1
The following changes since commit 64ada298b98a51eb2512607f6e6180cb330c47b1:
1
Hi; here's the latest round of arm patches. I have included also
2
my patchset for the RTC devices to avoid keeping time_t and
3
time_t diffs in 32-bit variables.
2
4
3
Merge remote-tracking branch 'remotes/legoater/tags/pull-ppc-20220302' into staging (2022-03-02 12:38:46 +0000)
5
thanks
6
-- PMM
7
8
The following changes since commit 156618d9ea67f2f2e31d9dedd97f2dcccbe6808c:
9
10
Merge tag 'block-pull-request' of https://gitlab.com/stefanha/qemu into staging (2023-08-30 09:20:27 -0400)
4
11
5
are available in the Git repository at:
12
are available in the Git repository at:
6
13
7
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20220302
14
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20230831
8
15
9
for you to fetch changes up to 268c11984e67867c22f53beb3c7f8b98900d66b2:
16
for you to fetch changes up to e73b8bb8a3e9a162f70e9ffbf922d4fafc96bbfb:
10
17
11
ui/cocoa.m: Remove unnecessary NSAutoreleasePools (2022-03-02 19:27:37 +0000)
18
hw/arm: Set number of MPU regions correctly for an505, an521, an524 (2023-08-31 11:07:02 +0100)
12
19
13
----------------------------------------------------------------
20
----------------------------------------------------------------
14
target-arm queue:
21
target-arm queue:
15
* mps3-an547: Add missing user ahb interfaces
22
* Some of the preliminary patches for Cortex-A710 support
16
* hw/arm/mps2-tz.c: Update AN547 documentation URL
23
* i.MX7 and i.MX6UL refactoring
17
* hw/input/tsc210x: Don't abort on bad SPI word widths
24
* Implement SRC device for i.MX7
18
* hw/i2c: flatten pca954x mux device
25
* Catch illegal-exception-return from EL3 with bad NSE/NS
19
* target/arm: Support PSCI 1.1 and SMCCC 1.0
26
* Use 64-bit offsets for holding time_t differences in RTC devices
20
* target/arm: Fix early free of TCG temp in handle_simd_shift_fpint_conv()
27
* Model correct number of MPU regions for an505, an521, an524 boards
21
* tests/qtest: add qtests for npcm7xx sdhci
22
* Implement FEAT_LVA
23
* Implement FEAT_LPA
24
* Implement FEAT_LPA2 (but do not enable it yet)
25
* Report KVM's actual PSCI version to guest in dtb
26
* ui/cocoa.m: Fix updateUIInfo threading issues
27
* ui/cocoa.m: Remove unnecessary NSAutoreleasePools
28
28
29
----------------------------------------------------------------
29
----------------------------------------------------------------
30
Akihiko Odaki (1):
30
Alex Bennée (1):
31
target/arm: Support PSCI 1.1 and SMCCC 1.0
31
target/arm: properly document FEAT_CRC32
32
32
33
Jimmy Brisson (1):
33
Jean-Christophe Dubois (6):
34
mps3-an547: Add missing user ahb interfaces
34
Remove i.MX7 IOMUX GPR device from i.MX6UL
35
Refactor i.MX6UL processor code
36
Add i.MX6UL missing devices.
37
Refactor i.MX7 processor code
38
Add i.MX7 missing TZ devices and memory regions
39
Add i.MX7 SRC device implementation
35
40
36
Patrick Venture (1):
41
Peter Maydell (8):
37
hw/i2c: flatten pca954x mux device
42
target/arm: Catch illegal-exception-return from EL3 with bad NSE/NS
43
hw/rtc/m48t59: Use 64-bit arithmetic in set_alarm()
44
hw/rtc/twl92230: Use int64_t for sec_offset and alm_sec
45
hw/rtc/aspeed_rtc: Use 64-bit offset for holding time_t difference
46
rtc: Use time_t for passing and returning time offsets
47
target/arm: Do all "ARM_FEATURE_X implies Y" checks in post_init
48
hw/arm/armv7m: Add mpu-ns-regions and mpu-s-regions properties
49
hw/arm: Set number of MPU regions correctly for an505, an521, an524
38
50
39
Peter Maydell (5):
51
Richard Henderson (9):
40
hw/arm/mps2-tz.c: Update AN547 documentation URL
52
target/arm: Reduce dcz_blocksize to uint8_t
41
hw/input/tsc210x: Don't abort on bad SPI word widths
53
target/arm: Allow cpu to configure GM blocksize
42
target/arm: Report KVM's actual PSCI version to guest in dtb
54
target/arm: Support more GM blocksizes
43
ui/cocoa.m: Fix updateUIInfo threading issues
55
target/arm: When tag memory is not present, set MTE=1
44
ui/cocoa.m: Remove unnecessary NSAutoreleasePools
56
target/arm: Introduce make_ccsidr64
57
target/arm: Apply access checks to neoverse-n1 special registers
58
target/arm: Apply access checks to neoverse-v1 special registers
59
target/arm: Suppress FEAT_TRBE (Trace Buffer Extension)
60
target/arm: Implement FEAT_HPDS2 as a no-op
45
61
46
Richard Henderson (16):
62
docs/system/arm/emulation.rst | 2 +
47
hw/registerfields: Add FIELD_SEX<N> and FIELD_SDP<N>
63
include/hw/arm/armsse.h | 5 +
48
target/arm: Set TCR_EL1.TSZ for user-only
64
include/hw/arm/armv7m.h | 8 +
49
target/arm: Fault on invalid TCR_ELx.TxSZ
65
include/hw/arm/fsl-imx6ul.h | 158 ++++++++++++++++---
50
target/arm: Move arm_pamax out of line
66
include/hw/arm/fsl-imx7.h | 338 ++++++++++++++++++++++++++++++-----------
51
target/arm: Pass outputsize down to check_s2_mmu_setup
67
include/hw/misc/imx7_src.h | 66 ++++++++
52
target/arm: Use MAKE_64BIT_MASK to compute indexmask
68
include/hw/rtc/aspeed_rtc.h | 2 +-
53
target/arm: Honor TCR_ELx.{I}PS
69
include/sysemu/rtc.h | 4 +-
54
target/arm: Prepare DBGBVR and DBGWVR for FEAT_LVA
70
target/arm/cpregs.h | 2 +
55
target/arm: Implement FEAT_LVA
71
target/arm/cpu.h | 5 +-
56
target/arm: Implement FEAT_LPA
72
target/arm/internals.h | 6 -
57
target/arm: Extend arm_fi_to_lfsc to level -1
73
target/arm/tcg/translate.h | 2 +
58
target/arm: Introduce tlbi_aa64_get_range
74
hw/arm/armsse.c | 16 ++
59
target/arm: Fix TLBIRange.base for 16k and 64k pages
75
hw/arm/armv7m.c | 21 +++
60
target/arm: Validate tlbi TG matches translation granule in use
76
hw/arm/fsl-imx6ul.c | 174 +++++++++++++--------
61
target/arm: Advertise all page sizes for -cpu max
77
hw/arm/fsl-imx7.c | 201 +++++++++++++++++++-----
62
target/arm: Implement FEAT_LPA2
78
hw/arm/mps2-tz.c | 29 ++++
79
hw/misc/imx7_src.c | 276 +++++++++++++++++++++++++++++++++
80
hw/rtc/aspeed_rtc.c | 5 +-
81
hw/rtc/m48t59.c | 2 +-
82
hw/rtc/twl92230.c | 4 +-
83
softmmu/rtc.c | 4 +-
84
target/arm/cpu.c | 207 ++++++++++++++-----------
85
target/arm/helper.c | 15 +-
86
target/arm/tcg/cpu32.c | 2 +-
87
target/arm/tcg/cpu64.c | 102 +++++++++----
88
target/arm/tcg/helper-a64.c | 9 ++
89
target/arm/tcg/mte_helper.c | 90 ++++++++---
90
target/arm/tcg/translate-a64.c | 5 +-
91
hw/misc/meson.build | 1 +
92
hw/misc/trace-events | 4 +
93
31 files changed, 1393 insertions(+), 372 deletions(-)
94
create mode 100644 include/hw/misc/imx7_src.h
95
create mode 100644 hw/misc/imx7_src.c
63
96
64
Shengtan Mao (1):
65
tests/qtest: add qtests for npcm7xx sdhci
66
67
Wentao_Liang (1):
68
target/arm: Fix early free of TCG temp in handle_simd_shift_fpint_conv()
69
70
docs/system/arm/emulation.rst | 3 +
71
include/hw/registerfields.h | 48 +++++-
72
target/arm/cpu-param.h | 4 +-
73
target/arm/cpu.h | 27 ++++
74
target/arm/internals.h | 58 ++++---
75
target/arm/kvm-consts.h | 14 +-
76
hw/arm/boot.c | 11 +-
77
hw/arm/mps2-tz.c | 6 +-
78
hw/i2c/i2c_mux_pca954x.c | 77 ++-------
79
hw/input/tsc210x.c | 8 +-
80
target/arm/cpu.c | 8 +-
81
target/arm/cpu64.c | 7 +-
82
target/arm/helper.c | 332 ++++++++++++++++++++++++++++++---------
83
target/arm/hvf/hvf.c | 27 +++-
84
target/arm/kvm64.c | 14 +-
85
target/arm/psci.c | 35 ++++-
86
target/arm/translate-a64.c | 2 +-
87
tests/qtest/npcm7xx_sdhci-test.c | 215 +++++++++++++++++++++++++
88
tests/qtest/meson.build | 1 +
89
ui/cocoa.m | 31 ++--
90
20 files changed, 736 insertions(+), 192 deletions(-)
91
create mode 100644 tests/qtest/npcm7xx_sdhci-test.c
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
For FEAT_LPA2, we will need other ARMVAParameters, which themselves
3
This value is only 4 bits wide.
4
depend on the translation granule in use. We might as well validate
5
that the given TG matches; the architecture "does not require that
6
the instruction invalidates any entries" if this is not true.
7
4
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
5
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
10
Message-id: 20220301215958.157011-15-richard.henderson@linaro.org
7
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
8
Message-id: 20230811214031.171020-2-richard.henderson@linaro.org
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
10
---
13
target/arm/helper.c | 10 +++++++---
11
target/arm/cpu.h | 3 ++-
14
1 file changed, 7 insertions(+), 3 deletions(-)
12
1 file changed, 2 insertions(+), 1 deletion(-)
15
13
16
diff --git a/target/arm/helper.c b/target/arm/helper.c
14
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
17
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
18
--- a/target/arm/helper.c
16
--- a/target/arm/cpu.h
19
+++ b/target/arm/helper.c
17
+++ b/target/arm/cpu.h
20
@@ -XXX,XX +XXX,XX @@ static TLBIRange tlbi_aa64_get_range(CPUARMState *env, ARMMMUIdx mmuidx,
18
@@ -XXX,XX +XXX,XX @@ struct ArchCPU {
21
uint64_t value)
19
bool prop_lpa2;
22
{
20
23
unsigned int page_size_granule, page_shift, num, scale, exponent;
21
/* DCZ blocksize, in log_2(words), ie low 4 bits of DCZID_EL0 */
24
+ /* Extract one bit to represent the va selector in use. */
22
- uint32_t dcz_blocksize;
25
+ uint64_t select = sextract64(value, 36, 1);
23
+ uint8_t dcz_blocksize;
26
+ ARMVAParameters param = aa64_va_parameters(env, select, mmuidx, true);
24
+
27
TLBIRange ret = { };
25
uint64_t rvbar_prop; /* Property/input signals. */
28
26
29
page_size_granule = extract64(value, 46, 2);
27
/* Configurable aspects of GIC cpu interface (which is part of the CPU) */
30
31
- if (page_size_granule == 0) {
32
- qemu_log_mask(LOG_GUEST_ERROR, "Invalid page size granule %d\n",
33
+ /* The granule encoded in value must match the granule in use. */
34
+ if (page_size_granule != (param.using64k ? 3 : param.using16k ? 2 : 1)) {
35
+ qemu_log_mask(LOG_GUEST_ERROR, "Invalid tlbi page size granule %d\n",
36
page_size_granule);
37
return ret;
38
}
39
@@ -XXX,XX +XXX,XX @@ static TLBIRange tlbi_aa64_get_range(CPUARMState *env, ARMMMUIdx mmuidx,
40
41
ret.length = (num + 1) << (exponent + page_shift);
42
43
- if (regime_has_2_ranges(mmuidx)) {
44
+ if (param.select) {
45
ret.base = sextract64(value, 0, 37);
46
} else {
47
ret.base = extract64(value, 0, 37);
48
--
28
--
49
2.25.1
29
2.34.1
30
31
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
This feature widens physical addresses (and intermediate physical
3
Previously we hard-coded the blocksize with GMID_EL1_BS.
4
addresses for 2-stage translation) from 48 to 52 bits, when using
4
But the value we choose for -cpu max does not match the
5
4k or 16k pages.
5
value that cortex-a710 uses.
6
6
7
This introduces the DS bit to TCR_ELx, which is RES0 unless the
7
Mirror the way we handle dcz_blocksize.
8
page size is enabled and supports LPA2, resulting in the effective
9
value of DS for a given table walk. The DS bit changes the format
10
of the page table descriptor slightly, moving the PS field out to
11
TCR so that all pages have the same sharability and repurposing
12
those bits of the page table descriptor for the highest bits of
13
the output address.
14
15
Do not yet enable FEAT_LPA2; we need extra plumbing to avoid
16
tickling an old kernel bug.
17
8
18
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
19
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
10
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
20
Message-id: 20220301215958.157011-17-richard.henderson@linaro.org
11
Message-id: 20230811214031.171020-3-richard.henderson@linaro.org
21
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
22
---
13
---
23
docs/system/arm/emulation.rst | 1 +
14
target/arm/cpu.h | 2 ++
24
target/arm/cpu.h | 22 ++++++++
15
target/arm/internals.h | 6 -----
25
target/arm/internals.h | 2 +
16
target/arm/tcg/translate.h | 2 ++
26
target/arm/helper.c | 102 +++++++++++++++++++++++++++++-----
17
target/arm/helper.c | 11 +++++---
27
4 files changed, 112 insertions(+), 15 deletions(-)
18
target/arm/tcg/cpu64.c | 1 +
28
19
target/arm/tcg/mte_helper.c | 46 ++++++++++++++++++++++------------
29
diff --git a/docs/system/arm/emulation.rst b/docs/system/arm/emulation.rst
20
target/arm/tcg/translate-a64.c | 5 ++--
30
index XXXXXXX..XXXXXXX 100644
21
7 files changed, 45 insertions(+), 28 deletions(-)
31
--- a/docs/system/arm/emulation.rst
22
32
+++ b/docs/system/arm/emulation.rst
33
@@ -XXX,XX +XXX,XX @@ the following architecture extensions:
34
- FEAT_JSCVT (JavaScript conversion instructions)
35
- FEAT_LOR (Limited ordering regions)
36
- FEAT_LPA (Large Physical Address space)
37
+- FEAT_LPA2 (Large Physical and virtual Address space v2)
38
- FEAT_LRCPC (Load-acquire RCpc instructions)
39
- FEAT_LRCPC2 (Load-acquire RCpc instructions v2)
40
- FEAT_LSE (Large System Extensions)
41
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
23
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
42
index XXXXXXX..XXXXXXX 100644
24
index XXXXXXX..XXXXXXX 100644
43
--- a/target/arm/cpu.h
25
--- a/target/arm/cpu.h
44
+++ b/target/arm/cpu.h
26
+++ b/target/arm/cpu.h
45
@@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_i8mm(const ARMISARegisters *id)
27
@@ -XXX,XX +XXX,XX @@ struct ArchCPU {
46
return FIELD_EX64(id->id_aa64isar1, ID_AA64ISAR1, I8MM) != 0;
28
47
}
29
/* DCZ blocksize, in log_2(words), ie low 4 bits of DCZID_EL0 */
48
30
uint8_t dcz_blocksize;
49
+static inline bool isar_feature_aa64_tgran4_lpa2(const ARMISARegisters *id)
31
+ /* GM blocksize, in log_2(words), ie low 4 bits of GMID_EL0 */
50
+{
32
+ uint8_t gm_blocksize;
51
+ return FIELD_SEX64(id->id_aa64mmfr0, ID_AA64MMFR0, TGRAN4) >= 1;
33
52
+}
34
uint64_t rvbar_prop; /* Property/input signals. */
53
+
35
54
+static inline bool isar_feature_aa64_tgran4_2_lpa2(const ARMISARegisters *id)
55
+{
56
+ unsigned t = FIELD_EX64(id->id_aa64mmfr0, ID_AA64MMFR0, TGRAN4_2);
57
+ return t >= 3 || (t == 0 && isar_feature_aa64_tgran4_lpa2(id));
58
+}
59
+
60
+static inline bool isar_feature_aa64_tgran16_lpa2(const ARMISARegisters *id)
61
+{
62
+ return FIELD_EX64(id->id_aa64mmfr0, ID_AA64MMFR0, TGRAN16) >= 2;
63
+}
64
+
65
+static inline bool isar_feature_aa64_tgran16_2_lpa2(const ARMISARegisters *id)
66
+{
67
+ unsigned t = FIELD_EX64(id->id_aa64mmfr0, ID_AA64MMFR0, TGRAN16_2);
68
+ return t >= 3 || (t == 0 && isar_feature_aa64_tgran16_lpa2(id));
69
+}
70
+
71
static inline bool isar_feature_aa64_ccidx(const ARMISARegisters *id)
72
{
73
return FIELD_EX64(id->id_aa64mmfr2, ID_AA64MMFR2, CCIDX) != 0;
74
diff --git a/target/arm/internals.h b/target/arm/internals.h
36
diff --git a/target/arm/internals.h b/target/arm/internals.h
75
index XXXXXXX..XXXXXXX 100644
37
index XXXXXXX..XXXXXXX 100644
76
--- a/target/arm/internals.h
38
--- a/target/arm/internals.h
77
+++ b/target/arm/internals.h
39
+++ b/target/arm/internals.h
78
@@ -XXX,XX +XXX,XX @@ static inline uint32_t aarch64_pstate_valid_mask(const ARMISARegisters *id)
40
@@ -XXX,XX +XXX,XX @@ void arm_log_exception(CPUState *cs);
79
typedef struct ARMVAParameters {
41
80
unsigned tsz : 8;
42
#endif /* !CONFIG_USER_ONLY */
81
unsigned ps : 3;
43
82
+ unsigned sh : 2;
44
-/*
83
unsigned select : 1;
45
- * The log2 of the words in the tag block, for GMID_EL1.BS.
84
bool tbi : 1;
46
- * The is the maximum, 256 bytes, which manipulates 64-bits of tags.
85
bool epd : 1;
47
- */
86
@@ -XXX,XX +XXX,XX @@ typedef struct ARMVAParameters {
48
-#define GMID_EL1_BS 6
87
bool using16k : 1;
49
-
88
bool using64k : 1;
50
/*
89
bool tsz_oob : 1; /* tsz has been clamped to legal range */
51
* SVE predicates are 1/8 the size of SVE vectors, and cannot use
90
+ bool ds : 1;
52
* the same simd_desc() encoding due to restrictions on size.
91
} ARMVAParameters;
53
diff --git a/target/arm/tcg/translate.h b/target/arm/tcg/translate.h
92
54
index XXXXXXX..XXXXXXX 100644
93
ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
55
--- a/target/arm/tcg/translate.h
56
+++ b/target/arm/tcg/translate.h
57
@@ -XXX,XX +XXX,XX @@ typedef struct DisasContext {
58
int8_t btype;
59
/* A copy of cpu->dcz_blocksize. */
60
uint8_t dcz_blocksize;
61
+ /* A copy of cpu->gm_blocksize. */
62
+ uint8_t gm_blocksize;
63
/* True if this page is guarded. */
64
bool guarded_page;
65
/* Bottom two bits of XScale c15_cpar coprocessor access control reg */
94
diff --git a/target/arm/helper.c b/target/arm/helper.c
66
diff --git a/target/arm/helper.c b/target/arm/helper.c
95
index XXXXXXX..XXXXXXX 100644
67
index XXXXXXX..XXXXXXX 100644
96
--- a/target/arm/helper.c
68
--- a/target/arm/helper.c
97
+++ b/target/arm/helper.c
69
+++ b/target/arm/helper.c
98
@@ -XXX,XX +XXX,XX @@ static TLBIRange tlbi_aa64_get_range(CPUARMState *env, ARMMMUIdx mmuidx,
70
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo mte_reginfo[] = {
71
.opc0 = 3, .opc1 = 0, .crn = 1, .crm = 0, .opc2 = 6,
72
.access = PL1_RW, .accessfn = access_mte,
73
.fieldoffset = offsetof(CPUARMState, cp15.gcr_el1) },
74
- { .name = "GMID_EL1", .state = ARM_CP_STATE_AA64,
75
- .opc0 = 3, .opc1 = 1, .crn = 0, .crm = 0, .opc2 = 4,
76
- .access = PL1_R, .accessfn = access_aa64_tid5,
77
- .type = ARM_CP_CONST, .resetvalue = GMID_EL1_BS },
78
{ .name = "TCO", .state = ARM_CP_STATE_AA64,
79
.opc0 = 3, .opc1 = 3, .crn = 4, .crm = 2, .opc2 = 7,
80
.type = ARM_CP_NO_RAW,
81
@@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu)
82
* then define only a RAZ/WI version of PSTATE.TCO.
83
*/
84
if (cpu_isar_feature(aa64_mte, cpu)) {
85
+ ARMCPRegInfo gmid_reginfo = {
86
+ .name = "GMID_EL1", .state = ARM_CP_STATE_AA64,
87
+ .opc0 = 3, .opc1 = 1, .crn = 0, .crm = 0, .opc2 = 4,
88
+ .access = PL1_R, .accessfn = access_aa64_tid5,
89
+ .type = ARM_CP_CONST, .resetvalue = cpu->gm_blocksize,
90
+ };
91
+ define_one_arm_cp_reg(cpu, &gmid_reginfo);
92
define_arm_cp_regs(cpu, mte_reginfo);
93
define_arm_cp_regs(cpu, mte_el0_cacheop_reginfo);
94
} else if (cpu_isar_feature(aa64_mte_insn_reg, cpu)) {
95
diff --git a/target/arm/tcg/cpu64.c b/target/arm/tcg/cpu64.c
96
index XXXXXXX..XXXXXXX 100644
97
--- a/target/arm/tcg/cpu64.c
98
+++ b/target/arm/tcg/cpu64.c
99
@@ -XXX,XX +XXX,XX @@ void aarch64_max_tcg_initfn(Object *obj)
100
cpu->ctr = 0x80038003; /* 32 byte I and D cacheline size, VIPT icache */
101
cpu->dcz_blocksize = 7; /* 512 bytes */
102
#endif
103
+ cpu->gm_blocksize = 6; /* 256 bytes */
104
105
cpu->sve_vq.supported = MAKE_64BIT_MASK(0, ARM_MAX_VQ);
106
cpu->sme_vq.supported = SVE_VQ_POW2_MAP;
107
diff --git a/target/arm/tcg/mte_helper.c b/target/arm/tcg/mte_helper.c
108
index XXXXXXX..XXXXXXX 100644
109
--- a/target/arm/tcg/mte_helper.c
110
+++ b/target/arm/tcg/mte_helper.c
111
@@ -XXX,XX +XXX,XX @@ void HELPER(st2g_stub)(CPUARMState *env, uint64_t ptr)
112
}
113
}
114
115
-#define LDGM_STGM_SIZE (4 << GMID_EL1_BS)
116
-
117
uint64_t HELPER(ldgm)(CPUARMState *env, uint64_t ptr)
118
{
119
int mmu_idx = cpu_mmu_index(env, false);
120
uintptr_t ra = GETPC();
121
+ int gm_bs = env_archcpu(env)->gm_blocksize;
122
+ int gm_bs_bytes = 4 << gm_bs;
123
void *tag_mem;
124
125
- ptr = QEMU_ALIGN_DOWN(ptr, LDGM_STGM_SIZE);
126
+ ptr = QEMU_ALIGN_DOWN(ptr, gm_bs_bytes);
127
128
/* Trap if accessing an invalid page. */
129
tag_mem = allocation_tag_mem(env, mmu_idx, ptr, MMU_DATA_LOAD,
130
- LDGM_STGM_SIZE, MMU_DATA_LOAD,
131
- LDGM_STGM_SIZE / (2 * TAG_GRANULE), ra);
132
+ gm_bs_bytes, MMU_DATA_LOAD,
133
+ gm_bs_bytes / (2 * TAG_GRANULE), ra);
134
135
/* The tag is squashed to zero if the page does not support tags. */
136
if (!tag_mem) {
137
return 0;
138
}
139
140
- QEMU_BUILD_BUG_ON(GMID_EL1_BS != 6);
141
/*
142
- * We are loading 64-bits worth of tags. The ordering of elements
143
- * within the word corresponds to a 64-bit little-endian operation.
144
+ * The ordering of elements within the word corresponds to
145
+ * a little-endian operation.
146
*/
147
- return ldq_le_p(tag_mem);
148
+ switch (gm_bs) {
149
+ case 6:
150
+ /* 256 bytes -> 16 tags -> 64 result bits */
151
+ return ldq_le_p(tag_mem);
152
+ default:
153
+ /* cpu configured with unsupported gm blocksize. */
154
+ g_assert_not_reached();
155
+ }
156
}
157
158
void HELPER(stgm)(CPUARMState *env, uint64_t ptr, uint64_t val)
159
{
160
int mmu_idx = cpu_mmu_index(env, false);
161
uintptr_t ra = GETPC();
162
+ int gm_bs = env_archcpu(env)->gm_blocksize;
163
+ int gm_bs_bytes = 4 << gm_bs;
164
void *tag_mem;
165
166
- ptr = QEMU_ALIGN_DOWN(ptr, LDGM_STGM_SIZE);
167
+ ptr = QEMU_ALIGN_DOWN(ptr, gm_bs_bytes);
168
169
/* Trap if accessing an invalid page. */
170
tag_mem = allocation_tag_mem(env, mmu_idx, ptr, MMU_DATA_STORE,
171
- LDGM_STGM_SIZE, MMU_DATA_LOAD,
172
- LDGM_STGM_SIZE / (2 * TAG_GRANULE), ra);
173
+ gm_bs_bytes, MMU_DATA_LOAD,
174
+ gm_bs_bytes / (2 * TAG_GRANULE), ra);
175
176
/*
177
* Tag store only happens if the page support tags,
178
@@ -XXX,XX +XXX,XX @@ void HELPER(stgm)(CPUARMState *env, uint64_t ptr, uint64_t val)
179
return;
180
}
181
182
- QEMU_BUILD_BUG_ON(GMID_EL1_BS != 6);
183
/*
184
- * We are storing 64-bits worth of tags. The ordering of elements
185
- * within the word corresponds to a 64-bit little-endian operation.
186
+ * The ordering of elements within the word corresponds to
187
+ * a little-endian operation.
188
*/
189
- stq_le_p(tag_mem, val);
190
+ switch (gm_bs) {
191
+ case 6:
192
+ stq_le_p(tag_mem, val);
193
+ break;
194
+ default:
195
+ /* cpu configured with unsupported gm blocksize. */
196
+ g_assert_not_reached();
197
+ }
198
}
199
200
void HELPER(stzgm_tags)(CPUARMState *env, uint64_t ptr, uint64_t val)
201
diff --git a/target/arm/tcg/translate-a64.c b/target/arm/tcg/translate-a64.c
202
index XXXXXXX..XXXXXXX 100644
203
--- a/target/arm/tcg/translate-a64.c
204
+++ b/target/arm/tcg/translate-a64.c
205
@@ -XXX,XX +XXX,XX @@ static bool trans_STGM(DisasContext *s, arg_ldst_tag *a)
206
gen_helper_stgm(cpu_env, addr, tcg_rt);
99
} else {
207
} else {
100
ret.base = extract64(value, 0, 37);
208
MMUAccessType acc = MMU_DATA_STORE;
101
}
209
- int size = 4 << GMID_EL1_BS;
102
+ if (param.ds) {
210
+ int size = 4 << s->gm_blocksize;
103
+ /*
211
104
+ * With DS=1, BaseADDR is always shifted 16 so that it is able
212
clean_addr = clean_data_tbi(s, addr);
105
+ * to address all 52 va bits. The input address is perforce
213
tcg_gen_andi_i64(clean_addr, clean_addr, -size);
106
+ * aligned on a 64k boundary regardless of translation granule.
214
@@ -XXX,XX +XXX,XX @@ static bool trans_LDGM(DisasContext *s, arg_ldst_tag *a)
107
+ */
215
gen_helper_ldgm(tcg_rt, cpu_env, addr);
108
+ page_shift = 16;
109
+ }
110
ret.base <<= page_shift;
111
112
return ret;
113
@@ -XXX,XX +XXX,XX @@ static bool check_s2_mmu_setup(ARMCPU *cpu, bool is_aa64, int level,
114
const int grainsize = stride + 3;
115
int startsizecheck;
116
117
- /* Negative levels are never allowed. */
118
- if (level < 0) {
119
+ /*
120
+ * Negative levels are usually not allowed...
121
+ * Except for FEAT_LPA2, 4k page table, 52-bit address space, which
122
+ * begins with level -1. Note that previous feature tests will have
123
+ * eliminated this combination if it is not enabled.
124
+ */
125
+ if (level < (inputsize == 52 && stride == 9 ? -1 : 0)) {
126
return false;
127
}
128
129
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
130
ARMMMUIdx mmu_idx, bool data)
131
{
132
uint64_t tcr = regime_tcr(env, mmu_idx)->raw_tcr;
133
- bool epd, hpd, using16k, using64k, tsz_oob;
134
- int select, tsz, tbi, max_tsz, min_tsz, ps;
135
+ bool epd, hpd, using16k, using64k, tsz_oob, ds;
136
+ int select, tsz, tbi, max_tsz, min_tsz, ps, sh;
137
+ ARMCPU *cpu = env_archcpu(env);
138
139
if (!regime_has_2_ranges(mmu_idx)) {
140
select = 0;
141
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
142
hpd = extract32(tcr, 24, 1);
143
}
144
epd = false;
145
+ sh = extract32(tcr, 12, 2);
146
ps = extract32(tcr, 16, 3);
147
+ ds = extract64(tcr, 32, 1);
148
} else {
216
} else {
149
/*
217
MMUAccessType acc = MMU_DATA_LOAD;
150
* Bit 55 is always between the two regions, and is canonical for
218
- int size = 4 << GMID_EL1_BS;
151
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
219
+ int size = 4 << s->gm_blocksize;
152
if (!select) {
220
153
tsz = extract32(tcr, 0, 6);
221
clean_addr = clean_data_tbi(s, addr);
154
epd = extract32(tcr, 7, 1);
222
tcg_gen_andi_i64(clean_addr, clean_addr, -size);
155
+ sh = extract32(tcr, 12, 2);
223
@@ -XXX,XX +XXX,XX @@ static void aarch64_tr_init_disas_context(DisasContextBase *dcbase,
156
using64k = extract32(tcr, 14, 1);
224
dc->cp_regs = arm_cpu->cp_regs;
157
using16k = extract32(tcr, 15, 1);
225
dc->features = env->features;
158
hpd = extract64(tcr, 41, 1);
226
dc->dcz_blocksize = arm_cpu->dcz_blocksize;
159
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
227
+ dc->gm_blocksize = arm_cpu->gm_blocksize;
160
using64k = tg == 3;
228
161
tsz = extract32(tcr, 16, 6);
229
#ifdef CONFIG_USER_ONLY
162
epd = extract32(tcr, 23, 1);
230
/* In sve_probe_page, we assume TBI is enabled. */
163
+ sh = extract32(tcr, 28, 2);
164
hpd = extract64(tcr, 42, 1);
165
}
166
ps = extract64(tcr, 32, 3);
167
+ ds = extract64(tcr, 59, 1);
168
}
169
170
- if (cpu_isar_feature(aa64_st, env_archcpu(env))) {
171
+ if (cpu_isar_feature(aa64_st, cpu)) {
172
max_tsz = 48 - using64k;
173
} else {
174
max_tsz = 39;
175
}
176
177
+ /*
178
+ * DS is RES0 unless FEAT_LPA2 is supported for the given page size;
179
+ * adjust the effective value of DS, as documented.
180
+ */
181
min_tsz = 16;
182
if (using64k) {
183
- if (cpu_isar_feature(aa64_lva, env_archcpu(env))) {
184
+ if (cpu_isar_feature(aa64_lva, cpu)) {
185
+ min_tsz = 12;
186
+ }
187
+ ds = false;
188
+ } else if (ds) {
189
+ switch (mmu_idx) {
190
+ case ARMMMUIdx_Stage2:
191
+ case ARMMMUIdx_Stage2_S:
192
+ if (using16k) {
193
+ ds = cpu_isar_feature(aa64_tgran16_2_lpa2, cpu);
194
+ } else {
195
+ ds = cpu_isar_feature(aa64_tgran4_2_lpa2, cpu);
196
+ }
197
+ break;
198
+ default:
199
+ if (using16k) {
200
+ ds = cpu_isar_feature(aa64_tgran16_lpa2, cpu);
201
+ } else {
202
+ ds = cpu_isar_feature(aa64_tgran4_lpa2, cpu);
203
+ }
204
+ break;
205
+ }
206
+ if (ds) {
207
min_tsz = 12;
208
}
209
}
210
- /* TODO: FEAT_LPA2 */
211
212
if (tsz > max_tsz) {
213
tsz = max_tsz;
214
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
215
return (ARMVAParameters) {
216
.tsz = tsz,
217
.ps = ps,
218
+ .sh = sh,
219
.select = select,
220
.tbi = tbi,
221
.epd = epd,
222
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
223
.using16k = using16k,
224
.using64k = using64k,
225
.tsz_oob = tsz_oob,
226
+ .ds = ds,
227
};
228
}
229
230
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address,
231
* VTCR_EL2.SL0 field (whose interpretation depends on the page size)
232
*/
233
uint32_t sl0 = extract32(tcr->raw_tcr, 6, 2);
234
+ uint32_t sl2 = extract64(tcr->raw_tcr, 33, 1);
235
uint32_t startlevel;
236
bool ok;
237
238
- if (!aarch64 || stride == 9) {
239
+ /* SL2 is RES0 unless DS=1 & 4kb granule. */
240
+ if (param.ds && stride == 9 && sl2) {
241
+ if (sl0 != 0) {
242
+ level = 0;
243
+ fault_type = ARMFault_Translation;
244
+ goto do_fault;
245
+ }
246
+ startlevel = -1;
247
+ } else if (!aarch64 || stride == 9) {
248
/* AArch32 or 4KB pages */
249
startlevel = 2 - sl0;
250
251
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address,
252
* for both v7 and v8. However, for v8 the SBZ bits [47:40] must be 0
253
* or an AddressSize fault is raised. So for v8 we extract those SBZ
254
* bits as part of the address, which will be checked via outputsize.
255
- * For AArch64, the address field always goes up to bit 47 (with extra
256
- * bits for FEAT_LPA placed elsewhere). AArch64 implies v8.
257
+ * For AArch64, the address field goes up to bit 47, or 49 with FEAT_LPA2;
258
+ * the highest bits of a 52-bit output are placed elsewhere.
259
*/
260
- if (arm_feature(env, ARM_FEATURE_V8)) {
261
+ if (param.ds) {
262
+ descaddrmask = MAKE_64BIT_MASK(0, 50);
263
+ } else if (arm_feature(env, ARM_FEATURE_V8)) {
264
descaddrmask = MAKE_64BIT_MASK(0, 48);
265
} else {
266
descaddrmask = MAKE_64BIT_MASK(0, 40);
267
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address,
268
269
/*
270
* For FEAT_LPA and PS=6, bits [51:48] of descaddr are in [15:12]
271
- * of descriptor. Otherwise, if descaddr is out of range, raise
272
- * AddressSizeFault.
273
+ * of descriptor. For FEAT_LPA2 and effective DS, bits [51:50] of
274
+ * descaddr are in [9:8]. Otherwise, if descaddr is out of range,
275
+ * raise AddressSizeFault.
276
*/
277
if (outputsize > 48) {
278
- descaddr |= extract64(descriptor, 12, 4) << 48;
279
+ if (param.ds) {
280
+ descaddr |= extract64(descriptor, 8, 2) << 50;
281
+ } else {
282
+ descaddr |= extract64(descriptor, 12, 4) << 48;
283
+ }
284
} else if (descaddr >> outputsize) {
285
fault_type = ARMFault_AddressSize;
286
goto do_fault;
287
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address,
288
assert(attrindx <= 7);
289
cacheattrs->attrs = extract64(mair, attrindx * 8, 8);
290
}
291
- cacheattrs->shareability = extract32(attrs, 6, 2);
292
+
293
+ /*
294
+ * For FEAT_LPA2 and effective DS, the SH field in the attributes
295
+ * was re-purposed for output address bits. The SH attribute in
296
+ * that case comes from TCR_ELx, which we extracted earlier.
297
+ */
298
+ if (param.ds) {
299
+ cacheattrs->shareability = param.sh;
300
+ } else {
301
+ cacheattrs->shareability = extract32(attrs, 6, 2);
302
+ }
303
304
*phys_ptr = descaddr;
305
*page_size_ptr = page_size;
306
--
231
--
307
2.25.1
232
2.34.1
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Pass down the width of the output address from translation.
3
Support all of the easy GM block sizes.
4
For now this is still just PAMax, but a subsequent patch will
4
Use direct memory operations, since the pointers are aligned.
5
compute the correct value from TCR_ELx.{I}PS.
6
5
6
While BS=2 (16 bytes, 1 tag) is a legal setting, that requires
7
an atomic store of one nibble. This is not difficult, but there
8
is also no point in supporting it until required.
9
10
Note that cortex-a710 sets GM blocksize to match its cacheline
11
size of 64 bytes. I expect many implementations will also
12
match the cacheline, which makes 16 bytes very unlikely.
13
14
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
15
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
16
Message-id: 20230811214031.171020-4-richard.henderson@linaro.org
9
Message-id: 20220301215958.157011-6-richard.henderson@linaro.org
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
18
---
12
target/arm/helper.c | 21 ++++++++++-----------
19
target/arm/cpu.c | 18 +++++++++---
13
1 file changed, 10 insertions(+), 11 deletions(-)
20
target/arm/tcg/mte_helper.c | 56 +++++++++++++++++++++++++++++++------
21
2 files changed, 62 insertions(+), 12 deletions(-)
14
22
15
diff --git a/target/arm/helper.c b/target/arm/helper.c
23
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
16
index XXXXXXX..XXXXXXX 100644
24
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/helper.c
25
--- a/target/arm/cpu.c
18
+++ b/target/arm/helper.c
26
+++ b/target/arm/cpu.c
19
@@ -XXX,XX +XXX,XX @@ do_fault:
27
@@ -XXX,XX +XXX,XX @@ static void arm_cpu_realizefn(DeviceState *dev, Error **errp)
20
* false otherwise.
28
ID_PFR1, VIRTUALIZATION, 0);
21
*/
22
static bool check_s2_mmu_setup(ARMCPU *cpu, bool is_aa64, int level,
23
- int inputsize, int stride)
24
+ int inputsize, int stride, int outputsize)
25
{
26
const int grainsize = stride + 3;
27
int startsizecheck;
28
@@ -XXX,XX +XXX,XX @@ static bool check_s2_mmu_setup(ARMCPU *cpu, bool is_aa64, int level,
29
}
29
}
30
30
31
if (is_aa64) {
31
+ if (cpu_isar_feature(aa64_mte, cpu)) {
32
- CPUARMState *env = &cpu->env;
32
+ /*
33
- unsigned int pamax = arm_pamax(cpu);
33
+ * The architectural range of GM blocksize is 2-6, however qemu
34
-
34
+ * doesn't support blocksize of 2 (see HELPER(ldgm)).
35
switch (stride) {
35
+ */
36
case 13: /* 64KB Pages. */
36
+ if (tcg_enabled()) {
37
- if (level == 0 || (level == 1 && pamax <= 42)) {
37
+ assert(cpu->gm_blocksize >= 3 && cpu->gm_blocksize <= 6);
38
+ if (level == 0 || (level == 1 && outputsize <= 42)) {
38
+ }
39
return false;
39
+
40
}
40
#ifndef CONFIG_USER_ONLY
41
break;
41
- if (cpu->tag_memory == NULL && cpu_isar_feature(aa64_mte, cpu)) {
42
case 11: /* 16KB Pages. */
42
/*
43
- if (level == 0 || (level == 1 && pamax <= 40)) {
43
* Disable the MTE feature bits if we do not have tag-memory
44
+ if (level == 0 || (level == 1 && outputsize <= 40)) {
44
* provided by the machine.
45
return false;
45
*/
46
}
46
- cpu->isar.id_aa64pfr1 =
47
break;
47
- FIELD_DP64(cpu->isar.id_aa64pfr1, ID_AA64PFR1, MTE, 0);
48
case 9: /* 4KB Pages. */
48
- }
49
- if (level == 0 && pamax <= 42) {
49
+ if (cpu->tag_memory == NULL) {
50
+ if (level == 0 && outputsize <= 42) {
50
+ cpu->isar.id_aa64pfr1 =
51
return false;
51
+ FIELD_DP64(cpu->isar.id_aa64pfr1, ID_AA64PFR1, MTE, 0);
52
}
52
+ }
53
break;
53
#endif
54
@@ -XXX,XX +XXX,XX @@ static bool check_s2_mmu_setup(ARMCPU *cpu, bool is_aa64, int level,
54
+ }
55
}
55
56
56
if (tcg_enabled()) {
57
/* Inputsize checks. */
57
/*
58
- if (inputsize > pamax &&
58
diff --git a/target/arm/tcg/mte_helper.c b/target/arm/tcg/mte_helper.c
59
- (arm_el_is_aa64(env, 1) || inputsize > 40)) {
59
index XXXXXXX..XXXXXXX 100644
60
+ if (inputsize > outputsize &&
60
--- a/target/arm/tcg/mte_helper.c
61
+ (arm_el_is_aa64(&cpu->env, 1) || inputsize > 40)) {
61
+++ b/target/arm/tcg/mte_helper.c
62
/* This is CONSTRAINED UNPREDICTABLE and we choose to fault. */
62
@@ -XXX,XX +XXX,XX @@ uint64_t HELPER(ldgm)(CPUARMState *env, uint64_t ptr)
63
return false;
63
int gm_bs = env_archcpu(env)->gm_blocksize;
64
}
64
int gm_bs_bytes = 4 << gm_bs;
65
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address,
65
void *tag_mem;
66
target_ulong page_size;
66
+ uint64_t ret;
67
uint32_t attrs;
67
+ int shift;
68
int32_t stride;
68
69
- int addrsize, inputsize;
69
ptr = QEMU_ALIGN_DOWN(ptr, gm_bs_bytes);
70
+ int addrsize, inputsize, outputsize;
70
71
TCR *tcr = regime_tcr(env, mmu_idx);
71
@@ -XXX,XX +XXX,XX @@ uint64_t HELPER(ldgm)(CPUARMState *env, uint64_t ptr)
72
int ap, ns, xn, pxn;
72
73
uint32_t el = regime_el(env, mmu_idx);
73
/*
74
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address,
74
* The ordering of elements within the word corresponds to
75
75
- * a little-endian operation.
76
addrsize = 64 - 8 * param.tbi;
76
+ * a little-endian operation. Computation of shift comes from
77
inputsize = 64 - param.tsz;
77
+ *
78
+ outputsize = arm_pamax(cpu);
78
+ * index = address<LOG2_TAG_GRANULE+3:LOG2_TAG_GRANULE>
79
} else {
79
+ * data<index*4+3:index*4> = tag
80
param = aa32_va_parameters(env, address, mmu_idx);
80
+ *
81
level = 1;
81
+ * Because of the alignment of ptr above, BS=6 has shift=0.
82
addrsize = (mmu_idx == ARMMMUIdx_Stage2 ? 40 : 32);
82
+ * All memory operations are aligned. Defer support for BS=2,
83
inputsize = addrsize - param.tsz;
83
+ * requiring insertion or extraction of a nibble, until we
84
+ outputsize = 40;
84
+ * support a cpu that requires it.
85
*/
86
switch (gm_bs) {
87
+ case 3:
88
+ /* 32 bytes -> 2 tags -> 8 result bits */
89
+ ret = *(uint8_t *)tag_mem;
90
+ break;
91
+ case 4:
92
+ /* 64 bytes -> 4 tags -> 16 result bits */
93
+ ret = cpu_to_le16(*(uint16_t *)tag_mem);
94
+ break;
95
+ case 5:
96
+ /* 128 bytes -> 8 tags -> 32 result bits */
97
+ ret = cpu_to_le32(*(uint32_t *)tag_mem);
98
+ break;
99
case 6:
100
/* 256 bytes -> 16 tags -> 64 result bits */
101
- return ldq_le_p(tag_mem);
102
+ return cpu_to_le64(*(uint64_t *)tag_mem);
103
default:
104
- /* cpu configured with unsupported gm blocksize. */
105
+ /*
106
+ * CPU configured with unsupported/invalid gm blocksize.
107
+ * This is detected early in arm_cpu_realizefn.
108
+ */
109
g_assert_not_reached();
85
}
110
}
86
111
+ shift = extract64(ptr, LOG2_TAG_GRANULE, 4) * 4;
87
/*
112
+ return ret << shift;
88
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address,
113
}
89
114
90
/* Check that the starting level is valid. */
115
void HELPER(stgm)(CPUARMState *env, uint64_t ptr, uint64_t val)
91
ok = check_s2_mmu_setup(cpu, aarch64, startlevel,
116
@@ -XXX,XX +XXX,XX @@ void HELPER(stgm)(CPUARMState *env, uint64_t ptr, uint64_t val)
92
- inputsize, stride);
117
int gm_bs = env_archcpu(env)->gm_blocksize;
93
+ inputsize, stride, outputsize);
118
int gm_bs_bytes = 4 << gm_bs;
94
if (!ok) {
119
void *tag_mem;
95
fault_type = ARMFault_Translation;
120
+ int shift;
96
goto do_fault;
121
122
ptr = QEMU_ALIGN_DOWN(ptr, gm_bs_bytes);
123
124
@@ -XXX,XX +XXX,XX @@ void HELPER(stgm)(CPUARMState *env, uint64_t ptr, uint64_t val)
125
return;
126
}
127
128
- /*
129
- * The ordering of elements within the word corresponds to
130
- * a little-endian operation.
131
- */
132
+ /* See LDGM for comments on BS and on shift. */
133
+ shift = extract64(ptr, LOG2_TAG_GRANULE, 4) * 4;
134
+ val >>= shift;
135
switch (gm_bs) {
136
+ case 3:
137
+ /* 32 bytes -> 2 tags -> 8 result bits */
138
+ *(uint8_t *)tag_mem = val;
139
+ break;
140
+ case 4:
141
+ /* 64 bytes -> 4 tags -> 16 result bits */
142
+ *(uint16_t *)tag_mem = cpu_to_le16(val);
143
+ break;
144
+ case 5:
145
+ /* 128 bytes -> 8 tags -> 32 result bits */
146
+ *(uint32_t *)tag_mem = cpu_to_le32(val);
147
+ break;
148
case 6:
149
- stq_le_p(tag_mem, val);
150
+ /* 256 bytes -> 16 tags -> 64 result bits */
151
+ *(uint64_t *)tag_mem = cpu_to_le64(val);
152
break;
153
default:
154
/* cpu configured with unsupported gm blocksize. */
97
--
155
--
98
2.25.1
156
2.34.1
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
The shift of the BaseADDR field depends on the translation
3
When the cpu support MTE, but the system does not, reduce cpu
4
granule in use.
4
support to user instructions at EL0 instead of completely
5
disabling MTE. If we encounter a cpu implementation which does
6
something else, we can revisit this setting.
5
7
6
Fixes: 84940ed8255 ("target/arm: Add support for FEAT_TLBIRANGE")
8
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Reported-by: Peter Maydell <peter.maydell@linaro.org>
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
10
Message-id: 20230811214031.171020-5-richard.henderson@linaro.org
10
Message-id: 20220301215958.157011-14-richard.henderson@linaro.org
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
12
---
13
target/arm/helper.c | 5 +++--
13
target/arm/cpu.c | 7 ++++---
14
1 file changed, 3 insertions(+), 2 deletions(-)
14
1 file changed, 4 insertions(+), 3 deletions(-)
15
15
16
diff --git a/target/arm/helper.c b/target/arm/helper.c
16
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
17
index XXXXXXX..XXXXXXX 100644
17
index XXXXXXX..XXXXXXX 100644
18
--- a/target/arm/helper.c
18
--- a/target/arm/cpu.c
19
+++ b/target/arm/helper.c
19
+++ b/target/arm/cpu.c
20
@@ -XXX,XX +XXX,XX @@ static TLBIRange tlbi_aa64_get_range(CPUARMState *env, ARMMMUIdx mmuidx,
20
@@ -XXX,XX +XXX,XX @@ static void arm_cpu_realizefn(DeviceState *dev, Error **errp)
21
ret.length = (num + 1) << (exponent + page_shift);
21
22
22
#ifndef CONFIG_USER_ONLY
23
if (regime_has_2_ranges(mmuidx)) {
23
/*
24
- ret.base = sextract64(value, 0, 37) << TARGET_PAGE_BITS;
24
- * Disable the MTE feature bits if we do not have tag-memory
25
+ ret.base = sextract64(value, 0, 37);
25
- * provided by the machine.
26
} else {
26
+ * If we do not have tag-memory provided by the machine,
27
- ret.base = extract64(value, 0, 37) << TARGET_PAGE_BITS;
27
+ * reduce MTE support to instructions enabled at EL0.
28
+ ret.base = extract64(value, 0, 37);
28
+ * This matches Cortex-A710 BROADCASTMTE input being LOW.
29
*/
30
if (cpu->tag_memory == NULL) {
31
cpu->isar.id_aa64pfr1 =
32
- FIELD_DP64(cpu->isar.id_aa64pfr1, ID_AA64PFR1, MTE, 0);
33
+ FIELD_DP64(cpu->isar.id_aa64pfr1, ID_AA64PFR1, MTE, 1);
34
}
35
#endif
29
}
36
}
30
+ ret.base <<= page_shift;
31
32
return ret;
33
}
34
--
37
--
35
2.25.1
38
2.34.1
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
We will shortly share parts of this function with other portions
3
Do not hard-code the constants for Neoverse V1.
4
of address translation.
5
4
5
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
7
Message-id: 20230811214031.171020-6-richard.henderson@linaro.org
8
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
9
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
10
Message-id: 20220301215958.157011-5-richard.henderson@linaro.org
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
---
9
---
13
target/arm/internals.h | 19 +------------------
10
target/arm/tcg/cpu64.c | 48 ++++++++++++++++++++++++++++--------------
14
target/arm/helper.c | 22 ++++++++++++++++++++++
11
1 file changed, 32 insertions(+), 16 deletions(-)
15
2 files changed, 23 insertions(+), 18 deletions(-)
16
12
17
diff --git a/target/arm/internals.h b/target/arm/internals.h
13
diff --git a/target/arm/tcg/cpu64.c b/target/arm/tcg/cpu64.c
18
index XXXXXXX..XXXXXXX 100644
14
index XXXXXXX..XXXXXXX 100644
19
--- a/target/arm/internals.h
15
--- a/target/arm/tcg/cpu64.c
20
+++ b/target/arm/internals.h
16
+++ b/target/arm/tcg/cpu64.c
21
@@ -XXX,XX +XXX,XX @@ static inline void update_spsel(CPUARMState *env, uint32_t imm)
17
@@ -XXX,XX +XXX,XX @@
22
* Returns the implementation defined bit-width of physical addresses.
18
#include "qemu/module.h"
23
* The ARMv8 reference manuals refer to this as PAMax().
19
#include "qapi/visitor.h"
24
*/
20
#include "hw/qdev-properties.h"
25
-static inline unsigned int arm_pamax(ARMCPU *cpu)
21
+#include "qemu/units.h"
26
-{
22
#include "internals.h"
27
- static const unsigned int pamax_map[] = {
23
#include "cpregs.h"
28
- [0] = 32,
24
29
- [1] = 36,
25
+static uint64_t make_ccsidr64(unsigned assoc, unsigned linesize,
30
- [2] = 40,
26
+ unsigned cachesize)
31
- [3] = 42,
32
- [4] = 44,
33
- [5] = 48,
34
- };
35
- unsigned int parange =
36
- FIELD_EX64(cpu->isar.id_aa64mmfr0, ID_AA64MMFR0, PARANGE);
37
-
38
- /* id_aa64mmfr0 is a read-only register so values outside of the
39
- * supported mappings can be considered an implementation error. */
40
- assert(parange < ARRAY_SIZE(pamax_map));
41
- return pamax_map[parange];
42
-}
43
+unsigned int arm_pamax(ARMCPU *cpu);
44
45
/* Return true if extended addresses are enabled.
46
* This is always the case if our translation regime is 64 bit,
47
diff --git a/target/arm/helper.c b/target/arm/helper.c
48
index XXXXXXX..XXXXXXX 100644
49
--- a/target/arm/helper.c
50
+++ b/target/arm/helper.c
51
@@ -XXX,XX +XXX,XX @@ static uint8_t convert_stage2_attrs(CPUARMState *env, uint8_t s2attrs)
52
}
53
#endif /* !CONFIG_USER_ONLY */
54
55
+/* The cpu-specific constant value of PAMax; also used by hw/arm/virt. */
56
+unsigned int arm_pamax(ARMCPU *cpu)
57
+{
27
+{
58
+ static const unsigned int pamax_map[] = {
28
+ unsigned lg_linesize = ctz32(linesize);
59
+ [0] = 32,
29
+ unsigned sets;
60
+ [1] = 36,
61
+ [2] = 40,
62
+ [3] = 42,
63
+ [4] = 44,
64
+ [5] = 48,
65
+ };
66
+ unsigned int parange =
67
+ FIELD_EX64(cpu->isar.id_aa64mmfr0, ID_AA64MMFR0, PARANGE);
68
+
30
+
69
+ /*
31
+ /*
70
+ * id_aa64mmfr0 is a read-only register so values outside of the
32
+ * The 64-bit CCSIDR_EL1 format is:
71
+ * supported mappings can be considered an implementation error.
33
+ * [55:32] number of sets - 1
34
+ * [23:3] associativity - 1
35
+ * [2:0] log2(linesize) - 4
36
+ * so 0 == 16 bytes, 1 == 32 bytes, 2 == 64 bytes, etc
72
+ */
37
+ */
73
+ assert(parange < ARRAY_SIZE(pamax_map));
38
+ assert(assoc != 0);
74
+ return pamax_map[parange];
39
+ assert(is_power_of_2(linesize));
40
+ assert(lg_linesize >= 4 && lg_linesize <= 7 + 4);
41
+
42
+ /* sets * associativity * linesize == cachesize. */
43
+ sets = cachesize / (assoc * linesize);
44
+ assert(cachesize % (assoc * linesize) == 0);
45
+
46
+ return ((uint64_t)(sets - 1) << 32)
47
+ | ((assoc - 1) << 3)
48
+ | (lg_linesize - 4);
75
+}
49
+}
76
+
50
+
77
static int aa64_va_parameter_tbi(uint64_t tcr, ARMMMUIdx mmu_idx)
51
static void aarch64_a35_initfn(Object *obj)
78
{
52
{
79
if (regime_has_2_ranges(mmu_idx)) {
53
ARMCPU *cpu = ARM_CPU(obj);
54
@@ -XXX,XX +XXX,XX @@ static void aarch64_neoverse_v1_initfn(Object *obj)
55
* The Neoverse-V1 r1p2 TRM lists 32-bit format CCSIDR_EL1 values,
56
* but also says it implements CCIDX, which means they should be
57
* 64-bit format. So we here use values which are based on the textual
58
- * information in chapter 2 of the TRM (and on the fact that
59
- * sets * associativity * linesize == cachesize).
60
- *
61
- * The 64-bit CCSIDR_EL1 format is:
62
- * [55:32] number of sets - 1
63
- * [23:3] associativity - 1
64
- * [2:0] log2(linesize) - 4
65
- * so 0 == 16 bytes, 1 == 32 bytes, 2 == 64 bytes, etc
66
- *
67
- * L1: 4-way set associative 64-byte line size, total size 64K,
68
- * so sets is 256.
69
+ * information in chapter 2 of the TRM:
70
*
71
+ * L1: 4-way set associative 64-byte line size, total size 64K.
72
* L2: 8-way set associative, 64 byte line size, either 512K or 1MB.
73
- * We pick 1MB, so this has 2048 sets.
74
- *
75
* L3: No L3 (this matches the CLIDR_EL1 value).
76
*/
77
- cpu->ccsidr[0] = 0x000000ff0000001aull; /* 64KB L1 dcache */
78
- cpu->ccsidr[1] = 0x000000ff0000001aull; /* 64KB L1 icache */
79
- cpu->ccsidr[2] = 0x000007ff0000003aull; /* 1MB L2 cache */
80
+ cpu->ccsidr[0] = make_ccsidr64(4, 64, 64 * KiB); /* L1 dcache */
81
+ cpu->ccsidr[1] = cpu->ccsidr[0]; /* L1 icache */
82
+ cpu->ccsidr[2] = make_ccsidr64(8, 64, 1 * MiB); /* L2 cache */
83
84
/* From 3.2.115 SCTLR_EL3 */
85
cpu->reset_sctlr = 0x30c50838;
80
--
86
--
81
2.25.1
87
2.34.1
82
83
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Merge tlbi_aa64_range_get_length and tlbi_aa64_range_get_base,
3
Access to many of the special registers is enabled or disabled
4
returning a structure containing both results. Pass in the
4
by ACTLR_EL[23], which we implement as constant 0, which means
5
ARMMMUIdx, rather than the digested two_ranges boolean.
5
that all writes outside EL3 should trap.
6
6
7
This is in preparation for FEAT_LPA2, where the interpretation
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
of 'value' depends on the effective value of DS for the regime.
9
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
9
Message-id: 20230811214031.171020-7-richard.henderson@linaro.org
12
Message-id: 20220301215958.157011-13-richard.henderson@linaro.org
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
---
11
---
15
target/arm/helper.c | 58 +++++++++++++++++++--------------------------
12
target/arm/cpregs.h | 2 ++
16
1 file changed, 24 insertions(+), 34 deletions(-)
13
target/arm/helper.c | 4 ++--
14
target/arm/tcg/cpu64.c | 46 +++++++++++++++++++++++++++++++++---------
15
3 files changed, 41 insertions(+), 11 deletions(-)
17
16
17
diff --git a/target/arm/cpregs.h b/target/arm/cpregs.h
18
index XXXXXXX..XXXXXXX 100644
19
--- a/target/arm/cpregs.h
20
+++ b/target/arm/cpregs.h
21
@@ -XXX,XX +XXX,XX @@ static inline void define_cortex_a72_a57_a53_cp_reginfo(ARMCPU *cpu) { }
22
void define_cortex_a72_a57_a53_cp_reginfo(ARMCPU *cpu);
23
#endif
24
25
+CPAccessResult access_tvm_trvm(CPUARMState *, const ARMCPRegInfo *, bool);
26
+
27
#endif /* TARGET_ARM_CPREGS_H */
18
diff --git a/target/arm/helper.c b/target/arm/helper.c
28
diff --git a/target/arm/helper.c b/target/arm/helper.c
19
index XXXXXXX..XXXXXXX 100644
29
index XXXXXXX..XXXXXXX 100644
20
--- a/target/arm/helper.c
30
--- a/target/arm/helper.c
21
+++ b/target/arm/helper.c
31
+++ b/target/arm/helper.c
22
@@ -XXX,XX +XXX,XX @@ static void tlbi_aa64_vae3is_write(CPUARMState *env, const ARMCPRegInfo *ri,
32
@@ -XXX,XX +XXX,XX @@ static CPAccessResult access_tpm(CPUARMState *env, const ARMCPRegInfo *ri,
23
}
33
}
24
34
25
#ifdef TARGET_AARCH64
35
/* Check for traps from EL1 due to HCR_EL2.TVM and HCR_EL2.TRVM. */
26
-static uint64_t tlbi_aa64_range_get_length(CPUARMState *env,
36
-static CPAccessResult access_tvm_trvm(CPUARMState *env, const ARMCPRegInfo *ri,
27
- uint64_t value)
37
- bool isread)
28
-{
38
+CPAccessResult access_tvm_trvm(CPUARMState *env, const ARMCPRegInfo *ri,
29
- unsigned int page_shift;
39
+ bool isread)
30
- unsigned int page_size_granule;
40
{
31
- uint64_t num;
41
if (arm_current_el(env) == 1) {
32
- uint64_t scale;
42
uint64_t trap = isread ? HCR_TRVM : HCR_TVM;
33
- uint64_t exponent;
43
diff --git a/target/arm/tcg/cpu64.c b/target/arm/tcg/cpu64.c
34
+typedef struct {
44
index XXXXXXX..XXXXXXX 100644
35
+ uint64_t base;
45
--- a/target/arm/tcg/cpu64.c
36
uint64_t length;
46
+++ b/target/arm/tcg/cpu64.c
37
+} TLBIRange;
47
@@ -XXX,XX +XXX,XX @@ static void aarch64_a64fx_initfn(Object *obj)
48
/* TODO: Add A64FX specific HPC extension registers */
49
}
50
51
+static CPAccessResult access_actlr_w(CPUARMState *env, const ARMCPRegInfo *r,
52
+ bool read)
53
+{
54
+ if (!read) {
55
+ int el = arm_current_el(env);
38
+
56
+
39
+static TLBIRange tlbi_aa64_get_range(CPUARMState *env, ARMMMUIdx mmuidx,
57
+ /* Because ACTLR_EL2 is constant 0, writes below EL2 trap to EL2. */
40
+ uint64_t value)
58
+ if (el < 2 && arm_is_el2_enabled(env)) {
41
+{
59
+ return CP_ACCESS_TRAP_EL2;
42
+ unsigned int page_size_granule, page_shift, num, scale, exponent;
60
+ }
43
+ TLBIRange ret = { };
61
+ /* Because ACTLR_EL3 is constant 0, writes below EL3 trap to EL3. */
44
62
+ if (el < 3 && arm_feature(env, ARM_FEATURE_EL3)) {
45
- num = extract64(value, 39, 5);
63
+ return CP_ACCESS_TRAP_EL3;
46
- scale = extract64(value, 44, 2);
64
+ }
47
page_size_granule = extract64(value, 46, 2);
65
+ }
48
66
+ return CP_ACCESS_OK;
49
if (page_size_granule == 0) {
67
+}
50
qemu_log_mask(LOG_GUEST_ERROR, "Invalid page size granule %d\n",
68
+
51
page_size_granule);
69
static const ARMCPRegInfo neoverse_n1_cp_reginfo[] = {
52
- return 0;
70
{ .name = "ATCR_EL1", .state = ARM_CP_STATE_AA64,
53
+ return ret;
71
.opc0 = 3, .opc1 = 0, .crn = 15, .crm = 7, .opc2 = 0,
54
}
72
- .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 },
55
73
+ .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0,
56
page_shift = (page_size_granule - 1) * 2 + 12;
74
+ /* Traps and enables are the same as for TCR_EL1. */
57
-
75
+ .accessfn = access_tvm_trvm, .fgt = FGT_TCR_EL1, },
58
+ num = extract64(value, 39, 5);
76
{ .name = "ATCR_EL2", .state = ARM_CP_STATE_AA64,
59
+ scale = extract64(value, 44, 2);
77
.opc0 = 3, .opc1 = 4, .crn = 15, .crm = 7, .opc2 = 0,
60
exponent = (5 * scale) + 1;
78
.access = PL2_RW, .type = ARM_CP_CONST, .resetvalue = 0 },
61
- length = (num + 1) << (exponent + page_shift);
79
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo neoverse_n1_cp_reginfo[] = {
62
80
.access = PL2_RW, .type = ARM_CP_CONST, .resetvalue = 0 },
63
- return length;
81
{ .name = "CPUACTLR_EL1", .state = ARM_CP_STATE_AA64,
64
-}
82
.opc0 = 3, .opc1 = 0, .crn = 15, .crm = 1, .opc2 = 0,
65
+ ret.length = (num + 1) << (exponent + page_shift);
83
- .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 },
66
84
+ .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0,
67
-static uint64_t tlbi_aa64_range_get_base(CPUARMState *env, uint64_t value,
85
+ .accessfn = access_actlr_w },
68
- bool two_ranges)
86
{ .name = "CPUACTLR2_EL1", .state = ARM_CP_STATE_AA64,
69
-{
87
.opc0 = 3, .opc1 = 0, .crn = 15, .crm = 1, .opc2 = 1,
70
- /* TODO: ARMv8.7 FEAT_LPA2 */
88
- .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 },
71
- uint64_t pageaddr;
89
+ .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0,
72
-
90
+ .accessfn = access_actlr_w },
73
- if (two_ranges) {
91
{ .name = "CPUACTLR3_EL1", .state = ARM_CP_STATE_AA64,
74
- pageaddr = sextract64(value, 0, 37) << TARGET_PAGE_BITS;
92
.opc0 = 3, .opc1 = 0, .crn = 15, .crm = 1, .opc2 = 2,
75
+ if (regime_has_2_ranges(mmuidx)) {
93
- .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 },
76
+ ret.base = sextract64(value, 0, 37) << TARGET_PAGE_BITS;
94
+ .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0,
77
} else {
95
+ .accessfn = access_actlr_w },
78
- pageaddr = extract64(value, 0, 37) << TARGET_PAGE_BITS;
96
/*
79
+ ret.base = extract64(value, 0, 37) << TARGET_PAGE_BITS;
97
* Report CPUCFR_EL1.SCU as 1, as we do not implement the DSU
80
}
98
* (and in particular its system registers).
81
99
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo neoverse_n1_cp_reginfo[] = {
82
- return pageaddr;
100
.access = PL1_R, .type = ARM_CP_CONST, .resetvalue = 4 },
83
+ return ret;
101
{ .name = "CPUECTLR_EL1", .state = ARM_CP_STATE_AA64,
84
}
102
.opc0 = 3, .opc1 = 0, .crn = 15, .crm = 1, .opc2 = 4,
85
103
- .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0x961563010 },
86
static void do_rvae_write(CPUARMState *env, uint64_t value,
104
+ .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0x961563010,
87
int idxmap, bool synced)
105
+ .accessfn = access_actlr_w },
88
{
106
{ .name = "CPUPCR_EL3", .state = ARM_CP_STATE_AA64,
89
ARMMMUIdx one_idx = ARM_MMU_IDX_A | ctz32(idxmap);
107
.opc0 = 3, .opc1 = 6, .crn = 15, .crm = 8, .opc2 = 1,
90
- bool two_ranges = regime_has_2_ranges(one_idx);
108
.access = PL3_RW, .type = ARM_CP_CONST, .resetvalue = 0 },
91
- uint64_t baseaddr, length;
109
@@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo neoverse_n1_cp_reginfo[] = {
92
+ TLBIRange range;
110
.access = PL3_RW, .type = ARM_CP_CONST, .resetvalue = 0 },
93
int bits;
111
{ .name = "CPUPWRCTLR_EL1", .state = ARM_CP_STATE_AA64,
94
112
.opc0 = 3, .opc1 = 0, .crn = 15, .crm = 2, .opc2 = 7,
95
- baseaddr = tlbi_aa64_range_get_base(env, value, two_ranges);
113
- .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 },
96
- length = tlbi_aa64_range_get_length(env, value);
114
+ .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0,
97
- bits = tlbbits_for_regime(env, one_idx, baseaddr);
115
+ .accessfn = access_actlr_w },
98
+ range = tlbi_aa64_get_range(env, one_idx, value);
116
{ .name = "ERXPFGCDN_EL1", .state = ARM_CP_STATE_AA64,
99
+ bits = tlbbits_for_regime(env, one_idx, range.base);
117
.opc0 = 3, .opc1 = 0, .crn = 15, .crm = 2, .opc2 = 2,
100
118
- .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 },
101
if (synced) {
119
+ .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0,
102
tlb_flush_range_by_mmuidx_all_cpus_synced(env_cpu(env),
120
+ .accessfn = access_actlr_w },
103
- baseaddr,
121
{ .name = "ERXPFGCTL_EL1", .state = ARM_CP_STATE_AA64,
104
- length,
122
.opc0 = 3, .opc1 = 0, .crn = 15, .crm = 2, .opc2 = 1,
105
+ range.base,
123
- .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 },
106
+ range.length,
124
+ .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0,
107
idxmap,
125
+ .accessfn = access_actlr_w },
108
bits);
126
{ .name = "ERXPFGF_EL1", .state = ARM_CP_STATE_AA64,
109
} else {
127
.opc0 = 3, .opc1 = 0, .crn = 15, .crm = 2, .opc2 = 0,
110
- tlb_flush_range_by_mmuidx(env_cpu(env), baseaddr,
128
- .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 },
111
- length, idxmap, bits);
129
+ .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0,
112
+ tlb_flush_range_by_mmuidx(env_cpu(env), range.base,
130
+ .accessfn = access_actlr_w },
113
+ range.length, idxmap, bits);
131
};
114
}
132
115
}
133
static void define_neoverse_n1_cp_reginfo(ARMCPU *cpu)
116
117
--
134
--
118
2.25.1
135
2.34.1
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
We support 16k pages, but do not advertize that in ID_AA64MMFR0.
3
There is only one additional EL1 register modeled, which
4
4
also needs to use access_actlr_w.
5
The value 0 in the TGRAN*_2 fields indicates that stage2 lookups defer
6
to the same support as stage1 lookups. This setting is deprecated, so
7
indicate support for all stage2 page sizes directly.
8
5
9
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
Message-id: 20220301215958.157011-16-richard.henderson@linaro.org
8
Message-id: 20230811214031.171020-8-richard.henderson@linaro.org
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
---
10
---
14
target/arm/cpu64.c | 4 ++++
11
target/arm/tcg/cpu64.c | 3 ++-
15
1 file changed, 4 insertions(+)
12
1 file changed, 2 insertions(+), 1 deletion(-)
16
13
17
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
14
diff --git a/target/arm/tcg/cpu64.c b/target/arm/tcg/cpu64.c
18
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
19
--- a/target/arm/cpu64.c
16
--- a/target/arm/tcg/cpu64.c
20
+++ b/target/arm/cpu64.c
17
+++ b/target/arm/tcg/cpu64.c
21
@@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj)
18
@@ -XXX,XX +XXX,XX @@ static void define_neoverse_n1_cp_reginfo(ARMCPU *cpu)
22
19
static const ARMCPRegInfo neoverse_v1_cp_reginfo[] = {
23
t = cpu->isar.id_aa64mmfr0;
20
{ .name = "CPUECTLR2_EL1", .state = ARM_CP_STATE_AA64,
24
t = FIELD_DP64(t, ID_AA64MMFR0, PARANGE, 6); /* FEAT_LPA: 52 bits */
21
.opc0 = 3, .opc1 = 0, .crn = 15, .crm = 1, .opc2 = 5,
25
+ t = FIELD_DP64(t, ID_AA64MMFR0, TGRAN16, 1); /* 16k pages supported */
22
- .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 },
26
+ t = FIELD_DP64(t, ID_AA64MMFR0, TGRAN16_2, 2); /* 16k stage2 supported */
23
+ .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0,
27
+ t = FIELD_DP64(t, ID_AA64MMFR0, TGRAN64_2, 2); /* 64k stage2 supported */
24
+ .accessfn = access_actlr_w },
28
+ t = FIELD_DP64(t, ID_AA64MMFR0, TGRAN4_2, 2); /* 4k stage2 supported */
25
{ .name = "CPUPPMCR_EL3", .state = ARM_CP_STATE_AA64,
29
cpu->isar.id_aa64mmfr0 = t;
26
.opc0 = 3, .opc1 = 6, .crn = 15, .crm = 2, .opc2 = 0,
30
27
.access = PL3_RW, .type = ARM_CP_CONST, .resetvalue = 0 },
31
t = cpu->isar.id_aa64mmfr1;
32
--
28
--
33
2.25.1
29
2.34.1
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
Set this as the kernel would, to 48 bits, to keep the computation
3
Like FEAT_TRF (Self-hosted Trace Extension), suppress tracing
4
of the address space correct for PAuth.
4
external to the cpu, which is out of scope for QEMU.
5
5
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
6
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
8
Message-id: 20230811214031.171020-10-richard.henderson@linaro.org
8
Message-id: 20220301215958.157011-3-richard.henderson@linaro.org
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
---
10
---
11
target/arm/cpu.c | 3 ++-
11
target/arm/cpu.c | 3 +++
12
1 file changed, 2 insertions(+), 1 deletion(-)
12
1 file changed, 3 insertions(+)
13
13
14
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
14
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
15
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
16
--- a/target/arm/cpu.c
16
--- a/target/arm/cpu.c
17
+++ b/target/arm/cpu.c
17
+++ b/target/arm/cpu.c
18
@@ -XXX,XX +XXX,XX @@ static void arm_cpu_reset(DeviceState *dev)
18
@@ -XXX,XX +XXX,XX @@ static void arm_cpu_realizefn(DeviceState *dev, Error **errp)
19
aarch64_sve_zcr_get_valid_len(cpu, cpu->sve_default_vq - 1);
19
/* FEAT_SPE (Statistical Profiling Extension) */
20
}
20
cpu->isar.id_aa64dfr0 =
21
/*
21
FIELD_DP64(cpu->isar.id_aa64dfr0, ID_AA64DFR0, PMSVER, 0);
22
+ * Enable 48-bit address space (TODO: take reserved_va into account).
22
+ /* FEAT_TRBE (Trace Buffer Extension) */
23
* Enable TBI0 but not TBI1.
23
+ cpu->isar.id_aa64dfr0 =
24
* Note that this must match useronly_clean_ptr.
24
+ FIELD_DP64(cpu->isar.id_aa64dfr0, ID_AA64DFR0, TRACEBUFFER, 0);
25
*/
25
/* FEAT_TRF (Self-hosted Trace Extension) */
26
- env->cp15.tcr_el[1].raw_tcr = (1ULL << 37);
26
cpu->isar.id_aa64dfr0 =
27
+ env->cp15.tcr_el[1].raw_tcr = 5 | (1ULL << 37);
27
FIELD_DP64(cpu->isar.id_aa64dfr0, ID_AA64DFR0, TRACEFILT, 0);
28
29
/* Enable MTE */
30
if (cpu_isar_feature(aa64_mte, cpu)) {
31
--
28
--
32
2.25.1
29
2.34.1
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
This feature widens physical addresses (and intermediate physical
3
This feature allows the operating system to set TCR_ELx.HWU*
4
addresses for 2-stage translation) from 48 to 52 bits, when using
4
to allow the implementation to use the PBHA bits from the
5
64k pages. The only thing left at this point is to handle the
5
block and page descriptors for for IMPLEMENTATION DEFINED
6
extra bits in the TTBR and in the table descriptors.
6
purposes. Since QEMU has no need to use these bits, we may
7
simply ignore them.
7
8
8
Note that PAR_EL1 and HPFAR_EL2 are nominally extended, but we don't
9
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
9
mask out the high bits when writing to those registers, so no changes
10
are required there.
11
12
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
13
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
11
Message-id: 20230811214031.171020-11-richard.henderson@linaro.org
14
Message-id: 20220301215958.157011-11-richard.henderson@linaro.org
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
---
13
---
17
docs/system/arm/emulation.rst | 1 +
14
docs/system/arm/emulation.rst | 1 +
18
target/arm/cpu-param.h | 2 +-
15
target/arm/tcg/cpu32.c | 2 +-
19
target/arm/cpu64.c | 2 +-
16
target/arm/tcg/cpu64.c | 2 +-
20
target/arm/helper.c | 19 ++++++++++++++++---
17
3 files changed, 3 insertions(+), 2 deletions(-)
21
4 files changed, 19 insertions(+), 5 deletions(-)
22
18
23
diff --git a/docs/system/arm/emulation.rst b/docs/system/arm/emulation.rst
19
diff --git a/docs/system/arm/emulation.rst b/docs/system/arm/emulation.rst
24
index XXXXXXX..XXXXXXX 100644
20
index XXXXXXX..XXXXXXX 100644
25
--- a/docs/system/arm/emulation.rst
21
--- a/docs/system/arm/emulation.rst
26
+++ b/docs/system/arm/emulation.rst
22
+++ b/docs/system/arm/emulation.rst
27
@@ -XXX,XX +XXX,XX @@ the following architecture extensions:
23
@@ -XXX,XX +XXX,XX @@ the following architecture extensions:
24
- FEAT_HAFDBS (Hardware management of the access flag and dirty bit state)
25
- FEAT_HCX (Support for the HCRX_EL2 register)
26
- FEAT_HPDS (Hierarchical permission disables)
27
+- FEAT_HPDS2 (Translation table page-based hardware attributes)
28
- FEAT_I8MM (AArch64 Int8 matrix multiplication instructions)
28
- FEAT_I8MM (AArch64 Int8 matrix multiplication instructions)
29
- FEAT_JSCVT (JavaScript conversion instructions)
29
- FEAT_IDST (ID space trap handling)
30
- FEAT_LOR (Limited ordering regions)
30
- FEAT_IESB (Implicit error synchronization event)
31
+- FEAT_LPA (Large Physical Address space)
31
diff --git a/target/arm/tcg/cpu32.c b/target/arm/tcg/cpu32.c
32
- FEAT_LRCPC (Load-acquire RCpc instructions)
33
- FEAT_LRCPC2 (Load-acquire RCpc instructions v2)
34
- FEAT_LSE (Large System Extensions)
35
diff --git a/target/arm/cpu-param.h b/target/arm/cpu-param.h
36
index XXXXXXX..XXXXXXX 100644
32
index XXXXXXX..XXXXXXX 100644
37
--- a/target/arm/cpu-param.h
33
--- a/target/arm/tcg/cpu32.c
38
+++ b/target/arm/cpu-param.h
34
+++ b/target/arm/tcg/cpu32.c
39
@@ -XXX,XX +XXX,XX @@
35
@@ -XXX,XX +XXX,XX @@ void aa32_max_features(ARMCPU *cpu)
40
36
cpu->isar.id_mmfr3 = t;
41
#ifdef TARGET_AARCH64
37
42
# define TARGET_LONG_BITS 64
38
t = cpu->isar.id_mmfr4;
43
-# define TARGET_PHYS_ADDR_SPACE_BITS 48
39
- t = FIELD_DP32(t, ID_MMFR4, HPDS, 1); /* FEAT_AA32HPD */
44
+# define TARGET_PHYS_ADDR_SPACE_BITS 52
40
+ t = FIELD_DP32(t, ID_MMFR4, HPDS, 2); /* FEAT_HPDS2 */
45
# define TARGET_VIRT_ADDR_SPACE_BITS 52
41
t = FIELD_DP32(t, ID_MMFR4, AC2, 1); /* ACTLR2, HACTLR2 */
46
#else
42
t = FIELD_DP32(t, ID_MMFR4, CNP, 1); /* FEAT_TTCNP */
47
# define TARGET_LONG_BITS 32
43
t = FIELD_DP32(t, ID_MMFR4, XNX, 1); /* FEAT_XNX */
48
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
44
diff --git a/target/arm/tcg/cpu64.c b/target/arm/tcg/cpu64.c
49
index XXXXXXX..XXXXXXX 100644
45
index XXXXXXX..XXXXXXX 100644
50
--- a/target/arm/cpu64.c
46
--- a/target/arm/tcg/cpu64.c
51
+++ b/target/arm/cpu64.c
47
+++ b/target/arm/tcg/cpu64.c
52
@@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj)
48
@@ -XXX,XX +XXX,XX @@ void aarch64_max_tcg_initfn(Object *obj)
53
cpu->isar.id_aa64pfr1 = t;
49
t = FIELD_DP64(t, ID_AA64MMFR1, HAFDBS, 2); /* FEAT_HAFDBS */
54
50
t = FIELD_DP64(t, ID_AA64MMFR1, VMIDBITS, 2); /* FEAT_VMID16 */
55
t = cpu->isar.id_aa64mmfr0;
51
t = FIELD_DP64(t, ID_AA64MMFR1, VH, 1); /* FEAT_VHE */
56
- t = FIELD_DP64(t, ID_AA64MMFR0, PARANGE, 5); /* PARange: 48 bits */
52
- t = FIELD_DP64(t, ID_AA64MMFR1, HPDS, 1); /* FEAT_HPDS */
57
+ t = FIELD_DP64(t, ID_AA64MMFR0, PARANGE, 6); /* FEAT_LPA: 52 bits */
53
+ t = FIELD_DP64(t, ID_AA64MMFR1, HPDS, 2); /* FEAT_HPDS2 */
58
cpu->isar.id_aa64mmfr0 = t;
54
t = FIELD_DP64(t, ID_AA64MMFR1, LO, 1); /* FEAT_LOR */
59
55
t = FIELD_DP64(t, ID_AA64MMFR1, PAN, 3); /* FEAT_PAN3 */
60
t = cpu->isar.id_aa64mmfr1;
56
t = FIELD_DP64(t, ID_AA64MMFR1, XNX, 1); /* FEAT_XNX */
61
diff --git a/target/arm/helper.c b/target/arm/helper.c
62
index XXXXXXX..XXXXXXX 100644
63
--- a/target/arm/helper.c
64
+++ b/target/arm/helper.c
65
@@ -XXX,XX +XXX,XX @@ static const uint8_t pamax_map[] = {
66
[3] = 42,
67
[4] = 44,
68
[5] = 48,
69
+ [6] = 52,
70
};
71
72
/* The cpu-specific constant value of PAMax; also used by hw/arm/virt. */
73
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address,
74
descaddr = extract64(ttbr, 0, 48);
75
76
/*
77
- * If the base address is out of range, raise AddressSizeFault.
78
+ * For FEAT_LPA and PS=6, bits [51:48] of descaddr are in [5:2] of TTBR.
79
+ *
80
+ * Otherwise, if the base address is out of range, raise AddressSizeFault.
81
* In the pseudocode, this is !IsZero(baseregister<47:outputsize>),
82
* but we've just cleared the bits above 47, so simplify the test.
83
*/
84
- if (descaddr >> outputsize) {
85
+ if (outputsize > 48) {
86
+ descaddr |= extract64(ttbr, 2, 4) << 48;
87
+ } else if (descaddr >> outputsize) {
88
level = 0;
89
fault_type = ARMFault_AddressSize;
90
goto do_fault;
91
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address,
92
}
93
94
descaddr = descriptor & descaddrmask;
95
- if (descaddr >> outputsize) {
96
+
97
+ /*
98
+ * For FEAT_LPA and PS=6, bits [51:48] of descaddr are in [15:12]
99
+ * of descriptor. Otherwise, if descaddr is out of range, raise
100
+ * AddressSizeFault.
101
+ */
102
+ if (outputsize > 48) {
103
+ descaddr |= extract64(descriptor, 12, 4) << 48;
104
+ } else if (descaddr >> outputsize) {
105
fault_type = ARMFault_AddressSize;
106
goto do_fault;
107
}
108
--
57
--
109
2.25.1
58
2.34.1
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Alex Bennée <alex.bennee@linaro.org>
2
2
3
This feature is relatively small, as it applies only to
3
This is a mandatory feature for Armv8.1 architectures but we don't
4
64k pages and thus requires no additional changes to the
4
state the feature clearly in our emulation list. Also include
5
table descriptor walking algorithm, only a change to the
5
FEAT_CRC32 comment in aarch64_max_tcg_initfn for ease of grepping.
6
minimum TSZ (which is the inverse of the maximum virtual
7
address space size).
8
6
9
Note that this feature widens VBAR_ELx, but we already
7
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
10
treat the register as being 64 bits wide.
8
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
11
9
Message-id: 20230824075406.1515566-1-alex.bennee@linaro.org
12
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
Cc: qemu-stable@nongnu.org
13
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
11
Message-Id: <20230222110104.3996971-1-alex.bennee@linaro.org>
14
Message-id: 20220301215958.157011-10-richard.henderson@linaro.org
12
[PMM: pluralize 'instructions' in docs]
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
---
14
---
17
docs/system/arm/emulation.rst | 1 +
15
docs/system/arm/emulation.rst | 1 +
18
target/arm/cpu-param.h | 2 +-
16
target/arm/tcg/cpu64.c | 2 +-
19
target/arm/cpu.h | 5 +++++
17
2 files changed, 2 insertions(+), 1 deletion(-)
20
target/arm/cpu64.c | 1 +
21
target/arm/helper.c | 9 ++++++++-
22
5 files changed, 16 insertions(+), 2 deletions(-)
23
18
24
diff --git a/docs/system/arm/emulation.rst b/docs/system/arm/emulation.rst
19
diff --git a/docs/system/arm/emulation.rst b/docs/system/arm/emulation.rst
25
index XXXXXXX..XXXXXXX 100644
20
index XXXXXXX..XXXXXXX 100644
26
--- a/docs/system/arm/emulation.rst
21
--- a/docs/system/arm/emulation.rst
27
+++ b/docs/system/arm/emulation.rst
22
+++ b/docs/system/arm/emulation.rst
28
@@ -XXX,XX +XXX,XX @@ the following architecture extensions:
23
@@ -XXX,XX +XXX,XX @@ the following architecture extensions:
29
- FEAT_LRCPC (Load-acquire RCpc instructions)
24
- FEAT_BBM at level 2 (Translation table break-before-make levels)
30
- FEAT_LRCPC2 (Load-acquire RCpc instructions v2)
25
- FEAT_BF16 (AArch64 BFloat16 instructions)
31
- FEAT_LSE (Large System Extensions)
26
- FEAT_BTI (Branch Target Identification)
32
+- FEAT_LVA (Large Virtual Address space)
27
+- FEAT_CRC32 (CRC32 instructions)
33
- FEAT_MTE (Memory Tagging Extension)
28
- FEAT_CSV2 (Cache speculation variant 2)
34
- FEAT_MTE2 (Memory Tagging Extension)
29
- FEAT_CSV2_1p1 (Cache speculation variant 2, version 1.1)
35
- FEAT_MTE3 (MTE Asymmetric Fault Handling)
30
- FEAT_CSV2_1p2 (Cache speculation variant 2, version 1.2)
36
diff --git a/target/arm/cpu-param.h b/target/arm/cpu-param.h
31
diff --git a/target/arm/tcg/cpu64.c b/target/arm/tcg/cpu64.c
37
index XXXXXXX..XXXXXXX 100644
32
index XXXXXXX..XXXXXXX 100644
38
--- a/target/arm/cpu-param.h
33
--- a/target/arm/tcg/cpu64.c
39
+++ b/target/arm/cpu-param.h
34
+++ b/target/arm/tcg/cpu64.c
40
@@ -XXX,XX +XXX,XX @@
35
@@ -XXX,XX +XXX,XX @@ void aarch64_max_tcg_initfn(Object *obj)
41
#ifdef TARGET_AARCH64
36
t = FIELD_DP64(t, ID_AA64ISAR0, AES, 2); /* FEAT_PMULL */
42
# define TARGET_LONG_BITS 64
37
t = FIELD_DP64(t, ID_AA64ISAR0, SHA1, 1); /* FEAT_SHA1 */
43
# define TARGET_PHYS_ADDR_SPACE_BITS 48
38
t = FIELD_DP64(t, ID_AA64ISAR0, SHA2, 2); /* FEAT_SHA512 */
44
-# define TARGET_VIRT_ADDR_SPACE_BITS 48
39
- t = FIELD_DP64(t, ID_AA64ISAR0, CRC32, 1);
45
+# define TARGET_VIRT_ADDR_SPACE_BITS 52
40
+ t = FIELD_DP64(t, ID_AA64ISAR0, CRC32, 1); /* FEAT_CRC32 */
46
#else
41
t = FIELD_DP64(t, ID_AA64ISAR0, ATOMIC, 2); /* FEAT_LSE */
47
# define TARGET_LONG_BITS 32
42
t = FIELD_DP64(t, ID_AA64ISAR0, RDM, 1); /* FEAT_RDM */
48
# define TARGET_PHYS_ADDR_SPACE_BITS 40
43
t = FIELD_DP64(t, ID_AA64ISAR0, SHA3, 1); /* FEAT_SHA3 */
49
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
50
index XXXXXXX..XXXXXXX 100644
51
--- a/target/arm/cpu.h
52
+++ b/target/arm/cpu.h
53
@@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_ccidx(const ARMISARegisters *id)
54
return FIELD_EX64(id->id_aa64mmfr2, ID_AA64MMFR2, CCIDX) != 0;
55
}
56
57
+static inline bool isar_feature_aa64_lva(const ARMISARegisters *id)
58
+{
59
+ return FIELD_EX64(id->id_aa64mmfr2, ID_AA64MMFR2, VARANGE) != 0;
60
+}
61
+
62
static inline bool isar_feature_aa64_tts2uxn(const ARMISARegisters *id)
63
{
64
return FIELD_EX64(id->id_aa64mmfr1, ID_AA64MMFR1, XNX) != 0;
65
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
66
index XXXXXXX..XXXXXXX 100644
67
--- a/target/arm/cpu64.c
68
+++ b/target/arm/cpu64.c
69
@@ -XXX,XX +XXX,XX @@ static void aarch64_max_initfn(Object *obj)
70
t = FIELD_DP64(t, ID_AA64MMFR2, UAO, 1);
71
t = FIELD_DP64(t, ID_AA64MMFR2, CNP, 1); /* TTCNP */
72
t = FIELD_DP64(t, ID_AA64MMFR2, ST, 1); /* TTST */
73
+ t = FIELD_DP64(t, ID_AA64MMFR2, VARANGE, 1); /* FEAT_LVA */
74
cpu->isar.id_aa64mmfr2 = t;
75
76
t = cpu->isar.id_aa64zfr0;
77
diff --git a/target/arm/helper.c b/target/arm/helper.c
78
index XXXXXXX..XXXXXXX 100644
79
--- a/target/arm/helper.c
80
+++ b/target/arm/helper.c
81
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
82
} else {
83
max_tsz = 39;
84
}
85
- min_tsz = 16; /* TODO: ARMv8.2-LVA */
86
+
87
+ min_tsz = 16;
88
+ if (using64k) {
89
+ if (cpu_isar_feature(aa64_lva, env_archcpu(env))) {
90
+ min_tsz = 12;
91
+ }
92
+ }
93
+ /* TODO: FEAT_LPA2 */
94
95
if (tsz > max_tsz) {
96
tsz = max_tsz;
97
--
44
--
98
2.25.1
45
2.34.1
46
47
diff view generated by jsdifflib
1
From: Wentao_Liang <Wentao_Liang_g@163.com>
1
From: Jean-Christophe Dubois <jcd@tribudubois.net>
2
2
3
handle_simd_shift_fpint_conv() was accidentally freeing the TCG
3
i.MX7 IOMUX GPR device is not equivalent to i.MX6UL IOMUXC GPR device.
4
temporary tcg_fpstatus too early, before the last use of it. Move
4
In particular, register 22 is not present on i.MX6UL and this is actualy
5
the free down to where it belongs.
5
The only register that is really emulated in the i.MX7 IOMUX GPR device.
6
6
7
Signed-off-by: Wentao_Liang <Wentao_Liang_g@163.com>
7
Note: The i.MX6UL code is actually also implementing the IOMUX GPR device
8
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
8
as an unimplemented device at the same bus adress and the 2 instantiations
9
[PMM: cleaned up commit message]
9
were actualy colliding. So we go back to the unimplemented device for now.
10
11
Signed-off-by: Jean-Christophe Dubois <jcd@tribudubois.net>
12
Message-id: 48681bf51ee97646479bb261bee19abebbc8074e.1692964892.git.jcd@tribudubois.net
13
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
15
---
12
target/arm/translate-a64.c | 2 +-
16
include/hw/arm/fsl-imx6ul.h | 2 --
13
1 file changed, 1 insertion(+), 1 deletion(-)
17
hw/arm/fsl-imx6ul.c | 11 -----------
18
2 files changed, 13 deletions(-)
14
19
15
diff --git a/target/arm/translate-a64.c b/target/arm/translate-a64.c
20
diff --git a/include/hw/arm/fsl-imx6ul.h b/include/hw/arm/fsl-imx6ul.h
16
index XXXXXXX..XXXXXXX 100644
21
index XXXXXXX..XXXXXXX 100644
17
--- a/target/arm/translate-a64.c
22
--- a/include/hw/arm/fsl-imx6ul.h
18
+++ b/target/arm/translate-a64.c
23
+++ b/include/hw/arm/fsl-imx6ul.h
19
@@ -XXX,XX +XXX,XX @@ static void handle_simd_shift_fpint_conv(DisasContext *s, bool is_scalar,
24
@@ -XXX,XX +XXX,XX @@
20
}
25
#include "hw/misc/imx6ul_ccm.h"
26
#include "hw/misc/imx6_src.h"
27
#include "hw/misc/imx7_snvs.h"
28
-#include "hw/misc/imx7_gpr.h"
29
#include "hw/intc/imx_gpcv2.h"
30
#include "hw/watchdog/wdt_imx2.h"
31
#include "hw/gpio/imx_gpio.h"
32
@@ -XXX,XX +XXX,XX @@ struct FslIMX6ULState {
33
IMX6SRCState src;
34
IMX7SNVSState snvs;
35
IMXGPCv2State gpcv2;
36
- IMX7GPRState gpr;
37
IMXSPIState spi[FSL_IMX6UL_NUM_ECSPIS];
38
IMXI2CState i2c[FSL_IMX6UL_NUM_I2CS];
39
IMXSerialState uart[FSL_IMX6UL_NUM_UARTS];
40
diff --git a/hw/arm/fsl-imx6ul.c b/hw/arm/fsl-imx6ul.c
41
index XXXXXXX..XXXXXXX 100644
42
--- a/hw/arm/fsl-imx6ul.c
43
+++ b/hw/arm/fsl-imx6ul.c
44
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_init(Object *obj)
45
*/
46
object_initialize_child(obj, "snvs", &s->snvs, TYPE_IMX7_SNVS);
47
48
- /*
49
- * GPR
50
- */
51
- object_initialize_child(obj, "gpr", &s->gpr, TYPE_IMX7_GPR);
52
-
53
/*
54
* GPIOs 1 to 5
55
*/
56
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_realize(DeviceState *dev, Error **errp)
57
FSL_IMX6UL_WDOGn_IRQ[i]));
21
}
58
}
22
59
23
- tcg_temp_free_ptr(tcg_fpstatus);
60
- /*
24
tcg_temp_free_i32(tcg_shift);
61
- * GPR
25
gen_helper_set_rmode(tcg_rmode, tcg_rmode, tcg_fpstatus);
62
- */
26
+ tcg_temp_free_ptr(tcg_fpstatus);
63
- sysbus_realize(SYS_BUS_DEVICE(&s->gpr), &error_abort);
27
tcg_temp_free_i32(tcg_rmode);
64
- sysbus_mmio_map(SYS_BUS_DEVICE(&s->gpr), 0, FSL_IMX6UL_IOMUXC_GPR_ADDR);
28
}
65
-
29
66
/*
67
* SDMA
68
*/
30
--
69
--
31
2.25.1
70
2.34.1
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Jean-Christophe Dubois <jcd@tribudubois.net>
2
2
3
With FEAT_LPA2, rather than introducing translation level 4,
3
* Add Addr and size definition for most i.MX6UL devices in i.MX6UL header file.
4
we introduce level -1, below the current level 0. Extend
4
* Use those newly defined named constants whenever possible.
5
arm_fi_to_lfsc to handle these faults.
5
* Standardize the way we init a familly of unimplemented devices
6
- SAI
7
- PWM
8
- CAN
9
* Add/rework few comments
6
10
7
Assert that this new translation level does not leak into
11
Signed-off-by: Jean-Christophe Dubois <jcd@tribudubois.net>
8
fault types for which it is not defined, which allows some
12
Message-id: d579043fbd4e4b490370783fda43fc02c8e9be75.1692964892.git.jcd@tribudubois.net
9
masking of fi->level to be removed.
10
11
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
13
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
13
Message-id: 20220301215958.157011-12-richard.henderson@linaro.org
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
15
---
15
---
16
target/arm/internals.h | 35 +++++++++++++++++++++++++++++------
16
include/hw/arm/fsl-imx6ul.h | 156 +++++++++++++++++++++++++++++++-----
17
1 file changed, 29 insertions(+), 6 deletions(-)
17
hw/arm/fsl-imx6ul.c | 147 ++++++++++++++++++++++-----------
18
2 files changed, 232 insertions(+), 71 deletions(-)
18
19
19
diff --git a/target/arm/internals.h b/target/arm/internals.h
20
diff --git a/include/hw/arm/fsl-imx6ul.h b/include/hw/arm/fsl-imx6ul.h
20
index XXXXXXX..XXXXXXX 100644
21
index XXXXXXX..XXXXXXX 100644
21
--- a/target/arm/internals.h
22
--- a/include/hw/arm/fsl-imx6ul.h
22
+++ b/target/arm/internals.h
23
+++ b/include/hw/arm/fsl-imx6ul.h
23
@@ -XXX,XX +XXX,XX @@ static inline uint32_t arm_fi_to_lfsc(ARMMMUFaultInfo *fi)
24
@@ -XXX,XX +XXX,XX @@
24
case ARMFault_None:
25
#include "exec/memory.h"
25
return 0;
26
#include "cpu.h"
26
case ARMFault_AddressSize:
27
#include "qom/object.h"
27
- fsc = fi->level & 3;
28
+#include "qemu/units.h"
28
+ assert(fi->level >= -1 && fi->level <= 3);
29
29
+ if (fi->level < 0) {
30
#define TYPE_FSL_IMX6UL "fsl-imx6ul"
30
+ fsc = 0b101001;
31
OBJECT_DECLARE_SIMPLE_TYPE(FslIMX6ULState, FSL_IMX6UL)
31
+ } else {
32
@@ -XXX,XX +XXX,XX @@ enum FslIMX6ULConfiguration {
32
+ fsc = fi->level;
33
FSL_IMX6UL_NUM_ADCS = 2,
33
+ }
34
FSL_IMX6UL_NUM_USB_PHYS = 2,
34
break;
35
FSL_IMX6UL_NUM_USBS = 2,
35
case ARMFault_AccessFlag:
36
+ FSL_IMX6UL_NUM_SAIS = 3,
36
- fsc = (fi->level & 3) | (0x2 << 2);
37
+ FSL_IMX6UL_NUM_CANS = 2,
37
+ assert(fi->level >= 0 && fi->level <= 3);
38
+ FSL_IMX6UL_NUM_PWMS = 4,
38
+ fsc = 0b001000 | fi->level;
39
};
39
break;
40
40
case ARMFault_Permission:
41
struct FslIMX6ULState {
41
- fsc = (fi->level & 3) | (0x3 << 2);
42
@@ -XXX,XX +XXX,XX @@ struct FslIMX6ULState {
42
+ assert(fi->level >= 0 && fi->level <= 3);
43
43
+ fsc = 0b001100 | fi->level;
44
enum FslIMX6ULMemoryMap {
44
break;
45
FSL_IMX6UL_MMDC_ADDR = 0x80000000,
45
case ARMFault_Translation:
46
- FSL_IMX6UL_MMDC_SIZE = 2 * 1024 * 1024 * 1024UL,
46
- fsc = (fi->level & 3) | (0x1 << 2);
47
+ FSL_IMX6UL_MMDC_SIZE = (2 * GiB),
47
+ assert(fi->level >= -1 && fi->level <= 3);
48
48
+ if (fi->level < 0) {
49
FSL_IMX6UL_QSPI1_MEM_ADDR = 0x60000000,
49
+ fsc = 0b101011;
50
- FSL_IMX6UL_EIM_ALIAS_ADDR = 0x58000000,
50
+ } else {
51
- FSL_IMX6UL_EIM_CS_ADDR = 0x50000000,
51
+ fsc = 0b000100 | fi->level;
52
- FSL_IMX6UL_AES_ENCRYPT_ADDR = 0x10000000,
52
+ }
53
- FSL_IMX6UL_QSPI1_RX_ADDR = 0x0C000000,
53
break;
54
+ FSL_IMX6UL_QSPI1_MEM_SIZE = (256 * MiB),
54
case ARMFault_SyncExternal:
55
55
fsc = 0x10 | (fi->ea << 12);
56
- /* AIPS-2 */
56
break;
57
+ FSL_IMX6UL_EIM_ALIAS_ADDR = 0x58000000,
57
case ARMFault_SyncExternalOnWalk:
58
+ FSL_IMX6UL_EIM_ALIAS_SIZE = (128 * MiB),
58
- fsc = (fi->level & 3) | (0x5 << 2) | (fi->ea << 12);
59
+
59
+ assert(fi->level >= -1 && fi->level <= 3);
60
+ FSL_IMX6UL_EIM_CS_ADDR = 0x50000000,
60
+ if (fi->level < 0) {
61
+ FSL_IMX6UL_EIM_CS_SIZE = (128 * MiB),
61
+ fsc = 0b010011;
62
+
62
+ } else {
63
+ FSL_IMX6UL_AES_ENCRYPT_ADDR = 0x10000000,
63
+ fsc = 0b010100 | fi->level;
64
+ FSL_IMX6UL_AES_ENCRYPT_SIZE = (1 * MiB),
64
+ }
65
+
65
+ fsc |= fi->ea << 12;
66
+ FSL_IMX6UL_QSPI1_RX_ADDR = 0x0C000000,
66
break;
67
+ FSL_IMX6UL_QSPI1_RX_SIZE = (32 * MiB),
67
case ARMFault_SyncParity:
68
+
68
fsc = 0x18;
69
+ /* AIPS-2 Begin */
69
break;
70
FSL_IMX6UL_UART6_ADDR = 0x021FC000,
70
case ARMFault_SyncParityOnWalk:
71
+
71
- fsc = (fi->level & 3) | (0x7 << 2);
72
FSL_IMX6UL_I2C4_ADDR = 0x021F8000,
72
+ assert(fi->level >= -1 && fi->level <= 3);
73
+
73
+ if (fi->level < 0) {
74
FSL_IMX6UL_UART5_ADDR = 0x021F4000,
74
+ fsc = 0b011011;
75
FSL_IMX6UL_UART4_ADDR = 0x021F0000,
75
+ } else {
76
FSL_IMX6UL_UART3_ADDR = 0x021EC000,
76
+ fsc = 0b011100 | fi->level;
77
FSL_IMX6UL_UART2_ADDR = 0x021E8000,
77
+ }
78
+
78
break;
79
FSL_IMX6UL_WDOG3_ADDR = 0x021E4000,
79
case ARMFault_AsyncParity:
80
+
80
fsc = 0x19;
81
FSL_IMX6UL_QSPI_ADDR = 0x021E0000,
82
+ FSL_IMX6UL_QSPI_SIZE = 0x500,
83
+
84
FSL_IMX6UL_SYS_CNT_CTRL_ADDR = 0x021DC000,
85
+ FSL_IMX6UL_SYS_CNT_CTRL_SIZE = (16 * KiB),
86
+
87
FSL_IMX6UL_SYS_CNT_CMP_ADDR = 0x021D8000,
88
+ FSL_IMX6UL_SYS_CNT_CMP_SIZE = (16 * KiB),
89
+
90
FSL_IMX6UL_SYS_CNT_RD_ADDR = 0x021D4000,
91
+ FSL_IMX6UL_SYS_CNT_RD_SIZE = (16 * KiB),
92
+
93
FSL_IMX6UL_TZASC_ADDR = 0x021D0000,
94
+ FSL_IMX6UL_TZASC_SIZE = (16 * KiB),
95
+
96
FSL_IMX6UL_PXP_ADDR = 0x021CC000,
97
+ FSL_IMX6UL_PXP_SIZE = (16 * KiB),
98
+
99
FSL_IMX6UL_LCDIF_ADDR = 0x021C8000,
100
+ FSL_IMX6UL_LCDIF_SIZE = 0x100,
101
+
102
FSL_IMX6UL_CSI_ADDR = 0x021C4000,
103
+ FSL_IMX6UL_CSI_SIZE = 0x100,
104
+
105
FSL_IMX6UL_CSU_ADDR = 0x021C0000,
106
+ FSL_IMX6UL_CSU_SIZE = (16 * KiB),
107
+
108
FSL_IMX6UL_OCOTP_CTRL_ADDR = 0x021BC000,
109
+ FSL_IMX6UL_OCOTP_CTRL_SIZE = (4 * KiB),
110
+
111
FSL_IMX6UL_EIM_ADDR = 0x021B8000,
112
+ FSL_IMX6UL_EIM_SIZE = 0x100,
113
+
114
FSL_IMX6UL_SIM2_ADDR = 0x021B4000,
115
+
116
FSL_IMX6UL_MMDC_CFG_ADDR = 0x021B0000,
117
+ FSL_IMX6UL_MMDC_CFG_SIZE = (4 * KiB),
118
+
119
FSL_IMX6UL_ROMCP_ADDR = 0x021AC000,
120
+ FSL_IMX6UL_ROMCP_SIZE = 0x300,
121
+
122
FSL_IMX6UL_I2C3_ADDR = 0x021A8000,
123
FSL_IMX6UL_I2C2_ADDR = 0x021A4000,
124
FSL_IMX6UL_I2C1_ADDR = 0x021A0000,
125
+
126
FSL_IMX6UL_ADC2_ADDR = 0x0219C000,
127
FSL_IMX6UL_ADC1_ADDR = 0x02198000,
128
+ FSL_IMX6UL_ADCn_SIZE = 0x100,
129
+
130
FSL_IMX6UL_USDHC2_ADDR = 0x02194000,
131
FSL_IMX6UL_USDHC1_ADDR = 0x02190000,
132
- FSL_IMX6UL_SIM1_ADDR = 0x0218C000,
133
- FSL_IMX6UL_ENET1_ADDR = 0x02188000,
134
- FSL_IMX6UL_USBO2_USBMISC_ADDR = 0x02184800,
135
- FSL_IMX6UL_USBO2_USB_ADDR = 0x02184000,
136
- FSL_IMX6UL_USBO2_PL301_ADDR = 0x02180000,
137
- FSL_IMX6UL_AIPS2_CFG_ADDR = 0x0217C000,
138
- FSL_IMX6UL_CAAM_ADDR = 0x02140000,
139
- FSL_IMX6UL_A7MPCORE_DAP_ADDR = 0x02100000,
140
141
- /* AIPS-1 */
142
+ FSL_IMX6UL_SIM1_ADDR = 0x0218C000,
143
+ FSL_IMX6UL_SIMn_SIZE = (16 * KiB),
144
+
145
+ FSL_IMX6UL_ENET1_ADDR = 0x02188000,
146
+
147
+ FSL_IMX6UL_USBO2_USBMISC_ADDR = 0x02184800,
148
+ FSL_IMX6UL_USBO2_USB1_ADDR = 0x02184000,
149
+ FSL_IMX6UL_USBO2_USB2_ADDR = 0x02184200,
150
+
151
+ FSL_IMX6UL_USBO2_PL301_ADDR = 0x02180000,
152
+ FSL_IMX6UL_USBO2_PL301_SIZE = (16 * KiB),
153
+
154
+ FSL_IMX6UL_AIPS2_CFG_ADDR = 0x0217C000,
155
+ FSL_IMX6UL_AIPS2_CFG_SIZE = 0x100,
156
+
157
+ FSL_IMX6UL_CAAM_ADDR = 0x02140000,
158
+ FSL_IMX6UL_CAAM_SIZE = (16 * KiB),
159
+
160
+ FSL_IMX6UL_A7MPCORE_DAP_ADDR = 0x02100000,
161
+ FSL_IMX6UL_A7MPCORE_DAP_SIZE = (4 * KiB),
162
+ /* AIPS-2 End */
163
+
164
+ /* AIPS-1 Begin */
165
FSL_IMX6UL_PWM8_ADDR = 0x020FC000,
166
FSL_IMX6UL_PWM7_ADDR = 0x020F8000,
167
FSL_IMX6UL_PWM6_ADDR = 0x020F4000,
168
FSL_IMX6UL_PWM5_ADDR = 0x020F0000,
169
+
170
FSL_IMX6UL_SDMA_ADDR = 0x020EC000,
171
+ FSL_IMX6UL_SDMA_SIZE = 0x300,
172
+
173
FSL_IMX6UL_GPT2_ADDR = 0x020E8000,
174
+
175
FSL_IMX6UL_IOMUXC_GPR_ADDR = 0x020E4000,
176
+ FSL_IMX6UL_IOMUXC_GPR_SIZE = 0x40,
177
+
178
FSL_IMX6UL_IOMUXC_ADDR = 0x020E0000,
179
+ FSL_IMX6UL_IOMUXC_SIZE = 0x700,
180
+
181
FSL_IMX6UL_GPC_ADDR = 0x020DC000,
182
+
183
FSL_IMX6UL_SRC_ADDR = 0x020D8000,
184
+
185
FSL_IMX6UL_EPIT2_ADDR = 0x020D4000,
186
FSL_IMX6UL_EPIT1_ADDR = 0x020D0000,
187
+
188
FSL_IMX6UL_SNVS_HP_ADDR = 0x020CC000,
189
+
190
FSL_IMX6UL_USBPHY2_ADDR = 0x020CA000,
191
- FSL_IMX6UL_USBPHY2_SIZE = (4 * 1024),
192
FSL_IMX6UL_USBPHY1_ADDR = 0x020C9000,
193
- FSL_IMX6UL_USBPHY1_SIZE = (4 * 1024),
194
+
195
FSL_IMX6UL_ANALOG_ADDR = 0x020C8000,
196
+ FSL_IMX6UL_ANALOG_SIZE = 0x300,
197
+
198
FSL_IMX6UL_CCM_ADDR = 0x020C4000,
199
+
200
FSL_IMX6UL_WDOG2_ADDR = 0x020C0000,
201
FSL_IMX6UL_WDOG1_ADDR = 0x020BC000,
202
+
203
FSL_IMX6UL_KPP_ADDR = 0x020B8000,
204
+ FSL_IMX6UL_KPP_SIZE = 0x10,
205
+
206
FSL_IMX6UL_ENET2_ADDR = 0x020B4000,
207
+
208
FSL_IMX6UL_SNVS_LP_ADDR = 0x020B0000,
209
+ FSL_IMX6UL_SNVS_LP_SIZE = (16 * KiB),
210
+
211
FSL_IMX6UL_GPIO5_ADDR = 0x020AC000,
212
FSL_IMX6UL_GPIO4_ADDR = 0x020A8000,
213
FSL_IMX6UL_GPIO3_ADDR = 0x020A4000,
214
FSL_IMX6UL_GPIO2_ADDR = 0x020A0000,
215
FSL_IMX6UL_GPIO1_ADDR = 0x0209C000,
216
+
217
FSL_IMX6UL_GPT1_ADDR = 0x02098000,
218
+
219
FSL_IMX6UL_CAN2_ADDR = 0x02094000,
220
FSL_IMX6UL_CAN1_ADDR = 0x02090000,
221
+ FSL_IMX6UL_CANn_SIZE = (4 * KiB),
222
+
223
FSL_IMX6UL_PWM4_ADDR = 0x0208C000,
224
FSL_IMX6UL_PWM3_ADDR = 0x02088000,
225
FSL_IMX6UL_PWM2_ADDR = 0x02084000,
226
FSL_IMX6UL_PWM1_ADDR = 0x02080000,
227
+ FSL_IMX6UL_PWMn_SIZE = 0x20,
228
+
229
FSL_IMX6UL_AIPS1_CFG_ADDR = 0x0207C000,
230
+ FSL_IMX6UL_AIPS1_CFG_SIZE = (16 * KiB),
231
+
232
FSL_IMX6UL_BEE_ADDR = 0x02044000,
233
+ FSL_IMX6UL_BEE_SIZE = (16 * KiB),
234
+
235
FSL_IMX6UL_TOUCH_CTRL_ADDR = 0x02040000,
236
+ FSL_IMX6UL_TOUCH_CTRL_SIZE = 0x100,
237
+
238
FSL_IMX6UL_SPBA_ADDR = 0x0203C000,
239
+ FSL_IMX6UL_SPBA_SIZE = 0x100,
240
+
241
FSL_IMX6UL_ASRC_ADDR = 0x02034000,
242
+ FSL_IMX6UL_ASRC_SIZE = 0x100,
243
+
244
FSL_IMX6UL_SAI3_ADDR = 0x02030000,
245
FSL_IMX6UL_SAI2_ADDR = 0x0202C000,
246
FSL_IMX6UL_SAI1_ADDR = 0x02028000,
247
+ FSL_IMX6UL_SAIn_SIZE = 0x200,
248
+
249
FSL_IMX6UL_UART8_ADDR = 0x02024000,
250
FSL_IMX6UL_UART1_ADDR = 0x02020000,
251
FSL_IMX6UL_UART7_ADDR = 0x02018000,
252
+
253
FSL_IMX6UL_ECSPI4_ADDR = 0x02014000,
254
FSL_IMX6UL_ECSPI3_ADDR = 0x02010000,
255
FSL_IMX6UL_ECSPI2_ADDR = 0x0200C000,
256
FSL_IMX6UL_ECSPI1_ADDR = 0x02008000,
257
+
258
FSL_IMX6UL_SPDIF_ADDR = 0x02004000,
259
+ FSL_IMX6UL_SPDIF_SIZE = 0x100,
260
+ /* AIPS-1 End */
261
+
262
+ FSL_IMX6UL_BCH_ADDR = 0x01808000,
263
+ FSL_IMX6UL_BCH_SIZE = 0x200,
264
+
265
+ FSL_IMX6UL_GPMI_ADDR = 0x01806000,
266
+ FSL_IMX6UL_GPMI_SIZE = 0x200,
267
268
FSL_IMX6UL_APBH_DMA_ADDR = 0x01804000,
269
- FSL_IMX6UL_APBH_DMA_SIZE = (32 * 1024),
270
+ FSL_IMX6UL_APBH_DMA_SIZE = (4 * KiB),
271
272
FSL_IMX6UL_A7MPCORE_ADDR = 0x00A00000,
273
274
FSL_IMX6UL_OCRAM_ALIAS_ADDR = 0x00920000,
275
- FSL_IMX6UL_OCRAM_ALIAS_SIZE = 0x00060000,
276
+ FSL_IMX6UL_OCRAM_ALIAS_SIZE = (384 * KiB),
277
+
278
FSL_IMX6UL_OCRAM_MEM_ADDR = 0x00900000,
279
- FSL_IMX6UL_OCRAM_MEM_SIZE = 0x00020000,
280
+ FSL_IMX6UL_OCRAM_MEM_SIZE = (128 * KiB),
281
+
282
FSL_IMX6UL_CAAM_MEM_ADDR = 0x00100000,
283
- FSL_IMX6UL_CAAM_MEM_SIZE = 0x00008000,
284
+ FSL_IMX6UL_CAAM_MEM_SIZE = (32 * KiB),
285
+
286
FSL_IMX6UL_ROM_ADDR = 0x00000000,
287
- FSL_IMX6UL_ROM_SIZE = 0x00018000,
288
+ FSL_IMX6UL_ROM_SIZE = (96 * KiB),
289
};
290
291
enum FslIMX6ULIRQs {
292
diff --git a/hw/arm/fsl-imx6ul.c b/hw/arm/fsl-imx6ul.c
293
index XXXXXXX..XXXXXXX 100644
294
--- a/hw/arm/fsl-imx6ul.c
295
+++ b/hw/arm/fsl-imx6ul.c
296
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_init(Object *obj)
297
object_initialize_child(obj, "snvs", &s->snvs, TYPE_IMX7_SNVS);
298
299
/*
300
- * GPIOs 1 to 5
301
+ * GPIOs
302
*/
303
for (i = 0; i < FSL_IMX6UL_NUM_GPIOS; i++) {
304
snprintf(name, NAME_SIZE, "gpio%d", i);
305
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_init(Object *obj)
306
}
307
308
/*
309
- * GPT 1, 2
310
+ * GPTs
311
*/
312
for (i = 0; i < FSL_IMX6UL_NUM_GPTS; i++) {
313
snprintf(name, NAME_SIZE, "gpt%d", i);
314
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_init(Object *obj)
315
}
316
317
/*
318
- * EPIT 1, 2
319
+ * EPITs
320
*/
321
for (i = 0; i < FSL_IMX6UL_NUM_EPITS; i++) {
322
snprintf(name, NAME_SIZE, "epit%d", i + 1);
323
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_init(Object *obj)
324
}
325
326
/*
327
- * eCSPI
328
+ * eCSPIs
329
*/
330
for (i = 0; i < FSL_IMX6UL_NUM_ECSPIS; i++) {
331
snprintf(name, NAME_SIZE, "spi%d", i + 1);
332
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_init(Object *obj)
333
}
334
335
/*
336
- * I2C
337
+ * I2Cs
338
*/
339
for (i = 0; i < FSL_IMX6UL_NUM_I2CS; i++) {
340
snprintf(name, NAME_SIZE, "i2c%d", i + 1);
341
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_init(Object *obj)
342
}
343
344
/*
345
- * UART
346
+ * UARTs
347
*/
348
for (i = 0; i < FSL_IMX6UL_NUM_UARTS; i++) {
349
snprintf(name, NAME_SIZE, "uart%d", i);
350
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_init(Object *obj)
351
}
352
353
/*
354
- * Ethernet
355
+ * Ethernets
356
*/
357
for (i = 0; i < FSL_IMX6UL_NUM_ETHS; i++) {
358
snprintf(name, NAME_SIZE, "eth%d", i);
359
object_initialize_child(obj, name, &s->eth[i], TYPE_IMX_ENET);
360
}
361
362
- /* USB */
363
+ /*
364
+ * USB PHYs
365
+ */
366
for (i = 0; i < FSL_IMX6UL_NUM_USB_PHYS; i++) {
367
snprintf(name, NAME_SIZE, "usbphy%d", i);
368
object_initialize_child(obj, name, &s->usbphy[i], TYPE_IMX_USBPHY);
369
}
370
+
371
+ /*
372
+ * USBs
373
+ */
374
for (i = 0; i < FSL_IMX6UL_NUM_USBS; i++) {
375
snprintf(name, NAME_SIZE, "usb%d", i);
376
object_initialize_child(obj, name, &s->usb[i], TYPE_CHIPIDEA);
377
}
378
379
/*
380
- * SDHCI
381
+ * SDHCIs
382
*/
383
for (i = 0; i < FSL_IMX6UL_NUM_USDHCS; i++) {
384
snprintf(name, NAME_SIZE, "usdhc%d", i);
385
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_init(Object *obj)
386
}
387
388
/*
389
- * Watchdog
390
+ * Watchdogs
391
*/
392
for (i = 0; i < FSL_IMX6UL_NUM_WDTS; i++) {
393
snprintf(name, NAME_SIZE, "wdt%d", i);
394
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_realize(DeviceState *dev, Error **errp)
395
* A7MPCORE DAP
396
*/
397
create_unimplemented_device("a7mpcore-dap", FSL_IMX6UL_A7MPCORE_DAP_ADDR,
398
- 0x100000);
399
+ FSL_IMX6UL_A7MPCORE_DAP_SIZE);
400
401
/*
402
- * GPT 1, 2
403
+ * GPTs
404
*/
405
for (i = 0; i < FSL_IMX6UL_NUM_GPTS; i++) {
406
static const hwaddr FSL_IMX6UL_GPTn_ADDR[FSL_IMX6UL_NUM_GPTS] = {
407
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_realize(DeviceState *dev, Error **errp)
408
}
409
410
/*
411
- * EPIT 1, 2
412
+ * EPITs
413
*/
414
for (i = 0; i < FSL_IMX6UL_NUM_EPITS; i++) {
415
static const hwaddr FSL_IMX6UL_EPITn_ADDR[FSL_IMX6UL_NUM_EPITS] = {
416
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_realize(DeviceState *dev, Error **errp)
417
}
418
419
/*
420
- * GPIO
421
+ * GPIOs
422
*/
423
for (i = 0; i < FSL_IMX6UL_NUM_GPIOS; i++) {
424
static const hwaddr FSL_IMX6UL_GPIOn_ADDR[FSL_IMX6UL_NUM_GPIOS] = {
425
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_realize(DeviceState *dev, Error **errp)
426
}
427
428
/*
429
- * IOMUXC and IOMUXC_GPR
430
+ * IOMUXC
431
*/
432
- for (i = 0; i < 1; i++) {
433
- static const hwaddr FSL_IMX6UL_IOMUXCn_ADDR[FSL_IMX6UL_NUM_IOMUXCS] = {
434
- FSL_IMX6UL_IOMUXC_ADDR,
435
- FSL_IMX6UL_IOMUXC_GPR_ADDR,
436
- };
437
-
438
- snprintf(name, NAME_SIZE, "iomuxc%d", i);
439
- create_unimplemented_device(name, FSL_IMX6UL_IOMUXCn_ADDR[i], 0x4000);
440
- }
441
+ create_unimplemented_device("iomuxc", FSL_IMX6UL_IOMUXC_ADDR,
442
+ FSL_IMX6UL_IOMUXC_SIZE);
443
+ create_unimplemented_device("iomuxc_gpr", FSL_IMX6UL_IOMUXC_GPR_ADDR,
444
+ FSL_IMX6UL_IOMUXC_GPR_SIZE);
445
446
/*
447
* CCM
448
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_realize(DeviceState *dev, Error **errp)
449
sysbus_realize(SYS_BUS_DEVICE(&s->gpcv2), &error_abort);
450
sysbus_mmio_map(SYS_BUS_DEVICE(&s->gpcv2), 0, FSL_IMX6UL_GPC_ADDR);
451
452
- /* Initialize all ECSPI */
453
+ /*
454
+ * ECSPIs
455
+ */
456
for (i = 0; i < FSL_IMX6UL_NUM_ECSPIS; i++) {
457
static const hwaddr FSL_IMX6UL_SPIn_ADDR[FSL_IMX6UL_NUM_ECSPIS] = {
458
FSL_IMX6UL_ECSPI1_ADDR,
459
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_realize(DeviceState *dev, Error **errp)
460
}
461
462
/*
463
- * I2C
464
+ * I2Cs
465
*/
466
for (i = 0; i < FSL_IMX6UL_NUM_I2CS; i++) {
467
static const hwaddr FSL_IMX6UL_I2Cn_ADDR[FSL_IMX6UL_NUM_I2CS] = {
468
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_realize(DeviceState *dev, Error **errp)
469
}
470
471
/*
472
- * UART
473
+ * UARTs
474
*/
475
for (i = 0; i < FSL_IMX6UL_NUM_UARTS; i++) {
476
static const hwaddr FSL_IMX6UL_UARTn_ADDR[FSL_IMX6UL_NUM_UARTS] = {
477
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_realize(DeviceState *dev, Error **errp)
478
}
479
480
/*
481
- * Ethernet
482
+ * Ethernets
483
*
484
* We must use two loops since phy_connected affects the other interface
485
* and we have to set all properties before calling sysbus_realize().
486
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_realize(DeviceState *dev, Error **errp)
487
FSL_IMX6UL_ENETn_TIMER_IRQ[i]));
488
}
489
490
- /* USB */
491
+ /*
492
+ * USB PHYs
493
+ */
494
for (i = 0; i < FSL_IMX6UL_NUM_USB_PHYS; i++) {
495
+ static const hwaddr
496
+ FSL_IMX6UL_USB_PHYn_ADDR[FSL_IMX6UL_NUM_USB_PHYS] = {
497
+ FSL_IMX6UL_USBPHY1_ADDR,
498
+ FSL_IMX6UL_USBPHY2_ADDR,
499
+ };
500
+
501
sysbus_realize(SYS_BUS_DEVICE(&s->usbphy[i]), &error_abort);
502
sysbus_mmio_map(SYS_BUS_DEVICE(&s->usbphy[i]), 0,
503
- FSL_IMX6UL_USBPHY1_ADDR + i * 0x1000);
504
+ FSL_IMX6UL_USB_PHYn_ADDR[i]);
505
}
506
507
+ /*
508
+ * USBs
509
+ */
510
for (i = 0; i < FSL_IMX6UL_NUM_USBS; i++) {
511
+ static const hwaddr FSL_IMX6UL_USB02_USBn_ADDR[FSL_IMX6UL_NUM_USBS] = {
512
+ FSL_IMX6UL_USBO2_USB1_ADDR,
513
+ FSL_IMX6UL_USBO2_USB2_ADDR,
514
+ };
515
+
516
static const int FSL_IMX6UL_USBn_IRQ[] = {
517
FSL_IMX6UL_USB1_IRQ,
518
FSL_IMX6UL_USB2_IRQ,
519
};
520
+
521
sysbus_realize(SYS_BUS_DEVICE(&s->usb[i]), &error_abort);
522
sysbus_mmio_map(SYS_BUS_DEVICE(&s->usb[i]), 0,
523
- FSL_IMX6UL_USBO2_USB_ADDR + i * 0x200);
524
+ FSL_IMX6UL_USB02_USBn_ADDR[i]);
525
sysbus_connect_irq(SYS_BUS_DEVICE(&s->usb[i]), 0,
526
qdev_get_gpio_in(DEVICE(&s->a7mpcore),
527
FSL_IMX6UL_USBn_IRQ[i]));
528
}
529
530
/*
531
- * USDHC
532
+ * USDHCs
533
*/
534
for (i = 0; i < FSL_IMX6UL_NUM_USDHCS; i++) {
535
static const hwaddr FSL_IMX6UL_USDHCn_ADDR[FSL_IMX6UL_NUM_USDHCS] = {
536
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_realize(DeviceState *dev, Error **errp)
537
sysbus_mmio_map(SYS_BUS_DEVICE(&s->snvs), 0, FSL_IMX6UL_SNVS_HP_ADDR);
538
539
/*
540
- * Watchdog
541
+ * Watchdogs
542
*/
543
for (i = 0; i < FSL_IMX6UL_NUM_WDTS; i++) {
544
static const hwaddr FSL_IMX6UL_WDOGn_ADDR[FSL_IMX6UL_NUM_WDTS] = {
545
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_realize(DeviceState *dev, Error **errp)
546
FSL_IMX6UL_WDOG2_ADDR,
547
FSL_IMX6UL_WDOG3_ADDR,
548
};
549
+
550
static const int FSL_IMX6UL_WDOGn_IRQ[FSL_IMX6UL_NUM_WDTS] = {
551
FSL_IMX6UL_WDOG1_IRQ,
552
FSL_IMX6UL_WDOG2_IRQ,
553
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_realize(DeviceState *dev, Error **errp)
554
/*
555
* SDMA
556
*/
557
- create_unimplemented_device("sdma", FSL_IMX6UL_SDMA_ADDR, 0x4000);
558
+ create_unimplemented_device("sdma", FSL_IMX6UL_SDMA_ADDR,
559
+ FSL_IMX6UL_SDMA_SIZE);
560
561
/*
562
- * SAI (Audio SSI (Synchronous Serial Interface))
563
+ * SAIs (Audio SSI (Synchronous Serial Interface))
564
*/
565
- create_unimplemented_device("sai1", FSL_IMX6UL_SAI1_ADDR, 0x4000);
566
- create_unimplemented_device("sai2", FSL_IMX6UL_SAI2_ADDR, 0x4000);
567
- create_unimplemented_device("sai3", FSL_IMX6UL_SAI3_ADDR, 0x4000);
568
+ for (i = 0; i < FSL_IMX6UL_NUM_SAIS; i++) {
569
+ static const hwaddr FSL_IMX6UL_SAIn_ADDR[FSL_IMX6UL_NUM_SAIS] = {
570
+ FSL_IMX6UL_SAI1_ADDR,
571
+ FSL_IMX6UL_SAI2_ADDR,
572
+ FSL_IMX6UL_SAI3_ADDR,
573
+ };
574
+
575
+ snprintf(name, NAME_SIZE, "sai%d", i);
576
+ create_unimplemented_device(name, FSL_IMX6UL_SAIn_ADDR[i],
577
+ FSL_IMX6UL_SAIn_SIZE);
578
+ }
579
580
/*
581
- * PWM
582
+ * PWMs
583
*/
584
- create_unimplemented_device("pwm1", FSL_IMX6UL_PWM1_ADDR, 0x4000);
585
- create_unimplemented_device("pwm2", FSL_IMX6UL_PWM2_ADDR, 0x4000);
586
- create_unimplemented_device("pwm3", FSL_IMX6UL_PWM3_ADDR, 0x4000);
587
- create_unimplemented_device("pwm4", FSL_IMX6UL_PWM4_ADDR, 0x4000);
588
+ for (i = 0; i < FSL_IMX6UL_NUM_PWMS; i++) {
589
+ static const hwaddr FSL_IMX6UL_PWMn_ADDR[FSL_IMX6UL_NUM_PWMS] = {
590
+ FSL_IMX6UL_PWM1_ADDR,
591
+ FSL_IMX6UL_PWM2_ADDR,
592
+ FSL_IMX6UL_PWM3_ADDR,
593
+ FSL_IMX6UL_PWM4_ADDR,
594
+ };
595
+
596
+ snprintf(name, NAME_SIZE, "pwm%d", i);
597
+ create_unimplemented_device(name, FSL_IMX6UL_PWMn_ADDR[i],
598
+ FSL_IMX6UL_PWMn_SIZE);
599
+ }
600
601
/*
602
* Audio ASRC (asynchronous sample rate converter)
603
*/
604
- create_unimplemented_device("asrc", FSL_IMX6UL_ASRC_ADDR, 0x4000);
605
+ create_unimplemented_device("asrc", FSL_IMX6UL_ASRC_ADDR,
606
+ FSL_IMX6UL_ASRC_SIZE);
607
608
/*
609
- * CAN
610
+ * CANs
611
*/
612
- create_unimplemented_device("can1", FSL_IMX6UL_CAN1_ADDR, 0x4000);
613
- create_unimplemented_device("can2", FSL_IMX6UL_CAN2_ADDR, 0x4000);
614
+ for (i = 0; i < FSL_IMX6UL_NUM_CANS; i++) {
615
+ static const hwaddr FSL_IMX6UL_CANn_ADDR[FSL_IMX6UL_NUM_CANS] = {
616
+ FSL_IMX6UL_CAN1_ADDR,
617
+ FSL_IMX6UL_CAN2_ADDR,
618
+ };
619
+
620
+ snprintf(name, NAME_SIZE, "can%d", i);
621
+ create_unimplemented_device(name, FSL_IMX6UL_CANn_ADDR[i],
622
+ FSL_IMX6UL_CANn_SIZE);
623
+ }
624
625
/*
626
* APHB_DMA
627
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_realize(DeviceState *dev, Error **errp)
628
};
629
630
snprintf(name, NAME_SIZE, "adc%d", i);
631
- create_unimplemented_device(name, FSL_IMX6UL_ADCn_ADDR[i], 0x4000);
632
+ create_unimplemented_device(name, FSL_IMX6UL_ADCn_ADDR[i],
633
+ FSL_IMX6UL_ADCn_SIZE);
634
}
635
636
/*
637
* LCD
638
*/
639
- create_unimplemented_device("lcdif", FSL_IMX6UL_LCDIF_ADDR, 0x4000);
640
+ create_unimplemented_device("lcdif", FSL_IMX6UL_LCDIF_ADDR,
641
+ FSL_IMX6UL_LCDIF_SIZE);
642
643
/*
644
* ROM memory
81
--
645
--
82
2.25.1
646
2.34.1
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Jean-Christophe Dubois <jcd@tribudubois.net>
2
2
3
This field controls the output (intermediate) physical address size
3
* Add TZASC as unimplemented device.
4
of the translation process. V8 requires to raise an AddressSize
4
- Allow bare metal application to access this (unimplemented) device
5
fault if the page tables are programmed incorrectly, such that any
5
* Add CSU as unimplemented device.
6
intermediate descriptor address, or the final translated address,
6
- Allow bare metal application to access this (unimplemented) device
7
is out of range.
7
* Add 4 missing PWM devices
8
8
9
Add a PS field to ARMVAParameters, and properly compute outputsize
9
Signed-off-by: Jean-Christophe Dubois <jcd@tribudubois.net>
10
in get_phys_addr_lpae. Test the descaddr as extracted from TTBR
10
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
11
and from page table entries.
11
Message-id: 59e4dc56e14eccfefd379275ec19048dff9c10b3.1692964892.git.jcd@tribudubois.net
12
13
Restrict descaddrmask so that we won't raise the fault for v7.
14
15
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
16
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
17
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
18
Message-id: 20220301215958.157011-8-richard.henderson@linaro.org
19
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
20
---
13
---
21
target/arm/internals.h | 1 +
14
include/hw/arm/fsl-imx6ul.h | 2 +-
22
target/arm/helper.c | 72 ++++++++++++++++++++++++++++++++----------
15
hw/arm/fsl-imx6ul.c | 16 ++++++++++++++++
23
2 files changed, 57 insertions(+), 16 deletions(-)
16
2 files changed, 17 insertions(+), 1 deletion(-)
24
17
25
diff --git a/target/arm/internals.h b/target/arm/internals.h
18
diff --git a/include/hw/arm/fsl-imx6ul.h b/include/hw/arm/fsl-imx6ul.h
26
index XXXXXXX..XXXXXXX 100644
19
index XXXXXXX..XXXXXXX 100644
27
--- a/target/arm/internals.h
20
--- a/include/hw/arm/fsl-imx6ul.h
28
+++ b/target/arm/internals.h
21
+++ b/include/hw/arm/fsl-imx6ul.h
29
@@ -XXX,XX +XXX,XX @@ static inline uint32_t aarch64_pstate_valid_mask(const ARMISARegisters *id)
22
@@ -XXX,XX +XXX,XX @@ enum FslIMX6ULConfiguration {
30
*/
23
FSL_IMX6UL_NUM_USBS = 2,
31
typedef struct ARMVAParameters {
24
FSL_IMX6UL_NUM_SAIS = 3,
32
unsigned tsz : 8;
25
FSL_IMX6UL_NUM_CANS = 2,
33
+ unsigned ps : 3;
26
- FSL_IMX6UL_NUM_PWMS = 4,
34
unsigned select : 1;
27
+ FSL_IMX6UL_NUM_PWMS = 8,
35
bool tbi : 1;
28
};
36
bool epd : 1;
29
37
diff --git a/target/arm/helper.c b/target/arm/helper.c
30
struct FslIMX6ULState {
31
diff --git a/hw/arm/fsl-imx6ul.c b/hw/arm/fsl-imx6ul.c
38
index XXXXXXX..XXXXXXX 100644
32
index XXXXXXX..XXXXXXX 100644
39
--- a/target/arm/helper.c
33
--- a/hw/arm/fsl-imx6ul.c
40
+++ b/target/arm/helper.c
34
+++ b/hw/arm/fsl-imx6ul.c
41
@@ -XXX,XX +XXX,XX @@ static uint8_t convert_stage2_attrs(CPUARMState *env, uint8_t s2attrs)
35
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_realize(DeviceState *dev, Error **errp)
42
}
36
FSL_IMX6UL_PWM2_ADDR,
43
#endif /* !CONFIG_USER_ONLY */
37
FSL_IMX6UL_PWM3_ADDR,
44
38
FSL_IMX6UL_PWM4_ADDR,
45
+/* This mapping is common between ID_AA64MMFR0.PARANGE and TCR_ELx.{I}PS. */
39
+ FSL_IMX6UL_PWM5_ADDR,
46
+static const uint8_t pamax_map[] = {
40
+ FSL_IMX6UL_PWM6_ADDR,
47
+ [0] = 32,
41
+ FSL_IMX6UL_PWM7_ADDR,
48
+ [1] = 36,
42
+ FSL_IMX6UL_PWM8_ADDR,
49
+ [2] = 40,
43
};
50
+ [3] = 42,
44
51
+ [4] = 44,
45
snprintf(name, NAME_SIZE, "pwm%d", i);
52
+ [5] = 48,
46
@@ -XXX,XX +XXX,XX @@ static void fsl_imx6ul_realize(DeviceState *dev, Error **errp)
53
+};
47
create_unimplemented_device("lcdif", FSL_IMX6UL_LCDIF_ADDR,
54
+
48
FSL_IMX6UL_LCDIF_SIZE);
55
/* The cpu-specific constant value of PAMax; also used by hw/arm/virt. */
49
56
unsigned int arm_pamax(ARMCPU *cpu)
50
+ /*
57
{
51
+ * CSU
58
- static const unsigned int pamax_map[] = {
52
+ */
59
- [0] = 32,
53
+ create_unimplemented_device("csu", FSL_IMX6UL_CSU_ADDR,
60
- [1] = 36,
54
+ FSL_IMX6UL_CSU_SIZE);
61
- [2] = 40,
62
- [3] = 42,
63
- [4] = 44,
64
- [5] = 48,
65
- };
66
unsigned int parange =
67
FIELD_EX64(cpu->isar.id_aa64mmfr0, ID_AA64MMFR0, PARANGE);
68
69
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
70
{
71
uint64_t tcr = regime_tcr(env, mmu_idx)->raw_tcr;
72
bool epd, hpd, using16k, using64k, tsz_oob;
73
- int select, tsz, tbi, max_tsz, min_tsz;
74
+ int select, tsz, tbi, max_tsz, min_tsz, ps;
75
76
if (!regime_has_2_ranges(mmu_idx)) {
77
select = 0;
78
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
79
hpd = extract32(tcr, 24, 1);
80
}
81
epd = false;
82
+ ps = extract32(tcr, 16, 3);
83
} else {
84
/*
85
* Bit 55 is always between the two regions, and is canonical for
86
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
87
epd = extract32(tcr, 23, 1);
88
hpd = extract64(tcr, 42, 1);
89
}
90
+ ps = extract64(tcr, 32, 3);
91
}
92
93
if (cpu_isar_feature(aa64_st, env_archcpu(env))) {
94
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
95
96
return (ARMVAParameters) {
97
.tsz = tsz,
98
+ .ps = ps,
99
.select = select,
100
.tbi = tbi,
101
.epd = epd,
102
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address,
103
104
/* TODO: This code does not support shareability levels. */
105
if (aarch64) {
106
+ int ps;
107
+
108
param = aa64_va_parameters(env, address, mmu_idx,
109
access_type != MMU_INST_FETCH);
110
level = 0;
111
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address,
112
113
addrsize = 64 - 8 * param.tbi;
114
inputsize = 64 - param.tsz;
115
- outputsize = arm_pamax(cpu);
116
+
117
+ /*
118
+ * Bound PS by PARANGE to find the effective output address size.
119
+ * ID_AA64MMFR0 is a read-only register so values outside of the
120
+ * supported mappings can be considered an implementation error.
121
+ */
122
+ ps = FIELD_EX64(cpu->isar.id_aa64mmfr0, ID_AA64MMFR0, PARANGE);
123
+ ps = MIN(ps, param.ps);
124
+ assert(ps < ARRAY_SIZE(pamax_map));
125
+ outputsize = pamax_map[ps];
126
} else {
127
param = aa32_va_parameters(env, address, mmu_idx);
128
level = 1;
129
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address,
130
131
/* Now we can extract the actual base address from the TTBR */
132
descaddr = extract64(ttbr, 0, 48);
133
+
55
+
134
+ /*
56
+ /*
135
+ * If the base address is out of range, raise AddressSizeFault.
57
+ * TZASC
136
+ * In the pseudocode, this is !IsZero(baseregister<47:outputsize>),
137
+ * but we've just cleared the bits above 47, so simplify the test.
138
+ */
58
+ */
139
+ if (descaddr >> outputsize) {
59
+ create_unimplemented_device("tzasc", FSL_IMX6UL_TZASC_ADDR,
140
+ level = 0;
60
+ FSL_IMX6UL_TZASC_SIZE);
141
+ fault_type = ARMFault_AddressSize;
142
+ goto do_fault;
143
+ }
144
+
61
+
145
/*
62
/*
146
* We rely on this masking to clear the RES0 bits at the bottom of the TTBR
63
* ROM memory
147
* and also to mask out CnP (bit 0) which could validly be non-zero.
148
*/
64
*/
149
descaddr &= ~indexmask;
150
151
- /* The address field in the descriptor goes up to bit 39 for ARMv7
152
- * but up to bit 47 for ARMv8, but we use the descaddrmask
153
- * up to bit 39 for AArch32, because we don't need other bits in that case
154
- * to construct next descriptor address (anyway they should be all zeroes).
155
+ /*
156
+ * For AArch32, the address field in the descriptor goes up to bit 39
157
+ * for both v7 and v8. However, for v8 the SBZ bits [47:40] must be 0
158
+ * or an AddressSize fault is raised. So for v8 we extract those SBZ
159
+ * bits as part of the address, which will be checked via outputsize.
160
+ * For AArch64, the address field always goes up to bit 47 (with extra
161
+ * bits for FEAT_LPA placed elsewhere). AArch64 implies v8.
162
*/
163
- descaddrmask = ((1ull << (aarch64 ? 48 : 40)) - 1) &
164
- ~indexmask_grainsize;
165
+ if (arm_feature(env, ARM_FEATURE_V8)) {
166
+ descaddrmask = MAKE_64BIT_MASK(0, 48);
167
+ } else {
168
+ descaddrmask = MAKE_64BIT_MASK(0, 40);
169
+ }
170
+ descaddrmask &= ~indexmask_grainsize;
171
172
/* Secure accesses start with the page table in secure memory and
173
* can be downgraded to non-secure at any step. Non-secure accesses
174
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address,
175
/* Invalid, or the Reserved level 3 encoding */
176
goto do_fault;
177
}
178
+
179
descaddr = descriptor & descaddrmask;
180
+ if (descaddr >> outputsize) {
181
+ fault_type = ARMFault_AddressSize;
182
+ goto do_fault;
183
+ }
184
185
if ((descriptor & 2) && (level < 3)) {
186
/* Table entry. The top five bits are attributes which may
187
--
65
--
188
2.25.1
66
2.34.1
189
67
190
68
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Jean-Christophe Dubois <jcd@tribudubois.net>
2
2
3
Without FEAT_LVA, the behaviour of programming an invalid value
3
* Add Addr and size definition for all i.MX7 devices in i.MX7 header file.
4
is IMPLEMENTATION DEFINED. With FEAT_LVA, programming an invalid
4
* Use those newly defined named constants whenever possible.
5
minimum value requires a Translation fault.
5
* Standardize the way we init a familly of unimplemented devices
6
- SAI
7
- PWM
8
- CAN
9
* Add/rework few comments
6
10
7
It is most self-consistent to choose to generate the fault always.
11
Signed-off-by: Jean-Christophe Dubois <jcd@tribudubois.net>
8
12
Message-id: 59e195d33e4d486a8d131392acd46633c8c10ed7.1692964892.git.jcd@tribudubois.net
9
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
13
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
11
Message-id: 20220301215958.157011-4-richard.henderson@linaro.org
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
---
15
---
14
target/arm/internals.h | 1 +
16
include/hw/arm/fsl-imx7.h | 330 ++++++++++++++++++++++++++++----------
15
target/arm/helper.c | 32 ++++++++++++++++++++++++++++----
17
hw/arm/fsl-imx7.c | 130 ++++++++++-----
16
2 files changed, 29 insertions(+), 4 deletions(-)
18
2 files changed, 335 insertions(+), 125 deletions(-)
17
19
18
diff --git a/target/arm/internals.h b/target/arm/internals.h
20
diff --git a/include/hw/arm/fsl-imx7.h b/include/hw/arm/fsl-imx7.h
19
index XXXXXXX..XXXXXXX 100644
21
index XXXXXXX..XXXXXXX 100644
20
--- a/target/arm/internals.h
22
--- a/include/hw/arm/fsl-imx7.h
21
+++ b/target/arm/internals.h
23
+++ b/include/hw/arm/fsl-imx7.h
22
@@ -XXX,XX +XXX,XX @@ typedef struct ARMVAParameters {
24
@@ -XXX,XX +XXX,XX @@
23
bool hpd : 1;
25
#include "hw/misc/imx7_ccm.h"
24
bool using16k : 1;
26
#include "hw/misc/imx7_snvs.h"
25
bool using64k : 1;
27
#include "hw/misc/imx7_gpr.h"
26
+ bool tsz_oob : 1; /* tsz has been clamped to legal range */
28
-#include "hw/misc/imx6_src.h"
27
} ARMVAParameters;
29
#include "hw/watchdog/wdt_imx2.h"
28
30
#include "hw/gpio/imx_gpio.h"
29
ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
31
#include "hw/char/imx_serial.h"
30
diff --git a/target/arm/helper.c b/target/arm/helper.c
32
@@ -XXX,XX +XXX,XX @@
33
#include "hw/usb/chipidea.h"
34
#include "cpu.h"
35
#include "qom/object.h"
36
+#include "qemu/units.h"
37
38
#define TYPE_FSL_IMX7 "fsl-imx7"
39
OBJECT_DECLARE_SIMPLE_TYPE(FslIMX7State, FSL_IMX7)
40
@@ -XXX,XX +XXX,XX @@ enum FslIMX7Configuration {
41
FSL_IMX7_NUM_ECSPIS = 4,
42
FSL_IMX7_NUM_USBS = 3,
43
FSL_IMX7_NUM_ADCS = 2,
44
+ FSL_IMX7_NUM_SAIS = 3,
45
+ FSL_IMX7_NUM_CANS = 2,
46
+ FSL_IMX7_NUM_PWMS = 4,
47
};
48
49
struct FslIMX7State {
50
@@ -XXX,XX +XXX,XX @@ struct FslIMX7State {
51
52
enum FslIMX7MemoryMap {
53
FSL_IMX7_MMDC_ADDR = 0x80000000,
54
- FSL_IMX7_MMDC_SIZE = 2 * 1024 * 1024 * 1024UL,
55
+ FSL_IMX7_MMDC_SIZE = (2 * GiB),
56
57
- FSL_IMX7_GPIO1_ADDR = 0x30200000,
58
- FSL_IMX7_GPIO2_ADDR = 0x30210000,
59
- FSL_IMX7_GPIO3_ADDR = 0x30220000,
60
- FSL_IMX7_GPIO4_ADDR = 0x30230000,
61
- FSL_IMX7_GPIO5_ADDR = 0x30240000,
62
- FSL_IMX7_GPIO6_ADDR = 0x30250000,
63
- FSL_IMX7_GPIO7_ADDR = 0x30260000,
64
+ FSL_IMX7_QSPI1_MEM_ADDR = 0x60000000,
65
+ FSL_IMX7_QSPI1_MEM_SIZE = (256 * MiB),
66
67
- FSL_IMX7_IOMUXC_LPSR_GPR_ADDR = 0x30270000,
68
+ FSL_IMX7_PCIE1_MEM_ADDR = 0x40000000,
69
+ FSL_IMX7_PCIE1_MEM_SIZE = (256 * MiB),
70
71
- FSL_IMX7_WDOG1_ADDR = 0x30280000,
72
- FSL_IMX7_WDOG2_ADDR = 0x30290000,
73
- FSL_IMX7_WDOG3_ADDR = 0x302A0000,
74
- FSL_IMX7_WDOG4_ADDR = 0x302B0000,
75
+ FSL_IMX7_QSPI1_RX_BUF_ADDR = 0x34000000,
76
+ FSL_IMX7_QSPI1_RX_BUF_SIZE = (32 * MiB),
77
78
- FSL_IMX7_IOMUXC_LPSR_ADDR = 0x302C0000,
79
+ /* PCIe Peripherals */
80
+ FSL_IMX7_PCIE_REG_ADDR = 0x33800000,
81
82
- FSL_IMX7_GPT1_ADDR = 0x302D0000,
83
- FSL_IMX7_GPT2_ADDR = 0x302E0000,
84
- FSL_IMX7_GPT3_ADDR = 0x302F0000,
85
- FSL_IMX7_GPT4_ADDR = 0x30300000,
86
+ /* MMAP Peripherals */
87
+ FSL_IMX7_DMA_APBH_ADDR = 0x33000000,
88
+ FSL_IMX7_DMA_APBH_SIZE = 0x8000,
89
90
- FSL_IMX7_IOMUXC_ADDR = 0x30330000,
91
- FSL_IMX7_IOMUXC_GPR_ADDR = 0x30340000,
92
- FSL_IMX7_IOMUXCn_SIZE = 0x1000,
93
+ /* GPV configuration */
94
+ FSL_IMX7_GPV6_ADDR = 0x32600000,
95
+ FSL_IMX7_GPV5_ADDR = 0x32500000,
96
+ FSL_IMX7_GPV4_ADDR = 0x32400000,
97
+ FSL_IMX7_GPV3_ADDR = 0x32300000,
98
+ FSL_IMX7_GPV2_ADDR = 0x32200000,
99
+ FSL_IMX7_GPV1_ADDR = 0x32100000,
100
+ FSL_IMX7_GPV0_ADDR = 0x32000000,
101
+ FSL_IMX7_GPVn_SIZE = (1 * MiB),
102
103
- FSL_IMX7_OCOTP_ADDR = 0x30350000,
104
- FSL_IMX7_OCOTP_SIZE = 0x10000,
105
+ /* Arm Peripherals */
106
+ FSL_IMX7_A7MPCORE_ADDR = 0x31000000,
107
108
- FSL_IMX7_ANALOG_ADDR = 0x30360000,
109
- FSL_IMX7_SNVS_ADDR = 0x30370000,
110
- FSL_IMX7_CCM_ADDR = 0x30380000,
111
+ /* AIPS-3 Begin */
112
113
- FSL_IMX7_SRC_ADDR = 0x30390000,
114
- FSL_IMX7_SRC_SIZE = 0x1000,
115
+ FSL_IMX7_ENET2_ADDR = 0x30BF0000,
116
+ FSL_IMX7_ENET1_ADDR = 0x30BE0000,
117
118
- FSL_IMX7_ADC1_ADDR = 0x30610000,
119
- FSL_IMX7_ADC2_ADDR = 0x30620000,
120
- FSL_IMX7_ADCn_SIZE = 0x1000,
121
+ FSL_IMX7_SDMA_ADDR = 0x30BD0000,
122
+ FSL_IMX7_SDMA_SIZE = (4 * KiB),
123
124
- FSL_IMX7_PWM1_ADDR = 0x30660000,
125
- FSL_IMX7_PWM2_ADDR = 0x30670000,
126
- FSL_IMX7_PWM3_ADDR = 0x30680000,
127
- FSL_IMX7_PWM4_ADDR = 0x30690000,
128
- FSL_IMX7_PWMn_SIZE = 0x10000,
129
+ FSL_IMX7_EIM_ADDR = 0x30BC0000,
130
+ FSL_IMX7_EIM_SIZE = (4 * KiB),
131
132
- FSL_IMX7_PCIE_PHY_ADDR = 0x306D0000,
133
- FSL_IMX7_PCIE_PHY_SIZE = 0x10000,
134
+ FSL_IMX7_QSPI_ADDR = 0x30BB0000,
135
+ FSL_IMX7_QSPI_SIZE = 0x8000,
136
137
- FSL_IMX7_GPC_ADDR = 0x303A0000,
138
+ FSL_IMX7_SIM2_ADDR = 0x30BA0000,
139
+ FSL_IMX7_SIM1_ADDR = 0x30B90000,
140
+ FSL_IMX7_SIMn_SIZE = (4 * KiB),
141
+
142
+ FSL_IMX7_USDHC3_ADDR = 0x30B60000,
143
+ FSL_IMX7_USDHC2_ADDR = 0x30B50000,
144
+ FSL_IMX7_USDHC1_ADDR = 0x30B40000,
145
+
146
+ FSL_IMX7_USB3_ADDR = 0x30B30000,
147
+ FSL_IMX7_USBMISC3_ADDR = 0x30B30200,
148
+ FSL_IMX7_USB2_ADDR = 0x30B20000,
149
+ FSL_IMX7_USBMISC2_ADDR = 0x30B20200,
150
+ FSL_IMX7_USB1_ADDR = 0x30B10000,
151
+ FSL_IMX7_USBMISC1_ADDR = 0x30B10200,
152
+ FSL_IMX7_USBMISCn_SIZE = 0x200,
153
+
154
+ FSL_IMX7_USB_PL301_ADDR = 0x30AD0000,
155
+ FSL_IMX7_USB_PL301_SIZE = (64 * KiB),
156
+
157
+ FSL_IMX7_SEMAPHORE_HS_ADDR = 0x30AC0000,
158
+ FSL_IMX7_SEMAPHORE_HS_SIZE = (64 * KiB),
159
+
160
+ FSL_IMX7_MUB_ADDR = 0x30AB0000,
161
+ FSL_IMX7_MUA_ADDR = 0x30AA0000,
162
+ FSL_IMX7_MUn_SIZE = (KiB),
163
+
164
+ FSL_IMX7_UART7_ADDR = 0x30A90000,
165
+ FSL_IMX7_UART6_ADDR = 0x30A80000,
166
+ FSL_IMX7_UART5_ADDR = 0x30A70000,
167
+ FSL_IMX7_UART4_ADDR = 0x30A60000,
168
+
169
+ FSL_IMX7_I2C4_ADDR = 0x30A50000,
170
+ FSL_IMX7_I2C3_ADDR = 0x30A40000,
171
+ FSL_IMX7_I2C2_ADDR = 0x30A30000,
172
+ FSL_IMX7_I2C1_ADDR = 0x30A20000,
173
+
174
+ FSL_IMX7_CAN2_ADDR = 0x30A10000,
175
+ FSL_IMX7_CAN1_ADDR = 0x30A00000,
176
+ FSL_IMX7_CANn_SIZE = (4 * KiB),
177
+
178
+ FSL_IMX7_AIPS3_CONF_ADDR = 0x309F0000,
179
+ FSL_IMX7_AIPS3_CONF_SIZE = (64 * KiB),
180
181
FSL_IMX7_CAAM_ADDR = 0x30900000,
182
- FSL_IMX7_CAAM_SIZE = 0x40000,
183
+ FSL_IMX7_CAAM_SIZE = (256 * KiB),
184
185
- FSL_IMX7_CAN1_ADDR = 0x30A00000,
186
- FSL_IMX7_CAN2_ADDR = 0x30A10000,
187
- FSL_IMX7_CANn_SIZE = 0x10000,
188
+ FSL_IMX7_SPBA_ADDR = 0x308F0000,
189
+ FSL_IMX7_SPBA_SIZE = (4 * KiB),
190
191
- FSL_IMX7_I2C1_ADDR = 0x30A20000,
192
- FSL_IMX7_I2C2_ADDR = 0x30A30000,
193
- FSL_IMX7_I2C3_ADDR = 0x30A40000,
194
- FSL_IMX7_I2C4_ADDR = 0x30A50000,
195
+ FSL_IMX7_SAI3_ADDR = 0x308C0000,
196
+ FSL_IMX7_SAI2_ADDR = 0x308B0000,
197
+ FSL_IMX7_SAI1_ADDR = 0x308A0000,
198
+ FSL_IMX7_SAIn_SIZE = (4 * KiB),
199
200
- FSL_IMX7_ECSPI1_ADDR = 0x30820000,
201
- FSL_IMX7_ECSPI2_ADDR = 0x30830000,
202
- FSL_IMX7_ECSPI3_ADDR = 0x30840000,
203
- FSL_IMX7_ECSPI4_ADDR = 0x30630000,
204
-
205
- FSL_IMX7_LCDIF_ADDR = 0x30730000,
206
- FSL_IMX7_LCDIF_SIZE = 0x1000,
207
-
208
- FSL_IMX7_UART1_ADDR = 0x30860000,
209
+ FSL_IMX7_UART3_ADDR = 0x30880000,
210
/*
211
* Some versions of the reference manual claim that UART2 is @
212
* 0x30870000, but experiments with HW + DT files in upstream
213
@@ -XXX,XX +XXX,XX @@ enum FslIMX7MemoryMap {
214
* actually located @ 0x30890000
215
*/
216
FSL_IMX7_UART2_ADDR = 0x30890000,
217
- FSL_IMX7_UART3_ADDR = 0x30880000,
218
- FSL_IMX7_UART4_ADDR = 0x30A60000,
219
- FSL_IMX7_UART5_ADDR = 0x30A70000,
220
- FSL_IMX7_UART6_ADDR = 0x30A80000,
221
- FSL_IMX7_UART7_ADDR = 0x30A90000,
222
+ FSL_IMX7_UART1_ADDR = 0x30860000,
223
224
- FSL_IMX7_SAI1_ADDR = 0x308A0000,
225
- FSL_IMX7_SAI2_ADDR = 0x308B0000,
226
- FSL_IMX7_SAI3_ADDR = 0x308C0000,
227
- FSL_IMX7_SAIn_SIZE = 0x10000,
228
+ FSL_IMX7_ECSPI3_ADDR = 0x30840000,
229
+ FSL_IMX7_ECSPI2_ADDR = 0x30830000,
230
+ FSL_IMX7_ECSPI1_ADDR = 0x30820000,
231
+ FSL_IMX7_ECSPIn_SIZE = (4 * KiB),
232
233
- FSL_IMX7_ENET1_ADDR = 0x30BE0000,
234
- FSL_IMX7_ENET2_ADDR = 0x30BF0000,
235
+ /* AIPS-3 End */
236
237
- FSL_IMX7_USB1_ADDR = 0x30B10000,
238
- FSL_IMX7_USBMISC1_ADDR = 0x30B10200,
239
- FSL_IMX7_USB2_ADDR = 0x30B20000,
240
- FSL_IMX7_USBMISC2_ADDR = 0x30B20200,
241
- FSL_IMX7_USB3_ADDR = 0x30B30000,
242
- FSL_IMX7_USBMISC3_ADDR = 0x30B30200,
243
- FSL_IMX7_USBMISCn_SIZE = 0x200,
244
+ /* AIPS-2 Begin */
245
246
- FSL_IMX7_USDHC1_ADDR = 0x30B40000,
247
- FSL_IMX7_USDHC2_ADDR = 0x30B50000,
248
- FSL_IMX7_USDHC3_ADDR = 0x30B60000,
249
+ FSL_IMX7_AXI_DEBUG_MON_ADDR = 0x307E0000,
250
+ FSL_IMX7_AXI_DEBUG_MON_SIZE = (64 * KiB),
251
252
- FSL_IMX7_SDMA_ADDR = 0x30BD0000,
253
- FSL_IMX7_SDMA_SIZE = 0x1000,
254
+ FSL_IMX7_PERFMON2_ADDR = 0x307D0000,
255
+ FSL_IMX7_PERFMON1_ADDR = 0x307C0000,
256
+ FSL_IMX7_PERFMONn_SIZE = (64 * KiB),
257
+
258
+ FSL_IMX7_DDRC_ADDR = 0x307A0000,
259
+ FSL_IMX7_DDRC_SIZE = (4 * KiB),
260
+
261
+ FSL_IMX7_DDRC_PHY_ADDR = 0x30790000,
262
+ FSL_IMX7_DDRC_PHY_SIZE = (4 * KiB),
263
+
264
+ FSL_IMX7_TZASC_ADDR = 0x30780000,
265
+ FSL_IMX7_TZASC_SIZE = (64 * KiB),
266
+
267
+ FSL_IMX7_MIPI_DSI_ADDR = 0x30760000,
268
+ FSL_IMX7_MIPI_DSI_SIZE = (4 * KiB),
269
+
270
+ FSL_IMX7_MIPI_CSI_ADDR = 0x30750000,
271
+ FSL_IMX7_MIPI_CSI_SIZE = 0x4000,
272
+
273
+ FSL_IMX7_LCDIF_ADDR = 0x30730000,
274
+ FSL_IMX7_LCDIF_SIZE = 0x8000,
275
+
276
+ FSL_IMX7_CSI_ADDR = 0x30710000,
277
+ FSL_IMX7_CSI_SIZE = (4 * KiB),
278
+
279
+ FSL_IMX7_PXP_ADDR = 0x30700000,
280
+ FSL_IMX7_PXP_SIZE = 0x4000,
281
+
282
+ FSL_IMX7_EPDC_ADDR = 0x306F0000,
283
+ FSL_IMX7_EPDC_SIZE = (4 * KiB),
284
+
285
+ FSL_IMX7_PCIE_PHY_ADDR = 0x306D0000,
286
+ FSL_IMX7_PCIE_PHY_SIZE = (4 * KiB),
287
+
288
+ FSL_IMX7_SYSCNT_CTRL_ADDR = 0x306C0000,
289
+ FSL_IMX7_SYSCNT_CMP_ADDR = 0x306B0000,
290
+ FSL_IMX7_SYSCNT_RD_ADDR = 0x306A0000,
291
+
292
+ FSL_IMX7_PWM4_ADDR = 0x30690000,
293
+ FSL_IMX7_PWM3_ADDR = 0x30680000,
294
+ FSL_IMX7_PWM2_ADDR = 0x30670000,
295
+ FSL_IMX7_PWM1_ADDR = 0x30660000,
296
+ FSL_IMX7_PWMn_SIZE = (4 * KiB),
297
+
298
+ FSL_IMX7_FlEXTIMER2_ADDR = 0x30650000,
299
+ FSL_IMX7_FlEXTIMER1_ADDR = 0x30640000,
300
+ FSL_IMX7_FLEXTIMERn_SIZE = (4 * KiB),
301
+
302
+ FSL_IMX7_ECSPI4_ADDR = 0x30630000,
303
+
304
+ FSL_IMX7_ADC2_ADDR = 0x30620000,
305
+ FSL_IMX7_ADC1_ADDR = 0x30610000,
306
+ FSL_IMX7_ADCn_SIZE = (4 * KiB),
307
+
308
+ FSL_IMX7_AIPS2_CONF_ADDR = 0x305F0000,
309
+ FSL_IMX7_AIPS2_CONF_SIZE = (64 * KiB),
310
+
311
+ /* AIPS-2 End */
312
+
313
+ /* AIPS-1 Begin */
314
+
315
+ FSL_IMX7_CSU_ADDR = 0x303E0000,
316
+ FSL_IMX7_CSU_SIZE = (64 * KiB),
317
+
318
+ FSL_IMX7_RDC_ADDR = 0x303D0000,
319
+ FSL_IMX7_RDC_SIZE = (4 * KiB),
320
+
321
+ FSL_IMX7_SEMAPHORE2_ADDR = 0x303C0000,
322
+ FSL_IMX7_SEMAPHORE1_ADDR = 0x303B0000,
323
+ FSL_IMX7_SEMAPHOREn_SIZE = (4 * KiB),
324
+
325
+ FSL_IMX7_GPC_ADDR = 0x303A0000,
326
+
327
+ FSL_IMX7_SRC_ADDR = 0x30390000,
328
+ FSL_IMX7_SRC_SIZE = (4 * KiB),
329
+
330
+ FSL_IMX7_CCM_ADDR = 0x30380000,
331
+
332
+ FSL_IMX7_SNVS_HP_ADDR = 0x30370000,
333
+
334
+ FSL_IMX7_ANALOG_ADDR = 0x30360000,
335
+
336
+ FSL_IMX7_OCOTP_ADDR = 0x30350000,
337
+ FSL_IMX7_OCOTP_SIZE = 0x10000,
338
+
339
+ FSL_IMX7_IOMUXC_GPR_ADDR = 0x30340000,
340
+ FSL_IMX7_IOMUXC_GPR_SIZE = (4 * KiB),
341
+
342
+ FSL_IMX7_IOMUXC_ADDR = 0x30330000,
343
+ FSL_IMX7_IOMUXC_SIZE = (4 * KiB),
344
+
345
+ FSL_IMX7_KPP_ADDR = 0x30320000,
346
+ FSL_IMX7_KPP_SIZE = (4 * KiB),
347
+
348
+ FSL_IMX7_ROMCP_ADDR = 0x30310000,
349
+ FSL_IMX7_ROMCP_SIZE = (4 * KiB),
350
+
351
+ FSL_IMX7_GPT4_ADDR = 0x30300000,
352
+ FSL_IMX7_GPT3_ADDR = 0x302F0000,
353
+ FSL_IMX7_GPT2_ADDR = 0x302E0000,
354
+ FSL_IMX7_GPT1_ADDR = 0x302D0000,
355
+
356
+ FSL_IMX7_IOMUXC_LPSR_ADDR = 0x302C0000,
357
+ FSL_IMX7_IOMUXC_LPSR_SIZE = (4 * KiB),
358
+
359
+ FSL_IMX7_WDOG4_ADDR = 0x302B0000,
360
+ FSL_IMX7_WDOG3_ADDR = 0x302A0000,
361
+ FSL_IMX7_WDOG2_ADDR = 0x30290000,
362
+ FSL_IMX7_WDOG1_ADDR = 0x30280000,
363
+
364
+ FSL_IMX7_IOMUXC_LPSR_GPR_ADDR = 0x30270000,
365
+
366
+ FSL_IMX7_GPIO7_ADDR = 0x30260000,
367
+ FSL_IMX7_GPIO6_ADDR = 0x30250000,
368
+ FSL_IMX7_GPIO5_ADDR = 0x30240000,
369
+ FSL_IMX7_GPIO4_ADDR = 0x30230000,
370
+ FSL_IMX7_GPIO3_ADDR = 0x30220000,
371
+ FSL_IMX7_GPIO2_ADDR = 0x30210000,
372
+ FSL_IMX7_GPIO1_ADDR = 0x30200000,
373
+
374
+ FSL_IMX7_AIPS1_CONF_ADDR = 0x301F0000,
375
+ FSL_IMX7_AIPS1_CONF_SIZE = (64 * KiB),
376
377
- FSL_IMX7_A7MPCORE_ADDR = 0x31000000,
378
FSL_IMX7_A7MPCORE_DAP_ADDR = 0x30000000,
379
+ FSL_IMX7_A7MPCORE_DAP_SIZE = (1 * MiB),
380
381
- FSL_IMX7_PCIE_REG_ADDR = 0x33800000,
382
- FSL_IMX7_PCIE_REG_SIZE = 16 * 1024,
383
+ /* AIPS-1 End */
384
385
- FSL_IMX7_GPR_ADDR = 0x30340000,
386
+ FSL_IMX7_EIM_CS0_ADDR = 0x28000000,
387
+ FSL_IMX7_EIM_CS0_SIZE = (128 * MiB),
388
389
- FSL_IMX7_DMA_APBH_ADDR = 0x33000000,
390
- FSL_IMX7_DMA_APBH_SIZE = 0x2000,
391
+ FSL_IMX7_OCRAM_PXP_ADDR = 0x00940000,
392
+ FSL_IMX7_OCRAM_PXP_SIZE = (32 * KiB),
393
+
394
+ FSL_IMX7_OCRAM_EPDC_ADDR = 0x00920000,
395
+ FSL_IMX7_OCRAM_EPDC_SIZE = (128 * KiB),
396
+
397
+ FSL_IMX7_OCRAM_MEM_ADDR = 0x00900000,
398
+ FSL_IMX7_OCRAM_MEM_SIZE = (128 * KiB),
399
+
400
+ FSL_IMX7_TCMU_ADDR = 0x00800000,
401
+ FSL_IMX7_TCMU_SIZE = (32 * KiB),
402
+
403
+ FSL_IMX7_TCML_ADDR = 0x007F8000,
404
+ FSL_IMX7_TCML_SIZE = (32 * KiB),
405
+
406
+ FSL_IMX7_OCRAM_S_ADDR = 0x00180000,
407
+ FSL_IMX7_OCRAM_S_SIZE = (32 * KiB),
408
+
409
+ FSL_IMX7_CAAM_MEM_ADDR = 0x00100000,
410
+ FSL_IMX7_CAAM_MEM_SIZE = (32 * KiB),
411
+
412
+ FSL_IMX7_ROM_ADDR = 0x00000000,
413
+ FSL_IMX7_ROM_SIZE = (96 * KiB),
414
};
415
416
enum FslIMX7IRQs {
417
diff --git a/hw/arm/fsl-imx7.c b/hw/arm/fsl-imx7.c
31
index XXXXXXX..XXXXXXX 100644
418
index XXXXXXX..XXXXXXX 100644
32
--- a/target/arm/helper.c
419
--- a/hw/arm/fsl-imx7.c
33
+++ b/target/arm/helper.c
420
+++ b/hw/arm/fsl-imx7.c
34
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
421
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_init(Object *obj)
35
ARMMMUIdx mmu_idx, bool data)
422
char name[NAME_SIZE];
36
{
423
int i;
37
uint64_t tcr = regime_tcr(env, mmu_idx)->raw_tcr;
424
38
- bool epd, hpd, using16k, using64k;
425
+ /*
39
- int select, tsz, tbi, max_tsz;
426
+ * CPUs
40
+ bool epd, hpd, using16k, using64k, tsz_oob;
427
+ */
41
+ int select, tsz, tbi, max_tsz, min_tsz;
428
for (i = 0; i < MIN(ms->smp.cpus, FSL_IMX7_NUM_CPUS); i++) {
42
429
snprintf(name, NAME_SIZE, "cpu%d", i);
43
if (!regime_has_2_ranges(mmu_idx)) {
430
object_initialize_child(obj, name, &s->cpu[i],
44
select = 0;
431
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_init(Object *obj)
45
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
432
TYPE_A15MPCORE_PRIV);
46
} else {
433
47
max_tsz = 39;
434
/*
48
}
435
- * GPIOs 1 to 7
49
+ min_tsz = 16; /* TODO: ARMv8.2-LVA */
436
+ * GPIOs
50
437
*/
51
- tsz = MIN(tsz, max_tsz);
438
for (i = 0; i < FSL_IMX7_NUM_GPIOS; i++) {
52
- tsz = MAX(tsz, 16); /* TODO: ARMv8.2-LVA */
439
snprintf(name, NAME_SIZE, "gpio%d", i);
53
+ if (tsz > max_tsz) {
440
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_init(Object *obj)
54
+ tsz = max_tsz;
441
}
55
+ tsz_oob = true;
442
56
+ } else if (tsz < min_tsz) {
443
/*
57
+ tsz = min_tsz;
444
- * GPT1, 2, 3, 4
58
+ tsz_oob = true;
445
+ * GPTs
59
+ } else {
446
*/
60
+ tsz_oob = false;
447
for (i = 0; i < FSL_IMX7_NUM_GPTS; i++) {
448
snprintf(name, NAME_SIZE, "gpt%d", i);
449
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_init(Object *obj)
450
*/
451
object_initialize_child(obj, "gpcv2", &s->gpcv2, TYPE_IMX_GPCV2);
452
453
+ /*
454
+ * ECSPIs
455
+ */
456
for (i = 0; i < FSL_IMX7_NUM_ECSPIS; i++) {
457
snprintf(name, NAME_SIZE, "spi%d", i + 1);
458
object_initialize_child(obj, name, &s->spi[i], TYPE_IMX_SPI);
459
}
460
461
-
462
+ /*
463
+ * I2Cs
464
+ */
465
for (i = 0; i < FSL_IMX7_NUM_I2CS; i++) {
466
snprintf(name, NAME_SIZE, "i2c%d", i + 1);
467
object_initialize_child(obj, name, &s->i2c[i], TYPE_IMX_I2C);
468
}
469
470
/*
471
- * UART
472
+ * UARTs
473
*/
474
for (i = 0; i < FSL_IMX7_NUM_UARTS; i++) {
475
snprintf(name, NAME_SIZE, "uart%d", i);
476
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_init(Object *obj)
477
}
478
479
/*
480
- * Ethernet
481
+ * Ethernets
482
*/
483
for (i = 0; i < FSL_IMX7_NUM_ETHS; i++) {
484
snprintf(name, NAME_SIZE, "eth%d", i);
485
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_init(Object *obj)
486
}
487
488
/*
489
- * SDHCI
490
+ * SDHCIs
491
*/
492
for (i = 0; i < FSL_IMX7_NUM_USDHCS; i++) {
493
snprintf(name, NAME_SIZE, "usdhc%d", i);
494
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_init(Object *obj)
495
object_initialize_child(obj, "snvs", &s->snvs, TYPE_IMX7_SNVS);
496
497
/*
498
- * Watchdog
499
+ * Watchdogs
500
*/
501
for (i = 0; i < FSL_IMX7_NUM_WDTS; i++) {
502
snprintf(name, NAME_SIZE, "wdt%d", i);
503
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_init(Object *obj)
504
*/
505
object_initialize_child(obj, "gpr", &s->gpr, TYPE_IMX7_GPR);
506
507
+ /*
508
+ * PCIE
509
+ */
510
object_initialize_child(obj, "pcie", &s->pcie, TYPE_DESIGNWARE_PCIE_HOST);
511
512
+ /*
513
+ * USBs
514
+ */
515
for (i = 0; i < FSL_IMX7_NUM_USBS; i++) {
516
snprintf(name, NAME_SIZE, "usb%d", i);
517
object_initialize_child(obj, name, &s->usb[i], TYPE_CHIPIDEA);
518
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp)
519
return;
520
}
521
522
+ /*
523
+ * CPUs
524
+ */
525
for (i = 0; i < smp_cpus; i++) {
526
o = OBJECT(&s->cpu[i]);
527
528
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp)
529
* A7MPCORE DAP
530
*/
531
create_unimplemented_device("a7mpcore-dap", FSL_IMX7_A7MPCORE_DAP_ADDR,
532
- 0x100000);
533
+ FSL_IMX7_A7MPCORE_DAP_SIZE);
534
535
/*
536
- * GPT1, 2, 3, 4
537
+ * GPTs
538
*/
539
for (i = 0; i < FSL_IMX7_NUM_GPTS; i++) {
540
static const hwaddr FSL_IMX7_GPTn_ADDR[FSL_IMX7_NUM_GPTS] = {
541
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp)
542
FSL_IMX7_GPTn_IRQ[i]));
543
}
544
545
+ /*
546
+ * GPIOs
547
+ */
548
for (i = 0; i < FSL_IMX7_NUM_GPIOS; i++) {
549
static const hwaddr FSL_IMX7_GPIOn_ADDR[FSL_IMX7_NUM_GPIOS] = {
550
FSL_IMX7_GPIO1_ADDR,
551
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp)
552
/*
553
* IOMUXC and IOMUXC_LPSR
554
*/
555
- for (i = 0; i < FSL_IMX7_NUM_IOMUXCS; i++) {
556
- static const hwaddr FSL_IMX7_IOMUXCn_ADDR[FSL_IMX7_NUM_IOMUXCS] = {
557
- FSL_IMX7_IOMUXC_ADDR,
558
- FSL_IMX7_IOMUXC_LPSR_ADDR,
559
- };
560
-
561
- snprintf(name, NAME_SIZE, "iomuxc%d", i);
562
- create_unimplemented_device(name, FSL_IMX7_IOMUXCn_ADDR[i],
563
- FSL_IMX7_IOMUXCn_SIZE);
564
- }
565
+ create_unimplemented_device("iomuxc", FSL_IMX7_IOMUXC_ADDR,
566
+ FSL_IMX7_IOMUXC_SIZE);
567
+ create_unimplemented_device("iomuxc_lspr", FSL_IMX7_IOMUXC_LPSR_ADDR,
568
+ FSL_IMX7_IOMUXC_LPSR_SIZE);
569
570
/*
571
* CCM
572
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp)
573
sysbus_realize(SYS_BUS_DEVICE(&s->gpcv2), &error_abort);
574
sysbus_mmio_map(SYS_BUS_DEVICE(&s->gpcv2), 0, FSL_IMX7_GPC_ADDR);
575
576
- /* Initialize all ECSPI */
577
+ /*
578
+ * ECSPIs
579
+ */
580
for (i = 0; i < FSL_IMX7_NUM_ECSPIS; i++) {
581
static const hwaddr FSL_IMX7_SPIn_ADDR[FSL_IMX7_NUM_ECSPIS] = {
582
FSL_IMX7_ECSPI1_ADDR,
583
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp)
584
FSL_IMX7_SPIn_IRQ[i]));
585
}
586
587
+ /*
588
+ * I2Cs
589
+ */
590
for (i = 0; i < FSL_IMX7_NUM_I2CS; i++) {
591
static const hwaddr FSL_IMX7_I2Cn_ADDR[FSL_IMX7_NUM_I2CS] = {
592
FSL_IMX7_I2C1_ADDR,
593
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp)
594
}
595
596
/*
597
- * UART
598
+ * UARTs
599
*/
600
for (i = 0; i < FSL_IMX7_NUM_UARTS; i++) {
601
static const hwaddr FSL_IMX7_UARTn_ADDR[FSL_IMX7_NUM_UARTS] = {
602
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp)
603
}
604
605
/*
606
- * Ethernet
607
+ * Ethernets
608
*
609
* We must use two loops since phy_connected affects the other interface
610
* and we have to set all properties before calling sysbus_realize().
611
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp)
612
}
613
614
/*
615
- * USDHC
616
+ * USDHCs
617
*/
618
for (i = 0; i < FSL_IMX7_NUM_USDHCS; i++) {
619
static const hwaddr FSL_IMX7_USDHCn_ADDR[FSL_IMX7_NUM_USDHCS] = {
620
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp)
621
* SNVS
622
*/
623
sysbus_realize(SYS_BUS_DEVICE(&s->snvs), &error_abort);
624
- sysbus_mmio_map(SYS_BUS_DEVICE(&s->snvs), 0, FSL_IMX7_SNVS_ADDR);
625
+ sysbus_mmio_map(SYS_BUS_DEVICE(&s->snvs), 0, FSL_IMX7_SNVS_HP_ADDR);
626
627
/*
628
* SRC
629
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp)
630
create_unimplemented_device("src", FSL_IMX7_SRC_ADDR, FSL_IMX7_SRC_SIZE);
631
632
/*
633
- * Watchdog
634
+ * Watchdogs
635
*/
636
for (i = 0; i < FSL_IMX7_NUM_WDTS; i++) {
637
static const hwaddr FSL_IMX7_WDOGn_ADDR[FSL_IMX7_NUM_WDTS] = {
638
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp)
639
create_unimplemented_device("caam", FSL_IMX7_CAAM_ADDR, FSL_IMX7_CAAM_SIZE);
640
641
/*
642
- * PWM
643
+ * PWMs
644
*/
645
- create_unimplemented_device("pwm1", FSL_IMX7_PWM1_ADDR, FSL_IMX7_PWMn_SIZE);
646
- create_unimplemented_device("pwm2", FSL_IMX7_PWM2_ADDR, FSL_IMX7_PWMn_SIZE);
647
- create_unimplemented_device("pwm3", FSL_IMX7_PWM3_ADDR, FSL_IMX7_PWMn_SIZE);
648
- create_unimplemented_device("pwm4", FSL_IMX7_PWM4_ADDR, FSL_IMX7_PWMn_SIZE);
649
+ for (i = 0; i < FSL_IMX7_NUM_PWMS; i++) {
650
+ static const hwaddr FSL_IMX7_PWMn_ADDR[FSL_IMX7_NUM_PWMS] = {
651
+ FSL_IMX7_PWM1_ADDR,
652
+ FSL_IMX7_PWM2_ADDR,
653
+ FSL_IMX7_PWM3_ADDR,
654
+ FSL_IMX7_PWM4_ADDR,
655
+ };
656
+
657
+ snprintf(name, NAME_SIZE, "pwm%d", i);
658
+ create_unimplemented_device(name, FSL_IMX7_PWMn_ADDR[i],
659
+ FSL_IMX7_PWMn_SIZE);
61
+ }
660
+ }
62
661
63
/* Present TBI as a composite with TBID. */
662
/*
64
tbi = aa64_va_parameter_tbi(tcr, mmu_idx);
663
- * CAN
65
@@ -XXX,XX +XXX,XX @@ ARMVAParameters aa64_va_parameters(CPUARMState *env, uint64_t va,
664
+ * CANs
66
.hpd = hpd,
665
*/
67
.using16k = using16k,
666
- create_unimplemented_device("can1", FSL_IMX7_CAN1_ADDR, FSL_IMX7_CANn_SIZE);
68
.using64k = using64k,
667
- create_unimplemented_device("can2", FSL_IMX7_CAN2_ADDR, FSL_IMX7_CANn_SIZE);
69
+ .tsz_oob = tsz_oob,
668
+ for (i = 0; i < FSL_IMX7_NUM_CANS; i++) {
70
};
669
+ static const hwaddr FSL_IMX7_CANn_ADDR[FSL_IMX7_NUM_CANS] = {
670
+ FSL_IMX7_CAN1_ADDR,
671
+ FSL_IMX7_CAN2_ADDR,
672
+ };
673
+
674
+ snprintf(name, NAME_SIZE, "can%d", i);
675
+ create_unimplemented_device(name, FSL_IMX7_CANn_ADDR[i],
676
+ FSL_IMX7_CANn_SIZE);
677
+ }
678
679
/*
680
- * SAI (Audio SSI (Synchronous Serial Interface))
681
+ * SAIs (Audio SSI (Synchronous Serial Interface))
682
*/
683
- create_unimplemented_device("sai1", FSL_IMX7_SAI1_ADDR, FSL_IMX7_SAIn_SIZE);
684
- create_unimplemented_device("sai2", FSL_IMX7_SAI2_ADDR, FSL_IMX7_SAIn_SIZE);
685
- create_unimplemented_device("sai2", FSL_IMX7_SAI3_ADDR, FSL_IMX7_SAIn_SIZE);
686
+ for (i = 0; i < FSL_IMX7_NUM_SAIS; i++) {
687
+ static const hwaddr FSL_IMX7_SAIn_ADDR[FSL_IMX7_NUM_SAIS] = {
688
+ FSL_IMX7_SAI1_ADDR,
689
+ FSL_IMX7_SAI2_ADDR,
690
+ FSL_IMX7_SAI3_ADDR,
691
+ };
692
+
693
+ snprintf(name, NAME_SIZE, "sai%d", i);
694
+ create_unimplemented_device(name, FSL_IMX7_SAIn_ADDR[i],
695
+ FSL_IMX7_SAIn_SIZE);
696
+ }
697
698
/*
699
* OCOTP
700
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp)
701
create_unimplemented_device("ocotp", FSL_IMX7_OCOTP_ADDR,
702
FSL_IMX7_OCOTP_SIZE);
703
704
+ /*
705
+ * GPR
706
+ */
707
sysbus_realize(SYS_BUS_DEVICE(&s->gpr), &error_abort);
708
- sysbus_mmio_map(SYS_BUS_DEVICE(&s->gpr), 0, FSL_IMX7_GPR_ADDR);
709
+ sysbus_mmio_map(SYS_BUS_DEVICE(&s->gpr), 0, FSL_IMX7_IOMUXC_GPR_ADDR);
710
711
+ /*
712
+ * PCIE
713
+ */
714
sysbus_realize(SYS_BUS_DEVICE(&s->pcie), &error_abort);
715
sysbus_mmio_map(SYS_BUS_DEVICE(&s->pcie), 0, FSL_IMX7_PCIE_REG_ADDR);
716
717
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp)
718
irq = qdev_get_gpio_in(DEVICE(&s->a7mpcore), FSL_IMX7_PCI_INTD_IRQ);
719
sysbus_connect_irq(SYS_BUS_DEVICE(&s->pcie), 3, irq);
720
721
-
722
+ /*
723
+ * USBs
724
+ */
725
for (i = 0; i < FSL_IMX7_NUM_USBS; i++) {
726
static const hwaddr FSL_IMX7_USBMISCn_ADDR[FSL_IMX7_NUM_USBS] = {
727
FSL_IMX7_USBMISC1_ADDR,
728
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp)
729
*/
730
create_unimplemented_device("pcie-phy", FSL_IMX7_PCIE_PHY_ADDR,
731
FSL_IMX7_PCIE_PHY_SIZE);
732
+
71
}
733
}
72
734
73
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address,
735
static Property fsl_imx7_properties[] = {
74
param = aa64_va_parameters(env, address, mmu_idx,
75
access_type != MMU_INST_FETCH);
76
level = 0;
77
+
78
+ /*
79
+ * If TxSZ is programmed to a value larger than the maximum,
80
+ * or smaller than the effective minimum, it is IMPLEMENTATION
81
+ * DEFINED whether we behave as if the field were programmed
82
+ * within bounds, or if a level 0 Translation fault is generated.
83
+ *
84
+ * With FEAT_LVA, fault on less than minimum becomes required,
85
+ * so our choice is to always raise the fault.
86
+ */
87
+ if (param.tsz_oob) {
88
+ fault_type = ARMFault_Translation;
89
+ goto do_fault;
90
+ }
91
+
92
addrsize = 64 - 8 * param.tbi;
93
inputsize = 64 - param.tsz;
94
} else {
95
--
736
--
96
2.25.1
737
2.34.1
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
From: Jean-Christophe Dubois <jcd@tribudubois.net>
2
2
3
Add new macros to manipulate signed fields within the register.
3
* Add TZASC as unimplemented device.
4
- Allow bare metal application to access this (unimplemented) device
5
* Add CSU as unimplemented device.
6
- Allow bare metal application to access this (unimplemented) device
7
* Add various memory segments
8
- OCRAM
9
- OCRAM EPDC
10
- OCRAM PXP
11
- OCRAM S
12
- ROM
13
- CAAM
4
14
5
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
15
Signed-off-by: Jean-Christophe Dubois <jcd@tribudubois.net>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
16
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
7
Message-id: 20220301215958.157011-2-richard.henderson@linaro.org
17
Message-id: f887a3483996ba06d40bd62ffdfb0ecf68621987.1692964892.git.jcd@tribudubois.net
8
Suggested-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
10
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
18
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
11
---
19
---
12
include/hw/registerfields.h | 48 ++++++++++++++++++++++++++++++++++++-
20
include/hw/arm/fsl-imx7.h | 7 +++++
13
1 file changed, 47 insertions(+), 1 deletion(-)
21
hw/arm/fsl-imx7.c | 63 +++++++++++++++++++++++++++++++++++++++
22
2 files changed, 70 insertions(+)
14
23
15
diff --git a/include/hw/registerfields.h b/include/hw/registerfields.h
24
diff --git a/include/hw/arm/fsl-imx7.h b/include/hw/arm/fsl-imx7.h
16
index XXXXXXX..XXXXXXX 100644
25
index XXXXXXX..XXXXXXX 100644
17
--- a/include/hw/registerfields.h
26
--- a/include/hw/arm/fsl-imx7.h
18
+++ b/include/hw/registerfields.h
27
+++ b/include/hw/arm/fsl-imx7.h
19
@@ -XXX,XX +XXX,XX @@
28
@@ -XXX,XX +XXX,XX @@ struct FslIMX7State {
20
extract64((storage), R_ ## reg ## _ ## field ## _SHIFT, \
29
IMX7GPRState gpr;
21
R_ ## reg ## _ ## field ## _LENGTH)
30
ChipideaState usb[FSL_IMX7_NUM_USBS];
22
31
DesignwarePCIEHost pcie;
23
+#define FIELD_SEX8(storage, reg, field) \
32
+ MemoryRegion rom;
24
+ sextract8((storage), R_ ## reg ## _ ## field ## _SHIFT, \
33
+ MemoryRegion caam;
25
+ R_ ## reg ## _ ## field ## _LENGTH)
34
+ MemoryRegion ocram;
26
+#define FIELD_SEX16(storage, reg, field) \
35
+ MemoryRegion ocram_epdc;
27
+ sextract16((storage), R_ ## reg ## _ ## field ## _SHIFT, \
36
+ MemoryRegion ocram_pxp;
28
+ R_ ## reg ## _ ## field ## _LENGTH)
37
+ MemoryRegion ocram_s;
29
+#define FIELD_SEX32(storage, reg, field) \
30
+ sextract32((storage), R_ ## reg ## _ ## field ## _SHIFT, \
31
+ R_ ## reg ## _ ## field ## _LENGTH)
32
+#define FIELD_SEX64(storage, reg, field) \
33
+ sextract64((storage), R_ ## reg ## _ ## field ## _SHIFT, \
34
+ R_ ## reg ## _ ## field ## _LENGTH)
35
+
38
+
36
/* Extract a field from an array of registers */
39
uint32_t phy_num[FSL_IMX7_NUM_ETHS];
37
#define ARRAY_FIELD_EX32(regs, reg, field) \
40
bool phy_connected[FSL_IMX7_NUM_ETHS];
38
FIELD_EX32((regs)[R_ ## reg], reg, field)
41
};
39
@@ -XXX,XX +XXX,XX @@
42
diff --git a/hw/arm/fsl-imx7.c b/hw/arm/fsl-imx7.c
40
_d; })
43
index XXXXXXX..XXXXXXX 100644
41
#define FIELD_DP64(storage, reg, field, val) ({ \
44
--- a/hw/arm/fsl-imx7.c
42
struct { \
45
+++ b/hw/arm/fsl-imx7.c
43
- uint64_t v:R_ ## reg ## _ ## field ## _LENGTH; \
46
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp)
44
+ uint64_t v:R_ ## reg ## _ ## field ## _LENGTH; \
47
create_unimplemented_device("pcie-phy", FSL_IMX7_PCIE_PHY_ADDR,
45
+ } _v = { .v = val }; \
48
FSL_IMX7_PCIE_PHY_SIZE);
46
+ uint64_t _d; \
49
47
+ _d = deposit64((storage), R_ ## reg ## _ ## field ## _SHIFT, \
50
+ /*
48
+ R_ ## reg ## _ ## field ## _LENGTH, _v.v); \
51
+ * CSU
49
+ _d; })
52
+ */
53
+ create_unimplemented_device("csu", FSL_IMX7_CSU_ADDR,
54
+ FSL_IMX7_CSU_SIZE);
50
+
55
+
51
+#define FIELD_SDP8(storage, reg, field, val) ({ \
56
+ /*
52
+ struct { \
57
+ * TZASC
53
+ signed int v:R_ ## reg ## _ ## field ## _LENGTH; \
58
+ */
54
+ } _v = { .v = val }; \
59
+ create_unimplemented_device("tzasc", FSL_IMX7_TZASC_ADDR,
55
+ uint8_t _d; \
60
+ FSL_IMX7_TZASC_SIZE);
56
+ _d = deposit32((storage), R_ ## reg ## _ ## field ## _SHIFT, \
61
+
57
+ R_ ## reg ## _ ## field ## _LENGTH, _v.v); \
62
+ /*
58
+ _d; })
63
+ * OCRAM memory
59
+#define FIELD_SDP16(storage, reg, field, val) ({ \
64
+ */
60
+ struct { \
65
+ memory_region_init_ram(&s->ocram, NULL, "imx7.ocram",
61
+ signed int v:R_ ## reg ## _ ## field ## _LENGTH; \
66
+ FSL_IMX7_OCRAM_MEM_SIZE,
62
+ } _v = { .v = val }; \
67
+ &error_abort);
63
+ uint16_t _d; \
68
+ memory_region_add_subregion(get_system_memory(), FSL_IMX7_OCRAM_MEM_ADDR,
64
+ _d = deposit32((storage), R_ ## reg ## _ ## field ## _SHIFT, \
69
+ &s->ocram);
65
+ R_ ## reg ## _ ## field ## _LENGTH, _v.v); \
70
+
66
+ _d; })
71
+ /*
67
+#define FIELD_SDP32(storage, reg, field, val) ({ \
72
+ * OCRAM EPDC memory
68
+ struct { \
73
+ */
69
+ signed int v:R_ ## reg ## _ ## field ## _LENGTH; \
74
+ memory_region_init_ram(&s->ocram_epdc, NULL, "imx7.ocram_epdc",
70
+ } _v = { .v = val }; \
75
+ FSL_IMX7_OCRAM_EPDC_SIZE,
71
+ uint32_t _d; \
76
+ &error_abort);
72
+ _d = deposit32((storage), R_ ## reg ## _ ## field ## _SHIFT, \
77
+ memory_region_add_subregion(get_system_memory(), FSL_IMX7_OCRAM_EPDC_ADDR,
73
+ R_ ## reg ## _ ## field ## _LENGTH, _v.v); \
78
+ &s->ocram_epdc);
74
+ _d; })
79
+
75
+#define FIELD_SDP64(storage, reg, field, val) ({ \
80
+ /*
76
+ struct { \
81
+ * OCRAM PXP memory
77
+ int64_t v:R_ ## reg ## _ ## field ## _LENGTH; \
82
+ */
78
} _v = { .v = val }; \
83
+ memory_region_init_ram(&s->ocram_pxp, NULL, "imx7.ocram_pxp",
79
uint64_t _d; \
84
+ FSL_IMX7_OCRAM_PXP_SIZE,
80
_d = deposit64((storage), R_ ## reg ## _ ## field ## _SHIFT, \
85
+ &error_abort);
86
+ memory_region_add_subregion(get_system_memory(), FSL_IMX7_OCRAM_PXP_ADDR,
87
+ &s->ocram_pxp);
88
+
89
+ /*
90
+ * OCRAM_S memory
91
+ */
92
+ memory_region_init_ram(&s->ocram_s, NULL, "imx7.ocram_s",
93
+ FSL_IMX7_OCRAM_S_SIZE,
94
+ &error_abort);
95
+ memory_region_add_subregion(get_system_memory(), FSL_IMX7_OCRAM_S_ADDR,
96
+ &s->ocram_s);
97
+
98
+ /*
99
+ * ROM memory
100
+ */
101
+ memory_region_init_rom(&s->rom, OBJECT(dev), "imx7.rom",
102
+ FSL_IMX7_ROM_SIZE, &error_abort);
103
+ memory_region_add_subregion(get_system_memory(), FSL_IMX7_ROM_ADDR,
104
+ &s->rom);
105
+
106
+ /*
107
+ * CAAM memory
108
+ */
109
+ memory_region_init_rom(&s->caam, OBJECT(dev), "imx7.caam",
110
+ FSL_IMX7_CAAM_MEM_SIZE, &error_abort);
111
+ memory_region_add_subregion(get_system_memory(), FSL_IMX7_CAAM_MEM_ADDR,
112
+ &s->caam);
113
}
114
115
static Property fsl_imx7_properties[] = {
81
--
116
--
82
2.25.1
117
2.34.1
83
118
84
119
diff view generated by jsdifflib
1
From: Shengtan Mao <stmao@google.com>
1
From: Jean-Christophe Dubois <jcd@tribudubois.net>
2
2
3
Reviewed-by: Hao Wu <wuhaotsh@google.com>
3
The SRC device is normally used to start the secondary CPU.
4
Reviewed-by: Chris Rauer <crauer@google.com>
4
5
Signed-off-by: Shengtan Mao <stmao@google.com>
5
When running Linux directly, QEMU is emulating a PSCI interface that UBOOT
6
Signed-off-by: Patrick Venture <venture@google.com>
6
is installing at boot time and therefore the fact that the SRC device is
7
Message-id: 20220225174451.192304-1-wuhaotsh@google.com
7
unimplemented is hidden as Qemu respond directly to PSCI requets without
8
using the SRC device.
9
10
But if you try to run a more bare metal application (maybe uboot itself),
11
then it is not possible to start the secondary CPU as the SRC is an
12
unimplemented device.
13
14
This patch adds the ability to start the secondary CPU through the SRC
15
device so that you can use this feature in bare metal applications.
16
17
Signed-off-by: Jean-Christophe Dubois <jcd@tribudubois.net>
18
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
19
Message-id: ce9a0162defd2acee5dc7f8a674743de0cded569.1692964892.git.jcd@tribudubois.net
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
20
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
---
21
---
10
tests/qtest/npcm7xx_sdhci-test.c | 215 +++++++++++++++++++++++++++++++
22
include/hw/arm/fsl-imx7.h | 3 +-
11
tests/qtest/meson.build | 1 +
23
include/hw/misc/imx7_src.h | 66 +++++++++
12
2 files changed, 216 insertions(+)
24
hw/arm/fsl-imx7.c | 8 +-
13
create mode 100644 tests/qtest/npcm7xx_sdhci-test.c
25
hw/misc/imx7_src.c | 276 +++++++++++++++++++++++++++++++++++++
14
26
hw/misc/meson.build | 1 +
15
diff --git a/tests/qtest/npcm7xx_sdhci-test.c b/tests/qtest/npcm7xx_sdhci-test.c
27
hw/misc/trace-events | 4 +
28
6 files changed, 356 insertions(+), 2 deletions(-)
29
create mode 100644 include/hw/misc/imx7_src.h
30
create mode 100644 hw/misc/imx7_src.c
31
32
diff --git a/include/hw/arm/fsl-imx7.h b/include/hw/arm/fsl-imx7.h
33
index XXXXXXX..XXXXXXX 100644
34
--- a/include/hw/arm/fsl-imx7.h
35
+++ b/include/hw/arm/fsl-imx7.h
36
@@ -XXX,XX +XXX,XX @@
37
#include "hw/misc/imx7_ccm.h"
38
#include "hw/misc/imx7_snvs.h"
39
#include "hw/misc/imx7_gpr.h"
40
+#include "hw/misc/imx7_src.h"
41
#include "hw/watchdog/wdt_imx2.h"
42
#include "hw/gpio/imx_gpio.h"
43
#include "hw/char/imx_serial.h"
44
@@ -XXX,XX +XXX,XX @@ struct FslIMX7State {
45
IMX7CCMState ccm;
46
IMX7AnalogState analog;
47
IMX7SNVSState snvs;
48
+ IMX7SRCState src;
49
IMXGPCv2State gpcv2;
50
IMXSPIState spi[FSL_IMX7_NUM_ECSPIS];
51
IMXI2CState i2c[FSL_IMX7_NUM_I2CS];
52
@@ -XXX,XX +XXX,XX @@ enum FslIMX7MemoryMap {
53
FSL_IMX7_GPC_ADDR = 0x303A0000,
54
55
FSL_IMX7_SRC_ADDR = 0x30390000,
56
- FSL_IMX7_SRC_SIZE = (4 * KiB),
57
58
FSL_IMX7_CCM_ADDR = 0x30380000,
59
60
diff --git a/include/hw/misc/imx7_src.h b/include/hw/misc/imx7_src.h
16
new file mode 100644
61
new file mode 100644
17
index XXXXXXX..XXXXXXX
62
index XXXXXXX..XXXXXXX
18
--- /dev/null
63
--- /dev/null
19
+++ b/tests/qtest/npcm7xx_sdhci-test.c
64
+++ b/include/hw/misc/imx7_src.h
20
@@ -XXX,XX +XXX,XX @@
65
@@ -XXX,XX +XXX,XX @@
21
+/*
66
+/*
22
+ * QTests for NPCM7xx SD-3.0 / MMC-4.51 Host Controller
67
+ * IMX7 System Reset Controller
23
+ *
68
+ *
24
+ * Copyright (c) 2022 Google LLC
69
+ * Copyright (C) 2023 Jean-Christophe Dubois <jcd@tribudubois.net>
25
+ *
70
+ *
26
+ * This program is free software; you can redistribute it and/or modify it
71
+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
27
+ * under the terms of the GNU General Public License as published by the
72
+ * See the COPYING file in the top-level directory.
28
+ * Free Software Foundation; either version 2 of the License, or
73
+ */
29
+ * (at your option) any later version.
74
+
75
+#ifndef IMX7_SRC_H
76
+#define IMX7_SRC_H
77
+
78
+#include "hw/sysbus.h"
79
+#include "qemu/bitops.h"
80
+#include "qom/object.h"
81
+
82
+#define SRC_SCR 0
83
+#define SRC_A7RCR0 1
84
+#define SRC_A7RCR1 2
85
+#define SRC_M4RCR 3
86
+#define SRC_ERCR 5
87
+#define SRC_HSICPHY_RCR 7
88
+#define SRC_USBOPHY1_RCR 8
89
+#define SRC_USBOPHY2_RCR 9
90
+#define SRC_MPIPHY_RCR 10
91
+#define SRC_PCIEPHY_RCR 11
92
+#define SRC_SBMR1 22
93
+#define SRC_SRSR 23
94
+#define SRC_SISR 26
95
+#define SRC_SIMR 27
96
+#define SRC_SBMR2 28
97
+#define SRC_GPR1 29
98
+#define SRC_GPR2 30
99
+#define SRC_GPR3 31
100
+#define SRC_GPR4 32
101
+#define SRC_GPR5 33
102
+#define SRC_GPR6 34
103
+#define SRC_GPR7 35
104
+#define SRC_GPR8 36
105
+#define SRC_GPR9 37
106
+#define SRC_GPR10 38
107
+#define SRC_MAX 39
108
+
109
+/* SRC_A7SCR1 */
110
+#define R_CORE1_ENABLE_SHIFT 1
111
+#define R_CORE1_ENABLE_LENGTH 1
112
+/* SRC_A7SCR0 */
113
+#define R_CORE1_RST_SHIFT 5
114
+#define R_CORE1_RST_LENGTH 1
115
+#define R_CORE0_RST_SHIFT 4
116
+#define R_CORE0_RST_LENGTH 1
117
+
118
+#define TYPE_IMX7_SRC "imx7.src"
119
+OBJECT_DECLARE_SIMPLE_TYPE(IMX7SRCState, IMX7_SRC)
120
+
121
+struct IMX7SRCState {
122
+ /* <private> */
123
+ SysBusDevice parent_obj;
124
+
125
+ /* <public> */
126
+ MemoryRegion iomem;
127
+
128
+ uint32_t regs[SRC_MAX];
129
+};
130
+
131
+#endif /* IMX7_SRC_H */
132
diff --git a/hw/arm/fsl-imx7.c b/hw/arm/fsl-imx7.c
133
index XXXXXXX..XXXXXXX 100644
134
--- a/hw/arm/fsl-imx7.c
135
+++ b/hw/arm/fsl-imx7.c
136
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_init(Object *obj)
137
*/
138
object_initialize_child(obj, "gpcv2", &s->gpcv2, TYPE_IMX_GPCV2);
139
140
+ /*
141
+ * SRC
142
+ */
143
+ object_initialize_child(obj, "src", &s->src, TYPE_IMX7_SRC);
144
+
145
/*
146
* ECSPIs
147
*/
148
@@ -XXX,XX +XXX,XX @@ static void fsl_imx7_realize(DeviceState *dev, Error **errp)
149
/*
150
* SRC
151
*/
152
- create_unimplemented_device("src", FSL_IMX7_SRC_ADDR, FSL_IMX7_SRC_SIZE);
153
+ sysbus_realize(SYS_BUS_DEVICE(&s->src), &error_abort);
154
+ sysbus_mmio_map(SYS_BUS_DEVICE(&s->src), 0, FSL_IMX7_SRC_ADDR);
155
156
/*
157
* Watchdogs
158
diff --git a/hw/misc/imx7_src.c b/hw/misc/imx7_src.c
159
new file mode 100644
160
index XXXXXXX..XXXXXXX
161
--- /dev/null
162
+++ b/hw/misc/imx7_src.c
163
@@ -XXX,XX +XXX,XX @@
164
+/*
165
+ * IMX7 System Reset Controller
30
+ *
166
+ *
31
+ * This program is distributed in the hope that it will be useful, but WITHOUT
167
+ * Copyright (c) 2023 Jean-Christophe Dubois <jcd@tribudubois.net>
32
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
168
+ *
33
+ * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
169
+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
34
+ * for more details.
170
+ * See the COPYING file in the top-level directory.
171
+ *
35
+ */
172
+ */
36
+
173
+
37
+#include "qemu/osdep.h"
174
+#include "qemu/osdep.h"
38
+#include "hw/sd/npcm7xx_sdhci.h"
175
+#include "hw/misc/imx7_src.h"
39
+
176
+#include "migration/vmstate.h"
40
+#include "libqos/libqtest.h"
177
+#include "qemu/bitops.h"
41
+#include "libqtest-single.h"
178
+#include "qemu/log.h"
42
+#include "libqos/sdhci-cmd.h"
179
+#include "qemu/main-loop.h"
43
+
180
+#include "qemu/module.h"
44
+#define NPCM7XX_REG_SIZE 0x100
181
+#include "target/arm/arm-powerctl.h"
45
+#define NPCM7XX_MMC_BA 0xF0842000
182
+#include "hw/core/cpu.h"
46
+#define NPCM7XX_BLK_SIZE 512
183
+#include "hw/registerfields.h"
47
+#define NPCM7XX_TEST_IMAGE_SIZE (1 << 30)
184
+
48
+
185
+#include "trace.h"
49
+char *sd_path;
186
+
50
+
187
+static const char *imx7_src_reg_name(uint32_t reg)
51
+static QTestState *setup_sd_card(void)
188
+{
52
+{
189
+ static char unknown[20];
53
+ QTestState *qts = qtest_initf(
190
+
54
+ "-machine kudo-bmc "
191
+ switch (reg) {
55
+ "-device sd-card,drive=drive0 "
192
+ case SRC_SCR:
56
+ "-drive id=drive0,if=none,file=%s,format=raw,auto-read-only=off",
193
+ return "SRC_SCR";
57
+ sd_path);
194
+ case SRC_A7RCR0:
58
+
195
+ return "SRC_A7RCR0";
59
+ qtest_writew(qts, NPCM7XX_MMC_BA + SDHC_SWRST, SDHC_RESET_ALL);
196
+ case SRC_A7RCR1:
60
+ qtest_writew(qts, NPCM7XX_MMC_BA + SDHC_CLKCON,
197
+ return "SRC_A7RCR1";
61
+ SDHC_CLOCK_SDCLK_EN | SDHC_CLOCK_INT_STABLE |
198
+ case SRC_M4RCR:
62
+ SDHC_CLOCK_INT_EN);
199
+ return "SRC_M4RCR";
63
+ sdhci_cmd_regs(qts, NPCM7XX_MMC_BA, 0, 0, 0, 0, SDHC_APP_CMD);
200
+ case SRC_ERCR:
64
+ sdhci_cmd_regs(qts, NPCM7XX_MMC_BA, 0, 0, 0x41200000, 0, (41 << 8));
201
+ return "SRC_ERCR";
65
+ sdhci_cmd_regs(qts, NPCM7XX_MMC_BA, 0, 0, 0, 0, SDHC_ALL_SEND_CID);
202
+ case SRC_HSICPHY_RCR:
66
+ sdhci_cmd_regs(qts, NPCM7XX_MMC_BA, 0, 0, 0, 0, SDHC_SEND_RELATIVE_ADDR);
203
+ return "SRC_HSICPHY_RCR";
67
+ sdhci_cmd_regs(qts, NPCM7XX_MMC_BA, 0, 0, 0x45670000, 0,
204
+ case SRC_USBOPHY1_RCR:
68
+ SDHC_SELECT_DESELECT_CARD);
205
+ return "SRC_USBOPHY1_RCR";
69
+
206
+ case SRC_USBOPHY2_RCR:
70
+ return qts;
207
+ return "SRC_USBOPHY2_RCR";
71
+}
208
+ case SRC_PCIEPHY_RCR:
72
+
209
+ return "SRC_PCIEPHY_RCR";
73
+static void write_sdread(QTestState *qts, const char *msg)
210
+ case SRC_SBMR1:
74
+{
211
+ return "SRC_SBMR1";
75
+ int fd, ret;
212
+ case SRC_SRSR:
76
+ size_t len = strlen(msg);
213
+ return "SRC_SRSR";
77
+ char *rmsg = g_malloc(len);
214
+ case SRC_SISR:
78
+
215
+ return "SRC_SISR";
79
+ /* write message to sd */
216
+ case SRC_SIMR:
80
+ fd = open(sd_path, O_WRONLY);
217
+ return "SRC_SIMR";
81
+ g_assert(fd >= 0);
218
+ case SRC_SBMR2:
82
+ ret = write(fd, msg, len);
219
+ return "SRC_SBMR2";
83
+ close(fd);
220
+ case SRC_GPR1:
84
+ g_assert(ret == len);
221
+ return "SRC_GPR1";
85
+
222
+ case SRC_GPR2:
86
+ /* read message using sdhci */
223
+ return "SRC_GPR2";
87
+ ret = sdhci_read_cmd(qts, NPCM7XX_MMC_BA, rmsg, len);
224
+ case SRC_GPR3:
88
+ g_assert(ret == len);
225
+ return "SRC_GPR3";
89
+ g_assert(!memcmp(rmsg, msg, len));
226
+ case SRC_GPR4:
90
+
227
+ return "SRC_GPR4";
91
+ g_free(rmsg);
228
+ case SRC_GPR5:
92
+}
229
+ return "SRC_GPR5";
93
+
230
+ case SRC_GPR6:
94
+/* Check MMC can read values from sd */
231
+ return "SRC_GPR6";
95
+static void test_read_sd(void)
232
+ case SRC_GPR7:
96
+{
233
+ return "SRC_GPR7";
97
+ QTestState *qts = setup_sd_card();
234
+ case SRC_GPR8:
98
+
235
+ return "SRC_GPR8";
99
+ write_sdread(qts, "hello world");
236
+ case SRC_GPR9:
100
+ write_sdread(qts, "goodbye");
237
+ return "SRC_GPR9";
101
+
238
+ case SRC_GPR10:
102
+ qtest_quit(qts);
239
+ return "SRC_GPR10";
103
+}
240
+ default:
104
+
241
+ sprintf(unknown, "%u ?", reg);
105
+static void sdwrite_read(QTestState *qts, const char *msg)
242
+ return unknown;
106
+{
243
+ }
107
+ int fd, ret;
244
+}
108
+ size_t len = strlen(msg);
245
+
109
+ char *rmsg = g_malloc(len);
246
+static const VMStateDescription vmstate_imx7_src = {
110
+
247
+ .name = TYPE_IMX7_SRC,
111
+ /* write message using sdhci */
248
+ .version_id = 1,
112
+ sdhci_write_cmd(qts, NPCM7XX_MMC_BA, msg, len, NPCM7XX_BLK_SIZE);
249
+ .minimum_version_id = 1,
113
+
250
+ .fields = (VMStateField[]) {
114
+ /* read message from sd */
251
+ VMSTATE_UINT32_ARRAY(regs, IMX7SRCState, SRC_MAX),
115
+ fd = open(sd_path, O_RDONLY);
252
+ VMSTATE_END_OF_LIST()
116
+ g_assert(fd >= 0);
253
+ },
117
+ ret = read(fd, rmsg, len);
254
+};
118
+ close(fd);
255
+
119
+ g_assert(ret == len);
256
+static void imx7_src_reset(DeviceState *dev)
120
+
257
+{
121
+ g_assert(!memcmp(rmsg, msg, len));
258
+ IMX7SRCState *s = IMX7_SRC(dev);
122
+
259
+
123
+ g_free(rmsg);
260
+ memset(s->regs, 0, sizeof(s->regs));
124
+}
261
+
125
+
262
+ /* Set reset values */
126
+/* Check MMC can write values to sd */
263
+ s->regs[SRC_SCR] = 0xA0;
127
+static void test_write_sd(void)
264
+ s->regs[SRC_SRSR] = 0x1;
128
+{
265
+ s->regs[SRC_SIMR] = 0x1F;
129
+ QTestState *qts = setup_sd_card();
266
+}
130
+
267
+
131
+ sdwrite_read(qts, "hello world");
268
+static uint64_t imx7_src_read(void *opaque, hwaddr offset, unsigned size)
132
+ sdwrite_read(qts, "goodbye");
269
+{
133
+
270
+ uint32_t value = 0;
134
+ qtest_quit(qts);
271
+ IMX7SRCState *s = (IMX7SRCState *)opaque;
135
+}
272
+ uint32_t index = offset >> 2;
136
+
273
+
137
+/* Check SDHCI has correct default values. */
274
+ if (index < SRC_MAX) {
138
+static void test_reset(void)
275
+ value = s->regs[index];
139
+{
276
+ } else {
140
+ QTestState *qts = qtest_init("-machine kudo-bmc");
277
+ qemu_log_mask(LOG_GUEST_ERROR, "[%s]%s: Bad register at offset 0x%"
141
+ uint64_t addr = NPCM7XX_MMC_BA;
278
+ HWADDR_PRIx "\n", TYPE_IMX7_SRC, __func__, offset);
142
+ uint64_t end_addr = addr + NPCM7XX_REG_SIZE;
279
+ }
143
+ uint16_t prstvals_resets[] = {NPCM7XX_PRSTVALS_0_RESET,
280
+
144
+ NPCM7XX_PRSTVALS_1_RESET,
281
+ trace_imx7_src_read(imx7_src_reg_name(index), value);
145
+ 0,
282
+
146
+ NPCM7XX_PRSTVALS_3_RESET,
283
+ return value;
147
+ 0,
284
+}
148
+ 0};
285
+
149
+ int i;
286
+
150
+ uint32_t mask;
287
+/*
151
+
288
+ * The reset is asynchronous so we need to defer clearing the reset
152
+ while (addr < end_addr) {
289
+ * bit until the work is completed.
153
+ switch (addr - NPCM7XX_MMC_BA) {
290
+ */
154
+ case SDHC_PRNSTS:
291
+
155
+ /*
292
+struct SRCSCRResetInfo {
156
+ * ignores bits 20 to 24: they are changed when reading registers
293
+ IMX7SRCState *s;
157
+ */
294
+ uint32_t reset_bit;
158
+ mask = 0x1f00000;
295
+};
159
+ g_assert_cmphex(qtest_readl(qts, addr) | mask, ==,
296
+
160
+ NPCM7XX_PRSNTS_RESET | mask);
297
+static void imx7_clear_reset_bit(CPUState *cpu, run_on_cpu_data data)
161
+ addr += 4;
298
+{
162
+ break;
299
+ struct SRCSCRResetInfo *ri = data.host_ptr;
163
+ case SDHC_BLKGAP:
300
+ IMX7SRCState *s = ri->s;
164
+ g_assert_cmphex(qtest_readb(qts, addr), ==, NPCM7XX_BLKGAP_RESET);
301
+
165
+ addr += 1;
302
+ assert(qemu_mutex_iothread_locked());
166
+ break;
303
+
167
+ case SDHC_CAPAB:
304
+ s->regs[SRC_A7RCR0] = deposit32(s->regs[SRC_A7RCR0], ri->reset_bit, 1, 0);
168
+ g_assert_cmphex(qtest_readq(qts, addr), ==, NPCM7XX_CAPAB_RESET);
305
+
169
+ addr += 8;
306
+ trace_imx7_src_write(imx7_src_reg_name(SRC_A7RCR0), s->regs[SRC_A7RCR0]);
170
+ break;
307
+
171
+ case SDHC_MAXCURR:
308
+ g_free(ri);
172
+ g_assert_cmphex(qtest_readq(qts, addr), ==, NPCM7XX_MAXCURR_RESET);
309
+}
173
+ addr += 8;
310
+
174
+ break;
311
+static void imx7_defer_clear_reset_bit(uint32_t cpuid,
175
+ case SDHC_HCVER:
312
+ IMX7SRCState *s,
176
+ g_assert_cmphex(qtest_readw(qts, addr), ==, NPCM7XX_HCVER_RESET);
313
+ uint32_t reset_shift)
177
+ addr += 2;
314
+{
178
+ break;
315
+ struct SRCSCRResetInfo *ri;
179
+ case NPCM7XX_PRSTVALS:
316
+ CPUState *cpu = arm_get_cpu_by_id(cpuid);
180
+ for (i = 0; i < NPCM7XX_PRSTVALS_SIZE; ++i) {
317
+
181
+ g_assert_cmphex(qtest_readw(qts, addr + 2 * i), ==,
318
+ if (!cpu) {
182
+ prstvals_resets[i]);
319
+ return;
320
+ }
321
+
322
+ ri = g_new(struct SRCSCRResetInfo, 1);
323
+ ri->s = s;
324
+ ri->reset_bit = reset_shift;
325
+
326
+ async_run_on_cpu(cpu, imx7_clear_reset_bit, RUN_ON_CPU_HOST_PTR(ri));
327
+}
328
+
329
+
330
+static void imx7_src_write(void *opaque, hwaddr offset, uint64_t value,
331
+ unsigned size)
332
+{
333
+ IMX7SRCState *s = (IMX7SRCState *)opaque;
334
+ uint32_t index = offset >> 2;
335
+ long unsigned int change_mask;
336
+ uint32_t current_value = value;
337
+
338
+ if (index >= SRC_MAX) {
339
+ qemu_log_mask(LOG_GUEST_ERROR, "[%s]%s: Bad register at offset 0x%"
340
+ HWADDR_PRIx "\n", TYPE_IMX7_SRC, __func__, offset);
341
+ return;
342
+ }
343
+
344
+ trace_imx7_src_write(imx7_src_reg_name(SRC_A7RCR0), s->regs[SRC_A7RCR0]);
345
+
346
+ change_mask = s->regs[index] ^ (uint32_t)current_value;
347
+
348
+ switch (index) {
349
+ case SRC_A7RCR0:
350
+ if (FIELD_EX32(change_mask, CORE0, RST)) {
351
+ arm_reset_cpu(0);
352
+ imx7_defer_clear_reset_bit(0, s, R_CORE0_RST_SHIFT);
353
+ }
354
+ if (FIELD_EX32(change_mask, CORE1, RST)) {
355
+ arm_reset_cpu(1);
356
+ imx7_defer_clear_reset_bit(1, s, R_CORE1_RST_SHIFT);
357
+ }
358
+ s->regs[index] = current_value;
359
+ break;
360
+ case SRC_A7RCR1:
361
+ /*
362
+ * On real hardware when the system reset controller starts a
363
+ * secondary CPU it runs through some boot ROM code which reads
364
+ * the SRC_GPRX registers controlling the start address and branches
365
+ * to it.
366
+ * Here we are taking a short cut and branching directly to the
367
+ * requested address (we don't want to run the boot ROM code inside
368
+ * QEMU)
369
+ */
370
+ if (FIELD_EX32(change_mask, CORE1, ENABLE)) {
371
+ if (FIELD_EX32(current_value, CORE1, ENABLE)) {
372
+ /* CORE 1 is brought up */
373
+ arm_set_cpu_on(1, s->regs[SRC_GPR3], s->regs[SRC_GPR4],
374
+ 3, false);
375
+ } else {
376
+ /* CORE 1 is shut down */
377
+ arm_set_cpu_off(1);
183
+ }
378
+ }
184
+ addr += NPCM7XX_PRSTVALS_SIZE * 2;
379
+ /* We clear the reset bits as the processor changed state */
185
+ break;
380
+ imx7_defer_clear_reset_bit(1, s, R_CORE1_RST_SHIFT);
186
+ default:
381
+ clear_bit(R_CORE1_RST_SHIFT, &change_mask);
187
+ g_assert_cmphex(qtest_readb(qts, addr), ==, 0);
188
+ addr += 1;
189
+ }
382
+ }
383
+ s->regs[index] = current_value;
384
+ break;
385
+ default:
386
+ s->regs[index] = current_value;
387
+ break;
190
+ }
388
+ }
191
+
389
+}
192
+ qtest_quit(qts);
390
+
193
+}
391
+static const struct MemoryRegionOps imx7_src_ops = {
194
+
392
+ .read = imx7_src_read,
195
+static void drive_destroy(void)
393
+ .write = imx7_src_write,
196
+{
394
+ .endianness = DEVICE_NATIVE_ENDIAN,
197
+ unlink(sd_path);
395
+ .valid = {
198
+ g_free(sd_path);
396
+ /*
199
+}
397
+ * Our device would not work correctly if the guest was doing
200
+
398
+ * unaligned access. This might not be a limitation on the real
201
+static void drive_create(void)
399
+ * device but in practice there is no reason for a guest to access
202
+{
400
+ * this device unaligned.
203
+ int fd, ret;
401
+ */
204
+ GError *error = NULL;
402
+ .min_access_size = 4,
205
+
403
+ .max_access_size = 4,
206
+ /* Create a temporary raw image */
404
+ .unaligned = false,
207
+ fd = g_file_open_tmp("sdhci_XXXXXX", &sd_path, &error);
405
+ },
208
+ if (fd == -1) {
406
+};
209
+ fprintf(stderr, "unable to create sdhci file: %s\n", error->message);
407
+
210
+ g_error_free(error);
408
+static void imx7_src_realize(DeviceState *dev, Error **errp)
211
+ }
409
+{
212
+ g_assert(sd_path != NULL);
410
+ IMX7SRCState *s = IMX7_SRC(dev);
213
+
411
+
214
+ ret = ftruncate(fd, NPCM7XX_TEST_IMAGE_SIZE);
412
+ memory_region_init_io(&s->iomem, OBJECT(dev), &imx7_src_ops, s,
215
+ g_assert_cmpint(ret, ==, 0);
413
+ TYPE_IMX7_SRC, 0x1000);
216
+ g_message("%s", sd_path);
414
+ sysbus_init_mmio(SYS_BUS_DEVICE(dev), &s->iomem);
217
+ close(fd);
415
+}
218
+}
416
+
219
+
417
+static void imx7_src_class_init(ObjectClass *klass, void *data)
220
+int main(int argc, char **argv)
418
+{
221
+{
419
+ DeviceClass *dc = DEVICE_CLASS(klass);
222
+ int ret;
420
+
223
+
421
+ dc->realize = imx7_src_realize;
224
+ drive_create();
422
+ dc->reset = imx7_src_reset;
225
+
423
+ dc->vmsd = &vmstate_imx7_src;
226
+ g_test_init(&argc, &argv, NULL);
424
+ dc->desc = "i.MX6 System Reset Controller";
227
+
425
+}
228
+ qtest_add_func("npcm7xx_sdhci/reset", test_reset);
426
+
229
+ qtest_add_func("npcm7xx_sdhci/write_sd", test_write_sd);
427
+static const TypeInfo imx7_src_info = {
230
+ qtest_add_func("npcm7xx_sdhci/read_sd", test_read_sd);
428
+ .name = TYPE_IMX7_SRC,
231
+
429
+ .parent = TYPE_SYS_BUS_DEVICE,
232
+ ret = g_test_run();
430
+ .instance_size = sizeof(IMX7SRCState),
233
+ drive_destroy();
431
+ .class_init = imx7_src_class_init,
234
+ return ret;
432
+};
235
+}
433
+
236
diff --git a/tests/qtest/meson.build b/tests/qtest/meson.build
434
+static void imx7_src_register_types(void)
435
+{
436
+ type_register_static(&imx7_src_info);
437
+}
438
+
439
+type_init(imx7_src_register_types)
440
diff --git a/hw/misc/meson.build b/hw/misc/meson.build
237
index XXXXXXX..XXXXXXX 100644
441
index XXXXXXX..XXXXXXX 100644
238
--- a/tests/qtest/meson.build
442
--- a/hw/misc/meson.build
239
+++ b/tests/qtest/meson.build
443
+++ b/hw/misc/meson.build
240
@@ -XXX,XX +XXX,XX @@ qtests_npcm7xx = \
444
@@ -XXX,XX +XXX,XX @@ system_ss.add(when: 'CONFIG_IMX', if_true: files(
241
'npcm7xx_gpio-test',
445
'imx6_src.c',
242
'npcm7xx_pwm-test',
446
'imx6ul_ccm.c',
243
'npcm7xx_rng-test',
447
'imx7_ccm.c',
244
+ 'npcm7xx_sdhci-test',
448
+ 'imx7_src.c',
245
'npcm7xx_smbus-test',
449
'imx7_gpr.c',
246
'npcm7xx_timer-test',
450
'imx7_snvs.c',
247
'npcm7xx_watchdog_timer-test'] + \
451
'imx_ccm.c',
452
diff --git a/hw/misc/trace-events b/hw/misc/trace-events
453
index XXXXXXX..XXXXXXX 100644
454
--- a/hw/misc/trace-events
455
+++ b/hw/misc/trace-events
456
@@ -XXX,XX +XXX,XX @@ ccm_clock_freq(uint32_t clock, uint32_t freq) "(Clock = %d) = %d"
457
ccm_read_reg(const char *reg_name, uint32_t value) "reg[%s] <= 0x%" PRIx32
458
ccm_write_reg(const char *reg_name, uint32_t value) "reg[%s] => 0x%" PRIx32
459
460
+# imx7_src.c
461
+imx7_src_read(const char *reg_name, uint32_t value) "reg[%s] => 0x%" PRIx32
462
+imx7_src_write(const char *reg_name, uint32_t value) "reg[%s] <= 0x%" PRIx32
463
+
464
# iotkit-sysinfo.c
465
iotkit_sysinfo_read(uint64_t offset, uint64_t data, unsigned size) "IoTKit SysInfo read: offset 0x%" PRIx64 " data 0x%" PRIx64 " size %u"
466
iotkit_sysinfo_write(uint64_t offset, uint64_t data, unsigned size) "IoTKit SysInfo write: offset 0x%" PRIx64 " data 0x%" PRIx64 " size %u"
248
--
467
--
249
2.25.1
468
2.34.1
diff view generated by jsdifflib
1
The updateUIInfo method makes Cocoa API calls. It also calls back
1
The architecture requires (R_TYTWB) that an attempt to return from EL3
2
into QEMU functions like dpy_set_ui_info(). To do this safely, we
2
when SCR_EL3.{NSE,NS} are {1,0} is an illegal exception return. (This
3
need to follow two rules:
3
enforces that the CPU can't ever be executing below EL3 with the
4
* Cocoa API calls are made on the Cocoa UI thread
4
NSE,NS bits indicating an invalid security state.)
5
* When calling back into QEMU we must hold the iothread lock
6
5
7
Fix the places where we got this wrong, by taking the iothread lock
6
We were missing this check; add it.
8
while executing updateUIInfo, and moving the call in cocoa_switch()
9
inside the dispatch_async block.
10
11
Some of the Cocoa UI methods which call updateUIInfo are invoked as
12
part of the initial application startup, while we're still doing the
13
little cross-thread dance described in the comment just above
14
call_qemu_main(). This meant they were calling back into the QEMU UI
15
layer before we'd actually finished initializing our display and
16
registered the DisplayChangeListener, which isn't really valid. Once
17
updateUIInfo takes the iothread lock, we no longer get away with
18
this, because during this startup phase the iothread lock is held by
19
the QEMU main-loop thread which is waiting for us to finish our
20
display initialization. So we must suppress updateUIInfo until
21
applicationDidFinishLaunching allows the QEMU main-loop thread to
22
continue.
23
7
24
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
25
Reviewed-by: Akihiko Odaki <akihiko.odaki@gmail.com>
9
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
26
Tested-by: Akihiko Odaki <akihiko.odaki@gmail.com>
10
Message-id: 20230807150618.101357-1-peter.maydell@linaro.org
27
Message-id: 20220224101330.967429-2-peter.maydell@linaro.org
28
---
11
---
29
ui/cocoa.m | 25 ++++++++++++++++++++++---
12
target/arm/tcg/helper-a64.c | 9 +++++++++
30
1 file changed, 22 insertions(+), 3 deletions(-)
13
1 file changed, 9 insertions(+)
31
14
32
diff --git a/ui/cocoa.m b/ui/cocoa.m
15
diff --git a/target/arm/tcg/helper-a64.c b/target/arm/tcg/helper-a64.c
33
index XXXXXXX..XXXXXXX 100644
16
index XXXXXXX..XXXXXXX 100644
34
--- a/ui/cocoa.m
17
--- a/target/arm/tcg/helper-a64.c
35
+++ b/ui/cocoa.m
18
+++ b/target/arm/tcg/helper-a64.c
36
@@ -XXX,XX +XXX,XX @@ QemuCocoaView *cocoaView;
19
@@ -XXX,XX +XXX,XX @@ void HELPER(exception_return)(CPUARMState *env, uint64_t new_pc)
20
spsr &= ~PSTATE_SS;
37
}
21
}
38
}
22
39
23
+ /*
40
-- (void) updateUIInfo
24
+ * FEAT_RME forbids return from EL3 with an invalid security state.
41
+- (void) updateUIInfoLocked
25
+ * We don't need an explicit check for FEAT_RME here because we enforce
42
{
26
+ * in scr_write() that you can't set the NSE bit without it.
43
+ /* Must be called with the iothread lock, i.e. via updateUIInfo */
27
+ */
44
NSSize frameSize;
28
+ if (cur_el == 3 && (env->cp15.scr_el3 & (SCR_NS | SCR_NSE)) == SCR_NSE) {
45
QemuUIInfo info;
29
+ goto illegal_return;
46
47
@@ -XXX,XX +XXX,XX @@ QemuCocoaView *cocoaView;
48
dpy_set_ui_info(dcl.con, &info, TRUE);
49
}
50
51
+- (void) updateUIInfo
52
+{
53
+ if (!allow_events) {
54
+ /*
55
+ * Don't try to tell QEMU about UI information in the application
56
+ * startup phase -- we haven't yet registered dcl with the QEMU UI
57
+ * layer, and also trying to take the iothread lock would deadlock.
58
+ * When cocoa_display_init() does register the dcl, the UI layer
59
+ * will call cocoa_switch(), which will call updateUIInfo, so
60
+ * we don't lose any information here.
61
+ */
62
+ return;
63
+ }
30
+ }
64
+
31
+
65
+ with_iothread_lock(^{
32
new_el = el_from_spsr(spsr);
66
+ [self updateUIInfoLocked];
33
if (new_el == -1) {
67
+ });
34
goto illegal_return;
68
+}
69
+
70
- (void)viewDidMoveToWindow
71
{
72
[self updateUIInfo];
73
@@ -XXX,XX +XXX,XX @@ static void cocoa_switch(DisplayChangeListener *dcl,
74
75
COCOA_DEBUG("qemu_cocoa: cocoa_switch\n");
76
77
- [cocoaView updateUIInfo];
78
-
79
// The DisplaySurface will be freed as soon as this callback returns.
80
// We take a reference to the underlying pixman image here so it does
81
// not disappear from under our feet; the switchSurface method will
82
@@ -XXX,XX +XXX,XX @@ static void cocoa_switch(DisplayChangeListener *dcl,
83
pixman_image_ref(image);
84
85
dispatch_async(dispatch_get_main_queue(), ^{
86
+ [cocoaView updateUIInfo];
87
[cocoaView switchSurface:image];
88
});
89
[pool release];
90
--
35
--
91
2.25.1
36
2.34.1
diff view generated by jsdifflib
1
The AN547 application note URL has changed: update our comment
1
In the m48t59 device we almost always use 64-bit arithmetic when
2
accordingly. (Rev B is still downloadable from the old URL,
2
dealing with time_t deltas. The one exception is in set_alarm(),
3
but there is a new Rev C of the document now.)
3
which currently uses a plain 'int' to hold the difference between two
4
time_t values. Switch to int64_t instead to avoid any possible
5
overflow issues.
4
6
5
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
6
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
8
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
7
Tested-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
8
Message-id: 20220221094144.426191-1-peter.maydell@linaro.org
9
---
9
---
10
hw/arm/mps2-tz.c | 2 +-
10
hw/rtc/m48t59.c | 2 +-
11
1 file changed, 1 insertion(+), 1 deletion(-)
11
1 file changed, 1 insertion(+), 1 deletion(-)
12
12
13
diff --git a/hw/arm/mps2-tz.c b/hw/arm/mps2-tz.c
13
diff --git a/hw/rtc/m48t59.c b/hw/rtc/m48t59.c
14
index XXXXXXX..XXXXXXX 100644
14
index XXXXXXX..XXXXXXX 100644
15
--- a/hw/arm/mps2-tz.c
15
--- a/hw/rtc/m48t59.c
16
+++ b/hw/arm/mps2-tz.c
16
+++ b/hw/rtc/m48t59.c
17
@@ -XXX,XX +XXX,XX @@
17
@@ -XXX,XX +XXX,XX @@ static void alarm_cb (void *opaque)
18
* Application Note AN524:
18
19
* https://developer.arm.com/documentation/dai0524/latest/
19
static void set_alarm(M48t59State *NVRAM)
20
* Application Note AN547:
20
{
21
- * https://developer.arm.com/-/media/Arm%20Developer%20Community/PDF/DAI0547B_SSE300_PLUS_U55_FPGA_for_mps3.pdf
21
- int diff;
22
+ * https://developer.arm.com/documentation/dai0547/latest/
22
+ int64_t diff;
23
*
23
if (NVRAM->alrm_timer != NULL) {
24
* The AN505 defers to the Cortex-M33 processor ARMv8M IoT Kit FVP User Guide
24
timer_del(NVRAM->alrm_timer);
25
* (ARM ECM0601256) for the details of some of the device layout:
25
diff = qemu_timedate_diff(&NVRAM->alarm) - NVRAM->time_offset;
26
--
26
--
27
2.25.1
27
2.34.1
28
28
29
29
diff view generated by jsdifflib
1
From: Richard Henderson <richard.henderson@linaro.org>
1
In the twl92230 device, use int64_t for the two state fields
2
sec_offset and alm_sec, because we set these to values that
3
are either time_t or differences between two time_t values.
2
4
3
The macro is a bit more readable than the inlined computation.
5
These fields aren't saved in vmstate anywhere, so we can
6
safely widen them.
4
7
5
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 20220301215958.157011-7-richard.henderson@linaro.org
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
8
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
9
---
10
---
10
target/arm/helper.c | 4 ++--
11
hw/rtc/twl92230.c | 4 ++--
11
1 file changed, 2 insertions(+), 2 deletions(-)
12
1 file changed, 2 insertions(+), 2 deletions(-)
12
13
13
diff --git a/target/arm/helper.c b/target/arm/helper.c
14
diff --git a/hw/rtc/twl92230.c b/hw/rtc/twl92230.c
14
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
15
--- a/target/arm/helper.c
16
--- a/hw/rtc/twl92230.c
16
+++ b/target/arm/helper.c
17
+++ b/hw/rtc/twl92230.c
17
@@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, uint64_t address,
18
@@ -XXX,XX +XXX,XX @@ struct MenelausState {
18
level = startlevel;
19
struct tm tm;
19
}
20
struct tm new;
20
21
struct tm alm;
21
- indexmask_grainsize = (1ULL << (stride + 3)) - 1;
22
- int sec_offset;
22
- indexmask = (1ULL << (inputsize - (stride * (4 - level)))) - 1;
23
- int alm_sec;
23
+ indexmask_grainsize = MAKE_64BIT_MASK(0, stride + 3);
24
+ int64_t sec_offset;
24
+ indexmask = MAKE_64BIT_MASK(0, inputsize - (stride * (4 - level)));
25
+ int64_t alm_sec;
25
26
int next_comp;
26
/* Now we can extract the actual base address from the TTBR */
27
} rtc;
27
descaddr = extract64(ttbr, 0, 48);
28
uint16_t rtc_next_vmstate;
28
--
29
--
29
2.25.1
30
2.34.1
30
31
31
32
diff view generated by jsdifflib
1
The tsc210x doesn't support anything other than 16-bit reads on the
1
In the aspeed_rtc device we store a difference between two time_t
2
SPI bus, but the guest can program the SPI controller to attempt
2
values in an 'int'. This is not really correct when time_t could
3
them anyway. If this happens, don't abort QEMU, just log this as
3
be 64 bits. Enlarge the field to 'int64_t'.
4
a guest error.
5
4
6
This fixes our machine_arm_n8x0.py:N8x0Machine.test_n800
5
This is a migration compatibility break for the aspeed boards.
7
acceptance test, which hits this assertion.
6
While we are changing the vmstate, remove the accidental
7
duplicate of the offset field.
8
8
9
The reason we hit the assertion is because the guest kernel thinks
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
10
there is a TSC2005 on this SPI bus address, not a TSC210x. (The n810
10
Reviewed-by: Cédric Le Goater <clg@kaod.org>
11
*does* have a TSC2005 at this address.) The TSC2005 supports the
11
---
12
24-bit accesses which the guest driver makes, and the TSC210x does
12
include/hw/rtc/aspeed_rtc.h | 2 +-
13
not (that is, our TSC210x emulation is not missing support for a word
13
hw/rtc/aspeed_rtc.c | 5 ++---
14
width the hardware can handle). It's not clear whether the problem
14
2 files changed, 3 insertions(+), 4 deletions(-)
15
here is that the guest kernel incorrectly thinks the n800 has the
16
same device at this SPI bus address as the n810, or that QEMU's n810
17
board model doesn't get the SPI devices right. At this late date
18
there no longer appears to be any reliable information on the web
19
about the hardware behaviour, but I am inclined to think this is a
20
guest kernel bug. In any case, we prefer not to abort QEMU for
21
guest-triggerable conditions, so logging the error is the right thing
22
to do.
23
15
24
Resolves: https://gitlab.com/qemu-project/qemu/-/issues/736
16
diff --git a/include/hw/rtc/aspeed_rtc.h b/include/hw/rtc/aspeed_rtc.h
25
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
26
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
27
Message-id: 20220221140750.514557-1-peter.maydell@linaro.org
28
---
29
hw/input/tsc210x.c | 8 ++++++--
30
1 file changed, 6 insertions(+), 2 deletions(-)
31
32
diff --git a/hw/input/tsc210x.c b/hw/input/tsc210x.c
33
index XXXXXXX..XXXXXXX 100644
17
index XXXXXXX..XXXXXXX 100644
34
--- a/hw/input/tsc210x.c
18
--- a/include/hw/rtc/aspeed_rtc.h
35
+++ b/hw/input/tsc210x.c
19
+++ b/include/hw/rtc/aspeed_rtc.h
36
@@ -XXX,XX +XXX,XX @@
20
@@ -XXX,XX +XXX,XX @@ struct AspeedRtcState {
37
#include "hw/hw.h"
21
qemu_irq irq;
38
#include "audio/audio.h"
22
39
#include "qemu/timer.h"
23
uint32_t reg[0x18];
40
+#include "qemu/log.h"
24
- int offset;
41
#include "sysemu/reset.h"
25
+ int64_t offset;
42
#include "ui/console.h"
26
43
#include "hw/arm/omap.h" /* For I2SCodec */
27
};
44
@@ -XXX,XX +XXX,XX @@ uint32_t tsc210x_txrx(void *opaque, uint32_t value, int len)
28
45
TSC210xState *s = opaque;
29
diff --git a/hw/rtc/aspeed_rtc.c b/hw/rtc/aspeed_rtc.c
46
uint32_t ret = 0;
30
index XXXXXXX..XXXXXXX 100644
47
31
--- a/hw/rtc/aspeed_rtc.c
48
- if (len != 16)
32
+++ b/hw/rtc/aspeed_rtc.c
49
- hw_error("%s: FIXME: bad SPI word width %i\n", __func__, len);
33
@@ -XXX,XX +XXX,XX @@ static const MemoryRegionOps aspeed_rtc_ops = {
50
+ if (len != 16) {
34
51
+ qemu_log_mask(LOG_GUEST_ERROR,
35
static const VMStateDescription vmstate_aspeed_rtc = {
52
+ "%s: bad SPI word width %i\n", __func__, len);
36
.name = TYPE_ASPEED_RTC,
53
+ return 0;
37
- .version_id = 1,
54
+ }
38
+ .version_id = 2,
55
39
.fields = (VMStateField[]) {
56
/* TODO: sequential reads etc - how do we make sure the host doesn't
40
VMSTATE_UINT32_ARRAY(reg, AspeedRtcState, 0x18),
57
* unintentionally read out a conversion result from a register while
41
- VMSTATE_INT32(offset, AspeedRtcState),
42
- VMSTATE_INT32(offset, AspeedRtcState),
43
+ VMSTATE_INT64(offset, AspeedRtcState),
44
VMSTATE_END_OF_LIST()
45
}
46
};
58
--
47
--
59
2.25.1
48
2.34.1
60
49
61
50
diff view generated by jsdifflib
1
From: Patrick Venture <venture@google.com>
1
The functions qemu_get_timedate() and qemu_timedate_diff() take
2
and return a time offset as an integer. Coverity points out that
3
means that when an RTC device implementation holds an offset
4
as a time_t, as the m48t59 does, the time_t will get truncated.
5
(CID 1507157, 1517772).
2
6
3
Previously this device created N subdevices which each owned an i2c bus.
7
The functions work with time_t internally, so make them use that type
4
Now this device simply owns the N i2c busses directly.
8
in their APIs.
5
9
6
Tested: Verified devices behind mux are still accessible via qmp and i2c
10
Note that this won't help any Y2038 issues where either the device
7
from within an arm32 SoC.
11
model itself is keeping the offset in a 32-bit integer, or where the
12
hardware under emulation has Y2038 or other rollover problems. If we
13
missed any cases of the former then hopefully Coverity will warn us
14
about them since after this patch we'd be truncating a time_t in
15
assignments from qemu_timedate_diff().)
8
16
9
Reviewed-by: Hao Wu <wuhaotsh@google.com>
10
Signed-off-by: Patrick Venture <venture@google.com>
11
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
12
Tested-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
13
Message-id: 20220202164533.1283668-1-venture@google.com
14
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
18
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
15
---
19
---
16
hw/i2c/i2c_mux_pca954x.c | 77 +++++++---------------------------------
20
include/sysemu/rtc.h | 4 ++--
17
1 file changed, 13 insertions(+), 64 deletions(-)
21
softmmu/rtc.c | 4 ++--
22
2 files changed, 4 insertions(+), 4 deletions(-)
18
23
19
diff --git a/hw/i2c/i2c_mux_pca954x.c b/hw/i2c/i2c_mux_pca954x.c
24
diff --git a/include/sysemu/rtc.h b/include/sysemu/rtc.h
20
index XXXXXXX..XXXXXXX 100644
25
index XXXXXXX..XXXXXXX 100644
21
--- a/hw/i2c/i2c_mux_pca954x.c
26
--- a/include/sysemu/rtc.h
22
+++ b/hw/i2c/i2c_mux_pca954x.c
27
+++ b/include/sysemu/rtc.h
23
@@ -XXX,XX +XXX,XX @@
28
@@ -XXX,XX +XXX,XX @@
24
#define PCA9548_CHANNEL_COUNT 8
29
* The behaviour of the clock whose value this function returns will
25
#define PCA9546_CHANNEL_COUNT 4
30
* depend on the -rtc command line option passed by the user.
26
31
*/
27
-/*
32
-void qemu_get_timedate(struct tm *tm, int offset);
28
- * struct Pca954xChannel - The i2c mux device will have N of these states
33
+void qemu_get_timedate(struct tm *tm, time_t offset);
29
- * that own the i2c channel bus.
34
30
- * @bus: The owned channel bus.
35
/**
31
- * @enabled: Is this channel active?
36
* qemu_timedate_diff: Return difference between a struct tm and the RTC
32
- */
37
@@ -XXX,XX +XXX,XX @@ void qemu_get_timedate(struct tm *tm, int offset);
33
-typedef struct Pca954xChannel {
38
* a timestamp one hour further ahead than the current RTC time
34
- SysBusDevice parent;
39
* then this function will return 3600.
35
-
40
*/
36
- I2CBus *bus;
41
-int qemu_timedate_diff(struct tm *tm);
37
-
42
+time_t qemu_timedate_diff(struct tm *tm);
38
- bool enabled;
43
39
-} Pca954xChannel;
44
#endif
40
-
45
diff --git a/softmmu/rtc.c b/softmmu/rtc.c
41
-#define TYPE_PCA954X_CHANNEL "pca954x-channel"
46
index XXXXXXX..XXXXXXX 100644
42
-#define PCA954X_CHANNEL(obj) \
47
--- a/softmmu/rtc.c
43
- OBJECT_CHECK(Pca954xChannel, (obj), TYPE_PCA954X_CHANNEL)
48
+++ b/softmmu/rtc.c
44
-
49
@@ -XXX,XX +XXX,XX @@ static time_t qemu_ref_timedate(QEMUClockType clock)
45
/*
50
return value;
46
* struct Pca954xState - The pca954x state object.
51
}
47
* @control: The value written to the mux control.
52
48
@@ -XXX,XX +XXX,XX @@ typedef struct Pca954xState {
53
-void qemu_get_timedate(struct tm *tm, int offset)
49
54
+void qemu_get_timedate(struct tm *tm, time_t offset)
50
uint8_t control;
55
{
51
56
time_t ti = qemu_ref_timedate(rtc_clock);
52
- /* The channel i2c buses. */
57
53
- Pca954xChannel channel[PCA9548_CHANNEL_COUNT];
58
@@ -XXX,XX +XXX,XX @@ void qemu_get_timedate(struct tm *tm, int offset)
54
+ bool enabled[PCA9548_CHANNEL_COUNT];
55
+ I2CBus *bus[PCA9548_CHANNEL_COUNT];
56
} Pca954xState;
57
58
/*
59
@@ -XXX,XX +XXX,XX @@ static bool pca954x_match(I2CSlave *candidate, uint8_t address,
60
}
61
62
for (i = 0; i < mc->nchans; i++) {
63
- if (!mux->channel[i].enabled) {
64
+ if (!mux->enabled[i]) {
65
continue;
66
}
67
68
- if (i2c_scan_bus(mux->channel[i].bus, address, broadcast,
69
+ if (i2c_scan_bus(mux->bus[i], address, broadcast,
70
current_devs)) {
71
if (!broadcast) {
72
return true;
73
@@ -XXX,XX +XXX,XX @@ static void pca954x_enable_channel(Pca954xState *s, uint8_t enable_mask)
74
*/
75
for (i = 0; i < mc->nchans; i++) {
76
if (enable_mask & (1 << i)) {
77
- s->channel[i].enabled = true;
78
+ s->enabled[i] = true;
79
} else {
80
- s->channel[i].enabled = false;
81
+ s->enabled[i] = false;
82
}
83
}
59
}
84
}
60
}
85
@@ -XXX,XX +XXX,XX @@ I2CBus *pca954x_i2c_get_bus(I2CSlave *mux, uint8_t channel)
61
86
Pca954xState *pca954x = PCA954X(mux);
62
-int qemu_timedate_diff(struct tm *tm)
87
63
+time_t qemu_timedate_diff(struct tm *tm)
88
g_assert(channel < pc->nchans);
89
- return I2C_BUS(qdev_get_child_bus(DEVICE(&pca954x->channel[channel]),
90
- "i2c-bus"));
91
-}
92
-
93
-static void pca954x_channel_init(Object *obj)
94
-{
95
- Pca954xChannel *s = PCA954X_CHANNEL(obj);
96
- s->bus = i2c_init_bus(DEVICE(s), "i2c-bus");
97
-
98
- /* Start all channels as disabled. */
99
- s->enabled = false;
100
-}
101
-
102
-static void pca954x_channel_class_init(ObjectClass *klass, void *data)
103
-{
104
- DeviceClass *dc = DEVICE_CLASS(klass);
105
- dc->desc = "Pca954x Channel";
106
+ return pca954x->bus[channel];
107
}
108
109
static void pca9546_class_init(ObjectClass *klass, void *data)
110
@@ -XXX,XX +XXX,XX @@ static void pca9548_class_init(ObjectClass *klass, void *data)
111
s->nchans = PCA9548_CHANNEL_COUNT;
112
}
113
114
-static void pca954x_realize(DeviceState *dev, Error **errp)
115
-{
116
- Pca954xState *s = PCA954X(dev);
117
- Pca954xClass *c = PCA954X_GET_CLASS(s);
118
- int i;
119
-
120
- /* SMBus modules. Cannot fail. */
121
- for (i = 0; i < c->nchans; i++) {
122
- sysbus_realize(SYS_BUS_DEVICE(&s->channel[i]), &error_abort);
123
- }
124
-}
125
-
126
static void pca954x_init(Object *obj)
127
{
64
{
128
Pca954xState *s = PCA954X(obj);
65
time_t seconds;
129
Pca954xClass *c = PCA954X_GET_CLASS(obj);
66
130
int i;
131
132
- /* Only initialize the children we expect. */
133
+ /* SMBus modules. Cannot fail. */
134
for (i = 0; i < c->nchans; i++) {
135
- object_initialize_child(obj, "channel[*]", &s->channel[i],
136
- TYPE_PCA954X_CHANNEL);
137
+ g_autofree gchar *bus_name = g_strdup_printf("i2c.%d", i);
138
+
139
+ /* start all channels as disabled. */
140
+ s->enabled[i] = false;
141
+ s->bus[i] = i2c_init_bus(DEVICE(s), bus_name);
142
}
143
}
144
145
@@ -XXX,XX +XXX,XX @@ static void pca954x_class_init(ObjectClass *klass, void *data)
146
rc->phases.enter = pca954x_enter_reset;
147
148
dc->desc = "Pca954x i2c-mux";
149
- dc->realize = pca954x_realize;
150
151
k->write_data = pca954x_write_data;
152
k->receive_byte = pca954x_read_byte;
153
@@ -XXX,XX +XXX,XX @@ static const TypeInfo pca954x_info[] = {
154
.parent = TYPE_PCA954X,
155
.class_init = pca9548_class_init,
156
},
157
- {
158
- .name = TYPE_PCA954X_CHANNEL,
159
- .parent = TYPE_SYS_BUS_DEVICE,
160
- .class_init = pca954x_channel_class_init,
161
- .instance_size = sizeof(Pca954xChannel),
162
- .instance_init = pca954x_channel_init,
163
- }
164
};
165
166
DEFINE_TYPES(pca954x_info)
167
--
67
--
168
2.25.1
68
2.34.1
169
69
170
70
diff view generated by jsdifflib
1
From: Akihiko Odaki <akihiko.odaki@gmail.com>
1
Where architecturally one ARM_FEATURE_X flag implies another
2
2
ARM_FEATURE_Y, we allow the CPU init function to only set X, and then
3
Support the latest PSCI on TCG and HVF. A 64-bit function called from
3
set Y for it. Currently we do this in two places -- we set a few
4
AArch32 now returns NOT_SUPPORTED, which is necessary to adhere to SMC
4
flags in arm_cpu_post_init() because we need them to decide which
5
Calling Convention 1.0. It is still not compliant with SMCCC 1.3 since
5
properties to create on the CPU object, and then we do the rest in
6
they do not implement mandatory functions.
6
arm_cpu_realizefn(). However, this is fragile, because it's easy to
7
7
add a new property and not notice that this means that an X-implies-Y
8
Signed-off-by: Akihiko Odaki <akihiko.odaki@gmail.com>
8
check now has to move from realize to post-init.
9
Message-id: 20220213035753.34577-1-akihiko.odaki@gmail.com
9
10
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
10
As a specific example, the pmsav7-dregion property is conditional
11
[PMM: update MISMATCH_CHECK checks on PSCI_VERSION macros to match]
11
on ARM_FEATURE_PMSA && ARM_FEATURE_V7, which means it won't appear
12
on the Cortex-M33 and -M55, because they set ARM_FEATURE_V8 and
13
rely on V8-implies-V7, which doesn't happen until the realizefn.
14
15
Move all of these X-implies-Y checks into a new function, which
16
we call at the top of arm_cpu_post_init(), so the feature bits
17
are available at that point.
18
19
This does now give us the reverse issue, that if there's a feature
20
bit which is enabled or disabled by the setting of a property then
21
then X-implies-Y features that are dependent on that property need to
22
be in realize, not in this new function. But the only one of those
23
is the "EL3 implies VBAR" which is already in the right place, so
24
putting things this way round seems better to me.
25
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
26
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
27
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
28
Message-id: 20230724174335.2150499-2-peter.maydell@linaro.org
13
---
29
---
14
target/arm/kvm-consts.h | 13 +++++++++----
30
target/arm/cpu.c | 179 +++++++++++++++++++++++++----------------------
15
hw/arm/boot.c | 12 +++++++++---
31
1 file changed, 97 insertions(+), 82 deletions(-)
16
target/arm/cpu.c | 5 +++--
32
17
target/arm/hvf/hvf.c | 27 ++++++++++++++++++++++++++-
18
target/arm/kvm64.c | 2 +-
19
target/arm/psci.c | 35 ++++++++++++++++++++++++++++++++---
20
6 files changed, 80 insertions(+), 14 deletions(-)
21
22
diff --git a/target/arm/kvm-consts.h b/target/arm/kvm-consts.h
23
index XXXXXXX..XXXXXXX 100644
24
--- a/target/arm/kvm-consts.h
25
+++ b/target/arm/kvm-consts.h
26
@@ -XXX,XX +XXX,XX @@ MISMATCH_CHECK(QEMU_PSCI_0_1_FN_MIGRATE, KVM_PSCI_FN_MIGRATE);
27
#define QEMU_PSCI_0_2_FN64_AFFINITY_INFO QEMU_PSCI_0_2_FN64(4)
28
#define QEMU_PSCI_0_2_FN64_MIGRATE QEMU_PSCI_0_2_FN64(5)
29
30
+#define QEMU_PSCI_1_0_FN_PSCI_FEATURES QEMU_PSCI_0_2_FN(10)
31
+
32
MISMATCH_CHECK(QEMU_PSCI_0_2_FN_CPU_SUSPEND, PSCI_0_2_FN_CPU_SUSPEND);
33
MISMATCH_CHECK(QEMU_PSCI_0_2_FN_CPU_OFF, PSCI_0_2_FN_CPU_OFF);
34
MISMATCH_CHECK(QEMU_PSCI_0_2_FN_CPU_ON, PSCI_0_2_FN_CPU_ON);
35
@@ -XXX,XX +XXX,XX @@ MISMATCH_CHECK(QEMU_PSCI_0_2_FN_MIGRATE, PSCI_0_2_FN_MIGRATE);
36
MISMATCH_CHECK(QEMU_PSCI_0_2_FN64_CPU_SUSPEND, PSCI_0_2_FN64_CPU_SUSPEND);
37
MISMATCH_CHECK(QEMU_PSCI_0_2_FN64_CPU_ON, PSCI_0_2_FN64_CPU_ON);
38
MISMATCH_CHECK(QEMU_PSCI_0_2_FN64_MIGRATE, PSCI_0_2_FN64_MIGRATE);
39
+MISMATCH_CHECK(QEMU_PSCI_1_0_FN_PSCI_FEATURES, PSCI_1_0_FN_PSCI_FEATURES);
40
41
/* PSCI v0.2 return values used by TCG emulation of PSCI */
42
43
/* No Trusted OS migration to worry about when offlining CPUs */
44
#define QEMU_PSCI_0_2_RET_TOS_MIGRATION_NOT_REQUIRED 2
45
46
-/* We implement version 0.2 only */
47
-#define QEMU_PSCI_0_2_RET_VERSION_0_2 2
48
+#define QEMU_PSCI_VERSION_0_1 0x00001
49
+#define QEMU_PSCI_VERSION_0_2 0x00002
50
+#define QEMU_PSCI_VERSION_1_1 0x10001
51
52
MISMATCH_CHECK(QEMU_PSCI_0_2_RET_TOS_MIGRATION_NOT_REQUIRED, PSCI_0_2_TOS_MP);
53
-MISMATCH_CHECK(QEMU_PSCI_0_2_RET_VERSION_0_2,
54
- (PSCI_VERSION_MAJOR(0) | PSCI_VERSION_MINOR(2)));
55
+/* We don't bother to check every possible version value */
56
+MISMATCH_CHECK(QEMU_PSCI_VERSION_0_2, PSCI_VERSION(0, 2));
57
+MISMATCH_CHECK(QEMU_PSCI_VERSION_1_1, PSCI_VERSION(1, 1));
58
59
/* PSCI return values (inclusive of all PSCI versions) */
60
#define QEMU_PSCI_RET_SUCCESS 0
61
diff --git a/hw/arm/boot.c b/hw/arm/boot.c
62
index XXXXXXX..XXXXXXX 100644
63
--- a/hw/arm/boot.c
64
+++ b/hw/arm/boot.c
65
@@ -XXX,XX +XXX,XX @@ static void fdt_add_psci_node(void *fdt)
66
}
67
68
qemu_fdt_add_subnode(fdt, "/psci");
69
- if (armcpu->psci_version == 2) {
70
- const char comp[] = "arm,psci-0.2\0arm,psci";
71
- qemu_fdt_setprop(fdt, "/psci", "compatible", comp, sizeof(comp));
72
+ if (armcpu->psci_version == QEMU_PSCI_VERSION_0_2 ||
73
+ armcpu->psci_version == QEMU_PSCI_VERSION_1_1) {
74
+ if (armcpu->psci_version == QEMU_PSCI_VERSION_0_2) {
75
+ const char comp[] = "arm,psci-0.2\0arm,psci";
76
+ qemu_fdt_setprop(fdt, "/psci", "compatible", comp, sizeof(comp));
77
+ } else {
78
+ const char comp[] = "arm,psci-1.0\0arm,psci-0.2\0arm,psci";
79
+ qemu_fdt_setprop(fdt, "/psci", "compatible", comp, sizeof(comp));
80
+ }
81
82
cpu_off_fn = QEMU_PSCI_0_2_FN_CPU_OFF;
83
if (arm_feature(&armcpu->env, ARM_FEATURE_AARCH64)) {
84
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
33
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
85
index XXXXXXX..XXXXXXX 100644
34
index XXXXXXX..XXXXXXX 100644
86
--- a/target/arm/cpu.c
35
--- a/target/arm/cpu.c
87
+++ b/target/arm/cpu.c
36
+++ b/target/arm/cpu.c
88
@@ -XXX,XX +XXX,XX @@ static void arm_cpu_initfn(Object *obj)
37
@@ -XXX,XX +XXX,XX @@ unsigned int gt_cntfrq_period_ns(ARMCPU *cpu)
89
* picky DTB consumer will also provide a helpful error message.
38
NANOSECONDS_PER_SECOND / cpu->gt_cntfrq_hz : 1;
39
}
40
41
+static void arm_cpu_propagate_feature_implications(ARMCPU *cpu)
42
+{
43
+ CPUARMState *env = &cpu->env;
44
+ bool no_aa32 = false;
45
+
46
+ /*
47
+ * Some features automatically imply others: set the feature
48
+ * bits explicitly for these cases.
49
+ */
50
+
51
+ if (arm_feature(env, ARM_FEATURE_M)) {
52
+ set_feature(env, ARM_FEATURE_PMSA);
53
+ }
54
+
55
+ if (arm_feature(env, ARM_FEATURE_V8)) {
56
+ if (arm_feature(env, ARM_FEATURE_M)) {
57
+ set_feature(env, ARM_FEATURE_V7);
58
+ } else {
59
+ set_feature(env, ARM_FEATURE_V7VE);
60
+ }
61
+ }
62
+
63
+ /*
64
+ * There exist AArch64 cpus without AArch32 support. When KVM
65
+ * queries ID_ISAR0_EL1 on such a host, the value is UNKNOWN.
66
+ * Similarly, we cannot check ID_AA64PFR0 without AArch64 support.
67
+ * As a general principle, we also do not make ID register
68
+ * consistency checks anywhere unless using TCG, because only
69
+ * for TCG would a consistency-check failure be a QEMU bug.
70
+ */
71
+ if (arm_feature(&cpu->env, ARM_FEATURE_AARCH64)) {
72
+ no_aa32 = !cpu_isar_feature(aa64_aa32, cpu);
73
+ }
74
+
75
+ if (arm_feature(env, ARM_FEATURE_V7VE)) {
76
+ /*
77
+ * v7 Virtualization Extensions. In real hardware this implies
78
+ * EL2 and also the presence of the Security Extensions.
79
+ * For QEMU, for backwards-compatibility we implement some
80
+ * CPUs or CPU configs which have no actual EL2 or EL3 but do
81
+ * include the various other features that V7VE implies.
82
+ * Presence of EL2 itself is ARM_FEATURE_EL2, and of the
83
+ * Security Extensions is ARM_FEATURE_EL3.
84
+ */
85
+ assert(!tcg_enabled() || no_aa32 ||
86
+ cpu_isar_feature(aa32_arm_div, cpu));
87
+ set_feature(env, ARM_FEATURE_LPAE);
88
+ set_feature(env, ARM_FEATURE_V7);
89
+ }
90
+ if (arm_feature(env, ARM_FEATURE_V7)) {
91
+ set_feature(env, ARM_FEATURE_VAPA);
92
+ set_feature(env, ARM_FEATURE_THUMB2);
93
+ set_feature(env, ARM_FEATURE_MPIDR);
94
+ if (!arm_feature(env, ARM_FEATURE_M)) {
95
+ set_feature(env, ARM_FEATURE_V6K);
96
+ } else {
97
+ set_feature(env, ARM_FEATURE_V6);
98
+ }
99
+
100
+ /*
101
+ * Always define VBAR for V7 CPUs even if it doesn't exist in
102
+ * non-EL3 configs. This is needed by some legacy boards.
103
+ */
104
+ set_feature(env, ARM_FEATURE_VBAR);
105
+ }
106
+ if (arm_feature(env, ARM_FEATURE_V6K)) {
107
+ set_feature(env, ARM_FEATURE_V6);
108
+ set_feature(env, ARM_FEATURE_MVFR);
109
+ }
110
+ if (arm_feature(env, ARM_FEATURE_V6)) {
111
+ set_feature(env, ARM_FEATURE_V5);
112
+ if (!arm_feature(env, ARM_FEATURE_M)) {
113
+ assert(!tcg_enabled() || no_aa32 ||
114
+ cpu_isar_feature(aa32_jazelle, cpu));
115
+ set_feature(env, ARM_FEATURE_AUXCR);
116
+ }
117
+ }
118
+ if (arm_feature(env, ARM_FEATURE_V5)) {
119
+ set_feature(env, ARM_FEATURE_V4T);
120
+ }
121
+ if (arm_feature(env, ARM_FEATURE_LPAE)) {
122
+ set_feature(env, ARM_FEATURE_V7MP);
123
+ }
124
+ if (arm_feature(env, ARM_FEATURE_CBAR_RO)) {
125
+ set_feature(env, ARM_FEATURE_CBAR);
126
+ }
127
+ if (arm_feature(env, ARM_FEATURE_THUMB2) &&
128
+ !arm_feature(env, ARM_FEATURE_M)) {
129
+ set_feature(env, ARM_FEATURE_THUMB_DSP);
130
+ }
131
+}
132
+
133
void arm_cpu_post_init(Object *obj)
134
{
135
ARMCPU *cpu = ARM_CPU(obj);
136
137
- /* M profile implies PMSA. We have to do this here rather than
138
- * in realize with the other feature-implication checks because
139
- * we look at the PMSA bit to see if we should add some properties.
140
+ /*
141
+ * Some features imply others. Figure this out now, because we
142
+ * are going to look at the feature bits in deciding which
143
+ * properties to add.
90
*/
144
*/
91
cpu->dtb_compatible = "qemu,unknown";
145
- if (arm_feature(&cpu->env, ARM_FEATURE_M)) {
92
- cpu->psci_version = 1; /* By default assume PSCI v0.1 */
146
- set_feature(&cpu->env, ARM_FEATURE_PMSA);
93
+ cpu->psci_version = QEMU_PSCI_VERSION_0_1; /* By default assume PSCI v0.1 */
147
- }
94
cpu->kvm_target = QEMU_KVM_ARM_TARGET_NONE;
148
+ arm_cpu_propagate_feature_implications(cpu);
95
149
96
if (tcg_enabled() || hvf_enabled()) {
150
if (arm_feature(&cpu->env, ARM_FEATURE_CBAR) ||
97
- cpu->psci_version = 2; /* TCG and HVF implement PSCI 0.2 */
151
arm_feature(&cpu->env, ARM_FEATURE_CBAR_RO)) {
98
+ /* TCG and HVF implement PSCI 1.1 */
152
@@ -XXX,XX +XXX,XX @@ static void arm_cpu_realizefn(DeviceState *dev, Error **errp)
99
+ cpu->psci_version = QEMU_PSCI_VERSION_1_1;
153
CPUARMState *env = &cpu->env;
154
int pagebits;
155
Error *local_err = NULL;
156
- bool no_aa32 = false;
157
158
/* Use pc-relative instructions in system-mode */
159
#ifndef CONFIG_USER_ONLY
160
@@ -XXX,XX +XXX,XX @@ static void arm_cpu_realizefn(DeviceState *dev, Error **errp)
161
cpu->isar.id_isar3 = u;
100
}
162
}
101
}
163
102
164
- /* Some features automatically imply others: */
103
diff --git a/target/arm/hvf/hvf.c b/target/arm/hvf/hvf.c
165
- if (arm_feature(env, ARM_FEATURE_V8)) {
104
index XXXXXXX..XXXXXXX 100644
166
- if (arm_feature(env, ARM_FEATURE_M)) {
105
--- a/target/arm/hvf/hvf.c
167
- set_feature(env, ARM_FEATURE_V7);
106
+++ b/target/arm/hvf/hvf.c
168
- } else {
107
@@ -XXX,XX +XXX,XX @@ static bool hvf_handle_psci_call(CPUState *cpu)
169
- set_feature(env, ARM_FEATURE_V7VE);
108
170
- }
109
switch (param[0]) {
171
- }
110
case QEMU_PSCI_0_2_FN_PSCI_VERSION:
172
-
111
- ret = QEMU_PSCI_0_2_RET_VERSION_0_2;
173
- /*
112
+ ret = QEMU_PSCI_VERSION_1_1;
174
- * There exist AArch64 cpus without AArch32 support. When KVM
113
break;
175
- * queries ID_ISAR0_EL1 on such a host, the value is UNKNOWN.
114
case QEMU_PSCI_0_2_FN_MIGRATE_INFO_TYPE:
176
- * Similarly, we cannot check ID_AA64PFR0 without AArch64 support.
115
ret = QEMU_PSCI_0_2_RET_TOS_MIGRATION_NOT_REQUIRED; /* No trusted OS */
177
- * As a general principle, we also do not make ID register
116
@@ -XXX,XX +XXX,XX @@ static bool hvf_handle_psci_call(CPUState *cpu)
178
- * consistency checks anywhere unless using TCG, because only
117
case QEMU_PSCI_0_2_FN_MIGRATE:
179
- * for TCG would a consistency-check failure be a QEMU bug.
118
ret = QEMU_PSCI_RET_NOT_SUPPORTED;
180
- */
119
break;
181
- if (arm_feature(&cpu->env, ARM_FEATURE_AARCH64)) {
120
+ case QEMU_PSCI_1_0_FN_PSCI_FEATURES:
182
- no_aa32 = !cpu_isar_feature(aa64_aa32, cpu);
121
+ switch (param[1]) {
183
- }
122
+ case QEMU_PSCI_0_2_FN_PSCI_VERSION:
184
-
123
+ case QEMU_PSCI_0_2_FN_MIGRATE_INFO_TYPE:
185
- if (arm_feature(env, ARM_FEATURE_V7VE)) {
124
+ case QEMU_PSCI_0_2_FN_AFFINITY_INFO:
186
- /* v7 Virtualization Extensions. In real hardware this implies
125
+ case QEMU_PSCI_0_2_FN64_AFFINITY_INFO:
187
- * EL2 and also the presence of the Security Extensions.
126
+ case QEMU_PSCI_0_2_FN_SYSTEM_RESET:
188
- * For QEMU, for backwards-compatibility we implement some
127
+ case QEMU_PSCI_0_2_FN_SYSTEM_OFF:
189
- * CPUs or CPU configs which have no actual EL2 or EL3 but do
128
+ case QEMU_PSCI_0_1_FN_CPU_ON:
190
- * include the various other features that V7VE implies.
129
+ case QEMU_PSCI_0_2_FN_CPU_ON:
191
- * Presence of EL2 itself is ARM_FEATURE_EL2, and of the
130
+ case QEMU_PSCI_0_2_FN64_CPU_ON:
192
- * Security Extensions is ARM_FEATURE_EL3.
131
+ case QEMU_PSCI_0_1_FN_CPU_OFF:
193
- */
132
+ case QEMU_PSCI_0_2_FN_CPU_OFF:
194
- assert(!tcg_enabled() || no_aa32 ||
133
+ case QEMU_PSCI_0_1_FN_CPU_SUSPEND:
195
- cpu_isar_feature(aa32_arm_div, cpu));
134
+ case QEMU_PSCI_0_2_FN_CPU_SUSPEND:
196
- set_feature(env, ARM_FEATURE_LPAE);
135
+ case QEMU_PSCI_0_2_FN64_CPU_SUSPEND:
197
- set_feature(env, ARM_FEATURE_V7);
136
+ case QEMU_PSCI_1_0_FN_PSCI_FEATURES:
198
- }
137
+ ret = 0;
199
- if (arm_feature(env, ARM_FEATURE_V7)) {
138
+ break;
200
- set_feature(env, ARM_FEATURE_VAPA);
139
+ case QEMU_PSCI_0_1_FN_MIGRATE:
201
- set_feature(env, ARM_FEATURE_THUMB2);
140
+ case QEMU_PSCI_0_2_FN_MIGRATE:
202
- set_feature(env, ARM_FEATURE_MPIDR);
141
+ default:
203
- if (!arm_feature(env, ARM_FEATURE_M)) {
142
+ ret = QEMU_PSCI_RET_NOT_SUPPORTED;
204
- set_feature(env, ARM_FEATURE_V6K);
143
+ }
205
- } else {
144
+ break;
206
- set_feature(env, ARM_FEATURE_V6);
145
default:
207
- }
146
return false;
208
-
147
}
209
- /* Always define VBAR for V7 CPUs even if it doesn't exist in
148
diff --git a/target/arm/kvm64.c b/target/arm/kvm64.c
210
- * non-EL3 configs. This is needed by some legacy boards.
149
index XXXXXXX..XXXXXXX 100644
211
- */
150
--- a/target/arm/kvm64.c
212
- set_feature(env, ARM_FEATURE_VBAR);
151
+++ b/target/arm/kvm64.c
213
- }
152
@@ -XXX,XX +XXX,XX @@ int kvm_arch_init_vcpu(CPUState *cs)
214
- if (arm_feature(env, ARM_FEATURE_V6K)) {
153
cpu->kvm_init_features[0] |= 1 << KVM_ARM_VCPU_POWER_OFF;
215
- set_feature(env, ARM_FEATURE_V6);
154
}
216
- set_feature(env, ARM_FEATURE_MVFR);
155
if (kvm_check_extension(cs->kvm_state, KVM_CAP_ARM_PSCI_0_2)) {
217
- }
156
- cpu->psci_version = 2;
218
- if (arm_feature(env, ARM_FEATURE_V6)) {
157
+ cpu->psci_version = QEMU_PSCI_VERSION_0_2;
219
- set_feature(env, ARM_FEATURE_V5);
158
cpu->kvm_init_features[0] |= 1 << KVM_ARM_VCPU_PSCI_0_2;
220
- if (!arm_feature(env, ARM_FEATURE_M)) {
159
}
221
- assert(!tcg_enabled() || no_aa32 ||
160
if (!arm_feature(&cpu->env, ARM_FEATURE_AARCH64)) {
222
- cpu_isar_feature(aa32_jazelle, cpu));
161
diff --git a/target/arm/psci.c b/target/arm/psci.c
223
- set_feature(env, ARM_FEATURE_AUXCR);
162
index XXXXXXX..XXXXXXX 100644
224
- }
163
--- a/target/arm/psci.c
225
- }
164
+++ b/target/arm/psci.c
226
- if (arm_feature(env, ARM_FEATURE_V5)) {
165
@@ -XXX,XX +XXX,XX @@ void arm_handle_psci_call(ARMCPU *cpu)
227
- set_feature(env, ARM_FEATURE_V4T);
166
{
228
- }
229
- if (arm_feature(env, ARM_FEATURE_LPAE)) {
230
- set_feature(env, ARM_FEATURE_V7MP);
231
- }
232
- if (arm_feature(env, ARM_FEATURE_CBAR_RO)) {
233
- set_feature(env, ARM_FEATURE_CBAR);
234
- }
235
- if (arm_feature(env, ARM_FEATURE_THUMB2) &&
236
- !arm_feature(env, ARM_FEATURE_M)) {
237
- set_feature(env, ARM_FEATURE_THUMB_DSP);
238
- }
239
167
/*
240
/*
168
* This function partially implements the logic for dispatching Power State
241
* We rely on no XScale CPU having VFP so we can use the same bits in the
169
- * Coordination Interface (PSCI) calls (as described in ARM DEN 0022B.b),
170
+ * Coordination Interface (PSCI) calls (as described in ARM DEN 0022D.b),
171
* to the extent required for bringing up and taking down secondary cores,
172
* and for handling reset and poweroff requests.
173
* Additional information about the calling convention used is available in
174
@@ -XXX,XX +XXX,XX @@ void arm_handle_psci_call(ARMCPU *cpu)
175
}
176
177
if ((param[0] & QEMU_PSCI_0_2_64BIT) && !is_a64(env)) {
178
- ret = QEMU_PSCI_RET_INVALID_PARAMS;
179
+ ret = QEMU_PSCI_RET_NOT_SUPPORTED;
180
goto err;
181
}
182
183
@@ -XXX,XX +XXX,XX @@ void arm_handle_psci_call(ARMCPU *cpu)
184
ARMCPU *target_cpu;
185
186
case QEMU_PSCI_0_2_FN_PSCI_VERSION:
187
- ret = QEMU_PSCI_0_2_RET_VERSION_0_2;
188
+ ret = QEMU_PSCI_VERSION_1_1;
189
break;
190
case QEMU_PSCI_0_2_FN_MIGRATE_INFO_TYPE:
191
ret = QEMU_PSCI_0_2_RET_TOS_MIGRATION_NOT_REQUIRED; /* No trusted OS */
192
@@ -XXX,XX +XXX,XX @@ void arm_handle_psci_call(ARMCPU *cpu)
193
}
194
helper_wfi(env, 4);
195
break;
196
+ case QEMU_PSCI_1_0_FN_PSCI_FEATURES:
197
+ switch (param[1]) {
198
+ case QEMU_PSCI_0_2_FN_PSCI_VERSION:
199
+ case QEMU_PSCI_0_2_FN_MIGRATE_INFO_TYPE:
200
+ case QEMU_PSCI_0_2_FN_AFFINITY_INFO:
201
+ case QEMU_PSCI_0_2_FN64_AFFINITY_INFO:
202
+ case QEMU_PSCI_0_2_FN_SYSTEM_RESET:
203
+ case QEMU_PSCI_0_2_FN_SYSTEM_OFF:
204
+ case QEMU_PSCI_0_1_FN_CPU_ON:
205
+ case QEMU_PSCI_0_2_FN_CPU_ON:
206
+ case QEMU_PSCI_0_2_FN64_CPU_ON:
207
+ case QEMU_PSCI_0_1_FN_CPU_OFF:
208
+ case QEMU_PSCI_0_2_FN_CPU_OFF:
209
+ case QEMU_PSCI_0_1_FN_CPU_SUSPEND:
210
+ case QEMU_PSCI_0_2_FN_CPU_SUSPEND:
211
+ case QEMU_PSCI_0_2_FN64_CPU_SUSPEND:
212
+ case QEMU_PSCI_1_0_FN_PSCI_FEATURES:
213
+ if (!(param[1] & QEMU_PSCI_0_2_64BIT) || is_a64(env)) {
214
+ ret = 0;
215
+ break;
216
+ }
217
+ /* fallthrough */
218
+ case QEMU_PSCI_0_1_FN_MIGRATE:
219
+ case QEMU_PSCI_0_2_FN_MIGRATE:
220
+ default:
221
+ ret = QEMU_PSCI_RET_NOT_SUPPORTED;
222
+ break;
223
+ }
224
+ break;
225
case QEMU_PSCI_0_1_FN_MIGRATE:
226
case QEMU_PSCI_0_2_FN_MIGRATE:
227
default:
228
--
242
--
229
2.25.1
243
2.34.1
diff view generated by jsdifflib
1
When we're using KVM, the PSCI implementation is provided by the
1
M-profile CPUs generally allow configuration of the number of MPU
2
kernel, but QEMU has to tell the guest about it via the device tree.
2
regions that they have. We don't currently model this, so our
3
Currently we look at the KVM_CAP_ARM_PSCI_0_2 capability to determine
3
implementations of some of the board models provide CPUs with the
4
if the kernel is providing at least PSCI 0.2, but if the kernel
4
wrong number of regions. RTOSes like Zephyr that hardcode the
5
provides a newer version than that we will still only tell the guest
5
expected number of regions may therefore not run on the model if they
6
it has PSCI 0.2. (This is fairly harmless; it just means the guest
6
are set up to run on real hardware.
7
won't use newer parts of the PSCI API.)
8
7
9
The kernel exposes the specific PSCI version it is implementing via
8
Add properties mpu-ns-regions and mpu-s-regions to the ARMV7M object,
10
the ONE_REG API; use this to report in the dtb that the PSCI
9
matching the ability of hardware to configure the number of Secure
11
implementation is 1.0-compatible if appropriate. (The device tree
10
and NonSecure regions separately. Our actual CPU implementation
12
binding currently only distinguishes "pre-0.2", "0.2-compatible" and
11
doesn't currently support that, and it happens that none of the MPS
13
"1.0-compatible".)
12
boards we model set the number of regions differently for Secure vs
13
NonSecure, so we provide an interface to the boards and SoCs that
14
won't need to change if we ever do add that functionality in future,
15
but make it an error to configure the two properties to different
16
values.
17
18
(The property name on the CPU is the somewhat misnamed-for-M-profile
19
"pmsav7-dregion", so we don't follow that naming convention for
20
the properties here. The TRM doesn't say what the CPU configuration
21
variable names are, so we pick something, and follow the lowercase
22
convention we already have for properties here.)
14
23
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
24
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
16
Reviewed-by: Marc Zyngier <maz@kernel.org>
25
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
17
Reviewed-by: Akihiko Odaki <akihiko.odaki@gmail.com>
26
Message-id: 20230724174335.2150499-3-peter.maydell@linaro.org
18
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
19
Reviewed-by: Andrew Jones <drjones@redhat.com>
20
Message-id: 20220224134655.1207865-1-peter.maydell@linaro.org
21
---
27
---
22
target/arm/kvm-consts.h | 1 +
28
include/hw/arm/armv7m.h | 8 ++++++++
23
hw/arm/boot.c | 5 ++---
29
hw/arm/armv7m.c | 21 +++++++++++++++++++++
24
target/arm/kvm64.c | 12 ++++++++++++
30
2 files changed, 29 insertions(+)
25
3 files changed, 15 insertions(+), 3 deletions(-)
26
31
27
diff --git a/target/arm/kvm-consts.h b/target/arm/kvm-consts.h
32
diff --git a/include/hw/arm/armv7m.h b/include/hw/arm/armv7m.h
28
index XXXXXXX..XXXXXXX 100644
33
index XXXXXXX..XXXXXXX 100644
29
--- a/target/arm/kvm-consts.h
34
--- a/include/hw/arm/armv7m.h
30
+++ b/target/arm/kvm-consts.h
35
+++ b/include/hw/arm/armv7m.h
31
@@ -XXX,XX +XXX,XX @@ MISMATCH_CHECK(QEMU_PSCI_1_0_FN_PSCI_FEATURES, PSCI_1_0_FN_PSCI_FEATURES);
36
@@ -XXX,XX +XXX,XX @@ OBJECT_DECLARE_SIMPLE_TYPE(ARMv7MState, ARMV7M)
32
37
* + Property "vfp": enable VFP (forwarded to CPU object)
33
#define QEMU_PSCI_VERSION_0_1 0x00001
38
* + Property "dsp": enable DSP (forwarded to CPU object)
34
#define QEMU_PSCI_VERSION_0_2 0x00002
39
* + Property "enable-bitband": expose bitbanded IO
35
+#define QEMU_PSCI_VERSION_1_0 0x10000
40
+ * + Property "mpu-ns-regions": number of Non-Secure MPU regions (forwarded
36
#define QEMU_PSCI_VERSION_1_1 0x10001
41
+ * to CPU object pmsav7-dregion property; default is whatever the default
37
42
+ * for the CPU is)
38
MISMATCH_CHECK(QEMU_PSCI_0_2_RET_TOS_MIGRATION_NOT_REQUIRED, PSCI_0_2_TOS_MP);
43
+ * + Property "mpu-s-regions": number of Secure MPU regions (default is
39
diff --git a/hw/arm/boot.c b/hw/arm/boot.c
44
+ * whatever the default for the CPU is; must currently be set to the same
45
+ * value as mpu-ns-regions if the CPU implements the Security Extension)
46
* + Clock input "refclk" is the external reference clock for the systick timers
47
* + Clock input "cpuclk" is the main CPU clock
48
*/
49
@@ -XXX,XX +XXX,XX @@ struct ARMv7MState {
50
Object *idau;
51
uint32_t init_svtor;
52
uint32_t init_nsvtor;
53
+ uint32_t mpu_ns_regions;
54
+ uint32_t mpu_s_regions;
55
bool enable_bitband;
56
bool start_powered_off;
57
bool vfp;
58
diff --git a/hw/arm/armv7m.c b/hw/arm/armv7m.c
40
index XXXXXXX..XXXXXXX 100644
59
index XXXXXXX..XXXXXXX 100644
41
--- a/hw/arm/boot.c
60
--- a/hw/arm/armv7m.c
42
+++ b/hw/arm/boot.c
61
+++ b/hw/arm/armv7m.c
43
@@ -XXX,XX +XXX,XX @@ static void fdt_add_psci_node(void *fdt)
62
@@ -XXX,XX +XXX,XX @@ static void armv7m_realize(DeviceState *dev, Error **errp)
44
}
45
46
qemu_fdt_add_subnode(fdt, "/psci");
47
- if (armcpu->psci_version == QEMU_PSCI_VERSION_0_2 ||
48
- armcpu->psci_version == QEMU_PSCI_VERSION_1_1) {
49
- if (armcpu->psci_version == QEMU_PSCI_VERSION_0_2) {
50
+ if (armcpu->psci_version >= QEMU_PSCI_VERSION_0_2) {
51
+ if (armcpu->psci_version < QEMU_PSCI_VERSION_1_0) {
52
const char comp[] = "arm,psci-0.2\0arm,psci";
53
qemu_fdt_setprop(fdt, "/psci", "compatible", comp, sizeof(comp));
54
} else {
55
diff --git a/target/arm/kvm64.c b/target/arm/kvm64.c
56
index XXXXXXX..XXXXXXX 100644
57
--- a/target/arm/kvm64.c
58
+++ b/target/arm/kvm64.c
59
@@ -XXX,XX +XXX,XX @@ int kvm_arch_init_vcpu(CPUState *cs)
60
uint64_t mpidr;
61
ARMCPU *cpu = ARM_CPU(cs);
62
CPUARMState *env = &cpu->env;
63
+ uint64_t psciver;
64
65
if (cpu->kvm_target == QEMU_KVM_ARM_TARGET_NONE ||
66
!object_dynamic_cast(OBJECT(cpu), TYPE_AARCH64_CPU)) {
67
@@ -XXX,XX +XXX,XX @@ int kvm_arch_init_vcpu(CPUState *cs)
68
}
63
}
69
}
64
}
70
65
71
+ /*
66
+ /*
72
+ * KVM reports the exact PSCI version it is implementing via a
67
+ * Real M-profile hardware can be configured with a different number of
73
+ * special sysreg. If it is present, use its contents to determine
68
+ * MPU regions for Secure vs NonSecure. QEMU's CPU implementation doesn't
74
+ * what to report to the guest in the dtb (it is the PSCI version,
69
+ * support that yet, so catch attempts to select that.
75
+ * in the same 15-bits major 16-bits minor format that PSCI_VERSION
76
+ * returns).
77
+ */
70
+ */
78
+ if (!kvm_get_one_reg(cs, KVM_REG_ARM_PSCI_VERSION, &psciver)) {
71
+ if (arm_feature(&s->cpu->env, ARM_FEATURE_M_SECURITY) &&
79
+ cpu->psci_version = psciver;
72
+ s->mpu_ns_regions != s->mpu_s_regions) {
73
+ error_setg(errp,
74
+ "mpu-ns-regions and mpu-s-regions properties must have the same value");
75
+ return;
76
+ }
77
+ if (s->mpu_ns_regions != UINT_MAX &&
78
+ object_property_find(OBJECT(s->cpu), "pmsav7-dregion")) {
79
+ if (!object_property_set_uint(OBJECT(s->cpu), "pmsav7-dregion",
80
+ s->mpu_ns_regions, errp)) {
81
+ return;
82
+ }
80
+ }
83
+ }
81
+
84
+
82
/*
85
/*
83
* When KVM is in use, PSCI is emulated in-kernel and not by qemu.
86
* Tell the CPU where the NVIC is; it will fail realize if it doesn't
84
* Currently KVM has its own idea about MPIDR assignment, so we
87
* have one. Similarly, tell the NVIC where its CPU is.
88
@@ -XXX,XX +XXX,XX @@ static Property armv7m_properties[] = {
89
false),
90
DEFINE_PROP_BOOL("vfp", ARMv7MState, vfp, true),
91
DEFINE_PROP_BOOL("dsp", ARMv7MState, dsp, true),
92
+ DEFINE_PROP_UINT32("mpu-ns-regions", ARMv7MState, mpu_ns_regions, UINT_MAX),
93
+ DEFINE_PROP_UINT32("mpu-s-regions", ARMv7MState, mpu_s_regions, UINT_MAX),
94
DEFINE_PROP_END_OF_LIST(),
95
};
96
85
--
97
--
86
2.25.1
98
2.34.1
99
100
diff view generated by jsdifflib
1
From: Jimmy Brisson <jimmy.brisson@linaro.org>
1
The IoTKit, SSE200 and SSE300 all default to 8 MPU regions. The
2
2
MPS2/MPS3 FPGA images don't override these except in the case of
3
With these interfaces missing, TFM would delegate peripherals 0, 1,
3
AN547, which uses 16 MPU regions.
4
2, 3 and 8, and qemu would ignore the delegation of interface 8, as
4
5
it thought interface 4 was eth & USB.
5
Define properties on the ARMSSE object for the MPU regions (using the
6
6
same names as the documented RTL configuration settings, and
7
This patch corrects this behavior and allows TFM to delegate the
7
following the pattern we already have for this device of using
8
eth & USB peripheral to NS mode.
8
all-caps names as the RTL does), and set them in the board code.
9
9
10
(The old QEMU behaviour was based on revision B of the AN547
10
We don't actually need to override the default except on AN547,
11
appnote; revision C corrects this error in the documentation,
11
but it's simpler code to have the board code set them always
12
and this commit brings QEMU in to line with how the FPGA
12
rather than tracking which board subtypes want to set them to
13
image really behaves.)
13
a non-default value separately from what that value is.
14
14
15
Signed-off-by: Jimmy Brisson <jimmy.brisson@linaro.org>
15
Tho overall effect is that for mps2-an505, mps2-an521 and mps3-an524
16
Message-id: 20220210210227.3203883-1-jimmy.brisson@linaro.org
16
we now correctly use 8 MPU regions, while mps3-an547 stays at its
17
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
17
current 16 regions.
18
[PMM: added commit message note clarifying that the old behaviour
18
19
was a docs issue, not because there were two different versions
19
It's possible some guest code wrongly depended on the previous
20
of the FPGA image]
20
incorrectly modeled number of memory regions. (Such guest code
21
should ideally check the number of regions via the MPU_TYPE
22
register.) The old behaviour can be obtained with additional
23
-global arguments to QEMU:
24
25
For mps2-an521 and mps2-an524:
26
-global sse-200.CPU0_MPU_NS=16 -global sse-200.CPU0_MPU_S=16 -global sse-200.CPU1_MPU_NS=16 -global sse-200.CPU1_MPU_S=16
27
28
For mps2-an505:
29
-global sse-200.CPU0_MPU_NS=16 -global sse-200.CPU0_MPU_S=16
30
31
NB that the way the implementation allows this use of -global
32
is slightly fragile: if the board code explicitly sets the
33
properties on the sse-200 object, this overrides the -global
34
command line option. So we rely on:
35
- the boards that need fixing all happen to use the SSE defaults
36
- we can write the board code to only set the property if it
37
is different from the default, rather than having all boards
38
explicitly set the property
39
- the board that does need to use a non-default value happens
40
to need to set it to the same value (16) we previously used
41
This works, but there are some kinds of refactoring of the
42
mps2-tz.c code that would break the support for -global here.
43
44
Resolves: https://gitlab.com/qemu-project/qemu/-/issues/1772
21
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
45
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
46
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
47
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
48
Message-id: 20230724174335.2150499-4-peter.maydell@linaro.org
22
---
49
---
23
hw/arm/mps2-tz.c | 4 ++++
50
include/hw/arm/armsse.h | 5 +++++
24
1 file changed, 4 insertions(+)
51
hw/arm/armsse.c | 16 ++++++++++++++++
25
52
hw/arm/mps2-tz.c | 29 +++++++++++++++++++++++++++++
53
3 files changed, 50 insertions(+)
54
55
diff --git a/include/hw/arm/armsse.h b/include/hw/arm/armsse.h
56
index XXXXXXX..XXXXXXX 100644
57
--- a/include/hw/arm/armsse.h
58
+++ b/include/hw/arm/armsse.h
59
@@ -XXX,XX +XXX,XX @@
60
* (matching the hardware) is that for CPU0 in an IoTKit and CPU1 in an
61
* SSE-200 both are present; CPU0 in an SSE-200 has neither.
62
* Since the IoTKit has only one CPU, it does not have the CPU1_* properties.
63
+ * + QOM properties "CPU0_MPU_NS", "CPU0_MPU_S", "CPU1_MPU_NS" and "CPU1_MPU_S"
64
+ * which set the number of MPU regions on the CPUs. If there is only one
65
+ * CPU the CPU1 properties are not present.
66
* + Named GPIO inputs "EXP_IRQ" 0..n are the expansion interrupts for CPU 0,
67
* which are wired to its NVIC lines 32 .. n+32
68
* + Named GPIO inputs "EXP_CPU1_IRQ" 0..n are the expansion interrupts for
69
@@ -XXX,XX +XXX,XX @@ struct ARMSSE {
70
uint32_t exp_numirq;
71
uint32_t sram_addr_width;
72
uint32_t init_svtor;
73
+ uint32_t cpu_mpu_ns[SSE_MAX_CPUS];
74
+ uint32_t cpu_mpu_s[SSE_MAX_CPUS];
75
bool cpu_fpu[SSE_MAX_CPUS];
76
bool cpu_dsp[SSE_MAX_CPUS];
77
};
78
diff --git a/hw/arm/armsse.c b/hw/arm/armsse.c
79
index XXXXXXX..XXXXXXX 100644
80
--- a/hw/arm/armsse.c
81
+++ b/hw/arm/armsse.c
82
@@ -XXX,XX +XXX,XX @@ static Property iotkit_properties[] = {
83
DEFINE_PROP_UINT32("init-svtor", ARMSSE, init_svtor, 0x10000000),
84
DEFINE_PROP_BOOL("CPU0_FPU", ARMSSE, cpu_fpu[0], true),
85
DEFINE_PROP_BOOL("CPU0_DSP", ARMSSE, cpu_dsp[0], true),
86
+ DEFINE_PROP_UINT32("CPU0_MPU_NS", ARMSSE, cpu_mpu_ns[0], 8),
87
+ DEFINE_PROP_UINT32("CPU0_MPU_S", ARMSSE, cpu_mpu_s[0], 8),
88
DEFINE_PROP_END_OF_LIST()
89
};
90
91
@@ -XXX,XX +XXX,XX @@ static Property sse200_properties[] = {
92
DEFINE_PROP_BOOL("CPU0_DSP", ARMSSE, cpu_dsp[0], false),
93
DEFINE_PROP_BOOL("CPU1_FPU", ARMSSE, cpu_fpu[1], true),
94
DEFINE_PROP_BOOL("CPU1_DSP", ARMSSE, cpu_dsp[1], true),
95
+ DEFINE_PROP_UINT32("CPU0_MPU_NS", ARMSSE, cpu_mpu_ns[0], 8),
96
+ DEFINE_PROP_UINT32("CPU0_MPU_S", ARMSSE, cpu_mpu_s[0], 8),
97
+ DEFINE_PROP_UINT32("CPU1_MPU_NS", ARMSSE, cpu_mpu_ns[1], 8),
98
+ DEFINE_PROP_UINT32("CPU1_MPU_S", ARMSSE, cpu_mpu_s[1], 8),
99
DEFINE_PROP_END_OF_LIST()
100
};
101
102
@@ -XXX,XX +XXX,XX @@ static Property sse300_properties[] = {
103
DEFINE_PROP_UINT32("init-svtor", ARMSSE, init_svtor, 0x10000000),
104
DEFINE_PROP_BOOL("CPU0_FPU", ARMSSE, cpu_fpu[0], true),
105
DEFINE_PROP_BOOL("CPU0_DSP", ARMSSE, cpu_dsp[0], true),
106
+ DEFINE_PROP_UINT32("CPU0_MPU_NS", ARMSSE, cpu_mpu_ns[0], 8),
107
+ DEFINE_PROP_UINT32("CPU0_MPU_S", ARMSSE, cpu_mpu_s[0], 8),
108
DEFINE_PROP_END_OF_LIST()
109
};
110
111
@@ -XXX,XX +XXX,XX @@ static void armsse_realize(DeviceState *dev, Error **errp)
112
return;
113
}
114
}
115
+ if (!object_property_set_uint(cpuobj, "mpu-ns-regions",
116
+ s->cpu_mpu_ns[i], errp)) {
117
+ return;
118
+ }
119
+ if (!object_property_set_uint(cpuobj, "mpu-s-regions",
120
+ s->cpu_mpu_s[i], errp)) {
121
+ return;
122
+ }
123
124
if (i > 0) {
125
memory_region_add_subregion_overlap(&s->cpu_container[i], 0,
26
diff --git a/hw/arm/mps2-tz.c b/hw/arm/mps2-tz.c
126
diff --git a/hw/arm/mps2-tz.c b/hw/arm/mps2-tz.c
27
index XXXXXXX..XXXXXXX 100644
127
index XXXXXXX..XXXXXXX 100644
28
--- a/hw/arm/mps2-tz.c
128
--- a/hw/arm/mps2-tz.c
29
+++ b/hw/arm/mps2-tz.c
129
+++ b/hw/arm/mps2-tz.c
130
@@ -XXX,XX +XXX,XX @@ struct MPS2TZMachineClass {
131
int uart_overflow_irq; /* number of the combined UART overflow IRQ */
132
uint32_t init_svtor; /* init-svtor setting for SSE */
133
uint32_t sram_addr_width; /* SRAM_ADDR_WIDTH setting for SSE */
134
+ uint32_t cpu0_mpu_ns; /* CPU0_MPU_NS setting for SSE */
135
+ uint32_t cpu0_mpu_s; /* CPU0_MPU_S setting for SSE */
136
+ uint32_t cpu1_mpu_ns; /* CPU1_MPU_NS setting for SSE */
137
+ uint32_t cpu1_mpu_s; /* CPU1_MPU_S setting for SSE */
138
const RAMInfo *raminfo;
139
const char *armsse_type;
140
uint32_t boot_ram_size; /* size of ram at address 0; 0 == find in raminfo */
141
@@ -XXX,XX +XXX,XX @@ OBJECT_DECLARE_TYPE(MPS2TZMachineState, MPS2TZMachineClass, MPS2TZ_MACHINE)
142
#define MPS3_DDR_SIZE (2 * GiB)
143
#endif
144
145
+/* For cpu{0,1}_mpu_{ns,s}, means "leave at SSE's default value" */
146
+#define MPU_REGION_DEFAULT UINT32_MAX
147
+
148
static const uint32_t an505_oscclk[] = {
149
40000000,
150
24580000,
30
@@ -XXX,XX +XXX,XX @@ static void mps2tz_common_init(MachineState *machine)
151
@@ -XXX,XX +XXX,XX @@ static void mps2tz_common_init(MachineState *machine)
31
{ "gpio1", make_unimp_dev, &mms->gpio[1], 0x41101000, 0x1000 },
152
OBJECT(system_memory), &error_abort);
32
{ "gpio2", make_unimp_dev, &mms->gpio[2], 0x41102000, 0x1000 },
153
qdev_prop_set_uint32(iotkitdev, "EXP_NUMIRQ", mmc->numirq);
33
{ "gpio3", make_unimp_dev, &mms->gpio[3], 0x41103000, 0x1000 },
154
qdev_prop_set_uint32(iotkitdev, "init-svtor", mmc->init_svtor);
34
+ { /* port 4 USER AHB interface 0 */ },
155
+ if (mmc->cpu0_mpu_ns != MPU_REGION_DEFAULT) {
35
+ { /* port 5 USER AHB interface 1 */ },
156
+ qdev_prop_set_uint32(iotkitdev, "CPU0_MPU_NS", mmc->cpu0_mpu_ns);
36
+ { /* port 6 USER AHB interface 2 */ },
157
+ }
37
+ { /* port 7 USER AHB interface 3 */ },
158
+ if (mmc->cpu0_mpu_s != MPU_REGION_DEFAULT) {
38
{ "eth-usb", make_eth_usb, NULL, 0x41400000, 0x200000, { 49 } },
159
+ qdev_prop_set_uint32(iotkitdev, "CPU0_MPU_S", mmc->cpu0_mpu_s);
39
},
160
+ }
40
},
161
+ if (object_property_find(OBJECT(iotkitdev), "CPU1_MPU_NS")) {
162
+ if (mmc->cpu1_mpu_ns != MPU_REGION_DEFAULT) {
163
+ qdev_prop_set_uint32(iotkitdev, "CPU1_MPU_NS", mmc->cpu1_mpu_ns);
164
+ }
165
+ if (mmc->cpu1_mpu_s != MPU_REGION_DEFAULT) {
166
+ qdev_prop_set_uint32(iotkitdev, "CPU1_MPU_S", mmc->cpu1_mpu_s);
167
+ }
168
+ }
169
qdev_prop_set_uint32(iotkitdev, "SRAM_ADDR_WIDTH", mmc->sram_addr_width);
170
qdev_connect_clock_in(iotkitdev, "MAINCLK", mms->sysclk);
171
qdev_connect_clock_in(iotkitdev, "S32KCLK", mms->s32kclk);
172
@@ -XXX,XX +XXX,XX @@ static void mps2tz_class_init(ObjectClass *oc, void *data)
173
{
174
MachineClass *mc = MACHINE_CLASS(oc);
175
IDAUInterfaceClass *iic = IDAU_INTERFACE_CLASS(oc);
176
+ MPS2TZMachineClass *mmc = MPS2TZ_MACHINE_CLASS(oc);
177
178
mc->init = mps2tz_common_init;
179
mc->reset = mps2_machine_reset;
180
iic->check = mps2_tz_idau_check;
181
+
182
+ /* Most machines leave these at the SSE defaults */
183
+ mmc->cpu0_mpu_ns = MPU_REGION_DEFAULT;
184
+ mmc->cpu0_mpu_s = MPU_REGION_DEFAULT;
185
+ mmc->cpu1_mpu_ns = MPU_REGION_DEFAULT;
186
+ mmc->cpu1_mpu_s = MPU_REGION_DEFAULT;
187
}
188
189
static void mps2tz_set_default_ram_info(MPS2TZMachineClass *mmc)
190
@@ -XXX,XX +XXX,XX @@ static void mps3tz_an547_class_init(ObjectClass *oc, void *data)
191
mmc->numirq = 96;
192
mmc->uart_overflow_irq = 48;
193
mmc->init_svtor = 0x00000000;
194
+ mmc->cpu0_mpu_s = mmc->cpu0_mpu_ns = 16;
195
mmc->sram_addr_width = 21;
196
mmc->raminfo = an547_raminfo;
197
mmc->armsse_type = TYPE_SSE300;
41
--
198
--
42
2.25.1
199
2.34.1
200
201
diff view generated by jsdifflib
Deleted patch
1
From: Richard Henderson <richard.henderson@linaro.org>
2
1
3
The original A.a revision of the AArch64 ARM required that we
4
force-extend the addresses in these registers from 49 bits.
5
This language has been loosened via a combination of IMPLEMENTATION
6
DEFINED and CONSTRAINTED UNPREDICTABLE to allow consideration of
7
the entire aligned address.
8
9
This means that we do not have to consider whether or not FEAT_LVA
10
is enabled, and decide from which bit an address might need to be
11
extended.
12
13
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
14
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
15
Message-id: 20220301215958.157011-9-richard.henderson@linaro.org
16
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
---
18
target/arm/helper.c | 32 ++++++++++++++++++++++++--------
19
1 file changed, 24 insertions(+), 8 deletions(-)
20
21
diff --git a/target/arm/helper.c b/target/arm/helper.c
22
index XXXXXXX..XXXXXXX 100644
23
--- a/target/arm/helper.c
24
+++ b/target/arm/helper.c
25
@@ -XXX,XX +XXX,XX @@ static void dbgwvr_write(CPUARMState *env, const ARMCPRegInfo *ri,
26
ARMCPU *cpu = env_archcpu(env);
27
int i = ri->crm;
28
29
- /* Bits [63:49] are hardwired to the value of bit [48]; that is, the
30
- * register reads and behaves as if values written are sign extended.
31
+ /*
32
* Bits [1:0] are RES0.
33
+ *
34
+ * It is IMPLEMENTATION DEFINED whether [63:49] ([63:53] with FEAT_LVA)
35
+ * are hardwired to the value of bit [48] ([52] with FEAT_LVA), or if
36
+ * they contain the value written. It is CONSTRAINED UNPREDICTABLE
37
+ * whether the RESS bits are ignored when comparing an address.
38
+ *
39
+ * Therefore we are allowed to compare the entire register, which lets
40
+ * us avoid considering whether or not FEAT_LVA is actually enabled.
41
*/
42
- value = sextract64(value, 0, 49) & ~3ULL;
43
+ value &= ~3ULL;
44
45
raw_write(env, ri, value);
46
hw_watchpoint_update(cpu, i);
47
@@ -XXX,XX +XXX,XX @@ void hw_breakpoint_update(ARMCPU *cpu, int n)
48
case 0: /* unlinked address match */
49
case 1: /* linked address match */
50
{
51
- /* Bits [63:49] are hardwired to the value of bit [48]; that is,
52
- * we behave as if the register was sign extended. Bits [1:0] are
53
- * RES0. The BAS field is used to allow setting breakpoints on 16
54
- * bit wide instructions; it is CONSTRAINED UNPREDICTABLE whether
55
+ /*
56
+ * Bits [1:0] are RES0.
57
+ *
58
+ * It is IMPLEMENTATION DEFINED whether bits [63:49]
59
+ * ([63:53] for FEAT_LVA) are hardwired to a copy of the sign bit
60
+ * of the VA field ([48] or [52] for FEAT_LVA), or whether the
61
+ * value is read as written. It is CONSTRAINED UNPREDICTABLE
62
+ * whether the RESS bits are ignored when comparing an address.
63
+ * Therefore we are allowed to compare the entire register, which
64
+ * lets us avoid considering whether FEAT_LVA is actually enabled.
65
+ *
66
+ * The BAS field is used to allow setting breakpoints on 16-bit
67
+ * wide instructions; it is CONSTRAINED UNPREDICTABLE whether
68
* a bp will fire if the addresses covered by the bp and the addresses
69
* covered by the insn overlap but the insn doesn't start at the
70
* start of the bp address range. We choose to require the insn and
71
@@ -XXX,XX +XXX,XX @@ void hw_breakpoint_update(ARMCPU *cpu, int n)
72
* See also figure D2-3 in the v8 ARM ARM (DDI0487A.c).
73
*/
74
int bas = extract64(bcr, 5, 4);
75
- addr = sextract64(bvr, 0, 49) & ~3ULL;
76
+ addr = bvr & ~3ULL;
77
if (bas == 0) {
78
return;
79
}
80
--
81
2.25.1
diff view generated by jsdifflib
Deleted patch
1
In commit 6e657e64cdc478 in 2013 we added some autorelease pools to
2
deal with complaints from macOS when we made calls into Cocoa from
3
threads that didn't have automatically created autorelease pools.
4
Later on, macOS got stricter about forbidding cross-thread Cocoa
5
calls, and in commit 5588840ff77800e839d8 we restructured the code to
6
avoid them. This left the autorelease pool creation in several
7
functions without any purpose; delete it.
8
1
9
We still need the pool in cocoa_refresh() for the clipboard related
10
code which is called directly there.
11
12
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
13
Reviewed-by: Akihiko Odaki <akihiko.odaki@gmail.com>
14
Tested-by: Akihiko Odaki <akihiko.odaki@gmail.com>
15
Message-id: 20220224101330.967429-3-peter.maydell@linaro.org
16
---
17
ui/cocoa.m | 6 ------
18
1 file changed, 6 deletions(-)
19
20
diff --git a/ui/cocoa.m b/ui/cocoa.m
21
index XXXXXXX..XXXXXXX 100644
22
--- a/ui/cocoa.m
23
+++ b/ui/cocoa.m
24
@@ -XXX,XX +XXX,XX @@ int main (int argc, char **argv) {
25
static void cocoa_update(DisplayChangeListener *dcl,
26
int x, int y, int w, int h)
27
{
28
- NSAutoreleasePool * pool = [[NSAutoreleasePool alloc] init];
29
-
30
COCOA_DEBUG("qemu_cocoa: cocoa_update\n");
31
32
dispatch_async(dispatch_get_main_queue(), ^{
33
@@ -XXX,XX +XXX,XX @@ static void cocoa_update(DisplayChangeListener *dcl,
34
}
35
[cocoaView setNeedsDisplayInRect:rect];
36
});
37
-
38
- [pool release];
39
}
40
41
static void cocoa_switch(DisplayChangeListener *dcl,
42
DisplaySurface *surface)
43
{
44
- NSAutoreleasePool * pool = [[NSAutoreleasePool alloc] init];
45
pixman_image_t *image = surface->image;
46
47
COCOA_DEBUG("qemu_cocoa: cocoa_switch\n");
48
@@ -XXX,XX +XXX,XX @@ static void cocoa_switch(DisplayChangeListener *dcl,
49
[cocoaView updateUIInfo];
50
[cocoaView switchSurface:image];
51
});
52
- [pool release];
53
}
54
55
static void cocoa_refresh(DisplayChangeListener *dcl)
56
--
57
2.25.1
diff view generated by jsdifflib