1 | Arm pullreq: Rémi's ARMv8.4-SEL2 support is the big thing here. | 1 | Hi; here's the first target-arm pullreq for the 7.0 cycle. |
---|---|---|---|
2 | 2 | ||
3 | thanks | 3 | thanks |
4 | -- PMM | 4 | -- PMM |
5 | 5 | ||
6 | The following changes since commit f1fcb6851aba6dd9838886dc179717a11e344a1c: | 6 | The following changes since commit 76b56fdfc9fa43ec6e5986aee33f108c6c6a511e: |
7 | 7 | ||
8 | Merge remote-tracking branch 'remotes/huth-gitlab/tags/pull-request-2021-01-19' into staging (2021-01-19 11:57:07 +0000) | 8 | Merge tag 'block-pull-request' of https://gitlab.com/stefanha/qemu into staging (2021-12-14 12:46:18 -0800) |
9 | 9 | ||
10 | are available in the Git repository at: | 10 | are available in the Git repository at: |
11 | 11 | ||
12 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20210119 | 12 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20211215 |
13 | 13 | ||
14 | for you to fetch changes up to 6d39956891b3d1857af84f72f0230a6d99eb3b6a: | 14 | for you to fetch changes up to aed176558806674d030a8305d989d4e6a5073359: |
15 | 15 | ||
16 | docs: Build and install all the docs in a single manual (2021-01-19 14:38:53 +0000) | 16 | tests/acpi: add expected blob for VIOT test on virt machine (2021-12-15 10:35:26 +0000) |
17 | 17 | ||
18 | ---------------------------------------------------------------- | 18 | ---------------------------------------------------------------- |
19 | target-arm queue: | 19 | target-arm queue: |
20 | * Implement IMPDEF pauth algorithm | 20 | * ITS: error reporting cleanup |
21 | * Support ARMv8.4-SEL2 | 21 | * aspeed: improve documentation |
22 | * Fix bug where we were truncating predicate vector lengths in SVE insns | 22 | * Fix STM32F2XX USART data register readout |
23 | * Implement new pvpanic-pci device | 23 | * allow emulated GICv3 to be disabled in non-TCG builds |
24 | * npcm7xx_adc-test: Fix memleak in adc_qom_set | 24 | * fix exception priority for singlestep, misaligned PC, bp, etc |
25 | * target/arm/m_helper: Silence GCC 10 maybe-uninitialized error | 25 | * Correct calculation of tlb range invalidate length |
26 | * docs: Build and install all the docs in a single manual | 26 | * npcm7xx_emc: fix missing queue_flush |
27 | * virt: Add VIOT ACPI table for virtio-iommu | ||
28 | * target/i386: Use assert() to sanity-check b1 in SSE decode | ||
29 | * Don't include qemu-common unnecessarily | ||
27 | 30 | ||
28 | ---------------------------------------------------------------- | 31 | ---------------------------------------------------------------- |
29 | Gan Qixin (1): | 32 | Alex Bennée (1): |
30 | npcm7xx_adc-test: Fix memleak in adc_qom_set | 33 | hw/intc: clean-up error reporting for failed ITS cmd |
31 | 34 | ||
32 | Mihai Carabas (4): | 35 | Jean-Philippe Brucker (8): |
33 | hw/misc/pvpanic: split-out generic and bus dependent code | 36 | hw/arm/virt-acpi-build: Add VIOT table for virtio-iommu |
34 | hw/misc/pvpanic: add PCI interface support | 37 | hw/arm/virt: Remove device tree restriction for virtio-iommu |
35 | pvpanic : update pvpanic spec document | 38 | hw/arm/virt: Reject instantiation of multiple IOMMUs |
36 | tests/qtest: add a test case for pvpanic-pci | 39 | hw/arm/virt: Use object_property_set instead of qdev_prop_set |
40 | tests/acpi: allow updates of VIOT expected data files | ||
41 | tests/acpi: add test case for VIOT | ||
42 | tests/acpi: add expected blobs for VIOT test on q35 machine | ||
43 | tests/acpi: add expected blob for VIOT test on virt machine | ||
37 | 44 | ||
38 | Peter Maydell (1): | 45 | Joel Stanley (4): |
39 | docs: Build and install all the docs in a single manual | 46 | docs: aspeed: Add new boards |
47 | docs: aspeed: Update OpenBMC image URL | ||
48 | docs: aspeed: Give an example of booting a kernel | ||
49 | docs: aspeed: ADC is now modelled | ||
40 | 50 | ||
41 | Philippe Mathieu-Daudé (1): | 51 | Olivier Hériveaux (1): |
42 | target/arm/m_helper: Silence GCC 10 maybe-uninitialized error | 52 | Fix STM32F2XX USART data register readout |
43 | 53 | ||
44 | Richard Henderson (7): | 54 | Patrick Venture (1): |
45 | target/arm: Implement an IMPDEF pauth algorithm | 55 | hw/net: npcm7xx_emc fix missing queue_flush |
46 | target/arm: Add cpu properties to control pauth | ||
47 | target/arm: Use object_property_add_bool for "sve" property | ||
48 | target/arm: Introduce PREDDESC field definitions | ||
49 | target/arm: Update PFIRST, PNEXT for pred_desc | ||
50 | target/arm: Update ZIP, UZP, TRN for pred_desc | ||
51 | target/arm: Update REV, PUNPK for pred_desc | ||
52 | 56 | ||
53 | Rémi Denis-Courmont (19): | 57 | Peter Maydell (6): |
54 | target/arm: remove redundant tests | 58 | target/i386: Use assert() to sanity-check b1 in SSE decode |
55 | target/arm: add arm_is_el2_enabled() helper | 59 | include/hw/i386: Don't include qemu-common.h in .h files |
56 | target/arm: use arm_is_el2_enabled() where applicable | 60 | target/hexagon/cpu.h: don't include qemu-common.h |
57 | target/arm: use arm_hcr_el2_eff() where applicable | 61 | target/rx/cpu.h: Don't include qemu-common.h |
58 | target/arm: factor MDCR_EL2 common handling | 62 | hw/arm: Don't include qemu-common.h unnecessarily |
59 | target/arm: Define isar_feature function to test for presence of SEL2 | 63 | target/arm: Correct calculation of tlb range invalidate length |
60 | target/arm: add 64-bit S-EL2 to EL exception table | ||
61 | target/arm: add MMU stage 1 for Secure EL2 | ||
62 | target/arm: add ARMv8.4-SEL2 system registers | ||
63 | target/arm: handle VMID change in secure state | ||
64 | target/arm: do S1_ptw_translate() before address space lookup | ||
65 | target/arm: translate NS bit in page-walks | ||
66 | target/arm: generalize 2-stage page-walk condition | ||
67 | target/arm: secure stage 2 translation regime | ||
68 | target/arm: set HPFAR_EL2.NS on secure stage 2 faults | ||
69 | target/arm: revector to run-time pick target EL | ||
70 | target/arm: Implement SCR_EL2.EEL2 | ||
71 | target/arm: enable Secure EL2 in max CPU | ||
72 | target/arm: refactor vae1_tlbmask() | ||
73 | 64 | ||
74 | docs/conf.py | 46 ++++- | 65 | Philippe Mathieu-Daudé (2): |
75 | docs/devel/conf.py | 15 -- | 66 | hw/intc/arm_gicv3: Extract gicv3_set_gicv3state from arm_gicv3_cpuif.c |
76 | docs/index.html.in | 17 -- | 67 | hw/intc/arm_gicv3: Introduce CONFIG_ARM_GIC_TCG Kconfig selector |
77 | docs/interop/conf.py | 28 --- | ||
78 | docs/meson.build | 64 +++--- | ||
79 | docs/specs/conf.py | 16 -- | ||
80 | docs/specs/pci-ids.txt | 1 + | ||
81 | docs/specs/pvpanic.txt | 13 +- | ||
82 | docs/system/arm/cpu-features.rst | 21 ++ | ||
83 | docs/system/conf.py | 28 --- | ||
84 | docs/tools/conf.py | 37 ---- | ||
85 | docs/user/conf.py | 15 -- | ||
86 | include/hw/misc/pvpanic.h | 24 ++- | ||
87 | include/hw/pci/pci.h | 1 + | ||
88 | include/qemu/xxhash.h | 98 +++++++++ | ||
89 | target/arm/cpu-param.h | 2 +- | ||
90 | target/arm/cpu.h | 107 ++++++++-- | ||
91 | target/arm/internals.h | 45 +++++ | ||
92 | hw/misc/pvpanic-isa.c | 94 +++++++++ | ||
93 | hw/misc/pvpanic-pci.c | 95 +++++++++ | ||
94 | hw/misc/pvpanic.c | 85 +------- | ||
95 | target/arm/cpu.c | 23 ++- | ||
96 | target/arm/cpu64.c | 65 ++++-- | ||
97 | target/arm/helper-a64.c | 8 +- | ||
98 | target/arm/helper.c | 414 ++++++++++++++++++++++++++------------- | ||
99 | target/arm/m_helper.c | 2 +- | ||
100 | target/arm/monitor.c | 1 + | ||
101 | target/arm/op_helper.c | 4 +- | ||
102 | target/arm/pauth_helper.c | 27 ++- | ||
103 | target/arm/sve_helper.c | 33 ++-- | ||
104 | target/arm/tlb_helper.c | 3 + | ||
105 | target/arm/translate-a64.c | 4 + | ||
106 | target/arm/translate-sve.c | 31 ++- | ||
107 | target/arm/translate.c | 36 +++- | ||
108 | tests/qtest/arm-cpu-features.c | 13 ++ | ||
109 | tests/qtest/npcm7xx_adc-test.c | 1 + | ||
110 | tests/qtest/pvpanic-pci-test.c | 62 ++++++ | ||
111 | .gitlab-ci.yml | 4 +- | ||
112 | hw/i386/Kconfig | 2 +- | ||
113 | hw/misc/Kconfig | 12 +- | ||
114 | hw/misc/meson.build | 4 +- | ||
115 | tests/qtest/meson.build | 3 +- | ||
116 | 42 files changed, 1080 insertions(+), 524 deletions(-) | ||
117 | delete mode 100644 docs/devel/conf.py | ||
118 | delete mode 100644 docs/index.html.in | ||
119 | delete mode 100644 docs/interop/conf.py | ||
120 | delete mode 100644 docs/specs/conf.py | ||
121 | delete mode 100644 docs/system/conf.py | ||
122 | delete mode 100644 docs/tools/conf.py | ||
123 | delete mode 100644 docs/user/conf.py | ||
124 | create mode 100644 hw/misc/pvpanic-isa.c | ||
125 | create mode 100644 hw/misc/pvpanic-pci.c | ||
126 | create mode 100644 tests/qtest/pvpanic-pci-test.c | ||
127 | 68 | ||
69 | Richard Henderson (10): | ||
70 | target/arm: Hoist pc_next to a local variable in aarch64_tr_translate_insn | ||
71 | target/arm: Hoist pc_next to a local variable in arm_tr_translate_insn | ||
72 | target/arm: Hoist pc_next to a local variable in thumb_tr_translate_insn | ||
73 | target/arm: Split arm_pre_translate_insn | ||
74 | target/arm: Advance pc for arch single-step exception | ||
75 | target/arm: Split compute_fsr_fsc out of arm_deliver_fault | ||
76 | target/arm: Take an exception if PC is misaligned | ||
77 | target/arm: Assert thumb pc is aligned | ||
78 | target/arm: Suppress bp for exceptions with more priority | ||
79 | tests/tcg: Add arm and aarch64 pc alignment tests | ||
80 | |||
81 | docs/system/arm/aspeed.rst | 26 ++++++++++++---- | ||
82 | include/hw/i386/microvm.h | 1 - | ||
83 | include/hw/i386/x86.h | 1 - | ||
84 | target/arm/helper.h | 1 + | ||
85 | target/arm/syndrome.h | 5 +++ | ||
86 | target/hexagon/cpu.h | 1 - | ||
87 | target/rx/cpu.h | 1 - | ||
88 | hw/arm/boot.c | 1 - | ||
89 | hw/arm/digic_boards.c | 1 - | ||
90 | hw/arm/highbank.c | 1 - | ||
91 | hw/arm/npcm7xx_boards.c | 1 - | ||
92 | hw/arm/sbsa-ref.c | 1 - | ||
93 | hw/arm/stm32f405_soc.c | 1 - | ||
94 | hw/arm/vexpress.c | 1 - | ||
95 | hw/arm/virt-acpi-build.c | 7 +++++ | ||
96 | hw/arm/virt.c | 21 ++++++------- | ||
97 | hw/char/stm32f2xx_usart.c | 3 +- | ||
98 | hw/intc/arm_gicv3.c | 2 +- | ||
99 | hw/intc/arm_gicv3_cpuif.c | 10 +----- | ||
100 | hw/intc/arm_gicv3_cpuif_common.c | 22 +++++++++++++ | ||
101 | hw/intc/arm_gicv3_its.c | 39 +++++++++++++++-------- | ||
102 | hw/net/npcm7xx_emc.c | 18 +++++------ | ||
103 | hw/virtio/virtio-iommu-pci.c | 12 ++------ | ||
104 | linux-user/aarch64/cpu_loop.c | 46 ++++++++++++++++------------ | ||
105 | linux-user/hexagon/cpu_loop.c | 1 + | ||
106 | target/arm/debug_helper.c | 23 ++++++++++++++ | ||
107 | target/arm/gdbstub.c | 9 ++++-- | ||
108 | target/arm/helper.c | 6 ++-- | ||
109 | target/arm/machine.c | 10 ++++++ | ||
110 | target/arm/tlb_helper.c | 63 ++++++++++++++++++++++++++++---------- | ||
111 | target/arm/translate-a64.c | 23 ++++++++++++-- | ||
112 | target/arm/translate.c | 58 ++++++++++++++++++++++++++--------- | ||
113 | target/i386/tcg/translate.c | 12 ++------ | ||
114 | tests/qtest/bios-tables-test.c | 38 +++++++++++++++++++++++ | ||
115 | tests/tcg/aarch64/pcalign-a64.c | 37 ++++++++++++++++++++++ | ||
116 | tests/tcg/arm/pcalign-a32.c | 46 ++++++++++++++++++++++++++++ | ||
117 | hw/arm/Kconfig | 1 + | ||
118 | hw/intc/Kconfig | 5 +++ | ||
119 | hw/intc/meson.build | 11 ++++--- | ||
120 | tests/data/acpi/q35/DSDT.viot | Bin 0 -> 9398 bytes | ||
121 | tests/data/acpi/q35/VIOT.viot | Bin 0 -> 112 bytes | ||
122 | tests/data/acpi/virt/VIOT | Bin 0 -> 88 bytes | ||
123 | tests/tcg/aarch64/Makefile.target | 4 +-- | ||
124 | tests/tcg/arm/Makefile.target | 4 +++ | ||
125 | 44 files changed, 429 insertions(+), 145 deletions(-) | ||
126 | create mode 100644 hw/intc/arm_gicv3_cpuif_common.c | ||
127 | create mode 100644 tests/tcg/aarch64/pcalign-a64.c | ||
128 | create mode 100644 tests/tcg/arm/pcalign-a32.c | ||
129 | create mode 100644 tests/data/acpi/q35/DSDT.viot | ||
130 | create mode 100644 tests/data/acpi/q35/VIOT.viot | ||
131 | create mode 100644 tests/data/acpi/virt/VIOT | ||
132 | diff view generated by jsdifflib |
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 1 | From: Alex Bennée <alex.bennee@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Do not assume that EL2 is available in and only in non-secure context. | 3 | While trying to debug a GIC ITS failure I saw some guest errors that |
4 | That equivalence is broken by ARMv8.4-SEL2. | 4 | had poor formatting as well as leaving me confused as to what failed. |
5 | As most of the checks aren't possible without a valid dte split that | ||
6 | check apart and then check the other conditions in steps. This avoids | ||
7 | us relying on undefined data. | ||
5 | 8 | ||
6 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 9 | I still get a failure with the current kvm-unit-tests but at least I |
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 10 | know (partially) why now: |
8 | Message-id: 20210112104511.36576-3-remi.denis.courmont@huawei.com | 11 | |
12 | Exception return from AArch64 EL1 to AArch64 EL1 PC 0x40080588 | ||
13 | PASS: gicv3: its-trigger: inv/invall: dev2/eventid=20 now triggers an LPI | ||
14 | ITS: MAPD devid=2 size = 0x8 itt=0x40430000 valid=0 | ||
15 | INT dev_id=2 event_id=20 | ||
16 | process_its_cmd: invalid command attributes: invalid dte: 0 for 2 (MEM_TX: 0) | ||
17 | PASS: gicv3: its-trigger: mapd valid=false: no LPI after device unmap | ||
18 | SUMMARY: 6 tests, 1 unexpected failures | ||
19 | |||
20 | Signed-off-by: Alex Bennée <alex.bennee@linaro.org> | ||
21 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
22 | Message-id: 20211112170454.3158925-1-alex.bennee@linaro.org | ||
23 | Cc: Shashi Mallela <shashi.mallela@linaro.org> | ||
24 | Cc: Peter Maydell <peter.maydell@linaro.org> | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 25 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | --- | 26 | --- |
11 | target/arm/cpu.h | 4 ++-- | 27 | hw/intc/arm_gicv3_its.c | 39 +++++++++++++++++++++++++++------------ |
12 | target/arm/helper-a64.c | 8 +------- | 28 | 1 file changed, 27 insertions(+), 12 deletions(-) |
13 | target/arm/helper.c | 33 +++++++++++++-------------------- | ||
14 | 3 files changed, 16 insertions(+), 29 deletions(-) | ||
15 | 29 | ||
16 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 30 | diff --git a/hw/intc/arm_gicv3_its.c b/hw/intc/arm_gicv3_its.c |
17 | index XXXXXXX..XXXXXXX 100644 | 31 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/target/arm/cpu.h | 32 | --- a/hw/intc/arm_gicv3_its.c |
19 | +++ b/target/arm/cpu.h | 33 | +++ b/hw/intc/arm_gicv3_its.c |
20 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_el_is_aa64(CPUARMState *env, int el) | 34 | @@ -XXX,XX +XXX,XX @@ static bool process_its_cmd(GICv3ITSState *s, uint64_t value, uint32_t offset, |
21 | return aa64; | 35 | if (res != MEMTX_OK) { |
36 | return result; | ||
37 | } | ||
38 | + } else { | ||
39 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
40 | + "%s: invalid command attributes: " | ||
41 | + "invalid dte: %"PRIx64" for %d (MEM_TX: %d)\n", | ||
42 | + __func__, dte, devid, res); | ||
43 | + return result; | ||
22 | } | 44 | } |
23 | 45 | ||
24 | - if (arm_feature(env, ARM_FEATURE_EL2) && !arm_is_secure_below_el3(env)) { | 46 | - if ((devid > s->dt.maxids.max_devids) || !dte_valid || !ite_valid || |
25 | + if (arm_is_el2_enabled(env)) { | 47 | - !cte_valid || (eventid > max_eventid)) { |
26 | aa64 = aa64 && (env->cp15.hcr_el2 & HCR_RW); | 48 | + |
27 | } | 49 | + /* |
28 | 50 | + * In this implementation, in case of guest errors we ignore the | |
29 | @@ -XXX,XX +XXX,XX @@ static inline int arm_debug_target_el(CPUARMState *env) | 51 | + * command and move onto the next command in the queue. |
30 | bool secure = arm_is_secure(env); | 52 | + */ |
31 | bool route_to_el2 = false; | 53 | + if (devid > s->dt.maxids.max_devids) { |
32 | 54 | qemu_log_mask(LOG_GUEST_ERROR, | |
33 | - if (arm_feature(env, ARM_FEATURE_EL2) && !secure) { | 55 | - "%s: invalid command attributes " |
34 | + if (arm_is_el2_enabled(env)) { | 56 | - "devid %d or eventid %d or invalid dte %d or" |
35 | route_to_el2 = env->cp15.hcr_el2 & HCR_TGE || | 57 | - "invalid cte %d or invalid ite %d\n", |
36 | env->cp15.mdcr_el2 & MDCR_TDE; | 58 | - __func__, devid, eventid, dte_valid, cte_valid, |
37 | } | 59 | - ite_valid); |
38 | diff --git a/target/arm/helper-a64.c b/target/arm/helper-a64.c | 60 | - /* |
39 | index XXXXXXX..XXXXXXX 100644 | 61 | - * in this implementation, in case of error |
40 | --- a/target/arm/helper-a64.c | 62 | - * we ignore this command and move onto the next |
41 | +++ b/target/arm/helper-a64.c | 63 | - * command in the queue |
42 | @@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc) | 64 | - */ |
43 | if (new_el == -1) { | 65 | + "%s: invalid command attributes: devid %d>%d", |
44 | goto illegal_return; | 66 | + __func__, devid, s->dt.maxids.max_devids); |
45 | } | 67 | + |
46 | - if (new_el > cur_el | 68 | + } else if (!dte_valid || !ite_valid || !cte_valid) { |
47 | - || (new_el == 2 && !arm_feature(env, ARM_FEATURE_EL2))) { | 69 | + qemu_log_mask(LOG_GUEST_ERROR, |
48 | + if (new_el > cur_el || (new_el == 2 && !arm_is_el2_enabled(env))) { | 70 | + "%s: invalid command attributes: " |
49 | /* Disallow return to an EL which is unimplemented or higher | 71 | + "dte: %s, ite: %s, cte: %s\n", |
50 | * than the current one. | 72 | + __func__, |
51 | */ | 73 | + dte_valid ? "valid" : "invalid", |
52 | @@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc) | 74 | + ite_valid ? "valid" : "invalid", |
53 | goto illegal_return; | 75 | + cte_valid ? "valid" : "invalid"); |
54 | } | 76 | + } else if (eventid > max_eventid) { |
55 | 77 | + qemu_log_mask(LOG_GUEST_ERROR, | |
56 | - if (new_el == 2 && arm_is_secure_below_el3(env)) { | 78 | + "%s: invalid command attributes: eventid %d > %d\n", |
57 | - /* Return to the non-existent secure-EL2 */ | 79 | + __func__, eventid, max_eventid); |
58 | - goto illegal_return; | 80 | } else { |
59 | - } | ||
60 | - | ||
61 | if (new_el == 1 && (arm_hcr_el2_eff(env) & HCR_TGE)) { | ||
62 | goto illegal_return; | ||
63 | } | ||
64 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
65 | index XXXXXXX..XXXXXXX 100644 | ||
66 | --- a/target/arm/helper.c | ||
67 | +++ b/target/arm/helper.c | ||
68 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult cpacr_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
69 | { | ||
70 | if (arm_feature(env, ARM_FEATURE_V8)) { | ||
71 | /* Check if CPACR accesses are to be trapped to EL2 */ | ||
72 | - if (arm_current_el(env) == 1 && | ||
73 | - (env->cp15.cptr_el[2] & CPTR_TCPAC) && !arm_is_secure(env)) { | ||
74 | + if (arm_current_el(env) == 1 && arm_is_el2_enabled(env) && | ||
75 | + (env->cp15.cptr_el[2] & CPTR_TCPAC)) { | ||
76 | return CP_ACCESS_TRAP_EL2; | ||
77 | /* Check if CPACR accesses are to be trapped to EL3 */ | ||
78 | } else if (arm_current_el(env) < 3 && | ||
79 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult gt_counter_access(CPUARMState *env, int timeridx, | ||
80 | bool isread) | ||
81 | { | ||
82 | unsigned int cur_el = arm_current_el(env); | ||
83 | - bool secure = arm_is_secure(env); | ||
84 | + bool has_el2 = arm_is_el2_enabled(env); | ||
85 | uint64_t hcr = arm_hcr_el2_eff(env); | ||
86 | |||
87 | switch (cur_el) { | ||
88 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult gt_counter_access(CPUARMState *env, int timeridx, | ||
89 | } | ||
90 | } else { | ||
91 | /* If HCR_EL2.<E2H> == 0: check CNTHCTL_EL2.EL1PCEN. */ | ||
92 | - if (arm_feature(env, ARM_FEATURE_EL2) && | ||
93 | - timeridx == GTIMER_PHYS && !secure && | ||
94 | + if (has_el2 && timeridx == GTIMER_PHYS && | ||
95 | !extract32(env->cp15.cnthctl_el2, 1, 1)) { | ||
96 | return CP_ACCESS_TRAP_EL2; | ||
97 | } | ||
98 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult gt_counter_access(CPUARMState *env, int timeridx, | ||
99 | |||
100 | case 1: | ||
101 | /* Check CNTHCTL_EL2.EL1PCTEN, which changes location based on E2H. */ | ||
102 | - if (arm_feature(env, ARM_FEATURE_EL2) && | ||
103 | - timeridx == GTIMER_PHYS && !secure && | ||
104 | + if (has_el2 && timeridx == GTIMER_PHYS && | ||
105 | (hcr & HCR_E2H | ||
106 | ? !extract32(env->cp15.cnthctl_el2, 10, 1) | ||
107 | : !extract32(env->cp15.cnthctl_el2, 0, 1))) { | ||
108 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult gt_timer_access(CPUARMState *env, int timeridx, | ||
109 | bool isread) | ||
110 | { | ||
111 | unsigned int cur_el = arm_current_el(env); | ||
112 | - bool secure = arm_is_secure(env); | ||
113 | + bool has_el2 = arm_is_el2_enabled(env); | ||
114 | uint64_t hcr = arm_hcr_el2_eff(env); | ||
115 | |||
116 | switch (cur_el) { | ||
117 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult gt_timer_access(CPUARMState *env, int timeridx, | ||
118 | /* fall through */ | ||
119 | |||
120 | case 1: | ||
121 | - if (arm_feature(env, ARM_FEATURE_EL2) && | ||
122 | - timeridx == GTIMER_PHYS && !secure) { | ||
123 | + if (has_el2 && timeridx == GTIMER_PHYS) { | ||
124 | if (hcr & HCR_E2H) { | ||
125 | /* If HCR_EL2.<E2H,TGE> == '10': check CNTHCTL_EL2.EL1PTEN. */ | ||
126 | if (!extract32(env->cp15.cnthctl_el2, 11, 1)) { | ||
127 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo strongarm_cp_reginfo[] = { | ||
128 | |||
129 | static uint64_t midr_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
130 | { | ||
131 | - ARMCPU *cpu = env_archcpu(env); | ||
132 | unsigned int cur_el = arm_current_el(env); | ||
133 | - bool secure = arm_is_secure(env); | ||
134 | |||
135 | - if (arm_feature(&cpu->env, ARM_FEATURE_EL2) && !secure && cur_el == 1) { | ||
136 | + if (arm_is_el2_enabled(env) && cur_el == 1) { | ||
137 | return env->cp15.vpidr_el2; | ||
138 | } | ||
139 | return raw_read(env, ri); | ||
140 | @@ -XXX,XX +XXX,XX @@ static uint64_t mpidr_read_val(CPUARMState *env) | ||
141 | static uint64_t mpidr_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
142 | { | ||
143 | unsigned int cur_el = arm_current_el(env); | ||
144 | - bool secure = arm_is_secure(env); | ||
145 | |||
146 | - if (arm_feature(env, ARM_FEATURE_EL2) && !secure && cur_el == 1) { | ||
147 | + if (arm_is_el2_enabled(env) && cur_el == 1) { | ||
148 | return env->cp15.vmpidr_el2; | ||
149 | } | ||
150 | return mpidr_read_val(env); | ||
151 | @@ -XXX,XX +XXX,XX @@ uint64_t arm_hcr_el2_eff(CPUARMState *env) | ||
152 | { | ||
153 | uint64_t ret = env->cp15.hcr_el2; | ||
154 | |||
155 | - if (arm_is_secure_below_el3(env)) { | ||
156 | + if (!arm_is_el2_enabled(env)) { | ||
157 | /* | 81 | /* |
158 | * "This register has no effect if EL2 is not enabled in the | 82 | * Current implementation only supports rdbase == procnum |
159 | * current Security state". This is ARMv8.4-SecEL2 speak for | ||
160 | @@ -XXX,XX +XXX,XX @@ int sve_exception_el(CPUARMState *env, int el) | ||
161 | /* CPTR_EL2. Since TZ and TFP are positive, | ||
162 | * they will be zero when EL2 is not present. | ||
163 | */ | ||
164 | - if (el <= 2 && !arm_is_secure_below_el3(env)) { | ||
165 | + if (el <= 2 && arm_is_el2_enabled(env)) { | ||
166 | if (env->cp15.cptr_el[2] & CPTR_TZ) { | ||
167 | return 2; | ||
168 | } | ||
169 | @@ -XXX,XX +XXX,XX @@ static int bad_mode_switch(CPUARMState *env, int mode, CPSRWriteType write_type) | ||
170 | } | ||
171 | return 0; | ||
172 | case ARM_CPU_MODE_HYP: | ||
173 | - return !arm_feature(env, ARM_FEATURE_EL2) | ||
174 | - || arm_current_el(env) < 2 || arm_is_secure_below_el3(env); | ||
175 | + return !arm_is_el2_enabled(env) || arm_current_el(env) < 2; | ||
176 | case ARM_CPU_MODE_MON: | ||
177 | return arm_current_el(env) < 3; | ||
178 | default: | ||
179 | @@ -XXX,XX +XXX,XX @@ int fp_exception_el(CPUARMState *env, int cur_el) | ||
180 | |||
181 | /* CPTR_EL2 : present in v7VE or v8 */ | ||
182 | if (cur_el <= 2 && extract32(env->cp15.cptr_el[2], 10, 1) | ||
183 | - && !arm_is_secure_below_el3(env)) { | ||
184 | + && arm_is_el2_enabled(env)) { | ||
185 | /* Trap FP ops at EL2, NS-EL1 or NS-EL0 to EL2 */ | ||
186 | return 2; | ||
187 | } | ||
188 | -- | 83 | -- |
189 | 2.20.1 | 84 | 2.25.1 |
190 | 85 | ||
191 | 86 | diff view generated by jsdifflib |
1 | From: Gan Qixin <ganqixin@huawei.com> | 1 | From: Joel Stanley <joel@jms.id.au> |
---|---|---|---|
2 | 2 | ||
3 | The adc_qom_set function didn't free "response", which caused an indirect | 3 | Add X11, FP5280G2, G220A, Rainier and Fuji. Mention that Swift will be |
4 | memory leak. So use qobject_unref() to fix it. | 4 | removed in v7.0. |
5 | 5 | ||
6 | ASAN shows memory leak stack: | 6 | Signed-off-by: Joel Stanley <joel@jms.id.au> |
7 | 7 | Reviewed-by: Cédric Le Goater <clg@kaod.org> | |
8 | Indirect leak of 593280 byte(s) in 144 object(s) allocated from: | 8 | Message-id: 20211117065752.330632-2-joel@jms.id.au |
9 | #0 0x7f9a5e7e8d4e in __interceptor_calloc (/lib64/libasan.so.5+0x112d4e) | ||
10 | #1 0x7f9a5e607a50 in g_malloc0 (/lib64/libglib-2.0.so.0+0x55a50) | ||
11 | #2 0x55b1bebf636b in qdict_new ../qobject/qdict.c:30 | ||
12 | #3 0x55b1bec09699 in parse_object ../qobject/json-parser.c:318 | ||
13 | #4 0x55b1bec0b2df in parse_value ../qobject/json-parser.c:546 | ||
14 | #5 0x55b1bec0b6a9 in json_parser_parse ../qobject/json-parser.c:580 | ||
15 | #6 0x55b1bec060d1 in json_message_process_token ../qobject/json-streamer.c:92 | ||
16 | #7 0x55b1bec16a12 in json_lexer_feed_char ../qobject/json-lexer.c:313 | ||
17 | #8 0x55b1bec16fbd in json_lexer_feed ../qobject/json-lexer.c:350 | ||
18 | #9 0x55b1bec06453 in json_message_parser_feed ../qobject/json-streamer.c:121 | ||
19 | #10 0x55b1bebc2d51 in qmp_fd_receive ../tests/qtest/libqtest.c:614 | ||
20 | #11 0x55b1bebc2f5e in qtest_qmp_receive_dict ../tests/qtest/libqtest.c:636 | ||
21 | #12 0x55b1bebc2e6c in qtest_qmp_receive ../tests/qtest/libqtest.c:624 | ||
22 | #13 0x55b1bebc3340 in qtest_vqmp ../tests/qtest/libqtest.c:715 | ||
23 | #14 0x55b1bebc3942 in qtest_qmp ../tests/qtest/libqtest.c:756 | ||
24 | #15 0x55b1bebbd64a in adc_qom_set ../tests/qtest/npcm7xx_adc-test.c:127 | ||
25 | #16 0x55b1bebbd793 in adc_write_input ../tests/qtest/npcm7xx_adc-test.c:140 | ||
26 | #17 0x55b1bebbdf92 in test_convert_external ../tests/qtest/npcm7xx_adc-test.c:246 | ||
27 | |||
28 | Reported-by: Euler Robot <euler.robot@huawei.com> | ||
29 | Signed-off-by: Gan Qixin <ganqixin@huawei.com> | ||
30 | Reviewed-by: Hao Wu <wuhaotsh@google.com> | ||
31 | Message-id: 20210118065627.79903-1-ganqixin@huawei.com | ||
32 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
33 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
34 | --- | 10 | --- |
35 | tests/qtest/npcm7xx_adc-test.c | 1 + | 11 | docs/system/arm/aspeed.rst | 7 ++++++- |
36 | 1 file changed, 1 insertion(+) | 12 | 1 file changed, 6 insertions(+), 1 deletion(-) |
37 | 13 | ||
38 | diff --git a/tests/qtest/npcm7xx_adc-test.c b/tests/qtest/npcm7xx_adc-test.c | 14 | diff --git a/docs/system/arm/aspeed.rst b/docs/system/arm/aspeed.rst |
39 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
40 | --- a/tests/qtest/npcm7xx_adc-test.c | 16 | --- a/docs/system/arm/aspeed.rst |
41 | +++ b/tests/qtest/npcm7xx_adc-test.c | 17 | +++ b/docs/system/arm/aspeed.rst |
42 | @@ -XXX,XX +XXX,XX @@ static void adc_qom_set(QTestState *qts, const ADC *adc, | 18 | @@ -XXX,XX +XXX,XX @@ AST2400 SoC based machines : |
43 | path, name, value); | 19 | |
44 | /* The qom set message returns successfully. */ | 20 | - ``palmetto-bmc`` OpenPOWER Palmetto POWER8 BMC |
45 | g_assert_true(qdict_haskey(response, "return")); | 21 | - ``quanta-q71l-bmc`` OpenBMC Quanta BMC |
46 | + qobject_unref(response); | 22 | +- ``supermicrox11-bmc`` Supermicro X11 BMC |
47 | } | 23 | |
48 | 24 | AST2500 SoC based machines : | |
49 | static void adc_write_input(QTestState *qts, const ADC *adc, | 25 | |
26 | @@ -XXX,XX +XXX,XX @@ AST2500 SoC based machines : | ||
27 | - ``romulus-bmc`` OpenPOWER Romulus POWER9 BMC | ||
28 | - ``witherspoon-bmc`` OpenPOWER Witherspoon POWER9 BMC | ||
29 | - ``sonorapass-bmc`` OCP SonoraPass BMC | ||
30 | -- ``swift-bmc`` OpenPOWER Swift BMC POWER9 | ||
31 | +- ``swift-bmc`` OpenPOWER Swift BMC POWER9 (to be removed in v7.0) | ||
32 | +- ``fp5280g2-bmc`` Inspur FP5280G2 BMC | ||
33 | +- ``g220a-bmc`` Bytedance G220A BMC | ||
34 | |||
35 | AST2600 SoC based machines : | ||
36 | |||
37 | - ``ast2600-evb`` Aspeed AST2600 Evaluation board (Cortex-A7) | ||
38 | - ``tacoma-bmc`` OpenPOWER Witherspoon POWER9 AST2600 BMC | ||
39 | +- ``rainier-bmc`` IBM Rainier POWER10 BMC | ||
40 | +- ``fuji-bmc`` Facebook Fuji BMC | ||
41 | |||
42 | Supported devices | ||
43 | ----------------- | ||
50 | -- | 44 | -- |
51 | 2.20.1 | 45 | 2.25.1 |
52 | 46 | ||
53 | 47 | diff view generated by jsdifflib |
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 1 | From: Joel Stanley <joel@jms.id.au> |
---|---|---|---|
2 | 2 | ||
3 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 3 | This is the latest URL for the OpenBMC CI. The old URL still works, but |
4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 4 | redirects. |
5 | Message-id: 20210112104511.36576-19-remi.denis.courmont@huawei.com | 5 | |
6 | Reviewed-by: Cédric Le Goater <clg@kaod.org> | ||
7 | Signed-off-by: Joel Stanley <joel@jms.id.au> | ||
8 | Message-id: 20211117065752.330632-3-joel@jms.id.au | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | --- | 10 | --- |
8 | target/arm/helper.c | 25 +++++++++++-------------- | 11 | docs/system/arm/aspeed.rst | 2 +- |
9 | 1 file changed, 11 insertions(+), 14 deletions(-) | 12 | 1 file changed, 1 insertion(+), 1 deletion(-) |
10 | 13 | ||
11 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 14 | diff --git a/docs/system/arm/aspeed.rst b/docs/system/arm/aspeed.rst |
12 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
13 | --- a/target/arm/helper.c | 16 | --- a/docs/system/arm/aspeed.rst |
14 | +++ b/target/arm/helper.c | 17 | +++ b/docs/system/arm/aspeed.rst |
15 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult aa64_cacheop_pou_access(CPUARMState *env, | 18 | @@ -XXX,XX +XXX,XX @@ The Aspeed machines can be started using the ``-kernel`` option to |
16 | static int vae1_tlbmask(CPUARMState *env) | 19 | load a Linux kernel or from a firmware. Images can be downloaded from |
17 | { | 20 | the OpenBMC jenkins : |
18 | uint64_t hcr = arm_hcr_el2_eff(env); | 21 | |
19 | + uint16_t mask; | 22 | - https://jenkins.openbmc.org/job/ci-openbmc/lastSuccessfulBuild/distro=ubuntu,label=docker-builder |
20 | 23 | + https://jenkins.openbmc.org/job/ci-openbmc/lastSuccessfulBuild/ | |
21 | if ((hcr & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE)) { | 24 | |
22 | - uint16_t mask = ARMMMUIdxBit_E20_2 | | 25 | or directly from the OpenBMC GitHub release repository : |
23 | - ARMMMUIdxBit_E20_2_PAN | | 26 | |
24 | - ARMMMUIdxBit_E20_0; | ||
25 | - | ||
26 | - if (arm_is_secure_below_el3(env)) { | ||
27 | - mask >>= ARM_MMU_IDX_A_NS; | ||
28 | - } | ||
29 | - | ||
30 | - return mask; | ||
31 | - } else if (arm_is_secure_below_el3(env)) { | ||
32 | - return ARMMMUIdxBit_SE10_1 | | ||
33 | - ARMMMUIdxBit_SE10_1_PAN | | ||
34 | - ARMMMUIdxBit_SE10_0; | ||
35 | + mask = ARMMMUIdxBit_E20_2 | | ||
36 | + ARMMMUIdxBit_E20_2_PAN | | ||
37 | + ARMMMUIdxBit_E20_0; | ||
38 | } else { | ||
39 | - return ARMMMUIdxBit_E10_1 | | ||
40 | + mask = ARMMMUIdxBit_E10_1 | | ||
41 | ARMMMUIdxBit_E10_1_PAN | | ||
42 | ARMMMUIdxBit_E10_0; | ||
43 | } | ||
44 | + | ||
45 | + if (arm_is_secure_below_el3(env)) { | ||
46 | + mask >>= ARM_MMU_IDX_A_NS; | ||
47 | + } | ||
48 | + | ||
49 | + return mask; | ||
50 | } | ||
51 | |||
52 | /* Return 56 if TBI is enabled, 64 otherwise. */ | ||
53 | -- | 27 | -- |
54 | 2.20.1 | 28 | 2.25.1 |
55 | 29 | ||
56 | 30 | diff view generated by jsdifflib |
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 1 | From: Joel Stanley <joel@jms.id.au> |
---|---|---|---|
2 | 2 | ||
3 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 3 | A common use case for the ASPEED machine is to boot a Linux kernel. |
4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 4 | Provide a full example command line. |
5 | Message-id: 20210112104511.36576-18-remi.denis.courmont@huawei.com | 5 | |
6 | Reviewed-by: Cédric Le Goater <clg@kaod.org> | ||
7 | Signed-off-by: Joel Stanley <joel@jms.id.au> | ||
8 | Message-id: 20211117065752.330632-4-joel@jms.id.au | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | --- | 10 | --- |
8 | target/arm/cpu64.c | 1 + | 11 | docs/system/arm/aspeed.rst | 15 ++++++++++++--- |
9 | 1 file changed, 1 insertion(+) | 12 | 1 file changed, 12 insertions(+), 3 deletions(-) |
10 | 13 | ||
11 | diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c | 14 | diff --git a/docs/system/arm/aspeed.rst b/docs/system/arm/aspeed.rst |
12 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
13 | --- a/target/arm/cpu64.c | 16 | --- a/docs/system/arm/aspeed.rst |
14 | +++ b/target/arm/cpu64.c | 17 | +++ b/docs/system/arm/aspeed.rst |
15 | @@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj) | 18 | @@ -XXX,XX +XXX,XX @@ Missing devices |
16 | t = FIELD_DP64(t, ID_AA64PFR0, SVE, 1); | 19 | Boot options |
17 | t = FIELD_DP64(t, ID_AA64PFR0, FP, 1); | 20 | ------------ |
18 | t = FIELD_DP64(t, ID_AA64PFR0, ADVSIMD, 1); | 21 | |
19 | + t = FIELD_DP64(t, ID_AA64PFR0, SEL2, 1); | 22 | -The Aspeed machines can be started using the ``-kernel`` option to |
20 | cpu->isar.id_aa64pfr0 = t; | 23 | -load a Linux kernel or from a firmware. Images can be downloaded from |
21 | 24 | -the OpenBMC jenkins : | |
22 | t = cpu->isar.id_aa64pfr1; | 25 | +The Aspeed machines can be started using the ``-kernel`` and ``-dtb`` options |
26 | +to load a Linux kernel or from a firmware. Images can be downloaded from the | ||
27 | +OpenBMC jenkins : | ||
28 | |||
29 | https://jenkins.openbmc.org/job/ci-openbmc/lastSuccessfulBuild/ | ||
30 | |||
31 | @@ -XXX,XX +XXX,XX @@ or directly from the OpenBMC GitHub release repository : | ||
32 | |||
33 | https://github.com/openbmc/openbmc/releases | ||
34 | |||
35 | +To boot a kernel directly from a Linux build tree: | ||
36 | + | ||
37 | +.. code-block:: bash | ||
38 | + | ||
39 | + $ qemu-system-arm -M ast2600-evb -nographic \ | ||
40 | + -kernel arch/arm/boot/zImage \ | ||
41 | + -dtb arch/arm/boot/dts/aspeed-ast2600-evb.dtb \ | ||
42 | + -initrd rootfs.cpio | ||
43 | + | ||
44 | The image should be attached as an MTD drive. Run : | ||
45 | |||
46 | .. code-block:: bash | ||
23 | -- | 47 | -- |
24 | 2.20.1 | 48 | 2.25.1 |
25 | 49 | ||
26 | 50 | diff view generated by jsdifflib |
1 | From: Philippe Mathieu-Daudé <f4bug@amsat.org> | 1 | From: Joel Stanley <joel@jms.id.au> |
---|---|---|---|
2 | 2 | ||
3 | When building with GCC 10.2 configured with --extra-cflags=-Os, we get: | 3 | Move it to the supported list. |
4 | 4 | ||
5 | target/arm/m_helper.c: In function ‘arm_v7m_cpu_do_interrupt’: | 5 | Signed-off-by: Joel Stanley <joel@jms.id.au> |
6 | target/arm/m_helper.c:1811:16: error: ‘restore_s16_s31’ may be used uninitialized in this function [-Werror=maybe-uninitialized] | 6 | Message-id: 20211117065752.330632-5-joel@jms.id.au |
7 | 1811 | if (restore_s16_s31) { | ||
8 | | ^ | ||
9 | target/arm/m_helper.c:1350:10: note: ‘restore_s16_s31’ was declared here | ||
10 | 1350 | bool restore_s16_s31; | ||
11 | | ^~~~~~~~~~~~~~~ | ||
12 | cc1: all warnings being treated as errors | ||
13 | |||
14 | Initialize the 'restore_s16_s31' variable to silence the warning. | ||
15 | |||
16 | Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
17 | Message-id: 20210119062739.589049-1-f4bug@amsat.org | ||
18 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
19 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
20 | --- | 8 | --- |
21 | target/arm/m_helper.c | 2 +- | 9 | docs/system/arm/aspeed.rst | 2 +- |
22 | 1 file changed, 1 insertion(+), 1 deletion(-) | 10 | 1 file changed, 1 insertion(+), 1 deletion(-) |
23 | 11 | ||
24 | diff --git a/target/arm/m_helper.c b/target/arm/m_helper.c | 12 | diff --git a/docs/system/arm/aspeed.rst b/docs/system/arm/aspeed.rst |
25 | index XXXXXXX..XXXXXXX 100644 | 13 | index XXXXXXX..XXXXXXX 100644 |
26 | --- a/target/arm/m_helper.c | 14 | --- a/docs/system/arm/aspeed.rst |
27 | +++ b/target/arm/m_helper.c | 15 | +++ b/docs/system/arm/aspeed.rst |
28 | @@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu) | 16 | @@ -XXX,XX +XXX,XX @@ Supported devices |
29 | bool exc_secure = false; | 17 | * Front LEDs (PCA9552 on I2C bus) |
30 | bool return_to_secure; | 18 | * LPC Peripheral Controller (a subset of subdevices are supported) |
31 | bool ftype; | 19 | * Hash/Crypto Engine (HACE) - Hash support only. TODO: HMAC and RSA |
32 | - bool restore_s16_s31; | 20 | + * ADC |
33 | + bool restore_s16_s31 = false; | 21 | |
34 | 22 | ||
35 | /* | 23 | Missing devices |
36 | * If we're not in Handler mode then jumps to magic exception-exit | 24 | --------------- |
25 | |||
26 | * Coprocessor support | ||
27 | - * ADC (out of tree implementation) | ||
28 | * PWM and Fan Controller | ||
29 | * Slave GPIO Controller | ||
30 | * Super I/O Controller | ||
37 | -- | 31 | -- |
38 | 2.20.1 | 32 | 2.25.1 |
39 | 33 | ||
40 | 34 | diff view generated by jsdifflib |
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 1 | From: Olivier Hériveaux <olivier.heriveaux@ledger.fr> |
---|---|---|---|
2 | 2 | ||
3 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 3 | Fix issue where the data register may be overwritten by next character |
4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 4 | reception before being read and returned. |
5 | Message-id: 20210112104511.36576-14-remi.denis.courmont@huawei.com | 5 | |
6 | Signed-off-by: Olivier Hériveaux <olivier.heriveaux@ledger.fr> | ||
7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Reviewed-by: Alistair Francis <alistair.francis@wdc.com> | ||
9 | Message-id: 20211128120723.4053-1-olivier.heriveaux@ledger.fr | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | --- | 11 | --- |
8 | target/arm/cpu.h | 6 +++- | 12 | hw/char/stm32f2xx_usart.c | 3 ++- |
9 | target/arm/internals.h | 22 ++++++++++++ | 13 | 1 file changed, 2 insertions(+), 1 deletion(-) |
10 | target/arm/helper.c | 78 +++++++++++++++++++++++++++++------------- | ||
11 | 3 files changed, 81 insertions(+), 25 deletions(-) | ||
12 | 14 | ||
13 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 15 | diff --git a/hw/char/stm32f2xx_usart.c b/hw/char/stm32f2xx_usart.c |
14 | index XXXXXXX..XXXXXXX 100644 | 16 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/target/arm/cpu.h | 17 | --- a/hw/char/stm32f2xx_usart.c |
16 | +++ b/target/arm/cpu.h | 18 | +++ b/hw/char/stm32f2xx_usart.c |
17 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdx { | 19 | @@ -XXX,XX +XXX,XX @@ static uint64_t stm32f2xx_usart_read(void *opaque, hwaddr addr, |
18 | ARMMMUIdx_Stage1_E0 = 0 | ARM_MMU_IDX_NOTLB, | 20 | return retvalue; |
19 | ARMMMUIdx_Stage1_E1 = 1 | ARM_MMU_IDX_NOTLB, | 21 | case USART_DR: |
20 | ARMMMUIdx_Stage1_E1_PAN = 2 | ARM_MMU_IDX_NOTLB, | 22 | DB_PRINT("Value: 0x%" PRIx32 ", %c\n", s->usart_dr, (char) s->usart_dr); |
21 | + ARMMMUIdx_Stage1_SE0 = 3 | ARM_MMU_IDX_NOTLB, | 23 | + retvalue = s->usart_dr & 0x3FF; |
22 | + ARMMMUIdx_Stage1_SE1 = 4 | ARM_MMU_IDX_NOTLB, | 24 | s->usart_sr &= ~USART_SR_RXNE; |
23 | + ARMMMUIdx_Stage1_SE1_PAN = 5 | ARM_MMU_IDX_NOTLB, | 25 | qemu_chr_fe_accept_input(&s->chr); |
24 | /* | 26 | qemu_set_irq(s->irq, 0); |
25 | * Not allocated a TLB: used only for second stage of an S12 page | 27 | - return s->usart_dr & 0x3FF; |
26 | * table walk, or for descriptor loads during first stage of an S1 | 28 | + return retvalue; |
27 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdx { | 29 | case USART_BRR: |
28 | * then various TLB flush insns which currently are no-ops or flush | 30 | return s->usart_brr; |
29 | * only stage 1 MMU indexes will need to change to flush stage 2. | 31 | case USART_CR1: |
30 | */ | ||
31 | - ARMMMUIdx_Stage2 = 3 | ARM_MMU_IDX_NOTLB, | ||
32 | + ARMMMUIdx_Stage2 = 6 | ARM_MMU_IDX_NOTLB, | ||
33 | + ARMMMUIdx_Stage2_S = 7 | ARM_MMU_IDX_NOTLB, | ||
34 | |||
35 | /* | ||
36 | * M-profile. | ||
37 | diff --git a/target/arm/internals.h b/target/arm/internals.h | ||
38 | index XXXXXXX..XXXXXXX 100644 | ||
39 | --- a/target/arm/internals.h | ||
40 | +++ b/target/arm/internals.h | ||
41 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_has_2_ranges(ARMMMUIdx mmu_idx) | ||
42 | case ARMMMUIdx_Stage1_E0: | ||
43 | case ARMMMUIdx_Stage1_E1: | ||
44 | case ARMMMUIdx_Stage1_E1_PAN: | ||
45 | + case ARMMMUIdx_Stage1_SE0: | ||
46 | + case ARMMMUIdx_Stage1_SE1: | ||
47 | + case ARMMMUIdx_Stage1_SE1_PAN: | ||
48 | case ARMMMUIdx_E10_0: | ||
49 | case ARMMMUIdx_E10_1: | ||
50 | case ARMMMUIdx_E10_1_PAN: | ||
51 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_secure(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
52 | case ARMMMUIdx_SE20_0: | ||
53 | case ARMMMUIdx_SE20_2: | ||
54 | case ARMMMUIdx_SE20_2_PAN: | ||
55 | + case ARMMMUIdx_Stage1_SE0: | ||
56 | + case ARMMMUIdx_Stage1_SE1: | ||
57 | + case ARMMMUIdx_Stage1_SE1_PAN: | ||
58 | case ARMMMUIdx_SE2: | ||
59 | + case ARMMMUIdx_Stage2_S: | ||
60 | case ARMMMUIdx_MSPrivNegPri: | ||
61 | case ARMMMUIdx_MSUserNegPri: | ||
62 | case ARMMMUIdx_MSPriv: | ||
63 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_pan(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
64 | { | ||
65 | switch (mmu_idx) { | ||
66 | case ARMMMUIdx_Stage1_E1_PAN: | ||
67 | + case ARMMMUIdx_Stage1_SE1_PAN: | ||
68 | case ARMMMUIdx_E10_1_PAN: | ||
69 | case ARMMMUIdx_E20_2_PAN: | ||
70 | case ARMMMUIdx_SE10_1_PAN: | ||
71 | @@ -XXX,XX +XXX,XX @@ static inline uint32_t regime_el(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
72 | case ARMMMUIdx_E20_2: | ||
73 | case ARMMMUIdx_E20_2_PAN: | ||
74 | case ARMMMUIdx_Stage2: | ||
75 | + case ARMMMUIdx_Stage2_S: | ||
76 | case ARMMMUIdx_SE2: | ||
77 | case ARMMMUIdx_E2: | ||
78 | return 2; | ||
79 | case ARMMMUIdx_SE3: | ||
80 | return 3; | ||
81 | case ARMMMUIdx_SE10_0: | ||
82 | + case ARMMMUIdx_Stage1_SE0: | ||
83 | return arm_el_is_aa64(env, 3) ? 1 : 3; | ||
84 | case ARMMMUIdx_SE10_1: | ||
85 | case ARMMMUIdx_SE10_1_PAN: | ||
86 | case ARMMMUIdx_Stage1_E0: | ||
87 | case ARMMMUIdx_Stage1_E1: | ||
88 | case ARMMMUIdx_Stage1_E1_PAN: | ||
89 | + case ARMMMUIdx_Stage1_SE1: | ||
90 | + case ARMMMUIdx_Stage1_SE1_PAN: | ||
91 | case ARMMMUIdx_E10_0: | ||
92 | case ARMMMUIdx_E10_1: | ||
93 | case ARMMMUIdx_E10_1_PAN: | ||
94 | @@ -XXX,XX +XXX,XX @@ static inline TCR *regime_tcr(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
95 | if (mmu_idx == ARMMMUIdx_Stage2) { | ||
96 | return &env->cp15.vtcr_el2; | ||
97 | } | ||
98 | + if (mmu_idx == ARMMMUIdx_Stage2_S) { | ||
99 | + /* | ||
100 | + * Note: Secure stage 2 nominally shares fields from VTCR_EL2, but | ||
101 | + * those are not currently used by QEMU, so just return VSTCR_EL2. | ||
102 | + */ | ||
103 | + return &env->cp15.vstcr_el2; | ||
104 | + } | ||
105 | return &env->cp15.tcr_el[regime_el(env, mmu_idx)]; | ||
106 | } | ||
107 | |||
108 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_mmu_idx_is_stage1_of_2(ARMMMUIdx mmu_idx) | ||
109 | case ARMMMUIdx_Stage1_E0: | ||
110 | case ARMMMUIdx_Stage1_E1: | ||
111 | case ARMMMUIdx_Stage1_E1_PAN: | ||
112 | + case ARMMMUIdx_Stage1_SE0: | ||
113 | + case ARMMMUIdx_Stage1_SE1: | ||
114 | + case ARMMMUIdx_Stage1_SE1_PAN: | ||
115 | return true; | ||
116 | default: | ||
117 | return false; | ||
118 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
119 | index XXXXXXX..XXXXXXX 100644 | ||
120 | --- a/target/arm/helper.c | ||
121 | +++ b/target/arm/helper.c | ||
122 | @@ -XXX,XX +XXX,XX @@ static uint64_t do_ats_write(CPUARMState *env, uint64_t value, | ||
123 | uint32_t syn, fsr, fsc; | ||
124 | bool take_exc = false; | ||
125 | |||
126 | - if (fi.s1ptw && current_el == 1 && !arm_is_secure(env) | ||
127 | + if (fi.s1ptw && current_el == 1 | ||
128 | && arm_mmu_idx_is_stage1_of_2(mmu_idx)) { | ||
129 | /* | ||
130 | * Synchronous stage 2 fault on an access made as part of the | ||
131 | @@ -XXX,XX +XXX,XX @@ static void ats_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
132 | /* fall through */ | ||
133 | case 1: | ||
134 | if (ri->crm == 9 && (env->uncached_cpsr & CPSR_PAN)) { | ||
135 | - mmu_idx = (secure ? ARMMMUIdx_SE10_1_PAN | ||
136 | + mmu_idx = (secure ? ARMMMUIdx_Stage1_SE1_PAN | ||
137 | : ARMMMUIdx_Stage1_E1_PAN); | ||
138 | } else { | ||
139 | - mmu_idx = secure ? ARMMMUIdx_SE10_1 : ARMMMUIdx_Stage1_E1; | ||
140 | + mmu_idx = secure ? ARMMMUIdx_Stage1_SE1 : ARMMMUIdx_Stage1_E1; | ||
141 | } | ||
142 | break; | ||
143 | default: | ||
144 | @@ -XXX,XX +XXX,XX @@ static void ats_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
145 | mmu_idx = ARMMMUIdx_SE10_0; | ||
146 | break; | ||
147 | case 2: | ||
148 | + g_assert(!secure); /* ARMv8.4-SecEL2 is 64-bit only */ | ||
149 | mmu_idx = ARMMMUIdx_Stage1_E0; | ||
150 | break; | ||
151 | case 1: | ||
152 | - mmu_idx = secure ? ARMMMUIdx_SE10_0 : ARMMMUIdx_Stage1_E0; | ||
153 | + mmu_idx = secure ? ARMMMUIdx_Stage1_SE0 : ARMMMUIdx_Stage1_E0; | ||
154 | break; | ||
155 | default: | ||
156 | g_assert_not_reached(); | ||
157 | @@ -XXX,XX +XXX,XX @@ static void ats_write64(CPUARMState *env, const ARMCPRegInfo *ri, | ||
158 | switch (ri->opc1) { | ||
159 | case 0: /* AT S1E1R, AT S1E1W, AT S1E1RP, AT S1E1WP */ | ||
160 | if (ri->crm == 9 && (env->pstate & PSTATE_PAN)) { | ||
161 | - mmu_idx = (secure ? ARMMMUIdx_SE10_1_PAN | ||
162 | + mmu_idx = (secure ? ARMMMUIdx_Stage1_SE1_PAN | ||
163 | : ARMMMUIdx_Stage1_E1_PAN); | ||
164 | } else { | ||
165 | - mmu_idx = secure ? ARMMMUIdx_SE10_1 : ARMMMUIdx_Stage1_E1; | ||
166 | + mmu_idx = secure ? ARMMMUIdx_Stage1_SE1 : ARMMMUIdx_Stage1_E1; | ||
167 | } | ||
168 | break; | ||
169 | case 4: /* AT S1E2R, AT S1E2W */ | ||
170 | @@ -XXX,XX +XXX,XX @@ static void ats_write64(CPUARMState *env, const ARMCPRegInfo *ri, | ||
171 | } | ||
172 | break; | ||
173 | case 2: /* AT S1E0R, AT S1E0W */ | ||
174 | - mmu_idx = secure ? ARMMMUIdx_SE10_0 : ARMMMUIdx_Stage1_E0; | ||
175 | + mmu_idx = secure ? ARMMMUIdx_Stage1_SE0 : ARMMMUIdx_Stage1_E0; | ||
176 | break; | ||
177 | case 4: /* AT S12E1R, AT S12E1W */ | ||
178 | mmu_idx = secure ? ARMMMUIdx_SE10_1 : ARMMMUIdx_E10_1; | ||
179 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_translation_disabled(CPUARMState *env, | ||
180 | |||
181 | hcr_el2 = arm_hcr_el2_eff(env); | ||
182 | |||
183 | - if (mmu_idx == ARMMMUIdx_Stage2) { | ||
184 | + if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
185 | /* HCR.DC means HCR.VM behaves as 1 */ | ||
186 | return (hcr_el2 & (HCR_DC | HCR_VM)) == 0; | ||
187 | } | ||
188 | @@ -XXX,XX +XXX,XX @@ static inline uint64_t regime_ttbr(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
189 | if (mmu_idx == ARMMMUIdx_Stage2) { | ||
190 | return env->cp15.vttbr_el2; | ||
191 | } | ||
192 | + if (mmu_idx == ARMMMUIdx_Stage2_S) { | ||
193 | + return env->cp15.vsttbr_el2; | ||
194 | + } | ||
195 | if (ttbrn == 0) { | ||
196 | return env->cp15.ttbr0_el[regime_el(env, mmu_idx)]; | ||
197 | } else { | ||
198 | @@ -XXX,XX +XXX,XX @@ static inline uint64_t regime_ttbr(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
199 | static inline ARMMMUIdx stage_1_mmu_idx(ARMMMUIdx mmu_idx) | ||
200 | { | ||
201 | switch (mmu_idx) { | ||
202 | + case ARMMMUIdx_SE10_0: | ||
203 | + return ARMMMUIdx_Stage1_SE0; | ||
204 | + case ARMMMUIdx_SE10_1: | ||
205 | + return ARMMMUIdx_Stage1_SE1; | ||
206 | + case ARMMMUIdx_SE10_1_PAN: | ||
207 | + return ARMMMUIdx_Stage1_SE1_PAN; | ||
208 | case ARMMMUIdx_E10_0: | ||
209 | return ARMMMUIdx_Stage1_E0; | ||
210 | case ARMMMUIdx_E10_1: | ||
211 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_user(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
212 | case ARMMMUIdx_E20_0: | ||
213 | case ARMMMUIdx_SE20_0: | ||
214 | case ARMMMUIdx_Stage1_E0: | ||
215 | + case ARMMMUIdx_Stage1_SE0: | ||
216 | case ARMMMUIdx_MUser: | ||
217 | case ARMMMUIdx_MSUser: | ||
218 | case ARMMMUIdx_MUserNegPri: | ||
219 | @@ -XXX,XX +XXX,XX @@ static int get_S1prot(CPUARMState *env, ARMMMUIdx mmu_idx, bool is_aa64, | ||
220 | int wxn = 0; | ||
221 | |||
222 | assert(mmu_idx != ARMMMUIdx_Stage2); | ||
223 | + assert(mmu_idx != ARMMMUIdx_Stage2_S); | ||
224 | |||
225 | user_rw = simple_ap_to_rw_prot_is_user(ap, true); | ||
226 | if (is_user) { | ||
227 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
228 | hwaddr s2pa; | ||
229 | int s2prot; | ||
230 | int ret; | ||
231 | + ARMMMUIdx s2_mmu_idx = *is_secure ? ARMMMUIdx_Stage2_S | ||
232 | + : ARMMMUIdx_Stage2; | ||
233 | ARMCacheAttrs cacheattrs = {}; | ||
234 | MemTxAttrs txattrs = {}; | ||
235 | |||
236 | - assert(!*is_secure); /* TODO: S-EL2 */ | ||
237 | - | ||
238 | - ret = get_phys_addr_lpae(env, addr, MMU_DATA_LOAD, ARMMMUIdx_Stage2, | ||
239 | - false, | ||
240 | + ret = get_phys_addr_lpae(env, addr, MMU_DATA_LOAD, s2_mmu_idx, false, | ||
241 | &s2pa, &txattrs, &s2prot, &s2size, fi, | ||
242 | &cacheattrs); | ||
243 | if (ret) { | ||
244 | @@ -XXX,XX +XXX,XX @@ static int aa64_va_parameter_tbi(uint64_t tcr, ARMMMUIdx mmu_idx) | ||
245 | { | ||
246 | if (regime_has_2_ranges(mmu_idx)) { | ||
247 | return extract64(tcr, 37, 2); | ||
248 | - } else if (mmu_idx == ARMMMUIdx_Stage2) { | ||
249 | + } else if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
250 | return 0; /* VTCR_EL2 */ | ||
251 | } else { | ||
252 | /* Replicate the single TBI bit so we always have 2 bits. */ | ||
253 | @@ -XXX,XX +XXX,XX @@ static int aa64_va_parameter_tbid(uint64_t tcr, ARMMMUIdx mmu_idx) | ||
254 | { | ||
255 | if (regime_has_2_ranges(mmu_idx)) { | ||
256 | return extract64(tcr, 51, 2); | ||
257 | - } else if (mmu_idx == ARMMMUIdx_Stage2) { | ||
258 | + } else if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
259 | return 0; /* VTCR_EL2 */ | ||
260 | } else { | ||
261 | /* Replicate the single TBID bit so we always have 2 bits. */ | ||
262 | @@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va, | ||
263 | tsz = extract32(tcr, 0, 6); | ||
264 | using64k = extract32(tcr, 14, 1); | ||
265 | using16k = extract32(tcr, 15, 1); | ||
266 | - if (mmu_idx == ARMMMUIdx_Stage2) { | ||
267 | + if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
268 | /* VTCR_EL2 */ | ||
269 | hpd = false; | ||
270 | } else { | ||
271 | @@ -XXX,XX +XXX,XX @@ static ARMVAParameters aa32_va_parameters(CPUARMState *env, uint32_t va, | ||
272 | int select, tsz; | ||
273 | bool epd, hpd; | ||
274 | |||
275 | + assert(mmu_idx != ARMMMUIdx_Stage2_S); | ||
276 | + | ||
277 | if (mmu_idx == ARMMMUIdx_Stage2) { | ||
278 | /* VTCR */ | ||
279 | bool sext = extract32(tcr, 4, 1); | ||
280 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
281 | goto do_fault; | ||
282 | } | ||
283 | |||
284 | - if (mmu_idx != ARMMMUIdx_Stage2) { | ||
285 | + if (mmu_idx != ARMMMUIdx_Stage2 && mmu_idx != ARMMMUIdx_Stage2_S) { | ||
286 | /* The starting level depends on the virtual address size (which can | ||
287 | * be up to 48 bits) and the translation granule size. It indicates | ||
288 | * the number of strides (stride bits at a time) needed to | ||
289 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
290 | attrs = extract64(descriptor, 2, 10) | ||
291 | | (extract64(descriptor, 52, 12) << 10); | ||
292 | |||
293 | - if (mmu_idx == ARMMMUIdx_Stage2) { | ||
294 | + if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
295 | /* Stage 2 table descriptors do not include any attribute fields */ | ||
296 | break; | ||
297 | } | ||
298 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
299 | |||
300 | ap = extract32(attrs, 4, 2); | ||
301 | |||
302 | - if (mmu_idx == ARMMMUIdx_Stage2) { | ||
303 | - ns = true; | ||
304 | + if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
305 | + ns = mmu_idx == ARMMMUIdx_Stage2; | ||
306 | xn = extract32(attrs, 11, 2); | ||
307 | *prot = get_S2prot(env, ap, xn, s1_is_el0); | ||
308 | } else { | ||
309 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address, | ||
310 | arm_tlb_bti_gp(txattrs) = true; | ||
311 | } | ||
312 | |||
313 | - if (mmu_idx == ARMMMUIdx_Stage2) { | ||
314 | + if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) { | ||
315 | cacheattrs->attrs = convert_stage2_attrs(env, extract32(attrs, 0, 4)); | ||
316 | } else { | ||
317 | /* Index into MAIR registers for cache attributes */ | ||
318 | @@ -XXX,XX +XXX,XX @@ do_fault: | ||
319 | fi->type = fault_type; | ||
320 | fi->level = level; | ||
321 | /* Tag the error as S2 for failed S1 PTW at S2 or ordinary S2. */ | ||
322 | - fi->stage2 = fi->s1ptw || (mmu_idx == ARMMMUIdx_Stage2); | ||
323 | + fi->stage2 = fi->s1ptw || (mmu_idx == ARMMMUIdx_Stage2 || | ||
324 | + mmu_idx == ARMMMUIdx_Stage2_S); | ||
325 | return true; | ||
326 | } | ||
327 | |||
328 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
329 | int s2_prot; | ||
330 | int ret; | ||
331 | ARMCacheAttrs cacheattrs2 = {}; | ||
332 | + ARMMMUIdx s2_mmu_idx; | ||
333 | + bool is_el0; | ||
334 | |||
335 | ret = get_phys_addr(env, address, access_type, s1_mmu_idx, &ipa, | ||
336 | attrs, prot, page_size, fi, cacheattrs); | ||
337 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
338 | return ret; | ||
339 | } | ||
340 | |||
341 | + s2_mmu_idx = attrs->secure ? ARMMMUIdx_Stage2_S : ARMMMUIdx_Stage2; | ||
342 | + is_el0 = mmu_idx == ARMMMUIdx_E10_0 || mmu_idx == ARMMMUIdx_SE10_0; | ||
343 | + | ||
344 | /* S1 is done. Now do S2 translation. */ | ||
345 | - ret = get_phys_addr_lpae(env, ipa, access_type, ARMMMUIdx_Stage2, | ||
346 | - mmu_idx == ARMMMUIdx_E10_0, | ||
347 | + ret = get_phys_addr_lpae(env, ipa, access_type, s2_mmu_idx, is_el0, | ||
348 | phys_ptr, attrs, &s2_prot, | ||
349 | page_size, fi, &cacheattrs2); | ||
350 | fi->s2addr = ipa; | ||
351 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
352 | cacheattrs->shareability = 0; | ||
353 | } | ||
354 | *cacheattrs = combine_cacheattrs(*cacheattrs, cacheattrs2); | ||
355 | + | ||
356 | + /* Check if IPA translates to secure or non-secure PA space. */ | ||
357 | + if (arm_is_secure_below_el3(env)) { | ||
358 | + if (attrs->secure) { | ||
359 | + attrs->secure = | ||
360 | + !(env->cp15.vstcr_el2.raw_tcr & (VSTCR_SA | VSTCR_SW)); | ||
361 | + } else { | ||
362 | + attrs->secure = | ||
363 | + !((env->cp15.vtcr_el2.raw_tcr & (VTCR_NSA | VTCR_NSW)) | ||
364 | + || (env->cp15.vstcr_el2.raw_tcr & VSTCR_SA)); | ||
365 | + } | ||
366 | + } | ||
367 | return 0; | ||
368 | } else { | ||
369 | /* | ||
370 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
371 | * MMU disabled. S1 addresses within aa64 translation regimes are | ||
372 | * still checked for bounds -- see AArch64.TranslateAddressS1Off. | ||
373 | */ | ||
374 | - if (mmu_idx != ARMMMUIdx_Stage2) { | ||
375 | + if (mmu_idx != ARMMMUIdx_Stage2 && mmu_idx != ARMMMUIdx_Stage2_S) { | ||
376 | int r_el = regime_el(env, mmu_idx); | ||
377 | if (arm_el_is_aa64(env, r_el)) { | ||
378 | int pamax = arm_pamax(env_archcpu(env)); | ||
379 | -- | 32 | -- |
380 | 2.20.1 | 33 | 2.25.1 |
381 | 34 | ||
382 | 35 | diff view generated by jsdifflib |
1 | From: Mihai Carabas <mihai.carabas@oracle.com> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | Add a test case for pvpanic-pci device. The scenario is the same as pvpapnic | 3 | gicv3_set_gicv3state() is used by arm_gicv3_common.c in |
4 | ISA device, but is using the PCI bus. | 4 | arm_gicv3_common_realize(). Since we want to restrict |
5 | arm_gicv3_cpuif.c to TCG, extract gicv3_set_gicv3state() | ||
6 | to a new file. Add this file to the meson 'specific' | ||
7 | source set, since it needs access to "cpu.h". | ||
5 | 8 | ||
6 | Signed-off-by: Mihai Carabas <mihai.carabas@oracle.com> | 9 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> |
7 | Acked-by: Thomas Huth <thuth@redhat.com> | ||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
11 | Message-id: 20211115223619.2599282-2-philmd@redhat.com | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | --- | 13 | --- |
11 | tests/qtest/pvpanic-pci-test.c | 62 ++++++++++++++++++++++++++++++++++ | 14 | hw/intc/arm_gicv3_cpuif.c | 10 +--------- |
12 | tests/qtest/meson.build | 1 + | 15 | hw/intc/arm_gicv3_cpuif_common.c | 22 ++++++++++++++++++++++ |
13 | 2 files changed, 63 insertions(+) | 16 | hw/intc/meson.build | 1 + |
14 | create mode 100644 tests/qtest/pvpanic-pci-test.c | 17 | 3 files changed, 24 insertions(+), 9 deletions(-) |
18 | create mode 100644 hw/intc/arm_gicv3_cpuif_common.c | ||
15 | 19 | ||
16 | diff --git a/tests/qtest/pvpanic-pci-test.c b/tests/qtest/pvpanic-pci-test.c | 20 | diff --git a/hw/intc/arm_gicv3_cpuif.c b/hw/intc/arm_gicv3_cpuif.c |
21 | index XXXXXXX..XXXXXXX 100644 | ||
22 | --- a/hw/intc/arm_gicv3_cpuif.c | ||
23 | +++ b/hw/intc/arm_gicv3_cpuif.c | ||
24 | @@ -XXX,XX +XXX,XX @@ | ||
25 | /* | ||
26 | - * ARM Generic Interrupt Controller v3 | ||
27 | + * ARM Generic Interrupt Controller v3 (emulation) | ||
28 | * | ||
29 | * Copyright (c) 2016 Linaro Limited | ||
30 | * Written by Peter Maydell | ||
31 | @@ -XXX,XX +XXX,XX @@ | ||
32 | #include "hw/irq.h" | ||
33 | #include "cpu.h" | ||
34 | |||
35 | -void gicv3_set_gicv3state(CPUState *cpu, GICv3CPUState *s) | ||
36 | -{ | ||
37 | - ARMCPU *arm_cpu = ARM_CPU(cpu); | ||
38 | - CPUARMState *env = &arm_cpu->env; | ||
39 | - | ||
40 | - env->gicv3state = (void *)s; | ||
41 | -}; | ||
42 | - | ||
43 | static GICv3CPUState *icc_cs_from_env(CPUARMState *env) | ||
44 | { | ||
45 | return env->gicv3state; | ||
46 | diff --git a/hw/intc/arm_gicv3_cpuif_common.c b/hw/intc/arm_gicv3_cpuif_common.c | ||
17 | new file mode 100644 | 47 | new file mode 100644 |
18 | index XXXXXXX..XXXXXXX | 48 | index XXXXXXX..XXXXXXX |
19 | --- /dev/null | 49 | --- /dev/null |
20 | +++ b/tests/qtest/pvpanic-pci-test.c | 50 | +++ b/hw/intc/arm_gicv3_cpuif_common.c |
21 | @@ -XXX,XX +XXX,XX @@ | 51 | @@ -XXX,XX +XXX,XX @@ |
52 | +/* SPDX-License-Identifier: GPL-2.0-or-later */ | ||
22 | +/* | 53 | +/* |
23 | + * QTest testcase for PV Panic PCI device | 54 | + * ARM Generic Interrupt Controller v3 |
24 | + * | 55 | + * |
25 | + * Copyright (C) 2020 Oracle | 56 | + * Copyright (c) 2016 Linaro Limited |
57 | + * Written by Peter Maydell | ||
26 | + * | 58 | + * |
27 | + * Authors: | 59 | + * This code is licensed under the GPL, version 2 or (at your option) |
28 | + * Mihai Carabas <mihai.carabas@oracle.com> | 60 | + * any later version. |
29 | + * | ||
30 | + * This work is licensed under the terms of the GNU GPL, version 2 or later. | ||
31 | + * See the COPYING file in the top-level directory. | ||
32 | + * | ||
33 | + */ | 61 | + */ |
34 | + | 62 | + |
35 | +#include "qemu/osdep.h" | 63 | +#include "qemu/osdep.h" |
36 | +#include "libqos/libqtest.h" | 64 | +#include "gicv3_internal.h" |
37 | +#include "qapi/qmp/qdict.h" | 65 | +#include "cpu.h" |
38 | +#include "libqos/pci.h" | ||
39 | +#include "libqos/pci-pc.h" | ||
40 | +#include "hw/pci/pci_regs.h" | ||
41 | + | 66 | + |
42 | +static void test_panic(void) | 67 | +void gicv3_set_gicv3state(CPUState *cpu, GICv3CPUState *s) |
43 | +{ | 68 | +{ |
44 | + uint8_t val; | 69 | + ARMCPU *arm_cpu = ARM_CPU(cpu); |
45 | + QDict *response, *data; | 70 | + CPUARMState *env = &arm_cpu->env; |
46 | + QTestState *qts; | ||
47 | + QPCIBus *pcibus; | ||
48 | + QPCIDevice *dev; | ||
49 | + QPCIBar bar; | ||
50 | + | 71 | + |
51 | + qts = qtest_init("-device pvpanic-pci"); | 72 | + env->gicv3state = (void *)s; |
52 | + pcibus = qpci_new_pc(qts, NULL); | 73 | +}; |
53 | + dev = qpci_device_find(pcibus, QPCI_DEVFN(0x4, 0x0)); | 74 | diff --git a/hw/intc/meson.build b/hw/intc/meson.build |
54 | + qpci_device_enable(dev); | ||
55 | + bar = qpci_iomap(dev, 0, NULL); | ||
56 | + | ||
57 | + qpci_memread(dev, bar, 0, &val, sizeof(val)); | ||
58 | + g_assert_cmpuint(val, ==, 3); | ||
59 | + | ||
60 | + val = 1; | ||
61 | + qpci_memwrite(dev, bar, 0, &val, sizeof(val)); | ||
62 | + | ||
63 | + response = qtest_qmp_eventwait_ref(qts, "GUEST_PANICKED"); | ||
64 | + g_assert(qdict_haskey(response, "data")); | ||
65 | + data = qdict_get_qdict(response, "data"); | ||
66 | + g_assert(qdict_haskey(data, "action")); | ||
67 | + g_assert_cmpstr(qdict_get_str(data, "action"), ==, "pause"); | ||
68 | + qobject_unref(response); | ||
69 | + | ||
70 | + qtest_quit(qts); | ||
71 | +} | ||
72 | + | ||
73 | +int main(int argc, char **argv) | ||
74 | +{ | ||
75 | + int ret; | ||
76 | + | ||
77 | + g_test_init(&argc, &argv, NULL); | ||
78 | + qtest_add_func("/pvpanic-pci/panic", test_panic); | ||
79 | + | ||
80 | + ret = g_test_run(); | ||
81 | + | ||
82 | + return ret; | ||
83 | +} | ||
84 | diff --git a/tests/qtest/meson.build b/tests/qtest/meson.build | ||
85 | index XXXXXXX..XXXXXXX 100644 | 75 | index XXXXXXX..XXXXXXX 100644 |
86 | --- a/tests/qtest/meson.build | 76 | --- a/hw/intc/meson.build |
87 | +++ b/tests/qtest/meson.build | 77 | +++ b/hw/intc/meson.build |
88 | @@ -XXX,XX +XXX,XX @@ endif | 78 | @@ -XXX,XX +XXX,XX @@ softmmu_ss.add(when: 'CONFIG_XLNX_ZYNQMP_PMU', if_true: files('xlnx-pmu-iomod-in |
89 | 79 | ||
90 | qtests_pci = \ | 80 | specific_ss.add(when: 'CONFIG_ALLWINNER_A10_PIC', if_true: files('allwinner-a10-pic.c')) |
91 | (config_all_devices.has_key('CONFIG_VGA') ? ['display-vga-test'] : []) + \ | 81 | specific_ss.add(when: 'CONFIG_APIC', if_true: files('apic.c', 'apic_common.c')) |
92 | + (config_all_devices.has_key('CONFIG_PVPANIC_PCI') ? ['pvpanic-pci-test'] : []) + \ | 82 | +specific_ss.add(when: 'CONFIG_ARM_GIC', if_true: files('arm_gicv3_cpuif_common.c')) |
93 | (config_all_devices.has_key('CONFIG_IVSHMEM_DEVICE') ? ['ivshmem-test'] : []) | 83 | specific_ss.add(when: 'CONFIG_ARM_GIC', if_true: files('arm_gicv3_cpuif.c')) |
94 | 84 | specific_ss.add(when: 'CONFIG_ARM_GIC_KVM', if_true: files('arm_gic_kvm.c')) | |
95 | qtests_i386 = \ | 85 | specific_ss.add(when: ['CONFIG_ARM_GIC_KVM', 'TARGET_AARCH64'], if_true: files('arm_gicv3_kvm.c', 'arm_gicv3_its_kvm.c')) |
96 | -- | 86 | -- |
97 | 2.20.1 | 87 | 2.25.1 |
98 | 88 | ||
99 | 89 | diff view generated by jsdifflib |
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 1 | From: Philippe Mathieu-Daudé <philmd@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | The stage_1_mmu_idx() already effectively keeps track of which | 3 | The TYPE_ARM_GICV3 device is an emulated one. When using |
4 | translation regimes have two stages. Don't hard-code another test. | 4 | KVM, it is recommended to use the TYPE_KVM_ARM_GICV3 device |
5 | (which uses in-kernel support). | ||
5 | 6 | ||
6 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 7 | When using --with-devices-FOO, it is possible to build a |
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 8 | binary with a specific set of devices. When this binary is |
8 | Message-id: 20210112104511.36576-13-remi.denis.courmont@huawei.com | 9 | restricted to KVM accelerator, the TYPE_ARM_GICV3 device is |
10 | irrelevant, and it is desirable to remove it from the binary. | ||
11 | |||
12 | Therefore introduce the CONFIG_ARM_GIC_TCG Kconfig selector | ||
13 | which select the files required to have the TYPE_ARM_GICV3 | ||
14 | device, but also allowing to de-select this device. | ||
15 | |||
16 | Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> | ||
17 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
18 | Message-id: 20211115223619.2599282-3-philmd@redhat.com | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 19 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | --- | 20 | --- |
11 | target/arm/helper.c | 13 ++++++------- | 21 | hw/intc/arm_gicv3.c | 2 +- |
12 | 1 file changed, 6 insertions(+), 7 deletions(-) | 22 | hw/intc/Kconfig | 5 +++++ |
23 | hw/intc/meson.build | 10 ++++++---- | ||
24 | 3 files changed, 12 insertions(+), 5 deletions(-) | ||
13 | 25 | ||
14 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 26 | diff --git a/hw/intc/arm_gicv3.c b/hw/intc/arm_gicv3.c |
15 | index XXXXXXX..XXXXXXX 100644 | 27 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/target/arm/helper.c | 28 | --- a/hw/intc/arm_gicv3.c |
17 | +++ b/target/arm/helper.c | 29 | +++ b/hw/intc/arm_gicv3.c |
18 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | 30 | @@ -XXX,XX +XXX,XX @@ |
19 | target_ulong *page_size, | 31 | /* |
20 | ARMMMUFaultInfo *fi, ARMCacheAttrs *cacheattrs) | 32 | - * ARM Generic Interrupt Controller v3 |
21 | { | 33 | + * ARM Generic Interrupt Controller v3 (emulation) |
22 | - if (mmu_idx == ARMMMUIdx_E10_0 || | 34 | * |
23 | - mmu_idx == ARMMMUIdx_E10_1 || | 35 | * Copyright (c) 2015 Huawei. |
24 | - mmu_idx == ARMMMUIdx_E10_1_PAN) { | 36 | * Copyright (c) 2016 Linaro Limited |
25 | + ARMMMUIdx s1_mmu_idx = stage_1_mmu_idx(mmu_idx); | 37 | diff --git a/hw/intc/Kconfig b/hw/intc/Kconfig |
38 | index XXXXXXX..XXXXXXX 100644 | ||
39 | --- a/hw/intc/Kconfig | ||
40 | +++ b/hw/intc/Kconfig | ||
41 | @@ -XXX,XX +XXX,XX @@ config APIC | ||
42 | select MSI_NONBROKEN | ||
43 | select I8259 | ||
44 | |||
45 | +config ARM_GIC_TCG | ||
46 | + bool | ||
47 | + default y | ||
48 | + depends on ARM_GIC && TCG | ||
26 | + | 49 | + |
27 | + if (mmu_idx != s1_mmu_idx) { | 50 | config ARM_GIC_KVM |
28 | /* Call ourselves recursively to do the stage 1 and then stage 2 | 51 | bool |
29 | - * translations. | 52 | default y |
30 | + * translations if mmu_idx is a two-stage regime. | 53 | diff --git a/hw/intc/meson.build b/hw/intc/meson.build |
31 | */ | 54 | index XXXXXXX..XXXXXXX 100644 |
32 | if (arm_feature(env, ARM_FEATURE_EL2)) { | 55 | --- a/hw/intc/meson.build |
33 | hwaddr ipa; | 56 | +++ b/hw/intc/meson.build |
34 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | 57 | @@ -XXX,XX +XXX,XX @@ softmmu_ss.add(when: 'CONFIG_ARM_GIC', if_true: files( |
35 | int ret; | 58 | 'arm_gic.c', |
36 | ARMCacheAttrs cacheattrs2 = {}; | 59 | 'arm_gic_common.c', |
37 | 60 | 'arm_gicv2m.c', | |
38 | - ret = get_phys_addr(env, address, access_type, | 61 | - 'arm_gicv3.c', |
39 | - stage_1_mmu_idx(mmu_idx), &ipa, attrs, | 62 | 'arm_gicv3_common.c', |
40 | - prot, page_size, fi, cacheattrs); | 63 | - 'arm_gicv3_dist.c', |
41 | + ret = get_phys_addr(env, address, access_type, s1_mmu_idx, &ipa, | 64 | 'arm_gicv3_its_common.c', |
42 | + attrs, prot, page_size, fi, cacheattrs); | 65 | - 'arm_gicv3_redist.c', |
43 | 66 | +)) | |
44 | /* If S1 fails or S2 is disabled, return early. */ | 67 | +softmmu_ss.add(when: 'CONFIG_ARM_GIC_TCG', if_true: files( |
45 | if (ret || regime_translation_disabled(env, ARMMMUIdx_Stage2)) { | 68 | + 'arm_gicv3.c', |
69 | + 'arm_gicv3_dist.c', | ||
70 | 'arm_gicv3_its.c', | ||
71 | + 'arm_gicv3_redist.c', | ||
72 | )) | ||
73 | softmmu_ss.add(when: 'CONFIG_ETRAXFS', if_true: files('etraxfs_pic.c')) | ||
74 | softmmu_ss.add(when: 'CONFIG_HEATHROW_PIC', if_true: files('heathrow_pic.c')) | ||
75 | @@ -XXX,XX +XXX,XX @@ softmmu_ss.add(when: 'CONFIG_XLNX_ZYNQMP_PMU', if_true: files('xlnx-pmu-iomod-in | ||
76 | specific_ss.add(when: 'CONFIG_ALLWINNER_A10_PIC', if_true: files('allwinner-a10-pic.c')) | ||
77 | specific_ss.add(when: 'CONFIG_APIC', if_true: files('apic.c', 'apic_common.c')) | ||
78 | specific_ss.add(when: 'CONFIG_ARM_GIC', if_true: files('arm_gicv3_cpuif_common.c')) | ||
79 | -specific_ss.add(when: 'CONFIG_ARM_GIC', if_true: files('arm_gicv3_cpuif.c')) | ||
80 | +specific_ss.add(when: 'CONFIG_ARM_GIC_TCG', if_true: files('arm_gicv3_cpuif.c')) | ||
81 | specific_ss.add(when: 'CONFIG_ARM_GIC_KVM', if_true: files('arm_gic_kvm.c')) | ||
82 | specific_ss.add(when: ['CONFIG_ARM_GIC_KVM', 'TARGET_AARCH64'], if_true: files('arm_gicv3_kvm.c', 'arm_gicv3_its_kvm.c')) | ||
83 | specific_ss.add(when: 'CONFIG_ARM_V7M', if_true: files('armv7m_nvic.c')) | ||
46 | -- | 84 | -- |
47 | 2.20.1 | 85 | 2.25.1 |
48 | 86 | ||
49 | 87 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Update all users of do_perm_pred2 for the new | ||
4 | predicate descriptor field definitions. | ||
5 | |||
6 | Cc: qemu-stable@nongnu.org | ||
7 | Buglink: https://bugs.launchpad.net/bugs/1908551 | ||
8 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 3 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
9 | Message-id: 20210113062650.593824-5-richard.henderson@linaro.org | ||
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 4 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | --- | 6 | --- |
13 | target/arm/sve_helper.c | 8 ++++---- | 7 | target/arm/translate-a64.c | 7 ++++--- |
14 | target/arm/translate-sve.c | 13 ++++--------- | 8 | 1 file changed, 4 insertions(+), 3 deletions(-) |
15 | 2 files changed, 8 insertions(+), 13 deletions(-) | ||
16 | 9 | ||
17 | diff --git a/target/arm/sve_helper.c b/target/arm/sve_helper.c | 10 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c |
18 | index XXXXXXX..XXXXXXX 100644 | 11 | index XXXXXXX..XXXXXXX 100644 |
19 | --- a/target/arm/sve_helper.c | 12 | --- a/target/arm/translate-a64.c |
20 | +++ b/target/arm/sve_helper.c | 13 | +++ b/target/arm/translate-a64.c |
21 | @@ -XXX,XX +XXX,XX @@ static uint8_t reverse_bits_8(uint8_t x, int n) | 14 | @@ -XXX,XX +XXX,XX @@ static void aarch64_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu) |
22 | |||
23 | void HELPER(sve_rev_p)(void *vd, void *vn, uint32_t pred_desc) | ||
24 | { | 15 | { |
25 | - intptr_t oprsz = extract32(pred_desc, 0, SIMD_OPRSZ_BITS) + 2; | 16 | DisasContext *s = container_of(dcbase, DisasContext, base); |
26 | - int esz = extract32(pred_desc, SIMD_DATA_SHIFT, 2); | 17 | CPUARMState *env = cpu->env_ptr; |
27 | + intptr_t oprsz = FIELD_EX32(pred_desc, PREDDESC, OPRSZ); | 18 | + uint64_t pc = s->base.pc_next; |
28 | + int esz = FIELD_EX32(pred_desc, PREDDESC, ESZ); | 19 | uint32_t insn; |
29 | intptr_t i, oprsz_2 = oprsz / 2; | 20 | |
30 | 21 | if (s->ss_active && !s->pstate_ss) { | |
31 | if (oprsz <= 8) { | 22 | @@ -XXX,XX +XXX,XX @@ static void aarch64_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu) |
32 | @@ -XXX,XX +XXX,XX @@ void HELPER(sve_rev_p)(void *vd, void *vn, uint32_t pred_desc) | 23 | return; |
33 | 24 | } | |
34 | void HELPER(sve_punpk_p)(void *vd, void *vn, uint32_t pred_desc) | 25 | |
35 | { | 26 | - s->pc_curr = s->base.pc_next; |
36 | - intptr_t oprsz = extract32(pred_desc, 0, SIMD_OPRSZ_BITS) + 2; | 27 | - insn = arm_ldl_code(env, &s->base, s->base.pc_next, s->sctlr_b); |
37 | - intptr_t high = extract32(pred_desc, SIMD_DATA_SHIFT + 2, 1); | 28 | + s->pc_curr = pc; |
38 | + intptr_t oprsz = FIELD_EX32(pred_desc, PREDDESC, OPRSZ); | 29 | + insn = arm_ldl_code(env, &s->base, pc, s->sctlr_b); |
39 | + intptr_t high = FIELD_EX32(pred_desc, PREDDESC, DATA); | 30 | s->insn = insn; |
40 | uint64_t *d = vd; | 31 | - s->base.pc_next += 4; |
41 | intptr_t i; | 32 | + s->base.pc_next = pc + 4; |
42 | 33 | ||
43 | diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c | 34 | s->fp_access_checked = false; |
44 | index XXXXXXX..XXXXXXX 100644 | 35 | s->sve_access_checked = false; |
45 | --- a/target/arm/translate-sve.c | ||
46 | +++ b/target/arm/translate-sve.c | ||
47 | @@ -XXX,XX +XXX,XX @@ static bool do_perm_pred2(DisasContext *s, arg_rr_esz *a, bool high_odd, | ||
48 | TCGv_ptr t_d = tcg_temp_new_ptr(); | ||
49 | TCGv_ptr t_n = tcg_temp_new_ptr(); | ||
50 | TCGv_i32 t_desc; | ||
51 | - int desc; | ||
52 | + uint32_t desc = 0; | ||
53 | |||
54 | tcg_gen_addi_ptr(t_d, cpu_env, pred_full_reg_offset(s, a->rd)); | ||
55 | tcg_gen_addi_ptr(t_n, cpu_env, pred_full_reg_offset(s, a->rn)); | ||
56 | |||
57 | - /* Predicate sizes may be smaller and cannot use simd_desc. | ||
58 | - We cannot round up, as we do elsewhere, because we need | ||
59 | - the exact size for ZIP2 and REV. We retain the style for | ||
60 | - the other helpers for consistency. */ | ||
61 | - | ||
62 | - desc = vsz - 2; | ||
63 | - desc = deposit32(desc, SIMD_DATA_SHIFT, 2, a->esz); | ||
64 | - desc = deposit32(desc, SIMD_DATA_SHIFT + 2, 2, high_odd); | ||
65 | + desc = FIELD_DP32(desc, PREDDESC, OPRSZ, vsz); | ||
66 | + desc = FIELD_DP32(desc, PREDDESC, ESZ, a->esz); | ||
67 | + desc = FIELD_DP32(desc, PREDDESC, DATA, high_odd); | ||
68 | t_desc = tcg_const_i32(desc); | ||
69 | |||
70 | fn(t_d, t_n, t_desc); | ||
71 | -- | 36 | -- |
72 | 2.20.1 | 37 | 2.25.1 |
73 | 38 | ||
74 | 39 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Update all users of do_perm_pred3 for the new | ||
4 | predicate descriptor field definitions. | ||
5 | |||
6 | Cc: qemu-stable@nongnu.org | ||
7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 3 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
8 | Message-id: 20210113062650.593824-4-richard.henderson@linaro.org | ||
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 4 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 6 | --- |
12 | target/arm/sve_helper.c | 18 +++++++++--------- | 7 | target/arm/translate.c | 9 +++++---- |
13 | target/arm/translate-sve.c | 12 ++++-------- | 8 | 1 file changed, 5 insertions(+), 4 deletions(-) |
14 | 2 files changed, 13 insertions(+), 17 deletions(-) | ||
15 | 9 | ||
16 | diff --git a/target/arm/sve_helper.c b/target/arm/sve_helper.c | 10 | diff --git a/target/arm/translate.c b/target/arm/translate.c |
17 | index XXXXXXX..XXXXXXX 100644 | 11 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/target/arm/sve_helper.c | 12 | --- a/target/arm/translate.c |
19 | +++ b/target/arm/sve_helper.c | 13 | +++ b/target/arm/translate.c |
20 | @@ -XXX,XX +XXX,XX @@ static uint64_t compress_bits(uint64_t x, int n) | 14 | @@ -XXX,XX +XXX,XX @@ static void arm_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu) |
21 | |||
22 | void HELPER(sve_zip_p)(void *vd, void *vn, void *vm, uint32_t pred_desc) | ||
23 | { | 15 | { |
24 | - intptr_t oprsz = extract32(pred_desc, 0, SIMD_OPRSZ_BITS) + 2; | 16 | DisasContext *dc = container_of(dcbase, DisasContext, base); |
25 | - int esz = extract32(pred_desc, SIMD_DATA_SHIFT, 2); | 17 | CPUARMState *env = cpu->env_ptr; |
26 | - intptr_t high = extract32(pred_desc, SIMD_DATA_SHIFT + 2, 1); | 18 | + uint32_t pc = dc->base.pc_next; |
27 | + intptr_t oprsz = FIELD_EX32(pred_desc, PREDDESC, OPRSZ); | 19 | unsigned int insn; |
28 | + int esz = FIELD_EX32(pred_desc, PREDDESC, ESZ); | 20 | |
29 | + intptr_t high = FIELD_EX32(pred_desc, PREDDESC, DATA); | 21 | if (arm_pre_translate_insn(dc)) { |
30 | uint64_t *d = vd; | 22 | - dc->base.pc_next += 4; |
31 | intptr_t i; | 23 | + dc->base.pc_next = pc + 4; |
32 | 24 | return; | |
33 | @@ -XXX,XX +XXX,XX @@ void HELPER(sve_zip_p)(void *vd, void *vn, void *vm, uint32_t pred_desc) | 25 | } |
34 | 26 | ||
35 | void HELPER(sve_uzp_p)(void *vd, void *vn, void *vm, uint32_t pred_desc) | 27 | - dc->pc_curr = dc->base.pc_next; |
36 | { | 28 | - insn = arm_ldl_code(env, &dc->base, dc->base.pc_next, dc->sctlr_b); |
37 | - intptr_t oprsz = extract32(pred_desc, 0, SIMD_OPRSZ_BITS) + 2; | 29 | + dc->pc_curr = pc; |
38 | - int esz = extract32(pred_desc, SIMD_DATA_SHIFT, 2); | 30 | + insn = arm_ldl_code(env, &dc->base, pc, dc->sctlr_b); |
39 | - int odd = extract32(pred_desc, SIMD_DATA_SHIFT + 2, 1) << esz; | 31 | dc->insn = insn; |
40 | + intptr_t oprsz = FIELD_EX32(pred_desc, PREDDESC, OPRSZ); | 32 | - dc->base.pc_next += 4; |
41 | + int esz = FIELD_EX32(pred_desc, PREDDESC, ESZ); | 33 | + dc->base.pc_next = pc + 4; |
42 | + int odd = FIELD_EX32(pred_desc, PREDDESC, DATA) << esz; | 34 | disas_arm_insn(dc, insn); |
43 | uint64_t *d = vd, *n = vn, *m = vm; | 35 | |
44 | uint64_t l, h; | 36 | arm_post_translate_insn(dc); |
45 | intptr_t i; | ||
46 | @@ -XXX,XX +XXX,XX @@ void HELPER(sve_uzp_p)(void *vd, void *vn, void *vm, uint32_t pred_desc) | ||
47 | |||
48 | void HELPER(sve_trn_p)(void *vd, void *vn, void *vm, uint32_t pred_desc) | ||
49 | { | ||
50 | - intptr_t oprsz = extract32(pred_desc, 0, SIMD_OPRSZ_BITS) + 2; | ||
51 | - uintptr_t esz = extract32(pred_desc, SIMD_DATA_SHIFT, 2); | ||
52 | - bool odd = extract32(pred_desc, SIMD_DATA_SHIFT + 2, 1); | ||
53 | + intptr_t oprsz = FIELD_EX32(pred_desc, PREDDESC, OPRSZ); | ||
54 | + int esz = FIELD_EX32(pred_desc, PREDDESC, ESZ); | ||
55 | + int odd = FIELD_EX32(pred_desc, PREDDESC, DATA); | ||
56 | uint64_t *d = vd, *n = vn, *m = vm; | ||
57 | uint64_t mask; | ||
58 | int shr, shl; | ||
59 | diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c | ||
60 | index XXXXXXX..XXXXXXX 100644 | ||
61 | --- a/target/arm/translate-sve.c | ||
62 | +++ b/target/arm/translate-sve.c | ||
63 | @@ -XXX,XX +XXX,XX @@ static bool do_perm_pred3(DisasContext *s, arg_rrr_esz *a, bool high_odd, | ||
64 | |||
65 | unsigned vsz = pred_full_reg_size(s); | ||
66 | |||
67 | - /* Predicate sizes may be smaller and cannot use simd_desc. | ||
68 | - We cannot round up, as we do elsewhere, because we need | ||
69 | - the exact size for ZIP2 and REV. We retain the style for | ||
70 | - the other helpers for consistency. */ | ||
71 | TCGv_ptr t_d = tcg_temp_new_ptr(); | ||
72 | TCGv_ptr t_n = tcg_temp_new_ptr(); | ||
73 | TCGv_ptr t_m = tcg_temp_new_ptr(); | ||
74 | TCGv_i32 t_desc; | ||
75 | - int desc; | ||
76 | + uint32_t desc = 0; | ||
77 | |||
78 | - desc = vsz - 2; | ||
79 | - desc = deposit32(desc, SIMD_DATA_SHIFT, 2, a->esz); | ||
80 | - desc = deposit32(desc, SIMD_DATA_SHIFT + 2, 2, high_odd); | ||
81 | + desc = FIELD_DP32(desc, PREDDESC, OPRSZ, vsz); | ||
82 | + desc = FIELD_DP32(desc, PREDDESC, ESZ, a->esz); | ||
83 | + desc = FIELD_DP32(desc, PREDDESC, DATA, high_odd); | ||
84 | |||
85 | tcg_gen_addi_ptr(t_d, cpu_env, pred_full_reg_offset(s, a->rd)); | ||
86 | tcg_gen_addi_ptr(t_n, cpu_env, pred_full_reg_offset(s, a->rn)); | ||
87 | -- | 37 | -- |
88 | 2.20.1 | 38 | 2.25.1 |
89 | 39 | ||
90 | 40 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | These two were odd, in that do_pfirst_pnext passed the | ||
4 | count of 64-bit words rather than bytes. Change to pass | ||
5 | the standard pred_full_reg_size to avoid confusion. | ||
6 | |||
7 | Cc: qemu-stable@nongnu.org | ||
8 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 3 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
9 | Message-id: 20210113062650.593824-3-richard.henderson@linaro.org | ||
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 4 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | --- | 6 | --- |
13 | target/arm/sve_helper.c | 7 ++++--- | 7 | target/arm/translate.c | 16 ++++++++-------- |
14 | target/arm/translate-sve.c | 6 +++--- | 8 | 1 file changed, 8 insertions(+), 8 deletions(-) |
15 | 2 files changed, 7 insertions(+), 6 deletions(-) | ||
16 | 9 | ||
17 | diff --git a/target/arm/sve_helper.c b/target/arm/sve_helper.c | 10 | diff --git a/target/arm/translate.c b/target/arm/translate.c |
18 | index XXXXXXX..XXXXXXX 100644 | 11 | index XXXXXXX..XXXXXXX 100644 |
19 | --- a/target/arm/sve_helper.c | 12 | --- a/target/arm/translate.c |
20 | +++ b/target/arm/sve_helper.c | 13 | +++ b/target/arm/translate.c |
21 | @@ -XXX,XX +XXX,XX @@ static intptr_t last_active_element(uint64_t *g, intptr_t words, intptr_t esz) | 14 | @@ -XXX,XX +XXX,XX @@ static void thumb_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu) |
22 | return (intptr_t)-1 << esz; | ||
23 | } | ||
24 | |||
25 | -uint32_t HELPER(sve_pfirst)(void *vd, void *vg, uint32_t words) | ||
26 | +uint32_t HELPER(sve_pfirst)(void *vd, void *vg, uint32_t pred_desc) | ||
27 | { | 15 | { |
28 | + intptr_t words = DIV_ROUND_UP(FIELD_EX32(pred_desc, PREDDESC, OPRSZ), 8); | 16 | DisasContext *dc = container_of(dcbase, DisasContext, base); |
29 | uint32_t flags = PREDTEST_INIT; | 17 | CPUARMState *env = cpu->env_ptr; |
30 | uint64_t *d = vd, *g = vg; | 18 | + uint32_t pc = dc->base.pc_next; |
31 | intptr_t i = 0; | 19 | uint32_t insn; |
32 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(sve_pfirst)(void *vd, void *vg, uint32_t words) | 20 | bool is_16bit; |
33 | 21 | ||
34 | uint32_t HELPER(sve_pnext)(void *vd, void *vg, uint32_t pred_desc) | 22 | if (arm_pre_translate_insn(dc)) { |
35 | { | 23 | - dc->base.pc_next += 2; |
36 | - intptr_t words = extract32(pred_desc, 0, SIMD_OPRSZ_BITS); | 24 | + dc->base.pc_next = pc + 2; |
37 | - intptr_t esz = extract32(pred_desc, SIMD_DATA_SHIFT, 2); | 25 | return; |
38 | + intptr_t words = DIV_ROUND_UP(FIELD_EX32(pred_desc, PREDDESC, OPRSZ), 8); | 26 | } |
39 | + intptr_t esz = FIELD_EX32(pred_desc, PREDDESC, ESZ); | 27 | |
40 | uint32_t flags = PREDTEST_INIT; | 28 | - dc->pc_curr = dc->base.pc_next; |
41 | uint64_t *d = vd, *g = vg, esz_mask; | 29 | - insn = arm_lduw_code(env, &dc->base, dc->base.pc_next, dc->sctlr_b); |
42 | intptr_t i, next; | 30 | + dc->pc_curr = pc; |
43 | diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c | 31 | + insn = arm_lduw_code(env, &dc->base, pc, dc->sctlr_b); |
44 | index XXXXXXX..XXXXXXX 100644 | 32 | is_16bit = thumb_insn_is_16bit(dc, dc->base.pc_next, insn); |
45 | --- a/target/arm/translate-sve.c | 33 | - dc->base.pc_next += 2; |
46 | +++ b/target/arm/translate-sve.c | 34 | + pc += 2; |
47 | @@ -XXX,XX +XXX,XX @@ static bool do_pfirst_pnext(DisasContext *s, arg_rr_esz *a, | 35 | if (!is_16bit) { |
48 | TCGv_ptr t_pd = tcg_temp_new_ptr(); | 36 | - uint32_t insn2 = arm_lduw_code(env, &dc->base, dc->base.pc_next, |
49 | TCGv_ptr t_pg = tcg_temp_new_ptr(); | 37 | - dc->sctlr_b); |
50 | TCGv_i32 t; | 38 | - |
51 | - unsigned desc; | 39 | + uint32_t insn2 = arm_lduw_code(env, &dc->base, pc, dc->sctlr_b); |
52 | + unsigned desc = 0; | 40 | insn = insn << 16 | insn2; |
53 | 41 | - dc->base.pc_next += 2; | |
54 | - desc = DIV_ROUND_UP(pred_full_reg_size(s), 8); | 42 | + pc += 2; |
55 | - desc = deposit32(desc, SIMD_DATA_SHIFT, 2, a->esz); | 43 | } |
56 | + desc = FIELD_DP32(desc, PREDDESC, OPRSZ, pred_full_reg_size(s)); | 44 | + dc->base.pc_next = pc; |
57 | + desc = FIELD_DP32(desc, PREDDESC, ESZ, a->esz); | 45 | dc->insn = insn; |
58 | 46 | ||
59 | tcg_gen_addi_ptr(t_pd, cpu_env, pred_full_reg_offset(s, a->rd)); | 47 | if (dc->pstate_il) { |
60 | tcg_gen_addi_ptr(t_pg, cpu_env, pred_full_reg_offset(s, a->rn)); | ||
61 | -- | 48 | -- |
62 | 2.20.1 | 49 | 2.25.1 |
63 | 50 | ||
64 | 51 | diff view generated by jsdifflib |
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | On ARMv8-A, accesses by 32-bit secure EL1 to monitor registers trap to | 3 | Create arm_check_ss_active and arm_check_kernelpage. |
4 | the upper (64-bit) EL. With Secure EL2 support, we can no longer assume | ||
5 | that that is always EL3, so make room for the value to be computed at | ||
6 | run-time. | ||
7 | 4 | ||
8 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 5 | Reverse the order of the tests. While it doesn't matter in practice, |
9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 6 | because only user-only has a kernel page and user-only never sets |
10 | Message-id: 20210112104511.36576-16-remi.denis.courmont@huawei.com | 7 | ss_active, ss_active has priority over execution exceptions and it |
8 | is best to keep them in the proper order. | ||
9 | |||
10 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | --- | 13 | --- |
13 | target/arm/translate.c | 23 +++++++++++++++++++++-- | 14 | target/arm/translate.c | 10 +++++++--- |
14 | 1 file changed, 21 insertions(+), 2 deletions(-) | 15 | 1 file changed, 7 insertions(+), 3 deletions(-) |
15 | 16 | ||
16 | diff --git a/target/arm/translate.c b/target/arm/translate.c | 17 | diff --git a/target/arm/translate.c b/target/arm/translate.c |
17 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/target/arm/translate.c | 19 | --- a/target/arm/translate.c |
19 | +++ b/target/arm/translate.c | 20 | +++ b/target/arm/translate.c |
20 | @@ -XXX,XX +XXX,XX @@ static void unallocated_encoding(DisasContext *s) | 21 | @@ -XXX,XX +XXX,XX @@ static void arm_tr_insn_start(DisasContextBase *dcbase, CPUState *cpu) |
21 | default_exception_el(s)); | 22 | dc->insn_start = tcg_last_op(); |
22 | } | 23 | } |
23 | 24 | ||
24 | +static void gen_exception_el(DisasContext *s, int excp, uint32_t syn, | 25 | -static bool arm_pre_translate_insn(DisasContext *dc) |
25 | + TCGv_i32 tcg_el) | 26 | +static bool arm_check_kernelpage(DisasContext *dc) |
27 | { | ||
28 | #ifdef CONFIG_USER_ONLY | ||
29 | /* Intercept jump to the magic kernel page. */ | ||
30 | @@ -XXX,XX +XXX,XX @@ static bool arm_pre_translate_insn(DisasContext *dc) | ||
31 | return true; | ||
32 | } | ||
33 | #endif | ||
34 | + return false; | ||
35 | +} | ||
36 | |||
37 | +static bool arm_check_ss_active(DisasContext *dc) | ||
26 | +{ | 38 | +{ |
27 | + TCGv_i32 tcg_excp; | 39 | if (dc->ss_active && !dc->pstate_ss) { |
28 | + TCGv_i32 tcg_syn; | 40 | /* Singlestep state is Active-pending. |
29 | + | 41 | * If we're in this state at the start of a TB then either |
30 | + gen_set_condexec(s); | 42 | @@ -XXX,XX +XXX,XX @@ static void arm_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu) |
31 | + gen_set_pc_im(s, s->pc_curr); | 43 | uint32_t pc = dc->base.pc_next; |
32 | + tcg_excp = tcg_const_i32(excp); | 44 | unsigned int insn; |
33 | + tcg_syn = tcg_const_i32(syn); | 45 | |
34 | + gen_helper_exception_with_syndrome(cpu_env, tcg_excp, tcg_syn, tcg_el); | 46 | - if (arm_pre_translate_insn(dc)) { |
35 | + tcg_temp_free_i32(tcg_syn); | 47 | + if (arm_check_ss_active(dc) || arm_check_kernelpage(dc)) { |
36 | + tcg_temp_free_i32(tcg_excp); | 48 | dc->base.pc_next = pc + 4; |
37 | + s->base.is_jmp = DISAS_NORETURN; | 49 | return; |
38 | +} | 50 | } |
39 | + | 51 | @@ -XXX,XX +XXX,XX @@ static void thumb_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu) |
40 | /* Force a TB lookup after an instruction that changes the CPU state. */ | 52 | uint32_t insn; |
41 | static inline void gen_lookup_tb(DisasContext *s) | 53 | bool is_16bit; |
42 | { | 54 | |
43 | @@ -XXX,XX +XXX,XX @@ static bool msr_banked_access_decode(DisasContext *s, int r, int sysm, int rn, | 55 | - if (arm_pre_translate_insn(dc)) { |
44 | /* If we're in Secure EL1 (which implies that EL3 is AArch64) | 56 | + if (arm_check_ss_active(dc) || arm_check_kernelpage(dc)) { |
45 | * then accesses to Mon registers trap to EL3 | 57 | dc->base.pc_next = pc + 2; |
46 | */ | 58 | return; |
47 | - exc_target = 3; | 59 | } |
48 | - goto undef; | ||
49 | + TCGv_i32 tcg_el = tcg_const_i32(3); | ||
50 | + | ||
51 | + gen_exception_el(s, EXCP_UDEF, syn_uncategorized(), tcg_el); | ||
52 | + tcg_temp_free_i32(tcg_el); | ||
53 | + return false; | ||
54 | } | ||
55 | break; | ||
56 | case ARM_CPU_MODE_HYP: | ||
57 | -- | 60 | -- |
58 | 2.20.1 | 61 | 2.25.1 |
59 | 62 | ||
60 | 63 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | SVE predicate operations cannot use the "usual" simd_desc | 3 | The size of the code covered by a TranslationBlock cannot be 0; |
4 | encoding, because the lengths are not a multiple of 8. | 4 | this is checked via assert in tb_gen_code. |
5 | But we were abusing the SIMD_* fields to store values anyway. | ||
6 | This abuse broke when SIMD_OPRSZ_BITS was modified in e2e7168a214. | ||
7 | 5 | ||
8 | Introduce a new set of field definitions for exclusive use | ||
9 | of predicates, so that it is obvious what kind of predicate | ||
10 | we are manipulating. To be used in future patches. | ||
11 | |||
12 | Cc: qemu-stable@nongnu.org | ||
13 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 6 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
14 | Message-id: 20210113062650.593824-2-richard.henderson@linaro.org | ||
15 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
17 | --- | 9 | --- |
18 | target/arm/internals.h | 9 +++++++++ | 10 | target/arm/translate-a64.c | 1 + |
19 | 1 file changed, 9 insertions(+) | 11 | 1 file changed, 1 insertion(+) |
20 | 12 | ||
21 | diff --git a/target/arm/internals.h b/target/arm/internals.h | 13 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c |
22 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
23 | --- a/target/arm/internals.h | 15 | --- a/target/arm/translate-a64.c |
24 | +++ b/target/arm/internals.h | 16 | +++ b/target/arm/translate-a64.c |
25 | @@ -XXX,XX +XXX,XX @@ void arm_log_exception(int idx); | 17 | @@ -XXX,XX +XXX,XX @@ static void aarch64_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu) |
26 | #define LOG2_TAG_GRANULE 4 | 18 | assert(s->base.num_insns == 1); |
27 | #define TAG_GRANULE (1 << LOG2_TAG_GRANULE) | 19 | gen_swstep_exception(s, 0, 0); |
28 | 20 | s->base.is_jmp = DISAS_NORETURN; | |
29 | +/* | 21 | + s->base.pc_next = pc + 4; |
30 | + * SVE predicates are 1/8 the size of SVE vectors, and cannot use | 22 | return; |
31 | + * the same simd_desc() encoding due to restrictions on size. | 23 | } |
32 | + * Use these instead. | 24 | |
33 | + */ | ||
34 | +FIELD(PREDDESC, OPRSZ, 0, 6) | ||
35 | +FIELD(PREDDESC, ESZ, 6, 2) | ||
36 | +FIELD(PREDDESC, DATA, 8, 24) | ||
37 | + | ||
38 | /* | ||
39 | * The SVE simd_data field, for memory ops, contains either | ||
40 | * rd (5 bits) or a shift count (2 bits). | ||
41 | -- | 25 | -- |
42 | 2.20.1 | 26 | 2.25.1 |
43 | 27 | ||
44 | 28 | diff view generated by jsdifflib |
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 3 | We will reuse this section of arm_deliver_fault for |
4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 4 | raising pc alignment faults. |
5 | Message-id: 20210112104511.36576-15-remi.denis.courmont@huawei.com | 5 | |
6 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | --- | 9 | --- |
8 | target/arm/cpu.h | 2 ++ | 10 | target/arm/tlb_helper.c | 45 +++++++++++++++++++++++++---------------- |
9 | target/arm/internals.h | 2 ++ | 11 | 1 file changed, 28 insertions(+), 17 deletions(-) |
10 | target/arm/helper.c | 6 ++++++ | ||
11 | target/arm/tlb_helper.c | 3 +++ | ||
12 | 4 files changed, 13 insertions(+) | ||
13 | 12 | ||
14 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
15 | index XXXXXXX..XXXXXXX 100644 | ||
16 | --- a/target/arm/cpu.h | ||
17 | +++ b/target/arm/cpu.h | ||
18 | @@ -XXX,XX +XXX,XX @@ static inline void xpsr_write(CPUARMState *env, uint32_t val, uint32_t mask) | ||
19 | #define HCR_TWEDEN (1ULL << 59) | ||
20 | #define HCR_TWEDEL MAKE_64BIT_MASK(60, 4) | ||
21 | |||
22 | +#define HPFAR_NS (1ULL << 63) | ||
23 | + | ||
24 | #define SCR_NS (1U << 0) | ||
25 | #define SCR_IRQ (1U << 1) | ||
26 | #define SCR_FIQ (1U << 2) | ||
27 | diff --git a/target/arm/internals.h b/target/arm/internals.h | ||
28 | index XXXXXXX..XXXXXXX 100644 | ||
29 | --- a/target/arm/internals.h | ||
30 | +++ b/target/arm/internals.h | ||
31 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMFaultType { | ||
32 | * @s2addr: Address that caused a fault at stage 2 | ||
33 | * @stage2: True if we faulted at stage 2 | ||
34 | * @s1ptw: True if we faulted at stage 2 while doing a stage 1 page-table walk | ||
35 | + * @s1ns: True if we faulted on a non-secure IPA while in secure state | ||
36 | * @ea: True if we should set the EA (external abort type) bit in syndrome | ||
37 | */ | ||
38 | typedef struct ARMMMUFaultInfo ARMMMUFaultInfo; | ||
39 | @@ -XXX,XX +XXX,XX @@ struct ARMMMUFaultInfo { | ||
40 | int domain; | ||
41 | bool stage2; | ||
42 | bool s1ptw; | ||
43 | + bool s1ns; | ||
44 | bool ea; | ||
45 | }; | ||
46 | |||
47 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
48 | index XXXXXXX..XXXXXXX 100644 | ||
49 | --- a/target/arm/helper.c | ||
50 | +++ b/target/arm/helper.c | ||
51 | @@ -XXX,XX +XXX,XX @@ static uint64_t do_ats_write(CPUARMState *env, uint64_t value, | ||
52 | target_el = 3; | ||
53 | } else { | ||
54 | env->cp15.hpfar_el2 = extract64(fi.s2addr, 12, 47) << 4; | ||
55 | + if (arm_is_secure_below_el3(env) && fi.s1ns) { | ||
56 | + env->cp15.hpfar_el2 |= HPFAR_NS; | ||
57 | + } | ||
58 | target_el = 2; | ||
59 | } | ||
60 | take_exc = true; | ||
61 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
62 | fi->s2addr = addr; | ||
63 | fi->stage2 = true; | ||
64 | fi->s1ptw = true; | ||
65 | + fi->s1ns = !*is_secure; | ||
66 | return ~0; | ||
67 | } | ||
68 | if ((arm_hcr_el2_eff(env) & HCR_PTW) && | ||
69 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
70 | fi->s2addr = addr; | ||
71 | fi->stage2 = true; | ||
72 | fi->s1ptw = true; | ||
73 | + fi->s1ns = !*is_secure; | ||
74 | return ~0; | ||
75 | } | ||
76 | |||
77 | @@ -XXX,XX +XXX,XX @@ do_fault: | ||
78 | /* Tag the error as S2 for failed S1 PTW at S2 or ordinary S2. */ | ||
79 | fi->stage2 = fi->s1ptw || (mmu_idx == ARMMMUIdx_Stage2 || | ||
80 | mmu_idx == ARMMMUIdx_Stage2_S); | ||
81 | + fi->s1ns = mmu_idx == ARMMMUIdx_Stage2; | ||
82 | return true; | ||
83 | } | ||
84 | |||
85 | diff --git a/target/arm/tlb_helper.c b/target/arm/tlb_helper.c | 13 | diff --git a/target/arm/tlb_helper.c b/target/arm/tlb_helper.c |
86 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
87 | --- a/target/arm/tlb_helper.c | 15 | --- a/target/arm/tlb_helper.c |
88 | +++ b/target/arm/tlb_helper.c | 16 | +++ b/target/arm/tlb_helper.c |
17 | @@ -XXX,XX +XXX,XX @@ static inline uint32_t merge_syn_data_abort(uint32_t template_syn, | ||
18 | return syn; | ||
19 | } | ||
20 | |||
21 | -static void QEMU_NORETURN arm_deliver_fault(ARMCPU *cpu, vaddr addr, | ||
22 | - MMUAccessType access_type, | ||
23 | - int mmu_idx, ARMMMUFaultInfo *fi) | ||
24 | +static uint32_t compute_fsr_fsc(CPUARMState *env, ARMMMUFaultInfo *fi, | ||
25 | + int target_el, int mmu_idx, uint32_t *ret_fsc) | ||
26 | { | ||
27 | - CPUARMState *env = &cpu->env; | ||
28 | - int target_el; | ||
29 | - bool same_el; | ||
30 | - uint32_t syn, exc, fsr, fsc; | ||
31 | ARMMMUIdx arm_mmu_idx = core_to_arm_mmu_idx(env, mmu_idx); | ||
32 | - | ||
33 | - target_el = exception_target_el(env); | ||
34 | - if (fi->stage2) { | ||
35 | - target_el = 2; | ||
36 | - env->cp15.hpfar_el2 = extract64(fi->s2addr, 12, 47) << 4; | ||
37 | - if (arm_is_secure_below_el3(env) && fi->s1ns) { | ||
38 | - env->cp15.hpfar_el2 |= HPFAR_NS; | ||
39 | - } | ||
40 | - } | ||
41 | - same_el = (arm_current_el(env) == target_el); | ||
42 | + uint32_t fsr, fsc; | ||
43 | |||
44 | if (target_el == 2 || arm_el_is_aa64(env, target_el) || | ||
45 | arm_s1_regime_using_lpae_format(env, arm_mmu_idx)) { | ||
89 | @@ -XXX,XX +XXX,XX @@ static void QEMU_NORETURN arm_deliver_fault(ARMCPU *cpu, vaddr addr, | 46 | @@ -XXX,XX +XXX,XX @@ static void QEMU_NORETURN arm_deliver_fault(ARMCPU *cpu, vaddr addr, |
90 | if (fi->stage2) { | 47 | fsc = 0x3f; |
91 | target_el = 2; | 48 | } |
92 | env->cp15.hpfar_el2 = extract64(fi->s2addr, 12, 47) << 4; | 49 | |
50 | + *ret_fsc = fsc; | ||
51 | + return fsr; | ||
52 | +} | ||
53 | + | ||
54 | +static void QEMU_NORETURN arm_deliver_fault(ARMCPU *cpu, vaddr addr, | ||
55 | + MMUAccessType access_type, | ||
56 | + int mmu_idx, ARMMMUFaultInfo *fi) | ||
57 | +{ | ||
58 | + CPUARMState *env = &cpu->env; | ||
59 | + int target_el; | ||
60 | + bool same_el; | ||
61 | + uint32_t syn, exc, fsr, fsc; | ||
62 | + | ||
63 | + target_el = exception_target_el(env); | ||
64 | + if (fi->stage2) { | ||
65 | + target_el = 2; | ||
66 | + env->cp15.hpfar_el2 = extract64(fi->s2addr, 12, 47) << 4; | ||
93 | + if (arm_is_secure_below_el3(env) && fi->s1ns) { | 67 | + if (arm_is_secure_below_el3(env) && fi->s1ns) { |
94 | + env->cp15.hpfar_el2 |= HPFAR_NS; | 68 | + env->cp15.hpfar_el2 |= HPFAR_NS; |
95 | + } | 69 | + } |
96 | } | 70 | + } |
97 | same_el = (arm_current_el(env) == target_el); | 71 | + same_el = (arm_current_el(env) == target_el); |
98 | 72 | + | |
73 | + fsr = compute_fsr_fsc(env, fi, target_el, mmu_idx, &fsc); | ||
74 | + | ||
75 | if (access_type == MMU_INST_FETCH) { | ||
76 | syn = syn_insn_abort(same_el, fi->ea, fi->s1ptw, fsc); | ||
77 | exc = EXCP_PREFETCH_ABORT; | ||
99 | -- | 78 | -- |
100 | 2.20.1 | 79 | 2.25.1 |
101 | 80 | ||
102 | 81 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Without hardware acceleration, a cryptographically strong | 3 | For A64, any input to an indirect branch can cause this. |
4 | algorithm is too expensive for pauth_computepac. | 4 | |
5 | 5 | For A32, many indirect branch paths force the branch to be aligned, | |
6 | Even with hardware accel, we are not currently expecting | 6 | but BXWritePC does not. This includes the BX instruction but also |
7 | to link the linux-user binaries to any crypto libraries, | 7 | other interworking changes to PC. Prior to v8, this case is UNDEFINED. |
8 | and doing so would generally make the --static build fail. | 8 | With v8, this is CONSTRAINED UNPREDICTABLE and may either raise an |
9 | 9 | exception or force align the PC. | |
10 | So choose XXH64 as a reasonably quick and decent hash. | 10 | |
11 | 11 | We choose to raise an exception because we have the infrastructure, | |
12 | Tested-by: Mark Rutland <mark.rutland@arm.com> | 12 | it makes the generated code for gen_bx simpler, and it has the |
13 | possibility of catching more guest bugs. | ||
14 | |||
13 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 15 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
14 | Message-id: 20210111235740.462469-2-richard.henderson@linaro.org | ||
15 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 16 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 17 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
17 | --- | 18 | --- |
18 | include/qemu/xxhash.h | 98 +++++++++++++++++++++++++++++++++++++++ | 19 | target/arm/helper.h | 1 + |
19 | target/arm/cpu.h | 15 ++++-- | 20 | target/arm/syndrome.h | 5 ++++ |
20 | target/arm/pauth_helper.c | 27 +++++++++-- | 21 | linux-user/aarch64/cpu_loop.c | 46 ++++++++++++++++++++--------------- |
21 | 3 files changed, 131 insertions(+), 9 deletions(-) | 22 | target/arm/tlb_helper.c | 18 ++++++++++++++ |
22 | 23 | target/arm/translate-a64.c | 15 ++++++++++++ | |
23 | diff --git a/include/qemu/xxhash.h b/include/qemu/xxhash.h | 24 | target/arm/translate.c | 22 ++++++++++++++++- |
24 | index XXXXXXX..XXXXXXX 100644 | 25 | 6 files changed, 87 insertions(+), 20 deletions(-) |
25 | --- a/include/qemu/xxhash.h | 26 | |
26 | +++ b/include/qemu/xxhash.h | 27 | diff --git a/target/arm/helper.h b/target/arm/helper.h |
27 | @@ -XXX,XX +XXX,XX @@ static inline uint32_t qemu_xxhash6(uint64_t ab, uint64_t cd, uint32_t e, | 28 | index XXXXXXX..XXXXXXX 100644 |
28 | return qemu_xxhash7(ab, cd, e, f, 0); | 29 | --- a/target/arm/helper.h |
30 | +++ b/target/arm/helper.h | ||
31 | @@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_3(sel_flags, TCG_CALL_NO_RWG_SE, | ||
32 | DEF_HELPER_2(exception_internal, void, env, i32) | ||
33 | DEF_HELPER_4(exception_with_syndrome, void, env, i32, i32, i32) | ||
34 | DEF_HELPER_2(exception_bkpt_insn, void, env, i32) | ||
35 | +DEF_HELPER_2(exception_pc_alignment, noreturn, env, tl) | ||
36 | DEF_HELPER_1(setend, void, env) | ||
37 | DEF_HELPER_2(wfi, void, env, i32) | ||
38 | DEF_HELPER_1(wfe, void, env) | ||
39 | diff --git a/target/arm/syndrome.h b/target/arm/syndrome.h | ||
40 | index XXXXXXX..XXXXXXX 100644 | ||
41 | --- a/target/arm/syndrome.h | ||
42 | +++ b/target/arm/syndrome.h | ||
43 | @@ -XXX,XX +XXX,XX @@ static inline uint32_t syn_illegalstate(void) | ||
44 | return (EC_ILLEGALSTATE << ARM_EL_EC_SHIFT) | ARM_EL_IL; | ||
29 | } | 45 | } |
30 | 46 | ||
31 | +/* | 47 | +static inline uint32_t syn_pcalignment(void) |
32 | + * Component parts of the XXH64 algorithm from | ||
33 | + * https://github.com/Cyan4973/xxHash/blob/v0.8.0/xxhash.h | ||
34 | + * | ||
35 | + * The complete algorithm looks like | ||
36 | + * | ||
37 | + * i = 0; | ||
38 | + * if (len >= 32) { | ||
39 | + * v1 = seed + XXH_PRIME64_1 + XXH_PRIME64_2; | ||
40 | + * v2 = seed + XXH_PRIME64_2; | ||
41 | + * v3 = seed + 0; | ||
42 | + * v4 = seed - XXH_PRIME64_1; | ||
43 | + * do { | ||
44 | + * v1 = XXH64_round(v1, get64bits(input + i)); | ||
45 | + * v2 = XXH64_round(v2, get64bits(input + i + 8)); | ||
46 | + * v3 = XXH64_round(v3, get64bits(input + i + 16)); | ||
47 | + * v4 = XXH64_round(v4, get64bits(input + i + 24)); | ||
48 | + * } while ((i += 32) <= len); | ||
49 | + * h64 = XXH64_mergerounds(v1, v2, v3, v4); | ||
50 | + * } else { | ||
51 | + * h64 = seed + XXH_PRIME64_5; | ||
52 | + * } | ||
53 | + * h64 += len; | ||
54 | + * | ||
55 | + * for (; i + 8 <= len; i += 8) { | ||
56 | + * h64 ^= XXH64_round(0, get64bits(input + i)); | ||
57 | + * h64 = rol64(h64, 27) * XXH_PRIME64_1 + XXH_PRIME64_4; | ||
58 | + * } | ||
59 | + * for (; i + 4 <= len; i += 4) { | ||
60 | + * h64 ^= get32bits(input + i) * PRIME64_1; | ||
61 | + * h64 = rol64(h64, 23) * XXH_PRIME64_2 + XXH_PRIME64_3; | ||
62 | + * } | ||
63 | + * for (; i < len; i += 1) { | ||
64 | + * h64 ^= get8bits(input + i) * XXH_PRIME64_5; | ||
65 | + * h64 = rol64(h64, 11) * XXH_PRIME64_1; | ||
66 | + * } | ||
67 | + * | ||
68 | + * return XXH64_avalanche(h64) | ||
69 | + * | ||
70 | + * Exposing the pieces instead allows for simplified usage when | ||
71 | + * the length is a known constant and the inputs are in registers. | ||
72 | + */ | ||
73 | +#define XXH_PRIME64_1 0x9E3779B185EBCA87ULL | ||
74 | +#define XXH_PRIME64_2 0xC2B2AE3D27D4EB4FULL | ||
75 | +#define XXH_PRIME64_3 0x165667B19E3779F9ULL | ||
76 | +#define XXH_PRIME64_4 0x85EBCA77C2B2AE63ULL | ||
77 | +#define XXH_PRIME64_5 0x27D4EB2F165667C5ULL | ||
78 | + | ||
79 | +static inline uint64_t XXH64_round(uint64_t acc, uint64_t input) | ||
80 | +{ | 48 | +{ |
81 | + return rol64(acc + input * XXH_PRIME64_2, 31) * XXH_PRIME64_1; | 49 | + return (EC_PCALIGNMENT << ARM_EL_EC_SHIFT) | ARM_EL_IL; |
82 | +} | 50 | +} |
83 | + | 51 | + |
84 | +static inline uint64_t XXH64_mergeround(uint64_t acc, uint64_t val) | 52 | #endif /* TARGET_ARM_SYNDROME_H */ |
53 | diff --git a/linux-user/aarch64/cpu_loop.c b/linux-user/aarch64/cpu_loop.c | ||
54 | index XXXXXXX..XXXXXXX 100644 | ||
55 | --- a/linux-user/aarch64/cpu_loop.c | ||
56 | +++ b/linux-user/aarch64/cpu_loop.c | ||
57 | @@ -XXX,XX +XXX,XX @@ void cpu_loop(CPUARMState *env) | ||
58 | break; | ||
59 | case EXCP_PREFETCH_ABORT: | ||
60 | case EXCP_DATA_ABORT: | ||
61 | - /* We should only arrive here with EC in {DATAABORT, INSNABORT}. */ | ||
62 | ec = syn_get_ec(env->exception.syndrome); | ||
63 | - assert(ec == EC_DATAABORT || ec == EC_INSNABORT); | ||
64 | - | ||
65 | - /* Both EC have the same format for FSC, or close enough. */ | ||
66 | - fsc = extract32(env->exception.syndrome, 0, 6); | ||
67 | - switch (fsc) { | ||
68 | - case 0x04 ... 0x07: /* Translation fault, level {0-3} */ | ||
69 | - si_signo = TARGET_SIGSEGV; | ||
70 | - si_code = TARGET_SEGV_MAPERR; | ||
71 | + switch (ec) { | ||
72 | + case EC_DATAABORT: | ||
73 | + case EC_INSNABORT: | ||
74 | + /* Both EC have the same format for FSC, or close enough. */ | ||
75 | + fsc = extract32(env->exception.syndrome, 0, 6); | ||
76 | + switch (fsc) { | ||
77 | + case 0x04 ... 0x07: /* Translation fault, level {0-3} */ | ||
78 | + si_signo = TARGET_SIGSEGV; | ||
79 | + si_code = TARGET_SEGV_MAPERR; | ||
80 | + break; | ||
81 | + case 0x09 ... 0x0b: /* Access flag fault, level {1-3} */ | ||
82 | + case 0x0d ... 0x0f: /* Permission fault, level {1-3} */ | ||
83 | + si_signo = TARGET_SIGSEGV; | ||
84 | + si_code = TARGET_SEGV_ACCERR; | ||
85 | + break; | ||
86 | + case 0x11: /* Synchronous Tag Check Fault */ | ||
87 | + si_signo = TARGET_SIGSEGV; | ||
88 | + si_code = TARGET_SEGV_MTESERR; | ||
89 | + break; | ||
90 | + case 0x21: /* Alignment fault */ | ||
91 | + si_signo = TARGET_SIGBUS; | ||
92 | + si_code = TARGET_BUS_ADRALN; | ||
93 | + break; | ||
94 | + default: | ||
95 | + g_assert_not_reached(); | ||
96 | + } | ||
97 | break; | ||
98 | - case 0x09 ... 0x0b: /* Access flag fault, level {1-3} */ | ||
99 | - case 0x0d ... 0x0f: /* Permission fault, level {1-3} */ | ||
100 | - si_signo = TARGET_SIGSEGV; | ||
101 | - si_code = TARGET_SEGV_ACCERR; | ||
102 | - break; | ||
103 | - case 0x11: /* Synchronous Tag Check Fault */ | ||
104 | - si_signo = TARGET_SIGSEGV; | ||
105 | - si_code = TARGET_SEGV_MTESERR; | ||
106 | - break; | ||
107 | - case 0x21: /* Alignment fault */ | ||
108 | + case EC_PCALIGNMENT: | ||
109 | si_signo = TARGET_SIGBUS; | ||
110 | si_code = TARGET_BUS_ADRALN; | ||
111 | break; | ||
112 | diff --git a/target/arm/tlb_helper.c b/target/arm/tlb_helper.c | ||
113 | index XXXXXXX..XXXXXXX 100644 | ||
114 | --- a/target/arm/tlb_helper.c | ||
115 | +++ b/target/arm/tlb_helper.c | ||
116 | @@ -XXX,XX +XXX,XX @@ | ||
117 | #include "cpu.h" | ||
118 | #include "internals.h" | ||
119 | #include "exec/exec-all.h" | ||
120 | +#include "exec/helper-proto.h" | ||
121 | |||
122 | static inline uint32_t merge_syn_data_abort(uint32_t template_syn, | ||
123 | unsigned int target_el, | ||
124 | @@ -XXX,XX +XXX,XX @@ void arm_cpu_do_unaligned_access(CPUState *cs, vaddr vaddr, | ||
125 | arm_deliver_fault(cpu, vaddr, access_type, mmu_idx, &fi); | ||
126 | } | ||
127 | |||
128 | +void helper_exception_pc_alignment(CPUARMState *env, target_ulong pc) | ||
85 | +{ | 129 | +{ |
86 | + return (acc ^ XXH64_round(0, val)) * XXH_PRIME64_1 + XXH_PRIME64_4; | 130 | + ARMMMUFaultInfo fi = { .type = ARMFault_Alignment }; |
131 | + int target_el = exception_target_el(env); | ||
132 | + int mmu_idx = cpu_mmu_index(env, true); | ||
133 | + uint32_t fsc; | ||
134 | + | ||
135 | + env->exception.vaddress = pc; | ||
136 | + | ||
137 | + /* | ||
138 | + * Note that the fsc is not applicable to this exception, | ||
139 | + * since any syndrome is pcalignment not insn_abort. | ||
140 | + */ | ||
141 | + env->exception.fsr = compute_fsr_fsc(env, &fi, target_el, mmu_idx, &fsc); | ||
142 | + raise_exception(env, EXCP_PREFETCH_ABORT, syn_pcalignment(), target_el); | ||
87 | +} | 143 | +} |
88 | + | 144 | + |
89 | +static inline uint64_t XXH64_mergerounds(uint64_t v1, uint64_t v2, | 145 | #if !defined(CONFIG_USER_ONLY) |
90 | + uint64_t v3, uint64_t v4) | 146 | |
91 | +{ | 147 | /* |
92 | + uint64_t h64; | 148 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c |
93 | + | 149 | index XXXXXXX..XXXXXXX 100644 |
94 | + h64 = rol64(v1, 1) + rol64(v2, 7) + rol64(v3, 12) + rol64(v4, 18); | 150 | --- a/target/arm/translate-a64.c |
95 | + h64 = XXH64_mergeround(h64, v1); | 151 | +++ b/target/arm/translate-a64.c |
96 | + h64 = XXH64_mergeround(h64, v2); | 152 | @@ -XXX,XX +XXX,XX @@ static void aarch64_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu) |
97 | + h64 = XXH64_mergeround(h64, v3); | 153 | uint64_t pc = s->base.pc_next; |
98 | + h64 = XXH64_mergeround(h64, v4); | 154 | uint32_t insn; |
99 | + | 155 | |
100 | + return h64; | 156 | + /* Singlestep exceptions have the highest priority. */ |
101 | +} | 157 | if (s->ss_active && !s->pstate_ss) { |
102 | + | 158 | /* Singlestep state is Active-pending. |
103 | +static inline uint64_t XXH64_avalanche(uint64_t h64) | 159 | * If we're in this state at the start of a TB then either |
104 | +{ | 160 | @@ -XXX,XX +XXX,XX @@ static void aarch64_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu) |
105 | + h64 ^= h64 >> 33; | 161 | return; |
106 | + h64 *= XXH_PRIME64_2; | 162 | } |
107 | + h64 ^= h64 >> 29; | 163 | |
108 | + h64 *= XXH_PRIME64_3; | 164 | + if (pc & 3) { |
109 | + h64 ^= h64 >> 32; | 165 | + /* |
110 | + return h64; | 166 | + * PC alignment fault. This has priority over the instruction abort |
111 | +} | 167 | + * that we would receive from a translation fault via arm_ldl_code. |
112 | + | 168 | + * This should only be possible after an indirect branch, at the |
113 | +static inline uint64_t qemu_xxhash64_4(uint64_t a, uint64_t b, | 169 | + * start of the TB. |
114 | + uint64_t c, uint64_t d) | 170 | + */ |
115 | +{ | 171 | + assert(s->base.num_insns == 1); |
116 | + uint64_t v1 = QEMU_XXHASH_SEED + XXH_PRIME64_1 + XXH_PRIME64_2; | 172 | + gen_helper_exception_pc_alignment(cpu_env, tcg_constant_tl(pc)); |
117 | + uint64_t v2 = QEMU_XXHASH_SEED + XXH_PRIME64_2; | 173 | + s->base.is_jmp = DISAS_NORETURN; |
118 | + uint64_t v3 = QEMU_XXHASH_SEED + 0; | 174 | + s->base.pc_next = QEMU_ALIGN_UP(pc, 4); |
119 | + uint64_t v4 = QEMU_XXHASH_SEED - XXH_PRIME64_1; | 175 | + return; |
120 | + | ||
121 | + v1 = XXH64_round(v1, a); | ||
122 | + v2 = XXH64_round(v2, b); | ||
123 | + v3 = XXH64_round(v3, c); | ||
124 | + v4 = XXH64_round(v4, d); | ||
125 | + | ||
126 | + return XXH64_avalanche(XXH64_mergerounds(v1, v2, v3, v4)); | ||
127 | +} | ||
128 | + | ||
129 | #endif /* QEMU_XXHASH_H */ | ||
130 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
131 | index XXXXXXX..XXXXXXX 100644 | ||
132 | --- a/target/arm/cpu.h | ||
133 | +++ b/target/arm/cpu.h | ||
134 | @@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_fcma(const ARMISARegisters *id) | ||
135 | static inline bool isar_feature_aa64_pauth(const ARMISARegisters *id) | ||
136 | { | ||
137 | /* | ||
138 | - * Note that while QEMU will only implement the architected algorithm | ||
139 | - * QARMA, and thus APA+GPA, the host cpu for kvm may use implementation | ||
140 | - * defined algorithms, and thus API+GPI, and this predicate controls | ||
141 | - * migration of the 128-bit keys. | ||
142 | + * Return true if any form of pauth is enabled, as this | ||
143 | + * predicate controls migration of the 128-bit keys. | ||
144 | */ | ||
145 | return (id->id_aa64isar1 & | ||
146 | (FIELD_DP64(0, ID_AA64ISAR1, APA, 0xf) | | ||
147 | @@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_pauth(const ARMISARegisters *id) | ||
148 | FIELD_DP64(0, ID_AA64ISAR1, GPI, 0xf))) != 0; | ||
149 | } | ||
150 | |||
151 | +static inline bool isar_feature_aa64_pauth_arch(const ARMISARegisters *id) | ||
152 | +{ | ||
153 | + /* | ||
154 | + * Return true if pauth is enabled with the architected QARMA algorithm. | ||
155 | + * QEMU will always set APA+GPA to the same value. | ||
156 | + */ | ||
157 | + return FIELD_EX64(id->id_aa64isar1, ID_AA64ISAR1, APA) != 0; | ||
158 | +} | ||
159 | + | ||
160 | static inline bool isar_feature_aa64_sb(const ARMISARegisters *id) | ||
161 | { | ||
162 | return FIELD_EX64(id->id_aa64isar1, ID_AA64ISAR1, SB) != 0; | ||
163 | diff --git a/target/arm/pauth_helper.c b/target/arm/pauth_helper.c | ||
164 | index XXXXXXX..XXXXXXX 100644 | ||
165 | --- a/target/arm/pauth_helper.c | ||
166 | +++ b/target/arm/pauth_helper.c | ||
167 | @@ -XXX,XX +XXX,XX @@ | ||
168 | #include "exec/cpu_ldst.h" | ||
169 | #include "exec/helper-proto.h" | ||
170 | #include "tcg/tcg-gvec-desc.h" | ||
171 | +#include "qemu/xxhash.h" | ||
172 | |||
173 | |||
174 | static uint64_t pac_cell_shuffle(uint64_t i) | ||
175 | @@ -XXX,XX +XXX,XX @@ static uint64_t tweak_inv_shuffle(uint64_t i) | ||
176 | return o; | ||
177 | } | ||
178 | |||
179 | -static uint64_t pauth_computepac(uint64_t data, uint64_t modifier, | ||
180 | - ARMPACKey key) | ||
181 | +static uint64_t pauth_computepac_architected(uint64_t data, uint64_t modifier, | ||
182 | + ARMPACKey key) | ||
183 | { | ||
184 | static const uint64_t RC[5] = { | ||
185 | 0x0000000000000000ull, | ||
186 | @@ -XXX,XX +XXX,XX @@ static uint64_t pauth_computepac(uint64_t data, uint64_t modifier, | ||
187 | return workingval; | ||
188 | } | ||
189 | |||
190 | +static uint64_t pauth_computepac_impdef(uint64_t data, uint64_t modifier, | ||
191 | + ARMPACKey key) | ||
192 | +{ | ||
193 | + return qemu_xxhash64_4(data, modifier, key.lo, key.hi); | ||
194 | +} | ||
195 | + | ||
196 | +static uint64_t pauth_computepac(CPUARMState *env, uint64_t data, | ||
197 | + uint64_t modifier, ARMPACKey key) | ||
198 | +{ | ||
199 | + if (cpu_isar_feature(aa64_pauth_arch, env_archcpu(env))) { | ||
200 | + return pauth_computepac_architected(data, modifier, key); | ||
201 | + } else { | ||
202 | + return pauth_computepac_impdef(data, modifier, key); | ||
203 | + } | 176 | + } |
204 | +} | 177 | + |
205 | + | 178 | s->pc_curr = pc; |
206 | static uint64_t pauth_addpac(CPUARMState *env, uint64_t ptr, uint64_t modifier, | 179 | insn = arm_ldl_code(env, &s->base, pc, s->sctlr_b); |
207 | ARMPACKey *key, bool data) | 180 | s->insn = insn; |
208 | { | 181 | diff --git a/target/arm/translate.c b/target/arm/translate.c |
209 | @@ -XXX,XX +XXX,XX @@ static uint64_t pauth_addpac(CPUARMState *env, uint64_t ptr, uint64_t modifier, | 182 | index XXXXXXX..XXXXXXX 100644 |
210 | bot_bit = 64 - param.tsz; | 183 | --- a/target/arm/translate.c |
211 | ext_ptr = deposit64(ptr, bot_bit, top_bit - bot_bit, ext); | 184 | +++ b/target/arm/translate.c |
212 | 185 | @@ -XXX,XX +XXX,XX @@ static void arm_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu) | |
213 | - pac = pauth_computepac(ext_ptr, modifier, *key); | 186 | uint32_t pc = dc->base.pc_next; |
214 | + pac = pauth_computepac(env, ext_ptr, modifier, *key); | 187 | unsigned int insn; |
215 | 188 | ||
216 | /* | 189 | - if (arm_check_ss_active(dc) || arm_check_kernelpage(dc)) { |
217 | * Check if the ptr has good extension bits and corrupt the | 190 | + /* Singlestep exceptions have the highest priority. */ |
218 | @@ -XXX,XX +XXX,XX @@ static uint64_t pauth_auth(CPUARMState *env, uint64_t ptr, uint64_t modifier, | 191 | + if (arm_check_ss_active(dc)) { |
219 | uint64_t pac, orig_ptr, test; | 192 | + dc->base.pc_next = pc + 4; |
220 | 193 | + return; | |
221 | orig_ptr = pauth_original_ptr(ptr, param); | 194 | + } |
222 | - pac = pauth_computepac(orig_ptr, modifier, *key); | 195 | + |
223 | + pac = pauth_computepac(env, orig_ptr, modifier, *key); | 196 | + if (pc & 3) { |
224 | bot_bit = 64 - param.tsz; | 197 | + /* |
225 | top_bit = 64 - 8 * param.tbi; | 198 | + * PC alignment fault. This has priority over the instruction abort |
226 | 199 | + * that we would receive from a translation fault via arm_ldl_code | |
227 | @@ -XXX,XX +XXX,XX @@ uint64_t HELPER(pacga)(CPUARMState *env, uint64_t x, uint64_t y) | 200 | + * (or the execution of the kernelpage entrypoint). This should only |
228 | uint64_t pac; | 201 | + * be possible after an indirect branch, at the start of the TB. |
229 | 202 | + */ | |
230 | pauth_check_trap(env, arm_current_el(env), GETPC()); | 203 | + assert(dc->base.num_insns == 1); |
231 | - pac = pauth_computepac(x, y, env->keys.apga); | 204 | + gen_helper_exception_pc_alignment(cpu_env, tcg_constant_tl(pc)); |
232 | + pac = pauth_computepac(env, x, y, env->keys.apga); | 205 | + dc->base.is_jmp = DISAS_NORETURN; |
233 | 206 | + dc->base.pc_next = QEMU_ALIGN_UP(pc, 4); | |
234 | return pac & 0xffffffff00000000ull; | 207 | + return; |
235 | } | 208 | + } |
209 | + | ||
210 | + if (arm_check_kernelpage(dc)) { | ||
211 | dc->base.pc_next = pc + 4; | ||
212 | return; | ||
213 | } | ||
236 | -- | 214 | -- |
237 | 2.20.1 | 215 | 2.25.1 |
238 | 216 | ||
239 | 217 | diff view generated by jsdifflib |
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | This adds handling for the SCR_EL3.EEL2 bit. | 3 | Misaligned thumb PC is architecturally impossible. |
4 | Assert is better than proceeding, in case we've missed | ||
5 | something somewhere. | ||
4 | 6 | ||
5 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 7 | Expand a comment about aligning the pc in gdbstub. |
6 | Message-id: 20210112104511.36576-17-remi.denis.courmont@huawei.com | 8 | Fail an incoming migrate if a thumb pc is misaligned. |
7 | [PMM: Applied fixes for review issues noted by RTH: | 9 | |
8 | - check for FEATURE_AARCH64 before checking sel2 isar feature | 10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
9 | - correct the commit message subject line] | 11 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
10 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | --- | 13 | --- |
13 | target/arm/cpu.h | 8 ++++++-- | 14 | target/arm/gdbstub.c | 9 +++++++-- |
14 | target/arm/cpu.c | 2 +- | 15 | target/arm/machine.c | 10 ++++++++++ |
15 | target/arm/helper.c | 19 ++++++++++++++++--- | 16 | target/arm/translate.c | 3 +++ |
16 | target/arm/translate.c | 15 +++++++++++++-- | 17 | 3 files changed, 20 insertions(+), 2 deletions(-) |
17 | 4 files changed, 36 insertions(+), 8 deletions(-) | ||
18 | 18 | ||
19 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 19 | diff --git a/target/arm/gdbstub.c b/target/arm/gdbstub.c |
20 | index XXXXXXX..XXXXXXX 100644 | 20 | index XXXXXXX..XXXXXXX 100644 |
21 | --- a/target/arm/cpu.h | 21 | --- a/target/arm/gdbstub.c |
22 | +++ b/target/arm/cpu.h | 22 | +++ b/target/arm/gdbstub.c |
23 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_is_secure(CPUARMState *env) | 23 | @@ -XXX,XX +XXX,XX @@ int arm_cpu_gdb_write_register(CPUState *cs, uint8_t *mem_buf, int n) |
24 | static inline bool arm_is_el2_enabled(CPUARMState *env) | 24 | |
25 | { | 25 | tmp = ldl_p(mem_buf); |
26 | if (arm_feature(env, ARM_FEATURE_EL2)) { | 26 | |
27 | - return !arm_is_secure_below_el3(env); | 27 | - /* Mask out low bit of PC to workaround gdb bugs. This will probably |
28 | + if (arm_is_secure_below_el3(env)) { | 28 | - cause problems if we ever implement the Jazelle DBX extensions. */ |
29 | + return (env->cp15.scr_el3 & SCR_EEL2) != 0; | 29 | + /* |
30 | + } | 30 | + * Mask out low bits of PC to workaround gdb bugs. |
31 | + return true; | 31 | + * This avoids an assert in thumb_tr_translate_insn, because it is |
32 | + * architecturally impossible to misalign the pc. | ||
33 | + * This will probably cause problems if we ever implement the | ||
34 | + * Jazelle DBX extensions. | ||
35 | + */ | ||
36 | if (n == 15) { | ||
37 | tmp &= ~1; | ||
32 | } | 38 | } |
33 | return false; | 39 | diff --git a/target/arm/machine.c b/target/arm/machine.c |
34 | } | 40 | index XXXXXXX..XXXXXXX 100644 |
35 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_el_is_aa64(CPUARMState *env, int el) | 41 | --- a/target/arm/machine.c |
36 | return aa64; | 42 | +++ b/target/arm/machine.c |
43 | @@ -XXX,XX +XXX,XX @@ static int cpu_post_load(void *opaque, int version_id) | ||
44 | return -1; | ||
45 | } | ||
37 | } | 46 | } |
38 | 47 | + | |
39 | - if (arm_feature(env, ARM_FEATURE_EL3)) { | 48 | + /* |
40 | + if (arm_feature(env, ARM_FEATURE_EL3) && | 49 | + * Misaligned thumb pc is architecturally impossible. |
41 | + ((env->cp15.scr_el3 & SCR_NS) || !(env->cp15.scr_el3 & SCR_EEL2))) { | 50 | + * We have an assert in thumb_tr_translate_insn to verify this. |
42 | aa64 = aa64 && (env->cp15.scr_el3 & SCR_RW); | 51 | + * Fail an incoming migrate to avoid this assert. |
52 | + */ | ||
53 | + if (!is_a64(env) && env->thumb && (env->regs[15] & 1)) { | ||
54 | + return -1; | ||
55 | + } | ||
56 | + | ||
57 | if (!kvm_enabled()) { | ||
58 | pmu_op_finish(&cpu->env); | ||
43 | } | 59 | } |
44 | |||
45 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | ||
46 | index XXXXXXX..XXXXXXX 100644 | ||
47 | --- a/target/arm/cpu.c | ||
48 | +++ b/target/arm/cpu.c | ||
49 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_excp_unmasked(CPUState *cs, unsigned int excp_idx, | ||
50 | * masked from Secure state. The HCR and SCR settings | ||
51 | * don't affect the masking logic, only the interrupt routing. | ||
52 | */ | ||
53 | - if (target_el == 3 || !secure) { | ||
54 | + if (target_el == 3 || !secure || (env->cp15.scr_el3 & SCR_EEL2)) { | ||
55 | unmasked = true; | ||
56 | } | ||
57 | } else { | ||
58 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
59 | index XXXXXXX..XXXXXXX 100644 | ||
60 | --- a/target/arm/helper.c | ||
61 | +++ b/target/arm/helper.c | ||
62 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_trap_aa32s_el1(CPUARMState *env, | ||
63 | return CP_ACCESS_OK; | ||
64 | } | ||
65 | if (arm_is_secure_below_el3(env)) { | ||
66 | + if (env->cp15.scr_el3 & SCR_EEL2) { | ||
67 | + return CP_ACCESS_TRAP_EL2; | ||
68 | + } | ||
69 | return CP_ACCESS_TRAP_EL3; | ||
70 | } | ||
71 | /* This will be EL1 NS and EL2 NS, which just UNDEF */ | ||
72 | @@ -XXX,XX +XXX,XX @@ static void scr_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
73 | if (cpu_isar_feature(aa64_pauth, cpu)) { | ||
74 | valid_mask |= SCR_API | SCR_APK; | ||
75 | } | ||
76 | + if (cpu_isar_feature(aa64_sel2, cpu)) { | ||
77 | + valid_mask |= SCR_EEL2; | ||
78 | + } | ||
79 | if (cpu_isar_feature(aa64_mte, cpu)) { | ||
80 | valid_mask |= SCR_ATA; | ||
81 | } | ||
82 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult ats_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
83 | bool isread) | ||
84 | { | ||
85 | if (ri->opc2 & 4) { | ||
86 | - /* The ATS12NSO* operations must trap to EL3 if executed in | ||
87 | + /* The ATS12NSO* operations must trap to EL3 or EL2 if executed in | ||
88 | * Secure EL1 (which can only happen if EL3 is AArch64). | ||
89 | * They are simply UNDEF if executed from NS EL1. | ||
90 | * They function normally from EL2 or EL3. | ||
91 | */ | ||
92 | if (arm_current_el(env) == 1) { | ||
93 | if (arm_is_secure_below_el3(env)) { | ||
94 | + if (env->cp15.scr_el3 & SCR_EEL2) { | ||
95 | + return CP_ACCESS_TRAP_UNCATEGORIZED_EL2; | ||
96 | + } | ||
97 | return CP_ACCESS_TRAP_UNCATEGORIZED_EL3; | ||
98 | } | ||
99 | return CP_ACCESS_TRAP_UNCATEGORIZED; | ||
100 | @@ -XXX,XX +XXX,XX @@ static void ats1h_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
101 | static CPAccessResult at_s1e2_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
102 | bool isread) | ||
103 | { | ||
104 | - if (arm_current_el(env) == 3 && !(env->cp15.scr_el3 & SCR_NS)) { | ||
105 | + if (arm_current_el(env) == 3 && | ||
106 | + !(env->cp15.scr_el3 & (SCR_NS | SCR_EEL2))) { | ||
107 | return CP_ACCESS_TRAP; | ||
108 | } | ||
109 | return CP_ACCESS_OK; | ||
110 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult nsacr_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
111 | bool isread) | ||
112 | { | ||
113 | /* The NSACR is RW at EL3, and RO for NS EL1 and NS EL2. | ||
114 | - * At Secure EL1 it traps to EL3. | ||
115 | + * At Secure EL1 it traps to EL3 or EL2. | ||
116 | */ | ||
117 | if (arm_current_el(env) == 3) { | ||
118 | return CP_ACCESS_OK; | ||
119 | } | ||
120 | if (arm_is_secure_below_el3(env)) { | ||
121 | + if (env->cp15.scr_el3 & SCR_EEL2) { | ||
122 | + return CP_ACCESS_TRAP_EL2; | ||
123 | + } | ||
124 | return CP_ACCESS_TRAP_EL3; | ||
125 | } | ||
126 | /* Accesses from EL1 NS and EL2 NS are UNDEF for write but allow reads. */ | ||
127 | diff --git a/target/arm/translate.c b/target/arm/translate.c | 60 | diff --git a/target/arm/translate.c b/target/arm/translate.c |
128 | index XXXXXXX..XXXXXXX 100644 | 61 | index XXXXXXX..XXXXXXX 100644 |
129 | --- a/target/arm/translate.c | 62 | --- a/target/arm/translate.c |
130 | +++ b/target/arm/translate.c | 63 | +++ b/target/arm/translate.c |
131 | @@ -XXX,XX +XXX,XX @@ static bool msr_banked_access_decode(DisasContext *s, int r, int sysm, int rn, | 64 | @@ -XXX,XX +XXX,XX @@ static void thumb_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu) |
132 | } | 65 | uint32_t insn; |
133 | if (s->current_el == 1) { | 66 | bool is_16bit; |
134 | /* If we're in Secure EL1 (which implies that EL3 is AArch64) | 67 | |
135 | - * then accesses to Mon registers trap to EL3 | 68 | + /* Misaligned thumb PC is architecturally impossible. */ |
136 | + * then accesses to Mon registers trap to Secure EL2, if it exists, | 69 | + assert((dc->base.pc_next & 1) == 0); |
137 | + * otherwise EL3. | ||
138 | */ | ||
139 | - TCGv_i32 tcg_el = tcg_const_i32(3); | ||
140 | + TCGv_i32 tcg_el; | ||
141 | + | 70 | + |
142 | + if (arm_dc_feature(s, ARM_FEATURE_AARCH64) && | 71 | if (arm_check_ss_active(dc) || arm_check_kernelpage(dc)) { |
143 | + dc_isar_feature(aa64_sel2, s)) { | 72 | dc->base.pc_next = pc + 2; |
144 | + /* Target EL is EL<3 minus SCR_EL3.EEL2> */ | 73 | return; |
145 | + tcg_el = load_cpu_field(cp15.scr_el3); | ||
146 | + tcg_gen_sextract_i32(tcg_el, tcg_el, ctz32(SCR_EEL2), 1); | ||
147 | + tcg_gen_addi_i32(tcg_el, tcg_el, 3); | ||
148 | + } else { | ||
149 | + tcg_el = tcg_const_i32(3); | ||
150 | + } | ||
151 | |||
152 | gen_exception_el(s, EXCP_UDEF, syn_uncategorized(), tcg_el); | ||
153 | tcg_temp_free_i32(tcg_el); | ||
154 | -- | 74 | -- |
155 | 2.20.1 | 75 | 2.25.1 |
156 | 76 | ||
157 | 77 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | The crypto overhead of emulating pauth can be significant for | 3 | Both single-step and pc alignment faults have priority over |
4 | some workloads. Add two boolean properties that allows the | 4 | breakpoint exceptions. |
5 | feature to be turned off, on with the architected algorithm, | ||
6 | or on with an implementation defined algorithm. | ||
7 | 5 | ||
8 | We need two intermediate booleans to control the state while | 6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
9 | parsing properties lest we clobber ID_AA64ISAR1 into an invalid | ||
10 | intermediate state. | ||
11 | |||
12 | Tested-by: Mark Rutland <mark.rutland@arm.com> | ||
13 | Reviewed-by: Andrew Jones <drjones@redhat.com> | ||
14 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
15 | Message-id: 20210111235740.462469-3-richard.henderson@linaro.org | ||
16 | [PMM: fixed docs typo, tweaked text to clarify that the impdef | ||
17 | algorithm is specific to QEMU] | ||
18 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
19 | --- | 9 | --- |
20 | docs/system/arm/cpu-features.rst | 21 +++++++++++++++++ | 10 | target/arm/debug_helper.c | 23 +++++++++++++++++++++++ |
21 | target/arm/cpu.h | 10 ++++++++ | 11 | 1 file changed, 23 insertions(+) |
22 | target/arm/cpu.c | 13 +++++++++++ | ||
23 | target/arm/cpu64.c | 40 ++++++++++++++++++++++++++++---- | ||
24 | target/arm/monitor.c | 1 + | ||
25 | tests/qtest/arm-cpu-features.c | 13 +++++++++++ | ||
26 | 6 files changed, 94 insertions(+), 4 deletions(-) | ||
27 | 12 | ||
28 | diff --git a/docs/system/arm/cpu-features.rst b/docs/system/arm/cpu-features.rst | 13 | diff --git a/target/arm/debug_helper.c b/target/arm/debug_helper.c |
29 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
30 | --- a/docs/system/arm/cpu-features.rst | 15 | --- a/target/arm/debug_helper.c |
31 | +++ b/docs/system/arm/cpu-features.rst | 16 | +++ b/target/arm/debug_helper.c |
32 | @@ -XXX,XX +XXX,XX @@ the list of KVM VCPU features and their descriptions. | 17 | @@ -XXX,XX +XXX,XX @@ bool arm_debug_check_breakpoint(CPUState *cs) |
33 | influence the guest scheduler behavior and/or be | 18 | { |
34 | exposed to the guest userspace. | 19 | ARMCPU *cpu = ARM_CPU(cs); |
35 | 20 | CPUARMState *env = &cpu->env; | |
36 | +TCG VCPU Features | 21 | + target_ulong pc; |
37 | +================= | 22 | int n; |
38 | + | 23 | |
39 | +TCG VCPU features are CPU features that are specific to TCG. | 24 | /* |
40 | +Below is the list of TCG VCPU features and their descriptions. | 25 | @@ -XXX,XX +XXX,XX @@ bool arm_debug_check_breakpoint(CPUState *cs) |
41 | + | 26 | return false; |
42 | + pauth Enable or disable `FEAT_Pauth`, pointer | 27 | } |
43 | + authentication. By default, the feature is | 28 | |
44 | + enabled with `-cpu max`. | 29 | + /* |
45 | + | 30 | + * Single-step exceptions have priority over breakpoint exceptions. |
46 | + pauth-impdef When `FEAT_Pauth` is enabled, either the | 31 | + * If single-step state is active-pending, suppress the bp. |
47 | + *impdef* (Implementation Defined) algorithm | 32 | + */ |
48 | + is enabled or the *architected* QARMA algorithm | 33 | + if (arm_singlestep_active(env) && !(env->pstate & PSTATE_SS)) { |
49 | + is enabled. By default the impdef algorithm | 34 | + return false; |
50 | + is disabled, and QARMA is enabled. | 35 | + } |
51 | + | ||
52 | + The architected QARMA algorithm has good | ||
53 | + cryptographic properties, but can be quite slow | ||
54 | + to emulate. The impdef algorithm used by QEMU | ||
55 | + is non-cryptographic but significantly faster. | ||
56 | + | ||
57 | SVE CPU Properties | ||
58 | ================== | ||
59 | |||
60 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
61 | index XXXXXXX..XXXXXXX 100644 | ||
62 | --- a/target/arm/cpu.h | ||
63 | +++ b/target/arm/cpu.h | ||
64 | @@ -XXX,XX +XXX,XX @@ typedef struct { | ||
65 | #ifdef TARGET_AARCH64 | ||
66 | # define ARM_MAX_VQ 16 | ||
67 | void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp); | ||
68 | +void arm_cpu_pauth_finalize(ARMCPU *cpu, Error **errp); | ||
69 | #else | ||
70 | # define ARM_MAX_VQ 1 | ||
71 | static inline void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp) { } | ||
72 | +static inline void arm_cpu_pauth_finalize(ARMCPU *cpu, Error **errp) { } | ||
73 | #endif | ||
74 | |||
75 | typedef struct ARMVectorReg { | ||
76 | @@ -XXX,XX +XXX,XX @@ struct ARMCPU { | ||
77 | uint64_t reset_cbar; | ||
78 | uint32_t reset_auxcr; | ||
79 | bool reset_hivecs; | ||
80 | + | 36 | + |
81 | + /* | 37 | + /* |
82 | + * Intermediate values used during property parsing. | 38 | + * PC alignment faults have priority over breakpoint exceptions. |
83 | + * Once finalized, the values should be read from ID_AA64ISAR1. | ||
84 | + */ | 39 | + */ |
85 | + bool prop_pauth; | 40 | + pc = is_a64(env) ? env->pc : env->regs[15]; |
86 | + bool prop_pauth_impdef; | 41 | + if ((is_a64(env) || !env->thumb) && (pc & 3) != 0) { |
87 | + | 42 | + return false; |
88 | /* DCZ blocksize, in log_2(words), ie low 4 bits of DCZID_EL0 */ | ||
89 | uint32_t dcz_blocksize; | ||
90 | uint64_t rvbar; | ||
91 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | ||
92 | index XXXXXXX..XXXXXXX 100644 | ||
93 | --- a/target/arm/cpu.c | ||
94 | +++ b/target/arm/cpu.c | ||
95 | @@ -XXX,XX +XXX,XX @@ void arm_cpu_finalize_features(ARMCPU *cpu, Error **errp) | ||
96 | error_propagate(errp, local_err); | ||
97 | return; | ||
98 | } | ||
99 | + | ||
100 | + /* | ||
101 | + * KVM does not support modifications to this feature. | ||
102 | + * We have not registered the cpu properties when KVM | ||
103 | + * is in use, so the user will not be able to set them. | ||
104 | + */ | ||
105 | + if (!kvm_enabled()) { | ||
106 | + arm_cpu_pauth_finalize(cpu, &local_err); | ||
107 | + if (local_err != NULL) { | ||
108 | + error_propagate(errp, local_err); | ||
109 | + return; | ||
110 | + } | ||
111 | + } | ||
112 | } | ||
113 | |||
114 | if (kvm_enabled()) { | ||
115 | diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c | ||
116 | index XXXXXXX..XXXXXXX 100644 | ||
117 | --- a/target/arm/cpu64.c | ||
118 | +++ b/target/arm/cpu64.c | ||
119 | @@ -XXX,XX +XXX,XX @@ | ||
120 | #include "sysemu/kvm.h" | ||
121 | #include "kvm_arm.h" | ||
122 | #include "qapi/visitor.h" | ||
123 | +#include "hw/qdev-properties.h" | ||
124 | + | ||
125 | |||
126 | #ifndef CONFIG_USER_ONLY | ||
127 | static uint64_t a57_a53_l2ctlr_read(CPUARMState *env, const ARMCPRegInfo *ri) | ||
128 | @@ -XXX,XX +XXX,XX @@ void aarch64_add_sve_properties(Object *obj) | ||
129 | } | ||
130 | } | ||
131 | |||
132 | +void arm_cpu_pauth_finalize(ARMCPU *cpu, Error **errp) | ||
133 | +{ | ||
134 | + int arch_val = 0, impdef_val = 0; | ||
135 | + uint64_t t; | ||
136 | + | ||
137 | + /* TODO: Handle HaveEnhancedPAC, HaveEnhancedPAC2, HaveFPAC. */ | ||
138 | + if (cpu->prop_pauth) { | ||
139 | + if (cpu->prop_pauth_impdef) { | ||
140 | + impdef_val = 1; | ||
141 | + } else { | ||
142 | + arch_val = 1; | ||
143 | + } | ||
144 | + } else if (cpu->prop_pauth_impdef) { | ||
145 | + error_setg(errp, "cannot enable pauth-impdef without pauth"); | ||
146 | + error_append_hint(errp, "Add pauth=on to the CPU property list.\n"); | ||
147 | + } | 43 | + } |
148 | + | 44 | + |
149 | + t = cpu->isar.id_aa64isar1; | 45 | + /* |
150 | + t = FIELD_DP64(t, ID_AA64ISAR1, APA, arch_val); | 46 | + * Instruction aborts have priority over breakpoint exceptions. |
151 | + t = FIELD_DP64(t, ID_AA64ISAR1, GPA, arch_val); | 47 | + * TODO: We would need to look up the page for PC and verify that |
152 | + t = FIELD_DP64(t, ID_AA64ISAR1, API, impdef_val); | 48 | + * it is present and executable. |
153 | + t = FIELD_DP64(t, ID_AA64ISAR1, GPI, impdef_val); | 49 | + */ |
154 | + cpu->isar.id_aa64isar1 = t; | ||
155 | +} | ||
156 | + | 50 | + |
157 | +static Property arm_cpu_pauth_property = | 51 | for (n = 0; n < ARRAY_SIZE(env->cpu_breakpoint); n++) { |
158 | + DEFINE_PROP_BOOL("pauth", ARMCPU, prop_pauth, true); | 52 | if (bp_wp_matches(cpu, n, false)) { |
159 | +static Property arm_cpu_pauth_impdef_property = | 53 | return true; |
160 | + DEFINE_PROP_BOOL("pauth-impdef", ARMCPU, prop_pauth_impdef, false); | ||
161 | + | ||
162 | /* -cpu max: if KVM is enabled, like -cpu host (best possible with this host); | ||
163 | * otherwise, a CPU with as many features enabled as our emulation supports. | ||
164 | * The version of '-cpu max' for qemu-system-arm is defined in cpu.c; | ||
165 | @@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj) | ||
166 | t = FIELD_DP64(t, ID_AA64ISAR1, DPB, 2); | ||
167 | t = FIELD_DP64(t, ID_AA64ISAR1, JSCVT, 1); | ||
168 | t = FIELD_DP64(t, ID_AA64ISAR1, FCMA, 1); | ||
169 | - t = FIELD_DP64(t, ID_AA64ISAR1, APA, 1); /* PAuth, architected only */ | ||
170 | - t = FIELD_DP64(t, ID_AA64ISAR1, API, 0); | ||
171 | - t = FIELD_DP64(t, ID_AA64ISAR1, GPA, 1); | ||
172 | - t = FIELD_DP64(t, ID_AA64ISAR1, GPI, 0); | ||
173 | t = FIELD_DP64(t, ID_AA64ISAR1, SB, 1); | ||
174 | t = FIELD_DP64(t, ID_AA64ISAR1, SPECRES, 1); | ||
175 | t = FIELD_DP64(t, ID_AA64ISAR1, FRINTTS, 1); | ||
176 | @@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj) | ||
177 | cpu->ctr = 0x80038003; /* 32 byte I and D cacheline size, VIPT icache */ | ||
178 | cpu->dcz_blocksize = 7; /* 512 bytes */ | ||
179 | #endif | ||
180 | + | ||
181 | + /* Default to PAUTH on, with the architected algorithm. */ | ||
182 | + qdev_property_add_static(DEVICE(obj), &arm_cpu_pauth_property); | ||
183 | + qdev_property_add_static(DEVICE(obj), &arm_cpu_pauth_impdef_property); | ||
184 | } | ||
185 | |||
186 | aarch64_add_sve_properties(obj); | ||
187 | diff --git a/target/arm/monitor.c b/target/arm/monitor.c | ||
188 | index XXXXXXX..XXXXXXX 100644 | ||
189 | --- a/target/arm/monitor.c | ||
190 | +++ b/target/arm/monitor.c | ||
191 | @@ -XXX,XX +XXX,XX @@ static const char *cpu_model_advertised_features[] = { | ||
192 | "sve640", "sve768", "sve896", "sve1024", "sve1152", "sve1280", | ||
193 | "sve1408", "sve1536", "sve1664", "sve1792", "sve1920", "sve2048", | ||
194 | "kvm-no-adjvtime", "kvm-steal-time", | ||
195 | + "pauth", "pauth-impdef", | ||
196 | NULL | ||
197 | }; | ||
198 | |||
199 | diff --git a/tests/qtest/arm-cpu-features.c b/tests/qtest/arm-cpu-features.c | ||
200 | index XXXXXXX..XXXXXXX 100644 | ||
201 | --- a/tests/qtest/arm-cpu-features.c | ||
202 | +++ b/tests/qtest/arm-cpu-features.c | ||
203 | @@ -XXX,XX +XXX,XX @@ static void sve_tests_sve_off_kvm(const void *data) | ||
204 | qtest_quit(qts); | ||
205 | } | ||
206 | |||
207 | +static void pauth_tests_default(QTestState *qts, const char *cpu_type) | ||
208 | +{ | ||
209 | + assert_has_feature_enabled(qts, cpu_type, "pauth"); | ||
210 | + assert_has_feature_disabled(qts, cpu_type, "pauth-impdef"); | ||
211 | + assert_set_feature(qts, cpu_type, "pauth", false); | ||
212 | + assert_set_feature(qts, cpu_type, "pauth", true); | ||
213 | + assert_set_feature(qts, cpu_type, "pauth-impdef", true); | ||
214 | + assert_set_feature(qts, cpu_type, "pauth-impdef", false); | ||
215 | + assert_error(qts, cpu_type, "cannot enable pauth-impdef without pauth", | ||
216 | + "{ 'pauth': false, 'pauth-impdef': true }"); | ||
217 | +} | ||
218 | + | ||
219 | static void test_query_cpu_model_expansion(const void *data) | ||
220 | { | ||
221 | QTestState *qts; | ||
222 | @@ -XXX,XX +XXX,XX @@ static void test_query_cpu_model_expansion(const void *data) | ||
223 | assert_has_feature_enabled(qts, "cortex-a57", "aarch64"); | ||
224 | |||
225 | sve_tests_default(qts, "max"); | ||
226 | + pauth_tests_default(qts, "max"); | ||
227 | |||
228 | /* Test that features that depend on KVM generate errors without. */ | ||
229 | assert_error(qts, "max", | ||
230 | -- | 54 | -- |
231 | 2.20.1 | 55 | 2.25.1 |
232 | 56 | ||
233 | 57 | diff view generated by jsdifflib |
1 | From: Mihai Carabas <mihai.carabas@oracle.com> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | To ease the PCI device addition in next patches, split the code as follows: | ||
4 | - generic code (read/write/setup) is being kept in pvpanic.c | ||
5 | - ISA dependent code moved to pvpanic-isa.c | ||
6 | |||
7 | Also, rename: | ||
8 | - ISA_PVPANIC_DEVICE -> PVPANIC_ISA_DEVICE. | ||
9 | - TYPE_PVPANIC -> TYPE_PVPANIC_ISA. | ||
10 | - MemoryRegion io -> mr. | ||
11 | - pvpanic_ioport_* in pvpanic_*. | ||
12 | |||
13 | Update the build system with the new files and config structure. | ||
14 | |||
15 | Signed-off-by: Mihai Carabas <mihai.carabas@oracle.com> | ||
16 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 3 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
4 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
17 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
18 | --- | 6 | --- |
19 | include/hw/misc/pvpanic.h | 23 +++++++++- | 7 | tests/tcg/aarch64/pcalign-a64.c | 37 +++++++++++++++++++++++++ |
20 | hw/misc/pvpanic-isa.c | 94 +++++++++++++++++++++++++++++++++++++++ | 8 | tests/tcg/arm/pcalign-a32.c | 46 +++++++++++++++++++++++++++++++ |
21 | hw/misc/pvpanic.c | 85 +++-------------------------------- | 9 | tests/tcg/aarch64/Makefile.target | 4 +-- |
22 | hw/i386/Kconfig | 2 +- | 10 | tests/tcg/arm/Makefile.target | 4 +++ |
23 | hw/misc/Kconfig | 6 ++- | 11 | 4 files changed, 89 insertions(+), 2 deletions(-) |
24 | hw/misc/meson.build | 3 +- | 12 | create mode 100644 tests/tcg/aarch64/pcalign-a64.c |
25 | tests/qtest/meson.build | 2 +- | 13 | create mode 100644 tests/tcg/arm/pcalign-a32.c |
26 | 7 files changed, 130 insertions(+), 85 deletions(-) | ||
27 | create mode 100644 hw/misc/pvpanic-isa.c | ||
28 | 14 | ||
29 | diff --git a/include/hw/misc/pvpanic.h b/include/hw/misc/pvpanic.h | 15 | diff --git a/tests/tcg/aarch64/pcalign-a64.c b/tests/tcg/aarch64/pcalign-a64.c |
30 | index XXXXXXX..XXXXXXX 100644 | ||
31 | --- a/include/hw/misc/pvpanic.h | ||
32 | +++ b/include/hw/misc/pvpanic.h | ||
33 | @@ -XXX,XX +XXX,XX @@ | ||
34 | |||
35 | #include "qom/object.h" | ||
36 | |||
37 | -#define TYPE_PVPANIC "pvpanic" | ||
38 | +#define TYPE_PVPANIC_ISA_DEVICE "pvpanic" | ||
39 | |||
40 | #define PVPANIC_IOPORT_PROP "ioport" | ||
41 | |||
42 | +/* The bit of supported pv event, TODO: include uapi header and remove this */ | ||
43 | +#define PVPANIC_F_PANICKED 0 | ||
44 | +#define PVPANIC_F_CRASHLOADED 1 | ||
45 | + | ||
46 | +/* The pv event value */ | ||
47 | +#define PVPANIC_PANICKED (1 << PVPANIC_F_PANICKED) | ||
48 | +#define PVPANIC_CRASHLOADED (1 << PVPANIC_F_CRASHLOADED) | ||
49 | + | ||
50 | +/* | ||
51 | + * PVPanicState for any device type | ||
52 | + */ | ||
53 | +typedef struct PVPanicState PVPanicState; | ||
54 | +struct PVPanicState { | ||
55 | + MemoryRegion mr; | ||
56 | + uint8_t events; | ||
57 | +}; | ||
58 | + | ||
59 | +void pvpanic_setup_io(PVPanicState *s, DeviceState *dev, unsigned size); | ||
60 | + | ||
61 | static inline uint16_t pvpanic_port(void) | ||
62 | { | ||
63 | - Object *o = object_resolve_path_type("", TYPE_PVPANIC, NULL); | ||
64 | + Object *o = object_resolve_path_type("", TYPE_PVPANIC_ISA_DEVICE, NULL); | ||
65 | if (!o) { | ||
66 | return 0; | ||
67 | } | ||
68 | diff --git a/hw/misc/pvpanic-isa.c b/hw/misc/pvpanic-isa.c | ||
69 | new file mode 100644 | 16 | new file mode 100644 |
70 | index XXXXXXX..XXXXXXX | 17 | index XXXXXXX..XXXXXXX |
71 | --- /dev/null | 18 | --- /dev/null |
72 | +++ b/hw/misc/pvpanic-isa.c | 19 | +++ b/tests/tcg/aarch64/pcalign-a64.c |
73 | @@ -XXX,XX +XXX,XX @@ | 20 | @@ -XXX,XX +XXX,XX @@ |
74 | +/* | 21 | +/* Test PC misalignment exception */ |
75 | + * QEMU simulated pvpanic device. | ||
76 | + * | ||
77 | + * Copyright Fujitsu, Corp. 2013 | ||
78 | + * | ||
79 | + * Authors: | ||
80 | + * Wen Congyang <wency@cn.fujitsu.com> | ||
81 | + * Hu Tao <hutao@cn.fujitsu.com> | ||
82 | + * | ||
83 | + * This work is licensed under the terms of the GNU GPL, version 2 or later. | ||
84 | + * See the COPYING file in the top-level directory. | ||
85 | + * | ||
86 | + */ | ||
87 | + | 22 | + |
88 | +#include "qemu/osdep.h" | 23 | +#include <assert.h> |
89 | +#include "qemu/log.h" | 24 | +#include <signal.h> |
90 | +#include "qemu/module.h" | 25 | +#include <stdlib.h> |
91 | +#include "sysemu/runstate.h" | 26 | +#include <stdio.h> |
92 | + | 27 | + |
93 | +#include "hw/nvram/fw_cfg.h" | 28 | +static void *expected; |
94 | +#include "hw/qdev-properties.h" | ||
95 | +#include "hw/misc/pvpanic.h" | ||
96 | +#include "qom/object.h" | ||
97 | +#include "hw/isa/isa.h" | ||
98 | + | 29 | + |
99 | +OBJECT_DECLARE_SIMPLE_TYPE(PVPanicISAState, PVPANIC_ISA_DEVICE) | 30 | +static void sigbus(int sig, siginfo_t *info, void *vuc) |
100 | + | ||
101 | +/* | ||
102 | + * PVPanicISAState for ISA device and | ||
103 | + * use ioport. | ||
104 | + */ | ||
105 | +struct PVPanicISAState { | ||
106 | + ISADevice parent_obj; | ||
107 | + | ||
108 | + uint16_t ioport; | ||
109 | + PVPanicState pvpanic; | ||
110 | +}; | ||
111 | + | ||
112 | +static void pvpanic_isa_initfn(Object *obj) | ||
113 | +{ | 31 | +{ |
114 | + PVPanicISAState *s = PVPANIC_ISA_DEVICE(obj); | 32 | + assert(info->si_code == BUS_ADRALN); |
115 | + | 33 | + assert(info->si_addr == expected); |
116 | + pvpanic_setup_io(&s->pvpanic, DEVICE(s), 1); | 34 | + exit(EXIT_SUCCESS); |
117 | +} | 35 | +} |
118 | + | 36 | + |
119 | +static void pvpanic_isa_realizefn(DeviceState *dev, Error **errp) | 37 | +int main() |
120 | +{ | 38 | +{ |
121 | + ISADevice *d = ISA_DEVICE(dev); | 39 | + void *tmp; |
122 | + PVPanicISAState *s = PVPANIC_ISA_DEVICE(dev); | ||
123 | + PVPanicState *ps = &s->pvpanic; | ||
124 | + FWCfgState *fw_cfg = fw_cfg_find(); | ||
125 | + uint16_t *pvpanic_port; | ||
126 | + | 40 | + |
127 | + if (!fw_cfg) { | 41 | + struct sigaction sa = { |
128 | + return; | 42 | + .sa_sigaction = sigbus, |
43 | + .sa_flags = SA_SIGINFO | ||
44 | + }; | ||
45 | + | ||
46 | + if (sigaction(SIGBUS, &sa, NULL) < 0) { | ||
47 | + perror("sigaction"); | ||
48 | + return EXIT_FAILURE; | ||
129 | + } | 49 | + } |
130 | + | 50 | + |
131 | + pvpanic_port = g_malloc(sizeof(*pvpanic_port)); | 51 | + asm volatile("adr %0, 1f + 1\n\t" |
132 | + *pvpanic_port = cpu_to_le16(s->ioport); | 52 | + "str %0, %1\n\t" |
133 | + fw_cfg_add_file(fw_cfg, "etc/pvpanic-port", pvpanic_port, | 53 | + "br %0\n" |
134 | + sizeof(*pvpanic_port)); | 54 | + "1:" |
55 | + : "=&r"(tmp), "=m"(expected)); | ||
56 | + abort(); | ||
57 | +} | ||
58 | diff --git a/tests/tcg/arm/pcalign-a32.c b/tests/tcg/arm/pcalign-a32.c | ||
59 | new file mode 100644 | ||
60 | index XXXXXXX..XXXXXXX | ||
61 | --- /dev/null | ||
62 | +++ b/tests/tcg/arm/pcalign-a32.c | ||
63 | @@ -XXX,XX +XXX,XX @@ | ||
64 | +/* Test PC misalignment exception */ | ||
135 | + | 65 | + |
136 | + isa_register_ioport(d, &ps->mr, s->ioport); | 66 | +#ifdef __thumb__ |
67 | +#error "This test must be compiled for ARM" | ||
68 | +#endif | ||
69 | + | ||
70 | +#include <assert.h> | ||
71 | +#include <signal.h> | ||
72 | +#include <stdlib.h> | ||
73 | +#include <stdio.h> | ||
74 | + | ||
75 | +static void *expected; | ||
76 | + | ||
77 | +static void sigbus(int sig, siginfo_t *info, void *vuc) | ||
78 | +{ | ||
79 | + assert(info->si_code == BUS_ADRALN); | ||
80 | + assert(info->si_addr == expected); | ||
81 | + exit(EXIT_SUCCESS); | ||
137 | +} | 82 | +} |
138 | + | 83 | + |
139 | +static Property pvpanic_isa_properties[] = { | 84 | +int main() |
140 | + DEFINE_PROP_UINT16(PVPANIC_IOPORT_PROP, PVPanicISAState, ioport, 0x505), | 85 | +{ |
141 | + DEFINE_PROP_UINT8("events", PVPanicISAState, pvpanic.events, PVPANIC_PANICKED | PVPANIC_CRASHLOADED), | 86 | + void *tmp; |
142 | + DEFINE_PROP_END_OF_LIST(), | ||
143 | +}; | ||
144 | + | 87 | + |
145 | +static void pvpanic_isa_class_init(ObjectClass *klass, void *data) | 88 | + struct sigaction sa = { |
146 | +{ | 89 | + .sa_sigaction = sigbus, |
147 | + DeviceClass *dc = DEVICE_CLASS(klass); | 90 | + .sa_flags = SA_SIGINFO |
91 | + }; | ||
148 | + | 92 | + |
149 | + dc->realize = pvpanic_isa_realizefn; | 93 | + if (sigaction(SIGBUS, &sa, NULL) < 0) { |
150 | + device_class_set_props(dc, pvpanic_isa_properties); | 94 | + perror("sigaction"); |
151 | + set_bit(DEVICE_CATEGORY_MISC, dc->categories); | 95 | + return EXIT_FAILURE; |
96 | + } | ||
97 | + | ||
98 | + asm volatile("adr %0, 1f + 2\n\t" | ||
99 | + "str %0, %1\n\t" | ||
100 | + "bx %0\n" | ||
101 | + "1:" | ||
102 | + : "=&r"(tmp), "=m"(expected)); | ||
103 | + | ||
104 | + /* | ||
105 | + * From v8, it is CONSTRAINED UNPREDICTABLE whether BXWritePC aligns | ||
106 | + * the address or not. If so, we can legitimately fall through. | ||
107 | + */ | ||
108 | + return EXIT_SUCCESS; | ||
152 | +} | 109 | +} |
110 | diff --git a/tests/tcg/aarch64/Makefile.target b/tests/tcg/aarch64/Makefile.target | ||
111 | index XXXXXXX..XXXXXXX 100644 | ||
112 | --- a/tests/tcg/aarch64/Makefile.target | ||
113 | +++ b/tests/tcg/aarch64/Makefile.target | ||
114 | @@ -XXX,XX +XXX,XX @@ VPATH += $(ARM_SRC) | ||
115 | AARCH64_SRC=$(SRC_PATH)/tests/tcg/aarch64 | ||
116 | VPATH += $(AARCH64_SRC) | ||
117 | |||
118 | -# Float-convert Tests | ||
119 | -AARCH64_TESTS=fcvt | ||
120 | +# Base architecture tests | ||
121 | +AARCH64_TESTS=fcvt pcalign-a64 | ||
122 | |||
123 | fcvt: LDFLAGS+=-lm | ||
124 | |||
125 | diff --git a/tests/tcg/arm/Makefile.target b/tests/tcg/arm/Makefile.target | ||
126 | index XXXXXXX..XXXXXXX 100644 | ||
127 | --- a/tests/tcg/arm/Makefile.target | ||
128 | +++ b/tests/tcg/arm/Makefile.target | ||
129 | @@ -XXX,XX +XXX,XX @@ run-fcvt: fcvt | ||
130 | $(call run-test,fcvt,$(QEMU) $<,"$< on $(TARGET_NAME)") | ||
131 | $(call diff-out,fcvt,$(ARM_SRC)/fcvt.ref) | ||
132 | |||
133 | +# PC alignment test | ||
134 | +ARM_TESTS += pcalign-a32 | ||
135 | +pcalign-a32: CFLAGS+=-marm | ||
153 | + | 136 | + |
154 | +static TypeInfo pvpanic_isa_info = { | 137 | ifeq ($(CONFIG_ARM_COMPATIBLE_SEMIHOSTING),y) |
155 | + .name = TYPE_PVPANIC_ISA_DEVICE, | 138 | |
156 | + .parent = TYPE_ISA_DEVICE, | 139 | # Semihosting smoke test for linux-user |
157 | + .instance_size = sizeof(PVPanicISAState), | ||
158 | + .instance_init = pvpanic_isa_initfn, | ||
159 | + .class_init = pvpanic_isa_class_init, | ||
160 | +}; | ||
161 | + | ||
162 | +static void pvpanic_register_types(void) | ||
163 | +{ | ||
164 | + type_register_static(&pvpanic_isa_info); | ||
165 | +} | ||
166 | + | ||
167 | +type_init(pvpanic_register_types) | ||
168 | diff --git a/hw/misc/pvpanic.c b/hw/misc/pvpanic.c | ||
169 | index XXXXXXX..XXXXXXX 100644 | ||
170 | --- a/hw/misc/pvpanic.c | ||
171 | +++ b/hw/misc/pvpanic.c | ||
172 | @@ -XXX,XX +XXX,XX @@ | ||
173 | #include "hw/misc/pvpanic.h" | ||
174 | #include "qom/object.h" | ||
175 | |||
176 | -/* The bit of supported pv event, TODO: include uapi header and remove this */ | ||
177 | -#define PVPANIC_F_PANICKED 0 | ||
178 | -#define PVPANIC_F_CRASHLOADED 1 | ||
179 | - | ||
180 | -/* The pv event value */ | ||
181 | -#define PVPANIC_PANICKED (1 << PVPANIC_F_PANICKED) | ||
182 | -#define PVPANIC_CRASHLOADED (1 << PVPANIC_F_CRASHLOADED) | ||
183 | - | ||
184 | -typedef struct PVPanicState PVPanicState; | ||
185 | -DECLARE_INSTANCE_CHECKER(PVPanicState, ISA_PVPANIC_DEVICE, | ||
186 | - TYPE_PVPANIC) | ||
187 | - | ||
188 | static void handle_event(int event) | ||
189 | { | ||
190 | static bool logged; | ||
191 | @@ -XXX,XX +XXX,XX @@ static void handle_event(int event) | ||
192 | } | ||
193 | } | ||
194 | |||
195 | -#include "hw/isa/isa.h" | ||
196 | - | ||
197 | -struct PVPanicState { | ||
198 | - ISADevice parent_obj; | ||
199 | - | ||
200 | - MemoryRegion io; | ||
201 | - uint16_t ioport; | ||
202 | - uint8_t events; | ||
203 | -}; | ||
204 | - | ||
205 | /* return supported events on read */ | ||
206 | -static uint64_t pvpanic_ioport_read(void *opaque, hwaddr addr, unsigned size) | ||
207 | +static uint64_t pvpanic_read(void *opaque, hwaddr addr, unsigned size) | ||
208 | { | ||
209 | PVPanicState *pvp = opaque; | ||
210 | return pvp->events; | ||
211 | } | ||
212 | |||
213 | -static void pvpanic_ioport_write(void *opaque, hwaddr addr, uint64_t val, | ||
214 | +static void pvpanic_write(void *opaque, hwaddr addr, uint64_t val, | ||
215 | unsigned size) | ||
216 | { | ||
217 | handle_event(val); | ||
218 | } | ||
219 | |||
220 | static const MemoryRegionOps pvpanic_ops = { | ||
221 | - .read = pvpanic_ioport_read, | ||
222 | - .write = pvpanic_ioport_write, | ||
223 | + .read = pvpanic_read, | ||
224 | + .write = pvpanic_write, | ||
225 | .impl = { | ||
226 | .min_access_size = 1, | ||
227 | .max_access_size = 1, | ||
228 | }, | ||
229 | }; | ||
230 | |||
231 | -static void pvpanic_isa_initfn(Object *obj) | ||
232 | +void pvpanic_setup_io(PVPanicState *s, DeviceState *dev, unsigned size) | ||
233 | { | ||
234 | - PVPanicState *s = ISA_PVPANIC_DEVICE(obj); | ||
235 | - | ||
236 | - memory_region_init_io(&s->io, OBJECT(s), &pvpanic_ops, s, "pvpanic", 1); | ||
237 | + memory_region_init_io(&s->mr, OBJECT(dev), &pvpanic_ops, s, "pvpanic", size); | ||
238 | } | ||
239 | - | ||
240 | -static void pvpanic_isa_realizefn(DeviceState *dev, Error **errp) | ||
241 | -{ | ||
242 | - ISADevice *d = ISA_DEVICE(dev); | ||
243 | - PVPanicState *s = ISA_PVPANIC_DEVICE(dev); | ||
244 | - FWCfgState *fw_cfg = fw_cfg_find(); | ||
245 | - uint16_t *pvpanic_port; | ||
246 | - | ||
247 | - if (!fw_cfg) { | ||
248 | - return; | ||
249 | - } | ||
250 | - | ||
251 | - pvpanic_port = g_malloc(sizeof(*pvpanic_port)); | ||
252 | - *pvpanic_port = cpu_to_le16(s->ioport); | ||
253 | - fw_cfg_add_file(fw_cfg, "etc/pvpanic-port", pvpanic_port, | ||
254 | - sizeof(*pvpanic_port)); | ||
255 | - | ||
256 | - isa_register_ioport(d, &s->io, s->ioport); | ||
257 | -} | ||
258 | - | ||
259 | -static Property pvpanic_isa_properties[] = { | ||
260 | - DEFINE_PROP_UINT16(PVPANIC_IOPORT_PROP, PVPanicState, ioport, 0x505), | ||
261 | - DEFINE_PROP_UINT8("events", PVPanicState, events, PVPANIC_PANICKED | PVPANIC_CRASHLOADED), | ||
262 | - DEFINE_PROP_END_OF_LIST(), | ||
263 | -}; | ||
264 | - | ||
265 | -static void pvpanic_isa_class_init(ObjectClass *klass, void *data) | ||
266 | -{ | ||
267 | - DeviceClass *dc = DEVICE_CLASS(klass); | ||
268 | - | ||
269 | - dc->realize = pvpanic_isa_realizefn; | ||
270 | - device_class_set_props(dc, pvpanic_isa_properties); | ||
271 | - set_bit(DEVICE_CATEGORY_MISC, dc->categories); | ||
272 | -} | ||
273 | - | ||
274 | -static TypeInfo pvpanic_isa_info = { | ||
275 | - .name = TYPE_PVPANIC, | ||
276 | - .parent = TYPE_ISA_DEVICE, | ||
277 | - .instance_size = sizeof(PVPanicState), | ||
278 | - .instance_init = pvpanic_isa_initfn, | ||
279 | - .class_init = pvpanic_isa_class_init, | ||
280 | -}; | ||
281 | - | ||
282 | -static void pvpanic_register_types(void) | ||
283 | -{ | ||
284 | - type_register_static(&pvpanic_isa_info); | ||
285 | -} | ||
286 | - | ||
287 | -type_init(pvpanic_register_types) | ||
288 | diff --git a/hw/i386/Kconfig b/hw/i386/Kconfig | ||
289 | index XXXXXXX..XXXXXXX 100644 | ||
290 | --- a/hw/i386/Kconfig | ||
291 | +++ b/hw/i386/Kconfig | ||
292 | @@ -XXX,XX +XXX,XX @@ config PC | ||
293 | imply ISA_DEBUG | ||
294 | imply PARALLEL | ||
295 | imply PCI_DEVICES | ||
296 | - imply PVPANIC | ||
297 | + imply PVPANIC_ISA | ||
298 | imply QXL | ||
299 | imply SEV | ||
300 | imply SGA | ||
301 | diff --git a/hw/misc/Kconfig b/hw/misc/Kconfig | ||
302 | index XXXXXXX..XXXXXXX 100644 | ||
303 | --- a/hw/misc/Kconfig | ||
304 | +++ b/hw/misc/Kconfig | ||
305 | @@ -XXX,XX +XXX,XX @@ config IOTKIT_SYSCTL | ||
306 | config IOTKIT_SYSINFO | ||
307 | bool | ||
308 | |||
309 | -config PVPANIC | ||
310 | +config PVPANIC_COMMON | ||
311 | + bool | ||
312 | + | ||
313 | +config PVPANIC_ISA | ||
314 | bool | ||
315 | depends on ISA_BUS | ||
316 | + select PVPANIC_COMMON | ||
317 | |||
318 | config AUX | ||
319 | bool | ||
320 | diff --git a/hw/misc/meson.build b/hw/misc/meson.build | ||
321 | index XXXXXXX..XXXXXXX 100644 | ||
322 | --- a/hw/misc/meson.build | ||
323 | +++ b/hw/misc/meson.build | ||
324 | @@ -XXX,XX +XXX,XX @@ softmmu_ss.add(when: 'CONFIG_EMC141X', if_true: files('emc141x.c')) | ||
325 | softmmu_ss.add(when: 'CONFIG_UNIMP', if_true: files('unimp.c')) | ||
326 | softmmu_ss.add(when: 'CONFIG_EMPTY_SLOT', if_true: files('empty_slot.c')) | ||
327 | softmmu_ss.add(when: 'CONFIG_LED', if_true: files('led.c')) | ||
328 | +softmmu_ss.add(when: 'CONFIG_PVPANIC_COMMON', if_true: files('pvpanic.c')) | ||
329 | |||
330 | # ARM devices | ||
331 | softmmu_ss.add(when: 'CONFIG_PL310', if_true: files('arm_l2x0.c')) | ||
332 | @@ -XXX,XX +XXX,XX @@ softmmu_ss.add(when: 'CONFIG_IOTKIT_SYSINFO', if_true: files('iotkit-sysinfo.c') | ||
333 | softmmu_ss.add(when: 'CONFIG_ARMSSE_CPUID', if_true: files('armsse-cpuid.c')) | ||
334 | softmmu_ss.add(when: 'CONFIG_ARMSSE_MHU', if_true: files('armsse-mhu.c')) | ||
335 | |||
336 | -softmmu_ss.add(when: 'CONFIG_PVPANIC', if_true: files('pvpanic.c')) | ||
337 | +softmmu_ss.add(when: 'CONFIG_PVPANIC_ISA', if_true: files('pvpanic-isa.c')) | ||
338 | softmmu_ss.add(when: 'CONFIG_AUX', if_true: files('auxbus.c')) | ||
339 | softmmu_ss.add(when: 'CONFIG_ASPEED_SOC', if_true: files('aspeed_scu.c', 'aspeed_sdmc.c', 'aspeed_xdma.c')) | ||
340 | softmmu_ss.add(when: 'CONFIG_MSF2', if_true: files('msf2-sysreg.c')) | ||
341 | diff --git a/tests/qtest/meson.build b/tests/qtest/meson.build | ||
342 | index XXXXXXX..XXXXXXX 100644 | ||
343 | --- a/tests/qtest/meson.build | ||
344 | +++ b/tests/qtest/meson.build | ||
345 | @@ -XXX,XX +XXX,XX @@ qtests_i386 = \ | ||
346 | (config_host.has_key('CONFIG_LINUX') and \ | ||
347 | config_all_devices.has_key('CONFIG_ISA_IPMI_BT') ? ['ipmi-bt-test'] : []) + \ | ||
348 | (config_all_devices.has_key('CONFIG_WDT_IB700') ? ['wdt_ib700-test'] : []) + \ | ||
349 | - (config_all_devices.has_key('CONFIG_PVPANIC') ? ['pvpanic-test'] : []) + \ | ||
350 | + (config_all_devices.has_key('CONFIG_PVPANIC_ISA') ? ['pvpanic-test'] : []) + \ | ||
351 | (config_all_devices.has_key('CONFIG_HDA') ? ['intel-hda-test'] : []) + \ | ||
352 | (config_all_devices.has_key('CONFIG_I82801B11') ? ['i82801b11-test'] : []) + \ | ||
353 | (config_all_devices.has_key('CONFIG_IOH3420') ? ['ioh3420-test'] : []) + \ | ||
354 | -- | 140 | -- |
355 | 2.20.1 | 141 | 2.25.1 |
356 | 142 | ||
357 | 143 | diff view generated by jsdifflib |
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 1 | In the SSE decode function gen_sse(), we combine a byte |
---|---|---|---|
2 | 'b' and a value 'b1' which can be [0..3], and switch on them: | ||
3 | b |= (b1 << 8); | ||
4 | switch (b) { | ||
5 | ... | ||
6 | default: | ||
7 | unknown_op: | ||
8 | gen_unknown_opcode(env, s); | ||
9 | return; | ||
10 | } | ||
2 | 11 | ||
3 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 12 | In three cases inside this switch, we were then also checking for |
13 | "if (b1 >= 2) { goto unknown_op; }". | ||
14 | However, this can never happen, because the 'case' values in each place | ||
15 | are 0x0nn or 0x1nn and the switch will have directed the b1 == (2, 3) | ||
16 | cases to the default already. | ||
17 | |||
18 | This check was added in commit c045af25a52e9 in 2010; the added code | ||
19 | was unnecessary then as well, and was apparently intended only to | ||
20 | ensure that we never accidentally ended up indexing off the end | ||
21 | of an sse_op_table with only 2 entries as a result of future bugs | ||
22 | in the decode logic. | ||
23 | |||
24 | Change the checks to assert() instead, and make sure they're always | ||
25 | immediately before the array access they are protecting. | ||
26 | |||
27 | Fixes: Coverity CID 1460207 | ||
28 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 29 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
5 | Message-id: 20210112104511.36576-12-remi.denis.courmont@huawei.com | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | --- | 30 | --- |
8 | target/arm/helper.c | 12 ++++++++++++ | 31 | target/i386/tcg/translate.c | 12 +++--------- |
9 | 1 file changed, 12 insertions(+) | 32 | 1 file changed, 3 insertions(+), 9 deletions(-) |
10 | 33 | ||
11 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 34 | diff --git a/target/i386/tcg/translate.c b/target/i386/tcg/translate.c |
12 | index XXXXXXX..XXXXXXX 100644 | 35 | index XXXXXXX..XXXXXXX 100644 |
13 | --- a/target/arm/helper.c | 36 | --- a/target/i386/tcg/translate.c |
14 | +++ b/target/arm/helper.c | 37 | +++ b/target/i386/tcg/translate.c |
15 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, | 38 | @@ -XXX,XX +XXX,XX @@ static void gen_sse(CPUX86State *env, DisasContext *s, int b, |
16 | fi->s1ptw = true; | 39 | case 0x171: /* shift xmm, im */ |
17 | return ~0; | 40 | case 0x172: |
18 | } | 41 | case 0x173: |
19 | + | 42 | - if (b1 >= 2) { |
20 | + if (arm_is_secure_below_el3(env)) { | 43 | - goto unknown_op; |
21 | + /* Check if page table walk is to secure or non-secure PA space. */ | 44 | - } |
22 | + if (*is_secure) { | 45 | val = x86_ldub_code(env, s); |
23 | + *is_secure = !(env->cp15.vstcr_el2.raw_tcr & VSTCR_SW); | 46 | if (is_xmm) { |
24 | + } else { | 47 | tcg_gen_movi_tl(s->T0, val); |
25 | + *is_secure = !(env->cp15.vtcr_el2.raw_tcr & VTCR_NSW); | 48 | @@ -XXX,XX +XXX,XX @@ static void gen_sse(CPUX86State *env, DisasContext *s, int b, |
26 | + } | 49 | offsetof(CPUX86State, mmx_t0.MMX_L(1))); |
27 | + } else { | 50 | op1_offset = offsetof(CPUX86State,mmx_t0); |
28 | + assert(!*is_secure); | 51 | } |
29 | + } | 52 | + assert(b1 < 2); |
30 | + | 53 | sse_fn_epp = sse_op_table2[((b - 1) & 3) * 8 + |
31 | addr = s2pa; | 54 | (((modrm >> 3)) & 7)][b1]; |
32 | } | 55 | if (!sse_fn_epp) { |
33 | return addr; | 56 | @@ -XXX,XX +XXX,XX @@ static void gen_sse(CPUX86State *env, DisasContext *s, int b, |
57 | rm = modrm & 7; | ||
58 | reg = ((modrm >> 3) & 7) | REX_R(s); | ||
59 | mod = (modrm >> 6) & 3; | ||
60 | - if (b1 >= 2) { | ||
61 | - goto unknown_op; | ||
62 | - } | ||
63 | |||
64 | + assert(b1 < 2); | ||
65 | sse_fn_epp = sse_op_table6[b].op[b1]; | ||
66 | if (!sse_fn_epp) { | ||
67 | goto unknown_op; | ||
68 | @@ -XXX,XX +XXX,XX @@ static void gen_sse(CPUX86State *env, DisasContext *s, int b, | ||
69 | rm = modrm & 7; | ||
70 | reg = ((modrm >> 3) & 7) | REX_R(s); | ||
71 | mod = (modrm >> 6) & 3; | ||
72 | - if (b1 >= 2) { | ||
73 | - goto unknown_op; | ||
74 | - } | ||
75 | |||
76 | + assert(b1 < 2); | ||
77 | sse_fn_eppi = sse_op_table7[b].op[b1]; | ||
78 | if (!sse_fn_eppi) { | ||
79 | goto unknown_op; | ||
34 | -- | 80 | -- |
35 | 2.20.1 | 81 | 2.25.1 |
36 | 82 | ||
37 | 83 | diff view generated by jsdifflib |
1 | From: Mihai Carabas <mihai.carabas@oracle.com> | 1 | The qemu-common.h header is not supposed to be included from any |
---|---|---|---|
2 | other header files, only from .c files (as documented in a comment at | ||
3 | the start of it). | ||
2 | 4 | ||
3 | Add pvpanic PCI device support details in docs/specs/pvpanic.txt. | 5 | include/hw/i386/x86.h and include/hw/i386/microvm.h break this rule. |
6 | In fact, the include is not required at all, so we can just drop it | ||
7 | from both files. | ||
4 | 8 | ||
5 | Signed-off-by: Mihai Carabas <mihai.carabas@oracle.com> | ||
6 | [fixed s/device/bus/ error] | ||
7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
11 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | ||
12 | Message-id: 20211129200510.1233037-2-peter.maydell@linaro.org | ||
9 | --- | 13 | --- |
10 | docs/specs/pvpanic.txt | 13 ++++++++++++- | 14 | include/hw/i386/microvm.h | 1 - |
11 | 1 file changed, 12 insertions(+), 1 deletion(-) | 15 | include/hw/i386/x86.h | 1 - |
16 | 2 files changed, 2 deletions(-) | ||
12 | 17 | ||
13 | diff --git a/docs/specs/pvpanic.txt b/docs/specs/pvpanic.txt | 18 | diff --git a/include/hw/i386/microvm.h b/include/hw/i386/microvm.h |
14 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/docs/specs/pvpanic.txt | 20 | --- a/include/hw/i386/microvm.h |
16 | +++ b/docs/specs/pvpanic.txt | 21 | +++ b/include/hw/i386/microvm.h |
17 | @@ -XXX,XX +XXX,XX @@ | 22 | @@ -XXX,XX +XXX,XX @@ |
18 | PVPANIC DEVICE | 23 | #ifndef HW_I386_MICROVM_H |
19 | ============== | 24 | #define HW_I386_MICROVM_H |
20 | 25 | ||
21 | -pvpanic device is a simulated ISA device, through which a guest panic | 26 | -#include "qemu-common.h" |
22 | +pvpanic device is a simulated device, through which a guest panic | 27 | #include "exec/hwaddr.h" |
23 | event is sent to qemu, and a QMP event is generated. This allows | 28 | #include "qemu/notify.h" |
24 | management apps (e.g. libvirt) to be notified and respond to the event. | 29 | |
25 | 30 | diff --git a/include/hw/i386/x86.h b/include/hw/i386/x86.h | |
26 | @@ -XXX,XX +XXX,XX @@ The management app has the option of waiting for GUEST_PANICKED events, | 31 | index XXXXXXX..XXXXXXX 100644 |
27 | and/or polling for guest-panicked RunState, to learn when the pvpanic | 32 | --- a/include/hw/i386/x86.h |
28 | device has fired a panic event. | 33 | +++ b/include/hw/i386/x86.h |
29 | 34 | @@ -XXX,XX +XXX,XX @@ | |
30 | +The pvpanic device can be implemented as an ISA device (using IOPORT) or as a | 35 | #ifndef HW_I386_X86_H |
31 | +PCI device. | 36 | #define HW_I386_X86_H |
32 | + | 37 | |
33 | ISA Interface | 38 | -#include "qemu-common.h" |
34 | ------------- | 39 | #include "exec/hwaddr.h" |
35 | 40 | #include "qemu/notify.h" | |
36 | @@ -XXX,XX +XXX,XX @@ bit 1: a guest panic has happened and will be handled by the guest; | ||
37 | the host should record it or report it, but should not affect | ||
38 | the execution of the guest. | ||
39 | |||
40 | +PCI Interface | ||
41 | +------------- | ||
42 | + | ||
43 | +The PCI interface is similar to the ISA interface except that it uses an MMIO | ||
44 | +address space provided by its BAR0, 1 byte long. Any machine with a PCI bus | ||
45 | +can enable a pvpanic device by adding '-device pvpanic-pci' to the command | ||
46 | +line. | ||
47 | + | ||
48 | ACPI Interface | ||
49 | -------------- | ||
50 | 41 | ||
51 | -- | 42 | -- |
52 | 2.20.1 | 43 | 2.25.1 |
53 | 44 | ||
54 | 45 | diff view generated by jsdifflib |
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 1 | The qemu-common.h header is not supposed to be included from any |
---|---|---|---|
2 | other header files, only from .c files (as documented in a comment at | ||
3 | the start of it). | ||
2 | 4 | ||
3 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 5 | Move the include to linux-user/hexagon/cpu_loop.c, which needs it for |
6 | the declaration of cpu_exec_step_atomic(). | ||
7 | |||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
5 | Message-id: 20210112104511.36576-9-remi.denis.courmont@huawei.com | 10 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Reviewed-by: Taylor Simpson <tsimpson@quicinc.com> |
12 | Message-id: 20211129200510.1233037-3-peter.maydell@linaro.org | ||
7 | --- | 13 | --- |
8 | target/arm/cpu.h | 7 +++++++ | 14 | target/hexagon/cpu.h | 1 - |
9 | target/arm/helper.c | 24 ++++++++++++++++++++++++ | 15 | linux-user/hexagon/cpu_loop.c | 1 + |
10 | 2 files changed, 31 insertions(+) | 16 | 2 files changed, 1 insertion(+), 1 deletion(-) |
11 | 17 | ||
12 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 18 | diff --git a/target/hexagon/cpu.h b/target/hexagon/cpu.h |
13 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
14 | --- a/target/arm/cpu.h | 20 | --- a/target/hexagon/cpu.h |
15 | +++ b/target/arm/cpu.h | 21 | +++ b/target/hexagon/cpu.h |
16 | @@ -XXX,XX +XXX,XX @@ typedef struct { | 22 | @@ -XXX,XX +XXX,XX @@ typedef struct CPUHexagonState CPUHexagonState; |
17 | uint32_t base_mask; | 23 | |
18 | } TCR; | 24 | #include "fpu/softfloat-types.h" |
19 | 25 | ||
20 | +#define VTCR_NSW (1u << 29) | 26 | -#include "qemu-common.h" |
21 | +#define VTCR_NSA (1u << 30) | 27 | #include "exec/cpu-defs.h" |
22 | +#define VSTCR_SW VTCR_NSW | 28 | #include "hex_regs.h" |
23 | +#define VSTCR_SA VTCR_NSA | 29 | #include "mmvec/mmvec.h" |
24 | + | 30 | diff --git a/linux-user/hexagon/cpu_loop.c b/linux-user/hexagon/cpu_loop.c |
25 | /* Define a maximum sized vector register. | ||
26 | * For 32-bit, this is a 128-bit NEON/AdvSIMD register. | ||
27 | * For 64-bit, this is a 2048-bit SVE register. | ||
28 | @@ -XXX,XX +XXX,XX @@ typedef struct CPUARMState { | ||
29 | uint64_t ttbr1_el[4]; | ||
30 | }; | ||
31 | uint64_t vttbr_el2; /* Virtualization Translation Table Base. */ | ||
32 | + uint64_t vsttbr_el2; /* Secure Virtualization Translation Table. */ | ||
33 | /* MMU translation table base control. */ | ||
34 | TCR tcr_el[4]; | ||
35 | TCR vtcr_el2; /* Virtualization Translation Control. */ | ||
36 | + TCR vstcr_el2; /* Secure Virtualization Translation Control. */ | ||
37 | uint32_t c2_data; /* MPU data cacheable bits. */ | ||
38 | uint32_t c2_insn; /* MPU instruction cacheable bits. */ | ||
39 | union { /* MMU domain access control register | ||
40 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
41 | index XXXXXXX..XXXXXXX 100644 | 31 | index XXXXXXX..XXXXXXX 100644 |
42 | --- a/target/arm/helper.c | 32 | --- a/linux-user/hexagon/cpu_loop.c |
43 | +++ b/target/arm/helper.c | 33 | +++ b/linux-user/hexagon/cpu_loop.c |
44 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo el2_v8_cp_reginfo[] = { | 34 | @@ -XXX,XX +XXX,XX @@ |
45 | REGINFO_SENTINEL | 35 | */ |
46 | }; | 36 | |
47 | 37 | #include "qemu/osdep.h" | |
48 | +static CPAccessResult sel2_access(CPUARMState *env, const ARMCPRegInfo *ri, | 38 | +#include "qemu-common.h" |
49 | + bool isread) | 39 | #include "qemu.h" |
50 | +{ | 40 | #include "user-internals.h" |
51 | + if (arm_current_el(env) == 3 || arm_is_secure_below_el3(env)) { | 41 | #include "cpu_loop-common.h" |
52 | + return CP_ACCESS_OK; | ||
53 | + } | ||
54 | + return CP_ACCESS_TRAP_UNCATEGORIZED; | ||
55 | +} | ||
56 | + | ||
57 | +static const ARMCPRegInfo el2_sec_cp_reginfo[] = { | ||
58 | + { .name = "VSTTBR_EL2", .state = ARM_CP_STATE_AA64, | ||
59 | + .opc0 = 3, .opc1 = 4, .crn = 2, .crm = 6, .opc2 = 0, | ||
60 | + .access = PL2_RW, .accessfn = sel2_access, | ||
61 | + .fieldoffset = offsetof(CPUARMState, cp15.vsttbr_el2) }, | ||
62 | + { .name = "VSTCR_EL2", .state = ARM_CP_STATE_AA64, | ||
63 | + .opc0 = 3, .opc1 = 4, .crn = 2, .crm = 6, .opc2 = 2, | ||
64 | + .access = PL2_RW, .accessfn = sel2_access, | ||
65 | + .fieldoffset = offsetof(CPUARMState, cp15.vstcr_el2) }, | ||
66 | + REGINFO_SENTINEL | ||
67 | +}; | ||
68 | + | ||
69 | static CPAccessResult nsacr_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
70 | bool isread) | ||
71 | { | ||
72 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) | ||
73 | if (arm_feature(env, ARM_FEATURE_V8)) { | ||
74 | define_arm_cp_regs(cpu, el2_v8_cp_reginfo); | ||
75 | } | ||
76 | + if (cpu_isar_feature(aa64_sel2, cpu)) { | ||
77 | + define_arm_cp_regs(cpu, el2_sec_cp_reginfo); | ||
78 | + } | ||
79 | /* RVBAR_EL2 is only implemented if EL2 is the highest EL */ | ||
80 | if (!arm_feature(env, ARM_FEATURE_EL3)) { | ||
81 | ARMCPRegInfo rvbar = { | ||
82 | -- | 42 | -- |
83 | 2.20.1 | 43 | 2.25.1 |
84 | 44 | ||
85 | 45 | diff view generated by jsdifflib |
1 | When we first converted our documentation to Sphinx, we split it into | 1 | The qemu-common.h header is not supposed to be included from any |
---|---|---|---|
2 | multiple manuals (system, interop, tools, etc), which are all built | 2 | other header files, only from .c files (as documented in a comment at |
3 | separately. The primary driver for this was wanting to be able to | 3 | the start of it). |
4 | avoid shipping the 'devel' manual to end-users. However, this is | ||
5 | working against the grain of the way Sphinx wants to be used and | ||
6 | causes some annoyances: | ||
7 | * Cross-references between documents become much harder or | ||
8 | possibly impossible | ||
9 | * There is no single index to the whole documentation | ||
10 | * Within one manual there's no links or table-of-contents info | ||
11 | that lets you easily navigate to the others | ||
12 | * The devel manual doesn't get published on the QEMU website | ||
13 | (it would be nice to able to refer to it there) | ||
14 | 4 | ||
15 | Merely hiding our developer documentation from end users seems like | 5 | Nothing actually relies on target/rx/cpu.h including it, so we can |
16 | it's not enough benefit for these costs. Combine all the | 6 | just drop the include. |
17 | documentation into a single manual (the same way that the readthedocs | ||
18 | site builds it) and install the whole thing. The previous manual | ||
19 | divisions remain as the new top level sections in the manual. | ||
20 | |||
21 | * The per-manual conf.py files are no longer needed | ||
22 | * The man_pages[] specifications previously in each per-manual | ||
23 | conf.py move to the top level conf.py | ||
24 | * docs/meson.build logic is simplified as we now only need to run | ||
25 | Sphinx once for the HTML and then once for the manpages5B | ||
26 | * The old index.html.in that produced the top-level page with | ||
27 | links to each manual is no longer needed | ||
28 | |||
29 | Unfortunately this means that we now have to build the HTML | ||
30 | documentation into docs/manual in the build tree rather than directly | ||
31 | into docs/; otherwise it is too awkward to ensure we install only the | ||
32 | built manual and not also the dependency info, stamp file, etc. The | ||
33 | manual still ends up in the same place in the final installed | ||
34 | directory, but anybody who was consulting documentation from within | ||
35 | the build tree will have to adjust where they're looking. | ||
36 | 7 | ||
37 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
38 | Reviewed-by: Paolo Bonzini <pbonzini@redhat.com> | 9 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
39 | Message-id: 20210115154449.4801-1-peter.maydell@linaro.org | 10 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
11 | Reviewed-by: Taylor Simpson <tsimpson@quicinc.com> | ||
12 | Reviewed-by: Yoshinori Sato <ysato@users.sourceforge.jp> | ||
13 | Message-id: 20211129200510.1233037-4-peter.maydell@linaro.org | ||
40 | --- | 14 | --- |
41 | docs/conf.py | 46 ++++++++++++++++++++++++++++++- | 15 | target/rx/cpu.h | 1 - |
42 | docs/devel/conf.py | 15 ----------- | 16 | 1 file changed, 1 deletion(-) |
43 | docs/index.html.in | 17 ------------ | ||
44 | docs/interop/conf.py | 28 ------------------- | ||
45 | docs/meson.build | 64 +++++++++++++++++--------------------------- | ||
46 | docs/specs/conf.py | 16 ----------- | ||
47 | docs/system/conf.py | 28 ------------------- | ||
48 | docs/tools/conf.py | 37 ------------------------- | ||
49 | docs/user/conf.py | 15 ----------- | ||
50 | .gitlab-ci.yml | 4 +-- | ||
51 | 10 files changed, 72 insertions(+), 198 deletions(-) | ||
52 | delete mode 100644 docs/devel/conf.py | ||
53 | delete mode 100644 docs/index.html.in | ||
54 | delete mode 100644 docs/interop/conf.py | ||
55 | delete mode 100644 docs/specs/conf.py | ||
56 | delete mode 100644 docs/system/conf.py | ||
57 | delete mode 100644 docs/tools/conf.py | ||
58 | delete mode 100644 docs/user/conf.py | ||
59 | 17 | ||
60 | diff --git a/docs/conf.py b/docs/conf.py | 18 | diff --git a/target/rx/cpu.h b/target/rx/cpu.h |
61 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
62 | --- a/docs/conf.py | 20 | --- a/target/rx/cpu.h |
63 | +++ b/docs/conf.py | 21 | +++ b/target/rx/cpu.h |
64 | @@ -XXX,XX +XXX,XX @@ latex_documents = [ | ||
65 | |||
66 | # -- Options for manual page output --------------------------------------- | ||
67 | # Individual manual/conf.py can override this to create man pages | ||
68 | -man_pages = [] | ||
69 | +man_pages = [ | ||
70 | + ('interop/qemu-ga', 'qemu-ga', | ||
71 | + 'QEMU Guest Agent', | ||
72 | + ['Michael Roth <mdroth@linux.vnet.ibm.com>'], 8), | ||
73 | + ('interop/qemu-ga-ref', 'qemu-ga-ref', | ||
74 | + 'QEMU Guest Agent Protocol Reference', | ||
75 | + [], 7), | ||
76 | + ('interop/qemu-qmp-ref', 'qemu-qmp-ref', | ||
77 | + 'QEMU QMP Reference Manual', | ||
78 | + [], 7), | ||
79 | + ('interop/qemu-storage-daemon-qmp-ref', 'qemu-storage-daemon-qmp-ref', | ||
80 | + 'QEMU Storage Daemon QMP Reference Manual', | ||
81 | + [], 7), | ||
82 | + ('system/qemu-manpage', 'qemu', | ||
83 | + 'QEMU User Documentation', | ||
84 | + ['Fabrice Bellard'], 1), | ||
85 | + ('system/qemu-block-drivers', 'qemu-block-drivers', | ||
86 | + 'QEMU block drivers reference', | ||
87 | + ['Fabrice Bellard and the QEMU Project developers'], 7), | ||
88 | + ('system/qemu-cpu-models', 'qemu-cpu-models', | ||
89 | + 'QEMU CPU Models', | ||
90 | + ['The QEMU Project developers'], 7), | ||
91 | + ('tools/qemu-img', 'qemu-img', | ||
92 | + 'QEMU disk image utility', | ||
93 | + ['Fabrice Bellard'], 1), | ||
94 | + ('tools/qemu-nbd', 'qemu-nbd', | ||
95 | + 'QEMU Disk Network Block Device Server', | ||
96 | + ['Anthony Liguori <anthony@codemonkey.ws>'], 8), | ||
97 | + ('tools/qemu-pr-helper', 'qemu-pr-helper', | ||
98 | + 'QEMU persistent reservation helper', | ||
99 | + [], 8), | ||
100 | + ('tools/qemu-storage-daemon', 'qemu-storage-daemon', | ||
101 | + 'QEMU storage daemon', | ||
102 | + [], 1), | ||
103 | + ('tools/qemu-trace-stap', 'qemu-trace-stap', | ||
104 | + 'QEMU SystemTap trace tool', | ||
105 | + [], 1), | ||
106 | + ('tools/virtfs-proxy-helper', 'virtfs-proxy-helper', | ||
107 | + 'QEMU 9p virtfs proxy filesystem helper', | ||
108 | + ['M. Mohan Kumar'], 1), | ||
109 | + ('tools/virtiofsd', 'virtiofsd', | ||
110 | + 'QEMU virtio-fs shared file system daemon', | ||
111 | + ['Stefan Hajnoczi <stefanha@redhat.com>', | ||
112 | + 'Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>'], 1), | ||
113 | +] | ||
114 | |||
115 | # -- Options for Texinfo output ------------------------------------------- | ||
116 | |||
117 | diff --git a/docs/devel/conf.py b/docs/devel/conf.py | ||
118 | deleted file mode 100644 | ||
119 | index XXXXXXX..XXXXXXX | ||
120 | --- a/docs/devel/conf.py | ||
121 | +++ /dev/null | ||
122 | @@ -XXX,XX +XXX,XX @@ | 22 | @@ -XXX,XX +XXX,XX @@ |
123 | -# -*- coding: utf-8 -*- | 23 | #define RX_CPU_H |
124 | -# | 24 | |
125 | -# QEMU documentation build configuration file for the 'devel' manual. | 25 | #include "qemu/bitops.h" |
126 | -# | 26 | -#include "qemu-common.h" |
127 | -# This includes the top level conf file and then makes any necessary tweaks. | 27 | #include "hw/registerfields.h" |
128 | -import sys | 28 | #include "cpu-qom.h" |
129 | -import os | 29 | |
130 | - | ||
131 | -qemu_docdir = os.path.abspath("..") | ||
132 | -parent_config = os.path.join(qemu_docdir, "conf.py") | ||
133 | -exec(compile(open(parent_config, "rb").read(), parent_config, 'exec')) | ||
134 | - | ||
135 | -# This slightly misuses the 'description', but is the best way to get | ||
136 | -# the manual title to appear in the sidebar. | ||
137 | -html_theme_options['description'] = u'Developer''s Guide' | ||
138 | diff --git a/docs/index.html.in b/docs/index.html.in | ||
139 | deleted file mode 100644 | ||
140 | index XXXXXXX..XXXXXXX | ||
141 | --- a/docs/index.html.in | ||
142 | +++ /dev/null | ||
143 | @@ -XXX,XX +XXX,XX @@ | ||
144 | -<!DOCTYPE html> | ||
145 | -<html lang="en"> | ||
146 | - <head> | ||
147 | - <meta charset="UTF-8"> | ||
148 | - <title>QEMU @VERSION@ Documentation</title> | ||
149 | - </head> | ||
150 | - <body> | ||
151 | - <h1>QEMU @VERSION@ Documentation</h1> | ||
152 | - <ul> | ||
153 | - <li><a href="system/index.html">System Emulation User's Guide</a></li> | ||
154 | - <li><a href="user/index.html">User Mode Emulation User's Guide</a></li> | ||
155 | - <li><a href="tools/index.html">Tools Guide</a></li> | ||
156 | - <li><a href="interop/index.html">System Emulation Management and Interoperability Guide</a></li> | ||
157 | - <li><a href="specs/index.html">System Emulation Guest Hardware Specifications</a></li> | ||
158 | - </ul> | ||
159 | - </body> | ||
160 | -</html> | ||
161 | diff --git a/docs/interop/conf.py b/docs/interop/conf.py | ||
162 | deleted file mode 100644 | ||
163 | index XXXXXXX..XXXXXXX | ||
164 | --- a/docs/interop/conf.py | ||
165 | +++ /dev/null | ||
166 | @@ -XXX,XX +XXX,XX @@ | ||
167 | -# -*- coding: utf-8 -*- | ||
168 | -# | ||
169 | -# QEMU documentation build configuration file for the 'interop' manual. | ||
170 | -# | ||
171 | -# This includes the top level conf file and then makes any necessary tweaks. | ||
172 | -import sys | ||
173 | -import os | ||
174 | - | ||
175 | -qemu_docdir = os.path.abspath("..") | ||
176 | -parent_config = os.path.join(qemu_docdir, "conf.py") | ||
177 | -exec(compile(open(parent_config, "rb").read(), parent_config, 'exec')) | ||
178 | - | ||
179 | -# This slightly misuses the 'description', but is the best way to get | ||
180 | -# the manual title to appear in the sidebar. | ||
181 | -html_theme_options['description'] = u'System Emulation Management and Interoperability Guide' | ||
182 | - | ||
183 | -# One entry per manual page. List of tuples | ||
184 | -# (source start file, name, description, authors, manual section). | ||
185 | -man_pages = [ | ||
186 | - ('qemu-ga', 'qemu-ga', u'QEMU Guest Agent', | ||
187 | - ['Michael Roth <mdroth@linux.vnet.ibm.com>'], 8), | ||
188 | - ('qemu-ga-ref', 'qemu-ga-ref', 'QEMU Guest Agent Protocol Reference', | ||
189 | - [], 7), | ||
190 | - ('qemu-qmp-ref', 'qemu-qmp-ref', 'QEMU QMP Reference Manual', | ||
191 | - [], 7), | ||
192 | - ('qemu-storage-daemon-qmp-ref', 'qemu-storage-daemon-qmp-ref', | ||
193 | - 'QEMU Storage Daemon QMP Reference Manual', [], 7), | ||
194 | -] | ||
195 | diff --git a/docs/meson.build b/docs/meson.build | ||
196 | index XXXXXXX..XXXXXXX 100644 | ||
197 | --- a/docs/meson.build | ||
198 | +++ b/docs/meson.build | ||
199 | @@ -XXX,XX +XXX,XX @@ if build_docs | ||
200 | meson.source_root() / 'docs/sphinx/qmp_lexer.py', | ||
201 | qapi_gen_depends ] | ||
202 | |||
203 | - configure_file(output: 'index.html', | ||
204 | - input: files('index.html.in'), | ||
205 | - configuration: {'VERSION': meson.project_version()}, | ||
206 | - install_dir: qemu_docdir) | ||
207 | - manuals = [ 'devel', 'interop', 'tools', 'specs', 'system', 'user' ] | ||
208 | man_pages = { | ||
209 | - 'interop' : { | ||
210 | 'qemu-ga.8': (have_tools ? 'man8' : ''), | ||
211 | 'qemu-ga-ref.7': 'man7', | ||
212 | 'qemu-qmp-ref.7': 'man7', | ||
213 | 'qemu-storage-daemon-qmp-ref.7': (have_tools ? 'man7' : ''), | ||
214 | - }, | ||
215 | - 'tools': { | ||
216 | 'qemu-img.1': (have_tools ? 'man1' : ''), | ||
217 | 'qemu-nbd.8': (have_tools ? 'man8' : ''), | ||
218 | 'qemu-pr-helper.8': (have_tools ? 'man8' : ''), | ||
219 | @@ -XXX,XX +XXX,XX @@ if build_docs | ||
220 | 'qemu-trace-stap.1': (config_host.has_key('CONFIG_TRACE_SYSTEMTAP') ? 'man1' : ''), | ||
221 | 'virtfs-proxy-helper.1': (have_virtfs_proxy_helper ? 'man1' : ''), | ||
222 | 'virtiofsd.1': (have_virtiofsd ? 'man1' : ''), | ||
223 | - }, | ||
224 | - 'system': { | ||
225 | 'qemu.1': 'man1', | ||
226 | 'qemu-block-drivers.7': 'man7', | ||
227 | 'qemu-cpu-models.7': 'man7' | ||
228 | - }, | ||
229 | } | ||
230 | |||
231 | sphinxdocs = [] | ||
232 | sphinxmans = [] | ||
233 | - foreach manual : manuals | ||
234 | - private_dir = meson.current_build_dir() / (manual + '.p') | ||
235 | - output_dir = meson.current_build_dir() / manual | ||
236 | - input_dir = meson.current_source_dir() / manual | ||
237 | |||
238 | - this_manual = custom_target(manual + ' manual', | ||
239 | + private_dir = meson.current_build_dir() / 'manual.p' | ||
240 | + output_dir = meson.current_build_dir() / 'manual' | ||
241 | + input_dir = meson.current_source_dir() | ||
242 | + | ||
243 | + this_manual = custom_target('QEMU manual', | ||
244 | build_by_default: build_docs, | ||
245 | - output: [manual + '.stamp'], | ||
246 | - input: [files('conf.py'), files(manual / 'conf.py')], | ||
247 | - depfile: manual + '.d', | ||
248 | + output: 'docs.stamp', | ||
249 | + input: files('conf.py'), | ||
250 | + depfile: 'docs.d', | ||
251 | depend_files: sphinx_extn_depends, | ||
252 | command: [SPHINX_ARGS, '-Ddepfile=@DEPFILE@', | ||
253 | '-Ddepfile_stamp=@OUTPUT0@', | ||
254 | '-b', 'html', '-d', private_dir, | ||
255 | input_dir, output_dir]) | ||
256 | - sphinxdocs += this_manual | ||
257 | - if build_docs and manual != 'devel' | ||
258 | - install_subdir(output_dir, install_dir: qemu_docdir) | ||
259 | - endif | ||
260 | + sphinxdocs += this_manual | ||
261 | + install_subdir(output_dir, install_dir: qemu_docdir, strip_directory: true) | ||
262 | |||
263 | - these_man_pages = [] | ||
264 | - install_dirs = [] | ||
265 | - foreach page, section : man_pages.get(manual, {}) | ||
266 | - these_man_pages += page | ||
267 | - install_dirs += section == '' ? false : get_option('mandir') / section | ||
268 | - endforeach | ||
269 | - if these_man_pages.length() > 0 | ||
270 | - sphinxmans += custom_target(manual + ' man pages', | ||
271 | - build_by_default: build_docs, | ||
272 | - output: these_man_pages, | ||
273 | - input: this_manual, | ||
274 | - install: build_docs, | ||
275 | - install_dir: install_dirs, | ||
276 | - command: [SPHINX_ARGS, '-b', 'man', '-d', private_dir, | ||
277 | - input_dir, meson.current_build_dir()]) | ||
278 | - endif | ||
279 | + these_man_pages = [] | ||
280 | + install_dirs = [] | ||
281 | + foreach page, section : man_pages | ||
282 | + these_man_pages += page | ||
283 | + install_dirs += section == '' ? false : get_option('mandir') / section | ||
284 | endforeach | ||
285 | + | ||
286 | + sphinxmans += custom_target('QEMU man pages', | ||
287 | + build_by_default: build_docs, | ||
288 | + output: these_man_pages, | ||
289 | + input: this_manual, | ||
290 | + install: build_docs, | ||
291 | + install_dir: install_dirs, | ||
292 | + command: [SPHINX_ARGS, '-b', 'man', '-d', private_dir, | ||
293 | + input_dir, meson.current_build_dir()]) | ||
294 | + | ||
295 | alias_target('sphinxdocs', sphinxdocs) | ||
296 | alias_target('html', sphinxdocs) | ||
297 | alias_target('man', sphinxmans) | ||
298 | diff --git a/docs/specs/conf.py b/docs/specs/conf.py | ||
299 | deleted file mode 100644 | ||
300 | index XXXXXXX..XXXXXXX | ||
301 | --- a/docs/specs/conf.py | ||
302 | +++ /dev/null | ||
303 | @@ -XXX,XX +XXX,XX @@ | ||
304 | -# -*- coding: utf-8 -*- | ||
305 | -# | ||
306 | -# QEMU documentation build configuration file for the 'specs' manual. | ||
307 | -# | ||
308 | -# This includes the top level conf file and then makes any necessary tweaks. | ||
309 | -import sys | ||
310 | -import os | ||
311 | - | ||
312 | -qemu_docdir = os.path.abspath("..") | ||
313 | -parent_config = os.path.join(qemu_docdir, "conf.py") | ||
314 | -exec(compile(open(parent_config, "rb").read(), parent_config, 'exec')) | ||
315 | - | ||
316 | -# This slightly misuses the 'description', but is the best way to get | ||
317 | -# the manual title to appear in the sidebar. | ||
318 | -html_theme_options['description'] = \ | ||
319 | - u'System Emulation Guest Hardware Specifications' | ||
320 | diff --git a/docs/system/conf.py b/docs/system/conf.py | ||
321 | deleted file mode 100644 | ||
322 | index XXXXXXX..XXXXXXX | ||
323 | --- a/docs/system/conf.py | ||
324 | +++ /dev/null | ||
325 | @@ -XXX,XX +XXX,XX @@ | ||
326 | -# -*- coding: utf-8 -*- | ||
327 | -# | ||
328 | -# QEMU documentation build configuration file for the 'system' manual. | ||
329 | -# | ||
330 | -# This includes the top level conf file and then makes any necessary tweaks. | ||
331 | -import sys | ||
332 | -import os | ||
333 | - | ||
334 | -qemu_docdir = os.path.abspath("..") | ||
335 | -parent_config = os.path.join(qemu_docdir, "conf.py") | ||
336 | -exec(compile(open(parent_config, "rb").read(), parent_config, 'exec')) | ||
337 | - | ||
338 | -# This slightly misuses the 'description', but is the best way to get | ||
339 | -# the manual title to appear in the sidebar. | ||
340 | -html_theme_options['description'] = u'System Emulation User''s Guide' | ||
341 | - | ||
342 | -# One entry per manual page. List of tuples | ||
343 | -# (source start file, name, description, authors, manual section). | ||
344 | -man_pages = [ | ||
345 | - ('qemu-manpage', 'qemu', u'QEMU User Documentation', | ||
346 | - ['Fabrice Bellard'], 1), | ||
347 | - ('qemu-block-drivers', 'qemu-block-drivers', | ||
348 | - u'QEMU block drivers reference', | ||
349 | - ['Fabrice Bellard and the QEMU Project developers'], 7), | ||
350 | - ('qemu-cpu-models', 'qemu-cpu-models', | ||
351 | - u'QEMU CPU Models', | ||
352 | - ['The QEMU Project developers'], 7) | ||
353 | -] | ||
354 | diff --git a/docs/tools/conf.py b/docs/tools/conf.py | ||
355 | deleted file mode 100644 | ||
356 | index XXXXXXX..XXXXXXX | ||
357 | --- a/docs/tools/conf.py | ||
358 | +++ /dev/null | ||
359 | @@ -XXX,XX +XXX,XX @@ | ||
360 | -# -*- coding: utf-8 -*- | ||
361 | -# | ||
362 | -# QEMU documentation build configuration file for the 'tools' manual. | ||
363 | -# | ||
364 | -# This includes the top level conf file and then makes any necessary tweaks. | ||
365 | -import sys | ||
366 | -import os | ||
367 | - | ||
368 | -qemu_docdir = os.path.abspath("..") | ||
369 | -parent_config = os.path.join(qemu_docdir, "conf.py") | ||
370 | -exec(compile(open(parent_config, "rb").read(), parent_config, 'exec')) | ||
371 | - | ||
372 | -# This slightly misuses the 'description', but is the best way to get | ||
373 | -# the manual title to appear in the sidebar. | ||
374 | -html_theme_options['description'] = \ | ||
375 | - u'Tools Guide' | ||
376 | - | ||
377 | -# One entry per manual page. List of tuples | ||
378 | -# (source start file, name, description, authors, manual section). | ||
379 | -man_pages = [ | ||
380 | - ('qemu-img', 'qemu-img', u'QEMU disk image utility', | ||
381 | - ['Fabrice Bellard'], 1), | ||
382 | - ('qemu-storage-daemon', 'qemu-storage-daemon', u'QEMU storage daemon', | ||
383 | - [], 1), | ||
384 | - ('qemu-nbd', 'qemu-nbd', u'QEMU Disk Network Block Device Server', | ||
385 | - ['Anthony Liguori <anthony@codemonkey.ws>'], 8), | ||
386 | - ('qemu-pr-helper', 'qemu-pr-helper', 'QEMU persistent reservation helper', | ||
387 | - [], 8), | ||
388 | - ('qemu-trace-stap', 'qemu-trace-stap', u'QEMU SystemTap trace tool', | ||
389 | - [], 1), | ||
390 | - ('virtfs-proxy-helper', 'virtfs-proxy-helper', | ||
391 | - u'QEMU 9p virtfs proxy filesystem helper', | ||
392 | - ['M. Mohan Kumar'], 1), | ||
393 | - ('virtiofsd', 'virtiofsd', u'QEMU virtio-fs shared file system daemon', | ||
394 | - ['Stefan Hajnoczi <stefanha@redhat.com>', | ||
395 | - 'Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>'], 1), | ||
396 | -] | ||
397 | diff --git a/docs/user/conf.py b/docs/user/conf.py | ||
398 | deleted file mode 100644 | ||
399 | index XXXXXXX..XXXXXXX | ||
400 | --- a/docs/user/conf.py | ||
401 | +++ /dev/null | ||
402 | @@ -XXX,XX +XXX,XX @@ | ||
403 | -# -*- coding: utf-8 -*- | ||
404 | -# | ||
405 | -# QEMU documentation build configuration file for the 'user' manual. | ||
406 | -# | ||
407 | -# This includes the top level conf file and then makes any necessary tweaks. | ||
408 | -import sys | ||
409 | -import os | ||
410 | - | ||
411 | -qemu_docdir = os.path.abspath("..") | ||
412 | -parent_config = os.path.join(qemu_docdir, "conf.py") | ||
413 | -exec(compile(open(parent_config, "rb").read(), parent_config, 'exec')) | ||
414 | - | ||
415 | -# This slightly misuses the 'description', but is the best way to get | ||
416 | -# the manual title to appear in the sidebar. | ||
417 | -html_theme_options['description'] = u'User Mode Emulation User''s Guide' | ||
418 | diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml | ||
419 | index XXXXXXX..XXXXXXX 100644 | ||
420 | --- a/.gitlab-ci.yml | ||
421 | +++ b/.gitlab-ci.yml | ||
422 | @@ -XXX,XX +XXX,XX @@ pages: | ||
423 | -t "Welcome to the QEMU sourcecode" | ||
424 | - mv HTML public/src | ||
425 | # Project documentation | ||
426 | - - mv build/docs/index.html public/ | ||
427 | - - for i in devel interop specs system tools user ; do mv build/docs/$i public/ ; done | ||
428 | + - make -C build install DESTDIR=$(pwd)/temp-install | ||
429 | + - mv temp-install/usr/local/share/doc/qemu/* public/ | ||
430 | artifacts: | ||
431 | paths: | ||
432 | - public | ||
433 | -- | 30 | -- |
434 | 2.20.1 | 31 | 2.25.1 |
435 | 32 | ||
436 | 33 | diff view generated by jsdifflib |
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 1 | A lot of C files in hw/arm include qemu-common.h when they don't |
---|---|---|---|
2 | need anything from it. Drop the include lines. | ||
2 | 3 | ||
3 | This will simplify accessing HCR conditionally in secure state. | 4 | omap1.c, pxa2xx.c and strongarm.c retain the include because they |
5 | use it for the prototype of qemu_get_timedate(). | ||
4 | 6 | ||
5 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
7 | Message-id: 20210112104511.36576-4-remi.denis.courmont@huawei.com | 9 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Reviewed-by: Taylor Simpson <tsimpson@quicinc.com> |
11 | Reviewed-by: Yoshinori Sato <ysato@users.sourceforge.jp> | ||
12 | Message-id: 20211129200510.1233037-5-peter.maydell@linaro.org | ||
9 | --- | 13 | --- |
10 | target/arm/helper.c | 31 ++++++++++++++++++------------- | 14 | hw/arm/boot.c | 1 - |
11 | 1 file changed, 18 insertions(+), 13 deletions(-) | 15 | hw/arm/digic_boards.c | 1 - |
16 | hw/arm/highbank.c | 1 - | ||
17 | hw/arm/npcm7xx_boards.c | 1 - | ||
18 | hw/arm/sbsa-ref.c | 1 - | ||
19 | hw/arm/stm32f405_soc.c | 1 - | ||
20 | hw/arm/vexpress.c | 1 - | ||
21 | hw/arm/virt.c | 1 - | ||
22 | 8 files changed, 8 deletions(-) | ||
12 | 23 | ||
13 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 24 | diff --git a/hw/arm/boot.c b/hw/arm/boot.c |
14 | index XXXXXXX..XXXXXXX 100644 | 25 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/target/arm/helper.c | 26 | --- a/hw/arm/boot.c |
16 | +++ b/target/arm/helper.c | 27 | +++ b/hw/arm/boot.c |
17 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult aa64_cacheop_pou_access(CPUARMState *env, | 28 | @@ -XXX,XX +XXX,XX @@ |
18 | 29 | */ | |
19 | static int vae1_tlbmask(CPUARMState *env) | 30 | |
20 | { | 31 | #include "qemu/osdep.h" |
21 | - /* Since we exclude secure first, we may read HCR_EL2 directly. */ | 32 | -#include "qemu-common.h" |
22 | - if (arm_is_secure_below_el3(env)) { | 33 | #include "qemu/datadir.h" |
23 | - return ARMMMUIdxBit_SE10_1 | | 34 | #include "qemu/error-report.h" |
24 | - ARMMMUIdxBit_SE10_1_PAN | | 35 | #include "qapi/error.h" |
25 | - ARMMMUIdxBit_SE10_0; | 36 | diff --git a/hw/arm/digic_boards.c b/hw/arm/digic_boards.c |
26 | - } else if ((env->cp15.hcr_el2 & (HCR_E2H | HCR_TGE)) | 37 | index XXXXXXX..XXXXXXX 100644 |
27 | - == (HCR_E2H | HCR_TGE)) { | 38 | --- a/hw/arm/digic_boards.c |
28 | + uint64_t hcr = arm_hcr_el2_eff(env); | 39 | +++ b/hw/arm/digic_boards.c |
29 | + | 40 | @@ -XXX,XX +XXX,XX @@ |
30 | + if ((hcr & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE)) { | 41 | |
31 | return ARMMMUIdxBit_E20_2 | | 42 | #include "qemu/osdep.h" |
32 | ARMMMUIdxBit_E20_2_PAN | | 43 | #include "qapi/error.h" |
33 | ARMMMUIdxBit_E20_0; | 44 | -#include "qemu-common.h" |
34 | + } else if (arm_is_secure_below_el3(env)) { | 45 | #include "qemu/datadir.h" |
35 | + return ARMMMUIdxBit_SE10_1 | | 46 | #include "hw/boards.h" |
36 | + ARMMMUIdxBit_SE10_1_PAN | | 47 | #include "qemu/error-report.h" |
37 | + ARMMMUIdxBit_SE10_0; | 48 | diff --git a/hw/arm/highbank.c b/hw/arm/highbank.c |
38 | } else { | 49 | index XXXXXXX..XXXXXXX 100644 |
39 | return ARMMMUIdxBit_E10_1 | | 50 | --- a/hw/arm/highbank.c |
40 | ARMMMUIdxBit_E10_1_PAN | | 51 | +++ b/hw/arm/highbank.c |
41 | @@ -XXX,XX +XXX,XX @@ static inline uint64_t regime_sctlr(CPUARMState *env, ARMMMUIdx mmu_idx) | 52 | @@ -XXX,XX +XXX,XX @@ |
42 | static inline bool regime_translation_disabled(CPUARMState *env, | 53 | */ |
43 | ARMMMUIdx mmu_idx) | 54 | |
44 | { | 55 | #include "qemu/osdep.h" |
45 | + uint64_t hcr_el2; | 56 | -#include "qemu-common.h" |
46 | + | 57 | #include "qemu/datadir.h" |
47 | if (arm_feature(env, ARM_FEATURE_M)) { | 58 | #include "qapi/error.h" |
48 | switch (env->v7m.mpu_ctrl[regime_is_secure(env, mmu_idx)] & | 59 | #include "hw/sysbus.h" |
49 | (R_V7M_MPU_CTRL_ENABLE_MASK | R_V7M_MPU_CTRL_HFNMIENA_MASK)) { | 60 | diff --git a/hw/arm/npcm7xx_boards.c b/hw/arm/npcm7xx_boards.c |
50 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_translation_disabled(CPUARMState *env, | 61 | index XXXXXXX..XXXXXXX 100644 |
51 | } | 62 | --- a/hw/arm/npcm7xx_boards.c |
52 | } | 63 | +++ b/hw/arm/npcm7xx_boards.c |
53 | 64 | @@ -XXX,XX +XXX,XX @@ | |
54 | + hcr_el2 = arm_hcr_el2_eff(env); | 65 | #include "hw/qdev-core.h" |
55 | + | 66 | #include "hw/qdev-properties.h" |
56 | if (mmu_idx == ARMMMUIdx_Stage2) { | 67 | #include "qapi/error.h" |
57 | /* HCR.DC means HCR.VM behaves as 1 */ | 68 | -#include "qemu-common.h" |
58 | - return (env->cp15.hcr_el2 & (HCR_DC | HCR_VM)) == 0; | 69 | #include "qemu/datadir.h" |
59 | + return (hcr_el2 & (HCR_DC | HCR_VM)) == 0; | 70 | #include "qemu/units.h" |
60 | } | 71 | #include "sysemu/blockdev.h" |
61 | 72 | diff --git a/hw/arm/sbsa-ref.c b/hw/arm/sbsa-ref.c | |
62 | - if (env->cp15.hcr_el2 & HCR_TGE) { | 73 | index XXXXXXX..XXXXXXX 100644 |
63 | + if (hcr_el2 & HCR_TGE) { | 74 | --- a/hw/arm/sbsa-ref.c |
64 | /* TGE means that NS EL0/1 act as if SCTLR_EL1.M is zero */ | 75 | +++ b/hw/arm/sbsa-ref.c |
65 | if (!regime_is_secure(env, mmu_idx) && regime_el(env, mmu_idx) == 1) { | 76 | @@ -XXX,XX +XXX,XX @@ |
66 | return true; | 77 | */ |
67 | } | 78 | |
68 | } | 79 | #include "qemu/osdep.h" |
69 | 80 | -#include "qemu-common.h" | |
70 | - if ((env->cp15.hcr_el2 & HCR_DC) && arm_mmu_idx_is_stage1_of_2(mmu_idx)) { | 81 | #include "qemu/datadir.h" |
71 | + if ((hcr_el2 & HCR_DC) && arm_mmu_idx_is_stage1_of_2(mmu_idx)) { | 82 | #include "qapi/error.h" |
72 | /* HCR.DC means SCTLR_EL1.M behaves as 0 */ | 83 | #include "qemu/error-report.h" |
73 | return true; | 84 | diff --git a/hw/arm/stm32f405_soc.c b/hw/arm/stm32f405_soc.c |
74 | } | 85 | index XXXXXXX..XXXXXXX 100644 |
75 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, | 86 | --- a/hw/arm/stm32f405_soc.c |
76 | fi->s1ptw = true; | 87 | +++ b/hw/arm/stm32f405_soc.c |
77 | return ~0; | 88 | @@ -XXX,XX +XXX,XX @@ |
78 | } | 89 | |
79 | - if ((env->cp15.hcr_el2 & HCR_PTW) && (cacheattrs.attrs & 0xf0) == 0) { | 90 | #include "qemu/osdep.h" |
80 | + if ((arm_hcr_el2_eff(env) & HCR_PTW) && | 91 | #include "qapi/error.h" |
81 | + (cacheattrs.attrs & 0xf0) == 0) { | 92 | -#include "qemu-common.h" |
82 | /* | 93 | #include "exec/address-spaces.h" |
83 | * PTW set and S1 walk touched S2 Device memory: | 94 | #include "sysemu/sysemu.h" |
84 | * generate Permission fault. | 95 | #include "hw/arm/stm32f405_soc.h" |
85 | @@ -XXX,XX +XXX,XX @@ static uint8_t convert_stage2_attrs(CPUARMState *env, uint8_t s2attrs) | 96 | diff --git a/hw/arm/vexpress.c b/hw/arm/vexpress.c |
86 | uint8_t hihint = 0, lohint = 0; | 97 | index XXXXXXX..XXXXXXX 100644 |
87 | 98 | --- a/hw/arm/vexpress.c | |
88 | if (hiattr != 0) { /* normal memory */ | 99 | +++ b/hw/arm/vexpress.c |
89 | - if ((env->cp15.hcr_el2 & HCR_CD) != 0) { /* cache disabled */ | 100 | @@ -XXX,XX +XXX,XX @@ |
90 | + if (arm_hcr_el2_eff(env) & HCR_CD) { /* cache disabled */ | 101 | |
91 | hiattr = loattr = 1; /* non-cacheable */ | 102 | #include "qemu/osdep.h" |
92 | } else { | 103 | #include "qapi/error.h" |
93 | if (hiattr != 1) { /* Write-through or write-back */ | 104 | -#include "qemu-common.h" |
94 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | 105 | #include "qemu/datadir.h" |
95 | } | 106 | #include "cpu.h" |
96 | 107 | #include "hw/sysbus.h" | |
97 | /* Combine the S1 and S2 cache attributes. */ | 108 | diff --git a/hw/arm/virt.c b/hw/arm/virt.c |
98 | - if (env->cp15.hcr_el2 & HCR_DC) { | 109 | index XXXXXXX..XXXXXXX 100644 |
99 | + if (arm_hcr_el2_eff(env) & HCR_DC) { | 110 | --- a/hw/arm/virt.c |
100 | /* | 111 | +++ b/hw/arm/virt.c |
101 | * HCR.DC forces the first stage attributes to | 112 | @@ -XXX,XX +XXX,XX @@ |
102 | * Normal Non-Shareable, | 113 | */ |
114 | |||
115 | #include "qemu/osdep.h" | ||
116 | -#include "qemu-common.h" | ||
117 | #include "qemu/datadir.h" | ||
118 | #include "qemu/units.h" | ||
119 | #include "qemu/option.h" | ||
103 | -- | 120 | -- |
104 | 2.20.1 | 121 | 2.25.1 |
105 | 122 | ||
106 | 123 | diff view generated by jsdifflib |
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 1 | The calculation of the length of TLB range invalidate operations |
---|---|---|---|
2 | in tlbi_aa64_range_get_length() is incorrect in two ways: | ||
3 | * the NUM field is 5 bits, but we read only 4 bits | ||
4 | * we miscalculate the page_shift value, because of an | ||
5 | off-by-one error: | ||
6 | TG 0b00 is invalid | ||
7 | TG 0b01 is 4K granule size == 4096 == 2^12 | ||
8 | TG 0b10 is 16K granule size == 16384 == 2^14 | ||
9 | TG 0b11 is 64K granule size == 65536 == 2^16 | ||
10 | so page_shift should be (TG - 1) * 2 + 12 | ||
2 | 11 | ||
3 | In the secure stage 2 translation regime, the VSTCR.SW and VTCR.NSW | 12 | Thanks to the bug report submitter Cha HyunSoo for identifying |
4 | bits can invert the secure flag for pagetable walks. This patchset | 13 | both these errors. |
5 | allows S1_ptw_translate() to change the non-secure bit. | ||
6 | 14 | ||
7 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 15 | Fixes: 84940ed82552d3c ("target/arm: Add support for FEAT_TLBIRANGE") |
16 | Resolves: https://gitlab.com/qemu-project/qemu/-/issues/734 | ||
17 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 18 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
9 | Message-id: 20210112104511.36576-11-remi.denis.courmont@huawei.com | 19 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> |
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 20 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
21 | Message-id: 20211130173257.1274194-1-peter.maydell@linaro.org | ||
11 | --- | 22 | --- |
12 | target/arm/helper.c | 9 ++++++--- | 23 | target/arm/helper.c | 6 +++--- |
13 | 1 file changed, 6 insertions(+), 3 deletions(-) | 24 | 1 file changed, 3 insertions(+), 3 deletions(-) |
14 | 25 | ||
15 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 26 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
16 | index XXXXXXX..XXXXXXX 100644 | 27 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/target/arm/helper.c | 28 | --- a/target/arm/helper.c |
18 | +++ b/target/arm/helper.c | 29 | +++ b/target/arm/helper.c |
19 | @@ -XXX,XX +XXX,XX @@ static bool get_level1_table_address(CPUARMState *env, ARMMMUIdx mmu_idx, | 30 | @@ -XXX,XX +XXX,XX @@ static uint64_t tlbi_aa64_range_get_length(CPUARMState *env, |
20 | 31 | uint64_t exponent; | |
21 | /* Translate a S1 pagetable walk through S2 if needed. */ | 32 | uint64_t length; |
22 | static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, | 33 | |
23 | - hwaddr addr, MemTxAttrs txattrs, | 34 | - num = extract64(value, 39, 4); |
24 | + hwaddr addr, bool *is_secure, | 35 | + num = extract64(value, 39, 5); |
25 | ARMMMUFaultInfo *fi) | 36 | scale = extract64(value, 44, 2); |
26 | { | 37 | page_size_granule = extract64(value, 46, 2); |
27 | if (arm_mmu_idx_is_stage1_of_2(mmu_idx) && | 38 | |
28 | @@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx, | 39 | - page_shift = page_size_granule * 2 + 12; |
29 | int s2prot; | 40 | - |
30 | int ret; | 41 | if (page_size_granule == 0) { |
31 | ARMCacheAttrs cacheattrs = {}; | 42 | qemu_log_mask(LOG_GUEST_ERROR, "Invalid page size granule %d\n", |
32 | + MemTxAttrs txattrs = {}; | 43 | page_size_granule); |
33 | + | ||
34 | + assert(!*is_secure); /* TODO: S-EL2 */ | ||
35 | |||
36 | ret = get_phys_addr_lpae(env, addr, MMU_DATA_LOAD, ARMMMUIdx_Stage2, | ||
37 | false, | ||
38 | @@ -XXX,XX +XXX,XX @@ static uint32_t arm_ldl_ptw(CPUState *cs, hwaddr addr, bool is_secure, | ||
39 | AddressSpace *as; | ||
40 | uint32_t data; | ||
41 | |||
42 | + addr = S1_ptw_translate(env, mmu_idx, addr, &is_secure, fi); | ||
43 | attrs.secure = is_secure; | ||
44 | as = arm_addressspace(cs, attrs); | ||
45 | - addr = S1_ptw_translate(env, mmu_idx, addr, attrs, fi); | ||
46 | if (fi->s1ptw) { | ||
47 | return 0; | 44 | return 0; |
48 | } | 45 | } |
49 | @@ -XXX,XX +XXX,XX @@ static uint64_t arm_ldq_ptw(CPUState *cs, hwaddr addr, bool is_secure, | 46 | |
50 | AddressSpace *as; | 47 | + page_shift = (page_size_granule - 1) * 2 + 12; |
51 | uint64_t data; | 48 | + |
52 | 49 | exponent = (5 * scale) + 1; | |
53 | + addr = S1_ptw_translate(env, mmu_idx, addr, &is_secure, fi); | 50 | length = (num + 1) << (exponent + page_shift); |
54 | attrs.secure = is_secure; | 51 | |
55 | as = arm_addressspace(cs, attrs); | ||
56 | - addr = S1_ptw_translate(env, mmu_idx, addr, attrs, fi); | ||
57 | if (fi->s1ptw) { | ||
58 | return 0; | ||
59 | } | ||
60 | -- | 52 | -- |
61 | 2.20.1 | 53 | 2.25.1 |
62 | 54 | ||
63 | 55 | diff view generated by jsdifflib |
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 1 | From: Patrick Venture <venture@google.com> |
---|---|---|---|
2 | 2 | ||
3 | This adds a common helper to compute the effective value of MDCR_EL2. | 3 | The rx_active boolean change to true should always trigger a try_read |
4 | That is the actual value if EL2 is enabled in the current security | 4 | call that flushes the queue. |
5 | context, or 0 elsewise. | ||
6 | 5 | ||
7 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 6 | Signed-off-by: Patrick Venture <venture@google.com> |
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 7 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> |
9 | Message-id: 20210112104511.36576-5-remi.denis.courmont@huawei.com | 8 | Message-id: 20211203221002.1719306-1-venture@google.com |
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 10 | --- |
12 | target/arm/helper.c | 38 ++++++++++++++++++++++---------------- | 11 | hw/net/npcm7xx_emc.c | 18 ++++++++---------- |
13 | 1 file changed, 22 insertions(+), 16 deletions(-) | 12 | 1 file changed, 8 insertions(+), 10 deletions(-) |
14 | 13 | ||
15 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 14 | diff --git a/hw/net/npcm7xx_emc.c b/hw/net/npcm7xx_emc.c |
16 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/target/arm/helper.c | 16 | --- a/hw/net/npcm7xx_emc.c |
18 | +++ b/target/arm/helper.c | 17 | +++ b/hw/net/npcm7xx_emc.c |
19 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_trap_aa32s_el1(CPUARMState *env, | 18 | @@ -XXX,XX +XXX,XX @@ static void emc_halt_rx(NPCM7xxEMCState *emc, uint32_t mista_flag) |
20 | return CP_ACCESS_TRAP_UNCATEGORIZED; | 19 | emc_set_mista(emc, mista_flag); |
21 | } | 20 | } |
22 | 21 | ||
23 | +static uint64_t arm_mdcr_el2_eff(CPUARMState *env) | 22 | +static void emc_enable_rx_and_flush(NPCM7xxEMCState *emc) |
24 | +{ | 23 | +{ |
25 | + return arm_is_el2_enabled(env) ? env->cp15.mdcr_el2 : 0; | 24 | + emc->rx_active = true; |
25 | + qemu_flush_queued_packets(qemu_get_queue(emc->nic)); | ||
26 | +} | 26 | +} |
27 | + | 27 | + |
28 | /* Check for traps to "powerdown debug" registers, which are controlled | 28 | static void emc_set_next_tx_descriptor(NPCM7xxEMCState *emc, |
29 | * by MDCR.TDOSA | 29 | const NPCM7xxEMCTxDesc *tx_desc, |
30 | */ | 30 | uint32_t desc_addr) |
31 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tdosa(CPUARMState *env, const ARMCPRegInfo *ri, | 31 | @@ -XXX,XX +XXX,XX @@ static ssize_t emc_receive(NetClientState *nc, const uint8_t *buf, size_t len1) |
32 | bool isread) | 32 | return len; |
33 | } | ||
34 | |||
35 | -static void emc_try_receive_next_packet(NPCM7xxEMCState *emc) | ||
36 | -{ | ||
37 | - if (emc_can_receive(qemu_get_queue(emc->nic))) { | ||
38 | - qemu_flush_queued_packets(qemu_get_queue(emc->nic)); | ||
39 | - } | ||
40 | -} | ||
41 | - | ||
42 | static uint64_t npcm7xx_emc_read(void *opaque, hwaddr offset, unsigned size) | ||
33 | { | 43 | { |
34 | int el = arm_current_el(env); | 44 | NPCM7xxEMCState *emc = opaque; |
35 | - bool mdcr_el2_tdosa = (env->cp15.mdcr_el2 & MDCR_TDOSA) || | 45 | @@ -XXX,XX +XXX,XX @@ static void npcm7xx_emc_write(void *opaque, hwaddr offset, |
36 | - (env->cp15.mdcr_el2 & MDCR_TDE) || | 46 | emc->regs[REG_MGSTA] |= REG_MGSTA_RXHA; |
37 | + uint64_t mdcr_el2 = arm_mdcr_el2_eff(env); | 47 | } |
38 | + bool mdcr_el2_tdosa = (mdcr_el2 & MDCR_TDOSA) || (mdcr_el2 & MDCR_TDE) || | 48 | if (value & REG_MCMDR_RXON) { |
39 | (arm_hcr_el2_eff(env) & HCR_TGE); | 49 | - emc->rx_active = true; |
40 | 50 | + emc_enable_rx_and_flush(emc); | |
41 | - if (el < 2 && mdcr_el2_tdosa && !arm_is_secure_below_el3(env)) { | ||
42 | + if (el < 2 && mdcr_el2_tdosa) { | ||
43 | return CP_ACCESS_TRAP_EL2; | ||
44 | } | ||
45 | if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TDOSA)) { | ||
46 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tdra(CPUARMState *env, const ARMCPRegInfo *ri, | ||
47 | bool isread) | ||
48 | { | ||
49 | int el = arm_current_el(env); | ||
50 | - bool mdcr_el2_tdra = (env->cp15.mdcr_el2 & MDCR_TDRA) || | ||
51 | - (env->cp15.mdcr_el2 & MDCR_TDE) || | ||
52 | + uint64_t mdcr_el2 = arm_mdcr_el2_eff(env); | ||
53 | + bool mdcr_el2_tdra = (mdcr_el2 & MDCR_TDRA) || (mdcr_el2 & MDCR_TDE) || | ||
54 | (arm_hcr_el2_eff(env) & HCR_TGE); | ||
55 | |||
56 | - if (el < 2 && mdcr_el2_tdra && !arm_is_secure_below_el3(env)) { | ||
57 | + if (el < 2 && mdcr_el2_tdra) { | ||
58 | return CP_ACCESS_TRAP_EL2; | ||
59 | } | ||
60 | if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TDA)) { | ||
61 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tda(CPUARMState *env, const ARMCPRegInfo *ri, | ||
62 | bool isread) | ||
63 | { | ||
64 | int el = arm_current_el(env); | ||
65 | - bool mdcr_el2_tda = (env->cp15.mdcr_el2 & MDCR_TDA) || | ||
66 | - (env->cp15.mdcr_el2 & MDCR_TDE) || | ||
67 | + uint64_t mdcr_el2 = arm_mdcr_el2_eff(env); | ||
68 | + bool mdcr_el2_tda = (mdcr_el2 & MDCR_TDA) || (mdcr_el2 & MDCR_TDE) || | ||
69 | (arm_hcr_el2_eff(env) & HCR_TGE); | ||
70 | |||
71 | - if (el < 2 && mdcr_el2_tda && !arm_is_secure_below_el3(env)) { | ||
72 | + if (el < 2 && mdcr_el2_tda) { | ||
73 | return CP_ACCESS_TRAP_EL2; | ||
74 | } | ||
75 | if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TDA)) { | ||
76 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tpm(CPUARMState *env, const ARMCPRegInfo *ri, | ||
77 | bool isread) | ||
78 | { | ||
79 | int el = arm_current_el(env); | ||
80 | + uint64_t mdcr_el2 = arm_mdcr_el2_eff(env); | ||
81 | |||
82 | - if (el < 2 && (env->cp15.mdcr_el2 & MDCR_TPM) | ||
83 | - && !arm_is_secure_below_el3(env)) { | ||
84 | + if (el < 2 && (mdcr_el2 & MDCR_TPM)) { | ||
85 | return CP_ACCESS_TRAP_EL2; | ||
86 | } | ||
87 | if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TPM)) { | ||
88 | @@ -XXX,XX +XXX,XX @@ static CPAccessResult pmreg_access(CPUARMState *env, const ARMCPRegInfo *ri, | ||
89 | * trapping to EL2 or EL3 for other accesses. | ||
90 | */ | ||
91 | int el = arm_current_el(env); | ||
92 | + uint64_t mdcr_el2 = arm_mdcr_el2_eff(env); | ||
93 | |||
94 | if (el == 0 && !(env->cp15.c9_pmuserenr & 1)) { | ||
95 | return CP_ACCESS_TRAP; | ||
96 | } | ||
97 | - if (el < 2 && (env->cp15.mdcr_el2 & MDCR_TPM) | ||
98 | - && !arm_is_secure_below_el3(env)) { | ||
99 | + if (el < 2 && (mdcr_el2 & MDCR_TPM)) { | ||
100 | return CP_ACCESS_TRAP_EL2; | ||
101 | } | ||
102 | if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TPM)) { | ||
103 | @@ -XXX,XX +XXX,XX @@ static bool pmu_counter_enabled(CPUARMState *env, uint8_t counter) | ||
104 | bool enabled, prohibited, filtered; | ||
105 | bool secure = arm_is_secure(env); | ||
106 | int el = arm_current_el(env); | ||
107 | - uint8_t hpmn = env->cp15.mdcr_el2 & MDCR_HPMN; | ||
108 | + uint64_t mdcr_el2 = arm_mdcr_el2_eff(env); | ||
109 | + uint8_t hpmn = mdcr_el2 & MDCR_HPMN; | ||
110 | |||
111 | if (!arm_feature(env, ARM_FEATURE_PMU)) { | ||
112 | return false; | ||
113 | @@ -XXX,XX +XXX,XX @@ static bool pmu_counter_enabled(CPUARMState *env, uint8_t counter) | ||
114 | (counter < hpmn || counter == 31)) { | ||
115 | e = env->cp15.c9_pmcr & PMCRE; | ||
116 | } else { | ||
117 | - e = env->cp15.mdcr_el2 & MDCR_HPME; | ||
118 | + e = mdcr_el2 & MDCR_HPME; | ||
119 | } | ||
120 | enabled = e && (env->cp15.c9_pmcnten & (1 << counter)); | ||
121 | |||
122 | if (!secure) { | ||
123 | if (el == 2 && (counter < hpmn || counter == 31)) { | ||
124 | - prohibited = env->cp15.mdcr_el2 & MDCR_HPMD; | ||
125 | + prohibited = mdcr_el2 & MDCR_HPMD; | ||
126 | } else { | 51 | } else { |
127 | prohibited = false; | 52 | emc_halt_rx(emc, 0); |
128 | } | 53 | } |
54 | @@ -XXX,XX +XXX,XX @@ static void npcm7xx_emc_write(void *opaque, hwaddr offset, | ||
55 | break; | ||
56 | case REG_RSDR: | ||
57 | if (emc->regs[REG_MCMDR] & REG_MCMDR_RXON) { | ||
58 | - emc->rx_active = true; | ||
59 | - emc_try_receive_next_packet(emc); | ||
60 | + emc_enable_rx_and_flush(emc); | ||
61 | } | ||
62 | break; | ||
63 | case REG_MIIDA: | ||
129 | -- | 64 | -- |
130 | 2.20.1 | 65 | 2.25.1 |
131 | 66 | ||
132 | 67 | diff view generated by jsdifflib |
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 1 | From: Jean-Philippe Brucker <jean-philippe@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | This adds the MMU indices for EL2 stage 1 in secure state. | 3 | When a virtio-iommu is instantiated, describe it using the ACPI VIOT |
4 | table. | ||
4 | 5 | ||
5 | To keep code contained, which is largelly identical between secure and | 6 | Acked-by: Igor Mammedov <imammedo@redhat.com> |
6 | non-secure modes, the MMU indices are reassigned. The new assignments | 7 | Reviewed-by: Eric Auger <eric.auger@redhat.com> |
7 | provide a systematic pattern with a non-secure bit. | 8 | Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org> |
8 | 9 | Message-id: 20211210170415.583179-2-jean-philippe@linaro.org | |
9 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | ||
10 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
11 | Message-id: 20210112104511.36576-8-remi.denis.courmont@huawei.com | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
13 | --- | 11 | --- |
14 | target/arm/cpu-param.h | 2 +- | 12 | hw/arm/virt-acpi-build.c | 7 +++++++ |
15 | target/arm/cpu.h | 35 ++++++---- | 13 | hw/arm/Kconfig | 1 + |
16 | target/arm/internals.h | 12 ++++ | 14 | 2 files changed, 8 insertions(+) |
17 | target/arm/helper.c | 127 ++++++++++++++++++++++++------------- | ||
18 | target/arm/translate-a64.c | 4 ++ | ||
19 | 5 files changed, 123 insertions(+), 57 deletions(-) | ||
20 | 15 | ||
21 | diff --git a/target/arm/cpu-param.h b/target/arm/cpu-param.h | 16 | diff --git a/hw/arm/virt-acpi-build.c b/hw/arm/virt-acpi-build.c |
22 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
23 | --- a/target/arm/cpu-param.h | 18 | --- a/hw/arm/virt-acpi-build.c |
24 | +++ b/target/arm/cpu-param.h | 19 | +++ b/hw/arm/virt-acpi-build.c |
25 | @@ -XXX,XX +XXX,XX @@ | 20 | @@ -XXX,XX +XXX,XX @@ |
26 | # define TARGET_PAGE_BITS_MIN 10 | 21 | #include "kvm_arm.h" |
22 | #include "migration/vmstate.h" | ||
23 | #include "hw/acpi/ghes.h" | ||
24 | +#include "hw/acpi/viot.h" | ||
25 | |||
26 | #define ARM_SPI_BASE 32 | ||
27 | |||
28 | @@ -XXX,XX +XXX,XX @@ void virt_acpi_build(VirtMachineState *vms, AcpiBuildTables *tables) | ||
29 | } | ||
27 | #endif | 30 | #endif |
28 | 31 | ||
29 | -#define NB_MMU_MODES 11 | 32 | + if (vms->iommu == VIRT_IOMMU_VIRTIO) { |
30 | +#define NB_MMU_MODES 15 | 33 | + acpi_add_table(table_offsets, tables_blob); |
31 | 34 | + build_viot(ms, tables_blob, tables->linker, vms->virtio_iommu_bdf, | |
32 | #endif | 35 | + vms->oem_id, vms->oem_table_id); |
33 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
34 | index XXXXXXX..XXXXXXX 100644 | ||
35 | --- a/target/arm/cpu.h | ||
36 | +++ b/target/arm/cpu.h | ||
37 | @@ -XXX,XX +XXX,XX @@ bool write_cpustate_to_list(ARMCPU *cpu, bool kvm_sync); | ||
38 | #define ARM_MMU_IDX_NOTLB 0x20 /* does not have a TLB */ | ||
39 | #define ARM_MMU_IDX_M 0x40 /* M profile */ | ||
40 | |||
41 | +/* Meanings of the bits for A profile mmu idx values */ | ||
42 | +#define ARM_MMU_IDX_A_NS 0x8 | ||
43 | + | ||
44 | /* Meanings of the bits for M profile mmu idx values */ | ||
45 | #define ARM_MMU_IDX_M_PRIV 0x1 | ||
46 | #define ARM_MMU_IDX_M_NEGPRI 0x2 | ||
47 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdx { | ||
48 | /* | ||
49 | * A-profile. | ||
50 | */ | ||
51 | - ARMMMUIdx_E10_0 = 0 | ARM_MMU_IDX_A, | ||
52 | - ARMMMUIdx_E20_0 = 1 | ARM_MMU_IDX_A, | ||
53 | + ARMMMUIdx_SE10_0 = 0 | ARM_MMU_IDX_A, | ||
54 | + ARMMMUIdx_SE20_0 = 1 | ARM_MMU_IDX_A, | ||
55 | + ARMMMUIdx_SE10_1 = 2 | ARM_MMU_IDX_A, | ||
56 | + ARMMMUIdx_SE20_2 = 3 | ARM_MMU_IDX_A, | ||
57 | + ARMMMUIdx_SE10_1_PAN = 4 | ARM_MMU_IDX_A, | ||
58 | + ARMMMUIdx_SE20_2_PAN = 5 | ARM_MMU_IDX_A, | ||
59 | + ARMMMUIdx_SE2 = 6 | ARM_MMU_IDX_A, | ||
60 | + ARMMMUIdx_SE3 = 7 | ARM_MMU_IDX_A, | ||
61 | |||
62 | - ARMMMUIdx_E10_1 = 2 | ARM_MMU_IDX_A, | ||
63 | - ARMMMUIdx_E10_1_PAN = 3 | ARM_MMU_IDX_A, | ||
64 | - | ||
65 | - ARMMMUIdx_E2 = 4 | ARM_MMU_IDX_A, | ||
66 | - ARMMMUIdx_E20_2 = 5 | ARM_MMU_IDX_A, | ||
67 | - ARMMMUIdx_E20_2_PAN = 6 | ARM_MMU_IDX_A, | ||
68 | - | ||
69 | - ARMMMUIdx_SE10_0 = 7 | ARM_MMU_IDX_A, | ||
70 | - ARMMMUIdx_SE10_1 = 8 | ARM_MMU_IDX_A, | ||
71 | - ARMMMUIdx_SE10_1_PAN = 9 | ARM_MMU_IDX_A, | ||
72 | - ARMMMUIdx_SE3 = 10 | ARM_MMU_IDX_A, | ||
73 | + ARMMMUIdx_E10_0 = ARMMMUIdx_SE10_0 | ARM_MMU_IDX_A_NS, | ||
74 | + ARMMMUIdx_E20_0 = ARMMMUIdx_SE20_0 | ARM_MMU_IDX_A_NS, | ||
75 | + ARMMMUIdx_E10_1 = ARMMMUIdx_SE10_1 | ARM_MMU_IDX_A_NS, | ||
76 | + ARMMMUIdx_E20_2 = ARMMMUIdx_SE20_2 | ARM_MMU_IDX_A_NS, | ||
77 | + ARMMMUIdx_E10_1_PAN = ARMMMUIdx_SE10_1_PAN | ARM_MMU_IDX_A_NS, | ||
78 | + ARMMMUIdx_E20_2_PAN = ARMMMUIdx_SE20_2_PAN | ARM_MMU_IDX_A_NS, | ||
79 | + ARMMMUIdx_E2 = ARMMMUIdx_SE2 | ARM_MMU_IDX_A_NS, | ||
80 | |||
81 | /* | ||
82 | * These are not allocated TLBs and are used only for AT system | ||
83 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdxBit { | ||
84 | TO_CORE_BIT(E20_2), | ||
85 | TO_CORE_BIT(E20_2_PAN), | ||
86 | TO_CORE_BIT(SE10_0), | ||
87 | + TO_CORE_BIT(SE20_0), | ||
88 | TO_CORE_BIT(SE10_1), | ||
89 | + TO_CORE_BIT(SE20_2), | ||
90 | TO_CORE_BIT(SE10_1_PAN), | ||
91 | + TO_CORE_BIT(SE20_2_PAN), | ||
92 | + TO_CORE_BIT(SE2), | ||
93 | TO_CORE_BIT(SE3), | ||
94 | |||
95 | TO_CORE_BIT(MUser), | ||
96 | diff --git a/target/arm/internals.h b/target/arm/internals.h | ||
97 | index XXXXXXX..XXXXXXX 100644 | ||
98 | --- a/target/arm/internals.h | ||
99 | +++ b/target/arm/internals.h | ||
100 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_has_2_ranges(ARMMMUIdx mmu_idx) | ||
101 | case ARMMMUIdx_SE10_0: | ||
102 | case ARMMMUIdx_SE10_1: | ||
103 | case ARMMMUIdx_SE10_1_PAN: | ||
104 | + case ARMMMUIdx_SE20_0: | ||
105 | + case ARMMMUIdx_SE20_2: | ||
106 | + case ARMMMUIdx_SE20_2_PAN: | ||
107 | return true; | ||
108 | default: | ||
109 | return false; | ||
110 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_secure(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
111 | case ARMMMUIdx_SE10_0: | ||
112 | case ARMMMUIdx_SE10_1: | ||
113 | case ARMMMUIdx_SE10_1_PAN: | ||
114 | + case ARMMMUIdx_SE20_0: | ||
115 | + case ARMMMUIdx_SE20_2: | ||
116 | + case ARMMMUIdx_SE20_2_PAN: | ||
117 | + case ARMMMUIdx_SE2: | ||
118 | case ARMMMUIdx_MSPrivNegPri: | ||
119 | case ARMMMUIdx_MSUserNegPri: | ||
120 | case ARMMMUIdx_MSPriv: | ||
121 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_pan(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
122 | case ARMMMUIdx_E10_1_PAN: | ||
123 | case ARMMMUIdx_E20_2_PAN: | ||
124 | case ARMMMUIdx_SE10_1_PAN: | ||
125 | + case ARMMMUIdx_SE20_2_PAN: | ||
126 | return true; | ||
127 | default: | ||
128 | return false; | ||
129 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_pan(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
130 | static inline uint32_t regime_el(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
131 | { | ||
132 | switch (mmu_idx) { | ||
133 | + case ARMMMUIdx_SE20_0: | ||
134 | + case ARMMMUIdx_SE20_2: | ||
135 | + case ARMMMUIdx_SE20_2_PAN: | ||
136 | case ARMMMUIdx_E20_0: | ||
137 | case ARMMMUIdx_E20_2: | ||
138 | case ARMMMUIdx_E20_2_PAN: | ||
139 | case ARMMMUIdx_Stage2: | ||
140 | + case ARMMMUIdx_SE2: | ||
141 | case ARMMMUIdx_E2: | ||
142 | return 2; | ||
143 | case ARMMMUIdx_SE3: | ||
144 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
145 | index XXXXXXX..XXXXXXX 100644 | ||
146 | --- a/target/arm/helper.c | ||
147 | +++ b/target/arm/helper.c | ||
148 | @@ -XXX,XX +XXX,XX @@ static int gt_phys_redir_timeridx(CPUARMState *env) | ||
149 | case ARMMMUIdx_E20_0: | ||
150 | case ARMMMUIdx_E20_2: | ||
151 | case ARMMMUIdx_E20_2_PAN: | ||
152 | + case ARMMMUIdx_SE20_0: | ||
153 | + case ARMMMUIdx_SE20_2: | ||
154 | + case ARMMMUIdx_SE20_2_PAN: | ||
155 | return GTIMER_HYP; | ||
156 | default: | ||
157 | return GTIMER_PHYS; | ||
158 | @@ -XXX,XX +XXX,XX @@ static int gt_virt_redir_timeridx(CPUARMState *env) | ||
159 | case ARMMMUIdx_E20_0: | ||
160 | case ARMMMUIdx_E20_2: | ||
161 | case ARMMMUIdx_E20_2_PAN: | ||
162 | + case ARMMMUIdx_SE20_0: | ||
163 | + case ARMMMUIdx_SE20_2: | ||
164 | + case ARMMMUIdx_SE20_2_PAN: | ||
165 | return GTIMER_HYPVIRT; | ||
166 | default: | ||
167 | return GTIMER_VIRT; | ||
168 | @@ -XXX,XX +XXX,XX @@ static void ats_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | ||
169 | mmu_idx = ARMMMUIdx_SE3; | ||
170 | break; | ||
171 | case 2: | ||
172 | - g_assert(!secure); /* TODO: ARMv8.4-SecEL2 */ | ||
173 | + g_assert(!secure); /* ARMv8.4-SecEL2 is 64-bit only */ | ||
174 | /* fall through */ | ||
175 | case 1: | ||
176 | if (ri->crm == 9 && (env->uncached_cpsr & CPSR_PAN)) { | ||
177 | @@ -XXX,XX +XXX,XX @@ static void ats_write64(CPUARMState *env, const ARMCPRegInfo *ri, | ||
178 | } | ||
179 | break; | ||
180 | case 4: /* AT S1E2R, AT S1E2W */ | ||
181 | - mmu_idx = ARMMMUIdx_E2; | ||
182 | + mmu_idx = secure ? ARMMMUIdx_SE2 : ARMMMUIdx_E2; | ||
183 | break; | ||
184 | case 6: /* AT S1E3R, AT S1E3W */ | ||
185 | mmu_idx = ARMMMUIdx_SE3; | ||
186 | @@ -XXX,XX +XXX,XX @@ static void vmsa_tcr_ttbr_el2_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
187 | */ | ||
188 | if (extract64(raw_read(env, ri) ^ value, 48, 16) && | ||
189 | (arm_hcr_el2_eff(env) & HCR_E2H)) { | ||
190 | - tlb_flush_by_mmuidx(env_cpu(env), | ||
191 | - ARMMMUIdxBit_E20_2 | | ||
192 | - ARMMMUIdxBit_E20_2_PAN | | ||
193 | - ARMMMUIdxBit_E20_0); | ||
194 | + uint16_t mask = ARMMMUIdxBit_E20_2 | | ||
195 | + ARMMMUIdxBit_E20_2_PAN | | ||
196 | + ARMMMUIdxBit_E20_0; | ||
197 | + | ||
198 | + if (arm_is_secure_below_el3(env)) { | ||
199 | + mask >>= ARM_MMU_IDX_A_NS; | ||
200 | + } | ||
201 | + | ||
202 | + tlb_flush_by_mmuidx(env_cpu(env), mask); | ||
203 | } | ||
204 | raw_write(env, ri, value); | ||
205 | } | ||
206 | @@ -XXX,XX +XXX,XX @@ static int vae1_tlbmask(CPUARMState *env) | ||
207 | uint64_t hcr = arm_hcr_el2_eff(env); | ||
208 | |||
209 | if ((hcr & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE)) { | ||
210 | - return ARMMMUIdxBit_E20_2 | | ||
211 | - ARMMMUIdxBit_E20_2_PAN | | ||
212 | - ARMMMUIdxBit_E20_0; | ||
213 | + uint16_t mask = ARMMMUIdxBit_E20_2 | | ||
214 | + ARMMMUIdxBit_E20_2_PAN | | ||
215 | + ARMMMUIdxBit_E20_0; | ||
216 | + | ||
217 | + if (arm_is_secure_below_el3(env)) { | ||
218 | + mask >>= ARM_MMU_IDX_A_NS; | ||
219 | + } | ||
220 | + | ||
221 | + return mask; | ||
222 | } else if (arm_is_secure_below_el3(env)) { | ||
223 | return ARMMMUIdxBit_SE10_1 | | ||
224 | ARMMMUIdxBit_SE10_1_PAN | | ||
225 | @@ -XXX,XX +XXX,XX @@ static int tlbbits_for_regime(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
226 | |||
227 | static int vae1_tlbbits(CPUARMState *env, uint64_t addr) | ||
228 | { | ||
229 | + uint64_t hcr = arm_hcr_el2_eff(env); | ||
230 | ARMMMUIdx mmu_idx; | ||
231 | |||
232 | /* Only the regime of the mmu_idx below is significant. */ | ||
233 | - if (arm_is_secure_below_el3(env)) { | ||
234 | - mmu_idx = ARMMMUIdx_SE10_0; | ||
235 | - } else if ((env->cp15.hcr_el2 & (HCR_E2H | HCR_TGE)) | ||
236 | - == (HCR_E2H | HCR_TGE)) { | ||
237 | + if ((hcr & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE)) { | ||
238 | mmu_idx = ARMMMUIdx_E20_0; | ||
239 | } else { | ||
240 | mmu_idx = ARMMMUIdx_E10_0; | ||
241 | } | ||
242 | + | ||
243 | + if (arm_is_secure_below_el3(env)) { | ||
244 | + mmu_idx &= ~ARM_MMU_IDX_A_NS; | ||
245 | + } | 36 | + } |
246 | + | 37 | + |
247 | return tlbbits_for_regime(env, mmu_idx, addr); | 38 | /* XSDT is pointed to by RSDP */ |
248 | } | 39 | xsdt = tables_blob->len; |
249 | 40 | build_xsdt(tables_blob, tables->linker, table_offsets, vms->oem_id, | |
250 | @@ -XXX,XX +XXX,XX @@ static int alle1_tlbmask(CPUARMState *env) | 41 | diff --git a/hw/arm/Kconfig b/hw/arm/Kconfig |
251 | |||
252 | static int e2_tlbmask(CPUARMState *env) | ||
253 | { | ||
254 | - /* TODO: ARMv8.4-SecEL2 */ | ||
255 | - return ARMMMUIdxBit_E20_0 | | ||
256 | - ARMMMUIdxBit_E20_2 | | ||
257 | - ARMMMUIdxBit_E20_2_PAN | | ||
258 | - ARMMMUIdxBit_E2; | ||
259 | + if (arm_is_secure_below_el3(env)) { | ||
260 | + return ARMMMUIdxBit_SE20_0 | | ||
261 | + ARMMMUIdxBit_SE20_2 | | ||
262 | + ARMMMUIdxBit_SE20_2_PAN | | ||
263 | + ARMMMUIdxBit_SE2; | ||
264 | + } else { | ||
265 | + return ARMMMUIdxBit_E20_0 | | ||
266 | + ARMMMUIdxBit_E20_2 | | ||
267 | + ARMMMUIdxBit_E20_2_PAN | | ||
268 | + ARMMMUIdxBit_E2; | ||
269 | + } | ||
270 | } | ||
271 | |||
272 | static void tlbi_aa64_alle1_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
273 | @@ -XXX,XX +XXX,XX @@ static void tlbi_aa64_vae2is_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
274 | { | ||
275 | CPUState *cs = env_cpu(env); | ||
276 | uint64_t pageaddr = sextract64(value << 12, 0, 56); | ||
277 | - int bits = tlbbits_for_regime(env, ARMMMUIdx_E2, pageaddr); | ||
278 | + bool secure = arm_is_secure_below_el3(env); | ||
279 | + int mask = secure ? ARMMMUIdxBit_SE2 : ARMMMUIdxBit_E2; | ||
280 | + int bits = tlbbits_for_regime(env, secure ? ARMMMUIdx_E2 : ARMMMUIdx_SE2, | ||
281 | + pageaddr); | ||
282 | |||
283 | - tlb_flush_page_bits_by_mmuidx_all_cpus_synced(cs, pageaddr, | ||
284 | - ARMMMUIdxBit_E2, bits); | ||
285 | + tlb_flush_page_bits_by_mmuidx_all_cpus_synced(cs, pageaddr, mask, bits); | ||
286 | } | ||
287 | |||
288 | static void tlbi_aa64_vae3is_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
289 | @@ -XXX,XX +XXX,XX @@ uint64_t arm_sctlr(CPUARMState *env, int el) | ||
290 | /* Only EL0 needs to be adjusted for EL1&0 or EL2&0. */ | ||
291 | if (el == 0) { | ||
292 | ARMMMUIdx mmu_idx = arm_mmu_idx_el(env, 0); | ||
293 | - el = (mmu_idx == ARMMMUIdx_E20_0 ? 2 : 1); | ||
294 | + el = (mmu_idx == ARMMMUIdx_E20_0 || mmu_idx == ARMMMUIdx_SE20_0) | ||
295 | + ? 2 : 1; | ||
296 | } | ||
297 | return env->cp15.sctlr_el[el]; | ||
298 | } | ||
299 | @@ -XXX,XX +XXX,XX @@ static inline bool regime_is_user(CPUARMState *env, ARMMMUIdx mmu_idx) | ||
300 | switch (mmu_idx) { | ||
301 | case ARMMMUIdx_SE10_0: | ||
302 | case ARMMMUIdx_E20_0: | ||
303 | + case ARMMMUIdx_SE20_0: | ||
304 | case ARMMMUIdx_Stage1_E0: | ||
305 | case ARMMMUIdx_MUser: | ||
306 | case ARMMMUIdx_MSUser: | ||
307 | @@ -XXX,XX +XXX,XX @@ int arm_mmu_idx_to_el(ARMMMUIdx mmu_idx) | ||
308 | case ARMMMUIdx_E10_0: | ||
309 | case ARMMMUIdx_E20_0: | ||
310 | case ARMMMUIdx_SE10_0: | ||
311 | + case ARMMMUIdx_SE20_0: | ||
312 | return 0; | ||
313 | case ARMMMUIdx_E10_1: | ||
314 | case ARMMMUIdx_E10_1_PAN: | ||
315 | @@ -XXX,XX +XXX,XX @@ int arm_mmu_idx_to_el(ARMMMUIdx mmu_idx) | ||
316 | case ARMMMUIdx_E2: | ||
317 | case ARMMMUIdx_E20_2: | ||
318 | case ARMMMUIdx_E20_2_PAN: | ||
319 | + case ARMMMUIdx_SE2: | ||
320 | + case ARMMMUIdx_SE20_2: | ||
321 | + case ARMMMUIdx_SE20_2_PAN: | ||
322 | return 2; | ||
323 | case ARMMMUIdx_SE3: | ||
324 | return 3; | ||
325 | @@ -XXX,XX +XXX,XX @@ ARMMMUIdx arm_v7m_mmu_idx_for_secstate(CPUARMState *env, bool secstate) | ||
326 | |||
327 | ARMMMUIdx arm_mmu_idx_el(CPUARMState *env, int el) | ||
328 | { | ||
329 | + ARMMMUIdx idx; | ||
330 | + uint64_t hcr; | ||
331 | + | ||
332 | if (arm_feature(env, ARM_FEATURE_M)) { | ||
333 | return arm_v7m_mmu_idx_for_secstate(env, env->v7m.secure); | ||
334 | } | ||
335 | @@ -XXX,XX +XXX,XX @@ ARMMMUIdx arm_mmu_idx_el(CPUARMState *env, int el) | ||
336 | /* See ARM pseudo-function ELIsInHost. */ | ||
337 | switch (el) { | ||
338 | case 0: | ||
339 | - if (arm_is_secure_below_el3(env)) { | ||
340 | - return ARMMMUIdx_SE10_0; | ||
341 | + hcr = arm_hcr_el2_eff(env); | ||
342 | + if ((hcr & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE)) { | ||
343 | + idx = ARMMMUIdx_E20_0; | ||
344 | + } else { | ||
345 | + idx = ARMMMUIdx_E10_0; | ||
346 | } | ||
347 | - if ((env->cp15.hcr_el2 & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE) | ||
348 | - && arm_el_is_aa64(env, 2)) { | ||
349 | - return ARMMMUIdx_E20_0; | ||
350 | - } | ||
351 | - return ARMMMUIdx_E10_0; | ||
352 | + break; | ||
353 | case 1: | ||
354 | - if (arm_is_secure_below_el3(env)) { | ||
355 | - if (env->pstate & PSTATE_PAN) { | ||
356 | - return ARMMMUIdx_SE10_1_PAN; | ||
357 | - } | ||
358 | - return ARMMMUIdx_SE10_1; | ||
359 | - } | ||
360 | if (env->pstate & PSTATE_PAN) { | ||
361 | - return ARMMMUIdx_E10_1_PAN; | ||
362 | + idx = ARMMMUIdx_E10_1_PAN; | ||
363 | + } else { | ||
364 | + idx = ARMMMUIdx_E10_1; | ||
365 | } | ||
366 | - return ARMMMUIdx_E10_1; | ||
367 | + break; | ||
368 | case 2: | ||
369 | - /* TODO: ARMv8.4-SecEL2 */ | ||
370 | /* Note that TGE does not apply at EL2. */ | ||
371 | - if ((env->cp15.hcr_el2 & HCR_E2H) && arm_el_is_aa64(env, 2)) { | ||
372 | + if (arm_hcr_el2_eff(env) & HCR_E2H) { | ||
373 | if (env->pstate & PSTATE_PAN) { | ||
374 | - return ARMMMUIdx_E20_2_PAN; | ||
375 | + idx = ARMMMUIdx_E20_2_PAN; | ||
376 | + } else { | ||
377 | + idx = ARMMMUIdx_E20_2; | ||
378 | } | ||
379 | - return ARMMMUIdx_E20_2; | ||
380 | + } else { | ||
381 | + idx = ARMMMUIdx_E2; | ||
382 | } | ||
383 | - return ARMMMUIdx_E2; | ||
384 | + break; | ||
385 | case 3: | ||
386 | return ARMMMUIdx_SE3; | ||
387 | default: | ||
388 | g_assert_not_reached(); | ||
389 | } | ||
390 | + | ||
391 | + if (arm_is_secure_below_el3(env)) { | ||
392 | + idx &= ~ARM_MMU_IDX_A_NS; | ||
393 | + } | ||
394 | + | ||
395 | + return idx; | ||
396 | } | ||
397 | |||
398 | ARMMMUIdx arm_mmu_idx(CPUARMState *env) | ||
399 | @@ -XXX,XX +XXX,XX @@ static uint32_t rebuild_hflags_a64(CPUARMState *env, int el, int fp_el, | ||
400 | break; | ||
401 | case ARMMMUIdx_E20_2: | ||
402 | case ARMMMUIdx_E20_2_PAN: | ||
403 | - /* TODO: ARMv8.4-SecEL2 */ | ||
404 | + case ARMMMUIdx_SE20_2: | ||
405 | + case ARMMMUIdx_SE20_2_PAN: | ||
406 | /* | ||
407 | * Note that EL20_2 is gated by HCR_EL2.E2H == 1, but EL20_0 is | ||
408 | * gated by HCR_EL2.<E2H,TGE> == '11', and so is LDTR. | ||
409 | diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c | ||
410 | index XXXXXXX..XXXXXXX 100644 | 42 | index XXXXXXX..XXXXXXX 100644 |
411 | --- a/target/arm/translate-a64.c | 43 | --- a/hw/arm/Kconfig |
412 | +++ b/target/arm/translate-a64.c | 44 | +++ b/hw/arm/Kconfig |
413 | @@ -XXX,XX +XXX,XX @@ static int get_a64_user_mem_index(DisasContext *s) | 45 | @@ -XXX,XX +XXX,XX @@ config ARM_VIRT |
414 | case ARMMMUIdx_SE10_1_PAN: | 46 | select DIMM |
415 | useridx = ARMMMUIdx_SE10_0; | 47 | select ACPI_HW_REDUCED |
416 | break; | 48 | select ACPI_APEI |
417 | + case ARMMMUIdx_SE20_2: | 49 | + select ACPI_VIOT |
418 | + case ARMMMUIdx_SE20_2_PAN: | 50 | |
419 | + useridx = ARMMMUIdx_SE20_0; | 51 | config CHEETAH |
420 | + break; | 52 | bool |
421 | default: | ||
422 | g_assert_not_reached(); | ||
423 | } | ||
424 | -- | 53 | -- |
425 | 2.20.1 | 54 | 2.25.1 |
426 | 55 | ||
427 | 56 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Jean-Philippe Brucker <jean-philippe@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | The interface for object_property_add_bool is simpler, | 3 | virtio-iommu is now supported with ACPI VIOT as well as device tree. |
4 | making the code easier to understand. | 4 | Remove the restriction that prevents from instantiating a virtio-iommu |
5 | device under ACPI. | ||
5 | 6 | ||
6 | Reviewed-by: Andrew Jones <drjones@redhat.com> | 7 | Acked-by: Igor Mammedov <imammedo@redhat.com> |
7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 8 | Reviewed-by: Eric Auger <eric.auger@redhat.com> |
8 | Message-id: 20210111235740.462469-4-richard.henderson@linaro.org | 9 | Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org> |
10 | Message-id: 20211210170415.583179-3-jean-philippe@linaro.org | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | --- | 12 | --- |
11 | target/arm/cpu64.c | 24 ++++++++++-------------- | 13 | hw/arm/virt.c | 10 ++-------- |
12 | 1 file changed, 10 insertions(+), 14 deletions(-) | 14 | hw/virtio/virtio-iommu-pci.c | 12 ++---------- |
15 | 2 files changed, 4 insertions(+), 18 deletions(-) | ||
13 | 16 | ||
14 | diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c | 17 | diff --git a/hw/arm/virt.c b/hw/arm/virt.c |
15 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/target/arm/cpu64.c | 19 | --- a/hw/arm/virt.c |
17 | +++ b/target/arm/cpu64.c | 20 | +++ b/hw/arm/virt.c |
18 | @@ -XXX,XX +XXX,XX @@ static void cpu_max_set_sve_max_vq(Object *obj, Visitor *v, const char *name, | 21 | @@ -XXX,XX +XXX,XX @@ static HotplugHandler *virt_machine_get_hotplug_handler(MachineState *machine, |
19 | cpu->sve_max_vq = max_vq; | 22 | MachineClass *mc = MACHINE_GET_CLASS(machine); |
23 | |||
24 | if (device_is_dynamic_sysbus(mc, dev) || | ||
25 | - (object_dynamic_cast(OBJECT(dev), TYPE_PC_DIMM))) { | ||
26 | + object_dynamic_cast(OBJECT(dev), TYPE_PC_DIMM) || | ||
27 | + object_dynamic_cast(OBJECT(dev), TYPE_VIRTIO_IOMMU_PCI)) { | ||
28 | return HOTPLUG_HANDLER(machine); | ||
29 | } | ||
30 | - if (object_dynamic_cast(OBJECT(dev), TYPE_VIRTIO_IOMMU_PCI)) { | ||
31 | - VirtMachineState *vms = VIRT_MACHINE(machine); | ||
32 | - | ||
33 | - if (!vms->bootinfo.firmware_loaded || !virt_is_acpi_enabled(vms)) { | ||
34 | - return HOTPLUG_HANDLER(machine); | ||
35 | - } | ||
36 | - } | ||
37 | return NULL; | ||
20 | } | 38 | } |
21 | 39 | ||
22 | +/* | 40 | diff --git a/hw/virtio/virtio-iommu-pci.c b/hw/virtio/virtio-iommu-pci.c |
23 | + * Note that cpu_arm_get/set_sve_vq cannot use the simpler | 41 | index XXXXXXX..XXXXXXX 100644 |
24 | + * object_property_add_bool interface because they make use | 42 | --- a/hw/virtio/virtio-iommu-pci.c |
25 | + * of the contents of "name" to determine which bit on which | 43 | +++ b/hw/virtio/virtio-iommu-pci.c |
26 | + * to operate. | 44 | @@ -XXX,XX +XXX,XX @@ static void virtio_iommu_pci_realize(VirtIOPCIProxy *vpci_dev, Error **errp) |
27 | + */ | 45 | VirtIOIOMMU *s = VIRTIO_IOMMU(vdev); |
28 | static void cpu_arm_get_sve_vq(Object *obj, Visitor *v, const char *name, | 46 | |
29 | void *opaque, Error **errp) | 47 | if (!qdev_get_machine_hotplug_handler(DEVICE(vpci_dev))) { |
30 | { | 48 | - MachineClass *mc = MACHINE_GET_CLASS(qdev_get_machine()); |
31 | @@ -XXX,XX +XXX,XX @@ static void cpu_arm_set_sve_vq(Object *obj, Visitor *v, const char *name, | ||
32 | set_bit(vq - 1, cpu->sve_vq_init); | ||
33 | } | ||
34 | |||
35 | -static void cpu_arm_get_sve(Object *obj, Visitor *v, const char *name, | ||
36 | - void *opaque, Error **errp) | ||
37 | +static bool cpu_arm_get_sve(Object *obj, Error **errp) | ||
38 | { | ||
39 | ARMCPU *cpu = ARM_CPU(obj); | ||
40 | - bool value = cpu_isar_feature(aa64_sve, cpu); | ||
41 | - | 49 | - |
42 | - visit_type_bool(v, name, &value, errp); | 50 | - error_setg(errp, |
43 | + return cpu_isar_feature(aa64_sve, cpu); | 51 | - "%s machine fails to create iommu-map device tree bindings", |
44 | } | 52 | - mc->name); |
45 | 53 | - error_append_hint(errp, | |
46 | -static void cpu_arm_set_sve(Object *obj, Visitor *v, const char *name, | 54 | - "Check your machine implements a hotplug handler " |
47 | - void *opaque, Error **errp) | 55 | - "for the virtio-iommu-pci device\n"); |
48 | +static void cpu_arm_set_sve(Object *obj, bool value, Error **errp) | 56 | - error_append_hint(errp, "Check the guest is booted without FW or with " |
49 | { | 57 | - "-no-acpi\n"); |
50 | ARMCPU *cpu = ARM_CPU(obj); | 58 | + error_setg(errp, "Check your machine implements a hotplug handler " |
51 | - bool value; | 59 | + "for the virtio-iommu-pci device"); |
52 | uint64_t t; | ||
53 | |||
54 | - if (!visit_type_bool(v, name, &value, errp)) { | ||
55 | - return; | ||
56 | - } | ||
57 | - | ||
58 | if (value && kvm_enabled() && !kvm_arm_sve_supported()) { | ||
59 | error_setg(errp, "'sve' feature not supported by KVM on this host"); | ||
60 | return; | 60 | return; |
61 | @@ -XXX,XX +XXX,XX @@ void aarch64_add_sve_properties(Object *obj) | 61 | } |
62 | { | 62 | for (int i = 0; i < s->nb_reserved_regions; i++) { |
63 | uint32_t vq; | ||
64 | |||
65 | - object_property_add(obj, "sve", "bool", cpu_arm_get_sve, | ||
66 | - cpu_arm_set_sve, NULL, NULL); | ||
67 | + object_property_add_bool(obj, "sve", cpu_arm_get_sve, cpu_arm_set_sve); | ||
68 | |||
69 | for (vq = 1; vq <= ARM_MAX_VQ; ++vq) { | ||
70 | char name[8]; | ||
71 | -- | 63 | -- |
72 | 2.20.1 | 64 | 2.25.1 |
73 | 65 | ||
74 | 66 | diff view generated by jsdifflib |
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 1 | From: Jean-Philippe Brucker <jean-philippe@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 3 | We do not support instantiating multiple IOMMUs. Before adding a |
4 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 4 | virtio-iommu, check that no other IOMMU is present. This will detect |
5 | Message-id: 20210112104511.36576-6-remi.denis.courmont@huawei.com | 5 | both "iommu=smmuv3" machine parameter and another virtio-iommu instance. |
6 | [PMM: tweaked commit message to match reduced scope of patch | 6 | |
7 | following rebase] | 7 | Fixes: 70e89132c9 ("hw/arm/virt: Add the virtio-iommu device tree mappings") |
8 | Reviewed-by: Eric Auger <eric.auger@redhat.com> | ||
9 | Reviewed-by: Igor Mammedov <imammedo@redhat.com> | ||
10 | Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org> | ||
11 | Message-id: 20211210170415.583179-4-jean-philippe@linaro.org | ||
8 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
9 | --- | 13 | --- |
10 | target/arm/cpu.h | 5 +++++ | 14 | hw/arm/virt.c | 5 +++++ |
11 | 1 file changed, 5 insertions(+) | 15 | 1 file changed, 5 insertions(+) |
12 | 16 | ||
13 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 17 | diff --git a/hw/arm/virt.c b/hw/arm/virt.c |
14 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/target/arm/cpu.h | 19 | --- a/hw/arm/virt.c |
16 | +++ b/target/arm/cpu.h | 20 | +++ b/hw/arm/virt.c |
17 | @@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_sve(const ARMISARegisters *id) | 21 | @@ -XXX,XX +XXX,XX @@ static void virt_machine_device_pre_plug_cb(HotplugHandler *hotplug_dev, |
18 | return FIELD_EX64(id->id_aa64pfr0, ID_AA64PFR0, SVE) != 0; | 22 | hwaddr db_start = 0, db_end = 0; |
19 | } | 23 | char *resv_prop_str; |
20 | 24 | ||
21 | +static inline bool isar_feature_aa64_sel2(const ARMISARegisters *id) | 25 | + if (vms->iommu != VIRT_IOMMU_NONE) { |
22 | +{ | 26 | + error_setg(errp, "virt machine does not support multiple IOMMUs"); |
23 | + return FIELD_EX64(id->id_aa64pfr0, ID_AA64PFR0, SEL2) != 0; | 27 | + return; |
24 | +} | 28 | + } |
25 | + | 29 | + |
26 | static inline bool isar_feature_aa64_vh(const ARMISARegisters *id) | 30 | switch (vms->msi_controller) { |
27 | { | 31 | case VIRT_MSI_CTRL_NONE: |
28 | return FIELD_EX64(id->id_aa64mmfr1, ID_AA64MMFR1, VH) != 0; | 32 | return; |
29 | -- | 33 | -- |
30 | 2.20.1 | 34 | 2.25.1 |
31 | 35 | ||
32 | 36 | diff view generated by jsdifflib |
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 1 | From: Jean-Philippe Brucker <jean-philippe@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | The VTTBR write callback so far assumes that the underlying VM lies in | 3 | To propagate errors to the caller of the pre_plug callback, use the |
4 | non-secure state. This handles the secure state scenario. | 4 | object_poperty_set*() functions directly instead of the qdev_prop_set*() |
5 | helpers. | ||
5 | 6 | ||
6 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 7 | Suggested-by: Igor Mammedov <imammedo@redhat.com> |
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 8 | Reviewed-by: Eric Auger <eric.auger@redhat.com> |
8 | Message-id: 20210112104511.36576-10-remi.denis.courmont@huawei.com | 9 | Reviewed-by: Igor Mammedov <imammedo@redhat.com> |
10 | Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org> | ||
11 | Message-id: 20211210170415.583179-5-jean-philippe@linaro.org | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | --- | 13 | --- |
11 | target/arm/helper.c | 13 +++++++++---- | 14 | hw/arm/virt.c | 5 +++-- |
12 | 1 file changed, 9 insertions(+), 4 deletions(-) | 15 | 1 file changed, 3 insertions(+), 2 deletions(-) |
13 | 16 | ||
14 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 17 | diff --git a/hw/arm/virt.c b/hw/arm/virt.c |
15 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/target/arm/helper.c | 19 | --- a/hw/arm/virt.c |
17 | +++ b/target/arm/helper.c | 20 | +++ b/hw/arm/virt.c |
18 | @@ -XXX,XX +XXX,XX @@ static void vttbr_write(CPUARMState *env, const ARMCPRegInfo *ri, | 21 | @@ -XXX,XX +XXX,XX @@ static void virt_machine_device_pre_plug_cb(HotplugHandler *hotplug_dev, |
19 | * the combined stage 1&2 tlbs (EL10_1 and EL10_0). | 22 | db_start, db_end, |
20 | */ | 23 | VIRTIO_IOMMU_RESV_MEM_T_MSI); |
21 | if (raw_read(env, ri) != value) { | 24 | |
22 | - tlb_flush_by_mmuidx(cs, | 25 | - qdev_prop_set_uint32(dev, "len-reserved-regions", 1); |
23 | - ARMMMUIdxBit_E10_1 | | 26 | - qdev_prop_set_string(dev, "reserved-regions[0]", resv_prop_str); |
24 | - ARMMMUIdxBit_E10_1_PAN | | 27 | + object_property_set_uint(OBJECT(dev), "len-reserved-regions", 1, errp); |
25 | - ARMMMUIdxBit_E10_0); | 28 | + object_property_set_str(OBJECT(dev), "reserved-regions[0]", |
26 | + uint16_t mask = ARMMMUIdxBit_E10_1 | | 29 | + resv_prop_str, errp); |
27 | + ARMMMUIdxBit_E10_1_PAN | | 30 | g_free(resv_prop_str); |
28 | + ARMMMUIdxBit_E10_0; | ||
29 | + | ||
30 | + if (arm_is_secure_below_el3(env)) { | ||
31 | + mask >>= ARM_MMU_IDX_A_NS; | ||
32 | + } | ||
33 | + | ||
34 | + tlb_flush_by_mmuidx(cs, mask); | ||
35 | raw_write(env, ri, value); | ||
36 | } | 31 | } |
37 | } | 32 | } |
38 | -- | 33 | -- |
39 | 2.20.1 | 34 | 2.25.1 |
40 | 35 | ||
41 | 36 | diff view generated by jsdifflib |
1 | From: Mihai Carabas <mihai.carabas@oracle.com> | 1 | From: Jean-Philippe Brucker <jean-philippe@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Add PCI interface support for PVPANIC device. Create a new file pvpanic-pci.c | 3 | Create empty data files and allow updates for the upcoming VIOT tests. |
4 | where the PCI specific routines reside and update the build system with the new | ||
5 | files and config structure. | ||
6 | 4 | ||
7 | Signed-off-by: Mihai Carabas <mihai.carabas@oracle.com> | 5 | Acked-by: Igor Mammedov <imammedo@redhat.com> |
8 | Reviewed-by: Gerd Hoffmann <kraxel@redhat.com> | 6 | Reviewed-by: Eric Auger <eric.auger@redhat.com> |
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 7 | Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org> |
10 | [PMM: wrapped one long line] | 8 | Message-id: 20211210170415.583179-6-jean-philippe@linaro.org |
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | --- | 10 | --- |
13 | docs/specs/pci-ids.txt | 1 + | 11 | tests/qtest/bios-tables-test-allowed-diff.h | 3 +++ |
14 | include/hw/misc/pvpanic.h | 1 + | 12 | tests/data/acpi/q35/DSDT.viot | 0 |
15 | include/hw/pci/pci.h | 1 + | 13 | tests/data/acpi/q35/VIOT.viot | 0 |
16 | hw/misc/pvpanic-pci.c | 95 +++++++++++++++++++++++++++++++++++++++ | 14 | tests/data/acpi/virt/VIOT | 0 |
17 | hw/misc/Kconfig | 6 +++ | 15 | 4 files changed, 3 insertions(+) |
18 | hw/misc/meson.build | 1 + | 16 | create mode 100644 tests/data/acpi/q35/DSDT.viot |
19 | 6 files changed, 105 insertions(+) | 17 | create mode 100644 tests/data/acpi/q35/VIOT.viot |
20 | create mode 100644 hw/misc/pvpanic-pci.c | 18 | create mode 100644 tests/data/acpi/virt/VIOT |
21 | 19 | ||
22 | diff --git a/docs/specs/pci-ids.txt b/docs/specs/pci-ids.txt | 20 | diff --git a/tests/qtest/bios-tables-test-allowed-diff.h b/tests/qtest/bios-tables-test-allowed-diff.h |
23 | index XXXXXXX..XXXXXXX 100644 | 21 | index XXXXXXX..XXXXXXX 100644 |
24 | --- a/docs/specs/pci-ids.txt | 22 | --- a/tests/qtest/bios-tables-test-allowed-diff.h |
25 | +++ b/docs/specs/pci-ids.txt | 23 | +++ b/tests/qtest/bios-tables-test-allowed-diff.h |
26 | @@ -XXX,XX +XXX,XX @@ PCI devices (other than virtio): | 24 | @@ -1 +1,4 @@ |
27 | 1b36:000d PCI xhci usb host adapter | 25 | /* List of comma-separated changed AML files to ignore */ |
28 | 1b36:000f mdpy (mdev sample device), linux/samples/vfio-mdev/mdpy.c | 26 | +"tests/data/acpi/virt/VIOT", |
29 | 1b36:0010 PCIe NVMe device (-device nvme) | 27 | +"tests/data/acpi/q35/DSDT.viot", |
30 | +1b36:0011 PCI PVPanic device (-device pvpanic-pci) | 28 | +"tests/data/acpi/q35/VIOT.viot", |
31 | 29 | diff --git a/tests/data/acpi/q35/DSDT.viot b/tests/data/acpi/q35/DSDT.viot | |
32 | All these devices are documented in docs/specs. | ||
33 | |||
34 | diff --git a/include/hw/misc/pvpanic.h b/include/hw/misc/pvpanic.h | ||
35 | index XXXXXXX..XXXXXXX 100644 | ||
36 | --- a/include/hw/misc/pvpanic.h | ||
37 | +++ b/include/hw/misc/pvpanic.h | ||
38 | @@ -XXX,XX +XXX,XX @@ | ||
39 | #include "qom/object.h" | ||
40 | |||
41 | #define TYPE_PVPANIC_ISA_DEVICE "pvpanic" | ||
42 | +#define TYPE_PVPANIC_PCI_DEVICE "pvpanic-pci" | ||
43 | |||
44 | #define PVPANIC_IOPORT_PROP "ioport" | ||
45 | |||
46 | diff --git a/include/hw/pci/pci.h b/include/hw/pci/pci.h | ||
47 | index XXXXXXX..XXXXXXX 100644 | ||
48 | --- a/include/hw/pci/pci.h | ||
49 | +++ b/include/hw/pci/pci.h | ||
50 | @@ -XXX,XX +XXX,XX @@ extern bool pci_available; | ||
51 | #define PCI_DEVICE_ID_REDHAT_PCIE_BRIDGE 0x000e | ||
52 | #define PCI_DEVICE_ID_REDHAT_MDPY 0x000f | ||
53 | #define PCI_DEVICE_ID_REDHAT_NVME 0x0010 | ||
54 | +#define PCI_DEVICE_ID_REDHAT_PVPANIC 0x0011 | ||
55 | #define PCI_DEVICE_ID_REDHAT_QXL 0x0100 | ||
56 | |||
57 | #define FMT_PCIBUS PRIx64 | ||
58 | diff --git a/hw/misc/pvpanic-pci.c b/hw/misc/pvpanic-pci.c | ||
59 | new file mode 100644 | 30 | new file mode 100644 |
60 | index XXXXXXX..XXXXXXX | 31 | index XXXXXXX..XXXXXXX |
61 | --- /dev/null | 32 | diff --git a/tests/data/acpi/q35/VIOT.viot b/tests/data/acpi/q35/VIOT.viot |
62 | +++ b/hw/misc/pvpanic-pci.c | 33 | new file mode 100644 |
63 | @@ -XXX,XX +XXX,XX @@ | 34 | index XXXXXXX..XXXXXXX |
64 | +/* | 35 | diff --git a/tests/data/acpi/virt/VIOT b/tests/data/acpi/virt/VIOT |
65 | + * QEMU simulated PCI pvpanic device. | 36 | new file mode 100644 |
66 | + * | 37 | index XXXXXXX..XXXXXXX |
67 | + * Copyright (C) 2020 Oracle | ||
68 | + * | ||
69 | + * Authors: | ||
70 | + * Mihai Carabas <mihai.carabas@oracle.com> | ||
71 | + * | ||
72 | + * This work is licensed under the terms of the GNU GPL, version 2 or later. | ||
73 | + * See the COPYING file in the top-level directory. | ||
74 | + * | ||
75 | + */ | ||
76 | + | ||
77 | +#include "qemu/osdep.h" | ||
78 | +#include "qemu/log.h" | ||
79 | +#include "qemu/module.h" | ||
80 | +#include "sysemu/runstate.h" | ||
81 | + | ||
82 | +#include "hw/nvram/fw_cfg.h" | ||
83 | +#include "hw/qdev-properties.h" | ||
84 | +#include "migration/vmstate.h" | ||
85 | +#include "hw/misc/pvpanic.h" | ||
86 | +#include "qom/object.h" | ||
87 | +#include "hw/pci/pci.h" | ||
88 | + | ||
89 | +OBJECT_DECLARE_SIMPLE_TYPE(PVPanicPCIState, PVPANIC_PCI_DEVICE) | ||
90 | + | ||
91 | +/* | ||
92 | + * PVPanicPCIState for PCI device | ||
93 | + */ | ||
94 | +typedef struct PVPanicPCIState { | ||
95 | + PCIDevice dev; | ||
96 | + PVPanicState pvpanic; | ||
97 | +} PVPanicPCIState; | ||
98 | + | ||
99 | +static const VMStateDescription vmstate_pvpanic_pci = { | ||
100 | + .name = "pvpanic-pci", | ||
101 | + .version_id = 1, | ||
102 | + .minimum_version_id = 1, | ||
103 | + .fields = (VMStateField[]) { | ||
104 | + VMSTATE_PCI_DEVICE(dev, PVPanicPCIState), | ||
105 | + VMSTATE_END_OF_LIST() | ||
106 | + } | ||
107 | +}; | ||
108 | + | ||
109 | +static void pvpanic_pci_realizefn(PCIDevice *dev, Error **errp) | ||
110 | +{ | ||
111 | + PVPanicPCIState *s = PVPANIC_PCI_DEVICE(dev); | ||
112 | + PVPanicState *ps = &s->pvpanic; | ||
113 | + | ||
114 | + pvpanic_setup_io(&s->pvpanic, DEVICE(s), 2); | ||
115 | + | ||
116 | + pci_register_bar(dev, 0, PCI_BASE_ADDRESS_SPACE_MEMORY, &ps->mr); | ||
117 | +} | ||
118 | + | ||
119 | +static Property pvpanic_pci_properties[] = { | ||
120 | + DEFINE_PROP_UINT8("events", PVPanicPCIState, pvpanic.events, | ||
121 | + PVPANIC_PANICKED | PVPANIC_CRASHLOADED), | ||
122 | + DEFINE_PROP_END_OF_LIST(), | ||
123 | +}; | ||
124 | + | ||
125 | +static void pvpanic_pci_class_init(ObjectClass *klass, void *data) | ||
126 | +{ | ||
127 | + DeviceClass *dc = DEVICE_CLASS(klass); | ||
128 | + PCIDeviceClass *pc = PCI_DEVICE_CLASS(klass); | ||
129 | + | ||
130 | + device_class_set_props(dc, pvpanic_pci_properties); | ||
131 | + | ||
132 | + pc->realize = pvpanic_pci_realizefn; | ||
133 | + pc->vendor_id = PCI_VENDOR_ID_REDHAT; | ||
134 | + pc->device_id = PCI_DEVICE_ID_REDHAT_PVPANIC; | ||
135 | + pc->revision = 1; | ||
136 | + pc->class_id = PCI_CLASS_SYSTEM_OTHER; | ||
137 | + dc->vmsd = &vmstate_pvpanic_pci; | ||
138 | + | ||
139 | + set_bit(DEVICE_CATEGORY_MISC, dc->categories); | ||
140 | +} | ||
141 | + | ||
142 | +static TypeInfo pvpanic_pci_info = { | ||
143 | + .name = TYPE_PVPANIC_PCI_DEVICE, | ||
144 | + .parent = TYPE_PCI_DEVICE, | ||
145 | + .instance_size = sizeof(PVPanicPCIState), | ||
146 | + .class_init = pvpanic_pci_class_init, | ||
147 | + .interfaces = (InterfaceInfo[]) { | ||
148 | + { INTERFACE_CONVENTIONAL_PCI_DEVICE }, | ||
149 | + { } | ||
150 | + } | ||
151 | +}; | ||
152 | + | ||
153 | +static void pvpanic_register_types(void) | ||
154 | +{ | ||
155 | + type_register_static(&pvpanic_pci_info); | ||
156 | +} | ||
157 | + | ||
158 | +type_init(pvpanic_register_types); | ||
159 | diff --git a/hw/misc/Kconfig b/hw/misc/Kconfig | ||
160 | index XXXXXXX..XXXXXXX 100644 | ||
161 | --- a/hw/misc/Kconfig | ||
162 | +++ b/hw/misc/Kconfig | ||
163 | @@ -XXX,XX +XXX,XX @@ config IOTKIT_SYSINFO | ||
164 | config PVPANIC_COMMON | ||
165 | bool | ||
166 | |||
167 | +config PVPANIC_PCI | ||
168 | + bool | ||
169 | + default y if PCI_DEVICES | ||
170 | + depends on PCI | ||
171 | + select PVPANIC_COMMON | ||
172 | + | ||
173 | config PVPANIC_ISA | ||
174 | bool | ||
175 | depends on ISA_BUS | ||
176 | diff --git a/hw/misc/meson.build b/hw/misc/meson.build | ||
177 | index XXXXXXX..XXXXXXX 100644 | ||
178 | --- a/hw/misc/meson.build | ||
179 | +++ b/hw/misc/meson.build | ||
180 | @@ -XXX,XX +XXX,XX @@ softmmu_ss.add(when: 'CONFIG_ARMSSE_CPUID', if_true: files('armsse-cpuid.c')) | ||
181 | softmmu_ss.add(when: 'CONFIG_ARMSSE_MHU', if_true: files('armsse-mhu.c')) | ||
182 | |||
183 | softmmu_ss.add(when: 'CONFIG_PVPANIC_ISA', if_true: files('pvpanic-isa.c')) | ||
184 | +softmmu_ss.add(when: 'CONFIG_PVPANIC_PCI', if_true: files('pvpanic-pci.c')) | ||
185 | softmmu_ss.add(when: 'CONFIG_AUX', if_true: files('auxbus.c')) | ||
186 | softmmu_ss.add(when: 'CONFIG_ASPEED_SOC', if_true: files('aspeed_scu.c', 'aspeed_sdmc.c', 'aspeed_xdma.c')) | ||
187 | softmmu_ss.add(when: 'CONFIG_MSF2', if_true: files('msf2-sysreg.c')) | ||
188 | -- | 38 | -- |
189 | 2.20.1 | 39 | 2.25.1 |
190 | 40 | ||
191 | 41 | diff view generated by jsdifflib |
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 1 | From: Jean-Philippe Brucker <jean-philippe@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | This checks if EL2 is enabled (meaning EL2 registers take effects) in | 3 | Add two test cases for VIOT, one on the q35 machine and the other on |
4 | the current security context. | 4 | virt. To test complex topologies the q35 test has two PCIe buses that |
5 | bypass the IOMMU (and are therefore not described by VIOT), and two | ||
6 | buses that are translated by virtio-iommu. | ||
5 | 7 | ||
6 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 8 | Reviewed-by: Eric Auger <eric.auger@redhat.com> |
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 9 | Reviewed-by: Igor Mammedov <imammedo@redhat.com> |
8 | Message-id: 20210112104511.36576-2-remi.denis.courmont@huawei.com | 10 | Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org> |
11 | Message-id: 20211210170415.583179-7-jean-philippe@linaro.org | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | --- | 13 | --- |
11 | target/arm/cpu.h | 17 +++++++++++++++++ | 14 | tests/qtest/bios-tables-test.c | 38 ++++++++++++++++++++++++++++++++++ |
12 | 1 file changed, 17 insertions(+) | 15 | 1 file changed, 38 insertions(+) |
13 | 16 | ||
14 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 17 | diff --git a/tests/qtest/bios-tables-test.c b/tests/qtest/bios-tables-test.c |
15 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/target/arm/cpu.h | 19 | --- a/tests/qtest/bios-tables-test.c |
17 | +++ b/target/arm/cpu.h | 20 | +++ b/tests/qtest/bios-tables-test.c |
18 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_is_secure(CPUARMState *env) | 21 | @@ -XXX,XX +XXX,XX @@ static void test_acpi_virt_tcg(void) |
19 | return arm_is_secure_below_el3(env); | 22 | free_test_data(&data); |
20 | } | 23 | } |
21 | 24 | ||
22 | +/* | 25 | +static void test_acpi_q35_viot(void) |
23 | + * Return true if the current security state has AArch64 EL2 or AArch32 Hyp. | ||
24 | + * This corresponds to the pseudocode EL2Enabled() | ||
25 | + */ | ||
26 | +static inline bool arm_is_el2_enabled(CPUARMState *env) | ||
27 | +{ | 26 | +{ |
28 | + if (arm_feature(env, ARM_FEATURE_EL2)) { | 27 | + test_data data = { |
29 | + return !arm_is_secure_below_el3(env); | 28 | + .machine = MACHINE_Q35, |
30 | + } | 29 | + .variant = ".viot", |
31 | + return false; | 30 | + }; |
31 | + | ||
32 | + /* | ||
33 | + * To keep things interesting, two buses bypass the IOMMU. | ||
34 | + * VIOT should only describes the other two buses. | ||
35 | + */ | ||
36 | + test_acpi_one("-machine default_bus_bypass_iommu=on " | ||
37 | + "-device virtio-iommu-pci " | ||
38 | + "-device pxb-pcie,bus_nr=0x10,id=pcie.100,bus=pcie.0 " | ||
39 | + "-device pxb-pcie,bus_nr=0x20,id=pcie.200,bus=pcie.0,bypass_iommu=on " | ||
40 | + "-device pxb-pcie,bus_nr=0x30,id=pcie.300,bus=pcie.0", | ||
41 | + &data); | ||
42 | + free_test_data(&data); | ||
32 | +} | 43 | +} |
33 | + | 44 | + |
34 | #else | 45 | +static void test_acpi_virt_viot(void) |
35 | static inline bool arm_is_secure_below_el3(CPUARMState *env) | 46 | +{ |
47 | + test_data data = { | ||
48 | + .machine = "virt", | ||
49 | + .uefi_fl1 = "pc-bios/edk2-aarch64-code.fd", | ||
50 | + .uefi_fl2 = "pc-bios/edk2-arm-vars.fd", | ||
51 | + .cd = "tests/data/uefi-boot-images/bios-tables-test.aarch64.iso.qcow2", | ||
52 | + .ram_start = 0x40000000ULL, | ||
53 | + .scan_len = 128ULL * 1024 * 1024, | ||
54 | + }; | ||
55 | + | ||
56 | + test_acpi_one("-cpu cortex-a57 " | ||
57 | + "-device virtio-iommu-pci", &data); | ||
58 | + free_test_data(&data); | ||
59 | +} | ||
60 | + | ||
61 | static void test_oem_fields(test_data *data) | ||
36 | { | 62 | { |
37 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_is_secure(CPUARMState *env) | 63 | int i; |
38 | { | 64 | @@ -XXX,XX +XXX,XX @@ int main(int argc, char *argv[]) |
39 | return false; | 65 | qtest_add_func("acpi/q35/kvm/xapic", test_acpi_q35_kvm_xapic); |
40 | } | 66 | qtest_add_func("acpi/q35/kvm/dmar", test_acpi_q35_kvm_dmar); |
41 | + | 67 | } |
42 | +static inline bool arm_is_el2_enabled(CPUARMState *env) | 68 | + qtest_add_func("acpi/q35/viot", test_acpi_q35_viot); |
43 | +{ | 69 | } else if (strcmp(arch, "aarch64") == 0) { |
44 | + return false; | 70 | if (has_tcg) { |
45 | +} | 71 | qtest_add_func("acpi/virt", test_acpi_virt_tcg); |
46 | #endif | 72 | @@ -XXX,XX +XXX,XX @@ int main(int argc, char *argv[]) |
47 | 73 | qtest_add_func("acpi/virt/memhp", test_acpi_virt_tcg_memhp); | |
48 | /** | 74 | qtest_add_func("acpi/virt/pxb", test_acpi_virt_tcg_pxb); |
75 | qtest_add_func("acpi/virt/oem-fields", test_acpi_oem_fields_virt); | ||
76 | + qtest_add_func("acpi/virt/viot", test_acpi_virt_viot); | ||
77 | } | ||
78 | } | ||
79 | ret = g_test_run(); | ||
49 | -- | 80 | -- |
50 | 2.20.1 | 81 | 2.25.1 |
51 | 82 | ||
52 | 83 | diff view generated by jsdifflib |
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 1 | From: Jean-Philippe Brucker <jean-philippe@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | In this context, the HCR value is the effective value, and thus is | 3 | Add expected blobs of the VIOT and DSDT table for the VIOT test on the |
4 | zero in secure mode. The tests for HCR.{F,I}MO are sufficient. | 4 | q35 machine. |
5 | 5 | ||
6 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 6 | Since the test instantiates a virtio device and two PCIe expander |
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 7 | bridges, DSDT.viot has more blocks than the base DSDT. |
8 | Message-id: 20210112104511.36576-1-remi.denis.courmont@huawei.com | 8 | |
9 | The VIOT table generated for the q35 test is: | ||
10 | |||
11 | [000h 0000 4] Signature : "VIOT" [Virtual I/O Translation Table] | ||
12 | [004h 0004 4] Table Length : 00000070 | ||
13 | [008h 0008 1] Revision : 00 | ||
14 | [009h 0009 1] Checksum : 3D | ||
15 | [00Ah 0010 6] Oem ID : "BOCHS " | ||
16 | [010h 0016 8] Oem Table ID : "BXPC " | ||
17 | [018h 0024 4] Oem Revision : 00000001 | ||
18 | [01Ch 0028 4] Asl Compiler ID : "BXPC" | ||
19 | [020h 0032 4] Asl Compiler Revision : 00000001 | ||
20 | |||
21 | [024h 0036 2] Node count : 0003 | ||
22 | [026h 0038 2] Node offset : 0030 | ||
23 | [028h 0040 8] Reserved : 0000000000000000 | ||
24 | |||
25 | [030h 0048 1] Type : 03 [VirtIO-PCI IOMMU] | ||
26 | [031h 0049 1] Reserved : 00 | ||
27 | [032h 0050 2] Length : 0010 | ||
28 | |||
29 | [034h 0052 2] PCI Segment : 0000 | ||
30 | [036h 0054 2] PCI BDF number : 0010 | ||
31 | [038h 0056 8] Reserved : 0000000000000000 | ||
32 | |||
33 | [040h 0064 1] Type : 01 [PCI Range] | ||
34 | [041h 0065 1] Reserved : 00 | ||
35 | [042h 0066 2] Length : 0018 | ||
36 | |||
37 | [044h 0068 4] Endpoint start : 00003000 | ||
38 | [048h 0072 2] PCI Segment start : 0000 | ||
39 | [04Ah 0074 2] PCI Segment end : 0000 | ||
40 | [04Ch 0076 2] PCI BDF start : 3000 | ||
41 | [04Eh 0078 2] PCI BDF end : 30FF | ||
42 | [050h 0080 2] Output node : 0030 | ||
43 | [052h 0082 6] Reserved : 000000000000 | ||
44 | |||
45 | [058h 0088 1] Type : 01 [PCI Range] | ||
46 | [059h 0089 1] Reserved : 00 | ||
47 | [05Ah 0090 2] Length : 0018 | ||
48 | |||
49 | [05Ch 0092 4] Endpoint start : 00001000 | ||
50 | [060h 0096 2] PCI Segment start : 0000 | ||
51 | [062h 0098 2] PCI Segment end : 0000 | ||
52 | [064h 0100 2] PCI BDF start : 1000 | ||
53 | [066h 0102 2] PCI BDF end : 10FF | ||
54 | [068h 0104 2] Output node : 0030 | ||
55 | [06Ah 0106 6] Reserved : 000000000000 | ||
56 | |||
57 | And the DSDT diff is: | ||
58 | |||
59 | @@ -XXX,XX +XXX,XX @@ | ||
60 | * | ||
61 | * Disassembling to symbolic ASL+ operators | ||
62 | * | ||
63 | - * Disassembly of tests/data/acpi/q35/DSDT, Fri Dec 10 15:03:08 2021 | ||
64 | + * Disassembly of /tmp/aml-H9Y5D1, Fri Dec 10 15:02:27 2021 | ||
65 | * | ||
66 | * Original Table Header: | ||
67 | * Signature "DSDT" | ||
68 | - * Length 0x00002061 (8289) | ||
69 | + * Length 0x000024B6 (9398) | ||
70 | * Revision 0x01 **** 32-bit table (V1), no 64-bit math support | ||
71 | - * Checksum 0xFA | ||
72 | + * Checksum 0xA7 | ||
73 | * OEM ID "BOCHS " | ||
74 | * OEM Table ID "BXPC " | ||
75 | * OEM Revision 0x00000001 (1) | ||
76 | @@ -XXX,XX +XXX,XX @@ | ||
77 | } | ||
78 | } | ||
79 | |||
80 | + Scope (\_SB) | ||
81 | + { | ||
82 | + Device (PC30) | ||
83 | + { | ||
84 | + Name (_UID, 0x30) // _UID: Unique ID | ||
85 | + Name (_BBN, 0x30) // _BBN: BIOS Bus Number | ||
86 | + Name (_HID, EisaId ("PNP0A08") /* PCI Express Bus */) // _HID: Hardware ID | ||
87 | + Name (_CID, EisaId ("PNP0A03") /* PCI Bus */) // _CID: Compatible ID | ||
88 | + Method (_OSC, 4, NotSerialized) // _OSC: Operating System Capabilities | ||
89 | + { | ||
90 | + CreateDWordField (Arg3, Zero, CDW1) | ||
91 | + If ((Arg0 == ToUUID ("33db4d5b-1ff7-401c-9657-7441c03dd766") /* PCI Host Bridge Device */)) | ||
92 | + { | ||
93 | + CreateDWordField (Arg3, 0x04, CDW2) | ||
94 | + CreateDWordField (Arg3, 0x08, CDW3) | ||
95 | + Local0 = CDW3 /* \_SB_.PC30._OSC.CDW3 */ | ||
96 | + Local0 &= 0x1F | ||
97 | + If ((Arg1 != One)) | ||
98 | + { | ||
99 | + CDW1 |= 0x08 | ||
100 | + } | ||
101 | + | ||
102 | + If ((CDW3 != Local0)) | ||
103 | + { | ||
104 | + CDW1 |= 0x10 | ||
105 | + } | ||
106 | + | ||
107 | + CDW3 = Local0 | ||
108 | + } | ||
109 | + Else | ||
110 | + { | ||
111 | + CDW1 |= 0x04 | ||
112 | + } | ||
113 | + | ||
114 | + Return (Arg3) | ||
115 | + } | ||
116 | + | ||
117 | + Method (_PRT, 0, NotSerialized) // _PRT: PCI Routing Table | ||
118 | + { | ||
119 | + Local0 = Package (0x80){} | ||
120 | + Local1 = Zero | ||
121 | + While ((Local1 < 0x80)) | ||
122 | + { | ||
123 | + Local2 = (Local1 >> 0x02) | ||
124 | + Local3 = ((Local1 + Local2) & 0x03) | ||
125 | + If ((Local3 == Zero)) | ||
126 | + { | ||
127 | + Local4 = Package (0x04) | ||
128 | + { | ||
129 | + Zero, | ||
130 | + Zero, | ||
131 | + LNKD, | ||
132 | + Zero | ||
133 | + } | ||
134 | + } | ||
135 | + | ||
136 | + If ((Local3 == One)) | ||
137 | + { | ||
138 | + Local4 = Package (0x04) | ||
139 | + { | ||
140 | + Zero, | ||
141 | + Zero, | ||
142 | + LNKA, | ||
143 | + Zero | ||
144 | + } | ||
145 | + } | ||
146 | + | ||
147 | + If ((Local3 == 0x02)) | ||
148 | + { | ||
149 | + Local4 = Package (0x04) | ||
150 | + { | ||
151 | + Zero, | ||
152 | + Zero, | ||
153 | + LNKB, | ||
154 | + Zero | ||
155 | + } | ||
156 | + } | ||
157 | + | ||
158 | + If ((Local3 == 0x03)) | ||
159 | + { | ||
160 | + Local4 = Package (0x04) | ||
161 | + { | ||
162 | + Zero, | ||
163 | + Zero, | ||
164 | + LNKC, | ||
165 | + Zero | ||
166 | + } | ||
167 | + } | ||
168 | + | ||
169 | + Local4 [Zero] = ((Local2 << 0x10) | 0xFFFF) | ||
170 | + Local4 [One] = (Local1 & 0x03) | ||
171 | + Local0 [Local1] = Local4 | ||
172 | + Local1++ | ||
173 | + } | ||
174 | + | ||
175 | + Return (Local0) | ||
176 | + } | ||
177 | + | ||
178 | + Name (_CRS, ResourceTemplate () // _CRS: Current Resource Settings | ||
179 | + { | ||
180 | + WordBusNumber (ResourceProducer, MinFixed, MaxFixed, PosDecode, | ||
181 | + 0x0000, // Granularity | ||
182 | + 0x0030, // Range Minimum | ||
183 | + 0x0030, // Range Maximum | ||
184 | + 0x0000, // Translation Offset | ||
185 | + 0x0001, // Length | ||
186 | + ,, ) | ||
187 | + }) | ||
188 | + } | ||
189 | + } | ||
190 | + | ||
191 | + Scope (\_SB) | ||
192 | + { | ||
193 | + Device (PC20) | ||
194 | + { | ||
195 | + Name (_UID, 0x20) // _UID: Unique ID | ||
196 | + Name (_BBN, 0x20) // _BBN: BIOS Bus Number | ||
197 | + Name (_HID, EisaId ("PNP0A08") /* PCI Express Bus */) // _HID: Hardware ID | ||
198 | + Name (_CID, EisaId ("PNP0A03") /* PCI Bus */) // _CID: Compatible ID | ||
199 | + Method (_OSC, 4, NotSerialized) // _OSC: Operating System Capabilities | ||
200 | + { | ||
201 | + CreateDWordField (Arg3, Zero, CDW1) | ||
202 | + If ((Arg0 == ToUUID ("33db4d5b-1ff7-401c-9657-7441c03dd766") /* PCI Host Bridge Device */)) | ||
203 | + { | ||
204 | + CreateDWordField (Arg3, 0x04, CDW2) | ||
205 | + CreateDWordField (Arg3, 0x08, CDW3) | ||
206 | + Local0 = CDW3 /* \_SB_.PC20._OSC.CDW3 */ | ||
207 | + Local0 &= 0x1F | ||
208 | + If ((Arg1 != One)) | ||
209 | + { | ||
210 | + CDW1 |= 0x08 | ||
211 | + } | ||
212 | + | ||
213 | + If ((CDW3 != Local0)) | ||
214 | + { | ||
215 | + CDW1 |= 0x10 | ||
216 | + } | ||
217 | + | ||
218 | + CDW3 = Local0 | ||
219 | + } | ||
220 | + Else | ||
221 | + { | ||
222 | + CDW1 |= 0x04 | ||
223 | + } | ||
224 | + | ||
225 | + Return (Arg3) | ||
226 | + } | ||
227 | + | ||
228 | + Method (_PRT, 0, NotSerialized) // _PRT: PCI Routing Table | ||
229 | + { | ||
230 | + Local0 = Package (0x80){} | ||
231 | + Local1 = Zero | ||
232 | + While ((Local1 < 0x80)) | ||
233 | + { | ||
234 | + Local2 = (Local1 >> 0x02) | ||
235 | + Local3 = ((Local1 + Local2) & 0x03) | ||
236 | + If ((Local3 == Zero)) | ||
237 | + { | ||
238 | + Local4 = Package (0x04) | ||
239 | + { | ||
240 | + Zero, | ||
241 | + Zero, | ||
242 | + LNKD, | ||
243 | + Zero | ||
244 | + } | ||
245 | + } | ||
246 | + | ||
247 | + If ((Local3 == One)) | ||
248 | + { | ||
249 | + Local4 = Package (0x04) | ||
250 | + { | ||
251 | + Zero, | ||
252 | + Zero, | ||
253 | + LNKA, | ||
254 | + Zero | ||
255 | + } | ||
256 | + } | ||
257 | + | ||
258 | + If ((Local3 == 0x02)) | ||
259 | + { | ||
260 | + Local4 = Package (0x04) | ||
261 | + { | ||
262 | + Zero, | ||
263 | + Zero, | ||
264 | + LNKB, | ||
265 | + Zero | ||
266 | + } | ||
267 | + } | ||
268 | + | ||
269 | + If ((Local3 == 0x03)) | ||
270 | + { | ||
271 | + Local4 = Package (0x04) | ||
272 | + { | ||
273 | + Zero, | ||
274 | + Zero, | ||
275 | + LNKC, | ||
276 | + Zero | ||
277 | + } | ||
278 | + } | ||
279 | + | ||
280 | + Local4 [Zero] = ((Local2 << 0x10) | 0xFFFF) | ||
281 | + Local4 [One] = (Local1 & 0x03) | ||
282 | + Local0 [Local1] = Local4 | ||
283 | + Local1++ | ||
284 | + } | ||
285 | + | ||
286 | + Return (Local0) | ||
287 | + } | ||
288 | + | ||
289 | + Name (_CRS, ResourceTemplate () // _CRS: Current Resource Settings | ||
290 | + { | ||
291 | + WordBusNumber (ResourceProducer, MinFixed, MaxFixed, PosDecode, | ||
292 | + 0x0000, // Granularity | ||
293 | + 0x0020, // Range Minimum | ||
294 | + 0x0020, // Range Maximum | ||
295 | + 0x0000, // Translation Offset | ||
296 | + 0x0001, // Length | ||
297 | + ,, ) | ||
298 | + }) | ||
299 | + } | ||
300 | + } | ||
301 | + | ||
302 | + Scope (\_SB) | ||
303 | + { | ||
304 | + Device (PC10) | ||
305 | + { | ||
306 | + Name (_UID, 0x10) // _UID: Unique ID | ||
307 | + Name (_BBN, 0x10) // _BBN: BIOS Bus Number | ||
308 | + Name (_HID, EisaId ("PNP0A08") /* PCI Express Bus */) // _HID: Hardware ID | ||
309 | + Name (_CID, EisaId ("PNP0A03") /* PCI Bus */) // _CID: Compatible ID | ||
310 | + Method (_OSC, 4, NotSerialized) // _OSC: Operating System Capabilities | ||
311 | + { | ||
312 | + CreateDWordField (Arg3, Zero, CDW1) | ||
313 | + If ((Arg0 == ToUUID ("33db4d5b-1ff7-401c-9657-7441c03dd766") /* PCI Host Bridge Device */)) | ||
314 | + { | ||
315 | + CreateDWordField (Arg3, 0x04, CDW2) | ||
316 | + CreateDWordField (Arg3, 0x08, CDW3) | ||
317 | + Local0 = CDW3 /* \_SB_.PC10._OSC.CDW3 */ | ||
318 | + Local0 &= 0x1F | ||
319 | + If ((Arg1 != One)) | ||
320 | + { | ||
321 | + CDW1 |= 0x08 | ||
322 | + } | ||
323 | + | ||
324 | + If ((CDW3 != Local0)) | ||
325 | + { | ||
326 | + CDW1 |= 0x10 | ||
327 | + } | ||
328 | + | ||
329 | + CDW3 = Local0 | ||
330 | + } | ||
331 | + Else | ||
332 | + { | ||
333 | + CDW1 |= 0x04 | ||
334 | + } | ||
335 | + | ||
336 | + Return (Arg3) | ||
337 | + } | ||
338 | + | ||
339 | + Method (_PRT, 0, NotSerialized) // _PRT: PCI Routing Table | ||
340 | + { | ||
341 | + Local0 = Package (0x80){} | ||
342 | + Local1 = Zero | ||
343 | + While ((Local1 < 0x80)) | ||
344 | + { | ||
345 | + Local2 = (Local1 >> 0x02) | ||
346 | + Local3 = ((Local1 + Local2) & 0x03) | ||
347 | + If ((Local3 == Zero)) | ||
348 | + { | ||
349 | + Local4 = Package (0x04) | ||
350 | + { | ||
351 | + Zero, | ||
352 | + Zero, | ||
353 | + LNKD, | ||
354 | + Zero | ||
355 | + } | ||
356 | + } | ||
357 | + | ||
358 | + If ((Local3 == One)) | ||
359 | + { | ||
360 | + Local4 = Package (0x04) | ||
361 | + { | ||
362 | + Zero, | ||
363 | + Zero, | ||
364 | + LNKA, | ||
365 | + Zero | ||
366 | + } | ||
367 | + } | ||
368 | + | ||
369 | + If ((Local3 == 0x02)) | ||
370 | + { | ||
371 | + Local4 = Package (0x04) | ||
372 | + { | ||
373 | + Zero, | ||
374 | + Zero, | ||
375 | + LNKB, | ||
376 | + Zero | ||
377 | + } | ||
378 | + } | ||
379 | + | ||
380 | + If ((Local3 == 0x03)) | ||
381 | + { | ||
382 | + Local4 = Package (0x04) | ||
383 | + { | ||
384 | + Zero, | ||
385 | + Zero, | ||
386 | + LNKC, | ||
387 | + Zero | ||
388 | + } | ||
389 | + } | ||
390 | + | ||
391 | + Local4 [Zero] = ((Local2 << 0x10) | 0xFFFF) | ||
392 | + Local4 [One] = (Local1 & 0x03) | ||
393 | + Local0 [Local1] = Local4 | ||
394 | + Local1++ | ||
395 | + } | ||
396 | + | ||
397 | + Return (Local0) | ||
398 | + } | ||
399 | + | ||
400 | + Name (_CRS, ResourceTemplate () // _CRS: Current Resource Settings | ||
401 | + { | ||
402 | + WordBusNumber (ResourceProducer, MinFixed, MaxFixed, PosDecode, | ||
403 | + 0x0000, // Granularity | ||
404 | + 0x0010, // Range Minimum | ||
405 | + 0x0010, // Range Maximum | ||
406 | + 0x0000, // Translation Offset | ||
407 | + 0x0001, // Length | ||
408 | + ,, ) | ||
409 | + }) | ||
410 | + } | ||
411 | + } | ||
412 | + | ||
413 | Scope (\_SB.PCI0) | ||
414 | { | ||
415 | Name (_CRS, ResourceTemplate () // _CRS: Current Resource Settings | ||
416 | @@ -XXX,XX +XXX,XX @@ | ||
417 | WordBusNumber (ResourceProducer, MinFixed, MaxFixed, PosDecode, | ||
418 | 0x0000, // Granularity | ||
419 | 0x0000, // Range Minimum | ||
420 | - 0x00FF, // Range Maximum | ||
421 | + 0x000F, // Range Maximum | ||
422 | 0x0000, // Translation Offset | ||
423 | - 0x0100, // Length | ||
424 | + 0x0010, // Length | ||
425 | ,, ) | ||
426 | IO (Decode16, | ||
427 | 0x0CF8, // Range Minimum | ||
428 | @@ -XXX,XX +XXX,XX @@ | ||
429 | } | ||
430 | } | ||
431 | |||
432 | + Device (S10) | ||
433 | + { | ||
434 | + Name (_ADR, 0x00020000) // _ADR: Address | ||
435 | + } | ||
436 | + | ||
437 | + Device (S18) | ||
438 | + { | ||
439 | + Name (_ADR, 0x00030000) // _ADR: Address | ||
440 | + } | ||
441 | + | ||
442 | + Device (S20) | ||
443 | + { | ||
444 | + Name (_ADR, 0x00040000) // _ADR: Address | ||
445 | + } | ||
446 | + | ||
447 | + Device (S28) | ||
448 | + { | ||
449 | + Name (_ADR, 0x00050000) // _ADR: Address | ||
450 | + } | ||
451 | + | ||
452 | Method (PCNT, 0, NotSerialized) | ||
453 | { | ||
454 | } | ||
455 | |||
456 | Reviewed-by: Eric Auger <eric.auger@redhat.com> | ||
457 | Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org> | ||
458 | Message-id: 20211210170415.583179-8-jean-philippe@linaro.org | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 459 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | --- | 460 | --- |
11 | target/arm/cpu.c | 8 ++++---- | 461 | tests/qtest/bios-tables-test-allowed-diff.h | 2 -- |
12 | target/arm/helper.c | 10 ++++------ | 462 | tests/data/acpi/q35/DSDT.viot | Bin 0 -> 9398 bytes |
13 | 2 files changed, 8 insertions(+), 10 deletions(-) | 463 | tests/data/acpi/q35/VIOT.viot | Bin 0 -> 112 bytes |
14 | 464 | 3 files changed, 2 deletions(-) | |
15 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | 465 | |
466 | diff --git a/tests/qtest/bios-tables-test-allowed-diff.h b/tests/qtest/bios-tables-test-allowed-diff.h | ||
16 | index XXXXXXX..XXXXXXX 100644 | 467 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/target/arm/cpu.c | 468 | --- a/tests/qtest/bios-tables-test-allowed-diff.h |
18 | +++ b/target/arm/cpu.c | 469 | +++ b/tests/qtest/bios-tables-test-allowed-diff.h |
19 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_excp_unmasked(CPUState *cs, unsigned int excp_idx, | 470 | @@ -XXX,XX +XXX,XX @@ |
20 | break; | 471 | /* List of comma-separated changed AML files to ignore */ |
21 | 472 | "tests/data/acpi/virt/VIOT", | |
22 | case EXCP_VFIQ: | 473 | -"tests/data/acpi/q35/DSDT.viot", |
23 | - if (secure || !(hcr_el2 & HCR_FMO) || (hcr_el2 & HCR_TGE)) { | 474 | -"tests/data/acpi/q35/VIOT.viot", |
24 | - /* VFIQs are only taken when hypervized and non-secure. */ | 475 | diff --git a/tests/data/acpi/q35/DSDT.viot b/tests/data/acpi/q35/DSDT.viot |
25 | + if (!(hcr_el2 & HCR_FMO) || (hcr_el2 & HCR_TGE)) { | ||
26 | + /* VFIQs are only taken when hypervized. */ | ||
27 | return false; | ||
28 | } | ||
29 | return !(env->daif & PSTATE_F); | ||
30 | case EXCP_VIRQ: | ||
31 | - if (secure || !(hcr_el2 & HCR_IMO) || (hcr_el2 & HCR_TGE)) { | ||
32 | - /* VIRQs are only taken when hypervized and non-secure. */ | ||
33 | + if (!(hcr_el2 & HCR_IMO) || (hcr_el2 & HCR_TGE)) { | ||
34 | + /* VIRQs are only taken when hypervized. */ | ||
35 | return false; | ||
36 | } | ||
37 | return !(env->daif & PSTATE_I); | ||
38 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
39 | index XXXXXXX..XXXXXXX 100644 | 476 | index XXXXXXX..XXXXXXX 100644 |
40 | --- a/target/arm/helper.c | 477 | GIT binary patch |
41 | +++ b/target/arm/helper.c | 478 | literal 9398 |
42 | @@ -XXX,XX +XXX,XX @@ static void csselr_write(CPUARMState *env, const ARMCPRegInfo *ri, | 479 | zcmeHNO>7&-8J*>iv|O&FB}G~Oi$yp||57BBoWHhc5OS9yDTx$CQgH$r;8Idr*-4Q_ |
43 | static uint64_t isr_read(CPUARMState *env, const ARMCPRegInfo *ri) | 480 | z5(9Az1F`}niVsB-)<KW7p`g9Br(A2Gm-gmc1N78GFS!;)e2V(MnH_0{q<{#yMgn&C |
44 | { | 481 | zn|*J-d9yqFhO_H6z19~`FlPL*u<DkZ*}|)JH;X@mF-FI<cPg<fti9tEN*yB^i5czN |
45 | CPUState *cs = env_cpu(env); | 482 | zNq&q?!OZ;BE3B7{KWzJ-`Tn~f`9?Qj8~2^N8{Oc8J%57{==w%rS#;nOCp*nTr@iZ1 |
46 | - uint64_t hcr_el2 = arm_hcr_el2_eff(env); | 483 | zb+?i;JLQUJ=O0?8*>S~D)a>NF1~WVB6^~_B#yhJ`H+JU@=6aXs`?Yv)J2h=N?drcS |
47 | + bool el1 = arm_current_el(env) == 1; | 484 | zeLZ*n<<Bm^n}6`jfBx#u8&(W}1?)}iF9o#mZ~E2+zwdn7yK3AbIzKnxpZ>JRPm3~# |
48 | + uint64_t hcr_el2 = el1 ? arm_hcr_el2_eff(env) : 0; | 485 | z&ICS{+_OayRW-l=Mtk=~uaS3o8z<_udd|(wqg`&JnVPfCe>BUOO`Su3e>pff_^UW% |
49 | uint64_t ret = 0; | 486 | z&JE^NO`)=Amg~iqRB1pPscP?(>#ZuY8GHCmlEvD$9g3%4Db~Dfz2SATnddvrR-Oe^ |
50 | - bool allow_virt = (arm_current_el(env) == 1 && | 487 | z;s;dJec!hnzi)ri^I6YN9vtkm{^TdUF8h7gX8-<Qe4p)GQ=)AtYx2VcwdLVAEXEjG |
51 | - (!arm_is_secure_below_el3(env) || | 488 | z^Mj|UHPqkj-LsWuzQem1>F3atdZn=zv3$#RmZzSHN+6-yyU#8cJb=YDilX&sl}vNm |
52 | - (env->cp15.scr_el3 & SCR_EEL2))); | 489 | znkgAR^O<3kj4if>{ly5fwRfMWuC5=lrlvKPX~i#654Cp}R_d*JS$9laZ$ra6)<ns8 |
53 | 490 | zFZy28G%xP(nit&F>LDi%G<tIc=TY=gl$jSD&Uv!Yat~XR46h%rI$!}a%!|xG7u8Zn | |
54 | - if (allow_virt && (hcr_el2 & HCR_IMO)) { | 491 | zeY8_|n=K>xz_v_W8VX$W-Fg-qFWcT}7MCyz{%%{ia7hZ>Law-k6NOr}VI&_48U=2l |
55 | + if (hcr_el2 & HCR_IMO) { | 492 | zwqDKFE8eTwwozDdms#e?x?5a|v>&JF;2_v0L~z5n%BYU^52<*cWuD4|GYUm@1+?)) |
56 | if (cs->interrupt_request & CPU_INTERRUPT_VIRQ) { | 493 | zte^45>Rz)t*<T5V#={r>@t@{%?^i#W{i=HAZ*Dc9y59Va-+#P!jrGs;u38a{fLr`N |
57 | ret |= CPSR_I; | 494 | zvT@rUu>DljxJ?^&Z?-?vyJn3C>3D=qux{Y*bs5|5n)Qmi$TD^Zdn4GU$ocJS2Hh-< |
58 | } | 495 | z`xPI^^+v0nUVdjMos8k`WGl7hA`{03ju%<lrgAHSpd^DRf-*}_#Ly0mB!LSfVgWcQ |
59 | @@ -XXX,XX +XXX,XX @@ static uint64_t isr_read(CPUARMState *env, const ARMCPRegInfo *ri) | 496 | z&T$@~G9)JI=hz5m0vkrel+Xy{Oh7pkAu-V!j*W7rY(bO}Q$nMH2`FbGB&N)QaV4<4 |
60 | } | 497 | zo)~9JXiP9=;}NPl<C@MmXG&;XFlFNrsyfFsonxFSp<}vEgsRSQP3O3#b6nSnP}ON_ |
61 | } | 498 | zI!#Tdsp~|j>ckUB>FI=~GokB5sOq#dotCE4(sd$KbtW~PNlj-`*NIToiD#j5J#9^= |
62 | 499 | zt?NXn>YUJYPG~wObe#xQos*i*NloXZt`niEb4t@WrRki~bs|)CI+{*L)9L6s5vn>< | |
63 | - if (allow_virt && (hcr_el2 & HCR_FMO)) { | 500 | zn$DD_Go|Z9sOn5>I@6lYw5}7Os&iV?Ij!lO)^#FOb!If38BJ$K*NIToIiu;E(R9w} |
64 | + if (hcr_el2 & HCR_FMO) { | 501 | zIuWWmPiZ<&X*y5oIuWWmF_XaEC!a&Jn$B5WCqh-{X-(&8P3LJ{Cqh-{8P3dyPr@^t |
65 | if (cs->interrupt_request & CPU_INTERRUPT_VFIQ) { | 502 | zSqL9?X9Uwd3W@23*s~h*tj0X6GZCuHa~kuU#yqDp5vt7d8uPryJg+kms?5hU=3^T3 |
66 | ret |= CPSR_F; | 503 | zF`bD}WnSP+=`t5MQ$FJ_2&Q~+BP6E0f^%BVIW6a$o)e+SX~IDBih-7z6{O~7YTy`& |
67 | } | 504 | zLjy&Cv?7QikV#>n0>>@MV8oK`Gmun34-FKdlm-J8SZSaNlnhir4-FI{S|bfqV8e)V |
505 | zss<{chX#reE#g=hsKAC%sF6d-Km}BWs!kZFsFpKfpbC@>6rprQGEjt4Ck#|zITHq| | ||
506 | zK*>M_l;<P^MJRQ`Kn0dFVW0|>3{*fllMEE0)CmI>Sk8ojDo`>|0p(0GP=xY&!axO< | ||
507 | zGhv_#lnhirIg<<&q0|Wj6<E%MfhtfkPyyvkGEjt4Ck#|zITHq|K*>M_lrzad5lWpf | ||
508 | zP=V!47^ngz0~JutBm+e#b;3XemNQ|X3X}{~Ksl2P6rt1!0~J`#gn=qhGEf2KOfpb} | ||
509 | zQYQ>lU^x>8szAv=1(Y+%KoLrvFi?TzOc<yFB?A>u&LjgxD0RX>1(q{mpbC@>R6seC | ||
510 | z3>2Z%2?G^a&V+#~P%=;f<xDbAgi<FARA4z12C6{GKn0XD$v_cGoiI>=<xCi;0wn_# | ||
511 | zP|hR+MJRQ`Kn0dFVW0|>3{*fllMEE0)CmI>Sk8ojDo`>|0p(0GP=rz^3{+q_69%e4 | ||
512 | z$v_2^Gs!>^N}VuJf#pmXr~)Me6;RG314Srx!axxz28u{EP=u<1B2)}iVZuNaCK;&0 | ||
513 | zBm-5LFi?dF167!0pbC==RAItE6($T+VUmF=Ofpb~2?JG_Fi?d_2C6X0Kouqo6p_5T | ||
514 | zFi=FeV!SiSKoR0H$dH(_Z(*Q_WZ%L-5y`$K14StNmJAdjmWs}HV4<vU_xO+1efmLq | ||
515 | zZ;W>N_U)fP6Qy6Nw5mbt9Y(#emWSi66=>tq#xoh#Ue=0qyhxi8ZOUe5y0V7VfPUhp | ||
516 | zwX=;ymc+i5%sg9Ja~lZ&8oAV@mHc>&CHP9v4R(jhtT?un;O4e9#pno)Xkh7OWgK&a | ||
517 | zyj=3Iv0OuoK_;5rOr5f(Kb~ZXDBO+V`OWYo#_C08imwChQxnjdd?wZLDou8aj;$SD | ||
518 | zGDYiA3<$Tu<JnHL(KPOChi#zrR32t83}naR$+ym4P_h?z_5#|cW-nw$XD_sOtE62l | ||
519 | zrD3@*)NVyiklt0&yF9%+klsBey&I<Y2E<!f(E8TuJte)z(|ZHyy<^gQVfx}=`q&B5 | ||
520 | z7nSryp1wGczIaUfVwiq$Fn#<4=@*ssi#+|}K>EdF(l3VTOM~ghPLRH&q%ZOGrGfON | ||
521 | zW73zx^yR_y<0nX8R??Sw`tm^f@-gYlNFSp|*<gA{q?Zp5Oe-+l#rmyYmKozi9y=P> | ||
522 | zVReJU*h=ZuVXiS$ohTbw-O#v9>(yZbGE|)?8(H1ZIKvV!jWa0>vy!3eMA^vdhQ>`s | ||
523 | zuMSg{q3T50$m)j1!HixV<}X9liL#N^4c*tL^y)CF8LCc{jjV3yKAqL8!%SzWI#H%q | ||
524 | z=bSrQ&)%JCRttF5g4Zf`6l?y@>PzD7MA^D>wBlcH6r1ucwJ<p0O%rZ?JzIY3-QdmZ | ||
525 | zzs|n>`a5r3e|z)wcUaqS>nqFQ-8x}eCF4u`OWUxqst-@1rSmUs%WmKP5e0dcb?e2N | ||
526 | z;Z|x*!);VwF|Yuhqs^khqOM!@u*jY!WYldISF(V6`BoNd&6Qfk3>X#SuD^7J>p_D= | ||
527 | zBPa51y^_n#=cpOt#Zf$ya$Ae9Mfz56n|<i!a=ELS@)%a{^NIH3SDuN<R~sah1km#P | ||
528 | zU@?*f%<rG=4W1wgfi;C?_n|W@%lm$&8YfvNOJodIg&IcIpIJQRHr<+ej11GQ6)&eF | ||
529 | z2Lam*jIH}#y0>KnY%4JQfOYS$*uU%f#@$U6`N8I3N-lV?5ErFCdv~xDmu2(wexld4 | ||
530 | z4v^;aVAT2k6GJ^m*FD(Wqc(Qg^)6a<?}h$zLoj}4;PP!+(O{@!a1y-hoAhF_7!z+6 | ||
531 | zslpAmNtYbjHrw-~#SPVk_FUf>-Obg6yV`8o$8_`PyJe_;bY5_EMBfBfWU!Q=*9HsG | ||
532 | z%_Cda{@_Krr!oHVhv9+y+T5qR8zZ2aZ>5r!$*|f$^U%yBUYfR&B!+EYy_PwL!BeUi | ||
533 | zJH^}r3r9Q+B)X@Z)fk=P13w&7x#wBtXTZ)g>WITPg5r&pQc!nmyrmk#S(>>b9xnNr | ||
534 | zx_b#v9Xv-Y><Wb%?S^0Xe&<)bbKl_=Z|3C$tf|F<bYzE*mfHB;uC)`q-?buaBe?l? | ||
535 | zcLTpK*k<49Z32`K?|nSBMFqxTK^_IE-li2fEGdK~(ZdoKBl6ab4a;Hler#`xvEXJG | ||
536 | zb?<E%EZExfX>jcOVhS*0rS~RS1dA#xhkv@Nct@#q?LyeKS<$uFec!bw>{@uu$gZ6a | ||
537 | zyVen1i{1BKd%~`D7|m$;U0a<I*3I7%^N%N%lGYdU_GS!gaR8T$NA@GzFi~z`l7hdl | ||
538 | zarZy6590|88pi(1zq;V(>38zM0sT&<zX;R5$1w3;`_JMG`;&I&0Y23DMx1%@(w(R9 | ||
539 | z4M$j;D5J+Gy%fijRQsctzFKf&cv|BAz#YLq3CZJWDdtL4u1u1|mkdcUp7|sxJC+?Y | ||
540 | z_@@s`v3j}Q7*z>6X~cwUxUL8G1KT)_XTp!KAbs;vCp{K3&~_X@+ew=-D}v`2MbFV0 | ||
541 | zQsVsL=rXi-pI*G|iiz;VTCutgUs)hDzV1+4?8KcoP3xROf<M%qC6lgVdpFt4<-|uM | ||
542 | z=#rl_b1#YjSIl6Toj2z_hOZcKupkdE(LozC(fN=FY(x|sk)ym|;Rq2E1xJWD%Z!ol | ||
543 | Gu>S+TT-130 | ||
544 | |||
545 | literal 0 | ||
546 | HcmV?d00001 | ||
547 | |||
548 | diff --git a/tests/data/acpi/q35/VIOT.viot b/tests/data/acpi/q35/VIOT.viot | ||
549 | index XXXXXXX..XXXXXXX 100644 | ||
550 | GIT binary patch | ||
551 | literal 112 | ||
552 | zcmWIZ^baXu00LVle`k+i1*eDrX9XZ&1PX!JAex!M0Hgv8m>C3sGzdcgBZCA3T-xBj | ||
553 | Q0Zb)W9Hva*zW_`e0M!8s0RR91 | ||
554 | |||
555 | literal 0 | ||
556 | HcmV?d00001 | ||
557 | |||
68 | -- | 558 | -- |
69 | 2.20.1 | 559 | 2.25.1 |
70 | 560 | ||
71 | 561 | diff view generated by jsdifflib |
1 | From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 1 | From: Jean-Philippe Brucker <jean-philippe@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | With the ARMv8.4-SEL2 extension, EL2 is a legal exception level in | 3 | The VIOT blob contains the following: |
4 | secure mode, though it can only be AArch64. | ||
5 | 4 | ||
6 | This patch adds the target EL for exceptions from 64-bit S-EL2. | 5 | [000h 0000 4] Signature : "VIOT" [Virtual I/O Translation Table] |
6 | [004h 0004 4] Table Length : 00000058 | ||
7 | [008h 0008 1] Revision : 00 | ||
8 | [009h 0009 1] Checksum : 66 | ||
9 | [00Ah 0010 6] Oem ID : "BOCHS " | ||
10 | [010h 0016 8] Oem Table ID : "BXPC " | ||
11 | [018h 0024 4] Oem Revision : 00000001 | ||
12 | [01Ch 0028 4] Asl Compiler ID : "BXPC" | ||
13 | [020h 0032 4] Asl Compiler Revision : 00000001 | ||
7 | 14 | ||
8 | It also fixes the target EL to EL2 when HCR.{A,F,I}MO are set in secure | 15 | [024h 0036 2] Node count : 0002 |
9 | mode. Those values were never used in practice as the effective value of | 16 | [026h 0038 2] Node offset : 0030 |
10 | HCR was always 0 in secure mode. | 17 | [028h 0040 8] Reserved : 0000000000000000 |
11 | 18 | ||
12 | Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com> | 19 | [030h 0048 1] Type : 03 [VirtIO-PCI IOMMU] |
13 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 20 | [031h 0049 1] Reserved : 00 |
14 | Message-id: 20210112104511.36576-7-remi.denis.courmont@huawei.com | 21 | [032h 0050 2] Length : 0010 |
22 | |||
23 | [034h 0052 2] PCI Segment : 0000 | ||
24 | [036h 0054 2] PCI BDF number : 0008 | ||
25 | [038h 0056 8] Reserved : 0000000000000000 | ||
26 | |||
27 | [040h 0064 1] Type : 01 [PCI Range] | ||
28 | [041h 0065 1] Reserved : 00 | ||
29 | [042h 0066 2] Length : 0018 | ||
30 | |||
31 | [044h 0068 4] Endpoint start : 00000000 | ||
32 | [048h 0072 2] PCI Segment start : 0000 | ||
33 | [04Ah 0074 2] PCI Segment end : 0000 | ||
34 | [04Ch 0076 2] PCI BDF start : 0000 | ||
35 | [04Eh 0078 2] PCI BDF end : 00FF | ||
36 | [050h 0080 2] Output node : 0030 | ||
37 | [052h 0082 6] Reserved : 000000000000 | ||
38 | |||
39 | Acked-by: Ani Sinha <ani@anisinha.ca> | ||
40 | Reviewed-by: Eric Auger <eric.auger@redhat.com> | ||
41 | Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org> | ||
42 | Message-id: 20211210170415.583179-9-jean-philippe@linaro.org | ||
15 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 43 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
16 | --- | 44 | --- |
17 | target/arm/helper.c | 10 +++++----- | 45 | tests/qtest/bios-tables-test-allowed-diff.h | 1 - |
18 | target/arm/op_helper.c | 4 ++-- | 46 | tests/data/acpi/virt/VIOT | Bin 0 -> 88 bytes |
19 | 2 files changed, 7 insertions(+), 7 deletions(-) | 47 | 2 files changed, 1 deletion(-) |
20 | 48 | ||
21 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 49 | diff --git a/tests/qtest/bios-tables-test-allowed-diff.h b/tests/qtest/bios-tables-test-allowed-diff.h |
22 | index XXXXXXX..XXXXXXX 100644 | 50 | index XXXXXXX..XXXXXXX 100644 |
23 | --- a/target/arm/helper.c | 51 | --- a/tests/qtest/bios-tables-test-allowed-diff.h |
24 | +++ b/target/arm/helper.c | 52 | +++ b/tests/qtest/bios-tables-test-allowed-diff.h |
25 | @@ -XXX,XX +XXX,XX @@ static const int8_t target_el_table[2][2][2][2][2][4] = { | 53 | @@ -1,2 +1 @@ |
26 | {{/* 0 1 1 0 */{ 3, 3, 3, -1 },{ 3, -1, -1, 3 },}, | 54 | /* List of comma-separated changed AML files to ignore */ |
27 | {/* 0 1 1 1 */{ 3, 3, 3, -1 },{ 3, -1, -1, 3 },},},},}, | 55 | -"tests/data/acpi/virt/VIOT", |
28 | {{{{/* 1 0 0 0 */{ 1, 1, 2, -1 },{ 1, 1, -1, 1 },}, | 56 | diff --git a/tests/data/acpi/virt/VIOT b/tests/data/acpi/virt/VIOT |
29 | - {/* 1 0 0 1 */{ 2, 2, 2, -1 },{ 1, 1, -1, 1 },},}, | ||
30 | - {{/* 1 0 1 0 */{ 1, 1, 1, -1 },{ 1, 1, -1, 1 },}, | ||
31 | - {/* 1 0 1 1 */{ 2, 2, 2, -1 },{ 1, 1, -1, 1 },},},}, | ||
32 | + {/* 1 0 0 1 */{ 2, 2, 2, -1 },{ 2, 2, -1, 1 },},}, | ||
33 | + {{/* 1 0 1 0 */{ 1, 1, 1, -1 },{ 1, 1, 1, 1 },}, | ||
34 | + {/* 1 0 1 1 */{ 2, 2, 2, -1 },{ 2, 2, 2, 1 },},},}, | ||
35 | {{{/* 1 1 0 0 */{ 3, 3, 3, -1 },{ 3, 3, -1, 3 },}, | ||
36 | {/* 1 1 0 1 */{ 3, 3, 3, -1 },{ 3, 3, -1, 3 },},}, | ||
37 | - {{/* 1 1 1 0 */{ 3, 3, 3, -1 },{ 3, 3, -1, 3 },}, | ||
38 | - {/* 1 1 1 1 */{ 3, 3, 3, -1 },{ 3, 3, -1, 3 },},},},}, | ||
39 | + {{/* 1 1 1 0 */{ 3, 3, 3, -1 },{ 3, 3, 3, 3 },}, | ||
40 | + {/* 1 1 1 1 */{ 3, 3, 3, -1 },{ 3, 3, 3, 3 },},},},}, | ||
41 | }; | ||
42 | |||
43 | /* | ||
44 | diff --git a/target/arm/op_helper.c b/target/arm/op_helper.c | ||
45 | index XXXXXXX..XXXXXXX 100644 | 57 | index XXXXXXX..XXXXXXX 100644 |
46 | --- a/target/arm/op_helper.c | 58 | GIT binary patch |
47 | +++ b/target/arm/op_helper.c | 59 | literal 88 |
48 | @@ -XXX,XX +XXX,XX @@ void HELPER(access_check_cp_reg)(CPUARMState *env, void *rip, uint32_t syndrome, | 60 | zcmWIZ^bd((0D?3pe`k+i1*eDrX9XZ&1PX!JAexE60Hgv8m>C3sGzXN&z`)2L0cSHX |
49 | target_el = exception_target_el(env); | 61 | I{D-Rq0Q5fy0RR91 |
50 | break; | 62 | |
51 | case CP_ACCESS_TRAP_EL2: | 63 | literal 0 |
52 | - /* Requesting a trap to EL2 when we're in EL3 or S-EL0/1 is | 64 | HcmV?d00001 |
53 | + /* Requesting a trap to EL2 when we're in EL3 is | 65 | |
54 | * a bug in the access function. | ||
55 | */ | ||
56 | - assert(!arm_is_secure(env) && arm_current_el(env) != 3); | ||
57 | + assert(arm_current_el(env) != 3); | ||
58 | target_el = 2; | ||
59 | break; | ||
60 | case CP_ACCESS_TRAP_EL3: | ||
61 | -- | 66 | -- |
62 | 2.20.1 | 67 | 2.25.1 |
63 | 68 | ||
64 | 69 | diff view generated by jsdifflib |