1
A last lot of bug fixes before rc0...
1
Only thing for Arm for rc1 is RTH's fix for the KVM SVE probe code.
2
2
3
thanks
4
-- PMM
3
-- PMM
5
4
6
The following changes since commit 0d0275c31f00b71b49eb80bbdca2cfe244cf80fb:
5
The following changes since commit 4e06b3fc1b5e1ec03f22190eabe56891dc9c2236:
7
6
8
Merge tag 'net-pull-request' of https://github.com/jasowang/qemu into staging (2022-07-26 10:31:02 +0100)
7
Merge tag 'pull-hex-20220731' of https://github.com/quic/qemu into staging (2022-07-31 21:38:54 -0700)
9
8
10
are available in the Git repository at:
9
are available in the Git repository at:
11
10
12
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20220726
11
https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20220801
13
12
14
for you to fetch changes up to 5865d99fe88d8c8fa437c18c6b63fb2a8165634f:
13
for you to fetch changes up to 5265d24c981dfdda8d29b44f7e84a514da75eedc:
15
14
16
hw/display/bcm2835_fb: Fix framebuffer allocation address (2022-07-26 14:09:44 +0100)
15
target/arm: Move sve probe inside kvm >= 4.15 branch (2022-08-01 16:21:18 +0100)
17
16
18
----------------------------------------------------------------
17
----------------------------------------------------------------
19
target-arm queue:
18
target-arm queue:
20
* Update Coverity component definitions
19
* Fix KVM SVE ID register probe code
21
* target/arm: Add MO_128 entry to pred_esz_masks[]
22
* configure: Fix portability issues
23
* hw/display/bcm2835_fb: Fix framebuffer allocation address
24
20
25
----------------------------------------------------------------
21
----------------------------------------------------------------
26
Alan Jian (1):
22
Richard Henderson (3):
27
hw/display/bcm2835_fb: Fix framebuffer allocation address
23
target/arm: Use kvm_arm_sve_supported in kvm_arm_get_host_cpu_features
24
target/arm: Set KVM_ARM_VCPU_SVE while probing the host
25
target/arm: Move sve probe inside kvm >= 4.15 branch
28
26
29
Peter Maydell (8):
27
target/arm/kvm64.c | 45 ++++++++++++++++++++++-----------------------
30
scripts/coverity-scan/COMPONENTS.md: Add loongarch component
28
1 file changed, 22 insertions(+), 23 deletions(-)
31
scripts/coverity-scan/COMPONENTS.md: Update slirp component info
32
target/arm: Add MO_128 entry to pred_esz_masks[]
33
configure: Add missing POSIX-required space
34
configure: Add braces to clarify intent of $emu[[:space:]]
35
configure: Don't use bash-specific string-replacement syntax
36
configure: Drop dead code attempting to use -msmall-data on alpha hosts
37
configure: Avoid '==' bashism
38
39
configure | 20 +++++++-------------
40
target/arm/cpu.h | 2 +-
41
hw/display/bcm2835_fb.c | 3 +--
42
target/arm/translate-sve.c | 5 +++--
43
scripts/coverity-scan/COMPONENTS.md | 7 +++++--
44
5 files changed, 17 insertions(+), 20 deletions(-)
diff view generated by jsdifflib
Deleted patch
1
Add the component regex for the new loongarch target.
2
1
3
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
4
Acked-by: Paolo Bonzini <pbonzini@redhat.com>
5
Message-id: 20220718142310.16013-2-peter.maydell@linaro.org
6
---
7
scripts/coverity-scan/COMPONENTS.md | 3 +++
8
1 file changed, 3 insertions(+)
9
10
diff --git a/scripts/coverity-scan/COMPONENTS.md b/scripts/coverity-scan/COMPONENTS.md
11
index XXXXXXX..XXXXXXX 100644
12
--- a/scripts/coverity-scan/COMPONENTS.md
13
+++ b/scripts/coverity-scan/COMPONENTS.md
14
@@ -XXX,XX +XXX,XX @@ testlibs
15
16
tests
17
~ (/qemu)?(/tests/.*)
18
+
19
+loongarch
20
+ ~ (/qemu)?((/include)?/hw/(loongarch/.*|.*/loongarch.*)|/target/loongarch/.*)
21
--
22
2.25.1
diff view generated by jsdifflib
Deleted patch
1
Update the regex for the slirp component now that it lives
2
solely inside /slirp/, and note that it should be ignored in
3
Coverity analysis (because it's a separate upstream project
4
now, and they run Coverity on it themselves).
5
1
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
Acked-by: Paolo Bonzini <pbonzini@redhat.com>
8
Message-id: 20220718142310.16013-3-peter.maydell@linaro.org
9
---
10
scripts/coverity-scan/COMPONENTS.md | 4 ++--
11
1 file changed, 2 insertions(+), 2 deletions(-)
12
13
diff --git a/scripts/coverity-scan/COMPONENTS.md b/scripts/coverity-scan/COMPONENTS.md
14
index XXXXXXX..XXXXXXX 100644
15
--- a/scripts/coverity-scan/COMPONENTS.md
16
+++ b/scripts/coverity-scan/COMPONENTS.md
17
@@ -XXX,XX +XXX,XX @@ qemu-ga
18
scsi
19
~ (/qemu)?(/scsi/.*|/hw/scsi/.*|/include/hw/scsi/.*)
20
21
-slirp
22
- ~ (/qemu)?(/.*slirp.*)
23
+slirp (component should be ignored in analysis)
24
+ ~ (/qemu)?(/slirp/.*)
25
26
tcg
27
~ (/qemu)?(/accel/tcg/.*|/replay/.*|/(.*/)?softmmu.*)
28
--
29
2.25.1
diff view generated by jsdifflib
Deleted patch
1
In commit 7390e0e9ab8475, we added support for SME loads and stores.
2
Unlike SVE loads and stores, these include handling of 128-bit
3
elements. The SME load/store functions call down into the existing
4
sve_cont_ldst_elements() function, which uses the element size MO_*
5
value as an index into the pred_esz_masks[] array. Because this code
6
path now has to handle MO_128, we need to add an extra element to the
7
array.
8
1
9
This bug was spotted by Coverity because it meant we were reading off
10
the end of the array.
11
12
Resolves: Coverity CID 1490539, 1490541, 1490543, 1490544, 1490545,
13
1490546, 1490548, 1490549, 1490550, 1490551, 1490555, 1490557,
14
1490558, 1490560, 1490561, 1490563
15
Fixes: 7390e0e9ab8475 ("target/arm: Implement SME LD1, ST1")
16
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
17
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
18
Message-id: 20220718100144.3248052-1-peter.maydell@linaro.org
19
---
20
target/arm/cpu.h | 2 +-
21
target/arm/translate-sve.c | 5 +++--
22
2 files changed, 4 insertions(+), 3 deletions(-)
23
24
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
25
index XXXXXXX..XXXXXXX 100644
26
--- a/target/arm/cpu.h
27
+++ b/target/arm/cpu.h
28
@@ -XXX,XX +XXX,XX @@ static inline uint64_t *aa64_vfp_qreg(CPUARMState *env, unsigned regno)
29
}
30
31
/* Shared between translate-sve.c and sve_helper.c. */
32
-extern const uint64_t pred_esz_masks[4];
33
+extern const uint64_t pred_esz_masks[5];
34
35
/* Helper for the macros below, validating the argument type. */
36
static inline MemTxAttrs *typecheck_memtxattrs(MemTxAttrs *x)
37
diff --git a/target/arm/translate-sve.c b/target/arm/translate-sve.c
38
index XXXXXXX..XXXXXXX 100644
39
--- a/target/arm/translate-sve.c
40
+++ b/target/arm/translate-sve.c
41
@@ -XXX,XX +XXX,XX @@ static void do_predtest(DisasContext *s, int dofs, int gofs, int words)
42
}
43
44
/* For each element size, the bits within a predicate word that are active. */
45
-const uint64_t pred_esz_masks[4] = {
46
+const uint64_t pred_esz_masks[5] = {
47
0xffffffffffffffffull, 0x5555555555555555ull,
48
- 0x1111111111111111ull, 0x0101010101010101ull
49
+ 0x1111111111111111ull, 0x0101010101010101ull,
50
+ 0x0001000100010001ull,
51
};
52
53
static bool trans_INVALID(DisasContext *s, arg_INVALID *a)
54
--
55
2.25.1
diff view generated by jsdifflib
1
The '==' operator to test is a bashism; the standard way to copmare
1
From: Richard Henderson <richard.henderson@linaro.org>
2
strings is '='. This causes dash to complain:
3
2
4
../../configure: 681: test: linux: unexpected operator
3
Indication for support for SVE will not depend on whether we
4
perform the query on the main kvm_state or the temp vcpu.
5
5
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
7
Message-id: 20220726045828.53697-2-richard.henderson@linaro.org
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
6
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
7
Reviewed-by: Thomas Huth <thuth@redhat.com>
8
Message-id: 20220720152631.450903-6-peter.maydell@linaro.org
9
---
10
---
10
configure | 2 +-
11
target/arm/kvm64.c | 2 +-
11
1 file changed, 1 insertion(+), 1 deletion(-)
12
1 file changed, 1 insertion(+), 1 deletion(-)
12
13
13
diff --git a/configure b/configure
14
diff --git a/target/arm/kvm64.c b/target/arm/kvm64.c
14
index XXXXXXX..XXXXXXX 100755
15
index XXXXXXX..XXXXXXX 100644
15
--- a/configure
16
--- a/target/arm/kvm64.c
16
+++ b/configure
17
+++ b/target/arm/kvm64.c
17
@@ -XXX,XX +XXX,XX @@ werror=""
18
@@ -XXX,XX +XXX,XX @@ bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)
18
19
}
19
meson_option_build_array() {
20
}
20
printf '['
21
21
- (if test "$targetos" == windows; then
22
- sve_supported = ioctl(fdarray[0], KVM_CHECK_EXTENSION, KVM_CAP_ARM_SVE) > 0;
22
+ (if test "$targetos" = windows; then
23
+ sve_supported = kvm_arm_sve_supported();
23
IFS=\;
24
24
else
25
/* Add feature bits that can't appear until after VCPU init. */
25
IFS=:
26
if (sve_supported) {
26
--
27
--
27
2.25.1
28
2.25.1
diff view generated by jsdifflib
1
In commit 7d7dbf9dc15be6e1 we added a line to the configure script
1
From: Richard Henderson <richard.henderson@linaro.org>
2
which is not valid POSIX shell syntax, because it is missing a space
3
after a '!' character. shellcheck diagnoses this:
4
2
5
if !(GIT="$git" "$source_path/scripts/git-submodule.sh" "$git_submodules_action" "$git_submodules"); then
3
Because we weren't setting this flag, our probe of ID_AA64ZFR0
6
^-- SC1035: You are missing a required space after the !.
4
was always returning zero. This also obviates the adjustment
5
of ID_AA64PFR0, which had sanitized the SVE field.
7
6
8
and the OpenBSD shell will not correctly handle this without the space.
7
The effects of the bug are not visible, because the only thing that
8
ID_AA64ZFR0 is used for within qemu at present is tcg translation.
9
The other tests for SVE within KVM are via ID_AA64PFR0.SVE.
9
10
10
Fixes: 7d7dbf9dc15be6e1 ("configure: replace --enable/disable-git-update with --with-git-submodules")
11
Reported-by: Zenghui Yu <yuzenghui@huawei.com>
12
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
13
Message-id: 20220726045828.53697-3-richard.henderson@linaro.org
14
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
11
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
15
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
12
Reviewed-by: Thomas Huth <thuth@redhat.com>
13
Tested-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
14
Message-id: 20220720152631.450903-2-peter.maydell@linaro.org
15
---
16
---
16
configure | 2 +-
17
target/arm/kvm64.c | 27 +++++++++++++--------------
17
1 file changed, 1 insertion(+), 1 deletion(-)
18
1 file changed, 13 insertions(+), 14 deletions(-)
18
19
19
diff --git a/configure b/configure
20
diff --git a/target/arm/kvm64.c b/target/arm/kvm64.c
20
index XXXXXXX..XXXXXXX 100755
21
index XXXXXXX..XXXXXXX 100644
21
--- a/configure
22
--- a/target/arm/kvm64.c
22
+++ b/configure
23
+++ b/target/arm/kvm64.c
23
@@ -XXX,XX +XXX,XX @@ else
24
@@ -XXX,XX +XXX,XX @@ bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)
24
cxx=
25
bool sve_supported;
25
fi
26
bool pmu_supported = false;
26
27
uint64_t features = 0;
27
-if !(GIT="$git" "$source_path/scripts/git-submodule.sh" "$git_submodules_action" "$git_submodules"); then
28
- uint64_t t;
28
+if ! (GIT="$git" "$source_path/scripts/git-submodule.sh" "$git_submodules_action" "$git_submodules"); then
29
int err;
29
exit 1
30
30
fi
31
/* Old kernels may not know about the PREFERRED_TARGET ioctl: however
31
32
@@ -XXX,XX +XXX,XX @@ bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)
33
struct kvm_vcpu_init init = { .target = -1, };
34
35
/*
36
- * Ask for Pointer Authentication if supported. We can't play the
37
- * SVE trick of synthesising the ID reg as KVM won't tell us
38
- * whether we have the architected or IMPDEF version of PAuth, so
39
- * we have to use the actual ID regs.
40
+ * Ask for SVE if supported, so that we can query ID_AA64ZFR0,
41
+ * which is otherwise RAZ.
42
+ */
43
+ sve_supported = kvm_arm_sve_supported();
44
+ if (sve_supported) {
45
+ init.features[0] |= 1 << KVM_ARM_VCPU_SVE;
46
+ }
47
+
48
+ /*
49
+ * Ask for Pointer Authentication if supported, so that we get
50
+ * the unsanitized field values for AA64ISAR1_EL1.
51
*/
52
if (kvm_arm_pauth_supported()) {
53
init.features[0] |= (1 << KVM_ARM_VCPU_PTRAUTH_ADDRESS |
54
@@ -XXX,XX +XXX,XX @@ bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)
55
}
56
}
57
58
- sve_supported = kvm_arm_sve_supported();
59
-
60
- /* Add feature bits that can't appear until after VCPU init. */
61
if (sve_supported) {
62
- t = ahcf->isar.id_aa64pfr0;
63
- t = FIELD_DP64(t, ID_AA64PFR0, SVE, 1);
64
- ahcf->isar.id_aa64pfr0 = t;
65
-
66
/*
67
* There is a range of kernels between kernel commit 73433762fcae
68
* and f81cb2c3ad41 which have a bug where the kernel doesn't expose
69
* SYS_ID_AA64ZFR0_EL1 via the ONE_REG API unless the VM has enabled
70
- * SVE support, so we only read it here, rather than together with all
71
- * the other ID registers earlier.
72
+ * SVE support, which resulted in an error rather than RAZ.
73
+ * So only read the register if we set KVM_ARM_VCPU_SVE above.
74
*/
75
err |= read_sys_reg64(fdarray[2], &ahcf->isar.id_aa64zfr0,
76
ARM64_SYS_REG(3, 0, 0, 4, 4));
32
--
77
--
33
2.25.1
78
2.25.1
diff view generated by jsdifflib
Deleted patch
1
In shell script syntax, $var[something] is not special for variable
2
expansion: $var is expanded. However, as it can look as if it were
3
intended to be an array element access (the correct syntax for which
4
is ${var[something]}), shellcheck recommends using explicit braces
5
around ${var} to clarify the intended expansion.
6
1
7
This fixes the warning:
8
9
In ./configure line 2346:
10
if "$target_ld" -verbose 2>&1 | grep -q "^[[:space:]]*$emu[[:space:]]*$"; then
11
^-- SC1087: Use braces when expanding arrays, e.g. ${array[idx]} (or ${var}[.. to quiet).
12
13
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
14
Reviewed-by: Thomas Huth <thuth@redhat.com>
15
Message-id: 20220720152631.450903-3-peter.maydell@linaro.org
16
---
17
configure | 2 +-
18
1 file changed, 1 insertion(+), 1 deletion(-)
19
20
diff --git a/configure b/configure
21
index XXXXXXX..XXXXXXX 100755
22
--- a/configure
23
+++ b/configure
24
@@ -XXX,XX +XXX,XX @@ if test -n "$target_cc" &&
25
# emulation. Linux and OpenBSD/amd64 use 'elf_i386'; FreeBSD uses the _fbsd
26
# variant; OpenBSD/i386 uses the _obsd variant; and Windows uses i386pe.
27
for emu in elf_i386 elf_i386_fbsd elf_i386_obsd i386pe; do
28
- if "$target_ld" -verbose 2>&1 | grep -q "^[[:space:]]*$emu[[:space:]]*$"; then
29
+ if "$target_ld" -verbose 2>&1 | grep -q "^[[:space:]]*${emu}[[:space:]]*$"; then
30
ld_i386_emulation="$emu"
31
break
32
fi
33
--
34
2.25.1
diff view generated by jsdifflib
Deleted patch
1
The variable string-replacement syntax ${var/old/new} is a bashism
2
(though it is also supported by some other shells), and for instance
3
does not work with the NetBSD /bin/sh, which complains:
4
../src/configure: 687: Syntax error: Bad substitution
5
1
6
Replace it with a more portable sed-based approach, similar to
7
what we already do in quote_sh().
8
9
Note that shellcheck also diagnoses this:
10
11
In ./configure line 687:
12
e=${e/'\'/'\\'}
13
^-----------^ SC2039: In POSIX sh, string replacement is undefined.
14
^-- SC1003: Want to escape a single quote? echo 'This is how it'\''s done'.
15
^-- SC1003: Want to escape a single quote? echo 'This is how it'\''s done'.
16
17
In ./configure line 688:
18
e=${e/\"/'\"'}
19
^----------^ SC2039: In POSIX sh, string replacement is undefined.
20
21
Fixes: 8154f5e64b0cf ("meson: Prefix each element of firmware path")
22
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
23
Tested-by: Thomas Huth <thuth@redhat.com>
24
Message-id: 20220720152631.450903-4-peter.maydell@linaro.org
25
---
26
configure | 7 ++++---
27
1 file changed, 4 insertions(+), 3 deletions(-)
28
29
diff --git a/configure b/configure
30
index XXXXXXX..XXXXXXX 100755
31
--- a/configure
32
+++ b/configure
33
@@ -XXX,XX +XXX,XX @@ meson_option_build_array() {
34
IFS=:
35
fi
36
for e in $1; do
37
- e=${e/'\'/'\\'}
38
- e=${e/\"/'\"'}
39
- printf '"""%s""",' "$e"
40
+ printf '"""'
41
+ # backslash escape any '\' and '"' characters
42
+ printf "%s" "$e" | sed -e 's/\([\"]\)/\\\1/g'
43
+ printf '""",'
44
done)
45
printf ']\n'
46
}
47
--
48
2.25.1
diff view generated by jsdifflib
Deleted patch
1
In commit 823eb013452e93d we moved the setting of ARCH from configure
2
to meson.build, but we accidentally left behind one attempt to use
3
$ARCH in configure, which was trying to add -msmall-data to the
4
compiler flags on Alpha hosts. Since ARCH is now never set, the test
5
always fails and we never add the flag.
6
1
7
There isn't actually any need to use this compiler flag on Alpha:
8
the original intent was that it would allow us to simplify our TCG
9
codegen on that platform, but we never actually made the TCG changes
10
that would rely on -msmall-data.
11
12
Drop the effectively-dead code from configure, as we don't need it.
13
14
This was spotted by shellcheck:
15
16
In ./configure line 2254:
17
case "$ARCH" in
18
^---^ SC2153: Possible misspelling: ARCH may not be assigned, but arch is.
19
20
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
21
Reviewed-by: Thomas Huth <thuth@redhat.com>
22
Message-id: 20220720152631.450903-5-peter.maydell@linaro.org
23
---
24
configure | 7 -------
25
1 file changed, 7 deletions(-)
26
27
diff --git a/configure b/configure
28
index XXXXXXX..XXXXXXX 100755
29
--- a/configure
30
+++ b/configure
31
@@ -XXX,XX +XXX,XX @@ if test "$fortify_source" = "yes" ; then
32
QEMU_CFLAGS="-U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=2 $QEMU_CFLAGS"
33
fi
34
35
-case "$ARCH" in
36
-alpha)
37
- # Ensure there's only a single GP
38
- QEMU_CFLAGS="-msmall-data $QEMU_CFLAGS"
39
-;;
40
-esac
41
-
42
if test "$have_asan" = "yes"; then
43
QEMU_CFLAGS="-fsanitize=address $QEMU_CFLAGS"
44
QEMU_LDFLAGS="-fsanitize=address $QEMU_LDFLAGS"
45
--
46
2.25.1
diff view generated by jsdifflib
1
From: Alan Jian <alanjian85@gmail.com>
1
From: Richard Henderson <richard.henderson@linaro.org>
2
2
3
This patch fixes the dedicated framebuffer mailbox interface by
3
The test for the IF block indicates no ID registers are exposed, much
4
removing an unneeded offset. This means that we pick the framebuffer
4
less host support for SVE. Move the SVE probe into the ELSE block.
5
address in the same way that we do if the guest code uses the buffer
6
allocate mechanism of the bcm2835_property interface (case
7
0x00040001: /* Allocate buffer */ in bcm2835_property.c).
8
5
9
The documentation of this mailbox interface doesn't say anything
6
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
10
about using parts of the request buffer address to affect the
7
Message-id: 20220726045828.53697-4-richard.henderson@linaro.org
11
chosen framebuffer address:
12
https://github.com/raspberrypi/firmware/wiki/Mailbox-framebuffer-interface
13
14
Some baremetal applications like the Screen01/Screen02 examples from
15
Baking Pi tutorial[1] didn't work before this patch.
16
17
[1] https://www.cl.cam.ac.uk/projects/raspberrypi/tutorials/os/screen01.html
18
19
Signed-off-by: Alan Jian <alanjian85@outlook.com>
20
Message-id: 20220725145838.8412-1-alanjian85@outlook.com
21
[PMM: tweaked commit message]
22
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
8
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
23
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
9
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
24
---
10
---
25
hw/display/bcm2835_fb.c | 3 +--
11
target/arm/kvm64.c | 22 +++++++++++-----------
26
1 file changed, 1 insertion(+), 2 deletions(-)
12
1 file changed, 11 insertions(+), 11 deletions(-)
27
13
28
diff --git a/hw/display/bcm2835_fb.c b/hw/display/bcm2835_fb.c
14
diff --git a/target/arm/kvm64.c b/target/arm/kvm64.c
29
index XXXXXXX..XXXXXXX 100644
15
index XXXXXXX..XXXXXXX 100644
30
--- a/hw/display/bcm2835_fb.c
16
--- a/target/arm/kvm64.c
31
+++ b/hw/display/bcm2835_fb.c
17
+++ b/target/arm/kvm64.c
32
@@ -XXX,XX +XXX,XX @@ static void bcm2835_fb_mbox_push(BCM2835FBState *s, uint32_t value)
18
@@ -XXX,XX +XXX,XX @@ bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)
33
newconf.xoffset = ldl_le_phys(&s->dma_as, value + 24);
19
err |= read_sys_reg64(fdarray[2], &ahcf->isar.reset_pmcr_el0,
34
newconf.yoffset = ldl_le_phys(&s->dma_as, value + 28);
20
ARM64_SYS_REG(3, 3, 9, 12, 0));
35
21
}
36
- newconf.base = s->vcram_base | (value & 0xc0000000);
22
- }
37
- newconf.base += BCM2835_FB_OFFSET;
23
38
+ newconf.base = s->vcram_base + BCM2835_FB_OFFSET;
24
- if (sve_supported) {
39
25
- /*
40
/* Copy fields which we don't want to change from the existing config */
26
- * There is a range of kernels between kernel commit 73433762fcae
41
newconf.pixo = s->config.pixo;
27
- * and f81cb2c3ad41 which have a bug where the kernel doesn't expose
28
- * SYS_ID_AA64ZFR0_EL1 via the ONE_REG API unless the VM has enabled
29
- * SVE support, which resulted in an error rather than RAZ.
30
- * So only read the register if we set KVM_ARM_VCPU_SVE above.
31
- */
32
- err |= read_sys_reg64(fdarray[2], &ahcf->isar.id_aa64zfr0,
33
- ARM64_SYS_REG(3, 0, 0, 4, 4));
34
+ if (sve_supported) {
35
+ /*
36
+ * There is a range of kernels between kernel commit 73433762fcae
37
+ * and f81cb2c3ad41 which have a bug where the kernel doesn't
38
+ * expose SYS_ID_AA64ZFR0_EL1 via the ONE_REG API unless the VM has
39
+ * enabled SVE support, which resulted in an error rather than RAZ.
40
+ * So only read the register if we set KVM_ARM_VCPU_SVE above.
41
+ */
42
+ err |= read_sys_reg64(fdarray[2], &ahcf->isar.id_aa64zfr0,
43
+ ARM64_SYS_REG(3, 0, 0, 4, 4));
44
+ }
45
}
46
47
kvm_arm_destroy_scratch_host_vcpu(fdarray);
42
--
48
--
43
2.25.1
49
2.25.1
diff view generated by jsdifflib