1
Arm pullreq: Rémi's ARMv8.4-SEL2 support is the big thing here.
1
Hi; here's the first target-arm pullreq for the 7.0 cycle.
2
2
3
thanks
3
thanks
4
-- PMM
4
-- PMM
5
5
6
The following changes since commit f1fcb6851aba6dd9838886dc179717a11e344a1c:
6
The following changes since commit 76b56fdfc9fa43ec6e5986aee33f108c6c6a511e:
7
7
8
Merge remote-tracking branch 'remotes/huth-gitlab/tags/pull-request-2021-01-19' into staging (2021-01-19 11:57:07 +0000)
8
Merge tag 'block-pull-request' of https://gitlab.com/stefanha/qemu into staging (2021-12-14 12:46:18 -0800)
9
9
10
are available in the Git repository at:
10
are available in the Git repository at:
11
11
12
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20210119
12
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20211215
13
13
14
for you to fetch changes up to 6d39956891b3d1857af84f72f0230a6d99eb3b6a:
14
for you to fetch changes up to aed176558806674d030a8305d989d4e6a5073359:
15
15
16
docs: Build and install all the docs in a single manual (2021-01-19 14:38:53 +0000)
16
tests/acpi: add expected blob for VIOT test on virt machine (2021-12-15 10:35:26 +0000)
17
17
18
----------------------------------------------------------------
18
----------------------------------------------------------------
19
target-arm queue:
19
target-arm queue:
20
* Implement IMPDEF pauth algorithm
20
* ITS: error reporting cleanup
21
* Support ARMv8.4-SEL2
21
* aspeed: improve documentation
22
* Fix bug where we were truncating predicate vector lengths in SVE insns
22
* Fix STM32F2XX USART data register readout
23
* Implement new pvpanic-pci device
23
* allow emulated GICv3 to be disabled in non-TCG builds
24
* npcm7xx_adc-test: Fix memleak in adc_qom_set
24
* fix exception priority for singlestep, misaligned PC, bp, etc
25
* target/arm/m_helper: Silence GCC 10 maybe-uninitialized error
25
* Correct calculation of tlb range invalidate length
26
* docs: Build and install all the docs in a single manual
26
* npcm7xx_emc: fix missing queue_flush
27
* virt: Add VIOT ACPI table for virtio-iommu
28
* target/i386: Use assert() to sanity-check b1 in SSE decode
29
* Don't include qemu-common unnecessarily
27
30
28
----------------------------------------------------------------
31
----------------------------------------------------------------
29
Gan Qixin (1):
32
Alex Bennée (1):
30
npcm7xx_adc-test: Fix memleak in adc_qom_set
33
hw/intc: clean-up error reporting for failed ITS cmd
31
34
32
Mihai Carabas (4):
35
Jean-Philippe Brucker (8):
33
hw/misc/pvpanic: split-out generic and bus dependent code
36
hw/arm/virt-acpi-build: Add VIOT table for virtio-iommu
34
hw/misc/pvpanic: add PCI interface support
37
hw/arm/virt: Remove device tree restriction for virtio-iommu
35
pvpanic : update pvpanic spec document
38
hw/arm/virt: Reject instantiation of multiple IOMMUs
36
tests/qtest: add a test case for pvpanic-pci
39
hw/arm/virt: Use object_property_set instead of qdev_prop_set
40
tests/acpi: allow updates of VIOT expected data files
41
tests/acpi: add test case for VIOT
42
tests/acpi: add expected blobs for VIOT test on q35 machine
43
tests/acpi: add expected blob for VIOT test on virt machine
37
44
38
Peter Maydell (1):
45
Joel Stanley (4):
39
docs: Build and install all the docs in a single manual
46
docs: aspeed: Add new boards
47
docs: aspeed: Update OpenBMC image URL
48
docs: aspeed: Give an example of booting a kernel
49
docs: aspeed: ADC is now modelled
40
50
41
Philippe Mathieu-Daudé (1):
51
Olivier Hériveaux (1):
42
target/arm/m_helper: Silence GCC 10 maybe-uninitialized error
52
Fix STM32F2XX USART data register readout
43
53
44
Richard Henderson (7):
54
Patrick Venture (1):
45
target/arm: Implement an IMPDEF pauth algorithm
55
hw/net: npcm7xx_emc fix missing queue_flush
46
target/arm: Add cpu properties to control pauth
47
target/arm: Use object_property_add_bool for "sve" property
48
target/arm: Introduce PREDDESC field definitions
49
target/arm: Update PFIRST, PNEXT for pred_desc
50
target/arm: Update ZIP, UZP, TRN for pred_desc
51
target/arm: Update REV, PUNPK for pred_desc
52
56
53
Rémi Denis-Courmont (19):
57
Peter Maydell (6):
54
target/arm: remove redundant tests
58
target/i386: Use assert() to sanity-check b1 in SSE decode
55
target/arm: add arm_is_el2_enabled() helper
59
include/hw/i386: Don't include qemu-common.h in .h files
56
target/arm: use arm_is_el2_enabled() where applicable
60
target/hexagon/cpu.h: don't include qemu-common.h
57
target/arm: use arm_hcr_el2_eff() where applicable
61
target/rx/cpu.h: Don't include qemu-common.h
58
target/arm: factor MDCR_EL2 common handling
62
hw/arm: Don't include qemu-common.h unnecessarily
59
target/arm: Define isar_feature function to test for presence of SEL2
63
target/arm: Correct calculation of tlb range invalidate length
60
target/arm: add 64-bit S-EL2 to EL exception table
61
target/arm: add MMU stage 1 for Secure EL2
62
target/arm: add ARMv8.4-SEL2 system registers
63
target/arm: handle VMID change in secure state
64
target/arm: do S1_ptw_translate() before address space lookup
65
target/arm: translate NS bit in page-walks
66
target/arm: generalize 2-stage page-walk condition
67
target/arm: secure stage 2 translation regime
68
target/arm: set HPFAR_EL2.NS on secure stage 2 faults
69
target/arm: revector to run-time pick target EL
70
target/arm: Implement SCR_EL2.EEL2
71
target/arm: enable Secure EL2 in max CPU
72
target/arm: refactor vae1_tlbmask()
73
64
74
docs/conf.py | 46 ++++-
65
Philippe Mathieu-Daudé (2):
75
docs/devel/conf.py | 15 --
66
hw/intc/arm_gicv3: Extract gicv3_set_gicv3state from arm_gicv3_cpuif.c
76
docs/index.html.in | 17 --
67
hw/intc/arm_gicv3: Introduce CONFIG_ARM_GIC_TCG Kconfig selector
77
docs/interop/conf.py | 28 ---
78
docs/meson.build | 64 +++---
79
docs/specs/conf.py | 16 --
80
docs/specs/pci-ids.txt | 1 +
81
docs/specs/pvpanic.txt | 13 +-
82
docs/system/arm/cpu-features.rst | 21 ++
83
docs/system/conf.py | 28 ---
84
docs/tools/conf.py | 37 ----
85
docs/user/conf.py | 15 --
86
include/hw/misc/pvpanic.h | 24 ++-
87
include/hw/pci/pci.h | 1 +
88
include/qemu/xxhash.h | 98 +++++++++
89
target/arm/cpu-param.h | 2 +-
90
target/arm/cpu.h | 107 ++++++++--
91
target/arm/internals.h | 45 +++++
92
hw/misc/pvpanic-isa.c | 94 +++++++++
93
hw/misc/pvpanic-pci.c | 95 +++++++++
94
hw/misc/pvpanic.c | 85 +-------
95
target/arm/cpu.c | 23 ++-
96
target/arm/cpu64.c | 65 ++++--
97
target/arm/helper-a64.c | 8 +-
98
target/arm/helper.c | 414 ++++++++++++++++++++++++++-------------
99
target/arm/m_helper.c | 2 +-
100
target/arm/monitor.c | 1 +
101
target/arm/op_helper.c | 4 +-
102
target/arm/pauth_helper.c | 27 ++-
103
target/arm/sve_helper.c | 33 ++--
104
target/arm/tlb_helper.c | 3 +
105
target/arm/translate-a64.c | 4 +
106
target/arm/translate-sve.c | 31 ++-
107
target/arm/translate.c | 36 +++-
108
tests/qtest/arm-cpu-features.c | 13 ++
109
tests/qtest/npcm7xx_adc-test.c | 1 +
110
tests/qtest/pvpanic-pci-test.c | 62 ++++++
111
.gitlab-ci.yml | 4 +-
112
hw/i386/Kconfig | 2 +-
113
hw/misc/Kconfig | 12 +-
114
hw/misc/meson.build | 4 +-
115
tests/qtest/meson.build | 3 +-
116
42 files changed, 1080 insertions(+), 524 deletions(-)
117
delete mode 100644 docs/devel/conf.py
118
delete mode 100644 docs/index.html.in
119
delete mode 100644 docs/interop/conf.py
120
delete mode 100644 docs/specs/conf.py
121
delete mode 100644 docs/system/conf.py
122
delete mode 100644 docs/tools/conf.py
123
delete mode 100644 docs/user/conf.py
124
create mode 100644 hw/misc/pvpanic-isa.c
125
create mode 100644 hw/misc/pvpanic-pci.c
126
create mode 100644 tests/qtest/pvpanic-pci-test.c
127
68
69
Richard Henderson (10):
70
target/arm: Hoist pc_next to a local variable in aarch64_tr_translate_insn
71
target/arm: Hoist pc_next to a local variable in arm_tr_translate_insn
72
target/arm: Hoist pc_next to a local variable in thumb_tr_translate_insn
73
target/arm: Split arm_pre_translate_insn
74
target/arm: Advance pc for arch single-step exception
75
target/arm: Split compute_fsr_fsc out of arm_deliver_fault
76
target/arm: Take an exception if PC is misaligned
77
target/arm: Assert thumb pc is aligned
78
target/arm: Suppress bp for exceptions with more priority
79
tests/tcg: Add arm and aarch64 pc alignment tests
80
81
docs/system/arm/aspeed.rst | 26 ++++++++++++----
82
include/hw/i386/microvm.h | 1 -
83
include/hw/i386/x86.h | 1 -
84
target/arm/helper.h | 1 +
85
target/arm/syndrome.h | 5 +++
86
target/hexagon/cpu.h | 1 -
87
target/rx/cpu.h | 1 -
88
hw/arm/boot.c | 1 -
89
hw/arm/digic_boards.c | 1 -
90
hw/arm/highbank.c | 1 -
91
hw/arm/npcm7xx_boards.c | 1 -
92
hw/arm/sbsa-ref.c | 1 -
93
hw/arm/stm32f405_soc.c | 1 -
94
hw/arm/vexpress.c | 1 -
95
hw/arm/virt-acpi-build.c | 7 +++++
96
hw/arm/virt.c | 21 ++++++-------
97
hw/char/stm32f2xx_usart.c | 3 +-
98
hw/intc/arm_gicv3.c | 2 +-
99
hw/intc/arm_gicv3_cpuif.c | 10 +-----
100
hw/intc/arm_gicv3_cpuif_common.c | 22 +++++++++++++
101
hw/intc/arm_gicv3_its.c | 39 +++++++++++++++--------
102
hw/net/npcm7xx_emc.c | 18 +++++------
103
hw/virtio/virtio-iommu-pci.c | 12 ++------
104
linux-user/aarch64/cpu_loop.c | 46 ++++++++++++++++------------
105
linux-user/hexagon/cpu_loop.c | 1 +
106
target/arm/debug_helper.c | 23 ++++++++++++++
107
target/arm/gdbstub.c | 9 ++++--
108
target/arm/helper.c | 6 ++--
109
target/arm/machine.c | 10 ++++++
110
target/arm/tlb_helper.c | 63 ++++++++++++++++++++++++++++----------
111
target/arm/translate-a64.c | 23 ++++++++++++--
112
target/arm/translate.c | 58 ++++++++++++++++++++++++++---------
113
target/i386/tcg/translate.c | 12 ++------
114
tests/qtest/bios-tables-test.c | 38 +++++++++++++++++++++++
115
tests/tcg/aarch64/pcalign-a64.c | 37 ++++++++++++++++++++++
116
tests/tcg/arm/pcalign-a32.c | 46 ++++++++++++++++++++++++++++
117
hw/arm/Kconfig | 1 +
118
hw/intc/Kconfig | 5 +++
119
hw/intc/meson.build | 11 ++++---
120
tests/data/acpi/q35/DSDT.viot | Bin 0 -> 9398 bytes
121
tests/data/acpi/q35/VIOT.viot | Bin 0 -> 112 bytes
122
tests/data/acpi/virt/VIOT | Bin 0 -> 88 bytes
123
tests/tcg/aarch64/Makefile.target | 4 +--
124
tests/tcg/arm/Makefile.target | 4 +++
125
44 files changed, 429 insertions(+), 145 deletions(-)
126
create mode 100644 hw/intc/arm_gicv3_cpuif_common.c
127
create mode 100644 tests/tcg/aarch64/pcalign-a64.c
128
create mode 100644 tests/tcg/arm/pcalign-a32.c
129
create mode 100644 tests/data/acpi/q35/DSDT.viot
130
create mode 100644 tests/data/acpi/q35/VIOT.viot
131
create mode 100644 tests/data/acpi/virt/VIOT
132
diff view generated by jsdifflib
1
From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
1
From: Alex Bennée <alex.bennee@linaro.org>
2
2
3
Do not assume that EL2 is available in and only in non-secure context.
3
While trying to debug a GIC ITS failure I saw some guest errors that
4
That equivalence is broken by ARMv8.4-SEL2.
4
had poor formatting as well as leaving me confused as to what failed.
5
As most of the checks aren't possible without a valid dte split that
6
check apart and then check the other conditions in steps. This avoids
7
us relying on undefined data.
5
8
6
Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
9
I still get a failure with the current kvm-unit-tests but at least I
7
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
10
know (partially) why now:
8
Message-id: 20210112104511.36576-3-remi.denis.courmont@huawei.com
11
12
Exception return from AArch64 EL1 to AArch64 EL1 PC 0x40080588
13
PASS: gicv3: its-trigger: inv/invall: dev2/eventid=20 now triggers an LPI
14
ITS: MAPD devid=2 size = 0x8 itt=0x40430000 valid=0
15
INT dev_id=2 event_id=20
16
process_its_cmd: invalid command attributes: invalid dte: 0 for 2 (MEM_TX: 0)
17
PASS: gicv3: its-trigger: mapd valid=false: no LPI after device unmap
18
SUMMARY: 6 tests, 1 unexpected failures
19
20
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
21
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
22
Message-id: 20211112170454.3158925-1-alex.bennee@linaro.org
23
Cc: Shashi Mallela <shashi.mallela@linaro.org>
24
Cc: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
25
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
26
---
11
target/arm/cpu.h | 4 ++--
27
hw/intc/arm_gicv3_its.c | 39 +++++++++++++++++++++++++++------------
12
target/arm/helper-a64.c | 8 +-------
28
1 file changed, 27 insertions(+), 12 deletions(-)
13
target/arm/helper.c | 33 +++++++++++++--------------------
14
3 files changed, 16 insertions(+), 29 deletions(-)
15
29
16
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
30
diff --git a/hw/intc/arm_gicv3_its.c b/hw/intc/arm_gicv3_its.c
17
index XXXXXXX..XXXXXXX 100644
31
index XXXXXXX..XXXXXXX 100644
18
--- a/target/arm/cpu.h
32
--- a/hw/intc/arm_gicv3_its.c
19
+++ b/target/arm/cpu.h
33
+++ b/hw/intc/arm_gicv3_its.c
20
@@ -XXX,XX +XXX,XX @@ static inline bool arm_el_is_aa64(CPUARMState *env, int el)
34
@@ -XXX,XX +XXX,XX @@ static bool process_its_cmd(GICv3ITSState *s, uint64_t value, uint32_t offset,
21
return aa64;
35
if (res != MEMTX_OK) {
36
return result;
37
}
38
+ } else {
39
+ qemu_log_mask(LOG_GUEST_ERROR,
40
+ "%s: invalid command attributes: "
41
+ "invalid dte: %"PRIx64" for %d (MEM_TX: %d)\n",
42
+ __func__, dte, devid, res);
43
+ return result;
22
}
44
}
23
45
24
- if (arm_feature(env, ARM_FEATURE_EL2) && !arm_is_secure_below_el3(env)) {
46
- if ((devid > s->dt.maxids.max_devids) || !dte_valid || !ite_valid ||
25
+ if (arm_is_el2_enabled(env)) {
47
- !cte_valid || (eventid > max_eventid)) {
26
aa64 = aa64 && (env->cp15.hcr_el2 & HCR_RW);
48
+
27
}
49
+ /*
28
50
+ * In this implementation, in case of guest errors we ignore the
29
@@ -XXX,XX +XXX,XX @@ static inline int arm_debug_target_el(CPUARMState *env)
51
+ * command and move onto the next command in the queue.
30
bool secure = arm_is_secure(env);
52
+ */
31
bool route_to_el2 = false;
53
+ if (devid > s->dt.maxids.max_devids) {
32
54
qemu_log_mask(LOG_GUEST_ERROR,
33
- if (arm_feature(env, ARM_FEATURE_EL2) && !secure) {
55
- "%s: invalid command attributes "
34
+ if (arm_is_el2_enabled(env)) {
56
- "devid %d or eventid %d or invalid dte %d or"
35
route_to_el2 = env->cp15.hcr_el2 & HCR_TGE ||
57
- "invalid cte %d or invalid ite %d\n",
36
env->cp15.mdcr_el2 & MDCR_TDE;
58
- __func__, devid, eventid, dte_valid, cte_valid,
37
}
59
- ite_valid);
38
diff --git a/target/arm/helper-a64.c b/target/arm/helper-a64.c
60
- /*
39
index XXXXXXX..XXXXXXX 100644
61
- * in this implementation, in case of error
40
--- a/target/arm/helper-a64.c
62
- * we ignore this command and move onto the next
41
+++ b/target/arm/helper-a64.c
63
- * command in the queue
42
@@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc)
64
- */
43
if (new_el == -1) {
65
+ "%s: invalid command attributes: devid %d>%d",
44
goto illegal_return;
66
+ __func__, devid, s->dt.maxids.max_devids);
45
}
67
+
46
- if (new_el > cur_el
68
+ } else if (!dte_valid || !ite_valid || !cte_valid) {
47
- || (new_el == 2 && !arm_feature(env, ARM_FEATURE_EL2))) {
69
+ qemu_log_mask(LOG_GUEST_ERROR,
48
+ if (new_el > cur_el || (new_el == 2 && !arm_is_el2_enabled(env))) {
70
+ "%s: invalid command attributes: "
49
/* Disallow return to an EL which is unimplemented or higher
71
+ "dte: %s, ite: %s, cte: %s\n",
50
* than the current one.
72
+ __func__,
51
*/
73
+ dte_valid ? "valid" : "invalid",
52
@@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc)
74
+ ite_valid ? "valid" : "invalid",
53
goto illegal_return;
75
+ cte_valid ? "valid" : "invalid");
54
}
76
+ } else if (eventid > max_eventid) {
55
77
+ qemu_log_mask(LOG_GUEST_ERROR,
56
- if (new_el == 2 && arm_is_secure_below_el3(env)) {
78
+ "%s: invalid command attributes: eventid %d > %d\n",
57
- /* Return to the non-existent secure-EL2 */
79
+ __func__, eventid, max_eventid);
58
- goto illegal_return;
80
} else {
59
- }
60
-
61
if (new_el == 1 && (arm_hcr_el2_eff(env) & HCR_TGE)) {
62
goto illegal_return;
63
}
64
diff --git a/target/arm/helper.c b/target/arm/helper.c
65
index XXXXXXX..XXXXXXX 100644
66
--- a/target/arm/helper.c
67
+++ b/target/arm/helper.c
68
@@ -XXX,XX +XXX,XX @@ static CPAccessResult cpacr_access(CPUARMState *env, const ARMCPRegInfo *ri,
69
{
70
if (arm_feature(env, ARM_FEATURE_V8)) {
71
/* Check if CPACR accesses are to be trapped to EL2 */
72
- if (arm_current_el(env) == 1 &&
73
- (env->cp15.cptr_el[2] & CPTR_TCPAC) && !arm_is_secure(env)) {
74
+ if (arm_current_el(env) == 1 && arm_is_el2_enabled(env) &&
75
+ (env->cp15.cptr_el[2] & CPTR_TCPAC)) {
76
return CP_ACCESS_TRAP_EL2;
77
/* Check if CPACR accesses are to be trapped to EL3 */
78
} else if (arm_current_el(env) < 3 &&
79
@@ -XXX,XX +XXX,XX @@ static CPAccessResult gt_counter_access(CPUARMState *env, int timeridx,
80
bool isread)
81
{
82
unsigned int cur_el = arm_current_el(env);
83
- bool secure = arm_is_secure(env);
84
+ bool has_el2 = arm_is_el2_enabled(env);
85
uint64_t hcr = arm_hcr_el2_eff(env);
86
87
switch (cur_el) {
88
@@ -XXX,XX +XXX,XX @@ static CPAccessResult gt_counter_access(CPUARMState *env, int timeridx,
89
}
90
} else {
91
/* If HCR_EL2.<E2H> == 0: check CNTHCTL_EL2.EL1PCEN. */
92
- if (arm_feature(env, ARM_FEATURE_EL2) &&
93
- timeridx == GTIMER_PHYS && !secure &&
94
+ if (has_el2 && timeridx == GTIMER_PHYS &&
95
!extract32(env->cp15.cnthctl_el2, 1, 1)) {
96
return CP_ACCESS_TRAP_EL2;
97
}
98
@@ -XXX,XX +XXX,XX @@ static CPAccessResult gt_counter_access(CPUARMState *env, int timeridx,
99
100
case 1:
101
/* Check CNTHCTL_EL2.EL1PCTEN, which changes location based on E2H. */
102
- if (arm_feature(env, ARM_FEATURE_EL2) &&
103
- timeridx == GTIMER_PHYS && !secure &&
104
+ if (has_el2 && timeridx == GTIMER_PHYS &&
105
(hcr & HCR_E2H
106
? !extract32(env->cp15.cnthctl_el2, 10, 1)
107
: !extract32(env->cp15.cnthctl_el2, 0, 1))) {
108
@@ -XXX,XX +XXX,XX @@ static CPAccessResult gt_timer_access(CPUARMState *env, int timeridx,
109
bool isread)
110
{
111
unsigned int cur_el = arm_current_el(env);
112
- bool secure = arm_is_secure(env);
113
+ bool has_el2 = arm_is_el2_enabled(env);
114
uint64_t hcr = arm_hcr_el2_eff(env);
115
116
switch (cur_el) {
117
@@ -XXX,XX +XXX,XX @@ static CPAccessResult gt_timer_access(CPUARMState *env, int timeridx,
118
/* fall through */
119
120
case 1:
121
- if (arm_feature(env, ARM_FEATURE_EL2) &&
122
- timeridx == GTIMER_PHYS && !secure) {
123
+ if (has_el2 && timeridx == GTIMER_PHYS) {
124
if (hcr & HCR_E2H) {
125
/* If HCR_EL2.<E2H,TGE> == '10': check CNTHCTL_EL2.EL1PTEN. */
126
if (!extract32(env->cp15.cnthctl_el2, 11, 1)) {
127
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo strongarm_cp_reginfo[] = {
128
129
static uint64_t midr_read(CPUARMState *env, const ARMCPRegInfo *ri)
130
{
131
- ARMCPU *cpu = env_archcpu(env);
132
unsigned int cur_el = arm_current_el(env);
133
- bool secure = arm_is_secure(env);
134
135
- if (arm_feature(&cpu->env, ARM_FEATURE_EL2) && !secure && cur_el == 1) {
136
+ if (arm_is_el2_enabled(env) && cur_el == 1) {
137
return env->cp15.vpidr_el2;
138
}
139
return raw_read(env, ri);
140
@@ -XXX,XX +XXX,XX @@ static uint64_t mpidr_read_val(CPUARMState *env)
141
static uint64_t mpidr_read(CPUARMState *env, const ARMCPRegInfo *ri)
142
{
143
unsigned int cur_el = arm_current_el(env);
144
- bool secure = arm_is_secure(env);
145
146
- if (arm_feature(env, ARM_FEATURE_EL2) && !secure && cur_el == 1) {
147
+ if (arm_is_el2_enabled(env) && cur_el == 1) {
148
return env->cp15.vmpidr_el2;
149
}
150
return mpidr_read_val(env);
151
@@ -XXX,XX +XXX,XX @@ uint64_t arm_hcr_el2_eff(CPUARMState *env)
152
{
153
uint64_t ret = env->cp15.hcr_el2;
154
155
- if (arm_is_secure_below_el3(env)) {
156
+ if (!arm_is_el2_enabled(env)) {
157
/*
81
/*
158
* "This register has no effect if EL2 is not enabled in the
82
* Current implementation only supports rdbase == procnum
159
* current Security state". This is ARMv8.4-SecEL2 speak for
160
@@ -XXX,XX +XXX,XX @@ int sve_exception_el(CPUARMState *env, int el)
161
/* CPTR_EL2. Since TZ and TFP are positive,
162
* they will be zero when EL2 is not present.
163
*/
164
- if (el <= 2 && !arm_is_secure_below_el3(env)) {
165
+ if (el <= 2 && arm_is_el2_enabled(env)) {
166
if (env->cp15.cptr_el[2] & CPTR_TZ) {
167
return 2;
168
}
169
@@ -XXX,XX +XXX,XX @@ static int bad_mode_switch(CPUARMState *env, int mode, CPSRWriteType write_type)
170
}
171
return 0;
172
case ARM_CPU_MODE_HYP:
173
- return !arm_feature(env, ARM_FEATURE_EL2)
174
- || arm_current_el(env) < 2 || arm_is_secure_below_el3(env);
175
+ return !arm_is_el2_enabled(env) || arm_current_el(env) < 2;
176
case ARM_CPU_MODE_MON:
177
return arm_current_el(env) < 3;
178
default:
179
@@ -XXX,XX +XXX,XX @@ int fp_exception_el(CPUARMState *env, int cur_el)
180
181
/* CPTR_EL2 : present in v7VE or v8 */
182
if (cur_el <= 2 && extract32(env->cp15.cptr_el[2], 10, 1)
183
- && !arm_is_secure_below_el3(env)) {
184
+ && arm_is_el2_enabled(env)) {
185
/* Trap FP ops at EL2, NS-EL1 or NS-EL0 to EL2 */
186
return 2;
187
}
188
--
83
--
189
2.20.1
84
2.25.1
190
85
191
86
diff view generated by jsdifflib
1
From: Gan Qixin <ganqixin@huawei.com>
1
From: Joel Stanley <joel@jms.id.au>
2
2
3
The adc_qom_set function didn't free "response", which caused an indirect
3
Add X11, FP5280G2, G220A, Rainier and Fuji. Mention that Swift will be
4
memory leak. So use qobject_unref() to fix it.
4
removed in v7.0.
5
5
6
ASAN shows memory leak stack:
6
Signed-off-by: Joel Stanley <joel@jms.id.au>
7
7
Reviewed-by: Cédric Le Goater <clg@kaod.org>
8
Indirect leak of 593280 byte(s) in 144 object(s) allocated from:
8
Message-id: 20211117065752.330632-2-joel@jms.id.au
9
#0 0x7f9a5e7e8d4e in __interceptor_calloc (/lib64/libasan.so.5+0x112d4e)
10
#1 0x7f9a5e607a50 in g_malloc0 (/lib64/libglib-2.0.so.0+0x55a50)
11
#2 0x55b1bebf636b in qdict_new ../qobject/qdict.c:30
12
#3 0x55b1bec09699 in parse_object ../qobject/json-parser.c:318
13
#4 0x55b1bec0b2df in parse_value ../qobject/json-parser.c:546
14
#5 0x55b1bec0b6a9 in json_parser_parse ../qobject/json-parser.c:580
15
#6 0x55b1bec060d1 in json_message_process_token ../qobject/json-streamer.c:92
16
#7 0x55b1bec16a12 in json_lexer_feed_char ../qobject/json-lexer.c:313
17
#8 0x55b1bec16fbd in json_lexer_feed ../qobject/json-lexer.c:350
18
#9 0x55b1bec06453 in json_message_parser_feed ../qobject/json-streamer.c:121
19
#10 0x55b1bebc2d51 in qmp_fd_receive ../tests/qtest/libqtest.c:614
20
#11 0x55b1bebc2f5e in qtest_qmp_receive_dict ../tests/qtest/libqtest.c:636
21
#12 0x55b1bebc2e6c in qtest_qmp_receive ../tests/qtest/libqtest.c:624
22
#13 0x55b1bebc3340 in qtest_vqmp ../tests/qtest/libqtest.c:715
23
#14 0x55b1bebc3942 in qtest_qmp ../tests/qtest/libqtest.c:756
24
#15 0x55b1bebbd64a in adc_qom_set ../tests/qtest/npcm7xx_adc-test.c:127
25
#16 0x55b1bebbd793 in adc_write_input ../tests/qtest/npcm7xx_adc-test.c:140
26
#17 0x55b1bebbdf92 in test_convert_external ../tests/qtest/npcm7xx_adc-test.c:246
27
28
Reported-by: Euler Robot <euler.robot@huawei.com>
29
Signed-off-by: Gan Qixin <ganqixin@huawei.com>
30
Reviewed-by: Hao Wu <wuhaotsh@google.com>
31
Message-id: 20210118065627.79903-1-ganqixin@huawei.com
32
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
33
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
34
---
10
---
35
tests/qtest/npcm7xx_adc-test.c | 1 +
11
docs/system/arm/aspeed.rst | 7 ++++++-
36
1 file changed, 1 insertion(+)
12
1 file changed, 6 insertions(+), 1 deletion(-)
37
13
38
diff --git a/tests/qtest/npcm7xx_adc-test.c b/tests/qtest/npcm7xx_adc-test.c
14
diff --git a/docs/system/arm/aspeed.rst b/docs/system/arm/aspeed.rst
39
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
40
--- a/tests/qtest/npcm7xx_adc-test.c
16
--- a/docs/system/arm/aspeed.rst
41
+++ b/tests/qtest/npcm7xx_adc-test.c
17
+++ b/docs/system/arm/aspeed.rst
42
@@ -XXX,XX +XXX,XX @@ static void adc_qom_set(QTestState *qts, const ADC *adc,
18
@@ -XXX,XX +XXX,XX @@ AST2400 SoC based machines :
43
path, name, value);
19
44
/* The qom set message returns successfully. */
20
- ``palmetto-bmc`` OpenPOWER Palmetto POWER8 BMC
45
g_assert_true(qdict_haskey(response, "return"));
21
- ``quanta-q71l-bmc`` OpenBMC Quanta BMC
46
+ qobject_unref(response);
22
+- ``supermicrox11-bmc`` Supermicro X11 BMC
47
}
23
48
24
AST2500 SoC based machines :
49
static void adc_write_input(QTestState *qts, const ADC *adc,
25
26
@@ -XXX,XX +XXX,XX @@ AST2500 SoC based machines :
27
- ``romulus-bmc`` OpenPOWER Romulus POWER9 BMC
28
- ``witherspoon-bmc`` OpenPOWER Witherspoon POWER9 BMC
29
- ``sonorapass-bmc`` OCP SonoraPass BMC
30
-- ``swift-bmc`` OpenPOWER Swift BMC POWER9
31
+- ``swift-bmc`` OpenPOWER Swift BMC POWER9 (to be removed in v7.0)
32
+- ``fp5280g2-bmc`` Inspur FP5280G2 BMC
33
+- ``g220a-bmc`` Bytedance G220A BMC
34
35
AST2600 SoC based machines :
36
37
- ``ast2600-evb`` Aspeed AST2600 Evaluation board (Cortex-A7)
38
- ``tacoma-bmc`` OpenPOWER Witherspoon POWER9 AST2600 BMC
39
+- ``rainier-bmc`` IBM Rainier POWER10 BMC
40
+- ``fuji-bmc`` Facebook Fuji BMC
41
42
Supported devices
43
-----------------
50
--
44
--
51
2.20.1
45
2.25.1
52
46
53
47
diff view generated by jsdifflib
1
From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
1
From: Joel Stanley <joel@jms.id.au>
2
2
3
Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
3
This is the latest URL for the OpenBMC CI. The old URL still works, but
4
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
4
redirects.
5
Message-id: 20210112104511.36576-19-remi.denis.courmont@huawei.com
5
6
Reviewed-by: Cédric Le Goater <clg@kaod.org>
7
Signed-off-by: Joel Stanley <joel@jms.id.au>
8
Message-id: 20211117065752.330632-3-joel@jms.id.au
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
---
10
---
8
target/arm/helper.c | 25 +++++++++++--------------
11
docs/system/arm/aspeed.rst | 2 +-
9
1 file changed, 11 insertions(+), 14 deletions(-)
12
1 file changed, 1 insertion(+), 1 deletion(-)
10
13
11
diff --git a/target/arm/helper.c b/target/arm/helper.c
14
diff --git a/docs/system/arm/aspeed.rst b/docs/system/arm/aspeed.rst
12
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
13
--- a/target/arm/helper.c
16
--- a/docs/system/arm/aspeed.rst
14
+++ b/target/arm/helper.c
17
+++ b/docs/system/arm/aspeed.rst
15
@@ -XXX,XX +XXX,XX @@ static CPAccessResult aa64_cacheop_pou_access(CPUARMState *env,
18
@@ -XXX,XX +XXX,XX @@ The Aspeed machines can be started using the ``-kernel`` option to
16
static int vae1_tlbmask(CPUARMState *env)
19
load a Linux kernel or from a firmware. Images can be downloaded from
17
{
20
the OpenBMC jenkins :
18
uint64_t hcr = arm_hcr_el2_eff(env);
21
19
+ uint16_t mask;
22
- https://jenkins.openbmc.org/job/ci-openbmc/lastSuccessfulBuild/distro=ubuntu,label=docker-builder
20
23
+ https://jenkins.openbmc.org/job/ci-openbmc/lastSuccessfulBuild/
21
if ((hcr & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE)) {
24
22
- uint16_t mask = ARMMMUIdxBit_E20_2 |
25
or directly from the OpenBMC GitHub release repository :
23
- ARMMMUIdxBit_E20_2_PAN |
26
24
- ARMMMUIdxBit_E20_0;
25
-
26
- if (arm_is_secure_below_el3(env)) {
27
- mask >>= ARM_MMU_IDX_A_NS;
28
- }
29
-
30
- return mask;
31
- } else if (arm_is_secure_below_el3(env)) {
32
- return ARMMMUIdxBit_SE10_1 |
33
- ARMMMUIdxBit_SE10_1_PAN |
34
- ARMMMUIdxBit_SE10_0;
35
+ mask = ARMMMUIdxBit_E20_2 |
36
+ ARMMMUIdxBit_E20_2_PAN |
37
+ ARMMMUIdxBit_E20_0;
38
} else {
39
- return ARMMMUIdxBit_E10_1 |
40
+ mask = ARMMMUIdxBit_E10_1 |
41
ARMMMUIdxBit_E10_1_PAN |
42
ARMMMUIdxBit_E10_0;
43
}
44
+
45
+ if (arm_is_secure_below_el3(env)) {
46
+ mask >>= ARM_MMU_IDX_A_NS;
47
+ }
48
+
49
+ return mask;
50
}
51
52
/* Return 56 if TBI is enabled, 64 otherwise. */
53
--
27
--
54
2.20.1
28
2.25.1
55
29
56
30
diff view generated by jsdifflib
1
From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
1
From: Joel Stanley <joel@jms.id.au>
2
2
3
Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
3
A common use case for the ASPEED machine is to boot a Linux kernel.
4
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
4
Provide a full example command line.
5
Message-id: 20210112104511.36576-18-remi.denis.courmont@huawei.com
5
6
Reviewed-by: Cédric Le Goater <clg@kaod.org>
7
Signed-off-by: Joel Stanley <joel@jms.id.au>
8
Message-id: 20211117065752.330632-4-joel@jms.id.au
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
---
10
---
8
target/arm/cpu64.c | 1 +
11
docs/system/arm/aspeed.rst | 15 ++++++++++++---
9
1 file changed, 1 insertion(+)
12
1 file changed, 12 insertions(+), 3 deletions(-)
10
13
11
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
14
diff --git a/docs/system/arm/aspeed.rst b/docs/system/arm/aspeed.rst
12
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
13
--- a/target/arm/cpu64.c
16
--- a/docs/system/arm/aspeed.rst
14
+++ b/target/arm/cpu64.c
17
+++ b/docs/system/arm/aspeed.rst
15
@@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj)
18
@@ -XXX,XX +XXX,XX @@ Missing devices
16
t = FIELD_DP64(t, ID_AA64PFR0, SVE, 1);
19
Boot options
17
t = FIELD_DP64(t, ID_AA64PFR0, FP, 1);
20
------------
18
t = FIELD_DP64(t, ID_AA64PFR0, ADVSIMD, 1);
21
19
+ t = FIELD_DP64(t, ID_AA64PFR0, SEL2, 1);
22
-The Aspeed machines can be started using the ``-kernel`` option to
20
cpu->isar.id_aa64pfr0 = t;
23
-load a Linux kernel or from a firmware. Images can be downloaded from
21
24
-the OpenBMC jenkins :
22
t = cpu->isar.id_aa64pfr1;
25
+The Aspeed machines can be started using the ``-kernel`` and ``-dtb`` options
26
+to load a Linux kernel or from a firmware. Images can be downloaded from the
27
+OpenBMC jenkins :
28
29
https://jenkins.openbmc.org/job/ci-openbmc/lastSuccessfulBuild/
30
31
@@ -XXX,XX +XXX,XX @@ or directly from the OpenBMC GitHub release repository :
32
33
https://github.com/openbmc/openbmc/releases
34
35
+To boot a kernel directly from a Linux build tree:
36
+
37
+.. code-block:: bash
38
+
39
+ $ qemu-system-arm -M ast2600-evb -nographic \
40
+ -kernel arch/arm/boot/zImage \
41
+ -dtb arch/arm/boot/dts/aspeed-ast2600-evb.dtb \
42
+ -initrd rootfs.cpio
43
+
44
The image should be attached as an MTD drive. Run :
45
46
.. code-block:: bash
23
--
47
--
24
2.20.1
48
2.25.1
25
49
26
50
diff view generated by jsdifflib
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
1
From: Joel Stanley <joel@jms.id.au>
2
2
3
When building with GCC 10.2 configured with --extra-cflags=-Os, we get:
3
Move it to the supported list.
4
4
5
target/arm/m_helper.c: In function ‘arm_v7m_cpu_do_interrupt’:
5
Signed-off-by: Joel Stanley <joel@jms.id.au>
6
target/arm/m_helper.c:1811:16: error: ‘restore_s16_s31’ may be used uninitialized in this function [-Werror=maybe-uninitialized]
6
Message-id: 20211117065752.330632-5-joel@jms.id.au
7
1811 | if (restore_s16_s31) {
8
| ^
9
target/arm/m_helper.c:1350:10: note: ‘restore_s16_s31’ was declared here
10
1350 | bool restore_s16_s31;
11
| ^~~~~~~~~~~~~~~
12
cc1: all warnings being treated as errors
13
14
Initialize the 'restore_s16_s31' variable to silence the warning.
15
16
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
17
Message-id: 20210119062739.589049-1-f4bug@amsat.org
18
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
19
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
20
---
8
---
21
target/arm/m_helper.c | 2 +-
9
docs/system/arm/aspeed.rst | 2 +-
22
1 file changed, 1 insertion(+), 1 deletion(-)
10
1 file changed, 1 insertion(+), 1 deletion(-)
23
11
24
diff --git a/target/arm/m_helper.c b/target/arm/m_helper.c
12
diff --git a/docs/system/arm/aspeed.rst b/docs/system/arm/aspeed.rst
25
index XXXXXXX..XXXXXXX 100644
13
index XXXXXXX..XXXXXXX 100644
26
--- a/target/arm/m_helper.c
14
--- a/docs/system/arm/aspeed.rst
27
+++ b/target/arm/m_helper.c
15
+++ b/docs/system/arm/aspeed.rst
28
@@ -XXX,XX +XXX,XX @@ static void do_v7m_exception_exit(ARMCPU *cpu)
16
@@ -XXX,XX +XXX,XX @@ Supported devices
29
bool exc_secure = false;
17
* Front LEDs (PCA9552 on I2C bus)
30
bool return_to_secure;
18
* LPC Peripheral Controller (a subset of subdevices are supported)
31
bool ftype;
19
* Hash/Crypto Engine (HACE) - Hash support only. TODO: HMAC and RSA
32
- bool restore_s16_s31;
20
+ * ADC
33
+ bool restore_s16_s31 = false;
21
34
22
35
/*
23
Missing devices
36
* If we're not in Handler mode then jumps to magic exception-exit
24
---------------
25
26
* Coprocessor support
27
- * ADC (out of tree implementation)
28
* PWM and Fan Controller
29
* Slave GPIO Controller
30
* Super I/O Controller
37
--
31
--
38
2.20.1
32
2.25.1
39
33
40
34
diff view generated by jsdifflib
1
From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
1
From: Olivier Hériveaux <olivier.heriveaux@ledger.fr>
2
2
3
Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
3
Fix issue where the data register may be overwritten by next character
4
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
4
reception before being read and returned.
5
Message-id: 20210112104511.36576-14-remi.denis.courmont@huawei.com
5
6
Signed-off-by: Olivier Hériveaux <olivier.heriveaux@ledger.fr>
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
9
Message-id: 20211128120723.4053-1-olivier.heriveaux@ledger.fr
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
---
11
---
8
target/arm/cpu.h | 6 +++-
12
hw/char/stm32f2xx_usart.c | 3 ++-
9
target/arm/internals.h | 22 ++++++++++++
13
1 file changed, 2 insertions(+), 1 deletion(-)
10
target/arm/helper.c | 78 +++++++++++++++++++++++++++++-------------
11
3 files changed, 81 insertions(+), 25 deletions(-)
12
14
13
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
15
diff --git a/hw/char/stm32f2xx_usart.c b/hw/char/stm32f2xx_usart.c
14
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
15
--- a/target/arm/cpu.h
17
--- a/hw/char/stm32f2xx_usart.c
16
+++ b/target/arm/cpu.h
18
+++ b/hw/char/stm32f2xx_usart.c
17
@@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdx {
19
@@ -XXX,XX +XXX,XX @@ static uint64_t stm32f2xx_usart_read(void *opaque, hwaddr addr,
18
ARMMMUIdx_Stage1_E0 = 0 | ARM_MMU_IDX_NOTLB,
20
return retvalue;
19
ARMMMUIdx_Stage1_E1 = 1 | ARM_MMU_IDX_NOTLB,
21
case USART_DR:
20
ARMMMUIdx_Stage1_E1_PAN = 2 | ARM_MMU_IDX_NOTLB,
22
DB_PRINT("Value: 0x%" PRIx32 ", %c\n", s->usart_dr, (char) s->usart_dr);
21
+ ARMMMUIdx_Stage1_SE0 = 3 | ARM_MMU_IDX_NOTLB,
23
+ retvalue = s->usart_dr & 0x3FF;
22
+ ARMMMUIdx_Stage1_SE1 = 4 | ARM_MMU_IDX_NOTLB,
24
s->usart_sr &= ~USART_SR_RXNE;
23
+ ARMMMUIdx_Stage1_SE1_PAN = 5 | ARM_MMU_IDX_NOTLB,
25
qemu_chr_fe_accept_input(&s->chr);
24
/*
26
qemu_set_irq(s->irq, 0);
25
* Not allocated a TLB: used only for second stage of an S12 page
27
- return s->usart_dr & 0x3FF;
26
* table walk, or for descriptor loads during first stage of an S1
28
+ return retvalue;
27
@@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdx {
29
case USART_BRR:
28
* then various TLB flush insns which currently are no-ops or flush
30
return s->usart_brr;
29
* only stage 1 MMU indexes will need to change to flush stage 2.
31
case USART_CR1:
30
*/
31
- ARMMMUIdx_Stage2 = 3 | ARM_MMU_IDX_NOTLB,
32
+ ARMMMUIdx_Stage2 = 6 | ARM_MMU_IDX_NOTLB,
33
+ ARMMMUIdx_Stage2_S = 7 | ARM_MMU_IDX_NOTLB,
34
35
/*
36
* M-profile.
37
diff --git a/target/arm/internals.h b/target/arm/internals.h
38
index XXXXXXX..XXXXXXX 100644
39
--- a/target/arm/internals.h
40
+++ b/target/arm/internals.h
41
@@ -XXX,XX +XXX,XX @@ static inline bool regime_has_2_ranges(ARMMMUIdx mmu_idx)
42
case ARMMMUIdx_Stage1_E0:
43
case ARMMMUIdx_Stage1_E1:
44
case ARMMMUIdx_Stage1_E1_PAN:
45
+ case ARMMMUIdx_Stage1_SE0:
46
+ case ARMMMUIdx_Stage1_SE1:
47
+ case ARMMMUIdx_Stage1_SE1_PAN:
48
case ARMMMUIdx_E10_0:
49
case ARMMMUIdx_E10_1:
50
case ARMMMUIdx_E10_1_PAN:
51
@@ -XXX,XX +XXX,XX @@ static inline bool regime_is_secure(CPUARMState *env, ARMMMUIdx mmu_idx)
52
case ARMMMUIdx_SE20_0:
53
case ARMMMUIdx_SE20_2:
54
case ARMMMUIdx_SE20_2_PAN:
55
+ case ARMMMUIdx_Stage1_SE0:
56
+ case ARMMMUIdx_Stage1_SE1:
57
+ case ARMMMUIdx_Stage1_SE1_PAN:
58
case ARMMMUIdx_SE2:
59
+ case ARMMMUIdx_Stage2_S:
60
case ARMMMUIdx_MSPrivNegPri:
61
case ARMMMUIdx_MSUserNegPri:
62
case ARMMMUIdx_MSPriv:
63
@@ -XXX,XX +XXX,XX @@ static inline bool regime_is_pan(CPUARMState *env, ARMMMUIdx mmu_idx)
64
{
65
switch (mmu_idx) {
66
case ARMMMUIdx_Stage1_E1_PAN:
67
+ case ARMMMUIdx_Stage1_SE1_PAN:
68
case ARMMMUIdx_E10_1_PAN:
69
case ARMMMUIdx_E20_2_PAN:
70
case ARMMMUIdx_SE10_1_PAN:
71
@@ -XXX,XX +XXX,XX @@ static inline uint32_t regime_el(CPUARMState *env, ARMMMUIdx mmu_idx)
72
case ARMMMUIdx_E20_2:
73
case ARMMMUIdx_E20_2_PAN:
74
case ARMMMUIdx_Stage2:
75
+ case ARMMMUIdx_Stage2_S:
76
case ARMMMUIdx_SE2:
77
case ARMMMUIdx_E2:
78
return 2;
79
case ARMMMUIdx_SE3:
80
return 3;
81
case ARMMMUIdx_SE10_0:
82
+ case ARMMMUIdx_Stage1_SE0:
83
return arm_el_is_aa64(env, 3) ? 1 : 3;
84
case ARMMMUIdx_SE10_1:
85
case ARMMMUIdx_SE10_1_PAN:
86
case ARMMMUIdx_Stage1_E0:
87
case ARMMMUIdx_Stage1_E1:
88
case ARMMMUIdx_Stage1_E1_PAN:
89
+ case ARMMMUIdx_Stage1_SE1:
90
+ case ARMMMUIdx_Stage1_SE1_PAN:
91
case ARMMMUIdx_E10_0:
92
case ARMMMUIdx_E10_1:
93
case ARMMMUIdx_E10_1_PAN:
94
@@ -XXX,XX +XXX,XX @@ static inline TCR *regime_tcr(CPUARMState *env, ARMMMUIdx mmu_idx)
95
if (mmu_idx == ARMMMUIdx_Stage2) {
96
return &env->cp15.vtcr_el2;
97
}
98
+ if (mmu_idx == ARMMMUIdx_Stage2_S) {
99
+ /*
100
+ * Note: Secure stage 2 nominally shares fields from VTCR_EL2, but
101
+ * those are not currently used by QEMU, so just return VSTCR_EL2.
102
+ */
103
+ return &env->cp15.vstcr_el2;
104
+ }
105
return &env->cp15.tcr_el[regime_el(env, mmu_idx)];
106
}
107
108
@@ -XXX,XX +XXX,XX @@ static inline bool arm_mmu_idx_is_stage1_of_2(ARMMMUIdx mmu_idx)
109
case ARMMMUIdx_Stage1_E0:
110
case ARMMMUIdx_Stage1_E1:
111
case ARMMMUIdx_Stage1_E1_PAN:
112
+ case ARMMMUIdx_Stage1_SE0:
113
+ case ARMMMUIdx_Stage1_SE1:
114
+ case ARMMMUIdx_Stage1_SE1_PAN:
115
return true;
116
default:
117
return false;
118
diff --git a/target/arm/helper.c b/target/arm/helper.c
119
index XXXXXXX..XXXXXXX 100644
120
--- a/target/arm/helper.c
121
+++ b/target/arm/helper.c
122
@@ -XXX,XX +XXX,XX @@ static uint64_t do_ats_write(CPUARMState *env, uint64_t value,
123
uint32_t syn, fsr, fsc;
124
bool take_exc = false;
125
126
- if (fi.s1ptw && current_el == 1 && !arm_is_secure(env)
127
+ if (fi.s1ptw && current_el == 1
128
&& arm_mmu_idx_is_stage1_of_2(mmu_idx)) {
129
/*
130
* Synchronous stage 2 fault on an access made as part of the
131
@@ -XXX,XX +XXX,XX @@ static void ats_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value)
132
/* fall through */
133
case 1:
134
if (ri->crm == 9 && (env->uncached_cpsr & CPSR_PAN)) {
135
- mmu_idx = (secure ? ARMMMUIdx_SE10_1_PAN
136
+ mmu_idx = (secure ? ARMMMUIdx_Stage1_SE1_PAN
137
: ARMMMUIdx_Stage1_E1_PAN);
138
} else {
139
- mmu_idx = secure ? ARMMMUIdx_SE10_1 : ARMMMUIdx_Stage1_E1;
140
+ mmu_idx = secure ? ARMMMUIdx_Stage1_SE1 : ARMMMUIdx_Stage1_E1;
141
}
142
break;
143
default:
144
@@ -XXX,XX +XXX,XX @@ static void ats_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value)
145
mmu_idx = ARMMMUIdx_SE10_0;
146
break;
147
case 2:
148
+ g_assert(!secure); /* ARMv8.4-SecEL2 is 64-bit only */
149
mmu_idx = ARMMMUIdx_Stage1_E0;
150
break;
151
case 1:
152
- mmu_idx = secure ? ARMMMUIdx_SE10_0 : ARMMMUIdx_Stage1_E0;
153
+ mmu_idx = secure ? ARMMMUIdx_Stage1_SE0 : ARMMMUIdx_Stage1_E0;
154
break;
155
default:
156
g_assert_not_reached();
157
@@ -XXX,XX +XXX,XX @@ static void ats_write64(CPUARMState *env, const ARMCPRegInfo *ri,
158
switch (ri->opc1) {
159
case 0: /* AT S1E1R, AT S1E1W, AT S1E1RP, AT S1E1WP */
160
if (ri->crm == 9 && (env->pstate & PSTATE_PAN)) {
161
- mmu_idx = (secure ? ARMMMUIdx_SE10_1_PAN
162
+ mmu_idx = (secure ? ARMMMUIdx_Stage1_SE1_PAN
163
: ARMMMUIdx_Stage1_E1_PAN);
164
} else {
165
- mmu_idx = secure ? ARMMMUIdx_SE10_1 : ARMMMUIdx_Stage1_E1;
166
+ mmu_idx = secure ? ARMMMUIdx_Stage1_SE1 : ARMMMUIdx_Stage1_E1;
167
}
168
break;
169
case 4: /* AT S1E2R, AT S1E2W */
170
@@ -XXX,XX +XXX,XX @@ static void ats_write64(CPUARMState *env, const ARMCPRegInfo *ri,
171
}
172
break;
173
case 2: /* AT S1E0R, AT S1E0W */
174
- mmu_idx = secure ? ARMMMUIdx_SE10_0 : ARMMMUIdx_Stage1_E0;
175
+ mmu_idx = secure ? ARMMMUIdx_Stage1_SE0 : ARMMMUIdx_Stage1_E0;
176
break;
177
case 4: /* AT S12E1R, AT S12E1W */
178
mmu_idx = secure ? ARMMMUIdx_SE10_1 : ARMMMUIdx_E10_1;
179
@@ -XXX,XX +XXX,XX @@ static inline bool regime_translation_disabled(CPUARMState *env,
180
181
hcr_el2 = arm_hcr_el2_eff(env);
182
183
- if (mmu_idx == ARMMMUIdx_Stage2) {
184
+ if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) {
185
/* HCR.DC means HCR.VM behaves as 1 */
186
return (hcr_el2 & (HCR_DC | HCR_VM)) == 0;
187
}
188
@@ -XXX,XX +XXX,XX @@ static inline uint64_t regime_ttbr(CPUARMState *env, ARMMMUIdx mmu_idx,
189
if (mmu_idx == ARMMMUIdx_Stage2) {
190
return env->cp15.vttbr_el2;
191
}
192
+ if (mmu_idx == ARMMMUIdx_Stage2_S) {
193
+ return env->cp15.vsttbr_el2;
194
+ }
195
if (ttbrn == 0) {
196
return env->cp15.ttbr0_el[regime_el(env, mmu_idx)];
197
} else {
198
@@ -XXX,XX +XXX,XX @@ static inline uint64_t regime_ttbr(CPUARMState *env, ARMMMUIdx mmu_idx,
199
static inline ARMMMUIdx stage_1_mmu_idx(ARMMMUIdx mmu_idx)
200
{
201
switch (mmu_idx) {
202
+ case ARMMMUIdx_SE10_0:
203
+ return ARMMMUIdx_Stage1_SE0;
204
+ case ARMMMUIdx_SE10_1:
205
+ return ARMMMUIdx_Stage1_SE1;
206
+ case ARMMMUIdx_SE10_1_PAN:
207
+ return ARMMMUIdx_Stage1_SE1_PAN;
208
case ARMMMUIdx_E10_0:
209
return ARMMMUIdx_Stage1_E0;
210
case ARMMMUIdx_E10_1:
211
@@ -XXX,XX +XXX,XX @@ static inline bool regime_is_user(CPUARMState *env, ARMMMUIdx mmu_idx)
212
case ARMMMUIdx_E20_0:
213
case ARMMMUIdx_SE20_0:
214
case ARMMMUIdx_Stage1_E0:
215
+ case ARMMMUIdx_Stage1_SE0:
216
case ARMMMUIdx_MUser:
217
case ARMMMUIdx_MSUser:
218
case ARMMMUIdx_MUserNegPri:
219
@@ -XXX,XX +XXX,XX @@ static int get_S1prot(CPUARMState *env, ARMMMUIdx mmu_idx, bool is_aa64,
220
int wxn = 0;
221
222
assert(mmu_idx != ARMMMUIdx_Stage2);
223
+ assert(mmu_idx != ARMMMUIdx_Stage2_S);
224
225
user_rw = simple_ap_to_rw_prot_is_user(ap, true);
226
if (is_user) {
227
@@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx,
228
hwaddr s2pa;
229
int s2prot;
230
int ret;
231
+ ARMMMUIdx s2_mmu_idx = *is_secure ? ARMMMUIdx_Stage2_S
232
+ : ARMMMUIdx_Stage2;
233
ARMCacheAttrs cacheattrs = {};
234
MemTxAttrs txattrs = {};
235
236
- assert(!*is_secure); /* TODO: S-EL2 */
237
-
238
- ret = get_phys_addr_lpae(env, addr, MMU_DATA_LOAD, ARMMMUIdx_Stage2,
239
- false,
240
+ ret = get_phys_addr_lpae(env, addr, MMU_DATA_LOAD, s2_mmu_idx, false,
241
&s2pa, &txattrs, &s2prot, &s2size, fi,
242
&cacheattrs);
243
if (ret) {
244
@@ -XXX,XX +XXX,XX @@ static int aa64_va_parameter_tbi(uint64_t tcr, ARMMMUIdx mmu_idx)
245
{
246
if (regime_has_2_ranges(mmu_idx)) {
247
return extract64(tcr, 37, 2);
248
- } else if (mmu_idx == ARMMMUIdx_Stage2) {
249
+ } else if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) {
250
return 0; /* VTCR_EL2 */
251
} else {
252
/* Replicate the single TBI bit so we always have 2 bits. */
253
@@ -XXX,XX +XXX,XX @@ static int aa64_va_parameter_tbid(uint64_t tcr, ARMMMUIdx mmu_idx)
254
{
255
if (regime_has_2_ranges(mmu_idx)) {
256
return extract64(tcr, 51, 2);
257
- } else if (mmu_idx == ARMMMUIdx_Stage2) {
258
+ } else if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) {
259
return 0; /* VTCR_EL2 */
260
} else {
261
/* Replicate the single TBID bit so we always have 2 bits. */
262
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
263
tsz = extract32(tcr, 0, 6);
264
using64k = extract32(tcr, 14, 1);
265
using16k = extract32(tcr, 15, 1);
266
- if (mmu_idx == ARMMMUIdx_Stage2) {
267
+ if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) {
268
/* VTCR_EL2 */
269
hpd = false;
270
} else {
271
@@ -XXX,XX +XXX,XX @@ static ARMVAParameters aa32_va_parameters(CPUARMState *env, uint32_t va,
272
int select, tsz;
273
bool epd, hpd;
274
275
+ assert(mmu_idx != ARMMMUIdx_Stage2_S);
276
+
277
if (mmu_idx == ARMMMUIdx_Stage2) {
278
/* VTCR */
279
bool sext = extract32(tcr, 4, 1);
280
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address,
281
goto do_fault;
282
}
283
284
- if (mmu_idx != ARMMMUIdx_Stage2) {
285
+ if (mmu_idx != ARMMMUIdx_Stage2 && mmu_idx != ARMMMUIdx_Stage2_S) {
286
/* The starting level depends on the virtual address size (which can
287
* be up to 48 bits) and the translation granule size. It indicates
288
* the number of strides (stride bits at a time) needed to
289
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address,
290
attrs = extract64(descriptor, 2, 10)
291
| (extract64(descriptor, 52, 12) << 10);
292
293
- if (mmu_idx == ARMMMUIdx_Stage2) {
294
+ if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) {
295
/* Stage 2 table descriptors do not include any attribute fields */
296
break;
297
}
298
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address,
299
300
ap = extract32(attrs, 4, 2);
301
302
- if (mmu_idx == ARMMMUIdx_Stage2) {
303
- ns = true;
304
+ if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) {
305
+ ns = mmu_idx == ARMMMUIdx_Stage2;
306
xn = extract32(attrs, 11, 2);
307
*prot = get_S2prot(env, ap, xn, s1_is_el0);
308
} else {
309
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address,
310
arm_tlb_bti_gp(txattrs) = true;
311
}
312
313
- if (mmu_idx == ARMMMUIdx_Stage2) {
314
+ if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) {
315
cacheattrs->attrs = convert_stage2_attrs(env, extract32(attrs, 0, 4));
316
} else {
317
/* Index into MAIR registers for cache attributes */
318
@@ -XXX,XX +XXX,XX @@ do_fault:
319
fi->type = fault_type;
320
fi->level = level;
321
/* Tag the error as S2 for failed S1 PTW at S2 or ordinary S2. */
322
- fi->stage2 = fi->s1ptw || (mmu_idx == ARMMMUIdx_Stage2);
323
+ fi->stage2 = fi->s1ptw || (mmu_idx == ARMMMUIdx_Stage2 ||
324
+ mmu_idx == ARMMMUIdx_Stage2_S);
325
return true;
326
}
327
328
@@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address,
329
int s2_prot;
330
int ret;
331
ARMCacheAttrs cacheattrs2 = {};
332
+ ARMMMUIdx s2_mmu_idx;
333
+ bool is_el0;
334
335
ret = get_phys_addr(env, address, access_type, s1_mmu_idx, &ipa,
336
attrs, prot, page_size, fi, cacheattrs);
337
@@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address,
338
return ret;
339
}
340
341
+ s2_mmu_idx = attrs->secure ? ARMMMUIdx_Stage2_S : ARMMMUIdx_Stage2;
342
+ is_el0 = mmu_idx == ARMMMUIdx_E10_0 || mmu_idx == ARMMMUIdx_SE10_0;
343
+
344
/* S1 is done. Now do S2 translation. */
345
- ret = get_phys_addr_lpae(env, ipa, access_type, ARMMMUIdx_Stage2,
346
- mmu_idx == ARMMMUIdx_E10_0,
347
+ ret = get_phys_addr_lpae(env, ipa, access_type, s2_mmu_idx, is_el0,
348
phys_ptr, attrs, &s2_prot,
349
page_size, fi, &cacheattrs2);
350
fi->s2addr = ipa;
351
@@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address,
352
cacheattrs->shareability = 0;
353
}
354
*cacheattrs = combine_cacheattrs(*cacheattrs, cacheattrs2);
355
+
356
+ /* Check if IPA translates to secure or non-secure PA space. */
357
+ if (arm_is_secure_below_el3(env)) {
358
+ if (attrs->secure) {
359
+ attrs->secure =
360
+ !(env->cp15.vstcr_el2.raw_tcr & (VSTCR_SA | VSTCR_SW));
361
+ } else {
362
+ attrs->secure =
363
+ !((env->cp15.vtcr_el2.raw_tcr & (VTCR_NSA | VTCR_NSW))
364
+ || (env->cp15.vstcr_el2.raw_tcr & VSTCR_SA));
365
+ }
366
+ }
367
return 0;
368
} else {
369
/*
370
@@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address,
371
* MMU disabled. S1 addresses within aa64 translation regimes are
372
* still checked for bounds -- see AArch64.TranslateAddressS1Off.
373
*/
374
- if (mmu_idx != ARMMMUIdx_Stage2) {
375
+ if (mmu_idx != ARMMMUIdx_Stage2 && mmu_idx != ARMMMUIdx_Stage2_S) {
376
int r_el = regime_el(env, mmu_idx);
377
if (arm_el_is_aa64(env, r_el)) {
378
int pamax = arm_pamax(env_archcpu(env));
379
--
32
--
380
2.20.1
33
2.25.1
381
34
382
35
diff view generated by jsdifflib
1
From: Mihai Carabas <mihai.carabas@oracle.com>
1
From: Philippe Mathieu-Daudé <philmd@redhat.com>
2
2
3
Add a test case for pvpanic-pci device. The scenario is the same as pvpapnic
3
gicv3_set_gicv3state() is used by arm_gicv3_common.c in
4
ISA device, but is using the PCI bus.
4
arm_gicv3_common_realize(). Since we want to restrict
5
arm_gicv3_cpuif.c to TCG, extract gicv3_set_gicv3state()
6
to a new file. Add this file to the meson 'specific'
7
source set, since it needs access to "cpu.h".
5
8
6
Signed-off-by: Mihai Carabas <mihai.carabas@oracle.com>
9
Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com>
7
Acked-by: Thomas Huth <thuth@redhat.com>
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
Message-id: 20211115223619.2599282-2-philmd@redhat.com
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
13
---
11
tests/qtest/pvpanic-pci-test.c | 62 ++++++++++++++++++++++++++++++++++
14
hw/intc/arm_gicv3_cpuif.c | 10 +---------
12
tests/qtest/meson.build | 1 +
15
hw/intc/arm_gicv3_cpuif_common.c | 22 ++++++++++++++++++++++
13
2 files changed, 63 insertions(+)
16
hw/intc/meson.build | 1 +
14
create mode 100644 tests/qtest/pvpanic-pci-test.c
17
3 files changed, 24 insertions(+), 9 deletions(-)
18
create mode 100644 hw/intc/arm_gicv3_cpuif_common.c
15
19
16
diff --git a/tests/qtest/pvpanic-pci-test.c b/tests/qtest/pvpanic-pci-test.c
20
diff --git a/hw/intc/arm_gicv3_cpuif.c b/hw/intc/arm_gicv3_cpuif.c
21
index XXXXXXX..XXXXXXX 100644
22
--- a/hw/intc/arm_gicv3_cpuif.c
23
+++ b/hw/intc/arm_gicv3_cpuif.c
24
@@ -XXX,XX +XXX,XX @@
25
/*
26
- * ARM Generic Interrupt Controller v3
27
+ * ARM Generic Interrupt Controller v3 (emulation)
28
*
29
* Copyright (c) 2016 Linaro Limited
30
* Written by Peter Maydell
31
@@ -XXX,XX +XXX,XX @@
32
#include "hw/irq.h"
33
#include "cpu.h"
34
35
-void gicv3_set_gicv3state(CPUState *cpu, GICv3CPUState *s)
36
-{
37
- ARMCPU *arm_cpu = ARM_CPU(cpu);
38
- CPUARMState *env = &arm_cpu->env;
39
-
40
- env->gicv3state = (void *)s;
41
-};
42
-
43
static GICv3CPUState *icc_cs_from_env(CPUARMState *env)
44
{
45
return env->gicv3state;
46
diff --git a/hw/intc/arm_gicv3_cpuif_common.c b/hw/intc/arm_gicv3_cpuif_common.c
17
new file mode 100644
47
new file mode 100644
18
index XXXXXXX..XXXXXXX
48
index XXXXXXX..XXXXXXX
19
--- /dev/null
49
--- /dev/null
20
+++ b/tests/qtest/pvpanic-pci-test.c
50
+++ b/hw/intc/arm_gicv3_cpuif_common.c
21
@@ -XXX,XX +XXX,XX @@
51
@@ -XXX,XX +XXX,XX @@
52
+/* SPDX-License-Identifier: GPL-2.0-or-later */
22
+/*
53
+/*
23
+ * QTest testcase for PV Panic PCI device
54
+ * ARM Generic Interrupt Controller v3
24
+ *
55
+ *
25
+ * Copyright (C) 2020 Oracle
56
+ * Copyright (c) 2016 Linaro Limited
57
+ * Written by Peter Maydell
26
+ *
58
+ *
27
+ * Authors:
59
+ * This code is licensed under the GPL, version 2 or (at your option)
28
+ * Mihai Carabas <mihai.carabas@oracle.com>
60
+ * any later version.
29
+ *
30
+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
31
+ * See the COPYING file in the top-level directory.
32
+ *
33
+ */
61
+ */
34
+
62
+
35
+#include "qemu/osdep.h"
63
+#include "qemu/osdep.h"
36
+#include "libqos/libqtest.h"
64
+#include "gicv3_internal.h"
37
+#include "qapi/qmp/qdict.h"
65
+#include "cpu.h"
38
+#include "libqos/pci.h"
39
+#include "libqos/pci-pc.h"
40
+#include "hw/pci/pci_regs.h"
41
+
66
+
42
+static void test_panic(void)
67
+void gicv3_set_gicv3state(CPUState *cpu, GICv3CPUState *s)
43
+{
68
+{
44
+ uint8_t val;
69
+ ARMCPU *arm_cpu = ARM_CPU(cpu);
45
+ QDict *response, *data;
70
+ CPUARMState *env = &arm_cpu->env;
46
+ QTestState *qts;
47
+ QPCIBus *pcibus;
48
+ QPCIDevice *dev;
49
+ QPCIBar bar;
50
+
71
+
51
+ qts = qtest_init("-device pvpanic-pci");
72
+ env->gicv3state = (void *)s;
52
+ pcibus = qpci_new_pc(qts, NULL);
73
+};
53
+ dev = qpci_device_find(pcibus, QPCI_DEVFN(0x4, 0x0));
74
diff --git a/hw/intc/meson.build b/hw/intc/meson.build
54
+ qpci_device_enable(dev);
55
+ bar = qpci_iomap(dev, 0, NULL);
56
+
57
+ qpci_memread(dev, bar, 0, &val, sizeof(val));
58
+ g_assert_cmpuint(val, ==, 3);
59
+
60
+ val = 1;
61
+ qpci_memwrite(dev, bar, 0, &val, sizeof(val));
62
+
63
+ response = qtest_qmp_eventwait_ref(qts, "GUEST_PANICKED");
64
+ g_assert(qdict_haskey(response, "data"));
65
+ data = qdict_get_qdict(response, "data");
66
+ g_assert(qdict_haskey(data, "action"));
67
+ g_assert_cmpstr(qdict_get_str(data, "action"), ==, "pause");
68
+ qobject_unref(response);
69
+
70
+ qtest_quit(qts);
71
+}
72
+
73
+int main(int argc, char **argv)
74
+{
75
+ int ret;
76
+
77
+ g_test_init(&argc, &argv, NULL);
78
+ qtest_add_func("/pvpanic-pci/panic", test_panic);
79
+
80
+ ret = g_test_run();
81
+
82
+ return ret;
83
+}
84
diff --git a/tests/qtest/meson.build b/tests/qtest/meson.build
85
index XXXXXXX..XXXXXXX 100644
75
index XXXXXXX..XXXXXXX 100644
86
--- a/tests/qtest/meson.build
76
--- a/hw/intc/meson.build
87
+++ b/tests/qtest/meson.build
77
+++ b/hw/intc/meson.build
88
@@ -XXX,XX +XXX,XX @@ endif
78
@@ -XXX,XX +XXX,XX @@ softmmu_ss.add(when: 'CONFIG_XLNX_ZYNQMP_PMU', if_true: files('xlnx-pmu-iomod-in
89
79
90
qtests_pci = \
80
specific_ss.add(when: 'CONFIG_ALLWINNER_A10_PIC', if_true: files('allwinner-a10-pic.c'))
91
(config_all_devices.has_key('CONFIG_VGA') ? ['display-vga-test'] : []) + \
81
specific_ss.add(when: 'CONFIG_APIC', if_true: files('apic.c', 'apic_common.c'))
92
+ (config_all_devices.has_key('CONFIG_PVPANIC_PCI') ? ['pvpanic-pci-test'] : []) + \
82
+specific_ss.add(when: 'CONFIG_ARM_GIC', if_true: files('arm_gicv3_cpuif_common.c'))
93
(config_all_devices.has_key('CONFIG_IVSHMEM_DEVICE') ? ['ivshmem-test'] : [])
83
specific_ss.add(when: 'CONFIG_ARM_GIC', if_true: files('arm_gicv3_cpuif.c'))
94
84
specific_ss.add(when: 'CONFIG_ARM_GIC_KVM', if_true: files('arm_gic_kvm.c'))
95
qtests_i386 = \
85
specific_ss.add(when: ['CONFIG_ARM_GIC_KVM', 'TARGET_AARCH64'], if_true: files('arm_gicv3_kvm.c', 'arm_gicv3_its_kvm.c'))
96
--
86
--
97
2.20.1
87
2.25.1
98
88
99
89
diff view generated by jsdifflib
1
From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
1
From: Philippe Mathieu-Daudé <philmd@redhat.com>
2
2
3
The stage_1_mmu_idx() already effectively keeps track of which
3
The TYPE_ARM_GICV3 device is an emulated one. When using
4
translation regimes have two stages. Don't hard-code another test.
4
KVM, it is recommended to use the TYPE_KVM_ARM_GICV3 device
5
(which uses in-kernel support).
5
6
6
Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
7
When using --with-devices-FOO, it is possible to build a
7
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
8
binary with a specific set of devices. When this binary is
8
Message-id: 20210112104511.36576-13-remi.denis.courmont@huawei.com
9
restricted to KVM accelerator, the TYPE_ARM_GICV3 device is
10
irrelevant, and it is desirable to remove it from the binary.
11
12
Therefore introduce the CONFIG_ARM_GIC_TCG Kconfig selector
13
which select the files required to have the TYPE_ARM_GICV3
14
device, but also allowing to de-select this device.
15
16
Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com>
17
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
18
Message-id: 20211115223619.2599282-3-philmd@redhat.com
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
19
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
20
---
11
target/arm/helper.c | 13 ++++++-------
21
hw/intc/arm_gicv3.c | 2 +-
12
1 file changed, 6 insertions(+), 7 deletions(-)
22
hw/intc/Kconfig | 5 +++++
23
hw/intc/meson.build | 10 ++++++----
24
3 files changed, 12 insertions(+), 5 deletions(-)
13
25
14
diff --git a/target/arm/helper.c b/target/arm/helper.c
26
diff --git a/hw/intc/arm_gicv3.c b/hw/intc/arm_gicv3.c
15
index XXXXXXX..XXXXXXX 100644
27
index XXXXXXX..XXXXXXX 100644
16
--- a/target/arm/helper.c
28
--- a/hw/intc/arm_gicv3.c
17
+++ b/target/arm/helper.c
29
+++ b/hw/intc/arm_gicv3.c
18
@@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address,
30
@@ -XXX,XX +XXX,XX @@
19
target_ulong *page_size,
31
/*
20
ARMMMUFaultInfo *fi, ARMCacheAttrs *cacheattrs)
32
- * ARM Generic Interrupt Controller v3
21
{
33
+ * ARM Generic Interrupt Controller v3 (emulation)
22
- if (mmu_idx == ARMMMUIdx_E10_0 ||
34
*
23
- mmu_idx == ARMMMUIdx_E10_1 ||
35
* Copyright (c) 2015 Huawei.
24
- mmu_idx == ARMMMUIdx_E10_1_PAN) {
36
* Copyright (c) 2016 Linaro Limited
25
+ ARMMMUIdx s1_mmu_idx = stage_1_mmu_idx(mmu_idx);
37
diff --git a/hw/intc/Kconfig b/hw/intc/Kconfig
38
index XXXXXXX..XXXXXXX 100644
39
--- a/hw/intc/Kconfig
40
+++ b/hw/intc/Kconfig
41
@@ -XXX,XX +XXX,XX @@ config APIC
42
select MSI_NONBROKEN
43
select I8259
44
45
+config ARM_GIC_TCG
46
+ bool
47
+ default y
48
+ depends on ARM_GIC && TCG
26
+
49
+
27
+ if (mmu_idx != s1_mmu_idx) {
50
config ARM_GIC_KVM
28
/* Call ourselves recursively to do the stage 1 and then stage 2
51
bool
29
- * translations.
52
default y
30
+ * translations if mmu_idx is a two-stage regime.
53
diff --git a/hw/intc/meson.build b/hw/intc/meson.build
31
*/
54
index XXXXXXX..XXXXXXX 100644
32
if (arm_feature(env, ARM_FEATURE_EL2)) {
55
--- a/hw/intc/meson.build
33
hwaddr ipa;
56
+++ b/hw/intc/meson.build
34
@@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address,
57
@@ -XXX,XX +XXX,XX @@ softmmu_ss.add(when: 'CONFIG_ARM_GIC', if_true: files(
35
int ret;
58
'arm_gic.c',
36
ARMCacheAttrs cacheattrs2 = {};
59
'arm_gic_common.c',
37
60
'arm_gicv2m.c',
38
- ret = get_phys_addr(env, address, access_type,
61
- 'arm_gicv3.c',
39
- stage_1_mmu_idx(mmu_idx), &ipa, attrs,
62
'arm_gicv3_common.c',
40
- prot, page_size, fi, cacheattrs);
63
- 'arm_gicv3_dist.c',
41
+ ret = get_phys_addr(env, address, access_type, s1_mmu_idx, &ipa,
64
'arm_gicv3_its_common.c',
42
+ attrs, prot, page_size, fi, cacheattrs);
65
- 'arm_gicv3_redist.c',
43
66
+))
44
/* If S1 fails or S2 is disabled, return early. */
67
+softmmu_ss.add(when: 'CONFIG_ARM_GIC_TCG', if_true: files(
45
if (ret || regime_translation_disabled(env, ARMMMUIdx_Stage2)) {
68
+ 'arm_gicv3.c',
69
+ 'arm_gicv3_dist.c',
70
'arm_gicv3_its.c',
71
+ 'arm_gicv3_redist.c',
72
))
73
softmmu_ss.add(when: 'CONFIG_ETRAXFS', if_true: files('etraxfs_pic.c'))
74
softmmu_ss.add(when: 'CONFIG_HEATHROW_PIC', if_true: files('heathrow_pic.c'))
75
@@ -XXX,XX +XXX,XX @@ softmmu_ss.add(when: 'CONFIG_XLNX_ZYNQMP_PMU', if_true: files('xlnx-pmu-iomod-in
76
specific_ss.add(when: 'CONFIG_ALLWINNER_A10_PIC', if_true: files('allwinner-a10-pic.c'))
77
specific_ss.add(when: 'CONFIG_APIC', if_true: files('apic.c', 'apic_common.c'))
78
specific_ss.add(when: 'CONFIG_ARM_GIC', if_true: files('arm_gicv3_cpuif_common.c'))
79
-specific_ss.add(when: 'CONFIG_ARM_GIC', if_true: files('arm_gicv3_cpuif.c'))
80
+specific_ss.add(when: 'CONFIG_ARM_GIC_TCG', if_true: files('arm_gicv3_cpuif.c'))
81
specific_ss.add(when: 'CONFIG_ARM_GIC_KVM', if_true: files('arm_gic_kvm.c'))
82
specific_ss.add(when: ['CONFIG_ARM_GIC_KVM', 'TARGET_AARCH64'], if_true: files('arm_gicv3_kvm.c', 'arm_gicv3_its_kvm.c'))
83
specific_ss.add(when: 'CONFIG_ARM_V7M', if_true: files('armv7m_nvic.c'))
46
--
84
--
47
2.20.1
85
2.25.1
48
86
49
87
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Update all users of do_perm_pred2 for the new
4
predicate descriptor field definitions.
5
6
Cc: qemu-stable@nongnu.org
7
Buglink: https://bugs.launchpad.net/bugs/1908551
8
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
3
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20210113062650.593824-5-richard.henderson@linaro.org
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
4
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
6
---
13
target/arm/sve_helper.c | 8 ++++----
7
target/arm/translate-a64.c | 7 ++++---
14
target/arm/translate-sve.c | 13 ++++---------
8
1 file changed, 4 insertions(+), 3 deletions(-)
15
2 files changed, 8 insertions(+), 13 deletions(-)
16
9
17
diff --git a/target/arm/sve_helper.c b/target/arm/sve_helper.c
10
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
18
index XXXXXXX..XXXXXXX 100644
11
index XXXXXXX..XXXXXXX 100644
19
--- a/target/arm/sve_helper.c
12
--- a/target/arm/translate-a64.c
20
+++ b/target/arm/sve_helper.c
13
+++ b/target/arm/translate-a64.c
21
@@ -XXX,XX +XXX,XX @@ static uint8_t reverse_bits_8(uint8_t x, int n)
14
@@ -XXX,XX +XXX,XX @@ static void aarch64_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu)
22
23
void HELPER(sve_rev_p)(void *vd, void *vn, uint32_t pred_desc)
24
{
15
{
25
- intptr_t oprsz = extract32(pred_desc, 0, SIMD_OPRSZ_BITS) + 2;
16
DisasContext *s = container_of(dcbase, DisasContext, base);
26
- int esz = extract32(pred_desc, SIMD_DATA_SHIFT, 2);
17
CPUARMState *env = cpu->env_ptr;
27
+ intptr_t oprsz = FIELD_EX32(pred_desc, PREDDESC, OPRSZ);
18
+ uint64_t pc = s->base.pc_next;
28
+ int esz = FIELD_EX32(pred_desc, PREDDESC, ESZ);
19
uint32_t insn;
29
intptr_t i, oprsz_2 = oprsz / 2;
20
30
21
if (s->ss_active && !s->pstate_ss) {
31
if (oprsz <= 8) {
22
@@ -XXX,XX +XXX,XX @@ static void aarch64_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu)
32
@@ -XXX,XX +XXX,XX @@ void HELPER(sve_rev_p)(void *vd, void *vn, uint32_t pred_desc)
23
return;
33
24
}
34
void HELPER(sve_punpk_p)(void *vd, void *vn, uint32_t pred_desc)
25
35
{
26
- s->pc_curr = s->base.pc_next;
36
- intptr_t oprsz = extract32(pred_desc, 0, SIMD_OPRSZ_BITS) + 2;
27
- insn = arm_ldl_code(env, &s->base, s->base.pc_next, s->sctlr_b);
37
- intptr_t high = extract32(pred_desc, SIMD_DATA_SHIFT + 2, 1);
28
+ s->pc_curr = pc;
38
+ intptr_t oprsz = FIELD_EX32(pred_desc, PREDDESC, OPRSZ);
29
+ insn = arm_ldl_code(env, &s->base, pc, s->sctlr_b);
39
+ intptr_t high = FIELD_EX32(pred_desc, PREDDESC, DATA);
30
s->insn = insn;
40
uint64_t *d = vd;
31
- s->base.pc_next += 4;
41
intptr_t i;
32
+ s->base.pc_next = pc + 4;
42
33
43
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
34
s->fp_access_checked = false;
44
index XXXXXXX..XXXXXXX 100644
35
s->sve_access_checked = false;
45
--- a/target/arm/translate-sve.c
46
+++ b/target/arm/translate-sve.c
47
@@ -XXX,XX +XXX,XX @@ static bool do_perm_pred2(DisasContext *s, arg_rr_esz *a, bool high_odd,
48
TCGv_ptr t_d = tcg_temp_new_ptr();
49
TCGv_ptr t_n = tcg_temp_new_ptr();
50
TCGv_i32 t_desc;
51
- int desc;
52
+ uint32_t desc = 0;
53
54
tcg_gen_addi_ptr(t_d, cpu_env, pred_full_reg_offset(s, a->rd));
55
tcg_gen_addi_ptr(t_n, cpu_env, pred_full_reg_offset(s, a->rn));
56
57
- /* Predicate sizes may be smaller and cannot use simd_desc.
58
- We cannot round up, as we do elsewhere, because we need
59
- the exact size for ZIP2 and REV. We retain the style for
60
- the other helpers for consistency. */
61
-
62
- desc = vsz - 2;
63
- desc = deposit32(desc, SIMD_DATA_SHIFT, 2, a->esz);
64
- desc = deposit32(desc, SIMD_DATA_SHIFT + 2, 2, high_odd);
65
+ desc = FIELD_DP32(desc, PREDDESC, OPRSZ, vsz);
66
+ desc = FIELD_DP32(desc, PREDDESC, ESZ, a->esz);
67
+ desc = FIELD_DP32(desc, PREDDESC, DATA, high_odd);
68
t_desc = tcg_const_i32(desc);
69
70
fn(t_d, t_n, t_desc);
71
--
36
--
72
2.20.1
37
2.25.1
73
38
74
39
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Update all users of do_perm_pred3 for the new
4
predicate descriptor field definitions.
5
6
Cc: qemu-stable@nongnu.org
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
3
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20210113062650.593824-4-richard.henderson@linaro.org
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
4
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
6
---
12
target/arm/sve_helper.c | 18 +++++++++---------
7
target/arm/translate.c | 9 +++++----
13
target/arm/translate-sve.c | 12 ++++--------
8
1 file changed, 5 insertions(+), 4 deletions(-)
14
2 files changed, 13 insertions(+), 17 deletions(-)
15
9
16
diff --git a/target/arm/sve_helper.c b/target/arm/sve_helper.c
10
diff --git a/target/arm/translate.c b/target/arm/translate.c
17
index XXXXXXX..XXXXXXX 100644
11
index XXXXXXX..XXXXXXX 100644
18
--- a/target/arm/sve_helper.c
12
--- a/target/arm/translate.c
19
+++ b/target/arm/sve_helper.c
13
+++ b/target/arm/translate.c
20
@@ -XXX,XX +XXX,XX @@ static uint64_t compress_bits(uint64_t x, int n)
14
@@ -XXX,XX +XXX,XX @@ static void arm_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu)
21
22
void HELPER(sve_zip_p)(void *vd, void *vn, void *vm, uint32_t pred_desc)
23
{
15
{
24
- intptr_t oprsz = extract32(pred_desc, 0, SIMD_OPRSZ_BITS) + 2;
16
DisasContext *dc = container_of(dcbase, DisasContext, base);
25
- int esz = extract32(pred_desc, SIMD_DATA_SHIFT, 2);
17
CPUARMState *env = cpu->env_ptr;
26
- intptr_t high = extract32(pred_desc, SIMD_DATA_SHIFT + 2, 1);
18
+ uint32_t pc = dc->base.pc_next;
27
+ intptr_t oprsz = FIELD_EX32(pred_desc, PREDDESC, OPRSZ);
19
unsigned int insn;
28
+ int esz = FIELD_EX32(pred_desc, PREDDESC, ESZ);
20
29
+ intptr_t high = FIELD_EX32(pred_desc, PREDDESC, DATA);
21
if (arm_pre_translate_insn(dc)) {
30
uint64_t *d = vd;
22
- dc->base.pc_next += 4;
31
intptr_t i;
23
+ dc->base.pc_next = pc + 4;
32
24
return;
33
@@ -XXX,XX +XXX,XX @@ void HELPER(sve_zip_p)(void *vd, void *vn, void *vm, uint32_t pred_desc)
25
}
34
26
35
void HELPER(sve_uzp_p)(void *vd, void *vn, void *vm, uint32_t pred_desc)
27
- dc->pc_curr = dc->base.pc_next;
36
{
28
- insn = arm_ldl_code(env, &dc->base, dc->base.pc_next, dc->sctlr_b);
37
- intptr_t oprsz = extract32(pred_desc, 0, SIMD_OPRSZ_BITS) + 2;
29
+ dc->pc_curr = pc;
38
- int esz = extract32(pred_desc, SIMD_DATA_SHIFT, 2);
30
+ insn = arm_ldl_code(env, &dc->base, pc, dc->sctlr_b);
39
- int odd = extract32(pred_desc, SIMD_DATA_SHIFT + 2, 1) << esz;
31
dc->insn = insn;
40
+ intptr_t oprsz = FIELD_EX32(pred_desc, PREDDESC, OPRSZ);
32
- dc->base.pc_next += 4;
41
+ int esz = FIELD_EX32(pred_desc, PREDDESC, ESZ);
33
+ dc->base.pc_next = pc + 4;
42
+ int odd = FIELD_EX32(pred_desc, PREDDESC, DATA) << esz;
34
disas_arm_insn(dc, insn);
43
uint64_t *d = vd, *n = vn, *m = vm;
35
44
uint64_t l, h;
36
arm_post_translate_insn(dc);
45
intptr_t i;
46
@@ -XXX,XX +XXX,XX @@ void HELPER(sve_uzp_p)(void *vd, void *vn, void *vm, uint32_t pred_desc)
47
48
void HELPER(sve_trn_p)(void *vd, void *vn, void *vm, uint32_t pred_desc)
49
{
50
- intptr_t oprsz = extract32(pred_desc, 0, SIMD_OPRSZ_BITS) + 2;
51
- uintptr_t esz = extract32(pred_desc, SIMD_DATA_SHIFT, 2);
52
- bool odd = extract32(pred_desc, SIMD_DATA_SHIFT + 2, 1);
53
+ intptr_t oprsz = FIELD_EX32(pred_desc, PREDDESC, OPRSZ);
54
+ int esz = FIELD_EX32(pred_desc, PREDDESC, ESZ);
55
+ int odd = FIELD_EX32(pred_desc, PREDDESC, DATA);
56
uint64_t *d = vd, *n = vn, *m = vm;
57
uint64_t mask;
58
int shr, shl;
59
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
60
index XXXXXXX..XXXXXXX 100644
61
--- a/target/arm/translate-sve.c
62
+++ b/target/arm/translate-sve.c
63
@@ -XXX,XX +XXX,XX @@ static bool do_perm_pred3(DisasContext *s, arg_rrr_esz *a, bool high_odd,
64
65
unsigned vsz = pred_full_reg_size(s);
66
67
- /* Predicate sizes may be smaller and cannot use simd_desc.
68
- We cannot round up, as we do elsewhere, because we need
69
- the exact size for ZIP2 and REV. We retain the style for
70
- the other helpers for consistency. */
71
TCGv_ptr t_d = tcg_temp_new_ptr();
72
TCGv_ptr t_n = tcg_temp_new_ptr();
73
TCGv_ptr t_m = tcg_temp_new_ptr();
74
TCGv_i32 t_desc;
75
- int desc;
76
+ uint32_t desc = 0;
77
78
- desc = vsz - 2;
79
- desc = deposit32(desc, SIMD_DATA_SHIFT, 2, a->esz);
80
- desc = deposit32(desc, SIMD_DATA_SHIFT + 2, 2, high_odd);
81
+ desc = FIELD_DP32(desc, PREDDESC, OPRSZ, vsz);
82
+ desc = FIELD_DP32(desc, PREDDESC, ESZ, a->esz);
83
+ desc = FIELD_DP32(desc, PREDDESC, DATA, high_odd);
84
85
tcg_gen_addi_ptr(t_d, cpu_env, pred_full_reg_offset(s, a->rd));
86
tcg_gen_addi_ptr(t_n, cpu_env, pred_full_reg_offset(s, a->rn));
87
--
37
--
88
2.20.1
38
2.25.1
89
39
90
40
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
These two were odd, in that do_pfirst_pnext passed the
4
count of 64-bit words rather than bytes. Change to pass
5
the standard pred_full_reg_size to avoid confusion.
6
7
Cc: qemu-stable@nongnu.org
8
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
3
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20210113062650.593824-3-richard.henderson@linaro.org
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
4
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
6
---
13
target/arm/sve_helper.c | 7 ++++---
7
target/arm/translate.c | 16 ++++++++--------
14
target/arm/translate-sve.c | 6 +++---
8
1 file changed, 8 insertions(+), 8 deletions(-)
15
2 files changed, 7 insertions(+), 6 deletions(-)
16
9
17
diff --git a/target/arm/sve_helper.c b/target/arm/sve_helper.c
10
diff --git a/target/arm/translate.c b/target/arm/translate.c
18
index XXXXXXX..XXXXXXX 100644
11
index XXXXXXX..XXXXXXX 100644
19
--- a/target/arm/sve_helper.c
12
--- a/target/arm/translate.c
20
+++ b/target/arm/sve_helper.c
13
+++ b/target/arm/translate.c
21
@@ -XXX,XX +XXX,XX @@ static intptr_t last_active_element(uint64_t *g, intptr_t words, intptr_t esz)
14
@@ -XXX,XX +XXX,XX @@ static void thumb_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu)
22
return (intptr_t)-1 << esz;
23
}
24
25
-uint32_t HELPER(sve_pfirst)(void *vd, void *vg, uint32_t words)
26
+uint32_t HELPER(sve_pfirst)(void *vd, void *vg, uint32_t pred_desc)
27
{
15
{
28
+ intptr_t words = DIV_ROUND_UP(FIELD_EX32(pred_desc, PREDDESC, OPRSZ), 8);
16
DisasContext *dc = container_of(dcbase, DisasContext, base);
29
uint32_t flags = PREDTEST_INIT;
17
CPUARMState *env = cpu->env_ptr;
30
uint64_t *d = vd, *g = vg;
18
+ uint32_t pc = dc->base.pc_next;
31
intptr_t i = 0;
19
uint32_t insn;
32
@@ -XXX,XX +XXX,XX @@ uint32_t HELPER(sve_pfirst)(void *vd, void *vg, uint32_t words)
20
bool is_16bit;
33
21
34
uint32_t HELPER(sve_pnext)(void *vd, void *vg, uint32_t pred_desc)
22
if (arm_pre_translate_insn(dc)) {
35
{
23
- dc->base.pc_next += 2;
36
- intptr_t words = extract32(pred_desc, 0, SIMD_OPRSZ_BITS);
24
+ dc->base.pc_next = pc + 2;
37
- intptr_t esz = extract32(pred_desc, SIMD_DATA_SHIFT, 2);
25
return;
38
+ intptr_t words = DIV_ROUND_UP(FIELD_EX32(pred_desc, PREDDESC, OPRSZ), 8);
26
}
39
+ intptr_t esz = FIELD_EX32(pred_desc, PREDDESC, ESZ);
27
40
uint32_t flags = PREDTEST_INIT;
28
- dc->pc_curr = dc->base.pc_next;
41
uint64_t *d = vd, *g = vg, esz_mask;
29
- insn = arm_lduw_code(env, &dc->base, dc->base.pc_next, dc->sctlr_b);
42
intptr_t i, next;
30
+ dc->pc_curr = pc;
43
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
31
+ insn = arm_lduw_code(env, &dc->base, pc, dc->sctlr_b);
44
index XXXXXXX..XXXXXXX 100644
32
is_16bit = thumb_insn_is_16bit(dc, dc->base.pc_next, insn);
45
--- a/target/arm/translate-sve.c
33
- dc->base.pc_next += 2;
46
+++ b/target/arm/translate-sve.c
34
+ pc += 2;
47
@@ -XXX,XX +XXX,XX @@ static bool do_pfirst_pnext(DisasContext *s, arg_rr_esz *a,
35
if (!is_16bit) {
48
TCGv_ptr t_pd = tcg_temp_new_ptr();
36
- uint32_t insn2 = arm_lduw_code(env, &dc->base, dc->base.pc_next,
49
TCGv_ptr t_pg = tcg_temp_new_ptr();
37
- dc->sctlr_b);
50
TCGv_i32 t;
38
-
51
- unsigned desc;
39
+ uint32_t insn2 = arm_lduw_code(env, &dc->base, pc, dc->sctlr_b);
52
+ unsigned desc = 0;
40
insn = insn << 16 | insn2;
53
41
- dc->base.pc_next += 2;
54
- desc = DIV_ROUND_UP(pred_full_reg_size(s), 8);
42
+ pc += 2;
55
- desc = deposit32(desc, SIMD_DATA_SHIFT, 2, a->esz);
43
}
56
+ desc = FIELD_DP32(desc, PREDDESC, OPRSZ, pred_full_reg_size(s));
44
+ dc->base.pc_next = pc;
57
+ desc = FIELD_DP32(desc, PREDDESC, ESZ, a->esz);
45
dc->insn = insn;
58
46
59
tcg_gen_addi_ptr(t_pd, cpu_env, pred_full_reg_offset(s, a->rd));
47
if (dc->pstate_il) {
60
tcg_gen_addi_ptr(t_pg, cpu_env, pred_full_reg_offset(s, a->rn));
61
--
48
--
62
2.20.1
49
2.25.1
63
50
64
51
diff view generated by jsdifflib
1
From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
On ARMv8-A, accesses by 32-bit secure EL1 to monitor registers trap to
3
Create arm_check_ss_active and arm_check_kernelpage.
4
the upper (64-bit) EL. With Secure EL2 support, we can no longer assume
5
that that is always EL3, so make room for the value to be computed at
6
run-time.
7
4
8
Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
5
Reverse the order of the tests. While it doesn't matter in practice,
9
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
6
because only user-only has a kernel page and user-only never sets
10
Message-id: 20210112104511.36576-16-remi.denis.courmont@huawei.com
7
ss_active, ss_active has priority over execution exceptions and it
8
is best to keep them in the proper order.
9
10
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
11
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
13
---
13
target/arm/translate.c | 23 +++++++++++++++++++++--
14
target/arm/translate.c | 10 +++++++---
14
1 file changed, 21 insertions(+), 2 deletions(-)
15
1 file changed, 7 insertions(+), 3 deletions(-)
15
16
16
diff --git a/target/arm/translate.c b/target/arm/translate.c
17
diff --git a/target/arm/translate.c b/target/arm/translate.c
17
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
18
--- a/target/arm/translate.c
19
--- a/target/arm/translate.c
19
+++ b/target/arm/translate.c
20
+++ b/target/arm/translate.c
20
@@ -XXX,XX +XXX,XX @@ static void unallocated_encoding(DisasContext *s)
21
@@ -XXX,XX +XXX,XX @@ static void arm_tr_insn_start(DisasContextBase *dcbase, CPUState *cpu)
21
default_exception_el(s));
22
dc->insn_start = tcg_last_op();
22
}
23
}
23
24
24
+static void gen_exception_el(DisasContext *s, int excp, uint32_t syn,
25
-static bool arm_pre_translate_insn(DisasContext *dc)
25
+ TCGv_i32 tcg_el)
26
+static bool arm_check_kernelpage(DisasContext *dc)
27
{
28
#ifdef CONFIG_USER_ONLY
29
/* Intercept jump to the magic kernel page. */
30
@@ -XXX,XX +XXX,XX @@ static bool arm_pre_translate_insn(DisasContext *dc)
31
return true;
32
}
33
#endif
34
+ return false;
35
+}
36
37
+static bool arm_check_ss_active(DisasContext *dc)
26
+{
38
+{
27
+ TCGv_i32 tcg_excp;
39
if (dc->ss_active && !dc->pstate_ss) {
28
+ TCGv_i32 tcg_syn;
40
/* Singlestep state is Active-pending.
29
+
41
* If we're in this state at the start of a TB then either
30
+ gen_set_condexec(s);
42
@@ -XXX,XX +XXX,XX @@ static void arm_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu)
31
+ gen_set_pc_im(s, s->pc_curr);
43
uint32_t pc = dc->base.pc_next;
32
+ tcg_excp = tcg_const_i32(excp);
44
unsigned int insn;
33
+ tcg_syn = tcg_const_i32(syn);
45
34
+ gen_helper_exception_with_syndrome(cpu_env, tcg_excp, tcg_syn, tcg_el);
46
- if (arm_pre_translate_insn(dc)) {
35
+ tcg_temp_free_i32(tcg_syn);
47
+ if (arm_check_ss_active(dc) || arm_check_kernelpage(dc)) {
36
+ tcg_temp_free_i32(tcg_excp);
48
dc->base.pc_next = pc + 4;
37
+ s->base.is_jmp = DISAS_NORETURN;
49
return;
38
+}
50
}
39
+
51
@@ -XXX,XX +XXX,XX @@ static void thumb_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu)
40
/* Force a TB lookup after an instruction that changes the CPU state. */
52
uint32_t insn;
41
static inline void gen_lookup_tb(DisasContext *s)
53
bool is_16bit;
42
{
54
43
@@ -XXX,XX +XXX,XX @@ static bool msr_banked_access_decode(DisasContext *s, int r, int sysm, int rn,
55
- if (arm_pre_translate_insn(dc)) {
44
/* If we're in Secure EL1 (which implies that EL3 is AArch64)
56
+ if (arm_check_ss_active(dc) || arm_check_kernelpage(dc)) {
45
* then accesses to Mon registers trap to EL3
57
dc->base.pc_next = pc + 2;
46
*/
58
return;
47
- exc_target = 3;
59
}
48
- goto undef;
49
+ TCGv_i32 tcg_el = tcg_const_i32(3);
50
+
51
+ gen_exception_el(s, EXCP_UDEF, syn_uncategorized(), tcg_el);
52
+ tcg_temp_free_i32(tcg_el);
53
+ return false;
54
}
55
break;
56
case ARM_CPU_MODE_HYP:
57
--
60
--
58
2.20.1
61
2.25.1
59
62
60
63
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
SVE predicate operations cannot use the "usual" simd_desc
3
The size of the code covered by a TranslationBlock cannot be 0;
4
encoding, because the lengths are not a multiple of 8.
4
this is checked via assert in tb_gen_code.
5
But we were abusing the SIMD_* fields to store values anyway.
6
This abuse broke when SIMD_OPRSZ_BITS was modified in e2e7168a214.
7
5
8
Introduce a new set of field definitions for exclusive use
9
of predicates, so that it is obvious what kind of predicate
10
we are manipulating. To be used in future patches.
11
12
Cc: qemu-stable@nongnu.org
13
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
14
Message-id: 20210113062650.593824-2-richard.henderson@linaro.org
15
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
16
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
---
9
---
18
target/arm/internals.h | 9 +++++++++
10
target/arm/translate-a64.c | 1 +
19
1 file changed, 9 insertions(+)
11
1 file changed, 1 insertion(+)
20
12
21
diff --git a/target/arm/internals.h b/target/arm/internals.h
13
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
22
index XXXXXXX..XXXXXXX 100644
14
index XXXXXXX..XXXXXXX 100644
23
--- a/target/arm/internals.h
15
--- a/target/arm/translate-a64.c
24
+++ b/target/arm/internals.h
16
+++ b/target/arm/translate-a64.c
25
@@ -XXX,XX +XXX,XX @@ void arm_log_exception(int idx);
17
@@ -XXX,XX +XXX,XX @@ static void aarch64_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu)
26
#define LOG2_TAG_GRANULE 4
18
assert(s->base.num_insns == 1);
27
#define TAG_GRANULE (1 << LOG2_TAG_GRANULE)
19
gen_swstep_exception(s, 0, 0);
28
20
s->base.is_jmp = DISAS_NORETURN;
29
+/*
21
+ s->base.pc_next = pc + 4;
30
+ * SVE predicates are 1/8 the size of SVE vectors, and cannot use
22
return;
31
+ * the same simd_desc() encoding due to restrictions on size.
23
}
32
+ * Use these instead.
24
33
+ */
34
+FIELD(PREDDESC, OPRSZ, 0, 6)
35
+FIELD(PREDDESC, ESZ, 6, 2)
36
+FIELD(PREDDESC, DATA, 8, 24)
37
+
38
/*
39
* The SVE simd_data field, for memory ops, contains either
40
* rd (5 bits) or a shift count (2 bits).
41
--
25
--
42
2.20.1
26
2.25.1
43
27
44
28
diff view generated by jsdifflib
1
From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
3
We will reuse this section of arm_deliver_fault for
4
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
4
raising pc alignment faults.
5
Message-id: 20210112104511.36576-15-remi.denis.courmont@huawei.com
5
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
---
9
---
8
target/arm/cpu.h | 2 ++
10
target/arm/tlb_helper.c | 45 +++++++++++++++++++++++++----------------
9
target/arm/internals.h | 2 ++
11
1 file changed, 28 insertions(+), 17 deletions(-)
10
target/arm/helper.c | 6 ++++++
11
target/arm/tlb_helper.c | 3 +++
12
4 files changed, 13 insertions(+)
13
12
14
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
15
index XXXXXXX..XXXXXXX 100644
16
--- a/target/arm/cpu.h
17
+++ b/target/arm/cpu.h
18
@@ -XXX,XX +XXX,XX @@ static inline void xpsr_write(CPUARMState *env, uint32_t val, uint32_t mask)
19
#define HCR_TWEDEN (1ULL << 59)
20
#define HCR_TWEDEL MAKE_64BIT_MASK(60, 4)
21
22
+#define HPFAR_NS (1ULL << 63)
23
+
24
#define SCR_NS (1U << 0)
25
#define SCR_IRQ (1U << 1)
26
#define SCR_FIQ (1U << 2)
27
diff --git a/target/arm/internals.h b/target/arm/internals.h
28
index XXXXXXX..XXXXXXX 100644
29
--- a/target/arm/internals.h
30
+++ b/target/arm/internals.h
31
@@ -XXX,XX +XXX,XX @@ typedef enum ARMFaultType {
32
* @s2addr: Address that caused a fault at stage 2
33
* @stage2: True if we faulted at stage 2
34
* @s1ptw: True if we faulted at stage 2 while doing a stage 1 page-table walk
35
+ * @s1ns: True if we faulted on a non-secure IPA while in secure state
36
* @ea: True if we should set the EA (external abort type) bit in syndrome
37
*/
38
typedef struct ARMMMUFaultInfo ARMMMUFaultInfo;
39
@@ -XXX,XX +XXX,XX @@ struct ARMMMUFaultInfo {
40
int domain;
41
bool stage2;
42
bool s1ptw;
43
+ bool s1ns;
44
bool ea;
45
};
46
47
diff --git a/target/arm/helper.c b/target/arm/helper.c
48
index XXXXXXX..XXXXXXX 100644
49
--- a/target/arm/helper.c
50
+++ b/target/arm/helper.c
51
@@ -XXX,XX +XXX,XX @@ static uint64_t do_ats_write(CPUARMState *env, uint64_t value,
52
target_el = 3;
53
} else {
54
env->cp15.hpfar_el2 = extract64(fi.s2addr, 12, 47) << 4;
55
+ if (arm_is_secure_below_el3(env) && fi.s1ns) {
56
+ env->cp15.hpfar_el2 |= HPFAR_NS;
57
+ }
58
target_el = 2;
59
}
60
take_exc = true;
61
@@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx,
62
fi->s2addr = addr;
63
fi->stage2 = true;
64
fi->s1ptw = true;
65
+ fi->s1ns = !*is_secure;
66
return ~0;
67
}
68
if ((arm_hcr_el2_eff(env) & HCR_PTW) &&
69
@@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx,
70
fi->s2addr = addr;
71
fi->stage2 = true;
72
fi->s1ptw = true;
73
+ fi->s1ns = !*is_secure;
74
return ~0;
75
}
76
77
@@ -XXX,XX +XXX,XX @@ do_fault:
78
/* Tag the error as S2 for failed S1 PTW at S2 or ordinary S2. */
79
fi->stage2 = fi->s1ptw || (mmu_idx == ARMMMUIdx_Stage2 ||
80
mmu_idx == ARMMMUIdx_Stage2_S);
81
+ fi->s1ns = mmu_idx == ARMMMUIdx_Stage2;
82
return true;
83
}
84
85
diff --git a/target/arm/tlb_helper.c b/target/arm/tlb_helper.c
13
diff --git a/target/arm/tlb_helper.c b/target/arm/tlb_helper.c
86
index XXXXXXX..XXXXXXX 100644
14
index XXXXXXX..XXXXXXX 100644
87
--- a/target/arm/tlb_helper.c
15
--- a/target/arm/tlb_helper.c
88
+++ b/target/arm/tlb_helper.c
16
+++ b/target/arm/tlb_helper.c
17
@@ -XXX,XX +XXX,XX @@ static inline uint32_t merge_syn_data_abort(uint32_t template_syn,
18
return syn;
19
}
20
21
-static void QEMU_NORETURN arm_deliver_fault(ARMCPU *cpu, vaddr addr,
22
- MMUAccessType access_type,
23
- int mmu_idx, ARMMMUFaultInfo *fi)
24
+static uint32_t compute_fsr_fsc(CPUARMState *env, ARMMMUFaultInfo *fi,
25
+ int target_el, int mmu_idx, uint32_t *ret_fsc)
26
{
27
- CPUARMState *env = &cpu->env;
28
- int target_el;
29
- bool same_el;
30
- uint32_t syn, exc, fsr, fsc;
31
ARMMMUIdx arm_mmu_idx = core_to_arm_mmu_idx(env, mmu_idx);
32
-
33
- target_el = exception_target_el(env);
34
- if (fi->stage2) {
35
- target_el = 2;
36
- env->cp15.hpfar_el2 = extract64(fi->s2addr, 12, 47) << 4;
37
- if (arm_is_secure_below_el3(env) && fi->s1ns) {
38
- env->cp15.hpfar_el2 |= HPFAR_NS;
39
- }
40
- }
41
- same_el = (arm_current_el(env) == target_el);
42
+ uint32_t fsr, fsc;
43
44
if (target_el == 2 || arm_el_is_aa64(env, target_el) ||
45
arm_s1_regime_using_lpae_format(env, arm_mmu_idx)) {
89
@@ -XXX,XX +XXX,XX @@ static void QEMU_NORETURN arm_deliver_fault(ARMCPU *cpu, vaddr addr,
46
@@ -XXX,XX +XXX,XX @@ static void QEMU_NORETURN arm_deliver_fault(ARMCPU *cpu, vaddr addr,
90
if (fi->stage2) {
47
fsc = 0x3f;
91
target_el = 2;
48
}
92
env->cp15.hpfar_el2 = extract64(fi->s2addr, 12, 47) << 4;
49
50
+ *ret_fsc = fsc;
51
+ return fsr;
52
+}
53
+
54
+static void QEMU_NORETURN arm_deliver_fault(ARMCPU *cpu, vaddr addr,
55
+ MMUAccessType access_type,
56
+ int mmu_idx, ARMMMUFaultInfo *fi)
57
+{
58
+ CPUARMState *env = &cpu->env;
59
+ int target_el;
60
+ bool same_el;
61
+ uint32_t syn, exc, fsr, fsc;
62
+
63
+ target_el = exception_target_el(env);
64
+ if (fi->stage2) {
65
+ target_el = 2;
66
+ env->cp15.hpfar_el2 = extract64(fi->s2addr, 12, 47) << 4;
93
+ if (arm_is_secure_below_el3(env) && fi->s1ns) {
67
+ if (arm_is_secure_below_el3(env) && fi->s1ns) {
94
+ env->cp15.hpfar_el2 |= HPFAR_NS;
68
+ env->cp15.hpfar_el2 |= HPFAR_NS;
95
+ }
69
+ }
96
}
70
+ }
97
same_el = (arm_current_el(env) == target_el);
71
+ same_el = (arm_current_el(env) == target_el);
98
72
+
73
+ fsr = compute_fsr_fsc(env, fi, target_el, mmu_idx, &fsc);
74
+
75
if (access_type == MMU_INST_FETCH) {
76
syn = syn_insn_abort(same_el, fi->ea, fi->s1ptw, fsc);
77
exc = EXCP_PREFETCH_ABORT;
99
--
78
--
100
2.20.1
79
2.25.1
101
80
102
81
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Without hardware acceleration, a cryptographically strong
3
For A64, any input to an indirect branch can cause this.
4
algorithm is too expensive for pauth_computepac.
4
5
5
For A32, many indirect branch paths force the branch to be aligned,
6
Even with hardware accel, we are not currently expecting
6
but BXWritePC does not. This includes the BX instruction but also
7
to link the linux-user binaries to any crypto libraries,
7
other interworking changes to PC. Prior to v8, this case is UNDEFINED.
8
and doing so would generally make the --static build fail.
8
With v8, this is CONSTRAINED UNPREDICTABLE and may either raise an
9
9
exception or force align the PC.
10
So choose XXH64 as a reasonably quick and decent hash.
10
11
11
We choose to raise an exception because we have the infrastructure,
12
Tested-by: Mark Rutland <mark.rutland@arm.com>
12
it makes the generated code for gen_bx simpler, and it has the
13
possibility of catching more guest bugs.
14
13
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
15
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
14
Message-id: 20210111235740.462469-2-richard.henderson@linaro.org
15
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
16
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
16
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
---
18
---
18
include/qemu/xxhash.h | 98 +++++++++++++++++++++++++++++++++++++++
19
target/arm/helper.h | 1 +
19
target/arm/cpu.h | 15 ++++--
20
target/arm/syndrome.h | 5 ++++
20
target/arm/pauth_helper.c | 27 +++++++++--
21
linux-user/aarch64/cpu_loop.c | 46 ++++++++++++++++++++---------------
21
3 files changed, 131 insertions(+), 9 deletions(-)
22
target/arm/tlb_helper.c | 18 ++++++++++++++
22
23
target/arm/translate-a64.c | 15 ++++++++++++
23
diff --git a/include/qemu/xxhash.h b/include/qemu/xxhash.h
24
target/arm/translate.c | 22 ++++++++++++++++-
24
index XXXXXXX..XXXXXXX 100644
25
6 files changed, 87 insertions(+), 20 deletions(-)
25
--- a/include/qemu/xxhash.h
26
26
+++ b/include/qemu/xxhash.h
27
diff --git a/target/arm/helper.h b/target/arm/helper.h
27
@@ -XXX,XX +XXX,XX @@ static inline uint32_t qemu_xxhash6(uint64_t ab, uint64_t cd, uint32_t e,
28
index XXXXXXX..XXXXXXX 100644
28
return qemu_xxhash7(ab, cd, e, f, 0);
29
--- a/target/arm/helper.h
30
+++ b/target/arm/helper.h
31
@@ -XXX,XX +XXX,XX @@ DEF_HELPER_FLAGS_3(sel_flags, TCG_CALL_NO_RWG_SE,
32
DEF_HELPER_2(exception_internal, void, env, i32)
33
DEF_HELPER_4(exception_with_syndrome, void, env, i32, i32, i32)
34
DEF_HELPER_2(exception_bkpt_insn, void, env, i32)
35
+DEF_HELPER_2(exception_pc_alignment, noreturn, env, tl)
36
DEF_HELPER_1(setend, void, env)
37
DEF_HELPER_2(wfi, void, env, i32)
38
DEF_HELPER_1(wfe, void, env)
39
diff --git a/target/arm/syndrome.h b/target/arm/syndrome.h
40
index XXXXXXX..XXXXXXX 100644
41
--- a/target/arm/syndrome.h
42
+++ b/target/arm/syndrome.h
43
@@ -XXX,XX +XXX,XX @@ static inline uint32_t syn_illegalstate(void)
44
return (EC_ILLEGALSTATE << ARM_EL_EC_SHIFT) | ARM_EL_IL;
29
}
45
}
30
46
31
+/*
47
+static inline uint32_t syn_pcalignment(void)
32
+ * Component parts of the XXH64 algorithm from
33
+ * https://github.com/Cyan4973/xxHash/blob/v0.8.0/xxhash.h
34
+ *
35
+ * The complete algorithm looks like
36
+ *
37
+ * i = 0;
38
+ * if (len >= 32) {
39
+ * v1 = seed + XXH_PRIME64_1 + XXH_PRIME64_2;
40
+ * v2 = seed + XXH_PRIME64_2;
41
+ * v3 = seed + 0;
42
+ * v4 = seed - XXH_PRIME64_1;
43
+ * do {
44
+ * v1 = XXH64_round(v1, get64bits(input + i));
45
+ * v2 = XXH64_round(v2, get64bits(input + i + 8));
46
+ * v3 = XXH64_round(v3, get64bits(input + i + 16));
47
+ * v4 = XXH64_round(v4, get64bits(input + i + 24));
48
+ * } while ((i += 32) <= len);
49
+ * h64 = XXH64_mergerounds(v1, v2, v3, v4);
50
+ * } else {
51
+ * h64 = seed + XXH_PRIME64_5;
52
+ * }
53
+ * h64 += len;
54
+ *
55
+ * for (; i + 8 <= len; i += 8) {
56
+ * h64 ^= XXH64_round(0, get64bits(input + i));
57
+ * h64 = rol64(h64, 27) * XXH_PRIME64_1 + XXH_PRIME64_4;
58
+ * }
59
+ * for (; i + 4 <= len; i += 4) {
60
+ * h64 ^= get32bits(input + i) * PRIME64_1;
61
+ * h64 = rol64(h64, 23) * XXH_PRIME64_2 + XXH_PRIME64_3;
62
+ * }
63
+ * for (; i < len; i += 1) {
64
+ * h64 ^= get8bits(input + i) * XXH_PRIME64_5;
65
+ * h64 = rol64(h64, 11) * XXH_PRIME64_1;
66
+ * }
67
+ *
68
+ * return XXH64_avalanche(h64)
69
+ *
70
+ * Exposing the pieces instead allows for simplified usage when
71
+ * the length is a known constant and the inputs are in registers.
72
+ */
73
+#define XXH_PRIME64_1 0x9E3779B185EBCA87ULL
74
+#define XXH_PRIME64_2 0xC2B2AE3D27D4EB4FULL
75
+#define XXH_PRIME64_3 0x165667B19E3779F9ULL
76
+#define XXH_PRIME64_4 0x85EBCA77C2B2AE63ULL
77
+#define XXH_PRIME64_5 0x27D4EB2F165667C5ULL
78
+
79
+static inline uint64_t XXH64_round(uint64_t acc, uint64_t input)
80
+{
48
+{
81
+ return rol64(acc + input * XXH_PRIME64_2, 31) * XXH_PRIME64_1;
49
+ return (EC_PCALIGNMENT << ARM_EL_EC_SHIFT) | ARM_EL_IL;
82
+}
50
+}
83
+
51
+
84
+static inline uint64_t XXH64_mergeround(uint64_t acc, uint64_t val)
52
#endif /* TARGET_ARM_SYNDROME_H */
53
diff --git a/linux-user/aarch64/cpu_loop.c b/linux-user/aarch64/cpu_loop.c
54
index XXXXXXX..XXXXXXX 100644
55
--- a/linux-user/aarch64/cpu_loop.c
56
+++ b/linux-user/aarch64/cpu_loop.c
57
@@ -XXX,XX +XXX,XX @@ void cpu_loop(CPUARMState *env)
58
break;
59
case EXCP_PREFETCH_ABORT:
60
case EXCP_DATA_ABORT:
61
- /* We should only arrive here with EC in {DATAABORT, INSNABORT}. */
62
ec = syn_get_ec(env->exception.syndrome);
63
- assert(ec == EC_DATAABORT || ec == EC_INSNABORT);
64
-
65
- /* Both EC have the same format for FSC, or close enough. */
66
- fsc = extract32(env->exception.syndrome, 0, 6);
67
- switch (fsc) {
68
- case 0x04 ... 0x07: /* Translation fault, level {0-3} */
69
- si_signo = TARGET_SIGSEGV;
70
- si_code = TARGET_SEGV_MAPERR;
71
+ switch (ec) {
72
+ case EC_DATAABORT:
73
+ case EC_INSNABORT:
74
+ /* Both EC have the same format for FSC, or close enough. */
75
+ fsc = extract32(env->exception.syndrome, 0, 6);
76
+ switch (fsc) {
77
+ case 0x04 ... 0x07: /* Translation fault, level {0-3} */
78
+ si_signo = TARGET_SIGSEGV;
79
+ si_code = TARGET_SEGV_MAPERR;
80
+ break;
81
+ case 0x09 ... 0x0b: /* Access flag fault, level {1-3} */
82
+ case 0x0d ... 0x0f: /* Permission fault, level {1-3} */
83
+ si_signo = TARGET_SIGSEGV;
84
+ si_code = TARGET_SEGV_ACCERR;
85
+ break;
86
+ case 0x11: /* Synchronous Tag Check Fault */
87
+ si_signo = TARGET_SIGSEGV;
88
+ si_code = TARGET_SEGV_MTESERR;
89
+ break;
90
+ case 0x21: /* Alignment fault */
91
+ si_signo = TARGET_SIGBUS;
92
+ si_code = TARGET_BUS_ADRALN;
93
+ break;
94
+ default:
95
+ g_assert_not_reached();
96
+ }
97
break;
98
- case 0x09 ... 0x0b: /* Access flag fault, level {1-3} */
99
- case 0x0d ... 0x0f: /* Permission fault, level {1-3} */
100
- si_signo = TARGET_SIGSEGV;
101
- si_code = TARGET_SEGV_ACCERR;
102
- break;
103
- case 0x11: /* Synchronous Tag Check Fault */
104
- si_signo = TARGET_SIGSEGV;
105
- si_code = TARGET_SEGV_MTESERR;
106
- break;
107
- case 0x21: /* Alignment fault */
108
+ case EC_PCALIGNMENT:
109
si_signo = TARGET_SIGBUS;
110
si_code = TARGET_BUS_ADRALN;
111
break;
112
diff --git a/target/arm/tlb_helper.c b/target/arm/tlb_helper.c
113
index XXXXXXX..XXXXXXX 100644
114
--- a/target/arm/tlb_helper.c
115
+++ b/target/arm/tlb_helper.c
116
@@ -XXX,XX +XXX,XX @@
117
#include "cpu.h"
118
#include "internals.h"
119
#include "exec/exec-all.h"
120
+#include "exec/helper-proto.h"
121
122
static inline uint32_t merge_syn_data_abort(uint32_t template_syn,
123
unsigned int target_el,
124
@@ -XXX,XX +XXX,XX @@ void arm_cpu_do_unaligned_access(CPUState *cs, vaddr vaddr,
125
arm_deliver_fault(cpu, vaddr, access_type, mmu_idx, &fi);
126
}
127
128
+void helper_exception_pc_alignment(CPUARMState *env, target_ulong pc)
85
+{
129
+{
86
+ return (acc ^ XXH64_round(0, val)) * XXH_PRIME64_1 + XXH_PRIME64_4;
130
+ ARMMMUFaultInfo fi = { .type = ARMFault_Alignment };
131
+ int target_el = exception_target_el(env);
132
+ int mmu_idx = cpu_mmu_index(env, true);
133
+ uint32_t fsc;
134
+
135
+ env->exception.vaddress = pc;
136
+
137
+ /*
138
+ * Note that the fsc is not applicable to this exception,
139
+ * since any syndrome is pcalignment not insn_abort.
140
+ */
141
+ env->exception.fsr = compute_fsr_fsc(env, &fi, target_el, mmu_idx, &fsc);
142
+ raise_exception(env, EXCP_PREFETCH_ABORT, syn_pcalignment(), target_el);
87
+}
143
+}
88
+
144
+
89
+static inline uint64_t XXH64_mergerounds(uint64_t v1, uint64_t v2,
145
#if !defined(CONFIG_USER_ONLY)
90
+ uint64_t v3, uint64_t v4)
146
91
+{
147
/*
92
+ uint64_t h64;
148
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
93
+
149
index XXXXXXX..XXXXXXX 100644
94
+ h64 = rol64(v1, 1) + rol64(v2, 7) + rol64(v3, 12) + rol64(v4, 18);
150
--- a/target/arm/translate-a64.c
95
+ h64 = XXH64_mergeround(h64, v1);
151
+++ b/target/arm/translate-a64.c
96
+ h64 = XXH64_mergeround(h64, v2);
152
@@ -XXX,XX +XXX,XX @@ static void aarch64_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu)
97
+ h64 = XXH64_mergeround(h64, v3);
153
uint64_t pc = s->base.pc_next;
98
+ h64 = XXH64_mergeround(h64, v4);
154
uint32_t insn;
99
+
155
100
+ return h64;
156
+ /* Singlestep exceptions have the highest priority. */
101
+}
157
if (s->ss_active && !s->pstate_ss) {
102
+
158
/* Singlestep state is Active-pending.
103
+static inline uint64_t XXH64_avalanche(uint64_t h64)
159
* If we're in this state at the start of a TB then either
104
+{
160
@@ -XXX,XX +XXX,XX @@ static void aarch64_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu)
105
+ h64 ^= h64 >> 33;
161
return;
106
+ h64 *= XXH_PRIME64_2;
162
}
107
+ h64 ^= h64 >> 29;
163
108
+ h64 *= XXH_PRIME64_3;
164
+ if (pc & 3) {
109
+ h64 ^= h64 >> 32;
165
+ /*
110
+ return h64;
166
+ * PC alignment fault. This has priority over the instruction abort
111
+}
167
+ * that we would receive from a translation fault via arm_ldl_code.
112
+
168
+ * This should only be possible after an indirect branch, at the
113
+static inline uint64_t qemu_xxhash64_4(uint64_t a, uint64_t b,
169
+ * start of the TB.
114
+ uint64_t c, uint64_t d)
170
+ */
115
+{
171
+ assert(s->base.num_insns == 1);
116
+ uint64_t v1 = QEMU_XXHASH_SEED + XXH_PRIME64_1 + XXH_PRIME64_2;
172
+ gen_helper_exception_pc_alignment(cpu_env, tcg_constant_tl(pc));
117
+ uint64_t v2 = QEMU_XXHASH_SEED + XXH_PRIME64_2;
173
+ s->base.is_jmp = DISAS_NORETURN;
118
+ uint64_t v3 = QEMU_XXHASH_SEED + 0;
174
+ s->base.pc_next = QEMU_ALIGN_UP(pc, 4);
119
+ uint64_t v4 = QEMU_XXHASH_SEED - XXH_PRIME64_1;
175
+ return;
120
+
121
+ v1 = XXH64_round(v1, a);
122
+ v2 = XXH64_round(v2, b);
123
+ v3 = XXH64_round(v3, c);
124
+ v4 = XXH64_round(v4, d);
125
+
126
+ return XXH64_avalanche(XXH64_mergerounds(v1, v2, v3, v4));
127
+}
128
+
129
#endif /* QEMU_XXHASH_H */
130
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
131
index XXXXXXX..XXXXXXX 100644
132
--- a/target/arm/cpu.h
133
+++ b/target/arm/cpu.h
134
@@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_fcma(const ARMISARegisters *id)
135
static inline bool isar_feature_aa64_pauth(const ARMISARegisters *id)
136
{
137
/*
138
- * Note that while QEMU will only implement the architected algorithm
139
- * QARMA, and thus APA+GPA, the host cpu for kvm may use implementation
140
- * defined algorithms, and thus API+GPI, and this predicate controls
141
- * migration of the 128-bit keys.
142
+ * Return true if any form of pauth is enabled, as this
143
+ * predicate controls migration of the 128-bit keys.
144
*/
145
return (id->id_aa64isar1 &
146
(FIELD_DP64(0, ID_AA64ISAR1, APA, 0xf) |
147
@@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_pauth(const ARMISARegisters *id)
148
FIELD_DP64(0, ID_AA64ISAR1, GPI, 0xf))) != 0;
149
}
150
151
+static inline bool isar_feature_aa64_pauth_arch(const ARMISARegisters *id)
152
+{
153
+ /*
154
+ * Return true if pauth is enabled with the architected QARMA algorithm.
155
+ * QEMU will always set APA+GPA to the same value.
156
+ */
157
+ return FIELD_EX64(id->id_aa64isar1, ID_AA64ISAR1, APA) != 0;
158
+}
159
+
160
static inline bool isar_feature_aa64_sb(const ARMISARegisters *id)
161
{
162
return FIELD_EX64(id->id_aa64isar1, ID_AA64ISAR1, SB) != 0;
163
diff --git a/target/arm/pauth_helper.c b/target/arm/pauth_helper.c
164
index XXXXXXX..XXXXXXX 100644
165
--- a/target/arm/pauth_helper.c
166
+++ b/target/arm/pauth_helper.c
167
@@ -XXX,XX +XXX,XX @@
168
#include "exec/cpu_ldst.h"
169
#include "exec/helper-proto.h"
170
#include "tcg/tcg-gvec-desc.h"
171
+#include "qemu/xxhash.h"
172
173
174
static uint64_t pac_cell_shuffle(uint64_t i)
175
@@ -XXX,XX +XXX,XX @@ static uint64_t tweak_inv_shuffle(uint64_t i)
176
return o;
177
}
178
179
-static uint64_t pauth_computepac(uint64_t data, uint64_t modifier,
180
- ARMPACKey key)
181
+static uint64_t pauth_computepac_architected(uint64_t data, uint64_t modifier,
182
+ ARMPACKey key)
183
{
184
static const uint64_t RC[5] = {
185
0x0000000000000000ull,
186
@@ -XXX,XX +XXX,XX @@ static uint64_t pauth_computepac(uint64_t data, uint64_t modifier,
187
return workingval;
188
}
189
190
+static uint64_t pauth_computepac_impdef(uint64_t data, uint64_t modifier,
191
+ ARMPACKey key)
192
+{
193
+ return qemu_xxhash64_4(data, modifier, key.lo, key.hi);
194
+}
195
+
196
+static uint64_t pauth_computepac(CPUARMState *env, uint64_t data,
197
+ uint64_t modifier, ARMPACKey key)
198
+{
199
+ if (cpu_isar_feature(aa64_pauth_arch, env_archcpu(env))) {
200
+ return pauth_computepac_architected(data, modifier, key);
201
+ } else {
202
+ return pauth_computepac_impdef(data, modifier, key);
203
+ }
176
+ }
204
+}
177
+
205
+
178
s->pc_curr = pc;
206
static uint64_t pauth_addpac(CPUARMState *env, uint64_t ptr, uint64_t modifier,
179
insn = arm_ldl_code(env, &s->base, pc, s->sctlr_b);
207
ARMPACKey *key, bool data)
180
s->insn = insn;
208
{
181
diff --git a/target/arm/translate.c b/target/arm/translate.c
209
@@ -XXX,XX +XXX,XX @@ static uint64_t pauth_addpac(CPUARMState *env, uint64_t ptr, uint64_t modifier,
182
index XXXXXXX..XXXXXXX 100644
210
bot_bit = 64 - param.tsz;
183
--- a/target/arm/translate.c
211
ext_ptr = deposit64(ptr, bot_bit, top_bit - bot_bit, ext);
184
+++ b/target/arm/translate.c
212
185
@@ -XXX,XX +XXX,XX @@ static void arm_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu)
213
- pac = pauth_computepac(ext_ptr, modifier, *key);
186
uint32_t pc = dc->base.pc_next;
214
+ pac = pauth_computepac(env, ext_ptr, modifier, *key);
187
unsigned int insn;
215
188
216
/*
189
- if (arm_check_ss_active(dc) || arm_check_kernelpage(dc)) {
217
* Check if the ptr has good extension bits and corrupt the
190
+ /* Singlestep exceptions have the highest priority. */
218
@@ -XXX,XX +XXX,XX @@ static uint64_t pauth_auth(CPUARMState *env, uint64_t ptr, uint64_t modifier,
191
+ if (arm_check_ss_active(dc)) {
219
uint64_t pac, orig_ptr, test;
192
+ dc->base.pc_next = pc + 4;
220
193
+ return;
221
orig_ptr = pauth_original_ptr(ptr, param);
194
+ }
222
- pac = pauth_computepac(orig_ptr, modifier, *key);
195
+
223
+ pac = pauth_computepac(env, orig_ptr, modifier, *key);
196
+ if (pc & 3) {
224
bot_bit = 64 - param.tsz;
197
+ /*
225
top_bit = 64 - 8 * param.tbi;
198
+ * PC alignment fault. This has priority over the instruction abort
226
199
+ * that we would receive from a translation fault via arm_ldl_code
227
@@ -XXX,XX +XXX,XX @@ uint64_t HELPER(pacga)(CPUARMState *env, uint64_t x, uint64_t y)
200
+ * (or the execution of the kernelpage entrypoint). This should only
228
uint64_t pac;
201
+ * be possible after an indirect branch, at the start of the TB.
229
202
+ */
230
pauth_check_trap(env, arm_current_el(env), GETPC());
203
+ assert(dc->base.num_insns == 1);
231
- pac = pauth_computepac(x, y, env->keys.apga);
204
+ gen_helper_exception_pc_alignment(cpu_env, tcg_constant_tl(pc));
232
+ pac = pauth_computepac(env, x, y, env->keys.apga);
205
+ dc->base.is_jmp = DISAS_NORETURN;
233
206
+ dc->base.pc_next = QEMU_ALIGN_UP(pc, 4);
234
return pac & 0xffffffff00000000ull;
207
+ return;
235
}
208
+ }
209
+
210
+ if (arm_check_kernelpage(dc)) {
211
dc->base.pc_next = pc + 4;
212
return;
213
}
236
--
214
--
237
2.20.1
215
2.25.1
238
216
239
217
diff view generated by jsdifflib
1
From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
This adds handling for the SCR_EL3.EEL2 bit.
3
Misaligned thumb PC is architecturally impossible.
4
Assert is better than proceeding, in case we've missed
5
something somewhere.
4
6
5
Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
7
Expand a comment about aligning the pc in gdbstub.
6
Message-id: 20210112104511.36576-17-remi.denis.courmont@huawei.com
8
Fail an incoming migrate if a thumb pc is misaligned.
7
[PMM: Applied fixes for review issues noted by RTH:
9
8
- check for FEATURE_AARCH64 before checking sel2 isar feature
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
- correct the commit message subject line]
11
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
10
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
13
---
13
target/arm/cpu.h | 8 ++++++--
14
target/arm/gdbstub.c | 9 +++++++--
14
target/arm/cpu.c | 2 +-
15
target/arm/machine.c | 10 ++++++++++
15
target/arm/helper.c | 19 ++++++++++++++++---
16
target/arm/translate.c | 3 +++
16
target/arm/translate.c | 15 +++++++++++++--
17
3 files changed, 20 insertions(+), 2 deletions(-)
17
4 files changed, 36 insertions(+), 8 deletions(-)
18
18
19
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
19
diff --git a/target/arm/gdbstub.c b/target/arm/gdbstub.c
20
index XXXXXXX..XXXXXXX 100644
20
index XXXXXXX..XXXXXXX 100644
21
--- a/target/arm/cpu.h
21
--- a/target/arm/gdbstub.c
22
+++ b/target/arm/cpu.h
22
+++ b/target/arm/gdbstub.c
23
@@ -XXX,XX +XXX,XX @@ static inline bool arm_is_secure(CPUARMState *env)
23
@@ -XXX,XX +XXX,XX @@ int arm_cpu_gdb_write_register(CPUState *cs, uint8_t *mem_buf, int n)
24
static inline bool arm_is_el2_enabled(CPUARMState *env)
24
25
{
25
tmp = ldl_p(mem_buf);
26
if (arm_feature(env, ARM_FEATURE_EL2)) {
26
27
- return !arm_is_secure_below_el3(env);
27
- /* Mask out low bit of PC to workaround gdb bugs. This will probably
28
+ if (arm_is_secure_below_el3(env)) {
28
- cause problems if we ever implement the Jazelle DBX extensions. */
29
+ return (env->cp15.scr_el3 & SCR_EEL2) != 0;
29
+ /*
30
+ }
30
+ * Mask out low bits of PC to workaround gdb bugs.
31
+ return true;
31
+ * This avoids an assert in thumb_tr_translate_insn, because it is
32
+ * architecturally impossible to misalign the pc.
33
+ * This will probably cause problems if we ever implement the
34
+ * Jazelle DBX extensions.
35
+ */
36
if (n == 15) {
37
tmp &= ~1;
32
}
38
}
33
return false;
39
diff --git a/target/arm/machine.c b/target/arm/machine.c
34
}
40
index XXXXXXX..XXXXXXX 100644
35
@@ -XXX,XX +XXX,XX @@ static inline bool arm_el_is_aa64(CPUARMState *env, int el)
41
--- a/target/arm/machine.c
36
return aa64;
42
+++ b/target/arm/machine.c
43
@@ -XXX,XX +XXX,XX @@ static int cpu_post_load(void *opaque, int version_id)
44
return -1;
45
}
37
}
46
}
38
47
+
39
- if (arm_feature(env, ARM_FEATURE_EL3)) {
48
+ /*
40
+ if (arm_feature(env, ARM_FEATURE_EL3) &&
49
+ * Misaligned thumb pc is architecturally impossible.
41
+ ((env->cp15.scr_el3 & SCR_NS) || !(env->cp15.scr_el3 & SCR_EEL2))) {
50
+ * We have an assert in thumb_tr_translate_insn to verify this.
42
aa64 = aa64 && (env->cp15.scr_el3 & SCR_RW);
51
+ * Fail an incoming migrate to avoid this assert.
52
+ */
53
+ if (!is_a64(env) && env->thumb && (env->regs[15] & 1)) {
54
+ return -1;
55
+ }
56
+
57
if (!kvm_enabled()) {
58
pmu_op_finish(&cpu->env);
43
}
59
}
44
45
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
46
index XXXXXXX..XXXXXXX 100644
47
--- a/target/arm/cpu.c
48
+++ b/target/arm/cpu.c
49
@@ -XXX,XX +XXX,XX @@ static inline bool arm_excp_unmasked(CPUState *cs, unsigned int excp_idx,
50
* masked from Secure state. The HCR and SCR settings
51
* don't affect the masking logic, only the interrupt routing.
52
*/
53
- if (target_el == 3 || !secure) {
54
+ if (target_el == 3 || !secure || (env->cp15.scr_el3 & SCR_EEL2)) {
55
unmasked = true;
56
}
57
} else {
58
diff --git a/target/arm/helper.c b/target/arm/helper.c
59
index XXXXXXX..XXXXXXX 100644
60
--- a/target/arm/helper.c
61
+++ b/target/arm/helper.c
62
@@ -XXX,XX +XXX,XX @@ static CPAccessResult access_trap_aa32s_el1(CPUARMState *env,
63
return CP_ACCESS_OK;
64
}
65
if (arm_is_secure_below_el3(env)) {
66
+ if (env->cp15.scr_el3 & SCR_EEL2) {
67
+ return CP_ACCESS_TRAP_EL2;
68
+ }
69
return CP_ACCESS_TRAP_EL3;
70
}
71
/* This will be EL1 NS and EL2 NS, which just UNDEF */
72
@@ -XXX,XX +XXX,XX @@ static void scr_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value)
73
if (cpu_isar_feature(aa64_pauth, cpu)) {
74
valid_mask |= SCR_API | SCR_APK;
75
}
76
+ if (cpu_isar_feature(aa64_sel2, cpu)) {
77
+ valid_mask |= SCR_EEL2;
78
+ }
79
if (cpu_isar_feature(aa64_mte, cpu)) {
80
valid_mask |= SCR_ATA;
81
}
82
@@ -XXX,XX +XXX,XX @@ static CPAccessResult ats_access(CPUARMState *env, const ARMCPRegInfo *ri,
83
bool isread)
84
{
85
if (ri->opc2 & 4) {
86
- /* The ATS12NSO* operations must trap to EL3 if executed in
87
+ /* The ATS12NSO* operations must trap to EL3 or EL2 if executed in
88
* Secure EL1 (which can only happen if EL3 is AArch64).
89
* They are simply UNDEF if executed from NS EL1.
90
* They function normally from EL2 or EL3.
91
*/
92
if (arm_current_el(env) == 1) {
93
if (arm_is_secure_below_el3(env)) {
94
+ if (env->cp15.scr_el3 & SCR_EEL2) {
95
+ return CP_ACCESS_TRAP_UNCATEGORIZED_EL2;
96
+ }
97
return CP_ACCESS_TRAP_UNCATEGORIZED_EL3;
98
}
99
return CP_ACCESS_TRAP_UNCATEGORIZED;
100
@@ -XXX,XX +XXX,XX @@ static void ats1h_write(CPUARMState *env, const ARMCPRegInfo *ri,
101
static CPAccessResult at_s1e2_access(CPUARMState *env, const ARMCPRegInfo *ri,
102
bool isread)
103
{
104
- if (arm_current_el(env) == 3 && !(env->cp15.scr_el3 & SCR_NS)) {
105
+ if (arm_current_el(env) == 3 &&
106
+ !(env->cp15.scr_el3 & (SCR_NS | SCR_EEL2))) {
107
return CP_ACCESS_TRAP;
108
}
109
return CP_ACCESS_OK;
110
@@ -XXX,XX +XXX,XX @@ static CPAccessResult nsacr_access(CPUARMState *env, const ARMCPRegInfo *ri,
111
bool isread)
112
{
113
/* The NSACR is RW at EL3, and RO for NS EL1 and NS EL2.
114
- * At Secure EL1 it traps to EL3.
115
+ * At Secure EL1 it traps to EL3 or EL2.
116
*/
117
if (arm_current_el(env) == 3) {
118
return CP_ACCESS_OK;
119
}
120
if (arm_is_secure_below_el3(env)) {
121
+ if (env->cp15.scr_el3 & SCR_EEL2) {
122
+ return CP_ACCESS_TRAP_EL2;
123
+ }
124
return CP_ACCESS_TRAP_EL3;
125
}
126
/* Accesses from EL1 NS and EL2 NS are UNDEF for write but allow reads. */
127
diff --git a/target/arm/translate.c b/target/arm/translate.c
60
diff --git a/target/arm/translate.c b/target/arm/translate.c
128
index XXXXXXX..XXXXXXX 100644
61
index XXXXXXX..XXXXXXX 100644
129
--- a/target/arm/translate.c
62
--- a/target/arm/translate.c
130
+++ b/target/arm/translate.c
63
+++ b/target/arm/translate.c
131
@@ -XXX,XX +XXX,XX @@ static bool msr_banked_access_decode(DisasContext *s, int r, int sysm, int rn,
64
@@ -XXX,XX +XXX,XX @@ static void thumb_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu)
132
}
65
uint32_t insn;
133
if (s->current_el == 1) {
66
bool is_16bit;
134
/* If we're in Secure EL1 (which implies that EL3 is AArch64)
67
135
- * then accesses to Mon registers trap to EL3
68
+ /* Misaligned thumb PC is architecturally impossible. */
136
+ * then accesses to Mon registers trap to Secure EL2, if it exists,
69
+ assert((dc->base.pc_next & 1) == 0);
137
+ * otherwise EL3.
138
*/
139
- TCGv_i32 tcg_el = tcg_const_i32(3);
140
+ TCGv_i32 tcg_el;
141
+
70
+
142
+ if (arm_dc_feature(s, ARM_FEATURE_AARCH64) &&
71
if (arm_check_ss_active(dc) || arm_check_kernelpage(dc)) {
143
+ dc_isar_feature(aa64_sel2, s)) {
72
dc->base.pc_next = pc + 2;
144
+ /* Target EL is EL<3 minus SCR_EL3.EEL2> */
73
return;
145
+ tcg_el = load_cpu_field(cp15.scr_el3);
146
+ tcg_gen_sextract_i32(tcg_el, tcg_el, ctz32(SCR_EEL2), 1);
147
+ tcg_gen_addi_i32(tcg_el, tcg_el, 3);
148
+ } else {
149
+ tcg_el = tcg_const_i32(3);
150
+ }
151
152
gen_exception_el(s, EXCP_UDEF, syn_uncategorized(), tcg_el);
153
tcg_temp_free_i32(tcg_el);
154
--
74
--
155
2.20.1
75
2.25.1
156
76
157
77
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
The crypto overhead of emulating pauth can be significant for
3
Both single-step and pc alignment faults have priority over
4
some workloads. Add two boolean properties that allows the
4
breakpoint exceptions.
5
feature to be turned off, on with the architected algorithm,
6
or on with an implementation defined algorithm.
7
5
8
We need two intermediate booleans to control the state while
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
parsing properties lest we clobber ID_AA64ISAR1 into an invalid
10
intermediate state.
11
12
Tested-by: Mark Rutland <mark.rutland@arm.com>
13
Reviewed-by: Andrew Jones <drjones@redhat.com>
14
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
15
Message-id: 20210111235740.462469-3-richard.henderson@linaro.org
16
[PMM: fixed docs typo, tweaked text to clarify that the impdef
17
algorithm is specific to QEMU]
18
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
19
---
9
---
20
docs/system/arm/cpu-features.rst | 21 +++++++++++++++++
10
target/arm/debug_helper.c | 23 +++++++++++++++++++++++
21
target/arm/cpu.h | 10 ++++++++
11
1 file changed, 23 insertions(+)
22
target/arm/cpu.c | 13 +++++++++++
23
target/arm/cpu64.c | 40 ++++++++++++++++++++++++++++----
24
target/arm/monitor.c | 1 +
25
tests/qtest/arm-cpu-features.c | 13 +++++++++++
26
6 files changed, 94 insertions(+), 4 deletions(-)
27
12
28
diff --git a/docs/system/arm/cpu-features.rst b/docs/system/arm/cpu-features.rst
13
diff --git a/target/arm/debug_helper.c b/target/arm/debug_helper.c
29
index XXXXXXX..XXXXXXX 100644
14
index XXXXXXX..XXXXXXX 100644
30
--- a/docs/system/arm/cpu-features.rst
15
--- a/target/arm/debug_helper.c
31
+++ b/docs/system/arm/cpu-features.rst
16
+++ b/target/arm/debug_helper.c
32
@@ -XXX,XX +XXX,XX @@ the list of KVM VCPU features and their descriptions.
17
@@ -XXX,XX +XXX,XX @@ bool arm_debug_check_breakpoint(CPUState *cs)
33
influence the guest scheduler behavior and/or be
18
{
34
exposed to the guest userspace.
19
ARMCPU *cpu = ARM_CPU(cs);
35
20
CPUARMState *env = &cpu->env;
36
+TCG VCPU Features
21
+ target_ulong pc;
37
+=================
22
int n;
38
+
23
39
+TCG VCPU features are CPU features that are specific to TCG.
24
/*
40
+Below is the list of TCG VCPU features and their descriptions.
25
@@ -XXX,XX +XXX,XX @@ bool arm_debug_check_breakpoint(CPUState *cs)
41
+
26
return false;
42
+ pauth Enable or disable `FEAT_Pauth`, pointer
27
}
43
+ authentication. By default, the feature is
28
44
+ enabled with `-cpu max`.
29
+ /*
45
+
30
+ * Single-step exceptions have priority over breakpoint exceptions.
46
+ pauth-impdef When `FEAT_Pauth` is enabled, either the
31
+ * If single-step state is active-pending, suppress the bp.
47
+ *impdef* (Implementation Defined) algorithm
32
+ */
48
+ is enabled or the *architected* QARMA algorithm
33
+ if (arm_singlestep_active(env) && !(env->pstate & PSTATE_SS)) {
49
+ is enabled. By default the impdef algorithm
34
+ return false;
50
+ is disabled, and QARMA is enabled.
35
+ }
51
+
52
+ The architected QARMA algorithm has good
53
+ cryptographic properties, but can be quite slow
54
+ to emulate. The impdef algorithm used by QEMU
55
+ is non-cryptographic but significantly faster.
56
+
57
SVE CPU Properties
58
==================
59
60
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
61
index XXXXXXX..XXXXXXX 100644
62
--- a/target/arm/cpu.h
63
+++ b/target/arm/cpu.h
64
@@ -XXX,XX +XXX,XX @@ typedef struct {
65
#ifdef TARGET_AARCH64
66
# define ARM_MAX_VQ 16
67
void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp);
68
+void arm_cpu_pauth_finalize(ARMCPU *cpu, Error **errp);
69
#else
70
# define ARM_MAX_VQ 1
71
static inline void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp) { }
72
+static inline void arm_cpu_pauth_finalize(ARMCPU *cpu, Error **errp) { }
73
#endif
74
75
typedef struct ARMVectorReg {
76
@@ -XXX,XX +XXX,XX @@ struct ARMCPU {
77
uint64_t reset_cbar;
78
uint32_t reset_auxcr;
79
bool reset_hivecs;
80
+
36
+
81
+ /*
37
+ /*
82
+ * Intermediate values used during property parsing.
38
+ * PC alignment faults have priority over breakpoint exceptions.
83
+ * Once finalized, the values should be read from ID_AA64ISAR1.
84
+ */
39
+ */
85
+ bool prop_pauth;
40
+ pc = is_a64(env) ? env->pc : env->regs[15];
86
+ bool prop_pauth_impdef;
41
+ if ((is_a64(env) || !env->thumb) && (pc & 3) != 0) {
87
+
42
+ return false;
88
/* DCZ blocksize, in log_2(words), ie low 4 bits of DCZID_EL0 */
89
uint32_t dcz_blocksize;
90
uint64_t rvbar;
91
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
92
index XXXXXXX..XXXXXXX 100644
93
--- a/target/arm/cpu.c
94
+++ b/target/arm/cpu.c
95
@@ -XXX,XX +XXX,XX @@ void arm_cpu_finalize_features(ARMCPU *cpu, Error **errp)
96
error_propagate(errp, local_err);
97
return;
98
}
99
+
100
+ /*
101
+ * KVM does not support modifications to this feature.
102
+ * We have not registered the cpu properties when KVM
103
+ * is in use, so the user will not be able to set them.
104
+ */
105
+ if (!kvm_enabled()) {
106
+ arm_cpu_pauth_finalize(cpu, &local_err);
107
+ if (local_err != NULL) {
108
+ error_propagate(errp, local_err);
109
+ return;
110
+ }
111
+ }
112
}
113
114
if (kvm_enabled()) {
115
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
116
index XXXXXXX..XXXXXXX 100644
117
--- a/target/arm/cpu64.c
118
+++ b/target/arm/cpu64.c
119
@@ -XXX,XX +XXX,XX @@
120
#include "sysemu/kvm.h"
121
#include "kvm_arm.h"
122
#include "qapi/visitor.h"
123
+#include "hw/qdev-properties.h"
124
+
125
126
#ifndef CONFIG_USER_ONLY
127
static uint64_t a57_a53_l2ctlr_read(CPUARMState *env, const ARMCPRegInfo *ri)
128
@@ -XXX,XX +XXX,XX @@ void aarch64_add_sve_properties(Object *obj)
129
}
130
}
131
132
+void arm_cpu_pauth_finalize(ARMCPU *cpu, Error **errp)
133
+{
134
+ int arch_val = 0, impdef_val = 0;
135
+ uint64_t t;
136
+
137
+ /* TODO: Handle HaveEnhancedPAC, HaveEnhancedPAC2, HaveFPAC. */
138
+ if (cpu->prop_pauth) {
139
+ if (cpu->prop_pauth_impdef) {
140
+ impdef_val = 1;
141
+ } else {
142
+ arch_val = 1;
143
+ }
144
+ } else if (cpu->prop_pauth_impdef) {
145
+ error_setg(errp, "cannot enable pauth-impdef without pauth");
146
+ error_append_hint(errp, "Add pauth=on to the CPU property list.\n");
147
+ }
43
+ }
148
+
44
+
149
+ t = cpu->isar.id_aa64isar1;
45
+ /*
150
+ t = FIELD_DP64(t, ID_AA64ISAR1, APA, arch_val);
46
+ * Instruction aborts have priority over breakpoint exceptions.
151
+ t = FIELD_DP64(t, ID_AA64ISAR1, GPA, arch_val);
47
+ * TODO: We would need to look up the page for PC and verify that
152
+ t = FIELD_DP64(t, ID_AA64ISAR1, API, impdef_val);
48
+ * it is present and executable.
153
+ t = FIELD_DP64(t, ID_AA64ISAR1, GPI, impdef_val);
49
+ */
154
+ cpu->isar.id_aa64isar1 = t;
155
+}
156
+
50
+
157
+static Property arm_cpu_pauth_property =
51
for (n = 0; n < ARRAY_SIZE(env->cpu_breakpoint); n++) {
158
+ DEFINE_PROP_BOOL("pauth", ARMCPU, prop_pauth, true);
52
if (bp_wp_matches(cpu, n, false)) {
159
+static Property arm_cpu_pauth_impdef_property =
53
return true;
160
+ DEFINE_PROP_BOOL("pauth-impdef", ARMCPU, prop_pauth_impdef, false);
161
+
162
/* -cpu max: if KVM is enabled, like -cpu host (best possible with this host);
163
* otherwise, a CPU with as many features enabled as our emulation supports.
164
* The version of '-cpu max' for qemu-system-arm is defined in cpu.c;
165
@@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj)
166
t = FIELD_DP64(t, ID_AA64ISAR1, DPB, 2);
167
t = FIELD_DP64(t, ID_AA64ISAR1, JSCVT, 1);
168
t = FIELD_DP64(t, ID_AA64ISAR1, FCMA, 1);
169
- t = FIELD_DP64(t, ID_AA64ISAR1, APA, 1); /* PAuth, architected only */
170
- t = FIELD_DP64(t, ID_AA64ISAR1, API, 0);
171
- t = FIELD_DP64(t, ID_AA64ISAR1, GPA, 1);
172
- t = FIELD_DP64(t, ID_AA64ISAR1, GPI, 0);
173
t = FIELD_DP64(t, ID_AA64ISAR1, SB, 1);
174
t = FIELD_DP64(t, ID_AA64ISAR1, SPECRES, 1);
175
t = FIELD_DP64(t, ID_AA64ISAR1, FRINTTS, 1);
176
@@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj)
177
cpu->ctr = 0x80038003; /* 32 byte I and D cacheline size, VIPT icache */
178
cpu->dcz_blocksize = 7; /* 512 bytes */
179
#endif
180
+
181
+ /* Default to PAUTH on, with the architected algorithm. */
182
+ qdev_property_add_static(DEVICE(obj), &arm_cpu_pauth_property);
183
+ qdev_property_add_static(DEVICE(obj), &arm_cpu_pauth_impdef_property);
184
}
185
186
aarch64_add_sve_properties(obj);
187
diff --git a/target/arm/monitor.c b/target/arm/monitor.c
188
index XXXXXXX..XXXXXXX 100644
189
--- a/target/arm/monitor.c
190
+++ b/target/arm/monitor.c
191
@@ -XXX,XX +XXX,XX @@ static const char *cpu_model_advertised_features[] = {
192
"sve640", "sve768", "sve896", "sve1024", "sve1152", "sve1280",
193
"sve1408", "sve1536", "sve1664", "sve1792", "sve1920", "sve2048",
194
"kvm-no-adjvtime", "kvm-steal-time",
195
+ "pauth", "pauth-impdef",
196
NULL
197
};
198
199
diff --git a/tests/qtest/arm-cpu-features.c b/tests/qtest/arm-cpu-features.c
200
index XXXXXXX..XXXXXXX 100644
201
--- a/tests/qtest/arm-cpu-features.c
202
+++ b/tests/qtest/arm-cpu-features.c
203
@@ -XXX,XX +XXX,XX @@ static void sve_tests_sve_off_kvm(const void *data)
204
qtest_quit(qts);
205
}
206
207
+static void pauth_tests_default(QTestState *qts, const char *cpu_type)
208
+{
209
+ assert_has_feature_enabled(qts, cpu_type, "pauth");
210
+ assert_has_feature_disabled(qts, cpu_type, "pauth-impdef");
211
+ assert_set_feature(qts, cpu_type, "pauth", false);
212
+ assert_set_feature(qts, cpu_type, "pauth", true);
213
+ assert_set_feature(qts, cpu_type, "pauth-impdef", true);
214
+ assert_set_feature(qts, cpu_type, "pauth-impdef", false);
215
+ assert_error(qts, cpu_type, "cannot enable pauth-impdef without pauth",
216
+ "{ 'pauth': false, 'pauth-impdef': true }");
217
+}
218
+
219
static void test_query_cpu_model_expansion(const void *data)
220
{
221
QTestState *qts;
222
@@ -XXX,XX +XXX,XX @@ static void test_query_cpu_model_expansion(const void *data)
223
assert_has_feature_enabled(qts, "cortex-a57", "aarch64");
224
225
sve_tests_default(qts, "max");
226
+ pauth_tests_default(qts, "max");
227
228
/* Test that features that depend on KVM generate errors without. */
229
assert_error(qts, "max",
230
--
54
--
231
2.20.1
55
2.25.1
232
56
233
57
diff view generated by jsdifflib
1
From: Mihai Carabas <mihai.carabas@oracle.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
To ease the PCI device addition in next patches, split the code as follows:
4
- generic code (read/write/setup) is being kept in pvpanic.c
5
- ISA dependent code moved to pvpanic-isa.c
6
7
Also, rename:
8
- ISA_PVPANIC_DEVICE -> PVPANIC_ISA_DEVICE.
9
- TYPE_PVPANIC -> TYPE_PVPANIC_ISA.
10
- MemoryRegion io -> mr.
11
- pvpanic_ioport_* in pvpanic_*.
12
13
Update the build system with the new files and config structure.
14
15
Signed-off-by: Mihai Carabas <mihai.carabas@oracle.com>
16
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
3
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
4
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
17
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
18
---
6
---
19
include/hw/misc/pvpanic.h | 23 +++++++++-
7
tests/tcg/aarch64/pcalign-a64.c | 37 +++++++++++++++++++++++++
20
hw/misc/pvpanic-isa.c | 94 +++++++++++++++++++++++++++++++++++++++
8
tests/tcg/arm/pcalign-a32.c | 46 +++++++++++++++++++++++++++++++
21
hw/misc/pvpanic.c | 85 +++--------------------------------
9
tests/tcg/aarch64/Makefile.target | 4 +--
22
hw/i386/Kconfig | 2 +-
10
tests/tcg/arm/Makefile.target | 4 +++
23
hw/misc/Kconfig | 6 ++-
11
4 files changed, 89 insertions(+), 2 deletions(-)
24
hw/misc/meson.build | 3 +-
12
create mode 100644 tests/tcg/aarch64/pcalign-a64.c
25
tests/qtest/meson.build | 2 +-
13
create mode 100644 tests/tcg/arm/pcalign-a32.c
26
7 files changed, 130 insertions(+), 85 deletions(-)
27
create mode 100644 hw/misc/pvpanic-isa.c
28
14
29
diff --git a/include/hw/misc/pvpanic.h b/include/hw/misc/pvpanic.h
15
diff --git a/tests/tcg/aarch64/pcalign-a64.c b/tests/tcg/aarch64/pcalign-a64.c
30
index XXXXXXX..XXXXXXX 100644
31
--- a/include/hw/misc/pvpanic.h
32
+++ b/include/hw/misc/pvpanic.h
33
@@ -XXX,XX +XXX,XX @@
34
35
#include "qom/object.h"
36
37
-#define TYPE_PVPANIC "pvpanic"
38
+#define TYPE_PVPANIC_ISA_DEVICE "pvpanic"
39
40
#define PVPANIC_IOPORT_PROP "ioport"
41
42
+/* The bit of supported pv event, TODO: include uapi header and remove this */
43
+#define PVPANIC_F_PANICKED 0
44
+#define PVPANIC_F_CRASHLOADED 1
45
+
46
+/* The pv event value */
47
+#define PVPANIC_PANICKED (1 << PVPANIC_F_PANICKED)
48
+#define PVPANIC_CRASHLOADED (1 << PVPANIC_F_CRASHLOADED)
49
+
50
+/*
51
+ * PVPanicState for any device type
52
+ */
53
+typedef struct PVPanicState PVPanicState;
54
+struct PVPanicState {
55
+ MemoryRegion mr;
56
+ uint8_t events;
57
+};
58
+
59
+void pvpanic_setup_io(PVPanicState *s, DeviceState *dev, unsigned size);
60
+
61
static inline uint16_t pvpanic_port(void)
62
{
63
- Object *o = object_resolve_path_type("", TYPE_PVPANIC, NULL);
64
+ Object *o = object_resolve_path_type("", TYPE_PVPANIC_ISA_DEVICE, NULL);
65
if (!o) {
66
return 0;
67
}
68
diff --git a/hw/misc/pvpanic-isa.c b/hw/misc/pvpanic-isa.c
69
new file mode 100644
16
new file mode 100644
70
index XXXXXXX..XXXXXXX
17
index XXXXXXX..XXXXXXX
71
--- /dev/null
18
--- /dev/null
72
+++ b/hw/misc/pvpanic-isa.c
19
+++ b/tests/tcg/aarch64/pcalign-a64.c
73
@@ -XXX,XX +XXX,XX @@
20
@@ -XXX,XX +XXX,XX @@
74
+/*
21
+/* Test PC misalignment exception */
75
+ * QEMU simulated pvpanic device.
76
+ *
77
+ * Copyright Fujitsu, Corp. 2013
78
+ *
79
+ * Authors:
80
+ * Wen Congyang <wency@cn.fujitsu.com>
81
+ * Hu Tao <hutao@cn.fujitsu.com>
82
+ *
83
+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
84
+ * See the COPYING file in the top-level directory.
85
+ *
86
+ */
87
+
22
+
88
+#include "qemu/osdep.h"
23
+#include <assert.h>
89
+#include "qemu/log.h"
24
+#include <signal.h>
90
+#include "qemu/module.h"
25
+#include <stdlib.h>
91
+#include "sysemu/runstate.h"
26
+#include <stdio.h>
92
+
27
+
93
+#include "hw/nvram/fw_cfg.h"
28
+static void *expected;
94
+#include "hw/qdev-properties.h"
95
+#include "hw/misc/pvpanic.h"
96
+#include "qom/object.h"
97
+#include "hw/isa/isa.h"
98
+
29
+
99
+OBJECT_DECLARE_SIMPLE_TYPE(PVPanicISAState, PVPANIC_ISA_DEVICE)
30
+static void sigbus(int sig, siginfo_t *info, void *vuc)
100
+
101
+/*
102
+ * PVPanicISAState for ISA device and
103
+ * use ioport.
104
+ */
105
+struct PVPanicISAState {
106
+ ISADevice parent_obj;
107
+
108
+ uint16_t ioport;
109
+ PVPanicState pvpanic;
110
+};
111
+
112
+static void pvpanic_isa_initfn(Object *obj)
113
+{
31
+{
114
+ PVPanicISAState *s = PVPANIC_ISA_DEVICE(obj);
32
+ assert(info->si_code == BUS_ADRALN);
115
+
33
+ assert(info->si_addr == expected);
116
+ pvpanic_setup_io(&s->pvpanic, DEVICE(s), 1);
34
+ exit(EXIT_SUCCESS);
117
+}
35
+}
118
+
36
+
119
+static void pvpanic_isa_realizefn(DeviceState *dev, Error **errp)
37
+int main()
120
+{
38
+{
121
+ ISADevice *d = ISA_DEVICE(dev);
39
+ void *tmp;
122
+ PVPanicISAState *s = PVPANIC_ISA_DEVICE(dev);
123
+ PVPanicState *ps = &s->pvpanic;
124
+ FWCfgState *fw_cfg = fw_cfg_find();
125
+ uint16_t *pvpanic_port;
126
+
40
+
127
+ if (!fw_cfg) {
41
+ struct sigaction sa = {
128
+ return;
42
+ .sa_sigaction = sigbus,
43
+ .sa_flags = SA_SIGINFO
44
+ };
45
+
46
+ if (sigaction(SIGBUS, &sa, NULL) < 0) {
47
+ perror("sigaction");
48
+ return EXIT_FAILURE;
129
+ }
49
+ }
130
+
50
+
131
+ pvpanic_port = g_malloc(sizeof(*pvpanic_port));
51
+ asm volatile("adr %0, 1f + 1\n\t"
132
+ *pvpanic_port = cpu_to_le16(s->ioport);
52
+ "str %0, %1\n\t"
133
+ fw_cfg_add_file(fw_cfg, "etc/pvpanic-port", pvpanic_port,
53
+ "br %0\n"
134
+ sizeof(*pvpanic_port));
54
+ "1:"
55
+ : "=&r"(tmp), "=m"(expected));
56
+ abort();
57
+}
58
diff --git a/tests/tcg/arm/pcalign-a32.c b/tests/tcg/arm/pcalign-a32.c
59
new file mode 100644
60
index XXXXXXX..XXXXXXX
61
--- /dev/null
62
+++ b/tests/tcg/arm/pcalign-a32.c
63
@@ -XXX,XX +XXX,XX @@
64
+/* Test PC misalignment exception */
135
+
65
+
136
+ isa_register_ioport(d, &ps->mr, s->ioport);
66
+#ifdef __thumb__
67
+#error "This test must be compiled for ARM"
68
+#endif
69
+
70
+#include <assert.h>
71
+#include <signal.h>
72
+#include <stdlib.h>
73
+#include <stdio.h>
74
+
75
+static void *expected;
76
+
77
+static void sigbus(int sig, siginfo_t *info, void *vuc)
78
+{
79
+ assert(info->si_code == BUS_ADRALN);
80
+ assert(info->si_addr == expected);
81
+ exit(EXIT_SUCCESS);
137
+}
82
+}
138
+
83
+
139
+static Property pvpanic_isa_properties[] = {
84
+int main()
140
+ DEFINE_PROP_UINT16(PVPANIC_IOPORT_PROP, PVPanicISAState, ioport, 0x505),
85
+{
141
+ DEFINE_PROP_UINT8("events", PVPanicISAState, pvpanic.events, PVPANIC_PANICKED | PVPANIC_CRASHLOADED),
86
+ void *tmp;
142
+ DEFINE_PROP_END_OF_LIST(),
143
+};
144
+
87
+
145
+static void pvpanic_isa_class_init(ObjectClass *klass, void *data)
88
+ struct sigaction sa = {
146
+{
89
+ .sa_sigaction = sigbus,
147
+ DeviceClass *dc = DEVICE_CLASS(klass);
90
+ .sa_flags = SA_SIGINFO
91
+ };
148
+
92
+
149
+ dc->realize = pvpanic_isa_realizefn;
93
+ if (sigaction(SIGBUS, &sa, NULL) < 0) {
150
+ device_class_set_props(dc, pvpanic_isa_properties);
94
+ perror("sigaction");
151
+ set_bit(DEVICE_CATEGORY_MISC, dc->categories);
95
+ return EXIT_FAILURE;
96
+ }
97
+
98
+ asm volatile("adr %0, 1f + 2\n\t"
99
+ "str %0, %1\n\t"
100
+ "bx %0\n"
101
+ "1:"
102
+ : "=&r"(tmp), "=m"(expected));
103
+
104
+ /*
105
+ * From v8, it is CONSTRAINED UNPREDICTABLE whether BXWritePC aligns
106
+ * the address or not. If so, we can legitimately fall through.
107
+ */
108
+ return EXIT_SUCCESS;
152
+}
109
+}
110
diff --git a/tests/tcg/aarch64/Makefile.target b/tests/tcg/aarch64/Makefile.target
111
index XXXXXXX..XXXXXXX 100644
112
--- a/tests/tcg/aarch64/Makefile.target
113
+++ b/tests/tcg/aarch64/Makefile.target
114
@@ -XXX,XX +XXX,XX @@ VPATH         += $(ARM_SRC)
115
AARCH64_SRC=$(SRC_PATH)/tests/tcg/aarch64
116
VPATH         += $(AARCH64_SRC)
117
118
-# Float-convert Tests
119
-AARCH64_TESTS=fcvt
120
+# Base architecture tests
121
+AARCH64_TESTS=fcvt pcalign-a64
122
123
fcvt: LDFLAGS+=-lm
124
125
diff --git a/tests/tcg/arm/Makefile.target b/tests/tcg/arm/Makefile.target
126
index XXXXXXX..XXXXXXX 100644
127
--- a/tests/tcg/arm/Makefile.target
128
+++ b/tests/tcg/arm/Makefile.target
129
@@ -XXX,XX +XXX,XX @@ run-fcvt: fcvt
130
    $(call run-test,fcvt,$(QEMU) $<,"$< on $(TARGET_NAME)")
131
    $(call diff-out,fcvt,$(ARM_SRC)/fcvt.ref)
132
133
+# PC alignment test
134
+ARM_TESTS += pcalign-a32
135
+pcalign-a32: CFLAGS+=-marm
153
+
136
+
154
+static TypeInfo pvpanic_isa_info = {
137
ifeq ($(CONFIG_ARM_COMPATIBLE_SEMIHOSTING),y)
155
+ .name = TYPE_PVPANIC_ISA_DEVICE,
138
156
+ .parent = TYPE_ISA_DEVICE,
139
# Semihosting smoke test for linux-user
157
+ .instance_size = sizeof(PVPanicISAState),
158
+ .instance_init = pvpanic_isa_initfn,
159
+ .class_init = pvpanic_isa_class_init,
160
+};
161
+
162
+static void pvpanic_register_types(void)
163
+{
164
+ type_register_static(&pvpanic_isa_info);
165
+}
166
+
167
+type_init(pvpanic_register_types)
168
diff --git a/hw/misc/pvpanic.c b/hw/misc/pvpanic.c
169
index XXXXXXX..XXXXXXX 100644
170
--- a/hw/misc/pvpanic.c
171
+++ b/hw/misc/pvpanic.c
172
@@ -XXX,XX +XXX,XX @@
173
#include "hw/misc/pvpanic.h"
174
#include "qom/object.h"
175
176
-/* The bit of supported pv event, TODO: include uapi header and remove this */
177
-#define PVPANIC_F_PANICKED 0
178
-#define PVPANIC_F_CRASHLOADED 1
179
-
180
-/* The pv event value */
181
-#define PVPANIC_PANICKED (1 << PVPANIC_F_PANICKED)
182
-#define PVPANIC_CRASHLOADED (1 << PVPANIC_F_CRASHLOADED)
183
-
184
-typedef struct PVPanicState PVPanicState;
185
-DECLARE_INSTANCE_CHECKER(PVPanicState, ISA_PVPANIC_DEVICE,
186
- TYPE_PVPANIC)
187
-
188
static void handle_event(int event)
189
{
190
static bool logged;
191
@@ -XXX,XX +XXX,XX @@ static void handle_event(int event)
192
}
193
}
194
195
-#include "hw/isa/isa.h"
196
-
197
-struct PVPanicState {
198
- ISADevice parent_obj;
199
-
200
- MemoryRegion io;
201
- uint16_t ioport;
202
- uint8_t events;
203
-};
204
-
205
/* return supported events on read */
206
-static uint64_t pvpanic_ioport_read(void *opaque, hwaddr addr, unsigned size)
207
+static uint64_t pvpanic_read(void *opaque, hwaddr addr, unsigned size)
208
{
209
PVPanicState *pvp = opaque;
210
return pvp->events;
211
}
212
213
-static void pvpanic_ioport_write(void *opaque, hwaddr addr, uint64_t val,
214
+static void pvpanic_write(void *opaque, hwaddr addr, uint64_t val,
215
unsigned size)
216
{
217
handle_event(val);
218
}
219
220
static const MemoryRegionOps pvpanic_ops = {
221
- .read = pvpanic_ioport_read,
222
- .write = pvpanic_ioport_write,
223
+ .read = pvpanic_read,
224
+ .write = pvpanic_write,
225
.impl = {
226
.min_access_size = 1,
227
.max_access_size = 1,
228
},
229
};
230
231
-static void pvpanic_isa_initfn(Object *obj)
232
+void pvpanic_setup_io(PVPanicState *s, DeviceState *dev, unsigned size)
233
{
234
- PVPanicState *s = ISA_PVPANIC_DEVICE(obj);
235
-
236
- memory_region_init_io(&s->io, OBJECT(s), &pvpanic_ops, s, "pvpanic", 1);
237
+ memory_region_init_io(&s->mr, OBJECT(dev), &pvpanic_ops, s, "pvpanic", size);
238
}
239
-
240
-static void pvpanic_isa_realizefn(DeviceState *dev, Error **errp)
241
-{
242
- ISADevice *d = ISA_DEVICE(dev);
243
- PVPanicState *s = ISA_PVPANIC_DEVICE(dev);
244
- FWCfgState *fw_cfg = fw_cfg_find();
245
- uint16_t *pvpanic_port;
246
-
247
- if (!fw_cfg) {
248
- return;
249
- }
250
-
251
- pvpanic_port = g_malloc(sizeof(*pvpanic_port));
252
- *pvpanic_port = cpu_to_le16(s->ioport);
253
- fw_cfg_add_file(fw_cfg, "etc/pvpanic-port", pvpanic_port,
254
- sizeof(*pvpanic_port));
255
-
256
- isa_register_ioport(d, &s->io, s->ioport);
257
-}
258
-
259
-static Property pvpanic_isa_properties[] = {
260
- DEFINE_PROP_UINT16(PVPANIC_IOPORT_PROP, PVPanicState, ioport, 0x505),
261
- DEFINE_PROP_UINT8("events", PVPanicState, events, PVPANIC_PANICKED | PVPANIC_CRASHLOADED),
262
- DEFINE_PROP_END_OF_LIST(),
263
-};
264
-
265
-static void pvpanic_isa_class_init(ObjectClass *klass, void *data)
266
-{
267
- DeviceClass *dc = DEVICE_CLASS(klass);
268
-
269
- dc->realize = pvpanic_isa_realizefn;
270
- device_class_set_props(dc, pvpanic_isa_properties);
271
- set_bit(DEVICE_CATEGORY_MISC, dc->categories);
272
-}
273
-
274
-static TypeInfo pvpanic_isa_info = {
275
- .name = TYPE_PVPANIC,
276
- .parent = TYPE_ISA_DEVICE,
277
- .instance_size = sizeof(PVPanicState),
278
- .instance_init = pvpanic_isa_initfn,
279
- .class_init = pvpanic_isa_class_init,
280
-};
281
-
282
-static void pvpanic_register_types(void)
283
-{
284
- type_register_static(&pvpanic_isa_info);
285
-}
286
-
287
-type_init(pvpanic_register_types)
288
diff --git a/hw/i386/Kconfig b/hw/i386/Kconfig
289
index XXXXXXX..XXXXXXX 100644
290
--- a/hw/i386/Kconfig
291
+++ b/hw/i386/Kconfig
292
@@ -XXX,XX +XXX,XX @@ config PC
293
imply ISA_DEBUG
294
imply PARALLEL
295
imply PCI_DEVICES
296
- imply PVPANIC
297
+ imply PVPANIC_ISA
298
imply QXL
299
imply SEV
300
imply SGA
301
diff --git a/hw/misc/Kconfig b/hw/misc/Kconfig
302
index XXXXXXX..XXXXXXX 100644
303
--- a/hw/misc/Kconfig
304
+++ b/hw/misc/Kconfig
305
@@ -XXX,XX +XXX,XX @@ config IOTKIT_SYSCTL
306
config IOTKIT_SYSINFO
307
bool
308
309
-config PVPANIC
310
+config PVPANIC_COMMON
311
+ bool
312
+
313
+config PVPANIC_ISA
314
bool
315
depends on ISA_BUS
316
+ select PVPANIC_COMMON
317
318
config AUX
319
bool
320
diff --git a/hw/misc/meson.build b/hw/misc/meson.build
321
index XXXXXXX..XXXXXXX 100644
322
--- a/hw/misc/meson.build
323
+++ b/hw/misc/meson.build
324
@@ -XXX,XX +XXX,XX @@ softmmu_ss.add(when: 'CONFIG_EMC141X', if_true: files('emc141x.c'))
325
softmmu_ss.add(when: 'CONFIG_UNIMP', if_true: files('unimp.c'))
326
softmmu_ss.add(when: 'CONFIG_EMPTY_SLOT', if_true: files('empty_slot.c'))
327
softmmu_ss.add(when: 'CONFIG_LED', if_true: files('led.c'))
328
+softmmu_ss.add(when: 'CONFIG_PVPANIC_COMMON', if_true: files('pvpanic.c'))
329
330
# ARM devices
331
softmmu_ss.add(when: 'CONFIG_PL310', if_true: files('arm_l2x0.c'))
332
@@ -XXX,XX +XXX,XX @@ softmmu_ss.add(when: 'CONFIG_IOTKIT_SYSINFO', if_true: files('iotkit-sysinfo.c')
333
softmmu_ss.add(when: 'CONFIG_ARMSSE_CPUID', if_true: files('armsse-cpuid.c'))
334
softmmu_ss.add(when: 'CONFIG_ARMSSE_MHU', if_true: files('armsse-mhu.c'))
335
336
-softmmu_ss.add(when: 'CONFIG_PVPANIC', if_true: files('pvpanic.c'))
337
+softmmu_ss.add(when: 'CONFIG_PVPANIC_ISA', if_true: files('pvpanic-isa.c'))
338
softmmu_ss.add(when: 'CONFIG_AUX', if_true: files('auxbus.c'))
339
softmmu_ss.add(when: 'CONFIG_ASPEED_SOC', if_true: files('aspeed_scu.c', 'aspeed_sdmc.c', 'aspeed_xdma.c'))
340
softmmu_ss.add(when: 'CONFIG_MSF2', if_true: files('msf2-sysreg.c'))
341
diff --git a/tests/qtest/meson.build b/tests/qtest/meson.build
342
index XXXXXXX..XXXXXXX 100644
343
--- a/tests/qtest/meson.build
344
+++ b/tests/qtest/meson.build
345
@@ -XXX,XX +XXX,XX @@ qtests_i386 = \
346
(config_host.has_key('CONFIG_LINUX') and \
347
config_all_devices.has_key('CONFIG_ISA_IPMI_BT') ? ['ipmi-bt-test'] : []) + \
348
(config_all_devices.has_key('CONFIG_WDT_IB700') ? ['wdt_ib700-test'] : []) + \
349
- (config_all_devices.has_key('CONFIG_PVPANIC') ? ['pvpanic-test'] : []) + \
350
+ (config_all_devices.has_key('CONFIG_PVPANIC_ISA') ? ['pvpanic-test'] : []) + \
351
(config_all_devices.has_key('CONFIG_HDA') ? ['intel-hda-test'] : []) + \
352
(config_all_devices.has_key('CONFIG_I82801B11') ? ['i82801b11-test'] : []) + \
353
(config_all_devices.has_key('CONFIG_IOH3420') ? ['ioh3420-test'] : []) + \
354
--
140
--
355
2.20.1
141
2.25.1
356
142
357
143
diff view generated by jsdifflib
1
From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
1
In the SSE decode function gen_sse(), we combine a byte
2
'b' and a value 'b1' which can be [0..3], and switch on them:
3
b |= (b1 << 8);
4
switch (b) {
5
...
6
default:
7
unknown_op:
8
gen_unknown_opcode(env, s);
9
return;
10
}
2
11
3
Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
12
In three cases inside this switch, we were then also checking for
13
"if (b1 >= 2) { goto unknown_op; }".
14
However, this can never happen, because the 'case' values in each place
15
are 0x0nn or 0x1nn and the switch will have directed the b1 == (2, 3)
16
cases to the default already.
17
18
This check was added in commit c045af25a52e9 in 2010; the added code
19
was unnecessary then as well, and was apparently intended only to
20
ensure that we never accidentally ended up indexing off the end
21
of an sse_op_table with only 2 entries as a result of future bugs
22
in the decode logic.
23
24
Change the checks to assert() instead, and make sure they're always
25
immediately before the array access they are protecting.
26
27
Fixes: Coverity CID 1460207
28
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
4
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
29
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
5
Message-id: 20210112104511.36576-12-remi.denis.courmont@huawei.com
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
---
30
---
8
target/arm/helper.c | 12 ++++++++++++
31
target/i386/tcg/translate.c | 12 +++---------
9
1 file changed, 12 insertions(+)
32
1 file changed, 3 insertions(+), 9 deletions(-)
10
33
11
diff --git a/target/arm/helper.c b/target/arm/helper.c
34
diff --git a/target/i386/tcg/translate.c b/target/i386/tcg/translate.c
12
index XXXXXXX..XXXXXXX 100644
35
index XXXXXXX..XXXXXXX 100644
13
--- a/target/arm/helper.c
36
--- a/target/i386/tcg/translate.c
14
+++ b/target/arm/helper.c
37
+++ b/target/i386/tcg/translate.c
15
@@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx,
38
@@ -XXX,XX +XXX,XX @@ static void gen_sse(CPUX86State *env, DisasContext *s, int b,
16
fi->s1ptw = true;
39
case 0x171: /* shift xmm, im */
17
return ~0;
40
case 0x172:
18
}
41
case 0x173:
19
+
42
- if (b1 >= 2) {
20
+ if (arm_is_secure_below_el3(env)) {
43
- goto unknown_op;
21
+ /* Check if page table walk is to secure or non-secure PA space. */
44
- }
22
+ if (*is_secure) {
45
val = x86_ldub_code(env, s);
23
+ *is_secure = !(env->cp15.vstcr_el2.raw_tcr & VSTCR_SW);
46
if (is_xmm) {
24
+ } else {
47
tcg_gen_movi_tl(s->T0, val);
25
+ *is_secure = !(env->cp15.vtcr_el2.raw_tcr & VTCR_NSW);
48
@@ -XXX,XX +XXX,XX @@ static void gen_sse(CPUX86State *env, DisasContext *s, int b,
26
+ }
49
offsetof(CPUX86State, mmx_t0.MMX_L(1)));
27
+ } else {
50
op1_offset = offsetof(CPUX86State,mmx_t0);
28
+ assert(!*is_secure);
51
}
29
+ }
52
+ assert(b1 < 2);
30
+
53
sse_fn_epp = sse_op_table2[((b - 1) & 3) * 8 +
31
addr = s2pa;
54
(((modrm >> 3)) & 7)][b1];
32
}
55
if (!sse_fn_epp) {
33
return addr;
56
@@ -XXX,XX +XXX,XX @@ static void gen_sse(CPUX86State *env, DisasContext *s, int b,
57
rm = modrm & 7;
58
reg = ((modrm >> 3) & 7) | REX_R(s);
59
mod = (modrm >> 6) & 3;
60
- if (b1 >= 2) {
61
- goto unknown_op;
62
- }
63
64
+ assert(b1 < 2);
65
sse_fn_epp = sse_op_table6[b].op[b1];
66
if (!sse_fn_epp) {
67
goto unknown_op;
68
@@ -XXX,XX +XXX,XX @@ static void gen_sse(CPUX86State *env, DisasContext *s, int b,
69
rm = modrm & 7;
70
reg = ((modrm >> 3) & 7) | REX_R(s);
71
mod = (modrm >> 6) & 3;
72
- if (b1 >= 2) {
73
- goto unknown_op;
74
- }
75
76
+ assert(b1 < 2);
77
sse_fn_eppi = sse_op_table7[b].op[b1];
78
if (!sse_fn_eppi) {
79
goto unknown_op;
34
--
80
--
35
2.20.1
81
2.25.1
36
82
37
83
diff view generated by jsdifflib
1
From: Mihai Carabas <mihai.carabas@oracle.com>
1
The qemu-common.h header is not supposed to be included from any
2
other header files, only from .c files (as documented in a comment at
3
the start of it).
2
4
3
Add pvpanic PCI device support details in docs/specs/pvpanic.txt.
5
include/hw/i386/x86.h and include/hw/i386/microvm.h break this rule.
6
In fact, the include is not required at all, so we can just drop it
7
from both files.
4
8
5
Signed-off-by: Mihai Carabas <mihai.carabas@oracle.com>
6
[fixed s/device/bus/ error]
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
11
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
12
Message-id: 20211129200510.1233037-2-peter.maydell@linaro.org
9
---
13
---
10
docs/specs/pvpanic.txt | 13 ++++++++++++-
14
include/hw/i386/microvm.h | 1 -
11
1 file changed, 12 insertions(+), 1 deletion(-)
15
include/hw/i386/x86.h | 1 -
16
2 files changed, 2 deletions(-)
12
17
13
diff --git a/docs/specs/pvpanic.txt b/docs/specs/pvpanic.txt
18
diff --git a/include/hw/i386/microvm.h b/include/hw/i386/microvm.h
14
index XXXXXXX..XXXXXXX 100644
19
index XXXXXXX..XXXXXXX 100644
15
--- a/docs/specs/pvpanic.txt
20
--- a/include/hw/i386/microvm.h
16
+++ b/docs/specs/pvpanic.txt
21
+++ b/include/hw/i386/microvm.h
17
@@ -XXX,XX +XXX,XX @@
22
@@ -XXX,XX +XXX,XX @@
18
PVPANIC DEVICE
23
#ifndef HW_I386_MICROVM_H
19
==============
24
#define HW_I386_MICROVM_H
20
25
21
-pvpanic device is a simulated ISA device, through which a guest panic
26
-#include "qemu-common.h"
22
+pvpanic device is a simulated device, through which a guest panic
27
#include "exec/hwaddr.h"
23
event is sent to qemu, and a QMP event is generated. This allows
28
#include "qemu/notify.h"
24
management apps (e.g. libvirt) to be notified and respond to the event.
29
25
30
diff --git a/include/hw/i386/x86.h b/include/hw/i386/x86.h
26
@@ -XXX,XX +XXX,XX @@ The management app has the option of waiting for GUEST_PANICKED events,
31
index XXXXXXX..XXXXXXX 100644
27
and/or polling for guest-panicked RunState, to learn when the pvpanic
32
--- a/include/hw/i386/x86.h
28
device has fired a panic event.
33
+++ b/include/hw/i386/x86.h
29
34
@@ -XXX,XX +XXX,XX @@
30
+The pvpanic device can be implemented as an ISA device (using IOPORT) or as a
35
#ifndef HW_I386_X86_H
31
+PCI device.
36
#define HW_I386_X86_H
32
+
37
33
ISA Interface
38
-#include "qemu-common.h"
34
-------------
39
#include "exec/hwaddr.h"
35
40
#include "qemu/notify.h"
36
@@ -XXX,XX +XXX,XX @@ bit 1: a guest panic has happened and will be handled by the guest;
37
the host should record it or report it, but should not affect
38
the execution of the guest.
39
40
+PCI Interface
41
+-------------
42
+
43
+The PCI interface is similar to the ISA interface except that it uses an MMIO
44
+address space provided by its BAR0, 1 byte long. Any machine with a PCI bus
45
+can enable a pvpanic device by adding '-device pvpanic-pci' to the command
46
+line.
47
+
48
ACPI Interface
49
--------------
50
41
51
--
42
--
52
2.20.1
43
2.25.1
53
44
54
45
diff view generated by jsdifflib
1
From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
1
The qemu-common.h header is not supposed to be included from any
2
other header files, only from .c files (as documented in a comment at
3
the start of it).
2
4
3
Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
5
Move the include to linux-user/hexagon/cpu_loop.c, which needs it for
6
the declaration of cpu_exec_step_atomic().
7
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
4
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
9
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
5
Message-id: 20210112104511.36576-9-remi.denis.courmont@huawei.com
10
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Reviewed-by: Taylor Simpson <tsimpson@quicinc.com>
12
Message-id: 20211129200510.1233037-3-peter.maydell@linaro.org
7
---
13
---
8
target/arm/cpu.h | 7 +++++++
14
target/hexagon/cpu.h | 1 -
9
target/arm/helper.c | 24 ++++++++++++++++++++++++
15
linux-user/hexagon/cpu_loop.c | 1 +
10
2 files changed, 31 insertions(+)
16
2 files changed, 1 insertion(+), 1 deletion(-)
11
17
12
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
18
diff --git a/target/hexagon/cpu.h b/target/hexagon/cpu.h
13
index XXXXXXX..XXXXXXX 100644
19
index XXXXXXX..XXXXXXX 100644
14
--- a/target/arm/cpu.h
20
--- a/target/hexagon/cpu.h
15
+++ b/target/arm/cpu.h
21
+++ b/target/hexagon/cpu.h
16
@@ -XXX,XX +XXX,XX @@ typedef struct {
22
@@ -XXX,XX +XXX,XX @@ typedef struct CPUHexagonState CPUHexagonState;
17
uint32_t base_mask;
23
18
} TCR;
24
#include "fpu/softfloat-types.h"
19
25
20
+#define VTCR_NSW (1u << 29)
26
-#include "qemu-common.h"
21
+#define VTCR_NSA (1u << 30)
27
#include "exec/cpu-defs.h"
22
+#define VSTCR_SW VTCR_NSW
28
#include "hex_regs.h"
23
+#define VSTCR_SA VTCR_NSA
29
#include "mmvec/mmvec.h"
24
+
30
diff --git a/linux-user/hexagon/cpu_loop.c b/linux-user/hexagon/cpu_loop.c
25
/* Define a maximum sized vector register.
26
* For 32-bit, this is a 128-bit NEON/AdvSIMD register.
27
* For 64-bit, this is a 2048-bit SVE register.
28
@@ -XXX,XX +XXX,XX @@ typedef struct CPUARMState {
29
uint64_t ttbr1_el[4];
30
};
31
uint64_t vttbr_el2; /* Virtualization Translation Table Base. */
32
+ uint64_t vsttbr_el2; /* Secure Virtualization Translation Table. */
33
/* MMU translation table base control. */
34
TCR tcr_el[4];
35
TCR vtcr_el2; /* Virtualization Translation Control. */
36
+ TCR vstcr_el2; /* Secure Virtualization Translation Control. */
37
uint32_t c2_data; /* MPU data cacheable bits. */
38
uint32_t c2_insn; /* MPU instruction cacheable bits. */
39
union { /* MMU domain access control register
40
diff --git a/target/arm/helper.c b/target/arm/helper.c
41
index XXXXXXX..XXXXXXX 100644
31
index XXXXXXX..XXXXXXX 100644
42
--- a/target/arm/helper.c
32
--- a/linux-user/hexagon/cpu_loop.c
43
+++ b/target/arm/helper.c
33
+++ b/linux-user/hexagon/cpu_loop.c
44
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo el2_v8_cp_reginfo[] = {
34
@@ -XXX,XX +XXX,XX @@
45
REGINFO_SENTINEL
35
*/
46
};
36
47
37
#include "qemu/osdep.h"
48
+static CPAccessResult sel2_access(CPUARMState *env, const ARMCPRegInfo *ri,
38
+#include "qemu-common.h"
49
+ bool isread)
39
#include "qemu.h"
50
+{
40
#include "user-internals.h"
51
+ if (arm_current_el(env) == 3 || arm_is_secure_below_el3(env)) {
41
#include "cpu_loop-common.h"
52
+ return CP_ACCESS_OK;
53
+ }
54
+ return CP_ACCESS_TRAP_UNCATEGORIZED;
55
+}
56
+
57
+static const ARMCPRegInfo el2_sec_cp_reginfo[] = {
58
+ { .name = "VSTTBR_EL2", .state = ARM_CP_STATE_AA64,
59
+ .opc0 = 3, .opc1 = 4, .crn = 2, .crm = 6, .opc2 = 0,
60
+ .access = PL2_RW, .accessfn = sel2_access,
61
+ .fieldoffset = offsetof(CPUARMState, cp15.vsttbr_el2) },
62
+ { .name = "VSTCR_EL2", .state = ARM_CP_STATE_AA64,
63
+ .opc0 = 3, .opc1 = 4, .crn = 2, .crm = 6, .opc2 = 2,
64
+ .access = PL2_RW, .accessfn = sel2_access,
65
+ .fieldoffset = offsetof(CPUARMState, cp15.vstcr_el2) },
66
+ REGINFO_SENTINEL
67
+};
68
+
69
static CPAccessResult nsacr_access(CPUARMState *env, const ARMCPRegInfo *ri,
70
bool isread)
71
{
72
@@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu)
73
if (arm_feature(env, ARM_FEATURE_V8)) {
74
define_arm_cp_regs(cpu, el2_v8_cp_reginfo);
75
}
76
+ if (cpu_isar_feature(aa64_sel2, cpu)) {
77
+ define_arm_cp_regs(cpu, el2_sec_cp_reginfo);
78
+ }
79
/* RVBAR_EL2 is only implemented if EL2 is the highest EL */
80
if (!arm_feature(env, ARM_FEATURE_EL3)) {
81
ARMCPRegInfo rvbar = {
82
--
42
--
83
2.20.1
43
2.25.1
84
44
85
45
diff view generated by jsdifflib
1
When we first converted our documentation to Sphinx, we split it into
1
The qemu-common.h header is not supposed to be included from any
2
multiple manuals (system, interop, tools, etc), which are all built
2
other header files, only from .c files (as documented in a comment at
3
separately. The primary driver for this was wanting to be able to
3
the start of it).
4
avoid shipping the 'devel' manual to end-users. However, this is
5
working against the grain of the way Sphinx wants to be used and
6
causes some annoyances:
7
* Cross-references between documents become much harder or
8
possibly impossible
9
* There is no single index to the whole documentation
10
* Within one manual there's no links or table-of-contents info
11
that lets you easily navigate to the others
12
* The devel manual doesn't get published on the QEMU website
13
(it would be nice to able to refer to it there)
14
4
15
Merely hiding our developer documentation from end users seems like
5
Nothing actually relies on target/rx/cpu.h including it, so we can
16
it's not enough benefit for these costs. Combine all the
6
just drop the include.
17
documentation into a single manual (the same way that the readthedocs
18
site builds it) and install the whole thing. The previous manual
19
divisions remain as the new top level sections in the manual.
20
21
* The per-manual conf.py files are no longer needed
22
* The man_pages[] specifications previously in each per-manual
23
conf.py move to the top level conf.py
24
* docs/meson.build logic is simplified as we now only need to run
25
Sphinx once for the HTML and then once for the manpages5B
26
* The old index.html.in that produced the top-level page with
27
links to each manual is no longer needed
28
29
Unfortunately this means that we now have to build the HTML
30
documentation into docs/manual in the build tree rather than directly
31
into docs/; otherwise it is too awkward to ensure we install only the
32
built manual and not also the dependency info, stamp file, etc. The
33
manual still ends up in the same place in the final installed
34
directory, but anybody who was consulting documentation from within
35
the build tree will have to adjust where they're looking.
36
7
37
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
38
Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
9
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
39
Message-id: 20210115154449.4801-1-peter.maydell@linaro.org
10
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
11
Reviewed-by: Taylor Simpson <tsimpson@quicinc.com>
12
Reviewed-by: Yoshinori Sato <ysato@users.sourceforge.jp>
13
Message-id: 20211129200510.1233037-4-peter.maydell@linaro.org
40
---
14
---
41
docs/conf.py | 46 ++++++++++++++++++++++++++++++-
15
target/rx/cpu.h | 1 -
42
docs/devel/conf.py | 15 -----------
16
1 file changed, 1 deletion(-)
43
docs/index.html.in | 17 ------------
44
docs/interop/conf.py | 28 -------------------
45
docs/meson.build | 64 +++++++++++++++++---------------------------
46
docs/specs/conf.py | 16 -----------
47
docs/system/conf.py | 28 -------------------
48
docs/tools/conf.py | 37 -------------------------
49
docs/user/conf.py | 15 -----------
50
.gitlab-ci.yml | 4 +--
51
10 files changed, 72 insertions(+), 198 deletions(-)
52
delete mode 100644 docs/devel/conf.py
53
delete mode 100644 docs/index.html.in
54
delete mode 100644 docs/interop/conf.py
55
delete mode 100644 docs/specs/conf.py
56
delete mode 100644 docs/system/conf.py
57
delete mode 100644 docs/tools/conf.py
58
delete mode 100644 docs/user/conf.py
59
17
60
diff --git a/docs/conf.py b/docs/conf.py
18
diff --git a/target/rx/cpu.h b/target/rx/cpu.h
61
index XXXXXXX..XXXXXXX 100644
19
index XXXXXXX..XXXXXXX 100644
62
--- a/docs/conf.py
20
--- a/target/rx/cpu.h
63
+++ b/docs/conf.py
21
+++ b/target/rx/cpu.h
64
@@ -XXX,XX +XXX,XX @@ latex_documents = [
65
66
# -- Options for manual page output ---------------------------------------
67
# Individual manual/conf.py can override this to create man pages
68
-man_pages = []
69
+man_pages = [
70
+ ('interop/qemu-ga', 'qemu-ga',
71
+ 'QEMU Guest Agent',
72
+ ['Michael Roth <mdroth@linux.vnet.ibm.com>'], 8),
73
+ ('interop/qemu-ga-ref', 'qemu-ga-ref',
74
+ 'QEMU Guest Agent Protocol Reference',
75
+ [], 7),
76
+ ('interop/qemu-qmp-ref', 'qemu-qmp-ref',
77
+ 'QEMU QMP Reference Manual',
78
+ [], 7),
79
+ ('interop/qemu-storage-daemon-qmp-ref', 'qemu-storage-daemon-qmp-ref',
80
+ 'QEMU Storage Daemon QMP Reference Manual',
81
+ [], 7),
82
+ ('system/qemu-manpage', 'qemu',
83
+ 'QEMU User Documentation',
84
+ ['Fabrice Bellard'], 1),
85
+ ('system/qemu-block-drivers', 'qemu-block-drivers',
86
+ 'QEMU block drivers reference',
87
+ ['Fabrice Bellard and the QEMU Project developers'], 7),
88
+ ('system/qemu-cpu-models', 'qemu-cpu-models',
89
+ 'QEMU CPU Models',
90
+ ['The QEMU Project developers'], 7),
91
+ ('tools/qemu-img', 'qemu-img',
92
+ 'QEMU disk image utility',
93
+ ['Fabrice Bellard'], 1),
94
+ ('tools/qemu-nbd', 'qemu-nbd',
95
+ 'QEMU Disk Network Block Device Server',
96
+ ['Anthony Liguori <anthony@codemonkey.ws>'], 8),
97
+ ('tools/qemu-pr-helper', 'qemu-pr-helper',
98
+ 'QEMU persistent reservation helper',
99
+ [], 8),
100
+ ('tools/qemu-storage-daemon', 'qemu-storage-daemon',
101
+ 'QEMU storage daemon',
102
+ [], 1),
103
+ ('tools/qemu-trace-stap', 'qemu-trace-stap',
104
+ 'QEMU SystemTap trace tool',
105
+ [], 1),
106
+ ('tools/virtfs-proxy-helper', 'virtfs-proxy-helper',
107
+ 'QEMU 9p virtfs proxy filesystem helper',
108
+ ['M. Mohan Kumar'], 1),
109
+ ('tools/virtiofsd', 'virtiofsd',
110
+ 'QEMU virtio-fs shared file system daemon',
111
+ ['Stefan Hajnoczi <stefanha@redhat.com>',
112
+ 'Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>'], 1),
113
+]
114
115
# -- Options for Texinfo output -------------------------------------------
116
117
diff --git a/docs/devel/conf.py b/docs/devel/conf.py
118
deleted file mode 100644
119
index XXXXXXX..XXXXXXX
120
--- a/docs/devel/conf.py
121
+++ /dev/null
122
@@ -XXX,XX +XXX,XX @@
22
@@ -XXX,XX +XXX,XX @@
123
-# -*- coding: utf-8 -*-
23
#define RX_CPU_H
124
-#
24
125
-# QEMU documentation build configuration file for the 'devel' manual.
25
#include "qemu/bitops.h"
126
-#
26
-#include "qemu-common.h"
127
-# This includes the top level conf file and then makes any necessary tweaks.
27
#include "hw/registerfields.h"
128
-import sys
28
#include "cpu-qom.h"
129
-import os
29
130
-
131
-qemu_docdir = os.path.abspath("..")
132
-parent_config = os.path.join(qemu_docdir, "conf.py")
133
-exec(compile(open(parent_config, "rb").read(), parent_config, 'exec'))
134
-
135
-# This slightly misuses the 'description', but is the best way to get
136
-# the manual title to appear in the sidebar.
137
-html_theme_options['description'] = u'Developer''s Guide'
138
diff --git a/docs/index.html.in b/docs/index.html.in
139
deleted file mode 100644
140
index XXXXXXX..XXXXXXX
141
--- a/docs/index.html.in
142
+++ /dev/null
143
@@ -XXX,XX +XXX,XX @@
144
-<!DOCTYPE html>
145
-<html lang="en">
146
- <head>
147
- <meta charset="UTF-8">
148
- <title>QEMU @VERSION@ Documentation</title>
149
- </head>
150
- <body>
151
- <h1>QEMU @VERSION@ Documentation</h1>
152
- <ul>
153
- <li><a href="system/index.html">System Emulation User's Guide</a></li>
154
- <li><a href="user/index.html">User Mode Emulation User's Guide</a></li>
155
- <li><a href="tools/index.html">Tools Guide</a></li>
156
- <li><a href="interop/index.html">System Emulation Management and Interoperability Guide</a></li>
157
- <li><a href="specs/index.html">System Emulation Guest Hardware Specifications</a></li>
158
- </ul>
159
- </body>
160
-</html>
161
diff --git a/docs/interop/conf.py b/docs/interop/conf.py
162
deleted file mode 100644
163
index XXXXXXX..XXXXXXX
164
--- a/docs/interop/conf.py
165
+++ /dev/null
166
@@ -XXX,XX +XXX,XX @@
167
-# -*- coding: utf-8 -*-
168
-#
169
-# QEMU documentation build configuration file for the 'interop' manual.
170
-#
171
-# This includes the top level conf file and then makes any necessary tweaks.
172
-import sys
173
-import os
174
-
175
-qemu_docdir = os.path.abspath("..")
176
-parent_config = os.path.join(qemu_docdir, "conf.py")
177
-exec(compile(open(parent_config, "rb").read(), parent_config, 'exec'))
178
-
179
-# This slightly misuses the 'description', but is the best way to get
180
-# the manual title to appear in the sidebar.
181
-html_theme_options['description'] = u'System Emulation Management and Interoperability Guide'
182
-
183
-# One entry per manual page. List of tuples
184
-# (source start file, name, description, authors, manual section).
185
-man_pages = [
186
- ('qemu-ga', 'qemu-ga', u'QEMU Guest Agent',
187
- ['Michael Roth <mdroth@linux.vnet.ibm.com>'], 8),
188
- ('qemu-ga-ref', 'qemu-ga-ref', 'QEMU Guest Agent Protocol Reference',
189
- [], 7),
190
- ('qemu-qmp-ref', 'qemu-qmp-ref', 'QEMU QMP Reference Manual',
191
- [], 7),
192
- ('qemu-storage-daemon-qmp-ref', 'qemu-storage-daemon-qmp-ref',
193
- 'QEMU Storage Daemon QMP Reference Manual', [], 7),
194
-]
195
diff --git a/docs/meson.build b/docs/meson.build
196
index XXXXXXX..XXXXXXX 100644
197
--- a/docs/meson.build
198
+++ b/docs/meson.build
199
@@ -XXX,XX +XXX,XX @@ if build_docs
200
meson.source_root() / 'docs/sphinx/qmp_lexer.py',
201
qapi_gen_depends ]
202
203
- configure_file(output: 'index.html',
204
- input: files('index.html.in'),
205
- configuration: {'VERSION': meson.project_version()},
206
- install_dir: qemu_docdir)
207
- manuals = [ 'devel', 'interop', 'tools', 'specs', 'system', 'user' ]
208
man_pages = {
209
- 'interop' : {
210
'qemu-ga.8': (have_tools ? 'man8' : ''),
211
'qemu-ga-ref.7': 'man7',
212
'qemu-qmp-ref.7': 'man7',
213
'qemu-storage-daemon-qmp-ref.7': (have_tools ? 'man7' : ''),
214
- },
215
- 'tools': {
216
'qemu-img.1': (have_tools ? 'man1' : ''),
217
'qemu-nbd.8': (have_tools ? 'man8' : ''),
218
'qemu-pr-helper.8': (have_tools ? 'man8' : ''),
219
@@ -XXX,XX +XXX,XX @@ if build_docs
220
'qemu-trace-stap.1': (config_host.has_key('CONFIG_TRACE_SYSTEMTAP') ? 'man1' : ''),
221
'virtfs-proxy-helper.1': (have_virtfs_proxy_helper ? 'man1' : ''),
222
'virtiofsd.1': (have_virtiofsd ? 'man1' : ''),
223
- },
224
- 'system': {
225
'qemu.1': 'man1',
226
'qemu-block-drivers.7': 'man7',
227
'qemu-cpu-models.7': 'man7'
228
- },
229
}
230
231
sphinxdocs = []
232
sphinxmans = []
233
- foreach manual : manuals
234
- private_dir = meson.current_build_dir() / (manual + '.p')
235
- output_dir = meson.current_build_dir() / manual
236
- input_dir = meson.current_source_dir() / manual
237
238
- this_manual = custom_target(manual + ' manual',
239
+ private_dir = meson.current_build_dir() / 'manual.p'
240
+ output_dir = meson.current_build_dir() / 'manual'
241
+ input_dir = meson.current_source_dir()
242
+
243
+ this_manual = custom_target('QEMU manual',
244
build_by_default: build_docs,
245
- output: [manual + '.stamp'],
246
- input: [files('conf.py'), files(manual / 'conf.py')],
247
- depfile: manual + '.d',
248
+ output: 'docs.stamp',
249
+ input: files('conf.py'),
250
+ depfile: 'docs.d',
251
depend_files: sphinx_extn_depends,
252
command: [SPHINX_ARGS, '-Ddepfile=@DEPFILE@',
253
'-Ddepfile_stamp=@OUTPUT0@',
254
'-b', 'html', '-d', private_dir,
255
input_dir, output_dir])
256
- sphinxdocs += this_manual
257
- if build_docs and manual != 'devel'
258
- install_subdir(output_dir, install_dir: qemu_docdir)
259
- endif
260
+ sphinxdocs += this_manual
261
+ install_subdir(output_dir, install_dir: qemu_docdir, strip_directory: true)
262
263
- these_man_pages = []
264
- install_dirs = []
265
- foreach page, section : man_pages.get(manual, {})
266
- these_man_pages += page
267
- install_dirs += section == '' ? false : get_option('mandir') / section
268
- endforeach
269
- if these_man_pages.length() > 0
270
- sphinxmans += custom_target(manual + ' man pages',
271
- build_by_default: build_docs,
272
- output: these_man_pages,
273
- input: this_manual,
274
- install: build_docs,
275
- install_dir: install_dirs,
276
- command: [SPHINX_ARGS, '-b', 'man', '-d', private_dir,
277
- input_dir, meson.current_build_dir()])
278
- endif
279
+ these_man_pages = []
280
+ install_dirs = []
281
+ foreach page, section : man_pages
282
+ these_man_pages += page
283
+ install_dirs += section == '' ? false : get_option('mandir') / section
284
endforeach
285
+
286
+ sphinxmans += custom_target('QEMU man pages',
287
+ build_by_default: build_docs,
288
+ output: these_man_pages,
289
+ input: this_manual,
290
+ install: build_docs,
291
+ install_dir: install_dirs,
292
+ command: [SPHINX_ARGS, '-b', 'man', '-d', private_dir,
293
+ input_dir, meson.current_build_dir()])
294
+
295
alias_target('sphinxdocs', sphinxdocs)
296
alias_target('html', sphinxdocs)
297
alias_target('man', sphinxmans)
298
diff --git a/docs/specs/conf.py b/docs/specs/conf.py
299
deleted file mode 100644
300
index XXXXXXX..XXXXXXX
301
--- a/docs/specs/conf.py
302
+++ /dev/null
303
@@ -XXX,XX +XXX,XX @@
304
-# -*- coding: utf-8 -*-
305
-#
306
-# QEMU documentation build configuration file for the 'specs' manual.
307
-#
308
-# This includes the top level conf file and then makes any necessary tweaks.
309
-import sys
310
-import os
311
-
312
-qemu_docdir = os.path.abspath("..")
313
-parent_config = os.path.join(qemu_docdir, "conf.py")
314
-exec(compile(open(parent_config, "rb").read(), parent_config, 'exec'))
315
-
316
-# This slightly misuses the 'description', but is the best way to get
317
-# the manual title to appear in the sidebar.
318
-html_theme_options['description'] = \
319
- u'System Emulation Guest Hardware Specifications'
320
diff --git a/docs/system/conf.py b/docs/system/conf.py
321
deleted file mode 100644
322
index XXXXXXX..XXXXXXX
323
--- a/docs/system/conf.py
324
+++ /dev/null
325
@@ -XXX,XX +XXX,XX @@
326
-# -*- coding: utf-8 -*-
327
-#
328
-# QEMU documentation build configuration file for the 'system' manual.
329
-#
330
-# This includes the top level conf file and then makes any necessary tweaks.
331
-import sys
332
-import os
333
-
334
-qemu_docdir = os.path.abspath("..")
335
-parent_config = os.path.join(qemu_docdir, "conf.py")
336
-exec(compile(open(parent_config, "rb").read(), parent_config, 'exec'))
337
-
338
-# This slightly misuses the 'description', but is the best way to get
339
-# the manual title to appear in the sidebar.
340
-html_theme_options['description'] = u'System Emulation User''s Guide'
341
-
342
-# One entry per manual page. List of tuples
343
-# (source start file, name, description, authors, manual section).
344
-man_pages = [
345
- ('qemu-manpage', 'qemu', u'QEMU User Documentation',
346
- ['Fabrice Bellard'], 1),
347
- ('qemu-block-drivers', 'qemu-block-drivers',
348
- u'QEMU block drivers reference',
349
- ['Fabrice Bellard and the QEMU Project developers'], 7),
350
- ('qemu-cpu-models', 'qemu-cpu-models',
351
- u'QEMU CPU Models',
352
- ['The QEMU Project developers'], 7)
353
-]
354
diff --git a/docs/tools/conf.py b/docs/tools/conf.py
355
deleted file mode 100644
356
index XXXXXXX..XXXXXXX
357
--- a/docs/tools/conf.py
358
+++ /dev/null
359
@@ -XXX,XX +XXX,XX @@
360
-# -*- coding: utf-8 -*-
361
-#
362
-# QEMU documentation build configuration file for the 'tools' manual.
363
-#
364
-# This includes the top level conf file and then makes any necessary tweaks.
365
-import sys
366
-import os
367
-
368
-qemu_docdir = os.path.abspath("..")
369
-parent_config = os.path.join(qemu_docdir, "conf.py")
370
-exec(compile(open(parent_config, "rb").read(), parent_config, 'exec'))
371
-
372
-# This slightly misuses the 'description', but is the best way to get
373
-# the manual title to appear in the sidebar.
374
-html_theme_options['description'] = \
375
- u'Tools Guide'
376
-
377
-# One entry per manual page. List of tuples
378
-# (source start file, name, description, authors, manual section).
379
-man_pages = [
380
- ('qemu-img', 'qemu-img', u'QEMU disk image utility',
381
- ['Fabrice Bellard'], 1),
382
- ('qemu-storage-daemon', 'qemu-storage-daemon', u'QEMU storage daemon',
383
- [], 1),
384
- ('qemu-nbd', 'qemu-nbd', u'QEMU Disk Network Block Device Server',
385
- ['Anthony Liguori <anthony@codemonkey.ws>'], 8),
386
- ('qemu-pr-helper', 'qemu-pr-helper', 'QEMU persistent reservation helper',
387
- [], 8),
388
- ('qemu-trace-stap', 'qemu-trace-stap', u'QEMU SystemTap trace tool',
389
- [], 1),
390
- ('virtfs-proxy-helper', 'virtfs-proxy-helper',
391
- u'QEMU 9p virtfs proxy filesystem helper',
392
- ['M. Mohan Kumar'], 1),
393
- ('virtiofsd', 'virtiofsd', u'QEMU virtio-fs shared file system daemon',
394
- ['Stefan Hajnoczi <stefanha@redhat.com>',
395
- 'Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>'], 1),
396
-]
397
diff --git a/docs/user/conf.py b/docs/user/conf.py
398
deleted file mode 100644
399
index XXXXXXX..XXXXXXX
400
--- a/docs/user/conf.py
401
+++ /dev/null
402
@@ -XXX,XX +XXX,XX @@
403
-# -*- coding: utf-8 -*-
404
-#
405
-# QEMU documentation build configuration file for the 'user' manual.
406
-#
407
-# This includes the top level conf file and then makes any necessary tweaks.
408
-import sys
409
-import os
410
-
411
-qemu_docdir = os.path.abspath("..")
412
-parent_config = os.path.join(qemu_docdir, "conf.py")
413
-exec(compile(open(parent_config, "rb").read(), parent_config, 'exec'))
414
-
415
-# This slightly misuses the 'description', but is the best way to get
416
-# the manual title to appear in the sidebar.
417
-html_theme_options['description'] = u'User Mode Emulation User''s Guide'
418
diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml
419
index XXXXXXX..XXXXXXX 100644
420
--- a/.gitlab-ci.yml
421
+++ b/.gitlab-ci.yml
422
@@ -XXX,XX +XXX,XX @@ pages:
423
-t "Welcome to the QEMU sourcecode"
424
- mv HTML public/src
425
# Project documentation
426
- - mv build/docs/index.html public/
427
- - for i in devel interop specs system tools user ; do mv build/docs/$i public/ ; done
428
+ - make -C build install DESTDIR=$(pwd)/temp-install
429
+ - mv temp-install/usr/local/share/doc/qemu/* public/
430
artifacts:
431
paths:
432
- public
433
--
30
--
434
2.20.1
31
2.25.1
435
32
436
33
diff view generated by jsdifflib
1
From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
1
A lot of C files in hw/arm include qemu-common.h when they don't
2
need anything from it. Drop the include lines.
2
3
3
This will simplify accessing HCR conditionally in secure state.
4
omap1.c, pxa2xx.c and strongarm.c retain the include because they
5
use it for the prototype of qemu_get_timedate().
4
6
5
Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
7
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 20210112104511.36576-4-remi.denis.courmont@huawei.com
9
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Reviewed-by: Taylor Simpson <tsimpson@quicinc.com>
11
Reviewed-by: Yoshinori Sato <ysato@users.sourceforge.jp>
12
Message-id: 20211129200510.1233037-5-peter.maydell@linaro.org
9
---
13
---
10
target/arm/helper.c | 31 ++++++++++++++++++-------------
14
hw/arm/boot.c | 1 -
11
1 file changed, 18 insertions(+), 13 deletions(-)
15
hw/arm/digic_boards.c | 1 -
16
hw/arm/highbank.c | 1 -
17
hw/arm/npcm7xx_boards.c | 1 -
18
hw/arm/sbsa-ref.c | 1 -
19
hw/arm/stm32f405_soc.c | 1 -
20
hw/arm/vexpress.c | 1 -
21
hw/arm/virt.c | 1 -
22
8 files changed, 8 deletions(-)
12
23
13
diff --git a/target/arm/helper.c b/target/arm/helper.c
24
diff --git a/hw/arm/boot.c b/hw/arm/boot.c
14
index XXXXXXX..XXXXXXX 100644
25
index XXXXXXX..XXXXXXX 100644
15
--- a/target/arm/helper.c
26
--- a/hw/arm/boot.c
16
+++ b/target/arm/helper.c
27
+++ b/hw/arm/boot.c
17
@@ -XXX,XX +XXX,XX @@ static CPAccessResult aa64_cacheop_pou_access(CPUARMState *env,
28
@@ -XXX,XX +XXX,XX @@
18
29
*/
19
static int vae1_tlbmask(CPUARMState *env)
30
20
{
31
#include "qemu/osdep.h"
21
- /* Since we exclude secure first, we may read HCR_EL2 directly. */
32
-#include "qemu-common.h"
22
- if (arm_is_secure_below_el3(env)) {
33
#include "qemu/datadir.h"
23
- return ARMMMUIdxBit_SE10_1 |
34
#include "qemu/error-report.h"
24
- ARMMMUIdxBit_SE10_1_PAN |
35
#include "qapi/error.h"
25
- ARMMMUIdxBit_SE10_0;
36
diff --git a/hw/arm/digic_boards.c b/hw/arm/digic_boards.c
26
- } else if ((env->cp15.hcr_el2 & (HCR_E2H | HCR_TGE))
37
index XXXXXXX..XXXXXXX 100644
27
- == (HCR_E2H | HCR_TGE)) {
38
--- a/hw/arm/digic_boards.c
28
+ uint64_t hcr = arm_hcr_el2_eff(env);
39
+++ b/hw/arm/digic_boards.c
29
+
40
@@ -XXX,XX +XXX,XX @@
30
+ if ((hcr & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE)) {
41
31
return ARMMMUIdxBit_E20_2 |
42
#include "qemu/osdep.h"
32
ARMMMUIdxBit_E20_2_PAN |
43
#include "qapi/error.h"
33
ARMMMUIdxBit_E20_0;
44
-#include "qemu-common.h"
34
+ } else if (arm_is_secure_below_el3(env)) {
45
#include "qemu/datadir.h"
35
+ return ARMMMUIdxBit_SE10_1 |
46
#include "hw/boards.h"
36
+ ARMMMUIdxBit_SE10_1_PAN |
47
#include "qemu/error-report.h"
37
+ ARMMMUIdxBit_SE10_0;
48
diff --git a/hw/arm/highbank.c b/hw/arm/highbank.c
38
} else {
49
index XXXXXXX..XXXXXXX 100644
39
return ARMMMUIdxBit_E10_1 |
50
--- a/hw/arm/highbank.c
40
ARMMMUIdxBit_E10_1_PAN |
51
+++ b/hw/arm/highbank.c
41
@@ -XXX,XX +XXX,XX @@ static inline uint64_t regime_sctlr(CPUARMState *env, ARMMMUIdx mmu_idx)
52
@@ -XXX,XX +XXX,XX @@
42
static inline bool regime_translation_disabled(CPUARMState *env,
53
*/
43
ARMMMUIdx mmu_idx)
54
44
{
55
#include "qemu/osdep.h"
45
+ uint64_t hcr_el2;
56
-#include "qemu-common.h"
46
+
57
#include "qemu/datadir.h"
47
if (arm_feature(env, ARM_FEATURE_M)) {
58
#include "qapi/error.h"
48
switch (env->v7m.mpu_ctrl[regime_is_secure(env, mmu_idx)] &
59
#include "hw/sysbus.h"
49
(R_V7M_MPU_CTRL_ENABLE_MASK | R_V7M_MPU_CTRL_HFNMIENA_MASK)) {
60
diff --git a/hw/arm/npcm7xx_boards.c b/hw/arm/npcm7xx_boards.c
50
@@ -XXX,XX +XXX,XX @@ static inline bool regime_translation_disabled(CPUARMState *env,
61
index XXXXXXX..XXXXXXX 100644
51
}
62
--- a/hw/arm/npcm7xx_boards.c
52
}
63
+++ b/hw/arm/npcm7xx_boards.c
53
64
@@ -XXX,XX +XXX,XX @@
54
+ hcr_el2 = arm_hcr_el2_eff(env);
65
#include "hw/qdev-core.h"
55
+
66
#include "hw/qdev-properties.h"
56
if (mmu_idx == ARMMMUIdx_Stage2) {
67
#include "qapi/error.h"
57
/* HCR.DC means HCR.VM behaves as 1 */
68
-#include "qemu-common.h"
58
- return (env->cp15.hcr_el2 & (HCR_DC | HCR_VM)) == 0;
69
#include "qemu/datadir.h"
59
+ return (hcr_el2 & (HCR_DC | HCR_VM)) == 0;
70
#include "qemu/units.h"
60
}
71
#include "sysemu/blockdev.h"
61
72
diff --git a/hw/arm/sbsa-ref.c b/hw/arm/sbsa-ref.c
62
- if (env->cp15.hcr_el2 & HCR_TGE) {
73
index XXXXXXX..XXXXXXX 100644
63
+ if (hcr_el2 & HCR_TGE) {
74
--- a/hw/arm/sbsa-ref.c
64
/* TGE means that NS EL0/1 act as if SCTLR_EL1.M is zero */
75
+++ b/hw/arm/sbsa-ref.c
65
if (!regime_is_secure(env, mmu_idx) && regime_el(env, mmu_idx) == 1) {
76
@@ -XXX,XX +XXX,XX @@
66
return true;
77
*/
67
}
78
68
}
79
#include "qemu/osdep.h"
69
80
-#include "qemu-common.h"
70
- if ((env->cp15.hcr_el2 & HCR_DC) && arm_mmu_idx_is_stage1_of_2(mmu_idx)) {
81
#include "qemu/datadir.h"
71
+ if ((hcr_el2 & HCR_DC) && arm_mmu_idx_is_stage1_of_2(mmu_idx)) {
82
#include "qapi/error.h"
72
/* HCR.DC means SCTLR_EL1.M behaves as 0 */
83
#include "qemu/error-report.h"
73
return true;
84
diff --git a/hw/arm/stm32f405_soc.c b/hw/arm/stm32f405_soc.c
74
}
85
index XXXXXXX..XXXXXXX 100644
75
@@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx,
86
--- a/hw/arm/stm32f405_soc.c
76
fi->s1ptw = true;
87
+++ b/hw/arm/stm32f405_soc.c
77
return ~0;
88
@@ -XXX,XX +XXX,XX @@
78
}
89
79
- if ((env->cp15.hcr_el2 & HCR_PTW) && (cacheattrs.attrs & 0xf0) == 0) {
90
#include "qemu/osdep.h"
80
+ if ((arm_hcr_el2_eff(env) & HCR_PTW) &&
91
#include "qapi/error.h"
81
+ (cacheattrs.attrs & 0xf0) == 0) {
92
-#include "qemu-common.h"
82
/*
93
#include "exec/address-spaces.h"
83
* PTW set and S1 walk touched S2 Device memory:
94
#include "sysemu/sysemu.h"
84
* generate Permission fault.
95
#include "hw/arm/stm32f405_soc.h"
85
@@ -XXX,XX +XXX,XX @@ static uint8_t convert_stage2_attrs(CPUARMState *env, uint8_t s2attrs)
96
diff --git a/hw/arm/vexpress.c b/hw/arm/vexpress.c
86
uint8_t hihint = 0, lohint = 0;
97
index XXXXXXX..XXXXXXX 100644
87
98
--- a/hw/arm/vexpress.c
88
if (hiattr != 0) { /* normal memory */
99
+++ b/hw/arm/vexpress.c
89
- if ((env->cp15.hcr_el2 & HCR_CD) != 0) { /* cache disabled */
100
@@ -XXX,XX +XXX,XX @@
90
+ if (arm_hcr_el2_eff(env) & HCR_CD) { /* cache disabled */
101
91
hiattr = loattr = 1; /* non-cacheable */
102
#include "qemu/osdep.h"
92
} else {
103
#include "qapi/error.h"
93
if (hiattr != 1) { /* Write-through or write-back */
104
-#include "qemu-common.h"
94
@@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address,
105
#include "qemu/datadir.h"
95
}
106
#include "cpu.h"
96
107
#include "hw/sysbus.h"
97
/* Combine the S1 and S2 cache attributes. */
108
diff --git a/hw/arm/virt.c b/hw/arm/virt.c
98
- if (env->cp15.hcr_el2 & HCR_DC) {
109
index XXXXXXX..XXXXXXX 100644
99
+ if (arm_hcr_el2_eff(env) & HCR_DC) {
110
--- a/hw/arm/virt.c
100
/*
111
+++ b/hw/arm/virt.c
101
* HCR.DC forces the first stage attributes to
112
@@ -XXX,XX +XXX,XX @@
102
* Normal Non-Shareable,
113
*/
114
115
#include "qemu/osdep.h"
116
-#include "qemu-common.h"
117
#include "qemu/datadir.h"
118
#include "qemu/units.h"
119
#include "qemu/option.h"
103
--
120
--
104
2.20.1
121
2.25.1
105
122
106
123
diff view generated by jsdifflib
1
From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
1
The calculation of the length of TLB range invalidate operations
2
in tlbi_aa64_range_get_length() is incorrect in two ways:
3
* the NUM field is 5 bits, but we read only 4 bits
4
* we miscalculate the page_shift value, because of an
5
off-by-one error:
6
TG 0b00 is invalid
7
TG 0b01 is 4K granule size == 4096 == 2^12
8
TG 0b10 is 16K granule size == 16384 == 2^14
9
TG 0b11 is 64K granule size == 65536 == 2^16
10
so page_shift should be (TG - 1) * 2 + 12
2
11
3
In the secure stage 2 translation regime, the VSTCR.SW and VTCR.NSW
12
Thanks to the bug report submitter Cha HyunSoo for identifying
4
bits can invert the secure flag for pagetable walks. This patchset
13
both these errors.
5
allows S1_ptw_translate() to change the non-secure bit.
6
14
7
Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
15
Fixes: 84940ed82552d3c ("target/arm: Add support for FEAT_TLBIRANGE")
16
Resolves: https://gitlab.com/qemu-project/qemu/-/issues/734
17
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
18
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20210112104511.36576-11-remi.denis.courmont@huawei.com
19
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
20
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
21
Message-id: 20211130173257.1274194-1-peter.maydell@linaro.org
11
---
22
---
12
target/arm/helper.c | 9 ++++++---
23
target/arm/helper.c | 6 +++---
13
1 file changed, 6 insertions(+), 3 deletions(-)
24
1 file changed, 3 insertions(+), 3 deletions(-)
14
25
15
diff --git a/target/arm/helper.c b/target/arm/helper.c
26
diff --git a/target/arm/helper.c b/target/arm/helper.c
16
index XXXXXXX..XXXXXXX 100644
27
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/helper.c
28
--- a/target/arm/helper.c
18
+++ b/target/arm/helper.c
29
+++ b/target/arm/helper.c
19
@@ -XXX,XX +XXX,XX @@ static bool get_level1_table_address(CPUARMState *env, ARMMMUIdx mmu_idx,
30
@@ -XXX,XX +XXX,XX @@ static uint64_t tlbi_aa64_range_get_length(CPUARMState *env,
20
31
uint64_t exponent;
21
/* Translate a S1 pagetable walk through S2 if needed. */
32
uint64_t length;
22
static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx,
33
23
- hwaddr addr, MemTxAttrs txattrs,
34
- num = extract64(value, 39, 4);
24
+ hwaddr addr, bool *is_secure,
35
+ num = extract64(value, 39, 5);
25
ARMMMUFaultInfo *fi)
36
scale = extract64(value, 44, 2);
26
{
37
page_size_granule = extract64(value, 46, 2);
27
if (arm_mmu_idx_is_stage1_of_2(mmu_idx) &&
38
28
@@ -XXX,XX +XXX,XX @@ static hwaddr S1_ptw_translate(CPUARMState *env, ARMMMUIdx mmu_idx,
39
- page_shift = page_size_granule * 2 + 12;
29
int s2prot;
40
-
30
int ret;
41
if (page_size_granule == 0) {
31
ARMCacheAttrs cacheattrs = {};
42
qemu_log_mask(LOG_GUEST_ERROR, "Invalid page size granule %d\n",
32
+ MemTxAttrs txattrs = {};
43
page_size_granule);
33
+
34
+ assert(!*is_secure); /* TODO: S-EL2 */
35
36
ret = get_phys_addr_lpae(env, addr, MMU_DATA_LOAD, ARMMMUIdx_Stage2,
37
false,
38
@@ -XXX,XX +XXX,XX @@ static uint32_t arm_ldl_ptw(CPUState *cs, hwaddr addr, bool is_secure,
39
AddressSpace *as;
40
uint32_t data;
41
42
+ addr = S1_ptw_translate(env, mmu_idx, addr, &is_secure, fi);
43
attrs.secure = is_secure;
44
as = arm_addressspace(cs, attrs);
45
- addr = S1_ptw_translate(env, mmu_idx, addr, attrs, fi);
46
if (fi->s1ptw) {
47
return 0;
44
return 0;
48
}
45
}
49
@@ -XXX,XX +XXX,XX @@ static uint64_t arm_ldq_ptw(CPUState *cs, hwaddr addr, bool is_secure,
46
50
AddressSpace *as;
47
+ page_shift = (page_size_granule - 1) * 2 + 12;
51
uint64_t data;
48
+
52
49
exponent = (5 * scale) + 1;
53
+ addr = S1_ptw_translate(env, mmu_idx, addr, &is_secure, fi);
50
length = (num + 1) << (exponent + page_shift);
54
attrs.secure = is_secure;
51
55
as = arm_addressspace(cs, attrs);
56
- addr = S1_ptw_translate(env, mmu_idx, addr, attrs, fi);
57
if (fi->s1ptw) {
58
return 0;
59
}
60
--
52
--
61
2.20.1
53
2.25.1
62
54
63
55
diff view generated by jsdifflib
1
From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
1
From: Patrick Venture <venture@google.com>
2
2
3
This adds a common helper to compute the effective value of MDCR_EL2.
3
The rx_active boolean change to true should always trigger a try_read
4
That is the actual value if EL2 is enabled in the current security
4
call that flushes the queue.
5
context, or 0 elsewise.
6
5
7
Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
6
Signed-off-by: Patrick Venture <venture@google.com>
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
7
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
9
Message-id: 20210112104511.36576-5-remi.denis.courmont@huawei.com
8
Message-id: 20211203221002.1719306-1-venture@google.com
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
10
---
12
target/arm/helper.c | 38 ++++++++++++++++++++++----------------
11
hw/net/npcm7xx_emc.c | 18 ++++++++----------
13
1 file changed, 22 insertions(+), 16 deletions(-)
12
1 file changed, 8 insertions(+), 10 deletions(-)
14
13
15
diff --git a/target/arm/helper.c b/target/arm/helper.c
14
diff --git a/hw/net/npcm7xx_emc.c b/hw/net/npcm7xx_emc.c
16
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/helper.c
16
--- a/hw/net/npcm7xx_emc.c
18
+++ b/target/arm/helper.c
17
+++ b/hw/net/npcm7xx_emc.c
19
@@ -XXX,XX +XXX,XX @@ static CPAccessResult access_trap_aa32s_el1(CPUARMState *env,
18
@@ -XXX,XX +XXX,XX @@ static void emc_halt_rx(NPCM7xxEMCState *emc, uint32_t mista_flag)
20
return CP_ACCESS_TRAP_UNCATEGORIZED;
19
emc_set_mista(emc, mista_flag);
21
}
20
}
22
21
23
+static uint64_t arm_mdcr_el2_eff(CPUARMState *env)
22
+static void emc_enable_rx_and_flush(NPCM7xxEMCState *emc)
24
+{
23
+{
25
+ return arm_is_el2_enabled(env) ? env->cp15.mdcr_el2 : 0;
24
+ emc->rx_active = true;
25
+ qemu_flush_queued_packets(qemu_get_queue(emc->nic));
26
+}
26
+}
27
+
27
+
28
/* Check for traps to "powerdown debug" registers, which are controlled
28
static void emc_set_next_tx_descriptor(NPCM7xxEMCState *emc,
29
* by MDCR.TDOSA
29
const NPCM7xxEMCTxDesc *tx_desc,
30
*/
30
uint32_t desc_addr)
31
@@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tdosa(CPUARMState *env, const ARMCPRegInfo *ri,
31
@@ -XXX,XX +XXX,XX @@ static ssize_t emc_receive(NetClientState *nc, const uint8_t *buf, size_t len1)
32
bool isread)
32
return len;
33
}
34
35
-static void emc_try_receive_next_packet(NPCM7xxEMCState *emc)
36
-{
37
- if (emc_can_receive(qemu_get_queue(emc->nic))) {
38
- qemu_flush_queued_packets(qemu_get_queue(emc->nic));
39
- }
40
-}
41
-
42
static uint64_t npcm7xx_emc_read(void *opaque, hwaddr offset, unsigned size)
33
{
43
{
34
int el = arm_current_el(env);
44
NPCM7xxEMCState *emc = opaque;
35
- bool mdcr_el2_tdosa = (env->cp15.mdcr_el2 & MDCR_TDOSA) ||
45
@@ -XXX,XX +XXX,XX @@ static void npcm7xx_emc_write(void *opaque, hwaddr offset,
36
- (env->cp15.mdcr_el2 & MDCR_TDE) ||
46
emc->regs[REG_MGSTA] |= REG_MGSTA_RXHA;
37
+ uint64_t mdcr_el2 = arm_mdcr_el2_eff(env);
47
}
38
+ bool mdcr_el2_tdosa = (mdcr_el2 & MDCR_TDOSA) || (mdcr_el2 & MDCR_TDE) ||
48
if (value & REG_MCMDR_RXON) {
39
(arm_hcr_el2_eff(env) & HCR_TGE);
49
- emc->rx_active = true;
40
50
+ emc_enable_rx_and_flush(emc);
41
- if (el < 2 && mdcr_el2_tdosa && !arm_is_secure_below_el3(env)) {
42
+ if (el < 2 && mdcr_el2_tdosa) {
43
return CP_ACCESS_TRAP_EL2;
44
}
45
if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TDOSA)) {
46
@@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tdra(CPUARMState *env, const ARMCPRegInfo *ri,
47
bool isread)
48
{
49
int el = arm_current_el(env);
50
- bool mdcr_el2_tdra = (env->cp15.mdcr_el2 & MDCR_TDRA) ||
51
- (env->cp15.mdcr_el2 & MDCR_TDE) ||
52
+ uint64_t mdcr_el2 = arm_mdcr_el2_eff(env);
53
+ bool mdcr_el2_tdra = (mdcr_el2 & MDCR_TDRA) || (mdcr_el2 & MDCR_TDE) ||
54
(arm_hcr_el2_eff(env) & HCR_TGE);
55
56
- if (el < 2 && mdcr_el2_tdra && !arm_is_secure_below_el3(env)) {
57
+ if (el < 2 && mdcr_el2_tdra) {
58
return CP_ACCESS_TRAP_EL2;
59
}
60
if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TDA)) {
61
@@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tda(CPUARMState *env, const ARMCPRegInfo *ri,
62
bool isread)
63
{
64
int el = arm_current_el(env);
65
- bool mdcr_el2_tda = (env->cp15.mdcr_el2 & MDCR_TDA) ||
66
- (env->cp15.mdcr_el2 & MDCR_TDE) ||
67
+ uint64_t mdcr_el2 = arm_mdcr_el2_eff(env);
68
+ bool mdcr_el2_tda = (mdcr_el2 & MDCR_TDA) || (mdcr_el2 & MDCR_TDE) ||
69
(arm_hcr_el2_eff(env) & HCR_TGE);
70
71
- if (el < 2 && mdcr_el2_tda && !arm_is_secure_below_el3(env)) {
72
+ if (el < 2 && mdcr_el2_tda) {
73
return CP_ACCESS_TRAP_EL2;
74
}
75
if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TDA)) {
76
@@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tpm(CPUARMState *env, const ARMCPRegInfo *ri,
77
bool isread)
78
{
79
int el = arm_current_el(env);
80
+ uint64_t mdcr_el2 = arm_mdcr_el2_eff(env);
81
82
- if (el < 2 && (env->cp15.mdcr_el2 & MDCR_TPM)
83
- && !arm_is_secure_below_el3(env)) {
84
+ if (el < 2 && (mdcr_el2 & MDCR_TPM)) {
85
return CP_ACCESS_TRAP_EL2;
86
}
87
if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TPM)) {
88
@@ -XXX,XX +XXX,XX @@ static CPAccessResult pmreg_access(CPUARMState *env, const ARMCPRegInfo *ri,
89
* trapping to EL2 or EL3 for other accesses.
90
*/
91
int el = arm_current_el(env);
92
+ uint64_t mdcr_el2 = arm_mdcr_el2_eff(env);
93
94
if (el == 0 && !(env->cp15.c9_pmuserenr & 1)) {
95
return CP_ACCESS_TRAP;
96
}
97
- if (el < 2 && (env->cp15.mdcr_el2 & MDCR_TPM)
98
- && !arm_is_secure_below_el3(env)) {
99
+ if (el < 2 && (mdcr_el2 & MDCR_TPM)) {
100
return CP_ACCESS_TRAP_EL2;
101
}
102
if (el < 3 && (env->cp15.mdcr_el3 & MDCR_TPM)) {
103
@@ -XXX,XX +XXX,XX @@ static bool pmu_counter_enabled(CPUARMState *env, uint8_t counter)
104
bool enabled, prohibited, filtered;
105
bool secure = arm_is_secure(env);
106
int el = arm_current_el(env);
107
- uint8_t hpmn = env->cp15.mdcr_el2 & MDCR_HPMN;
108
+ uint64_t mdcr_el2 = arm_mdcr_el2_eff(env);
109
+ uint8_t hpmn = mdcr_el2 & MDCR_HPMN;
110
111
if (!arm_feature(env, ARM_FEATURE_PMU)) {
112
return false;
113
@@ -XXX,XX +XXX,XX @@ static bool pmu_counter_enabled(CPUARMState *env, uint8_t counter)
114
(counter < hpmn || counter == 31)) {
115
e = env->cp15.c9_pmcr & PMCRE;
116
} else {
117
- e = env->cp15.mdcr_el2 & MDCR_HPME;
118
+ e = mdcr_el2 & MDCR_HPME;
119
}
120
enabled = e && (env->cp15.c9_pmcnten & (1 << counter));
121
122
if (!secure) {
123
if (el == 2 && (counter < hpmn || counter == 31)) {
124
- prohibited = env->cp15.mdcr_el2 & MDCR_HPMD;
125
+ prohibited = mdcr_el2 & MDCR_HPMD;
126
} else {
51
} else {
127
prohibited = false;
52
emc_halt_rx(emc, 0);
128
}
53
}
54
@@ -XXX,XX +XXX,XX @@ static void npcm7xx_emc_write(void *opaque, hwaddr offset,
55
break;
56
case REG_RSDR:
57
if (emc->regs[REG_MCMDR] & REG_MCMDR_RXON) {
58
- emc->rx_active = true;
59
- emc_try_receive_next_packet(emc);
60
+ emc_enable_rx_and_flush(emc);
61
}
62
break;
63
case REG_MIIDA:
129
--
64
--
130
2.20.1
65
2.25.1
131
66
132
67
diff view generated by jsdifflib
1
From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
1
From: Jean-Philippe Brucker <jean-philippe@linaro.org>
2
2
3
This adds the MMU indices for EL2 stage 1 in secure state.
3
When a virtio-iommu is instantiated, describe it using the ACPI VIOT
4
table.
4
5
5
To keep code contained, which is largelly identical between secure and
6
Acked-by: Igor Mammedov <imammedo@redhat.com>
6
non-secure modes, the MMU indices are reassigned. The new assignments
7
Reviewed-by: Eric Auger <eric.auger@redhat.com>
7
provide a systematic pattern with a non-secure bit.
8
Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
8
9
Message-id: 20211210170415.583179-2-jean-philippe@linaro.org
9
Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
10
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
11
Message-id: 20210112104511.36576-8-remi.denis.courmont@huawei.com
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
---
11
---
14
target/arm/cpu-param.h | 2 +-
12
hw/arm/virt-acpi-build.c | 7 +++++++
15
target/arm/cpu.h | 35 ++++++----
13
hw/arm/Kconfig | 1 +
16
target/arm/internals.h | 12 ++++
14
2 files changed, 8 insertions(+)
17
target/arm/helper.c | 127 ++++++++++++++++++++++++-------------
18
target/arm/translate-a64.c | 4 ++
19
5 files changed, 123 insertions(+), 57 deletions(-)
20
15
21
diff --git a/target/arm/cpu-param.h b/target/arm/cpu-param.h
16
diff --git a/hw/arm/virt-acpi-build.c b/hw/arm/virt-acpi-build.c
22
index XXXXXXX..XXXXXXX 100644
17
index XXXXXXX..XXXXXXX 100644
23
--- a/target/arm/cpu-param.h
18
--- a/hw/arm/virt-acpi-build.c
24
+++ b/target/arm/cpu-param.h
19
+++ b/hw/arm/virt-acpi-build.c
25
@@ -XXX,XX +XXX,XX @@
20
@@ -XXX,XX +XXX,XX @@
26
# define TARGET_PAGE_BITS_MIN 10
21
#include "kvm_arm.h"
22
#include "migration/vmstate.h"
23
#include "hw/acpi/ghes.h"
24
+#include "hw/acpi/viot.h"
25
26
#define ARM_SPI_BASE 32
27
28
@@ -XXX,XX +XXX,XX @@ void virt_acpi_build(VirtMachineState *vms, AcpiBuildTables *tables)
29
}
27
#endif
30
#endif
28
31
29
-#define NB_MMU_MODES 11
32
+ if (vms->iommu == VIRT_IOMMU_VIRTIO) {
30
+#define NB_MMU_MODES 15
33
+ acpi_add_table(table_offsets, tables_blob);
31
34
+ build_viot(ms, tables_blob, tables->linker, vms->virtio_iommu_bdf,
32
#endif
35
+ vms->oem_id, vms->oem_table_id);
33
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
34
index XXXXXXX..XXXXXXX 100644
35
--- a/target/arm/cpu.h
36
+++ b/target/arm/cpu.h
37
@@ -XXX,XX +XXX,XX @@ bool write_cpustate_to_list(ARMCPU *cpu, bool kvm_sync);
38
#define ARM_MMU_IDX_NOTLB 0x20 /* does not have a TLB */
39
#define ARM_MMU_IDX_M 0x40 /* M profile */
40
41
+/* Meanings of the bits for A profile mmu idx values */
42
+#define ARM_MMU_IDX_A_NS 0x8
43
+
44
/* Meanings of the bits for M profile mmu idx values */
45
#define ARM_MMU_IDX_M_PRIV 0x1
46
#define ARM_MMU_IDX_M_NEGPRI 0x2
47
@@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdx {
48
/*
49
* A-profile.
50
*/
51
- ARMMMUIdx_E10_0 = 0 | ARM_MMU_IDX_A,
52
- ARMMMUIdx_E20_0 = 1 | ARM_MMU_IDX_A,
53
+ ARMMMUIdx_SE10_0 = 0 | ARM_MMU_IDX_A,
54
+ ARMMMUIdx_SE20_0 = 1 | ARM_MMU_IDX_A,
55
+ ARMMMUIdx_SE10_1 = 2 | ARM_MMU_IDX_A,
56
+ ARMMMUIdx_SE20_2 = 3 | ARM_MMU_IDX_A,
57
+ ARMMMUIdx_SE10_1_PAN = 4 | ARM_MMU_IDX_A,
58
+ ARMMMUIdx_SE20_2_PAN = 5 | ARM_MMU_IDX_A,
59
+ ARMMMUIdx_SE2 = 6 | ARM_MMU_IDX_A,
60
+ ARMMMUIdx_SE3 = 7 | ARM_MMU_IDX_A,
61
62
- ARMMMUIdx_E10_1 = 2 | ARM_MMU_IDX_A,
63
- ARMMMUIdx_E10_1_PAN = 3 | ARM_MMU_IDX_A,
64
-
65
- ARMMMUIdx_E2 = 4 | ARM_MMU_IDX_A,
66
- ARMMMUIdx_E20_2 = 5 | ARM_MMU_IDX_A,
67
- ARMMMUIdx_E20_2_PAN = 6 | ARM_MMU_IDX_A,
68
-
69
- ARMMMUIdx_SE10_0 = 7 | ARM_MMU_IDX_A,
70
- ARMMMUIdx_SE10_1 = 8 | ARM_MMU_IDX_A,
71
- ARMMMUIdx_SE10_1_PAN = 9 | ARM_MMU_IDX_A,
72
- ARMMMUIdx_SE3 = 10 | ARM_MMU_IDX_A,
73
+ ARMMMUIdx_E10_0 = ARMMMUIdx_SE10_0 | ARM_MMU_IDX_A_NS,
74
+ ARMMMUIdx_E20_0 = ARMMMUIdx_SE20_0 | ARM_MMU_IDX_A_NS,
75
+ ARMMMUIdx_E10_1 = ARMMMUIdx_SE10_1 | ARM_MMU_IDX_A_NS,
76
+ ARMMMUIdx_E20_2 = ARMMMUIdx_SE20_2 | ARM_MMU_IDX_A_NS,
77
+ ARMMMUIdx_E10_1_PAN = ARMMMUIdx_SE10_1_PAN | ARM_MMU_IDX_A_NS,
78
+ ARMMMUIdx_E20_2_PAN = ARMMMUIdx_SE20_2_PAN | ARM_MMU_IDX_A_NS,
79
+ ARMMMUIdx_E2 = ARMMMUIdx_SE2 | ARM_MMU_IDX_A_NS,
80
81
/*
82
* These are not allocated TLBs and are used only for AT system
83
@@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdxBit {
84
TO_CORE_BIT(E20_2),
85
TO_CORE_BIT(E20_2_PAN),
86
TO_CORE_BIT(SE10_0),
87
+ TO_CORE_BIT(SE20_0),
88
TO_CORE_BIT(SE10_1),
89
+ TO_CORE_BIT(SE20_2),
90
TO_CORE_BIT(SE10_1_PAN),
91
+ TO_CORE_BIT(SE20_2_PAN),
92
+ TO_CORE_BIT(SE2),
93
TO_CORE_BIT(SE3),
94
95
TO_CORE_BIT(MUser),
96
diff --git a/target/arm/internals.h b/target/arm/internals.h
97
index XXXXXXX..XXXXXXX 100644
98
--- a/target/arm/internals.h
99
+++ b/target/arm/internals.h
100
@@ -XXX,XX +XXX,XX @@ static inline bool regime_has_2_ranges(ARMMMUIdx mmu_idx)
101
case ARMMMUIdx_SE10_0:
102
case ARMMMUIdx_SE10_1:
103
case ARMMMUIdx_SE10_1_PAN:
104
+ case ARMMMUIdx_SE20_0:
105
+ case ARMMMUIdx_SE20_2:
106
+ case ARMMMUIdx_SE20_2_PAN:
107
return true;
108
default:
109
return false;
110
@@ -XXX,XX +XXX,XX @@ static inline bool regime_is_secure(CPUARMState *env, ARMMMUIdx mmu_idx)
111
case ARMMMUIdx_SE10_0:
112
case ARMMMUIdx_SE10_1:
113
case ARMMMUIdx_SE10_1_PAN:
114
+ case ARMMMUIdx_SE20_0:
115
+ case ARMMMUIdx_SE20_2:
116
+ case ARMMMUIdx_SE20_2_PAN:
117
+ case ARMMMUIdx_SE2:
118
case ARMMMUIdx_MSPrivNegPri:
119
case ARMMMUIdx_MSUserNegPri:
120
case ARMMMUIdx_MSPriv:
121
@@ -XXX,XX +XXX,XX @@ static inline bool regime_is_pan(CPUARMState *env, ARMMMUIdx mmu_idx)
122
case ARMMMUIdx_E10_1_PAN:
123
case ARMMMUIdx_E20_2_PAN:
124
case ARMMMUIdx_SE10_1_PAN:
125
+ case ARMMMUIdx_SE20_2_PAN:
126
return true;
127
default:
128
return false;
129
@@ -XXX,XX +XXX,XX @@ static inline bool regime_is_pan(CPUARMState *env, ARMMMUIdx mmu_idx)
130
static inline uint32_t regime_el(CPUARMState *env, ARMMMUIdx mmu_idx)
131
{
132
switch (mmu_idx) {
133
+ case ARMMMUIdx_SE20_0:
134
+ case ARMMMUIdx_SE20_2:
135
+ case ARMMMUIdx_SE20_2_PAN:
136
case ARMMMUIdx_E20_0:
137
case ARMMMUIdx_E20_2:
138
case ARMMMUIdx_E20_2_PAN:
139
case ARMMMUIdx_Stage2:
140
+ case ARMMMUIdx_SE2:
141
case ARMMMUIdx_E2:
142
return 2;
143
case ARMMMUIdx_SE3:
144
diff --git a/target/arm/helper.c b/target/arm/helper.c
145
index XXXXXXX..XXXXXXX 100644
146
--- a/target/arm/helper.c
147
+++ b/target/arm/helper.c
148
@@ -XXX,XX +XXX,XX @@ static int gt_phys_redir_timeridx(CPUARMState *env)
149
case ARMMMUIdx_E20_0:
150
case ARMMMUIdx_E20_2:
151
case ARMMMUIdx_E20_2_PAN:
152
+ case ARMMMUIdx_SE20_0:
153
+ case ARMMMUIdx_SE20_2:
154
+ case ARMMMUIdx_SE20_2_PAN:
155
return GTIMER_HYP;
156
default:
157
return GTIMER_PHYS;
158
@@ -XXX,XX +XXX,XX @@ static int gt_virt_redir_timeridx(CPUARMState *env)
159
case ARMMMUIdx_E20_0:
160
case ARMMMUIdx_E20_2:
161
case ARMMMUIdx_E20_2_PAN:
162
+ case ARMMMUIdx_SE20_0:
163
+ case ARMMMUIdx_SE20_2:
164
+ case ARMMMUIdx_SE20_2_PAN:
165
return GTIMER_HYPVIRT;
166
default:
167
return GTIMER_VIRT;
168
@@ -XXX,XX +XXX,XX @@ static void ats_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value)
169
mmu_idx = ARMMMUIdx_SE3;
170
break;
171
case 2:
172
- g_assert(!secure); /* TODO: ARMv8.4-SecEL2 */
173
+ g_assert(!secure); /* ARMv8.4-SecEL2 is 64-bit only */
174
/* fall through */
175
case 1:
176
if (ri->crm == 9 && (env->uncached_cpsr & CPSR_PAN)) {
177
@@ -XXX,XX +XXX,XX @@ static void ats_write64(CPUARMState *env, const ARMCPRegInfo *ri,
178
}
179
break;
180
case 4: /* AT S1E2R, AT S1E2W */
181
- mmu_idx = ARMMMUIdx_E2;
182
+ mmu_idx = secure ? ARMMMUIdx_SE2 : ARMMMUIdx_E2;
183
break;
184
case 6: /* AT S1E3R, AT S1E3W */
185
mmu_idx = ARMMMUIdx_SE3;
186
@@ -XXX,XX +XXX,XX @@ static void vmsa_tcr_ttbr_el2_write(CPUARMState *env, const ARMCPRegInfo *ri,
187
*/
188
if (extract64(raw_read(env, ri) ^ value, 48, 16) &&
189
(arm_hcr_el2_eff(env) & HCR_E2H)) {
190
- tlb_flush_by_mmuidx(env_cpu(env),
191
- ARMMMUIdxBit_E20_2 |
192
- ARMMMUIdxBit_E20_2_PAN |
193
- ARMMMUIdxBit_E20_0);
194
+ uint16_t mask = ARMMMUIdxBit_E20_2 |
195
+ ARMMMUIdxBit_E20_2_PAN |
196
+ ARMMMUIdxBit_E20_0;
197
+
198
+ if (arm_is_secure_below_el3(env)) {
199
+ mask >>= ARM_MMU_IDX_A_NS;
200
+ }
201
+
202
+ tlb_flush_by_mmuidx(env_cpu(env), mask);
203
}
204
raw_write(env, ri, value);
205
}
206
@@ -XXX,XX +XXX,XX @@ static int vae1_tlbmask(CPUARMState *env)
207
uint64_t hcr = arm_hcr_el2_eff(env);
208
209
if ((hcr & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE)) {
210
- return ARMMMUIdxBit_E20_2 |
211
- ARMMMUIdxBit_E20_2_PAN |
212
- ARMMMUIdxBit_E20_0;
213
+ uint16_t mask = ARMMMUIdxBit_E20_2 |
214
+ ARMMMUIdxBit_E20_2_PAN |
215
+ ARMMMUIdxBit_E20_0;
216
+
217
+ if (arm_is_secure_below_el3(env)) {
218
+ mask >>= ARM_MMU_IDX_A_NS;
219
+ }
220
+
221
+ return mask;
222
} else if (arm_is_secure_below_el3(env)) {
223
return ARMMMUIdxBit_SE10_1 |
224
ARMMMUIdxBit_SE10_1_PAN |
225
@@ -XXX,XX +XXX,XX @@ static int tlbbits_for_regime(CPUARMState *env, ARMMMUIdx mmu_idx,
226
227
static int vae1_tlbbits(CPUARMState *env, uint64_t addr)
228
{
229
+ uint64_t hcr = arm_hcr_el2_eff(env);
230
ARMMMUIdx mmu_idx;
231
232
/* Only the regime of the mmu_idx below is significant. */
233
- if (arm_is_secure_below_el3(env)) {
234
- mmu_idx = ARMMMUIdx_SE10_0;
235
- } else if ((env->cp15.hcr_el2 & (HCR_E2H | HCR_TGE))
236
- == (HCR_E2H | HCR_TGE)) {
237
+ if ((hcr & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE)) {
238
mmu_idx = ARMMMUIdx_E20_0;
239
} else {
240
mmu_idx = ARMMMUIdx_E10_0;
241
}
242
+
243
+ if (arm_is_secure_below_el3(env)) {
244
+ mmu_idx &= ~ARM_MMU_IDX_A_NS;
245
+ }
36
+ }
246
+
37
+
247
return tlbbits_for_regime(env, mmu_idx, addr);
38
/* XSDT is pointed to by RSDP */
248
}
39
xsdt = tables_blob->len;
249
40
build_xsdt(tables_blob, tables->linker, table_offsets, vms->oem_id,
250
@@ -XXX,XX +XXX,XX @@ static int alle1_tlbmask(CPUARMState *env)
41
diff --git a/hw/arm/Kconfig b/hw/arm/Kconfig
251
252
static int e2_tlbmask(CPUARMState *env)
253
{
254
- /* TODO: ARMv8.4-SecEL2 */
255
- return ARMMMUIdxBit_E20_0 |
256
- ARMMMUIdxBit_E20_2 |
257
- ARMMMUIdxBit_E20_2_PAN |
258
- ARMMMUIdxBit_E2;
259
+ if (arm_is_secure_below_el3(env)) {
260
+ return ARMMMUIdxBit_SE20_0 |
261
+ ARMMMUIdxBit_SE20_2 |
262
+ ARMMMUIdxBit_SE20_2_PAN |
263
+ ARMMMUIdxBit_SE2;
264
+ } else {
265
+ return ARMMMUIdxBit_E20_0 |
266
+ ARMMMUIdxBit_E20_2 |
267
+ ARMMMUIdxBit_E20_2_PAN |
268
+ ARMMMUIdxBit_E2;
269
+ }
270
}
271
272
static void tlbi_aa64_alle1_write(CPUARMState *env, const ARMCPRegInfo *ri,
273
@@ -XXX,XX +XXX,XX @@ static void tlbi_aa64_vae2is_write(CPUARMState *env, const ARMCPRegInfo *ri,
274
{
275
CPUState *cs = env_cpu(env);
276
uint64_t pageaddr = sextract64(value << 12, 0, 56);
277
- int bits = tlbbits_for_regime(env, ARMMMUIdx_E2, pageaddr);
278
+ bool secure = arm_is_secure_below_el3(env);
279
+ int mask = secure ? ARMMMUIdxBit_SE2 : ARMMMUIdxBit_E2;
280
+ int bits = tlbbits_for_regime(env, secure ? ARMMMUIdx_E2 : ARMMMUIdx_SE2,
281
+ pageaddr);
282
283
- tlb_flush_page_bits_by_mmuidx_all_cpus_synced(cs, pageaddr,
284
- ARMMMUIdxBit_E2, bits);
285
+ tlb_flush_page_bits_by_mmuidx_all_cpus_synced(cs, pageaddr, mask, bits);
286
}
287
288
static void tlbi_aa64_vae3is_write(CPUARMState *env, const ARMCPRegInfo *ri,
289
@@ -XXX,XX +XXX,XX @@ uint64_t arm_sctlr(CPUARMState *env, int el)
290
/* Only EL0 needs to be adjusted for EL1&0 or EL2&0. */
291
if (el == 0) {
292
ARMMMUIdx mmu_idx = arm_mmu_idx_el(env, 0);
293
- el = (mmu_idx == ARMMMUIdx_E20_0 ? 2 : 1);
294
+ el = (mmu_idx == ARMMMUIdx_E20_0 || mmu_idx == ARMMMUIdx_SE20_0)
295
+ ? 2 : 1;
296
}
297
return env->cp15.sctlr_el[el];
298
}
299
@@ -XXX,XX +XXX,XX @@ static inline bool regime_is_user(CPUARMState *env, ARMMMUIdx mmu_idx)
300
switch (mmu_idx) {
301
case ARMMMUIdx_SE10_0:
302
case ARMMMUIdx_E20_0:
303
+ case ARMMMUIdx_SE20_0:
304
case ARMMMUIdx_Stage1_E0:
305
case ARMMMUIdx_MUser:
306
case ARMMMUIdx_MSUser:
307
@@ -XXX,XX +XXX,XX @@ int arm_mmu_idx_to_el(ARMMMUIdx mmu_idx)
308
case ARMMMUIdx_E10_0:
309
case ARMMMUIdx_E20_0:
310
case ARMMMUIdx_SE10_0:
311
+ case ARMMMUIdx_SE20_0:
312
return 0;
313
case ARMMMUIdx_E10_1:
314
case ARMMMUIdx_E10_1_PAN:
315
@@ -XXX,XX +XXX,XX @@ int arm_mmu_idx_to_el(ARMMMUIdx mmu_idx)
316
case ARMMMUIdx_E2:
317
case ARMMMUIdx_E20_2:
318
case ARMMMUIdx_E20_2_PAN:
319
+ case ARMMMUIdx_SE2:
320
+ case ARMMMUIdx_SE20_2:
321
+ case ARMMMUIdx_SE20_2_PAN:
322
return 2;
323
case ARMMMUIdx_SE3:
324
return 3;
325
@@ -XXX,XX +XXX,XX @@ ARMMMUIdx arm_v7m_mmu_idx_for_secstate(CPUARMState *env, bool secstate)
326
327
ARMMMUIdx arm_mmu_idx_el(CPUARMState *env, int el)
328
{
329
+ ARMMMUIdx idx;
330
+ uint64_t hcr;
331
+
332
if (arm_feature(env, ARM_FEATURE_M)) {
333
return arm_v7m_mmu_idx_for_secstate(env, env->v7m.secure);
334
}
335
@@ -XXX,XX +XXX,XX @@ ARMMMUIdx arm_mmu_idx_el(CPUARMState *env, int el)
336
/* See ARM pseudo-function ELIsInHost. */
337
switch (el) {
338
case 0:
339
- if (arm_is_secure_below_el3(env)) {
340
- return ARMMMUIdx_SE10_0;
341
+ hcr = arm_hcr_el2_eff(env);
342
+ if ((hcr & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE)) {
343
+ idx = ARMMMUIdx_E20_0;
344
+ } else {
345
+ idx = ARMMMUIdx_E10_0;
346
}
347
- if ((env->cp15.hcr_el2 & (HCR_E2H | HCR_TGE)) == (HCR_E2H | HCR_TGE)
348
- && arm_el_is_aa64(env, 2)) {
349
- return ARMMMUIdx_E20_0;
350
- }
351
- return ARMMMUIdx_E10_0;
352
+ break;
353
case 1:
354
- if (arm_is_secure_below_el3(env)) {
355
- if (env->pstate & PSTATE_PAN) {
356
- return ARMMMUIdx_SE10_1_PAN;
357
- }
358
- return ARMMMUIdx_SE10_1;
359
- }
360
if (env->pstate & PSTATE_PAN) {
361
- return ARMMMUIdx_E10_1_PAN;
362
+ idx = ARMMMUIdx_E10_1_PAN;
363
+ } else {
364
+ idx = ARMMMUIdx_E10_1;
365
}
366
- return ARMMMUIdx_E10_1;
367
+ break;
368
case 2:
369
- /* TODO: ARMv8.4-SecEL2 */
370
/* Note that TGE does not apply at EL2. */
371
- if ((env->cp15.hcr_el2 & HCR_E2H) && arm_el_is_aa64(env, 2)) {
372
+ if (arm_hcr_el2_eff(env) & HCR_E2H) {
373
if (env->pstate & PSTATE_PAN) {
374
- return ARMMMUIdx_E20_2_PAN;
375
+ idx = ARMMMUIdx_E20_2_PAN;
376
+ } else {
377
+ idx = ARMMMUIdx_E20_2;
378
}
379
- return ARMMMUIdx_E20_2;
380
+ } else {
381
+ idx = ARMMMUIdx_E2;
382
}
383
- return ARMMMUIdx_E2;
384
+ break;
385
case 3:
386
return ARMMMUIdx_SE3;
387
default:
388
g_assert_not_reached();
389
}
390
+
391
+ if (arm_is_secure_below_el3(env)) {
392
+ idx &= ~ARM_MMU_IDX_A_NS;
393
+ }
394
+
395
+ return idx;
396
}
397
398
ARMMMUIdx arm_mmu_idx(CPUARMState *env)
399
@@ -XXX,XX +XXX,XX @@ static uint32_t rebuild_hflags_a64(CPUARMState *env, int el, int fp_el,
400
break;
401
case ARMMMUIdx_E20_2:
402
case ARMMMUIdx_E20_2_PAN:
403
- /* TODO: ARMv8.4-SecEL2 */
404
+ case ARMMMUIdx_SE20_2:
405
+ case ARMMMUIdx_SE20_2_PAN:
406
/*
407
* Note that EL20_2 is gated by HCR_EL2.E2H == 1, but EL20_0 is
408
* gated by HCR_EL2.<E2H,TGE> == '11', and so is LDTR.
409
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
410
index XXXXXXX..XXXXXXX 100644
42
index XXXXXXX..XXXXXXX 100644
411
--- a/target/arm/translate-a64.c
43
--- a/hw/arm/Kconfig
412
+++ b/target/arm/translate-a64.c
44
+++ b/hw/arm/Kconfig
413
@@ -XXX,XX +XXX,XX @@ static int get_a64_user_mem_index(DisasContext *s)
45
@@ -XXX,XX +XXX,XX @@ config ARM_VIRT
414
case ARMMMUIdx_SE10_1_PAN:
46
select DIMM
415
useridx = ARMMMUIdx_SE10_0;
47
select ACPI_HW_REDUCED
416
break;
48
select ACPI_APEI
417
+ case ARMMMUIdx_SE20_2:
49
+ select ACPI_VIOT
418
+ case ARMMMUIdx_SE20_2_PAN:
50
419
+ useridx = ARMMMUIdx_SE20_0;
51
config CHEETAH
420
+ break;
52
bool
421
default:
422
g_assert_not_reached();
423
}
424
--
53
--
425
2.20.1
54
2.25.1
426
55
427
56
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Jean-Philippe Brucker <jean-philippe@linaro.org>
2
2
3
The interface for object_property_add_bool is simpler,
3
virtio-iommu is now supported with ACPI VIOT as well as device tree.
4
making the code easier to understand.
4
Remove the restriction that prevents from instantiating a virtio-iommu
5
device under ACPI.
5
6
6
Reviewed-by: Andrew Jones <drjones@redhat.com>
7
Acked-by: Igor Mammedov <imammedo@redhat.com>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Reviewed-by: Eric Auger <eric.auger@redhat.com>
8
Message-id: 20210111235740.462469-4-richard.henderson@linaro.org
9
Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
10
Message-id: 20211210170415.583179-3-jean-philippe@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
12
---
11
target/arm/cpu64.c | 24 ++++++++++--------------
13
hw/arm/virt.c | 10 ++--------
12
1 file changed, 10 insertions(+), 14 deletions(-)
14
hw/virtio/virtio-iommu-pci.c | 12 ++----------
15
2 files changed, 4 insertions(+), 18 deletions(-)
13
16
14
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
17
diff --git a/hw/arm/virt.c b/hw/arm/virt.c
15
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
16
--- a/target/arm/cpu64.c
19
--- a/hw/arm/virt.c
17
+++ b/target/arm/cpu64.c
20
+++ b/hw/arm/virt.c
18
@@ -XXX,XX +XXX,XX @@ static void cpu_max_set_sve_max_vq(Object *obj, Visitor *v, const char *name,
21
@@ -XXX,XX +XXX,XX @@ static HotplugHandler *virt_machine_get_hotplug_handler(MachineState *machine,
19
cpu->sve_max_vq = max_vq;
22
MachineClass *mc = MACHINE_GET_CLASS(machine);
23
24
if (device_is_dynamic_sysbus(mc, dev) ||
25
- (object_dynamic_cast(OBJECT(dev), TYPE_PC_DIMM))) {
26
+ object_dynamic_cast(OBJECT(dev), TYPE_PC_DIMM) ||
27
+ object_dynamic_cast(OBJECT(dev), TYPE_VIRTIO_IOMMU_PCI)) {
28
return HOTPLUG_HANDLER(machine);
29
}
30
- if (object_dynamic_cast(OBJECT(dev), TYPE_VIRTIO_IOMMU_PCI)) {
31
- VirtMachineState *vms = VIRT_MACHINE(machine);
32
-
33
- if (!vms->bootinfo.firmware_loaded || !virt_is_acpi_enabled(vms)) {
34
- return HOTPLUG_HANDLER(machine);
35
- }
36
- }
37
return NULL;
20
}
38
}
21
39
22
+/*
40
diff --git a/hw/virtio/virtio-iommu-pci.c b/hw/virtio/virtio-iommu-pci.c
23
+ * Note that cpu_arm_get/set_sve_vq cannot use the simpler
41
index XXXXXXX..XXXXXXX 100644
24
+ * object_property_add_bool interface because they make use
42
--- a/hw/virtio/virtio-iommu-pci.c
25
+ * of the contents of "name" to determine which bit on which
43
+++ b/hw/virtio/virtio-iommu-pci.c
26
+ * to operate.
44
@@ -XXX,XX +XXX,XX @@ static void virtio_iommu_pci_realize(VirtIOPCIProxy *vpci_dev, Error **errp)
27
+ */
45
VirtIOIOMMU *s = VIRTIO_IOMMU(vdev);
28
static void cpu_arm_get_sve_vq(Object *obj, Visitor *v, const char *name,
46
29
void *opaque, Error **errp)
47
if (!qdev_get_machine_hotplug_handler(DEVICE(vpci_dev))) {
30
{
48
- MachineClass *mc = MACHINE_GET_CLASS(qdev_get_machine());
31
@@ -XXX,XX +XXX,XX @@ static void cpu_arm_set_sve_vq(Object *obj, Visitor *v, const char *name,
32
set_bit(vq - 1, cpu->sve_vq_init);
33
}
34
35
-static void cpu_arm_get_sve(Object *obj, Visitor *v, const char *name,
36
- void *opaque, Error **errp)
37
+static bool cpu_arm_get_sve(Object *obj, Error **errp)
38
{
39
ARMCPU *cpu = ARM_CPU(obj);
40
- bool value = cpu_isar_feature(aa64_sve, cpu);
41
-
49
-
42
- visit_type_bool(v, name, &value, errp);
50
- error_setg(errp,
43
+ return cpu_isar_feature(aa64_sve, cpu);
51
- "%s machine fails to create iommu-map device tree bindings",
44
}
52
- mc->name);
45
53
- error_append_hint(errp,
46
-static void cpu_arm_set_sve(Object *obj, Visitor *v, const char *name,
54
- "Check your machine implements a hotplug handler "
47
- void *opaque, Error **errp)
55
- "for the virtio-iommu-pci device\n");
48
+static void cpu_arm_set_sve(Object *obj, bool value, Error **errp)
56
- error_append_hint(errp, "Check the guest is booted without FW or with "
49
{
57
- "-no-acpi\n");
50
ARMCPU *cpu = ARM_CPU(obj);
58
+ error_setg(errp, "Check your machine implements a hotplug handler "
51
- bool value;
59
+ "for the virtio-iommu-pci device");
52
uint64_t t;
53
54
- if (!visit_type_bool(v, name, &value, errp)) {
55
- return;
56
- }
57
-
58
if (value && kvm_enabled() && !kvm_arm_sve_supported()) {
59
error_setg(errp, "'sve' feature not supported by KVM on this host");
60
return;
60
return;
61
@@ -XXX,XX +XXX,XX @@ void aarch64_add_sve_properties(Object *obj)
61
}
62
{
62
for (int i = 0; i < s->nb_reserved_regions; i++) {
63
uint32_t vq;
64
65
- object_property_add(obj, "sve", "bool", cpu_arm_get_sve,
66
- cpu_arm_set_sve, NULL, NULL);
67
+ object_property_add_bool(obj, "sve", cpu_arm_get_sve, cpu_arm_set_sve);
68
69
for (vq = 1; vq <= ARM_MAX_VQ; ++vq) {
70
char name[8];
71
--
63
--
72
2.20.1
64
2.25.1
73
65
74
66
diff view generated by jsdifflib
1
From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
1
From: Jean-Philippe Brucker <jean-philippe@linaro.org>
2
2
3
Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
3
We do not support instantiating multiple IOMMUs. Before adding a
4
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
4
virtio-iommu, check that no other IOMMU is present. This will detect
5
Message-id: 20210112104511.36576-6-remi.denis.courmont@huawei.com
5
both "iommu=smmuv3" machine parameter and another virtio-iommu instance.
6
[PMM: tweaked commit message to match reduced scope of patch
6
7
following rebase]
7
Fixes: 70e89132c9 ("hw/arm/virt: Add the virtio-iommu device tree mappings")
8
Reviewed-by: Eric Auger <eric.auger@redhat.com>
9
Reviewed-by: Igor Mammedov <imammedo@redhat.com>
10
Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
11
Message-id: 20211210170415.583179-4-jean-philippe@linaro.org
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
---
13
---
10
target/arm/cpu.h | 5 +++++
14
hw/arm/virt.c | 5 +++++
11
1 file changed, 5 insertions(+)
15
1 file changed, 5 insertions(+)
12
16
13
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
17
diff --git a/hw/arm/virt.c b/hw/arm/virt.c
14
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
15
--- a/target/arm/cpu.h
19
--- a/hw/arm/virt.c
16
+++ b/target/arm/cpu.h
20
+++ b/hw/arm/virt.c
17
@@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_sve(const ARMISARegisters *id)
21
@@ -XXX,XX +XXX,XX @@ static void virt_machine_device_pre_plug_cb(HotplugHandler *hotplug_dev,
18
return FIELD_EX64(id->id_aa64pfr0, ID_AA64PFR0, SVE) != 0;
22
hwaddr db_start = 0, db_end = 0;
19
}
23
char *resv_prop_str;
20
24
21
+static inline bool isar_feature_aa64_sel2(const ARMISARegisters *id)
25
+ if (vms->iommu != VIRT_IOMMU_NONE) {
22
+{
26
+ error_setg(errp, "virt machine does not support multiple IOMMUs");
23
+ return FIELD_EX64(id->id_aa64pfr0, ID_AA64PFR0, SEL2) != 0;
27
+ return;
24
+}
28
+ }
25
+
29
+
26
static inline bool isar_feature_aa64_vh(const ARMISARegisters *id)
30
switch (vms->msi_controller) {
27
{
31
case VIRT_MSI_CTRL_NONE:
28
return FIELD_EX64(id->id_aa64mmfr1, ID_AA64MMFR1, VH) != 0;
32
return;
29
--
33
--
30
2.20.1
34
2.25.1
31
35
32
36
diff view generated by jsdifflib
1
From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
1
From: Jean-Philippe Brucker <jean-philippe@linaro.org>
2
2
3
The VTTBR write callback so far assumes that the underlying VM lies in
3
To propagate errors to the caller of the pre_plug callback, use the
4
non-secure state. This handles the secure state scenario.
4
object_poperty_set*() functions directly instead of the qdev_prop_set*()
5
helpers.
5
6
6
Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
7
Suggested-by: Igor Mammedov <imammedo@redhat.com>
7
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
8
Reviewed-by: Eric Auger <eric.auger@redhat.com>
8
Message-id: 20210112104511.36576-10-remi.denis.courmont@huawei.com
9
Reviewed-by: Igor Mammedov <imammedo@redhat.com>
10
Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
11
Message-id: 20211210170415.583179-5-jean-philippe@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
13
---
11
target/arm/helper.c | 13 +++++++++----
14
hw/arm/virt.c | 5 +++--
12
1 file changed, 9 insertions(+), 4 deletions(-)
15
1 file changed, 3 insertions(+), 2 deletions(-)
13
16
14
diff --git a/target/arm/helper.c b/target/arm/helper.c
17
diff --git a/hw/arm/virt.c b/hw/arm/virt.c
15
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
16
--- a/target/arm/helper.c
19
--- a/hw/arm/virt.c
17
+++ b/target/arm/helper.c
20
+++ b/hw/arm/virt.c
18
@@ -XXX,XX +XXX,XX @@ static void vttbr_write(CPUARMState *env, const ARMCPRegInfo *ri,
21
@@ -XXX,XX +XXX,XX @@ static void virt_machine_device_pre_plug_cb(HotplugHandler *hotplug_dev,
19
* the combined stage 1&2 tlbs (EL10_1 and EL10_0).
22
db_start, db_end,
20
*/
23
VIRTIO_IOMMU_RESV_MEM_T_MSI);
21
if (raw_read(env, ri) != value) {
24
22
- tlb_flush_by_mmuidx(cs,
25
- qdev_prop_set_uint32(dev, "len-reserved-regions", 1);
23
- ARMMMUIdxBit_E10_1 |
26
- qdev_prop_set_string(dev, "reserved-regions[0]", resv_prop_str);
24
- ARMMMUIdxBit_E10_1_PAN |
27
+ object_property_set_uint(OBJECT(dev), "len-reserved-regions", 1, errp);
25
- ARMMMUIdxBit_E10_0);
28
+ object_property_set_str(OBJECT(dev), "reserved-regions[0]",
26
+ uint16_t mask = ARMMMUIdxBit_E10_1 |
29
+ resv_prop_str, errp);
27
+ ARMMMUIdxBit_E10_1_PAN |
30
g_free(resv_prop_str);
28
+ ARMMMUIdxBit_E10_0;
29
+
30
+ if (arm_is_secure_below_el3(env)) {
31
+ mask >>= ARM_MMU_IDX_A_NS;
32
+ }
33
+
34
+ tlb_flush_by_mmuidx(cs, mask);
35
raw_write(env, ri, value);
36
}
31
}
37
}
32
}
38
--
33
--
39
2.20.1
34
2.25.1
40
35
41
36
diff view generated by jsdifflib
1
From: Mihai Carabas <mihai.carabas@oracle.com>
1
From: Jean-Philippe Brucker <jean-philippe@linaro.org>
2
2
3
Add PCI interface support for PVPANIC device. Create a new file pvpanic-pci.c
3
Create empty data files and allow updates for the upcoming VIOT tests.
4
where the PCI specific routines reside and update the build system with the new
5
files and config structure.
6
4
7
Signed-off-by: Mihai Carabas <mihai.carabas@oracle.com>
5
Acked-by: Igor Mammedov <imammedo@redhat.com>
8
Reviewed-by: Gerd Hoffmann <kraxel@redhat.com>
6
Reviewed-by: Eric Auger <eric.auger@redhat.com>
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
10
[PMM: wrapped one long line]
8
Message-id: 20211210170415.583179-6-jean-philippe@linaro.org
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
10
---
13
docs/specs/pci-ids.txt | 1 +
11
tests/qtest/bios-tables-test-allowed-diff.h | 3 +++
14
include/hw/misc/pvpanic.h | 1 +
12
tests/data/acpi/q35/DSDT.viot | 0
15
include/hw/pci/pci.h | 1 +
13
tests/data/acpi/q35/VIOT.viot | 0
16
hw/misc/pvpanic-pci.c | 95 +++++++++++++++++++++++++++++++++++++++
14
tests/data/acpi/virt/VIOT | 0
17
hw/misc/Kconfig | 6 +++
15
4 files changed, 3 insertions(+)
18
hw/misc/meson.build | 1 +
16
create mode 100644 tests/data/acpi/q35/DSDT.viot
19
6 files changed, 105 insertions(+)
17
create mode 100644 tests/data/acpi/q35/VIOT.viot
20
create mode 100644 hw/misc/pvpanic-pci.c
18
create mode 100644 tests/data/acpi/virt/VIOT
21
19
22
diff --git a/docs/specs/pci-ids.txt b/docs/specs/pci-ids.txt
20
diff --git a/tests/qtest/bios-tables-test-allowed-diff.h b/tests/qtest/bios-tables-test-allowed-diff.h
23
index XXXXXXX..XXXXXXX 100644
21
index XXXXXXX..XXXXXXX 100644
24
--- a/docs/specs/pci-ids.txt
22
--- a/tests/qtest/bios-tables-test-allowed-diff.h
25
+++ b/docs/specs/pci-ids.txt
23
+++ b/tests/qtest/bios-tables-test-allowed-diff.h
26
@@ -XXX,XX +XXX,XX @@ PCI devices (other than virtio):
24
@@ -1 +1,4 @@
27
1b36:000d PCI xhci usb host adapter
25
/* List of comma-separated changed AML files to ignore */
28
1b36:000f mdpy (mdev sample device), linux/samples/vfio-mdev/mdpy.c
26
+"tests/data/acpi/virt/VIOT",
29
1b36:0010 PCIe NVMe device (-device nvme)
27
+"tests/data/acpi/q35/DSDT.viot",
30
+1b36:0011 PCI PVPanic device (-device pvpanic-pci)
28
+"tests/data/acpi/q35/VIOT.viot",
31
29
diff --git a/tests/data/acpi/q35/DSDT.viot b/tests/data/acpi/q35/DSDT.viot
32
All these devices are documented in docs/specs.
33
34
diff --git a/include/hw/misc/pvpanic.h b/include/hw/misc/pvpanic.h
35
index XXXXXXX..XXXXXXX 100644
36
--- a/include/hw/misc/pvpanic.h
37
+++ b/include/hw/misc/pvpanic.h
38
@@ -XXX,XX +XXX,XX @@
39
#include "qom/object.h"
40
41
#define TYPE_PVPANIC_ISA_DEVICE "pvpanic"
42
+#define TYPE_PVPANIC_PCI_DEVICE "pvpanic-pci"
43
44
#define PVPANIC_IOPORT_PROP "ioport"
45
46
diff --git a/include/hw/pci/pci.h b/include/hw/pci/pci.h
47
index XXXXXXX..XXXXXXX 100644
48
--- a/include/hw/pci/pci.h
49
+++ b/include/hw/pci/pci.h
50
@@ -XXX,XX +XXX,XX @@ extern bool pci_available;
51
#define PCI_DEVICE_ID_REDHAT_PCIE_BRIDGE 0x000e
52
#define PCI_DEVICE_ID_REDHAT_MDPY 0x000f
53
#define PCI_DEVICE_ID_REDHAT_NVME 0x0010
54
+#define PCI_DEVICE_ID_REDHAT_PVPANIC 0x0011
55
#define PCI_DEVICE_ID_REDHAT_QXL 0x0100
56
57
#define FMT_PCIBUS PRIx64
58
diff --git a/hw/misc/pvpanic-pci.c b/hw/misc/pvpanic-pci.c
59
new file mode 100644
30
new file mode 100644
60
index XXXXXXX..XXXXXXX
31
index XXXXXXX..XXXXXXX
61
--- /dev/null
32
diff --git a/tests/data/acpi/q35/VIOT.viot b/tests/data/acpi/q35/VIOT.viot
62
+++ b/hw/misc/pvpanic-pci.c
33
new file mode 100644
63
@@ -XXX,XX +XXX,XX @@
34
index XXXXXXX..XXXXXXX
64
+/*
35
diff --git a/tests/data/acpi/virt/VIOT b/tests/data/acpi/virt/VIOT
65
+ * QEMU simulated PCI pvpanic device.
36
new file mode 100644
66
+ *
37
index XXXXXXX..XXXXXXX
67
+ * Copyright (C) 2020 Oracle
68
+ *
69
+ * Authors:
70
+ * Mihai Carabas <mihai.carabas@oracle.com>
71
+ *
72
+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
73
+ * See the COPYING file in the top-level directory.
74
+ *
75
+ */
76
+
77
+#include "qemu/osdep.h"
78
+#include "qemu/log.h"
79
+#include "qemu/module.h"
80
+#include "sysemu/runstate.h"
81
+
82
+#include "hw/nvram/fw_cfg.h"
83
+#include "hw/qdev-properties.h"
84
+#include "migration/vmstate.h"
85
+#include "hw/misc/pvpanic.h"
86
+#include "qom/object.h"
87
+#include "hw/pci/pci.h"
88
+
89
+OBJECT_DECLARE_SIMPLE_TYPE(PVPanicPCIState, PVPANIC_PCI_DEVICE)
90
+
91
+/*
92
+ * PVPanicPCIState for PCI device
93
+ */
94
+typedef struct PVPanicPCIState {
95
+ PCIDevice dev;
96
+ PVPanicState pvpanic;
97
+} PVPanicPCIState;
98
+
99
+static const VMStateDescription vmstate_pvpanic_pci = {
100
+ .name = "pvpanic-pci",
101
+ .version_id = 1,
102
+ .minimum_version_id = 1,
103
+ .fields = (VMStateField[]) {
104
+ VMSTATE_PCI_DEVICE(dev, PVPanicPCIState),
105
+ VMSTATE_END_OF_LIST()
106
+ }
107
+};
108
+
109
+static void pvpanic_pci_realizefn(PCIDevice *dev, Error **errp)
110
+{
111
+ PVPanicPCIState *s = PVPANIC_PCI_DEVICE(dev);
112
+ PVPanicState *ps = &s->pvpanic;
113
+
114
+ pvpanic_setup_io(&s->pvpanic, DEVICE(s), 2);
115
+
116
+ pci_register_bar(dev, 0, PCI_BASE_ADDRESS_SPACE_MEMORY, &ps->mr);
117
+}
118
+
119
+static Property pvpanic_pci_properties[] = {
120
+ DEFINE_PROP_UINT8("events", PVPanicPCIState, pvpanic.events,
121
+ PVPANIC_PANICKED | PVPANIC_CRASHLOADED),
122
+ DEFINE_PROP_END_OF_LIST(),
123
+};
124
+
125
+static void pvpanic_pci_class_init(ObjectClass *klass, void *data)
126
+{
127
+ DeviceClass *dc = DEVICE_CLASS(klass);
128
+ PCIDeviceClass *pc = PCI_DEVICE_CLASS(klass);
129
+
130
+ device_class_set_props(dc, pvpanic_pci_properties);
131
+
132
+ pc->realize = pvpanic_pci_realizefn;
133
+ pc->vendor_id = PCI_VENDOR_ID_REDHAT;
134
+ pc->device_id = PCI_DEVICE_ID_REDHAT_PVPANIC;
135
+ pc->revision = 1;
136
+ pc->class_id = PCI_CLASS_SYSTEM_OTHER;
137
+ dc->vmsd = &vmstate_pvpanic_pci;
138
+
139
+ set_bit(DEVICE_CATEGORY_MISC, dc->categories);
140
+}
141
+
142
+static TypeInfo pvpanic_pci_info = {
143
+ .name = TYPE_PVPANIC_PCI_DEVICE,
144
+ .parent = TYPE_PCI_DEVICE,
145
+ .instance_size = sizeof(PVPanicPCIState),
146
+ .class_init = pvpanic_pci_class_init,
147
+ .interfaces = (InterfaceInfo[]) {
148
+ { INTERFACE_CONVENTIONAL_PCI_DEVICE },
149
+ { }
150
+ }
151
+};
152
+
153
+static void pvpanic_register_types(void)
154
+{
155
+ type_register_static(&pvpanic_pci_info);
156
+}
157
+
158
+type_init(pvpanic_register_types);
159
diff --git a/hw/misc/Kconfig b/hw/misc/Kconfig
160
index XXXXXXX..XXXXXXX 100644
161
--- a/hw/misc/Kconfig
162
+++ b/hw/misc/Kconfig
163
@@ -XXX,XX +XXX,XX @@ config IOTKIT_SYSINFO
164
config PVPANIC_COMMON
165
bool
166
167
+config PVPANIC_PCI
168
+ bool
169
+ default y if PCI_DEVICES
170
+ depends on PCI
171
+ select PVPANIC_COMMON
172
+
173
config PVPANIC_ISA
174
bool
175
depends on ISA_BUS
176
diff --git a/hw/misc/meson.build b/hw/misc/meson.build
177
index XXXXXXX..XXXXXXX 100644
178
--- a/hw/misc/meson.build
179
+++ b/hw/misc/meson.build
180
@@ -XXX,XX +XXX,XX @@ softmmu_ss.add(when: 'CONFIG_ARMSSE_CPUID', if_true: files('armsse-cpuid.c'))
181
softmmu_ss.add(when: 'CONFIG_ARMSSE_MHU', if_true: files('armsse-mhu.c'))
182
183
softmmu_ss.add(when: 'CONFIG_PVPANIC_ISA', if_true: files('pvpanic-isa.c'))
184
+softmmu_ss.add(when: 'CONFIG_PVPANIC_PCI', if_true: files('pvpanic-pci.c'))
185
softmmu_ss.add(when: 'CONFIG_AUX', if_true: files('auxbus.c'))
186
softmmu_ss.add(when: 'CONFIG_ASPEED_SOC', if_true: files('aspeed_scu.c', 'aspeed_sdmc.c', 'aspeed_xdma.c'))
187
softmmu_ss.add(when: 'CONFIG_MSF2', if_true: files('msf2-sysreg.c'))
188
--
38
--
189
2.20.1
39
2.25.1
190
40
191
41
diff view generated by jsdifflib
1
From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
1
From: Jean-Philippe Brucker <jean-philippe@linaro.org>
2
2
3
This checks if EL2 is enabled (meaning EL2 registers take effects) in
3
Add two test cases for VIOT, one on the q35 machine and the other on
4
the current security context.
4
virt. To test complex topologies the q35 test has two PCIe buses that
5
bypass the IOMMU (and are therefore not described by VIOT), and two
6
buses that are translated by virtio-iommu.
5
7
6
Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
8
Reviewed-by: Eric Auger <eric.auger@redhat.com>
7
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
9
Reviewed-by: Igor Mammedov <imammedo@redhat.com>
8
Message-id: 20210112104511.36576-2-remi.denis.courmont@huawei.com
10
Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
11
Message-id: 20211210170415.583179-7-jean-philippe@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
13
---
11
target/arm/cpu.h | 17 +++++++++++++++++
14
tests/qtest/bios-tables-test.c | 38 ++++++++++++++++++++++++++++++++++
12
1 file changed, 17 insertions(+)
15
1 file changed, 38 insertions(+)
13
16
14
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
17
diff --git a/tests/qtest/bios-tables-test.c b/tests/qtest/bios-tables-test.c
15
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
16
--- a/target/arm/cpu.h
19
--- a/tests/qtest/bios-tables-test.c
17
+++ b/target/arm/cpu.h
20
+++ b/tests/qtest/bios-tables-test.c
18
@@ -XXX,XX +XXX,XX @@ static inline bool arm_is_secure(CPUARMState *env)
21
@@ -XXX,XX +XXX,XX @@ static void test_acpi_virt_tcg(void)
19
return arm_is_secure_below_el3(env);
22
free_test_data(&data);
20
}
23
}
21
24
22
+/*
25
+static void test_acpi_q35_viot(void)
23
+ * Return true if the current security state has AArch64 EL2 or AArch32 Hyp.
24
+ * This corresponds to the pseudocode EL2Enabled()
25
+ */
26
+static inline bool arm_is_el2_enabled(CPUARMState *env)
27
+{
26
+{
28
+ if (arm_feature(env, ARM_FEATURE_EL2)) {
27
+ test_data data = {
29
+ return !arm_is_secure_below_el3(env);
28
+ .machine = MACHINE_Q35,
30
+ }
29
+ .variant = ".viot",
31
+ return false;
30
+ };
31
+
32
+ /*
33
+ * To keep things interesting, two buses bypass the IOMMU.
34
+ * VIOT should only describes the other two buses.
35
+ */
36
+ test_acpi_one("-machine default_bus_bypass_iommu=on "
37
+ "-device virtio-iommu-pci "
38
+ "-device pxb-pcie,bus_nr=0x10,id=pcie.100,bus=pcie.0 "
39
+ "-device pxb-pcie,bus_nr=0x20,id=pcie.200,bus=pcie.0,bypass_iommu=on "
40
+ "-device pxb-pcie,bus_nr=0x30,id=pcie.300,bus=pcie.0",
41
+ &data);
42
+ free_test_data(&data);
32
+}
43
+}
33
+
44
+
34
#else
45
+static void test_acpi_virt_viot(void)
35
static inline bool arm_is_secure_below_el3(CPUARMState *env)
46
+{
47
+ test_data data = {
48
+ .machine = "virt",
49
+ .uefi_fl1 = "pc-bios/edk2-aarch64-code.fd",
50
+ .uefi_fl2 = "pc-bios/edk2-arm-vars.fd",
51
+ .cd = "tests/data/uefi-boot-images/bios-tables-test.aarch64.iso.qcow2",
52
+ .ram_start = 0x40000000ULL,
53
+ .scan_len = 128ULL * 1024 * 1024,
54
+ };
55
+
56
+ test_acpi_one("-cpu cortex-a57 "
57
+ "-device virtio-iommu-pci", &data);
58
+ free_test_data(&data);
59
+}
60
+
61
static void test_oem_fields(test_data *data)
36
{
62
{
37
@@ -XXX,XX +XXX,XX @@ static inline bool arm_is_secure(CPUARMState *env)
63
int i;
38
{
64
@@ -XXX,XX +XXX,XX @@ int main(int argc, char *argv[])
39
return false;
65
qtest_add_func("acpi/q35/kvm/xapic", test_acpi_q35_kvm_xapic);
40
}
66
qtest_add_func("acpi/q35/kvm/dmar", test_acpi_q35_kvm_dmar);
41
+
67
}
42
+static inline bool arm_is_el2_enabled(CPUARMState *env)
68
+ qtest_add_func("acpi/q35/viot", test_acpi_q35_viot);
43
+{
69
} else if (strcmp(arch, "aarch64") == 0) {
44
+ return false;
70
if (has_tcg) {
45
+}
71
qtest_add_func("acpi/virt", test_acpi_virt_tcg);
46
#endif
72
@@ -XXX,XX +XXX,XX @@ int main(int argc, char *argv[])
47
73
qtest_add_func("acpi/virt/memhp", test_acpi_virt_tcg_memhp);
48
/**
74
qtest_add_func("acpi/virt/pxb", test_acpi_virt_tcg_pxb);
75
qtest_add_func("acpi/virt/oem-fields", test_acpi_oem_fields_virt);
76
+ qtest_add_func("acpi/virt/viot", test_acpi_virt_viot);
77
}
78
}
79
ret = g_test_run();
49
--
80
--
50
2.20.1
81
2.25.1
51
82
52
83
diff view generated by jsdifflib
1
From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
1
From: Jean-Philippe Brucker <jean-philippe@linaro.org>
2
2
3
In this context, the HCR value is the effective value, and thus is
3
Add expected blobs of the VIOT and DSDT table for the VIOT test on the
4
zero in secure mode. The tests for HCR.{F,I}MO are sufficient.
4
q35 machine.
5
5
6
Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
6
Since the test instantiates a virtio device and two PCIe expander
7
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
7
bridges, DSDT.viot has more blocks than the base DSDT.
8
Message-id: 20210112104511.36576-1-remi.denis.courmont@huawei.com
8
9
The VIOT table generated for the q35 test is:
10
11
[000h 0000 4] Signature : "VIOT" [Virtual I/O Translation Table]
12
[004h 0004 4] Table Length : 00000070
13
[008h 0008 1] Revision : 00
14
[009h 0009 1] Checksum : 3D
15
[00Ah 0010 6] Oem ID : "BOCHS "
16
[010h 0016 8] Oem Table ID : "BXPC "
17
[018h 0024 4] Oem Revision : 00000001
18
[01Ch 0028 4] Asl Compiler ID : "BXPC"
19
[020h 0032 4] Asl Compiler Revision : 00000001
20
21
[024h 0036 2] Node count : 0003
22
[026h 0038 2] Node offset : 0030
23
[028h 0040 8] Reserved : 0000000000000000
24
25
[030h 0048 1] Type : 03 [VirtIO-PCI IOMMU]
26
[031h 0049 1] Reserved : 00
27
[032h 0050 2] Length : 0010
28
29
[034h 0052 2] PCI Segment : 0000
30
[036h 0054 2] PCI BDF number : 0010
31
[038h 0056 8] Reserved : 0000000000000000
32
33
[040h 0064 1] Type : 01 [PCI Range]
34
[041h 0065 1] Reserved : 00
35
[042h 0066 2] Length : 0018
36
37
[044h 0068 4] Endpoint start : 00003000
38
[048h 0072 2] PCI Segment start : 0000
39
[04Ah 0074 2] PCI Segment end : 0000
40
[04Ch 0076 2] PCI BDF start : 3000
41
[04Eh 0078 2] PCI BDF end : 30FF
42
[050h 0080 2] Output node : 0030
43
[052h 0082 6] Reserved : 000000000000
44
45
[058h 0088 1] Type : 01 [PCI Range]
46
[059h 0089 1] Reserved : 00
47
[05Ah 0090 2] Length : 0018
48
49
[05Ch 0092 4] Endpoint start : 00001000
50
[060h 0096 2] PCI Segment start : 0000
51
[062h 0098 2] PCI Segment end : 0000
52
[064h 0100 2] PCI BDF start : 1000
53
[066h 0102 2] PCI BDF end : 10FF
54
[068h 0104 2] Output node : 0030
55
[06Ah 0106 6] Reserved : 000000000000
56
57
And the DSDT diff is:
58
59
@@ -XXX,XX +XXX,XX @@
60
*
61
* Disassembling to symbolic ASL+ operators
62
*
63
- * Disassembly of tests/data/acpi/q35/DSDT, Fri Dec 10 15:03:08 2021
64
+ * Disassembly of /tmp/aml-H9Y5D1, Fri Dec 10 15:02:27 2021
65
*
66
* Original Table Header:
67
* Signature "DSDT"
68
- * Length 0x00002061 (8289)
69
+ * Length 0x000024B6 (9398)
70
* Revision 0x01 **** 32-bit table (V1), no 64-bit math support
71
- * Checksum 0xFA
72
+ * Checksum 0xA7
73
* OEM ID "BOCHS "
74
* OEM Table ID "BXPC "
75
* OEM Revision 0x00000001 (1)
76
@@ -XXX,XX +XXX,XX @@
77
}
78
}
79
80
+ Scope (\_SB)
81
+ {
82
+ Device (PC30)
83
+ {
84
+ Name (_UID, 0x30) // _UID: Unique ID
85
+ Name (_BBN, 0x30) // _BBN: BIOS Bus Number
86
+ Name (_HID, EisaId ("PNP0A08") /* PCI Express Bus */) // _HID: Hardware ID
87
+ Name (_CID, EisaId ("PNP0A03") /* PCI Bus */) // _CID: Compatible ID
88
+ Method (_OSC, 4, NotSerialized) // _OSC: Operating System Capabilities
89
+ {
90
+ CreateDWordField (Arg3, Zero, CDW1)
91
+ If ((Arg0 == ToUUID ("33db4d5b-1ff7-401c-9657-7441c03dd766") /* PCI Host Bridge Device */))
92
+ {
93
+ CreateDWordField (Arg3, 0x04, CDW2)
94
+ CreateDWordField (Arg3, 0x08, CDW3)
95
+ Local0 = CDW3 /* \_SB_.PC30._OSC.CDW3 */
96
+ Local0 &= 0x1F
97
+ If ((Arg1 != One))
98
+ {
99
+ CDW1 |= 0x08
100
+ }
101
+
102
+ If ((CDW3 != Local0))
103
+ {
104
+ CDW1 |= 0x10
105
+ }
106
+
107
+ CDW3 = Local0
108
+ }
109
+ Else
110
+ {
111
+ CDW1 |= 0x04
112
+ }
113
+
114
+ Return (Arg3)
115
+ }
116
+
117
+ Method (_PRT, 0, NotSerialized) // _PRT: PCI Routing Table
118
+ {
119
+ Local0 = Package (0x80){}
120
+ Local1 = Zero
121
+ While ((Local1 < 0x80))
122
+ {
123
+ Local2 = (Local1 >> 0x02)
124
+ Local3 = ((Local1 + Local2) & 0x03)
125
+ If ((Local3 == Zero))
126
+ {
127
+ Local4 = Package (0x04)
128
+ {
129
+ Zero,
130
+ Zero,
131
+ LNKD,
132
+ Zero
133
+ }
134
+ }
135
+
136
+ If ((Local3 == One))
137
+ {
138
+ Local4 = Package (0x04)
139
+ {
140
+ Zero,
141
+ Zero,
142
+ LNKA,
143
+ Zero
144
+ }
145
+ }
146
+
147
+ If ((Local3 == 0x02))
148
+ {
149
+ Local4 = Package (0x04)
150
+ {
151
+ Zero,
152
+ Zero,
153
+ LNKB,
154
+ Zero
155
+ }
156
+ }
157
+
158
+ If ((Local3 == 0x03))
159
+ {
160
+ Local4 = Package (0x04)
161
+ {
162
+ Zero,
163
+ Zero,
164
+ LNKC,
165
+ Zero
166
+ }
167
+ }
168
+
169
+ Local4 [Zero] = ((Local2 << 0x10) | 0xFFFF)
170
+ Local4 [One] = (Local1 & 0x03)
171
+ Local0 [Local1] = Local4
172
+ Local1++
173
+ }
174
+
175
+ Return (Local0)
176
+ }
177
+
178
+ Name (_CRS, ResourceTemplate () // _CRS: Current Resource Settings
179
+ {
180
+ WordBusNumber (ResourceProducer, MinFixed, MaxFixed, PosDecode,
181
+ 0x0000, // Granularity
182
+ 0x0030, // Range Minimum
183
+ 0x0030, // Range Maximum
184
+ 0x0000, // Translation Offset
185
+ 0x0001, // Length
186
+ ,, )
187
+ })
188
+ }
189
+ }
190
+
191
+ Scope (\_SB)
192
+ {
193
+ Device (PC20)
194
+ {
195
+ Name (_UID, 0x20) // _UID: Unique ID
196
+ Name (_BBN, 0x20) // _BBN: BIOS Bus Number
197
+ Name (_HID, EisaId ("PNP0A08") /* PCI Express Bus */) // _HID: Hardware ID
198
+ Name (_CID, EisaId ("PNP0A03") /* PCI Bus */) // _CID: Compatible ID
199
+ Method (_OSC, 4, NotSerialized) // _OSC: Operating System Capabilities
200
+ {
201
+ CreateDWordField (Arg3, Zero, CDW1)
202
+ If ((Arg0 == ToUUID ("33db4d5b-1ff7-401c-9657-7441c03dd766") /* PCI Host Bridge Device */))
203
+ {
204
+ CreateDWordField (Arg3, 0x04, CDW2)
205
+ CreateDWordField (Arg3, 0x08, CDW3)
206
+ Local0 = CDW3 /* \_SB_.PC20._OSC.CDW3 */
207
+ Local0 &= 0x1F
208
+ If ((Arg1 != One))
209
+ {
210
+ CDW1 |= 0x08
211
+ }
212
+
213
+ If ((CDW3 != Local0))
214
+ {
215
+ CDW1 |= 0x10
216
+ }
217
+
218
+ CDW3 = Local0
219
+ }
220
+ Else
221
+ {
222
+ CDW1 |= 0x04
223
+ }
224
+
225
+ Return (Arg3)
226
+ }
227
+
228
+ Method (_PRT, 0, NotSerialized) // _PRT: PCI Routing Table
229
+ {
230
+ Local0 = Package (0x80){}
231
+ Local1 = Zero
232
+ While ((Local1 < 0x80))
233
+ {
234
+ Local2 = (Local1 >> 0x02)
235
+ Local3 = ((Local1 + Local2) & 0x03)
236
+ If ((Local3 == Zero))
237
+ {
238
+ Local4 = Package (0x04)
239
+ {
240
+ Zero,
241
+ Zero,
242
+ LNKD,
243
+ Zero
244
+ }
245
+ }
246
+
247
+ If ((Local3 == One))
248
+ {
249
+ Local4 = Package (0x04)
250
+ {
251
+ Zero,
252
+ Zero,
253
+ LNKA,
254
+ Zero
255
+ }
256
+ }
257
+
258
+ If ((Local3 == 0x02))
259
+ {
260
+ Local4 = Package (0x04)
261
+ {
262
+ Zero,
263
+ Zero,
264
+ LNKB,
265
+ Zero
266
+ }
267
+ }
268
+
269
+ If ((Local3 == 0x03))
270
+ {
271
+ Local4 = Package (0x04)
272
+ {
273
+ Zero,
274
+ Zero,
275
+ LNKC,
276
+ Zero
277
+ }
278
+ }
279
+
280
+ Local4 [Zero] = ((Local2 << 0x10) | 0xFFFF)
281
+ Local4 [One] = (Local1 & 0x03)
282
+ Local0 [Local1] = Local4
283
+ Local1++
284
+ }
285
+
286
+ Return (Local0)
287
+ }
288
+
289
+ Name (_CRS, ResourceTemplate () // _CRS: Current Resource Settings
290
+ {
291
+ WordBusNumber (ResourceProducer, MinFixed, MaxFixed, PosDecode,
292
+ 0x0000, // Granularity
293
+ 0x0020, // Range Minimum
294
+ 0x0020, // Range Maximum
295
+ 0x0000, // Translation Offset
296
+ 0x0001, // Length
297
+ ,, )
298
+ })
299
+ }
300
+ }
301
+
302
+ Scope (\_SB)
303
+ {
304
+ Device (PC10)
305
+ {
306
+ Name (_UID, 0x10) // _UID: Unique ID
307
+ Name (_BBN, 0x10) // _BBN: BIOS Bus Number
308
+ Name (_HID, EisaId ("PNP0A08") /* PCI Express Bus */) // _HID: Hardware ID
309
+ Name (_CID, EisaId ("PNP0A03") /* PCI Bus */) // _CID: Compatible ID
310
+ Method (_OSC, 4, NotSerialized) // _OSC: Operating System Capabilities
311
+ {
312
+ CreateDWordField (Arg3, Zero, CDW1)
313
+ If ((Arg0 == ToUUID ("33db4d5b-1ff7-401c-9657-7441c03dd766") /* PCI Host Bridge Device */))
314
+ {
315
+ CreateDWordField (Arg3, 0x04, CDW2)
316
+ CreateDWordField (Arg3, 0x08, CDW3)
317
+ Local0 = CDW3 /* \_SB_.PC10._OSC.CDW3 */
318
+ Local0 &= 0x1F
319
+ If ((Arg1 != One))
320
+ {
321
+ CDW1 |= 0x08
322
+ }
323
+
324
+ If ((CDW3 != Local0))
325
+ {
326
+ CDW1 |= 0x10
327
+ }
328
+
329
+ CDW3 = Local0
330
+ }
331
+ Else
332
+ {
333
+ CDW1 |= 0x04
334
+ }
335
+
336
+ Return (Arg3)
337
+ }
338
+
339
+ Method (_PRT, 0, NotSerialized) // _PRT: PCI Routing Table
340
+ {
341
+ Local0 = Package (0x80){}
342
+ Local1 = Zero
343
+ While ((Local1 < 0x80))
344
+ {
345
+ Local2 = (Local1 >> 0x02)
346
+ Local3 = ((Local1 + Local2) & 0x03)
347
+ If ((Local3 == Zero))
348
+ {
349
+ Local4 = Package (0x04)
350
+ {
351
+ Zero,
352
+ Zero,
353
+ LNKD,
354
+ Zero
355
+ }
356
+ }
357
+
358
+ If ((Local3 == One))
359
+ {
360
+ Local4 = Package (0x04)
361
+ {
362
+ Zero,
363
+ Zero,
364
+ LNKA,
365
+ Zero
366
+ }
367
+ }
368
+
369
+ If ((Local3 == 0x02))
370
+ {
371
+ Local4 = Package (0x04)
372
+ {
373
+ Zero,
374
+ Zero,
375
+ LNKB,
376
+ Zero
377
+ }
378
+ }
379
+
380
+ If ((Local3 == 0x03))
381
+ {
382
+ Local4 = Package (0x04)
383
+ {
384
+ Zero,
385
+ Zero,
386
+ LNKC,
387
+ Zero
388
+ }
389
+ }
390
+
391
+ Local4 [Zero] = ((Local2 << 0x10) | 0xFFFF)
392
+ Local4 [One] = (Local1 & 0x03)
393
+ Local0 [Local1] = Local4
394
+ Local1++
395
+ }
396
+
397
+ Return (Local0)
398
+ }
399
+
400
+ Name (_CRS, ResourceTemplate () // _CRS: Current Resource Settings
401
+ {
402
+ WordBusNumber (ResourceProducer, MinFixed, MaxFixed, PosDecode,
403
+ 0x0000, // Granularity
404
+ 0x0010, // Range Minimum
405
+ 0x0010, // Range Maximum
406
+ 0x0000, // Translation Offset
407
+ 0x0001, // Length
408
+ ,, )
409
+ })
410
+ }
411
+ }
412
+
413
Scope (\_SB.PCI0)
414
{
415
Name (_CRS, ResourceTemplate () // _CRS: Current Resource Settings
416
@@ -XXX,XX +XXX,XX @@
417
WordBusNumber (ResourceProducer, MinFixed, MaxFixed, PosDecode,
418
0x0000, // Granularity
419
0x0000, // Range Minimum
420
- 0x00FF, // Range Maximum
421
+ 0x000F, // Range Maximum
422
0x0000, // Translation Offset
423
- 0x0100, // Length
424
+ 0x0010, // Length
425
,, )
426
IO (Decode16,
427
0x0CF8, // Range Minimum
428
@@ -XXX,XX +XXX,XX @@
429
}
430
}
431
432
+ Device (S10)
433
+ {
434
+ Name (_ADR, 0x00020000) // _ADR: Address
435
+ }
436
+
437
+ Device (S18)
438
+ {
439
+ Name (_ADR, 0x00030000) // _ADR: Address
440
+ }
441
+
442
+ Device (S20)
443
+ {
444
+ Name (_ADR, 0x00040000) // _ADR: Address
445
+ }
446
+
447
+ Device (S28)
448
+ {
449
+ Name (_ADR, 0x00050000) // _ADR: Address
450
+ }
451
+
452
Method (PCNT, 0, NotSerialized)
453
{
454
}
455
456
Reviewed-by: Eric Auger <eric.auger@redhat.com>
457
Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
458
Message-id: 20211210170415.583179-8-jean-philippe@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
459
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
460
---
11
target/arm/cpu.c | 8 ++++----
461
tests/qtest/bios-tables-test-allowed-diff.h | 2 --
12
target/arm/helper.c | 10 ++++------
462
tests/data/acpi/q35/DSDT.viot | Bin 0 -> 9398 bytes
13
2 files changed, 8 insertions(+), 10 deletions(-)
463
tests/data/acpi/q35/VIOT.viot | Bin 0 -> 112 bytes
14
464
3 files changed, 2 deletions(-)
15
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
465
466
diff --git a/tests/qtest/bios-tables-test-allowed-diff.h b/tests/qtest/bios-tables-test-allowed-diff.h
16
index XXXXXXX..XXXXXXX 100644
467
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/cpu.c
468
--- a/tests/qtest/bios-tables-test-allowed-diff.h
18
+++ b/target/arm/cpu.c
469
+++ b/tests/qtest/bios-tables-test-allowed-diff.h
19
@@ -XXX,XX +XXX,XX @@ static inline bool arm_excp_unmasked(CPUState *cs, unsigned int excp_idx,
470
@@ -XXX,XX +XXX,XX @@
20
break;
471
/* List of comma-separated changed AML files to ignore */
21
472
"tests/data/acpi/virt/VIOT",
22
case EXCP_VFIQ:
473
-"tests/data/acpi/q35/DSDT.viot",
23
- if (secure || !(hcr_el2 & HCR_FMO) || (hcr_el2 & HCR_TGE)) {
474
-"tests/data/acpi/q35/VIOT.viot",
24
- /* VFIQs are only taken when hypervized and non-secure. */
475
diff --git a/tests/data/acpi/q35/DSDT.viot b/tests/data/acpi/q35/DSDT.viot
25
+ if (!(hcr_el2 & HCR_FMO) || (hcr_el2 & HCR_TGE)) {
26
+ /* VFIQs are only taken when hypervized. */
27
return false;
28
}
29
return !(env->daif & PSTATE_F);
30
case EXCP_VIRQ:
31
- if (secure || !(hcr_el2 & HCR_IMO) || (hcr_el2 & HCR_TGE)) {
32
- /* VIRQs are only taken when hypervized and non-secure. */
33
+ if (!(hcr_el2 & HCR_IMO) || (hcr_el2 & HCR_TGE)) {
34
+ /* VIRQs are only taken when hypervized. */
35
return false;
36
}
37
return !(env->daif & PSTATE_I);
38
diff --git a/target/arm/helper.c b/target/arm/helper.c
39
index XXXXXXX..XXXXXXX 100644
476
index XXXXXXX..XXXXXXX 100644
40
--- a/target/arm/helper.c
477
GIT binary patch
41
+++ b/target/arm/helper.c
478
literal 9398
42
@@ -XXX,XX +XXX,XX @@ static void csselr_write(CPUARMState *env, const ARMCPRegInfo *ri,
479
zcmeHNO>7&-8J*>iv|O&FB}G~Oi$yp||57BBoWHhc5OS9yDTx$CQgH$r;8Idr*-4Q_
43
static uint64_t isr_read(CPUARMState *env, const ARMCPRegInfo *ri)
480
z5(9Az1F`}niVsB-)<KW7p`g9Br(A2Gm-gmc1N78GFS!;)e2V(MnH_0{q<{#yMgn&C
44
{
481
zn|*J-d9yqFhO_H6z19~`FlPL*u<DkZ*}|)JH;X@mF-FI<cPg<fti9tEN*yB^i5czN
45
CPUState *cs = env_cpu(env);
482
zNq&q?!OZ;BE3B7{KWzJ-`Tn~f`9?Qj8~2^N8{Oc8J%57{==w%rS#;nOCp*nTr@iZ1
46
- uint64_t hcr_el2 = arm_hcr_el2_eff(env);
483
zb+?i;JLQUJ=O0?8*>S~D)a>NF1~WVB6^~_B#yhJ`H+JU@=6aXs`?Yv)J2h=N?drcS
47
+ bool el1 = arm_current_el(env) == 1;
484
zeLZ*n<<Bm^n}6`jfBx#u8&(W}1?)}iF9o#mZ~E2+zwdn7yK3AbIzKnxpZ>JRPm3~#
48
+ uint64_t hcr_el2 = el1 ? arm_hcr_el2_eff(env) : 0;
485
z&ICS{+_OayRW-l=Mtk=~uaS3o8z<_udd|(wqg`&JnVPfCe>BUOO`Su3e>pff_^UW%
49
uint64_t ret = 0;
486
z&JE^NO`)=Amg~iqRB1pPscP?(>#ZuY8GHCmlEvD$9g3%4Db~Dfz2SATnddvrR-Oe^
50
- bool allow_virt = (arm_current_el(env) == 1 &&
487
z;s;dJec!hnzi)ri^I6YN9vtkm{^TdUF8h7gX8-<Qe4p)GQ=)AtYx2VcwdLVAEXEjG
51
- (!arm_is_secure_below_el3(env) ||
488
z^Mj|UHPqkj-LsWuzQem1>F3atdZn=zv3$#RmZzSHN+6-yyU#8cJb=YDilX&sl}vNm
52
- (env->cp15.scr_el3 & SCR_EEL2)));
489
znkgAR^O<3kj4if>{ly5fwRfMWuC5=lrlvKPX~i#654Cp}R_d*JS$9laZ$ra6)<ns8
53
490
zFZy28G%xP(nit&F>LDi%G<tIc=TY=gl$jSD&Uv!Yat~XR46h%rI$!}a%!|xG7u8Zn
54
- if (allow_virt && (hcr_el2 & HCR_IMO)) {
491
zeY8_|n=K>xz_v_W8VX$W-Fg-qFWcT}7MCyz{%%{ia7hZ>Law-k6NOr}VI&_48U=2l
55
+ if (hcr_el2 & HCR_IMO) {
492
zwqDKFE8eTwwozDdms#e?x?5a|v>&JF;2_v0L~z5n%BYU^52<*cWuD4|GYUm@1+?))
56
if (cs->interrupt_request & CPU_INTERRUPT_VIRQ) {
493
zte^45>Rz)t*<T5V#={r>@t@{%?^i#W{i=HAZ*Dc9y59Va-+#P!jrGs;u38a{fLr`N
57
ret |= CPSR_I;
494
zvT@rUu>DljxJ?^&Z?-?vyJn3C>3D=qux{Y*bs5|5n)Qmi$TD^Zdn4GU$ocJS2Hh-<
58
}
495
z`xPI^^+v0nUVdjMos8k`WGl7hA`{03ju%<lrgAHSpd^DRf-*}_#Ly0mB!LSfVgWcQ
59
@@ -XXX,XX +XXX,XX @@ static uint64_t isr_read(CPUARMState *env, const ARMCPRegInfo *ri)
496
z&T$@~G9)JI=hz5m0vkrel+Xy{Oh7pkAu-V!j*W7rY(bO}Q$nMH2`FbGB&N)QaV4<4
60
}
497
zo)~9JXiP9=;}NPl<C@MmXG&;XFlFNrsyfFsonxFSp<}vEgsRSQP3O3#b6nSnP}ON_
61
}
498
zI!#Tdsp~|j>ckUB>FI=~GokB5sOq#dotCE4(sd$KbtW~PNlj-`*NIToiD#j5J#9^=
62
499
zt?NXn>YUJYPG~wObe#xQos*i*NloXZt`niEb4t@WrRki~bs|)CI+{*L)9L6s5vn><
63
- if (allow_virt && (hcr_el2 & HCR_FMO)) {
500
zn$DD_Go|Z9sOn5>I@6lYw5}7Os&iV?Ij!lO)^#FOb!If38BJ$K*NIToIiu;E(R9w}
64
+ if (hcr_el2 & HCR_FMO) {
501
zIuWWmPiZ<&X*y5oIuWWmF_XaEC!a&Jn$B5WCqh-{X-(&8P3LJ{Cqh-{8P3dyPr@^t
65
if (cs->interrupt_request & CPU_INTERRUPT_VFIQ) {
502
zSqL9?X9Uwd3W@23*s~h*tj0X6GZCuHa~kuU#yqDp5vt7d8uPryJg+kms?5hU=3^T3
66
ret |= CPSR_F;
503
zF`bD}WnSP+=`t5MQ$FJ_2&Q~+BP6E0f^%BVIW6a$o)e+SX~IDBih-7z6{O~7YTy`&
67
}
504
zLjy&Cv?7QikV#>n0>>@MV8oK`Gmun34-FKdlm-J8SZSaNlnhir4-FI{S|bfqV8e)V
505
zss<{chX#reE#g=hsKAC%sF6d-Km}BWs!kZFsFpKfpbC@>6rprQGEjt4Ck#|zITHq|
506
zK*>M_l;<P^MJRQ`Kn0dFVW0|>3{*fllMEE0)CmI>Sk8ojDo`>|0p(0GP=xY&!axO<
507
zGhv_#lnhirIg<<&q0|Wj6<E%MfhtfkPyyvkGEjt4Ck#|zITHq|K*>M_lrzad5lWpf
508
zP=V!47^ngz0~JutBm+e#b;3XemNQ|X3X}{~Ksl2P6rt1!0~J`#gn=qhGEf2KOfpb}
509
zQYQ>lU^x>8szAv=1(Y+%KoLrvFi?TzOc<yFB?A>u&LjgxD0RX>1(q{mpbC@>R6seC
510
z3>2Z%2?G^a&V+#~P%=;f<xDbAgi<FARA4z12C6{GKn0XD$v_cGoiI>=<xCi;0wn_#
511
zP|hR+MJRQ`Kn0dFVW0|>3{*fllMEE0)CmI>Sk8ojDo`>|0p(0GP=rz^3{+q_69%e4
512
z$v_2^Gs!>^N}VuJf#pmXr~)Me6;RG314Srx!axxz28u{EP=u<1B2)}iVZuNaCK;&0
513
zBm-5LFi?dF167!0pbC==RAItE6($T+VUmF=Ofpb~2?JG_Fi?d_2C6X0Kouqo6p_5T
514
zFi=FeV!SiSKoR0H$dH(_Z(*Q_WZ%L-5y`$K14StNmJAdjmWs}HV4<vU_xO+1efmLq
515
zZ;W>N_U)fP6Qy6Nw5mbt9Y(#emWSi66=>tq#xoh#Ue=0qyhxi8ZOUe5y0V7VfPUhp
516
zwX=;ymc+i5%sg9Ja~lZ&8oAV@mHc>&CHP9v4R(jhtT?un;O4e9#pno)Xkh7OWgK&a
517
zyj=3Iv0OuoK_;5rOr5f(Kb~ZXDBO+V`OWYo#_C08imwChQxnjdd?wZLDou8aj;$SD
518
zGDYiA3<$Tu<JnHL(KPOChi#zrR32t83}naR$+ym4P_h?z_5#|cW-nw$XD_sOtE62l
519
zrD3@*)NVyiklt0&yF9%+klsBey&I<Y2E<!f(E8TuJte)z(|ZHyy<^gQVfx}=`q&B5
520
z7nSryp1wGczIaUfVwiq$Fn#<4=@*ssi#+|}K>EdF(l3VTOM~ghPLRH&q%ZOGrGfON
521
zW73zx^yR_y<0nX8R??Sw`tm^f@-gYlNFSp|*<gA{q?Zp5Oe-+l#rmyYmKozi9y=P>
522
zVReJU*h=ZuVXiS$ohTbw-O#v9>(yZbGE|)?8(H1ZIKvV!jWa0>vy!3eMA^vdhQ>`s
523
zuMSg{q3T50$m)j1!HixV<}X9liL#N^4c*tL^y)CF8LCc{jjV3yKAqL8!%SzWI#H%q
524
z=bSrQ&)%JCRttF5g4Zf`6l?y@>PzD7MA^D>wBlcH6r1ucwJ<p0O%rZ?JzIY3-QdmZ
525
zzs|n>`a5r3e|z)wcUaqS>nqFQ-8x}eCF4u`OWUxqst-@1rSmUs%WmKP5e0dcb?e2N
526
z;Z|x*!);VwF|Yuhqs^khqOM!@u*jY!WYldISF(V6`BoNd&6Qfk3>X#SuD^7J>p_D=
527
zBPa51y^_n#=cpOt#Zf$ya$Ae9Mfz56n|<i!a=ELS@)%a{^NIH3SDuN<R~sah1km#P
528
zU@?*f%<rG=4W1wgfi;C?_n|W@%lm$&8YfvNOJodIg&IcIpIJQRHr<+ej11GQ6)&eF
529
z2Lam*jIH}#y0>KnY%4JQfOYS$*uU%f#@$U6`N8I3N-lV?5ErFCdv~xDmu2(wexld4
530
z4v^;aVAT2k6GJ^m*FD(Wqc(Qg^)6a<?}h$zLoj}4;PP!+(O{@!a1y-hoAhF_7!z+6
531
zslpAmNtYbjHrw-~#SPVk_FUf>-Obg6yV`8o$8_`PyJe_;bY5_EMBfBfWU!Q=*9HsG
532
z%_Cda{@_Krr!oHVhv9+y+T5qR8zZ2aZ>5r!$*|f$^U%yBUYfR&B!+EYy_PwL!BeUi
533
zJH^}r3r9Q+B)X@Z)fk=P13w&7x#wBtXTZ)g>WITPg5r&pQc!nmyrmk#S(>>b9xnNr
534
zx_b#v9Xv-Y><Wb%?S^0Xe&<)bbKl_=Z|3C$tf|F<bYzE*mfHB;uC)`q-?buaBe?l?
535
zcLTpK*k<49Z32`K?|nSBMFqxTK^_IE-li2fEGdK~(ZdoKBl6ab4a;Hler#`xvEXJG
536
zb?<E%EZExfX>jcOVhS*0rS~RS1dA#xhkv@Nct@#q?LyeKS<$uFec!bw>{@uu$gZ6a
537
zyVen1i{1BKd%~`D7|m$;U0a<I*3I7%^N%N%lGYdU_GS!gaR8T$NA@GzFi~z`l7hdl
538
zarZy6590|88pi(1zq;V(>38zM0sT&<zX;R5$1w3;`_JMG`;&I&0Y23DMx1%@(w(R9
539
z4M$j;D5J+Gy%fijRQsctzFKf&cv|BAz#YLq3CZJWDdtL4u1u1|mkdcUp7|sxJC+?Y
540
z_@@s`v3j}Q7*z>6X~cwUxUL8G1KT)_XTp!KAbs;vCp{K3&~_X@+ew=-D}v`2MbFV0
541
zQsVsL=rXi-pI*G|iiz;VTCutgUs)hDzV1+4?8KcoP3xROf<M%qC6lgVdpFt4<-|uM
542
z=#rl_b1#YjSIl6Toj2z_hOZcKupkdE(LozC(fN=FY(x|sk)ym|;Rq2E1xJWD%Z!ol
543
Gu>S+TT-130
544
545
literal 0
546
HcmV?d00001
547
548
diff --git a/tests/data/acpi/q35/VIOT.viot b/tests/data/acpi/q35/VIOT.viot
549
index XXXXXXX..XXXXXXX 100644
550
GIT binary patch
551
literal 112
552
zcmWIZ^baXu00LVle`k+i1*eDrX9XZ&1PX!JAex!M0Hgv8m>C3sGzdcgBZCA3T-xBj
553
Q0Zb)W9Hva*zW_`e0M!8s0RR91
554
555
literal 0
556
HcmV?d00001
557
68
--
558
--
69
2.20.1
559
2.25.1
70
560
71
561
diff view generated by jsdifflib
1
From: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
1
From: Jean-Philippe Brucker <jean-philippe@linaro.org>
2
2
3
With the ARMv8.4-SEL2 extension, EL2 is a legal exception level in
3
The VIOT blob contains the following:
4
secure mode, though it can only be AArch64.
5
4
6
This patch adds the target EL for exceptions from 64-bit S-EL2.
5
[000h 0000 4] Signature : "VIOT" [Virtual I/O Translation Table]
6
[004h 0004 4] Table Length : 00000058
7
[008h 0008 1] Revision : 00
8
[009h 0009 1] Checksum : 66
9
[00Ah 0010 6] Oem ID : "BOCHS "
10
[010h 0016 8] Oem Table ID : "BXPC "
11
[018h 0024 4] Oem Revision : 00000001
12
[01Ch 0028 4] Asl Compiler ID : "BXPC"
13
[020h 0032 4] Asl Compiler Revision : 00000001
7
14
8
It also fixes the target EL to EL2 when HCR.{A,F,I}MO are set in secure
15
[024h 0036 2] Node count : 0002
9
mode. Those values were never used in practice as the effective value of
16
[026h 0038 2] Node offset : 0030
10
HCR was always 0 in secure mode.
17
[028h 0040 8] Reserved : 0000000000000000
11
18
12
Signed-off-by: Rémi Denis-Courmont <remi.denis.courmont@huawei.com>
19
[030h 0048 1] Type : 03 [VirtIO-PCI IOMMU]
13
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
20
[031h 0049 1] Reserved : 00
14
Message-id: 20210112104511.36576-7-remi.denis.courmont@huawei.com
21
[032h 0050 2] Length : 0010
22
23
[034h 0052 2] PCI Segment : 0000
24
[036h 0054 2] PCI BDF number : 0008
25
[038h 0056 8] Reserved : 0000000000000000
26
27
[040h 0064 1] Type : 01 [PCI Range]
28
[041h 0065 1] Reserved : 00
29
[042h 0066 2] Length : 0018
30
31
[044h 0068 4] Endpoint start : 00000000
32
[048h 0072 2] PCI Segment start : 0000
33
[04Ah 0074 2] PCI Segment end : 0000
34
[04Ch 0076 2] PCI BDF start : 0000
35
[04Eh 0078 2] PCI BDF end : 00FF
36
[050h 0080 2] Output node : 0030
37
[052h 0082 6] Reserved : 000000000000
38
39
Acked-by: Ani Sinha <ani@anisinha.ca>
40
Reviewed-by: Eric Auger <eric.auger@redhat.com>
41
Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
42
Message-id: 20211210170415.583179-9-jean-philippe@linaro.org
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
43
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
---
44
---
17
target/arm/helper.c | 10 +++++-----
45
tests/qtest/bios-tables-test-allowed-diff.h | 1 -
18
target/arm/op_helper.c | 4 ++--
46
tests/data/acpi/virt/VIOT | Bin 0 -> 88 bytes
19
2 files changed, 7 insertions(+), 7 deletions(-)
47
2 files changed, 1 deletion(-)
20
48
21
diff --git a/target/arm/helper.c b/target/arm/helper.c
49
diff --git a/tests/qtest/bios-tables-test-allowed-diff.h b/tests/qtest/bios-tables-test-allowed-diff.h
22
index XXXXXXX..XXXXXXX 100644
50
index XXXXXXX..XXXXXXX 100644
23
--- a/target/arm/helper.c
51
--- a/tests/qtest/bios-tables-test-allowed-diff.h
24
+++ b/target/arm/helper.c
52
+++ b/tests/qtest/bios-tables-test-allowed-diff.h
25
@@ -XXX,XX +XXX,XX @@ static const int8_t target_el_table[2][2][2][2][2][4] = {
53
@@ -1,2 +1 @@
26
{{/* 0 1 1 0 */{ 3, 3, 3, -1 },{ 3, -1, -1, 3 },},
54
/* List of comma-separated changed AML files to ignore */
27
{/* 0 1 1 1 */{ 3, 3, 3, -1 },{ 3, -1, -1, 3 },},},},},
55
-"tests/data/acpi/virt/VIOT",
28
{{{{/* 1 0 0 0 */{ 1, 1, 2, -1 },{ 1, 1, -1, 1 },},
56
diff --git a/tests/data/acpi/virt/VIOT b/tests/data/acpi/virt/VIOT
29
- {/* 1 0 0 1 */{ 2, 2, 2, -1 },{ 1, 1, -1, 1 },},},
30
- {{/* 1 0 1 0 */{ 1, 1, 1, -1 },{ 1, 1, -1, 1 },},
31
- {/* 1 0 1 1 */{ 2, 2, 2, -1 },{ 1, 1, -1, 1 },},},},
32
+ {/* 1 0 0 1 */{ 2, 2, 2, -1 },{ 2, 2, -1, 1 },},},
33
+ {{/* 1 0 1 0 */{ 1, 1, 1, -1 },{ 1, 1, 1, 1 },},
34
+ {/* 1 0 1 1 */{ 2, 2, 2, -1 },{ 2, 2, 2, 1 },},},},
35
{{{/* 1 1 0 0 */{ 3, 3, 3, -1 },{ 3, 3, -1, 3 },},
36
{/* 1 1 0 1 */{ 3, 3, 3, -1 },{ 3, 3, -1, 3 },},},
37
- {{/* 1 1 1 0 */{ 3, 3, 3, -1 },{ 3, 3, -1, 3 },},
38
- {/* 1 1 1 1 */{ 3, 3, 3, -1 },{ 3, 3, -1, 3 },},},},},
39
+ {{/* 1 1 1 0 */{ 3, 3, 3, -1 },{ 3, 3, 3, 3 },},
40
+ {/* 1 1 1 1 */{ 3, 3, 3, -1 },{ 3, 3, 3, 3 },},},},},
41
};
42
43
/*
44
diff --git a/target/arm/op_helper.c b/target/arm/op_helper.c
45
index XXXXXXX..XXXXXXX 100644
57
index XXXXXXX..XXXXXXX 100644
46
--- a/target/arm/op_helper.c
58
GIT binary patch
47
+++ b/target/arm/op_helper.c
59
literal 88
48
@@ -XXX,XX +XXX,XX @@ void HELPER(access_check_cp_reg)(CPUARMState *env, void *rip, uint32_t syndrome,
60
zcmWIZ^bd((0D?3pe`k+i1*eDrX9XZ&1PX!JAexE60Hgv8m>C3sGzXN&z`)2L0cSHX
49
target_el = exception_target_el(env);
61
I{D-Rq0Q5fy0RR91
50
break;
62
51
case CP_ACCESS_TRAP_EL2:
63
literal 0
52
- /* Requesting a trap to EL2 when we're in EL3 or S-EL0/1 is
64
HcmV?d00001
53
+ /* Requesting a trap to EL2 when we're in EL3 is
65
54
* a bug in the access function.
55
*/
56
- assert(!arm_is_secure(env) && arm_current_el(env) != 3);
57
+ assert(arm_current_el(env) != 3);
58
target_el = 2;
59
break;
60
case CP_ACCESS_TRAP_EL3:
61
--
66
--
62
2.20.1
67
2.25.1
63
68
64
69
diff view generated by jsdifflib