent->irq_abort);
120
}
121
}
122
@@ -XXX,XX +XXX,XX @@ static void pl330_dmalpend(PL330Chan *ch, uint8_t opcode,
123
uint8_t bs = opcode & 3;
124
uint8_t lc = (opcode & 4) >> 2;
125
126
+ trace_pl330_dmalpend(nf, bs, lc, ch->lc[lc], ch->request_flag);
127
+
128
if (bs == 2) {
129
pl330_fault(ch, PL330_FAULT_OPERAND_INVALID);
130
return;
131
@@ -XXX,XX +XXX,XX @@ static void pl330_dmalpend(PL330Chan *ch, uint8_t opcode,
132
if (nf) {
133
ch->lc[lc]--;
134
}
135
- DB_PRINT("loop reiteration\n");
136
+ trace_pl330_dmalpiter();
137
ch->pc -= args[0];
138
ch->pc -= len + 1;
139
/* "ch->pc -= args[0] + len + 1" is incorrect when args[0] == 256 */
140
} else {
141
- DB_PRINT("loop fallthrough\n");
142
+ trace_pl330_dmalpfallthrough();
143
}
144
}
145
146
@@ -XXX,XX +XXX,XX @@ static void pl330_dmasev(PL330Chan *ch, uint8_t opcode, uint8_t *args, int len)
147
}
148
if (ch->parent->inten & (1 << ev_id)) {
149
ch->parent->int_status |= (1 << ev_id);
150
- DB_PRINT("event interrupt raised %" PRId8 "\n", ev_id);
151
+ trace_pl330_dmasev_evirq(ev_id);
152
qemu_irq_raise(ch->parent->irq[ev_id]);
153
}
154
- DB_PRINT("event raised %" PRId8 "\n", ev_id);
155
+ trace_pl330_dmasev_event(ev_id);
156
ch->parent->ev_status |= (1 << ev_id);
157
}
158
159
@@ -XXX,XX +XXX,XX @@ static void pl330_dmast(PL330Chan *ch, uint8_t opcode, uint8_t *args, int len)
160
ch->stall = pl330_queue_put_insn(&ch->parent->write_queue, ch->dst,
161
size, num, inc, 0, ch->tag);
162
if (!ch->stall) {
163
- DB_PRINT("channel:%" PRId8 " address:%08" PRIx32 " size:%" PRIx32
164
- " num:%" PRId32 " %c\n",
165
- ch->tag, ch->dst, size, num, inc ? 'Y' : 'N');
166
+ trace_pl330_dmast(ch->tag, ch->dst, size, num, inc ? 'Y' : 'N');
167
ch->dst += inc ? size * num - (ch->dst & (size - 1)) : 0;
168
}
169
}
170
@@ -XXX,XX +XXX,XX @@ static void pl330_dmawfe(PL330Chan *ch, uint8_t opcode,
171
}
172
}
173
ch->parent->ev_status &= ~(1 << ev_id);
174
- DB_PRINT("event lowered %" PRIx8 "\n", ev_id);
175
+ trace_pl330_dmawfe(ev_id);
176
} else {
177
ch->stall = 1;
178
}
179
@@ -XXX,XX +XXX,XX @@ static int pl330_chan_exec(PL330Chan *ch)
180
ch->stall = 0;
181
insn = pl330_fetch_insn(ch);
182
if (!insn) {
183
- DB_PRINT("pl330 undefined instruction\n");
184
+ trace_pl330_chan_exec_undef();
185
pl330_fault(ch, PL330_FAULT_UNDEF_INSTR);
186
return 0;
187
}
188
@@ -XXX,XX +XXX,XX @@ static int pl330_exec_cycle(PL330Chan *channel)
189
int len = q->len - (q->addr & (q->len - 1));
190
191
dma_memory_read(&address_space_memory, q->addr, buf, len);
192
- if (PL330_ERR_DEBUG > 1) {
193
- DB_PRINT("PL330 read from memory @%08" PRIx32 " (size = %08x):\n",
194
- q->addr, len);
195
- qemu_hexdump((char *)buf, stderr, "", len);
196
+ trace_pl330_exec_cycle(q->addr, len);
197
+ if (trace_event_get_state_backends(TRACE_PL330_HEXDUMP)) {
198
+ pl330_hexdump(buf, len);
199
}
200
fifo_res = pl330_fifo_push(&s->fifo, buf, len, q->tag);
201
if (fifo_res == PL330_FIFO_OK) {
202
@@ -XXX,XX +XXX,XX @@ static int pl330_exec_cycle(PL330Chan *channel)
203
}
204
if (fifo_res == PL330_FIFO_OK || q->z) {
205
dma_memory_write(&address_space_memory, q->addr, buf, len);
206
- if (PL330_ERR_DEBUG > 1) {
207
- DB_PRINT("PL330 read from memory @%08" PRIx32
208
- " (size = %08x):\n", q->addr, len);
209
- qemu_hexdump((char *)buf, stderr, "", len);
210
+ trace_pl330_exec_cycle(q->addr, len);
211
+ if (trace_event_get_state_backends(TRACE_PL330_HEXDUMP)) {
212
+ pl330_hexdump(buf, len);
213
}
214
if (q->inc) {
215
q->addr += len;
216
@@ -XXX,XX +XXX,XX @@ static int pl330_exec_channel(PL330Chan *channel)
217
218
static inline void pl330_exec(PL330State *s)
219
{
220
- DB_PRINT("\n");
221
int i, insr_exec;
222
+ trace_pl330_exec();
223
do {
224
insr_exec = pl330_exec_channel(&s->manager);
225
226
@@ -XXX,XX +XXX,XX @@ static void pl330_debug_exec(PL330State *s)
227
args[2] = (s->dbg[1] >> 8) & 0xff;
228
args[3] = (s->dbg[1] >> 16) & 0xff;
229
args[4] = (s->dbg[1] >> 24) & 0xff;
230
- DB_PRINT("chan id: %" PRIx8 "\n", chan_id);
231
+ trace_pl330_debug_exec(chan_id);
232
if (s->dbg[0] & 1) {
233
ch = &s->chan[chan_id];
234
} else {
235
@@ -XXX,XX +XXX,XX @@ static void pl330_debug_exec(PL330State *s)
236
ch->fault_type |= PL330_FAULT_DBG_INSTR;
237
}
238
if (ch->stall) {
239
+ trace_pl330_debug_exec_stall();
240
qemu_log_mask(LOG_UNIMP, "pl330: stall of debug instruction not "
241
"implemented\n");
242
}
243
@@ -XXX,XX +XXX,XX @@ static void pl330_iomem_write(void *opaque, hwaddr offset,
244
PL330State *s = (PL330State *) opaque;
245
int i;
246
247
- DB_PRINT("addr: %08x data: %08x\n", (unsigned)offset, (unsigned)value);
248
+ trace_pl330_iomem_write((unsigned)offset, (unsigned)value);
249
250
switch (offset) {
251
case PL330_REG_INTEN:
252
@@ -XXX,XX +XXX,XX @@ static void pl330_iomem_write(void *opaque, hwaddr offset,
253
case PL330_REG_INTCLR:
254
for (i = 0; i < s->num_events; i++) {
255
if (s->int_status & s->inten & value & (1 << i)) {
256
- DB_PRINT("event interrupt lowered %d\n", i);
257
+ trace_pl330_iomem_write_clr(i);
258
qemu_irq_lower(s->irq[i]);
259
}
260
}
261
@@ -XXX,XX +XXX,XX @@ static void pl330_iomem_write(void *opaque, hwaddr offset,
262
}
263
break;
264
case PL330_REG_DBGINST0:
265
- DB_PRINT("s->dbg[0] = %08x\n", (unsigned)value);
266
s->dbg[0] = value;
267
break;
268
case PL330_REG_DBGINST1:
269
- DB_PRINT("s->dbg[1] = %08x\n", (unsigned)value);
270
s->dbg[1] = value;
271
break;
272
default:
273
@@ -XXX,XX +XXX,XX @@ static uint64_t pl330_iomem_read(void *opaque, hwaddr offset,
274
unsigned size)
275
{
276
uint32_t ret = pl330_iomem_read_imp(opaque, offset);
277
- DB_PRINT("addr: %08" HWADDR_PRIx " data: %08" PRIx32 "\n", offset, ret);
278
+ trace_pl330_iomem_read((uint32_t)offset, ret);
279
return ret;
280
}
281
282
diff --git a/hw/dma/trace-events b/hw/dma/trace-events
283
index XXXXXXX..XXXXXXX 100644
284
--- a/hw/dma/trace-events
285
+++ b/hw/dma/trace-events
286
@@ -XXX,XX +XXX,XX @@ sparc32_dma_enable_lower(void) "Lower DMA enable"
287
288
# i8257.c
289
i8257_unregistered_dma(int nchan, int dma_pos, int dma_len) "unregistered DMA channel used nchan=%d dma_pos=%d dma_len=%d"
290
+
291
+# pl330.c
292
+pl330_fault(void *ptr, uint32_t flags) "ch: %p, flags: 0x%"PRIx32
293
+pl330_fault_abort(void) "abort interrupt raised"
294
+pl330_dmaend(void) "DMA ending"
295
+pl330_dmago(void) "DMA run"
296
+pl330_dmald(uint32_t chan, uint32_t addr, uint32_t size, uint32_t num, uint32_t ch) "channel:%"PRId8" address:0x%08"PRIx32" size:0x%"PRIx32" num:%"PRId32"%c"
297
+pl330_dmakill(void) "abort interrupt lowered"
298
+pl330_dmalpend(uint8_t nf, uint8_t bs, uint8_t lc, uint8_t ch, uint8_t flag) "nf=0x%02x bs=0x%02x lc=0x%02x ch=0x%02x flag=0x%02x"
299
+pl330_dmalpiter(void) "loop reiteration"
300
+pl330_dmalpfallthrough(void) "loop fallthrough"
301
+pl330_dmasev_evirq(uint8_t ev_id) "event interrupt raised %"PRId8
302
+pl330_dmasev_event(uint8_t ev_id) "event raised %"PRId8
303
+pl330_dmast(uint32_t chn, uint32_t addr, uint32_t sz, uint32_t num, uint32_t c) "channel:%"PRId8" address:0x%08"PRIx32" size:0x%"PRIx32" num:%"PRId32" %c"
304
+pl330_dmawfe(uint8_t ev_id) "event lowered 0x%"PRIx8
305
+pl330_chan_exec_undef(void) "undefined instruction"
306
+pl330_exec_cycle(uint32_t addr, uint32_t size) "PL330 read from memory @0x%08"PRIx32" (size = 0x%08"PRIx32")"
307
+pl330_hexdump(uint32_t offset, char *str) " 0x%04"PRIx32":%s"
308
+pl330_exec(void) "pl330_exec"
309
+pl330_debug_exec(uint8_t ch) "chan id: 0x%"PRIx8
310
+pl330_debug_exec_stall(void) "stall of debug instruction not implemented"
311
+pl330_iomem_write(uint32_t offset, uint32_t value) "addr: 0x%08"PRIx32" data: 0x%08"PRIx32
312
+pl330_iomem_write_clr(int i) "event interrupt lowered %d"
313
+pl330_iomem_read(uint32_t addr, uint32_t data) "addr: 0x%08"PRIx32" data: 0x%08"PRIx32
314
--
69
--
315
2.20.1
70
2.25.1
316
317
diff view generated by jsdifflib
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Missed in 870c034da0b, hopefully reported by Coverity.
3
These functions are not used outside cpu64.c,
4
so make them static.
4
5
5
Fixes: Coverity CID 1412793 (Incorrect expression)
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
8
Message-id: 20220620175235.60881-17-richard.henderson@linaro.org
8
Reviewed-by: Thomas Huth <thuth@redhat.com>
9
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
10
Message-id: 20200121213853.9601-1-f4bug@amsat.org
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
10
---
13
hw/misc/stm32f4xx_syscfg.c | 2 +-
11
target/arm/cpu.h | 3 ---
14
1 file changed, 1 insertion(+), 1 deletion(-)
12
target/arm/cpu64.c | 4 ++--
13
2 files changed, 2 insertions(+), 5 deletions(-)
15
14
16
diff --git a/hw/misc/stm32f4xx_syscfg.c b/hw/misc/stm32f4xx_syscfg.c
15
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
17
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
18
--- a/hw/misc/stm32f4xx_syscfg.c
17
--- a/target/arm/cpu.h
19
+++ b/hw/misc/stm32f4xx_syscfg.c
18
+++ b/target/arm/cpu.h
20
@@ -XXX,XX +XXX,XX @@ static void stm32f4xx_syscfg_set_irq(void *opaque, int irq, int level)
19
@@ -XXX,XX +XXX,XX @@ int aarch64_cpu_gdb_write_register(CPUState *cpu, uint8_t *buf, int reg);
21
STM32F4xxSyscfgState *s = opaque;
20
void aarch64_sve_narrow_vq(CPUARMState *env, unsigned vq);
22
int icrreg = irq / 4;
21
void aarch64_sve_change_el(CPUARMState *env, int old_el,
23
int startbit = (irq & 3) * 4;
22
int new_el, bool el0_a64);
24
- uint8_t config = config = irq / 16;
23
-void aarch64_add_sve_properties(Object *obj);
25
+ uint8_t config = irq / 16;
24
-void aarch64_add_pauth_properties(Object *obj);
26
25
void arm_reset_sve_state(CPUARMState *env);
27
trace_stm32f4xx_syscfg_set_irq(irq / 16, irq % 16, level);
26
27
/*
28
@@ -XXX,XX +XXX,XX @@ static inline void aarch64_sve_narrow_vq(CPUARMState *env, unsigned vq) { }
29
static inline void aarch64_sve_change_el(CPUARMState *env, int o,
30
int n, bool a)
31
{ }
32
-static inline void aarch64_add_sve_properties(Object *obj) { }
33
#endif
34
35
void aarch64_sync_32_to_64(CPUARMState *env);
36
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
37
index XXXXXXX..XXXXXXX 100644
38
--- a/target/arm/cpu64.c
39
+++ b/target/arm/cpu64.c
40
@@ -XXX,XX +XXX,XX @@ static void cpu_arm_get_default_vec_len(Object *obj, Visitor *v,
41
}
42
#endif
43
44
-void aarch64_add_sve_properties(Object *obj)
45
+static void aarch64_add_sve_properties(Object *obj)
46
{
47
ARMCPU *cpu = ARM_CPU(obj);
48
uint32_t vq;
49
@@ -XXX,XX +XXX,XX @@ static Property arm_cpu_pauth_property =
50
static Property arm_cpu_pauth_impdef_property =
51
DEFINE_PROP_BOOL("pauth-impdef", ARMCPU, prop_pauth_impdef, false);
52
53
-void aarch64_add_pauth_properties(Object *obj)
54
+static void aarch64_add_pauth_properties(Object *obj)
55
{
56
ARMCPU *cpu = ARM_CPU(obj);
28
57
29
--
58
--
30
2.20.1
59
2.25.1
31
32
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
We were incorrectly requiring ARMv8.4 support for the pauth
3
Mirror the properties for SVE. The main difference is
4
tests, but Pointer Authentication is an ARMv8.3 extension.
4
that any arbitrary set of powers of 2 may be supported,
5
Further, hiding the required architecture within asm() is
5
and not the stricter constraints that apply to SVE.
6
not correct.
7
6
8
Correct the architecture version requested, and specify it
7
Include a property to control FEAT_SME_FA64, as failing
9
in the cflags of the (cross-) compiler rather than in the asm.
8
to restrict the runtime to the proper subset of insns
9
could be a major point for bugs.
10
10
11
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
11
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
12
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
12
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
13
Message-id: 20200116230809.19078-3-richard.henderson@linaro.org
13
Message-id: 20220620175235.60881-18-richard.henderson@linaro.org
14
[PMM: tweaked commit message]
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
---
15
---
17
tests/tcg/aarch64/Makefile.target | 1 +
16
docs/system/arm/cpu-features.rst | 56 +++++++++++++++
18
tests/tcg/aarch64/pauth-1.c | 2 --
17
target/arm/cpu.h | 2 +
19
tests/tcg/aarch64/pauth-2.c | 2 --
18
target/arm/internals.h | 1 +
20
3 files changed, 1 insertion(+), 4 deletions(-)
19
target/arm/cpu.c | 14 +++-
20
target/arm/cpu64.c | 114 +++++++++++++++++++++++++++++--
21
5 files changed, 180 insertions(+), 7 deletions(-)
21
22
22
diff --git a/tests/tcg/aarch64/Makefile.target b/tests/tcg/aarch64/Makefile.target
23
diff --git a/docs/system/arm/cpu-features.rst b/docs/system/arm/cpu-features.rst
23
index XXXXXXX..XXXXXXX 100644
24
index XXXXXXX..XXXXXXX 100644
24
--- a/tests/tcg/aarch64/Makefile.target
25
--- a/docs/system/arm/cpu-features.rst
25
+++ b/tests/tcg/aarch64/Makefile.target
26
+++ b/docs/system/arm/cpu-features.rst
26
@@ -XXX,XX +XXX,XX @@ run-fcvt: fcvt
27
@@ -XXX,XX +XXX,XX @@ verbose command lines. However, the recommended way to select vector
27
# Pauth Tests
28
lengths is to explicitly enable each desired length. Therefore only
28
AARCH64_TESTS += pauth-1 pauth-2
29
example's (1), (4), and (6) exhibit recommended uses of the properties.
29
run-pauth-%: QEMU_OPTS += -cpu max
30
30
+pauth-%: CFLAGS += -march=armv8.3-a
31
+SME CPU Property Examples
31
32
+-------------------------
32
# Semihosting smoke test for linux-user
33
+
33
AARCH64_TESTS += semihosting
34
+ 1) Disable SME::
34
diff --git a/tests/tcg/aarch64/pauth-1.c b/tests/tcg/aarch64/pauth-1.c
35
+
35
index XXXXXXX..XXXXXXX 100644
36
+ $ qemu-system-aarch64 -M virt -cpu max,sme=off
36
--- a/tests/tcg/aarch64/pauth-1.c
37
+
37
+++ b/tests/tcg/aarch64/pauth-1.c
38
+ 2) Implicitly enable all vector lengths for the ``max`` CPU type::
38
@@ -XXX,XX +XXX,XX @@
39
+
39
#include <sys/prctl.h>
40
+ $ qemu-system-aarch64 -M virt -cpu max
40
#include <stdio.h>
41
+
41
42
+ 3) Only enable the 256-bit vector length::
42
-asm(".arch armv8.4-a");
43
+
43
-
44
+ $ qemu-system-aarch64 -M virt -cpu max,sme256=on
44
#ifndef PR_PAC_RESET_KEYS
45
+
45
#define PR_PAC_RESET_KEYS 54
46
+ 3) Enable the 256-bit and 1024-bit vector lengths::
46
#define PR_PAC_APDAKEY (1 << 2)
47
+
47
diff --git a/tests/tcg/aarch64/pauth-2.c b/tests/tcg/aarch64/pauth-2.c
48
+ $ qemu-system-aarch64 -M virt -cpu max,sme256=on,sme1024=on
48
index XXXXXXX..XXXXXXX 100644
49
+
49
--- a/tests/tcg/aarch64/pauth-2.c
50
+ 4) Disable the 512-bit vector length. This results in all the other
50
+++ b/tests/tcg/aarch64/pauth-2.c
51
+ lengths supported by ``max`` defaulting to enabled
51
@@ -XXX,XX +XXX,XX @@
52
+ (128, 256, 1024 and 2048)::
52
#include <stdint.h>
53
+
53
#include <assert.h>
54
+ $ qemu-system-aarch64 -M virt -cpu max,sve512=off
54
55
+
55
-asm(".arch armv8.4-a");
56
SVE User-mode Default Vector Length Property
56
-
57
--------------------------------------------
57
void do_test(uint64_t value)
58
59
@@ -XXX,XX +XXX,XX @@ length supported by QEMU is 256.
60
61
If this property is set to ``-1`` then the default vector length
62
is set to the maximum possible length.
63
+
64
+SME CPU Properties
65
+==================
66
+
67
+The SME CPU properties are much like the SVE properties: ``sme`` is
68
+used to enable or disable the entire SME feature, and ``sme<N>`` is
69
+used to enable or disable specific vector lengths. Finally,
70
+``sme_fa64`` is used to enable or disable ``FEAT_SME_FA64``, which
71
+allows execution of the "full a64" instruction set while Streaming
72
+SVE mode is enabled.
73
+
74
+SME is not supported by KVM at this time.
75
+
76
+At least one vector length must be enabled when ``sme`` is enabled,
77
+and all vector lengths must be powers of 2. The maximum vector
78
+length supported by qemu is 2048 bits. Otherwise, there are no
79
+additional constraints on the set of vector lengths supported by SME.
80
+
81
+SME User-mode Default Vector Length Property
82
+--------------------------------------------
83
+
84
+For qemu-aarch64, the cpu propery ``sme-default-vector-length=N`` is
85
+defined to mirror the Linux kernel parameter file
86
+``/proc/sys/abi/sme_default_vector_length``. The default length, ``N``,
87
+is in units of bytes and must be between 16 and 8192.
88
+If not specified, the default vector length is 32.
89
+
90
+As with ``sve-default-vector-length``, if the default length is larger
91
+than the maximum vector length enabled, the actual vector length will
92
+be reduced. If this property is set to ``-1`` then the default vector
93
+length is set to the maximum possible length.
94
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
95
index XXXXXXX..XXXXXXX 100644
96
--- a/target/arm/cpu.h
97
+++ b/target/arm/cpu.h
98
@@ -XXX,XX +XXX,XX @@ struct ArchCPU {
99
#ifdef CONFIG_USER_ONLY
100
/* Used to set the default vector length at process start. */
101
uint32_t sve_default_vq;
102
+ uint32_t sme_default_vq;
103
#endif
104
105
ARMVQMap sve_vq;
106
+ ARMVQMap sme_vq;
107
108
/* Generic timer counter frequency, in Hz */
109
uint64_t gt_cntfrq_hz;
110
diff --git a/target/arm/internals.h b/target/arm/internals.h
111
index XXXXXXX..XXXXXXX 100644
112
--- a/target/arm/internals.h
113
+++ b/target/arm/internals.h
114
@@ -XXX,XX +XXX,XX @@ int arm_gdb_set_svereg(CPUARMState *env, uint8_t *buf, int reg);
115
int aarch64_fpu_gdb_get_reg(CPUARMState *env, GByteArray *buf, int reg);
116
int aarch64_fpu_gdb_set_reg(CPUARMState *env, uint8_t *buf, int reg);
117
void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp);
118
+void arm_cpu_sme_finalize(ARMCPU *cpu, Error **errp);
119
void arm_cpu_pauth_finalize(ARMCPU *cpu, Error **errp);
120
void arm_cpu_lpa2_finalize(ARMCPU *cpu, Error **errp);
121
#endif
122
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
123
index XXXXXXX..XXXXXXX 100644
124
--- a/target/arm/cpu.c
125
+++ b/target/arm/cpu.c
126
@@ -XXX,XX +XXX,XX @@ static void arm_cpu_initfn(Object *obj)
127
#ifdef CONFIG_USER_ONLY
128
# ifdef TARGET_AARCH64
129
/*
130
- * The linux kernel defaults to 512-bit vectors, when sve is supported.
131
- * See documentation for /proc/sys/abi/sve_default_vector_length, and
132
- * our corresponding sve-default-vector-length cpu property.
133
+ * The linux kernel defaults to 512-bit for SVE, and 256-bit for SME.
134
+ * These values were chosen to fit within the default signal frame.
135
+ * See documentation for /proc/sys/abi/{sve,sme}_default_vector_length,
136
+ * and our corresponding cpu property.
137
*/
138
cpu->sve_default_vq = 4;
139
+ cpu->sme_default_vq = 2;
140
# endif
141
#else
142
/* Our inbound IRQ and FIQ lines */
143
@@ -XXX,XX +XXX,XX @@ void arm_cpu_finalize_features(ARMCPU *cpu, Error **errp)
144
return;
145
}
146
147
+ arm_cpu_sme_finalize(cpu, &local_err);
148
+ if (local_err != NULL) {
149
+ error_propagate(errp, local_err);
150
+ return;
151
+ }
152
+
153
arm_cpu_pauth_finalize(cpu, &local_err);
154
if (local_err != NULL) {
155
error_propagate(errp, local_err);
156
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
157
index XXXXXXX..XXXXXXX 100644
158
--- a/target/arm/cpu64.c
159
+++ b/target/arm/cpu64.c
160
@@ -XXX,XX +XXX,XX @@ static void cpu_arm_get_vq(Object *obj, Visitor *v, const char *name,
161
ARMCPU *cpu = ARM_CPU(obj);
162
ARMVQMap *vq_map = opaque;
163
uint32_t vq = atoi(&name[3]) / 128;
164
+ bool sve = vq_map == &cpu->sve_vq;
165
bool value;
166
167
- /* All vector lengths are disabled when SVE is off. */
168
- if (!cpu_isar_feature(aa64_sve, cpu)) {
169
+ /* All vector lengths are disabled when feature is off. */
170
+ if (sve
171
+ ? !cpu_isar_feature(aa64_sve, cpu)
172
+ : !cpu_isar_feature(aa64_sme, cpu)) {
173
value = false;
174
} else {
175
value = extract32(vq_map->map, vq - 1, 1);
176
@@ -XXX,XX +XXX,XX @@ static void cpu_arm_set_sve(Object *obj, bool value, Error **errp)
177
cpu->isar.id_aa64pfr0 = t;
178
}
179
180
+void arm_cpu_sme_finalize(ARMCPU *cpu, Error **errp)
181
+{
182
+ uint32_t vq_map = cpu->sme_vq.map;
183
+ uint32_t vq_init = cpu->sme_vq.init;
184
+ uint32_t vq_supported = cpu->sme_vq.supported;
185
+ uint32_t vq;
186
+
187
+ if (vq_map == 0) {
188
+ if (!cpu_isar_feature(aa64_sme, cpu)) {
189
+ cpu->isar.id_aa64smfr0 = 0;
190
+ return;
191
+ }
192
+
193
+ /* TODO: KVM will require limitations via SMCR_EL2. */
194
+ vq_map = vq_supported & ~vq_init;
195
+
196
+ if (vq_map == 0) {
197
+ vq = ctz32(vq_supported) + 1;
198
+ error_setg(errp, "cannot disable sme%d", vq * 128);
199
+ error_append_hint(errp, "All SME vector lengths are disabled.\n");
200
+ error_append_hint(errp, "With SME enabled, at least one "
201
+ "vector length must be enabled.\n");
202
+ return;
203
+ }
204
+ } else {
205
+ if (!cpu_isar_feature(aa64_sme, cpu)) {
206
+ vq = 32 - clz32(vq_map);
207
+ error_setg(errp, "cannot enable sme%d", vq * 128);
208
+ error_append_hint(errp, "SME must be enabled to enable "
209
+ "vector lengths.\n");
210
+ error_append_hint(errp, "Add sme=on to the CPU property list.\n");
211
+ return;
212
+ }
213
+ /* TODO: KVM will require limitations via SMCR_EL2. */
214
+ }
215
+
216
+ cpu->sme_vq.map = vq_map;
217
+}
218
+
219
+static bool cpu_arm_get_sme(Object *obj, Error **errp)
220
+{
221
+ ARMCPU *cpu = ARM_CPU(obj);
222
+ return cpu_isar_feature(aa64_sme, cpu);
223
+}
224
+
225
+static void cpu_arm_set_sme(Object *obj, bool value, Error **errp)
226
+{
227
+ ARMCPU *cpu = ARM_CPU(obj);
228
+ uint64_t t;
229
+
230
+ t = cpu->isar.id_aa64pfr1;
231
+ t = FIELD_DP64(t, ID_AA64PFR1, SME, value);
232
+ cpu->isar.id_aa64pfr1 = t;
233
+}
234
+
235
+static bool cpu_arm_get_sme_fa64(Object *obj, Error **errp)
236
+{
237
+ ARMCPU *cpu = ARM_CPU(obj);
238
+ return cpu_isar_feature(aa64_sme, cpu) &&
239
+ cpu_isar_feature(aa64_sme_fa64, cpu);
240
+}
241
+
242
+static void cpu_arm_set_sme_fa64(Object *obj, bool value, Error **errp)
243
+{
244
+ ARMCPU *cpu = ARM_CPU(obj);
245
+ uint64_t t;
246
+
247
+ t = cpu->isar.id_aa64smfr0;
248
+ t = FIELD_DP64(t, ID_AA64SMFR0, FA64, value);
249
+ cpu->isar.id_aa64smfr0 = t;
250
+}
251
+
252
#ifdef CONFIG_USER_ONLY
253
-/* Mirror linux /proc/sys/abi/sve_default_vector_length. */
254
+/* Mirror linux /proc/sys/abi/{sve,sme}_default_vector_length. */
255
static void cpu_arm_set_default_vec_len(Object *obj, Visitor *v,
256
const char *name, void *opaque,
257
Error **errp)
258
@@ -XXX,XX +XXX,XX @@ static void cpu_arm_set_default_vec_len(Object *obj, Visitor *v,
259
* and is the maximum architectural width of ZCR_ELx.LEN.
260
*/
261
if (remainder || default_vq < 1 || default_vq > 512) {
262
- error_setg(errp, "cannot set sve-default-vector-length");
263
+ ARMCPU *cpu = ARM_CPU(obj);
264
+ const char *which =
265
+ (ptr_default_vq == &cpu->sve_default_vq ? "sve" : "sme");
266
+
267
+ error_setg(errp, "cannot set %s-default-vector-length", which);
268
if (remainder) {
269
error_append_hint(errp, "Vector length not a multiple of 16\n");
270
} else if (default_vq < 1) {
271
@@ -XXX,XX +XXX,XX @@ static void aarch64_add_sve_properties(Object *obj)
272
#endif
273
}
274
275
+static void aarch64_add_sme_properties(Object *obj)
276
+{
277
+ ARMCPU *cpu = ARM_CPU(obj);
278
+ uint32_t vq;
279
+
280
+ object_property_add_bool(obj, "sme", cpu_arm_get_sme, cpu_arm_set_sme);
281
+ object_property_add_bool(obj, "sme_fa64", cpu_arm_get_sme_fa64,
282
+ cpu_arm_set_sme_fa64);
283
+
284
+ for (vq = 1; vq <= ARM_MAX_VQ; vq <<= 1) {
285
+ char name[8];
286
+ sprintf(name, "sme%d", vq * 128);
287
+ object_property_add(obj, name, "bool", cpu_arm_get_vq,
288
+ cpu_arm_set_vq, NULL, &cpu->sme_vq);
289
+ }
290
+
291
+#ifdef CONFIG_USER_ONLY
292
+ /* Mirror linux /proc/sys/abi/sme_default_vector_length. */
293
+ object_property_add(obj, "sme-default-vector-length", "int32",
294
+ cpu_arm_get_default_vec_len,
295
+ cpu_arm_set_default_vec_len, NULL,
296
+ &cpu->sme_default_vq);
297
+#endif
298
+}
299
+
300
void arm_cpu_pauth_finalize(ARMCPU *cpu, Error **errp)
58
{
301
{
59
uint64_t salt1, salt2;
302
int arch_val = 0, impdef_val = 0;
303
@@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj)
304
#endif
305
306
cpu->sve_vq.supported = MAKE_64BIT_MASK(0, ARM_MAX_VQ);
307
+ cpu->sme_vq.supported = SVE_VQ_POW2_MAP;
308
309
aarch64_add_pauth_properties(obj);
310
aarch64_add_sve_properties(obj);
311
+ aarch64_add_sme_properties(obj);
312
object_property_add(obj, "sve-max-vq", "uint32", cpu_max_get_sve_max_vq,
313
cpu_max_set_sve_max_vq, NULL, NULL);
314
qdev_property_add_static(DEVICE(obj), &arm_cpu_lpa2_property);
60
--
315
--
61
2.20.1
316
2.25.1
62
63
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Perform the set of operations and test described in LP 1859713.
3
When Streaming SVE mode is enabled, the size is taken from
4
SMCR_ELx instead of ZCR_ELx. The format is shared, but the
5
set of vector lengths is not. Further, Streaming SVE does
6
not require any particular length to be supported.
4
7
5
Suggested-by: Adrien GRASSEIN <adrien.grassein@smile.fr>
8
Adjust sve_vqm1_for_el to pass the current value of PSTATE.SM
9
to the new function.
10
11
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
12
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 20200116230809.19078-5-richard.henderson@linaro.org
13
Message-id: 20220620175235.60881-19-richard.henderson@linaro.org
8
[PMM: fixed hard-coded tabs]
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
15
---
11
tests/tcg/aarch64/Makefile.target | 2 +-
16
target/arm/cpu.h | 9 +++++++--
12
tests/tcg/aarch64/pauth-4.c | 25 +++++++++++++++++++++++++
17
target/arm/helper.c | 32 +++++++++++++++++++++++++-------
13
2 files changed, 26 insertions(+), 1 deletion(-)
18
2 files changed, 32 insertions(+), 9 deletions(-)
14
create mode 100644 tests/tcg/aarch64/pauth-4.c
15
19
16
diff --git a/tests/tcg/aarch64/Makefile.target b/tests/tcg/aarch64/Makefile.target
20
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
17
index XXXXXXX..XXXXXXX 100644
21
index XXXXXXX..XXXXXXX 100644
18
--- a/tests/tcg/aarch64/Makefile.target
22
--- a/target/arm/cpu.h
19
+++ b/tests/tcg/aarch64/Makefile.target
23
+++ b/target/arm/cpu.h
20
@@ -XXX,XX +XXX,XX @@ run-fcvt: fcvt
24
@@ -XXX,XX +XXX,XX @@ int sve_exception_el(CPUARMState *env, int cur_el);
21
    $(call diff-out,$<,$(AARCH64_SRC)/fcvt.ref)
25
int sme_exception_el(CPUARMState *env, int cur_el);
22
26
23
# Pauth Tests
27
/**
24
-AARCH64_TESTS += pauth-1 pauth-2
28
- * sve_vqm1_for_el:
25
+AARCH64_TESTS += pauth-1 pauth-2 pauth-4
29
+ * sve_vqm1_for_el_sm:
26
run-pauth-%: QEMU_OPTS += -cpu max
30
* @env: CPUARMState
27
pauth-%: CFLAGS += -march=armv8.3-a
31
* @el: exception level
28
32
+ * @sm: streaming mode
29
diff --git a/tests/tcg/aarch64/pauth-4.c b/tests/tcg/aarch64/pauth-4.c
33
*
30
new file mode 100644
34
- * Compute the current SVE vector length for @el, in units of
31
index XXXXXXX..XXXXXXX
35
+ * Compute the current vector length for @el & @sm, in units of
32
--- /dev/null
36
* Quadwords Minus 1 -- the same scale used for ZCR_ELx.LEN.
33
+++ b/tests/tcg/aarch64/pauth-4.c
37
+ * If @sm, compute for SVL, otherwise NVL.
34
@@ -XXX,XX +XXX,XX @@
38
*/
35
+#include <stdint.h>
39
+uint32_t sve_vqm1_for_el_sm(CPUARMState *env, int el, bool sm);
36
+#include <assert.h>
37
+
40
+
38
+int main()
41
+/* Likewise, but using @sm = PSTATE.SM. */
42
uint32_t sve_vqm1_for_el(CPUARMState *env, int el);
43
44
static inline bool is_a64(CPUARMState *env)
45
diff --git a/target/arm/helper.c b/target/arm/helper.c
46
index XXXXXXX..XXXXXXX 100644
47
--- a/target/arm/helper.c
48
+++ b/target/arm/helper.c
49
@@ -XXX,XX +XXX,XX @@ int sme_exception_el(CPUARMState *env, int el)
50
/*
51
* Given that SVE is enabled, return the vector length for EL.
52
*/
53
-uint32_t sve_vqm1_for_el(CPUARMState *env, int el)
54
+uint32_t sve_vqm1_for_el_sm(CPUARMState *env, int el, bool sm)
55
{
56
ARMCPU *cpu = env_archcpu(env);
57
- uint32_t len = cpu->sve_max_vq - 1;
58
+ uint64_t *cr = env->vfp.zcr_el;
59
+ uint32_t map = cpu->sve_vq.map;
60
+ uint32_t len = ARM_MAX_VQ - 1;
61
+
62
+ if (sm) {
63
+ cr = env->vfp.smcr_el;
64
+ map = cpu->sme_vq.map;
65
+ }
66
67
if (el <= 1 && !el_is_in_host(env, el)) {
68
- len = MIN(len, 0xf & (uint32_t)env->vfp.zcr_el[1]);
69
+ len = MIN(len, 0xf & (uint32_t)cr[1]);
70
}
71
if (el <= 2 && arm_feature(env, ARM_FEATURE_EL2)) {
72
- len = MIN(len, 0xf & (uint32_t)env->vfp.zcr_el[2]);
73
+ len = MIN(len, 0xf & (uint32_t)cr[2]);
74
}
75
if (arm_feature(env, ARM_FEATURE_EL3)) {
76
- len = MIN(len, 0xf & (uint32_t)env->vfp.zcr_el[3]);
77
+ len = MIN(len, 0xf & (uint32_t)cr[3]);
78
}
79
80
- len = 31 - clz32(cpu->sve_vq.map & MAKE_64BIT_MASK(0, len + 1));
81
- return len;
82
+ map &= MAKE_64BIT_MASK(0, len + 1);
83
+ if (map != 0) {
84
+ return 31 - clz32(map);
85
+ }
86
+
87
+ /* Bit 0 is always set for Normal SVE -- not so for Streaming SVE. */
88
+ assert(sm);
89
+ return ctz32(cpu->sme_vq.map);
90
+}
91
+
92
+uint32_t sve_vqm1_for_el(CPUARMState *env, int el)
39
+{
93
+{
40
+ uintptr_t x, y;
94
+ return sve_vqm1_for_el_sm(env, el, FIELD_EX64(env->svcr, SVCR, SM));
41
+
95
}
42
+ asm("mov %0, lr\n\t"
96
43
+ "pacia %0, sp\n\t" /* sigill if pauth not supported */
97
static void zcr_write(CPUARMState *env, const ARMCPRegInfo *ri,
44
+ "eor %0, %0, #4\n\t" /* corrupt single bit */
45
+ "mov %1, %0\n\t"
46
+ "autia %1, sp\n\t" /* validate corrupted pointer */
47
+ "xpaci %0\n\t" /* strip pac from corrupted pointer */
48
+ : "=r"(x), "=r"(y));
49
+
50
+ /*
51
+ * Once stripped, the corrupted pointer is of the form 0x0000...wxyz.
52
+ * We expect the autia to indicate failure, producing a pointer of the
53
+ * form 0x000e....wxyz. Use xpaci and != for the test, rather than
54
+ * extracting explicit bits from the top, because the location of the
55
+ * error code "e" depends on the configuration of virtual memory.
56
+ */
57
+ assert(x != y);
58
+ return 0;
59
+}
60
--
98
--
61
2.20.1
99
2.25.1
62
63
diff view generated by jsdifflib
1
From: Guenter Roeck <linux@roeck-us.net>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
After restoring a VM, serial parameters need to be updated to reflect
3
We need SVL separate from VL for RDSVL et al, as well as
4
restored register values. Implement a post_load function to handle this
4
ZA storage loads and stores, which do not require PSTATE.SM.
5
situation.
6
5
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Guenter Roeck <linux@roeck-us.net>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20200123052540.6132-6-linux@roeck-us.net
8
Message-id: 20220620175235.60881-20-richard.henderson@linaro.org
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
10
---
12
hw/char/exynos4210_uart.c | 10 ++++++++++
11
target/arm/cpu.h | 12 ++++++++++++
13
1 file changed, 10 insertions(+)
12
target/arm/translate.h | 1 +
13
target/arm/helper.c | 8 +++++++-
14
target/arm/translate-a64.c | 1 +
15
4 files changed, 21 insertions(+), 1 deletion(-)
14
16
15
diff --git a/hw/char/exynos4210_uart.c b/hw/char/exynos4210_uart.c
17
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
16
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
17
--- a/hw/char/exynos4210_uart.c
19
--- a/target/arm/cpu.h
18
+++ b/hw/char/exynos4210_uart.c
20
+++ b/target/arm/cpu.h
19
@@ -XXX,XX +XXX,XX @@ static void exynos4210_uart_reset(DeviceState *dev)
21
@@ -XXX,XX +XXX,XX @@ FIELD(TBFLAG_A64, MTE0_ACTIVE, 19, 1)
20
trace_exynos_uart_rxsize(s->channel, s->rx.size);
22
FIELD(TBFLAG_A64, SMEEXC_EL, 20, 2)
23
FIELD(TBFLAG_A64, PSTATE_SM, 22, 1)
24
FIELD(TBFLAG_A64, PSTATE_ZA, 23, 1)
25
+FIELD(TBFLAG_A64, SVL, 24, 4)
26
27
/*
28
* Helpers for using the above.
29
@@ -XXX,XX +XXX,XX @@ static inline int sve_vq(CPUARMState *env)
30
return EX_TBFLAG_A64(env->hflags, VL) + 1;
21
}
31
}
22
32
23
+static int exynos4210_uart_post_load(void *opaque, int version_id)
33
+/**
34
+ * sme_vq
35
+ * @env: the cpu context
36
+ *
37
+ * Return the SVL cached within env->hflags, in units of quadwords.
38
+ */
39
+static inline int sme_vq(CPUARMState *env)
24
+{
40
+{
25
+ Exynos4210UartState *s = (Exynos4210UartState *)opaque;
41
+ return EX_TBFLAG_A64(env->hflags, SVL) + 1;
26
+
27
+ exynos4210_uart_update_parameters(s);
28
+
29
+ return 0;
30
+}
42
+}
31
+
43
+
32
static const VMStateDescription vmstate_exynos4210_uart_fifo = {
44
static inline bool bswap_code(bool sctlr_b)
33
.name = "exynos4210.uart.fifo",
45
{
34
.version_id = 1,
46
#ifdef CONFIG_USER_ONLY
35
.minimum_version_id = 1,
47
diff --git a/target/arm/translate.h b/target/arm/translate.h
36
+ .post_load = exynos4210_uart_post_load,
48
index XXXXXXX..XXXXXXX 100644
37
.fields = (VMStateField[]) {
49
--- a/target/arm/translate.h
38
VMSTATE_UINT32(sp, Exynos4210UartFIFO),
50
+++ b/target/arm/translate.h
39
VMSTATE_UINT32(rp, Exynos4210UartFIFO),
51
@@ -XXX,XX +XXX,XX @@ typedef struct DisasContext {
52
int sve_excp_el; /* SVE exception EL or 0 if enabled */
53
int sme_excp_el; /* SME exception EL or 0 if enabled */
54
int vl; /* current vector length in bytes */
55
+ int svl; /* current streaming vector length in bytes */
56
bool vfp_enabled; /* FP enabled via FPSCR.EN */
57
int vec_len;
58
int vec_stride;
59
diff --git a/target/arm/helper.c b/target/arm/helper.c
60
index XXXXXXX..XXXXXXX 100644
61
--- a/target/arm/helper.c
62
+++ b/target/arm/helper.c
63
@@ -XXX,XX +XXX,XX @@ static CPUARMTBFlags rebuild_hflags_a64(CPUARMState *env, int el, int fp_el,
64
DP_TBFLAG_A64(flags, SVEEXC_EL, sve_el);
65
}
66
if (cpu_isar_feature(aa64_sme, env_archcpu(env))) {
67
- DP_TBFLAG_A64(flags, SMEEXC_EL, sme_exception_el(env, el));
68
+ int sme_el = sme_exception_el(env, el);
69
+
70
+ DP_TBFLAG_A64(flags, SMEEXC_EL, sme_el);
71
+ if (sme_el == 0) {
72
+ /* Similarly, do not compute SVL if SME is disabled. */
73
+ DP_TBFLAG_A64(flags, SVL, sve_vqm1_for_el_sm(env, el, true));
74
+ }
75
if (FIELD_EX64(env->svcr, SVCR, SM)) {
76
DP_TBFLAG_A64(flags, PSTATE_SM, 1);
77
}
78
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
79
index XXXXXXX..XXXXXXX 100644
80
--- a/target/arm/translate-a64.c
81
+++ b/target/arm/translate-a64.c
82
@@ -XXX,XX +XXX,XX @@ static void aarch64_tr_init_disas_context(DisasContextBase *dcbase,
83
dc->sve_excp_el = EX_TBFLAG_A64(tb_flags, SVEEXC_EL);
84
dc->sme_excp_el = EX_TBFLAG_A64(tb_flags, SMEEXC_EL);
85
dc->vl = (EX_TBFLAG_A64(tb_flags, VL) + 1) * 16;
86
+ dc->svl = (EX_TBFLAG_A64(tb_flags, SVL) + 1) * 16;
87
dc->pauth_active = EX_TBFLAG_A64(tb_flags, PAUTH_ACTIVE);
88
dc->bt = EX_TBFLAG_A64(tb_flags, BT);
89
dc->btype = EX_TBFLAG_A64(tb_flags, BTYPE);
40
--
90
--
41
2.20.1
91
2.25.1
42
43
diff view generated by jsdifflib
1
From: Guenter Roeck <linux@roeck-us.net>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
The driver already implements a receive FIFO, but it does not
3
We will need these functions in translate-sme.c.
4
handle receive FIFO trigger levels and timeout. Implement the
5
missing functionality.
6
4
7
Signed-off-by: Guenter Roeck <linux@roeck-us.net>
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Message-id: 20200123052540.6132-7-linux@roeck-us.net
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 20220620175235.60881-21-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
---
9
---
12
hw/char/exynos4210_uart.c | 117 ++++++++++++++++++++++++++++++--------
10
target/arm/translate-a64.h | 38 ++++++++++++++++++++++++++++++++++++++
13
hw/char/trace-events | 3 +-
11
target/arm/translate-sve.c | 36 ------------------------------------
14
2 files changed, 94 insertions(+), 26 deletions(-)
12
2 files changed, 38 insertions(+), 36 deletions(-)
15
13
16
diff --git a/hw/char/exynos4210_uart.c b/hw/char/exynos4210_uart.c
14
diff --git a/target/arm/translate-a64.h b/target/arm/translate-a64.h
17
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
18
--- a/hw/char/exynos4210_uart.c
16
--- a/target/arm/translate-a64.h
19
+++ b/hw/char/exynos4210_uart.c
17
+++ b/target/arm/translate-a64.h
20
@@ -XXX,XX +XXX,XX @@
18
@@ -XXX,XX +XXX,XX @@ static inline int vec_full_reg_size(DisasContext *s)
21
#include "migration/vmstate.h"
19
return s->vl;
22
#include "qemu/error-report.h"
23
#include "qemu/module.h"
24
+#include "qemu/timer.h"
25
#include "chardev/char-fe.h"
26
#include "chardev/char-serial.h"
27
28
@@ -XXX,XX +XXX,XX @@ static const Exynos4210UartReg exynos4210_uart_regs[] = {
29
#define ULCON_STOP_BIT_SHIFT 1
30
31
/* UART Tx/Rx Status */
32
+#define UTRSTAT_Rx_TIMEOUT 0x8
33
#define UTRSTAT_TRANSMITTER_EMPTY 0x4
34
#define UTRSTAT_Tx_BUFFER_EMPTY 0x2
35
#define UTRSTAT_Rx_BUFFER_DATA_READY 0x1
36
@@ -XXX,XX +XXX,XX @@ typedef struct Exynos4210UartState {
37
Exynos4210UartFIFO rx;
38
Exynos4210UartFIFO tx;
39
40
+ QEMUTimer *fifo_timeout_timer;
41
+ uint64_t wordtime; /* word time in ns */
42
+
43
CharBackend chr;
44
qemu_irq irq;
45
46
@@ -XXX,XX +XXX,XX @@ static void fifo_reset(Exynos4210UartFIFO *q)
47
q->rp = 0;
48
}
20
}
49
21
50
-static uint32_t exynos4210_uart_Tx_FIFO_trigger_level(const Exynos4210UartState *s)
22
+/*
51
+static uint32_t exynos4210_uart_FIFO_trigger_level(uint32_t channel,
23
+ * Return the offset info CPUARMState of the predicate vector register Pn.
52
+ uint32_t reg)
24
+ * Note for this purpose, FFR is P16.
53
{
25
+ */
54
- uint32_t level = 0;
26
+static inline int pred_full_reg_offset(DisasContext *s, int regno)
55
- uint32_t reg;
56
+ uint32_t level;
57
58
- reg = (s->reg[I_(UFCON)] & UFCON_Tx_FIFO_TRIGGER_LEVEL) >>
59
- UFCON_Tx_FIFO_TRIGGER_LEVEL_SHIFT;
60
-
61
- switch (s->channel) {
62
+ switch (channel) {
63
case 0:
64
level = reg * 32;
65
break;
66
@@ -XXX,XX +XXX,XX @@ static uint32_t exynos4210_uart_Tx_FIFO_trigger_level(const Exynos4210UartState
67
break;
68
default:
69
level = 0;
70
- trace_exynos_uart_channel_error(s->channel);
71
+ trace_exynos_uart_channel_error(channel);
72
+ break;
73
}
74
-
75
return level;
76
}
77
78
+static uint32_t
79
+exynos4210_uart_Tx_FIFO_trigger_level(const Exynos4210UartState *s)
80
+{
27
+{
81
+ uint32_t reg;
28
+ return offsetof(CPUARMState, vfp.pregs[regno]);
82
+
83
+ reg = (s->reg[I_(UFCON)] & UFCON_Tx_FIFO_TRIGGER_LEVEL) >>
84
+ UFCON_Tx_FIFO_TRIGGER_LEVEL_SHIFT;
85
+
86
+ return exynos4210_uart_FIFO_trigger_level(s->channel, reg);
87
+}
29
+}
88
+
30
+
89
+static uint32_t
31
+/* Return the byte size of the whole predicate register, VL / 64. */
90
+exynos4210_uart_Rx_FIFO_trigger_level(const Exynos4210UartState *s)
32
+static inline int pred_full_reg_size(DisasContext *s)
91
+{
33
+{
92
+ uint32_t reg;
34
+ return s->vl >> 3;
93
+
94
+ reg = ((s->reg[I_(UFCON)] & UFCON_Rx_FIFO_TRIGGER_LEVEL) >>
95
+ UFCON_Rx_FIFO_TRIGGER_LEVEL_SHIFT) + 1;
96
+
97
+ return exynos4210_uart_FIFO_trigger_level(s->channel, reg);
98
+}
35
+}
99
+
36
+
100
static void exynos4210_uart_update_irq(Exynos4210UartState *s)
37
+/*
101
{
38
+ * Round up the size of a register to a size allowed by
102
/*
39
+ * the tcg vector infrastructure. Any operation which uses this
103
@@ -XXX,XX +XXX,XX @@ static void exynos4210_uart_update_irq(Exynos4210UartState *s)
40
+ * size may assume that the bits above pred_full_reg_size are zero,
104
* transmit FIFO is smaller than the trigger level.
41
+ * and must leave them the same way.
105
*/
42
+ *
106
if (s->reg[I_(UFCON)] & UFCON_FIFO_ENABLE) {
43
+ * Note that this is not needed for the vector registers as they
107
-
44
+ * are always properly sized for tcg vectors.
108
uint32_t count = (s->reg[I_(UFSTAT)] & UFSTAT_Tx_FIFO_COUNT) >>
45
+ */
109
UFSTAT_Tx_FIFO_COUNT_SHIFT;
46
+static inline int size_for_gvec(int size)
110
111
if (count <= exynos4210_uart_Tx_FIFO_trigger_level(s)) {
112
s->reg[I_(UINTSP)] |= UINTSP_TXD;
113
}
114
+
115
+ /*
116
+ * Rx interrupt if trigger level is reached or if rx timeout
117
+ * interrupt is disabled and there is data in the receive buffer
118
+ */
119
+ count = fifo_elements_number(&s->rx);
120
+ if ((count && !(s->reg[I_(UCON)] & 0x80)) ||
121
+ count >= exynos4210_uart_Rx_FIFO_trigger_level(s)) {
122
+ s->reg[I_(UINTSP)] |= UINTSP_RXD;
123
+ timer_del(s->fifo_timeout_timer);
124
+ }
125
+ } else if (s->reg[I_(UTRSTAT)] & UTRSTAT_Rx_BUFFER_DATA_READY) {
126
+ s->reg[I_(UINTSP)] |= UINTSP_RXD;
127
}
128
129
s->reg[I_(UINTP)] = s->reg[I_(UINTSP)] & ~s->reg[I_(UINTM)];
130
@@ -XXX,XX +XXX,XX @@ static void exynos4210_uart_update_irq(Exynos4210UartState *s)
131
}
132
}
133
134
+static void exynos4210_uart_timeout_int(void *opaque)
135
+{
47
+{
136
+ Exynos4210UartState *s = opaque;
48
+ if (size <= 8) {
137
+
49
+ return 8;
138
+ trace_exynos_uart_rx_timeout(s->channel, s->reg[I_(UTRSTAT)],
50
+ } else {
139
+ s->reg[I_(UINTSP)]);
51
+ return QEMU_ALIGN_UP(size, 16);
140
+
141
+ if ((s->reg[I_(UTRSTAT)] & UTRSTAT_Rx_BUFFER_DATA_READY) ||
142
+ (s->reg[I_(UCON)] & (1 << 11))) {
143
+ s->reg[I_(UINTSP)] |= UINTSP_RXD;
144
+ s->reg[I_(UTRSTAT)] |= UTRSTAT_Rx_TIMEOUT;
145
+ exynos4210_uart_update_irq(s);
146
+ }
52
+ }
147
+}
53
+}
148
+
54
+
149
static void exynos4210_uart_update_parameters(Exynos4210UartState *s)
55
+static inline int pred_gvec_reg_size(DisasContext *s)
150
{
56
+{
151
int speed, parity, data_bits, stop_bits;
57
+ return size_for_gvec(pred_full_reg_size(s));
152
@@ -XXX,XX +XXX,XX @@ static void exynos4210_uart_update_parameters(Exynos4210UartState *s)
153
ssp.data_bits = data_bits;
154
ssp.stop_bits = stop_bits;
155
156
+ s->wordtime = NANOSECONDS_PER_SECOND * (data_bits + stop_bits + 1) / speed;
157
+
158
qemu_chr_fe_ioctl(&s->chr, CHR_IOCTL_SERIAL_SET_PARAMS, &ssp);
159
160
trace_exynos_uart_update_params(
161
- s->channel, speed, parity, data_bits, stop_bits);
162
+ s->channel, speed, parity, data_bits, stop_bits, s->wordtime);
163
+}
58
+}
164
+
59
+
165
+static void exynos4210_uart_rx_timeout_set(Exynos4210UartState *s)
60
bool disas_sve(DisasContext *, uint32_t);
166
+{
61
167
+ if (s->reg[I_(UCON)] & 0x80) {
62
void gen_gvec_rax1(unsigned vece, uint32_t rd_ofs, uint32_t rn_ofs,
168
+ uint32_t timeout = ((s->reg[I_(UCON)] >> 12) & 0x0f) * s->wordtime;
63
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
169
+
64
index XXXXXXX..XXXXXXX 100644
170
+ timer_mod(s->fifo_timeout_timer,
65
--- a/target/arm/translate-sve.c
171
+ qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL) + timeout);
66
+++ b/target/arm/translate-sve.c
172
+ } else {
67
@@ -XXX,XX +XXX,XX @@ static inline int msz_dtype(DisasContext *s, int msz)
173
+ timer_del(s->fifo_timeout_timer);
68
* Implement all of the translator functions referenced by the decoder.
174
+ }
69
*/
175
}
70
176
71
-/* Return the offset info CPUARMState of the predicate vector register Pn.
177
static void exynos4210_uart_write(void *opaque, hwaddr offset,
72
- * Note for this purpose, FFR is P16.
178
@@ -XXX,XX +XXX,XX @@ static void exynos4210_uart_write(void *opaque, hwaddr offset,
73
- */
179
exynos4210_uart_update_irq(s);
74
-static inline int pred_full_reg_offset(DisasContext *s, int regno)
180
break;
75
-{
181
case UTRSTAT:
76
- return offsetof(CPUARMState, vfp.pregs[regno]);
182
+ if (val & UTRSTAT_Rx_TIMEOUT) {
77
-}
183
+ s->reg[I_(UTRSTAT)] &= ~UTRSTAT_Rx_TIMEOUT;
184
+ }
185
+ break;
186
case UERSTAT:
187
case UFSTAT:
188
case UMSTAT:
189
@@ -XXX,XX +XXX,XX @@ static void exynos4210_uart_write(void *opaque, hwaddr offset,
190
break;
191
}
192
}
193
+
194
static uint64_t exynos4210_uart_read(void *opaque, hwaddr offset,
195
unsigned size)
196
{
197
@@ -XXX,XX +XXX,XX @@ static int exynos4210_uart_can_receive(void *opaque)
198
return fifo_empty_elements_number(&s->rx);
199
}
200
201
-
78
-
202
static void exynos4210_uart_receive(void *opaque, const uint8_t *buf, int size)
79
-/* Return the byte size of the whole predicate register, VL / 64. */
203
{
80
-static inline int pred_full_reg_size(DisasContext *s)
204
Exynos4210UartState *s = (Exynos4210UartState *)opaque;
81
-{
205
@@ -XXX,XX +XXX,XX @@ static void exynos4210_uart_receive(void *opaque, const uint8_t *buf, int size)
82
- return s->vl >> 3;
206
83
-}
207
if (s->reg[I_(UFCON)] & UFCON_FIFO_ENABLE) {
84
-
208
if (fifo_empty_elements_number(&s->rx) < size) {
85
-/* Round up the size of a register to a size allowed by
209
- for (i = 0; i < fifo_empty_elements_number(&s->rx); i++) {
86
- * the tcg vector infrastructure. Any operation which uses this
210
- fifo_store(&s->rx, buf[i]);
87
- * size may assume that the bits above pred_full_reg_size are zero,
211
- }
88
- * and must leave them the same way.
212
+ size = fifo_empty_elements_number(&s->rx);
89
- *
213
s->reg[I_(UINTSP)] |= UINTSP_ERROR;
90
- * Note that this is not needed for the vector registers as they
214
- s->reg[I_(UTRSTAT)] |= UTRSTAT_Rx_BUFFER_DATA_READY;
91
- * are always properly sized for tcg vectors.
215
- } else {
92
- */
216
- for (i = 0; i < size; i++) {
93
-static int size_for_gvec(int size)
217
- fifo_store(&s->rx, buf[i]);
94
-{
218
- }
95
- if (size <= 8) {
219
- s->reg[I_(UTRSTAT)] |= UTRSTAT_Rx_BUFFER_DATA_READY;
96
- return 8;
220
}
97
- } else {
221
- /* XXX: Around here we maybe should check Rx trigger level */
98
- return QEMU_ALIGN_UP(size, 16);
222
- s->reg[I_(UINTSP)] |= UINTSP_RXD;
99
- }
223
+ for (i = 0; i < size; i++) {
100
-}
224
+ fifo_store(&s->rx, buf[i]);
101
-
225
+ }
102
-static int pred_gvec_reg_size(DisasContext *s)
226
+ exynos4210_uart_rx_timeout_set(s);
103
-{
227
} else {
104
- return size_for_gvec(pred_full_reg_size(s));
228
s->reg[I_(URXH)] = buf[0];
105
-}
229
- s->reg[I_(UINTSP)] |= UINTSP_RXD;
106
-
230
- s->reg[I_(UTRSTAT)] |= UTRSTAT_Rx_BUFFER_DATA_READY;
107
/* Invoke an out-of-line helper on 2 Zregs. */
231
}
108
static bool gen_gvec_ool_zz(DisasContext *s, gen_helper_gvec_2 *fn,
232
+ s->reg[I_(UTRSTAT)] |= UTRSTAT_Rx_BUFFER_DATA_READY;
109
int rd, int rn, int data)
233
234
exynos4210_uart_update_irq(s);
235
}
236
@@ -XXX,XX +XXX,XX @@ static int exynos4210_uart_post_load(void *opaque, int version_id)
237
Exynos4210UartState *s = (Exynos4210UartState *)opaque;
238
239
exynos4210_uart_update_parameters(s);
240
+ exynos4210_uart_rx_timeout_set(s);
241
242
return 0;
243
}
244
@@ -XXX,XX +XXX,XX @@ static void exynos4210_uart_init(Object *obj)
245
SysBusDevice *dev = SYS_BUS_DEVICE(obj);
246
Exynos4210UartState *s = EXYNOS4210_UART(dev);
247
248
+ s->fifo_timeout_timer = timer_new_ns(QEMU_CLOCK_VIRTUAL,
249
+ exynos4210_uart_timeout_int, s);
250
+ s->wordtime = NANOSECONDS_PER_SECOND * 10 / 9600;
251
+
252
/* memory mapping */
253
memory_region_init_io(&s->iomem, obj, &exynos4210_uart_ops, s,
254
"exynos4210.uart", EXYNOS4210_UART_REGS_MEM_SIZE);
255
diff --git a/hw/char/trace-events b/hw/char/trace-events
256
index XXXXXXX..XXXXXXX 100644
257
--- a/hw/char/trace-events
258
+++ b/hw/char/trace-events
259
@@ -XXX,XX +XXX,XX @@ nrf51_uart_write(uint64_t addr, uint64_t value, unsigned int size) "addr 0x%" PR
260
# exynos4210_uart.c
261
exynos_uart_irq_raised(uint32_t channel, uint32_t reg) "UART%d: IRQ raised: 0x%08"PRIx32
262
exynos_uart_irq_lowered(uint32_t channel) "UART%d: IRQ lowered"
263
-exynos_uart_update_params(uint32_t channel, int speed, uint8_t parity, int data, int stop) "UART%d: speed: %d, parity: %c, data bits: %d, stop bits: %d"
264
+exynos_uart_update_params(uint32_t channel, int speed, uint8_t parity, int data, int stop, uint64_t wordtime) "UART%d: speed: %d, parity: %c, data bits: %d, stop bits: %d wordtime: %"PRId64"ns"
265
exynos_uart_write(uint32_t channel, uint32_t offset, const char *name, uint64_t val) "UART%d: <0x%04x> %s <- 0x%" PRIx64
266
exynos_uart_read(uint32_t channel, uint32_t offset, const char *name, uint64_t val) "UART%d: <0x%04x> %s -> 0x%" PRIx64
267
exynos_uart_rx_fifo_reset(uint32_t channel) "UART%d: Rx FIFO Reset"
268
@@ -XXX,XX +XXX,XX @@ exynos_uart_rx_error(uint32_t channel) "UART%d: Rx error"
269
exynos_uart_wo_read(uint32_t channel, const char *name, uint32_t reg) "UART%d: Trying to read from WO register: %s [0x%04"PRIx32"]"
270
exynos_uart_rxsize(uint32_t channel, uint32_t size) "UART%d: Rx FIFO size: %d"
271
exynos_uart_channel_error(uint32_t channel) "Wrong UART channel number: %d"
272
+exynos_uart_rx_timeout(uint32_t channel, uint32_t stat, uint32_t intsp) "UART%d: Rx timeout stat=0x%x intsp=0x%x"
273
--
110
--
274
2.20.1
111
2.25.1
275
276
diff view generated by jsdifflib
1
From: Keqian Zhu <zhukeqian1@huawei.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
We can use existing helper function to trigger hotplug handler
3
Move the code from hw/arm/virt.c that is supposed
4
plug, which makes code clearer.
4
to handle v7 into the one function.
5
5
6
Reviewed-by: Igor Mammedov <imammedo@redhat.com>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Signed-off-by: Keqian Zhu <zhukeqian1@huawei.com>
7
Reported-by: He Zhe <zhe.he@windriver.com>
8
Message-id: 20200120012755.44581-3-zhukeqian1@huawei.com
8
Message-id: 20220619001541.131672-2-richard.henderson@linaro.org
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
---
11
hw/arm/virt.c | 6 +++---
12
hw/arm/virt.c | 10 +---------
12
1 file changed, 3 insertions(+), 3 deletions(-)
13
target/arm/ptw.c | 24 ++++++++++++++++--------
14
2 files changed, 17 insertions(+), 17 deletions(-)
13
15
14
diff --git a/hw/arm/virt.c b/hw/arm/virt.c
16
diff --git a/hw/arm/virt.c b/hw/arm/virt.c
15
index XXXXXXX..XXXXXXX 100644
17
index XXXXXXX..XXXXXXX 100644
16
--- a/hw/arm/virt.c
18
--- a/hw/arm/virt.c
17
+++ b/hw/arm/virt.c
19
+++ b/hw/arm/virt.c
18
@@ -XXX,XX +XXX,XX @@ static void virt_memory_pre_plug(HotplugHandler *hotplug_dev, DeviceState *dev,
20
@@ -XXX,XX +XXX,XX @@ static void machvirt_init(MachineState *machine)
19
static void virt_memory_plug(HotplugHandler *hotplug_dev,
21
cpuobj = object_new(possible_cpus->cpus[0].type);
20
DeviceState *dev, Error **errp)
22
armcpu = ARM_CPU(cpuobj);
23
24
- if (object_property_get_bool(cpuobj, "aarch64", NULL)) {
25
- pa_bits = arm_pamax(armcpu);
26
- } else if (arm_feature(&armcpu->env, ARM_FEATURE_LPAE)) {
27
- /* v7 with LPAE */
28
- pa_bits = 40;
29
- } else {
30
- /* Anything else */
31
- pa_bits = 32;
32
- }
33
+ pa_bits = arm_pamax(armcpu);
34
35
object_unref(cpuobj);
36
37
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
38
index XXXXXXX..XXXXXXX 100644
39
--- a/target/arm/ptw.c
40
+++ b/target/arm/ptw.c
41
@@ -XXX,XX +XXX,XX @@ static const uint8_t pamax_map[] = {
42
/* The cpu-specific constant value of PAMax; also used by hw/arm/virt. */
43
unsigned int arm_pamax(ARMCPU *cpu)
21
{
44
{
22
- HotplugHandlerClass *hhc;
45
- unsigned int parange =
23
VirtMachineState *vms = VIRT_MACHINE(hotplug_dev);
46
- FIELD_EX64(cpu->isar.id_aa64mmfr0, ID_AA64MMFR0, PARANGE);
24
Error *local_err = NULL;
47
+ if (arm_feature(&cpu->env, ARM_FEATURE_AARCH64)) {
25
48
+ unsigned int parange =
26
@@ -XXX,XX +XXX,XX @@ static void virt_memory_plug(HotplugHandler *hotplug_dev,
49
+ FIELD_EX64(cpu->isar.id_aa64mmfr0, ID_AA64MMFR0, PARANGE);
27
goto out;
50
28
}
51
- /*
29
52
- * id_aa64mmfr0 is a read-only register so values outside of the
30
- hhc = HOTPLUG_HANDLER_GET_CLASS(vms->acpi_dev);
53
- * supported mappings can be considered an implementation error.
31
- hhc->plug(HOTPLUG_HANDLER(vms->acpi_dev), dev, &error_abort);
54
- */
32
+ hotplug_handler_plug(HOTPLUG_HANDLER(vms->acpi_dev),
55
- assert(parange < ARRAY_SIZE(pamax_map));
33
+ dev, &error_abort);
56
- return pamax_map[parange];
34
+
57
+ /*
35
out:
58
+ * id_aa64mmfr0 is a read-only register so values outside of the
36
error_propagate(errp, local_err);
59
+ * supported mappings can be considered an implementation error.
60
+ */
61
+ assert(parange < ARRAY_SIZE(pamax_map));
62
+ return pamax_map[parange];
63
+ }
64
+ if (arm_feature(&cpu->env, ARM_FEATURE_LPAE)) {
65
+ /* v7 with LPAE */
66
+ return 40;
67
+ }
68
+ /* Anything else */
69
+ return 32;
37
}
70
}
71
72
/*
38
--
73
--
39
2.20.1
74
2.25.1
40
41
diff view generated by jsdifflib
1
From: Vincent Dehors <vincent.dehors@smile.fr>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
In the PAC computation, sbox was applied over wrong bits.
3
In machvirt_init we create a cpu but do not fully initialize it.
4
As this is a 4-bit sbox, bit index should be incremented by 4 instead of 16.
4
Thus the propagation of V7VE to LPAE has not been done, and we
5
compute the wrong value for some v7 cpus, e.g. cortex-a15.
5
6
6
Test vector from QARMA paper (https://eprint.iacr.org/2016/444.pdf) was
7
Resolves: https://gitlab.com/qemu-project/qemu/-/issues/1078
7
used to verify one computation of the pauth_computepac() function which
8
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
uses sbox2.
9
Reported-by: He Zhe <zhe.he@windriver.com>
9
10
Message-id: 20220619001541.131672-3-richard.henderson@linaro.org
10
Launchpad: https://bugs.launchpad.net/bugs/1859713
11
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
12
Signed-off-by: Vincent DEHORS <vincent.dehors@smile.fr>
13
Signed-off-by: Adrien GRASSEIN <adrien.grassein@smile.fr>
14
Message-id: 20200116230809.19078-2-richard.henderson@linaro.org
15
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
16
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
---
13
---
18
target/arm/pauth_helper.c | 4 ++--
14
target/arm/ptw.c | 8 +++++++-
19
1 file changed, 2 insertions(+), 2 deletions(-)
15
1 file changed, 7 insertions(+), 1 deletion(-)
20
16
21
diff --git a/target/arm/pauth_helper.c b/target/arm/pauth_helper.c
17
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
22
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
23
--- a/target/arm/pauth_helper.c
19
--- a/target/arm/ptw.c
24
+++ b/target/arm/pauth_helper.c
20
+++ b/target/arm/ptw.c
25
@@ -XXX,XX +XXX,XX @@ static uint64_t pac_sub(uint64_t i)
21
@@ -XXX,XX +XXX,XX @@ unsigned int arm_pamax(ARMCPU *cpu)
26
uint64_t o = 0;
22
assert(parange < ARRAY_SIZE(pamax_map));
27
int b;
23
return pamax_map[parange];
28
29
- for (b = 0; b < 64; b += 16) {
30
+ for (b = 0; b < 64; b += 4) {
31
o |= (uint64_t)sub[(i >> b) & 0xf] << b;
32
}
24
}
33
return o;
25
- if (arm_feature(&cpu->env, ARM_FEATURE_LPAE)) {
34
@@ -XXX,XX +XXX,XX @@ static uint64_t pac_inv_sub(uint64_t i)
26
+
35
uint64_t o = 0;
27
+ /*
36
int b;
28
+ * In machvirt_init, we call arm_pamax on a cpu that is not fully
37
29
+ * initialized, so we can't rely on the propagation done in realize.
38
- for (b = 0; b < 64; b += 16) {
30
+ */
39
+ for (b = 0; b < 64; b += 4) {
31
+ if (arm_feature(&cpu->env, ARM_FEATURE_LPAE) ||
40
o |= (uint64_t)inv_sub[(i >> b) & 0xf] << b;
32
+ arm_feature(&cpu->env, ARM_FEATURE_V7VE)) {
33
/* v7 with LPAE */
34
return 40;
41
}
35
}
42
return o;
43
--
36
--
44
2.20.1
37
2.25.1
45
46
diff view generated by jsdifflib