1
The following changes since commit eae587e8e3694b1aceab23239493fb4c7e1a80f5:
1
Hi; this is the latest target-arm queue. Most of the patches
2
here are RTH's FEAT_HAFDBS finally landing. I've also included
3
the RNG-seed randomization patches from Jason, as well as a few
4
more minor things. The patches include a couple of regression
5
fixes:
6
* the resettable patch fixes a SCSI reset regression
7
* the 'do not re-randomize on snapshot load' patches fix
8
record-and-replay regressions
2
9
3
Merge remote-tracking branch 'remotes/armbru/tags/pull-qapi-2021-09-13' into staging (2021-09-13 11:00:30 +0100)
10
thanks
11
-- PMM
12
13
The following changes since commit e750a7ace492f0b450653d4ad368a77d6f660fb8:
14
15
Merge tag 'pull-9p-20221024' of https://github.com/cschoenebeck/qemu into staging (2022-10-24 14:27:12 -0400)
4
16
5
are available in the Git repository at:
17
are available in the Git repository at:
6
18
7
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20210913
19
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20221025
8
20
9
for you to fetch changes up to 9a2b2ecf4d25a3943918c95d2db4508b304161b5:
21
for you to fetch changes up to e2114f701c78f76246e4b1872639dad94a6bdd21:
10
22
11
hw/arm/mps2.c: Mark internal-only I2C buses as 'full' (2021-09-13 17:09:28 +0100)
23
rx: re-randomize rng-seed on reboot (2022-10-25 17:32:24 +0100)
12
24
13
----------------------------------------------------------------
25
----------------------------------------------------------------
14
target-arm queue:
26
target-arm queue:
15
* mark MPS2/MPS3 board-internal i2c buses as 'full' so that command
27
* Implement FEAT_E0PD
16
line user-created devices are not plugged into them
28
* Implement FEAT_HAFDBS
17
* Take an exception if PSTATE.IL is set
29
* honor HCR_E2H and HCR_TGE in arm_excp_unmasked()
18
* Support an emulated ITS in the virt board
30
* hw/arm/virt: Fix devicetree warnings about the virtio-iommu node
19
* Add support for kudo-bmc board
31
* hw/core/resettable: fix reset level counting
20
* Probe for KVM_CAP_ARM_VM_IPA_SIZE when creating scratch VM
32
* hw/hyperv/hyperv.c: Use device_cold_reset() instead of device_legacy_reset()
21
* cadence_uart: Fix clock handling issues that prevented
33
* imx: reload cmp timer outside of the reload ptimer transaction
22
u-boot from running
34
* x86: do not re-randomize RNG seed on snapshot load
35
* m68k/virt: do not re-randomize RNG seed on snapshot load
36
* m68k/q800: do not re-randomize RNG seed on snapshot load
37
* arm: re-randomize rng-seed on reboot
38
* riscv: re-randomize rng-seed on reboot
39
* mips/boston: re-randomize rng-seed on reboot
40
* openrisc: re-randomize rng-seed on reboot
41
* rx: re-randomize rng-seed on reboot
23
42
24
----------------------------------------------------------------
43
----------------------------------------------------------------
25
Bin Meng (6):
44
Ake Koomsin (1):
26
hw/misc: zynq_slcr: Correctly compute output clocks in the reset exit phase
45
target/arm: honor HCR_E2H and HCR_TGE in arm_excp_unmasked()
27
hw/char: cadence_uart: Disable transmit when input clock is disabled
28
hw/char: cadence_uart: Move clock/reset check to uart_can_receive()
29
hw/char: cadence_uart: Convert to memop_with_attrs() ops
30
hw/char: cadence_uart: Ignore access when unclocked or in reset for uart_{read, write}()
31
hw/char: cadence_uart: Log a guest error when device is unclocked or in reset
32
46
33
Chris Rauer (1):
47
Axel Heider (1):
34
hw/arm: Add support for kudo-bmc board.
48
target/imx: reload cmp timer outside of the reload ptimer transaction
35
49
36
Marc Zyngier (1):
50
Damien Hedde (1):
37
hw/arm/virt: KVM: Probe for KVM_CAP_ARM_VM_IPA_SIZE when creating scratch VM
51
hw/core/resettable: fix reset level counting
38
52
39
Peter Maydell (5):
53
Jason A. Donenfeld (10):
40
target/arm: Take an exception if PSTATE.IL is set
54
reset: allow registering handlers that aren't called by snapshot loading
41
qdev: Support marking individual buses as 'full'
55
device-tree: add re-randomization helper function
42
hw/arm/mps2-tz.c: Add extra data parameter to MakeDevFn
56
x86: do not re-randomize RNG seed on snapshot load
43
hw/arm/mps2-tz.c: Mark internal-only I2C buses as 'full'
57
arm: re-randomize rng-seed on reboot
44
hw/arm/mps2.c: Mark internal-only I2C buses as 'full'
58
riscv: re-randomize rng-seed on reboot
59
m68k/virt: do not re-randomize RNG seed on snapshot load
60
m68k/q800: do not re-randomize RNG seed on snapshot load
61
mips/boston: re-randomize rng-seed on reboot
62
openrisc: re-randomize rng-seed on reboot
63
rx: re-randomize rng-seed on reboot
45
64
46
Richard Henderson (1):
65
Jean-Philippe Brucker (1):
47
target/arm: Merge disas_a64_insn into aarch64_tr_translate_insn
66
hw/arm/virt: Fix devicetree warnings about the virtio-iommu node
48
67
49
Shashi Mallela (9):
68
Peter Maydell (2):
50
hw/intc: GICv3 ITS initial framework
69
target/arm: Implement FEAT_E0PD
51
hw/intc: GICv3 ITS register definitions added
70
hw/hyperv/hyperv.c: Use device_cold_reset() instead of device_legacy_reset()
52
hw/intc: GICv3 ITS command queue framework
53
hw/intc: GICv3 ITS Command processing
54
hw/intc: GICv3 ITS Feature enablement
55
hw/intc: GICv3 redistributor ITS processing
56
tests/data/acpi/virt: Add IORT files for ITS
57
hw/arm/virt: add ITS support in virt GIC
58
tests/data/acpi/virt: Update IORT files for ITS
59
71
60
docs/system/arm/nuvoton.rst | 1 +
72
Richard Henderson (14):
61
hw/intc/gicv3_internal.h | 188 ++++-
73
target/arm: Introduce regime_is_stage2
62
include/hw/arm/virt.h | 2 +
74
target/arm: Add ptw_idx to S1Translate
63
include/hw/intc/arm_gicv3_common.h | 13 +
75
target/arm: Add isar predicates for FEAT_HAFDBS
64
include/hw/intc/arm_gicv3_its_common.h | 32 +-
76
target/arm: Extract HA and HD in aa64_va_parameters
65
include/hw/qdev-core.h | 24 +
77
target/arm: Move S1_ptw_translate outside arm_ld[lq]_ptw
66
target/arm/cpu.h | 1 +
78
target/arm: Add ARMFault_UnsuppAtomicUpdate
67
target/arm/kvm_arm.h | 4 +-
79
target/arm: Remove loop from get_phys_addr_lpae
68
target/arm/syndrome.h | 5 +
80
target/arm: Fix fault reporting in get_phys_addr_lpae
69
target/arm/translate.h | 2 +
81
target/arm: Don't shift attrs in get_phys_addr_lpae
70
hw/arm/mps2-tz.c | 92 ++-
82
target/arm: Consider GP an attribute in get_phys_addr_lpae
71
hw/arm/mps2.c | 12 +-
83
target/arm: Tidy merging of attributes from descriptor and table
72
hw/arm/npcm7xx_boards.c | 34 +
84
target/arm: Implement FEAT_HAFDBS, access flag portion
73
hw/arm/virt.c | 29 +-
85
target/arm: Implement FEAT_HAFDBS, dirty bit portion
74
hw/char/cadence_uart.c | 61 +-
86
target/arm: Use the max page size in a 2-stage ptw
75
hw/intc/arm_gicv3.c | 14 +
76
hw/intc/arm_gicv3_common.c | 13 +
77
hw/intc/arm_gicv3_cpuif.c | 7 +-
78
hw/intc/arm_gicv3_dist.c | 5 +-
79
hw/intc/arm_gicv3_its.c | 1322 ++++++++++++++++++++++++++++++++
80
hw/intc/arm_gicv3_its_common.c | 7 +-
81
hw/intc/arm_gicv3_its_kvm.c | 2 +-
82
hw/intc/arm_gicv3_redist.c | 153 +++-
83
hw/misc/zynq_slcr.c | 31 +-
84
softmmu/qdev-monitor.c | 7 +-
85
target/arm/helper-a64.c | 1 +
86
target/arm/helper.c | 8 +
87
target/arm/kvm.c | 7 +-
88
target/arm/translate-a64.c | 255 +++---
89
target/arm/translate.c | 21 +
90
hw/intc/meson.build | 1 +
91
tests/data/acpi/virt/IORT | Bin 0 -> 124 bytes
92
tests/data/acpi/virt/IORT.memhp | Bin 0 -> 124 bytes
93
tests/data/acpi/virt/IORT.numamem | Bin 0 -> 124 bytes
94
tests/data/acpi/virt/IORT.pxb | Bin 0 -> 124 bytes
95
35 files changed, 2144 insertions(+), 210 deletions(-)
96
create mode 100644 hw/intc/arm_gicv3_its.c
97
create mode 100644 tests/data/acpi/virt/IORT
98
create mode 100644 tests/data/acpi/virt/IORT.memhp
99
create mode 100644 tests/data/acpi/virt/IORT.numamem
100
create mode 100644 tests/data/acpi/virt/IORT.pxb
101
87
88
docs/devel/reset.rst | 8 +-
89
docs/system/arm/emulation.rst | 2 +
90
qapi/run-state.json | 6 +-
91
include/hw/boards.h | 2 +-
92
include/sysemu/device_tree.h | 9 +
93
include/sysemu/reset.h | 5 +-
94
target/arm/cpu.h | 15 ++
95
target/arm/internals.h | 30 +++
96
hw/arm/aspeed.c | 4 +-
97
hw/arm/boot.c | 2 +
98
hw/arm/mps2-tz.c | 4 +-
99
hw/arm/virt.c | 5 +-
100
hw/core/reset.c | 17 +-
101
hw/core/resettable.c | 3 +-
102
hw/hppa/machine.c | 4 +-
103
hw/hyperv/hyperv.c | 2 +-
104
hw/i386/microvm.c | 4 +-
105
hw/i386/pc.c | 6 +-
106
hw/i386/x86.c | 2 +-
107
hw/m68k/q800.c | 33 ++-
108
hw/m68k/virt.c | 20 +-
109
hw/mips/boston.c | 3 +
110
hw/openrisc/boot.c | 3 +
111
hw/ppc/pegasos2.c | 4 +-
112
hw/ppc/pnv.c | 4 +-
113
hw/ppc/spapr.c | 4 +-
114
hw/riscv/boot.c | 3 +
115
hw/rx/rx-gdbsim.c | 3 +
116
hw/s390x/s390-virtio-ccw.c | 4 +-
117
hw/timer/imx_epit.c | 9 +-
118
migration/savevm.c | 2 +-
119
softmmu/device_tree.c | 21 ++
120
softmmu/runstate.c | 11 +-
121
target/arm/cpu.c | 24 +-
122
target/arm/cpu64.c | 2 +
123
target/arm/helper.c | 31 ++-
124
target/arm/ptw.c | 524 +++++++++++++++++++++++++++---------------
125
37 files changed, 572 insertions(+), 263 deletions(-)
diff view generated by jsdifflib
1
In v8A, the PSTATE.IL bit is set for various kinds of illegal
1
FEAT_E0PD adds new bits E0PD0 and E0PD1 to TCR_EL1, which allow the
2
exception return or mode-change attempts. We already set PSTATE.IL
2
OS to forbid EL0 access to half of the address space. Since this is
3
(or its AArch32 equivalent CPSR.IL) in all those cases, but we
3
an EL0-specific variation on the existing TCR_ELx.{EPD0,EPD1}, we can
4
weren't implementing the part of the behaviour where attempting to
4
implement it entirely in aa64_va_parameters().
5
execute an instruction with PSTATE.IL takes an immediate exception
6
with an appropriate syndrome value.
7
5
8
Add a new TB flags bit tracking PSTATE.IL/CPSR.IL, and generate code
6
This requires moving the existing regime_is_user() to internals.h
9
to take an exception instead of whatever the instruction would have
7
so that the code in helper.c can get at it.
10
been.
11
8
12
PSTATE.IL and CPSR.IL change only on exception entry, attempted
9
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
13
exception exit, and various AArch32 mode changes via cpsr_write().
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
These places generally already rebuild the hflags, so the only place
11
Message-id: 20221021160131.3531787-1-peter.maydell@linaro.org
15
we need an extra rebuild_hflags call is in the illegal-return
12
---
16
codepath of the AArch64 exception_return helper.
13
docs/system/arm/emulation.rst | 1 +
14
target/arm/cpu.h | 5 +++++
15
target/arm/internals.h | 19 +++++++++++++++++++
16
target/arm/cpu64.c | 1 +
17
target/arm/helper.c | 9 +++++++++
18
target/arm/ptw.c | 19 -------------------
19
6 files changed, 35 insertions(+), 19 deletions(-)
17
20
18
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
21
diff --git a/docs/system/arm/emulation.rst b/docs/system/arm/emulation.rst
19
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
22
index XXXXXXX..XXXXXXX 100644
20
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
23
--- a/docs/system/arm/emulation.rst
21
Message-id: 20210821195958.41312-2-richard.henderson@linaro.org
24
+++ b/docs/system/arm/emulation.rst
22
Message-Id: <20210817162118.24319-1-peter.maydell@linaro.org>
25
@@ -XXX,XX +XXX,XX @@ the following architecture extensions:
23
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
26
- FEAT_Debugv8p4 (Debug changes for v8.4)
24
[rth: Added missing returns; set IL bit in syndrome]
27
- FEAT_DotProd (Advanced SIMD dot product instructions)
25
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
28
- FEAT_DoubleFault (Double Fault Extension)
26
---
29
+- FEAT_E0PD (Preventing EL0 access to halves of address maps)
27
target/arm/cpu.h | 1 +
30
- FEAT_ETS (Enhanced Translation Synchronization)
28
target/arm/syndrome.h | 5 +++++
31
- FEAT_FCMA (Floating-point complex number instructions)
29
target/arm/translate.h | 2 ++
32
- FEAT_FHM (Floating-point half-precision multiplication instructions)
30
target/arm/helper-a64.c | 1 +
31
target/arm/helper.c | 8 ++++++++
32
target/arm/translate-a64.c | 11 +++++++++++
33
target/arm/translate.c | 21 +++++++++++++++++++++
34
7 files changed, 49 insertions(+)
35
36
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
33
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
37
index XXXXXXX..XXXXXXX 100644
34
index XXXXXXX..XXXXXXX 100644
38
--- a/target/arm/cpu.h
35
--- a/target/arm/cpu.h
39
+++ b/target/arm/cpu.h
36
+++ b/target/arm/cpu.h
40
@@ -XXX,XX +XXX,XX @@ FIELD(TBFLAG_ANY, FPEXC_EL, 8, 2)
37
@@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_lva(const ARMISARegisters *id)
41
FIELD(TBFLAG_ANY, DEBUG_TARGET_EL, 10, 2)
38
return FIELD_EX64(id->id_aa64mmfr2, ID_AA64MMFR2, VARANGE) != 0;
42
/* Memory operations require alignment: SCTLR_ELx.A or CCR.UNALIGN_TRP */
43
FIELD(TBFLAG_ANY, ALIGN_MEM, 12, 1)
44
+FIELD(TBFLAG_ANY, PSTATE__IL, 13, 1)
45
46
/*
47
* Bit usage when in AArch32 state, both A- and M-profile.
48
diff --git a/target/arm/syndrome.h b/target/arm/syndrome.h
49
index XXXXXXX..XXXXXXX 100644
50
--- a/target/arm/syndrome.h
51
+++ b/target/arm/syndrome.h
52
@@ -XXX,XX +XXX,XX @@ static inline uint32_t syn_wfx(int cv, int cond, int ti, bool is_16bit)
53
(cv << 24) | (cond << 20) | ti;
54
}
39
}
55
40
56
+static inline uint32_t syn_illegalstate(void)
41
+static inline bool isar_feature_aa64_e0pd(const ARMISARegisters *id)
57
+{
42
+{
58
+ return (EC_ILLEGALSTATE << ARM_EL_EC_SHIFT) | ARM_EL_IL;
43
+ return FIELD_EX64(id->id_aa64mmfr2, ID_AA64MMFR2, E0PD) != 0;
59
+}
44
+}
60
+
45
+
61
#endif /* TARGET_ARM_SYNDROME_H */
46
static inline bool isar_feature_aa64_tts2uxn(const ARMISARegisters *id)
62
diff --git a/target/arm/translate.h b/target/arm/translate.h
47
{
48
return FIELD_EX64(id->id_aa64mmfr1, ID_AA64MMFR1, XNX) != 0;
49
diff --git a/target/arm/internals.h b/target/arm/internals.h
63
index XXXXXXX..XXXXXXX 100644
50
index XXXXXXX..XXXXXXX 100644
64
--- a/target/arm/translate.h
51
--- a/target/arm/internals.h
65
+++ b/target/arm/translate.h
52
+++ b/target/arm/internals.h
66
@@ -XXX,XX +XXX,XX @@ typedef struct DisasContext {
53
@@ -XXX,XX +XXX,XX @@ static inline uint32_t regime_el(CPUARMState *env, ARMMMUIdx mmu_idx)
67
bool hstr_active;
54
}
68
/* True if memory operations require alignment */
55
}
69
bool align_mem;
56
70
+ /* True if PSTATE.IL is set */
57
+static inline bool regime_is_user(CPUARMState *env, ARMMMUIdx mmu_idx)
71
+ bool pstate_il;
58
+{
72
/*
59
+ switch (mmu_idx) {
73
* >= 0, a copy of PSTATE.BTYPE, which will be 0 without v8.5-BTI.
60
+ case ARMMMUIdx_E20_0:
74
* < 0, set by the current instruction.
61
+ case ARMMMUIdx_Stage1_E0:
75
diff --git a/target/arm/helper-a64.c b/target/arm/helper-a64.c
62
+ case ARMMMUIdx_MUser:
63
+ case ARMMMUIdx_MSUser:
64
+ case ARMMMUIdx_MUserNegPri:
65
+ case ARMMMUIdx_MSUserNegPri:
66
+ return true;
67
+ default:
68
+ return false;
69
+ case ARMMMUIdx_E10_0:
70
+ case ARMMMUIdx_E10_1:
71
+ case ARMMMUIdx_E10_1_PAN:
72
+ g_assert_not_reached();
73
+ }
74
+}
75
+
76
/* Return the SCTLR value which controls this address translation regime */
77
static inline uint64_t regime_sctlr(CPUARMState *env, ARMMMUIdx mmu_idx)
78
{
79
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
76
index XXXXXXX..XXXXXXX 100644
80
index XXXXXXX..XXXXXXX 100644
77
--- a/target/arm/helper-a64.c
81
--- a/target/arm/cpu64.c
78
+++ b/target/arm/helper-a64.c
82
+++ b/target/arm/cpu64.c
79
@@ -XXX,XX +XXX,XX @@ illegal_return:
83
@@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj)
80
if (!arm_singlestep_active(env)) {
84
t = FIELD_DP64(t, ID_AA64MMFR2, FWB, 1); /* FEAT_S2FWB */
81
env->pstate &= ~PSTATE_SS;
85
t = FIELD_DP64(t, ID_AA64MMFR2, TTL, 1); /* FEAT_TTL */
82
}
86
t = FIELD_DP64(t, ID_AA64MMFR2, BBM, 2); /* FEAT_BBM at level 2 */
83
+ helper_rebuild_hflags_a64(env, cur_el);
87
+ t = FIELD_DP64(t, ID_AA64MMFR2, E0PD, 1); /* FEAT_E0PD */
84
qemu_log_mask(LOG_GUEST_ERROR, "Illegal exception return at EL%d: "
88
cpu->isar.id_aa64mmfr2 = t;
85
"resuming execution at 0x%" PRIx64 "\n", cur_el, env->pc);
89
86
}
90
t = cpu->isar.id_aa64zfr0;
87
diff --git a/target/arm/helper.c b/target/arm/helper.c
91
diff --git a/target/arm/helper.c b/target/arm/helper.c
88
index XXXXXXX..XXXXXXX 100644
92
index XXXXXXX..XXXXXXX 100644
89
--- a/target/arm/helper.c
93
--- a/target/arm/helper.c
90
+++ b/target/arm/helper.c
94
+++ b/target/arm/helper.c
91
@@ -XXX,XX +XXX,XX @@ static CPUARMTBFlags rebuild_hflags_a32(CPUARMState *env, int fp_el,
95
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
92
DP_TBFLAG_A32(flags, HSTR_ACTIVE, 1);
96
ps = extract32(tcr, 16, 3);
97
ds = extract64(tcr, 32, 1);
98
} else {
99
+ bool e0pd;
100
+
101
/*
102
* Bit 55 is always between the two regions, and is canonical for
103
* determining if address tagging is enabled.
104
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
105
epd = extract32(tcr, 7, 1);
106
sh = extract32(tcr, 12, 2);
107
hpd = extract64(tcr, 41, 1);
108
+ e0pd = extract64(tcr, 55, 1);
109
} else {
110
tsz = extract32(tcr, 16, 6);
111
gran = tg1_to_gran_size(extract32(tcr, 30, 2));
112
epd = extract32(tcr, 23, 1);
113
sh = extract32(tcr, 28, 2);
114
hpd = extract64(tcr, 42, 1);
115
+ e0pd = extract64(tcr, 56, 1);
116
}
117
ps = extract64(tcr, 32, 3);
118
ds = extract64(tcr, 59, 1);
119
+
120
+ if (e0pd && cpu_isar_feature(aa64_e0pd, cpu) &&
121
+ regime_is_user(env, mmu_idx)) {
122
+ epd = true;
123
+ }
93
}
124
}
94
125
95
+ if (env->uncached_cpsr & CPSR_IL) {
126
gran = sanitize_gran_size(cpu, gran, stage2);
96
+ DP_TBFLAG_ANY(flags, PSTATE__IL, 1);
127
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
97
+ }
128
index XXXXXXX..XXXXXXX 100644
98
+
129
--- a/target/arm/ptw.c
99
return rebuild_hflags_common_32(env, fp_el, mmu_idx, flags);
130
+++ b/target/arm/ptw.c
131
@@ -XXX,XX +XXX,XX @@ static bool regime_translation_big_endian(CPUARMState *env, ARMMMUIdx mmu_idx)
132
return (regime_sctlr(env, mmu_idx) & SCTLR_EE) != 0;
100
}
133
}
101
134
102
@@ -XXX,XX +XXX,XX @@ static CPUARMTBFlags rebuild_hflags_a64(CPUARMState *env, int el, int fp_el,
135
-static bool regime_is_user(CPUARMState *env, ARMMMUIdx mmu_idx)
103
}
136
-{
104
}
137
- switch (mmu_idx) {
105
138
- case ARMMMUIdx_E20_0:
106
+ if (env->pstate & PSTATE_IL) {
139
- case ARMMMUIdx_Stage1_E0:
107
+ DP_TBFLAG_ANY(flags, PSTATE__IL, 1);
140
- case ARMMMUIdx_MUser:
108
+ }
141
- case ARMMMUIdx_MSUser:
109
+
142
- case ARMMMUIdx_MUserNegPri:
110
if (cpu_isar_feature(aa64_mte, env_archcpu(env))) {
143
- case ARMMMUIdx_MSUserNegPri:
111
/*
144
- return true;
112
* Set MTE_ACTIVE if any access may be Checked, and leave clear
145
- default:
113
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
146
- return false;
114
index XXXXXXX..XXXXXXX 100644
147
- case ARMMMUIdx_E10_0:
115
--- a/target/arm/translate-a64.c
148
- case ARMMMUIdx_E10_1:
116
+++ b/target/arm/translate-a64.c
149
- case ARMMMUIdx_E10_1_PAN:
117
@@ -XXX,XX +XXX,XX @@ static void disas_a64_insn(CPUARMState *env, DisasContext *s)
150
- g_assert_not_reached();
118
s->fp_access_checked = false;
151
- }
119
s->sve_access_checked = false;
152
-}
120
153
-
121
+ if (s->pstate_il) {
154
/* Return the TTBR associated with this translation regime */
122
+ /*
155
static uint64_t regime_ttbr(CPUARMState *env, ARMMMUIdx mmu_idx, int ttbrn)
123
+ * Illegal execution state. This has priority over BTI
156
{
124
+ * exceptions, but comes after instruction abort exceptions.
125
+ */
126
+ gen_exception_insn(s, s->pc_curr, EXCP_UDEF,
127
+ syn_illegalstate(), default_exception_el(s));
128
+ return;
129
+ }
130
+
131
if (dc_isar_feature(aa64_bti, s)) {
132
if (s->base.num_insns == 1) {
133
/*
134
@@ -XXX,XX +XXX,XX @@ static void aarch64_tr_init_disas_context(DisasContextBase *dcbase,
135
#endif
136
dc->fp_excp_el = EX_TBFLAG_ANY(tb_flags, FPEXC_EL);
137
dc->align_mem = EX_TBFLAG_ANY(tb_flags, ALIGN_MEM);
138
+ dc->pstate_il = EX_TBFLAG_ANY(tb_flags, PSTATE__IL);
139
dc->sve_excp_el = EX_TBFLAG_A64(tb_flags, SVEEXC_EL);
140
dc->sve_len = (EX_TBFLAG_A64(tb_flags, ZCR_LEN) + 1) * 16;
141
dc->pauth_active = EX_TBFLAG_A64(tb_flags, PAUTH_ACTIVE);
142
diff --git a/target/arm/translate.c b/target/arm/translate.c
143
index XXXXXXX..XXXXXXX 100644
144
--- a/target/arm/translate.c
145
+++ b/target/arm/translate.c
146
@@ -XXX,XX +XXX,XX @@ static void disas_arm_insn(DisasContext *s, unsigned int insn)
147
return;
148
}
149
150
+ if (s->pstate_il) {
151
+ /*
152
+ * Illegal execution state. This has priority over BTI
153
+ * exceptions, but comes after instruction abort exceptions.
154
+ */
155
+ gen_exception_insn(s, s->pc_curr, EXCP_UDEF,
156
+ syn_illegalstate(), default_exception_el(s));
157
+ return;
158
+ }
159
+
160
if (cond == 0xf) {
161
/* In ARMv3 and v4 the NV condition is UNPREDICTABLE; we
162
* choose to UNDEF. In ARMv5 and above the space is used
163
@@ -XXX,XX +XXX,XX @@ static void arm_tr_init_disas_context(DisasContextBase *dcbase, CPUState *cs)
164
#endif
165
dc->fp_excp_el = EX_TBFLAG_ANY(tb_flags, FPEXC_EL);
166
dc->align_mem = EX_TBFLAG_ANY(tb_flags, ALIGN_MEM);
167
+ dc->pstate_il = EX_TBFLAG_ANY(tb_flags, PSTATE__IL);
168
169
if (arm_feature(env, ARM_FEATURE_M)) {
170
dc->vfp_enabled = 1;
171
@@ -XXX,XX +XXX,XX @@ static void thumb_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu)
172
}
173
dc->insn = insn;
174
175
+ if (dc->pstate_il) {
176
+ /*
177
+ * Illegal execution state. This has priority over BTI
178
+ * exceptions, but comes after instruction abort exceptions.
179
+ */
180
+ gen_exception_insn(dc, dc->pc_curr, EXCP_UDEF,
181
+ syn_illegalstate(), default_exception_el(dc));
182
+ return;
183
+ }
184
+
185
if (dc->eci) {
186
/*
187
* For M-profile continuable instructions, ECI/ICI handling
188
--
157
--
189
2.20.1
158
2.25.1
190
191
diff view generated by jsdifflib
1
From: Shashi Mallela <shashi.mallela@linaro.org>
1
From: Jean-Philippe Brucker <jean-philippe@linaro.org>
2
2
3
Included creation of ITS as part of virt platform GIC
3
The "PCI Bus Binding to: IEEE Std 1275-1994" defines the compatible
4
initialization. This Emulated ITS model now co-exists with kvm
4
string for a PCIe bus or endpoint as "pci<vendorid>,<deviceid>" or
5
ITS and is enabled in absence of kvm irq kernel support in a
5
similar. Since the initial binding for PCI virtio-iommu didn't follow
6
platform.
6
this rule, it was modified to accept both strings and ensure backward
7
compatibility. Also, the unit-name for the node should be
8
"device,function".
7
9
8
Signed-off-by: Shashi Mallela <shashi.mallela@linaro.org>
10
Fix corresponding dt-validate and dtc warnings:
11
12
pcie@10000000: virtio_iommu@16:compatible: ['virtio,pci-iommu'] does not contain items matching the given schema
13
pcie@10000000: Unevaluated properties are not allowed (... 'virtio_iommu@16' were unexpected)
14
From schema: linux/Documentation/devicetree/bindings/pci/host-generic-pci.yaml
15
virtio_iommu@16: compatible: 'oneOf' conditional failed, one must be fixed:
16
['virtio,pci-iommu'] is too short
17
'pci1af4,1057' was expected
18
From schema: dtschema/schemas/pci/pci-bus.yaml
19
20
Warning (pci_device_reg): /pcie@10000000/virtio_iommu@16: PCI unit address format error, expected "2,0"
21
22
Signed-off-by: Jean-Philippe Brucker <jean-philippe@linaro.org>
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
23
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
Message-id: 20210910143951.92242-9-shashi.mallela@linaro.org
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
24
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
25
---
13
include/hw/arm/virt.h | 2 ++
26
hw/arm/virt.c | 5 +++--
14
target/arm/kvm_arm.h | 4 ++--
27
1 file changed, 3 insertions(+), 2 deletions(-)
15
hw/arm/virt.c | 29 +++++++++++++++++++++++++++--
16
3 files changed, 31 insertions(+), 4 deletions(-)
17
28
18
diff --git a/include/hw/arm/virt.h b/include/hw/arm/virt.h
19
index XXXXXXX..XXXXXXX 100644
20
--- a/include/hw/arm/virt.h
21
+++ b/include/hw/arm/virt.h
22
@@ -XXX,XX +XXX,XX @@ struct VirtMachineClass {
23
MachineClass parent;
24
bool disallow_affinity_adjustment;
25
bool no_its;
26
+ bool no_tcg_its;
27
bool no_pmu;
28
bool claim_edge_triggered_timers;
29
bool smbios_old_sys_ver;
30
@@ -XXX,XX +XXX,XX @@ struct VirtMachineState {
31
bool highmem;
32
bool highmem_ecam;
33
bool its;
34
+ bool tcg_its;
35
bool virt;
36
bool ras;
37
bool mte;
38
diff --git a/target/arm/kvm_arm.h b/target/arm/kvm_arm.h
39
index XXXXXXX..XXXXXXX 100644
40
--- a/target/arm/kvm_arm.h
41
+++ b/target/arm/kvm_arm.h
42
@@ -XXX,XX +XXX,XX @@ static inline const char *its_class_name(void)
43
/* KVM implementation requires this capability */
44
return kvm_direct_msi_enabled() ? "arm-its-kvm" : NULL;
45
} else {
46
- /* Software emulation is not implemented yet */
47
- return NULL;
48
+ /* Software emulation based model */
49
+ return "arm-gicv3-its";
50
}
51
}
52
53
diff --git a/hw/arm/virt.c b/hw/arm/virt.c
29
diff --git a/hw/arm/virt.c b/hw/arm/virt.c
54
index XXXXXXX..XXXXXXX 100644
30
index XXXXXXX..XXXXXXX 100644
55
--- a/hw/arm/virt.c
31
--- a/hw/arm/virt.c
56
+++ b/hw/arm/virt.c
32
+++ b/hw/arm/virt.c
57
@@ -XXX,XX +XXX,XX @@ static void create_its(VirtMachineState *vms)
33
@@ -XXX,XX +XXX,XX @@ static void create_smmu(const VirtMachineState *vms,
58
const char *itsclass = its_class_name();
34
59
DeviceState *dev;
35
static void create_virtio_iommu_dt_bindings(VirtMachineState *vms)
60
61
+ if (!strcmp(itsclass, "arm-gicv3-its")) {
62
+ if (!vms->tcg_its) {
63
+ itsclass = NULL;
64
+ }
65
+ }
66
+
67
if (!itsclass) {
68
/* Do nothing if not supported */
69
return;
70
@@ -XXX,XX +XXX,XX @@ static void create_v2m(VirtMachineState *vms)
71
vms->msi_controller = VIRT_MSI_CTRL_GICV2M;
72
}
73
74
-static void create_gic(VirtMachineState *vms)
75
+static void create_gic(VirtMachineState *vms, MemoryRegion *mem)
76
{
36
{
37
- const char compat[] = "virtio,pci-iommu";
38
+ const char compat[] = "virtio,pci-iommu\0pci1af4,1057";
39
uint16_t bdf = vms->virtio_iommu_bdf;
77
MachineState *ms = MACHINE(vms);
40
MachineState *ms = MACHINE(vms);
78
/* We create a standalone GIC */
41
char *node;
79
@@ -XXX,XX +XXX,XX @@ static void create_gic(VirtMachineState *vms)
42
80
nb_redist_regions);
43
vms->iommu_phandle = qemu_fdt_alloc_phandle(ms->fdt);
81
qdev_prop_set_uint32(vms->gic, "redist-region-count[0]", redist0_count);
44
82
45
- node = g_strdup_printf("%s/virtio_iommu@%d", vms->pciehb_nodename, bdf);
83
+ if (!kvm_irqchip_in_kernel()) {
46
+ node = g_strdup_printf("%s/virtio_iommu@%x,%x", vms->pciehb_nodename,
84
+ if (vms->tcg_its) {
47
+ PCI_SLOT(bdf), PCI_FUNC(bdf));
85
+ object_property_set_link(OBJECT(vms->gic), "sysmem",
48
qemu_fdt_add_subnode(ms->fdt, node);
86
+ OBJECT(mem), &error_fatal);
49
qemu_fdt_setprop(ms->fdt, node, "compatible", compat, sizeof(compat));
87
+ qdev_prop_set_bit(vms->gic, "has-lpi", true);
50
qemu_fdt_setprop_sized_cells(ms->fdt, node, "reg",
88
+ }
89
+ }
90
+
91
if (nb_redist_regions == 2) {
92
uint32_t redist1_capacity =
93
vms->memmap[VIRT_HIGH_GIC_REDIST2].size / GICV3_REDIST_SIZE;
94
@@ -XXX,XX +XXX,XX @@ static void machvirt_init(MachineState *machine)
95
96
virt_flash_fdt(vms, sysmem, secure_sysmem ?: sysmem);
97
98
- create_gic(vms);
99
+ create_gic(vms, sysmem);
100
101
virt_cpu_post_init(vms, sysmem);
102
103
@@ -XXX,XX +XXX,XX @@ static void virt_instance_init(Object *obj)
104
} else {
105
/* Default allows ITS instantiation */
106
vms->its = true;
107
+
108
+ if (vmc->no_tcg_its) {
109
+ vms->tcg_its = false;
110
+ } else {
111
+ vms->tcg_its = true;
112
+ }
113
}
114
115
/* Default disallows iommu instantiation */
116
@@ -XXX,XX +XXX,XX @@ DEFINE_VIRT_MACHINE_AS_LATEST(6, 2)
117
118
static void virt_machine_6_1_options(MachineClass *mc)
119
{
120
+ VirtMachineClass *vmc = VIRT_MACHINE_CLASS(OBJECT_CLASS(mc));
121
+
122
virt_machine_6_2_options(mc);
123
compat_props_add(mc->compat_props, hw_compat_6_1, hw_compat_6_1_len);
124
+
125
+ /* qemu ITS was introduced with 6.2 */
126
+ vmc->no_tcg_its = true;
127
}
128
DEFINE_VIRT_MACHINE(6, 1)
129
130
--
51
--
131
2.20.1
52
2.25.1
132
133
diff view generated by jsdifflib
New patch
1
From: Ake Koomsin <ake@igel.co.jp>
1
2
3
An exception targeting EL2 from lower EL is actually maskable when
4
HCR_E2H and HCR_TGE are both set. This applies to both secure and
5
non-secure Security state.
6
7
We can remove the conditions that try to suppress masking of
8
interrupts when we are Secure and the exception targets EL2 and
9
Secure EL2 is disabled. This is OK because in that situation
10
arm_phys_excp_target_el() will never return 2 as the target EL. The
11
'not if secure' check in this function was originally written before
12
arm_hcr_el2_eff(), and back then the target EL returned by
13
arm_phys_excp_target_el() could be 2 even if we were in Secure
14
EL0/EL1; but it is no longer needed.
15
16
Signed-off-by: Ake Koomsin <ake@igel.co.jp>
17
Message-id: 20221017092432.546881-1-ake@igel.co.jp
18
[PMM: Add commit message paragraph explaining why it's OK to
19
remove the checks on secure and SCR_EEL2]
20
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
21
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
22
---
23
target/arm/cpu.c | 24 +++++++++++++++++-------
24
1 file changed, 17 insertions(+), 7 deletions(-)
25
26
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
27
index XXXXXXX..XXXXXXX 100644
28
--- a/target/arm/cpu.c
29
+++ b/target/arm/cpu.c
30
@@ -XXX,XX +XXX,XX @@ static inline bool arm_excp_unmasked(CPUState *cs, unsigned int excp_idx,
31
if ((target_el > cur_el) && (target_el != 1)) {
32
/* Exceptions targeting a higher EL may not be maskable */
33
if (arm_feature(env, ARM_FEATURE_AARCH64)) {
34
- /*
35
- * 64-bit masking rules are simple: exceptions to EL3
36
- * can't be masked, and exceptions to EL2 can only be
37
- * masked from Secure state. The HCR and SCR settings
38
- * don't affect the masking logic, only the interrupt routing.
39
- */
40
- if (target_el == 3 || !secure || (env->cp15.scr_el3 & SCR_EEL2)) {
41
+ switch (target_el) {
42
+ case 2:
43
+ /*
44
+ * According to ARM DDI 0487H.a, an interrupt can be masked
45
+ * when HCR_E2H and HCR_TGE are both set regardless of the
46
+ * current Security state. Note that we need to revisit this
47
+ * part again once we need to support NMI.
48
+ */
49
+ if ((hcr_el2 & (HCR_E2H | HCR_TGE)) != (HCR_E2H | HCR_TGE)) {
50
+ unmasked = true;
51
+ }
52
+ break;
53
+ case 3:
54
+ /* Interrupt cannot be masked when the target EL is 3 */
55
unmasked = true;
56
+ break;
57
+ default:
58
+ g_assert_not_reached();
59
}
60
} else {
61
/*
62
--
63
2.25.1
diff view generated by jsdifflib
1
The various MPS2 boards implemented in mps2.c have multiple I2C
1
From: Damien Hedde <damien.hedde@greensocs.com>
2
buses: a bus dedicated to the audio configuration, one for the LCD
3
touchscreen controller, and two which are connected to the external
4
Shield expansion connector. Mark the buses which are used only for
5
board-internal devices as 'full' so that if the user creates i2c
6
devices on the commandline without specifying a bus name then they
7
will be connected to the I2C controller used for the Shield
8
connector, where guest software will expect them.
9
2
3
The code for handling the reset level count in the Resettable code
4
has two issues:
5
6
The reset count is only decremented for the 1->0 case. This means
7
that if there's ever a nested reset that takes the count to 2 then it
8
will never again be decremented. Eventually the count will exceed
9
the '50' limit in resettable_phase_enter() and QEMU will trip over
10
the assertion failure. The repro case in issue 1266 is an example of
11
this that happens now the SCSI subsystem uses three-phase reset.
12
13
Secondly, the count is decremented only after the exit phase handler
14
is called. Moving the reset count decrement from "just after" to
15
"just before" calling the exit phase handler allows
16
resettable_is_in_reset() to return false during the handler
17
execution.
18
19
This simplifies reset handling in resettable devices. Typically, a
20
function that updates the device state will just need to read the
21
current reset state and not anymore treat the "in a reset-exit
22
transition" as a special case.
23
24
Note that the semantics change to the *_is_in_reset() functions
25
will have no effect on the current codebase, because only two
26
devices (hw/char/cadence_uart.c and hw/misc/zynq_sclr.c) currently
27
call those functions, and in neither case do they do it from the
28
device's exit phase methed.
29
30
Fixes: 4a5fc890 ("scsi: Use device_cold_reset() and bus_cold_reset()")
31
Resolves: https://gitlab.com/qemu-project/qemu/-/issues/1266
32
Signed-off-by: Damien Hedde <damien.hedde@greensocs.com>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
33
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
34
Reported-by: Michael Peter <michael.peter@hensoldt-cyber.com>
12
Message-id: 20210903151435.22379-5-peter.maydell@linaro.org
35
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
36
Message-id: 20221020142749.3357951-1-peter.maydell@linaro.org
37
Buglink: https://bugs.launchpad.net/qemu/+bug/1905297
38
Reported-by: Michael Peter <michael.peter@hensoldt-cyber.com>
39
[PMM: adjust the docs paragraph changed to get the name of the
40
'enter' phase right and to clarify exactly when the count is
41
adjusted; rewrite the commit message]
42
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
---
43
---
14
hw/arm/mps2.c | 12 +++++++++++-
44
docs/devel/reset.rst | 8 +++++---
15
1 file changed, 11 insertions(+), 1 deletion(-)
45
hw/core/resettable.c | 3 +--
46
2 files changed, 6 insertions(+), 5 deletions(-)
16
47
17
diff --git a/hw/arm/mps2.c b/hw/arm/mps2.c
48
diff --git a/docs/devel/reset.rst b/docs/devel/reset.rst
18
index XXXXXXX..XXXXXXX 100644
49
index XXXXXXX..XXXXXXX 100644
19
--- a/hw/arm/mps2.c
50
--- a/docs/devel/reset.rst
20
+++ b/hw/arm/mps2.c
51
+++ b/docs/devel/reset.rst
21
@@ -XXX,XX +XXX,XX @@ static void mps2_common_init(MachineState *machine)
52
@@ -XXX,XX +XXX,XX @@ Polling the reset state
22
0x40023000, /* Audio */
53
Resettable interface provides the ``resettable_is_in_reset()`` function.
23
0x40029000, /* Shield0 */
54
This function returns true if the object parameter is currently under reset.
24
0x4002a000}; /* Shield1 */
55
25
- sysbus_create_simple(TYPE_ARM_SBCON_I2C, i2cbase[i], NULL);
56
-An object is under reset from the beginning of the *init* phase to the end of
26
+ DeviceState *dev;
57
-the *exit* phase. During all three phases, the function will return that the
27
+
58
-object is in reset.
28
+ dev = sysbus_create_simple(TYPE_ARM_SBCON_I2C, i2cbase[i], NULL);
59
+An object is under reset from the beginning of the *enter* phase (before
29
+ if (i < 2) {
60
+either its children or its own enter method is called) to the *exit*
30
+ /*
61
+phase. During *enter* and *hold* phase only, the function will return that the
31
+ * internal-only bus: mark it full to avoid user-created
62
+object is in reset. The state is changed after the *exit* is propagated to
32
+ * i2c devices being plugged into it.
63
+its children and just before calling the object's own *exit* method.
33
+ */
64
34
+ BusState *qbus = qdev_get_child_bus(dev, "i2c");
65
This function may be used if the object behavior has to be adapted
35
+ qbus_mark_full(qbus);
66
while in reset state. For example if a device has an irq input,
36
+ }
67
diff --git a/hw/core/resettable.c b/hw/core/resettable.c
68
index XXXXXXX..XXXXXXX 100644
69
--- a/hw/core/resettable.c
70
+++ b/hw/core/resettable.c
71
@@ -XXX,XX +XXX,XX @@ static void resettable_phase_exit(Object *obj, void *opaque, ResetType type)
72
resettable_child_foreach(rc, obj, resettable_phase_exit, NULL, type);
73
74
assert(s->count > 0);
75
- if (s->count == 1) {
76
+ if (--s->count == 0) {
77
trace_resettable_phase_exit_exec(obj, obj_typename, !!rc->phases.exit);
78
if (rc->phases.exit && !resettable_get_tr_func(rc, obj)) {
79
rc->phases.exit(obj);
80
}
81
- s->count = 0;
37
}
82
}
38
create_unimplemented_device("i2s", 0x40024000, 0x400);
83
s->exit_phase_in_progress = false;
39
84
trace_resettable_phase_exit_end(obj, obj_typename, s->count);
40
--
85
--
41
2.20.1
86
2.25.1
42
87
43
88
diff view generated by jsdifflib
1
The mps2-tz boards use a data-driven structure to create the devices
1
The semantic difference between the deprecated device_legacy_reset()
2
that sit behind peripheral protection controllers. Currently the
2
function and the newer device_cold_reset() function is that the new
3
functions which create these devices are passed an 'opaque' pointer
3
function resets both the device itself and any qbuses it owns,
4
which is always the address within the machine struct of the device
4
whereas the legacy function resets just the device itself and nothing
5
to create, and some "all devices need this" information like irqs and
5
else. In hyperv_synic_reset() we reset a SynICState, which has no
6
addresses.
6
qbuses, so for this purpose the two functions behave identically and
7
7
we can stop using the deprecated one.
8
If a specific device needs more information than this, it is
9
currently not possible to pass that through from the PPCInfo
10
data structure. Add support for passing an extra data parameter,
11
so that we can more flexibly handle the needs of specific
12
device types. To provide some type-safety we make this extra
13
parameter a pointer to a union (which initially has no members).
14
15
In particular, we would like to be able to indicate which of the
16
i2c controllers are for on-board devices only and which are
17
connected to the external 'shield' expansion port; a subsequent
18
patch will use this mechanism for that purpose.
19
8
20
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
21
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
10
Reviewed-by: Maciej S. Szmigiero <maciej.szmigiero@oracle.com>
22
Message-id: 20210903151435.22379-3-peter.maydell@linaro.org
11
Message-id: 20221013171817.1447562-1-peter.maydell@linaro.org
23
---
12
---
24
hw/arm/mps2-tz.c | 35 ++++++++++++++++++++++-------------
13
hw/hyperv/hyperv.c | 2 +-
25
1 file changed, 22 insertions(+), 13 deletions(-)
14
1 file changed, 1 insertion(+), 1 deletion(-)
26
15
27
diff --git a/hw/arm/mps2-tz.c b/hw/arm/mps2-tz.c
16
diff --git a/hw/hyperv/hyperv.c b/hw/hyperv/hyperv.c
28
index XXXXXXX..XXXXXXX 100644
17
index XXXXXXX..XXXXXXX 100644
29
--- a/hw/arm/mps2-tz.c
18
--- a/hw/hyperv/hyperv.c
30
+++ b/hw/arm/mps2-tz.c
19
+++ b/hw/hyperv/hyperv.c
31
@@ -XXX,XX +XXX,XX @@ static qemu_irq get_sse_irq_in(MPS2TZMachineState *mms, int irqno)
20
@@ -XXX,XX +XXX,XX @@ void hyperv_synic_reset(CPUState *cs)
21
SynICState *synic = get_synic(cs);
22
23
if (synic) {
24
- device_legacy_reset(DEVICE(synic));
25
+ device_cold_reset(DEVICE(synic));
32
}
26
}
33
}
27
}
34
28
35
+/* Union describing the device-specific extra data we pass to the devfn. */
36
+typedef union PPCExtraData {
37
+} PPCExtraData;
38
+
39
/* Most of the devices in the AN505 FPGA image sit behind
40
* Peripheral Protection Controllers. These data structures
41
* define the layout of which devices sit behind which PPCs.
42
@@ -XXX,XX +XXX,XX @@ static qemu_irq get_sse_irq_in(MPS2TZMachineState *mms, int irqno)
43
*/
44
typedef MemoryRegion *MakeDevFn(MPS2TZMachineState *mms, void *opaque,
45
const char *name, hwaddr size,
46
- const int *irqs);
47
+ const int *irqs,
48
+ const PPCExtraData *extradata);
49
50
typedef struct PPCPortInfo {
51
const char *name;
52
@@ -XXX,XX +XXX,XX @@ typedef struct PPCPortInfo {
53
hwaddr addr;
54
hwaddr size;
55
int irqs[3]; /* currently no device needs more IRQ lines than this */
56
+ PPCExtraData extradata; /* to pass device-specific info to the devfn */
57
} PPCPortInfo;
58
59
typedef struct PPCInfo {
60
@@ -XXX,XX +XXX,XX @@ typedef struct PPCInfo {
61
static MemoryRegion *make_unimp_dev(MPS2TZMachineState *mms,
62
void *opaque,
63
const char *name, hwaddr size,
64
- const int *irqs)
65
+ const int *irqs,
66
+ const PPCExtraData *extradata)
67
{
68
/* Initialize, configure and realize a TYPE_UNIMPLEMENTED_DEVICE,
69
* and return a pointer to its MemoryRegion.
70
@@ -XXX,XX +XXX,XX @@ static MemoryRegion *make_unimp_dev(MPS2TZMachineState *mms,
71
72
static MemoryRegion *make_uart(MPS2TZMachineState *mms, void *opaque,
73
const char *name, hwaddr size,
74
- const int *irqs)
75
+ const int *irqs, const PPCExtraData *extradata)
76
{
77
/* The irq[] array is tx, rx, combined, in that order */
78
MPS2TZMachineClass *mmc = MPS2TZ_MACHINE_GET_CLASS(mms);
79
@@ -XXX,XX +XXX,XX @@ static MemoryRegion *make_uart(MPS2TZMachineState *mms, void *opaque,
80
81
static MemoryRegion *make_scc(MPS2TZMachineState *mms, void *opaque,
82
const char *name, hwaddr size,
83
- const int *irqs)
84
+ const int *irqs, const PPCExtraData *extradata)
85
{
86
MPS2SCC *scc = opaque;
87
DeviceState *sccdev;
88
@@ -XXX,XX +XXX,XX @@ static MemoryRegion *make_scc(MPS2TZMachineState *mms, void *opaque,
89
90
static MemoryRegion *make_fpgaio(MPS2TZMachineState *mms, void *opaque,
91
const char *name, hwaddr size,
92
- const int *irqs)
93
+ const int *irqs, const PPCExtraData *extradata)
94
{
95
MPS2FPGAIO *fpgaio = opaque;
96
MPS2TZMachineClass *mmc = MPS2TZ_MACHINE_GET_CLASS(mms);
97
@@ -XXX,XX +XXX,XX @@ static MemoryRegion *make_fpgaio(MPS2TZMachineState *mms, void *opaque,
98
99
static MemoryRegion *make_eth_dev(MPS2TZMachineState *mms, void *opaque,
100
const char *name, hwaddr size,
101
- const int *irqs)
102
+ const int *irqs,
103
+ const PPCExtraData *extradata)
104
{
105
SysBusDevice *s;
106
NICInfo *nd = &nd_table[0];
107
@@ -XXX,XX +XXX,XX @@ static MemoryRegion *make_eth_dev(MPS2TZMachineState *mms, void *opaque,
108
109
static MemoryRegion *make_eth_usb(MPS2TZMachineState *mms, void *opaque,
110
const char *name, hwaddr size,
111
- const int *irqs)
112
+ const int *irqs,
113
+ const PPCExtraData *extradata)
114
{
115
/*
116
* The AN524 makes the ethernet and USB share a PPC port.
117
@@ -XXX,XX +XXX,XX @@ static MemoryRegion *make_eth_usb(MPS2TZMachineState *mms, void *opaque,
118
119
static MemoryRegion *make_mpc(MPS2TZMachineState *mms, void *opaque,
120
const char *name, hwaddr size,
121
- const int *irqs)
122
+ const int *irqs, const PPCExtraData *extradata)
123
{
124
TZMPC *mpc = opaque;
125
int i = mpc - &mms->mpc[0];
126
@@ -XXX,XX +XXX,XX @@ static void remap_irq_fn(void *opaque, int n, int level)
127
128
static MemoryRegion *make_dma(MPS2TZMachineState *mms, void *opaque,
129
const char *name, hwaddr size,
130
- const int *irqs)
131
+ const int *irqs, const PPCExtraData *extradata)
132
{
133
/* The irq[] array is DMACINTR, DMACINTERR, DMACINTTC, in that order */
134
PL080State *dma = opaque;
135
@@ -XXX,XX +XXX,XX @@ static MemoryRegion *make_dma(MPS2TZMachineState *mms, void *opaque,
136
137
static MemoryRegion *make_spi(MPS2TZMachineState *mms, void *opaque,
138
const char *name, hwaddr size,
139
- const int *irqs)
140
+ const int *irqs, const PPCExtraData *extradata)
141
{
142
/*
143
* The AN505 has five PL022 SPI controllers.
144
@@ -XXX,XX +XXX,XX @@ static MemoryRegion *make_spi(MPS2TZMachineState *mms, void *opaque,
145
146
static MemoryRegion *make_i2c(MPS2TZMachineState *mms, void *opaque,
147
const char *name, hwaddr size,
148
- const int *irqs)
149
+ const int *irqs, const PPCExtraData *extradata)
150
{
151
ArmSbconI2CState *i2c = opaque;
152
SysBusDevice *s;
153
@@ -XXX,XX +XXX,XX @@ static MemoryRegion *make_i2c(MPS2TZMachineState *mms, void *opaque,
154
155
static MemoryRegion *make_rtc(MPS2TZMachineState *mms, void *opaque,
156
const char *name, hwaddr size,
157
- const int *irqs)
158
+ const int *irqs, const PPCExtraData *extradata)
159
{
160
PL031State *pl031 = opaque;
161
SysBusDevice *s;
162
@@ -XXX,XX +XXX,XX @@ static void mps2tz_common_init(MachineState *machine)
163
}
164
165
mr = pinfo->devfn(mms, pinfo->opaque, pinfo->name, pinfo->size,
166
- pinfo->irqs);
167
+ pinfo->irqs, &pinfo->extradata);
168
portname = g_strdup_printf("port[%d]", port);
169
object_property_set_link(OBJECT(ppc), portname, OBJECT(mr),
170
&error_fatal);
171
--
29
--
172
2.20.1
30
2.25.1
173
174
diff view generated by jsdifflib
New patch
1
From: Axel Heider <axel.heider@hensoldt.net>
1
2
3
When running seL4 tests (https://docs.sel4.systems/projects/sel4test)
4
on the sabrelight platform, the timer tests fail. The arm/imx6 EPIT
5
timer interrupt does not fire properly, instead of a e.g. second in
6
can take up to a minute to finally see the interrupt.
7
8
Resolves: https://gitlab.com/qemu-project/qemu/-/issues/1263
9
10
Signed-off-by: Axel Heider <axel.heider@hensoldt.net>
11
Message-id: 166663118138.13362.1229967229046092876-0@git.sr.ht
12
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
---
15
hw/timer/imx_epit.c | 9 +++++++--
16
1 file changed, 7 insertions(+), 2 deletions(-)
17
18
diff --git a/hw/timer/imx_epit.c b/hw/timer/imx_epit.c
19
index XXXXXXX..XXXXXXX 100644
20
--- a/hw/timer/imx_epit.c
21
+++ b/hw/timer/imx_epit.c
22
@@ -XXX,XX +XXX,XX @@ static void imx_epit_write(void *opaque, hwaddr offset, uint64_t value,
23
/* If IOVW bit is set then set the timer value */
24
ptimer_set_count(s->timer_reload, s->lr);
25
}
26
-
27
+ /*
28
+ * Commit the change to s->timer_reload, so it can propagate. Otherwise
29
+ * the timer interrupt may not fire properly. The commit must happen
30
+ * before calling imx_epit_reload_compare_timer(), which reads
31
+ * s->timer_reload internally again.
32
+ */
33
+ ptimer_transaction_commit(s->timer_reload);
34
imx_epit_reload_compare_timer(s);
35
ptimer_transaction_commit(s->timer_cmp);
36
- ptimer_transaction_commit(s->timer_reload);
37
break;
38
39
case 3: /* CMP */
40
--
41
2.25.1
diff view generated by jsdifflib
1
By default, QEMU will allow devices to be plugged into a bus up to
1
From: Richard Henderson <richard.henderson@linaro.org>
2
the bus class's device count limit. If the user creates a device on
3
the command line or via the monitor and doesn't explicitly specify
4
the bus to plug it in, QEMU will plug it into the first non-full bus
5
that it finds.
6
2
7
This is fine in most cases, but some machines have multiple buses of
3
Reduce the amount of typing required for this check.
8
a given type, some of which are dedicated to on-board devices and
9
some of which have an externally exposed connector for user-pluggable
10
devices. One example is I2C buses.
11
4
12
Provide a new function qbus_mark_full() so that a machine model can
5
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
13
mark this kind of "internal only" bus as 'full' after it has created
6
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
14
all the devices that should be plugged into that bus. The "find a
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
15
non-full bus" algorithm will then skip the internal-only bus when
8
Message-id: 20221024051851.3074715-2-richard.henderson@linaro.org
16
looking for a place to plug in user-created devices.
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
target/arm/internals.h | 5 +++++
12
target/arm/helper.c | 14 +++++---------
13
target/arm/ptw.c | 14 ++++++--------
14
3 files changed, 16 insertions(+), 17 deletions(-)
17
15
18
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
diff --git a/target/arm/internals.h b/target/arm/internals.h
19
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
20
Message-id: 20210903151435.22379-2-peter.maydell@linaro.org
21
---
22
include/hw/qdev-core.h | 24 ++++++++++++++++++++++++
23
softmmu/qdev-monitor.c | 7 ++++++-
24
2 files changed, 30 insertions(+), 1 deletion(-)
25
26
diff --git a/include/hw/qdev-core.h b/include/hw/qdev-core.h
27
index XXXXXXX..XXXXXXX 100644
17
index XXXXXXX..XXXXXXX 100644
28
--- a/include/hw/qdev-core.h
18
--- a/target/arm/internals.h
29
+++ b/include/hw/qdev-core.h
19
+++ b/target/arm/internals.h
30
@@ -XXX,XX +XXX,XX @@ struct BusState {
20
@@ -XXX,XX +XXX,XX @@ static inline bool regime_is_pan(CPUARMState *env, ARMMMUIdx mmu_idx)
31
HotplugHandler *hotplug_handler;
21
}
32
int max_index;
33
bool realized;
34
+ bool full;
35
int num_children;
36
37
/*
38
@@ -XXX,XX +XXX,XX @@ static inline bool qbus_is_hotpluggable(BusState *bus)
39
return bus->hotplug_handler;
40
}
22
}
41
23
42
+/**
24
+static inline bool regime_is_stage2(ARMMMUIdx mmu_idx)
43
+ * qbus_mark_full: Mark this bus as full, so no more devices can be attached
44
+ * @bus: Bus to mark as full
45
+ *
46
+ * By default, QEMU will allow devices to be plugged into a bus up
47
+ * to the bus class's device count limit. Calling this function
48
+ * marks a particular bus as full, so that no more devices can be
49
+ * plugged into it. In particular this means that the bus will not
50
+ * be considered as a candidate for plugging in devices created by
51
+ * the user on the commandline or via the monitor.
52
+ * If a machine has multiple buses of a given type, such as I2C,
53
+ * where some of those buses in the real hardware are used only for
54
+ * internal devices and some are exposed via expansion ports, you
55
+ * can use this function to mark the internal-only buses as full
56
+ * after you have created all their internal devices. Then user
57
+ * created devices will appear on the expansion-port bus where
58
+ * guest software expects them.
59
+ */
60
+static inline void qbus_mark_full(BusState *bus)
61
+{
25
+{
62
+ bus->full = true;
26
+ return mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S;
63
+}
27
+}
64
+
28
+
65
void device_listener_register(DeviceListener *listener);
29
/* Return the exception level which controls this address translation regime */
66
void device_listener_unregister(DeviceListener *listener);
30
static inline uint32_t regime_el(CPUARMState *env, ARMMMUIdx mmu_idx)
67
31
{
68
diff --git a/softmmu/qdev-monitor.c b/softmmu/qdev-monitor.c
32
diff --git a/target/arm/helper.c b/target/arm/helper.c
69
index XXXXXXX..XXXXXXX 100644
33
index XXXXXXX..XXXXXXX 100644
70
--- a/softmmu/qdev-monitor.c
34
--- a/target/arm/helper.c
71
+++ b/softmmu/qdev-monitor.c
35
+++ b/target/arm/helper.c
72
@@ -XXX,XX +XXX,XX @@ static DeviceState *qbus_find_dev(BusState *bus, char *elem)
36
@@ -XXX,XX +XXX,XX @@ int aa64_va_parameter_tbi(uint64_t tcr, ARMMMUIdx mmu_idx)
73
74
static inline bool qbus_is_full(BusState *bus)
75
{
37
{
76
- BusClass *bus_class = BUS_GET_CLASS(bus);
38
if (regime_has_2_ranges(mmu_idx)) {
77
+ BusClass *bus_class;
39
return extract64(tcr, 37, 2);
78
+
40
- } else if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) {
79
+ if (bus->full) {
41
+ } else if (regime_is_stage2(mmu_idx)) {
80
+ return true;
42
return 0; /* VTCR_EL2 */
81
+ }
43
} else {
82
+ bus_class = BUS_GET_CLASS(bus);
44
/* Replicate the single TBI bit so we always have 2 bits. */
83
return bus_class->max_dev && bus->num_children >= bus_class->max_dev;
45
@@ -XXX,XX +XXX,XX @@ int aa64_va_parameter_tbid(uint64_t tcr, ARMMMUIdx mmu_idx)
46
{
47
if (regime_has_2_ranges(mmu_idx)) {
48
return extract64(tcr, 51, 2);
49
- } else if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) {
50
+ } else if (regime_is_stage2(mmu_idx)) {
51
return 0; /* VTCR_EL2 */
52
} else {
53
/* Replicate the single TBID bit so we always have 2 bits. */
54
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
55
int select, tsz, tbi, max_tsz, min_tsz, ps, sh;
56
ARMGranuleSize gran;
57
ARMCPU *cpu = env_archcpu(env);
58
- bool stage2 = mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S;
59
+ bool stage2 = regime_is_stage2(mmu_idx);
60
61
if (!regime_has_2_ranges(mmu_idx)) {
62
select = 0;
63
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
64
}
65
ds = false;
66
} else if (ds) {
67
- switch (mmu_idx) {
68
- case ARMMMUIdx_Stage2:
69
- case ARMMMUIdx_Stage2_S:
70
+ if (regime_is_stage2(mmu_idx)) {
71
if (gran == Gran16K) {
72
ds = cpu_isar_feature(aa64_tgran16_2_lpa2, cpu);
73
} else {
74
ds = cpu_isar_feature(aa64_tgran4_2_lpa2, cpu);
75
}
76
- break;
77
- default:
78
+ } else {
79
if (gran == Gran16K) {
80
ds = cpu_isar_feature(aa64_tgran16_lpa2, cpu);
81
} else {
82
ds = cpu_isar_feature(aa64_tgran4_lpa2, cpu);
83
}
84
- break;
85
}
86
if (ds) {
87
min_tsz = 12;
88
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
89
index XXXXXXX..XXXXXXX 100644
90
--- a/target/arm/ptw.c
91
+++ b/target/arm/ptw.c
92
@@ -XXX,XX +XXX,XX @@ static int get_S1prot(CPUARMState *env, ARMMMUIdx mmu_idx, bool is_aa64,
93
bool have_wxn;
94
int wxn = 0;
95
96
- assert(mmu_idx != ARMMMUIdx_Stage2);
97
- assert(mmu_idx != ARMMMUIdx_Stage2_S);
98
+ assert(!regime_is_stage2(mmu_idx));
99
100
user_rw = simple_ap_to_rw_prot_is_user(ap, true);
101
if (is_user) {
102
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
103
goto do_fault;
104
}
105
106
- if (mmu_idx != ARMMMUIdx_Stage2 && mmu_idx != ARMMMUIdx_Stage2_S) {
107
+ if (!regime_is_stage2(mmu_idx)) {
108
/*
109
* The starting level depends on the virtual address size (which can
110
* be up to 48 bits) and the translation granule size. It indicates
111
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
112
attrs = extract64(descriptor, 2, 10)
113
| (extract64(descriptor, 52, 12) << 10);
114
115
- if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) {
116
+ if (regime_is_stage2(mmu_idx)) {
117
/* Stage 2 table descriptors do not include any attribute fields */
118
break;
119
}
120
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
121
122
ap = extract32(attrs, 4, 2);
123
124
- if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) {
125
+ if (regime_is_stage2(mmu_idx)) {
126
ns = mmu_idx == ARMMMUIdx_Stage2;
127
xn = extract32(attrs, 11, 2);
128
result->f.prot = get_S2prot(env, ap, xn, s1_is_el0);
129
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
130
result->f.guarded = guarded;
131
}
132
133
- if (mmu_idx == ARMMMUIdx_Stage2 || mmu_idx == ARMMMUIdx_Stage2_S) {
134
+ if (regime_is_stage2(mmu_idx)) {
135
result->cacheattrs.is_s2_format = true;
136
result->cacheattrs.attrs = extract32(attrs, 0, 4);
137
} else {
138
@@ -XXX,XX +XXX,XX @@ do_fault:
139
fi->type = fault_type;
140
fi->level = level;
141
/* Tag the error as S2 for failed S1 PTW at S2 or ordinary S2. */
142
- fi->stage2 = fi->s1ptw || (mmu_idx == ARMMMUIdx_Stage2 ||
143
- mmu_idx == ARMMMUIdx_Stage2_S);
144
+ fi->stage2 = fi->s1ptw || regime_is_stage2(mmu_idx);
145
fi->s1ns = mmu_idx == ARMMMUIdx_Stage2;
146
return true;
84
}
147
}
85
86
--
148
--
87
2.20.1
149
2.25.1
88
150
89
151
diff view generated by jsdifflib
1
From: Bin Meng <bmeng.cn@gmail.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Read or write to uart registers when unclocked or in reset should be
3
Hoist the computation of the mmu_idx for the ptw up to
4
ignored. Add the check there, and as a result of this, the check in
4
get_phys_addr_with_struct and get_phys_addr_twostage.
5
uart_write_tx_fifo() is now unnecessary.
5
This removes the duplicate check for stage2 disabled
6
from the middle of the walk, performing it only once.
6
7
7
Signed-off-by: Bin Meng <bmeng.cn@gmail.com>
8
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com>
9
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
9
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
10
Tested-by: Alex Bennée <alex.bennee@linaro.org>
10
Message-id: 20210901124521.30599-6-bmeng.cn@gmail.com
11
Message-id: 20221024051851.3074715-3-richard.henderson@linaro.org
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
13
---
13
hw/char/cadence_uart.c | 15 ++++++++++-----
14
target/arm/ptw.c | 71 ++++++++++++++++++++++++++++++++++++------------
14
1 file changed, 10 insertions(+), 5 deletions(-)
15
1 file changed, 54 insertions(+), 17 deletions(-)
15
16
16
diff --git a/hw/char/cadence_uart.c b/hw/char/cadence_uart.c
17
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
17
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
18
--- a/hw/char/cadence_uart.c
19
--- a/target/arm/ptw.c
19
+++ b/hw/char/cadence_uart.c
20
+++ b/target/arm/ptw.c
20
@@ -XXX,XX +XXX,XX @@ static gboolean cadence_uart_xmit(void *do_not_use, GIOCondition cond,
21
@@ -XXX,XX +XXX,XX @@
21
static void uart_write_tx_fifo(CadenceUARTState *s, const uint8_t *buf,
22
22
int size)
23
typedef struct S1Translate {
24
ARMMMUIdx in_mmu_idx;
25
+ ARMMMUIdx in_ptw_idx;
26
bool in_secure;
27
bool in_debug;
28
bool out_secure;
29
@@ -XXX,XX +XXX,XX @@ static bool S1_ptw_translate(CPUARMState *env, S1Translate *ptw,
23
{
30
{
24
- /* ignore characters when unclocked or in reset */
31
bool is_secure = ptw->in_secure;
25
- if (!clock_is_enabled(s->refclk) || device_is_in_reset(DEVICE(s))) {
32
ARMMMUIdx mmu_idx = ptw->in_mmu_idx;
26
- return;
33
- ARMMMUIdx s2_mmu_idx = is_secure ? ARMMMUIdx_Stage2_S : ARMMMUIdx_Stage2;
34
- bool s2_phys = false;
35
+ ARMMMUIdx s2_mmu_idx = ptw->in_ptw_idx;
36
uint8_t pte_attrs;
37
bool pte_secure;
38
39
- if (!arm_mmu_idx_is_stage1_of_2(mmu_idx)
40
- || regime_translation_disabled(env, s2_mmu_idx, is_secure)) {
41
- s2_mmu_idx = is_secure ? ARMMMUIdx_Phys_S : ARMMMUIdx_Phys_NS;
42
- s2_phys = true;
27
- }
43
- }
28
-
44
-
29
if ((s->r[R_CR] & UART_CR_TX_DIS) || !(s->r[R_CR] & UART_CR_TX_EN)) {
45
if (unlikely(ptw->in_debug)) {
30
return;
46
/*
47
* From gdbstub, do not use softmmu so that we don't modify the
48
* state of the cpu at all, including softmmu tlb contents.
49
*/
50
- if (s2_phys) {
51
- ptw->out_phys = addr;
52
- pte_attrs = 0;
53
- pte_secure = is_secure;
54
- } else {
55
+ if (regime_is_stage2(s2_mmu_idx)) {
56
S1Translate s2ptw = {
57
.in_mmu_idx = s2_mmu_idx,
58
+ .in_ptw_idx = is_secure ? ARMMMUIdx_Phys_S : ARMMMUIdx_Phys_NS,
59
.in_secure = is_secure,
60
.in_debug = true,
61
};
62
GetPhysAddrResult s2 = { };
63
+
64
if (!get_phys_addr_lpae(env, &s2ptw, addr, MMU_DATA_LOAD,
65
false, &s2, fi)) {
66
goto fail;
67
@@ -XXX,XX +XXX,XX @@ static bool S1_ptw_translate(CPUARMState *env, S1Translate *ptw,
68
ptw->out_phys = s2.f.phys_addr;
69
pte_attrs = s2.cacheattrs.attrs;
70
pte_secure = s2.f.attrs.secure;
71
+ } else {
72
+ /* Regime is physical. */
73
+ ptw->out_phys = addr;
74
+ pte_attrs = 0;
75
+ pte_secure = is_secure;
76
}
77
ptw->out_host = NULL;
78
} else {
79
@@ -XXX,XX +XXX,XX @@ static bool S1_ptw_translate(CPUARMState *env, S1Translate *ptw,
80
pte_secure = full->attrs.secure;
31
}
81
}
32
@@ -XXX,XX +XXX,XX @@ static MemTxResult uart_write(void *opaque, hwaddr offset,
82
83
- if (!s2_phys) {
84
+ if (regime_is_stage2(s2_mmu_idx)) {
85
uint64_t hcr = arm_hcr_el2_eff_secstate(env, is_secure);
86
87
if ((hcr & HCR_PTW) && S2_attrs_are_device(hcr, pte_attrs)) {
88
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
89
descaddr |= (address >> (stride * (4 - level))) & indexmask;
90
descaddr &= ~7ULL;
91
nstable = extract32(tableattrs, 4, 1);
92
- ptw->in_secure = !nstable;
93
+ if (!nstable) {
94
+ /*
95
+ * Stage2_S -> Stage2 or Phys_S -> Phys_NS
96
+ * Assert that the non-secure idx are even, and relative order.
97
+ */
98
+ QEMU_BUILD_BUG_ON((ARMMMUIdx_Phys_NS & 1) != 0);
99
+ QEMU_BUILD_BUG_ON((ARMMMUIdx_Stage2 & 1) != 0);
100
+ QEMU_BUILD_BUG_ON(ARMMMUIdx_Phys_NS + 1 != ARMMMUIdx_Phys_S);
101
+ QEMU_BUILD_BUG_ON(ARMMMUIdx_Stage2 + 1 != ARMMMUIdx_Stage2_S);
102
+ ptw->in_ptw_idx &= ~1;
103
+ ptw->in_secure = false;
104
+ }
105
descriptor = arm_ldq_ptw(env, ptw, descaddr, fi);
106
if (fi->type != ARMFault_None) {
107
goto do_fault;
108
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_twostage(CPUARMState *env, S1Translate *ptw,
109
110
is_el0 = ptw->in_mmu_idx == ARMMMUIdx_Stage1_E0;
111
ptw->in_mmu_idx = s2walk_secure ? ARMMMUIdx_Stage2_S : ARMMMUIdx_Stage2;
112
+ ptw->in_ptw_idx = s2walk_secure ? ARMMMUIdx_Phys_S : ARMMMUIdx_Phys_NS;
113
ptw->in_secure = s2walk_secure;
114
115
/*
116
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_with_struct(CPUARMState *env, S1Translate *ptw,
117
ARMMMUFaultInfo *fi)
33
{
118
{
34
CadenceUARTState *s = opaque;
119
ARMMMUIdx mmu_idx = ptw->in_mmu_idx;
35
120
- ARMMMUIdx s1_mmu_idx = stage_1_mmu_idx(mmu_idx);
36
+ /* ignore access when unclocked or in reset */
121
bool is_secure = ptw->in_secure;
37
+ if (!clock_is_enabled(s->refclk) || device_is_in_reset(DEVICE(s))) {
122
+ ARMMMUIdx s1_mmu_idx;
38
+ return MEMTX_ERROR;
123
39
+ }
124
- if (mmu_idx != s1_mmu_idx) {
125
+ switch (mmu_idx) {
126
+ case ARMMMUIdx_Phys_S:
127
+ case ARMMMUIdx_Phys_NS:
128
+ /* Checking Phys early avoids special casing later vs regime_el. */
129
+ return get_phys_addr_disabled(env, address, access_type, mmu_idx,
130
+ is_secure, result, fi);
40
+
131
+
41
DB_PRINT(" offset:%x data:%08x\n", (unsigned)offset, (unsigned)value);
132
+ case ARMMMUIdx_Stage1_E0:
42
offset >>= 2;
133
+ case ARMMMUIdx_Stage1_E1:
43
if (offset >= CADENCE_UART_R_MAX) {
134
+ case ARMMMUIdx_Stage1_E1_PAN:
44
@@ -XXX,XX +XXX,XX @@ static MemTxResult uart_read(void *opaque, hwaddr offset,
135
+ /* First stage lookup uses second stage for ptw. */
45
CadenceUARTState *s = opaque;
136
+ ptw->in_ptw_idx = is_secure ? ARMMMUIdx_Stage2_S : ARMMMUIdx_Stage2;
46
uint32_t c = 0;
137
+ break;
47
48
+ /* ignore access when unclocked or in reset */
49
+ if (!clock_is_enabled(s->refclk) || device_is_in_reset(DEVICE(s))) {
50
+ return MEMTX_ERROR;
51
+ }
52
+
138
+
53
offset >>= 2;
139
+ case ARMMMUIdx_E10_0:
54
if (offset >= CADENCE_UART_R_MAX) {
140
+ s1_mmu_idx = ARMMMUIdx_Stage1_E0;
55
return MEMTX_DECODE_ERROR;
141
+ goto do_twostage;
142
+ case ARMMMUIdx_E10_1:
143
+ s1_mmu_idx = ARMMMUIdx_Stage1_E1;
144
+ goto do_twostage;
145
+ case ARMMMUIdx_E10_1_PAN:
146
+ s1_mmu_idx = ARMMMUIdx_Stage1_E1_PAN;
147
+ do_twostage:
148
/*
149
* Call ourselves recursively to do the stage 1 and then stage 2
150
* translations if mmu_idx is a two-stage regime, and EL2 present.
151
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_with_struct(CPUARMState *env, S1Translate *ptw,
152
return get_phys_addr_twostage(env, ptw, address, access_type,
153
result, fi);
154
}
155
+ /* fall through */
156
+
157
+ default:
158
+ /* Single stage and second stage uses physical for ptw. */
159
+ ptw->in_ptw_idx = is_secure ? ARMMMUIdx_Phys_S : ARMMMUIdx_Phys_NS;
160
+ break;
161
}
162
163
/*
56
--
164
--
57
2.20.1
165
2.25.1
58
166
59
167
diff view generated by jsdifflib
1
From: Shashi Mallela <shashi.mallela@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Implemented lpi processing at redistributor to get lpi config info
3
The MMFR1 field may indicate support for hardware update of
4
from lpi configuration table,determine priority,set pending state in
4
access flag alone, or access flag and dirty bit.
5
lpi pending table and forward the lpi to cpuif.Added logic to invoke
6
redistributor lpi processing with translated LPI which set/clear LPI
7
from ITS device as part of ITS INT,CLEAR,DISCARD command and
8
GITS_TRANSLATER processing.
9
5
10
Signed-off-by: Shashi Mallela <shashi.mallela@linaro.org>
11
Tested-by: Neil Armstrong <narmstrong@baylibre.com>
12
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
13
Message-id: 20210910143951.92242-7-shashi.mallela@linaro.org
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20221024051851.3074715-4-richard.henderson@linaro.org
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
15
---
10
---
16
hw/intc/gicv3_internal.h | 9 ++
11
target/arm/cpu.h | 10 ++++++++++
17
include/hw/intc/arm_gicv3_common.h | 7 ++
12
1 file changed, 10 insertions(+)
18
hw/intc/arm_gicv3.c | 14 +++
19
hw/intc/arm_gicv3_common.c | 1 +
20
hw/intc/arm_gicv3_cpuif.c | 7 +-
21
hw/intc/arm_gicv3_its.c | 23 +++++
22
hw/intc/arm_gicv3_redist.c | 141 +++++++++++++++++++++++++++++
23
7 files changed, 200 insertions(+), 2 deletions(-)
24
13
25
diff --git a/hw/intc/gicv3_internal.h b/hw/intc/gicv3_internal.h
14
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
26
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
27
--- a/hw/intc/gicv3_internal.h
16
--- a/target/arm/cpu.h
28
+++ b/hw/intc/gicv3_internal.h
17
+++ b/target/arm/cpu.h
29
@@ -XXX,XX +XXX,XX @@ FIELD(GICR_PENDBASER, PHYADDR, 16, 36)
18
@@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_e0pd(const ARMISARegisters *id)
30
FIELD(GICR_PENDBASER, OUTERCACHE, 56, 3)
19
return FIELD_EX64(id->id_aa64mmfr2, ID_AA64MMFR2, E0PD) != 0;
31
FIELD(GICR_PENDBASER, PTZ, 62, 1)
32
33
+#define GICR_PROPBASER_IDBITS_THRESHOLD 0xd
34
+
35
#define ICC_CTLR_EL1_CBPR (1U << 0)
36
#define ICC_CTLR_EL1_EOIMODE (1U << 1)
37
#define ICC_CTLR_EL1_PMHE (1U << 6)
38
@@ -XXX,XX +XXX,XX @@ FIELD(GITS_TYPER, CIL, 36, 1)
39
40
#define L1TABLE_ENTRY_SIZE 8
41
42
+#define LPI_CTE_ENABLED TABLE_ENTRY_VALID_MASK
43
+#define LPI_PRIORITY_MASK 0xfc
44
+
45
#define GITS_CMDQ_ENTRY_SIZE 32
46
#define NUM_BYTES_IN_DW 8
47
48
@@ -XXX,XX +XXX,XX @@ FIELD(MAPC, RDBASE, 16, 32)
49
* Valid = 1 bit,RDBase = 36 bits(considering max RDBASE)
50
*/
51
#define GITS_CTE_SIZE (0x8ULL)
52
+#define GITS_CTE_RDBASE_PROCNUM_MASK MAKE_64BIT_MASK(1, RDBASE_PROCNUM_LENGTH)
53
54
/* Special interrupt IDs */
55
#define INTID_SECURE 1020
56
@@ -XXX,XX +XXX,XX @@ MemTxResult gicv3_redist_write(void *opaque, hwaddr offset, uint64_t data,
57
unsigned size, MemTxAttrs attrs);
58
void gicv3_dist_set_irq(GICv3State *s, int irq, int level);
59
void gicv3_redist_set_irq(GICv3CPUState *cs, int irq, int level);
60
+void gicv3_redist_process_lpi(GICv3CPUState *cs, int irq, int level);
61
+void gicv3_redist_lpi_pending(GICv3CPUState *cs, int irq, int level);
62
+void gicv3_redist_update_lpi(GICv3CPUState *cs);
63
void gicv3_redist_send_sgi(GICv3CPUState *cs, int grp, int irq, bool ns);
64
void gicv3_init_cpuif(GICv3State *s);
65
66
diff --git a/include/hw/intc/arm_gicv3_common.h b/include/hw/intc/arm_gicv3_common.h
67
index XXXXXXX..XXXXXXX 100644
68
--- a/include/hw/intc/arm_gicv3_common.h
69
+++ b/include/hw/intc/arm_gicv3_common.h
70
@@ -XXX,XX +XXX,XX @@ struct GICv3CPUState {
71
* real state above; it doesn't need to be migrated.
72
*/
73
PendingIrq hppi;
74
+
75
+ /*
76
+ * Cached information recalculated from LPI tables
77
+ * in guest memory
78
+ */
79
+ PendingIrq hpplpi;
80
+
81
/* This is temporary working state, to avoid a malloc in gicv3_update() */
82
bool seenbetter;
83
};
84
diff --git a/hw/intc/arm_gicv3.c b/hw/intc/arm_gicv3.c
85
index XXXXXXX..XXXXXXX 100644
86
--- a/hw/intc/arm_gicv3.c
87
+++ b/hw/intc/arm_gicv3.c
88
@@ -XXX,XX +XXX,XX @@ static void gicv3_redist_update_noirqset(GICv3CPUState *cs)
89
cs->hppi.grp = gicv3_irq_group(cs->gic, cs, cs->hppi.irq);
90
}
91
92
+ if ((cs->gicr_ctlr & GICR_CTLR_ENABLE_LPIS) && cs->gic->lpi_enable &&
93
+ (cs->hpplpi.prio != 0xff)) {
94
+ if (irqbetter(cs, cs->hpplpi.irq, cs->hpplpi.prio)) {
95
+ cs->hppi.irq = cs->hpplpi.irq;
96
+ cs->hppi.prio = cs->hpplpi.prio;
97
+ cs->hppi.grp = cs->hpplpi.grp;
98
+ seenbetter = true;
99
+ }
100
+ }
101
+
102
/* If the best interrupt we just found would preempt whatever
103
* was the previous best interrupt before this update, then
104
* we know it's definitely the best one now.
105
@@ -XXX,XX +XXX,XX @@ static void gicv3_set_irq(void *opaque, int irq, int level)
106
107
static void arm_gicv3_post_load(GICv3State *s)
108
{
109
+ int i;
110
/* Recalculate our cached idea of the current highest priority
111
* pending interrupt, but don't set IRQ or FIQ lines.
112
*/
113
+ for (i = 0; i < s->num_cpu; i++) {
114
+ gicv3_redist_update_lpi(&s->cpu[i]);
115
+ }
116
gicv3_full_update_noirqset(s);
117
/* Repopulate the cache of GICv3CPUState pointers for target CPUs */
118
gicv3_cache_all_target_cpustates(s);
119
diff --git a/hw/intc/arm_gicv3_common.c b/hw/intc/arm_gicv3_common.c
120
index XXXXXXX..XXXXXXX 100644
121
--- a/hw/intc/arm_gicv3_common.c
122
+++ b/hw/intc/arm_gicv3_common.c
123
@@ -XXX,XX +XXX,XX @@ static void arm_gicv3_common_reset(DeviceState *dev)
124
memset(cs->gicr_ipriorityr, 0, sizeof(cs->gicr_ipriorityr));
125
126
cs->hppi.prio = 0xff;
127
+ cs->hpplpi.prio = 0xff;
128
129
/* State in the CPU interface must *not* be reset here, because it
130
* is part of the CPU's reset domain, not the GIC device's.
131
diff --git a/hw/intc/arm_gicv3_cpuif.c b/hw/intc/arm_gicv3_cpuif.c
132
index XXXXXXX..XXXXXXX 100644
133
--- a/hw/intc/arm_gicv3_cpuif.c
134
+++ b/hw/intc/arm_gicv3_cpuif.c
135
@@ -XXX,XX +XXX,XX @@ static void icc_activate_irq(GICv3CPUState *cs, int irq)
136
cs->gicr_iactiver0 = deposit32(cs->gicr_iactiver0, irq, 1, 1);
137
cs->gicr_ipendr0 = deposit32(cs->gicr_ipendr0, irq, 1, 0);
138
gicv3_redist_update(cs);
139
- } else {
140
+ } else if (irq < GICV3_LPI_INTID_START) {
141
gicv3_gicd_active_set(cs->gic, irq);
142
gicv3_gicd_pending_clear(cs->gic, irq);
143
gicv3_update(cs->gic, irq, 1);
144
+ } else {
145
+ gicv3_redist_lpi_pending(cs, irq, 0);
146
}
147
}
20
}
148
21
149
@@ -XXX,XX +XXX,XX @@ static void icc_eoir_write(CPUARMState *env, const ARMCPRegInfo *ri,
22
+static inline bool isar_feature_aa64_hafs(const ARMISARegisters *id)
150
trace_gicv3_icc_eoir_write(is_eoir0 ? 0 : 1,
151
gicv3_redist_affid(cs), value);
152
153
- if (irq >= cs->gic->num_irq) {
154
+ if ((irq >= cs->gic->num_irq) &&
155
+ !(cs->gic->lpi_enable && (irq >= GICV3_LPI_INTID_START))) {
156
/* This handles two cases:
157
* 1. If software writes the ID of a spurious interrupt [ie 1020-1023]
158
* to the GICC_EOIR, the GIC ignores that write.
159
diff --git a/hw/intc/arm_gicv3_its.c b/hw/intc/arm_gicv3_its.c
160
index XXXXXXX..XXXXXXX 100644
161
--- a/hw/intc/arm_gicv3_its.c
162
+++ b/hw/intc/arm_gicv3_its.c
163
@@ -XXX,XX +XXX,XX @@ static bool process_its_cmd(GICv3ITSState *s, uint64_t value, uint32_t offset,
164
uint64_t cte = 0;
165
bool cte_valid = false;
166
bool result = false;
167
+ uint64_t rdbase;
168
169
if (cmd == NONE) {
170
devid = offset;
171
@@ -XXX,XX +XXX,XX @@ static bool process_its_cmd(GICv3ITSState *s, uint64_t value, uint32_t offset,
172
* Current implementation only supports rdbase == procnum
173
* Hence rdbase physical address is ignored
174
*/
175
+ rdbase = (cte & GITS_CTE_RDBASE_PROCNUM_MASK) >> 1U;
176
+
177
+ if (rdbase > s->gicv3->num_cpu) {
178
+ return result;
179
+ }
180
+
181
+ if ((cmd == CLEAR) || (cmd == DISCARD)) {
182
+ gicv3_redist_process_lpi(&s->gicv3->cpu[rdbase], pIntid, 0);
183
+ } else {
184
+ gicv3_redist_process_lpi(&s->gicv3->cpu[rdbase], pIntid, 1);
185
+ }
186
+
187
if (cmd == DISCARD) {
188
IteEntry ite = {};
189
/* remove mapping from interrupt translation table */
190
@@ -XXX,XX +XXX,XX @@ static void process_cmdq(GICv3ITSState *s)
191
MemTxResult res = MEMTX_OK;
192
bool result = true;
193
uint8_t cmd;
194
+ int i;
195
196
if (!(s->ctlr & ITS_CTLR_ENABLED)) {
197
return;
198
@@ -XXX,XX +XXX,XX @@ static void process_cmdq(GICv3ITSState *s)
199
break;
200
case GITS_CMD_INV:
201
case GITS_CMD_INVALL:
202
+ /*
203
+ * Current implementation doesn't cache any ITS tables,
204
+ * but the calculated lpi priority information. We only
205
+ * need to trigger lpi priority re-calculation to be in
206
+ * sync with LPI config table or pending table changes.
207
+ */
208
+ for (i = 0; i < s->gicv3->num_cpu; i++) {
209
+ gicv3_redist_update_lpi(&s->gicv3->cpu[i]);
210
+ }
211
break;
212
default:
213
break;
214
diff --git a/hw/intc/arm_gicv3_redist.c b/hw/intc/arm_gicv3_redist.c
215
index XXXXXXX..XXXXXXX 100644
216
--- a/hw/intc/arm_gicv3_redist.c
217
+++ b/hw/intc/arm_gicv3_redist.c
218
@@ -XXX,XX +XXX,XX @@ static MemTxResult gicr_writel(GICv3CPUState *cs, hwaddr offset,
219
if (cs->gicr_typer & GICR_TYPER_PLPIS) {
220
if (value & GICR_CTLR_ENABLE_LPIS) {
221
cs->gicr_ctlr |= GICR_CTLR_ENABLE_LPIS;
222
+ /* Check for any pending interr in pending table */
223
+ gicv3_redist_update_lpi(cs);
224
+ gicv3_redist_update(cs);
225
} else {
226
cs->gicr_ctlr &= ~GICR_CTLR_ENABLE_LPIS;
227
}
228
@@ -XXX,XX +XXX,XX @@ MemTxResult gicv3_redist_write(void *opaque, hwaddr offset, uint64_t data,
229
return r;
230
}
231
232
+static void gicv3_redist_check_lpi_priority(GICv3CPUState *cs, int irq)
233
+{
23
+{
234
+ AddressSpace *as = &cs->gic->dma_as;
24
+ return FIELD_EX64(id->id_aa64mmfr1, ID_AA64MMFR1, HAFDBS) != 0;
235
+ uint64_t lpict_baddr;
236
+ uint8_t lpite;
237
+ uint8_t prio;
238
+
239
+ lpict_baddr = cs->gicr_propbaser & R_GICR_PROPBASER_PHYADDR_MASK;
240
+
241
+ address_space_read(as, lpict_baddr + ((irq - GICV3_LPI_INTID_START) *
242
+ sizeof(lpite)), MEMTXATTRS_UNSPECIFIED, &lpite,
243
+ sizeof(lpite));
244
+
245
+ if (!(lpite & LPI_CTE_ENABLED)) {
246
+ return;
247
+ }
248
+
249
+ if (cs->gic->gicd_ctlr & GICD_CTLR_DS) {
250
+ prio = lpite & LPI_PRIORITY_MASK;
251
+ } else {
252
+ prio = ((lpite & LPI_PRIORITY_MASK) >> 1) | 0x80;
253
+ }
254
+
255
+ if ((prio < cs->hpplpi.prio) ||
256
+ ((prio == cs->hpplpi.prio) && (irq <= cs->hpplpi.irq))) {
257
+ cs->hpplpi.irq = irq;
258
+ cs->hpplpi.prio = prio;
259
+ /* LPIs are always non-secure Grp1 interrupts */
260
+ cs->hpplpi.grp = GICV3_G1NS;
261
+ }
262
+}
25
+}
263
+
26
+
264
+void gicv3_redist_update_lpi(GICv3CPUState *cs)
27
+static inline bool isar_feature_aa64_hdbs(const ARMISARegisters *id)
265
+{
28
+{
266
+ /*
29
+ return FIELD_EX64(id->id_aa64mmfr1, ID_AA64MMFR1, HAFDBS) >= 2;
267
+ * This function scans the LPI pending table and for each pending
268
+ * LPI, reads the corresponding entry from LPI configuration table
269
+ * to extract the priority info and determine if the current LPI
270
+ * priority is lower than the last computed high priority lpi interrupt.
271
+ * If yes, replace current LPI as the new high priority lpi interrupt.
272
+ */
273
+ AddressSpace *as = &cs->gic->dma_as;
274
+ uint64_t lpipt_baddr;
275
+ uint32_t pendt_size = 0;
276
+ uint8_t pend;
277
+ int i, bit;
278
+ uint64_t idbits;
279
+
280
+ idbits = MIN(FIELD_EX64(cs->gicr_propbaser, GICR_PROPBASER, IDBITS),
281
+ GICD_TYPER_IDBITS);
282
+
283
+ if (!(cs->gicr_ctlr & GICR_CTLR_ENABLE_LPIS) || !cs->gicr_propbaser ||
284
+ !cs->gicr_pendbaser) {
285
+ return;
286
+ }
287
+
288
+ cs->hpplpi.prio = 0xff;
289
+
290
+ lpipt_baddr = cs->gicr_pendbaser & R_GICR_PENDBASER_PHYADDR_MASK;
291
+
292
+ /* Determine the highest priority pending interrupt among LPIs */
293
+ pendt_size = (1ULL << (idbits + 1));
294
+
295
+ for (i = GICV3_LPI_INTID_START / 8; i < pendt_size / 8; i++) {
296
+ address_space_read(as, lpipt_baddr + i, MEMTXATTRS_UNSPECIFIED, &pend,
297
+ sizeof(pend));
298
+
299
+ while (pend) {
300
+ bit = ctz32(pend);
301
+ gicv3_redist_check_lpi_priority(cs, i * 8 + bit);
302
+ pend &= ~(1 << bit);
303
+ }
304
+ }
305
+}
30
+}
306
+
31
+
307
+void gicv3_redist_lpi_pending(GICv3CPUState *cs, int irq, int level)
32
static inline bool isar_feature_aa64_tts2uxn(const ARMISARegisters *id)
308
+{
309
+ /*
310
+ * This function updates the pending bit in lpi pending table for
311
+ * the irq being activated or deactivated.
312
+ */
313
+ AddressSpace *as = &cs->gic->dma_as;
314
+ uint64_t lpipt_baddr;
315
+ bool ispend = false;
316
+ uint8_t pend;
317
+
318
+ /*
319
+ * get the bit value corresponding to this irq in the
320
+ * lpi pending table
321
+ */
322
+ lpipt_baddr = cs->gicr_pendbaser & R_GICR_PENDBASER_PHYADDR_MASK;
323
+
324
+ address_space_read(as, lpipt_baddr + ((irq / 8) * sizeof(pend)),
325
+ MEMTXATTRS_UNSPECIFIED, &pend, sizeof(pend));
326
+
327
+ ispend = extract32(pend, irq % 8, 1);
328
+
329
+ /* no change in the value of pending bit, return */
330
+ if (ispend == level) {
331
+ return;
332
+ }
333
+ pend = deposit32(pend, irq % 8, 1, level ? 1 : 0);
334
+
335
+ address_space_write(as, lpipt_baddr + ((irq / 8) * sizeof(pend)),
336
+ MEMTXATTRS_UNSPECIFIED, &pend, sizeof(pend));
337
+
338
+ /*
339
+ * check if this LPI is better than the current hpplpi, if yes
340
+ * just set hpplpi.prio and .irq without doing a full rescan
341
+ */
342
+ if (level) {
343
+ gicv3_redist_check_lpi_priority(cs, irq);
344
+ } else {
345
+ if (irq == cs->hpplpi.irq) {
346
+ gicv3_redist_update_lpi(cs);
347
+ }
348
+ }
349
+}
350
+
351
+void gicv3_redist_process_lpi(GICv3CPUState *cs, int irq, int level)
352
+{
353
+ uint64_t idbits;
354
+
355
+ idbits = MIN(FIELD_EX64(cs->gicr_propbaser, GICR_PROPBASER, IDBITS),
356
+ GICD_TYPER_IDBITS);
357
+
358
+ if (!(cs->gicr_ctlr & GICR_CTLR_ENABLE_LPIS) || !cs->gicr_propbaser ||
359
+ !cs->gicr_pendbaser || (irq > (1ULL << (idbits + 1)) - 1) ||
360
+ irq < GICV3_LPI_INTID_START) {
361
+ return;
362
+ }
363
+
364
+ /* set/clear the pending bit for this irq */
365
+ gicv3_redist_lpi_pending(cs, irq, level);
366
+
367
+ gicv3_redist_update(cs);
368
+}
369
+
370
void gicv3_redist_set_irq(GICv3CPUState *cs, int irq, int level)
371
{
33
{
372
/* Update redistributor state for a change in an external PPI input line */
34
return FIELD_EX64(id->id_aa64mmfr1, ID_AA64MMFR1, XNX) != 0;
373
--
35
--
374
2.20.1
36
2.25.1
375
376
diff view generated by jsdifflib
1
From: Shashi Mallela <shashi.mallela@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Updated expected IORT files applicable with latest GICv3
4
ITS changes.
5
6
Full diff of new file disassembly:
7
8
/*
9
* Intel ACPI Component Architecture
10
* AML/ASL+ Disassembler version 20180629 (64-bit version)
11
* Copyright (c) 2000 - 2018 Intel Corporation
12
*
13
* Disassembly of tests/data/acpi/virt/IORT.pxb, Tue Jun 29 17:35:38 2021
14
*
15
* ACPI Data Table [IORT]
16
*
17
* Format: [HexOffset DecimalOffset ByteLength] FieldName : FieldValue
18
*/
19
20
[000h 0000 4] Signature : "IORT" [IO Remapping Table]
21
[004h 0004 4] Table Length : 0000007C
22
[008h 0008 1] Revision : 00
23
[009h 0009 1] Checksum : 07
24
[00Ah 0010 6] Oem ID : "BOCHS "
25
[010h 0016 8] Oem Table ID : "BXPC "
26
[018h 0024 4] Oem Revision : 00000001
27
[01Ch 0028 4] Asl Compiler ID : "BXPC"
28
[020h 0032 4] Asl Compiler Revision : 00000001
29
30
[024h 0036 4] Node Count : 00000002
31
[028h 0040 4] Node Offset : 00000030
32
[02Ch 0044 4] Reserved : 00000000
33
34
[030h 0048 1] Type : 00
35
[031h 0049 2] Length : 0018
36
[033h 0051 1] Revision : 00
37
[034h 0052 4] Reserved : 00000000
38
[038h 0056 4] Mapping Count : 00000000
39
[03Ch 0060 4] Mapping Offset : 00000000
40
41
[040h 0064 4] ItsCount : 00000001
42
[044h 0068 4] Identifiers : 00000000
43
44
[048h 0072 1] Type : 02
45
[049h 0073 2] Length : 0034
46
[04Bh 0075 1] Revision : 00
47
[04Ch 0076 4] Reserved : 00000000
48
[050h 0080 4] Mapping Count : 00000001
49
[054h 0084 4] Mapping Offset : 00000020
50
51
[058h 0088 8] Memory Properties : [IORT Memory Access Properties]
52
[058h 0088 4] Cache Coherency : 00000001
53
[05Ch 0092 1] Hints (decoded below) : 00
54
Transient : 0
55
Write Allocate : 0
56
Read Allocate : 0
57
Override : 0
58
[05Dh 0093 2] Reserved : 0000
59
[05Fh 0095 1] Memory Flags (decoded below) : 03
60
Coherency : 1
61
Device Attribute : 1
62
[060h 0096 4] ATS Attribute : 00000000
63
[064h 0100 4] PCI Segment Number : 00000000
64
[068h 0104 1] Memory Size Limit : 00
65
[069h 0105 3] Reserved : 000000
66
67
[068h 0104 4] Input base : 00000000
68
[06Ch 0108 4] ID Count : 0000FFFF
69
[070h 0112 4] Output Base : 00000000
70
[074h 0116 4] Output Reference : 00000030
71
[078h 0120 4] Flags (decoded below) : 00000000
72
Single Mapping : 0
73
74
Raw Table Data: Length 124 (0x7C)
75
76
0000: 49 4F 52 54 7C 00 00 00 00 07 42 4F 43 48 53 20 // IORT|.....BOCHS
77
0010: 42 58 50 43 20 20 20 20 01 00 00 00 42 58 50 43 // BXPC ....BXPC
78
0020: 01 00 00 00 02 00 00 00 30 00 00 00 00 00 00 00 // ........0.......
79
0030: 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // ................
80
0040: 01 00 00 00 00 00 00 00 02 34 00 00 00 00 00 00 // .........4......
81
0050: 01 00 00 00 20 00 00 00 01 00 00 00 00 00 00 03 // .... ...........
82
0060: 00 00 00 00 00 00 00 00 00 00 00 00 FF FF 00 00 // ................
83
0070: 00 00 00 00 30 00 00 00 00 00 00 00 // ....0.......
84
85
Signed-off-by: Shashi Mallela <shashi.mallela@linaro.org>
86
Acked-by: Igor Mammedov <imammedo@redhat.com>
87
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
3
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
88
Message-id: 20210910143951.92242-10-shashi.mallela@linaro.org
4
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
5
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
6
Message-id: 20221024051851.3074715-5-richard.henderson@linaro.org
89
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
90
---
8
---
91
tests/qtest/bios-tables-test-allowed-diff.h | 4 ----
9
target/arm/internals.h | 2 ++
92
tests/data/acpi/virt/IORT | Bin 0 -> 124 bytes
10
target/arm/helper.c | 8 +++++++-
93
tests/data/acpi/virt/IORT.memhp | Bin 0 -> 124 bytes
11
2 files changed, 9 insertions(+), 1 deletion(-)
94
tests/data/acpi/virt/IORT.numamem | Bin 0 -> 124 bytes
95
tests/data/acpi/virt/IORT.pxb | Bin 0 -> 124 bytes
96
5 files changed, 4 deletions(-)
97
12
98
diff --git a/tests/qtest/bios-tables-test-allowed-diff.h b/tests/qtest/bios-tables-test-allowed-diff.h
13
diff --git a/target/arm/internals.h b/target/arm/internals.h
99
index XXXXXXX..XXXXXXX 100644
14
index XXXXXXX..XXXXXXX 100644
100
--- a/tests/qtest/bios-tables-test-allowed-diff.h
15
--- a/target/arm/internals.h
101
+++ b/tests/qtest/bios-tables-test-allowed-diff.h
16
+++ b/target/arm/internals.h
102
@@ -1,5 +1 @@
17
@@ -XXX,XX +XXX,XX @@ typedef struct ARMVAParameters {
103
/* List of comma-separated changed AML files to ignore */
18
bool hpd : 1;
104
-"tests/data/acpi/virt/IORT",
19
bool tsz_oob : 1; /* tsz has been clamped to legal range */
105
-"tests/data/acpi/virt/IORT.memhp",
20
bool ds : 1;
106
-"tests/data/acpi/virt/IORT.numamem",
21
+ bool ha : 1;
107
-"tests/data/acpi/virt/IORT.pxb",
22
+ bool hd : 1;
108
diff --git a/tests/data/acpi/virt/IORT b/tests/data/acpi/virt/IORT
23
ARMGranuleSize gran : 2;
24
} ARMVAParameters;
25
26
diff --git a/target/arm/helper.c b/target/arm/helper.c
109
index XXXXXXX..XXXXXXX 100644
27
index XXXXXXX..XXXXXXX 100644
110
GIT binary patch
28
--- a/target/arm/helper.c
111
literal 124
29
+++ b/target/arm/helper.c
112
zcmebD4+^Pa00MR=e`k+i1*eDrX9XZ&1PX!JAesq?4S*O7Bw!2(4Uz`|CKCt^;wu0#
30
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
113
QRGb+i3L*dhhtM#y0PN=p0RR91
31
ARMMMUIdx mmu_idx, bool data)
114
32
{
115
literal 0
33
uint64_t tcr = regime_tcr(env, mmu_idx);
116
HcmV?d00001
34
- bool epd, hpd, tsz_oob, ds;
117
35
+ bool epd, hpd, tsz_oob, ds, ha, hd;
118
diff --git a/tests/data/acpi/virt/IORT.memhp b/tests/data/acpi/virt/IORT.memhp
36
int select, tsz, tbi, max_tsz, min_tsz, ps, sh;
119
index XXXXXXX..XXXXXXX 100644
37
ARMGranuleSize gran;
120
GIT binary patch
38
ARMCPU *cpu = env_archcpu(env);
121
literal 124
39
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
122
zcmebD4+^Pa00MR=e`k+i1*eDrX9XZ&1PX!JAesq?4S*O7Bw!2(4Uz`|CKCt^;wu0#
40
epd = false;
123
QRGb+i3L*dhhtM#y0PN=p0RR91
41
sh = extract32(tcr, 12, 2);
124
42
ps = extract32(tcr, 16, 3);
125
literal 0
43
+ ha = extract32(tcr, 21, 1) && cpu_isar_feature(aa64_hafs, cpu);
126
HcmV?d00001
44
+ hd = extract32(tcr, 22, 1) && cpu_isar_feature(aa64_hdbs, cpu);
127
45
ds = extract64(tcr, 32, 1);
128
diff --git a/tests/data/acpi/virt/IORT.numamem b/tests/data/acpi/virt/IORT.numamem
46
} else {
129
index XXXXXXX..XXXXXXX 100644
47
bool e0pd;
130
GIT binary patch
48
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
131
literal 124
49
e0pd = extract64(tcr, 56, 1);
132
zcmebD4+^Pa00MR=e`k+i1*eDrX9XZ&1PX!JAesq?4S*O7Bw!2(4Uz`|CKCt^;wu0#
50
}
133
QRGb+i3L*dhhtM#y0PN=p0RR91
51
ps = extract64(tcr, 32, 3);
134
52
+ ha = extract64(tcr, 39, 1) && cpu_isar_feature(aa64_hafs, cpu);
135
literal 0
53
+ hd = extract64(tcr, 40, 1) && cpu_isar_feature(aa64_hdbs, cpu);
136
HcmV?d00001
54
ds = extract64(tcr, 59, 1);
137
55
138
diff --git a/tests/data/acpi/virt/IORT.pxb b/tests/data/acpi/virt/IORT.pxb
56
if (e0pd && cpu_isar_feature(aa64_e0pd, cpu) &&
139
index XXXXXXX..XXXXXXX 100644
57
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
140
GIT binary patch
58
.hpd = hpd,
141
literal 124
59
.tsz_oob = tsz_oob,
142
zcmebD4+^Pa00MR=e`k+i1*eDrX9XZ&1PX!JAesq?4S*O7Bw!2(4Uz`|CKCt^;wu0#
60
.ds = ds,
143
QRGb+i3L*dhhtM#y0PN=p0RR91
61
+ .ha = ha,
144
62
+ .hd = ha && hd,
145
literal 0
63
.gran = gran,
146
HcmV?d00001
64
};
147
65
}
148
--
66
--
149
2.20.1
67
2.25.1
150
68
151
69
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
It is confusing to have different exits from translation
3
Separate S1 translation from the actual lookup.
4
for various conditions in separate functions.
4
Will enable lpae hardware updates.
5
6
Merge disas_a64_insn into its only caller. Standardize
7
on the "s" name for the DisasContext, as the code from
8
disas_a64_insn had more instances.
9
5
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
12
Message-id: 20210821195958.41312-3-richard.henderson@linaro.org
8
Message-id: 20221024051851.3074715-6-richard.henderson@linaro.org
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
---
10
---
15
target/arm/translate-a64.c | 224 ++++++++++++++++++-------------------
11
target/arm/ptw.c | 41 ++++++++++++++++++++++-------------------
16
1 file changed, 109 insertions(+), 115 deletions(-)
12
1 file changed, 22 insertions(+), 19 deletions(-)
17
13
18
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
14
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
19
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
20
--- a/target/arm/translate-a64.c
16
--- a/target/arm/ptw.c
21
+++ b/target/arm/translate-a64.c
17
+++ b/target/arm/ptw.c
22
@@ -XXX,XX +XXX,XX @@ static bool btype_destination_ok(uint32_t insn, bool bt, int btype)
18
@@ -XXX,XX +XXX,XX @@ static bool S1_ptw_translate(CPUARMState *env, S1Translate *ptw,
23
return false;
24
}
19
}
25
20
26
-/* C3.1 A64 instruction index by encoding */
21
/* All loads done in the course of a page table walk go through here. */
27
-static void disas_a64_insn(CPUARMState *env, DisasContext *s)
22
-static uint32_t arm_ldl_ptw(CPUARMState *env, S1Translate *ptw, hwaddr addr,
28
-{
23
+static uint32_t arm_ldl_ptw(CPUARMState *env, S1Translate *ptw,
29
- uint32_t insn;
24
ARMMMUFaultInfo *fi)
30
-
25
{
31
- s->pc_curr = s->base.pc_next;
26
CPUState *cs = env_cpu(env);
32
- insn = arm_ldl_code(env, s->base.pc_next, s->sctlr_b);
27
uint32_t data;
33
- s->insn = insn;
28
34
- s->base.pc_next += 4;
29
- if (!S1_ptw_translate(env, ptw, addr, fi)) {
35
-
30
- /* Failure. */
36
- s->fp_access_checked = false;
31
- assert(fi->s1ptw);
37
- s->sve_access_checked = false;
32
- return 0;
38
-
39
- if (s->pstate_il) {
40
- /*
41
- * Illegal execution state. This has priority over BTI
42
- * exceptions, but comes after instruction abort exceptions.
43
- */
44
- gen_exception_insn(s, s->pc_curr, EXCP_UDEF,
45
- syn_illegalstate(), default_exception_el(s));
46
- return;
47
- }
33
- }
48
-
34
-
49
- if (dc_isar_feature(aa64_bti, s)) {
35
if (likely(ptw->out_host)) {
50
- if (s->base.num_insns == 1) {
36
/* Page tables are in RAM, and we have the host address. */
51
- /*
37
if (ptw->out_be) {
52
- * At the first insn of the TB, compute s->guarded_page.
38
@@ -XXX,XX +XXX,XX @@ static uint32_t arm_ldl_ptw(CPUARMState *env, S1Translate *ptw, hwaddr addr,
53
- * We delayed computing this until successfully reading
39
return data;
54
- * the first insn of the TB, above. This (mostly) ensures
40
}
55
- * that the softmmu tlb entry has been populated, and the
41
56
- * page table GP bit is available.
42
-static uint64_t arm_ldq_ptw(CPUARMState *env, S1Translate *ptw, hwaddr addr,
57
- *
43
+static uint64_t arm_ldq_ptw(CPUARMState *env, S1Translate *ptw,
58
- * Note that we need to compute this even if btype == 0,
44
ARMMMUFaultInfo *fi)
59
- * because this value is used for BR instructions later
45
{
60
- * where ENV is not available.
46
CPUState *cs = env_cpu(env);
61
- */
47
uint64_t data;
62
- s->guarded_page = is_guarded_page(env, s);
48
63
-
49
- if (!S1_ptw_translate(env, ptw, addr, fi)) {
64
- /* First insn can have btype set to non-zero. */
50
- /* Failure. */
65
- tcg_debug_assert(s->btype >= 0);
51
- assert(fi->s1ptw);
66
-
52
- return 0;
67
- /*
68
- * Note that the Branch Target Exception has fairly high
69
- * priority -- below debugging exceptions but above most
70
- * everything else. This allows us to handle this now
71
- * instead of waiting until the insn is otherwise decoded.
72
- */
73
- if (s->btype != 0
74
- && s->guarded_page
75
- && !btype_destination_ok(insn, s->bt, s->btype)) {
76
- gen_exception_insn(s, s->pc_curr, EXCP_UDEF,
77
- syn_btitrap(s->btype),
78
- default_exception_el(s));
79
- return;
80
- }
81
- } else {
82
- /* Not the first insn: btype must be 0. */
83
- tcg_debug_assert(s->btype == 0);
84
- }
85
- }
53
- }
86
-
54
-
87
- switch (extract32(insn, 25, 4)) {
55
if (likely(ptw->out_host)) {
88
- case 0x0: case 0x1: case 0x3: /* UNALLOCATED */
56
/* Page tables are in RAM, and we have the host address. */
89
- unallocated_encoding(s);
57
if (ptw->out_be) {
90
- break;
58
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v5(CPUARMState *env, S1Translate *ptw,
91
- case 0x2:
59
fi->type = ARMFault_Translation;
92
- if (!dc_isar_feature(aa64_sve, s) || !disas_sve(s, insn)) {
60
goto do_fault;
93
- unallocated_encoding(s);
94
- }
95
- break;
96
- case 0x8: case 0x9: /* Data processing - immediate */
97
- disas_data_proc_imm(s, insn);
98
- break;
99
- case 0xa: case 0xb: /* Branch, exception generation and system insns */
100
- disas_b_exc_sys(s, insn);
101
- break;
102
- case 0x4:
103
- case 0x6:
104
- case 0xc:
105
- case 0xe: /* Loads and stores */
106
- disas_ldst(s, insn);
107
- break;
108
- case 0x5:
109
- case 0xd: /* Data processing - register */
110
- disas_data_proc_reg(s, insn);
111
- break;
112
- case 0x7:
113
- case 0xf: /* Data processing - SIMD and floating point */
114
- disas_data_proc_simd_fp(s, insn);
115
- break;
116
- default:
117
- assert(FALSE); /* all 15 cases should be handled above */
118
- break;
119
- }
120
-
121
- /* if we allocated any temporaries, free them here */
122
- free_tmp_a64(s);
123
-
124
- /*
125
- * After execution of most insns, btype is reset to 0.
126
- * Note that we set btype == -1 when the insn sets btype.
127
- */
128
- if (s->btype > 0 && s->base.is_jmp != DISAS_NORETURN) {
129
- reset_btype(s);
130
- }
131
-}
132
-
133
static void aarch64_tr_init_disas_context(DisasContextBase *dcbase,
134
CPUState *cpu)
135
{
136
@@ -XXX,XX +XXX,XX @@ static void aarch64_tr_insn_start(DisasContextBase *dcbase, CPUState *cpu)
137
138
static void aarch64_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu)
139
{
140
- DisasContext *dc = container_of(dcbase, DisasContext, base);
141
+ DisasContext *s = container_of(dcbase, DisasContext, base);
142
CPUARMState *env = cpu->env_ptr;
143
+ uint32_t insn;
144
145
- if (dc->ss_active && !dc->pstate_ss) {
146
+ if (s->ss_active && !s->pstate_ss) {
147
/* Singlestep state is Active-pending.
148
* If we're in this state at the start of a TB then either
149
* a) we just took an exception to an EL which is being debugged
150
@@ -XXX,XX +XXX,XX @@ static void aarch64_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu)
151
* "did not step an insn" case, and so the syndrome ISV and EX
152
* bits should be zero.
153
*/
154
- assert(dc->base.num_insns == 1);
155
- gen_swstep_exception(dc, 0, 0);
156
- dc->base.is_jmp = DISAS_NORETURN;
157
- } else {
158
- disas_a64_insn(env, dc);
159
+ assert(s->base.num_insns == 1);
160
+ gen_swstep_exception(s, 0, 0);
161
+ s->base.is_jmp = DISAS_NORETURN;
162
+ return;
163
}
61
}
164
62
- desc = arm_ldl_ptw(env, ptw, table, fi);
165
- translator_loop_temp_check(&dc->base);
63
+ if (!S1_ptw_translate(env, ptw, table, fi)) {
166
+ s->pc_curr = s->base.pc_next;
64
+ goto do_fault;
167
+ insn = arm_ldl_code(env, s->base.pc_next, s->sctlr_b);
168
+ s->insn = insn;
169
+ s->base.pc_next += 4;
170
+
171
+ s->fp_access_checked = false;
172
+ s->sve_access_checked = false;
173
+
174
+ if (s->pstate_il) {
175
+ /*
176
+ * Illegal execution state. This has priority over BTI
177
+ * exceptions, but comes after instruction abort exceptions.
178
+ */
179
+ gen_exception_insn(s, s->pc_curr, EXCP_UDEF,
180
+ syn_illegalstate(), default_exception_el(s));
181
+ return;
182
+ }
65
+ }
183
+
66
+ desc = arm_ldl_ptw(env, ptw, fi);
184
+ if (dc_isar_feature(aa64_bti, s)) {
67
if (fi->type != ARMFault_None) {
185
+ if (s->base.num_insns == 1) {
68
goto do_fault;
186
+ /*
69
}
187
+ * At the first insn of the TB, compute s->guarded_page.
70
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v5(CPUARMState *env, S1Translate *ptw,
188
+ * We delayed computing this until successfully reading
71
/* Fine pagetable. */
189
+ * the first insn of the TB, above. This (mostly) ensures
72
table = (desc & 0xfffff000) | ((address >> 8) & 0xffc);
190
+ * that the softmmu tlb entry has been populated, and the
73
}
191
+ * page table GP bit is available.
74
- desc = arm_ldl_ptw(env, ptw, table, fi);
192
+ *
75
+ if (!S1_ptw_translate(env, ptw, table, fi)) {
193
+ * Note that we need to compute this even if btype == 0,
76
+ goto do_fault;
194
+ * because this value is used for BR instructions later
195
+ * where ENV is not available.
196
+ */
197
+ s->guarded_page = is_guarded_page(env, s);
198
+
199
+ /* First insn can have btype set to non-zero. */
200
+ tcg_debug_assert(s->btype >= 0);
201
+
202
+ /*
203
+ * Note that the Branch Target Exception has fairly high
204
+ * priority -- below debugging exceptions but above most
205
+ * everything else. This allows us to handle this now
206
+ * instead of waiting until the insn is otherwise decoded.
207
+ */
208
+ if (s->btype != 0
209
+ && s->guarded_page
210
+ && !btype_destination_ok(insn, s->bt, s->btype)) {
211
+ gen_exception_insn(s, s->pc_curr, EXCP_UDEF,
212
+ syn_btitrap(s->btype),
213
+ default_exception_el(s));
214
+ return;
215
+ }
216
+ } else {
217
+ /* Not the first insn: btype must be 0. */
218
+ tcg_debug_assert(s->btype == 0);
219
+ }
77
+ }
78
+ desc = arm_ldl_ptw(env, ptw, fi);
79
if (fi->type != ARMFault_None) {
80
goto do_fault;
81
}
82
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v6(CPUARMState *env, S1Translate *ptw,
83
fi->type = ARMFault_Translation;
84
goto do_fault;
85
}
86
- desc = arm_ldl_ptw(env, ptw, table, fi);
87
+ if (!S1_ptw_translate(env, ptw, table, fi)) {
88
+ goto do_fault;
220
+ }
89
+ }
221
+
90
+ desc = arm_ldl_ptw(env, ptw, fi);
222
+ switch (extract32(insn, 25, 4)) {
91
if (fi->type != ARMFault_None) {
223
+ case 0x0: case 0x1: case 0x3: /* UNALLOCATED */
92
goto do_fault;
224
+ unallocated_encoding(s);
93
}
225
+ break;
94
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v6(CPUARMState *env, S1Translate *ptw,
226
+ case 0x2:
95
ns = extract32(desc, 3, 1);
227
+ if (!dc_isar_feature(aa64_sve, s) || !disas_sve(s, insn)) {
96
/* Lookup l2 entry. */
228
+ unallocated_encoding(s);
97
table = (desc & 0xfffffc00) | ((address >> 10) & 0x3fc);
98
- desc = arm_ldl_ptw(env, ptw, table, fi);
99
+ if (!S1_ptw_translate(env, ptw, table, fi)) {
100
+ goto do_fault;
229
+ }
101
+ }
230
+ break;
102
+ desc = arm_ldl_ptw(env, ptw, fi);
231
+ case 0x8: case 0x9: /* Data processing - immediate */
103
if (fi->type != ARMFault_None) {
232
+ disas_data_proc_imm(s, insn);
104
goto do_fault;
233
+ break;
105
}
234
+ case 0xa: case 0xb: /* Branch, exception generation and system insns */
106
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
235
+ disas_b_exc_sys(s, insn);
107
ptw->in_ptw_idx &= ~1;
236
+ break;
108
ptw->in_secure = false;
237
+ case 0x4:
109
}
238
+ case 0x6:
110
- descriptor = arm_ldq_ptw(env, ptw, descaddr, fi);
239
+ case 0xc:
111
+ if (!S1_ptw_translate(env, ptw, descaddr, fi)) {
240
+ case 0xe: /* Loads and stores */
112
+ goto do_fault;
241
+ disas_ldst(s, insn);
113
+ }
242
+ break;
114
+ descriptor = arm_ldq_ptw(env, ptw, fi);
243
+ case 0x5:
115
if (fi->type != ARMFault_None) {
244
+ case 0xd: /* Data processing - register */
116
goto do_fault;
245
+ disas_data_proc_reg(s, insn);
117
}
246
+ break;
247
+ case 0x7:
248
+ case 0xf: /* Data processing - SIMD and floating point */
249
+ disas_data_proc_simd_fp(s, insn);
250
+ break;
251
+ default:
252
+ assert(FALSE); /* all 15 cases should be handled above */
253
+ break;
254
+ }
255
+
256
+ /* if we allocated any temporaries, free them here */
257
+ free_tmp_a64(s);
258
+
259
+ /*
260
+ * After execution of most insns, btype is reset to 0.
261
+ * Note that we set btype == -1 when the insn sets btype.
262
+ */
263
+ if (s->btype > 0 && s->base.is_jmp != DISAS_NORETURN) {
264
+ reset_btype(s);
265
+ }
266
+
267
+ translator_loop_temp_check(&s->base);
268
}
269
270
static void aarch64_tr_tb_stop(DisasContextBase *dcbase, CPUState *cpu)
271
--
118
--
272
2.20.1
119
2.25.1
273
274
diff view generated by jsdifflib
1
From: Marc Zyngier <maz@kernel.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Although we probe for the IPA limits imposed by KVM (and the hardware)
3
This fault type is to be used with FEAT_HAFDBS when
4
when computing the memory map, we still use the old style '0' when
4
the guest enables hw updates, but places the tables
5
creating a scratch VM in kvm_arm_create_scratch_host_vcpu().
5
in memory where atomic updates are unsupported.
6
6
7
On systems that are severely IPA challenged (such as the Apple M1),
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
this results in a failure as KVM cannot use the default 40bit that
8
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
9
'0' represents.
9
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
10
10
Message-id: 20221024051851.3074715-7-richard.henderson@linaro.org
11
Instead, probe for the extension and use the reported IPA limit
12
if available.
13
14
Cc: Andrew Jones <drjones@redhat.com>
15
Cc: Eric Auger <eric.auger@redhat.com>
16
Cc: Peter Maydell <peter.maydell@linaro.org>
17
Signed-off-by: Marc Zyngier <maz@kernel.org>
18
Reviewed-by: Andrew Jones <drjones@redhat.com>
19
Message-id: 20210822144441.1290891-2-maz@kernel.org
20
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
21
---
12
---
22
target/arm/kvm.c | 7 ++++++-
13
target/arm/internals.h | 4 ++++
23
1 file changed, 6 insertions(+), 1 deletion(-)
14
1 file changed, 4 insertions(+)
24
15
25
diff --git a/target/arm/kvm.c b/target/arm/kvm.c
16
diff --git a/target/arm/internals.h b/target/arm/internals.h
26
index XXXXXXX..XXXXXXX 100644
17
index XXXXXXX..XXXXXXX 100644
27
--- a/target/arm/kvm.c
18
--- a/target/arm/internals.h
28
+++ b/target/arm/kvm.c
19
+++ b/target/arm/internals.h
29
@@ -XXX,XX +XXX,XX @@ bool kvm_arm_create_scratch_host_vcpu(const uint32_t *cpus_to_try,
20
@@ -XXX,XX +XXX,XX @@ typedef enum ARMFaultType {
30
struct kvm_vcpu_init *init)
21
ARMFault_AsyncExternal,
31
{
22
ARMFault_Debug,
32
int ret = 0, kvmfd = -1, vmfd = -1, cpufd = -1;
23
ARMFault_TLBConflict,
33
+ int max_vm_pa_size;
24
+ ARMFault_UnsuppAtomicUpdate,
34
25
ARMFault_Lockdown,
35
kvmfd = qemu_open_old("/dev/kvm", O_RDWR);
26
ARMFault_Exclusive,
36
if (kvmfd < 0) {
27
ARMFault_ICacheMaint,
37
goto err;
28
@@ -XXX,XX +XXX,XX @@ static inline uint32_t arm_fi_to_lfsc(ARMMMUFaultInfo *fi)
38
}
29
case ARMFault_TLBConflict:
39
- vmfd = ioctl(kvmfd, KVM_CREATE_VM, 0);
30
fsc = 0x30;
40
+ max_vm_pa_size = ioctl(kvmfd, KVM_CHECK_EXTENSION, KVM_CAP_ARM_VM_IPA_SIZE);
31
break;
41
+ if (max_vm_pa_size < 0) {
32
+ case ARMFault_UnsuppAtomicUpdate:
42
+ max_vm_pa_size = 0;
33
+ fsc = 0x31;
43
+ }
34
+ break;
44
+ vmfd = ioctl(kvmfd, KVM_CREATE_VM, max_vm_pa_size);
35
case ARMFault_Lockdown:
45
if (vmfd < 0) {
36
fsc = 0x34;
46
goto err;
37
break;
47
}
48
--
38
--
49
2.20.1
39
2.25.1
50
40
51
41
diff view generated by jsdifflib
1
From: Shashi Mallela <shashi.mallela@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Added functionality to trigger ITS command queue processing on
3
The unconditional loop was used both to iterate over levels
4
write to CWRITE register and process each command queue entry to
4
and to control parsing of attributes. Use an explicit goto
5
identify the command type and handle commands like MAPD,MAPC,SYNC.
5
in both cases.
6
6
7
Signed-off-by: Shashi Mallela <shashi.mallela@linaro.org>
7
While this appears less clean for iterating over levels, we
8
will need to jump back into the middle of this loop for
9
atomic updates, which is even uglier.
10
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Reviewed-by: Eric Auger <eric.auger@redhat.com>
12
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
10
Tested-by: Neil Armstrong <narmstrong@baylibre.com>
13
Message-id: 20221024051851.3074715-8-richard.henderson@linaro.org
11
Message-id: 20210910143951.92242-4-shashi.mallela@linaro.org
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
---
15
---
14
hw/intc/gicv3_internal.h | 40 +++++
16
target/arm/ptw.c | 192 +++++++++++++++++++++++------------------------
15
hw/intc/arm_gicv3_its.c | 319 +++++++++++++++++++++++++++++++++++++++
17
1 file changed, 96 insertions(+), 96 deletions(-)
16
2 files changed, 359 insertions(+)
18
17
19
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
18
diff --git a/hw/intc/gicv3_internal.h b/hw/intc/gicv3_internal.h
19
index XXXXXXX..XXXXXXX 100644
20
index XXXXXXX..XXXXXXX 100644
20
--- a/hw/intc/gicv3_internal.h
21
--- a/target/arm/ptw.c
21
+++ b/hw/intc/gicv3_internal.h
22
+++ b/target/arm/ptw.c
22
@@ -XXX,XX +XXX,XX @@ FIELD(GITS_TYPER, CIL, 36, 1)
23
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
23
#define L1TABLE_ENTRY_SIZE 8
24
uint64_t descaddrmask;
24
25
bool aarch64 = arm_el_is_aa64(env, el);
25
#define GITS_CMDQ_ENTRY_SIZE 32
26
bool guarded = false;
26
+#define NUM_BYTES_IN_DW 8
27
+ uint64_t descriptor;
27
+
28
+ bool nstable;
28
+#define CMD_MASK 0xff
29
29
+
30
/* TODO: This code does not support shareability levels. */
30
+/* ITS Commands */
31
if (aarch64) {
31
+#define GITS_CMD_CLEAR 0x04
32
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
32
+#define GITS_CMD_DISCARD 0x0F
33
* bits at each step.
33
+#define GITS_CMD_INT 0x03
34
*/
34
+#define GITS_CMD_MAPC 0x09
35
tableattrs = is_secure ? 0 : (1 << 4);
35
+#define GITS_CMD_MAPD 0x08
36
- for (;;) {
36
+#define GITS_CMD_MAPI 0x0B
37
- uint64_t descriptor;
37
+#define GITS_CMD_MAPTI 0x0A
38
- bool nstable;
38
+#define GITS_CMD_INV 0x0C
39
-
39
+#define GITS_CMD_INVALL 0x0D
40
- descaddr |= (address >> (stride * (4 - level))) & indexmask;
40
+#define GITS_CMD_SYNC 0x05
41
- descaddr &= ~7ULL;
41
+
42
- nstable = extract32(tableattrs, 4, 1);
42
+/* MAPC command fields */
43
- if (!nstable) {
43
+#define ICID_LENGTH 16
44
- /*
44
+#define ICID_MASK ((1U << ICID_LENGTH) - 1)
45
- * Stage2_S -> Stage2 or Phys_S -> Phys_NS
45
+FIELD(MAPC, RDBASE, 16, 32)
46
- * Assert that the non-secure idx are even, and relative order.
46
+
47
- */
47
+#define RDBASE_PROCNUM_LENGTH 16
48
- QEMU_BUILD_BUG_ON((ARMMMUIdx_Phys_NS & 1) != 0);
48
+#define RDBASE_PROCNUM_MASK ((1ULL << RDBASE_PROCNUM_LENGTH) - 1)
49
- QEMU_BUILD_BUG_ON((ARMMMUIdx_Stage2 & 1) != 0);
49
+
50
- QEMU_BUILD_BUG_ON(ARMMMUIdx_Phys_NS + 1 != ARMMMUIdx_Phys_S);
50
+/* MAPD command fields */
51
- QEMU_BUILD_BUG_ON(ARMMMUIdx_Stage2 + 1 != ARMMMUIdx_Stage2_S);
51
+#define ITTADDR_LENGTH 44
52
- ptw->in_ptw_idx &= ~1;
52
+#define ITTADDR_SHIFT 8
53
- ptw->in_secure = false;
53
+#define ITTADDR_MASK MAKE_64BIT_MASK(ITTADDR_SHIFT, ITTADDR_LENGTH)
54
- }
54
+#define SIZE_MASK 0x1f
55
- if (!S1_ptw_translate(env, ptw, descaddr, fi)) {
55
+
56
- goto do_fault;
56
+#define DEVID_SHIFT 32
57
- }
57
+#define DEVID_MASK MAKE_64BIT_MASK(32, 32)
58
- descriptor = arm_ldq_ptw(env, ptw, fi);
58
+
59
- if (fi->type != ARMFault_None) {
59
+#define VALID_SHIFT 63
60
- goto do_fault;
60
+#define CMD_FIELD_VALID_MASK (1ULL << VALID_SHIFT)
61
- }
61
+#define L2_TABLE_VALID_MASK CMD_FIELD_VALID_MASK
62
-
62
+#define TABLE_ENTRY_VALID_MASK (1ULL << 0)
63
- if (!(descriptor & 1) ||
63
64
- (!(descriptor & 2) && (level == 3))) {
64
/**
65
- /* Invalid, or the Reserved level 3 encoding */
65
* Default features advertised by this version of ITS
66
- goto do_fault;
66
@@ -XXX,XX +XXX,XX @@ FIELD(GITS_TYPER, CIL, 36, 1)
67
- }
67
* Valid = 1 bit,ITTAddr = 44 bits,Size = 5 bits
68
-
68
*/
69
- descaddr = descriptor & descaddrmask;
69
#define GITS_DTE_SIZE (0x8ULL)
70
70
+#define GITS_DTE_ITTADDR_SHIFT 6
71
+ next_level:
71
+#define GITS_DTE_ITTADDR_MASK MAKE_64BIT_MASK(GITS_DTE_ITTADDR_SHIFT, \
72
+ descaddr |= (address >> (stride * (4 - level))) & indexmask;
72
+ ITTADDR_LENGTH)
73
+ descaddr &= ~7ULL;
73
74
+ nstable = extract32(tableattrs, 4, 1);
74
/*
75
+ if (!nstable) {
75
* 8 bytes Collection Table Entry size
76
/*
76
diff --git a/hw/intc/arm_gicv3_its.c b/hw/intc/arm_gicv3_its.c
77
- * For FEAT_LPA and PS=6, bits [51:48] of descaddr are in [15:12]
77
index XXXXXXX..XXXXXXX 100644
78
- * of descriptor. For FEAT_LPA2 and effective DS, bits [51:50] of
78
--- a/hw/intc/arm_gicv3_its.c
79
- * descaddr are in [9:8]. Otherwise, if descaddr is out of range,
79
+++ b/hw/intc/arm_gicv3_its.c
80
- * raise AddressSizeFault.
80
@@ -XXX,XX +XXX,XX @@ static uint64_t baser_base_addr(uint64_t value, uint32_t page_sz)
81
+ * Stage2_S -> Stage2 or Phys_S -> Phys_NS
81
return result;
82
+ * Assert that the non-secure idx are even, and relative order.
82
}
83
*/
83
84
- if (outputsize > 48) {
84
+static bool update_cte(GICv3ITSState *s, uint16_t icid, bool valid,
85
- if (param.ds) {
85
+ uint64_t rdbase)
86
- descaddr |= extract64(descriptor, 8, 2) << 50;
86
+{
87
- } else {
87
+ AddressSpace *as = &s->gicv3->dma_as;
88
- descaddr |= extract64(descriptor, 12, 4) << 48;
88
+ uint64_t value;
89
- }
89
+ uint64_t l2t_addr;
90
- } else if (descaddr >> outputsize) {
90
+ bool valid_l2t;
91
- fault_type = ARMFault_AddressSize;
91
+ uint32_t l2t_id;
92
- goto do_fault;
92
+ uint32_t max_l2_entries;
93
- }
93
+ uint64_t cte = 0;
94
-
94
+ MemTxResult res = MEMTX_OK;
95
- if ((descriptor & 2) && (level < 3)) {
95
+
96
- /*
96
+ if (!s->ct.valid) {
97
- * Table entry. The top five bits are attributes which may
97
+ return true;
98
- * propagate down through lower levels of the table (and
98
+ }
99
- * which are all arranged so that 0 means "no effect", so
99
+
100
- * we can gather them up by ORing in the bits at each level).
100
+ if (valid) {
101
- */
101
+ /* add mapping entry to collection table */
102
- tableattrs |= extract64(descriptor, 59, 5);
102
+ cte = (valid & TABLE_ENTRY_VALID_MASK) | (rdbase << 1ULL);
103
- level++;
103
+ }
104
- indexmask = indexmask_grainsize;
105
- continue;
106
- }
107
- /*
108
- * Block entry at level 1 or 2, or page entry at level 3.
109
- * These are basically the same thing, although the number
110
- * of bits we pull in from the vaddr varies. Note that although
111
- * descaddrmask masks enough of the low bits of the descriptor
112
- * to give a correct page or table address, the address field
113
- * in a block descriptor is smaller; so we need to explicitly
114
- * clear the lower bits here before ORing in the low vaddr bits.
115
- */
116
- page_size = (1ULL << ((stride * (4 - level)) + 3));
117
- descaddr &= ~(hwaddr)(page_size - 1);
118
- descaddr |= (address & (page_size - 1));
119
- /* Extract attributes from the descriptor */
120
- attrs = extract64(descriptor, 2, 10)
121
- | (extract64(descriptor, 52, 12) << 10);
122
-
123
- if (regime_is_stage2(mmu_idx)) {
124
- /* Stage 2 table descriptors do not include any attribute fields */
125
- break;
126
- }
127
- /* Merge in attributes from table descriptors */
128
- attrs |= nstable << 3; /* NS */
129
- guarded = extract64(descriptor, 50, 1); /* GP */
130
- if (param.hpd) {
131
- /* HPD disables all the table attributes except NSTable. */
132
- break;
133
- }
134
- attrs |= extract32(tableattrs, 0, 2) << 11; /* XN, PXN */
135
- /*
136
- * The sense of AP[1] vs APTable[0] is reversed, as APTable[0] == 1
137
- * means "force PL1 access only", which means forcing AP[1] to 0.
138
- */
139
- attrs &= ~(extract32(tableattrs, 2, 1) << 4); /* !APT[0] => AP[1] */
140
- attrs |= extract32(tableattrs, 3, 1) << 5; /* APT[1] => AP[2] */
141
- break;
142
+ QEMU_BUILD_BUG_ON((ARMMMUIdx_Phys_NS & 1) != 0);
143
+ QEMU_BUILD_BUG_ON((ARMMMUIdx_Stage2 & 1) != 0);
144
+ QEMU_BUILD_BUG_ON(ARMMMUIdx_Phys_NS + 1 != ARMMMUIdx_Phys_S);
145
+ QEMU_BUILD_BUG_ON(ARMMMUIdx_Stage2 + 1 != ARMMMUIdx_Stage2_S);
146
+ ptw->in_ptw_idx &= ~1;
147
+ ptw->in_secure = false;
148
}
149
+ if (!S1_ptw_translate(env, ptw, descaddr, fi)) {
150
+ goto do_fault;
151
+ }
152
+ descriptor = arm_ldq_ptw(env, ptw, fi);
153
+ if (fi->type != ARMFault_None) {
154
+ goto do_fault;
155
+ }
156
+
157
+ if (!(descriptor & 1) || (!(descriptor & 2) && (level == 3))) {
158
+ /* Invalid, or the Reserved level 3 encoding */
159
+ goto do_fault;
160
+ }
161
+
162
+ descaddr = descriptor & descaddrmask;
104
+
163
+
105
+ /*
164
+ /*
106
+ * The specification defines the format of level 1 entries of a
165
+ * For FEAT_LPA and PS=6, bits [51:48] of descaddr are in [15:12]
107
+ * 2-level table, but the format of level 2 entries and the format
166
+ * of descriptor. For FEAT_LPA2 and effective DS, bits [51:50] of
108
+ * of flat-mapped tables is IMPDEF.
167
+ * descaddr are in [9:8]. Otherwise, if descaddr is out of range,
168
+ * raise AddressSizeFault.
109
+ */
169
+ */
110
+ if (s->ct.indirect) {
170
+ if (outputsize > 48) {
111
+ l2t_id = icid / (s->ct.page_sz / L1TABLE_ENTRY_SIZE);
171
+ if (param.ds) {
112
+
172
+ descaddr |= extract64(descriptor, 8, 2) << 50;
113
+ value = address_space_ldq_le(as,
173
+ } else {
114
+ s->ct.base_addr +
174
+ descaddr |= extract64(descriptor, 12, 4) << 48;
115
+ (l2t_id * L1TABLE_ENTRY_SIZE),
116
+ MEMTXATTRS_UNSPECIFIED, &res);
117
+
118
+ if (res != MEMTX_OK) {
119
+ return false;
120
+ }
175
+ }
121
+
176
+ } else if (descaddr >> outputsize) {
122
+ valid_l2t = (value & L2_TABLE_VALID_MASK) != 0;
177
+ fault_type = ARMFault_AddressSize;
123
+
178
+ goto do_fault;
124
+ if (valid_l2t) {
179
+ }
125
+ max_l2_entries = s->ct.page_sz / s->ct.entry_sz;
180
+
126
+
181
+ if ((descriptor & 2) && (level < 3)) {
127
+ l2t_addr = value & ((1ULL << 51) - 1);
128
+
129
+ address_space_stq_le(as, l2t_addr +
130
+ ((icid % max_l2_entries) * GITS_CTE_SIZE),
131
+ cte, MEMTXATTRS_UNSPECIFIED, &res);
132
+ }
133
+ } else {
134
+ /* Flat level table */
135
+ address_space_stq_le(as, s->ct.base_addr + (icid * GITS_CTE_SIZE),
136
+ cte, MEMTXATTRS_UNSPECIFIED, &res);
137
+ }
138
+ if (res != MEMTX_OK) {
139
+ return false;
140
+ } else {
141
+ return true;
142
+ }
143
+}
144
+
145
+static bool process_mapc(GICv3ITSState *s, uint32_t offset)
146
+{
147
+ AddressSpace *as = &s->gicv3->dma_as;
148
+ uint16_t icid;
149
+ uint64_t rdbase;
150
+ bool valid;
151
+ MemTxResult res = MEMTX_OK;
152
+ bool result = false;
153
+ uint64_t value;
154
+
155
+ offset += NUM_BYTES_IN_DW;
156
+ offset += NUM_BYTES_IN_DW;
157
+
158
+ value = address_space_ldq_le(as, s->cq.base_addr + offset,
159
+ MEMTXATTRS_UNSPECIFIED, &res);
160
+
161
+ if (res != MEMTX_OK) {
162
+ return result;
163
+ }
164
+
165
+ icid = value & ICID_MASK;
166
+
167
+ rdbase = (value & R_MAPC_RDBASE_MASK) >> R_MAPC_RDBASE_SHIFT;
168
+ rdbase &= RDBASE_PROCNUM_MASK;
169
+
170
+ valid = (value & CMD_FIELD_VALID_MASK);
171
+
172
+ if ((icid > s->ct.maxids.max_collids) || (rdbase > s->gicv3->num_cpu)) {
173
+ qemu_log_mask(LOG_GUEST_ERROR,
174
+ "ITS MAPC: invalid collection table attributes "
175
+ "icid %d rdbase %lu\n", icid, rdbase);
176
+ /*
182
+ /*
177
+ * in this implementation, in case of error
183
+ * Table entry. The top five bits are attributes which may
178
+ * we ignore this command and move onto the next
184
+ * propagate down through lower levels of the table (and
179
+ * command in the queue
185
+ * which are all arranged so that 0 means "no effect", so
186
+ * we can gather them up by ORing in the bits at each level).
180
+ */
187
+ */
181
+ } else {
188
+ tableattrs |= extract64(descriptor, 59, 5);
182
+ result = update_cte(s, icid, valid, rdbase);
189
+ level++;
183
+ }
190
+ indexmask = indexmask_grainsize;
184
+
191
+ goto next_level;
185
+ return result;
186
+}
187
+
188
+static bool update_dte(GICv3ITSState *s, uint32_t devid, bool valid,
189
+ uint8_t size, uint64_t itt_addr)
190
+{
191
+ AddressSpace *as = &s->gicv3->dma_as;
192
+ uint64_t value;
193
+ uint64_t l2t_addr;
194
+ bool valid_l2t;
195
+ uint32_t l2t_id;
196
+ uint32_t max_l2_entries;
197
+ uint64_t dte = 0;
198
+ MemTxResult res = MEMTX_OK;
199
+
200
+ if (s->dt.valid) {
201
+ if (valid) {
202
+ /* add mapping entry to device table */
203
+ dte = (valid & TABLE_ENTRY_VALID_MASK) |
204
+ ((size & SIZE_MASK) << 1U) |
205
+ (itt_addr << GITS_DTE_ITTADDR_SHIFT);
206
+ }
207
+ } else {
208
+ return true;
209
+ }
192
+ }
210
+
193
+
211
+ /*
194
+ /*
212
+ * The specification defines the format of level 1 entries of a
195
+ * Block entry at level 1 or 2, or page entry at level 3.
213
+ * 2-level table, but the format of level 2 entries and the format
196
+ * These are basically the same thing, although the number
214
+ * of flat-mapped tables is IMPDEF.
197
+ * of bits we pull in from the vaddr varies. Note that although
198
+ * descaddrmask masks enough of the low bits of the descriptor
199
+ * to give a correct page or table address, the address field
200
+ * in a block descriptor is smaller; so we need to explicitly
201
+ * clear the lower bits here before ORing in the low vaddr bits.
215
+ */
202
+ */
216
+ if (s->dt.indirect) {
203
+ page_size = (1ULL << ((stride * (4 - level)) + 3));
217
+ l2t_id = devid / (s->dt.page_sz / L1TABLE_ENTRY_SIZE);
204
+ descaddr &= ~(hwaddr)(page_size - 1);
218
+
205
+ descaddr |= (address & (page_size - 1));
219
+ value = address_space_ldq_le(as,
206
+ /* Extract attributes from the descriptor */
220
+ s->dt.base_addr +
207
+ attrs = extract64(descriptor, 2, 10)
221
+ (l2t_id * L1TABLE_ENTRY_SIZE),
208
+ | (extract64(descriptor, 52, 12) << 10);
222
+ MEMTXATTRS_UNSPECIFIED, &res);
209
+
223
+
210
+ if (regime_is_stage2(mmu_idx)) {
224
+ if (res != MEMTX_OK) {
211
+ /* Stage 2 table descriptors do not include any attribute fields */
225
+ return false;
212
+ goto skip_attrs;
226
+ }
213
+ }
227
+
214
+ /* Merge in attributes from table descriptors */
228
+ valid_l2t = (value & L2_TABLE_VALID_MASK) != 0;
215
+ attrs |= nstable << 3; /* NS */
229
+
216
+ guarded = extract64(descriptor, 50, 1); /* GP */
230
+ if (valid_l2t) {
217
+ if (param.hpd) {
231
+ max_l2_entries = s->dt.page_sz / s->dt.entry_sz;
218
+ /* HPD disables all the table attributes except NSTable. */
232
+
219
+ goto skip_attrs;
233
+ l2t_addr = value & ((1ULL << 51) - 1);
220
+ }
234
+
221
+ attrs |= extract32(tableattrs, 0, 2) << 11; /* XN, PXN */
235
+ address_space_stq_le(as, l2t_addr +
222
+ /*
236
+ ((devid % max_l2_entries) * GITS_DTE_SIZE),
223
+ * The sense of AP[1] vs APTable[0] is reversed, as APTable[0] == 1
237
+ dte, MEMTXATTRS_UNSPECIFIED, &res);
224
+ * means "force PL1 access only", which means forcing AP[1] to 0.
238
+ }
225
+ */
239
+ } else {
226
+ attrs &= ~(extract32(tableattrs, 2, 1) << 4); /* !APT[0] => AP[1] */
240
+ /* Flat level table */
227
+ attrs |= extract32(tableattrs, 3, 1) << 5; /* APT[1] => AP[2] */
241
+ address_space_stq_le(as, s->dt.base_addr + (devid * GITS_DTE_SIZE),
228
+ skip_attrs:
242
+ dte, MEMTXATTRS_UNSPECIFIED, &res);
229
+
243
+ }
230
/*
244
+ if (res != MEMTX_OK) {
231
* Here descaddr is the final physical address, and attributes
245
+ return false;
232
* are all in attrs.
246
+ } else {
247
+ return true;
248
+ }
249
+}
250
+
251
+static bool process_mapd(GICv3ITSState *s, uint64_t value, uint32_t offset)
252
+{
253
+ AddressSpace *as = &s->gicv3->dma_as;
254
+ uint32_t devid;
255
+ uint8_t size;
256
+ uint64_t itt_addr;
257
+ bool valid;
258
+ MemTxResult res = MEMTX_OK;
259
+ bool result = false;
260
+
261
+ devid = ((value & DEVID_MASK) >> DEVID_SHIFT);
262
+
263
+ offset += NUM_BYTES_IN_DW;
264
+ value = address_space_ldq_le(as, s->cq.base_addr + offset,
265
+ MEMTXATTRS_UNSPECIFIED, &res);
266
+
267
+ if (res != MEMTX_OK) {
268
+ return result;
269
+ }
270
+
271
+ size = (value & SIZE_MASK);
272
+
273
+ offset += NUM_BYTES_IN_DW;
274
+ value = address_space_ldq_le(as, s->cq.base_addr + offset,
275
+ MEMTXATTRS_UNSPECIFIED, &res);
276
+
277
+ if (res != MEMTX_OK) {
278
+ return result;
279
+ }
280
+
281
+ itt_addr = (value & ITTADDR_MASK) >> ITTADDR_SHIFT;
282
+
283
+ valid = (value & CMD_FIELD_VALID_MASK);
284
+
285
+ if ((devid > s->dt.maxids.max_devids) ||
286
+ (size > FIELD_EX64(s->typer, GITS_TYPER, IDBITS))) {
287
+ qemu_log_mask(LOG_GUEST_ERROR,
288
+ "ITS MAPD: invalid device table attributes "
289
+ "devid %d or size %d\n", devid, size);
290
+ /*
291
+ * in this implementation, in case of error
292
+ * we ignore this command and move onto the next
293
+ * command in the queue
294
+ */
295
+ } else {
296
+ result = update_dte(s, devid, valid, size, itt_addr);
297
+ }
298
+
299
+ return result;
300
+}
301
+
302
+/*
303
+ * Current implementation blocks until all
304
+ * commands are processed
305
+ */
306
+static void process_cmdq(GICv3ITSState *s)
307
+{
308
+ uint32_t wr_offset = 0;
309
+ uint32_t rd_offset = 0;
310
+ uint32_t cq_offset = 0;
311
+ uint64_t data;
312
+ AddressSpace *as = &s->gicv3->dma_as;
313
+ MemTxResult res = MEMTX_OK;
314
+ bool result = true;
315
+ uint8_t cmd;
316
+
317
+ if (!(s->ctlr & ITS_CTLR_ENABLED)) {
318
+ return;
319
+ }
320
+
321
+ wr_offset = FIELD_EX64(s->cwriter, GITS_CWRITER, OFFSET);
322
+
323
+ if (wr_offset > s->cq.max_entries) {
324
+ qemu_log_mask(LOG_GUEST_ERROR,
325
+ "%s: invalid write offset "
326
+ "%d\n", __func__, wr_offset);
327
+ return;
328
+ }
329
+
330
+ rd_offset = FIELD_EX64(s->creadr, GITS_CREADR, OFFSET);
331
+
332
+ if (rd_offset > s->cq.max_entries) {
333
+ qemu_log_mask(LOG_GUEST_ERROR,
334
+ "%s: invalid read offset "
335
+ "%d\n", __func__, rd_offset);
336
+ return;
337
+ }
338
+
339
+ while (wr_offset != rd_offset) {
340
+ cq_offset = (rd_offset * GITS_CMDQ_ENTRY_SIZE);
341
+ data = address_space_ldq_le(as, s->cq.base_addr + cq_offset,
342
+ MEMTXATTRS_UNSPECIFIED, &res);
343
+ if (res != MEMTX_OK) {
344
+ result = false;
345
+ }
346
+ cmd = (data & CMD_MASK);
347
+
348
+ switch (cmd) {
349
+ case GITS_CMD_INT:
350
+ break;
351
+ case GITS_CMD_CLEAR:
352
+ break;
353
+ case GITS_CMD_SYNC:
354
+ /*
355
+ * Current implementation makes a blocking synchronous call
356
+ * for every command issued earlier, hence the internal state
357
+ * is already consistent by the time SYNC command is executed.
358
+ * Hence no further processing is required for SYNC command.
359
+ */
360
+ break;
361
+ case GITS_CMD_MAPD:
362
+ result = process_mapd(s, data, cq_offset);
363
+ break;
364
+ case GITS_CMD_MAPC:
365
+ result = process_mapc(s, cq_offset);
366
+ break;
367
+ case GITS_CMD_MAPTI:
368
+ break;
369
+ case GITS_CMD_MAPI:
370
+ break;
371
+ case GITS_CMD_DISCARD:
372
+ break;
373
+ case GITS_CMD_INV:
374
+ case GITS_CMD_INVALL:
375
+ break;
376
+ default:
377
+ break;
378
+ }
379
+ if (result) {
380
+ rd_offset++;
381
+ rd_offset %= s->cq.max_entries;
382
+ s->creadr = FIELD_DP64(s->creadr, GITS_CREADR, OFFSET, rd_offset);
383
+ } else {
384
+ /*
385
+ * in this implementation, in case of dma read/write error
386
+ * we stall the command processing
387
+ */
388
+ s->creadr = FIELD_DP64(s->creadr, GITS_CREADR, STALLED, 1);
389
+ qemu_log_mask(LOG_GUEST_ERROR,
390
+ "%s: %x cmd processing failed\n", __func__, cmd);
391
+ break;
392
+ }
393
+ }
394
+}
395
+
396
/*
397
* This function extracts the ITS Device and Collection table specific
398
* parameters (like base_addr, size etc) from GITS_BASER register.
399
@@ -XXX,XX +XXX,XX @@ static bool its_writel(GICv3ITSState *s, hwaddr offset,
400
extract_table_params(s);
401
extract_cmdq_params(s);
402
s->creadr = 0;
403
+ process_cmdq(s);
404
}
405
break;
406
case GITS_CBASER:
407
@@ -XXX,XX +XXX,XX @@ static bool its_writel(GICv3ITSState *s, hwaddr offset,
408
case GITS_CWRITER:
409
s->cwriter = deposit64(s->cwriter, 0, 32,
410
(value & ~R_GITS_CWRITER_RETRY_MASK));
411
+ if (s->cwriter != s->creadr) {
412
+ process_cmdq(s);
413
+ }
414
break;
415
case GITS_CWRITER + 4:
416
s->cwriter = deposit64(s->cwriter, 32, 32, value);
417
@@ -XXX,XX +XXX,XX @@ static bool its_writell(GICv3ITSState *s, hwaddr offset,
418
break;
419
case GITS_CWRITER:
420
s->cwriter = value & ~R_GITS_CWRITER_RETRY_MASK;
421
+ if (s->cwriter != s->creadr) {
422
+ process_cmdq(s);
423
+ }
424
break;
425
case GITS_CREADR:
426
if (s->gicv3->gicd_ctlr & GICD_CTLR_DS) {
427
--
233
--
428
2.20.1
234
2.25.1
429
430
diff view generated by jsdifflib
1
From: Bin Meng <bmeng.cn@gmail.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
We've got SW that expects FSBL (Bootlooader) to setup clocks and
3
Always overriding fi->type was incorrect, as we would not properly
4
resets. It's quite common that users run that SW on QEMU without
4
propagate the fault type from S1_ptw_translate, or arm_ldq_ptw.
5
FSBL (FSBL typically requires the Xilinx tools installed). That's
5
Simplify things by providing a new label for a translation fault.
6
fine, since users can stil use -device loader to enable clocks etc.
6
For other faults, store into fi directly.
7
7
8
To help folks understand what's going, a log (guest-error) message
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
would be helpful here. In particular with the serial port since
9
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
10
things will go very quiet if they get things wrong.
10
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
11
11
Message-id: 20221024051851.3074715-9-richard.henderson@linaro.org
12
Suggested-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com>
13
Signed-off-by: Bin Meng <bmeng.cn@gmail.com>
14
Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com>
15
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
16
Message-id: 20210901124521.30599-7-bmeng.cn@gmail.com
17
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
18
---
13
---
19
hw/char/cadence_uart.c | 8 ++++++++
14
target/arm/ptw.c | 31 +++++++++++++------------------
20
1 file changed, 8 insertions(+)
15
1 file changed, 13 insertions(+), 18 deletions(-)
21
16
22
diff --git a/hw/char/cadence_uart.c b/hw/char/cadence_uart.c
17
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
23
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
24
--- a/hw/char/cadence_uart.c
19
--- a/target/arm/ptw.c
25
+++ b/hw/char/cadence_uart.c
20
+++ b/target/arm/ptw.c
26
@@ -XXX,XX +XXX,XX @@ static int uart_can_receive(void *opaque)
21
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
27
22
ARMCPU *cpu = env_archcpu(env);
28
/* ignore characters when unclocked or in reset */
23
ARMMMUIdx mmu_idx = ptw->in_mmu_idx;
29
if (!clock_is_enabled(s->refclk) || device_is_in_reset(DEVICE(s))) {
24
bool is_secure = ptw->in_secure;
30
+ qemu_log_mask(LOG_GUEST_ERROR, "%s: uart is unclocked or in reset\n",
25
- /* Read an LPAE long-descriptor translation table. */
31
+ __func__);
26
- ARMFaultType fault_type = ARMFault_Translation;
32
return 0;
27
uint32_t level;
28
ARMVAParameters param;
29
uint64_t ttbr;
30
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
31
* so our choice is to always raise the fault.
32
*/
33
if (param.tsz_oob) {
34
- fault_type = ARMFault_Translation;
35
- goto do_fault;
36
+ goto do_translation_fault;
37
}
38
39
addrsize = 64 - 8 * param.tbi;
40
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
41
addrsize - inputsize);
42
if (-top_bits != param.select) {
43
/* The gap between the two regions is a Translation fault */
44
- fault_type = ARMFault_Translation;
45
- goto do_fault;
46
+ goto do_translation_fault;
47
}
33
}
48
}
34
49
35
@@ -XXX,XX +XXX,XX @@ static void uart_event(void *opaque, QEMUChrEvent event)
50
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
36
51
* Translation table walk disabled => Translation fault on TLB miss
37
/* ignore characters when unclocked or in reset */
52
* Note: This is always 0 on 64-bit EL2 and EL3.
38
if (!clock_is_enabled(s->refclk) || device_is_in_reset(DEVICE(s))) {
53
*/
39
+ qemu_log_mask(LOG_GUEST_ERROR, "%s: uart is unclocked or in reset\n",
54
- goto do_fault;
40
+ __func__);
55
+ goto do_translation_fault;
41
return;
42
}
56
}
43
57
44
@@ -XXX,XX +XXX,XX @@ static MemTxResult uart_write(void *opaque, hwaddr offset,
58
if (!regime_is_stage2(mmu_idx)) {
45
59
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
46
/* ignore access when unclocked or in reset */
60
if (param.ds && stride == 9 && sl2) {
47
if (!clock_is_enabled(s->refclk) || device_is_in_reset(DEVICE(s))) {
61
if (sl0 != 0) {
48
+ qemu_log_mask(LOG_GUEST_ERROR, "%s: uart is unclocked or in reset\n",
62
level = 0;
49
+ __func__);
63
- fault_type = ARMFault_Translation;
50
return MEMTX_ERROR;
64
- goto do_fault;
65
+ goto do_translation_fault;
66
}
67
startlevel = -1;
68
} else if (!aarch64 || stride == 9) {
69
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
70
ok = check_s2_mmu_setup(cpu, aarch64, startlevel,
71
inputsize, stride, outputsize);
72
if (!ok) {
73
- fault_type = ARMFault_Translation;
74
- goto do_fault;
75
+ goto do_translation_fault;
76
}
77
level = startlevel;
51
}
78
}
52
79
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
53
@@ -XXX,XX +XXX,XX @@ static MemTxResult uart_read(void *opaque, hwaddr offset,
80
descaddr |= extract64(ttbr, 2, 4) << 48;
54
81
} else if (descaddr >> outputsize) {
55
/* ignore access when unclocked or in reset */
82
level = 0;
56
if (!clock_is_enabled(s->refclk) || device_is_in_reset(DEVICE(s))) {
83
- fault_type = ARMFault_AddressSize;
57
+ qemu_log_mask(LOG_GUEST_ERROR, "%s: uart is unclocked or in reset\n",
84
+ fi->type = ARMFault_AddressSize;
58
+ __func__);
85
goto do_fault;
59
return MEMTX_ERROR;
60
}
86
}
61
87
88
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
89
90
if (!(descriptor & 1) || (!(descriptor & 2) && (level == 3))) {
91
/* Invalid, or the Reserved level 3 encoding */
92
- goto do_fault;
93
+ goto do_translation_fault;
94
}
95
96
descaddr = descriptor & descaddrmask;
97
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
98
descaddr |= extract64(descriptor, 12, 4) << 48;
99
}
100
} else if (descaddr >> outputsize) {
101
- fault_type = ARMFault_AddressSize;
102
+ fi->type = ARMFault_AddressSize;
103
goto do_fault;
104
}
105
106
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
107
* Here descaddr is the final physical address, and attributes
108
* are all in attrs.
109
*/
110
- fault_type = ARMFault_AccessFlag;
111
if ((attrs & (1 << 8)) == 0) {
112
/* Access flag */
113
+ fi->type = ARMFault_AccessFlag;
114
goto do_fault;
115
}
116
117
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
118
result->f.prot = get_S1prot(env, mmu_idx, aarch64, ap, ns, xn, pxn);
119
}
120
121
- fault_type = ARMFault_Permission;
122
if (!(result->f.prot & (1 << access_type))) {
123
+ fi->type = ARMFault_Permission;
124
goto do_fault;
125
}
126
127
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
128
result->f.lg_page_size = ctz64(page_size);
129
return false;
130
131
-do_fault:
132
- fi->type = fault_type;
133
+ do_translation_fault:
134
+ fi->type = ARMFault_Translation;
135
+ do_fault:
136
fi->level = level;
137
/* Tag the error as S2 for failed S1 PTW at S2 or ordinary S2. */
138
fi->stage2 = fi->s1ptw || regime_is_stage2(mmu_idx);
62
--
139
--
63
2.20.1
140
2.25.1
64
141
65
142
diff view generated by jsdifflib
1
From: Bin Meng <bmeng.cn@gmail.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
This converts uart_read() and uart_write() to memop_with_attrs() ops.
3
Leave the upper and lower attributes in the place they originate
4
from in the descriptor. Shifting them around is confusing, since
5
one cannot read the bit numbers out of the manual. Also, new
6
attributes have been added which would alter the shifts.
4
7
5
Signed-off-by: Bin Meng <bmeng.cn@gmail.com>
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com>
9
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
10
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
8
Message-id: 20210901124521.30599-5-bmeng.cn@gmail.com
11
Message-id: 20221024051851.3074715-10-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
13
---
11
hw/char/cadence_uart.c | 26 +++++++++++++++-----------
14
target/arm/ptw.c | 31 +++++++++++++++----------------
12
1 file changed, 15 insertions(+), 11 deletions(-)
15
1 file changed, 15 insertions(+), 16 deletions(-)
13
16
14
diff --git a/hw/char/cadence_uart.c b/hw/char/cadence_uart.c
17
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
15
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
16
--- a/hw/char/cadence_uart.c
19
--- a/target/arm/ptw.c
17
+++ b/hw/char/cadence_uart.c
20
+++ b/target/arm/ptw.c
18
@@ -XXX,XX +XXX,XX @@ static void uart_read_rx_fifo(CadenceUARTState *s, uint32_t *c)
21
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
19
uart_update_status(s);
22
hwaddr descaddr, indexmask, indexmask_grainsize;
20
}
23
uint32_t tableattrs;
21
24
target_ulong page_size;
22
-static void uart_write(void *opaque, hwaddr offset,
25
- uint32_t attrs;
23
- uint64_t value, unsigned size)
26
+ uint64_t attrs;
24
+static MemTxResult uart_write(void *opaque, hwaddr offset,
27
int32_t stride;
25
+ uint64_t value, unsigned size, MemTxAttrs attrs)
28
int addrsize, inputsize, outputsize;
26
{
29
uint64_t tcr = regime_tcr(env, mmu_idx);
27
CadenceUARTState *s = opaque;
30
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
28
31
descaddr &= ~(hwaddr)(page_size - 1);
29
DB_PRINT(" offset:%x data:%08x\n", (unsigned)offset, (unsigned)value);
32
descaddr |= (address & (page_size - 1));
30
offset >>= 2;
33
/* Extract attributes from the descriptor */
31
if (offset >= CADENCE_UART_R_MAX) {
34
- attrs = extract64(descriptor, 2, 10)
32
- return;
35
- | (extract64(descriptor, 52, 12) << 10);
33
+ return MEMTX_DECODE_ERROR;
36
+ attrs = descriptor & (MAKE_64BIT_MASK(2, 10) | MAKE_64BIT_MASK(52, 12));
37
38
if (regime_is_stage2(mmu_idx)) {
39
/* Stage 2 table descriptors do not include any attribute fields */
40
goto skip_attrs;
34
}
41
}
35
switch (offset) {
42
/* Merge in attributes from table descriptors */
36
case R_IER: /* ier (wts imr) */
43
- attrs |= nstable << 3; /* NS */
37
@@ -XXX,XX +XXX,XX @@ static void uart_write(void *opaque, hwaddr offset,
44
+ attrs |= nstable << 5; /* NS */
38
break;
45
guarded = extract64(descriptor, 50, 1); /* GP */
46
if (param.hpd) {
47
/* HPD disables all the table attributes except NSTable. */
48
goto skip_attrs;
39
}
49
}
40
uart_update_status(s);
50
- attrs |= extract32(tableattrs, 0, 2) << 11; /* XN, PXN */
41
+
51
+ attrs |= extract64(tableattrs, 0, 2) << 53; /* XN, PXN */
42
+ return MEMTX_OK;
52
/*
43
}
53
* The sense of AP[1] vs APTable[0] is reversed, as APTable[0] == 1
44
54
* means "force PL1 access only", which means forcing AP[1] to 0.
45
-static uint64_t uart_read(void *opaque, hwaddr offset,
55
*/
46
- unsigned size)
56
- attrs &= ~(extract32(tableattrs, 2, 1) << 4); /* !APT[0] => AP[1] */
47
+static MemTxResult uart_read(void *opaque, hwaddr offset,
57
- attrs |= extract32(tableattrs, 3, 1) << 5; /* APT[1] => AP[2] */
48
+ uint64_t *value, unsigned size, MemTxAttrs attrs)
58
+ attrs &= ~(extract64(tableattrs, 2, 1) << 6); /* !APT[0] => AP[1] */
49
{
59
+ attrs |= extract32(tableattrs, 3, 1) << 7; /* APT[1] => AP[2] */
50
CadenceUARTState *s = opaque;
60
skip_attrs:
51
uint32_t c = 0;
61
52
62
/*
53
offset >>= 2;
63
* Here descaddr is the final physical address, and attributes
54
if (offset >= CADENCE_UART_R_MAX) {
64
* are all in attrs.
55
- c = 0;
65
*/
56
- } else if (offset == R_TX_RX) {
66
- if ((attrs & (1 << 8)) == 0) {
57
+ return MEMTX_DECODE_ERROR;
67
+ if ((attrs & (1 << 10)) == 0) {
58
+ }
68
/* Access flag */
59
+ if (offset == R_TX_RX) {
69
fi->type = ARMFault_AccessFlag;
60
uart_read_rx_fifo(s, &c);
70
goto do_fault;
71
}
72
73
- ap = extract32(attrs, 4, 2);
74
+ ap = extract32(attrs, 6, 2);
75
76
if (regime_is_stage2(mmu_idx)) {
77
ns = mmu_idx == ARMMMUIdx_Stage2;
78
- xn = extract32(attrs, 11, 2);
79
+ xn = extract64(attrs, 53, 2);
80
result->f.prot = get_S2prot(env, ap, xn, s1_is_el0);
61
} else {
81
} else {
62
- c = s->r[offset];
82
- ns = extract32(attrs, 3, 1);
63
+ c = s->r[offset];
83
- xn = extract32(attrs, 12, 1);
84
- pxn = extract32(attrs, 11, 1);
85
+ ns = extract32(attrs, 5, 1);
86
+ xn = extract64(attrs, 54, 1);
87
+ pxn = extract64(attrs, 53, 1);
88
result->f.prot = get_S1prot(env, mmu_idx, aarch64, ap, ns, xn, pxn);
64
}
89
}
65
90
66
DB_PRINT(" offset:%x data:%08x\n", (unsigned)(offset << 2), (unsigned)c);
91
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
67
- return c;
92
68
+ *value = c;
93
if (regime_is_stage2(mmu_idx)) {
69
+ return MEMTX_OK;
94
result->cacheattrs.is_s2_format = true;
70
}
95
- result->cacheattrs.attrs = extract32(attrs, 0, 4);
71
96
+ result->cacheattrs.attrs = extract32(attrs, 2, 4);
72
static const MemoryRegionOps uart_ops = {
97
} else {
73
- .read = uart_read,
98
/* Index into MAIR registers for cache attributes */
74
- .write = uart_write,
99
- uint8_t attrindx = extract32(attrs, 0, 3);
75
+ .read_with_attrs = uart_read,
100
+ uint8_t attrindx = extract32(attrs, 2, 3);
76
+ .write_with_attrs = uart_write,
101
uint64_t mair = env->cp15.mair_el[regime_el(env, mmu_idx)];
77
.endianness = DEVICE_NATIVE_ENDIAN,
102
assert(attrindx <= 7);
78
};
103
result->cacheattrs.is_s2_format = false;
79
104
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
105
if (param.ds) {
106
result->cacheattrs.shareability = param.sh;
107
} else {
108
- result->cacheattrs.shareability = extract32(attrs, 6, 2);
109
+ result->cacheattrs.shareability = extract32(attrs, 8, 2);
110
}
111
112
result->f.phys_addr = descaddr;
80
--
113
--
81
2.20.1
114
2.25.1
82
115
83
116
diff view generated by jsdifflib
1
From: Shashi Mallela <shashi.mallela@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Added expected IORT files applicable with latest GICv3
3
Both GP and DBM are in the upper attribute block.
4
ITS changes.Temporarily differences in these files are
4
Extend the computation of attrs to include them,
5
okay.
5
then simplify the setting of guarded.
6
6
7
Signed-off-by: Shashi Mallela <shashi.mallela@linaro.org>
7
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
8
Acked-by: Igor Mammedov <imammedo@redhat.com>
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
Message-id: 20210910143951.92242-8-shashi.mallela@linaro.org
9
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
10
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
11
Message-id: 20221024051851.3074715-11-richard.henderson@linaro.org
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
13
---
13
tests/qtest/bios-tables-test-allowed-diff.h | 4 ++++
14
target/arm/ptw.c | 6 ++----
14
tests/data/acpi/virt/IORT | 0
15
1 file changed, 2 insertions(+), 4 deletions(-)
15
tests/data/acpi/virt/IORT.memhp | 0
16
tests/data/acpi/virt/IORT.numamem | 0
17
tests/data/acpi/virt/IORT.pxb | 0
18
5 files changed, 4 insertions(+)
19
create mode 100644 tests/data/acpi/virt/IORT
20
create mode 100644 tests/data/acpi/virt/IORT.memhp
21
create mode 100644 tests/data/acpi/virt/IORT.numamem
22
create mode 100644 tests/data/acpi/virt/IORT.pxb
23
16
24
diff --git a/tests/qtest/bios-tables-test-allowed-diff.h b/tests/qtest/bios-tables-test-allowed-diff.h
17
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
25
index XXXXXXX..XXXXXXX 100644
18
index XXXXXXX..XXXXXXX 100644
26
--- a/tests/qtest/bios-tables-test-allowed-diff.h
19
--- a/target/arm/ptw.c
27
+++ b/tests/qtest/bios-tables-test-allowed-diff.h
20
+++ b/target/arm/ptw.c
28
@@ -1 +1,5 @@
21
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
29
/* List of comma-separated changed AML files to ignore */
22
uint32_t el = regime_el(env, mmu_idx);
30
+"tests/data/acpi/virt/IORT",
23
uint64_t descaddrmask;
31
+"tests/data/acpi/virt/IORT.memhp",
24
bool aarch64 = arm_el_is_aa64(env, el);
32
+"tests/data/acpi/virt/IORT.numamem",
25
- bool guarded = false;
33
+"tests/data/acpi/virt/IORT.pxb",
26
uint64_t descriptor;
34
diff --git a/tests/data/acpi/virt/IORT b/tests/data/acpi/virt/IORT
27
bool nstable;
35
new file mode 100644
28
36
index XXXXXXX..XXXXXXX
29
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
37
diff --git a/tests/data/acpi/virt/IORT.memhp b/tests/data/acpi/virt/IORT.memhp
30
descaddr &= ~(hwaddr)(page_size - 1);
38
new file mode 100644
31
descaddr |= (address & (page_size - 1));
39
index XXXXXXX..XXXXXXX
32
/* Extract attributes from the descriptor */
40
diff --git a/tests/data/acpi/virt/IORT.numamem b/tests/data/acpi/virt/IORT.numamem
33
- attrs = descriptor & (MAKE_64BIT_MASK(2, 10) | MAKE_64BIT_MASK(52, 12));
41
new file mode 100644
34
+ attrs = descriptor & (MAKE_64BIT_MASK(2, 10) | MAKE_64BIT_MASK(50, 14));
42
index XXXXXXX..XXXXXXX
35
43
diff --git a/tests/data/acpi/virt/IORT.pxb b/tests/data/acpi/virt/IORT.pxb
36
if (regime_is_stage2(mmu_idx)) {
44
new file mode 100644
37
/* Stage 2 table descriptors do not include any attribute fields */
45
index XXXXXXX..XXXXXXX
38
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
39
}
40
/* Merge in attributes from table descriptors */
41
attrs |= nstable << 5; /* NS */
42
- guarded = extract64(descriptor, 50, 1); /* GP */
43
if (param.hpd) {
44
/* HPD disables all the table attributes except NSTable. */
45
goto skip_attrs;
46
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
47
48
/* When in aarch64 mode, and BTI is enabled, remember GP in the TLB. */
49
if (aarch64 && cpu_isar_feature(aa64_bti, cpu)) {
50
- result->f.guarded = guarded;
51
+ result->f.guarded = extract64(attrs, 50, 1); /* GP */
52
}
53
54
if (regime_is_stage2(mmu_idx)) {
46
--
55
--
47
2.20.1
56
2.25.1
48
57
49
58
diff view generated by jsdifflib
1
From: Shashi Mallela <shashi.mallela@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Added register definitions relevant to ITS,implemented overall
3
Replace some gotos with some nested if statements.
4
ITS device framework with stubs for ITS control and translater
5
regions read/write,extended ITS common to handle mmio init between
6
existing kvm device and newer qemu device.
7
4
8
Signed-off-by: Shashi Mallela <shashi.mallela@linaro.org>
5
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
10
Reviewed-by: Eric Auger <eric.auger@redhat.com>
7
Message-id: 20221024051851.3074715-12-richard.henderson@linaro.org
11
Tested-by: Neil Armstrong <narmstrong@baylibre.com>
12
Message-id: 20210910143951.92242-2-shashi.mallela@linaro.org
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
---
9
---
15
hw/intc/gicv3_internal.h | 96 +++++++++-
10
target/arm/ptw.c | 34 ++++++++++++++++------------------
16
include/hw/intc/arm_gicv3_its_common.h | 9 +-
11
1 file changed, 16 insertions(+), 18 deletions(-)
17
hw/intc/arm_gicv3_its.c | 241 +++++++++++++++++++++++++
18
hw/intc/arm_gicv3_its_common.c | 7 +-
19
hw/intc/arm_gicv3_its_kvm.c | 2 +-
20
hw/intc/meson.build | 1 +
21
6 files changed, 342 insertions(+), 14 deletions(-)
22
create mode 100644 hw/intc/arm_gicv3_its.c
23
12
24
diff --git a/hw/intc/gicv3_internal.h b/hw/intc/gicv3_internal.h
13
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
25
index XXXXXXX..XXXXXXX 100644
14
index XXXXXXX..XXXXXXX 100644
26
--- a/hw/intc/gicv3_internal.h
15
--- a/target/arm/ptw.c
27
+++ b/hw/intc/gicv3_internal.h
16
+++ b/target/arm/ptw.c
28
@@ -XXX,XX +XXX,XX @@
17
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
29
#ifndef QEMU_ARM_GICV3_INTERNAL_H
18
page_size = (1ULL << ((stride * (4 - level)) + 3));
30
#define QEMU_ARM_GICV3_INTERNAL_H
19
descaddr &= ~(hwaddr)(page_size - 1);
31
20
descaddr |= (address & (page_size - 1));
32
+#include "hw/registerfields.h"
21
- /* Extract attributes from the descriptor */
33
#include "hw/intc/arm_gicv3_common.h"
22
- attrs = descriptor & (MAKE_64BIT_MASK(2, 10) | MAKE_64BIT_MASK(50, 14));
34
23
35
/* Distributor registers, as offsets from the distributor base address */
24
- if (regime_is_stage2(mmu_idx)) {
36
@@ -XXX,XX +XXX,XX @@
25
- /* Stage 2 table descriptors do not include any attribute fields */
37
#define GICD_CTLR_E1NWF (1U << 7)
26
- goto skip_attrs;
38
#define GICD_CTLR_RWP (1U << 31)
27
- }
39
28
- /* Merge in attributes from table descriptors */
40
+/* 16 bits EventId */
29
- attrs |= nstable << 5; /* NS */
41
+#define GICD_TYPER_IDBITS 0xf
30
- if (param.hpd) {
42
+
31
- /* HPD disables all the table attributes except NSTable. */
43
/*
32
- goto skip_attrs;
44
* Redistributor frame offsets from RD_base
33
- }
45
*/
34
- attrs |= extract64(tableattrs, 0, 2) << 53; /* XN, PXN */
46
@@ -XXX,XX +XXX,XX @@
35
/*
47
#define GICR_WAKER_ProcessorSleep (1U << 1)
36
- * The sense of AP[1] vs APTable[0] is reversed, as APTable[0] == 1
48
#define GICR_WAKER_ChildrenAsleep (1U << 2)
37
- * means "force PL1 access only", which means forcing AP[1] to 0.
49
38
+ * Extract attributes from the descriptor, and apply table descriptors.
50
-#define GICR_PROPBASER_OUTER_CACHEABILITY_MASK (7ULL << 56)
39
+ * Stage 2 table descriptors do not include any attribute fields.
51
-#define GICR_PROPBASER_ADDR_MASK (0xfffffffffULL << 12)
40
+ * HPD disables all the table attributes except NSTable.
52
-#define GICR_PROPBASER_SHAREABILITY_MASK (3U << 10)
41
*/
53
-#define GICR_PROPBASER_CACHEABILITY_MASK (7U << 7)
42
- attrs &= ~(extract64(tableattrs, 2, 1) << 6); /* !APT[0] => AP[1] */
54
-#define GICR_PROPBASER_IDBITS_MASK (0x1f)
43
- attrs |= extract32(tableattrs, 3, 1) << 7; /* APT[1] => AP[2] */
55
+FIELD(GICR_PROPBASER, IDBITS, 0, 5)
44
- skip_attrs:
56
+FIELD(GICR_PROPBASER, INNERCACHE, 7, 3)
45
+ attrs = descriptor & (MAKE_64BIT_MASK(2, 10) | MAKE_64BIT_MASK(50, 14));
57
+FIELD(GICR_PROPBASER, SHAREABILITY, 10, 2)
46
+ if (!regime_is_stage2(mmu_idx)) {
58
+FIELD(GICR_PROPBASER, PHYADDR, 12, 40)
47
+ attrs |= nstable << 5; /* NS */
59
+FIELD(GICR_PROPBASER, OUTERCACHE, 56, 3)
48
+ if (!param.hpd) {
60
49
+ attrs |= extract64(tableattrs, 0, 2) << 53; /* XN, PXN */
61
-#define GICR_PENDBASER_PTZ (1ULL << 62)
50
+ /*
62
-#define GICR_PENDBASER_OUTER_CACHEABILITY_MASK (7ULL << 56)
51
+ * The sense of AP[1] vs APTable[0] is reversed, as APTable[0] == 1
63
-#define GICR_PENDBASER_ADDR_MASK (0xffffffffULL << 16)
52
+ * means "force PL1 access only", which means forcing AP[1] to 0.
64
-#define GICR_PENDBASER_SHAREABILITY_MASK (3U << 10)
53
+ */
65
-#define GICR_PENDBASER_CACHEABILITY_MASK (7U << 7)
54
+ attrs &= ~(extract64(tableattrs, 2, 1) << 6); /* !APT[0] => AP[1] */
66
+FIELD(GICR_PENDBASER, INNERCACHE, 7, 3)
55
+ attrs |= extract32(tableattrs, 3, 1) << 7; /* APT[1] => AP[2] */
67
+FIELD(GICR_PENDBASER, SHAREABILITY, 10, 2)
68
+FIELD(GICR_PENDBASER, PHYADDR, 16, 36)
69
+FIELD(GICR_PENDBASER, OUTERCACHE, 56, 3)
70
+FIELD(GICR_PENDBASER, PTZ, 62, 1)
71
72
#define ICC_CTLR_EL1_CBPR (1U << 0)
73
#define ICC_CTLR_EL1_EOIMODE (1U << 1)
74
@@ -XXX,XX +XXX,XX @@
75
#define ICH_VTR_EL2_PREBITS_SHIFT 26
76
#define ICH_VTR_EL2_PRIBITS_SHIFT 29
77
78
+/* ITS Registers */
79
+
80
+FIELD(GITS_BASER, SIZE, 0, 8)
81
+FIELD(GITS_BASER, PAGESIZE, 8, 2)
82
+FIELD(GITS_BASER, SHAREABILITY, 10, 2)
83
+FIELD(GITS_BASER, PHYADDR, 12, 36)
84
+FIELD(GITS_BASER, PHYADDRL_64K, 16, 32)
85
+FIELD(GITS_BASER, PHYADDRH_64K, 12, 4)
86
+FIELD(GITS_BASER, ENTRYSIZE, 48, 5)
87
+FIELD(GITS_BASER, OUTERCACHE, 53, 3)
88
+FIELD(GITS_BASER, TYPE, 56, 3)
89
+FIELD(GITS_BASER, INNERCACHE, 59, 3)
90
+FIELD(GITS_BASER, INDIRECT, 62, 1)
91
+FIELD(GITS_BASER, VALID, 63, 1)
92
+
93
+FIELD(GITS_CTLR, QUIESCENT, 31, 1)
94
+
95
+FIELD(GITS_TYPER, PHYSICAL, 0, 1)
96
+FIELD(GITS_TYPER, ITT_ENTRY_SIZE, 4, 4)
97
+FIELD(GITS_TYPER, IDBITS, 8, 5)
98
+FIELD(GITS_TYPER, DEVBITS, 13, 5)
99
+FIELD(GITS_TYPER, SEIS, 18, 1)
100
+FIELD(GITS_TYPER, PTA, 19, 1)
101
+FIELD(GITS_TYPER, CIDBITS, 32, 4)
102
+FIELD(GITS_TYPER, CIL, 36, 1)
103
+
104
+#define GITS_BASER_PAGESIZE_4K 0
105
+#define GITS_BASER_PAGESIZE_16K 1
106
+#define GITS_BASER_PAGESIZE_64K 2
107
+
108
+#define GITS_BASER_TYPE_DEVICE 1ULL
109
+#define GITS_BASER_TYPE_COLLECTION 4ULL
110
+
111
+/**
112
+ * Default features advertised by this version of ITS
113
+ */
114
+/* Physical LPIs supported */
115
+#define GITS_TYPE_PHYSICAL (1U << 0)
116
+
117
+/*
118
+ * 12 bytes Interrupt translation Table Entry size
119
+ * as per Table 5.3 in GICv3 spec
120
+ * ITE Lower 8 Bytes
121
+ * Bits: | 49 ... 26 | 25 ... 2 | 1 | 0 |
122
+ * Values: | 1023 | IntNum | IntType | Valid |
123
+ * ITE Higher 4 Bytes
124
+ * Bits: | 31 ... 16 | 15 ...0 |
125
+ * Values: | vPEID | ICID |
126
+ */
127
+#define ITS_ITT_ENTRY_SIZE 0xC
128
+
129
+/* 16 bits EventId */
130
+#define ITS_IDBITS GICD_TYPER_IDBITS
131
+
132
+/* 16 bits DeviceId */
133
+#define ITS_DEVBITS 0xF
134
+
135
+/* 16 bits CollectionId */
136
+#define ITS_CIDBITS 0xF
137
+
138
+/*
139
+ * 8 bytes Device Table Entry size
140
+ * Valid = 1 bit,ITTAddr = 44 bits,Size = 5 bits
141
+ */
142
+#define GITS_DTE_SIZE (0x8ULL)
143
+
144
+/*
145
+ * 8 bytes Collection Table Entry size
146
+ * Valid = 1 bit,RDBase = 36 bits(considering max RDBASE)
147
+ */
148
+#define GITS_CTE_SIZE (0x8ULL)
149
+
150
/* Special interrupt IDs */
151
#define INTID_SECURE 1020
152
#define INTID_NONSECURE 1021
153
diff --git a/include/hw/intc/arm_gicv3_its_common.h b/include/hw/intc/arm_gicv3_its_common.h
154
index XXXXXXX..XXXXXXX 100644
155
--- a/include/hw/intc/arm_gicv3_its_common.h
156
+++ b/include/hw/intc/arm_gicv3_its_common.h
157
@@ -XXX,XX +XXX,XX @@
158
#include "hw/intc/arm_gicv3_common.h"
159
#include "qom/object.h"
160
161
+#define TYPE_ARM_GICV3_ITS "arm-gicv3-its"
162
+
163
#define ITS_CONTROL_SIZE 0x10000
164
#define ITS_TRANS_SIZE 0x10000
165
#define ITS_SIZE (ITS_CONTROL_SIZE + ITS_TRANS_SIZE)
166
167
#define GITS_CTLR 0x0
168
#define GITS_IIDR 0x4
169
+#define GITS_TYPER 0x8
170
#define GITS_CBASER 0x80
171
#define GITS_CWRITER 0x88
172
#define GITS_CREADR 0x90
173
#define GITS_BASER 0x100
174
175
+#define GITS_TRANSLATER 0x0040
176
+
177
struct GICv3ITSState {
178
SysBusDevice parent_obj;
179
180
@@ -XXX,XX +XXX,XX @@ struct GICv3ITSState {
181
/* Registers */
182
uint32_t ctlr;
183
uint32_t iidr;
184
+ uint64_t typer;
185
uint64_t cbaser;
186
uint64_t cwriter;
187
uint64_t creadr;
188
@@ -XXX,XX +XXX,XX @@ struct GICv3ITSState {
189
190
typedef struct GICv3ITSState GICv3ITSState;
191
192
-void gicv3_its_init_mmio(GICv3ITSState *s, const MemoryRegionOps *ops);
193
+void gicv3_its_init_mmio(GICv3ITSState *s, const MemoryRegionOps *ops,
194
+ const MemoryRegionOps *tops);
195
196
#define TYPE_ARM_GICV3_ITS_COMMON "arm-gicv3-its-common"
197
typedef struct GICv3ITSCommonClass GICv3ITSCommonClass;
198
diff --git a/hw/intc/arm_gicv3_its.c b/hw/intc/arm_gicv3_its.c
199
new file mode 100644
200
index XXXXXXX..XXXXXXX
201
--- /dev/null
202
+++ b/hw/intc/arm_gicv3_its.c
203
@@ -XXX,XX +XXX,XX @@
204
+/*
205
+ * ITS emulation for a GICv3-based system
206
+ *
207
+ * Copyright Linaro.org 2021
208
+ *
209
+ * Authors:
210
+ * Shashi Mallela <shashi.mallela@linaro.org>
211
+ *
212
+ * This work is licensed under the terms of the GNU GPL, version 2 or (at your
213
+ * option) any later version. See the COPYING file in the top-level directory.
214
+ *
215
+ */
216
+
217
+#include "qemu/osdep.h"
218
+#include "qemu/log.h"
219
+#include "hw/qdev-properties.h"
220
+#include "hw/intc/arm_gicv3_its_common.h"
221
+#include "gicv3_internal.h"
222
+#include "qom/object.h"
223
+#include "qapi/error.h"
224
+
225
+typedef struct GICv3ITSClass GICv3ITSClass;
226
+/* This is reusing the GICv3ITSState typedef from ARM_GICV3_ITS_COMMON */
227
+DECLARE_OBJ_CHECKERS(GICv3ITSState, GICv3ITSClass,
228
+ ARM_GICV3_ITS, TYPE_ARM_GICV3_ITS)
229
+
230
+struct GICv3ITSClass {
231
+ GICv3ITSCommonClass parent_class;
232
+ void (*parent_reset)(DeviceState *dev);
233
+};
234
+
235
+static MemTxResult gicv3_its_translation_write(void *opaque, hwaddr offset,
236
+ uint64_t data, unsigned size,
237
+ MemTxAttrs attrs)
238
+{
239
+ return MEMTX_OK;
240
+}
241
+
242
+static bool its_writel(GICv3ITSState *s, hwaddr offset,
243
+ uint64_t value, MemTxAttrs attrs)
244
+{
245
+ bool result = true;
246
+
247
+ return result;
248
+}
249
+
250
+static bool its_readl(GICv3ITSState *s, hwaddr offset,
251
+ uint64_t *data, MemTxAttrs attrs)
252
+{
253
+ bool result = true;
254
+
255
+ return result;
256
+}
257
+
258
+static bool its_writell(GICv3ITSState *s, hwaddr offset,
259
+ uint64_t value, MemTxAttrs attrs)
260
+{
261
+ bool result = true;
262
+
263
+ return result;
264
+}
265
+
266
+static bool its_readll(GICv3ITSState *s, hwaddr offset,
267
+ uint64_t *data, MemTxAttrs attrs)
268
+{
269
+ bool result = true;
270
+
271
+ return result;
272
+}
273
+
274
+static MemTxResult gicv3_its_read(void *opaque, hwaddr offset, uint64_t *data,
275
+ unsigned size, MemTxAttrs attrs)
276
+{
277
+ GICv3ITSState *s = (GICv3ITSState *)opaque;
278
+ bool result;
279
+
280
+ switch (size) {
281
+ case 4:
282
+ result = its_readl(s, offset, data, attrs);
283
+ break;
284
+ case 8:
285
+ result = its_readll(s, offset, data, attrs);
286
+ break;
287
+ default:
288
+ result = false;
289
+ break;
290
+ }
291
+
292
+ if (!result) {
293
+ qemu_log_mask(LOG_GUEST_ERROR,
294
+ "%s: invalid guest read at offset " TARGET_FMT_plx
295
+ "size %u\n", __func__, offset, size);
296
+ /*
297
+ * The spec requires that reserved registers are RAZ/WI;
298
+ * so use false returns from leaf functions as a way to
299
+ * trigger the guest-error logging but don't return it to
300
+ * the caller, or we'll cause a spurious guest data abort.
301
+ */
302
+ *data = 0;
303
+ }
304
+ return MEMTX_OK;
305
+}
306
+
307
+static MemTxResult gicv3_its_write(void *opaque, hwaddr offset, uint64_t data,
308
+ unsigned size, MemTxAttrs attrs)
309
+{
310
+ GICv3ITSState *s = (GICv3ITSState *)opaque;
311
+ bool result;
312
+
313
+ switch (size) {
314
+ case 4:
315
+ result = its_writel(s, offset, data, attrs);
316
+ break;
317
+ case 8:
318
+ result = its_writell(s, offset, data, attrs);
319
+ break;
320
+ default:
321
+ result = false;
322
+ break;
323
+ }
324
+
325
+ if (!result) {
326
+ qemu_log_mask(LOG_GUEST_ERROR,
327
+ "%s: invalid guest write at offset " TARGET_FMT_plx
328
+ "size %u\n", __func__, offset, size);
329
+ /*
330
+ * The spec requires that reserved registers are RAZ/WI;
331
+ * so use false returns from leaf functions as a way to
332
+ * trigger the guest-error logging but don't return it to
333
+ * the caller, or we'll cause a spurious guest data abort.
334
+ */
335
+ }
336
+ return MEMTX_OK;
337
+}
338
+
339
+static const MemoryRegionOps gicv3_its_control_ops = {
340
+ .read_with_attrs = gicv3_its_read,
341
+ .write_with_attrs = gicv3_its_write,
342
+ .valid.min_access_size = 4,
343
+ .valid.max_access_size = 8,
344
+ .impl.min_access_size = 4,
345
+ .impl.max_access_size = 8,
346
+ .endianness = DEVICE_NATIVE_ENDIAN,
347
+};
348
+
349
+static const MemoryRegionOps gicv3_its_translation_ops = {
350
+ .write_with_attrs = gicv3_its_translation_write,
351
+ .valid.min_access_size = 2,
352
+ .valid.max_access_size = 4,
353
+ .impl.min_access_size = 2,
354
+ .impl.max_access_size = 4,
355
+ .endianness = DEVICE_NATIVE_ENDIAN,
356
+};
357
+
358
+static void gicv3_arm_its_realize(DeviceState *dev, Error **errp)
359
+{
360
+ GICv3ITSState *s = ARM_GICV3_ITS_COMMON(dev);
361
+ int i;
362
+
363
+ for (i = 0; i < s->gicv3->num_cpu; i++) {
364
+ if (!(s->gicv3->cpu[i].gicr_typer & GICR_TYPER_PLPIS)) {
365
+ error_setg(errp, "Physical LPI not supported by CPU %d", i);
366
+ return;
367
+ }
56
+ }
368
+ }
57
+ }
369
+
58
370
+ gicv3_its_init_mmio(s, &gicv3_its_control_ops, &gicv3_its_translation_ops);
59
/*
371
+
60
* Here descaddr is the final physical address, and attributes
372
+ /* set the ITS default features supported */
373
+ s->typer = FIELD_DP64(s->typer, GITS_TYPER, PHYSICAL,
374
+ GITS_TYPE_PHYSICAL);
375
+ s->typer = FIELD_DP64(s->typer, GITS_TYPER, ITT_ENTRY_SIZE,
376
+ ITS_ITT_ENTRY_SIZE - 1);
377
+ s->typer = FIELD_DP64(s->typer, GITS_TYPER, IDBITS, ITS_IDBITS);
378
+ s->typer = FIELD_DP64(s->typer, GITS_TYPER, DEVBITS, ITS_DEVBITS);
379
+ s->typer = FIELD_DP64(s->typer, GITS_TYPER, CIL, 1);
380
+ s->typer = FIELD_DP64(s->typer, GITS_TYPER, CIDBITS, ITS_CIDBITS);
381
+}
382
+
383
+static void gicv3_its_reset(DeviceState *dev)
384
+{
385
+ GICv3ITSState *s = ARM_GICV3_ITS_COMMON(dev);
386
+ GICv3ITSClass *c = ARM_GICV3_ITS_GET_CLASS(s);
387
+
388
+ c->parent_reset(dev);
389
+
390
+ /* Quiescent bit reset to 1 */
391
+ s->ctlr = FIELD_DP32(s->ctlr, GITS_CTLR, QUIESCENT, 1);
392
+
393
+ /*
394
+ * setting GITS_BASER0.Type = 0b001 (Device)
395
+ * GITS_BASER1.Type = 0b100 (Collection Table)
396
+ * GITS_BASER<n>.Type,where n = 3 to 7 are 0b00 (Unimplemented)
397
+ * GITS_BASER<0,1>.Page_Size = 64KB
398
+ * and default translation table entry size to 16 bytes
399
+ */
400
+ s->baser[0] = FIELD_DP64(s->baser[0], GITS_BASER, TYPE,
401
+ GITS_BASER_TYPE_DEVICE);
402
+ s->baser[0] = FIELD_DP64(s->baser[0], GITS_BASER, PAGESIZE,
403
+ GITS_BASER_PAGESIZE_64K);
404
+ s->baser[0] = FIELD_DP64(s->baser[0], GITS_BASER, ENTRYSIZE,
405
+ GITS_DTE_SIZE - 1);
406
+
407
+ s->baser[1] = FIELD_DP64(s->baser[1], GITS_BASER, TYPE,
408
+ GITS_BASER_TYPE_COLLECTION);
409
+ s->baser[1] = FIELD_DP64(s->baser[1], GITS_BASER, PAGESIZE,
410
+ GITS_BASER_PAGESIZE_64K);
411
+ s->baser[1] = FIELD_DP64(s->baser[1], GITS_BASER, ENTRYSIZE,
412
+ GITS_CTE_SIZE - 1);
413
+}
414
+
415
+static Property gicv3_its_props[] = {
416
+ DEFINE_PROP_LINK("parent-gicv3", GICv3ITSState, gicv3, "arm-gicv3",
417
+ GICv3State *),
418
+ DEFINE_PROP_END_OF_LIST(),
419
+};
420
+
421
+static void gicv3_its_class_init(ObjectClass *klass, void *data)
422
+{
423
+ DeviceClass *dc = DEVICE_CLASS(klass);
424
+ GICv3ITSClass *ic = ARM_GICV3_ITS_CLASS(klass);
425
+
426
+ dc->realize = gicv3_arm_its_realize;
427
+ device_class_set_props(dc, gicv3_its_props);
428
+ device_class_set_parent_reset(dc, gicv3_its_reset, &ic->parent_reset);
429
+}
430
+
431
+static const TypeInfo gicv3_its_info = {
432
+ .name = TYPE_ARM_GICV3_ITS,
433
+ .parent = TYPE_ARM_GICV3_ITS_COMMON,
434
+ .instance_size = sizeof(GICv3ITSState),
435
+ .class_init = gicv3_its_class_init,
436
+ .class_size = sizeof(GICv3ITSClass),
437
+};
438
+
439
+static void gicv3_its_register_types(void)
440
+{
441
+ type_register_static(&gicv3_its_info);
442
+}
443
+
444
+type_init(gicv3_its_register_types)
445
diff --git a/hw/intc/arm_gicv3_its_common.c b/hw/intc/arm_gicv3_its_common.c
446
index XXXXXXX..XXXXXXX 100644
447
--- a/hw/intc/arm_gicv3_its_common.c
448
+++ b/hw/intc/arm_gicv3_its_common.c
449
@@ -XXX,XX +XXX,XX @@ static int gicv3_its_post_load(void *opaque, int version_id)
450
451
static const VMStateDescription vmstate_its = {
452
.name = "arm_gicv3_its",
453
+ .version_id = 1,
454
+ .minimum_version_id = 1,
455
.pre_save = gicv3_its_pre_save,
456
.post_load = gicv3_its_post_load,
457
.priority = MIG_PRI_GICV3_ITS,
458
@@ -XXX,XX +XXX,XX @@ static const MemoryRegionOps gicv3_its_trans_ops = {
459
.endianness = DEVICE_NATIVE_ENDIAN,
460
};
461
462
-void gicv3_its_init_mmio(GICv3ITSState *s, const MemoryRegionOps *ops)
463
+void gicv3_its_init_mmio(GICv3ITSState *s, const MemoryRegionOps *ops,
464
+ const MemoryRegionOps *tops)
465
{
466
SysBusDevice *sbd = SYS_BUS_DEVICE(s);
467
468
memory_region_init_io(&s->iomem_its_cntrl, OBJECT(s), ops, s,
469
"control", ITS_CONTROL_SIZE);
470
memory_region_init_io(&s->iomem_its_translation, OBJECT(s),
471
- &gicv3_its_trans_ops, s,
472
+ tops ? tops : &gicv3_its_trans_ops, s,
473
"translation", ITS_TRANS_SIZE);
474
475
/* Our two regions are always adjacent, therefore we now combine them
476
diff --git a/hw/intc/arm_gicv3_its_kvm.c b/hw/intc/arm_gicv3_its_kvm.c
477
index XXXXXXX..XXXXXXX 100644
478
--- a/hw/intc/arm_gicv3_its_kvm.c
479
+++ b/hw/intc/arm_gicv3_its_kvm.c
480
@@ -XXX,XX +XXX,XX @@ static void kvm_arm_its_realize(DeviceState *dev, Error **errp)
481
kvm_arm_register_device(&s->iomem_its_cntrl, -1, KVM_DEV_ARM_VGIC_GRP_ADDR,
482
KVM_VGIC_ITS_ADDR_TYPE, s->dev_fd, 0);
483
484
- gicv3_its_init_mmio(s, NULL);
485
+ gicv3_its_init_mmio(s, NULL, NULL);
486
487
if (!kvm_device_check_attr(s->dev_fd, KVM_DEV_ARM_VGIC_GRP_ITS_REGS,
488
GITS_CTLR)) {
489
diff --git a/hw/intc/meson.build b/hw/intc/meson.build
490
index XXXXXXX..XXXXXXX 100644
491
--- a/hw/intc/meson.build
492
+++ b/hw/intc/meson.build
493
@@ -XXX,XX +XXX,XX @@ softmmu_ss.add(when: 'CONFIG_ARM_GIC', if_true: files(
494
'arm_gicv3_dist.c',
495
'arm_gicv3_its_common.c',
496
'arm_gicv3_redist.c',
497
+ 'arm_gicv3_its.c',
498
))
499
softmmu_ss.add(when: 'CONFIG_ETRAXFS', if_true: files('etraxfs_pic.c'))
500
softmmu_ss.add(when: 'CONFIG_HEATHROW_PIC', if_true: files('heathrow_pic.c'))
501
--
61
--
502
2.20.1
62
2.25.1
503
63
504
64
diff view generated by jsdifflib
1
From: Bin Meng <bmeng.cn@gmail.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Currently the clock/reset check is done in uart_receive(), but we
3
Perform the atomic update for hardware management of the access flag.
4
can move the check to uart_can_receive() which is earlier.
5
4
6
Signed-off-by: Bin Meng <bmeng.cn@gmail.com>
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
7
Message-id: 20221024051851.3074715-13-richard.henderson@linaro.org
9
Message-id: 20210901124521.30599-4-bmeng.cn@gmail.com
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
9
---
12
hw/char/cadence_uart.c | 17 ++++++++++-------
10
docs/system/arm/emulation.rst | 1 +
13
1 file changed, 10 insertions(+), 7 deletions(-)
11
target/arm/cpu64.c | 1 +
12
target/arm/ptw.c | 176 +++++++++++++++++++++++++++++-----
13
3 files changed, 156 insertions(+), 22 deletions(-)
14
14
15
diff --git a/hw/char/cadence_uart.c b/hw/char/cadence_uart.c
15
diff --git a/docs/system/arm/emulation.rst b/docs/system/arm/emulation.rst
16
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
17
--- a/hw/char/cadence_uart.c
17
--- a/docs/system/arm/emulation.rst
18
+++ b/hw/char/cadence_uart.c
18
+++ b/docs/system/arm/emulation.rst
19
@@ -XXX,XX +XXX,XX @@ static void uart_parameters_setup(CadenceUARTState *s)
19
@@ -XXX,XX +XXX,XX @@ the following architecture extensions:
20
static int uart_can_receive(void *opaque)
20
- FEAT_FlagM (Flag manipulation instructions v2)
21
- FEAT_FlagM2 (Enhancements to flag manipulation instructions)
22
- FEAT_GTG (Guest translation granule size)
23
+- FEAT_HAFDBS (Hardware management of the access flag and dirty bit state)
24
- FEAT_HCX (Support for the HCRX_EL2 register)
25
- FEAT_HPDS (Hierarchical permission disables)
26
- FEAT_I8MM (AArch64 Int8 matrix multiplication instructions)
27
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
28
index XXXXXXX..XXXXXXX 100644
29
--- a/target/arm/cpu64.c
30
+++ b/target/arm/cpu64.c
31
@@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj)
32
cpu->isar.id_aa64mmfr0 = t;
33
34
t = cpu->isar.id_aa64mmfr1;
35
+ t = FIELD_DP64(t, ID_AA64MMFR1, HAFDBS, 1); /* FEAT_HAFDBS, AF only */
36
t = FIELD_DP64(t, ID_AA64MMFR1, VMIDBITS, 2); /* FEAT_VMID16 */
37
t = FIELD_DP64(t, ID_AA64MMFR1, VH, 1); /* FEAT_VHE */
38
t = FIELD_DP64(t, ID_AA64MMFR1, HPDS, 1); /* FEAT_HPDS */
39
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
40
index XXXXXXX..XXXXXXX 100644
41
--- a/target/arm/ptw.c
42
+++ b/target/arm/ptw.c
43
@@ -XXX,XX +XXX,XX @@ typedef struct S1Translate {
44
bool in_secure;
45
bool in_debug;
46
bool out_secure;
47
+ bool out_rw;
48
bool out_be;
49
+ hwaddr out_virt;
50
hwaddr out_phys;
51
void *out_host;
52
} S1Translate;
53
@@ -XXX,XX +XXX,XX @@ static bool S1_ptw_translate(CPUARMState *env, S1Translate *ptw,
54
uint8_t pte_attrs;
55
bool pte_secure;
56
57
+ ptw->out_virt = addr;
58
+
59
if (unlikely(ptw->in_debug)) {
60
/*
61
* From gdbstub, do not use softmmu so that we don't modify the
62
@@ -XXX,XX +XXX,XX @@ static bool S1_ptw_translate(CPUARMState *env, S1Translate *ptw,
63
pte_secure = is_secure;
64
}
65
ptw->out_host = NULL;
66
+ ptw->out_rw = false;
67
} else {
68
CPUTLBEntryFull *full;
69
int flags;
70
@@ -XXX,XX +XXX,XX @@ static bool S1_ptw_translate(CPUARMState *env, S1Translate *ptw,
71
goto fail;
72
}
73
ptw->out_phys = full->phys_addr;
74
+ ptw->out_rw = full->prot & PROT_WRITE;
75
pte_attrs = full->pte_attrs;
76
pte_secure = full->attrs.secure;
77
}
78
@@ -XXX,XX +XXX,XX @@ static uint32_t arm_ldl_ptw(CPUARMState *env, S1Translate *ptw,
79
ARMMMUFaultInfo *fi)
21
{
80
{
22
CadenceUARTState *s = opaque;
81
CPUState *cs = env_cpu(env);
23
- int ret = MAX(CADENCE_UART_RX_FIFO_SIZE, CADENCE_UART_TX_FIFO_SIZE);
82
+ void *host = ptw->out_host;
24
- uint32_t ch_mode = s->r[R_MR] & UART_MR_CHMODE;
83
uint32_t data;
25
+ int ret;
84
26
+ uint32_t ch_mode;
85
- if (likely(ptw->out_host)) {
27
+
86
+ if (likely(host)) {
28
+ /* ignore characters when unclocked or in reset */
87
/* Page tables are in RAM, and we have the host address. */
29
+ if (!clock_is_enabled(s->refclk) || device_is_in_reset(DEVICE(s))) {
88
+ data = qatomic_read((uint32_t *)host);
89
if (ptw->out_be) {
90
- data = ldl_be_p(ptw->out_host);
91
+ data = be32_to_cpu(data);
92
} else {
93
- data = ldl_le_p(ptw->out_host);
94
+ data = le32_to_cpu(data);
95
}
96
} else {
97
/* Page tables are in MMIO. */
98
@@ -XXX,XX +XXX,XX @@ static uint64_t arm_ldq_ptw(CPUARMState *env, S1Translate *ptw,
99
ARMMMUFaultInfo *fi)
100
{
101
CPUState *cs = env_cpu(env);
102
+ void *host = ptw->out_host;
103
uint64_t data;
104
105
- if (likely(ptw->out_host)) {
106
+ if (likely(host)) {
107
/* Page tables are in RAM, and we have the host address. */
108
+#ifdef CONFIG_ATOMIC64
109
+ data = qatomic_read__nocheck((uint64_t *)host);
110
if (ptw->out_be) {
111
- data = ldq_be_p(ptw->out_host);
112
+ data = be64_to_cpu(data);
113
} else {
114
- data = ldq_le_p(ptw->out_host);
115
+ data = le64_to_cpu(data);
116
}
117
+#else
118
+ if (ptw->out_be) {
119
+ data = ldq_be_p(host);
120
+ } else {
121
+ data = ldq_le_p(host);
122
+ }
123
+#endif
124
} else {
125
/* Page tables are in MMIO. */
126
MemTxAttrs attrs = { .secure = ptw->out_secure };
127
@@ -XXX,XX +XXX,XX @@ static uint64_t arm_ldq_ptw(CPUARMState *env, S1Translate *ptw,
128
return data;
129
}
130
131
+static uint64_t arm_casq_ptw(CPUARMState *env, uint64_t old_val,
132
+ uint64_t new_val, S1Translate *ptw,
133
+ ARMMMUFaultInfo *fi)
134
+{
135
+ uint64_t cur_val;
136
+ void *host = ptw->out_host;
137
+
138
+ if (unlikely(!host)) {
139
+ fi->type = ARMFault_UnsuppAtomicUpdate;
140
+ fi->s1ptw = true;
30
+ return 0;
141
+ return 0;
31
+ }
142
+ }
32
+
143
+
33
+ ret = MAX(CADENCE_UART_RX_FIFO_SIZE, CADENCE_UART_TX_FIFO_SIZE);
144
+ /*
34
+ ch_mode = s->r[R_MR] & UART_MR_CHMODE;
145
+ * Raising a stage2 Protection fault for an atomic update to a read-only
35
146
+ * page is delayed until it is certain that there is a change to make.
36
if (ch_mode == NORMAL_MODE || ch_mode == ECHO_MODE) {
147
+ */
37
ret = MIN(ret, CADENCE_UART_RX_FIFO_SIZE - s->rx_count);
148
+ if (unlikely(!ptw->out_rw)) {
38
@@ -XXX,XX +XXX,XX @@ static void uart_receive(void *opaque, const uint8_t *buf, int size)
149
+ int flags;
39
CadenceUARTState *s = opaque;
150
+ void *discard;
40
uint32_t ch_mode = s->r[R_MR] & UART_MR_CHMODE;
151
+
41
152
+ env->tlb_fi = fi;
42
- /* ignore characters when unclocked or in reset */
153
+ flags = probe_access_flags(env, ptw->out_virt, MMU_DATA_STORE,
43
- if (!clock_is_enabled(s->refclk) || device_is_in_reset(DEVICE(s))) {
154
+ arm_to_core_mmu_idx(ptw->in_ptw_idx),
44
- return;
155
+ true, &discard, 0);
156
+ env->tlb_fi = NULL;
157
+
158
+ if (unlikely(flags & TLB_INVALID_MASK)) {
159
+ assert(fi->type != ARMFault_None);
160
+ fi->s2addr = ptw->out_virt;
161
+ fi->stage2 = true;
162
+ fi->s1ptw = true;
163
+ fi->s1ns = !ptw->in_secure;
164
+ return 0;
165
+ }
166
+
167
+ /* In case CAS mismatches and we loop, remember writability. */
168
+ ptw->out_rw = true;
169
+ }
170
+
171
+#ifdef CONFIG_ATOMIC64
172
+ if (ptw->out_be) {
173
+ old_val = cpu_to_be64(old_val);
174
+ new_val = cpu_to_be64(new_val);
175
+ cur_val = qatomic_cmpxchg__nocheck((uint64_t *)host, old_val, new_val);
176
+ cur_val = be64_to_cpu(cur_val);
177
+ } else {
178
+ old_val = cpu_to_le64(old_val);
179
+ new_val = cpu_to_le64(new_val);
180
+ cur_val = qatomic_cmpxchg__nocheck((uint64_t *)host, old_val, new_val);
181
+ cur_val = le64_to_cpu(cur_val);
182
+ }
183
+#else
184
+ /*
185
+ * We can't support the full 64-bit atomic cmpxchg on the host.
186
+ * Because this is only used for FEAT_HAFDBS, which is only for AA64,
187
+ * we know that TCG_OVERSIZED_GUEST is set, which means that we are
188
+ * running in round-robin mode and could only race with dma i/o.
189
+ */
190
+#ifndef TCG_OVERSIZED_GUEST
191
+# error "Unexpected configuration"
192
+#endif
193
+ bool locked = qemu_mutex_iothread_locked();
194
+ if (!locked) {
195
+ qemu_mutex_lock_iothread();
196
+ }
197
+ if (ptw->out_be) {
198
+ cur_val = ldq_be_p(host);
199
+ if (cur_val == old_val) {
200
+ stq_be_p(host, new_val);
201
+ }
202
+ } else {
203
+ cur_val = ldq_le_p(host);
204
+ if (cur_val == old_val) {
205
+ stq_le_p(host, new_val);
206
+ }
207
+ }
208
+ if (!locked) {
209
+ qemu_mutex_unlock_iothread();
210
+ }
211
+#endif
212
+
213
+ return cur_val;
214
+}
215
+
216
static bool get_level1_table_address(CPUARMState *env, ARMMMUIdx mmu_idx,
217
uint32_t *table, uint32_t address)
218
{
219
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
220
uint32_t el = regime_el(env, mmu_idx);
221
uint64_t descaddrmask;
222
bool aarch64 = arm_el_is_aa64(env, el);
223
- uint64_t descriptor;
224
+ uint64_t descriptor, new_descriptor;
225
bool nstable;
226
227
/* TODO: This code does not support shareability levels. */
228
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
229
if (fi->type != ARMFault_None) {
230
goto do_fault;
231
}
232
+ new_descriptor = descriptor;
233
234
+ restart_atomic_update:
235
if (!(descriptor & 1) || (!(descriptor & 2) && (level == 3))) {
236
/* Invalid, or the Reserved level 3 encoding */
237
goto do_translation_fault;
238
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
239
* to give a correct page or table address, the address field
240
* in a block descriptor is smaller; so we need to explicitly
241
* clear the lower bits here before ORing in the low vaddr bits.
242
+ *
243
+ * Afterward, descaddr is the final physical address.
244
*/
245
page_size = (1ULL << ((stride * (4 - level)) + 3));
246
descaddr &= ~(hwaddr)(page_size - 1);
247
descaddr |= (address & (page_size - 1));
248
249
+ if (likely(!ptw->in_debug)) {
250
+ /*
251
+ * Access flag.
252
+ * If HA is enabled, prepare to update the descriptor below.
253
+ * Otherwise, pass the access fault on to software.
254
+ */
255
+ if (!(descriptor & (1 << 10))) {
256
+ if (param.ha) {
257
+ new_descriptor |= 1 << 10; /* AF */
258
+ } else {
259
+ fi->type = ARMFault_AccessFlag;
260
+ goto do_fault;
261
+ }
262
+ }
263
+ }
264
+
265
/*
266
- * Extract attributes from the descriptor, and apply table descriptors.
267
- * Stage 2 table descriptors do not include any attribute fields.
268
- * HPD disables all the table attributes except NSTable.
269
+ * Extract attributes from the (modified) descriptor, and apply
270
+ * table descriptors. Stage 2 table descriptors do not include
271
+ * any attribute fields. HPD disables all the table attributes
272
+ * except NSTable.
273
*/
274
- attrs = descriptor & (MAKE_64BIT_MASK(2, 10) | MAKE_64BIT_MASK(50, 14));
275
+ attrs = new_descriptor & (MAKE_64BIT_MASK(2, 10) | MAKE_64BIT_MASK(50, 14));
276
if (!regime_is_stage2(mmu_idx)) {
277
attrs |= nstable << 5; /* NS */
278
if (!param.hpd) {
279
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
280
}
281
}
282
283
- /*
284
- * Here descaddr is the final physical address, and attributes
285
- * are all in attrs.
286
- */
287
- if ((attrs & (1 << 10)) == 0) {
288
- /* Access flag */
289
- fi->type = ARMFault_AccessFlag;
290
- goto do_fault;
45
- }
291
- }
46
-
292
-
47
if (ch_mode == NORMAL_MODE || ch_mode == ECHO_MODE) {
293
ap = extract32(attrs, 6, 2);
48
uart_write_rx_fifo(opaque, buf, size);
294
-
295
if (regime_is_stage2(mmu_idx)) {
296
ns = mmu_idx == ARMMMUIdx_Stage2;
297
xn = extract64(attrs, 53, 2);
298
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
299
goto do_fault;
49
}
300
}
301
302
+ /* If FEAT_HAFDBS has made changes, update the PTE. */
303
+ if (new_descriptor != descriptor) {
304
+ new_descriptor = arm_casq_ptw(env, descriptor, new_descriptor, ptw, fi);
305
+ if (fi->type != ARMFault_None) {
306
+ goto do_fault;
307
+ }
308
+ /*
309
+ * I_YZSVV says that if the in-memory descriptor has changed,
310
+ * then we must use the information in that new value
311
+ * (which might include a different output address, different
312
+ * attributes, or generate a fault).
313
+ * Restart the handling of the descriptor value from scratch.
314
+ */
315
+ if (new_descriptor != descriptor) {
316
+ descriptor = new_descriptor;
317
+ goto restart_atomic_update;
318
+ }
319
+ }
320
+
321
if (ns) {
322
/*
323
* The NS bit will (as required by the architecture) have no effect if
50
--
324
--
51
2.20.1
325
2.25.1
52
53
diff view generated by jsdifflib
New patch
1
From: Richard Henderson <richard.henderson@linaro.org>
1
2
3
Perform the atomic update for hardware management of the dirty bit.
4
5
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
6
Message-id: 20221024051851.3074715-14-richard.henderson@linaro.org
7
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
---
9
target/arm/cpu64.c | 2 +-
10
target/arm/ptw.c | 16 ++++++++++++++++
11
2 files changed, 17 insertions(+), 1 deletion(-)
12
13
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
14
index XXXXXXX..XXXXXXX 100644
15
--- a/target/arm/cpu64.c
16
+++ b/target/arm/cpu64.c
17
@@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj)
18
cpu->isar.id_aa64mmfr0 = t;
19
20
t = cpu->isar.id_aa64mmfr1;
21
- t = FIELD_DP64(t, ID_AA64MMFR1, HAFDBS, 1); /* FEAT_HAFDBS, AF only */
22
+ t = FIELD_DP64(t, ID_AA64MMFR1, HAFDBS, 2); /* FEAT_HAFDBS */
23
t = FIELD_DP64(t, ID_AA64MMFR1, VMIDBITS, 2); /* FEAT_VMID16 */
24
t = FIELD_DP64(t, ID_AA64MMFR1, VH, 1); /* FEAT_VHE */
25
t = FIELD_DP64(t, ID_AA64MMFR1, HPDS, 1); /* FEAT_HPDS */
26
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
27
index XXXXXXX..XXXXXXX 100644
28
--- a/target/arm/ptw.c
29
+++ b/target/arm/ptw.c
30
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw,
31
goto do_fault;
32
}
33
}
34
+
35
+ /*
36
+ * Dirty Bit.
37
+ * If HD is enabled, pre-emptively set/clear the appropriate AP/S2AP
38
+ * bit for writeback. The actual write protection test may still be
39
+ * overridden by tableattrs, to be merged below.
40
+ */
41
+ if (param.hd
42
+ && extract64(descriptor, 51, 1) /* DBM */
43
+ && access_type == MMU_DATA_STORE) {
44
+ if (regime_is_stage2(mmu_idx)) {
45
+ new_descriptor |= 1ull << 7; /* set S2AP[1] */
46
+ } else {
47
+ new_descriptor &= ~(1ull << 7); /* clear AP[2] */
48
+ }
49
+ }
50
}
51
52
/*
53
--
54
2.25.1
diff view generated by jsdifflib
1
From: Shashi Mallela <shashi.mallela@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Added properties to enable ITS feature and define qemu system
3
We had only been reporting the stage2 page size. This causes
4
address space memory in gicv3 common,setup distributor and
4
problems if stage1 is using a larger page size (16k, 2M, etc),
5
redistributor registers to indicate LPI support.
5
but stage2 is using a smaller page size, because cputlb does
6
not set large_page_{addr,mask} properly.
6
7
7
Signed-off-by: Shashi Mallela <shashi.mallela@linaro.org>
8
Fix by using the max of the two page sizes.
9
10
Reported-by: Marc Zyngier <maz@kernel.org>
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Tested-by: Neil Armstrong <narmstrong@baylibre.com>
12
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
10
Message-id: 20210910143951.92242-6-shashi.mallela@linaro.org
13
Message-id: 20221024051851.3074715-15-richard.henderson@linaro.org
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
15
---
13
hw/intc/gicv3_internal.h | 2 ++
16
target/arm/ptw.c | 11 ++++++++++-
14
include/hw/intc/arm_gicv3_common.h | 1 +
17
1 file changed, 10 insertions(+), 1 deletion(-)
15
hw/intc/arm_gicv3_common.c | 12 ++++++++++++
16
hw/intc/arm_gicv3_dist.c | 5 ++++-
17
hw/intc/arm_gicv3_redist.c | 12 +++++++++---
18
5 files changed, 28 insertions(+), 4 deletions(-)
19
18
20
diff --git a/hw/intc/gicv3_internal.h b/hw/intc/gicv3_internal.h
19
diff --git a/target/arm/ptw.c b/target/arm/ptw.c
21
index XXXXXXX..XXXXXXX 100644
20
index XXXXXXX..XXXXXXX 100644
22
--- a/hw/intc/gicv3_internal.h
21
--- a/target/arm/ptw.c
23
+++ b/hw/intc/gicv3_internal.h
22
+++ b/target/arm/ptw.c
24
@@ -XXX,XX +XXX,XX @@
23
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_twostage(CPUARMState *env, S1Translate *ptw,
25
#define GICD_CTLR_E1NWF (1U << 7)
24
ARMMMUFaultInfo *fi)
26
#define GICD_CTLR_RWP (1U << 31)
25
{
27
26
hwaddr ipa;
28
+#define GICD_TYPER_LPIS_SHIFT 17
27
- int s1_prot;
29
+
28
+ int s1_prot, s1_lgpgsz;
30
/* 16 bits EventId */
29
bool is_secure = ptw->in_secure;
31
#define GICD_TYPER_IDBITS 0xf
30
bool ret, ipa_secure, s2walk_secure;
32
31
ARMCacheAttrs cacheattrs1;
33
diff --git a/include/hw/intc/arm_gicv3_common.h b/include/hw/intc/arm_gicv3_common.h
32
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_twostage(CPUARMState *env, S1Translate *ptw,
34
index XXXXXXX..XXXXXXX 100644
33
* Save the stage1 results so that we may merge prot and cacheattrs later.
35
--- a/include/hw/intc/arm_gicv3_common.h
34
*/
36
+++ b/include/hw/intc/arm_gicv3_common.h
35
s1_prot = result->f.prot;
37
@@ -XXX,XX +XXX,XX @@ struct GICv3State {
36
+ s1_lgpgsz = result->f.lg_page_size;
38
uint32_t num_cpu;
37
cacheattrs1 = result->cacheattrs;
39
uint32_t num_irq;
38
memset(result, 0, sizeof(*result));
40
uint32_t revision;
39
41
+ bool lpi_enable;
40
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_twostage(CPUARMState *env, S1Translate *ptw,
42
bool security_extn;
41
return ret;
43
bool irq_reset_nonsecure;
44
bool gicd_no_migration_shift_bug;
45
diff --git a/hw/intc/arm_gicv3_common.c b/hw/intc/arm_gicv3_common.c
46
index XXXXXXX..XXXXXXX 100644
47
--- a/hw/intc/arm_gicv3_common.c
48
+++ b/hw/intc/arm_gicv3_common.c
49
@@ -XXX,XX +XXX,XX @@ static void arm_gicv3_common_realize(DeviceState *dev, Error **errp)
50
return;
51
}
42
}
52
43
53
+ if (s->lpi_enable && !s->dma) {
44
+ /*
54
+ error_setg(errp, "Redist-ITS: Guest 'sysmem' reference link not set");
45
+ * Use the maximum of the S1 & S2 page size, so that invalidation
55
+ return;
46
+ * of pages > TARGET_PAGE_SIZE works correctly.
47
+ */
48
+ if (result->f.lg_page_size < s1_lgpgsz) {
49
+ result->f.lg_page_size = s1_lgpgsz;
56
+ }
50
+ }
57
+
51
+
58
s->cpu = g_new0(GICv3CPUState, s->num_cpu);
52
/* Combine the S1 and S2 cache attributes. */
59
53
hcr = arm_hcr_el2_eff_secstate(env, is_secure);
60
for (i = 0; i < s->num_cpu; i++) {
54
if (hcr & HCR_DC) {
61
@@ -XXX,XX +XXX,XX @@ static void arm_gicv3_common_realize(DeviceState *dev, Error **errp)
62
(1 << 24) |
63
(i << 8) |
64
(last << 4);
65
+
66
+ if (s->lpi_enable) {
67
+ s->cpu[i].gicr_typer |= GICR_TYPER_PLPIS;
68
+ }
69
}
70
}
71
72
@@ -XXX,XX +XXX,XX @@ static Property arm_gicv3_common_properties[] = {
73
DEFINE_PROP_UINT32("num-cpu", GICv3State, num_cpu, 1),
74
DEFINE_PROP_UINT32("num-irq", GICv3State, num_irq, 32),
75
DEFINE_PROP_UINT32("revision", GICv3State, revision, 3),
76
+ DEFINE_PROP_BOOL("has-lpi", GICv3State, lpi_enable, 0),
77
DEFINE_PROP_BOOL("has-security-extensions", GICv3State, security_extn, 0),
78
DEFINE_PROP_ARRAY("redist-region-count", GICv3State, nb_redist_regions,
79
redist_region_count, qdev_prop_uint32, uint32_t),
80
+ DEFINE_PROP_LINK("sysmem", GICv3State, dma, TYPE_MEMORY_REGION,
81
+ MemoryRegion *),
82
DEFINE_PROP_END_OF_LIST(),
83
};
84
85
diff --git a/hw/intc/arm_gicv3_dist.c b/hw/intc/arm_gicv3_dist.c
86
index XXXXXXX..XXXXXXX 100644
87
--- a/hw/intc/arm_gicv3_dist.c
88
+++ b/hw/intc/arm_gicv3_dist.c
89
@@ -XXX,XX +XXX,XX @@ static bool gicd_readl(GICv3State *s, hwaddr offset,
90
* A3V == 1 (non-zero values of Affinity level 3 supported)
91
* IDbits == 0xf (we support 16-bit interrupt identifiers)
92
* DVIS == 0 (Direct virtual LPI injection not supported)
93
- * LPIS == 0 (LPIs not supported)
94
+ * LPIS == 1 (LPIs are supported if affinity routing is enabled)
95
+ * num_LPIs == 0b00000 (bits [15:11],Number of LPIs as indicated
96
+ * by GICD_TYPER.IDbits)
97
* MBIS == 0 (message-based SPIs not supported)
98
* SecurityExtn == 1 if security extns supported
99
* CPUNumber == 0 since for us ARE is always 1
100
@@ -XXX,XX +XXX,XX @@ static bool gicd_readl(GICv3State *s, hwaddr offset,
101
bool sec_extn = !(s->gicd_ctlr & GICD_CTLR_DS);
102
103
*data = (1 << 25) | (1 << 24) | (sec_extn << 10) |
104
+ (s->lpi_enable << GICD_TYPER_LPIS_SHIFT) |
105
(0xf << 19) | itlinesnumber;
106
return true;
107
}
108
diff --git a/hw/intc/arm_gicv3_redist.c b/hw/intc/arm_gicv3_redist.c
109
index XXXXXXX..XXXXXXX 100644
110
--- a/hw/intc/arm_gicv3_redist.c
111
+++ b/hw/intc/arm_gicv3_redist.c
112
@@ -XXX,XX +XXX,XX @@ static MemTxResult gicr_writel(GICv3CPUState *cs, hwaddr offset,
113
case GICR_CTLR:
114
/* For our implementation, GICR_TYPER.DPGS is 0 and so all
115
* the DPG bits are RAZ/WI. We don't do anything asynchronously,
116
- * so UWP and RWP are RAZ/WI. And GICR_TYPER.LPIS is 0 (we don't
117
- * implement LPIs) so Enable_LPIs is RES0. So there are no writable
118
- * bits for us.
119
+ * so UWP and RWP are RAZ/WI. GICR_TYPER.LPIS is 1 (we
120
+ * implement LPIs) so Enable_LPIs is programmable.
121
*/
122
+ if (cs->gicr_typer & GICR_TYPER_PLPIS) {
123
+ if (value & GICR_CTLR_ENABLE_LPIS) {
124
+ cs->gicr_ctlr |= GICR_CTLR_ENABLE_LPIS;
125
+ } else {
126
+ cs->gicr_ctlr &= ~GICR_CTLR_ENABLE_LPIS;
127
+ }
128
+ }
129
return MEMTX_OK;
130
case GICR_STATUSR:
131
/* RAZ/WI for our implementation */
132
--
55
--
133
2.20.1
56
2.25.1
134
135
diff view generated by jsdifflib
1
The various MPS2 boards have multiple I2C buses: typically a bus
1
From: "Jason A. Donenfeld" <Jason@zx2c4.com>
2
dedicated to the audio configuration, one for the LCD touchscreen
3
controller, one for a DDR4 EEPROM, and two which are connected to the
4
external Shield expansion connector. Mark the buses which are used
5
only for board-internal devices as 'full' so that if the user creates
6
i2c devices on the commandline without specifying a bus name then
7
they will be connected to the I2C controller used for the Shield
8
connector, where guest software will expect them.
9
2
3
Snapshot loading only expects to call deterministic handlers, not
4
non-deterministic ones. So introduce a way of registering handlers that
5
won't be called when reseting for snapshots.
6
7
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
8
Message-id: 20221025004327.568476-2-Jason@zx2c4.com
9
[PMM: updated json doc comment with Markus' text; fixed
10
checkpatch style nit]
11
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
12
Message-id: 20210903151435.22379-4-peter.maydell@linaro.org
13
---
13
---
14
hw/arm/mps2-tz.c | 57 ++++++++++++++++++++++++++++++++++++------------
14
qapi/run-state.json | 6 +++++-
15
1 file changed, 43 insertions(+), 14 deletions(-)
15
include/hw/boards.h | 2 +-
16
include/sysemu/reset.h | 5 ++++-
17
hw/arm/aspeed.c | 4 ++--
18
hw/arm/mps2-tz.c | 4 ++--
19
hw/core/reset.c | 17 ++++++++++++++++-
20
hw/hppa/machine.c | 4 ++--
21
hw/i386/microvm.c | 4 ++--
22
hw/i386/pc.c | 6 +++---
23
hw/ppc/pegasos2.c | 4 ++--
24
hw/ppc/pnv.c | 4 ++--
25
hw/ppc/spapr.c | 4 ++--
26
hw/s390x/s390-virtio-ccw.c | 4 ++--
27
migration/savevm.c | 2 +-
28
softmmu/runstate.c | 11 ++++++++---
29
15 files changed, 54 insertions(+), 27 deletions(-)
16
30
31
diff --git a/qapi/run-state.json b/qapi/run-state.json
32
index XXXXXXX..XXXXXXX 100644
33
--- a/qapi/run-state.json
34
+++ b/qapi/run-state.json
35
@@ -XXX,XX +XXX,XX @@
36
# ignores --no-reboot. This is useful for sanitizing
37
# hypercalls on s390 that are used during kexec/kdump/boot
38
#
39
+# @snapshot-load: A snapshot is being loaded by the record & replay
40
+# subsystem. This value is used only within QEMU. It
41
+# doesn't occur in QMP. (since 7.2)
42
+#
43
##
44
{ 'enum': 'ShutdownCause',
45
# Beware, shutdown_caused_by_guest() depends on enumeration order
46
'data': [ 'none', 'host-error', 'host-qmp-quit', 'host-qmp-system-reset',
47
'host-signal', 'host-ui', 'guest-shutdown', 'guest-reset',
48
- 'guest-panic', 'subsystem-reset'] }
49
+ 'guest-panic', 'subsystem-reset', 'snapshot-load'] }
50
51
##
52
# @StatusInfo:
53
diff --git a/include/hw/boards.h b/include/hw/boards.h
54
index XXXXXXX..XXXXXXX 100644
55
--- a/include/hw/boards.h
56
+++ b/include/hw/boards.h
57
@@ -XXX,XX +XXX,XX @@ struct MachineClass {
58
const char *deprecation_reason;
59
60
void (*init)(MachineState *state);
61
- void (*reset)(MachineState *state);
62
+ void (*reset)(MachineState *state, ShutdownCause reason);
63
void (*wakeup)(MachineState *state);
64
int (*kvm_type)(MachineState *machine, const char *arg);
65
66
diff --git a/include/sysemu/reset.h b/include/sysemu/reset.h
67
index XXXXXXX..XXXXXXX 100644
68
--- a/include/sysemu/reset.h
69
+++ b/include/sysemu/reset.h
70
@@ -XXX,XX +XXX,XX @@
71
#ifndef QEMU_SYSEMU_RESET_H
72
#define QEMU_SYSEMU_RESET_H
73
74
+#include "qapi/qapi-events-run-state.h"
75
+
76
typedef void QEMUResetHandler(void *opaque);
77
78
void qemu_register_reset(QEMUResetHandler *func, void *opaque);
79
+void qemu_register_reset_nosnapshotload(QEMUResetHandler *func, void *opaque);
80
void qemu_unregister_reset(QEMUResetHandler *func, void *opaque);
81
-void qemu_devices_reset(void);
82
+void qemu_devices_reset(ShutdownCause reason);
83
84
#endif
85
diff --git a/hw/arm/aspeed.c b/hw/arm/aspeed.c
86
index XXXXXXX..XXXXXXX 100644
87
--- a/hw/arm/aspeed.c
88
+++ b/hw/arm/aspeed.c
89
@@ -XXX,XX +XXX,XX @@ static void aspeed_machine_bletchley_class_init(ObjectClass *oc, void *data)
90
aspeed_soc_num_cpus(amc->soc_name);
91
}
92
93
-static void fby35_reset(MachineState *state)
94
+static void fby35_reset(MachineState *state, ShutdownCause reason)
95
{
96
AspeedMachineState *bmc = ASPEED_MACHINE(state);
97
AspeedGPIOState *gpio = &bmc->soc.gpio;
98
99
- qemu_devices_reset();
100
+ qemu_devices_reset(reason);
101
102
/* Board ID: 7 (Class-1, 4 slots) */
103
object_property_set_bool(OBJECT(gpio), "gpioV4", true, &error_fatal);
17
diff --git a/hw/arm/mps2-tz.c b/hw/arm/mps2-tz.c
104
diff --git a/hw/arm/mps2-tz.c b/hw/arm/mps2-tz.c
18
index XXXXXXX..XXXXXXX 100644
105
index XXXXXXX..XXXXXXX 100644
19
--- a/hw/arm/mps2-tz.c
106
--- a/hw/arm/mps2-tz.c
20
+++ b/hw/arm/mps2-tz.c
107
+++ b/hw/arm/mps2-tz.c
21
@@ -XXX,XX +XXX,XX @@ static qemu_irq get_sse_irq_in(MPS2TZMachineState *mms, int irqno)
108
@@ -XXX,XX +XXX,XX @@ static void mps2_set_remap(Object *obj, const char *value, Error **errp)
22
109
}
23
/* Union describing the device-specific extra data we pass to the devfn. */
110
}
24
typedef union PPCExtraData {
111
25
+ bool i2c_internal;
112
-static void mps2_machine_reset(MachineState *machine)
26
} PPCExtraData;
113
+static void mps2_machine_reset(MachineState *machine, ShutdownCause reason)
27
114
{
28
/* Most of the devices in the AN505 FPGA image sit behind
115
MPS2TZMachineState *mms = MPS2TZ_MACHINE(machine);
29
@@ -XXX,XX +XXX,XX @@ static MemoryRegion *make_i2c(MPS2TZMachineState *mms, void *opaque,
116
30
object_initialize_child(OBJECT(mms), name, i2c, TYPE_ARM_SBCON_I2C);
117
@@ -XXX,XX +XXX,XX @@ static void mps2_machine_reset(MachineState *machine)
31
s = SYS_BUS_DEVICE(i2c);
118
* reset see the correct mapping.
32
sysbus_realize(s, &error_fatal);
119
*/
120
remap_memory(mms, mms->remap);
121
- qemu_devices_reset();
122
+ qemu_devices_reset(reason);
123
}
124
125
static void mps2tz_class_init(ObjectClass *oc, void *data)
126
diff --git a/hw/core/reset.c b/hw/core/reset.c
127
index XXXXXXX..XXXXXXX 100644
128
--- a/hw/core/reset.c
129
+++ b/hw/core/reset.c
130
@@ -XXX,XX +XXX,XX @@ typedef struct QEMUResetEntry {
131
QTAILQ_ENTRY(QEMUResetEntry) entry;
132
QEMUResetHandler *func;
133
void *opaque;
134
+ bool skip_on_snapshot_load;
135
} QEMUResetEntry;
136
137
static QTAILQ_HEAD(, QEMUResetEntry) reset_handlers =
138
@@ -XXX,XX +XXX,XX @@ void qemu_register_reset(QEMUResetHandler *func, void *opaque)
139
QTAILQ_INSERT_TAIL(&reset_handlers, re, entry);
140
}
141
142
+void qemu_register_reset_nosnapshotload(QEMUResetHandler *func, void *opaque)
143
+{
144
+ QEMUResetEntry *re = g_new0(QEMUResetEntry, 1);
33
+
145
+
34
+ /*
146
+ re->func = func;
35
+ * If this is an internal-use-only i2c bus, mark it full
147
+ re->opaque = opaque;
36
+ * so that user-created i2c devices are not plugged into it.
148
+ re->skip_on_snapshot_load = true;
37
+ * If we implement models of any on-board i2c devices that
149
+ QTAILQ_INSERT_TAIL(&reset_handlers, re, entry);
38
+ * plug in to one of the internal-use-only buses, then we will
150
+}
39
+ * need to create and plugging those in here before we mark the
40
+ * bus as full.
41
+ */
42
+ if (extradata->i2c_internal) {
43
+ BusState *qbus = qdev_get_child_bus(DEVICE(i2c), "i2c");
44
+ qbus_mark_full(qbus);
45
+ }
46
+
151
+
47
return sysbus_mmio_get_region(s, 0);
152
void qemu_unregister_reset(QEMUResetHandler *func, void *opaque)
48
}
153
{
49
154
QEMUResetEntry *re;
50
@@ -XXX,XX +XXX,XX @@ static void mps2tz_common_init(MachineState *machine)
155
@@ -XXX,XX +XXX,XX @@ void qemu_unregister_reset(QEMUResetHandler *func, void *opaque)
51
{ "uart2", make_uart, &mms->uart[2], 0x40202000, 0x1000, { 36, 37, 44 } },
156
}
52
{ "uart3", make_uart, &mms->uart[3], 0x40203000, 0x1000, { 38, 39, 45 } },
157
}
53
{ "uart4", make_uart, &mms->uart[4], 0x40204000, 0x1000, { 40, 41, 46 } },
158
54
- { "i2c0", make_i2c, &mms->i2c[0], 0x40207000, 0x1000 },
159
-void qemu_devices_reset(void)
55
- { "i2c1", make_i2c, &mms->i2c[1], 0x40208000, 0x1000 },
160
+void qemu_devices_reset(ShutdownCause reason)
56
- { "i2c2", make_i2c, &mms->i2c[2], 0x4020c000, 0x1000 },
161
{
57
- { "i2c3", make_i2c, &mms->i2c[3], 0x4020d000, 0x1000 },
162
QEMUResetEntry *re, *nre;
58
+ { "i2c0", make_i2c, &mms->i2c[0], 0x40207000, 0x1000, {},
163
59
+ { .i2c_internal = true /* touchscreen */ } },
164
/* reset all devices */
60
+ { "i2c1", make_i2c, &mms->i2c[1], 0x40208000, 0x1000, {},
165
QTAILQ_FOREACH_SAFE(re, &reset_handlers, entry, nre) {
61
+ { .i2c_internal = true /* audio conf */ } },
166
+ if (reason == SHUTDOWN_CAUSE_SNAPSHOT_LOAD &&
62
+ { "i2c2", make_i2c, &mms->i2c[2], 0x4020c000, 0x1000, {},
167
+ re->skip_on_snapshot_load) {
63
+ { .i2c_internal = false /* shield 0 */ } },
168
+ continue;
64
+ { "i2c3", make_i2c, &mms->i2c[3], 0x4020d000, 0x1000, {},
169
+ }
65
+ { .i2c_internal = false /* shield 1 */ } },
170
re->func(re->opaque);
66
},
171
}
67
}, {
172
}
68
.name = "apb_ppcexp2",
173
diff --git a/hw/hppa/machine.c b/hw/hppa/machine.c
69
@@ -XXX,XX +XXX,XX @@ static void mps2tz_common_init(MachineState *machine)
174
index XXXXXXX..XXXXXXX 100644
70
}, {
175
--- a/hw/hppa/machine.c
71
.name = "apb_ppcexp1",
176
+++ b/hw/hppa/machine.c
72
.ports = {
177
@@ -XXX,XX +XXX,XX @@ static void machine_hppa_init(MachineState *machine)
73
- { "i2c0", make_i2c, &mms->i2c[0], 0x41200000, 0x1000 },
178
cpu[0]->env.gr[19] = FW_CFG_IO_BASE;
74
- { "i2c1", make_i2c, &mms->i2c[1], 0x41201000, 0x1000 },
179
}
75
+ { "i2c0", make_i2c, &mms->i2c[0], 0x41200000, 0x1000, {},
180
76
+ { .i2c_internal = true /* touchscreen */ } },
181
-static void hppa_machine_reset(MachineState *ms)
77
+ { "i2c1", make_i2c, &mms->i2c[1], 0x41201000, 0x1000, {},
182
+static void hppa_machine_reset(MachineState *ms, ShutdownCause reason)
78
+ { .i2c_internal = true /* audio conf */ } },
183
{
79
{ "spi0", make_spi, &mms->spi[0], 0x41202000, 0x1000, { 52 } },
184
unsigned int smp_cpus = ms->smp.cpus;
80
{ "spi1", make_spi, &mms->spi[1], 0x41203000, 0x1000, { 53 } },
185
int i;
81
{ "spi2", make_spi, &mms->spi[2], 0x41204000, 0x1000, { 54 } },
186
82
- { "i2c2", make_i2c, &mms->i2c[2], 0x41205000, 0x1000 },
187
- qemu_devices_reset();
83
- { "i2c3", make_i2c, &mms->i2c[3], 0x41206000, 0x1000 },
188
+ qemu_devices_reset(reason);
84
+ { "i2c2", make_i2c, &mms->i2c[2], 0x41205000, 0x1000, {},
189
85
+ { .i2c_internal = false /* shield 0 */ } },
190
/* Start all CPUs at the firmware entry point.
86
+ { "i2c3", make_i2c, &mms->i2c[3], 0x41206000, 0x1000, {},
191
* Monarch CPU will initialize firmware, secondary CPUs
87
+ { .i2c_internal = false /* shield 1 */ } },
192
diff --git a/hw/i386/microvm.c b/hw/i386/microvm.c
88
{ /* port 7 reserved */ },
193
index XXXXXXX..XXXXXXX 100644
89
- { "i2c4", make_i2c, &mms->i2c[4], 0x41208000, 0x1000 },
194
--- a/hw/i386/microvm.c
90
+ { "i2c4", make_i2c, &mms->i2c[4], 0x41208000, 0x1000, {},
195
+++ b/hw/i386/microvm.c
91
+ { .i2c_internal = true /* DDR4 EEPROM */ } },
196
@@ -XXX,XX +XXX,XX @@ static void microvm_machine_state_init(MachineState *machine)
92
},
197
microvm_devices_init(mms);
93
}, {
198
}
94
.name = "apb_ppcexp2",
199
95
@@ -XXX,XX +XXX,XX @@ static void mps2tz_common_init(MachineState *machine)
200
-static void microvm_machine_reset(MachineState *machine)
96
}, {
201
+static void microvm_machine_reset(MachineState *machine, ShutdownCause reason)
97
.name = "apb_ppcexp1",
202
{
98
.ports = {
203
MicrovmMachineState *mms = MICROVM_MACHINE(machine);
99
- { "i2c0", make_i2c, &mms->i2c[0], 0x49200000, 0x1000 },
204
CPUState *cs;
100
- { "i2c1", make_i2c, &mms->i2c[1], 0x49201000, 0x1000 },
205
@@ -XXX,XX +XXX,XX @@ static void microvm_machine_reset(MachineState *machine)
101
+ { "i2c0", make_i2c, &mms->i2c[0], 0x49200000, 0x1000, {},
206
mms->kernel_cmdline_fixed = true;
102
+ { .i2c_internal = true /* touchscreen */ } },
207
}
103
+ { "i2c1", make_i2c, &mms->i2c[1], 0x49201000, 0x1000, {},
208
104
+ { .i2c_internal = true /* audio conf */ } },
209
- qemu_devices_reset();
105
{ "spi0", make_spi, &mms->spi[0], 0x49202000, 0x1000, { 53 } },
210
+ qemu_devices_reset(reason);
106
{ "spi1", make_spi, &mms->spi[1], 0x49203000, 0x1000, { 54 } },
211
107
{ "spi2", make_spi, &mms->spi[2], 0x49204000, 0x1000, { 55 } },
212
CPU_FOREACH(cs) {
108
- { "i2c2", make_i2c, &mms->i2c[2], 0x49205000, 0x1000 },
213
cpu = X86_CPU(cs);
109
- { "i2c3", make_i2c, &mms->i2c[3], 0x49206000, 0x1000 },
214
diff --git a/hw/i386/pc.c b/hw/i386/pc.c
110
+ { "i2c2", make_i2c, &mms->i2c[2], 0x49205000, 0x1000, {},
215
index XXXXXXX..XXXXXXX 100644
111
+ { .i2c_internal = false /* shield 0 */ } },
216
--- a/hw/i386/pc.c
112
+ { "i2c3", make_i2c, &mms->i2c[3], 0x49206000, 0x1000, {},
217
+++ b/hw/i386/pc.c
113
+ { .i2c_internal = false /* shield 1 */ } },
218
@@ -XXX,XX +XXX,XX @@ static void pc_machine_initfn(Object *obj)
114
{ /* port 7 reserved */ },
219
cxl_machine_init(obj, &pcms->cxl_devices_state);
115
- { "i2c4", make_i2c, &mms->i2c[4], 0x49208000, 0x1000 },
220
}
116
+ { "i2c4", make_i2c, &mms->i2c[4], 0x49208000, 0x1000, {},
221
117
+ { .i2c_internal = true /* DDR4 EEPROM */ } },
222
-static void pc_machine_reset(MachineState *machine)
118
},
223
+static void pc_machine_reset(MachineState *machine, ShutdownCause reason)
119
}, {
224
{
120
.name = "apb_ppcexp2",
225
CPUState *cs;
226
X86CPU *cpu;
227
228
- qemu_devices_reset();
229
+ qemu_devices_reset(reason);
230
231
/* Reset APIC after devices have been reset to cancel
232
* any changes that qemu_devices_reset() might have done.
233
@@ -XXX,XX +XXX,XX @@ static void pc_machine_reset(MachineState *machine)
234
static void pc_machine_wakeup(MachineState *machine)
235
{
236
cpu_synchronize_all_states();
237
- pc_machine_reset(machine);
238
+ pc_machine_reset(machine, SHUTDOWN_CAUSE_NONE);
239
cpu_synchronize_all_post_reset();
240
}
241
242
diff --git a/hw/ppc/pegasos2.c b/hw/ppc/pegasos2.c
243
index XXXXXXX..XXXXXXX 100644
244
--- a/hw/ppc/pegasos2.c
245
+++ b/hw/ppc/pegasos2.c
246
@@ -XXX,XX +XXX,XX @@ static void pegasos2_pci_config_write(Pegasos2MachineState *pm, int bus,
247
pegasos2_mv_reg_write(pm, pcicfg + 4, len, val);
248
}
249
250
-static void pegasos2_machine_reset(MachineState *machine)
251
+static void pegasos2_machine_reset(MachineState *machine, ShutdownCause reason)
252
{
253
Pegasos2MachineState *pm = PEGASOS2_MACHINE(machine);
254
void *fdt;
255
uint64_t d[2];
256
int sz;
257
258
- qemu_devices_reset();
259
+ qemu_devices_reset(reason);
260
if (!pm->vof) {
261
return; /* Firmware should set up machine so nothing to do */
262
}
263
diff --git a/hw/ppc/pnv.c b/hw/ppc/pnv.c
264
index XXXXXXX..XXXXXXX 100644
265
--- a/hw/ppc/pnv.c
266
+++ b/hw/ppc/pnv.c
267
@@ -XXX,XX +XXX,XX @@ static void pnv_powerdown_notify(Notifier *n, void *opaque)
268
}
269
}
270
271
-static void pnv_reset(MachineState *machine)
272
+static void pnv_reset(MachineState *machine, ShutdownCause reason)
273
{
274
PnvMachineState *pnv = PNV_MACHINE(machine);
275
IPMIBmc *bmc;
276
void *fdt;
277
278
- qemu_devices_reset();
279
+ qemu_devices_reset(reason);
280
281
/*
282
* The machine should provide by default an internal BMC simulator.
283
diff --git a/hw/ppc/spapr.c b/hw/ppc/spapr.c
284
index XXXXXXX..XXXXXXX 100644
285
--- a/hw/ppc/spapr.c
286
+++ b/hw/ppc/spapr.c
287
@@ -XXX,XX +XXX,XX @@ void spapr_check_mmu_mode(bool guest_radix)
288
}
289
}
290
291
-static void spapr_machine_reset(MachineState *machine)
292
+static void spapr_machine_reset(MachineState *machine, ShutdownCause reason)
293
{
294
SpaprMachineState *spapr = SPAPR_MACHINE(machine);
295
PowerPCCPU *first_ppc_cpu;
296
@@ -XXX,XX +XXX,XX @@ static void spapr_machine_reset(MachineState *machine)
297
spapr_setup_hpt(spapr);
298
}
299
300
- qemu_devices_reset();
301
+ qemu_devices_reset(reason);
302
303
spapr_ovec_cleanup(spapr->ov5_cas);
304
spapr->ov5_cas = spapr_ovec_new();
305
diff --git a/hw/s390x/s390-virtio-ccw.c b/hw/s390x/s390-virtio-ccw.c
306
index XXXXXXX..XXXXXXX 100644
307
--- a/hw/s390x/s390-virtio-ccw.c
308
+++ b/hw/s390x/s390-virtio-ccw.c
309
@@ -XXX,XX +XXX,XX @@ static void s390_pv_prepare_reset(S390CcwMachineState *ms)
310
s390_pv_prep_reset();
311
}
312
313
-static void s390_machine_reset(MachineState *machine)
314
+static void s390_machine_reset(MachineState *machine, ShutdownCause reason)
315
{
316
S390CcwMachineState *ms = S390_CCW_MACHINE(machine);
317
enum s390_reset reset_type;
318
@@ -XXX,XX +XXX,XX @@ static void s390_machine_reset(MachineState *machine)
319
s390_machine_unprotect(ms);
320
}
321
322
- qemu_devices_reset();
323
+ qemu_devices_reset(reason);
324
s390_crypto_reset();
325
326
/* configure and start the ipl CPU only */
327
diff --git a/migration/savevm.c b/migration/savevm.c
328
index XXXXXXX..XXXXXXX 100644
329
--- a/migration/savevm.c
330
+++ b/migration/savevm.c
331
@@ -XXX,XX +XXX,XX @@ bool load_snapshot(const char *name, const char *vmstate,
332
goto err_drain;
333
}
334
335
- qemu_system_reset(SHUTDOWN_CAUSE_NONE);
336
+ qemu_system_reset(SHUTDOWN_CAUSE_SNAPSHOT_LOAD);
337
mis->from_src_file = f;
338
339
if (!yank_register_instance(MIGRATION_YANK_INSTANCE, errp)) {
340
diff --git a/softmmu/runstate.c b/softmmu/runstate.c
341
index XXXXXXX..XXXXXXX 100644
342
--- a/softmmu/runstate.c
343
+++ b/softmmu/runstate.c
344
@@ -XXX,XX +XXX,XX @@ void qemu_system_reset(ShutdownCause reason)
345
cpu_synchronize_all_states();
346
347
if (mc && mc->reset) {
348
- mc->reset(current_machine);
349
+ mc->reset(current_machine, reason);
350
} else {
351
- qemu_devices_reset();
352
+ qemu_devices_reset(reason);
353
}
354
- if (reason && reason != SHUTDOWN_CAUSE_SUBSYSTEM_RESET) {
355
+ switch (reason) {
356
+ case SHUTDOWN_CAUSE_NONE:
357
+ case SHUTDOWN_CAUSE_SUBSYSTEM_RESET:
358
+ case SHUTDOWN_CAUSE_SNAPSHOT_LOAD:
359
+ break;
360
+ default:
361
qapi_event_send_reset(shutdown_caused_by_guest(reason), reason);
362
}
363
cpu_synchronize_all_post_reset();
121
--
364
--
122
2.20.1
365
2.25.1
123
124
diff view generated by jsdifflib
1
From: Shashi Mallela <shashi.mallela@linaro.org>
1
From: "Jason A. Donenfeld" <Jason@zx2c4.com>
2
2
3
Defined descriptors for ITS device table,collection table and ITS
3
When the system reboots, the rng-seed that the FDT has should be
4
command queue entities.Implemented register read/write functions,
4
re-randomized, so that the new boot gets a new seed. Several
5
extract ITS table parameters and command queue parameters,extended
5
architectures require this functionality, so export a function for
6
gicv3 common to capture qemu address space(which host the ITS table
6
injecting a new seed into the given FDT.
7
platform memories required for subsequent ITS processing) and
8
initialize the same in ITS device.
9
7
10
Signed-off-by: Shashi Mallela <shashi.mallela@linaro.org>
8
Cc: Alistair Francis <alistair.francis@wdc.com>
11
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Cc: David Gibson <david@gibson.dropbear.id.au>
12
Reviewed-by: Eric Auger <eric.auger@redhat.com>
10
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
13
Tested-by: Neil Armstrong <narmstrong@baylibre.com>
11
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
14
Message-id: 20210910143951.92242-3-shashi.mallela@linaro.org
12
Message-id: 20221025004327.568476-3-Jason@zx2c4.com
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
---
14
---
17
hw/intc/gicv3_internal.h | 29 ++
15
include/sysemu/device_tree.h | 9 +++++++++
18
include/hw/intc/arm_gicv3_common.h | 3 +
16
softmmu/device_tree.c | 21 +++++++++++++++++++++
19
include/hw/intc/arm_gicv3_its_common.h | 23 ++
17
2 files changed, 30 insertions(+)
20
hw/intc/arm_gicv3_its.c | 376 +++++++++++++++++++++++++
21
4 files changed, 431 insertions(+)
22
18
23
diff --git a/hw/intc/gicv3_internal.h b/hw/intc/gicv3_internal.h
19
diff --git a/include/sysemu/device_tree.h b/include/sysemu/device_tree.h
24
index XXXXXXX..XXXXXXX 100644
20
index XXXXXXX..XXXXXXX 100644
25
--- a/hw/intc/gicv3_internal.h
21
--- a/include/sysemu/device_tree.h
26
+++ b/hw/intc/gicv3_internal.h
22
+++ b/include/sysemu/device_tree.h
27
@@ -XXX,XX +XXX,XX @@ FIELD(GITS_BASER, INNERCACHE, 59, 3)
23
@@ -XXX,XX +XXX,XX @@ int qemu_fdt_setprop_sized_cells_from_array(void *fdt,
28
FIELD(GITS_BASER, INDIRECT, 62, 1)
24
qdt_tmp); \
29
FIELD(GITS_BASER, VALID, 63, 1)
25
})
30
26
31
+FIELD(GITS_CBASER, SIZE, 0, 8)
32
+FIELD(GITS_CBASER, SHAREABILITY, 10, 2)
33
+FIELD(GITS_CBASER, PHYADDR, 12, 40)
34
+FIELD(GITS_CBASER, OUTERCACHE, 53, 3)
35
+FIELD(GITS_CBASER, INNERCACHE, 59, 3)
36
+FIELD(GITS_CBASER, VALID, 63, 1)
37
+
27
+
38
+FIELD(GITS_CREADR, STALLED, 0, 1)
28
+/**
39
+FIELD(GITS_CREADR, OFFSET, 5, 15)
29
+ * qemu_fdt_randomize_seeds:
30
+ * @fdt: device tree blob
31
+ *
32
+ * Re-randomize all "rng-seed" properties with new seeds.
33
+ */
34
+void qemu_fdt_randomize_seeds(void *fdt);
40
+
35
+
41
+FIELD(GITS_CWRITER, RETRY, 0, 1)
36
#define FDT_PCI_RANGE_RELOCATABLE 0x80000000
42
+FIELD(GITS_CWRITER, OFFSET, 5, 15)
37
#define FDT_PCI_RANGE_PREFETCHABLE 0x40000000
38
#define FDT_PCI_RANGE_ALIASED 0x20000000
39
diff --git a/softmmu/device_tree.c b/softmmu/device_tree.c
40
index XXXXXXX..XXXXXXX 100644
41
--- a/softmmu/device_tree.c
42
+++ b/softmmu/device_tree.c
43
@@ -XXX,XX +XXX,XX @@
44
#include "qemu/option.h"
45
#include "qemu/bswap.h"
46
#include "qemu/cutils.h"
47
+#include "qemu/guest-random.h"
48
#include "sysemu/device_tree.h"
49
#include "hw/loader.h"
50
#include "hw/boards.h"
51
@@ -XXX,XX +XXX,XX @@ void hmp_dumpdtb(Monitor *mon, const QDict *qdict)
52
53
info_report("dtb dumped to %s", filename);
54
}
43
+
55
+
44
+FIELD(GITS_CTLR, ENABLED, 0, 1)
56
+void qemu_fdt_randomize_seeds(void *fdt)
45
FIELD(GITS_CTLR, QUIESCENT, 31, 1)
57
+{
46
58
+ int noffset, poffset, len;
47
FIELD(GITS_TYPER, PHYSICAL, 0, 1)
59
+ const char *name;
48
@@ -XXX,XX +XXX,XX @@ FIELD(GITS_TYPER, PTA, 19, 1)
60
+ uint8_t *data;
49
FIELD(GITS_TYPER, CIDBITS, 32, 4)
50
FIELD(GITS_TYPER, CIL, 36, 1)
51
52
+#define GITS_IDREGS 0xFFD0
53
+
61
+
54
+#define ITS_CTLR_ENABLED (1U) /* ITS Enabled */
62
+ for (noffset = fdt_next_node(fdt, 0, NULL);
55
+
63
+ noffset >= 0;
56
+#define GITS_BASER_RO_MASK (R_GITS_BASER_ENTRYSIZE_MASK | \
64
+ noffset = fdt_next_node(fdt, noffset, NULL)) {
57
+ R_GITS_BASER_TYPE_MASK)
65
+ for (poffset = fdt_first_property_offset(fdt, noffset);
58
+
66
+ poffset >= 0;
59
#define GITS_BASER_PAGESIZE_4K 0
67
+ poffset = fdt_next_property_offset(fdt, poffset)) {
60
#define GITS_BASER_PAGESIZE_16K 1
68
+ data = (uint8_t *)fdt_getprop_by_offset(fdt, poffset, &name, &len);
61
#define GITS_BASER_PAGESIZE_64K 2
69
+ if (!data || strcmp(name, "rng-seed"))
62
@@ -XXX,XX +XXX,XX @@ FIELD(GITS_TYPER, CIL, 36, 1)
70
+ continue;
63
#define GITS_BASER_TYPE_DEVICE 1ULL
71
+ qemu_guest_getrandom_nofail(data, len);
64
#define GITS_BASER_TYPE_COLLECTION 4ULL
65
66
+#define GITS_PAGE_SIZE_4K 0x1000
67
+#define GITS_PAGE_SIZE_16K 0x4000
68
+#define GITS_PAGE_SIZE_64K 0x10000
69
+
70
+#define L1TABLE_ENTRY_SIZE 8
71
+
72
+#define GITS_CMDQ_ENTRY_SIZE 32
73
+
74
/**
75
* Default features advertised by this version of ITS
76
*/
77
diff --git a/include/hw/intc/arm_gicv3_common.h b/include/hw/intc/arm_gicv3_common.h
78
index XXXXXXX..XXXXXXX 100644
79
--- a/include/hw/intc/arm_gicv3_common.h
80
+++ b/include/hw/intc/arm_gicv3_common.h
81
@@ -XXX,XX +XXX,XX @@ struct GICv3State {
82
int dev_fd; /* kvm device fd if backed by kvm vgic support */
83
Error *migration_blocker;
84
85
+ MemoryRegion *dma;
86
+ AddressSpace dma_as;
87
+
88
/* Distributor */
89
90
/* for a GIC with the security extensions the NS banked version of this
91
diff --git a/include/hw/intc/arm_gicv3_its_common.h b/include/hw/intc/arm_gicv3_its_common.h
92
index XXXXXXX..XXXXXXX 100644
93
--- a/include/hw/intc/arm_gicv3_its_common.h
94
+++ b/include/hw/intc/arm_gicv3_its_common.h
95
@@ -XXX,XX +XXX,XX @@
96
97
#define GITS_TRANSLATER 0x0040
98
99
+typedef struct {
100
+ bool valid;
101
+ bool indirect;
102
+ uint16_t entry_sz;
103
+ uint32_t page_sz;
104
+ uint32_t max_entries;
105
+ union {
106
+ uint32_t max_devids;
107
+ uint32_t max_collids;
108
+ } maxids;
109
+ uint64_t base_addr;
110
+} TableDesc;
111
+
112
+typedef struct {
113
+ bool valid;
114
+ uint32_t max_entries;
115
+ uint64_t base_addr;
116
+} CmdQDesc;
117
+
118
struct GICv3ITSState {
119
SysBusDevice parent_obj;
120
121
@@ -XXX,XX +XXX,XX @@ struct GICv3ITSState {
122
uint64_t creadr;
123
uint64_t baser[8];
124
125
+ TableDesc dt;
126
+ TableDesc ct;
127
+ CmdQDesc cq;
128
+
129
Error *migration_blocker;
130
};
131
132
diff --git a/hw/intc/arm_gicv3_its.c b/hw/intc/arm_gicv3_its.c
133
index XXXXXXX..XXXXXXX 100644
134
--- a/hw/intc/arm_gicv3_its.c
135
+++ b/hw/intc/arm_gicv3_its.c
136
@@ -XXX,XX +XXX,XX @@ struct GICv3ITSClass {
137
void (*parent_reset)(DeviceState *dev);
138
};
139
140
+static uint64_t baser_base_addr(uint64_t value, uint32_t page_sz)
141
+{
142
+ uint64_t result = 0;
143
+
144
+ switch (page_sz) {
145
+ case GITS_PAGE_SIZE_4K:
146
+ case GITS_PAGE_SIZE_16K:
147
+ result = FIELD_EX64(value, GITS_BASER, PHYADDR) << 12;
148
+ break;
149
+
150
+ case GITS_PAGE_SIZE_64K:
151
+ result = FIELD_EX64(value, GITS_BASER, PHYADDRL_64K) << 16;
152
+ result |= FIELD_EX64(value, GITS_BASER, PHYADDRH_64K) << 48;
153
+ break;
154
+
155
+ default:
156
+ break;
157
+ }
158
+ return result;
159
+}
160
+
161
+/*
162
+ * This function extracts the ITS Device and Collection table specific
163
+ * parameters (like base_addr, size etc) from GITS_BASER register.
164
+ * It is called during ITS enable and also during post_load migration
165
+ */
166
+static void extract_table_params(GICv3ITSState *s)
167
+{
168
+ uint16_t num_pages = 0;
169
+ uint8_t page_sz_type;
170
+ uint8_t type;
171
+ uint32_t page_sz = 0;
172
+ uint64_t value;
173
+
174
+ for (int i = 0; i < 8; i++) {
175
+ value = s->baser[i];
176
+
177
+ if (!value) {
178
+ continue;
179
+ }
180
+
181
+ page_sz_type = FIELD_EX64(value, GITS_BASER, PAGESIZE);
182
+
183
+ switch (page_sz_type) {
184
+ case 0:
185
+ page_sz = GITS_PAGE_SIZE_4K;
186
+ break;
187
+
188
+ case 1:
189
+ page_sz = GITS_PAGE_SIZE_16K;
190
+ break;
191
+
192
+ case 2:
193
+ case 3:
194
+ page_sz = GITS_PAGE_SIZE_64K;
195
+ break;
196
+
197
+ default:
198
+ g_assert_not_reached();
199
+ }
200
+
201
+ num_pages = FIELD_EX64(value, GITS_BASER, SIZE) + 1;
202
+
203
+ type = FIELD_EX64(value, GITS_BASER, TYPE);
204
+
205
+ switch (type) {
206
+
207
+ case GITS_BASER_TYPE_DEVICE:
208
+ memset(&s->dt, 0 , sizeof(s->dt));
209
+ s->dt.valid = FIELD_EX64(value, GITS_BASER, VALID);
210
+
211
+ if (!s->dt.valid) {
212
+ return;
213
+ }
214
+
215
+ s->dt.page_sz = page_sz;
216
+ s->dt.indirect = FIELD_EX64(value, GITS_BASER, INDIRECT);
217
+ s->dt.entry_sz = FIELD_EX64(value, GITS_BASER, ENTRYSIZE);
218
+
219
+ if (!s->dt.indirect) {
220
+ s->dt.max_entries = (num_pages * page_sz) / s->dt.entry_sz;
221
+ } else {
222
+ s->dt.max_entries = (((num_pages * page_sz) /
223
+ L1TABLE_ENTRY_SIZE) *
224
+ (page_sz / s->dt.entry_sz));
225
+ }
226
+
227
+ s->dt.maxids.max_devids = (1UL << (FIELD_EX64(s->typer, GITS_TYPER,
228
+ DEVBITS) + 1));
229
+
230
+ s->dt.base_addr = baser_base_addr(value, page_sz);
231
+
232
+ break;
233
+
234
+ case GITS_BASER_TYPE_COLLECTION:
235
+ memset(&s->ct, 0 , sizeof(s->ct));
236
+ s->ct.valid = FIELD_EX64(value, GITS_BASER, VALID);
237
+
238
+ /*
239
+ * GITS_TYPER.HCC is 0 for this implementation
240
+ * hence writes are discarded if ct.valid is 0
241
+ */
242
+ if (!s->ct.valid) {
243
+ return;
244
+ }
245
+
246
+ s->ct.page_sz = page_sz;
247
+ s->ct.indirect = FIELD_EX64(value, GITS_BASER, INDIRECT);
248
+ s->ct.entry_sz = FIELD_EX64(value, GITS_BASER, ENTRYSIZE);
249
+
250
+ if (!s->ct.indirect) {
251
+ s->ct.max_entries = (num_pages * page_sz) / s->ct.entry_sz;
252
+ } else {
253
+ s->ct.max_entries = (((num_pages * page_sz) /
254
+ L1TABLE_ENTRY_SIZE) *
255
+ (page_sz / s->ct.entry_sz));
256
+ }
257
+
258
+ if (FIELD_EX64(s->typer, GITS_TYPER, CIL)) {
259
+ s->ct.maxids.max_collids = (1UL << (FIELD_EX64(s->typer,
260
+ GITS_TYPER, CIDBITS) + 1));
261
+ } else {
262
+ /* 16-bit CollectionId supported when CIL == 0 */
263
+ s->ct.maxids.max_collids = (1UL << 16);
264
+ }
265
+
266
+ s->ct.base_addr = baser_base_addr(value, page_sz);
267
+
268
+ break;
269
+
270
+ default:
271
+ break;
272
+ }
72
+ }
273
+ }
73
+ }
274
+}
74
+}
275
+
276
+static void extract_cmdq_params(GICv3ITSState *s)
277
+{
278
+ uint16_t num_pages = 0;
279
+ uint64_t value = s->cbaser;
280
+
281
+ num_pages = FIELD_EX64(value, GITS_CBASER, SIZE) + 1;
282
+
283
+ memset(&s->cq, 0 , sizeof(s->cq));
284
+ s->cq.valid = FIELD_EX64(value, GITS_CBASER, VALID);
285
+
286
+ if (s->cq.valid) {
287
+ s->cq.max_entries = (num_pages * GITS_PAGE_SIZE_4K) /
288
+ GITS_CMDQ_ENTRY_SIZE;
289
+ s->cq.base_addr = FIELD_EX64(value, GITS_CBASER, PHYADDR);
290
+ s->cq.base_addr <<= R_GITS_CBASER_PHYADDR_SHIFT;
291
+ }
292
+}
293
+
294
static MemTxResult gicv3_its_translation_write(void *opaque, hwaddr offset,
295
uint64_t data, unsigned size,
296
MemTxAttrs attrs)
297
@@ -XXX,XX +XXX,XX @@ static bool its_writel(GICv3ITSState *s, hwaddr offset,
298
uint64_t value, MemTxAttrs attrs)
299
{
300
bool result = true;
301
+ int index;
302
303
+ switch (offset) {
304
+ case GITS_CTLR:
305
+ s->ctlr |= (value & ~(s->ctlr));
306
+
307
+ if (s->ctlr & ITS_CTLR_ENABLED) {
308
+ extract_table_params(s);
309
+ extract_cmdq_params(s);
310
+ s->creadr = 0;
311
+ }
312
+ break;
313
+ case GITS_CBASER:
314
+ /*
315
+ * IMPDEF choice:- GITS_CBASER register becomes RO if ITS is
316
+ * already enabled
317
+ */
318
+ if (!(s->ctlr & ITS_CTLR_ENABLED)) {
319
+ s->cbaser = deposit64(s->cbaser, 0, 32, value);
320
+ s->creadr = 0;
321
+ s->cwriter = s->creadr;
322
+ }
323
+ break;
324
+ case GITS_CBASER + 4:
325
+ /*
326
+ * IMPDEF choice:- GITS_CBASER register becomes RO if ITS is
327
+ * already enabled
328
+ */
329
+ if (!(s->ctlr & ITS_CTLR_ENABLED)) {
330
+ s->cbaser = deposit64(s->cbaser, 32, 32, value);
331
+ s->creadr = 0;
332
+ s->cwriter = s->creadr;
333
+ }
334
+ break;
335
+ case GITS_CWRITER:
336
+ s->cwriter = deposit64(s->cwriter, 0, 32,
337
+ (value & ~R_GITS_CWRITER_RETRY_MASK));
338
+ break;
339
+ case GITS_CWRITER + 4:
340
+ s->cwriter = deposit64(s->cwriter, 32, 32, value);
341
+ break;
342
+ case GITS_CREADR:
343
+ if (s->gicv3->gicd_ctlr & GICD_CTLR_DS) {
344
+ s->creadr = deposit64(s->creadr, 0, 32,
345
+ (value & ~R_GITS_CREADR_STALLED_MASK));
346
+ } else {
347
+ /* RO register, ignore the write */
348
+ qemu_log_mask(LOG_GUEST_ERROR,
349
+ "%s: invalid guest write to RO register at offset "
350
+ TARGET_FMT_plx "\n", __func__, offset);
351
+ }
352
+ break;
353
+ case GITS_CREADR + 4:
354
+ if (s->gicv3->gicd_ctlr & GICD_CTLR_DS) {
355
+ s->creadr = deposit64(s->creadr, 32, 32, value);
356
+ } else {
357
+ /* RO register, ignore the write */
358
+ qemu_log_mask(LOG_GUEST_ERROR,
359
+ "%s: invalid guest write to RO register at offset "
360
+ TARGET_FMT_plx "\n", __func__, offset);
361
+ }
362
+ break;
363
+ case GITS_BASER ... GITS_BASER + 0x3f:
364
+ /*
365
+ * IMPDEF choice:- GITS_BASERn register becomes RO if ITS is
366
+ * already enabled
367
+ */
368
+ if (!(s->ctlr & ITS_CTLR_ENABLED)) {
369
+ index = (offset - GITS_BASER) / 8;
370
+
371
+ if (offset & 7) {
372
+ value <<= 32;
373
+ value &= ~GITS_BASER_RO_MASK;
374
+ s->baser[index] &= GITS_BASER_RO_MASK | MAKE_64BIT_MASK(0, 32);
375
+ s->baser[index] |= value;
376
+ } else {
377
+ value &= ~GITS_BASER_RO_MASK;
378
+ s->baser[index] &= GITS_BASER_RO_MASK | MAKE_64BIT_MASK(32, 32);
379
+ s->baser[index] |= value;
380
+ }
381
+ }
382
+ break;
383
+ case GITS_IIDR:
384
+ case GITS_IDREGS ... GITS_IDREGS + 0x2f:
385
+ /* RO registers, ignore the write */
386
+ qemu_log_mask(LOG_GUEST_ERROR,
387
+ "%s: invalid guest write to RO register at offset "
388
+ TARGET_FMT_plx "\n", __func__, offset);
389
+ break;
390
+ default:
391
+ result = false;
392
+ break;
393
+ }
394
return result;
395
}
396
397
@@ -XXX,XX +XXX,XX @@ static bool its_readl(GICv3ITSState *s, hwaddr offset,
398
uint64_t *data, MemTxAttrs attrs)
399
{
400
bool result = true;
401
+ int index;
402
403
+ switch (offset) {
404
+ case GITS_CTLR:
405
+ *data = s->ctlr;
406
+ break;
407
+ case GITS_IIDR:
408
+ *data = gicv3_iidr();
409
+ break;
410
+ case GITS_IDREGS ... GITS_IDREGS + 0x2f:
411
+ /* ID registers */
412
+ *data = gicv3_idreg(offset - GITS_IDREGS);
413
+ break;
414
+ case GITS_TYPER:
415
+ *data = extract64(s->typer, 0, 32);
416
+ break;
417
+ case GITS_TYPER + 4:
418
+ *data = extract64(s->typer, 32, 32);
419
+ break;
420
+ case GITS_CBASER:
421
+ *data = extract64(s->cbaser, 0, 32);
422
+ break;
423
+ case GITS_CBASER + 4:
424
+ *data = extract64(s->cbaser, 32, 32);
425
+ break;
426
+ case GITS_CREADR:
427
+ *data = extract64(s->creadr, 0, 32);
428
+ break;
429
+ case GITS_CREADR + 4:
430
+ *data = extract64(s->creadr, 32, 32);
431
+ break;
432
+ case GITS_CWRITER:
433
+ *data = extract64(s->cwriter, 0, 32);
434
+ break;
435
+ case GITS_CWRITER + 4:
436
+ *data = extract64(s->cwriter, 32, 32);
437
+ break;
438
+ case GITS_BASER ... GITS_BASER + 0x3f:
439
+ index = (offset - GITS_BASER) / 8;
440
+ if (offset & 7) {
441
+ *data = extract64(s->baser[index], 32, 32);
442
+ } else {
443
+ *data = extract64(s->baser[index], 0, 32);
444
+ }
445
+ break;
446
+ default:
447
+ result = false;
448
+ break;
449
+ }
450
return result;
451
}
452
453
@@ -XXX,XX +XXX,XX @@ static bool its_writell(GICv3ITSState *s, hwaddr offset,
454
uint64_t value, MemTxAttrs attrs)
455
{
456
bool result = true;
457
+ int index;
458
459
+ switch (offset) {
460
+ case GITS_BASER ... GITS_BASER + 0x3f:
461
+ /*
462
+ * IMPDEF choice:- GITS_BASERn register becomes RO if ITS is
463
+ * already enabled
464
+ */
465
+ if (!(s->ctlr & ITS_CTLR_ENABLED)) {
466
+ index = (offset - GITS_BASER) / 8;
467
+ s->baser[index] &= GITS_BASER_RO_MASK;
468
+ s->baser[index] |= (value & ~GITS_BASER_RO_MASK);
469
+ }
470
+ break;
471
+ case GITS_CBASER:
472
+ /*
473
+ * IMPDEF choice:- GITS_CBASER register becomes RO if ITS is
474
+ * already enabled
475
+ */
476
+ if (!(s->ctlr & ITS_CTLR_ENABLED)) {
477
+ s->cbaser = value;
478
+ s->creadr = 0;
479
+ s->cwriter = s->creadr;
480
+ }
481
+ break;
482
+ case GITS_CWRITER:
483
+ s->cwriter = value & ~R_GITS_CWRITER_RETRY_MASK;
484
+ break;
485
+ case GITS_CREADR:
486
+ if (s->gicv3->gicd_ctlr & GICD_CTLR_DS) {
487
+ s->creadr = value & ~R_GITS_CREADR_STALLED_MASK;
488
+ } else {
489
+ /* RO register, ignore the write */
490
+ qemu_log_mask(LOG_GUEST_ERROR,
491
+ "%s: invalid guest write to RO register at offset "
492
+ TARGET_FMT_plx "\n", __func__, offset);
493
+ }
494
+ break;
495
+ case GITS_TYPER:
496
+ /* RO registers, ignore the write */
497
+ qemu_log_mask(LOG_GUEST_ERROR,
498
+ "%s: invalid guest write to RO register at offset "
499
+ TARGET_FMT_plx "\n", __func__, offset);
500
+ break;
501
+ default:
502
+ result = false;
503
+ break;
504
+ }
505
return result;
506
}
507
508
@@ -XXX,XX +XXX,XX @@ static bool its_readll(GICv3ITSState *s, hwaddr offset,
509
uint64_t *data, MemTxAttrs attrs)
510
{
511
bool result = true;
512
+ int index;
513
514
+ switch (offset) {
515
+ case GITS_TYPER:
516
+ *data = s->typer;
517
+ break;
518
+ case GITS_BASER ... GITS_BASER + 0x3f:
519
+ index = (offset - GITS_BASER) / 8;
520
+ *data = s->baser[index];
521
+ break;
522
+ case GITS_CBASER:
523
+ *data = s->cbaser;
524
+ break;
525
+ case GITS_CREADR:
526
+ *data = s->creadr;
527
+ break;
528
+ case GITS_CWRITER:
529
+ *data = s->cwriter;
530
+ break;
531
+ default:
532
+ result = false;
533
+ break;
534
+ }
535
return result;
536
}
537
538
@@ -XXX,XX +XXX,XX @@ static void gicv3_arm_its_realize(DeviceState *dev, Error **errp)
539
540
gicv3_its_init_mmio(s, &gicv3_its_control_ops, &gicv3_its_translation_ops);
541
542
+ address_space_init(&s->gicv3->dma_as, s->gicv3->dma,
543
+ "gicv3-its-sysmem");
544
+
545
/* set the ITS default features supported */
546
s->typer = FIELD_DP64(s->typer, GITS_TYPER, PHYSICAL,
547
GITS_TYPE_PHYSICAL);
548
@@ -XXX,XX +XXX,XX @@ static void gicv3_its_reset(DeviceState *dev)
549
GITS_CTE_SIZE - 1);
550
}
551
552
+static void gicv3_its_post_load(GICv3ITSState *s)
553
+{
554
+ if (s->ctlr & ITS_CTLR_ENABLED) {
555
+ extract_table_params(s);
556
+ extract_cmdq_params(s);
557
+ }
558
+}
559
+
560
static Property gicv3_its_props[] = {
561
DEFINE_PROP_LINK("parent-gicv3", GICv3ITSState, gicv3, "arm-gicv3",
562
GICv3State *),
563
@@ -XXX,XX +XXX,XX @@ static void gicv3_its_class_init(ObjectClass *klass, void *data)
564
{
565
DeviceClass *dc = DEVICE_CLASS(klass);
566
GICv3ITSClass *ic = ARM_GICV3_ITS_CLASS(klass);
567
+ GICv3ITSCommonClass *icc = ARM_GICV3_ITS_COMMON_CLASS(klass);
568
569
dc->realize = gicv3_arm_its_realize;
570
device_class_set_props(dc, gicv3_its_props);
571
device_class_set_parent_reset(dc, gicv3_its_reset, &ic->parent_reset);
572
+ icc->post_load = gicv3_its_post_load;
573
}
574
575
static const TypeInfo gicv3_its_info = {
576
--
75
--
577
2.20.1
76
2.25.1
578
579
diff view generated by jsdifflib
New patch
1
From: "Jason A. Donenfeld" <Jason@zx2c4.com>
1
2
3
Snapshot loading is supposed to be deterministic, so we shouldn't
4
re-randomize the various seeds used.
5
6
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
7
Message-id: 20221025004327.568476-4-Jason@zx2c4.com
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
11
hw/i386/x86.c | 2 +-
12
1 file changed, 1 insertion(+), 1 deletion(-)
13
14
diff --git a/hw/i386/x86.c b/hw/i386/x86.c
15
index XXXXXXX..XXXXXXX 100644
16
--- a/hw/i386/x86.c
17
+++ b/hw/i386/x86.c
18
@@ -XXX,XX +XXX,XX @@ void x86_load_linux(X86MachineState *x86ms,
19
setup_data->type = cpu_to_le32(SETUP_RNG_SEED);
20
setup_data->len = cpu_to_le32(RNG_SEED_LENGTH);
21
qemu_guest_getrandom_nofail(setup_data->data, RNG_SEED_LENGTH);
22
- qemu_register_reset(reset_rng_seed, setup_data);
23
+ qemu_register_reset_nosnapshotload(reset_rng_seed, setup_data);
24
fw_cfg_add_bytes_callback(fw_cfg, FW_CFG_KERNEL_DATA, reset_rng_seed, NULL,
25
setup_data, kernel, kernel_size, true);
26
} else {
27
--
28
2.25.1
diff view generated by jsdifflib
1
From: Bin Meng <bmeng.cn@gmail.com>
1
From: "Jason A. Donenfeld" <Jason@zx2c4.com>
2
2
3
As of today, when booting upstream U-Boot for Xilinx Zynq, the UART
3
When the system reboots, the rng-seed that the FDT has should be
4
does not receive anything. Debugging shows that the UART input clock
4
re-randomized, so that the new boot gets a new seed. Since the FDT is in
5
frequency is zero which prevents the UART from receiving anything as
5
the ROM region at this point, we add a hook right after the ROM has been
6
per the logic in uart_receive().
6
added, so that we have a pointer to that copy of the FDT.
7
7
8
From zynq_slcr_reset_exit() comment, it intends to compute output
8
Cc: Peter Maydell <peter.maydell@linaro.org>
9
clocks according to ps_clk and registers. zynq_slcr_compute_clocks()
9
Cc: qemu-arm@nongnu.org
10
is called to accomplish the task, inside which device_is_in_reset()
10
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
11
is called to actually make the attempt in vain.
11
Message-id: 20221025004327.568476-5-Jason@zx2c4.com
12
12
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
13
Rework reset_hold() and reset_exit() so that in the reset exit phase,
14
the logic can really compute output clocks in reset_exit().
15
16
With this change, upstream U-Boot boots properly again with:
17
18
$ qemu-system-arm -M xilinx-zynq-a9 -m 1G -display none -serial null -serial stdio \
19
-device loader,file=u-boot-dtb.bin,addr=0x4000000,cpu-num=0
20
21
Fixes: 38867cb7ec90 ("hw/misc/zynq_slcr: add clock generation for uarts")
22
Signed-off-by: Bin Meng <bmeng.cn@gmail.com>
23
Acked-by: Alistair Francis <alistair.francis@wdc.com>
24
Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com>
25
Message-id: 20210901124521.30599-2-bmeng.cn@gmail.com
26
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
27
---
14
---
28
hw/misc/zynq_slcr.c | 31 ++++++++++++++++++-------------
15
hw/arm/boot.c | 2 ++
29
1 file changed, 18 insertions(+), 13 deletions(-)
16
1 file changed, 2 insertions(+)
30
17
31
diff --git a/hw/misc/zynq_slcr.c b/hw/misc/zynq_slcr.c
18
diff --git a/hw/arm/boot.c b/hw/arm/boot.c
32
index XXXXXXX..XXXXXXX 100644
19
index XXXXXXX..XXXXXXX 100644
33
--- a/hw/misc/zynq_slcr.c
20
--- a/hw/arm/boot.c
34
+++ b/hw/misc/zynq_slcr.c
21
+++ b/hw/arm/boot.c
35
@@ -XXX,XX +XXX,XX @@ static uint64_t zynq_slcr_compute_clock(const uint64_t periods[],
22
@@ -XXX,XX +XXX,XX @@ int arm_load_dtb(hwaddr addr, const struct arm_boot_info *binfo,
36
zynq_slcr_compute_clock((plls), (state)->regs[reg], \
23
* the DTB is copied again upon reset, even if addr points into RAM.
37
reg ## _ ## enable_field ## _SHIFT)
24
*/
38
25
rom_add_blob_fixed_as("dtb", fdt, size, addr, as);
39
+static void zynq_slcr_compute_clocks_internal(ZynqSLCRState *s, uint64_t ps_clk)
26
+ qemu_register_reset_nosnapshotload(qemu_fdt_randomize_seeds,
40
+{
27
+ rom_ptr_for_as(as, addr, size));
41
+ uint64_t io_pll = zynq_slcr_compute_pll(ps_clk, s->regs[R_IO_PLL_CTRL]);
28
42
+ uint64_t arm_pll = zynq_slcr_compute_pll(ps_clk, s->regs[R_ARM_PLL_CTRL]);
29
g_free(fdt);
43
+ uint64_t ddr_pll = zynq_slcr_compute_pll(ps_clk, s->regs[R_DDR_PLL_CTRL]);
44
+
45
+ uint64_t uart_mux[4] = {io_pll, io_pll, arm_pll, ddr_pll};
46
+
47
+ /* compute uartX reference clocks */
48
+ clock_set(s->uart0_ref_clk,
49
+ ZYNQ_COMPUTE_CLK(s, uart_mux, R_UART_CLK_CTRL, CLKACT0));
50
+ clock_set(s->uart1_ref_clk,
51
+ ZYNQ_COMPUTE_CLK(s, uart_mux, R_UART_CLK_CTRL, CLKACT1));
52
+}
53
+
54
/**
55
* Compute and set the ouputs clocks periods.
56
* But do not propagate them further. Connected clocks
57
@@ -XXX,XX +XXX,XX @@ static void zynq_slcr_compute_clocks(ZynqSLCRState *s)
58
ps_clk = 0;
59
}
60
61
- uint64_t io_pll = zynq_slcr_compute_pll(ps_clk, s->regs[R_IO_PLL_CTRL]);
62
- uint64_t arm_pll = zynq_slcr_compute_pll(ps_clk, s->regs[R_ARM_PLL_CTRL]);
63
- uint64_t ddr_pll = zynq_slcr_compute_pll(ps_clk, s->regs[R_DDR_PLL_CTRL]);
64
-
65
- uint64_t uart_mux[4] = {io_pll, io_pll, arm_pll, ddr_pll};
66
-
67
- /* compute uartX reference clocks */
68
- clock_set(s->uart0_ref_clk,
69
- ZYNQ_COMPUTE_CLK(s, uart_mux, R_UART_CLK_CTRL, CLKACT0));
70
- clock_set(s->uart1_ref_clk,
71
- ZYNQ_COMPUTE_CLK(s, uart_mux, R_UART_CLK_CTRL, CLKACT1));
72
+ zynq_slcr_compute_clocks_internal(s, ps_clk);
73
}
74
75
/**
76
@@ -XXX,XX +XXX,XX @@ static void zynq_slcr_reset_hold(Object *obj)
77
ZynqSLCRState *s = ZYNQ_SLCR(obj);
78
79
/* will disable all output clocks */
80
- zynq_slcr_compute_clocks(s);
81
+ zynq_slcr_compute_clocks_internal(s, 0);
82
zynq_slcr_propagate_clocks(s);
83
}
84
85
@@ -XXX,XX +XXX,XX @@ static void zynq_slcr_reset_exit(Object *obj)
86
ZynqSLCRState *s = ZYNQ_SLCR(obj);
87
88
/* will compute output clocks according to ps_clk and registers */
89
- zynq_slcr_compute_clocks(s);
90
+ zynq_slcr_compute_clocks_internal(s, clock_get(s->ps_clk));
91
zynq_slcr_propagate_clocks(s);
92
}
93
30
94
--
31
--
95
2.20.1
32
2.25.1
96
97
diff view generated by jsdifflib
New patch
1
From: "Jason A. Donenfeld" <Jason@zx2c4.com>
1
2
3
When the system reboots, the rng-seed that the FDT has should be
4
re-randomized, so that the new boot gets a new seed. Since the FDT is in
5
the ROM region at this point, we add a hook right after the ROM has been
6
added, so that we have a pointer to that copy of the FDT.
7
8
Cc: Palmer Dabbelt <palmer@dabbelt.com>
9
Cc: Alistair Francis <alistair.francis@wdc.com>
10
Cc: Bin Meng <bin.meng@windriver.com>
11
Cc: qemu-riscv@nongnu.org
12
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
13
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
14
Message-id: 20221025004327.568476-6-Jason@zx2c4.com
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
---
17
hw/riscv/boot.c | 3 +++
18
1 file changed, 3 insertions(+)
19
20
diff --git a/hw/riscv/boot.c b/hw/riscv/boot.c
21
index XXXXXXX..XXXXXXX 100644
22
--- a/hw/riscv/boot.c
23
+++ b/hw/riscv/boot.c
24
@@ -XXX,XX +XXX,XX @@
25
#include "sysemu/device_tree.h"
26
#include "sysemu/qtest.h"
27
#include "sysemu/kvm.h"
28
+#include "sysemu/reset.h"
29
30
#include <libfdt.h>
31
32
@@ -XXX,XX +XXX,XX @@ uint64_t riscv_load_fdt(hwaddr dram_base, uint64_t mem_size, void *fdt)
33
34
rom_add_blob_fixed_as("fdt", fdt, fdtsize, fdt_addr,
35
&address_space_memory);
36
+ qemu_register_reset_nosnapshotload(qemu_fdt_randomize_seeds,
37
+ rom_ptr_for_as(&address_space_memory, fdt_addr, fdtsize));
38
39
return fdt_addr;
40
}
41
--
42
2.25.1
diff view generated by jsdifflib
1
From: Chris Rauer <crauer@google.com>
1
From: "Jason A. Donenfeld" <Jason@zx2c4.com>
2
2
3
kudo-bmc is a board supported by OpenBMC.
3
Snapshot loading is supposed to be deterministic, so we shouldn't
4
https://github.com/openbmc/openbmc/tree/master/meta-fii/meta-kudo
4
re-randomize the various seeds used.
5
5
6
Since v1:
6
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
7
- hyphenated Cortex-A9
7
Message-id: 20221025004327.568476-7-Jason@zx2c4.com
8
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Tested: Booted kudo firmware.
10
Signed-off-by: Chris Rauer <crauer@google.com>
11
Reviewed-by: Patrick Venture <venture@google.com>
12
Message-id: 20210907223234.1165705-1-crauer@google.com
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
---
10
---
15
docs/system/arm/nuvoton.rst | 1 +
11
hw/m68k/virt.c | 20 +++++++++++---------
16
hw/arm/npcm7xx_boards.c | 34 ++++++++++++++++++++++++++++++++++
12
1 file changed, 11 insertions(+), 9 deletions(-)
17
2 files changed, 35 insertions(+)
18
13
19
diff --git a/docs/system/arm/nuvoton.rst b/docs/system/arm/nuvoton.rst
14
diff --git a/hw/m68k/virt.c b/hw/m68k/virt.c
20
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
21
--- a/docs/system/arm/nuvoton.rst
16
--- a/hw/m68k/virt.c
22
+++ b/docs/system/arm/nuvoton.rst
17
+++ b/hw/m68k/virt.c
23
@@ -XXX,XX +XXX,XX @@ Hyperscale applications. The following machines are based on this chip :
18
@@ -XXX,XX +XXX,XX @@ typedef struct {
24
19
M68kCPU *cpu;
25
- ``quanta-gbs-bmc`` Quanta GBS server BMC
20
hwaddr initial_pc;
26
- ``quanta-gsj`` Quanta GSJ server BMC
21
hwaddr initial_stack;
27
+- ``kudo-bmc`` Fii USA Kudo server BMC
22
- struct bi_record *rng_seed;
28
23
} ResetInfo;
29
There are also two more SoCs, NPCM710 and NPCM705, which are single-core
24
30
variants of NPCM750 and NPCM730, respectively. These are currently not
25
static void main_cpu_reset(void *opaque)
31
diff --git a/hw/arm/npcm7xx_boards.c b/hw/arm/npcm7xx_boards.c
26
@@ -XXX,XX +XXX,XX @@ static void main_cpu_reset(void *opaque)
32
index XXXXXXX..XXXXXXX 100644
27
M68kCPU *cpu = reset_info->cpu;
33
--- a/hw/arm/npcm7xx_boards.c
28
CPUState *cs = CPU(cpu);
34
+++ b/hw/arm/npcm7xx_boards.c
29
35
@@ -XXX,XX +XXX,XX @@
30
- if (reset_info->rng_seed) {
36
#define NPCM750_EVB_POWER_ON_STRAPS 0x00001ff7
31
- qemu_guest_getrandom_nofail((void *)reset_info->rng_seed->data + 2,
37
#define QUANTA_GSJ_POWER_ON_STRAPS 0x00001fff
32
- be16_to_cpu(*(uint16_t *)reset_info->rng_seed->data));
38
#define QUANTA_GBS_POWER_ON_STRAPS 0x000017ff
33
- }
39
+#define KUDO_BMC_POWER_ON_STRAPS 0x00001fff
34
-
40
35
cpu_reset(cs);
41
static const char npcm7xx_default_bootrom[] = "npcm7xx_bootrom.bin";
36
cpu->env.aregs[7] = reset_info->initial_stack;
42
37
cpu->env.pc = reset_info->initial_pc;
43
@@ -XXX,XX +XXX,XX @@ static void quanta_gbs_init(MachineState *machine)
44
npcm7xx_load_kernel(machine, soc);
45
}
38
}
46
39
47
+static void kudo_bmc_init(MachineState *machine)
40
+static void rerandomize_rng_seed(void *opaque)
48
+{
41
+{
49
+ NPCM7xxState *soc;
42
+ struct bi_record *rng_seed = opaque;
50
+
43
+ qemu_guest_getrandom_nofail((void *)rng_seed->data + 2,
51
+ soc = npcm7xx_create_soc(machine, KUDO_BMC_POWER_ON_STRAPS);
44
+ be16_to_cpu(*(uint16_t *)rng_seed->data));
52
+ npcm7xx_connect_dram(soc, machine->ram);
53
+ qdev_realize(DEVICE(soc), NULL, &error_fatal);
54
+
55
+ npcm7xx_load_bootrom(machine, soc);
56
+ npcm7xx_connect_flash(&soc->fiu[0], 0, "mx66u51235f",
57
+ drive_get(IF_MTD, 0, 0));
58
+ npcm7xx_connect_flash(&soc->fiu[1], 0, "mx66u51235f",
59
+ drive_get(IF_MTD, 3, 0));
60
+
61
+ npcm7xx_load_kernel(machine, soc);
62
+}
45
+}
63
+
46
+
64
static void npcm7xx_set_soc_type(NPCM7xxMachineClass *nmc, const char *type)
47
static void virt_init(MachineState *machine)
65
{
48
{
66
NPCM7xxClass *sc = NPCM7XX_CLASS(object_class_by_name(type));
49
M68kCPU *cpu = NULL;
67
@@ -XXX,XX +XXX,XX @@ static void gbs_bmc_machine_class_init(ObjectClass *oc, void *data)
50
@@ -XXX,XX +XXX,XX @@ static void virt_init(MachineState *machine)
68
mc->default_ram_size = 1 * GiB;
51
BOOTINFO0(param_ptr, BI_LAST);
52
rom_add_blob_fixed_as("bootinfo", param_blob, param_ptr - param_blob,
53
parameters_base, cs->as);
54
- reset_info->rng_seed = rom_ptr_for_as(cs->as, parameters_base,
55
- param_ptr - param_blob) +
56
- (param_rng_seed - param_blob);
57
+ qemu_register_reset_nosnapshotload(rerandomize_rng_seed,
58
+ rom_ptr_for_as(cs->as, parameters_base,
59
+ param_ptr - param_blob) +
60
+ (param_rng_seed - param_blob));
61
g_free(param_blob);
62
}
69
}
63
}
70
71
+static void kudo_bmc_machine_class_init(ObjectClass *oc, void *data)
72
+{
73
+ NPCM7xxMachineClass *nmc = NPCM7XX_MACHINE_CLASS(oc);
74
+ MachineClass *mc = MACHINE_CLASS(oc);
75
+
76
+ npcm7xx_set_soc_type(nmc, TYPE_NPCM730);
77
+
78
+ mc->desc = "Kudo BMC (Cortex-A9)";
79
+ mc->init = kudo_bmc_init;
80
+ mc->default_ram_size = 1 * GiB;
81
+};
82
+
83
static const TypeInfo npcm7xx_machine_types[] = {
84
{
85
.name = TYPE_NPCM7XX_MACHINE,
86
@@ -XXX,XX +XXX,XX @@ static const TypeInfo npcm7xx_machine_types[] = {
87
.name = MACHINE_TYPE_NAME("quanta-gbs-bmc"),
88
.parent = TYPE_NPCM7XX_MACHINE,
89
.class_init = gbs_bmc_machine_class_init,
90
+ }, {
91
+ .name = MACHINE_TYPE_NAME("kudo-bmc"),
92
+ .parent = TYPE_NPCM7XX_MACHINE,
93
+ .class_init = kudo_bmc_machine_class_init,
94
},
95
};
96
97
--
64
--
98
2.20.1
65
2.25.1
99
100
diff view generated by jsdifflib
1
From: Shashi Mallela <shashi.mallela@linaro.org>
1
From: "Jason A. Donenfeld" <Jason@zx2c4.com>
2
2
3
Added ITS command queue handling for MAPTI,MAPI commands,handled ITS
3
Snapshot loading is supposed to be deterministic, so we shouldn't
4
translation which triggers an LPI via INT command as well as write
4
re-randomize the various seeds used.
5
to GITS_TRANSLATER register,defined enum to differentiate between ITS
6
command interrupt trigger and GITS_TRANSLATER based interrupt trigger.
7
Each of these commands make use of other functionalities implemented to
8
get device table entry,collection table entry or interrupt translation
9
table entry required for their processing.
10
5
11
Signed-off-by: Shashi Mallela <shashi.mallela@linaro.org>
6
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
7
Message-id: 20221025004327.568476-8-Jason@zx2c4.com
12
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
13
Message-id: 20210910143951.92242-5-shashi.mallela@linaro.org
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
15
---
10
---
16
hw/intc/gicv3_internal.h | 12 +
11
hw/m68k/q800.c | 33 +++++++++++++--------------------
17
include/hw/intc/arm_gicv3_common.h | 2 +
12
1 file changed, 13 insertions(+), 20 deletions(-)
18
hw/intc/arm_gicv3_its.c | 365 ++++++++++++++++++++++++++++-
19
3 files changed, 378 insertions(+), 1 deletion(-)
20
13
21
diff --git a/hw/intc/gicv3_internal.h b/hw/intc/gicv3_internal.h
14
diff --git a/hw/m68k/q800.c b/hw/m68k/q800.c
22
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
23
--- a/hw/intc/gicv3_internal.h
16
--- a/hw/m68k/q800.c
24
+++ b/hw/intc/gicv3_internal.h
17
+++ b/hw/m68k/q800.c
25
@@ -XXX,XX +XXX,XX @@ FIELD(MAPC, RDBASE, 16, 32)
18
@@ -XXX,XX +XXX,XX @@ static const TypeInfo glue_info = {
26
#define ITTADDR_MASK MAKE_64BIT_MASK(ITTADDR_SHIFT, ITTADDR_LENGTH)
19
},
27
#define SIZE_MASK 0x1f
28
29
+/* MAPI command fields */
30
+#define EVENTID_MASK ((1ULL << 32) - 1)
31
+
32
+/* MAPTI command fields */
33
+#define pINTID_SHIFT 32
34
+#define pINTID_MASK MAKE_64BIT_MASK(32, 32)
35
+
36
#define DEVID_SHIFT 32
37
#define DEVID_MASK MAKE_64BIT_MASK(32, 32)
38
39
@@ -XXX,XX +XXX,XX @@ FIELD(MAPC, RDBASE, 16, 32)
40
* Values: | vPEID | ICID |
41
*/
42
#define ITS_ITT_ENTRY_SIZE 0xC
43
+#define ITE_ENTRY_INTTYPE_SHIFT 1
44
+#define ITE_ENTRY_INTID_SHIFT 2
45
+#define ITE_ENTRY_INTID_MASK MAKE_64BIT_MASK(2, 24)
46
+#define ITE_ENTRY_INTSP_SHIFT 26
47
+#define ITE_ENTRY_ICID_MASK MAKE_64BIT_MASK(0, 16)
48
49
/* 16 bits EventId */
50
#define ITS_IDBITS GICD_TYPER_IDBITS
51
diff --git a/include/hw/intc/arm_gicv3_common.h b/include/hw/intc/arm_gicv3_common.h
52
index XXXXXXX..XXXXXXX 100644
53
--- a/include/hw/intc/arm_gicv3_common.h
54
+++ b/include/hw/intc/arm_gicv3_common.h
55
@@ -XXX,XX +XXX,XX @@
56
#define GICV3_MAXIRQ 1020
57
#define GICV3_MAXSPI (GICV3_MAXIRQ - GIC_INTERNAL)
58
59
+#define GICV3_LPI_INTID_START 8192
60
+
61
#define GICV3_REDIST_SIZE 0x20000
62
63
/* Number of SGI target-list bits */
64
diff --git a/hw/intc/arm_gicv3_its.c b/hw/intc/arm_gicv3_its.c
65
index XXXXXXX..XXXXXXX 100644
66
--- a/hw/intc/arm_gicv3_its.c
67
+++ b/hw/intc/arm_gicv3_its.c
68
@@ -XXX,XX +XXX,XX @@ struct GICv3ITSClass {
69
void (*parent_reset)(DeviceState *dev);
70
};
20
};
71
21
72
+/*
22
-typedef struct {
73
+ * This is an internal enum used to distinguish between LPI triggered
23
- M68kCPU *cpu;
74
+ * via command queue and LPI triggered via gits_translater write.
24
- struct bi_record *rng_seed;
75
+ */
25
-} ResetInfo;
76
+typedef enum ItsCmdType {
26
-
77
+ NONE = 0, /* internal indication for GITS_TRANSLATER write */
27
static void main_cpu_reset(void *opaque)
78
+ CLEAR = 1,
79
+ DISCARD = 2,
80
+ INT = 3,
81
+} ItsCmdType;
82
+
83
+typedef struct {
84
+ uint32_t iteh;
85
+ uint64_t itel;
86
+} IteEntry;
87
+
88
static uint64_t baser_base_addr(uint64_t value, uint32_t page_sz)
89
{
28
{
90
uint64_t result = 0;
29
- ResetInfo *reset_info = opaque;
91
@@ -XXX,XX +XXX,XX @@ static uint64_t baser_base_addr(uint64_t value, uint32_t page_sz)
30
- M68kCPU *cpu = reset_info->cpu;
92
return result;
31
+ M68kCPU *cpu = opaque;
32
CPUState *cs = CPU(cpu);
33
34
- if (reset_info->rng_seed) {
35
- qemu_guest_getrandom_nofail((void *)reset_info->rng_seed->data + 2,
36
- be16_to_cpu(*(uint16_t *)reset_info->rng_seed->data));
37
- }
38
-
39
cpu_reset(cs);
40
cpu->env.aregs[7] = ldl_phys(cs->as, 0);
41
cpu->env.pc = ldl_phys(cs->as, 4);
93
}
42
}
94
43
95
+static bool get_cte(GICv3ITSState *s, uint16_t icid, uint64_t *cte,
44
+static void rerandomize_rng_seed(void *opaque)
96
+ MemTxResult *res)
97
+{
45
+{
98
+ AddressSpace *as = &s->gicv3->dma_as;
46
+ struct bi_record *rng_seed = opaque;
99
+ uint64_t l2t_addr;
47
+ qemu_guest_getrandom_nofail((void *)rng_seed->data + 2,
100
+ uint64_t value;
48
+ be16_to_cpu(*(uint16_t *)rng_seed->data));
101
+ bool valid_l2t;
102
+ uint32_t l2t_id;
103
+ uint32_t max_l2_entries;
104
+
105
+ if (s->ct.indirect) {
106
+ l2t_id = icid / (s->ct.page_sz / L1TABLE_ENTRY_SIZE);
107
+
108
+ value = address_space_ldq_le(as,
109
+ s->ct.base_addr +
110
+ (l2t_id * L1TABLE_ENTRY_SIZE),
111
+ MEMTXATTRS_UNSPECIFIED, res);
112
+
113
+ if (*res == MEMTX_OK) {
114
+ valid_l2t = (value & L2_TABLE_VALID_MASK) != 0;
115
+
116
+ if (valid_l2t) {
117
+ max_l2_entries = s->ct.page_sz / s->ct.entry_sz;
118
+
119
+ l2t_addr = value & ((1ULL << 51) - 1);
120
+
121
+ *cte = address_space_ldq_le(as, l2t_addr +
122
+ ((icid % max_l2_entries) * GITS_CTE_SIZE),
123
+ MEMTXATTRS_UNSPECIFIED, res);
124
+ }
125
+ }
126
+ } else {
127
+ /* Flat level table */
128
+ *cte = address_space_ldq_le(as, s->ct.base_addr +
129
+ (icid * GITS_CTE_SIZE),
130
+ MEMTXATTRS_UNSPECIFIED, res);
131
+ }
132
+
133
+ return (*cte & TABLE_ENTRY_VALID_MASK) != 0;
134
+}
49
+}
135
+
50
+
136
+static bool update_ite(GICv3ITSState *s, uint32_t eventid, uint64_t dte,
51
static uint8_t fake_mac_rom[] = {
137
+ IteEntry ite)
52
0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
138
+{
53
139
+ AddressSpace *as = &s->gicv3->dma_as;
54
@@ -XXX,XX +XXX,XX @@ static void q800_init(MachineState *machine)
140
+ uint64_t itt_addr;
55
NubusBus *nubus;
141
+ MemTxResult res = MEMTX_OK;
56
DeviceState *glue;
142
+
57
DriveInfo *dinfo;
143
+ itt_addr = (dte & GITS_DTE_ITTADDR_MASK) >> GITS_DTE_ITTADDR_SHIFT;
58
- ResetInfo *reset_info;
144
+ itt_addr <<= ITTADDR_SHIFT; /* 256 byte aligned */
59
uint8_t rng_seed[32];
145
+
60
146
+ address_space_stq_le(as, itt_addr + (eventid * (sizeof(uint64_t) +
61
linux_boot = (kernel_filename != NULL);
147
+ sizeof(uint32_t))), ite.itel, MEMTXATTRS_UNSPECIFIED,
62
@@ -XXX,XX +XXX,XX @@ static void q800_init(MachineState *machine)
148
+ &res);
63
exit(1);
149
+
64
}
150
+ if (res == MEMTX_OK) {
65
151
+ address_space_stl_le(as, itt_addr + (eventid * (sizeof(uint64_t) +
66
- reset_info = g_new0(ResetInfo, 1);
152
+ sizeof(uint32_t))) + sizeof(uint32_t), ite.iteh,
67
-
153
+ MEMTXATTRS_UNSPECIFIED, &res);
68
/* init CPUs */
154
+ }
69
cpu = M68K_CPU(cpu_create(machine->cpu_type));
155
+ if (res != MEMTX_OK) {
70
- reset_info->cpu = cpu;
156
+ return false;
71
- qemu_register_reset(main_cpu_reset, reset_info);
157
+ } else {
72
+ qemu_register_reset(main_cpu_reset, cpu);
158
+ return true;
73
159
+ }
74
/* RAM */
160
+}
75
memory_region_add_subregion(get_system_memory(), 0, machine->ram);
161
+
76
@@ -XXX,XX +XXX,XX @@ static void q800_init(MachineState *machine)
162
+static bool get_ite(GICv3ITSState *s, uint32_t eventid, uint64_t dte,
77
BOOTINFO0(param_ptr, BI_LAST);
163
+ uint16_t *icid, uint32_t *pIntid, MemTxResult *res)
78
rom_add_blob_fixed_as("bootinfo", param_blob, param_ptr - param_blob,
164
+{
79
parameters_base, cs->as);
165
+ AddressSpace *as = &s->gicv3->dma_as;
80
- reset_info->rng_seed = rom_ptr_for_as(cs->as, parameters_base,
166
+ uint64_t itt_addr;
81
- param_ptr - param_blob) +
167
+ bool status = false;
82
- (param_rng_seed - param_blob);
168
+ IteEntry ite = {};
83
+ qemu_register_reset_nosnapshotload(rerandomize_rng_seed,
169
+
84
+ rom_ptr_for_as(cs->as, parameters_base,
170
+ itt_addr = (dte & GITS_DTE_ITTADDR_MASK) >> GITS_DTE_ITTADDR_SHIFT;
85
+ param_ptr - param_blob) +
171
+ itt_addr <<= ITTADDR_SHIFT; /* 256 byte aligned */
86
+ (param_rng_seed - param_blob));
172
+
87
g_free(param_blob);
173
+ ite.itel = address_space_ldq_le(as, itt_addr +
88
} else {
174
+ (eventid * (sizeof(uint64_t) +
89
uint8_t *ptr;
175
+ sizeof(uint32_t))), MEMTXATTRS_UNSPECIFIED,
176
+ res);
177
+
178
+ if (*res == MEMTX_OK) {
179
+ ite.iteh = address_space_ldl_le(as, itt_addr +
180
+ (eventid * (sizeof(uint64_t) +
181
+ sizeof(uint32_t))) + sizeof(uint32_t),
182
+ MEMTXATTRS_UNSPECIFIED, res);
183
+
184
+ if (*res == MEMTX_OK) {
185
+ if (ite.itel & TABLE_ENTRY_VALID_MASK) {
186
+ if ((ite.itel >> ITE_ENTRY_INTTYPE_SHIFT) &
187
+ GITS_TYPE_PHYSICAL) {
188
+ *pIntid = (ite.itel & ITE_ENTRY_INTID_MASK) >>
189
+ ITE_ENTRY_INTID_SHIFT;
190
+ *icid = ite.iteh & ITE_ENTRY_ICID_MASK;
191
+ status = true;
192
+ }
193
+ }
194
+ }
195
+ }
196
+ return status;
197
+}
198
+
199
+static uint64_t get_dte(GICv3ITSState *s, uint32_t devid, MemTxResult *res)
200
+{
201
+ AddressSpace *as = &s->gicv3->dma_as;
202
+ uint64_t l2t_addr;
203
+ uint64_t value;
204
+ bool valid_l2t;
205
+ uint32_t l2t_id;
206
+ uint32_t max_l2_entries;
207
+
208
+ if (s->dt.indirect) {
209
+ l2t_id = devid / (s->dt.page_sz / L1TABLE_ENTRY_SIZE);
210
+
211
+ value = address_space_ldq_le(as,
212
+ s->dt.base_addr +
213
+ (l2t_id * L1TABLE_ENTRY_SIZE),
214
+ MEMTXATTRS_UNSPECIFIED, res);
215
+
216
+ if (*res == MEMTX_OK) {
217
+ valid_l2t = (value & L2_TABLE_VALID_MASK) != 0;
218
+
219
+ if (valid_l2t) {
220
+ max_l2_entries = s->dt.page_sz / s->dt.entry_sz;
221
+
222
+ l2t_addr = value & ((1ULL << 51) - 1);
223
+
224
+ value = address_space_ldq_le(as, l2t_addr +
225
+ ((devid % max_l2_entries) * GITS_DTE_SIZE),
226
+ MEMTXATTRS_UNSPECIFIED, res);
227
+ }
228
+ }
229
+ } else {
230
+ /* Flat level table */
231
+ value = address_space_ldq_le(as, s->dt.base_addr +
232
+ (devid * GITS_DTE_SIZE),
233
+ MEMTXATTRS_UNSPECIFIED, res);
234
+ }
235
+
236
+ return value;
237
+}
238
+
239
+/*
240
+ * This function handles the processing of following commands based on
241
+ * the ItsCmdType parameter passed:-
242
+ * 1. triggering of lpi interrupt translation via ITS INT command
243
+ * 2. triggering of lpi interrupt translation via gits_translater register
244
+ * 3. handling of ITS CLEAR command
245
+ * 4. handling of ITS DISCARD command
246
+ */
247
+static bool process_its_cmd(GICv3ITSState *s, uint64_t value, uint32_t offset,
248
+ ItsCmdType cmd)
249
+{
250
+ AddressSpace *as = &s->gicv3->dma_as;
251
+ uint32_t devid, eventid;
252
+ MemTxResult res = MEMTX_OK;
253
+ bool dte_valid;
254
+ uint64_t dte = 0;
255
+ uint32_t max_eventid;
256
+ uint16_t icid = 0;
257
+ uint32_t pIntid = 0;
258
+ bool ite_valid = false;
259
+ uint64_t cte = 0;
260
+ bool cte_valid = false;
261
+ bool result = false;
262
+
263
+ if (cmd == NONE) {
264
+ devid = offset;
265
+ } else {
266
+ devid = ((value & DEVID_MASK) >> DEVID_SHIFT);
267
+
268
+ offset += NUM_BYTES_IN_DW;
269
+ value = address_space_ldq_le(as, s->cq.base_addr + offset,
270
+ MEMTXATTRS_UNSPECIFIED, &res);
271
+ }
272
+
273
+ if (res != MEMTX_OK) {
274
+ return result;
275
+ }
276
+
277
+ eventid = (value & EVENTID_MASK);
278
+
279
+ dte = get_dte(s, devid, &res);
280
+
281
+ if (res != MEMTX_OK) {
282
+ return result;
283
+ }
284
+ dte_valid = dte & TABLE_ENTRY_VALID_MASK;
285
+
286
+ if (dte_valid) {
287
+ max_eventid = (1UL << (((dte >> 1U) & SIZE_MASK) + 1));
288
+
289
+ ite_valid = get_ite(s, eventid, dte, &icid, &pIntid, &res);
290
+
291
+ if (res != MEMTX_OK) {
292
+ return result;
293
+ }
294
+
295
+ if (ite_valid) {
296
+ cte_valid = get_cte(s, icid, &cte, &res);
297
+ }
298
+
299
+ if (res != MEMTX_OK) {
300
+ return result;
301
+ }
302
+ }
303
+
304
+ if ((devid > s->dt.maxids.max_devids) || !dte_valid || !ite_valid ||
305
+ !cte_valid || (eventid > max_eventid)) {
306
+ qemu_log_mask(LOG_GUEST_ERROR,
307
+ "%s: invalid command attributes "
308
+ "devid %d or eventid %d or invalid dte %d or"
309
+ "invalid cte %d or invalid ite %d\n",
310
+ __func__, devid, eventid, dte_valid, cte_valid,
311
+ ite_valid);
312
+ /*
313
+ * in this implementation, in case of error
314
+ * we ignore this command and move onto the next
315
+ * command in the queue
316
+ */
317
+ } else {
318
+ /*
319
+ * Current implementation only supports rdbase == procnum
320
+ * Hence rdbase physical address is ignored
321
+ */
322
+ if (cmd == DISCARD) {
323
+ IteEntry ite = {};
324
+ /* remove mapping from interrupt translation table */
325
+ result = update_ite(s, eventid, dte, ite);
326
+ }
327
+ }
328
+
329
+ return result;
330
+}
331
+
332
+static bool process_mapti(GICv3ITSState *s, uint64_t value, uint32_t offset,
333
+ bool ignore_pInt)
334
+{
335
+ AddressSpace *as = &s->gicv3->dma_as;
336
+ uint32_t devid, eventid;
337
+ uint32_t pIntid = 0;
338
+ uint32_t max_eventid, max_Intid;
339
+ bool dte_valid;
340
+ MemTxResult res = MEMTX_OK;
341
+ uint16_t icid = 0;
342
+ uint64_t dte = 0;
343
+ IteEntry ite;
344
+ uint32_t int_spurious = INTID_SPURIOUS;
345
+ bool result = false;
346
+
347
+ devid = ((value & DEVID_MASK) >> DEVID_SHIFT);
348
+ offset += NUM_BYTES_IN_DW;
349
+ value = address_space_ldq_le(as, s->cq.base_addr + offset,
350
+ MEMTXATTRS_UNSPECIFIED, &res);
351
+
352
+ if (res != MEMTX_OK) {
353
+ return result;
354
+ }
355
+
356
+ eventid = (value & EVENTID_MASK);
357
+
358
+ if (!ignore_pInt) {
359
+ pIntid = ((value & pINTID_MASK) >> pINTID_SHIFT);
360
+ }
361
+
362
+ offset += NUM_BYTES_IN_DW;
363
+ value = address_space_ldq_le(as, s->cq.base_addr + offset,
364
+ MEMTXATTRS_UNSPECIFIED, &res);
365
+
366
+ if (res != MEMTX_OK) {
367
+ return result;
368
+ }
369
+
370
+ icid = value & ICID_MASK;
371
+
372
+ dte = get_dte(s, devid, &res);
373
+
374
+ if (res != MEMTX_OK) {
375
+ return result;
376
+ }
377
+ dte_valid = dte & TABLE_ENTRY_VALID_MASK;
378
+
379
+ max_eventid = (1UL << (((dte >> 1U) & SIZE_MASK) + 1));
380
+
381
+ if (!ignore_pInt) {
382
+ max_Intid = (1ULL << (GICD_TYPER_IDBITS + 1)) - 1;
383
+ }
384
+
385
+ if ((devid > s->dt.maxids.max_devids) || (icid > s->ct.maxids.max_collids)
386
+ || !dte_valid || (eventid > max_eventid) ||
387
+ (!ignore_pInt && (((pIntid < GICV3_LPI_INTID_START) ||
388
+ (pIntid > max_Intid)) && (pIntid != INTID_SPURIOUS)))) {
389
+ qemu_log_mask(LOG_GUEST_ERROR,
390
+ "%s: invalid command attributes "
391
+ "devid %d or icid %d or eventid %d or pIntid %d or"
392
+ "unmapped dte %d\n", __func__, devid, icid, eventid,
393
+ pIntid, dte_valid);
394
+ /*
395
+ * in this implementation, in case of error
396
+ * we ignore this command and move onto the next
397
+ * command in the queue
398
+ */
399
+ } else {
400
+ /* add ite entry to interrupt translation table */
401
+ ite.itel = (dte_valid & TABLE_ENTRY_VALID_MASK) |
402
+ (GITS_TYPE_PHYSICAL << ITE_ENTRY_INTTYPE_SHIFT);
403
+
404
+ if (ignore_pInt) {
405
+ ite.itel |= (eventid << ITE_ENTRY_INTID_SHIFT);
406
+ } else {
407
+ ite.itel |= (pIntid << ITE_ENTRY_INTID_SHIFT);
408
+ }
409
+ ite.itel |= (int_spurious << ITE_ENTRY_INTSP_SHIFT);
410
+ ite.iteh = icid;
411
+
412
+ result = update_ite(s, eventid, dte, ite);
413
+ }
414
+
415
+ return result;
416
+}
417
+
418
static bool update_cte(GICv3ITSState *s, uint16_t icid, bool valid,
419
uint64_t rdbase)
420
{
421
@@ -XXX,XX +XXX,XX @@ static void process_cmdq(GICv3ITSState *s)
422
423
switch (cmd) {
424
case GITS_CMD_INT:
425
+ res = process_its_cmd(s, data, cq_offset, INT);
426
break;
427
case GITS_CMD_CLEAR:
428
+ res = process_its_cmd(s, data, cq_offset, CLEAR);
429
break;
430
case GITS_CMD_SYNC:
431
/*
432
@@ -XXX,XX +XXX,XX @@ static void process_cmdq(GICv3ITSState *s)
433
result = process_mapc(s, cq_offset);
434
break;
435
case GITS_CMD_MAPTI:
436
+ result = process_mapti(s, data, cq_offset, false);
437
break;
438
case GITS_CMD_MAPI:
439
+ result = process_mapti(s, data, cq_offset, true);
440
break;
441
case GITS_CMD_DISCARD:
442
+ result = process_its_cmd(s, data, cq_offset, DISCARD);
443
break;
444
case GITS_CMD_INV:
445
case GITS_CMD_INVALL:
446
@@ -XXX,XX +XXX,XX @@ static MemTxResult gicv3_its_translation_write(void *opaque, hwaddr offset,
447
uint64_t data, unsigned size,
448
MemTxAttrs attrs)
449
{
450
- return MEMTX_OK;
451
+ GICv3ITSState *s = (GICv3ITSState *)opaque;
452
+ bool result = true;
453
+ uint32_t devid = 0;
454
+
455
+ switch (offset) {
456
+ case GITS_TRANSLATER:
457
+ if (s->ctlr & ITS_CTLR_ENABLED) {
458
+ devid = attrs.requester_id;
459
+ result = process_its_cmd(s, data, devid, NONE);
460
+ }
461
+ break;
462
+ default:
463
+ break;
464
+ }
465
+
466
+ if (result) {
467
+ return MEMTX_OK;
468
+ } else {
469
+ return MEMTX_ERROR;
470
+ }
471
}
472
473
static bool its_writel(GICv3ITSState *s, hwaddr offset,
474
--
90
--
475
2.20.1
91
2.25.1
476
477
diff view generated by jsdifflib
1
From: Bin Meng <bmeng.cn@gmail.com>
1
From: "Jason A. Donenfeld" <Jason@zx2c4.com>
2
2
3
At present when input clock is disabled, any character transmitted
3
When the system reboots, the rng-seed that the FDT has should be
4
to tx fifo can still show on the serial line, which is wrong.
4
re-randomized, so that the new boot gets a new seed. Since the FDT is in
5
the ROM region at this point, we add a hook right after the ROM has been
6
added, so that we have a pointer to that copy of the FDT.
5
7
6
Fixes: b636db306e06 ("hw/char/cadence_uart: add clock support")
8
Cc: Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>
7
Signed-off-by: Bin Meng <bmeng.cn@gmail.com>
9
Cc: Paul Burton <paulburton@kernel.org>
8
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
10
Cc: Philippe Mathieu-Daudé <f4bug@amsat.org>
9
Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com>
11
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
10
Message-id: 20210901124521.30599-3-bmeng.cn@gmail.com
12
Message-id: 20221025004327.568476-9-Jason@zx2c4.com
13
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
15
---
13
hw/char/cadence_uart.c | 5 +++++
16
hw/mips/boston.c | 3 +++
14
1 file changed, 5 insertions(+)
17
1 file changed, 3 insertions(+)
15
18
16
diff --git a/hw/char/cadence_uart.c b/hw/char/cadence_uart.c
19
diff --git a/hw/mips/boston.c b/hw/mips/boston.c
17
index XXXXXXX..XXXXXXX 100644
20
index XXXXXXX..XXXXXXX 100644
18
--- a/hw/char/cadence_uart.c
21
--- a/hw/mips/boston.c
19
+++ b/hw/char/cadence_uart.c
22
+++ b/hw/mips/boston.c
20
@@ -XXX,XX +XXX,XX @@ static gboolean cadence_uart_xmit(void *do_not_use, GIOCondition cond,
23
@@ -XXX,XX +XXX,XX @@
21
static void uart_write_tx_fifo(CadenceUARTState *s, const uint8_t *buf,
24
#include "sysemu/sysemu.h"
22
int size)
25
#include "sysemu/qtest.h"
23
{
26
#include "sysemu/runstate.h"
24
+ /* ignore characters when unclocked or in reset */
27
+#include "sysemu/reset.h"
25
+ if (!clock_is_enabled(s->refclk) || device_is_in_reset(DEVICE(s))) {
28
26
+ return;
29
#include <libfdt.h>
27
+ }
30
#include "qom/object.h"
28
+
31
@@ -XXX,XX +XXX,XX @@ static void boston_mach_init(MachineState *machine)
29
if ((s->r[R_CR] & UART_CR_TX_DIS) || !(s->r[R_CR] & UART_CR_TX_EN)) {
32
/* Calculate real fdt size after filter */
30
return;
33
dt_size = fdt_totalsize(dtb_load_data);
31
}
34
rom_add_blob_fixed("dtb", dtb_load_data, dt_size, dtb_paddr);
35
+ qemu_register_reset_nosnapshotload(qemu_fdt_randomize_seeds,
36
+ rom_ptr(dtb_paddr, dt_size));
37
} else {
38
/* Try to load file as FIT */
39
fit_err = load_fit(&boston_fit_loader, machine->kernel_filename, s);
32
--
40
--
33
2.20.1
41
2.25.1
34
42
35
43
diff view generated by jsdifflib
New patch
1
From: "Jason A. Donenfeld" <Jason@zx2c4.com>
1
2
3
When the system reboots, the rng-seed that the FDT has should be
4
re-randomized, so that the new boot gets a new seed. Since the FDT is in
5
the ROM region at this point, we add a hook right after the ROM has been
6
added, so that we have a pointer to that copy of the FDT.
7
8
Cc: Stafford Horne <shorne@gmail.com>
9
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
10
Message-id: 20221025004327.568476-11-Jason@zx2c4.com
11
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
---
14
hw/openrisc/boot.c | 3 +++
15
1 file changed, 3 insertions(+)
16
17
diff --git a/hw/openrisc/boot.c b/hw/openrisc/boot.c
18
index XXXXXXX..XXXXXXX 100644
19
--- a/hw/openrisc/boot.c
20
+++ b/hw/openrisc/boot.c
21
@@ -XXX,XX +XXX,XX @@
22
#include "hw/openrisc/boot.h"
23
#include "sysemu/device_tree.h"
24
#include "sysemu/qtest.h"
25
+#include "sysemu/reset.h"
26
27
#include <libfdt.h>
28
29
@@ -XXX,XX +XXX,XX @@ uint32_t openrisc_load_fdt(void *fdt, hwaddr load_start,
30
31
rom_add_blob_fixed_as("fdt", fdt, fdtsize, fdt_addr,
32
&address_space_memory);
33
+ qemu_register_reset_nosnapshotload(qemu_fdt_randomize_seeds,
34
+ rom_ptr_for_as(&address_space_memory, fdt_addr, fdtsize));
35
36
return fdt_addr;
37
}
38
--
39
2.25.1
diff view generated by jsdifflib
New patch
1
From: "Jason A. Donenfeld" <Jason@zx2c4.com>
1
2
3
When the system reboots, the rng-seed that the FDT has should be
4
re-randomized, so that the new boot gets a new seed. Since the FDT is in
5
the ROM region at this point, we add a hook right after the ROM has been
6
added, so that we have a pointer to that copy of the FDT.
7
8
Cc: Yoshinori Sato <ysato@users.sourceforge.jp>
9
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
10
Message-id: 20221025004327.568476-12-Jason@zx2c4.com
11
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
---
14
hw/rx/rx-gdbsim.c | 3 +++
15
1 file changed, 3 insertions(+)
16
17
diff --git a/hw/rx/rx-gdbsim.c b/hw/rx/rx-gdbsim.c
18
index XXXXXXX..XXXXXXX 100644
19
--- a/hw/rx/rx-gdbsim.c
20
+++ b/hw/rx/rx-gdbsim.c
21
@@ -XXX,XX +XXX,XX @@
22
#include "hw/rx/rx62n.h"
23
#include "sysemu/qtest.h"
24
#include "sysemu/device_tree.h"
25
+#include "sysemu/reset.h"
26
#include "hw/boards.h"
27
#include "qom/object.h"
28
29
@@ -XXX,XX +XXX,XX @@ static void rx_gdbsim_init(MachineState *machine)
30
dtb_offset = ROUND_DOWN(machine->ram_size - dtb_size, 16);
31
rom_add_blob_fixed("dtb", dtb, dtb_size,
32
SDRAM_BASE + dtb_offset);
33
+ qemu_register_reset_nosnapshotload(qemu_fdt_randomize_seeds,
34
+ rom_ptr(SDRAM_BASE + dtb_offset, dtb_size));
35
/* Set dtb address to R1 */
36
RX_CPU(first_cpu)->env.regs[1] = SDRAM_BASE + dtb_offset;
37
}
38
--
39
2.25.1
diff view generated by jsdifflib