1 | Arm pullreq: Rémi's ARMv8.4-SEL2 support is the big thing here. | 1 | v1->v2: add system/index to docs/index.rst |
---|---|---|---|
2 | v2->v3: fix format string issues for OSX | ||
3 | v3->v4: actually fix format string issues, somehow | ||
4 | I failed to actually put the change into git :-( | ||
2 | 5 | ||
3 | thanks | 6 | The following changes since commit b7c359c748a2e3ccb97a184b9739feb2cd48de2f: |
4 | -- PMM | ||
5 | 7 | ||
6 | The following changes since commit f1fcb6851aba6dd9838886dc179717a11e344a1c: | 8 | Merge remote-tracking branch 'remotes/vivier2/tags/linux-user-for-5.0-pull-request' into staging (2020-01-23 14:38:43 +0000) |
7 | |||
8 | Merge remote-tracking branch 'remotes/huth-gitlab/tags/pull-request-2021-01-19' into staging (2021-01-19 11:57:07 +0000) | ||
9 | 9 | ||
10 | are available in the Git repository at: | 10 | are available in the Git repository at: |
11 | 11 | ||
12 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20210119 | 12 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20200123-4 |
13 | 13 | ||
14 | for you to fetch changes up to 6d39956891b3d1857af84f72f0230a6d99eb3b6a: | 14 | for you to fetch changes up to e9d20b55b2e4c8400143554f0e83e4e1fcb9bd0f: |
15 | 15 | ||
16 | docs: Build and install all the docs in a single manual (2021-01-19 14:38:53 +0000) | 16 | hw/arm/exynos4210: Connect serial port DMA busy signals with pl330 (2020-01-23 16:34:15 +0000) |
17 | 17 | ||
18 | ---------------------------------------------------------------- | 18 | ---------------------------------------------------------------- |
19 | target-arm queue: | 19 | target-arm queue: |
20 | * Implement IMPDEF pauth algorithm | 20 | * fix bug in PAuth emulation |
21 | * Support ARMv8.4-SEL2 | 21 | * add PMU to Cortex-R5, Cortex-R5F |
22 | * Fix bug where we were truncating predicate vector lengths in SVE insns | 22 | * qemu-nbd: Convert documentation to rST |
23 | * Implement new pvpanic-pci device | 23 | * qemu-block-drivers: Convert documentation to rST |
24 | * npcm7xx_adc-test: Fix memleak in adc_qom_set | 24 | * Fix Exynos4210 UART DMA support |
25 | * target/arm/m_helper: Silence GCC 10 maybe-uninitialized error | 25 | * Various minor code cleanups |
26 | * docs: Build and install all the docs in a single manual | ||
27 | 26 | ||
28 | ---------------------------------------------------------------- | 27 | ---------------------------------------------------------------- |
29 | Gan Qixin (1): | 28 | Andrew Jones (1): |
30 | npcm7xx_adc-test: Fix memleak in adc_qom_set | 29 | target/arm/arch_dump: Add SVE notes |
31 | 30 | ||
32 | Mihai Carabas (4): | 31 | Clement Deschamps (1): |
33 | hw/misc/pvpanic: split-out generic and bus dependent code | 32 | target/arm: add PMU feature to cortex-r5 and cortex-r5f |
34 | hw/misc/pvpanic: add PCI interface support | ||
35 | pvpanic : update pvpanic spec document | ||
36 | tests/qtest: add a test case for pvpanic-pci | ||
37 | 33 | ||
38 | Peter Maydell (1): | 34 | Guenter Roeck (8): |
39 | docs: Build and install all the docs in a single manual | 35 | dma/pl330: Convert to support tracing |
36 | hw/core/or-irq: Increase limit of or-lines to 48 | ||
37 | hw/arm/exynos4210: Fix DMA initialization | ||
38 | hw/char/exynos4210_uart: Convert to support tracing | ||
39 | hw/char/exynos4210_uart: Implement post_load function | ||
40 | hw/char/exynos4210_uart: Implement Rx FIFO level triggers and timeouts | ||
41 | hw/char/exynos4210_uart: Add receive DMA support | ||
42 | hw/arm/exynos4210: Connect serial port DMA busy signals with pl330 | ||
43 | |||
44 | Keqian Zhu (2): | ||
45 | hw/acpi: Remove extra indent in ACPI GED hotplug cb | ||
46 | hw/arm: Use helper function to trigger hotplug handler plug | ||
47 | |||
48 | Peter Maydell (3): | ||
49 | qemu-nbd: Convert invocation documentation to rST | ||
50 | docs: Create stub system manual | ||
51 | qemu-block-drivers: Convert to rST | ||
40 | 52 | ||
41 | Philippe Mathieu-Daudé (1): | 53 | Philippe Mathieu-Daudé (1): |
42 | target/arm/m_helper: Silence GCC 10 maybe-uninitialized error | 54 | hw/misc/stm32f4xx_syscfg: Fix copy/paste error |
43 | 55 | ||
44 | Richard Henderson (7): | 56 | Richard Henderson (3): |
45 | target/arm: Implement an IMPDEF pauth algorithm | 57 | tests/tcg/aarch64: Fix compilation parameters for pauth-% |
46 | target/arm: Add cpu properties to control pauth | 58 | tests/tcg/aarch64: Add pauth-3 |
47 | target/arm: Use object_property_add_bool for "sve" property | 59 | tests/tcg/aarch64: Add pauth-4 |
48 | target/arm: Introduce PREDDESC field definitions | ||
49 | target/arm: Update PFIRST, PNEXT for pred_desc | ||
50 | target/arm: Update ZIP, UZP, TRN for pred_desc | ||
51 | target/arm: Update REV, PUNPK for pred_desc | ||
52 | 60 | ||
53 | Rémi Denis-Courmont (19): | 61 | Vincent Dehors (1): |
54 | target/arm: remove redundant tests | 62 | target/arm: Fix PAuth sbox functions |
55 | target/arm: add arm_is_el2_enabled() helper | ||
56 | target/arm: use arm_is_el2_enabled() where applicable | ||
57 | target/arm: use arm_hcr_el2_eff() where applicable | ||
58 | target/arm: factor MDCR_EL2 common handling | ||
59 | target/arm: Define isar_feature function to test for presence of SEL2 | ||
60 | target/arm: add 64-bit S-EL2 to EL exception table | ||
61 | target/arm: add MMU stage 1 for Secure EL2 | ||
62 | target/arm: add ARMv8.4-SEL2 system registers | ||
63 | target/arm: handle VMID change in secure state | ||
64 | target/arm: do S1_ptw_translate() before address space lookup | ||
65 | target/arm: translate NS bit in page-walks | ||
66 | target/arm: generalize 2-stage page-walk condition | ||
67 | target/arm: secure stage 2 translation regime | ||
68 | target/arm: set HPFAR_EL2.NS on secure stage 2 faults | ||
69 | target/arm: revector to run-time pick target EL | ||
70 | target/arm: Implement SCR_EL2.EEL2 | ||
71 | target/arm: enable Secure EL2 in max CPU | ||
72 | target/arm: refactor vae1_tlbmask() | ||
73 | 63 | ||
74 | docs/conf.py | 46 ++++- | 64 | Makefile | 37 +- |
75 | docs/devel/conf.py | 15 -- | 65 | tests/tcg/aarch64/Makefile.softmmu-target | 5 +- |
76 | docs/index.html.in | 17 -- | 66 | tests/tcg/aarch64/Makefile.target | 3 +- |
77 | docs/interop/conf.py | 28 --- | 67 | include/elf.h | 1 + |
78 | docs/meson.build | 64 +++--- | 68 | include/hw/arm/exynos4210.h | 4 + |
79 | docs/specs/conf.py | 16 -- | 69 | include/hw/or-irq.h | 2 +- |
80 | docs/specs/pci-ids.txt | 1 + | 70 | target/arm/cpu.h | 25 + |
81 | docs/specs/pvpanic.txt | 13 +- | 71 | hw/acpi/generic_event_device.c | 2 +- |
82 | docs/system/arm/cpu-features.rst | 21 ++ | 72 | hw/arm/exynos4210.c | 77 ++- |
83 | docs/system/conf.py | 28 --- | 73 | hw/arm/virt.c | 6 +- |
84 | docs/tools/conf.py | 37 ---- | 74 | hw/char/exynos4210_uart.c | 245 +++++--- |
85 | docs/user/conf.py | 15 -- | 75 | hw/dma/pl330.c | 88 +-- |
86 | include/hw/misc/pvpanic.h | 24 ++- | 76 | hw/misc/stm32f4xx_syscfg.c | 2 +- |
87 | include/hw/pci/pci.h | 1 + | 77 | target/arm/arch_dump.c | 124 +++- |
88 | include/qemu/xxhash.h | 98 +++++++++ | 78 | target/arm/cpu.c | 1 + |
89 | target/arm/cpu-param.h | 2 +- | 79 | target/arm/kvm64.c | 24 - |
90 | target/arm/cpu.h | 107 ++++++++-- | 80 | target/arm/pauth_helper.c | 4 +- |
91 | target/arm/internals.h | 45 +++++ | 81 | tests/tcg/aarch64/pauth-1.c | 2 - |
92 | hw/misc/pvpanic-isa.c | 94 +++++++++ | 82 | tests/tcg/aarch64/pauth-2.c | 2 - |
93 | hw/misc/pvpanic-pci.c | 95 +++++++++ | 83 | tests/tcg/aarch64/pauth-4.c | 25 + |
94 | hw/misc/pvpanic.c | 85 +------- | 84 | tests/tcg/aarch64/system/pauth-3.c | 40 ++ |
95 | target/arm/cpu.c | 23 ++- | 85 | MAINTAINERS | 1 + |
96 | target/arm/cpu64.c | 65 ++++-- | 86 | docs/index.html.in | 1 + |
97 | target/arm/helper-a64.c | 8 +- | 87 | docs/index.rst | 2 +- |
98 | target/arm/helper.c | 414 ++++++++++++++++++++++++++------------- | 88 | docs/interop/conf.py | 4 +- |
99 | target/arm/m_helper.c | 2 +- | 89 | docs/interop/index.rst | 1 + |
100 | target/arm/monitor.c | 1 + | 90 | docs/interop/qemu-nbd.rst | 263 ++++++++ |
101 | target/arm/op_helper.c | 4 +- | 91 | docs/interop/qemu-option-trace.rst.inc | 30 + |
102 | target/arm/pauth_helper.c | 27 ++- | 92 | docs/qemu-block-drivers.texi | 889 --------------------------- |
103 | target/arm/sve_helper.c | 33 ++-- | 93 | docs/system/conf.py | 22 + |
104 | target/arm/tlb_helper.c | 3 + | 94 | docs/system/index.rst | 17 + |
105 | target/arm/translate-a64.c | 4 + | 95 | docs/system/qemu-block-drivers.rst | 985 ++++++++++++++++++++++++++++++ |
106 | target/arm/translate-sve.c | 31 ++- | 96 | hw/char/trace-events | 20 + |
107 | target/arm/translate.c | 36 +++- | 97 | hw/dma/trace-events | 24 + |
108 | tests/qtest/arm-cpu-features.c | 13 ++ | 98 | qemu-doc.texi | 18 - |
109 | tests/qtest/npcm7xx_adc-test.c | 1 + | 99 | qemu-nbd.texi | 214 ------- |
110 | tests/qtest/pvpanic-pci-test.c | 62 ++++++ | 100 | qemu-option-trace.texi | 4 + |
111 | .gitlab-ci.yml | 4 +- | 101 | qemu-options.hx | 2 +- |
112 | hw/i386/Kconfig | 2 +- | 102 | 38 files changed, 1898 insertions(+), 1318 deletions(-) |
113 | hw/misc/Kconfig | 12 +- | 103 | create mode 100644 tests/tcg/aarch64/pauth-4.c |
114 | hw/misc/meson.build | 4 +- | 104 | create mode 100644 tests/tcg/aarch64/system/pauth-3.c |
115 | tests/qtest/meson.build | 3 +- | 105 | create mode 100644 docs/interop/qemu-nbd.rst |
116 | 42 files changed, 1080 insertions(+), 524 deletions(-) | 106 | create mode 100644 docs/interop/qemu-option-trace.rst.inc |
117 | delete mode 100644 docs/devel/conf.py | 107 | delete mode 100644 docs/qemu-block-drivers.texi |
118 | delete mode 100644 docs/index.html.in | 108 | create mode 100644 docs/system/conf.py |
119 | delete mode 100644 docs/interop/conf.py | 109 | create mode 100644 docs/system/index.rst |
120 | delete mode 100644 docs/specs/conf.py | 110 | create mode 100644 docs/system/qemu-block-drivers.rst |
121 | delete mode 100644 docs/system/conf.py | 111 | delete mode 100644 qemu-nbd.texi |
122 | delete mode 100644 docs/tools/conf.py | ||
123 | delete mode 100644 docs/user/conf.py | ||
124 | create mode 100644 hw/misc/pvpanic-isa.c | ||
125 | create mode 100644 hw/misc/pvpanic-pci.c | ||
126 | create mode 100644 tests/qtest/pvpanic-pci-test.c | ||
127 | 112 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Richard Henderson <richard.henderson@linaro.org> | ||
2 | 1 | ||
3 | Without hardware acceleration, a cryptographically strong | ||
4 | algorithm is too expensive for pauth_computepac. | ||
5 | |||
6 | Even with hardware accel, we are not currently expecting | ||
7 | to link the linux-user binaries to any crypto libraries, | ||
8 | and doing so would generally make the --static build fail. | ||
9 | |||
10 | So choose XXH64 as a reasonably quick and decent hash. | ||
11 | |||
12 | Tested-by: Mark Rutland <mark.rutland@arm.com> | ||
13 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
14 | Message-id: 20210111235740.462469-2-richard.henderson@linaro.org | ||
15 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
17 | --- | ||
18 | include/qemu/xxhash.h | 98 +++++++++++++++++++++++++++++++++++++++ | ||
19 | target/arm/cpu.h | 15 ++++-- | ||
20 | target/arm/pauth_helper.c | 27 +++++++++-- | ||
21 | 3 files changed, 131 insertions(+), 9 deletions(-) | ||
22 | |||
23 | diff --git a/include/qemu/xxhash.h b/include/qemu/xxhash.h | ||
24 | index XXXXXXX..XXXXXXX 100644 | ||
25 | --- a/include/qemu/xxhash.h | ||
26 | +++ b/include/qemu/xxhash.h | ||
27 | @@ -XXX,XX +XXX,XX @@ static inline uint32_t qemu_xxhash6(uint64_t ab, uint64_t cd, uint32_t e, | ||
28 | return qemu_xxhash7(ab, cd, e, f, 0); | ||
29 | } | ||
30 | |||
31 | +/* | ||
32 | + * Component parts of the XXH64 algorithm from | ||
33 | + * https://github.com/Cyan4973/xxHash/blob/v0.8.0/xxhash.h | ||
34 | + * | ||
35 | + * The complete algorithm looks like | ||
36 | + * | ||
37 | + * i = 0; | ||
38 | + * if (len >= 32) { | ||
39 | + * v1 = seed + XXH_PRIME64_1 + XXH_PRIME64_2; | ||
40 | + * v2 = seed + XXH_PRIME64_2; | ||
41 | + * v3 = seed + 0; | ||
42 | + * v4 = seed - XXH_PRIME64_1; | ||
43 | + * do { | ||
44 | + * v1 = XXH64_round(v1, get64bits(input + i)); | ||
45 | + * v2 = XXH64_round(v2, get64bits(input + i + 8)); | ||
46 | + * v3 = XXH64_round(v3, get64bits(input + i + 16)); | ||
47 | + * v4 = XXH64_round(v4, get64bits(input + i + 24)); | ||
48 | + * } while ((i += 32) <= len); | ||
49 | + * h64 = XXH64_mergerounds(v1, v2, v3, v4); | ||
50 | + * } else { | ||
51 | + * h64 = seed + XXH_PRIME64_5; | ||
52 | + * } | ||
53 | + * h64 += len; | ||
54 | + * | ||
55 | + * for (; i + 8 <= len; i += 8) { | ||
56 | + * h64 ^= XXH64_round(0, get64bits(input + i)); | ||
57 | + * h64 = rol64(h64, 27) * XXH_PRIME64_1 + XXH_PRIME64_4; | ||
58 | + * } | ||
59 | + * for (; i + 4 <= len; i += 4) { | ||
60 | + * h64 ^= get32bits(input + i) * PRIME64_1; | ||
61 | + * h64 = rol64(h64, 23) * XXH_PRIME64_2 + XXH_PRIME64_3; | ||
62 | + * } | ||
63 | + * for (; i < len; i += 1) { | ||
64 | + * h64 ^= get8bits(input + i) * XXH_PRIME64_5; | ||
65 | + * h64 = rol64(h64, 11) * XXH_PRIME64_1; | ||
66 | + * } | ||
67 | + * | ||
68 | + * return XXH64_avalanche(h64) | ||
69 | + * | ||
70 | + * Exposing the pieces instead allows for simplified usage when | ||
71 | + * the length is a known constant and the inputs are in registers. | ||
72 | + */ | ||
73 | +#define XXH_PRIME64_1 0x9E3779B185EBCA87ULL | ||
74 | +#define XXH_PRIME64_2 0xC2B2AE3D27D4EB4FULL | ||
75 | +#define XXH_PRIME64_3 0x165667B19E3779F9ULL | ||
76 | +#define XXH_PRIME64_4 0x85EBCA77C2B2AE63ULL | ||
77 | +#define XXH_PRIME64_5 0x27D4EB2F165667C5ULL | ||
78 | + | ||
79 | +static inline uint64_t XXH64_round(uint64_t acc, uint64_t input) | ||
80 | +{ | ||
81 | + return rol64(acc + input * XXH_PRIME64_2, 31) * XXH_PRIME64_1; | ||
82 | +} | ||
83 | + | ||
84 | +static inline uint64_t XXH64_mergeround(uint64_t acc, uint64_t val) | ||
85 | +{ | ||
86 | + return (acc ^ XXH64_round(0, val)) * XXH_PRIME64_1 + XXH_PRIME64_4; | ||
87 | +} | ||
88 | + | ||
89 | +static inline uint64_t XXH64_mergerounds(uint64_t v1, uint64_t v2, | ||
90 | + uint64_t v3, uint64_t v4) | ||
91 | +{ | ||
92 | + uint64_t h64; | ||
93 | + | ||
94 | + h64 = rol64(v1, 1) + rol64(v2, 7) + rol64(v3, 12) + rol64(v4, 18); | ||
95 | + h64 = XXH64_mergeround(h64, v1); | ||
96 | + h64 = XXH64_mergeround(h64, v2); | ||
97 | + h64 = XXH64_mergeround(h64, v3); | ||
98 | + h64 = XXH64_mergeround(h64, v4); | ||
99 | + | ||
100 | + return h64; | ||
101 | +} | ||
102 | + | ||
103 | +static inline uint64_t XXH64_avalanche(uint64_t h64) | ||
104 | +{ | ||
105 | + h64 ^= h64 >> 33; | ||
106 | + h64 *= XXH_PRIME64_2; | ||
107 | + h64 ^= h64 >> 29; | ||
108 | + h64 *= XXH_PRIME64_3; | ||
109 | + h64 ^= h64 >> 32; | ||
110 | + return h64; | ||
111 | +} | ||
112 | + | ||
113 | +static inline uint64_t qemu_xxhash64_4(uint64_t a, uint64_t b, | ||
114 | + uint64_t c, uint64_t d) | ||
115 | +{ | ||
116 | + uint64_t v1 = QEMU_XXHASH_SEED + XXH_PRIME64_1 + XXH_PRIME64_2; | ||
117 | + uint64_t v2 = QEMU_XXHASH_SEED + XXH_PRIME64_2; | ||
118 | + uint64_t v3 = QEMU_XXHASH_SEED + 0; | ||
119 | + uint64_t v4 = QEMU_XXHASH_SEED - XXH_PRIME64_1; | ||
120 | + | ||
121 | + v1 = XXH64_round(v1, a); | ||
122 | + v2 = XXH64_round(v2, b); | ||
123 | + v3 = XXH64_round(v3, c); | ||
124 | + v4 = XXH64_round(v4, d); | ||
125 | + | ||
126 | + return XXH64_avalanche(XXH64_mergerounds(v1, v2, v3, v4)); | ||
127 | +} | ||
128 | + | ||
129 | #endif /* QEMU_XXHASH_H */ | ||
130 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
131 | index XXXXXXX..XXXXXXX 100644 | ||
132 | --- a/target/arm/cpu.h | ||
133 | +++ b/target/arm/cpu.h | ||
134 | @@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_fcma(const ARMISARegisters *id) | ||
135 | static inline bool isar_feature_aa64_pauth(const ARMISARegisters *id) | ||
136 | { | ||
137 | /* | ||
138 | - * Note that while QEMU will only implement the architected algorithm | ||
139 | - * QARMA, and thus APA+GPA, the host cpu for kvm may use implementation | ||
140 | - * defined algorithms, and thus API+GPI, and this predicate controls | ||
141 | - * migration of the 128-bit keys. | ||
142 | + * Return true if any form of pauth is enabled, as this | ||
143 | + * predicate controls migration of the 128-bit keys. | ||
144 | */ | ||
145 | return (id->id_aa64isar1 & | ||
146 | (FIELD_DP64(0, ID_AA64ISAR1, APA, 0xf) | | ||
147 | @@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_pauth(const ARMISARegisters *id) | ||
148 | FIELD_DP64(0, ID_AA64ISAR1, GPI, 0xf))) != 0; | ||
149 | } | ||
150 | |||
151 | +static inline bool isar_feature_aa64_pauth_arch(const ARMISARegisters *id) | ||
152 | +{ | ||
153 | + /* | ||
154 | + * Return true if pauth is enabled with the architected QARMA algorithm. | ||
155 | + * QEMU will always set APA+GPA to the same value. | ||
156 | + */ | ||
157 | + return FIELD_EX64(id->id_aa64isar1, ID_AA64ISAR1, APA) != 0; | ||
158 | +} | ||
159 | + | ||
160 | static inline bool isar_feature_aa64_sb(const ARMISARegisters *id) | ||
161 | { | ||
162 | return FIELD_EX64(id->id_aa64isar1, ID_AA64ISAR1, SB) != 0; | ||
163 | diff --git a/target/arm/pauth_helper.c b/target/arm/pauth_helper.c | ||
164 | index XXXXXXX..XXXXXXX 100644 | ||
165 | --- a/target/arm/pauth_helper.c | ||
166 | +++ b/target/arm/pauth_helper.c | ||
167 | @@ -XXX,XX +XXX,XX @@ | ||
168 | #include "exec/cpu_ldst.h" | ||
169 | #include "exec/helper-proto.h" | ||
170 | #include "tcg/tcg-gvec-desc.h" | ||
171 | +#include "qemu/xxhash.h" | ||
172 | |||
173 | |||
174 | static uint64_t pac_cell_shuffle(uint64_t i) | ||
175 | @@ -XXX,XX +XXX,XX @@ static uint64_t tweak_inv_shuffle(uint64_t i) | ||
176 | return o; | ||
177 | } | ||
178 | |||
179 | -static uint64_t pauth_computepac(uint64_t data, uint64_t modifier, | ||
180 | - ARMPACKey key) | ||
181 | +static uint64_t pauth_computepac_architected(uint64_t data, uint64_t modifier, | ||
182 | + ARMPACKey key) | ||
183 | { | ||
184 | static const uint64_t RC[5] = { | ||
185 | 0x0000000000000000ull, | ||
186 | @@ -XXX,XX +XXX,XX @@ static uint64_t pauth_computepac(uint64_t data, uint64_t modifier, | ||
187 | return workingval; | ||
188 | } | ||
189 | |||
190 | +static uint64_t pauth_computepac_impdef(uint64_t data, uint64_t modifier, | ||
191 | + ARMPACKey key) | ||
192 | +{ | ||
193 | + return qemu_xxhash64_4(data, modifier, key.lo, key.hi); | ||
194 | +} | ||
195 | + | ||
196 | +static uint64_t pauth_computepac(CPUARMState *env, uint64_t data, | ||
197 | + uint64_t modifier, ARMPACKey key) | ||
198 | +{ | ||
199 | + if (cpu_isar_feature(aa64_pauth_arch, env_archcpu(env))) { | ||
200 | + return pauth_computepac_architected(data, modifier, key); | ||
201 | + } else { | ||
202 | + return pauth_computepac_impdef(data, modifier, key); | ||
203 | + } | ||
204 | +} | ||
205 | + | ||
206 | static uint64_t pauth_addpac(CPUARMState *env, uint64_t ptr, uint64_t modifier, | ||
207 | ARMPACKey *key, bool data) | ||
208 | { | ||
209 | @@ -XXX,XX +XXX,XX @@ static uint64_t pauth_addpac(CPUARMState *env, uint64_t ptr, uint64_t modifier, | ||
210 | bot_bit = 64 - param.tsz; | ||
211 | ext_ptr = deposit64(ptr, bot_bit, top_bit - bot_bit, ext); | ||
212 | |||
213 | - pac = pauth_computepac(ext_ptr, modifier, *key); | ||
214 | + pac = pauth_computepac(env, ext_ptr, modifier, *key); | ||
215 | |||
216 | /* | ||
217 | * Check if the ptr has good extension bits and corrupt the | ||
218 | @@ -XXX,XX +XXX,XX @@ static uint64_t pauth_auth(CPUARMState *env, uint64_t ptr, uint64_t modifier, | ||
219 | uint64_t pac, orig_ptr, test; | ||
220 | |||
221 | orig_ptr = pauth_original_ptr(ptr, param); | ||
222 | - pac = pauth_computepac(orig_ptr, modifier, *key); | ||
223 | + pac = pauth_computepac(env, orig_ptr, modifier, *key); | ||
224 | bot_bit = 64 - param.tsz; | ||
225 | top_bit = 64 - 8 * param.tbi; | ||
226 | |||
227 | @@ -XXX,XX +XXX,XX @@ uint64_t HELPER(pacga)(CPUARMState *env, uint64_t x, uint64_t y) | ||
228 | uint64_t pac; | ||
229 | |||
230 | pauth_check_trap(env, arm_current_el(env), GETPC()); | ||
231 | - pac = pauth_computepac(x, y, env->keys.apga); | ||
232 | + pac = pauth_computepac(env, x, y, env->keys.apga); | ||
233 | |||
234 | return pac & 0xffffffff00000000ull; | ||
235 | } | ||
236 | -- | ||
237 | 2.20.1 | ||
238 | |||
239 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Richard Henderson <richard.henderson@linaro.org> | ||
2 | 1 | ||
3 | The crypto overhead of emulating pauth can be significant for | ||
4 | some workloads. Add two boolean properties that allows the | ||
5 | feature to be turned off, on with the architected algorithm, | ||
6 | or on with an implementation defined algorithm. | ||
7 | |||
8 | We need two intermediate booleans to control the state while | ||
9 | parsing properties lest we clobber ID_AA64ISAR1 into an invalid | ||
10 | intermediate state. | ||
11 | |||
12 | Tested-by: Mark Rutland <mark.rutland@arm.com> | ||
13 | Reviewed-by: Andrew Jones <drjones@redhat.com> | ||
14 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
15 | Message-id: 20210111235740.462469-3-richard.henderson@linaro.org | ||
16 | [PMM: fixed docs typo, tweaked text to clarify that the impdef | ||
17 | algorithm is specific to QEMU] | ||
18 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
19 | --- | ||
20 | docs/system/arm/cpu-features.rst | 21 +++++++++++++++++ | ||
21 | target/arm/cpu.h | 10 ++++++++ | ||
22 | target/arm/cpu.c | 13 +++++++++++ | ||
23 | target/arm/cpu64.c | 40 ++++++++++++++++++++++++++++---- | ||
24 | target/arm/monitor.c | 1 + | ||
25 | tests/qtest/arm-cpu-features.c | 13 +++++++++++ | ||
26 | 6 files changed, 94 insertions(+), 4 deletions(-) | ||
27 | |||
28 | diff --git a/docs/system/arm/cpu-features.rst b/docs/system/arm/cpu-features.rst | ||
29 | index XXXXXXX..XXXXXXX 100644 | ||
30 | --- a/docs/system/arm/cpu-features.rst | ||
31 | +++ b/docs/system/arm/cpu-features.rst | ||
32 | @@ -XXX,XX +XXX,XX @@ the list of KVM VCPU features and their descriptions. | ||
33 | influence the guest scheduler behavior and/or be | ||
34 | exposed to the guest userspace. | ||
35 | |||
36 | +TCG VCPU Features | ||
37 | +================= | ||
38 | + | ||
39 | +TCG VCPU features are CPU features that are specific to TCG. | ||
40 | +Below is the list of TCG VCPU features and their descriptions. | ||
41 | + | ||
42 | + pauth Enable or disable `FEAT_Pauth`, pointer | ||
43 | + authentication. By default, the feature is | ||
44 | + enabled with `-cpu max`. | ||
45 | + | ||
46 | + pauth-impdef When `FEAT_Pauth` is enabled, either the | ||
47 | + *impdef* (Implementation Defined) algorithm | ||
48 | + is enabled or the *architected* QARMA algorithm | ||
49 | + is enabled. By default the impdef algorithm | ||
50 | + is disabled, and QARMA is enabled. | ||
51 | + | ||
52 | + The architected QARMA algorithm has good | ||
53 | + cryptographic properties, but can be quite slow | ||
54 | + to emulate. The impdef algorithm used by QEMU | ||
55 | + is non-cryptographic but significantly faster. | ||
56 | + | ||
57 | SVE CPU Properties | ||
58 | ================== | ||
59 | |||
60 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
61 | index XXXXXXX..XXXXXXX 100644 | ||
62 | --- a/target/arm/cpu.h | ||
63 | +++ b/target/arm/cpu.h | ||
64 | @@ -XXX,XX +XXX,XX @@ typedef struct { | ||
65 | #ifdef TARGET_AARCH64 | ||
66 | # define ARM_MAX_VQ 16 | ||
67 | void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp); | ||
68 | +void arm_cpu_pauth_finalize(ARMCPU *cpu, Error **errp); | ||
69 | #else | ||
70 | # define ARM_MAX_VQ 1 | ||
71 | static inline void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp) { } | ||
72 | +static inline void arm_cpu_pauth_finalize(ARMCPU *cpu, Error **errp) { } | ||
73 | #endif | ||
74 | |||
75 | typedef struct ARMVectorReg { | ||
76 | @@ -XXX,XX +XXX,XX @@ struct ARMCPU { | ||
77 | uint64_t reset_cbar; | ||
78 | uint32_t reset_auxcr; | ||
79 | bool reset_hivecs; | ||
80 | + | ||
81 | + /* | ||
82 | + * Intermediate values used during property parsing. | ||
83 | + * Once finalized, the values should be read from ID_AA64ISAR1. | ||
84 | + */ | ||
85 | + bool prop_pauth; | ||
86 | + bool prop_pauth_impdef; | ||
87 | + | ||
88 | /* DCZ blocksize, in log_2(words), ie low 4 bits of DCZID_EL0 */ | ||
89 | uint32_t dcz_blocksize; | ||
90 | uint64_t rvbar; | ||
91 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | ||
92 | index XXXXXXX..XXXXXXX 100644 | ||
93 | --- a/target/arm/cpu.c | ||
94 | +++ b/target/arm/cpu.c | ||
95 | @@ -XXX,XX +XXX,XX @@ void arm_cpu_finalize_features(ARMCPU *cpu, Error **errp) | ||
96 | error_propagate(errp, local_err); | ||
97 | return; | ||
98 | } | ||
99 | + | ||
100 | + /* | ||
101 | + * KVM does not support modifications to this feature. | ||
102 | + * We have not registered the cpu properties when KVM | ||
103 | + * is in use, so the user will not be able to set them. | ||
104 | + */ | ||
105 | + if (!kvm_enabled()) { | ||
106 | + arm_cpu_pauth_finalize(cpu, &local_err); | ||
107 | + if (local_err != NULL) { | ||
108 | + error_propagate(errp, local_err); | ||
109 | + return; | ||
110 | + } | ||
111 | + } | ||
112 | } | ||
113 | |||
114 | if (kvm_enabled()) { | ||
115 | diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c | ||
116 | index XXXXXXX..XXXXXXX 100644 | ||
117 | --- a/target/arm/cpu64.c | ||
118 | +++ b/target/arm/cpu64.c | ||
119 | @@ -XXX,XX +XXX,XX @@ | ||
120 | #include "sysemu/kvm.h" | ||
121 | #include "kvm_arm.h" | ||
122 | #include "qapi/visitor.h" | ||
123 | +#include "hw/qdev-properties.h" | ||
124 | + | ||
125 | |||
126 | #ifndef CONFIG_USER_ONLY | ||
127 | static uint64_t a57_a53_l2ctlr_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
128 | @@ -XXX,XX +XXX,XX @@ void aarch64_add_sve_properties(Object *obj) | ||
129 | } | ||
130 | } | ||
131 | |||
132 | +void arm_cpu_pauth_finalize(ARMCPU *cpu, Error **errp) | ||
133 | +{ | ||
134 | + int arch_val = 0, impdef_val = 0; | ||
135 | + uint64_t t; | ||
136 | + | ||
137 | + /* TODO: Handle HaveEnhancedPAC, HaveEnhancedPAC2, HaveFPAC. */ | ||
138 | + if (cpu->prop_pauth) { | ||
139 | + if (cpu->prop_pauth_impdef) { | ||
140 | + impdef_val = 1; | ||
141 | + } else { | ||
142 | + arch_val = 1; | ||
143 | + } | ||
144 | + } else if (cpu->prop_pauth_impdef) { | ||
145 | + error_setg(errp, "cannot enable pauth-impdef without pauth"); | ||
146 | + error_append_hint(errp, "Add pauth=on to the CPU property list.\n"); | ||
147 | + } | ||
148 | + | ||
149 | + t = cpu->isar.id_aa64isar1; | ||
150 | + t = FIELD_DP64(t, ID_AA64ISAR1, APA, arch_val); | ||
151 | + t = FIELD_DP64(t, ID_AA64ISAR1, GPA, arch_val); | ||
152 | + t = FIELD_DP64(t, ID_AA64ISAR1, API, impdef_val); | ||
153 | + t = FIELD_DP64(t, ID_AA64ISAR1, GPI, impdef_val); | ||
154 | + cpu->isar.id_aa64isar1 = t; | ||
155 | +} | ||
156 | + | ||
157 | +static Property arm_cpu_pauth_property = | ||
158 | + DEFINE_PROP_BOOL("pauth", ARMCPU, prop_pauth, true); | ||
159 | +static Property arm_cpu_pauth_impdef_property = | ||
160 | + DEFINE_PROP_BOOL("pauth-impdef", ARMCPU, prop_pauth_impdef, false); | ||
161 | + | ||
162 | /* -cpu max: if KVM is enabled, like -cpu host (best possible with this host); | ||
163 | * otherwise, a CPU with as many features enabled as our emulation supports. | ||
164 | * The version of '-cpu max' for qemu-system-arm is defined in cpu.c; | ||
165 | @@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj) | ||
166 | t = FIELD_DP64(t, ID_AA64ISAR1, DPB, 2); | ||
167 | t = FIELD_DP64(t, ID_AA64ISAR1, JSCVT, 1); | ||
168 | t = FIELD_DP64(t, ID_AA64ISAR1, FCMA, 1); | ||
169 | - t = FIELD_DP64(t, ID_AA64ISAR1, APA, 1); /* PAuth, architected only */ | ||
170 | - t = FIELD_DP64(t, ID_AA64ISAR1, API, 0); | ||
171 | - t = FIELD_DP64(t, ID_AA64ISAR1, GPA, 1); | ||
172 | - t = FIELD_DP64(t, ID_AA64ISAR1, GPI, 0); | ||
173 | t = FIELD_DP64(t, ID_AA64ISAR1, SB, 1); | ||
174 | t = FIELD_DP64(t, ID_AA64ISAR1, SPECRES, 1); | ||
175 | t = FIELD_DP64(t, ID_AA64ISAR1, FRINTTS, 1); | ||
176 | @@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj) | ||
177 | cpu->ctr = 0x80038003; /* 32 byte I and D cacheline size, VIPT icache */ | ||
178 | cpu->dcz_blocksize = 7; /* 512 bytes */ | ||
179 | #endif | ||
180 | + | ||
181 | + /* Default to PAUTH on, with the architected algorithm. */ | ||
182 | + qdev_property_add_static(DEVICE(obj), &arm_cpu_pauth_property); | ||
183 | + qdev_property_add_static(DEVICE(obj), &arm_cpu_pauth_impdef_property); | ||
184 | } | ||
185 | |||
186 | aarch64_add_sve_properties(obj); | ||
187 | diff --git a/target/arm/monitor.c b/target/arm/monitor.c | ||
188 | index XXXXXXX..XXXXXXX 100644 | ||
189 | --- a/target/arm/monitor.c | ||
190 | +++ b/target/arm/monitor.c | ||
191 | @@ -XXX,XX +XXX,XX @@ static const char *cpu_model_advertised_features[] = { | ||
192 | "sve640", "sve768", "sve896", "sve1024", "sve1152", "sve1280", | ||
193 | "sve1408", "sve1536", "sve1664", "sve1792", "sve1920", "sve2048", | ||
194 | "kvm-no-adjvtime", "kvm-steal-time", | ||
195 | + "pauth", "pauth-impdef", | ||
196 | NULL | ||
197 | }; | ||
198 | |||
199 | diff --git a/tests/qtest/arm-cpu-features.c b/tests/qtest/arm-cpu-features.c | ||
200 | index XXXXXXX..XXXXXXX 100644 | ||
201 | --- a/tests/qtest/arm-cpu-features.c | ||
202 | +++ b/tests/qtest/arm-cpu-features.c | ||
203 | @@ -XXX,XX +XXX,XX @@ static void sve_tests_sve_off_kvm(const void *data) | ||
204 | qtest_quit(qts); | ||
205 | } | ||
206 | |||
207 | +static void pauth_tests_default(QTestState *qts, const char *cpu_type) | ||
208 | +{ | ||
209 | + assert_has_feature_enabled(qts, cpu_type, "pauth"); | ||
210 | + assert_has_feature_disabled(qts, cpu_type, "pauth-impdef"); | ||
211 | + assert_set_feature(qts, cpu_type, "pauth", false); | ||
212 | + assert_set_feature(qts, cpu_type, "pauth", true); | ||
213 | + assert_set_feature(qts, cpu_type, "pauth-impdef", true); | ||
214 | + assert_set_feature(qts, cpu_type, "pauth-impdef", false); | ||
215 | + assert_error(qts, cpu_type, "cannot enable pauth-impdef without pauth", | ||
216 | + "{ 'pauth': false, 'pauth-impdef': true }"); | ||
217 | +} | ||
218 | + | ||
219 | static void test_query_cpu_model_expansion(const void *data) | ||
220 | { | ||
221 | QTestState *qts; | ||
222 | @@ -XXX,XX +XXX,XX @@ static void test_query_cpu_model_expansion(const void *data) | ||
223 | assert_has_feature_enabled(qts, "cortex-a57", "aarch64"); | ||
224 | |||
225 | sve_tests_default(qts, "max"); | ||
226 | + pauth_tests_default(qts, "max"); | ||
227 | |||
228 | /* Test that features that depend on KVM generate errors without. */ | ||
229 | assert_error(qts, "max", | ||
230 | -- | ||
231 | 2.20.1 | ||
232 | |||
233 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Richard Henderson <richard.henderson@linaro.org> | ||
2 | 1 | ||
3 | The interface for object_property_add_bool is simpler, | ||
4 | making the code easier to understand. | ||
5 | |||
6 | Reviewed-by: Andrew Jones <drjones@redhat.com> | ||
7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20210111235740.462469-4-richard.henderson@linaro.org | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | --- | ||
11 | target/arm/cpu64.c | 24 ++++++++++-------------- | ||
12 | 1 file changed, 10 insertions(+), 14 deletions(-) | ||
13 | |||
14 | diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/target/arm/cpu64.c | ||
17 | +++ b/target/arm/cpu64.c | ||
18 | @@ -XXX,XX +XXX,XX @@ static void cpu_max_set_sve_max_vq(Object *obj, Visitor *v, const char *name, | ||
19 | cpu->sve_max_vq = max_vq; | ||
20 | } | ||
21 | |||
22 | +/* | ||
23 | + * Note that cpu_arm_get/set_sve_vq cannot use the simpler | ||
24 | + * object_property_add_bool interface because they make use | ||
25 | + * of the contents of "name" to determine which bit on which | ||
26 | + * to operate. | ||
27 | + */ | ||
28 | static void cpu_arm_get_sve_vq(Object *obj, Visitor *v, const char *name, | ||
29 | void *opaque, Error **errp) | ||
30 | { | ||
31 | @@ -XXX,XX +XXX,XX @@ static void cpu_arm_set_sve_vq(Object *obj, Visitor *v, const char *name, | ||
32 | set_bit(vq - 1, cpu->sve_vq_init); | ||
33 | } | ||
34 | |||
35 | -static void cpu_arm_get_sve(Object *obj, Visitor *v, const char *name, | ||
36 | - void *opaque, Error **errp) | ||
37 | +static bool cpu_arm_get_sve(Object *obj, Error **errp) | ||
38 | { | ||
39 | ARMCPU *cpu = ARM_CPU(obj); | ||
40 | - bool value = cpu_isar_feature(aa64_sve, cpu); | ||
41 | - | ||
42 | - visit_type_bool(v, name, &value, errp); | ||
43 | + return cpu_isar_feature(aa64_sve, cpu); | ||
44 | } | ||
45 | |||
46 | -static void cpu_arm_set_sve(Object *obj, Visitor *v, const char *name, | ||
47 | - void *opaque, Error **errp) | ||
48 | +static void cpu_arm_set_sve(Object *obj, bool value, Error **errp) | ||
49 | { | ||
50 | ARMCPU *cpu = ARM_CPU(obj); | ||
51 | - bool value; | ||
52 | uint64_t t; | ||
53 | |||
54 | - if (!visit_type_bool(v, name, &value, errp)) { | ||
55 | - return; | ||
56 | - } | ||
57 | - | ||
58 | if (value && kvm_enabled() && !kvm_arm_sve_supported()) { | ||
59 | error_setg(errp, "'sve' feature not supported by KVM on this host"); | ||
60 | return; | ||
61 | @@ -XXX,XX +XXX,XX @@ void aarch64_add_sve_properties(Object *obj) | ||
62 | { | ||
63 | uint32_t vq; | ||
64 | |||
65 | - object_property_add(obj, "sve", "bool", cpu_arm_get_sve, | ||
66 | - cpu_arm_set_sve, NULL, NULL); | ||
67 | + object_property_add_bool(obj, "sve", cpu_arm_get_sve, cpu_arm_set_sve); | ||
68 | |||
69 | for (vq = 1; vq <= ARM_MAX_VQ; ++vq) { | ||
70 | char name[8]; | ||
71 | -- | ||
72 | 2.20.1 | ||
73 | |||
74 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
2 | 1 | ||
3 | In this context, the HCR value is the effective value, and thus is | ||
4 | zero in secure mode. The tests for HCR.{F,I}MO are sufficient. | ||
5 | |||
6 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20210112104511.36576-1-remi.denis.courmont@huawei.com | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | --- | ||
11 | target/arm/cpu.c | 8 ++++---- | ||
12 | target/arm/helper.c | 10 ++++------ | ||
13 | 2 files changed, 8 insertions(+), 10 deletions(-) | ||
14 | |||
15 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | ||
16 | index XXXXXXX..XXXXXXX 100644 | ||
17 | --- a/target/arm/cpu.c | ||
18 | +++ b/target/arm/cpu.c | ||
19 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_excp_unmasked(CPUState *cs, unsigned int excp_idx, | ||
20 | break; | ||
21 | |||
22 | case EXCP_VFIQ: | ||
23 | - if (secure || !(hcr_el2 & HCR_FMO) || (hcr_el2 & HCR_TGE)) { | ||
24 | - /* VFIQs are only taken when hypervized and non-secure. */ | ||
25 | + if (!(hcr_el2 & HCR_FMO) || (hcr_el2 & HCR_TGE)) { | ||
26 | + /* VFIQs are only taken when hypervized. */ | ||
27 | return false; | ||
28 | } | ||
29 | return !(env->daif & PSTATE_F); | ||
30 | case EXCP_VIRQ: | ||
31 | - if (secure || !(hcr_el2 & HCR_IMO) || (hcr_el2 & HCR_TGE)) { | ||
32 | - /* VIRQs are only taken when hypervized and non-secure. */ | ||
33 | + if (!(hcr_el2 & HCR_IMO) || (hcr_el2 & HCR_TGE)) { | ||
34 | + /* VIRQs are only taken when hypervized. */ | ||
35 | return false; | ||
36 | } | ||
37 | return !(env->daif & PSTATE_I); | ||
38 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
39 | index XXXXXXX..XXXXXXX 100644 | ||
40 | --- a/target/arm/helper.c | ||
41 | +++ b/target/arm/helper.c | ||
42 | @@ -XXX,XX +XXX,XX @@ static void csselr_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
43 | static uint64_t isr_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
44 | { | ||
45 | CPUState *cs = env_cpu(env); | ||
46 | - uint64_t hcr_el2 = arm_hcr_el2_eff(env); | ||
47 | + bool el1 = arm_current_el(env) == 1; | ||
48 | + uint64_t hcr_el2 = el1 ? arm_hcr_el2_eff(env) : 0; | ||
49 | uint64_t ret = 0; | ||
50 | - bool allow_virt = (arm_current_el(env) == 1 && | ||
51 | - (!arm_is_secure_below_el3(env) || | ||
52 | - (env->cp15.scr_el3 & SCR_EEL2))); | ||
53 | |||
54 | - if (allow_virt && (hcr_el2 & HCR_IMO)) { | ||
55 | + if (hcr_el2 & HCR_IMO) { | ||
56 | if (cs->interrupt_request & CPU_INTERRUPT_VIRQ) { | ||
57 | ret |= CPSR_I; | ||
58 | } | ||
59 | @@ -XXX,XX +XXX,XX @@ static uint64_t isr_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
60 | } | ||
61 | } | ||
62 | |||
63 | - if (allow_virt && (hcr_el2 & HCR_FMO)) { | ||
64 | + if (hcr_el2 & HCR_FMO) { | ||
65 | if (cs->interrupt_request & CPU_INTERRUPT_VFIQ) { | ||
66 | ret |= CPSR_F; | ||
67 | } | ||
68 | -- | ||
69 | 2.20.1 | ||
70 | |||
71 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
2 | 1 | ||
3 | This checks if EL2 is enabled (meaning EL2 registers take effects) in | ||
4 | the current security context. | ||
5 | |||
6 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20210112104511.36576-2-remi.denis.courmont@huawei.com | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | --- | ||
11 | target/arm/cpu.h | 17 +++++++++++++++++ | ||
12 | 1 file changed, 17 insertions(+) | ||
13 | |||
14 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/target/arm/cpu.h | ||
17 | +++ b/target/arm/cpu.h | ||
18 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_is_secure(CPUARMState *env) | ||
19 | return arm_is_secure_below_el3(env); | ||
20 | } | ||
21 | |||
22 | +/* | ||
23 | + * Return true if the current security state has AArch64 EL2 or AArch32 Hyp. | ||
24 | + * This corresponds to the pseudocode EL2Enabled() | ||
25 | + */ | ||
26 | +static inline bool arm_is_el2_enabled(CPUARMState *env) | ||
27 | +{ | ||
28 | + if (arm_feature(env, ARM_FEATURE_EL2)) { | ||
29 | + return !arm_is_secure_below_el3(env); | ||
30 | + } | ||
31 | + return false; | ||
32 | +} | ||
33 | + | ||
34 | #else | ||
35 | static inline bool arm_is_secure_below_el3(CPUARMState *env) | ||
36 | { | ||
37 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_is_secure(CPUARMState *env) | ||
38 | { | ||
39 | return false; | ||
40 | } | ||
41 | + | ||
42 | +static inline bool arm_is_el2_enabled(CPUARMState *env) | ||
43 | +{ | ||
44 | + return false; | ||
45 | +} | ||
46 | #endif | ||
47 | |||
48 | /** | ||
49 | -- | ||
50 | 2.20.1 | ||
51 | |||
52 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
2 | 1 | ||
3 | Do not assume that EL2 is available in and only in non-secure context. | ||
4 | That equivalence is broken by ARMv8.4-SEL2. | ||
5 | |||
6 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20210112104511.36576-3-remi.denis.courmont@huawei.com | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | --- | ||
11 | target/arm/cpu.h | 4 ++-- | ||
12 | target/arm/helper-a64.c | 8 +------- | ||
13 | target/arm/helper.c | 33 +++++++++++++-------------------- | ||
14 | 3 files changed, 16 insertions(+), 29 deletions(-) | ||
15 | |||
16 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
17 | index XXXXXXX..XXXXXXX 100644 | ||
18 | --- a/target/arm/cpu.h | ||
19 | +++ b/target/arm/cpu.h | ||
20 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_el_is_aa64(CPUARMState *env, int el) | ||
21 | return aa64; | ||
22 | } | ||
23 | |||
24 | - if (arm_feature(env, ARM_FEATURE_EL2) && !arm_is_secure_below_el3(env)) { | ||
25 | + if (arm_is_el2_enabled(env)) { | ||
26 | aa64 = aa64 && (env->cp15.hcr_el2 & HCR_RW); | ||
27 | } | ||
28 | |||
29 | @@ -XXX,XX +XXX,XX @@ static inline int arm_debug_target_el(CPUARMState *env) | ||
30 | bool secure = arm_is_secure(env); | ||
31 | bool route_to_el2 = false; | ||
32 | |||
33 | - if (arm_feature(env, ARM_FEATURE_EL2) && !secure) { | ||
34 | + if (arm_is_el2_enabled(env)) { | ||
35 | route_to_el2 = env->cp15.hcr_el2 & HCR_TGE || | ||
36 | env->cp15.mdcr_el2 & MDCR_TDE; | ||
37 | } | ||
38 | diff --git a/target/arm/helper-a64.c b/target/arm/helper-a64.c | ||
39 | index XXXXXXX..XXXXXXX 100644 | ||
40 | --- a/target/arm/helper-a64.c | ||
41 | +++ b/target/arm/helper-a64.c | ||
42 | @@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc) | ||
43 | if (new_el == -1) { | ||
44 | goto illegal_return; | ||
45 | } | ||
46 | - if (new_el > cur_el | ||
47 | - || (new_el == 2 && !arm_feature(env, ARM_FEATURE_EL2))) { | ||
48 | + if (new_el > cur_el || (new_el == 2 && !arm_is_el2_enabled(env))) { | ||
49 | /* Disallow return to an EL which is unimplemented or higher | ||
50 | * than the current one. | ||
51 | */ | ||
52 | @@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc) | ||
53 | goto illegal_return; | ||
54 | } | ||
55 | |||
56 | - if (new_el == 2 && arm_is_secure_below_el3(env)) { | ||
57 | - /* Return to the non-existent secure-EL2 */ | ||
58 | - goto illegal_return; | ||
59 | - } | ||
60 | - | ||
61 | if (new_el == 1 && (arm_hcr_el2_eff(env) & HCR_TGE)) { | ||
62 | goto illegal_return; | ||
63 | } | ||
64 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
65 | index XXXXXXX..XXXXXXX 100644 | ||
66 | --- a/target/arm/helper.c | ||
67 | +++ b/target/arm/helper.c | ||
68 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult cpacr_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
69 | { | ||
70 | if (arm_feature(env, ARM_FEATURE_V8)) { | ||
71 | /* Check if CPACR accesses are to be trapped to EL2 */ | ||
72 | - if (arm_current_el(env) == 1 && | ||
73 | - (env->cp15.cptr_el[2] & CPTR_TCPAC) && !arm_is_secure(env)) { | ||
74 | + if (arm_current_el(env) == 1 && arm_is_el2_enabled(env) && | ||
75 | + (env->cp15.cptr_el[2] & CPTR_TCPAC)) { | ||
76 | return CP_ACCESS_TRAP_EL2; | ||
77 | /* Check if CPACR accesses are to be trapped to EL3 */ | ||
78 | } else if (arm_current_el(env) < 3 && | ||
79 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult gt_counter_access(CPUARMState *env, int timeridx, | ||
80 | bool isread) | ||
81 | { | ||
82 | unsigned int cur_el = arm_current_el(env); | ||
83 | - bool secure = arm_is_secure(env); | ||
84 | + bool has_el2 = arm_is_el2_enabled(env); | ||
85 | uint64_t hcr = arm_hcr_el2_eff(env); | ||
86 | |||
87 | switch (cur_el) { | ||
88 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult gt_counter_access(CPUARMState *env, int timeridx, | ||
89 | } | ||
90 | } else { | ||
91 | /* If HCR_EL2.<E2H> == 0: check CNTHCTL_EL2.EL1PCEN. */ | ||
92 | - if (arm_feature(env, ARM_FEATURE_EL2) && | ||
93 | - timeridx == GTIMER_PHYS && !secure && | ||
94 | + if (has_el2 && timeridx == GTIMER_PHYS && | ||
95 | !extract32(env->cp15.cnthctl_el2, 1, 1)) { | ||
96 | return CP_ACCESS_TRAP_EL2; | ||
97 | } | ||
98 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult gt_counter_access(CPUARMState *env, int timeridx, | ||
99 | |||
100 | case 1: | ||
101 | /* Check CNTHCTL_EL2.EL1PCTEN, which changes location based on E2H. */ | ||
102 | - if (arm_feature(env, ARM_FEATURE_EL2) && | ||
103 | - timeridx == GTIMER_PHYS && !secure && | ||
104 | + if (has_el2 && timeridx == GTIMER_PHYS && | ||
105 | (hcr & HCR_E2H | ||
106 | ? !extract32(env->cp15.cnthctl_el2, 10, 1) | ||
107 | : !extract32(env->cp15.cnthctl_el2, 0, 1))) { | ||
108 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult gt_timer_access(CPUARMState *env, int timeridx, | ||
109 | bool isread) | ||
110 | { | ||
111 | unsigned int cur_el = arm_current_el(env); | ||
112 | - bool secure = arm_is_secure(env); | ||
113 | + bool has_el2 = arm_is_el2_enabled(env); | ||
114 | uint64_t hcr = arm_hcr_el2_eff(env); | ||
115 | |||
116 | switch (cur_el) { | ||
117 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult gt_timer_access(CPUARMState *env, int timeridx, | ||
118 | /* fall through */ | ||
119 | |||
120 | case 1: | ||
121 | - if (arm_feature(env, ARM_FEATURE_EL2) && | ||
122 | - timeridx == GTIMER_PHYS && !secure) { | ||
123 | + if (has_el2 && timeridx == GTIMER_PHYS) { | ||
124 | if (hcr & HCR_E2H) { | ||
125 | /* If HCR_EL2.<E2H,TGE> == '10': check CNTHCTL_EL2.EL1PTEN. */ | ||
126 | if (!extract32(env->cp15.cnthctl_el2, 11, 1)) { | ||
127 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo strongarm_cp_reginfo[] = { | ||
128 | |||
129 | static uint64_t midr_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
130 | { | ||
131 | - ARMCPU *cpu = env_archcpu(env); | ||
132 | unsigned int cur_el = arm_current_el(env); | ||
133 | - bool secure = arm_is_secure(env); | ||
134 | |||
135 | - if (arm_feature(&cpu->env, ARM_FEATURE_EL2) && !secure && cur_el == 1) { | ||
136 | + if (arm_is_el2_enabled(env) && cur_el == 1) { | ||
137 | return env->cp15.vpidr_el2; | ||
138 | } | ||
139 | return raw_read(env, ri); | ||
140 | @@ -XXX,XX +XXX,XX @@ static uint64_t mpidr_read_val(CPUARMState *env) | ||
141 | static uint64_t mpidr_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
142 | { | ||
143 | unsigned int cur_el = arm_current_el(env); | ||
144 | - bool secure = arm_is_secure(env); | ||
145 | |||
146 | - if (arm_feature(env, ARM_FEATURE_EL2) && !secure && cur_el == 1) { | ||
147 | + if (arm_is_el2_enabled(env) && cur_el == 1) { | ||
148 | return env->cp15.vmpidr_el2; | ||
149 | } | ||
150 | return mpidr_read_val(env); | ||
151 | @@ -XXX,XX +XXX,XX @@ uint64_t arm_hcr_el2_eff(CPUARMState *env) | ||
152 | { | ||
153 | uint64_t ret = env->cp15.hcr_el2; | ||
154 | |||
155 | - if (arm_is_secure_below_el3(env)) { | ||
156 | + if (!arm_is_el2_enabled(env)) { | ||
157 | /* | ||
158 | * "This register has no effect if EL2 is not enabled in the | ||
159 | * current Security state". This is ARMv8.4-SecEL2 speak for | ||
160 | @@ -XXX,XX +XXX,XX @@ int sve_exception_el(CPUARMState *env, int el) | ||
161 | /* CPTR_EL2. Since TZ and TFP are positive, | ||
162 | * they will be zero when EL2 is not present. | ||
163 | */ | ||
164 | - if (el <= 2 && !arm_is_secure_below_el3(env)) { | ||
165 | + if (el <= 2 && arm_is_el2_enabled(env)) { | ||
166 | if (env->cp15.cptr_el[2] & CPTR_TZ) { | ||
167 | return 2; | ||
168 | } | ||
169 | @@ -XXX,XX +XXX,XX @@ static int bad_mode_switch(CPUARMState *env, int mode, CPSRWriteType write_type) | ||
170 | } | ||
171 | return 0; | ||
172 | case ARM_CPU_MODE_HYP: | ||
173 | - return !arm_feature(env, ARM_FEATURE_EL2) | ||
174 | - || arm_current_el(env) < 2 || arm_is_secure_below_el3(env); | ||
175 | + return !arm_is_el2_enabled(env) || arm_current_el(env) < 2; | ||
176 | case ARM_CPU_MODE_MON: | ||
177 | return arm_current_el(env) < 3; | ||
178 | default: | ||
179 | @@ -XXX,XX +XXX,XX @@ int fp_exception_el(CPUARMState *env, int cur_el) | ||
180 | |||
181 | /* CPTR_EL2 : present in v7VE or v8 */ | ||
182 | if (cur_el <= 2 && extract32(env->cp15.cptr_el[2], 10, 1) | ||
183 | - && !arm_is_secure_below_el3(env)) { | ||
184 | + && arm_is_el2_enabled(env)) { | ||
185 | /* Trap FP ops at EL2, NS-EL1 or NS-EL0 to EL2 */ | ||
186 | return 2; | ||
187 | } | ||
188 | -- | ||
189 | 2.20.1 | ||
190 | |||
191 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
2 | 1 | ||
3 | This will simplify accessing HCR conditionally in secure state. | ||
4 | |||
5 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
7 | Message-id: 20210112104511.36576-4-remi.denis.courmont@huawei.com | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | --- | ||
10 | target/arm/helper.c | 31 ++++++++++++++++++------------- | ||
11 | 1 file changed, 18 insertions(+), 13 deletions(-) | ||
12 | |||
13 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
14 | index XXXXXXX..XXXXXXX 100644 | ||
15 | --- a/target/arm/helper.c | ||
16 | +++ b/target/arm/helper.c | ||
17 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult aa64_cacheop_pou_access(CPUARMState *env, | ||
18 | |||
19 | static int vae1_tlbmask(CPUARMState *env) | ||
20 | { | ||
21 | - /* Since we exclude secure first, we may read HCR_EL2 directly. */ | ||
22 | - if (arm_is_secure_below_el3(env)) { | ||
23 | - return ARMMMUIdxBit_SE10_1 | | ||
24 | - ARMMMUIdxBit_SE10_1_PAN | | ||
25 | - ARMMMUIdxBit_SE10_0; | ||
26 | - } else if ((env->cp15.hcr_el2 & (HCR_E2H | HCR_TGE)) | ||
27 | - == (HCR_E2H | HCR_TGE)) { | ||
28 | + uint64_t hcr = arm_hcr_el2_eff(env); | ||
29 | + | ||
30 | + if ((hcr & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE)) { | ||
31 | return ARMMMUIdxBit_E20_2 | | ||
32 | ARMMMUIdxBit_E20_2_PAN | | ||
33 | ARMMMUIdxBit_E20_0; | ||
34 | + } else if (arm_is_secure_below_el3(env)) { | ||
35 | + return ARMMMUIdxBit_SE10_1 | | ||
36 | + ARMMMUIdxBit_SE10_1_PAN | | ||
37 | + ARMMMUIdxBit_SE10_0; | ||
38 | } else { | ||
39 | return ARMMMUIdxBit_E10_1 | | ||
40 | ARMMMUIdxBit_E10_1_PAN | | ||
41 | @@ -XXX,XX +XXX,XX @@ static inline uint64_t regime_sctlr(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
42 | static inline bool regime_translation_disabled(CPUARMState *env, | ||
43 | ARMMMUIdx mmu_idx) | ||
44 | { | ||
45 | + uint64_t hcr_el2; | ||
46 | + | ||
47 | if (arm_feature(env, ARM_FEATURE_M)) { | ||
48 | switch (env->v7m.mpu_ctrl[regime_is_secure(env, mmu_idx)] & | ||
49 | (R_V7M_MPU_CTRL_ENABLE_MASK | R_V7M_MPU_CTRL_HFNMIENA_MASK)) { | ||
50 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_translation_disabled(CPUARMState *env, | ||
51 | } | ||
52 | } | ||
53 | |||
54 | + hcr_el2 = arm_hcr_el2_eff(env); | ||
55 | + | ||
56 | if (mmu_idx == ARMMMUIdx_Stage2) { | ||
57 | /* HCR.DC means HCR.VM behaves as 1 */ | ||
58 | - return (env->cp15.hcr_el2 & (HCR_DC | HCR_VM)) == 0; | ||
59 | + return (hcr_el2 & (HCR_DC | HCR_VM)) == 0; | ||
60 | } | ||
61 | |||
62 | - if (env->cp15.hcr_el2 & HCR_TGE) { | ||
63 | + if (hcr_el2 & HCR_TGE) { | ||
64 | /* TGE means that NS EL0/1 act as if SCTLR_EL1.M is zero */ | ||
65 | if (!regime_is_secure(env, mmu_idx) && regime_el(env, mmu_idx) == 1) { | ||
66 | return true; | ||
67 | } | ||
68 | } | ||
69 | |||
70 | - if ((env->cp15.hcr_el2 & HCR_DC) && arm_mmu_idx_is_stage1_of_2(mmu_idx)) { | ||
71 | + if ((hcr_el2 & HCR_DC) && arm_mmu_idx_is_stage1_of_2(mmu_idx)) { | ||
72 | /* HCR.DC means SCTLR_EL1.M behaves as 0 */ | ||
73 | return true; | ||
74 | } | ||
75 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
76 | fi->s1ptw = true; | ||
77 | return ~0; | ||
78 | } | ||
79 | - if ((env->cp15.hcr_el2 & HCR_PTW) && (cacheattrs.attrs & 0xf0) == 0) { | ||
80 | + if ((arm_hcr_el2_eff(env) & HCR_PTW) && | ||
81 | + (cacheattrs.attrs & 0xf0) == 0) { | ||
82 | /* | ||
83 | * PTW set and S1 walk touched S2 Device memory: | ||
84 | * generate Permission fault. | ||
85 | @@ -XXX,XX +XXX,XX @@ static uint8_t convert_stage2_attrs(CPUARMState *env, uint8_t s2attrs) | ||
86 | uint8_t hihint = 0, lohint = 0; | ||
87 | |||
88 | if (hiattr != 0) { /* normal memory */ | ||
89 | - if ((env->cp15.hcr_el2 & HCR_CD) != 0) { /* cache disabled */ | ||
90 | + if (arm_hcr_el2_eff(env) & HCR_CD) { /* cache disabled */ | ||
91 | hiattr = loattr = 1; /* non-cacheable */ | ||
92 | } else { | ||
93 | if (hiattr != 1) { /* Write-through or write-back */ | ||
94 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
95 | } | ||
96 | |||
97 | /* Combine the S1 and S2 cache attributes. */ | ||
98 | - if (env->cp15.hcr_el2 & HCR_DC) { | ||
99 | + if (arm_hcr_el2_eff(env) & HCR_DC) { | ||
100 | /* | ||
101 | * HCR.DC forces the first stage attributes to | ||
102 | * Normal Non-Shareable, | ||
103 | -- | ||
104 | 2.20.1 | ||
105 | |||
106 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
2 | 1 | ||
3 | This adds a common helper to compute the effective value of MDCR_EL2. | ||
4 | That is the actual value if EL2 is enabled in the current security | ||
5 | context, or 0 elsewise. | ||
6 | |||
7 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Message-id: 20210112104511.36576-5-remi.denis.courmont@huawei.com | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | --- | ||
12 | target/arm/helper.c | 38 ++++++++++++++++++++++---------------- | ||
13 | 1 file changed, 22 insertions(+), 16 deletions(-) | ||
14 | |||
15 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
16 | index XXXXXXX..XXXXXXX 100644 | ||
17 | --- a/target/arm/helper.c | ||
18 | +++ b/target/arm/helper.c | ||
19 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_trap_aa32s_el1(CPUARMState *env, | ||
20 | return CP_ACCESS_TRAP_UNCATEGORIZED; | ||
21 | } | ||
22 | |||
23 | +static uint64_t arm_mdcr_el2_eff(CPUARMState *env) | ||
24 | +{ | ||
25 | + return arm_is_el2_enabled(env) ? env->cp15.mdcr_el2 : 0; | ||
26 | +} | ||
27 | + | ||
28 | /* Check for traps to "powerdown debug" registers, which are controlled | ||
29 | * by MDCR.TDOSA | ||
30 | */ | ||
31 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tdosa(CPUARMState *env, const ARMCPRegInfo *ri, | ||
32 | bool isread) | ||
33 | { | ||
34 | int el = arm_current_el(env); | ||
35 | - bool mdcr_el2_tdosa = (env->cp15.mdcr_el2 & MDCR_TDOSA) || | ||
36 | - (env->cp15.mdcr_el2 & MDCR_TDE) || | ||
37 | + uint64_t mdcr_el2 = arm_mdcr_el2_eff(env); | ||
38 | + bool mdcr_el2_tdosa = (mdcr_el2 & MDCR_TDOSA) || (mdcr_el2 & MDCR_TDE) || | ||
39 | (arm_hcr_el2_eff(env) & HCR_TGE); | ||
40 | |||
41 | - if (el < 2 && mdcr_el2_tdosa && !arm_is_secure_below_el3(env)) { | ||
42 | + if (el < 2 && mdcr_el2_tdosa) { | ||
43 | return CP_ACCESS_TRAP_EL2; | ||
44 | } | ||
45 | if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TDOSA)) { | ||
46 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tdra(CPUARMState *env, const ARMCPRegInfo *ri, | ||
47 | bool isread) | ||
48 | { | ||
49 | int el = arm_current_el(env); | ||
50 | - bool mdcr_el2_tdra = (env->cp15.mdcr_el2 & MDCR_TDRA) || | ||
51 | - (env->cp15.mdcr_el2 & MDCR_TDE) || | ||
52 | + uint64_t mdcr_el2 = arm_mdcr_el2_eff(env); | ||
53 | + bool mdcr_el2_tdra = (mdcr_el2 & MDCR_TDRA) || (mdcr_el2 & MDCR_TDE) || | ||
54 | (arm_hcr_el2_eff(env) & HCR_TGE); | ||
55 | |||
56 | - if (el < 2 && mdcr_el2_tdra && !arm_is_secure_below_el3(env)) { | ||
57 | + if (el < 2 && mdcr_el2_tdra) { | ||
58 | return CP_ACCESS_TRAP_EL2; | ||
59 | } | ||
60 | if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TDA)) { | ||
61 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tda(CPUARMState *env, const ARMCPRegInfo *ri, | ||
62 | bool isread) | ||
63 | { | ||
64 | int el = arm_current_el(env); | ||
65 | - bool mdcr_el2_tda = (env->cp15.mdcr_el2 & MDCR_TDA) || | ||
66 | - (env->cp15.mdcr_el2 & MDCR_TDE) || | ||
67 | + uint64_t mdcr_el2 = arm_mdcr_el2_eff(env); | ||
68 | + bool mdcr_el2_tda = (mdcr_el2 & MDCR_TDA) || (mdcr_el2 & MDCR_TDE) || | ||
69 | (arm_hcr_el2_eff(env) & HCR_TGE); | ||
70 | |||
71 | - if (el < 2 && mdcr_el2_tda && !arm_is_secure_below_el3(env)) { | ||
72 | + if (el < 2 && mdcr_el2_tda) { | ||
73 | return CP_ACCESS_TRAP_EL2; | ||
74 | } | ||
75 | if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TDA)) { | ||
76 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tpm(CPUARMState *env, const ARMCPRegInfo *ri, | ||
77 | bool isread) | ||
78 | { | ||
79 | int el = arm_current_el(env); | ||
80 | + uint64_t mdcr_el2 = arm_mdcr_el2_eff(env); | ||
81 | |||
82 | - if (el < 2 && (env->cp15.mdcr_el2 & MDCR_TPM) | ||
83 | - && !arm_is_secure_below_el3(env)) { | ||
84 | + if (el < 2 && (mdcr_el2 & MDCR_TPM)) { | ||
85 | return CP_ACCESS_TRAP_EL2; | ||
86 | } | ||
87 | if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TPM)) { | ||
88 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult pmreg_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
89 | * trapping to EL2 or EL3 for other accesses. | ||
90 | */ | ||
91 | int el = arm_current_el(env); | ||
92 | + uint64_t mdcr_el2 = arm_mdcr_el2_eff(env); | ||
93 | |||
94 | if (el == 0 && !(env->cp15.c9_pmuserenr & 1)) { | ||
95 | return CP_ACCESS_TRAP; | ||
96 | } | ||
97 | - if (el < 2 && (env->cp15.mdcr_el2 & MDCR_TPM) | ||
98 | - && !arm_is_secure_below_el3(env)) { | ||
99 | + if (el < 2 && (mdcr_el2 & MDCR_TPM)) { | ||
100 | return CP_ACCESS_TRAP_EL2; | ||
101 | } | ||
102 | if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TPM)) { | ||
103 | @@ -XXX,XX +XXX,XX @@ static bool pmu_counter_enabled(CPUARMState *env, uint8_t counter) | ||
104 | bool enabled, prohibited, filtered; | ||
105 | bool secure = arm_is_secure(env); | ||
106 | int el = arm_current_el(env); | ||
107 | - uint8_t hpmn = env->cp15.mdcr_el2 & MDCR_HPMN; | ||
108 | + uint64_t mdcr_el2 = arm_mdcr_el2_eff(env); | ||
109 | + uint8_t hpmn = mdcr_el2 & MDCR_HPMN; | ||
110 | |||
111 | if (!arm_feature(env, ARM_FEATURE_PMU)) { | ||
112 | return false; | ||
113 | @@ -XXX,XX +XXX,XX @@ static bool pmu_counter_enabled(CPUARMState *env, uint8_t counter) | ||
114 | (counter < hpmn || counter == 31)) { | ||
115 | e = env->cp15.c9_pmcr & PMCRE; | ||
116 | } else { | ||
117 | - e = env->cp15.mdcr_el2 & MDCR_HPME; | ||
118 | + e = mdcr_el2 & MDCR_HPME; | ||
119 | } | ||
120 | enabled = e && (env->cp15.c9_pmcnten & (1 << counter)); | ||
121 | |||
122 | if (!secure) { | ||
123 | if (el == 2 && (counter < hpmn || counter == 31)) { | ||
124 | - prohibited = env->cp15.mdcr_el2 & MDCR_HPMD; | ||
125 | + prohibited = mdcr_el2 & MDCR_HPMD; | ||
126 | } else { | ||
127 | prohibited = false; | ||
128 | } | ||
129 | -- | ||
130 | 2.20.1 | ||
131 | |||
132 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
2 | 1 | ||
3 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
5 | Message-id: 20210112104511.36576-6-remi.denis.courmont@huawei.com | ||
6 | [PMM: tweaked commit message to match reduced scope of patch | ||
7 | following rebase] | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | --- | ||
10 | target/arm/cpu.h | 5 +++++ | ||
11 | 1 file changed, 5 insertions(+) | ||
12 | |||
13 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
14 | index XXXXXXX..XXXXXXX 100644 | ||
15 | --- a/target/arm/cpu.h | ||
16 | +++ b/target/arm/cpu.h | ||
17 | @@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_sve(const ARMISARegisters *id) | ||
18 | return FIELD_EX64(id->id_aa64pfr0, ID_AA64PFR0, SVE) != 0; | ||
19 | } | ||
20 | |||
21 | +static inline bool isar_feature_aa64_sel2(const ARMISARegisters *id) | ||
22 | +{ | ||
23 | + return FIELD_EX64(id->id_aa64pfr0, ID_AA64PFR0, SEL2) != 0; | ||
24 | +} | ||
25 | + | ||
26 | static inline bool isar_feature_aa64_vh(const ARMISARegisters *id) | ||
27 | { | ||
28 | return FIELD_EX64(id->id_aa64mmfr1, ID_AA64MMFR1, VH) != 0; | ||
29 | -- | ||
30 | 2.20.1 | ||
31 | |||
32 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
2 | 1 | ||
3 | With the ARMv8.4-SEL2 extension, EL2 is a legal exception level in | ||
4 | secure mode, though it can only be AArch64. | ||
5 | |||
6 | This patch adds the target EL for exceptions from 64-bit S-EL2. | ||
7 | |||
8 | It also fixes the target EL to EL2 when HCR.{A,F,I}MO are set in secure | ||
9 | mode. Those values were never used in practice as the effective value of | ||
10 | HCR was always 0 in secure mode. | ||
11 | |||
12 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
13 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
14 | Message-id: 20210112104511.36576-7-remi.denis.courmont@huawei.com | ||
15 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
16 | --- | ||
17 | target/arm/helper.c | 10 +++++----- | ||
18 | target/arm/op_helper.c | 4 ++-- | ||
19 | 2 files changed, 7 insertions(+), 7 deletions(-) | ||
20 | |||
21 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
22 | index XXXXXXX..XXXXXXX 100644 | ||
23 | --- a/target/arm/helper.c | ||
24 | +++ b/target/arm/helper.c | ||
25 | @@ -XXX,XX +XXX,XX @@ static const int8_t target_el_table[2][2][2][2][2][4] = { | ||
26 | {{/* 0 1 1 0 */{ 3, 3, 3, -1 },{ 3, -1, -1, 3 },}, | ||
27 | {/* 0 1 1 1 */{ 3, 3, 3, -1 },{ 3, -1, -1, 3 },},},},}, | ||
28 | {{{{/* 1 0 0 0 */{ 1, 1, 2, -1 },{ 1, 1, -1, 1 },}, | ||
29 | - {/* 1 0 0 1 */{ 2, 2, 2, -1 },{ 1, 1, -1, 1 },},}, | ||
30 | - {{/* 1 0 1 0 */{ 1, 1, 1, -1 },{ 1, 1, -1, 1 },}, | ||
31 | - {/* 1 0 1 1 */{ 2, 2, 2, -1 },{ 1, 1, -1, 1 },},},}, | ||
32 | + {/* 1 0 0 1 */{ 2, 2, 2, -1 },{ 2, 2, -1, 1 },},}, | ||
33 | + {{/* 1 0 1 0 */{ 1, 1, 1, -1 },{ 1, 1, 1, 1 },}, | ||
34 | + {/* 1 0 1 1 */{ 2, 2, 2, -1 },{ 2, 2, 2, 1 },},},}, | ||
35 | {{{/* 1 1 0 0 */{ 3, 3, 3, -1 },{ 3, 3, -1, 3 },}, | ||
36 | {/* 1 1 0 1 */{ 3, 3, 3, -1 },{ 3, 3, -1, 3 },},}, | ||
37 | - {{/* 1 1 1 0 */{ 3, 3, 3, -1 },{ 3, 3, -1, 3 },}, | ||
38 | - {/* 1 1 1 1 */{ 3, 3, 3, -1 },{ 3, 3, -1, 3 },},},},}, | ||
39 | + {{/* 1 1 1 0 */{ 3, 3, 3, -1 },{ 3, 3, 3, 3 },}, | ||
40 | + {/* 1 1 1 1 */{ 3, 3, 3, -1 },{ 3, 3, 3, 3 },},},},}, | ||
41 | }; | ||
42 | |||
43 | /* | ||
44 | diff --git a/target/arm/op_helper.c b/target/arm/op_helper.c | ||
45 | index XXXXXXX..XXXXXXX 100644 | ||
46 | --- a/target/arm/op_helper.c | ||
47 | +++ b/target/arm/op_helper.c | ||
48 | @@ -XXX,XX +XXX,XX @@ void HELPER(access_check_cp_reg)(CPUARMState *env, void *rip, uint32_t syndrome, | ||
49 | target_el = exception_target_el(env); | ||
50 | break; | ||
51 | case CP_ACCESS_TRAP_EL2: | ||
52 | - /* Requesting a trap to EL2 when we're in EL3 or S-EL0/1 is | ||
53 | + /* Requesting a trap to EL2 when we're in EL3 is | ||
54 | * a bug in the access function. | ||
55 | */ | ||
56 | - assert(!arm_is_secure(env) && arm_current_el(env) != 3); | ||
57 | + assert(arm_current_el(env) != 3); | ||
58 | target_el = 2; | ||
59 | break; | ||
60 | case CP_ACCESS_TRAP_EL3: | ||
61 | -- | ||
62 | 2.20.1 | ||
63 | |||
64 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
2 | 1 | ||
3 | This adds the MMU indices for EL2 stage 1 in secure state. | ||
4 | |||
5 | To keep code contained, which is largelly identical between secure and | ||
6 | non-secure modes, the MMU indices are reassigned. The new assignments | ||
7 | provide a systematic pattern with a non-secure bit. | ||
8 | |||
9 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
10 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
11 | Message-id: 20210112104511.36576-8-remi.denis.courmont@huawei.com | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
13 | --- | ||
14 | target/arm/cpu-param.h | 2 +- | ||
15 | target/arm/cpu.h | 35 ++++++---- | ||
16 | target/arm/internals.h | 12 ++++ | ||
17 | target/arm/helper.c | 127 ++++++++++++++++++++++++------------- | ||
18 | target/arm/translate-a64.c | 4 ++ | ||
19 | 5 files changed, 123 insertions(+), 57 deletions(-) | ||
20 | |||
21 | diff --git a/target/arm/cpu-param.h b/target/arm/cpu-param.h | ||
22 | index XXXXXXX..XXXXXXX 100644 | ||
23 | --- a/target/arm/cpu-param.h | ||
24 | +++ b/target/arm/cpu-param.h | ||
25 | @@ -XXX,XX +XXX,XX @@ | ||
26 | # define TARGET_PAGE_BITS_MIN 10 | ||
27 | #endif | ||
28 | |||
29 | -#define NB_MMU_MODES 11 | ||
30 | +#define NB_MMU_MODES 15 | ||
31 | |||
32 | #endif | ||
33 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
34 | index XXXXXXX..XXXXXXX 100644 | ||
35 | --- a/target/arm/cpu.h | ||
36 | +++ b/target/arm/cpu.h | ||
37 | @@ -XXX,XX +XXX,XX @@ bool write_cpustate_to_list(ARMCPU *cpu, bool kvm_sync); | ||
38 | #define ARM_MMU_IDX_NOTLB 0x20 /* does not have a TLB */ | ||
39 | #define ARM_MMU_IDX_M 0x40 /* M profile */ | ||
40 | |||
41 | +/* Meanings of the bits for A profile mmu idx values */ | ||
42 | +#define ARM_MMU_IDX_A_NS 0x8 | ||
43 | + | ||
44 | /* Meanings of the bits for M profile mmu idx values */ | ||
45 | #define ARM_MMU_IDX_M_PRIV 0x1 | ||
46 | #define ARM_MMU_IDX_M_NEGPRI 0x2 | ||
47 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdx { | ||
48 | /* | ||
49 | * A-profile. | ||
50 | */ | ||
51 | - ARMMMUIdx_E10_0 = 0 | ARM_MMU_IDX_A, | ||
52 | - ARMMMUIdx_E20_0 = 1 | ARM_MMU_IDX_A, | ||
53 | + ARMMMUIdx_SE10_0 = 0 | ARM_MMU_IDX_A, | ||
54 | + ARMMMUIdx_SE20_0 = 1 | ARM_MMU_IDX_A, | ||
55 | + ARMMMUIdx_SE10_1 = 2 | ARM_MMU_IDX_A, | ||
56 | + ARMMMUIdx_SE20_2 = 3 | ARM_MMU_IDX_A, | ||
57 | + ARMMMUIdx_SE10_1_PAN = 4 | ARM_MMU_IDX_A, | ||
58 | + ARMMMUIdx_SE20_2_PAN = 5 | ARM_MMU_IDX_A, | ||
59 | + ARMMMUIdx_SE2 = 6 | ARM_MMU_IDX_A, | ||
60 | + ARMMMUIdx_SE3 = 7 | ARM_MMU_IDX_A, | ||
61 | |||
62 | - ARMMMUIdx_E10_1 = 2 | ARM_MMU_IDX_A, | ||
63 | - ARMMMUIdx_E10_1_PAN = 3 | ARM_MMU_IDX_A, | ||
64 | - | ||
65 | - ARMMMUIdx_E2 = 4 | ARM_MMU_IDX_A, | ||
66 | - ARMMMUIdx_E20_2 = 5 | ARM_MMU_IDX_A, | ||
67 | - ARMMMUIdx_E20_2_PAN = 6 | ARM_MMU_IDX_A, | ||
68 | - | ||
69 | - ARMMMUIdx_SE10_0 = 7 | ARM_MMU_IDX_A, | ||
70 | - ARMMMUIdx_SE10_1 = 8 | ARM_MMU_IDX_A, | ||
71 | - ARMMMUIdx_SE10_1_PAN = 9 | ARM_MMU_IDX_A, | ||
72 | - ARMMMUIdx_SE3 = 10 | ARM_MMU_IDX_A, | ||
73 | + ARMMMUIdx_E10_0 = ARMMMUIdx_SE10_0 | ARM_MMU_IDX_A_NS, | ||
74 | + ARMMMUIdx_E20_0 = ARMMMUIdx_SE20_0 | ARM_MMU_IDX_A_NS, | ||
75 | + ARMMMUIdx_E10_1 = ARMMMUIdx_SE10_1 | ARM_MMU_IDX_A_NS, | ||
76 | + ARMMMUIdx_E20_2 = ARMMMUIdx_SE20_2 | ARM_MMU_IDX_A_NS, | ||
77 | + ARMMMUIdx_E10_1_PAN = ARMMMUIdx_SE10_1_PAN | ARM_MMU_IDX_A_NS, | ||
78 | + ARMMMUIdx_E20_2_PAN = ARMMMUIdx_SE20_2_PAN | ARM_MMU_IDX_A_NS, | ||
79 | + ARMMMUIdx_E2 = ARMMMUIdx_SE2 | ARM_MMU_IDX_A_NS, | ||
80 | |||
81 | /* | ||
82 | * These are not allocated TLBs and are used only for AT system | ||
83 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdxBit { | ||
84 | TO_CORE_BIT(E20_2), | ||
85 | TO_CORE_BIT(E20_2_PAN), | ||
86 | TO_CORE_BIT(SE10_0), | ||
87 | + TO_CORE_BIT(SE20_0), | ||
88 | TO_CORE_BIT(SE10_1), | ||
89 | + TO_CORE_BIT(SE20_2), | ||
90 | TO_CORE_BIT(SE10_1_PAN), | ||
91 | + TO_CORE_BIT(SE20_2_PAN), | ||
92 | + TO_CORE_BIT(SE2), | ||
93 | TO_CORE_BIT(SE3), | ||
94 | |||
95 | TO_CORE_BIT(MUser), | ||
96 | diff --git a/target/arm/internals.h b/target/arm/internals.h | ||
97 | index XXXXXXX..XXXXXXX 100644 | ||
98 | --- a/target/arm/internals.h | ||
99 | +++ b/target/arm/internals.h | ||
100 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_has_2_ranges(ARMMMUIdx mmu_idx) | ||
101 | case ARMMMUIdx_SE10_0: | ||
102 | case ARMMMUIdx_SE10_1: | ||
103 | case ARMMMUIdx_SE10_1_PAN: | ||
104 | + case ARMMMUIdx_SE20_0: | ||
105 | + case ARMMMUIdx_SE20_2: | ||
106 | + case ARMMMUIdx_SE20_2_PAN: | ||
107 | return true; | ||
108 | default: | ||
109 | return false; | ||
110 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_secure(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
111 | case ARMMMUIdx_SE10_0: | ||
112 | case ARMMMUIdx_SE10_1: | ||
113 | case ARMMMUIdx_SE10_1_PAN: | ||
114 | + case ARMMMUIdx_SE20_0: | ||
115 | + case ARMMMUIdx_SE20_2: | ||
116 | + case ARMMMUIdx_SE20_2_PAN: | ||
117 | + case ARMMMUIdx_SE2: | ||
118 | case ARMMMUIdx_MSPrivNegPri: | ||
119 | case ARMMMUIdx_MSUserNegPri: | ||
120 | case ARMMMUIdx_MSPriv: | ||
121 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_pan(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
122 | case ARMMMUIdx_E10_1_PAN: | ||
123 | case ARMMMUIdx_E20_2_PAN: | ||
124 | case ARMMMUIdx_SE10_1_PAN: | ||
125 | + case ARMMMUIdx_SE20_2_PAN: | ||
126 | return true; | ||
127 | default: | ||
128 | return false; | ||
129 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_pan(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
130 | static inline uint32_t regime_el(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
131 | { | ||
132 | switch (mmu_idx) { | ||
133 | + case ARMMMUIdx_SE20_0: | ||
134 | + case ARMMMUIdx_SE20_2: | ||
135 | + case ARMMMUIdx_SE20_2_PAN: | ||
136 | case ARMMMUIdx_E20_0: | ||
137 | case ARMMMUIdx_E20_2: | ||
138 | case ARMMMUIdx_E20_2_PAN: | ||
139 | case ARMMMUIdx_Stage2: | ||
140 | + case ARMMMUIdx_SE2: | ||
141 | case ARMMMUIdx_E2: | ||
142 | return 2; | ||
143 | case ARMMMUIdx_SE3: | ||
144 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
145 | index XXXXXXX..XXXXXXX 100644 | ||
146 | --- a/target/arm/helper.c | ||
147 | +++ b/target/arm/helper.c | ||
148 | @@ -XXX,XX +XXX,XX @@ static int gt_phys_redir_timeridx(CPUARMState *env) | ||
149 | case ARMMMUIdx_E20_0: | ||
150 | case ARMMMUIdx_E20_2: | ||
151 | case ARMMMUIdx_E20_2_PAN: | ||
152 | + case ARMMMUIdx_SE20_0: | ||
153 | + case ARMMMUIdx_SE20_2: | ||
154 | + case ARMMMUIdx_SE20_2_PAN: | ||
155 | return GTIMER_HYP; | ||
156 | default: | ||
157 | return GTIMER_PHYS; | ||
158 | @@ -XXX,XX +XXX,XX @@ static int gt_virt_redir_timeridx(CPUARMState *env) | ||
159 | case ARMMMUIdx_E20_0: | ||
160 | case ARMMMUIdx_E20_2: | ||
161 | case ARMMMUIdx_E20_2_PAN: | ||
162 | + case ARMMMUIdx_SE20_0: | ||
163 | + case ARMMMUIdx_SE20_2: | ||
164 | + case ARMMMUIdx_SE20_2_PAN: | ||
165 | return GTIMER_HYPVIRT; | ||
166 | default: | ||
167 | return GTIMER_VIRT; | ||
168 | @@ -XXX,XX +XXX,XX @@ static void ats_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
169 | mmu_idx = ARMMMUIdx_SE3; | ||
170 | break; | ||
171 | case 2: | ||
172 | - g_assert(!secure); /* TODO: ARMv8.4-SecEL2 */ | ||
173 | + g_assert(!secure); /* ARMv8.4-SecEL2 is 64-bit only */ | ||
174 | /* fall through */ | ||
175 | case 1: | ||
176 | if (ri->crm == 9 && (env->uncached_cpsr & CPSR_PAN)) { | ||
177 | @@ -XXX,XX +XXX,XX @@ static void ats_write64(CPUARMState *env, const ARMCPRegInfo *ri, | ||
178 | } | ||
179 | break; | ||
180 | case 4: /* AT S1E2R, AT S1E2W */ | ||
181 | - mmu_idx = ARMMMUIdx_E2; | ||
182 | + mmu_idx = secure ? ARMMMUIdx_SE2 : ARMMMUIdx_E2; | ||
183 | break; | ||
184 | case 6: /* AT S1E3R, AT S1E3W */ | ||
185 | mmu_idx = ARMMMUIdx_SE3; | ||
186 | @@ -XXX,XX +XXX,XX @@ static void vmsa_tcr_ttbr_el2_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
187 | */ | ||
188 | if (extract64(raw_read(env, ri) ^ value, 48, 16) && | ||
189 | (arm_hcr_el2_eff(env) & HCR_E2H)) { | ||
190 | - tlb_flush_by_mmuidx(env_cpu(env), | ||
191 | - ARMMMUIdxBit_E20_2 | | ||
192 | - ARMMMUIdxBit_E20_2_PAN | | ||
193 | - ARMMMUIdxBit_E20_0); | ||
194 | + uint16_t mask = ARMMMUIdxBit_E20_2 | | ||
195 | + ARMMMUIdxBit_E20_2_PAN | | ||
196 | + ARMMMUIdxBit_E20_0; | ||
197 | + | ||
198 | + if (arm_is_secure_below_el3(env)) { | ||
199 | + mask >>= ARM_MMU_IDX_A_NS; | ||
200 | + } | ||
201 | + | ||
202 | + tlb_flush_by_mmuidx(env_cpu(env), mask); | ||
203 | } | ||
204 | raw_write(env, ri, value); | ||
205 | } | ||
206 | @@ -XXX,XX +XXX,XX @@ static int vae1_tlbmask(CPUARMState *env) | ||
207 | uint64_t hcr = arm_hcr_el2_eff(env); | ||
208 | |||
209 | if ((hcr & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE)) { | ||
210 | - return ARMMMUIdxBit_E20_2 | | ||
211 | - ARMMMUIdxBit_E20_2_PAN | | ||
212 | - ARMMMUIdxBit_E20_0; | ||
213 | + uint16_t mask = ARMMMUIdxBit_E20_2 | | ||
214 | + ARMMMUIdxBit_E20_2_PAN | | ||
215 | + ARMMMUIdxBit_E20_0; | ||
216 | + | ||
217 | + if (arm_is_secure_below_el3(env)) { | ||
218 | + mask >>= ARM_MMU_IDX_A_NS; | ||
219 | + } | ||
220 | + | ||
221 | + return mask; | ||
222 | } else if (arm_is_secure_below_el3(env)) { | ||
223 | return ARMMMUIdxBit_SE10_1 | | ||
224 | ARMMMUIdxBit_SE10_1_PAN | | ||
225 | @@ -XXX,XX +XXX,XX @@ static int tlbbits_for_regime(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
226 | |||
227 | static int vae1_tlbbits(CPUARMState *env, uint64_t addr) | ||
228 | { | ||
229 | + uint64_t hcr = arm_hcr_el2_eff(env); | ||
230 | ARMMMUIdx mmu_idx; | ||
231 | |||
232 | /* Only the regime of the mmu_idx below is significant. */ | ||
233 | - if (arm_is_secure_below_el3(env)) { | ||
234 | - mmu_idx = ARMMMUIdx_SE10_0; | ||
235 | - } else if ((env->cp15.hcr_el2 & (HCR_E2H | HCR_TGE)) | ||
236 | - == (HCR_E2H | HCR_TGE)) { | ||
237 | + if ((hcr & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE)) { | ||
238 | mmu_idx = ARMMMUIdx_E20_0; | ||
239 | } else { | ||
240 | mmu_idx = ARMMMUIdx_E10_0; | ||
241 | } | ||
242 | + | ||
243 | + if (arm_is_secure_below_el3(env)) { | ||
244 | + mmu_idx &= ~ARM_MMU_IDX_A_NS; | ||
245 | + } | ||
246 | + | ||
247 | return tlbbits_for_regime(env, mmu_idx, addr); | ||
248 | } | ||
249 | |||
250 | @@ -XXX,XX +XXX,XX @@ static int alle1_tlbmask(CPUARMState *env) | ||
251 | |||
252 | static int e2_tlbmask(CPUARMState *env) | ||
253 | { | ||
254 | - /* TODO: ARMv8.4-SecEL2 */ | ||
255 | - return ARMMMUIdxBit_E20_0 | | ||
256 | - ARMMMUIdxBit_E20_2 | | ||
257 | - ARMMMUIdxBit_E20_2_PAN | | ||
258 | - ARMMMUIdxBit_E2; | ||
259 | + if (arm_is_secure_below_el3(env)) { | ||
260 | + return ARMMMUIdxBit_SE20_0 | | ||
261 | + ARMMMUIdxBit_SE20_2 | | ||
262 | + ARMMMUIdxBit_SE20_2_PAN | | ||
263 | + ARMMMUIdxBit_SE2; | ||
264 | + } else { | ||
265 | + return ARMMMUIdxBit_E20_0 | | ||
266 | + ARMMMUIdxBit_E20_2 | | ||
267 | + ARMMMUIdxBit_E20_2_PAN | | ||
268 | + ARMMMUIdxBit_E2; | ||
269 | + } | ||
270 | } | ||
271 | |||
272 | static void tlbi_aa64_alle1_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
273 | @@ -XXX,XX +XXX,XX @@ static void tlbi_aa64_vae2is_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
274 | { | ||
275 | CPUState *cs = env_cpu(env); | ||
276 | uint64_t pageaddr = sextract64(value << 12, 0, 56); | ||
277 | - int bits = tlbbits_for_regime(env, ARMMMUIdx_E2, pageaddr); | ||
278 | + bool secure = arm_is_secure_below_el3(env); | ||
279 | + int mask = secure ? ARMMMUIdxBit_SE2 : ARMMMUIdxBit_E2; | ||
280 | + int bits = tlbbits_for_regime(env, secure ? ARMMMUIdx_E2 : ARMMMUIdx_SE2, | ||
281 | + pageaddr); | ||
282 | |||
283 | - tlb_flush_page_bits_by_mmuidx_all_cpus_synced(cs, pageaddr, | ||
284 | - ARMMMUIdxBit_E2, bits); | ||
285 | + tlb_flush_page_bits_by_mmuidx_all_cpus_synced(cs, pageaddr, mask, bits); | ||
286 | } | ||
287 | |||
288 | static void tlbi_aa64_vae3is_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
289 | @@ -XXX,XX +XXX,XX @@ uint64_t arm_sctlr(CPUARMState *env, int el) | ||
290 | /* Only EL0 needs to be adjusted for EL1&0 or EL2&0. */ | ||
291 | if (el == 0) { | ||
292 | ARMMMUIdx mmu_idx = arm_mmu_idx_el(env, 0); | ||
293 | - el = (mmu_idx == ARMMMUIdx_E20_0 ? 2 : 1); | ||
294 | + el = (mmu_idx == ARMMMUIdx_E20_0 || mmu_idx == ARMMMUIdx_SE20_0) | ||
295 | + ? 2 : 1; | ||
296 | } | ||
297 | return env->cp15.sctlr_el[el]; | ||
298 | } | ||
299 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_user(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
300 | switch (mmu_idx) { | ||
301 | case ARMMMUIdx_SE10_0: | ||
302 | case ARMMMUIdx_E20_0: | ||
303 | + case ARMMMUIdx_SE20_0: | ||
304 | case ARMMMUIdx_Stage1_E0: | ||
305 | case ARMMMUIdx_MUser: | ||
306 | case ARMMMUIdx_MSUser: | ||
307 | @@ -XXX,XX +XXX,XX @@ int arm_mmu_idx_to_el(ARMMMUIdx mmu_idx) | ||
308 | case ARMMMUIdx_E10_0: | ||
309 | case ARMMMUIdx_E20_0: | ||
310 | case ARMMMUIdx_SE10_0: | ||
311 | + case ARMMMUIdx_SE20_0: | ||
312 | return 0; | ||
313 | case ARMMMUIdx_E10_1: | ||
314 | case ARMMMUIdx_E10_1_PAN: | ||
315 | @@ -XXX,XX +XXX,XX @@ int arm_mmu_idx_to_el(ARMMMUIdx mmu_idx) | ||
316 | case ARMMMUIdx_E2: | ||
317 | case ARMMMUIdx_E20_2: | ||
318 | case ARMMMUIdx_E20_2_PAN: | ||
319 | + case ARMMMUIdx_SE2: | ||
320 | + case ARMMMUIdx_SE20_2: | ||
321 | + case ARMMMUIdx_SE20_2_PAN: | ||
322 | return 2; | ||
323 | case ARMMMUIdx_SE3: | ||
324 | return 3; | ||
325 | @@ -XXX,XX +XXX,XX @@ ARMMMUIdx arm_v7m_mmu_idx_for_secstate(CPUARMState *env, bool secstate) | ||
326 | |||
327 | ARMMMUIdx arm_mmu_idx_el(CPUARMState *env, int el) | ||
328 | { | ||
329 | + ARMMMUIdx idx; | ||
330 | + uint64_t hcr; | ||
331 | + | ||
332 | if (arm_feature(env, ARM_FEATURE_M)) { | ||
333 | return arm_v7m_mmu_idx_for_secstate(env, env->v7m.secure); | ||
334 | } | ||
335 | @@ -XXX,XX +XXX,XX @@ ARMMMUIdx arm_mmu_idx_el(CPUARMState *env, int el) | ||
336 | /* See ARM pseudo-function ELIsInHost. */ | ||
337 | switch (el) { | ||
338 | case 0: | ||
339 | - if (arm_is_secure_below_el3(env)) { | ||
340 | - return ARMMMUIdx_SE10_0; | ||
341 | + hcr = arm_hcr_el2_eff(env); | ||
342 | + if ((hcr & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE)) { | ||
343 | + idx = ARMMMUIdx_E20_0; | ||
344 | + } else { | ||
345 | + idx = ARMMMUIdx_E10_0; | ||
346 | } | ||
347 | - if ((env->cp15.hcr_el2 & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE) | ||
348 | - && arm_el_is_aa64(env, 2)) { | ||
349 | - return ARMMMUIdx_E20_0; | ||
350 | - } | ||
351 | - return ARMMMUIdx_E10_0; | ||
352 | + break; | ||
353 | case 1: | ||
354 | - if (arm_is_secure_below_el3(env)) { | ||
355 | - if (env->pstate & PSTATE_PAN) { | ||
356 | - return ARMMMUIdx_SE10_1_PAN; | ||
357 | - } | ||
358 | - return ARMMMUIdx_SE10_1; | ||
359 | - } | ||
360 | if (env->pstate & PSTATE_PAN) { | ||
361 | - return ARMMMUIdx_E10_1_PAN; | ||
362 | + idx = ARMMMUIdx_E10_1_PAN; | ||
363 | + } else { | ||
364 | + idx = ARMMMUIdx_E10_1; | ||
365 | } | ||
366 | - return ARMMMUIdx_E10_1; | ||
367 | + break; | ||
368 | case 2: | ||
369 | - /* TODO: ARMv8.4-SecEL2 */ | ||
370 | /* Note that TGE does not apply at EL2. */ | ||
371 | - if ((env->cp15.hcr_el2 & HCR_E2H) && arm_el_is_aa64(env, 2)) { | ||
372 | + if (arm_hcr_el2_eff(env) & HCR_E2H) { | ||
373 | if (env->pstate & PSTATE_PAN) { | ||
374 | - return ARMMMUIdx_E20_2_PAN; | ||
375 | + idx = ARMMMUIdx_E20_2_PAN; | ||
376 | + } else { | ||
377 | + idx = ARMMMUIdx_E20_2; | ||
378 | } | ||
379 | - return ARMMMUIdx_E20_2; | ||
380 | + } else { | ||
381 | + idx = ARMMMUIdx_E2; | ||
382 | } | ||
383 | - return ARMMMUIdx_E2; | ||
384 | + break; | ||
385 | case 3: | ||
386 | return ARMMMUIdx_SE3; | ||
387 | default: | ||
388 | g_assert_not_reached(); | ||
389 | } | ||
390 | + | ||
391 | + if (arm_is_secure_below_el3(env)) { | ||
392 | + idx &= ~ARM_MMU_IDX_A_NS; | ||
393 | + } | ||
394 | + | ||
395 | + return idx; | ||
396 | } | ||
397 | |||
398 | ARMMMUIdx arm_mmu_idx(CPUARMState *env) | ||
399 | @@ -XXX,XX +XXX,XX @@ static uint32_t rebuild_hflags_a64(CPUARMState *env, int el, int fp_el, | ||
400 | break; | ||
401 | case ARMMMUIdx_E20_2: | ||
402 | case ARMMMUIdx_E20_2_PAN: | ||
403 | - /* TODO: ARMv8.4-SecEL2 */ | ||
404 | + case ARMMMUIdx_SE20_2: | ||
405 | + case ARMMMUIdx_SE20_2_PAN: | ||
406 | /* | ||
407 | * Note that EL20_2 is gated by HCR_EL2.E2H == 1, but EL20_0 is | ||
408 | * gated by HCR_EL2.<E2H,TGE> == '11', and so is LDTR. | ||
409 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c | ||
410 | index XXXXXXX..XXXXXXX 100644 | ||
411 | --- a/target/arm/translate-a64.c | ||
412 | +++ b/target/arm/translate-a64.c | ||
413 | @@ -XXX,XX +XXX,XX @@ static int get_a64_user_mem_index(DisasContext *s) | ||
414 | case ARMMMUIdx_SE10_1_PAN: | ||
415 | useridx = ARMMMUIdx_SE10_0; | ||
416 | break; | ||
417 | + case ARMMMUIdx_SE20_2: | ||
418 | + case ARMMMUIdx_SE20_2_PAN: | ||
419 | + useridx = ARMMMUIdx_SE20_0; | ||
420 | + break; | ||
421 | default: | ||
422 | g_assert_not_reached(); | ||
423 | } | ||
424 | -- | ||
425 | 2.20.1 | ||
426 | |||
427 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
2 | 1 | ||
3 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
5 | Message-id: 20210112104511.36576-9-remi.denis.courmont@huawei.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | --- | ||
8 | target/arm/cpu.h | 7 +++++++ | ||
9 | target/arm/helper.c | 24 ++++++++++++++++++++++++ | ||
10 | 2 files changed, 31 insertions(+) | ||
11 | |||
12 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
13 | index XXXXXXX..XXXXXXX 100644 | ||
14 | --- a/target/arm/cpu.h | ||
15 | +++ b/target/arm/cpu.h | ||
16 | @@ -XXX,XX +XXX,XX @@ typedef struct { | ||
17 | uint32_t base_mask; | ||
18 | } TCR; | ||
19 | |||
20 | +#define VTCR_NSW (1u << 29) | ||
21 | +#define VTCR_NSA (1u << 30) | ||
22 | +#define VSTCR_SW VTCR_NSW | ||
23 | +#define VSTCR_SA VTCR_NSA | ||
24 | + | ||
25 | /* Define a maximum sized vector register. | ||
26 | * For 32-bit, this is a 128-bit NEON/AdvSIMD register. | ||
27 | * For 64-bit, this is a 2048-bit SVE register. | ||
28 | @@ -XXX,XX +XXX,XX @@ typedef struct CPUARMState { | ||
29 | uint64_t ttbr1_el[4]; | ||
30 | }; | ||
31 | uint64_t vttbr_el2; /* Virtualization Translation Table Base. */ | ||
32 | + uint64_t vsttbr_el2; /* Secure Virtualization Translation Table. */ | ||
33 | /* MMU translation table base control. */ | ||
34 | TCR tcr_el[4]; | ||
35 | TCR vtcr_el2; /* Virtualization Translation Control. */ | ||
36 | + TCR vstcr_el2; /* Secure Virtualization Translation Control. */ | ||
37 | uint32_t c2_data; /* MPU data cacheable bits. */ | ||
38 | uint32_t c2_insn; /* MPU instruction cacheable bits. */ | ||
39 | union { /* MMU domain access control register | ||
40 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
41 | index XXXXXXX..XXXXXXX 100644 | ||
42 | --- a/target/arm/helper.c | ||
43 | +++ b/target/arm/helper.c | ||
44 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo el2_v8_cp_reginfo[] = { | ||
45 | REGINFO_SENTINEL | ||
46 | }; | ||
47 | |||
48 | +static CPAccessResult sel2_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
49 | + bool isread) | ||
50 | +{ | ||
51 | + if (arm_current_el(env) == 3 || arm_is_secure_below_el3(env)) { | ||
52 | + return CP_ACCESS_OK; | ||
53 | + } | ||
54 | + return CP_ACCESS_TRAP_UNCATEGORIZED; | ||
55 | +} | ||
56 | + | ||
57 | +static const ARMCPRegInfo el2_sec_cp_reginfo[] = { | ||
58 | + { .name = "VSTTBR_EL2", .state = ARM_CP_STATE_AA64, | ||
59 | + .opc0 = 3, .opc1 = 4, .crn = 2, .crm = 6, .opc2 = 0, | ||
60 | + .access = PL2_RW, .accessfn = sel2_access, | ||
61 | + .fieldoffset = offsetof(CPUARMState, cp15.vsttbr_el2) }, | ||
62 | + { .name = "VSTCR_EL2", .state = ARM_CP_STATE_AA64, | ||
63 | + .opc0 = 3, .opc1 = 4, .crn = 2, .crm = 6, .opc2 = 2, | ||
64 | + .access = PL2_RW, .accessfn = sel2_access, | ||
65 | + .fieldoffset = offsetof(CPUARMState, cp15.vstcr_el2) }, | ||
66 | + REGINFO_SENTINEL | ||
67 | +}; | ||
68 | + | ||
69 | static CPAccessResult nsacr_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
70 | bool isread) | ||
71 | { | ||
72 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) | ||
73 | if (arm_feature(env, ARM_FEATURE_V8)) { | ||
74 | define_arm_cp_regs(cpu, el2_v8_cp_reginfo); | ||
75 | } | ||
76 | + if (cpu_isar_feature(aa64_sel2, cpu)) { | ||
77 | + define_arm_cp_regs(cpu, el2_sec_cp_reginfo); | ||
78 | + } | ||
79 | /* RVBAR_EL2 is only implemented if EL2 is the highest EL */ | ||
80 | if (!arm_feature(env, ARM_FEATURE_EL3)) { | ||
81 | ARMCPRegInfo rvbar = { | ||
82 | -- | ||
83 | 2.20.1 | ||
84 | |||
85 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
2 | 1 | ||
3 | The VTTBR write callback so far assumes that the underlying VM lies in | ||
4 | non-secure state. This handles the secure state scenario. | ||
5 | |||
6 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20210112104511.36576-10-remi.denis.courmont@huawei.com | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | --- | ||
11 | target/arm/helper.c | 13 +++++++++---- | ||
12 | 1 file changed, 9 insertions(+), 4 deletions(-) | ||
13 | |||
14 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/target/arm/helper.c | ||
17 | +++ b/target/arm/helper.c | ||
18 | @@ -XXX,XX +XXX,XX @@ static void vttbr_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
19 | * the combined stage 1&2 tlbs (EL10_1 and EL10_0). | ||
20 | */ | ||
21 | if (raw_read(env, ri) != value) { | ||
22 | - tlb_flush_by_mmuidx(cs, | ||
23 | - ARMMMUIdxBit_E10_1 | | ||
24 | - ARMMMUIdxBit_E10_1_PAN | | ||
25 | - ARMMMUIdxBit_E10_0); | ||
26 | + uint16_t mask = ARMMMUIdxBit_E10_1 | | ||
27 | + ARMMMUIdxBit_E10_1_PAN | | ||
28 | + ARMMMUIdxBit_E10_0; | ||
29 | + | ||
30 | + if (arm_is_secure_below_el3(env)) { | ||
31 | + mask >>= ARM_MMU_IDX_A_NS; | ||
32 | + } | ||
33 | + | ||
34 | + tlb_flush_by_mmuidx(cs, mask); | ||
35 | raw_write(env, ri, value); | ||
36 | } | ||
37 | } | ||
38 | -- | ||
39 | 2.20.1 | ||
40 | |||
41 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
2 | 1 | ||
3 | In the secure stage 2 translation regime, the VSTCR.SW and VTCR.NSW | ||
4 | bits can invert the secure flag for pagetable walks. This patchset | ||
5 | allows S1_ptw_translate() to change the non-secure bit. | ||
6 | |||
7 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Message-id: 20210112104511.36576-11-remi.denis.courmont@huawei.com | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | --- | ||
12 | target/arm/helper.c | 9 ++++++--- | ||
13 | 1 file changed, 6 insertions(+), 3 deletions(-) | ||
14 | |||
15 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
16 | index XXXXXXX..XXXXXXX 100644 | ||
17 | --- a/target/arm/helper.c | ||
18 | +++ b/target/arm/helper.c | ||
19 | @@ -XXX,XX +XXX,XX @@ static bool get_level1_table_address(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
20 | |||
21 | /* Translate a S1 pagetable walk through S2 if needed. */ | ||
22 | static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
23 | - hwaddr addr, MemTxAttrs txattrs, | ||
24 | + hwaddr addr, bool *is_secure, | ||
25 | ARMMMUFaultInfo *fi) | ||
26 | { | ||
27 | if (arm_mmu_idx_is_stage1_of_2(mmu_idx) && | ||
28 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
29 | int s2prot; | ||
30 | int ret; | ||
31 | ARMCacheAttrs cacheattrs = {}; | ||
32 | + MemTxAttrs txattrs = {}; | ||
33 | + | ||
34 | + assert(!*is_secure); /* TODO: S-EL2 */ | ||
35 | |||
36 | ret = get_phys_addr_lpae(env, addr, MMU_DATA_LOAD, ARMMMUIdx_Stage2, | ||
37 | false, | ||
38 | @@ -XXX,XX +XXX,XX @@ static uint32_t arm_ldl_ptw(CPUState *cs, hwaddr addr, bool is_secure, | ||
39 | AddressSpace *as; | ||
40 | uint32_t data; | ||
41 | |||
42 | + addr = S1_ptw_translate(env, mmu_idx, addr, &is_secure, fi); | ||
43 | attrs.secure = is_secure; | ||
44 | as = arm_addressspace(cs, attrs); | ||
45 | - addr = S1_ptw_translate(env, mmu_idx, addr, attrs, fi); | ||
46 | if (fi->s1ptw) { | ||
47 | return 0; | ||
48 | } | ||
49 | @@ -XXX,XX +XXX,XX @@ static uint64_t arm_ldq_ptw(CPUState *cs, hwaddr addr, bool is_secure, | ||
50 | AddressSpace *as; | ||
51 | uint64_t data; | ||
52 | |||
53 | + addr = S1_ptw_translate(env, mmu_idx, addr, &is_secure, fi); | ||
54 | attrs.secure = is_secure; | ||
55 | as = arm_addressspace(cs, attrs); | ||
56 | - addr = S1_ptw_translate(env, mmu_idx, addr, attrs, fi); | ||
57 | if (fi->s1ptw) { | ||
58 | return 0; | ||
59 | } | ||
60 | -- | ||
61 | 2.20.1 | ||
62 | |||
63 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
2 | 1 | ||
3 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
5 | Message-id: 20210112104511.36576-12-remi.denis.courmont@huawei.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | --- | ||
8 | target/arm/helper.c | 12 ++++++++++++ | ||
9 | 1 file changed, 12 insertions(+) | ||
10 | |||
11 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
12 | index XXXXXXX..XXXXXXX 100644 | ||
13 | --- a/target/arm/helper.c | ||
14 | +++ b/target/arm/helper.c | ||
15 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
16 | fi->s1ptw = true; | ||
17 | return ~0; | ||
18 | } | ||
19 | + | ||
20 | + if (arm_is_secure_below_el3(env)) { | ||
21 | + /* Check if page table walk is to secure or non-secure PA space. */ | ||
22 | + if (*is_secure) { | ||
23 | + *is_secure = !(env->cp15.vstcr_el2.raw_tcr & VSTCR_SW); | ||
24 | + } else { | ||
25 | + *is_secure = !(env->cp15.vtcr_el2.raw_tcr & VTCR_NSW); | ||
26 | + } | ||
27 | + } else { | ||
28 | + assert(!*is_secure); | ||
29 | + } | ||
30 | + | ||
31 | addr = s2pa; | ||
32 | } | ||
33 | return addr; | ||
34 | -- | ||
35 | 2.20.1 | ||
36 | |||
37 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
2 | 1 | ||
3 | The stage_1_mmu_idx() already effectively keeps track of which | ||
4 | translation regimes have two stages. Don't hard-code another test. | ||
5 | |||
6 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20210112104511.36576-13-remi.denis.courmont@huawei.com | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | --- | ||
11 | target/arm/helper.c | 13 ++++++------- | ||
12 | 1 file changed, 6 insertions(+), 7 deletions(-) | ||
13 | |||
14 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/target/arm/helper.c | ||
17 | +++ b/target/arm/helper.c | ||
18 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
19 | target_ulong *page_size, | ||
20 | ARMMMUFaultInfo *fi, ARMCacheAttrs *cacheattrs) | ||
21 | { | ||
22 | - if (mmu_idx == ARMMMUIdx_E10_0 || | ||
23 | - mmu_idx == ARMMMUIdx_E10_1 || | ||
24 | - mmu_idx == ARMMMUIdx_E10_1_PAN) { | ||
25 | + ARMMMUIdx s1_mmu_idx = stage_1_mmu_idx(mmu_idx); | ||
26 | + | ||
27 | + if (mmu_idx != s1_mmu_idx) { | ||
28 | /* Call ourselves recursively to do the stage 1 and then stage 2 | ||
29 | - * translations. | ||
30 | + * translations if mmu_idx is a two-stage regime. | ||
31 | */ | ||
32 | if (arm_feature(env, ARM_FEATURE_EL2)) { | ||
33 | hwaddr ipa; | ||
34 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
35 | int ret; | ||
36 | ARMCacheAttrs cacheattrs2 = {}; | ||
37 | |||
38 | - ret = get_phys_addr(env, address, access_type, | ||
39 | - stage_1_mmu_idx(mmu_idx), &ipa, attrs, | ||
40 | - prot, page_size, fi, cacheattrs); | ||
41 | + ret = get_phys_addr(env, address, access_type, s1_mmu_idx, &ipa, | ||
42 | + attrs, prot, page_size, fi, cacheattrs); | ||
43 | |||
44 | /* If S1 fails or S2 is disabled, return early. */ | ||
45 | if (ret || regime_translation_disabled(env, ARMMMUIdx_Stage2)) { | ||
46 | -- | ||
47 | 2.20.1 | ||
48 | |||
49 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
2 | 1 | ||
3 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
5 | Message-id: 20210112104511.36576-14-remi.denis.courmont@huawei.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | --- | ||
8 | target/arm/cpu.h | 6 +++- | ||
9 | target/arm/internals.h | 22 ++++++++++++ | ||
10 | target/arm/helper.c | 78 +++++++++++++++++++++++++++++------------- | ||
11 | 3 files changed, 81 insertions(+), 25 deletions(-) | ||
12 | |||
13 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
14 | index XXXXXXX..XXXXXXX 100644 | ||
15 | --- a/target/arm/cpu.h | ||
16 | +++ b/target/arm/cpu.h | ||
17 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdx { | ||
18 | ARMMMUIdx_Stage1_E0 = 0 | ARM_MMU_IDX_NOTLB, | ||
19 | ARMMMUIdx_Stage1_E1 = 1 | ARM_MMU_IDX_NOTLB, | ||
20 | ARMMMUIdx_Stage1_E1_PAN = 2 | ARM_MMU_IDX_NOTLB, | ||
21 | + ARMMMUIdx_Stage1_SE0 = 3 | ARM_MMU_IDX_NOTLB, | ||
22 | + ARMMMUIdx_Stage1_SE1 = 4 | ARM_MMU_IDX_NOTLB, | ||
23 | + ARMMMUIdx_Stage1_SE1_PAN = 5 | ARM_MMU_IDX_NOTLB, | ||
24 | /* | ||
25 | * Not allocated a TLB: used only for second stage of an S12 page | ||
26 | * table walk, or for descriptor loads during first stage of an S1 | ||
27 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdx { | ||
28 | * then various TLB flush insns which currently are no-ops or flush | ||
29 | * only stage 1 MMU indexes will need to change to flush stage 2. | ||
30 | */ | ||
31 | - ARMMMUIdx_Stage2 = 3 | ARM_MMU_IDX_NOTLB, | ||
32 | + ARMMMUIdx_Stage2 = 6 | ARM_MMU_IDX_NOTLB, | ||
33 | + ARMMMUIdx_Stage2_S = 7 | ARM_MMU_IDX_NOTLB, | ||
34 | |||
35 | /* | ||
36 | * M-profile. | ||
37 | diff --git a/target/arm/internals.h b/target/arm/internals.h | ||
38 | index XXXXXXX..XXXXXXX 100644 | ||
39 | --- a/target/arm/internals.h | ||
40 | +++ b/target/arm/internals.h | ||
41 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_has_2_ranges(ARMMMUIdx mmu_idx) | ||
42 | case ARMMMUIdx_Stage1_E0: | ||
43 | case ARMMMUIdx_Stage1_E1: | ||
44 | case ARMMMUIdx_Stage1_E1_PAN: | ||
45 | + case ARMMMUIdx_Stage1_SE0: | ||
46 | + case ARMMMUIdx_Stage1_SE1: | ||
47 | + case ARMMMUIdx_Stage1_SE1_PAN: | ||
48 | case ARMMMUIdx_E10_0: | ||
49 | case ARMMMUIdx_E10_1: | ||
50 | case ARMMMUIdx_E10_1_PAN: | ||
51 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_secure(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
52 | case ARMMMUIdx_SE20_0: | ||
53 | case ARMMMUIdx_SE20_2: | ||
54 | case ARMMMUIdx_SE20_2_PAN: | ||
55 | + case ARMMMUIdx_Stage1_SE0: | ||
56 | + case ARMMMUIdx_Stage1_SE1: | ||
57 | + case ARMMMUIdx_Stage1_SE1_PAN: | ||
58 | case ARMMMUIdx_SE2: | ||
59 | + case ARMMMUIdx_Stage2_S: | ||
60 | case ARMMMUIdx_MSPrivNegPri: | ||
61 | case ARMMMUIdx_MSUserNegPri: | ||
62 | case ARMMMUIdx_MSPriv: | ||
63 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_pan(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
64 | { | ||
65 | switch (mmu_idx) { | ||
66 | case ARMMMUIdx_Stage1_E1_PAN: | ||
67 | + case ARMMMUIdx_Stage1_SE1_PAN: | ||
68 | case ARMMMUIdx_E10_1_PAN: | ||
69 | case ARMMMUIdx_E20_2_PAN: | ||
70 | case ARMMMUIdx_SE10_1_PAN: | ||
71 | @@ -XXX,XX +XXX,XX @@ static inline uint32_t regime_el(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
72 | case ARMMMUIdx_E20_2: | ||
73 | case ARMMMUIdx_E20_2_PAN: | ||
74 | case ARMMMUIdx_Stage2: | ||
75 | + case ARMMMUIdx_Stage2_S: | ||
76 | case ARMMMUIdx_SE2: | ||
77 | case ARMMMUIdx_E2: | ||
78 | return 2; | ||
79 | case ARMMMUIdx_SE3: | ||
80 | return 3; | ||
81 | case ARMMMUIdx_SE10_0: | ||
82 | + case ARMMMUIdx_Stage1_SE0: | ||
83 | return arm_el_is_aa64(env, 3) ? 1 : 3; | ||
84 | case ARMMMUIdx_SE10_1: | ||
85 | case ARMMMUIdx_SE10_1_PAN: | ||
86 | case ARMMMUIdx_Stage1_E0: | ||
87 | case ARMMMUIdx_Stage1_E1: | ||
88 | case ARMMMUIdx_Stage1_E1_PAN: | ||
89 | + case ARMMMUIdx_Stage1_SE1: | ||
90 | + case ARMMMUIdx_Stage1_SE1_PAN: | ||
91 | case ARMMMUIdx_E10_0: | ||
92 | case ARMMMUIdx_E10_1: | ||
93 | case ARMMMUIdx_E10_1_PAN: | ||
94 | @@ -XXX,XX +XXX,XX @@ static inline TCR *regime_tcr(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
95 | if (mmu_idx == ARMMMUIdx_Stage2) { | ||
96 | return &env->cp15.vtcr_el2; | ||
97 | } | ||
98 | + if (mmu_idx == ARMMMUIdx_Stage2_S) { | ||
99 | + /* | ||
100 | + * Note: Secure stage 2 nominally shares fields from VTCR_EL2, but | ||
101 | + * those are not currently used by QEMU, so just return VSTCR_EL2. | ||
102 | + */ | ||
103 | + return &env->cp15.vstcr_el2; | ||
104 | + } | ||
105 | return &env->cp15.tcr_el[regime_el(env, mmu_idx)]; | ||
106 | } | ||
107 | |||
108 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_mmu_idx_is_stage1_of_2(ARMMMUIdx mmu_idx) | ||
109 | case ARMMMUIdx_Stage1_E0: | ||
110 | case ARMMMUIdx_Stage1_E1: | ||
111 | case ARMMMUIdx_Stage1_E1_PAN: | ||
112 | + case ARMMMUIdx_Stage1_SE0: | ||
113 | + case ARMMMUIdx_Stage1_SE1: | ||
114 | + case ARMMMUIdx_Stage1_SE1_PAN: | ||
115 | return true; | ||
116 | default: | ||
117 | return false; | ||
118 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
119 | index XXXXXXX..XXXXXXX 100644 | ||
120 | --- a/target/arm/helper.c | ||
121 | +++ b/target/arm/helper.c | ||
122 | @@ -XXX,XX +XXX,XX @@ static uint64_t do_ats_write(CPUARMState *env, uint64_t value, | ||
123 | uint32_t syn, fsr, fsc; | ||
124 | bool take_exc = false; | ||
125 | |||
126 | - if (fi.s1ptw && current_el == 1 && !arm_is_secure(env) | ||
127 | + if (fi.s1ptw && current_el == 1 | ||
128 | && arm_mmu_idx_is_stage1_of_2(mmu_idx)) { | ||
129 | /* | ||
130 | * Synchronous stage 2 fault on an access made as part of the | ||
131 | @@ -XXX,XX +XXX,XX @@ static void ats_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
132 | /* fall through */ | ||
133 | case 1: | ||
134 | if (ri->crm == 9 && (env->uncached_cpsr & CPSR_PAN)) { | ||
135 | - mmu_idx = (secure ? ARMMMUIdx_SE10_1_PAN | ||
136 | + mmu_idx = (secure ? ARMMMUIdx_Stage1_SE1_PAN | ||
137 | : ARMMMUIdx_Stage1_E1_PAN); | ||
138 | } else { | ||
139 | - mmu_idx = secure ? ARMMMUIdx_SE10_1 : ARMMMUIdx_Stage1_E1; | ||
140 | + mmu_idx = secure ? ARMMMUIdx_Stage1_SE1 : ARMMMUIdx_Stage1_E1; | ||
141 | } | ||
142 | break; | ||
143 | default: | ||
144 | @@ -XXX,XX +XXX,XX @@ static void ats_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
145 | mmu_idx = ARMMMUIdx_SE10_0; | ||
146 | break; | ||
147 | case 2: | ||
148 | + g_assert(!secure); /* ARMv8.4-SecEL2 is 64-bit only */ | ||
149 | mmu_idx = ARMMMUIdx_Stage1_E0; | ||
150 | break; | ||
151 | case 1: | ||
152 | - mmu_idx = secure ? ARMMMUIdx_SE10_0 : ARMMMUIdx_Stage1_E0; | ||
153 | + mmu_idx = secure ? ARMMMUIdx_Stage1_SE0 : ARMMMUIdx_Stage1_E0; | ||
154 | break; | ||
155 | default: | ||
156 | g_assert_not_reached(); | ||
157 | @@ -XXX,XX +XXX,XX @@ static void ats_write64(CPUARMState *env, const ARMCPRegInfo *ri, | ||
158 | switch (ri->opc1) { | ||
159 | case 0: /* AT S1E1R, AT S1E1W, AT S1E1RP, AT S1E1WP */ | ||
160 | if (ri->crm == 9 && (env->pstate & PSTATE_PAN)) { | ||
161 | - mmu_idx = (secure ? ARMMMUIdx_SE10_1_PAN | ||
162 | + mmu_idx = (secure ? ARMMMUIdx_Stage1_SE1_PAN | ||
163 | : ARMMMUIdx_Stage1_E1_PAN); | ||
164 | } else { | ||
165 | - mmu_idx = secure ? ARMMMUIdx_SE10_1 : ARMMMUIdx_Stage1_E1; | ||
166 | + mmu_idx = secure ? ARMMMUIdx_Stage1_SE1 : ARMMMUIdx_Stage1_E1; | ||
167 | } | ||
168 | break; | ||
169 | case 4: /* AT S1E2R, AT S1E2W */ | ||
170 | @@ -XXX,XX +XXX,XX @@ static void ats_write64(CPUARMState *env, const ARMCPRegInfo *ri, | ||
171 | } | ||
172 | break; | ||
173 | case 2: /* AT S1E0R, AT S1E0W */ | ||
174 | - mmu_idx = secure ? ARMMMUIdx_SE10_0 : ARMMMUIdx_Stage1_E0; | ||
175 | + mmu_idx = secure ? ARMMMUIdx_Stage1_SE0 : ARMMMUIdx_Stage1_E0; | ||
176 | break; | ||
177 | case 4: /* AT S12E1R, AT S12E1W */ | ||
178 | mmu_idx = secure ? ARMMMUIdx_SE10_1 : ARMMMUIdx_E10_1; | ||
179 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_translation_disabled(CPUARMState *env, | ||
180 | |||
181 | hcr_el2 = arm_hcr_el2_eff(env); | ||
182 | |||
183 | - if (mmu_idx == ARMMMUIdx_Stage2) { | ||
184 | + if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
185 | /* HCR.DC means HCR.VM behaves as 1 */ | ||
186 | return (hcr_el2 & (HCR_DC | HCR_VM)) == 0; | ||
187 | } | ||
188 | @@ -XXX,XX +XXX,XX @@ static inline uint64_t regime_ttbr(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
189 | if (mmu_idx == ARMMMUIdx_Stage2) { | ||
190 | return env->cp15.vttbr_el2; | ||
191 | } | ||
192 | + if (mmu_idx == ARMMMUIdx_Stage2_S) { | ||
193 | + return env->cp15.vsttbr_el2; | ||
194 | + } | ||
195 | if (ttbrn == 0) { | ||
196 | return env->cp15.ttbr0_el[regime_el(env, mmu_idx)]; | ||
197 | } else { | ||
198 | @@ -XXX,XX +XXX,XX @@ static inline uint64_t regime_ttbr(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
199 | static inline ARMMMUIdx stage_1_mmu_idx(ARMMMUIdx mmu_idx) | ||
200 | { | ||
201 | switch (mmu_idx) { | ||
202 | + case ARMMMUIdx_SE10_0: | ||
203 | + return ARMMMUIdx_Stage1_SE0; | ||
204 | + case ARMMMUIdx_SE10_1: | ||
205 | + return ARMMMUIdx_Stage1_SE1; | ||
206 | + case ARMMMUIdx_SE10_1_PAN: | ||
207 | + return ARMMMUIdx_Stage1_SE1_PAN; | ||
208 | case ARMMMUIdx_E10_0: | ||
209 | return ARMMMUIdx_Stage1_E0; | ||
210 | case ARMMMUIdx_E10_1: | ||
211 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_user(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
212 | case ARMMMUIdx_E20_0: | ||
213 | case ARMMMUIdx_SE20_0: | ||
214 | case ARMMMUIdx_Stage1_E0: | ||
215 | + case ARMMMUIdx_Stage1_SE0: | ||
216 | case ARMMMUIdx_MUser: | ||
217 | case ARMMMUIdx_MSUser: | ||
218 | case ARMMMUIdx_MUserNegPri: | ||
219 | @@ -XXX,XX +XXX,XX @@ static int get_S1prot(CPUARMState *env, ARMMMUIdx mmu_idx, bool is_aa64, | ||
220 | int wxn = 0; | ||
221 | |||
222 | assert(mmu_idx != ARMMMUIdx_Stage2); | ||
223 | + assert(mmu_idx != ARMMMUIdx_Stage2_S); | ||
224 | |||
225 | user_rw = simple_ap_to_rw_prot_is_user(ap, true); | ||
226 | if (is_user) { | ||
227 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
228 | hwaddr s2pa; | ||
229 | int s2prot; | ||
230 | int ret; | ||
231 | + ARMMMUIdx s2_mmu_idx = *is_secure ? ARMMMUIdx_Stage2_S | ||
232 | + : ARMMMUIdx_Stage2; | ||
233 | ARMCacheAttrs cacheattrs = {}; | ||
234 | MemTxAttrs txattrs = {}; | ||
235 | |||
236 | - assert(!*is_secure); /* TODO: S-EL2 */ | ||
237 | - | ||
238 | - ret = get_phys_addr_lpae(env, addr, MMU_DATA_LOAD, ARMMMUIdx_Stage2, | ||
239 | - false, | ||
240 | + ret = get_phys_addr_lpae(env, addr, MMU_DATA_LOAD, s2_mmu_idx, false, | ||
241 | &s2pa, &txattrs, &s2prot, &s2size, fi, | ||
242 | &cacheattrs); | ||
243 | if (ret) { | ||
244 | @@ -XXX,XX +XXX,XX @@ static int aa64_va_parameter_tbi(uint64_t tcr, ARMMMUIdx mmu_idx) | ||
245 | { | ||
246 | if (regime_has_2_ranges(mmu_idx)) { | ||
247 | return extract64(tcr, 37, 2); | ||
248 | - } else if (mmu_idx == ARMMMUIdx_Stage2) { | ||
249 | + } else if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
250 | return 0; /* VTCR_EL2 */ | ||
251 | } else { | ||
252 | /* Replicate the single TBI bit so we always have 2 bits. */ | ||
253 | @@ -XXX,XX +XXX,XX @@ static int aa64_va_parameter_tbid(uint64_t tcr, ARMMMUIdx mmu_idx) | ||
254 | { | ||
255 | if (regime_has_2_ranges(mmu_idx)) { | ||
256 | return extract64(tcr, 51, 2); | ||
257 | - } else if (mmu_idx == ARMMMUIdx_Stage2) { | ||
258 | + } else if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
259 | return 0; /* VTCR_EL2 */ | ||
260 | } else { | ||
261 | /* Replicate the single TBID bit so we always have 2 bits. */ | ||
262 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
263 | tsz = extract32(tcr, 0, 6); | ||
264 | using64k = extract32(tcr, 14, 1); | ||
265 | using16k = extract32(tcr, 15, 1); | ||
266 | - if (mmu_idx == ARMMMUIdx_Stage2) { | ||
267 | + if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
268 | /* VTCR_EL2 */ | ||
269 | hpd = false; | ||
270 | } else { | ||
271 | @@ -XXX,XX +XXX,XX @@ static ARMVAParameters aa32_va_parameters(CPUARMState *env, uint32_t va, | ||
272 | int select, tsz; | ||
273 | bool epd, hpd; | ||
274 | |||
275 | + assert(mmu_idx != ARMMMUIdx_Stage2_S); | ||
276 | + | ||
277 | if (mmu_idx == ARMMMUIdx_Stage2) { | ||
278 | /* VTCR */ | ||
279 | bool sext = extract32(tcr, 4, 1); | ||
280 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
281 | goto do_fault; | ||
282 | } | ||
283 | |||
284 | - if (mmu_idx != ARMMMUIdx_Stage2) { | ||
285 | + if (mmu_idx != ARMMMUIdx_Stage2 && mmu_idx != ARMMMUIdx_Stage2_S) { | ||
286 | /* The starting level depends on the virtual address size (which can | ||
287 | * be up to 48 bits) and the translation granule size. It indicates | ||
288 | * the number of strides (stride bits at a time) needed to | ||
289 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
290 | attrs = extract64(descriptor, 2, 10) | ||
291 | | (extract64(descriptor, 52, 12) << 10); | ||
292 | |||
293 | - if (mmu_idx == ARMMMUIdx_Stage2) { | ||
294 | + if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
295 | /* Stage 2 table descriptors do not include any attribute fields */ | ||
296 | break; | ||
297 | } | ||
298 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
299 | |||
300 | ap = extract32(attrs, 4, 2); | ||
301 | |||
302 | - if (mmu_idx == ARMMMUIdx_Stage2) { | ||
303 | - ns = true; | ||
304 | + if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
305 | + ns = mmu_idx == ARMMMUIdx_Stage2; | ||
306 | xn = extract32(attrs, 11, 2); | ||
307 | *prot = get_S2prot(env, ap, xn, s1_is_el0); | ||
308 | } else { | ||
309 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
310 | arm_tlb_bti_gp(txattrs) = true; | ||
311 | } | ||
312 | |||
313 | - if (mmu_idx == ARMMMUIdx_Stage2) { | ||
314 | + if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
315 | cacheattrs->attrs = convert_stage2_attrs(env, extract32(attrs, 0, 4)); | ||
316 | } else { | ||
317 | /* Index into MAIR registers for cache attributes */ | ||
318 | @@ -XXX,XX +XXX,XX @@ do_fault: | ||
319 | fi->type = fault_type; | ||
320 | fi->level = level; | ||
321 | /* Tag the error as S2 for failed S1 PTW at S2 or ordinary S2. */ | ||
322 | - fi->stage2 = fi->s1ptw || (mmu_idx == ARMMMUIdx_Stage2); | ||
323 | + fi->stage2 = fi->s1ptw || (mmu_idx == ARMMMUIdx_Stage2 || | ||
324 | + mmu_idx == ARMMMUIdx_Stage2_S); | ||
325 | return true; | ||
326 | } | ||
327 | |||
328 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
329 | int s2_prot; | ||
330 | int ret; | ||
331 | ARMCacheAttrs cacheattrs2 = {}; | ||
332 | + ARMMMUIdx s2_mmu_idx; | ||
333 | + bool is_el0; | ||
334 | |||
335 | ret = get_phys_addr(env, address, access_type, s1_mmu_idx, &ipa, | ||
336 | attrs, prot, page_size, fi, cacheattrs); | ||
337 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
338 | return ret; | ||
339 | } | ||
340 | |||
341 | + s2_mmu_idx = attrs->secure ? ARMMMUIdx_Stage2_S : ARMMMUIdx_Stage2; | ||
342 | + is_el0 = mmu_idx == ARMMMUIdx_E10_0 || mmu_idx == ARMMMUIdx_SE10_0; | ||
343 | + | ||
344 | /* S1 is done. Now do S2 translation. */ | ||
345 | - ret = get_phys_addr_lpae(env, ipa, access_type, ARMMMUIdx_Stage2, | ||
346 | - mmu_idx == ARMMMUIdx_E10_0, | ||
347 | + ret = get_phys_addr_lpae(env, ipa, access_type, s2_mmu_idx, is_el0, | ||
348 | phys_ptr, attrs, &s2_prot, | ||
349 | page_size, fi, &cacheattrs2); | ||
350 | fi->s2addr = ipa; | ||
351 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
352 | cacheattrs->shareability = 0; | ||
353 | } | ||
354 | *cacheattrs = combine_cacheattrs(*cacheattrs, cacheattrs2); | ||
355 | + | ||
356 | + /* Check if IPA translates to secure or non-secure PA space. */ | ||
357 | + if (arm_is_secure_below_el3(env)) { | ||
358 | + if (attrs->secure) { | ||
359 | + attrs->secure = | ||
360 | + !(env->cp15.vstcr_el2.raw_tcr & (VSTCR_SA | VSTCR_SW)); | ||
361 | + } else { | ||
362 | + attrs->secure = | ||
363 | + !((env->cp15.vtcr_el2.raw_tcr & (VTCR_NSA | VTCR_NSW)) | ||
364 | + || (env->cp15.vstcr_el2.raw_tcr & VSTCR_SA)); | ||
365 | + } | ||
366 | + } | ||
367 | return 0; | ||
368 | } else { | ||
369 | /* | ||
370 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
371 | * MMU disabled. S1 addresses within aa64 translation regimes are | ||
372 | * still checked for bounds -- see AArch64.TranslateAddressS1Off. | ||
373 | */ | ||
374 | - if (mmu_idx != ARMMMUIdx_Stage2) { | ||
375 | + if (mmu_idx != ARMMMUIdx_Stage2 && mmu_idx != ARMMMUIdx_Stage2_S) { | ||
376 | int r_el = regime_el(env, mmu_idx); | ||
377 | if (arm_el_is_aa64(env, r_el)) { | ||
378 | int pamax = arm_pamax(env_archcpu(env)); | ||
379 | -- | ||
380 | 2.20.1 | ||
381 | |||
382 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
2 | 1 | ||
3 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
5 | Message-id: 20210112104511.36576-15-remi.denis.courmont@huawei.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | --- | ||
8 | target/arm/cpu.h | 2 ++ | ||
9 | target/arm/internals.h | 2 ++ | ||
10 | target/arm/helper.c | 6 ++++++ | ||
11 | target/arm/tlb_helper.c | 3 +++ | ||
12 | 4 files changed, 13 insertions(+) | ||
13 | |||
14 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/target/arm/cpu.h | ||
17 | +++ b/target/arm/cpu.h | ||
18 | @@ -XXX,XX +XXX,XX @@ static inline void xpsr_write(CPUARMState *env, uint32_t val, uint32_t mask) | ||
19 | #define HCR_TWEDEN (1ULL << 59) | ||
20 | #define HCR_TWEDEL MAKE_64BIT_MASK(60, 4) | ||
21 | |||
22 | +#define HPFAR_NS (1ULL << 63) | ||
23 | + | ||
24 | #define SCR_NS (1U << 0) | ||
25 | #define SCR_IRQ (1U << 1) | ||
26 | #define SCR_FIQ (1U << 2) | ||
27 | diff --git a/target/arm/internals.h b/target/arm/internals.h | ||
28 | index XXXXXXX..XXXXXXX 100644 | ||
29 | --- a/target/arm/internals.h | ||
30 | +++ b/target/arm/internals.h | ||
31 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMFaultType { | ||
32 | * @s2addr: Address that caused a fault at stage 2 | ||
33 | * @stage2: True if we faulted at stage 2 | ||
34 | * @s1ptw: True if we faulted at stage 2 while doing a stage 1 page-table walk | ||
35 | + * @s1ns: True if we faulted on a non-secure IPA while in secure state | ||
36 | * @ea: True if we should set the EA (external abort type) bit in syndrome | ||
37 | */ | ||
38 | typedef struct ARMMMUFaultInfo ARMMMUFaultInfo; | ||
39 | @@ -XXX,XX +XXX,XX @@ struct ARMMMUFaultInfo { | ||
40 | int domain; | ||
41 | bool stage2; | ||
42 | bool s1ptw; | ||
43 | + bool s1ns; | ||
44 | bool ea; | ||
45 | }; | ||
46 | |||
47 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
48 | index XXXXXXX..XXXXXXX 100644 | ||
49 | --- a/target/arm/helper.c | ||
50 | +++ b/target/arm/helper.c | ||
51 | @@ -XXX,XX +XXX,XX @@ static uint64_t do_ats_write(CPUARMState *env, uint64_t value, | ||
52 | target_el = 3; | ||
53 | } else { | ||
54 | env->cp15.hpfar_el2 = extract64(fi.s2addr, 12, 47) << 4; | ||
55 | + if (arm_is_secure_below_el3(env) && fi.s1ns) { | ||
56 | + env->cp15.hpfar_el2 |= HPFAR_NS; | ||
57 | + } | ||
58 | target_el = 2; | ||
59 | } | ||
60 | take_exc = true; | ||
61 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
62 | fi->s2addr = addr; | ||
63 | fi->stage2 = true; | ||
64 | fi->s1ptw = true; | ||
65 | + fi->s1ns = !*is_secure; | ||
66 | return ~0; | ||
67 | } | ||
68 | if ((arm_hcr_el2_eff(env) & HCR_PTW) && | ||
69 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
70 | fi->s2addr = addr; | ||
71 | fi->stage2 = true; | ||
72 | fi->s1ptw = true; | ||
73 | + fi->s1ns = !*is_secure; | ||
74 | return ~0; | ||
75 | } | ||
76 | |||
77 | @@ -XXX,XX +XXX,XX @@ do_fault: | ||
78 | /* Tag the error as S2 for failed S1 PTW at S2 or ordinary S2. */ | ||
79 | fi->stage2 = fi->s1ptw || (mmu_idx == ARMMMUIdx_Stage2 || | ||
80 | mmu_idx == ARMMMUIdx_Stage2_S); | ||
81 | + fi->s1ns = mmu_idx == ARMMMUIdx_Stage2; | ||
82 | return true; | ||
83 | } | ||
84 | |||
85 | diff --git a/target/arm/tlb_helper.c b/target/arm/tlb_helper.c | ||
86 | index XXXXXXX..XXXXXXX 100644 | ||
87 | --- a/target/arm/tlb_helper.c | ||
88 | +++ b/target/arm/tlb_helper.c | ||
89 | @@ -XXX,XX +XXX,XX @@ static void QEMU_NORETURN arm_deliver_fault(ARMCPU *cpu, vaddr addr, | ||
90 | if (fi->stage2) { | ||
91 | target_el = 2; | ||
92 | env->cp15.hpfar_el2 = extract64(fi->s2addr, 12, 47) << 4; | ||
93 | + if (arm_is_secure_below_el3(env) && fi->s1ns) { | ||
94 | + env->cp15.hpfar_el2 |= HPFAR_NS; | ||
95 | + } | ||
96 | } | ||
97 | same_el = (arm_current_el(env) == target_el); | ||
98 | |||
99 | -- | ||
100 | 2.20.1 | ||
101 | |||
102 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
2 | 1 | ||
3 | On ARMv8-A, accesses by 32-bit secure EL1 to monitor registers trap to | ||
4 | the upper (64-bit) EL. With Secure EL2 support, we can no longer assume | ||
5 | that that is always EL3, so make room for the value to be computed at | ||
6 | run-time. | ||
7 | |||
8 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
10 | Message-id: 20210112104511.36576-16-remi.denis.courmont@huawei.com | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | --- | ||
13 | target/arm/translate.c | 23 +++++++++++++++++++++-- | ||
14 | 1 file changed, 21 insertions(+), 2 deletions(-) | ||
15 | |||
16 | diff --git a/target/arm/translate.c b/target/arm/translate.c | ||
17 | index XXXXXXX..XXXXXXX 100644 | ||
18 | --- a/target/arm/translate.c | ||
19 | +++ b/target/arm/translate.c | ||
20 | @@ -XXX,XX +XXX,XX @@ static void unallocated_encoding(DisasContext *s) | ||
21 | default_exception_el(s)); | ||
22 | } | ||
23 | |||
24 | +static void gen_exception_el(DisasContext *s, int excp, uint32_t syn, | ||
25 | + TCGv_i32 tcg_el) | ||
26 | +{ | ||
27 | + TCGv_i32 tcg_excp; | ||
28 | + TCGv_i32 tcg_syn; | ||
29 | + | ||
30 | + gen_set_condexec(s); | ||
31 | + gen_set_pc_im(s, s->pc_curr); | ||
32 | + tcg_excp = tcg_const_i32(excp); | ||
33 | + tcg_syn = tcg_const_i32(syn); | ||
34 | + gen_helper_exception_with_syndrome(cpu_env, tcg_excp, tcg_syn, tcg_el); | ||
35 | + tcg_temp_free_i32(tcg_syn); | ||
36 | + tcg_temp_free_i32(tcg_excp); | ||
37 | + s->base.is_jmp = DISAS_NORETURN; | ||
38 | +} | ||
39 | + | ||
40 | /* Force a TB lookup after an instruction that changes the CPU state. */ | ||
41 | static inline void gen_lookup_tb(DisasContext *s) | ||
42 | { | ||
43 | @@ -XXX,XX +XXX,XX @@ static bool msr_banked_access_decode(DisasContext *s, int r, int sysm, int rn, | ||
44 | /* If we're in Secure EL1 (which implies that EL3 is AArch64) | ||
45 | * then accesses to Mon registers trap to EL3 | ||
46 | */ | ||
47 | - exc_target = 3; | ||
48 | - goto undef; | ||
49 | + TCGv_i32 tcg_el = tcg_const_i32(3); | ||
50 | + | ||
51 | + gen_exception_el(s, EXCP_UDEF, syn_uncategorized(), tcg_el); | ||
52 | + tcg_temp_free_i32(tcg_el); | ||
53 | + return false; | ||
54 | } | ||
55 | break; | ||
56 | case ARM_CPU_MODE_HYP: | ||
57 | -- | ||
58 | 2.20.1 | ||
59 | |||
60 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
2 | 1 | ||
3 | This adds handling for the SCR_EL3.EEL2 bit. | ||
4 | |||
5 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
6 | Message-id: 20210112104511.36576-17-remi.denis.courmont@huawei.com | ||
7 | [PMM: Applied fixes for review issues noted by RTH: | ||
8 | - check for FEATURE_AARCH64 before checking sel2 isar feature | ||
9 | - correct the commit message subject line] | ||
10 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | --- | ||
13 | target/arm/cpu.h | 8 ++++++-- | ||
14 | target/arm/cpu.c | 2 +- | ||
15 | target/arm/helper.c | 19 ++++++++++++++++--- | ||
16 | target/arm/translate.c | 15 +++++++++++++-- | ||
17 | 4 files changed, 36 insertions(+), 8 deletions(-) | ||
18 | |||
19 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
20 | index XXXXXXX..XXXXXXX 100644 | ||
21 | --- a/target/arm/cpu.h | ||
22 | +++ b/target/arm/cpu.h | ||
23 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_is_secure(CPUARMState *env) | ||
24 | static inline bool arm_is_el2_enabled(CPUARMState *env) | ||
25 | { | ||
26 | if (arm_feature(env, ARM_FEATURE_EL2)) { | ||
27 | - return !arm_is_secure_below_el3(env); | ||
28 | + if (arm_is_secure_below_el3(env)) { | ||
29 | + return (env->cp15.scr_el3 & SCR_EEL2) != 0; | ||
30 | + } | ||
31 | + return true; | ||
32 | } | ||
33 | return false; | ||
34 | } | ||
35 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_el_is_aa64(CPUARMState *env, int el) | ||
36 | return aa64; | ||
37 | } | ||
38 | |||
39 | - if (arm_feature(env, ARM_FEATURE_EL3)) { | ||
40 | + if (arm_feature(env, ARM_FEATURE_EL3) && | ||
41 | + ((env->cp15.scr_el3 & SCR_NS) || !(env->cp15.scr_el3 & SCR_EEL2))) { | ||
42 | aa64 = aa64 && (env->cp15.scr_el3 & SCR_RW); | ||
43 | } | ||
44 | |||
45 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | ||
46 | index XXXXXXX..XXXXXXX 100644 | ||
47 | --- a/target/arm/cpu.c | ||
48 | +++ b/target/arm/cpu.c | ||
49 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_excp_unmasked(CPUState *cs, unsigned int excp_idx, | ||
50 | * masked from Secure state. The HCR and SCR settings | ||
51 | * don't affect the masking logic, only the interrupt routing. | ||
52 | */ | ||
53 | - if (target_el == 3 || !secure) { | ||
54 | + if (target_el == 3 || !secure || (env->cp15.scr_el3 & SCR_EEL2)) { | ||
55 | unmasked = true; | ||
56 | } | ||
57 | } else { | ||
58 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
59 | index XXXXXXX..XXXXXXX 100644 | ||
60 | --- a/target/arm/helper.c | ||
61 | +++ b/target/arm/helper.c | ||
62 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_trap_aa32s_el1(CPUARMState *env, | ||
63 | return CP_ACCESS_OK; | ||
64 | } | ||
65 | if (arm_is_secure_below_el3(env)) { | ||
66 | + if (env->cp15.scr_el3 & SCR_EEL2) { | ||
67 | + return CP_ACCESS_TRAP_EL2; | ||
68 | + } | ||
69 | return CP_ACCESS_TRAP_EL3; | ||
70 | } | ||
71 | /* This will be EL1 NS and EL2 NS, which just UNDEF */ | ||
72 | @@ -XXX,XX +XXX,XX @@ static void scr_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
73 | if (cpu_isar_feature(aa64_pauth, cpu)) { | ||
74 | valid_mask |= SCR_API | SCR_APK; | ||
75 | } | ||
76 | + if (cpu_isar_feature(aa64_sel2, cpu)) { | ||
77 | + valid_mask |= SCR_EEL2; | ||
78 | + } | ||
79 | if (cpu_isar_feature(aa64_mte, cpu)) { | ||
80 | valid_mask |= SCR_ATA; | ||
81 | } | ||
82 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult ats_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
83 | bool isread) | ||
84 | { | ||
85 | if (ri->opc2 & 4) { | ||
86 | - /* The ATS12NSO* operations must trap to EL3 if executed in | ||
87 | + /* The ATS12NSO* operations must trap to EL3 or EL2 if executed in | ||
88 | * Secure EL1 (which can only happen if EL3 is AArch64). | ||
89 | * They are simply UNDEF if executed from NS EL1. | ||
90 | * They function normally from EL2 or EL3. | ||
91 | */ | ||
92 | if (arm_current_el(env) == 1) { | ||
93 | if (arm_is_secure_below_el3(env)) { | ||
94 | + if (env->cp15.scr_el3 & SCR_EEL2) { | ||
95 | + return CP_ACCESS_TRAP_UNCATEGORIZED_EL2; | ||
96 | + } | ||
97 | return CP_ACCESS_TRAP_UNCATEGORIZED_EL3; | ||
98 | } | ||
99 | return CP_ACCESS_TRAP_UNCATEGORIZED; | ||
100 | @@ -XXX,XX +XXX,XX @@ static void ats1h_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
101 | static CPAccessResult at_s1e2_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
102 | bool isread) | ||
103 | { | ||
104 | - if (arm_current_el(env) == 3 && !(env->cp15.scr_el3 & SCR_NS)) { | ||
105 | + if (arm_current_el(env) == 3 && | ||
106 | + !(env->cp15.scr_el3 & (SCR_NS | SCR_EEL2))) { | ||
107 | return CP_ACCESS_TRAP; | ||
108 | } | ||
109 | return CP_ACCESS_OK; | ||
110 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult nsacr_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
111 | bool isread) | ||
112 | { | ||
113 | /* The NSACR is RW at EL3, and RO for NS EL1 and NS EL2. | ||
114 | - * At Secure EL1 it traps to EL3. | ||
115 | + * At Secure EL1 it traps to EL3 or EL2. | ||
116 | */ | ||
117 | if (arm_current_el(env) == 3) { | ||
118 | return CP_ACCESS_OK; | ||
119 | } | ||
120 | if (arm_is_secure_below_el3(env)) { | ||
121 | + if (env->cp15.scr_el3 & SCR_EEL2) { | ||
122 | + return CP_ACCESS_TRAP_EL2; | ||
123 | + } | ||
124 | return CP_ACCESS_TRAP_EL3; | ||
125 | } | ||
126 | /* Accesses from EL1 NS and EL2 NS are UNDEF for write but allow reads. */ | ||
127 | diff --git a/target/arm/translate.c b/target/arm/translate.c | ||
128 | index XXXXXXX..XXXXXXX 100644 | ||
129 | --- a/target/arm/translate.c | ||
130 | +++ b/target/arm/translate.c | ||
131 | @@ -XXX,XX +XXX,XX @@ static bool msr_banked_access_decode(DisasContext *s, int r, int sysm, int rn, | ||
132 | } | ||
133 | if (s->current_el == 1) { | ||
134 | /* If we're in Secure EL1 (which implies that EL3 is AArch64) | ||
135 | - * then accesses to Mon registers trap to EL3 | ||
136 | + * then accesses to Mon registers trap to Secure EL2, if it exists, | ||
137 | + * otherwise EL3. | ||
138 | */ | ||
139 | - TCGv_i32 tcg_el = tcg_const_i32(3); | ||
140 | + TCGv_i32 tcg_el; | ||
141 | + | ||
142 | + if (arm_dc_feature(s, ARM_FEATURE_AARCH64) && | ||
143 | + dc_isar_feature(aa64_sel2, s)) { | ||
144 | + /* Target EL is EL<3 minus SCR_EL3.EEL2> */ | ||
145 | + tcg_el = load_cpu_field(cp15.scr_el3); | ||
146 | + tcg_gen_sextract_i32(tcg_el, tcg_el, ctz32(SCR_EEL2), 1); | ||
147 | + tcg_gen_addi_i32(tcg_el, tcg_el, 3); | ||
148 | + } else { | ||
149 | + tcg_el = tcg_const_i32(3); | ||
150 | + } | ||
151 | |||
152 | gen_exception_el(s, EXCP_UDEF, syn_uncategorized(), tcg_el); | ||
153 | tcg_temp_free_i32(tcg_el); | ||
154 | -- | ||
155 | 2.20.1 | ||
156 | |||
157 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
2 | 1 | ||
3 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
5 | Message-id: 20210112104511.36576-18-remi.denis.courmont@huawei.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | --- | ||
8 | target/arm/cpu64.c | 1 + | ||
9 | 1 file changed, 1 insertion(+) | ||
10 | |||
11 | diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c | ||
12 | index XXXXXXX..XXXXXXX 100644 | ||
13 | --- a/target/arm/cpu64.c | ||
14 | +++ b/target/arm/cpu64.c | ||
15 | @@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj) | ||
16 | t = FIELD_DP64(t, ID_AA64PFR0, SVE, 1); | ||
17 | t = FIELD_DP64(t, ID_AA64PFR0, FP, 1); | ||
18 | t = FIELD_DP64(t, ID_AA64PFR0, ADVSIMD, 1); | ||
19 | + t = FIELD_DP64(t, ID_AA64PFR0, SEL2, 1); | ||
20 | cpu->isar.id_aa64pfr0 = t; | ||
21 | |||
22 | t = cpu->isar.id_aa64pfr1; | ||
23 | -- | ||
24 | 2.20.1 | ||
25 | |||
26 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
2 | 1 | ||
3 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
5 | Message-id: 20210112104511.36576-19-remi.denis.courmont@huawei.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | --- | ||
8 | target/arm/helper.c | 25 +++++++++++-------------- | ||
9 | 1 file changed, 11 insertions(+), 14 deletions(-) | ||
10 | |||
11 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
12 | index XXXXXXX..XXXXXXX 100644 | ||
13 | --- a/target/arm/helper.c | ||
14 | +++ b/target/arm/helper.c | ||
15 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult aa64_cacheop_pou_access(CPUARMState *env, | ||
16 | static int vae1_tlbmask(CPUARMState *env) | ||
17 | { | ||
18 | uint64_t hcr = arm_hcr_el2_eff(env); | ||
19 | + uint16_t mask; | ||
20 | |||
21 | if ((hcr & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE)) { | ||
22 | - uint16_t mask = ARMMMUIdxBit_E20_2 | | ||
23 | - ARMMMUIdxBit_E20_2_PAN | | ||
24 | - ARMMMUIdxBit_E20_0; | ||
25 | - | ||
26 | - if (arm_is_secure_below_el3(env)) { | ||
27 | - mask >>= ARM_MMU_IDX_A_NS; | ||
28 | - } | ||
29 | - | ||
30 | - return mask; | ||
31 | - } else if (arm_is_secure_below_el3(env)) { | ||
32 | - return ARMMMUIdxBit_SE10_1 | | ||
33 | - ARMMMUIdxBit_SE10_1_PAN | | ||
34 | - ARMMMUIdxBit_SE10_0; | ||
35 | + mask = ARMMMUIdxBit_E20_2 | | ||
36 | + ARMMMUIdxBit_E20_2_PAN | | ||
37 | + ARMMMUIdxBit_E20_0; | ||
38 | } else { | ||
39 | - return ARMMMUIdxBit_E10_1 | | ||
40 | + mask = ARMMMUIdxBit_E10_1 | | ||
41 | ARMMMUIdxBit_E10_1_PAN | | ||
42 | ARMMMUIdxBit_E10_0; | ||
43 | } | ||
44 | + | ||
45 | + if (arm_is_secure_below_el3(env)) { | ||
46 | + mask >>= ARM_MMU_IDX_A_NS; | ||
47 | + } | ||
48 | + | ||
49 | + return mask; | ||
50 | } | ||
51 | |||
52 | /* Return 56 if TBI is enabled, 64 otherwise. */ | ||
53 | -- | ||
54 | 2.20.1 | ||
55 | |||
56 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Richard Henderson <richard.henderson@linaro.org> | ||
2 | 1 | ||
3 | SVE predicate operations cannot use the "usual" simd_desc | ||
4 | encoding, because the lengths are not a multiple of 8. | ||
5 | But we were abusing the SIMD_* fields to store values anyway. | ||
6 | This abuse broke when SIMD_OPRSZ_BITS was modified in e2e7168a214. | ||
7 | |||
8 | Introduce a new set of field definitions for exclusive use | ||
9 | of predicates, so that it is obvious what kind of predicate | ||
10 | we are manipulating. To be used in future patches. | ||
11 | |||
12 | Cc: qemu-stable@nongnu.org | ||
13 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
14 | Message-id: 20210113062650.593824-2-richard.henderson@linaro.org | ||
15 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
17 | --- | ||
18 | target/arm/internals.h | 9 +++++++++ | ||
19 | 1 file changed, 9 insertions(+) | ||
20 | |||
21 | diff --git a/target/arm/internals.h b/target/arm/internals.h | ||
22 | index XXXXXXX..XXXXXXX 100644 | ||
23 | --- a/target/arm/internals.h | ||
24 | +++ b/target/arm/internals.h | ||
25 | @@ -XXX,XX +XXX,XX @@ void arm_log_exception(int idx); | ||
26 | #define LOG2_TAG_GRANULE 4 | ||
27 | #define TAG_GRANULE (1 << LOG2_TAG_GRANULE) | ||
28 | |||
29 | +/* | ||
30 | + * SVE predicates are 1/8 the size of SVE vectors, and cannot use | ||
31 | + * the same simd_desc() encoding due to restrictions on size. | ||
32 | + * Use these instead. | ||
33 | + */ | ||
34 | +FIELD(PREDDESC, OPRSZ, 0, 6) | ||
35 | +FIELD(PREDDESC, ESZ, 6, 2) | ||
36 | +FIELD(PREDDESC, DATA, 8, 24) | ||
37 | + | ||
38 | /* | ||
39 | * The SVE simd_data field, for memory ops, contains either | ||
40 | * rd (5 bits) or a shift count (2 bits). | ||
41 | -- | ||
42 | 2.20.1 | ||
43 | |||
44 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Richard Henderson <richard.henderson@linaro.org> | ||
2 | 1 | ||
3 | These two were odd, in that do_pfirst_pnext passed the | ||
4 | count of 64-bit words rather than bytes. Change to pass | ||
5 | the standard pred_full_reg_size to avoid confusion. | ||
6 | |||
7 | Cc: qemu-stable@nongnu.org | ||
8 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Message-id: 20210113062650.593824-3-richard.henderson@linaro.org | ||
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | --- | ||
13 | target/arm/sve_helper.c | 7 ++++--- | ||
14 | target/arm/translate-sve.c | 6 +++--- | ||
15 | 2 files changed, 7 insertions(+), 6 deletions(-) | ||
16 | |||
17 | diff --git a/target/arm/sve_helper.c b/target/arm/sve_helper.c | ||
18 | index XXXXXXX..XXXXXXX 100644 | ||
19 | --- a/target/arm/sve_helper.c | ||
20 | +++ b/target/arm/sve_helper.c | ||
21 | @@ -XXX,XX +XXX,XX @@ static intptr_t last_active_element(uint64_t *g, intptr_t words, intptr_t esz) | ||
22 | return (intptr_t)-1 << esz; | ||
23 | } | ||
24 | |||
25 | -uint32_t HELPER(sve_pfirst)(void *vd, void *vg, uint32_t words) | ||
26 | +uint32_t HELPER(sve_pfirst)(void *vd, void *vg, uint32_t pred_desc) | ||
27 | { | ||
28 | + intptr_t words = DIV_ROUND_UP(FIELD_EX32(pred_desc, PREDDESC, OPRSZ), 8); | ||
29 | uint32_t flags = PREDTEST_INIT; | ||
30 | uint64_t *d = vd, *g = vg; | ||
31 | intptr_t i = 0; | ||
32 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(sve_pfirst)(void *vd, void *vg, uint32_t words) | ||
33 | |||
34 | uint32_t HELPER(sve_pnext)(void *vd, void *vg, uint32_t pred_desc) | ||
35 | { | ||
36 | - intptr_t words = extract32(pred_desc, 0, SIMD_OPRSZ_BITS); | ||
37 | - intptr_t esz = extract32(pred_desc, SIMD_DATA_SHIFT, 2); | ||
38 | + intptr_t words = DIV_ROUND_UP(FIELD_EX32(pred_desc, PREDDESC, OPRSZ), 8); | ||
39 | + intptr_t esz = FIELD_EX32(pred_desc, PREDDESC, ESZ); | ||
40 | uint32_t flags = PREDTEST_INIT; | ||
41 | uint64_t *d = vd, *g = vg, esz_mask; | ||
42 | intptr_t i, next; | ||
43 | diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c | ||
44 | index XXXXXXX..XXXXXXX 100644 | ||
45 | --- a/target/arm/translate-sve.c | ||
46 | +++ b/target/arm/translate-sve.c | ||
47 | @@ -XXX,XX +XXX,XX @@ static bool do_pfirst_pnext(DisasContext *s, arg_rr_esz *a, | ||
48 | TCGv_ptr t_pd = tcg_temp_new_ptr(); | ||
49 | TCGv_ptr t_pg = tcg_temp_new_ptr(); | ||
50 | TCGv_i32 t; | ||
51 | - unsigned desc; | ||
52 | + unsigned desc = 0; | ||
53 | |||
54 | - desc = DIV_ROUND_UP(pred_full_reg_size(s), 8); | ||
55 | - desc = deposit32(desc, SIMD_DATA_SHIFT, 2, a->esz); | ||
56 | + desc = FIELD_DP32(desc, PREDDESC, OPRSZ, pred_full_reg_size(s)); | ||
57 | + desc = FIELD_DP32(desc, PREDDESC, ESZ, a->esz); | ||
58 | |||
59 | tcg_gen_addi_ptr(t_pd, cpu_env, pred_full_reg_offset(s, a->rd)); | ||
60 | tcg_gen_addi_ptr(t_pg, cpu_env, pred_full_reg_offset(s, a->rn)); | ||
61 | -- | ||
62 | 2.20.1 | ||
63 | |||
64 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Richard Henderson <richard.henderson@linaro.org> | ||
2 | 1 | ||
3 | Update all users of do_perm_pred3 for the new | ||
4 | predicate descriptor field definitions. | ||
5 | |||
6 | Cc: qemu-stable@nongnu.org | ||
7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20210113062650.593824-4-richard.henderson@linaro.org | ||
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | --- | ||
12 | target/arm/sve_helper.c | 18 +++++++++--------- | ||
13 | target/arm/translate-sve.c | 12 ++++-------- | ||
14 | 2 files changed, 13 insertions(+), 17 deletions(-) | ||
15 | |||
16 | diff --git a/target/arm/sve_helper.c b/target/arm/sve_helper.c | ||
17 | index XXXXXXX..XXXXXXX 100644 | ||
18 | --- a/target/arm/sve_helper.c | ||
19 | +++ b/target/arm/sve_helper.c | ||
20 | @@ -XXX,XX +XXX,XX @@ static uint64_t compress_bits(uint64_t x, int n) | ||
21 | |||
22 | void HELPER(sve_zip_p)(void *vd, void *vn, void *vm, uint32_t pred_desc) | ||
23 | { | ||
24 | - intptr_t oprsz = extract32(pred_desc, 0, SIMD_OPRSZ_BITS) + 2; | ||
25 | - int esz = extract32(pred_desc, SIMD_DATA_SHIFT, 2); | ||
26 | - intptr_t high = extract32(pred_desc, SIMD_DATA_SHIFT + 2, 1); | ||
27 | + intptr_t oprsz = FIELD_EX32(pred_desc, PREDDESC, OPRSZ); | ||
28 | + int esz = FIELD_EX32(pred_desc, PREDDESC, ESZ); | ||
29 | + intptr_t high = FIELD_EX32(pred_desc, PREDDESC, DATA); | ||
30 | uint64_t *d = vd; | ||
31 | intptr_t i; | ||
32 | |||
33 | @@ -XXX,XX +XXX,XX @@ void HELPER(sve_zip_p)(void *vd, void *vn, void *vm, uint32_t pred_desc) | ||
34 | |||
35 | void HELPER(sve_uzp_p)(void *vd, void *vn, void *vm, uint32_t pred_desc) | ||
36 | { | ||
37 | - intptr_t oprsz = extract32(pred_desc, 0, SIMD_OPRSZ_BITS) + 2; | ||
38 | - int esz = extract32(pred_desc, SIMD_DATA_SHIFT, 2); | ||
39 | - int odd = extract32(pred_desc, SIMD_DATA_SHIFT + 2, 1) << esz; | ||
40 | + intptr_t oprsz = FIELD_EX32(pred_desc, PREDDESC, OPRSZ); | ||
41 | + int esz = FIELD_EX32(pred_desc, PREDDESC, ESZ); | ||
42 | + int odd = FIELD_EX32(pred_desc, PREDDESC, DATA) << esz; | ||
43 | uint64_t *d = vd, *n = vn, *m = vm; | ||
44 | uint64_t l, h; | ||
45 | intptr_t i; | ||
46 | @@ -XXX,XX +XXX,XX @@ void HELPER(sve_uzp_p)(void *vd, void *vn, void *vm, uint32_t pred_desc) | ||
47 | |||
48 | void HELPER(sve_trn_p)(void *vd, void *vn, void *vm, uint32_t pred_desc) | ||
49 | { | ||
50 | - intptr_t oprsz = extract32(pred_desc, 0, SIMD_OPRSZ_BITS) + 2; | ||
51 | - uintptr_t esz = extract32(pred_desc, SIMD_DATA_SHIFT, 2); | ||
52 | - bool odd = extract32(pred_desc, SIMD_DATA_SHIFT + 2, 1); | ||
53 | + intptr_t oprsz = FIELD_EX32(pred_desc, PREDDESC, OPRSZ); | ||
54 | + int esz = FIELD_EX32(pred_desc, PREDDESC, ESZ); | ||
55 | + int odd = FIELD_EX32(pred_desc, PREDDESC, DATA); | ||
56 | uint64_t *d = vd, *n = vn, *m = vm; | ||
57 | uint64_t mask; | ||
58 | int shr, shl; | ||
59 | diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c | ||
60 | index XXXXXXX..XXXXXXX 100644 | ||
61 | --- a/target/arm/translate-sve.c | ||
62 | +++ b/target/arm/translate-sve.c | ||
63 | @@ -XXX,XX +XXX,XX @@ static bool do_perm_pred3(DisasContext *s, arg_rrr_esz *a, bool high_odd, | ||
64 | |||
65 | unsigned vsz = pred_full_reg_size(s); | ||
66 | |||
67 | - /* Predicate sizes may be smaller and cannot use simd_desc. | ||
68 | - We cannot round up, as we do elsewhere, because we need | ||
69 | - the exact size for ZIP2 and REV. We retain the style for | ||
70 | - the other helpers for consistency. */ | ||
71 | TCGv_ptr t_d = tcg_temp_new_ptr(); | ||
72 | TCGv_ptr t_n = tcg_temp_new_ptr(); | ||
73 | TCGv_ptr t_m = tcg_temp_new_ptr(); | ||
74 | TCGv_i32 t_desc; | ||
75 | - int desc; | ||
76 | + uint32_t desc = 0; | ||
77 | |||
78 | - desc = vsz - 2; | ||
79 | - desc = deposit32(desc, SIMD_DATA_SHIFT, 2, a->esz); | ||
80 | - desc = deposit32(desc, SIMD_DATA_SHIFT + 2, 2, high_odd); | ||
81 | + desc = FIELD_DP32(desc, PREDDESC, OPRSZ, vsz); | ||
82 | + desc = FIELD_DP32(desc, PREDDESC, ESZ, a->esz); | ||
83 | + desc = FIELD_DP32(desc, PREDDESC, DATA, high_odd); | ||
84 | |||
85 | tcg_gen_addi_ptr(t_d, cpu_env, pred_full_reg_offset(s, a->rd)); | ||
86 | tcg_gen_addi_ptr(t_n, cpu_env, pred_full_reg_offset(s, a->rn)); | ||
87 | -- | ||
88 | 2.20.1 | ||
89 | |||
90 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Richard Henderson <richard.henderson@linaro.org> | ||
2 | 1 | ||
3 | Update all users of do_perm_pred2 for the new | ||
4 | predicate descriptor field definitions. | ||
5 | |||
6 | Cc: qemu-stable@nongnu.org | ||
7 | Buglink: https://bugs.launchpad.net/bugs/1908551 | ||
8 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Message-id: 20210113062650.593824-5-richard.henderson@linaro.org | ||
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | --- | ||
13 | target/arm/sve_helper.c | 8 ++++---- | ||
14 | target/arm/translate-sve.c | 13 ++++--------- | ||
15 | 2 files changed, 8 insertions(+), 13 deletions(-) | ||
16 | |||
17 | diff --git a/target/arm/sve_helper.c b/target/arm/sve_helper.c | ||
18 | index XXXXXXX..XXXXXXX 100644 | ||
19 | --- a/target/arm/sve_helper.c | ||
20 | +++ b/target/arm/sve_helper.c | ||
21 | @@ -XXX,XX +XXX,XX @@ static uint8_t reverse_bits_8(uint8_t x, int n) | ||
22 | |||
23 | void HELPER(sve_rev_p)(void *vd, void *vn, uint32_t pred_desc) | ||
24 | { | ||
25 | - intptr_t oprsz = extract32(pred_desc, 0, SIMD_OPRSZ_BITS) + 2; | ||
26 | - int esz = extract32(pred_desc, SIMD_DATA_SHIFT, 2); | ||
27 | + intptr_t oprsz = FIELD_EX32(pred_desc, PREDDESC, OPRSZ); | ||
28 | + int esz = FIELD_EX32(pred_desc, PREDDESC, ESZ); | ||
29 | intptr_t i, oprsz_2 = oprsz / 2; | ||
30 | |||
31 | if (oprsz <= 8) { | ||
32 | @@ -XXX,XX +XXX,XX @@ void HELPER(sve_rev_p)(void *vd, void *vn, uint32_t pred_desc) | ||
33 | |||
34 | void HELPER(sve_punpk_p)(void *vd, void *vn, uint32_t pred_desc) | ||
35 | { | ||
36 | - intptr_t oprsz = extract32(pred_desc, 0, SIMD_OPRSZ_BITS) + 2; | ||
37 | - intptr_t high = extract32(pred_desc, SIMD_DATA_SHIFT + 2, 1); | ||
38 | + intptr_t oprsz = FIELD_EX32(pred_desc, PREDDESC, OPRSZ); | ||
39 | + intptr_t high = FIELD_EX32(pred_desc, PREDDESC, DATA); | ||
40 | uint64_t *d = vd; | ||
41 | intptr_t i; | ||
42 | |||
43 | diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c | ||
44 | index XXXXXXX..XXXXXXX 100644 | ||
45 | --- a/target/arm/translate-sve.c | ||
46 | +++ b/target/arm/translate-sve.c | ||
47 | @@ -XXX,XX +XXX,XX @@ static bool do_perm_pred2(DisasContext *s, arg_rr_esz *a, bool high_odd, | ||
48 | TCGv_ptr t_d = tcg_temp_new_ptr(); | ||
49 | TCGv_ptr t_n = tcg_temp_new_ptr(); | ||
50 | TCGv_i32 t_desc; | ||
51 | - int desc; | ||
52 | + uint32_t desc = 0; | ||
53 | |||
54 | tcg_gen_addi_ptr(t_d, cpu_env, pred_full_reg_offset(s, a->rd)); | ||
55 | tcg_gen_addi_ptr(t_n, cpu_env, pred_full_reg_offset(s, a->rn)); | ||
56 | |||
57 | - /* Predicate sizes may be smaller and cannot use simd_desc. | ||
58 | - We cannot round up, as we do elsewhere, because we need | ||
59 | - the exact size for ZIP2 and REV. We retain the style for | ||
60 | - the other helpers for consistency. */ | ||
61 | - | ||
62 | - desc = vsz - 2; | ||
63 | - desc = deposit32(desc, SIMD_DATA_SHIFT, 2, a->esz); | ||
64 | - desc = deposit32(desc, SIMD_DATA_SHIFT + 2, 2, high_odd); | ||
65 | + desc = FIELD_DP32(desc, PREDDESC, OPRSZ, vsz); | ||
66 | + desc = FIELD_DP32(desc, PREDDESC, ESZ, a->esz); | ||
67 | + desc = FIELD_DP32(desc, PREDDESC, DATA, high_odd); | ||
68 | t_desc = tcg_const_i32(desc); | ||
69 | |||
70 | fn(t_d, t_n, t_desc); | ||
71 | -- | ||
72 | 2.20.1 | ||
73 | |||
74 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Mihai Carabas <mihai.carabas@oracle.com> | ||
2 | 1 | ||
3 | To ease the PCI device addition in next patches, split the code as follows: | ||
4 | - generic code (read/write/setup) is being kept in pvpanic.c | ||
5 | - ISA dependent code moved to pvpanic-isa.c | ||
6 | |||
7 | Also, rename: | ||
8 | - ISA_PVPANIC_DEVICE -> PVPANIC_ISA_DEVICE. | ||
9 | - TYPE_PVPANIC -> TYPE_PVPANIC_ISA. | ||
10 | - MemoryRegion io -> mr. | ||
11 | - pvpanic_ioport_* in pvpanic_*. | ||
12 | |||
13 | Update the build system with the new files and config structure. | ||
14 | |||
15 | Signed-off-by: Mihai Carabas <mihai.carabas@oracle.com> | ||
16 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
17 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
18 | --- | ||
19 | include/hw/misc/pvpanic.h | 23 +++++++++- | ||
20 | hw/misc/pvpanic-isa.c | 94 +++++++++++++++++++++++++++++++++++++++ | ||
21 | hw/misc/pvpanic.c | 85 +++-------------------------------- | ||
22 | hw/i386/Kconfig | 2 +- | ||
23 | hw/misc/Kconfig | 6 ++- | ||
24 | hw/misc/meson.build | 3 +- | ||
25 | tests/qtest/meson.build | 2 +- | ||
26 | 7 files changed, 130 insertions(+), 85 deletions(-) | ||
27 | create mode 100644 hw/misc/pvpanic-isa.c | ||
28 | |||
29 | diff --git a/include/hw/misc/pvpanic.h b/include/hw/misc/pvpanic.h | ||
30 | index XXXXXXX..XXXXXXX 100644 | ||
31 | --- a/include/hw/misc/pvpanic.h | ||
32 | +++ b/include/hw/misc/pvpanic.h | ||
33 | @@ -XXX,XX +XXX,XX @@ | ||
34 | |||
35 | #include "qom/object.h" | ||
36 | |||
37 | -#define TYPE_PVPANIC "pvpanic" | ||
38 | +#define TYPE_PVPANIC_ISA_DEVICE "pvpanic" | ||
39 | |||
40 | #define PVPANIC_IOPORT_PROP "ioport" | ||
41 | |||
42 | +/* The bit of supported pv event, TODO: include uapi header and remove this */ | ||
43 | +#define PVPANIC_F_PANICKED 0 | ||
44 | +#define PVPANIC_F_CRASHLOADED 1 | ||
45 | + | ||
46 | +/* The pv event value */ | ||
47 | +#define PVPANIC_PANICKED (1 << PVPANIC_F_PANICKED) | ||
48 | +#define PVPANIC_CRASHLOADED (1 << PVPANIC_F_CRASHLOADED) | ||
49 | + | ||
50 | +/* | ||
51 | + * PVPanicState for any device type | ||
52 | + */ | ||
53 | +typedef struct PVPanicState PVPanicState; | ||
54 | +struct PVPanicState { | ||
55 | + MemoryRegion mr; | ||
56 | + uint8_t events; | ||
57 | +}; | ||
58 | + | ||
59 | +void pvpanic_setup_io(PVPanicState *s, DeviceState *dev, unsigned size); | ||
60 | + | ||
61 | static inline uint16_t pvpanic_port(void) | ||
62 | { | ||
63 | - Object *o = object_resolve_path_type("", TYPE_PVPANIC, NULL); | ||
64 | + Object *o = object_resolve_path_type("", TYPE_PVPANIC_ISA_DEVICE, NULL); | ||
65 | if (!o) { | ||
66 | return 0; | ||
67 | } | ||
68 | diff --git a/hw/misc/pvpanic-isa.c b/hw/misc/pvpanic-isa.c | ||
69 | new file mode 100644 | ||
70 | index XXXXXXX..XXXXXXX | ||
71 | --- /dev/null | ||
72 | +++ b/hw/misc/pvpanic-isa.c | ||
73 | @@ -XXX,XX +XXX,XX @@ | ||
74 | +/* | ||
75 | + * QEMU simulated pvpanic device. | ||
76 | + * | ||
77 | + * Copyright Fujitsu, Corp. 2013 | ||
78 | + * | ||
79 | + * Authors: | ||
80 | + * Wen Congyang <wency@cn.fujitsu.com> | ||
81 | + * Hu Tao <hutao@cn.fujitsu.com> | ||
82 | + * | ||
83 | + * This work is licensed under the terms of the GNU GPL, version 2 or later. | ||
84 | + * See the COPYING file in the top-level directory. | ||
85 | + * | ||
86 | + */ | ||
87 | + | ||
88 | +#include "qemu/osdep.h" | ||
89 | +#include "qemu/log.h" | ||
90 | +#include "qemu/module.h" | ||
91 | +#include "sysemu/runstate.h" | ||
92 | + | ||
93 | +#include "hw/nvram/fw_cfg.h" | ||
94 | +#include "hw/qdev-properties.h" | ||
95 | +#include "hw/misc/pvpanic.h" | ||
96 | +#include "qom/object.h" | ||
97 | +#include "hw/isa/isa.h" | ||
98 | + | ||
99 | +OBJECT_DECLARE_SIMPLE_TYPE(PVPanicISAState, PVPANIC_ISA_DEVICE) | ||
100 | + | ||
101 | +/* | ||
102 | + * PVPanicISAState for ISA device and | ||
103 | + * use ioport. | ||
104 | + */ | ||
105 | +struct PVPanicISAState { | ||
106 | + ISADevice parent_obj; | ||
107 | + | ||
108 | + uint16_t ioport; | ||
109 | + PVPanicState pvpanic; | ||
110 | +}; | ||
111 | + | ||
112 | +static void pvpanic_isa_initfn(Object *obj) | ||
113 | +{ | ||
114 | + PVPanicISAState *s = PVPANIC_ISA_DEVICE(obj); | ||
115 | + | ||
116 | + pvpanic_setup_io(&s->pvpanic, DEVICE(s), 1); | ||
117 | +} | ||
118 | + | ||
119 | +static void pvpanic_isa_realizefn(DeviceState *dev, Error **errp) | ||
120 | +{ | ||
121 | + ISADevice *d = ISA_DEVICE(dev); | ||
122 | + PVPanicISAState *s = PVPANIC_ISA_DEVICE(dev); | ||
123 | + PVPanicState *ps = &s->pvpanic; | ||
124 | + FWCfgState *fw_cfg = fw_cfg_find(); | ||
125 | + uint16_t *pvpanic_port; | ||
126 | + | ||
127 | + if (!fw_cfg) { | ||
128 | + return; | ||
129 | + } | ||
130 | + | ||
131 | + pvpanic_port = g_malloc(sizeof(*pvpanic_port)); | ||
132 | + *pvpanic_port = cpu_to_le16(s->ioport); | ||
133 | + fw_cfg_add_file(fw_cfg, "etc/pvpanic-port", pvpanic_port, | ||
134 | + sizeof(*pvpanic_port)); | ||
135 | + | ||
136 | + isa_register_ioport(d, &ps->mr, s->ioport); | ||
137 | +} | ||
138 | + | ||
139 | +static Property pvpanic_isa_properties[] = { | ||
140 | + DEFINE_PROP_UINT16(PVPANIC_IOPORT_PROP, PVPanicISAState, ioport, 0x505), | ||
141 | + DEFINE_PROP_UINT8("events", PVPanicISAState, pvpanic.events, PVPANIC_PANICKED | PVPANIC_CRASHLOADED), | ||
142 | + DEFINE_PROP_END_OF_LIST(), | ||
143 | +}; | ||
144 | + | ||
145 | +static void pvpanic_isa_class_init(ObjectClass *klass, void *data) | ||
146 | +{ | ||
147 | + DeviceClass *dc = DEVICE_CLASS(klass); | ||
148 | + | ||
149 | + dc->realize = pvpanic_isa_realizefn; | ||
150 | + device_class_set_props(dc, pvpanic_isa_properties); | ||
151 | + set_bit(DEVICE_CATEGORY_MISC, dc->categories); | ||
152 | +} | ||
153 | + | ||
154 | +static TypeInfo pvpanic_isa_info = { | ||
155 | + .name = TYPE_PVPANIC_ISA_DEVICE, | ||
156 | + .parent = TYPE_ISA_DEVICE, | ||
157 | + .instance_size = sizeof(PVPanicISAState), | ||
158 | + .instance_init = pvpanic_isa_initfn, | ||
159 | + .class_init = pvpanic_isa_class_init, | ||
160 | +}; | ||
161 | + | ||
162 | +static void pvpanic_register_types(void) | ||
163 | +{ | ||
164 | + type_register_static(&pvpanic_isa_info); | ||
165 | +} | ||
166 | + | ||
167 | +type_init(pvpanic_register_types) | ||
168 | diff --git a/hw/misc/pvpanic.c b/hw/misc/pvpanic.c | ||
169 | index XXXXXXX..XXXXXXX 100644 | ||
170 | --- a/hw/misc/pvpanic.c | ||
171 | +++ b/hw/misc/pvpanic.c | ||
172 | @@ -XXX,XX +XXX,XX @@ | ||
173 | #include "hw/misc/pvpanic.h" | ||
174 | #include "qom/object.h" | ||
175 | |||
176 | -/* The bit of supported pv event, TODO: include uapi header and remove this */ | ||
177 | -#define PVPANIC_F_PANICKED 0 | ||
178 | -#define PVPANIC_F_CRASHLOADED 1 | ||
179 | - | ||
180 | -/* The pv event value */ | ||
181 | -#define PVPANIC_PANICKED (1 << PVPANIC_F_PANICKED) | ||
182 | -#define PVPANIC_CRASHLOADED (1 << PVPANIC_F_CRASHLOADED) | ||
183 | - | ||
184 | -typedef struct PVPanicState PVPanicState; | ||
185 | -DECLARE_INSTANCE_CHECKER(PVPanicState, ISA_PVPANIC_DEVICE, | ||
186 | - TYPE_PVPANIC) | ||
187 | - | ||
188 | static void handle_event(int event) | ||
189 | { | ||
190 | static bool logged; | ||
191 | @@ -XXX,XX +XXX,XX @@ static void handle_event(int event) | ||
192 | } | ||
193 | } | ||
194 | |||
195 | -#include "hw/isa/isa.h" | ||
196 | - | ||
197 | -struct PVPanicState { | ||
198 | - ISADevice parent_obj; | ||
199 | - | ||
200 | - MemoryRegion io; | ||
201 | - uint16_t ioport; | ||
202 | - uint8_t events; | ||
203 | -}; | ||
204 | - | ||
205 | /* return supported events on read */ | ||
206 | -static uint64_t pvpanic_ioport_read(void *opaque, hwaddr addr, unsigned size) | ||
207 | +static uint64_t pvpanic_read(void *opaque, hwaddr addr, unsigned size) | ||
208 | { | ||
209 | PVPanicState *pvp = opaque; | ||
210 | return pvp->events; | ||
211 | } | ||
212 | |||
213 | -static void pvpanic_ioport_write(void *opaque, hwaddr addr, uint64_t val, | ||
214 | +static void pvpanic_write(void *opaque, hwaddr addr, uint64_t val, | ||
215 | unsigned size) | ||
216 | { | ||
217 | handle_event(val); | ||
218 | } | ||
219 | |||
220 | static const MemoryRegionOps pvpanic_ops = { | ||
221 | - .read = pvpanic_ioport_read, | ||
222 | - .write = pvpanic_ioport_write, | ||
223 | + .read = pvpanic_read, | ||
224 | + .write = pvpanic_write, | ||
225 | .impl = { | ||
226 | .min_access_size = 1, | ||
227 | .max_access_size = 1, | ||
228 | }, | ||
229 | }; | ||
230 | |||
231 | -static void pvpanic_isa_initfn(Object *obj) | ||
232 | +void pvpanic_setup_io(PVPanicState *s, DeviceState *dev, unsigned size) | ||
233 | { | ||
234 | - PVPanicState *s = ISA_PVPANIC_DEVICE(obj); | ||
235 | - | ||
236 | - memory_region_init_io(&s->io, OBJECT(s), &pvpanic_ops, s, "pvpanic", 1); | ||
237 | + memory_region_init_io(&s->mr, OBJECT(dev), &pvpanic_ops, s, "pvpanic", size); | ||
238 | } | ||
239 | - | ||
240 | -static void pvpanic_isa_realizefn(DeviceState *dev, Error **errp) | ||
241 | -{ | ||
242 | - ISADevice *d = ISA_DEVICE(dev); | ||
243 | - PVPanicState *s = ISA_PVPANIC_DEVICE(dev); | ||
244 | - FWCfgState *fw_cfg = fw_cfg_find(); | ||
245 | - uint16_t *pvpanic_port; | ||
246 | - | ||
247 | - if (!fw_cfg) { | ||
248 | - return; | ||
249 | - } | ||
250 | - | ||
251 | - pvpanic_port = g_malloc(sizeof(*pvpanic_port)); | ||
252 | - *pvpanic_port = cpu_to_le16(s->ioport); | ||
253 | - fw_cfg_add_file(fw_cfg, "etc/pvpanic-port", pvpanic_port, | ||
254 | - sizeof(*pvpanic_port)); | ||
255 | - | ||
256 | - isa_register_ioport(d, &s->io, s->ioport); | ||
257 | -} | ||
258 | - | ||
259 | -static Property pvpanic_isa_properties[] = { | ||
260 | - DEFINE_PROP_UINT16(PVPANIC_IOPORT_PROP, PVPanicState, ioport, 0x505), | ||
261 | - DEFINE_PROP_UINT8("events", PVPanicState, events, PVPANIC_PANICKED | PVPANIC_CRASHLOADED), | ||
262 | - DEFINE_PROP_END_OF_LIST(), | ||
263 | -}; | ||
264 | - | ||
265 | -static void pvpanic_isa_class_init(ObjectClass *klass, void *data) | ||
266 | -{ | ||
267 | - DeviceClass *dc = DEVICE_CLASS(klass); | ||
268 | - | ||
269 | - dc->realize = pvpanic_isa_realizefn; | ||
270 | - device_class_set_props(dc, pvpanic_isa_properties); | ||
271 | - set_bit(DEVICE_CATEGORY_MISC, dc->categories); | ||
272 | -} | ||
273 | - | ||
274 | -static TypeInfo pvpanic_isa_info = { | ||
275 | - .name = TYPE_PVPANIC, | ||
276 | - .parent = TYPE_ISA_DEVICE, | ||
277 | - .instance_size = sizeof(PVPanicState), | ||
278 | - .instance_init = pvpanic_isa_initfn, | ||
279 | - .class_init = pvpanic_isa_class_init, | ||
280 | -}; | ||
281 | - | ||
282 | -static void pvpanic_register_types(void) | ||
283 | -{ | ||
284 | - type_register_static(&pvpanic_isa_info); | ||
285 | -} | ||
286 | - | ||
287 | -type_init(pvpanic_register_types) | ||
288 | diff --git a/hw/i386/Kconfig b/hw/i386/Kconfig | ||
289 | index XXXXXXX..XXXXXXX 100644 | ||
290 | --- a/hw/i386/Kconfig | ||
291 | +++ b/hw/i386/Kconfig | ||
292 | @@ -XXX,XX +XXX,XX @@ config PC | ||
293 | imply ISA_DEBUG | ||
294 | imply PARALLEL | ||
295 | imply PCI_DEVICES | ||
296 | - imply PVPANIC | ||
297 | + imply PVPANIC_ISA | ||
298 | imply QXL | ||
299 | imply SEV | ||
300 | imply SGA | ||
301 | diff --git a/hw/misc/Kconfig b/hw/misc/Kconfig | ||
302 | index XXXXXXX..XXXXXXX 100644 | ||
303 | --- a/hw/misc/Kconfig | ||
304 | +++ b/hw/misc/Kconfig | ||
305 | @@ -XXX,XX +XXX,XX @@ config IOTKIT_SYSCTL | ||
306 | config IOTKIT_SYSINFO | ||
307 | bool | ||
308 | |||
309 | -config PVPANIC | ||
310 | +config PVPANIC_COMMON | ||
311 | + bool | ||
312 | + | ||
313 | +config PVPANIC_ISA | ||
314 | bool | ||
315 | depends on ISA_BUS | ||
316 | + select PVPANIC_COMMON | ||
317 | |||
318 | config AUX | ||
319 | bool | ||
320 | diff --git a/hw/misc/meson.build b/hw/misc/meson.build | ||
321 | index XXXXXXX..XXXXXXX 100644 | ||
322 | --- a/hw/misc/meson.build | ||
323 | +++ b/hw/misc/meson.build | ||
324 | @@ -XXX,XX +XXX,XX @@ softmmu_ss.add(when: 'CONFIG_EMC141X', if_true: files('emc141x.c')) | ||
325 | softmmu_ss.add(when: 'CONFIG_UNIMP', if_true: files('unimp.c')) | ||
326 | softmmu_ss.add(when: 'CONFIG_EMPTY_SLOT', if_true: files('empty_slot.c')) | ||
327 | softmmu_ss.add(when: 'CONFIG_LED', if_true: files('led.c')) | ||
328 | +softmmu_ss.add(when: 'CONFIG_PVPANIC_COMMON', if_true: files('pvpanic.c')) | ||
329 | |||
330 | # ARM devices | ||
331 | softmmu_ss.add(when: 'CONFIG_PL310', if_true: files('arm_l2x0.c')) | ||
332 | @@ -XXX,XX +XXX,XX @@ softmmu_ss.add(when: 'CONFIG_IOTKIT_SYSINFO', if_true: files('iotkit-sysinfo.c') | ||
333 | softmmu_ss.add(when: 'CONFIG_ARMSSE_CPUID', if_true: files('armsse-cpuid.c')) | ||
334 | softmmu_ss.add(when: 'CONFIG_ARMSSE_MHU', if_true: files('armsse-mhu.c')) | ||
335 | |||
336 | -softmmu_ss.add(when: 'CONFIG_PVPANIC', if_true: files('pvpanic.c')) | ||
337 | +softmmu_ss.add(when: 'CONFIG_PVPANIC_ISA', if_true: files('pvpanic-isa.c')) | ||
338 | softmmu_ss.add(when: 'CONFIG_AUX', if_true: files('auxbus.c')) | ||
339 | softmmu_ss.add(when: 'CONFIG_ASPEED_SOC', if_true: files('aspeed_scu.c', 'aspeed_sdmc.c', 'aspeed_xdma.c')) | ||
340 | softmmu_ss.add(when: 'CONFIG_MSF2', if_true: files('msf2-sysreg.c')) | ||
341 | diff --git a/tests/qtest/meson.build b/tests/qtest/meson.build | ||
342 | index XXXXXXX..XXXXXXX 100644 | ||
343 | --- a/tests/qtest/meson.build | ||
344 | +++ b/tests/qtest/meson.build | ||
345 | @@ -XXX,XX +XXX,XX @@ qtests_i386 = \ | ||
346 | (config_host.has_key('CONFIG_LINUX') and \ | ||
347 | config_all_devices.has_key('CONFIG_ISA_IPMI_BT') ? ['ipmi-bt-test'] : []) + \ | ||
348 | (config_all_devices.has_key('CONFIG_WDT_IB700') ? ['wdt_ib700-test'] : []) + \ | ||
349 | - (config_all_devices.has_key('CONFIG_PVPANIC') ? ['pvpanic-test'] : []) + \ | ||
350 | + (config_all_devices.has_key('CONFIG_PVPANIC_ISA') ? ['pvpanic-test'] : []) + \ | ||
351 | (config_all_devices.has_key('CONFIG_HDA') ? ['intel-hda-test'] : []) + \ | ||
352 | (config_all_devices.has_key('CONFIG_I82801B11') ? ['i82801b11-test'] : []) + \ | ||
353 | (config_all_devices.has_key('CONFIG_IOH3420') ? ['ioh3420-test'] : []) + \ | ||
354 | -- | ||
355 | 2.20.1 | ||
356 | |||
357 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Mihai Carabas <mihai.carabas@oracle.com> | ||
2 | 1 | ||
3 | Add PCI interface support for PVPANIC device. Create a new file pvpanic-pci.c | ||
4 | where the PCI specific routines reside and update the build system with the new | ||
5 | files and config structure. | ||
6 | |||
7 | Signed-off-by: Mihai Carabas <mihai.carabas@oracle.com> | ||
8 | Reviewed-by: Gerd Hoffmann <kraxel@redhat.com> | ||
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | [PMM: wrapped one long line] | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | --- | ||
13 | docs/specs/pci-ids.txt | 1 + | ||
14 | include/hw/misc/pvpanic.h | 1 + | ||
15 | include/hw/pci/pci.h | 1 + | ||
16 | hw/misc/pvpanic-pci.c | 95 +++++++++++++++++++++++++++++++++++++++ | ||
17 | hw/misc/Kconfig | 6 +++ | ||
18 | hw/misc/meson.build | 1 + | ||
19 | 6 files changed, 105 insertions(+) | ||
20 | create mode 100644 hw/misc/pvpanic-pci.c | ||
21 | |||
22 | diff --git a/docs/specs/pci-ids.txt b/docs/specs/pci-ids.txt | ||
23 | index XXXXXXX..XXXXXXX 100644 | ||
24 | --- a/docs/specs/pci-ids.txt | ||
25 | +++ b/docs/specs/pci-ids.txt | ||
26 | @@ -XXX,XX +XXX,XX @@ PCI devices (other than virtio): | ||
27 | 1b36:000d PCI xhci usb host adapter | ||
28 | 1b36:000f mdpy (mdev sample device), linux/samples/vfio-mdev/mdpy.c | ||
29 | 1b36:0010 PCIe NVMe device (-device nvme) | ||
30 | +1b36:0011 PCI PVPanic device (-device pvpanic-pci) | ||
31 | |||
32 | All these devices are documented in docs/specs. | ||
33 | |||
34 | diff --git a/include/hw/misc/pvpanic.h b/include/hw/misc/pvpanic.h | ||
35 | index XXXXXXX..XXXXXXX 100644 | ||
36 | --- a/include/hw/misc/pvpanic.h | ||
37 | +++ b/include/hw/misc/pvpanic.h | ||
38 | @@ -XXX,XX +XXX,XX @@ | ||
39 | #include "qom/object.h" | ||
40 | |||
41 | #define TYPE_PVPANIC_ISA_DEVICE "pvpanic" | ||
42 | +#define TYPE_PVPANIC_PCI_DEVICE "pvpanic-pci" | ||
43 | |||
44 | #define PVPANIC_IOPORT_PROP "ioport" | ||
45 | |||
46 | diff --git a/include/hw/pci/pci.h b/include/hw/pci/pci.h | ||
47 | index XXXXXXX..XXXXXXX 100644 | ||
48 | --- a/include/hw/pci/pci.h | ||
49 | +++ b/include/hw/pci/pci.h | ||
50 | @@ -XXX,XX +XXX,XX @@ extern bool pci_available; | ||
51 | #define PCI_DEVICE_ID_REDHAT_PCIE_BRIDGE 0x000e | ||
52 | #define PCI_DEVICE_ID_REDHAT_MDPY 0x000f | ||
53 | #define PCI_DEVICE_ID_REDHAT_NVME 0x0010 | ||
54 | +#define PCI_DEVICE_ID_REDHAT_PVPANIC 0x0011 | ||
55 | #define PCI_DEVICE_ID_REDHAT_QXL 0x0100 | ||
56 | |||
57 | #define FMT_PCIBUS PRIx64 | ||
58 | diff --git a/hw/misc/pvpanic-pci.c b/hw/misc/pvpanic-pci.c | ||
59 | new file mode 100644 | ||
60 | index XXXXXXX..XXXXXXX | ||
61 | --- /dev/null | ||
62 | +++ b/hw/misc/pvpanic-pci.c | ||
63 | @@ -XXX,XX +XXX,XX @@ | ||
64 | +/* | ||
65 | + * QEMU simulated PCI pvpanic device. | ||
66 | + * | ||
67 | + * Copyright (C) 2020 Oracle | ||
68 | + * | ||
69 | + * Authors: | ||
70 | + * Mihai Carabas <mihai.carabas@oracle.com> | ||
71 | + * | ||
72 | + * This work is licensed under the terms of the GNU GPL, version 2 or later. | ||
73 | + * See the COPYING file in the top-level directory. | ||
74 | + * | ||
75 | + */ | ||
76 | + | ||
77 | +#include "qemu/osdep.h" | ||
78 | +#include "qemu/log.h" | ||
79 | +#include "qemu/module.h" | ||
80 | +#include "sysemu/runstate.h" | ||
81 | + | ||
82 | +#include "hw/nvram/fw_cfg.h" | ||
83 | +#include "hw/qdev-properties.h" | ||
84 | +#include "migration/vmstate.h" | ||
85 | +#include "hw/misc/pvpanic.h" | ||
86 | +#include "qom/object.h" | ||
87 | +#include "hw/pci/pci.h" | ||
88 | + | ||
89 | +OBJECT_DECLARE_SIMPLE_TYPE(PVPanicPCIState, PVPANIC_PCI_DEVICE) | ||
90 | + | ||
91 | +/* | ||
92 | + * PVPanicPCIState for PCI device | ||
93 | + */ | ||
94 | +typedef struct PVPanicPCIState { | ||
95 | + PCIDevice dev; | ||
96 | + PVPanicState pvpanic; | ||
97 | +} PVPanicPCIState; | ||
98 | + | ||
99 | +static const VMStateDescription vmstate_pvpanic_pci = { | ||
100 | + .name = "pvpanic-pci", | ||
101 | + .version_id = 1, | ||
102 | + .minimum_version_id = 1, | ||
103 | + .fields = (VMStateField[]) { | ||
104 | + VMSTATE_PCI_DEVICE(dev, PVPanicPCIState), | ||
105 | + VMSTATE_END_OF_LIST() | ||
106 | + } | ||
107 | +}; | ||
108 | + | ||
109 | +static void pvpanic_pci_realizefn(PCIDevice *dev, Error **errp) | ||
110 | +{ | ||
111 | + PVPanicPCIState *s = PVPANIC_PCI_DEVICE(dev); | ||
112 | + PVPanicState *ps = &s->pvpanic; | ||
113 | + | ||
114 | + pvpanic_setup_io(&s->pvpanic, DEVICE(s), 2); | ||
115 | + | ||
116 | + pci_register_bar(dev, 0, PCI_BASE_ADDRESS_SPACE_MEMORY, &ps->mr); | ||
117 | +} | ||
118 | + | ||
119 | +static Property pvpanic_pci_properties[] = { | ||
120 | + DEFINE_PROP_UINT8("events", PVPanicPCIState, pvpanic.events, | ||
121 | + PVPANIC_PANICKED | PVPANIC_CRASHLOADED), | ||
122 | + DEFINE_PROP_END_OF_LIST(), | ||
123 | +}; | ||
124 | + | ||
125 | +static void pvpanic_pci_class_init(ObjectClass *klass, void *data) | ||
126 | +{ | ||
127 | + DeviceClass *dc = DEVICE_CLASS(klass); | ||
128 | + PCIDeviceClass *pc = PCI_DEVICE_CLASS(klass); | ||
129 | + | ||
130 | + device_class_set_props(dc, pvpanic_pci_properties); | ||
131 | + | ||
132 | + pc->realize = pvpanic_pci_realizefn; | ||
133 | + pc->vendor_id = PCI_VENDOR_ID_REDHAT; | ||
134 | + pc->device_id = PCI_DEVICE_ID_REDHAT_PVPANIC; | ||
135 | + pc->revision = 1; | ||
136 | + pc->class_id = PCI_CLASS_SYSTEM_OTHER; | ||
137 | + dc->vmsd = &vmstate_pvpanic_pci; | ||
138 | + | ||
139 | + set_bit(DEVICE_CATEGORY_MISC, dc->categories); | ||
140 | +} | ||
141 | + | ||
142 | +static TypeInfo pvpanic_pci_info = { | ||
143 | + .name = TYPE_PVPANIC_PCI_DEVICE, | ||
144 | + .parent = TYPE_PCI_DEVICE, | ||
145 | + .instance_size = sizeof(PVPanicPCIState), | ||
146 | + .class_init = pvpanic_pci_class_init, | ||
147 | + .interfaces = (InterfaceInfo[]) { | ||
148 | + { INTERFACE_CONVENTIONAL_PCI_DEVICE }, | ||
149 | + { } | ||
150 | + } | ||
151 | +}; | ||
152 | + | ||
153 | +static void pvpanic_register_types(void) | ||
154 | +{ | ||
155 | + type_register_static(&pvpanic_pci_info); | ||
156 | +} | ||
157 | + | ||
158 | +type_init(pvpanic_register_types); | ||
159 | diff --git a/hw/misc/Kconfig b/hw/misc/Kconfig | ||
160 | index XXXXXXX..XXXXXXX 100644 | ||
161 | --- a/hw/misc/Kconfig | ||
162 | +++ b/hw/misc/Kconfig | ||
163 | @@ -XXX,XX +XXX,XX @@ config IOTKIT_SYSINFO | ||
164 | config PVPANIC_COMMON | ||
165 | bool | ||
166 | |||
167 | +config PVPANIC_PCI | ||
168 | + bool | ||
169 | + default y if PCI_DEVICES | ||
170 | + depends on PCI | ||
171 | + select PVPANIC_COMMON | ||
172 | + | ||
173 | config PVPANIC_ISA | ||
174 | bool | ||
175 | depends on ISA_BUS | ||
176 | diff --git a/hw/misc/meson.build b/hw/misc/meson.build | ||
177 | index XXXXXXX..XXXXXXX 100644 | ||
178 | --- a/hw/misc/meson.build | ||
179 | +++ b/hw/misc/meson.build | ||
180 | @@ -XXX,XX +XXX,XX @@ softmmu_ss.add(when: 'CONFIG_ARMSSE_CPUID', if_true: files('armsse-cpuid.c')) | ||
181 | softmmu_ss.add(when: 'CONFIG_ARMSSE_MHU', if_true: files('armsse-mhu.c')) | ||
182 | |||
183 | softmmu_ss.add(when: 'CONFIG_PVPANIC_ISA', if_true: files('pvpanic-isa.c')) | ||
184 | +softmmu_ss.add(when: 'CONFIG_PVPANIC_PCI', if_true: files('pvpanic-pci.c')) | ||
185 | softmmu_ss.add(when: 'CONFIG_AUX', if_true: files('auxbus.c')) | ||
186 | softmmu_ss.add(when: 'CONFIG_ASPEED_SOC', if_true: files('aspeed_scu.c', 'aspeed_sdmc.c', 'aspeed_xdma.c')) | ||
187 | softmmu_ss.add(when: 'CONFIG_MSF2', if_true: files('msf2-sysreg.c')) | ||
188 | -- | ||
189 | 2.20.1 | ||
190 | |||
191 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Mihai Carabas <mihai.carabas@oracle.com> | ||
2 | 1 | ||
3 | Add pvpanic PCI device support details in docs/specs/pvpanic.txt. | ||
4 | |||
5 | Signed-off-by: Mihai Carabas <mihai.carabas@oracle.com> | ||
6 | [fixed s/device/bus/ error] | ||
7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | --- | ||
10 | docs/specs/pvpanic.txt | 13 ++++++++++++- | ||
11 | 1 file changed, 12 insertions(+), 1 deletion(-) | ||
12 | |||
13 | diff --git a/docs/specs/pvpanic.txt b/docs/specs/pvpanic.txt | ||
14 | index XXXXXXX..XXXXXXX 100644 | ||
15 | --- a/docs/specs/pvpanic.txt | ||
16 | +++ b/docs/specs/pvpanic.txt | ||
17 | @@ -XXX,XX +XXX,XX @@ | ||
18 | PVPANIC DEVICE | ||
19 | ============== | ||
20 | |||
21 | -pvpanic device is a simulated ISA device, through which a guest panic | ||
22 | +pvpanic device is a simulated device, through which a guest panic | ||
23 | event is sent to qemu, and a QMP event is generated. This allows | ||
24 | management apps (e.g. libvirt) to be notified and respond to the event. | ||
25 | |||
26 | @@ -XXX,XX +XXX,XX @@ The management app has the option of waiting for GUEST_PANICKED events, | ||
27 | and/or polling for guest-panicked RunState, to learn when the pvpanic | ||
28 | device has fired a panic event. | ||
29 | |||
30 | +The pvpanic device can be implemented as an ISA device (using IOPORT) or as a | ||
31 | +PCI device. | ||
32 | + | ||
33 | ISA Interface | ||
34 | ------------- | ||
35 | |||
36 | @@ -XXX,XX +XXX,XX @@ bit 1: a guest panic has happened and will be handled by the guest; | ||
37 | the host should record it or report it, but should not affect | ||
38 | the execution of the guest. | ||
39 | |||
40 | +PCI Interface | ||
41 | +------------- | ||
42 | + | ||
43 | +The PCI interface is similar to the ISA interface except that it uses an MMIO | ||
44 | +address space provided by its BAR0, 1 byte long. Any machine with a PCI bus | ||
45 | +can enable a pvpanic device by adding '-device pvpanic-pci' to the command | ||
46 | +line. | ||
47 | + | ||
48 | ACPI Interface | ||
49 | -------------- | ||
50 | |||
51 | -- | ||
52 | 2.20.1 | ||
53 | |||
54 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Mihai Carabas <mihai.carabas@oracle.com> | ||
2 | 1 | ||
3 | Add a test case for pvpanic-pci device. The scenario is the same as pvpapnic | ||
4 | ISA device, but is using the PCI bus. | ||
5 | |||
6 | Signed-off-by: Mihai Carabas <mihai.carabas@oracle.com> | ||
7 | Acked-by: Thomas Huth <thuth@redhat.com> | ||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | --- | ||
11 | tests/qtest/pvpanic-pci-test.c | 62 ++++++++++++++++++++++++++++++++++ | ||
12 | tests/qtest/meson.build | 1 + | ||
13 | 2 files changed, 63 insertions(+) | ||
14 | create mode 100644 tests/qtest/pvpanic-pci-test.c | ||
15 | |||
16 | diff --git a/tests/qtest/pvpanic-pci-test.c b/tests/qtest/pvpanic-pci-test.c | ||
17 | new file mode 100644 | ||
18 | index XXXXXXX..XXXXXXX | ||
19 | --- /dev/null | ||
20 | +++ b/tests/qtest/pvpanic-pci-test.c | ||
21 | @@ -XXX,XX +XXX,XX @@ | ||
22 | +/* | ||
23 | + * QTest testcase for PV Panic PCI device | ||
24 | + * | ||
25 | + * Copyright (C) 2020 Oracle | ||
26 | + * | ||
27 | + * Authors: | ||
28 | + * Mihai Carabas <mihai.carabas@oracle.com> | ||
29 | + * | ||
30 | + * This work is licensed under the terms of the GNU GPL, version 2 or later. | ||
31 | + * See the COPYING file in the top-level directory. | ||
32 | + * | ||
33 | + */ | ||
34 | + | ||
35 | +#include "qemu/osdep.h" | ||
36 | +#include "libqos/libqtest.h" | ||
37 | +#include "qapi/qmp/qdict.h" | ||
38 | +#include "libqos/pci.h" | ||
39 | +#include "libqos/pci-pc.h" | ||
40 | +#include "hw/pci/pci_regs.h" | ||
41 | + | ||
42 | +static void test_panic(void) | ||
43 | +{ | ||
44 | + uint8_t val; | ||
45 | + QDict *response, *data; | ||
46 | + QTestState *qts; | ||
47 | + QPCIBus *pcibus; | ||
48 | + QPCIDevice *dev; | ||
49 | + QPCIBar bar; | ||
50 | + | ||
51 | + qts = qtest_init("-device pvpanic-pci"); | ||
52 | + pcibus = qpci_new_pc(qts, NULL); | ||
53 | + dev = qpci_device_find(pcibus, QPCI_DEVFN(0x4, 0x0)); | ||
54 | + qpci_device_enable(dev); | ||
55 | + bar = qpci_iomap(dev, 0, NULL); | ||
56 | + | ||
57 | + qpci_memread(dev, bar, 0, &val, sizeof(val)); | ||
58 | + g_assert_cmpuint(val, ==, 3); | ||
59 | + | ||
60 | + val = 1; | ||
61 | + qpci_memwrite(dev, bar, 0, &val, sizeof(val)); | ||
62 | + | ||
63 | + response = qtest_qmp_eventwait_ref(qts, "GUEST_PANICKED"); | ||
64 | + g_assert(qdict_haskey(response, "data")); | ||
65 | + data = qdict_get_qdict(response, "data"); | ||
66 | + g_assert(qdict_haskey(data, "action")); | ||
67 | + g_assert_cmpstr(qdict_get_str(data, "action"), ==, "pause"); | ||
68 | + qobject_unref(response); | ||
69 | + | ||
70 | + qtest_quit(qts); | ||
71 | +} | ||
72 | + | ||
73 | +int main(int argc, char **argv) | ||
74 | +{ | ||
75 | + int ret; | ||
76 | + | ||
77 | + g_test_init(&argc, &argv, NULL); | ||
78 | + qtest_add_func("/pvpanic-pci/panic", test_panic); | ||
79 | + | ||
80 | + ret = g_test_run(); | ||
81 | + | ||
82 | + return ret; | ||
83 | +} | ||
84 | diff --git a/tests/qtest/meson.build b/tests/qtest/meson.build | ||
85 | index XXXXXXX..XXXXXXX 100644 | ||
86 | --- a/tests/qtest/meson.build | ||
87 | +++ b/tests/qtest/meson.build | ||
88 | @@ -XXX,XX +XXX,XX @@ endif | ||
89 | |||
90 | qtests_pci = \ | ||
91 | (config_all_devices.has_key('CONFIG_VGA') ? ['display-vga-test'] : []) + \ | ||
92 | + (config_all_devices.has_key('CONFIG_PVPANIC_PCI') ? ['pvpanic-pci-test'] : []) + \ | ||
93 | (config_all_devices.has_key('CONFIG_IVSHMEM_DEVICE') ? ['ivshmem-test'] : []) | ||
94 | |||
95 | qtests_i386 = \ | ||
96 | -- | ||
97 | 2.20.1 | ||
98 | |||
99 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Gan Qixin <ganqixin@huawei.com> | ||
2 | 1 | ||
3 | The adc_qom_set function didn't free "response", which caused an indirect | ||
4 | memory leak. So use qobject_unref() to fix it. | ||
5 | |||
6 | ASAN shows memory leak stack: | ||
7 | |||
8 | Indirect leak of 593280 byte(s) in 144 object(s) allocated from: | ||
9 | #0 0x7f9a5e7e8d4e in __interceptor_calloc (/lib64/libasan.so.5+0x112d4e) | ||
10 | #1 0x7f9a5e607a50 in g_malloc0 (/lib64/libglib-2.0.so.0+0x55a50) | ||
11 | #2 0x55b1bebf636b in qdict_new ../qobject/qdict.c:30 | ||
12 | #3 0x55b1bec09699 in parse_object ../qobject/json-parser.c:318 | ||
13 | #4 0x55b1bec0b2df in parse_value ../qobject/json-parser.c:546 | ||
14 | #5 0x55b1bec0b6a9 in json_parser_parse ../qobject/json-parser.c:580 | ||
15 | #6 0x55b1bec060d1 in json_message_process_token ../qobject/json-streamer.c:92 | ||
16 | #7 0x55b1bec16a12 in json_lexer_feed_char ../qobject/json-lexer.c:313 | ||
17 | #8 0x55b1bec16fbd in json_lexer_feed ../qobject/json-lexer.c:350 | ||
18 | #9 0x55b1bec06453 in json_message_parser_feed ../qobject/json-streamer.c:121 | ||
19 | #10 0x55b1bebc2d51 in qmp_fd_receive ../tests/qtest/libqtest.c:614 | ||
20 | #11 0x55b1bebc2f5e in qtest_qmp_receive_dict ../tests/qtest/libqtest.c:636 | ||
21 | #12 0x55b1bebc2e6c in qtest_qmp_receive ../tests/qtest/libqtest.c:624 | ||
22 | #13 0x55b1bebc3340 in qtest_vqmp ../tests/qtest/libqtest.c:715 | ||
23 | #14 0x55b1bebc3942 in qtest_qmp ../tests/qtest/libqtest.c:756 | ||
24 | #15 0x55b1bebbd64a in adc_qom_set ../tests/qtest/npcm7xx_adc-test.c:127 | ||
25 | #16 0x55b1bebbd793 in adc_write_input ../tests/qtest/npcm7xx_adc-test.c:140 | ||
26 | #17 0x55b1bebbdf92 in test_convert_external ../tests/qtest/npcm7xx_adc-test.c:246 | ||
27 | |||
28 | Reported-by: Euler Robot <euler.robot@huawei.com> | ||
29 | Signed-off-by: Gan Qixin <ganqixin@huawei.com> | ||
30 | Reviewed-by: Hao Wu <wuhaotsh@google.com> | ||
31 | Message-id: 20210118065627.79903-1-ganqixin@huawei.com | ||
32 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
33 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
34 | --- | ||
35 | tests/qtest/npcm7xx_adc-test.c | 1 + | ||
36 | 1 file changed, 1 insertion(+) | ||
37 | |||
38 | diff --git a/tests/qtest/npcm7xx_adc-test.c b/tests/qtest/npcm7xx_adc-test.c | ||
39 | index XXXXXXX..XXXXXXX 100644 | ||
40 | --- a/tests/qtest/npcm7xx_adc-test.c | ||
41 | +++ b/tests/qtest/npcm7xx_adc-test.c | ||
42 | @@ -XXX,XX +XXX,XX @@ static void adc_qom_set(QTestState *qts, const ADC *adc, | ||
43 | path, name, value); | ||
44 | /* The qom set message returns successfully. */ | ||
45 | g_assert_true(qdict_haskey(response, "return")); | ||
46 | + qobject_unref(response); | ||
47 | } | ||
48 | |||
49 | static void adc_write_input(QTestState *qts, const ADC *adc, | ||
50 | -- | ||
51 | 2.20.1 | ||
52 | |||
53 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
2 | 1 | ||
3 | When building with GCC 10.2 configured with --extra-cflags=-Os, we get: | ||
4 | |||
5 | target/arm/m_helper.c: In function ‘arm_v7m_cpu_do_interrupt’: | ||
6 | target/arm/m_helper.c:1811:16: error: ‘restore_s16_s31’ may be used uninitialized in this function [-Werror=maybe-uninitialized] | ||
7 | 1811 | if (restore_s16_s31) { | ||
8 | | ^ | ||
9 | target/arm/m_helper.c:1350:10: note: ‘restore_s16_s31’ was declared here | ||
10 | 1350 | bool restore_s16_s31; | ||
11 | | ^~~~~~~~~~~~~~~ | ||
12 | cc1: all warnings being treated as errors | ||
13 | |||
14 | Initialize the 'restore_s16_s31' variable to silence the warning. | ||
15 | |||
16 | Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
17 | Message-id: 20210119062739.589049-1-f4bug@amsat.org | ||
18 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
19 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
20 | --- | ||
21 | target/arm/m_helper.c | 2 +- | ||
22 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
23 | |||
24 | diff --git a/target/arm/m_helper.c b/target/arm/m_helper.c | ||
25 | index XXXXXXX..XXXXXXX 100644 | ||
26 | --- a/target/arm/m_helper.c | ||
27 | +++ b/target/arm/m_helper.c | ||
28 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | ||
29 | bool exc_secure = false; | ||
30 | bool return_to_secure; | ||
31 | bool ftype; | ||
32 | - bool restore_s16_s31; | ||
33 | + bool restore_s16_s31 = false; | ||
34 | |||
35 | /* | ||
36 | * If we're not in Handler mode then jumps to magic exception-exit | ||
37 | -- | ||
38 | 2.20.1 | ||
39 | |||
40 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | When we first converted our documentation to Sphinx, we split it into | ||
2 | multiple manuals (system, interop, tools, etc), which are all built | ||
3 | separately. The primary driver for this was wanting to be able to | ||
4 | avoid shipping the 'devel' manual to end-users. However, this is | ||
5 | working against the grain of the way Sphinx wants to be used and | ||
6 | causes some annoyances: | ||
7 | * Cross-references between documents become much harder or | ||
8 | possibly impossible | ||
9 | * There is no single index to the whole documentation | ||
10 | * Within one manual there's no links or table-of-contents info | ||
11 | that lets you easily navigate to the others | ||
12 | * The devel manual doesn't get published on the QEMU website | ||
13 | (it would be nice to able to refer to it there) | ||
14 | 1 | ||
15 | Merely hiding our developer documentation from end users seems like | ||
16 | it's not enough benefit for these costs. Combine all the | ||
17 | documentation into a single manual (the same way that the readthedocs | ||
18 | site builds it) and install the whole thing. The previous manual | ||
19 | divisions remain as the new top level sections in the manual. | ||
20 | |||
21 | * The per-manual conf.py files are no longer needed | ||
22 | * The man_pages[] specifications previously in each per-manual | ||
23 | conf.py move to the top level conf.py | ||
24 | * docs/meson.build logic is simplified as we now only need to run | ||
25 | Sphinx once for the HTML and then once for the manpages5B | ||
26 | * The old index.html.in that produced the top-level page with | ||
27 | links to each manual is no longer needed | ||
28 | |||
29 | Unfortunately this means that we now have to build the HTML | ||
30 | documentation into docs/manual in the build tree rather than directly | ||
31 | into docs/; otherwise it is too awkward to ensure we install only the | ||
32 | built manual and not also the dependency info, stamp file, etc. The | ||
33 | manual still ends up in the same place in the final installed | ||
34 | directory, but anybody who was consulting documentation from within | ||
35 | the build tree will have to adjust where they're looking. | ||
36 | |||
37 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
38 | Reviewed-by: Paolo Bonzini <pbonzini@redhat.com> | ||
39 | Message-id: 20210115154449.4801-1-peter.maydell@linaro.org | ||
40 | --- | ||
41 | docs/conf.py | 46 ++++++++++++++++++++++++++++++- | ||
42 | docs/devel/conf.py | 15 ----------- | ||
43 | docs/index.html.in | 17 ------------ | ||
44 | docs/interop/conf.py | 28 ------------------- | ||
45 | docs/meson.build | 64 +++++++++++++++++--------------------------- | ||
46 | docs/specs/conf.py | 16 ----------- | ||
47 | docs/system/conf.py | 28 ------------------- | ||
48 | docs/tools/conf.py | 37 ------------------------- | ||
49 | docs/user/conf.py | 15 ----------- | ||
50 | .gitlab-ci.yml | 4 +-- | ||
51 | 10 files changed, 72 insertions(+), 198 deletions(-) | ||
52 | delete mode 100644 docs/devel/conf.py | ||
53 | delete mode 100644 docs/index.html.in | ||
54 | delete mode 100644 docs/interop/conf.py | ||
55 | delete mode 100644 docs/specs/conf.py | ||
56 | delete mode 100644 docs/system/conf.py | ||
57 | delete mode 100644 docs/tools/conf.py | ||
58 | delete mode 100644 docs/user/conf.py | ||
59 | |||
60 | diff --git a/docs/conf.py b/docs/conf.py | ||
61 | index XXXXXXX..XXXXXXX 100644 | ||
62 | --- a/docs/conf.py | ||
63 | +++ b/docs/conf.py | ||
64 | @@ -XXX,XX +XXX,XX @@ latex_documents = [ | ||
65 | |||
66 | # -- Options for manual page output --------------------------------------- | ||
67 | # Individual manual/conf.py can override this to create man pages | ||
68 | -man_pages = [] | ||
69 | +man_pages = [ | ||
70 | + ('interop/qemu-ga', 'qemu-ga', | ||
71 | + 'QEMU Guest Agent', | ||
72 | + ['Michael Roth <mdroth@linux.vnet.ibm.com>'], 8), | ||
73 | + ('interop/qemu-ga-ref', 'qemu-ga-ref', | ||
74 | + 'QEMU Guest Agent Protocol Reference', | ||
75 | + [], 7), | ||
76 | + ('interop/qemu-qmp-ref', 'qemu-qmp-ref', | ||
77 | + 'QEMU QMP Reference Manual', | ||
78 | + [], 7), | ||
79 | + ('interop/qemu-storage-daemon-qmp-ref', 'qemu-storage-daemon-qmp-ref', | ||
80 | + 'QEMU Storage Daemon QMP Reference Manual', | ||
81 | + [], 7), | ||
82 | + ('system/qemu-manpage', 'qemu', | ||
83 | + 'QEMU User Documentation', | ||
84 | + ['Fabrice Bellard'], 1), | ||
85 | + ('system/qemu-block-drivers', 'qemu-block-drivers', | ||
86 | + 'QEMU block drivers reference', | ||
87 | + ['Fabrice Bellard and the QEMU Project developers'], 7), | ||
88 | + ('system/qemu-cpu-models', 'qemu-cpu-models', | ||
89 | + 'QEMU CPU Models', | ||
90 | + ['The QEMU Project developers'], 7), | ||
91 | + ('tools/qemu-img', 'qemu-img', | ||
92 | + 'QEMU disk image utility', | ||
93 | + ['Fabrice Bellard'], 1), | ||
94 | + ('tools/qemu-nbd', 'qemu-nbd', | ||
95 | + 'QEMU Disk Network Block Device Server', | ||
96 | + ['Anthony Liguori <anthony@codemonkey.ws>'], 8), | ||
97 | + ('tools/qemu-pr-helper', 'qemu-pr-helper', | ||
98 | + 'QEMU persistent reservation helper', | ||
99 | + [], 8), | ||
100 | + ('tools/qemu-storage-daemon', 'qemu-storage-daemon', | ||
101 | + 'QEMU storage daemon', | ||
102 | + [], 1), | ||
103 | + ('tools/qemu-trace-stap', 'qemu-trace-stap', | ||
104 | + 'QEMU SystemTap trace tool', | ||
105 | + [], 1), | ||
106 | + ('tools/virtfs-proxy-helper', 'virtfs-proxy-helper', | ||
107 | + 'QEMU 9p virtfs proxy filesystem helper', | ||
108 | + ['M. Mohan Kumar'], 1), | ||
109 | + ('tools/virtiofsd', 'virtiofsd', | ||
110 | + 'QEMU virtio-fs shared file system daemon', | ||
111 | + ['Stefan Hajnoczi <stefanha@redhat.com>', | ||
112 | + 'Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>'], 1), | ||
113 | +] | ||
114 | |||
115 | # -- Options for Texinfo output ------------------------------------------- | ||
116 | |||
117 | diff --git a/docs/devel/conf.py b/docs/devel/conf.py | ||
118 | deleted file mode 100644 | ||
119 | index XXXXXXX..XXXXXXX | ||
120 | --- a/docs/devel/conf.py | ||
121 | +++ /dev/null | ||
122 | @@ -XXX,XX +XXX,XX @@ | ||
123 | -# -*- coding: utf-8 -*- | ||
124 | -# | ||
125 | -# QEMU documentation build configuration file for the 'devel' manual. | ||
126 | -# | ||
127 | -# This includes the top level conf file and then makes any necessary tweaks. | ||
128 | -import sys | ||
129 | -import os | ||
130 | - | ||
131 | -qemu_docdir = os.path.abspath("..") | ||
132 | -parent_config = os.path.join(qemu_docdir, "conf.py") | ||
133 | -exec(compile(open(parent_config, "rb").read(), parent_config, 'exec')) | ||
134 | - | ||
135 | -# This slightly misuses the 'description', but is the best way to get | ||
136 | -# the manual title to appear in the sidebar. | ||
137 | -html_theme_options['description'] = u'Developer''s Guide' | ||
138 | diff --git a/docs/index.html.in b/docs/index.html.in | ||
139 | deleted file mode 100644 | ||
140 | index XXXXXXX..XXXXXXX | ||
141 | --- a/docs/index.html.in | ||
142 | +++ /dev/null | ||
143 | @@ -XXX,XX +XXX,XX @@ | ||
144 | -<!DOCTYPE html> | ||
145 | -<html lang="en"> | ||
146 | - <head> | ||
147 | - <meta charset="UTF-8"> | ||
148 | - <title>QEMU @VERSION@ Documentation</title> | ||
149 | - </head> | ||
150 | - <body> | ||
151 | - <h1>QEMU @VERSION@ Documentation</h1> | ||
152 | - <ul> | ||
153 | - <li><a href="system/index.html">System Emulation User's Guide</a></li> | ||
154 | - <li><a href="user/index.html">User Mode Emulation User's Guide</a></li> | ||
155 | - <li><a href="tools/index.html">Tools Guide</a></li> | ||
156 | - <li><a href="interop/index.html">System Emulation Management and Interoperability Guide</a></li> | ||
157 | - <li><a href="specs/index.html">System Emulation Guest Hardware Specifications</a></li> | ||
158 | - </ul> | ||
159 | - </body> | ||
160 | -</html> | ||
161 | diff --git a/docs/interop/conf.py b/docs/interop/conf.py | ||
162 | deleted file mode 100644 | ||
163 | index XXXXXXX..XXXXXXX | ||
164 | --- a/docs/interop/conf.py | ||
165 | +++ /dev/null | ||
166 | @@ -XXX,XX +XXX,XX @@ | ||
167 | -# -*- coding: utf-8 -*- | ||
168 | -# | ||
169 | -# QEMU documentation build configuration file for the 'interop' manual. | ||
170 | -# | ||
171 | -# This includes the top level conf file and then makes any necessary tweaks. | ||
172 | -import sys | ||
173 | -import os | ||
174 | - | ||
175 | -qemu_docdir = os.path.abspath("..") | ||
176 | -parent_config = os.path.join(qemu_docdir, "conf.py") | ||
177 | -exec(compile(open(parent_config, "rb").read(), parent_config, 'exec')) | ||
178 | - | ||
179 | -# This slightly misuses the 'description', but is the best way to get | ||
180 | -# the manual title to appear in the sidebar. | ||
181 | -html_theme_options['description'] = u'System Emulation Management and Interoperability Guide' | ||
182 | - | ||
183 | -# One entry per manual page. List of tuples | ||
184 | -# (source start file, name, description, authors, manual section). | ||
185 | -man_pages = [ | ||
186 | - ('qemu-ga', 'qemu-ga', u'QEMU Guest Agent', | ||
187 | - ['Michael Roth <mdroth@linux.vnet.ibm.com>'], 8), | ||
188 | - ('qemu-ga-ref', 'qemu-ga-ref', 'QEMU Guest Agent Protocol Reference', | ||
189 | - [], 7), | ||
190 | - ('qemu-qmp-ref', 'qemu-qmp-ref', 'QEMU QMP Reference Manual', | ||
191 | - [], 7), | ||
192 | - ('qemu-storage-daemon-qmp-ref', 'qemu-storage-daemon-qmp-ref', | ||
193 | - 'QEMU Storage Daemon QMP Reference Manual', [], 7), | ||
194 | -] | ||
195 | diff --git a/docs/meson.build b/docs/meson.build | ||
196 | index XXXXXXX..XXXXXXX 100644 | ||
197 | --- a/docs/meson.build | ||
198 | +++ b/docs/meson.build | ||
199 | @@ -XXX,XX +XXX,XX @@ if build_docs | ||
200 | meson.source_root() / 'docs/sphinx/qmp_lexer.py', | ||
201 | qapi_gen_depends ] | ||
202 | |||
203 | - configure_file(output: 'index.html', | ||
204 | - input: files('index.html.in'), | ||
205 | - configuration: {'VERSION': meson.project_version()}, | ||
206 | - install_dir: qemu_docdir) | ||
207 | - manuals = [ 'devel', 'interop', 'tools', 'specs', 'system', 'user' ] | ||
208 | man_pages = { | ||
209 | - 'interop' : { | ||
210 | 'qemu-ga.8': (have_tools ? 'man8' : ''), | ||
211 | 'qemu-ga-ref.7': 'man7', | ||
212 | 'qemu-qmp-ref.7': 'man7', | ||
213 | 'qemu-storage-daemon-qmp-ref.7': (have_tools ? 'man7' : ''), | ||
214 | - }, | ||
215 | - 'tools': { | ||
216 | 'qemu-img.1': (have_tools ? 'man1' : ''), | ||
217 | 'qemu-nbd.8': (have_tools ? 'man8' : ''), | ||
218 | 'qemu-pr-helper.8': (have_tools ? 'man8' : ''), | ||
219 | @@ -XXX,XX +XXX,XX @@ if build_docs | ||
220 | 'qemu-trace-stap.1': (config_host.has_key('CONFIG_TRACE_SYSTEMTAP') ? 'man1' : ''), | ||
221 | 'virtfs-proxy-helper.1': (have_virtfs_proxy_helper ? 'man1' : ''), | ||
222 | 'virtiofsd.1': (have_virtiofsd ? 'man1' : ''), | ||
223 | - }, | ||
224 | - 'system': { | ||
225 | 'qemu.1': 'man1', | ||
226 | 'qemu-block-drivers.7': 'man7', | ||
227 | 'qemu-cpu-models.7': 'man7' | ||
228 | - }, | ||
229 | } | ||
230 | |||
231 | sphinxdocs = [] | ||
232 | sphinxmans = [] | ||
233 | - foreach manual : manuals | ||
234 | - private_dir = meson.current_build_dir() / (manual + '.p') | ||
235 | - output_dir = meson.current_build_dir() / manual | ||
236 | - input_dir = meson.current_source_dir() / manual | ||
237 | |||
238 | - this_manual = custom_target(manual + ' manual', | ||
239 | + private_dir = meson.current_build_dir() / 'manual.p' | ||
240 | + output_dir = meson.current_build_dir() / 'manual' | ||
241 | + input_dir = meson.current_source_dir() | ||
242 | + | ||
243 | + this_manual = custom_target('QEMU manual', | ||
244 | build_by_default: build_docs, | ||
245 | - output: [manual + '.stamp'], | ||
246 | - input: [files('conf.py'), files(manual / 'conf.py')], | ||
247 | - depfile: manual + '.d', | ||
248 | + output: 'docs.stamp', | ||
249 | + input: files('conf.py'), | ||
250 | + depfile: 'docs.d', | ||
251 | depend_files: sphinx_extn_depends, | ||
252 | command: [SPHINX_ARGS, '-Ddepfile=@DEPFILE@', | ||
253 | '-Ddepfile_stamp=@OUTPUT0@', | ||
254 | '-b', 'html', '-d', private_dir, | ||
255 | input_dir, output_dir]) | ||
256 | - sphinxdocs += this_manual | ||
257 | - if build_docs and manual != 'devel' | ||
258 | - install_subdir(output_dir, install_dir: qemu_docdir) | ||
259 | - endif | ||
260 | + sphinxdocs += this_manual | ||
261 | + install_subdir(output_dir, install_dir: qemu_docdir, strip_directory: true) | ||
262 | |||
263 | - these_man_pages = [] | ||
264 | - install_dirs = [] | ||
265 | - foreach page, section : man_pages.get(manual, {}) | ||
266 | - these_man_pages += page | ||
267 | - install_dirs += section == '' ? false : get_option('mandir') / section | ||
268 | - endforeach | ||
269 | - if these_man_pages.length() > 0 | ||
270 | - sphinxmans += custom_target(manual + ' man pages', | ||
271 | - build_by_default: build_docs, | ||
272 | - output: these_man_pages, | ||
273 | - input: this_manual, | ||
274 | - install: build_docs, | ||
275 | - install_dir: install_dirs, | ||
276 | - command: [SPHINX_ARGS, '-b', 'man', '-d', private_dir, | ||
277 | - input_dir, meson.current_build_dir()]) | ||
278 | - endif | ||
279 | + these_man_pages = [] | ||
280 | + install_dirs = [] | ||
281 | + foreach page, section : man_pages | ||
282 | + these_man_pages += page | ||
283 | + install_dirs += section == '' ? false : get_option('mandir') / section | ||
284 | endforeach | ||
285 | + | ||
286 | + sphinxmans += custom_target('QEMU man pages', | ||
287 | + build_by_default: build_docs, | ||
288 | + output: these_man_pages, | ||
289 | + input: this_manual, | ||
290 | + install: build_docs, | ||
291 | + install_dir: install_dirs, | ||
292 | + command: [SPHINX_ARGS, '-b', 'man', '-d', private_dir, | ||
293 | + input_dir, meson.current_build_dir()]) | ||
294 | + | ||
295 | alias_target('sphinxdocs', sphinxdocs) | ||
296 | alias_target('html', sphinxdocs) | ||
297 | alias_target('man', sphinxmans) | ||
298 | diff --git a/docs/specs/conf.py b/docs/specs/conf.py | ||
299 | deleted file mode 100644 | ||
300 | index XXXXXXX..XXXXXXX | ||
301 | --- a/docs/specs/conf.py | ||
302 | +++ /dev/null | ||
303 | @@ -XXX,XX +XXX,XX @@ | ||
304 | -# -*- coding: utf-8 -*- | ||
305 | -# | ||
306 | -# QEMU documentation build configuration file for the 'specs' manual. | ||
307 | -# | ||
308 | -# This includes the top level conf file and then makes any necessary tweaks. | ||
309 | -import sys | ||
310 | -import os | ||
311 | - | ||
312 | -qemu_docdir = os.path.abspath("..") | ||
313 | -parent_config = os.path.join(qemu_docdir, "conf.py") | ||
314 | -exec(compile(open(parent_config, "rb").read(), parent_config, 'exec')) | ||
315 | - | ||
316 | -# This slightly misuses the 'description', but is the best way to get | ||
317 | -# the manual title to appear in the sidebar. | ||
318 | -html_theme_options['description'] = \ | ||
319 | - u'System Emulation Guest Hardware Specifications' | ||
320 | diff --git a/docs/system/conf.py b/docs/system/conf.py | ||
321 | deleted file mode 100644 | ||
322 | index XXXXXXX..XXXXXXX | ||
323 | --- a/docs/system/conf.py | ||
324 | +++ /dev/null | ||
325 | @@ -XXX,XX +XXX,XX @@ | ||
326 | -# -*- coding: utf-8 -*- | ||
327 | -# | ||
328 | -# QEMU documentation build configuration file for the 'system' manual. | ||
329 | -# | ||
330 | -# This includes the top level conf file and then makes any necessary tweaks. | ||
331 | -import sys | ||
332 | -import os | ||
333 | - | ||
334 | -qemu_docdir = os.path.abspath("..") | ||
335 | -parent_config = os.path.join(qemu_docdir, "conf.py") | ||
336 | -exec(compile(open(parent_config, "rb").read(), parent_config, 'exec')) | ||
337 | - | ||
338 | -# This slightly misuses the 'description', but is the best way to get | ||
339 | -# the manual title to appear in the sidebar. | ||
340 | -html_theme_options['description'] = u'System Emulation User''s Guide' | ||
341 | - | ||
342 | -# One entry per manual page. List of tuples | ||
343 | -# (source start file, name, description, authors, manual section). | ||
344 | -man_pages = [ | ||
345 | - ('qemu-manpage', 'qemu', u'QEMU User Documentation', | ||
346 | - ['Fabrice Bellard'], 1), | ||
347 | - ('qemu-block-drivers', 'qemu-block-drivers', | ||
348 | - u'QEMU block drivers reference', | ||
349 | - ['Fabrice Bellard and the QEMU Project developers'], 7), | ||
350 | - ('qemu-cpu-models', 'qemu-cpu-models', | ||
351 | - u'QEMU CPU Models', | ||
352 | - ['The QEMU Project developers'], 7) | ||
353 | -] | ||
354 | diff --git a/docs/tools/conf.py b/docs/tools/conf.py | ||
355 | deleted file mode 100644 | ||
356 | index XXXXXXX..XXXXXXX | ||
357 | --- a/docs/tools/conf.py | ||
358 | +++ /dev/null | ||
359 | @@ -XXX,XX +XXX,XX @@ | ||
360 | -# -*- coding: utf-8 -*- | ||
361 | -# | ||
362 | -# QEMU documentation build configuration file for the 'tools' manual. | ||
363 | -# | ||
364 | -# This includes the top level conf file and then makes any necessary tweaks. | ||
365 | -import sys | ||
366 | -import os | ||
367 | - | ||
368 | -qemu_docdir = os.path.abspath("..") | ||
369 | -parent_config = os.path.join(qemu_docdir, "conf.py") | ||
370 | -exec(compile(open(parent_config, "rb").read(), parent_config, 'exec')) | ||
371 | - | ||
372 | -# This slightly misuses the 'description', but is the best way to get | ||
373 | -# the manual title to appear in the sidebar. | ||
374 | -html_theme_options['description'] = \ | ||
375 | - u'Tools Guide' | ||
376 | - | ||
377 | -# One entry per manual page. List of tuples | ||
378 | -# (source start file, name, description, authors, manual section). | ||
379 | -man_pages = [ | ||
380 | - ('qemu-img', 'qemu-img', u'QEMU disk image utility', | ||
381 | - ['Fabrice Bellard'], 1), | ||
382 | - ('qemu-storage-daemon', 'qemu-storage-daemon', u'QEMU storage daemon', | ||
383 | - [], 1), | ||
384 | - ('qemu-nbd', 'qemu-nbd', u'QEMU Disk Network Block Device Server', | ||
385 | - ['Anthony Liguori <anthony@codemonkey.ws>'], 8), | ||
386 | - ('qemu-pr-helper', 'qemu-pr-helper', 'QEMU persistent reservation helper', | ||
387 | - [], 8), | ||
388 | - ('qemu-trace-stap', 'qemu-trace-stap', u'QEMU SystemTap trace tool', | ||
389 | - [], 1), | ||
390 | - ('virtfs-proxy-helper', 'virtfs-proxy-helper', | ||
391 | - u'QEMU 9p virtfs proxy filesystem helper', | ||
392 | - ['M. Mohan Kumar'], 1), | ||
393 | - ('virtiofsd', 'virtiofsd', u'QEMU virtio-fs shared file system daemon', | ||
394 | - ['Stefan Hajnoczi <stefanha@redhat.com>', | ||
395 | - 'Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>'], 1), | ||
396 | -] | ||
397 | diff --git a/docs/user/conf.py b/docs/user/conf.py | ||
398 | deleted file mode 100644 | ||
399 | index XXXXXXX..XXXXXXX | ||
400 | --- a/docs/user/conf.py | ||
401 | +++ /dev/null | ||
402 | @@ -XXX,XX +XXX,XX @@ | ||
403 | -# -*- coding: utf-8 -*- | ||
404 | -# | ||
405 | -# QEMU documentation build configuration file for the 'user' manual. | ||
406 | -# | ||
407 | -# This includes the top level conf file and then makes any necessary tweaks. | ||
408 | -import sys | ||
409 | -import os | ||
410 | - | ||
411 | -qemu_docdir = os.path.abspath("..") | ||
412 | -parent_config = os.path.join(qemu_docdir, "conf.py") | ||
413 | -exec(compile(open(parent_config, "rb").read(), parent_config, 'exec')) | ||
414 | - | ||
415 | -# This slightly misuses the 'description', but is the best way to get | ||
416 | -# the manual title to appear in the sidebar. | ||
417 | -html_theme_options['description'] = u'User Mode Emulation User''s Guide' | ||
418 | diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml | ||
419 | index XXXXXXX..XXXXXXX 100644 | ||
420 | --- a/.gitlab-ci.yml | ||
421 | +++ b/.gitlab-ci.yml | ||
422 | @@ -XXX,XX +XXX,XX @@ pages: | ||
423 | -t "Welcome to the QEMU sourcecode" | ||
424 | - mv HTML public/src | ||
425 | # Project documentation | ||
426 | - - mv build/docs/index.html public/ | ||
427 | - - for i in devel interop specs system tools user ; do mv build/docs/$i public/ ; done | ||
428 | + - make -C build install DESTDIR=$(pwd)/temp-install | ||
429 | + - mv temp-install/usr/local/share/doc/qemu/* public/ | ||
430 | artifacts: | ||
431 | paths: | ||
432 | - public | ||
433 | -- | ||
434 | 2.20.1 | ||
435 | |||
436 | diff view generated by jsdifflib |