1 | First pullreq for 6.0: mostly my v8.1M work, plus some other | 1 | Hi; this is the latest target-arm queue; most of this is a refactoring |
---|---|---|---|
2 | bits and pieces. (I still have a lot of stuff in my to-review | 2 | patchset from RTH for the arm page-table-walk emulation. |
3 | folder, which I may or may not get to before the Christmas break...) | ||
4 | 3 | ||
5 | thanks | 4 | thanks |
6 | -- PMM | 5 | -- PMM |
7 | 6 | ||
8 | The following changes since commit 5e7b204dbfae9a562fc73684986f936b97f63877: | 7 | The following changes since commit f1d33f55c47dfdaf8daacd618588ad3ae4c452d1: |
9 | 8 | ||
10 | Merge remote-tracking branch 'remotes/mst/tags/for_upstream' into staging (2020-12-09 20:08:54 +0000) | 9 | Merge tag 'pull-testing-gdbstub-plugins-gitdm-061022-3' of https://github.com/stsquad/qemu into staging (2022-10-06 07:11:56 -0400) |
11 | 10 | ||
12 | are available in the Git repository at: | 11 | are available in the Git repository at: |
13 | 12 | ||
14 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20201210 | 13 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20221010 |
15 | 14 | ||
16 | for you to fetch changes up to 71f916be1c7e9ede0e37d9cabc781b5a9e8638ff: | 15 | for you to fetch changes up to 915f62844cf62e428c7c178149b5ff1cbe129b07: |
17 | 16 | ||
18 | hw/arm/armv7m: Correct typo in QOM object name (2020-12-10 11:44:56 +0000) | 17 | docs/system/arm/emulation.rst: Report FEAT_GTG support (2022-10-10 14:52:25 +0100) |
19 | 18 | ||
20 | ---------------------------------------------------------------- | 19 | ---------------------------------------------------------------- |
21 | target-arm queue: | 20 | target-arm queue: |
22 | * hw/arm/smmuv3: Fix up L1STD_SPAN decoding | 21 | * Retry KVM_CREATE_VM call if it fails EINTR |
23 | * xlnx-zynqmp: Support Xilinx ZynqMP CAN controllers | 22 | * allow setting SCR_EL3.EnTP2 when FEAT_SME is implemented |
24 | * sbsa-ref: allow to use Cortex-A53/57/72 cpus | 23 | * docs/nuvoton: Update URL for images |
25 | * Various minor code cleanups | 24 | * refactoring of page table walk code |
26 | * hw/intc/armv7m_nvic: Make all of system PPB range be RAZWI/BusFault | 25 | * hw/arm/boot: set CPTR_EL3.ESM and SCR_EL3.EnTP2 when booting Linux with EL3 |
27 | * Implement more pieces of ARMv8.1M support | 26 | * Don't allow guest to use unimplemented granule sizes |
27 | * Report FEAT_GTG support | ||
28 | 28 | ||
29 | ---------------------------------------------------------------- | 29 | ---------------------------------------------------------------- |
30 | Alex Chen (4): | 30 | Jerome Forissier (2): |
31 | i.MX25: Fix bad printf format specifiers | 31 | target/arm: allow setting SCR_EL3.EnTP2 when FEAT_SME is implemented |
32 | i.MX31: Fix bad printf format specifiers | 32 | hw/arm/boot: set CPTR_EL3.ESM and SCR_EL3.EnTP2 when booting Linux with EL3 |
33 | i.MX6: Fix bad printf format specifiers | ||
34 | i.MX6ul: Fix bad printf format specifiers | ||
35 | 33 | ||
36 | Havard Skinnemoen (1): | 34 | Joel Stanley (1): |
37 | tests/qtest/npcm7xx_rng-test: dump random data on failure | 35 | docs/nuvoton: Update URL for images |
38 | 36 | ||
39 | Kunkun Jiang (1): | 37 | Peter Maydell (4): |
40 | hw/arm/smmuv3: Fix up L1STD_SPAN decoding | 38 | target/arm/kvm: Retry KVM_CREATE_VM call if it fails EINTR |
39 | target/arm: Don't allow guest to use unimplemented granule sizes | ||
40 | target/arm: Use ARMGranuleSize in ARMVAParameters | ||
41 | docs/system/arm/emulation.rst: Report FEAT_GTG support | ||
41 | 42 | ||
42 | Marcin Juszkiewicz (1): | 43 | Richard Henderson (21): |
43 | sbsa-ref: allow to use Cortex-A53/57/72 cpus | 44 | target/arm: Split s2walk_secure from ipa_secure in get_phys_addr |
45 | target/arm: Make the final stage1+2 write to secure be unconditional | ||
46 | target/arm: Add is_secure parameter to get_phys_addr_lpae | ||
47 | target/arm: Fix S2 disabled check in S1_ptw_translate | ||
48 | target/arm: Add is_secure parameter to regime_translation_disabled | ||
49 | target/arm: Split out get_phys_addr_with_secure | ||
50 | target/arm: Add is_secure parameter to v7m_read_half_insn | ||
51 | target/arm: Add TBFLAG_M32.SECURE | ||
52 | target/arm: Merge regime_is_secure into get_phys_addr | ||
53 | target/arm: Add is_secure parameter to do_ats_write | ||
54 | target/arm: Fold secure and non-secure a-profile mmu indexes | ||
55 | target/arm: Reorg regime_translation_disabled | ||
56 | target/arm: Drop secure check for HCR.TGE vs SCTLR_EL1.M | ||
57 | target/arm: Introduce arm_hcr_el2_eff_secstate | ||
58 | target/arm: Hoist read of *is_secure in S1_ptw_translate | ||
59 | target/arm: Remove env argument from combined_attrs_fwb | ||
60 | target/arm: Pass HCR to attribute subroutines. | ||
61 | target/arm: Fix ATS12NSO* from S PL1 | ||
62 | target/arm: Split out get_phys_addr_disabled | ||
63 | target/arm: Fix cacheattr in get_phys_addr_disabled | ||
64 | target/arm: Use tlb_set_page_full | ||
44 | 65 | ||
45 | Peter Maydell (25): | 66 | docs/system/arm/emulation.rst | 1 + |
46 | hw/intc/armv7m_nvic: Make all of system PPB range be RAZWI/BusFault | 67 | docs/system/arm/nuvoton.rst | 4 +- |
47 | target/arm: Implement v8.1M PXN extension | 68 | target/arm/cpu-param.h | 2 +- |
48 | target/arm: Don't clobber ID_PFR1.Security on M-profile cores | 69 | target/arm/cpu.h | 181 ++++++++------ |
49 | target/arm: Implement VSCCLRM insn | 70 | target/arm/internals.h | 150 ++++++----- |
50 | target/arm: Implement CLRM instruction | 71 | hw/arm/boot.c | 4 + |
51 | target/arm: Enforce M-profile VMRS/VMSR register restrictions | 72 | target/arm/helper.c | 332 ++++++++++++++---------- |
52 | target/arm: Refactor M-profile VMSR/VMRS handling | 73 | target/arm/kvm.c | 4 +- |
53 | target/arm: Move general-use constant expanders up in translate.c | 74 | target/arm/m_helper.c | 29 ++- |
54 | target/arm: Implement VLDR/VSTR system register | 75 | target/arm/ptw.c | 570 ++++++++++++++++++++++-------------------- |
55 | target/arm: Implement M-profile FPSCR_nzcvqc | 76 | target/arm/tlb_helper.c | 9 +- |
56 | target/arm: Use new FPCR_NZCV_MASK constant | 77 | target/arm/translate-a64.c | 8 - |
57 | target/arm: Factor out preserve-fp-state from full_vfp_access_check() | 78 | target/arm/translate.c | 9 +- |
58 | target/arm: Implement FPCXT_S fp system register | 79 | 13 files changed, 717 insertions(+), 586 deletions(-) |
59 | hw/intc/armv7m_nvic: Update FPDSCR masking for v8.1M | ||
60 | target/arm: For v8.1M, always clear R0-R3, R12, APSR, EPSR on exception entry | ||
61 | target/arm: In v8.1M, don't set HFSR.FORCED on vector table fetch failures | ||
62 | target/arm: Implement v8.1M REVIDR register | ||
63 | target/arm: Implement new v8.1M NOCP check for exception return | ||
64 | target/arm: Implement new v8.1M VLLDM and VLSTM encodings | ||
65 | hw/intc/armv7m_nvic: Support v8.1M CCR.TRD bit | ||
66 | target/arm: Implement CCR_S.TRD behaviour for SG insns | ||
67 | hw/intc/armv7m_nvic: Fix "return from inactive handler" check | ||
68 | target/arm: Implement M-profile "minimal RAS implementation" | ||
69 | hw/intc/armv7m_nvic: Implement read/write for RAS register block | ||
70 | hw/arm/armv7m: Correct typo in QOM object name | ||
71 | |||
72 | Vikram Garhwal (4): | ||
73 | hw/net/can: Introduce Xilinx ZynqMP CAN controller | ||
74 | xlnx-zynqmp: Connect Xilinx ZynqMP CAN controllers | ||
75 | tests/qtest: Introduce tests for Xilinx ZynqMP CAN controller | ||
76 | MAINTAINERS: Add maintainer entry for Xilinx ZynqMP CAN controller | ||
77 | |||
78 | meson.build | 1 + | ||
79 | hw/arm/smmuv3-internal.h | 2 +- | ||
80 | hw/net/can/trace.h | 1 + | ||
81 | include/hw/arm/xlnx-zynqmp.h | 8 + | ||
82 | include/hw/intc/armv7m_nvic.h | 2 + | ||
83 | include/hw/net/xlnx-zynqmp-can.h | 78 +++ | ||
84 | target/arm/cpu.h | 46 ++ | ||
85 | target/arm/m-nocp.decode | 10 +- | ||
86 | target/arm/t32.decode | 10 +- | ||
87 | target/arm/vfp.decode | 14 + | ||
88 | hw/arm/armv7m.c | 4 +- | ||
89 | hw/arm/sbsa-ref.c | 23 +- | ||
90 | hw/arm/xlnx-zcu102.c | 20 + | ||
91 | hw/arm/xlnx-zynqmp.c | 34 ++ | ||
92 | hw/intc/armv7m_nvic.c | 246 ++++++-- | ||
93 | hw/misc/imx25_ccm.c | 12 +- | ||
94 | hw/misc/imx31_ccm.c | 14 +- | ||
95 | hw/misc/imx6_ccm.c | 20 +- | ||
96 | hw/misc/imx6_src.c | 2 +- | ||
97 | hw/misc/imx6ul_ccm.c | 4 +- | ||
98 | hw/misc/imx_ccm.c | 4 +- | ||
99 | hw/net/can/xlnx-zynqmp-can.c | 1161 ++++++++++++++++++++++++++++++++++++++ | ||
100 | target/arm/cpu.c | 5 +- | ||
101 | target/arm/helper.c | 7 +- | ||
102 | target/arm/m_helper.c | 130 ++++- | ||
103 | target/arm/translate.c | 105 +++- | ||
104 | tests/qtest/npcm7xx_rng-test.c | 12 + | ||
105 | tests/qtest/xlnx-can-test.c | 360 ++++++++++++ | ||
106 | MAINTAINERS | 8 + | ||
107 | hw/Kconfig | 1 + | ||
108 | hw/net/can/meson.build | 1 + | ||
109 | hw/net/can/trace-events | 9 + | ||
110 | target/arm/translate-vfp.c.inc | 511 ++++++++++++++++- | ||
111 | tests/qtest/meson.build | 1 + | ||
112 | 34 files changed, 2713 insertions(+), 153 deletions(-) | ||
113 | create mode 100644 hw/net/can/trace.h | ||
114 | create mode 100644 include/hw/net/xlnx-zynqmp-can.h | ||
115 | create mode 100644 hw/net/can/xlnx-zynqmp-can.c | ||
116 | create mode 100644 tests/qtest/xlnx-can-test.c | ||
117 | create mode 100644 hw/net/can/trace-events | ||
118 | diff view generated by jsdifflib |
1 | Implement the new-in-v8.1M FPCXT_S floating point system register. | 1 | Occasionally the KVM_CREATE_VM ioctl can return EINTR, even though |
---|---|---|---|
2 | This is for saving and restoring the secure floating point context, | 2 | there is no pending signal to be taken. In commit 94ccff13382055 |
3 | and it reads and writes bits [27:0] from the FPSCR and the | 3 | we added a retry-on-EINTR loop to the KVM_CREATE_VM call in the |
4 | CONTROL.SFPA bit in bit [31]. | 4 | generic KVM code. Adopt the same approach for the use of the |
5 | ioctl in the Arm-specific KVM code (where we use it to create a | ||
6 | scratch VM for probing for various things). | ||
5 | 7 | ||
8 | For more information, see the mailing list thread: | ||
9 | https://lore.kernel.org/qemu-devel/8735e0s1zw.wl-maz@kernel.org/ | ||
10 | |||
11 | Reported-by: Vitaly Chikunov <vt@altlinux.org> | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 13 | Reviewed-by: Vitaly Chikunov <vt@altlinux.org> |
8 | Message-id: 20201119215617.29887-14-peter.maydell@linaro.org | 14 | Reviewed-by: Eric Auger <eric.auger@redhat.com> |
15 | Acked-by: Marc Zyngier <maz@kernel.org> | ||
16 | Message-id: 20220930113824.1933293-1-peter.maydell@linaro.org | ||
9 | --- | 17 | --- |
10 | target/arm/translate-vfp.c.inc | 58 ++++++++++++++++++++++++++++++++++ | 18 | target/arm/kvm.c | 4 +++- |
11 | 1 file changed, 58 insertions(+) | 19 | 1 file changed, 3 insertions(+), 1 deletion(-) |
12 | 20 | ||
13 | diff --git a/target/arm/translate-vfp.c.inc b/target/arm/translate-vfp.c.inc | 21 | diff --git a/target/arm/kvm.c b/target/arm/kvm.c |
14 | index XXXXXXX..XXXXXXX 100644 | 22 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/target/arm/translate-vfp.c.inc | 23 | --- a/target/arm/kvm.c |
16 | +++ b/target/arm/translate-vfp.c.inc | 24 | +++ b/target/arm/kvm.c |
17 | @@ -XXX,XX +XXX,XX @@ static FPSysRegCheckResult fp_sysreg_checks(DisasContext *s, int regno) | 25 | @@ -XXX,XX +XXX,XX @@ bool kvm_arm_create_scratch_host_vcpu(const uint32_t *cpus_to_try, |
18 | return false; | 26 | if (max_vm_pa_size < 0) { |
19 | } | 27 | max_vm_pa_size = 0; |
20 | break; | ||
21 | + case ARM_VFP_FPCXT_S: | ||
22 | + if (!arm_dc_feature(s, ARM_FEATURE_V8_1M)) { | ||
23 | + return false; | ||
24 | + } | ||
25 | + if (!s->v8m_secure) { | ||
26 | + return false; | ||
27 | + } | ||
28 | + break; | ||
29 | default: | ||
30 | return FPSysRegCheckFailed; | ||
31 | } | 28 | } |
32 | @@ -XXX,XX +XXX,XX @@ static bool gen_M_fp_sysreg_write(DisasContext *s, int regno, | 29 | - vmfd = ioctl(kvmfd, KVM_CREATE_VM, max_vm_pa_size); |
33 | tcg_temp_free_i32(tmp); | 30 | + do { |
34 | break; | 31 | + vmfd = ioctl(kvmfd, KVM_CREATE_VM, max_vm_pa_size); |
35 | } | 32 | + } while (vmfd == -1 && errno == EINTR); |
36 | + case ARM_VFP_FPCXT_S: | 33 | if (vmfd < 0) { |
37 | + { | 34 | goto err; |
38 | + TCGv_i32 sfpa, control, fpscr; | ||
39 | + /* Set FPSCR[27:0] and CONTROL.SFPA from value */ | ||
40 | + tmp = loadfn(s, opaque); | ||
41 | + sfpa = tcg_temp_new_i32(); | ||
42 | + tcg_gen_shri_i32(sfpa, tmp, 31); | ||
43 | + control = load_cpu_field(v7m.control[M_REG_S]); | ||
44 | + tcg_gen_deposit_i32(control, control, sfpa, | ||
45 | + R_V7M_CONTROL_SFPA_SHIFT, 1); | ||
46 | + store_cpu_field(control, v7m.control[M_REG_S]); | ||
47 | + fpscr = load_cpu_field(vfp.xregs[ARM_VFP_FPSCR]); | ||
48 | + tcg_gen_andi_i32(fpscr, fpscr, FPCR_NZCV_MASK); | ||
49 | + tcg_gen_andi_i32(tmp, tmp, ~FPCR_NZCV_MASK); | ||
50 | + tcg_gen_or_i32(fpscr, fpscr, tmp); | ||
51 | + store_cpu_field(fpscr, vfp.xregs[ARM_VFP_FPSCR]); | ||
52 | + tcg_temp_free_i32(tmp); | ||
53 | + tcg_temp_free_i32(sfpa); | ||
54 | + break; | ||
55 | + } | ||
56 | default: | ||
57 | g_assert_not_reached(); | ||
58 | } | ||
59 | @@ -XXX,XX +XXX,XX @@ static bool gen_M_fp_sysreg_read(DisasContext *s, int regno, | ||
60 | tcg_gen_andi_i32(tmp, tmp, FPCR_NZCV_MASK); | ||
61 | storefn(s, opaque, tmp); | ||
62 | break; | ||
63 | + case ARM_VFP_FPCXT_S: | ||
64 | + { | ||
65 | + TCGv_i32 control, sfpa, fpscr; | ||
66 | + /* Bits [27:0] from FPSCR, bit [31] from CONTROL.SFPA */ | ||
67 | + tmp = tcg_temp_new_i32(); | ||
68 | + sfpa = tcg_temp_new_i32(); | ||
69 | + gen_helper_vfp_get_fpscr(tmp, cpu_env); | ||
70 | + tcg_gen_andi_i32(tmp, tmp, ~FPCR_NZCV_MASK); | ||
71 | + control = load_cpu_field(v7m.control[M_REG_S]); | ||
72 | + tcg_gen_andi_i32(sfpa, control, R_V7M_CONTROL_SFPA_MASK); | ||
73 | + tcg_gen_shli_i32(sfpa, sfpa, 31 - R_V7M_CONTROL_SFPA_SHIFT); | ||
74 | + tcg_gen_or_i32(tmp, tmp, sfpa); | ||
75 | + tcg_temp_free_i32(sfpa); | ||
76 | + /* | ||
77 | + * Store result before updating FPSCR etc, in case | ||
78 | + * it is a memory write which causes an exception. | ||
79 | + */ | ||
80 | + storefn(s, opaque, tmp); | ||
81 | + /* | ||
82 | + * Now we must reset FPSCR from FPDSCR_NS, and clear | ||
83 | + * CONTROL.SFPA; so we'll end the TB here. | ||
84 | + */ | ||
85 | + tcg_gen_andi_i32(control, control, ~R_V7M_CONTROL_SFPA_MASK); | ||
86 | + store_cpu_field(control, v7m.control[M_REG_S]); | ||
87 | + fpscr = load_cpu_field(v7m.fpdscr[M_REG_NS]); | ||
88 | + gen_helper_vfp_set_fpscr(cpu_env, fpscr); | ||
89 | + tcg_temp_free_i32(fpscr); | ||
90 | + gen_lookup_tb(s); | ||
91 | + break; | ||
92 | + } | ||
93 | default: | ||
94 | g_assert_not_reached(); | ||
95 | } | 35 | } |
96 | -- | 36 | -- |
97 | 2.20.1 | 37 | 2.25.1 |
98 | |||
99 | diff view generated by jsdifflib |
1 | v8.1M introduces a new TRD flag in the CCR register, which enables | 1 | From: Jerome Forissier <jerome.forissier@linaro.org> |
---|---|---|---|
2 | checking for stack frame integrity signatures on SG instructions. | ||
3 | This bit is not banked, and is always RAZ/WI to Non-secure code. | ||
4 | Adjust the code for handling CCR reads and writes to handle this. | ||
5 | 2 | ||
3 | Updates write_scr() to allow setting SCR_EL3.EnTP2 when FEAT_SME is | ||
4 | implemented. SCR_EL3 being a 64-bit register, valid_mask is changed | ||
5 | to uint64_t and the SCR_* constants in target/arm/cpu.h are extended | ||
6 | to 64-bit so that masking and bitwise not (~) behave as expected. | ||
7 | |||
8 | This enables booting Linux with Trusted Firmware-A at EL3 with | ||
9 | "-M virt,secure=on -cpu max". | ||
10 | |||
11 | Cc: qemu-stable@nongnu.org | ||
12 | Fixes: 78cb9776662a ("target/arm: Enable SME for -cpu max") | ||
13 | Signed-off-by: Jerome Forissier <jerome.forissier@linaro.org> | ||
14 | Reviewed-by: Andre Przywara <andre.przywara@arm.com> | ||
15 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
16 | Message-id: 20221004072354.27037-1-jerome.forissier@linaro.org | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 17 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20201119215617.29887-23-peter.maydell@linaro.org | ||
9 | --- | 18 | --- |
10 | target/arm/cpu.h | 2 ++ | 19 | target/arm/cpu.h | 54 ++++++++++++++++++++++----------------------- |
11 | hw/intc/armv7m_nvic.c | 26 ++++++++++++++++++-------- | 20 | target/arm/helper.c | 5 ++++- |
12 | 2 files changed, 20 insertions(+), 8 deletions(-) | 21 | 2 files changed, 31 insertions(+), 28 deletions(-) |
13 | 22 | ||
14 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 23 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
15 | index XXXXXXX..XXXXXXX 100644 | 24 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/target/arm/cpu.h | 25 | --- a/target/arm/cpu.h |
17 | +++ b/target/arm/cpu.h | 26 | +++ b/target/arm/cpu.h |
18 | @@ -XXX,XX +XXX,XX @@ FIELD(V7M_CCR, STKOFHFNMIGN, 10, 1) | 27 | @@ -XXX,XX +XXX,XX @@ static inline void xpsr_write(CPUARMState *env, uint32_t val, uint32_t mask) |
19 | FIELD(V7M_CCR, DC, 16, 1) | 28 | |
20 | FIELD(V7M_CCR, IC, 17, 1) | 29 | #define HPFAR_NS (1ULL << 63) |
21 | FIELD(V7M_CCR, BP, 18, 1) | 30 | |
22 | +FIELD(V7M_CCR, LOB, 19, 1) | 31 | -#define SCR_NS (1U << 0) |
23 | +FIELD(V7M_CCR, TRD, 20, 1) | 32 | -#define SCR_IRQ (1U << 1) |
24 | 33 | -#define SCR_FIQ (1U << 2) | |
25 | /* V7M SCR bits */ | 34 | -#define SCR_EA (1U << 3) |
26 | FIELD(V7M_SCR, SLEEPONEXIT, 1, 1) | 35 | -#define SCR_FW (1U << 4) |
27 | diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c | 36 | -#define SCR_AW (1U << 5) |
37 | -#define SCR_NET (1U << 6) | ||
38 | -#define SCR_SMD (1U << 7) | ||
39 | -#define SCR_HCE (1U << 8) | ||
40 | -#define SCR_SIF (1U << 9) | ||
41 | -#define SCR_RW (1U << 10) | ||
42 | -#define SCR_ST (1U << 11) | ||
43 | -#define SCR_TWI (1U << 12) | ||
44 | -#define SCR_TWE (1U << 13) | ||
45 | -#define SCR_TLOR (1U << 14) | ||
46 | -#define SCR_TERR (1U << 15) | ||
47 | -#define SCR_APK (1U << 16) | ||
48 | -#define SCR_API (1U << 17) | ||
49 | -#define SCR_EEL2 (1U << 18) | ||
50 | -#define SCR_EASE (1U << 19) | ||
51 | -#define SCR_NMEA (1U << 20) | ||
52 | -#define SCR_FIEN (1U << 21) | ||
53 | -#define SCR_ENSCXT (1U << 25) | ||
54 | -#define SCR_ATA (1U << 26) | ||
55 | -#define SCR_FGTEN (1U << 27) | ||
56 | -#define SCR_ECVEN (1U << 28) | ||
57 | -#define SCR_TWEDEN (1U << 29) | ||
58 | +#define SCR_NS (1ULL << 0) | ||
59 | +#define SCR_IRQ (1ULL << 1) | ||
60 | +#define SCR_FIQ (1ULL << 2) | ||
61 | +#define SCR_EA (1ULL << 3) | ||
62 | +#define SCR_FW (1ULL << 4) | ||
63 | +#define SCR_AW (1ULL << 5) | ||
64 | +#define SCR_NET (1ULL << 6) | ||
65 | +#define SCR_SMD (1ULL << 7) | ||
66 | +#define SCR_HCE (1ULL << 8) | ||
67 | +#define SCR_SIF (1ULL << 9) | ||
68 | +#define SCR_RW (1ULL << 10) | ||
69 | +#define SCR_ST (1ULL << 11) | ||
70 | +#define SCR_TWI (1ULL << 12) | ||
71 | +#define SCR_TWE (1ULL << 13) | ||
72 | +#define SCR_TLOR (1ULL << 14) | ||
73 | +#define SCR_TERR (1ULL << 15) | ||
74 | +#define SCR_APK (1ULL << 16) | ||
75 | +#define SCR_API (1ULL << 17) | ||
76 | +#define SCR_EEL2 (1ULL << 18) | ||
77 | +#define SCR_EASE (1ULL << 19) | ||
78 | +#define SCR_NMEA (1ULL << 20) | ||
79 | +#define SCR_FIEN (1ULL << 21) | ||
80 | +#define SCR_ENSCXT (1ULL << 25) | ||
81 | +#define SCR_ATA (1ULL << 26) | ||
82 | +#define SCR_FGTEN (1ULL << 27) | ||
83 | +#define SCR_ECVEN (1ULL << 28) | ||
84 | +#define SCR_TWEDEN (1ULL << 29) | ||
85 | #define SCR_TWEDEL MAKE_64BIT_MASK(30, 4) | ||
86 | #define SCR_TME (1ULL << 34) | ||
87 | #define SCR_AMVOFFEN (1ULL << 35) | ||
88 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
28 | index XXXXXXX..XXXXXXX 100644 | 89 | index XXXXXXX..XXXXXXX 100644 |
29 | --- a/hw/intc/armv7m_nvic.c | 90 | --- a/target/arm/helper.c |
30 | +++ b/hw/intc/armv7m_nvic.c | 91 | +++ b/target/arm/helper.c |
31 | @@ -XXX,XX +XXX,XX @@ static uint32_t nvic_readl(NVICState *s, uint32_t offset, MemTxAttrs attrs) | 92 | @@ -XXX,XX +XXX,XX @@ static void vbar_write(CPUARMState *env, const ARMCPRegInfo *ri, |
93 | static void scr_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
94 | { | ||
95 | /* Begin with base v8.0 state. */ | ||
96 | - uint32_t valid_mask = 0x3fff; | ||
97 | + uint64_t valid_mask = 0x3fff; | ||
98 | ARMCPU *cpu = env_archcpu(env); | ||
99 | |||
100 | /* | ||
101 | @@ -XXX,XX +XXX,XX @@ static void scr_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
102 | if (cpu_isar_feature(aa64_doublefault, cpu)) { | ||
103 | valid_mask |= SCR_EASE | SCR_NMEA; | ||
32 | } | 104 | } |
33 | return cpu->env.v7m.scr[attrs.secure]; | 105 | + if (cpu_isar_feature(aa64_sme, cpu)) { |
34 | case 0xd14: /* Configuration Control. */ | 106 | + valid_mask |= SCR_ENTP2; |
35 | - /* The BFHFNMIGN bit is the only non-banked bit; we | ||
36 | - * keep it in the non-secure copy of the register. | ||
37 | + /* | ||
38 | + * Non-banked bits: BFHFNMIGN (stored in the NS copy of the register) | ||
39 | + * and TRD (stored in the S copy of the register) | ||
40 | */ | ||
41 | val = cpu->env.v7m.ccr[attrs.secure]; | ||
42 | val |= cpu->env.v7m.ccr[M_REG_NS] & R_V7M_CCR_BFHFNMIGN_MASK; | ||
43 | @@ -XXX,XX +XXX,XX @@ static void nvic_writel(NVICState *s, uint32_t offset, uint32_t value, | ||
44 | cpu->env.v7m.scr[attrs.secure] = value; | ||
45 | break; | ||
46 | case 0xd14: /* Configuration Control. */ | ||
47 | + { | ||
48 | + uint32_t mask; | ||
49 | + | ||
50 | if (!arm_feature(&cpu->env, ARM_FEATURE_M_MAIN)) { | ||
51 | goto bad_offset; | ||
52 | } | ||
53 | |||
54 | /* Enforce RAZ/WI on reserved and must-RAZ/WI bits */ | ||
55 | - value &= (R_V7M_CCR_STKALIGN_MASK | | ||
56 | - R_V7M_CCR_BFHFNMIGN_MASK | | ||
57 | - R_V7M_CCR_DIV_0_TRP_MASK | | ||
58 | - R_V7M_CCR_UNALIGN_TRP_MASK | | ||
59 | - R_V7M_CCR_USERSETMPEND_MASK | | ||
60 | - R_V7M_CCR_NONBASETHRDENA_MASK); | ||
61 | + mask = R_V7M_CCR_STKALIGN_MASK | | ||
62 | + R_V7M_CCR_BFHFNMIGN_MASK | | ||
63 | + R_V7M_CCR_DIV_0_TRP_MASK | | ||
64 | + R_V7M_CCR_UNALIGN_TRP_MASK | | ||
65 | + R_V7M_CCR_USERSETMPEND_MASK | | ||
66 | + R_V7M_CCR_NONBASETHRDENA_MASK; | ||
67 | + if (arm_feature(&cpu->env, ARM_FEATURE_V8_1M) && attrs.secure) { | ||
68 | + /* TRD is always RAZ/WI from NS */ | ||
69 | + mask |= R_V7M_CCR_TRD_MASK; | ||
70 | + } | 107 | + } |
71 | + value &= mask; | 108 | } else { |
72 | 109 | valid_mask &= ~(SCR_RW | SCR_ST); | |
73 | if (arm_feature(&cpu->env, ARM_FEATURE_V8)) { | 110 | if (cpu_isar_feature(aa32_ras, cpu)) { |
74 | /* v8M makes NONBASETHRDENA and STKALIGN be RES1 */ | ||
75 | @@ -XXX,XX +XXX,XX @@ static void nvic_writel(NVICState *s, uint32_t offset, uint32_t value, | ||
76 | |||
77 | cpu->env.v7m.ccr[attrs.secure] = value; | ||
78 | break; | ||
79 | + } | ||
80 | case 0xd24: /* System Handler Control and State (SHCSR) */ | ||
81 | if (!arm_feature(&cpu->env, ARM_FEATURE_V7)) { | ||
82 | goto bad_offset; | ||
83 | -- | 111 | -- |
84 | 2.20.1 | 112 | 2.25.1 |
85 | |||
86 | diff view generated by jsdifflib |
1 | Correct a typo in the name we give the NVIC object. | 1 | From: Joel Stanley <joel@jms.id.au> |
---|---|---|---|
2 | 2 | ||
3 | openpower.xyz was retired some time ago. The OpenBMC Jenkins is where | ||
4 | images can be found these days. | ||
5 | |||
6 | Signed-off-by: Joel Stanley <joel@jms.id.au> | ||
7 | Reviewed-by: Hao Wu <wuhaotsh@google.com> | ||
8 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
9 | Tested-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
10 | Message-id: 20221004050042.22681-1-joel@jms.id.au | ||
3 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
4 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
5 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
6 | Message-id: 20201119215617.29887-28-peter.maydell@linaro.org | ||
7 | --- | 12 | --- |
8 | hw/arm/armv7m.c | 2 +- | 13 | docs/system/arm/nuvoton.rst | 4 ++-- |
9 | 1 file changed, 1 insertion(+), 1 deletion(-) | 14 | 1 file changed, 2 insertions(+), 2 deletions(-) |
10 | 15 | ||
11 | diff --git a/hw/arm/armv7m.c b/hw/arm/armv7m.c | 16 | diff --git a/docs/system/arm/nuvoton.rst b/docs/system/arm/nuvoton.rst |
12 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
13 | --- a/hw/arm/armv7m.c | 18 | --- a/docs/system/arm/nuvoton.rst |
14 | +++ b/hw/arm/armv7m.c | 19 | +++ b/docs/system/arm/nuvoton.rst |
15 | @@ -XXX,XX +XXX,XX @@ static void armv7m_instance_init(Object *obj) | 20 | @@ -XXX,XX +XXX,XX @@ Boot options |
16 | 21 | ||
17 | memory_region_init(&s->container, obj, "armv7m-container", UINT64_MAX); | 22 | The Nuvoton machines can boot from an OpenBMC firmware image, or directly into |
18 | 23 | a kernel using the ``-kernel`` option. OpenBMC images for ``quanta-gsj`` and | |
19 | - object_initialize_child(obj, "nvnic", &s->nvic, TYPE_NVIC); | 24 | -possibly others can be downloaded from the OpenPOWER jenkins : |
20 | + object_initialize_child(obj, "nvic", &s->nvic, TYPE_NVIC); | 25 | +possibly others can be downloaded from the OpenBMC jenkins : |
21 | object_property_add_alias(obj, "num-irq", | 26 | |
22 | OBJECT(&s->nvic), "num-irq"); | 27 | - https://openpower.xyz/ |
28 | + https://jenkins.openbmc.org/ | ||
29 | |||
30 | The firmware image should be attached as an MTD drive. Example : | ||
23 | 31 | ||
24 | -- | 32 | -- |
25 | 2.20.1 | 33 | 2.25.1 |
26 | 34 | ||
27 | 35 | diff view generated by jsdifflib |
1 | From: Vikram Garhwal <fnu.vikram@xilinx.com> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Reviewed-by: Francisco Iglesias <francisco.iglesias@xilinx.com> | 3 | The starting security state comes with the translation regime, |
4 | Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | 4 | not the current state of arm_is_secure_below_el3(). |
5 | Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com> | 5 | |
6 | Message-id: 1605728926-352690-5-git-send-email-fnu.vikram@xilinx.com | 6 | Create a new local variable, s2walk_secure, which does not need |
7 | to be written back to result->attrs.secure -- we compute that | ||
8 | value later, after the S2 walk is complete. | ||
9 | |||
10 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | Message-id: 20221001162318.153420-2-richard.henderson@linaro.org | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
8 | --- | 14 | --- |
9 | MAINTAINERS | 8 ++++++++ | 15 | target/arm/ptw.c | 18 +++++++++--------- |
10 | 1 file changed, 8 insertions(+) | 16 | 1 file changed, 9 insertions(+), 9 deletions(-) |
11 | 17 | ||
12 | diff --git a/MAINTAINERS b/MAINTAINERS | 18 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c |
13 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
14 | --- a/MAINTAINERS | 20 | --- a/target/arm/ptw.c |
15 | +++ b/MAINTAINERS | 21 | +++ b/target/arm/ptw.c |
16 | @@ -XXX,XX +XXX,XX @@ F: hw/net/opencores_eth.c | 22 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, |
17 | 23 | hwaddr ipa; | |
18 | Devices | 24 | int s1_prot; |
19 | ------- | 25 | int ret; |
20 | +Xilinx CAN | 26 | - bool ipa_secure; |
21 | +M: Vikram Garhwal <fnu.vikram@xilinx.com> | 27 | + bool ipa_secure, s2walk_secure; |
22 | +M: Francisco Iglesias <francisco.iglesias@xilinx.com> | 28 | ARMCacheAttrs cacheattrs1; |
23 | +S: Maintained | 29 | ARMMMUIdx s2_mmu_idx; |
24 | +F: hw/net/can/xlnx-* | 30 | bool is_el0; |
25 | +F: include/hw/net/xlnx-* | 31 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, |
26 | +F: tests/qtest/xlnx-can-test* | 32 | |
27 | + | 33 | ipa = result->phys; |
28 | EDU | 34 | ipa_secure = result->attrs.secure; |
29 | M: Jiri Slaby <jslaby@suse.cz> | 35 | - if (arm_is_secure_below_el3(env)) { |
30 | S: Maintained | 36 | - if (ipa_secure) { |
37 | - result->attrs.secure = !(env->cp15.vstcr_el2 & VSTCR_SW); | ||
38 | - } else { | ||
39 | - result->attrs.secure = !(env->cp15.vtcr_el2 & VTCR_NSW); | ||
40 | - } | ||
41 | + if (is_secure) { | ||
42 | + /* Select TCR based on the NS bit from the S1 walk. */ | ||
43 | + s2walk_secure = !(ipa_secure | ||
44 | + ? env->cp15.vstcr_el2 & VSTCR_SW | ||
45 | + : env->cp15.vtcr_el2 & VTCR_NSW); | ||
46 | } else { | ||
47 | assert(!ipa_secure); | ||
48 | + s2walk_secure = false; | ||
49 | } | ||
50 | |||
51 | - s2_mmu_idx = (result->attrs.secure | ||
52 | + s2_mmu_idx = (s2walk_secure | ||
53 | ? ARMMMUIdx_Stage2_S : ARMMMUIdx_Stage2); | ||
54 | is_el0 = mmu_idx == ARMMMUIdx_E10_0 || mmu_idx == ARMMMUIdx_SE10_0; | ||
55 | |||
56 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
57 | result->cacheattrs); | ||
58 | |||
59 | /* Check if IPA translates to secure or non-secure PA space. */ | ||
60 | - if (arm_is_secure_below_el3(env)) { | ||
61 | + if (is_secure) { | ||
62 | if (ipa_secure) { | ||
63 | result->attrs.secure = | ||
64 | !(env->cp15.vstcr_el2 & (VSTCR_SA | VSTCR_SW)); | ||
31 | -- | 65 | -- |
32 | 2.20.1 | 66 | 2.25.1 |
33 | |||
34 | diff view generated by jsdifflib |
1 | From: Alex Chen <alex.chen@huawei.com> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | We should use printf format specifier "%u" instead of "%d" for | 3 | While the stage2 call to get_phys_addr_lpae should never set |
4 | argument of type "unsigned int". | 4 | attrs.secure when given a non-secure input, it's just as easy |
5 | to make the final update to attrs.secure be unconditional and | ||
6 | false in the case of non-secure input. | ||
5 | 7 | ||
6 | Reported-by: Euler Robot <euler.robot@huawei.com> | 8 | Suggested-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Signed-off-by: Alex Chen <alex.chen@huawei.com> | 9 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
8 | Message-id: 20201126111109.112238-3-alex.chen@huawei.com | 10 | Message-id: 20221007152159.1414065-1-richard.henderson@linaro.org |
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 13 | --- |
12 | hw/misc/imx31_ccm.c | 14 +++++++------- | 14 | target/arm/ptw.c | 21 ++++++++++----------- |
13 | hw/misc/imx_ccm.c | 4 ++-- | 15 | 1 file changed, 10 insertions(+), 11 deletions(-) |
14 | 2 files changed, 9 insertions(+), 9 deletions(-) | ||
15 | 16 | ||
16 | diff --git a/hw/misc/imx31_ccm.c b/hw/misc/imx31_ccm.c | 17 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c |
17 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/hw/misc/imx31_ccm.c | 19 | --- a/target/arm/ptw.c |
19 | +++ b/hw/misc/imx31_ccm.c | 20 | +++ b/target/arm/ptw.c |
20 | @@ -XXX,XX +XXX,XX @@ static const char *imx31_ccm_reg_name(uint32_t reg) | 21 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, |
21 | case IMX31_CCM_PDR2_REG: | 22 | result->cacheattrs = combine_cacheattrs(env, cacheattrs1, |
22 | return "PDR2"; | 23 | result->cacheattrs); |
23 | default: | 24 | |
24 | - sprintf(unknown, "[%d ?]", reg); | 25 | - /* Check if IPA translates to secure or non-secure PA space. */ |
25 | + sprintf(unknown, "[%u ?]", reg); | 26 | - if (is_secure) { |
26 | return unknown; | 27 | - if (ipa_secure) { |
27 | } | 28 | - result->attrs.secure = |
28 | } | 29 | - !(env->cp15.vstcr_el2 & (VSTCR_SA | VSTCR_SW)); |
29 | @@ -XXX,XX +XXX,XX @@ static uint32_t imx31_ccm_get_pll_ref_clk(IMXCCMState *dev) | 30 | - } else { |
30 | freq = CKIH_FREQ; | 31 | - result->attrs.secure = |
31 | } | 32 | - !((env->cp15.vtcr_el2 & (VTCR_NSA | VTCR_NSW)) |
32 | 33 | - || (env->cp15.vstcr_el2 & (VSTCR_SA | VSTCR_SW))); | |
33 | - DPRINTF("freq = %d\n", freq); | 34 | - } |
34 | + DPRINTF("freq = %u\n", freq); | 35 | - } |
35 | 36 | + /* | |
36 | return freq; | 37 | + * Check if IPA translates to secure or non-secure PA space. |
37 | } | 38 | + * Note that VSTCR overrides VTCR and {N}SW overrides {N}SA. |
38 | @@ -XXX,XX +XXX,XX @@ static uint32_t imx31_ccm_get_mpll_clk(IMXCCMState *dev) | 39 | + */ |
39 | freq = imx_ccm_calc_pll(s->reg[IMX31_CCM_MPCTL_REG], | 40 | + result->attrs.secure = |
40 | imx31_ccm_get_pll_ref_clk(dev)); | 41 | + (is_secure |
41 | 42 | + && !(env->cp15.vstcr_el2 & (VSTCR_SA | VSTCR_SW)) | |
42 | - DPRINTF("freq = %d\n", freq); | 43 | + && (ipa_secure |
43 | + DPRINTF("freq = %u\n", freq); | 44 | + || !(env->cp15.vtcr_el2 & (VTCR_NSA | VTCR_NSW)))); |
44 | 45 | + | |
45 | return freq; | 46 | return 0; |
46 | } | 47 | } else { |
47 | @@ -XXX,XX +XXX,XX @@ static uint32_t imx31_ccm_get_mcu_main_clk(IMXCCMState *dev) | 48 | /* |
48 | freq = imx31_ccm_get_mpll_clk(dev); | ||
49 | } | ||
50 | |||
51 | - DPRINTF("freq = %d\n", freq); | ||
52 | + DPRINTF("freq = %u\n", freq); | ||
53 | |||
54 | return freq; | ||
55 | } | ||
56 | @@ -XXX,XX +XXX,XX @@ static uint32_t imx31_ccm_get_hclk_clk(IMXCCMState *dev) | ||
57 | freq = imx31_ccm_get_mcu_main_clk(dev) | ||
58 | / (1 + EXTRACT(s->reg[IMX31_CCM_PDR0_REG], MAX)); | ||
59 | |||
60 | - DPRINTF("freq = %d\n", freq); | ||
61 | + DPRINTF("freq = %u\n", freq); | ||
62 | |||
63 | return freq; | ||
64 | } | ||
65 | @@ -XXX,XX +XXX,XX @@ static uint32_t imx31_ccm_get_ipg_clk(IMXCCMState *dev) | ||
66 | freq = imx31_ccm_get_hclk_clk(dev) | ||
67 | / (1 + EXTRACT(s->reg[IMX31_CCM_PDR0_REG], IPG)); | ||
68 | |||
69 | - DPRINTF("freq = %d\n", freq); | ||
70 | + DPRINTF("freq = %u\n", freq); | ||
71 | |||
72 | return freq; | ||
73 | } | ||
74 | @@ -XXX,XX +XXX,XX @@ static uint32_t imx31_ccm_get_clock_frequency(IMXCCMState *dev, IMXClk clock) | ||
75 | break; | ||
76 | } | ||
77 | |||
78 | - DPRINTF("Clock = %d) = %d\n", clock, freq); | ||
79 | + DPRINTF("Clock = %d) = %u\n", clock, freq); | ||
80 | |||
81 | return freq; | ||
82 | } | ||
83 | diff --git a/hw/misc/imx_ccm.c b/hw/misc/imx_ccm.c | ||
84 | index XXXXXXX..XXXXXXX 100644 | ||
85 | --- a/hw/misc/imx_ccm.c | ||
86 | +++ b/hw/misc/imx_ccm.c | ||
87 | @@ -XXX,XX +XXX,XX @@ uint32_t imx_ccm_get_clock_frequency(IMXCCMState *dev, IMXClk clock) | ||
88 | freq = klass->get_clock_frequency(dev, clock); | ||
89 | } | ||
90 | |||
91 | - DPRINTF("(clock = %d) = %d\n", clock, freq); | ||
92 | + DPRINTF("(clock = %d) = %u\n", clock, freq); | ||
93 | |||
94 | return freq; | ||
95 | } | ||
96 | @@ -XXX,XX +XXX,XX @@ uint32_t imx_ccm_calc_pll(uint32_t pllreg, uint32_t base_freq) | ||
97 | freq = ((2 * (base_freq >> 10) * (mfi * mfd + mfn)) / | ||
98 | (mfd * pd)) << 10; | ||
99 | |||
100 | - DPRINTF("(pllreg = 0x%08x, base_freq = %d) = %d\n", pllreg, base_freq, | ||
101 | + DPRINTF("(pllreg = 0x%08x, base_freq = %u) = %d\n", pllreg, base_freq, | ||
102 | freq); | ||
103 | |||
104 | return freq; | ||
105 | -- | 49 | -- |
106 | 2.20.1 | 50 | 2.25.1 |
107 | |||
108 | diff view generated by jsdifflib |
1 | From: Havard Skinnemoen <hskinnemoen@google.com> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Dump the collected random data after a randomness test failure. | 3 | Remove the use of regime_is_secure from get_phys_addr_lpae, |
4 | using the new parameter instead. | ||
4 | 5 | ||
5 | Note that this relies on the test having called | 6 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> |
6 | g_test_set_nonfatal_assertions() so we don't abort immediately on the | 7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
7 | assertion failure. | 8 | Message-id: 20221001162318.153420-3-richard.henderson@linaro.org |
8 | |||
9 | Signed-off-by: Havard Skinnemoen <hskinnemoen@google.com> | ||
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | [PMM: minor commit message tweak] | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
13 | --- | 10 | --- |
14 | tests/qtest/npcm7xx_rng-test.c | 12 ++++++++++++ | 11 | target/arm/ptw.c | 20 ++++++++++---------- |
15 | 1 file changed, 12 insertions(+) | 12 | 1 file changed, 10 insertions(+), 10 deletions(-) |
16 | 13 | ||
17 | diff --git a/tests/qtest/npcm7xx_rng-test.c b/tests/qtest/npcm7xx_rng-test.c | 14 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c |
18 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
19 | --- a/tests/qtest/npcm7xx_rng-test.c | 16 | --- a/target/arm/ptw.c |
20 | +++ b/tests/qtest/npcm7xx_rng-test.c | 17 | +++ b/target/arm/ptw.c |
21 | @@ -XXX,XX +XXX,XX @@ | 18 | @@ -XXX,XX +XXX,XX @@ |
22 | 19 | ||
23 | #include "libqtest-single.h" | 20 | static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, |
24 | #include "qemu/bitops.h" | 21 | MMUAccessType access_type, ARMMMUIdx mmu_idx, |
25 | +#include "qemu-common.h" | 22 | - bool s1_is_el0, GetPhysAddrResult *result, |
26 | 23 | - ARMMMUFaultInfo *fi) | |
27 | #define RNG_BASE_ADDR 0xf000b000 | 24 | + bool is_secure, bool s1_is_el0, |
28 | 25 | + GetPhysAddrResult *result, ARMMMUFaultInfo *fi) | |
29 | @@ -XXX,XX +XXX,XX @@ | 26 | __attribute__((nonnull)); |
30 | /* Number of bits to collect for randomness tests. */ | 27 | |
31 | #define TEST_INPUT_BITS (128) | 28 | /* This mapping is common between ID_AA64MMFR0.PARANGE and TCR_ELx.{I}PS. */ |
32 | 29 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, | |
33 | +static void dump_buf_if_failed(const uint8_t *buf, size_t size) | 30 | GetPhysAddrResult s2 = {}; |
34 | +{ | 31 | int ret; |
35 | + if (g_test_failed()) { | 32 | |
36 | + qemu_hexdump(stderr, "", buf, size); | 33 | - ret = get_phys_addr_lpae(env, addr, MMU_DATA_LOAD, s2_mmu_idx, false, |
37 | + } | 34 | - &s2, fi); |
38 | +} | 35 | + ret = get_phys_addr_lpae(env, addr, MMU_DATA_LOAD, s2_mmu_idx, |
39 | + | 36 | + *is_secure, false, &s2, fi); |
40 | static void rng_writeb(unsigned int offset, uint8_t value) | 37 | if (ret) { |
38 | assert(fi->type != ARMFault_None); | ||
39 | fi->s2addr = addr; | ||
40 | @@ -XXX,XX +XXX,XX @@ static bool check_s2_mmu_setup(ARMCPU *cpu, bool is_aa64, int level, | ||
41 | */ | ||
42 | static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
43 | MMUAccessType access_type, ARMMMUIdx mmu_idx, | ||
44 | - bool s1_is_el0, GetPhysAddrResult *result, | ||
45 | - ARMMMUFaultInfo *fi) | ||
46 | + bool is_secure, bool s1_is_el0, | ||
47 | + GetPhysAddrResult *result, ARMMMUFaultInfo *fi) | ||
41 | { | 48 | { |
42 | writeb(RNG_BASE_ADDR + offset, value); | 49 | ARMCPU *cpu = env_archcpu(env); |
43 | @@ -XXX,XX +XXX,XX @@ static void test_continuous_monobit(void) | 50 | /* Read an LPAE long-descriptor translation table. */ |
51 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
52 | * remain non-secure. We implement this by just ORing in the NSTable/NS | ||
53 | * bits at each step. | ||
54 | */ | ||
55 | - tableattrs = regime_is_secure(env, mmu_idx) ? 0 : (1 << 4); | ||
56 | + tableattrs = is_secure ? 0 : (1 << 4); | ||
57 | for (;;) { | ||
58 | uint64_t descriptor; | ||
59 | bool nstable; | ||
60 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
61 | memset(result, 0, sizeof(*result)); | ||
62 | |||
63 | ret = get_phys_addr_lpae(env, ipa, access_type, s2_mmu_idx, | ||
64 | - is_el0, result, fi); | ||
65 | + s2walk_secure, is_el0, result, fi); | ||
66 | fi->s2addr = ipa; | ||
67 | |||
68 | /* Combine the S1 and S2 perms. */ | ||
69 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
44 | } | 70 | } |
45 | 71 | ||
46 | g_assert_cmpfloat(calc_monobit_p(buf, sizeof(buf)), >, 0.01); | 72 | if (regime_using_lpae_format(env, mmu_idx)) { |
47 | + dump_buf_if_failed(buf, sizeof(buf)); | 73 | - return get_phys_addr_lpae(env, address, access_type, mmu_idx, false, |
48 | } | 74 | - result, fi); |
49 | 75 | + return get_phys_addr_lpae(env, address, access_type, mmu_idx, | |
50 | /* | 76 | + is_secure, false, result, fi); |
51 | @@ -XXX,XX +XXX,XX @@ static void test_continuous_runs(void) | 77 | } else if (regime_sctlr(env, mmu_idx) & SCTLR_XP) { |
52 | } | 78 | return get_phys_addr_v6(env, address, access_type, mmu_idx, |
53 | 79 | is_secure, result, fi); | |
54 | g_assert_cmpfloat(calc_runs_p(buf.l, sizeof(buf) * BITS_PER_BYTE), >, 0.01); | ||
55 | + dump_buf_if_failed(buf.c, sizeof(buf)); | ||
56 | } | ||
57 | |||
58 | /* | ||
59 | @@ -XXX,XX +XXX,XX @@ static void test_first_byte_monobit(void) | ||
60 | } | ||
61 | |||
62 | g_assert_cmpfloat(calc_monobit_p(buf, sizeof(buf)), >, 0.01); | ||
63 | + dump_buf_if_failed(buf, sizeof(buf)); | ||
64 | } | ||
65 | |||
66 | /* | ||
67 | @@ -XXX,XX +XXX,XX @@ static void test_first_byte_runs(void) | ||
68 | } | ||
69 | |||
70 | g_assert_cmpfloat(calc_runs_p(buf.l, sizeof(buf) * BITS_PER_BYTE), >, 0.01); | ||
71 | + dump_buf_if_failed(buf.c, sizeof(buf)); | ||
72 | } | ||
73 | |||
74 | int main(int argc, char **argv) | ||
75 | -- | 80 | -- |
76 | 2.20.1 | 81 | 2.25.1 |
77 | 82 | ||
78 | 83 | diff view generated by jsdifflib |
1 | The RAS feature has a block of memory-mapped registers at offset | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 0x5000 within the PPB. For a "minimal RAS" implementation we provide | ||
3 | no error records and so the only registers that exist in the block | ||
4 | are ERRIIDR and ERRDEVID. | ||
5 | 2 | ||
6 | The "RAZ/WI for privileged, BusFault for nonprivileged" behaviour | 3 | Pass the correct stage2 mmu_idx to regime_translation_disabled, |
7 | of the "nvic-default" region is actually valid for minimal-RAS, | 4 | which we computed afterward. |
8 | so the main benefit of providing an explicit implementation of | ||
9 | the register block is more accurate LOG_UNIMP messages, and a | ||
10 | framework for where we could add a real RAS implementation later | ||
11 | if necessary. | ||
12 | 5 | ||
6 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Message-id: 20221001162318.153420-4-richard.henderson@linaro.org | ||
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
14 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
15 | Message-id: 20201119215617.29887-27-peter.maydell@linaro.org | ||
16 | --- | 10 | --- |
17 | include/hw/intc/armv7m_nvic.h | 1 + | 11 | target/arm/ptw.c | 6 +++--- |
18 | hw/intc/armv7m_nvic.c | 56 +++++++++++++++++++++++++++++++++++ | 12 | 1 file changed, 3 insertions(+), 3 deletions(-) |
19 | 2 files changed, 57 insertions(+) | ||
20 | 13 | ||
21 | diff --git a/include/hw/intc/armv7m_nvic.h b/include/hw/intc/armv7m_nvic.h | 14 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c |
22 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
23 | --- a/include/hw/intc/armv7m_nvic.h | 16 | --- a/target/arm/ptw.c |
24 | +++ b/include/hw/intc/armv7m_nvic.h | 17 | +++ b/target/arm/ptw.c |
25 | @@ -XXX,XX +XXX,XX @@ struct NVICState { | 18 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, |
26 | MemoryRegion sysreg_ns_mem; | 19 | hwaddr addr, bool *is_secure, |
27 | MemoryRegion systickmem; | 20 | ARMMMUFaultInfo *fi) |
28 | MemoryRegion systick_ns_mem; | 21 | { |
29 | + MemoryRegion ras_mem; | 22 | + ARMMMUIdx s2_mmu_idx = *is_secure ? ARMMMUIdx_Stage2_S : ARMMMUIdx_Stage2; |
30 | MemoryRegion container; | ||
31 | MemoryRegion defaultmem; | ||
32 | |||
33 | diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c | ||
34 | index XXXXXXX..XXXXXXX 100644 | ||
35 | --- a/hw/intc/armv7m_nvic.c | ||
36 | +++ b/hw/intc/armv7m_nvic.c | ||
37 | @@ -XXX,XX +XXX,XX @@ static const MemoryRegionOps nvic_systick_ops = { | ||
38 | .endianness = DEVICE_NATIVE_ENDIAN, | ||
39 | }; | ||
40 | |||
41 | + | 23 | + |
42 | +static MemTxResult ras_read(void *opaque, hwaddr addr, | 24 | if (arm_mmu_idx_is_stage1_of_2(mmu_idx) && |
43 | + uint64_t *data, unsigned size, | 25 | - !regime_translation_disabled(env, ARMMMUIdx_Stage2)) { |
44 | + MemTxAttrs attrs) | 26 | - ARMMMUIdx s2_mmu_idx = *is_secure ? ARMMMUIdx_Stage2_S |
45 | +{ | 27 | - : ARMMMUIdx_Stage2; |
46 | + if (attrs.user) { | 28 | + !regime_translation_disabled(env, s2_mmu_idx)) { |
47 | + return MEMTX_ERROR; | 29 | GetPhysAddrResult s2 = {}; |
48 | + } | 30 | int ret; |
49 | + | ||
50 | + switch (addr) { | ||
51 | + case 0xe10: /* ERRIIDR */ | ||
52 | + /* architect field = Arm; product/variant/revision 0 */ | ||
53 | + *data = 0x43b; | ||
54 | + break; | ||
55 | + case 0xfc8: /* ERRDEVID */ | ||
56 | + /* Minimal RAS: we implement 0 error record indexes */ | ||
57 | + *data = 0; | ||
58 | + break; | ||
59 | + default: | ||
60 | + qemu_log_mask(LOG_UNIMP, "Read RAS register offset 0x%x\n", | ||
61 | + (uint32_t)addr); | ||
62 | + *data = 0; | ||
63 | + break; | ||
64 | + } | ||
65 | + return MEMTX_OK; | ||
66 | +} | ||
67 | + | ||
68 | +static MemTxResult ras_write(void *opaque, hwaddr addr, | ||
69 | + uint64_t value, unsigned size, | ||
70 | + MemTxAttrs attrs) | ||
71 | +{ | ||
72 | + if (attrs.user) { | ||
73 | + return MEMTX_ERROR; | ||
74 | + } | ||
75 | + | ||
76 | + switch (addr) { | ||
77 | + default: | ||
78 | + qemu_log_mask(LOG_UNIMP, "Write to RAS register offset 0x%x\n", | ||
79 | + (uint32_t)addr); | ||
80 | + break; | ||
81 | + } | ||
82 | + return MEMTX_OK; | ||
83 | +} | ||
84 | + | ||
85 | +static const MemoryRegionOps ras_ops = { | ||
86 | + .read_with_attrs = ras_read, | ||
87 | + .write_with_attrs = ras_write, | ||
88 | + .endianness = DEVICE_NATIVE_ENDIAN, | ||
89 | +}; | ||
90 | + | ||
91 | /* | ||
92 | * Unassigned portions of the PPB space are RAZ/WI for privileged | ||
93 | * accesses, and fault for non-privileged accesses. | ||
94 | @@ -XXX,XX +XXX,XX @@ static void armv7m_nvic_realize(DeviceState *dev, Error **errp) | ||
95 | &s->systick_ns_mem, 1); | ||
96 | } | ||
97 | |||
98 | + if (cpu_isar_feature(aa32_ras, s->cpu)) { | ||
99 | + memory_region_init_io(&s->ras_mem, OBJECT(s), | ||
100 | + &ras_ops, s, "nvic_ras", 0x1000); | ||
101 | + memory_region_add_subregion(&s->container, 0x5000, &s->ras_mem); | ||
102 | + } | ||
103 | + | ||
104 | sysbus_init_mmio(SYS_BUS_DEVICE(dev), &s->container); | ||
105 | } | ||
106 | 31 | ||
107 | -- | 32 | -- |
108 | 2.20.1 | 33 | 2.25.1 |
109 | |||
110 | diff view generated by jsdifflib |
1 | From: Vikram Garhwal <fnu.vikram@xilinx.com> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Connect CAN0 and CAN1 on the ZynqMP. | 3 | Remove the use of regime_is_secure from regime_translation_disabled, |
4 | using the new parameter instead. | ||
4 | 5 | ||
5 | Reviewed-by: Francisco Iglesias <francisco.iglesias@xilinx.com> | 6 | This fixes a bug in S1_ptw_translate and get_phys_addr where we had |
6 | Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | 7 | passed ARMMMUIdx_Stage2 and not ARMMMUIdx_Stage2_S to determine if |
7 | Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com> | 8 | Stage2 is disabled, affecting FEAT_SEL2. |
8 | Message-id: 1605728926-352690-3-git-send-email-fnu.vikram@xilinx.com | 9 | |
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | ||
12 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
13 | Message-id: 20221001162318.153420-5-richard.henderson@linaro.org | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | --- | 15 | --- |
11 | include/hw/arm/xlnx-zynqmp.h | 8 ++++++++ | 16 | target/arm/ptw.c | 20 +++++++++++--------- |
12 | hw/arm/xlnx-zcu102.c | 20 ++++++++++++++++++++ | 17 | 1 file changed, 11 insertions(+), 9 deletions(-) |
13 | hw/arm/xlnx-zynqmp.c | 34 ++++++++++++++++++++++++++++++++++ | ||
14 | 3 files changed, 62 insertions(+) | ||
15 | 18 | ||
16 | diff --git a/include/hw/arm/xlnx-zynqmp.h b/include/hw/arm/xlnx-zynqmp.h | 19 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c |
17 | index XXXXXXX..XXXXXXX 100644 | 20 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/include/hw/arm/xlnx-zynqmp.h | 21 | --- a/target/arm/ptw.c |
19 | +++ b/include/hw/arm/xlnx-zynqmp.h | 22 | +++ b/target/arm/ptw.c |
20 | @@ -XXX,XX +XXX,XX @@ | 23 | @@ -XXX,XX +XXX,XX @@ static uint64_t regime_ttbr(CPUARMState *env, ARMMMUIdx mmu_idx, int ttbrn) |
21 | #include "hw/intc/arm_gic.h" | ||
22 | #include "hw/net/cadence_gem.h" | ||
23 | #include "hw/char/cadence_uart.h" | ||
24 | +#include "hw/net/xlnx-zynqmp-can.h" | ||
25 | #include "hw/ide/ahci.h" | ||
26 | #include "hw/sd/sdhci.h" | ||
27 | #include "hw/ssi/xilinx_spips.h" | ||
28 | @@ -XXX,XX +XXX,XX @@ | ||
29 | #include "hw/cpu/cluster.h" | ||
30 | #include "target/arm/cpu.h" | ||
31 | #include "qom/object.h" | ||
32 | +#include "net/can_emu.h" | ||
33 | |||
34 | #define TYPE_XLNX_ZYNQMP "xlnx,zynqmp" | ||
35 | OBJECT_DECLARE_SIMPLE_TYPE(XlnxZynqMPState, XLNX_ZYNQMP) | ||
36 | @@ -XXX,XX +XXX,XX @@ OBJECT_DECLARE_SIMPLE_TYPE(XlnxZynqMPState, XLNX_ZYNQMP) | ||
37 | #define XLNX_ZYNQMP_NUM_RPU_CPUS 2 | ||
38 | #define XLNX_ZYNQMP_NUM_GEMS 4 | ||
39 | #define XLNX_ZYNQMP_NUM_UARTS 2 | ||
40 | +#define XLNX_ZYNQMP_NUM_CAN 2 | ||
41 | +#define XLNX_ZYNQMP_CAN_REF_CLK (24 * 1000 * 1000) | ||
42 | #define XLNX_ZYNQMP_NUM_SDHCI 2 | ||
43 | #define XLNX_ZYNQMP_NUM_SPIS 2 | ||
44 | #define XLNX_ZYNQMP_NUM_GDMA_CH 8 | ||
45 | @@ -XXX,XX +XXX,XX @@ struct XlnxZynqMPState { | ||
46 | |||
47 | CadenceGEMState gem[XLNX_ZYNQMP_NUM_GEMS]; | ||
48 | CadenceUARTState uart[XLNX_ZYNQMP_NUM_UARTS]; | ||
49 | + XlnxZynqMPCANState can[XLNX_ZYNQMP_NUM_CAN]; | ||
50 | SysbusAHCIState sata; | ||
51 | SDHCIState sdhci[XLNX_ZYNQMP_NUM_SDHCI]; | ||
52 | XilinxSPIPS spi[XLNX_ZYNQMP_NUM_SPIS]; | ||
53 | @@ -XXX,XX +XXX,XX @@ struct XlnxZynqMPState { | ||
54 | bool virt; | ||
55 | /* Has the RPU subsystem? */ | ||
56 | bool has_rpu; | ||
57 | + | ||
58 | + /* CAN bus. */ | ||
59 | + CanBusState *canbus[XLNX_ZYNQMP_NUM_CAN]; | ||
60 | }; | ||
61 | |||
62 | #endif | ||
63 | diff --git a/hw/arm/xlnx-zcu102.c b/hw/arm/xlnx-zcu102.c | ||
64 | index XXXXXXX..XXXXXXX 100644 | ||
65 | --- a/hw/arm/xlnx-zcu102.c | ||
66 | +++ b/hw/arm/xlnx-zcu102.c | ||
67 | @@ -XXX,XX +XXX,XX @@ | ||
68 | #include "sysemu/qtest.h" | ||
69 | #include "sysemu/device_tree.h" | ||
70 | #include "qom/object.h" | ||
71 | +#include "net/can_emu.h" | ||
72 | |||
73 | struct XlnxZCU102 { | ||
74 | MachineState parent_obj; | ||
75 | @@ -XXX,XX +XXX,XX @@ struct XlnxZCU102 { | ||
76 | bool secure; | ||
77 | bool virt; | ||
78 | |||
79 | + CanBusState *canbus[XLNX_ZYNQMP_NUM_CAN]; | ||
80 | + | ||
81 | struct arm_boot_info binfo; | ||
82 | }; | ||
83 | |||
84 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zcu102_init(MachineState *machine) | ||
85 | object_property_set_bool(OBJECT(&s->soc), "virtualization", s->virt, | ||
86 | &error_fatal); | ||
87 | |||
88 | + for (i = 0; i < XLNX_ZYNQMP_NUM_CAN; i++) { | ||
89 | + gchar *bus_name = g_strdup_printf("canbus%d", i); | ||
90 | + | ||
91 | + object_property_set_link(OBJECT(&s->soc), bus_name, | ||
92 | + OBJECT(s->canbus[i]), &error_fatal); | ||
93 | + g_free(bus_name); | ||
94 | + } | ||
95 | + | ||
96 | qdev_realize(DEVICE(&s->soc), NULL, &error_fatal); | ||
97 | |||
98 | /* Create and plug in the SD cards */ | ||
99 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zcu102_machine_instance_init(Object *obj) | ||
100 | s->secure = false; | ||
101 | /* Default to virt (EL2) being disabled */ | ||
102 | s->virt = false; | ||
103 | + object_property_add_link(obj, "xlnx-zcu102.canbus0", TYPE_CAN_BUS, | ||
104 | + (Object **)&s->canbus[0], | ||
105 | + object_property_allow_set_link, | ||
106 | + 0); | ||
107 | + | ||
108 | + object_property_add_link(obj, "xlnx-zcu102.canbus1", TYPE_CAN_BUS, | ||
109 | + (Object **)&s->canbus[1], | ||
110 | + object_property_allow_set_link, | ||
111 | + 0); | ||
112 | } | 24 | } |
113 | 25 | ||
114 | static void xlnx_zcu102_machine_class_init(ObjectClass *oc, void *data) | 26 | /* Return true if the specified stage of address translation is disabled */ |
115 | diff --git a/hw/arm/xlnx-zynqmp.c b/hw/arm/xlnx-zynqmp.c | 27 | -static bool regime_translation_disabled(CPUARMState *env, ARMMMUIdx mmu_idx) |
116 | index XXXXXXX..XXXXXXX 100644 | 28 | +static bool regime_translation_disabled(CPUARMState *env, ARMMMUIdx mmu_idx, |
117 | --- a/hw/arm/xlnx-zynqmp.c | 29 | + bool is_secure) |
118 | +++ b/hw/arm/xlnx-zynqmp.c | 30 | { |
119 | @@ -XXX,XX +XXX,XX @@ static const int uart_intr[XLNX_ZYNQMP_NUM_UARTS] = { | 31 | uint64_t hcr_el2; |
120 | 21, 22, | 32 | |
121 | }; | 33 | if (arm_feature(env, ARM_FEATURE_M)) { |
122 | 34 | - switch (env->v7m.mpu_ctrl[regime_is_secure(env, mmu_idx)] & | |
123 | +static const uint64_t can_addr[XLNX_ZYNQMP_NUM_CAN] = { | 35 | + switch (env->v7m.mpu_ctrl[is_secure] & |
124 | + 0xFF060000, 0xFF070000, | 36 | (R_V7M_MPU_CTRL_ENABLE_MASK | R_V7M_MPU_CTRL_HFNMIENA_MASK)) { |
125 | +}; | 37 | case R_V7M_MPU_CTRL_ENABLE_MASK: |
126 | + | 38 | /* Enabled, but not for HardFault and NMI */ |
127 | +static const int can_intr[XLNX_ZYNQMP_NUM_CAN] = { | 39 | @@ -XXX,XX +XXX,XX @@ static bool regime_translation_disabled(CPUARMState *env, ARMMMUIdx mmu_idx) |
128 | + 23, 24, | 40 | |
129 | +}; | 41 | if (hcr_el2 & HCR_TGE) { |
130 | + | 42 | /* TGE means that NS EL0/1 act as if SCTLR_EL1.M is zero */ |
131 | static const uint64_t sdhci_addr[XLNX_ZYNQMP_NUM_SDHCI] = { | 43 | - if (!regime_is_secure(env, mmu_idx) && regime_el(env, mmu_idx) == 1) { |
132 | 0xFF160000, 0xFF170000, | 44 | + if (!is_secure && regime_el(env, mmu_idx) == 1) { |
133 | }; | 45 | return true; |
134 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_init(Object *obj) | 46 | } |
135 | TYPE_CADENCE_UART); | ||
136 | } | 47 | } |
137 | 48 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, | |
138 | + for (i = 0; i < XLNX_ZYNQMP_NUM_CAN; i++) { | 49 | ARMMMUIdx s2_mmu_idx = *is_secure ? ARMMMUIdx_Stage2_S : ARMMMUIdx_Stage2; |
139 | + object_initialize_child(obj, "can[*]", &s->can[i], | 50 | |
140 | + TYPE_XLNX_ZYNQMP_CAN); | 51 | if (arm_mmu_idx_is_stage1_of_2(mmu_idx) && |
141 | + } | 52 | - !regime_translation_disabled(env, s2_mmu_idx)) { |
142 | + | 53 | + !regime_translation_disabled(env, s2_mmu_idx, *is_secure)) { |
143 | object_initialize_child(obj, "sata", &s->sata, TYPE_SYSBUS_AHCI); | 54 | GetPhysAddrResult s2 = {}; |
144 | 55 | int ret; | |
145 | for (i = 0; i < XLNX_ZYNQMP_NUM_SDHCI; i++) { | 56 | |
146 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) | 57 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav5(CPUARMState *env, uint32_t address, |
147 | gic_spi[uart_intr[i]]); | 58 | uint32_t base; |
148 | } | 59 | bool is_user = regime_is_user(env, mmu_idx); |
149 | 60 | ||
150 | + for (i = 0; i < XLNX_ZYNQMP_NUM_CAN; i++) { | 61 | - if (regime_translation_disabled(env, mmu_idx)) { |
151 | + object_property_set_int(OBJECT(&s->can[i]), "ext_clk_freq", | 62 | + if (regime_translation_disabled(env, mmu_idx, is_secure)) { |
152 | + XLNX_ZYNQMP_CAN_REF_CLK, &error_abort); | 63 | /* MPU disabled. */ |
153 | + | 64 | result->phys = address; |
154 | + object_property_set_link(OBJECT(&s->can[i]), "canbus", | 65 | result->prot = PAGE_READ | PAGE_WRITE | PAGE_EXEC; |
155 | + OBJECT(s->canbus[i]), &error_fatal); | 66 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav7(CPUARMState *env, uint32_t address, |
156 | + | 67 | result->page_size = TARGET_PAGE_SIZE; |
157 | + sysbus_realize(SYS_BUS_DEVICE(&s->can[i]), &err); | 68 | result->prot = 0; |
158 | + if (err) { | 69 | |
159 | + error_propagate(errp, err); | 70 | - if (regime_translation_disabled(env, mmu_idx) || |
160 | + return; | 71 | + if (regime_translation_disabled(env, mmu_idx, secure) || |
161 | + } | 72 | m_is_ppb_region(env, address)) { |
162 | + sysbus_mmio_map(SYS_BUS_DEVICE(&s->can[i]), 0, can_addr[i]); | 73 | /* |
163 | + sysbus_connect_irq(SYS_BUS_DEVICE(&s->can[i]), 0, | 74 | * MPU disabled or M profile PPB access: use default memory map. |
164 | + gic_spi[can_intr[i]]); | 75 | @@ -XXX,XX +XXX,XX @@ bool pmsav8_mpu_lookup(CPUARMState *env, uint32_t address, |
165 | + } | 76 | * are done in arm_v7m_load_vector(), which always does a direct |
166 | + | 77 | * read using address_space_ldl(), rather than going via this function. |
167 | object_property_set_int(OBJECT(&s->sata), "num-ports", SATA_NUM_PORTS, | 78 | */ |
168 | &error_abort); | 79 | - if (regime_translation_disabled(env, mmu_idx)) { /* MPU disabled */ |
169 | if (!sysbus_realize(SYS_BUS_DEVICE(&s->sata), errp)) { | 80 | + if (regime_translation_disabled(env, mmu_idx, secure)) { /* MPU disabled */ |
170 | @@ -XXX,XX +XXX,XX @@ static Property xlnx_zynqmp_props[] = { | 81 | hit = true; |
171 | DEFINE_PROP_BOOL("has_rpu", XlnxZynqMPState, has_rpu, false), | 82 | } else if (m_is_ppb_region(env, address)) { |
172 | DEFINE_PROP_LINK("ddr-ram", XlnxZynqMPState, ddr_ram, TYPE_MEMORY_REGION, | 83 | hit = true; |
173 | MemoryRegion *), | 84 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, |
174 | + DEFINE_PROP_LINK("canbus0", XlnxZynqMPState, canbus[0], TYPE_CAN_BUS, | 85 | result, fi); |
175 | + CanBusState *), | 86 | |
176 | + DEFINE_PROP_LINK("canbus1", XlnxZynqMPState, canbus[1], TYPE_CAN_BUS, | 87 | /* If S1 fails or S2 is disabled, return early. */ |
177 | + CanBusState *), | 88 | - if (ret || regime_translation_disabled(env, ARMMMUIdx_Stage2)) { |
178 | DEFINE_PROP_END_OF_LIST() | 89 | + if (ret || regime_translation_disabled(env, ARMMMUIdx_Stage2, |
179 | }; | 90 | + is_secure)) { |
91 | return ret; | ||
92 | } | ||
93 | |||
94 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
95 | |||
96 | /* Definitely a real MMU, not an MPU */ | ||
97 | |||
98 | - if (regime_translation_disabled(env, mmu_idx)) { | ||
99 | + if (regime_translation_disabled(env, mmu_idx, is_secure)) { | ||
100 | uint64_t hcr; | ||
101 | uint8_t memattr; | ||
180 | 102 | ||
181 | -- | 103 | -- |
182 | 2.20.1 | 104 | 2.25.1 |
183 | 105 | ||
184 | 106 | diff view generated by jsdifflib |
1 | The constant-expander functions like negate, plus_2, etc, are | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | generally useful; move them up in translate.c so we can use them in | ||
3 | the VFP/Neon decoders as well as in the A32/T32/T16 decoders. | ||
4 | 2 | ||
3 | Retain the existing get_phys_addr interface using the security | ||
4 | state derived from mmu_idx. Move the kerneldoc comments to the | ||
5 | header file where they belong. | ||
6 | |||
7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Message-id: 20221001162318.153420-6-richard.henderson@linaro.org | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
7 | Message-id: 20201119215617.29887-9-peter.maydell@linaro.org | ||
8 | --- | 11 | --- |
9 | target/arm/translate.c | 46 +++++++++++++++++++++++------------------- | 12 | target/arm/internals.h | 40 ++++++++++++++++++++++++++++++++++++++ |
10 | 1 file changed, 25 insertions(+), 21 deletions(-) | 13 | target/arm/ptw.c | 44 ++++++++++++++---------------------------- |
14 | 2 files changed, 55 insertions(+), 29 deletions(-) | ||
11 | 15 | ||
12 | diff --git a/target/arm/translate.c b/target/arm/translate.c | 16 | diff --git a/target/arm/internals.h b/target/arm/internals.h |
13 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
14 | --- a/target/arm/translate.c | 18 | --- a/target/arm/internals.h |
15 | +++ b/target/arm/translate.c | 19 | +++ b/target/arm/internals.h |
16 | @@ -XXX,XX +XXX,XX @@ static void arm_gen_condlabel(DisasContext *s) | 20 | @@ -XXX,XX +XXX,XX @@ typedef struct GetPhysAddrResult { |
21 | ARMCacheAttrs cacheattrs; | ||
22 | } GetPhysAddrResult; | ||
23 | |||
24 | +/** | ||
25 | + * get_phys_addr_with_secure: get the physical address for a virtual address | ||
26 | + * @env: CPUARMState | ||
27 | + * @address: virtual address to get physical address for | ||
28 | + * @access_type: 0 for read, 1 for write, 2 for execute | ||
29 | + * @mmu_idx: MMU index indicating required translation regime | ||
30 | + * @is_secure: security state for the access | ||
31 | + * @result: set on translation success. | ||
32 | + * @fi: set to fault info if the translation fails | ||
33 | + * | ||
34 | + * Find the physical address corresponding to the given virtual address, | ||
35 | + * by doing a translation table walk on MMU based systems or using the | ||
36 | + * MPU state on MPU based systems. | ||
37 | + * | ||
38 | + * Returns false if the translation was successful. Otherwise, phys_ptr, attrs, | ||
39 | + * prot and page_size may not be filled in, and the populated fsr value provides | ||
40 | + * information on why the translation aborted, in the format of a | ||
41 | + * DFSR/IFSR fault register, with the following caveats: | ||
42 | + * * we honour the short vs long DFSR format differences. | ||
43 | + * * the WnR bit is never set (the caller must do this). | ||
44 | + * * for PSMAv5 based systems we don't bother to return a full FSR format | ||
45 | + * value. | ||
46 | + */ | ||
47 | +bool get_phys_addr_with_secure(CPUARMState *env, target_ulong address, | ||
48 | + MMUAccessType access_type, | ||
49 | + ARMMMUIdx mmu_idx, bool is_secure, | ||
50 | + GetPhysAddrResult *result, ARMMMUFaultInfo *fi) | ||
51 | + __attribute__((nonnull)); | ||
52 | + | ||
53 | +/** | ||
54 | + * get_phys_addr: get the physical address for a virtual address | ||
55 | + * @env: CPUARMState | ||
56 | + * @address: virtual address to get physical address for | ||
57 | + * @access_type: 0 for read, 1 for write, 2 for execute | ||
58 | + * @mmu_idx: MMU index indicating required translation regime | ||
59 | + * @result: set on translation success. | ||
60 | + * @fi: set to fault info if the translation fails | ||
61 | + * | ||
62 | + * Similarly, but use the security regime of @mmu_idx. | ||
63 | + */ | ||
64 | bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
65 | MMUAccessType access_type, ARMMMUIdx mmu_idx, | ||
66 | GetPhysAddrResult *result, ARMMMUFaultInfo *fi) | ||
67 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c | ||
68 | index XXXXXXX..XXXXXXX 100644 | ||
69 | --- a/target/arm/ptw.c | ||
70 | +++ b/target/arm/ptw.c | ||
71 | @@ -XXX,XX +XXX,XX @@ static ARMCacheAttrs combine_cacheattrs(CPUARMState *env, | ||
72 | return ret; | ||
73 | } | ||
74 | |||
75 | -/** | ||
76 | - * get_phys_addr - get the physical address for this virtual address | ||
77 | - * | ||
78 | - * Find the physical address corresponding to the given virtual address, | ||
79 | - * by doing a translation table walk on MMU based systems or using the | ||
80 | - * MPU state on MPU based systems. | ||
81 | - * | ||
82 | - * Returns false if the translation was successful. Otherwise, phys_ptr, attrs, | ||
83 | - * prot and page_size may not be filled in, and the populated fsr value provides | ||
84 | - * information on why the translation aborted, in the format of a | ||
85 | - * DFSR/IFSR fault register, with the following caveats: | ||
86 | - * * we honour the short vs long DFSR format differences. | ||
87 | - * * the WnR bit is never set (the caller must do this). | ||
88 | - * * for PSMAv5 based systems we don't bother to return a full FSR format | ||
89 | - * value. | ||
90 | - * | ||
91 | - * @env: CPUARMState | ||
92 | - * @address: virtual address to get physical address for | ||
93 | - * @access_type: 0 for read, 1 for write, 2 for execute | ||
94 | - * @mmu_idx: MMU index indicating required translation regime | ||
95 | - * @result: set on translation success. | ||
96 | - * @fi: set to fault info if the translation fails | ||
97 | - */ | ||
98 | -bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
99 | - MMUAccessType access_type, ARMMMUIdx mmu_idx, | ||
100 | - GetPhysAddrResult *result, ARMMMUFaultInfo *fi) | ||
101 | +bool get_phys_addr_with_secure(CPUARMState *env, target_ulong address, | ||
102 | + MMUAccessType access_type, ARMMMUIdx mmu_idx, | ||
103 | + bool is_secure, GetPhysAddrResult *result, | ||
104 | + ARMMMUFaultInfo *fi) | ||
105 | { | ||
106 | ARMMMUIdx s1_mmu_idx = stage_1_mmu_idx(mmu_idx); | ||
107 | - bool is_secure = regime_is_secure(env, mmu_idx); | ||
108 | |||
109 | if (mmu_idx != s1_mmu_idx) { | ||
110 | /* | ||
111 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
112 | ARMMMUIdx s2_mmu_idx; | ||
113 | bool is_el0; | ||
114 | |||
115 | - ret = get_phys_addr(env, address, access_type, s1_mmu_idx, | ||
116 | - result, fi); | ||
117 | + ret = get_phys_addr_with_secure(env, address, access_type, | ||
118 | + s1_mmu_idx, is_secure, result, fi); | ||
119 | |||
120 | /* If S1 fails or S2 is disabled, return early. */ | ||
121 | if (ret || regime_translation_disabled(env, ARMMMUIdx_Stage2, | ||
122 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
17 | } | 123 | } |
18 | } | 124 | } |
19 | 125 | ||
20 | +/* | 126 | +bool get_phys_addr(CPUARMState *env, target_ulong address, |
21 | + * Constant expanders for the decoders. | 127 | + MMUAccessType access_type, ARMMMUIdx mmu_idx, |
22 | + */ | 128 | + GetPhysAddrResult *result, ARMMMUFaultInfo *fi) |
23 | + | ||
24 | +static int negate(DisasContext *s, int x) | ||
25 | +{ | 129 | +{ |
26 | + return -x; | 130 | + return get_phys_addr_with_secure(env, address, access_type, mmu_idx, |
131 | + regime_is_secure(env, mmu_idx), | ||
132 | + result, fi); | ||
27 | +} | 133 | +} |
28 | + | 134 | + |
29 | +static int plus_2(DisasContext *s, int x) | 135 | hwaddr arm_cpu_get_phys_page_attrs_debug(CPUState *cs, vaddr addr, |
30 | +{ | 136 | MemTxAttrs *attrs) |
31 | + return x + 2; | ||
32 | +} | ||
33 | + | ||
34 | +static int times_2(DisasContext *s, int x) | ||
35 | +{ | ||
36 | + return x * 2; | ||
37 | +} | ||
38 | + | ||
39 | +static int times_4(DisasContext *s, int x) | ||
40 | +{ | ||
41 | + return x * 4; | ||
42 | +} | ||
43 | + | ||
44 | /* Flags for the disas_set_da_iss info argument: | ||
45 | * lower bits hold the Rt register number, higher bits are flags. | ||
46 | */ | ||
47 | @@ -XXX,XX +XXX,XX @@ static void arm_skip_unless(DisasContext *s, uint32_t cond) | ||
48 | |||
49 | |||
50 | /* | ||
51 | - * Constant expanders for the decoders. | ||
52 | + * Constant expanders used by T16/T32 decode | ||
53 | */ | ||
54 | |||
55 | -static int negate(DisasContext *s, int x) | ||
56 | -{ | ||
57 | - return -x; | ||
58 | -} | ||
59 | - | ||
60 | -static int plus_2(DisasContext *s, int x) | ||
61 | -{ | ||
62 | - return x + 2; | ||
63 | -} | ||
64 | - | ||
65 | -static int times_2(DisasContext *s, int x) | ||
66 | -{ | ||
67 | - return x * 2; | ||
68 | -} | ||
69 | - | ||
70 | -static int times_4(DisasContext *s, int x) | ||
71 | -{ | ||
72 | - return x * 4; | ||
73 | -} | ||
74 | - | ||
75 | /* Return only the rotation part of T32ExpandImm. */ | ||
76 | static int t32_expandimm_rot(DisasContext *s, int x) | ||
77 | { | 137 | { |
78 | -- | 138 | -- |
79 | 2.20.1 | 139 | 2.25.1 |
80 | |||
81 | diff view generated by jsdifflib |
1 | v8.1M introduces a new TRD flag in the CCR register, which enables | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | checking for stack frame integrity signatures on SG instructions. | ||
3 | Add the code in the SG insn implementation for the new behaviour. | ||
4 | 2 | ||
3 | Remove the use of regime_is_secure from v7m_read_half_insn, using | ||
4 | the new parameter instead. | ||
5 | |||
6 | As it happens, both callers pass true, propagated from the argument | ||
7 | to arm_v7m_mmu_idx_for_secstate which created the mmu_idx argument, | ||
8 | but that is a detail of v7m_handle_execute_nsc we need not expose | ||
9 | to the callee. | ||
10 | |||
11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | ||
13 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
14 | Message-id: 20221001162318.153420-7-richard.henderson@linaro.org | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 15 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
7 | Message-id: 20201119215617.29887-24-peter.maydell@linaro.org | ||
8 | --- | 16 | --- |
9 | target/arm/m_helper.c | 86 +++++++++++++++++++++++++++++++++++++++++++ | 17 | target/arm/m_helper.c | 9 ++++----- |
10 | 1 file changed, 86 insertions(+) | 18 | 1 file changed, 4 insertions(+), 5 deletions(-) |
11 | 19 | ||
12 | diff --git a/target/arm/m_helper.c b/target/arm/m_helper.c | 20 | diff --git a/target/arm/m_helper.c b/target/arm/m_helper.c |
13 | index XXXXXXX..XXXXXXX 100644 | 21 | index XXXXXXX..XXXXXXX 100644 |
14 | --- a/target/arm/m_helper.c | 22 | --- a/target/arm/m_helper.c |
15 | +++ b/target/arm/m_helper.c | 23 | +++ b/target/arm/m_helper.c |
16 | @@ -XXX,XX +XXX,XX @@ static bool v7m_read_half_insn(ARMCPU *cpu, ARMMMUIdx mmu_idx, | 24 | @@ -XXX,XX +XXX,XX @@ static bool do_v7m_function_return(ARMCPU *cpu) |
17 | return true; | 25 | return true; |
18 | } | 26 | } |
19 | 27 | ||
20 | +static bool v7m_read_sg_stack_word(ARMCPU *cpu, ARMMMUIdx mmu_idx, | 28 | -static bool v7m_read_half_insn(ARMCPU *cpu, ARMMMUIdx mmu_idx, |
21 | + uint32_t addr, uint32_t *spdata) | 29 | +static bool v7m_read_half_insn(ARMCPU *cpu, ARMMMUIdx mmu_idx, bool secure, |
22 | +{ | 30 | uint32_t addr, uint16_t *insn) |
23 | + /* | ||
24 | + * Read a word of data from the stack for the SG instruction, | ||
25 | + * writing the value into *spdata. If the load succeeds, return | ||
26 | + * true; otherwise pend an appropriate exception and return false. | ||
27 | + * (We can't use data load helpers here that throw an exception | ||
28 | + * because of the context we're called in, which is halfway through | ||
29 | + * arm_v7m_cpu_do_interrupt().) | ||
30 | + */ | ||
31 | + CPUState *cs = CPU(cpu); | ||
32 | + CPUARMState *env = &cpu->env; | ||
33 | + MemTxAttrs attrs = {}; | ||
34 | + MemTxResult txres; | ||
35 | + target_ulong page_size; | ||
36 | + hwaddr physaddr; | ||
37 | + int prot; | ||
38 | + ARMMMUFaultInfo fi = {}; | ||
39 | + ARMCacheAttrs cacheattrs = {}; | ||
40 | + uint32_t value; | ||
41 | + | ||
42 | + if (get_phys_addr(env, addr, MMU_DATA_LOAD, mmu_idx, &physaddr, | ||
43 | + &attrs, &prot, &page_size, &fi, &cacheattrs)) { | ||
44 | + /* MPU/SAU lookup failed */ | ||
45 | + if (fi.type == ARMFault_QEMU_SFault) { | ||
46 | + qemu_log_mask(CPU_LOG_INT, | ||
47 | + "...SecureFault during stack word read\n"); | ||
48 | + env->v7m.sfsr |= R_V7M_SFSR_AUVIOL_MASK | R_V7M_SFSR_SFARVALID_MASK; | ||
49 | + env->v7m.sfar = addr; | ||
50 | + armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_SECURE, false); | ||
51 | + } else { | ||
52 | + qemu_log_mask(CPU_LOG_INT, | ||
53 | + "...MemManageFault during stack word read\n"); | ||
54 | + env->v7m.cfsr[M_REG_S] |= R_V7M_CFSR_DACCVIOL_MASK | | ||
55 | + R_V7M_CFSR_MMARVALID_MASK; | ||
56 | + env->v7m.mmfar[M_REG_S] = addr; | ||
57 | + armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_MEM, false); | ||
58 | + } | ||
59 | + return false; | ||
60 | + } | ||
61 | + value = address_space_ldl(arm_addressspace(cs, attrs), physaddr, | ||
62 | + attrs, &txres); | ||
63 | + if (txres != MEMTX_OK) { | ||
64 | + /* BusFault trying to read the data */ | ||
65 | + qemu_log_mask(CPU_LOG_INT, | ||
66 | + "...BusFault during stack word read\n"); | ||
67 | + env->v7m.cfsr[M_REG_NS] |= | ||
68 | + (R_V7M_CFSR_PRECISERR_MASK | R_V7M_CFSR_BFARVALID_MASK); | ||
69 | + env->v7m.bfar = addr; | ||
70 | + armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_BUS, false); | ||
71 | + return false; | ||
72 | + } | ||
73 | + | ||
74 | + *spdata = value; | ||
75 | + return true; | ||
76 | +} | ||
77 | + | ||
78 | static bool v7m_handle_execute_nsc(ARMCPU *cpu) | ||
79 | { | 31 | { |
80 | /* | 32 | /* |
33 | @@ -XXX,XX +XXX,XX @@ static bool v7m_read_half_insn(ARMCPU *cpu, ARMMMUIdx mmu_idx, | ||
34 | ARMMMUFaultInfo fi = {}; | ||
35 | MemTxResult txres; | ||
36 | |||
37 | - v8m_security_lookup(env, addr, MMU_INST_FETCH, mmu_idx, | ||
38 | - regime_is_secure(env, mmu_idx), &sattrs); | ||
39 | + v8m_security_lookup(env, addr, MMU_INST_FETCH, mmu_idx, secure, &sattrs); | ||
40 | if (!sattrs.nsc || sattrs.ns) { | ||
41 | /* | ||
42 | * This must be the second half of the insn, and it straddles a | ||
81 | @@ -XXX,XX +XXX,XX @@ static bool v7m_handle_execute_nsc(ARMCPU *cpu) | 43 | @@ -XXX,XX +XXX,XX @@ static bool v7m_handle_execute_nsc(ARMCPU *cpu) |
82 | */ | 44 | /* We want to do the MPU lookup as secure; work out what mmu_idx that is */ |
83 | qemu_log_mask(CPU_LOG_INT, "...really an SG instruction at 0x%08" PRIx32 | 45 | mmu_idx = arm_v7m_mmu_idx_for_secstate(env, true); |
84 | ", executing it\n", env->regs[15]); | 46 | |
85 | + | 47 | - if (!v7m_read_half_insn(cpu, mmu_idx, env->regs[15], &insn)) { |
86 | + if (cpu_isar_feature(aa32_m_sec_state, cpu) && | 48 | + if (!v7m_read_half_insn(cpu, mmu_idx, true, env->regs[15], &insn)) { |
87 | + !arm_v7m_is_handler_mode(env)) { | 49 | return false; |
88 | + /* | 50 | } |
89 | + * v8.1M exception stack frame integrity check. Note that we | 51 | |
90 | + * must perform the memory access even if CCR_S.TRD is zero | 52 | @@ -XXX,XX +XXX,XX @@ static bool v7m_handle_execute_nsc(ARMCPU *cpu) |
91 | + * and we aren't going to check what the data loaded is. | 53 | goto gen_invep; |
92 | + */ | 54 | } |
93 | + uint32_t spdata, sp; | 55 | |
94 | + | 56 | - if (!v7m_read_half_insn(cpu, mmu_idx, env->regs[15] + 2, &insn)) { |
95 | + /* | 57 | + if (!v7m_read_half_insn(cpu, mmu_idx, true, env->regs[15] + 2, &insn)) { |
96 | + * We know we are currently NS, so the S stack pointers must be | 58 | return false; |
97 | + * in other_ss_{psp,msp}, not in regs[13]/other_sp. | 59 | } |
98 | + */ | 60 | |
99 | + sp = v7m_using_psp(env) ? env->v7m.other_ss_psp : env->v7m.other_ss_msp; | ||
100 | + if (!v7m_read_sg_stack_word(cpu, mmu_idx, sp, &spdata)) { | ||
101 | + /* Stack access failed and an exception has been pended */ | ||
102 | + return false; | ||
103 | + } | ||
104 | + | ||
105 | + if (env->v7m.ccr[M_REG_S] & R_V7M_CCR_TRD_MASK) { | ||
106 | + if (((spdata & ~1) == 0xfefa125a) || | ||
107 | + !(env->v7m.control[M_REG_S] & 1)) { | ||
108 | + goto gen_invep; | ||
109 | + } | ||
110 | + } | ||
111 | + } | ||
112 | + | ||
113 | env->regs[14] &= ~1; | ||
114 | env->v7m.control[M_REG_S] &= ~R_V7M_CONTROL_SFPA_MASK; | ||
115 | switch_v7m_security_state(env, true); | ||
116 | -- | 61 | -- |
117 | 2.20.1 | 62 | 2.25.1 |
118 | 63 | ||
119 | 64 | diff view generated by jsdifflib |
1 | The FPDSCR register has a similar layout to the FPSCR. In v8.1M it | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | gains new fields FZ16 (if half-precision floating point is supported) | ||
3 | and LTPSIZE (always reads as 4). Update the reset value and the code | ||
4 | that handles writes to this register accordingly. | ||
5 | 2 | ||
3 | Remove the use of regime_is_secure from arm_tr_init_disas_context. | ||
4 | Instead, provide the value of v8m_secure directly from tb_flags. | ||
5 | Rather than use regime_is_secure, use the env->v7m.secure directly, | ||
6 | as per arm_mmu_idx_el. | ||
7 | |||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
10 | Message-id: 20221001162318.153420-8-richard.henderson@linaro.org | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20201119215617.29887-16-peter.maydell@linaro.org | ||
9 | --- | 12 | --- |
10 | target/arm/cpu.h | 5 +++++ | 13 | target/arm/cpu.h | 2 ++ |
11 | hw/intc/armv7m_nvic.c | 9 ++++++++- | 14 | target/arm/helper.c | 4 ++++ |
12 | target/arm/cpu.c | 3 +++ | 15 | target/arm/translate.c | 3 +-- |
13 | 3 files changed, 16 insertions(+), 1 deletion(-) | 16 | 3 files changed, 7 insertions(+), 2 deletions(-) |
14 | 17 | ||
15 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 18 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
16 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/target/arm/cpu.h | 20 | --- a/target/arm/cpu.h |
18 | +++ b/target/arm/cpu.h | 21 | +++ b/target/arm/cpu.h |
19 | @@ -XXX,XX +XXX,XX @@ void vfp_set_fpscr(CPUARMState *env, uint32_t val); | 22 | @@ -XXX,XX +XXX,XX @@ FIELD(TBFLAG_M32, NEW_FP_CTXT_NEEDED, 3, 1) /* Not cached. */ |
20 | #define FPCR_IXE (1 << 12) /* Inexact exception trap enable */ | 23 | FIELD(TBFLAG_M32, FPCCR_S_WRONG, 4, 1) /* Not cached. */ |
21 | #define FPCR_IDE (1 << 15) /* Input Denormal exception trap enable */ | 24 | /* Set if MVE insns are definitely not predicated by VPR or LTPSIZE */ |
22 | #define FPCR_FZ16 (1 << 19) /* ARMv8.2+, FP16 flush-to-zero */ | 25 | FIELD(TBFLAG_M32, MVE_NO_PRED, 5, 1) /* Not cached. */ |
23 | +#define FPCR_RMODE_MASK (3 << 22) /* Rounding mode */ | 26 | +/* Set if in secure mode */ |
24 | #define FPCR_FZ (1 << 24) /* Flush-to-zero enable bit */ | 27 | +FIELD(TBFLAG_M32, SECURE, 6, 1) |
25 | #define FPCR_DN (1 << 25) /* Default NaN enable bit */ | 28 | |
26 | +#define FPCR_AHP (1 << 26) /* Alternative half-precision */ | 29 | /* |
27 | #define FPCR_QC (1 << 27) /* Cumulative saturation bit */ | 30 | * Bit usage when in AArch64 state |
28 | #define FPCR_V (1 << 28) /* FP overflow flag */ | 31 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
29 | #define FPCR_C (1 << 29) /* FP carry flag */ | 32 | index XXXXXXX..XXXXXXX 100644 |
30 | #define FPCR_Z (1 << 30) /* FP zero flag */ | 33 | --- a/target/arm/helper.c |
31 | #define FPCR_N (1 << 31) /* FP negative flag */ | 34 | +++ b/target/arm/helper.c |
32 | 35 | @@ -XXX,XX +XXX,XX @@ static CPUARMTBFlags rebuild_hflags_m32(CPUARMState *env, int fp_el, | |
33 | +#define FPCR_LTPSIZE_SHIFT 16 /* LTPSIZE, M-profile only */ | 36 | DP_TBFLAG_M32(flags, STACKCHECK, 1); |
34 | +#define FPCR_LTPSIZE_MASK (7 << FPCR_LTPSIZE_SHIFT) | 37 | } |
38 | |||
39 | + if (arm_feature(env, ARM_FEATURE_M_SECURITY) && env->v7m.secure) { | ||
40 | + DP_TBFLAG_M32(flags, SECURE, 1); | ||
41 | + } | ||
35 | + | 42 | + |
36 | #define FPCR_NZCV_MASK (FPCR_N | FPCR_Z | FPCR_C | FPCR_V) | 43 | return rebuild_hflags_common_32(env, fp_el, mmu_idx, flags); |
37 | #define FPCR_NZCVQC_MASK (FPCR_NZCV_MASK | FPCR_QC) | 44 | } |
38 | 45 | ||
39 | diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c | 46 | diff --git a/target/arm/translate.c b/target/arm/translate.c |
40 | index XXXXXXX..XXXXXXX 100644 | 47 | index XXXXXXX..XXXXXXX 100644 |
41 | --- a/hw/intc/armv7m_nvic.c | 48 | --- a/target/arm/translate.c |
42 | +++ b/hw/intc/armv7m_nvic.c | 49 | +++ b/target/arm/translate.c |
43 | @@ -XXX,XX +XXX,XX @@ static void nvic_writel(NVICState *s, uint32_t offset, uint32_t value, | 50 | @@ -XXX,XX +XXX,XX @@ static void arm_tr_init_disas_context(DisasContextBase *dcbase, CPUState *cs) |
44 | break; | 51 | dc->vfp_enabled = 1; |
45 | case 0xf3c: /* FPDSCR */ | 52 | dc->be_data = MO_TE; |
46 | if (cpu_isar_feature(aa32_vfp_simd, cpu)) { | 53 | dc->v7m_handler_mode = EX_TBFLAG_M32(tb_flags, HANDLER); |
47 | - value &= 0x07c00000; | 54 | - dc->v8m_secure = arm_feature(env, ARM_FEATURE_M_SECURITY) && |
48 | + uint32_t mask = FPCR_AHP | FPCR_DN | FPCR_FZ | FPCR_RMODE_MASK; | 55 | - regime_is_secure(env, dc->mmu_idx); |
49 | + if (cpu_isar_feature(any_fp16, cpu)) { | 56 | + dc->v8m_secure = EX_TBFLAG_M32(tb_flags, SECURE); |
50 | + mask |= FPCR_FZ16; | 57 | dc->v8m_stackcheck = EX_TBFLAG_M32(tb_flags, STACKCHECK); |
51 | + } | 58 | dc->v8m_fpccr_s_wrong = EX_TBFLAG_M32(tb_flags, FPCCR_S_WRONG); |
52 | + value &= mask; | 59 | dc->v7m_new_fp_ctxt_needed = |
53 | + if (cpu_isar_feature(aa32_lob, cpu)) { | ||
54 | + value |= 4 << FPCR_LTPSIZE_SHIFT; | ||
55 | + } | ||
56 | cpu->env.v7m.fpdscr[attrs.secure] = value; | ||
57 | } | ||
58 | break; | ||
59 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | ||
60 | index XXXXXXX..XXXXXXX 100644 | ||
61 | --- a/target/arm/cpu.c | ||
62 | +++ b/target/arm/cpu.c | ||
63 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(DeviceState *dev) | ||
64 | * always reset to 4. | ||
65 | */ | ||
66 | env->v7m.ltpsize = 4; | ||
67 | + /* The LTPSIZE field in FPDSCR is constant and reads as 4. */ | ||
68 | + env->v7m.fpdscr[M_REG_NS] = 4 << FPCR_LTPSIZE_SHIFT; | ||
69 | + env->v7m.fpdscr[M_REG_S] = 4 << FPCR_LTPSIZE_SHIFT; | ||
70 | } | ||
71 | |||
72 | if (arm_feature(env, ARM_FEATURE_M_SECURITY)) { | ||
73 | -- | 60 | -- |
74 | 2.20.1 | 61 | 2.25.1 |
75 | |||
76 | diff view generated by jsdifflib |
1 | From: Kunkun Jiang <jiangkunkun@huawei.com> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Accroding to the SMMUv3 spec, the SPAN field of Level1 Stream Table | 3 | This is the last use of regime_is_secure; remove it |
4 | Descriptor is 5 bits([4:0]). | 4 | entirely before changing the layout of ARMMMUIdx. |
5 | 5 | ||
6 | Fixes: 9bde7f0674f(hw/arm/smmuv3: Implement translate callback) | ||
7 | Signed-off-by: Kunkun Jiang <jiangkunkun@huawei.com> | ||
8 | Message-id: 20201124023711.1184-1-jiangkunkun@huawei.com | ||
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Acked-by: Eric Auger <eric.auger@redhat.com> | 7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
8 | Message-id: 20221001162318.153420-9-richard.henderson@linaro.org | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | --- | 10 | --- |
13 | hw/arm/smmuv3-internal.h | 2 +- | 11 | target/arm/internals.h | 42 ---------------------------------------- |
14 | 1 file changed, 1 insertion(+), 1 deletion(-) | 12 | target/arm/ptw.c | 44 ++++++++++++++++++++++++++++++++++++++++-- |
13 | 2 files changed, 42 insertions(+), 44 deletions(-) | ||
15 | 14 | ||
16 | diff --git a/hw/arm/smmuv3-internal.h b/hw/arm/smmuv3-internal.h | 15 | diff --git a/target/arm/internals.h b/target/arm/internals.h |
17 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/hw/arm/smmuv3-internal.h | 17 | --- a/target/arm/internals.h |
19 | +++ b/hw/arm/smmuv3-internal.h | 18 | +++ b/target/arm/internals.h |
20 | @@ -XXX,XX +XXX,XX @@ static inline uint64_t l1std_l2ptr(STEDesc *desc) | 19 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_has_2_ranges(ARMMMUIdx mmu_idx) |
21 | return hi << 32 | lo; | 20 | } |
22 | } | 21 | } |
23 | 22 | ||
24 | -#define L1STD_SPAN(stm) (extract32((stm)->word[0], 0, 4)) | 23 | -/* Return true if this address translation regime is secure */ |
25 | +#define L1STD_SPAN(stm) (extract32((stm)->word[0], 0, 5)) | 24 | -static inline bool regime_is_secure(CPUARMState *env, ARMMMUIdx mmu_idx) |
26 | 25 | -{ | |
27 | #endif | 26 | - switch (mmu_idx) { |
27 | - case ARMMMUIdx_E10_0: | ||
28 | - case ARMMMUIdx_E10_1: | ||
29 | - case ARMMMUIdx_E10_1_PAN: | ||
30 | - case ARMMMUIdx_E20_0: | ||
31 | - case ARMMMUIdx_E20_2: | ||
32 | - case ARMMMUIdx_E20_2_PAN: | ||
33 | - case ARMMMUIdx_Stage1_E0: | ||
34 | - case ARMMMUIdx_Stage1_E1: | ||
35 | - case ARMMMUIdx_Stage1_E1_PAN: | ||
36 | - case ARMMMUIdx_E2: | ||
37 | - case ARMMMUIdx_Stage2: | ||
38 | - case ARMMMUIdx_MPrivNegPri: | ||
39 | - case ARMMMUIdx_MUserNegPri: | ||
40 | - case ARMMMUIdx_MPriv: | ||
41 | - case ARMMMUIdx_MUser: | ||
42 | - return false; | ||
43 | - case ARMMMUIdx_SE3: | ||
44 | - case ARMMMUIdx_SE10_0: | ||
45 | - case ARMMMUIdx_SE10_1: | ||
46 | - case ARMMMUIdx_SE10_1_PAN: | ||
47 | - case ARMMMUIdx_SE20_0: | ||
48 | - case ARMMMUIdx_SE20_2: | ||
49 | - case ARMMMUIdx_SE20_2_PAN: | ||
50 | - case ARMMMUIdx_Stage1_SE0: | ||
51 | - case ARMMMUIdx_Stage1_SE1: | ||
52 | - case ARMMMUIdx_Stage1_SE1_PAN: | ||
53 | - case ARMMMUIdx_SE2: | ||
54 | - case ARMMMUIdx_Stage2_S: | ||
55 | - case ARMMMUIdx_MSPrivNegPri: | ||
56 | - case ARMMMUIdx_MSUserNegPri: | ||
57 | - case ARMMMUIdx_MSPriv: | ||
58 | - case ARMMMUIdx_MSUser: | ||
59 | - return true; | ||
60 | - default: | ||
61 | - g_assert_not_reached(); | ||
62 | - } | ||
63 | -} | ||
64 | - | ||
65 | static inline bool regime_is_pan(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
66 | { | ||
67 | switch (mmu_idx) { | ||
68 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c | ||
69 | index XXXXXXX..XXXXXXX 100644 | ||
70 | --- a/target/arm/ptw.c | ||
71 | +++ b/target/arm/ptw.c | ||
72 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
73 | MMUAccessType access_type, ARMMMUIdx mmu_idx, | ||
74 | GetPhysAddrResult *result, ARMMMUFaultInfo *fi) | ||
75 | { | ||
76 | + bool is_secure; | ||
77 | + | ||
78 | + switch (mmu_idx) { | ||
79 | + case ARMMMUIdx_E10_0: | ||
80 | + case ARMMMUIdx_E10_1: | ||
81 | + case ARMMMUIdx_E10_1_PAN: | ||
82 | + case ARMMMUIdx_E20_0: | ||
83 | + case ARMMMUIdx_E20_2: | ||
84 | + case ARMMMUIdx_E20_2_PAN: | ||
85 | + case ARMMMUIdx_Stage1_E0: | ||
86 | + case ARMMMUIdx_Stage1_E1: | ||
87 | + case ARMMMUIdx_Stage1_E1_PAN: | ||
88 | + case ARMMMUIdx_E2: | ||
89 | + case ARMMMUIdx_Stage2: | ||
90 | + case ARMMMUIdx_MPrivNegPri: | ||
91 | + case ARMMMUIdx_MUserNegPri: | ||
92 | + case ARMMMUIdx_MPriv: | ||
93 | + case ARMMMUIdx_MUser: | ||
94 | + is_secure = false; | ||
95 | + break; | ||
96 | + case ARMMMUIdx_SE3: | ||
97 | + case ARMMMUIdx_SE10_0: | ||
98 | + case ARMMMUIdx_SE10_1: | ||
99 | + case ARMMMUIdx_SE10_1_PAN: | ||
100 | + case ARMMMUIdx_SE20_0: | ||
101 | + case ARMMMUIdx_SE20_2: | ||
102 | + case ARMMMUIdx_SE20_2_PAN: | ||
103 | + case ARMMMUIdx_Stage1_SE0: | ||
104 | + case ARMMMUIdx_Stage1_SE1: | ||
105 | + case ARMMMUIdx_Stage1_SE1_PAN: | ||
106 | + case ARMMMUIdx_SE2: | ||
107 | + case ARMMMUIdx_Stage2_S: | ||
108 | + case ARMMMUIdx_MSPrivNegPri: | ||
109 | + case ARMMMUIdx_MSUserNegPri: | ||
110 | + case ARMMMUIdx_MSPriv: | ||
111 | + case ARMMMUIdx_MSUser: | ||
112 | + is_secure = true; | ||
113 | + break; | ||
114 | + default: | ||
115 | + g_assert_not_reached(); | ||
116 | + } | ||
117 | return get_phys_addr_with_secure(env, address, access_type, mmu_idx, | ||
118 | - regime_is_secure(env, mmu_idx), | ||
119 | - result, fi); | ||
120 | + is_secure, result, fi); | ||
121 | } | ||
122 | |||
123 | hwaddr arm_cpu_get_phys_page_attrs_debug(CPUState *cs, vaddr addr, | ||
28 | -- | 124 | -- |
29 | 2.20.1 | 125 | 2.25.1 |
30 | |||
31 | diff view generated by jsdifflib |
1 | In v8.1M the PXN architecture extension adds a new PXN bit to the | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | MPU_RLAR registers, which forbids execution of code in the region | ||
3 | from a privileged mode. | ||
4 | 2 | ||
5 | This is another feature which is just in the generic "in v8.1M" set | 3 | Use get_phys_addr_with_secure directly. For a-profile, this is the |
6 | and has no ID register field indicating its presence. | 4 | one place where the value of is_secure may not equal arm_is_secure(env). |
7 | 5 | ||
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20221001162318.153420-10-richard.henderson@linaro.org | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
10 | Message-id: 20201119215617.29887-3-peter.maydell@linaro.org | ||
11 | --- | 10 | --- |
12 | target/arm/helper.c | 7 ++++++- | 11 | target/arm/helper.c | 19 ++++++++++++++----- |
13 | 1 file changed, 6 insertions(+), 1 deletion(-) | 12 | 1 file changed, 14 insertions(+), 5 deletions(-) |
14 | 13 | ||
15 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 14 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
16 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/target/arm/helper.c | 16 | --- a/target/arm/helper.c |
18 | +++ b/target/arm/helper.c | 17 | +++ b/target/arm/helper.c |
19 | @@ -XXX,XX +XXX,XX @@ bool pmsav8_mpu_lookup(CPUARMState *env, uint32_t address, | 18 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult ats_access(CPUARMState *env, const ARMCPRegInfo *ri, |
20 | } else { | 19 | |
21 | uint32_t ap = extract32(env->pmsav8.rbar[secure][matchregion], 1, 2); | 20 | #ifdef CONFIG_TCG |
22 | uint32_t xn = extract32(env->pmsav8.rbar[secure][matchregion], 0, 1); | 21 | static uint64_t do_ats_write(CPUARMState *env, uint64_t value, |
23 | + bool pxn = false; | 22 | - MMUAccessType access_type, ARMMMUIdx mmu_idx) |
24 | + | 23 | + MMUAccessType access_type, ARMMMUIdx mmu_idx, |
25 | + if (arm_feature(env, ARM_FEATURE_V8_1M)) { | 24 | + bool is_secure) |
26 | + pxn = extract32(env->pmsav8.rlar[secure][matchregion], 4, 1); | 25 | { |
27 | + } | 26 | bool ret; |
28 | 27 | uint64_t par64; | |
29 | if (m_is_system_region(env, address)) { | 28 | @@ -XXX,XX +XXX,XX @@ static uint64_t do_ats_write(CPUARMState *env, uint64_t value, |
30 | /* System space is always execute never */ | 29 | ARMMMUFaultInfo fi = {}; |
31 | @@ -XXX,XX +XXX,XX @@ bool pmsav8_mpu_lookup(CPUARMState *env, uint32_t address, | 30 | GetPhysAddrResult res = {}; |
32 | } | 31 | |
33 | 32 | - ret = get_phys_addr(env, value, access_type, mmu_idx, &res, &fi); | |
34 | *prot = simple_ap_to_rw_prot(env, mmu_idx, ap); | 33 | + ret = get_phys_addr_with_secure(env, value, access_type, mmu_idx, |
35 | - if (*prot && !xn) { | 34 | + is_secure, &res, &fi); |
36 | + if (*prot && !xn && !(pxn && !is_user)) { | 35 | |
37 | *prot |= PAGE_EXEC; | 36 | /* |
38 | } | 37 | * ATS operations only do S1 or S1+S2 translations, so we never |
39 | /* We don't need to look the attribute up in the MAIR0/MAIR1 | 38 | @@ -XXX,XX +XXX,XX @@ static void ats_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) |
39 | switch (el) { | ||
40 | case 3: | ||
41 | mmu_idx = ARMMMUIdx_SE3; | ||
42 | + secure = true; | ||
43 | break; | ||
44 | case 2: | ||
45 | g_assert(!secure); /* ARMv8.4-SecEL2 is 64-bit only */ | ||
46 | @@ -XXX,XX +XXX,XX @@ static void ats_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
47 | switch (el) { | ||
48 | case 3: | ||
49 | mmu_idx = ARMMMUIdx_SE10_0; | ||
50 | + secure = true; | ||
51 | break; | ||
52 | case 2: | ||
53 | g_assert(!secure); /* ARMv8.4-SecEL2 is 64-bit only */ | ||
54 | @@ -XXX,XX +XXX,XX @@ static void ats_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
55 | case 4: | ||
56 | /* stage 1+2 NonSecure PL1: ATS12NSOPR, ATS12NSOPW */ | ||
57 | mmu_idx = ARMMMUIdx_E10_1; | ||
58 | + secure = false; | ||
59 | break; | ||
60 | case 6: | ||
61 | /* stage 1+2 NonSecure PL0: ATS12NSOUR, ATS12NSOUW */ | ||
62 | mmu_idx = ARMMMUIdx_E10_0; | ||
63 | + secure = false; | ||
64 | break; | ||
65 | default: | ||
66 | g_assert_not_reached(); | ||
67 | } | ||
68 | |||
69 | - par64 = do_ats_write(env, value, access_type, mmu_idx); | ||
70 | + par64 = do_ats_write(env, value, access_type, mmu_idx, secure); | ||
71 | |||
72 | A32_BANKED_CURRENT_REG_SET(env, par, par64); | ||
73 | #else | ||
74 | @@ -XXX,XX +XXX,XX @@ static void ats1h_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
75 | MMUAccessType access_type = ri->opc2 & 1 ? MMU_DATA_STORE : MMU_DATA_LOAD; | ||
76 | uint64_t par64; | ||
77 | |||
78 | - par64 = do_ats_write(env, value, access_type, ARMMMUIdx_E2); | ||
79 | + /* There is no SecureEL2 for AArch32. */ | ||
80 | + par64 = do_ats_write(env, value, access_type, ARMMMUIdx_E2, false); | ||
81 | |||
82 | A32_BANKED_CURRENT_REG_SET(env, par, par64); | ||
83 | #else | ||
84 | @@ -XXX,XX +XXX,XX @@ static void ats_write64(CPUARMState *env, const ARMCPRegInfo *ri, | ||
85 | break; | ||
86 | case 6: /* AT S1E3R, AT S1E3W */ | ||
87 | mmu_idx = ARMMMUIdx_SE3; | ||
88 | + secure = true; | ||
89 | break; | ||
90 | default: | ||
91 | g_assert_not_reached(); | ||
92 | @@ -XXX,XX +XXX,XX @@ static void ats_write64(CPUARMState *env, const ARMCPRegInfo *ri, | ||
93 | g_assert_not_reached(); | ||
94 | } | ||
95 | |||
96 | - env->cp15.par_el[1] = do_ats_write(env, value, access_type, mmu_idx); | ||
97 | + env->cp15.par_el[1] = do_ats_write(env, value, access_type, | ||
98 | + mmu_idx, secure); | ||
99 | #else | ||
100 | /* Handled by hardware accelerator. */ | ||
101 | g_assert_not_reached(); | ||
40 | -- | 102 | -- |
41 | 2.20.1 | 103 | 2.25.1 |
42 | |||
43 | diff view generated by jsdifflib |
1 | v8.1M defines a new FP system register FPSCR_nzcvqc; this behaves | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | like the existing FPSCR, except that it reads and writes only bits | ||
3 | [31:27] of the FPSCR (the N, Z, C, V and QC flag bits). (Unlike the | ||
4 | FPSCR, the special case for Rt=15 of writing the CPSR.NZCV is not | ||
5 | permitted.) | ||
6 | 2 | ||
7 | Implement the register. Since we don't yet implement MVE, we handle | 3 | For a-profile aarch64, which does not bank system registers, it takes |
8 | the QC bit as RES0, with todo comments for where we will need to add | 4 | quite a lot of code to switch between security states. In the process, |
9 | support later. | 5 | registers such as TCR_EL{1,2} must be swapped, which in itself requires |
6 | the flushing of softmmu tlbs. Therefore it doesn't buy us anything to | ||
7 | separate tlbs by security state. | ||
10 | 8 | ||
9 | Retain the distinction between Stage2 and Stage2_S. | ||
10 | |||
11 | This will be important as we implement FEAT_RME, and do not wish to | ||
12 | add a third set of mmu indexes for Realm state. | ||
13 | |||
14 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
15 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
16 | Message-id: 20221001162318.153420-11-richard.henderson@linaro.org | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 17 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
13 | Message-id: 20201119215617.29887-11-peter.maydell@linaro.org | ||
14 | --- | 18 | --- |
15 | target/arm/cpu.h | 13 +++++++++++++ | 19 | target/arm/cpu-param.h | 2 +- |
16 | target/arm/translate-vfp.c.inc | 27 +++++++++++++++++++++++++++ | 20 | target/arm/cpu.h | 72 +++++++------------ |
17 | 2 files changed, 40 insertions(+) | 21 | target/arm/internals.h | 31 +------- |
22 | target/arm/helper.c | 144 +++++++++++++------------------------ | ||
23 | target/arm/ptw.c | 25 ++----- | ||
24 | target/arm/translate-a64.c | 8 --- | ||
25 | target/arm/translate.c | 6 +- | ||
26 | 7 files changed, 85 insertions(+), 203 deletions(-) | ||
18 | 27 | ||
28 | diff --git a/target/arm/cpu-param.h b/target/arm/cpu-param.h | ||
29 | index XXXXXXX..XXXXXXX 100644 | ||
30 | --- a/target/arm/cpu-param.h | ||
31 | +++ b/target/arm/cpu-param.h | ||
32 | @@ -XXX,XX +XXX,XX @@ | ||
33 | # define TARGET_PAGE_BITS_MIN 10 | ||
34 | #endif | ||
35 | |||
36 | -#define NB_MMU_MODES 15 | ||
37 | +#define NB_MMU_MODES 8 | ||
38 | |||
39 | #endif | ||
19 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 40 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
20 | index XXXXXXX..XXXXXXX 100644 | 41 | index XXXXXXX..XXXXXXX 100644 |
21 | --- a/target/arm/cpu.h | 42 | --- a/target/arm/cpu.h |
22 | +++ b/target/arm/cpu.h | 43 | +++ b/target/arm/cpu.h |
23 | @@ -XXX,XX +XXX,XX @@ void vfp_set_fpscr(CPUARMState *env, uint32_t val); | 44 | @@ -XXX,XX +XXX,XX @@ bool write_cpustate_to_list(ARMCPU *cpu, bool kvm_sync); |
24 | #define FPCR_FZ (1 << 24) /* Flush-to-zero enable bit */ | 45 | * table over and over. |
25 | #define FPCR_DN (1 << 25) /* Default NaN enable bit */ | 46 | * 6. we need separate EL1/EL2 mmu_idx for handling the Privileged Access |
26 | #define FPCR_QC (1 << 27) /* Cumulative saturation bit */ | 47 | * Never (PAN) bit within PSTATE. |
27 | +#define FPCR_V (1 << 28) /* FP overflow flag */ | 48 | + * 7. we fold together the secure and non-secure regimes for A-profile, |
28 | +#define FPCR_C (1 << 29) /* FP carry flag */ | 49 | + * because there are no banked system registers for aarch64, so the |
29 | +#define FPCR_Z (1 << 30) /* FP zero flag */ | 50 | + * process of switching between secure and non-secure is |
30 | +#define FPCR_N (1 << 31) /* FP negative flag */ | 51 | + * already heavyweight. |
52 | * | ||
53 | * This gives us the following list of cases: | ||
54 | * | ||
55 | - * NS EL0 EL1&0 stage 1+2 (aka NS PL0) | ||
56 | - * NS EL1 EL1&0 stage 1+2 (aka NS PL1) | ||
57 | - * NS EL1 EL1&0 stage 1+2 +PAN | ||
58 | - * NS EL0 EL2&0 | ||
59 | - * NS EL2 EL2&0 | ||
60 | - * NS EL2 EL2&0 +PAN | ||
61 | - * NS EL2 (aka NS PL2) | ||
62 | - * S EL0 EL1&0 (aka S PL0) | ||
63 | - * S EL1 EL1&0 (not used if EL3 is 32 bit) | ||
64 | - * S EL1 EL1&0 +PAN | ||
65 | - * S EL3 (aka S PL1) | ||
66 | + * EL0 EL1&0 stage 1+2 (aka NS PL0) | ||
67 | + * EL1 EL1&0 stage 1+2 (aka NS PL1) | ||
68 | + * EL1 EL1&0 stage 1+2 +PAN | ||
69 | + * EL0 EL2&0 | ||
70 | + * EL2 EL2&0 | ||
71 | + * EL2 EL2&0 +PAN | ||
72 | + * EL2 (aka NS PL2) | ||
73 | + * EL3 (aka S PL1) | ||
74 | * | ||
75 | - * for a total of 11 different mmu_idx. | ||
76 | + * for a total of 8 different mmu_idx. | ||
77 | * | ||
78 | * R profile CPUs have an MPU, but can use the same set of MMU indexes | ||
79 | - * as A profile. They only need to distinguish NS EL0 and NS EL1 (and | ||
80 | - * NS EL2 if we ever model a Cortex-R52). | ||
81 | + * as A profile. They only need to distinguish EL0 and EL1 (and | ||
82 | + * EL2 if we ever model a Cortex-R52). | ||
83 | * | ||
84 | * M profile CPUs are rather different as they do not have a true MMU. | ||
85 | * They have the following different MMU indexes: | ||
86 | @@ -XXX,XX +XXX,XX @@ bool write_cpustate_to_list(ARMCPU *cpu, bool kvm_sync); | ||
87 | #define ARM_MMU_IDX_NOTLB 0x20 /* does not have a TLB */ | ||
88 | #define ARM_MMU_IDX_M 0x40 /* M profile */ | ||
89 | |||
90 | -/* Meanings of the bits for A profile mmu idx values */ | ||
91 | -#define ARM_MMU_IDX_A_NS 0x8 | ||
92 | - | ||
93 | /* Meanings of the bits for M profile mmu idx values */ | ||
94 | #define ARM_MMU_IDX_M_PRIV 0x1 | ||
95 | #define ARM_MMU_IDX_M_NEGPRI 0x2 | ||
96 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdx { | ||
97 | /* | ||
98 | * A-profile. | ||
99 | */ | ||
100 | - ARMMMUIdx_SE10_0 = 0 | ARM_MMU_IDX_A, | ||
101 | - ARMMMUIdx_SE20_0 = 1 | ARM_MMU_IDX_A, | ||
102 | - ARMMMUIdx_SE10_1 = 2 | ARM_MMU_IDX_A, | ||
103 | - ARMMMUIdx_SE20_2 = 3 | ARM_MMU_IDX_A, | ||
104 | - ARMMMUIdx_SE10_1_PAN = 4 | ARM_MMU_IDX_A, | ||
105 | - ARMMMUIdx_SE20_2_PAN = 5 | ARM_MMU_IDX_A, | ||
106 | - ARMMMUIdx_SE2 = 6 | ARM_MMU_IDX_A, | ||
107 | - ARMMMUIdx_SE3 = 7 | ARM_MMU_IDX_A, | ||
108 | - | ||
109 | - ARMMMUIdx_E10_0 = ARMMMUIdx_SE10_0 | ARM_MMU_IDX_A_NS, | ||
110 | - ARMMMUIdx_E20_0 = ARMMMUIdx_SE20_0 | ARM_MMU_IDX_A_NS, | ||
111 | - ARMMMUIdx_E10_1 = ARMMMUIdx_SE10_1 | ARM_MMU_IDX_A_NS, | ||
112 | - ARMMMUIdx_E20_2 = ARMMMUIdx_SE20_2 | ARM_MMU_IDX_A_NS, | ||
113 | - ARMMMUIdx_E10_1_PAN = ARMMMUIdx_SE10_1_PAN | ARM_MMU_IDX_A_NS, | ||
114 | - ARMMMUIdx_E20_2_PAN = ARMMMUIdx_SE20_2_PAN | ARM_MMU_IDX_A_NS, | ||
115 | - ARMMMUIdx_E2 = ARMMMUIdx_SE2 | ARM_MMU_IDX_A_NS, | ||
116 | + ARMMMUIdx_E10_0 = 0 | ARM_MMU_IDX_A, | ||
117 | + ARMMMUIdx_E20_0 = 1 | ARM_MMU_IDX_A, | ||
118 | + ARMMMUIdx_E10_1 = 2 | ARM_MMU_IDX_A, | ||
119 | + ARMMMUIdx_E20_2 = 3 | ARM_MMU_IDX_A, | ||
120 | + ARMMMUIdx_E10_1_PAN = 4 | ARM_MMU_IDX_A, | ||
121 | + ARMMMUIdx_E20_2_PAN = 5 | ARM_MMU_IDX_A, | ||
122 | + ARMMMUIdx_E2 = 6 | ARM_MMU_IDX_A, | ||
123 | + ARMMMUIdx_E3 = 7 | ARM_MMU_IDX_A, | ||
124 | |||
125 | /* | ||
126 | * These are not allocated TLBs and are used only for AT system | ||
127 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdx { | ||
128 | ARMMMUIdx_Stage1_E0 = 0 | ARM_MMU_IDX_NOTLB, | ||
129 | ARMMMUIdx_Stage1_E1 = 1 | ARM_MMU_IDX_NOTLB, | ||
130 | ARMMMUIdx_Stage1_E1_PAN = 2 | ARM_MMU_IDX_NOTLB, | ||
131 | - ARMMMUIdx_Stage1_SE0 = 3 | ARM_MMU_IDX_NOTLB, | ||
132 | - ARMMMUIdx_Stage1_SE1 = 4 | ARM_MMU_IDX_NOTLB, | ||
133 | - ARMMMUIdx_Stage1_SE1_PAN = 5 | ARM_MMU_IDX_NOTLB, | ||
134 | /* | ||
135 | * Not allocated a TLB: used only for second stage of an S12 page | ||
136 | * table walk, or for descriptor loads during first stage of an S1 | ||
137 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdx { | ||
138 | * then various TLB flush insns which currently are no-ops or flush | ||
139 | * only stage 1 MMU indexes will need to change to flush stage 2. | ||
140 | */ | ||
141 | - ARMMMUIdx_Stage2 = 6 | ARM_MMU_IDX_NOTLB, | ||
142 | - ARMMMUIdx_Stage2_S = 7 | ARM_MMU_IDX_NOTLB, | ||
143 | + ARMMMUIdx_Stage2 = 3 | ARM_MMU_IDX_NOTLB, | ||
144 | + ARMMMUIdx_Stage2_S = 4 | ARM_MMU_IDX_NOTLB, | ||
145 | |||
146 | /* | ||
147 | * M-profile. | ||
148 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdxBit { | ||
149 | TO_CORE_BIT(E2), | ||
150 | TO_CORE_BIT(E20_2), | ||
151 | TO_CORE_BIT(E20_2_PAN), | ||
152 | - TO_CORE_BIT(SE10_0), | ||
153 | - TO_CORE_BIT(SE20_0), | ||
154 | - TO_CORE_BIT(SE10_1), | ||
155 | - TO_CORE_BIT(SE20_2), | ||
156 | - TO_CORE_BIT(SE10_1_PAN), | ||
157 | - TO_CORE_BIT(SE20_2_PAN), | ||
158 | - TO_CORE_BIT(SE2), | ||
159 | - TO_CORE_BIT(SE3), | ||
160 | + TO_CORE_BIT(E3), | ||
161 | |||
162 | TO_CORE_BIT(MUser), | ||
163 | TO_CORE_BIT(MPriv), | ||
164 | diff --git a/target/arm/internals.h b/target/arm/internals.h | ||
165 | index XXXXXXX..XXXXXXX 100644 | ||
166 | --- a/target/arm/internals.h | ||
167 | +++ b/target/arm/internals.h | ||
168 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_has_2_ranges(ARMMMUIdx mmu_idx) | ||
169 | case ARMMMUIdx_Stage1_E0: | ||
170 | case ARMMMUIdx_Stage1_E1: | ||
171 | case ARMMMUIdx_Stage1_E1_PAN: | ||
172 | - case ARMMMUIdx_Stage1_SE0: | ||
173 | - case ARMMMUIdx_Stage1_SE1: | ||
174 | - case ARMMMUIdx_Stage1_SE1_PAN: | ||
175 | case ARMMMUIdx_E10_0: | ||
176 | case ARMMMUIdx_E10_1: | ||
177 | case ARMMMUIdx_E10_1_PAN: | ||
178 | case ARMMMUIdx_E20_0: | ||
179 | case ARMMMUIdx_E20_2: | ||
180 | case ARMMMUIdx_E20_2_PAN: | ||
181 | - case ARMMMUIdx_SE10_0: | ||
182 | - case ARMMMUIdx_SE10_1: | ||
183 | - case ARMMMUIdx_SE10_1_PAN: | ||
184 | - case ARMMMUIdx_SE20_0: | ||
185 | - case ARMMMUIdx_SE20_2: | ||
186 | - case ARMMMUIdx_SE20_2_PAN: | ||
187 | return true; | ||
188 | default: | ||
189 | return false; | ||
190 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_pan(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
191 | { | ||
192 | switch (mmu_idx) { | ||
193 | case ARMMMUIdx_Stage1_E1_PAN: | ||
194 | - case ARMMMUIdx_Stage1_SE1_PAN: | ||
195 | case ARMMMUIdx_E10_1_PAN: | ||
196 | case ARMMMUIdx_E20_2_PAN: | ||
197 | - case ARMMMUIdx_SE10_1_PAN: | ||
198 | - case ARMMMUIdx_SE20_2_PAN: | ||
199 | return true; | ||
200 | default: | ||
201 | return false; | ||
202 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_pan(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
203 | static inline uint32_t regime_el(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
204 | { | ||
205 | switch (mmu_idx) { | ||
206 | - case ARMMMUIdx_SE20_0: | ||
207 | - case ARMMMUIdx_SE20_2: | ||
208 | - case ARMMMUIdx_SE20_2_PAN: | ||
209 | case ARMMMUIdx_E20_0: | ||
210 | case ARMMMUIdx_E20_2: | ||
211 | case ARMMMUIdx_E20_2_PAN: | ||
212 | case ARMMMUIdx_Stage2: | ||
213 | case ARMMMUIdx_Stage2_S: | ||
214 | - case ARMMMUIdx_SE2: | ||
215 | case ARMMMUIdx_E2: | ||
216 | return 2; | ||
217 | - case ARMMMUIdx_SE3: | ||
218 | + case ARMMMUIdx_E3: | ||
219 | return 3; | ||
220 | - case ARMMMUIdx_SE10_0: | ||
221 | - case ARMMMUIdx_Stage1_SE0: | ||
222 | - return arm_el_is_aa64(env, 3) ? 1 : 3; | ||
223 | - case ARMMMUIdx_SE10_1: | ||
224 | - case ARMMMUIdx_SE10_1_PAN: | ||
225 | + case ARMMMUIdx_E10_0: | ||
226 | case ARMMMUIdx_Stage1_E0: | ||
227 | + return arm_el_is_aa64(env, 3) || !arm_is_secure_below_el3(env) ? 1 : 3; | ||
228 | case ARMMMUIdx_Stage1_E1: | ||
229 | case ARMMMUIdx_Stage1_E1_PAN: | ||
230 | - case ARMMMUIdx_Stage1_SE1: | ||
231 | - case ARMMMUIdx_Stage1_SE1_PAN: | ||
232 | - case ARMMMUIdx_E10_0: | ||
233 | case ARMMMUIdx_E10_1: | ||
234 | case ARMMMUIdx_E10_1_PAN: | ||
235 | case ARMMMUIdx_MPrivNegPri: | ||
236 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_mmu_idx_is_stage1_of_2(ARMMMUIdx mmu_idx) | ||
237 | case ARMMMUIdx_Stage1_E0: | ||
238 | case ARMMMUIdx_Stage1_E1: | ||
239 | case ARMMMUIdx_Stage1_E1_PAN: | ||
240 | - case ARMMMUIdx_Stage1_SE0: | ||
241 | - case ARMMMUIdx_Stage1_SE1: | ||
242 | - case ARMMMUIdx_Stage1_SE1_PAN: | ||
243 | return true; | ||
244 | default: | ||
245 | return false; | ||
246 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
247 | index XXXXXXX..XXXXXXX 100644 | ||
248 | --- a/target/arm/helper.c | ||
249 | +++ b/target/arm/helper.c | ||
250 | @@ -XXX,XX +XXX,XX @@ static void scr_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
251 | /* Begin with base v8.0 state. */ | ||
252 | uint64_t valid_mask = 0x3fff; | ||
253 | ARMCPU *cpu = env_archcpu(env); | ||
254 | + uint64_t changed; | ||
255 | |||
256 | /* | ||
257 | * Because SCR_EL3 is the "real" cpreg and SCR is the alias, reset always | ||
258 | @@ -XXX,XX +XXX,XX @@ static void scr_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
259 | |||
260 | /* Clear all-context RES0 bits. */ | ||
261 | value &= valid_mask; | ||
262 | - raw_write(env, ri, value); | ||
263 | + changed = env->cp15.scr_el3 ^ value; | ||
264 | + env->cp15.scr_el3 = value; | ||
31 | + | 265 | + |
32 | +#define FPCR_NZCV_MASK (FPCR_N | FPCR_Z | FPCR_C | FPCR_V) | 266 | + /* |
33 | +#define FPCR_NZCVQC_MASK (FPCR_NZCV_MASK | FPCR_QC) | 267 | + * If SCR_EL3.NS changes, i.e. arm_is_secure_below_el3, then |
34 | 268 | + * we must invalidate all TLBs below EL3. | |
35 | static inline uint32_t vfp_get_fpsr(CPUARMState *env) | 269 | + */ |
36 | { | 270 | + if (changed & SCR_NS) { |
37 | @@ -XXX,XX +XXX,XX @@ enum arm_cpu_mode { | 271 | + tlb_flush_by_mmuidx(env_cpu(env), (ARMMMUIdxBit_E10_0 | |
38 | #define ARM_VFP_FPEXC 8 | 272 | + ARMMMUIdxBit_E20_0 | |
39 | #define ARM_VFP_FPINST 9 | 273 | + ARMMMUIdxBit_E10_1 | |
40 | #define ARM_VFP_FPINST2 10 | 274 | + ARMMMUIdxBit_E20_2 | |
41 | +/* These ones are M-profile only */ | 275 | + ARMMMUIdxBit_E10_1_PAN | |
42 | +#define ARM_VFP_FPSCR_NZCVQC 2 | 276 | + ARMMMUIdxBit_E20_2_PAN | |
43 | +#define ARM_VFP_VPR 12 | 277 | + ARMMMUIdxBit_E2)); |
44 | +#define ARM_VFP_P0 13 | 278 | + } |
45 | +#define ARM_VFP_FPCXT_NS 14 | 279 | } |
46 | +#define ARM_VFP_FPCXT_S 15 | 280 | |
47 | 281 | static void scr_reset(CPUARMState *env, const ARMCPRegInfo *ri) | |
48 | /* QEMU-internal value meaning "FPSCR, but we care only about NZCV" */ | 282 | @@ -XXX,XX +XXX,XX @@ static int gt_phys_redir_timeridx(CPUARMState *env) |
49 | #define QEMU_VFP_FPSCR_NZCV 0xffff | 283 | case ARMMMUIdx_E20_0: |
50 | diff --git a/target/arm/translate-vfp.c.inc b/target/arm/translate-vfp.c.inc | 284 | case ARMMMUIdx_E20_2: |
51 | index XXXXXXX..XXXXXXX 100644 | 285 | case ARMMMUIdx_E20_2_PAN: |
52 | --- a/target/arm/translate-vfp.c.inc | 286 | - case ARMMMUIdx_SE20_0: |
53 | +++ b/target/arm/translate-vfp.c.inc | 287 | - case ARMMMUIdx_SE20_2: |
54 | @@ -XXX,XX +XXX,XX @@ static FPSysRegCheckResult fp_sysreg_checks(DisasContext *s, int regno) | 288 | - case ARMMMUIdx_SE20_2_PAN: |
55 | case ARM_VFP_FPSCR: | 289 | return GTIMER_HYP; |
56 | case QEMU_VFP_FPSCR_NZCV: | 290 | default: |
291 | return GTIMER_PHYS; | ||
292 | @@ -XXX,XX +XXX,XX @@ static int gt_virt_redir_timeridx(CPUARMState *env) | ||
293 | case ARMMMUIdx_E20_0: | ||
294 | case ARMMMUIdx_E20_2: | ||
295 | case ARMMMUIdx_E20_2_PAN: | ||
296 | - case ARMMMUIdx_SE20_0: | ||
297 | - case ARMMMUIdx_SE20_2: | ||
298 | - case ARMMMUIdx_SE20_2_PAN: | ||
299 | return GTIMER_HYPVIRT; | ||
300 | default: | ||
301 | return GTIMER_VIRT; | ||
302 | @@ -XXX,XX +XXX,XX @@ static void ats_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
303 | /* stage 1 current state PL1: ATS1CPR, ATS1CPW, ATS1CPRP, ATS1CPWP */ | ||
304 | switch (el) { | ||
305 | case 3: | ||
306 | - mmu_idx = ARMMMUIdx_SE3; | ||
307 | + mmu_idx = ARMMMUIdx_E3; | ||
308 | secure = true; | ||
309 | break; | ||
310 | case 2: | ||
311 | @@ -XXX,XX +XXX,XX @@ static void ats_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
312 | /* fall through */ | ||
313 | case 1: | ||
314 | if (ri->crm == 9 && (env->uncached_cpsr & CPSR_PAN)) { | ||
315 | - mmu_idx = (secure ? ARMMMUIdx_Stage1_SE1_PAN | ||
316 | - : ARMMMUIdx_Stage1_E1_PAN); | ||
317 | + mmu_idx = ARMMMUIdx_Stage1_E1_PAN; | ||
318 | } else { | ||
319 | - mmu_idx = secure ? ARMMMUIdx_Stage1_SE1 : ARMMMUIdx_Stage1_E1; | ||
320 | + mmu_idx = ARMMMUIdx_Stage1_E1; | ||
321 | } | ||
322 | break; | ||
323 | default: | ||
324 | @@ -XXX,XX +XXX,XX @@ static void ats_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
325 | /* stage 1 current state PL0: ATS1CUR, ATS1CUW */ | ||
326 | switch (el) { | ||
327 | case 3: | ||
328 | - mmu_idx = ARMMMUIdx_SE10_0; | ||
329 | + mmu_idx = ARMMMUIdx_E10_0; | ||
330 | secure = true; | ||
331 | break; | ||
332 | case 2: | ||
333 | @@ -XXX,XX +XXX,XX @@ static void ats_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
334 | mmu_idx = ARMMMUIdx_Stage1_E0; | ||
335 | break; | ||
336 | case 1: | ||
337 | - mmu_idx = secure ? ARMMMUIdx_Stage1_SE0 : ARMMMUIdx_Stage1_E0; | ||
338 | + mmu_idx = ARMMMUIdx_Stage1_E0; | ||
339 | break; | ||
340 | default: | ||
341 | g_assert_not_reached(); | ||
342 | @@ -XXX,XX +XXX,XX @@ static void ats_write64(CPUARMState *env, const ARMCPRegInfo *ri, | ||
343 | switch (ri->opc1) { | ||
344 | case 0: /* AT S1E1R, AT S1E1W, AT S1E1RP, AT S1E1WP */ | ||
345 | if (ri->crm == 9 && (env->pstate & PSTATE_PAN)) { | ||
346 | - mmu_idx = (secure ? ARMMMUIdx_Stage1_SE1_PAN | ||
347 | - : ARMMMUIdx_Stage1_E1_PAN); | ||
348 | + mmu_idx = ARMMMUIdx_Stage1_E1_PAN; | ||
349 | } else { | ||
350 | - mmu_idx = secure ? ARMMMUIdx_Stage1_SE1 : ARMMMUIdx_Stage1_E1; | ||
351 | + mmu_idx = ARMMMUIdx_Stage1_E1; | ||
352 | } | ||
353 | break; | ||
354 | case 4: /* AT S1E2R, AT S1E2W */ | ||
355 | - mmu_idx = secure ? ARMMMUIdx_SE2 : ARMMMUIdx_E2; | ||
356 | + mmu_idx = ARMMMUIdx_E2; | ||
357 | break; | ||
358 | case 6: /* AT S1E3R, AT S1E3W */ | ||
359 | - mmu_idx = ARMMMUIdx_SE3; | ||
360 | + mmu_idx = ARMMMUIdx_E3; | ||
361 | secure = true; | ||
362 | break; | ||
363 | default: | ||
364 | @@ -XXX,XX +XXX,XX @@ static void ats_write64(CPUARMState *env, const ARMCPRegInfo *ri, | ||
365 | } | ||
57 | break; | 366 | break; |
58 | + case ARM_VFP_FPSCR_NZCVQC: | 367 | case 2: /* AT S1E0R, AT S1E0W */ |
59 | + if (!arm_dc_feature(s, ARM_FEATURE_V8_1M)) { | 368 | - mmu_idx = secure ? ARMMMUIdx_Stage1_SE0 : ARMMMUIdx_Stage1_E0; |
60 | + return false; | 369 | + mmu_idx = ARMMMUIdx_Stage1_E0; |
61 | + } | 370 | break; |
62 | + break; | 371 | case 4: /* AT S12E1R, AT S12E1W */ |
372 | - mmu_idx = secure ? ARMMMUIdx_SE10_1 : ARMMMUIdx_E10_1; | ||
373 | + mmu_idx = ARMMMUIdx_E10_1; | ||
374 | break; | ||
375 | case 6: /* AT S12E0R, AT S12E0W */ | ||
376 | - mmu_idx = secure ? ARMMMUIdx_SE10_0 : ARMMMUIdx_E10_0; | ||
377 | + mmu_idx = ARMMMUIdx_E10_0; | ||
378 | break; | ||
63 | default: | 379 | default: |
64 | return FPSysRegCheckFailed; | 380 | g_assert_not_reached(); |
381 | @@ -XXX,XX +XXX,XX @@ static void vmsa_tcr_ttbr_el2_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
382 | uint16_t mask = ARMMMUIdxBit_E20_2 | | ||
383 | ARMMMUIdxBit_E20_2_PAN | | ||
384 | ARMMMUIdxBit_E20_0; | ||
385 | - | ||
386 | - if (arm_is_secure_below_el3(env)) { | ||
387 | - mask >>= ARM_MMU_IDX_A_NS; | ||
388 | - } | ||
389 | - | ||
390 | tlb_flush_by_mmuidx(env_cpu(env), mask); | ||
65 | } | 391 | } |
66 | @@ -XXX,XX +XXX,XX @@ static bool gen_M_fp_sysreg_write(DisasContext *s, int regno, | 392 | raw_write(env, ri, value); |
67 | tcg_temp_free_i32(tmp); | 393 | @@ -XXX,XX +XXX,XX @@ static void vttbr_write(CPUARMState *env, const ARMCPRegInfo *ri, |
68 | gen_lookup_tb(s); | 394 | uint16_t mask = ARMMMUIdxBit_E10_1 | |
395 | ARMMMUIdxBit_E10_1_PAN | | ||
396 | ARMMMUIdxBit_E10_0; | ||
397 | - | ||
398 | - if (arm_is_secure_below_el3(env)) { | ||
399 | - mask >>= ARM_MMU_IDX_A_NS; | ||
400 | - } | ||
401 | - | ||
402 | tlb_flush_by_mmuidx(cs, mask); | ||
403 | raw_write(env, ri, value); | ||
404 | } | ||
405 | @@ -XXX,XX +XXX,XX @@ static int vae1_tlbmask(CPUARMState *env) | ||
406 | ARMMMUIdxBit_E10_1_PAN | | ||
407 | ARMMMUIdxBit_E10_0; | ||
408 | } | ||
409 | - | ||
410 | - if (arm_is_secure_below_el3(env)) { | ||
411 | - mask >>= ARM_MMU_IDX_A_NS; | ||
412 | - } | ||
413 | - | ||
414 | return mask; | ||
415 | } | ||
416 | |||
417 | @@ -XXX,XX +XXX,XX @@ static int vae1_tlbbits(CPUARMState *env, uint64_t addr) | ||
418 | mmu_idx = ARMMMUIdx_E10_0; | ||
419 | } | ||
420 | |||
421 | - if (arm_is_secure_below_el3(env)) { | ||
422 | - mmu_idx &= ~ARM_MMU_IDX_A_NS; | ||
423 | - } | ||
424 | - | ||
425 | return tlbbits_for_regime(env, mmu_idx, addr); | ||
426 | } | ||
427 | |||
428 | @@ -XXX,XX +XXX,XX @@ static int alle1_tlbmask(CPUARMState *env) | ||
429 | * stage 2 translations, whereas most other scopes only invalidate | ||
430 | * stage 1 translations. | ||
431 | */ | ||
432 | - if (arm_is_secure_below_el3(env)) { | ||
433 | - return ARMMMUIdxBit_SE10_1 | | ||
434 | - ARMMMUIdxBit_SE10_1_PAN | | ||
435 | - ARMMMUIdxBit_SE10_0; | ||
436 | - } else { | ||
437 | - return ARMMMUIdxBit_E10_1 | | ||
438 | - ARMMMUIdxBit_E10_1_PAN | | ||
439 | - ARMMMUIdxBit_E10_0; | ||
440 | - } | ||
441 | + return (ARMMMUIdxBit_E10_1 | | ||
442 | + ARMMMUIdxBit_E10_1_PAN | | ||
443 | + ARMMMUIdxBit_E10_0); | ||
444 | } | ||
445 | |||
446 | static int e2_tlbmask(CPUARMState *env) | ||
447 | { | ||
448 | - if (arm_is_secure_below_el3(env)) { | ||
449 | - return ARMMMUIdxBit_SE20_0 | | ||
450 | - ARMMMUIdxBit_SE20_2 | | ||
451 | - ARMMMUIdxBit_SE20_2_PAN | | ||
452 | - ARMMMUIdxBit_SE2; | ||
453 | - } else { | ||
454 | - return ARMMMUIdxBit_E20_0 | | ||
455 | - ARMMMUIdxBit_E20_2 | | ||
456 | - ARMMMUIdxBit_E20_2_PAN | | ||
457 | - ARMMMUIdxBit_E2; | ||
458 | - } | ||
459 | + return (ARMMMUIdxBit_E20_0 | | ||
460 | + ARMMMUIdxBit_E20_2 | | ||
461 | + ARMMMUIdxBit_E20_2_PAN | | ||
462 | + ARMMMUIdxBit_E2); | ||
463 | } | ||
464 | |||
465 | static void tlbi_aa64_alle1_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
466 | @@ -XXX,XX +XXX,XX @@ static void tlbi_aa64_alle3_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
467 | ARMCPU *cpu = env_archcpu(env); | ||
468 | CPUState *cs = CPU(cpu); | ||
469 | |||
470 | - tlb_flush_by_mmuidx(cs, ARMMMUIdxBit_SE3); | ||
471 | + tlb_flush_by_mmuidx(cs, ARMMMUIdxBit_E3); | ||
472 | } | ||
473 | |||
474 | static void tlbi_aa64_alle1is_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
475 | @@ -XXX,XX +XXX,XX @@ static void tlbi_aa64_alle3is_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
476 | { | ||
477 | CPUState *cs = env_cpu(env); | ||
478 | |||
479 | - tlb_flush_by_mmuidx_all_cpus_synced(cs, ARMMMUIdxBit_SE3); | ||
480 | + tlb_flush_by_mmuidx_all_cpus_synced(cs, ARMMMUIdxBit_E3); | ||
481 | } | ||
482 | |||
483 | static void tlbi_aa64_vae2_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
484 | @@ -XXX,XX +XXX,XX @@ static void tlbi_aa64_vae3_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
485 | CPUState *cs = CPU(cpu); | ||
486 | uint64_t pageaddr = sextract64(value << 12, 0, 56); | ||
487 | |||
488 | - tlb_flush_page_by_mmuidx(cs, pageaddr, ARMMMUIdxBit_SE3); | ||
489 | + tlb_flush_page_by_mmuidx(cs, pageaddr, ARMMMUIdxBit_E3); | ||
490 | } | ||
491 | |||
492 | static void tlbi_aa64_vae1is_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
493 | @@ -XXX,XX +XXX,XX @@ static void tlbi_aa64_vae2is_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
494 | { | ||
495 | CPUState *cs = env_cpu(env); | ||
496 | uint64_t pageaddr = sextract64(value << 12, 0, 56); | ||
497 | - bool secure = arm_is_secure_below_el3(env); | ||
498 | - int mask = secure ? ARMMMUIdxBit_SE2 : ARMMMUIdxBit_E2; | ||
499 | - int bits = tlbbits_for_regime(env, secure ? ARMMMUIdx_SE2 : ARMMMUIdx_E2, | ||
500 | - pageaddr); | ||
501 | + int bits = tlbbits_for_regime(env, ARMMMUIdx_E2, pageaddr); | ||
502 | |||
503 | - tlb_flush_page_bits_by_mmuidx_all_cpus_synced(cs, pageaddr, mask, bits); | ||
504 | + tlb_flush_page_bits_by_mmuidx_all_cpus_synced(cs, pageaddr, | ||
505 | + ARMMMUIdxBit_E2, bits); | ||
506 | } | ||
507 | |||
508 | static void tlbi_aa64_vae3is_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
509 | @@ -XXX,XX +XXX,XX @@ static void tlbi_aa64_vae3is_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
510 | { | ||
511 | CPUState *cs = env_cpu(env); | ||
512 | uint64_t pageaddr = sextract64(value << 12, 0, 56); | ||
513 | - int bits = tlbbits_for_regime(env, ARMMMUIdx_SE3, pageaddr); | ||
514 | + int bits = tlbbits_for_regime(env, ARMMMUIdx_E3, pageaddr); | ||
515 | |||
516 | tlb_flush_page_bits_by_mmuidx_all_cpus_synced(cs, pageaddr, | ||
517 | - ARMMMUIdxBit_SE3, bits); | ||
518 | + ARMMMUIdxBit_E3, bits); | ||
519 | } | ||
520 | |||
521 | #ifdef TARGET_AARCH64 | ||
522 | @@ -XXX,XX +XXX,XX @@ static void tlbi_aa64_rvae1is_write(CPUARMState *env, | ||
523 | |||
524 | static int vae2_tlbmask(CPUARMState *env) | ||
525 | { | ||
526 | - return (arm_is_secure_below_el3(env) | ||
527 | - ? ARMMMUIdxBit_SE2 : ARMMMUIdxBit_E2); | ||
528 | + return ARMMMUIdxBit_E2; | ||
529 | } | ||
530 | |||
531 | static void tlbi_aa64_rvae2_write(CPUARMState *env, | ||
532 | @@ -XXX,XX +XXX,XX @@ static void tlbi_aa64_rvae3_write(CPUARMState *env, | ||
533 | * flush-last-level-only. | ||
534 | */ | ||
535 | |||
536 | - do_rvae_write(env, value, ARMMMUIdxBit_SE3, | ||
537 | - tlb_force_broadcast(env)); | ||
538 | + do_rvae_write(env, value, ARMMMUIdxBit_E3, tlb_force_broadcast(env)); | ||
539 | } | ||
540 | |||
541 | static void tlbi_aa64_rvae3is_write(CPUARMState *env, | ||
542 | @@ -XXX,XX +XXX,XX @@ static void tlbi_aa64_rvae3is_write(CPUARMState *env, | ||
543 | * flush-last-level-only or inner/outer specific flushes. | ||
544 | */ | ||
545 | |||
546 | - do_rvae_write(env, value, ARMMMUIdxBit_SE3, true); | ||
547 | + do_rvae_write(env, value, ARMMMUIdxBit_E3, true); | ||
548 | } | ||
549 | #endif | ||
550 | |||
551 | @@ -XXX,XX +XXX,XX @@ uint64_t arm_sctlr(CPUARMState *env, int el) | ||
552 | /* Only EL0 needs to be adjusted for EL1&0 or EL2&0. */ | ||
553 | if (el == 0) { | ||
554 | ARMMMUIdx mmu_idx = arm_mmu_idx_el(env, 0); | ||
555 | - el = (mmu_idx == ARMMMUIdx_E20_0 || mmu_idx == ARMMMUIdx_SE20_0) | ||
556 | - ? 2 : 1; | ||
557 | + el = mmu_idx == ARMMMUIdx_E20_0 ? 2 : 1; | ||
558 | } | ||
559 | return env->cp15.sctlr_el[el]; | ||
560 | } | ||
561 | @@ -XXX,XX +XXX,XX @@ int arm_mmu_idx_to_el(ARMMMUIdx mmu_idx) | ||
562 | switch (mmu_idx) { | ||
563 | case ARMMMUIdx_E10_0: | ||
564 | case ARMMMUIdx_E20_0: | ||
565 | - case ARMMMUIdx_SE10_0: | ||
566 | - case ARMMMUIdx_SE20_0: | ||
567 | return 0; | ||
568 | case ARMMMUIdx_E10_1: | ||
569 | case ARMMMUIdx_E10_1_PAN: | ||
570 | - case ARMMMUIdx_SE10_1: | ||
571 | - case ARMMMUIdx_SE10_1_PAN: | ||
572 | return 1; | ||
573 | case ARMMMUIdx_E2: | ||
574 | case ARMMMUIdx_E20_2: | ||
575 | case ARMMMUIdx_E20_2_PAN: | ||
576 | - case ARMMMUIdx_SE2: | ||
577 | - case ARMMMUIdx_SE20_2: | ||
578 | - case ARMMMUIdx_SE20_2_PAN: | ||
579 | return 2; | ||
580 | - case ARMMMUIdx_SE3: | ||
581 | + case ARMMMUIdx_E3: | ||
582 | return 3; | ||
583 | default: | ||
584 | g_assert_not_reached(); | ||
585 | @@ -XXX,XX +XXX,XX @@ ARMMMUIdx arm_mmu_idx_el(CPUARMState *env, int el) | ||
586 | } | ||
69 | break; | 587 | break; |
70 | + case ARM_VFP_FPSCR_NZCVQC: | 588 | case 3: |
71 | + { | 589 | - return ARMMMUIdx_SE3; |
72 | + TCGv_i32 fpscr; | 590 | + return ARMMMUIdx_E3; |
73 | + tmp = loadfn(s, opaque); | ||
74 | + /* | ||
75 | + * TODO: when we implement MVE, write the QC bit. | ||
76 | + * For non-MVE, QC is RES0. | ||
77 | + */ | ||
78 | + tcg_gen_andi_i32(tmp, tmp, FPCR_NZCV_MASK); | ||
79 | + fpscr = load_cpu_field(vfp.xregs[ARM_VFP_FPSCR]); | ||
80 | + tcg_gen_andi_i32(fpscr, fpscr, ~FPCR_NZCV_MASK); | ||
81 | + tcg_gen_or_i32(fpscr, fpscr, tmp); | ||
82 | + store_cpu_field(fpscr, vfp.xregs[ARM_VFP_FPSCR]); | ||
83 | + tcg_temp_free_i32(tmp); | ||
84 | + break; | ||
85 | + } | ||
86 | default: | 591 | default: |
87 | g_assert_not_reached(); | 592 | g_assert_not_reached(); |
88 | } | 593 | } |
89 | @@ -XXX,XX +XXX,XX @@ static bool gen_M_fp_sysreg_read(DisasContext *s, int regno, | 594 | |
90 | gen_helper_vfp_get_fpscr(tmp, cpu_env); | 595 | - if (arm_is_secure_below_el3(env)) { |
91 | storefn(s, opaque, tmp); | 596 | - idx &= ~ARM_MMU_IDX_A_NS; |
597 | - } | ||
598 | - | ||
599 | return idx; | ||
600 | } | ||
601 | |||
602 | @@ -XXX,XX +XXX,XX @@ static CPUARMTBFlags rebuild_hflags_a64(CPUARMState *env, int el, int fp_el, | ||
603 | switch (mmu_idx) { | ||
604 | case ARMMMUIdx_E10_1: | ||
605 | case ARMMMUIdx_E10_1_PAN: | ||
606 | - case ARMMMUIdx_SE10_1: | ||
607 | - case ARMMMUIdx_SE10_1_PAN: | ||
608 | /* TODO: ARMv8.3-NV */ | ||
609 | DP_TBFLAG_A64(flags, UNPRIV, 1); | ||
610 | break; | ||
611 | case ARMMMUIdx_E20_2: | ||
612 | case ARMMMUIdx_E20_2_PAN: | ||
613 | - case ARMMMUIdx_SE20_2: | ||
614 | - case ARMMMUIdx_SE20_2_PAN: | ||
615 | /* | ||
616 | * Note that EL20_2 is gated by HCR_EL2.E2H == 1, but EL20_0 is | ||
617 | * gated by HCR_EL2.<E2H,TGE> == '11', and so is LDTR. | ||
618 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c | ||
619 | index XXXXXXX..XXXXXXX 100644 | ||
620 | --- a/target/arm/ptw.c | ||
621 | +++ b/target/arm/ptw.c | ||
622 | @@ -XXX,XX +XXX,XX @@ unsigned int arm_pamax(ARMCPU *cpu) | ||
623 | ARMMMUIdx stage_1_mmu_idx(ARMMMUIdx mmu_idx) | ||
624 | { | ||
625 | switch (mmu_idx) { | ||
626 | - case ARMMMUIdx_SE10_0: | ||
627 | - return ARMMMUIdx_Stage1_SE0; | ||
628 | - case ARMMMUIdx_SE10_1: | ||
629 | - return ARMMMUIdx_Stage1_SE1; | ||
630 | - case ARMMMUIdx_SE10_1_PAN: | ||
631 | - return ARMMMUIdx_Stage1_SE1_PAN; | ||
632 | case ARMMMUIdx_E10_0: | ||
633 | return ARMMMUIdx_Stage1_E0; | ||
634 | case ARMMMUIdx_E10_1: | ||
635 | @@ -XXX,XX +XXX,XX @@ static bool regime_translation_big_endian(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
636 | static bool regime_is_user(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
637 | { | ||
638 | switch (mmu_idx) { | ||
639 | - case ARMMMUIdx_SE10_0: | ||
640 | case ARMMMUIdx_E20_0: | ||
641 | - case ARMMMUIdx_SE20_0: | ||
642 | case ARMMMUIdx_Stage1_E0: | ||
643 | - case ARMMMUIdx_Stage1_SE0: | ||
644 | case ARMMMUIdx_MUser: | ||
645 | case ARMMMUIdx_MSUser: | ||
646 | case ARMMMUIdx_MUserNegPri: | ||
647 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr_with_secure(CPUARMState *env, target_ulong address, | ||
648 | |||
649 | s2_mmu_idx = (s2walk_secure | ||
650 | ? ARMMMUIdx_Stage2_S : ARMMMUIdx_Stage2); | ||
651 | - is_el0 = mmu_idx == ARMMMUIdx_E10_0 || mmu_idx == ARMMMUIdx_SE10_0; | ||
652 | + is_el0 = mmu_idx == ARMMMUIdx_E10_0; | ||
653 | |||
654 | /* | ||
655 | * S1 is done, now do S2 translation. | ||
656 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
657 | case ARMMMUIdx_Stage1_E1: | ||
658 | case ARMMMUIdx_Stage1_E1_PAN: | ||
659 | case ARMMMUIdx_E2: | ||
660 | + is_secure = arm_is_secure_below_el3(env); | ||
661 | + break; | ||
662 | case ARMMMUIdx_Stage2: | ||
663 | case ARMMMUIdx_MPrivNegPri: | ||
664 | case ARMMMUIdx_MUserNegPri: | ||
665 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
666 | case ARMMMUIdx_MUser: | ||
667 | is_secure = false; | ||
92 | break; | 668 | break; |
93 | + case ARM_VFP_FPSCR_NZCVQC: | 669 | - case ARMMMUIdx_SE3: |
94 | + /* | 670 | - case ARMMMUIdx_SE10_0: |
95 | + * TODO: MVE has a QC bit, which we probably won't store | 671 | - case ARMMMUIdx_SE10_1: |
96 | + * in the xregs[] field. For non-MVE, where QC is RES0, | 672 | - case ARMMMUIdx_SE10_1_PAN: |
97 | + * we can just fall through to the FPSCR_NZCV case. | 673 | - case ARMMMUIdx_SE20_0: |
98 | + */ | 674 | - case ARMMMUIdx_SE20_2: |
99 | case QEMU_VFP_FPSCR_NZCV: | 675 | - case ARMMMUIdx_SE20_2_PAN: |
100 | /* | 676 | - case ARMMMUIdx_Stage1_SE0: |
101 | * Read just NZCV; this is a special case to avoid the | 677 | - case ARMMMUIdx_Stage1_SE1: |
678 | - case ARMMMUIdx_Stage1_SE1_PAN: | ||
679 | - case ARMMMUIdx_SE2: | ||
680 | + case ARMMMUIdx_E3: | ||
681 | case ARMMMUIdx_Stage2_S: | ||
682 | case ARMMMUIdx_MSPrivNegPri: | ||
683 | case ARMMMUIdx_MSUserNegPri: | ||
684 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c | ||
685 | index XXXXXXX..XXXXXXX 100644 | ||
686 | --- a/target/arm/translate-a64.c | ||
687 | +++ b/target/arm/translate-a64.c | ||
688 | @@ -XXX,XX +XXX,XX @@ static int get_a64_user_mem_index(DisasContext *s) | ||
689 | case ARMMMUIdx_E20_2_PAN: | ||
690 | useridx = ARMMMUIdx_E20_0; | ||
691 | break; | ||
692 | - case ARMMMUIdx_SE10_1: | ||
693 | - case ARMMMUIdx_SE10_1_PAN: | ||
694 | - useridx = ARMMMUIdx_SE10_0; | ||
695 | - break; | ||
696 | - case ARMMMUIdx_SE20_2: | ||
697 | - case ARMMMUIdx_SE20_2_PAN: | ||
698 | - useridx = ARMMMUIdx_SE20_0; | ||
699 | - break; | ||
700 | default: | ||
701 | g_assert_not_reached(); | ||
702 | } | ||
703 | diff --git a/target/arm/translate.c b/target/arm/translate.c | ||
704 | index XXXXXXX..XXXXXXX 100644 | ||
705 | --- a/target/arm/translate.c | ||
706 | +++ b/target/arm/translate.c | ||
707 | @@ -XXX,XX +XXX,XX @@ static inline int get_a32_user_mem_index(DisasContext *s) | ||
708 | * otherwise, access as if at PL0. | ||
709 | */ | ||
710 | switch (s->mmu_idx) { | ||
711 | + case ARMMMUIdx_E3: | ||
712 | case ARMMMUIdx_E2: /* this one is UNPREDICTABLE */ | ||
713 | case ARMMMUIdx_E10_0: | ||
714 | case ARMMMUIdx_E10_1: | ||
715 | case ARMMMUIdx_E10_1_PAN: | ||
716 | return arm_to_core_mmu_idx(ARMMMUIdx_E10_0); | ||
717 | - case ARMMMUIdx_SE3: | ||
718 | - case ARMMMUIdx_SE10_0: | ||
719 | - case ARMMMUIdx_SE10_1: | ||
720 | - case ARMMMUIdx_SE10_1_PAN: | ||
721 | - return arm_to_core_mmu_idx(ARMMMUIdx_SE10_0); | ||
722 | case ARMMMUIdx_MUser: | ||
723 | case ARMMMUIdx_MPriv: | ||
724 | return arm_to_core_mmu_idx(ARMMMUIdx_MUser); | ||
102 | -- | 725 | -- |
103 | 2.20.1 | 726 | 2.25.1 |
104 | |||
105 | diff view generated by jsdifflib |
1 | From: Marcin Juszkiewicz <marcin.juszkiewicz@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Trusted Firmware now supports A72 on sbsa-ref by default [1] so enable | 3 | Use a switch on mmu_idx for the a-profile indexes, instead of |
4 | it for QEMU as well. A53 was already enabled there. | 4 | three different if's vs regime_el and arm_mmu_idx_is_stage1_of_2. |
5 | 5 | ||
6 | 1. https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/7117 | ||
7 | |||
8 | Signed-off-by: Marcin Juszkiewicz <marcin.juszkiewicz@linaro.org> | ||
9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
10 | Message-id: 20201120141705.246690-1-marcin.juszkiewicz@linaro.org | ||
11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20221001162318.153420-12-richard.henderson@linaro.org | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
13 | --- | 10 | --- |
14 | hw/arm/sbsa-ref.c | 23 ++++++++++++++++++++--- | 11 | target/arm/ptw.c | 32 +++++++++++++++++++++++++------- |
15 | 1 file changed, 20 insertions(+), 3 deletions(-) | 12 | 1 file changed, 25 insertions(+), 7 deletions(-) |
16 | 13 | ||
17 | diff --git a/hw/arm/sbsa-ref.c b/hw/arm/sbsa-ref.c | 14 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c |
18 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
19 | --- a/hw/arm/sbsa-ref.c | 16 | --- a/target/arm/ptw.c |
20 | +++ b/hw/arm/sbsa-ref.c | 17 | +++ b/target/arm/ptw.c |
21 | @@ -XXX,XX +XXX,XX @@ static const int sbsa_ref_irqmap[] = { | 18 | @@ -XXX,XX +XXX,XX @@ static bool regime_translation_disabled(CPUARMState *env, ARMMMUIdx mmu_idx, |
22 | [SBSA_GWDT] = 16, | 19 | |
23 | }; | 20 | hcr_el2 = arm_hcr_el2_eff(env); |
24 | 21 | ||
25 | +static const char * const valid_cpus[] = { | 22 | - if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { |
26 | + ARM_CPU_TYPE_NAME("cortex-a53"), | 23 | + switch (mmu_idx) { |
27 | + ARM_CPU_TYPE_NAME("cortex-a57"), | 24 | + case ARMMMUIdx_Stage2: |
28 | + ARM_CPU_TYPE_NAME("cortex-a72"), | 25 | + case ARMMMUIdx_Stage2_S: |
29 | +}; | 26 | /* HCR.DC means HCR.VM behaves as 1 */ |
30 | + | 27 | return (hcr_el2 & (HCR_DC | HCR_VM)) == 0; |
31 | +static bool cpu_type_valid(const char *cpu) | 28 | - } |
32 | +{ | 29 | |
33 | + int i; | 30 | - if (hcr_el2 & HCR_TGE) { |
34 | + | 31 | + case ARMMMUIdx_E10_0: |
35 | + for (i = 0; i < ARRAY_SIZE(valid_cpus); i++) { | 32 | + case ARMMMUIdx_E10_1: |
36 | + if (strcmp(cpu, valid_cpus[i]) == 0) { | 33 | + case ARMMMUIdx_E10_1_PAN: |
34 | /* TGE means that NS EL0/1 act as if SCTLR_EL1.M is zero */ | ||
35 | - if (!is_secure && regime_el(env, mmu_idx) == 1) { | ||
36 | + if (!is_secure && (hcr_el2 & HCR_TGE)) { | ||
37 | return true; | ||
38 | } | ||
39 | - } | ||
40 | + break; | ||
41 | |||
42 | - if ((hcr_el2 & HCR_DC) && arm_mmu_idx_is_stage1_of_2(mmu_idx)) { | ||
43 | + case ARMMMUIdx_Stage1_E0: | ||
44 | + case ARMMMUIdx_Stage1_E1: | ||
45 | + case ARMMMUIdx_Stage1_E1_PAN: | ||
46 | /* HCR.DC means SCTLR_EL1.M behaves as 0 */ | ||
47 | - return true; | ||
48 | + if (hcr_el2 & HCR_DC) { | ||
37 | + return true; | 49 | + return true; |
38 | + } | 50 | + } |
39 | + } | 51 | + break; |
40 | + return false; | ||
41 | +} | ||
42 | + | 52 | + |
43 | static uint64_t sbsa_ref_cpu_mp_affinity(SBSAMachineState *sms, int idx) | 53 | + case ARMMMUIdx_E20_0: |
44 | { | 54 | + case ARMMMUIdx_E20_2: |
45 | uint8_t clustersz = ARM_DEFAULT_CPUS_PER_CLUSTER; | 55 | + case ARMMMUIdx_E20_2_PAN: |
46 | @@ -XXX,XX +XXX,XX @@ static void sbsa_ref_init(MachineState *machine) | 56 | + case ARMMMUIdx_E2: |
47 | const CPUArchIdList *possible_cpus; | 57 | + case ARMMMUIdx_E3: |
48 | int n, sbsa_max_cpus; | 58 | + break; |
49 | 59 | + | |
50 | - if (strcmp(machine->cpu_type, ARM_CPU_TYPE_NAME("cortex-a57"))) { | 60 | + default: |
51 | - error_report("sbsa-ref: CPU type other than the built-in " | 61 | + g_assert_not_reached(); |
52 | - "cortex-a57 not supported"); | ||
53 | + if (!cpu_type_valid(machine->cpu_type)) { | ||
54 | + error_report("mach-virt: CPU type %s not supported", machine->cpu_type); | ||
55 | exit(1); | ||
56 | } | 62 | } |
57 | 63 | ||
64 | return (regime_sctlr(env, mmu_idx) & SCTLR_M) == 0; | ||
58 | -- | 65 | -- |
59 | 2.20.1 | 66 | 2.25.1 |
60 | |||
61 | diff view generated by jsdifflib |
1 | From: Alex Chen <alex.chen@huawei.com> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | We should use printf format specifier "%u" instead of "%d" for | 3 | The effect of TGE does not only apply to non-secure state, |
4 | argument of type "unsigned int". | 4 | now that Secure EL2 exists. |
5 | 5 | ||
6 | Reported-by: Euler Robot <euler.robot@huawei.com> | ||
7 | Signed-off-by: Alex Chen <alex.chen@huawei.com> | ||
8 | Message-id: 20201126111109.112238-5-alex.chen@huawei.com | ||
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20221001162318.153420-13-richard.henderson@linaro.org | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 10 | --- |
12 | hw/misc/imx6ul_ccm.c | 4 ++-- | 11 | target/arm/ptw.c | 4 ++-- |
13 | 1 file changed, 2 insertions(+), 2 deletions(-) | 12 | 1 file changed, 2 insertions(+), 2 deletions(-) |
14 | 13 | ||
15 | diff --git a/hw/misc/imx6ul_ccm.c b/hw/misc/imx6ul_ccm.c | 14 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c |
16 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/hw/misc/imx6ul_ccm.c | 16 | --- a/target/arm/ptw.c |
18 | +++ b/hw/misc/imx6ul_ccm.c | 17 | +++ b/target/arm/ptw.c |
19 | @@ -XXX,XX +XXX,XX @@ static const char *imx6ul_ccm_reg_name(uint32_t reg) | 18 | @@ -XXX,XX +XXX,XX @@ static bool regime_translation_disabled(CPUARMState *env, ARMMMUIdx mmu_idx, |
20 | case CCM_CMEOR: | 19 | case ARMMMUIdx_E10_0: |
21 | return "CMEOR"; | 20 | case ARMMMUIdx_E10_1: |
22 | default: | 21 | case ARMMMUIdx_E10_1_PAN: |
23 | - sprintf(unknown, "%d ?", reg); | 22 | - /* TGE means that NS EL0/1 act as if SCTLR_EL1.M is zero */ |
24 | + sprintf(unknown, "%u ?", reg); | 23 | - if (!is_secure && (hcr_el2 & HCR_TGE)) { |
25 | return unknown; | 24 | + /* TGE means that EL0/1 act as if SCTLR_EL1.M is zero */ |
26 | } | 25 | + if (hcr_el2 & HCR_TGE) { |
27 | } | 26 | return true; |
28 | @@ -XXX,XX +XXX,XX @@ static const char *imx6ul_analog_reg_name(uint32_t reg) | 27 | } |
29 | case USB_ANALOG_DIGPROG: | 28 | break; |
30 | return "USB_ANALOG_DIGPROG"; | ||
31 | default: | ||
32 | - sprintf(unknown, "%d ?", reg); | ||
33 | + sprintf(unknown, "%u ?", reg); | ||
34 | return unknown; | ||
35 | } | ||
36 | } | ||
37 | -- | 29 | -- |
38 | 2.20.1 | 30 | 2.25.1 |
39 | |||
40 | diff view generated by jsdifflib |
1 | Implement the v8.1M VSCCLRM insn, which zeros floating point | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | registers if there is an active floating point context. | ||
3 | This requires support in write_neon_element32() for the MO_32 | ||
4 | element size, so add it. | ||
5 | 2 | ||
6 | Because we want to use arm_gen_condlabel(), we need to move | 3 | For page walking, we may require HCR for a security state |
7 | the definition of that function up in translate.c so it is | 4 | that is not "current". |
8 | before the #include of translate-vfp.c.inc. | ||
9 | 5 | ||
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20221001162318.153420-14-richard.henderson@linaro.org | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
12 | Message-id: 20201119215617.29887-5-peter.maydell@linaro.org | ||
13 | --- | 10 | --- |
14 | target/arm/cpu.h | 9 ++++ | 11 | target/arm/cpu.h | 20 +++++++++++++------- |
15 | target/arm/m-nocp.decode | 8 +++- | 12 | target/arm/helper.c | 11 ++++++++--- |
16 | target/arm/translate.c | 21 +++++---- | 13 | 2 files changed, 21 insertions(+), 10 deletions(-) |
17 | target/arm/translate-vfp.c.inc | 84 ++++++++++++++++++++++++++++++++++ | ||
18 | 4 files changed, 111 insertions(+), 11 deletions(-) | ||
19 | 14 | ||
20 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 15 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
21 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
22 | --- a/target/arm/cpu.h | 17 | --- a/target/arm/cpu.h |
23 | +++ b/target/arm/cpu.h | 18 | +++ b/target/arm/cpu.h |
24 | @@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa32_mprofile(const ARMISARegisters *id) | 19 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_is_secure(CPUARMState *env) |
25 | return FIELD_EX32(id->id_pfr1, ID_PFR1, MPROGMOD) != 0; | 20 | * Return true if the current security state has AArch64 EL2 or AArch32 Hyp. |
26 | } | 21 | * This corresponds to the pseudocode EL2Enabled() |
27 | 22 | */ | |
28 | +static inline bool isar_feature_aa32_m_sec_state(const ARMISARegisters *id) | 23 | +static inline bool arm_is_el2_enabled_secstate(CPUARMState *env, bool secure) |
29 | +{ | 24 | +{ |
30 | + /* | 25 | + return arm_feature(env, ARM_FEATURE_EL2) |
31 | + * Return true if M-profile state handling insns | 26 | + && (!secure || (env->cp15.scr_el3 & SCR_EEL2)); |
32 | + * (VSCCLRM, CLRM, FPCTX access insns) are implemented | ||
33 | + */ | ||
34 | + return FIELD_EX32(id->id_pfr1, ID_PFR1, SECURITY) >= 3; | ||
35 | +} | 27 | +} |
36 | + | 28 | + |
37 | static inline bool isar_feature_aa32_fp16_arith(const ARMISARegisters *id) | 29 | static inline bool arm_is_el2_enabled(CPUARMState *env) |
38 | { | 30 | { |
39 | /* Sadly this is encoded differently for A-profile and M-profile */ | 31 | - if (arm_feature(env, ARM_FEATURE_EL2)) { |
40 | diff --git a/target/arm/m-nocp.decode b/target/arm/m-nocp.decode | 32 | - if (arm_is_secure_below_el3(env)) { |
41 | index XXXXXXX..XXXXXXX 100644 | 33 | - return (env->cp15.scr_el3 & SCR_EEL2) != 0; |
42 | --- a/target/arm/m-nocp.decode | 34 | - } |
43 | +++ b/target/arm/m-nocp.decode | 35 | - return true; |
44 | @@ -XXX,XX +XXX,XX @@ | 36 | - } |
45 | # If the coprocessor is not present or disabled then we will generate | 37 | - return false; |
46 | # the NOCP exception; otherwise we let the insn through to the main decode. | 38 | + return arm_is_el2_enabled_secstate(env, arm_is_secure_below_el3(env)); |
47 | |||
48 | +%vd_dp 22:1 12:4 | ||
49 | +%vd_sp 12:4 22:1 | ||
50 | + | ||
51 | &nocp cp | ||
52 | |||
53 | { | ||
54 | # Special cases which do not take an early NOCP: VLLDM and VLSTM | ||
55 | VLLDM_VLSTM 1110 1100 001 l:1 rn:4 0000 1010 0000 0000 | ||
56 | - # TODO: VSCCLRM (new in v8.1M) is similar: | ||
57 | - #VSCCLRM 1110 1100 1-01 1111 ---- 1011 ---- ---0 | ||
58 | + # VSCCLRM (new in v8.1M) is similar: | ||
59 | + VSCCLRM 1110 1100 1.01 1111 .... 1011 imm:7 0 vd=%vd_dp size=3 | ||
60 | + VSCCLRM 1110 1100 1.01 1111 .... 1010 imm:8 vd=%vd_sp size=2 | ||
61 | |||
62 | NOCP 111- 1110 ---- ---- ---- cp:4 ---- ---- &nocp | ||
63 | NOCP 111- 110- ---- ---- ---- cp:4 ---- ---- &nocp | ||
64 | diff --git a/target/arm/translate.c b/target/arm/translate.c | ||
65 | index XXXXXXX..XXXXXXX 100644 | ||
66 | --- a/target/arm/translate.c | ||
67 | +++ b/target/arm/translate.c | ||
68 | @@ -XXX,XX +XXX,XX @@ void arm_translate_init(void) | ||
69 | a64_translate_init(); | ||
70 | } | 39 | } |
71 | 40 | ||
72 | +/* Generate a label used for skipping this instruction */ | 41 | #else |
73 | +static void arm_gen_condlabel(DisasContext *s) | 42 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_is_secure(CPUARMState *env) |
43 | return false; | ||
44 | } | ||
45 | |||
46 | +static inline bool arm_is_el2_enabled_secstate(CPUARMState *env, bool secure) | ||
74 | +{ | 47 | +{ |
75 | + if (!s->condjmp) { | 48 | + return false; |
76 | + s->condlabel = gen_new_label(); | ||
77 | + s->condjmp = 1; | ||
78 | + } | ||
79 | +} | 49 | +} |
80 | + | 50 | + |
81 | /* Flags for the disas_set_da_iss info argument: | 51 | static inline bool arm_is_el2_enabled(CPUARMState *env) |
82 | * lower bits hold the Rt register number, higher bits are flags. | 52 | { |
53 | return false; | ||
54 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_is_el2_enabled(CPUARMState *env) | ||
55 | * "for all purposes other than a direct read or write access of HCR_EL2." | ||
56 | * Not included here is HCR_RW. | ||
83 | */ | 57 | */ |
84 | @@ -XXX,XX +XXX,XX @@ static void write_neon_element64(TCGv_i64 src, int reg, int ele, MemOp memop) | 58 | +uint64_t arm_hcr_el2_eff_secstate(CPUARMState *env, bool secure); |
85 | long off = neon_element_offset(reg, ele, memop); | 59 | uint64_t arm_hcr_el2_eff(CPUARMState *env); |
86 | 60 | uint64_t arm_hcrx_el2_eff(CPUARMState *env); | |
87 | switch (memop) { | 61 | |
88 | + case MO_32: | 62 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
89 | + tcg_gen_st32_i64(src, cpu_env, off); | 63 | index XXXXXXX..XXXXXXX 100644 |
90 | + break; | 64 | --- a/target/arm/helper.c |
91 | case MO_64: | 65 | +++ b/target/arm/helper.c |
92 | tcg_gen_st_i64(src, cpu_env, off); | 66 | @@ -XXX,XX +XXX,XX @@ static void hcr_writelow(CPUARMState *env, const ARMCPRegInfo *ri, |
93 | break; | ||
94 | @@ -XXX,XX +XXX,XX @@ static void gen_srs(DisasContext *s, | ||
95 | s->base.is_jmp = DISAS_UPDATE_EXIT; | ||
96 | } | 67 | } |
97 | 68 | ||
98 | -/* Generate a label used for skipping this instruction */ | 69 | /* |
99 | -static void arm_gen_condlabel(DisasContext *s) | 70 | - * Return the effective value of HCR_EL2. |
100 | -{ | 71 | + * Return the effective value of HCR_EL2, at the given security state. |
101 | - if (!s->condjmp) { | 72 | * Bits that are not included here: |
102 | - s->condlabel = gen_new_label(); | 73 | * RW (read from SCR_EL3.RW as needed) |
103 | - s->condjmp = 1; | 74 | */ |
104 | - } | 75 | -uint64_t arm_hcr_el2_eff(CPUARMState *env) |
105 | -} | 76 | +uint64_t arm_hcr_el2_eff_secstate(CPUARMState *env, bool secure) |
106 | - | ||
107 | /* Skip this instruction if the ARM condition is false */ | ||
108 | static void arm_skip_unless(DisasContext *s, uint32_t cond) | ||
109 | { | 77 | { |
110 | diff --git a/target/arm/translate-vfp.c.inc b/target/arm/translate-vfp.c.inc | 78 | uint64_t ret = env->cp15.hcr_el2; |
111 | index XXXXXXX..XXXXXXX 100644 | 79 | |
112 | --- a/target/arm/translate-vfp.c.inc | 80 | - if (!arm_is_el2_enabled(env)) { |
113 | +++ b/target/arm/translate-vfp.c.inc | 81 | + if (!arm_is_el2_enabled_secstate(env, secure)) { |
114 | @@ -XXX,XX +XXX,XX @@ static bool trans_VLLDM_VLSTM(DisasContext *s, arg_VLLDM_VLSTM *a) | 82 | /* |
115 | return true; | 83 | * "This register has no effect if EL2 is not enabled in the |
84 | * current Security state". This is ARMv8.4-SecEL2 speak for | ||
85 | @@ -XXX,XX +XXX,XX @@ uint64_t arm_hcr_el2_eff(CPUARMState *env) | ||
86 | return ret; | ||
116 | } | 87 | } |
117 | 88 | ||
118 | +static bool trans_VSCCLRM(DisasContext *s, arg_VSCCLRM *a) | 89 | +uint64_t arm_hcr_el2_eff(CPUARMState *env) |
119 | +{ | 90 | +{ |
120 | + int btmreg, topreg; | 91 | + return arm_hcr_el2_eff_secstate(env, arm_is_secure_below_el3(env)); |
121 | + TCGv_i64 zero; | ||
122 | + TCGv_i32 aspen, sfpa; | ||
123 | + | ||
124 | + if (!dc_isar_feature(aa32_m_sec_state, s)) { | ||
125 | + /* Before v8.1M, fall through in decode to NOCP check */ | ||
126 | + return false; | ||
127 | + } | ||
128 | + | ||
129 | + /* Explicitly UNDEF because this takes precedence over NOCP */ | ||
130 | + if (!arm_dc_feature(s, ARM_FEATURE_M_MAIN) || !s->v8m_secure) { | ||
131 | + unallocated_encoding(s); | ||
132 | + return true; | ||
133 | + } | ||
134 | + | ||
135 | + if (!dc_isar_feature(aa32_vfp_simd, s)) { | ||
136 | + /* NOP if we have neither FP nor MVE */ | ||
137 | + return true; | ||
138 | + } | ||
139 | + | ||
140 | + /* | ||
141 | + * If FPCCR.ASPEN != 0 && CONTROL_S.SFPA == 0 then there is no | ||
142 | + * active floating point context so we must NOP (without doing | ||
143 | + * any lazy state preservation or the NOCP check). | ||
144 | + */ | ||
145 | + aspen = load_cpu_field(v7m.fpccr[M_REG_S]); | ||
146 | + sfpa = load_cpu_field(v7m.control[M_REG_S]); | ||
147 | + tcg_gen_andi_i32(aspen, aspen, R_V7M_FPCCR_ASPEN_MASK); | ||
148 | + tcg_gen_xori_i32(aspen, aspen, R_V7M_FPCCR_ASPEN_MASK); | ||
149 | + tcg_gen_andi_i32(sfpa, sfpa, R_V7M_CONTROL_SFPA_MASK); | ||
150 | + tcg_gen_or_i32(sfpa, sfpa, aspen); | ||
151 | + arm_gen_condlabel(s); | ||
152 | + tcg_gen_brcondi_i32(TCG_COND_EQ, sfpa, 0, s->condlabel); | ||
153 | + | ||
154 | + if (s->fp_excp_el != 0) { | ||
155 | + gen_exception_insn(s, s->pc_curr, EXCP_NOCP, | ||
156 | + syn_uncategorized(), s->fp_excp_el); | ||
157 | + return true; | ||
158 | + } | ||
159 | + | ||
160 | + topreg = a->vd + a->imm - 1; | ||
161 | + btmreg = a->vd; | ||
162 | + | ||
163 | + /* Convert to Sreg numbers if the insn specified in Dregs */ | ||
164 | + if (a->size == 3) { | ||
165 | + topreg = topreg * 2 + 1; | ||
166 | + btmreg *= 2; | ||
167 | + } | ||
168 | + | ||
169 | + if (topreg > 63 || (topreg > 31 && !(topreg & 1))) { | ||
170 | + /* UNPREDICTABLE: we choose to undef */ | ||
171 | + unallocated_encoding(s); | ||
172 | + return true; | ||
173 | + } | ||
174 | + | ||
175 | + /* Silently ignore requests to clear D16-D31 if they don't exist */ | ||
176 | + if (topreg > 31 && !dc_isar_feature(aa32_simd_r32, s)) { | ||
177 | + topreg = 31; | ||
178 | + } | ||
179 | + | ||
180 | + if (!vfp_access_check(s)) { | ||
181 | + return true; | ||
182 | + } | ||
183 | + | ||
184 | + /* Zero the Sregs from btmreg to topreg inclusive. */ | ||
185 | + zero = tcg_const_i64(0); | ||
186 | + if (btmreg & 1) { | ||
187 | + write_neon_element64(zero, btmreg >> 1, 1, MO_32); | ||
188 | + btmreg++; | ||
189 | + } | ||
190 | + for (; btmreg + 1 <= topreg; btmreg += 2) { | ||
191 | + write_neon_element64(zero, btmreg >> 1, 0, MO_64); | ||
192 | + } | ||
193 | + if (btmreg == topreg) { | ||
194 | + write_neon_element64(zero, btmreg >> 1, 0, MO_32); | ||
195 | + btmreg++; | ||
196 | + } | ||
197 | + assert(btmreg == topreg + 1); | ||
198 | + /* TODO: when MVE is implemented, zero VPR here */ | ||
199 | + return true; | ||
200 | +} | 92 | +} |
201 | + | 93 | + |
202 | static bool trans_NOCP(DisasContext *s, arg_nocp *a) | 94 | /* |
203 | { | 95 | * Corresponds to ARM pseudocode function ELIsInHost(). |
204 | /* | 96 | */ |
205 | -- | 97 | -- |
206 | 2.20.1 | 98 | 2.25.1 |
207 | |||
208 | diff view generated by jsdifflib |
1 | From: Vikram Garhwal <fnu.vikram@xilinx.com> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | The QTests perform five tests on the Xilinx ZynqMP CAN controller: | 3 | Rename the argument to is_secure_ptr, and introduce a |
4 | Tests the CAN controller in loopback, sleep and snoop mode. | 4 | local variable is_secure with the value. We only write |
5 | Tests filtering of incoming CAN messages. | 5 | back to the pointer toward the end of the function. |
6 | 6 | ||
7 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
8 | Reviewed-by: Francisco Iglesias <francisco.iglesias@xilinx.com> | 8 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
9 | Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com> | 9 | Message-id: 20221001162318.153420-15-richard.henderson@linaro.org |
10 | Message-id: 1605728926-352690-4-git-send-email-fnu.vikram@xilinx.com | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | --- | 11 | --- |
13 | tests/qtest/xlnx-can-test.c | 360 ++++++++++++++++++++++++++++++++++++ | 12 | target/arm/ptw.c | 22 ++++++++++++---------- |
14 | tests/qtest/meson.build | 1 + | 13 | 1 file changed, 12 insertions(+), 10 deletions(-) |
15 | 2 files changed, 361 insertions(+) | ||
16 | create mode 100644 tests/qtest/xlnx-can-test.c | ||
17 | 14 | ||
18 | diff --git a/tests/qtest/xlnx-can-test.c b/tests/qtest/xlnx-can-test.c | 15 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c |
19 | new file mode 100644 | ||
20 | index XXXXXXX..XXXXXXX | ||
21 | --- /dev/null | ||
22 | +++ b/tests/qtest/xlnx-can-test.c | ||
23 | @@ -XXX,XX +XXX,XX @@ | ||
24 | +/* | ||
25 | + * QTests for the Xilinx ZynqMP CAN controller. | ||
26 | + * | ||
27 | + * Copyright (c) 2020 Xilinx Inc. | ||
28 | + * | ||
29 | + * Written-by: Vikram Garhwal<fnu.vikram@xilinx.com> | ||
30 | + * | ||
31 | + * Permission is hereby granted, free of charge, to any person obtaining a copy | ||
32 | + * of this software and associated documentation files (the "Software"), to deal | ||
33 | + * in the Software without restriction, including without limitation the rights | ||
34 | + * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | ||
35 | + * copies of the Software, and to permit persons to whom the Software is | ||
36 | + * furnished to do so, subject to the following conditions: | ||
37 | + * | ||
38 | + * The above copyright notice and this permission notice shall be included in | ||
39 | + * all copies or substantial portions of the Software. | ||
40 | + * | ||
41 | + * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | ||
42 | + * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | ||
43 | + * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL | ||
44 | + * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | ||
45 | + * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | ||
46 | + * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN | ||
47 | + * THE SOFTWARE. | ||
48 | + */ | ||
49 | + | ||
50 | +#include "qemu/osdep.h" | ||
51 | +#include "libqos/libqtest.h" | ||
52 | + | ||
53 | +/* Base address. */ | ||
54 | +#define CAN0_BASE_ADDR 0xFF060000 | ||
55 | +#define CAN1_BASE_ADDR 0xFF070000 | ||
56 | + | ||
57 | +/* Register addresses. */ | ||
58 | +#define R_SRR_OFFSET 0x00 | ||
59 | +#define R_MSR_OFFSET 0x04 | ||
60 | +#define R_SR_OFFSET 0x18 | ||
61 | +#define R_ISR_OFFSET 0x1C | ||
62 | +#define R_ICR_OFFSET 0x24 | ||
63 | +#define R_TXID_OFFSET 0x30 | ||
64 | +#define R_TXDLC_OFFSET 0x34 | ||
65 | +#define R_TXDATA1_OFFSET 0x38 | ||
66 | +#define R_TXDATA2_OFFSET 0x3C | ||
67 | +#define R_RXID_OFFSET 0x50 | ||
68 | +#define R_RXDLC_OFFSET 0x54 | ||
69 | +#define R_RXDATA1_OFFSET 0x58 | ||
70 | +#define R_RXDATA2_OFFSET 0x5C | ||
71 | +#define R_AFR 0x60 | ||
72 | +#define R_AFMR1 0x64 | ||
73 | +#define R_AFIR1 0x68 | ||
74 | +#define R_AFMR2 0x6C | ||
75 | +#define R_AFIR2 0x70 | ||
76 | +#define R_AFMR3 0x74 | ||
77 | +#define R_AFIR3 0x78 | ||
78 | +#define R_AFMR4 0x7C | ||
79 | +#define R_AFIR4 0x80 | ||
80 | + | ||
81 | +/* CAN modes. */ | ||
82 | +#define CONFIG_MODE 0x00 | ||
83 | +#define NORMAL_MODE 0x00 | ||
84 | +#define LOOPBACK_MODE 0x02 | ||
85 | +#define SNOOP_MODE 0x04 | ||
86 | +#define SLEEP_MODE 0x01 | ||
87 | +#define ENABLE_CAN (1 << 1) | ||
88 | +#define STATUS_NORMAL_MODE (1 << 3) | ||
89 | +#define STATUS_LOOPBACK_MODE (1 << 1) | ||
90 | +#define STATUS_SNOOP_MODE (1 << 12) | ||
91 | +#define STATUS_SLEEP_MODE (1 << 2) | ||
92 | +#define ISR_TXOK (1 << 1) | ||
93 | +#define ISR_RXOK (1 << 4) | ||
94 | + | ||
95 | +static void match_rx_tx_data(const uint32_t *buf_tx, const uint32_t *buf_rx, | ||
96 | + uint8_t can_timestamp) | ||
97 | +{ | ||
98 | + uint16_t size = 0; | ||
99 | + uint8_t len = 4; | ||
100 | + | ||
101 | + while (size < len) { | ||
102 | + if (R_RXID_OFFSET + 4 * size == R_RXDLC_OFFSET) { | ||
103 | + g_assert_cmpint(buf_rx[size], ==, buf_tx[size] + can_timestamp); | ||
104 | + } else { | ||
105 | + g_assert_cmpint(buf_rx[size], ==, buf_tx[size]); | ||
106 | + } | ||
107 | + | ||
108 | + size++; | ||
109 | + } | ||
110 | +} | ||
111 | + | ||
112 | +static void read_data(QTestState *qts, uint64_t can_base_addr, uint32_t *buf_rx) | ||
113 | +{ | ||
114 | + uint32_t int_status; | ||
115 | + | ||
116 | + /* Read the interrupt on CAN rx. */ | ||
117 | + int_status = qtest_readl(qts, can_base_addr + R_ISR_OFFSET) & ISR_RXOK; | ||
118 | + | ||
119 | + g_assert_cmpint(int_status, ==, ISR_RXOK); | ||
120 | + | ||
121 | + /* Read the RX register data for CAN. */ | ||
122 | + buf_rx[0] = qtest_readl(qts, can_base_addr + R_RXID_OFFSET); | ||
123 | + buf_rx[1] = qtest_readl(qts, can_base_addr + R_RXDLC_OFFSET); | ||
124 | + buf_rx[2] = qtest_readl(qts, can_base_addr + R_RXDATA1_OFFSET); | ||
125 | + buf_rx[3] = qtest_readl(qts, can_base_addr + R_RXDATA2_OFFSET); | ||
126 | + | ||
127 | + /* Clear the RX interrupt. */ | ||
128 | + qtest_writel(qts, CAN1_BASE_ADDR + R_ICR_OFFSET, ISR_RXOK); | ||
129 | +} | ||
130 | + | ||
131 | +static void send_data(QTestState *qts, uint64_t can_base_addr, | ||
132 | + const uint32_t *buf_tx) | ||
133 | +{ | ||
134 | + uint32_t int_status; | ||
135 | + | ||
136 | + /* Write the TX register data for CAN. */ | ||
137 | + qtest_writel(qts, can_base_addr + R_TXID_OFFSET, buf_tx[0]); | ||
138 | + qtest_writel(qts, can_base_addr + R_TXDLC_OFFSET, buf_tx[1]); | ||
139 | + qtest_writel(qts, can_base_addr + R_TXDATA1_OFFSET, buf_tx[2]); | ||
140 | + qtest_writel(qts, can_base_addr + R_TXDATA2_OFFSET, buf_tx[3]); | ||
141 | + | ||
142 | + /* Read the interrupt on CAN for tx. */ | ||
143 | + int_status = qtest_readl(qts, can_base_addr + R_ISR_OFFSET) & ISR_TXOK; | ||
144 | + | ||
145 | + g_assert_cmpint(int_status, ==, ISR_TXOK); | ||
146 | + | ||
147 | + /* Clear the interrupt for tx. */ | ||
148 | + qtest_writel(qts, CAN0_BASE_ADDR + R_ICR_OFFSET, ISR_TXOK); | ||
149 | +} | ||
150 | + | ||
151 | +/* | ||
152 | + * This test will be transferring data from CAN0 and CAN1 through canbus. CAN0 | ||
153 | + * initiate the data transfer to can-bus, CAN1 receives the data. Test compares | ||
154 | + * the data sent from CAN0 with received on CAN1. | ||
155 | + */ | ||
156 | +static void test_can_bus(void) | ||
157 | +{ | ||
158 | + const uint32_t buf_tx[4] = { 0xFF, 0x80000000, 0x12345678, 0x87654321 }; | ||
159 | + uint32_t buf_rx[4] = { 0x00, 0x00, 0x00, 0x00 }; | ||
160 | + uint32_t status = 0; | ||
161 | + uint8_t can_timestamp = 1; | ||
162 | + | ||
163 | + QTestState *qts = qtest_init("-machine xlnx-zcu102" | ||
164 | + " -object can-bus,id=canbus0" | ||
165 | + " -machine xlnx-zcu102.canbus0=canbus0" | ||
166 | + " -machine xlnx-zcu102.canbus1=canbus0" | ||
167 | + ); | ||
168 | + | ||
169 | + /* Configure the CAN0 and CAN1. */ | ||
170 | + qtest_writel(qts, CAN0_BASE_ADDR + R_SRR_OFFSET, ENABLE_CAN); | ||
171 | + qtest_writel(qts, CAN0_BASE_ADDR + R_MSR_OFFSET, NORMAL_MODE); | ||
172 | + qtest_writel(qts, CAN1_BASE_ADDR + R_SRR_OFFSET, ENABLE_CAN); | ||
173 | + qtest_writel(qts, CAN1_BASE_ADDR + R_MSR_OFFSET, NORMAL_MODE); | ||
174 | + | ||
175 | + /* Check here if CAN0 and CAN1 are in normal mode. */ | ||
176 | + status = qtest_readl(qts, CAN0_BASE_ADDR + R_SR_OFFSET); | ||
177 | + g_assert_cmpint(status, ==, STATUS_NORMAL_MODE); | ||
178 | + | ||
179 | + status = qtest_readl(qts, CAN1_BASE_ADDR + R_SR_OFFSET); | ||
180 | + g_assert_cmpint(status, ==, STATUS_NORMAL_MODE); | ||
181 | + | ||
182 | + send_data(qts, CAN0_BASE_ADDR, buf_tx); | ||
183 | + | ||
184 | + read_data(qts, CAN1_BASE_ADDR, buf_rx); | ||
185 | + match_rx_tx_data(buf_tx, buf_rx, can_timestamp); | ||
186 | + | ||
187 | + qtest_quit(qts); | ||
188 | +} | ||
189 | + | ||
190 | +/* | ||
191 | + * This test is performing loopback mode on CAN0 and CAN1. Data sent from TX of | ||
192 | + * each CAN0 and CAN1 are compared with RX register data for respective CAN. | ||
193 | + */ | ||
194 | +static void test_can_loopback(void) | ||
195 | +{ | ||
196 | + uint32_t buf_tx[4] = { 0xFF, 0x80000000, 0x12345678, 0x87654321 }; | ||
197 | + uint32_t buf_rx[4] = { 0x00, 0x00, 0x00, 0x00 }; | ||
198 | + uint32_t status = 0; | ||
199 | + | ||
200 | + QTestState *qts = qtest_init("-machine xlnx-zcu102" | ||
201 | + " -object can-bus,id=canbus0" | ||
202 | + " -machine xlnx-zcu102.canbus0=canbus0" | ||
203 | + " -machine xlnx-zcu102.canbus1=canbus0" | ||
204 | + ); | ||
205 | + | ||
206 | + /* Configure the CAN0 in loopback mode. */ | ||
207 | + qtest_writel(qts, CAN0_BASE_ADDR + R_SRR_OFFSET, CONFIG_MODE); | ||
208 | + qtest_writel(qts, CAN0_BASE_ADDR + R_MSR_OFFSET, LOOPBACK_MODE); | ||
209 | + qtest_writel(qts, CAN0_BASE_ADDR + R_SRR_OFFSET, ENABLE_CAN); | ||
210 | + | ||
211 | + /* Check here if CAN0 is set in loopback mode. */ | ||
212 | + status = qtest_readl(qts, CAN0_BASE_ADDR + R_SR_OFFSET); | ||
213 | + | ||
214 | + g_assert_cmpint(status, ==, STATUS_LOOPBACK_MODE); | ||
215 | + | ||
216 | + send_data(qts, CAN0_BASE_ADDR, buf_tx); | ||
217 | + read_data(qts, CAN0_BASE_ADDR, buf_rx); | ||
218 | + match_rx_tx_data(buf_tx, buf_rx, 0); | ||
219 | + | ||
220 | + /* Configure the CAN1 in loopback mode. */ | ||
221 | + qtest_writel(qts, CAN1_BASE_ADDR + R_SRR_OFFSET, CONFIG_MODE); | ||
222 | + qtest_writel(qts, CAN1_BASE_ADDR + R_MSR_OFFSET, LOOPBACK_MODE); | ||
223 | + qtest_writel(qts, CAN1_BASE_ADDR + R_SRR_OFFSET, ENABLE_CAN); | ||
224 | + | ||
225 | + /* Check here if CAN1 is set in loopback mode. */ | ||
226 | + status = qtest_readl(qts, CAN1_BASE_ADDR + R_SR_OFFSET); | ||
227 | + | ||
228 | + g_assert_cmpint(status, ==, STATUS_LOOPBACK_MODE); | ||
229 | + | ||
230 | + send_data(qts, CAN1_BASE_ADDR, buf_tx); | ||
231 | + read_data(qts, CAN1_BASE_ADDR, buf_rx); | ||
232 | + match_rx_tx_data(buf_tx, buf_rx, 0); | ||
233 | + | ||
234 | + qtest_quit(qts); | ||
235 | +} | ||
236 | + | ||
237 | +/* | ||
238 | + * Enable filters for CAN1. This will filter incoming messages with ID. In this | ||
239 | + * test message will pass through filter 2. | ||
240 | + */ | ||
241 | +static void test_can_filter(void) | ||
242 | +{ | ||
243 | + uint32_t buf_tx[4] = { 0x14, 0x80000000, 0x12345678, 0x87654321 }; | ||
244 | + uint32_t buf_rx[4] = { 0x00, 0x00, 0x00, 0x00 }; | ||
245 | + uint32_t status = 0; | ||
246 | + uint8_t can_timestamp = 1; | ||
247 | + | ||
248 | + QTestState *qts = qtest_init("-machine xlnx-zcu102" | ||
249 | + " -object can-bus,id=canbus0" | ||
250 | + " -machine xlnx-zcu102.canbus0=canbus0" | ||
251 | + " -machine xlnx-zcu102.canbus1=canbus0" | ||
252 | + ); | ||
253 | + | ||
254 | + /* Configure the CAN0 and CAN1. */ | ||
255 | + qtest_writel(qts, CAN0_BASE_ADDR + R_SRR_OFFSET, ENABLE_CAN); | ||
256 | + qtest_writel(qts, CAN0_BASE_ADDR + R_MSR_OFFSET, NORMAL_MODE); | ||
257 | + qtest_writel(qts, CAN1_BASE_ADDR + R_SRR_OFFSET, ENABLE_CAN); | ||
258 | + qtest_writel(qts, CAN1_BASE_ADDR + R_MSR_OFFSET, NORMAL_MODE); | ||
259 | + | ||
260 | + /* Check here if CAN0 and CAN1 are in normal mode. */ | ||
261 | + status = qtest_readl(qts, CAN0_BASE_ADDR + R_SR_OFFSET); | ||
262 | + g_assert_cmpint(status, ==, STATUS_NORMAL_MODE); | ||
263 | + | ||
264 | + status = qtest_readl(qts, CAN1_BASE_ADDR + R_SR_OFFSET); | ||
265 | + g_assert_cmpint(status, ==, STATUS_NORMAL_MODE); | ||
266 | + | ||
267 | + /* Set filter for CAN1 for incoming messages. */ | ||
268 | + qtest_writel(qts, CAN1_BASE_ADDR + R_AFR, 0x0); | ||
269 | + qtest_writel(qts, CAN1_BASE_ADDR + R_AFMR1, 0xF7); | ||
270 | + qtest_writel(qts, CAN1_BASE_ADDR + R_AFIR1, 0x121F); | ||
271 | + qtest_writel(qts, CAN1_BASE_ADDR + R_AFMR2, 0x5431); | ||
272 | + qtest_writel(qts, CAN1_BASE_ADDR + R_AFIR2, 0x14); | ||
273 | + qtest_writel(qts, CAN1_BASE_ADDR + R_AFMR3, 0x1234); | ||
274 | + qtest_writel(qts, CAN1_BASE_ADDR + R_AFIR3, 0x5431); | ||
275 | + qtest_writel(qts, CAN1_BASE_ADDR + R_AFMR4, 0xFFF); | ||
276 | + qtest_writel(qts, CAN1_BASE_ADDR + R_AFIR4, 0x1234); | ||
277 | + | ||
278 | + qtest_writel(qts, CAN1_BASE_ADDR + R_AFR, 0xF); | ||
279 | + | ||
280 | + send_data(qts, CAN0_BASE_ADDR, buf_tx); | ||
281 | + | ||
282 | + read_data(qts, CAN1_BASE_ADDR, buf_rx); | ||
283 | + match_rx_tx_data(buf_tx, buf_rx, can_timestamp); | ||
284 | + | ||
285 | + qtest_quit(qts); | ||
286 | +} | ||
287 | + | ||
288 | +/* Testing sleep mode on CAN0 while CAN1 is in normal mode. */ | ||
289 | +static void test_can_sleepmode(void) | ||
290 | +{ | ||
291 | + uint32_t buf_tx[4] = { 0x14, 0x80000000, 0x12345678, 0x87654321 }; | ||
292 | + uint32_t buf_rx[4] = { 0x00, 0x00, 0x00, 0x00 }; | ||
293 | + uint32_t status = 0; | ||
294 | + uint8_t can_timestamp = 1; | ||
295 | + | ||
296 | + QTestState *qts = qtest_init("-machine xlnx-zcu102" | ||
297 | + " -object can-bus,id=canbus0" | ||
298 | + " -machine xlnx-zcu102.canbus0=canbus0" | ||
299 | + " -machine xlnx-zcu102.canbus1=canbus0" | ||
300 | + ); | ||
301 | + | ||
302 | + /* Configure the CAN0. */ | ||
303 | + qtest_writel(qts, CAN0_BASE_ADDR + R_SRR_OFFSET, CONFIG_MODE); | ||
304 | + qtest_writel(qts, CAN0_BASE_ADDR + R_MSR_OFFSET, SLEEP_MODE); | ||
305 | + qtest_writel(qts, CAN0_BASE_ADDR + R_SRR_OFFSET, ENABLE_CAN); | ||
306 | + | ||
307 | + qtest_writel(qts, CAN1_BASE_ADDR + R_SRR_OFFSET, ENABLE_CAN); | ||
308 | + qtest_writel(qts, CAN1_BASE_ADDR + R_MSR_OFFSET, NORMAL_MODE); | ||
309 | + | ||
310 | + /* Check here if CAN0 is in SLEEP mode and CAN1 in normal mode. */ | ||
311 | + status = qtest_readl(qts, CAN0_BASE_ADDR + R_SR_OFFSET); | ||
312 | + g_assert_cmpint(status, ==, STATUS_SLEEP_MODE); | ||
313 | + | ||
314 | + status = qtest_readl(qts, CAN1_BASE_ADDR + R_SR_OFFSET); | ||
315 | + g_assert_cmpint(status, ==, STATUS_NORMAL_MODE); | ||
316 | + | ||
317 | + send_data(qts, CAN1_BASE_ADDR, buf_tx); | ||
318 | + | ||
319 | + /* | ||
320 | + * Once CAN1 sends data on can-bus. CAN0 should exit sleep mode. | ||
321 | + * Check the CAN0 status now. It should exit the sleep mode and receive the | ||
322 | + * incoming data. | ||
323 | + */ | ||
324 | + status = qtest_readl(qts, CAN0_BASE_ADDR + R_SR_OFFSET); | ||
325 | + g_assert_cmpint(status, ==, STATUS_NORMAL_MODE); | ||
326 | + | ||
327 | + read_data(qts, CAN0_BASE_ADDR, buf_rx); | ||
328 | + | ||
329 | + match_rx_tx_data(buf_tx, buf_rx, can_timestamp); | ||
330 | + | ||
331 | + qtest_quit(qts); | ||
332 | +} | ||
333 | + | ||
334 | +/* Testing Snoop mode on CAN0 while CAN1 is in normal mode. */ | ||
335 | +static void test_can_snoopmode(void) | ||
336 | +{ | ||
337 | + uint32_t buf_tx[4] = { 0x14, 0x80000000, 0x12345678, 0x87654321 }; | ||
338 | + uint32_t buf_rx[4] = { 0x00, 0x00, 0x00, 0x00 }; | ||
339 | + uint32_t status = 0; | ||
340 | + uint8_t can_timestamp = 1; | ||
341 | + | ||
342 | + QTestState *qts = qtest_init("-machine xlnx-zcu102" | ||
343 | + " -object can-bus,id=canbus0" | ||
344 | + " -machine xlnx-zcu102.canbus0=canbus0" | ||
345 | + " -machine xlnx-zcu102.canbus1=canbus0" | ||
346 | + ); | ||
347 | + | ||
348 | + /* Configure the CAN0. */ | ||
349 | + qtest_writel(qts, CAN0_BASE_ADDR + R_SRR_OFFSET, CONFIG_MODE); | ||
350 | + qtest_writel(qts, CAN0_BASE_ADDR + R_MSR_OFFSET, SNOOP_MODE); | ||
351 | + qtest_writel(qts, CAN0_BASE_ADDR + R_SRR_OFFSET, ENABLE_CAN); | ||
352 | + | ||
353 | + qtest_writel(qts, CAN1_BASE_ADDR + R_SRR_OFFSET, ENABLE_CAN); | ||
354 | + qtest_writel(qts, CAN1_BASE_ADDR + R_MSR_OFFSET, NORMAL_MODE); | ||
355 | + | ||
356 | + /* Check here if CAN0 is in SNOOP mode and CAN1 in normal mode. */ | ||
357 | + status = qtest_readl(qts, CAN0_BASE_ADDR + R_SR_OFFSET); | ||
358 | + g_assert_cmpint(status, ==, STATUS_SNOOP_MODE); | ||
359 | + | ||
360 | + status = qtest_readl(qts, CAN1_BASE_ADDR + R_SR_OFFSET); | ||
361 | + g_assert_cmpint(status, ==, STATUS_NORMAL_MODE); | ||
362 | + | ||
363 | + send_data(qts, CAN1_BASE_ADDR, buf_tx); | ||
364 | + | ||
365 | + read_data(qts, CAN0_BASE_ADDR, buf_rx); | ||
366 | + | ||
367 | + match_rx_tx_data(buf_tx, buf_rx, can_timestamp); | ||
368 | + | ||
369 | + qtest_quit(qts); | ||
370 | +} | ||
371 | + | ||
372 | +int main(int argc, char **argv) | ||
373 | +{ | ||
374 | + g_test_init(&argc, &argv, NULL); | ||
375 | + | ||
376 | + qtest_add_func("/net/can/can_bus", test_can_bus); | ||
377 | + qtest_add_func("/net/can/can_loopback", test_can_loopback); | ||
378 | + qtest_add_func("/net/can/can_filter", test_can_filter); | ||
379 | + qtest_add_func("/net/can/can_test_snoopmode", test_can_snoopmode); | ||
380 | + qtest_add_func("/net/can/can_test_sleepmode", test_can_sleepmode); | ||
381 | + | ||
382 | + return g_test_run(); | ||
383 | +} | ||
384 | diff --git a/tests/qtest/meson.build b/tests/qtest/meson.build | ||
385 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
386 | --- a/tests/qtest/meson.build | 17 | --- a/target/arm/ptw.c |
387 | +++ b/tests/qtest/meson.build | 18 | +++ b/target/arm/ptw.c |
388 | @@ -XXX,XX +XXX,XX @@ qtests_aarch64 = \ | 19 | @@ -XXX,XX +XXX,XX @@ static bool ptw_attrs_are_device(CPUARMState *env, ARMCacheAttrs cacheattrs) |
389 | ['arm-cpu-features', | 20 | |
390 | 'numa-test', | 21 | /* Translate a S1 pagetable walk through S2 if needed. */ |
391 | 'boot-serial-test', | 22 | static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, |
392 | + 'xlnx-can-test', | 23 | - hwaddr addr, bool *is_secure, |
393 | 'migration-test'] | 24 | + hwaddr addr, bool *is_secure_ptr, |
394 | 25 | ARMMMUFaultInfo *fi) | |
395 | qtests_s390x = \ | 26 | { |
27 | - ARMMMUIdx s2_mmu_idx = *is_secure ? ARMMMUIdx_Stage2_S : ARMMMUIdx_Stage2; | ||
28 | + bool is_secure = *is_secure_ptr; | ||
29 | + ARMMMUIdx s2_mmu_idx = is_secure ? ARMMMUIdx_Stage2_S : ARMMMUIdx_Stage2; | ||
30 | |||
31 | if (arm_mmu_idx_is_stage1_of_2(mmu_idx) && | ||
32 | - !regime_translation_disabled(env, s2_mmu_idx, *is_secure)) { | ||
33 | + !regime_translation_disabled(env, s2_mmu_idx, is_secure)) { | ||
34 | GetPhysAddrResult s2 = {}; | ||
35 | int ret; | ||
36 | |||
37 | ret = get_phys_addr_lpae(env, addr, MMU_DATA_LOAD, s2_mmu_idx, | ||
38 | - *is_secure, false, &s2, fi); | ||
39 | + is_secure, false, &s2, fi); | ||
40 | if (ret) { | ||
41 | assert(fi->type != ARMFault_None); | ||
42 | fi->s2addr = addr; | ||
43 | fi->stage2 = true; | ||
44 | fi->s1ptw = true; | ||
45 | - fi->s1ns = !*is_secure; | ||
46 | + fi->s1ns = !is_secure; | ||
47 | return ~0; | ||
48 | } | ||
49 | if ((arm_hcr_el2_eff(env) & HCR_PTW) && | ||
50 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
51 | fi->s2addr = addr; | ||
52 | fi->stage2 = true; | ||
53 | fi->s1ptw = true; | ||
54 | - fi->s1ns = !*is_secure; | ||
55 | + fi->s1ns = !is_secure; | ||
56 | return ~0; | ||
57 | } | ||
58 | |||
59 | if (arm_is_secure_below_el3(env)) { | ||
60 | /* Check if page table walk is to secure or non-secure PA space. */ | ||
61 | - if (*is_secure) { | ||
62 | - *is_secure = !(env->cp15.vstcr_el2 & VSTCR_SW); | ||
63 | + if (is_secure) { | ||
64 | + is_secure = !(env->cp15.vstcr_el2 & VSTCR_SW); | ||
65 | } else { | ||
66 | - *is_secure = !(env->cp15.vtcr_el2 & VTCR_NSW); | ||
67 | + is_secure = !(env->cp15.vtcr_el2 & VTCR_NSW); | ||
68 | } | ||
69 | + *is_secure_ptr = is_secure; | ||
70 | } else { | ||
71 | - assert(!*is_secure); | ||
72 | + assert(!is_secure); | ||
73 | } | ||
74 | |||
75 | addr = s2.phys; | ||
396 | -- | 76 | -- |
397 | 2.20.1 | 77 | 2.25.1 |
398 | |||
399 | diff view generated by jsdifflib |
1 | For M-profile before v8.1M, the only valid register for VMSR/VMRS is | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | the FPSCR. We have a comment that states this, but the actual logic | ||
3 | to forbid accesses for any other register value is missing, so we | ||
4 | would end up with A-profile style behaviour. Add the missing check. | ||
5 | 2 | ||
3 | This value is unused. | ||
4 | |||
5 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | Message-id: 20221001162318.153420-16-richard.henderson@linaro.org | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20201119215617.29887-7-peter.maydell@linaro.org | ||
9 | --- | 9 | --- |
10 | target/arm/translate-vfp.c.inc | 5 ++++- | 10 | target/arm/ptw.c | 5 ++--- |
11 | 1 file changed, 4 insertions(+), 1 deletion(-) | 11 | 1 file changed, 2 insertions(+), 3 deletions(-) |
12 | 12 | ||
13 | diff --git a/target/arm/translate-vfp.c.inc b/target/arm/translate-vfp.c.inc | 13 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c |
14 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/target/arm/translate-vfp.c.inc | 15 | --- a/target/arm/ptw.c |
16 | +++ b/target/arm/translate-vfp.c.inc | 16 | +++ b/target/arm/ptw.c |
17 | @@ -XXX,XX +XXX,XX @@ static bool trans_VMSR_VMRS(DisasContext *s, arg_VMSR_VMRS *a) | 17 | @@ -XXX,XX +XXX,XX @@ static uint8_t force_cacheattr_nibble_wb(uint8_t attr) |
18 | * Accesses to R15 are UNPREDICTABLE; we choose to undef. | 18 | * s1 and s2 for the HCR_EL2.FWB == 1 case, returning the |
19 | * (FPSCR -> r15 is a special case which writes to the PSR flags.) | 19 | * combined attributes in MAIR_EL1 format. |
20 | */ | 20 | */ |
21 | - if (a->rt == 15 && (!a->l || a->reg != ARM_VFP_FPSCR)) { | 21 | -static uint8_t combined_attrs_fwb(CPUARMState *env, |
22 | + if (a->reg != ARM_VFP_FPSCR) { | 22 | - ARMCacheAttrs s1, ARMCacheAttrs s2) |
23 | + return false; | 23 | +static uint8_t combined_attrs_fwb(ARMCacheAttrs s1, ARMCacheAttrs s2) |
24 | + } | 24 | { |
25 | + if (a->rt == 15 && !a->l) { | 25 | switch (s2.attrs) { |
26 | return false; | 26 | case 7: |
27 | } | 27 | @@ -XXX,XX +XXX,XX @@ static ARMCacheAttrs combine_cacheattrs(CPUARMState *env, |
28 | |||
29 | /* Combine memory type and cacheability attributes */ | ||
30 | if (arm_hcr_el2_eff(env) & HCR_FWB) { | ||
31 | - ret.attrs = combined_attrs_fwb(env, s1, s2); | ||
32 | + ret.attrs = combined_attrs_fwb(s1, s2); | ||
33 | } else { | ||
34 | ret.attrs = combined_attrs_nofwb(env, s1, s2); | ||
28 | } | 35 | } |
29 | -- | 36 | -- |
30 | 2.20.1 | 37 | 2.25.1 |
31 | |||
32 | diff view generated by jsdifflib |
1 | For M-profile CPUs, the range from 0xe0000000 to 0xe00fffff is the | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | Private Peripheral Bus range, which includes all of the memory mapped | ||
3 | devices and registers that are part of the CPU itself, including the | ||
4 | NVIC, systick timer, and debug and trace components like the Data | ||
5 | Watchpoint and Trace unit (DWT). Within this large region, the range | ||
6 | 0xe000e000 to 0xe000efff is the System Control Space (NVIC, system | ||
7 | registers, systick) and 0xe002e000 to 0exe002efff is its Non-secure | ||
8 | alias. | ||
9 | 2 | ||
10 | The architecture is clear that within the SCS unimplemented registers | 3 | These subroutines did not need ENV for anything except |
11 | should be RES0 for privileged accesses and generate BusFault for | 4 | retrieving the effective value of HCR anyway. |
12 | unprivileged accesses, and we currently implement this. | ||
13 | 5 | ||
14 | It is less clear about how to handle accesses to unimplemented | 6 | We have computed the effective value of HCR in the callers, |
15 | regions of the wider PPB. Unprivileged accesses should definitely | 7 | and this will be especially important for interpreting HCR |
16 | cause BusFaults (R_DQQS), but the behaviour of privileged accesses is | 8 | in a non-current security state. |
17 | not given as a general rule. However, the register definitions of | ||
18 | individual registers for components like the DWT all state that they | ||
19 | are RES0 if the relevant component is not implemented, so the | ||
20 | simplest way to provide that is to provide RAZ/WI for the whole range | ||
21 | for privileged accesses. (The v7M Arm ARM does say that reserved | ||
22 | registers should be UNK/SBZP.) | ||
23 | 9 | ||
24 | Expand the container MemoryRegion that the NVIC exposes so that | 10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
25 | it covers the whole PPB space. This means: | 11 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
26 | * moving the address that the ARMV7M device maps it to down by | 12 | Message-id: 20221001162318.153420-17-richard.henderson@linaro.org |
27 | 0xe000 bytes | 13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
28 | * moving the off and the offsets within the container of all the | 14 | --- |
29 | subregions forward by 0xe000 bytes | 15 | target/arm/ptw.c | 30 +++++++++++++++++------------- |
30 | * adding a new default MemoryRegion that covers the whole container | 16 | 1 file changed, 17 insertions(+), 13 deletions(-) |
31 | at a lower priority than anything else and which provides the | ||
32 | RAZWI/BusFault behaviour | ||
33 | 17 | ||
34 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 18 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c |
35 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
36 | Message-id: 20201119215617.29887-2-peter.maydell@linaro.org | ||
37 | --- | ||
38 | include/hw/intc/armv7m_nvic.h | 1 + | ||
39 | hw/arm/armv7m.c | 2 +- | ||
40 | hw/intc/armv7m_nvic.c | 78 ++++++++++++++++++++++++++++++----- | ||
41 | 3 files changed, 69 insertions(+), 12 deletions(-) | ||
42 | |||
43 | diff --git a/include/hw/intc/armv7m_nvic.h b/include/hw/intc/armv7m_nvic.h | ||
44 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
45 | --- a/include/hw/intc/armv7m_nvic.h | 20 | --- a/target/arm/ptw.c |
46 | +++ b/include/hw/intc/armv7m_nvic.h | 21 | +++ b/target/arm/ptw.c |
47 | @@ -XXX,XX +XXX,XX @@ struct NVICState { | 22 | @@ -XXX,XX +XXX,XX @@ static bool regime_translation_disabled(CPUARMState *env, ARMMMUIdx mmu_idx, |
48 | MemoryRegion systickmem; | 23 | return (regime_sctlr(env, mmu_idx) & SCTLR_M) == 0; |
49 | MemoryRegion systick_ns_mem; | 24 | } |
50 | MemoryRegion container; | 25 | |
51 | + MemoryRegion defaultmem; | 26 | -static bool ptw_attrs_are_device(CPUARMState *env, ARMCacheAttrs cacheattrs) |
52 | 27 | +static bool ptw_attrs_are_device(uint64_t hcr, ARMCacheAttrs cacheattrs) | |
53 | uint32_t num_irq; | 28 | { |
54 | qemu_irq excpout; | 29 | /* |
55 | diff --git a/hw/arm/armv7m.c b/hw/arm/armv7m.c | 30 | * For an S1 page table walk, the stage 1 attributes are always |
56 | index XXXXXXX..XXXXXXX 100644 | 31 | @@ -XXX,XX +XXX,XX @@ static bool ptw_attrs_are_device(CPUARMState *env, ARMCacheAttrs cacheattrs) |
57 | --- a/hw/arm/armv7m.c | 32 | * when cacheattrs.attrs bit [2] is 0. |
58 | +++ b/hw/arm/armv7m.c | 33 | */ |
59 | @@ -XXX,XX +XXX,XX @@ static void armv7m_realize(DeviceState *dev, Error **errp) | 34 | assert(cacheattrs.is_s2_format); |
60 | sysbus_connect_irq(sbd, 0, | 35 | - if (arm_hcr_el2_eff(env) & HCR_FWB) { |
61 | qdev_get_gpio_in(DEVICE(s->cpu), ARM_CPU_IRQ)); | 36 | + if (hcr & HCR_FWB) { |
62 | 37 | return (cacheattrs.attrs & 0x4) == 0; | |
63 | - memory_region_add_subregion(&s->container, 0xe000e000, | 38 | } else { |
64 | + memory_region_add_subregion(&s->container, 0xe0000000, | 39 | return (cacheattrs.attrs & 0xc) == 0; |
65 | sysbus_mmio_get_region(sbd, 0)); | 40 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, |
66 | 41 | if (arm_mmu_idx_is_stage1_of_2(mmu_idx) && | |
67 | for (i = 0; i < ARRAY_SIZE(s->bitband); i++) { | 42 | !regime_translation_disabled(env, s2_mmu_idx, is_secure)) { |
68 | diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c | 43 | GetPhysAddrResult s2 = {}; |
69 | index XXXXXXX..XXXXXXX 100644 | 44 | + uint64_t hcr; |
70 | --- a/hw/intc/armv7m_nvic.c | 45 | int ret; |
71 | +++ b/hw/intc/armv7m_nvic.c | 46 | |
72 | @@ -XXX,XX +XXX,XX @@ static const MemoryRegionOps nvic_systick_ops = { | 47 | ret = get_phys_addr_lpae(env, addr, MMU_DATA_LOAD, s2_mmu_idx, |
73 | .endianness = DEVICE_NATIVE_ENDIAN, | 48 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, |
74 | }; | 49 | fi->s1ns = !is_secure; |
75 | 50 | return ~0; | |
76 | +/* | 51 | } |
77 | + * Unassigned portions of the PPB space are RAZ/WI for privileged | 52 | - if ((arm_hcr_el2_eff(env) & HCR_PTW) && |
78 | + * accesses, and fault for non-privileged accesses. | 53 | - ptw_attrs_are_device(env, s2.cacheattrs)) { |
79 | + */ | ||
80 | +static MemTxResult ppb_default_read(void *opaque, hwaddr addr, | ||
81 | + uint64_t *data, unsigned size, | ||
82 | + MemTxAttrs attrs) | ||
83 | +{ | ||
84 | + qemu_log_mask(LOG_UNIMP, "Read of unassigned area of PPB: offset 0x%x\n", | ||
85 | + (uint32_t)addr); | ||
86 | + if (attrs.user) { | ||
87 | + return MEMTX_ERROR; | ||
88 | + } | ||
89 | + *data = 0; | ||
90 | + return MEMTX_OK; | ||
91 | +} | ||
92 | + | 54 | + |
93 | +static MemTxResult ppb_default_write(void *opaque, hwaddr addr, | 55 | + hcr = arm_hcr_el2_eff(env); |
94 | + uint64_t value, unsigned size, | 56 | + if ((hcr & HCR_PTW) && ptw_attrs_are_device(hcr, s2.cacheattrs)) { |
95 | + MemTxAttrs attrs) | 57 | /* |
96 | +{ | 58 | * PTW set and S1 walk touched S2 Device memory: |
97 | + qemu_log_mask(LOG_UNIMP, "Write of unassigned area of PPB: offset 0x%x\n", | 59 | * generate Permission fault. |
98 | + (uint32_t)addr); | 60 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav8(CPUARMState *env, uint32_t address, |
99 | + if (attrs.user) { | 61 | * ref: shared/translation/attrs/S2AttrDecode() |
100 | + return MEMTX_ERROR; | 62 | * .../S2ConvertAttrsHints() |
101 | + } | 63 | */ |
102 | + return MEMTX_OK; | 64 | -static uint8_t convert_stage2_attrs(CPUARMState *env, uint8_t s2attrs) |
103 | +} | 65 | +static uint8_t convert_stage2_attrs(uint64_t hcr, uint8_t s2attrs) |
104 | + | ||
105 | +static const MemoryRegionOps ppb_default_ops = { | ||
106 | + .read_with_attrs = ppb_default_read, | ||
107 | + .write_with_attrs = ppb_default_write, | ||
108 | + .endianness = DEVICE_NATIVE_ENDIAN, | ||
109 | + .valid.min_access_size = 1, | ||
110 | + .valid.max_access_size = 8, | ||
111 | +}; | ||
112 | + | ||
113 | static int nvic_post_load(void *opaque, int version_id) | ||
114 | { | 66 | { |
115 | NVICState *s = opaque; | 67 | uint8_t hiattr = extract32(s2attrs, 2, 2); |
116 | @@ -XXX,XX +XXX,XX @@ static void nvic_systick_trigger(void *opaque, int n, int level) | 68 | uint8_t loattr = extract32(s2attrs, 0, 2); |
117 | static void armv7m_nvic_realize(DeviceState *dev, Error **errp) | 69 | uint8_t hihint = 0, lohint = 0; |
70 | |||
71 | if (hiattr != 0) { /* normal memory */ | ||
72 | - if (arm_hcr_el2_eff(env) & HCR_CD) { /* cache disabled */ | ||
73 | + if (hcr & HCR_CD) { /* cache disabled */ | ||
74 | hiattr = loattr = 1; /* non-cacheable */ | ||
75 | } else { | ||
76 | if (hiattr != 1) { /* Write-through or write-back */ | ||
77 | @@ -XXX,XX +XXX,XX @@ static uint8_t combine_cacheattr_nibble(uint8_t s1, uint8_t s2) | ||
78 | * s1 and s2 for the HCR_EL2.FWB == 0 case, returning the | ||
79 | * combined attributes in MAIR_EL1 format. | ||
80 | */ | ||
81 | -static uint8_t combined_attrs_nofwb(CPUARMState *env, | ||
82 | +static uint8_t combined_attrs_nofwb(uint64_t hcr, | ||
83 | ARMCacheAttrs s1, ARMCacheAttrs s2) | ||
118 | { | 84 | { |
119 | NVICState *s = NVIC(dev); | 85 | uint8_t s1lo, s2lo, s1hi, s2hi, s2_mair_attrs, ret_attrs; |
120 | - int regionlen; | 86 | |
121 | 87 | - s2_mair_attrs = convert_stage2_attrs(env, s2.attrs); | |
122 | /* The armv7m container object will have set our CPU pointer */ | 88 | + s2_mair_attrs = convert_stage2_attrs(hcr, s2.attrs); |
123 | if (!s->cpu || !arm_feature(&s->cpu->env, ARM_FEATURE_M)) { | 89 | |
124 | @@ -XXX,XX +XXX,XX @@ static void armv7m_nvic_realize(DeviceState *dev, Error **errp) | 90 | s1lo = extract32(s1.attrs, 0, 4); |
125 | M_REG_S)); | 91 | s2lo = extract32(s2_mair_attrs, 0, 4); |
92 | @@ -XXX,XX +XXX,XX @@ static uint8_t combined_attrs_fwb(ARMCacheAttrs s1, ARMCacheAttrs s2) | ||
93 | * @s1: Attributes from stage 1 walk | ||
94 | * @s2: Attributes from stage 2 walk | ||
95 | */ | ||
96 | -static ARMCacheAttrs combine_cacheattrs(CPUARMState *env, | ||
97 | +static ARMCacheAttrs combine_cacheattrs(uint64_t hcr, | ||
98 | ARMCacheAttrs s1, ARMCacheAttrs s2) | ||
99 | { | ||
100 | ARMCacheAttrs ret; | ||
101 | @@ -XXX,XX +XXX,XX @@ static ARMCacheAttrs combine_cacheattrs(CPUARMState *env, | ||
126 | } | 102 | } |
127 | 103 | ||
128 | - /* The NVIC and System Control Space (SCS) starts at 0xe000e000 | 104 | /* Combine memory type and cacheability attributes */ |
129 | + /* | 105 | - if (arm_hcr_el2_eff(env) & HCR_FWB) { |
130 | + * This device provides a single sysbus memory region which | 106 | + if (hcr & HCR_FWB) { |
131 | + * represents the whole of the "System PPB" space. This is the | 107 | ret.attrs = combined_attrs_fwb(s1, s2); |
132 | + * range from 0xe0000000 to 0xe00fffff and includes the NVIC, | 108 | } else { |
133 | + * the System Control Space (system registers), the systick timer, | 109 | - ret.attrs = combined_attrs_nofwb(env, s1, s2); |
134 | + * and for CPUs with the Security extension an NS banked version | 110 | + ret.attrs = combined_attrs_nofwb(hcr, s1, s2); |
135 | + * of all of these. | ||
136 | + * | ||
137 | + * The default behaviour for unimplemented registers/ranges | ||
138 | + * (for instance the Data Watchpoint and Trace unit at 0xe0001000) | ||
139 | + * is to RAZ/WI for privileged access and BusFault for non-privileged | ||
140 | + * access. | ||
141 | + * | ||
142 | + * The NVIC and System Control Space (SCS) starts at 0xe000e000 | ||
143 | * and looks like this: | ||
144 | * 0x004 - ICTR | ||
145 | * 0x010 - 0xff - systick | ||
146 | @@ -XXX,XX +XXX,XX @@ static void armv7m_nvic_realize(DeviceState *dev, Error **errp) | ||
147 | * generally code determining which banked register to use should | ||
148 | * use attrs.secure; code determining actual behaviour of the system | ||
149 | * should use env->v7m.secure. | ||
150 | + * | ||
151 | + * The container covers the whole PPB space. Within it the priority | ||
152 | + * of overlapping regions is: | ||
153 | + * - default region (for RAZ/WI and BusFault) : -1 | ||
154 | + * - system register regions : 0 | ||
155 | + * - systick : 1 | ||
156 | + * This is because the systick device is a small block of registers | ||
157 | + * in the middle of the other system control registers. | ||
158 | */ | ||
159 | - regionlen = arm_feature(&s->cpu->env, ARM_FEATURE_V8) ? 0x21000 : 0x1000; | ||
160 | - memory_region_init(&s->container, OBJECT(s), "nvic", regionlen); | ||
161 | - /* The system register region goes at the bottom of the priority | ||
162 | - * stack as it covers the whole page. | ||
163 | - */ | ||
164 | + memory_region_init(&s->container, OBJECT(s), "nvic", 0x100000); | ||
165 | + memory_region_init_io(&s->defaultmem, OBJECT(s), &ppb_default_ops, s, | ||
166 | + "nvic-default", 0x100000); | ||
167 | + memory_region_add_subregion_overlap(&s->container, 0, &s->defaultmem, -1); | ||
168 | memory_region_init_io(&s->sysregmem, OBJECT(s), &nvic_sysreg_ops, s, | ||
169 | "nvic_sysregs", 0x1000); | ||
170 | - memory_region_add_subregion(&s->container, 0, &s->sysregmem); | ||
171 | + memory_region_add_subregion(&s->container, 0xe000, &s->sysregmem); | ||
172 | |||
173 | memory_region_init_io(&s->systickmem, OBJECT(s), | ||
174 | &nvic_systick_ops, s, | ||
175 | "nvic_systick", 0xe0); | ||
176 | |||
177 | - memory_region_add_subregion_overlap(&s->container, 0x10, | ||
178 | + memory_region_add_subregion_overlap(&s->container, 0xe010, | ||
179 | &s->systickmem, 1); | ||
180 | |||
181 | if (arm_feature(&s->cpu->env, ARM_FEATURE_V8)) { | ||
182 | memory_region_init_io(&s->sysreg_ns_mem, OBJECT(s), | ||
183 | &nvic_sysreg_ns_ops, &s->sysregmem, | ||
184 | "nvic_sysregs_ns", 0x1000); | ||
185 | - memory_region_add_subregion(&s->container, 0x20000, &s->sysreg_ns_mem); | ||
186 | + memory_region_add_subregion(&s->container, 0x2e000, &s->sysreg_ns_mem); | ||
187 | memory_region_init_io(&s->systick_ns_mem, OBJECT(s), | ||
188 | &nvic_sysreg_ns_ops, &s->systickmem, | ||
189 | "nvic_systick_ns", 0xe0); | ||
190 | - memory_region_add_subregion_overlap(&s->container, 0x20010, | ||
191 | + memory_region_add_subregion_overlap(&s->container, 0x2e010, | ||
192 | &s->systick_ns_mem, 1); | ||
193 | } | 111 | } |
194 | 112 | ||
113 | /* | ||
114 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr_with_secure(CPUARMState *env, target_ulong address, | ||
115 | ARMCacheAttrs cacheattrs1; | ||
116 | ARMMMUIdx s2_mmu_idx; | ||
117 | bool is_el0; | ||
118 | + uint64_t hcr; | ||
119 | |||
120 | ret = get_phys_addr_with_secure(env, address, access_type, | ||
121 | s1_mmu_idx, is_secure, result, fi); | ||
122 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr_with_secure(CPUARMState *env, target_ulong address, | ||
123 | } | ||
124 | |||
125 | /* Combine the S1 and S2 cache attributes. */ | ||
126 | - if (arm_hcr_el2_eff(env) & HCR_DC) { | ||
127 | + hcr = arm_hcr_el2_eff(env); | ||
128 | + if (hcr & HCR_DC) { | ||
129 | /* | ||
130 | * HCR.DC forces the first stage attributes to | ||
131 | * Normal Non-Shareable, | ||
132 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr_with_secure(CPUARMState *env, target_ulong address, | ||
133 | } | ||
134 | cacheattrs1.shareability = 0; | ||
135 | } | ||
136 | - result->cacheattrs = combine_cacheattrs(env, cacheattrs1, | ||
137 | + result->cacheattrs = combine_cacheattrs(hcr, cacheattrs1, | ||
138 | result->cacheattrs); | ||
139 | |||
140 | /* | ||
195 | -- | 141 | -- |
196 | 2.20.1 | 142 | 2.25.1 |
197 | |||
198 | diff view generated by jsdifflib |
1 | In arm_cpu_realizefn() we check whether the board code disabled EL3 | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | via the has_el3 CPU object property, which we create if the CPU | ||
3 | starts with the ARM_FEATURE_EL3 feature bit. If it is disabled, then | ||
4 | we turn off ARM_FEATURE_EL3 and also zero out the relevant fields in | ||
5 | the ID_PFR1 and ID_AA64PFR0 registers. | ||
6 | 2 | ||
7 | This codepath was incorrectly being taken for M-profile CPUs, which | 3 | Use arm_hcr_el2_eff_secstate instead of arm_hcr_el2_eff, so |
8 | do not have an EL3 and don't set ARM_FEATURE_EL3, but which may have | 4 | that we use is_secure instead of the current security state. |
9 | the M-profile Security extension and so should have non-zero values | 5 | These AT* operations have been broken since arm_hcr_el2_eff |
10 | in the ID_PFR1.Security field. | 6 | gained a check for "el2 enabled" for Secure EL2. |
11 | 7 | ||
12 | Restrict the handling of the feature flag to A/R-profile cores. | 8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
9 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
10 | Message-id: 20221001162318.153420-18-richard.henderson@linaro.org | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | --- | ||
13 | target/arm/ptw.c | 8 ++++---- | ||
14 | 1 file changed, 4 insertions(+), 4 deletions(-) | ||
13 | 15 | ||
14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 16 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c |
15 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
16 | Message-id: 20201119215617.29887-4-peter.maydell@linaro.org | ||
17 | --- | ||
18 | target/arm/cpu.c | 2 +- | ||
19 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
20 | |||
21 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | ||
22 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
23 | --- a/target/arm/cpu.c | 18 | --- a/target/arm/ptw.c |
24 | +++ b/target/arm/cpu.c | 19 | +++ b/target/arm/ptw.c |
25 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_realizefn(DeviceState *dev, Error **errp) | 20 | @@ -XXX,XX +XXX,XX @@ static bool regime_translation_disabled(CPUARMState *env, ARMMMUIdx mmu_idx, |
26 | } | 21 | } |
27 | } | 22 | } |
28 | 23 | ||
29 | - if (!cpu->has_el3) { | 24 | - hcr_el2 = arm_hcr_el2_eff(env); |
30 | + if (!arm_feature(env, ARM_FEATURE_M) && !cpu->has_el3) { | 25 | + hcr_el2 = arm_hcr_el2_eff_secstate(env, is_secure); |
31 | /* If the has_el3 CPU property is disabled then we need to disable the | 26 | |
32 | * feature. | 27 | switch (mmu_idx) { |
33 | */ | 28 | case ARMMMUIdx_Stage2: |
29 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
30 | return ~0; | ||
31 | } | ||
32 | |||
33 | - hcr = arm_hcr_el2_eff(env); | ||
34 | + hcr = arm_hcr_el2_eff_secstate(env, is_secure); | ||
35 | if ((hcr & HCR_PTW) && ptw_attrs_are_device(hcr, s2.cacheattrs)) { | ||
36 | /* | ||
37 | * PTW set and S1 walk touched S2 Device memory: | ||
38 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr_with_secure(CPUARMState *env, target_ulong address, | ||
39 | } | ||
40 | |||
41 | /* Combine the S1 and S2 cache attributes. */ | ||
42 | - hcr = arm_hcr_el2_eff(env); | ||
43 | + hcr = arm_hcr_el2_eff_secstate(env, is_secure); | ||
44 | if (hcr & HCR_DC) { | ||
45 | /* | ||
46 | * HCR.DC forces the first stage attributes to | ||
47 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr_with_secure(CPUARMState *env, target_ulong address, | ||
48 | result->page_size = TARGET_PAGE_SIZE; | ||
49 | |||
50 | /* Fill in cacheattr a-la AArch64.TranslateAddressS1Off. */ | ||
51 | - hcr = arm_hcr_el2_eff(env); | ||
52 | + hcr = arm_hcr_el2_eff_secstate(env, is_secure); | ||
53 | result->cacheattrs.shareability = 0; | ||
54 | result->cacheattrs.is_s2_format = false; | ||
55 | if (hcr & HCR_DC) { | ||
34 | -- | 56 | -- |
35 | 2.20.1 | 57 | 2.25.1 |
36 | |||
37 | diff view generated by jsdifflib |
1 | From: Vikram Garhwal <fnu.vikram@xilinx.com> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | The Xilinx ZynqMP CAN controller is developed based on SocketCAN, QEMU CAN bus | ||
4 | implementation. Bus connection and socketCAN connection for each CAN module | ||
5 | can be set through command lines. | ||
6 | |||
7 | Example for using single CAN: | ||
8 | -object can-bus,id=canbus0 \ | ||
9 | -machine xlnx-zcu102.canbus0=canbus0 \ | ||
10 | -object can-host-socketcan,id=socketcan0,if=vcan0,canbus=canbus0 | ||
11 | |||
12 | Example for connecting both CAN to same virtual CAN on host machine: | ||
13 | -object can-bus,id=canbus0 -object can-bus,id=canbus1 \ | ||
14 | -machine xlnx-zcu102.canbus0=canbus0 \ | ||
15 | -machine xlnx-zcu102.canbus1=canbus1 \ | ||
16 | -object can-host-socketcan,id=socketcan0,if=vcan0,canbus=canbus0 \ | ||
17 | -object can-host-socketcan,id=socketcan1,if=vcan0,canbus=canbus1 | ||
18 | |||
19 | To create virtual CAN on the host machine, please check the QEMU CAN docs: | ||
20 | https://github.com/qemu/qemu/blob/master/docs/can.txt | ||
21 | |||
22 | Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com> | ||
23 | Message-id: 1605728926-352690-2-git-send-email-fnu.vikram@xilinx.com | ||
24 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 3 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
4 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
5 | Message-id: 20221001162318.153420-19-richard.henderson@linaro.org | ||
25 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
26 | --- | 7 | --- |
27 | meson.build | 1 + | 8 | target/arm/ptw.c | 138 +++++++++++++++++++++++++---------------------- |
28 | hw/net/can/trace.h | 1 + | 9 | 1 file changed, 74 insertions(+), 64 deletions(-) |
29 | include/hw/net/xlnx-zynqmp-can.h | 78 ++ | ||
30 | hw/net/can/xlnx-zynqmp-can.c | 1161 ++++++++++++++++++++++++++++++ | ||
31 | hw/Kconfig | 1 + | ||
32 | hw/net/can/meson.build | 1 + | ||
33 | hw/net/can/trace-events | 9 + | ||
34 | 7 files changed, 1252 insertions(+) | ||
35 | create mode 100644 hw/net/can/trace.h | ||
36 | create mode 100644 include/hw/net/xlnx-zynqmp-can.h | ||
37 | create mode 100644 hw/net/can/xlnx-zynqmp-can.c | ||
38 | create mode 100644 hw/net/can/trace-events | ||
39 | 10 | ||
40 | diff --git a/meson.build b/meson.build | 11 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c |
41 | index XXXXXXX..XXXXXXX 100644 | 12 | index XXXXXXX..XXXXXXX 100644 |
42 | --- a/meson.build | 13 | --- a/target/arm/ptw.c |
43 | +++ b/meson.build | 14 | +++ b/target/arm/ptw.c |
44 | @@ -XXX,XX +XXX,XX @@ if have_system | 15 | @@ -XXX,XX +XXX,XX @@ static ARMCacheAttrs combine_cacheattrs(uint64_t hcr, |
45 | 'hw/misc', | 16 | return ret; |
46 | 'hw/misc/macio', | 17 | } |
47 | 'hw/net', | 18 | |
48 | + 'hw/net/can', | ||
49 | 'hw/nvram', | ||
50 | 'hw/pci', | ||
51 | 'hw/pci-host', | ||
52 | diff --git a/hw/net/can/trace.h b/hw/net/can/trace.h | ||
53 | new file mode 100644 | ||
54 | index XXXXXXX..XXXXXXX | ||
55 | --- /dev/null | ||
56 | +++ b/hw/net/can/trace.h | ||
57 | @@ -0,0 +1 @@ | ||
58 | +#include "trace/trace-hw_net_can.h" | ||
59 | diff --git a/include/hw/net/xlnx-zynqmp-can.h b/include/hw/net/xlnx-zynqmp-can.h | ||
60 | new file mode 100644 | ||
61 | index XXXXXXX..XXXXXXX | ||
62 | --- /dev/null | ||
63 | +++ b/include/hw/net/xlnx-zynqmp-can.h | ||
64 | @@ -XXX,XX +XXX,XX @@ | ||
65 | +/* | 19 | +/* |
66 | + * QEMU model of the Xilinx ZynqMP CAN controller. | 20 | + * MMU disabled. S1 addresses within aa64 translation regimes are |
67 | + * | 21 | + * still checked for bounds -- see AArch64.S1DisabledOutput(). |
68 | + * Copyright (c) 2020 Xilinx Inc. | ||
69 | + * | ||
70 | + * Written-by: Vikram Garhwal<fnu.vikram@xilinx.com> | ||
71 | + * | ||
72 | + * Based on QEMU CAN Device emulation implemented by Jin Yang, Deniz Eren and | ||
73 | + * Pavel Pisa. | ||
74 | + * | ||
75 | + * Permission is hereby granted, free of charge, to any person obtaining a copy | ||
76 | + * of this software and associated documentation files (the "Software"), to deal | ||
77 | + * in the Software without restriction, including without limitation the rights | ||
78 | + * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | ||
79 | + * copies of the Software, and to permit persons to whom the Software is | ||
80 | + * furnished to do so, subject to the following conditions: | ||
81 | + * | ||
82 | + * The above copyright notice and this permission notice shall be included in | ||
83 | + * all copies or substantial portions of the Software. | ||
84 | + * | ||
85 | + * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | ||
86 | + * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | ||
87 | + * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL | ||
88 | + * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | ||
89 | + * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | ||
90 | + * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN | ||
91 | + * THE SOFTWARE. | ||
92 | + */ | 22 | + */ |
23 | +static bool get_phys_addr_disabled(CPUARMState *env, target_ulong address, | ||
24 | + MMUAccessType access_type, | ||
25 | + ARMMMUIdx mmu_idx, bool is_secure, | ||
26 | + GetPhysAddrResult *result, | ||
27 | + ARMMMUFaultInfo *fi) | ||
28 | +{ | ||
29 | + uint64_t hcr; | ||
30 | + uint8_t memattr; | ||
93 | + | 31 | + |
94 | +#ifndef XLNX_ZYNQMP_CAN_H | 32 | + if (mmu_idx != ARMMMUIdx_Stage2 && mmu_idx != ARMMMUIdx_Stage2_S) { |
95 | +#define XLNX_ZYNQMP_CAN_H | 33 | + int r_el = regime_el(env, mmu_idx); |
34 | + if (arm_el_is_aa64(env, r_el)) { | ||
35 | + int pamax = arm_pamax(env_archcpu(env)); | ||
36 | + uint64_t tcr = env->cp15.tcr_el[r_el]; | ||
37 | + int addrtop, tbi; | ||
96 | + | 38 | + |
97 | +#include "hw/register.h" | 39 | + tbi = aa64_va_parameter_tbi(tcr, mmu_idx); |
98 | +#include "net/can_emu.h" | 40 | + if (access_type == MMU_INST_FETCH) { |
99 | +#include "net/can_host.h" | 41 | + tbi &= ~aa64_va_parameter_tbid(tcr, mmu_idx); |
100 | +#include "qemu/fifo32.h" | 42 | + } |
101 | +#include "hw/ptimer.h" | 43 | + tbi = (tbi >> extract64(address, 55, 1)) & 1; |
102 | +#include "hw/qdev-clock.h" | 44 | + addrtop = (tbi ? 55 : 63); |
103 | + | 45 | + |
104 | +#define TYPE_XLNX_ZYNQMP_CAN "xlnx.zynqmp-can" | 46 | + if (extract64(address, pamax, addrtop - pamax + 1) != 0) { |
47 | + fi->type = ARMFault_AddressSize; | ||
48 | + fi->level = 0; | ||
49 | + fi->stage2 = false; | ||
50 | + return 1; | ||
51 | + } | ||
105 | + | 52 | + |
106 | +#define XLNX_ZYNQMP_CAN(obj) \ | 53 | + /* |
107 | + OBJECT_CHECK(XlnxZynqMPCANState, (obj), TYPE_XLNX_ZYNQMP_CAN) | 54 | + * When TBI is disabled, we've just validated that all of the |
108 | + | 55 | + * bits above PAMax are zero, so logically we only need to |
109 | +#define MAX_CAN_CTRLS 2 | 56 | + * clear the top byte for TBI. But it's clearer to follow |
110 | +#define XLNX_ZYNQMP_CAN_R_MAX (0x84 / 4) | 57 | + * the pseudocode set of addrdesc.paddress. |
111 | +#define MAILBOX_CAPACITY 64 | 58 | + */ |
112 | +#define CAN_TIMER_MAX 0XFFFFUL | 59 | + address = extract64(address, 0, 52); |
113 | +#define CAN_DEFAULT_CLOCK (24 * 1000 * 1000) | 60 | + } |
114 | + | ||
115 | +/* Each CAN_FRAME will have 4 * 32bit size. */ | ||
116 | +#define CAN_FRAME_SIZE 4 | ||
117 | +#define RXFIFO_SIZE (MAILBOX_CAPACITY * CAN_FRAME_SIZE) | ||
118 | + | ||
119 | +typedef struct XlnxZynqMPCANState { | ||
120 | + SysBusDevice parent_obj; | ||
121 | + MemoryRegion iomem; | ||
122 | + | ||
123 | + qemu_irq irq; | ||
124 | + | ||
125 | + CanBusClientState bus_client; | ||
126 | + CanBusState *canbus; | ||
127 | + | ||
128 | + struct { | ||
129 | + uint32_t ext_clk_freq; | ||
130 | + } cfg; | ||
131 | + | ||
132 | + RegisterInfo reg_info[XLNX_ZYNQMP_CAN_R_MAX]; | ||
133 | + uint32_t regs[XLNX_ZYNQMP_CAN_R_MAX]; | ||
134 | + | ||
135 | + Fifo32 rx_fifo; | ||
136 | + Fifo32 tx_fifo; | ||
137 | + Fifo32 txhpb_fifo; | ||
138 | + | ||
139 | + ptimer_state *can_timer; | ||
140 | +} XlnxZynqMPCANState; | ||
141 | + | ||
142 | +#endif | ||
143 | diff --git a/hw/net/can/xlnx-zynqmp-can.c b/hw/net/can/xlnx-zynqmp-can.c | ||
144 | new file mode 100644 | ||
145 | index XXXXXXX..XXXXXXX | ||
146 | --- /dev/null | ||
147 | +++ b/hw/net/can/xlnx-zynqmp-can.c | ||
148 | @@ -XXX,XX +XXX,XX @@ | ||
149 | +/* | ||
150 | + * QEMU model of the Xilinx ZynqMP CAN controller. | ||
151 | + * This implementation is based on the following datasheet: | ||
152 | + * https://www.xilinx.com/support/documentation/user_guides/ug1085-zynq-ultrascale-trm.pdf | ||
153 | + * | ||
154 | + * Copyright (c) 2020 Xilinx Inc. | ||
155 | + * | ||
156 | + * Written-by: Vikram Garhwal<fnu.vikram@xilinx.com> | ||
157 | + * | ||
158 | + * Based on QEMU CAN Device emulation implemented by Jin Yang, Deniz Eren and | ||
159 | + * Pavel Pisa | ||
160 | + * | ||
161 | + * Permission is hereby granted, free of charge, to any person obtaining a copy | ||
162 | + * of this software and associated documentation files (the "Software"), to deal | ||
163 | + * in the Software without restriction, including without limitation the rights | ||
164 | + * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | ||
165 | + * copies of the Software, and to permit persons to whom the Software is | ||
166 | + * furnished to do so, subject to the following conditions: | ||
167 | + * | ||
168 | + * The above copyright notice and this permission notice shall be included in | ||
169 | + * all copies or substantial portions of the Software. | ||
170 | + * | ||
171 | + * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | ||
172 | + * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | ||
173 | + * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL | ||
174 | + * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | ||
175 | + * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | ||
176 | + * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN | ||
177 | + * THE SOFTWARE. | ||
178 | + */ | ||
179 | + | ||
180 | +#include "qemu/osdep.h" | ||
181 | +#include "hw/sysbus.h" | ||
182 | +#include "hw/register.h" | ||
183 | +#include "hw/irq.h" | ||
184 | +#include "qapi/error.h" | ||
185 | +#include "qemu/bitops.h" | ||
186 | +#include "qemu/log.h" | ||
187 | +#include "qemu/cutils.h" | ||
188 | +#include "sysemu/sysemu.h" | ||
189 | +#include "migration/vmstate.h" | ||
190 | +#include "hw/qdev-properties.h" | ||
191 | +#include "net/can_emu.h" | ||
192 | +#include "net/can_host.h" | ||
193 | +#include "qemu/event_notifier.h" | ||
194 | +#include "qom/object_interfaces.h" | ||
195 | +#include "hw/net/xlnx-zynqmp-can.h" | ||
196 | +#include "trace.h" | ||
197 | + | ||
198 | +#ifndef XLNX_ZYNQMP_CAN_ERR_DEBUG | ||
199 | +#define XLNX_ZYNQMP_CAN_ERR_DEBUG 0 | ||
200 | +#endif | ||
201 | + | ||
202 | +#define MAX_DLC 8 | ||
203 | +#undef ERROR | ||
204 | + | ||
205 | +REG32(SOFTWARE_RESET_REGISTER, 0x0) | ||
206 | + FIELD(SOFTWARE_RESET_REGISTER, CEN, 1, 1) | ||
207 | + FIELD(SOFTWARE_RESET_REGISTER, SRST, 0, 1) | ||
208 | +REG32(MODE_SELECT_REGISTER, 0x4) | ||
209 | + FIELD(MODE_SELECT_REGISTER, SNOOP, 2, 1) | ||
210 | + FIELD(MODE_SELECT_REGISTER, LBACK, 1, 1) | ||
211 | + FIELD(MODE_SELECT_REGISTER, SLEEP, 0, 1) | ||
212 | +REG32(ARBITRATION_PHASE_BAUD_RATE_PRESCALER_REGISTER, 0x8) | ||
213 | + FIELD(ARBITRATION_PHASE_BAUD_RATE_PRESCALER_REGISTER, BRP, 0, 8) | ||
214 | +REG32(ARBITRATION_PHASE_BIT_TIMING_REGISTER, 0xc) | ||
215 | + FIELD(ARBITRATION_PHASE_BIT_TIMING_REGISTER, SJW, 7, 2) | ||
216 | + FIELD(ARBITRATION_PHASE_BIT_TIMING_REGISTER, TS2, 4, 3) | ||
217 | + FIELD(ARBITRATION_PHASE_BIT_TIMING_REGISTER, TS1, 0, 4) | ||
218 | +REG32(ERROR_COUNTER_REGISTER, 0x10) | ||
219 | + FIELD(ERROR_COUNTER_REGISTER, REC, 8, 8) | ||
220 | + FIELD(ERROR_COUNTER_REGISTER, TEC, 0, 8) | ||
221 | +REG32(ERROR_STATUS_REGISTER, 0x14) | ||
222 | + FIELD(ERROR_STATUS_REGISTER, ACKER, 4, 1) | ||
223 | + FIELD(ERROR_STATUS_REGISTER, BERR, 3, 1) | ||
224 | + FIELD(ERROR_STATUS_REGISTER, STER, 2, 1) | ||
225 | + FIELD(ERROR_STATUS_REGISTER, FMER, 1, 1) | ||
226 | + FIELD(ERROR_STATUS_REGISTER, CRCER, 0, 1) | ||
227 | +REG32(STATUS_REGISTER, 0x18) | ||
228 | + FIELD(STATUS_REGISTER, SNOOP, 12, 1) | ||
229 | + FIELD(STATUS_REGISTER, ACFBSY, 11, 1) | ||
230 | + FIELD(STATUS_REGISTER, TXFLL, 10, 1) | ||
231 | + FIELD(STATUS_REGISTER, TXBFLL, 9, 1) | ||
232 | + FIELD(STATUS_REGISTER, ESTAT, 7, 2) | ||
233 | + FIELD(STATUS_REGISTER, ERRWRN, 6, 1) | ||
234 | + FIELD(STATUS_REGISTER, BBSY, 5, 1) | ||
235 | + FIELD(STATUS_REGISTER, BIDLE, 4, 1) | ||
236 | + FIELD(STATUS_REGISTER, NORMAL, 3, 1) | ||
237 | + FIELD(STATUS_REGISTER, SLEEP, 2, 1) | ||
238 | + FIELD(STATUS_REGISTER, LBACK, 1, 1) | ||
239 | + FIELD(STATUS_REGISTER, CONFIG, 0, 1) | ||
240 | +REG32(INTERRUPT_STATUS_REGISTER, 0x1c) | ||
241 | + FIELD(INTERRUPT_STATUS_REGISTER, TXFEMP, 14, 1) | ||
242 | + FIELD(INTERRUPT_STATUS_REGISTER, TXFWMEMP, 13, 1) | ||
243 | + FIELD(INTERRUPT_STATUS_REGISTER, RXFWMFLL, 12, 1) | ||
244 | + FIELD(INTERRUPT_STATUS_REGISTER, WKUP, 11, 1) | ||
245 | + FIELD(INTERRUPT_STATUS_REGISTER, SLP, 10, 1) | ||
246 | + FIELD(INTERRUPT_STATUS_REGISTER, BSOFF, 9, 1) | ||
247 | + FIELD(INTERRUPT_STATUS_REGISTER, ERROR, 8, 1) | ||
248 | + FIELD(INTERRUPT_STATUS_REGISTER, RXNEMP, 7, 1) | ||
249 | + FIELD(INTERRUPT_STATUS_REGISTER, RXOFLW, 6, 1) | ||
250 | + FIELD(INTERRUPT_STATUS_REGISTER, RXUFLW, 5, 1) | ||
251 | + FIELD(INTERRUPT_STATUS_REGISTER, RXOK, 4, 1) | ||
252 | + FIELD(INTERRUPT_STATUS_REGISTER, TXBFLL, 3, 1) | ||
253 | + FIELD(INTERRUPT_STATUS_REGISTER, TXFLL, 2, 1) | ||
254 | + FIELD(INTERRUPT_STATUS_REGISTER, TXOK, 1, 1) | ||
255 | + FIELD(INTERRUPT_STATUS_REGISTER, ARBLST, 0, 1) | ||
256 | +REG32(INTERRUPT_ENABLE_REGISTER, 0x20) | ||
257 | + FIELD(INTERRUPT_ENABLE_REGISTER, ETXFEMP, 14, 1) | ||
258 | + FIELD(INTERRUPT_ENABLE_REGISTER, ETXFWMEMP, 13, 1) | ||
259 | + FIELD(INTERRUPT_ENABLE_REGISTER, ERXFWMFLL, 12, 1) | ||
260 | + FIELD(INTERRUPT_ENABLE_REGISTER, EWKUP, 11, 1) | ||
261 | + FIELD(INTERRUPT_ENABLE_REGISTER, ESLP, 10, 1) | ||
262 | + FIELD(INTERRUPT_ENABLE_REGISTER, EBSOFF, 9, 1) | ||
263 | + FIELD(INTERRUPT_ENABLE_REGISTER, EERROR, 8, 1) | ||
264 | + FIELD(INTERRUPT_ENABLE_REGISTER, ERXNEMP, 7, 1) | ||
265 | + FIELD(INTERRUPT_ENABLE_REGISTER, ERXOFLW, 6, 1) | ||
266 | + FIELD(INTERRUPT_ENABLE_REGISTER, ERXUFLW, 5, 1) | ||
267 | + FIELD(INTERRUPT_ENABLE_REGISTER, ERXOK, 4, 1) | ||
268 | + FIELD(INTERRUPT_ENABLE_REGISTER, ETXBFLL, 3, 1) | ||
269 | + FIELD(INTERRUPT_ENABLE_REGISTER, ETXFLL, 2, 1) | ||
270 | + FIELD(INTERRUPT_ENABLE_REGISTER, ETXOK, 1, 1) | ||
271 | + FIELD(INTERRUPT_ENABLE_REGISTER, EARBLST, 0, 1) | ||
272 | +REG32(INTERRUPT_CLEAR_REGISTER, 0x24) | ||
273 | + FIELD(INTERRUPT_CLEAR_REGISTER, CTXFEMP, 14, 1) | ||
274 | + FIELD(INTERRUPT_CLEAR_REGISTER, CTXFWMEMP, 13, 1) | ||
275 | + FIELD(INTERRUPT_CLEAR_REGISTER, CRXFWMFLL, 12, 1) | ||
276 | + FIELD(INTERRUPT_CLEAR_REGISTER, CWKUP, 11, 1) | ||
277 | + FIELD(INTERRUPT_CLEAR_REGISTER, CSLP, 10, 1) | ||
278 | + FIELD(INTERRUPT_CLEAR_REGISTER, CBSOFF, 9, 1) | ||
279 | + FIELD(INTERRUPT_CLEAR_REGISTER, CERROR, 8, 1) | ||
280 | + FIELD(INTERRUPT_CLEAR_REGISTER, CRXNEMP, 7, 1) | ||
281 | + FIELD(INTERRUPT_CLEAR_REGISTER, CRXOFLW, 6, 1) | ||
282 | + FIELD(INTERRUPT_CLEAR_REGISTER, CRXUFLW, 5, 1) | ||
283 | + FIELD(INTERRUPT_CLEAR_REGISTER, CRXOK, 4, 1) | ||
284 | + FIELD(INTERRUPT_CLEAR_REGISTER, CTXBFLL, 3, 1) | ||
285 | + FIELD(INTERRUPT_CLEAR_REGISTER, CTXFLL, 2, 1) | ||
286 | + FIELD(INTERRUPT_CLEAR_REGISTER, CTXOK, 1, 1) | ||
287 | + FIELD(INTERRUPT_CLEAR_REGISTER, CARBLST, 0, 1) | ||
288 | +REG32(TIMESTAMP_REGISTER, 0x28) | ||
289 | + FIELD(TIMESTAMP_REGISTER, CTS, 0, 1) | ||
290 | +REG32(WIR, 0x2c) | ||
291 | + FIELD(WIR, EW, 8, 8) | ||
292 | + FIELD(WIR, FW, 0, 8) | ||
293 | +REG32(TXFIFO_ID, 0x30) | ||
294 | + FIELD(TXFIFO_ID, IDH, 21, 11) | ||
295 | + FIELD(TXFIFO_ID, SRRRTR, 20, 1) | ||
296 | + FIELD(TXFIFO_ID, IDE, 19, 1) | ||
297 | + FIELD(TXFIFO_ID, IDL, 1, 18) | ||
298 | + FIELD(TXFIFO_ID, RTR, 0, 1) | ||
299 | +REG32(TXFIFO_DLC, 0x34) | ||
300 | + FIELD(TXFIFO_DLC, DLC, 28, 4) | ||
301 | +REG32(TXFIFO_DATA1, 0x38) | ||
302 | + FIELD(TXFIFO_DATA1, DB0, 24, 8) | ||
303 | + FIELD(TXFIFO_DATA1, DB1, 16, 8) | ||
304 | + FIELD(TXFIFO_DATA1, DB2, 8, 8) | ||
305 | + FIELD(TXFIFO_DATA1, DB3, 0, 8) | ||
306 | +REG32(TXFIFO_DATA2, 0x3c) | ||
307 | + FIELD(TXFIFO_DATA2, DB4, 24, 8) | ||
308 | + FIELD(TXFIFO_DATA2, DB5, 16, 8) | ||
309 | + FIELD(TXFIFO_DATA2, DB6, 8, 8) | ||
310 | + FIELD(TXFIFO_DATA2, DB7, 0, 8) | ||
311 | +REG32(TXHPB_ID, 0x40) | ||
312 | + FIELD(TXHPB_ID, IDH, 21, 11) | ||
313 | + FIELD(TXHPB_ID, SRRRTR, 20, 1) | ||
314 | + FIELD(TXHPB_ID, IDE, 19, 1) | ||
315 | + FIELD(TXHPB_ID, IDL, 1, 18) | ||
316 | + FIELD(TXHPB_ID, RTR, 0, 1) | ||
317 | +REG32(TXHPB_DLC, 0x44) | ||
318 | + FIELD(TXHPB_DLC, DLC, 28, 4) | ||
319 | +REG32(TXHPB_DATA1, 0x48) | ||
320 | + FIELD(TXHPB_DATA1, DB0, 24, 8) | ||
321 | + FIELD(TXHPB_DATA1, DB1, 16, 8) | ||
322 | + FIELD(TXHPB_DATA1, DB2, 8, 8) | ||
323 | + FIELD(TXHPB_DATA1, DB3, 0, 8) | ||
324 | +REG32(TXHPB_DATA2, 0x4c) | ||
325 | + FIELD(TXHPB_DATA2, DB4, 24, 8) | ||
326 | + FIELD(TXHPB_DATA2, DB5, 16, 8) | ||
327 | + FIELD(TXHPB_DATA2, DB6, 8, 8) | ||
328 | + FIELD(TXHPB_DATA2, DB7, 0, 8) | ||
329 | +REG32(RXFIFO_ID, 0x50) | ||
330 | + FIELD(RXFIFO_ID, IDH, 21, 11) | ||
331 | + FIELD(RXFIFO_ID, SRRRTR, 20, 1) | ||
332 | + FIELD(RXFIFO_ID, IDE, 19, 1) | ||
333 | + FIELD(RXFIFO_ID, IDL, 1, 18) | ||
334 | + FIELD(RXFIFO_ID, RTR, 0, 1) | ||
335 | +REG32(RXFIFO_DLC, 0x54) | ||
336 | + FIELD(RXFIFO_DLC, DLC, 28, 4) | ||
337 | + FIELD(RXFIFO_DLC, RXT, 0, 16) | ||
338 | +REG32(RXFIFO_DATA1, 0x58) | ||
339 | + FIELD(RXFIFO_DATA1, DB0, 24, 8) | ||
340 | + FIELD(RXFIFO_DATA1, DB1, 16, 8) | ||
341 | + FIELD(RXFIFO_DATA1, DB2, 8, 8) | ||
342 | + FIELD(RXFIFO_DATA1, DB3, 0, 8) | ||
343 | +REG32(RXFIFO_DATA2, 0x5c) | ||
344 | + FIELD(RXFIFO_DATA2, DB4, 24, 8) | ||
345 | + FIELD(RXFIFO_DATA2, DB5, 16, 8) | ||
346 | + FIELD(RXFIFO_DATA2, DB6, 8, 8) | ||
347 | + FIELD(RXFIFO_DATA2, DB7, 0, 8) | ||
348 | +REG32(AFR, 0x60) | ||
349 | + FIELD(AFR, UAF4, 3, 1) | ||
350 | + FIELD(AFR, UAF3, 2, 1) | ||
351 | + FIELD(AFR, UAF2, 1, 1) | ||
352 | + FIELD(AFR, UAF1, 0, 1) | ||
353 | +REG32(AFMR1, 0x64) | ||
354 | + FIELD(AFMR1, AMIDH, 21, 11) | ||
355 | + FIELD(AFMR1, AMSRR, 20, 1) | ||
356 | + FIELD(AFMR1, AMIDE, 19, 1) | ||
357 | + FIELD(AFMR1, AMIDL, 1, 18) | ||
358 | + FIELD(AFMR1, AMRTR, 0, 1) | ||
359 | +REG32(AFIR1, 0x68) | ||
360 | + FIELD(AFIR1, AIIDH, 21, 11) | ||
361 | + FIELD(AFIR1, AISRR, 20, 1) | ||
362 | + FIELD(AFIR1, AIIDE, 19, 1) | ||
363 | + FIELD(AFIR1, AIIDL, 1, 18) | ||
364 | + FIELD(AFIR1, AIRTR, 0, 1) | ||
365 | +REG32(AFMR2, 0x6c) | ||
366 | + FIELD(AFMR2, AMIDH, 21, 11) | ||
367 | + FIELD(AFMR2, AMSRR, 20, 1) | ||
368 | + FIELD(AFMR2, AMIDE, 19, 1) | ||
369 | + FIELD(AFMR2, AMIDL, 1, 18) | ||
370 | + FIELD(AFMR2, AMRTR, 0, 1) | ||
371 | +REG32(AFIR2, 0x70) | ||
372 | + FIELD(AFIR2, AIIDH, 21, 11) | ||
373 | + FIELD(AFIR2, AISRR, 20, 1) | ||
374 | + FIELD(AFIR2, AIIDE, 19, 1) | ||
375 | + FIELD(AFIR2, AIIDL, 1, 18) | ||
376 | + FIELD(AFIR2, AIRTR, 0, 1) | ||
377 | +REG32(AFMR3, 0x74) | ||
378 | + FIELD(AFMR3, AMIDH, 21, 11) | ||
379 | + FIELD(AFMR3, AMSRR, 20, 1) | ||
380 | + FIELD(AFMR3, AMIDE, 19, 1) | ||
381 | + FIELD(AFMR3, AMIDL, 1, 18) | ||
382 | + FIELD(AFMR3, AMRTR, 0, 1) | ||
383 | +REG32(AFIR3, 0x78) | ||
384 | + FIELD(AFIR3, AIIDH, 21, 11) | ||
385 | + FIELD(AFIR3, AISRR, 20, 1) | ||
386 | + FIELD(AFIR3, AIIDE, 19, 1) | ||
387 | + FIELD(AFIR3, AIIDL, 1, 18) | ||
388 | + FIELD(AFIR3, AIRTR, 0, 1) | ||
389 | +REG32(AFMR4, 0x7c) | ||
390 | + FIELD(AFMR4, AMIDH, 21, 11) | ||
391 | + FIELD(AFMR4, AMSRR, 20, 1) | ||
392 | + FIELD(AFMR4, AMIDE, 19, 1) | ||
393 | + FIELD(AFMR4, AMIDL, 1, 18) | ||
394 | + FIELD(AFMR4, AMRTR, 0, 1) | ||
395 | +REG32(AFIR4, 0x80) | ||
396 | + FIELD(AFIR4, AIIDH, 21, 11) | ||
397 | + FIELD(AFIR4, AISRR, 20, 1) | ||
398 | + FIELD(AFIR4, AIIDE, 19, 1) | ||
399 | + FIELD(AFIR4, AIIDL, 1, 18) | ||
400 | + FIELD(AFIR4, AIRTR, 0, 1) | ||
401 | + | ||
402 | +static void can_update_irq(XlnxZynqMPCANState *s) | ||
403 | +{ | ||
404 | + uint32_t irq; | ||
405 | + | ||
406 | + /* Watermark register interrupts. */ | ||
407 | + if ((fifo32_num_free(&s->tx_fifo) / CAN_FRAME_SIZE) > | ||
408 | + ARRAY_FIELD_EX32(s->regs, WIR, EW)) { | ||
409 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, TXFWMEMP, 1); | ||
410 | + } | 61 | + } |
411 | + | 62 | + |
412 | + if ((fifo32_num_used(&s->rx_fifo) / CAN_FRAME_SIZE) > | 63 | + result->phys = address; |
413 | + ARRAY_FIELD_EX32(s->regs, WIR, FW)) { | 64 | + result->prot = PAGE_READ | PAGE_WRITE | PAGE_EXEC; |
414 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, RXFWMFLL, 1); | 65 | + result->page_size = TARGET_PAGE_SIZE; |
66 | + | ||
67 | + /* Fill in cacheattr a-la AArch64.TranslateAddressS1Off. */ | ||
68 | + hcr = arm_hcr_el2_eff_secstate(env, is_secure); | ||
69 | + result->cacheattrs.shareability = 0; | ||
70 | + result->cacheattrs.is_s2_format = false; | ||
71 | + if (hcr & HCR_DC) { | ||
72 | + if (hcr & HCR_DCT) { | ||
73 | + memattr = 0xf0; /* Tagged, Normal, WB, RWA */ | ||
74 | + } else { | ||
75 | + memattr = 0xff; /* Normal, WB, RWA */ | ||
76 | + } | ||
77 | + } else if (access_type == MMU_INST_FETCH) { | ||
78 | + if (regime_sctlr(env, mmu_idx) & SCTLR_I) { | ||
79 | + memattr = 0xee; /* Normal, WT, RA, NT */ | ||
80 | + } else { | ||
81 | + memattr = 0x44; /* Normal, NC, No */ | ||
82 | + } | ||
83 | + result->cacheattrs.shareability = 2; /* outer sharable */ | ||
84 | + } else { | ||
85 | + memattr = 0x00; /* Device, nGnRnE */ | ||
415 | + } | 86 | + } |
416 | + | 87 | + result->cacheattrs.attrs = memattr; |
417 | + /* RX Interrupts. */ | ||
418 | + if (fifo32_num_used(&s->rx_fifo) >= CAN_FRAME_SIZE) { | ||
419 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, RXNEMP, 1); | ||
420 | + } | ||
421 | + | ||
422 | + /* TX interrupts. */ | ||
423 | + if (fifo32_is_empty(&s->tx_fifo)) { | ||
424 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, TXFEMP, 1); | ||
425 | + } | ||
426 | + | ||
427 | + if (fifo32_is_full(&s->tx_fifo)) { | ||
428 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, TXFLL, 1); | ||
429 | + } | ||
430 | + | ||
431 | + if (fifo32_is_full(&s->txhpb_fifo)) { | ||
432 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, TXBFLL, 1); | ||
433 | + } | ||
434 | + | ||
435 | + irq = s->regs[R_INTERRUPT_STATUS_REGISTER]; | ||
436 | + irq &= s->regs[R_INTERRUPT_ENABLE_REGISTER]; | ||
437 | + | ||
438 | + trace_xlnx_can_update_irq(s->regs[R_INTERRUPT_STATUS_REGISTER], | ||
439 | + s->regs[R_INTERRUPT_ENABLE_REGISTER], irq); | ||
440 | + qemu_set_irq(s->irq, irq); | ||
441 | +} | ||
442 | + | ||
443 | +static void can_ier_post_write(RegisterInfo *reg, uint64_t val) | ||
444 | +{ | ||
445 | + XlnxZynqMPCANState *s = XLNX_ZYNQMP_CAN(reg->opaque); | ||
446 | + | ||
447 | + can_update_irq(s); | ||
448 | +} | ||
449 | + | ||
450 | +static uint64_t can_icr_pre_write(RegisterInfo *reg, uint64_t val) | ||
451 | +{ | ||
452 | + XlnxZynqMPCANState *s = XLNX_ZYNQMP_CAN(reg->opaque); | ||
453 | + | ||
454 | + s->regs[R_INTERRUPT_STATUS_REGISTER] &= ~val; | ||
455 | + can_update_irq(s); | ||
456 | + | ||
457 | + return 0; | 88 | + return 0; |
458 | +} | 89 | +} |
459 | + | 90 | + |
460 | +static void can_config_reset(XlnxZynqMPCANState *s) | 91 | bool get_phys_addr_with_secure(CPUARMState *env, target_ulong address, |
461 | +{ | 92 | MMUAccessType access_type, ARMMMUIdx mmu_idx, |
462 | + /* Reset all the configuration registers. */ | 93 | bool is_secure, GetPhysAddrResult *result, |
463 | + register_reset(&s->reg_info[R_SOFTWARE_RESET_REGISTER]); | 94 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr_with_secure(CPUARMState *env, target_ulong address, |
464 | + register_reset(&s->reg_info[R_MODE_SELECT_REGISTER]); | 95 | /* Definitely a real MMU, not an MPU */ |
465 | + register_reset( | 96 | |
466 | + &s->reg_info[R_ARBITRATION_PHASE_BAUD_RATE_PRESCALER_REGISTER]); | 97 | if (regime_translation_disabled(env, mmu_idx, is_secure)) { |
467 | + register_reset(&s->reg_info[R_ARBITRATION_PHASE_BIT_TIMING_REGISTER]); | 98 | - uint64_t hcr; |
468 | + register_reset(&s->reg_info[R_STATUS_REGISTER]); | 99 | - uint8_t memattr; |
469 | + register_reset(&s->reg_info[R_INTERRUPT_STATUS_REGISTER]); | 100 | - |
470 | + register_reset(&s->reg_info[R_INTERRUPT_ENABLE_REGISTER]); | 101 | - /* |
471 | + register_reset(&s->reg_info[R_INTERRUPT_CLEAR_REGISTER]); | 102 | - * MMU disabled. S1 addresses within aa64 translation regimes are |
472 | + register_reset(&s->reg_info[R_WIR]); | 103 | - * still checked for bounds -- see AArch64.TranslateAddressS1Off. |
473 | +} | 104 | - */ |
474 | + | 105 | - if (mmu_idx != ARMMMUIdx_Stage2 && mmu_idx != ARMMMUIdx_Stage2_S) { |
475 | +static void can_config_mode(XlnxZynqMPCANState *s) | 106 | - int r_el = regime_el(env, mmu_idx); |
476 | +{ | 107 | - if (arm_el_is_aa64(env, r_el)) { |
477 | + register_reset(&s->reg_info[R_ERROR_COUNTER_REGISTER]); | 108 | - int pamax = arm_pamax(env_archcpu(env)); |
478 | + register_reset(&s->reg_info[R_ERROR_STATUS_REGISTER]); | 109 | - uint64_t tcr = env->cp15.tcr_el[r_el]; |
479 | + | 110 | - int addrtop, tbi; |
480 | + /* Put XlnxZynqMPCAN in configuration mode. */ | 111 | - |
481 | + ARRAY_FIELD_DP32(s->regs, STATUS_REGISTER, CONFIG, 1); | 112 | - tbi = aa64_va_parameter_tbi(tcr, mmu_idx); |
482 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, WKUP, 0); | 113 | - if (access_type == MMU_INST_FETCH) { |
483 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, SLP, 0); | 114 | - tbi &= ~aa64_va_parameter_tbid(tcr, mmu_idx); |
484 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, BSOFF, 0); | 115 | - } |
485 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, ERROR, 0); | 116 | - tbi = (tbi >> extract64(address, 55, 1)) & 1; |
486 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, RXOFLW, 0); | 117 | - addrtop = (tbi ? 55 : 63); |
487 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, RXOK, 0); | 118 | - |
488 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, TXOK, 0); | 119 | - if (extract64(address, pamax, addrtop - pamax + 1) != 0) { |
489 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, ARBLST, 0); | 120 | - fi->type = ARMFault_AddressSize; |
490 | + | 121 | - fi->level = 0; |
491 | + can_update_irq(s); | 122 | - fi->stage2 = false; |
492 | +} | 123 | - return 1; |
493 | + | 124 | - } |
494 | +static void update_status_register_mode_bits(XlnxZynqMPCANState *s) | 125 | - |
495 | +{ | 126 | - /* |
496 | + bool sleep_status = ARRAY_FIELD_EX32(s->regs, STATUS_REGISTER, SLEEP); | 127 | - * When TBI is disabled, we've just validated that all of the |
497 | + bool sleep_mode = ARRAY_FIELD_EX32(s->regs, MODE_SELECT_REGISTER, SLEEP); | 128 | - * bits above PAMax are zero, so logically we only need to |
498 | + /* Wake up interrupt bit. */ | 129 | - * clear the top byte for TBI. But it's clearer to follow |
499 | + bool wakeup_irq_val = sleep_status && (sleep_mode == 0); | 130 | - * the pseudocode set of addrdesc.paddress. |
500 | + /* Sleep interrupt bit. */ | 131 | - */ |
501 | + bool sleep_irq_val = sleep_mode && (sleep_status == 0); | 132 | - address = extract64(address, 0, 52); |
502 | + | 133 | - } |
503 | + /* Clear previous core mode status bits. */ | 134 | - } |
504 | + ARRAY_FIELD_DP32(s->regs, STATUS_REGISTER, LBACK, 0); | 135 | - result->phys = address; |
505 | + ARRAY_FIELD_DP32(s->regs, STATUS_REGISTER, SLEEP, 0); | 136 | - result->prot = PAGE_READ | PAGE_WRITE | PAGE_EXEC; |
506 | + ARRAY_FIELD_DP32(s->regs, STATUS_REGISTER, SNOOP, 0); | 137 | - result->page_size = TARGET_PAGE_SIZE; |
507 | + ARRAY_FIELD_DP32(s->regs, STATUS_REGISTER, NORMAL, 0); | 138 | - |
508 | + | 139 | - /* Fill in cacheattr a-la AArch64.TranslateAddressS1Off. */ |
509 | + /* set current mode bit and generate irqs accordingly. */ | 140 | - hcr = arm_hcr_el2_eff_secstate(env, is_secure); |
510 | + if (ARRAY_FIELD_EX32(s->regs, MODE_SELECT_REGISTER, LBACK)) { | 141 | - result->cacheattrs.shareability = 0; |
511 | + ARRAY_FIELD_DP32(s->regs, STATUS_REGISTER, LBACK, 1); | 142 | - result->cacheattrs.is_s2_format = false; |
512 | + } else if (ARRAY_FIELD_EX32(s->regs, MODE_SELECT_REGISTER, SLEEP)) { | 143 | - if (hcr & HCR_DC) { |
513 | + ARRAY_FIELD_DP32(s->regs, STATUS_REGISTER, SLEEP, 1); | 144 | - if (hcr & HCR_DCT) { |
514 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, SLP, | 145 | - memattr = 0xf0; /* Tagged, Normal, WB, RWA */ |
515 | + sleep_irq_val); | 146 | - } else { |
516 | + } else if (ARRAY_FIELD_EX32(s->regs, MODE_SELECT_REGISTER, SNOOP)) { | 147 | - memattr = 0xff; /* Normal, WB, RWA */ |
517 | + ARRAY_FIELD_DP32(s->regs, STATUS_REGISTER, SNOOP, 1); | 148 | - } |
518 | + } else { | 149 | - } else if (access_type == MMU_INST_FETCH) { |
519 | + /* | 150 | - if (regime_sctlr(env, mmu_idx) & SCTLR_I) { |
520 | + * If all bits are zero then XlnxZynqMPCAN is set in normal mode. | 151 | - memattr = 0xee; /* Normal, WT, RA, NT */ |
521 | + */ | 152 | - } else { |
522 | + ARRAY_FIELD_DP32(s->regs, STATUS_REGISTER, NORMAL, 1); | 153 | - memattr = 0x44; /* Normal, NC, No */ |
523 | + /* Set wakeup interrupt bit. */ | 154 | - } |
524 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, WKUP, | 155 | - result->cacheattrs.shareability = 2; /* outer sharable */ |
525 | + wakeup_irq_val); | 156 | - } else { |
526 | + } | 157 | - memattr = 0x00; /* Device, nGnRnE */ |
527 | + | 158 | - } |
528 | + can_update_irq(s); | 159 | - result->cacheattrs.attrs = memattr; |
529 | +} | 160 | - return 0; |
530 | + | 161 | + return get_phys_addr_disabled(env, address, access_type, mmu_idx, |
531 | +static void can_exit_sleep_mode(XlnxZynqMPCANState *s) | 162 | + is_secure, result, fi); |
532 | +{ | 163 | } |
533 | + ARRAY_FIELD_DP32(s->regs, MODE_SELECT_REGISTER, SLEEP, 0); | 164 | - |
534 | + update_status_register_mode_bits(s); | 165 | if (regime_using_lpae_format(env, mmu_idx)) { |
535 | +} | 166 | return get_phys_addr_lpae(env, address, access_type, mmu_idx, |
536 | + | 167 | is_secure, false, result, fi); |
537 | +static void generate_frame(qemu_can_frame *frame, uint32_t *data) | ||
538 | +{ | ||
539 | + frame->can_id = data[0]; | ||
540 | + frame->can_dlc = FIELD_EX32(data[1], TXFIFO_DLC, DLC); | ||
541 | + | ||
542 | + frame->data[0] = FIELD_EX32(data[2], TXFIFO_DATA1, DB3); | ||
543 | + frame->data[1] = FIELD_EX32(data[2], TXFIFO_DATA1, DB2); | ||
544 | + frame->data[2] = FIELD_EX32(data[2], TXFIFO_DATA1, DB1); | ||
545 | + frame->data[3] = FIELD_EX32(data[2], TXFIFO_DATA1, DB0); | ||
546 | + | ||
547 | + frame->data[4] = FIELD_EX32(data[3], TXFIFO_DATA2, DB7); | ||
548 | + frame->data[5] = FIELD_EX32(data[3], TXFIFO_DATA2, DB6); | ||
549 | + frame->data[6] = FIELD_EX32(data[3], TXFIFO_DATA2, DB5); | ||
550 | + frame->data[7] = FIELD_EX32(data[3], TXFIFO_DATA2, DB4); | ||
551 | +} | ||
552 | + | ||
553 | +static bool tx_ready_check(XlnxZynqMPCANState *s) | ||
554 | +{ | ||
555 | + if (ARRAY_FIELD_EX32(s->regs, SOFTWARE_RESET_REGISTER, SRST)) { | ||
556 | + g_autofree char *path = object_get_canonical_path(OBJECT(s)); | ||
557 | + | ||
558 | + qemu_log_mask(LOG_GUEST_ERROR, "%s: Attempting to transfer data while" | ||
559 | + " data while controller is in reset mode.\n", | ||
560 | + path); | ||
561 | + return false; | ||
562 | + } | ||
563 | + | ||
564 | + if (ARRAY_FIELD_EX32(s->regs, SOFTWARE_RESET_REGISTER, CEN) == 0) { | ||
565 | + g_autofree char *path = object_get_canonical_path(OBJECT(s)); | ||
566 | + | ||
567 | + qemu_log_mask(LOG_GUEST_ERROR, "%s: Attempting to transfer" | ||
568 | + " data while controller is in configuration mode. Reset" | ||
569 | + " the core so operations can start fresh.\n", | ||
570 | + path); | ||
571 | + return false; | ||
572 | + } | ||
573 | + | ||
574 | + if (ARRAY_FIELD_EX32(s->regs, STATUS_REGISTER, SNOOP)) { | ||
575 | + g_autofree char *path = object_get_canonical_path(OBJECT(s)); | ||
576 | + | ||
577 | + qemu_log_mask(LOG_GUEST_ERROR, "%s: Attempting to transfer" | ||
578 | + " data while controller is in SNOOP MODE.\n", | ||
579 | + path); | ||
580 | + return false; | ||
581 | + } | ||
582 | + | ||
583 | + return true; | ||
584 | +} | ||
585 | + | ||
586 | +static void transfer_fifo(XlnxZynqMPCANState *s, Fifo32 *fifo) | ||
587 | +{ | ||
588 | + qemu_can_frame frame; | ||
589 | + uint32_t data[CAN_FRAME_SIZE]; | ||
590 | + int i; | ||
591 | + bool can_tx = tx_ready_check(s); | ||
592 | + | ||
593 | + if (!can_tx) { | ||
594 | + g_autofree char *path = object_get_canonical_path(OBJECT(s)); | ||
595 | + | ||
596 | + qemu_log_mask(LOG_GUEST_ERROR, "%s: Controller is not enabled for data" | ||
597 | + " transfer.\n", path); | ||
598 | + can_update_irq(s); | ||
599 | + return; | ||
600 | + } | ||
601 | + | ||
602 | + while (!fifo32_is_empty(fifo)) { | ||
603 | + for (i = 0; i < CAN_FRAME_SIZE; i++) { | ||
604 | + data[i] = fifo32_pop(fifo); | ||
605 | + } | ||
606 | + | ||
607 | + if (ARRAY_FIELD_EX32(s->regs, STATUS_REGISTER, LBACK)) { | ||
608 | + /* | ||
609 | + * Controller is in loopback. In Loopback mode, the CAN core | ||
610 | + * transmits a recessive bitstream on to the XlnxZynqMPCAN Bus. | ||
611 | + * Any message transmitted is looped back to the RX line and | ||
612 | + * acknowledged. The XlnxZynqMPCAN core receives any message | ||
613 | + * that it transmits. | ||
614 | + */ | ||
615 | + if (fifo32_is_full(&s->rx_fifo)) { | ||
616 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, RXOFLW, 1); | ||
617 | + } else { | ||
618 | + for (i = 0; i < CAN_FRAME_SIZE; i++) { | ||
619 | + fifo32_push(&s->rx_fifo, data[i]); | ||
620 | + } | ||
621 | + | ||
622 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, RXOK, 1); | ||
623 | + } | ||
624 | + } else { | ||
625 | + /* Normal mode Tx. */ | ||
626 | + generate_frame(&frame, data); | ||
627 | + | ||
628 | + trace_xlnx_can_tx_data(frame.can_id, frame.can_dlc, | ||
629 | + frame.data[0], frame.data[1], | ||
630 | + frame.data[2], frame.data[3], | ||
631 | + frame.data[4], frame.data[5], | ||
632 | + frame.data[6], frame.data[7]); | ||
633 | + can_bus_client_send(&s->bus_client, &frame, 1); | ||
634 | + } | ||
635 | + } | ||
636 | + | ||
637 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, TXOK, 1); | ||
638 | + ARRAY_FIELD_DP32(s->regs, STATUS_REGISTER, TXBFLL, 0); | ||
639 | + | ||
640 | + if (ARRAY_FIELD_EX32(s->regs, STATUS_REGISTER, SLEEP)) { | ||
641 | + can_exit_sleep_mode(s); | ||
642 | + } | ||
643 | + | ||
644 | + can_update_irq(s); | ||
645 | +} | ||
646 | + | ||
647 | +static uint64_t can_srr_pre_write(RegisterInfo *reg, uint64_t val) | ||
648 | +{ | ||
649 | + XlnxZynqMPCANState *s = XLNX_ZYNQMP_CAN(reg->opaque); | ||
650 | + | ||
651 | + ARRAY_FIELD_DP32(s->regs, SOFTWARE_RESET_REGISTER, CEN, | ||
652 | + FIELD_EX32(val, SOFTWARE_RESET_REGISTER, CEN)); | ||
653 | + | ||
654 | + if (FIELD_EX32(val, SOFTWARE_RESET_REGISTER, SRST)) { | ||
655 | + trace_xlnx_can_reset(val); | ||
656 | + | ||
657 | + /* First, core will do software reset then will enter in config mode. */ | ||
658 | + can_config_reset(s); | ||
659 | + } | ||
660 | + | ||
661 | + if (ARRAY_FIELD_EX32(s->regs, SOFTWARE_RESET_REGISTER, CEN) == 0) { | ||
662 | + can_config_mode(s); | ||
663 | + } else { | ||
664 | + /* | ||
665 | + * Leave config mode. Now XlnxZynqMPCAN core will enter normal, | ||
666 | + * sleep, snoop or loopback mode depending upon LBACK, SLEEP, SNOOP | ||
667 | + * register states. | ||
668 | + */ | ||
669 | + ARRAY_FIELD_DP32(s->regs, STATUS_REGISTER, CONFIG, 0); | ||
670 | + | ||
671 | + ptimer_transaction_begin(s->can_timer); | ||
672 | + ptimer_set_count(s->can_timer, 0); | ||
673 | + ptimer_transaction_commit(s->can_timer); | ||
674 | + | ||
675 | + /* XlnxZynqMPCAN is out of config mode. It will send pending data. */ | ||
676 | + transfer_fifo(s, &s->txhpb_fifo); | ||
677 | + transfer_fifo(s, &s->tx_fifo); | ||
678 | + } | ||
679 | + | ||
680 | + update_status_register_mode_bits(s); | ||
681 | + | ||
682 | + return s->regs[R_SOFTWARE_RESET_REGISTER]; | ||
683 | +} | ||
684 | + | ||
685 | +static uint64_t can_msr_pre_write(RegisterInfo *reg, uint64_t val) | ||
686 | +{ | ||
687 | + XlnxZynqMPCANState *s = XLNX_ZYNQMP_CAN(reg->opaque); | ||
688 | + uint8_t multi_mode; | ||
689 | + | ||
690 | + /* | ||
691 | + * Multiple mode set check. This is done to make sure user doesn't set | ||
692 | + * multiple modes. | ||
693 | + */ | ||
694 | + multi_mode = FIELD_EX32(val, MODE_SELECT_REGISTER, LBACK) + | ||
695 | + FIELD_EX32(val, MODE_SELECT_REGISTER, SLEEP) + | ||
696 | + FIELD_EX32(val, MODE_SELECT_REGISTER, SNOOP); | ||
697 | + | ||
698 | + if (multi_mode > 1) { | ||
699 | + g_autofree char *path = object_get_canonical_path(OBJECT(s)); | ||
700 | + | ||
701 | + qemu_log_mask(LOG_GUEST_ERROR, "%s: Attempting to config" | ||
702 | + " several modes simultaneously. One mode will be selected" | ||
703 | + " according to their priority: LBACK > SLEEP > SNOOP.\n", | ||
704 | + path); | ||
705 | + } | ||
706 | + | ||
707 | + if (ARRAY_FIELD_EX32(s->regs, SOFTWARE_RESET_REGISTER, CEN) == 0) { | ||
708 | + /* We are in configuration mode, any mode can be selected. */ | ||
709 | + s->regs[R_MODE_SELECT_REGISTER] = val; | ||
710 | + } else { | ||
711 | + bool sleep_mode_bit = FIELD_EX32(val, MODE_SELECT_REGISTER, SLEEP); | ||
712 | + | ||
713 | + ARRAY_FIELD_DP32(s->regs, MODE_SELECT_REGISTER, SLEEP, sleep_mode_bit); | ||
714 | + | ||
715 | + if (FIELD_EX32(val, MODE_SELECT_REGISTER, LBACK)) { | ||
716 | + g_autofree char *path = object_get_canonical_path(OBJECT(s)); | ||
717 | + | ||
718 | + qemu_log_mask(LOG_GUEST_ERROR, "%s: Attempting to set" | ||
719 | + " LBACK mode without setting CEN bit as 0.\n", | ||
720 | + path); | ||
721 | + } else if (FIELD_EX32(val, MODE_SELECT_REGISTER, SNOOP)) { | ||
722 | + g_autofree char *path = object_get_canonical_path(OBJECT(s)); | ||
723 | + | ||
724 | + qemu_log_mask(LOG_GUEST_ERROR, "%s: Attempting to set" | ||
725 | + " SNOOP mode without setting CEN bit as 0.\n", | ||
726 | + path); | ||
727 | + } | ||
728 | + | ||
729 | + update_status_register_mode_bits(s); | ||
730 | + } | ||
731 | + | ||
732 | + return s->regs[R_MODE_SELECT_REGISTER]; | ||
733 | +} | ||
734 | + | ||
735 | +static uint64_t can_brpr_pre_write(RegisterInfo *reg, uint64_t val) | ||
736 | +{ | ||
737 | + XlnxZynqMPCANState *s = XLNX_ZYNQMP_CAN(reg->opaque); | ||
738 | + | ||
739 | + /* Only allow writes when in config mode. */ | ||
740 | + if (ARRAY_FIELD_EX32(s->regs, SOFTWARE_RESET_REGISTER, CEN)) { | ||
741 | + return s->regs[R_ARBITRATION_PHASE_BAUD_RATE_PRESCALER_REGISTER]; | ||
742 | + } | ||
743 | + | ||
744 | + return val; | ||
745 | +} | ||
746 | + | ||
747 | +static uint64_t can_btr_pre_write(RegisterInfo *reg, uint64_t val) | ||
748 | +{ | ||
749 | + XlnxZynqMPCANState *s = XLNX_ZYNQMP_CAN(reg->opaque); | ||
750 | + | ||
751 | + /* Only allow writes when in config mode. */ | ||
752 | + if (ARRAY_FIELD_EX32(s->regs, SOFTWARE_RESET_REGISTER, CEN)) { | ||
753 | + return s->regs[R_ARBITRATION_PHASE_BIT_TIMING_REGISTER]; | ||
754 | + } | ||
755 | + | ||
756 | + return val; | ||
757 | +} | ||
758 | + | ||
759 | +static uint64_t can_tcr_pre_write(RegisterInfo *reg, uint64_t val) | ||
760 | +{ | ||
761 | + XlnxZynqMPCANState *s = XLNX_ZYNQMP_CAN(reg->opaque); | ||
762 | + | ||
763 | + if (FIELD_EX32(val, TIMESTAMP_REGISTER, CTS)) { | ||
764 | + ptimer_transaction_begin(s->can_timer); | ||
765 | + ptimer_set_count(s->can_timer, 0); | ||
766 | + ptimer_transaction_commit(s->can_timer); | ||
767 | + } | ||
768 | + | ||
769 | + return 0; | ||
770 | +} | ||
771 | + | ||
772 | +static void update_rx_fifo(XlnxZynqMPCANState *s, const qemu_can_frame *frame) | ||
773 | +{ | ||
774 | + bool filter_pass = false; | ||
775 | + uint16_t timestamp = 0; | ||
776 | + | ||
777 | + /* If no filter is enabled. Message will be stored in FIFO. */ | ||
778 | + if (!((ARRAY_FIELD_EX32(s->regs, AFR, UAF1)) | | ||
779 | + (ARRAY_FIELD_EX32(s->regs, AFR, UAF2)) | | ||
780 | + (ARRAY_FIELD_EX32(s->regs, AFR, UAF3)) | | ||
781 | + (ARRAY_FIELD_EX32(s->regs, AFR, UAF4)))) { | ||
782 | + filter_pass = true; | ||
783 | + } | ||
784 | + | ||
785 | + /* | ||
786 | + * Messages that pass any of the acceptance filters will be stored in | ||
787 | + * the RX FIFO. | ||
788 | + */ | ||
789 | + if (ARRAY_FIELD_EX32(s->regs, AFR, UAF1)) { | ||
790 | + uint32_t id_masked = s->regs[R_AFMR1] & frame->can_id; | ||
791 | + uint32_t filter_id_masked = s->regs[R_AFMR1] & s->regs[R_AFIR1]; | ||
792 | + | ||
793 | + if (filter_id_masked == id_masked) { | ||
794 | + filter_pass = true; | ||
795 | + } | ||
796 | + } | ||
797 | + | ||
798 | + if (ARRAY_FIELD_EX32(s->regs, AFR, UAF2)) { | ||
799 | + uint32_t id_masked = s->regs[R_AFMR2] & frame->can_id; | ||
800 | + uint32_t filter_id_masked = s->regs[R_AFMR2] & s->regs[R_AFIR2]; | ||
801 | + | ||
802 | + if (filter_id_masked == id_masked) { | ||
803 | + filter_pass = true; | ||
804 | + } | ||
805 | + } | ||
806 | + | ||
807 | + if (ARRAY_FIELD_EX32(s->regs, AFR, UAF3)) { | ||
808 | + uint32_t id_masked = s->regs[R_AFMR3] & frame->can_id; | ||
809 | + uint32_t filter_id_masked = s->regs[R_AFMR3] & s->regs[R_AFIR3]; | ||
810 | + | ||
811 | + if (filter_id_masked == id_masked) { | ||
812 | + filter_pass = true; | ||
813 | + } | ||
814 | + } | ||
815 | + | ||
816 | + if (ARRAY_FIELD_EX32(s->regs, AFR, UAF4)) { | ||
817 | + uint32_t id_masked = s->regs[R_AFMR4] & frame->can_id; | ||
818 | + uint32_t filter_id_masked = s->regs[R_AFMR4] & s->regs[R_AFIR4]; | ||
819 | + | ||
820 | + if (filter_id_masked == id_masked) { | ||
821 | + filter_pass = true; | ||
822 | + } | ||
823 | + } | ||
824 | + | ||
825 | + if (!filter_pass) { | ||
826 | + trace_xlnx_can_rx_fifo_filter_reject(frame->can_id, frame->can_dlc); | ||
827 | + return; | ||
828 | + } | ||
829 | + | ||
830 | + /* Store the message in fifo if it passed through any of the filters. */ | ||
831 | + if (filter_pass && frame->can_dlc <= MAX_DLC) { | ||
832 | + | ||
833 | + if (fifo32_is_full(&s->rx_fifo)) { | ||
834 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, RXOFLW, 1); | ||
835 | + } else { | ||
836 | + timestamp = CAN_TIMER_MAX - ptimer_get_count(s->can_timer); | ||
837 | + | ||
838 | + fifo32_push(&s->rx_fifo, frame->can_id); | ||
839 | + | ||
840 | + fifo32_push(&s->rx_fifo, deposit32(0, R_RXFIFO_DLC_DLC_SHIFT, | ||
841 | + R_RXFIFO_DLC_DLC_LENGTH, | ||
842 | + frame->can_dlc) | | ||
843 | + deposit32(0, R_RXFIFO_DLC_RXT_SHIFT, | ||
844 | + R_RXFIFO_DLC_RXT_LENGTH, | ||
845 | + timestamp)); | ||
846 | + | ||
847 | + /* First 32 bit of the data. */ | ||
848 | + fifo32_push(&s->rx_fifo, deposit32(0, R_TXFIFO_DATA1_DB3_SHIFT, | ||
849 | + R_TXFIFO_DATA1_DB3_LENGTH, | ||
850 | + frame->data[0]) | | ||
851 | + deposit32(0, R_TXFIFO_DATA1_DB2_SHIFT, | ||
852 | + R_TXFIFO_DATA1_DB2_LENGTH, | ||
853 | + frame->data[1]) | | ||
854 | + deposit32(0, R_TXFIFO_DATA1_DB1_SHIFT, | ||
855 | + R_TXFIFO_DATA1_DB1_LENGTH, | ||
856 | + frame->data[2]) | | ||
857 | + deposit32(0, R_TXFIFO_DATA1_DB0_SHIFT, | ||
858 | + R_TXFIFO_DATA1_DB0_LENGTH, | ||
859 | + frame->data[3])); | ||
860 | + /* Last 32 bit of the data. */ | ||
861 | + fifo32_push(&s->rx_fifo, deposit32(0, R_TXFIFO_DATA2_DB7_SHIFT, | ||
862 | + R_TXFIFO_DATA2_DB7_LENGTH, | ||
863 | + frame->data[4]) | | ||
864 | + deposit32(0, R_TXFIFO_DATA2_DB6_SHIFT, | ||
865 | + R_TXFIFO_DATA2_DB6_LENGTH, | ||
866 | + frame->data[5]) | | ||
867 | + deposit32(0, R_TXFIFO_DATA2_DB5_SHIFT, | ||
868 | + R_TXFIFO_DATA2_DB5_LENGTH, | ||
869 | + frame->data[6]) | | ||
870 | + deposit32(0, R_TXFIFO_DATA2_DB4_SHIFT, | ||
871 | + R_TXFIFO_DATA2_DB4_LENGTH, | ||
872 | + frame->data[7])); | ||
873 | + | ||
874 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, RXOK, 1); | ||
875 | + trace_xlnx_can_rx_data(frame->can_id, frame->can_dlc, | ||
876 | + frame->data[0], frame->data[1], | ||
877 | + frame->data[2], frame->data[3], | ||
878 | + frame->data[4], frame->data[5], | ||
879 | + frame->data[6], frame->data[7]); | ||
880 | + } | ||
881 | + | ||
882 | + can_update_irq(s); | ||
883 | + } | ||
884 | +} | ||
885 | + | ||
886 | +static uint64_t can_rxfifo_pre_read(RegisterInfo *reg, uint64_t val) | ||
887 | +{ | ||
888 | + XlnxZynqMPCANState *s = XLNX_ZYNQMP_CAN(reg->opaque); | ||
889 | + | ||
890 | + if (!fifo32_is_empty(&s->rx_fifo)) { | ||
891 | + val = fifo32_pop(&s->rx_fifo); | ||
892 | + } else { | ||
893 | + ARRAY_FIELD_DP32(s->regs, INTERRUPT_STATUS_REGISTER, RXUFLW, 1); | ||
894 | + } | ||
895 | + | ||
896 | + can_update_irq(s); | ||
897 | + return val; | ||
898 | +} | ||
899 | + | ||
900 | +static void can_filter_enable_post_write(RegisterInfo *reg, uint64_t val) | ||
901 | +{ | ||
902 | + XlnxZynqMPCANState *s = XLNX_ZYNQMP_CAN(reg->opaque); | ||
903 | + | ||
904 | + if (ARRAY_FIELD_EX32(s->regs, AFR, UAF1) && | ||
905 | + ARRAY_FIELD_EX32(s->regs, AFR, UAF2) && | ||
906 | + ARRAY_FIELD_EX32(s->regs, AFR, UAF3) && | ||
907 | + ARRAY_FIELD_EX32(s->regs, AFR, UAF4)) { | ||
908 | + ARRAY_FIELD_DP32(s->regs, STATUS_REGISTER, ACFBSY, 1); | ||
909 | + } else { | ||
910 | + ARRAY_FIELD_DP32(s->regs, STATUS_REGISTER, ACFBSY, 0); | ||
911 | + } | ||
912 | +} | ||
913 | + | ||
914 | +static uint64_t can_filter_mask_pre_write(RegisterInfo *reg, uint64_t val) | ||
915 | +{ | ||
916 | + XlnxZynqMPCANState *s = XLNX_ZYNQMP_CAN(reg->opaque); | ||
917 | + uint32_t reg_idx = (reg->access->addr) / 4; | ||
918 | + uint32_t filter_number = (reg_idx - R_AFMR1) / 2; | ||
919 | + | ||
920 | + /* modify an acceptance filter, the corresponding UAF bit should be '0'. */ | ||
921 | + if (!(s->regs[R_AFR] & (1 << filter_number))) { | ||
922 | + s->regs[reg_idx] = val; | ||
923 | + | ||
924 | + trace_xlnx_can_filter_mask_pre_write(filter_number, s->regs[reg_idx]); | ||
925 | + } else { | ||
926 | + g_autofree char *path = object_get_canonical_path(OBJECT(s)); | ||
927 | + | ||
928 | + qemu_log_mask(LOG_GUEST_ERROR, "%s: Acceptance filter %d" | ||
929 | + " mask is not set as corresponding UAF bit is not 0.\n", | ||
930 | + path, filter_number + 1); | ||
931 | + } | ||
932 | + | ||
933 | + return s->regs[reg_idx]; | ||
934 | +} | ||
935 | + | ||
936 | +static uint64_t can_filter_id_pre_write(RegisterInfo *reg, uint64_t val) | ||
937 | +{ | ||
938 | + XlnxZynqMPCANState *s = XLNX_ZYNQMP_CAN(reg->opaque); | ||
939 | + uint32_t reg_idx = (reg->access->addr) / 4; | ||
940 | + uint32_t filter_number = (reg_idx - R_AFIR1) / 2; | ||
941 | + | ||
942 | + if (!(s->regs[R_AFR] & (1 << filter_number))) { | ||
943 | + s->regs[reg_idx] = val; | ||
944 | + | ||
945 | + trace_xlnx_can_filter_id_pre_write(filter_number, s->regs[reg_idx]); | ||
946 | + } else { | ||
947 | + g_autofree char *path = object_get_canonical_path(OBJECT(s)); | ||
948 | + | ||
949 | + qemu_log_mask(LOG_GUEST_ERROR, "%s: Acceptance filter %d" | ||
950 | + " id is not set as corresponding UAF bit is not 0.\n", | ||
951 | + path, filter_number + 1); | ||
952 | + } | ||
953 | + | ||
954 | + return s->regs[reg_idx]; | ||
955 | +} | ||
956 | + | ||
957 | +static void can_tx_post_write(RegisterInfo *reg, uint64_t val) | ||
958 | +{ | ||
959 | + XlnxZynqMPCANState *s = XLNX_ZYNQMP_CAN(reg->opaque); | ||
960 | + | ||
961 | + bool is_txhpb = reg->access->addr > A_TXFIFO_DATA2; | ||
962 | + | ||
963 | + bool initiate_transfer = (reg->access->addr == A_TXFIFO_DATA2) || | ||
964 | + (reg->access->addr == A_TXHPB_DATA2); | ||
965 | + | ||
966 | + Fifo32 *f = is_txhpb ? &s->txhpb_fifo : &s->tx_fifo; | ||
967 | + | ||
968 | + if (!fifo32_is_full(f)) { | ||
969 | + fifo32_push(f, val); | ||
970 | + } else { | ||
971 | + g_autofree char *path = object_get_canonical_path(OBJECT(s)); | ||
972 | + | ||
973 | + qemu_log_mask(LOG_GUEST_ERROR, "%s: TX FIFO is full.\n", path); | ||
974 | + } | ||
975 | + | ||
976 | + /* Initiate the message send if TX register is written. */ | ||
977 | + if (initiate_transfer && | ||
978 | + ARRAY_FIELD_EX32(s->regs, SOFTWARE_RESET_REGISTER, CEN)) { | ||
979 | + transfer_fifo(s, f); | ||
980 | + } | ||
981 | + | ||
982 | + can_update_irq(s); | ||
983 | +} | ||
984 | + | ||
985 | +static const RegisterAccessInfo can_regs_info[] = { | ||
986 | + { .name = "SOFTWARE_RESET_REGISTER", | ||
987 | + .addr = A_SOFTWARE_RESET_REGISTER, | ||
988 | + .rsvd = 0xfffffffc, | ||
989 | + .pre_write = can_srr_pre_write, | ||
990 | + },{ .name = "MODE_SELECT_REGISTER", | ||
991 | + .addr = A_MODE_SELECT_REGISTER, | ||
992 | + .rsvd = 0xfffffff8, | ||
993 | + .pre_write = can_msr_pre_write, | ||
994 | + },{ .name = "ARBITRATION_PHASE_BAUD_RATE_PRESCALER_REGISTER", | ||
995 | + .addr = A_ARBITRATION_PHASE_BAUD_RATE_PRESCALER_REGISTER, | ||
996 | + .rsvd = 0xffffff00, | ||
997 | + .pre_write = can_brpr_pre_write, | ||
998 | + },{ .name = "ARBITRATION_PHASE_BIT_TIMING_REGISTER", | ||
999 | + .addr = A_ARBITRATION_PHASE_BIT_TIMING_REGISTER, | ||
1000 | + .rsvd = 0xfffffe00, | ||
1001 | + .pre_write = can_btr_pre_write, | ||
1002 | + },{ .name = "ERROR_COUNTER_REGISTER", | ||
1003 | + .addr = A_ERROR_COUNTER_REGISTER, | ||
1004 | + .rsvd = 0xffff0000, | ||
1005 | + .ro = 0xffffffff, | ||
1006 | + },{ .name = "ERROR_STATUS_REGISTER", | ||
1007 | + .addr = A_ERROR_STATUS_REGISTER, | ||
1008 | + .rsvd = 0xffffffe0, | ||
1009 | + .w1c = 0x1f, | ||
1010 | + },{ .name = "STATUS_REGISTER", .addr = A_STATUS_REGISTER, | ||
1011 | + .reset = 0x1, | ||
1012 | + .rsvd = 0xffffe000, | ||
1013 | + .ro = 0x1fff, | ||
1014 | + },{ .name = "INTERRUPT_STATUS_REGISTER", | ||
1015 | + .addr = A_INTERRUPT_STATUS_REGISTER, | ||
1016 | + .reset = 0x6000, | ||
1017 | + .rsvd = 0xffff8000, | ||
1018 | + .ro = 0x7fff, | ||
1019 | + },{ .name = "INTERRUPT_ENABLE_REGISTER", | ||
1020 | + .addr = A_INTERRUPT_ENABLE_REGISTER, | ||
1021 | + .rsvd = 0xffff8000, | ||
1022 | + .post_write = can_ier_post_write, | ||
1023 | + },{ .name = "INTERRUPT_CLEAR_REGISTER", | ||
1024 | + .addr = A_INTERRUPT_CLEAR_REGISTER, | ||
1025 | + .rsvd = 0xffff8000, | ||
1026 | + .pre_write = can_icr_pre_write, | ||
1027 | + },{ .name = "TIMESTAMP_REGISTER", | ||
1028 | + .addr = A_TIMESTAMP_REGISTER, | ||
1029 | + .rsvd = 0xfffffffe, | ||
1030 | + .pre_write = can_tcr_pre_write, | ||
1031 | + },{ .name = "WIR", .addr = A_WIR, | ||
1032 | + .reset = 0x3f3f, | ||
1033 | + .rsvd = 0xffff0000, | ||
1034 | + },{ .name = "TXFIFO_ID", .addr = A_TXFIFO_ID, | ||
1035 | + .post_write = can_tx_post_write, | ||
1036 | + },{ .name = "TXFIFO_DLC", .addr = A_TXFIFO_DLC, | ||
1037 | + .rsvd = 0xfffffff, | ||
1038 | + .post_write = can_tx_post_write, | ||
1039 | + },{ .name = "TXFIFO_DATA1", .addr = A_TXFIFO_DATA1, | ||
1040 | + .post_write = can_tx_post_write, | ||
1041 | + },{ .name = "TXFIFO_DATA2", .addr = A_TXFIFO_DATA2, | ||
1042 | + .post_write = can_tx_post_write, | ||
1043 | + },{ .name = "TXHPB_ID", .addr = A_TXHPB_ID, | ||
1044 | + .post_write = can_tx_post_write, | ||
1045 | + },{ .name = "TXHPB_DLC", .addr = A_TXHPB_DLC, | ||
1046 | + .rsvd = 0xfffffff, | ||
1047 | + .post_write = can_tx_post_write, | ||
1048 | + },{ .name = "TXHPB_DATA1", .addr = A_TXHPB_DATA1, | ||
1049 | + .post_write = can_tx_post_write, | ||
1050 | + },{ .name = "TXHPB_DATA2", .addr = A_TXHPB_DATA2, | ||
1051 | + .post_write = can_tx_post_write, | ||
1052 | + },{ .name = "RXFIFO_ID", .addr = A_RXFIFO_ID, | ||
1053 | + .ro = 0xffffffff, | ||
1054 | + .post_read = can_rxfifo_pre_read, | ||
1055 | + },{ .name = "RXFIFO_DLC", .addr = A_RXFIFO_DLC, | ||
1056 | + .rsvd = 0xfff0000, | ||
1057 | + .post_read = can_rxfifo_pre_read, | ||
1058 | + },{ .name = "RXFIFO_DATA1", .addr = A_RXFIFO_DATA1, | ||
1059 | + .post_read = can_rxfifo_pre_read, | ||
1060 | + },{ .name = "RXFIFO_DATA2", .addr = A_RXFIFO_DATA2, | ||
1061 | + .post_read = can_rxfifo_pre_read, | ||
1062 | + },{ .name = "AFR", .addr = A_AFR, | ||
1063 | + .rsvd = 0xfffffff0, | ||
1064 | + .post_write = can_filter_enable_post_write, | ||
1065 | + },{ .name = "AFMR1", .addr = A_AFMR1, | ||
1066 | + .pre_write = can_filter_mask_pre_write, | ||
1067 | + },{ .name = "AFIR1", .addr = A_AFIR1, | ||
1068 | + .pre_write = can_filter_id_pre_write, | ||
1069 | + },{ .name = "AFMR2", .addr = A_AFMR2, | ||
1070 | + .pre_write = can_filter_mask_pre_write, | ||
1071 | + },{ .name = "AFIR2", .addr = A_AFIR2, | ||
1072 | + .pre_write = can_filter_id_pre_write, | ||
1073 | + },{ .name = "AFMR3", .addr = A_AFMR3, | ||
1074 | + .pre_write = can_filter_mask_pre_write, | ||
1075 | + },{ .name = "AFIR3", .addr = A_AFIR3, | ||
1076 | + .pre_write = can_filter_id_pre_write, | ||
1077 | + },{ .name = "AFMR4", .addr = A_AFMR4, | ||
1078 | + .pre_write = can_filter_mask_pre_write, | ||
1079 | + },{ .name = "AFIR4", .addr = A_AFIR4, | ||
1080 | + .pre_write = can_filter_id_pre_write, | ||
1081 | + } | ||
1082 | +}; | ||
1083 | + | ||
1084 | +static void xlnx_zynqmp_can_ptimer_cb(void *opaque) | ||
1085 | +{ | ||
1086 | + /* No action required on the timer rollover. */ | ||
1087 | +} | ||
1088 | + | ||
1089 | +static const MemoryRegionOps can_ops = { | ||
1090 | + .read = register_read_memory, | ||
1091 | + .write = register_write_memory, | ||
1092 | + .endianness = DEVICE_LITTLE_ENDIAN, | ||
1093 | + .valid = { | ||
1094 | + .min_access_size = 4, | ||
1095 | + .max_access_size = 4, | ||
1096 | + }, | ||
1097 | +}; | ||
1098 | + | ||
1099 | +static void xlnx_zynqmp_can_reset_init(Object *obj, ResetType type) | ||
1100 | +{ | ||
1101 | + XlnxZynqMPCANState *s = XLNX_ZYNQMP_CAN(obj); | ||
1102 | + unsigned int i; | ||
1103 | + | ||
1104 | + for (i = R_RXFIFO_ID; i < ARRAY_SIZE(s->reg_info); ++i) { | ||
1105 | + register_reset(&s->reg_info[i]); | ||
1106 | + } | ||
1107 | + | ||
1108 | + ptimer_transaction_begin(s->can_timer); | ||
1109 | + ptimer_set_count(s->can_timer, 0); | ||
1110 | + ptimer_transaction_commit(s->can_timer); | ||
1111 | +} | ||
1112 | + | ||
1113 | +static void xlnx_zynqmp_can_reset_hold(Object *obj) | ||
1114 | +{ | ||
1115 | + XlnxZynqMPCANState *s = XLNX_ZYNQMP_CAN(obj); | ||
1116 | + unsigned int i; | ||
1117 | + | ||
1118 | + for (i = 0; i < R_RXFIFO_ID; ++i) { | ||
1119 | + register_reset(&s->reg_info[i]); | ||
1120 | + } | ||
1121 | + | ||
1122 | + /* | ||
1123 | + * Reset FIFOs when CAN model is reset. This will clear the fifo writes | ||
1124 | + * done by post_write which gets called from register_reset function, | ||
1125 | + * post_write handle will not be able to trigger tx because CAN will be | ||
1126 | + * disabled when software_reset_register is cleared first. | ||
1127 | + */ | ||
1128 | + fifo32_reset(&s->rx_fifo); | ||
1129 | + fifo32_reset(&s->tx_fifo); | ||
1130 | + fifo32_reset(&s->txhpb_fifo); | ||
1131 | +} | ||
1132 | + | ||
1133 | +static bool xlnx_zynqmp_can_can_receive(CanBusClientState *client) | ||
1134 | +{ | ||
1135 | + XlnxZynqMPCANState *s = container_of(client, XlnxZynqMPCANState, | ||
1136 | + bus_client); | ||
1137 | + | ||
1138 | + if (ARRAY_FIELD_EX32(s->regs, SOFTWARE_RESET_REGISTER, SRST)) { | ||
1139 | + g_autofree char *path = object_get_canonical_path(OBJECT(s)); | ||
1140 | + | ||
1141 | + qemu_log_mask(LOG_GUEST_ERROR, "%s: Controller is in reset state.\n", | ||
1142 | + path); | ||
1143 | + return false; | ||
1144 | + } | ||
1145 | + | ||
1146 | + if ((ARRAY_FIELD_EX32(s->regs, SOFTWARE_RESET_REGISTER, CEN)) == 0) { | ||
1147 | + g_autofree char *path = object_get_canonical_path(OBJECT(s)); | ||
1148 | + | ||
1149 | + qemu_log_mask(LOG_GUEST_ERROR, "%s: Controller is disabled. Incoming" | ||
1150 | + " messages will be discarded.\n", path); | ||
1151 | + return false; | ||
1152 | + } | ||
1153 | + | ||
1154 | + return true; | ||
1155 | +} | ||
1156 | + | ||
1157 | +static ssize_t xlnx_zynqmp_can_receive(CanBusClientState *client, | ||
1158 | + const qemu_can_frame *buf, size_t buf_size) { | ||
1159 | + XlnxZynqMPCANState *s = container_of(client, XlnxZynqMPCANState, | ||
1160 | + bus_client); | ||
1161 | + const qemu_can_frame *frame = buf; | ||
1162 | + | ||
1163 | + if (buf_size <= 0) { | ||
1164 | + g_autofree char *path = object_get_canonical_path(OBJECT(s)); | ||
1165 | + | ||
1166 | + qemu_log_mask(LOG_GUEST_ERROR, "%s: Error in the data received.\n", | ||
1167 | + path); | ||
1168 | + return 0; | ||
1169 | + } | ||
1170 | + | ||
1171 | + if (ARRAY_FIELD_EX32(s->regs, STATUS_REGISTER, SNOOP)) { | ||
1172 | + /* Snoop Mode: Just keep the data. no response back. */ | ||
1173 | + update_rx_fifo(s, frame); | ||
1174 | + } else if ((ARRAY_FIELD_EX32(s->regs, STATUS_REGISTER, SLEEP))) { | ||
1175 | + /* | ||
1176 | + * XlnxZynqMPCAN is in sleep mode. Any data on bus will bring it to wake | ||
1177 | + * up state. | ||
1178 | + */ | ||
1179 | + can_exit_sleep_mode(s); | ||
1180 | + update_rx_fifo(s, frame); | ||
1181 | + } else if ((ARRAY_FIELD_EX32(s->regs, STATUS_REGISTER, SLEEP)) == 0) { | ||
1182 | + update_rx_fifo(s, frame); | ||
1183 | + } else { | ||
1184 | + /* | ||
1185 | + * XlnxZynqMPCAN will not participate in normal bus communication | ||
1186 | + * and will not receive any messages transmitted by other CAN nodes. | ||
1187 | + */ | ||
1188 | + trace_xlnx_can_rx_discard(s->regs[R_STATUS_REGISTER]); | ||
1189 | + } | ||
1190 | + | ||
1191 | + return 1; | ||
1192 | +} | ||
1193 | + | ||
1194 | +static CanBusClientInfo can_xilinx_bus_client_info = { | ||
1195 | + .can_receive = xlnx_zynqmp_can_can_receive, | ||
1196 | + .receive = xlnx_zynqmp_can_receive, | ||
1197 | +}; | ||
1198 | + | ||
1199 | +static int xlnx_zynqmp_can_connect_to_bus(XlnxZynqMPCANState *s, | ||
1200 | + CanBusState *bus) | ||
1201 | +{ | ||
1202 | + s->bus_client.info = &can_xilinx_bus_client_info; | ||
1203 | + | ||
1204 | + if (can_bus_insert_client(bus, &s->bus_client) < 0) { | ||
1205 | + return -1; | ||
1206 | + } | ||
1207 | + return 0; | ||
1208 | +} | ||
1209 | + | ||
1210 | +static void xlnx_zynqmp_can_realize(DeviceState *dev, Error **errp) | ||
1211 | +{ | ||
1212 | + XlnxZynqMPCANState *s = XLNX_ZYNQMP_CAN(dev); | ||
1213 | + | ||
1214 | + if (s->canbus) { | ||
1215 | + if (xlnx_zynqmp_can_connect_to_bus(s, s->canbus) < 0) { | ||
1216 | + g_autofree char *path = object_get_canonical_path(OBJECT(s)); | ||
1217 | + | ||
1218 | + error_setg(errp, "%s: xlnx_zynqmp_can_connect_to_bus" | ||
1219 | + " failed.", path); | ||
1220 | + return; | ||
1221 | + } | ||
1222 | + } | ||
1223 | + | ||
1224 | + /* Create RX FIFO, TXFIFO, TXHPB storage. */ | ||
1225 | + fifo32_create(&s->rx_fifo, RXFIFO_SIZE); | ||
1226 | + fifo32_create(&s->tx_fifo, RXFIFO_SIZE); | ||
1227 | + fifo32_create(&s->txhpb_fifo, CAN_FRAME_SIZE); | ||
1228 | + | ||
1229 | + /* Allocate a new timer. */ | ||
1230 | + s->can_timer = ptimer_init(xlnx_zynqmp_can_ptimer_cb, s, | ||
1231 | + PTIMER_POLICY_DEFAULT); | ||
1232 | + | ||
1233 | + ptimer_transaction_begin(s->can_timer); | ||
1234 | + | ||
1235 | + ptimer_set_freq(s->can_timer, s->cfg.ext_clk_freq); | ||
1236 | + ptimer_set_limit(s->can_timer, CAN_TIMER_MAX, 1); | ||
1237 | + ptimer_run(s->can_timer, 0); | ||
1238 | + ptimer_transaction_commit(s->can_timer); | ||
1239 | +} | ||
1240 | + | ||
1241 | +static void xlnx_zynqmp_can_init(Object *obj) | ||
1242 | +{ | ||
1243 | + XlnxZynqMPCANState *s = XLNX_ZYNQMP_CAN(obj); | ||
1244 | + SysBusDevice *sbd = SYS_BUS_DEVICE(obj); | ||
1245 | + | ||
1246 | + RegisterInfoArray *reg_array; | ||
1247 | + | ||
1248 | + memory_region_init(&s->iomem, obj, TYPE_XLNX_ZYNQMP_CAN, | ||
1249 | + XLNX_ZYNQMP_CAN_R_MAX * 4); | ||
1250 | + reg_array = register_init_block32(DEVICE(obj), can_regs_info, | ||
1251 | + ARRAY_SIZE(can_regs_info), | ||
1252 | + s->reg_info, s->regs, | ||
1253 | + &can_ops, | ||
1254 | + XLNX_ZYNQMP_CAN_ERR_DEBUG, | ||
1255 | + XLNX_ZYNQMP_CAN_R_MAX * 4); | ||
1256 | + | ||
1257 | + memory_region_add_subregion(&s->iomem, 0x00, ®_array->mem); | ||
1258 | + sysbus_init_mmio(sbd, &s->iomem); | ||
1259 | + sysbus_init_irq(SYS_BUS_DEVICE(obj), &s->irq); | ||
1260 | +} | ||
1261 | + | ||
1262 | +static const VMStateDescription vmstate_can = { | ||
1263 | + .name = TYPE_XLNX_ZYNQMP_CAN, | ||
1264 | + .version_id = 1, | ||
1265 | + .minimum_version_id = 1, | ||
1266 | + .fields = (VMStateField[]) { | ||
1267 | + VMSTATE_FIFO32(rx_fifo, XlnxZynqMPCANState), | ||
1268 | + VMSTATE_FIFO32(tx_fifo, XlnxZynqMPCANState), | ||
1269 | + VMSTATE_FIFO32(txhpb_fifo, XlnxZynqMPCANState), | ||
1270 | + VMSTATE_UINT32_ARRAY(regs, XlnxZynqMPCANState, XLNX_ZYNQMP_CAN_R_MAX), | ||
1271 | + VMSTATE_PTIMER(can_timer, XlnxZynqMPCANState), | ||
1272 | + VMSTATE_END_OF_LIST(), | ||
1273 | + } | ||
1274 | +}; | ||
1275 | + | ||
1276 | +static Property xlnx_zynqmp_can_properties[] = { | ||
1277 | + DEFINE_PROP_UINT32("ext_clk_freq", XlnxZynqMPCANState, cfg.ext_clk_freq, | ||
1278 | + CAN_DEFAULT_CLOCK), | ||
1279 | + DEFINE_PROP_LINK("canbus", XlnxZynqMPCANState, canbus, TYPE_CAN_BUS, | ||
1280 | + CanBusState *), | ||
1281 | + DEFINE_PROP_END_OF_LIST(), | ||
1282 | +}; | ||
1283 | + | ||
1284 | +static void xlnx_zynqmp_can_class_init(ObjectClass *klass, void *data) | ||
1285 | +{ | ||
1286 | + DeviceClass *dc = DEVICE_CLASS(klass); | ||
1287 | + ResettableClass *rc = RESETTABLE_CLASS(klass); | ||
1288 | + | ||
1289 | + rc->phases.enter = xlnx_zynqmp_can_reset_init; | ||
1290 | + rc->phases.hold = xlnx_zynqmp_can_reset_hold; | ||
1291 | + dc->realize = xlnx_zynqmp_can_realize; | ||
1292 | + device_class_set_props(dc, xlnx_zynqmp_can_properties); | ||
1293 | + dc->vmsd = &vmstate_can; | ||
1294 | +} | ||
1295 | + | ||
1296 | +static const TypeInfo can_info = { | ||
1297 | + .name = TYPE_XLNX_ZYNQMP_CAN, | ||
1298 | + .parent = TYPE_SYS_BUS_DEVICE, | ||
1299 | + .instance_size = sizeof(XlnxZynqMPCANState), | ||
1300 | + .class_init = xlnx_zynqmp_can_class_init, | ||
1301 | + .instance_init = xlnx_zynqmp_can_init, | ||
1302 | +}; | ||
1303 | + | ||
1304 | +static void can_register_types(void) | ||
1305 | +{ | ||
1306 | + type_register_static(&can_info); | ||
1307 | +} | ||
1308 | + | ||
1309 | +type_init(can_register_types) | ||
1310 | diff --git a/hw/Kconfig b/hw/Kconfig | ||
1311 | index XXXXXXX..XXXXXXX 100644 | ||
1312 | --- a/hw/Kconfig | ||
1313 | +++ b/hw/Kconfig | ||
1314 | @@ -XXX,XX +XXX,XX @@ config XILINX_AXI | ||
1315 | config XLNX_ZYNQMP | ||
1316 | bool | ||
1317 | select REGISTER | ||
1318 | + select CAN_BUS | ||
1319 | diff --git a/hw/net/can/meson.build b/hw/net/can/meson.build | ||
1320 | index XXXXXXX..XXXXXXX 100644 | ||
1321 | --- a/hw/net/can/meson.build | ||
1322 | +++ b/hw/net/can/meson.build | ||
1323 | @@ -XXX,XX +XXX,XX @@ softmmu_ss.add(when: 'CONFIG_CAN_PCI', if_true: files('can_pcm3680_pci.c')) | ||
1324 | softmmu_ss.add(when: 'CONFIG_CAN_PCI', if_true: files('can_mioe3680_pci.c')) | ||
1325 | softmmu_ss.add(when: 'CONFIG_CAN_CTUCANFD', if_true: files('ctucan_core.c')) | ||
1326 | softmmu_ss.add(when: 'CONFIG_CAN_CTUCANFD_PCI', if_true: files('ctucan_pci.c')) | ||
1327 | +softmmu_ss.add(when: 'CONFIG_XLNX_ZYNQMP', if_true: files('xlnx-zynqmp-can.c')) | ||
1328 | diff --git a/hw/net/can/trace-events b/hw/net/can/trace-events | ||
1329 | new file mode 100644 | ||
1330 | index XXXXXXX..XXXXXXX | ||
1331 | --- /dev/null | ||
1332 | +++ b/hw/net/can/trace-events | ||
1333 | @@ -XXX,XX +XXX,XX @@ | ||
1334 | +# xlnx-zynqmp-can.c | ||
1335 | +xlnx_can_update_irq(uint32_t isr, uint32_t ier, uint32_t irq) "ISR: 0x%08x IER: 0x%08x IRQ: 0x%08x" | ||
1336 | +xlnx_can_reset(uint32_t val) "Resetting controller with value = 0x%08x" | ||
1337 | +xlnx_can_rx_fifo_filter_reject(uint32_t id, uint8_t dlc) "Frame: ID: 0x%08x DLC: 0x%02x" | ||
1338 | +xlnx_can_filter_id_pre_write(uint8_t filter_num, uint32_t value) "Filter%d ID: 0x%08x" | ||
1339 | +xlnx_can_filter_mask_pre_write(uint8_t filter_num, uint32_t value) "Filter%d MASK: 0x%08x" | ||
1340 | +xlnx_can_tx_data(uint32_t id, uint8_t dlc, uint8_t db0, uint8_t db1, uint8_t db2, uint8_t db3, uint8_t db4, uint8_t db5, uint8_t db6, uint8_t db7) "Frame: ID: 0x%08x DLC: 0x%02x DATA: 0x%02x 0x%02x 0x%02x 0x%02x 0x%02x 0x%02x 0x%02x 0x%02x" | ||
1341 | +xlnx_can_rx_data(uint32_t id, uint32_t dlc, uint8_t db0, uint8_t db1, uint8_t db2, uint8_t db3, uint8_t db4, uint8_t db5, uint8_t db6, uint8_t db7) "Frame: ID: 0x%08x DLC: 0x%02x DATA: 0x%02x 0x%02x 0x%02x 0x%02x 0x%02x 0x%02x 0x%02x 0x%02x" | ||
1342 | +xlnx_can_rx_discard(uint32_t status) "Controller is not enabled for bus communication. Status Register: 0x%08x" | ||
1343 | -- | 168 | -- |
1344 | 2.20.1 | 169 | 2.25.1 |
1345 | |||
1346 | diff view generated by jsdifflib |
1 | From: Alex Chen <alex.chen@huawei.com> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | We should use printf format specifier "%u" instead of "%d" for | 3 | Do not apply memattr or shareability for Stage2 translations. |
4 | argument of type "unsigned int". | 4 | Make sure to apply HCR_{DC,DCT} only to Regime_EL10, per the |
5 | pseudocode in AArch64.S1DisabledOutput. | ||
5 | 6 | ||
6 | Reported-by: Euler Robot <euler.robot@huawei.com> | 7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
7 | Signed-off-by: Alex Chen <alex.chen@huawei.com> | ||
8 | Message-id: 20201126111109.112238-2-alex.chen@huawei.com | ||
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
9 | Message-id: 20221001162318.153420-20-richard.henderson@linaro.org | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 11 | --- |
12 | hw/misc/imx25_ccm.c | 12 ++++++------ | 12 | target/arm/ptw.c | 48 +++++++++++++++++++++++++----------------------- |
13 | 1 file changed, 6 insertions(+), 6 deletions(-) | 13 | 1 file changed, 25 insertions(+), 23 deletions(-) |
14 | 14 | ||
15 | diff --git a/hw/misc/imx25_ccm.c b/hw/misc/imx25_ccm.c | 15 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c |
16 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/hw/misc/imx25_ccm.c | 17 | --- a/target/arm/ptw.c |
18 | +++ b/hw/misc/imx25_ccm.c | 18 | +++ b/target/arm/ptw.c |
19 | @@ -XXX,XX +XXX,XX @@ static const char *imx25_ccm_reg_name(uint32_t reg) | 19 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_disabled(CPUARMState *env, target_ulong address, |
20 | case IMX25_CCM_LPIMR1_REG: | 20 | GetPhysAddrResult *result, |
21 | return "lpimr1"; | 21 | ARMMMUFaultInfo *fi) |
22 | default: | 22 | { |
23 | - sprintf(unknown, "[%d ?]", reg); | 23 | - uint64_t hcr; |
24 | + sprintf(unknown, "[%u ?]", reg); | 24 | - uint8_t memattr; |
25 | return unknown; | 25 | + uint8_t memattr = 0x00; /* Device nGnRnE */ |
26 | + uint8_t shareability = 0; /* non-sharable */ | ||
27 | |||
28 | if (mmu_idx != ARMMMUIdx_Stage2 && mmu_idx != ARMMMUIdx_Stage2_S) { | ||
29 | int r_el = regime_el(env, mmu_idx); | ||
30 | + | ||
31 | if (arm_el_is_aa64(env, r_el)) { | ||
32 | int pamax = arm_pamax(env_archcpu(env)); | ||
33 | uint64_t tcr = env->cp15.tcr_el[r_el]; | ||
34 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_disabled(CPUARMState *env, target_ulong address, | ||
35 | */ | ||
36 | address = extract64(address, 0, 52); | ||
37 | } | ||
38 | + | ||
39 | + /* Fill in cacheattr a-la AArch64.TranslateAddressS1Off. */ | ||
40 | + if (r_el == 1) { | ||
41 | + uint64_t hcr = arm_hcr_el2_eff_secstate(env, is_secure); | ||
42 | + if (hcr & HCR_DC) { | ||
43 | + if (hcr & HCR_DCT) { | ||
44 | + memattr = 0xf0; /* Tagged, Normal, WB, RWA */ | ||
45 | + } else { | ||
46 | + memattr = 0xff; /* Normal, WB, RWA */ | ||
47 | + } | ||
48 | + } | ||
49 | + } | ||
50 | + if (memattr == 0 && access_type == MMU_INST_FETCH) { | ||
51 | + if (regime_sctlr(env, mmu_idx) & SCTLR_I) { | ||
52 | + memattr = 0xee; /* Normal, WT, RA, NT */ | ||
53 | + } else { | ||
54 | + memattr = 0x44; /* Normal, NC, No */ | ||
55 | + } | ||
56 | + shareability = 2; /* outer sharable */ | ||
57 | + } | ||
58 | + result->cacheattrs.is_s2_format = false; | ||
26 | } | 59 | } |
27 | } | 60 | |
28 | @@ -XXX,XX +XXX,XX @@ static uint32_t imx25_ccm_get_mpll_clk(IMXCCMState *dev) | 61 | result->phys = address; |
29 | freq = imx_ccm_calc_pll(s->reg[IMX25_CCM_MPCTL_REG], CKIH_FREQ); | 62 | result->prot = PAGE_READ | PAGE_WRITE | PAGE_EXEC; |
30 | } | 63 | result->page_size = TARGET_PAGE_SIZE; |
31 | 64 | - | |
32 | - DPRINTF("freq = %d\n", freq); | 65 | - /* Fill in cacheattr a-la AArch64.TranslateAddressS1Off. */ |
33 | + DPRINTF("freq = %u\n", freq); | 66 | - hcr = arm_hcr_el2_eff_secstate(env, is_secure); |
34 | 67 | - result->cacheattrs.shareability = 0; | |
35 | return freq; | 68 | - result->cacheattrs.is_s2_format = false; |
36 | } | 69 | - if (hcr & HCR_DC) { |
37 | @@ -XXX,XX +XXX,XX @@ static uint32_t imx25_ccm_get_mcu_clk(IMXCCMState *dev) | 70 | - if (hcr & HCR_DCT) { |
38 | 71 | - memattr = 0xf0; /* Tagged, Normal, WB, RWA */ | |
39 | freq = freq / (1 + EXTRACT(s->reg[IMX25_CCM_CCTL_REG], ARM_CLK_DIV)); | 72 | - } else { |
40 | 73 | - memattr = 0xff; /* Normal, WB, RWA */ | |
41 | - DPRINTF("freq = %d\n", freq); | 74 | - } |
42 | + DPRINTF("freq = %u\n", freq); | 75 | - } else if (access_type == MMU_INST_FETCH) { |
43 | 76 | - if (regime_sctlr(env, mmu_idx) & SCTLR_I) { | |
44 | return freq; | 77 | - memattr = 0xee; /* Normal, WT, RA, NT */ |
45 | } | 78 | - } else { |
46 | @@ -XXX,XX +XXX,XX @@ static uint32_t imx25_ccm_get_ahb_clk(IMXCCMState *dev) | 79 | - memattr = 0x44; /* Normal, NC, No */ |
47 | freq = imx25_ccm_get_mcu_clk(dev) | 80 | - } |
48 | / (1 + EXTRACT(s->reg[IMX25_CCM_CCTL_REG], AHB_CLK_DIV)); | 81 | - result->cacheattrs.shareability = 2; /* outer sharable */ |
49 | 82 | - } else { | |
50 | - DPRINTF("freq = %d\n", freq); | 83 | - memattr = 0x00; /* Device, nGnRnE */ |
51 | + DPRINTF("freq = %u\n", freq); | 84 | - } |
52 | 85 | + result->cacheattrs.shareability = shareability; | |
53 | return freq; | 86 | result->cacheattrs.attrs = memattr; |
54 | } | 87 | return 0; |
55 | @@ -XXX,XX +XXX,XX @@ static uint32_t imx25_ccm_get_ipg_clk(IMXCCMState *dev) | ||
56 | |||
57 | freq = imx25_ccm_get_ahb_clk(dev) / 2; | ||
58 | |||
59 | - DPRINTF("freq = %d\n", freq); | ||
60 | + DPRINTF("freq = %u\n", freq); | ||
61 | |||
62 | return freq; | ||
63 | } | ||
64 | @@ -XXX,XX +XXX,XX @@ static uint32_t imx25_ccm_get_clock_frequency(IMXCCMState *dev, IMXClk clock) | ||
65 | break; | ||
66 | } | ||
67 | |||
68 | - DPRINTF("Clock = %d) = %d\n", clock, freq); | ||
69 | + DPRINTF("Clock = %d) = %u\n", clock, freq); | ||
70 | |||
71 | return freq; | ||
72 | } | 88 | } |
73 | -- | 89 | -- |
74 | 2.20.1 | 90 | 2.25.1 |
75 | |||
76 | diff view generated by jsdifflib |
1 | In v8.1M, vector table fetch failures don't set HFSR.FORCED (see rule | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | R_LLRP). (In previous versions of the architecture this was either | ||
3 | required or IMPDEF.) | ||
4 | 2 | ||
3 | Adjust GetPhysAddrResult to fill in CPUTLBEntryFull, | ||
4 | so that it may be passed directly to tlb_set_page_full. | ||
5 | |||
6 | The change is large, but mostly mechanical. The major | ||
7 | non-mechanical change is page_size -> lg_page_size. | ||
8 | Most of the time this is obvious, and is related to | ||
9 | TARGET_PAGE_BITS. | ||
10 | |||
11 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
12 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
13 | Message-id: 20221001162318.153420-21-richard.henderson@linaro.org | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
7 | Message-id: 20201119215617.29887-18-peter.maydell@linaro.org | ||
8 | --- | 15 | --- |
9 | target/arm/m_helper.c | 6 +++++- | 16 | target/arm/internals.h | 5 +- |
10 | 1 file changed, 5 insertions(+), 1 deletion(-) | 17 | target/arm/helper.c | 12 +-- |
18 | target/arm/m_helper.c | 20 ++--- | ||
19 | target/arm/ptw.c | 179 ++++++++++++++++++++-------------------- | ||
20 | target/arm/tlb_helper.c | 9 +- | ||
21 | 5 files changed, 111 insertions(+), 114 deletions(-) | ||
11 | 22 | ||
23 | diff --git a/target/arm/internals.h b/target/arm/internals.h | ||
24 | index XXXXXXX..XXXXXXX 100644 | ||
25 | --- a/target/arm/internals.h | ||
26 | +++ b/target/arm/internals.h | ||
27 | @@ -XXX,XX +XXX,XX @@ typedef struct ARMCacheAttrs { | ||
28 | |||
29 | /* Fields that are valid upon success. */ | ||
30 | typedef struct GetPhysAddrResult { | ||
31 | - hwaddr phys; | ||
32 | - target_ulong page_size; | ||
33 | - int prot; | ||
34 | - MemTxAttrs attrs; | ||
35 | + CPUTLBEntryFull f; | ||
36 | ARMCacheAttrs cacheattrs; | ||
37 | } GetPhysAddrResult; | ||
38 | |||
39 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
40 | index XXXXXXX..XXXXXXX 100644 | ||
41 | --- a/target/arm/helper.c | ||
42 | +++ b/target/arm/helper.c | ||
43 | @@ -XXX,XX +XXX,XX @@ static uint64_t do_ats_write(CPUARMState *env, uint64_t value, | ||
44 | /* Create a 64-bit PAR */ | ||
45 | par64 = (1 << 11); /* LPAE bit always set */ | ||
46 | if (!ret) { | ||
47 | - par64 |= res.phys & ~0xfffULL; | ||
48 | - if (!res.attrs.secure) { | ||
49 | + par64 |= res.f.phys_addr & ~0xfffULL; | ||
50 | + if (!res.f.attrs.secure) { | ||
51 | par64 |= (1 << 9); /* NS */ | ||
52 | } | ||
53 | par64 |= (uint64_t)res.cacheattrs.attrs << 56; /* ATTR */ | ||
54 | @@ -XXX,XX +XXX,XX @@ static uint64_t do_ats_write(CPUARMState *env, uint64_t value, | ||
55 | */ | ||
56 | if (!ret) { | ||
57 | /* We do not set any attribute bits in the PAR */ | ||
58 | - if (res.page_size == (1 << 24) | ||
59 | + if (res.f.lg_page_size == 24 | ||
60 | && arm_feature(env, ARM_FEATURE_V7)) { | ||
61 | - par64 = (res.phys & 0xff000000) | (1 << 1); | ||
62 | + par64 = (res.f.phys_addr & 0xff000000) | (1 << 1); | ||
63 | } else { | ||
64 | - par64 = res.phys & 0xfffff000; | ||
65 | + par64 = res.f.phys_addr & 0xfffff000; | ||
66 | } | ||
67 | - if (!res.attrs.secure) { | ||
68 | + if (!res.f.attrs.secure) { | ||
69 | par64 |= (1 << 9); /* NS */ | ||
70 | } | ||
71 | } else { | ||
12 | diff --git a/target/arm/m_helper.c b/target/arm/m_helper.c | 72 | diff --git a/target/arm/m_helper.c b/target/arm/m_helper.c |
13 | index XXXXXXX..XXXXXXX 100644 | 73 | index XXXXXXX..XXXXXXX 100644 |
14 | --- a/target/arm/m_helper.c | 74 | --- a/target/arm/m_helper.c |
15 | +++ b/target/arm/m_helper.c | 75 | +++ b/target/arm/m_helper.c |
16 | @@ -XXX,XX +XXX,XX @@ load_fail: | 76 | @@ -XXX,XX +XXX,XX @@ static bool v7m_stack_write(ARMCPU *cpu, uint32_t addr, uint32_t value, |
17 | * The HardFault is Secure if BFHFNMINS is 0 (meaning that all HFs are | 77 | } |
18 | * secure); otherwise it targets the same security state as the | 78 | goto pend_fault; |
19 | * underlying exception. | 79 | } |
20 | + * In v8.1M HardFaults from vector table fetch fails don't set FORCED. | 80 | - address_space_stl_le(arm_addressspace(cs, res.attrs), res.phys, value, |
21 | */ | 81 | - res.attrs, &txres); |
22 | if (!(cpu->env.v7m.aircr & R_V7M_AIRCR_BFHFNMINS_MASK)) { | 82 | + address_space_stl_le(arm_addressspace(cs, res.f.attrs), res.f.phys_addr, |
23 | exc_secure = true; | 83 | + value, res.f.attrs, &txres); |
24 | } | 84 | if (txres != MEMTX_OK) { |
25 | - env->v7m.hfsr |= R_V7M_HFSR_VECTTBL_MASK | R_V7M_HFSR_FORCED_MASK; | 85 | /* BusFault trying to write the data */ |
26 | + env->v7m.hfsr |= R_V7M_HFSR_VECTTBL_MASK; | 86 | if (mode == STACK_LAZYFP) { |
27 | + if (!arm_feature(env, ARM_FEATURE_V8_1M)) { | 87 | @@ -XXX,XX +XXX,XX @@ static bool v7m_stack_read(ARMCPU *cpu, uint32_t *dest, uint32_t addr, |
28 | + env->v7m.hfsr |= R_V7M_HFSR_FORCED_MASK; | 88 | goto pend_fault; |
29 | + } | 89 | } |
30 | armv7m_nvic_set_pending_derived(env->nvic, ARMV7M_EXCP_HARD, exc_secure); | 90 | |
91 | - value = address_space_ldl(arm_addressspace(cs, res.attrs), res.phys, | ||
92 | - res.attrs, &txres); | ||
93 | + value = address_space_ldl(arm_addressspace(cs, res.f.attrs), | ||
94 | + res.f.phys_addr, res.f.attrs, &txres); | ||
95 | if (txres != MEMTX_OK) { | ||
96 | /* BusFault trying to read the data */ | ||
97 | qemu_log_mask(CPU_LOG_INT, "...BusFault with BFSR.UNSTKERR\n"); | ||
98 | @@ -XXX,XX +XXX,XX @@ static bool v7m_read_half_insn(ARMCPU *cpu, ARMMMUIdx mmu_idx, bool secure, | ||
99 | qemu_log_mask(CPU_LOG_INT, "...really MemManage with CFSR.IACCVIOL\n"); | ||
100 | return false; | ||
101 | } | ||
102 | - *insn = address_space_lduw_le(arm_addressspace(cs, res.attrs), res.phys, | ||
103 | - res.attrs, &txres); | ||
104 | + *insn = address_space_lduw_le(arm_addressspace(cs, res.f.attrs), | ||
105 | + res.f.phys_addr, res.f.attrs, &txres); | ||
106 | if (txres != MEMTX_OK) { | ||
107 | env->v7m.cfsr[M_REG_NS] |= R_V7M_CFSR_IBUSERR_MASK; | ||
108 | armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_BUS, false); | ||
109 | @@ -XXX,XX +XXX,XX @@ static bool v7m_read_sg_stack_word(ARMCPU *cpu, ARMMMUIdx mmu_idx, | ||
110 | } | ||
111 | return false; | ||
112 | } | ||
113 | - value = address_space_ldl(arm_addressspace(cs, res.attrs), res.phys, | ||
114 | - res.attrs, &txres); | ||
115 | + value = address_space_ldl(arm_addressspace(cs, res.f.attrs), | ||
116 | + res.f.phys_addr, res.f.attrs, &txres); | ||
117 | if (txres != MEMTX_OK) { | ||
118 | /* BusFault trying to read the data */ | ||
119 | qemu_log_mask(CPU_LOG_INT, | ||
120 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(v7m_tt)(CPUARMState *env, uint32_t addr, uint32_t op) | ||
121 | } else { | ||
122 | mrvalid = true; | ||
123 | } | ||
124 | - r = res.prot & PAGE_READ; | ||
125 | - rw = res.prot & PAGE_WRITE; | ||
126 | + r = res.f.prot & PAGE_READ; | ||
127 | + rw = res.f.prot & PAGE_WRITE; | ||
128 | } else { | ||
129 | r = false; | ||
130 | rw = false; | ||
131 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c | ||
132 | index XXXXXXX..XXXXXXX 100644 | ||
133 | --- a/target/arm/ptw.c | ||
134 | +++ b/target/arm/ptw.c | ||
135 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
136 | assert(!is_secure); | ||
137 | } | ||
138 | |||
139 | - addr = s2.phys; | ||
140 | + addr = s2.f.phys_addr; | ||
141 | } | ||
142 | return addr; | ||
143 | } | ||
144 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v5(CPUARMState *env, uint32_t address, | ||
145 | /* 1Mb section. */ | ||
146 | phys_addr = (desc & 0xfff00000) | (address & 0x000fffff); | ||
147 | ap = (desc >> 10) & 3; | ||
148 | - result->page_size = 1024 * 1024; | ||
149 | + result->f.lg_page_size = 20; /* 1MB */ | ||
150 | } else { | ||
151 | /* Lookup l2 entry. */ | ||
152 | if (type == 1) { | ||
153 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v5(CPUARMState *env, uint32_t address, | ||
154 | case 1: /* 64k page. */ | ||
155 | phys_addr = (desc & 0xffff0000) | (address & 0xffff); | ||
156 | ap = (desc >> (4 + ((address >> 13) & 6))) & 3; | ||
157 | - result->page_size = 0x10000; | ||
158 | + result->f.lg_page_size = 16; | ||
159 | break; | ||
160 | case 2: /* 4k page. */ | ||
161 | phys_addr = (desc & 0xfffff000) | (address & 0xfff); | ||
162 | ap = (desc >> (4 + ((address >> 9) & 6))) & 3; | ||
163 | - result->page_size = 0x1000; | ||
164 | + result->f.lg_page_size = 12; | ||
165 | break; | ||
166 | case 3: /* 1k page, or ARMv6/XScale "extended small (4k) page" */ | ||
167 | if (type == 1) { | ||
168 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v5(CPUARMState *env, uint32_t address, | ||
169 | if (arm_feature(env, ARM_FEATURE_XSCALE) | ||
170 | || arm_feature(env, ARM_FEATURE_V6)) { | ||
171 | phys_addr = (desc & 0xfffff000) | (address & 0xfff); | ||
172 | - result->page_size = 0x1000; | ||
173 | + result->f.lg_page_size = 12; | ||
174 | } else { | ||
175 | /* | ||
176 | * UNPREDICTABLE in ARMv5; we choose to take a | ||
177 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v5(CPUARMState *env, uint32_t address, | ||
178 | } | ||
179 | } else { | ||
180 | phys_addr = (desc & 0xfffffc00) | (address & 0x3ff); | ||
181 | - result->page_size = 0x400; | ||
182 | + result->f.lg_page_size = 10; | ||
183 | } | ||
184 | ap = (desc >> 4) & 3; | ||
185 | break; | ||
186 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v5(CPUARMState *env, uint32_t address, | ||
187 | g_assert_not_reached(); | ||
188 | } | ||
189 | } | ||
190 | - result->prot = ap_to_rw_prot(env, mmu_idx, ap, domain_prot); | ||
191 | - result->prot |= result->prot ? PAGE_EXEC : 0; | ||
192 | - if (!(result->prot & (1 << access_type))) { | ||
193 | + result->f.prot = ap_to_rw_prot(env, mmu_idx, ap, domain_prot); | ||
194 | + result->f.prot |= result->f.prot ? PAGE_EXEC : 0; | ||
195 | + if (!(result->f.prot & (1 << access_type))) { | ||
196 | /* Access permission fault. */ | ||
197 | fi->type = ARMFault_Permission; | ||
198 | goto do_fault; | ||
199 | } | ||
200 | - result->phys = phys_addr; | ||
201 | + result->f.phys_addr = phys_addr; | ||
202 | return false; | ||
203 | do_fault: | ||
204 | fi->domain = domain; | ||
205 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v6(CPUARMState *env, uint32_t address, | ||
206 | phys_addr = (desc & 0xff000000) | (address & 0x00ffffff); | ||
207 | phys_addr |= (uint64_t)extract32(desc, 20, 4) << 32; | ||
208 | phys_addr |= (uint64_t)extract32(desc, 5, 4) << 36; | ||
209 | - result->page_size = 0x1000000; | ||
210 | + result->f.lg_page_size = 24; /* 16MB */ | ||
211 | } else { | ||
212 | /* Section. */ | ||
213 | phys_addr = (desc & 0xfff00000) | (address & 0x000fffff); | ||
214 | - result->page_size = 0x100000; | ||
215 | + result->f.lg_page_size = 20; /* 1MB */ | ||
216 | } | ||
217 | ap = ((desc >> 10) & 3) | ((desc >> 13) & 4); | ||
218 | xn = desc & (1 << 4); | ||
219 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v6(CPUARMState *env, uint32_t address, | ||
220 | case 1: /* 64k page. */ | ||
221 | phys_addr = (desc & 0xffff0000) | (address & 0xffff); | ||
222 | xn = desc & (1 << 15); | ||
223 | - result->page_size = 0x10000; | ||
224 | + result->f.lg_page_size = 16; | ||
225 | break; | ||
226 | case 2: case 3: /* 4k page. */ | ||
227 | phys_addr = (desc & 0xfffff000) | (address & 0xfff); | ||
228 | xn = desc & 1; | ||
229 | - result->page_size = 0x1000; | ||
230 | + result->f.lg_page_size = 12; | ||
231 | break; | ||
232 | default: | ||
233 | /* Never happens, but compiler isn't smart enough to tell. */ | ||
234 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v6(CPUARMState *env, uint32_t address, | ||
235 | } | ||
236 | } | ||
237 | if (domain_prot == 3) { | ||
238 | - result->prot = PAGE_READ | PAGE_WRITE | PAGE_EXEC; | ||
239 | + result->f.prot = PAGE_READ | PAGE_WRITE | PAGE_EXEC; | ||
240 | } else { | ||
241 | if (pxn && !regime_is_user(env, mmu_idx)) { | ||
242 | xn = 1; | ||
243 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v6(CPUARMState *env, uint32_t address, | ||
244 | fi->type = ARMFault_AccessFlag; | ||
245 | goto do_fault; | ||
246 | } | ||
247 | - result->prot = simple_ap_to_rw_prot(env, mmu_idx, ap >> 1); | ||
248 | + result->f.prot = simple_ap_to_rw_prot(env, mmu_idx, ap >> 1); | ||
249 | } else { | ||
250 | - result->prot = ap_to_rw_prot(env, mmu_idx, ap, domain_prot); | ||
251 | + result->f.prot = ap_to_rw_prot(env, mmu_idx, ap, domain_prot); | ||
252 | } | ||
253 | - if (result->prot && !xn) { | ||
254 | - result->prot |= PAGE_EXEC; | ||
255 | + if (result->f.prot && !xn) { | ||
256 | + result->f.prot |= PAGE_EXEC; | ||
257 | } | ||
258 | - if (!(result->prot & (1 << access_type))) { | ||
259 | + if (!(result->f.prot & (1 << access_type))) { | ||
260 | /* Access permission fault. */ | ||
261 | fi->type = ARMFault_Permission; | ||
262 | goto do_fault; | ||
263 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v6(CPUARMState *env, uint32_t address, | ||
264 | * the CPU doesn't support TZ or this is a non-secure translation | ||
265 | * regime, because the attribute will already be non-secure. | ||
266 | */ | ||
267 | - result->attrs.secure = false; | ||
268 | + result->f.attrs.secure = false; | ||
269 | } | ||
270 | - result->phys = phys_addr; | ||
271 | + result->f.phys_addr = phys_addr; | ||
272 | return false; | ||
273 | do_fault: | ||
274 | fi->domain = domain; | ||
275 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
276 | if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
277 | ns = mmu_idx == ARMMMUIdx_Stage2; | ||
278 | xn = extract32(attrs, 11, 2); | ||
279 | - result->prot = get_S2prot(env, ap, xn, s1_is_el0); | ||
280 | + result->f.prot = get_S2prot(env, ap, xn, s1_is_el0); | ||
281 | } else { | ||
282 | ns = extract32(attrs, 3, 1); | ||
283 | xn = extract32(attrs, 12, 1); | ||
284 | pxn = extract32(attrs, 11, 1); | ||
285 | - result->prot = get_S1prot(env, mmu_idx, aarch64, ap, ns, xn, pxn); | ||
286 | + result->f.prot = get_S1prot(env, mmu_idx, aarch64, ap, ns, xn, pxn); | ||
287 | } | ||
288 | |||
289 | fault_type = ARMFault_Permission; | ||
290 | - if (!(result->prot & (1 << access_type))) { | ||
291 | + if (!(result->f.prot & (1 << access_type))) { | ||
292 | goto do_fault; | ||
293 | } | ||
294 | |||
295 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
296 | * the CPU doesn't support TZ or this is a non-secure translation | ||
297 | * regime, because the attribute will already be non-secure. | ||
298 | */ | ||
299 | - result->attrs.secure = false; | ||
300 | + result->f.attrs.secure = false; | ||
301 | } | ||
302 | /* When in aarch64 mode, and BTI is enabled, remember GP in the IOTLB. */ | ||
303 | if (aarch64 && guarded && cpu_isar_feature(aa64_bti, cpu)) { | ||
304 | - arm_tlb_bti_gp(&result->attrs) = true; | ||
305 | + arm_tlb_bti_gp(&result->f.attrs) = true; | ||
306 | } | ||
307 | |||
308 | if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
309 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
310 | result->cacheattrs.shareability = extract32(attrs, 6, 2); | ||
311 | } | ||
312 | |||
313 | - result->phys = descaddr; | ||
314 | - result->page_size = page_size; | ||
315 | + result->f.phys_addr = descaddr; | ||
316 | + result->f.lg_page_size = ctz64(page_size); | ||
317 | return false; | ||
318 | |||
319 | do_fault: | ||
320 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav5(CPUARMState *env, uint32_t address, | ||
321 | |||
322 | if (regime_translation_disabled(env, mmu_idx, is_secure)) { | ||
323 | /* MPU disabled. */ | ||
324 | - result->phys = address; | ||
325 | - result->prot = PAGE_READ | PAGE_WRITE | PAGE_EXEC; | ||
326 | + result->f.phys_addr = address; | ||
327 | + result->f.prot = PAGE_READ | PAGE_WRITE | PAGE_EXEC; | ||
328 | return false; | ||
329 | } | ||
330 | |||
331 | - result->phys = address; | ||
332 | + result->f.phys_addr = address; | ||
333 | for (n = 7; n >= 0; n--) { | ||
334 | base = env->cp15.c6_region[n]; | ||
335 | if ((base & 1) == 0) { | ||
336 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav5(CPUARMState *env, uint32_t address, | ||
337 | fi->level = 1; | ||
338 | return true; | ||
339 | } | ||
340 | - result->prot = PAGE_READ | PAGE_WRITE; | ||
341 | + result->f.prot = PAGE_READ | PAGE_WRITE; | ||
342 | break; | ||
343 | case 2: | ||
344 | - result->prot = PAGE_READ; | ||
345 | + result->f.prot = PAGE_READ; | ||
346 | if (!is_user) { | ||
347 | - result->prot |= PAGE_WRITE; | ||
348 | + result->f.prot |= PAGE_WRITE; | ||
349 | } | ||
350 | break; | ||
351 | case 3: | ||
352 | - result->prot = PAGE_READ | PAGE_WRITE; | ||
353 | + result->f.prot = PAGE_READ | PAGE_WRITE; | ||
354 | break; | ||
355 | case 5: | ||
356 | if (is_user) { | ||
357 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav5(CPUARMState *env, uint32_t address, | ||
358 | fi->level = 1; | ||
359 | return true; | ||
360 | } | ||
361 | - result->prot = PAGE_READ; | ||
362 | + result->f.prot = PAGE_READ; | ||
363 | break; | ||
364 | case 6: | ||
365 | - result->prot = PAGE_READ; | ||
366 | + result->f.prot = PAGE_READ; | ||
367 | break; | ||
368 | default: | ||
369 | /* Bad permission. */ | ||
370 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav5(CPUARMState *env, uint32_t address, | ||
371 | fi->level = 1; | ||
372 | return true; | ||
373 | } | ||
374 | - result->prot |= PAGE_EXEC; | ||
375 | + result->f.prot |= PAGE_EXEC; | ||
31 | return false; | 376 | return false; |
32 | } | 377 | } |
378 | |||
379 | static void get_phys_addr_pmsav7_default(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
380 | - int32_t address, int *prot) | ||
381 | + int32_t address, uint8_t *prot) | ||
382 | { | ||
383 | if (!arm_feature(env, ARM_FEATURE_M)) { | ||
384 | *prot = PAGE_READ | PAGE_WRITE; | ||
385 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav7(CPUARMState *env, uint32_t address, | ||
386 | int n; | ||
387 | bool is_user = regime_is_user(env, mmu_idx); | ||
388 | |||
389 | - result->phys = address; | ||
390 | - result->page_size = TARGET_PAGE_SIZE; | ||
391 | - result->prot = 0; | ||
392 | + result->f.phys_addr = address; | ||
393 | + result->f.lg_page_size = TARGET_PAGE_BITS; | ||
394 | + result->f.prot = 0; | ||
395 | |||
396 | if (regime_translation_disabled(env, mmu_idx, secure) || | ||
397 | m_is_ppb_region(env, address)) { | ||
398 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav7(CPUARMState *env, uint32_t address, | ||
399 | * which always does a direct read using address_space_ldl(), rather | ||
400 | * than going via this function, so we don't need to check that here. | ||
401 | */ | ||
402 | - get_phys_addr_pmsav7_default(env, mmu_idx, address, &result->prot); | ||
403 | + get_phys_addr_pmsav7_default(env, mmu_idx, address, &result->f.prot); | ||
404 | } else { /* MPU enabled */ | ||
405 | for (n = (int)cpu->pmsav7_dregion - 1; n >= 0; n--) { | ||
406 | /* region search */ | ||
407 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav7(CPUARMState *env, uint32_t address, | ||
408 | if (ranges_overlap(base, rmask, | ||
409 | address & TARGET_PAGE_MASK, | ||
410 | TARGET_PAGE_SIZE)) { | ||
411 | - result->page_size = 1; | ||
412 | + result->f.lg_page_size = 0; | ||
413 | } | ||
414 | continue; | ||
415 | } | ||
416 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav7(CPUARMState *env, uint32_t address, | ||
417 | continue; | ||
418 | } | ||
419 | if (rsize < TARGET_PAGE_BITS) { | ||
420 | - result->page_size = 1 << rsize; | ||
421 | + result->f.lg_page_size = rsize; | ||
422 | } | ||
423 | break; | ||
424 | } | ||
425 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav7(CPUARMState *env, uint32_t address, | ||
426 | fi->type = ARMFault_Background; | ||
427 | return true; | ||
428 | } | ||
429 | - get_phys_addr_pmsav7_default(env, mmu_idx, address, &result->prot); | ||
430 | + get_phys_addr_pmsav7_default(env, mmu_idx, address, | ||
431 | + &result->f.prot); | ||
432 | } else { /* a MPU hit! */ | ||
433 | uint32_t ap = extract32(env->pmsav7.dracr[n], 8, 3); | ||
434 | uint32_t xn = extract32(env->pmsav7.dracr[n], 12, 1); | ||
435 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav7(CPUARMState *env, uint32_t address, | ||
436 | case 5: | ||
437 | break; /* no access */ | ||
438 | case 3: | ||
439 | - result->prot |= PAGE_WRITE; | ||
440 | + result->f.prot |= PAGE_WRITE; | ||
441 | /* fall through */ | ||
442 | case 2: | ||
443 | case 6: | ||
444 | - result->prot |= PAGE_READ | PAGE_EXEC; | ||
445 | + result->f.prot |= PAGE_READ | PAGE_EXEC; | ||
446 | break; | ||
447 | case 7: | ||
448 | /* for v7M, same as 6; for R profile a reserved value */ | ||
449 | if (arm_feature(env, ARM_FEATURE_M)) { | ||
450 | - result->prot |= PAGE_READ | PAGE_EXEC; | ||
451 | + result->f.prot |= PAGE_READ | PAGE_EXEC; | ||
452 | break; | ||
453 | } | ||
454 | /* fall through */ | ||
455 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav7(CPUARMState *env, uint32_t address, | ||
456 | case 1: | ||
457 | case 2: | ||
458 | case 3: | ||
459 | - result->prot |= PAGE_WRITE; | ||
460 | + result->f.prot |= PAGE_WRITE; | ||
461 | /* fall through */ | ||
462 | case 5: | ||
463 | case 6: | ||
464 | - result->prot |= PAGE_READ | PAGE_EXEC; | ||
465 | + result->f.prot |= PAGE_READ | PAGE_EXEC; | ||
466 | break; | ||
467 | case 7: | ||
468 | /* for v7M, same as 6; for R profile a reserved value */ | ||
469 | if (arm_feature(env, ARM_FEATURE_M)) { | ||
470 | - result->prot |= PAGE_READ | PAGE_EXEC; | ||
471 | + result->f.prot |= PAGE_READ | PAGE_EXEC; | ||
472 | break; | ||
473 | } | ||
474 | /* fall through */ | ||
475 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav7(CPUARMState *env, uint32_t address, | ||
476 | |||
477 | /* execute never */ | ||
478 | if (xn) { | ||
479 | - result->prot &= ~PAGE_EXEC; | ||
480 | + result->f.prot &= ~PAGE_EXEC; | ||
481 | } | ||
482 | } | ||
483 | } | ||
484 | |||
485 | fi->type = ARMFault_Permission; | ||
486 | fi->level = 1; | ||
487 | - return !(result->prot & (1 << access_type)); | ||
488 | + return !(result->f.prot & (1 << access_type)); | ||
489 | } | ||
490 | |||
491 | bool pmsav8_mpu_lookup(CPUARMState *env, uint32_t address, | ||
492 | @@ -XXX,XX +XXX,XX @@ bool pmsav8_mpu_lookup(CPUARMState *env, uint32_t address, | ||
493 | uint32_t addr_page_base = address & TARGET_PAGE_MASK; | ||
494 | uint32_t addr_page_limit = addr_page_base + (TARGET_PAGE_SIZE - 1); | ||
495 | |||
496 | - result->page_size = TARGET_PAGE_SIZE; | ||
497 | - result->phys = address; | ||
498 | - result->prot = 0; | ||
499 | + result->f.lg_page_size = TARGET_PAGE_BITS; | ||
500 | + result->f.phys_addr = address; | ||
501 | + result->f.prot = 0; | ||
502 | if (mregion) { | ||
503 | *mregion = -1; | ||
504 | } | ||
505 | @@ -XXX,XX +XXX,XX @@ bool pmsav8_mpu_lookup(CPUARMState *env, uint32_t address, | ||
506 | ranges_overlap(base, limit - base + 1, | ||
507 | addr_page_base, | ||
508 | TARGET_PAGE_SIZE)) { | ||
509 | - result->page_size = 1; | ||
510 | + result->f.lg_page_size = 0; | ||
511 | } | ||
512 | continue; | ||
513 | } | ||
514 | |||
515 | if (base > addr_page_base || limit < addr_page_limit) { | ||
516 | - result->page_size = 1; | ||
517 | + result->f.lg_page_size = 0; | ||
518 | } | ||
519 | |||
520 | if (matchregion != -1) { | ||
521 | @@ -XXX,XX +XXX,XX @@ bool pmsav8_mpu_lookup(CPUARMState *env, uint32_t address, | ||
522 | |||
523 | if (matchregion == -1) { | ||
524 | /* hit using the background region */ | ||
525 | - get_phys_addr_pmsav7_default(env, mmu_idx, address, &result->prot); | ||
526 | + get_phys_addr_pmsav7_default(env, mmu_idx, address, &result->f.prot); | ||
527 | } else { | ||
528 | uint32_t ap = extract32(env->pmsav8.rbar[secure][matchregion], 1, 2); | ||
529 | uint32_t xn = extract32(env->pmsav8.rbar[secure][matchregion], 0, 1); | ||
530 | @@ -XXX,XX +XXX,XX @@ bool pmsav8_mpu_lookup(CPUARMState *env, uint32_t address, | ||
531 | xn = 1; | ||
532 | } | ||
533 | |||
534 | - result->prot = simple_ap_to_rw_prot(env, mmu_idx, ap); | ||
535 | - if (result->prot && !xn && !(pxn && !is_user)) { | ||
536 | - result->prot |= PAGE_EXEC; | ||
537 | + result->f.prot = simple_ap_to_rw_prot(env, mmu_idx, ap); | ||
538 | + if (result->f.prot && !xn && !(pxn && !is_user)) { | ||
539 | + result->f.prot |= PAGE_EXEC; | ||
540 | } | ||
541 | /* | ||
542 | * We don't need to look the attribute up in the MAIR0/MAIR1 | ||
543 | @@ -XXX,XX +XXX,XX @@ bool pmsav8_mpu_lookup(CPUARMState *env, uint32_t address, | ||
544 | |||
545 | fi->type = ARMFault_Permission; | ||
546 | fi->level = 1; | ||
547 | - return !(result->prot & (1 << access_type)); | ||
548 | + return !(result->f.prot & (1 << access_type)); | ||
549 | } | ||
550 | |||
551 | static bool v8m_is_sau_exempt(CPUARMState *env, | ||
552 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav8(CPUARMState *env, uint32_t address, | ||
553 | } else { | ||
554 | fi->type = ARMFault_QEMU_SFault; | ||
555 | } | ||
556 | - result->page_size = sattrs.subpage ? 1 : TARGET_PAGE_SIZE; | ||
557 | - result->phys = address; | ||
558 | - result->prot = 0; | ||
559 | + result->f.lg_page_size = sattrs.subpage ? 0 : TARGET_PAGE_BITS; | ||
560 | + result->f.phys_addr = address; | ||
561 | + result->f.prot = 0; | ||
562 | return true; | ||
563 | } | ||
564 | } else { | ||
565 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav8(CPUARMState *env, uint32_t address, | ||
566 | * might downgrade a secure access to nonsecure. | ||
567 | */ | ||
568 | if (sattrs.ns) { | ||
569 | - result->attrs.secure = false; | ||
570 | + result->f.attrs.secure = false; | ||
571 | } else if (!secure) { | ||
572 | /* | ||
573 | * NS access to S memory must fault. | ||
574 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav8(CPUARMState *env, uint32_t address, | ||
575 | * for M_FAKE_FSR_SFAULT in arm_v7m_cpu_do_interrupt(). | ||
576 | */ | ||
577 | fi->type = ARMFault_QEMU_SFault; | ||
578 | - result->page_size = sattrs.subpage ? 1 : TARGET_PAGE_SIZE; | ||
579 | - result->phys = address; | ||
580 | - result->prot = 0; | ||
581 | + result->f.lg_page_size = sattrs.subpage ? 0 : TARGET_PAGE_BITS; | ||
582 | + result->f.phys_addr = address; | ||
583 | + result->f.prot = 0; | ||
584 | return true; | ||
585 | } | ||
586 | } | ||
587 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav8(CPUARMState *env, uint32_t address, | ||
588 | ret = pmsav8_mpu_lookup(env, address, access_type, mmu_idx, secure, | ||
589 | result, fi, NULL); | ||
590 | if (sattrs.subpage) { | ||
591 | - result->page_size = 1; | ||
592 | + result->f.lg_page_size = 0; | ||
593 | } | ||
594 | return ret; | ||
595 | } | ||
596 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_disabled(CPUARMState *env, target_ulong address, | ||
597 | result->cacheattrs.is_s2_format = false; | ||
598 | } | ||
599 | |||
600 | - result->phys = address; | ||
601 | - result->prot = PAGE_READ | PAGE_WRITE | PAGE_EXEC; | ||
602 | - result->page_size = TARGET_PAGE_SIZE; | ||
603 | + result->f.phys_addr = address; | ||
604 | + result->f.prot = PAGE_READ | PAGE_WRITE | PAGE_EXEC; | ||
605 | + result->f.lg_page_size = TARGET_PAGE_BITS; | ||
606 | result->cacheattrs.shareability = shareability; | ||
607 | result->cacheattrs.attrs = memattr; | ||
608 | return 0; | ||
609 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr_with_secure(CPUARMState *env, target_ulong address, | ||
610 | return ret; | ||
611 | } | ||
612 | |||
613 | - ipa = result->phys; | ||
614 | - ipa_secure = result->attrs.secure; | ||
615 | + ipa = result->f.phys_addr; | ||
616 | + ipa_secure = result->f.attrs.secure; | ||
617 | if (is_secure) { | ||
618 | /* Select TCR based on the NS bit from the S1 walk. */ | ||
619 | s2walk_secure = !(ipa_secure | ||
620 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr_with_secure(CPUARMState *env, target_ulong address, | ||
621 | * Save the stage1 results so that we may merge | ||
622 | * prot and cacheattrs later. | ||
623 | */ | ||
624 | - s1_prot = result->prot; | ||
625 | + s1_prot = result->f.prot; | ||
626 | cacheattrs1 = result->cacheattrs; | ||
627 | memset(result, 0, sizeof(*result)); | ||
628 | |||
629 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr_with_secure(CPUARMState *env, target_ulong address, | ||
630 | fi->s2addr = ipa; | ||
631 | |||
632 | /* Combine the S1 and S2 perms. */ | ||
633 | - result->prot &= s1_prot; | ||
634 | + result->f.prot &= s1_prot; | ||
635 | |||
636 | /* If S2 fails, return early. */ | ||
637 | if (ret) { | ||
638 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr_with_secure(CPUARMState *env, target_ulong address, | ||
639 | * Check if IPA translates to secure or non-secure PA space. | ||
640 | * Note that VSTCR overrides VTCR and {N}SW overrides {N}SA. | ||
641 | */ | ||
642 | - result->attrs.secure = | ||
643 | + result->f.attrs.secure = | ||
644 | (is_secure | ||
645 | && !(env->cp15.vstcr_el2 & (VSTCR_SA | VSTCR_SW)) | ||
646 | && (ipa_secure | ||
647 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr_with_secure(CPUARMState *env, target_ulong address, | ||
648 | * cannot upgrade an non-secure translation regime's attributes | ||
649 | * to secure. | ||
650 | */ | ||
651 | - result->attrs.secure = is_secure; | ||
652 | - result->attrs.user = regime_is_user(env, mmu_idx); | ||
653 | + result->f.attrs.secure = is_secure; | ||
654 | + result->f.attrs.user = regime_is_user(env, mmu_idx); | ||
655 | |||
656 | /* | ||
657 | * Fast Context Switch Extension. This doesn't exist at all in v8. | ||
658 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr_with_secure(CPUARMState *env, target_ulong address, | ||
659 | |||
660 | if (arm_feature(env, ARM_FEATURE_PMSA)) { | ||
661 | bool ret; | ||
662 | - result->page_size = TARGET_PAGE_SIZE; | ||
663 | + result->f.lg_page_size = TARGET_PAGE_BITS; | ||
664 | |||
665 | if (arm_feature(env, ARM_FEATURE_V8)) { | ||
666 | /* PMSAv8 */ | ||
667 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr_with_secure(CPUARMState *env, target_ulong address, | ||
668 | (access_type == MMU_DATA_STORE ? "writing" : "execute"), | ||
669 | (uint32_t)address, mmu_idx, | ||
670 | ret ? "Miss" : "Hit", | ||
671 | - result->prot & PAGE_READ ? 'r' : '-', | ||
672 | - result->prot & PAGE_WRITE ? 'w' : '-', | ||
673 | - result->prot & PAGE_EXEC ? 'x' : '-'); | ||
674 | + result->f.prot & PAGE_READ ? 'r' : '-', | ||
675 | + result->f.prot & PAGE_WRITE ? 'w' : '-', | ||
676 | + result->f.prot & PAGE_EXEC ? 'x' : '-'); | ||
677 | |||
678 | return ret; | ||
679 | } | ||
680 | @@ -XXX,XX +XXX,XX @@ hwaddr arm_cpu_get_phys_page_attrs_debug(CPUState *cs, vaddr addr, | ||
681 | bool ret; | ||
682 | |||
683 | ret = get_phys_addr(env, addr, MMU_DATA_LOAD, mmu_idx, &res, &fi); | ||
684 | - *attrs = res.attrs; | ||
685 | + *attrs = res.f.attrs; | ||
686 | |||
687 | if (ret) { | ||
688 | return -1; | ||
689 | } | ||
690 | - return res.phys; | ||
691 | + return res.f.phys_addr; | ||
692 | } | ||
693 | diff --git a/target/arm/tlb_helper.c b/target/arm/tlb_helper.c | ||
694 | index XXXXXXX..XXXXXXX 100644 | ||
695 | --- a/target/arm/tlb_helper.c | ||
696 | +++ b/target/arm/tlb_helper.c | ||
697 | @@ -XXX,XX +XXX,XX @@ bool arm_cpu_tlb_fill(CPUState *cs, vaddr address, int size, | ||
698 | * target page size are handled specially, so for those we | ||
699 | * pass in the exact addresses. | ||
700 | */ | ||
701 | - if (res.page_size >= TARGET_PAGE_SIZE) { | ||
702 | - res.phys &= TARGET_PAGE_MASK; | ||
703 | + if (res.f.lg_page_size >= TARGET_PAGE_BITS) { | ||
704 | + res.f.phys_addr &= TARGET_PAGE_MASK; | ||
705 | address &= TARGET_PAGE_MASK; | ||
706 | } | ||
707 | /* Notice and record tagged memory. */ | ||
708 | if (cpu_isar_feature(aa64_mte, cpu) && res.cacheattrs.attrs == 0xf0) { | ||
709 | - arm_tlb_mte_tagged(&res.attrs) = true; | ||
710 | + arm_tlb_mte_tagged(&res.f.attrs) = true; | ||
711 | } | ||
712 | |||
713 | - tlb_set_page_with_attrs(cs, address, res.phys, res.attrs, | ||
714 | - res.prot, mmu_idx, res.page_size); | ||
715 | + tlb_set_page_full(cs, mmu_idx, address, &res.f); | ||
716 | return true; | ||
717 | } else if (probe) { | ||
718 | return false; | ||
33 | -- | 719 | -- |
34 | 2.20.1 | 720 | 2.25.1 |
35 | |||
36 | diff view generated by jsdifflib |
1 | From: Alex Chen <alex.chen@huawei.com> | 1 | From: Jerome Forissier <jerome.forissier@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | We should use printf format specifier "%u" instead of "%d" for | 3 | According to the Linux kernel booting.rst [1], CPTR_EL3.ESM and |
4 | argument of type "unsigned int". | 4 | SCR_EL3.EnTP2 must be initialized to 1 when EL3 is present and FEAT_SME |
5 | is advertised. This has to be taken care of when QEMU boots directly | ||
6 | into the kernel (i.e., "-M virt,secure=on -cpu max -kernel Image"). | ||
5 | 7 | ||
6 | Reported-by: Euler Robot <euler.robot@huawei.com> | 8 | Cc: qemu-stable@nongnu.org |
7 | Signed-off-by: Alex Chen <alex.chen@huawei.com> | 9 | Fixes: 78cb9776662a ("target/arm: Enable SME for -cpu max") |
8 | Message-id: 20201126111109.112238-4-alex.chen@huawei.com | 10 | Link: [1] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/Documentation/arm64/booting.rst?h=v6.0#n321 |
11 | Signed-off-by: Jerome Forissier <jerome.forissier@linaro.org> | ||
12 | Message-id: 20221003145641.1921467-1-jerome.forissier@linaro.org | ||
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 13 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 15 | --- |
12 | hw/misc/imx6_ccm.c | 20 ++++++++++---------- | 16 | hw/arm/boot.c | 4 ++++ |
13 | hw/misc/imx6_src.c | 2 +- | 17 | 1 file changed, 4 insertions(+) |
14 | 2 files changed, 11 insertions(+), 11 deletions(-) | ||
15 | 18 | ||
16 | diff --git a/hw/misc/imx6_ccm.c b/hw/misc/imx6_ccm.c | 19 | diff --git a/hw/arm/boot.c b/hw/arm/boot.c |
17 | index XXXXXXX..XXXXXXX 100644 | 20 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/hw/misc/imx6_ccm.c | 21 | --- a/hw/arm/boot.c |
19 | +++ b/hw/misc/imx6_ccm.c | 22 | +++ b/hw/arm/boot.c |
20 | @@ -XXX,XX +XXX,XX @@ static const char *imx6_ccm_reg_name(uint32_t reg) | 23 | @@ -XXX,XX +XXX,XX @@ static void do_cpu_reset(void *opaque) |
21 | case CCM_CMEOR: | 24 | if (cpu_isar_feature(aa64_sve, cpu)) { |
22 | return "CMEOR"; | 25 | env->cp15.cptr_el[3] |= R_CPTR_EL3_EZ_MASK; |
23 | default: | 26 | } |
24 | - sprintf(unknown, "%d ?", reg); | 27 | + if (cpu_isar_feature(aa64_sme, cpu)) { |
25 | + sprintf(unknown, "%u ?", reg); | 28 | + env->cp15.cptr_el[3] |= R_CPTR_EL3_ESM_MASK; |
26 | return unknown; | 29 | + env->cp15.scr_el3 |= SCR_ENTP2; |
27 | } | 30 | + } |
28 | } | 31 | /* AArch64 kernels never boot in secure mode */ |
29 | @@ -XXX,XX +XXX,XX @@ static const char *imx6_analog_reg_name(uint32_t reg) | 32 | assert(!info->secure_boot); |
30 | case USB_ANALOG_DIGPROG: | 33 | /* This hook is only supported for AArch32 currently: |
31 | return "USB_ANALOG_DIGPROG"; | ||
32 | default: | ||
33 | - sprintf(unknown, "%d ?", reg); | ||
34 | + sprintf(unknown, "%u ?", reg); | ||
35 | return unknown; | ||
36 | } | ||
37 | } | ||
38 | @@ -XXX,XX +XXX,XX @@ static uint64_t imx6_analog_get_pll2_clk(IMX6CCMState *dev) | ||
39 | freq *= 20; | ||
40 | } | ||
41 | |||
42 | - DPRINTF("freq = %d\n", (uint32_t)freq); | ||
43 | + DPRINTF("freq = %u\n", (uint32_t)freq); | ||
44 | |||
45 | return freq; | ||
46 | } | ||
47 | @@ -XXX,XX +XXX,XX @@ static uint64_t imx6_analog_get_pll2_pfd0_clk(IMX6CCMState *dev) | ||
48 | freq = imx6_analog_get_pll2_clk(dev) * 18 | ||
49 | / EXTRACT(dev->analog[CCM_ANALOG_PFD_528], PFD0_FRAC); | ||
50 | |||
51 | - DPRINTF("freq = %d\n", (uint32_t)freq); | ||
52 | + DPRINTF("freq = %u\n", (uint32_t)freq); | ||
53 | |||
54 | return freq; | ||
55 | } | ||
56 | @@ -XXX,XX +XXX,XX @@ static uint64_t imx6_analog_get_pll2_pfd2_clk(IMX6CCMState *dev) | ||
57 | freq = imx6_analog_get_pll2_clk(dev) * 18 | ||
58 | / EXTRACT(dev->analog[CCM_ANALOG_PFD_528], PFD2_FRAC); | ||
59 | |||
60 | - DPRINTF("freq = %d\n", (uint32_t)freq); | ||
61 | + DPRINTF("freq = %u\n", (uint32_t)freq); | ||
62 | |||
63 | return freq; | ||
64 | } | ||
65 | @@ -XXX,XX +XXX,XX @@ static uint64_t imx6_analog_get_periph_clk(IMX6CCMState *dev) | ||
66 | break; | ||
67 | } | ||
68 | |||
69 | - DPRINTF("freq = %d\n", (uint32_t)freq); | ||
70 | + DPRINTF("freq = %u\n", (uint32_t)freq); | ||
71 | |||
72 | return freq; | ||
73 | } | ||
74 | @@ -XXX,XX +XXX,XX @@ static uint64_t imx6_ccm_get_ahb_clk(IMX6CCMState *dev) | ||
75 | freq = imx6_analog_get_periph_clk(dev) | ||
76 | / (1 + EXTRACT(dev->ccm[CCM_CBCDR], AHB_PODF)); | ||
77 | |||
78 | - DPRINTF("freq = %d\n", (uint32_t)freq); | ||
79 | + DPRINTF("freq = %u\n", (uint32_t)freq); | ||
80 | |||
81 | return freq; | ||
82 | } | ||
83 | @@ -XXX,XX +XXX,XX @@ static uint64_t imx6_ccm_get_ipg_clk(IMX6CCMState *dev) | ||
84 | freq = imx6_ccm_get_ahb_clk(dev) | ||
85 | / (1 + EXTRACT(dev->ccm[CCM_CBCDR], IPG_PODF)); | ||
86 | |||
87 | - DPRINTF("freq = %d\n", (uint32_t)freq); | ||
88 | + DPRINTF("freq = %u\n", (uint32_t)freq); | ||
89 | |||
90 | return freq; | ||
91 | } | ||
92 | @@ -XXX,XX +XXX,XX @@ static uint64_t imx6_ccm_get_per_clk(IMX6CCMState *dev) | ||
93 | freq = imx6_ccm_get_ipg_clk(dev) | ||
94 | / (1 + EXTRACT(dev->ccm[CCM_CSCMR1], PERCLK_PODF)); | ||
95 | |||
96 | - DPRINTF("freq = %d\n", (uint32_t)freq); | ||
97 | + DPRINTF("freq = %u\n", (uint32_t)freq); | ||
98 | |||
99 | return freq; | ||
100 | } | ||
101 | @@ -XXX,XX +XXX,XX @@ static uint32_t imx6_ccm_get_clock_frequency(IMXCCMState *dev, IMXClk clock) | ||
102 | break; | ||
103 | } | ||
104 | |||
105 | - DPRINTF("Clock = %d) = %d\n", clock, freq); | ||
106 | + DPRINTF("Clock = %d) = %u\n", clock, freq); | ||
107 | |||
108 | return freq; | ||
109 | } | ||
110 | diff --git a/hw/misc/imx6_src.c b/hw/misc/imx6_src.c | ||
111 | index XXXXXXX..XXXXXXX 100644 | ||
112 | --- a/hw/misc/imx6_src.c | ||
113 | +++ b/hw/misc/imx6_src.c | ||
114 | @@ -XXX,XX +XXX,XX @@ static const char *imx6_src_reg_name(uint32_t reg) | ||
115 | case SRC_GPR10: | ||
116 | return "SRC_GPR10"; | ||
117 | default: | ||
118 | - sprintf(unknown, "%d ?", reg); | ||
119 | + sprintf(unknown, "%u ?", reg); | ||
120 | return unknown; | ||
121 | } | ||
122 | } | ||
123 | -- | 34 | -- |
124 | 2.20.1 | 35 | 2.25.1 |
125 | |||
126 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | In v8.1M the new CLRM instruction allows zeroing an arbitrary set of | ||
2 | the general-purpose registers and APSR. Implement this. | ||
3 | 1 | ||
4 | The encoding is a subset of the LDMIA T2 encoding, using what would | ||
5 | be Rn=0b1111 (which UNDEFs for LDMIA). | ||
6 | |||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Message-id: 20201119215617.29887-6-peter.maydell@linaro.org | ||
10 | --- | ||
11 | target/arm/t32.decode | 6 +++++- | ||
12 | target/arm/translate.c | 38 ++++++++++++++++++++++++++++++++++++++ | ||
13 | 2 files changed, 43 insertions(+), 1 deletion(-) | ||
14 | |||
15 | diff --git a/target/arm/t32.decode b/target/arm/t32.decode | ||
16 | index XXXXXXX..XXXXXXX 100644 | ||
17 | --- a/target/arm/t32.decode | ||
18 | +++ b/target/arm/t32.decode | ||
19 | @@ -XXX,XX +XXX,XX @@ UXTAB 1111 1010 0101 .... 1111 .... 10.. .... @rrr_rot | ||
20 | |||
21 | STM_t32 1110 1000 10.0 .... ................ @ldstm i=1 b=0 | ||
22 | STM_t32 1110 1001 00.0 .... ................ @ldstm i=0 b=1 | ||
23 | -LDM_t32 1110 1000 10.1 .... ................ @ldstm i=1 b=0 | ||
24 | +{ | ||
25 | + # Rn=15 UNDEFs for LDM; M-profile CLRM uses that encoding | ||
26 | + CLRM 1110 1000 1001 1111 list:16 | ||
27 | + LDM_t32 1110 1000 10.1 .... ................ @ldstm i=1 b=0 | ||
28 | +} | ||
29 | LDM_t32 1110 1001 00.1 .... ................ @ldstm i=0 b=1 | ||
30 | |||
31 | &rfe !extern rn w pu | ||
32 | diff --git a/target/arm/translate.c b/target/arm/translate.c | ||
33 | index XXXXXXX..XXXXXXX 100644 | ||
34 | --- a/target/arm/translate.c | ||
35 | +++ b/target/arm/translate.c | ||
36 | @@ -XXX,XX +XXX,XX @@ static bool trans_LDM_t16(DisasContext *s, arg_ldst_block *a) | ||
37 | return do_ldm(s, a, 1); | ||
38 | } | ||
39 | |||
40 | +static bool trans_CLRM(DisasContext *s, arg_CLRM *a) | ||
41 | +{ | ||
42 | + int i; | ||
43 | + TCGv_i32 zero; | ||
44 | + | ||
45 | + if (!dc_isar_feature(aa32_m_sec_state, s)) { | ||
46 | + return false; | ||
47 | + } | ||
48 | + | ||
49 | + if (extract32(a->list, 13, 1)) { | ||
50 | + return false; | ||
51 | + } | ||
52 | + | ||
53 | + if (!a->list) { | ||
54 | + /* UNPREDICTABLE; we choose to UNDEF */ | ||
55 | + return false; | ||
56 | + } | ||
57 | + | ||
58 | + zero = tcg_const_i32(0); | ||
59 | + for (i = 0; i < 15; i++) { | ||
60 | + if (extract32(a->list, i, 1)) { | ||
61 | + /* Clear R[i] */ | ||
62 | + tcg_gen_mov_i32(cpu_R[i], zero); | ||
63 | + } | ||
64 | + } | ||
65 | + if (extract32(a->list, 15, 1)) { | ||
66 | + /* | ||
67 | + * Clear APSR (by calling the MSR helper with the same argument | ||
68 | + * as for "MSR APSR_nzcvqg, Rn": mask = 0b1100, SYSM=0) | ||
69 | + */ | ||
70 | + TCGv_i32 maskreg = tcg_const_i32(0xc << 8); | ||
71 | + gen_helper_v7m_msr(cpu_env, maskreg, zero); | ||
72 | + tcg_temp_free_i32(maskreg); | ||
73 | + } | ||
74 | + tcg_temp_free_i32(zero); | ||
75 | + return true; | ||
76 | +} | ||
77 | + | ||
78 | /* | ||
79 | * Branch, branch with link | ||
80 | */ | ||
81 | -- | ||
82 | 2.20.1 | ||
83 | |||
84 | diff view generated by jsdifflib |
1 | For v8.1M the architecture mandates that CPUs must provide at | 1 | Arm CPUs support some subset of the granule (page) sizes 4K, 16K and |
---|---|---|---|
2 | least the "minimal RAS implementation" from the Reliability, | 2 | 64K. The guest selects the one it wants using bits in the TCR_ELx |
3 | Availability and Serviceability extension. This consists of: | 3 | registers. If it tries to program these registers with a value that |
4 | * an ESB instruction which is a NOP | 4 | is either reserved or which requests a size that the CPU does not |
5 | -- since it is in the HINT space we need only add a comment | 5 | implement, the architecture requires that the CPU behaves as if the |
6 | * an RFSR register which will RAZ/WI | 6 | field was programmed to some size that has been implemented. |
7 | * a RAZ/WI AIRCR.IESB bit | 7 | Currently we don't implement this, and instead let the guest use any |
8 | -- the code which handles writes to AIRCR does not allow setting | 8 | granule size, even if the CPU ID register fields say it isn't |
9 | of RES0 bits, so we already treat this as RAZ/WI; add a comment | 9 | present. |
10 | noting that this is deliberate | 10 | |
11 | * minimal implementation of the RAS register block at 0xe0005000 | 11 | Make aa64_va_parameters() check against the supported granule size |
12 | -- this will be in a subsequent commit | 12 | and force use of a different one if it is not implemented. |
13 | * setting the ID_PFR0.RAS field to 0b0010 | 13 | |
14 | -- we will do this when we add the Cortex-M55 CPU model | 14 | (A subsequent commit will make ARMVAParameters use the new enum |
15 | 15 | rather than the current pair of using16k/using64k bools.) | |
16 | |||
17 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 18 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
17 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 19 | Message-id: 20221003162315.2833797-2-peter.maydell@linaro.org |
18 | Message-id: 20201119215617.29887-26-peter.maydell@linaro.org | ||
19 | --- | 20 | --- |
20 | target/arm/cpu.h | 14 ++++++++++++++ | 21 | target/arm/cpu.h | 33 +++++++++++++ |
21 | target/arm/t32.decode | 4 ++++ | 22 | target/arm/internals.h | 9 ++++ |
22 | hw/intc/armv7m_nvic.c | 13 +++++++++++++ | 23 | target/arm/helper.c | 102 +++++++++++++++++++++++++++++++++++++---- |
23 | 3 files changed, 31 insertions(+) | 24 | 3 files changed, 136 insertions(+), 8 deletions(-) |
24 | 25 | ||
25 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 26 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
26 | index XXXXXXX..XXXXXXX 100644 | 27 | index XXXXXXX..XXXXXXX 100644 |
27 | --- a/target/arm/cpu.h | 28 | --- a/target/arm/cpu.h |
28 | +++ b/target/arm/cpu.h | 29 | +++ b/target/arm/cpu.h |
29 | @@ -XXX,XX +XXX,XX @@ FIELD(ID_MMFR4, LSM, 20, 4) | 30 | @@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_tgran16_2_lpa2(const ARMISARegisters *id) |
30 | FIELD(ID_MMFR4, CCIDX, 24, 4) | 31 | return t >= 3 || (t == 0 && isar_feature_aa64_tgran16_lpa2(id)); |
31 | FIELD(ID_MMFR4, EVT, 28, 4) | ||
32 | |||
33 | +FIELD(ID_PFR0, STATE0, 0, 4) | ||
34 | +FIELD(ID_PFR0, STATE1, 4, 4) | ||
35 | +FIELD(ID_PFR0, STATE2, 8, 4) | ||
36 | +FIELD(ID_PFR0, STATE3, 12, 4) | ||
37 | +FIELD(ID_PFR0, CSV2, 16, 4) | ||
38 | +FIELD(ID_PFR0, AMU, 20, 4) | ||
39 | +FIELD(ID_PFR0, DIT, 24, 4) | ||
40 | +FIELD(ID_PFR0, RAS, 28, 4) | ||
41 | + | ||
42 | FIELD(ID_PFR1, PROGMOD, 0, 4) | ||
43 | FIELD(ID_PFR1, SECURITY, 4, 4) | ||
44 | FIELD(ID_PFR1, MPROGMOD, 8, 4) | ||
45 | @@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa32_predinv(const ARMISARegisters *id) | ||
46 | return FIELD_EX32(id->id_isar6, ID_ISAR6, SPECRES) != 0; | ||
47 | } | 32 | } |
48 | 33 | ||
49 | +static inline bool isar_feature_aa32_ras(const ARMISARegisters *id) | 34 | +static inline bool isar_feature_aa64_tgran4(const ARMISARegisters *id) |
50 | +{ | 35 | +{ |
51 | + return FIELD_EX32(id->id_pfr0, ID_PFR0, RAS) != 0; | 36 | + return FIELD_SEX64(id->id_aa64mmfr0, ID_AA64MMFR0, TGRAN4) >= 0; |
52 | +} | 37 | +} |
53 | + | 38 | + |
54 | static inline bool isar_feature_aa32_mprofile(const ARMISARegisters *id) | 39 | +static inline bool isar_feature_aa64_tgran16(const ARMISARegisters *id) |
40 | +{ | ||
41 | + return FIELD_EX64(id->id_aa64mmfr0, ID_AA64MMFR0, TGRAN16) >= 1; | ||
42 | +} | ||
43 | + | ||
44 | +static inline bool isar_feature_aa64_tgran64(const ARMISARegisters *id) | ||
45 | +{ | ||
46 | + return FIELD_SEX64(id->id_aa64mmfr0, ID_AA64MMFR0, TGRAN64) >= 0; | ||
47 | +} | ||
48 | + | ||
49 | +static inline bool isar_feature_aa64_tgran4_2(const ARMISARegisters *id) | ||
50 | +{ | ||
51 | + unsigned t = FIELD_EX64(id->id_aa64mmfr0, ID_AA64MMFR0, TGRAN4_2); | ||
52 | + return t >= 2 || (t == 0 && isar_feature_aa64_tgran4(id)); | ||
53 | +} | ||
54 | + | ||
55 | +static inline bool isar_feature_aa64_tgran16_2(const ARMISARegisters *id) | ||
56 | +{ | ||
57 | + unsigned t = FIELD_EX64(id->id_aa64mmfr0, ID_AA64MMFR0, TGRAN16_2); | ||
58 | + return t >= 2 || (t == 0 && isar_feature_aa64_tgran16(id)); | ||
59 | +} | ||
60 | + | ||
61 | +static inline bool isar_feature_aa64_tgran64_2(const ARMISARegisters *id) | ||
62 | +{ | ||
63 | + unsigned t = FIELD_EX64(id->id_aa64mmfr0, ID_AA64MMFR0, TGRAN64_2); | ||
64 | + return t >= 2 || (t == 0 && isar_feature_aa64_tgran64(id)); | ||
65 | +} | ||
66 | + | ||
67 | static inline bool isar_feature_aa64_ccidx(const ARMISARegisters *id) | ||
55 | { | 68 | { |
56 | return FIELD_EX32(id->id_pfr1, ID_PFR1, MPROGMOD) != 0; | 69 | return FIELD_EX64(id->id_aa64mmfr2, ID_AA64MMFR2, CCIDX) != 0; |
57 | diff --git a/target/arm/t32.decode b/target/arm/t32.decode | 70 | diff --git a/target/arm/internals.h b/target/arm/internals.h |
58 | index XXXXXXX..XXXXXXX 100644 | 71 | index XXXXXXX..XXXXXXX 100644 |
59 | --- a/target/arm/t32.decode | 72 | --- a/target/arm/internals.h |
60 | +++ b/target/arm/t32.decode | 73 | +++ b/target/arm/internals.h |
61 | @@ -XXX,XX +XXX,XX @@ CLZ 1111 1010 1011 ---- 1111 .... 1000 .... @rdm | 74 | @@ -XXX,XX +XXX,XX @@ static inline uint32_t aarch64_pstate_valid_mask(const ARMISARegisters *id) |
62 | # SEV 1111 0011 1010 1111 1000 0000 0000 0100 | 75 | return valid; |
63 | # SEVL 1111 0011 1010 1111 1000 0000 0000 0101 | 76 | } |
64 | 77 | ||
65 | + # For M-profile minimal-RAS ESB can be a NOP, which is the | 78 | +/* Granule size (i.e. page size) */ |
66 | + # default behaviour since it is in the hint space. | 79 | +typedef enum ARMGranuleSize { |
67 | + # ESB 1111 0011 1010 1111 1000 0000 0001 0000 | 80 | + /* Same order as TG0 encoding */ |
68 | + | 81 | + Gran4K, |
69 | # The canonical nop ends in 0000 0000, but the whole rest | 82 | + Gran64K, |
70 | # of the space is "reserved hint, behaves as nop". | 83 | + Gran16K, |
71 | NOP 1111 0011 1010 1111 1000 0000 ---- ---- | 84 | + GranInvalid, |
72 | diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c | 85 | +} ARMGranuleSize; |
86 | + | ||
87 | /* | ||
88 | * Parameters of a given virtual address, as extracted from the | ||
89 | * translation control register (TCR) for a given regime. | ||
90 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
73 | index XXXXXXX..XXXXXXX 100644 | 91 | index XXXXXXX..XXXXXXX 100644 |
74 | --- a/hw/intc/armv7m_nvic.c | 92 | --- a/target/arm/helper.c |
75 | +++ b/hw/intc/armv7m_nvic.c | 93 | +++ b/target/arm/helper.c |
76 | @@ -XXX,XX +XXX,XX @@ static uint32_t nvic_readl(NVICState *s, uint32_t offset, MemTxAttrs attrs) | 94 | @@ -XXX,XX +XXX,XX @@ static int aa64_va_parameter_tcma(uint64_t tcr, ARMMMUIdx mmu_idx) |
77 | return 0; | 95 | } |
78 | } | 96 | } |
79 | return cpu->env.v7m.sfar; | 97 | |
80 | + case 0xf04: /* RFSR */ | 98 | +static ARMGranuleSize tg0_to_gran_size(int tg) |
81 | + if (!cpu_isar_feature(aa32_ras, cpu)) { | 99 | +{ |
82 | + goto bad_offset; | 100 | + switch (tg) { |
101 | + case 0: | ||
102 | + return Gran4K; | ||
103 | + case 1: | ||
104 | + return Gran64K; | ||
105 | + case 2: | ||
106 | + return Gran16K; | ||
107 | + default: | ||
108 | + return GranInvalid; | ||
109 | + } | ||
110 | +} | ||
111 | + | ||
112 | +static ARMGranuleSize tg1_to_gran_size(int tg) | ||
113 | +{ | ||
114 | + switch (tg) { | ||
115 | + case 1: | ||
116 | + return Gran16K; | ||
117 | + case 2: | ||
118 | + return Gran4K; | ||
119 | + case 3: | ||
120 | + return Gran64K; | ||
121 | + default: | ||
122 | + return GranInvalid; | ||
123 | + } | ||
124 | +} | ||
125 | + | ||
126 | +static inline bool have4k(ARMCPU *cpu, bool stage2) | ||
127 | +{ | ||
128 | + return stage2 ? cpu_isar_feature(aa64_tgran4_2, cpu) | ||
129 | + : cpu_isar_feature(aa64_tgran4, cpu); | ||
130 | +} | ||
131 | + | ||
132 | +static inline bool have16k(ARMCPU *cpu, bool stage2) | ||
133 | +{ | ||
134 | + return stage2 ? cpu_isar_feature(aa64_tgran16_2, cpu) | ||
135 | + : cpu_isar_feature(aa64_tgran16, cpu); | ||
136 | +} | ||
137 | + | ||
138 | +static inline bool have64k(ARMCPU *cpu, bool stage2) | ||
139 | +{ | ||
140 | + return stage2 ? cpu_isar_feature(aa64_tgran64_2, cpu) | ||
141 | + : cpu_isar_feature(aa64_tgran64, cpu); | ||
142 | +} | ||
143 | + | ||
144 | +static ARMGranuleSize sanitize_gran_size(ARMCPU *cpu, ARMGranuleSize gran, | ||
145 | + bool stage2) | ||
146 | +{ | ||
147 | + switch (gran) { | ||
148 | + case Gran4K: | ||
149 | + if (have4k(cpu, stage2)) { | ||
150 | + return gran; | ||
83 | + } | 151 | + } |
84 | + /* We provide minimal-RAS only: RFSR is RAZ/WI */ | 152 | + break; |
85 | + return 0; | 153 | + case Gran16K: |
86 | case 0xf34: /* FPCCR */ | 154 | + if (have16k(cpu, stage2)) { |
87 | if (!cpu_isar_feature(aa32_vfp_simd, cpu)) { | 155 | + return gran; |
88 | return 0; | 156 | + } |
89 | @@ -XXX,XX +XXX,XX @@ static void nvic_writel(NVICState *s, uint32_t offset, uint32_t value, | 157 | + break; |
90 | R_V7M_AIRCR_PRIGROUP_SHIFT, | 158 | + case Gran64K: |
91 | R_V7M_AIRCR_PRIGROUP_LENGTH); | 159 | + if (have64k(cpu, stage2)) { |
92 | } | 160 | + return gran; |
93 | + /* AIRCR.IESB is RAZ/WI because we implement only minimal RAS */ | 161 | + } |
94 | if (attrs.secure) { | 162 | + break; |
95 | /* These bits are only writable by secure */ | 163 | + case GranInvalid: |
96 | cpu->env.v7m.aircr = value & | 164 | + break; |
97 | @@ -XXX,XX +XXX,XX @@ static void nvic_writel(NVICState *s, uint32_t offset, uint32_t value, | 165 | + } |
98 | } | 166 | + /* |
99 | break; | 167 | + * If the guest selects a granule size that isn't implemented, |
168 | + * the architecture requires that we behave as if it selected one | ||
169 | + * that is (with an IMPDEF choice of which one to pick). We choose | ||
170 | + * to implement the smallest supported granule size. | ||
171 | + */ | ||
172 | + if (have4k(cpu, stage2)) { | ||
173 | + return Gran4K; | ||
174 | + } | ||
175 | + if (have16k(cpu, stage2)) { | ||
176 | + return Gran16K; | ||
177 | + } | ||
178 | + assert(have64k(cpu, stage2)); | ||
179 | + return Gran64K; | ||
180 | +} | ||
181 | + | ||
182 | ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
183 | ARMMMUIdx mmu_idx, bool data) | ||
184 | { | ||
185 | uint64_t tcr = regime_tcr(env, mmu_idx); | ||
186 | bool epd, hpd, using16k, using64k, tsz_oob, ds; | ||
187 | int select, tsz, tbi, max_tsz, min_tsz, ps, sh; | ||
188 | + ARMGranuleSize gran; | ||
189 | ARMCPU *cpu = env_archcpu(env); | ||
190 | + bool stage2 = mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S; | ||
191 | |||
192 | if (!regime_has_2_ranges(mmu_idx)) { | ||
193 | select = 0; | ||
194 | tsz = extract32(tcr, 0, 6); | ||
195 | - using64k = extract32(tcr, 14, 1); | ||
196 | - using16k = extract32(tcr, 15, 1); | ||
197 | - if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
198 | + gran = tg0_to_gran_size(extract32(tcr, 14, 2)); | ||
199 | + if (stage2) { | ||
200 | /* VTCR_EL2 */ | ||
201 | hpd = false; | ||
202 | } else { | ||
203 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
204 | select = extract64(va, 55, 1); | ||
205 | if (!select) { | ||
206 | tsz = extract32(tcr, 0, 6); | ||
207 | + gran = tg0_to_gran_size(extract32(tcr, 14, 2)); | ||
208 | epd = extract32(tcr, 7, 1); | ||
209 | sh = extract32(tcr, 12, 2); | ||
210 | - using64k = extract32(tcr, 14, 1); | ||
211 | - using16k = extract32(tcr, 15, 1); | ||
212 | hpd = extract64(tcr, 41, 1); | ||
213 | } else { | ||
214 | - int tg = extract32(tcr, 30, 2); | ||
215 | - using16k = tg == 1; | ||
216 | - using64k = tg == 3; | ||
217 | tsz = extract32(tcr, 16, 6); | ||
218 | + gran = tg1_to_gran_size(extract32(tcr, 30, 2)); | ||
219 | epd = extract32(tcr, 23, 1); | ||
220 | sh = extract32(tcr, 28, 2); | ||
221 | hpd = extract64(tcr, 42, 1); | ||
222 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
223 | ds = extract64(tcr, 59, 1); | ||
100 | } | 224 | } |
101 | + case 0xf04: /* RFSR */ | 225 | |
102 | + if (!cpu_isar_feature(aa32_ras, cpu)) { | 226 | + gran = sanitize_gran_size(cpu, gran, stage2); |
103 | + goto bad_offset; | 227 | + using64k = gran == Gran64K; |
104 | + } | 228 | + using16k = gran == Gran16K; |
105 | + /* We provide minimal-RAS only: RFSR is RAZ/WI */ | 229 | + |
106 | + break; | 230 | if (cpu_isar_feature(aa64_st, cpu)) { |
107 | case 0xf34: /* FPCCR */ | 231 | max_tsz = 48 - using64k; |
108 | if (cpu_isar_feature(aa32_vfp_simd, cpu)) { | 232 | } else { |
109 | /* Not all bits here are banked. */ | ||
110 | -- | 233 | -- |
111 | 2.20.1 | 234 | 2.25.1 |
112 | |||
113 | diff view generated by jsdifflib |
1 | Currently M-profile borrows the A-profile code for VMSR and VMRS | 1 | Now we have an enum for the granule size, use it in the |
---|---|---|---|
2 | (access to the FP system registers), because all it needs to support | 2 | ARMVAParameters struct instead of the using16k/using64k bools. |
3 | is the FPSCR. In v8.1M things become significantly more complicated | ||
4 | in two ways: | ||
5 | |||
6 | * there are several new FP system registers; some have side effects | ||
7 | on read, and one (FPCXT_NS) needs to avoid the usual | ||
8 | vfp_access_check() and the "only if FPU implemented" check | ||
9 | |||
10 | * all sysregs are now accessible both by VMRS/VMSR (which | ||
11 | reads/writes a general purpose register) and also by VLDR/VSTR | ||
12 | (which reads/writes them directly to memory) | ||
13 | |||
14 | Refactor the structure of how we handle VMSR/VMRS to cope with this: | ||
15 | |||
16 | * keep the M-profile code entirely separate from the A-profile code | ||
17 | |||
18 | * abstract out the "read or write the general purpose register" part | ||
19 | of the code into a loadfn or storefn function pointer, so we can | ||
20 | reuse it for VLDR/VSTR. | ||
21 | 3 | ||
22 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
23 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 5 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
24 | Message-id: 20201119215617.29887-8-peter.maydell@linaro.org | 6 | Message-id: 20221003162315.2833797-3-peter.maydell@linaro.org |
25 | --- | 7 | --- |
26 | target/arm/cpu.h | 3 + | 8 | target/arm/internals.h | 23 +++++++++++++++++++++-- |
27 | target/arm/translate-vfp.c.inc | 182 ++++++++++++++++++++++++++++++--- | 9 | target/arm/helper.c | 39 ++++++++++++++++++++++++++++----------- |
28 | 2 files changed, 171 insertions(+), 14 deletions(-) | 10 | target/arm/ptw.c | 8 +------- |
11 | 3 files changed, 50 insertions(+), 20 deletions(-) | ||
29 | 12 | ||
30 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 13 | diff --git a/target/arm/internals.h b/target/arm/internals.h |
31 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
32 | --- a/target/arm/cpu.h | 15 | --- a/target/arm/internals.h |
33 | +++ b/target/arm/cpu.h | 16 | +++ b/target/arm/internals.h |
34 | @@ -XXX,XX +XXX,XX @@ enum arm_cpu_mode { | 17 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMGranuleSize { |
35 | #define ARM_VFP_FPINST 9 | 18 | GranInvalid, |
36 | #define ARM_VFP_FPINST2 10 | 19 | } ARMGranuleSize; |
37 | 20 | ||
38 | +/* QEMU-internal value meaning "FPSCR, but we care only about NZCV" */ | 21 | +/** |
39 | +#define QEMU_VFP_FPSCR_NZCV 0xffff | 22 | + * arm_granule_bits: Return address size of the granule in bits |
40 | + | 23 | + * |
41 | /* iwMMXt coprocessor control registers. */ | 24 | + * Return the address size of the granule in bits. This corresponds |
42 | #define ARM_IWMMXT_wCID 0 | 25 | + * to the pseudocode TGxGranuleBits(). |
43 | #define ARM_IWMMXT_wCon 1 | ||
44 | diff --git a/target/arm/translate-vfp.c.inc b/target/arm/translate-vfp.c.inc | ||
45 | index XXXXXXX..XXXXXXX 100644 | ||
46 | --- a/target/arm/translate-vfp.c.inc | ||
47 | +++ b/target/arm/translate-vfp.c.inc | ||
48 | @@ -XXX,XX +XXX,XX @@ static bool trans_VDUP(DisasContext *s, arg_VDUP *a) | ||
49 | return true; | ||
50 | } | ||
51 | |||
52 | +/* | ||
53 | + * M-profile provides two different sets of instructions that can | ||
54 | + * access floating point system registers: VMSR/VMRS (which move | ||
55 | + * to/from a general purpose register) and VLDR/VSTR sysreg (which | ||
56 | + * move directly to/from memory). In some cases there are also side | ||
57 | + * effects which must happen after any write to memory (which could | ||
58 | + * cause an exception). So we implement the common logic for the | ||
59 | + * sysreg access in gen_M_fp_sysreg_write() and gen_M_fp_sysreg_read(), | ||
60 | + * which take pointers to callback functions which will perform the | ||
61 | + * actual "read/write general purpose register" and "read/write | ||
62 | + * memory" operations. | ||
63 | + */ | 26 | + */ |
64 | + | 27 | +static inline int arm_granule_bits(ARMGranuleSize gran) |
65 | +/* | ||
66 | + * Emit code to store the sysreg to its final destination; frees the | ||
67 | + * TCG temp 'value' it is passed. | ||
68 | + */ | ||
69 | +typedef void fp_sysreg_storefn(DisasContext *s, void *opaque, TCGv_i32 value); | ||
70 | +/* | ||
71 | + * Emit code to load the value to be copied to the sysreg; returns | ||
72 | + * a new TCG temporary | ||
73 | + */ | ||
74 | +typedef TCGv_i32 fp_sysreg_loadfn(DisasContext *s, void *opaque); | ||
75 | + | ||
76 | +/* Common decode/access checks for fp sysreg read/write */ | ||
77 | +typedef enum FPSysRegCheckResult { | ||
78 | + FPSysRegCheckFailed, /* caller should return false */ | ||
79 | + FPSysRegCheckDone, /* caller should return true */ | ||
80 | + FPSysRegCheckContinue, /* caller should continue generating code */ | ||
81 | +} FPSysRegCheckResult; | ||
82 | + | ||
83 | +static FPSysRegCheckResult fp_sysreg_checks(DisasContext *s, int regno) | ||
84 | +{ | 28 | +{ |
85 | + if (!dc_isar_feature(aa32_fpsp_v2, s)) { | 29 | + switch (gran) { |
86 | + return FPSysRegCheckFailed; | 30 | + case Gran64K: |
87 | + } | 31 | + return 16; |
88 | + | 32 | + case Gran16K: |
89 | + switch (regno) { | 33 | + return 14; |
90 | + case ARM_VFP_FPSCR: | 34 | + case Gran4K: |
91 | + case QEMU_VFP_FPSCR_NZCV: | 35 | + return 12; |
92 | + break; | ||
93 | + default: | ||
94 | + return FPSysRegCheckFailed; | ||
95 | + } | ||
96 | + | ||
97 | + if (!vfp_access_check(s)) { | ||
98 | + return FPSysRegCheckDone; | ||
99 | + } | ||
100 | + | ||
101 | + return FPSysRegCheckContinue; | ||
102 | +} | ||
103 | + | ||
104 | +static bool gen_M_fp_sysreg_write(DisasContext *s, int regno, | ||
105 | + | ||
106 | + fp_sysreg_loadfn *loadfn, | ||
107 | + void *opaque) | ||
108 | +{ | ||
109 | + /* Do a write to an M-profile floating point system register */ | ||
110 | + TCGv_i32 tmp; | ||
111 | + | ||
112 | + switch (fp_sysreg_checks(s, regno)) { | ||
113 | + case FPSysRegCheckFailed: | ||
114 | + return false; | ||
115 | + case FPSysRegCheckDone: | ||
116 | + return true; | ||
117 | + case FPSysRegCheckContinue: | ||
118 | + break; | ||
119 | + } | ||
120 | + | ||
121 | + switch (regno) { | ||
122 | + case ARM_VFP_FPSCR: | ||
123 | + tmp = loadfn(s, opaque); | ||
124 | + gen_helper_vfp_set_fpscr(cpu_env, tmp); | ||
125 | + tcg_temp_free_i32(tmp); | ||
126 | + gen_lookup_tb(s); | ||
127 | + break; | ||
128 | + default: | 36 | + default: |
129 | + g_assert_not_reached(); | 37 | + g_assert_not_reached(); |
130 | + } | 38 | + } |
131 | + return true; | ||
132 | +} | 39 | +} |
133 | + | 40 | + |
134 | +static bool gen_M_fp_sysreg_read(DisasContext *s, int regno, | 41 | /* |
135 | + fp_sysreg_storefn *storefn, | 42 | * Parameters of a given virtual address, as extracted from the |
136 | + void *opaque) | 43 | * translation control register (TCR) for a given regime. |
44 | @@ -XXX,XX +XXX,XX @@ typedef struct ARMVAParameters { | ||
45 | bool tbi : 1; | ||
46 | bool epd : 1; | ||
47 | bool hpd : 1; | ||
48 | - bool using16k : 1; | ||
49 | - bool using64k : 1; | ||
50 | bool tsz_oob : 1; /* tsz has been clamped to legal range */ | ||
51 | bool ds : 1; | ||
52 | + ARMGranuleSize gran : 2; | ||
53 | } ARMVAParameters; | ||
54 | |||
55 | ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
56 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
57 | index XXXXXXX..XXXXXXX 100644 | ||
58 | --- a/target/arm/helper.c | ||
59 | +++ b/target/arm/helper.c | ||
60 | @@ -XXX,XX +XXX,XX @@ typedef struct { | ||
61 | uint64_t length; | ||
62 | } TLBIRange; | ||
63 | |||
64 | +static ARMGranuleSize tlbi_range_tg_to_gran_size(int tg) | ||
137 | +{ | 65 | +{ |
138 | + /* Do a read from an M-profile floating point system register */ | 66 | + /* |
139 | + TCGv_i32 tmp; | 67 | + * Note that the TLBI range TG field encoding differs from both |
140 | + | 68 | + * TG0 and TG1 encodings. |
141 | + switch (fp_sysreg_checks(s, regno)) { | 69 | + */ |
142 | + case FPSysRegCheckFailed: | 70 | + switch (tg) { |
143 | + return false; | 71 | + case 1: |
144 | + case FPSysRegCheckDone: | 72 | + return Gran4K; |
145 | + return true; | 73 | + case 2: |
146 | + case FPSysRegCheckContinue: | 74 | + return Gran16K; |
147 | + break; | 75 | + case 3: |
148 | + } | 76 | + return Gran64K; |
149 | + | ||
150 | + switch (regno) { | ||
151 | + case ARM_VFP_FPSCR: | ||
152 | + tmp = tcg_temp_new_i32(); | ||
153 | + gen_helper_vfp_get_fpscr(tmp, cpu_env); | ||
154 | + storefn(s, opaque, tmp); | ||
155 | + break; | ||
156 | + case QEMU_VFP_FPSCR_NZCV: | ||
157 | + /* | ||
158 | + * Read just NZCV; this is a special case to avoid the | ||
159 | + * helper call for the "VMRS to CPSR.NZCV" insn. | ||
160 | + */ | ||
161 | + tmp = load_cpu_field(vfp.xregs[ARM_VFP_FPSCR]); | ||
162 | + tcg_gen_andi_i32(tmp, tmp, 0xf0000000); | ||
163 | + storefn(s, opaque, tmp); | ||
164 | + break; | ||
165 | + default: | 77 | + default: |
166 | + g_assert_not_reached(); | 78 | + return GranInvalid; |
167 | + } | ||
168 | + return true; | ||
169 | +} | ||
170 | + | ||
171 | +static void fp_sysreg_to_gpr(DisasContext *s, void *opaque, TCGv_i32 value) | ||
172 | +{ | ||
173 | + arg_VMSR_VMRS *a = opaque; | ||
174 | + | ||
175 | + if (a->rt == 15) { | ||
176 | + /* Set the 4 flag bits in the CPSR */ | ||
177 | + gen_set_nzcv(value); | ||
178 | + tcg_temp_free_i32(value); | ||
179 | + } else { | ||
180 | + store_reg(s, a->rt, value); | ||
181 | + } | 79 | + } |
182 | +} | 80 | +} |
183 | + | 81 | + |
184 | +static TCGv_i32 gpr_to_fp_sysreg(DisasContext *s, void *opaque) | 82 | static TLBIRange tlbi_aa64_get_range(CPUARMState *env, ARMMMUIdx mmuidx, |
185 | +{ | 83 | uint64_t value) |
186 | + arg_VMSR_VMRS *a = opaque; | ||
187 | + | ||
188 | + return load_reg(s, a->rt); | ||
189 | +} | ||
190 | + | ||
191 | +static bool gen_M_VMSR_VMRS(DisasContext *s, arg_VMSR_VMRS *a) | ||
192 | +{ | ||
193 | + /* | ||
194 | + * Accesses to R15 are UNPREDICTABLE; we choose to undef. | ||
195 | + * FPSCR -> r15 is a special case which writes to the PSR flags; | ||
196 | + * set a->reg to a special value to tell gen_M_fp_sysreg_read() | ||
197 | + * we only care about the top 4 bits of FPSCR there. | ||
198 | + */ | ||
199 | + if (a->rt == 15) { | ||
200 | + if (a->l && a->reg == ARM_VFP_FPSCR) { | ||
201 | + a->reg = QEMU_VFP_FPSCR_NZCV; | ||
202 | + } else { | ||
203 | + return false; | ||
204 | + } | ||
205 | + } | ||
206 | + | ||
207 | + if (a->l) { | ||
208 | + /* VMRS, move FP system register to gp register */ | ||
209 | + return gen_M_fp_sysreg_read(s, a->reg, fp_sysreg_to_gpr, a); | ||
210 | + } else { | ||
211 | + /* VMSR, move gp register to FP system register */ | ||
212 | + return gen_M_fp_sysreg_write(s, a->reg, gpr_to_fp_sysreg, a); | ||
213 | + } | ||
214 | +} | ||
215 | + | ||
216 | static bool trans_VMSR_VMRS(DisasContext *s, arg_VMSR_VMRS *a) | ||
217 | { | 84 | { |
218 | TCGv_i32 tmp; | 85 | @@ -XXX,XX +XXX,XX @@ static TLBIRange tlbi_aa64_get_range(CPUARMState *env, ARMMMUIdx mmuidx, |
219 | bool ignore_vfp_enabled = false; | 86 | uint64_t select = sextract64(value, 36, 1); |
220 | 87 | ARMVAParameters param = aa64_va_parameters(env, select, mmuidx, true); | |
221 | - if (!dc_isar_feature(aa32_fpsp_v2, s)) { | 88 | TLBIRange ret = { }; |
222 | - return false; | 89 | + ARMGranuleSize gran; |
223 | + if (arm_dc_feature(s, ARM_FEATURE_M)) { | 90 | |
224 | + return gen_M_VMSR_VMRS(s, a); | 91 | page_size_granule = extract64(value, 46, 2); |
92 | + gran = tlbi_range_tg_to_gran_size(page_size_granule); | ||
93 | |||
94 | /* The granule encoded in value must match the granule in use. */ | ||
95 | - if (page_size_granule != (param.using64k ? 3 : param.using16k ? 2 : 1)) { | ||
96 | + if (gran != param.gran) { | ||
97 | qemu_log_mask(LOG_GUEST_ERROR, "Invalid tlbi page size granule %d\n", | ||
98 | page_size_granule); | ||
99 | return ret; | ||
225 | } | 100 | } |
226 | 101 | ||
227 | - if (arm_dc_feature(s, ARM_FEATURE_M)) { | 102 | - page_shift = (page_size_granule - 1) * 2 + 12; |
228 | - /* | 103 | + page_shift = arm_granule_bits(gran); |
229 | - * The only M-profile VFP vmrs/vmsr sysreg is FPSCR. | 104 | num = extract64(value, 39, 5); |
230 | - * Accesses to R15 are UNPREDICTABLE; we choose to undef. | 105 | scale = extract64(value, 44, 2); |
231 | - * (FPSCR -> r15 is a special case which writes to the PSR flags.) | 106 | exponent = (5 * scale) + 1; |
232 | - */ | 107 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, |
233 | - if (a->reg != ARM_VFP_FPSCR) { | 108 | ARMMMUIdx mmu_idx, bool data) |
234 | - return false; | 109 | { |
235 | - } | 110 | uint64_t tcr = regime_tcr(env, mmu_idx); |
236 | - if (a->rt == 15 && !a->l) { | 111 | - bool epd, hpd, using16k, using64k, tsz_oob, ds; |
237 | - return false; | 112 | + bool epd, hpd, tsz_oob, ds; |
238 | - } | 113 | int select, tsz, tbi, max_tsz, min_tsz, ps, sh; |
239 | + if (!dc_isar_feature(aa32_fpsp_v2, s)) { | 114 | ARMGranuleSize gran; |
240 | + return false; | 115 | ARMCPU *cpu = env_archcpu(env); |
116 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
241 | } | 117 | } |
242 | 118 | ||
243 | switch (a->reg) { | 119 | gran = sanitize_gran_size(cpu, gran, stage2); |
120 | - using64k = gran == Gran64K; | ||
121 | - using16k = gran == Gran16K; | ||
122 | |||
123 | if (cpu_isar_feature(aa64_st, cpu)) { | ||
124 | - max_tsz = 48 - using64k; | ||
125 | + max_tsz = 48 - (gran == Gran64K); | ||
126 | } else { | ||
127 | max_tsz = 39; | ||
128 | } | ||
129 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
130 | * adjust the effective value of DS, as documented. | ||
131 | */ | ||
132 | min_tsz = 16; | ||
133 | - if (using64k) { | ||
134 | + if (gran == Gran64K) { | ||
135 | if (cpu_isar_feature(aa64_lva, cpu)) { | ||
136 | min_tsz = 12; | ||
137 | } | ||
138 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
139 | switch (mmu_idx) { | ||
140 | case ARMMMUIdx_Stage2: | ||
141 | case ARMMMUIdx_Stage2_S: | ||
142 | - if (using16k) { | ||
143 | + if (gran == Gran16K) { | ||
144 | ds = cpu_isar_feature(aa64_tgran16_2_lpa2, cpu); | ||
145 | } else { | ||
146 | ds = cpu_isar_feature(aa64_tgran4_2_lpa2, cpu); | ||
147 | } | ||
148 | break; | ||
149 | default: | ||
150 | - if (using16k) { | ||
151 | + if (gran == Gran16K) { | ||
152 | ds = cpu_isar_feature(aa64_tgran16_lpa2, cpu); | ||
153 | } else { | ||
154 | ds = cpu_isar_feature(aa64_tgran4_lpa2, cpu); | ||
155 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
156 | .tbi = tbi, | ||
157 | .epd = epd, | ||
158 | .hpd = hpd, | ||
159 | - .using16k = using16k, | ||
160 | - .using64k = using64k, | ||
161 | .tsz_oob = tsz_oob, | ||
162 | .ds = ds, | ||
163 | + .gran = gran, | ||
164 | }; | ||
165 | } | ||
166 | |||
167 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c | ||
168 | index XXXXXXX..XXXXXXX 100644 | ||
169 | --- a/target/arm/ptw.c | ||
170 | +++ b/target/arm/ptw.c | ||
171 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
172 | } | ||
173 | } | ||
174 | |||
175 | - if (param.using64k) { | ||
176 | - stride = 13; | ||
177 | - } else if (param.using16k) { | ||
178 | - stride = 11; | ||
179 | - } else { | ||
180 | - stride = 9; | ||
181 | - } | ||
182 | + stride = arm_granule_bits(param.gran) - 3; | ||
183 | |||
184 | /* | ||
185 | * Note that QEMU ignores shareability and cacheability attributes, | ||
244 | -- | 186 | -- |
245 | 2.20.1 | 187 | 2.25.1 |
246 | |||
247 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Implement the new-in-v8.1M VLDR/VSTR variants which directly | ||
2 | read or write FP system registers to memory. | ||
3 | 1 | ||
4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
5 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
6 | Message-id: 20201119215617.29887-10-peter.maydell@linaro.org | ||
7 | --- | ||
8 | target/arm/vfp.decode | 14 ++++++ | ||
9 | target/arm/translate-vfp.c.inc | 91 ++++++++++++++++++++++++++++++++++ | ||
10 | 2 files changed, 105 insertions(+) | ||
11 | |||
12 | diff --git a/target/arm/vfp.decode b/target/arm/vfp.decode | ||
13 | index XXXXXXX..XXXXXXX 100644 | ||
14 | --- a/target/arm/vfp.decode | ||
15 | +++ b/target/arm/vfp.decode | ||
16 | @@ -XXX,XX +XXX,XX @@ VLDR_VSTR_hp ---- 1101 u:1 .0 l:1 rn:4 .... 1001 imm:8 vd=%vd_sp | ||
17 | VLDR_VSTR_sp ---- 1101 u:1 .0 l:1 rn:4 .... 1010 imm:8 vd=%vd_sp | ||
18 | VLDR_VSTR_dp ---- 1101 u:1 .0 l:1 rn:4 .... 1011 imm:8 vd=%vd_dp | ||
19 | |||
20 | +# M-profile VLDR/VSTR to sysreg | ||
21 | +%vldr_sysreg 22:1 13:3 | ||
22 | +%imm7_0x4 0:7 !function=times_4 | ||
23 | + | ||
24 | +&vldr_sysreg rn reg imm a w p | ||
25 | +@vldr_sysreg .... ... . a:1 . . . rn:4 ... . ... .. ....... \ | ||
26 | + reg=%vldr_sysreg imm=%imm7_0x4 &vldr_sysreg | ||
27 | + | ||
28 | +# P=0 W=0 is SEE "Related encodings", so split into two patterns | ||
29 | +VLDR_sysreg ---- 110 1 . . w:1 1 .... ... 0 111 11 ....... @vldr_sysreg p=1 | ||
30 | +VLDR_sysreg ---- 110 0 . . 1 1 .... ... 0 111 11 ....... @vldr_sysreg p=0 w=1 | ||
31 | +VSTR_sysreg ---- 110 1 . . w:1 0 .... ... 0 111 11 ....... @vldr_sysreg p=1 | ||
32 | +VSTR_sysreg ---- 110 0 . . 1 0 .... ... 0 111 11 ....... @vldr_sysreg p=0 w=1 | ||
33 | + | ||
34 | # We split the load/store multiple up into two patterns to avoid | ||
35 | # overlap with other insns in the "Advanced SIMD load/store and 64-bit move" | ||
36 | # grouping: | ||
37 | diff --git a/target/arm/translate-vfp.c.inc b/target/arm/translate-vfp.c.inc | ||
38 | index XXXXXXX..XXXXXXX 100644 | ||
39 | --- a/target/arm/translate-vfp.c.inc | ||
40 | +++ b/target/arm/translate-vfp.c.inc | ||
41 | @@ -XXX,XX +XXX,XX @@ static bool trans_VMSR_VMRS(DisasContext *s, arg_VMSR_VMRS *a) | ||
42 | return true; | ||
43 | } | ||
44 | |||
45 | +static void fp_sysreg_to_memory(DisasContext *s, void *opaque, TCGv_i32 value) | ||
46 | +{ | ||
47 | + arg_vldr_sysreg *a = opaque; | ||
48 | + uint32_t offset = a->imm; | ||
49 | + TCGv_i32 addr; | ||
50 | + | ||
51 | + if (!a->a) { | ||
52 | + offset = - offset; | ||
53 | + } | ||
54 | + | ||
55 | + addr = load_reg(s, a->rn); | ||
56 | + if (a->p) { | ||
57 | + tcg_gen_addi_i32(addr, addr, offset); | ||
58 | + } | ||
59 | + | ||
60 | + if (s->v8m_stackcheck && a->rn == 13 && a->w) { | ||
61 | + gen_helper_v8m_stackcheck(cpu_env, addr); | ||
62 | + } | ||
63 | + | ||
64 | + gen_aa32_st_i32(s, value, addr, get_mem_index(s), | ||
65 | + MO_UL | MO_ALIGN | s->be_data); | ||
66 | + tcg_temp_free_i32(value); | ||
67 | + | ||
68 | + if (a->w) { | ||
69 | + /* writeback */ | ||
70 | + if (!a->p) { | ||
71 | + tcg_gen_addi_i32(addr, addr, offset); | ||
72 | + } | ||
73 | + store_reg(s, a->rn, addr); | ||
74 | + } else { | ||
75 | + tcg_temp_free_i32(addr); | ||
76 | + } | ||
77 | +} | ||
78 | + | ||
79 | +static TCGv_i32 memory_to_fp_sysreg(DisasContext *s, void *opaque) | ||
80 | +{ | ||
81 | + arg_vldr_sysreg *a = opaque; | ||
82 | + uint32_t offset = a->imm; | ||
83 | + TCGv_i32 addr; | ||
84 | + TCGv_i32 value = tcg_temp_new_i32(); | ||
85 | + | ||
86 | + if (!a->a) { | ||
87 | + offset = - offset; | ||
88 | + } | ||
89 | + | ||
90 | + addr = load_reg(s, a->rn); | ||
91 | + if (a->p) { | ||
92 | + tcg_gen_addi_i32(addr, addr, offset); | ||
93 | + } | ||
94 | + | ||
95 | + if (s->v8m_stackcheck && a->rn == 13 && a->w) { | ||
96 | + gen_helper_v8m_stackcheck(cpu_env, addr); | ||
97 | + } | ||
98 | + | ||
99 | + gen_aa32_ld_i32(s, value, addr, get_mem_index(s), | ||
100 | + MO_UL | MO_ALIGN | s->be_data); | ||
101 | + | ||
102 | + if (a->w) { | ||
103 | + /* writeback */ | ||
104 | + if (!a->p) { | ||
105 | + tcg_gen_addi_i32(addr, addr, offset); | ||
106 | + } | ||
107 | + store_reg(s, a->rn, addr); | ||
108 | + } else { | ||
109 | + tcg_temp_free_i32(addr); | ||
110 | + } | ||
111 | + return value; | ||
112 | +} | ||
113 | + | ||
114 | +static bool trans_VLDR_sysreg(DisasContext *s, arg_vldr_sysreg *a) | ||
115 | +{ | ||
116 | + if (!arm_dc_feature(s, ARM_FEATURE_V8_1M)) { | ||
117 | + return false; | ||
118 | + } | ||
119 | + if (a->rn == 15) { | ||
120 | + return false; | ||
121 | + } | ||
122 | + return gen_M_fp_sysreg_write(s, a->reg, memory_to_fp_sysreg, a); | ||
123 | +} | ||
124 | + | ||
125 | +static bool trans_VSTR_sysreg(DisasContext *s, arg_vldr_sysreg *a) | ||
126 | +{ | ||
127 | + if (!arm_dc_feature(s, ARM_FEATURE_V8_1M)) { | ||
128 | + return false; | ||
129 | + } | ||
130 | + if (a->rn == 15) { | ||
131 | + return false; | ||
132 | + } | ||
133 | + return gen_M_fp_sysreg_read(s, a->reg, fp_sysreg_to_memory, a); | ||
134 | +} | ||
135 | + | ||
136 | static bool trans_VMOV_half(DisasContext *s, arg_VMOV_single *a) | ||
137 | { | ||
138 | TCGv_i32 tmp; | ||
139 | -- | ||
140 | 2.20.1 | ||
141 | |||
142 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | We defined a constant name for the mask of NZCV bits in the FPCR/FPSCR | ||
2 | in the previous commit; use it in a couple of places in existing code, | ||
3 | where we're masking out everything except NZCV for the "load to Rt=15 | ||
4 | sets CPSR.NZCV" special case. | ||
5 | 1 | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20201119215617.29887-12-peter.maydell@linaro.org | ||
9 | --- | ||
10 | target/arm/translate-vfp.c.inc | 4 ++-- | ||
11 | 1 file changed, 2 insertions(+), 2 deletions(-) | ||
12 | |||
13 | diff --git a/target/arm/translate-vfp.c.inc b/target/arm/translate-vfp.c.inc | ||
14 | index XXXXXXX..XXXXXXX 100644 | ||
15 | --- a/target/arm/translate-vfp.c.inc | ||
16 | +++ b/target/arm/translate-vfp.c.inc | ||
17 | @@ -XXX,XX +XXX,XX @@ static bool gen_M_fp_sysreg_read(DisasContext *s, int regno, | ||
18 | * helper call for the "VMRS to CPSR.NZCV" insn. | ||
19 | */ | ||
20 | tmp = load_cpu_field(vfp.xregs[ARM_VFP_FPSCR]); | ||
21 | - tcg_gen_andi_i32(tmp, tmp, 0xf0000000); | ||
22 | + tcg_gen_andi_i32(tmp, tmp, FPCR_NZCV_MASK); | ||
23 | storefn(s, opaque, tmp); | ||
24 | break; | ||
25 | default: | ||
26 | @@ -XXX,XX +XXX,XX @@ static bool trans_VMSR_VMRS(DisasContext *s, arg_VMSR_VMRS *a) | ||
27 | case ARM_VFP_FPSCR: | ||
28 | if (a->rt == 15) { | ||
29 | tmp = load_cpu_field(vfp.xregs[ARM_VFP_FPSCR]); | ||
30 | - tcg_gen_andi_i32(tmp, tmp, 0xf0000000); | ||
31 | + tcg_gen_andi_i32(tmp, tmp, FPCR_NZCV_MASK); | ||
32 | } else { | ||
33 | tmp = tcg_temp_new_i32(); | ||
34 | gen_helper_vfp_get_fpscr(tmp, cpu_env); | ||
35 | -- | ||
36 | 2.20.1 | ||
37 | |||
38 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Factor out the code which handles M-profile lazy FP state preservation | ||
2 | from full_vfp_access_check(); accesses to the FPCXT_NS register are | ||
3 | a special case which need to do just this part (corresponding in the | ||
4 | pseudocode to the PreserveFPState() function), and not the full | ||
5 | set of actions matching the pseudocode ExecuteFPCheck() which | ||
6 | normal FP instructions need to do. | ||
7 | 1 | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
10 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
11 | Message-id: 20201119215617.29887-13-peter.maydell@linaro.org | ||
12 | --- | ||
13 | target/arm/translate-vfp.c.inc | 45 ++++++++++++++++++++-------------- | ||
14 | 1 file changed, 27 insertions(+), 18 deletions(-) | ||
15 | |||
16 | diff --git a/target/arm/translate-vfp.c.inc b/target/arm/translate-vfp.c.inc | ||
17 | index XXXXXXX..XXXXXXX 100644 | ||
18 | --- a/target/arm/translate-vfp.c.inc | ||
19 | +++ b/target/arm/translate-vfp.c.inc | ||
20 | @@ -XXX,XX +XXX,XX @@ static inline long vfp_f16_offset(unsigned reg, bool top) | ||
21 | return offs; | ||
22 | } | ||
23 | |||
24 | +/* | ||
25 | + * Generate code for M-profile lazy FP state preservation if needed; | ||
26 | + * this corresponds to the pseudocode PreserveFPState() function. | ||
27 | + */ | ||
28 | +static void gen_preserve_fp_state(DisasContext *s) | ||
29 | +{ | ||
30 | + if (s->v7m_lspact) { | ||
31 | + /* | ||
32 | + * Lazy state saving affects external memory and also the NVIC, | ||
33 | + * so we must mark it as an IO operation for icount (and cause | ||
34 | + * this to be the last insn in the TB). | ||
35 | + */ | ||
36 | + if (tb_cflags(s->base.tb) & CF_USE_ICOUNT) { | ||
37 | + s->base.is_jmp = DISAS_UPDATE_EXIT; | ||
38 | + gen_io_start(); | ||
39 | + } | ||
40 | + gen_helper_v7m_preserve_fp_state(cpu_env); | ||
41 | + /* | ||
42 | + * If the preserve_fp_state helper doesn't throw an exception | ||
43 | + * then it will clear LSPACT; we don't need to repeat this for | ||
44 | + * any further FP insns in this TB. | ||
45 | + */ | ||
46 | + s->v7m_lspact = false; | ||
47 | + } | ||
48 | +} | ||
49 | + | ||
50 | /* | ||
51 | * Check that VFP access is enabled. If it is, do the necessary | ||
52 | * M-profile lazy-FP handling and then return true. | ||
53 | @@ -XXX,XX +XXX,XX @@ static bool full_vfp_access_check(DisasContext *s, bool ignore_vfp_enabled) | ||
54 | /* Handle M-profile lazy FP state mechanics */ | ||
55 | |||
56 | /* Trigger lazy-state preservation if necessary */ | ||
57 | - if (s->v7m_lspact) { | ||
58 | - /* | ||
59 | - * Lazy state saving affects external memory and also the NVIC, | ||
60 | - * so we must mark it as an IO operation for icount (and cause | ||
61 | - * this to be the last insn in the TB). | ||
62 | - */ | ||
63 | - if (tb_cflags(s->base.tb) & CF_USE_ICOUNT) { | ||
64 | - s->base.is_jmp = DISAS_UPDATE_EXIT; | ||
65 | - gen_io_start(); | ||
66 | - } | ||
67 | - gen_helper_v7m_preserve_fp_state(cpu_env); | ||
68 | - /* | ||
69 | - * If the preserve_fp_state helper doesn't throw an exception | ||
70 | - * then it will clear LSPACT; we don't need to repeat this for | ||
71 | - * any further FP insns in this TB. | ||
72 | - */ | ||
73 | - s->v7m_lspact = false; | ||
74 | - } | ||
75 | + gen_preserve_fp_state(s); | ||
76 | |||
77 | /* Update ownership of FP context: set FPCCR.S to match current state */ | ||
78 | if (s->v8m_fpccr_s_wrong) { | ||
79 | -- | ||
80 | 2.20.1 | ||
81 | |||
82 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | In v8.0M, on exception entry the registers R0-R3, R12, APSR and EPSR | ||
2 | are zeroed for an exception taken to Non-secure state; for an | ||
3 | exception taken to Secure state they become UNKNOWN, and we chose to | ||
4 | leave them at their previous values. | ||
5 | 1 | ||
6 | In v8.1M the behaviour is specified more tightly and these registers | ||
7 | are always zeroed regardless of the security state that the exception | ||
8 | targets (see rule R_KPZV). Implement this. | ||
9 | |||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
12 | Message-id: 20201119215617.29887-17-peter.maydell@linaro.org | ||
13 | --- | ||
14 | target/arm/m_helper.c | 16 ++++++++++++---- | ||
15 | 1 file changed, 12 insertions(+), 4 deletions(-) | ||
16 | |||
17 | diff --git a/target/arm/m_helper.c b/target/arm/m_helper.c | ||
18 | index XXXXXXX..XXXXXXX 100644 | ||
19 | --- a/target/arm/m_helper.c | ||
20 | +++ b/target/arm/m_helper.c | ||
21 | @@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain, | ||
22 | * Clear registers if necessary to prevent non-secure exception | ||
23 | * code being able to see register values from secure code. | ||
24 | * Where register values become architecturally UNKNOWN we leave | ||
25 | - * them with their previous values. | ||
26 | + * them with their previous values. v8.1M is tighter than v8.0M | ||
27 | + * here and always zeroes the caller-saved registers regardless | ||
28 | + * of the security state the exception is targeting. | ||
29 | */ | ||
30 | if (arm_feature(env, ARM_FEATURE_M_SECURITY)) { | ||
31 | - if (!targets_secure) { | ||
32 | + if (!targets_secure || arm_feature(env, ARM_FEATURE_V8_1M)) { | ||
33 | /* | ||
34 | * Always clear the caller-saved registers (they have been | ||
35 | * pushed to the stack earlier in v7m_push_stack()). | ||
36 | @@ -XXX,XX +XXX,XX @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr, bool dotailchain, | ||
37 | * v7m_push_callee_stack()). | ||
38 | */ | ||
39 | int i; | ||
40 | + /* | ||
41 | + * r4..r11 are callee-saves, zero only if background | ||
42 | + * state was Secure (EXCRET.S == 1) and exception | ||
43 | + * targets Non-secure state | ||
44 | + */ | ||
45 | + bool zero_callee_saves = !targets_secure && | ||
46 | + (lr & R_V7M_EXCRET_S_MASK); | ||
47 | |||
48 | for (i = 0; i < 13; i++) { | ||
49 | - /* r4..r11 are callee-saves, zero only if EXCRET.S == 1 */ | ||
50 | - if (i < 4 || i > 11 || (lr & R_V7M_EXCRET_S_MASK)) { | ||
51 | + if (i < 4 || i > 11 || zero_callee_saves) { | ||
52 | env->regs[i] = 0; | ||
53 | } | ||
54 | } | ||
55 | -- | ||
56 | 2.20.1 | ||
57 | |||
58 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | In v8.1M a REVIDR register is defined, which is at address 0xe00ecfc | ||
2 | and is a read-only IMPDEF register providing implementation specific | ||
3 | minor revision information, like the v8A REVIDR_EL1. Implement this. | ||
4 | 1 | ||
5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
7 | Message-id: 20201119215617.29887-19-peter.maydell@linaro.org | ||
8 | --- | ||
9 | hw/intc/armv7m_nvic.c | 5 +++++ | ||
10 | 1 file changed, 5 insertions(+) | ||
11 | |||
12 | diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c | ||
13 | index XXXXXXX..XXXXXXX 100644 | ||
14 | --- a/hw/intc/armv7m_nvic.c | ||
15 | +++ b/hw/intc/armv7m_nvic.c | ||
16 | @@ -XXX,XX +XXX,XX @@ static uint32_t nvic_readl(NVICState *s, uint32_t offset, MemTxAttrs attrs) | ||
17 | } | ||
18 | return val; | ||
19 | } | ||
20 | + case 0xcfc: | ||
21 | + if (!arm_feature(&cpu->env, ARM_FEATURE_V8_1M)) { | ||
22 | + goto bad_offset; | ||
23 | + } | ||
24 | + return cpu->revidr; | ||
25 | case 0xd00: /* CPUID Base. */ | ||
26 | return cpu->midr; | ||
27 | case 0xd04: /* Interrupt Control State (ICSR) */ | ||
28 | -- | ||
29 | 2.20.1 | ||
30 | |||
31 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | In v8.1M a new exception return check is added which may cause a NOCP | ||
2 | UsageFault (see rule R_XLTP): before we clear s0..s15 and the FPSCR | ||
3 | we must check whether access to CP10 from the Security state of the | ||
4 | returning exception is disabled; if it is then we must take a fault. | ||
5 | 1 | ||
6 | (Note that for our implementation CPPWR is always RAZ/WI and so can | ||
7 | never cause CP10 accesses to fail.) | ||
8 | |||
9 | The other v8.1M change to this register-clearing code is that if MVE | ||
10 | is implemented VPR must also be cleared, so add a TODO comment to | ||
11 | that effect. | ||
12 | |||
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
14 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
15 | Message-id: 20201119215617.29887-20-peter.maydell@linaro.org | ||
16 | --- | ||
17 | target/arm/m_helper.c | 22 +++++++++++++++++++++- | ||
18 | 1 file changed, 21 insertions(+), 1 deletion(-) | ||
19 | |||
20 | diff --git a/target/arm/m_helper.c b/target/arm/m_helper.c | ||
21 | index XXXXXXX..XXXXXXX 100644 | ||
22 | --- a/target/arm/m_helper.c | ||
23 | +++ b/target/arm/m_helper.c | ||
24 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
25 | v7m_exception_taken(cpu, excret, true, false); | ||
26 | return; | ||
27 | } else { | ||
28 | - /* Clear s0..s15 and FPSCR */ | ||
29 | + if (arm_feature(env, ARM_FEATURE_V8_1M)) { | ||
30 | + /* v8.1M adds this NOCP check */ | ||
31 | + bool nsacr_pass = exc_secure || | ||
32 | + extract32(env->v7m.nsacr, 10, 1); | ||
33 | + bool cpacr_pass = v7m_cpacr_pass(env, exc_secure, true); | ||
34 | + if (!nsacr_pass) { | ||
35 | + armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE, true); | ||
36 | + env->v7m.cfsr[M_REG_S] |= R_V7M_CFSR_NOCP_MASK; | ||
37 | + qemu_log_mask(CPU_LOG_INT, "...taking UsageFault on existing " | ||
38 | + "stackframe: NSACR prevents clearing FPU registers\n"); | ||
39 | + v7m_exception_taken(cpu, excret, true, false); | ||
40 | + } else if (!cpacr_pass) { | ||
41 | + armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE, | ||
42 | + exc_secure); | ||
43 | + env->v7m.cfsr[exc_secure] |= R_V7M_CFSR_NOCP_MASK; | ||
44 | + qemu_log_mask(CPU_LOG_INT, "...taking UsageFault on existing " | ||
45 | + "stackframe: CPACR prevents clearing FPU registers\n"); | ||
46 | + v7m_exception_taken(cpu, excret, true, false); | ||
47 | + } | ||
48 | + } | ||
49 | + /* Clear s0..s15 and FPSCR; TODO also VPR when MVE is implemented */ | ||
50 | int i; | ||
51 | |||
52 | for (i = 0; i < 16; i += 2) { | ||
53 | -- | ||
54 | 2.20.1 | ||
55 | |||
56 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | v8.1M adds new encodings of VLLDM and VLSTM (where bit 7 is set). | ||
2 | The only difference is that: | ||
3 | * the old T1 encodings UNDEF if the implementation implements 32 | ||
4 | Dregs (this is currently architecturally impossible for M-profile) | ||
5 | * the new T2 encodings have the implementation-defined option to | ||
6 | read from memory (discarding the data) or write UNKNOWN values to | ||
7 | memory for the stack slots that would be D16-D31 | ||
8 | 1 | ||
9 | We choose not to make those accesses, so for us the two | ||
10 | instructions behave identically assuming they don't UNDEF. | ||
11 | |||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
13 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
14 | Message-id: 20201119215617.29887-21-peter.maydell@linaro.org | ||
15 | --- | ||
16 | target/arm/m-nocp.decode | 2 +- | ||
17 | target/arm/translate-vfp.c.inc | 25 +++++++++++++++++++++++++ | ||
18 | 2 files changed, 26 insertions(+), 1 deletion(-) | ||
19 | |||
20 | diff --git a/target/arm/m-nocp.decode b/target/arm/m-nocp.decode | ||
21 | index XXXXXXX..XXXXXXX 100644 | ||
22 | --- a/target/arm/m-nocp.decode | ||
23 | +++ b/target/arm/m-nocp.decode | ||
24 | @@ -XXX,XX +XXX,XX @@ | ||
25 | |||
26 | { | ||
27 | # Special cases which do not take an early NOCP: VLLDM and VLSTM | ||
28 | - VLLDM_VLSTM 1110 1100 001 l:1 rn:4 0000 1010 0000 0000 | ||
29 | + VLLDM_VLSTM 1110 1100 001 l:1 rn:4 0000 1010 op:1 000 0000 | ||
30 | # VSCCLRM (new in v8.1M) is similar: | ||
31 | VSCCLRM 1110 1100 1.01 1111 .... 1011 imm:7 0 vd=%vd_dp size=3 | ||
32 | VSCCLRM 1110 1100 1.01 1111 .... 1010 imm:8 vd=%vd_sp size=2 | ||
33 | diff --git a/target/arm/translate-vfp.c.inc b/target/arm/translate-vfp.c.inc | ||
34 | index XXXXXXX..XXXXXXX 100644 | ||
35 | --- a/target/arm/translate-vfp.c.inc | ||
36 | +++ b/target/arm/translate-vfp.c.inc | ||
37 | @@ -XXX,XX +XXX,XX @@ static bool trans_VLLDM_VLSTM(DisasContext *s, arg_VLLDM_VLSTM *a) | ||
38 | !arm_dc_feature(s, ARM_FEATURE_V8)) { | ||
39 | return false; | ||
40 | } | ||
41 | + | ||
42 | + if (a->op) { | ||
43 | + /* | ||
44 | + * T2 encoding ({D0-D31} reglist): v8.1M and up. We choose not | ||
45 | + * to take the IMPDEF option to make memory accesses to the stack | ||
46 | + * slots that correspond to the D16-D31 registers (discarding | ||
47 | + * read data and writing UNKNOWN values), so for us the T2 | ||
48 | + * encoding behaves identically to the T1 encoding. | ||
49 | + */ | ||
50 | + if (!arm_dc_feature(s, ARM_FEATURE_V8_1M)) { | ||
51 | + return false; | ||
52 | + } | ||
53 | + } else { | ||
54 | + /* | ||
55 | + * T1 encoding ({D0-D15} reglist); undef if we have 32 Dregs. | ||
56 | + * This is currently architecturally impossible, but we add the | ||
57 | + * check to stay in line with the pseudocode. Note that we must | ||
58 | + * emit code for the UNDEF so it takes precedence over the NOCP. | ||
59 | + */ | ||
60 | + if (dc_isar_feature(aa32_simd_r32, s)) { | ||
61 | + unallocated_encoding(s); | ||
62 | + return true; | ||
63 | + } | ||
64 | + } | ||
65 | + | ||
66 | /* | ||
67 | * If not secure, UNDEF. We must emit code for this | ||
68 | * rather than returning false so that this takes | ||
69 | -- | ||
70 | 2.20.1 | ||
71 | |||
72 | diff view generated by jsdifflib |
1 | In commit 077d7449100d824a4 we added code to handle the v8M | 1 | FEAT_GTG is a change tho the ID register ID_AA64MMFR0_EL1 so that it |
---|---|---|---|
2 | requirement that returns from NMI or HardFault forcibly deactivate | 2 | can report a different set of supported granule (page) sizes for |
3 | those exceptions regardless of what interrupt the guest is trying to | 3 | stage 1 and stage 2 translation tables. As of commit c20281b2a5048 |
4 | deactivate. Unfortunately this broke the handling of the "illegal | 4 | we already report the granule sizes that way for '-cpu max', and now |
5 | exception return because the returning exception number is not | 5 | we also correctly make attempts to use unimplemented granule sizes |
6 | active" check for those cases. In the pseudocode this test is done | 6 | fail, so we can report the support of the feature in the |
7 | on the exception the guest asks to return from, but because our | 7 | documentation. |
8 | implementation was doing this in armv7m_nvic_complete_irq() after the | ||
9 | new "deactivate NMI/HardFault regardless" code we ended up doing the | ||
10 | test on the VecInfo for that exception instead, which usually meant | ||
11 | failing to raise the illegal exception return fault. | ||
12 | 8 | ||
13 | In the case for "configurable exception targeting the opposite | 9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
14 | security state" we detected the illegal-return case but went ahead | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
15 | and deactivated the VecInfo anyway, which is wrong because that is | 11 | Message-id: 20221003162315.2833797-4-peter.maydell@linaro.org |
16 | the VecInfo for the other security state. | 12 | --- |
13 | docs/system/arm/emulation.rst | 1 + | ||
14 | 1 file changed, 1 insertion(+) | ||
17 | 15 | ||
18 | Rearrange the code so that we first identify the illegal return | 16 | diff --git a/docs/system/arm/emulation.rst b/docs/system/arm/emulation.rst |
19 | cases, then see if we really need to deactivate NMI or HardFault | ||
20 | instead, and finally do the deactivation. | ||
21 | |||
22 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
23 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
24 | Message-id: 20201119215617.29887-25-peter.maydell@linaro.org | ||
25 | --- | ||
26 | hw/intc/armv7m_nvic.c | 59 +++++++++++++++++++++++-------------------- | ||
27 | 1 file changed, 32 insertions(+), 27 deletions(-) | ||
28 | |||
29 | diff --git a/hw/intc/armv7m_nvic.c b/hw/intc/armv7m_nvic.c | ||
30 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
31 | --- a/hw/intc/armv7m_nvic.c | 18 | --- a/docs/system/arm/emulation.rst |
32 | +++ b/hw/intc/armv7m_nvic.c | 19 | +++ b/docs/system/arm/emulation.rst |
33 | @@ -XXX,XX +XXX,XX @@ int armv7m_nvic_complete_irq(void *opaque, int irq, bool secure) | 20 | @@ -XXX,XX +XXX,XX @@ the following architecture extensions: |
34 | { | 21 | - FEAT_FRINTTS (Floating-point to integer instructions) |
35 | NVICState *s = (NVICState *)opaque; | 22 | - FEAT_FlagM (Flag manipulation instructions v2) |
36 | VecInfo *vec = NULL; | 23 | - FEAT_FlagM2 (Enhancements to flag manipulation instructions) |
37 | - int ret; | 24 | +- FEAT_GTG (Guest translation granule size) |
38 | + int ret = 0; | 25 | - FEAT_HCX (Support for the HCRX_EL2 register) |
39 | 26 | - FEAT_HPDS (Hierarchical permission disables) | |
40 | assert(irq > ARMV7M_EXCP_RESET && irq < s->num_irq); | 27 | - FEAT_I8MM (AArch64 Int8 matrix multiplication instructions) |
41 | |||
42 | + trace_nvic_complete_irq(irq, secure); | ||
43 | + | ||
44 | + if (secure && exc_is_banked(irq)) { | ||
45 | + vec = &s->sec_vectors[irq]; | ||
46 | + } else { | ||
47 | + vec = &s->vectors[irq]; | ||
48 | + } | ||
49 | + | ||
50 | + /* | ||
51 | + * Identify illegal exception return cases. We can't immediately | ||
52 | + * return at this point because we still need to deactivate | ||
53 | + * (either this exception or NMI/HardFault) first. | ||
54 | + */ | ||
55 | + if (!exc_is_banked(irq) && exc_targets_secure(s, irq) != secure) { | ||
56 | + /* | ||
57 | + * Return from a configurable exception targeting the opposite | ||
58 | + * security state from the one we're trying to complete it for. | ||
59 | + * Clear vec because it's not really the VecInfo for this | ||
60 | + * (irq, secstate) so we mustn't deactivate it. | ||
61 | + */ | ||
62 | + ret = -1; | ||
63 | + vec = NULL; | ||
64 | + } else if (!vec->active) { | ||
65 | + /* Return from an inactive interrupt */ | ||
66 | + ret = -1; | ||
67 | + } else { | ||
68 | + /* Legal return, we will return the RETTOBASE bit value to the caller */ | ||
69 | + ret = nvic_rettobase(s); | ||
70 | + } | ||
71 | + | ||
72 | /* | ||
73 | * For negative priorities, v8M will forcibly deactivate the appropriate | ||
74 | * NMI or HardFault regardless of what interrupt we're being asked to | ||
75 | @@ -XXX,XX +XXX,XX @@ int armv7m_nvic_complete_irq(void *opaque, int irq, bool secure) | ||
76 | } | ||
77 | |||
78 | if (!vec) { | ||
79 | - if (secure && exc_is_banked(irq)) { | ||
80 | - vec = &s->sec_vectors[irq]; | ||
81 | - } else { | ||
82 | - vec = &s->vectors[irq]; | ||
83 | - } | ||
84 | - } | ||
85 | - | ||
86 | - trace_nvic_complete_irq(irq, secure); | ||
87 | - | ||
88 | - if (!vec->active) { | ||
89 | - /* Tell the caller this was an illegal exception return */ | ||
90 | - return -1; | ||
91 | - } | ||
92 | - | ||
93 | - /* | ||
94 | - * If this is a configurable exception and it is currently | ||
95 | - * targeting the opposite security state from the one we're trying | ||
96 | - * to complete it for, this counts as an illegal exception return. | ||
97 | - * We still need to deactivate whatever vector the logic above has | ||
98 | - * selected, though, as it might not be the same as the one for the | ||
99 | - * requested exception number. | ||
100 | - */ | ||
101 | - if (!exc_is_banked(irq) && exc_targets_secure(s, irq) != secure) { | ||
102 | - ret = -1; | ||
103 | - } else { | ||
104 | - ret = nvic_rettobase(s); | ||
105 | + return ret; | ||
106 | } | ||
107 | |||
108 | vec->active = 0; | ||
109 | -- | 28 | -- |
110 | 2.20.1 | 29 | 2.25.1 |
111 | |||
112 | diff view generated by jsdifflib |