1 | The following changes since commit 55ef0b702bc2c90c3c4ed97f97676d8f139e5ca1: | 1 | Hi; here's a target-arm pullreq for rc0; these are all bugfixes |
---|---|---|---|
2 | and similar minor stuff. | ||
2 | 3 | ||
3 | Merge remote-tracking branch 'remotes/lvivier-gitlab/tags/linux-user-for-7.0-pull-request' into staging (2022-02-07 10:48:25 +0000) | 4 | thanks |
5 | -- PMM | ||
6 | |||
7 | The following changes since commit 0462a32b4f63b2448b4a196381138afd50719dc4: | ||
8 | |||
9 | Merge tag 'for-upstream' of https://repo.or.cz/qemu/kevin into staging (2025-03-14 09:31:13 +0800) | ||
4 | 10 | ||
5 | are available in the Git repository at: | 11 | are available in the Git repository at: |
6 | 12 | ||
7 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20220208 | 13 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20250314-1 |
8 | 14 | ||
9 | for you to fetch changes up to 4fd1ebb10593087d45d2f56f7f3d13447d24802c: | 15 | for you to fetch changes up to a019e15edfd62beae1e2f6adc0fa7415ba20b14c: |
10 | 16 | ||
11 | hw/sensor: Add lsm303dlhc magnetometer device (2022-02-08 10:56:29 +0000) | 17 | meson.build: Set RUST_BACKTRACE for all tests (2025-03-14 12:54:33 +0000) |
12 | 18 | ||
13 | ---------------------------------------------------------------- | 19 | ---------------------------------------------------------------- |
14 | target-arm queue: | 20 | target-arm queue: |
15 | * Fix handling of SVE ZCR_LEN when using VHE | 21 | * Correctly handle corner cases of guest attempting an exception |
16 | * xlnx-zynqmp: 'Or' the QSPI / QSPI DMA IRQs | 22 | return to AArch32 when target EL is AArch64 only |
17 | * Don't ever enable PSCI when booting guest in EL3 | 23 | * MAINTAINERS: Fix status for Arm boards I "maintain" |
18 | * Adhere to SMCCC 1.3 section 5.2 | 24 | * tests/functional: Bump up arm_replay timeout |
19 | * highbank: Fix issues with booting SMP | 25 | * Revert "hw/char/pl011: Warn when using disabled receiver" |
20 | * midway: Fix issues booting at all | 26 | * util/cacheflush: Make first DSB unconditional on aarch64 |
21 | * boot: Drop existing dtb /psci node rather than retaining it | 27 | * target/arm: Fix SVE/SME access check logic |
22 | * versal-virt: Always call arm_load_kernel() | 28 | * meson.build: Set RUST_BACKTRACE for all tests |
23 | * force flag recalculation when messing with DAIF | ||
24 | * hw/timer/armv7m_systick: Update clock source before enabling timer | ||
25 | * hw/arm/smmuv3: Fix device reset | ||
26 | * hw/intc/arm_gicv3_its: refactorings and minor bug fixes | ||
27 | * hw/sensor: Add lsm303dlhc magnetometer device | ||
28 | 29 | ||
29 | ---------------------------------------------------------------- | 30 | ---------------------------------------------------------------- |
30 | Alex Bennée (1): | 31 | Joe Komlodi (1): |
31 | arm: force flag recalculation when messing with DAIF | 32 | util/cacheflush: Make first DSB unconditional on aarch64 |
32 | 33 | ||
33 | Edgar E. Iglesias (1): | 34 | Paolo Bonzini (1): |
34 | hw/arm: versal-virt: Always call arm_load_kernel() | 35 | Revert "hw/char/pl011: Warn when using disabled receiver" |
35 | 36 | ||
36 | Eric Auger (1): | 37 | Peter Maydell (13): |
37 | hw/arm/smmuv3: Fix device reset | 38 | target/arm: Move A32_BANKED_REG_{GET,SET} macros to cpregs.h |
39 | target/arm: Un-inline access_secure_reg() | ||
40 | linux-user/aarch64: Remove unused get/put_user macros | ||
41 | linux-user/arm: Remove unused get_put_user macros | ||
42 | target/arm: Move arm_cpu_data_is_big_endian() etc to internals.h | ||
43 | target/arm: Move arm_current_el() and arm_el_is_aa64() to internals.h | ||
44 | target/arm: SCR_EL3.RW should be treated as 1 if EL2 doesn't support AArch32 | ||
45 | target/arm: HCR_EL2.RW should be RAO/WI if EL1 doesn't support AArch32 | ||
46 | target/arm: Add cpu local variable to exception_return helper | ||
47 | target/arm: Forbid return to AArch32 when CPU is AArch64-only | ||
48 | MAINTAINERS: Fix status for Arm boards I "maintain" | ||
49 | tests/functional: Bump up arm_replay timeout | ||
50 | meson.build: Set RUST_BACKTRACE for all tests | ||
38 | 51 | ||
39 | Francisco Iglesias (1): | 52 | Richard Henderson (2): |
40 | hw/arm/xlnx-zynqmp: 'Or' the QSPI / QSPI DMA IRQs | 53 | target/arm: Make DisasContext.{fp, sve}_access_checked tristate |
54 | target/arm: Simplify pstate_sm check in sve_access_check | ||
41 | 55 | ||
42 | Kevin Townsend (1): | 56 | MAINTAINERS | 14 ++-- |
43 | hw/sensor: Add lsm303dlhc magnetometer device | 57 | meson.build | 9 ++- |
44 | 58 | target/arm/cpregs.h | 28 +++++++ | |
45 | Peter Maydell (29): | 59 | target/arm/cpu.h | 153 +----------------------------------- |
46 | target/arm: make psci-conduit settable after realize | 60 | target/arm/internals.h | 135 +++++++++++++++++++++++++++++++ |
47 | cpu.c: Make start-powered-off settable after realize | 61 | target/arm/tcg/translate-a64.h | 2 +- |
48 | hw/arm/boot: Support setting psci-conduit based on guest EL | 62 | target/arm/tcg/translate.h | 10 ++- |
49 | hw/arm: imx: Don't enable PSCI conduit when booting guest in EL3 | 63 | hw/char/pl011.c | 19 ++--- |
50 | hw/arm: allwinner: Don't enable PSCI conduit when booting guest in EL3 | 64 | hw/intc/arm_gicv3_cpuif.c | 1 + |
51 | hw/arm/xlnx-zcu102: Don't enable PSCI conduit when booting guest in EL3 | 65 | linux-user/aarch64/cpu_loop.c | 48 ----------- |
52 | hw/arm/versal: Let boot.c handle PSCI enablement | 66 | linux-user/arm/cpu_loop.c | 43 +--------- |
53 | hw/arm/virt: Let boot.c handle PSCI enablement | 67 | target/arm/arch_dump.c | 1 + |
54 | hw/arm: highbank: For EL3 guests, don't enable PSCI, start all cores | 68 | target/arm/helper.c | 16 +++- |
55 | arm: tcg: Adhere to SMCCC 1.3 section 5.2 | 69 | target/arm/tcg/helper-a64.c | 12 ++- |
56 | hw/arm/highbank: Drop use of secure_board_setup | 70 | target/arm/tcg/hflags.c | 9 +++ |
57 | hw/arm/boot: Prevent setting both psci_conduit and secure_board_setup | 71 | target/arm/tcg/translate-a64.c | 37 ++++----- |
58 | hw/arm/boot: Don't write secondary boot stub if using PSCI | 72 | util/cacheflush.c | 4 +- |
59 | hw/arm/highbank: Drop unused secondary boot stub code | 73 | .gitlab-ci.d/buildtest-template.yml | 1 - |
60 | hw/arm/boot: Drop nb_cpus field from arm_boot_info | 74 | 18 files changed, 257 insertions(+), 285 deletions(-) |
61 | hw/arm/boot: Drop existing dtb /psci node rather than retaining it | ||
62 | hw/intc/arm_gicv3_its: Use address_space_map() to access command queue packets | ||
63 | hw/intc/arm_gicv3_its: Keep DTEs as a struct, not a raw uint64_t | ||
64 | hw/intc/arm_gicv3_its: Pass DTEntry to update_dte() | ||
65 | hw/intc/arm_gicv3_its: Keep CTEs as a struct, not a raw uint64_t | ||
66 | hw/intc/arm_gicv3_its: Pass CTEntry to update_cte() | ||
67 | hw/intc/arm_gicv3_its: Fix address calculation in get_ite() and update_ite() | ||
68 | hw/intc/arm_gicv3_its: Avoid nested ifs in get_ite() | ||
69 | hw/intc/arm_gicv3_its: Pass ITE values back from get_ite() via a struct | ||
70 | hw/intc/arm_gicv3_its: Make update_ite() use ITEntry | ||
71 | hw/intc/arm_gicv3_its: Drop TableDesc and CmdQDesc valid fields | ||
72 | hw/intc/arm_gicv3_its: In MAPC with V=0, don't check rdbase field | ||
73 | hw/intc/arm_gicv3_its: Don't allow intid 1023 in MAPI/MAPTI | ||
74 | hw/intc/arm_gicv3_its: Split error checks | ||
75 | |||
76 | Richard Henderson (4): | ||
77 | target/arm: Fix sve_zcr_len_for_el for VHE mode running | ||
78 | target/arm: Tidy sve_exception_el for CPACR_EL1 access | ||
79 | target/arm: Fix {fp, sve}_exception_el for VHE mode running | ||
80 | target/arm: Use CPTR_TFP with CPTR_EL3 in fp_exception_el | ||
81 | |||
82 | Richard Petri (1): | ||
83 | hw/timer/armv7m_systick: Update clock source before enabling timer | ||
84 | |||
85 | hw/intc/gicv3_internal.h | 23 +- | ||
86 | include/hw/arm/boot.h | 14 +- | ||
87 | include/hw/arm/xlnx-versal.h | 1 - | ||
88 | include/hw/arm/xlnx-zynqmp.h | 2 + | ||
89 | include/hw/intc/arm_gicv3_its_common.h | 2 - | ||
90 | cpu.c | 22 +- | ||
91 | hw/arm/allwinner-h3.c | 9 +- | ||
92 | hw/arm/aspeed.c | 1 - | ||
93 | hw/arm/boot.c | 107 ++++- | ||
94 | hw/arm/exynos4_boards.c | 1 - | ||
95 | hw/arm/fsl-imx6ul.c | 2 - | ||
96 | hw/arm/fsl-imx7.c | 8 +- | ||
97 | hw/arm/highbank.c | 72 +--- | ||
98 | hw/arm/imx25_pdk.c | 3 +- | ||
99 | hw/arm/kzm.c | 1 - | ||
100 | hw/arm/mcimx6ul-evk.c | 2 +- | ||
101 | hw/arm/mcimx7d-sabre.c | 2 +- | ||
102 | hw/arm/npcm7xx.c | 3 - | ||
103 | hw/arm/orangepi.c | 5 +- | ||
104 | hw/arm/raspi.c | 1 - | ||
105 | hw/arm/realview.c | 1 - | ||
106 | hw/arm/sabrelite.c | 1 - | ||
107 | hw/arm/sbsa-ref.c | 1 - | ||
108 | hw/arm/smmuv3.c | 6 + | ||
109 | hw/arm/vexpress.c | 1 - | ||
110 | hw/arm/virt.c | 13 +- | ||
111 | hw/arm/xilinx_zynq.c | 1 - | ||
112 | hw/arm/xlnx-versal-virt.c | 17 +- | ||
113 | hw/arm/xlnx-versal.c | 5 +- | ||
114 | hw/arm/xlnx-zcu102.c | 1 + | ||
115 | hw/arm/xlnx-zynqmp.c | 25 +- | ||
116 | hw/intc/arm_gicv3_its.c | 696 +++++++++++++++------------------ | ||
117 | hw/sensor/lsm303dlhc_mag.c | 556 ++++++++++++++++++++++++++ | ||
118 | hw/timer/armv7m_systick.c | 8 +- | ||
119 | target/arm/cpu.c | 6 +- | ||
120 | target/arm/helper-a64.c | 2 + | ||
121 | target/arm/helper.c | 118 ++++-- | ||
122 | target/arm/psci.c | 35 +- | ||
123 | tests/qtest/lsm303dlhc-mag-test.c | 148 +++++++ | ||
124 | hw/sensor/Kconfig | 4 + | ||
125 | hw/sensor/meson.build | 1 + | ||
126 | tests/qtest/meson.build | 1 + | ||
127 | 42 files changed, 1308 insertions(+), 620 deletions(-) | ||
128 | create mode 100644 hw/sensor/lsm303dlhc_mag.c | ||
129 | create mode 100644 tests/qtest/lsm303dlhc-mag-test.c | ||
130 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Richard Henderson <richard.henderson@linaro.org> | ||
2 | 1 | ||
3 | When HCR_EL2.{E2H,TGE} == '11', ZCR_EL1 is unused. | ||
4 | |||
5 | Reported-by: Zenghui Yu <yuzenghui@huawei.com> | ||
6 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Reviewed-by: Zenghui Yu <yuzenghui@huawei.com> | ||
9 | Message-id: 20220127063428.30212-2-richard.henderson@linaro.org | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | --- | ||
12 | target/arm/helper.c | 3 ++- | ||
13 | 1 file changed, 2 insertions(+), 1 deletion(-) | ||
14 | |||
15 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
16 | index XXXXXXX..XXXXXXX 100644 | ||
17 | --- a/target/arm/helper.c | ||
18 | +++ b/target/arm/helper.c | ||
19 | @@ -XXX,XX +XXX,XX @@ uint32_t sve_zcr_len_for_el(CPUARMState *env, int el) | ||
20 | ARMCPU *cpu = env_archcpu(env); | ||
21 | uint32_t zcr_len = cpu->sve_max_vq - 1; | ||
22 | |||
23 | - if (el <= 1) { | ||
24 | + if (el <= 1 && | ||
25 | + (arm_hcr_el2_eff(env) & (HCR_E2H | HCR_TGE)) != (HCR_E2H | HCR_TGE)) { | ||
26 | zcr_len = MIN(zcr_len, 0xf & (uint32_t)env->vfp.zcr_el[1]); | ||
27 | } | ||
28 | if (el <= 2 && arm_feature(env, ARM_FEATURE_EL2)) { | ||
29 | -- | ||
30 | 2.25.1 | ||
31 | |||
32 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Richard Henderson <richard.henderson@linaro.org> | ||
2 | 1 | ||
3 | Extract entire fields for ZEN and FPEN, rather than testing specific bits. | ||
4 | This makes it easier to follow the code versus the ARM spec. | ||
5 | |||
6 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Reviewed-by: Zenghui Yu <yuzenghui@huawei.com> | ||
9 | Message-id: 20220127063428.30212-3-richard.henderson@linaro.org | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | --- | ||
12 | target/arm/helper.c | 36 +++++++++++++++++------------------- | ||
13 | 1 file changed, 17 insertions(+), 19 deletions(-) | ||
14 | |||
15 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
16 | index XXXXXXX..XXXXXXX 100644 | ||
17 | --- a/target/arm/helper.c | ||
18 | +++ b/target/arm/helper.c | ||
19 | @@ -XXX,XX +XXX,XX @@ int sve_exception_el(CPUARMState *env, int el) | ||
20 | uint64_t hcr_el2 = arm_hcr_el2_eff(env); | ||
21 | |||
22 | if (el <= 1 && (hcr_el2 & (HCR_E2H | HCR_TGE)) != (HCR_E2H | HCR_TGE)) { | ||
23 | - bool disabled = false; | ||
24 | - | ||
25 | - /* The CPACR.ZEN controls traps to EL1: | ||
26 | - * 0, 2 : trap EL0 and EL1 accesses | ||
27 | - * 1 : trap only EL0 accesses | ||
28 | - * 3 : trap no accesses | ||
29 | - */ | ||
30 | - if (!extract32(env->cp15.cpacr_el1, 16, 1)) { | ||
31 | - disabled = true; | ||
32 | - } else if (!extract32(env->cp15.cpacr_el1, 17, 1)) { | ||
33 | - disabled = el == 0; | ||
34 | - } | ||
35 | - if (disabled) { | ||
36 | + /* Check CPACR.ZEN. */ | ||
37 | + switch (extract32(env->cp15.cpacr_el1, 16, 2)) { | ||
38 | + case 1: | ||
39 | + if (el != 0) { | ||
40 | + break; | ||
41 | + } | ||
42 | + /* fall through */ | ||
43 | + case 0: | ||
44 | + case 2: | ||
45 | /* route_to_el2 */ | ||
46 | return hcr_el2 & HCR_TGE ? 2 : 1; | ||
47 | } | ||
48 | |||
49 | /* Check CPACR.FPEN. */ | ||
50 | - if (!extract32(env->cp15.cpacr_el1, 20, 1)) { | ||
51 | - disabled = true; | ||
52 | - } else if (!extract32(env->cp15.cpacr_el1, 21, 1)) { | ||
53 | - disabled = el == 0; | ||
54 | - } | ||
55 | - if (disabled) { | ||
56 | + switch (extract32(env->cp15.cpacr_el1, 20, 2)) { | ||
57 | + case 1: | ||
58 | + if (el != 0) { | ||
59 | + break; | ||
60 | + } | ||
61 | + /* fall through */ | ||
62 | + case 0: | ||
63 | + case 2: | ||
64 | return 0; | ||
65 | } | ||
66 | } | ||
67 | -- | ||
68 | 2.25.1 | ||
69 | |||
70 | diff view generated by jsdifflib |
1 | In the ITS, a CTE is an entry in the collection table, which contains | 1 | The A32_BANKED_REG_{GET,SET} macros are only used inside target/arm; |
---|---|---|---|
2 | multiple fields. Currently the function get_cte() which reads one | 2 | move their definitions to cpregs.h. There's no need to have them |
3 | entry from the device table returns a success/failure boolean and | 3 | defined in all the code that includes cpu.h. |
4 | passes back the raw 64-bit integer CTE value via a pointer argument. | ||
5 | We then extract fields from the CTE as we need them. | ||
6 | |||
7 | Create a real C struct with the same fields as the CTE, and | ||
8 | populate it in get_cte(), so that that function and update_cte() | ||
9 | are the only ones which need to care about the in-guest-memory | ||
10 | format of the CTE. | ||
11 | |||
12 | This brings get_cte()'s API into line with get_dte(). | ||
13 | 4 | ||
14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
15 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
16 | Message-id: 20220201193207.2771604-5-peter.maydell@linaro.org | ||
17 | --- | 7 | --- |
18 | hw/intc/arm_gicv3_its.c | 96 ++++++++++++++++++++++------------------- | 8 | target/arm/cpregs.h | 28 ++++++++++++++++++++++++++++ |
19 | 1 file changed, 52 insertions(+), 44 deletions(-) | 9 | target/arm/cpu.h | 27 --------------------------- |
10 | 2 files changed, 28 insertions(+), 27 deletions(-) | ||
20 | 11 | ||
21 | diff --git a/hw/intc/arm_gicv3_its.c b/hw/intc/arm_gicv3_its.c | 12 | diff --git a/target/arm/cpregs.h b/target/arm/cpregs.h |
22 | index XXXXXXX..XXXXXXX 100644 | 13 | index XXXXXXX..XXXXXXX 100644 |
23 | --- a/hw/intc/arm_gicv3_its.c | 14 | --- a/target/arm/cpregs.h |
24 | +++ b/hw/intc/arm_gicv3_its.c | 15 | +++ b/target/arm/cpregs.h |
25 | @@ -XXX,XX +XXX,XX @@ typedef struct DTEntry { | 16 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_cpreg_traps_in_nv(const ARMCPRegInfo *ri) |
26 | uint64_t ittaddr; | 17 | return ri->opc1 == 4 || ri->opc1 == 5; |
27 | } DTEntry; | 18 | } |
28 | 19 | ||
29 | +typedef struct CTEntry { | 20 | +/* Macros for accessing a specified CP register bank */ |
30 | + bool valid; | 21 | +#define A32_BANKED_REG_GET(_env, _regname, _secure) \ |
31 | + uint32_t rdbase; | 22 | + ((_secure) ? (_env)->cp15._regname##_s : (_env)->cp15._regname##_ns) |
32 | +} CTEntry; | ||
33 | + | 23 | + |
34 | /* | 24 | +#define A32_BANKED_REG_SET(_env, _regname, _secure, _val) \ |
35 | * The ITS spec permits a range of CONSTRAINED UNPREDICTABLE options | 25 | + do { \ |
36 | * if a command parameter is not correct. These include both "stall | 26 | + if (_secure) { \ |
37 | @@ -XXX,XX +XXX,XX @@ static uint64_t table_entry_addr(GICv3ITSState *s, TableDesc *td, | 27 | + (_env)->cp15._regname##_s = (_val); \ |
38 | return (l2 & ((1ULL << 51) - 1)) + (idx % num_l2_entries) * td->entry_sz; | 28 | + } else { \ |
29 | + (_env)->cp15._regname##_ns = (_val); \ | ||
30 | + } \ | ||
31 | + } while (0) | ||
32 | + | ||
33 | +/* | ||
34 | + * Macros for automatically accessing a specific CP register bank depending on | ||
35 | + * the current secure state of the system. These macros are not intended for | ||
36 | + * supporting instruction translation reads/writes as these are dependent | ||
37 | + * solely on the SCR.NS bit and not the mode. | ||
38 | + */ | ||
39 | +#define A32_BANKED_CURRENT_REG_GET(_env, _regname) \ | ||
40 | + A32_BANKED_REG_GET((_env), _regname, \ | ||
41 | + (arm_is_secure(_env) && !arm_el_is_aa64((_env), 3))) | ||
42 | + | ||
43 | +#define A32_BANKED_CURRENT_REG_SET(_env, _regname, _val) \ | ||
44 | + A32_BANKED_REG_SET((_env), _regname, \ | ||
45 | + (arm_is_secure(_env) && !arm_el_is_aa64((_env), 3)), \ | ||
46 | + (_val)) | ||
47 | + | ||
48 | #endif /* TARGET_ARM_CPREGS_H */ | ||
49 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
50 | index XXXXXXX..XXXXXXX 100644 | ||
51 | --- a/target/arm/cpu.h | ||
52 | +++ b/target/arm/cpu.h | ||
53 | @@ -XXX,XX +XXX,XX @@ static inline bool access_secure_reg(CPUARMState *env) | ||
54 | return ret; | ||
39 | } | 55 | } |
40 | 56 | ||
41 | -static bool get_cte(GICv3ITSState *s, uint16_t icid, uint64_t *cte, | 57 | -/* Macros for accessing a specified CP register bank */ |
42 | - MemTxResult *res) | 58 | -#define A32_BANKED_REG_GET(_env, _regname, _secure) \ |
43 | +/* | 59 | - ((_secure) ? (_env)->cp15._regname##_s : (_env)->cp15._regname##_ns) |
44 | + * Read the Collection Table entry at index @icid. On success (including | ||
45 | + * successfully determining that there is no valid CTE for this index), | ||
46 | + * we return MEMTX_OK and populate the CTEntry struct @cte accordingly. | ||
47 | + * If there is an error reading memory then we return the error code. | ||
48 | + */ | ||
49 | +static MemTxResult get_cte(GICv3ITSState *s, uint16_t icid, CTEntry *cte) | ||
50 | { | ||
51 | AddressSpace *as = &s->gicv3->dma_as; | ||
52 | - uint64_t entry_addr = table_entry_addr(s, &s->ct, icid, res); | ||
53 | + MemTxResult res = MEMTX_OK; | ||
54 | + uint64_t entry_addr = table_entry_addr(s, &s->ct, icid, &res); | ||
55 | + uint64_t cteval; | ||
56 | |||
57 | if (entry_addr == -1) { | ||
58 | - return false; /* not valid */ | ||
59 | + /* No L2 table entry, i.e. no valid CTE, or a memory error */ | ||
60 | + cte->valid = false; | ||
61 | + return res; | ||
62 | } | ||
63 | |||
64 | - *cte = address_space_ldq_le(as, entry_addr, MEMTXATTRS_UNSPECIFIED, res); | ||
65 | - return FIELD_EX64(*cte, CTE, VALID); | ||
66 | + cteval = address_space_ldq_le(as, entry_addr, MEMTXATTRS_UNSPECIFIED, &res); | ||
67 | + if (res != MEMTX_OK) { | ||
68 | + return res; | ||
69 | + } | ||
70 | + cte->valid = FIELD_EX64(cteval, CTE, VALID); | ||
71 | + cte->rdbase = FIELD_EX64(cteval, CTE, RDBASE); | ||
72 | + return MEMTX_OK; | ||
73 | } | ||
74 | |||
75 | static bool update_ite(GICv3ITSState *s, uint32_t eventid, const DTEntry *dte, | ||
76 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult do_process_its_cmd(GICv3ITSState *s, uint32_t devid, | ||
77 | uint16_t icid = 0; | ||
78 | uint32_t pIntid = 0; | ||
79 | bool ite_valid = false; | ||
80 | - uint64_t cte = 0; | ||
81 | - bool cte_valid = false; | ||
82 | - uint64_t rdbase; | ||
83 | DTEntry dte; | ||
84 | + CTEntry cte; | ||
85 | |||
86 | if (devid >= s->dt.num_entries) { | ||
87 | qemu_log_mask(LOG_GUEST_ERROR, | ||
88 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult do_process_its_cmd(GICv3ITSState *s, uint32_t devid, | ||
89 | return CMD_CONTINUE; | ||
90 | } | ||
91 | |||
92 | - cte_valid = get_cte(s, icid, &cte, &res); | ||
93 | - if (res != MEMTX_OK) { | ||
94 | + if (get_cte(s, icid, &cte) != MEMTX_OK) { | ||
95 | return CMD_STALL; | ||
96 | } | ||
97 | - if (!cte_valid) { | ||
98 | + if (!cte.valid) { | ||
99 | qemu_log_mask(LOG_GUEST_ERROR, | ||
100 | - "%s: invalid command attributes: " | ||
101 | - "invalid cte: %"PRIx64"\n", | ||
102 | - __func__, cte); | ||
103 | + "%s: invalid command attributes: invalid CTE\n", | ||
104 | + __func__); | ||
105 | return CMD_CONTINUE; | ||
106 | } | ||
107 | |||
108 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult do_process_its_cmd(GICv3ITSState *s, uint32_t devid, | ||
109 | * Current implementation only supports rdbase == procnum | ||
110 | * Hence rdbase physical address is ignored | ||
111 | */ | ||
112 | - rdbase = FIELD_EX64(cte, CTE, RDBASE); | ||
113 | - | 60 | - |
114 | - if (rdbase >= s->gicv3->num_cpu) { | 61 | -#define A32_BANKED_REG_SET(_env, _regname, _secure, _val) \ |
115 | + if (cte.rdbase >= s->gicv3->num_cpu) { | 62 | - do { \ |
116 | return CMD_CONTINUE; | 63 | - if (_secure) { \ |
117 | } | 64 | - (_env)->cp15._regname##_s = (_val); \ |
118 | 65 | - } else { \ | |
119 | if ((cmd == CLEAR) || (cmd == DISCARD)) { | 66 | - (_env)->cp15._regname##_ns = (_val); \ |
120 | - gicv3_redist_process_lpi(&s->gicv3->cpu[rdbase], pIntid, 0); | 67 | - } \ |
121 | + gicv3_redist_process_lpi(&s->gicv3->cpu[cte.rdbase], pIntid, 0); | 68 | - } while (0) |
122 | } else { | 69 | - |
123 | - gicv3_redist_process_lpi(&s->gicv3->cpu[rdbase], pIntid, 1); | 70 | -/* Macros for automatically accessing a specific CP register bank depending on |
124 | + gicv3_redist_process_lpi(&s->gicv3->cpu[cte.rdbase], pIntid, 1); | 71 | - * the current secure state of the system. These macros are not intended for |
125 | } | 72 | - * supporting instruction translation reads/writes as these are dependent |
126 | 73 | - * solely on the SCR.NS bit and not the mode. | |
127 | if (cmd == DISCARD) { | 74 | - */ |
128 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_movi(GICv3ITSState *s, const uint64_t *cmdpkt) | 75 | -#define A32_BANKED_CURRENT_REG_GET(_env, _regname) \ |
129 | MemTxResult res = MEMTX_OK; | 76 | - A32_BANKED_REG_GET((_env), _regname, \ |
130 | uint32_t devid, eventid, intid; | 77 | - (arm_is_secure(_env) && !arm_el_is_aa64((_env), 3))) |
131 | uint16_t old_icid, new_icid; | 78 | - |
132 | - uint64_t old_cte, new_cte; | 79 | -#define A32_BANKED_CURRENT_REG_SET(_env, _regname, _val) \ |
133 | - uint64_t old_rdbase, new_rdbase; | 80 | - A32_BANKED_REG_SET((_env), _regname, \ |
134 | - bool ite_valid, cte_valid; | 81 | - (arm_is_secure(_env) && !arm_el_is_aa64((_env), 3)), \ |
135 | + bool ite_valid; | 82 | - (_val)) |
136 | uint64_t num_eventids; | 83 | - |
137 | IteEntry ite = {}; | 84 | uint32_t arm_phys_excp_target_el(CPUState *cs, uint32_t excp_idx, |
138 | DTEntry dte; | 85 | uint32_t cur_el, bool secure); |
139 | + CTEntry old_cte, new_cte; | ||
140 | |||
141 | devid = FIELD_EX64(cmdpkt[0], MOVI_0, DEVICEID); | ||
142 | eventid = FIELD_EX64(cmdpkt[1], MOVI_1, EVENTID); | ||
143 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_movi(GICv3ITSState *s, const uint64_t *cmdpkt) | ||
144 | return CMD_CONTINUE; | ||
145 | } | ||
146 | |||
147 | - cte_valid = get_cte(s, old_icid, &old_cte, &res); | ||
148 | - if (res != MEMTX_OK) { | ||
149 | + if (get_cte(s, old_icid, &old_cte) != MEMTX_OK) { | ||
150 | return CMD_STALL; | ||
151 | } | ||
152 | - if (!cte_valid) { | ||
153 | + if (!old_cte.valid) { | ||
154 | qemu_log_mask(LOG_GUEST_ERROR, | ||
155 | "%s: invalid command attributes: " | ||
156 | - "invalid cte: %"PRIx64"\n", | ||
157 | - __func__, old_cte); | ||
158 | + "invalid CTE for old ICID 0x%x\n", | ||
159 | + __func__, old_icid); | ||
160 | return CMD_CONTINUE; | ||
161 | } | ||
162 | |||
163 | - cte_valid = get_cte(s, new_icid, &new_cte, &res); | ||
164 | - if (res != MEMTX_OK) { | ||
165 | + if (get_cte(s, new_icid, &new_cte) != MEMTX_OK) { | ||
166 | return CMD_STALL; | ||
167 | } | ||
168 | - if (!cte_valid) { | ||
169 | + if (!new_cte.valid) { | ||
170 | qemu_log_mask(LOG_GUEST_ERROR, | ||
171 | "%s: invalid command attributes: " | ||
172 | - "invalid cte: %"PRIx64"\n", | ||
173 | - __func__, new_cte); | ||
174 | + "invalid CTE for new ICID 0x%x\n", | ||
175 | + __func__, new_icid); | ||
176 | return CMD_CONTINUE; | ||
177 | } | ||
178 | |||
179 | - old_rdbase = FIELD_EX64(old_cte, CTE, RDBASE); | ||
180 | - if (old_rdbase >= s->gicv3->num_cpu) { | ||
181 | + if (old_cte.rdbase >= s->gicv3->num_cpu) { | ||
182 | qemu_log_mask(LOG_GUEST_ERROR, | ||
183 | - "%s: CTE has invalid rdbase 0x%"PRIx64"\n", | ||
184 | - __func__, old_rdbase); | ||
185 | + "%s: CTE has invalid rdbase 0x%x\n", | ||
186 | + __func__, old_cte.rdbase); | ||
187 | return CMD_CONTINUE; | ||
188 | } | ||
189 | |||
190 | - new_rdbase = FIELD_EX64(new_cte, CTE, RDBASE); | ||
191 | - if (new_rdbase >= s->gicv3->num_cpu) { | ||
192 | + if (new_cte.rdbase >= s->gicv3->num_cpu) { | ||
193 | qemu_log_mask(LOG_GUEST_ERROR, | ||
194 | - "%s: CTE has invalid rdbase 0x%"PRIx64"\n", | ||
195 | - __func__, new_rdbase); | ||
196 | + "%s: CTE has invalid rdbase 0x%x\n", | ||
197 | + __func__, new_cte.rdbase); | ||
198 | return CMD_CONTINUE; | ||
199 | } | ||
200 | |||
201 | - if (old_rdbase != new_rdbase) { | ||
202 | + if (old_cte.rdbase != new_cte.rdbase) { | ||
203 | /* Move the LPI from the old redistributor to the new one */ | ||
204 | - gicv3_redist_mov_lpi(&s->gicv3->cpu[old_rdbase], | ||
205 | - &s->gicv3->cpu[new_rdbase], | ||
206 | + gicv3_redist_mov_lpi(&s->gicv3->cpu[old_cte.rdbase], | ||
207 | + &s->gicv3->cpu[new_cte.rdbase], | ||
208 | intid); | ||
209 | } | ||
210 | 86 | ||
211 | -- | 87 | -- |
212 | 2.25.1 | 88 | 2.43.0 |
213 | |||
214 | diff view generated by jsdifflib |
1 | Make update_dte() take a DTEntry struct rather than all the fields of | 1 | We would like to move arm_el_is_aa64() to internals.h; however, it is |
---|---|---|---|
2 | the new DTE as separate arguments. | 2 | used by access_secure_reg(). Make that function not be inline, so |
3 | that it can stay in cpu.h. | ||
4 | |||
5 | access_secure_reg() is used only in two places: | ||
6 | * in hflags.c | ||
7 | * in the user-mode arm emulators, to decide whether to store | ||
8 | the TLS value in the secure or non-secure banked field | ||
9 | |||
10 | The second of these is not on a super-hot path that would care about | ||
11 | the inlining (and incidentally will always use the NS banked field | ||
12 | because our user-mode CPUs never set ARM_FEATURE_EL3); put the | ||
13 | definition of access_secure_reg() in hflags.c, near its only use | ||
14 | inside target/arm. | ||
3 | 15 | ||
4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
5 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 17 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
6 | Message-id: 20220201193207.2771604-4-peter.maydell@linaro.org | ||
7 | --- | 18 | --- |
8 | hw/intc/arm_gicv3_its.c | 35 ++++++++++++++++++----------------- | 19 | target/arm/cpu.h | 12 +++--------- |
9 | 1 file changed, 18 insertions(+), 17 deletions(-) | 20 | target/arm/tcg/hflags.c | 9 +++++++++ |
21 | 2 files changed, 12 insertions(+), 9 deletions(-) | ||
10 | 22 | ||
11 | diff --git a/hw/intc/arm_gicv3_its.c b/hw/intc/arm_gicv3_its.c | 23 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
12 | index XXXXXXX..XXXXXXX 100644 | 24 | index XXXXXXX..XXXXXXX 100644 |
13 | --- a/hw/intc/arm_gicv3_its.c | 25 | --- a/target/arm/cpu.h |
14 | +++ b/hw/intc/arm_gicv3_its.c | 26 | +++ b/target/arm/cpu.h |
15 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_mapc(GICv3ITSState *s, const uint64_t *cmdpkt) | 27 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_el_is_aa64(CPUARMState *env, int el) |
16 | return update_cte(s, icid, valid, rdbase) ? CMD_CONTINUE : CMD_STALL; | 28 | return aa64; |
17 | } | 29 | } |
18 | 30 | ||
19 | -static bool update_dte(GICv3ITSState *s, uint32_t devid, bool valid, | 31 | -/* Function for determining whether guest cp register reads and writes should |
20 | - uint8_t size, uint64_t itt_addr) | ||
21 | +/* | 32 | +/* |
22 | + * Update the Device Table entry for @devid to @dte. Returns true | 33 | + * Function for determining whether guest cp register reads and writes should |
23 | + * on success, false if there was a memory access error. | 34 | * access the secure or non-secure bank of a cp register. When EL3 is |
24 | + */ | 35 | * operating in AArch32 state, the NS-bit determines whether the secure |
25 | +static bool update_dte(GICv3ITSState *s, uint32_t devid, const DTEntry *dte) | 36 | * instance of a cp register should be used. When EL3 is AArch64 (or if |
26 | { | 37 | * it doesn't exist at all) then there is no register banking, and all |
27 | AddressSpace *as = &s->gicv3->dma_as; | 38 | * accesses are to the non-secure version. |
28 | uint64_t entry_addr; | 39 | */ |
29 | - uint64_t dte = 0; | 40 | -static inline bool access_secure_reg(CPUARMState *env) |
30 | + uint64_t dteval = 0; | 41 | -{ |
31 | MemTxResult res = MEMTX_OK; | 42 | - bool ret = (arm_feature(env, ARM_FEATURE_EL3) && |
32 | 43 | - !arm_el_is_aa64(env, 3) && | |
33 | if (s->dt.valid) { | 44 | - !(env->cp15.scr_el3 & SCR_NS)); |
34 | - if (valid) { | 45 | - |
35 | + if (dte->valid) { | 46 | - return ret; |
36 | /* add mapping entry to device table */ | 47 | -} |
37 | - dte = FIELD_DP64(dte, DTE, VALID, 1); | 48 | +bool access_secure_reg(CPUARMState *env); |
38 | - dte = FIELD_DP64(dte, DTE, SIZE, size); | 49 | |
39 | - dte = FIELD_DP64(dte, DTE, ITTADDR, itt_addr); | 50 | uint32_t arm_phys_excp_target_el(CPUState *cs, uint32_t excp_idx, |
40 | + dteval = FIELD_DP64(dteval, DTE, VALID, 1); | 51 | uint32_t cur_el, bool secure); |
41 | + dteval = FIELD_DP64(dteval, DTE, SIZE, dte->size); | 52 | diff --git a/target/arm/tcg/hflags.c b/target/arm/tcg/hflags.c |
42 | + dteval = FIELD_DP64(dteval, DTE, ITTADDR, dte->ittaddr); | 53 | index XXXXXXX..XXXXXXX 100644 |
43 | } | 54 | --- a/target/arm/tcg/hflags.c |
44 | } else { | 55 | +++ b/target/arm/tcg/hflags.c |
45 | return true; | 56 | @@ -XXX,XX +XXX,XX @@ static bool aprofile_require_alignment(CPUARMState *env, int el, uint64_t sctlr) |
46 | @@ -XXX,XX +XXX,XX @@ static bool update_dte(GICv3ITSState *s, uint32_t devid, bool valid, | 57 | #endif |
47 | /* No L2 table for this index: discard write and continue */ | ||
48 | return true; | ||
49 | } | ||
50 | - address_space_stq_le(as, entry_addr, dte, MEMTXATTRS_UNSPECIFIED, &res); | ||
51 | + address_space_stq_le(as, entry_addr, dteval, MEMTXATTRS_UNSPECIFIED, &res); | ||
52 | return res == MEMTX_OK; | ||
53 | } | 58 | } |
54 | 59 | ||
55 | static ItsCmdResult process_mapd(GICv3ITSState *s, const uint64_t *cmdpkt) | 60 | +bool access_secure_reg(CPUARMState *env) |
56 | { | 61 | +{ |
57 | uint32_t devid; | 62 | + bool ret = (arm_feature(env, ARM_FEATURE_EL3) && |
58 | - uint8_t size; | 63 | + !arm_el_is_aa64(env, 3) && |
59 | - uint64_t itt_addr; | 64 | + !(env->cp15.scr_el3 & SCR_NS)); |
60 | - bool valid; | 65 | + |
61 | + DTEntry dte; | 66 | + return ret; |
62 | 67 | +} | |
63 | devid = (cmdpkt[0] & DEVID_MASK) >> DEVID_SHIFT; | 68 | + |
64 | - size = cmdpkt[1] & SIZE_MASK; | 69 | static CPUARMTBFlags rebuild_hflags_common(CPUARMState *env, int fp_el, |
65 | - itt_addr = (cmdpkt[2] & ITTADDR_MASK) >> ITTADDR_SHIFT; | 70 | ARMMMUIdx mmu_idx, |
66 | - valid = cmdpkt[2] & CMD_FIELD_VALID_MASK; | 71 | CPUARMTBFlags flags) |
67 | + dte.size = cmdpkt[1] & SIZE_MASK; | ||
68 | + dte.ittaddr = (cmdpkt[2] & ITTADDR_MASK) >> ITTADDR_SHIFT; | ||
69 | + dte.valid = cmdpkt[2] & CMD_FIELD_VALID_MASK; | ||
70 | |||
71 | if ((devid >= s->dt.num_entries) || | ||
72 | - (size > FIELD_EX64(s->typer, GITS_TYPER, IDBITS))) { | ||
73 | + (dte.size > FIELD_EX64(s->typer, GITS_TYPER, IDBITS))) { | ||
74 | qemu_log_mask(LOG_GUEST_ERROR, | ||
75 | "ITS MAPD: invalid device table attributes " | ||
76 | - "devid %d or size %d\n", devid, size); | ||
77 | + "devid %d or size %d\n", devid, dte.size); | ||
78 | /* | ||
79 | * in this implementation, in case of error | ||
80 | * we ignore this command and move onto the next | ||
81 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_mapd(GICv3ITSState *s, const uint64_t *cmdpkt) | ||
82 | return CMD_CONTINUE; | ||
83 | } | ||
84 | |||
85 | - return update_dte(s, devid, valid, size, itt_addr) ? CMD_CONTINUE : CMD_STALL; | ||
86 | + return update_dte(s, devid, &dte) ? CMD_CONTINUE : CMD_STALL; | ||
87 | } | ||
88 | |||
89 | static ItsCmdResult process_movall(GICv3ITSState *s, const uint64_t *cmdpkt) | ||
90 | -- | 72 | -- |
91 | 2.25.1 | 73 | 2.43.0 |
92 | |||
93 | diff view generated by jsdifflib |
1 | In most of the ITS command processing, we check different error | 1 | At the top of linux-user/aarch64/cpu_loop.c we define a set of |
---|---|---|---|
2 | possibilities one at a time and log them appropriately. In | 2 | macros for reading and writing data and code words, but we never |
3 | process_mapti() and process_mapd() we have code which checks | 3 | use these macros. Delete them. |
4 | multiple error cases at once, which means the logging is less | ||
5 | specific than it could be. Split those cases up. | ||
6 | 4 | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 6 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
9 | Message-id: 20220201193207.2771604-14-peter.maydell@linaro.org | ||
10 | --- | 7 | --- |
11 | hw/intc/arm_gicv3_its.c | 52 ++++++++++++++++++++++++----------------- | 8 | linux-user/aarch64/cpu_loop.c | 48 ----------------------------------- |
12 | 1 file changed, 31 insertions(+), 21 deletions(-) | 9 | 1 file changed, 48 deletions(-) |
13 | 10 | ||
14 | diff --git a/hw/intc/arm_gicv3_its.c b/hw/intc/arm_gicv3_its.c | 11 | diff --git a/linux-user/aarch64/cpu_loop.c b/linux-user/aarch64/cpu_loop.c |
15 | index XXXXXXX..XXXXXXX 100644 | 12 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/hw/intc/arm_gicv3_its.c | 13 | --- a/linux-user/aarch64/cpu_loop.c |
17 | +++ b/hw/intc/arm_gicv3_its.c | 14 | +++ b/linux-user/aarch64/cpu_loop.c |
18 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_mapti(GICv3ITSState *s, const uint64_t *cmdpkt, | 15 | @@ -XXX,XX +XXX,XX @@ |
19 | num_eventids = 1ULL << (dte.size + 1); | 16 | #include "target/arm/syndrome.h" |
20 | num_intids = 1ULL << (GICD_TYPER_IDBITS + 1); | 17 | #include "target/arm/cpu-features.h" |
21 | 18 | ||
22 | - if ((icid >= s->ct.num_entries) | 19 | -#define get_user_code_u32(x, gaddr, env) \ |
23 | - || !dte.valid || (eventid >= num_eventids) || | 20 | - ({ abi_long __r = get_user_u32((x), (gaddr)); \ |
24 | - (((pIntid < GICV3_LPI_INTID_START) || (pIntid >= num_intids)))) { | 21 | - if (!__r && bswap_code(arm_sctlr_b(env))) { \ |
25 | + if (icid >= s->ct.num_entries) { | 22 | - (x) = bswap32(x); \ |
26 | qemu_log_mask(LOG_GUEST_ERROR, | 23 | - } \ |
27 | - "%s: invalid command attributes " | 24 | - __r; \ |
28 | - "icid %d or eventid %d or pIntid %d or" | 25 | - }) |
29 | - "unmapped dte %d\n", __func__, icid, eventid, | 26 | - |
30 | - pIntid, dte.valid); | 27 | -#define get_user_code_u16(x, gaddr, env) \ |
31 | - /* | 28 | - ({ abi_long __r = get_user_u16((x), (gaddr)); \ |
32 | - * in this implementation, in case of error | 29 | - if (!__r && bswap_code(arm_sctlr_b(env))) { \ |
33 | - * we ignore this command and move onto the next | 30 | - (x) = bswap16(x); \ |
34 | - * command in the queue | 31 | - } \ |
35 | - */ | 32 | - __r; \ |
36 | + "%s: invalid ICID 0x%x >= 0x%x\n", | 33 | - }) |
37 | + __func__, icid, s->ct.num_entries); | 34 | - |
38 | + return CMD_CONTINUE; | 35 | -#define get_user_data_u32(x, gaddr, env) \ |
39 | + } | 36 | - ({ abi_long __r = get_user_u32((x), (gaddr)); \ |
40 | + | 37 | - if (!__r && arm_cpu_bswap_data(env)) { \ |
41 | + if (!dte.valid) { | 38 | - (x) = bswap32(x); \ |
42 | + qemu_log_mask(LOG_GUEST_ERROR, | 39 | - } \ |
43 | + "%s: no valid DTE for devid 0x%x\n", __func__, devid); | 40 | - __r; \ |
44 | + return CMD_CONTINUE; | 41 | - }) |
45 | + } | 42 | - |
46 | + | 43 | -#define get_user_data_u16(x, gaddr, env) \ |
47 | + if (eventid >= num_eventids) { | 44 | - ({ abi_long __r = get_user_u16((x), (gaddr)); \ |
48 | + qemu_log_mask(LOG_GUEST_ERROR, | 45 | - if (!__r && arm_cpu_bswap_data(env)) { \ |
49 | + "%s: invalid event ID 0x%x >= 0x%" PRIx64 "\n", | 46 | - (x) = bswap16(x); \ |
50 | + __func__, eventid, num_eventids); | 47 | - } \ |
51 | + return CMD_CONTINUE; | 48 | - __r; \ |
52 | + } | 49 | - }) |
53 | + | 50 | - |
54 | + if (pIntid < GICV3_LPI_INTID_START || pIntid >= num_intids) { | 51 | -#define put_user_data_u32(x, gaddr, env) \ |
55 | + qemu_log_mask(LOG_GUEST_ERROR, | 52 | - ({ typeof(x) __x = (x); \ |
56 | + "%s: invalid interrupt ID 0x%x\n", __func__, pIntid); | 53 | - if (arm_cpu_bswap_data(env)) { \ |
57 | return CMD_CONTINUE; | 54 | - __x = bswap32(__x); \ |
58 | } | 55 | - } \ |
59 | 56 | - put_user_u32(__x, (gaddr)); \ | |
60 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_mapd(GICv3ITSState *s, const uint64_t *cmdpkt) | 57 | - }) |
61 | dte.ittaddr = (cmdpkt[2] & ITTADDR_MASK) >> ITTADDR_SHIFT; | 58 | - |
62 | dte.valid = cmdpkt[2] & CMD_FIELD_VALID_MASK; | 59 | -#define put_user_data_u16(x, gaddr, env) \ |
63 | 60 | - ({ typeof(x) __x = (x); \ | |
64 | - if ((devid >= s->dt.num_entries) || | 61 | - if (arm_cpu_bswap_data(env)) { \ |
65 | - (dte.size > FIELD_EX64(s->typer, GITS_TYPER, IDBITS))) { | 62 | - __x = bswap16(__x); \ |
66 | + if (devid >= s->dt.num_entries) { | 63 | - } \ |
67 | qemu_log_mask(LOG_GUEST_ERROR, | 64 | - put_user_u16(__x, (gaddr)); \ |
68 | - "ITS MAPD: invalid device table attributes " | 65 | - }) |
69 | - "devid %d or size %d\n", devid, dte.size); | 66 | - |
70 | - /* | 67 | /* AArch64 main loop */ |
71 | - * in this implementation, in case of error | 68 | void cpu_loop(CPUARMState *env) |
72 | - * we ignore this command and move onto the next | 69 | { |
73 | - * command in the queue | ||
74 | - */ | ||
75 | + "ITS MAPD: invalid device ID field 0x%x >= 0x%x\n", | ||
76 | + devid, s->dt.num_entries); | ||
77 | + return CMD_CONTINUE; | ||
78 | + } | ||
79 | + | ||
80 | + if (dte.size > FIELD_EX64(s->typer, GITS_TYPER, IDBITS)) { | ||
81 | + qemu_log_mask(LOG_GUEST_ERROR, | ||
82 | + "ITS MAPD: invalid size %d\n", dte.size); | ||
83 | return CMD_CONTINUE; | ||
84 | } | ||
85 | |||
86 | -- | 70 | -- |
87 | 2.25.1 | 71 | 2.43.0 |
88 | |||
89 | diff view generated by jsdifflib |
1 | Make the update_ite() struct use the new ITEntry struct, so that | 1 | In linux-user/arm/cpu_loop.c we define a full set of get/put |
---|---|---|---|
2 | callers don't need to assemble the in-memory ITE data themselves, and | 2 | macros for both code and data (since the endianness handling |
3 | only get_ite() and update_ite() need to care about that in-memory | 3 | is different between the two). However the only one we actually |
4 | layout. We can then drop the no-longer-used IteEntry struct | 4 | use is get_user_code_u32(). Remove the rest. |
5 | definition. | 5 | |
6 | We leave a comment noting how data-side accesses should be handled | ||
7 | for big-endian, because that's a subtle point and we just removed the | ||
8 | macros that were effectively documenting it. | ||
6 | 9 | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 11 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
9 | Message-id: 20220201193207.2771604-10-peter.maydell@linaro.org | ||
10 | --- | 12 | --- |
11 | hw/intc/arm_gicv3_its.c | 62 +++++++++++++++++++++-------------------- | 13 | linux-user/arm/cpu_loop.c | 43 ++++----------------------------------- |
12 | 1 file changed, 32 insertions(+), 30 deletions(-) | 14 | 1 file changed, 4 insertions(+), 39 deletions(-) |
13 | 15 | ||
14 | diff --git a/hw/intc/arm_gicv3_its.c b/hw/intc/arm_gicv3_its.c | 16 | diff --git a/linux-user/arm/cpu_loop.c b/linux-user/arm/cpu_loop.c |
15 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/hw/intc/arm_gicv3_its.c | 18 | --- a/linux-user/arm/cpu_loop.c |
17 | +++ b/hw/intc/arm_gicv3_its.c | 19 | +++ b/linux-user/arm/cpu_loop.c |
18 | @@ -XXX,XX +XXX,XX @@ typedef enum ItsCmdType { | 20 | @@ -XXX,XX +XXX,XX @@ |
19 | INTERRUPT = 3, | 21 | __r; \ |
20 | } ItsCmdType; | 22 | }) |
21 | 23 | ||
22 | -typedef struct { | 24 | -#define get_user_code_u16(x, gaddr, env) \ |
23 | - uint32_t iteh; | 25 | - ({ abi_long __r = get_user_u16((x), (gaddr)); \ |
24 | - uint64_t itel; | 26 | - if (!__r && bswap_code(arm_sctlr_b(env))) { \ |
25 | -} IteEntry; | 27 | - (x) = bswap16(x); \ |
28 | - } \ | ||
29 | - __r; \ | ||
30 | - }) | ||
26 | - | 31 | - |
27 | typedef struct DTEntry { | 32 | -#define get_user_data_u32(x, gaddr, env) \ |
28 | bool valid; | 33 | - ({ abi_long __r = get_user_u32((x), (gaddr)); \ |
29 | unsigned size; | 34 | - if (!__r && arm_cpu_bswap_data(env)) { \ |
30 | @@ -XXX,XX +XXX,XX @@ static MemTxResult get_cte(GICv3ITSState *s, uint16_t icid, CTEntry *cte) | 35 | - (x) = bswap32(x); \ |
31 | return MEMTX_OK; | 36 | - } \ |
32 | } | 37 | - __r; \ |
33 | 38 | - }) | |
39 | - | ||
40 | -#define get_user_data_u16(x, gaddr, env) \ | ||
41 | - ({ abi_long __r = get_user_u16((x), (gaddr)); \ | ||
42 | - if (!__r && arm_cpu_bswap_data(env)) { \ | ||
43 | - (x) = bswap16(x); \ | ||
44 | - } \ | ||
45 | - __r; \ | ||
46 | - }) | ||
47 | - | ||
48 | -#define put_user_data_u32(x, gaddr, env) \ | ||
49 | - ({ typeof(x) __x = (x); \ | ||
50 | - if (arm_cpu_bswap_data(env)) { \ | ||
51 | - __x = bswap32(__x); \ | ||
52 | - } \ | ||
53 | - put_user_u32(__x, (gaddr)); \ | ||
54 | - }) | ||
55 | - | ||
56 | -#define put_user_data_u16(x, gaddr, env) \ | ||
57 | - ({ typeof(x) __x = (x); \ | ||
58 | - if (arm_cpu_bswap_data(env)) { \ | ||
59 | - __x = bswap16(__x); \ | ||
60 | - } \ | ||
61 | - put_user_u16(__x, (gaddr)); \ | ||
62 | - }) | ||
34 | +/* | 63 | +/* |
35 | + * Update the Interrupt Table entry at index @evinted in the table specified | 64 | + * Note that if we need to do data accesses here, they should do a |
36 | + * by the dte @dte. Returns true on success, false if there was a memory | 65 | + * bswap if arm_cpu_bswap_data() returns true. |
37 | + * access error. | ||
38 | + */ | 66 | + */ |
39 | static bool update_ite(GICv3ITSState *s, uint32_t eventid, const DTEntry *dte, | ||
40 | - IteEntry ite) | ||
41 | + const ITEntry *ite) | ||
42 | { | ||
43 | AddressSpace *as = &s->gicv3->dma_as; | ||
44 | MemTxResult res = MEMTX_OK; | ||
45 | hwaddr iteaddr = dte->ittaddr + eventid * ITS_ITT_ENTRY_SIZE; | ||
46 | + uint64_t itel = 0; | ||
47 | + uint32_t iteh = 0; | ||
48 | |||
49 | - address_space_stq_le(as, iteaddr, ite.itel, MEMTXATTRS_UNSPECIFIED, &res); | ||
50 | - | ||
51 | - if (res == MEMTX_OK) { | ||
52 | - address_space_stl_le(as, iteaddr + 8, ite.iteh, | ||
53 | - MEMTXATTRS_UNSPECIFIED, &res); | ||
54 | + if (ite->valid) { | ||
55 | + itel = FIELD_DP64(itel, ITE_L, VALID, 1); | ||
56 | + itel = FIELD_DP64(itel, ITE_L, INTTYPE, ite->inttype); | ||
57 | + itel = FIELD_DP64(itel, ITE_L, INTID, ite->intid); | ||
58 | + itel = FIELD_DP64(itel, ITE_L, ICID, ite->icid); | ||
59 | + itel = FIELD_DP64(itel, ITE_L, VPEID, ite->vpeid); | ||
60 | + iteh = FIELD_DP32(iteh, ITE_H, DOORBELL, ite->doorbell); | ||
61 | } | ||
62 | + | ||
63 | + address_space_stq_le(as, iteaddr, itel, MEMTXATTRS_UNSPECIFIED, &res); | ||
64 | if (res != MEMTX_OK) { | ||
65 | return false; | ||
66 | - } else { | ||
67 | - return true; | ||
68 | } | ||
69 | + address_space_stl_le(as, iteaddr + 8, iteh, MEMTXATTRS_UNSPECIFIED, &res); | ||
70 | + return res == MEMTX_OK; | ||
71 | } | ||
72 | 67 | ||
73 | /* | 68 | /* |
74 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult do_process_its_cmd(GICv3ITSState *s, uint32_t devid, | 69 | * Similar to code in accel/tcg/user-exec.c, but outside the execution loop. |
75 | } | ||
76 | |||
77 | if (cmd == DISCARD) { | ||
78 | - IteEntry itee = {}; | ||
79 | + ITEntry ite = {}; | ||
80 | /* remove mapping from interrupt translation table */ | ||
81 | - return update_ite(s, eventid, &dte, itee) ? CMD_CONTINUE : CMD_STALL; | ||
82 | + ite.valid = false; | ||
83 | + return update_ite(s, eventid, &dte, &ite) ? CMD_CONTINUE : CMD_STALL; | ||
84 | } | ||
85 | return CMD_CONTINUE; | ||
86 | } | ||
87 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_mapti(GICv3ITSState *s, const uint64_t *cmdpkt, | ||
88 | uint64_t num_eventids; | ||
89 | uint32_t num_intids; | ||
90 | uint16_t icid = 0; | ||
91 | - IteEntry ite = {}; | ||
92 | DTEntry dte; | ||
93 | + ITEntry ite; | ||
94 | |||
95 | devid = (cmdpkt[0] & DEVID_MASK) >> DEVID_SHIFT; | ||
96 | eventid = cmdpkt[1] & EVENTID_MASK; | ||
97 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_mapti(GICv3ITSState *s, const uint64_t *cmdpkt, | ||
98 | } | ||
99 | |||
100 | /* add ite entry to interrupt translation table */ | ||
101 | - ite.itel = FIELD_DP64(ite.itel, ITE_L, VALID, true); | ||
102 | - ite.itel = FIELD_DP64(ite.itel, ITE_L, INTTYPE, ITE_INTTYPE_PHYSICAL); | ||
103 | - ite.itel = FIELD_DP64(ite.itel, ITE_L, INTID, pIntid); | ||
104 | - ite.itel = FIELD_DP64(ite.itel, ITE_L, ICID, icid); | ||
105 | - ite.iteh = FIELD_DP32(ite.iteh, ITE_H, DOORBELL, INTID_SPURIOUS); | ||
106 | - | ||
107 | - return update_ite(s, eventid, &dte, ite) ? CMD_CONTINUE : CMD_STALL; | ||
108 | + ite.valid = true; | ||
109 | + ite.inttype = ITE_INTTYPE_PHYSICAL; | ||
110 | + ite.intid = pIntid; | ||
111 | + ite.icid = icid; | ||
112 | + ite.doorbell = INTID_SPURIOUS; | ||
113 | + ite.vpeid = 0; | ||
114 | + return update_ite(s, eventid, &dte, &ite) ? CMD_CONTINUE : CMD_STALL; | ||
115 | } | ||
116 | |||
117 | /* | ||
118 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_movi(GICv3ITSState *s, const uint64_t *cmdpkt) | ||
119 | uint32_t devid, eventid; | ||
120 | uint16_t new_icid; | ||
121 | uint64_t num_eventids; | ||
122 | - IteEntry ite = {}; | ||
123 | DTEntry dte; | ||
124 | CTEntry old_cte, new_cte; | ||
125 | ITEntry old_ite; | ||
126 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_movi(GICv3ITSState *s, const uint64_t *cmdpkt) | ||
127 | } | ||
128 | |||
129 | /* Update the ICID field in the interrupt translation table entry */ | ||
130 | - ite.itel = FIELD_DP64(ite.itel, ITE_L, VALID, 1); | ||
131 | - ite.itel = FIELD_DP64(ite.itel, ITE_L, INTTYPE, ITE_INTTYPE_PHYSICAL); | ||
132 | - ite.itel = FIELD_DP64(ite.itel, ITE_L, INTID, old_ite.intid); | ||
133 | - ite.itel = FIELD_DP64(ite.itel, ITE_L, ICID, new_icid); | ||
134 | - ite.iteh = FIELD_DP32(ite.iteh, ITE_H, DOORBELL, INTID_SPURIOUS); | ||
135 | - return update_ite(s, eventid, &dte, ite) ? CMD_CONTINUE : CMD_STALL; | ||
136 | + old_ite.icid = new_icid; | ||
137 | + return update_ite(s, eventid, &dte, &old_ite) ? CMD_CONTINUE : CMD_STALL; | ||
138 | } | ||
139 | |||
140 | /* | ||
141 | -- | 70 | -- |
142 | 2.25.1 | 71 | 2.43.0 |
143 | |||
144 | diff view generated by jsdifflib |
1 | The highbank and midway board code includes boot-stub code for | 1 | The arm_cpu_data_is_big_endian() and related functions are now used |
---|---|---|---|
2 | handling secondary CPU boot which keeps the secondaries in a pen | 2 | only in target/arm; they can be moved to internals.h. |
3 | until the primary writes to a known location with the address they | ||
4 | should jump to. | ||
5 | 3 | ||
6 | This code is never used, because the boards enable QEMU's PSCI | 4 | The motivation here is that we would like to move arm_current_el() |
7 | emulation, so secondary CPUs are kept powered off until the PSCI call | 5 | to internals.h. |
8 | which turns them on, and then start execution from the address given | ||
9 | by the guest in that PSCI call. Delete the unreachable code. | ||
10 | |||
11 | (The code was wrong for midway in any case -- on the Cortex-A15 the | ||
12 | GIC CPU interface registers are at a different offset from PERIPHBASE | ||
13 | compared to the Cortex-A9, and the code baked-in the offsets for | ||
14 | highbank's A9.) | ||
15 | |||
16 | Note that this commit implicitly depends on the preceding "Don't | ||
17 | write secondary boot stub if using PSCI" commit -- the default | ||
18 | secondary-boot stub code overlaps with one of the highbank-specific | ||
19 | bootcode rom blobs, so we must suppress the secondary-boot | ||
20 | stub code entirely, not merely replace the highbank-specific | ||
21 | version with the default. | ||
22 | 6 | ||
23 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
24 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
25 | Reviewed-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
26 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
27 | Tested-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
28 | Message-id: 20220127154639.2090164-15-peter.maydell@linaro.org | ||
29 | --- | 9 | --- |
30 | hw/arm/highbank.c | 56 ----------------------------------------------- | 10 | target/arm/cpu.h | 48 ------------------------------------------ |
31 | 1 file changed, 56 deletions(-) | 11 | target/arm/internals.h | 48 ++++++++++++++++++++++++++++++++++++++++++ |
12 | 2 files changed, 48 insertions(+), 48 deletions(-) | ||
32 | 13 | ||
33 | diff --git a/hw/arm/highbank.c b/hw/arm/highbank.c | 14 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
34 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
35 | --- a/hw/arm/highbank.c | 16 | --- a/target/arm/cpu.h |
36 | +++ b/hw/arm/highbank.c | 17 | +++ b/target/arm/cpu.h |
37 | @@ -XXX,XX +XXX,XX @@ | 18 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_sctlr_b(CPUARMState *env) |
38 | 19 | ||
39 | /* Board init. */ | 20 | uint64_t arm_sctlr(CPUARMState *env, int el); |
40 | 21 | ||
41 | -static void hb_write_secondary(ARMCPU *cpu, const struct arm_boot_info *info) | 22 | -static inline bool arm_cpu_data_is_big_endian_a32(CPUARMState *env, |
23 | - bool sctlr_b) | ||
42 | -{ | 24 | -{ |
43 | - int n; | 25 | -#ifdef CONFIG_USER_ONLY |
44 | - uint32_t smpboot[] = { | 26 | - /* |
45 | - 0xee100fb0, /* mrc p15, 0, r0, c0, c0, 5 - read current core id */ | 27 | - * In system mode, BE32 is modelled in line with the |
46 | - 0xe210000f, /* ands r0, r0, #0x0f */ | 28 | - * architecture (as word-invariant big-endianness), where loads |
47 | - 0xe3a03040, /* mov r3, #0x40 - jump address is 0x40 + 0x10 * core id */ | 29 | - * and stores are done little endian but from addresses which |
48 | - 0xe0830200, /* add r0, r3, r0, lsl #4 */ | 30 | - * are adjusted by XORing with the appropriate constant. So the |
49 | - 0xe59f2024, /* ldr r2, privbase */ | 31 | - * endianness to use for the raw data access is not affected by |
50 | - 0xe3a01001, /* mov r1, #1 */ | 32 | - * SCTLR.B. |
51 | - 0xe5821100, /* str r1, [r2, #256] - set GICC_CTLR.Enable */ | 33 | - * In user mode, however, we model BE32 as byte-invariant |
52 | - 0xe3a010ff, /* mov r1, #0xff */ | 34 | - * big-endianness (because user-only code cannot tell the |
53 | - 0xe5821104, /* str r1, [r2, #260] - set GICC_PMR.Priority to 0xff */ | 35 | - * difference), and so we need to use a data access endianness |
54 | - 0xf57ff04f, /* dsb */ | 36 | - * that depends on SCTLR.B. |
55 | - 0xe320f003, /* wfi */ | 37 | - */ |
56 | - 0xe5901000, /* ldr r1, [r0] */ | 38 | - if (sctlr_b) { |
57 | - 0xe1110001, /* tst r1, r1 */ | 39 | - return true; |
58 | - 0x0afffffb, /* beq <wfi> */ | ||
59 | - 0xe12fff11, /* bx r1 */ | ||
60 | - MPCORE_PERIPHBASE /* privbase: MPCore peripheral base address. */ | ||
61 | - }; | ||
62 | - for (n = 0; n < ARRAY_SIZE(smpboot); n++) { | ||
63 | - smpboot[n] = tswap32(smpboot[n]); | ||
64 | - } | 40 | - } |
65 | - rom_add_blob_fixed_as("smpboot", smpboot, sizeof(smpboot), SMP_BOOT_ADDR, | 41 | -#endif |
66 | - arm_boot_address_space(cpu, info)); | 42 | - /* In 32bit endianness is determined by looking at CPSR's E bit */ |
43 | - return env->uncached_cpsr & CPSR_E; | ||
67 | -} | 44 | -} |
68 | - | 45 | - |
69 | -static void hb_reset_secondary(ARMCPU *cpu, const struct arm_boot_info *info) | 46 | -static inline bool arm_cpu_data_is_big_endian_a64(int el, uint64_t sctlr) |
70 | -{ | 47 | -{ |
71 | - CPUARMState *env = &cpu->env; | 48 | - return sctlr & (el ? SCTLR_EE : SCTLR_E0E); |
49 | -} | ||
72 | - | 50 | - |
73 | - switch (info->nb_cpus) { | 51 | -/* Return true if the processor is in big-endian mode. */ |
74 | - case 4: | 52 | -static inline bool arm_cpu_data_is_big_endian(CPUARMState *env) |
75 | - address_space_stl_notdirty(&address_space_memory, | 53 | -{ |
76 | - SMP_BOOT_REG + 0x30, 0, | 54 | - if (!is_a64(env)) { |
77 | - MEMTXATTRS_UNSPECIFIED, NULL); | 55 | - return arm_cpu_data_is_big_endian_a32(env, arm_sctlr_b(env)); |
78 | - /* fallthrough */ | 56 | - } else { |
79 | - case 3: | 57 | - int cur_el = arm_current_el(env); |
80 | - address_space_stl_notdirty(&address_space_memory, | 58 | - uint64_t sctlr = arm_sctlr(env, cur_el); |
81 | - SMP_BOOT_REG + 0x20, 0, | 59 | - return arm_cpu_data_is_big_endian_a64(cur_el, sctlr); |
82 | - MEMTXATTRS_UNSPECIFIED, NULL); | ||
83 | - /* fallthrough */ | ||
84 | - case 2: | ||
85 | - address_space_stl_notdirty(&address_space_memory, | ||
86 | - SMP_BOOT_REG + 0x10, 0, | ||
87 | - MEMTXATTRS_UNSPECIFIED, NULL); | ||
88 | - env->regs[15] = SMP_BOOT_ADDR; | ||
89 | - break; | ||
90 | - default: | ||
91 | - break; | ||
92 | - } | 60 | - } |
93 | -} | 61 | -} |
94 | - | 62 | - |
95 | #define NUM_REGS 0x200 | 63 | #include "exec/cpu-all.h" |
96 | static void hb_regs_write(void *opaque, hwaddr offset, | 64 | |
97 | uint64_t value, unsigned size) | 65 | /* |
98 | @@ -XXX,XX +XXX,XX @@ static void calxeda_init(MachineState *machine, enum cxmachines machine_id) | 66 | @@ -XXX,XX +XXX,XX @@ static inline bool bswap_code(bool sctlr_b) |
99 | highbank_binfo.board_id = -1; | 67 | #endif |
100 | highbank_binfo.nb_cpus = smp_cpus; | 68 | } |
101 | highbank_binfo.loader_start = 0; | 69 | |
102 | - highbank_binfo.write_secondary_boot = hb_write_secondary; | 70 | -#ifdef CONFIG_USER_ONLY |
103 | - highbank_binfo.secondary_cpu_reset_hook = hb_reset_secondary; | 71 | -static inline bool arm_cpu_bswap_data(CPUARMState *env) |
104 | highbank_binfo.board_setup_addr = BOARD_SETUP_ADDR; | 72 | -{ |
105 | highbank_binfo.psci_conduit = QEMU_PSCI_CONDUIT_SMC; | 73 | - return TARGET_BIG_ENDIAN ^ arm_cpu_data_is_big_endian(env); |
106 | 74 | -} | |
75 | -#endif | ||
76 | - | ||
77 | void cpu_get_tb_cpu_state(CPUARMState *env, vaddr *pc, | ||
78 | uint64_t *cs_base, uint32_t *flags); | ||
79 | |||
80 | diff --git a/target/arm/internals.h b/target/arm/internals.h | ||
81 | index XXXXXXX..XXXXXXX 100644 | ||
82 | --- a/target/arm/internals.h | ||
83 | +++ b/target/arm/internals.h | ||
84 | @@ -XXX,XX +XXX,XX @@ static inline FloatRoundMode arm_rmode_to_sf(ARMFPRounding rmode) | ||
85 | return arm_rmode_to_sf_map[rmode]; | ||
86 | } | ||
87 | |||
88 | +static inline bool arm_cpu_data_is_big_endian_a32(CPUARMState *env, | ||
89 | + bool sctlr_b) | ||
90 | +{ | ||
91 | +#ifdef CONFIG_USER_ONLY | ||
92 | + /* | ||
93 | + * In system mode, BE32 is modelled in line with the | ||
94 | + * architecture (as word-invariant big-endianness), where loads | ||
95 | + * and stores are done little endian but from addresses which | ||
96 | + * are adjusted by XORing with the appropriate constant. So the | ||
97 | + * endianness to use for the raw data access is not affected by | ||
98 | + * SCTLR.B. | ||
99 | + * In user mode, however, we model BE32 as byte-invariant | ||
100 | + * big-endianness (because user-only code cannot tell the | ||
101 | + * difference), and so we need to use a data access endianness | ||
102 | + * that depends on SCTLR.B. | ||
103 | + */ | ||
104 | + if (sctlr_b) { | ||
105 | + return true; | ||
106 | + } | ||
107 | +#endif | ||
108 | + /* In 32bit endianness is determined by looking at CPSR's E bit */ | ||
109 | + return env->uncached_cpsr & CPSR_E; | ||
110 | +} | ||
111 | + | ||
112 | +static inline bool arm_cpu_data_is_big_endian_a64(int el, uint64_t sctlr) | ||
113 | +{ | ||
114 | + return sctlr & (el ? SCTLR_EE : SCTLR_E0E); | ||
115 | +} | ||
116 | + | ||
117 | +/* Return true if the processor is in big-endian mode. */ | ||
118 | +static inline bool arm_cpu_data_is_big_endian(CPUARMState *env) | ||
119 | +{ | ||
120 | + if (!is_a64(env)) { | ||
121 | + return arm_cpu_data_is_big_endian_a32(env, arm_sctlr_b(env)); | ||
122 | + } else { | ||
123 | + int cur_el = arm_current_el(env); | ||
124 | + uint64_t sctlr = arm_sctlr(env, cur_el); | ||
125 | + return arm_cpu_data_is_big_endian_a64(cur_el, sctlr); | ||
126 | + } | ||
127 | +} | ||
128 | + | ||
129 | +#ifdef CONFIG_USER_ONLY | ||
130 | +static inline bool arm_cpu_bswap_data(CPUARMState *env) | ||
131 | +{ | ||
132 | + return TARGET_BIG_ENDIAN ^ arm_cpu_data_is_big_endian(env); | ||
133 | +} | ||
134 | +#endif | ||
135 | + | ||
136 | static inline void aarch64_save_sp(CPUARMState *env, int el) | ||
137 | { | ||
138 | if (env->pstate & PSTATE_SP) { | ||
107 | -- | 139 | -- |
108 | 2.25.1 | 140 | 2.43.0 |
109 | |||
110 | diff view generated by jsdifflib |
1 | From: Kevin Townsend <kevin.townsend@linaro.org> | 1 | The functions arm_current_el() and arm_el_is_aa64() are used only in |
---|---|---|---|
2 | 2 | target/arm and in hw/intc/arm_gicv3_cpuif.c. They're functions that | |
3 | This commit adds emulation of the magnetometer on the LSM303DLHC. | 3 | query internal state of the CPU. Move them out of cpu.h and into |
4 | It allows the magnetometer's X, Y and Z outputs to be set via the | 4 | internals.h. |
5 | mag-x, mag-y and mag-z properties, as well as the 12-bit | 5 | |
6 | temperature output via the temperature property. Sensor can be | 6 | This means we need to include internals.h in arm_gicv3_cpuif.c, but |
7 | enabled with 'CONFIG_LSM303DLHC_MAG=y'. | 7 | this is justifiable because that file is implementing the GICv3 CPU |
8 | 8 | interface, which really is part of the CPU proper; we just ended up | |
9 | Signed-off-by: Kevin Townsend <kevin.townsend@linaro.org> | 9 | implementing it in code in hw/intc/ for historical reasons. |
10 | Message-id: 20220130095032.35392-1-kevin.townsend@linaro.org | 10 | |
11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 11 | The motivation for this move is that we'd like to change |
12 | arm_el_is_aa64() to add a condition that uses cpu_isar_feature(); | ||
13 | but we don't want to include cpu-features.h in cpu.h. | ||
14 | |||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 15 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
16 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
13 | --- | 17 | --- |
14 | hw/sensor/lsm303dlhc_mag.c | 556 ++++++++++++++++++++++++++++++ | 18 | target/arm/cpu.h | 66 -------------------------------------- |
15 | tests/qtest/lsm303dlhc-mag-test.c | 148 ++++++++ | 19 | target/arm/internals.h | 67 +++++++++++++++++++++++++++++++++++++++ |
16 | hw/sensor/Kconfig | 4 + | 20 | hw/intc/arm_gicv3_cpuif.c | 1 + |
17 | hw/sensor/meson.build | 1 + | 21 | target/arm/arch_dump.c | 1 + |
18 | tests/qtest/meson.build | 1 + | 22 | 4 files changed, 69 insertions(+), 66 deletions(-) |
19 | 5 files changed, 710 insertions(+) | 23 | |
20 | create mode 100644 hw/sensor/lsm303dlhc_mag.c | 24 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h |
21 | create mode 100644 tests/qtest/lsm303dlhc-mag-test.c | 25 | index XXXXXXX..XXXXXXX 100644 |
22 | 26 | --- a/target/arm/cpu.h | |
23 | diff --git a/hw/sensor/lsm303dlhc_mag.c b/hw/sensor/lsm303dlhc_mag.c | 27 | +++ b/target/arm/cpu.h |
24 | new file mode 100644 | 28 | @@ -XXX,XX +XXX,XX @@ uint64_t arm_hcr_el2_eff_secstate(CPUARMState *env, ARMSecuritySpace space); |
25 | index XXXXXXX..XXXXXXX | 29 | uint64_t arm_hcr_el2_eff(CPUARMState *env); |
26 | --- /dev/null | 30 | uint64_t arm_hcrx_el2_eff(CPUARMState *env); |
27 | +++ b/hw/sensor/lsm303dlhc_mag.c | 31 | |
28 | @@ -XXX,XX +XXX,XX @@ | 32 | -/* Return true if the specified exception level is running in AArch64 state. */ |
29 | +/* | 33 | -static inline bool arm_el_is_aa64(CPUARMState *env, int el) |
30 | + * LSM303DLHC I2C magnetometer. | 34 | -{ |
31 | + * | 35 | - /* This isn't valid for EL0 (if we're in EL0, is_a64() is what you want, |
32 | + * Copyright (C) 2021 Linaro Ltd. | 36 | - * and if we're not in EL0 then the state of EL0 isn't well defined.) |
33 | + * Written by Kevin Townsend <kevin.townsend@linaro.org> | 37 | - */ |
34 | + * | 38 | - assert(el >= 1 && el <= 3); |
35 | + * Based on: https://www.st.com/resource/en/datasheet/lsm303dlhc.pdf | 39 | - bool aa64 = arm_feature(env, ARM_FEATURE_AARCH64); |
36 | + * | 40 | - |
37 | + * SPDX-License-Identifier: GPL-2.0-or-later | 41 | - /* The highest exception level is always at the maximum supported |
38 | + */ | 42 | - * register width, and then lower levels have a register width controlled |
39 | + | 43 | - * by bits in the SCR or HCR registers. |
40 | +/* | 44 | - */ |
41 | + * The I2C address associated with this device is set on the command-line when | 45 | - if (el == 3) { |
42 | + * initialising the machine, but the following address is standard: 0x1E. | 46 | - return aa64; |
43 | + * | 47 | - } |
44 | + * Get and set functions for 'mag-x', 'mag-y' and 'mag-z' assume that | 48 | - |
45 | + * 1 = 0.001 uT. (NOTE the 1 gauss = 100 uT, so setting a value of 100,000 | 49 | - if (arm_feature(env, ARM_FEATURE_EL3) && |
46 | + * would be equal to 1 gauss or 100 uT.) | 50 | - ((env->cp15.scr_el3 & SCR_NS) || !(env->cp15.scr_el3 & SCR_EEL2))) { |
47 | + * | 51 | - aa64 = aa64 && (env->cp15.scr_el3 & SCR_RW); |
48 | + * Get and set functions for 'temperature' assume that 1 = 0.001 C, so 23.6 C | 52 | - } |
49 | + * would be equal to 23600. | 53 | - |
50 | + */ | 54 | - if (el == 2) { |
51 | + | 55 | - return aa64; |
52 | +#include "qemu/osdep.h" | 56 | - } |
53 | +#include "hw/i2c/i2c.h" | 57 | - |
54 | +#include "migration/vmstate.h" | 58 | - if (arm_is_el2_enabled(env)) { |
55 | +#include "qapi/error.h" | 59 | - aa64 = aa64 && (env->cp15.hcr_el2 & HCR_RW); |
56 | +#include "qapi/visitor.h" | 60 | - } |
57 | +#include "qemu/module.h" | 61 | - |
58 | +#include "qemu/log.h" | 62 | - return aa64; |
59 | +#include "qemu/bswap.h" | 63 | -} |
60 | + | 64 | - |
61 | +enum LSM303DLHCMagReg { | 65 | /* |
62 | + LSM303DLHC_MAG_REG_CRA = 0x00, | 66 | * Function for determining whether guest cp register reads and writes should |
63 | + LSM303DLHC_MAG_REG_CRB = 0x01, | 67 | * access the secure or non-secure bank of a cp register. When EL3 is |
64 | + LSM303DLHC_MAG_REG_MR = 0x02, | 68 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_v7m_is_handler_mode(CPUARMState *env) |
65 | + LSM303DLHC_MAG_REG_OUT_X_H = 0x03, | 69 | return env->v7m.exception != 0; |
66 | + LSM303DLHC_MAG_REG_OUT_X_L = 0x04, | 70 | } |
67 | + LSM303DLHC_MAG_REG_OUT_Z_H = 0x05, | 71 | |
68 | + LSM303DLHC_MAG_REG_OUT_Z_L = 0x06, | 72 | -/* Return the current Exception Level (as per ARMv8; note that this differs |
69 | + LSM303DLHC_MAG_REG_OUT_Y_H = 0x07, | 73 | - * from the ARMv7 Privilege Level). |
70 | + LSM303DLHC_MAG_REG_OUT_Y_L = 0x08, | 74 | - */ |
71 | + LSM303DLHC_MAG_REG_SR = 0x09, | 75 | -static inline int arm_current_el(CPUARMState *env) |
72 | + LSM303DLHC_MAG_REG_IRA = 0x0A, | 76 | -{ |
73 | + LSM303DLHC_MAG_REG_IRB = 0x0B, | 77 | - if (arm_feature(env, ARM_FEATURE_M)) { |
74 | + LSM303DLHC_MAG_REG_IRC = 0x0C, | 78 | - return arm_v7m_is_handler_mode(env) || |
75 | + LSM303DLHC_MAG_REG_TEMP_OUT_H = 0x31, | 79 | - !(env->v7m.control[env->v7m.secure] & 1); |
76 | + LSM303DLHC_MAG_REG_TEMP_OUT_L = 0x32 | 80 | - } |
77 | +}; | 81 | - |
78 | + | 82 | - if (is_a64(env)) { |
79 | +typedef struct LSM303DLHCMagState { | 83 | - return extract32(env->pstate, 2, 2); |
80 | + I2CSlave parent_obj; | 84 | - } |
81 | + uint8_t cra; | 85 | - |
82 | + uint8_t crb; | 86 | - switch (env->uncached_cpsr & 0x1f) { |
83 | + uint8_t mr; | 87 | - case ARM_CPU_MODE_USR: |
84 | + int16_t x; | 88 | - return 0; |
85 | + int16_t z; | 89 | - case ARM_CPU_MODE_HYP: |
86 | + int16_t y; | 90 | - return 2; |
87 | + int16_t x_lock; | 91 | - case ARM_CPU_MODE_MON: |
88 | + int16_t z_lock; | 92 | - return 3; |
89 | + int16_t y_lock; | 93 | - default: |
90 | + uint8_t sr; | 94 | - if (arm_is_secure(env) && !arm_el_is_aa64(env, 3)) { |
91 | + uint8_t ira; | 95 | - /* If EL3 is 32-bit then all secure privileged modes run in |
92 | + uint8_t irb; | 96 | - * EL3 |
93 | + uint8_t irc; | 97 | - */ |
94 | + int16_t temperature; | 98 | - return 3; |
95 | + int16_t temperature_lock; | 99 | - } |
96 | + uint8_t len; | 100 | - |
97 | + uint8_t buf; | 101 | - return 1; |
98 | + uint8_t pointer; | 102 | - } |
99 | +} LSM303DLHCMagState; | 103 | -} |
100 | + | 104 | - |
101 | +#define TYPE_LSM303DLHC_MAG "lsm303dlhc_mag" | 105 | /** |
102 | +OBJECT_DECLARE_SIMPLE_TYPE(LSM303DLHCMagState, LSM303DLHC_MAG) | 106 | * write_list_to_cpustate |
103 | + | 107 | * @cpu: ARMCPU |
104 | +/* | 108 | diff --git a/target/arm/internals.h b/target/arm/internals.h |
105 | + * Conversion factor from Gauss to sensor values for each GN gain setting, | 109 | index XXXXXXX..XXXXXXX 100644 |
106 | + * in units "lsb per Gauss" (see data sheet table 3). There is no documented | 110 | --- a/target/arm/internals.h |
107 | + * behaviour if the GN setting in CRB is incorrectly set to 0b000; | 111 | +++ b/target/arm/internals.h |
108 | + * we arbitrarily make it the same as 0b001. | 112 | @@ -XXX,XX +XXX,XX @@ static inline FloatRoundMode arm_rmode_to_sf(ARMFPRounding rmode) |
109 | + */ | 113 | return arm_rmode_to_sf_map[rmode]; |
110 | +uint32_t xy_gain[] = { 1100, 1100, 855, 670, 450, 400, 330, 230 }; | 114 | } |
111 | +uint32_t z_gain[] = { 980, 980, 760, 600, 400, 355, 295, 205 }; | 115 | |
112 | + | 116 | +/* Return true if the specified exception level is running in AArch64 state. */ |
113 | +static void lsm303dlhc_mag_get_x(Object *obj, Visitor *v, const char *name, | 117 | +static inline bool arm_el_is_aa64(CPUARMState *env, int el) |
114 | + void *opaque, Error **errp) | ||
115 | +{ | ||
116 | + LSM303DLHCMagState *s = LSM303DLHC_MAG(obj); | ||
117 | + int gm = extract32(s->crb, 5, 3); | ||
118 | + | ||
119 | + /* Convert to uT where 1000 = 1 uT. Conversion factor depends on gain. */ | ||
120 | + int64_t value = muldiv64(s->x, 100000, xy_gain[gm]); | ||
121 | + visit_type_int(v, name, &value, errp); | ||
122 | +} | ||
123 | + | ||
124 | +static void lsm303dlhc_mag_get_y(Object *obj, Visitor *v, const char *name, | ||
125 | + void *opaque, Error **errp) | ||
126 | +{ | ||
127 | + LSM303DLHCMagState *s = LSM303DLHC_MAG(obj); | ||
128 | + int gm = extract32(s->crb, 5, 3); | ||
129 | + | ||
130 | + /* Convert to uT where 1000 = 1 uT. Conversion factor depends on gain. */ | ||
131 | + int64_t value = muldiv64(s->y, 100000, xy_gain[gm]); | ||
132 | + visit_type_int(v, name, &value, errp); | ||
133 | +} | ||
134 | + | ||
135 | +static void lsm303dlhc_mag_get_z(Object *obj, Visitor *v, const char *name, | ||
136 | + void *opaque, Error **errp) | ||
137 | +{ | ||
138 | + LSM303DLHCMagState *s = LSM303DLHC_MAG(obj); | ||
139 | + int gm = extract32(s->crb, 5, 3); | ||
140 | + | ||
141 | + /* Convert to uT where 1000 = 1 uT. Conversion factor depends on gain. */ | ||
142 | + int64_t value = muldiv64(s->z, 100000, z_gain[gm]); | ||
143 | + visit_type_int(v, name, &value, errp); | ||
144 | +} | ||
145 | + | ||
146 | +static void lsm303dlhc_mag_set_x(Object *obj, Visitor *v, const char *name, | ||
147 | + void *opaque, Error **errp) | ||
148 | +{ | ||
149 | + LSM303DLHCMagState *s = LSM303DLHC_MAG(obj); | ||
150 | + int64_t value; | ||
151 | + int64_t reg; | ||
152 | + int gm = extract32(s->crb, 5, 3); | ||
153 | + | ||
154 | + if (!visit_type_int(v, name, &value, errp)) { | ||
155 | + return; | ||
156 | + } | ||
157 | + | ||
158 | + reg = muldiv64(value, xy_gain[gm], 100000); | ||
159 | + | ||
160 | + /* Make sure we are within a 12-bit limit. */ | ||
161 | + if (reg > 2047 || reg < -2048) { | ||
162 | + error_setg(errp, "value %" PRId64 " out of register's range", value); | ||
163 | + return; | ||
164 | + } | ||
165 | + | ||
166 | + s->x = (int16_t)reg; | ||
167 | +} | ||
168 | + | ||
169 | +static void lsm303dlhc_mag_set_y(Object *obj, Visitor *v, const char *name, | ||
170 | + void *opaque, Error **errp) | ||
171 | +{ | ||
172 | + LSM303DLHCMagState *s = LSM303DLHC_MAG(obj); | ||
173 | + int64_t value; | ||
174 | + int64_t reg; | ||
175 | + int gm = extract32(s->crb, 5, 3); | ||
176 | + | ||
177 | + if (!visit_type_int(v, name, &value, errp)) { | ||
178 | + return; | ||
179 | + } | ||
180 | + | ||
181 | + reg = muldiv64(value, xy_gain[gm], 100000); | ||
182 | + | ||
183 | + /* Make sure we are within a 12-bit limit. */ | ||
184 | + if (reg > 2047 || reg < -2048) { | ||
185 | + error_setg(errp, "value %" PRId64 " out of register's range", value); | ||
186 | + return; | ||
187 | + } | ||
188 | + | ||
189 | + s->y = (int16_t)reg; | ||
190 | +} | ||
191 | + | ||
192 | +static void lsm303dlhc_mag_set_z(Object *obj, Visitor *v, const char *name, | ||
193 | + void *opaque, Error **errp) | ||
194 | +{ | ||
195 | + LSM303DLHCMagState *s = LSM303DLHC_MAG(obj); | ||
196 | + int64_t value; | ||
197 | + int64_t reg; | ||
198 | + int gm = extract32(s->crb, 5, 3); | ||
199 | + | ||
200 | + if (!visit_type_int(v, name, &value, errp)) { | ||
201 | + return; | ||
202 | + } | ||
203 | + | ||
204 | + reg = muldiv64(value, z_gain[gm], 100000); | ||
205 | + | ||
206 | + /* Make sure we are within a 12-bit limit. */ | ||
207 | + if (reg > 2047 || reg < -2048) { | ||
208 | + error_setg(errp, "value %" PRId64 " out of register's range", value); | ||
209 | + return; | ||
210 | + } | ||
211 | + | ||
212 | + s->z = (int16_t)reg; | ||
213 | +} | ||
214 | + | ||
215 | +/* | ||
216 | + * Get handler for the temperature property. | ||
217 | + */ | ||
218 | +static void lsm303dlhc_mag_get_temperature(Object *obj, Visitor *v, | ||
219 | + const char *name, void *opaque, | ||
220 | + Error **errp) | ||
221 | +{ | ||
222 | + LSM303DLHCMagState *s = LSM303DLHC_MAG(obj); | ||
223 | + int64_t value; | ||
224 | + | ||
225 | + /* Convert to 1 lsb = 0.125 C to 1 = 0.001 C for 'temperature' property. */ | ||
226 | + value = s->temperature * 125; | ||
227 | + | ||
228 | + visit_type_int(v, name, &value, errp); | ||
229 | +} | ||
230 | + | ||
231 | +/* | ||
232 | + * Set handler for the temperature property. | ||
233 | + */ | ||
234 | +static void lsm303dlhc_mag_set_temperature(Object *obj, Visitor *v, | ||
235 | + const char *name, void *opaque, | ||
236 | + Error **errp) | ||
237 | +{ | ||
238 | + LSM303DLHCMagState *s = LSM303DLHC_MAG(obj); | ||
239 | + int64_t value; | ||
240 | + | ||
241 | + if (!visit_type_int(v, name, &value, errp)) { | ||
242 | + return; | ||
243 | + } | ||
244 | + | ||
245 | + /* Input temperature is in 0.001 C units. Convert to 1 lsb = 0.125 C. */ | ||
246 | + value /= 125; | ||
247 | + | ||
248 | + if (value > 2047 || value < -2048) { | ||
249 | + error_setg(errp, "value %" PRId64 " lsb is out of range", value); | ||
250 | + return; | ||
251 | + } | ||
252 | + | ||
253 | + s->temperature = (int16_t)value; | ||
254 | +} | ||
255 | + | ||
256 | +/* | ||
257 | + * Callback handler whenever a 'I2C_START_RECV' (read) event is received. | ||
258 | + */ | ||
259 | +static void lsm303dlhc_mag_read(LSM303DLHCMagState *s) | ||
260 | +{ | 118 | +{ |
261 | + /* | 119 | + /* |
262 | + * Set the LOCK bit whenever a new read attempt is made. This will be | 120 | + * This isn't valid for EL0 (if we're in EL0, is_a64() is what you want, |
263 | + * cleared in I2C_FINISH. Note that DRDY is always set to 1 in this driver. | 121 | + * and if we're not in EL0 then the state of EL0 isn't well defined.) |
264 | + */ | 122 | + */ |
265 | + s->sr = 0x3; | 123 | + assert(el >= 1 && el <= 3); |
124 | + bool aa64 = arm_feature(env, ARM_FEATURE_AARCH64); | ||
266 | + | 125 | + |
267 | + /* | 126 | + /* |
268 | + * Copy the current X/Y/Z and temp. values into the locked registers so | 127 | + * The highest exception level is always at the maximum supported |
269 | + * that 'mag-x', 'mag-y', 'mag-z' and 'temperature' can continue to be | 128 | + * register width, and then lower levels have a register width controlled |
270 | + * updated via QOM, etc., without corrupting the current read event. | 129 | + * by bits in the SCR or HCR registers. |
271 | + */ | 130 | + */ |
272 | + s->x_lock = s->x; | 131 | + if (el == 3) { |
273 | + s->z_lock = s->z; | 132 | + return aa64; |
274 | + s->y_lock = s->y; | 133 | + } |
275 | + s->temperature_lock = s->temperature; | 134 | + |
135 | + if (arm_feature(env, ARM_FEATURE_EL3) && | ||
136 | + ((env->cp15.scr_el3 & SCR_NS) || !(env->cp15.scr_el3 & SCR_EEL2))) { | ||
137 | + aa64 = aa64 && (env->cp15.scr_el3 & SCR_RW); | ||
138 | + } | ||
139 | + | ||
140 | + if (el == 2) { | ||
141 | + return aa64; | ||
142 | + } | ||
143 | + | ||
144 | + if (arm_is_el2_enabled(env)) { | ||
145 | + aa64 = aa64 && (env->cp15.hcr_el2 & HCR_RW); | ||
146 | + } | ||
147 | + | ||
148 | + return aa64; | ||
276 | +} | 149 | +} |
277 | + | 150 | + |
278 | +/* | 151 | +/* |
279 | + * Callback handler whenever a 'I2C_FINISH' event is received. | 152 | + * Return the current Exception Level (as per ARMv8; note that this differs |
153 | + * from the ARMv7 Privilege Level). | ||
280 | + */ | 154 | + */ |
281 | +static void lsm303dlhc_mag_finish(LSM303DLHCMagState *s) | 155 | +static inline int arm_current_el(CPUARMState *env) |
282 | +{ | 156 | +{ |
283 | + /* | 157 | + if (arm_feature(env, ARM_FEATURE_M)) { |
284 | + * Clear the LOCK bit when the read attempt terminates. | 158 | + return arm_v7m_is_handler_mode(env) || |
285 | + * This bit is initially set in the I2C_START_RECV handler. | 159 | + !(env->v7m.control[env->v7m.secure] & 1); |
286 | + */ | 160 | + } |
287 | + s->sr = 0x1; | 161 | + |
162 | + if (is_a64(env)) { | ||
163 | + return extract32(env->pstate, 2, 2); | ||
164 | + } | ||
165 | + | ||
166 | + switch (env->uncached_cpsr & 0x1f) { | ||
167 | + case ARM_CPU_MODE_USR: | ||
168 | + return 0; | ||
169 | + case ARM_CPU_MODE_HYP: | ||
170 | + return 2; | ||
171 | + case ARM_CPU_MODE_MON: | ||
172 | + return 3; | ||
173 | + default: | ||
174 | + if (arm_is_secure(env) && !arm_el_is_aa64(env, 3)) { | ||
175 | + /* If EL3 is 32-bit then all secure privileged modes run in EL3 */ | ||
176 | + return 3; | ||
177 | + } | ||
178 | + | ||
179 | + return 1; | ||
180 | + } | ||
288 | +} | 181 | +} |
289 | + | 182 | + |
290 | +/* | 183 | static inline bool arm_cpu_data_is_big_endian_a32(CPUARMState *env, |
291 | + * Callback handler when a device attempts to write to a register. | 184 | bool sctlr_b) |
292 | + */ | 185 | { |
293 | +static void lsm303dlhc_mag_write(LSM303DLHCMagState *s) | 186 | diff --git a/hw/intc/arm_gicv3_cpuif.c b/hw/intc/arm_gicv3_cpuif.c |
294 | +{ | 187 | index XXXXXXX..XXXXXXX 100644 |
295 | + switch (s->pointer) { | 188 | --- a/hw/intc/arm_gicv3_cpuif.c |
296 | + case LSM303DLHC_MAG_REG_CRA: | 189 | +++ b/hw/intc/arm_gicv3_cpuif.c |
297 | + s->cra = s->buf; | ||
298 | + break; | ||
299 | + case LSM303DLHC_MAG_REG_CRB: | ||
300 | + /* Make sure gain is at least 1, falling back to 1 on an error. */ | ||
301 | + if (s->buf >> 5 == 0) { | ||
302 | + s->buf = 1 << 5; | ||
303 | + } | ||
304 | + s->crb = s->buf; | ||
305 | + break; | ||
306 | + case LSM303DLHC_MAG_REG_MR: | ||
307 | + s->mr = s->buf; | ||
308 | + break; | ||
309 | + case LSM303DLHC_MAG_REG_SR: | ||
310 | + s->sr = s->buf; | ||
311 | + break; | ||
312 | + case LSM303DLHC_MAG_REG_IRA: | ||
313 | + s->ira = s->buf; | ||
314 | + break; | ||
315 | + case LSM303DLHC_MAG_REG_IRB: | ||
316 | + s->irb = s->buf; | ||
317 | + break; | ||
318 | + case LSM303DLHC_MAG_REG_IRC: | ||
319 | + s->irc = s->buf; | ||
320 | + break; | ||
321 | + default: | ||
322 | + qemu_log_mask(LOG_GUEST_ERROR, "reg is read-only: 0x%02X", s->buf); | ||
323 | + break; | ||
324 | + } | ||
325 | +} | ||
326 | + | ||
327 | +/* | ||
328 | + * Low-level master-to-slave transaction handler. | ||
329 | + */ | ||
330 | +static int lsm303dlhc_mag_send(I2CSlave *i2c, uint8_t data) | ||
331 | +{ | ||
332 | + LSM303DLHCMagState *s = LSM303DLHC_MAG(i2c); | ||
333 | + | ||
334 | + if (s->len == 0) { | ||
335 | + /* First byte is the reg pointer */ | ||
336 | + s->pointer = data; | ||
337 | + s->len++; | ||
338 | + } else if (s->len == 1) { | ||
339 | + /* Second byte is the new register value. */ | ||
340 | + s->buf = data; | ||
341 | + lsm303dlhc_mag_write(s); | ||
342 | + } else { | ||
343 | + g_assert_not_reached(); | ||
344 | + } | ||
345 | + | ||
346 | + return 0; | ||
347 | +} | ||
348 | + | ||
349 | +/* | ||
350 | + * Low-level slave-to-master transaction handler (read attempts). | ||
351 | + */ | ||
352 | +static uint8_t lsm303dlhc_mag_recv(I2CSlave *i2c) | ||
353 | +{ | ||
354 | + LSM303DLHCMagState *s = LSM303DLHC_MAG(i2c); | ||
355 | + uint8_t resp; | ||
356 | + | ||
357 | + switch (s->pointer) { | ||
358 | + case LSM303DLHC_MAG_REG_CRA: | ||
359 | + resp = s->cra; | ||
360 | + break; | ||
361 | + case LSM303DLHC_MAG_REG_CRB: | ||
362 | + resp = s->crb; | ||
363 | + break; | ||
364 | + case LSM303DLHC_MAG_REG_MR: | ||
365 | + resp = s->mr; | ||
366 | + break; | ||
367 | + case LSM303DLHC_MAG_REG_OUT_X_H: | ||
368 | + resp = (uint8_t)(s->x_lock >> 8); | ||
369 | + break; | ||
370 | + case LSM303DLHC_MAG_REG_OUT_X_L: | ||
371 | + resp = (uint8_t)(s->x_lock); | ||
372 | + break; | ||
373 | + case LSM303DLHC_MAG_REG_OUT_Z_H: | ||
374 | + resp = (uint8_t)(s->z_lock >> 8); | ||
375 | + break; | ||
376 | + case LSM303DLHC_MAG_REG_OUT_Z_L: | ||
377 | + resp = (uint8_t)(s->z_lock); | ||
378 | + break; | ||
379 | + case LSM303DLHC_MAG_REG_OUT_Y_H: | ||
380 | + resp = (uint8_t)(s->y_lock >> 8); | ||
381 | + break; | ||
382 | + case LSM303DLHC_MAG_REG_OUT_Y_L: | ||
383 | + resp = (uint8_t)(s->y_lock); | ||
384 | + break; | ||
385 | + case LSM303DLHC_MAG_REG_SR: | ||
386 | + resp = s->sr; | ||
387 | + break; | ||
388 | + case LSM303DLHC_MAG_REG_IRA: | ||
389 | + resp = s->ira; | ||
390 | + break; | ||
391 | + case LSM303DLHC_MAG_REG_IRB: | ||
392 | + resp = s->irb; | ||
393 | + break; | ||
394 | + case LSM303DLHC_MAG_REG_IRC: | ||
395 | + resp = s->irc; | ||
396 | + break; | ||
397 | + case LSM303DLHC_MAG_REG_TEMP_OUT_H: | ||
398 | + /* Check if the temperature sensor is enabled or not (CRA & 0x80). */ | ||
399 | + if (s->cra & 0x80) { | ||
400 | + resp = (uint8_t)(s->temperature_lock >> 8); | ||
401 | + } else { | ||
402 | + resp = 0; | ||
403 | + } | ||
404 | + break; | ||
405 | + case LSM303DLHC_MAG_REG_TEMP_OUT_L: | ||
406 | + if (s->cra & 0x80) { | ||
407 | + resp = (uint8_t)(s->temperature_lock & 0xff); | ||
408 | + } else { | ||
409 | + resp = 0; | ||
410 | + } | ||
411 | + break; | ||
412 | + default: | ||
413 | + resp = 0; | ||
414 | + break; | ||
415 | + } | ||
416 | + | ||
417 | + /* | ||
418 | + * The address pointer on the LSM303DLHC auto-increments whenever a byte | ||
419 | + * is read, without the master device having to request the next address. | ||
420 | + * | ||
421 | + * The auto-increment process has the following logic: | ||
422 | + * | ||
423 | + * - if (s->pointer == 8) then s->pointer = 3 | ||
424 | + * - else: if (s->pointer == 12) then s->pointer = 0 | ||
425 | + * - else: s->pointer += 1 | ||
426 | + * | ||
427 | + * Reading an invalid address return 0. | ||
428 | + */ | ||
429 | + if (s->pointer == LSM303DLHC_MAG_REG_OUT_Y_L) { | ||
430 | + s->pointer = LSM303DLHC_MAG_REG_OUT_X_H; | ||
431 | + } else if (s->pointer == LSM303DLHC_MAG_REG_IRC) { | ||
432 | + s->pointer = LSM303DLHC_MAG_REG_CRA; | ||
433 | + } else { | ||
434 | + s->pointer++; | ||
435 | + } | ||
436 | + | ||
437 | + return resp; | ||
438 | +} | ||
439 | + | ||
440 | +/* | ||
441 | + * Bus state change handler. | ||
442 | + */ | ||
443 | +static int lsm303dlhc_mag_event(I2CSlave *i2c, enum i2c_event event) | ||
444 | +{ | ||
445 | + LSM303DLHCMagState *s = LSM303DLHC_MAG(i2c); | ||
446 | + | ||
447 | + switch (event) { | ||
448 | + case I2C_START_SEND: | ||
449 | + break; | ||
450 | + case I2C_START_RECV: | ||
451 | + lsm303dlhc_mag_read(s); | ||
452 | + break; | ||
453 | + case I2C_FINISH: | ||
454 | + lsm303dlhc_mag_finish(s); | ||
455 | + break; | ||
456 | + case I2C_NACK: | ||
457 | + break; | ||
458 | + } | ||
459 | + | ||
460 | + s->len = 0; | ||
461 | + return 0; | ||
462 | +} | ||
463 | + | ||
464 | +/* | ||
465 | + * Device data description using VMSTATE macros. | ||
466 | + */ | ||
467 | +static const VMStateDescription vmstate_lsm303dlhc_mag = { | ||
468 | + .name = "LSM303DLHC_MAG", | ||
469 | + .version_id = 0, | ||
470 | + .minimum_version_id = 0, | ||
471 | + .fields = (VMStateField[]) { | ||
472 | + | ||
473 | + VMSTATE_I2C_SLAVE(parent_obj, LSM303DLHCMagState), | ||
474 | + VMSTATE_UINT8(len, LSM303DLHCMagState), | ||
475 | + VMSTATE_UINT8(buf, LSM303DLHCMagState), | ||
476 | + VMSTATE_UINT8(pointer, LSM303DLHCMagState), | ||
477 | + VMSTATE_UINT8(cra, LSM303DLHCMagState), | ||
478 | + VMSTATE_UINT8(crb, LSM303DLHCMagState), | ||
479 | + VMSTATE_UINT8(mr, LSM303DLHCMagState), | ||
480 | + VMSTATE_INT16(x, LSM303DLHCMagState), | ||
481 | + VMSTATE_INT16(z, LSM303DLHCMagState), | ||
482 | + VMSTATE_INT16(y, LSM303DLHCMagState), | ||
483 | + VMSTATE_INT16(x_lock, LSM303DLHCMagState), | ||
484 | + VMSTATE_INT16(z_lock, LSM303DLHCMagState), | ||
485 | + VMSTATE_INT16(y_lock, LSM303DLHCMagState), | ||
486 | + VMSTATE_UINT8(sr, LSM303DLHCMagState), | ||
487 | + VMSTATE_UINT8(ira, LSM303DLHCMagState), | ||
488 | + VMSTATE_UINT8(irb, LSM303DLHCMagState), | ||
489 | + VMSTATE_UINT8(irc, LSM303DLHCMagState), | ||
490 | + VMSTATE_INT16(temperature, LSM303DLHCMagState), | ||
491 | + VMSTATE_INT16(temperature_lock, LSM303DLHCMagState), | ||
492 | + VMSTATE_END_OF_LIST() | ||
493 | + } | ||
494 | +}; | ||
495 | + | ||
496 | +/* | ||
497 | + * Put the device into post-reset default state. | ||
498 | + */ | ||
499 | +static void lsm303dlhc_mag_default_cfg(LSM303DLHCMagState *s) | ||
500 | +{ | ||
501 | + /* Set the device into is default reset state. */ | ||
502 | + s->len = 0; | ||
503 | + s->pointer = 0; /* Current register. */ | ||
504 | + s->buf = 0; /* Shared buffer. */ | ||
505 | + s->cra = 0x10; /* Temp Enabled = 0, Data Rate = 15.0 Hz. */ | ||
506 | + s->crb = 0x20; /* Gain = +/- 1.3 Gauss. */ | ||
507 | + s->mr = 0x3; /* Operating Mode = Sleep. */ | ||
508 | + s->x = 0; | ||
509 | + s->z = 0; | ||
510 | + s->y = 0; | ||
511 | + s->x_lock = 0; | ||
512 | + s->z_lock = 0; | ||
513 | + s->y_lock = 0; | ||
514 | + s->sr = 0x1; /* DRDY = 1. */ | ||
515 | + s->ira = 0x48; | ||
516 | + s->irb = 0x34; | ||
517 | + s->irc = 0x33; | ||
518 | + s->temperature = 0; /* Default to 0 degrees C (0/8 lsb = 0 C). */ | ||
519 | + s->temperature_lock = 0; | ||
520 | +} | ||
521 | + | ||
522 | +/* | ||
523 | + * Callback handler when DeviceState 'reset' is set to true. | ||
524 | + */ | ||
525 | +static void lsm303dlhc_mag_reset(DeviceState *dev) | ||
526 | +{ | ||
527 | + I2CSlave *i2c = I2C_SLAVE(dev); | ||
528 | + LSM303DLHCMagState *s = LSM303DLHC_MAG(i2c); | ||
529 | + | ||
530 | + /* Set the device into its default reset state. */ | ||
531 | + lsm303dlhc_mag_default_cfg(s); | ||
532 | +} | ||
533 | + | ||
534 | +/* | ||
535 | + * Initialisation of any public properties. | ||
536 | + */ | ||
537 | +static void lsm303dlhc_mag_initfn(Object *obj) | ||
538 | +{ | ||
539 | + object_property_add(obj, "mag-x", "int", | ||
540 | + lsm303dlhc_mag_get_x, | ||
541 | + lsm303dlhc_mag_set_x, NULL, NULL); | ||
542 | + | ||
543 | + object_property_add(obj, "mag-y", "int", | ||
544 | + lsm303dlhc_mag_get_y, | ||
545 | + lsm303dlhc_mag_set_y, NULL, NULL); | ||
546 | + | ||
547 | + object_property_add(obj, "mag-z", "int", | ||
548 | + lsm303dlhc_mag_get_z, | ||
549 | + lsm303dlhc_mag_set_z, NULL, NULL); | ||
550 | + | ||
551 | + object_property_add(obj, "temperature", "int", | ||
552 | + lsm303dlhc_mag_get_temperature, | ||
553 | + lsm303dlhc_mag_set_temperature, NULL, NULL); | ||
554 | +} | ||
555 | + | ||
556 | +/* | ||
557 | + * Set the virtual method pointers (bus state change, tx/rx, etc.). | ||
558 | + */ | ||
559 | +static void lsm303dlhc_mag_class_init(ObjectClass *klass, void *data) | ||
560 | +{ | ||
561 | + DeviceClass *dc = DEVICE_CLASS(klass); | ||
562 | + I2CSlaveClass *k = I2C_SLAVE_CLASS(klass); | ||
563 | + | ||
564 | + dc->reset = lsm303dlhc_mag_reset; | ||
565 | + dc->vmsd = &vmstate_lsm303dlhc_mag; | ||
566 | + k->event = lsm303dlhc_mag_event; | ||
567 | + k->recv = lsm303dlhc_mag_recv; | ||
568 | + k->send = lsm303dlhc_mag_send; | ||
569 | +} | ||
570 | + | ||
571 | +static const TypeInfo lsm303dlhc_mag_info = { | ||
572 | + .name = TYPE_LSM303DLHC_MAG, | ||
573 | + .parent = TYPE_I2C_SLAVE, | ||
574 | + .instance_size = sizeof(LSM303DLHCMagState), | ||
575 | + .instance_init = lsm303dlhc_mag_initfn, | ||
576 | + .class_init = lsm303dlhc_mag_class_init, | ||
577 | +}; | ||
578 | + | ||
579 | +static void lsm303dlhc_mag_register_types(void) | ||
580 | +{ | ||
581 | + type_register_static(&lsm303dlhc_mag_info); | ||
582 | +} | ||
583 | + | ||
584 | +type_init(lsm303dlhc_mag_register_types) | ||
585 | diff --git a/tests/qtest/lsm303dlhc-mag-test.c b/tests/qtest/lsm303dlhc-mag-test.c | ||
586 | new file mode 100644 | ||
587 | index XXXXXXX..XXXXXXX | ||
588 | --- /dev/null | ||
589 | +++ b/tests/qtest/lsm303dlhc-mag-test.c | ||
590 | @@ -XXX,XX +XXX,XX @@ | 190 | @@ -XXX,XX +XXX,XX @@ |
591 | +/* | 191 | #include "cpu.h" |
592 | + * QTest testcase for the LSM303DLHC I2C magnetometer | 192 | #include "target/arm/cpregs.h" |
593 | + * | 193 | #include "target/arm/cpu-features.h" |
594 | + * Copyright (C) 2021 Linaro Ltd. | 194 | +#include "target/arm/internals.h" |
595 | + * Written by Kevin Townsend <kevin.townsend@linaro.org> | 195 | #include "system/tcg.h" |
596 | + * | 196 | #include "system/qtest.h" |
597 | + * Based on: https://www.st.com/resource/en/datasheet/lsm303dlhc.pdf | 197 | |
598 | + * | 198 | diff --git a/target/arm/arch_dump.c b/target/arm/arch_dump.c |
599 | + * SPDX-License-Identifier: GPL-2.0-or-later | 199 | index XXXXXXX..XXXXXXX 100644 |
600 | + */ | 200 | --- a/target/arm/arch_dump.c |
601 | + | 201 | +++ b/target/arm/arch_dump.c |
602 | +#include "qemu/osdep.h" | 202 | @@ -XXX,XX +XXX,XX @@ |
603 | +#include "libqtest-single.h" | 203 | #include "elf.h" |
604 | +#include "libqos/qgraph.h" | 204 | #include "system/dump.h" |
605 | +#include "libqos/i2c.h" | 205 | #include "cpu-features.h" |
606 | +#include "qapi/qmp/qdict.h" | 206 | +#include "internals.h" |
607 | + | 207 | |
608 | +#define LSM303DLHC_MAG_TEST_ID "lsm303dlhc_mag-test" | 208 | /* struct user_pt_regs from arch/arm64/include/uapi/asm/ptrace.h */ |
609 | +#define LSM303DLHC_MAG_REG_CRA 0x00 | 209 | struct aarch64_user_regs { |
610 | +#define LSM303DLHC_MAG_REG_CRB 0x01 | ||
611 | +#define LSM303DLHC_MAG_REG_OUT_X_H 0x03 | ||
612 | +#define LSM303DLHC_MAG_REG_OUT_Z_H 0x05 | ||
613 | +#define LSM303DLHC_MAG_REG_OUT_Y_H 0x07 | ||
614 | +#define LSM303DLHC_MAG_REG_IRC 0x0C | ||
615 | +#define LSM303DLHC_MAG_REG_TEMP_OUT_H 0x31 | ||
616 | + | ||
617 | +static int qmp_lsm303dlhc_mag_get_property(const char *id, const char *prop) | ||
618 | +{ | ||
619 | + QDict *response; | ||
620 | + int ret; | ||
621 | + | ||
622 | + response = qmp("{ 'execute': 'qom-get', 'arguments': { 'path': %s, " | ||
623 | + "'property': %s } }", id, prop); | ||
624 | + g_assert(qdict_haskey(response, "return")); | ||
625 | + ret = qdict_get_int(response, "return"); | ||
626 | + qobject_unref(response); | ||
627 | + return ret; | ||
628 | +} | ||
629 | + | ||
630 | +static void qmp_lsm303dlhc_mag_set_property(const char *id, const char *prop, | ||
631 | + int value) | ||
632 | +{ | ||
633 | + QDict *response; | ||
634 | + | ||
635 | + response = qmp("{ 'execute': 'qom-set', 'arguments': { 'path': %s, " | ||
636 | + "'property': %s, 'value': %d } }", id, prop, value); | ||
637 | + g_assert(qdict_haskey(response, "return")); | ||
638 | + qobject_unref(response); | ||
639 | +} | ||
640 | + | ||
641 | +static void send_and_receive(void *obj, void *data, QGuestAllocator *alloc) | ||
642 | +{ | ||
643 | + int64_t value; | ||
644 | + QI2CDevice *i2cdev = (QI2CDevice *)obj; | ||
645 | + | ||
646 | + /* Check default value for CRB */ | ||
647 | + g_assert_cmphex(i2c_get8(i2cdev, LSM303DLHC_MAG_REG_CRB), ==, 0x20); | ||
648 | + | ||
649 | + /* Set x to 1.0 gauss and verify the value */ | ||
650 | + qmp_lsm303dlhc_mag_set_property(LSM303DLHC_MAG_TEST_ID, "mag-x", 100000); | ||
651 | + value = qmp_lsm303dlhc_mag_get_property( | ||
652 | + LSM303DLHC_MAG_TEST_ID, "mag-x"); | ||
653 | + g_assert_cmpint(value, ==, 100000); | ||
654 | + | ||
655 | + /* Set y to 1.5 gauss and verify the value */ | ||
656 | + qmp_lsm303dlhc_mag_set_property(LSM303DLHC_MAG_TEST_ID, "mag-y", 150000); | ||
657 | + value = qmp_lsm303dlhc_mag_get_property( | ||
658 | + LSM303DLHC_MAG_TEST_ID, "mag-y"); | ||
659 | + g_assert_cmpint(value, ==, 150000); | ||
660 | + | ||
661 | + /* Set z to 0.5 gauss and verify the value */ | ||
662 | + qmp_lsm303dlhc_mag_set_property(LSM303DLHC_MAG_TEST_ID, "mag-z", 50000); | ||
663 | + value = qmp_lsm303dlhc_mag_get_property( | ||
664 | + LSM303DLHC_MAG_TEST_ID, "mag-z"); | ||
665 | + g_assert_cmpint(value, ==, 50000); | ||
666 | + | ||
667 | + /* Set temperature to 23.6 C and verify the value */ | ||
668 | + qmp_lsm303dlhc_mag_set_property(LSM303DLHC_MAG_TEST_ID, | ||
669 | + "temperature", 23600); | ||
670 | + value = qmp_lsm303dlhc_mag_get_property( | ||
671 | + LSM303DLHC_MAG_TEST_ID, "temperature"); | ||
672 | + /* Should return 23.5 C due to 0.125°C steps. */ | ||
673 | + g_assert_cmpint(value, ==, 23500); | ||
674 | + | ||
675 | + /* Read raw x axis registers (1 gauss = 1100 at +/-1.3 g gain) */ | ||
676 | + value = i2c_get16(i2cdev, LSM303DLHC_MAG_REG_OUT_X_H); | ||
677 | + g_assert_cmphex(value, ==, 1100); | ||
678 | + | ||
679 | + /* Read raw y axis registers (1.5 gauss = 1650 at +/- 1.3 g gain = ) */ | ||
680 | + value = i2c_get16(i2cdev, LSM303DLHC_MAG_REG_OUT_Y_H); | ||
681 | + g_assert_cmphex(value, ==, 1650); | ||
682 | + | ||
683 | + /* Read raw z axis registers (0.5 gauss = 490 at +/- 1.3 g gain = ) */ | ||
684 | + value = i2c_get16(i2cdev, LSM303DLHC_MAG_REG_OUT_Z_H); | ||
685 | + g_assert_cmphex(value, ==, 490); | ||
686 | + | ||
687 | + /* Read raw temperature registers with temp disabled (CRA = 0x10) */ | ||
688 | + value = i2c_get16(i2cdev, LSM303DLHC_MAG_REG_TEMP_OUT_H); | ||
689 | + g_assert_cmphex(value, ==, 0); | ||
690 | + | ||
691 | + /* Enable temperature reads (CRA = 0x90) */ | ||
692 | + i2c_set8(i2cdev, LSM303DLHC_MAG_REG_CRA, 0x90); | ||
693 | + | ||
694 | + /* Read raw temp registers (23.5 C = 188 at 1 lsb = 0.125 C) */ | ||
695 | + value = i2c_get16(i2cdev, LSM303DLHC_MAG_REG_TEMP_OUT_H); | ||
696 | + g_assert_cmphex(value, ==, 188); | ||
697 | +} | ||
698 | + | ||
699 | +static void reg_wraparound(void *obj, void *data, QGuestAllocator *alloc) | ||
700 | +{ | ||
701 | + uint8_t value[4]; | ||
702 | + QI2CDevice *i2cdev = (QI2CDevice *)obj; | ||
703 | + | ||
704 | + /* Set x to 1.0 gauss, and y to 1.5 gauss for known test values */ | ||
705 | + qmp_lsm303dlhc_mag_set_property(LSM303DLHC_MAG_TEST_ID, "mag-x", 100000); | ||
706 | + qmp_lsm303dlhc_mag_set_property(LSM303DLHC_MAG_TEST_ID, "mag-y", 150000); | ||
707 | + | ||
708 | + /* Check that requesting 4 bytes starting at Y_H wraps around to X_L */ | ||
709 | + i2c_read_block(i2cdev, LSM303DLHC_MAG_REG_OUT_Y_H, value, 4); | ||
710 | + /* 1.5 gauss = 1650 lsb = 0x672 */ | ||
711 | + g_assert_cmphex(value[0], ==, 0x06); | ||
712 | + g_assert_cmphex(value[1], ==, 0x72); | ||
713 | + /* 1.0 gauss = 1100 lsb = 0x44C */ | ||
714 | + g_assert_cmphex(value[2], ==, 0x04); | ||
715 | + g_assert_cmphex(value[3], ==, 0x4C); | ||
716 | + | ||
717 | + /* Check that requesting LSM303DLHC_MAG_REG_IRC wraps around to CRA */ | ||
718 | + i2c_read_block(i2cdev, LSM303DLHC_MAG_REG_IRC, value, 2); | ||
719 | + /* Default value for IRC = 0x33 */ | ||
720 | + g_assert_cmphex(value[0], ==, 0x33); | ||
721 | + /* Default value for CRA = 0x10 */ | ||
722 | + g_assert_cmphex(value[1], ==, 0x10); | ||
723 | +} | ||
724 | + | ||
725 | +static void lsm303dlhc_mag_register_nodes(void) | ||
726 | +{ | ||
727 | + QOSGraphEdgeOptions opts = { | ||
728 | + .extra_device_opts = "id=" LSM303DLHC_MAG_TEST_ID ",address=0x1e" | ||
729 | + }; | ||
730 | + add_qi2c_address(&opts, &(QI2CAddress) { 0x1E }); | ||
731 | + | ||
732 | + qos_node_create_driver("lsm303dlhc_mag", i2c_device_create); | ||
733 | + qos_node_consumes("lsm303dlhc_mag", "i2c-bus", &opts); | ||
734 | + | ||
735 | + qos_add_test("tx-rx", "lsm303dlhc_mag", send_and_receive, NULL); | ||
736 | + qos_add_test("regwrap", "lsm303dlhc_mag", reg_wraparound, NULL); | ||
737 | +} | ||
738 | +libqos_init(lsm303dlhc_mag_register_nodes); | ||
739 | diff --git a/hw/sensor/Kconfig b/hw/sensor/Kconfig | ||
740 | index XXXXXXX..XXXXXXX 100644 | ||
741 | --- a/hw/sensor/Kconfig | ||
742 | +++ b/hw/sensor/Kconfig | ||
743 | @@ -XXX,XX +XXX,XX @@ config ADM1272 | ||
744 | config MAX34451 | ||
745 | bool | ||
746 | depends on I2C | ||
747 | + | ||
748 | +config LSM303DLHC_MAG | ||
749 | + bool | ||
750 | + depends on I2C | ||
751 | diff --git a/hw/sensor/meson.build b/hw/sensor/meson.build | ||
752 | index XXXXXXX..XXXXXXX 100644 | ||
753 | --- a/hw/sensor/meson.build | ||
754 | +++ b/hw/sensor/meson.build | ||
755 | @@ -XXX,XX +XXX,XX @@ softmmu_ss.add(when: 'CONFIG_DPS310', if_true: files('dps310.c')) | ||
756 | softmmu_ss.add(when: 'CONFIG_EMC141X', if_true: files('emc141x.c')) | ||
757 | softmmu_ss.add(when: 'CONFIG_ADM1272', if_true: files('adm1272.c')) | ||
758 | softmmu_ss.add(when: 'CONFIG_MAX34451', if_true: files('max34451.c')) | ||
759 | +softmmu_ss.add(when: 'CONFIG_LSM303DLHC_MAG', if_true: files('lsm303dlhc_mag.c')) | ||
760 | diff --git a/tests/qtest/meson.build b/tests/qtest/meson.build | ||
761 | index XXXXXXX..XXXXXXX 100644 | ||
762 | --- a/tests/qtest/meson.build | ||
763 | +++ b/tests/qtest/meson.build | ||
764 | @@ -XXX,XX +XXX,XX @@ qos_test_ss.add( | ||
765 | 'eepro100-test.c', | ||
766 | 'es1370-test.c', | ||
767 | 'ipoctal232-test.c', | ||
768 | + 'lsm303dlhc-mag-test.c', | ||
769 | 'max34451-test.c', | ||
770 | 'megasas-test.c', | ||
771 | 'ne2000-test.c', | ||
772 | -- | 210 | -- |
773 | 2.25.1 | 211 | 2.43.0 |
774 | |||
775 | diff view generated by jsdifflib |
1 | Make update_cte() take a CTEntry struct rather than all the fields | 1 | The definition of SCR_EL3.RW says that its effective value is 1 if: |
---|---|---|---|
2 | of the new CTE as separate arguments. | 2 | - EL2 is implemented and does not support AArch32, and SCR_EL3.NS is 1 |
3 | - the effective value of SCR_EL3.{EEL2,NS} is {1,0} (i.e. we are | ||
4 | Secure and Secure EL2 is disabled) | ||
3 | 5 | ||
4 | This brings it into line with the update_dte() API. | 6 | We implement the second of these in arm_el_is_aa64(), but forgot the |
7 | first. | ||
8 | |||
9 | Provide a new function arm_scr_rw_eff() to return the effective | ||
10 | value of SCR_EL3.RW, and use it in arm_el_is_aa64() and the other | ||
11 | places that currently look directly at the bit value. | ||
12 | |||
13 | (scr_write() enforces that the RW bit is RAO/WI if neither EL1 nor | ||
14 | EL2 have AArch32 support, but if EL1 does but EL2 does not then the | ||
15 | bit must still be writeable.) | ||
16 | |||
17 | This will mean that if code at EL3 attempts to perform an exception | ||
18 | return to AArch32 EL2 when EL2 is AArch64-only we will correctly | ||
19 | handle this as an illegal exception return: it will be caught by the | ||
20 | "return to an EL which is configured for a different register width" | ||
21 | check in HELPER(exception_return). | ||
22 | |||
23 | We do already have some CPU types which don't implement AArch32 | ||
24 | above EL0, so this is technically a bug; it doesn't seem worth | ||
25 | backporting to stable because no sensible guest code will be | ||
26 | deliberately attempting to set the RW bit to a value corresponding | ||
27 | to an unimplemented execution state and then checking that we | ||
28 | did the right thing. | ||
5 | 29 | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 30 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 31 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
8 | Message-id: 20220201193207.2771604-6-peter.maydell@linaro.org | ||
9 | --- | 32 | --- |
10 | hw/intc/arm_gicv3_its.c | 32 +++++++++++++++++--------------- | 33 | target/arm/internals.h | 26 +++++++++++++++++++++++--- |
11 | 1 file changed, 17 insertions(+), 15 deletions(-) | 34 | target/arm/helper.c | 4 ++-- |
35 | 2 files changed, 25 insertions(+), 5 deletions(-) | ||
12 | 36 | ||
13 | diff --git a/hw/intc/arm_gicv3_its.c b/hw/intc/arm_gicv3_its.c | 37 | diff --git a/target/arm/internals.h b/target/arm/internals.h |
14 | index XXXXXXX..XXXXXXX 100644 | 38 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/hw/intc/arm_gicv3_its.c | 39 | --- a/target/arm/internals.h |
16 | +++ b/hw/intc/arm_gicv3_its.c | 40 | +++ b/target/arm/internals.h |
17 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_mapti(GICv3ITSState *s, const uint64_t *cmdpkt, | 41 | @@ -XXX,XX +XXX,XX @@ static inline FloatRoundMode arm_rmode_to_sf(ARMFPRounding rmode) |
18 | return update_ite(s, eventid, &dte, ite) ? CMD_CONTINUE : CMD_STALL; | 42 | return arm_rmode_to_sf_map[rmode]; |
19 | } | 43 | } |
20 | 44 | ||
21 | -static bool update_cte(GICv3ITSState *s, uint16_t icid, bool valid, | 45 | +/* Return the effective value of SCR_EL3.RW */ |
22 | - uint64_t rdbase) | 46 | +static inline bool arm_scr_rw_eff(CPUARMState *env) |
23 | +/* | 47 | +{ |
24 | + * Update the Collection Table entry for @icid to @cte. Returns true | 48 | + /* |
25 | + * on success, false if there was a memory access error. | 49 | + * SCR_EL3.RW has an effective value of 1 if: |
26 | + */ | 50 | + * - we are NS and EL2 is implemented but doesn't support AArch32 |
27 | +static bool update_cte(GICv3ITSState *s, uint16_t icid, const CTEntry *cte) | 51 | + * - we are S and EL2 is enabled (in which case it must be AArch64) |
52 | + */ | ||
53 | + ARMCPU *cpu = env_archcpu(env); | ||
54 | + | ||
55 | + if (env->cp15.scr_el3 & SCR_RW) { | ||
56 | + return true; | ||
57 | + } | ||
58 | + if (env->cp15.scr_el3 & SCR_NS) { | ||
59 | + return arm_feature(env, ARM_FEATURE_EL2) && | ||
60 | + !cpu_isar_feature(aa64_aa32_el2, cpu); | ||
61 | + } else { | ||
62 | + return env->cp15.scr_el3 & SCR_EEL2; | ||
63 | + } | ||
64 | +} | ||
65 | + | ||
66 | /* Return true if the specified exception level is running in AArch64 state. */ | ||
67 | static inline bool arm_el_is_aa64(CPUARMState *env, int el) | ||
28 | { | 68 | { |
29 | AddressSpace *as = &s->gicv3->dma_as; | 69 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_el_is_aa64(CPUARMState *env, int el) |
30 | uint64_t entry_addr; | 70 | return aa64; |
31 | - uint64_t cte = 0; | ||
32 | + uint64_t cteval = 0; | ||
33 | MemTxResult res = MEMTX_OK; | ||
34 | |||
35 | if (!s->ct.valid) { | ||
36 | return true; | ||
37 | } | 71 | } |
38 | 72 | ||
39 | - if (valid) { | 73 | - if (arm_feature(env, ARM_FEATURE_EL3) && |
40 | + if (cte->valid) { | 74 | - ((env->cp15.scr_el3 & SCR_NS) || !(env->cp15.scr_el3 & SCR_EEL2))) { |
41 | /* add mapping entry to collection table */ | 75 | - aa64 = aa64 && (env->cp15.scr_el3 & SCR_RW); |
42 | - cte = FIELD_DP64(cte, CTE, VALID, 1); | 76 | + if (arm_feature(env, ARM_FEATURE_EL3)) { |
43 | - cte = FIELD_DP64(cte, CTE, RDBASE, rdbase); | 77 | + aa64 = aa64 && arm_scr_rw_eff(env); |
44 | + cteval = FIELD_DP64(cteval, CTE, VALID, 1); | ||
45 | + cteval = FIELD_DP64(cteval, CTE, RDBASE, cte->rdbase); | ||
46 | } | 78 | } |
47 | 79 | ||
48 | entry_addr = table_entry_addr(s, &s->ct, icid, &res); | 80 | if (el == 2) { |
49 | @@ -XXX,XX +XXX,XX @@ static bool update_cte(GICv3ITSState *s, uint16_t icid, bool valid, | 81 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
50 | return true; | 82 | index XXXXXXX..XXXXXXX 100644 |
51 | } | 83 | --- a/target/arm/helper.c |
52 | 84 | +++ b/target/arm/helper.c | |
53 | - address_space_stq_le(as, entry_addr, cte, MEMTXATTRS_UNSPECIFIED, &res); | 85 | @@ -XXX,XX +XXX,XX @@ uint32_t arm_phys_excp_target_el(CPUState *cs, uint32_t excp_idx, |
54 | + address_space_stq_le(as, entry_addr, cteval, MEMTXATTRS_UNSPECIFIED, &res); | 86 | uint64_t hcr_el2; |
55 | return res == MEMTX_OK; | 87 | |
56 | } | 88 | if (arm_feature(env, ARM_FEATURE_EL3)) { |
57 | 89 | - rw = ((env->cp15.scr_el3 & SCR_RW) == SCR_RW); | |
58 | static ItsCmdResult process_mapc(GICv3ITSState *s, const uint64_t *cmdpkt) | 90 | + rw = arm_scr_rw_eff(env); |
59 | { | 91 | } else { |
60 | uint16_t icid; | ||
61 | - uint64_t rdbase; | ||
62 | - bool valid; | ||
63 | + CTEntry cte; | ||
64 | |||
65 | icid = cmdpkt[2] & ICID_MASK; | ||
66 | |||
67 | - rdbase = (cmdpkt[2] & R_MAPC_RDBASE_MASK) >> R_MAPC_RDBASE_SHIFT; | ||
68 | - rdbase &= RDBASE_PROCNUM_MASK; | ||
69 | + cte.rdbase = (cmdpkt[2] & R_MAPC_RDBASE_MASK) >> R_MAPC_RDBASE_SHIFT; | ||
70 | + cte.rdbase &= RDBASE_PROCNUM_MASK; | ||
71 | |||
72 | - valid = cmdpkt[2] & CMD_FIELD_VALID_MASK; | ||
73 | + cte.valid = cmdpkt[2] & CMD_FIELD_VALID_MASK; | ||
74 | |||
75 | - if ((icid >= s->ct.num_entries) || (rdbase >= s->gicv3->num_cpu)) { | ||
76 | + if ((icid >= s->ct.num_entries) || (cte.rdbase >= s->gicv3->num_cpu)) { | ||
77 | qemu_log_mask(LOG_GUEST_ERROR, | ||
78 | "ITS MAPC: invalid collection table attributes " | ||
79 | - "icid %d rdbase %" PRIu64 "\n", icid, rdbase); | ||
80 | + "icid %d rdbase %u\n", icid, cte.rdbase); | ||
81 | /* | 92 | /* |
82 | * in this implementation, in case of error | 93 | * Either EL2 is the highest EL (and so the EL2 register width |
83 | * we ignore this command and move onto the next | 94 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_do_interrupt_aarch64(CPUState *cs) |
84 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_mapc(GICv3ITSState *s, const uint64_t *cmdpkt) | 95 | |
85 | return CMD_CONTINUE; | 96 | switch (new_el) { |
86 | } | 97 | case 3: |
87 | 98 | - is_aa64 = (env->cp15.scr_el3 & SCR_RW) != 0; | |
88 | - return update_cte(s, icid, valid, rdbase) ? CMD_CONTINUE : CMD_STALL; | 99 | + is_aa64 = arm_scr_rw_eff(env); |
89 | + return update_cte(s, icid, &cte) ? CMD_CONTINUE : CMD_STALL; | 100 | break; |
90 | } | 101 | case 2: |
91 | 102 | hcr = arm_hcr_el2_eff(env); | |
92 | /* | ||
93 | -- | 103 | -- |
94 | 2.25.1 | 104 | 2.43.0 |
95 | |||
96 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | When EL1 doesn't support AArch32, the HCR_EL2.RW bit is supposed to |
---|---|---|---|
2 | be RAO/WI. Enforce the RAO/WI behaviour. | ||
2 | 3 | ||
3 | Use the named bit rather than a bare extract32. | 4 | Note that we handle "reset value should honour RES1 bits" in the same |
5 | way that SCR_EL3 does, via a reset function. | ||
4 | 6 | ||
5 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 7 | We do already have some CPU types which don't implement AArch32 |
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 8 | above EL0, so this is technically a bug; it doesn't seem worth |
7 | Reviewed-by: Zenghui Yu <yuzenghui@huawei.com> | 9 | backporting to stable because no sensible guest code will be |
8 | Message-id: 20220127063428.30212-5-richard.henderson@linaro.org | 10 | deliberately attempting to set the RW bit to a value corresponding |
11 | to an unimplemented execution state and then checking that we | ||
12 | did the right thing. | ||
13 | |||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
15 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
10 | --- | 16 | --- |
11 | target/arm/helper.c | 2 +- | 17 | target/arm/helper.c | 12 ++++++++++++ |
12 | 1 file changed, 1 insertion(+), 1 deletion(-) | 18 | 1 file changed, 12 insertions(+) |
13 | 19 | ||
14 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 20 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
15 | index XXXXXXX..XXXXXXX 100644 | 21 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/target/arm/helper.c | 22 | --- a/target/arm/helper.c |
17 | +++ b/target/arm/helper.c | 23 | +++ b/target/arm/helper.c |
18 | @@ -XXX,XX +XXX,XX @@ int fp_exception_el(CPUARMState *env, int cur_el) | 24 | @@ -XXX,XX +XXX,XX @@ static void do_hcr_write(CPUARMState *env, uint64_t value, uint64_t valid_mask) |
19 | } | 25 | /* Clear RES0 bits. */ |
20 | 26 | value &= valid_mask; | |
21 | /* CPTR_EL3 : present in v8 */ | 27 | |
22 | - if (extract32(env->cp15.cptr_el[3], 10, 1)) { | 28 | + /* RW is RAO/WI if EL1 is AArch64 only */ |
23 | + if (env->cp15.cptr_el[3] & CPTR_TFP) { | 29 | + if (!cpu_isar_feature(aa64_aa32_el1, cpu)) { |
24 | /* Trap all FP ops to EL3 */ | 30 | + value |= HCR_RW; |
25 | return 3; | 31 | + } |
26 | } | 32 | + |
33 | /* | ||
34 | * These bits change the MMU setup: | ||
35 | * HCR_VM enables stage 2 translation | ||
36 | @@ -XXX,XX +XXX,XX @@ static void hcr_writelow(CPUARMState *env, const ARMCPRegInfo *ri, | ||
37 | do_hcr_write(env, value, MAKE_64BIT_MASK(32, 32)); | ||
38 | } | ||
39 | |||
40 | +static void hcr_reset(CPUARMState *env, const ARMCPRegInfo *ri) | ||
41 | +{ | ||
42 | + /* hcr_write will set the RES1 bits on an AArch64-only CPU */ | ||
43 | + hcr_write(env, ri, 0); | ||
44 | +} | ||
45 | + | ||
46 | /* | ||
47 | * Return the effective value of HCR_EL2, at the given security state. | ||
48 | * Bits that are not included here: | ||
49 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo el2_cp_reginfo[] = { | ||
50 | .opc0 = 3, .opc1 = 4, .crn = 1, .crm = 1, .opc2 = 0, | ||
51 | .access = PL2_RW, .fieldoffset = offsetof(CPUARMState, cp15.hcr_el2), | ||
52 | .nv2_redirect_offset = 0x78, | ||
53 | + .resetfn = hcr_reset, | ||
54 | .writefn = hcr_write, .raw_writefn = raw_write }, | ||
55 | { .name = "HCR", .state = ARM_CP_STATE_AA32, | ||
56 | .type = ARM_CP_ALIAS | ARM_CP_IO, | ||
27 | -- | 57 | -- |
28 | 2.25.1 | 58 | 2.43.0 |
29 | |||
30 | diff view generated by jsdifflib |
1 | If we're using PSCI emulation, we add a /psci node to the device tree | 1 | We already call env_archcpu() multiple times within the |
---|---|---|---|
2 | we pass to the guest. At the moment, if the dtb already has a /psci | 2 | exception_return helper function, and we're about to want to |
3 | node in it, we retain it, rather than replacing it. (This behaviour | 3 | add another use of the ARMCPU pointer. Add a local variable |
4 | was added in commit c39770cd637765 in 2018.) | 4 | cpu so we can call env_archcpu() just once. |
5 | |||
6 | This is a problem if the existing node doesn't match our PSCI | ||
7 | emulation. In particular, it might specify the wrong method (HVC vs | ||
8 | SMC), or wrong function IDs for cpu_suspend/cpu_off/etc, in which | ||
9 | case the guest will not get the behaviour it wants when it makes PSCI | ||
10 | calls. | ||
11 | |||
12 | An example of this is trying to boot the highbank or midway board | ||
13 | models using the device tree supplied in the kernel sources: this | ||
14 | device tree includes a /psci node that specifies function IDs that | ||
15 | don't match the (PSCI 0.2 compliant) IDs that QEMU uses. The dtb | ||
16 | cpu_suspend function ID happens to match the PSCI 0.2 cpu_off ID, so | ||
17 | the guest hangs after booting when the kernel tries to idle the CPU | ||
18 | and instead it gets turned off. | ||
19 | |||
20 | Instead of retaining an existing /psci node, delete it entirely | ||
21 | and replace it with a node whose properties match QEMU's PSCI | ||
22 | emulation behaviour. This matches the way we handle /memory nodes, | ||
23 | where we also delete any existing nodes and write in ones that | ||
24 | match the way QEMU is going to behave. | ||
25 | 5 | ||
26 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
27 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
28 | Reviewed-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
29 | Tested-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | ||
30 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
31 | Tested-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
32 | Message-id: 20220127154639.2090164-17-peter.maydell@linaro.org | ||
33 | --- | 8 | --- |
34 | hw/arm/boot.c | 7 ++++--- | 9 | target/arm/tcg/helper-a64.c | 7 ++++--- |
35 | 1 file changed, 4 insertions(+), 3 deletions(-) | 10 | 1 file changed, 4 insertions(+), 3 deletions(-) |
36 | 11 | ||
37 | diff --git a/hw/arm/boot.c b/hw/arm/boot.c | 12 | diff --git a/target/arm/tcg/helper-a64.c b/target/arm/tcg/helper-a64.c |
38 | index XXXXXXX..XXXXXXX 100644 | 13 | index XXXXXXX..XXXXXXX 100644 |
39 | --- a/hw/arm/boot.c | 14 | --- a/target/arm/tcg/helper-a64.c |
40 | +++ b/hw/arm/boot.c | 15 | +++ b/target/arm/tcg/helper-a64.c |
41 | @@ -XXX,XX +XXX,XX @@ static void fdt_add_psci_node(void *fdt) | 16 | @@ -XXX,XX +XXX,XX @@ static void cpsr_write_from_spsr_elx(CPUARMState *env, |
17 | |||
18 | void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc) | ||
19 | { | ||
20 | + ARMCPU *cpu = env_archcpu(env); | ||
21 | int cur_el = arm_current_el(env); | ||
22 | unsigned int spsr_idx = aarch64_banked_spsr_index(cur_el); | ||
23 | uint32_t spsr = env->banked_spsr[spsr_idx]; | ||
24 | @@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc) | ||
42 | } | 25 | } |
43 | 26 | ||
44 | /* | 27 | bql_lock(); |
45 | - * If /psci node is present in provided DTB, assume that no fixup | 28 | - arm_call_pre_el_change_hook(env_archcpu(env)); |
46 | - * is necessary and all PSCI configuration should be taken as-is | 29 | + arm_call_pre_el_change_hook(cpu); |
47 | + * A pre-existing /psci node might specify function ID values | 30 | bql_unlock(); |
48 | + * that don't match QEMU's PSCI implementation. Delete the whole | 31 | |
49 | + * node and put our own in instead. | 32 | if (!return_to_aa64) { |
50 | */ | 33 | @@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc) |
51 | rc = fdt_path_offset(fdt, "/psci"); | 34 | int tbii; |
52 | if (rc >= 0) { | 35 | |
53 | - return; | 36 | env->aarch64 = true; |
54 | + qemu_fdt_nop_node(fdt, "/psci"); | 37 | - spsr &= aarch64_pstate_valid_mask(&env_archcpu(env)->isar); |
55 | } | 38 | + spsr &= aarch64_pstate_valid_mask(&cpu->isar); |
56 | 39 | pstate_write(env, spsr); | |
57 | qemu_fdt_add_subnode(fdt, "/psci"); | 40 | if (!arm_singlestep_active(env)) { |
41 | env->pstate &= ~PSTATE_SS; | ||
42 | @@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc) | ||
43 | aarch64_sve_change_el(env, cur_el, new_el, return_to_aa64); | ||
44 | |||
45 | bql_lock(); | ||
46 | - arm_call_el_change_hook(env_archcpu(env)); | ||
47 | + arm_call_el_change_hook(cpu); | ||
48 | bql_unlock(); | ||
49 | |||
50 | return; | ||
58 | -- | 51 | -- |
59 | 2.25.1 | 52 | 2.43.0 |
60 | |||
61 | diff view generated by jsdifflib |
1 | Currently we expect board code to set the psci-conduit property on | 1 | In the Arm ARM, rule R_TYTWB states that returning to AArch32 |
---|---|---|---|
2 | CPUs and ensure that secondary CPUs are created with the | 2 | is an illegal exception return if: |
3 | start-powered-off property set to false, if the board wishes to use | 3 | * AArch32 is not supported at any exception level |
4 | QEMU's builtin PSCI emulation. This worked OK for the virt board | 4 | * the target EL is configured for AArch64 via SCR_EL3.RW |
5 | where we first wanted to use it, because the virt board directly | 5 | or HCR_EL2.RW or via CPU state at reset |
6 | creates its CPUs and is in a reasonable position to set those | ||
7 | properties. For other boards which model real hardware and use a | ||
8 | separate SoC object, however, it is more awkward. Most PSCI-using | ||
9 | boards just set the psci-conduit board unconditionally. | ||
10 | 6 | ||
11 | This was never strictly speaking correct (because you would not be | 7 | We check the second of these, but not the first (which can only be |
12 | able to run EL3 guest firmware that itself provided the PSCI | 8 | relevant for the case of a return to EL0, because if AArch32 is not |
13 | interface, as the QEMU implementation would overrule it), but mostly | 9 | supported at one of the higher ELs then the RW bits will have an |
14 | worked in practice because for non-PSCI SMC calls QEMU would emulate | 10 | effective value of 1 and the the "configured for AArch64" condition |
15 | the SMC instruction as normal (by trapping to guest EL3). However, | 11 | will hold also). |
16 | we would like to make our PSCI emulation follow the part of the SMCC | ||
17 | specification that mandates that SMC calls with unknown function | ||
18 | identifiers return a failure code, which means that all SMC calls | ||
19 | will be handled by the PSCI code and the "emulate as normal" path | ||
20 | will no longer be taken. | ||
21 | 12 | ||
22 | We tried to implement that in commit 9fcd15b9193e81 | 13 | Add the missing condition. Although this is technically a bug |
23 | ("arm: tcg: Adhere to SMCCC 1.3 section 5.2"), but this | 14 | (because we have one AArch64-only CPU: a64fx) it isn't worth |
24 | regressed attempts to run EL3 guest code on the affected boards: | 15 | backporting to stable because no sensible guest code will |
25 | * mcimx6ul-evk, mcimx7d-sabre, orangepi, xlnx-zcu102 | 16 | deliberately try to return to a nonexistent execution state |
26 | * for the case only of EL3 code loaded via -kernel (and | 17 | to check that it gets an illegal exception return. |
27 | not via -bios or -pflash), virt and xlnx-versal-virt | ||
28 | so for the 7.0 release we reverted it (in commit 4825eaae4fdd56f). | ||
29 | |||
30 | This commit provides a mechanism that boards can use to arrange that | ||
31 | psci-conduit is set if running guest code at a low enough EL but not | ||
32 | if it would be running at the same EL that the conduit implies that | ||
33 | the QEMU PSCI implementation is using. (Later commits will convert | ||
34 | individual board models to use this mechanism.) | ||
35 | |||
36 | We do this by moving the setting of the psci-conduit and | ||
37 | start-powered-off properties to arm_load_kernel(). Boards which want | ||
38 | to potentially use emulated PSCI must set a psci_conduit field in the | ||
39 | arm_boot_info struct to the type of conduit they want to use (SMC or | ||
40 | HVC); arm_load_kernel() will then set the CPUs up accordingly if it | ||
41 | is not going to start the guest code at the same or higher EL as the | ||
42 | fake QEMU firmware would be at. | ||
43 | |||
44 | Board/SoC code which uses this mechanism should no longer set the CPU | ||
45 | psci-conduit property directly. It should only set the | ||
46 | start-powered-off property for secondaries if EL3 guest firmware | ||
47 | running bare metal expects that rather than the alternative "all CPUs | ||
48 | start executing the firmware at once". | ||
49 | |||
50 | Note that when calculating whether we are going to run guest | ||
51 | code at EL3, we ignore the setting of arm_boot_info::secure_board_setup, | ||
52 | which might cause us to run a stub bit of guest code at EL3 which | ||
53 | does some board-specific setup before dropping to EL2 or EL1 to | ||
54 | run the guest kernel. This is OK because only one board that | ||
55 | enables PSCI sets secure_board_setup (the highbank board), and | ||
56 | the stub code it writes will behave the same way whether the | ||
57 | one SMC call it makes is handled by "emulate the SMC" or by | ||
58 | "PSCI default returns an error code". So we can leave that stub | ||
59 | code in place until after we've changed the PSCI default behaviour; | ||
60 | at that point we will remove it. | ||
61 | 18 | ||
62 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 19 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
63 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 20 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
64 | Tested-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | ||
65 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
66 | Message-id: 20220127154639.2090164-4-peter.maydell@linaro.org | ||
67 | --- | 21 | --- |
68 | include/hw/arm/boot.h | 10 +++++++++ | 22 | target/arm/tcg/helper-a64.c | 5 +++++ |
69 | hw/arm/boot.c | 50 +++++++++++++++++++++++++++++++++++++++++++ | 23 | 1 file changed, 5 insertions(+) |
70 | 2 files changed, 60 insertions(+) | ||
71 | 24 | ||
72 | diff --git a/include/hw/arm/boot.h b/include/hw/arm/boot.h | 25 | diff --git a/target/arm/tcg/helper-a64.c b/target/arm/tcg/helper-a64.c |
73 | index XXXXXXX..XXXXXXX 100644 | 26 | index XXXXXXX..XXXXXXX 100644 |
74 | --- a/include/hw/arm/boot.h | 27 | --- a/target/arm/tcg/helper-a64.c |
75 | +++ b/include/hw/arm/boot.h | 28 | +++ b/target/arm/tcg/helper-a64.c |
76 | @@ -XXX,XX +XXX,XX @@ struct arm_boot_info { | 29 | @@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc) |
77 | * the user it should implement this hook. | 30 | goto illegal_return; |
78 | */ | ||
79 | void (*modify_dtb)(const struct arm_boot_info *info, void *fdt); | ||
80 | + /* | ||
81 | + * If a board wants to use the QEMU emulated-firmware PSCI support, | ||
82 | + * it should set this to QEMU_PSCI_CONDUIT_HVC or QEMU_PSCI_CONDUIT_SMC | ||
83 | + * as appropriate. arm_load_kernel() will set the psci-conduit and | ||
84 | + * start-powered-off properties on the CPUs accordingly. | ||
85 | + * Note that if the guest image is started at the same exception level | ||
86 | + * as the conduit specifies calls should go to (eg guest firmware booted | ||
87 | + * to EL3) then PSCI will not be enabled. | ||
88 | + */ | ||
89 | + int psci_conduit; | ||
90 | /* Used internally by arm_boot.c */ | ||
91 | int is_linux; | ||
92 | hwaddr initrd_start; | ||
93 | diff --git a/hw/arm/boot.c b/hw/arm/boot.c | ||
94 | index XXXXXXX..XXXXXXX 100644 | ||
95 | --- a/hw/arm/boot.c | ||
96 | +++ b/hw/arm/boot.c | ||
97 | @@ -XXX,XX +XXX,XX @@ void arm_load_kernel(ARMCPU *cpu, MachineState *ms, struct arm_boot_info *info) | ||
98 | { | ||
99 | CPUState *cs; | ||
100 | AddressSpace *as = arm_boot_address_space(cpu, info); | ||
101 | + int boot_el; | ||
102 | + CPUARMState *env = &cpu->env; | ||
103 | |||
104 | /* | ||
105 | * CPU objects (unlike devices) are not automatically reset on system | ||
106 | @@ -XXX,XX +XXX,XX @@ void arm_load_kernel(ARMCPU *cpu, MachineState *ms, struct arm_boot_info *info) | ||
107 | arm_setup_direct_kernel_boot(cpu, info); | ||
108 | } | 31 | } |
109 | 32 | ||
110 | + /* | 33 | + if (!return_to_aa64 && !cpu_isar_feature(aa64_aa32, cpu)) { |
111 | + * Disable the PSCI conduit if it is set up to target the same | 34 | + /* Return to AArch32 when CPU is AArch64-only */ |
112 | + * or a lower EL than the one we're going to start the guest code in. | 35 | + goto illegal_return; |
113 | + * This logic needs to agree with the code in do_cpu_reset() which | ||
114 | + * decides whether we're going to boot the guest in the highest | ||
115 | + * supported exception level or in a lower one. | ||
116 | + */ | ||
117 | + | ||
118 | + /* Boot into highest supported EL ... */ | ||
119 | + if (arm_feature(env, ARM_FEATURE_EL3)) { | ||
120 | + boot_el = 3; | ||
121 | + } else if (arm_feature(env, ARM_FEATURE_EL2)) { | ||
122 | + boot_el = 2; | ||
123 | + } else { | ||
124 | + boot_el = 1; | ||
125 | + } | ||
126 | + /* ...except that if we're booting Linux we adjust the EL we boot into */ | ||
127 | + if (info->is_linux && !info->secure_boot) { | ||
128 | + boot_el = arm_feature(env, ARM_FEATURE_EL2) ? 2 : 1; | ||
129 | + } | 36 | + } |
130 | + | 37 | + |
131 | + if ((info->psci_conduit == QEMU_PSCI_CONDUIT_HVC && boot_el >= 2) || | 38 | if (new_el == 1 && (arm_hcr_el2_eff(env) & HCR_TGE)) { |
132 | + (info->psci_conduit == QEMU_PSCI_CONDUIT_SMC && boot_el == 3)) { | 39 | goto illegal_return; |
133 | + info->psci_conduit = QEMU_PSCI_CONDUIT_DISABLED; | 40 | } |
134 | + } | ||
135 | + | ||
136 | + if (info->psci_conduit != QEMU_PSCI_CONDUIT_DISABLED) { | ||
137 | + for (cs = first_cpu; cs; cs = CPU_NEXT(cs)) { | ||
138 | + Object *cpuobj = OBJECT(cs); | ||
139 | + | ||
140 | + object_property_set_int(cpuobj, "psci-conduit", info->psci_conduit, | ||
141 | + &error_abort); | ||
142 | + /* | ||
143 | + * Secondary CPUs start in PSCI powered-down state. Like the | ||
144 | + * code in do_cpu_reset(), we assume first_cpu is the primary | ||
145 | + * CPU. | ||
146 | + */ | ||
147 | + if (cs != first_cpu) { | ||
148 | + object_property_set_bool(cpuobj, "start-powered-off", true, | ||
149 | + &error_abort); | ||
150 | + } | ||
151 | + } | ||
152 | + } | ||
153 | + | ||
154 | + /* | ||
155 | + * arm_load_dtb() may add a PSCI node so it must be called after we have | ||
156 | + * decided whether to enable PSCI and set the psci-conduit CPU properties. | ||
157 | + */ | ||
158 | if (!info->skip_dtb_autoload && have_dtb(info)) { | ||
159 | if (arm_load_dtb(info->dtb_start, info, info->dtb_limit, as, ms) < 0) { | ||
160 | exit(1); | ||
161 | -- | 41 | -- |
162 | 2.25.1 | 42 | 2.43.0 |
163 | |||
164 | diff view generated by jsdifflib |
1 | When handling MAPI/MAPTI, we allow the supplied interrupt ID to be | 1 | I'm down as the only listed maintainer for quite a lot of Arm SoC and |
---|---|---|---|
2 | either 1023 or something in the valid LPI range. This is a mistake: | 2 | board types. In some cases this is only as the "maintainer of last |
3 | only a real valid LPI is allowed. (The general behaviour of the ITS | 3 | resort" and I'm not in practice doing anything beyond patch review |
4 | is that most interrupt ID fields require a value in the LPI range; | 4 | and the odd bit of tidyup. |
5 | the exception is that fields specifying a doorbell value, which are | 5 | |
6 | all in GICv4 commands, allow also 1023 to mean "no doorbell".) | 6 | Move these entries in MAINTAINERS from "Maintained" to "Odd Fixes", |
7 | Remove the condition that incorrectly allows 1023 here. | 7 | to better represent reality. Entries for other boards and SoCs where |
8 | I do more actively care (or where there is a listed co-maintainer) | ||
9 | remain as they are. | ||
8 | 10 | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 12 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> |
11 | Message-id: 20220201193207.2771604-13-peter.maydell@linaro.org | 13 | Message-id: 20250307152838.3226398-1-peter.maydell@linaro.org |
12 | --- | 14 | --- |
13 | hw/intc/arm_gicv3_its.c | 3 +-- | 15 | MAINTAINERS | 14 +++++++------- |
14 | 1 file changed, 1 insertion(+), 2 deletions(-) | 16 | 1 file changed, 7 insertions(+), 7 deletions(-) |
15 | 17 | ||
16 | diff --git a/hw/intc/arm_gicv3_its.c b/hw/intc/arm_gicv3_its.c | 18 | diff --git a/MAINTAINERS b/MAINTAINERS |
17 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/hw/intc/arm_gicv3_its.c | 20 | --- a/MAINTAINERS |
19 | +++ b/hw/intc/arm_gicv3_its.c | 21 | +++ b/MAINTAINERS |
20 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_mapti(GICv3ITSState *s, const uint64_t *cmdpkt, | 22 | @@ -XXX,XX +XXX,XX @@ F: docs/system/arm/kzm.rst |
21 | 23 | Integrator CP | |
22 | if ((icid >= s->ct.num_entries) | 24 | M: Peter Maydell <peter.maydell@linaro.org> |
23 | || !dte.valid || (eventid >= num_eventids) || | 25 | L: qemu-arm@nongnu.org |
24 | - (((pIntid < GICV3_LPI_INTID_START) || (pIntid >= num_intids)) && | 26 | -S: Maintained |
25 | - (pIntid != INTID_SPURIOUS))) { | 27 | +S: Odd Fixes |
26 | + (((pIntid < GICV3_LPI_INTID_START) || (pIntid >= num_intids)))) { | 28 | F: hw/arm/integratorcp.c |
27 | qemu_log_mask(LOG_GUEST_ERROR, | 29 | F: hw/misc/arm_integrator_debug.c |
28 | "%s: invalid command attributes " | 30 | F: include/hw/misc/arm_integrator_debug.h |
29 | "icid %d or eventid %d or pIntid %d or" | 31 | @@ -XXX,XX +XXX,XX @@ F: docs/system/arm/mps2.rst |
32 | Musca | ||
33 | M: Peter Maydell <peter.maydell@linaro.org> | ||
34 | L: qemu-arm@nongnu.org | ||
35 | -S: Maintained | ||
36 | +S: Odd Fixes | ||
37 | F: hw/arm/musca.c | ||
38 | F: docs/system/arm/musca.rst | ||
39 | |||
40 | @@ -XXX,XX +XXX,XX @@ F: tests/functional/test_aarch64_raspi4.py | ||
41 | Real View | ||
42 | M: Peter Maydell <peter.maydell@linaro.org> | ||
43 | L: qemu-arm@nongnu.org | ||
44 | -S: Maintained | ||
45 | +S: Odd Fixes | ||
46 | F: hw/arm/realview* | ||
47 | F: hw/cpu/realview_mpcore.c | ||
48 | F: hw/intc/realview_gic.c | ||
49 | @@ -XXX,XX +XXX,XX @@ F: tests/functional/test_arm_collie.py | ||
50 | Stellaris | ||
51 | M: Peter Maydell <peter.maydell@linaro.org> | ||
52 | L: qemu-arm@nongnu.org | ||
53 | -S: Maintained | ||
54 | +S: Odd Fixes | ||
55 | F: hw/*/stellaris* | ||
56 | F: hw/display/ssd03* | ||
57 | F: include/hw/input/gamepad.h | ||
58 | @@ -XXX,XX +XXX,XX @@ F: docs/system/arm/stm32.rst | ||
59 | Versatile Express | ||
60 | M: Peter Maydell <peter.maydell@linaro.org> | ||
61 | L: qemu-arm@nongnu.org | ||
62 | -S: Maintained | ||
63 | +S: Odd Fixes | ||
64 | F: hw/arm/vexpress.c | ||
65 | F: hw/display/sii9022.c | ||
66 | F: docs/system/arm/vexpress.rst | ||
67 | @@ -XXX,XX +XXX,XX @@ F: tests/functional/test_arm_vexpress.py | ||
68 | Versatile PB | ||
69 | M: Peter Maydell <peter.maydell@linaro.org> | ||
70 | L: qemu-arm@nongnu.org | ||
71 | -S: Maintained | ||
72 | +S: Odd Fixes | ||
73 | F: hw/*/versatile* | ||
74 | F: hw/i2c/arm_sbcon_i2c.c | ||
75 | F: include/hw/i2c/arm_sbcon_i2c.h | ||
76 | @@ -XXX,XX +XXX,XX @@ F: include/hw/hyperv/vmbus*.h | ||
77 | OMAP | ||
78 | M: Peter Maydell <peter.maydell@linaro.org> | ||
79 | L: qemu-arm@nongnu.org | ||
80 | -S: Maintained | ||
81 | +S: Odd Fixes | ||
82 | F: hw/*/omap* | ||
83 | F: include/hw/arm/omap.h | ||
84 | F: docs/system/arm/sx1.rst | ||
30 | -- | 85 | -- |
31 | 2.25.1 | 86 | 2.43.0 |
32 | 87 | ||
33 | 88 | diff view generated by jsdifflib |
1 | From: Eric Auger <eric.auger@redhat.com> | 1 | From: Paolo Bonzini <pbonzini@redhat.com> |
---|---|---|---|
2 | 2 | ||
3 | We currently miss a bunch of register resets in the device reset | 3 | The guest does not control whether characters are sent on the UART. |
4 | function. This sometimes prevents the guest from rebooting after | 4 | Sending them before the guest happens to boot will now result in a |
5 | a system_reset (with virtio-blk-pci). For instance, we may get | 5 | "guest error" log entry that is only because of timing, even if the |
6 | the following errors: | 6 | guest _would_ later setup the receiver correctly. |
7 | 7 | ||
8 | invalid STE | 8 | This reverts the bulk of commit abf2b6a028670bd2890bb3aee7e103fe53e4b0df, |
9 | smmuv3-iommu-memory-region-0-0 translation failed for iova=0x13a9d2000(SMMU_EVT_C_BAD_STE) | 9 | and instead adds a comment about why we don't check the enable bits. |
10 | Invalid read at addr 0x13A9D2000, size 2, region '(null)', reason: rejected | ||
11 | invalid STE | ||
12 | smmuv3-iommu-memory-region-0-0 translation failed for iova=0x13a9d2000(SMMU_EVT_C_BAD_STE) | ||
13 | Invalid write at addr 0x13A9D2000, size 2, region '(null)', reason: rejected | ||
14 | invalid STE | ||
15 | 10 | ||
16 | Signed-off-by: Eric Auger <eric.auger@redhat.com> | 11 | Cc: Philippe Mathieu-Daudé <philmd@linaro.org> |
17 | Message-id: 20220202111602.627429-1-eric.auger@redhat.com | 12 | Cc: Peter Maydell <peter.maydell@linaro.org> |
18 | Fixes: 10a83cb988 ("hw/arm/smmuv3: Skeleton") | 13 | Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> |
14 | Message-id: 20250311153717.206129-1-pbonzini@redhat.com | ||
15 | [PMM: expanded comment] | ||
19 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 16 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
20 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 17 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
21 | --- | 18 | --- |
22 | hw/arm/smmuv3.c | 6 ++++++ | 19 | hw/char/pl011.c | 19 ++++++++++--------- |
23 | 1 file changed, 6 insertions(+) | 20 | 1 file changed, 10 insertions(+), 9 deletions(-) |
24 | 21 | ||
25 | diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c | 22 | diff --git a/hw/char/pl011.c b/hw/char/pl011.c |
26 | index XXXXXXX..XXXXXXX 100644 | 23 | index XXXXXXX..XXXXXXX 100644 |
27 | --- a/hw/arm/smmuv3.c | 24 | --- a/hw/char/pl011.c |
28 | +++ b/hw/arm/smmuv3.c | 25 | +++ b/hw/char/pl011.c |
29 | @@ -XXX,XX +XXX,XX @@ static void smmuv3_init_regs(SMMUv3State *s) | 26 | @@ -XXX,XX +XXX,XX @@ static int pl011_can_receive(void *opaque) |
30 | s->features = 0; | 27 | unsigned fifo_depth = pl011_get_fifo_depth(s); |
31 | s->sid_split = 0; | 28 | unsigned fifo_available = fifo_depth - s->read_count; |
32 | s->aidr = 0x1; | 29 | |
33 | + s->cr[0] = 0; | 30 | - if (!(s->cr & CR_UARTEN)) { |
34 | + s->cr0ack = 0; | 31 | - qemu_log_mask(LOG_GUEST_ERROR, |
35 | + s->irq_ctrl = 0; | 32 | - "PL011 receiving data on disabled UART\n"); |
36 | + s->gerror = 0; | 33 | - } |
37 | + s->gerrorn = 0; | 34 | - if (!(s->cr & CR_RXE)) { |
38 | + s->statusr = 0; | 35 | - qemu_log_mask(LOG_GUEST_ERROR, |
36 | - "PL011 receiving data on disabled RX UART\n"); | ||
37 | - } | ||
38 | - trace_pl011_can_receive(s->lcr, s->read_count, fifo_depth, fifo_available); | ||
39 | + /* | ||
40 | + * In theory we should check the UART and RX enable bits here and | ||
41 | + * return 0 if they are not set (so the guest can't receive data | ||
42 | + * until you have enabled the UART). In practice we suspect there | ||
43 | + * is at least some guest code out there which has been tested only | ||
44 | + * on QEMU and which never bothers to enable the UART because we | ||
45 | + * historically never enforced that. So we effectively keep the | ||
46 | + * UART continuously enabled regardless of the enable bits. | ||
47 | + */ | ||
48 | |||
49 | + trace_pl011_can_receive(s->lcr, s->read_count, fifo_depth, fifo_available); | ||
50 | return fifo_available; | ||
39 | } | 51 | } |
40 | 52 | ||
41 | static int smmu_get_ste(SMMUv3State *s, dma_addr_t addr, STE *buf, | ||
42 | -- | 53 | -- |
43 | 2.25.1 | 54 | 2.43.0 |
44 | 55 | ||
45 | 56 | diff view generated by jsdifflib |
1 | From: Francisco Iglesias <francisco.iglesias@xilinx.com> | 1 | From: Joe Komlodi <komlodi@google.com> |
---|---|---|---|
2 | 2 | ||
3 | 'Or' the IRQs coming from the QSPI and QSPI DMA models. This is done for | 3 | On ARM hosts with CTR_EL0.DIC and CTR_EL0.IDC set, this would only cause |
4 | avoiding the situation where one of the models incorrectly deasserts an | 4 | an ISB to be executed during cache maintenance, which could lead to QEMU |
5 | interrupt asserted from the other model (which will result in that the IRQ | 5 | executing TBs containing garbage instructions. |
6 | is lost and will not reach guest SW). | ||
7 | 6 | ||
8 | Signed-off-by: Francisco Iglesias <francisco.iglesias@xilinx.com> | 7 | This seems to be because the ISB finishes executing instructions and |
9 | Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org> | 8 | flushes the pipeline, but the ISB doesn't guarantee that writes from the |
10 | Reviewed-by: Luc Michel <luc@lmichel.fr> | 9 | executed instructions are committed. If a small enough TB is created, it's |
11 | Message-id: 20220203151742.1457-1-francisco.iglesias@xilinx.com | 10 | possible that the writes setting up the TB aren't committed by the time the |
11 | TB is executed. | ||
12 | |||
13 | This function is intended to be a port of the gcc implementation | ||
14 | (https://github.com/gcc-mirror/gcc/blob/85b46d0795ac76bc192cb8f88b646a647acf98c1/libgcc/config/aarch64/sync-cache.c#L67) | ||
15 | which makes the first DSB unconditional, so we can fix the synchronization | ||
16 | issue by doing that as well. | ||
17 | |||
18 | Cc: qemu-stable@nongnu.org | ||
19 | Fixes: 664a79735e4deb1 ("util: Specialize flush_idcache_range for aarch64") | ||
20 | Signed-off-by: Joe Komlodi <komlodi@google.com> | ||
21 | Message-id: 20250310203622.1827940-2-komlodi@google.com | ||
22 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
23 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 24 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
13 | --- | 25 | --- |
14 | include/hw/arm/xlnx-zynqmp.h | 2 ++ | 26 | util/cacheflush.c | 4 +++- |
15 | hw/arm/xlnx-zynqmp.c | 14 ++++++++++++-- | 27 | 1 file changed, 3 insertions(+), 1 deletion(-) |
16 | 2 files changed, 14 insertions(+), 2 deletions(-) | ||
17 | 28 | ||
18 | diff --git a/include/hw/arm/xlnx-zynqmp.h b/include/hw/arm/xlnx-zynqmp.h | 29 | diff --git a/util/cacheflush.c b/util/cacheflush.c |
19 | index XXXXXXX..XXXXXXX 100644 | 30 | index XXXXXXX..XXXXXXX 100644 |
20 | --- a/include/hw/arm/xlnx-zynqmp.h | 31 | --- a/util/cacheflush.c |
21 | +++ b/include/hw/arm/xlnx-zynqmp.h | 32 | +++ b/util/cacheflush.c |
22 | @@ -XXX,XX +XXX,XX @@ | 33 | @@ -XXX,XX +XXX,XX @@ void flush_idcache_range(uintptr_t rx, uintptr_t rw, size_t len) |
23 | #include "hw/dma/xlnx_csu_dma.h" | 34 | for (p = rw & -dcache_lsize; p < rw + len; p += dcache_lsize) { |
24 | #include "hw/nvram/xlnx-bbram.h" | 35 | asm volatile("dc\tcvau, %0" : : "r" (p) : "memory"); |
25 | #include "hw/nvram/xlnx-zynqmp-efuse.h" | 36 | } |
26 | +#include "hw/or-irq.h" | 37 | - asm volatile("dsb\tish" : : : "memory"); |
27 | |||
28 | #define TYPE_XLNX_ZYNQMP "xlnx-zynqmp" | ||
29 | OBJECT_DECLARE_SIMPLE_TYPE(XlnxZynqMPState, XLNX_ZYNQMP) | ||
30 | @@ -XXX,XX +XXX,XX @@ struct XlnxZynqMPState { | ||
31 | XlnxZDMA gdma[XLNX_ZYNQMP_NUM_GDMA_CH]; | ||
32 | XlnxZDMA adma[XLNX_ZYNQMP_NUM_ADMA_CH]; | ||
33 | XlnxCSUDMA qspi_dma; | ||
34 | + qemu_or_irq qspi_irq_orgate; | ||
35 | |||
36 | char *boot_cpu; | ||
37 | ARMCPU *boot_cpu_ptr; | ||
38 | diff --git a/hw/arm/xlnx-zynqmp.c b/hw/arm/xlnx-zynqmp.c | ||
39 | index XXXXXXX..XXXXXXX 100644 | ||
40 | --- a/hw/arm/xlnx-zynqmp.c | ||
41 | +++ b/hw/arm/xlnx-zynqmp.c | ||
42 | @@ -XXX,XX +XXX,XX @@ | ||
43 | #define LQSPI_ADDR 0xc0000000 | ||
44 | #define QSPI_IRQ 15 | ||
45 | #define QSPI_DMA_ADDR 0xff0f0800 | ||
46 | +#define NUM_QSPI_IRQ_LINES 2 | ||
47 | |||
48 | #define DP_ADDR 0xfd4a0000 | ||
49 | #define DP_IRQ 113 | ||
50 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_init(Object *obj) | ||
51 | } | 38 | } |
52 | 39 | ||
53 | object_initialize_child(obj, "qspi-dma", &s->qspi_dma, TYPE_XLNX_CSU_DMA); | 40 | + /* DSB unconditionally to ensure any outstanding writes are committed. */ |
54 | + object_initialize_child(obj, "qspi-irq-orgate", | 41 | + asm volatile("dsb\tish" : : : "memory"); |
55 | + &s->qspi_irq_orgate, TYPE_OR_IRQ); | ||
56 | } | ||
57 | |||
58 | static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) | ||
59 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) | ||
60 | gic_spi[adma_ch_intr[i]]); | ||
61 | } | ||
62 | |||
63 | + object_property_set_int(OBJECT(&s->qspi_irq_orgate), | ||
64 | + "num-lines", NUM_QSPI_IRQ_LINES, &error_fatal); | ||
65 | + qdev_realize(DEVICE(&s->qspi_irq_orgate), NULL, &error_fatal); | ||
66 | + qdev_connect_gpio_out(DEVICE(&s->qspi_irq_orgate), 0, gic_spi[QSPI_IRQ]); | ||
67 | + | 42 | + |
68 | if (!object_property_set_link(OBJECT(&s->qspi_dma), "dma", | 43 | /* |
69 | OBJECT(system_memory), errp)) { | 44 | * If CTR_EL0.DIC is enabled, Instruction cache cleaning to the Point |
70 | return; | 45 | * of Unification is not required for instruction to data coherence. |
71 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) | ||
72 | } | ||
73 | |||
74 | sysbus_mmio_map(SYS_BUS_DEVICE(&s->qspi_dma), 0, QSPI_DMA_ADDR); | ||
75 | - sysbus_connect_irq(SYS_BUS_DEVICE(&s->qspi_dma), 0, gic_spi[QSPI_IRQ]); | ||
76 | + sysbus_connect_irq(SYS_BUS_DEVICE(&s->qspi_dma), 0, | ||
77 | + qdev_get_gpio_in(DEVICE(&s->qspi_irq_orgate), 0)); | ||
78 | |||
79 | if (!object_property_set_link(OBJECT(&s->qspi), "stream-connected-dma", | ||
80 | OBJECT(&s->qspi_dma), errp)) { | ||
81 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) | ||
82 | } | ||
83 | sysbus_mmio_map(SYS_BUS_DEVICE(&s->qspi), 0, QSPI_ADDR); | ||
84 | sysbus_mmio_map(SYS_BUS_DEVICE(&s->qspi), 1, LQSPI_ADDR); | ||
85 | - sysbus_connect_irq(SYS_BUS_DEVICE(&s->qspi), 0, gic_spi[QSPI_IRQ]); | ||
86 | + sysbus_connect_irq(SYS_BUS_DEVICE(&s->qspi), 0, | ||
87 | + qdev_get_gpio_in(DEVICE(&s->qspi_irq_orgate), 1)); | ||
88 | |||
89 | for (i = 0; i < XLNX_ZYNQMP_NUM_QSPI_BUS; i++) { | ||
90 | g_autofree gchar *bus_name = g_strdup_printf("qspi%d", i); | ||
91 | -- | 46 | -- |
92 | 2.25.1 | 47 | 2.43.0 |
93 | |||
94 | diff view generated by jsdifflib |
1 | The SMCCC 1.3 spec section 5.2 says | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | The Unknown SMC Function Identifier is a sign-extended value of (-1) | 3 | The check for fp_excp_el in assert_fp_access_checked is |
4 | that is returned in the R0, W0 or X0 registers. An implementation must | 4 | incorrect. For SME, with StreamingMode enabled, the access |
5 | return this error code when it receives: | 5 | is really against the streaming mode vectors, and access |
6 | to the normal fp registers is allowed to be disabled. | ||
7 | C.f. sme_enabled_check. | ||
6 | 8 | ||
7 | * An SMC or HVC call with an unknown Function Identifier | 9 | Convert sve_access_checked to match, even though we don't |
8 | * An SMC or HVC call for a removed Function Identifier | 10 | currently check the exception state. |
9 | * An SMC64/HVC64 call from AArch32 state | ||
10 | 11 | ||
11 | To comply with these statements, let's always return -1 when we encounter | 12 | Cc: qemu-stable@nongnu.org |
12 | an unknown HVC or SMC call. | 13 | Fixes: 3d74825f4d6 ("target/arm: Add SME enablement checks") |
13 | 14 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | |
14 | [PMM: | 15 | Message-id: 20250307190415.982049-2-richard.henderson@linaro.org |
15 | This is a reinstatement of commit 9fcd15b9193e819b, previously | ||
16 | reverted in commit 4825eaae4fdd56fba0f; we can do this now that we | ||
17 | have arranged for all the affected board models to not enable the | ||
18 | PSCI emulation if they are running guest code at EL3. This avoids | ||
19 | the regressions that caused us to revert the change for 7.0.] | ||
20 | |||
21 | Signed-off-by: Alexander Graf <agraf@csgraf.de> | ||
22 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
23 | Reviewed-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
24 | Tested-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | ||
25 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
26 | Tested-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
27 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 16 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
28 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 17 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
29 | --- | 18 | --- |
30 | target/arm/psci.c | 35 ++++++----------------------------- | 19 | target/arm/tcg/translate-a64.h | 2 +- |
31 | 1 file changed, 6 insertions(+), 29 deletions(-) | 20 | target/arm/tcg/translate.h | 10 +++++++--- |
21 | target/arm/tcg/translate-a64.c | 17 +++++++++-------- | ||
22 | 3 files changed, 17 insertions(+), 12 deletions(-) | ||
32 | 23 | ||
33 | diff --git a/target/arm/psci.c b/target/arm/psci.c | 24 | diff --git a/target/arm/tcg/translate-a64.h b/target/arm/tcg/translate-a64.h |
34 | index XXXXXXX..XXXXXXX 100644 | 25 | index XXXXXXX..XXXXXXX 100644 |
35 | --- a/target/arm/psci.c | 26 | --- a/target/arm/tcg/translate-a64.h |
36 | +++ b/target/arm/psci.c | 27 | +++ b/target/arm/tcg/translate-a64.h |
37 | @@ -XXX,XX +XXX,XX @@ | 28 | @@ -XXX,XX +XXX,XX @@ TCGv_i64 gen_mte_checkN(DisasContext *s, TCGv_i64 addr, bool is_write, |
38 | 29 | static inline void assert_fp_access_checked(DisasContext *s) | |
39 | bool arm_is_psci_call(ARMCPU *cpu, int excp_type) | ||
40 | { | 30 | { |
41 | - /* Return true if the r0/x0 value indicates a PSCI call and | 31 | #ifdef CONFIG_DEBUG_TCG |
42 | - * the exception type matches the configured PSCI conduit. This is | 32 | - if (unlikely(!s->fp_access_checked || s->fp_excp_el)) { |
43 | - * called before the SMC/HVC instruction is executed, to decide whether | 33 | + if (unlikely(s->fp_access_checked <= 0)) { |
44 | - * we should treat it as a PSCI call or with the architecturally | 34 | fprintf(stderr, "target-arm: FP access check missing for " |
35 | "instruction 0x%08x\n", s->insn); | ||
36 | abort(); | ||
37 | diff --git a/target/arm/tcg/translate.h b/target/arm/tcg/translate.h | ||
38 | index XXXXXXX..XXXXXXX 100644 | ||
39 | --- a/target/arm/tcg/translate.h | ||
40 | +++ b/target/arm/tcg/translate.h | ||
41 | @@ -XXX,XX +XXX,XX @@ typedef struct DisasContext { | ||
42 | bool aarch64; | ||
43 | bool thumb; | ||
44 | bool lse2; | ||
45 | - /* Because unallocated encodings generate different exception syndrome | ||
45 | + /* | 46 | + /* |
46 | + * Return true if the exception type matches the configured PSCI conduit. | 47 | + * Because unallocated encodings generate different exception syndrome |
47 | + * This is called before the SMC/HVC instruction is executed, to decide | 48 | * information from traps due to FP being disabled, we can't do a single |
48 | + * whether we should treat it as a PSCI call or with the architecturally | 49 | * "is fp access disabled" check at a high level in the decode tree. |
49 | * defined behaviour for an SMC or HVC (which might be UNDEF or trap | 50 | * To help in catching bugs where the access check was forgotten in some |
50 | * to EL2 or to EL3). | 51 | * code path, we set this flag when the access check is done, and assert |
52 | * that it is set at the point where we actually touch the FP regs. | ||
53 | + * 0: not checked, | ||
54 | + * 1: checked, access ok | ||
55 | + * -1: checked, access denied | ||
51 | */ | 56 | */ |
52 | - CPUARMState *env = &cpu->env; | 57 | - bool fp_access_checked; |
53 | - uint64_t param = is_a64(env) ? env->xregs[0] : env->regs[0]; | 58 | - bool sve_access_checked; |
54 | 59 | + int8_t fp_access_checked; | |
55 | switch (excp_type) { | 60 | + int8_t sve_access_checked; |
56 | case EXCP_HVC: | 61 | /* ARMv8 single-step state (this is distinct from the QEMU gdbstub |
57 | @@ -XXX,XX +XXX,XX @@ bool arm_is_psci_call(ARMCPU *cpu, int excp_type) | 62 | * single-step support). |
63 | */ | ||
64 | diff --git a/target/arm/tcg/translate-a64.c b/target/arm/tcg/translate-a64.c | ||
65 | index XXXXXXX..XXXXXXX 100644 | ||
66 | --- a/target/arm/tcg/translate-a64.c | ||
67 | +++ b/target/arm/tcg/translate-a64.c | ||
68 | @@ -XXX,XX +XXX,XX @@ static bool fp_access_check_only(DisasContext *s) | ||
69 | { | ||
70 | if (s->fp_excp_el) { | ||
71 | assert(!s->fp_access_checked); | ||
72 | - s->fp_access_checked = true; | ||
73 | + s->fp_access_checked = -1; | ||
74 | |||
75 | gen_exception_insn_el(s, 0, EXCP_UDEF, | ||
76 | syn_fp_access_trap(1, 0xe, false, 0), | ||
77 | s->fp_excp_el); | ||
58 | return false; | 78 | return false; |
59 | } | 79 | } |
60 | 80 | - s->fp_access_checked = true; | |
61 | - switch (param) { | 81 | + s->fp_access_checked = 1; |
62 | - case QEMU_PSCI_0_2_FN_PSCI_VERSION: | 82 | return true; |
63 | - case QEMU_PSCI_0_2_FN_MIGRATE_INFO_TYPE: | ||
64 | - case QEMU_PSCI_0_2_FN_AFFINITY_INFO: | ||
65 | - case QEMU_PSCI_0_2_FN64_AFFINITY_INFO: | ||
66 | - case QEMU_PSCI_0_2_FN_SYSTEM_RESET: | ||
67 | - case QEMU_PSCI_0_2_FN_SYSTEM_OFF: | ||
68 | - case QEMU_PSCI_0_1_FN_CPU_ON: | ||
69 | - case QEMU_PSCI_0_2_FN_CPU_ON: | ||
70 | - case QEMU_PSCI_0_2_FN64_CPU_ON: | ||
71 | - case QEMU_PSCI_0_1_FN_CPU_OFF: | ||
72 | - case QEMU_PSCI_0_2_FN_CPU_OFF: | ||
73 | - case QEMU_PSCI_0_1_FN_CPU_SUSPEND: | ||
74 | - case QEMU_PSCI_0_2_FN_CPU_SUSPEND: | ||
75 | - case QEMU_PSCI_0_2_FN64_CPU_SUSPEND: | ||
76 | - case QEMU_PSCI_0_1_FN_MIGRATE: | ||
77 | - case QEMU_PSCI_0_2_FN_MIGRATE: | ||
78 | - return true; | ||
79 | - default: | ||
80 | - return false; | ||
81 | - } | ||
82 | + return true; | ||
83 | } | 83 | } |
84 | 84 | ||
85 | void arm_handle_psci_call(ARMCPU *cpu) | 85 | @@ -XXX,XX +XXX,XX @@ bool sve_access_check(DisasContext *s) |
86 | @@ -XXX,XX +XXX,XX @@ void arm_handle_psci_call(ARMCPU *cpu) | 86 | syn_sve_access_trap(), s->sve_excp_el); |
87 | break; | 87 | goto fail_exit; |
88 | case QEMU_PSCI_0_1_FN_MIGRATE: | ||
89 | case QEMU_PSCI_0_2_FN_MIGRATE: | ||
90 | + default: | ||
91 | ret = QEMU_PSCI_RET_NOT_SUPPORTED; | ||
92 | break; | ||
93 | - default: | ||
94 | - g_assert_not_reached(); | ||
95 | } | 88 | } |
96 | 89 | - s->sve_access_checked = true; | |
97 | err: | 90 | + s->sve_access_checked = 1; |
91 | return fp_access_check(s); | ||
92 | |||
93 | fail_exit: | ||
94 | /* Assert that we only raise one exception per instruction. */ | ||
95 | assert(!s->sve_access_checked); | ||
96 | - s->sve_access_checked = true; | ||
97 | + s->sve_access_checked = -1; | ||
98 | return false; | ||
99 | } | ||
100 | |||
101 | @@ -XXX,XX +XXX,XX @@ bool sme_enabled_check(DisasContext *s) | ||
102 | * sme_excp_el by itself for cpregs access checks. | ||
103 | */ | ||
104 | if (!s->fp_excp_el || s->sme_excp_el < s->fp_excp_el) { | ||
105 | - s->fp_access_checked = true; | ||
106 | - return sme_access_check(s); | ||
107 | + bool ret = sme_access_check(s); | ||
108 | + s->fp_access_checked = (ret ? 1 : -1); | ||
109 | + return ret; | ||
110 | } | ||
111 | return fp_access_check_only(s); | ||
112 | } | ||
113 | @@ -XXX,XX +XXX,XX @@ static void aarch64_tr_translate_insn(DisasContextBase *dcbase, CPUState *cpu) | ||
114 | s->insn = insn; | ||
115 | s->base.pc_next = pc + 4; | ||
116 | |||
117 | - s->fp_access_checked = false; | ||
118 | - s->sve_access_checked = false; | ||
119 | + s->fp_access_checked = 0; | ||
120 | + s->sve_access_checked = 0; | ||
121 | |||
122 | if (s->pstate_il) { | ||
123 | /* | ||
98 | -- | 124 | -- |
99 | 2.25.1 | 125 | 2.43.0 |
100 | |||
101 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | When HCR_EL2.E2H is set, the format of CPTR_EL2 changes to | 3 | In StreamingMode, fp_access_checked is handled already. |
4 | look more like CPACR_EL1, with ZEN and FPEN fields instead | 4 | We cannot fall through to fp_access_check lest we fall |
5 | of TZ and TFP fields. | 5 | foul of the double-check assertion. |
6 | 6 | ||
7 | Reported-by: Zenghui Yu <yuzenghui@huawei.com> | 7 | Cc: qemu-stable@nongnu.org |
8 | Fixes: 285b1d5fcef ("target/arm: Handle SME in sve_access_check") | ||
8 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 9 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
10 | Message-id: 20250307190415.982049-3-richard.henderson@linaro.org | ||
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
10 | Message-id: 20220127063428.30212-4-richard.henderson@linaro.org | 12 | [PMM: move declaration of 'ret' to top of block] |
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | --- | 14 | --- |
13 | target/arm/helper.c | 77 +++++++++++++++++++++++++++++++++++---------- | 15 | target/arm/tcg/translate-a64.c | 22 +++++++++++----------- |
14 | 1 file changed, 60 insertions(+), 17 deletions(-) | 16 | 1 file changed, 11 insertions(+), 11 deletions(-) |
15 | 17 | ||
16 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 18 | diff --git a/target/arm/tcg/translate-a64.c b/target/arm/tcg/translate-a64.c |
17 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/target/arm/helper.c | 20 | --- a/target/arm/tcg/translate-a64.c |
19 | +++ b/target/arm/helper.c | 21 | +++ b/target/arm/tcg/translate-a64.c |
20 | @@ -XXX,XX +XXX,XX @@ int sve_exception_el(CPUARMState *env, int el) | 22 | @@ -XXX,XX +XXX,XX @@ static int fp_access_check_vector_hsd(DisasContext *s, bool is_q, MemOp esz) |
21 | } | 23 | bool sve_access_check(DisasContext *s) |
24 | { | ||
25 | if (s->pstate_sm || !dc_isar_feature(aa64_sve, s)) { | ||
26 | + bool ret; | ||
27 | + | ||
28 | assert(dc_isar_feature(aa64_sme, s)); | ||
29 | - if (!sme_sm_enabled_check(s)) { | ||
30 | - goto fail_exit; | ||
31 | - } | ||
32 | - } else if (s->sve_excp_el) { | ||
33 | + ret = sme_sm_enabled_check(s); | ||
34 | + s->sve_access_checked = (ret ? 1 : -1); | ||
35 | + return ret; | ||
36 | + } | ||
37 | + if (s->sve_excp_el) { | ||
38 | + /* Assert that we only raise one exception per instruction. */ | ||
39 | + assert(!s->sve_access_checked); | ||
40 | gen_exception_insn_el(s, 0, EXCP_UDEF, | ||
41 | syn_sve_access_trap(), s->sve_excp_el); | ||
42 | - goto fail_exit; | ||
43 | + s->sve_access_checked = -1; | ||
44 | + return false; | ||
22 | } | 45 | } |
23 | 46 | s->sve_access_checked = 1; | |
24 | - /* CPTR_EL2. Since TZ and TFP are positive, | 47 | return fp_access_check(s); |
25 | - * they will be zero when EL2 is not present. | ||
26 | + /* | ||
27 | + * CPTR_EL2 changes format with HCR_EL2.E2H (regardless of TGE). | ||
28 | */ | ||
29 | - if (el <= 2 && arm_is_el2_enabled(env)) { | ||
30 | - if (env->cp15.cptr_el[2] & CPTR_TZ) { | ||
31 | - return 2; | ||
32 | - } | ||
33 | - if (env->cp15.cptr_el[2] & CPTR_TFP) { | ||
34 | - return 0; | ||
35 | + if (el <= 2) { | ||
36 | + if (hcr_el2 & HCR_E2H) { | ||
37 | + /* Check CPTR_EL2.ZEN. */ | ||
38 | + switch (extract32(env->cp15.cptr_el[2], 16, 2)) { | ||
39 | + case 1: | ||
40 | + if (el != 0 || !(hcr_el2 & HCR_TGE)) { | ||
41 | + break; | ||
42 | + } | ||
43 | + /* fall through */ | ||
44 | + case 0: | ||
45 | + case 2: | ||
46 | + return 2; | ||
47 | + } | ||
48 | + | ||
49 | + /* Check CPTR_EL2.FPEN. */ | ||
50 | + switch (extract32(env->cp15.cptr_el[2], 20, 2)) { | ||
51 | + case 1: | ||
52 | + if (el == 2 || !(hcr_el2 & HCR_TGE)) { | ||
53 | + break; | ||
54 | + } | ||
55 | + /* fall through */ | ||
56 | + case 0: | ||
57 | + case 2: | ||
58 | + return 0; | ||
59 | + } | ||
60 | + } else if (arm_is_el2_enabled(env)) { | ||
61 | + if (env->cp15.cptr_el[2] & CPTR_TZ) { | ||
62 | + return 2; | ||
63 | + } | ||
64 | + if (env->cp15.cptr_el[2] & CPTR_TFP) { | ||
65 | + return 0; | ||
66 | + } | ||
67 | } | ||
68 | } | ||
69 | |||
70 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(crc32c)(uint32_t acc, uint32_t val, uint32_t bytes) | ||
71 | int fp_exception_el(CPUARMState *env, int cur_el) | ||
72 | { | ||
73 | #ifndef CONFIG_USER_ONLY | ||
74 | + uint64_t hcr_el2; | ||
75 | + | ||
76 | /* CPACR and the CPTR registers don't exist before v6, so FP is | ||
77 | * always accessible | ||
78 | */ | ||
79 | @@ -XXX,XX +XXX,XX @@ int fp_exception_el(CPUARMState *env, int cur_el) | ||
80 | return 0; | ||
81 | } | ||
82 | |||
83 | + hcr_el2 = arm_hcr_el2_eff(env); | ||
84 | + | ||
85 | /* The CPACR controls traps to EL1, or PL1 if we're 32 bit: | ||
86 | * 0, 2 : trap EL0 and EL1/PL1 accesses | ||
87 | * 1 : trap only EL0 accesses | ||
88 | * 3 : trap no accesses | ||
89 | * This register is ignored if E2H+TGE are both set. | ||
90 | */ | ||
91 | - if ((arm_hcr_el2_eff(env) & (HCR_E2H | HCR_TGE)) != (HCR_E2H | HCR_TGE)) { | ||
92 | + if ((hcr_el2 & (HCR_E2H | HCR_TGE)) != (HCR_E2H | HCR_TGE)) { | ||
93 | int fpen = extract32(env->cp15.cpacr_el1, 20, 2); | ||
94 | |||
95 | switch (fpen) { | ||
96 | @@ -XXX,XX +XXX,XX @@ int fp_exception_el(CPUARMState *env, int cur_el) | ||
97 | } | ||
98 | } | ||
99 | |||
100 | - /* For the CPTR registers we don't need to guard with an ARM_FEATURE | ||
101 | - * check because zero bits in the registers mean "don't trap". | ||
102 | + /* | ||
103 | + * CPTR_EL2 is present in v7VE or v8, and changes format | ||
104 | + * with HCR_EL2.E2H (regardless of TGE). | ||
105 | */ | ||
106 | - | 48 | - |
107 | - /* CPTR_EL2 : present in v7VE or v8 */ | 49 | - fail_exit: |
108 | - if (cur_el <= 2 && extract32(env->cp15.cptr_el[2], 10, 1) | 50 | - /* Assert that we only raise one exception per instruction. */ |
109 | - && arm_is_el2_enabled(env)) { | 51 | - assert(!s->sve_access_checked); |
110 | - /* Trap FP ops at EL2, NS-EL1 or NS-EL0 to EL2 */ | 52 | - s->sve_access_checked = -1; |
111 | - return 2; | 53 | - return false; |
112 | + if (cur_el <= 2) { | 54 | } |
113 | + if (hcr_el2 & HCR_E2H) { | 55 | |
114 | + /* Check CPTR_EL2.FPEN. */ | 56 | /* |
115 | + switch (extract32(env->cp15.cptr_el[2], 20, 2)) { | ||
116 | + case 1: | ||
117 | + if (cur_el != 0 || !(hcr_el2 & HCR_TGE)) { | ||
118 | + break; | ||
119 | + } | ||
120 | + /* fall through */ | ||
121 | + case 0: | ||
122 | + case 2: | ||
123 | + return 2; | ||
124 | + } | ||
125 | + } else if (arm_is_el2_enabled(env)) { | ||
126 | + if (env->cp15.cptr_el[2] & CPTR_TFP) { | ||
127 | + return 2; | ||
128 | + } | ||
129 | + } | ||
130 | } | ||
131 | |||
132 | /* CPTR_EL3 : present in v8 */ | ||
133 | -- | 57 | -- |
134 | 2.25.1 | 58 | 2.43.0 |
135 | |||
136 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | We want to allow the psci-conduit property to be set after realize, | ||
2 | because the parts of the code which are best placed to decide if it's | ||
3 | OK to enable QEMU's builtin PSCI emulation (the board code and the | ||
4 | arm_load_kernel() function are distant from the code which creates | ||
5 | and realizes CPUs (typically inside an SoC object's init and realize | ||
6 | method) and run afterwards. | ||
7 | 1 | ||
8 | Since the DEFINE_PROP_* macros don't have support for creating | ||
9 | properties which can be changed after realize, change the property to | ||
10 | be created with object_property_add_uint32_ptr(), which is what we | ||
11 | already use in this function for creating settable-after-realize | ||
12 | properties like init-svtor and init-nsvtor. | ||
13 | |||
14 | Note that it doesn't conceptually make sense to change the setting of | ||
15 | the property after the machine has been completely initialized, | ||
16 | beacuse this would mean that the behaviour of the machine when first | ||
17 | started would differ from its behaviour when the system is | ||
18 | subsequently reset. (It would also require the underlying state to | ||
19 | be migrated, which we don't do.) | ||
20 | |||
21 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
22 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
23 | Tested-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | ||
24 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
25 | Message-id: 20220127154639.2090164-2-peter.maydell@linaro.org | ||
26 | --- | ||
27 | target/arm/cpu.c | 6 +++++- | ||
28 | 1 file changed, 5 insertions(+), 1 deletion(-) | ||
29 | |||
30 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | ||
31 | index XXXXXXX..XXXXXXX 100644 | ||
32 | --- a/target/arm/cpu.c | ||
33 | +++ b/target/arm/cpu.c | ||
34 | @@ -XXX,XX +XXX,XX @@ void arm_cpu_post_init(Object *obj) | ||
35 | OBJ_PROP_FLAG_READWRITE); | ||
36 | } | ||
37 | |||
38 | + /* Not DEFINE_PROP_UINT32: we want this to be settable after realize */ | ||
39 | + object_property_add_uint32_ptr(obj, "psci-conduit", | ||
40 | + &cpu->psci_conduit, | ||
41 | + OBJ_PROP_FLAG_READWRITE); | ||
42 | + | ||
43 | qdev_property_add_static(DEVICE(obj), &arm_cpu_cfgend_property); | ||
44 | |||
45 | if (arm_feature(&cpu->env, ARM_FEATURE_GENERIC_TIMER)) { | ||
46 | @@ -XXX,XX +XXX,XX @@ static ObjectClass *arm_cpu_class_by_name(const char *cpu_model) | ||
47 | } | ||
48 | |||
49 | static Property arm_cpu_properties[] = { | ||
50 | - DEFINE_PROP_UINT32("psci-conduit", ARMCPU, psci_conduit, 0), | ||
51 | DEFINE_PROP_UINT64("midr", ARMCPU, midr, 0), | ||
52 | DEFINE_PROP_UINT64("mp-affinity", ARMCPU, | ||
53 | mp_affinity, ARM64_AFFINITY_INVALID), | ||
54 | -- | ||
55 | 2.25.1 | ||
56 | |||
57 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | The CPU object's start-powered-off property is currently only | ||
2 | settable before the CPU object is realized. For arm machines this is | ||
3 | awkward, because we would like to decide whether the CPU should be | ||
4 | powered-off based on how we are booting the guest code, which is | ||
5 | something done in the machine model code and in common code called by | ||
6 | the machine model, which runs much later and in completely different | ||
7 | parts of the codebase from the SoC object code that is responsible | ||
8 | for creating and realizing the CPU objects. | ||
9 | 1 | ||
10 | Allow start-powered-off to be set after realize. Since this isn't | ||
11 | something that's supported by the DEFINE_PROP_* macros, we have to | ||
12 | switch the property definition to use the | ||
13 | object_class_property_add_bool() function. | ||
14 | |||
15 | Note that it doesn't conceptually make sense to change the setting of | ||
16 | the property after the machine has been completely initialized, | ||
17 | beacuse this would mean that the behaviour of the machine when first | ||
18 | started would differ from its behaviour when the system is | ||
19 | subsequently reset. (It would also require the underlying state to | ||
20 | be migrated, which we don't do.) | ||
21 | |||
22 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
23 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
24 | Tested-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | ||
25 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
26 | Message-id: 20220127154639.2090164-3-peter.maydell@linaro.org | ||
27 | --- | ||
28 | cpu.c | 22 +++++++++++++++++++++- | ||
29 | 1 file changed, 21 insertions(+), 1 deletion(-) | ||
30 | |||
31 | diff --git a/cpu.c b/cpu.c | ||
32 | index XXXXXXX..XXXXXXX 100644 | ||
33 | --- a/cpu.c | ||
34 | +++ b/cpu.c | ||
35 | @@ -XXX,XX +XXX,XX @@ static Property cpu_common_props[] = { | ||
36 | DEFINE_PROP_LINK("memory", CPUState, memory, TYPE_MEMORY_REGION, | ||
37 | MemoryRegion *), | ||
38 | #endif | ||
39 | - DEFINE_PROP_BOOL("start-powered-off", CPUState, start_powered_off, false), | ||
40 | DEFINE_PROP_END_OF_LIST(), | ||
41 | }; | ||
42 | |||
43 | +static bool cpu_get_start_powered_off(Object *obj, Error **errp) | ||
44 | +{ | ||
45 | + CPUState *cpu = CPU(obj); | ||
46 | + return cpu->start_powered_off; | ||
47 | +} | ||
48 | + | ||
49 | +static void cpu_set_start_powered_off(Object *obj, bool value, Error **errp) | ||
50 | +{ | ||
51 | + CPUState *cpu = CPU(obj); | ||
52 | + cpu->start_powered_off = value; | ||
53 | +} | ||
54 | + | ||
55 | void cpu_class_init_props(DeviceClass *dc) | ||
56 | { | ||
57 | + ObjectClass *oc = OBJECT_CLASS(dc); | ||
58 | + | ||
59 | device_class_set_props(dc, cpu_common_props); | ||
60 | + /* | ||
61 | + * We can't use DEFINE_PROP_BOOL in the Property array for this | ||
62 | + * property, because we want this to be settable after realize. | ||
63 | + */ | ||
64 | + object_class_property_add_bool(oc, "start-powered-off", | ||
65 | + cpu_get_start_powered_off, | ||
66 | + cpu_set_start_powered_off); | ||
67 | } | ||
68 | |||
69 | void cpu_exec_initfn(CPUState *cpu) | ||
70 | -- | ||
71 | 2.25.1 | ||
72 | |||
73 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Change the iMX-SoC based boards to use the new boot.c functionality | ||
2 | to allow us to enable psci-conduit only if the guest is being booted | ||
3 | in EL1 or EL2, so that if the user runs guest EL3 firmware code our | ||
4 | PSCI emulation doesn't get in its way. | ||
5 | 1 | ||
6 | To do this we stop setting the psci-conduit property on the CPU | ||
7 | objects in the SoC code, and instead set the psci_conduit field in | ||
8 | the arm_boot_info struct to tell the common boot loader code that | ||
9 | we'd like PSCI if the guest is starting at an EL that it makes | ||
10 | sense with. | ||
11 | |||
12 | This affects the mcimx6ul-evk and mcimx7d-sabre boards. | ||
13 | |||
14 | Note that for the mcimx7d board, this means that when running guest | ||
15 | code at EL3 there is currently no way to power on the secondary CPUs, | ||
16 | because we do not currently have a model of the system reset | ||
17 | controller module which should be used to do that for the imx7 SoC, | ||
18 | only for the imx6 SoC. (Previously EL3 code which knew it was | ||
19 | running on QEMU could use a PSCI call to do this.) This doesn't | ||
20 | affect the imx6ul-evk board because it is uniprocessor. | ||
21 | |||
22 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
23 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
24 | Tested-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | ||
25 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
26 | Acked-by: Richard Henderson <richard.henderson@linaro.org> | ||
27 | Message-id: 20220127154639.2090164-5-peter.maydell@linaro.org | ||
28 | --- | ||
29 | hw/arm/fsl-imx6ul.c | 2 -- | ||
30 | hw/arm/fsl-imx7.c | 8 ++++---- | ||
31 | hw/arm/mcimx6ul-evk.c | 1 + | ||
32 | hw/arm/mcimx7d-sabre.c | 1 + | ||
33 | 4 files changed, 6 insertions(+), 6 deletions(-) | ||
34 | |||
35 | diff --git a/hw/arm/fsl-imx6ul.c b/hw/arm/fsl-imx6ul.c | ||
36 | index XXXXXXX..XXXXXXX 100644 | ||
37 | --- a/hw/arm/fsl-imx6ul.c | ||
38 | +++ b/hw/arm/fsl-imx6ul.c | ||
39 | @@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_realize(DeviceState *dev, Error **errp) | ||
40 | return; | ||
41 | } | ||
42 | |||
43 | - object_property_set_int(OBJECT(&s->cpu), "psci-conduit", | ||
44 | - QEMU_PSCI_CONDUIT_SMC, &error_abort); | ||
45 | qdev_realize(DEVICE(&s->cpu), NULL, &error_abort); | ||
46 | |||
47 | /* | ||
48 | diff --git a/hw/arm/fsl-imx7.c b/hw/arm/fsl-imx7.c | ||
49 | index XXXXXXX..XXXXXXX 100644 | ||
50 | --- a/hw/arm/fsl-imx7.c | ||
51 | +++ b/hw/arm/fsl-imx7.c | ||
52 | @@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp) | ||
53 | for (i = 0; i < smp_cpus; i++) { | ||
54 | o = OBJECT(&s->cpu[i]); | ||
55 | |||
56 | - object_property_set_int(o, "psci-conduit", QEMU_PSCI_CONDUIT_SMC, | ||
57 | - &error_abort); | ||
58 | - | ||
59 | /* On uniprocessor, the CBAR is set to 0 */ | ||
60 | if (smp_cpus > 1) { | ||
61 | object_property_set_int(o, "reset-cbar", FSL_IMX7_A7MPCORE_ADDR, | ||
62 | @@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp) | ||
63 | } | ||
64 | |||
65 | if (i) { | ||
66 | - /* Secondary CPUs start in PSCI powered-down state */ | ||
67 | + /* | ||
68 | + * Secondary CPUs start in powered-down state (and can be | ||
69 | + * powered up via the SRC system reset controller) | ||
70 | + */ | ||
71 | object_property_set_bool(o, "start-powered-off", true, | ||
72 | &error_abort); | ||
73 | } | ||
74 | diff --git a/hw/arm/mcimx6ul-evk.c b/hw/arm/mcimx6ul-evk.c | ||
75 | index XXXXXXX..XXXXXXX 100644 | ||
76 | --- a/hw/arm/mcimx6ul-evk.c | ||
77 | +++ b/hw/arm/mcimx6ul-evk.c | ||
78 | @@ -XXX,XX +XXX,XX @@ static void mcimx6ul_evk_init(MachineState *machine) | ||
79 | .board_id = -1, | ||
80 | .ram_size = machine->ram_size, | ||
81 | .nb_cpus = machine->smp.cpus, | ||
82 | + .psci_conduit = QEMU_PSCI_CONDUIT_SMC, | ||
83 | }; | ||
84 | |||
85 | s = FSL_IMX6UL(object_new(TYPE_FSL_IMX6UL)); | ||
86 | diff --git a/hw/arm/mcimx7d-sabre.c b/hw/arm/mcimx7d-sabre.c | ||
87 | index XXXXXXX..XXXXXXX 100644 | ||
88 | --- a/hw/arm/mcimx7d-sabre.c | ||
89 | +++ b/hw/arm/mcimx7d-sabre.c | ||
90 | @@ -XXX,XX +XXX,XX @@ static void mcimx7d_sabre_init(MachineState *machine) | ||
91 | .board_id = -1, | ||
92 | .ram_size = machine->ram_size, | ||
93 | .nb_cpus = machine->smp.cpus, | ||
94 | + .psci_conduit = QEMU_PSCI_CONDUIT_SMC, | ||
95 | }; | ||
96 | |||
97 | s = FSL_IMX7(object_new(TYPE_FSL_IMX7)); | ||
98 | -- | ||
99 | 2.25.1 | ||
100 | |||
101 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Change the allwinner-h3 based board to use the new boot.c | ||
2 | functionality to allow us to enable psci-conduit only if the guest is | ||
3 | being booted in EL1 or EL2, so that if the user runs guest EL3 | ||
4 | firmware code our PSCI emulation doesn't get in its way. | ||
5 | 1 | ||
6 | To do this we stop setting the psci-conduit property on the CPU | ||
7 | objects in the SoC code, and instead set the psci_conduit field in | ||
8 | the arm_boot_info struct to tell the common boot loader code that | ||
9 | we'd like PSCI if the guest is starting at an EL that it makes sense | ||
10 | with. | ||
11 | |||
12 | This affects the orangepi-pc board. | ||
13 | |||
14 | This commit leaves the secondary CPUs in the powered-down state if | ||
15 | the guest is booting at EL3, which is the same behaviour as before | ||
16 | this commit. The secondaries can no longer be started by that EL3 | ||
17 | code making a PSCI call but can still be started via the CPU | ||
18 | Configuration Module registers (which we model in | ||
19 | hw/misc/allwinner-cpucfg.c). | ||
20 | |||
21 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
22 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
23 | Reviewed-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
24 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
25 | Tested-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
26 | Message-id: 20220127154639.2090164-6-peter.maydell@linaro.org | ||
27 | --- | ||
28 | hw/arm/allwinner-h3.c | 9 ++++----- | ||
29 | hw/arm/orangepi.c | 1 + | ||
30 | 2 files changed, 5 insertions(+), 5 deletions(-) | ||
31 | |||
32 | diff --git a/hw/arm/allwinner-h3.c b/hw/arm/allwinner-h3.c | ||
33 | index XXXXXXX..XXXXXXX 100644 | ||
34 | --- a/hw/arm/allwinner-h3.c | ||
35 | +++ b/hw/arm/allwinner-h3.c | ||
36 | @@ -XXX,XX +XXX,XX @@ static void allwinner_h3_realize(DeviceState *dev, Error **errp) | ||
37 | /* CPUs */ | ||
38 | for (i = 0; i < AW_H3_NUM_CPUS; i++) { | ||
39 | |||
40 | - /* Provide Power State Coordination Interface */ | ||
41 | - qdev_prop_set_int32(DEVICE(&s->cpus[i]), "psci-conduit", | ||
42 | - QEMU_PSCI_CONDUIT_SMC); | ||
43 | - | ||
44 | - /* Disable secondary CPUs */ | ||
45 | + /* | ||
46 | + * Disable secondary CPUs. Guest EL3 firmware will start | ||
47 | + * them via CPU reset control registers. | ||
48 | + */ | ||
49 | qdev_prop_set_bit(DEVICE(&s->cpus[i]), "start-powered-off", | ||
50 | i > 0); | ||
51 | |||
52 | diff --git a/hw/arm/orangepi.c b/hw/arm/orangepi.c | ||
53 | index XXXXXXX..XXXXXXX 100644 | ||
54 | --- a/hw/arm/orangepi.c | ||
55 | +++ b/hw/arm/orangepi.c | ||
56 | @@ -XXX,XX +XXX,XX @@ static void orangepi_init(MachineState *machine) | ||
57 | } | ||
58 | orangepi_binfo.loader_start = h3->memmap[AW_H3_DEV_SDRAM]; | ||
59 | orangepi_binfo.ram_size = machine->ram_size; | ||
60 | + orangepi_binfo.psci_conduit = QEMU_PSCI_CONDUIT_SMC; | ||
61 | arm_load_kernel(ARM_CPU(first_cpu), machine, &orangepi_binfo); | ||
62 | } | ||
63 | |||
64 | -- | ||
65 | 2.25.1 | ||
66 | |||
67 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Change the Xilinx ZynqMP-based board xlnx-zcu102 to use the new | ||
2 | boot.c functionality to allow us to enable psci-conduit only if | ||
3 | the guest is being booted in EL1 or EL2, so that if the user runs | ||
4 | guest EL3 firmware code our PSCI emulation doesn't get in its | ||
5 | way. | ||
6 | 1 | ||
7 | To do this we stop setting the psci-conduit property on the CPU | ||
8 | objects in the SoC code, and instead set the psci_conduit field in | ||
9 | the arm_boot_info struct to tell the common boot loader code that | ||
10 | we'd like PSCI if the guest is starting at an EL that it makes | ||
11 | sense with. | ||
12 | |||
13 | Note that this means that EL3 guest code will have no way | ||
14 | to power on secondary cores, because we don't model any | ||
15 | kind of power controller that does that on this SoC. | ||
16 | |||
17 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
18 | Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | ||
19 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
20 | Reviewed-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
21 | Tested-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | ||
22 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
23 | Tested-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
24 | Acked-by: Richard Henderson <richard.henderson@linaro.org> | ||
25 | Message-id: 20220127154639.2090164-7-peter.maydell@linaro.org | ||
26 | --- | ||
27 | hw/arm/xlnx-zcu102.c | 1 + | ||
28 | hw/arm/xlnx-zynqmp.c | 11 ++++++----- | ||
29 | 2 files changed, 7 insertions(+), 5 deletions(-) | ||
30 | |||
31 | diff --git a/hw/arm/xlnx-zcu102.c b/hw/arm/xlnx-zcu102.c | ||
32 | index XXXXXXX..XXXXXXX 100644 | ||
33 | --- a/hw/arm/xlnx-zcu102.c | ||
34 | +++ b/hw/arm/xlnx-zcu102.c | ||
35 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zcu102_init(MachineState *machine) | ||
36 | s->binfo.ram_size = ram_size; | ||
37 | s->binfo.loader_start = 0; | ||
38 | s->binfo.modify_dtb = zcu102_modify_dtb; | ||
39 | + s->binfo.psci_conduit = QEMU_PSCI_CONDUIT_SMC; | ||
40 | arm_load_kernel(s->soc.boot_cpu_ptr, machine, &s->binfo); | ||
41 | } | ||
42 | |||
43 | diff --git a/hw/arm/xlnx-zynqmp.c b/hw/arm/xlnx-zynqmp.c | ||
44 | index XXXXXXX..XXXXXXX 100644 | ||
45 | --- a/hw/arm/xlnx-zynqmp.c | ||
46 | +++ b/hw/arm/xlnx-zynqmp.c | ||
47 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_create_rpu(MachineState *ms, XlnxZynqMPState *s, | ||
48 | |||
49 | name = object_get_canonical_path_component(OBJECT(&s->rpu_cpu[i])); | ||
50 | if (strcmp(name, boot_cpu)) { | ||
51 | - /* Secondary CPUs start in PSCI powered-down state */ | ||
52 | + /* | ||
53 | + * Secondary CPUs start in powered-down state. | ||
54 | + */ | ||
55 | object_property_set_bool(OBJECT(&s->rpu_cpu[i]), | ||
56 | "start-powered-off", true, &error_abort); | ||
57 | } else { | ||
58 | @@ -XXX,XX +XXX,XX @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp) | ||
59 | for (i = 0; i < num_apus; i++) { | ||
60 | const char *name; | ||
61 | |||
62 | - object_property_set_int(OBJECT(&s->apu_cpu[i]), "psci-conduit", | ||
63 | - QEMU_PSCI_CONDUIT_SMC, &error_abort); | ||
64 | - | ||
65 | name = object_get_canonical_path_component(OBJECT(&s->apu_cpu[i])); | ||
66 | if (strcmp(name, boot_cpu)) { | ||
67 | - /* Secondary CPUs start in PSCI powered-down state */ | ||
68 | + /* | ||
69 | + * Secondary CPUs start in powered-down state. | ||
70 | + */ | ||
71 | object_property_set_bool(OBJECT(&s->apu_cpu[i]), | ||
72 | "start-powered-off", true, &error_abort); | ||
73 | } else { | ||
74 | -- | ||
75 | 2.25.1 | ||
76 | |||
77 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Instead of setting the CPU psci-conduit and start-powered-off | ||
2 | properties in the xlnx-versal-virt board code, set the arm_boot_info | ||
3 | psci_conduit field so that the boot.c code can do it. | ||
4 | 1 | ||
5 | This will fix a corner case where we were incorrectly enabling PSCI | ||
6 | emulation when booting guest code into EL3 because it was an ELF file | ||
7 | passed to -kernel. (EL3 guest code started via -bios, -pflash, or | ||
8 | the generic loader was already being run with PSCI emulation | ||
9 | disabled.) | ||
10 | |||
11 | Note that EL3 guest code has no way to turn on the secondary CPUs | ||
12 | because there's no emulated power controller, but this was already | ||
13 | true for EL3 guest code run via -bios, -pflash, or the generic | ||
14 | loader. | ||
15 | |||
16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
17 | Reviewed-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | ||
18 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
19 | Reviewed-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
20 | Tested-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | ||
21 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
22 | Tested-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
23 | Message-id: 20220127154639.2090164-8-peter.maydell@linaro.org | ||
24 | --- | ||
25 | include/hw/arm/xlnx-versal.h | 1 - | ||
26 | hw/arm/xlnx-versal-virt.c | 6 ++++-- | ||
27 | hw/arm/xlnx-versal.c | 5 +---- | ||
28 | 3 files changed, 5 insertions(+), 7 deletions(-) | ||
29 | |||
30 | diff --git a/include/hw/arm/xlnx-versal.h b/include/hw/arm/xlnx-versal.h | ||
31 | index XXXXXXX..XXXXXXX 100644 | ||
32 | --- a/include/hw/arm/xlnx-versal.h | ||
33 | +++ b/include/hw/arm/xlnx-versal.h | ||
34 | @@ -XXX,XX +XXX,XX @@ struct Versal { | ||
35 | |||
36 | struct { | ||
37 | MemoryRegion *mr_ddr; | ||
38 | - uint32_t psci_conduit; | ||
39 | } cfg; | ||
40 | }; | ||
41 | |||
42 | diff --git a/hw/arm/xlnx-versal-virt.c b/hw/arm/xlnx-versal-virt.c | ||
43 | index XXXXXXX..XXXXXXX 100644 | ||
44 | --- a/hw/arm/xlnx-versal-virt.c | ||
45 | +++ b/hw/arm/xlnx-versal-virt.c | ||
46 | @@ -XXX,XX +XXX,XX @@ static void versal_virt_init(MachineState *machine) | ||
47 | * When loading an OS, we turn on QEMU's PSCI implementation with SMC | ||
48 | * as the PSCI conduit. When there's no -kernel, we assume the user | ||
49 | * provides EL3 firmware to handle PSCI. | ||
50 | + * | ||
51 | + * Even if the user provides a kernel filename, arm_load_kernel() | ||
52 | + * may suppress PSCI if it's going to boot that guest code at EL3. | ||
53 | */ | ||
54 | if (machine->kernel_filename) { | ||
55 | psci_conduit = QEMU_PSCI_CONDUIT_SMC; | ||
56 | @@ -XXX,XX +XXX,XX @@ static void versal_virt_init(MachineState *machine) | ||
57 | TYPE_XLNX_VERSAL); | ||
58 | object_property_set_link(OBJECT(&s->soc), "ddr", OBJECT(machine->ram), | ||
59 | &error_abort); | ||
60 | - object_property_set_int(OBJECT(&s->soc), "psci-conduit", psci_conduit, | ||
61 | - &error_abort); | ||
62 | sysbus_realize(SYS_BUS_DEVICE(&s->soc), &error_fatal); | ||
63 | |||
64 | fdt_create(s); | ||
65 | @@ -XXX,XX +XXX,XX @@ static void versal_virt_init(MachineState *machine) | ||
66 | s->binfo.loader_start = 0x0; | ||
67 | s->binfo.get_dtb = versal_virt_get_dtb; | ||
68 | s->binfo.modify_dtb = versal_virt_modify_dtb; | ||
69 | + s->binfo.psci_conduit = psci_conduit; | ||
70 | if (machine->kernel_filename) { | ||
71 | arm_load_kernel(&s->soc.fpd.apu.cpu[0], machine, &s->binfo); | ||
72 | } else { | ||
73 | diff --git a/hw/arm/xlnx-versal.c b/hw/arm/xlnx-versal.c | ||
74 | index XXXXXXX..XXXXXXX 100644 | ||
75 | --- a/hw/arm/xlnx-versal.c | ||
76 | +++ b/hw/arm/xlnx-versal.c | ||
77 | @@ -XXX,XX +XXX,XX @@ static void versal_create_apu_cpus(Versal *s) | ||
78 | object_initialize_child(OBJECT(s), "apu-cpu[*]", &s->fpd.apu.cpu[i], | ||
79 | XLNX_VERSAL_ACPU_TYPE); | ||
80 | obj = OBJECT(&s->fpd.apu.cpu[i]); | ||
81 | - object_property_set_int(obj, "psci-conduit", s->cfg.psci_conduit, | ||
82 | - &error_abort); | ||
83 | if (i) { | ||
84 | - /* Secondary CPUs start in PSCI powered-down state */ | ||
85 | + /* Secondary CPUs start in powered-down state */ | ||
86 | object_property_set_bool(obj, "start-powered-off", true, | ||
87 | &error_abort); | ||
88 | } | ||
89 | @@ -XXX,XX +XXX,XX @@ static void versal_init(Object *obj) | ||
90 | static Property versal_properties[] = { | ||
91 | DEFINE_PROP_LINK("ddr", Versal, cfg.mr_ddr, TYPE_MEMORY_REGION, | ||
92 | MemoryRegion *), | ||
93 | - DEFINE_PROP_UINT32("psci-conduit", Versal, cfg.psci_conduit, 0), | ||
94 | DEFINE_PROP_END_OF_LIST() | ||
95 | }; | ||
96 | |||
97 | -- | ||
98 | 2.25.1 | ||
99 | |||
100 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Instead of setting the CPU psci-conduit and start-powered-off | ||
2 | properties in the virt board code, set the arm_boot_info psci_conduit | ||
3 | field so that the boot.c code can do it. | ||
4 | 1 | ||
5 | This will fix a corner case where we were incorrectly enabling PSCI | ||
6 | emulation when booting guest code into EL3 because it was an ELF file | ||
7 | passed to -kernel or to the generic loader. (EL3 guest code started | ||
8 | via -bios or -pflash was already being run with PSCI emulation | ||
9 | disabled.) | ||
10 | |||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
13 | Reviewed-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
14 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
15 | Tested-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
16 | Message-id: 20220127154639.2090164-9-peter.maydell@linaro.org | ||
17 | --- | ||
18 | hw/arm/virt.c | 12 +----------- | ||
19 | 1 file changed, 1 insertion(+), 11 deletions(-) | ||
20 | |||
21 | diff --git a/hw/arm/virt.c b/hw/arm/virt.c | ||
22 | index XXXXXXX..XXXXXXX 100644 | ||
23 | --- a/hw/arm/virt.c | ||
24 | +++ b/hw/arm/virt.c | ||
25 | @@ -XXX,XX +XXX,XX @@ static void machvirt_init(MachineState *machine) | ||
26 | object_property_set_bool(cpuobj, "has_el2", false, NULL); | ||
27 | } | ||
28 | |||
29 | - if (vms->psci_conduit != QEMU_PSCI_CONDUIT_DISABLED) { | ||
30 | - object_property_set_int(cpuobj, "psci-conduit", vms->psci_conduit, | ||
31 | - NULL); | ||
32 | - | ||
33 | - /* Secondary CPUs start in PSCI powered-down state */ | ||
34 | - if (n > 0) { | ||
35 | - object_property_set_bool(cpuobj, "start-powered-off", true, | ||
36 | - NULL); | ||
37 | - } | ||
38 | - } | ||
39 | - | ||
40 | if (vmc->kvm_no_adjvtime && | ||
41 | object_property_find(cpuobj, "kvm-no-adjvtime")) { | ||
42 | object_property_set_bool(cpuobj, "kvm-no-adjvtime", true, NULL); | ||
43 | @@ -XXX,XX +XXX,XX @@ static void machvirt_init(MachineState *machine) | ||
44 | vms->bootinfo.get_dtb = machvirt_dtb; | ||
45 | vms->bootinfo.skip_dtb_autoload = true; | ||
46 | vms->bootinfo.firmware_loaded = firmware_loaded; | ||
47 | + vms->bootinfo.psci_conduit = vms->psci_conduit; | ||
48 | arm_load_kernel(ARM_CPU(first_cpu), machine, &vms->bootinfo); | ||
49 | |||
50 | vms->machine_done.notify = virt_machine_done; | ||
51 | -- | ||
52 | 2.25.1 | ||
53 | |||
54 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Change the highbank/midway boards to use the new boot.c functionality | ||
2 | to allow us to enable psci-conduit only if the guest is being booted | ||
3 | in EL1 or EL2, so that if the user runs guest EL3 firmware code our | ||
4 | PSCI emulation doesn't get in its way. | ||
5 | 1 | ||
6 | To do this we stop setting the psci-conduit and start-powered-off | ||
7 | properties on the CPU objects in the board code, and instead set the | ||
8 | psci_conduit field in the arm_boot_info struct to tell the common | ||
9 | boot loader code that we'd like PSCI if the guest is starting at an | ||
10 | EL that it makes sense with (in which case it will set these | ||
11 | properties). | ||
12 | |||
13 | This means that when running guest code at EL3, all the cores | ||
14 | will start execution at once on poweron. This matches the | ||
15 | real hardware behaviour. (A brief description of the hardware | ||
16 | boot process is in the u-boot documentation for these boards: | ||
17 | https://u-boot.readthedocs.io/en/latest/board/highbank/highbank.html#boot-process | ||
18 | -- in theory one might run the 'a9boot'/'a15boot' secure monitor | ||
19 | code in QEMU, though we probably don't emulate enough for that.) | ||
20 | |||
21 | This affects the highbank and midway boards. | ||
22 | |||
23 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
24 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
25 | Reviewed-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
26 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
27 | Tested-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
28 | Message-id: 20220127154639.2090164-10-peter.maydell@linaro.org | ||
29 | --- | ||
30 | hw/arm/highbank.c | 7 +------ | ||
31 | 1 file changed, 1 insertion(+), 6 deletions(-) | ||
32 | |||
33 | diff --git a/hw/arm/highbank.c b/hw/arm/highbank.c | ||
34 | index XXXXXXX..XXXXXXX 100644 | ||
35 | --- a/hw/arm/highbank.c | ||
36 | +++ b/hw/arm/highbank.c | ||
37 | @@ -XXX,XX +XXX,XX @@ static void calxeda_init(MachineState *machine, enum cxmachines machine_id) | ||
38 | object_property_set_int(cpuobj, "psci-conduit", QEMU_PSCI_CONDUIT_SMC, | ||
39 | &error_abort); | ||
40 | |||
41 | - if (n) { | ||
42 | - /* Secondary CPUs start in PSCI powered-down state */ | ||
43 | - object_property_set_bool(cpuobj, "start-powered-off", true, | ||
44 | - &error_abort); | ||
45 | - } | ||
46 | - | ||
47 | if (object_property_find(cpuobj, "reset-cbar")) { | ||
48 | object_property_set_int(cpuobj, "reset-cbar", MPCORE_PERIPHBASE, | ||
49 | &error_abort); | ||
50 | @@ -XXX,XX +XXX,XX @@ static void calxeda_init(MachineState *machine, enum cxmachines machine_id) | ||
51 | highbank_binfo.board_setup_addr = BOARD_SETUP_ADDR; | ||
52 | highbank_binfo.write_board_setup = hb_write_board_setup; | ||
53 | highbank_binfo.secure_board_setup = true; | ||
54 | + highbank_binfo.psci_conduit = QEMU_PSCI_CONDUIT_SMC; | ||
55 | |||
56 | arm_load_kernel(ARM_CPU(first_cpu), machine, &highbank_binfo); | ||
57 | } | ||
58 | -- | ||
59 | 2.25.1 | ||
60 | |||
61 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Guest code on highbank may make non-PSCI SMC calls in order to | ||
2 | enable/disable the L2x0 cache controller (see the Linux kernel's | ||
3 | arch/arm/mach-highbank/highbank.c highbank_l2c310_write_sec() | ||
4 | function). The ABI for this is documented in kernel commit | ||
5 | 8e56130dcb as being borrowed from the OMAP44xx ROM. The OMAP44xx TRM | ||
6 | documents this function ID as having no return value and potentially | ||
7 | trashing all guest registers except SP and PC. For QEMU's purposes | ||
8 | (where our L2x0 model is a stub and enabling or disabling it doesn't | ||
9 | affect the guest behaviour) a simple "do nothing" SMC is fine. | ||
10 | 1 | ||
11 | We currently implement this NOP behaviour using a little bit of | ||
12 | Secure code we run before jumping to the guest kernel, which is | ||
13 | written by arm_write_secure_board_setup_dummy_smc(). The code sets | ||
14 | up a set of Secure vectors where the SMC entry point returns without | ||
15 | doing anything. | ||
16 | |||
17 | Now that the PSCI SMC emulation handles all SMC calls (setting r0 to | ||
18 | an error code if the input r0 function identifier is not recognized), | ||
19 | we can use that default behaviour as sufficient for the highbank | ||
20 | cache controller call. (Because the guest code assumes r0 has no | ||
21 | interesting value on exit it doesn't matter that we set it to the | ||
22 | error code). We can therefore delete the highbank board code that | ||
23 | sets secure_board_setup to true and writes the secure-code bootstub. | ||
24 | |||
25 | (Note that because the OMAP44xx ABI puts function-identifiers in | ||
26 | r12 and PSCI uses r0, we only avoid a clash because Linux's code | ||
27 | happens to put the function-identifier in both registers. But this | ||
28 | is true also when the kernel is running on real firmware that | ||
29 | implements both ABIs as far as I can see.) | ||
30 | |||
31 | This change fixes in passing booting on the 'midway' board model, | ||
32 | which has been completely broken since we added support for Hyp | ||
33 | mode to the Cortex-A15 CPU. When we did that boot.c was made to | ||
34 | start running the guest code in Hyp mode; this includes the | ||
35 | board_setup hook, which instantly UNDEFs because the NSACR is | ||
36 | not accessible from Hyp. (Put another way, we never made the | ||
37 | secure_board_setup hook support cope with Hyp mode.) | ||
38 | |||
39 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
40 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
41 | Reviewed-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
42 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
43 | Tested-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
44 | Message-id: 20220127154639.2090164-12-peter.maydell@linaro.org | ||
45 | --- | ||
46 | hw/arm/highbank.c | 8 -------- | ||
47 | 1 file changed, 8 deletions(-) | ||
48 | |||
49 | diff --git a/hw/arm/highbank.c b/hw/arm/highbank.c | ||
50 | index XXXXXXX..XXXXXXX 100644 | ||
51 | --- a/hw/arm/highbank.c | ||
52 | +++ b/hw/arm/highbank.c | ||
53 | @@ -XXX,XX +XXX,XX @@ | ||
54 | |||
55 | /* Board init. */ | ||
56 | |||
57 | -static void hb_write_board_setup(ARMCPU *cpu, | ||
58 | - const struct arm_boot_info *info) | ||
59 | -{ | ||
60 | - arm_write_secure_board_setup_dummy_smc(cpu, info, MVBAR_ADDR); | ||
61 | -} | ||
62 | - | ||
63 | static void hb_write_secondary(ARMCPU *cpu, const struct arm_boot_info *info) | ||
64 | { | ||
65 | int n; | ||
66 | @@ -XXX,XX +XXX,XX @@ static void calxeda_init(MachineState *machine, enum cxmachines machine_id) | ||
67 | highbank_binfo.write_secondary_boot = hb_write_secondary; | ||
68 | highbank_binfo.secondary_cpu_reset_hook = hb_reset_secondary; | ||
69 | highbank_binfo.board_setup_addr = BOARD_SETUP_ADDR; | ||
70 | - highbank_binfo.write_board_setup = hb_write_board_setup; | ||
71 | - highbank_binfo.secure_board_setup = true; | ||
72 | highbank_binfo.psci_conduit = QEMU_PSCI_CONDUIT_SMC; | ||
73 | |||
74 | arm_load_kernel(ARM_CPU(first_cpu), machine, &highbank_binfo); | ||
75 | -- | ||
76 | 2.25.1 | ||
77 | |||
78 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Now that we have dealt with the one special case (highbank) that needed | ||
2 | to set both psci_conduit and secure_board_setup, we don't need to | ||
3 | allow that combination any more. It doesn't make sense in general, | ||
4 | so use an assertion to ensure we don't add new boards that do it | ||
5 | by accident without thinking through the consequences. | ||
6 | 1 | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Reviewed-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
10 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
11 | Tested-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
12 | Message-id: 20220127154639.2090164-13-peter.maydell@linaro.org | ||
13 | --- | ||
14 | hw/arm/boot.c | 10 ++++++++++ | ||
15 | 1 file changed, 10 insertions(+) | ||
16 | |||
17 | diff --git a/hw/arm/boot.c b/hw/arm/boot.c | ||
18 | index XXXXXXX..XXXXXXX 100644 | ||
19 | --- a/hw/arm/boot.c | ||
20 | +++ b/hw/arm/boot.c | ||
21 | @@ -XXX,XX +XXX,XX @@ void arm_load_kernel(ARMCPU *cpu, MachineState *ms, struct arm_boot_info *info) | ||
22 | * supported exception level or in a lower one. | ||
23 | */ | ||
24 | |||
25 | + /* | ||
26 | + * If PSCI is enabled, then SMC calls all go to the PSCI handler and | ||
27 | + * are never emulated to trap into guest code. It therefore does not | ||
28 | + * make sense for the board to have a setup code fragment that runs | ||
29 | + * in Secure, because this will probably need to itself issue an SMC of some | ||
30 | + * kind as part of its operation. | ||
31 | + */ | ||
32 | + assert(info->psci_conduit == QEMU_PSCI_CONDUIT_DISABLED || | ||
33 | + !info->secure_board_setup); | ||
34 | + | ||
35 | /* Boot into highest supported EL ... */ | ||
36 | if (arm_feature(env, ARM_FEATURE_EL3)) { | ||
37 | boot_el = 3; | ||
38 | -- | ||
39 | 2.25.1 | ||
40 | |||
41 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | If we're using PSCI emulation to start secondary CPUs, there is no | ||
2 | point in writing the "secondary boot" stub code, because it will | ||
3 | never be used -- secondary CPUs start powered-off, and when powered | ||
4 | on are set to begin execution at the address specified by the guest's | ||
5 | power-on PSCI call, not at the stub. | ||
6 | 1 | ||
7 | Move the call to the hook that writes the secondary boot stub code so | ||
8 | that we can do it only if we're starting a Linux kernel and not using | ||
9 | PSCI. | ||
10 | |||
11 | (None of the users of the hook care about the ordering of its call | ||
12 | relative to anything else: they only use it to write a rom blob to | ||
13 | guest memory.) | ||
14 | |||
15 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
16 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
17 | Reviewed-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
18 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
19 | Tested-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
20 | Message-id: 20220127154639.2090164-14-peter.maydell@linaro.org | ||
21 | --- | ||
22 | include/hw/arm/boot.h | 3 +++ | ||
23 | hw/arm/boot.c | 35 ++++++++++++++++++++++++----------- | ||
24 | 2 files changed, 27 insertions(+), 11 deletions(-) | ||
25 | |||
26 | diff --git a/include/hw/arm/boot.h b/include/hw/arm/boot.h | ||
27 | index XXXXXXX..XXXXXXX 100644 | ||
28 | --- a/include/hw/arm/boot.h | ||
29 | +++ b/include/hw/arm/boot.h | ||
30 | @@ -XXX,XX +XXX,XX @@ struct arm_boot_info { | ||
31 | * boot loader/boot ROM code, and secondary_cpu_reset_hook() should | ||
32 | * perform any necessary CPU reset handling and set the PC for the | ||
33 | * secondary CPUs to point at this boot blob. | ||
34 | + * | ||
35 | + * These hooks won't be called if secondary CPUs are booting via | ||
36 | + * emulated PSCI (see psci_conduit below). | ||
37 | */ | ||
38 | void (*write_secondary_boot)(ARMCPU *cpu, | ||
39 | const struct arm_boot_info *info); | ||
40 | diff --git a/hw/arm/boot.c b/hw/arm/boot.c | ||
41 | index XXXXXXX..XXXXXXX 100644 | ||
42 | --- a/hw/arm/boot.c | ||
43 | +++ b/hw/arm/boot.c | ||
44 | @@ -XXX,XX +XXX,XX @@ static void do_cpu_reset(void *opaque) | ||
45 | set_kernel_args(info, as); | ||
46 | } | ||
47 | } | ||
48 | - } else { | ||
49 | + } else if (info->secondary_cpu_reset_hook) { | ||
50 | info->secondary_cpu_reset_hook(cpu, info); | ||
51 | } | ||
52 | } | ||
53 | @@ -XXX,XX +XXX,XX @@ static void arm_setup_direct_kernel_boot(ARMCPU *cpu, | ||
54 | elf_machine = EM_ARM; | ||
55 | } | ||
56 | |||
57 | - if (!info->secondary_cpu_reset_hook) { | ||
58 | - info->secondary_cpu_reset_hook = default_reset_secondary; | ||
59 | - } | ||
60 | - if (!info->write_secondary_boot) { | ||
61 | - info->write_secondary_boot = default_write_secondary; | ||
62 | - } | ||
63 | - | ||
64 | if (info->nb_cpus == 0) | ||
65 | info->nb_cpus = 1; | ||
66 | |||
67 | @@ -XXX,XX +XXX,XX @@ static void arm_setup_direct_kernel_boot(ARMCPU *cpu, | ||
68 | write_bootloader("bootloader", info->loader_start, | ||
69 | primary_loader, fixupcontext, as); | ||
70 | |||
71 | - if (info->nb_cpus > 1) { | ||
72 | - info->write_secondary_boot(cpu, info); | ||
73 | - } | ||
74 | if (info->write_board_setup) { | ||
75 | info->write_board_setup(cpu, info); | ||
76 | } | ||
77 | @@ -XXX,XX +XXX,XX @@ void arm_load_kernel(ARMCPU *cpu, MachineState *ms, struct arm_boot_info *info) | ||
78 | } | ||
79 | } | ||
80 | |||
81 | + if (info->psci_conduit == QEMU_PSCI_CONDUIT_DISABLED && | ||
82 | + info->is_linux && info->nb_cpus > 1) { | ||
83 | + /* | ||
84 | + * We're booting Linux but not using PSCI, so for SMP we need | ||
85 | + * to write a custom secondary CPU boot loader stub, and arrange | ||
86 | + * for the secondary CPU reset to make the accompanying initialization. | ||
87 | + */ | ||
88 | + if (!info->secondary_cpu_reset_hook) { | ||
89 | + info->secondary_cpu_reset_hook = default_reset_secondary; | ||
90 | + } | ||
91 | + if (!info->write_secondary_boot) { | ||
92 | + info->write_secondary_boot = default_write_secondary; | ||
93 | + } | ||
94 | + info->write_secondary_boot(cpu, info); | ||
95 | + } else { | ||
96 | + /* | ||
97 | + * No secondary boot stub; don't use the reset hook that would | ||
98 | + * have set the CPU up to call it | ||
99 | + */ | ||
100 | + info->write_secondary_boot = NULL; | ||
101 | + info->secondary_cpu_reset_hook = NULL; | ||
102 | + } | ||
103 | + | ||
104 | /* | ||
105 | * arm_load_dtb() may add a PSCI node so it must be called after we have | ||
106 | * decided whether to enable PSCI and set the psci-conduit CPU properties. | ||
107 | -- | ||
108 | 2.25.1 | ||
109 | |||
110 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | We use the arm_boot_info::nb_cpus field in only one place, and that | ||
2 | place can easily get the number of CPUs locally rather than relying | ||
3 | on the board code to have set the field correctly. (At least one | ||
4 | board, xlnx-versal-virt, does not set the field despite having more | ||
5 | than one CPU.) | ||
6 | 1 | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
8 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Reviewed-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
10 | Tested-by: Cédric Le Goater <clg@kaod.org> | ||
11 | Tested-by: Niek Linnenbank <nieklinnenbank@gmail.com> | ||
12 | Message-id: 20220127154639.2090164-16-peter.maydell@linaro.org | ||
13 | --- | ||
14 | include/hw/arm/boot.h | 1 - | ||
15 | hw/arm/aspeed.c | 1 - | ||
16 | hw/arm/boot.c | 7 +++---- | ||
17 | hw/arm/exynos4_boards.c | 1 - | ||
18 | hw/arm/highbank.c | 1 - | ||
19 | hw/arm/imx25_pdk.c | 3 +-- | ||
20 | hw/arm/kzm.c | 1 - | ||
21 | hw/arm/mcimx6ul-evk.c | 1 - | ||
22 | hw/arm/mcimx7d-sabre.c | 1 - | ||
23 | hw/arm/npcm7xx.c | 3 --- | ||
24 | hw/arm/orangepi.c | 4 +--- | ||
25 | hw/arm/raspi.c | 1 - | ||
26 | hw/arm/realview.c | 1 - | ||
27 | hw/arm/sabrelite.c | 1 - | ||
28 | hw/arm/sbsa-ref.c | 1 - | ||
29 | hw/arm/vexpress.c | 1 - | ||
30 | hw/arm/virt.c | 1 - | ||
31 | hw/arm/xilinx_zynq.c | 1 - | ||
32 | 18 files changed, 5 insertions(+), 26 deletions(-) | ||
33 | |||
34 | diff --git a/include/hw/arm/boot.h b/include/hw/arm/boot.h | ||
35 | index XXXXXXX..XXXXXXX 100644 | ||
36 | --- a/include/hw/arm/boot.h | ||
37 | +++ b/include/hw/arm/boot.h | ||
38 | @@ -XXX,XX +XXX,XX @@ struct arm_boot_info { | ||
39 | hwaddr smp_loader_start; | ||
40 | hwaddr smp_bootreg_addr; | ||
41 | hwaddr gic_cpu_if_addr; | ||
42 | - int nb_cpus; | ||
43 | int board_id; | ||
44 | /* ARM machines that support the ARM Security Extensions use this field to | ||
45 | * control whether Linux is booted as secure(true) or non-secure(false). | ||
46 | diff --git a/hw/arm/aspeed.c b/hw/arm/aspeed.c | ||
47 | index XXXXXXX..XXXXXXX 100644 | ||
48 | --- a/hw/arm/aspeed.c | ||
49 | +++ b/hw/arm/aspeed.c | ||
50 | @@ -XXX,XX +XXX,XX @@ static void aspeed_machine_init(MachineState *machine) | ||
51 | |||
52 | aspeed_board_binfo.ram_size = machine->ram_size; | ||
53 | aspeed_board_binfo.loader_start = sc->memmap[ASPEED_DEV_SDRAM]; | ||
54 | - aspeed_board_binfo.nb_cpus = sc->num_cpus; | ||
55 | |||
56 | if (amc->i2c_init) { | ||
57 | amc->i2c_init(bmc); | ||
58 | diff --git a/hw/arm/boot.c b/hw/arm/boot.c | ||
59 | index XXXXXXX..XXXXXXX 100644 | ||
60 | --- a/hw/arm/boot.c | ||
61 | +++ b/hw/arm/boot.c | ||
62 | @@ -XXX,XX +XXX,XX @@ static void arm_setup_direct_kernel_boot(ARMCPU *cpu, | ||
63 | elf_machine = EM_ARM; | ||
64 | } | ||
65 | |||
66 | - if (info->nb_cpus == 0) | ||
67 | - info->nb_cpus = 1; | ||
68 | - | ||
69 | /* Assume that raw images are linux kernels, and ELF images are not. */ | ||
70 | kernel_size = arm_load_elf(info, &elf_entry, &image_low_addr, | ||
71 | &image_high_addr, elf_machine, as); | ||
72 | @@ -XXX,XX +XXX,XX @@ void arm_load_kernel(ARMCPU *cpu, MachineState *ms, struct arm_boot_info *info) | ||
73 | AddressSpace *as = arm_boot_address_space(cpu, info); | ||
74 | int boot_el; | ||
75 | CPUARMState *env = &cpu->env; | ||
76 | + int nb_cpus = 0; | ||
77 | |||
78 | /* | ||
79 | * CPU objects (unlike devices) are not automatically reset on system | ||
80 | @@ -XXX,XX +XXX,XX @@ void arm_load_kernel(ARMCPU *cpu, MachineState *ms, struct arm_boot_info *info) | ||
81 | */ | ||
82 | for (cs = first_cpu; cs; cs = CPU_NEXT(cs)) { | ||
83 | qemu_register_reset(do_cpu_reset, ARM_CPU(cs)); | ||
84 | + nb_cpus++; | ||
85 | } | ||
86 | |||
87 | /* | ||
88 | @@ -XXX,XX +XXX,XX @@ void arm_load_kernel(ARMCPU *cpu, MachineState *ms, struct arm_boot_info *info) | ||
89 | } | ||
90 | |||
91 | if (info->psci_conduit == QEMU_PSCI_CONDUIT_DISABLED && | ||
92 | - info->is_linux && info->nb_cpus > 1) { | ||
93 | + info->is_linux && nb_cpus > 1) { | ||
94 | /* | ||
95 | * We're booting Linux but not using PSCI, so for SMP we need | ||
96 | * to write a custom secondary CPU boot loader stub, and arrange | ||
97 | diff --git a/hw/arm/exynos4_boards.c b/hw/arm/exynos4_boards.c | ||
98 | index XXXXXXX..XXXXXXX 100644 | ||
99 | --- a/hw/arm/exynos4_boards.c | ||
100 | +++ b/hw/arm/exynos4_boards.c | ||
101 | @@ -XXX,XX +XXX,XX @@ static unsigned long exynos4_board_ram_size[EXYNOS4_NUM_OF_BOARDS] = { | ||
102 | static struct arm_boot_info exynos4_board_binfo = { | ||
103 | .loader_start = EXYNOS4210_BASE_BOOT_ADDR, | ||
104 | .smp_loader_start = EXYNOS4210_SMP_BOOT_ADDR, | ||
105 | - .nb_cpus = EXYNOS4210_NCPUS, | ||
106 | .write_secondary_boot = exynos4210_write_secondary, | ||
107 | }; | ||
108 | |||
109 | diff --git a/hw/arm/highbank.c b/hw/arm/highbank.c | ||
110 | index XXXXXXX..XXXXXXX 100644 | ||
111 | --- a/hw/arm/highbank.c | ||
112 | +++ b/hw/arm/highbank.c | ||
113 | @@ -XXX,XX +XXX,XX @@ static void calxeda_init(MachineState *machine, enum cxmachines machine_id) | ||
114 | * clear that the value is meaningless. | ||
115 | */ | ||
116 | highbank_binfo.board_id = -1; | ||
117 | - highbank_binfo.nb_cpus = smp_cpus; | ||
118 | highbank_binfo.loader_start = 0; | ||
119 | highbank_binfo.board_setup_addr = BOARD_SETUP_ADDR; | ||
120 | highbank_binfo.psci_conduit = QEMU_PSCI_CONDUIT_SMC; | ||
121 | diff --git a/hw/arm/imx25_pdk.c b/hw/arm/imx25_pdk.c | ||
122 | index XXXXXXX..XXXXXXX 100644 | ||
123 | --- a/hw/arm/imx25_pdk.c | ||
124 | +++ b/hw/arm/imx25_pdk.c | ||
125 | @@ -XXX,XX +XXX,XX @@ static void imx25_pdk_init(MachineState *machine) | ||
126 | |||
127 | imx25_pdk_binfo.ram_size = machine->ram_size; | ||
128 | imx25_pdk_binfo.loader_start = FSL_IMX25_SDRAM0_ADDR; | ||
129 | - imx25_pdk_binfo.board_id = 1771, | ||
130 | - imx25_pdk_binfo.nb_cpus = 1; | ||
131 | + imx25_pdk_binfo.board_id = 1771; | ||
132 | |||
133 | for (i = 0; i < FSL_IMX25_NUM_ESDHCS; i++) { | ||
134 | BusState *bus; | ||
135 | diff --git a/hw/arm/kzm.c b/hw/arm/kzm.c | ||
136 | index XXXXXXX..XXXXXXX 100644 | ||
137 | --- a/hw/arm/kzm.c | ||
138 | +++ b/hw/arm/kzm.c | ||
139 | @@ -XXX,XX +XXX,XX @@ static void kzm_init(MachineState *machine) | ||
140 | } | ||
141 | |||
142 | kzm_binfo.ram_size = machine->ram_size; | ||
143 | - kzm_binfo.nb_cpus = 1; | ||
144 | |||
145 | if (!qtest_enabled()) { | ||
146 | arm_load_kernel(&s->soc.cpu, machine, &kzm_binfo); | ||
147 | diff --git a/hw/arm/mcimx6ul-evk.c b/hw/arm/mcimx6ul-evk.c | ||
148 | index XXXXXXX..XXXXXXX 100644 | ||
149 | --- a/hw/arm/mcimx6ul-evk.c | ||
150 | +++ b/hw/arm/mcimx6ul-evk.c | ||
151 | @@ -XXX,XX +XXX,XX @@ static void mcimx6ul_evk_init(MachineState *machine) | ||
152 | .loader_start = FSL_IMX6UL_MMDC_ADDR, | ||
153 | .board_id = -1, | ||
154 | .ram_size = machine->ram_size, | ||
155 | - .nb_cpus = machine->smp.cpus, | ||
156 | .psci_conduit = QEMU_PSCI_CONDUIT_SMC, | ||
157 | }; | ||
158 | |||
159 | diff --git a/hw/arm/mcimx7d-sabre.c b/hw/arm/mcimx7d-sabre.c | ||
160 | index XXXXXXX..XXXXXXX 100644 | ||
161 | --- a/hw/arm/mcimx7d-sabre.c | ||
162 | +++ b/hw/arm/mcimx7d-sabre.c | ||
163 | @@ -XXX,XX +XXX,XX @@ static void mcimx7d_sabre_init(MachineState *machine) | ||
164 | .loader_start = FSL_IMX7_MMDC_ADDR, | ||
165 | .board_id = -1, | ||
166 | .ram_size = machine->ram_size, | ||
167 | - .nb_cpus = machine->smp.cpus, | ||
168 | .psci_conduit = QEMU_PSCI_CONDUIT_SMC, | ||
169 | }; | ||
170 | |||
171 | diff --git a/hw/arm/npcm7xx.c b/hw/arm/npcm7xx.c | ||
172 | index XXXXXXX..XXXXXXX 100644 | ||
173 | --- a/hw/arm/npcm7xx.c | ||
174 | +++ b/hw/arm/npcm7xx.c | ||
175 | @@ -XXX,XX +XXX,XX @@ static struct arm_boot_info npcm7xx_binfo = { | ||
176 | |||
177 | void npcm7xx_load_kernel(MachineState *machine, NPCM7xxState *soc) | ||
178 | { | ||
179 | - NPCM7xxClass *sc = NPCM7XX_GET_CLASS(soc); | ||
180 | - | ||
181 | npcm7xx_binfo.ram_size = machine->ram_size; | ||
182 | - npcm7xx_binfo.nb_cpus = sc->num_cpus; | ||
183 | |||
184 | arm_load_kernel(&soc->cpu[0], machine, &npcm7xx_binfo); | ||
185 | } | ||
186 | diff --git a/hw/arm/orangepi.c b/hw/arm/orangepi.c | ||
187 | index XXXXXXX..XXXXXXX 100644 | ||
188 | --- a/hw/arm/orangepi.c | ||
189 | +++ b/hw/arm/orangepi.c | ||
190 | @@ -XXX,XX +XXX,XX @@ | ||
191 | #include "hw/qdev-properties.h" | ||
192 | #include "hw/arm/allwinner-h3.h" | ||
193 | |||
194 | -static struct arm_boot_info orangepi_binfo = { | ||
195 | - .nb_cpus = AW_H3_NUM_CPUS, | ||
196 | -}; | ||
197 | +static struct arm_boot_info orangepi_binfo; | ||
198 | |||
199 | static void orangepi_init(MachineState *machine) | ||
200 | { | ||
201 | diff --git a/hw/arm/raspi.c b/hw/arm/raspi.c | ||
202 | index XXXXXXX..XXXXXXX 100644 | ||
203 | --- a/hw/arm/raspi.c | ||
204 | +++ b/hw/arm/raspi.c | ||
205 | @@ -XXX,XX +XXX,XX @@ static void setup_boot(MachineState *machine, RaspiProcessorId processor_id, | ||
206 | |||
207 | s->binfo.board_id = MACH_TYPE_BCM2708; | ||
208 | s->binfo.ram_size = ram_size; | ||
209 | - s->binfo.nb_cpus = machine->smp.cpus; | ||
210 | |||
211 | if (processor_id <= PROCESSOR_ID_BCM2836) { | ||
212 | /* | ||
213 | diff --git a/hw/arm/realview.c b/hw/arm/realview.c | ||
214 | index XXXXXXX..XXXXXXX 100644 | ||
215 | --- a/hw/arm/realview.c | ||
216 | +++ b/hw/arm/realview.c | ||
217 | @@ -XXX,XX +XXX,XX @@ static void realview_init(MachineState *machine, | ||
218 | memory_region_add_subregion(sysmem, SMP_BOOT_ADDR, ram_hack); | ||
219 | |||
220 | realview_binfo.ram_size = ram_size; | ||
221 | - realview_binfo.nb_cpus = smp_cpus; | ||
222 | realview_binfo.board_id = realview_board_id[board_type]; | ||
223 | realview_binfo.loader_start = (board_type == BOARD_PB_A8 ? 0x70000000 : 0); | ||
224 | arm_load_kernel(ARM_CPU(first_cpu), machine, &realview_binfo); | ||
225 | diff --git a/hw/arm/sabrelite.c b/hw/arm/sabrelite.c | ||
226 | index XXXXXXX..XXXXXXX 100644 | ||
227 | --- a/hw/arm/sabrelite.c | ||
228 | +++ b/hw/arm/sabrelite.c | ||
229 | @@ -XXX,XX +XXX,XX @@ static void sabrelite_init(MachineState *machine) | ||
230 | } | ||
231 | |||
232 | sabrelite_binfo.ram_size = machine->ram_size; | ||
233 | - sabrelite_binfo.nb_cpus = machine->smp.cpus; | ||
234 | sabrelite_binfo.secure_boot = true; | ||
235 | sabrelite_binfo.write_secondary_boot = sabrelite_write_secondary; | ||
236 | sabrelite_binfo.secondary_cpu_reset_hook = sabrelite_reset_secondary; | ||
237 | diff --git a/hw/arm/sbsa-ref.c b/hw/arm/sbsa-ref.c | ||
238 | index XXXXXXX..XXXXXXX 100644 | ||
239 | --- a/hw/arm/sbsa-ref.c | ||
240 | +++ b/hw/arm/sbsa-ref.c | ||
241 | @@ -XXX,XX +XXX,XX @@ static void sbsa_ref_init(MachineState *machine) | ||
242 | create_secure_ec(secure_sysmem); | ||
243 | |||
244 | sms->bootinfo.ram_size = machine->ram_size; | ||
245 | - sms->bootinfo.nb_cpus = smp_cpus; | ||
246 | sms->bootinfo.board_id = -1; | ||
247 | sms->bootinfo.loader_start = sbsa_ref_memmap[SBSA_MEM].base; | ||
248 | sms->bootinfo.get_dtb = sbsa_ref_dtb; | ||
249 | diff --git a/hw/arm/vexpress.c b/hw/arm/vexpress.c | ||
250 | index XXXXXXX..XXXXXXX 100644 | ||
251 | --- a/hw/arm/vexpress.c | ||
252 | +++ b/hw/arm/vexpress.c | ||
253 | @@ -XXX,XX +XXX,XX @@ static void vexpress_common_init(MachineState *machine) | ||
254 | } | ||
255 | |||
256 | daughterboard->bootinfo.ram_size = machine->ram_size; | ||
257 | - daughterboard->bootinfo.nb_cpus = machine->smp.cpus; | ||
258 | daughterboard->bootinfo.board_id = VEXPRESS_BOARD_ID; | ||
259 | daughterboard->bootinfo.loader_start = daughterboard->loader_start; | ||
260 | daughterboard->bootinfo.smp_loader_start = map[VE_SRAM]; | ||
261 | diff --git a/hw/arm/virt.c b/hw/arm/virt.c | ||
262 | index XXXXXXX..XXXXXXX 100644 | ||
263 | --- a/hw/arm/virt.c | ||
264 | +++ b/hw/arm/virt.c | ||
265 | @@ -XXX,XX +XXX,XX @@ static void machvirt_init(MachineState *machine) | ||
266 | } | ||
267 | |||
268 | vms->bootinfo.ram_size = machine->ram_size; | ||
269 | - vms->bootinfo.nb_cpus = smp_cpus; | ||
270 | vms->bootinfo.board_id = -1; | ||
271 | vms->bootinfo.loader_start = vms->memmap[VIRT_MEM].base; | ||
272 | vms->bootinfo.get_dtb = machvirt_dtb; | ||
273 | diff --git a/hw/arm/xilinx_zynq.c b/hw/arm/xilinx_zynq.c | ||
274 | index XXXXXXX..XXXXXXX 100644 | ||
275 | --- a/hw/arm/xilinx_zynq.c | ||
276 | +++ b/hw/arm/xilinx_zynq.c | ||
277 | @@ -XXX,XX +XXX,XX @@ static void zynq_init(MachineState *machine) | ||
278 | sysbus_mmio_map(busdev, 0, 0xF8007000); | ||
279 | |||
280 | zynq_binfo.ram_size = machine->ram_size; | ||
281 | - zynq_binfo.nb_cpus = 1; | ||
282 | zynq_binfo.board_id = 0xd32; | ||
283 | zynq_binfo.loader_start = 0; | ||
284 | zynq_binfo.board_setup_addr = BOARD_SETUP_ADDR; | ||
285 | -- | ||
286 | 2.25.1 | ||
287 | |||
288 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: "Edgar E. Iglesias" <edgar.iglesias@xilinx.com> | ||
2 | 1 | ||
3 | Always call arm_load_kernel() regardless of kernel_filename being | ||
4 | set. This is needed because arm_load_kernel() sets up reset for | ||
5 | the CPUs. | ||
6 | |||
7 | Fixes: 6f16da53ff (hw/arm: versal: Add a virtual Xilinx Versal board) | ||
8 | Reported-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | Signed-off-by: Edgar E. Iglesias <edgar.iglesias@xilinx.com> | ||
10 | Message-id: 20220130110313.4045351-2-edgar.iglesias@gmail.com | ||
11 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
13 | --- | ||
14 | hw/arm/xlnx-versal-virt.c | 11 ++--------- | ||
15 | 1 file changed, 2 insertions(+), 9 deletions(-) | ||
16 | |||
17 | diff --git a/hw/arm/xlnx-versal-virt.c b/hw/arm/xlnx-versal-virt.c | ||
18 | index XXXXXXX..XXXXXXX 100644 | ||
19 | --- a/hw/arm/xlnx-versal-virt.c | ||
20 | +++ b/hw/arm/xlnx-versal-virt.c | ||
21 | @@ -XXX,XX +XXX,XX @@ static void versal_virt_init(MachineState *machine) | ||
22 | s->binfo.get_dtb = versal_virt_get_dtb; | ||
23 | s->binfo.modify_dtb = versal_virt_modify_dtb; | ||
24 | s->binfo.psci_conduit = psci_conduit; | ||
25 | - if (machine->kernel_filename) { | ||
26 | - arm_load_kernel(&s->soc.fpd.apu.cpu[0], machine, &s->binfo); | ||
27 | - } else { | ||
28 | - AddressSpace *as = arm_boot_address_space(&s->soc.fpd.apu.cpu[0], | ||
29 | - &s->binfo); | ||
30 | + if (!machine->kernel_filename) { | ||
31 | /* Some boot-loaders (e.g u-boot) don't like blobs at address 0 (NULL). | ||
32 | * Offset things by 4K. */ | ||
33 | s->binfo.loader_start = 0x1000; | ||
34 | s->binfo.dtb_limit = 0x1000000; | ||
35 | - if (arm_load_dtb(s->binfo.loader_start, | ||
36 | - &s->binfo, s->binfo.dtb_limit, as, machine) < 0) { | ||
37 | - exit(EXIT_FAILURE); | ||
38 | - } | ||
39 | } | ||
40 | + arm_load_kernel(&s->soc.fpd.apu.cpu[0], machine, &s->binfo); | ||
41 | |||
42 | for (i = 0; i < XLNX_VERSAL_NUM_OSPI_FLASH; i++) { | ||
43 | BusState *spi_bus; | ||
44 | -- | ||
45 | 2.25.1 | ||
46 | |||
47 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Alex Bennée <alex.bennee@linaro.org> | ||
2 | 1 | ||
3 | The recently introduced debug tests in kvm-unit-tests exposed an error | ||
4 | in our handling of singlestep cause by stale hflags. This is caught by | ||
5 | --enable-debug-tcg when running the tests. | ||
6 | |||
7 | Signed-off-by: Alex Bennée <alex.bennee@linaro.org> | ||
8 | Reported-by: Andrew Jones <drjones@redhat.com> | ||
9 | Tested-by: Andrew Jones <drjones@redhat.com> | ||
10 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
11 | Message-id: 20220202122353.457084-1-alex.bennee@linaro.org | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
13 | --- | ||
14 | target/arm/helper-a64.c | 2 ++ | ||
15 | 1 file changed, 2 insertions(+) | ||
16 | |||
17 | diff --git a/target/arm/helper-a64.c b/target/arm/helper-a64.c | ||
18 | index XXXXXXX..XXXXXXX 100644 | ||
19 | --- a/target/arm/helper-a64.c | ||
20 | +++ b/target/arm/helper-a64.c | ||
21 | @@ -XXX,XX +XXX,XX @@ void HELPER(msr_i_daifset)(CPUARMState *env, uint32_t imm) | ||
22 | { | ||
23 | daif_check(env, 0x1e, imm, GETPC()); | ||
24 | env->daif |= (imm << 6) & PSTATE_DAIF; | ||
25 | + arm_rebuild_hflags(env); | ||
26 | } | ||
27 | |||
28 | void HELPER(msr_i_daifclear)(CPUARMState *env, uint32_t imm) | ||
29 | { | ||
30 | daif_check(env, 0x1f, imm, GETPC()); | ||
31 | env->daif &= ~((imm << 6) & PSTATE_DAIF); | ||
32 | + arm_rebuild_hflags(env); | ||
33 | } | ||
34 | |||
35 | /* Convert a softfloat float_relation_ (as returned by | ||
36 | -- | ||
37 | 2.25.1 | ||
38 | |||
39 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | From: Richard Petri <git@rpls.de> | ||
2 | 1 | ||
3 | Starting the SysTick timer and changing the clock source a the same time | ||
4 | will result in an error, if the previous clock period was zero. For exmaple, | ||
5 | on the mps2-tz platforms, no refclk is present. Right after reset, the | ||
6 | configured ptimer period is zero, and trying to enabling it will turn it off | ||
7 | right away. E.g., code running on the platform setting | ||
8 | |||
9 | SysTick->CTRL = SysTick_CTRL_CLKSOURCE_Msk | SysTick_CTRL_ENABLE_Msk; | ||
10 | |||
11 | should change the clock source and enable the timer on real hardware, but | ||
12 | resulted in an error in qemu. | ||
13 | |||
14 | Signed-off-by: Richard Petri <git@rpls.de> | ||
15 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
16 | Message-id: 20220201192650.289584-1-git@rpls.de | ||
17 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
18 | --- | ||
19 | hw/timer/armv7m_systick.c | 8 ++++---- | ||
20 | 1 file changed, 4 insertions(+), 4 deletions(-) | ||
21 | |||
22 | diff --git a/hw/timer/armv7m_systick.c b/hw/timer/armv7m_systick.c | ||
23 | index XXXXXXX..XXXXXXX 100644 | ||
24 | --- a/hw/timer/armv7m_systick.c | ||
25 | +++ b/hw/timer/armv7m_systick.c | ||
26 | @@ -XXX,XX +XXX,XX @@ static MemTxResult systick_write(void *opaque, hwaddr addr, | ||
27 | s->control &= 0xfffffff8; | ||
28 | s->control |= value & 7; | ||
29 | |||
30 | + if ((oldval ^ value) & SYSTICK_CLKSOURCE) { | ||
31 | + systick_set_period_from_clock(s); | ||
32 | + } | ||
33 | + | ||
34 | if ((oldval ^ value) & SYSTICK_ENABLE) { | ||
35 | if (value & SYSTICK_ENABLE) { | ||
36 | ptimer_run(s->ptimer, 0); | ||
37 | @@ -XXX,XX +XXX,XX @@ static MemTxResult systick_write(void *opaque, hwaddr addr, | ||
38 | ptimer_stop(s->ptimer); | ||
39 | } | ||
40 | } | ||
41 | - | ||
42 | - if ((oldval ^ value) & SYSTICK_CLKSOURCE) { | ||
43 | - systick_set_period_from_clock(s); | ||
44 | - } | ||
45 | ptimer_transaction_commit(s->ptimer); | ||
46 | break; | ||
47 | } | ||
48 | -- | ||
49 | 2.25.1 | ||
50 | |||
51 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Currently the ITS accesses each 8-byte doubleword in a 4-doubleword | ||
2 | command packet with a separate address_space_ldq_le() call. This is | ||
3 | awkward because the individual command processing functions have | ||
4 | ended up with code to handle "load more doublewords out of the | ||
5 | packet", which is both unwieldy and also a potential source of bugs | ||
6 | because it's not obvious when looking at a line that pulls a field | ||
7 | out of the 'value' variable which of the 4 doublewords that variable | ||
8 | currently holds. | ||
9 | 1 | ||
10 | Switch to using address_space_map() to map the whole command packet | ||
11 | at once and fish the four doublewords out of it. Then each process_* | ||
12 | function can start with a few lines of code that extract the fields | ||
13 | it cares about. | ||
14 | |||
15 | This requires us to split out the guts of process_its_cmd() into a | ||
16 | new do_process_its_cmd(), because we were previously overloading the | ||
17 | value and offset arguments as a backdoor way to directly pass the | ||
18 | devid and eventid from a write to GITS_TRANSLATER. The new | ||
19 | do_process_its_cmd() takes those arguments directly, and | ||
20 | process_its_cmd() is just a wrapper that does the "read fields from | ||
21 | command packet" part. | ||
22 | |||
23 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
24 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
25 | Message-id: 20220201193207.2771604-2-peter.maydell@linaro.org | ||
26 | --- | ||
27 | hw/intc/gicv3_internal.h | 4 +- | ||
28 | hw/intc/arm_gicv3_its.c | 208 +++++++++++---------------------------- | ||
29 | 2 files changed, 62 insertions(+), 150 deletions(-) | ||
30 | |||
31 | diff --git a/hw/intc/gicv3_internal.h b/hw/intc/gicv3_internal.h | ||
32 | index XXXXXXX..XXXXXXX 100644 | ||
33 | --- a/hw/intc/gicv3_internal.h | ||
34 | +++ b/hw/intc/gicv3_internal.h | ||
35 | @@ -XXX,XX +XXX,XX @@ FIELD(GITS_TYPER, CIL, 36, 1) | ||
36 | #define LPI_CTE_ENABLED TABLE_ENTRY_VALID_MASK | ||
37 | #define LPI_PRIORITY_MASK 0xfc | ||
38 | |||
39 | -#define GITS_CMDQ_ENTRY_SIZE 32 | ||
40 | -#define NUM_BYTES_IN_DW 8 | ||
41 | +#define GITS_CMDQ_ENTRY_WORDS 4 | ||
42 | +#define GITS_CMDQ_ENTRY_SIZE (GITS_CMDQ_ENTRY_WORDS * sizeof(uint64_t)) | ||
43 | |||
44 | #define CMD_MASK 0xff | ||
45 | |||
46 | diff --git a/hw/intc/arm_gicv3_its.c b/hw/intc/arm_gicv3_its.c | ||
47 | index XXXXXXX..XXXXXXX 100644 | ||
48 | --- a/hw/intc/arm_gicv3_its.c | ||
49 | +++ b/hw/intc/arm_gicv3_its.c | ||
50 | @@ -XXX,XX +XXX,XX @@ static uint64_t get_dte(GICv3ITSState *s, uint32_t devid, MemTxResult *res) | ||
51 | * 3. handling of ITS CLEAR command | ||
52 | * 4. handling of ITS DISCARD command | ||
53 | */ | ||
54 | -static ItsCmdResult process_its_cmd(GICv3ITSState *s, uint64_t value, | ||
55 | - uint32_t offset, ItsCmdType cmd) | ||
56 | +static ItsCmdResult do_process_its_cmd(GICv3ITSState *s, uint32_t devid, | ||
57 | + uint32_t eventid, ItsCmdType cmd) | ||
58 | { | ||
59 | - AddressSpace *as = &s->gicv3->dma_as; | ||
60 | - uint32_t devid, eventid; | ||
61 | MemTxResult res = MEMTX_OK; | ||
62 | bool dte_valid; | ||
63 | uint64_t dte = 0; | ||
64 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_its_cmd(GICv3ITSState *s, uint64_t value, | ||
65 | bool cte_valid = false; | ||
66 | uint64_t rdbase; | ||
67 | |||
68 | - if (cmd == NONE) { | ||
69 | - devid = offset; | ||
70 | - } else { | ||
71 | - devid = ((value & DEVID_MASK) >> DEVID_SHIFT); | ||
72 | - | ||
73 | - offset += NUM_BYTES_IN_DW; | ||
74 | - value = address_space_ldq_le(as, s->cq.base_addr + offset, | ||
75 | - MEMTXATTRS_UNSPECIFIED, &res); | ||
76 | - } | ||
77 | - | ||
78 | - if (res != MEMTX_OK) { | ||
79 | - return CMD_STALL; | ||
80 | - } | ||
81 | - | ||
82 | - eventid = (value & EVENTID_MASK); | ||
83 | - | ||
84 | if (devid >= s->dt.num_entries) { | ||
85 | qemu_log_mask(LOG_GUEST_ERROR, | ||
86 | "%s: invalid command attributes: devid %d>=%d", | ||
87 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_its_cmd(GICv3ITSState *s, uint64_t value, | ||
88 | } | ||
89 | return CMD_CONTINUE; | ||
90 | } | ||
91 | - | ||
92 | -static ItsCmdResult process_mapti(GICv3ITSState *s, uint64_t value, | ||
93 | - uint32_t offset, bool ignore_pInt) | ||
94 | +static ItsCmdResult process_its_cmd(GICv3ITSState *s, const uint64_t *cmdpkt, | ||
95 | + ItsCmdType cmd) | ||
96 | +{ | ||
97 | + uint32_t devid, eventid; | ||
98 | + | ||
99 | + devid = (cmdpkt[0] & DEVID_MASK) >> DEVID_SHIFT; | ||
100 | + eventid = cmdpkt[1] & EVENTID_MASK; | ||
101 | + return do_process_its_cmd(s, devid, eventid, cmd); | ||
102 | +} | ||
103 | + | ||
104 | +static ItsCmdResult process_mapti(GICv3ITSState *s, const uint64_t *cmdpkt, | ||
105 | + bool ignore_pInt) | ||
106 | { | ||
107 | - AddressSpace *as = &s->gicv3->dma_as; | ||
108 | uint32_t devid, eventid; | ||
109 | uint32_t pIntid = 0; | ||
110 | uint64_t num_eventids; | ||
111 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_mapti(GICv3ITSState *s, uint64_t value, | ||
112 | uint64_t dte = 0; | ||
113 | IteEntry ite = {}; | ||
114 | |||
115 | - devid = ((value & DEVID_MASK) >> DEVID_SHIFT); | ||
116 | - offset += NUM_BYTES_IN_DW; | ||
117 | - value = address_space_ldq_le(as, s->cq.base_addr + offset, | ||
118 | - MEMTXATTRS_UNSPECIFIED, &res); | ||
119 | - | ||
120 | - if (res != MEMTX_OK) { | ||
121 | - return CMD_STALL; | ||
122 | - } | ||
123 | - | ||
124 | - eventid = (value & EVENTID_MASK); | ||
125 | + devid = (cmdpkt[0] & DEVID_MASK) >> DEVID_SHIFT; | ||
126 | + eventid = cmdpkt[1] & EVENTID_MASK; | ||
127 | |||
128 | if (ignore_pInt) { | ||
129 | pIntid = eventid; | ||
130 | } else { | ||
131 | - pIntid = ((value & pINTID_MASK) >> pINTID_SHIFT); | ||
132 | + pIntid = (cmdpkt[1] & pINTID_MASK) >> pINTID_SHIFT; | ||
133 | } | ||
134 | |||
135 | - offset += NUM_BYTES_IN_DW; | ||
136 | - value = address_space_ldq_le(as, s->cq.base_addr + offset, | ||
137 | - MEMTXATTRS_UNSPECIFIED, &res); | ||
138 | - | ||
139 | - if (res != MEMTX_OK) { | ||
140 | - return CMD_STALL; | ||
141 | - } | ||
142 | - | ||
143 | - icid = value & ICID_MASK; | ||
144 | + icid = cmdpkt[2] & ICID_MASK; | ||
145 | |||
146 | if (devid >= s->dt.num_entries) { | ||
147 | qemu_log_mask(LOG_GUEST_ERROR, | ||
148 | @@ -XXX,XX +XXX,XX @@ static bool update_cte(GICv3ITSState *s, uint16_t icid, bool valid, | ||
149 | return res == MEMTX_OK; | ||
150 | } | ||
151 | |||
152 | -static ItsCmdResult process_mapc(GICv3ITSState *s, uint32_t offset) | ||
153 | +static ItsCmdResult process_mapc(GICv3ITSState *s, const uint64_t *cmdpkt) | ||
154 | { | ||
155 | - AddressSpace *as = &s->gicv3->dma_as; | ||
156 | uint16_t icid; | ||
157 | uint64_t rdbase; | ||
158 | bool valid; | ||
159 | - MemTxResult res = MEMTX_OK; | ||
160 | - uint64_t value; | ||
161 | |||
162 | - offset += NUM_BYTES_IN_DW; | ||
163 | - offset += NUM_BYTES_IN_DW; | ||
164 | + icid = cmdpkt[2] & ICID_MASK; | ||
165 | |||
166 | - value = address_space_ldq_le(as, s->cq.base_addr + offset, | ||
167 | - MEMTXATTRS_UNSPECIFIED, &res); | ||
168 | - | ||
169 | - if (res != MEMTX_OK) { | ||
170 | - return CMD_STALL; | ||
171 | - } | ||
172 | - | ||
173 | - icid = value & ICID_MASK; | ||
174 | - | ||
175 | - rdbase = (value & R_MAPC_RDBASE_MASK) >> R_MAPC_RDBASE_SHIFT; | ||
176 | + rdbase = (cmdpkt[2] & R_MAPC_RDBASE_MASK) >> R_MAPC_RDBASE_SHIFT; | ||
177 | rdbase &= RDBASE_PROCNUM_MASK; | ||
178 | |||
179 | - valid = (value & CMD_FIELD_VALID_MASK); | ||
180 | + valid = cmdpkt[2] & CMD_FIELD_VALID_MASK; | ||
181 | |||
182 | if ((icid >= s->ct.num_entries) || (rdbase >= s->gicv3->num_cpu)) { | ||
183 | qemu_log_mask(LOG_GUEST_ERROR, | ||
184 | @@ -XXX,XX +XXX,XX @@ static bool update_dte(GICv3ITSState *s, uint32_t devid, bool valid, | ||
185 | return res == MEMTX_OK; | ||
186 | } | ||
187 | |||
188 | -static ItsCmdResult process_mapd(GICv3ITSState *s, uint64_t value, | ||
189 | - uint32_t offset) | ||
190 | +static ItsCmdResult process_mapd(GICv3ITSState *s, const uint64_t *cmdpkt) | ||
191 | { | ||
192 | - AddressSpace *as = &s->gicv3->dma_as; | ||
193 | uint32_t devid; | ||
194 | uint8_t size; | ||
195 | uint64_t itt_addr; | ||
196 | bool valid; | ||
197 | - MemTxResult res = MEMTX_OK; | ||
198 | |||
199 | - devid = ((value & DEVID_MASK) >> DEVID_SHIFT); | ||
200 | - | ||
201 | - offset += NUM_BYTES_IN_DW; | ||
202 | - value = address_space_ldq_le(as, s->cq.base_addr + offset, | ||
203 | - MEMTXATTRS_UNSPECIFIED, &res); | ||
204 | - | ||
205 | - if (res != MEMTX_OK) { | ||
206 | - return CMD_STALL; | ||
207 | - } | ||
208 | - | ||
209 | - size = (value & SIZE_MASK); | ||
210 | - | ||
211 | - offset += NUM_BYTES_IN_DW; | ||
212 | - value = address_space_ldq_le(as, s->cq.base_addr + offset, | ||
213 | - MEMTXATTRS_UNSPECIFIED, &res); | ||
214 | - | ||
215 | - if (res != MEMTX_OK) { | ||
216 | - return CMD_STALL; | ||
217 | - } | ||
218 | - | ||
219 | - itt_addr = (value & ITTADDR_MASK) >> ITTADDR_SHIFT; | ||
220 | - | ||
221 | - valid = (value & CMD_FIELD_VALID_MASK); | ||
222 | + devid = (cmdpkt[0] & DEVID_MASK) >> DEVID_SHIFT; | ||
223 | + size = cmdpkt[1] & SIZE_MASK; | ||
224 | + itt_addr = (cmdpkt[2] & ITTADDR_MASK) >> ITTADDR_SHIFT; | ||
225 | + valid = cmdpkt[2] & CMD_FIELD_VALID_MASK; | ||
226 | |||
227 | if ((devid >= s->dt.num_entries) || | ||
228 | (size > FIELD_EX64(s->typer, GITS_TYPER, IDBITS))) { | ||
229 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_mapd(GICv3ITSState *s, uint64_t value, | ||
230 | return update_dte(s, devid, valid, size, itt_addr) ? CMD_CONTINUE : CMD_STALL; | ||
231 | } | ||
232 | |||
233 | -static ItsCmdResult process_movall(GICv3ITSState *s, uint64_t value, | ||
234 | - uint32_t offset) | ||
235 | +static ItsCmdResult process_movall(GICv3ITSState *s, const uint64_t *cmdpkt) | ||
236 | { | ||
237 | - AddressSpace *as = &s->gicv3->dma_as; | ||
238 | - MemTxResult res = MEMTX_OK; | ||
239 | uint64_t rd1, rd2; | ||
240 | |||
241 | - /* No fields in dwords 0 or 1 */ | ||
242 | - offset += NUM_BYTES_IN_DW; | ||
243 | - offset += NUM_BYTES_IN_DW; | ||
244 | - value = address_space_ldq_le(as, s->cq.base_addr + offset, | ||
245 | - MEMTXATTRS_UNSPECIFIED, &res); | ||
246 | - if (res != MEMTX_OK) { | ||
247 | - return CMD_STALL; | ||
248 | - } | ||
249 | + rd1 = FIELD_EX64(cmdpkt[2], MOVALL_2, RDBASE1); | ||
250 | + rd2 = FIELD_EX64(cmdpkt[3], MOVALL_3, RDBASE2); | ||
251 | |||
252 | - rd1 = FIELD_EX64(value, MOVALL_2, RDBASE1); | ||
253 | if (rd1 >= s->gicv3->num_cpu) { | ||
254 | qemu_log_mask(LOG_GUEST_ERROR, | ||
255 | "%s: RDBASE1 %" PRId64 | ||
256 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_movall(GICv3ITSState *s, uint64_t value, | ||
257 | __func__, rd1, s->gicv3->num_cpu); | ||
258 | return CMD_CONTINUE; | ||
259 | } | ||
260 | - | ||
261 | - offset += NUM_BYTES_IN_DW; | ||
262 | - value = address_space_ldq_le(as, s->cq.base_addr + offset, | ||
263 | - MEMTXATTRS_UNSPECIFIED, &res); | ||
264 | - if (res != MEMTX_OK) { | ||
265 | - return CMD_STALL; | ||
266 | - } | ||
267 | - | ||
268 | - rd2 = FIELD_EX64(value, MOVALL_3, RDBASE2); | ||
269 | if (rd2 >= s->gicv3->num_cpu) { | ||
270 | qemu_log_mask(LOG_GUEST_ERROR, | ||
271 | "%s: RDBASE2 %" PRId64 | ||
272 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_movall(GICv3ITSState *s, uint64_t value, | ||
273 | return CMD_CONTINUE; | ||
274 | } | ||
275 | |||
276 | -static ItsCmdResult process_movi(GICv3ITSState *s, uint64_t value, | ||
277 | - uint32_t offset) | ||
278 | +static ItsCmdResult process_movi(GICv3ITSState *s, const uint64_t *cmdpkt) | ||
279 | { | ||
280 | - AddressSpace *as = &s->gicv3->dma_as; | ||
281 | MemTxResult res = MEMTX_OK; | ||
282 | uint32_t devid, eventid, intid; | ||
283 | uint16_t old_icid, new_icid; | ||
284 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_movi(GICv3ITSState *s, uint64_t value, | ||
285 | uint64_t num_eventids; | ||
286 | IteEntry ite = {}; | ||
287 | |||
288 | - devid = FIELD_EX64(value, MOVI_0, DEVICEID); | ||
289 | - | ||
290 | - offset += NUM_BYTES_IN_DW; | ||
291 | - value = address_space_ldq_le(as, s->cq.base_addr + offset, | ||
292 | - MEMTXATTRS_UNSPECIFIED, &res); | ||
293 | - if (res != MEMTX_OK) { | ||
294 | - return CMD_STALL; | ||
295 | - } | ||
296 | - eventid = FIELD_EX64(value, MOVI_1, EVENTID); | ||
297 | - | ||
298 | - offset += NUM_BYTES_IN_DW; | ||
299 | - value = address_space_ldq_le(as, s->cq.base_addr + offset, | ||
300 | - MEMTXATTRS_UNSPECIFIED, &res); | ||
301 | - if (res != MEMTX_OK) { | ||
302 | - return CMD_STALL; | ||
303 | - } | ||
304 | - new_icid = FIELD_EX64(value, MOVI_2, ICID); | ||
305 | + devid = FIELD_EX64(cmdpkt[0], MOVI_0, DEVICEID); | ||
306 | + eventid = FIELD_EX64(cmdpkt[1], MOVI_1, EVENTID); | ||
307 | + new_icid = FIELD_EX64(cmdpkt[2], MOVI_2, ICID); | ||
308 | |||
309 | if (devid >= s->dt.num_entries) { | ||
310 | qemu_log_mask(LOG_GUEST_ERROR, | ||
311 | @@ -XXX,XX +XXX,XX @@ static void process_cmdq(GICv3ITSState *s) | ||
312 | uint32_t wr_offset = 0; | ||
313 | uint32_t rd_offset = 0; | ||
314 | uint32_t cq_offset = 0; | ||
315 | - uint64_t data; | ||
316 | AddressSpace *as = &s->gicv3->dma_as; | ||
317 | - MemTxResult res = MEMTX_OK; | ||
318 | uint8_t cmd; | ||
319 | int i; | ||
320 | |||
321 | @@ -XXX,XX +XXX,XX @@ static void process_cmdq(GICv3ITSState *s) | ||
322 | |||
323 | while (wr_offset != rd_offset) { | ||
324 | ItsCmdResult result = CMD_CONTINUE; | ||
325 | + void *hostmem; | ||
326 | + hwaddr buflen; | ||
327 | + uint64_t cmdpkt[GITS_CMDQ_ENTRY_WORDS]; | ||
328 | |||
329 | cq_offset = (rd_offset * GITS_CMDQ_ENTRY_SIZE); | ||
330 | - data = address_space_ldq_le(as, s->cq.base_addr + cq_offset, | ||
331 | - MEMTXATTRS_UNSPECIFIED, &res); | ||
332 | - if (res != MEMTX_OK) { | ||
333 | + | ||
334 | + buflen = GITS_CMDQ_ENTRY_SIZE; | ||
335 | + hostmem = address_space_map(as, s->cq.base_addr + cq_offset, | ||
336 | + &buflen, false, MEMTXATTRS_UNSPECIFIED); | ||
337 | + if (!hostmem || buflen != GITS_CMDQ_ENTRY_SIZE) { | ||
338 | + if (hostmem) { | ||
339 | + address_space_unmap(as, hostmem, buflen, false, 0); | ||
340 | + } | ||
341 | s->creadr = FIELD_DP64(s->creadr, GITS_CREADR, STALLED, 1); | ||
342 | qemu_log_mask(LOG_GUEST_ERROR, | ||
343 | "%s: could not read command at 0x%" PRIx64 "\n", | ||
344 | __func__, s->cq.base_addr + cq_offset); | ||
345 | break; | ||
346 | } | ||
347 | + for (i = 0; i < ARRAY_SIZE(cmdpkt); i++) { | ||
348 | + cmdpkt[i] = ldq_le_p(hostmem + i * sizeof(uint64_t)); | ||
349 | + } | ||
350 | + address_space_unmap(as, hostmem, buflen, false, 0); | ||
351 | |||
352 | - cmd = (data & CMD_MASK); | ||
353 | + cmd = cmdpkt[0] & CMD_MASK; | ||
354 | |||
355 | trace_gicv3_its_process_command(rd_offset, cmd); | ||
356 | |||
357 | switch (cmd) { | ||
358 | case GITS_CMD_INT: | ||
359 | - result = process_its_cmd(s, data, cq_offset, INTERRUPT); | ||
360 | + result = process_its_cmd(s, cmdpkt, INTERRUPT); | ||
361 | break; | ||
362 | case GITS_CMD_CLEAR: | ||
363 | - result = process_its_cmd(s, data, cq_offset, CLEAR); | ||
364 | + result = process_its_cmd(s, cmdpkt, CLEAR); | ||
365 | break; | ||
366 | case GITS_CMD_SYNC: | ||
367 | /* | ||
368 | @@ -XXX,XX +XXX,XX @@ static void process_cmdq(GICv3ITSState *s) | ||
369 | */ | ||
370 | break; | ||
371 | case GITS_CMD_MAPD: | ||
372 | - result = process_mapd(s, data, cq_offset); | ||
373 | + result = process_mapd(s, cmdpkt); | ||
374 | break; | ||
375 | case GITS_CMD_MAPC: | ||
376 | - result = process_mapc(s, cq_offset); | ||
377 | + result = process_mapc(s, cmdpkt); | ||
378 | break; | ||
379 | case GITS_CMD_MAPTI: | ||
380 | - result = process_mapti(s, data, cq_offset, false); | ||
381 | + result = process_mapti(s, cmdpkt, false); | ||
382 | break; | ||
383 | case GITS_CMD_MAPI: | ||
384 | - result = process_mapti(s, data, cq_offset, true); | ||
385 | + result = process_mapti(s, cmdpkt, true); | ||
386 | break; | ||
387 | case GITS_CMD_DISCARD: | ||
388 | - result = process_its_cmd(s, data, cq_offset, DISCARD); | ||
389 | + result = process_its_cmd(s, cmdpkt, DISCARD); | ||
390 | break; | ||
391 | case GITS_CMD_INV: | ||
392 | case GITS_CMD_INVALL: | ||
393 | @@ -XXX,XX +XXX,XX @@ static void process_cmdq(GICv3ITSState *s) | ||
394 | } | ||
395 | break; | ||
396 | case GITS_CMD_MOVI: | ||
397 | - result = process_movi(s, data, cq_offset); | ||
398 | + result = process_movi(s, cmdpkt); | ||
399 | break; | ||
400 | case GITS_CMD_MOVALL: | ||
401 | - result = process_movall(s, data, cq_offset); | ||
402 | + result = process_movall(s, cmdpkt); | ||
403 | break; | ||
404 | default: | ||
405 | break; | ||
406 | @@ -XXX,XX +XXX,XX @@ static MemTxResult gicv3_its_translation_write(void *opaque, hwaddr offset, | ||
407 | { | ||
408 | GICv3ITSState *s = (GICv3ITSState *)opaque; | ||
409 | bool result = true; | ||
410 | - uint32_t devid = 0; | ||
411 | |||
412 | trace_gicv3_its_translation_write(offset, data, size, attrs.requester_id); | ||
413 | |||
414 | switch (offset) { | ||
415 | case GITS_TRANSLATER: | ||
416 | if (s->ctlr & R_GITS_CTLR_ENABLED_MASK) { | ||
417 | - devid = attrs.requester_id; | ||
418 | - result = process_its_cmd(s, data, devid, NONE); | ||
419 | + result = do_process_its_cmd(s, attrs.requester_id, data, NONE); | ||
420 | } | ||
421 | break; | ||
422 | default: | ||
423 | -- | ||
424 | 2.25.1 | ||
425 | |||
426 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | In the ITS, a DTE is an entry in the device table, which contains | ||
2 | multiple fields. Currently the function get_dte() which reads one | ||
3 | entry from the device table returns it as a raw 64-bit integer, | ||
4 | which we then pass around in that form, only extracting fields | ||
5 | from it as we need them. | ||
6 | 1 | ||
7 | Create a real C struct with the same fields as the DTE, and | ||
8 | populate it in get_dte(), so that that function and update_dte() | ||
9 | are the only ones that need to care about the in-guest-memory | ||
10 | format of the DTE. | ||
11 | |||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
13 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
14 | Message-id: 20220201193207.2771604-3-peter.maydell@linaro.org | ||
15 | --- | ||
16 | hw/intc/arm_gicv3_its.c | 111 ++++++++++++++++++++-------------------- | ||
17 | 1 file changed, 56 insertions(+), 55 deletions(-) | ||
18 | |||
19 | diff --git a/hw/intc/arm_gicv3_its.c b/hw/intc/arm_gicv3_its.c | ||
20 | index XXXXXXX..XXXXXXX 100644 | ||
21 | --- a/hw/intc/arm_gicv3_its.c | ||
22 | +++ b/hw/intc/arm_gicv3_its.c | ||
23 | @@ -XXX,XX +XXX,XX @@ typedef struct { | ||
24 | uint64_t itel; | ||
25 | } IteEntry; | ||
26 | |||
27 | +typedef struct DTEntry { | ||
28 | + bool valid; | ||
29 | + unsigned size; | ||
30 | + uint64_t ittaddr; | ||
31 | +} DTEntry; | ||
32 | + | ||
33 | /* | ||
34 | * The ITS spec permits a range of CONSTRAINED UNPREDICTABLE options | ||
35 | * if a command parameter is not correct. These include both "stall | ||
36 | @@ -XXX,XX +XXX,XX @@ static bool get_cte(GICv3ITSState *s, uint16_t icid, uint64_t *cte, | ||
37 | return FIELD_EX64(*cte, CTE, VALID); | ||
38 | } | ||
39 | |||
40 | -static bool update_ite(GICv3ITSState *s, uint32_t eventid, uint64_t dte, | ||
41 | +static bool update_ite(GICv3ITSState *s, uint32_t eventid, const DTEntry *dte, | ||
42 | IteEntry ite) | ||
43 | { | ||
44 | AddressSpace *as = &s->gicv3->dma_as; | ||
45 | - uint64_t itt_addr; | ||
46 | MemTxResult res = MEMTX_OK; | ||
47 | |||
48 | - itt_addr = FIELD_EX64(dte, DTE, ITTADDR); | ||
49 | - itt_addr <<= ITTADDR_SHIFT; /* 256 byte aligned */ | ||
50 | - | ||
51 | - address_space_stq_le(as, itt_addr + (eventid * (sizeof(uint64_t) + | ||
52 | + address_space_stq_le(as, dte->ittaddr + (eventid * (sizeof(uint64_t) + | ||
53 | sizeof(uint32_t))), ite.itel, MEMTXATTRS_UNSPECIFIED, | ||
54 | &res); | ||
55 | |||
56 | if (res == MEMTX_OK) { | ||
57 | - address_space_stl_le(as, itt_addr + (eventid * (sizeof(uint64_t) + | ||
58 | + address_space_stl_le(as, dte->ittaddr + (eventid * (sizeof(uint64_t) + | ||
59 | sizeof(uint32_t))) + sizeof(uint32_t), ite.iteh, | ||
60 | MEMTXATTRS_UNSPECIFIED, &res); | ||
61 | } | ||
62 | @@ -XXX,XX +XXX,XX @@ static bool update_ite(GICv3ITSState *s, uint32_t eventid, uint64_t dte, | ||
63 | } | ||
64 | } | ||
65 | |||
66 | -static bool get_ite(GICv3ITSState *s, uint32_t eventid, uint64_t dte, | ||
67 | +static bool get_ite(GICv3ITSState *s, uint32_t eventid, const DTEntry *dte, | ||
68 | uint16_t *icid, uint32_t *pIntid, MemTxResult *res) | ||
69 | { | ||
70 | AddressSpace *as = &s->gicv3->dma_as; | ||
71 | - uint64_t itt_addr; | ||
72 | bool status = false; | ||
73 | IteEntry ite = {}; | ||
74 | |||
75 | - itt_addr = FIELD_EX64(dte, DTE, ITTADDR); | ||
76 | - itt_addr <<= ITTADDR_SHIFT; /* 256 byte aligned */ | ||
77 | - | ||
78 | - ite.itel = address_space_ldq_le(as, itt_addr + | ||
79 | + ite.itel = address_space_ldq_le(as, dte->ittaddr + | ||
80 | (eventid * (sizeof(uint64_t) + | ||
81 | sizeof(uint32_t))), MEMTXATTRS_UNSPECIFIED, | ||
82 | res); | ||
83 | |||
84 | if (*res == MEMTX_OK) { | ||
85 | - ite.iteh = address_space_ldl_le(as, itt_addr + | ||
86 | + ite.iteh = address_space_ldl_le(as, dte->ittaddr + | ||
87 | (eventid * (sizeof(uint64_t) + | ||
88 | sizeof(uint32_t))) + sizeof(uint32_t), | ||
89 | MEMTXATTRS_UNSPECIFIED, res); | ||
90 | @@ -XXX,XX +XXX,XX @@ static bool get_ite(GICv3ITSState *s, uint32_t eventid, uint64_t dte, | ||
91 | return status; | ||
92 | } | ||
93 | |||
94 | -static uint64_t get_dte(GICv3ITSState *s, uint32_t devid, MemTxResult *res) | ||
95 | +/* | ||
96 | + * Read the Device Table entry at index @devid. On success (including | ||
97 | + * successfully determining that there is no valid DTE for this index), | ||
98 | + * we return MEMTX_OK and populate the DTEntry struct accordingly. | ||
99 | + * If there is an error reading memory then we return the error code. | ||
100 | + */ | ||
101 | +static MemTxResult get_dte(GICv3ITSState *s, uint32_t devid, DTEntry *dte) | ||
102 | { | ||
103 | + MemTxResult res = MEMTX_OK; | ||
104 | AddressSpace *as = &s->gicv3->dma_as; | ||
105 | - uint64_t entry_addr = table_entry_addr(s, &s->dt, devid, res); | ||
106 | + uint64_t entry_addr = table_entry_addr(s, &s->dt, devid, &res); | ||
107 | + uint64_t dteval; | ||
108 | |||
109 | if (entry_addr == -1) { | ||
110 | - return 0; /* a DTE entry with the Valid bit clear */ | ||
111 | + /* No L2 table entry, i.e. no valid DTE, or a memory error */ | ||
112 | + dte->valid = false; | ||
113 | + return res; | ||
114 | } | ||
115 | - return address_space_ldq_le(as, entry_addr, MEMTXATTRS_UNSPECIFIED, res); | ||
116 | + dteval = address_space_ldq_le(as, entry_addr, MEMTXATTRS_UNSPECIFIED, &res); | ||
117 | + if (res != MEMTX_OK) { | ||
118 | + return res; | ||
119 | + } | ||
120 | + dte->valid = FIELD_EX64(dteval, DTE, VALID); | ||
121 | + dte->size = FIELD_EX64(dteval, DTE, SIZE); | ||
122 | + /* DTE word field stores bits [51:8] of the ITT address */ | ||
123 | + dte->ittaddr = FIELD_EX64(dteval, DTE, ITTADDR) << ITTADDR_SHIFT; | ||
124 | + return MEMTX_OK; | ||
125 | } | ||
126 | |||
127 | /* | ||
128 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult do_process_its_cmd(GICv3ITSState *s, uint32_t devid, | ||
129 | uint32_t eventid, ItsCmdType cmd) | ||
130 | { | ||
131 | MemTxResult res = MEMTX_OK; | ||
132 | - bool dte_valid; | ||
133 | - uint64_t dte = 0; | ||
134 | uint64_t num_eventids; | ||
135 | uint16_t icid = 0; | ||
136 | uint32_t pIntid = 0; | ||
137 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult do_process_its_cmd(GICv3ITSState *s, uint32_t devid, | ||
138 | uint64_t cte = 0; | ||
139 | bool cte_valid = false; | ||
140 | uint64_t rdbase; | ||
141 | + DTEntry dte; | ||
142 | |||
143 | if (devid >= s->dt.num_entries) { | ||
144 | qemu_log_mask(LOG_GUEST_ERROR, | ||
145 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult do_process_its_cmd(GICv3ITSState *s, uint32_t devid, | ||
146 | return CMD_CONTINUE; | ||
147 | } | ||
148 | |||
149 | - dte = get_dte(s, devid, &res); | ||
150 | - | ||
151 | - if (res != MEMTX_OK) { | ||
152 | + if (get_dte(s, devid, &dte) != MEMTX_OK) { | ||
153 | return CMD_STALL; | ||
154 | } | ||
155 | - dte_valid = FIELD_EX64(dte, DTE, VALID); | ||
156 | - | ||
157 | - if (!dte_valid) { | ||
158 | + if (!dte.valid) { | ||
159 | qemu_log_mask(LOG_GUEST_ERROR, | ||
160 | "%s: invalid command attributes: " | ||
161 | - "invalid dte: %"PRIx64" for %d\n", | ||
162 | - __func__, dte, devid); | ||
163 | + "invalid dte for %d\n", __func__, devid); | ||
164 | return CMD_CONTINUE; | ||
165 | } | ||
166 | |||
167 | - num_eventids = 1ULL << (FIELD_EX64(dte, DTE, SIZE) + 1); | ||
168 | - | ||
169 | + num_eventids = 1ULL << (dte.size + 1); | ||
170 | if (eventid >= num_eventids) { | ||
171 | qemu_log_mask(LOG_GUEST_ERROR, | ||
172 | "%s: invalid command attributes: eventid %d >= %" | ||
173 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult do_process_its_cmd(GICv3ITSState *s, uint32_t devid, | ||
174 | return CMD_CONTINUE; | ||
175 | } | ||
176 | |||
177 | - ite_valid = get_ite(s, eventid, dte, &icid, &pIntid, &res); | ||
178 | + ite_valid = get_ite(s, eventid, &dte, &icid, &pIntid, &res); | ||
179 | if (res != MEMTX_OK) { | ||
180 | return CMD_STALL; | ||
181 | } | ||
182 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult do_process_its_cmd(GICv3ITSState *s, uint32_t devid, | ||
183 | if (cmd == DISCARD) { | ||
184 | IteEntry ite = {}; | ||
185 | /* remove mapping from interrupt translation table */ | ||
186 | - return update_ite(s, eventid, dte, ite) ? CMD_CONTINUE : CMD_STALL; | ||
187 | + return update_ite(s, eventid, &dte, ite) ? CMD_CONTINUE : CMD_STALL; | ||
188 | } | ||
189 | return CMD_CONTINUE; | ||
190 | } | ||
191 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_mapti(GICv3ITSState *s, const uint64_t *cmdpkt, | ||
192 | uint32_t pIntid = 0; | ||
193 | uint64_t num_eventids; | ||
194 | uint32_t num_intids; | ||
195 | - bool dte_valid; | ||
196 | - MemTxResult res = MEMTX_OK; | ||
197 | uint16_t icid = 0; | ||
198 | - uint64_t dte = 0; | ||
199 | IteEntry ite = {}; | ||
200 | + DTEntry dte; | ||
201 | |||
202 | devid = (cmdpkt[0] & DEVID_MASK) >> DEVID_SHIFT; | ||
203 | eventid = cmdpkt[1] & EVENTID_MASK; | ||
204 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_mapti(GICv3ITSState *s, const uint64_t *cmdpkt, | ||
205 | return CMD_CONTINUE; | ||
206 | } | ||
207 | |||
208 | - dte = get_dte(s, devid, &res); | ||
209 | - | ||
210 | - if (res != MEMTX_OK) { | ||
211 | + if (get_dte(s, devid, &dte) != MEMTX_OK) { | ||
212 | return CMD_STALL; | ||
213 | } | ||
214 | - dte_valid = FIELD_EX64(dte, DTE, VALID); | ||
215 | - num_eventids = 1ULL << (FIELD_EX64(dte, DTE, SIZE) + 1); | ||
216 | + num_eventids = 1ULL << (dte.size + 1); | ||
217 | num_intids = 1ULL << (GICD_TYPER_IDBITS + 1); | ||
218 | |||
219 | if ((icid >= s->ct.num_entries) | ||
220 | - || !dte_valid || (eventid >= num_eventids) || | ||
221 | + || !dte.valid || (eventid >= num_eventids) || | ||
222 | (((pIntid < GICV3_LPI_INTID_START) || (pIntid >= num_intids)) && | ||
223 | (pIntid != INTID_SPURIOUS))) { | ||
224 | qemu_log_mask(LOG_GUEST_ERROR, | ||
225 | "%s: invalid command attributes " | ||
226 | "icid %d or eventid %d or pIntid %d or" | ||
227 | "unmapped dte %d\n", __func__, icid, eventid, | ||
228 | - pIntid, dte_valid); | ||
229 | + pIntid, dte.valid); | ||
230 | /* | ||
231 | * in this implementation, in case of error | ||
232 | * we ignore this command and move onto the next | ||
233 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_mapti(GICv3ITSState *s, const uint64_t *cmdpkt, | ||
234 | } | ||
235 | |||
236 | /* add ite entry to interrupt translation table */ | ||
237 | - ite.itel = FIELD_DP64(ite.itel, ITE_L, VALID, dte_valid); | ||
238 | + ite.itel = FIELD_DP64(ite.itel, ITE_L, VALID, true); | ||
239 | ite.itel = FIELD_DP64(ite.itel, ITE_L, INTTYPE, ITE_INTTYPE_PHYSICAL); | ||
240 | ite.itel = FIELD_DP64(ite.itel, ITE_L, INTID, pIntid); | ||
241 | ite.itel = FIELD_DP64(ite.itel, ITE_L, DOORBELL, INTID_SPURIOUS); | ||
242 | ite.iteh = FIELD_DP32(ite.iteh, ITE_H, ICID, icid); | ||
243 | |||
244 | - return update_ite(s, eventid, dte, ite) ? CMD_CONTINUE : CMD_STALL; | ||
245 | + return update_ite(s, eventid, &dte, ite) ? CMD_CONTINUE : CMD_STALL; | ||
246 | } | ||
247 | |||
248 | static bool update_cte(GICv3ITSState *s, uint16_t icid, bool valid, | ||
249 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_movi(GICv3ITSState *s, const uint64_t *cmdpkt) | ||
250 | uint16_t old_icid, new_icid; | ||
251 | uint64_t old_cte, new_cte; | ||
252 | uint64_t old_rdbase, new_rdbase; | ||
253 | - uint64_t dte; | ||
254 | - bool dte_valid, ite_valid, cte_valid; | ||
255 | + bool ite_valid, cte_valid; | ||
256 | uint64_t num_eventids; | ||
257 | IteEntry ite = {}; | ||
258 | + DTEntry dte; | ||
259 | |||
260 | devid = FIELD_EX64(cmdpkt[0], MOVI_0, DEVICEID); | ||
261 | eventid = FIELD_EX64(cmdpkt[1], MOVI_1, EVENTID); | ||
262 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_movi(GICv3ITSState *s, const uint64_t *cmdpkt) | ||
263 | __func__, devid, s->dt.num_entries); | ||
264 | return CMD_CONTINUE; | ||
265 | } | ||
266 | - dte = get_dte(s, devid, &res); | ||
267 | - if (res != MEMTX_OK) { | ||
268 | + if (get_dte(s, devid, &dte) != MEMTX_OK) { | ||
269 | return CMD_STALL; | ||
270 | } | ||
271 | |||
272 | - dte_valid = FIELD_EX64(dte, DTE, VALID); | ||
273 | - if (!dte_valid) { | ||
274 | + if (!dte.valid) { | ||
275 | qemu_log_mask(LOG_GUEST_ERROR, | ||
276 | "%s: invalid command attributes: " | ||
277 | - "invalid dte: %"PRIx64" for %d\n", | ||
278 | - __func__, dte, devid); | ||
279 | + "invalid dte for %d\n", __func__, devid); | ||
280 | return CMD_CONTINUE; | ||
281 | } | ||
282 | |||
283 | - num_eventids = 1ULL << (FIELD_EX64(dte, DTE, SIZE) + 1); | ||
284 | + num_eventids = 1ULL << (dte.size + 1); | ||
285 | if (eventid >= num_eventids) { | ||
286 | qemu_log_mask(LOG_GUEST_ERROR, | ||
287 | "%s: invalid command attributes: eventid %d >= %" | ||
288 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_movi(GICv3ITSState *s, const uint64_t *cmdpkt) | ||
289 | return CMD_CONTINUE; | ||
290 | } | ||
291 | |||
292 | - ite_valid = get_ite(s, eventid, dte, &old_icid, &intid, &res); | ||
293 | + ite_valid = get_ite(s, eventid, &dte, &old_icid, &intid, &res); | ||
294 | if (res != MEMTX_OK) { | ||
295 | return CMD_STALL; | ||
296 | } | ||
297 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_movi(GICv3ITSState *s, const uint64_t *cmdpkt) | ||
298 | ite.itel = FIELD_DP64(ite.itel, ITE_L, INTID, intid); | ||
299 | ite.itel = FIELD_DP64(ite.itel, ITE_L, DOORBELL, INTID_SPURIOUS); | ||
300 | ite.iteh = FIELD_DP32(ite.iteh, ITE_H, ICID, new_icid); | ||
301 | - return update_ite(s, eventid, dte, ite) ? CMD_CONTINUE : CMD_STALL; | ||
302 | + return update_ite(s, eventid, &dte, ite) ? CMD_CONTINUE : CMD_STALL; | ||
303 | } | ||
304 | |||
305 | /* | ||
306 | -- | ||
307 | 2.25.1 | ||
308 | |||
309 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | In get_ite() and update_ite() we work with a 12-byte in-guest-memory | ||
2 | table entry, which we intend to handle as an 8-byte value followed by | ||
3 | a 4-byte value. Unfortunately the calculation of the address of the | ||
4 | 4-byte value is wrong, because we write it as: | ||
5 | 1 | ||
6 | table_base_address + (index * entrysize) + 4 | ||
7 | (obfuscated by the way the expression has been written) | ||
8 | |||
9 | when it should be + 8. This bug meant that we overwrote the top | ||
10 | bytes of the 8-byte value with the 4-byte value. There are no | ||
11 | guest-visible effects because the top half of the 8-byte value | ||
12 | contains only the doorbell interrupt field, which is used only in | ||
13 | GICv4, and the two bugs in the "write ITE" and "read ITE" codepaths | ||
14 | cancel each other out. | ||
15 | |||
16 | We can't simply change the calculation, because this would break | ||
17 | migration of a (TCG) guest from the old version of QEMU which had | ||
18 | in-guest-memory interrupt tables written using the buggy version of | ||
19 | update_ite(). We must also at the same time change the layout of the | ||
20 | fields within the ITE_L and ITE_H values so that the in-memory | ||
21 | locations of the fields we care about (VALID, INTTYPE, INTID and | ||
22 | ICID) stay the same. | ||
23 | |||
24 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
25 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
26 | Message-id: 20220201193207.2771604-7-peter.maydell@linaro.org | ||
27 | --- | ||
28 | hw/intc/gicv3_internal.h | 19 ++++++++++--------- | ||
29 | hw/intc/arm_gicv3_its.c | 28 +++++++++++----------------- | ||
30 | 2 files changed, 21 insertions(+), 26 deletions(-) | ||
31 | |||
32 | diff --git a/hw/intc/gicv3_internal.h b/hw/intc/gicv3_internal.h | ||
33 | index XXXXXXX..XXXXXXX 100644 | ||
34 | --- a/hw/intc/gicv3_internal.h | ||
35 | +++ b/hw/intc/gicv3_internal.h | ||
36 | @@ -XXX,XX +XXX,XX @@ FIELD(MOVI_2, ICID, 0, 16) | ||
37 | * 12 bytes Interrupt translation Table Entry size | ||
38 | * as per Table 5.3 in GICv3 spec | ||
39 | * ITE Lower 8 Bytes | ||
40 | - * Bits: | 49 ... 26 | 25 ... 2 | 1 | 0 | | ||
41 | - * Values: | Doorbell | IntNum | IntType | Valid | | ||
42 | + * Bits: | 63 ... 48 | 47 ... 32 | 31 ... 26 | 25 ... 2 | 1 | 0 | | ||
43 | + * Values: | vPEID | ICID | unused | IntNum | IntType | Valid | | ||
44 | * ITE Higher 4 Bytes | ||
45 | - * Bits: | 31 ... 16 | 15 ...0 | | ||
46 | - * Values: | vPEID | ICID | | ||
47 | - * (When Doorbell is unused, as it always is in GICv3, it is 1023) | ||
48 | + * Bits: | 31 ... 25 | 24 ... 0 | | ||
49 | + * Values: | unused | Doorbell | | ||
50 | + * (When Doorbell is unused, as it always is for INTYPE_PHYSICAL, | ||
51 | + * the value of that field in memory cannot be relied upon -- older | ||
52 | + * versions of QEMU did not correctly write to that memory.) | ||
53 | */ | ||
54 | #define ITS_ITT_ENTRY_SIZE 0xC | ||
55 | |||
56 | FIELD(ITE_L, VALID, 0, 1) | ||
57 | FIELD(ITE_L, INTTYPE, 1, 1) | ||
58 | FIELD(ITE_L, INTID, 2, 24) | ||
59 | -FIELD(ITE_L, DOORBELL, 26, 24) | ||
60 | - | ||
61 | -FIELD(ITE_H, ICID, 0, 16) | ||
62 | -FIELD(ITE_H, VPEID, 16, 16) | ||
63 | +FIELD(ITE_L, ICID, 32, 16) | ||
64 | +FIELD(ITE_L, VPEID, 48, 16) | ||
65 | +FIELD(ITE_H, DOORBELL, 0, 24) | ||
66 | |||
67 | /* Possible values for ITE_L INTTYPE */ | ||
68 | #define ITE_INTTYPE_VIRTUAL 0 | ||
69 | diff --git a/hw/intc/arm_gicv3_its.c b/hw/intc/arm_gicv3_its.c | ||
70 | index XXXXXXX..XXXXXXX 100644 | ||
71 | --- a/hw/intc/arm_gicv3_its.c | ||
72 | +++ b/hw/intc/arm_gicv3_its.c | ||
73 | @@ -XXX,XX +XXX,XX @@ static bool update_ite(GICv3ITSState *s, uint32_t eventid, const DTEntry *dte, | ||
74 | { | ||
75 | AddressSpace *as = &s->gicv3->dma_as; | ||
76 | MemTxResult res = MEMTX_OK; | ||
77 | + hwaddr iteaddr = dte->ittaddr + eventid * ITS_ITT_ENTRY_SIZE; | ||
78 | |||
79 | - address_space_stq_le(as, dte->ittaddr + (eventid * (sizeof(uint64_t) + | ||
80 | - sizeof(uint32_t))), ite.itel, MEMTXATTRS_UNSPECIFIED, | ||
81 | - &res); | ||
82 | + address_space_stq_le(as, iteaddr, ite.itel, MEMTXATTRS_UNSPECIFIED, &res); | ||
83 | |||
84 | if (res == MEMTX_OK) { | ||
85 | - address_space_stl_le(as, dte->ittaddr + (eventid * (sizeof(uint64_t) + | ||
86 | - sizeof(uint32_t))) + sizeof(uint32_t), ite.iteh, | ||
87 | + address_space_stl_le(as, iteaddr + 8, ite.iteh, | ||
88 | MEMTXATTRS_UNSPECIFIED, &res); | ||
89 | } | ||
90 | if (res != MEMTX_OK) { | ||
91 | @@ -XXX,XX +XXX,XX @@ static bool get_ite(GICv3ITSState *s, uint32_t eventid, const DTEntry *dte, | ||
92 | AddressSpace *as = &s->gicv3->dma_as; | ||
93 | bool status = false; | ||
94 | IteEntry ite = {}; | ||
95 | + hwaddr iteaddr = dte->ittaddr + eventid * ITS_ITT_ENTRY_SIZE; | ||
96 | |||
97 | - ite.itel = address_space_ldq_le(as, dte->ittaddr + | ||
98 | - (eventid * (sizeof(uint64_t) + | ||
99 | - sizeof(uint32_t))), MEMTXATTRS_UNSPECIFIED, | ||
100 | - res); | ||
101 | + ite.itel = address_space_ldq_le(as, iteaddr, MEMTXATTRS_UNSPECIFIED, res); | ||
102 | |||
103 | if (*res == MEMTX_OK) { | ||
104 | - ite.iteh = address_space_ldl_le(as, dte->ittaddr + | ||
105 | - (eventid * (sizeof(uint64_t) + | ||
106 | - sizeof(uint32_t))) + sizeof(uint32_t), | ||
107 | + ite.iteh = address_space_ldl_le(as, iteaddr + 8, | ||
108 | MEMTXATTRS_UNSPECIFIED, res); | ||
109 | |||
110 | if (*res == MEMTX_OK) { | ||
111 | @@ -XXX,XX +XXX,XX @@ static bool get_ite(GICv3ITSState *s, uint32_t eventid, const DTEntry *dte, | ||
112 | int inttype = FIELD_EX64(ite.itel, ITE_L, INTTYPE); | ||
113 | if (inttype == ITE_INTTYPE_PHYSICAL) { | ||
114 | *pIntid = FIELD_EX64(ite.itel, ITE_L, INTID); | ||
115 | - *icid = FIELD_EX32(ite.iteh, ITE_H, ICID); | ||
116 | + *icid = FIELD_EX64(ite.itel, ITE_L, ICID); | ||
117 | status = true; | ||
118 | } | ||
119 | } | ||
120 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_mapti(GICv3ITSState *s, const uint64_t *cmdpkt, | ||
121 | ite.itel = FIELD_DP64(ite.itel, ITE_L, VALID, true); | ||
122 | ite.itel = FIELD_DP64(ite.itel, ITE_L, INTTYPE, ITE_INTTYPE_PHYSICAL); | ||
123 | ite.itel = FIELD_DP64(ite.itel, ITE_L, INTID, pIntid); | ||
124 | - ite.itel = FIELD_DP64(ite.itel, ITE_L, DOORBELL, INTID_SPURIOUS); | ||
125 | - ite.iteh = FIELD_DP32(ite.iteh, ITE_H, ICID, icid); | ||
126 | + ite.itel = FIELD_DP64(ite.itel, ITE_L, ICID, icid); | ||
127 | + ite.iteh = FIELD_DP32(ite.iteh, ITE_H, DOORBELL, INTID_SPURIOUS); | ||
128 | |||
129 | return update_ite(s, eventid, &dte, ite) ? CMD_CONTINUE : CMD_STALL; | ||
130 | } | ||
131 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_movi(GICv3ITSState *s, const uint64_t *cmdpkt) | ||
132 | ite.itel = FIELD_DP64(ite.itel, ITE_L, VALID, 1); | ||
133 | ite.itel = FIELD_DP64(ite.itel, ITE_L, INTTYPE, ITE_INTTYPE_PHYSICAL); | ||
134 | ite.itel = FIELD_DP64(ite.itel, ITE_L, INTID, intid); | ||
135 | - ite.itel = FIELD_DP64(ite.itel, ITE_L, DOORBELL, INTID_SPURIOUS); | ||
136 | - ite.iteh = FIELD_DP32(ite.iteh, ITE_H, ICID, new_icid); | ||
137 | + ite.itel = FIELD_DP64(ite.itel, ITE_L, ICID, new_icid); | ||
138 | + ite.iteh = FIELD_DP32(ite.iteh, ITE_H, DOORBELL, INTID_SPURIOUS); | ||
139 | return update_ite(s, eventid, &dte, ite) ? CMD_CONTINUE : CMD_STALL; | ||
140 | } | ||
141 | |||
142 | -- | ||
143 | 2.25.1 | ||
144 | |||
145 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | The get_ite() code has some awkward nested if statements; clean | ||
2 | them up by returning early if the memory accesses fail. | ||
3 | 1 | ||
4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
5 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
6 | Message-id: 20220201193207.2771604-8-peter.maydell@linaro.org | ||
7 | --- | ||
8 | hw/intc/arm_gicv3_its.c | 26 ++++++++++++++------------ | ||
9 | 1 file changed, 14 insertions(+), 12 deletions(-) | ||
10 | |||
11 | diff --git a/hw/intc/arm_gicv3_its.c b/hw/intc/arm_gicv3_its.c | ||
12 | index XXXXXXX..XXXXXXX 100644 | ||
13 | --- a/hw/intc/arm_gicv3_its.c | ||
14 | +++ b/hw/intc/arm_gicv3_its.c | ||
15 | @@ -XXX,XX +XXX,XX @@ static bool get_ite(GICv3ITSState *s, uint32_t eventid, const DTEntry *dte, | ||
16 | hwaddr iteaddr = dte->ittaddr + eventid * ITS_ITT_ENTRY_SIZE; | ||
17 | |||
18 | ite.itel = address_space_ldq_le(as, iteaddr, MEMTXATTRS_UNSPECIFIED, res); | ||
19 | + if (*res != MEMTX_OK) { | ||
20 | + return false; | ||
21 | + } | ||
22 | |||
23 | - if (*res == MEMTX_OK) { | ||
24 | - ite.iteh = address_space_ldl_le(as, iteaddr + 8, | ||
25 | - MEMTXATTRS_UNSPECIFIED, res); | ||
26 | + ite.iteh = address_space_ldl_le(as, iteaddr + 8, | ||
27 | + MEMTXATTRS_UNSPECIFIED, res); | ||
28 | + if (*res != MEMTX_OK) { | ||
29 | + return false; | ||
30 | + } | ||
31 | |||
32 | - if (*res == MEMTX_OK) { | ||
33 | - if (FIELD_EX64(ite.itel, ITE_L, VALID)) { | ||
34 | - int inttype = FIELD_EX64(ite.itel, ITE_L, INTTYPE); | ||
35 | - if (inttype == ITE_INTTYPE_PHYSICAL) { | ||
36 | - *pIntid = FIELD_EX64(ite.itel, ITE_L, INTID); | ||
37 | - *icid = FIELD_EX64(ite.itel, ITE_L, ICID); | ||
38 | - status = true; | ||
39 | - } | ||
40 | - } | ||
41 | + if (FIELD_EX64(ite.itel, ITE_L, VALID)) { | ||
42 | + int inttype = FIELD_EX64(ite.itel, ITE_L, INTTYPE); | ||
43 | + if (inttype == ITE_INTTYPE_PHYSICAL) { | ||
44 | + *pIntid = FIELD_EX64(ite.itel, ITE_L, INTID); | ||
45 | + *icid = FIELD_EX64(ite.itel, ITE_L, ICID); | ||
46 | + status = true; | ||
47 | } | ||
48 | } | ||
49 | return status; | ||
50 | -- | ||
51 | 2.25.1 | ||
52 | |||
53 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | In get_ite() we currently return the caller some of the fields of an | ||
2 | Interrupt Table Entry via a set of pointer arguments, and validate | ||
3 | some of them internally (interrupt type and valid bit) to return a | ||
4 | simple true/false 'valid' indication. Define a new ITEntry struct | ||
5 | which has all the fields that the in-memory ITE has, and bring the | ||
6 | get_ite() function in to line with get_dte() and get_cte(). | ||
7 | 1 | ||
8 | This paves the way for handling virtual interrupts, which will want | ||
9 | a different subset of the fields in the ITE. Handling them under | ||
10 | the old "lots of pointer arguments" scheme would have meant a | ||
11 | confusingly large set of arguments for this function. | ||
12 | |||
13 | The new struct ITEntry is obviously confusably similar to the | ||
14 | existing IteEntry struct, whose fields are the raw 12 bytes | ||
15 | of the in-memory ITE. In the next commit we will make update_ite() | ||
16 | use ITEntry instead of IteEntry, which will allow us to delete | ||
17 | the IteEntry struct and remove the confusion. | ||
18 | |||
19 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
20 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
21 | Message-id: 20220201193207.2771604-9-peter.maydell@linaro.org | ||
22 | --- | ||
23 | hw/intc/arm_gicv3_its.c | 102 ++++++++++++++++++++++------------------ | ||
24 | 1 file changed, 55 insertions(+), 47 deletions(-) | ||
25 | |||
26 | diff --git a/hw/intc/arm_gicv3_its.c b/hw/intc/arm_gicv3_its.c | ||
27 | index XXXXXXX..XXXXXXX 100644 | ||
28 | --- a/hw/intc/arm_gicv3_its.c | ||
29 | +++ b/hw/intc/arm_gicv3_its.c | ||
30 | @@ -XXX,XX +XXX,XX @@ typedef struct CTEntry { | ||
31 | uint32_t rdbase; | ||
32 | } CTEntry; | ||
33 | |||
34 | +typedef struct ITEntry { | ||
35 | + bool valid; | ||
36 | + int inttype; | ||
37 | + uint32_t intid; | ||
38 | + uint32_t doorbell; | ||
39 | + uint32_t icid; | ||
40 | + uint32_t vpeid; | ||
41 | +} ITEntry; | ||
42 | + | ||
43 | + | ||
44 | /* | ||
45 | * The ITS spec permits a range of CONSTRAINED UNPREDICTABLE options | ||
46 | * if a command parameter is not correct. These include both "stall | ||
47 | @@ -XXX,XX +XXX,XX @@ static bool update_ite(GICv3ITSState *s, uint32_t eventid, const DTEntry *dte, | ||
48 | } | ||
49 | } | ||
50 | |||
51 | -static bool get_ite(GICv3ITSState *s, uint32_t eventid, const DTEntry *dte, | ||
52 | - uint16_t *icid, uint32_t *pIntid, MemTxResult *res) | ||
53 | +/* | ||
54 | + * Read the Interrupt Table entry at index @eventid from the table specified | ||
55 | + * by the DTE @dte. On success, we return MEMTX_OK and populate the ITEntry | ||
56 | + * struct @ite accordingly. If there is an error reading memory then we return | ||
57 | + * the error code. | ||
58 | + */ | ||
59 | +static MemTxResult get_ite(GICv3ITSState *s, uint32_t eventid, | ||
60 | + const DTEntry *dte, ITEntry *ite) | ||
61 | { | ||
62 | AddressSpace *as = &s->gicv3->dma_as; | ||
63 | - bool status = false; | ||
64 | - IteEntry ite = {}; | ||
65 | + MemTxResult res = MEMTX_OK; | ||
66 | + uint64_t itel; | ||
67 | + uint32_t iteh; | ||
68 | hwaddr iteaddr = dte->ittaddr + eventid * ITS_ITT_ENTRY_SIZE; | ||
69 | |||
70 | - ite.itel = address_space_ldq_le(as, iteaddr, MEMTXATTRS_UNSPECIFIED, res); | ||
71 | - if (*res != MEMTX_OK) { | ||
72 | - return false; | ||
73 | + itel = address_space_ldq_le(as, iteaddr, MEMTXATTRS_UNSPECIFIED, &res); | ||
74 | + if (res != MEMTX_OK) { | ||
75 | + return res; | ||
76 | } | ||
77 | |||
78 | - ite.iteh = address_space_ldl_le(as, iteaddr + 8, | ||
79 | - MEMTXATTRS_UNSPECIFIED, res); | ||
80 | - if (*res != MEMTX_OK) { | ||
81 | - return false; | ||
82 | + iteh = address_space_ldl_le(as, iteaddr + 8, MEMTXATTRS_UNSPECIFIED, &res); | ||
83 | + if (res != MEMTX_OK) { | ||
84 | + return res; | ||
85 | } | ||
86 | |||
87 | - if (FIELD_EX64(ite.itel, ITE_L, VALID)) { | ||
88 | - int inttype = FIELD_EX64(ite.itel, ITE_L, INTTYPE); | ||
89 | - if (inttype == ITE_INTTYPE_PHYSICAL) { | ||
90 | - *pIntid = FIELD_EX64(ite.itel, ITE_L, INTID); | ||
91 | - *icid = FIELD_EX64(ite.itel, ITE_L, ICID); | ||
92 | - status = true; | ||
93 | - } | ||
94 | - } | ||
95 | - return status; | ||
96 | + ite->valid = FIELD_EX64(itel, ITE_L, VALID); | ||
97 | + ite->inttype = FIELD_EX64(itel, ITE_L, INTTYPE); | ||
98 | + ite->intid = FIELD_EX64(itel, ITE_L, INTID); | ||
99 | + ite->icid = FIELD_EX64(itel, ITE_L, ICID); | ||
100 | + ite->vpeid = FIELD_EX64(itel, ITE_L, VPEID); | ||
101 | + ite->doorbell = FIELD_EX64(iteh, ITE_H, DOORBELL); | ||
102 | + return MEMTX_OK; | ||
103 | } | ||
104 | |||
105 | /* | ||
106 | @@ -XXX,XX +XXX,XX @@ static MemTxResult get_dte(GICv3ITSState *s, uint32_t devid, DTEntry *dte) | ||
107 | static ItsCmdResult do_process_its_cmd(GICv3ITSState *s, uint32_t devid, | ||
108 | uint32_t eventid, ItsCmdType cmd) | ||
109 | { | ||
110 | - MemTxResult res = MEMTX_OK; | ||
111 | uint64_t num_eventids; | ||
112 | - uint16_t icid = 0; | ||
113 | - uint32_t pIntid = 0; | ||
114 | - bool ite_valid = false; | ||
115 | DTEntry dte; | ||
116 | CTEntry cte; | ||
117 | + ITEntry ite; | ||
118 | |||
119 | if (devid >= s->dt.num_entries) { | ||
120 | qemu_log_mask(LOG_GUEST_ERROR, | ||
121 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult do_process_its_cmd(GICv3ITSState *s, uint32_t devid, | ||
122 | return CMD_CONTINUE; | ||
123 | } | ||
124 | |||
125 | - ite_valid = get_ite(s, eventid, &dte, &icid, &pIntid, &res); | ||
126 | - if (res != MEMTX_OK) { | ||
127 | + if (get_ite(s, eventid, &dte, &ite) != MEMTX_OK) { | ||
128 | return CMD_STALL; | ||
129 | } | ||
130 | |||
131 | - if (!ite_valid) { | ||
132 | + if (!ite.valid || ite.inttype != ITE_INTTYPE_PHYSICAL) { | ||
133 | qemu_log_mask(LOG_GUEST_ERROR, | ||
134 | "%s: invalid command attributes: invalid ITE\n", | ||
135 | __func__); | ||
136 | return CMD_CONTINUE; | ||
137 | } | ||
138 | |||
139 | - if (icid >= s->ct.num_entries) { | ||
140 | + if (ite.icid >= s->ct.num_entries) { | ||
141 | qemu_log_mask(LOG_GUEST_ERROR, | ||
142 | "%s: invalid ICID 0x%x in ITE (table corrupted?)\n", | ||
143 | - __func__, icid); | ||
144 | + __func__, ite.icid); | ||
145 | return CMD_CONTINUE; | ||
146 | } | ||
147 | |||
148 | - if (get_cte(s, icid, &cte) != MEMTX_OK) { | ||
149 | + if (get_cte(s, ite.icid, &cte) != MEMTX_OK) { | ||
150 | return CMD_STALL; | ||
151 | } | ||
152 | if (!cte.valid) { | ||
153 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult do_process_its_cmd(GICv3ITSState *s, uint32_t devid, | ||
154 | } | ||
155 | |||
156 | if ((cmd == CLEAR) || (cmd == DISCARD)) { | ||
157 | - gicv3_redist_process_lpi(&s->gicv3->cpu[cte.rdbase], pIntid, 0); | ||
158 | + gicv3_redist_process_lpi(&s->gicv3->cpu[cte.rdbase], ite.intid, 0); | ||
159 | } else { | ||
160 | - gicv3_redist_process_lpi(&s->gicv3->cpu[cte.rdbase], pIntid, 1); | ||
161 | + gicv3_redist_process_lpi(&s->gicv3->cpu[cte.rdbase], ite.intid, 1); | ||
162 | } | ||
163 | |||
164 | if (cmd == DISCARD) { | ||
165 | - IteEntry ite = {}; | ||
166 | + IteEntry itee = {}; | ||
167 | /* remove mapping from interrupt translation table */ | ||
168 | - return update_ite(s, eventid, &dte, ite) ? CMD_CONTINUE : CMD_STALL; | ||
169 | + return update_ite(s, eventid, &dte, itee) ? CMD_CONTINUE : CMD_STALL; | ||
170 | } | ||
171 | return CMD_CONTINUE; | ||
172 | } | ||
173 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_movall(GICv3ITSState *s, const uint64_t *cmdpkt) | ||
174 | |||
175 | static ItsCmdResult process_movi(GICv3ITSState *s, const uint64_t *cmdpkt) | ||
176 | { | ||
177 | - MemTxResult res = MEMTX_OK; | ||
178 | - uint32_t devid, eventid, intid; | ||
179 | - uint16_t old_icid, new_icid; | ||
180 | - bool ite_valid; | ||
181 | + uint32_t devid, eventid; | ||
182 | + uint16_t new_icid; | ||
183 | uint64_t num_eventids; | ||
184 | IteEntry ite = {}; | ||
185 | DTEntry dte; | ||
186 | CTEntry old_cte, new_cte; | ||
187 | + ITEntry old_ite; | ||
188 | |||
189 | devid = FIELD_EX64(cmdpkt[0], MOVI_0, DEVICEID); | ||
190 | eventid = FIELD_EX64(cmdpkt[1], MOVI_1, EVENTID); | ||
191 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_movi(GICv3ITSState *s, const uint64_t *cmdpkt) | ||
192 | return CMD_CONTINUE; | ||
193 | } | ||
194 | |||
195 | - ite_valid = get_ite(s, eventid, &dte, &old_icid, &intid, &res); | ||
196 | - if (res != MEMTX_OK) { | ||
197 | + if (get_ite(s, eventid, &dte, &old_ite) != MEMTX_OK) { | ||
198 | return CMD_STALL; | ||
199 | } | ||
200 | |||
201 | - if (!ite_valid) { | ||
202 | + if (!old_ite.valid || old_ite.inttype != ITE_INTTYPE_PHYSICAL) { | ||
203 | qemu_log_mask(LOG_GUEST_ERROR, | ||
204 | "%s: invalid command attributes: invalid ITE\n", | ||
205 | __func__); | ||
206 | return CMD_CONTINUE; | ||
207 | } | ||
208 | |||
209 | - if (old_icid >= s->ct.num_entries) { | ||
210 | + if (old_ite.icid >= s->ct.num_entries) { | ||
211 | qemu_log_mask(LOG_GUEST_ERROR, | ||
212 | "%s: invalid ICID 0x%x in ITE (table corrupted?)\n", | ||
213 | - __func__, old_icid); | ||
214 | + __func__, old_ite.icid); | ||
215 | return CMD_CONTINUE; | ||
216 | } | ||
217 | |||
218 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_movi(GICv3ITSState *s, const uint64_t *cmdpkt) | ||
219 | return CMD_CONTINUE; | ||
220 | } | ||
221 | |||
222 | - if (get_cte(s, old_icid, &old_cte) != MEMTX_OK) { | ||
223 | + if (get_cte(s, old_ite.icid, &old_cte) != MEMTX_OK) { | ||
224 | return CMD_STALL; | ||
225 | } | ||
226 | if (!old_cte.valid) { | ||
227 | qemu_log_mask(LOG_GUEST_ERROR, | ||
228 | "%s: invalid command attributes: " | ||
229 | "invalid CTE for old ICID 0x%x\n", | ||
230 | - __func__, old_icid); | ||
231 | + __func__, old_ite.icid); | ||
232 | return CMD_CONTINUE; | ||
233 | } | ||
234 | |||
235 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_movi(GICv3ITSState *s, const uint64_t *cmdpkt) | ||
236 | /* Move the LPI from the old redistributor to the new one */ | ||
237 | gicv3_redist_mov_lpi(&s->gicv3->cpu[old_cte.rdbase], | ||
238 | &s->gicv3->cpu[new_cte.rdbase], | ||
239 | - intid); | ||
240 | + old_ite.intid); | ||
241 | } | ||
242 | |||
243 | /* Update the ICID field in the interrupt translation table entry */ | ||
244 | ite.itel = FIELD_DP64(ite.itel, ITE_L, VALID, 1); | ||
245 | ite.itel = FIELD_DP64(ite.itel, ITE_L, INTTYPE, ITE_INTTYPE_PHYSICAL); | ||
246 | - ite.itel = FIELD_DP64(ite.itel, ITE_L, INTID, intid); | ||
247 | + ite.itel = FIELD_DP64(ite.itel, ITE_L, INTID, old_ite.intid); | ||
248 | ite.itel = FIELD_DP64(ite.itel, ITE_L, ICID, new_icid); | ||
249 | ite.iteh = FIELD_DP32(ite.iteh, ITE_H, DOORBELL, INTID_SPURIOUS); | ||
250 | return update_ite(s, eventid, &dte, ite) ? CMD_CONTINUE : CMD_STALL; | ||
251 | -- | ||
252 | 2.25.1 | ||
253 | |||
254 | diff view generated by jsdifflib |
Deleted patch | |||
---|---|---|---|
1 | Currently we track in the TableDesc and CmdQDesc structs the state of | ||
2 | the GITS_BASER<n> and GITS_CBASER Valid bits. However we aren't very | ||
3 | consistent abut checking the valid field: we test it in update_cte() | ||
4 | and update_dte(), but not anywhere else we look things up in tables. | ||
5 | 1 | ||
6 | The GIC specification says that it is UNPREDICTABLE if a guest fails | ||
7 | to set any of these Valid bits before enabling the ITS via | ||
8 | GITS_CTLR.Enabled. So we can choose to handle Valid == 0 as | ||
9 | equivalent to a zero-length table. This is in fact how we're already | ||
10 | catching this case in most of the table-access paths: when Valid is 0 | ||
11 | we leave the num_entries fields in TableDesc or CmdQDesc set to zero, | ||
12 | and then the out-of-bounds check "index >= num_entries" that we have | ||
13 | to do anyway before doing any of these table lookups will always be | ||
14 | true, catching the no-valid-table case without any extra code. | ||
15 | |||
16 | So we can remove the checks on the valid field from update_cte() | ||
17 | and update_dte(): since these happen after the bounds check there | ||
18 | was never any case when the test could fail. That means the valid | ||
19 | fields would be entirely unused, so just remove them. | ||
20 | |||
21 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
22 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
23 | Message-id: 20220201193207.2771604-11-peter.maydell@linaro.org | ||
24 | --- | ||
25 | include/hw/intc/arm_gicv3_its_common.h | 2 -- | ||
26 | hw/intc/arm_gicv3_its.c | 31 ++++++++++++-------------- | ||
27 | 2 files changed, 14 insertions(+), 19 deletions(-) | ||
28 | |||
29 | diff --git a/include/hw/intc/arm_gicv3_its_common.h b/include/hw/intc/arm_gicv3_its_common.h | ||
30 | index XXXXXXX..XXXXXXX 100644 | ||
31 | --- a/include/hw/intc/arm_gicv3_its_common.h | ||
32 | +++ b/include/hw/intc/arm_gicv3_its_common.h | ||
33 | @@ -XXX,XX +XXX,XX @@ | ||
34 | #define GITS_TRANSLATER 0x0040 | ||
35 | |||
36 | typedef struct { | ||
37 | - bool valid; | ||
38 | bool indirect; | ||
39 | uint16_t entry_sz; | ||
40 | uint32_t page_sz; | ||
41 | @@ -XXX,XX +XXX,XX @@ typedef struct { | ||
42 | } TableDesc; | ||
43 | |||
44 | typedef struct { | ||
45 | - bool valid; | ||
46 | uint32_t num_entries; | ||
47 | uint64_t base_addr; | ||
48 | } CmdQDesc; | ||
49 | diff --git a/hw/intc/arm_gicv3_its.c b/hw/intc/arm_gicv3_its.c | ||
50 | index XXXXXXX..XXXXXXX 100644 | ||
51 | --- a/hw/intc/arm_gicv3_its.c | ||
52 | +++ b/hw/intc/arm_gicv3_its.c | ||
53 | @@ -XXX,XX +XXX,XX @@ static bool update_cte(GICv3ITSState *s, uint16_t icid, const CTEntry *cte) | ||
54 | uint64_t cteval = 0; | ||
55 | MemTxResult res = MEMTX_OK; | ||
56 | |||
57 | - if (!s->ct.valid) { | ||
58 | - return true; | ||
59 | - } | ||
60 | - | ||
61 | if (cte->valid) { | ||
62 | /* add mapping entry to collection table */ | ||
63 | cteval = FIELD_DP64(cteval, CTE, VALID, 1); | ||
64 | @@ -XXX,XX +XXX,XX @@ static bool update_dte(GICv3ITSState *s, uint32_t devid, const DTEntry *dte) | ||
65 | uint64_t dteval = 0; | ||
66 | MemTxResult res = MEMTX_OK; | ||
67 | |||
68 | - if (s->dt.valid) { | ||
69 | - if (dte->valid) { | ||
70 | - /* add mapping entry to device table */ | ||
71 | - dteval = FIELD_DP64(dteval, DTE, VALID, 1); | ||
72 | - dteval = FIELD_DP64(dteval, DTE, SIZE, dte->size); | ||
73 | - dteval = FIELD_DP64(dteval, DTE, ITTADDR, dte->ittaddr); | ||
74 | - } | ||
75 | - } else { | ||
76 | - return true; | ||
77 | + if (dte->valid) { | ||
78 | + /* add mapping entry to device table */ | ||
79 | + dteval = FIELD_DP64(dteval, DTE, VALID, 1); | ||
80 | + dteval = FIELD_DP64(dteval, DTE, SIZE, dte->size); | ||
81 | + dteval = FIELD_DP64(dteval, DTE, ITTADDR, dte->ittaddr); | ||
82 | } | ||
83 | |||
84 | entry_addr = table_entry_addr(s, &s->dt, devid, &res); | ||
85 | @@ -XXX,XX +XXX,XX @@ static void extract_table_params(GICv3ITSState *s) | ||
86 | } | ||
87 | |||
88 | memset(td, 0, sizeof(*td)); | ||
89 | - td->valid = FIELD_EX64(value, GITS_BASER, VALID); | ||
90 | /* | ||
91 | * If GITS_BASER<n>.Valid is 0 for any <n> then we will not process | ||
92 | * interrupts. (GITS_TYPER.HCC is 0 for this implementation, so we | ||
93 | @@ -XXX,XX +XXX,XX @@ static void extract_table_params(GICv3ITSState *s) | ||
94 | * for the register corresponding to the Collection table but we | ||
95 | * still have to process interrupts using non-memory-backed | ||
96 | * Collection table entries.) | ||
97 | + * The specification makes it UNPREDICTABLE to enable the ITS without | ||
98 | + * marking each BASER<n> as valid. We choose to handle these as if | ||
99 | + * the table was zero-sized, so commands using the table will fail | ||
100 | + * and interrupts requested via GITS_TRANSLATER writes will be ignored. | ||
101 | + * This happens automatically by leaving the num_entries field at | ||
102 | + * zero, which will be caught by the bounds checks we have before | ||
103 | + * every table lookup anyway. | ||
104 | */ | ||
105 | - if (!td->valid) { | ||
106 | + if (!FIELD_EX64(value, GITS_BASER, VALID)) { | ||
107 | continue; | ||
108 | } | ||
109 | td->page_sz = page_sz; | ||
110 | @@ -XXX,XX +XXX,XX @@ static void extract_cmdq_params(GICv3ITSState *s) | ||
111 | num_pages = FIELD_EX64(value, GITS_CBASER, SIZE) + 1; | ||
112 | |||
113 | memset(&s->cq, 0 , sizeof(s->cq)); | ||
114 | - s->cq.valid = FIELD_EX64(value, GITS_CBASER, VALID); | ||
115 | |||
116 | - if (s->cq.valid) { | ||
117 | + if (FIELD_EX64(value, GITS_CBASER, VALID)) { | ||
118 | s->cq.num_entries = (num_pages * GITS_PAGE_SIZE_4K) / | ||
119 | GITS_CMDQ_ENTRY_SIZE; | ||
120 | s->cq.base_addr = FIELD_EX64(value, GITS_CBASER, PHYADDR); | ||
121 | -- | ||
122 | 2.25.1 | ||
123 | |||
124 | diff view generated by jsdifflib |
1 | In the MAPC command, if V=0 this is a request to delete a collection | 1 | We want to capture potential Rust backtraces on panics in our test |
---|---|---|---|
2 | table entry and the rdbase field of the command packet will not be | 2 | logs, which isn't Rust's default behaviour. Set RUST_BACKTRACE=1 in |
3 | used. In particular, the specification says that the "UNPREDICTABLE | 3 | the add_test_setup environments, so that all our tests get run with |
4 | if rdbase is not valid" only applies for V=1. | 4 | this environment variable set. |
5 | 5 | ||
6 | We were doing a check-and-log-guest-error on rdbase regardless of | 6 | This makes the setting of that variable in the gitlab CI template |
7 | whether the V bit was set, and also (harmlessly but confusingly) | 7 | redundant, so we can remove it. |
8 | storing the contents of the rdbase field into the updated collection | ||
9 | table entry. Update the code so that if V=0 we don't check or use | ||
10 | the rdbase field value. | ||
11 | 8 | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
13 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 10 | Reviewed-by: Daniel P. Berrangé <berrange@redhat.com> |
14 | Message-id: 20220201193207.2771604-12-peter.maydell@linaro.org | 11 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> |
12 | Message-id: 20250310102950.3752908-1-peter.maydell@linaro.org | ||
15 | --- | 13 | --- |
16 | hw/intc/arm_gicv3_its.c | 24 ++++++++++++------------ | 14 | meson.build | 9 ++++++--- |
17 | 1 file changed, 12 insertions(+), 12 deletions(-) | 15 | .gitlab-ci.d/buildtest-template.yml | 1 - |
16 | 2 files changed, 6 insertions(+), 4 deletions(-) | ||
18 | 17 | ||
19 | diff --git a/hw/intc/arm_gicv3_its.c b/hw/intc/arm_gicv3_its.c | 18 | diff --git a/meson.build b/meson.build |
20 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
21 | --- a/hw/intc/arm_gicv3_its.c | 20 | --- a/meson.build |
22 | +++ b/hw/intc/arm_gicv3_its.c | 21 | +++ b/meson.build |
23 | @@ -XXX,XX +XXX,XX @@ static ItsCmdResult process_mapc(GICv3ITSState *s, const uint64_t *cmdpkt) | 22 | @@ -XXX,XX +XXX,XX @@ project('qemu', ['c'], meson_version: '>=1.5.0', |
24 | CTEntry cte; | 23 | |
25 | 24 | meson.add_devenv({ 'MESON_BUILD_ROOT' : meson.project_build_root() }) | |
26 | icid = cmdpkt[2] & ICID_MASK; | 25 | |
27 | - | 26 | -add_test_setup('quick', exclude_suites: ['slow', 'thorough'], is_default: true) |
28 | - cte.rdbase = (cmdpkt[2] & R_MAPC_RDBASE_MASK) >> R_MAPC_RDBASE_SHIFT; | 27 | -add_test_setup('slow', exclude_suites: ['thorough'], env: ['G_TEST_SLOW=1', 'SPEED=slow']) |
29 | - cte.rdbase &= RDBASE_PROCNUM_MASK; | 28 | -add_test_setup('thorough', env: ['G_TEST_SLOW=1', 'SPEED=thorough']) |
30 | - | 29 | +add_test_setup('quick', exclude_suites: ['slow', 'thorough'], is_default: true, |
31 | cte.valid = cmdpkt[2] & CMD_FIELD_VALID_MASK; | 30 | + env: ['RUST_BACKTRACE=1']) |
32 | + if (cte.valid) { | 31 | +add_test_setup('slow', exclude_suites: ['thorough'], |
33 | + cte.rdbase = (cmdpkt[2] & R_MAPC_RDBASE_MASK) >> R_MAPC_RDBASE_SHIFT; | 32 | + env: ['G_TEST_SLOW=1', 'SPEED=slow', 'RUST_BACKTRACE=1']) |
34 | + cte.rdbase &= RDBASE_PROCNUM_MASK; | 33 | +add_test_setup('thorough', |
35 | + } else { | 34 | + env: ['G_TEST_SLOW=1', 'SPEED=thorough', 'RUST_BACKTRACE=1']) |
36 | + cte.rdbase = 0; | 35 | |
37 | + } | 36 | meson.add_postconf_script(find_program('scripts/symlink-install-tree.py')) |
38 | 37 | ||
39 | - if ((icid >= s->ct.num_entries) || (cte.rdbase >= s->gicv3->num_cpu)) { | 38 | diff --git a/.gitlab-ci.d/buildtest-template.yml b/.gitlab-ci.d/buildtest-template.yml |
40 | + if (icid >= s->ct.num_entries) { | 39 | index XXXXXXX..XXXXXXX 100644 |
41 | + qemu_log_mask(LOG_GUEST_ERROR, "ITS MAPC: invalid ICID 0x%d", icid); | 40 | --- a/.gitlab-ci.d/buildtest-template.yml |
42 | + return CMD_CONTINUE; | 41 | +++ b/.gitlab-ci.d/buildtest-template.yml |
43 | + } | 42 | @@ -XXX,XX +XXX,XX @@ |
44 | + if (cte.valid && cte.rdbase >= s->gicv3->num_cpu) { | 43 | stage: test |
45 | qemu_log_mask(LOG_GUEST_ERROR, | 44 | image: $CI_REGISTRY_IMAGE/qemu/$IMAGE:$QEMU_CI_CONTAINER_TAG |
46 | - "ITS MAPC: invalid collection table attributes " | 45 | script: |
47 | - "icid %d rdbase %u\n", icid, cte.rdbase); | 46 | - - export RUST_BACKTRACE=1 |
48 | - /* | 47 | - source scripts/ci/gitlab-ci-section |
49 | - * in this implementation, in case of error | 48 | - section_start buildenv "Setting up to run tests" |
50 | - * we ignore this command and move onto the next | 49 | - scripts/git-submodule.sh update roms/SLOF |
51 | - * command in the queue | ||
52 | - */ | ||
53 | + "ITS MAPC: invalid RDBASE %u ", cte.rdbase); | ||
54 | return CMD_CONTINUE; | ||
55 | } | ||
56 | |||
57 | -- | 50 | -- |
58 | 2.25.1 | 51 | 2.43.0 |
59 | 52 | ||
60 | 53 | diff view generated by jsdifflib |